blob: 70ca357393b86fb747895d1a11110324ccd1a4cf [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Copyright (C) 2000 - 2003 Jeff Dike (jdike@addtoit.com)
3 * Licensed under the GPL
4 */
5
6#include "linux/sched.h"
7#include "linux/shm.h"
Adrian Bunkcba4fbb2007-10-16 23:29:24 -07008#include "linux/ipc.h"
Al Viroff64b4c2008-08-18 04:01:47 -04009#include "linux/syscalls.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070010#include "asm/mman.h"
11#include "asm/uaccess.h"
12#include "asm/unistd.h"
13
14/*
Paolo 'Blaisorblade' Giarrussoaa6758d2006-03-31 02:30:22 -080015 * The prototype on i386 is:
16 *
17 * int clone(int flags, void * child_stack, int * parent_tidptr, struct user_desc * newtls, int * child_tidptr)
18 *
19 * and the "newtls" arg. on i386 is read by copy_thread directly from the
20 * register saved on the stack.
Linus Torvalds1da177e2005-04-16 15:20:36 -070021 */
22long sys_clone(unsigned long clone_flags, unsigned long newsp,
Paolo 'Blaisorblade' Giarrussoaa6758d2006-03-31 02:30:22 -080023 int __user *parent_tid, void *newtls, int __user *child_tid)
Linus Torvalds1da177e2005-04-16 15:20:36 -070024{
25 long ret;
26
Jeff Dikee0877f02005-06-25 14:55:21 -070027 if (!newsp)
28 newsp = UPT_SP(&current->thread.regs.regs);
Paolo 'Blaisorblade' Giarrussoaa6758d2006-03-31 02:30:22 -080029
Linus Torvalds1da177e2005-04-16 15:20:36 -070030 current->thread.forking = 1;
Jeff Dikee0877f02005-06-25 14:55:21 -070031 ret = do_fork(clone_flags, newsp, &current->thread.regs, 0, parent_tid,
32 child_tid);
Linus Torvalds1da177e2005-04-16 15:20:36 -070033 current->thread.forking = 0;
Paolo 'Blaisorblade' Giarrussoaa6758d2006-03-31 02:30:22 -080034 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -070035}
36
Linus Torvalds1da177e2005-04-16 15:20:36 -070037long sys_sigaction(int sig, const struct old_sigaction __user *act,
38 struct old_sigaction __user *oact)
39{
40 struct k_sigaction new_ka, old_ka;
41 int ret;
42
43 if (act) {
44 old_sigset_t mask;
45 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
46 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
47 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer))
48 return -EFAULT;
49 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
50 __get_user(mask, &act->sa_mask);
51 siginitset(&new_ka.sa.sa_mask, mask);
52 }
53
54 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
55
56 if (!ret && oact) {
57 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
58 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
59 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer))
60 return -EFAULT;
61 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
62 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
63 }
64
65 return ret;
66}