2 # SPDX-License-Identifier: GPL-2.0
3 # description: Kprobe event user-memory access
4 # requires: kprobe_events '$arg<N>':README
6 grep -A10 "fetcharg:" README |
grep -q 'ustring' || exit_unsupported
7 grep -A10 "fetcharg:" README |
grep -q '\[u\]<offset>' || exit_unsupported
9 :;: "user-memory access syntax and ustring working on user memory";:
10 echo 'p:myevent do_sys_open path=+0($arg2):ustring path2=+u0($arg2):string' \
12 echo 'p:myevent2 do_sys_openat2 path=+0($arg2):ustring path2=+u0($arg2):string' \
15 grep myevent kprobe_events | \
16 grep -q 'path=+0($arg2):ustring path2=+u0($arg2):string'
17 echo 1 > events
/kprobes
/myevent
/enable
18 echo 1 > events
/kprobes
/myevent
2/enable
20 echo 0 > events
/kprobes
/myevent
/enable
21 echo 0 > events
/kprobes
/myevent
2/enable
23 grep myevent trace |
grep -q 'path="/dev/null" path2="/dev/null"'
25 :;: "user-memory access syntax and ustring not working with kernel memory";:
26 echo 'p:myevent vfs_symlink path=+0($arg3):ustring path2=+u0($arg3):string' \
28 echo 1 > events
/kprobes
/myevent
/enable
30 echo 0 > events
/kprobes
/myevent
/enable
32 grep myevent trace |
grep -q 'path=(fault) path2=(fault)'