This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/22392] New: bpf translator: segfault possible when performing operation on result of void function call.
- From: "amerey at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Fri, 03 Nov 2017 19:27:35 +0000
- Subject: [Bug translator/22392] New: bpf translator: segfault possible when performing operation on result of void function call.
- Auto-submitted: auto-generated
https://sourceware.org/bugzilla/show_bug.cgi?id=22392
Bug ID: 22392
Summary: bpf translator: segfault possible when performing
operation on result of void function call.
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: translator
Assignee: systemtap at sourceware dot org
Reporter: amerey at redhat dot com
Target Milestone: ---
example:
stap --runtime=bpf -u -e 'probe kernel.function("sys_read") { x =
printf("test\n") }'
When translating the assignment, the bpf translator attempts to dereference a
NULL value. We want to perform checks similar to the default translator which
instead raises a "void value not ignored as it ought to be" error when
translating the example script.
--
You are receiving this mail because:
You are the assignee for the bug.