Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 3.145.49.72
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
apport /
Delete
Unzip
Name
Size
Permission
Date
Action
general-hooks
[ DIR ]
drwxr-xr-x
2024-09-18 19:48
package-hooks
[ DIR ]
drwxr-xr-x
2025-05-06 06:30
symptoms
[ DIR ]
drwxr-xr-x
2024-02-16 18:44
testsuite
[ DIR ]
drwxr-xr-x
2024-09-18 19:48
apport
32.03
KB
-rwxr-xr-x
2024-07-10 14:48
apport-checkreports
1.24
KB
-rwxr-xr-x
2024-07-10 14:48
apport.jar
2.38
KB
-rw-r--r--
2024-07-10 14:48
apportcheckresume
3.14
KB
-rwxr-xr-x
2024-07-10 14:48
dump_acpi_tables.py
1.59
KB
-rwxr-xr-x
2024-07-10 14:48
gcc_ice_hook
1.18
KB
-rwxr-xr-x
2024-07-10 14:48
is-enabled
672
B
-rwxr-xr-x
2023-07-24 18:24
iwlwifi_error_dump
1.92
KB
-rwxr-xr-x
2024-07-10 14:48
java_uncaught_exception
2.58
KB
-rwxr-xr-x
2024-07-10 14:48
kernel_crashdump
2.82
KB
-rwxr-xr-x
2024-07-10 14:48
kernel_oops
1.2
KB
-rwxr-xr-x
2024-07-10 14:48
package_hook
2.17
KB
-rwxr-xr-x
2024-07-10 14:48
recoverable_problem
2.25
KB
-rwxr-xr-x
2024-07-10 14:48
root_info_wrapper
96
B
-rwxr-xr-x
2023-07-24 18:24
unkillable_shutdown
3.41
KB
-rwxr-xr-x
2024-07-10 14:48
whoopsie-upload-all
7.9
KB
-rwxr-xr-x
2024-07-10 14:48
Save
Rename
#!/usr/bin/python3 # # Collect information about a kernel oops. # # Copyright (c) 2007 Canonical Ltd. # Author: Martin Pitt <martin.pitt@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. import os, re, glob import apport, apport.fileutils pr = apport.Report('KernelCrash') package = apport.packaging.get_kernel_package() pr.add_package(package) pr.add_os_info() vmcore_path = os.path.join(apport.fileutils.report_dir, 'vmcore') # only accept plain files here, not symlinks; otherwise we might recursively # include the report, or similar DoS attacks if os.path.exists(vmcore_path + '.log'): try: log_fd = os.open(vmcore_path + '.log', os.O_RDONLY | os.O_NOFOLLOW) pr['VmCoreLog'] = (os.fdopen(log_fd, 'rb'),) os.unlink(vmcore_path + '.log') except OSError as e: apport.fatal('Cannot open vmcore log: ' + str(e)) if os.path.exists(vmcore_path): try: core_fd = os.open(vmcore_path, os.O_RDONLY | os.O_NOFOLLOW) pr['VmCore'] = (os.fdopen(core_fd, 'rb'),) with apport.fileutils.make_report_file(pr) as f: pr.write(f) except (IOError, OSError) as e: apport.fatal('Cannot create report: ' + str(e)) try: os.unlink(vmcore_path) except OSError: pass # huh, already gone? else: # check for kdump-tools generated dmesg in timestamped dir for dmesg_file in glob.glob(os.path.join(apport.fileutils.report_dir, '*', 'dmesg.*')): timedir = os.path.dirname(dmesg_file) timestamp = os.path.basename(timedir) if re.match('^[0-9]{12}$', timestamp): # we require the containing dir to be owned by root, to avoid users # creating a symlink to someplace else and disclosing data; we just # compare against euid here so that we can test this as non-root if os.lstat(timedir).st_uid != os.geteuid(): apport.fatal('%s has unsafe permissions, ignoring' % timedir) report_name = package + '-' + timestamp + '.crash' try: crash_report = os.path.join(apport.fileutils.report_dir, report_name) dmesg_fd = os.open(dmesg_file, os.O_RDONLY | os.O_NOFOLLOW) pr['VmCoreDmesg'] = (os.fdopen(dmesg_fd, 'rb'),) # TODO: Replace with open(..., 'xb') once we drop Python 2 support with os.fdopen(os.open(crash_report, os.O_WRONLY | os.O_CREAT | os.O_EXCL, 0o640), 'wb') as f: pr.write(f) except (IOError, OSError) as e: apport.fatal('Cannot create report: ' + str(e))