public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
@ 2015-02-04 21:15 wcohen at redhat dot com
  2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
                   ` (12 more replies)
  0 siblings, 13 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-04 21:15 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

            Bug ID: 17928
           Summary: A number of the systemtap.syscall/syscall.exp tests
                    fail on 32-bit arm because size_t sign extended to
                    64-bit value
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: tapsets
          Assignee: systemtap at sourceware dot org
          Reporter: wcohen at redhat dot com

When reviewing the the test results on arm32 I found that a number of the
systemtap.syscall/syscall.exp tests were failing because it appears that 32-bit
size_t arguments were being sign extended to 64-bit values.  This problem
didn't occur on 32-bit x86.  Below is an example of the failed tests on arm32
on a fedora20 machine.  The argument in question is being passed in a 32-bit
register. Rather than being 4294967295 it ends up being 18446744073709551615


Testing 32-bit lxattr syscall
Executing on host: gcc ./systemtap.syscall/lxattr.c  -lrt  -lm   -o
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr
   (timeout = 300)
spawn -ignore SIGHUP gcc ./systemtap.syscall/lxattr.c -lrt -lm -o
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr
lxattr FAILED. output of "staprun -R
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/syscall.ko -c
/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr"
was:
------------------------------------------
stapio: sigreturn () = -4 (EINTR)
stapio: rt_sigaction (SIGUSR1, {SIG_DFL}, 0x0, 8) = 0
stapio: rt_sigprocmask (SIG_SETMASK, [EMPTY], 0x0, 8) = 0
stapio: execve
("/mnt/badlands/home/wcohen/systemtap_write/systemtap/testsuite/staptestTi7lW5/lxattr"
) = 0
lxattr: brk (0x0) = 21864448
lxattr: uname (0xffffffffbeb7ba40) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6fa3000
lxattr: access ("/etc/ld.so.preload", R_OK) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open ("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
lxattr: fstat (3, 0xffffffffbeb7b610) = 0
lxattr: mmap2 (0x0, 82131, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffffffffb6f8e000
lxattr: close (3) = 0
lxattr: open ("/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b730, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b650) = 0
lxattr: mmap2 (0x0, 57900, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f7f000
lxattr: mprotect (0xffffffffb6f85000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f8c000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 20480) = 0xffffffffb6f8c000
lxattr: close (3) = 0
lxattr: open ("/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b718, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b638) = 0
lxattr: mmap2 (0x0, 475312, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f0a000
lxattr: mprotect (0xffffffffb6f76000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f7d000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 438272) = 0xffffffffb6f7d000
lxattr: close (3) = 0
lxattr: open ("/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b700, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b620) = 0
lxattr: mmap2 (0x0, 1361304, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6dbd000
lxattr: mprotect (0xffffffffb6efd000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f04000, 12288, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 1306624) = 0xffffffffb6f04000
lxattr: mmap2 (0xffffffffb6f07000, 9624, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6f07000
lxattr: close (3) = 0
lxattr: open ("/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b6e8, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b608) = 0
lxattr: mmap2 (0x0, 152732, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d97000
lxattr: mprotect (0xffffffffb6db5000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6dbc000, 4096, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 118784) = 0xffffffffb6dbc000
lxattr: close (3) = 0
lxattr: open ("/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b638, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b558) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d96000
lxattr: mmap2 (0x0, 123448, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d77000
lxattr: mprotect (0xffffffffb6d8b000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6d92000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 77824) = 0xffffffffb6d92000
lxattr: mmap2 (0xffffffffb6d94000, 4664, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6d94000
lxattr: close (3) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d76000
lxattr: mprotect (0xffffffffb6f04000, 8192, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6d92000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f7d000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f8c000, 4096, PROT_READ) = 0
lxattr: mprotect (0x4217e000, 4096, PROT_READ) = 0
lxattr: munmap (0xffffffffb6f8e000, 82131) = 0
lxattr: set_tid_address (0xffffffffb6d76068) = 31217
lxattr: rt_sigaction (0x20, {0xb6d7c1e4, SA_SIGINFO|SA_RESTORER, 0xb6ded370,
[EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigaction (0x21, {0xb6d7c08c, SA_RESTART|SA_SIGINFO|SA_RESTORER,
0xb6ded370, [EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigprocmask (SIG_UNBLOCK, [EMPTY], 0x0, 8) = 0
lxattr: getrlimit (RLIMIT_STACK, 0xffffffffbeb7be9c) = 0
lxattr: creat ("foobar", 0666) = 3
lxattr: close (3) = 0
lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8, XATTR_CREATE)
= 0
lxattr: lsetxattr ("foobar", "user.systemtap.test2",
"\xef\xbe\xad\xde\x02\x00\x00\x00\x03\x00\x00\x00\x04\x00\x00\x00\x05\x00\x00\x00",
20, XATTR_CREATE) = 0
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c, 1024) =
8
lxattr: llistxattr ("foobar", 0xffffffffbeb7ba4c, 1024) = 58
lxattr: lremovexattr ("foobar", "user.systemtap.test") = 0
lxattr: lsetxattr (ffffffff, "user.systemtap.test", "testing", 8, XATTR_CREATE)
= -14 (EFAULT)
lxattr: lsetxattr ("foobar", ffffffff, "testing", 8, XATTR_CREATE) = -14
(EFAULT)
lxattr: lsetxattr ("foobar", "user.systemtap.test", 0xffffffff, 8,
XATTR_CREATE) = -14 (EFAULT)
lxattr: lsetxattr ("foobar", "user.systemtap.test", 0x0, 18446744073709551615,
XATTR_CREATE) = -7 (E2BIG)
lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8,
XATTR_CREATE|XATTR_REPLACE|0xfffffffc) = -22 (EINVAL)
lxattr: lgetxattr (ffffffff, "user.systemtap.test", 0xffffffffbeb7ba4c, 1024) =
-14 (EFAULT)
lxattr: lgetxattr ("foobar", ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffffffffff, 1024) =
-61 (ENODATA)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c,
18446744073709551615) = -61 (ENODATA)
lxattr: llistxattr (ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0xffffffffffffffff, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0x0, 18446744073709551615) = -14 (EFAULT)
lxattr: lremovexattr (ffffffff, "user.systemtap.test") = -14 (EFAULT)
lxattr: lremovexattr ("foobar", ffffffff) = -14 (EFAULT)
lxattr: exit_group (0) = 
------------------------------------------
RESULTS: ('*' = MATCHED EXPECTED)
lxattr: brk (0x0) = 21864448
lxattr: uname (0xffffffffbeb7ba40) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6fa3000
lxattr: access ("/etc/ld.so.preload", R_OK) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/tls",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/v7l",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/vfp",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap/librt.so.1",
O_RDONLY|O_CLOEXEC) = -2 (ENOENT)
lxattr: stat
("/mnt/badlands/home/wcohen/systemtap_write/install/lib/systemtap",
0xffffffffbeb7b650) = -2 (ENOENT)
lxattr: open ("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
lxattr: fstat (3, 0xffffffffbeb7b610) = 0
lxattr: mmap2 (0x0, 82131, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffffffffb6f8e000
lxattr: close (3) = 0
lxattr: open ("/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b730, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b650) = 0
lxattr: mmap2 (0x0, 57900, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f7f000
lxattr: mprotect (0xffffffffb6f85000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f8c000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 20480) = 0xffffffffb6f8c000
lxattr: close (3) = 0
lxattr: open ("/lib/libm.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b718, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b638) = 0
lxattr: mmap2 (0x0, 475312, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6f0a000
lxattr: mprotect (0xffffffffb6f76000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f7d000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 438272) = 0xffffffffb6f7d000
lxattr: close (3) = 0
lxattr: open ("/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b700, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b620) = 0
lxattr: mmap2 (0x0, 1361304, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6dbd000
lxattr: mprotect (0xffffffffb6efd000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6f04000, 12288, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 1306624) = 0xffffffffb6f04000
lxattr: mmap2 (0xffffffffb6f07000, 9624, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6f07000
lxattr: close (3) = 0
lxattr: open ("/lib/libgcc_s.so.1", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b6e8, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b608) = 0
lxattr: mmap2 (0x0, 152732, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d97000
lxattr: mprotect (0xffffffffb6db5000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6dbc000, 4096, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 118784) = 0xffffffffb6dbc000
lxattr: close (3) = 0
lxattr: open ("/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
lxattr: read (3, 0xffffffffbeb7b638, 512) = 512
lxattr: fstat (3, 0xffffffffbeb7b558) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d96000
lxattr: mmap2 (0x0, 123448, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3,
0) = 0xffffffffb6d77000
lxattr: mprotect (0xffffffffb6d8b000, 28672, PROT_NONE) = 0
lxattr: mmap2 (0xffffffffb6d92000, 8192, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 77824) = 0xffffffffb6d92000
lxattr: mmap2 (0xffffffffb6d94000, 4664, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffffffffb6d94000
lxattr: close (3) = 0
lxattr: mmap2 (0x0, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xffffffffb6d76000
lxattr: mprotect (0xffffffffb6f04000, 8192, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6d92000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f7d000, 4096, PROT_READ) = 0
lxattr: mprotect (0xffffffffb6f8c000, 4096, PROT_READ) = 0
lxattr: mprotect (0x4217e000, 4096, PROT_READ) = 0
lxattr: munmap (0xffffffffb6f8e000, 82131) = 0
lxattr: set_tid_address (0xffffffffb6d76068) = 31217
lxattr: rt_sigaction (0x20, {0xb6d7c1e4, SA_SIGINFO|SA_RESTORER, 0xb6ded370,
[EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigaction (0x21, {0xb6d7c08c, SA_RESTART|SA_SIGINFO|SA_RESTORER,
0xb6ded370, [EMPTY]}, 0x0, 8) = 0
lxattr: rt_sigprocmask (SIG_UNBLOCK, [EMPTY], 0x0, 8) = 0
lxattr: getrlimit (RLIMIT_STACK, 0xffffffffbeb7be9c) = 0
lxattr: creat ("foobar", 0666) = 3
lxattr: close (3) = 0
*lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8,
XATTR_CREATE) = 0
*lxattr: lsetxattr ("foobar", "user.systemtap.test2",
"\xef\xbe\xad\xde\x02\x00\x00\x00\x03\x00\x00\x00\x04\x00\x00\x00\x05\x00\x00\x00",
20, XATTR_CREATE) = 0
*lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c, 1024)
= 8
*lxattr: llistxattr ("foobar", 0xffffffffbeb7ba4c, 1024) = 58
*lxattr: lremovexattr ("foobar", "user.systemtap.test") = 0
*lxattr: lsetxattr (ffffffff, "user.systemtap.test", "testing", 8,
XATTR_CREATE) = -14 (EFAULT)
*lxattr: lsetxattr ("foobar", ffffffff, "testing", 8, XATTR_CREATE) = -14
(EFAULT)
*lxattr: lsetxattr ("foobar", "user.systemtap.test", 0xffffffff, 8,
XATTR_CREATE) = -14 (EFAULT)
lxattr: lsetxattr ("foobar", "user.systemtap.test", 0x0, 18446744073709551615,
XATTR_CREATE) = -7 (E2BIG)
lxattr: lsetxattr ("foobar", "user.systemtap.test", "testing", 8,
XATTR_CREATE|XATTR_REPLACE|0xfffffffc) = -22 (EINVAL)
lxattr: lgetxattr (ffffffff, "user.systemtap.test", 0xffffffffbeb7ba4c, 1024) =
-14 (EFAULT)
lxattr: lgetxattr ("foobar", ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffffffffff, 1024) =
-61 (ENODATA)
lxattr: lgetxattr ("foobar", "user.systemtap.test", 0xffffffffbeb7ba4c,
18446744073709551615) = -61 (ENODATA)
lxattr: llistxattr (ffffffff, 0xffffffffbeb7ba4c, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0xffffffffffffffff, 1024) = -14 (EFAULT)
lxattr: llistxattr ("foobar", 0x0, 18446744073709551615) = -14 (EFAULT)
lxattr: lremovexattr (ffffffff, "user.systemtap.test") = -14 (EFAULT)
lxattr: lremovexattr ("foobar", ffffffff) = -14 (EFAULT)
lxattr: exit_group (0) = 
--------- EXPECTED and NOT MATCHED ----------
lxattr: lsetxattr \("foobar", "user.systemtap.test", 0x0, 4294967295,
XATTR_CREATE\) = [\-0-9]+
lxattr: lsetxattr \("foobar", "user.systemtap.test", "testing", 8, XATTR_[^
]+\|[x0-9a-fA-F]+\) = [\-0-9]+
lxattr: lgetxattr \([f]+, "user.systemtap.test", [x0-9a-fA-F]+, 1024\) =
[\-0-9]+
lxattr: lgetxattr \("foobar", [f]+, [x0-9a-fA-F]+, 1024\) = [\-0-9]+
lxattr: lgetxattr \("foobar", "user.systemtap.test", 0x[f]+, 1024\) = [\-0-9]+
lxattr: lgetxattr \("foobar", "user.systemtap.test", [x0-9a-fA-F]+,
4294967295\) = [\-0-9]+
lxattr: llistxattr \([f]+, [x0-9a-fA-F]+, 1024\) = [\-0-9]+
lxattr: llistxattr \("foobar", 0x[f]+, 1024\) = [\-0-9]+
lxattr: llistxattr \("foobar", 0x0+, 4294967295\) = [\-0-9]+
lxattr: lremovexattr \([f]+, "user.systemtap.test"\) = [\-0-9]+
lxattr: lremovexattr \("foobar", [f]+\) = [\-0-9]+
FAIL: 32-bit lxattr syscall

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
@ 2015-02-04 21:34 ` jistone at redhat dot com
  2015-02-06 21:00 ` dsmith at redhat dot com
                   ` (11 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: jistone at redhat dot com @ 2015-02-04 21:34 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

Josh Stone <jistone at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |jistone at redhat dot com

--- Comment #1 from Josh Stone <jistone at redhat dot com> ---
I believe these are just facing the symptoms of syscall wrappers, where every
argument is a simple C long, and an inlined syscall function has the proper
types.  So the outer function we probe for .call/return doesn't know signs.

This would be the ongoing work for bug 16716.  For a size_t argument, it should
probably be wrapped __ulong(), as syscall.read does for its $count argument.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
  2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
@ 2015-02-06 21:00 ` dsmith at redhat dot com
  2015-02-06 22:40 ` wcohen at redhat dot com
                   ` (10 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-06 21:00 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

David Smith <dsmith at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |dsmith at redhat dot com

--- Comment #2 from David Smith <dsmith at redhat dot com> ---
Commit 238e940 fixes all syscall tapset/testsuite problems I found running on
3.18.3-201.fc21.i686+PAE. This should fix most (if not all) of the 32-bit arm
failures.

Will, you will need to retest with this patch on arm hardware and see if there
are any remaining failures.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
  2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
  2015-02-06 21:00 ` dsmith at redhat dot com
@ 2015-02-06 22:40 ` wcohen at redhat dot com
  2015-02-06 22:44 ` wcohen at redhat dot com
                   ` (9 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-06 22:40 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #3 from William Cohen <wcohen at redhat dot com> ---
The changes helped quite a bit.  Before the patches:

testcase ./systemtap.syscall/syscall.exp completed in 211 seconds

        === systemtap Summary ===

# of expected passes        85
# of unexpected failures    28
# of untested testcases        2
# of unsupported tests        4


After the patches the test results are significantly improved:

testcase ./systemtap.syscall/syscall.exp completed in 217 seconds

        === systemtap Summary ===

# of expected passes        101
# of unexpected failures    13
# of untested testcases        1
# of unsupported tests        6
runtest completed at Fri Feb  6 16:23:55 2015

Comparing the systemtap.sum files there all the no new failures. The following
tests remain as failure:

FAIL: 32-bit alarm syscall (can't set timer to time in past) 
FAIL: 32-bit chmod syscall (chmod arg2 of -1 get odd 01777777777777777777777)
FAIL: 32-bit dup syscall  (not getting correct args for dup3)
FAIL: 32-bit fadvise64 syscall (test crashs on first fadvise64)
FAIL: 32-bit keyctl syscall (returns -EACCES for keyctl syscall)
FAIL: 32-bit mmap syscall (mlock arg2 != 4096)
FAIL: 32-bit poll syscall (epoll_wait not mapped to epoll_pwait)
FAIL: 32-bit recv syscall (doesn't match one recv)
FAIL: 32-bit recvfrom syscall (recvfrom mishandle 32-bit arg (-1))
FAIL: 32-bit send syscall (looks similar to recv syscall for send)
FAIL: 32-bit sendmsg syscall(looks similar to recv syscall for sendmsg)
FAIL: 32-bit shmat syscall (returning -EINVAL for several shmat/
FAIL: 32-bit uid syscall (gets wrong value for setuid)

Will attach the systemtap.log in a moment for details.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (2 preceding siblings ...)
  2015-02-06 22:40 ` wcohen at redhat dot com
@ 2015-02-06 22:44 ` wcohen at redhat dot com
  2015-02-07  6:37 ` wcohen at redhat dot com
                   ` (8 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-06 22:44 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #4 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8105
  --> https://sourceware.org/bugzilla/attachment.cgi?id=8105&action=edit
output showing remaining arm-32 test failure.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (3 preceding siblings ...)
  2015-02-06 22:44 ` wcohen at redhat dot com
@ 2015-02-07  6:37 ` wcohen at redhat dot com
  2015-02-07 22:24 ` wcohen at redhat dot com
                   ` (7 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-07  6:37 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #5 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8106
  --> https://sourceware.org/bugzilla/attachment.cgi?id=8106&action=edit
Correct the size of various chmod related syscalls

Proposed patch to fix the syscalls related to the systemtap.syscall/chmod.c
test.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (4 preceding siblings ...)
  2015-02-07  6:37 ` wcohen at redhat dot com
@ 2015-02-07 22:24 ` wcohen at redhat dot com
  2015-02-09 15:32 ` dsmith at redhat dot com
                   ` (6 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-07 22:24 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #6 from William Cohen <wcohen at redhat dot com> ---
It appears that the debuginfo the for argument locations are not right for some
of the functions being instrumented.  The arm processor should be passing the
first four arguments in registers starting with register 0.  So for the mmap.c
example just looked at the mlock syscall that has a problem.  The r0 and r1
values look sane for mlock(r, 4096), mlock((void *)-1, 4096), and mlock(0, -1).

$ sudo ../../install/bin/stap -e 'probe syscall.mlock {printf("%s\n", $$parms);
print_regs()}' -c ./mmap 
start=0x0 len=0xffffffffbe91a4e8
 CPU: 1pc : [<c0133c3c>]    lr : [<c0020530>]
sp : e8d0bfa8  ip : 00000008  fp : be91a4d4
r10: 00000200  r9 : e8d0a000  r8 : c0020544
r7 : 00000096  r6 : 00008674  r5 : 00000000  r4 : be91a4e8
r3 : 00000001  r2 : 00000001  r1 : 00001000  r0 : b6ff1000
Flags: Nzcv  IRQs on  FIQs on  Mode SVC_32  Segment user
Control: 30C5387D
Table: 44243540  DAC: 55555555
start=0x0 len=0xffffffffbe91a4e8
 CPU: 1pc : [<c0133c3c>]    lr : [<c0020530>]
sp : e8d0bfa8  ip : 00000008  fp : be91a4d4
r10: 00000200  r9 : e8d0a000  r8 : c0020544
r7 : 00000096  r6 : 00008674  r5 : 00000000  r4 : be91a4e8
r3 : 00000001  r2 : 00000001  r1 : 00001000  r0 : ffffffff
Flags: Nzcv  IRQs on  FIQs on  Mode SVC_32  Segment user
Control: 30C5387D
Table: 44243540  DAC: 55555555
start=0x0 len=0xffffffffbe91a4e8
 CPU: 1pc : [<c0133c3c>]    lr : [<c0020530>]
sp : e8d0bfa8  ip : 00000008  fp : be91a4d4
r10: 00000200  r9 : e8d0a000  r8 : c0020544
r7 : 00000096  r6 : 00008674  r5 : 00000000  r4 : be91a4e8
r3 : 00000001  r2 : 00000010  r1 : ffffffff  r0 : 00000000
Flags: Nzcv  IRQs on  FIQs on  Mode SVC_32  Segment user
Control: 30C5387D
Table: 44243540  DAC: 55555555

It looks like gcc is generating incorrect information generated a file with the
debug information with:

eu-readelf -N --debug-dump=info
/run/media/wcohen/wasteland/wcohen/kernel/linux/vmlinux > kernel_debuginfo

Then searched for SyS_mlock.  Below it looks like referencing the wrong
registers for the parameters, r5 for start and r4 for len

 [cf86bd]    subprogram
             external             (flag_present) Yes
             name                 (strp) "SyS_mlock"
             decl_file            (data1) 1
             decl_line            (data2) 726
             prototyped           (flag_present) Yes
             type                 (ref4) [cead10]
             low_pc               (addr) 0xc0133c3c
             high_pc              (data4) 260 (0xc0133d40)
             frame_base           (exprloc) 
              [   0] call_frame_cfa
             sibling              (ref4) [cf879b]
 [cf86d8]      formal_parameter
               name                 (strp) "start"
               decl_file            (data1) 1
               decl_line            (data2) 726
               type                 (ref4) [cead10]
               location             (exprloc) 
                [   0] reg5
 [cf86e6]      formal_parameter
               name                 (string) "len"
               decl_file            (data1) 1
               decl_line            (data2) 726
               type                 (ref4) [cead10]
               location             (exprloc) 
                [   0] reg4

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (5 preceding siblings ...)
  2015-02-07 22:24 ` wcohen at redhat dot com
@ 2015-02-09 15:32 ` dsmith at redhat dot com
  2015-02-09 17:47 ` dsmith at redhat dot com
                   ` (5 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 15:32 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #7 from David Smith <dsmith at redhat dot com> ---
(In reply to William Cohen from comment #5)
> Created attachment 8106 [details]
> Correct the size of various chmod related syscalls
> 
> Proposed patch to fix the syscalls related to the systemtap.syscall/chmod.c
> test.

The patch looks fine to me, go ahead and check it in.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (6 preceding siblings ...)
  2015-02-09 15:32 ` dsmith at redhat dot com
@ 2015-02-09 17:47 ` dsmith at redhat dot com
  2015-02-09 17:55 ` dsmith at redhat dot com
                   ` (4 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 17:47 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #8 from David Smith <dsmith at redhat dot com> ---
Created attachment 8112
  --> https://sourceware.org/bugzilla/attachment.cgi?id=8112&action=edit
Proposed patch to fix several failures

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (7 preceding siblings ...)
  2015-02-09 17:47 ` dsmith at redhat dot com
@ 2015-02-09 17:55 ` dsmith at redhat dot com
  2015-02-09 21:27 ` wcohen at redhat dot com
                   ` (3 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 17:55 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #9 from David Smith <dsmith at redhat dot com> ---
(In reply to William Cohen from comment #3)
> The changes helped quite a bit.  Before the patches:
> 
> testcase ./systemtap.syscall/syscall.exp completed in 211 seconds
> 
> 		=== systemtap Summary ===
> 
> # of expected passes		85
> # of unexpected failures	28
> # of untested testcases		2
> # of unsupported tests		4
> 
> 
> After the patches the test results are significantly improved:
> 
> testcase ./systemtap.syscall/syscall.exp completed in 217 seconds
> 
> 		=== systemtap Summary ===
> 
> # of expected passes		101
> # of unexpected failures	13
> # of untested testcases		1
> # of unsupported tests		6
> runtest completed at Fri Feb  6 16:23:55 2015
> 
> Comparing the systemtap.sum files there all the no new failures. The
> following tests remain as failure:
> 
> FAIL: 32-bit alarm syscall (can't set timer to time in past) 
> FAIL: 32-bit chmod syscall (chmod arg2 of -1 get odd 01777777777777777777777)
> FAIL: 32-bit dup syscall  (not getting correct args for dup3)
> FAIL: 32-bit fadvise64 syscall (test crashs on first fadvise64)
> FAIL: 32-bit keyctl syscall (returns -EACCES for keyctl syscall)
> FAIL: 32-bit mmap syscall (mlock arg2 != 4096)
> FAIL: 32-bit poll syscall (epoll_wait not mapped to epoll_pwait)
> FAIL: 32-bit recv syscall (doesn't match one recv)
> FAIL: 32-bit recvfrom syscall (recvfrom mishandle 32-bit arg (-1))
> FAIL: 32-bit send syscall (looks similar to recv syscall for send)
> FAIL: 32-bit sendmsg syscall(looks similar to recv syscall for sendmsg)
> FAIL: 32-bit shmat syscall (returning -EINVAL for several shmat/
> FAIL: 32-bit uid syscall (gets wrong value for setuid)
> 
> Will attach the systemtap.log in a moment for details.

I looked through systemtap.log, and have attached a patch that should fix the
following failures:

  keyctl, recv, recvfrom, send, and sendmsg

All but recvfrom are testcase tweaks. On a 32-bit kernel, MAXSTRINGLEN is only
256, which causes us problems in places.

Besides the ones getting arguments incorrectly, the fadvise64 test crash is
odd. You might try compiling and running the testcase by hand as root and see
if it crashes.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (8 preceding siblings ...)
  2015-02-09 17:55 ` dsmith at redhat dot com
@ 2015-02-09 21:27 ` wcohen at redhat dot com
  2015-02-09 21:58 ` dsmith at redhat dot com
                   ` (2 subsequent siblings)
  12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-09 21:27 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

William Cohen <wcohen at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #8112|0                           |1
        is obsolete|                            |

--- Comment #10 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8113
  --> https://sourceware.org/bugzilla/attachment.cgi?id=8113&action=edit
Revised patch that also fixes  size argument for __syscall.recv


before patch on arm-32
Running ./systemtap.syscall/syscall.exp ...
FAIL: 32-bit dup syscall
FAIL: 32-bit fadvise64 syscall
FAIL: 32-bit keyctl syscall
FAIL: 32-bit mmap syscall
FAIL: 32-bit recv syscall
FAIL: 32-bit recvfrom syscall
FAIL: 32-bit send syscall
FAIL: 32-bit sendmsg syscall
FAIL: 32-bit shmat syscall
FAIL: 32-bit uid syscall

        === systemtap Summary ===

# of expected passes        104
# of unexpected failures    10
# of untested testcases        1
# of unsupported tests        6


Afterward patch:
Running ./systemtap.syscall/syscall.exp ...
FAIL: 32-bit dup syscall
FAIL: 32-bit fadvise64 syscall
FAIL: 32-bit keyctl syscall
FAIL: 32-bit mmap syscall
FAIL: 32-bit uid syscall

        === systemtap Summary ===

# of expected passes        109
# of unexpected failures    5
# of untested testcases        1
# of unsupported tests        6

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (9 preceding siblings ...)
  2015-02-09 21:27 ` wcohen at redhat dot com
@ 2015-02-09 21:58 ` dsmith at redhat dot com
  2015-02-09 22:12 ` wcohen at redhat dot com
  2015-02-13 17:15 ` wcohen at redhat dot com
  12 siblings, 0 replies; 14+ messages in thread
From: dsmith at redhat dot com @ 2015-02-09 21:58 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #11 from David Smith <dsmith at redhat dot com> ---
(In reply to William Cohen from comment #10)
> Created attachment 8113 [details]
> Revised patch that also fixes  size argument for __syscall.recv

The patch looks fine to me. Go ahead and check it in.

Could you also attach a new systemtap.log for me to look at?

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (10 preceding siblings ...)
  2015-02-09 21:58 ` dsmith at redhat dot com
@ 2015-02-09 22:12 ` wcohen at redhat dot com
  2015-02-13 17:15 ` wcohen at redhat dot com
  12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-09 22:12 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

--- Comment #12 from William Cohen <wcohen at redhat dot com> ---
Created attachment 8114
  --> https://sourceware.org/bugzilla/attachment.cgi?id=8114&action=edit
Updated systemtap.log from 32-bit arm

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* [Bug tapsets/17928] A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value
  2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
                   ` (11 preceding siblings ...)
  2015-02-09 22:12 ` wcohen at redhat dot com
@ 2015-02-13 17:15 ` wcohen at redhat dot com
  12 siblings, 0 replies; 14+ messages in thread
From: wcohen at redhat dot com @ 2015-02-13 17:15 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17928

William Cohen <wcohen at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #13 from William Cohen <wcohen at redhat dot com> ---
Down to the following 32-bit arm failure and none seem to be unrelated to the
32-bit size of operands:

FAIL: 32-bit dup syscall getting wrong arg locations for dup3()
FAIL: 32-bit uid syscall getting wrong arg locations for setuid()
FAIL: 32-bit mmap syscall getting wrong arg locations for mlock()

FAIL: 32-bit fadvise64 syscall existing "foobar" in directory caused failure

FAIL: 32-bit shmat syscall shmat SHM_RDONLY op fail with -EINVAL

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2015-02-13 17:15 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-02-04 21:15 [Bug tapsets/17928] New: A number of the systemtap.syscall/syscall.exp tests fail on 32-bit arm because size_t sign extended to 64-bit value wcohen at redhat dot com
2015-02-04 21:34 ` [Bug tapsets/17928] " jistone at redhat dot com
2015-02-06 21:00 ` dsmith at redhat dot com
2015-02-06 22:40 ` wcohen at redhat dot com
2015-02-06 22:44 ` wcohen at redhat dot com
2015-02-07  6:37 ` wcohen at redhat dot com
2015-02-07 22:24 ` wcohen at redhat dot com
2015-02-09 15:32 ` dsmith at redhat dot com
2015-02-09 17:47 ` dsmith at redhat dot com
2015-02-09 17:55 ` dsmith at redhat dot com
2015-02-09 21:27 ` wcohen at redhat dot com
2015-02-09 21:58 ` dsmith at redhat dot com
2015-02-09 22:12 ` wcohen at redhat dot com
2015-02-13 17:15 ` wcohen at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).