blob: dcd5acf3bee571443bdbfe1335ae27fa128febef (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
|
#ifndef _HACK_KERNEL_H
#define _HACK_KERNEL_H
#include <stdio.h>
#include <linux/sched.h>
#include <stdlib.h>
#include <assert.h>
#define printk printf
extern inline int
getname (const char *name, char **newp)
{
*newp = malloc (strlen (name) + 1);
strcpy (*newp, name);
return 0;
}
extern inline void
putname (char *p)
{
free (p);
}
/* These two functions are used only to send SIGURG. But I can't
find any SIGIO code at all. So we'll just punt on that; clearly
Linux is missing the point. SIGURG should only be sent for
sockets that have explicitly requested it. */
extern inline int
kill_proc (int pid, int signo, int priv)
{
assert (signo == SIGURG);
return 0;
}
extern inline int
kill_pg (int pgrp, int signo, int priv)
{
assert (signo == SIGURG);
return 0;
}
#endif
|