Re: [PATCH v5 8/8] lkdtm/powerpc: Fix code patching hijack test

2021-08-11 Thread Christopher M. Riedl
On Thu Aug 5, 2021 at 4:18 AM CDT, Christophe Leroy wrote: > > > Le 13/07/2021 à 07:31, Christopher M. Riedl a écrit : > > Code patching on powerpc with a STRICT_KERNEL_RWX uses a userspace > > address in a temporary mm on Radix now. Use __put_user() to avoid write > > failures due to KUAP when

Re: [PATCH v5 8/8] lkdtm/powerpc: Fix code patching hijack test

2021-08-05 Thread Christophe Leroy
Le 13/07/2021 à 07:31, Christopher M. Riedl a écrit : Code patching on powerpc with a STRICT_KERNEL_RWX uses a userspace address in a temporary mm on Radix now. Use __put_user() to avoid write failures due to KUAP when attempting a "hijack" on the patching address. __put_user() also works

[PATCH v5 8/8] lkdtm/powerpc: Fix code patching hijack test

2021-07-12 Thread Christopher M. Riedl
Code patching on powerpc with a STRICT_KERNEL_RWX uses a userspace address in a temporary mm on Radix now. Use __put_user() to avoid write failures due to KUAP when attempting a "hijack" on the patching address. __put_user() also works with the non-userspace, vmalloc-based patching address on