Commit f6ed4dc9 authored by Andrew Morton's avatar Andrew Morton Committed by Linus Torvalds

[PATCH] must_check copy_to_user()

Add __must_check tags to the x86 copy_*_user() functions.
Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
parent 58f56583
...@@ -375,8 +375,10 @@ do { \ ...@@ -375,8 +375,10 @@ do { \
: "m"(__m(addr)), "i"(errret), "0"(err)) : "m"(__m(addr)), "i"(errret), "0"(err))
unsigned long __copy_to_user_ll(void __user *to, const void *from, unsigned long n); unsigned long __must_check __copy_to_user_ll(void __user *to,
unsigned long __copy_from_user_ll(void *to, const void __user *from, unsigned long n); const void *from, unsigned long n);
unsigned long __must_check __copy_from_user_ll(void *to,
const void __user *from, unsigned long n);
/* /*
* Here we special-case 1, 2 and 4-byte copy_*_user invocations. On a fault * Here we special-case 1, 2 and 4-byte copy_*_user invocations. On a fault
...@@ -399,7 +401,7 @@ unsigned long __copy_from_user_ll(void *to, const void __user *from, unsigned lo ...@@ -399,7 +401,7 @@ unsigned long __copy_from_user_ll(void *to, const void __user *from, unsigned lo
* Returns number of bytes that could not be copied. * Returns number of bytes that could not be copied.
* On success, this will be zero. * On success, this will be zero.
*/ */
static inline unsigned long static inline unsigned long __must_check
__copy_to_user_inatomic(void __user *to, const void *from, unsigned long n) __copy_to_user_inatomic(void __user *to, const void *from, unsigned long n)
{ {
if (__builtin_constant_p(n)) { if (__builtin_constant_p(n)) {
...@@ -420,7 +422,7 @@ __copy_to_user_inatomic(void __user *to, const void *from, unsigned long n) ...@@ -420,7 +422,7 @@ __copy_to_user_inatomic(void __user *to, const void *from, unsigned long n)
return __copy_to_user_ll(to, from, n); return __copy_to_user_ll(to, from, n);
} }
static inline unsigned long static inline unsigned long __must_check
__copy_to_user(void __user *to, const void *from, unsigned long n) __copy_to_user(void __user *to, const void *from, unsigned long n)
{ {
might_sleep(); might_sleep();
...@@ -471,11 +473,14 @@ __copy_from_user(void *to, const void __user *from, unsigned long n) ...@@ -471,11 +473,14 @@ __copy_from_user(void *to, const void __user *from, unsigned long n)
might_sleep(); might_sleep();
return __copy_from_user_inatomic(to, from, n); return __copy_from_user_inatomic(to, from, n);
} }
unsigned long copy_to_user(void __user *to, const void *from, unsigned long n); unsigned long __must_check copy_to_user(void __user *to,
unsigned long copy_from_user(void *to, const void *from, unsigned long n);
const void __user *from, unsigned long n); unsigned long __must_check copy_from_user(void *to,
long strncpy_from_user(char *dst, const char __user *src, long count); const void __user *from, unsigned long n);
long __strncpy_from_user(char *dst, const char __user *src, long count); long __must_check strncpy_from_user(char *dst, const char __user *src,
long count);
long __must_check __strncpy_from_user(char *dst,
const char __user *src, long count);
/** /**
* strlen_user: - Get the size of a string in user space. * strlen_user: - Get the size of a string in user space.
...@@ -494,7 +499,7 @@ long __strncpy_from_user(char *dst, const char __user *src, long count); ...@@ -494,7 +499,7 @@ long __strncpy_from_user(char *dst, const char __user *src, long count);
#define strlen_user(str) strnlen_user(str, ~0UL >> 1) #define strlen_user(str) strnlen_user(str, ~0UL >> 1)
long strnlen_user(const char __user *str, long n); long strnlen_user(const char __user *str, long n);
unsigned long clear_user(void __user *mem, unsigned long len); unsigned long __must_check clear_user(void __user *mem, unsigned long len);
unsigned long __clear_user(void __user *mem, unsigned long len); unsigned long __must_check __clear_user(void __user *mem, unsigned long len);
#endif /* __i386_UACCESS_H */ #endif /* __i386_UACCESS_H */
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment