Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 18.226.93.177
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
snap /
lxd /
29619 /
share /
openvswitch /
scripts /
[ HOME SHELL ]
Name
Size
Permission
Action
ovs-bugtool-daemons-ver
872
B
-rwxr-xr-x
ovs-bugtool-fdb-show
852
B
-rwxr-xr-x
ovs-bugtool-get-dpdk-nic-numa
977
B
-rwxr-xr-x
ovs-bugtool-get-port-stats
395
B
-rwxr-xr-x
ovs-bugtool-ovs-appctl-dpif
919
B
-rwxr-xr-x
ovs-bugtool-ovs-bridge-datapat...
834
B
-rwxr-xr-x
ovs-bugtool-ovs-ofctl-loop-ove...
1.24
KB
-rwxr-xr-x
ovs-bugtool-ovs-vswitchd-threa...
825
B
-rwxr-xr-x
ovs-bugtool-qos-configs
1.02
KB
-rwxr-xr-x
ovs-bugtool-tc-class-show
981
B
-rwxr-xr-x
ovs-check-dead-ifs
2.92
KB
-rwxr-xr-x
ovs-ctl
18.48
KB
-rwxr-xr-x
ovs-kmod-ctl
5.94
KB
-rwxr-xr-x
ovs-lib
21.62
KB
-rw-r--r--
ovs-monitor-ipsec
50.29
KB
-rwxr-xr-x
ovs-save
5.57
KB
-rwxr-xr-x
ovs-vtep
27.03
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ovs-check-dead-ifs
#! /usr/bin/python3 import os import re import stat import sys if "--help" in sys.argv: sys.stdout.write("""\ ovs-check-dead-ifs: Check for packet sockets for nonexistent network devices. One side effect of the "force-reload-kmod" command that reloads the Open vSwitch kernel module is that all the network devices that the Open vSwitch kernel module implemented get destroyed and then replaced by new instances with the same names. Unfortunately, programs that are listening for packets on the original network devices will not receive packets that arrive on the new instances. This causes some services, such as DHCP, to silently fail. This program looks for such problems and, if it finds any, prints information about programs that are in such a state. The system administrator should then take some action to fix the problem, such as restarting these programs. """) sys.exit(0) elif len(sys.argv) > 1: sys.stderr.write("ovs-check-dead-ifs: no arguments or options accepted " "(use --help for help)\n") sys.exit(1) # Get the set of all valid ifindexes. # # 0 is always valid for our purposes because it means "any interface". valid_ifindexes = set([]) for ifname in os.listdir("/sys/class/net"): fn = "/sys/class/net/%s/ifindex" % ifname try: valid_ifindexes.add(int(open(fn).readline())) except IOError: pass except ValueError: print("%s: unexpected format\n" % fn) # Get inodes for all packet sockets whose ifindexes don't exist. invalid_inodes = set() f = open("/proc/net/packet") f.readline() # Skip header line. for line in f: fields = line.split() ifindex = int(fields[4]) if ifindex not in valid_ifindexes: invalid_inodes.add(int(fields[8])) f.close() if not invalid_inodes: sys.exit(0) # Now find the processes that are using those packet sockets. inode_re = re.compile(r'socket:\[([0-9]+)\]$') bad_pids = set() for pid in os.listdir("/proc"): try: pid = int(pid) except ValueError: continue try: fds = os.listdir("/proc/%d/fd" % pid) except OSError: continue for fd in fds: try: fd = int(fd) except ValueError: continue try: s = os.stat("/proc/%d/fd/%d" % (pid, fd)) except OSError: continue if not stat.S_ISSOCK(s.st_mode): continue try: linkname = os.readlink("/proc/%d/fd/%d" % (pid, fd)) except OSError: continue m = inode_re.match(linkname) if not m: continue inode = int(m.group(1)) if inode in invalid_inodes: bad_pids.add(pid) if bad_pids: print(""" The following processes are listening for packets to arrive on network devices that no longer exist. You may want to restart them.""") sys.stdout.flush() os.execvp("ps", ["ps"] + ["%s" % pspid for pspid in bad_pids])
Close