1/* SPDX-License-Identifier: GPL-2.0 */ 2#ifndef _LINUX_POISON_H 3#define _LINUX_POISON_H 4 5/********** include/linux/list.h **********/ 6 7/* 8 * Architectures might want to move the poison pointer offset 9 * into some well-recognized area such as 0xdead000000000000, 10 * that is also not mappable by user-space exploits: 11 */ 12#ifdef CONFIG_ILLEGAL_POINTER_VALUE 13# define POISON_POINTER_DELTA _AC(CONFIG_ILLEGAL_POINTER_VALUE, UL) 14#else 15# define POISON_POINTER_DELTA 0 16#endif 17 18#ifdef __cplusplus 19#define LIST_POISON1 NULL 20#define LIST_POISON2 NULL 21#else 22/* 23 * These are non-NULL pointers that will result in page faults 24 * under normal circumstances, used to verify that nobody uses 25 * non-initialized list entries. 26 */ 27#define LIST_POISON1 ((void *) 0x100 + POISON_POINTER_DELTA) 28#define LIST_POISON2 ((void *) 0x200 + POISON_POINTER_DELTA) 29#endif 30 31/********** include/linux/timer.h **********/ 32/* 33 * Magic number "tsta" to indicate a static timer initializer 34 * for the object debugging code. 35 */ 36#define TIMER_ENTRY_STATIC ((void *) 0x300 + POISON_POINTER_DELTA) 37 38/********** mm/debug-pagealloc.c **********/ 39#ifdef CONFIG_PAGE_POISONING_ZERO 40#define PAGE_POISON 0x00 41#else 42#define PAGE_POISON 0xaa 43#endif 44 45/********** mm/page_alloc.c ************/ 46 47#define TAIL_MAPPING ((void *) 0x400 + POISON_POINTER_DELTA) 48 49/********** mm/slab.c **********/ 50/* 51 * Magic nums for obj red zoning. 52 * Placed in the first word before and the first word after an obj. 53 */ 54#define RED_INACTIVE 0x09F911029D74E35BULL /* when obj is inactive */ 55#define RED_ACTIVE 0xD84156C5635688C0ULL /* when obj is active */ 56 57#define SLUB_RED_INACTIVE 0xbb 58#define SLUB_RED_ACTIVE 0xcc 59 60/* ...and for poisoning */ 61#define POISON_INUSE 0x5a /* for use-uninitialised poisoning */ 62#define POISON_FREE 0x6b /* for use-after-free poisoning */ 63#define POISON_END 0xa5 /* end-byte of poisoning */ 64 65/********** arch/$ARCH/mm/init.c **********/ 66#define POISON_FREE_INITMEM 0xcc 67 68/********** arch/ia64/hp/common/sba_iommu.c **********/ 69/* 70 * arch/ia64/hp/common/sba_iommu.c uses a 16-byte poison string with a 71 * value of "SBAIOMMU POISON\0" for spill-over poisoning. 72 */ 73 74/********** fs/jbd/journal.c **********/ 75#define JBD_POISON_FREE 0x5b 76#define JBD2_POISON_FREE 0x5c 77 78/********** drivers/base/dmapool.c **********/ 79#define POOL_POISON_FREED 0xa7 /* !inuse */ 80#define POOL_POISON_ALLOCATED 0xa9 /* !initted */ 81 82/********** drivers/atm/ **********/ 83#define ATM_POISON_FREE 0x12 84#define ATM_POISON 0xdeadbeef 85 86/********** kernel/mutexes **********/ 87#define MUTEX_DEBUG_INIT 0x11 88#define MUTEX_DEBUG_FREE 0x22 89 90/********** security/ **********/ 91#define KEY_DESTROY 0xbd 92 93#endif 94