On Thu, Aug 06, 2015 at 12:31:26PM +0800, Wangnan (F) wrote: > > > What about hacking ELF binary in memory? > > 1. load the object into memory; > 2. twist the machine code to EM_X86_64; > 3. load it using elf_begin; > 4. return the twested elf memory image using libdwfl's find_elf callback. > > Then libdw will recognise BPF's object file as a X86_64 object file. If > required, > relocation sections can also be twisted in this way. Should not very hard > since > we can only consider one relocation type. > > Then let's start thinking how to introduce EM_BPF. We can rely on the > hacking > until EM_BPF symbol reaches elfutils in perf. > > What do you think?
sounds crazy, but may work. let's try it :) -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/