Function report |
Source Code:arch\x86\kernel\kprobes\core.c |
Create Date:2022-07-28 08:38:28 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:Recover the probed instruction at addr for further analysis.* Caller must lock kprobes by kprobe_mutex, or disable preemption* for preventing to release referencing kprobes.* Returns zero if the instruction can not get recovered (or access failed).
Proto:unsigned long recover_probed_instruction(kprobe_opcode_t *buf, unsigned long addr)
Type:unsigned long
Parameter:
Type | Parameter | Name |
---|---|---|
kprobe_opcode_t * | buf | |
unsigned long | addr |
266 | __addr = __recover_optprobed_insn(buf, addr) |
270 | Return __recover_probed_insn(buf, addr) |
Name | Describe |
---|---|
can_probe | Check if paddr is at an instruction boundary |
__copy_instruction | Copy an instruction with recovering modified instruction by kprobes* and adjust the displacement if the instruction uses the %rip-relative* addressing mode. Note that since @real will be the final place of copied |
can_optimize | Decode whole function to ensure any instructions don't jump into target |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |