![]() Server : Apache System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64 User : corals ( 1002) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /opt/rh/gcc-toolset-11/root/usr/share/systemtap/tapset/linux/powerpc/ |
# compat_get_mempolicy ________________________________________ # # asmlinkage long compat_get_mempolicy(int __user *policy, # compat_ulong_t __user *nmask, # compat_ulong_t maxnode, # compat_ulong_t addr, compat_ulong_t flags) # @define _SYSCALL_COMPAT_GET_MEMPOLICY_NAME %( name = "compat_get_mempolicy" %) @define _SYSCALL_COMPAT_GET_MEMPOLICY_ARGSTR %( argstr = sprintf("%p, %p, %d, %d", policy_uaddr, nmask_uaddr, maxnode, addr) %) probe syscall.compat_get_mempolicy = dw_syscall.compat_get_mempolicy !, nd_syscall.compat_get_mempolicy ? {} probe syscall.compat_get_mempolicy.return = dw_syscall.compat_get_mempolicy.return !, nd_syscall.compat_get_mempolicy.return ? {} # dw_compat_get_mempolicy _____________________________________________________ probe dw_syscall.compat_get_mempolicy = kernel.function("compat_get_mempolicy") ? { @_SYSCALL_COMPAT_GET_MEMPOLICY_NAME policy_uaddr = $policy nmask_uaddr = $nmask maxnode = $maxnode addr = $addr flags = $flags @_SYSCALL_COMPAT_GET_MEMPOLICY_ARGSTR } probe dw_syscall.compat_get_mempolicy.return = kernel.function("compat_get_mempolicy").return ? { @_SYSCALL_COMPAT_GET_MEMPOLICY_NAME @SYSC_RETVALSTR($return) } # nd_compat_get_mempolicy _____________________________________________________ probe nd_syscall.compat_get_mempolicy = kprobe.function("compat_get_mempolicy") ? { @_SYSCALL_COMPAT_GET_MEMPOLICY_NAME asmlinkage() policy_uaddr = int_arg(1) nmask_uaddr = uint_arg(2) maxnode = uint_arg(3) addr = uint_arg(4) flags = uint_arg(5) @_SYSCALL_COMPAT_GET_MEMPOLICY_ARGSTR } probe nd_syscall.compat_get_mempolicy.return = kprobe.function("compat_get_mempolicy").return ? { @_SYSCALL_COMPAT_GET_MEMPOLICY_NAME @SYSC_RETVALSTR(returnval()) }