2 * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
3 * Licensed under the GPL
6 #include "linux/sched.h"
10 #include "asm/uaccess.h"
11 #include "asm/unistd.h"
14 * Perform the select(nd, in, out, ex, tv) and mmap() system
15 * calls. Linux/i386 didn't use to be able to handle more than
16 * 4 system call parameters, so these system calls used a memory
17 * block for parameter passing..
20 struct mmap_arg_struct {
29 extern int old_mmap(unsigned long addr, unsigned long len,
30 unsigned long prot, unsigned long flags,
31 unsigned long fd, unsigned long offset);
33 long old_mmap_i386(struct mmap_arg_struct __user *arg)
35 struct mmap_arg_struct a;
38 if (copy_from_user(&a, arg, sizeof(a)))
41 err = old_mmap(a.addr, a.len, a.prot, a.flags, a.fd, a.offset);
46 struct sel_arg_struct {
51 struct timeval __user *tvp;
54 long old_select(struct sel_arg_struct __user *arg)
56 struct sel_arg_struct a;
58 if (copy_from_user(&a, arg, sizeof(a)))
60 /* sys_select() does the appropriate kernel locking */
61 return sys_select(a.n, a.inp, a.outp, a.exp, a.tvp);
64 /* The i386 version skips reading from %esi, the fourth argument. So we must do
67 long sys_clone(unsigned long clone_flags, unsigned long newsp,
68 int __user *parent_tid, int unused, int __user *child_tid)
73 newsp = UPT_SP(¤t->thread.regs.regs);
74 current->thread.forking = 1;
75 ret = do_fork(clone_flags, newsp, ¤t->thread.regs, 0, parent_tid,
77 current->thread.forking = 0;
82 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
84 * This is really horribly ugly.
86 long sys_ipc (uint call, int first, int second,
87 int third, void __user *ptr, long fifth)
91 version = call >> 16; /* hack for backward compatibility */
96 return sys_semtimedop(first, (struct sembuf *) ptr, second,
99 return sys_semtimedop(first, (struct sembuf *) ptr, second,
100 (const struct timespec *) fifth);
102 return sys_semget (first, second, third);
107 if (get_user(fourth.__pad, (void **) ptr))
109 return sys_semctl (first, second, third, fourth);
113 return sys_msgsnd (first, (struct msgbuf *) ptr,
118 struct ipc_kludge tmp;
122 if (copy_from_user(&tmp,
123 (struct ipc_kludge *) ptr,
126 return sys_msgrcv (first, tmp.msgp, second,
130 panic("msgrcv with version != 0");
131 return sys_msgrcv (first,
132 (struct msgbuf *) ptr,
133 second, fifth, third);
136 return sys_msgget ((key_t) first, second);
138 return sys_msgctl (first, second, (struct msqid_ds *) ptr);
144 ret = do_shmat (first, (char *) ptr, second, &raddr);
147 return put_user (raddr, (ulong *) third);
149 case 1: /* iBCS2 emulator entry point */
150 if (!segment_eq(get_fs(), get_ds()))
152 return do_shmat (first, (char *) ptr, second, (ulong *) third);
155 return sys_shmdt ((char *)ptr);
157 return sys_shmget (first, second, third);
159 return sys_shmctl (first, second,
160 (struct shmid_ds *) ptr);
166 long sys_sigaction(int sig, const struct old_sigaction __user *act,
167 struct old_sigaction __user *oact)
169 struct k_sigaction new_ka, old_ka;
174 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
175 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
176 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
178 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
179 __get_user(mask, &act->sa_mask);
180 siginitset(&new_ka.sa.sa_mask, mask);
183 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
186 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
187 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
188 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
190 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
191 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);