{
struct lttng_event_notifier *event_notifier =
container_of(p, struct lttng_event_notifier, u.kprobe.kp);
+ struct lttng_kernel_notifier_ctx notif_ctx;
if (unlikely(!READ_ONCE(event_notifier->enabled)))
return 0;
- event_notifier->send_notification(event_notifier);
+ notif_ctx.eval_capture = LTTNG_READ_ONCE(event_notifier->eval_capture);
+ event_notifier->send_notification(event_notifier, NULL, NULL, ¬if_ctx);
return 0;
}
goto error_field;
}
field->name = "ip";
- field->type.atype = atype_integer;
+ field->type.type = lttng_kernel_type_integer;
field->type.u.integer.size = sizeof(unsigned long) * CHAR_BIT;
field->type.u.integer.alignment = lttng_alignof(unsigned long) * CHAR_BIT;
field->type.u.integer.signedness = lttng_is_signed_type(unsigned long);
field->type.u.integer.reverse_byte_order = 0;
field->type.u.integer.base = 16;
- field->type.u.integer.encoding = lttng_encode_none;
+ field->type.u.integer.encoding = lttng_kernel_string_encoding_none;
desc->owner = THIS_MODULE;
event->desc = desc;
lttng_kp->kp.addr = (void *) (unsigned long) addr;
/*
- * Ensure the memory we just allocated don't event_notifier page faults.
+ * Ensure the memory we just allocated don't notify page faults.
* Well.. kprobes itself puts the page fault handler on the blacklist,
* but we can never be too careful.
*/