HEX
Server: Apache/2.4.65 (Debian)
System: Linux web6 5.10.0-36-amd64 #1 SMP Debian 5.10.244-1 (2025-09-29) x86_64
User: innocamp (1028)
PHP: 7.4.33
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Upload Files
File: //usr/share/bug/linux-image-4.9.0-6-amd64/include-1tainted
TAINT_PROPRIETARY_MODULE=0
TAINT_FORCED_MODULE=1
TAINT_UNSAFE_SMP=2
TAINT_FORCED_RMMOD=3
TAINT_MACHINE_CHECK=4
TAINT_BAD_PAGE=5
TAINT_USER=6
TAINT_DIE=7
TAINT_OVERRIDDEN_ACPI_TABLE=8
TAINT_WARN=9
TAINT_CRAP=10
TAINT_FIRMWARE_WORKAROUND=11
TAINT_OOT_MODULE=12
TAINT_UNSIGNED_MODULE=13
TAINT_SOFTLOCKUP=14
TAINT_LIVEPATCH=15

_check() {
  if [ $(($tainted & 1<<$1)) -ne 0 ]; then
    result_short="$result_short$2"
    result_long="$result_long * $3\n"
  fi
}

add_1tainted() {
  tainted=$(cat /proc/sys/kernel/tainted)
  if [ "$tainted" -gt 0 ]; then
    local result_short result_long
    _check $TAINT_PROPRIETARY_MODULE 'P' 'Proprietary module has been loaded.'
    _check $TAINT_FORCED_MODULE 'F' 'Module has been forcibly loaded.'
    _check $TAINT_UNSAFE_SMP 'S' 'SMP with CPUs not designed for SMP.'
    _check $TAINT_FORCED_RMMOD 'R' 'User forced a module unload.'
    _check $TAINT_MACHINE_CHECK 'M' 'System experienced a machine check exception.'
    _check $TAINT_BAD_PAGE 'B' 'System has hit bad_page.'
    _check $TAINT_USER 'U' 'Userspace-defined naughtiness.'
    _check $TAINT_DIE 'D' 'Kernel has oopsed before.'
    _check $TAINT_OVERRIDDEN_ACPI_TABLE 'A' 'ACPI table overridden.'
    _check $TAINT_WARN 'W' 'Taint on warning.'
    _check $TAINT_CRAP 'C' 'Module from drivers/staging has been loaded.'
    _check $TAINT_FIRMWARE_WORKAROUND 'I' 'Working around severe firmware bug.'
    _check $TAINT_OOT_MODULE 'O' 'Out-of-tree module has been loaded.'
    _check $TAINT_UNSIGNED_MODULE 'E' 'Unsigned module has been loaded.'
    _check $TAINT_SOFTLOCKUP 'L' 'Kernel has detected soft lockup before.'
    _check $TAINT_LIVEPATCH 'K' 'Live patch has been loaded.'
    echo "** Tainted: $result_short ($tainted)" >&3
    printf "$result_long" >&3
  else
    echo '** Not tainted' >&3
  fi
  echo >&3
}

ask_1tainted() {
  true
}