-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Here is a modified version of kprobes patch fixing some issues reported by Greg.

Greg KH ha scritto:
>>+{
>>+     try_module_get(THIS_MODULE);
> 
> 
> Check the return value of this call?
I removed try_module_get() and module_put() because of Stephen Hemminger's mail:
"The module ref counting should be done by the VFS layer not the interface."
Thank you for this hint :)

>>+     if(!(kprobes_dir = debugfs_create_dir("kprobes", NULL)))
>>+             return -ENODEV;
>>+     if(!(kprobes_list = debugfs_create_file("list", S_IRUGO, kprobes_dir,
>>+                                             NULL, &kprobes_fops))) {
>>+             debugfs_remove(kprobes_dir);
>>+             return -ENODEV;
>>+     }
> 
> 
> You never delete this file or directory on module unload, do you?
kprobes are a built-in feature, I think there's no way to handle this.
Please, tell me if I am wrong.



- --- ./kernel/kprobes.c        2005-01-17 17:56:11.000000000 +0100
+++ ./kernel/kprobes.c  2005-01-17 17:46:04.000000000 +0100
@@ -33,6 +33,9 @@
 #include <linux/hash.h>
 #include <linux/init.h>
 #include <linux/module.h>
+#include <linux/fs.h>
+#include <linux/debugfs.h>
+#include <linux/kallsyms.h>
 #include <asm/cacheflush.h>
 #include <asm/errno.h>
 #include <asm/kdebug.h>
@@ -131,6 +134,88 @@
        unregister_kprobe(&jp->kp);
 }

+static int kprobes_open(struct inode *inode, struct file *file)
+{
+       return 0;
+}
+
+static int kprobes_release(struct inode *inode, struct file *file)
+{
+       return 0;
+}
+
+void kprobes_list_info(struct kprobe *k, char *buf)
+{
+       char *module, namebuf[KSYM_NAME_LEN+1];
+       const char *hook, *func;
+       unsigned long off, size, handler, addr = (unsigned long)k->addr;
+
+       if(k->pre_handler) {
+               handler = (unsigned long)k->pre_handler;
+               func = kallsyms_lookup(addr, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "PRE\t0x%lx(%s+%#lx)\t", addr, func, off);
+               hook = kallsyms_lookup(handler, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook,
+                              strlen(module) ? module : "[built-in]");
+       }
+       if(k->post_handler) {
+               handler = (unsigned long)k->post_handler;
+               func = kallsyms_lookup(addr, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "POST\t0x%lx(%s+%#lx)\t", addr, func, off);
+               hook = kallsyms_lookup(handler, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook,
+                              strlen(module) ? module : "[built-in]");
+       }
+       if(k->fault_handler) {
+               handler = (unsigned long)k->fault_handler;
+               func = kallsyms_lookup(addr, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "FAULT\t0x%lx(%s+%#lx)\t",
+                              addr, func, off);
+               hook = kallsyms_lookup(handler, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook,
+                              strlen(module) ? module : "[built-in]");
+       }
+       if(k->break_handler) {
+               handler = (unsigned long)k->break_handler;
+               func = kallsyms_lookup(addr, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "BREAK\t0x%lx(%s+%#lx)\t",
+                              addr, func, off);
+               hook = kallsyms_lookup(handler, &size, &off, &module, namebuf);
+               buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook,
+                              strlen(module) ? module : "[built-in]");
+       }
+}
+
+static ssize_t kprobes_read(struct file *file, char __user *buf,
+                        size_t size, loff_t *off)
+{
+       int i;
+       char *data = "";
+       ssize_t len = 0;
+       struct hlist_node *node;
+       struct kprobe *k;
+       
+       spin_lock(&kprobe_lock);
+       for(i = 0; i < KPROBE_TABLE_SIZE; i++) {
+               hlist_for_each_entry(k, node, &kprobe_table[i], hlist) {
+                       if(k) {
+                               kprobes_list_info(k, data + len);
+                               len += strlen(data);
+                       }
+               }
+       }
+       spin_unlock(&kprobe_lock);
+       return simple_read_from_buffer(buf, size, off, data, len);
+}
+
+struct dentry *kprobes_dir, *kprobes_list;
+struct file_operations kprobes_fops = {
+       .open = kprobes_open,
+       .read = kprobes_read,
+       .release = kprobes_release,
+       .owner = THIS_MODULE
+};
+
 static int __init init_kprobes(void)
 {
        int i, err = 0;
@@ -140,6 +225,20 @@
        for (i = 0; i < KPROBE_TABLE_SIZE; i++)
                INIT_HLIST_HEAD(&kprobe_table[i]);

+       kprobes_dir = debugfs_create_dir("kprobes", NULL);
+       if(!kprobes_dir) {
+               printk("kprobes: could not create debugfs entry\n");
+               goto finish;
+       }
+       kprobes_list = debugfs_create_file("list", S_IRUGO, kprobes_dir,
+                                               NULL, &kprobes_fops);
+       if(!kprobes_list) {             
+               printk("kprobes: could not create debugfs entry\n");
+               debugfs_remove(kprobes_dir);
+               goto finish;
+       }
+
+finish:
        err = register_die_notifier(&kprobe_exceptions_nb);
        return err;
 }

Signed-off-by: Luca Falavigna <[EMAIL PROTECTED]>



Regards,

                                        Luca
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iQEVAwUBQevumBZrwl7j21nOAQL46Af/apeTfTYuXvDdhWFsqWI7QBqpmYkj9+iu
S4A2EKsBUUlnlcZrpL08lqwMup2H8jt3zjmmCcPn2Oplr054aHIDIQveu5XMA+jJ
9w5EdDf3SZcPF+HEPmN9EV5n0BakVwGERM/8615jH804Y5IJtB8b79XMmU8wLI8x
M4JGa+kwboD260IbWRuxfRUVqJMMVL5Mibin0RFN4WCbJYfxPhDiCsH2HGNgrw1Y
m0uyuaUt4pynAVPpHJPAKPylwY/A9MC7/Zdfa2IIO118bNxKaFTMg0z+AN66jUwz
kRUzxoUfDv3kIhzkHwvyPX9hjsoSPof/xQZwxclz8p6Yz00KICdZRw==
=Ka0n
-----END PGP SIGNATURE-----

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to