public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* FW: [Bug translator/901] static validator
@ 2006-02-28  2:40 Stone, Joshua I
  0 siblings, 0 replies; only message in thread
From: Stone, Joshua I @ 2006-02-28  2:40 UTC (permalink / raw)
  To: SystemTap

I've checked in a static validator for SystemTap modules, and I would
like to get feedback on it.  You can find it in 'src/safety/safety.py'.
It checks modules for legal external references, and parses the
disassembly for legal opcodes.

For the allowed references file, I simply compiled all of the sample and
buildok scripts I could find and added all of their references to the
allowed list.  I did only minimal verification on this, so it could very
well need some pruning.

For allowed opcodes, I've compiled the list for i686 and x86_64.  I
believe everything is covered & allowable in there, but it's of course
open for review.  The only surprise to me was 'movaps', but that
instruction is actually very common within the kernel.

I welcome comments and suggestions for improvement...

Thanks,

Josh


joshua dot i dot stone at intel dot com wrote:
> ------- Additional Comments From joshua dot i dot stone at intel dot
> com  2006-02-28 02:29 -------
> A static safety checker has been committed to CVS.  It checks for 
> whitelisted opcodes and external references, with initial support
> for i686 and x86_64. Adding other platforms is mostly a matter of
> defining the allowed opcodes... 

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2006-02-28  2:40 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-02-28  2:40 FW: [Bug translator/901] static validator Stone, Joshua I

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).