Thomas Gleixner | 08dbd0f | 2019-05-29 07:12:41 -0700 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0-only */ |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 2 | /* |
| 3 | * User memory access support for Hexagon |
| 4 | * |
Richard Kuo | e1858b2 | 2012-09-19 16:22:02 -0500 | [diff] [blame] | 5 | * Copyright (c) 2010-2011, The Linux Foundation. All rights reserved. |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 6 | */ |
| 7 | |
| 8 | #ifndef _ASM_UACCESS_H |
| 9 | #define _ASM_UACCESS_H |
| 10 | /* |
| 11 | * User space memory access functions |
| 12 | */ |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 13 | #include <asm/sections.h> |
| 14 | |
| 15 | /* |
| 16 | * access_ok: - Checks if a user space pointer is valid |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 17 | * @addr: User space pointer to start of block to check |
| 18 | * @size: Size of block to check |
| 19 | * |
David Hildenbrand | b3c395ef | 2015-05-11 17:52:08 +0200 | [diff] [blame] | 20 | * Context: User context only. This function may sleep if pagefaults are |
| 21 | * enabled. |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 22 | * |
| 23 | * Checks if a pointer to a block of memory in user space is valid. |
| 24 | * |
| 25 | * Returns true (nonzero) if the memory block *may* be valid, false (zero) |
| 26 | * if it is definitely invalid. |
| 27 | * |
| 28 | * User address space in Hexagon, like x86, goes to 0xbfffffff, so the |
| 29 | * simple MSB-based tests used by MIPS won't work. Some further |
| 30 | * optimization is probably possible here, but for now, keep it |
| 31 | * reasonably simple and not *too* slow. After all, we've got the |
| 32 | * MMU for backup. |
| 33 | */ |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 34 | |
| 35 | #define __access_ok(addr, size) \ |
| 36 | ((get_fs().seg == KERNEL_DS.seg) || \ |
| 37 | (((unsigned long)addr < get_fs().seg) && \ |
| 38 | (unsigned long)size < (get_fs().seg - (unsigned long)addr))) |
| 39 | |
| 40 | /* |
| 41 | * When a kernel-mode page fault is taken, the faulting instruction |
| 42 | * address is checked against a table of exception_table_entries. |
| 43 | * Each entry is a tuple of the address of an instruction that may |
| 44 | * be authorized to fault, and the address at which execution should |
| 45 | * be resumed instead of the faulting instruction, so as to effect |
| 46 | * a workaround. |
| 47 | */ |
| 48 | |
| 49 | /* Assembly somewhat optimized copy routines */ |
Al Viro | ac4691f | 2017-03-28 01:28:09 -0400 | [diff] [blame] | 50 | unsigned long raw_copy_from_user(void *to, const void __user *from, |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 51 | unsigned long n); |
Al Viro | ac4691f | 2017-03-28 01:28:09 -0400 | [diff] [blame] | 52 | unsigned long raw_copy_to_user(void __user *to, const void *from, |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 53 | unsigned long n); |
Al Viro | ac4691f | 2017-03-28 01:28:09 -0400 | [diff] [blame] | 54 | #define INLINE_COPY_FROM_USER |
| 55 | #define INLINE_COPY_TO_USER |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 56 | |
| 57 | __kernel_size_t __clear_user_hexagon(void __user *dest, unsigned long count); |
| 58 | #define __clear_user(a, s) __clear_user_hexagon((a), (s)) |
| 59 | |
| 60 | #define __strncpy_from_user(dst, src, n) hexagon_strncpy_from_user(dst, src, n) |
| 61 | |
| 62 | /* get around the ifndef in asm-generic/uaccess.h */ |
| 63 | #define __strnlen_user __strnlen_user |
| 64 | |
| 65 | extern long __strnlen_user(const char __user *src, long n); |
| 66 | |
| 67 | static inline long hexagon_strncpy_from_user(char *dst, const char __user *src, |
| 68 | long n); |
| 69 | |
| 70 | #include <asm-generic/uaccess.h> |
| 71 | |
| 72 | /* Todo: an actual accelerated version of this. */ |
| 73 | static inline long hexagon_strncpy_from_user(char *dst, const char __user *src, |
| 74 | long n) |
| 75 | { |
| 76 | long res = __strnlen_user(src, n); |
| 77 | |
Al Viro | f35c1e0 | 2016-08-18 21:16:49 -0400 | [diff] [blame] | 78 | if (unlikely(!res)) |
| 79 | return -EFAULT; |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 80 | |
| 81 | if (res > n) { |
Al Viro | ac4691f | 2017-03-28 01:28:09 -0400 | [diff] [blame] | 82 | long left = raw_copy_from_user(dst, src, n); |
| 83 | if (unlikely(left)) |
| 84 | memset(dst + (n - left), 0, left); |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 85 | return n; |
| 86 | } else { |
Al Viro | ac4691f | 2017-03-28 01:28:09 -0400 | [diff] [blame] | 87 | long left = raw_copy_from_user(dst, src, res); |
| 88 | if (unlikely(left)) |
| 89 | memset(dst + (res - left), 0, left); |
Richard Kuo | 7567746 | 2011-10-31 18:48:07 -0500 | [diff] [blame] | 90 | return res-1; |
| 91 | } |
| 92 | } |
| 93 | |
| 94 | #endif |