source: mainline/kernel/generic/src/syscall/copy.c@ a996ae31

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since a996ae31 was a996ae31, checked in by Jakub Jermar <jakub@…>, 13 years ago

Userspace IRQ pseudocode is expected to use physical addresses from now.
The kernel creates kernel mappings for those and adjusts the pseudocode
accordingly.

  • Property mode set to 100644
File size: 4.2 KB
Line 
1/*
2 * Copyright (c) 2006 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup generic
30 * @{
31 */
32
33/**
34 * @file
35 * @brief Copying between kernel and userspace.
36 *
37 * This file contains sanitized functions for copying data
38 * between kernel and userspace.
39 */
40
41#include <syscall/copy.h>
42#include <proc/thread.h>
43#include <mm/as.h>
44#include <macros.h>
45#include <arch.h>
46#include <errno.h>
47
48/** Copy data from userspace to kernel.
49 *
50 * Provisions are made to return value even after page fault.
51 *
52 * This function can be called only from syscall.
53 *
54 * @param dst Destination kernel address.
55 * @param uspace_src Source userspace address.
56 * @param size Size of the data to be copied.
57 *
58 * @return EOK on success or error code from @ref errno.h.
59 */
60int copy_from_uspace(void *dst, const void *uspace_src, size_t size)
61{
62 ipl_t ipl;
63 int rc;
64
65 ASSERT(THREAD);
66 ASSERT(!THREAD->in_copy_from_uspace);
67
68 if (!KERNEL_ADDRESS_SPACE_SHADOWED) {
69 if (overlaps((uintptr_t) uspace_src, size,
70 KERNEL_ADDRESS_SPACE_START,
71 KERNEL_ADDRESS_SPACE_END - KERNEL_ADDRESS_SPACE_START)) {
72 /*
73 * The userspace source block conflicts with kernel address space.
74 */
75 return EPERM;
76 }
77 }
78
79#ifdef ADDRESS_SPACE_HOLE_START
80 /*
81 * Check whether the address is outside the address space hole.
82 */
83 if (overlaps((uintptr_t) uspace_src, size, ADDRESS_SPACE_HOLE_START,
84 ADDRESS_SPACE_HOLE_END - ADDRESS_SPACE_HOLE_START))
85 return EPERM;
86#endif
87
88 ipl = interrupts_disable();
89 THREAD->in_copy_from_uspace = true;
90
91 rc = memcpy_from_uspace(dst, uspace_src, size);
92
93 THREAD->in_copy_from_uspace = false;
94
95 interrupts_restore(ipl);
96 return !rc ? EPERM : EOK;
97}
98
99/** Copy data from kernel to userspace.
100 *
101 * Provisions are made to return value even after page fault.
102 *
103 * This function can be called only from syscall.
104 *
105 * @param uspace_dst Destination userspace address.
106 * @param src Source kernel address.
107 * @param size Size of the data to be copied.
108 *
109 * @return 0 on success or error code from @ref errno.h.
110 */
111int copy_to_uspace(void *uspace_dst, const void *src, size_t size)
112{
113 ipl_t ipl;
114 int rc;
115
116 ASSERT(THREAD);
117 ASSERT(!THREAD->in_copy_to_uspace);
118
119 if (!KERNEL_ADDRESS_SPACE_SHADOWED) {
120 if (overlaps((uintptr_t) uspace_dst, size,
121 KERNEL_ADDRESS_SPACE_START,
122 KERNEL_ADDRESS_SPACE_END - KERNEL_ADDRESS_SPACE_START)) {
123 /*
124 * The userspace destination block conflicts with kernel address space.
125 */
126 return EPERM;
127 }
128 }
129
130#ifdef ADDRESS_SPACE_HOLE_START
131 /*
132 * Check whether the address is outside the address space hole.
133 */
134 if (overlaps((uintptr_t) uspace_dst, size, ADDRESS_SPACE_HOLE_START,
135 ADDRESS_SPACE_HOLE_END - ADDRESS_SPACE_HOLE_START))
136 return EPERM;
137#endif
138
139 ipl = interrupts_disable();
140 THREAD->in_copy_to_uspace = true;
141
142 rc = memcpy_to_uspace(uspace_dst, src, size);
143
144 THREAD->in_copy_to_uspace = false;
145
146 interrupts_restore(ipl);
147 return !rc ? EPERM : 0;
148}
149
150/** @}
151 */
Note: See TracBrowser for help on using the repository browser.