oact 61 arch/alpha/kernel/signal.c struct osf_sigaction __user *, oact) oact 77 arch/alpha/kernel/signal.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 79 arch/alpha/kernel/signal.c if (!ret && oact) { oact 80 arch/alpha/kernel/signal.c if (!access_ok(oact, sizeof(*oact)) || oact 81 arch/alpha/kernel/signal.c __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || oact 82 arch/alpha/kernel/signal.c __put_user(old_ka.sa.sa_flags, &oact->sa_flags) || oact 83 arch/alpha/kernel/signal.c __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask)) oact 91 arch/alpha/kernel/signal.c struct sigaction __user *, oact, oact 107 arch/alpha/kernel/signal.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 109 arch/alpha/kernel/signal.c if (!ret && oact) { oact 110 arch/alpha/kernel/signal.c if (copy_to_user(oact, &old_ka.sa, sizeof(*oact))) oact 584 arch/mips/kernel/signal.c struct sigaction __user *, oact) oact 604 arch/mips/kernel/signal.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 606 arch/mips/kernel/signal.c if (!ret && oact) { oact 607 arch/mips/kernel/signal.c if (!access_ok(oact, sizeof(*oact))) oact 609 arch/mips/kernel/signal.c err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); oact 610 arch/mips/kernel/signal.c err |= __put_user(old_ka.sa.sa_handler, &oact->sa_handler); oact 611 arch/mips/kernel/signal.c err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); oact 612 arch/mips/kernel/signal.c err |= __put_user(0, &oact->sa_mask.sig[1]); oact 613 arch/mips/kernel/signal.c err |= __put_user(0, &oact->sa_mask.sig[2]); oact 614 arch/mips/kernel/signal.c err |= __put_user(0, &oact->sa_mask.sig[3]); oact 39 arch/mips/kernel/signal32.c struct compat_sigaction __user *, oact) oact 61 arch/mips/kernel/signal32.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 63 arch/mips/kernel/signal32.c if (!ret && oact) { oact 64 arch/mips/kernel/signal32.c if (!access_ok(oact, sizeof(*oact))) oact 66 arch/mips/kernel/signal32.c err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); oact 68 arch/mips/kernel/signal32.c &oact->sa_handler); oact 69 arch/mips/kernel/signal32.c err |= __put_user(old_ka.sa.sa_mask.sig[0], oact->sa_mask.sig); oact 70 arch/mips/kernel/signal32.c err |= __put_user(0, &oact->sa_mask.sig[1]); oact 71 arch/mips/kernel/signal32.c err |= __put_user(0, &oact->sa_mask.sig[2]); oact 72 arch/mips/kernel/signal32.c err |= __put_user(0, &oact->sa_mask.sig[3]); oact 143 arch/sparc/kernel/sys_sparc32.c struct compat_old_sigaction __user *,oact) oact 146 arch/sparc/kernel/sys_sparc32.c return compat_sys_sigaction(-sig, act, oact); oact 151 arch/sparc/kernel/sys_sparc32.c struct compat_sigaction __user *,oact, oact 176 arch/sparc/kernel/sys_sparc32.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 178 arch/sparc/kernel/sys_sparc32.c if (!ret && oact) { oact 179 arch/sparc/kernel/sys_sparc32.c ret = put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler); oact 180 arch/sparc/kernel/sys_sparc32.c ret |= put_compat_sigset(&oact->sa_mask, &old_ka.sa.sa_mask, oact 181 arch/sparc/kernel/sys_sparc32.c sizeof(oact->sa_mask)); oact 182 arch/sparc/kernel/sys_sparc32.c ret |= put_user(old_ka.sa.sa_flags, &oact->sa_flags); oact 183 arch/sparc/kernel/sys_sparc32.c ret |= put_user(ptr_to_compat(old_ka.sa.sa_restorer), &oact->sa_restorer); oact 163 arch/sparc/kernel/sys_sparc_32.c struct old_sigaction __user *,oact) oact 166 arch/sparc/kernel/sys_sparc_32.c return sys_sigaction(-sig, act, oact); oact 171 arch/sparc/kernel/sys_sparc_32.c struct sigaction __user *, oact, oact 188 arch/sparc/kernel/sys_sparc_32.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 190 arch/sparc/kernel/sys_sparc_32.c if (!ret && oact) { oact 191 arch/sparc/kernel/sys_sparc_32.c if (copy_to_user(oact, &old_ka.sa, sizeof(*oact))) oact 679 arch/sparc/kernel/sys_sparc_64.c struct sigaction __user *, oact, void __user *, restorer, oact 695 arch/sparc/kernel/sys_sparc_64.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 697 arch/sparc/kernel/sys_sparc_64.c if (!ret && oact) { oact 698 arch/sparc/kernel/sys_sparc_64.c if (copy_to_user(oact, &old_ka.sa, sizeof(*oact))) oact 164 arch/x86/kernel/signal_compat.c void sigaction_compat_abi(struct k_sigaction *act, struct k_sigaction *oact) oact 169 arch/x86/kernel/signal_compat.c if (oact) oact 170 arch/x86/kernel/signal_compat.c oact->sa.sa_flags &= ~(SA_IA32_ABI | SA_X32_ABI); oact 911 include/linux/compat.h struct compat_old_sigaction __user *oact); oact 419 include/linux/ptrace.h extern void sigaction_compat_abi(struct k_sigaction *act, struct k_sigaction *oact); oact 3954 kernel/signal.c struct k_sigaction *oact) oact 3958 kernel/signal.c int do_sigaction(int sig, struct k_sigaction *act, struct k_sigaction *oact) oact 3970 kernel/signal.c if (oact) oact 3971 kernel/signal.c *oact = *k; oact 3973 kernel/signal.c sigaction_compat_abi(act, oact); oact 4239 kernel/signal.c struct sigaction __user *, oact, oact 4252 kernel/signal.c ret = do_sigaction(sig, act ? &new_sa : NULL, oact ? &old_sa : NULL); oact 4256 kernel/signal.c if (oact && copy_to_user(oact, &old_sa.sa, sizeof(old_sa.sa))) oact 4264 kernel/signal.c struct compat_sigaction __user *, oact, oact 4291 kernel/signal.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 4292 kernel/signal.c if (!ret && oact) { oact 4294 kernel/signal.c &oact->sa_handler); oact 4295 kernel/signal.c ret |= put_compat_sigset(&oact->sa_mask, &old_ka.sa.sa_mask, oact 4296 kernel/signal.c sizeof(oact->sa_mask)); oact 4297 kernel/signal.c ret |= put_user(old_ka.sa.sa_flags, &oact->sa_flags); oact 4300 kernel/signal.c &oact->sa_restorer); oact 4311 kernel/signal.c struct old_sigaction __user *, oact) oact 4330 kernel/signal.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 4332 kernel/signal.c if (!ret && oact) { oact 4333 kernel/signal.c if (!access_ok(oact, sizeof(*oact)) || oact 4334 kernel/signal.c __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || oact 4335 kernel/signal.c __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer) || oact 4336 kernel/signal.c __put_user(old_ka.sa.sa_flags, &oact->sa_flags) || oact 4337 kernel/signal.c __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask)) oact 4347 kernel/signal.c struct compat_old_sigaction __user *, oact) oact 4370 kernel/signal.c ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); oact 4372 kernel/signal.c if (!ret && oact) { oact 4373 kernel/signal.c if (!access_ok(oact, sizeof(*oact)) || oact 4375 kernel/signal.c &oact->sa_handler) || oact 4377 kernel/signal.c &oact->sa_restorer) || oact 4378 kernel/signal.c __put_user(old_ka.sa.sa_flags, &oact->sa_flags) || oact 4379 kernel/signal.c __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))