summaryrefslogtreecommitdiff
path: root/lib/cpu_rmap.c
diff options
context:
space:
mode:
authorChristophe Leroy <christophe.leroy@c-s.fr>2020-11-20 02:42:00 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2020-11-22 12:02:25 +0300
commit8145b3a014e8504f02e15a38f04051fec826f4f2 (patch)
tree62d8e32bf1dc7eeea76ceee269eaede8839f603c /lib/cpu_rmap.c
parent357a5e6febe8839bd217121baa394b11e8fe4085 (diff)
downloadlinux-8145b3a014e8504f02e15a38f04051fec826f4f2.tar.xz
powerpc: Implement user_access_begin and friends
commit 5cd623333e7cf4e3a334c70529268b65f2a6c2c7 upstream. Today, when a function like strncpy_from_user() is called, the userspace access protection is de-activated and re-activated for every word read. By implementing user_access_begin and friends, the protection is de-activated at the beginning of the copy and re-activated at the end. Implement user_access_begin(), user_access_end() and unsafe_get_user(), unsafe_put_user() and unsafe_copy_to_user() For the time being, we keep user_access_save() and user_access_restore() as nops. Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Link: https://lore.kernel.org/r/36d4fbf9e56a75994aca4ee2214c77b26a5a8d35.1579866752.git.christophe.leroy@c-s.fr Signed-off-by: Daniel Axtens <dja@axtens.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'lib/cpu_rmap.c')
0 files changed, 0 insertions, 0 deletions