2 * include/asm-s390/uaccess.h
5 * Copyright (C) 1999,2000 IBM Deutschland Entwicklung GmbH, IBM Corporation
6 * Author(s): Hartmut Penner (hp@de.ibm.com),
7 * Martin Schwidefsky (schwidefsky@de.ibm.com)
9 * Derived from "include/asm-i386/uaccess.h"
11 #ifndef __S390_UACCESS_H
12 #define __S390_UACCESS_H
15 * User space memory access functions
17 #include <linux/sched.h>
18 #include <linux/errno.h>
21 #define VERIFY_WRITE 1
25 * The fs value determines whether argument validity checking should be
26 * performed or not. If get_fs() == USER_DS, checking is performed, with
27 * get_fs() == KERNEL_DS, checking is bypassed.
29 * For historical reasons, these macros are grossly misnamed.
32 #define MAKE_MM_SEG(a) ((mm_segment_t) { (a) })
35 #define KERNEL_DS MAKE_MM_SEG(0)
36 #define USER_DS MAKE_MM_SEG(1)
38 #define get_ds() (KERNEL_DS)
39 #define get_fs() (current->thread.mm_segment)
44 unsigned long __pto; \
45 current->thread.mm_segment = (x); \
46 __pto = current->thread.mm_segment.ar4 ? \
47 S390_lowcore.user_asce : S390_lowcore.kernel_asce; \
48 asm volatile ("lctlg 7,7,%0" : : "m" (__pto) ); \
53 unsigned long __pto; \
54 current->thread.mm_segment = (x); \
55 __pto = current->thread.mm_segment.ar4 ? \
56 S390_lowcore.user_asce : S390_lowcore.kernel_asce; \
57 asm volatile ("lctl 7,7,%0" : : "m" (__pto) ); \
61 #define segment_eq(a,b) ((a).ar4 == (b).ar4)
64 static inline int __access_ok(const void __user *addr, unsigned long size)
68 #define access_ok(type,addr,size) __access_ok(addr,size)
71 * The exception table consists of pairs of addresses: the first is the
72 * address of an instruction that is allowed to fault, and the second is
73 * the address at which the program should continue. No registers are
74 * modified, so it is entirely up to the continuation code to figure out
77 * All the routines below use bits of fixup code that are out of line
78 * with the main instruction path. This means when everything is well,
79 * we don't even have to jump over them. Further, they do not intrude
80 * on our cache or tlb entries.
83 struct exception_table_entry
85 unsigned long insn, fixup;
89 #define __uaccess_fixup \
90 ".section .fixup,\"ax\"\n" \
97 ".section __ex_table,\"a\"\n" \
101 #define __uaccess_clobber "cc", "1"
102 #else /* __s390x__ */
103 #define __uaccess_fixup \
104 ".section .fixup,\"ax\"\n" \
108 ".section __ex_table,\"a\"\n" \
112 #define __uaccess_clobber "cc"
113 #endif /* __s390x__ */
116 * These are the main single-value transfer routines. They automatically
117 * use the right size if we just have the right pointer type.
119 #if __GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ > 2)
120 #define __put_user_asm(x, ptr, err) \
124 "0: mvcs 0(%1,%2),%3,%0\n" \
128 : "d" (sizeof(*(ptr))), "a" (ptr), "Q" (x), \
130 : __uaccess_clobber ); \
133 #define __put_user_asm(x, ptr, err) \
137 "0: mvcs 0(%1,%2),0(%3),%0\n" \
141 : "d" (sizeof(*(ptr))), "a" (ptr), "a" (&(x)), \
142 "K" (-EFAULT), "m" (x) \
143 : __uaccess_clobber ); \
147 #define __put_user(x, ptr) \
149 __typeof__(*(ptr)) __x = (x); \
151 __chk_user_ptr(ptr); \
152 switch (sizeof (*(ptr))) { \
157 __put_user_asm(__x, ptr, __pu_err); \
166 #define put_user(x, ptr) \
169 __put_user(x, ptr); \
173 extern int __put_user_bad(void) __attribute__((noreturn));
175 #if __GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ > 2)
176 #define __get_user_asm(x, ptr, err) \
180 "0: mvcp %O1(%2,%R1),0(%3),%0\n" \
183 : "+&d" (err), "=Q" (x) \
184 : "d" (sizeof(*(ptr))), "a" (ptr), \
186 : __uaccess_clobber ); \
189 #define __get_user_asm(x, ptr, err) \
193 "0: mvcp 0(%2,%5),0(%3),%0\n" \
196 : "+&d" (err), "=m" (x) \
197 : "d" (sizeof(*(ptr))), "a" (ptr), \
198 "K" (-EFAULT), "a" (&(x)) \
199 : __uaccess_clobber ); \
203 #define __get_user(x, ptr) \
206 __chk_user_ptr(ptr); \
207 switch (sizeof(*(ptr))) { \
210 __get_user_asm(__x, ptr, __gu_err); \
211 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
215 unsigned short __x; \
216 __get_user_asm(__x, ptr, __gu_err); \
217 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
222 __get_user_asm(__x, ptr, __gu_err); \
223 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
227 unsigned long long __x; \
228 __get_user_asm(__x, ptr, __gu_err); \
229 (x) = *(__force __typeof__(*(ptr)) *) &__x; \
239 #define get_user(x, ptr) \
242 __get_user(x, ptr); \
245 extern int __get_user_bad(void) __attribute__((noreturn));
247 #define __put_user_unaligned __put_user
248 #define __get_user_unaligned __get_user
250 extern long __copy_to_user_asm(const void *from, long n, void __user *to);
253 * __copy_to_user: - Copy a block of data into user space, with less checking.
254 * @to: Destination address, in user space.
255 * @from: Source address, in kernel space.
256 * @n: Number of bytes to copy.
258 * Context: User context only. This function may sleep.
260 * Copy data from kernel space to user space. Caller must check
261 * the specified block with access_ok() before calling this function.
263 * Returns number of bytes that could not be copied.
264 * On success, this will be zero.
266 static inline unsigned long
267 __copy_to_user(void __user *to, const void *from, unsigned long n)
269 return __copy_to_user_asm(from, n, to);
272 #define __copy_to_user_inatomic __copy_to_user
273 #define __copy_from_user_inatomic __copy_from_user
276 * copy_to_user: - Copy a block of data into user space.
277 * @to: Destination address, in user space.
278 * @from: Source address, in kernel space.
279 * @n: Number of bytes to copy.
281 * Context: User context only. This function may sleep.
283 * Copy data from kernel space to user space.
285 * Returns number of bytes that could not be copied.
286 * On success, this will be zero.
288 static inline unsigned long
289 copy_to_user(void __user *to, const void *from, unsigned long n)
292 if (access_ok(VERIFY_WRITE, to, n))
293 n = __copy_to_user(to, from, n);
297 extern long __copy_from_user_asm(void *to, long n, const void __user *from);
300 * __copy_from_user: - Copy a block of data from user space, with less checking.
301 * @to: Destination address, in kernel space.
302 * @from: Source address, in user space.
303 * @n: Number of bytes to copy.
305 * Context: User context only. This function may sleep.
307 * Copy data from user space to kernel space. Caller must check
308 * the specified block with access_ok() before calling this function.
310 * Returns number of bytes that could not be copied.
311 * On success, this will be zero.
313 * If some data could not be copied, this function will pad the copied
314 * data to the requested size using zero bytes.
316 static inline unsigned long
317 __copy_from_user(void *to, const void __user *from, unsigned long n)
319 return __copy_from_user_asm(to, n, from);
323 * copy_from_user: - Copy a block of data from user space.
324 * @to: Destination address, in kernel space.
325 * @from: Source address, in user space.
326 * @n: Number of bytes to copy.
328 * Context: User context only. This function may sleep.
330 * Copy data from user space to kernel space.
332 * Returns number of bytes that could not be copied.
333 * On success, this will be zero.
335 * If some data could not be copied, this function will pad the copied
336 * data to the requested size using zero bytes.
338 static inline unsigned long
339 copy_from_user(void *to, const void __user *from, unsigned long n)
342 if (access_ok(VERIFY_READ, from, n))
343 n = __copy_from_user(to, from, n);
349 extern unsigned long __copy_in_user_asm(const void __user *from, long n,
352 static inline unsigned long
353 __copy_in_user(void __user *to, const void __user *from, unsigned long n)
355 return __copy_in_user_asm(from, n, to);
358 static inline unsigned long
359 copy_in_user(void __user *to, const void __user *from, unsigned long n)
362 if (__access_ok(from,n) && __access_ok(to,n))
363 n = __copy_in_user_asm(from, n, to);
368 * Copy a null terminated string from userspace.
370 extern long __strncpy_from_user_asm(long count, char *dst,
371 const char __user *src);
374 strncpy_from_user(char *dst, const char __user *src, long count)
378 if (access_ok(VERIFY_READ, src, 1))
379 res = __strncpy_from_user_asm(count, dst, src);
384 extern long __strnlen_user_asm(long count, const char __user *src);
386 static inline unsigned long
387 strnlen_user(const char __user * src, unsigned long n)
390 return __strnlen_user_asm(n, src);
394 * strlen_user: - Get the size of a string in user space.
395 * @str: The string to measure.
397 * Context: User context only. This function may sleep.
399 * Get the size of a NUL-terminated string in user space.
401 * Returns the size of the string INCLUDING the terminating NUL.
402 * On exception, returns 0.
404 * If there is a limit on the length of a valid string, you may wish to
405 * consider using strnlen_user() instead.
407 #define strlen_user(str) strnlen_user(str, ~0UL)
413 extern long __clear_user_asm(void __user *to, long n);
415 static inline unsigned long
416 __clear_user(void __user *to, unsigned long n)
418 return __clear_user_asm(to, n);
421 static inline unsigned long
422 clear_user(void __user *to, unsigned long n)
425 if (access_ok(VERIFY_WRITE, to, n))
426 n = __clear_user_asm(to, n);
430 #endif /* __S390_UACCESS_H */