2 * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
3 * Licensed under the GPL
6 #include "linux/sched.h"
10 #include "asm/uaccess.h"
11 #include "asm/unistd.h"
14 * Perform the select(nd, in, out, ex, tv) and mmap() system
15 * calls. Linux/i386 didn't use to be able to handle more than
16 * 4 system call parameters, so these system calls used a memory
17 * block for parameter passing..
20 struct mmap_arg_struct {
29 extern int old_mmap(unsigned long addr, unsigned long len,
30 unsigned long prot, unsigned long flags,
31 unsigned long fd, unsigned long offset);
33 long old_mmap_i386(struct mmap_arg_struct __user *arg)
35 struct mmap_arg_struct a;
38 if (copy_from_user(&a, arg, sizeof(a)))
41 err = old_mmap(a.addr, a.len, a.prot, a.flags, a.fd, a.offset);
46 struct sel_arg_struct {
51 struct timeval __user *tvp;
54 long old_select(struct sel_arg_struct __user *arg)
56 struct sel_arg_struct a;
58 if (copy_from_user(&a, arg, sizeof(a)))
60 /* sys_select() does the appropriate kernel locking */
61 return sys_select(a.n, a.inp, a.outp, a.exp, a.tvp);
65 * The prototype on i386 is:
67 * int clone(int flags, void * child_stack, int * parent_tidptr, struct user_desc * newtls, int * child_tidptr)
69 * and the "newtls" arg. on i386 is read by copy_thread directly from the
70 * register saved on the stack.
72 long sys_clone(unsigned long clone_flags, unsigned long newsp,
73 int __user *parent_tid, void *newtls, int __user *child_tid)
78 newsp = UPT_SP(¤t->thread.regs.regs);
80 current->thread.forking = 1;
81 ret = do_fork(clone_flags, newsp, ¤t->thread.regs, 0, parent_tid,
83 current->thread.forking = 0;
88 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
90 * This is really horribly ugly.
92 long sys_ipc (uint call, int first, int second,
93 int third, void __user *ptr, long fifth)
97 version = call >> 16; /* hack for backward compatibility */
102 return sys_semtimedop(first, (struct sembuf *) ptr, second,
105 return sys_semtimedop(first, (struct sembuf *) ptr, second,
106 (const struct timespec *) fifth);
108 return sys_semget (first, second, third);
113 if (get_user(fourth.__pad, (void __user * __user *) ptr))
115 return sys_semctl (first, second, third, fourth);
119 return sys_msgsnd (first, (struct msgbuf *) ptr,
124 struct ipc_kludge tmp;
128 if (copy_from_user(&tmp,
129 (struct ipc_kludge *) ptr,
132 return sys_msgrcv (first, tmp.msgp, second,
136 panic("msgrcv with version != 0");
137 return sys_msgrcv (first,
138 (struct msgbuf *) ptr,
139 second, fifth, third);
142 return sys_msgget ((key_t) first, second);
144 return sys_msgctl (first, second, (struct msqid_ds *) ptr);
150 ret = do_shmat (first, (char *) ptr, second, &raddr);
153 return put_user (raddr, (ulong *) third);
155 case 1: /* iBCS2 emulator entry point */
156 if (!segment_eq(get_fs(), get_ds()))
158 return do_shmat (first, (char *) ptr, second, (ulong *) third);
161 return sys_shmdt ((char *)ptr);
163 return sys_shmget (first, second, third);
165 return sys_shmctl (first, second,
166 (struct shmid_ds *) ptr);
172 long sys_sigaction(int sig, const struct old_sigaction __user *act,
173 struct old_sigaction __user *oact)
175 struct k_sigaction new_ka, old_ka;
180 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
181 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
182 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
184 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
185 __get_user(mask, &act->sa_mask);
186 siginitset(&new_ka.sa.sa_mask, mask);
189 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
192 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
193 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
194 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
196 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
197 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);