Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2229053/?format=api
{ "id": 2229053, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2229053/?format=api", "web_url": "http://patchwork.ozlabs.org/project/sparclinux/patch/a6d39afb167871e0459946dfd6b28bc994ae3c81.1777306795.git.chleroy@kernel.org/", "project": { "id": 10, "url": "http://patchwork.ozlabs.org/api/1.1/projects/10/?format=api", "name": "Linux SPARC Development ", "link_name": "sparclinux", "list_id": "sparclinux.vger.kernel.org", "list_email": "sparclinux@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null }, "msgid": "<a6d39afb167871e0459946dfd6b28bc994ae3c81.1777306795.git.chleroy@kernel.org>", "date": "2026-04-27T17:13:42", "name": "[RFC,v1,1/9] uaccess: Split check_zeroed_user() out of usercopy.c", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "edf1ca774360845bd87b9c22c0d6b31a45356ab3", "submitter": { "id": 92089, "url": "http://patchwork.ozlabs.org/api/1.1/people/92089/?format=api", "name": "Christophe Leroy (CS GROUP)", "email": "chleroy@kernel.org" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/sparclinux/patch/a6d39afb167871e0459946dfd6b28bc994ae3c81.1777306795.git.chleroy@kernel.org/mbox/", "series": [ { "id": 501694, "url": "http://patchwork.ozlabs.org/api/1.1/series/501694/?format=api", "web_url": "http://patchwork.ozlabs.org/project/sparclinux/list/?series=501694", "date": "2026-04-27T17:13:41", "name": "uaccess: Convert small fixed size copy_{to/from}_user() to scoped user access", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/501694/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2229053/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2229053/checks/", "tags": {}, "headers": { "Return-Path": "\n <SRS0=jGNS=C2=vger.kernel.org=sparclinux+bounces-6726-patchwork-incoming=ozlabs.org@ozlabs.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "sparclinux@vger.kernel.org" ], "Delivered-To": [ "patchwork-incoming@legolas.ozlabs.org", "patchwork-incoming@ozlabs.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=ccnzw+ca;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=ozlabs.org\n (client-ip=2404:9400:2221:ea00::3; helo=mail.ozlabs.org;\n envelope-from=srs0=jgns=c2=vger.kernel.org=sparclinux+bounces-6726-patchwork-incoming=ozlabs.org@ozlabs.org;\n receiver=patchwork.ozlabs.org)", "gandalf.ozlabs.org;\n arc=pass smtp.remote-ip=172.234.253.10 arc.chain=subspace.kernel.org", "gandalf.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=kernel.org", "gandalf.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=ccnzw+ca;\n\tdkim-atps=neutral", "gandalf.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=sparclinux+bounces-6726-patchwork-incoming=ozlabs.org@vger.kernel.org;\n receiver=ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"ccnzw+ca\"", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201" ], "Received": [ "from mail.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g49K66ZRhz1yJX\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 03:19:06 +1000 (AEST)", "from mail.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3])\n\tby gandalf.ozlabs.org (Postfix) with ESMTP id 4g49K65z5Yz4wKx\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 03:19:06 +1000 (AEST)", "by gandalf.ozlabs.org (Postfix)\n\tid 4g49K65qj6z4wLj; Tue, 28 Apr 2026 03:19:06 +1000 (AEST)", "from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby gandalf.ozlabs.org (Postfix) with ESMTPS id 4g49K25r3Nz4wKx\n\tfor <patchwork-incoming@ozlabs.org>; Tue, 28 Apr 2026 03:19:02 +1000 (AEST)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 1862A30793CB\n\tfor <patchwork-incoming@ozlabs.org>; Mon, 27 Apr 2026 17:17:16 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 840703E3172;\n\tMon, 27 Apr 2026 17:17:13 +0000 (UTC)", "from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 40BBD31159C;\n\tMon, 27 Apr 2026 17:17:13 +0000 (UTC)", "by smtp.kernel.org (Postfix) with ESMTPSA id AC974C2BCB5;\n\tMon, 27 Apr 2026 17:16:59 +0000 (UTC)" ], "ARC-Seal": [ "i=2; a=rsa-sha256; d=ozlabs.org; s=201707; t=1777310346; cv=pass;\n\tb=Cvn3wsLNJoZyij8f9imWEzH88YjcLC/NJzX2RlzoQaFUxBCv4gSZA/ZxSr5/nBPtycZoEyXj2i5VIbx1D/AWv8yhNRMiN2uG915H0fU+uQa+4kiB43RXqeh9ovuiFv3mnsL7am8cXrDXzJx+NLAVj5S7OXGm9PXsz9P/IG3JDx5HhJjDgSTFXMI24XWDg6gYllLb1KuQC7AInaNazcPox6Auwe/PI5h1KdAGHvKC82QjY/57J0yciYkUbjUR0EadfCMneeeNuPf0LE1M5Z/6ofUOiItmoagesa3ZalTQonNOlfx7oDjYs6wzZAlXI70KBdI4QdSyDuClU4RY0LaZLA==", "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777310233; cv=none;\n b=Fcv4IoDZLX3sKWsgNOQ8O4PaaewmbZwoxkKixz636T8pqy4uWOZFrewhtFadeg+pU6ZgZfIdqfxHlVcJWrQTwl5HcoJPVtz8Am3a5jJRG3t9E3/oM/ZPsAbQIja/uXZT9aI/MAXKbnuhZx6l4P+M76jj9PsNCslk1cwz/y7GQKM=" ], "ARC-Message-Signature": [ "i=2; a=rsa-sha256; d=ozlabs.org; s=201707;\n\tt=1777310346; c=relaxed/relaxed;\n\tbh=BPNbmpE378SDR0albN3uUkse5xd3MAMC7j8Z5wC8tqY=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version;\n b=LOmPVaNWcamjyJJo0BB//DnO8fIeDmVe+8dMQuf5S51rBzZC9iIhJtBI9Or9CsRzsQpUjoQyJXG+5IGpIFRzk8HDlQX32+ftLPuZSpU1PQ9RoyZ1ppdr66Mvtl5NwKrsy2aJsrYob/p/pJv95UArMjC4+rSMRhjS9jcxiAK7yxCD02u1r7MO/QdNs3cqC7Wwk2R0WQ2RqlzKqpG55wBcY5FdyZS53fbHfJANHYLH9SuQNltaoztQ31JfdfPT/rMaAFvjOQObtWL59lXzacHGHHmGVTSel1wOpmIpyGHD0KqGglb2BfPeKTFtVWOUZhEDpzr5dJhkaovkdTAbrmB0AQ==", "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777310233; c=relaxed/simple;\n\tbh=745VKRe61Lf8afs4o89V2mPmcfGcqMzEwAyCkwUFzR4=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version;\n b=b1sRQB/PoXn0uxh+TitWaBvdnAW19gbxBnm3Dzp0XHxW99/oz6sU6VR3f4pX9xsvdA6BU1sAwtZWkIiSjUipNvJgXRqPa20U5FMMAoy4fahOKIW7n1Fmw5KAEo0EonS8TO3wKRhiClcV+NL66QBcQt5E+J2PQ6d6aEYjXXAkv/A=" ], "ARC-Authentication-Results": [ "i=2; gandalf.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=kernel.org;\n dkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=ccnzw+ca; dkim-atps=neutral;\n spf=pass (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=sparclinux+bounces-6726-patchwork-incoming=ozlabs.org@vger.kernel.org;\n receiver=ozlabs.org) smtp.mailfrom=vger.kernel.org", "i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=ccnzw+ca; arc=none smtp.client-ip=10.30.226.201" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1777310232;\n\tbh=745VKRe61Lf8afs4o89V2mPmcfGcqMzEwAyCkwUFzR4=;\n\th=From:To:Cc:Subject:Date:In-Reply-To:References:From;\n\tb=ccnzw+capg6i/qeCJEEZZnJkaeh2P8NEABjGdQ84B8/8ElHQuhaIfwHK4KyIZjuzW\n\t fShA2udW2NQ0Ct7kJfcn/Kb043ljqkq7hTjPsRqwiNPGH9FmgvMogRNjEATWGrG26g\n\t 6zW5qtX0OAMj+t+S60HkjDsyGYMrisyc3m/7o9VPvVvQnsaPOrT5y+ZTzyh8Xto7fx\n\t AWFGU9d3c0Mo3tNoddRUR02dQmZ5LMWSNNkmTWtszo39IueJ4zsAp4+3T5NcIhGntz\n\t oVxgjUbjxhRTuJF8KweLMZaWvhi+rfu1/RR3XrUIQOPEazAae4t8SpoXJ0czDjJbhT\n\t 7qOjNG8l7cqnA==", "From": "\"Christophe Leroy (CS GROUP)\" <chleroy@kernel.org>", "To": "Yury Norov <ynorov@nvidia.com>,\n\tAndrew Morton <akpm@linux-foundation.org>,\n\tLinus Torvalds <torvalds@linux-foundation.org>,\n\tDavid Laight <david.laight.linux@gmail.com>,\n\tThomas Gleixner <tglx@linutronix.de>", "Cc": "\"Christophe Leroy (CS GROUP)\" <chleroy@kernel.org>,\n\tlinux-alpha@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org,\n\tlinux-snps-arc@lists.infradead.org,\n\tlinux-arm-kernel@lists.infradead.org,\n\tlinux-mips@vger.kernel.org,\n\tlinuxppc-dev@lists.ozlabs.org,\n\tkvm@vger.kernel.org,\n\tlinux-riscv@lists.infradead.org,\n\tlinux-s390@vger.kernel.org,\n\tsparclinux@vger.kernel.org,\n\tlinux-um@lists.infradead.org,\n\tdmaengine@vger.kernel.org,\n\tlinux-efi@vger.kernel.org,\n\tlinux-fsi@lists.ozlabs.org,\n\tamd-gfx@lists.freedesktop.org,\n\tdri-devel@lists.freedesktop.org,\n\tintel-gfx@lists.freedesktop.org,\n\tlinux-wpan@vger.kernel.org,\n\tnetdev@vger.kernel.org,\n\tlinux-wireless@vger.kernel.org,\n\tlinux-spi@vger.kernel.org,\n\tlinux-media@vger.kernel.org,\n\tlinux-staging@lists.linux.dev,\n\tlinux-serial@vger.kernel.org,\n\tlinux-usb@vger.kernel.org,\n\txen-devel@lists.xenproject.org,\n\tlinux-fsdevel@vger.kernel.org,\n\tocfs2-devel@lists.linux.dev,\n\tbpf@vger.kernel.org,\n\tkasan-dev@googlegroups.com,\n\tlinux-mm@kvack.org,\n\tlinux-x25@vger.kernel.org,\n\trust-for-linux@vger.kernel.org,\n\tlinux-sound@vger.kernel.org,\n\tsound-open-firmware@alsa-project.org,\n\tlinux-csky@vger.kernel.org,\n\tlinux-hexagon@vger.kernel.org,\n\tloongarch@lists.linux.dev,\n\tlinux-m68k@lists.linux-m68k.org,\n\tlinux-openrisc@vger.kernel.org,\n\tlinux-parisc@vger.kernel.org,\n\tlinux-sh@vger.kernel.org,\n\tlinux-arch@vger.kernel.org", "Subject": "[RFC PATCH v1 1/9] uaccess: Split check_zeroed_user() out of\n usercopy.c", "Date": "Mon, 27 Apr 2026 19:13:42 +0200", "Message-ID": "\n <a6d39afb167871e0459946dfd6b28bc994ae3c81.1777306795.git.chleroy@kernel.org>", "X-Mailer": "git-send-email 2.49.0", "In-Reply-To": "<cover.1777306795.git.chleroy@kernel.org>", "References": "<cover.1777306795.git.chleroy@kernel.org>", "Precedence": "bulk", "X-Mailing-List": "sparclinux@vger.kernel.org", "List-Id": "<sparclinux.vger.kernel.org>", "List-Subscribe": "<mailto:sparclinux+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:sparclinux+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "X-Developer-Signature": "v=1; a=openpgp-sha256; l=4389; i=chleroy@kernel.org;\n h=from:subject:message-id; bh=745VKRe61Lf8afs4o89V2mPmcfGcqMzEwAyCkwUFzR4=;\n b=owGbwMvMwCV2d0KB2p7V54MZT6slMWS+nxmtvkzq83WmyICs092/GNmylHyYwx1uy/R0rjqso\n Tc19NiJjlIWBjEuBlkxRZbj/7l3zej6kpo/dZc+zBxWJpAhDFycAjCRrBxGhr1T21lnr9ow8bLw\n mlcX9LlDfR53LmTbs/fCv2dGAh23RTkY/gpGWFpU+sbMuNm2suHwI9OT2xZsfrLc1dbD4+idxHd\n 72DkA", "X-Developer-Key": "i=chleroy@kernel.org; a=openpgp;\n fpr=10FFE6F8B390DE17ACC2632368A92FEB01B8DD78", "Content-Transfer-Encoding": "8bit", "X-Spam-Status": "No, score=-1.2 required=5.0 tests=ARC_SIGNED,ARC_VALID,\n\tDKIMWL_WL_HIGH,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DMARC_PASS,\n\tMAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=disabled\n\tversion=4.0.1", "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on gandalf.ozlabs.org" }, "content": "Until commit f5a1a536fa14 (\"lib: introduce copy_struct_from_user()\nhelper\"), lib/usercopy.c was containing only the out-line version\nof user copy fonctions.\n\nThat commit added function check_zeroed_user() into the same file.\nMove that function into a new file named usercheck.c, so that next\npatch can change usercopy.c build to a conditional build.\n\nSigned-off-by: Christophe Leroy (CS GROUP) <chleroy@kernel.org>\n---\n lib/Makefile | 1 +\n lib/{usercopy.c => usercheck.c} | 22 ------------\n lib/usercopy.c | 62 ---------------------------------\n 3 files changed, 1 insertion(+), 84 deletions(-)\n copy lib/{usercopy.c => usercheck.c} (73%)", "diff": "diff --git a/lib/Makefile b/lib/Makefile\nindex f33a24bf1c19..7c0334d7675b 100644\n--- a/lib/Makefile\n+++ b/lib/Makefile\n@@ -59,6 +59,7 @@ obj-y += bcd.o sort.o parser.o debug_locks.o random32.o \\\n \t percpu-refcount.o rhashtable.o base64.o \\\n \t once.o refcount.o rcuref.o usercopy.o errseq.o bucket_locks.o \\\n \t generic-radix-tree.o bitmap-str.o\n+obj-y += usercheck.o\n obj-y += string_helpers.o\n obj-y += hexdump.o\n obj-$(CONFIG_TEST_HEXDUMP) += test_hexdump.o\ndiff --git a/lib/usercopy.c b/lib/usercheck.c\nsimilarity index 73%\ncopy from lib/usercopy.c\ncopy to lib/usercheck.c\nindex b00a3a957de6..15b0d9a18435 100644\n--- a/lib/usercopy.c\n+++ b/lib/usercheck.c\n@@ -2,32 +2,10 @@\n #include <linux/compiler.h>\n #include <linux/errno.h>\n #include <linux/export.h>\n-#include <linux/fault-inject-usercopy.h>\n-#include <linux/instrumented.h>\n #include <linux/kernel.h>\n-#include <linux/nospec.h>\n-#include <linux/string.h>\n #include <linux/uaccess.h>\n #include <linux/wordpart.h>\n \n-/* out-of-line parts */\n-\n-#if !defined(INLINE_COPY_FROM_USER)\n-unsigned long _copy_from_user(void *to, const void __user *from, unsigned long n)\n-{\n-\treturn _inline_copy_from_user(to, from, n);\n-}\n-EXPORT_SYMBOL(_copy_from_user);\n-#endif\n-\n-#if !defined(INLINE_COPY_TO_USER)\n-unsigned long _copy_to_user(void __user *to, const void *from, unsigned long n)\n-{\n-\treturn _inline_copy_to_user(to, from, n);\n-}\n-EXPORT_SYMBOL(_copy_to_user);\n-#endif\n-\n /**\n * check_zeroed_user: check if a userspace buffer only contains zero bytes\n * @from: Source address, in userspace.\ndiff --git a/lib/usercopy.c b/lib/usercopy.c\nindex b00a3a957de6..7a93f56d81dd 100644\n--- a/lib/usercopy.c\n+++ b/lib/usercopy.c\n@@ -1,14 +1,6 @@\n // SPDX-License-Identifier: GPL-2.0\n-#include <linux/compiler.h>\n-#include <linux/errno.h>\n #include <linux/export.h>\n-#include <linux/fault-inject-usercopy.h>\n-#include <linux/instrumented.h>\n-#include <linux/kernel.h>\n-#include <linux/nospec.h>\n-#include <linux/string.h>\n #include <linux/uaccess.h>\n-#include <linux/wordpart.h>\n \n /* out-of-line parts */\n \n@@ -27,57 +19,3 @@ unsigned long _copy_to_user(void __user *to, const void *from, unsigned long n)\n }\n EXPORT_SYMBOL(_copy_to_user);\n #endif\n-\n-/**\n- * check_zeroed_user: check if a userspace buffer only contains zero bytes\n- * @from: Source address, in userspace.\n- * @size: Size of buffer.\n- *\n- * This is effectively shorthand for \"memchr_inv(from, 0, size) == NULL\" for\n- * userspace addresses (and is more efficient because we don't care where the\n- * first non-zero byte is).\n- *\n- * Returns:\n- * * 0: There were non-zero bytes present in the buffer.\n- * * 1: The buffer was full of zero bytes.\n- * * -EFAULT: access to userspace failed.\n- */\n-int check_zeroed_user(const void __user *from, size_t size)\n-{\n-\tunsigned long val;\n-\tuintptr_t align = (uintptr_t) from % sizeof(unsigned long);\n-\n-\tif (unlikely(size == 0))\n-\t\treturn 1;\n-\n-\tfrom -= align;\n-\tsize += align;\n-\n-\tif (!user_read_access_begin(from, size))\n-\t\treturn -EFAULT;\n-\n-\tunsafe_get_user(val, (unsigned long __user *) from, err_fault);\n-\tif (align)\n-\t\tval &= ~aligned_byte_mask(align);\n-\n-\twhile (size > sizeof(unsigned long)) {\n-\t\tif (unlikely(val))\n-\t\t\tgoto done;\n-\n-\t\tfrom += sizeof(unsigned long);\n-\t\tsize -= sizeof(unsigned long);\n-\n-\t\tunsafe_get_user(val, (unsigned long __user *) from, err_fault);\n-\t}\n-\n-\tif (size < sizeof(unsigned long))\n-\t\tval &= aligned_byte_mask(size);\n-\n-done:\n-\tuser_read_access_end();\n-\treturn (val == 0);\n-err_fault:\n-\tuser_read_access_end();\n-\treturn -EFAULT;\n-}\n-EXPORT_SYMBOL(check_zeroed_user);\n", "prefixes": [ "RFC", "v1", "1/9" ] }