Blame view

kernel/linux-rt-4.4.41/arch/x86/lib/usercopy_64.c 2.08 KB
5113f6f70   김현기   kernel add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
  /* 
   * User address space access functions.
   *
   * Copyright 1997 Andi Kleen <ak@muc.de>
   * Copyright 1997 Linus Torvalds
   * Copyright 2002 Andi Kleen <ak@suse.de>
   */
  #include <linux/module.h>
  #include <asm/uaccess.h>
  
  /*
   * Zero Userspace
   */
  
  unsigned long __clear_user(void __user *addr, unsigned long size)
  {
  	long __d0;
  	might_fault();
  	/* no memory constraint because it doesn't change any memory gcc knows
  	   about */
  	stac();
  	asm volatile(
  		"	testq  %[size8],%[size8]
  "
  		"	jz     4f
  "
  		"0:	movq %[zero],(%[dst])
  "
  		"	addq   %[eight],%[dst]
  "
  		"	decl %%ecx ; jnz   0b
  "
  		"4:	movq  %[size1],%%rcx
  "
  		"	testl %%ecx,%%ecx
  "
  		"	jz     2f
  "
  		"1:	movb   %b[zero],(%[dst])
  "
  		"	incq   %[dst]
  "
  		"	decl %%ecx ; jnz  1b
  "
  		"2:
  "
  		".section .fixup,\"ax\"
  "
  		"3:	lea 0(%[size1],%[size8],8),%[size8]
  "
  		"	jmp 2b
  "
  		".previous
  "
  		_ASM_EXTABLE(0b,3b)
  		_ASM_EXTABLE(1b,2b)
  		: [size8] "=&c"(size), [dst] "=&D" (__d0)
  		: [size1] "r"(size & 7), "[size8]" (size / 8), "[dst]"(addr),
  		  [zero] "r" (0UL), [eight] "r" (8UL));
  	clac();
  	return size;
  }
  EXPORT_SYMBOL(__clear_user);
  
  unsigned long clear_user(void __user *to, unsigned long n)
  {
  	if (access_ok(VERIFY_WRITE, to, n))
  		return __clear_user(to, n);
  	return n;
  }
  EXPORT_SYMBOL(clear_user);
  
  unsigned long copy_in_user(void __user *to, const void __user *from, unsigned len)
  {
  	if (access_ok(VERIFY_WRITE, to, len) && access_ok(VERIFY_READ, from, len)) { 
  		return copy_user_generic((__force void *)to, (__force void *)from, len);
  	} 
  	return len;		
  }
  EXPORT_SYMBOL(copy_in_user);
  
  /*
   * Try to copy last bytes and clear the rest if needed.
   * Since protection fault in copy_from/to_user is not a normal situation,
   * it is not necessary to optimize tail handling.
   */
  __visible unsigned long
  copy_user_handle_tail(char *to, char *from, unsigned len)
  {
  	for (; len; --len, to++) {
  		char c;
  
  		if (__get_user_nocheck(c, from++, sizeof(char)))
  			break;
  		if (__put_user_nocheck(c, to, sizeof(char)))
  			break;
  	}
  	clac();
  
  	/* If the destination is a kernel buffer, we always clear the end */
  	if (!__addr_ok(to))
  		memset(to, 0, len);
  	return len;
  }