Linux web-conference.aiou.edu.pk 5.4.0-205-generic #225-Ubuntu SMP Fri Jan 10 22:23:35 UTC 2025 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.138.181.14
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
root
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
[ HOME SHELL ]
Name
Size
Permission
Action
general-hooks
[ DIR ]
drwxr-xr-x
package-hooks
[ DIR ]
drwxr-xr-x
symptoms
[ DIR ]
drwxr-xr-x
testsuite
[ DIR ]
drwxr-xr-x
apport
32.03
KB
-rwxr-xr-x
apport-checkreports
1.24
KB
-rwxr-xr-x
apport.jar
2.38
KB
-rw-r--r--
apportcheckresume
3.14
KB
-rwxr-xr-x
dump_acpi_tables.py
1.59
KB
-rwxr-xr-x
gcc_ice_hook
1.18
KB
-rwxr-xr-x
is-enabled
672
B
-rwxr-xr-x
iwlwifi_error_dump
1.92
KB
-rwxr-xr-x
java_uncaught_exception
2.58
KB
-rwxr-xr-x
kernel_crashdump
2.82
KB
-rwxr-xr-x
kernel_oops
1.2
KB
-rwxr-xr-x
package_hook
2.17
KB
-rwxr-xr-x
recoverable_problem
2.25
KB
-rwxr-xr-x
root_info_wrapper
96
B
-rwxr-xr-x
unkillable_shutdown
3.41
KB
-rwxr-xr-x
whoopsie-upload-all
6.13
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : unkillable_shutdown
#!/usr/bin/python3 # # Collect information about processes which are still running after sending # SIGTERM to them (which happens during computer shutdown in # /etc/init.d/sendsigs in Debian/Ubuntu) # # Copyright (c) 2010 Canonical Ltd. # Author: Martin Pitt <martin.pitt@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. import os, os.path, sys, errno, optparse import apport, apport.fileutils, apport.hookutils def parse_argv(): '''Parse command line and return (options, args).''' optparser = optparse.OptionParser('%prog [options]') optparser.add_option('-o', '--omit', metavar='PID', action='append', default=[], dest='blacklist', help='Ignore a particular process ID (can be specified multiple times)') (opts, args) = optparser.parse_args() if len(args) != 0: optparser.error('This program does not take any non-option arguments. Please see --help.') sys.exit(1) return (opts, args) def orphaned_processes(blacklist): '''Yield an iterator of running process IDs. This excludes PIDs which do not have a valid /proc/pid/exe symlink (e. g. kernel processes), the PID of our own process, and everything that is contained in the blacklist argument. ''' my_pid = os.getpid() my_sid = os.getsid(0) for d in os.listdir('/proc'): try: pid = int(d) except ValueError: continue if pid == 1 or pid == my_pid or d in blacklist: apport.warning('ignoring: %s', d) continue try: sid = os.getsid(pid) except OSError: # os.getsid() can fail with "No such process" if the process died # in the meantime continue if sid == my_sid: apport.warning('ignoring same sid: %s', d) continue try: os.readlink(os.path.join('/proc', d, 'exe')) except OSError as e: if e.errno == errno.ENOENT: # kernel thread or similar, silently ignore continue apport.warning('Could not read information about pid %s: %s', d, str(e)) continue yield d def do_report(pid, blacklist): '''Create a report for a particular PID.''' r = apport.Report('Bug') try: r.add_proc_info(pid) except (ValueError, AssertionError): # happens if ExecutablePath doesn't exist (any more?), ignore return r['Tags'] = 'shutdown-hang' r['Title'] = 'does not terminate at computer shutdown' if 'ExecutablePath' in r: r['Title'] = os.path.basename(r['ExecutablePath']) + ' ' + r['Title'] r['Processes'] = apport.hookutils.command_output(['ps', 'aux']) r['InitctlList'] = apport.hookutils.command_output(['initctl', 'list']) if blacklist: r['OmitPids'] = ' '.join(blacklist) try: with apport.fileutils.make_report_file(r) as f: r.write(f) except (IOError, OSError) as e: apport.fatal('Cannot create report: ' + str(e)) # # main # (opts, args) = parse_argv() for p in orphaned_processes(opts.blacklist): do_report(p, opts.blacklist)
Close