uaccess.h revision bdb43806589096ac4272fe1307e789846ac08d7c
1#ifndef __LINUX_UACCESS_H__
2#define __LINUX_UACCESS_H__
3
4#include <linux/preempt.h>
5#include <asm/uaccess.h>
6
7/*
8 * These routines enable/disable the pagefault handler in that
9 * it will not take any locks and go straight to the fixup table.
10 *
11 * They have great resemblance to the preempt_disable/enable calls
12 * and in fact they are identical; this is because currently there is
13 * no other way to make the pagefault handlers do this. So we do
14 * disable preemption but we don't necessarily care about that.
15 */
16static inline void pagefault_disable(void)
17{
18	preempt_count_inc();
19	/*
20	 * make sure to have issued the store before a pagefault
21	 * can hit.
22	 */
23	barrier();
24}
25
26static inline void pagefault_enable(void)
27{
28	/*
29	 * make sure to issue those last loads/stores before enabling
30	 * the pagefault handler again.
31	 */
32	barrier();
33	preempt_count_dec();
34	preempt_check_resched();
35}
36
37#ifndef ARCH_HAS_NOCACHE_UACCESS
38
39static inline unsigned long __copy_from_user_inatomic_nocache(void *to,
40				const void __user *from, unsigned long n)
41{
42	return __copy_from_user_inatomic(to, from, n);
43}
44
45static inline unsigned long __copy_from_user_nocache(void *to,
46				const void __user *from, unsigned long n)
47{
48	return __copy_from_user(to, from, n);
49}
50
51#endif		/* ARCH_HAS_NOCACHE_UACCESS */
52
53/**
54 * probe_kernel_address(): safely attempt to read from a location
55 * @addr: address to read from - its type is type typeof(retval)*
56 * @retval: read into this variable
57 *
58 * Safely read from address @addr into variable @revtal.  If a kernel fault
59 * happens, handle that and return -EFAULT.
60 * We ensure that the __get_user() is executed in atomic context so that
61 * do_page_fault() doesn't attempt to take mmap_sem.  This makes
62 * probe_kernel_address() suitable for use within regions where the caller
63 * already holds mmap_sem, or other locks which nest inside mmap_sem.
64 * This must be a macro because __get_user() needs to know the types of the
65 * args.
66 *
67 * We don't include enough header files to be able to do the set_fs().  We
68 * require that the probe_kernel_address() caller will do that.
69 */
70#define probe_kernel_address(addr, retval)		\
71	({						\
72		long ret;				\
73		mm_segment_t old_fs = get_fs();		\
74							\
75		set_fs(KERNEL_DS);			\
76		pagefault_disable();			\
77		ret = __copy_from_user_inatomic(&(retval), (__force typeof(retval) __user *)(addr), sizeof(retval));		\
78		pagefault_enable();			\
79		set_fs(old_fs);				\
80		ret;					\
81	})
82
83/*
84 * probe_kernel_read(): safely attempt to read from a location
85 * @dst: pointer to the buffer that shall take the data
86 * @src: address to read from
87 * @size: size of the data chunk
88 *
89 * Safely read from address @src to the buffer at @dst.  If a kernel fault
90 * happens, handle that and return -EFAULT.
91 */
92extern long probe_kernel_read(void *dst, const void *src, size_t size);
93extern long __probe_kernel_read(void *dst, const void *src, size_t size);
94
95/*
96 * probe_kernel_write(): safely attempt to write to a location
97 * @dst: address to write to
98 * @src: pointer to the data that shall be written
99 * @size: size of the data chunk
100 *
101 * Safely write to address @dst from the buffer at @src.  If a kernel fault
102 * happens, handle that and return -EFAULT.
103 */
104extern long notrace probe_kernel_write(void *dst, const void *src, size_t size);
105extern long notrace __probe_kernel_write(void *dst, const void *src, size_t size);
106
107#endif		/* __LINUX_UACCESS_H__ */
108