[ Intrusion Exploit Shell System ]
[ Function mail() ] : [ ON ]
[ Function putenv() ] : [ ON ]

DIR: //usr/src/linux-headers-5.19.0-1025-aws/arch/x86/include/generated/asm / [ GO Home ]



Command BYPASS
Command BIASA
Create Folder
Create File

Item Name
Size
Date
Permissions
View
Delete
Rename
. 4096 2023-05-16 02:12:23 0755
.. 4096 2023-05-16 02:12:23 0755
.syscalls_32.h.cmd 275 2023-04-24 01:35:23 0644
.syscalls_64.h.cmd 280 2023-04-24 01:35:23 0644
.unistd_32_ia32.h.cmd 307 2023-04-24 01:35:23 0644
.unistd_64_x32.h.cmd 303 2023-04-24 01:35:23 0644
.xen-hypercalls.h.cmd 429 2023-04-24 01:35:23 0644
early_ioremap.h 39 2023-04-24 01:35:23 0644
export.h 32 2023-04-24 01:35:23 0644
irq_regs.h 34 2023-04-24 01:35:23 0644
kmap_size.h 35 2023-04-24 01:35:23 0644
local64.h 33 2023-04-24 01:35:23 0644
mcs_spinlock.h 38 2023-04-24 01:35:23 0644
mmiowb.h 32 2023-04-24 01:35:23 0644
module.lds.h 36 2023-04-24 01:35:23 0644
platform-feature.h 42 2023-04-24 01:35:23 0644
rwonce.h 32 2023-04-24 01:35:23 0644
syscalls_32.h 17197 2023-04-24 01:35:23 0644
syscalls_64.h 13525 2023-04-24 01:35:23 0644
unaligned.h 35 2023-04-24 01:35:23 0644
unistd_32_ia32.h 14232 2023-04-24 01:35:23 0644
unistd_64_x32.h 1309 2023-04-24 01:35:23 0644
xen-hypercalls.h 1144 2023-04-24 01:35:23 0644