blob: e935318804f8aedb6319c4f63f89e5bf8a46c5b0 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Arnd Bergmanneed417d2009-05-13 22:56:37 +00002#ifndef __ASM_GENERIC_UACCESS_H
3#define __ASM_GENERIC_UACCESS_H
4
5/*
6 * User space memory access functions, these should work
Geert Uytterhoeven0a4a6642013-12-30 10:06:33 +01007 * on any machine that has kernel and user data in the same
Arnd Bergmanneed417d2009-05-13 22:56:37 +00008 * address space, e.g. all NOMMU machines.
9 */
Arnd Bergmanneed417d2009-05-13 22:56:37 +000010#include <linux/string.h>
11
Christoph Hellwigbd79f942019-04-23 18:38:08 +020012#ifdef CONFIG_UACCESS_MEMCPY
13static inline __must_check unsigned long
14raw_copy_from_user(void *to, const void __user * from, unsigned long n)
15{
16 if (__builtin_constant_p(n)) {
17 switch(n) {
18 case 1:
19 *(u8 *)to = *(u8 __force *)from;
20 return 0;
21 case 2:
22 *(u16 *)to = *(u16 __force *)from;
23 return 0;
24 case 4:
25 *(u32 *)to = *(u32 __force *)from;
26 return 0;
Christoph Hellwig6edd1db2019-04-23 18:38:09 +020027#ifdef CONFIG_64BIT
28 case 8:
29 *(u64 *)to = *(u64 __force *)from;
30 return 0;
31#endif
Christoph Hellwigbd79f942019-04-23 18:38:08 +020032 }
33 }
34
35 memcpy(to, (const void __force *)from, n);
36 return 0;
37}
38
39static inline __must_check unsigned long
40raw_copy_to_user(void __user *to, const void *from, unsigned long n)
41{
42 if (__builtin_constant_p(n)) {
43 switch(n) {
44 case 1:
45 *(u8 __force *)to = *(u8 *)from;
46 return 0;
47 case 2:
48 *(u16 __force *)to = *(u16 *)from;
49 return 0;
50 case 4:
51 *(u32 __force *)to = *(u32 *)from;
52 return 0;
Christoph Hellwig6edd1db2019-04-23 18:38:09 +020053#ifdef CONFIG_64BIT
54 case 8:
55 *(u64 __force *)to = *(u64 *)from;
56 return 0;
57#endif
Christoph Hellwigbd79f942019-04-23 18:38:08 +020058 default:
59 break;
60 }
61 }
62
63 memcpy((void __force *)to, from, n);
64 return 0;
65}
66#define INLINE_COPY_FROM_USER
67#define INLINE_COPY_TO_USER
68#endif /* CONFIG_UACCESS_MEMCPY */
69
Arnd Bergmanneed417d2009-05-13 22:56:37 +000070#define MAKE_MM_SEG(s) ((mm_segment_t) { (s) })
71
72#ifndef KERNEL_DS
73#define KERNEL_DS MAKE_MM_SEG(~0UL)
74#endif
75
76#ifndef USER_DS
77#define USER_DS MAKE_MM_SEG(TASK_SIZE - 1)
78#endif
79
80#ifndef get_fs
Arnd Bergmanneed417d2009-05-13 22:56:37 +000081#define get_fs() (current_thread_info()->addr_limit)
82
83static inline void set_fs(mm_segment_t fs)
84{
85 current_thread_info()->addr_limit = fs;
86}
87#endif
88
Vineet Gupta10a60072013-01-18 15:12:16 +053089#ifndef segment_eq
Arnd Bergmanneed417d2009-05-13 22:56:37 +000090#define segment_eq(a, b) ((a).seg == (b).seg)
Vineet Gupta10a60072013-01-18 15:12:16 +053091#endif
Arnd Bergmanneed417d2009-05-13 22:56:37 +000092
Linus Torvalds96d4f262019-01-03 18:57:57 -080093#define access_ok(addr, size) __access_ok((unsigned long)(addr),(size))
Arnd Bergmanneed417d2009-05-13 22:56:37 +000094
95/*
96 * The architecture should really override this if possible, at least
97 * doing a check on the get_fs()
98 */
99#ifndef __access_ok
100static inline int __access_ok(unsigned long addr, unsigned long size)
101{
102 return 1;
103}
104#endif
105
106/*
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000107 * These are the main single-value transfer routines. They automatically
108 * use the right size if we just have the right pointer type.
109 * This version just falls back to copy_{from,to}_user, which should
110 * provide a fast-path for small values.
111 */
112#define __put_user(x, ptr) \
113({ \
114 __typeof__(*(ptr)) __x = (x); \
115 int __pu_err = -EFAULT; \
116 __chk_user_ptr(ptr); \
117 switch (sizeof (*(ptr))) { \
118 case 1: \
119 case 2: \
120 case 4: \
121 case 8: \
122 __pu_err = __put_user_fn(sizeof (*(ptr)), \
123 ptr, &__x); \
124 break; \
125 default: \
126 __put_user_bad(); \
127 break; \
128 } \
129 __pu_err; \
130})
131
132#define put_user(x, ptr) \
133({ \
Al Viro19852962017-09-04 12:07:24 -0400134 void __user *__p = (ptr); \
Michael S. Tsirkine0acd0b2013-05-26 17:30:36 +0300135 might_fault(); \
Linus Torvalds96d4f262019-01-03 18:57:57 -0800136 access_ok(__p, sizeof(*ptr)) ? \
Al Viro19852962017-09-04 12:07:24 -0400137 __put_user((x), ((__typeof__(*(ptr)) __user *)__p)) : \
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000138 -EFAULT; \
139})
140
Vineet Gupta05d88a42013-01-18 15:12:16 +0530141#ifndef __put_user_fn
142
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000143static inline int __put_user_fn(size_t size, void __user *ptr, void *x)
144{
Al Virod5975802017-03-20 21:56:06 -0400145 return unlikely(raw_copy_to_user(ptr, x, size)) ? -EFAULT : 0;
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000146}
147
Vineet Gupta05d88a42013-01-18 15:12:16 +0530148#define __put_user_fn(sz, u, k) __put_user_fn(sz, u, k)
149
150#endif
151
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000152extern int __put_user_bad(void) __attribute__((noreturn));
153
154#define __get_user(x, ptr) \
155({ \
156 int __gu_err = -EFAULT; \
157 __chk_user_ptr(ptr); \
158 switch (sizeof(*(ptr))) { \
159 case 1: { \
Al Viroc1aad8d2017-03-28 01:02:40 -0400160 unsigned char __x = 0; \
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000161 __gu_err = __get_user_fn(sizeof (*(ptr)), \
162 ptr, &__x); \
163 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
164 break; \
165 }; \
166 case 2: { \
Al Viroc1aad8d2017-03-28 01:02:40 -0400167 unsigned short __x = 0; \
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000168 __gu_err = __get_user_fn(sizeof (*(ptr)), \
169 ptr, &__x); \
170 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
171 break; \
172 }; \
173 case 4: { \
Al Viroc1aad8d2017-03-28 01:02:40 -0400174 unsigned int __x = 0; \
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000175 __gu_err = __get_user_fn(sizeof (*(ptr)), \
176 ptr, &__x); \
177 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
178 break; \
179 }; \
180 case 8: { \
Al Viroc1aad8d2017-03-28 01:02:40 -0400181 unsigned long long __x = 0; \
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000182 __gu_err = __get_user_fn(sizeof (*(ptr)), \
183 ptr, &__x); \
184 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
185 break; \
186 }; \
187 default: \
188 __get_user_bad(); \
189 break; \
190 } \
191 __gu_err; \
192})
193
194#define get_user(x, ptr) \
195({ \
Al Viro19852962017-09-04 12:07:24 -0400196 const void __user *__p = (ptr); \
Michael S. Tsirkine0acd0b2013-05-26 17:30:36 +0300197 might_fault(); \
Linus Torvalds96d4f262019-01-03 18:57:57 -0800198 access_ok(__p, sizeof(*ptr)) ? \
Al Viro19852962017-09-04 12:07:24 -0400199 __get_user((x), (__typeof__(*(ptr)) __user *)__p) :\
Al Viro9ad18b72016-08-17 23:19:01 -0400200 ((x) = (__typeof__(*(ptr)))0,-EFAULT); \
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000201})
202
Vineet Gupta05d88a42013-01-18 15:12:16 +0530203#ifndef __get_user_fn
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000204static inline int __get_user_fn(size_t size, const void __user *ptr, void *x)
205{
Al Virod5975802017-03-20 21:56:06 -0400206 return unlikely(raw_copy_from_user(x, ptr, size)) ? -EFAULT : 0;
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000207}
208
Vineet Gupta05d88a42013-01-18 15:12:16 +0530209#define __get_user_fn(sz, u, k) __get_user_fn(sz, u, k)
210
211#endif
212
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000213extern int __get_user_bad(void) __attribute__((noreturn));
214
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000215/*
216 * Copy a null terminated string from userspace.
217 */
218#ifndef __strncpy_from_user
219static inline long
220__strncpy_from_user(char *dst, const char __user *src, long count)
221{
222 char *tmp;
223 strncpy(dst, (const char __force *)src, count);
224 for (tmp = dst; *tmp && count > 0; tmp++, count--)
225 ;
226 return (tmp - dst);
227}
228#endif
229
230static inline long
231strncpy_from_user(char *dst, const char __user *src, long count)
232{
Linus Torvalds96d4f262019-01-03 18:57:57 -0800233 if (!access_ok(src, 1))
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000234 return -EFAULT;
235 return __strncpy_from_user(dst, src, count);
236}
237
238/*
239 * Return the size of a string (including the ending 0)
240 *
241 * Return 0 on exception, a value greater than N if too long
242 */
GuanXuetao7f509a92011-01-15 18:08:09 +0800243#ifndef __strnlen_user
Mark Salter830f5802011-10-04 09:17:36 -0400244#define __strnlen_user(s, n) (strnlen((s), (n)) + 1)
GuanXuetao7f509a92011-01-15 18:08:09 +0800245#endif
246
Mark Salter830f5802011-10-04 09:17:36 -0400247/*
248 * Unlike strnlen, strnlen_user includes the nul terminator in
249 * its returned count. Callers should check for a returned value
250 * greater than N as an indication the string is too long.
251 */
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000252static inline long strnlen_user(const char __user *src, long n)
253{
Linus Torvalds96d4f262019-01-03 18:57:57 -0800254 if (!access_ok(src, 1))
Mike Frysinger98448132009-06-14 02:00:02 -0400255 return 0;
GuanXuetao7f509a92011-01-15 18:08:09 +0800256 return __strnlen_user(src, n);
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000257}
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000258
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000259/*
260 * Zero Userspace
261 */
262#ifndef __clear_user
263static inline __must_check unsigned long
264__clear_user(void __user *to, unsigned long n)
265{
266 memset((void __force *)to, 0, n);
267 return 0;
268}
269#endif
270
271static inline __must_check unsigned long
272clear_user(void __user *to, unsigned long n)
273{
Michael S. Tsirkine0acd0b2013-05-26 17:30:36 +0300274 might_fault();
Linus Torvalds96d4f262019-01-03 18:57:57 -0800275 if (!access_ok(to, n))
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000276 return n;
277
278 return __clear_user(to, n);
279}
280
Al Viroaaa2e7a2016-12-25 01:22:09 -0500281#include <asm/extable.h>
282
Arnd Bergmanneed417d2009-05-13 22:56:37 +0000283#endif /* __ASM_GENERIC_UACCESS_H */