From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 21560 invoked by alias); 6 Jun 2013 18:03:06 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 21401 invoked by uid 48); 6 Jun 2013 18:02:56 -0000 From: "dsmith at redhat dot com" To: systemtap@sourceware.org Subject: [Bug tapsets/15219] syscall.exp failures on RHEL5, RHEL6, and rawhide Date: Thu, 06 Jun 2013 18:03:00 -0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: systemtap X-Bugzilla-Component: tapsets X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: dsmith at redhat dot com X-Bugzilla-Status: NEW X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: systemtap at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-SW-Source: 2013-q2/txt/msg00250.txt.bz2 http://sourceware.org/bugzilla/show_bug.cgi?id=15219 --- Comment #6 from David Smith --- Created attachment 7063 --> http://sourceware.org/bugzilla/attachment.cgi?id=7063&action=edit beta 2 patch Here's a second version of the patch, that tries to be more paranoid about when to allow reading kernel memory, especially for Unprivileged users. -- You are receiving this mail because: You are the assignee for the bug.