* [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
@ 2015-02-04 21:15 wcohen at redhat dot com
2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
` (12 more replies)
0 siblings, 13 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-04 21:15 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
Bug ID: 17928
Summary: A number of the systemtap.syscall/syscall.exp tests
fail on 32-bit arm because size_t sign extended to
64-bit value
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: tapsets
Assignee: systemtap at sourceware dot org
Reporter: wcohen at redhat dot com
When reviewing the the test results on arm32 I found that a number of the
systemtap.syscall/syscall.exp tests were failing because it appears that 32-bit
size_t arguments were being sign extended to 64-bit values. This problem
didn't occur on 32-bit x86. Below is an example of the failed tests on arm32
on a fedora20 machine. The argument in question is being passed in a 32-bit
register. Rather than being 4294967295 it ends up being 18446744073709551615
Testing 32-bit lxattr syscall
Executing on host: gcc ./systemtap.syscall/lxattr.c -lrt -lm -o
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr
(timeout = 300)
spawn -ignore SIGHUP gcc ./systemtap.syscall/lxattr.c -lrt -lm -o
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr
lxattr FAILED. output of "staprun -R
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/syscall.ko -c
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr"
was:
------------------------------------------
stapio: sigreturn () = -4 (EINTR)
stapio: rt_sigaction (SIGUSR1, {SIG_DFL}, 0x0, 8) = 0
stapio: rt_sigprocmask (SIG_SETMASK, [EMPTY], 0x0, 8) = 0
stapio: execve
("/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr"
) = 0
lxattr: brk (0x0) = 21864448
lxattr: uname (0xffffffffbeb7ba40) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6fa3000
lxattr: access ("/etc/ld.so.preload", R_OK) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open ("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
lxattr: fstat (3, 0xffffffffbeb7b610) = 0
lxattr: mmap2 (0x0, 82131, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffffffffb6f8e000
lxattr: close (3) = 0
lxattr: open ("/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b730, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b650) = 0
lxattr: mmap2 (0x0, 57900, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f7f000
lxattr: mprotect (0xffffffffb6f85000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f8c000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 20480) = 0xffffffffb6f8c000
lxattr: close (3) = 0
lxattr: open ("/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b718, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b638) = 0
lxattr: mmap2 (0x0, 475312, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f0a000
lxattr: mprotect (0xffffffffb6f76000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f7d000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 438272) = 0xffffffffb6f7d000
lxattr: close (3) = 0
lxattr: open ("/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b700, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b620) = 0
lxattr: mmap2 (0x0, 1361304, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6dbd000
lxattr: mprotect (0xffffffffb6efd000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f04000, 12288, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 1306624) = 0xffffffffb6f04000
lxattr: mmap2 (0xffffffffb6f07000, 9624, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6f07000
lxattr: close (3) = 0
lxattr: open ("/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b6e8, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b608) = 0
lxattr: mmap2 (0x0, 152732, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d97000
lxattr: mprotect (0xffffffffb6db5000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6dbc000, 4096, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 118784) = 0xffffffffb6dbc000
lxattr: close (3) = 0
lxattr: open ("/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b638, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b558) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d96000
lxattr: mmap2 (0x0, 123448, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d77000
lxattr: mprotect (0xffffffffb6d8b000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6d92000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 77824) = 0xffffffffb6d92000
lxattr: mmap2 (0xffffffffb6d94000, 4664, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6d94000
lxattr: close (3) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d76000
lxattr: mprotect (0xffffffffb6f04000, 8192, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6d92000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f7d000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f8c000, 4096, PROT_READ) = 0
lxattr: mprotect (0x4217e000, 4096, PROT_READ) = 0
lxattr: munmap (0xffffffffb6f8e000, 82131) = 0
lxattr: set_tid_address (0xffffffffb6d76068) = 31217
lxattr: rt_sigaction (0x20, {0xb6d7c1e4, SA_SIGINFO|SA_RESTORER, 0xb6ded370,
[EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigaction (0x21, {0xb6d7c08c, SA_RESTART|SA_SIGINFO|SA_RESTORER,
0xb6ded370, [EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigprocmask (SIG_UNBLOCK, [EMPTY], 0x0, 8) = 0
lxattr: getrlimit (RLIMIT_STACK, 0xffffffffbeb7be9c) = 0
lxattr: creat ("foobar", 0666) = 3
lxattr: close (3) = 0
lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8, XATTR_CREATE)
= 0
lxattr: lsetxattr ("foobar", "user.systemtap.test2",
"\xef\xbe\xad\xde\x02\x00\x00\x00\x03\x00\x00\x00\x04\x00\x00\x00\x05\x00\x00\x00",
20, XATTR_CREATE) = 0
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c, 1024) =
8
lxattr: llistxattr ("foobar", 0xffffffffbeb7ba4c, 1024) = 58
lxattr: lremovexattr ("foobar", "user.systemtap.test") = 0
lxattr: lsetxattr (ffffffff, "user.systemtap.test", "testing", 8, XATTR_CREATE)
= -14 (EFAULT)
lxattr: lsetxattr ("foobar", ffffffff, "testing", 8, XATTR_CREATE) = -14
(EFAULT)
lxattr: lsetxattr ("foobar", "user.systemtap.test", 0xffffffff, 8,
XATTR_CREATE) = -14 (EFAULT)
lxattr: lsetxattr ("foobar", "user.systemtap.test", 0x0, 18446744073709551615,
XATTR_CREATE) = -7 (E2BIG)
lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8,
XATTR_CREATE|XATTR_REPLACE|0xfffffffc) = -22 (EINVAL)
lxattr: lgetxattr (ffffffff, "user.systemtap.test", 0xffffffffbeb7ba4c, 1024) =
-14 (EFAULT)
lxattr: lgetxattr ("foobar", ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffffffffff, 1024) =
-61 (ENODATA)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c,
18446744073709551615) = -61 (ENODATA)
lxattr: llistxattr (ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0xffffffffffffffff, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0x0, 18446744073709551615) = -14 (EFAULT)
lxattr: lremovexattr (ffffffff, "user.systemtap.test") = -14 (EFAULT)
lxattr: lremovexattr ("foobar", ffffffff) = -14 (EFAULT)
lxattr: exit_group (0) =
------------------------------------------
RESULTS: ('*' = MATCHED EXPECTED)
lxattr: brk (0x0) = 21864448
lxattr: uname (0xffffffffbeb7ba40) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6fa3000
lxattr: access ("/etc/ld.so.preload", R_OK) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open ("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
lxattr: fstat (3, 0xffffffffbeb7b610) = 0
lxattr: mmap2 (0x0, 82131, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffffffffb6f8e000
lxattr: close (3) = 0
lxattr: open ("/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b730, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b650) = 0
lxattr: mmap2 (0x0, 57900, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f7f000
lxattr: mprotect (0xffffffffb6f85000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f8c000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 20480) = 0xffffffffb6f8c000
lxattr: close (3) = 0
lxattr: open ("/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b718, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b638) = 0
lxattr: mmap2 (0x0, 475312, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f0a000
lxattr: mprotect (0xffffffffb6f76000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f7d000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 438272) = 0xffffffffb6f7d000
lxattr: close (3) = 0
lxattr: open ("/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b700, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b620) = 0
lxattr: mmap2 (0x0, 1361304, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6dbd000
lxattr: mprotect (0xffffffffb6efd000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f04000, 12288, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 1306624) = 0xffffffffb6f04000
lxattr: mmap2 (0xffffffffb6f07000, 9624, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6f07000
lxattr: close (3) = 0
lxattr: open ("/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b6e8, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b608) = 0
lxattr: mmap2 (0x0, 152732, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d97000
lxattr: mprotect (0xffffffffb6db5000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6dbc000, 4096, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 118784) = 0xffffffffb6dbc000
lxattr: close (3) = 0
lxattr: open ("/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b638, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b558) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d96000
lxattr: mmap2 (0x0, 123448, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d77000
lxattr: mprotect (0xffffffffb6d8b000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6d92000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 77824) = 0xffffffffb6d92000
lxattr: mmap2 (0xffffffffb6d94000, 4664, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6d94000
lxattr: close (3) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d76000
lxattr: mprotect (0xffffffffb6f04000, 8192, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6d92000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f7d000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f8c000, 4096, PROT_READ) = 0
lxattr: mprotect (0x4217e000, 4096, PROT_READ) = 0
lxattr: munmap (0xffffffffb6f8e000, 82131) = 0
lxattr: set_tid_address (0xffffffffb6d76068) = 31217
lxattr: rt_sigaction (0x20, {0xb6d7c1e4, SA_SIGINFO|SA_RESTORER, 0xb6ded370,
[EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigaction (0x21, {0xb6d7c08c, SA_RESTART|SA_SIGINFO|SA_RESTORER,
0xb6ded370, [EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigprocmask (SIG_UNBLOCK, [EMPTY], 0x0, 8) = 0
lxattr: getrlimit (RLIMIT_STACK, 0xffffffffbeb7be9c) = 0
lxattr: creat ("foobar", 0666) = 3
lxattr: close (3) = 0
*lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8,
XATTR_CREATE) = 0
*lxattr: lsetxattr ("foobar", "user.systemtap.test2",
"\xef\xbe\xad\xde\x02\x00\x00\x00\x03\x00\x00\x00\x04\x00\x00\x00\x05\x00\x00\x00",
20, XATTR_CREATE) = 0
*lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c, 1024)
= 8
*lxattr: llistxattr ("foobar", 0xffffffffbeb7ba4c, 1024) = 58
*lxattr: lremovexattr ("foobar", "user.systemtap.test") = 0
*lxattr: lsetxattr (ffffffff, "user.systemtap.test", "testing", 8,
XATTR_CREATE) = -14 (EFAULT)
*lxattr: lsetxattr ("foobar", ffffffff, "testing", 8, XATTR_CREATE) = -14
(EFAULT)
*lxattr: lsetxattr ("foobar", "user.systemtap.test", 0xffffffff, 8,
XATTR_CREATE) = -14 (EFAULT)
lxattr: lsetxattr ("foobar", "user.systemtap.test", 0x0, 18446744073709551615,
XATTR_CREATE) = -7 (E2BIG)
lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8,
XATTR_CREATE|XATTR_REPLACE|0xfffffffc) = -22 (EINVAL)
lxattr: lgetxattr (ffffffff, "user.systemtap.test", 0xffffffffbeb7ba4c, 1024) =
-14 (EFAULT)
lxattr: lgetxattr ("foobar", ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffffffffff, 1024) =
-61 (ENODATA)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c,
18446744073709551615) = -61 (ENODATA)
lxattr: llistxattr (ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0xffffffffffffffff, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0x0, 18446744073709551615) = -14 (EFAULT)
lxattr: lremovexattr (ffffffff, "user.systemtap.test") = -14 (EFAULT)
lxattr: lremovexattr ("foobar", ffffffff) = -14 (EFAULT)
lxattr: exit_group (0) =
--------- EXPECTED and NOT MATCHED ----------
lxattr: lsetxattr \("foobar", "user.systemtap.test", 0x0, 4294967295,
XATTR_CREATE\) = [\-0-9]+
lxattr: lsetxattr \("foobar", "user.systemtap.test", "testing", 8, XATTR_[^
]+\|[x0-9a-fA-F]+\) = [\-0-9]+
lxattr: lgetxattr \([f]+, "user.systemtap.test", [x0-9a-fA-F]+, 1024\) =
[\-0-9]+
lxattr: lgetxattr \("foobar", [f]+, [x0-9a-fA-F]+, 1024\) = [\-0-9]+
lxattr: lgetxattr \("foobar", "user.systemtap.test", 0x[f]+, 1024\) = [\-0-9]+
lxattr: lgetxattr \("foobar", "user.systemtap.test", [x0-9a-fA-F]+,
4294967295\) = [\-0-9]+
lxattr: llistxattr \([f]+, [x0-9a-fA-F]+, 1024\) = [\-0-9]+
lxattr: llistxattr \("foobar", 0x[f]+, 1024\) = [\-0-9]+
lxattr: llistxattr \("foobar", 0x0+, 4294967295\) = [\-0-9]+
lxattr: lremovexattr \([f]+, "user.systemtap.test"\) = [\-0-9]+
lxattr: lremovexattr \("foobar", [f]+\) = [\-0-9]+
FAIL: 32-bit lxattr syscall
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
@ 2015-02-04 21:34 ` jistone at redhat dot com
2015-02-06 21:00 ` dsmith at redhat dot com
` (11 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: jistone at redhat dot com @ 2015-02-04 21:34 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
Josh Stone <jistone at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jistone at redhat dot com
--- Comment #1 from Josh Stone <jistone at redhat dot com> ---
I believe these are just facing the symptoms of syscall wrappers, where every
argument is a simple C long, and an inlined syscall function has the proper
types. So the outer function we probe for .call/return doesn't know signs.
This would be the ongoing work for bug 16716. For a size_t argument, it should
probably be wrapped __ulong(), as syscall.read does for its $count argument.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
@ 2015-02-06 21:00 ` dsmith at redhat dot com
2015-02-06 22:40 ` wcohen at redhat dot com
` (10 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-06 21:00 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
David Smith <dsmith at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dsmith at redhat dot com
--- Comment #2 from David Smith <dsmith at redhat dot com> ---
Commit 238e940 fixes all syscall tapset/testsuite problems I found running on
3.18.3-201.fc21.i686+PAE. This should fix most (if not all) of the 32-bit arm
failures.
Will, you will need to retest with this patch on arm hardware and see if there
are any remaining failures.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
2015-02-06 21:00 ` dsmith at redhat dot com
@ 2015-02-06 22:40 ` wcohen at redhat dot com
2015-02-06 22:44 ` wcohen at redhat dot com
` (9 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-06 22:40 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #3 from William Cohen <wcohen at redhat dot com> ---
The changes helped quite a bit. Before the patches:
testcase ./systemtap.syscall/syscall.exp completed in 211 seconds
=== systemtap Summary ===
# of expected passes 85
# of unexpected failures 28
# of untested testcases 2
# of unsupported tests 4
After the patches the test results are significantly improved:
testcase ./systemtap.syscall/syscall.exp completed in 217 seconds
=== systemtap Summary ===
# of expected passes 101
# of unexpected failures 13
# of untested testcases 1
# of unsupported tests 6
runtest completed at Fri Feb 6 16:23:55 2015
Comparing the systemtap.sum files there all the no new failures. The following
tests remain as failure:
FAIL: 32-bit alarm syscall (can't set timer to time in past)
FAIL: 32-bit chmod syscall (chmod arg2 of -1 get odd 01777777777777777777777)
FAIL: 32-bit dup syscall (not getting correct args for dup3)
FAIL: 32-bit fadvise64 syscall (test crashs on first fadvise64)
FAIL: 32-bit keyctl syscall (returns -EACCES for keyctl syscall)
FAIL: 32-bit mmap syscall (mlock arg2 != 4096)
FAIL: 32-bit poll syscall (epoll_wait not mapped to epoll_pwait)
FAIL: 32-bit recv syscall (doesn't match one recv)
FAIL: 32-bit recvfrom syscall (recvfrom mishandle 32-bit arg (-1))
FAIL: 32-bit send syscall (looks similar to recv syscall for send)
FAIL: 32-bit sendmsg syscall(looks similar to recv syscall for sendmsg)
FAIL: 32-bit shmat syscall (returning -EINVAL for several shmat/
FAIL: 32-bit uid syscall (gets wrong value for setuid)
Will attach the systemtap.log in a moment for details.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (2 preceding siblings ...)
2015-02-06 22:40 ` wcohen at redhat dot com
@ 2015-02-06 22:44 ` wcohen at redhat dot com
2015-02-07 6:37 ` wcohen at redhat dot com
` (8 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-06 22:44 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #4 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8105
--> https://sourceware.org/bugzilla/attachment.cgi?id=8105&action=edit
output showing remaining arm-32 test failure.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (3 preceding siblings ...)
2015-02-06 22:44 ` wcohen at redhat dot com
@ 2015-02-07 6:37 ` wcohen at redhat dot com
2015-02-07 22:24 ` wcohen at redhat dot com
` (7 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-07 6:37 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #5 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8106
--> https://sourceware.org/bugzilla/attachment.cgi?id=8106&action=edit
Correct the size of various chmod related syscalls
Proposed patch to fix the syscalls related to the systemtap.syscall/chmod.c
test.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (4 preceding siblings ...)
2015-02-07 6:37 ` wcohen at redhat dot com
@ 2015-02-07 22:24 ` wcohen at redhat dot com
2015-02-09 15:32 ` dsmith at redhat dot com
` (6 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-07 22:24 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #6 from William Cohen <wcohen at redhat dot com> ---
It appears that the debuginfo the for argument locations are not right for some
of the functions being instrumented. The arm processor should be passing the
first four arguments in registers starting with register 0. So for the mmap.c
example just looked at the mlock syscall that has a problem. The r0 and r1
values look sane for mlock(r, 4096), mlock((void *)-1, 4096), and mlock(0, -1).
$ sudo ../../install/bin/stap -e 'probe syscall.mlock {printf("%s\n", $$parms);
print_regs()}' -c ./mmap
start=0x0 len=0xffffffffbe91a4e8
CPU: 1pc : [<c0133c3c>] lr : [<c0020530>]
sp : e8d0bfa8 ip : 00000008 fp : be91a4d4
r10: 00000200 r9 : e8d0a000 r8 : c0020544
r7 : 00000096 r6 : 00008674 r5 : 00000000 r4 : be91a4e8
r3 : 00000001 r2 : 00000001 r1 : 00001000 r0 : b6ff1000
Flags: Nzcv IRQs on FIQs on Mode SVC_32 Segment user
Control: 30C5387D
Table: 44243540 DAC: 55555555
start=0x0 len=0xffffffffbe91a4e8
CPU: 1pc : [<c0133c3c>] lr : [<c0020530>]
sp : e8d0bfa8 ip : 00000008 fp : be91a4d4
r10: 00000200 r9 : e8d0a000 r8 : c0020544
r7 : 00000096 r6 : 00008674 r5 : 00000000 r4 : be91a4e8
r3 : 00000001 r2 : 00000001 r1 : 00001000 r0 : ffffffff
Flags: Nzcv IRQs on FIQs on Mode SVC_32 Segment user
Control: 30C5387D
Table: 44243540 DAC: 55555555
start=0x0 len=0xffffffffbe91a4e8
CPU: 1pc : [<c0133c3c>] lr : [<c0020530>]
sp : e8d0bfa8 ip : 00000008 fp : be91a4d4
r10: 00000200 r9 : e8d0a000 r8 : c0020544
r7 : 00000096 r6 : 00008674 r5 : 00000000 r4 : be91a4e8
r3 : 00000001 r2 : 00000010 r1 : ffffffff r0 : 00000000
Flags: Nzcv IRQs on FIQs on Mode SVC_32 Segment user
Control: 30C5387D
Table: 44243540 DAC: 55555555
It looks like gcc is generating incorrect information generated a file with the
debug information with:
eu-readelf -N --debug-dump=info
/run/media/wcohen/wasteland/wcohen/kernel/linux/vmlinux > kernel_debuginfo
Then searched for SyS_mlock. Below it looks like referencing the wrong
registers for the parameters, r5 for start and r4 for len
[cf86bd] subprogram
external (flag_present) Yes
name (strp) "SyS_mlock"
decl_file (data1) 1
decl_line (data2) 726
prototyped (flag_present) Yes
type (ref4) [cead10]
low_pc (addr) 0xc0133c3c
high_pc (data4) 260 (0xc0133d40)
frame_base (exprloc)
[ 0] call_frame_cfa
sibling (ref4) [cf879b]
[cf86d8] formal_parameter
name (strp) "start"
decl_file (data1) 1
decl_line (data2) 726
type (ref4) [cead10]
location (exprloc)
[ 0] reg5
[cf86e6] formal_parameter
name (string) "len"
decl_file (data1) 1
decl_line (data2) 726
type (ref4) [cead10]
location (exprloc)
[ 0] reg4
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (5 preceding siblings ...)
2015-02-07 22:24 ` wcohen at redhat dot com
@ 2015-02-09 15:32 ` dsmith at redhat dot com
2015-02-09 17:47 ` dsmith at redhat dot com
` (5 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 15:32 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #7 from David Smith <dsmith at redhat dot com> ---
(In reply to William Cohen from comment #5)
> Created attachment 8106 [details]
> Correct the size of various chmod related syscalls
>
> Proposed patch to fix the syscalls related to the systemtap.syscall/chmod.c
> test.
The patch looks fine to me, go ahead and check it in.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (6 preceding siblings ...)
2015-02-09 15:32 ` dsmith at redhat dot com
@ 2015-02-09 17:47 ` dsmith at redhat dot com
2015-02-09 17:55 ` dsmith at redhat dot com
` (4 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 17:47 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #8 from David Smith <dsmith at redhat dot com> ---
Created attachment 8112
--> https://sourceware.org/bugzilla/attachment.cgi?id=8112&action=edit
Proposed patch to fix several failures
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (7 preceding siblings ...)
2015-02-09 17:47 ` dsmith at redhat dot com
@ 2015-02-09 17:55 ` dsmith at redhat dot com
2015-02-09 21:27 ` wcohen at redhat dot com
` (3 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 17:55 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #9 from David Smith <dsmith at redhat dot com> ---
(In reply to William Cohen from comment #3)
> The changes helped quite a bit. Before the patches:
>
> testcase ./systemtap.syscall/syscall.exp completed in 211 seconds
>
> === systemtap Summary ===
>
> # of expected passes 85
> # of unexpected failures 28
> # of untested testcases 2
> # of unsupported tests 4
>
>
> After the patches the test results are significantly improved:
>
> testcase ./systemtap.syscall/syscall.exp completed in 217 seconds
>
> === systemtap Summary ===
>
> # of expected passes 101
> # of unexpected failures 13
> # of untested testcases 1
> # of unsupported tests 6
> runtest completed at Fri Feb 6 16:23:55 2015
>
> Comparing the systemtap.sum files there all the no new failures. The
> following tests remain as failure:
>
> FAIL: 32-bit alarm syscall (can't set timer to time in past)
> FAIL: 32-bit chmod syscall (chmod arg2 of -1 get odd 01777777777777777777777)
> FAIL: 32-bit dup syscall (not getting correct args for dup3)
> FAIL: 32-bit fadvise64 syscall (test crashs on first fadvise64)
> FAIL: 32-bit keyctl syscall (returns -EACCES for keyctl syscall)
> FAIL: 32-bit mmap syscall (mlock arg2 != 4096)
> FAIL: 32-bit poll syscall (epoll_wait not mapped to epoll_pwait)
> FAIL: 32-bit recv syscall (doesn't match one recv)
> FAIL: 32-bit recvfrom syscall (recvfrom mishandle 32-bit arg (-1))
> FAIL: 32-bit send syscall (looks similar to recv syscall for send)
> FAIL: 32-bit sendmsg syscall(looks similar to recv syscall for sendmsg)
> FAIL: 32-bit shmat syscall (returning -EINVAL for several shmat/
> FAIL: 32-bit uid syscall (gets wrong value for setuid)
>
> Will attach the systemtap.log in a moment for details.
I looked through systemtap.log, and have attached a patch that should fix the
following failures:
keyctl, recv, recvfrom, send, and sendmsg
All but recvfrom are testcase tweaks. On a 32-bit kernel, MAXSTRINGLEN is only
256, which causes us problems in places.
Besides the ones getting arguments incorrectly, the fadvise64 test crash is
odd. You might try compiling and running the testcase by hand as root and see
if it crashes.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (8 preceding siblings ...)
2015-02-09 17:55 ` dsmith at redhat dot com
@ 2015-02-09 21:27 ` wcohen at redhat dot com
2015-02-09 21:58 ` dsmith at redhat dot com
` (2 subsequent siblings)
12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-09 21:27 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
William Cohen <wcohen at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #8112|0 |1
is obsolete| |
--- Comment #10 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8113
--> https://sourceware.org/bugzilla/attachment.cgi?id=8113&action=edit
Revised patch that also fixes size argument for __syscall.recv
before patch on arm-32
Running ./systemtap.syscall/syscall.exp ...
FAIL: 32-bit dup syscall
FAIL: 32-bit fadvise64 syscall
FAIL: 32-bit keyctl syscall
FAIL: 32-bit mmap syscall
FAIL: 32-bit recv syscall
FAIL: 32-bit recvfrom syscall
FAIL: 32-bit send syscall
FAIL: 32-bit sendmsg syscall
FAIL: 32-bit shmat syscall
FAIL: 32-bit uid syscall
=== systemtap Summary ===
# of expected passes 104
# of unexpected failures 10
# of untested testcases 1
# of unsupported tests 6
Afterward patch:
Running ./systemtap.syscall/syscall.exp ...
FAIL: 32-bit dup syscall
FAIL: 32-bit fadvise64 syscall
FAIL: 32-bit keyctl syscall
FAIL: 32-bit mmap syscall
FAIL: 32-bit uid syscall
=== systemtap Summary ===
# of expected passes 109
# of unexpected failures 5
# of untested testcases 1
# of unsupported tests 6
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (9 preceding siblings ...)
2015-02-09 21:27 ` wcohen at redhat dot com
@ 2015-02-09 21:58 ` dsmith at redhat dot com
2015-02-09 22:12 ` wcohen at redhat dot com
2015-02-13 17:15 ` wcohen at redhat dot com
12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 21:58 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #11 from David Smith <dsmith at redhat dot com> ---
(In reply to William Cohen from comment #10)
> Created attachment 8113 [details]
> Revised patch that also fixes size argument for __syscall.recv
The patch looks fine to me. Go ahead and check it in.
Could you also attach a new systemtap.log for me to look at?
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (10 preceding siblings ...)
2015-02-09 21:58 ` dsmith at redhat dot com
@ 2015-02-09 22:12 ` wcohen at redhat dot com
2015-02-13 17:15 ` wcohen at redhat dot com
12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-09 22:12 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
--- Comment #12 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8114
--> https://sourceware.org/bugzilla/attachment.cgi?id=8114&action=edit
Updated systemtap.log from 32-bit arm
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
` (11 preceding siblings ...)
2015-02-09 22:12 ` wcohen at redhat dot com
@ 2015-02-13 17:15 ` wcohen at redhat dot com
12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-13 17:15 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=17928
William Cohen <wcohen at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #13 from William Cohen <wcohen at redhat dot com> ---
Down to the following 32-bit arm failure and none seem to be unrelated to the
32-bit size of operands:
FAIL: 32-bit dup syscall getting wrong arg locations for dup3()
FAIL: 32-bit uid syscall getting wrong arg locations for setuid()
FAIL: 32-bit mmap syscall getting wrong arg locations for mlock()
FAIL: 32-bit fadvise64 syscall existing "foobar" in directory caused failure
FAIL: 32-bit shmat syscall shmat SHM_RDONLY op fail with -EINVAL
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2015-02-13 17:15 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
2015-02-06 21:00 ` dsmith at redhat dot com
2015-02-06 22:40 ` wcohen at redhat dot com
2015-02-06 22:44 ` wcohen at redhat dot com
2015-02-07 6:37 ` wcohen at redhat dot com
2015-02-07 22:24 ` wcohen at redhat dot com
2015-02-09 15:32 ` dsmith at redhat dot com
2015-02-09 17:47 ` dsmith at redhat dot com
2015-02-09 17:55 ` dsmith at redhat dot com
2015-02-09 21:27 ` wcohen at redhat dot com
2015-02-09 21:58 ` dsmith at redhat dot com
2015-02-09 22:12 ` wcohen at redhat dot com
2015-02-13 17:15 ` wcohen at redhat dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).