2 * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
3 * Licensed under the GPL
6 #include "linux/sched.h"
10 #include "asm/uaccess.h"
11 #include "asm/unistd.h"
14 * Perform the select(nd, in, out, ex, tv) and mmap() system
15 * calls. Linux/i386 didn't use to be able to handle more than
16 * 4 system call parameters, so these system calls used a memory
17 * block for parameter passing..
20 struct mmap_arg_struct
{
29 extern int old_mmap(unsigned long addr
, unsigned long len
,
30 unsigned long prot
, unsigned long flags
,
31 unsigned long fd
, unsigned long offset
);
33 long old_mmap_i386(struct mmap_arg_struct __user
*arg
)
35 struct mmap_arg_struct a
;
38 if (copy_from_user(&a
, arg
, sizeof(a
)))
41 err
= old_mmap(a
.addr
, a
.len
, a
.prot
, a
.flags
, a
.fd
, a
.offset
);
46 struct sel_arg_struct
{
51 struct timeval __user
*tvp
;
54 long old_select(struct sel_arg_struct __user
*arg
)
56 struct sel_arg_struct a
;
58 if (copy_from_user(&a
, arg
, sizeof(a
)))
60 /* sys_select() does the appropriate kernel locking */
61 return sys_select(a
.n
, a
.inp
, a
.outp
, a
.exp
, a
.tvp
);
65 * The prototype on i386 is:
67 * int clone(int flags, void * child_stack, int * parent_tidptr, struct user_desc * newtls, int * child_tidptr)
69 * and the "newtls" arg. on i386 is read by copy_thread directly from the
70 * register saved on the stack.
72 long sys_clone(unsigned long clone_flags
, unsigned long newsp
,
73 int __user
*parent_tid
, void *newtls
, int __user
*child_tid
)
78 newsp
= UPT_SP(¤t
->thread
.regs
.regs
);
80 current
->thread
.forking
= 1;
81 ret
= do_fork(clone_flags
, newsp
, ¤t
->thread
.regs
, 0, parent_tid
,
83 current
->thread
.forking
= 0;
88 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
90 * This is really horribly ugly.
92 long sys_ipc (uint call
, int first
, int second
,
93 int third
, void __user
*ptr
, long fifth
)
97 version
= call
>> 16; /* hack for backward compatibility */
102 return sys_semtimedop(first
, (struct sembuf __user
*) ptr
,
105 return sys_semtimedop(first
, (struct sembuf __user
*) ptr
,
107 (const struct timespec __user
*) fifth
);
109 return sys_semget (first
, second
, third
);
114 if (get_user(fourth
.__pad
, (void __user
* __user
*) ptr
))
116 return sys_semctl (first
, second
, third
, fourth
);
120 return sys_msgsnd (first
, (struct msgbuf
*) ptr
,
125 struct ipc_kludge tmp
;
129 if (copy_from_user(&tmp
,
130 (struct ipc_kludge
*) ptr
,
133 return sys_msgrcv (first
, tmp
.msgp
, second
,
137 panic("msgrcv with version != 0");
138 return sys_msgrcv (first
,
139 (struct msgbuf
*) ptr
,
140 second
, fifth
, third
);
143 return sys_msgget ((key_t
) first
, second
);
145 return sys_msgctl (first
, second
, (struct msqid_ds
*) ptr
);
151 ret
= do_shmat (first
, (char *) ptr
, second
, &raddr
);
154 return put_user (raddr
, (ulong
*) third
);
156 case 1: /* iBCS2 emulator entry point */
157 if (!segment_eq(get_fs(), get_ds()))
159 return do_shmat (first
, (char *) ptr
, second
, (ulong
*) third
);
162 return sys_shmdt ((char *)ptr
);
164 return sys_shmget (first
, second
, third
);
166 return sys_shmctl (first
, second
,
167 (struct shmid_ds
*) ptr
);
173 long sys_sigaction(int sig
, const struct old_sigaction __user
*act
,
174 struct old_sigaction __user
*oact
)
176 struct k_sigaction new_ka
, old_ka
;
181 if (!access_ok(VERIFY_READ
, act
, sizeof(*act
)) ||
182 __get_user(new_ka
.sa
.sa_handler
, &act
->sa_handler
) ||
183 __get_user(new_ka
.sa
.sa_restorer
, &act
->sa_restorer
))
185 __get_user(new_ka
.sa
.sa_flags
, &act
->sa_flags
);
186 __get_user(mask
, &act
->sa_mask
);
187 siginitset(&new_ka
.sa
.sa_mask
, mask
);
190 ret
= do_sigaction(sig
, act
? &new_ka
: NULL
, oact
? &old_ka
: NULL
);
193 if (!access_ok(VERIFY_WRITE
, oact
, sizeof(*oact
)) ||
194 __put_user(old_ka
.sa
.sa_handler
, &oact
->sa_handler
) ||
195 __put_user(old_ka
.sa
.sa_restorer
, &oact
->sa_restorer
))
197 __put_user(old_ka
.sa
.sa_flags
, &oact
->sa_flags
);
198 __put_user(old_ka
.sa
.sa_mask
.sig
[0], &oact
->sa_mask
);