diff options
author | Al Viro <viro@ftp.linux.org.uk> | 2011-08-18 15:03:19 -0400 |
---|---|---|
committer | Richard Weinberger <richard@nod.at> | 2011-11-02 09:14:51 -0400 |
commit | 6582b7f7743da6ce3e3714e9e8b18e0e073d4acd (patch) | |
tree | 649346d2333865ccd4bb4d560ceb50c39139c5c2 /arch/um/sys-i386/syscalls.c | |
parent | 858ba94499b4f48e9eb0be7cf0092f1ea9460fef (diff) |
um: merge arch/um/sys-{i386,x86_64}
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Richard Weinberger <richard@nod.at>
Diffstat (limited to 'arch/um/sys-i386/syscalls.c')
-rw-r--r-- | arch/um/sys-i386/syscalls.c | 66 |
1 files changed, 0 insertions, 66 deletions
diff --git a/arch/um/sys-i386/syscalls.c b/arch/um/sys-i386/syscalls.c deleted file mode 100644 index 70ca357393b8..000000000000 --- a/arch/um/sys-i386/syscalls.c +++ /dev/null | |||
@@ -1,66 +0,0 @@ | |||
1 | /* | ||
2 | * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com) | ||
3 | * Licensed under the GPL | ||
4 | */ | ||
5 | |||
6 | #include "linux/sched.h" | ||
7 | #include "linux/shm.h" | ||
8 | #include "linux/ipc.h" | ||
9 | #include "linux/syscalls.h" | ||
10 | #include "asm/mman.h" | ||
11 | #include "asm/uaccess.h" | ||
12 | #include "asm/unistd.h" | ||
13 | |||
14 | /* | ||
15 | * The prototype on i386 is: | ||
16 | * | ||
17 | * int clone(int flags, void * child_stack, int * parent_tidptr, struct user_desc * newtls, int * child_tidptr) | ||
18 | * | ||
19 | * and the "newtls" arg. on i386 is read by copy_thread directly from the | ||
20 | * register saved on the stack. | ||
21 | */ | ||
22 | long sys_clone(unsigned long clone_flags, unsigned long newsp, | ||
23 | int __user *parent_tid, void *newtls, int __user *child_tid) | ||
24 | { | ||
25 | long ret; | ||
26 | |||
27 | if (!newsp) | ||
28 | newsp = UPT_SP(¤t->thread.regs.regs); | ||
29 | |||
30 | current->thread.forking = 1; | ||
31 | ret = do_fork(clone_flags, newsp, ¤t->thread.regs, 0, parent_tid, | ||
32 | child_tid); | ||
33 | current->thread.forking = 0; | ||
34 | return ret; | ||
35 | } | ||
36 | |||
37 | long sys_sigaction(int sig, const struct old_sigaction __user *act, | ||
38 | struct old_sigaction __user *oact) | ||
39 | { | ||
40 | struct k_sigaction new_ka, old_ka; | ||
41 | int ret; | ||
42 | |||
43 | if (act) { | ||
44 | old_sigset_t mask; | ||
45 | if (!access_ok(VERIFY_READ, act, sizeof(*act)) || | ||
46 | __get_user(new_ka.sa.sa_handler, &act->sa_handler) || | ||
47 | __get_user(new_ka.sa.sa_restorer, &act->sa_restorer)) | ||
48 | return -EFAULT; | ||
49 | __get_user(new_ka.sa.sa_flags, &act->sa_flags); | ||
50 | __get_user(mask, &act->sa_mask); | ||
51 | siginitset(&new_ka.sa.sa_mask, mask); | ||
52 | } | ||
53 | |||
54 | ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); | ||
55 | |||
56 | if (!ret && oact) { | ||
57 | if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) || | ||
58 | __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || | ||
59 | __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) | ||
60 | return -EFAULT; | ||
61 | __put_user(old_ka.sa.sa_flags, &oact->sa_flags); | ||
62 | __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); | ||
63 | } | ||
64 | |||
65 | return ret; | ||
66 | } | ||