uaccess_64.h 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344
  1. #ifndef __X86_64_UACCESS_H
  2. #define __X86_64_UACCESS_H
  3. /*
  4. * User space memory access functions
  5. */
  6. #include <linux/compiler.h>
  7. #include <linux/errno.h>
  8. #include <linux/prefetch.h>
  9. #include <asm/page.h>
  10. #define __addr_ok(addr) (!((unsigned long)(addr) & \
  11. (current_thread_info()->addr_limit.seg)))
  12. #define ARCH_HAS_SEARCH_EXTABLE
  13. extern void __put_user_1(void);
  14. extern void __put_user_2(void);
  15. extern void __put_user_4(void);
  16. extern void __put_user_8(void);
  17. extern void __put_user_bad(void);
  18. #define __put_user_x(size, ret, x, ptr) \
  19. asm volatile("call __put_user_" #size \
  20. :"=a" (ret) \
  21. :"c" (ptr),"a" (x) \
  22. :"ebx")
  23. #define put_user(x, ptr) \
  24. __put_user_check((__typeof__(*(ptr)))(x), (ptr), sizeof(*(ptr)))
  25. #define __get_user(x, ptr) \
  26. __get_user_nocheck((x), (ptr), sizeof(*(ptr)))
  27. #define __put_user(x, ptr) \
  28. __put_user_nocheck((__typeof__(*(ptr)))(x), (ptr), sizeof(*(ptr)))
  29. #define __get_user_unaligned __get_user
  30. #define __put_user_unaligned __put_user
  31. #define __put_user_nocheck(x, ptr, size) \
  32. ({ \
  33. int __pu_err; \
  34. __put_user_size((x), (ptr), (size), __pu_err); \
  35. __pu_err; \
  36. })
  37. #define __put_user_check(x, ptr, size) \
  38. ({ \
  39. int __pu_err; \
  40. typeof(*(ptr)) __user *__pu_addr = (ptr); \
  41. switch (size) { \
  42. case 1: \
  43. __put_user_x(1, __pu_err, x, __pu_addr); \
  44. break; \
  45. case 2: \
  46. __put_user_x(2, __pu_err, x, __pu_addr); \
  47. break; \
  48. case 4: \
  49. __put_user_x(4, __pu_err, x, __pu_addr); \
  50. break; \
  51. case 8: \
  52. __put_user_x(8, __pu_err, x, __pu_addr); \
  53. break; \
  54. default: \
  55. __put_user_bad(); \
  56. } \
  57. __pu_err; \
  58. })
  59. #define __put_user_size(x, ptr, size, retval) \
  60. do { \
  61. retval = 0; \
  62. __chk_user_ptr(ptr); \
  63. switch (size) { \
  64. case 1: \
  65. __put_user_asm(x, ptr, retval, "b", "b", "iq", -EFAULT);\
  66. break; \
  67. case 2: \
  68. __put_user_asm(x, ptr, retval, "w", "w", "ir", -EFAULT);\
  69. break; \
  70. case 4: \
  71. __put_user_asm(x, ptr, retval, "l", "k", "ir", -EFAULT);\
  72. break; \
  73. case 8: \
  74. __put_user_asm(x, ptr, retval, "q", "", "Zr", -EFAULT); \
  75. break; \
  76. default: \
  77. __put_user_bad(); \
  78. } \
  79. } while (0)
  80. /* FIXME: this hack is definitely wrong -AK */
  81. struct __large_struct { unsigned long buf[100]; };
  82. #define __m(x) (*(struct __large_struct __user *)(x))
  83. /*
  84. * Tell gcc we read from memory instead of writing: this is because
  85. * we do not write to any memory gcc knows about, so there are no
  86. * aliasing issues.
  87. */
  88. #define __put_user_asm(x, addr, err, itype, rtype, ltype, errno) \
  89. asm volatile("1: mov"itype" %"rtype"1,%2\n" \
  90. "2:\n" \
  91. ".section .fixup, \"ax\"\n" \
  92. "3: mov %3,%0\n" \
  93. " jmp 2b\n" \
  94. ".previous\n" \
  95. _ASM_EXTABLE(1b, 3b) \
  96. : "=r"(err) \
  97. : ltype (x), "m" (__m(addr)), "i" (errno), "0" (err))
  98. #define __get_user_nocheck(x, ptr, size) \
  99. ({ \
  100. int __gu_err; \
  101. unsigned long __gu_val; \
  102. __get_user_size(__gu_val, (ptr), (size), __gu_err); \
  103. (x) = (__force typeof(*(ptr)))__gu_val; \
  104. __gu_err; \
  105. })
  106. #define __get_user_size(x, ptr, size, retval) \
  107. do { \
  108. retval = 0; \
  109. __chk_user_ptr(ptr); \
  110. switch (size) { \
  111. case 1: \
  112. __get_user_asm(x, ptr, retval, "b", "b", "=q", -EFAULT);\
  113. break; \
  114. case 2: \
  115. __get_user_asm(x, ptr, retval, "w", "w", "=r", -EFAULT);\
  116. break; \
  117. case 4: \
  118. __get_user_asm(x, ptr, retval, "l", "k", "=r", -EFAULT);\
  119. break; \
  120. case 8: \
  121. __get_user_asm(x, ptr, retval, "q", "", "=r", -EFAULT); \
  122. break; \
  123. default: \
  124. (x) = __get_user_bad(); \
  125. } \
  126. } while (0)
  127. #define __get_user_asm(x, addr, err, itype, rtype, ltype, errno) \
  128. asm volatile("1: mov"itype" %2,%"rtype"1\n" \
  129. "2:\n" \
  130. ".section .fixup, \"ax\"\n" \
  131. "3: mov %3,%0\n" \
  132. " xor"itype" %"rtype"1,%"rtype"1\n" \
  133. " jmp 2b\n" \
  134. ".previous\n" \
  135. _ASM_EXTABLE(1b, 3b) \
  136. : "=r" (err), ltype (x) \
  137. : "m" (__m(addr)), "i"(errno), "0"(err))
  138. /*
  139. * Copy To/From Userspace
  140. */
  141. /* Handles exceptions in both to and from, but doesn't do access_ok */
  142. __must_check unsigned long
  143. copy_user_generic(void *to, const void *from, unsigned len);
  144. __must_check unsigned long
  145. copy_to_user(void __user *to, const void *from, unsigned len);
  146. __must_check unsigned long
  147. copy_from_user(void *to, const void __user *from, unsigned len);
  148. __must_check unsigned long
  149. copy_in_user(void __user *to, const void __user *from, unsigned len);
  150. static __always_inline __must_check
  151. int __copy_from_user(void *dst, const void __user *src, unsigned size)
  152. {
  153. int ret = 0;
  154. if (!__builtin_constant_p(size))
  155. return copy_user_generic(dst, (__force void *)src, size);
  156. switch (size) {
  157. case 1:__get_user_asm(*(u8 *)dst, (u8 __user *)src,
  158. ret, "b", "b", "=q", 1);
  159. return ret;
  160. case 2:__get_user_asm(*(u16 *)dst, (u16 __user *)src,
  161. ret, "w", "w", "=r", 2);
  162. return ret;
  163. case 4:__get_user_asm(*(u32 *)dst, (u32 __user *)src,
  164. ret, "l", "k", "=r", 4);
  165. return ret;
  166. case 8:__get_user_asm(*(u64 *)dst, (u64 __user *)src,
  167. ret, "q", "", "=r", 8);
  168. return ret;
  169. case 10:
  170. __get_user_asm(*(u64 *)dst, (u64 __user *)src,
  171. ret, "q", "", "=r", 16);
  172. if (unlikely(ret))
  173. return ret;
  174. __get_user_asm(*(u16 *)(8 + (char *)dst),
  175. (u16 __user *)(8 + (char __user *)src),
  176. ret, "w", "w", "=r", 2);
  177. return ret;
  178. case 16:
  179. __get_user_asm(*(u64 *)dst, (u64 __user *)src,
  180. ret, "q", "", "=r", 16);
  181. if (unlikely(ret))
  182. return ret;
  183. __get_user_asm(*(u64 *)(8 + (char *)dst),
  184. (u64 __user *)(8 + (char __user *)src),
  185. ret, "q", "", "=r", 8);
  186. return ret;
  187. default:
  188. return copy_user_generic(dst, (__force void *)src, size);
  189. }
  190. }
  191. static __always_inline __must_check
  192. int __copy_to_user(void __user *dst, const void *src, unsigned size)
  193. {
  194. int ret = 0;
  195. if (!__builtin_constant_p(size))
  196. return copy_user_generic((__force void *)dst, src, size);
  197. switch (size) {
  198. case 1:__put_user_asm(*(u8 *)src, (u8 __user *)dst,
  199. ret, "b", "b", "iq", 1);
  200. return ret;
  201. case 2:__put_user_asm(*(u16 *)src, (u16 __user *)dst,
  202. ret, "w", "w", "ir", 2);
  203. return ret;
  204. case 4:__put_user_asm(*(u32 *)src, (u32 __user *)dst,
  205. ret, "l", "k", "ir", 4);
  206. return ret;
  207. case 8:__put_user_asm(*(u64 *)src, (u64 __user *)dst,
  208. ret, "q", "", "ir", 8);
  209. return ret;
  210. case 10:
  211. __put_user_asm(*(u64 *)src, (u64 __user *)dst,
  212. ret, "q", "", "ir", 10);
  213. if (unlikely(ret))
  214. return ret;
  215. asm("":::"memory");
  216. __put_user_asm(4[(u16 *)src], 4 + (u16 __user *)dst,
  217. ret, "w", "w", "ir", 2);
  218. return ret;
  219. case 16:
  220. __put_user_asm(*(u64 *)src, (u64 __user *)dst,
  221. ret, "q", "", "ir", 16);
  222. if (unlikely(ret))
  223. return ret;
  224. asm("":::"memory");
  225. __put_user_asm(1[(u64 *)src], 1 + (u64 __user *)dst,
  226. ret, "q", "", "ir", 8);
  227. return ret;
  228. default:
  229. return copy_user_generic((__force void *)dst, src, size);
  230. }
  231. }
  232. static __always_inline __must_check
  233. int __copy_in_user(void __user *dst, const void __user *src, unsigned size)
  234. {
  235. int ret = 0;
  236. if (!__builtin_constant_p(size))
  237. return copy_user_generic((__force void *)dst,
  238. (__force void *)src, size);
  239. switch (size) {
  240. case 1: {
  241. u8 tmp;
  242. __get_user_asm(tmp, (u8 __user *)src,
  243. ret, "b", "b", "=q", 1);
  244. if (likely(!ret))
  245. __put_user_asm(tmp, (u8 __user *)dst,
  246. ret, "b", "b", "iq", 1);
  247. return ret;
  248. }
  249. case 2: {
  250. u16 tmp;
  251. __get_user_asm(tmp, (u16 __user *)src,
  252. ret, "w", "w", "=r", 2);
  253. if (likely(!ret))
  254. __put_user_asm(tmp, (u16 __user *)dst,
  255. ret, "w", "w", "ir", 2);
  256. return ret;
  257. }
  258. case 4: {
  259. u32 tmp;
  260. __get_user_asm(tmp, (u32 __user *)src,
  261. ret, "l", "k", "=r", 4);
  262. if (likely(!ret))
  263. __put_user_asm(tmp, (u32 __user *)dst,
  264. ret, "l", "k", "ir", 4);
  265. return ret;
  266. }
  267. case 8: {
  268. u64 tmp;
  269. __get_user_asm(tmp, (u64 __user *)src,
  270. ret, "q", "", "=r", 8);
  271. if (likely(!ret))
  272. __put_user_asm(tmp, (u64 __user *)dst,
  273. ret, "q", "", "ir", 8);
  274. return ret;
  275. }
  276. default:
  277. return copy_user_generic((__force void *)dst,
  278. (__force void *)src, size);
  279. }
  280. }
  281. __must_check long
  282. strncpy_from_user(char *dst, const char __user *src, long count);
  283. __must_check long
  284. __strncpy_from_user(char *dst, const char __user *src, long count);
  285. __must_check long strnlen_user(const char __user *str, long n);
  286. __must_check long __strnlen_user(const char __user *str, long n);
  287. __must_check long strlen_user(const char __user *str);
  288. __must_check unsigned long clear_user(void __user *mem, unsigned long len);
  289. __must_check unsigned long __clear_user(void __user *mem, unsigned long len);
  290. __must_check long __copy_from_user_inatomic(void *dst, const void __user *src,
  291. unsigned size);
  292. static __must_check __always_inline int
  293. __copy_to_user_inatomic(void __user *dst, const void *src, unsigned size)
  294. {
  295. return copy_user_generic((__force void *)dst, src, size);
  296. }
  297. #define ARCH_HAS_NOCACHE_UACCESS 1
  298. extern long __copy_user_nocache(void *dst, const void __user *src,
  299. unsigned size, int zerorest);
  300. static inline int __copy_from_user_nocache(void *dst, const void __user *src,
  301. unsigned size)
  302. {
  303. might_sleep();
  304. return __copy_user_nocache(dst, src, size, 1);
  305. }
  306. static inline int __copy_from_user_inatomic_nocache(void *dst,
  307. const void __user *src,
  308. unsigned size)
  309. {
  310. return __copy_user_nocache(dst, src, size, 0);
  311. }
  312. #endif /* __X86_64_UACCESS_H */