Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\trace\trace_kprobe.c Create Date:2022-07-28 12:39:54
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:Kprobe handler

Proto:static inline __attribute__((__always_inline__)) void __kprobe_trace_func(struct trace_kprobe *tk, struct pt_regs *regs, struct trace_event_file *trace_file)

Type:void

Parameter:

TypeParameterName
struct trace_kprobe *tk
struct pt_regs *regs
struct trace_event_file *trace_file
1182  call = trace_probe_event_call( & tp)
1184  WARN_ON(call != event_call)
1186  If race_trigger_soft_disabled - do triggers and test if soft disabled*@file: The file pointer of the event to test* If any triggers without filters are attached to this event, they* will be called here Then Return
1189  local_save_flags(irq_flags)
1190  pc = We mask the PREEMPT_NEED_RESCHED bit so as not to confuse all current users* that think a non-zero value indicates we cannot preempt.
1192  dsize = Sum up total data length for dynamic arraies (strings)
1193  size = size of entry + trace entry size + dsize
1195  event = trace_event_buffer_lock_reserve( & buffer, trace_file, type, size, irq_flags, pc)
1198  If Not event Then Return
1201  entry = g_buffer_event_data - return the data of the event*@event: the event to get the data from
1202  ip = location of the probe point
1203  Store the value of each argument
1205  vent_trigger_unlock_commit_regs - handle triggers and finish event commit*@file: The file pointer assoctiated to the event*@buffer: The ring buffer that the event is being written to*@event: The event meta data in the ring buffer*@entry: The event
Caller
NameDescribe
kprobe_trace_func