This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/14650] New: combine various untrusted-deref operations
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Mon, 01 Oct 2012 14:10:01 +0000
- Subject: [Bug runtime/14650] New: combine various untrusted-deref operations
- Auto-submitted: auto-generated
http://sourceware.org/bugzilla/show_bug.cgi?id=14650
Bug #: 14650
Summary: combine various untrusted-deref operations
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
AssignedTo: systemtap@sourceware.org
ReportedBy: fche@redhat.com
Classification: Unclassified
After bug #14364, #14630, there still exist several distinct paths where user-
or kernel-space untrusted pointers may be used with checks that don't pass 100%
lockdep / .debug-kernel muster. There are too many implementations of
__get_user_foobar-ish type functions in the runtime, like runtime/linux/copy.c,
stp_string.c, loc2c-runtime.h, etc. Let's standardize on the latter to the
maximum extent possible.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.