Spamworldpro Mini Shell
Spamworldpro


Server : Apache
System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64
User : corals ( 1002)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
Directory :  /usr/share/systemtap/tapset/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/systemtap/tapset/libperl5.26.3-64.stp
/*
   This probe will fire when the perl script enters a subroutine.
 */

probe perl.sub.call = process("/usr/lib64/libperl.so.5.26").mark("sub__entry")
{

  sub = user_string($arg1)
  filename = user_string($arg2)
  lineno = $arg3
  package = user_string($arg4)

}

/*
   This probe will fire when the return from a subroutine has been
   hit.
 */

probe perl.sub.return = process("/usr/lib64/libperl.so.5.26").mark("sub__return")
{

  sub = user_string($arg1)
  filename = user_string($arg2)
  lineno = $arg3
  package = user_string($arg4)

}

/*
   This probe will fire when the Perl interperter changes state.
 */

probe perl.phase.change = process("/usr/lib64/libperl.so.5.26").mark("phase__change")
{
  newphase = user_string($arg1)
  oldphase = user_string($arg2)

}


/*
   Fires when Perl has successfully loaded an individual file.
 */

probe perl.loaded.file = process("/usr/lib64/libperl.so.5.26").mark("loaded__file")
{
  filename = user_string($arg1)

}


/*
   Fires when Perl is about to load an individual file.
 */

probe perl.loading.file = process("/usr/lib64/libperl.so.5.26").mark("loading__file")
{
  filename = user_string($arg1)

}


/*
   Traces the execution of each opcode in the Perl runloop.
 */

probe perl.op.entry = process("/usr/lib64/libperl.so.5.26").mark("op__entry")
{
  opname = user_string($arg1)
}

Spamworldpro Mini