asda?‰PNG  IHDR ? f ??C1 sRGB ??é gAMA ±? üa pHYs ? ??o¨d GIDATx^íüL”÷e÷Y?a?("Bh?_ò???¢§?q5k?*:t0A-o??¥]VkJ¢M??f?±8\k2íll£1]q?ù???T # kexec_load _________________________________________________ # long sys_kexec_load(unsigned long entry, # unsigned long nr_segments, # struct kexec_segment __user *segments, # unsigned long flags) # long compat_sys_kexec_load(unsigned long entry, # unsigned long nr_segments, # struct compat_kexec_segment __user *segments, # unsigned long flags) # @define _SYSCALL_KEXEC_LOAD_NAME %( name = "kexec_load" %) @define _SYSCALL_KEXEC_LOAD_ARGSTR %( argstr = sprintf("%p, %u, %p, %s", entry, nr_segments, segments_uaddr, flags_str) %) @define _SYSCALL_KEXEC_LOAD_REGARGS %( entry = ulong_arg(1) nr_segments = ulong_arg(2) segments_uaddr = pointer_arg(3) flags = ulong_arg(4) flags_str = _kexec_flags_str(flags) %) @define _SYSCALL_KEXEC_LOAD_REGARGS_STORE %( if (@probewrite(entry)) set_ulong_arg(1, entry) if (@probewrite(nr_segments)) set_ulong_arg(2, nr_segments) if (@probewrite(segments_uaddr)) set_pointer_arg(3, segments_uaddr) if (@probewrite(flags)) set_ulong_arg(4, flags) %) probe syscall.kexec_load = dw_syscall.kexec_load !, nd_syscall.kexec_load ? {} probe syscall.kexec_load.return = dw_syscall.kexec_load.return !, nd_syscall.kexec_load.return ? {} # dw_kexec_load _____________________________________________________ probe dw_syscall.kexec_load = __syscall.kexec_load.call ?, kernel.function("compat_sys_kexec_load").call ? { @_SYSCALL_KEXEC_LOAD_NAME entry = @__compat_ulong($entry) nr_segments = __ulong($nr_segments) segments_uaddr = @__pointer($segments) flags = @__compat_ulong($flags) flags_str = _kexec_flags_str(flags) @_SYSCALL_KEXEC_LOAD_ARGSTR } probe __syscall.kexec_load.call = kernel.function("sys_kexec_load").call { @__syscall_gate_compat_simple } probe dw_syscall.kexec_load.return = __syscall.syscall.kexec_load.return ?, kernel.function("compat_sys_kexec_load").return ? { @_SYSCALL_KEXEC_LOAD_NAME @SYSC_RETVALSTR($return) } probe __syscall.syscall.kexec_load.return = kernel.function("sys_kexec_load").return { @__syscall_gate_compat_simple } # nd_kexec_load _____________________________________________________ probe nd_syscall.kexec_load = nd1_syscall.kexec_load!, nd2_syscall.kexec_load!, tp_syscall.kexec_load { } probe nd1_syscall.kexec_load = __nd1_syscall.kexec_load ?, kprobe.function("compat_sys_kexec_load") ? { @_SYSCALL_KEXEC_LOAD_NAME asmlinkage() @_SYSCALL_KEXEC_LOAD_REGARGS @_SYSCALL_KEXEC_LOAD_ARGSTR } probe __nd1_syscall.kexec_load = kprobe.function("sys_kexec_load") { @__syscall_gate_compat_simple } /* kernel 4.17+ */ probe nd2_syscall.kexec_load = kprobe.function(@arch_syscall_prefix "sys_kexec_load") ?, kprobe.function(@arch_syscall_prefix "compat_sys_kexec_load") ? { __set_syscall_pt_regs(pointer_arg(1)) @_SYSCALL_KEXEC_LOAD_NAME @_SYSCALL_KEXEC_LOAD_REGARGS @_SYSCALL_KEXEC_LOAD_ARGSTR }, { %( @_IS_SREG_KERNEL %? @_SYSCALL_KEXEC_LOAD_REGARGS_STORE %) } /* kernel 3.5+, but undesirable because it affects all syscalls */ probe tp_syscall.kexec_load = kernel.trace("sys_enter") { __set_syscall_pt_regs($regs) @__syscall_compat_gate(@const("__NR_kexec_load"), @const("__NR_compat_kexec_load")) @_SYSCALL_KEXEC_LOAD_NAME @_SYSCALL_KEXEC_LOAD_REGARGS @_SYSCALL_KEXEC_LOAD_ARGSTR }, { %( @_IS_SREG_KERNEL %? @_SYSCALL_KEXEC_LOAD_REGARGS_STORE %) } probe nd_syscall.kexec_load.return = nd1_syscall.kexec_load.return!, nd2_syscall.kexec_load.return!, tp_syscall.kexec_load.return { } probe nd1_syscall.kexec_load.return = __nd1_syscall.kexec_load.return ?, kprobe.function("compat_sys_kexec_load").return ? { @_SYSCALL_KEXEC_LOAD_NAME @SYSC_RETVALSTR(returnval()) } probe __nd1_syscall.kexec_load.return = kprobe.function("sys_kexec_load").return { @__syscall_gate_compat_simple } /* kernel 4.17+ */ probe nd2_syscall.kexec_load.return = kprobe.function(@arch_syscall_prefix "sys_kexec_load").return ?, kprobe.function(@arch_syscall_prefix "compat_sys_kexec_load").return ? { @_SYSCALL_KEXEC_LOAD_NAME @SYSC_RETVALSTR(returnval()) } /* kernel 3.5+, but undesirable because it affects all syscalls */ probe tp_syscall.kexec_load.return = kernel.trace("sys_exit") { __set_syscall_pt_regs($regs) @__syscall_compat_gate(@const("__NR_kexec_load"), @const("__NR_compat_kexec_load")) @_SYSCALL_KEXEC_LOAD_NAME @SYSC_RETVALSTR($ret) }