Function report |
Source Code:arch\x86\kernel\kprobes\core.c |
Create Date:2022-07-28 08:38:28 |
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
| home page | Tree |
| Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Recover the probed instruction at addr for further analysis.* Caller must lock kprobes by kprobe_mutex, or disable preemption* for preventing to release referencing kprobes.* Returns zero if the instruction can not get recovered (or access failed).
Proto:unsigned long recover_probed_instruction(kprobe_opcode_t *buf, unsigned long addr)
Type:unsigned long
Parameter:
| Type | Parameter | Name |
|---|---|---|
| kprobe_opcode_t * | buf | |
| unsigned long | addr |
| 266 | __addr = __recover_optprobed_insn(buf, addr) |
| 270 | Return __recover_probed_insn(buf, addr) |
| Name | Describe |
|---|---|
| can_probe | Check if paddr is at an instruction boundary |
| __copy_instruction | Copy an instruction with recovering modified instruction by kprobes* and adjust the displacement if the instruction uses the %rip-relative* addressing mode. Note that since @real will be the final place of copied |
| can_optimize | Decode whole function to ensure any instructions don't jump into target |
| Source code conversion tool public plug-in interface | X |
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |