| Ananth N Mavinakayanahalli | 804defe | 2008-03-04 14:28:38 -0800 | [diff] [blame] | 1 | /* | 
|  | 2 | * NOTE: This example is works on x86 and powerpc. | 
|  | 3 | * Here's a sample kernel module showing the use of kprobes to dump a | 
|  | 4 | * stack trace and selected registers when do_fork() is called. | 
|  | 5 | * | 
|  | 6 | * For more information on theory of operation of kprobes, see | 
|  | 7 | * Documentation/kprobes.txt | 
|  | 8 | * | 
|  | 9 | * You will see the trace data in /var/log/messages and on the console | 
|  | 10 | * whenever do_fork() is invoked to create a new process. | 
|  | 11 | */ | 
|  | 12 |  | 
|  | 13 | #include <linux/kernel.h> | 
|  | 14 | #include <linux/module.h> | 
|  | 15 | #include <linux/kprobes.h> | 
|  | 16 |  | 
|  | 17 | /* For each probe you need to allocate a kprobe structure */ | 
|  | 18 | static struct kprobe kp = { | 
|  | 19 | .symbol_name	= "do_fork", | 
|  | 20 | }; | 
|  | 21 |  | 
|  | 22 | /* kprobe pre_handler: called just before the probed instruction is executed */ | 
|  | 23 | static int handler_pre(struct kprobe *p, struct pt_regs *regs) | 
|  | 24 | { | 
|  | 25 | #ifdef CONFIG_X86 | 
|  | 26 | printk(KERN_INFO "pre_handler: p->addr = 0x%p, ip = %lx," | 
|  | 27 | " flags = 0x%lx\n", | 
|  | 28 | p->addr, regs->ip, regs->flags); | 
|  | 29 | #endif | 
|  | 30 | #ifdef CONFIG_PPC | 
|  | 31 | printk(KERN_INFO "pre_handler: p->addr = 0x%p, nip = 0x%lx," | 
|  | 32 | " msr = 0x%lx\n", | 
|  | 33 | p->addr, regs->nip, regs->msr); | 
|  | 34 | #endif | 
|  | 35 |  | 
|  | 36 | /* A dump_stack() here will give a stack backtrace */ | 
|  | 37 | return 0; | 
|  | 38 | } | 
|  | 39 |  | 
|  | 40 | /* kprobe post_handler: called after the probed instruction is executed */ | 
|  | 41 | static void handler_post(struct kprobe *p, struct pt_regs *regs, | 
|  | 42 | unsigned long flags) | 
|  | 43 | { | 
|  | 44 | #ifdef CONFIG_X86 | 
|  | 45 | printk(KERN_INFO "post_handler: p->addr = 0x%p, flags = 0x%lx\n", | 
|  | 46 | p->addr, regs->flags); | 
|  | 47 | #endif | 
|  | 48 | #ifdef CONFIG_PPC | 
|  | 49 | printk(KERN_INFO "post_handler: p->addr = 0x%p, msr = 0x%lx\n", | 
|  | 50 | p->addr, regs->msr); | 
|  | 51 | #endif | 
|  | 52 | } | 
|  | 53 |  | 
|  | 54 | /* | 
|  | 55 | * fault_handler: this is called if an exception is generated for any | 
|  | 56 | * instruction within the pre- or post-handler, or when Kprobes | 
|  | 57 | * single-steps the probed instruction. | 
|  | 58 | */ | 
|  | 59 | static int handler_fault(struct kprobe *p, struct pt_regs *regs, int trapnr) | 
|  | 60 | { | 
|  | 61 | printk(KERN_INFO "fault_handler: p->addr = 0x%p, trap #%dn", | 
|  | 62 | p->addr, trapnr); | 
|  | 63 | /* Return 0 because we don't handle the fault. */ | 
|  | 64 | return 0; | 
|  | 65 | } | 
|  | 66 |  | 
|  | 67 | static int __init kprobe_init(void) | 
|  | 68 | { | 
|  | 69 | int ret; | 
|  | 70 | kp.pre_handler = handler_pre; | 
|  | 71 | kp.post_handler = handler_post; | 
|  | 72 | kp.fault_handler = handler_fault; | 
|  | 73 |  | 
|  | 74 | ret = register_kprobe(&kp); | 
|  | 75 | if (ret < 0) { | 
|  | 76 | printk(KERN_INFO "register_kprobe failed, returned %d\n", ret); | 
|  | 77 | return ret; | 
|  | 78 | } | 
|  | 79 | printk(KERN_INFO "Planted kprobe at %p\n", kp.addr); | 
|  | 80 | return 0; | 
|  | 81 | } | 
|  | 82 |  | 
|  | 83 | static void __exit kprobe_exit(void) | 
|  | 84 | { | 
|  | 85 | unregister_kprobe(&kp); | 
|  | 86 | printk(KERN_INFO "kprobe at %p unregistered\n", kp.addr); | 
|  | 87 | } | 
|  | 88 |  | 
|  | 89 | module_init(kprobe_init) | 
|  | 90 | module_exit(kprobe_exit) | 
|  | 91 | MODULE_LICENSE("GPL"); |