Linux ubuntu 6.8.0-90-generic #91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025 x86_64
nginx/1.24.0
: 67.217.245.49 | : 216.73.216.153
Cant Read [ /etc/named.conf ]
8.3.6
www-data
Bypass.pw
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
[ HOME SHELL ]
Name
Size
Permission
Action
general-hooks
[ DIR ]
drwxr-xr-x
package-hooks
[ DIR ]
drwxr-xr-x
symptoms
[ DIR ]
drwxr-xr-x
testsuite
[ DIR ]
drwxr-xr-x
apport
43.68
KB
-rwxr-xr-x
apport-checkreports
1.37
KB
-rwxr-xr-x
apport.jar
2.38
KB
-rw-r--r--
apportcheckresume
3.64
KB
-rwxr-xr-x
dump_acpi_tables.py
1.72
KB
-rwxr-xr-x
gcc_ice_hook
1.29
KB
-rwxr-xr-x
is-enabled
672
B
-rwxr-xr-x
iwlwifi_error_dump
1.96
KB
-rwxr-xr-x
java_uncaught_exception
2.59
KB
-rwxr-xr-x
kernel_crashdump
2.72
KB
-rwxr-xr-x
kernel_oops
1.25
KB
-rwxr-xr-x
package_hook
2.86
KB
-rwxr-xr-x
recoverable_problem
2.4
KB
-rwxr-xr-x
root_info_wrapper
96
B
-rwxr-xr-x
unkillable_shutdown
3.53
KB
-rwxr-xr-x
whoopsie-upload-all
8.33
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : kernel_crashdump
#!/usr/bin/python3 # # Copyright (c) 2007 Canonical Ltd. # Author: Martin Pitt <martin.pitt@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. """Collect information about a kernel oops.""" import glob import os import re import apport import apport.fileutils pr = apport.Report("KernelCrash") package = apport.packaging.get_kernel_package() pr.add_package(package) pr.add_os_info() vmcore_path = os.path.join(apport.fileutils.report_dir, "vmcore") # only accept plain files here, not symlinks; otherwise we might recursively # include the report, or similar DoS attacks if os.path.exists(f"{vmcore_path}.log"): try: log_fd = os.open(f"{vmcore_path}.log", os.O_RDONLY | os.O_NOFOLLOW) pr["VmCoreLog"] = (os.fdopen(log_fd, "rb"),) os.unlink(f"{vmcore_path}.log") except OSError as error: apport.fatal("Cannot open vmcore log: %s", str(error)) if os.path.exists(vmcore_path): try: core_fd = os.open(vmcore_path, os.O_RDONLY | os.O_NOFOLLOW) pr["VmCore"] = (os.fdopen(core_fd, "rb"),) with apport.fileutils.make_report_file(pr) as f: pr.write(f) except OSError as error: apport.fatal("Cannot create report: %s", str(error)) try: os.unlink(vmcore_path) except OSError: pass # huh, already gone? else: # check for kdump-tools generated dmesg in timestamped dir for dmesg_file in glob.glob( os.path.join(apport.fileutils.report_dir, "*", "dmesg.*") ): timedir = os.path.dirname(dmesg_file) timestamp = os.path.basename(timedir) if re.match("^[0-9]{12}$", timestamp): # we require the containing dir to be owned by root, to avoid users # creating a symlink to someplace else and disclosing data; we just # compare against euid here so that we can test this as non-root if os.lstat(timedir).st_uid != os.geteuid(): apport.fatal("%s has unsafe permissions, ignoring", timedir) report_name = f"{package}-{timestamp}.crash" try: crash_report = os.path.join(apport.fileutils.report_dir, report_name) dmesg_fd = os.open(dmesg_file, os.O_RDONLY | os.O_NOFOLLOW) pr["VmCoreDmesg"] = (os.fdopen(dmesg_fd, "rb"),) with open(crash_report, "xb") as f: pr.write(f) except OSError as error: apport.fatal("Cannot create report: %s", str(error))
Close