|
Server : Apache System : Linux server.mata-lashes.com 3.10.0-1160.90.1.el7.x86_64 #1 SMP Thu May 4 15:21:22 UTC 2023 x86_64 User : matalashes ( 1004) PHP Version : 8.1.29 Disable Function : NONE Directory : /usr/share/systemtap/tapset/linux/ |
Upload File : |
# statx _______________________________________________________
# Syscall introduced in kernel commit a528d35e8bfcc521d7cb70aaf03e1bd296c8493f
# Author: David Howells <dhowells@redhat.com>
# Date: Tue Jan 31 16:46:22 2017 +0000
# SYSCALL_DEFINE5(statx,
# int, dfd, const char __user *, filename, unsigned, flags,
# unsigned int, mask,
# struct statx __user *, buffer)
#
# asmlinkage long sys_statx(int dfd, const char __user *path, unsigned flags,
# unsigned mask, struct statx __user *buffer);
@define _SYSCALL_STATX_NAME
%(
name = "statx"
%)
@define _SYSCALL_STATX_ARGSTR
%(
argstr = sprintf("%s, %s, %s, %s, %p", dfd_str, filename, flags_str,
mask_str, buf_uaddr)
%)
@define _SYSCALL_STATX_REGARGS
%(
dfd = int_arg(1)
dfd_str = _dfd_str(dfd)
filename_uaddr = pointer_arg(2)
filename = user_string_quoted(filename_uaddr)
flags = uint_arg(3)
flags_str = _at_flag_str(flags)
mask = uint_arg(4)
mask_str = _statx_mask_str(mask)
buf_uaddr = pointer_arg(5)
%)
probe syscall.statx = dw_syscall.statx !, nd_syscall.statx ? {}
probe syscall.statx.return = dw_syscall.statx.return !, nd_syscall.statx.return ? {}
# dw_statx _____________________________________________________
probe dw_syscall.statx = kernel.function("sys_statx").call ?
{
@_SYSCALL_STATX_NAME
dfd = __int32($dfd)
dfd_str = _dfd_str(dfd)
filename_uaddr = $filename
filename = user_string_quoted($filename)
flags = __uint32($flags)
flags_str = _at_flag_str(flags)
mask = __uint32($mask)
mask_str = _statx_mask_str(mask)
buf_uaddr = $buffer
# Not pretty-printing struct statx, since it is just
# (maybe somehow initialized) *destination* buffer.
@_SYSCALL_STATX_ARGSTR
}
probe dw_syscall.statx.return = kernel.function("sys_statx").return ?
{
@_SYSCALL_STATX_NAME
@SYSC_RETVALSTR($return)
}
# nd_statx _____________________________________________________
probe nd_syscall.statx = nd1_syscall.statx!, nd2_syscall.statx!, tp_syscall.statx
{ }
probe nd1_syscall.statx = kprobe.function("sys_statx") ?
{
@_SYSCALL_STATX_NAME
asmlinkage()
@_SYSCALL_STATX_REGARGS
# Not pretty-printing struct statx, since it is just
# (maybe somehow initialized) *destination* buffer.
@_SYSCALL_STATX_ARGSTR
}
/* kernel 4.17+ */
probe nd2_syscall.statx = kprobe.function(@arch_syscall_prefix "sys_statx") ?
{
__set_syscall_pt_regs(pointer_arg(1))
@_SYSCALL_STATX_NAME
@_SYSCALL_STATX_REGARGS
@_SYSCALL_STATX_ARGSTR
}
/* kernel 3.5+, but undesirable because it affects all syscalls */
probe tp_syscall.statx = kernel.trace("sys_enter")
{
__set_syscall_pt_regs($regs)
@__syscall_compat_gate(@const("__NR_statx"), @const("__NR_compat_statx"))
@_SYSCALL_STATX_NAME
@_SYSCALL_STATX_REGARGS
@_SYSCALL_STATX_ARGSTR
}
probe nd_syscall.statx.return = nd1_syscall.statx.return!, nd2_syscall.statx.return!, tp_syscall.statx.return
{ }
probe nd1_syscall.statx.return = kprobe.function("sys_statx").return ?
{
@_SYSCALL_STATX_NAME
@SYSC_RETVALSTR(returnval())
}
/* kernel 4.17+ */
probe nd2_syscall.statx.return = kprobe.function(@arch_syscall_prefix "sys_statx").return ?
{
@_SYSCALL_STATX_NAME
@SYSC_RETVALSTR(returnval())
}
/* kernel 3.5+, but undesirable because it affects all syscalls */
probe tp_syscall.statx.return = kernel.trace("sys_exit")
{
__set_syscall_pt_regs($regs)
@__syscall_compat_gate(@const("__NR_statx"), @const("__NR_compat_statx"))
@_SYSCALL_STATX_NAME
@SYSC_RETVALSTR($ret)
}