Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
examples /
interrupt /
[ HOME SHELL ]
Name
Size
Permission
Action
interrupts-by-dev.meta
507
B
-rw-r--r--
interrupts-by-dev.stp
833
B
-rwxr-xr-x
interrupts-by-dev.txt
513
B
-rw-r--r--
scf.meta
610
B
-rw-r--r--
scf.stp
520
B
-rwxr-xr-x
scf.tcl
140
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : scf.stp
#!/usr/bin/stap # scf.stp # A reimplementation of user script:smp_call_function example given at OLS 2005 # in the current language. global traces probe begin { print("Starting probe, type control-c to stop.\n") } probe kernel.function("smp_call_function") { traces[pid(), pexecname(), backtrace()] ++ } probe end { foreach ([pid, name, stack] in traces-) { # sort by frequency encountered printf ("traces[%d,%s,\n", pid, name) print_syms (stack) printf ("] = %d\n", traces[pid, name, stack]); } }
Close