summaryrefslogtreecommitdiffstats
path: root/lib/strnlen_user.c
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2024-09-22 11:19:35 -0700
committerLinus Torvalds <torvalds@linux-foundation.org>2024-09-22 11:19:35 -0700
commitde5cb0dcb74c294ec527eddfe5094acfdb21ff21 (patch)
treef669adb523b265f9b979c136df8a8334ea74ec62 /lib/strnlen_user.c
parentaf9c191ac2a0c857f59d75b6812fef078ab1cefe (diff)
parent533ab223aa1a036cfe5d6747fa3be92069f80988 (diff)
downloadlinux-stable-de5cb0dcb74c294ec527eddfe5094acfdb21ff21.tar.gz
linux-stable-de5cb0dcb74c294ec527eddfe5094acfdb21ff21.tar.bz2
linux-stable-de5cb0dcb74c294ec527eddfe5094acfdb21ff21.zip
Merge branch 'address-masking'
Merge user access fast validation using address masking. This allows architectures to optionally use a data dependent address masking model instead of a conditional branch for validating user accesses. That avoids the Spectre-v1 speculation barriers. Right now only x86-64 takes advantage of this, and not all architectures will be able to do it. It requires a guard region between the user and kernel address spaces (so that you can't overflow from one to the other), and an easy way to generate a guaranteed-to-fault address for invalid user pointers. Also note that this currently assumes that there is no difference between user read and write accesses. If extended to architectures like powerpc, we'll also need to separate out the user read-vs-write cases. * address-masking: x86: make the masked_user_access_begin() macro use its argument only once x86: do the user address masking outside the user access area x86: support user address masking instead of non-speculative conditional
Diffstat (limited to 'lib/strnlen_user.c')
-rw-r--r--lib/strnlen_user.c9
1 files changed, 9 insertions, 0 deletions
diff --git a/lib/strnlen_user.c b/lib/strnlen_user.c
index feeb935a2299..6e489f9e90f1 100644
--- a/lib/strnlen_user.c
+++ b/lib/strnlen_user.c
@@ -96,6 +96,15 @@ long strnlen_user(const char __user *str, long count)
if (unlikely(count <= 0))
return 0;
+ if (can_do_masked_user_access()) {
+ long retval;
+
+ str = masked_user_access_begin(str);
+ retval = do_strnlen_user(str, count, count);
+ user_read_access_end();
+ return retval;
+ }
+
max_addr = TASK_SIZE_MAX;
src_addr = (unsigned long)untagged_addr(str);
if (likely(src_addr < max_addr)) {