Skip to content

Instantly share code, notes, and snippets.

@agentzh

agentzh/a.txt Secret

Created November 19, 2020 06:55
Show Gist options
  • Save agentzh/ec8e334f66b5c413e9cdf3d7028a55a6 to your computer and use it in GitHub Desktop.
Save agentzh/ec8e334f66b5c413e9cdf3d7028a55a6 to your computer and use it in GitHub Desktop.
[1207431.530536] Call Trace:
[1207431.530541] dump_stack+0x5c/0x80
[1207431.530544] probe_6407+0x71/0xa0 [stap_aa17e8afabf28e68ff1a87d3733594fb_7047]
[1207431.530546] ? enter_be_probe.isra.28+0x140/0x210 [stap_aa17e8afabf28e68ff1a87d3733594fb_7047]
[1207431.530548] ? _stp_cleanup_and_exit+0x30b/0x340 [stap_aa17e8afabf28e68ff1a87d3733594fb_7047]
[1207431.530549] ? _stp_ctl_write_cmd+0x470/0x990 [stap_aa17e8afabf28e68ff1a87d3733594fb_7047]
[1207431.530551] ? full_proxy_write+0x53/0x80
[1207431.530552] ? __vfs_write+0x36/0x1b0
[1207431.530554] ? selinux_file_permission+0xf0/0x130
[1207431.530555] ? security_file_permission+0x2e/0xf0
[1207431.530556] ? vfs_write+0xa5/0x1a0
[1207431.530556] ? ksys_write+0x57/0xd0
[1207431.530558] ? do_syscall_64+0x5b/0x160
[1207431.530559] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment