Blame SOURCES/rhbz1643997.0028-testcase-for-PR23875.patch

e4e640
From c3023bef537648b282f266878ea8de7a350b3a45 Mon Sep 17 00:00:00 2001
e4e640
From: Serhei Makarov <smakarov@redhat.com>
e4e640
Date: Fri, 9 Nov 2018 16:42:21 -0500
e4e640
Subject: [PATCH 28/32] testcase for PR23875
e4e640
e4e640
This triggers a 'stack smashing' error in the userspace interpreter.
e4e640
e4e640
* testsuite/systemtap.bpf/bpf_tests/pr23875.stp: New testcase.
e4e640
---
e4e640
 testsuite/systemtap.bpf/bpf_tests/pr23875.stp | 18 ++++++++++++++++++
e4e640
 1 file changed, 18 insertions(+)
e4e640
 create mode 100644 testsuite/systemtap.bpf/bpf_tests/pr23875.stp
e4e640
e4e640
diff --git a/testsuite/systemtap.bpf/bpf_tests/pr23875.stp b/testsuite/systemtap.bpf/bpf_tests/pr23875.stp
e4e640
new file mode 100644
e4e640
index 000000000..a31f1d087
e4e640
--- /dev/null
e4e640
+++ b/testsuite/systemtap.bpf/bpf_tests/pr23875.stp
e4e640
@@ -0,0 +1,18 @@
e4e640
+global t
e4e640
+
e4e640
+probe begin {
e4e640
+  printf("BEGIN\n")
e4e640
+}
e4e640
+
e4e640
+probe kernel.function("vfs_read") {
e4e640
+  t["key"] = 6
e4e640
+  exit()
e4e640
+}
e4e640
+
e4e640
+probe end {
e4e640
+  c = 0
e4e640
+  foreach (k in t)
e4e640
+    c++
e4e640
+  printf("%d\n", c)
e4e640
+  printf("END PASS\n")
e4e640
+}
e4e640
-- 
e4e640
2.14.5
e4e640