Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
tapset /
linux /
i386 /
[ HOME SHELL ]
Name
Size
Permission
Action
aux_syscalls.stp
2.94
KB
-rw-r--r--
sysc_execve.stp
1.94
KB
-rw-r--r--
sysc_get_thread_area.stp
2.31
KB
-rw-r--r--
sysc_iopl.stp
2.4
KB
-rw-r--r--
sysc_ipc.stp
1.49
KB
-rw-r--r--
sysc_mmap2.stp
2.42
KB
-rw-r--r--
sysc_set_thread_area.stp
2.24
KB
-rw-r--r--
sysc_set_zone_reclaim.stp
1.53
KB
-rw-r--r--
sysc_sigaltstack.stp
2.63
KB
-rw-r--r--
sysc_vm86.stp
1.05
KB
-rw-r--r--
sysc_vm86old.stp
1.13
KB
-rw-r--r--
syscall_num.stp
28.63
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sysc_ipc.stp
%( systemtap_v <= "2.7" %? # sys32_ipc() is just a syscall multiplexer (similar to # sys_socketcall()). So, we don't really need to probe it, since we'll # be probing what sys32_ipc() will call (semget, msgsnd, msgrcv, # shmat, etc.). # ipc ________________________________________________________ # int sys_ipc (uint call, int first, int second, int third, void __user *ptr, long fifth) # @define _SYSCALL_IPC_NAME %( name = "ipc" %) @define _SYSCALL_IPC_ARGSTR %( argstr = sprintf("%d, %d, %d, %d, %p, %d", call, first, second, third, ptr_uaddr, fifth) %) probe syscall.ipc = dw_syscall.ipc !, nd_syscall.ipc ? {} probe syscall.ipc.return = dw_syscall.ipc.return !, nd_syscall.ipc.return ? {} # dw_ipc _____________________________________________________ probe dw_syscall.ipc = kernel.function("sys_ipc") ? { @_SYSCALL_IPC_NAME call = $call first = $first second = $second third = $third ptr_uaddr = $ptr fifth = $fifth @_SYSCALL_IPC_ARGSTR } probe dw_syscall.ipc.return = kernel.function("sys_ipc").return ? { @_SYSCALL_IPC_NAME @SYSC_RETVALSTR($return) } # nd_ipc _____________________________________________________ probe nd_syscall.ipc = kprobe.function("sys_ipc") ? { @_SYSCALL_IPC_NAME asmlinkage() call = uint_arg(1) first = int_arg(2) second = int_arg(3) third = int_arg(4) ptr_uaddr = pointer_arg(5) fifth = long_arg(6) @_SYSCALL_IPC_ARGSTR } probe nd_syscall.ipc.return = kprobe.function("sys_ipc").return ? { @_SYSCALL_IPC_NAME @SYSC_RETVALSTR(returnval()) } %)
Close