1 #ifndef __H8300_UACCESS_H
2 #define __H8300_UACCESS_H
5 * User space memory access functions
7 #include <linux/sched.h>
9 #include <linux/string.h>
11 #include <asm/segment.h>
14 #define VERIFY_WRITE 1
16 /* We let the MMU do all checking */
17 #define access_ok(type, addr, size) __access_ok((unsigned long)addr,size)
18 static inline int __access_ok(unsigned long addr, unsigned long size)
20 #define RANGE_CHECK_OK(addr, size, lower, upper) \
21 (((addr) >= (lower)) && (((addr) + (size)) < (upper)))
23 extern unsigned long _ramend;
24 return(RANGE_CHECK_OK(addr, size, 0L, (unsigned long)&_ramend));
28 * The exception table consists of pairs of addresses: the first is the
29 * address of an instruction that is allowed to fault, and the second is
30 * the address at which the program should continue. No registers are
31 * modified, so it is entirely up to the continuation code to figure out
34 * All the routines below use bits of fixup code that are out of line
35 * with the main instruction path. This means when everything is well,
36 * we don't even have to jump over them. Further, they do not intrude
37 * on our cache or tlb entries.
40 struct exception_table_entry
42 unsigned long insn, fixup;
45 /* Returns 0 if exception not found and fixup otherwise. */
46 extern unsigned long search_exception_table(unsigned long);
50 * These are the main single-value transfer routines. They automatically
51 * use the right size if we just have the right pointer type.
54 #define put_user(x, ptr) \
57 typeof(*(ptr)) __pu_val = (x); \
58 switch (sizeof (*(ptr))) { \
62 *(ptr) = (__pu_val); \
65 memcpy(ptr, &__pu_val, sizeof (*(ptr))); \
68 __pu_err = __put_user_bad(); \
73 #define __put_user(x, ptr) put_user(x, ptr)
75 extern int __put_user_bad(void);
78 * Tell gcc we read from memory instead of writing: this is because
79 * we do not write to any memory gcc knows about, so there are no
83 #define __ptr(x) ((unsigned long *)(x))
86 * Tell gcc we read from memory instead of writing: this is because
87 * we do not write to any memory gcc knows about, so there are no
91 #define get_user(x, ptr) \
94 typeof(*(ptr)) __gu_val = *ptr; \
95 switch (sizeof(*(ptr))) { \
102 __gu_err = __get_user_bad(); \
109 #define __get_user(x, ptr) get_user(x, ptr)
111 extern int __get_user_bad(void);
113 #define copy_from_user(to, from, n) (memcpy(to, from, n), 0)
114 #define copy_to_user(to, from, n) (memcpy(to, from, n), 0)
116 #define __copy_from_user(to, from, n) copy_from_user(to, from, n)
117 #define __copy_to_user(to, from, n) copy_to_user(to, from, n)
118 #define __copy_to_user_inatomic __copy_to_user
119 #define __copy_from_user_inatomic __copy_from_user
121 #define copy_to_user_ret(to,from,n,retval) ({ if (copy_to_user(to,from,n)) return retval; })
123 #define copy_from_user_ret(to,from,n,retval) ({ if (copy_from_user(to,from,n)) return retval; })
126 * Copy a null terminated string from userspace.
130 strncpy_from_user(char *dst, const char *src, long count)
133 strncpy(dst, src, count);
134 for (tmp = dst; *tmp && count > 0; tmp++, count--)
136 return(tmp - dst); /* DAVIDM should we count a NUL ? check getname */
140 * Return the size of a string (including the ending 0)
142 * Return 0 on exception, a value greater than N if too long
144 static inline long strnlen_user(const char *src, long n)
146 return(strlen(src) + 1); /* DAVIDM make safer */
149 #define strlen_user(str) strnlen_user(str, 32767)
155 static inline unsigned long
156 clear_user(void *to, unsigned long n)
162 #endif /* _H8300_UACCESS_H */