One Hat Cyber Team
Your IP :
216.73.216.115
Server IP :
194.44.31.54
Server :
Linux zen.imath.kiev.ua 4.18.0-553.77.1.el8_10.x86_64 #1 SMP Fri Oct 3 14:30:23 UTC 2025 x86_64
Server Software :
Apache/2.4.37 (Rocky Linux) OpenSSL/1.1.1k
PHP Version :
5.6.40
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
systemtap
/
tapset
/
linux
/
View File Name :
rcu.stp
// rcu tapset // Copyright (C) 2013, 2017 Red Hat // // This file is part of systemtap, and is free software. You can // redistribute it and/or modify it under the terms of the GNU General // Public License (GPL); either version 2, or (at your option) any // later version. %{ #include <linux/rcupdate.h> %} function rcu_dereference:long (protected_pointer:long) %{ /* pure */ void *protected_pointer = (void *)(uintptr_t)STAP_ARG_protected_pointer; long fetched_value; /* We call kderef() here to ensure the memory is valid to read. * Note the result is thrown away, then we use the "real" * rcu_dereference function now that we know the address is * safe. */ (void)kderef(sizeof(*protected_pointer), protected_pointer); rcu_read_lock(); fetched_value = (long)rcu_dereference(protected_pointer); rcu_read_unlock(); STAP_RETVALUE = fetched_value; CATCH_DEREF_FAULT(); %}