blob: cf50b030c62c036eaf0b4f945050d8d16f0aba10 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
Russell King4baa9922008-08-02 10:55:55 +01002 * arch/arm/include/asm/uaccess.h
Linus Torvalds1da177e2005-04-16 15:20:36 -07003 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 */
8#ifndef _ASMARM_UACCESS_H
9#define _ASMARM_UACCESS_H
10
11/*
12 * User space memory access functions
13 */
Russell King87c52572008-11-29 17:35:51 +000014#include <linux/string.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <asm/memory.h>
16#include <asm/domain.h>
Catalin Marinas8b592782009-07-24 12:32:57 +010017#include <asm/unified.h>
David Howells9f97da72012-03-28 18:30:01 +010018#include <asm/compiler.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
Al Viro0f9b38c2016-12-25 03:33:03 -050020#include <asm/extable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021
22/*
Russell King3fba7e22015-08-19 11:02:28 +010023 * These two functions allow hooking accesses to userspace to increase
24 * system integrity by ensuring that the kernel can not inadvertantly
25 * perform such accesses (eg, via list poison values) which could then
26 * be exploited for priviledge escalation.
27 */
28static inline unsigned int uaccess_save_and_enable(void)
29{
Russell Kinga5e090a2015-08-19 20:40:41 +010030#ifdef CONFIG_CPU_SW_DOMAIN_PAN
31 unsigned int old_domain = get_domain();
32
33 /* Set the current domain access to permit user accesses */
34 set_domain((old_domain & ~domain_mask(DOMAIN_USER)) |
35 domain_val(DOMAIN_USER, DOMAIN_CLIENT));
36
37 return old_domain;
38#else
Russell King3fba7e22015-08-19 11:02:28 +010039 return 0;
Russell Kinga5e090a2015-08-19 20:40:41 +010040#endif
Russell King3fba7e22015-08-19 11:02:28 +010041}
42
43static inline void uaccess_restore(unsigned int flags)
44{
Russell Kinga5e090a2015-08-19 20:40:41 +010045#ifdef CONFIG_CPU_SW_DOMAIN_PAN
46 /* Restore the user access mask */
47 set_domain(flags);
48#endif
Russell King3fba7e22015-08-19 11:02:28 +010049}
50
51/*
Russell King9641c7c2006-06-21 20:38:17 +010052 * These two are intentionally not defined anywhere - if the kernel
53 * code generates any references to them, that's a bug.
54 */
55extern int __get_user_bad(void);
56extern int __put_user_bad(void);
57
58/*
Linus Torvalds1da177e2005-04-16 15:20:36 -070059 * Note that this is actually 0x1,0000,0000
60 */
61#define KERNEL_DS 0x00000000
Linus Torvalds1da177e2005-04-16 15:20:36 -070062#define get_ds() (KERNEL_DS)
Russell King9641c7c2006-06-21 20:38:17 +010063
64#ifdef CONFIG_MMU
65
66#define USER_DS TASK_SIZE
Linus Torvalds1da177e2005-04-16 15:20:36 -070067#define get_fs() (current_thread_info()->addr_limit)
68
Russell King9641c7c2006-06-21 20:38:17 +010069static inline void set_fs(mm_segment_t fs)
Linus Torvalds1da177e2005-04-16 15:20:36 -070070{
71 current_thread_info()->addr_limit = fs;
Julien Thierry621afc62018-09-11 10:13:23 +010072
73 /*
74 * Prevent a mispredicted conditional call to set_fs from forwarding
75 * the wrong address limit to access_ok under speculation.
76 */
77 dsb(nsh);
78 isb();
79
Linus Torvalds1da177e2005-04-16 15:20:36 -070080 modify_domain(DOMAIN_KERNEL, fs ? DOMAIN_CLIENT : DOMAIN_MANAGER);
81}
82
Michael S. Tsirkin295bb012015-01-06 15:11:13 +020083#define segment_eq(a, b) ((a) == (b))
Linus Torvalds1da177e2005-04-16 15:20:36 -070084
Linus Torvalds1da177e2005-04-16 15:20:36 -070085/* We use 33-bit arithmetic here... */
Michael S. Tsirkin295bb012015-01-06 15:11:13 +020086#define __range_ok(addr, size) ({ \
Tilman Schmidt16cf5b32007-02-10 01:45:41 -080087 unsigned long flag, roksum; \
Linus Torvalds1da177e2005-04-16 15:20:36 -070088 __chk_user_ptr(addr); \
89 __asm__("adds %1, %2, %3; sbcccs %1, %1, %0; movcc %0, #0" \
Tilman Schmidt16cf5b32007-02-10 01:45:41 -080090 : "=&r" (flag), "=&r" (roksum) \
Linus Torvalds1da177e2005-04-16 15:20:36 -070091 : "r" (addr), "Ir" (size), "0" (current_thread_info()->addr_limit) \
92 : "cc"); \
93 flag; })
94
Linus Torvalds1da177e2005-04-16 15:20:36 -070095/*
Russell Kingd09fbb32018-07-09 15:22:45 +010096 * This is a type: either unsigned long, if the argument fits into
97 * that type, or otherwise unsigned long long.
98 */
99#define __inttype(x) \
100 __typeof__(__builtin_choose_expr(sizeof(x) > sizeof(0UL), 0ULL, 0UL))
101
102/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103 * Single-value transfer routines. They automatically use the right
104 * size if we just have the right pointer type. Note that the functions
105 * which read from user space (*get_*) need to take care not to leak
106 * kernel data even if the calling code is buggy and fails to check
107 * the return value. This means zeroing out the destination variable
108 * or buffer on error. Normally this is done out of line by the
109 * fixup code, but there are a few places where it intrudes on the
110 * main code path. When we only write to user space, there is no
111 * problem.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113extern int __get_user_1(void *);
114extern int __get_user_2(void *);
115extern int __get_user_4(void *);
Victor Kamenskyd9981382014-09-04 06:07:33 +0100116extern int __get_user_32t_8(void *);
Daniel Thompsone38361d2014-07-10 20:58:08 +0100117extern int __get_user_8(void *);
Victor Kamenskyd9981382014-09-04 06:07:33 +0100118extern int __get_user_64t_1(void *);
119extern int __get_user_64t_2(void *);
120extern int __get_user_64t_4(void *);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121
Russell King84046632012-09-07 18:22:28 +0100122#define __GUP_CLOBBER_1 "lr", "cc"
123#ifdef CONFIG_CPU_USE_DOMAINS
124#define __GUP_CLOBBER_2 "ip", "lr", "cc"
125#else
126#define __GUP_CLOBBER_2 "lr", "cc"
127#endif
128#define __GUP_CLOBBER_4 "lr", "cc"
Victor Kamenskyd9981382014-09-04 06:07:33 +0100129#define __GUP_CLOBBER_32t_8 "lr", "cc"
Daniel Thompsone38361d2014-07-10 20:58:08 +0100130#define __GUP_CLOBBER_8 "lr", "cc"
Russell King84046632012-09-07 18:22:28 +0100131
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200132#define __get_user_x(__r2, __p, __e, __l, __s) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 __asm__ __volatile__ ( \
134 __asmeq("%0", "r0") __asmeq("%1", "r2") \
Russell King84046632012-09-07 18:22:28 +0100135 __asmeq("%3", "r1") \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136 "bl __get_user_" #__s \
137 : "=&r" (__e), "=r" (__r2) \
Russell King84046632012-09-07 18:22:28 +0100138 : "0" (__p), "r" (__l) \
139 : __GUP_CLOBBER_##__s)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700140
Daniel Thompsone38361d2014-07-10 20:58:08 +0100141/* narrowing a double-word get into a single 32bit word register: */
142#ifdef __ARMEB__
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200143#define __get_user_x_32t(__r2, __p, __e, __l, __s) \
Victor Kamenskyd9981382014-09-04 06:07:33 +0100144 __get_user_x(__r2, __p, __e, __l, 32t_8)
Daniel Thompsone38361d2014-07-10 20:58:08 +0100145#else
Victor Kamenskyd9981382014-09-04 06:07:33 +0100146#define __get_user_x_32t __get_user_x
Daniel Thompsone38361d2014-07-10 20:58:08 +0100147#endif
148
Victor Kamenskyd9981382014-09-04 06:07:33 +0100149/*
150 * storing result into proper least significant word of 64bit target var,
151 * different only for big endian case where 64 bit __r2 lsw is r3:
152 */
153#ifdef __ARMEB__
154#define __get_user_x_64t(__r2, __p, __e, __l, __s) \
155 __asm__ __volatile__ ( \
156 __asmeq("%0", "r0") __asmeq("%1", "r2") \
157 __asmeq("%3", "r1") \
158 "bl __get_user_64t_" #__s \
159 : "=&r" (__e), "=r" (__r2) \
160 : "0" (__p), "r" (__l) \
161 : __GUP_CLOBBER_##__s)
162#else
163#define __get_user_x_64t __get_user_x
164#endif
165
166
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200167#define __get_user_check(x, p) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700168 ({ \
Russell King84046632012-09-07 18:22:28 +0100169 unsigned long __limit = current_thread_info()->addr_limit - 1; \
Tobias Klauserc5a69d52007-02-17 20:11:19 +0100170 register const typeof(*(p)) __user *__p asm("r0") = (p);\
Russell Kingd09fbb32018-07-09 15:22:45 +0100171 register __inttype(x) __r2 asm("r2"); \
Russell King84046632012-09-07 18:22:28 +0100172 register unsigned long __l asm("r1") = __limit; \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173 register int __e asm("r0"); \
Russell King3fba7e22015-08-19 11:02:28 +0100174 unsigned int __ua_flags = uaccess_save_and_enable(); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175 switch (sizeof(*(__p))) { \
176 case 1: \
Victor Kamenskyd9981382014-09-04 06:07:33 +0100177 if (sizeof((x)) >= 8) \
178 __get_user_x_64t(__r2, __p, __e, __l, 1); \
179 else \
180 __get_user_x(__r2, __p, __e, __l, 1); \
Russell King84046632012-09-07 18:22:28 +0100181 break; \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182 case 2: \
Victor Kamenskyd9981382014-09-04 06:07:33 +0100183 if (sizeof((x)) >= 8) \
184 __get_user_x_64t(__r2, __p, __e, __l, 2); \
185 else \
186 __get_user_x(__r2, __p, __e, __l, 2); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700187 break; \
188 case 4: \
Victor Kamenskyd9981382014-09-04 06:07:33 +0100189 if (sizeof((x)) >= 8) \
190 __get_user_x_64t(__r2, __p, __e, __l, 4); \
191 else \
192 __get_user_x(__r2, __p, __e, __l, 4); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700193 break; \
Daniel Thompsone38361d2014-07-10 20:58:08 +0100194 case 8: \
195 if (sizeof((x)) < 8) \
Victor Kamenskyd9981382014-09-04 06:07:33 +0100196 __get_user_x_32t(__r2, __p, __e, __l, 4); \
Daniel Thompsone38361d2014-07-10 20:58:08 +0100197 else \
198 __get_user_x(__r2, __p, __e, __l, 8); \
199 break; \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200 default: __e = __get_user_bad(); break; \
201 } \
Russell King3fba7e22015-08-19 11:02:28 +0100202 uaccess_restore(__ua_flags); \
Russell Kingd2c5b692005-11-18 14:22:03 +0000203 x = (typeof(*(p))) __r2; \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204 __e; \
205 })
206
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200207#define get_user(x, p) \
Will Deaconad729072012-09-07 18:24:10 +0100208 ({ \
209 might_fault(); \
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200210 __get_user_check(x, p); \
Will Deaconad729072012-09-07 18:24:10 +0100211 })
212
Russell King9641c7c2006-06-21 20:38:17 +0100213extern int __put_user_1(void *, unsigned int);
214extern int __put_user_2(void *, unsigned int);
215extern int __put_user_4(void *, unsigned int);
216extern int __put_user_8(void *, unsigned long long);
217
Russell King9f73bd82016-02-04 16:54:45 +0000218#define __put_user_check(__pu_val, __ptr, __err, __s) \
Russell King9641c7c2006-06-21 20:38:17 +0100219 ({ \
Russell King84046632012-09-07 18:22:28 +0100220 unsigned long __limit = current_thread_info()->addr_limit - 1; \
Russell King9f73bd82016-02-04 16:54:45 +0000221 register typeof(__pu_val) __r2 asm("r2") = __pu_val; \
222 register const void __user *__p asm("r0") = __ptr; \
Russell King84046632012-09-07 18:22:28 +0100223 register unsigned long __l asm("r1") = __limit; \
Russell King9641c7c2006-06-21 20:38:17 +0100224 register int __e asm("r0"); \
Russell King9f73bd82016-02-04 16:54:45 +0000225 __asm__ __volatile__ ( \
226 __asmeq("%0", "r0") __asmeq("%2", "r2") \
227 __asmeq("%3", "r1") \
228 "bl __put_user_" #__s \
229 : "=&r" (__e) \
230 : "0" (__p), "r" (__r2), "r" (__l) \
231 : "ip", "lr", "cc"); \
232 __err = __e; \
Russell King9641c7c2006-06-21 20:38:17 +0100233 })
234
235#else /* CONFIG_MMU */
236
237/*
238 * uClinux has only one addr space, so has simplified address limits.
239 */
240#define USER_DS KERNEL_DS
241
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200242#define segment_eq(a, b) (1)
243#define __addr_ok(addr) ((void)(addr), 1)
244#define __range_ok(addr, size) ((void)(addr), 0)
Russell King9641c7c2006-06-21 20:38:17 +0100245#define get_fs() (KERNEL_DS)
246
247static inline void set_fs(mm_segment_t fs)
248{
249}
250
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200251#define get_user(x, p) __get_user(x, p)
Russell King9f73bd82016-02-04 16:54:45 +0000252#define __put_user_check __put_user_nocheck
Russell King9641c7c2006-06-21 20:38:17 +0100253
254#endif /* CONFIG_MMU */
255
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200256#define access_ok(type, addr, size) (__range_ok(addr, size) == 0)
Russell King9641c7c2006-06-21 20:38:17 +0100257
Will Deacon8c56cc82012-07-06 15:45:39 +0100258#define user_addr_max() \
Al Virodb68ce12017-03-20 21:08:07 -0400259 (uaccess_kernel() ? ~0UL : get_fs())
Will Deacon8c56cc82012-07-06 15:45:39 +0100260
Russell Kingb1cd0a12018-07-09 10:28:12 +0100261#ifdef CONFIG_CPU_SPECTRE
262/*
263 * When mitigating Spectre variant 1, it is not worth fixing the non-
264 * verifying accessors, because we need to add verification of the
265 * address space there. Force these to use the standard get_user()
266 * version instead.
267 */
268#define __get_user(x, ptr) get_user(x, ptr)
269#else
270
Russell King9641c7c2006-06-21 20:38:17 +0100271/*
272 * The "__xxx" versions of the user access functions do not verify the
273 * address space - it must have been done previously with a separate
274 * "access_ok()" call.
275 *
276 * The "xxx_error" versions set the third argument to EFAULT if an
277 * error occurs, and leave it unchanged on success. Note that these
278 * versions are void (ie, don't return a value as such).
279 */
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200280#define __get_user(x, ptr) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700281({ \
282 long __gu_err = 0; \
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200283 __get_user_err((x), (ptr), __gu_err); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 __gu_err; \
285})
286
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200287#define __get_user_err(x, ptr, err) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700288do { \
289 unsigned long __gu_addr = (unsigned long)(ptr); \
290 unsigned long __gu_val; \
Russell King3fba7e22015-08-19 11:02:28 +0100291 unsigned int __ua_flags; \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292 __chk_user_ptr(ptr); \
Will Deaconad729072012-09-07 18:24:10 +0100293 might_fault(); \
Russell King3fba7e22015-08-19 11:02:28 +0100294 __ua_flags = uaccess_save_and_enable(); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700295 switch (sizeof(*(ptr))) { \
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200296 case 1: __get_user_asm_byte(__gu_val, __gu_addr, err); break; \
297 case 2: __get_user_asm_half(__gu_val, __gu_addr, err); break; \
298 case 4: __get_user_asm_word(__gu_val, __gu_addr, err); break; \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299 default: (__gu_val) = __get_user_bad(); \
300 } \
Russell King3fba7e22015-08-19 11:02:28 +0100301 uaccess_restore(__ua_flags); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700302 (x) = (__typeof__(*(ptr)))__gu_val; \
303} while (0)
304
Russell Kingb64d1f62015-08-18 23:06:25 +0100305#define __get_user_asm(x, addr, err, instr) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700306 __asm__ __volatile__( \
Russell Kingb64d1f62015-08-18 23:06:25 +0100307 "1: " TUSER(instr) " %1, [%2], #0\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308 "2:\n" \
Ard Biesheuvelc4a84ae2015-03-24 10:41:09 +0100309 " .pushsection .text.fixup,\"ax\"\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700310 " .align 2\n" \
311 "3: mov %0, %3\n" \
312 " mov %1, #0\n" \
313 " b 2b\n" \
Russell King42604152010-04-19 10:15:03 +0100314 " .popsection\n" \
315 " .pushsection __ex_table,\"a\"\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700316 " .align 3\n" \
317 " .long 1b, 3b\n" \
Russell King42604152010-04-19 10:15:03 +0100318 " .popsection" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700319 : "+r" (err), "=&r" (x) \
320 : "r" (addr), "i" (-EFAULT) \
321 : "cc")
322
Russell Kingb64d1f62015-08-18 23:06:25 +0100323#define __get_user_asm_byte(x, addr, err) \
324 __get_user_asm(x, addr, err, ldrb)
325
Linus Torvalds1da177e2005-04-16 15:20:36 -0700326#ifndef __ARMEB__
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200327#define __get_user_asm_half(x, __gu_addr, err) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700328({ \
329 unsigned long __b1, __b2; \
330 __get_user_asm_byte(__b1, __gu_addr, err); \
331 __get_user_asm_byte(__b2, __gu_addr + 1, err); \
332 (x) = __b1 | (__b2 << 8); \
333})
334#else
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200335#define __get_user_asm_half(x, __gu_addr, err) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336({ \
337 unsigned long __b1, __b2; \
338 __get_user_asm_byte(__b1, __gu_addr, err); \
339 __get_user_asm_byte(__b2, __gu_addr + 1, err); \
340 (x) = (__b1 << 8) | __b2; \
341})
342#endif
343
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200344#define __get_user_asm_word(x, addr, err) \
Russell Kingb64d1f62015-08-18 23:06:25 +0100345 __get_user_asm(x, addr, err, ldr)
Russell Kingb1cd0a12018-07-09 10:28:12 +0100346#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700347
Russell King9f73bd82016-02-04 16:54:45 +0000348
349#define __put_user_switch(x, ptr, __err, __fn) \
350 do { \
351 const __typeof__(*(ptr)) __user *__pu_ptr = (ptr); \
352 __typeof__(*(ptr)) __pu_val = (x); \
353 unsigned int __ua_flags; \
354 might_fault(); \
355 __ua_flags = uaccess_save_and_enable(); \
356 switch (sizeof(*(ptr))) { \
357 case 1: __fn(__pu_val, __pu_ptr, __err, 1); break; \
358 case 2: __fn(__pu_val, __pu_ptr, __err, 2); break; \
359 case 4: __fn(__pu_val, __pu_ptr, __err, 4); break; \
360 case 8: __fn(__pu_val, __pu_ptr, __err, 8); break; \
361 default: __err = __put_user_bad(); break; \
362 } \
363 uaccess_restore(__ua_flags); \
364 } while (0)
365
366#define put_user(x, ptr) \
367({ \
368 int __pu_err = 0; \
369 __put_user_switch((x), (ptr), __pu_err, __put_user_check); \
370 __pu_err; \
371})
372
Julien Thierrye3aa6242018-09-11 10:13:39 +0100373#ifdef CONFIG_CPU_SPECTRE
374/*
375 * When mitigating Spectre variant 1.1, all accessors need to include
376 * verification of the address space.
377 */
378#define __put_user(x, ptr) put_user(x, ptr)
379
380#else
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200381#define __put_user(x, ptr) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700382({ \
383 long __pu_err = 0; \
Russell King9f73bd82016-02-04 16:54:45 +0000384 __put_user_switch((x), (ptr), __pu_err, __put_user_nocheck); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385 __pu_err; \
386})
387
Russell King9f73bd82016-02-04 16:54:45 +0000388#define __put_user_nocheck(x, __pu_ptr, __err, __size) \
389 do { \
390 unsigned long __pu_addr = (unsigned long)__pu_ptr; \
391 __put_user_nocheck_##__size(x, __pu_addr, __err); \
392 } while (0)
393
394#define __put_user_nocheck_1 __put_user_asm_byte
395#define __put_user_nocheck_2 __put_user_asm_half
396#define __put_user_nocheck_4 __put_user_asm_word
397#define __put_user_nocheck_8 __put_user_asm_dword
Linus Torvalds1da177e2005-04-16 15:20:36 -0700398
Russell Kingb64d1f62015-08-18 23:06:25 +0100399#define __put_user_asm(x, __pu_addr, err, instr) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400 __asm__ __volatile__( \
Russell Kingb64d1f62015-08-18 23:06:25 +0100401 "1: " TUSER(instr) " %1, [%2], #0\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700402 "2:\n" \
Ard Biesheuvelc4a84ae2015-03-24 10:41:09 +0100403 " .pushsection .text.fixup,\"ax\"\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700404 " .align 2\n" \
405 "3: mov %0, %3\n" \
406 " b 2b\n" \
Russell King42604152010-04-19 10:15:03 +0100407 " .popsection\n" \
408 " .pushsection __ex_table,\"a\"\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409 " .align 3\n" \
410 " .long 1b, 3b\n" \
Russell King42604152010-04-19 10:15:03 +0100411 " .popsection" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700412 : "+r" (err) \
413 : "r" (x), "r" (__pu_addr), "i" (-EFAULT) \
414 : "cc")
415
Russell Kingb64d1f62015-08-18 23:06:25 +0100416#define __put_user_asm_byte(x, __pu_addr, err) \
417 __put_user_asm(x, __pu_addr, err, strb)
418
Linus Torvalds1da177e2005-04-16 15:20:36 -0700419#ifndef __ARMEB__
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200420#define __put_user_asm_half(x, __pu_addr, err) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700421({ \
Michael S. Tsirkine8b94de2015-01-06 14:37:22 +0200422 unsigned long __temp = (__force unsigned long)(x); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423 __put_user_asm_byte(__temp, __pu_addr, err); \
424 __put_user_asm_byte(__temp >> 8, __pu_addr + 1, err); \
425})
426#else
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200427#define __put_user_asm_half(x, __pu_addr, err) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700428({ \
Michael S. Tsirkine8b94de2015-01-06 14:37:22 +0200429 unsigned long __temp = (__force unsigned long)(x); \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700430 __put_user_asm_byte(__temp >> 8, __pu_addr, err); \
431 __put_user_asm_byte(__temp, __pu_addr + 1, err); \
432})
433#endif
434
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200435#define __put_user_asm_word(x, __pu_addr, err) \
Russell Kingb64d1f62015-08-18 23:06:25 +0100436 __put_user_asm(x, __pu_addr, err, str)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700437
438#ifndef __ARMEB__
439#define __reg_oper0 "%R2"
440#define __reg_oper1 "%Q2"
441#else
442#define __reg_oper0 "%Q2"
443#define __reg_oper1 "%R2"
444#endif
445
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200446#define __put_user_asm_dword(x, __pu_addr, err) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447 __asm__ __volatile__( \
Catalin Marinas4e7682d2012-01-25 11:38:13 +0100448 ARM( "1: " TUSER(str) " " __reg_oper1 ", [%1], #4\n" ) \
449 ARM( "2: " TUSER(str) " " __reg_oper0 ", [%1]\n" ) \
450 THUMB( "1: " TUSER(str) " " __reg_oper1 ", [%1]\n" ) \
451 THUMB( "2: " TUSER(str) " " __reg_oper0 ", [%1, #4]\n" ) \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 "3:\n" \
Ard Biesheuvelc4a84ae2015-03-24 10:41:09 +0100453 " .pushsection .text.fixup,\"ax\"\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454 " .align 2\n" \
455 "4: mov %0, %3\n" \
456 " b 3b\n" \
Russell King42604152010-04-19 10:15:03 +0100457 " .popsection\n" \
458 " .pushsection __ex_table,\"a\"\n" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700459 " .align 3\n" \
460 " .long 1b, 4b\n" \
461 " .long 2b, 4b\n" \
Russell King42604152010-04-19 10:15:03 +0100462 " .popsection" \
Linus Torvalds1da177e2005-04-16 15:20:36 -0700463 : "+r" (err), "+r" (__pu_addr) \
464 : "r" (x), "i" (-EFAULT) \
465 : "cc")
466
Julien Thierrye3aa6242018-09-11 10:13:39 +0100467#endif /* !CONFIG_CPU_SPECTRE */
Russell King02fcb972006-06-21 14:44:52 +0100468
Russell King9641c7c2006-06-21 20:38:17 +0100469#ifdef CONFIG_MMU
Russell King3fba7e22015-08-19 11:02:28 +0100470extern unsigned long __must_check
471arm_copy_from_user(void *to, const void __user *from, unsigned long n);
472
473static inline unsigned long __must_check
Al Viro4de5b632017-03-21 08:23:33 -0400474raw_copy_from_user(void *to, const void __user *from, unsigned long n)
Russell King3fba7e22015-08-19 11:02:28 +0100475{
Kees Cookdfd45b62016-06-23 15:06:53 -0700476 unsigned int __ua_flags;
477
Kees Cookdfd45b62016-06-23 15:06:53 -0700478 __ua_flags = uaccess_save_and_enable();
Russell King3fba7e22015-08-19 11:02:28 +0100479 n = arm_copy_from_user(to, from, n);
480 uaccess_restore(__ua_flags);
481 return n;
482}
483
484extern unsigned long __must_check
485arm_copy_to_user(void __user *to, const void *from, unsigned long n);
486extern unsigned long __must_check
487__copy_to_user_std(void __user *to, const void *from, unsigned long n);
488
489static inline unsigned long __must_check
Al Viro4de5b632017-03-21 08:23:33 -0400490raw_copy_to_user(void __user *to, const void *from, unsigned long n)
Russell King3fba7e22015-08-19 11:02:28 +0100491{
Russell Kingc014953d2015-12-05 13:42:07 +0000492#ifndef CONFIG_UACCESS_WITH_MEMCPY
Kees Cookdfd45b62016-06-23 15:06:53 -0700493 unsigned int __ua_flags;
Kees Cookdfd45b62016-06-23 15:06:53 -0700494 __ua_flags = uaccess_save_and_enable();
Russell King3fba7e22015-08-19 11:02:28 +0100495 n = arm_copy_to_user(to, from, n);
496 uaccess_restore(__ua_flags);
497 return n;
Russell Kingc014953d2015-12-05 13:42:07 +0000498#else
499 return arm_copy_to_user(to, from, n);
500#endif
Russell King3fba7e22015-08-19 11:02:28 +0100501}
502
503extern unsigned long __must_check
504arm_clear_user(void __user *addr, unsigned long n);
505extern unsigned long __must_check
506__clear_user_std(void __user *addr, unsigned long n);
507
508static inline unsigned long __must_check
509__clear_user(void __user *addr, unsigned long n)
510{
511 unsigned int __ua_flags = uaccess_save_and_enable();
512 n = arm_clear_user(addr, n);
513 uaccess_restore(__ua_flags);
514 return n;
515}
516
Russell King9641c7c2006-06-21 20:38:17 +0100517#else
Al Viro4de5b632017-03-21 08:23:33 -0400518static inline unsigned long
519raw_copy_from_user(void *to, const void __user *from, unsigned long n)
520{
521 memcpy(to, (const void __force *)from, n);
522 return 0;
523}
524static inline unsigned long
525raw_copy_to_user(void __user *to, const void *from, unsigned long n)
526{
527 memcpy((void __force *)to, from, n);
528 return 0;
529}
Michael S. Tsirkin295bb012015-01-06 15:11:13 +0200530#define __clear_user(addr, n) (memset((void __force *)addr, 0, n), 0)
Russell King9641c7c2006-06-21 20:38:17 +0100531#endif
Al Viro4de5b632017-03-21 08:23:33 -0400532#define INLINE_COPY_TO_USER
533#define INLINE_COPY_FROM_USER
Linus Torvalds1da177e2005-04-16 15:20:36 -0700534
Russell King99573292006-10-26 10:27:42 +0100535static inline unsigned long __must_check clear_user(void __user *to, unsigned long n)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700536{
537 if (access_ok(VERIFY_WRITE, to, n))
Russell King02fcb972006-06-21 14:44:52 +0100538 n = __clear_user(to, n);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539 return n;
540}
541
Russell King3fba7e22015-08-19 11:02:28 +0100542/* These are from lib/ code, and use __get_user() and friends */
Will Deacon8c56cc82012-07-06 15:45:39 +0100543extern long strncpy_from_user(char *dest, const char __user *src, long count);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700544
Will Deacon8c56cc82012-07-06 15:45:39 +0100545extern __must_check long strnlen_user(const char __user *str, long n);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700546
547#endif /* _ASMARM_UACCESS_H */