[PATCH v3 2/6] x86/uaccess: Avoid barrier_nospec() in 64-bit __get_user()
David Laight
David.Laight at ACULAB.COM
Sat Nov 9 04:12:53 AEDT 2024
From: Josh Poimboeuf
> Sent: 29 October 2024 03:28
>
> On Mon, Oct 28, 2024 at 06:56:15PM -0700, Josh Poimboeuf wrote:
> > The barrier_nospec() in 64-bit __get_user() is slow. Instead use
> > pointer masking to force the user pointer to all 1's if a previous
> > access_ok() mispredicted true for an invalid address.
>
> Linus pointed out that __get_user() may be used by some code to access
> both kernel and user space and in fact I found one such usage in
> vc_read_mem()....
>
> So I self-NAK this patch for now.
>
> Still, it would be great if patch 1 could get merged as that gives a
> significant performance boost.
I'm a bit late to the party and still a week behind :-(
But I've wondered if access_ok() ought to be implemented using an
'asm goto with output' - much like get_user().
Then the use would be:
masked_address = access_ok(maybe_bad_address, size, jump_label);
with later user accesses using the masked_address.
Once you've done that __get_user() doesn't need to contain address masking.
Given that clac/stac iare so slow should there are be something that
combines stac with access_ok() bracketed with a 'user_access_end'
or an actual fault.
I've sure there is code (maybe reading iovec[] or in sys_poll())
that wants to do multiple get/put_user in a short loop rather that
calling copy_to/from_user().
David
-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
Registration No: 1397386 (Wales)
More information about the Linuxppc-dev
mailing list