Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.1
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
os /
[ HOME SHELL ]
Name
Size
Permission
Action
exec
[ DIR ]
drwxr-xr-x
signal
[ DIR ]
drwxr-xr-x
user
[ DIR ]
drwxr-xr-x
dir.go
1.99
KB
-rw-r--r--
dir_darwin.go
1.94
KB
-rw-r--r--
dir_plan9.go
1.53
KB
-rw-r--r--
dir_unix.go
1.54
KB
-rw-r--r--
dir_windows.go
1.43
KB
-rw-r--r--
env.go
3.84
KB
-rw-r--r--
env_test.go
3.87
KB
-rw-r--r--
env_unix_test.go
1.27
KB
-rw-r--r--
error.go
4
KB
-rw-r--r--
error_errno.go
246
B
-rw-r--r--
error_plan9.go
234
B
-rw-r--r--
error_posix.go
568
B
-rw-r--r--
error_test.go
4.81
KB
-rw-r--r--
error_unix_test.go
1.52
KB
-rw-r--r--
error_windows_test.go
1.71
KB
-rw-r--r--
example_test.go
2.89
KB
-rw-r--r--
exec.go
5.52
KB
-rw-r--r--
exec_plan9.go
3.29
KB
-rw-r--r--
exec_posix.go
3.22
KB
-rw-r--r--
exec_unix.go
2.12
KB
-rw-r--r--
exec_windows.go
4.88
KB
-rw-r--r--
executable.go
774
B
-rw-r--r--
executable_darwin.go
613
B
-rw-r--r--
executable_freebsd.go
881
B
-rw-r--r--
executable_path.go
2.3
KB
-rw-r--r--
executable_plan9.go
399
B
-rw-r--r--
executable_procfs.go
868
B
-rw-r--r--
executable_solaris.go
695
B
-rw-r--r--
executable_test.go
1.99
KB
-rw-r--r--
executable_windows.go
641
B
-rw-r--r--
export_test.go
286
B
-rw-r--r--
export_unix_test.go
275
B
-rw-r--r--
export_windows_test.go
312
B
-rw-r--r--
fifo_test.go
1.98
KB
-rw-r--r--
file.go
17.69
KB
-rw-r--r--
file_plan9.go
14.12
KB
-rw-r--r--
file_posix.go
4.88
KB
-rw-r--r--
file_unix.go
12.07
KB
-rw-r--r--
file_windows.go
14.19
KB
-rw-r--r--
getwd.go
2.61
KB
-rw-r--r--
getwd_darwin.go
317
B
-rw-r--r--
os_test.go
58.09
KB
-rw-r--r--
os_unix_test.go
8.45
KB
-rw-r--r--
os_windows_test.go
29.5
KB
-rw-r--r--
path.go
1.99
KB
-rw-r--r--
path_plan9.go
497
B
-rw-r--r--
path_test.go
3.08
KB
-rw-r--r--
path_unix.go
1.59
KB
-rw-r--r--
path_windows.go
5.75
KB
-rw-r--r--
path_windows_test.go
2.46
KB
-rw-r--r--
pipe2_bsd.go
617
B
-rw-r--r--
pipe_bsd.go
800
B
-rw-r--r--
pipe_linux.go
1010
B
-rw-r--r--
pipe_test.go
10.32
KB
-rw-r--r--
proc.go
1.84
KB
-rw-r--r--
rawconn.go
992
B
-rw-r--r--
rawconn_test.go
1.13
KB
-rw-r--r--
removeall_at.go
4.72
KB
-rw-r--r--
removeall_noat.go
3.17
KB
-rw-r--r--
removeall_test.go
10.7
KB
-rw-r--r--
stat.go
733
B
-rw-r--r--
stat_aix.go
1.18
KB
-rw-r--r--
stat_darwin.go
1.19
KB
-rw-r--r--
stat_dragonfly.go
1.15
KB
-rw-r--r--
stat_freebsd.go
1.17
KB
-rw-r--r--
stat_js.go
1.2
KB
-rw-r--r--
stat_linux.go
1.16
KB
-rw-r--r--
stat_netbsd.go
1.16
KB
-rw-r--r--
stat_openbsd.go
1.15
KB
-rw-r--r--
stat_plan9.go
2.25
KB
-rw-r--r--
stat_solaris.go
1.15
KB
-rw-r--r--
stat_test.go
6.28
KB
-rw-r--r--
stat_unix.go
1.14
KB
-rw-r--r--
stat_windows.go
3.48
KB
-rw-r--r--
sticky_bsd.go
388
B
-rw-r--r--
sticky_notbsd.go
363
B
-rw-r--r--
str.go
729
B
-rw-r--r--
sys.go
294
B
-rw-r--r--
sys_aix.go
682
B
-rw-r--r--
sys_bsd.go
435
B
-rw-r--r--
sys_js.go
309
B
-rw-r--r--
sys_linux.go
1.04
KB
-rw-r--r--
sys_plan9.go
453
B
-rw-r--r--
sys_solaris.go
265
B
-rw-r--r--
sys_unix.go
545
B
-rw-r--r--
sys_windows.go
874
B
-rw-r--r--
timeout_test.go
13.28
KB
-rw-r--r--
types.go
4.18
KB
-rw-r--r--
types_plan9.go
823
B
-rw-r--r--
types_unix.go
782
B
-rw-r--r--
types_windows.go
6.27
KB
-rw-r--r--
wait_unimp.go
585
B
-rw-r--r--
wait_wait6.go
1.29
KB
-rw-r--r--
wait_waitid.go
1.33
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : os_unix_test.go
// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // +build aix darwin dragonfly freebsd js,wasm linux netbsd openbsd solaris package os_test import ( "io" "io/ioutil" . "os" "path/filepath" "runtime" "strings" "syscall" "testing" "time" ) func init() { isReadonlyError = func(err error) bool { return err == syscall.EROFS } } // For TestRawConnReadWrite. type syscallDescriptor = int func checkUidGid(t *testing.T, path string, uid, gid int) { dir, err := Lstat(path) if err != nil { t.Fatalf("Lstat %q (looking for uid/gid %d/%d): %s", path, uid, gid, err) } sys := dir.Sys().(*syscall.Stat_t) if int(sys.Uid) != uid { t.Errorf("Lstat %q: uid %d want %d", path, sys.Uid, uid) } if int(sys.Gid) != gid { t.Errorf("Lstat %q: gid %d want %d", path, sys.Gid, gid) } } func TestChown(t *testing.T) { // Use TempDir() to make sure we're on a local file system, // so that the group ids returned by Getgroups will be allowed // on the file. On NFS, the Getgroups groups are // basically useless. f := newFile("TestChown", t) defer Remove(f.Name()) defer f.Close() dir, err := f.Stat() if err != nil { t.Fatalf("stat %s: %s", f.Name(), err) } // Can't change uid unless root, but can try // changing the group id. First try our current group. gid := Getgid() t.Log("gid:", gid) if err = Chown(f.Name(), -1, gid); err != nil { t.Fatalf("chown %s -1 %d: %s", f.Name(), gid, err) } sys := dir.Sys().(*syscall.Stat_t) checkUidGid(t, f.Name(), int(sys.Uid), gid) // Then try all the auxiliary groups. groups, err := Getgroups() if err != nil { t.Fatalf("getgroups: %s", err) } t.Log("groups: ", groups) for _, g := range groups { if err = Chown(f.Name(), -1, g); err != nil { t.Fatalf("chown %s -1 %d: %s", f.Name(), g, err) } checkUidGid(t, f.Name(), int(sys.Uid), g) // change back to gid to test fd.Chown if err = f.Chown(-1, gid); err != nil { t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err) } checkUidGid(t, f.Name(), int(sys.Uid), gid) } } func TestFileChown(t *testing.T) { // Use TempDir() to make sure we're on a local file system, // so that the group ids returned by Getgroups will be allowed // on the file. On NFS, the Getgroups groups are // basically useless. f := newFile("TestFileChown", t) defer Remove(f.Name()) defer f.Close() dir, err := f.Stat() if err != nil { t.Fatalf("stat %s: %s", f.Name(), err) } // Can't change uid unless root, but can try // changing the group id. First try our current group. gid := Getgid() t.Log("gid:", gid) if err = f.Chown(-1, gid); err != nil { t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err) } sys := dir.Sys().(*syscall.Stat_t) checkUidGid(t, f.Name(), int(sys.Uid), gid) // Then try all the auxiliary groups. groups, err := Getgroups() if err != nil { t.Fatalf("getgroups: %s", err) } t.Log("groups: ", groups) for _, g := range groups { if err = f.Chown(-1, g); err != nil { t.Fatalf("fchown %s -1 %d: %s", f.Name(), g, err) } checkUidGid(t, f.Name(), int(sys.Uid), g) // change back to gid to test fd.Chown if err = f.Chown(-1, gid); err != nil { t.Fatalf("fchown %s -1 %d: %s", f.Name(), gid, err) } checkUidGid(t, f.Name(), int(sys.Uid), gid) } } func TestLchown(t *testing.T) { // Use TempDir() to make sure we're on a local file system, // so that the group ids returned by Getgroups will be allowed // on the file. On NFS, the Getgroups groups are // basically useless. f := newFile("TestLchown", t) defer Remove(f.Name()) defer f.Close() dir, err := f.Stat() if err != nil { t.Fatalf("stat %s: %s", f.Name(), err) } linkname := f.Name() + "2" if err := Symlink(f.Name(), linkname); err != nil { if runtime.GOOS == "android" && IsPermission(err) { t.Skip("skipping test on Android; permission error creating symlink") } t.Fatalf("link %s -> %s: %v", f.Name(), linkname, err) } defer Remove(linkname) // Can't change uid unless root, but can try // changing the group id. First try our current group. gid := Getgid() t.Log("gid:", gid) if err = Lchown(linkname, -1, gid); err != nil { if err, ok := err.(*PathError); ok && err.Err == syscall.ENOSYS { t.Skip("lchown is unavailable") } t.Fatalf("lchown %s -1 %d: %s", linkname, gid, err) } sys := dir.Sys().(*syscall.Stat_t) checkUidGid(t, linkname, int(sys.Uid), gid) // Then try all the auxiliary groups. groups, err := Getgroups() if err != nil { t.Fatalf("getgroups: %s", err) } t.Log("groups: ", groups) for _, g := range groups { if err = Lchown(linkname, -1, g); err != nil { t.Fatalf("lchown %s -1 %d: %s", linkname, g, err) } checkUidGid(t, linkname, int(sys.Uid), g) // Check that link target's gid is unchanged. checkUidGid(t, f.Name(), int(sys.Uid), int(sys.Gid)) } } // Issue 16919: Readdir must return a non-empty slice or an error. func TestReaddirRemoveRace(t *testing.T) { oldStat := *LstatP defer func() { *LstatP = oldStat }() *LstatP = func(name string) (FileInfo, error) { if strings.HasSuffix(name, "some-file") { // Act like it's been deleted. return nil, ErrNotExist } return oldStat(name) } dir := newDir("TestReaddirRemoveRace", t) defer RemoveAll(dir) if err := ioutil.WriteFile(filepath.Join(dir, "some-file"), []byte("hello"), 0644); err != nil { t.Fatal(err) } d, err := Open(dir) if err != nil { t.Fatal(err) } defer d.Close() fis, err := d.Readdir(2) // notably, greater than zero if len(fis) == 0 && err == nil { // This is what used to happen (Issue 16919) t.Fatal("Readdir = empty slice & err == nil") } if len(fis) != 0 || err != io.EOF { t.Errorf("Readdir = %d entries: %v; want 0, io.EOF", len(fis), err) for i, fi := range fis { t.Errorf(" entry[%d]: %q, %v", i, fi.Name(), fi.Mode()) } t.FailNow() } } // Issue 23120: respect umask when doing Mkdir with the sticky bit func TestMkdirStickyUmask(t *testing.T) { const umask = 0077 dir := newDir("TestMkdirStickyUmask", t) defer RemoveAll(dir) oldUmask := syscall.Umask(umask) defer syscall.Umask(oldUmask) p := filepath.Join(dir, "dir1") if err := Mkdir(p, ModeSticky|0755); err != nil { t.Fatal(err) } fi, err := Stat(p) if err != nil { t.Fatal(err) } if mode := fi.Mode(); (mode&umask) != 0 || (mode&^ModePerm) != (ModeDir|ModeSticky) { t.Errorf("unexpected mode %s", mode) } } // See also issues: 22939, 24331 func newFileTest(t *testing.T, blocking bool) { if runtime.GOOS == "js" { t.Skipf("syscall.Pipe is not available on %s.", runtime.GOOS) } p := make([]int, 2) if err := syscall.Pipe(p); err != nil { t.Fatalf("pipe: %v", err) } defer syscall.Close(p[1]) // Set the read-side to non-blocking. if !blocking { if err := syscall.SetNonblock(p[0], true); err != nil { syscall.Close(p[0]) t.Fatalf("SetNonblock: %v", err) } } // Convert it to a file. file := NewFile(uintptr(p[0]), "notapipe") if file == nil { syscall.Close(p[0]) t.Fatalf("failed to convert fd to file!") } defer file.Close() timeToWrite := 100 * time.Millisecond timeToDeadline := 1 * time.Millisecond if !blocking { // Use a longer time to avoid flakes. // We won't be waiting this long anyhow. timeToWrite = 1 * time.Second } // Try to read with deadline (but don't block forever). b := make([]byte, 1) timer := time.AfterFunc(timeToWrite, func() { syscall.Write(p[1], []byte("a")) }) defer timer.Stop() file.SetReadDeadline(time.Now().Add(timeToDeadline)) _, err := file.Read(b) if !blocking { // We want it to fail with a timeout. if !IsTimeout(err) { t.Fatalf("No timeout reading from file: %v", err) } } else { // We want it to succeed after 100ms if err != nil { t.Fatalf("Error reading from file: %v", err) } } } func TestNewFileBlock(t *testing.T) { t.Parallel() newFileTest(t, true) } func TestNewFileNonBlock(t *testing.T) { t.Parallel() newFileTest(t, false) } func TestSplitPath(t *testing.T) { t.Parallel() for _, tt := range []struct{ path, wantDir, wantBase string }{ {"a", ".", "a"}, {"a/", ".", "a"}, {"a//", ".", "a"}, {"a/b", "a", "b"}, {"a/b/", "a", "b"}, {"a/b/c", "a/b", "c"}, {"/a", "/", "a"}, {"/a/", "/", "a"}, {"/a/b", "/a", "b"}, {"/a/b/", "/a", "b"}, {"/a/b/c", "/a/b", "c"}, {"//a", "/", "a"}, {"//a/", "/", "a"}, {"///a", "/", "a"}, {"///a/", "/", "a"}, } { if dir, base := SplitPath(tt.path); dir != tt.wantDir || base != tt.wantBase { t.Errorf("splitPath(%q) = %q, %q, want %q, %q", tt.path, dir, base, tt.wantDir, tt.wantBase) } } }
Close