Backwards compatability hack
This commit is contained in:
parent
ffd98d1b91
commit
8500d0f238
@ -101,14 +101,19 @@ long bit_map; /* notification event set or flags */
|
|||||||
* (or both). The caller is always given by 'proc_ptr'.
|
* (or both). The caller is always given by 'proc_ptr'.
|
||||||
*/
|
*/
|
||||||
register struct proc *caller_ptr = proc_ptr; /* get pointer to caller */
|
register struct proc *caller_ptr = proc_ptr; /* get pointer to caller */
|
||||||
int function = call_nr & SYSCALL_FUNC; /* get system call function */
|
int function; /* get system call function */
|
||||||
unsigned flags = call_nr & SYSCALL_FLAGS; /* get flags */
|
unsigned flags; /* get flags */
|
||||||
int mask_entry; /* bit to check in send mask */
|
int mask_entry; /* bit to check in send mask */
|
||||||
int group_size; /* used for deadlock check */
|
int group_size; /* used for deadlock check */
|
||||||
int result; /* the system call's result */
|
int result; /* the system call's result */
|
||||||
int src_dst;
|
int src_dst;
|
||||||
vir_clicks vlo, vhi; /* virtual clicks containing message to send */
|
vir_clicks vlo, vhi; /* virtual clicks containing message to send */
|
||||||
|
|
||||||
|
if(call_nr == 0x23) call_nr = 0x0203;
|
||||||
|
|
||||||
|
function = call_nr & SYSCALL_FUNC; /* get system call function */
|
||||||
|
flags = call_nr & SYSCALL_FLAGS; /* get flags */
|
||||||
|
|
||||||
#if 0
|
#if 0
|
||||||
if (caller_ptr->p_rts_flags & SLOT_FREE)
|
if (caller_ptr->p_rts_flags & SLOT_FREE)
|
||||||
{
|
{
|
||||||
|
Loading…
x
Reference in New Issue
Block a user