/* MN10300 userspace access functions * * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved. * Written by David Howells (dhowells@redhat.com) * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public Licence * as published by the Free Software Foundation; either version * 2 of the Licence, or (at your option) any later version. */ #ifndef _ASM_UACCESS_H #define _ASM_UACCESS_H /* * User space memory access functions */ #include <linux/kernel.h> #include <asm/page.h> /* * The fs value determines whether argument validity checking should be * performed or not. If get_fs() == USER_DS, checking is performed, with * get_fs() == KERNEL_DS, checking is bypassed. * * For historical reasons, these macros are grossly misnamed. */ #define MAKE_MM_SEG(s) ((mm_segment_t) { (s) }) #define KERNEL_XDS MAKE_MM_SEG(0xBFFFFFFF) #define KERNEL_DS MAKE_MM_SEG(0x9FFFFFFF) #define USER_DS MAKE_MM_SEG(TASK_SIZE) #define get_ds() (KERNEL_DS) #define get_fs() (current_thread_info()->addr_limit) #define set_fs(x) (current_thread_info()->addr_limit = (x)) #define segment_eq(a, b) ((a).seg == (b).seg) #define __addr_ok(addr) \ ((unsigned long)(addr) < (current_thread_info()->addr_limit.seg)) /* * check that a range of addresses falls within the current address limit */ static inline int ___range_ok(unsigned long addr, unsigned int size) { int flag = 1, tmp; asm(" add %3,%1 \n" /* set C-flag if addr + size > 4Gb */ " bcs 0f \n" " cmp %4,%1 \n" /* jump if addr+size>limit (error) */ " bhi 0f \n" " clr %0 \n" /* mark okay */ "0: \n" : "=r"(flag), "=&r"(tmp) : "1"(addr), "ir"(size), "r"(current_thread_info()->addr_limit.seg), "0"(flag) : "cc" ); return flag; } #define __range_ok(addr, size) ___range_ok((unsigned long)(addr), (u32)(size)) #define access_ok(type, addr, size) (__range_ok((addr), (size)) == 0) #define __access_ok(addr, size) (__range_ok((addr), (size)) == 0) #include <asm/extable.h> #define put_user(x, ptr) __put_user_check((x), (ptr), sizeof(*(ptr))) #define get_user(x, ptr) __get_user_check((x), (ptr), sizeof(*(ptr))) /* * The "__xxx" versions do not do address space checking, useful when * doing multiple accesses to the same area (the user has to do the * checks by hand with "access_ok()") */ #define __put_user(x, ptr) __put_user_nocheck((x), (ptr), sizeof(*(ptr))) #define __get_user(x, ptr) __get_user_nocheck((x), (ptr), sizeof(*(ptr))) struct __large_struct { unsigned long buf[100]; }; #define __m(x) (*(struct __large_struct *)(x)) #define __get_user_nocheck(x, ptr, size) \ ({ \ unsigned long __gu_addr; \ int __gu_err; \ __gu_addr = (unsigned long) (ptr); \ switch (size) { \ case 1: { \ unsigned char __gu_val; \ __get_user_asm("bu"); \ (x) = *(__force __typeof__(*(ptr))*) &__gu_val; \ break; \ } \ case 2: { \ unsigned short __gu_val; \ __get_user_asm("hu"); \ (x) = *(__force __typeof__(*(ptr))*) &__gu_val; \ break; \ } \ case 4: { \ unsigned int __gu_val; \ __get_user_asm(""); \ (x) = *(__force __typeof__(*(ptr))*) &__gu_val; \ break; \ } \ default: \ __get_user_unknown(); \ break; \ } \ __gu_err; \ }) #define __get_user_check(x, ptr, size) \ ({ \ const __typeof__(*(ptr))* __guc_ptr = (ptr); \ int _e; \ if (likely(__access_ok((unsigned long) __guc_ptr, (size)))) \ _e = __get_user_nocheck((x), __guc_ptr, (size)); \ else { \ _e = -EFAULT; \ (x) = (__typeof__(x))0; \ } \ _e; \ }) #define __get_user_asm(INSN) \ ({ \ asm volatile( \ "1:\n" \ " mov"INSN" %2,%1\n" \ " mov 0,%0\n" \ "2:\n" \ " .section .fixup,\"ax\"\n" \ "3:\n\t" \ " mov 0,%1\n" \ " mov %3,%0\n" \ " jmp 2b\n" \ " .previous\n" \ " .section __ex_table,\"a\"\n" \ " .balign 4\n" \ " .long 1b, 3b\n" \ " .previous" \ : "=&r" (__gu_err), "=&r" (__gu_val) \ : "m" (__m(__gu_addr)), "i" (-EFAULT)); \ }) extern int __get_user_unknown(void); #define __put_user_nocheck(x, ptr, size) \ ({ \ union { \ __typeof__(*(ptr)) val; \ u32 bits[2]; \ } __pu_val; \ unsigned long __pu_addr; \ int __pu_err; \ __pu_val.val = (x); \ __pu_addr = (unsigned long) (ptr); \ switch (size) { \ case 1: __put_user_asm("bu"); break; \ case 2: __put_user_asm("hu"); break; \ case 4: __put_user_asm("" ); break; \ case 8: __put_user_asm8(); break; \ default: __pu_err = __put_user_unknown(); break; \ } \ __pu_err; \ }) #define __put_user_check(x, ptr, size) \ ({ \ union { \ __typeof__(*(ptr)) val; \ u32 bits[2]; \ } __pu_val; \ unsigned long __pu_addr; \ int __pu_err; \ __pu_val.val = (x); \ __pu_addr = (unsigned long) (ptr); \ if (likely(__access_ok(__pu_addr, size))) { \ switch (size) { \ case 1: __put_user_asm("bu"); break; \ case 2: __put_user_asm("hu"); break; \ case 4: __put_user_asm("" ); break; \ case 8: __put_user_asm8(); break; \ default: __pu_err = __put_user_unknown(); break; \ } \ } \ else { \ __pu_err = -EFAULT; \ } \ __pu_err; \ }) #define __put_user_asm(INSN) \ ({ \ asm volatile( \ "1:\n" \ " mov"INSN" %1,%2\n" \ " mov 0,%0\n" \ "2:\n" \ " .section .fixup,\"ax\"\n" \ "3:\n" \ " mov %3,%0\n" \ " jmp 2b\n" \ " .previous\n" \ " .section __ex_table,\"a\"\n" \ " .balign 4\n" \ " .long 1b, 3b\n" \ " .previous" \ : "=&r" (__pu_err) \ : "r" (__pu_val.val), "m" (__m(__pu_addr)), \ "i" (-EFAULT) \ ); \ }) #define __put_user_asm8() \ ({ \ asm volatile( \ "1: mov %1,%3 \n" \ "2: mov %2,%4 \n" \ " mov 0,%0 \n" \ "3: \n" \ " .section .fixup,\"ax\" \n" \ "4: \n" \ " mov %5,%0 \n" \ " jmp 3b \n" \ " .previous \n" \ " .section __ex_table,\"a\"\n" \ " .balign 4 \n" \ " .long 1b, 4b \n" \ " .long 2b, 4b \n" \ " .previous \n" \ : "=&r" (__pu_err) \ : "r" (__pu_val.bits[0]), "r" (__pu_val.bits[1]), \ "m" (__m(__pu_addr)), "m" (__m(__pu_addr+4)), \ "i" (-EFAULT) \ ); \ }) extern int __put_user_unknown(void); /* * Copy To/From Userspace */ /* Generic arbitrary sized copy. */ #define __copy_user(to, from, size) \ do { \ if (size) { \ void *__to = to; \ const void *__from = from; \ int w; \ asm volatile( \ "0: movbu (%0),%3;\n" \ "1: movbu %3,(%1);\n" \ " inc %0;\n" \ " inc %1;\n" \ " add -1,%2;\n" \ " bne 0b;\n" \ "2:\n" \ " .section .fixup,\"ax\"\n" \ "3: jmp 2b\n" \ " .previous\n" \ " .section __ex_table,\"a\"\n" \ " .balign 4\n" \ " .long 0b,3b\n" \ " .long 1b,3b\n" \ " .previous\n" \ : "=a"(__from), "=a"(__to), "=r"(size), "=&r"(w)\ : "0"(__from), "1"(__to), "2"(size) \ : "cc", "memory"); \ } \ } while (0) static inline unsigned long raw_copy_from_user(void *to, const void __user *from, unsigned long n) { __copy_user(to, from, n); return n; } static inline unsigned long raw_copy_to_user(void __user *to, const void *from, unsigned long n) { __copy_user(to, from, n); return n; } extern long strncpy_from_user(char *dst, const char __user *src, long count); extern long strnlen_user(const char __user *str, long n); extern unsigned long clear_user(void __user *mem, unsigned long len); extern unsigned long __clear_user(void __user *mem, unsigned long len); #endif /* _ASM_UACCESS_H */
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
Kbuild | File | 314 B | 0644 |
|
asm-offsets.h | File | 35 B | 0644 |
|
atomic.h | File | 4.02 KB | 0644 |
|
bitops.h | File | 5.42 KB | 0644 |
|
bug.h | File | 864 B | 0644 |
|
bugs.h | File | 561 B | 0644 |
|
busctl-regs.h | File | 7.8 KB | 0644 |
|
cache.h | File | 2.06 KB | 0644 |
|
cacheflush.h | File | 7.6 KB | 0644 |
|
checksum.h | File | 2.09 KB | 0644 |
|
cmpxchg.h | File | 2.65 KB | 0644 |
|
cpu-regs.h | File | 16.61 KB | 0644 |
|
current.h | File | 922 B | 0644 |
|
debugger.h | File | 1.2 KB | 0644 |
|
delay.h | File | 597 B | 0644 |
|
div64.h | File | 3.21 KB | 0644 |
|
dma-mapping.h | File | 636 B | 0644 |
|
dma.h | File | 3.09 KB | 0644 |
|
dmactl-regs.h | File | 532 B | 0644 |
|
elf.h | File | 4.49 KB | 0644 |
|
emergency-restart.h | File | 43 B | 0644 |
|
exceptions.h | File | 4.74 KB | 0644 |
|
fpu.h | File | 3.57 KB | 0644 |
|
frame.inc | File | 2.37 KB | 0644 |
|
ftrace.h | File | 12 B | 0644 |
|
futex.h | File | 31 B | 0644 |
|
gdb-stub.h | File | 5.42 KB | 0644 |
|
hardirq.h | File | 1.68 KB | 0644 |
|
highmem.h | File | 3.01 KB | 0644 |
|
hw_irq.h | File | 483 B | 0644 |
|
intctl-regs.h | File | 2.26 KB | 0644 |
|
io.h | File | 7.67 KB | 0644 |
|
irq.h | File | 1.11 KB | 0644 |
|
irq_regs.h | File | 751 B | 0644 |
|
irqflags.h | File | 4.05 KB | 0644 |
|
kdebug.h | File | 561 B | 0644 |
|
kgdb.h | File | 1.7 KB | 0644 |
|
kmap_types.h | File | 160 B | 0644 |
|
kprobes.h | File | 1.59 KB | 0644 |
|
linkage.h | File | 593 B | 0644 |
|
local.h | File | 31 B | 0644 |
|
local64.h | File | 33 B | 0644 |
|
mc146818rtc.h | File | 26 B | 0644 |
|
mmu.h | File | 434 B | 0644 |
|
mmu_context.h | File | 4.44 KB | 0644 |
|
module.h | File | 677 B | 0644 |
|
nmi.h | File | 500 B | 0644 |
|
page.h | File | 3.63 KB | 0644 |
|
page_offset.h | File | 302 B | 0644 |
|
pci.h | File | 2.17 KB | 0644 |
|
percpu.h | File | 32 B | 0644 |
|
pgalloc.h | File | 1.49 KB | 0644 |
|
pgtable.h | File | 15.68 KB | 0644 |
|
pio-regs.h | File | 7.53 KB | 0644 |
|
processor.h | File | 4.12 KB | 0644 |
|
ptrace.h | File | 805 B | 0644 |
|
reset-regs.h | File | 1.8 KB | 0644 |
|
rtc-regs.h | File | 3.57 KB | 0644 |
|
rtc.h | File | 692 B | 0644 |
|
rwlock.h | File | 2.98 KB | 0644 |
|
serial-regs.h | File | 8.85 KB | 0644 |
|
serial.h | File | 1.02 KB | 0644 |
|
setup.h | File | 574 B | 0644 |
|
shmparam.h | File | 182 B | 0644 |
|
signal.h | File | 888 B | 0644 |
|
smp.h | File | 3.06 KB | 0644 |
|
smsc911x.h | File | 27 B | 0644 |
|
spinlock.h | File | 3.84 KB | 0644 |
|
spinlock_types.h | File | 445 B | 0644 |
|
string.h | File | 1.03 KB | 0644 |
|
switch_to.h | File | 1.49 KB | 0644 |
|
syscall.h | File | 2.38 KB | 0644 |
|
termios.h | File | 387 B | 0644 |
|
thread_info.h | File | 4.36 KB | 0644 |
|
timer-regs.h | File | 20.72 KB | 0644 |
|
timex.h | File | 843 B | 0644 |
|
tlb.h | File | 941 B | 0644 |
|
tlbflush.h | File | 3.45 KB | 0644 |
|
topology.h | File | 34 B | 0644 |
|
types.h | File | 620 B | 0644 |
|
uaccess.h | File | 7.78 KB | 0644 |
|
ucontext.h | File | 673 B | 0644 |
|
unaligned.h | File | 678 B | 0644 |
|
unistd.h | File | 1.34 KB | 0644 |
|
user.h | File | 1.91 KB | 0644 |
|
vga.h | File | 471 B | 0644 |
|
xor.h | File | 29 B | 0644 |
|