[PATCH 3.19.y-ckt 062/156] arm64: kconfig: Move LIST_POISON to a safe value
From: Kamal Mostafa
Date: Tue Oct 20 2015 - 18:10:12 EST
3.19.8-ckt8 -stable review patch. If anyone has any objections, please let me know.
------------------
From: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
commit bf0c4e04732479f650ff59d1ee82de761c0071f0 upstream.
Move the poison pointer offset to 0xdead000000000000, a
recognized value that is not mappable by user-space exploits.
Acked-by: Catalin Marinas <catalin.marinas@xxxxxxx>
Signed-off-by: Thierry Strudel <tstrudel@xxxxxxxxxx>
Signed-off-by: Jeff Vander Stoep <jeffv@xxxxxxxxxx>
Signed-off-by: Will Deacon <will.deacon@xxxxxxx>
Signed-off-by: Kamal Mostafa <kamal@xxxxxxxxxxxxx>
---
arch/arm64/Kconfig | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig
index 840c232..5fee0bd 100644
--- a/arch/arm64/Kconfig
+++ b/arch/arm64/Kconfig
@@ -97,6 +97,10 @@ config NO_IOPORT_MAP
config STACKTRACE_SUPPORT
def_bool y
+config ILLEGAL_POINTER_VALUE
+ hex
+ default 0xdead000000000000
+
config LOCKDEP_SUPPORT
def_bool y
--
1.9.1
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/