2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
|
|
|
|
* Licensed under the GPL
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __TT_UACCESS_H
|
|
|
|
#define __TT_UACCESS_H
|
|
|
|
|
|
|
|
#include "linux/string.h"
|
|
|
|
#include "linux/sched.h"
|
|
|
|
#include "asm/processor.h"
|
|
|
|
#include "asm/errno.h"
|
|
|
|
#include "asm/current.h"
|
|
|
|
#include "asm/a.out.h"
|
|
|
|
#include "uml_uaccess.h"
|
|
|
|
|
|
|
|
#define ABOVE_KMEM (16 * 1024 * 1024)
|
|
|
|
|
|
|
|
extern unsigned long end_vm;
|
|
|
|
extern unsigned long uml_physmem;
|
|
|
|
|
|
|
|
#define is_stack(addr, size) \
|
|
|
|
(((unsigned long) (addr) < STACK_TOP) && \
|
|
|
|
((unsigned long) (addr) >= STACK_TOP - ABOVE_KMEM) && \
|
|
|
|
(((unsigned long) (addr) + (size)) <= STACK_TOP))
|
|
|
|
|
|
|
|
#define access_ok_tt(type, addr, size) \
|
[PATCH] uml: fix access_ok
The access_ok_tt() macro is bogus, in that a read access is unconditionally
considered valid.
I couldn't find in SCM logs the introduction of this check, but I went back to
2.4.20-1um and the definition was the same.
Possibly this was done to avoid problems with missing set_fs() calls, but
there can't be any I think because they would fail with SKAS mode.
TT-specific code is still to check.
Also, this patch joins common code together, and makes the "address range
wrapping" check happen for all cases, rather than for only some.
This may, possibly, be reoptimized at some time, but the current code doesn't
seem clever, just confused.
* Important: I've also had to change references to access_ok_{tt,skas} back to
access_ok - the kernel wasn't that happy otherwise.
Signed-off-by: Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it>
Acked-by: Jeff Dike <jdike@addtoit.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-11-14 08:07:13 +08:00
|
|
|
(is_stack(addr, size))
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
extern int __do_copy_from_user(void *to, const void *from, int n,
|
|
|
|
void **fault_addr, void **fault_catcher);
|
|
|
|
extern int __do_strncpy_from_user(char *dst, const char *src, size_t n,
|
|
|
|
void **fault_addr, void **fault_catcher);
|
|
|
|
extern int __do_clear_user(void *mem, size_t len, void **fault_addr,
|
|
|
|
void **fault_catcher);
|
|
|
|
extern int __do_strnlen_user(const char *str, unsigned long n,
|
|
|
|
void **fault_addr, void **fault_catcher);
|
|
|
|
|
2005-09-10 00:15:13 +08:00
|
|
|
extern int copy_from_user_tt(void *to, const void __user *from, int n);
|
|
|
|
extern int copy_to_user_tt(void __user *to, const void *from, int n);
|
|
|
|
extern int strncpy_from_user_tt(char *dst, const char __user *src, int count);
|
|
|
|
extern int __clear_user_tt(void __user *mem, int len);
|
|
|
|
extern int clear_user_tt(void __user *mem, int len);
|
|
|
|
extern int strnlen_user_tt(const void __user *str, int len);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
#endif
|