| // SPDX-License-Identifier: GPL-2.0-only |
| |
| #include <linux/uaccess.h> |
| #include <linux/kernel.h> |
| |
| #include <asm/vsyscall.h> |
| |
| #ifdef CONFIG_X86_64 |
| bool copy_from_kernel_nofault_allowed(const void *unsafe_src, size_t size) |
| { |
| unsigned long vaddr = (unsigned long)unsafe_src; |
| |
| /* |
| * Do not allow userspace addresses. This disallows |
| * normal userspace and the userspace guard page: |
| */ |
| if (vaddr < TASK_SIZE_MAX + PAGE_SIZE) |
| return false; |
| |
| /* |
| * Reading from the vsyscall page may cause an unhandled fault in |
| * certain cases. Though it is at an address above TASK_SIZE_MAX, it is |
| * usually considered as a user space address. |
| */ |
| if (is_vsyscall_vaddr(vaddr)) |
| return false; |
| |
| /* |
| * Allow everything during early boot before 'x86_virt_bits' |
| * is initialized. Needed for instruction decoding in early |
| * exception handlers. |
| */ |
| if (!boot_cpu_data.x86_virt_bits) |
| return true; |
| |
| return __is_canonical_address(vaddr, boot_cpu_data.x86_virt_bits); |
| } |
| #else |
| bool copy_from_kernel_nofault_allowed(const void *unsafe_src, size_t size) |
| { |
| return (unsigned long)unsafe_src >= TASK_SIZE_MAX; |
| } |
| #endif |