|  | /* SPDX-License-Identifier: GPL-2.0 */ | 
|  | #ifndef _LINUX_POISON_H | 
|  | #define _LINUX_POISON_H | 
|  |  | 
|  | /********** include/linux/list.h **********/ | 
|  |  | 
|  | /* | 
|  | * Architectures might want to move the poison pointer offset | 
|  | * into some well-recognized area such as 0xdead000000000000, | 
|  | * that is also not mappable by user-space exploits: | 
|  | */ | 
|  | #ifdef CONFIG_ILLEGAL_POINTER_VALUE | 
|  | # define POISON_POINTER_DELTA _AC(CONFIG_ILLEGAL_POINTER_VALUE, UL) | 
|  | #else | 
|  | # define POISON_POINTER_DELTA 0 | 
|  | #endif | 
|  |  | 
|  | /* | 
|  | * These are non-NULL pointers that will result in page faults | 
|  | * under normal circumstances, used to verify that nobody uses | 
|  | * non-initialized list entries. | 
|  | */ | 
|  | #define LIST_POISON1  ((void *) 0x100 + POISON_POINTER_DELTA) | 
|  | #define LIST_POISON2  ((void *) 0x122 + POISON_POINTER_DELTA) | 
|  |  | 
|  | /********** include/linux/timer.h **********/ | 
|  | #define TIMER_ENTRY_STATIC	((void *) 0x300 + POISON_POINTER_DELTA) | 
|  |  | 
|  | /********** mm/page_poison.c **********/ | 
|  | #define PAGE_POISON 0xaa | 
|  |  | 
|  | /********** mm/page_alloc.c ************/ | 
|  |  | 
|  | #define TAIL_MAPPING	((void *) 0x400 + POISON_POINTER_DELTA) | 
|  |  | 
|  | /********** mm/slab.c **********/ | 
|  | /* | 
|  | * Magic nums for obj red zoning. | 
|  | * Placed in the first word before and the first word after an obj. | 
|  | */ | 
|  | #define	RED_INACTIVE	0x09F911029D74E35BULL	/* when obj is inactive */ | 
|  | #define	RED_ACTIVE	0xD84156C5635688C0ULL	/* when obj is active */ | 
|  |  | 
|  | #define SLUB_RED_INACTIVE	0xbb | 
|  | #define SLUB_RED_ACTIVE		0xcc | 
|  |  | 
|  | /* ...and for poisoning */ | 
|  | #define	POISON_INUSE	0x5a	/* for use-uninitialised poisoning */ | 
|  | #define POISON_FREE	0x6b	/* for use-after-free poisoning */ | 
|  | #define	POISON_END	0xa5	/* end-byte of poisoning */ | 
|  |  | 
|  | /********** arch/$ARCH/mm/init.c **********/ | 
|  | #define POISON_FREE_INITMEM	0xcc | 
|  |  | 
|  | /********** arch/ia64/hp/common/sba_iommu.c **********/ | 
|  | /* | 
|  | * arch/ia64/hp/common/sba_iommu.c uses a 16-byte poison string with a | 
|  | * value of "SBAIOMMU POISON\0" for spill-over poisoning. | 
|  | */ | 
|  |  | 
|  | /********** fs/jbd/journal.c **********/ | 
|  | #define JBD_POISON_FREE		0x5b | 
|  | #define JBD2_POISON_FREE	0x5c | 
|  |  | 
|  | /********** drivers/base/dmapool.c **********/ | 
|  | #define	POOL_POISON_FREED	0xa7	/* !inuse */ | 
|  | #define	POOL_POISON_ALLOCATED	0xa9	/* !initted */ | 
|  |  | 
|  | /********** drivers/atm/ **********/ | 
|  | #define ATM_POISON_FREE		0x12 | 
|  | #define ATM_POISON		0xdeadbeef | 
|  |  | 
|  | /********** kernel/mutexes **********/ | 
|  | #define MUTEX_DEBUG_INIT	0x11 | 
|  | #define MUTEX_DEBUG_FREE	0x22 | 
|  | #define MUTEX_POISON_WW_CTX	((void *) 0x500 + POISON_POINTER_DELTA) | 
|  |  | 
|  | /********** security/ **********/ | 
|  | #define KEY_DESTROY		0xbd | 
|  |  | 
|  | /********** net/core/page_pool.c **********/ | 
|  | #define PP_SIGNATURE		(0x40 + POISON_POINTER_DELTA) | 
|  |  | 
|  | #endif |