1 /* 2 * 'kernel.h' contains some often-used function prototypes etc 3 */ 4 void verify_area(void * addr,int count); 5 volatile void panic(const char * str); 6 volatile void do_exit(long error_code); 7 int printf(const char * fmt, ...); 8 int printk(const char * fmt, ...); 9 void console_print(const char * str); 10 int tty_write(unsigned ch,char * buf,int count); 11 void * malloc(unsigned int size); 12 void free_s(void * obj, int size); 13 14 #define free(x) free_s((x), 0) 15 16 /* 17 * This is defined as a macro, but at some point this might become a 18 * real subroutine that sets a flag if it returns true (to do 19 * BSD-style accounting where the process is flagged if it uses root 20 * privs). The implication of this is that you should do normal 21 * permissions checks first, and check suser() last. 22 */ 23 #define suser() (current->euid == 0) 24