Lines Matching refs:kprobe

29 DEFINE_PER_CPU(struct kprobe *, current_kprobe);
45 static void copy_instruction(struct kprobe *p)
78 struct kprobe *kp;
98 * instructions and prevent setting a kprobe.
104 * kprobe, in which case the original instruction is
109 /* not a kprobe */
119 int arch_prepare_kprobe(struct kprobe *p)
135 struct kprobe *p;
142 struct kprobe *p = args->p;
151 void arch_arm_kprobe(struct kprobe *p)
159 void arch_disarm_kprobe(struct kprobe *p)
167 void arch_remove_kprobe(struct kprobe *p)
220 * Activate a kprobe by storing its pointer to current_kprobe. The
221 * previous kprobe is stored in kcb->prev_kprobe. A stack of up to
224 static void push_kprobe(struct kprobe_ctlblk *kcb, struct kprobe *p)
233 * Deactivate a kprobe by backing up to the previous state. If the
245 static void kprobe_reenter_check(struct kprobe_ctlblk *kcb, struct kprobe *p)
256 * A kprobe on the code path to single step an instruction
270 struct kprobe *p;
273 * We want to disable preemption for the entire duration of kprobe
275 * and single stepping the kprobe instruction.
284 * We have hit a kprobe while another is still
288 * of this secondary kprobe.
290 * the currently active kprobe.
315 * No kprobe at this address and no active kprobe. The trap has
316 * not been caused by a kprobe breakpoint. The race of breakpoint
317 * vs. kprobe remove does not exist because on s390 as we use
333 static void resume_execution(struct kprobe *p, struct pt_regs *regs)
361 struct kprobe *p = kprobe_running();
389 struct kprobe *p = kprobe_running();
397 * kprobe and the nip points back to the probe address
481 int arch_trampoline_kprobe(struct kprobe *p)