Re: [PATCHv4 06/10] arm64: add basic pointer authentication support

2018-05-22 Thread Adam Wallis
a buffer overflow exploit results in a segfault with these PAC patches. When I compile the same binary without "-msign-return-address=none", I am able to successfully overflow the stack and execute malicious code. Thanks Adam Tested-by: Adam Wallis <awal...@codeaurora.org> -- A

Re: [PATCHv2 06/12] arm64: add basic pointer authentication support

2018-05-22 Thread Adam Wallis
ions(+), 4 deletions(-) > create mode 100644 arch/arm64/include/asm/pointer_auth.h Mark, I was able to verify that a buffer overflow exploit results in a segfault with these PAC patches. When I compile the same binary without "-msign-return-address=none", I am able to successfully ov

Re: [PATCH] irqchip/gic-v3: Use wmb() instead of smb_wmb() in gic_raise_softirq()

2018-02-01 Thread Adam Wallis
ying to figure out whether or not this need to go >>> to -stable). >>> >> >> We've inspected the code because kernel was causing failures in >> scheduler/IPI_RESCHDULE. >> After some time of debugging, we landed in GIC driver and found that the >&

Re: [RFC 0/9] ARMv8.3 pointer authentication userspace support

2017-04-08 Thread Adam Wallis
> include/uapi/linux/elf.h | 1 + > 21 files changed, 454 insertions(+), 7 deletions(-) > create mode 100644 Documentation/arm64/pointer-authentication.txt > create mode 100644 arch/arm64/include/asm/pointer_auth.h > Tested on Qualcomm platf