ftrace-hook Linux kernel module demonstrating usage of ftrace framework for function hooking: as in executing arbitrary code around the hooked function. The code is licensed under GPLv2. How to build Please consider using a virtual machine (VirtulBox, VMWare, QEMU, etc.) for experiments. The (...
It was heavily inspired by the ftrace framework of the Linux kernel and the name uftrace stems from the combination of user and ftrace. It can record data from: User space C/C++/Rust functions, by either dynamically patching functions using -P., or else selective NOP patching using code com...
$ cd ftrace-hook $ make make -C /lib/modules/4.9.0-5-amd64/build M=/home/ilammy/dev/ftrace-hook modules make[1]: Entering directory '/usr/src/linux-headers-4.9.0-5-amd64' CC [M] /home/ilammy/dev/ftrace-hook/ftrace_hook.o Building modules, stage 2. MODPOST 1 modules CC /hom...
【linux内核调试】使用Ftrace来Hook linux内核函数 【linux内核调试】ftrace/kprobes/SystemTap内核调试方法对比 【KVM】KVM学习—实现自己的内核 Reference: linux-security-papers linux-kernel-exploitation GoSSIP_Software Security Group 为什么是最好的 GitHub 项目? 技术的发展速度比以往任何时候都快,技术正在...
Development version of the Upstream MultiPath TCP Linux kernel 🐧 - mptcp_net-next/include/linux/ftrace.h at e919a3f7057b5ca918dea98826b39a38eff9bebb · multipath-tcp/mptcp_net-next
KoviD leverages Ftrace, a legitimate method for function and syscall hijacking in Kernel v5+. This approach offers greater stability compared to traditional hooking techniques. 2.4 Backdoors KoviD incorporates popular and reliable methods for backdooring systems, such as port-knocking with custom packet...
We read every piece of feedback, and take your input very seriously. Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly Cancel Create saved search Sign in Sign up Reseting focus {...
Development version of the Upstream MultiPath TCP Linux kernel 🐧 - mptcp_net-next/include/linux/ftrace.h at 807404d66fcf898d4bcc6a3e3edb07ffd5b88400 · multipath-tcp/mptcp_net-next
4 changes: 4 additions & 0 deletions 4 linux_kernel/hook.h Original file line numberDiff line numberDiff line change @@ -0,0 +1,4 @@ #pragma once #include "head.h" extern bool init_hooks(void); extern void uninstall_hooks(void); 34 changes: 25 additions & 9 deletions 34 linux_...
x86机器上,如果使用-mfentry,elf文件中ftrace跳转指令位于prologue前面,在由旧函数跳转到新函数后,执行指令流程不会出错。如果使用mcount,则在新函数前需要添加stub函数,用于处理栈信息等。arm64机器上: Arm64只支持mcount功能,但是arm64 prologue会对寄存器做修改,所以无法使用stub函数来适配。所以采用gcc patchable-...