????JFIF??x?x????'
Server IP : 79.136.114.73 / Your IP : 3.17.157.68 Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64 User : www-data ( 33) PHP Version : 5.5.9-1ubuntu4.29 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : ON | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /lib/modules/3.13.0-170-generic/build/arch/sparc/include/asm/ |
Upload File : |
#ifndef __ASM_SPARC_SYSCALL_H #define __ASM_SPARC_SYSCALL_H #include <linux/kernel.h> #include <linux/sched.h> #include <asm/ptrace.h> /* * The syscall table always contains 32 bit pointers since we know that the * address of the function to be called is (way) below 4GB. So the "int" * type here is what we want [need] for both 32 bit and 64 bit systems. */ extern const unsigned int sys_call_table[]; /* The system call number is given by the user in %g1 */ static inline long syscall_get_nr(struct task_struct *task, struct pt_regs *regs) { int syscall_p = pt_regs_is_syscall(regs); return (syscall_p ? regs->u_regs[UREG_G1] : -1L); } static inline void syscall_rollback(struct task_struct *task, struct pt_regs *regs) { /* XXX This needs some thought. On Sparc we don't * XXX save away the original %o0 value somewhere. * XXX Instead we hold it in register %l5 at the top * XXX level trap frame and pass this down to the signal * XXX dispatch code which is the only place that value * XXX ever was needed. */ } #ifdef CONFIG_SPARC32 static inline bool syscall_has_error(struct pt_regs *regs) { return (regs->psr & PSR_C) ? true : false; } static inline void syscall_set_error(struct pt_regs *regs) { regs->psr |= PSR_C; } static inline void syscall_clear_error(struct pt_regs *regs) { regs->psr &= ~PSR_C; } #else static inline bool syscall_has_error(struct pt_regs *regs) { return (regs->tstate & (TSTATE_XCARRY | TSTATE_ICARRY)) ? true : false; } static inline void syscall_set_error(struct pt_regs *regs) { regs->tstate |= (TSTATE_XCARRY | TSTATE_ICARRY); } static inline void syscall_clear_error(struct pt_regs *regs) { regs->tstate &= ~(TSTATE_XCARRY | TSTATE_ICARRY); } #endif static inline long syscall_get_error(struct task_struct *task, struct pt_regs *regs) { long val = regs->u_regs[UREG_I0]; return (syscall_has_error(regs) ? -val : 0); } static inline long syscall_get_return_value(struct task_struct *task, struct pt_regs *regs) { long val = regs->u_regs[UREG_I0]; return val; } static inline void syscall_set_return_value(struct task_struct *task, struct pt_regs *regs, int error, long val) { if (error) { syscall_set_error(regs); regs->u_regs[UREG_I0] = -error; } else { syscall_clear_error(regs); regs->u_regs[UREG_I0] = val; } } static inline void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs, unsigned int i, unsigned int n, unsigned long *args) { int zero_extend = 0; unsigned int j; #ifdef CONFIG_SPARC64 if (test_tsk_thread_flag(task, TIF_32BIT)) zero_extend = 1; #endif for (j = 0; j < n; j++) { unsigned long val = regs->u_regs[UREG_I0 + i + j]; if (zero_extend) args[j] = (u32) val; else args[j] = val; } } static inline void syscall_set_arguments(struct task_struct *task, struct pt_regs *regs, unsigned int i, unsigned int n, const unsigned long *args) { unsigned int j; for (j = 0; j < n; j++) regs->u_regs[UREG_I0 + i + j] = args[j]; } #endif /* __ASM_SPARC_SYSCALL_H */