[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220820014035.531145719@goodmis.org>
Date: Fri, 19 Aug 2022 21:40:35 -0400
From: Steven Rostedt <rostedt@...dmis.org>
To: linux-kernel@...r.kernel.org
Cc: Ingo Molnar <mingo@...nel.org>,
Andrew Morton <akpm@...ux-foundation.org>,
Masami Hiramatsu <mhiramat@...nel.org>,
Tzvetomir Stoyanov <tz.stoyanov@...il.com>,
Tom Zanussi <zanussi@...nel.org>
Subject: [PATCH 0/4] tracing/eprobes: Fixes for unexpected arguments
While using eprobes, I decided to entertain the thougth of what would
happen if I tried to get the instruction pointer "%rip", knowing full
well that eprobes do not have access to pt_regs. Well, I found out, and
it led me down a rabbit hole of bugs.
This series fixes those bugs, by not allowing register access for eprobes,
and also filling the holes of @symbol and @immediate argument.
Steven Rostedt (Google) (4):
tracing/eprobes: Do not allow eprobes to use $stack, or % for regs
tracing/eprobes: Do not hardcode $comm as a string
tracing/eprobes: Fix reading of string fields
tracing/eprobes: Have event probes be consistent with kprobes and uprobes
----
kernel/trace/trace_eprobe.c | 88 +++++++++++++++++++++++++++++++++++++++++----
kernel/trace/trace_probe.c | 26 ++++++++------
2 files changed, 98 insertions(+), 16 deletions(-)
Powered by blists - more mailing lists