This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/11444] Check that no pt_regs*-processing functions are /* unprivileged */
- From: "mjw at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 14 Jun 2010 09:34:38 -0000
- Subject: [Bug tapsets/11444] Check that no pt_regs*-processing functions are /* unprivileged */
- References: <20100329184948.11444.brolley@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From mjw at redhat dot com 2010-06-14 09:34 -------
(In reply to comment #1)
> ucontext-unwind.stp:*: unsure, maybe should task_pt_regs() only; mjw?
That comes from the fact that most backtracing code was written before user
space support was added. All code handles both in-kernel and in-user backtraces,
up to the dwarf unwinder. We could push the kernel/user split down into the
tapset functions and only pass around a pt_regs struct that is tailored to
kernel/user if that is safer. What exactly is the problem with passing around
CONTEXT->regs?
--
http://sourceware.org/bugzilla/show_bug.cgi?id=11444
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.