diff options
author | Vasily Kulikov <segoon@openwall.com> | 2015-09-09 15:36:00 -0700 |
---|---|---|
committer | Ziyan <jaraidaniel@gmail.com> | 2016-10-29 01:34:07 +0200 |
commit | 8011fe5fe04171a5ce10d332a8239f1d7342408b (patch) | |
tree | 40e9ca840e3d9b7bfd31ba4f786d0b6a0bf709da /fs | |
parent | 5ffb8561fcbb0ed7857ef07de04f1c42f26815ae (diff) | |
download | kernel_samsung_tuna-8011fe5fe04171a5ce10d332a8239f1d7342408b.zip kernel_samsung_tuna-8011fe5fe04171a5ce10d332a8239f1d7342408b.tar.gz kernel_samsung_tuna-8011fe5fe04171a5ce10d332a8239f1d7342408b.tar.bz2 |
UPSTREAM: include/linux/poison.h: fix LIST_POISON{1,2} offset
(cherry pick from commit 8a5e5e02fc83aaf67053ab53b359af08c6c49aaf)
Poison pointer values should be small enough to find a room in
non-mmap'able/hardly-mmap'able space. E.g. on x86 "poison pointer space"
is located starting from 0x0. Given unprivileged users cannot mmap
anything below mmap_min_addr, it should be safe to use poison pointers
lower than mmap_min_addr.
The current poison pointer values of LIST_POISON{1,2} might be too big for
mmap_min_addr values equal or less than 1 MB (common case, e.g. Ubuntu
uses only 0x10000). There is little point to use such a big value given
the "poison pointer space" below 1 MB is not yet exhausted. Changing it
to a smaller value solves the problem for small mmap_min_addr setups.
The values are suggested by Solar Designer:
http://www.openwall.com/lists/oss-security/2015/05/02/6
Signed-off-by: Vasily Kulikov <segoon@openwall.com>
Cc: Solar Designer <solar@openwall.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: "Kirill A. Shutemov" <kirill.shutemov@linux.intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Bug: 26429468
Bug: 26186802
Bug: 26429519
Change-Id: Ic51614f6cc98e416282f19af96b9d116eff7c08b
Diffstat (limited to 'fs')
0 files changed, 0 insertions, 0 deletions