sysfs: Remove support for tagged directories with untagged members (again)
[linux-btrfs-devel.git] / arch / um / sys-i386 / syscalls.c
blob70ca357393b86fb747895d1a11110324ccd1a4cf
1 /*
2 * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
3 * Licensed under the GPL
4 */
6 #include "linux/sched.h"
7 #include "linux/shm.h"
8 #include "linux/ipc.h"
9 #include "linux/syscalls.h"
10 #include "asm/mman.h"
11 #include "asm/uaccess.h"
12 #include "asm/unistd.h"
15 * The prototype on i386 is:
17 * int clone(int flags, void * child_stack, int * parent_tidptr, struct user_desc * newtls, int * child_tidptr)
19 * and the "newtls" arg. on i386 is read by copy_thread directly from the
20 * register saved on the stack.
22 long sys_clone(unsigned long clone_flags, unsigned long newsp,
23 int __user *parent_tid, void *newtls, int __user *child_tid)
25 long ret;
27 if (!newsp)
28 newsp = UPT_SP(&current->thread.regs.regs);
30 current->thread.forking = 1;
31 ret = do_fork(clone_flags, newsp, &current->thread.regs, 0, parent_tid,
32 child_tid);
33 current->thread.forking = 0;
34 return ret;
37 long sys_sigaction(int sig, const struct old_sigaction __user *act,
38 struct old_sigaction __user *oact)
40 struct k_sigaction new_ka, old_ka;
41 int ret;
43 if (act) {
44 old_sigset_t mask;
45 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
46 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
47 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
48 return -EFAULT;
49 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
50 __get_user(mask, &act->sa_mask);
51 siginitset(&new_ka.sa.sa_mask, mask);
54 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
56 if (!ret && oact) {
57 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
58 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
59 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
60 return -EFAULT;
61 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
62 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
65 return ret;