This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/14650] New: combine various untrusted-deref operations


http://sourceware.org/bugzilla/show_bug.cgi?id=14650

             Bug #: 14650
           Summary: combine various untrusted-deref operations
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
        AssignedTo: systemtap@sourceware.org
        ReportedBy: fche@redhat.com
    Classification: Unclassified


After bug #14364, #14630, there still exist several distinct paths where user-
or kernel-space untrusted pointers may be used with checks that don't pass 100%
lockdep / .debug-kernel muster.  There are too many implementations of
__get_user_foobar-ish type functions in the runtime, like runtime/linux/copy.c,
stp_string.c, loc2c-runtime.h, etc.  Let's standardize on the latter to the
maximum extent possible.

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]