OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
apport
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/10/2024 09:42:49 AM
rwxr-xr-x
📄
apport
31.6 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
apport-checkreports
1.24 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
apport.jar
2.38 KB
04/12/2023 05:53:49 PM
rw-r--r--
📄
apportcheckresume
3.14 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
dump_acpi_tables.py
1.41 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
gcc_ice_hook
1.18 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📁
general-hooks
-
05/09/2024 07:13:26 AM
rwxr-xr-x
📄
is-enabled
672 bytes
11/11/2019 09:57:56 PM
rwxr-xr-x
📄
iwlwifi_error_dump
1.92 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
java_uncaught_exception
2.58 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
kernel_crashdump
2.82 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
kernel_oops
1.2 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📁
package-hooks
-
10/28/2024 08:41:33 AM
rwxr-xr-x
📄
package_hook
2.15 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
recoverable_problem
2.25 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
root_info_wrapper
96 bytes
11/11/2019 09:57:56 PM
rwxr-xr-x
📁
symptoms
-
10/21/2019 03:49:20 PM
rwxr-xr-x
📁
testsuite
-
05/09/2024 07:13:26 AM
rwxr-xr-x
📄
unkillable_shutdown
3.41 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
📄
whoopsie-upload-all
5.58 KB
04/12/2023 05:53:49 PM
rwxr-xr-x
Editing: kernel_crashdump
Close
#!/usr/bin/python3 # # Collect information about a kernel oops. # # Copyright (c) 2007 Canonical Ltd. # Author: Martin Pitt <martin.pitt@ubuntu.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See http://www.gnu.org/copyleft/gpl.html for # the full text of the license. import os, re, glob import apport, apport.fileutils pr = apport.Report('KernelCrash') package = apport.packaging.get_kernel_package() pr.add_package(package) pr.add_os_info() vmcore_path = os.path.join(apport.fileutils.report_dir, 'vmcore') # only accept plain files here, not symlinks; otherwise we might recursively # include the report, or similar DoS attacks if os.path.exists(vmcore_path + '.log'): try: log_fd = os.open(vmcore_path + '.log', os.O_RDONLY | os.O_NOFOLLOW) pr['VmCoreLog'] = (os.fdopen(log_fd, 'rb'),) os.unlink(vmcore_path + '.log') except OSError as e: apport.fatal('Cannot open vmcore log: ' + str(e)) if os.path.exists(vmcore_path): try: core_fd = os.open(vmcore_path, os.O_RDONLY | os.O_NOFOLLOW) pr['VmCore'] = (os.fdopen(core_fd, 'rb'),) with apport.fileutils.make_report_file(pr) as f: pr.write(f) except (IOError, OSError) as e: apport.fatal('Cannot create report: ' + str(e)) try: os.unlink(vmcore_path) except OSError: pass # huh, already gone? else: # check for kdump-tools generated dmesg in timestamped dir for dmesg_file in glob.glob(os.path.join(apport.fileutils.report_dir, '*', 'dmesg.*')): timedir = os.path.dirname(dmesg_file) timestamp = os.path.basename(timedir) if re.match('^[0-9]{12}$', timestamp): # we require the containing dir to be owned by root, to avoid users # creating a symlink to someplace else and disclosing data; we just # compare against euid here so that we can test this as non-root if os.lstat(timedir).st_uid != os.geteuid(): apport.fatal('%s has unsafe permissions, ignoring' % timedir) report_name = package + '-' + timestamp + '.crash' try: crash_report = os.path.join(apport.fileutils.report_dir, report_name) dmesg_fd = os.open(dmesg_file, os.O_RDONLY | os.O_NOFOLLOW) pr['VmCoreDmesg'] = (os.fdopen(dmesg_fd, 'rb'),) # TODO: Replace with open(..., 'xb') once we drop Python 2 support with os.fdopen(os.open(crash_report, os.O_WRONLY | os.O_CREAT | os.O_EXCL, 0o640), 'wb') as f: pr.write(f) except (IOError, OSError) as e: apport.fatal('Cannot create report: ' + str(e))