diff options
author | Christophe Leroy <christophe.leroy@c-s.fr> | 2020-01-24 14:54:44 +0300 |
---|---|---|
committer | Michael Ellerman <mpe@ellerman.id.au> | 2020-01-28 15:14:44 +0300 |
commit | 5cd623333e7cf4e3a334c70529268b65f2a6c2c7 (patch) | |
tree | 0b94f20e3e702b1d3dd7065606cd9d36d3ebf750 /mm/shmem.c | |
parent | bedb4dbe443c11ff551b4ae4e48c8676fdc96467 (diff) | |
download | linux-5cd623333e7cf4e3a334c70529268b65f2a6c2c7.tar.xz |
powerpc: Implement user_access_begin and friends
Today, when a function like strncpy_from_user() is called,
the userspace access protection is de-activated and re-activated
for every word read.
By implementing user_access_begin and friends, the protection
is de-activated at the beginning of the copy and re-activated at the
end.
Implement user_access_begin(), user_access_end() and
unsafe_get_user(), unsafe_put_user() and unsafe_copy_to_user()
For the time being, we keep user_access_save() and
user_access_restore() as nops.
Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/36d4fbf9e56a75994aca4ee2214c77b26a5a8d35.1579866752.git.christophe.leroy@c-s.fr
Diffstat (limited to 'mm/shmem.c')
0 files changed, 0 insertions, 0 deletions