| /* SPDX-License-Identifier: GPL-2.0 */ |
| #ifndef _LINUX_POISON_H |
| #define _LINUX_POISON_H |
| |
| /********** include/linux/list.h **********/ |
| |
| /* |
| * Architectures might want to move the poison pointer offset |
| * into some well-recognized area such as 0xdead000000000000, |
| * that is also not mappable by user-space exploits: |
| */ |
| #ifdef CONFIG_ILLEGAL_POINTER_VALUE |
| # define POISON_POINTER_DELTA _AC(CONFIG_ILLEGAL_POINTER_VALUE, UL) |
| #else |
| # define POISON_POINTER_DELTA 0 |
| #endif |
| |
| /* |
| * These are non-NULL pointers that will result in page faults |
| * under normal circumstances, used to verify that nobody uses |
| * non-initialized list entries. |
| */ |
| #define LIST_POISON1 ((void *) 0x100 + POISON_POINTER_DELTA) |
| #define LIST_POISON2 ((void *) 0x122 + POISON_POINTER_DELTA) |
| |
| /********** include/linux/timer.h **********/ |
| #define TIMER_ENTRY_STATIC ((void *) 0x300 + POISON_POINTER_DELTA) |
| |
| /********** mm/page_poison.c **********/ |
| #ifdef CONFIG_PAGE_POISONING_ZERO |
| #define PAGE_POISON 0x00 |
| #else |
| #define PAGE_POISON 0xaa |
| #endif |
| |
| /********** mm/page_alloc.c ************/ |
| |
| #define TAIL_MAPPING ((void *) 0x400 + POISON_POINTER_DELTA) |
| |
| /********** mm/slab.c **********/ |
| /* |
| * Magic nums for obj red zoning. |
| * Placed in the first word before and the first word after an obj. |
| */ |
| #define RED_INACTIVE 0x09F911029D74E35BULL /* when obj is inactive */ |
| #define RED_ACTIVE 0xD84156C5635688C0ULL /* when obj is active */ |
| |
| #define SLUB_RED_INACTIVE 0xbb |
| #define SLUB_RED_ACTIVE 0xcc |
| |
| /* ...and for poisoning */ |
| #define POISON_INUSE 0x5a /* for use-uninitialised poisoning */ |
| #define POISON_FREE 0x6b /* for use-after-free poisoning */ |
| #define POISON_END 0xa5 /* end-byte of poisoning */ |
| |
| /********** arch/$ARCH/mm/init.c **********/ |
| #define POISON_FREE_INITMEM 0xcc |
| |
| /********** arch/ia64/hp/common/sba_iommu.c **********/ |
| /* |
| * arch/ia64/hp/common/sba_iommu.c uses a 16-byte poison string with a |
| * value of "SBAIOMMU POISON\0" for spill-over poisoning. |
| */ |
| |
| /********** fs/jbd/journal.c **********/ |
| #define JBD_POISON_FREE 0x5b |
| #define JBD2_POISON_FREE 0x5c |
| |
| /********** drivers/base/dmapool.c **********/ |
| #define POOL_POISON_FREED 0xa7 /* !inuse */ |
| #define POOL_POISON_ALLOCATED 0xa9 /* !initted */ |
| |
| /********** drivers/atm/ **********/ |
| #define ATM_POISON_FREE 0x12 |
| #define ATM_POISON 0xdeadbeef |
| |
| /********** kernel/mutexes **********/ |
| #define MUTEX_DEBUG_INIT 0x11 |
| #define MUTEX_DEBUG_FREE 0x22 |
| #define MUTEX_POISON_WW_CTX ((void *) 0x500 + POISON_POINTER_DELTA) |
| |
| /********** security/ **********/ |
| #define KEY_DESTROY 0xbd |
| |
| #endif |