/linux-2.4.37.9/arch/sparc/kernel/ |
D | sys_sparc.c | 373 struct old_sigaction *oact) in sparc_sigaction() argument 396 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sparc_sigaction() 398 if (!ret && oact) { in sparc_sigaction() 404 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sparc_sigaction() 405 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sparc_sigaction() 406 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sparc_sigaction() 408 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sparc_sigaction() 409 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sparc_sigaction() 416 sys_rt_sigaction(int sig, const struct sigaction *act, struct sigaction *oact, in sys_rt_sigaction() argument 437 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_rt_sigaction() [all …]
|
D | sys_sunos.c | 1158 struct old_sigaction *oact) in sunos_sigaction() argument 1177 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sunos_sigaction() 1179 if (!ret && oact) { in sunos_sigaction() 1187 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sunos_sigaction() 1188 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sunos_sigaction() 1189 __put_user(old_ka.sa.sa_flags, &oact->sa_flags)) in sunos_sigaction() 1191 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sunos_sigaction()
|
/linux-2.4.37.9/arch/s390x/kernel/ |
D | signal32.c | 164 struct old_sigaction32 *oact) in sys32_sigaction() argument 180 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_sigaction() 182 if (!ret && oact) { in sys32_sigaction() 183 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys32_sigaction() 184 __put_user((unsigned long)old_ka.sa.sa_handler, &oact->sa_handler) || in sys32_sigaction() 185 __put_user((unsigned long)old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys32_sigaction() 187 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys32_sigaction() 188 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys32_sigaction() 195 do_sigaction(int sig, const struct k_sigaction *act, struct k_sigaction *oact); 199 struct sigaction32 *oact, size_t sigsetsize) in sys32_rt_sigaction() argument [all …]
|
D | signal.c | 139 struct old_sigaction *oact) in sys_sigaction() argument 155 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 157 if (!ret && oact) { in sys_sigaction() 158 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 159 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 160 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 162 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 163 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/mips64/kernel/ |
D | signal32.c | 255 struct sigaction32 *oact) in sys32_sigaction() argument 276 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_sigaction() 278 if (!ret && oact) { in sys32_sigaction() 279 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact))) in sys32_sigaction() 281 err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys32_sigaction() 283 &oact->sa_handler); in sys32_sigaction() 284 err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); in sys32_sigaction() 285 err |= __put_user(0, &oact->sa_mask.sig[1]); in sys32_sigaction() 286 err |= __put_user(0, &oact->sa_mask.sig[2]); in sys32_sigaction() 287 err |= __put_user(0, &oact->sa_mask.sig[3]); in sys32_sigaction() [all …]
|
/linux-2.4.37.9/arch/cris/kernel/ |
D | signal.c | 157 struct old_sigaction *oact) in sys_sigaction() argument 173 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 175 if (!ret && oact) { in sys_sigaction() 176 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 177 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 178 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 180 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 181 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/mips/kernel/ |
D | signal.c | 137 struct sigaction *oact) in sys_sigaction() argument 157 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 159 if (!ret && oact) { in sys_sigaction() 160 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact))) in sys_sigaction() 162 err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 163 err |= __put_user(old_ka.sa.sa_handler, &oact->sa_handler); in sys_sigaction() 164 err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); in sys_sigaction() 165 err |= __put_user(0, &oact->sa_mask.sig[1]); in sys_sigaction() 166 err |= __put_user(0, &oact->sa_mask.sig[2]); in sys_sigaction() 167 err |= __put_user(0, &oact->sa_mask.sig[3]); in sys_sigaction()
|
D | irixsig.c | 385 struct sigaction *oact, void *trampoline) in irix_sigaction() argument 415 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in irix_sigaction() 417 if (!ret && oact) { in irix_sigaction() 418 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in irix_sigaction() 419 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in irix_sigaction() 420 __put_user(old_ka.sa.sa_flags, &oact->sa_flags)) in irix_sigaction() 422 __copy_to_user(&old_ka.sa.sa_mask, &oact->sa_mask, in irix_sigaction()
|
/linux-2.4.37.9/arch/alpha/kernel/ |
D | signal.c | 117 struct osf_sigaction *oact) in osf_sigaction() argument 133 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in osf_sigaction() 135 if (!ret && oact) { in osf_sigaction() 136 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in osf_sigaction() 137 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in osf_sigaction() 138 __put_user(old_ka.sa.sa_flags, &oact->sa_flags)) in osf_sigaction() 140 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in osf_sigaction() 147 sys_rt_sigaction(int sig, const struct sigaction *act, struct sigaction *oact, in sys_rt_sigaction() argument 163 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_rt_sigaction() 165 if (!ret && oact) { in sys_rt_sigaction() [all …]
|
/linux-2.4.37.9/arch/s390/kernel/ |
D | signal.c | 141 struct old_sigaction *oact) in sys_sigaction() argument 157 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 159 if (!ret && oact) { in sys_sigaction() 160 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 161 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 162 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 164 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 165 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/parisc/kernel/ |
D | signal32.c | 147 sys32_rt_sigaction(int sig, const struct sigaction32 *act, struct sigaction32 *oact, in sys32_rt_sigaction() argument 162 ret = do_sigaction(sig, act ? &new_sa : NULL, oact ? &old_sa : NULL); in sys32_rt_sigaction() 164 if (!ret && oact) { in sys32_rt_sigaction() 168 if (copy_to_user(oact, &old_sa32.sa, sizeof old_sa32.sa)) in sys32_rt_sigaction()
|
/linux-2.4.37.9/arch/ppc/kernel/ |
D | signal.c | 158 struct old_sigaction *oact) in sys_sigaction() argument 174 ret = do_sigaction(sig, (act? &new_ka: NULL), (oact? &old_ka: NULL)); in sys_sigaction() 176 if (!ret && oact) { in sys_sigaction() 177 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 178 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 179 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 181 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 182 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/arm/kernel/ |
D | signal.c | 143 struct old_sigaction *oact) in sys_sigaction() argument 159 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 161 if (!ret && oact) { in sys_sigaction() 162 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 163 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 164 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 166 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 167 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/ppc64/kernel/ |
D | signal.c | 197 struct old_sigaction *oact) in sys_sigaction() argument 214 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 215 if (!ret && oact) { in sys_sigaction() 216 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 217 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 218 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 220 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 221 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
D | signal32.c | 139 asmlinkage long sys32_sigaction(int sig, struct old_sigaction32 *act, struct old_sigaction32 *oact) in sys32_sigaction() argument 162 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_sigaction() 164 if (!ret && oact) in sys32_sigaction() 166 ret = put_user((long)old_ka.sa.sa_handler, &oact->sa_handler); in sys32_sigaction() 167 ret |= __put_user((long)old_ka.sa.sa_restorer, &oact->sa_restorer); in sys32_sigaction() 168 ret |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys32_sigaction() 169 ret |= __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys32_sigaction() 512 asmlinkage long sys32_rt_sigaction(int sig, const struct sigaction32 *act, struct sigaction32 *oact… in sys32_rt_sigaction() argument 545 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_rt_sigaction() 547 if (!ret && oact) { in sys32_rt_sigaction() [all …]
|
/linux-2.4.37.9/arch/sh/kernel/ |
D | signal.c | 128 struct old_sigaction *oact) in sys_sigaction() argument 144 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 146 if (!ret && oact) { in sys_sigaction() 147 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 148 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 149 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 151 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 152 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/ia64/ia32/ |
D | ia32_signal.c | 527 struct sigaction32 *oact, unsigned int sigsetsize) in sys32_rt_sigaction() argument 548 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_rt_sigaction() 550 if (!ret && oact) { in sys32_rt_sigaction() 551 ret = put_user(IA32_SA_HANDLER(&old_ka), &oact->sa_handler); in sys32_rt_sigaction() 552 ret |= put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys32_rt_sigaction() 553 ret |= put_user(IA32_SA_RESTORER(&old_ka), &oact->sa_restorer); in sys32_rt_sigaction() 554 ret |= copy_to_user(&oact->sa_mask, &old_ka.sa.sa_mask, sizeof(sigset32_t)); in sys32_rt_sigaction() 645 sys32_sigaction (int sig, struct old_sigaction32 *act, struct old_sigaction32 *oact) in sys32_sigaction() argument 665 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_sigaction() 667 if (!ret && oact) { in sys32_sigaction() [all …]
|
/linux-2.4.37.9/arch/i386/kernel/ |
D | signal.c | 124 struct old_sigaction *oact) in sys_sigaction() argument 140 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 142 if (!ret && oact) { in sys_sigaction() 143 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 144 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 145 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 147 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 148 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/sh64/kernel/ |
D | signal.c | 151 struct old_sigaction *oact) in sys_sigaction() argument 167 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 169 if (!ret && oact) { in sys_sigaction() 170 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 171 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 172 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 174 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 175 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/m68k/kernel/ |
D | signal.c | 124 struct old_sigaction *oact) in sys_sigaction() argument 140 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_sigaction() 142 if (!ret && oact) { in sys_sigaction() 143 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys_sigaction() 144 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || in sys_sigaction() 145 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) in sys_sigaction() 147 __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys_sigaction() 148 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys_sigaction()
|
/linux-2.4.37.9/arch/sparc64/kernel/ |
D | sys_sparc.c | 565 sys_rt_sigaction(int sig, const struct sigaction *act, struct sigaction *oact, in sys_rt_sigaction() argument 581 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys_rt_sigaction() 583 if (!ret && oact) { in sys_rt_sigaction() 584 if (copy_to_user(oact, &old_ka.sa, sizeof(*oact))) in sys_rt_sigaction()
|
D | sys_sunos32.c | 1305 asmlinkage int sunos_sigaction (int sig, u32 act, u32 oact) in sunos_sigaction() argument 1325 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sunos_sigaction() 1327 if (!ret && oact) { in sunos_sigaction() 1329 if (put_user((long)old_ka.sa.sa_handler, &((struct old_sigaction32 *)A(oact))->sa_handler) || in sunos_sigaction() 1330 __put_user(old_ka.sa.sa_flags, &((struct old_sigaction32 *)A(oact))->sa_flags)) in sunos_sigaction() 1332 __put_user(old_ka.sa.sa_mask.sig[0], &((struct old_sigaction32 *)A(oact))->sa_mask); in sunos_sigaction()
|
D | sys_sparc32.c | 3082 asmlinkage int sys32_sigaction (int sig, struct old_sigaction32 *act, struct old_sigaction32 *oact) in sys32_sigaction() argument 3108 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_sigaction() 3110 if (!ret && oact) { in sys32_sigaction() 3111 ret = put_user((long)old_ka.sa.sa_handler, &oact->sa_handler); in sys32_sigaction() 3112 ret |= __put_user((long)old_ka.sa.sa_restorer, &oact->sa_restorer); in sys32_sigaction() 3113 ret |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); in sys32_sigaction() 3114 ret |= __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); in sys32_sigaction() 3121 sys32_rt_sigaction(int sig, struct sigaction32 *act, struct sigaction32 *oact, in sys32_rt_sigaction() argument 3157 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_rt_sigaction() 3159 if (!ret && oact) { in sys32_rt_sigaction() [all …]
|
/linux-2.4.37.9/kernel/ |
D | signal.c | 1087 do_sigaction(int sig, const struct k_sigaction *act, struct k_sigaction *oact) in do_sigaction() argument 1099 if (oact) in do_sigaction() 1100 *oact = *k; in do_sigaction() 1265 sys_rt_sigaction(int sig, const struct sigaction *act, struct sigaction *oact, in sys_rt_sigaction() argument 1280 ret = do_sigaction(sig, act ? &new_sa : NULL, oact ? &old_sa : NULL); in sys_rt_sigaction() 1282 if (!ret && oact) { in sys_rt_sigaction() 1283 if (copy_to_user(oact, &old_sa.sa, sizeof(old_sa.sa))) in sys_rt_sigaction()
|
/linux-2.4.37.9/arch/x86_64/ia32/ |
D | sys_ia32.c | 376 struct sigaction32 *oact, unsigned int sigsetsize) in sys32_rt_sigaction() argument 411 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_rt_sigaction() 413 if (!ret && oact) { in sys32_rt_sigaction() 429 if (verify_area(VERIFY_WRITE, oact, sizeof(*oact)) || in sys32_rt_sigaction() 430 __put_user((long)old_ka.sa.sa_handler, &oact->sa_handler) || in sys32_rt_sigaction() 431 __put_user((long)old_ka.sa.sa_restorer, &oact->sa_restorer) || in sys32_rt_sigaction() 432 __put_user(old_ka.sa.sa_flags, &oact->sa_flags) || in sys32_rt_sigaction() 433 __copy_to_user(&oact->sa_mask, &set32, sizeof(sigset32_t))) in sys32_rt_sigaction() 441 sys32_sigaction (int sig, struct old_sigaction32 *act, struct old_sigaction32 *oact) in sys32_sigaction() argument 461 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); in sys32_sigaction() [all …]
|