Update: kvm instrumentation for ubuntu 4.13.0-38
[lttng-modules.git] / probes / lttng-kprobes.c
index f4e4f2ea801e88f4b4d05bf4dd1472837a693799..b58a09b4ab19fae4597bb3286f6aca0c18a1e70a 100644 (file)
 #include <linux/module.h>
 #include <linux/kprobes.h>
 #include <linux/slab.h>
-#include "../lttng-events.h"
-#include "../wrapper/ringbuffer/frontend_types.h"
-#include "../wrapper/vmalloc.h"
-#include "../wrapper/irqflags.h"
-#include "../lttng-tracer.h"
+#include <lttng-events.h>
+#include <wrapper/ringbuffer/frontend_types.h>
+#include <wrapper/vmalloc.h>
+#include <wrapper/irqflags.h>
+#include <lttng-tracer.h>
 
 static
 int lttng_kprobes_handler_pre(struct kprobe *p, struct pt_regs *regs)
@@ -36,18 +36,18 @@ int lttng_kprobes_handler_pre(struct kprobe *p, struct pt_regs *regs)
                container_of(p, struct lttng_event, u.kprobe.kp);
        struct lttng_probe_ctx lttng_probe_ctx = {
                .event = event,
-               .interruptible = lttng_regs_irqs_disabled(regs),
+               .interruptible = !lttng_regs_irqs_disabled(regs),
        };
        struct lttng_channel *chan = event->chan;
        struct lib_ring_buffer_ctx ctx;
        int ret;
        unsigned long data = (unsigned long) p->addr;
 
-       if (unlikely(!ACCESS_ONCE(chan->session->active)))
+       if (unlikely(!READ_ONCE(chan->session->active)))
                return 0;
-       if (unlikely(!ACCESS_ONCE(chan->enabled)))
+       if (unlikely(!READ_ONCE(chan->enabled)))
                return 0;
-       if (unlikely(!ACCESS_ONCE(event->enabled)))
+       if (unlikely(!READ_ONCE(event->enabled)))
                return 0;
 
        lib_ring_buffer_ctx_init(&ctx, chan->chan, &lttng_probe_ctx, sizeof(data),
This page took 0.023105 seconds and 4 git commands to generate.