From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 11560 invoked by alias); 24 Oct 2008 22:00:41 -0000 Received: (qmail 11054 invoked by uid 48); 24 Oct 2008 21:59:29 -0000 Date: Fri, 24 Oct 2008 22:00:00 -0000 From: "fche at redhat dot com" To: systemtap@sources.redhat.com Message-ID: <20081024215928.6983.fche@redhat.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug translator/6983] New: support kmmio hooks X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2008-q4/txt/msg00208.txt.bz2 Recent kernels support a kprobe-like API for trapping MMIO operations. See include/linux/mmiotrace.h, [un]register_kmmio_probe(). Possible syntax: probe kernel.mmio(0xaddr).length(0xsize) { $addr } There is also a *tracing* widget backend nearby for ftrace, but it does not appear relevant to systemtap. commit 8b7d89d02ef3c6a7c73d6596f28cea7632850af4 Author: Pekka Paalanen Date: Mon May 12 21:20:56 2008 +0200 x86: mmiotrace - trace memory mapped IO Mmiotrace is a tool for trapping memory mapped IO (MMIO) accesses within the kernel. It is used for debugging and especially for reverse engineering evil binary drivers. Mmiotrace works by wrapping the ioremap family of kernel functions and marking the returned pages as not present. Access to the IO memory triggers a page fault, which will be handled by mmiotrace's custom page fault handler. This will single-step the faulted instruction with the MMIO page marked as present. Access logs are directed to user space via relay and debug_fs. This page fault approach is necessary, because binary drivers have readl/writel etc. calls inlined and therefore extremely difficult to trap with with e.g. kprobes. -- Summary: support kmmio hooks Product: systemtap Version: unspecified Status: NEW Severity: normal Priority: P2 Component: translator AssignedTo: systemtap at sources dot redhat dot com ReportedBy: fche at redhat dot com http://sourceware.org/bugzilla/show_bug.cgi?id=6983 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.