Fabian Vogt changed bug 1213785
What Removed Added
CC   fvogt@suse.com
Status REOPENED CONFIRMED

Comment # 3 on bug 1213785 from Fabian Vogt
I can reproduce the issue if debuginfod is used.
Setting a breakpoint at kprobe_warn_out_range shows that the address of the
symbol is directly the address of the symbol in the debuginfod provided ELF
file, while the map it is checked against uses the virtual addresses of the
running kernel, including the KASLR offset. Depending on how big the KASLR
offset is, this check fails.


You are receiving this mail because: