![]() Server : Apache System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64 User : corals ( 1002) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /opt/rh/gcc-toolset-11/root/usr/share/systemtap/tapset/linux/powerpc/ |
%( systemtap_v <= "2.7" %? # sys32_ipc() is just a syscall multiplexer (similar to # sys_socketcall()). So, we don't really need to probe it, since we'll # be probing what sys32_ipc() will call (semget, msgsnd, msgrcv, # shmat, etc.). # ipc ________________________________________ # # long sys32_ipc(u32 call, u32 first, u32 second, u32 third, # compat_uptr_t ptr, u32 fifth) # @define _SYSCALL_IPC_NAME %( name = "ipc" %) @define _SYSCALL_IPC_ARGSTR %( argstr = sprintf("%d, %d, %d, %d, %p, %d", call, first, second, third, ptr, fifth) %) probe syscall.ipc = dw_syscall.ipc !, nd_syscall.ipc ? {} probe syscall.ipc.return = dw_syscall.ipc.return !, nd_syscall.ipc.return ? {} # dw_ipc _____________________________________________________ probe dw_syscall.ipc = kernel.function("sys32_ipc") ? { @_SYSCALL_IPC_NAME call = $call first = $first second = $second third = $third ptr = $ptr fifth = $fifth @_SYSCALL_IPC_ARGSTR } probe dw_syscall.ipc.return = kernel.function("sys32_ipc").return ? { @_SYSCALL_IPC_NAME @SYSC_RETVALSTR($return) } # nd_ipc _____________________________________________________ probe nd_syscall.ipc = kprobe.function("sys32_ipc") ? { @_SYSCALL_IPC_NAME asmlinkage() call = uint_arg(1) first = uint_arg(2) second = uint_arg(3) third = uint_arg(4) ptr = uint_arg(5) fifth = uint_arg(6) @_SYSCALL_IPC_ARGSTR } probe nd_syscall.ipc.return = kprobe.function("sys32_ipc").return ? { @_SYSCALL_IPC_NAME @SYSC_RETVALSTR(returnval()) } %)