Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
misc /
cgo /
test /
[ HOME SHELL ]
Name
Size
Permission
Action
testdata
[ DIR ]
drwxr-xr-x
backdoor.go
307
B
-rw-r--r--
buildid_linux.go
1.67
KB
-rw-r--r--
callback.go
111.49
KB
-rw-r--r--
callback_c.c
1.31
KB
-rw-r--r--
callback_c_gc.c
591
B
-rw-r--r--
callback_c_gccgo.c
451
B
-rw-r--r--
cgo_linux_test.go
427
B
-rw-r--r--
cgo_stubs_android_test.go
359
B
-rw-r--r--
cgo_test.go
5.56
KB
-rw-r--r--
cgo_thread_lock.go
925
B
-rw-r--r--
cgo_unix_test.go
383
B
-rw-r--r--
cthread_unix.c
682
B
-rw-r--r--
cthread_windows.c
750
B
-rw-r--r--
issue18146.go
2.79
KB
-rw-r--r--
issue20910.c
459
B
-rw-r--r--
issue21897.go
1.4
KB
-rw-r--r--
issue21897b.go
301
B
-rw-r--r--
issue31891.c
299
B
-rw-r--r--
issue4029.c
752
B
-rw-r--r--
issue4029.go
1.37
KB
-rw-r--r--
issue4029w.go
253
B
-rw-r--r--
issue4273.c
320
B
-rw-r--r--
issue4273b.c
374
B
-rw-r--r--
issue4339.c
222
B
-rw-r--r--
issue4339.h
153
B
-rw-r--r--
issue5548_c.c
454
B
-rw-r--r--
issue5740a.c
223
B
-rw-r--r--
issue5740b.c
223
B
-rw-r--r--
issue6833_c.c
303
B
-rw-r--r--
issue6907export_c.c
274
B
-rw-r--r--
issue6997_linux.c
535
B
-rw-r--r--
issue6997_linux.go
878
B
-rw-r--r--
issue7234_test.go
634
B
-rw-r--r--
issue8148.go
601
B
-rw-r--r--
issue8331.h
198
B
-rw-r--r--
issue8517.go
285
B
-rw-r--r--
issue8517_windows.c
517
B
-rw-r--r--
issue8517_windows.go
990
B
-rw-r--r--
issue8694.go
946
B
-rw-r--r--
issue8811.c
216
B
-rw-r--r--
overlaydir_test.go
1.84
KB
-rw-r--r--
pkg_test.go
1.95
KB
-rw-r--r--
setgid_linux.go
847
B
-rw-r--r--
sigaltstack.go
1.73
KB
-rw-r--r--
sigprocmask.c
1.01
KB
-rw-r--r--
sigprocmask.go
807
B
-rw-r--r--
test.go
45.38
KB
-rw-r--r--
test_unix.go
257
B
-rw-r--r--
test_windows.go
234
B
-rw-r--r--
testx.go
10.3
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : issue18146.go
// Copyright 2016 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // +build !windows // Issue 18146: pthread_create failure during syscall.Exec. package cgotest import ( "bytes" "crypto/md5" "os" "os/exec" "runtime" "syscall" "testing" "time" ) func test18146(t *testing.T) { if testing.Short() { t.Skip("skipping in short mode") } if runtime.GOOS == "darwin" { t.Skipf("skipping flaky test on %s; see golang.org/issue/18202", runtime.GOOS) } if runtime.GOARCH == "mips" || runtime.GOARCH == "mips64" { t.Skipf("skipping on %s", runtime.GOARCH) } attempts := 1000 threads := 4 // Restrict the number of attempts based on RLIMIT_NPROC. // Tediously, RLIMIT_NPROC was left out of the syscall package, // probably because it is not in POSIX.1, so we define it here. // It is not defined on Solaris. var nproc int setNproc := true switch runtime.GOOS { default: setNproc = false case "aix": nproc = 9 case "linux": nproc = 6 case "darwin", "dragonfly", "freebsd", "netbsd", "openbsd": nproc = 7 } if setNproc { var rlim syscall.Rlimit if syscall.Getrlimit(nproc, &rlim) == nil { max := int(rlim.Cur) / (threads + 5) if attempts > max { t.Logf("lowering attempts from %d to %d for RLIMIT_NPROC", attempts, max) attempts = max } } } if os.Getenv("test18146") == "exec" { runtime.GOMAXPROCS(1) for n := threads; n > 0; n-- { go func() { for { _ = md5.Sum([]byte("Hello, !")) } }() } runtime.GOMAXPROCS(threads) argv := append(os.Args, "-test.run=NoSuchTestExists") if err := syscall.Exec(os.Args[0], argv, os.Environ()); err != nil { t.Fatal(err) } } var cmds []*exec.Cmd defer func() { for _, cmd := range cmds { cmd.Process.Kill() } }() args := append(append([]string(nil), os.Args[1:]...), "-test.run=Test18146") for n := attempts; n > 0; n-- { cmd := exec.Command(os.Args[0], args...) cmd.Env = append(os.Environ(), "test18146=exec") buf := bytes.NewBuffer(nil) cmd.Stdout = buf cmd.Stderr = buf if err := cmd.Start(); err != nil { // We are starting so many processes that on // some systems (problem seen on Darwin, // Dragonfly, OpenBSD) the fork call will fail // with EAGAIN. if pe, ok := err.(*os.PathError); ok { err = pe.Err } if se, ok := err.(syscall.Errno); ok && (se == syscall.EAGAIN || se == syscall.EMFILE) { time.Sleep(time.Millisecond) continue } t.Error(err) return } cmds = append(cmds, cmd) } failures := 0 for _, cmd := range cmds { err := cmd.Wait() if err == nil { continue } t.Errorf("syscall.Exec failed: %v\n%s", err, cmd.Stdout) failures++ } if failures > 0 { t.Logf("Failed %v of %v attempts.", failures, len(cmds)) } }
Close