Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755985AbbBLMaP (ORCPT ); Thu, 12 Feb 2015 07:30:15 -0500 Received: from szxga01-in.huawei.com ([119.145.14.64]:38127 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755496AbbBLMaM (ORCPT ); Thu, 12 Feb 2015 07:30:12 -0500 From: Wang Nan To: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , CC: , , , Subject: [RFC PATCH v2 26/26] kprobes: enable 'ekprobe=' cmdline option for early kprobes. Date: Thu, 12 Feb 2015 20:21:35 +0800 Message-ID: <1423743695-13173-1-git-send-email-wangnan0@huawei.com> X-Mailer: git-send-email 1.8.4 In-Reply-To: <1423743476-11927-1-git-send-email-wangnan0@huawei.com> References: <1423743476-11927-1-git-send-email-wangnan0@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.107.197.247] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2714 Lines: 101 This patch shows the basic idea of usage of early kprobes. By adding kernel cmdline options such as 'ekprobe=__alloc_pages_nodemask' or 'ekprobe=0xc00f3c2c', early kprobes are installed. When the probed instructions get hit, a message is printed. Signed-off-by: Wang Nan --- kernel/kprobes.c | 71 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 71 insertions(+) diff --git a/kernel/kprobes.c b/kernel/kprobes.c index c9cd46f..79c815b 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -2816,7 +2816,78 @@ convert_early_kprobes(void) free_aggr_kprobe(&op->kp); } }; + +static int early_kprobe_pre_handler(struct kprobe *p, struct pt_regs *regs) +{ + const char *sym = NULL; + char *modname, namebuf[KSYM_NAME_LEN]; + unsigned long offset = 0; + + sym = kallsyms_lookup((unsigned long)p->addr, NULL, + &offset, &modname, namebuf); + if (sym) + pr_info("Hit early kprobe at %s+0x%lx%s%s\n", + sym, offset, + (modname ? " " : ""), + (modname ? modname : "")); + else + pr_info("Hit early kprobe at %p\n", p->addr); + return 0; +} + +DEFINE_EKPROBE_ALLOC_OPS(struct kprobe, early_kprobe_setup, static); +static int __init early_kprobe_setup(char *p) +{ + unsigned long long addr; + struct kprobe *kp; + int len = strlen(p); + int err; + + if (len <= 0) { + pr_err("early kprobe: wrong param: %s\n", p); + return 0; + } + + if ((p[0] == '0') && (p[1] == 'x')) { + err = kstrtoull(p, 16, &addr); + if (err) { + pr_err("early kprobe: wrong address: %p\n", p); + return 0; + } + } else { + addr = kallsyms_lookup_name(p); + if (!addr) { + pr_err("early kprobe: wrong symbol: %s\n", p); + return 0; + } + } + + if ((addr < (unsigned long)_text) || + (addr >= (unsigned long)_etext)) + pr_err("early kprobe: address of %p out of range\n", p); + + kp = ek_alloc_early_kprobe_setup(); + if (kp == NULL) { + pr_err("early kprobe: no enough early kprobe slot\n"); + return 0; + } + kp->addr = (void *)(unsigned long)(addr); + kp->pre_handler = early_kprobe_pre_handler; + err = register_kprobe(kp); + if (err) { + pr_err("early kprobe: register early kprobe %s failed\n", p); + ek_free_early_kprobe_setup(kp); + } + return 0; +} #else static int register_early_kprobe(struct kprobe *p) { return -ENOSYS; } static void convert_early_kprobes(void) {}; + +static int __init early_kprobe_setup(char *p) +{ + return 0; +} #endif + +early_param("ekprobe", early_kprobe_setup); -- 1.8.4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/