Back to home page

OSCL-LXR

 
 

    


0001 #!/bin/sh
0002 # SPDX-License-Identifier: GPL-2.0
0003 # description: Kprobe event user-memory access
0004 # requires: kprobe_events '$arg<N>':README
0005 
0006 grep -A10 "fetcharg:" README | grep -q 'ustring' || exit_unsupported
0007 grep -A10 "fetcharg:" README | grep -q '\[u\]<offset>' || exit_unsupported
0008 
0009 :;: "user-memory access syntax and ustring working on user memory";:
0010 echo 'p:myevent do_sys_open path=+0($arg2):ustring path2=+u0($arg2):string' \
0011         > kprobe_events
0012 echo 'p:myevent2 do_sys_openat2 path=+0($arg2):ustring path2=+u0($arg2):string' \
0013         >> kprobe_events
0014 
0015 grep myevent kprobe_events | \
0016         grep -q 'path=+0($arg2):ustring path2=+u0($arg2):string'
0017 echo 1 > events/kprobes/myevent/enable
0018 echo 1 > events/kprobes/myevent2/enable
0019 echo > /dev/null
0020 echo 0 > events/kprobes/myevent/enable
0021 echo 0 > events/kprobes/myevent2/enable
0022 
0023 grep myevent trace | grep -q 'path="/dev/null" path2="/dev/null"'
0024 
0025 :;: "user-memory access syntax and ustring not working with kernel memory";:
0026 echo 'p:myevent vfs_symlink path=+0($arg3):ustring path2=+u0($arg3):string' \
0027         > kprobe_events
0028 echo 1 > events/kprobes/myevent/enable
0029 ln -s foo $TMPDIR/bar
0030 echo 0 > events/kprobes/myevent/enable
0031 
0032 grep myevent trace | grep -q 'path=(fault) path2=(fault)'
0033 
0034 exit 0