Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:kernel\trace\trace_kprobe.c Create Date:2022-07-28 12:39:59
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:Kretprobe handler

Proto:static inline __attribute__((__always_inline__)) void __kretprobe_trace_func(struct trace_kprobe *tk, struct kretprobe_instance *ri, struct pt_regs *regs, struct trace_event_file *trace_file)

Type:void

Parameter:

TypeParameterName
struct trace_kprobe *tk
struct kretprobe_instance *ri
struct pt_regs *regs
struct trace_event_file *trace_file
1230  call = trace_probe_event_call( & tp)
1232  WARN_ON(call != event_call)
1234  If race_trigger_soft_disabled - do triggers and test if soft disabled*@file: The file pointer of the event to test* If any triggers without filters are attached to this event, they* will be called here Then Return
1237  local_save_flags(irq_flags)
1238  pc = We mask the PREEMPT_NEED_RESCHED bit so as not to confuse all current users* that think a non-zero value indicates we cannot preempt.
1240  dsize = Sum up total data length for dynamic arraies (strings)
1241  size = size of entry + trace entry size + dsize
1243  event = trace_event_buffer_lock_reserve( & buffer, trace_file, type, size, irq_flags, pc)
1246  If Not event Then Return
1249  entry = g_buffer_event_data - return the data of the event*@event: the event to get the data from
1250  func = location of the probe point
1251  ret_ip = ret_addr
1252  Store the value of each argument
1254  vent_trigger_unlock_commit_regs - handle triggers and finish event commit*@file: The file pointer assoctiated to the event*@buffer: The ring buffer that the event is being written to*@event: The event meta data in the ring buffer*@entry: The event
Caller
NameDescribe
kretprobe_trace_func