-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here is a modified version of kprobes patch fixing some issues reported by Greg.
Greg KH ha scritto: >>+{ >>+ try_module_get(THIS_MODULE); > > > Check the return value of this call? I removed try_module_get() and module_put() because of Stephen Hemminger's mail: "The module ref counting should be done by the VFS layer not the interface." Thank you for this hint :) >>+ if(!(kprobes_dir = debugfs_create_dir("kprobes", NULL))) >>+ return -ENODEV; >>+ if(!(kprobes_list = debugfs_create_file("list", S_IRUGO, kprobes_dir, >>+ NULL, &kprobes_fops))) { >>+ debugfs_remove(kprobes_dir); >>+ return -ENODEV; >>+ } > > > You never delete this file or directory on module unload, do you? kprobes are a built-in feature, I think there's no way to handle this. Please, tell me if I am wrong. - --- ./kernel/kprobes.c 2005-01-17 17:56:11.000000000 +0100 +++ ./kernel/kprobes.c 2005-01-17 17:46:04.000000000 +0100 @@ -33,6 +33,9 @@ #include <linux/hash.h> #include <linux/init.h> #include <linux/module.h> +#include <linux/fs.h> +#include <linux/debugfs.h> +#include <linux/kallsyms.h> #include <asm/cacheflush.h> #include <asm/errno.h> #include <asm/kdebug.h> @@ -131,6 +134,88 @@ unregister_kprobe(&jp->kp); } +static int kprobes_open(struct inode *inode, struct file *file) +{ + return 0; +} + +static int kprobes_release(struct inode *inode, struct file *file) +{ + return 0; +} + +void kprobes_list_info(struct kprobe *k, char *buf) +{ + char *module, namebuf[KSYM_NAME_LEN+1]; + const char *hook, *func; + unsigned long off, size, handler, addr = (unsigned long)k->addr; + + if(k->pre_handler) { + handler = (unsigned long)k->pre_handler; + func = kallsyms_lookup(addr, &size, &off, &module, namebuf); + buf += sprintf(buf, "PRE\t0x%lx(%s+%#lx)\t", addr, func, off); + hook = kallsyms_lookup(handler, &size, &off, &module, namebuf); + buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook, + strlen(module) ? module : "[built-in]"); + } + if(k->post_handler) { + handler = (unsigned long)k->post_handler; + func = kallsyms_lookup(addr, &size, &off, &module, namebuf); + buf += sprintf(buf, "POST\t0x%lx(%s+%#lx)\t", addr, func, off); + hook = kallsyms_lookup(handler, &size, &off, &module, namebuf); + buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook, + strlen(module) ? module : "[built-in]"); + } + if(k->fault_handler) { + handler = (unsigned long)k->fault_handler; + func = kallsyms_lookup(addr, &size, &off, &module, namebuf); + buf += sprintf(buf, "FAULT\t0x%lx(%s+%#lx)\t", + addr, func, off); + hook = kallsyms_lookup(handler, &size, &off, &module, namebuf); + buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook, + strlen(module) ? module : "[built-in]"); + } + if(k->break_handler) { + handler = (unsigned long)k->break_handler; + func = kallsyms_lookup(addr, &size, &off, &module, namebuf); + buf += sprintf(buf, "BREAK\t0x%lx(%s+%#lx)\t", + addr, func, off); + hook = kallsyms_lookup(handler, &size, &off, &module, namebuf); + buf += sprintf(buf, "0x%lx(%s)\t%s\n", handler, hook, + strlen(module) ? module : "[built-in]"); + } +} + +static ssize_t kprobes_read(struct file *file, char __user *buf, + size_t size, loff_t *off) +{ + int i; + char *data = ""; + ssize_t len = 0; + struct hlist_node *node; + struct kprobe *k; + + spin_lock(&kprobe_lock); + for(i = 0; i < KPROBE_TABLE_SIZE; i++) { + hlist_for_each_entry(k, node, &kprobe_table[i], hlist) { + if(k) { + kprobes_list_info(k, data + len); + len += strlen(data); + } + } + } + spin_unlock(&kprobe_lock); + return simple_read_from_buffer(buf, size, off, data, len); +} + +struct dentry *kprobes_dir, *kprobes_list; +struct file_operations kprobes_fops = { + .open = kprobes_open, + .read = kprobes_read, + .release = kprobes_release, + .owner = THIS_MODULE +}; + static int __init init_kprobes(void) { int i, err = 0; @@ -140,6 +225,20 @@ for (i = 0; i < KPROBE_TABLE_SIZE; i++) INIT_HLIST_HEAD(&kprobe_table[i]); + kprobes_dir = debugfs_create_dir("kprobes", NULL); + if(!kprobes_dir) { + printk("kprobes: could not create debugfs entry\n"); + goto finish; + } + kprobes_list = debugfs_create_file("list", S_IRUGO, kprobes_dir, + NULL, &kprobes_fops); + if(!kprobes_list) { + printk("kprobes: could not create debugfs entry\n"); + debugfs_remove(kprobes_dir); + goto finish; + } + +finish: err = register_die_notifier(&kprobe_exceptions_nb); return err; } Signed-off-by: Luca Falavigna <[EMAIL PROTECTED]> Regards, Luca -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iQEVAwUBQevumBZrwl7j21nOAQL46Af/apeTfTYuXvDdhWFsqWI7QBqpmYkj9+iu S4A2EKsBUUlnlcZrpL08lqwMup2H8jt3zjmmCcPn2Oplr054aHIDIQveu5XMA+jJ 9w5EdDf3SZcPF+HEPmN9EV5n0BakVwGERM/8615jH804Y5IJtB8b79XMmU8wLI8x M4JGa+kwboD260IbWRuxfRUVqJMMVL5Mibin0RFN4WCbJYfxPhDiCsH2HGNgrw1Y m0uyuaUt4pynAVPpHJPAKPylwY/A9MC7/Zdfa2IIO118bNxKaFTMg0z+AN66jUwz kRUzxoUfDv3kIhzkHwvyPX9hjsoSPof/xQZwxclz8p6Yz00KICdZRw== =Ka0n -----END PGP SIGNATURE----- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/