Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
bug /
linux-image-6.1.0-9-amd64 /
Delete
Unzip
Name
Size
Permission
Date
Action
control
430
B
-rw-r--r--
2020-12-13 08:33
include-0version
106
B
-rw-r--r--
2020-12-13 08:33
include-1cmdline
111
B
-rw-r--r--
2020-12-13 08:33
include-1tainted
1.45
KB
-rw-r--r--
2023-04-21 04:10
include-dmesg
688
B
-rw-r--r--
2020-12-13 08:33
include-model
1.36
KB
-rw-r--r--
2023-05-07 07:04
include-modules
330
B
-rw-r--r--
2020-12-13 08:33
include-network
1.58
KB
-rw-r--r--
2023-04-21 04:10
include-pci
257
B
-rw-r--r--
2020-12-13 08:33
include-pstore
1.46
KB
-rw-r--r--
2020-12-13 08:33
include-usb
251
B
-rw-r--r--
2020-12-13 08:33
info
133
B
-rw-r--r--
2023-05-08 20:16
presubj
447
B
-rw-r--r--
2020-12-13 08:33
script
1.01
KB
-rwxr-xr-x
2020-12-13 08:33
Save
Rename
_check() { if [ $(($tainted & 1<<$1)) -ne 0 ]; then result_short="$result_short$2" result_long="$result_long * $3\n" fi } add_1tainted() { tainted=$(cat /proc/sys/kernel/tainted) if [ "$tainted" -gt 0 ]; then local result_short result_long # Use debian/bin/update-bug-taint-list to update this _check 0 P 'proprietary module was loaded' _check 1 F 'module was force loaded' _check 2 S 'SMP kernel oops on an officially SMP incapable processor' _check 3 R 'module was force unloaded' _check 4 M 'processor reported a Machine Check Exception (MCE)' _check 5 B 'bad page referenced or some unexpected page flags' _check 6 U 'taint requested by userspace application' _check 7 D 'kernel died recently, i.e. there was an OOPS or BUG' _check 8 A 'ACPI table overridden by user' _check 9 W 'kernel issued warning' _check 10 C 'staging driver was loaded' _check 11 I 'workaround for bug in platform firmware applied' _check 12 O 'externally-built ("out-of-tree") module was loaded' _check 13 E 'unsigned module was loaded' _check 14 L 'soft lockup occurred' _check 15 K 'kernel has been live patched' _check 16 X 'auxiliary taint, defined for and used by distros' _check 17 T 'kernel was built with the struct randomization plugin' echo "** Tainted: $result_short ($tainted)" >&3 printf "$result_long" >&3 else echo '** Not tainted' >&3 fi echo >&3 } ask_1tainted() { true }