|
Message-ID: <20160929224452.GA71670@samitolvanen.mtv.corp.google.com> Date: Thu, 29 Sep 2016 15:44:52 -0700 From: Sami Tolvanen <samitolvanen@...gle.com> To: kernel-hardening@...ts.openwall.com Cc: Catalin Marinas <catalin.marinas@....com>, linux-arm-kernel@...ts.infradead.org, Kees Cook <keescook@...omium.org>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, Will Deacon <will.deacon@....com>, AKASHI Takahiro <takahiro.akashi@...aro.org>, James Morse <james.morse@....com>, andre.przywara@....com, suzuki.poulose@....com Subject: Re: Re: [PATCH v3 0/7] arm64: Privileged Access Never using TTBR0_EL1 switching On Thu, Sep 15, 2016 at 05:20:45PM +0100, Mark Rutland wrote: > Likewise, how do we handle __flush_cache_user_range and > flush_icache_range? Some callers (e.g. __do_compat_cache_op) pass in > __user addresses. Also EXEC_USERSPACE in lkdtm passes a user space address to flush_icache_range and causes the process to hang when I tested these patches on HiKey. Adding uaccess_{enable,disable}_not_uao to __flush_cache_user_range appears to fix the problem. Sami
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.