Linux Audio

Check our new training course

Linux BSP development engineering services

Need help to port Linux and bootloaders to your hardware?
Loading...
v3.15
 1/* 
 2 * User address space access functions.
 3 *
 4 * Copyright 1997 Andi Kleen <ak@muc.de>
 5 * Copyright 1997 Linus Torvalds
 6 * Copyright 2002 Andi Kleen <ak@suse.de>
 7 */
 8#include <linux/module.h>
 9#include <asm/uaccess.h>
10
11/*
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
12 * Zero Userspace
13 */
14
15unsigned long __clear_user(void __user *addr, unsigned long size)
16{
17	long __d0;
18	might_fault();
19	/* no memory constraint because it doesn't change any memory gcc knows
20	   about */
21	stac();
22	asm volatile(
23		"	testq  %[size8],%[size8]\n"
24		"	jz     4f\n"
25		"0:	movq %[zero],(%[dst])\n"
26		"	addq   %[eight],%[dst]\n"
27		"	decl %%ecx ; jnz   0b\n"
28		"4:	movq  %[size1],%%rcx\n"
29		"	testl %%ecx,%%ecx\n"
30		"	jz     2f\n"
31		"1:	movb   %b[zero],(%[dst])\n"
32		"	incq   %[dst]\n"
33		"	decl %%ecx ; jnz  1b\n"
34		"2:\n"
35		".section .fixup,\"ax\"\n"
36		"3:	lea 0(%[size1],%[size8],8),%[size8]\n"
37		"	jmp 2b\n"
38		".previous\n"
39		_ASM_EXTABLE(0b,3b)
40		_ASM_EXTABLE(1b,2b)
41		: [size8] "=&c"(size), [dst] "=&D" (__d0)
42		: [size1] "r"(size & 7), "[size8]" (size / 8), "[dst]"(addr),
43		  [zero] "r" (0UL), [eight] "r" (8UL));
44	clac();
45	return size;
46}
47EXPORT_SYMBOL(__clear_user);
48
49unsigned long clear_user(void __user *to, unsigned long n)
50{
51	if (access_ok(VERIFY_WRITE, to, n))
52		return __clear_user(to, n);
53	return n;
54}
55EXPORT_SYMBOL(clear_user);
56
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
57unsigned long copy_in_user(void __user *to, const void __user *from, unsigned len)
58{
59	if (access_ok(VERIFY_WRITE, to, len) && access_ok(VERIFY_READ, from, len)) { 
60		return copy_user_generic((__force void *)to, (__force void *)from, len);
61	} 
62	return len;		
63}
64EXPORT_SYMBOL(copy_in_user);
65
66/*
67 * Try to copy last bytes and clear the rest if needed.
68 * Since protection fault in copy_from/to_user is not a normal situation,
69 * it is not necessary to optimize tail handling.
70 */
71__visible unsigned long
72copy_user_handle_tail(char *to, char *from, unsigned len, unsigned zerorest)
73{
74	char c;
75	unsigned zero_len;
76
77	for (; len; --len, to++) {
78		if (__get_user_nocheck(c, from++, sizeof(char)))
79			break;
80		if (__put_user_nocheck(c, to, sizeof(char)))
81			break;
82	}
83
84	for (c = 0, zero_len = len; zerorest && zero_len; --zero_len)
85		if (__put_user_nocheck(c, to++, sizeof(char)))
86			break;
87	clac();
88	return len;
89}
v3.1
  1/* 
  2 * User address space access functions.
  3 *
  4 * Copyright 1997 Andi Kleen <ak@muc.de>
  5 * Copyright 1997 Linus Torvalds
  6 * Copyright 2002 Andi Kleen <ak@suse.de>
  7 */
  8#include <linux/module.h>
  9#include <asm/uaccess.h>
 10
 11/*
 12 * Copy a null terminated string from userspace.
 13 */
 14
 15#define __do_strncpy_from_user(dst,src,count,res)			   \
 16do {									   \
 17	long __d0, __d1, __d2;						   \
 18	might_fault();							   \
 19	__asm__ __volatile__(						   \
 20		"	testq %1,%1\n"					   \
 21		"	jz 2f\n"					   \
 22		"0:	lodsb\n"					   \
 23		"	stosb\n"					   \
 24		"	testb %%al,%%al\n"				   \
 25		"	jz 1f\n"					   \
 26		"	decq %1\n"					   \
 27		"	jnz 0b\n"					   \
 28		"1:	subq %1,%0\n"					   \
 29		"2:\n"							   \
 30		".section .fixup,\"ax\"\n"				   \
 31		"3:	movq %5,%0\n"					   \
 32		"	jmp 2b\n"					   \
 33		".previous\n"						   \
 34		_ASM_EXTABLE(0b,3b)					   \
 35		: "=&r"(res), "=&c"(count), "=&a" (__d0), "=&S" (__d1),	   \
 36		  "=&D" (__d2)						   \
 37		: "i"(-EFAULT), "0"(count), "1"(count), "3"(src), "4"(dst) \
 38		: "memory");						   \
 39} while (0)
 40
 41long
 42__strncpy_from_user(char *dst, const char __user *src, long count)
 43{
 44	long res;
 45	__do_strncpy_from_user(dst, src, count, res);
 46	return res;
 47}
 48EXPORT_SYMBOL(__strncpy_from_user);
 49
 50long
 51strncpy_from_user(char *dst, const char __user *src, long count)
 52{
 53	long res = -EFAULT;
 54	if (access_ok(VERIFY_READ, src, 1))
 55		return __strncpy_from_user(dst, src, count);
 56	return res;
 57}
 58EXPORT_SYMBOL(strncpy_from_user);
 59
 60/*
 61 * Zero Userspace
 62 */
 63
 64unsigned long __clear_user(void __user *addr, unsigned long size)
 65{
 66	long __d0;
 67	might_fault();
 68	/* no memory constraint because it doesn't change any memory gcc knows
 69	   about */
 
 70	asm volatile(
 71		"	testq  %[size8],%[size8]\n"
 72		"	jz     4f\n"
 73		"0:	movq %[zero],(%[dst])\n"
 74		"	addq   %[eight],%[dst]\n"
 75		"	decl %%ecx ; jnz   0b\n"
 76		"4:	movq  %[size1],%%rcx\n"
 77		"	testl %%ecx,%%ecx\n"
 78		"	jz     2f\n"
 79		"1:	movb   %b[zero],(%[dst])\n"
 80		"	incq   %[dst]\n"
 81		"	decl %%ecx ; jnz  1b\n"
 82		"2:\n"
 83		".section .fixup,\"ax\"\n"
 84		"3:	lea 0(%[size1],%[size8],8),%[size8]\n"
 85		"	jmp 2b\n"
 86		".previous\n"
 87		_ASM_EXTABLE(0b,3b)
 88		_ASM_EXTABLE(1b,2b)
 89		: [size8] "=&c"(size), [dst] "=&D" (__d0)
 90		: [size1] "r"(size & 7), "[size8]" (size / 8), "[dst]"(addr),
 91		  [zero] "r" (0UL), [eight] "r" (8UL));
 
 92	return size;
 93}
 94EXPORT_SYMBOL(__clear_user);
 95
 96unsigned long clear_user(void __user *to, unsigned long n)
 97{
 98	if (access_ok(VERIFY_WRITE, to, n))
 99		return __clear_user(to, n);
100	return n;
101}
102EXPORT_SYMBOL(clear_user);
103
104/*
105 * Return the size of a string (including the ending 0)
106 *
107 * Return 0 on exception, a value greater than N if too long
108 */
109
110long __strnlen_user(const char __user *s, long n)
111{
112	long res = 0;
113	char c;
114
115	while (1) {
116		if (res>n)
117			return n+1;
118		if (__get_user(c, s))
119			return 0;
120		if (!c)
121			return res+1;
122		res++;
123		s++;
124	}
125}
126EXPORT_SYMBOL(__strnlen_user);
127
128long strnlen_user(const char __user *s, long n)
129{
130	if (!access_ok(VERIFY_READ, s, 1))
131		return 0;
132	return __strnlen_user(s, n);
133}
134EXPORT_SYMBOL(strnlen_user);
135
136long strlen_user(const char __user *s)
137{
138	long res = 0;
139	char c;
140
141	for (;;) {
142		if (get_user(c, s))
143			return 0;
144		if (!c)
145			return res+1;
146		res++;
147		s++;
148	}
149}
150EXPORT_SYMBOL(strlen_user);
151
152unsigned long copy_in_user(void __user *to, const void __user *from, unsigned len)
153{
154	if (access_ok(VERIFY_WRITE, to, len) && access_ok(VERIFY_READ, from, len)) { 
155		return copy_user_generic((__force void *)to, (__force void *)from, len);
156	} 
157	return len;		
158}
159EXPORT_SYMBOL(copy_in_user);
160
161/*
162 * Try to copy last bytes and clear the rest if needed.
163 * Since protection fault in copy_from/to_user is not a normal situation,
164 * it is not necessary to optimize tail handling.
165 */
166unsigned long
167copy_user_handle_tail(char *to, char *from, unsigned len, unsigned zerorest)
168{
169	char c;
170	unsigned zero_len;
171
172	for (; len; --len) {
173		if (__get_user_nocheck(c, from++, sizeof(char)))
174			break;
175		if (__put_user_nocheck(c, to++, sizeof(char)))
176			break;
177	}
178
179	for (c = 0, zero_len = len; zerorest && zero_len; --zero_len)
180		if (__put_user_nocheck(c, to++, sizeof(char)))
181			break;
 
182	return len;
183}