kprobe_example.c 2.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. /*
  2. * NOTE: This example is works on x86 and powerpc.
  3. * Here's a sample kernel module showing the use of kprobes to dump a
  4. * stack trace and selected registers when do_fork() is called.
  5. *
  6. * For more information on theory of operation of kprobes, see
  7. * Documentation/kprobes.txt
  8. *
  9. * You will see the trace data in /var/log/messages and on the console
  10. * whenever do_fork() is invoked to create a new process.
  11. */
  12. #include <linux/kernel.h>
  13. #include <linux/module.h>
  14. #include <linux/kprobes.h>
  15. /* For each probe you need to allocate a kprobe structure */
  16. static struct kprobe kp = {
  17. .symbol_name = "do_fork",
  18. };
  19. /* kprobe pre_handler: called just before the probed instruction is executed */
  20. static int handler_pre(struct kprobe *p, struct pt_regs *regs)
  21. {
  22. #ifdef CONFIG_X86
  23. printk(KERN_INFO "pre_handler: p->addr = 0x%p, ip = %lx,"
  24. " flags = 0x%lx\n",
  25. p->addr, regs->ip, regs->flags);
  26. #endif
  27. #ifdef CONFIG_PPC
  28. printk(KERN_INFO "pre_handler: p->addr = 0x%p, nip = 0x%lx,"
  29. " msr = 0x%lx\n",
  30. p->addr, regs->nip, regs->msr);
  31. #endif
  32. /* A dump_stack() here will give a stack backtrace */
  33. return 0;
  34. }
  35. /* kprobe post_handler: called after the probed instruction is executed */
  36. static void handler_post(struct kprobe *p, struct pt_regs *regs,
  37. unsigned long flags)
  38. {
  39. #ifdef CONFIG_X86
  40. printk(KERN_INFO "post_handler: p->addr = 0x%p, flags = 0x%lx\n",
  41. p->addr, regs->flags);
  42. #endif
  43. #ifdef CONFIG_PPC
  44. printk(KERN_INFO "post_handler: p->addr = 0x%p, msr = 0x%lx\n",
  45. p->addr, regs->msr);
  46. #endif
  47. }
  48. /*
  49. * fault_handler: this is called if an exception is generated for any
  50. * instruction within the pre- or post-handler, or when Kprobes
  51. * single-steps the probed instruction.
  52. */
  53. static int handler_fault(struct kprobe *p, struct pt_regs *regs, int trapnr)
  54. {
  55. printk(KERN_INFO "fault_handler: p->addr = 0x%p, trap #%dn",
  56. p->addr, trapnr);
  57. /* Return 0 because we don't handle the fault. */
  58. return 0;
  59. }
  60. static int __init kprobe_init(void)
  61. {
  62. int ret;
  63. kp.pre_handler = handler_pre;
  64. kp.post_handler = handler_post;
  65. kp.fault_handler = handler_fault;
  66. ret = register_kprobe(&kp);
  67. if (ret < 0) {
  68. printk(KERN_INFO "register_kprobe failed, returned %d\n", ret);
  69. return ret;
  70. }
  71. printk(KERN_INFO "Planted kprobe at %p\n", kp.addr);
  72. return 0;
  73. }
  74. static void __exit kprobe_exit(void)
  75. {
  76. unregister_kprobe(&kp);
  77. printk(KERN_INFO "kprobe at %p unregistered\n", kp.addr);
  78. }
  79. module_init(kprobe_init)
  80. module_exit(kprobe_exit)
  81. MODULE_LICENSE("GPL");