poison.h 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. /* SPDX-License-Identifier: GPL-2.0 */
  2. #ifndef _LINUX_POISON_H
  3. #define _LINUX_POISON_H
  4. /********** include/linux/list.h **********/
  5. /*
  6. * Architectures might want to move the poison pointer offset
  7. * into some well-recognized area such as 0xdead000000000000,
  8. * that is also not mappable by user-space exploits:
  9. */
  10. #ifdef CONFIG_ILLEGAL_POINTER_VALUE
  11. # define POISON_POINTER_DELTA _AC(CONFIG_ILLEGAL_POINTER_VALUE, UL)
  12. #else
  13. # define POISON_POINTER_DELTA 0
  14. #endif
  15. /*
  16. * These are non-NULL pointers that will result in page faults
  17. * under normal circumstances, used to verify that nobody uses
  18. * non-initialized list entries.
  19. */
  20. #define LIST_POISON1 ((void *) 0x100 + POISON_POINTER_DELTA)
  21. #define LIST_POISON2 ((void *) 0x200 + POISON_POINTER_DELTA)
  22. /********** include/linux/timer.h **********/
  23. /*
  24. * Magic number "tsta" to indicate a static timer initializer
  25. * for the object debugging code.
  26. */
  27. #define TIMER_ENTRY_STATIC ((void *) 0x300 + POISON_POINTER_DELTA)
  28. /********** mm/debug-pagealloc.c **********/
  29. #ifdef CONFIG_PAGE_POISONING_ZERO
  30. #define PAGE_POISON 0x00
  31. #else
  32. #define PAGE_POISON 0xaa
  33. #endif
  34. /********** mm/page_alloc.c ************/
  35. #define TAIL_MAPPING ((void *) 0x400 + POISON_POINTER_DELTA)
  36. /********** mm/slab.c **********/
  37. /*
  38. * Magic nums for obj red zoning.
  39. * Placed in the first word before and the first word after an obj.
  40. */
  41. #define RED_INACTIVE 0x09F911029D74E35BULL /* when obj is inactive */
  42. #define RED_ACTIVE 0xD84156C5635688C0ULL /* when obj is active */
  43. #define SLUB_RED_INACTIVE 0xbb
  44. #define SLUB_RED_ACTIVE 0xcc
  45. /* ...and for poisoning */
  46. #define POISON_INUSE 0x5a /* for use-uninitialised poisoning */
  47. #define POISON_FREE 0x6b /* for use-after-free poisoning */
  48. #define POISON_END 0xa5 /* end-byte of poisoning */
  49. /********** arch/$ARCH/mm/init.c **********/
  50. #define POISON_FREE_INITMEM 0xcc
  51. /********** arch/ia64/hp/common/sba_iommu.c **********/
  52. /*
  53. * arch/ia64/hp/common/sba_iommu.c uses a 16-byte poison string with a
  54. * value of "SBAIOMMU POISON\0" for spill-over poisoning.
  55. */
  56. /********** fs/jbd/journal.c **********/
  57. #define JBD_POISON_FREE 0x5b
  58. #define JBD2_POISON_FREE 0x5c
  59. /********** drivers/base/dmapool.c **********/
  60. #define POOL_POISON_FREED 0xa7 /* !inuse */
  61. #define POOL_POISON_ALLOCATED 0xa9 /* !initted */
  62. /********** drivers/atm/ **********/
  63. #define ATM_POISON_FREE 0x12
  64. #define ATM_POISON 0xdeadbeef
  65. /********** kernel/mutexes **********/
  66. #define MUTEX_DEBUG_INIT 0x11
  67. #define MUTEX_DEBUG_FREE 0x22
  68. #define MUTEX_POISON_WW_CTX ((void *) 0x500 + POISON_POINTER_DELTA)
  69. /********** lib/flex_array.c **********/
  70. #define FLEX_ARRAY_FREE 0x6c /* for use-after-free poisoning */
  71. /********** security/ **********/
  72. #define KEY_DESTROY 0xbd
  73. #endif