My mission is intercept VM syscall insmod (sys_init_module) from hypervisor.
I've dirty xen code to try, specifically in do_guest_trap function in arch/x86/traps.c Xen file. In this function I've added this small part of code:
unit32_t a;
if (v->domain->domain_id != 0) { /* if domain is not Dom0 */
a=regs->eax;
if (a == 128) {
printk("I've intercepted sys_init_module");
}
}
In this way I'm able to intercept the syscall sys_init_module (number 128) from any DomU, but my problem now is to intercept the insmod parameter and print it with printk.
I've tried to assign a
char __user *myvar = (char __user *)regs->ebx
but I can't print it with
printk("%s",myvar)
This is what happen: when I start my domU and happen an insmod in boot time, my dom0 reboots itself.
Is it true that parameter of my syscall is in regs->ebx register?? What is the way to print it in human readable (for example if in DomU I print in shell "insmod mymodule" I'd like print "mymodule" from hypervisor, not the hex value like 0804b018, but the string).
Can you help me? I'd like only print insmod parameter. I use 3.2.1 xen + linux-2.6.18-xen.hg.
Thanks a lot.
Elena