I want to monitor a Linux kernel function using ebpf. Now, I write code using bcc like this:
#!/usr/bin/python3
# coding=utf-8
from bcc import BPF
from time import sleep
# define BPF program
bpf_program = """
int test_func(void *ctx) {
bpf_trace_printk("hello");
return 0;
}
"""
# load BPF
b = BPF(text=bpf_program)
b.attach_kprobe(event="__x64_sys_getpid", fn_name="test_func")
while 1:
sleep(100)
b.trace_print()
This works fine and I know it's implemented based on kprobe.
But I wonder if I can only use kprobe to monitor any kernel function in ebpf?
Mostly. Kprobes can attach to pretty much any function except for blacklisted functions.