Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
examples /
process /
[ HOME SHELL ]
Name
Size
Permission
Action
auditbt.meta
429
B
-rw-r--r--
auditbt.stp
622
B
-rwxr-xr-x
auditbt.tcl
79
B
-rw-r--r--
chng_cpu.meta
775
B
-rw-r--r--
chng_cpu.stp
1.02
KB
-rwxr-xr-x
chng_cpu.tcl
140
B
-rw-r--r--
cycle_thief.meta
1.06
KB
-rw-r--r--
cycle_thief.stp
2.83
KB
-rwxr-xr-x
cycle_thief.txt
5.83
KB
-rw-r--r--
errsnoop.meta
575
B
-rw-r--r--
errsnoop.stp
1015
B
-rwxr-xr-x
forktracker.meta
525
B
-rw-r--r--
forktracker.stp
601
B
-rwxr-xr-x
futexes.meta
520
B
-rw-r--r--
futexes.stp
1.09
KB
-rwxr-xr-x
futexes.txt
944
B
-rw-r--r--
futexes2.meta
593
B
-rw-r--r--
futexes2.stp
1.97
KB
-rw-r--r--
ltrace.meta
314
B
-rw-r--r--
ltrace.stp
2.94
KB
-rwxr-xr-x
ltrace.tcl
122
B
-rw-r--r--
migrate.meta
746
B
-rw-r--r--
migrate.stp
1.01
KB
-rwxr-xr-x
mutex-contention.meta
479
B
-rw-r--r--
mutex-contention.stp
5.43
KB
-rwxr-xr-x
mutex-contention.tcl
79
B
-rw-r--r--
noptrace.meta
512
B
-rw-r--r--
noptrace.stp
1.98
KB
-rwxr-xr-x
noptrace.txt
1.18
KB
-rw-r--r--
pfiles.meta
450
B
-rw-r--r--
pfiles.stp
23.14
KB
-rwxr-xr-x
plimit.meta
387
B
-rw-r--r--
plimit.stp
2.96
KB
-rwxr-xr-x
proc_snoop.stp
1.11
KB
-rwxr-xr-x
proc_snoop_parser.xml
818
B
-rw-r--r--
proc_snoop_parser_instructions...
2.13
KB
-rw-r--r--
procmod_watcher.meta
657
B
-rw-r--r--
procmod_watcher.stp
2.35
KB
-rw-r--r--
proctop.meta
601
B
-rw-r--r--
proctop.stp
4.15
KB
-rwxr-xr-x
proctop.txt
8.45
KB
-rw-r--r--
psig.meta
354
B
-rw-r--r--
psig.stp
5.48
KB
-rwxr-xr-x
pstrace_exec.meta
545
B
-rw-r--r--
pstrace_exec.stp
465
B
-rwxr-xr-x
pstree.meta
455
B
-rw-r--r--
pstree.stp
1.91
KB
-rwxr-xr-x
rlimit_nofile.meta
319
B
-rw-r--r--
rlimit_nofile.stp
1.12
KB
-rwxr-xr-x
sched-latency.meta
470
B
-rw-r--r--
sched-latency.stp
508
B
-rw-r--r--
sched-latency.txt
1.53
KB
-rw-r--r--
schedtimes.meta
814
B
-rw-r--r--
schedtimes.stp
3.84
KB
-rwxr-xr-x
schedtimes.txt
3.2
KB
-rw-r--r--
semop-watch.meta
267
B
-rw-r--r--
semop-watch.stp
795
B
-rwxr-xr-x
sig_by_pid.meta
357
B
-rw-r--r--
sig_by_pid.stp
1.04
KB
-rwxr-xr-x
sig_by_pid.txt
1.48
KB
-rw-r--r--
sig_by_proc.meta
364
B
-rw-r--r--
sig_by_proc.stp
839
B
-rwxr-xr-x
sig_by_proc.txt
951
B
-rw-r--r--
sigkill.meta
560
B
-rw-r--r--
sigkill.stp
656
B
-rwxr-xr-x
sigmon.meta
669
B
-rw-r--r--
sigmon.stp
932
B
-rwxr-xr-x
sleepingBeauties.meta
581
B
-rw-r--r--
sleepingBeauties.stp
1.33
KB
-rwxr-xr-x
sleepingBeauties.tcl
140
B
-rw-r--r--
sleeptime.meta
601
B
-rw-r--r--
sleeptime.stp
1.2
KB
-rwxr-xr-x
spawn_seeker.meta
854
B
-rw-r--r--
spawn_seeker.stp
1.49
KB
-rwxr-xr-x
spawn_seeker.txt
1.29
KB
-rw-r--r--
strace.meta
385
B
-rw-r--r--
strace.stp
2.03
KB
-rwxr-xr-x
strace.txt
3.59
KB
-rw-r--r--
syscalls_by_pid.meta
514
B
-rw-r--r--
syscalls_by_pid.stp
623
B
-rwxr-xr-x
syscalls_by_pid.txt
597
B
-rw-r--r--
syscalls_by_proc.meta
531
B
-rw-r--r--
syscalls_by_proc.stp
677
B
-rwxr-xr-x
syscalls_by_proc.txt
1.1
KB
-rw-r--r--
syscalltimes
6.14
KB
-rwxr-xr-x
syscalltimes.meta
454
B
-rw-r--r--
syscalltimes.txt
11.19
KB
-rw-r--r--
thread-business.meta
346
B
-rw-r--r--
thread-business.stp
866
B
-rwxr-xr-x
thread-business.txt
2.76
KB
-rw-r--r--
threadstacks.meta
585
B
-rw-r--r--
threadstacks.stp
1.43
KB
-rwxr-xr-x
threadstacks.tcl
79
B
-rw-r--r--
wait4time.meta
658
B
-rw-r--r--
wait4time.stp
1.32
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : psig.stp
#! /bin/sh //bin/true && exec stap -DMAXACTION=10000 -g $0 ${1+"$@"} # psig # Copyright (C) 2008-2012 Red Hat, Inc., Eugene Teo <eteo@redhat.com> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License version 2 as # published by the Free Software Foundation. # # psig reports information about signals by the process id. # # psig is not a port of Solaris' psig tool. It was written based on the example # output at http://developers.sun.com/solaris/articles/solaris_linux_app.html. # This script requires the signal.stp-psig.patch for tapset/signal.stp (not in # the upstream version of SystemTap at the time of writing). # # $ psig $$ | head -10 # 1852: bash # HUP caught 0x0808d040 0 HUP,INT,ILL,TRAP,ABRT,BUS,FPE,USR1,SEGV,USR2,PIPE,ALRM,TERM,XCPU,XFSZ,VTALRM,SYS # INT caught 0x0808d280 0 # QUIT ignored # ILL caught 0x0808d040 0 HUP,INT,ILL,TRAP,ABRT,BUS,FPE,USR1,SEGV,USR2,PIPE,ALRM,TERM,XCPU,XFSZ,VTALRM,SYS # TRAP caught 0x0808d040 0 HUP,INT,ILL,TRAP,ABRT,BUS,FPE,USR1,SEGV,USR2,PIPE,ALRM,TERM,XCPU,XFSZ,VTALRM,SYS # ABRT caught 0x0808d040 0 HUP,INT,ILL,TRAP,ABRT,BUS,FPE,USR1,SEGV,USR2,PIPE,ALRM,TERM,XCPU,XFSZ,VTALRM,SYS # BUS caught 0x0808d040 0 HUP,INT,ILL,TRAP,ABRT,BUS,FPE,USR1,SEGV,USR2,PIPE,ALRM,TERM,XCPU,XFSZ,VTALRM,SYS # FPE caught 0x0808d040 0 HUP,INT,ILL,TRAP,ABRT,BUS,FPE,USR1,SEGV,USR2,PIPE,ALRM,TERM,XCPU,XFSZ,VTALRM,SYS # KILL default # $ stap -V # systemtap-20071229.tar.bz2 # SystemTap translator/driver (version 0.6/0.131 built 2008-01-12) # $ cat /etc/redhat-release # Fedora release 8 (Werewolf) # $ uname -a # Linux kerndev.xxx.redhat.com 2.6.23.9-85.fc8 #1 SMP Fri Dec 7 15:49:59 EST 2007 i686 i686 i386 GNU/Linux # # NOTES: # HUP caught 0x0808d040 0 HUP,INT,ILL,TRAP,ABRT,BUS,... # [.......][.......][..........][.][............................ # |<-- type of signal (1..64) # |<-- signal disposition. it can be SIG_{DFL,IGN,ERR} or a pointer to a function # |<-- address of the signal-catching function # |<-- sa_flags. see the code snippet below # |<-- set of signals to be blocked when executing the handler # # linux-2.6/include/asm-x86/signal.h: # [...] # /* # * SA_FLAGS values: # * # * SA_ONSTACK indicates that a registered stack_t will be used. # * SA_RESTART flag to get restarting signals (which were the default long ago) # * SA_NOCLDSTOP flag to turn off SIGCHLD when children stop. # * SA_RESETHAND clears the handler when the signal is delivered. # * SA_NOCLDWAIT flag on SIGCHLD to inhibit zombies. # * SA_NODEFER prevents the current signal from being masked in the handler. # * # * SA_ONESHOT and SA_NOMASK are the historical Linux names for the Single # * Unix names RESETHAND and NODEFER respectively. # */ # #define SA_NOCLDSTOP 0x00000001u # #define SA_NOCLDWAIT 0x00000002u # #define SA_SIGINFO 0x00000004u # #define SA_ONSTACK 0x08000000u # #define SA_RESTART 0x10000000u # #define SA_NODEFER 0x40000000u # #define SA_RESETHAND 0x80000000u # # #define SA_NOMASK SA_NODEFER # #define SA_ONESHOT SA_RESETHAND # # #define SA_RESTORER 0x04000000 # global _NSIG = 64 function get_k_sigaction:long (task:long, sig:long) %{ struct task_struct *p = (struct task_struct *)((long)STAP_ARG_task); STAP_RETVALUE = (long)&p->sighand->action[(int)STAP_ARG_sig]; %} function get_task_info:string (task:long) %{ char pid[10]; /* just to realign the header properly */ struct task_struct *p = (struct task_struct *)((long)STAP_ARG_task); if (!p) strlcpy(STAP_RETVALUE, "NULL", MAXSTRINGLEN); else { sprintf(pid, "%d:", p->pid); snprintf(STAP_RETVALUE, MAXSTRINGLEN, "%-8s %s", pid, p->comm); } %} function translate_mask:string (mask:string) { str = signal_str(strtol(tokenize(mask, ","), 10)) while (1) { sig = signal_str(strtol(tokenize("", ","), 10)) if (strlen(sig) == 0) break; str = str . "," . sig } return str; } /* * if sa_flags is 0, then return 0. If not, return the interpreted sa_flags. */ function sa_flags_str2:string (sa_flags:string) %{ if (strlen(STAP_ARG_sa_flags) == 0) strcpy(STAP_ARG_sa_flags, "0"); strlcpy (STAP_RETVALUE, STAP_ARG_sa_flags, MAXSTRINGLEN); %} probe begin { %( $# < 1 %? pid = target() %: pid = $1 %) # if (pid == 0) error ("Please provide valid target process-id as $1 or -x PID"); task = pid2task(pid) assert(task, "pid2task: process not found. exiting.\n") task_info = get_task_info(task) assert(!isinstr(task_info, "NULL"), "get_task_info: invalid task_struct. exiting.\n") printf("%s\n", task_info) for (i = 0; i < _NSIG; ++i) { handler_status = "" act = get_k_sigaction(task, i) assert(act, "get_k_sigaction: invalid k_sigaction pointer. exiting.\n") sig = signal_str(i+1) handler = sa_handler_str(get_sa_handler(act)) # XXX: convert hex pointer via usymdata() to useful function if (! (isinstr(handler, "default") || isinstr(handler, "ignored"))) { blocked = is_sig_blocked(task, i+1) if (blocked) handler_status = "blocked," handler_status = handler_status . "caught" } else handler_status = handler flags = sa_flags_str2(sa_flags_str(get_sa_flags(act))) mask = sigset_mask_str(get_sigaction_mask(act)) printf("%-8s %-8s ", sig, handler_status); if (isinstr(handler_status, "caught")) printf("%s %s %s\n", handler, flags, translate_mask(mask)) else printf("\n") } exit() }
Close