diff options
| author | Jovi Zhang <[email protected]> | 2012-07-18 18:16:44 +0800 |
|---|---|---|
| committer | Steven Rostedt <[email protected]> | 2013-01-21 13:22:31 -0500 |
| commit | d24d7dbf3cc49b00a152e55e24f0eeb173c7a971 (patch) | |
| tree | 9438ef9d1b6123f5d0b5f66e99a1f3774bce274f | |
| parent | d8a0349c0cea477322c66ea9362f10c62fad5f62 (diff) | |
tracing: Verify target file before registering a uprobe event
Without this patch, we can register a uprobe event for a directory.
Enabling such a uprobe event would anyway fail.
Example:
$ echo 'p /bin:0x4245c0' > /sys/kernel/debug/tracing/uprobe_events
However dirctories cannot be valid targets for uprobe.
Hence verify if the target is a regular file during the probe
registration.
Link: http://lkml.kernel.org/r/[email protected]
Cc: Namhyung Kim <[email protected]>
Signed-off-by: Jovi Zhang <[email protected]>
Acked-by: Srikar Dronamraju <[email protected]>
[ cleaned up whitespace and removed redundant IS_DIR() check ]
Signed-off-by: Steven Rostedt <[email protected]>
| -rw-r--r-- | kernel/trace/trace_uprobe.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/kernel/trace/trace_uprobe.c b/kernel/trace/trace_uprobe.c index c86e6d4f67fb..87b6db4ccbc5 100644 --- a/kernel/trace/trace_uprobe.c +++ b/kernel/trace/trace_uprobe.c @@ -258,6 +258,10 @@ static int create_trace_uprobe(int argc, char **argv) goto fail_address_parse; inode = igrab(path.dentry->d_inode); + if (!S_ISREG(inode->i_mode)) { + ret = -EINVAL; + goto fail_address_parse; + } argc -= 2; argv += 2; @@ -356,7 +360,7 @@ fail_address_parse: if (inode) iput(inode); - pr_info("Failed to parse address.\n"); + pr_info("Failed to parse address or file.\n"); return ret; } |