blob: f4df6e7c718be506a59ef157bda9591dfb1790a6 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * User address space access functions.
3 *
4 * Copyright 1997 Andi Kleen <ak@muc.de>
5 * Copyright 1997 Linus Torvalds
6 * Copyright 2002 Andi Kleen <ak@suse.de>
7 */
Andi Kleen2ee60e172006-06-26 13:59:44 +02008#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -07009#include <asm/uaccess.h>
10
11/*
12 * Copy a null terminated string from userspace.
13 */
14
15#define __do_strncpy_from_user(dst,src,count,res) \
16do { \
17 long __d0, __d1, __d2; \
18 might_sleep(); \
19 __asm__ __volatile__( \
20 " testq %1,%1\n" \
21 " jz 2f\n" \
22 "0: lodsb\n" \
23 " stosb\n" \
24 " testb %%al,%%al\n" \
25 " jz 1f\n" \
26 " decq %1\n" \
27 " jnz 0b\n" \
28 "1: subq %1,%0\n" \
29 "2:\n" \
30 ".section .fixup,\"ax\"\n" \
31 "3: movq %5,%0\n" \
32 " jmp 2b\n" \
33 ".previous\n" \
H. Peter Anvin8da804f2008-02-04 16:47:57 +010034 _ASM_EXTABLE(0b,3b) \
Linus Torvalds1da177e2005-04-16 15:20:36 -070035 : "=r"(res), "=c"(count), "=&a" (__d0), "=&S" (__d1), \
36 "=&D" (__d2) \
37 : "i"(-EFAULT), "0"(count), "1"(count), "3"(src), "4"(dst) \
38 : "memory"); \
39} while (0)
40
41long
42__strncpy_from_user(char *dst, const char __user *src, long count)
43{
44 long res;
45 __do_strncpy_from_user(dst, src, count, res);
46 return res;
47}
Andi Kleen2ee60e172006-06-26 13:59:44 +020048EXPORT_SYMBOL(__strncpy_from_user);
Linus Torvalds1da177e2005-04-16 15:20:36 -070049
50long
51strncpy_from_user(char *dst, const char __user *src, long count)
52{
53 long res = -EFAULT;
54 if (access_ok(VERIFY_READ, src, 1))
Andi Kleen6bfa9bb2006-06-26 13:59:47 +020055 return __strncpy_from_user(dst, src, count);
Linus Torvalds1da177e2005-04-16 15:20:36 -070056 return res;
57}
Andi Kleen2ee60e172006-06-26 13:59:44 +020058EXPORT_SYMBOL(strncpy_from_user);
Linus Torvalds1da177e2005-04-16 15:20:36 -070059
60/*
61 * Zero Userspace
62 */
63
64unsigned long __clear_user(void __user *addr, unsigned long size)
65{
66 long __d0;
67 might_sleep();
68 /* no memory constraint because it doesn't change any memory gcc knows
69 about */
70 asm volatile(
71 " testq %[size8],%[size8]\n"
72 " jz 4f\n"
73 "0: movq %[zero],(%[dst])\n"
74 " addq %[eight],%[dst]\n"
75 " decl %%ecx ; jnz 0b\n"
76 "4: movq %[size1],%%rcx\n"
77 " testl %%ecx,%%ecx\n"
78 " jz 2f\n"
79 "1: movb %b[zero],(%[dst])\n"
80 " incq %[dst]\n"
81 " decl %%ecx ; jnz 1b\n"
82 "2:\n"
83 ".section .fixup,\"ax\"\n"
84 "3: lea 0(%[size1],%[size8],8),%[size8]\n"
85 " jmp 2b\n"
86 ".previous\n"
H. Peter Anvin8da804f2008-02-04 16:47:57 +010087 _ASM_EXTABLE(0b,3b)
88 _ASM_EXTABLE(1b,2b)
Linus Torvalds1da177e2005-04-16 15:20:36 -070089 : [size8] "=c"(size), [dst] "=&D" (__d0)
90 : [size1] "r"(size & 7), "[size8]" (size / 8), "[dst]"(addr),
91 [zero] "r" (0UL), [eight] "r" (8UL));
92 return size;
93}
Andi Kleen2ee60e172006-06-26 13:59:44 +020094EXPORT_SYMBOL(__clear_user);
Linus Torvalds1da177e2005-04-16 15:20:36 -070095
96unsigned long clear_user(void __user *to, unsigned long n)
97{
98 if (access_ok(VERIFY_WRITE, to, n))
99 return __clear_user(to, n);
100 return n;
101}
Andi Kleen2ee60e172006-06-26 13:59:44 +0200102EXPORT_SYMBOL(clear_user);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103
104/*
105 * Return the size of a string (including the ending 0)
106 *
107 * Return 0 on exception, a value greater than N if too long
108 */
109
Jan Beulich5f1d1892006-01-11 22:46:48 +0100110long __strnlen_user(const char __user *s, long n)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111{
112 long res = 0;
113 char c;
114
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115 while (1) {
116 if (res>n)
117 return n+1;
118 if (__get_user(c, s))
119 return 0;
120 if (!c)
121 return res+1;
122 res++;
123 s++;
124 }
125}
Andi Kleen2ee60e172006-06-26 13:59:44 +0200126EXPORT_SYMBOL(__strnlen_user);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127
Jan Beulich5f1d1892006-01-11 22:46:48 +0100128long strnlen_user(const char __user *s, long n)
129{
130 if (!access_ok(VERIFY_READ, s, n))
131 return 0;
132 return __strnlen_user(s, n);
133}
Andi Kleen2ee60e172006-06-26 13:59:44 +0200134EXPORT_SYMBOL(strnlen_user);
Jan Beulich5f1d1892006-01-11 22:46:48 +0100135
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136long strlen_user(const char __user *s)
137{
138 long res = 0;
139 char c;
140
141 for (;;) {
142 if (get_user(c, s))
143 return 0;
144 if (!c)
145 return res+1;
146 res++;
147 s++;
148 }
149}
Andi Kleen2ee60e172006-06-26 13:59:44 +0200150EXPORT_SYMBOL(strlen_user);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700151
152unsigned long copy_in_user(void __user *to, const void __user *from, unsigned len)
153{
154 if (access_ok(VERIFY_WRITE, to, len) && access_ok(VERIFY_READ, from, len)) {
155 return copy_user_generic((__force void *)to, (__force void *)from, len);
156 }
157 return len;
158}
Andi Kleen2ee60e172006-06-26 13:59:44 +0200159EXPORT_SYMBOL(copy_in_user);
160
Vitaly Mayatskikh11295852008-07-02 15:48:21 +0200161/*
162 * Try to copy last bytes and clear the rest if needed.
163 * Since protection fault in copy_from/to_user is not a normal situation,
164 * it is not necessary to optimize tail handling.
165 */
166unsigned long
167copy_user_handle_tail(char *to, char *from, unsigned len, unsigned zerorest)
168{
169 char c;
170 unsigned zero_len;
171
172 for (; len; --len) {
173 if (__get_user_nocheck(c, from++, sizeof(char)))
174 break;
175 if (__put_user_nocheck(c, to++, sizeof(char)))
176 break;
177 }
178
179 for (c = 0, zero_len = len; zerorest && zero_len; --zero_len)
180 if (__put_user_nocheck(c, to++, sizeof(char)))
181 break;
182 return len;
183}