| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667 | /* * Copyright (c) 2017 Intel Corporation * * SPDX-License-Identifier: Apache-2.0 */#include <kernel.h>#include <syscall_handler.h>#include <kernel_structs.h>static struct z_object *validate_any_object(const void *obj){	struct z_object *ko;	int ret;	ko = z_object_find(obj);	/* This can be any kernel object and it doesn't have to be	 * initialized	 */	ret = z_object_validate(ko, K_OBJ_ANY, _OBJ_INIT_ANY);	if (ret != 0) {#ifdef CONFIG_LOG		z_dump_object_error(ret, obj, ko, K_OBJ_ANY);#endif		return NULL;	}	return ko;}/* Normally these would be included in userspace.c, but the way * syscall_dispatch.c declares weak handlers results in build errors if these * are located in userspace.c. Just put in a separate file. * * To avoid double z_object_find() lookups, we don't call the implementation * function, but call a level deeper. */static inline void z_vrfy_k_object_access_grant(const void *object,						struct k_thread *thread){	struct z_object *ko;	Z_OOPS(Z_SYSCALL_OBJ_INIT(thread, K_OBJ_THREAD));	ko = validate_any_object(object);	Z_OOPS(Z_SYSCALL_VERIFY_MSG(ko != NULL, "object %p access denied",				    object));	z_thread_perms_set(ko, thread);}#include <syscalls/k_object_access_grant_mrsh.c>static inline void z_vrfy_k_object_release(const void *object){	struct z_object *ko;	ko = validate_any_object((void *)object);	Z_OOPS(Z_SYSCALL_VERIFY_MSG(ko != NULL, "object %p access denied",				    (void *)object));	z_thread_perms_clear(ko, _current);}#include <syscalls/k_object_release_mrsh.c>static inline void *z_vrfy_k_object_alloc(enum k_objects otype){	return z_impl_k_object_alloc(otype);}#include <syscalls/k_object_alloc_mrsh.c>
 |