|
@@ -136,3 +136,73 @@ asm (".section \"__ex_table\", \"a\"\n\t.previous");
|
|
|
|
|
|
# define __get_user_size(val, addr, n, err) \
|
|
|
do { \
|
|
|
+ register long __gu_r8 asm ("r8") = 0; \
|
|
|
+ register long __gu_r9 asm ("r9"); \
|
|
|
+ asm ("\n[1:]\tld"#n" %0=%2%P2\t// %0 and %1 get overwritten by exception handler\n" \
|
|
|
+ "\t.xdata4 \"__ex_table\", 1b-., 1f-.+4\n" \
|
|
|
+ "[1:]" \
|
|
|
+ : "=r"(__gu_r9), "=r"(__gu_r8) : "m"(__m(addr)), "1"(__gu_r8)); \
|
|
|
+ (err) = __gu_r8; \
|
|
|
+ (val) = __gu_r9; \
|
|
|
+} while (0)
|
|
|
+
|
|
|
+/*
|
|
|
+ * The "__put_user_size()" macro tells gcc it reads from memory instead of writing it. This
|
|
|
+ * is because they do not write to any memory gcc knows about, so there are no aliasing
|
|
|
+ * issues.
|
|
|
+ */
|
|
|
+# define __put_user_size(val, addr, n, err) \
|
|
|
+do { \
|
|
|
+ register long __pu_r8 asm ("r8") = 0; \
|
|
|
+ asm volatile ("\n[1:]\tst"#n" %1=%r2%P1\t// %0 gets overwritten by exception handler\n" \
|
|
|
+ "\t.xdata4 \"__ex_table\", 1b-., 1f-.\n" \
|
|
|
+ "[1:]" \
|
|
|
+ : "=r"(__pu_r8) : "m"(__m(addr)), "rO"(val), "0"(__pu_r8)); \
|
|
|
+ (err) = __pu_r8; \
|
|
|
+} while (0)
|
|
|
+
|
|
|
+#else /* !ASM_SUPPORTED */
|
|
|
+# define RELOC_TYPE 2 /* ip-rel */
|
|
|
+# define __get_user_size(val, addr, n, err) \
|
|
|
+do { \
|
|
|
+ __ld_user("__ex_table", (unsigned long) addr, n, RELOC_TYPE); \
|
|
|
+ (err) = ia64_getreg(_IA64_REG_R8); \
|
|
|
+ (val) = ia64_getreg(_IA64_REG_R9); \
|
|
|
+} while (0)
|
|
|
+# define __put_user_size(val, addr, n, err) \
|
|
|
+do { \
|
|
|
+ __st_user("__ex_table", (unsigned long) addr, n, RELOC_TYPE, (unsigned long) (val)); \
|
|
|
+ (err) = ia64_getreg(_IA64_REG_R8); \
|
|
|
+} while (0)
|
|
|
+#endif /* !ASM_SUPPORTED */
|
|
|
+
|
|
|
+extern void __get_user_unknown (void);
|
|
|
+
|
|
|
+/*
|
|
|
+ * Evaluating arguments X, PTR, SIZE, and SEGMENT may involve subroutine-calls, which
|
|
|
+ * could clobber r8 and r9 (among others). Thus, be careful not to evaluate it while
|
|
|
+ * using r8/r9.
|
|
|
+ */
|
|
|
+#define __do_get_user(check, x, ptr, size, segment) \
|
|
|
+({ \
|
|
|
+ const __typeof__(*(ptr)) __user *__gu_ptr = (ptr); \
|
|
|
+ __typeof__ (size) __gu_size = (size); \
|
|
|
+ long __gu_err = -EFAULT; \
|
|
|
+ unsigned long __gu_val = 0; \
|
|
|
+ if (!check || __access_ok(__gu_ptr, size, segment)) \
|
|
|
+ switch (__gu_size) { \
|
|
|
+ case 1: __get_user_size(__gu_val, __gu_ptr, 1, __gu_err); break; \
|
|
|
+ case 2: __get_user_size(__gu_val, __gu_ptr, 2, __gu_err); break; \
|
|
|
+ case 4: __get_user_size(__gu_val, __gu_ptr, 4, __gu_err); break; \
|
|
|
+ case 8: __get_user_size(__gu_val, __gu_ptr, 8, __gu_err); break; \
|
|
|
+ default: __get_user_unknown(); break; \
|
|
|
+ } \
|
|
|
+ (x) = (__typeof__(*(__gu_ptr))) __gu_val; \
|
|
|
+ __gu_err; \
|
|
|
+})
|
|
|
+
|
|
|
+#define __get_user_nocheck(x, ptr, size) __do_get_user(0, x, ptr, size, KERNEL_DS)
|
|
|
+#define __get_user_check(x, ptr, size, segment) __do_get_user(1, x, ptr, size, segment)
|
|
|
+
|
|
|
+extern void __put_user_unknown (void);
|
|
|
+
|