Function report |
Source Code:kernel\kprobes.c |
Create Date:2022-07-28 11:36:12 |
Last Modify:2022-05-22 18:14:58 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Lookup and populate the kprobe_blacklist.* Unlike the kretprobe blacklist, we'll need to determine* the range of addresses that belong to the said functions,* since a kprobe need not necessarily be at the beginning* of a function.
Proto:static int __init populate_kprobe_blacklist(unsigned long *start, unsigned long *end)
Type:int
Parameter:
Type | Parameter | Name |
---|---|---|
unsigned long * | start | |
unsigned long * | end |
2203 | entry = arch_deref_entry_point((void * ) * iter) |
2204 | ret = kprobe_add_ksym_blacklist(entry) |
2215 | Return If ret Else arch_populate_kprobe_blacklist() |
Name | Describe |
---|---|
init_kprobes |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |