[PATCH 0/4] tracing/eprobes: Fixes for unexpected arguments

From: Steven Rostedt
Date: Fri Aug 19 2022 - 21:48:34 EST



While using eprobes, I decided to entertain the thougth of what would
happen if I tried to get the instruction pointer "%rip", knowing full
well that eprobes do not have access to pt_regs. Well, I found out, and
it led me down a rabbit hole of bugs.

This series fixes those bugs, by not allowing register access for eprobes,
and also filling the holes of @symbol and @immediate argument.


Steven Rostedt (Google) (4):
tracing/eprobes: Do not allow eprobes to use $stack, or % for regs
tracing/eprobes: Do not hardcode $comm as a string
tracing/eprobes: Fix reading of string fields
tracing/eprobes: Have event probes be consistent with kprobes and uprobes

----
kernel/trace/trace_eprobe.c | 88 +++++++++++++++++++++++++++++++++++++++++----
kernel/trace/trace_probe.c | 26 ++++++++------
2 files changed, 98 insertions(+), 16 deletions(-)