public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug testsuite/15928] New: the memory1.exp testcase is accessing user memory as kernel memory
@ 2013-09-03 20:56 dsmith at redhat dot com
  2013-09-04 18:26 ` [Bug testsuite/15928] " dsmith at redhat dot com
  0 siblings, 1 reply; 2+ messages in thread
From: dsmith at redhat dot com @ 2013-09-03 20:56 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=15928

            Bug ID: 15928
           Summary: the memory1.exp testcase is accessing user memory as
                    kernel memory
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: testsuite
          Assignee: systemtap at sourceware dot org
          Reporter: dsmith at redhat dot com

The testsuite/systemtap.printf/memory1.exp testcase has an associated
testsuite/systemtap.printf/memory1.stp file, which does this:

====
probe syscall.open {
        ...
        result = sprintf ("%m", $filename);
        ...
====

However, since $filename is a pointer to user memory, this really isn't valid.
This occidentally works on systems where there is no real user/kernel memory
split, like on x86_64, but fails on systems like s390x where there is a real
user/kernel memory split.

As the documentation for '%m' states:

              %m     Safely reads kernel memory at the given address, outputs
                     its content.  The precision specifier determines the num‐
                     ber of bytes to read.  Default is 1 byte.

The testcase will need to be fixed, perhaps reading data from a private kernel
module instead.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [Bug testsuite/15928] the memory1.exp testcase is accessing user memory as kernel memory
  2013-09-03 20:56 [Bug testsuite/15928] New: the memory1.exp testcase is accessing user memory as kernel memory dsmith at redhat dot com
@ 2013-09-04 18:26 ` dsmith at redhat dot com
  0 siblings, 0 replies; 2+ messages in thread
From: dsmith at redhat dot com @ 2013-09-04 18:26 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=15928

David Smith <dsmith at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #1 from David Smith <dsmith at redhat dot com> ---
Fixed in commit 0447e0e by probing a function in a new kernel module that takes
kernel memory.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2013-09-04 18:26 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-09-03 20:56 [Bug testsuite/15928] New: the memory1.exp testcase is accessing user memory as kernel memory dsmith at redhat dot com
2013-09-04 18:26 ` [Bug testsuite/15928] " dsmith at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).