core, x86: make LIST_POISON less deadly
authorAvi Kivity <avi@qumranet.com>
Sun, 10 Jan 2010 14:28:09 +0000 (16:28 +0200)
committerGreg Kroah-Hartman <gregkh@suse.de>
Wed, 12 May 2010 21:57:00 +0000 (14:57 -0700)
commit5d5890b7cdde133721fc3050abd28085b8dbb2e3
treec6569022c97b46baaf291372d856cb167c077327
parent669805f0492eb6415a6c621fcd1ef6e29fee32b8
core, x86: make LIST_POISON less deadly

commit a29815a333c6c6e677294bbe5958e771d0aad3fd upstream.

The list macros use LIST_POISON1 and LIST_POISON2 as undereferencable
pointers in order to trap erronous use of freed list_heads.  Unfortunately
userspace can arrange for those pointers to actually be dereferencable,
potentially turning an oops to an expolit.

To avoid this allow architectures (currently x86_64 only) to override
the default values for these pointers with truly-undereferencable values.
This is easy on x86_64 as the virtual address space is large and contains
areas that cannot be mapped.

Other 64-bit architectures will likely find similar unmapped ranges.

[ingo: switch to 0xdead000000000000 as the unmapped area]
[ingo: add comments, cleanup]
[jaswinder: eliminate sparse warnings]

Acked-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Jaswinder Singh Rajput <jaswinderrajput@gmail.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Avi Kivity <avi@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
arch/x86/Kconfig
include/linux/poison.h