From 7e7ee2ec94feab7dc5ba20a27826d84a692a369c Mon Sep 17 00:00:00 2001 From: Brian Gianforcaro Date: Thu, 6 Aug 2020 20:49:16 -0700 Subject: [PATCH] Kernel: Use Userspace for the mount syscall --- Kernel/Process.h | 2 +- Kernel/Syscalls/mount.cpp | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/Kernel/Process.h b/Kernel/Process.h index e27adc9d5d..22c90909fd 100644 --- a/Kernel/Process.h +++ b/Kernel/Process.h @@ -281,7 +281,7 @@ public: int sys$unlink(const char* pathname, size_t path_length); int sys$symlink(Userspace); int sys$rmdir(Userspace pathname, size_t path_length); - int sys$mount(const Syscall::SC_mount_params*); + int sys$mount(Userspace); int sys$umount(const char* mountpoint, size_t mountpoint_length); int sys$chmod(const char* pathname, size_t path_length, mode_t); int sys$fchmod(int fd, mode_t); diff --git a/Kernel/Syscalls/mount.cpp b/Kernel/Syscalls/mount.cpp index caf8bf9495..a10de855a5 100644 --- a/Kernel/Syscalls/mount.cpp +++ b/Kernel/Syscalls/mount.cpp @@ -35,7 +35,7 @@ namespace Kernel { -int Process::sys$mount(const Syscall::SC_mount_params* user_params) +int Process::sys$mount(Userspace user_params) { if (!is_superuser()) return -EPERM;