2 * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
3 * Licensed under the GPL
6 #include "linux/sched.h"
10 #include "asm/uaccess.h"
11 #include "asm/unistd.h"
14 * Perform the select(nd, in, out, ex, tv) and mmap() system
15 * calls. Linux/i386 didn't use to be able to handle more than
16 * 4 system call parameters, so these system calls used a memory
17 * block for parameter passing..
20 struct mmap_arg_struct {
29 extern int old_mmap(unsigned long addr, unsigned long len,
30 unsigned long prot, unsigned long flags,
31 unsigned long fd, unsigned long offset);
33 long old_mmap_i386(struct mmap_arg_struct __user *arg)
35 struct mmap_arg_struct a;
38 if (copy_from_user(&a, arg, sizeof(a)))
41 err = old_mmap(a.addr, a.len, a.prot, a.flags, a.fd, a.offset);
46 struct sel_arg_struct {
51 struct timeval __user *tvp;
54 long old_select(struct sel_arg_struct __user *arg)
56 struct sel_arg_struct a;
58 if (copy_from_user(&a, arg, sizeof(a)))
60 /* sys_select() does the appropriate kernel locking */
61 return sys_select(a.n, a.inp, a.outp, a.exp, a.tvp);
65 * The prototype on i386 is:
67 * int clone(int flags, void * child_stack, int * parent_tidptr, struct user_desc * newtls, int * child_tidptr)
69 * and the "newtls" arg. on i386 is read by copy_thread directly from the
70 * register saved on the stack.
72 long sys_clone(unsigned long clone_flags, unsigned long newsp,
73 int __user *parent_tid, void *newtls, int __user *child_tid)
78 newsp = UPT_SP(¤t->thread.regs.regs);
80 current->thread.forking = 1;
81 ret = do_fork(clone_flags, newsp, ¤t->thread.regs, 0, parent_tid,
83 current->thread.forking = 0;
88 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
90 * This is really horribly ugly.
92 long sys_ipc (uint call, int first, int second,
93 int third, void __user *ptr, long fifth)
97 version = call >> 16; /* hack for backward compatibility */
102 return sys_semtimedop(first, (struct sembuf __user *) ptr,
105 return sys_semtimedop(first, (struct sembuf __user *) ptr,
107 (const struct timespec __user *) fifth);
109 return sys_semget (first, second, third);
114 if (get_user(fourth.__pad, (void __user * __user *) ptr))
116 return sys_semctl (first, second, third, fourth);
120 return sys_msgsnd (first, (struct msgbuf *) ptr,
125 struct ipc_kludge tmp;
129 if (copy_from_user(&tmp,
130 (struct ipc_kludge *) ptr,
133 return sys_msgrcv (first, tmp.msgp, second,
137 panic("msgrcv with version != 0");
138 return sys_msgrcv (first,
139 (struct msgbuf *) ptr,
140 second, fifth, third);
143 return sys_msgget ((key_t) first, second);
145 return sys_msgctl (first, second, (struct msqid_ds *) ptr);
151 ret = do_shmat (first, (char *) ptr, second, &raddr);
154 return put_user (raddr, (ulong *) third);
156 case 1: /* iBCS2 emulator entry point */
157 if (!segment_eq(get_fs(), get_ds()))
159 return do_shmat (first, (char *) ptr, second, (ulong *) third);
162 return sys_shmdt ((char *)ptr);
164 return sys_shmget (first, second, third);
166 return sys_shmctl (first, second,
167 (struct shmid_ds *) ptr);
173 long sys_sigaction(int sig, const struct old_sigaction __user *act,
174 struct old_sigaction __user *oact)
176 struct k_sigaction new_ka, old_ka;
181 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
182 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
183 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
185 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
186 __get_user(mask, &act->sa_mask);
187 siginitset(&new_ka.sa.sa_mask, mask);
190 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
193 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
194 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
195 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
197 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
198 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);