]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - arch/um/sys-i386/syscalls.c
[PATCH] uml: fork cleanup
[mirror_ubuntu-zesty-kernel.git] / arch / um / sys-i386 / syscalls.c
CommitLineData
1da177e4
LT
1/*
2 * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
3 * Licensed under the GPL
4 */
5
6#include "linux/sched.h"
7#include "linux/shm.h"
8#include "asm/ipc.h"
9#include "asm/mman.h"
10#include "asm/uaccess.h"
11#include "asm/unistd.h"
12
13/*
14 * Perform the select(nd, in, out, ex, tv) and mmap() system
15 * calls. Linux/i386 didn't use to be able to handle more than
16 * 4 system call parameters, so these system calls used a memory
17 * block for parameter passing..
18 */
19
20struct mmap_arg_struct {
21 unsigned long addr;
22 unsigned long len;
23 unsigned long prot;
24 unsigned long flags;
25 unsigned long fd;
26 unsigned long offset;
27};
28
29extern int old_mmap(unsigned long addr, unsigned long len,
30 unsigned long prot, unsigned long flags,
31 unsigned long fd, unsigned long offset);
32
33long old_mmap_i386(struct mmap_arg_struct __user *arg)
34{
35 struct mmap_arg_struct a;
36 int err = -EFAULT;
37
38 if (copy_from_user(&a, arg, sizeof(a)))
39 goto out;
40
41 err = old_mmap(a.addr, a.len, a.prot, a.flags, a.fd, a.offset);
42 out:
43 return err;
44}
45
46struct sel_arg_struct {
47 unsigned long n;
48 fd_set __user *inp;
49 fd_set __user *outp;
50 fd_set __user *exp;
51 struct timeval __user *tvp;
52};
53
54long old_select(struct sel_arg_struct __user *arg)
55{
56 struct sel_arg_struct a;
57
58 if (copy_from_user(&a, arg, sizeof(a)))
59 return -EFAULT;
60 /* sys_select() does the appropriate kernel locking */
61 return sys_select(a.n, a.inp, a.outp, a.exp, a.tvp);
62}
63
64/* The i386 version skips reading from %esi, the fourth argument. So we must do
65 * this, too.
66 */
67long sys_clone(unsigned long clone_flags, unsigned long newsp,
68 int __user *parent_tid, int unused, int __user *child_tid)
69{
70 long ret;
71
e0877f07
JD
72 if (!newsp)
73 newsp = UPT_SP(&current->thread.regs.regs);
1da177e4 74 current->thread.forking = 1;
e0877f07
JD
75 ret = do_fork(clone_flags, newsp, &current->thread.regs, 0, parent_tid,
76 child_tid);
1da177e4
LT
77 current->thread.forking = 0;
78 return(ret);
79}
80
81/*
82 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
83 *
84 * This is really horribly ugly.
85 */
86long sys_ipc (uint call, int first, int second,
87 int third, void __user *ptr, long fifth)
88{
89 int version, ret;
90
91 version = call >> 16; /* hack for backward compatibility */
92 call &= 0xffff;
93
94 switch (call) {
95 case SEMOP:
96 return sys_semtimedop(first, (struct sembuf *) ptr, second,
97 NULL);
98 case SEMTIMEDOP:
99 return sys_semtimedop(first, (struct sembuf *) ptr, second,
100 (const struct timespec *) fifth);
101 case SEMGET:
102 return sys_semget (first, second, third);
103 case SEMCTL: {
104 union semun fourth;
105 if (!ptr)
106 return -EINVAL;
107 if (get_user(fourth.__pad, (void **) ptr))
108 return -EFAULT;
109 return sys_semctl (first, second, third, fourth);
110 }
111
112 case MSGSND:
113 return sys_msgsnd (first, (struct msgbuf *) ptr,
114 second, third);
115 case MSGRCV:
116 switch (version) {
117 case 0: {
118 struct ipc_kludge tmp;
119 if (!ptr)
120 return -EINVAL;
121
122 if (copy_from_user(&tmp,
123 (struct ipc_kludge *) ptr,
124 sizeof (tmp)))
125 return -EFAULT;
126 return sys_msgrcv (first, tmp.msgp, second,
127 tmp.msgtyp, third);
128 }
129 default:
130 panic("msgrcv with version != 0");
131 return sys_msgrcv (first,
132 (struct msgbuf *) ptr,
133 second, fifth, third);
134 }
135 case MSGGET:
136 return sys_msgget ((key_t) first, second);
137 case MSGCTL:
138 return sys_msgctl (first, second, (struct msqid_ds *) ptr);
139
140 case SHMAT:
141 switch (version) {
142 default: {
143 ulong raddr;
144 ret = do_shmat (first, (char *) ptr, second, &raddr);
145 if (ret)
146 return ret;
147 return put_user (raddr, (ulong *) third);
148 }
149 case 1: /* iBCS2 emulator entry point */
150 if (!segment_eq(get_fs(), get_ds()))
151 return -EINVAL;
152 return do_shmat (first, (char *) ptr, second, (ulong *) third);
153 }
154 case SHMDT:
155 return sys_shmdt ((char *)ptr);
156 case SHMGET:
157 return sys_shmget (first, second, third);
158 case SHMCTL:
159 return sys_shmctl (first, second,
160 (struct shmid_ds *) ptr);
161 default:
162 return -ENOSYS;
163 }
164}
165
166long sys_sigaction(int sig, const struct old_sigaction __user *act,
167 struct old_sigaction __user *oact)
168{
169 struct k_sigaction new_ka, old_ka;
170 int ret;
171
172 if (act) {
173 old_sigset_t mask;
174 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
175 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
176 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
177 return -EFAULT;
178 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
179 __get_user(mask, &act->sa_mask);
180 siginitset(&new_ka.sa.sa_mask, mask);
181 }
182
183 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
184
185 if (!ret && oact) {
186 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
187 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
188 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
189 return -EFAULT;
190 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
191 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
192 }
193
194 return ret;
195}