1.\" $NetBSD: store.9,v 1.2 1996/01/09 21:59:27 perry Exp $ 2.\" 3.\" Copyright (c) 1996 Jason R. Thorpe. 4.\" All rights reserved. 5.\" 6.\" This code is derived from software contributed by Kenneth Stailey. 7.\" 8.\" Redistribution and use in source and binary forms, with or without 9.\" modification, are permitted provided that the following conditions 10.\" are met: 11.\" 1. Redistributions of source code must retain the above copyright 12.\" notice, this list of conditions and the following disclaimer. 13.\" 2. Redistributions in binary form must reproduce the above copyright 14.\" notice, this list of conditions and the following disclaimer in the 15.\" documentation and/or other materials provided with the distribution. 16.\" 3. All advertising materials mentioning features or use of this software 17.\" must display the following acknowledgement: 18.\" This product includes software developed for the NetBSD Project 19.\" by Jason R. Thorpe. 20.\" 4. The name of the author may not be used to endorse or promote products 21.\" derived from this software without specific prior written permission. 22.\" 23.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 24.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 25.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 26.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 27.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 28.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 29.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 30.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 31.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.Dd July 22, 2021 36.Dt STORE 9 37.Os 38.Sh NAME 39.Nm store , 40.Nm subyte , 41.Nm suword 42.Nd store data to user-space 43.Sh SYNOPSIS 44.In sys/types.h 45.In sys/time.h 46.In sys/systm.h 47.Ft int 48.Fn subyte "volatile void *base" "int byte" 49.Ft int 50.Fn suword "volatile void *base" "long word" 51.Ft int 52.Fn suword16 "volatile void *base" "int word" 53.Ft int 54.Fn suword32 "volatile void *base" "int32_t word" 55.Ft int 56.Fn suword64 "volatile void *base" "int64_t word" 57.Sh DESCRIPTION 58The 59.Nm 60functions are designed to copy small amounts of data to user-space. 61If the user address is naturally aligned, then the operation will be 62performed atomically. 63Otherwise it may fail or be performed non-atomically, depending on 64the platform. 65.Pp 66The 67.Nm 68routines provide the following functionality: 69.Bl -tag -width "suword64()" 70.It Fn subyte 71Stores a byte of data to the user-space address 72.Pa base . 73.It Fn suword 74Stores a word of data to the user-space address 75.Pa base . 76.It Fn suword16 77Stores 16 bits of data to the user-space address 78.Pa base . 79.It Fn suword32 80Stores 32 bits of data to the user-space address 81.Pa base . 82.It Fn suword64 83Stores 64 bits of data to the user-space address 84.Pa base . 85.El 86.Sh RETURN VALUES 87The 88.Nm 89functions return 0 on success or -1 on failure. 90.Sh SEE ALSO 91.Xr copy 9 , 92.Xr fetch 9 93