What | Removed | Added |
---|---|---|
CC | fvogt@suse.com | |
Status | REOPENED | CONFIRMED |
I can reproduce the issue if debuginfod is used. Setting a breakpoint at kprobe_warn_out_range shows that the address of the symbol is directly the address of the symbol in the debuginfod provided ELF file, while the map it is checked against uses the virtual addresses of the running kernel, including the KASLR offset. Depending on how big the KASLR offset is, this check fails.