Linux ubuntu 6.8.0-90-generic #91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025 x86_64
nginx/1.24.0
: 67.217.245.49 | : 216.73.216.153
Cant Read [ /etc/named.conf ]
8.3.6
www-data
Bypass.pw
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
[ HOME SHELL ]
Name
Size
Permission
Action
general-hooks
[ DIR ]
drwxr-xr-x
package-hooks
[ DIR ]
drwxr-xr-x
symptoms
[ DIR ]
drwxr-xr-x
testsuite
[ DIR ]
drwxr-xr-x
apport
43.68
KB
-rwxr-xr-x
apport-checkreports
1.37
KB
-rwxr-xr-x
apport.jar
2.38
KB
-rw-r--r--
apportcheckresume
3.64
KB
-rwxr-xr-x
dump_acpi_tables.py
1.72
KB
-rwxr-xr-x
gcc_ice_hook
1.29
KB
-rwxr-xr-x
is-enabled
672
B
-rwxr-xr-x
iwlwifi_error_dump
1.96
KB
-rwxr-xr-x
java_uncaught_exception
2.59
KB
-rwxr-xr-x
kernel_crashdump
2.72
KB
-rwxr-xr-x
kernel_oops
1.25
KB
-rwxr-xr-x
package_hook
2.86
KB
-rwxr-xr-x
recoverable_problem
2.4
KB
-rwxr-xr-x
root_info_wrapper
96
B
-rwxr-xr-x
unkillable_shutdown
3.53
KB
-rwxr-xr-x
whoopsie-upload-all
8.33
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : recoverable_problem
#!/usr/bin/python3 """Report an error that can be recovered from. This application should be called with its standard input pipe fed a nul-separated list of key-value pairs. """ # Copyright (C) 2012 Canonical Ltd. # Author: Evan Dandrea <ev@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. import argparse import os import sys import apport.report # pylint: disable-next=missing-function-docstring def main(): # Check parameters argparser = argparse.ArgumentParser("%(prog) [options]") argparser.add_argument("-p", "--pid", action="store", type=int, dest="optpid") args = argparser.parse_args() # Build the base report report = apport.report.Report("RecoverableProblem") # If we have a parameter pid, use that, otherwise look to our parent if args.optpid: report.pid = args.optpid else: report.pid = os.getppid() # Grab PID info right away, as we don't know how long it'll stick around try: report.add_proc_info(report.pid) except ValueError as error: # The process may have gone away before we could get to it. if str(error) == "invalid process": return # Get the info on the bug items = sys.stdin.read().split("\0") if len(items) % 2 != 0: sys.stderr.write( "Expect even number of fields in stdin," " needs to have pairs of key and value.\n" ) sys.exit(1) while items: key = items.pop(0) if not items: break value = items.pop(0) report[key] = value # Put in the more general stuff report.add_os_info() report.add_user_info() duplicate_signature = report.get("DuplicateSignature", "") exec_path = report.get("ExecutablePath", "") if exec_path and duplicate_signature: report["DuplicateSignature"] = f"{exec_path}:{duplicate_signature}" # Write the final report try: with apport.fileutils.make_report_file(report) as report_file: report.write(report_file) except OSError as error: apport.fatal("Cannot create report: %s", str(error)) if __name__ == "__main__": main()
Close