|
|
Subscribe / Log in / New account

Reliable user-space stack traces with SFrame

Reliable user-space stack traces with SFrame

Posted May 23, 2023 7:29 UTC (Tue) by izbyshev (guest, #107996)
Parent article: Reliable user-space stack traces with SFrame

> Other outstanding problems include the need to handle dlopen(), which maps executable text from another file into a range of the calling process's memory.

Why would this problem be specific to dlopen()? ISTM it's the same for any dynamically-linked executables (even if they don't use dlopen()). Dynamic linking happens in user space, so the kernel currently learns about libraries only indirectly (by seeing them mmap'ed for execution).


to post comments

Reliable user-space stack traces with SFrame

Posted May 23, 2023 11:31 UTC (Tue) by nevets (subscriber, #11875) [Link]

It's not specific to dlopen(). It was just that dlopen() is probably the most known and easiest to explain the issue.


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds