x86, um: initial part of asm-um move
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> Signed-off-by: H. Peter Anvin <hpa@zytor.com>
This commit is contained in:
99
arch/um/include/asm/uaccess.h
Normal file
99
arch/um/include/asm/uaccess.h
Normal file
@@ -0,0 +1,99 @@
|
||||
/*
|
||||
* Copyright (C) 2002 Jeff Dike (jdike@karaya.com)
|
||||
* Licensed under the GPL
|
||||
*/
|
||||
|
||||
#ifndef __UM_UACCESS_H
|
||||
#define __UM_UACCESS_H
|
||||
|
||||
#include <asm/errno.h>
|
||||
#include <asm/processor.h>
|
||||
|
||||
/* thread_info has a mm_segment_t in it, so put the definition up here */
|
||||
typedef struct {
|
||||
unsigned long seg;
|
||||
} mm_segment_t;
|
||||
|
||||
#include "linux/thread_info.h"
|
||||
|
||||
#define VERIFY_READ 0
|
||||
#define VERIFY_WRITE 1
|
||||
|
||||
/*
|
||||
* The fs value determines whether argument validity checking should be
|
||||
* performed or not. If get_fs() == USER_DS, checking is performed, with
|
||||
* get_fs() == KERNEL_DS, checking is bypassed.
|
||||
*
|
||||
* For historical reasons, these macros are grossly misnamed.
|
||||
*/
|
||||
|
||||
#define MAKE_MM_SEG(s) ((mm_segment_t) { (s) })
|
||||
|
||||
#define KERNEL_DS MAKE_MM_SEG(0xFFFFFFFF)
|
||||
#define USER_DS MAKE_MM_SEG(TASK_SIZE)
|
||||
|
||||
#define get_ds() (KERNEL_DS)
|
||||
#define get_fs() (current_thread_info()->addr_limit)
|
||||
#define set_fs(x) (current_thread_info()->addr_limit = (x))
|
||||
|
||||
#define segment_eq(a, b) ((a).seg == (b).seg)
|
||||
|
||||
#include "um_uaccess.h"
|
||||
|
||||
#define __copy_from_user(to, from, n) copy_from_user(to, from, n)
|
||||
|
||||
#define __copy_to_user(to, from, n) copy_to_user(to, from, n)
|
||||
|
||||
#define __copy_to_user_inatomic __copy_to_user
|
||||
#define __copy_from_user_inatomic __copy_from_user
|
||||
|
||||
#define __get_user(x, ptr) \
|
||||
({ \
|
||||
const __typeof__(*(ptr)) __user *__private_ptr = (ptr); \
|
||||
__typeof__(x) __private_val; \
|
||||
int __private_ret = -EFAULT; \
|
||||
(x) = (__typeof__(*(__private_ptr)))0; \
|
||||
if (__copy_from_user((__force void *)&__private_val, (__private_ptr),\
|
||||
sizeof(*(__private_ptr))) == 0) { \
|
||||
(x) = (__typeof__(*(__private_ptr))) __private_val; \
|
||||
__private_ret = 0; \
|
||||
} \
|
||||
__private_ret; \
|
||||
})
|
||||
|
||||
#define get_user(x, ptr) \
|
||||
({ \
|
||||
const __typeof__((*(ptr))) __user *private_ptr = (ptr); \
|
||||
(access_ok(VERIFY_READ, private_ptr, sizeof(*private_ptr)) ? \
|
||||
__get_user(x, private_ptr) : ((x) = (__typeof__(*ptr))0, -EFAULT)); \
|
||||
})
|
||||
|
||||
#define __put_user(x, ptr) \
|
||||
({ \
|
||||
__typeof__(*(ptr)) __user *__private_ptr = ptr; \
|
||||
__typeof__(*(__private_ptr)) __private_val; \
|
||||
int __private_ret = -EFAULT; \
|
||||
__private_val = (__typeof__(*(__private_ptr))) (x); \
|
||||
if (__copy_to_user((__private_ptr), &__private_val, \
|
||||
sizeof(*(__private_ptr))) == 0) { \
|
||||
__private_ret = 0; \
|
||||
} \
|
||||
__private_ret; \
|
||||
})
|
||||
|
||||
#define put_user(x, ptr) \
|
||||
({ \
|
||||
__typeof__(*(ptr)) __user *private_ptr = (ptr); \
|
||||
(access_ok(VERIFY_WRITE, private_ptr, sizeof(*private_ptr)) ? \
|
||||
__put_user(x, private_ptr) : -EFAULT); \
|
||||
})
|
||||
|
||||
#define strlen_user(str) strnlen_user(str, ~0U >> 1)
|
||||
|
||||
struct exception_table_entry
|
||||
{
|
||||
unsigned long insn;
|
||||
unsigned long fixup;
|
||||
};
|
||||
|
||||
#endif
|
Reference in New Issue
Block a user