Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754190AbbHRT3s (ORCPT ); Tue, 18 Aug 2015 15:29:48 -0400 Received: from mail-pd0-f176.google.com ([209.85.192.176]:35770 "EHLO mail-pd0-f176.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754100AbbHRT3q (ORCPT ); Tue, 18 Aug 2015 15:29:46 -0400 From: Jeff Vander Stoep To: catalin.marinas@arm.com Cc: rmk@arm.linux.org.uk, will.deacon@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, nnk@google.com, tstrudel@google.com, Jeff Vander Stoep Subject: [PATCH] arm64 Kconfig: Move LIST_POISON to a safe value Date: Tue, 18 Aug 2015 12:29:37 -0700 Message-Id: <1439926177-13839-1-git-send-email-jeffv@google.com> X-Mailer: git-send-email 2.5.0.276.gf5e568e Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 835 Lines: 32 Move the poison pointer offset to 0xdead000000000000, a recognized value that is not mappable by user-space exploits. Signed-off-by: Jeff Vander Stoep --- arch/arm64/Kconfig | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig index 9532f8d..c003911 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig @@ -91,6 +91,11 @@ config NO_IOPORT_MAP config STACKTRACE_SUPPORT def_bool y +config ILLEGAL_POINTER_VALUE + hex + default 0xdead000000000000 + + config LOCKDEP_SUPPORT def_bool y -- 2.5.0.rc2.392.g76e840b -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/