fche changed the topic of #systemtap to: http://sourceware.org/systemtap; email systemtap@sourceware.org if answers here not timely, conversations may be logged
KDr25 has joined #systemtap
hpt has joined #systemtap
KDr25 has quit [Quit: Connection closed for inactivity]
hpt has quit [Ping timeout: 240 seconds]
hpt has joined #systemtap
serhei_ has joined #systemtap
eichiro_ has joined #systemtap
serhei has quit [*.net *.split]
eichiro has quit [*.net *.split]
orivej has joined #systemtap
khaled has joined #systemtap
yogananth has joined #systemtap
<lindi->
is there perhaps some existing recipe for recovering LUKS2 master key from kernel keyring with systemtap?
hpt has quit [Ping timeout: 265 seconds]
mjw has joined #systemtap
<fche>
lindi-, well if the kernel knows it, stap can find it, I guess
tromey has joined #systemtap
sapatel has joined #systemtap
drsmith has left #systemtap [#systemtap]
amerey has joined #systemtap
drsmith has joined #systemtap
sscox has quit [Ping timeout: 250 seconds]
sscox has joined #systemtap
orivej has quit [Ping timeout: 264 seconds]
orivej has joined #systemtap
<agentzh>
running into a weird issue. user_long_error() throws out the "read fault" error, but using the exact virtual memory address to lookup the corresponding userland process's /proc/PID/pagemap, it shows the page is present, not swapped out, and has a Page Frame Number. what could it be?
<fche>
not sure; is it readable?
<agentzh>
how to tell if it's readable without triggering a read fault?
<agentzh>
it's readable according to /proc/PID/maps
<fche>
not sure .... could write a stap script that uses some inlined c code to do the read_from_user bit and see how that compares
<fche>
or probe_read_blah
<agentzh>
ah, that's clever. thanks for the suggestion
<fche>
we do a little bit more than that but not much
<fche>
set_fs (USER_DS) or somesuch
<agentzh>
is it possible that the host machine swaps out the memory page while the kvm guest does not know about it?
<lindi->
agentzh: it should be transparent to the guest
<agentzh>
lindi-: okay, so it won't be a page fault for the guest OS kernel?
<lindi->
agentzh: I would think the host would handle that
<agentzh>
yeah, i also ready that the host OS will handle the page fault instead of the guest. thanks.
<fche>
a fault at the host is different kind of thing than a fault at the gues
serhei_ is now known as serhei
<agentzh>
fche: okay, thanks
<agentzh>
i wonder if it's possible to use module("foo").function("...") to probe on the kernel modules generated by some other stap scripts.
<agentzh>
i used stap -p4 -m foo a.stp to generate a foo.ko file and then use staprun to keep it running. and then in another terminal, i use probe module("foo").function("*") in another .stp script but it says module("foo") cannot be resolved.
<agentzh>
is this expected?
<fche>
it's been done before
<fche>
but the target stap module .ko file, ideally built with -BCONFIG_DEBUG_INFO=y must be findable by the second stap job
<agentzh>
maybe i should use -d /path/to/foo.ko for the module("foo") script?
<fche>
module("/path/to/foo.ko") more like it
<agentzh>
okay, i see.
<agentzh>
i'll try. thanks
<agentzh>
is there any easy way to enable debug symbols in the resulting stap .ko module?
<agentzh>
i can hack the stap source to enable it, but it is kinda bloody...