Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> Signed-off-by: Richard Weinberger <richard@nod.at>
		
			
				
	
	
		
			178 lines
		
	
	
	
		
			5.3 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			178 lines
		
	
	
	
		
			5.3 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
/* 
 | 
						|
 * Copyright (C) 2002 Jeff Dike (jdike@karaya.com)
 | 
						|
 * Licensed under the GPL
 | 
						|
 */
 | 
						|
 | 
						|
#ifndef __UM_UACCESS_H
 | 
						|
#define __UM_UACCESS_H
 | 
						|
 | 
						|
/* thread_info has a mm_segment_t in it, so put the definition up here */
 | 
						|
typedef struct {
 | 
						|
	unsigned long seg;
 | 
						|
} mm_segment_t;
 | 
						|
 | 
						|
#include <linux/thread_info.h>
 | 
						|
#include <linux/errno.h>
 | 
						|
#include <asm/processor.h>
 | 
						|
#include <asm/elf.h>
 | 
						|
 | 
						|
#define VERIFY_READ 0
 | 
						|
#define VERIFY_WRITE 1
 | 
						|
 | 
						|
/*
 | 
						|
 * The fs value determines whether argument validity checking should be
 | 
						|
 * performed or not.  If get_fs() == USER_DS, checking is performed, with
 | 
						|
 * get_fs() == KERNEL_DS, checking is bypassed.
 | 
						|
 *
 | 
						|
 * For historical reasons, these macros are grossly misnamed.
 | 
						|
 */
 | 
						|
 | 
						|
#define MAKE_MM_SEG(s)	((mm_segment_t) { (s) })
 | 
						|
 | 
						|
#define KERNEL_DS	MAKE_MM_SEG(0xFFFFFFFF)
 | 
						|
#define USER_DS		MAKE_MM_SEG(TASK_SIZE)
 | 
						|
 | 
						|
#define get_ds()	(KERNEL_DS)
 | 
						|
#define get_fs()	(current_thread_info()->addr_limit)
 | 
						|
#define set_fs(x)	(current_thread_info()->addr_limit = (x))
 | 
						|
 | 
						|
#define segment_eq(a, b) ((a).seg == (b).seg)
 | 
						|
 | 
						|
#define __under_task_size(addr, size) \
 | 
						|
	(((unsigned long) (addr) < TASK_SIZE) && \
 | 
						|
	 (((unsigned long) (addr) + (size)) < TASK_SIZE))
 | 
						|
 | 
						|
#define __access_ok_vsyscall(type, addr, size) \
 | 
						|
	 ((type == VERIFY_READ) && \
 | 
						|
	  ((unsigned long) (addr) >= FIXADDR_USER_START) && \
 | 
						|
	  ((unsigned long) (addr) + (size) <= FIXADDR_USER_END) && \
 | 
						|
	  ((unsigned long) (addr) + (size) >= (unsigned long)(addr)))
 | 
						|
 | 
						|
#define __addr_range_nowrap(addr, size) \
 | 
						|
	((unsigned long) (addr) <= ((unsigned long) (addr) + (size)))
 | 
						|
 | 
						|
#define access_ok(type, addr, size) \
 | 
						|
	(__addr_range_nowrap(addr, size) && \
 | 
						|
	 (__under_task_size(addr, size) || \
 | 
						|
	  __access_ok_vsyscall(type, addr, size) || \
 | 
						|
	  segment_eq(get_fs(), KERNEL_DS)))
 | 
						|
 | 
						|
extern int copy_from_user(void *to, const void __user *from, int n);
 | 
						|
extern int copy_to_user(void __user *to, const void *from, int n);
 | 
						|
 | 
						|
/*
 | 
						|
 * strncpy_from_user: - Copy a NUL terminated string from userspace.
 | 
						|
 * @dst:   Destination address, in kernel space.  This buffer must be at
 | 
						|
 *         least @count bytes long.
 | 
						|
 * @src:   Source address, in user space.
 | 
						|
 * @count: Maximum number of bytes to copy, including the trailing NUL.
 | 
						|
 *
 | 
						|
 * Copies a NUL-terminated string from userspace to kernel space.
 | 
						|
 *
 | 
						|
 * On success, returns the length of the string (not including the trailing
 | 
						|
 * NUL).
 | 
						|
 *
 | 
						|
 * If access to userspace fails, returns -EFAULT (some data may have been
 | 
						|
 * copied).
 | 
						|
 *
 | 
						|
 * If @count is smaller than the length of the string, copies @count bytes
 | 
						|
 * and returns @count.
 | 
						|
 */
 | 
						|
 | 
						|
extern int strncpy_from_user(char *dst, const char __user *src, int count);
 | 
						|
 | 
						|
/*
 | 
						|
 * __clear_user: - Zero a block of memory in user space, with less checking.
 | 
						|
 * @to:   Destination address, in user space.
 | 
						|
 * @n:    Number of bytes to zero.
 | 
						|
 *
 | 
						|
 * Zero a block of memory in user space.  Caller must check
 | 
						|
 * the specified block with access_ok() before calling this function.
 | 
						|
 *
 | 
						|
 * Returns number of bytes that could not be cleared.
 | 
						|
 * On success, this will be zero.
 | 
						|
 */
 | 
						|
extern int __clear_user(void __user *mem, int len);
 | 
						|
 | 
						|
/*
 | 
						|
 * clear_user: - Zero a block of memory in user space.
 | 
						|
 * @to:   Destination address, in user space.
 | 
						|
 * @n:    Number of bytes to zero.
 | 
						|
 *
 | 
						|
 * Zero a block of memory in user space.
 | 
						|
 *
 | 
						|
 * Returns number of bytes that could not be cleared.
 | 
						|
 * On success, this will be zero.
 | 
						|
 */
 | 
						|
extern int clear_user(void __user *mem, int len);
 | 
						|
 | 
						|
/*
 | 
						|
 * strlen_user: - Get the size of a string in user space.
 | 
						|
 * @str: The string to measure.
 | 
						|
 * @n:   The maximum valid length
 | 
						|
 *
 | 
						|
 * Get the size of a NUL-terminated string in user space.
 | 
						|
 *
 | 
						|
 * Returns the size of the string INCLUDING the terminating NUL.
 | 
						|
 * On exception, returns 0.
 | 
						|
 * If the string is too long, returns a value greater than @n.
 | 
						|
 */
 | 
						|
extern int strnlen_user(const void __user *str, int len);
 | 
						|
 | 
						|
#define __copy_from_user(to, from, n) copy_from_user(to, from, n)
 | 
						|
 | 
						|
#define __copy_to_user(to, from, n) copy_to_user(to, from, n)
 | 
						|
 | 
						|
#define __copy_to_user_inatomic __copy_to_user
 | 
						|
#define __copy_from_user_inatomic __copy_from_user
 | 
						|
 | 
						|
#define __get_user(x, ptr) \
 | 
						|
({ \
 | 
						|
	const __typeof__(*(ptr)) __user *__private_ptr = (ptr);	\
 | 
						|
	__typeof__(x) __private_val;			\
 | 
						|
	int __private_ret = -EFAULT;			\
 | 
						|
	(x) = (__typeof__(*(__private_ptr)))0;				\
 | 
						|
	if (__copy_from_user((__force void *)&__private_val, (__private_ptr),\
 | 
						|
			     sizeof(*(__private_ptr))) == 0) {		\
 | 
						|
		(x) = (__typeof__(*(__private_ptr))) __private_val;	\
 | 
						|
		__private_ret = 0;					\
 | 
						|
	}								\
 | 
						|
	__private_ret;							\
 | 
						|
}) 
 | 
						|
 | 
						|
#define get_user(x, ptr) \
 | 
						|
({ \
 | 
						|
        const __typeof__((*(ptr))) __user *private_ptr = (ptr); \
 | 
						|
        (access_ok(VERIFY_READ, private_ptr, sizeof(*private_ptr)) ? \
 | 
						|
	 __get_user(x, private_ptr) : ((x) = (__typeof__(*ptr))0, -EFAULT)); \
 | 
						|
})
 | 
						|
 | 
						|
#define __put_user(x, ptr) \
 | 
						|
({ \
 | 
						|
        __typeof__(*(ptr)) __user *__private_ptr = ptr; \
 | 
						|
        __typeof__(*(__private_ptr)) __private_val; \
 | 
						|
        int __private_ret = -EFAULT; \
 | 
						|
        __private_val = (__typeof__(*(__private_ptr))) (x); \
 | 
						|
        if (__copy_to_user((__private_ptr), &__private_val, \
 | 
						|
			   sizeof(*(__private_ptr))) == 0) { \
 | 
						|
		__private_ret = 0; \
 | 
						|
	} \
 | 
						|
        __private_ret; \
 | 
						|
})
 | 
						|
 | 
						|
#define put_user(x, ptr) \
 | 
						|
({ \
 | 
						|
        __typeof__(*(ptr)) __user *private_ptr = (ptr); \
 | 
						|
        (access_ok(VERIFY_WRITE, private_ptr, sizeof(*private_ptr)) ? \
 | 
						|
	 __put_user(x, private_ptr) : -EFAULT); \
 | 
						|
})
 | 
						|
 | 
						|
#define strlen_user(str) strnlen_user(str, ~0U >> 1)
 | 
						|
 | 
						|
struct exception_table_entry
 | 
						|
{
 | 
						|
        unsigned long insn;
 | 
						|
	unsigned long fixup;
 | 
						|
};
 | 
						|
 | 
						|
#endif
 |