관리-도구
편집 파일: sysc_readlinkat.stp
# readlinkat ___________________________________________________ # # long sys_readlinkat(int dfd, const char __user * path, # char __user * buf, # int bufsiz) # @define _SYSCALL_READLINKAT_NAME %( name = "readlinkat" %) @define _SYSCALL_READLINKAT_ARGSTR %( argstr = sprintf("%s, %s, %p, %d", dfd_str, path, buf_uaddr, bufsiz) %) @define _SYSCALL_READLINKAT_REGARGS %( dfd = int_arg(1) dfd_str = _dfd_str(dfd) path = user_string_quoted(pointer_arg(2)) buf_uaddr = pointer_arg(3) bufsiz = int_arg(4) %) probe syscall.readlinkat = dw_syscall.readlinkat !, nd_syscall.readlinkat ? {} probe syscall.readlinkat.return = dw_syscall.readlinkat.return !, nd_syscall.readlinkat.return ? {} # dw_readlinkat _____________________________________________________ probe dw_syscall.readlinkat = kernel.function("sys_readlinkat").call ? { @__syscall_compat_gate(@const("__NR_readlinkat"), @const("__NR_compat_readlinkat")) @_SYSCALL_READLINKAT_NAME dfd = __int32($dfd) dfd_str = _dfd_str(__int32($dfd)) buf_uaddr = $buf bufsiz = __int32($bufsiz) path = user_string_quoted(@choose_defined($pathname, $path)) @_SYSCALL_READLINKAT_ARGSTR } probe dw_syscall.readlinkat.return = kernel.function("sys_readlinkat").return ? { @__syscall_compat_gate(@const("__NR_readlinkat"), @const("__NR_compat_readlinkat")) @_SYSCALL_READLINKAT_NAME @SYSC_RETVALSTR($return) } # nd_readlinkat _____________________________________________________ probe nd_syscall.readlinkat = nd1_syscall.readlinkat!, nd2_syscall.readlinkat!, tp_syscall.readlinkat { } probe nd1_syscall.readlinkat = kprobe.function("sys_readlinkat") ? { @__syscall_compat_gate(@const("__NR_readlinkat"), @const("__NR_compat_readlinkat")) @_SYSCALL_READLINKAT_NAME asmlinkage() @_SYSCALL_READLINKAT_REGARGS @_SYSCALL_READLINKAT_ARGSTR } /* kernel 4.17+ */ probe nd2_syscall.readlinkat = kprobe.function(@arch_syscall_prefix "sys_readlinkat") ? { __set_syscall_pt_regs(pointer_arg(1)) @_SYSCALL_READLINKAT_NAME @_SYSCALL_READLINKAT_REGARGS @_SYSCALL_READLINKAT_ARGSTR } /* kernel 3.5+, but undesirable because it affects all syscalls */ probe tp_syscall.readlinkat = kernel.trace("sys_enter") { __set_syscall_pt_regs($regs) @__syscall_compat_gate(@const("__NR_readlinkat"), @const("__NR_compat_readlinkat")) @_SYSCALL_READLINKAT_NAME @_SYSCALL_READLINKAT_REGARGS @_SYSCALL_READLINKAT_ARGSTR } probe nd_syscall.readlinkat.return = nd1_syscall.readlinkat.return!, nd2_syscall.readlinkat.return!, tp_syscall.readlinkat.return { } probe nd1_syscall.readlinkat.return = kprobe.function("sys_readlinkat").return ? { @__syscall_compat_gate(@const("__NR_readlinkat"), @const("__NR_compat_readlinkat")) @_SYSCALL_READLINKAT_NAME @SYSC_RETVALSTR(returnval()) } /* kernel 4.17+ */ probe nd2_syscall.readlinkat.return = kprobe.function(@arch_syscall_prefix "sys_readlinkat").return ? { @_SYSCALL_READLINKAT_NAME @SYSC_RETVALSTR(returnval()) } /* kernel 3.5+, but undesirable because it affects all syscalls */ probe tp_syscall.readlinkat.return = kernel.trace("sys_exit") { __set_syscall_pt_regs($regs) @__syscall_compat_gate(@const("__NR_readlinkat"), @const("__NR_compat_readlinkat")) @_SYSCALL_READLINKAT_NAME @SYSC_RETVALSTR($ret) }