uaccess.h 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493
  1. /* MN10300 userspace access functions
  2. *
  3. * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
  4. * Written by David Howells (dhowells@redhat.com)
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU General Public Licence
  8. * as published by the Free Software Foundation; either version
  9. * 2 of the Licence, or (at your option) any later version.
  10. */
  11. #ifndef _ASM_UACCESS_H
  12. #define _ASM_UACCESS_H
  13. /*
  14. * User space memory access functions
  15. */
  16. #include <linux/thread_info.h>
  17. #include <asm/page.h>
  18. #include <asm/errno.h>
  19. #define VERIFY_READ 0
  20. #define VERIFY_WRITE 1
  21. /*
  22. * The fs value determines whether argument validity checking should be
  23. * performed or not. If get_fs() == USER_DS, checking is performed, with
  24. * get_fs() == KERNEL_DS, checking is bypassed.
  25. *
  26. * For historical reasons, these macros are grossly misnamed.
  27. */
  28. #define MAKE_MM_SEG(s) ((mm_segment_t) { (s) })
  29. #define KERNEL_XDS MAKE_MM_SEG(0xBFFFFFFF)
  30. #define KERNEL_DS MAKE_MM_SEG(0x9FFFFFFF)
  31. #define USER_DS MAKE_MM_SEG(TASK_SIZE)
  32. #define get_ds() (KERNEL_DS)
  33. #define get_fs() (current_thread_info()->addr_limit)
  34. #define set_fs(x) (current_thread_info()->addr_limit = (x))
  35. #define __kernel_ds_p() (current_thread_info()->addr_limit.seg == 0x9FFFFFFF)
  36. #define segment_eq(a, b) ((a).seg == (b).seg)
  37. #define __addr_ok(addr) \
  38. ((unsigned long)(addr) < (current_thread_info()->addr_limit.seg))
  39. /*
  40. * check that a range of addresses falls within the current address limit
  41. */
  42. static inline int ___range_ok(unsigned long addr, unsigned int size)
  43. {
  44. int flag = 1, tmp;
  45. asm(" add %3,%1 \n" /* set C-flag if addr + size > 4Gb */
  46. " bcs 0f \n"
  47. " cmp %4,%1 \n" /* jump if addr+size>limit (error) */
  48. " bhi 0f \n"
  49. " clr %0 \n" /* mark okay */
  50. "0: \n"
  51. : "=r"(flag), "=&r"(tmp)
  52. : "1"(addr), "ir"(size),
  53. "r"(current_thread_info()->addr_limit.seg), "0"(flag)
  54. : "cc"
  55. );
  56. return flag;
  57. }
  58. #define __range_ok(addr, size) ___range_ok((unsigned long)(addr), (u32)(size))
  59. #define access_ok(type, addr, size) (__range_ok((addr), (size)) == 0)
  60. #define __access_ok(addr, size) (__range_ok((addr), (size)) == 0)
  61. static inline int verify_area(int type, const void *addr, unsigned long size)
  62. {
  63. return access_ok(type, addr, size) ? 0 : -EFAULT;
  64. }
  65. /*
  66. * The exception table consists of pairs of addresses: the first is the
  67. * address of an instruction that is allowed to fault, and the second is
  68. * the address at which the program should continue. No registers are
  69. * modified, so it is entirely up to the continuation code to figure out
  70. * what to do.
  71. *
  72. * All the routines below use bits of fixup code that are out of line
  73. * with the main instruction path. This means when everything is well,
  74. * we don't even have to jump over them. Further, they do not intrude
  75. * on our cache or tlb entries.
  76. */
  77. struct exception_table_entry
  78. {
  79. unsigned long insn, fixup;
  80. };
  81. /* Returns 0 if exception not found and fixup otherwise. */
  82. extern int fixup_exception(struct pt_regs *regs);
  83. #define put_user(x, ptr) __put_user_check((x), (ptr), sizeof(*(ptr)))
  84. #define get_user(x, ptr) __get_user_check((x), (ptr), sizeof(*(ptr)))
  85. /*
  86. * The "__xxx" versions do not do address space checking, useful when
  87. * doing multiple accesses to the same area (the user has to do the
  88. * checks by hand with "access_ok()")
  89. */
  90. #define __put_user(x, ptr) __put_user_nocheck((x), (ptr), sizeof(*(ptr)))
  91. #define __get_user(x, ptr) __get_user_nocheck((x), (ptr), sizeof(*(ptr)))
  92. /*
  93. * The "xxx_ret" versions return constant specified in third argument, if
  94. * something bad happens. These macros can be optimized for the
  95. * case of just returning from the function xxx_ret is used.
  96. */
  97. #define put_user_ret(x, ptr, ret) \
  98. ({ if (put_user((x), (ptr))) return (ret); })
  99. #define get_user_ret(x, ptr, ret) \
  100. ({ if (get_user((x), (ptr))) return (ret); })
  101. #define __put_user_ret(x, ptr, ret) \
  102. ({ if (__put_user((x), (ptr))) return (ret); })
  103. #define __get_user_ret(x, ptr, ret) \
  104. ({ if (__get_user((x), (ptr))) return (ret); })
  105. struct __large_struct { unsigned long buf[100]; };
  106. #define __m(x) (*(struct __large_struct *)(x))
  107. #define __get_user_nocheck(x, ptr, size) \
  108. ({ \
  109. unsigned long __gu_addr; \
  110. int __gu_err; \
  111. __gu_addr = (unsigned long) (ptr); \
  112. switch (size) { \
  113. case 1: { \
  114. unsigned char __gu_val; \
  115. __get_user_asm("bu"); \
  116. (x) = *(__force __typeof__(*(ptr))*) &__gu_val; \
  117. break; \
  118. } \
  119. case 2: { \
  120. unsigned short __gu_val; \
  121. __get_user_asm("hu"); \
  122. (x) = *(__force __typeof__(*(ptr))*) &__gu_val; \
  123. break; \
  124. } \
  125. case 4: { \
  126. unsigned int __gu_val; \
  127. __get_user_asm(""); \
  128. (x) = *(__force __typeof__(*(ptr))*) &__gu_val; \
  129. break; \
  130. } \
  131. default: \
  132. __get_user_unknown(); \
  133. break; \
  134. } \
  135. __gu_err; \
  136. })
  137. #define __get_user_check(x, ptr, size) \
  138. ({ \
  139. int _e; \
  140. if (likely(__access_ok((unsigned long) (ptr), (size)))) \
  141. _e = __get_user_nocheck((x), (ptr), (size)); \
  142. else { \
  143. _e = -EFAULT; \
  144. (x) = (__typeof__(x))0; \
  145. } \
  146. _e; \
  147. })
  148. #define __get_user_asm(INSN) \
  149. ({ \
  150. asm volatile( \
  151. "1:\n" \
  152. " mov"INSN" %2,%1\n" \
  153. " mov 0,%0\n" \
  154. "2:\n" \
  155. " .section .fixup,\"ax\"\n" \
  156. "3:\n\t" \
  157. " mov %3,%0\n" \
  158. " jmp 2b\n" \
  159. " .previous\n" \
  160. " .section __ex_table,\"a\"\n" \
  161. " .balign 4\n" \
  162. " .long 1b, 3b\n" \
  163. " .previous" \
  164. : "=&r" (__gu_err), "=&r" (__gu_val) \
  165. : "m" (__m(__gu_addr)), "i" (-EFAULT)); \
  166. })
  167. extern int __get_user_unknown(void);
  168. #define __put_user_nocheck(x, ptr, size) \
  169. ({ \
  170. union { \
  171. __typeof__(*(ptr)) val; \
  172. u32 bits[2]; \
  173. } __pu_val; \
  174. unsigned long __pu_addr; \
  175. int __pu_err; \
  176. __pu_val.val = (x); \
  177. __pu_addr = (unsigned long) (ptr); \
  178. switch (size) { \
  179. case 1: __put_user_asm("bu"); break; \
  180. case 2: __put_user_asm("hu"); break; \
  181. case 4: __put_user_asm("" ); break; \
  182. case 8: __put_user_asm8(); break; \
  183. default: __pu_err = __put_user_unknown(); break; \
  184. } \
  185. __pu_err; \
  186. })
  187. #define __put_user_check(x, ptr, size) \
  188. ({ \
  189. union { \
  190. __typeof__(*(ptr)) val; \
  191. u32 bits[2]; \
  192. } __pu_val; \
  193. unsigned long __pu_addr; \
  194. int __pu_err; \
  195. __pu_val.val = (x); \
  196. __pu_addr = (unsigned long) (ptr); \
  197. if (likely(__access_ok(__pu_addr, size))) { \
  198. switch (size) { \
  199. case 1: __put_user_asm("bu"); break; \
  200. case 2: __put_user_asm("hu"); break; \
  201. case 4: __put_user_asm("" ); break; \
  202. case 8: __put_user_asm8(); break; \
  203. default: __pu_err = __put_user_unknown(); break; \
  204. } \
  205. } \
  206. else { \
  207. __pu_err = -EFAULT; \
  208. } \
  209. __pu_err; \
  210. })
  211. #define __put_user_asm(INSN) \
  212. ({ \
  213. asm volatile( \
  214. "1:\n" \
  215. " mov"INSN" %1,%2\n" \
  216. " mov 0,%0\n" \
  217. "2:\n" \
  218. " .section .fixup,\"ax\"\n" \
  219. "3:\n" \
  220. " mov %3,%0\n" \
  221. " jmp 2b\n" \
  222. " .previous\n" \
  223. " .section __ex_table,\"a\"\n" \
  224. " .balign 4\n" \
  225. " .long 1b, 3b\n" \
  226. " .previous" \
  227. : "=&r" (__pu_err) \
  228. : "r" (__pu_val.val), "m" (__m(__pu_addr)), \
  229. "i" (-EFAULT) \
  230. ); \
  231. })
  232. #define __put_user_asm8() \
  233. ({ \
  234. asm volatile( \
  235. "1: mov %1,%3 \n" \
  236. "2: mov %2,%4 \n" \
  237. " mov 0,%0 \n" \
  238. "3: \n" \
  239. " .section .fixup,\"ax\" \n" \
  240. "4: \n" \
  241. " mov %5,%0 \n" \
  242. " jmp 3b \n" \
  243. " .previous \n" \
  244. " .section __ex_table,\"a\"\n" \
  245. " .balign 4 \n" \
  246. " .long 1b, 4b \n" \
  247. " .long 2b, 4b \n" \
  248. " .previous \n" \
  249. : "=&r" (__pu_err) \
  250. : "r" (__pu_val.bits[0]), "r" (__pu_val.bits[1]), \
  251. "m" (__m(__pu_addr)), "m" (__m(__pu_addr+4)), \
  252. "i" (-EFAULT) \
  253. ); \
  254. })
  255. extern int __put_user_unknown(void);
  256. /*
  257. * Copy To/From Userspace
  258. */
  259. /* Generic arbitrary sized copy. */
  260. #define __copy_user(to, from, size) \
  261. do { \
  262. if (size) { \
  263. void *__to = to; \
  264. const void *__from = from; \
  265. int w; \
  266. asm volatile( \
  267. "0: movbu (%0),%3;\n" \
  268. "1: movbu %3,(%1);\n" \
  269. " inc %0;\n" \
  270. " inc %1;\n" \
  271. " add -1,%2;\n" \
  272. " bne 0b;\n" \
  273. "2:\n" \
  274. " .section .fixup,\"ax\"\n" \
  275. "3: jmp 2b\n" \
  276. " .previous\n" \
  277. " .section __ex_table,\"a\"\n" \
  278. " .balign 4\n" \
  279. " .long 0b,3b\n" \
  280. " .long 1b,3b\n" \
  281. " .previous\n" \
  282. : "=a"(__from), "=a"(__to), "=r"(size), "=&r"(w)\
  283. : "0"(__from), "1"(__to), "2"(size) \
  284. : "cc", "memory"); \
  285. } \
  286. } while (0)
  287. #define __copy_user_zeroing(to, from, size) \
  288. do { \
  289. if (size) { \
  290. void *__to = to; \
  291. const void *__from = from; \
  292. int w; \
  293. asm volatile( \
  294. "0: movbu (%0),%3;\n" \
  295. "1: movbu %3,(%1);\n" \
  296. " inc %0;\n" \
  297. " inc %1;\n" \
  298. " add -1,%2;\n" \
  299. " bne 0b;\n" \
  300. "2:\n" \
  301. " .section .fixup,\"ax\"\n" \
  302. "3:\n" \
  303. " mov %2,%0\n" \
  304. " clr %3\n" \
  305. "4: movbu %3,(%1);\n" \
  306. " inc %1;\n" \
  307. " add -1,%2;\n" \
  308. " bne 4b;\n" \
  309. " mov %0,%2\n" \
  310. " jmp 2b\n" \
  311. " .previous\n" \
  312. " .section __ex_table,\"a\"\n" \
  313. " .balign 4\n" \
  314. " .long 0b,3b\n" \
  315. " .long 1b,3b\n" \
  316. " .previous\n" \
  317. : "=a"(__from), "=a"(__to), "=r"(size), "=&r"(w)\
  318. : "0"(__from), "1"(__to), "2"(size) \
  319. : "cc", "memory"); \
  320. } \
  321. } while (0)
  322. /* We let the __ versions of copy_from/to_user inline, because they're often
  323. * used in fast paths and have only a small space overhead.
  324. */
  325. static inline
  326. unsigned long __generic_copy_from_user_nocheck(void *to, const void *from,
  327. unsigned long n)
  328. {
  329. __copy_user_zeroing(to, from, n);
  330. return n;
  331. }
  332. static inline
  333. unsigned long __generic_copy_to_user_nocheck(void *to, const void *from,
  334. unsigned long n)
  335. {
  336. __copy_user(to, from, n);
  337. return n;
  338. }
  339. #if 0
  340. #error "don't use - these macros don't increment to & from pointers"
  341. /* Optimize just a little bit when we know the size of the move. */
  342. #define __constant_copy_user(to, from, size) \
  343. do { \
  344. asm volatile( \
  345. " mov %0,a0;\n" \
  346. "0: movbu (%1),d3;\n" \
  347. "1: movbu d3,(%2);\n" \
  348. " add -1,a0;\n" \
  349. " bne 0b;\n" \
  350. "2:;" \
  351. ".section .fixup,\"ax\"\n" \
  352. "3: jmp 2b\n" \
  353. ".previous\n" \
  354. ".section __ex_table,\"a\"\n" \
  355. " .balign 4\n" \
  356. " .long 0b,3b\n" \
  357. " .long 1b,3b\n" \
  358. ".previous" \
  359. : \
  360. : "d"(size), "d"(to), "d"(from) \
  361. : "d3", "a0"); \
  362. } while (0)
  363. /* Optimize just a little bit when we know the size of the move. */
  364. #define __constant_copy_user_zeroing(to, from, size) \
  365. do { \
  366. asm volatile( \
  367. " mov %0,a0;\n" \
  368. "0: movbu (%1),d3;\n" \
  369. "1: movbu d3,(%2);\n" \
  370. " add -1,a0;\n" \
  371. " bne 0b;\n" \
  372. "2:;" \
  373. ".section .fixup,\"ax\"\n" \
  374. "3: jmp 2b\n" \
  375. ".previous\n" \
  376. ".section __ex_table,\"a\"\n" \
  377. " .balign 4\n" \
  378. " .long 0b,3b\n" \
  379. " .long 1b,3b\n" \
  380. ".previous" \
  381. : \
  382. : "d"(size), "d"(to), "d"(from) \
  383. : "d3", "a0"); \
  384. } while (0)
  385. static inline
  386. unsigned long __constant_copy_to_user(void *to, const void *from,
  387. unsigned long n)
  388. {
  389. if (access_ok(VERIFY_WRITE, to, n))
  390. __constant_copy_user(to, from, n);
  391. return n;
  392. }
  393. static inline
  394. unsigned long __constant_copy_from_user(void *to, const void *from,
  395. unsigned long n)
  396. {
  397. if (access_ok(VERIFY_READ, from, n))
  398. __constant_copy_user_zeroing(to, from, n);
  399. return n;
  400. }
  401. static inline
  402. unsigned long __constant_copy_to_user_nocheck(void *to, const void *from,
  403. unsigned long n)
  404. {
  405. __constant_copy_user(to, from, n);
  406. return n;
  407. }
  408. static inline
  409. unsigned long __constant_copy_from_user_nocheck(void *to, const void *from,
  410. unsigned long n)
  411. {
  412. __constant_copy_user_zeroing(to, from, n);
  413. return n;
  414. }
  415. #endif
  416. extern unsigned long __generic_copy_to_user(void __user *, const void *,
  417. unsigned long);
  418. extern unsigned long __generic_copy_from_user(void *, const void __user *,
  419. unsigned long);
  420. #define __copy_to_user_inatomic(to, from, n) \
  421. __generic_copy_to_user_nocheck((to), (from), (n))
  422. #define __copy_from_user_inatomic(to, from, n) \
  423. __generic_copy_from_user_nocheck((to), (from), (n))
  424. #define __copy_to_user(to, from, n) \
  425. ({ \
  426. might_sleep(); \
  427. __copy_to_user_inatomic((to), (from), (n)); \
  428. })
  429. #define __copy_from_user(to, from, n) \
  430. ({ \
  431. might_sleep(); \
  432. __copy_from_user_inatomic((to), (from), (n)); \
  433. })
  434. #define copy_to_user(to, from, n) __generic_copy_to_user((to), (from), (n))
  435. #define copy_from_user(to, from, n) __generic_copy_from_user((to), (from), (n))
  436. extern long strncpy_from_user(char *dst, const char __user *src, long count);
  437. extern long __strncpy_from_user(char *dst, const char __user *src, long count);
  438. extern long strnlen_user(const char __user *str, long n);
  439. #define strlen_user(str) strnlen_user(str, ~0UL >> 1)
  440. extern unsigned long clear_user(void __user *mem, unsigned long len);
  441. extern unsigned long __clear_user(void __user *mem, unsigned long len);
  442. #endif /* _ASM_UACCESS_H */