uaccess.h 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582
  1. /*
  2. * arch/arm/include/asm/uaccess.h
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License version 2 as
  6. * published by the Free Software Foundation.
  7. */
  8. #ifndef _ASMARM_UACCESS_H
  9. #define _ASMARM_UACCESS_H
  10. /*
  11. * User space memory access functions
  12. */
  13. #include <linux/string.h>
  14. #include <asm/memory.h>
  15. #include <asm/domain.h>
  16. #include <asm/unified.h>
  17. #include <asm/compiler.h>
  18. #ifndef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS
  19. #include <asm-generic/uaccess-unaligned.h>
  20. #else
  21. #define __get_user_unaligned __get_user
  22. #define __put_user_unaligned __put_user
  23. #endif
  24. /*
  25. * The exception table consists of pairs of addresses: the first is the
  26. * address of an instruction that is allowed to fault, and the second is
  27. * the address at which the program should continue. No registers are
  28. * modified, so it is entirely up to the continuation code to figure out
  29. * what to do.
  30. *
  31. * All the routines below use bits of fixup code that are out of line
  32. * with the main instruction path. This means when everything is well,
  33. * we don't even have to jump over them. Further, they do not intrude
  34. * on our cache or tlb entries.
  35. */
  36. struct exception_table_entry
  37. {
  38. unsigned long insn, fixup;
  39. };
  40. extern int fixup_exception(struct pt_regs *regs);
  41. /*
  42. * These two functions allow hooking accesses to userspace to increase
  43. * system integrity by ensuring that the kernel can not inadvertantly
  44. * perform such accesses (eg, via list poison values) which could then
  45. * be exploited for priviledge escalation.
  46. */
  47. static inline unsigned int uaccess_save_and_enable(void)
  48. {
  49. #ifdef CONFIG_CPU_SW_DOMAIN_PAN
  50. unsigned int old_domain = get_domain();
  51. /* Set the current domain access to permit user accesses */
  52. set_domain((old_domain & ~domain_mask(DOMAIN_USER)) |
  53. domain_val(DOMAIN_USER, DOMAIN_CLIENT));
  54. return old_domain;
  55. #else
  56. return 0;
  57. #endif
  58. }
  59. static inline void uaccess_restore(unsigned int flags)
  60. {
  61. #ifdef CONFIG_CPU_SW_DOMAIN_PAN
  62. /* Restore the user access mask */
  63. set_domain(flags);
  64. #endif
  65. }
  66. /*
  67. * These two are intentionally not defined anywhere - if the kernel
  68. * code generates any references to them, that's a bug.
  69. */
  70. extern int __get_user_bad(void);
  71. extern int __put_user_bad(void);
  72. /*
  73. * Note that this is actually 0x1,0000,0000
  74. */
  75. #define KERNEL_DS 0x00000000
  76. #define get_ds() (KERNEL_DS)
  77. #ifdef CONFIG_MMU
  78. #define USER_DS TASK_SIZE
  79. #define get_fs() (current_thread_info()->addr_limit)
  80. static inline void set_fs(mm_segment_t fs)
  81. {
  82. current_thread_info()->addr_limit = fs;
  83. modify_domain(DOMAIN_KERNEL, fs ? DOMAIN_CLIENT : DOMAIN_MANAGER);
  84. }
  85. #define segment_eq(a, b) ((a) == (b))
  86. /* We use 33-bit arithmetic here... */
  87. #define __range_ok(addr, size) ({ \
  88. unsigned long flag, roksum; \
  89. __chk_user_ptr(addr); \
  90. __asm__("adds %1, %2, %3; sbcccs %1, %1, %0; movcc %0, #0" \
  91. : "=&r" (flag), "=&r" (roksum) \
  92. : "r" (addr), "Ir" (size), "0" (current_thread_info()->addr_limit) \
  93. : "cc"); \
  94. flag; })
  95. /*
  96. * Single-value transfer routines. They automatically use the right
  97. * size if we just have the right pointer type. Note that the functions
  98. * which read from user space (*get_*) need to take care not to leak
  99. * kernel data even if the calling code is buggy and fails to check
  100. * the return value. This means zeroing out the destination variable
  101. * or buffer on error. Normally this is done out of line by the
  102. * fixup code, but there are a few places where it intrudes on the
  103. * main code path. When we only write to user space, there is no
  104. * problem.
  105. */
  106. extern int __get_user_1(void *);
  107. extern int __get_user_2(void *);
  108. extern int __get_user_4(void *);
  109. extern int __get_user_32t_8(void *);
  110. extern int __get_user_8(void *);
  111. extern int __get_user_64t_1(void *);
  112. extern int __get_user_64t_2(void *);
  113. extern int __get_user_64t_4(void *);
  114. #define __GUP_CLOBBER_1 "lr", "cc"
  115. #ifdef CONFIG_CPU_USE_DOMAINS
  116. #define __GUP_CLOBBER_2 "ip", "lr", "cc"
  117. #else
  118. #define __GUP_CLOBBER_2 "lr", "cc"
  119. #endif
  120. #define __GUP_CLOBBER_4 "lr", "cc"
  121. #define __GUP_CLOBBER_32t_8 "lr", "cc"
  122. #define __GUP_CLOBBER_8 "lr", "cc"
  123. #define __get_user_x(__r2, __p, __e, __l, __s) \
  124. __asm__ __volatile__ ( \
  125. __asmeq("%0", "r0") __asmeq("%1", "r2") \
  126. __asmeq("%3", "r1") \
  127. "bl __get_user_" #__s \
  128. : "=&r" (__e), "=r" (__r2) \
  129. : "0" (__p), "r" (__l) \
  130. : __GUP_CLOBBER_##__s)
  131. /* narrowing a double-word get into a single 32bit word register: */
  132. #ifdef __ARMEB__
  133. #define __get_user_x_32t(__r2, __p, __e, __l, __s) \
  134. __get_user_x(__r2, __p, __e, __l, 32t_8)
  135. #else
  136. #define __get_user_x_32t __get_user_x
  137. #endif
  138. /*
  139. * storing result into proper least significant word of 64bit target var,
  140. * different only for big endian case where 64 bit __r2 lsw is r3:
  141. */
  142. #ifdef __ARMEB__
  143. #define __get_user_x_64t(__r2, __p, __e, __l, __s) \
  144. __asm__ __volatile__ ( \
  145. __asmeq("%0", "r0") __asmeq("%1", "r2") \
  146. __asmeq("%3", "r1") \
  147. "bl __get_user_64t_" #__s \
  148. : "=&r" (__e), "=r" (__r2) \
  149. : "0" (__p), "r" (__l) \
  150. : __GUP_CLOBBER_##__s)
  151. #else
  152. #define __get_user_x_64t __get_user_x
  153. #endif
  154. #define __get_user_check(x, p) \
  155. ({ \
  156. unsigned long __limit = current_thread_info()->addr_limit - 1; \
  157. register const typeof(*(p)) __user *__p asm("r0") = (p);\
  158. register typeof(x) __r2 asm("r2"); \
  159. register unsigned long __l asm("r1") = __limit; \
  160. register int __e asm("r0"); \
  161. unsigned int __ua_flags = uaccess_save_and_enable(); \
  162. switch (sizeof(*(__p))) { \
  163. case 1: \
  164. if (sizeof((x)) >= 8) \
  165. __get_user_x_64t(__r2, __p, __e, __l, 1); \
  166. else \
  167. __get_user_x(__r2, __p, __e, __l, 1); \
  168. break; \
  169. case 2: \
  170. if (sizeof((x)) >= 8) \
  171. __get_user_x_64t(__r2, __p, __e, __l, 2); \
  172. else \
  173. __get_user_x(__r2, __p, __e, __l, 2); \
  174. break; \
  175. case 4: \
  176. if (sizeof((x)) >= 8) \
  177. __get_user_x_64t(__r2, __p, __e, __l, 4); \
  178. else \
  179. __get_user_x(__r2, __p, __e, __l, 4); \
  180. break; \
  181. case 8: \
  182. if (sizeof((x)) < 8) \
  183. __get_user_x_32t(__r2, __p, __e, __l, 4); \
  184. else \
  185. __get_user_x(__r2, __p, __e, __l, 8); \
  186. break; \
  187. default: __e = __get_user_bad(); break; \
  188. } \
  189. uaccess_restore(__ua_flags); \
  190. x = (typeof(*(p))) __r2; \
  191. __e; \
  192. })
  193. #define get_user(x, p) \
  194. ({ \
  195. might_fault(); \
  196. __get_user_check(x, p); \
  197. })
  198. extern int __put_user_1(void *, unsigned int);
  199. extern int __put_user_2(void *, unsigned int);
  200. extern int __put_user_4(void *, unsigned int);
  201. extern int __put_user_8(void *, unsigned long long);
  202. #define __put_user_check(__pu_val, __ptr, __err, __s) \
  203. ({ \
  204. unsigned long __limit = current_thread_info()->addr_limit - 1; \
  205. register typeof(__pu_val) __r2 asm("r2") = __pu_val; \
  206. register const void __user *__p asm("r0") = __ptr; \
  207. register unsigned long __l asm("r1") = __limit; \
  208. register int __e asm("r0"); \
  209. __asm__ __volatile__ ( \
  210. __asmeq("%0", "r0") __asmeq("%2", "r2") \
  211. __asmeq("%3", "r1") \
  212. "bl __put_user_" #__s \
  213. : "=&r" (__e) \
  214. : "0" (__p), "r" (__r2), "r" (__l) \
  215. : "ip", "lr", "cc"); \
  216. __err = __e; \
  217. })
  218. #else /* CONFIG_MMU */
  219. /*
  220. * uClinux has only one addr space, so has simplified address limits.
  221. */
  222. #define USER_DS KERNEL_DS
  223. #define segment_eq(a, b) (1)
  224. #define __addr_ok(addr) ((void)(addr), 1)
  225. #define __range_ok(addr, size) ((void)(addr), 0)
  226. #define get_fs() (KERNEL_DS)
  227. static inline void set_fs(mm_segment_t fs)
  228. {
  229. }
  230. #define get_user(x, p) __get_user(x, p)
  231. #define __put_user_check __put_user_nocheck
  232. #endif /* CONFIG_MMU */
  233. #define access_ok(type, addr, size) (__range_ok(addr, size) == 0)
  234. #define user_addr_max() \
  235. (uaccess_kernel() ? ~0UL : get_fs())
  236. /*
  237. * The "__xxx" versions of the user access functions do not verify the
  238. * address space - it must have been done previously with a separate
  239. * "access_ok()" call.
  240. *
  241. * The "xxx_error" versions set the third argument to EFAULT if an
  242. * error occurs, and leave it unchanged on success. Note that these
  243. * versions are void (ie, don't return a value as such).
  244. */
  245. #define __get_user(x, ptr) \
  246. ({ \
  247. long __gu_err = 0; \
  248. __get_user_err((x), (ptr), __gu_err); \
  249. __gu_err; \
  250. })
  251. #define __get_user_error(x, ptr, err) \
  252. ({ \
  253. __get_user_err((x), (ptr), err); \
  254. (void) 0; \
  255. })
  256. #define __get_user_err(x, ptr, err) \
  257. do { \
  258. unsigned long __gu_addr = (unsigned long)(ptr); \
  259. unsigned long __gu_val; \
  260. unsigned int __ua_flags; \
  261. __chk_user_ptr(ptr); \
  262. might_fault(); \
  263. __ua_flags = uaccess_save_and_enable(); \
  264. switch (sizeof(*(ptr))) { \
  265. case 1: __get_user_asm_byte(__gu_val, __gu_addr, err); break; \
  266. case 2: __get_user_asm_half(__gu_val, __gu_addr, err); break; \
  267. case 4: __get_user_asm_word(__gu_val, __gu_addr, err); break; \
  268. default: (__gu_val) = __get_user_bad(); \
  269. } \
  270. uaccess_restore(__ua_flags); \
  271. (x) = (__typeof__(*(ptr)))__gu_val; \
  272. } while (0)
  273. #define __get_user_asm(x, addr, err, instr) \
  274. __asm__ __volatile__( \
  275. "1: " TUSER(instr) " %1, [%2], #0\n" \
  276. "2:\n" \
  277. " .pushsection .text.fixup,\"ax\"\n" \
  278. " .align 2\n" \
  279. "3: mov %0, %3\n" \
  280. " mov %1, #0\n" \
  281. " b 2b\n" \
  282. " .popsection\n" \
  283. " .pushsection __ex_table,\"a\"\n" \
  284. " .align 3\n" \
  285. " .long 1b, 3b\n" \
  286. " .popsection" \
  287. : "+r" (err), "=&r" (x) \
  288. : "r" (addr), "i" (-EFAULT) \
  289. : "cc")
  290. #define __get_user_asm_byte(x, addr, err) \
  291. __get_user_asm(x, addr, err, ldrb)
  292. #ifndef __ARMEB__
  293. #define __get_user_asm_half(x, __gu_addr, err) \
  294. ({ \
  295. unsigned long __b1, __b2; \
  296. __get_user_asm_byte(__b1, __gu_addr, err); \
  297. __get_user_asm_byte(__b2, __gu_addr + 1, err); \
  298. (x) = __b1 | (__b2 << 8); \
  299. })
  300. #else
  301. #define __get_user_asm_half(x, __gu_addr, err) \
  302. ({ \
  303. unsigned long __b1, __b2; \
  304. __get_user_asm_byte(__b1, __gu_addr, err); \
  305. __get_user_asm_byte(__b2, __gu_addr + 1, err); \
  306. (x) = (__b1 << 8) | __b2; \
  307. })
  308. #endif
  309. #define __get_user_asm_word(x, addr, err) \
  310. __get_user_asm(x, addr, err, ldr)
  311. #define __put_user_switch(x, ptr, __err, __fn) \
  312. do { \
  313. const __typeof__(*(ptr)) __user *__pu_ptr = (ptr); \
  314. __typeof__(*(ptr)) __pu_val = (x); \
  315. unsigned int __ua_flags; \
  316. might_fault(); \
  317. __ua_flags = uaccess_save_and_enable(); \
  318. switch (sizeof(*(ptr))) { \
  319. case 1: __fn(__pu_val, __pu_ptr, __err, 1); break; \
  320. case 2: __fn(__pu_val, __pu_ptr, __err, 2); break; \
  321. case 4: __fn(__pu_val, __pu_ptr, __err, 4); break; \
  322. case 8: __fn(__pu_val, __pu_ptr, __err, 8); break; \
  323. default: __err = __put_user_bad(); break; \
  324. } \
  325. uaccess_restore(__ua_flags); \
  326. } while (0)
  327. #define put_user(x, ptr) \
  328. ({ \
  329. int __pu_err = 0; \
  330. __put_user_switch((x), (ptr), __pu_err, __put_user_check); \
  331. __pu_err; \
  332. })
  333. #define __put_user(x, ptr) \
  334. ({ \
  335. long __pu_err = 0; \
  336. __put_user_switch((x), (ptr), __pu_err, __put_user_nocheck); \
  337. __pu_err; \
  338. })
  339. #define __put_user_error(x, ptr, err) \
  340. ({ \
  341. __put_user_switch((x), (ptr), (err), __put_user_nocheck); \
  342. (void) 0; \
  343. })
  344. #define __put_user_nocheck(x, __pu_ptr, __err, __size) \
  345. do { \
  346. unsigned long __pu_addr = (unsigned long)__pu_ptr; \
  347. __put_user_nocheck_##__size(x, __pu_addr, __err); \
  348. } while (0)
  349. #define __put_user_nocheck_1 __put_user_asm_byte
  350. #define __put_user_nocheck_2 __put_user_asm_half
  351. #define __put_user_nocheck_4 __put_user_asm_word
  352. #define __put_user_nocheck_8 __put_user_asm_dword
  353. #define __put_user_asm(x, __pu_addr, err, instr) \
  354. __asm__ __volatile__( \
  355. "1: " TUSER(instr) " %1, [%2], #0\n" \
  356. "2:\n" \
  357. " .pushsection .text.fixup,\"ax\"\n" \
  358. " .align 2\n" \
  359. "3: mov %0, %3\n" \
  360. " b 2b\n" \
  361. " .popsection\n" \
  362. " .pushsection __ex_table,\"a\"\n" \
  363. " .align 3\n" \
  364. " .long 1b, 3b\n" \
  365. " .popsection" \
  366. : "+r" (err) \
  367. : "r" (x), "r" (__pu_addr), "i" (-EFAULT) \
  368. : "cc")
  369. #define __put_user_asm_byte(x, __pu_addr, err) \
  370. __put_user_asm(x, __pu_addr, err, strb)
  371. #ifndef __ARMEB__
  372. #define __put_user_asm_half(x, __pu_addr, err) \
  373. ({ \
  374. unsigned long __temp = (__force unsigned long)(x); \
  375. __put_user_asm_byte(__temp, __pu_addr, err); \
  376. __put_user_asm_byte(__temp >> 8, __pu_addr + 1, err); \
  377. })
  378. #else
  379. #define __put_user_asm_half(x, __pu_addr, err) \
  380. ({ \
  381. unsigned long __temp = (__force unsigned long)(x); \
  382. __put_user_asm_byte(__temp >> 8, __pu_addr, err); \
  383. __put_user_asm_byte(__temp, __pu_addr + 1, err); \
  384. })
  385. #endif
  386. #define __put_user_asm_word(x, __pu_addr, err) \
  387. __put_user_asm(x, __pu_addr, err, str)
  388. #ifndef __ARMEB__
  389. #define __reg_oper0 "%R2"
  390. #define __reg_oper1 "%Q2"
  391. #else
  392. #define __reg_oper0 "%Q2"
  393. #define __reg_oper1 "%R2"
  394. #endif
  395. #define __put_user_asm_dword(x, __pu_addr, err) \
  396. __asm__ __volatile__( \
  397. ARM( "1: " TUSER(str) " " __reg_oper1 ", [%1], #4\n" ) \
  398. ARM( "2: " TUSER(str) " " __reg_oper0 ", [%1]\n" ) \
  399. THUMB( "1: " TUSER(str) " " __reg_oper1 ", [%1]\n" ) \
  400. THUMB( "2: " TUSER(str) " " __reg_oper0 ", [%1, #4]\n" ) \
  401. "3:\n" \
  402. " .pushsection .text.fixup,\"ax\"\n" \
  403. " .align 2\n" \
  404. "4: mov %0, %3\n" \
  405. " b 3b\n" \
  406. " .popsection\n" \
  407. " .pushsection __ex_table,\"a\"\n" \
  408. " .align 3\n" \
  409. " .long 1b, 4b\n" \
  410. " .long 2b, 4b\n" \
  411. " .popsection" \
  412. : "+r" (err), "+r" (__pu_addr) \
  413. : "r" (x), "i" (-EFAULT) \
  414. : "cc")
  415. #ifdef CONFIG_MMU
  416. extern unsigned long __must_check
  417. arm_copy_from_user(void *to, const void __user *from, unsigned long n);
  418. static inline unsigned long __must_check
  419. __arch_copy_from_user(void *to, const void __user *from, unsigned long n)
  420. {
  421. unsigned int __ua_flags;
  422. __ua_flags = uaccess_save_and_enable();
  423. n = arm_copy_from_user(to, from, n);
  424. uaccess_restore(__ua_flags);
  425. return n;
  426. }
  427. extern unsigned long __must_check
  428. arm_copy_to_user(void __user *to, const void *from, unsigned long n);
  429. extern unsigned long __must_check
  430. __copy_to_user_std(void __user *to, const void *from, unsigned long n);
  431. static inline unsigned long __must_check
  432. __arch_copy_to_user(void __user *to, const void *from, unsigned long n)
  433. {
  434. #ifndef CONFIG_UACCESS_WITH_MEMCPY
  435. unsigned int __ua_flags;
  436. __ua_flags = uaccess_save_and_enable();
  437. n = arm_copy_to_user(to, from, n);
  438. uaccess_restore(__ua_flags);
  439. return n;
  440. #else
  441. return arm_copy_to_user(to, from, n);
  442. #endif
  443. }
  444. extern unsigned long __must_check
  445. arm_clear_user(void __user *addr, unsigned long n);
  446. extern unsigned long __must_check
  447. __clear_user_std(void __user *addr, unsigned long n);
  448. static inline unsigned long __must_check
  449. __clear_user(void __user *addr, unsigned long n)
  450. {
  451. unsigned int __ua_flags = uaccess_save_and_enable();
  452. n = arm_clear_user(addr, n);
  453. uaccess_restore(__ua_flags);
  454. return n;
  455. }
  456. #else
  457. #define __arch_copy_from_user(to, from, n) \
  458. (memcpy(to, (void __force *)from, n), 0)
  459. #define __arch_copy_to_user(to, from, n) \
  460. (memcpy((void __force *)to, from, n), 0)
  461. #define __clear_user(addr, n) (memset((void __force *)addr, 0, n), 0)
  462. #endif
  463. static inline unsigned long __must_check
  464. __copy_from_user(void *to, const void __user *from, unsigned long n)
  465. {
  466. check_object_size(to, n, false);
  467. return __arch_copy_from_user(to, from, n);
  468. }
  469. static inline unsigned long __must_check
  470. copy_from_user(void *to, const void __user *from, unsigned long n)
  471. {
  472. unsigned long res = n;
  473. check_object_size(to, n, false);
  474. if (likely(access_ok(VERIFY_READ, from, n)))
  475. res = __arch_copy_from_user(to, from, n);
  476. if (unlikely(res))
  477. memset(to + (n - res), 0, res);
  478. return res;
  479. }
  480. static inline unsigned long __must_check
  481. __copy_to_user(void __user *to, const void *from, unsigned long n)
  482. {
  483. check_object_size(from, n, true);
  484. return __arch_copy_to_user(to, from, n);
  485. }
  486. static inline unsigned long __must_check
  487. copy_to_user(void __user *to, const void *from, unsigned long n)
  488. {
  489. check_object_size(from, n, true);
  490. if (access_ok(VERIFY_WRITE, to, n))
  491. n = __arch_copy_to_user(to, from, n);
  492. return n;
  493. }
  494. #define __copy_to_user_inatomic __copy_to_user
  495. #define __copy_from_user_inatomic __copy_from_user
  496. static inline unsigned long __must_check clear_user(void __user *to, unsigned long n)
  497. {
  498. if (access_ok(VERIFY_WRITE, to, n))
  499. n = __clear_user(to, n);
  500. return n;
  501. }
  502. /* These are from lib/ code, and use __get_user() and friends */
  503. extern long strncpy_from_user(char *dest, const char __user *src, long count);
  504. extern __must_check long strlen_user(const char __user *str);
  505. extern __must_check long strnlen_user(const char __user *str, long n);
  506. #endif /* _ASMARM_UACCESS_H */