Mark Wielaard [Thu, 4 Aug 2011 10:24:35 +0000 (12:24 +0200)]
Use $dfd not $mode in testsuite/transok/tval-opt.stp.
Kernel commit 47c805 "switch do_filp_open() to struct open_flags"
changed the arguments of do_filp_open. Use another int argument
that hasn't changed in testcase.
Mark Wielaard [Wed, 3 Aug 2011 22:26:49 +0000 (00:26 +0200)]
Check whether syscalls2.stp sigprocmask argument is set or nset.
kernel commit b013c3 "signal: cleanup sys_sigprocmask()" renamed the set
parameter to nset. commit bb7efe "signal: cleanup sys_rt_sigprocmask()"
did the same. Check with @defined($set) to see if we want the old or
new definition.
Mark Wielaard [Wed, 3 Aug 2011 17:30:37 +0000 (19:30 +0200)]
testsuite warn_overflow be more precise and a bit more lenient.
log exactly once for syscall probe hit and counter i == 256.
But do allow more than 3 overflow warning messages to occur
in case stap miraculously recovers and overflows immediately
afterwards.
Mark Wielaard [Wed, 3 Aug 2011 09:17:00 +0000 (11:17 +0200)]
common_probe_context.h: Put Individual Probe State (ips) into a union.
Various probe handlers have dedicated fields in the common probe context
struct. Since the handlers cannot be active at the same time (on the same
cpu) these can just be put into a union to save space. In runtime code
when there might be ambiguity about which probe handler is running, the
CONTEXT->probe_type field can be used to check which field has actual
life data.
Mark Wielaard [Tue, 2 Aug 2011 14:42:38 +0000 (16:42 +0200)]
Add probe_type to common probe context.
This exposes the type of probe handler for use in runtime functions,
so they can better anticipate which common probe context is valid at
runtime. Also introduces a new context tapset function probe_type()
that exposes a (informational) probe handler string to scripts. Mainly
useful for debugging, when the user wants to find out which kind of
low level probe handler a high-level probe translates to for a particular
kernel/systemtap version.
Josh Stone [Mon, 1 Aug 2011 18:58:36 +0000 (11:58 -0700)]
PR12135: Prefer subclass members if they mask the superclass
* dwflpp.cxx (dwflpp::find_struct_member): Use a breadth-first search
through inheritance trees, so masked members will be pulled from the
subclass rather than the superclass.
* testsuite/systemtap.base/inherit.*: New test for inheritance games.
Mark Wielaard [Mon, 1 Aug 2011 14:00:05 +0000 (16:00 +0200)]
Probe context data field is only used for procfs. Rename to procfs_data.
itrace and mark probes would also scribble (useless) data into this
context field, without ever using it, for no apparent reason, except
that they had "data" around. Renamed the field to procfs_data to make
clear it has a specific purpose.
Also add documentation for remaining undocumented common_probe_context fields.
Mark Wielaard [Mon, 1 Aug 2011 10:39:36 +0000 (12:39 +0200)]
Only add probe_name to the common probe context when really needed.
Guard probe_name with STP_NEED_PROBE_NAME. It is only needed when we include
the pn() tapset function. All this needed was moving the STP_NEED_PROBE_NAME
define from the tapset function to a top-level embedded C block (which are
included early, unlike the tapset functions themselves).
Also document common_probe_context.h busy, probe_point and probe_name fields.
Mark Wielaard [Fri, 29 Jul 2011 11:35:06 +0000 (13:35 +0200)]
Put common probe and session context state definitions in their own files.
translate.cxx contained code to produce the common probe and session
context state as C code snippets. Large parts were not dependent on the
session state at all, so they really were just static blobs of C code
wrapped in c++ io stream operators. These have been put in their own
C runtime header files (common_session_state.h, common_probe_context.h
and runtime_defines.h) to make it easier to edit and document.
Mark Wielaard [Thu, 28 Jul 2011 16:10:20 +0000 (18:10 +0200)]
Guard regparm in probe context with STAP_NEED_REGPARM.
regparm is only used on i386 (and x86_64 when probing 32bit) for
signaling what the parameter packing is for the probed function
as set in register.stp. So only include it in the probe context
struct when actually used in a stap script.
Also updated docs and fixed signature on other arches.
Mark Wielaard [Thu, 28 Jul 2011 12:02:09 +0000 (14:02 +0200)]
PR13037 Make lock blacklist more specific.
The dwflpp::build_blacklist() would also match things like _nolock,
block or clock. Be more specific that we want to only match things
like _lock, _unlock, _trylock or seq[un]lock.
David Smith [Wed, 27 Jul 2011 17:32:50 +0000 (12:32 -0500)]
Two task_finder cleanups.
* runtime/task_finder.c: Two cleanup fixes. Merged 2 different state
variables into 1. Reversed utrace compatibility fix. Instead of
making new utrace look like old utrace, made old utrace look like new
utrace (i.e. use 'utrace_engine' instead of 'utrace_attached_engine').
* runtime/utrace_compatibility.h: Reversed utrace compatibility fix (use
'utrace_engine' instead of 'utrace_attached_engine').
Mark Wielaard [Tue, 26 Jul 2011 21:31:01 +0000 (23:31 +0200)]
Allow gcc to optimize away uprobe_get_pc() calls in some situations.
If a call is made to the stack-x86.c __stp_stack_print() it might
try to call uprobe_get_pc(). If this is just a kernel backtrace
then uprobes might not be loaded. Add a hint by explicitly clearing
the struct uretprobe_instance *ri variable in that cass in the
calling function _stp_stack_print() in stack.c, so that gcc
optimizes away the uprobe_get_pc() call, so that the symbol isn't
in the module anymore.
Would cause issues like:
WARNING: "uprobe_get_pc" [stap_d46895_3786.ko] undefined!
Error inserting module 'stap_d46895_3786.ko': Unknown symbol in module
Josh Stone [Tue, 26 Jul 2011 19:25:34 +0000 (12:25 -0700)]
PR12895: Use NOSTDINC_FLAGS in kernel stapconf checks
We should never be looking in /usr/include/ for headers when building
for the kernel. This particularly bit us in a case where RHEL6 gained
blk_types.h in newer kernels. So if the system had kernel-headers.rpm
with this new header in /usr/include/, but was still running an older
kernel that lacked it in /lib/modules/`uname -r`/build/, then we'd
misidentify that header's availability in stapconf.
* buildrun.cxx (compile_pass): Add NOSTDINC_FLAGS to CHECK_BUILD.
Mark Wielaard [Tue, 26 Jul 2011 13:10:30 +0000 (15:10 +0200)]
Push all stack logic into stack.c. tapset functions just pass flags.
Some of the logic determining what to print, which register sets to use
and whether the context was valid was repeated multiple times in the
[u]context-unwind.stp functions. Just do all the logic in one place
(_stp_print_stack) and make the tapset functions just push the context
and symbols/stack flags.
Josh Stone [Mon, 25 Jul 2011 15:48:31 +0000 (11:48 -0400)]
CVE-2011-2503: read instead of mmap to load modules
As staprun is preparing to load a kernel module, we first mmap the whole
module as MAP_PRIVATE. Then we proceed with our security checks,
including a trusted-signature validation on the mapped region, and if
all checks out, we'll call init_module() with that same mapped region.
However, MMAP(2) says of MAP_PRIVATE, "It is unspecified whether changes
made to the file after the mmap() call are visible in the mapped
region." From my testing, it appears that file changes do indeed show
up in our mapped memory. This means we have a TOCTOU race between
verifying the signature of that memory and then calling init_module().
By using read() instead of mmap(), we ensure that we have a fully
private copy of the module to verify and load, without fear of change.
Josh Stone [Mon, 25 Jul 2011 13:54:28 +0000 (09:54 -0400)]
CVE-2011-2502: Don't allow path-based auth for uprobes
For users that are only members of stapusr, and not stapdev, we only
allow loading modules that are either signed with a trusted certificate
or located in controlled paths. For the script itself, that path is
/lib/modules/.../systemtap/, and for uprobes it is the runtime. When
this policy was first written, uprobes only ever came from the runtime
path, so the path check just returned 1 always.
Later, commit 474d17ad added an optional argument to staprun -u, to
allow the user to specify their own signed copy of uprobes to load.
Unfortunately, if presented with an unsigned module, that would still
fall back to the path check, which blissfully approved it anyway.
Our policy is now that stapusr can only load a signed uprobes.ko, so the
path check for uprobes now unconditionally returns 0.
Mark Wielaard [Mon, 25 Jul 2011 12:38:11 +0000 (14:38 +0200)]
Remove task_backtrace tapset function support.
Deprecated with 1.6. Now removed.
Although useful in some circumstance the current support for it was really
ugly (you had to provide a pointer to a task struct, which couldn't be
sanity checked at all) and it made the current unwind code really ugly
since this task struct had to be carried around. It made creating more
accurate backtraces harder because we would have had to make a distinction
between "reliable" and "unreliable" unwind info.
When invoking stap_run2 with multiple optional stap arguments, the
extra arguments are captured in the tcl list $args. When stap_run2
calls down to stap_run3 to do the real work, it gets packaged as a
single quoted string instead of the original list of options.
We need to unpack this list to pass it on, e.g. via tcl eval.
This impacts test cases that pass multiple parameters, such as
memory1.exp, const_value.exp, process_by_cmd.exp.
Mark Wielaard [Fri, 22 Jul 2011 11:09:35 +0000 (13:09 +0200)]
Introduce /* pragma:unwind */
By marking all tapset functions that really need the unwinder with
/* pragma:unwind */ we can make sure to only compile in unwind.c
when it is really needed.
Mark Wielaard [Fri, 22 Jul 2011 09:51:41 +0000 (11:51 +0200)]
Remove stack-x64x.c specific fallback for _stp_stack_print_fallback().
If the standard kernel based _stp_stack_print_fallback() isn't available
don't try to be smart and guess at stack addresses ourselves. Just give
up. Dwarf based unwinding is good enough now and the kernel dump_stack()
does a much better job than we can at guessing stack values.
Dave Brolley [Thu, 21 Jul 2011 21:34:14 +0000 (17:34 -0400)]
Don't allow the compile server client to honour -I/
- Found by server_args.exp fuzzing tests
- Would require special case code to handle but is a bad bad idea anyway
so don't allow it.
- Update test suite with the offending test case and some similar ones.
Mark Wielaard [Thu, 21 Jul 2011 14:51:48 +0000 (16:51 +0200)]
Remove STP_USE_FRAME_POINTER support and merge i386/x86_64 into stack-x86.c
The only real difference between stack-i386.c and stack-x86_64 was that
the former supported a buggy frame pointer based unwind. Which we never
used and for which the kernel has a better fallback (dump_trace).
William Cohen [Thu, 21 Jul 2011 19:09:07 +0000 (15:09 -0400)]
Add basic functionality for ARM architecture support of nd_syscall.*
The no dwarf syscalls tapset needs some code to access the syscall parameters.
This is a first pass to add the support for the ARM architecture. This
basic support only handles the first 4 arguments on ARM. Argument 5 and
later are on the stack and are not handled.
David Smith [Thu, 21 Jul 2011 16:41:44 +0000 (11:41 -0500)]
Added notes that the STP_OOB_DATA prefixes shouldn't be translated.
* runtime/transport/control.c (_stp_ctl_alloc_special_buffers): Added a
note that the STP_OOB_DATA prefixes ("WARNING:" and "ERROR:") shouldn't
be translated.
(_stp_ctl_get_buffer): Ditto.
William Cohen [Thu, 21 Jul 2011 14:29:00 +0000 (10:29 -0400)]
Make loc2c-runtime.h treat ARM architecture as a 32-bit architecture
The arm is a 32-bit architecture it should be doing the kread()
and kwrite operations in the same manner as other 32-bit architecture
such as the i386.
David Smith [Thu, 21 Jul 2011 13:34:30 +0000 (08:34 -0500)]
Avoid "unknown type" errors on unused parameters.
* tapset/arm/aux_syscalls.stp: Help the translator out by specifying
types on '_ptrace_return_arch_prctl_addr' unused parameters.
* tapset/i386/aux_syscalls.stp: Ditto.
* tapset/ia64/aux_syscalls.stp: Ditto.
* tapset/powerpc/aux_syscalls.stp: Ditto.
On machines that enjoy a sacred zen-like quality of
doing nothing but run systemtap tests, the memory1 test
case can wait, wait, wait, and wait yet more. Nae, it
can wait indefinitely, until some other Godot thread
comes and runs a syscall.open. No syscall.open - no
script exit().
Fix this in two separate ways. First, let the script itself time out.
Second, run the script with a meaningful, profound workload consisting
of "/bin/sh </dev/null", which while pondering the nothingness of it
all, does run at least one open(2).
* testsuite/lib/systemtap.exp (start_server): Locate
stap based on $SYSTEMTAP_PATH; plop in $installed_stap.
(setup_server): Use that location rather than which(1).
Josh Stone [Wed, 20 Jul 2011 22:39:57 +0000 (15:39 -0700)]
Normalize the arch in systemtap_session::clone
* session.cxx (systemtap_session::clone): Normalize the incoming arch
name, so it can be consistently compared to both this->architecture
and other cloned subsessions.
David Smith [Wed, 20 Jul 2011 21:32:30 +0000 (16:32 -0500)]
Improved prcwildcard.exp and cmd_parse.exp tests.
* testsuite/systemtap.base/prcwildcard.exp: If we're testing a stripped
stap, don't bother running the function test, which needs debuginfo.
* testsuite/systemtap.base/cmd_parse.exp: Increase timeout.
* testsuite/lib/systemtap.exp (stripped_p): New function to
determine if an executable is stripped.