2 * linux/arch/arm/kernel/sys_arm.c
4 * Copyright (C) People who wrote linux/arch/i386/kernel/sys_i386.c
5 * Copyright (C) 1995, 1996 Russell King.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This file contains various random system calls that
12 * have a non-standard calling sequence on the Linux/arm
15 #include <linux/module.h>
16 #include <linux/errno.h>
17 #include <linux/sched.h>
18 #include <linux/slab.h>
20 #include <linux/sem.h>
21 #include <linux/msg.h>
22 #include <linux/shm.h>
23 #include <linux/stat.h>
24 #include <linux/syscalls.h>
25 #include <linux/mman.h>
27 #include <linux/file.h>
28 #include <linux/utsname.h>
30 #include <asm/uaccess.h>
33 extern unsigned long do_mremap(unsigned long addr, unsigned long old_len,
34 unsigned long new_len, unsigned long flags,
35 unsigned long new_addr);
38 * sys_pipe() is the normal C calling standard for creating
39 * a pipe. It's not the way unix traditionally does this, though.
41 asmlinkage int sys_pipe(unsigned long __user *fildes)
48 if (copy_to_user(fildes, fd, 2*sizeof(int)))
55 * This is the lowest virtual address we can permit any user space
56 * mapping to be mapped at. This is particularly important for
57 * non-high vector CPUs.
59 #define MIN_MAP_ADDR (PAGE_SIZE)
61 /* common code for old and new mmaps */
63 unsigned long addr, unsigned long len,
64 unsigned long prot, unsigned long flags,
65 unsigned long fd, unsigned long pgoff)
68 struct file * file = NULL;
70 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
72 if (flags & MAP_FIXED && addr < MIN_MAP_ADDR)
76 if (!(flags & MAP_ANONYMOUS)) {
82 down_write(¤t->mm->mmap_sem);
83 error = do_mmap_pgoff(file, addr, len, prot, flags, pgoff);
84 up_write(¤t->mm->mmap_sem);
92 struct mmap_arg_struct {
101 asmlinkage int old_mmap(struct mmap_arg_struct __user *arg)
104 struct mmap_arg_struct a;
106 if (copy_from_user(&a, arg, sizeof(a)))
110 if (a.offset & ~PAGE_MASK)
113 error = do_mmap2(a.addr, a.len, a.prot, a.flags, a.fd, a.offset >> PAGE_SHIFT);
118 asmlinkage unsigned long
119 sys_arm_mremap(unsigned long addr, unsigned long old_len,
120 unsigned long new_len, unsigned long flags,
121 unsigned long new_addr)
123 unsigned long ret = -EINVAL;
125 if (flags & MREMAP_FIXED && new_addr < MIN_MAP_ADDR)
128 down_write(¤t->mm->mmap_sem);
129 ret = do_mremap(addr, old_len, new_len, flags, new_addr);
130 up_write(¤t->mm->mmap_sem);
137 * Perform the select(nd, in, out, ex, tv) and mmap() system
141 struct sel_arg_struct {
143 fd_set __user *inp, *outp, *exp;
144 struct timeval __user *tvp;
147 asmlinkage int old_select(struct sel_arg_struct __user *arg)
149 struct sel_arg_struct a;
151 if (copy_from_user(&a, arg, sizeof(a)))
153 /* sys_select() does the appropriate kernel locking */
154 return sys_select(a.n, a.inp, a.outp, a.exp, a.tvp);
158 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
160 * This is really horribly ugly.
162 asmlinkage int sys_ipc(uint call, int first, int second, int third,
163 void __user *ptr, long fifth)
167 version = call >> 16; /* hack for backward compatibility */
172 return sys_semop(first, (struct sembuf __user *)ptr, second);
174 return sys_semget (first, second, third);
179 if (get_user(fourth.__pad, (void __user * __user *) ptr))
181 return sys_semctl (first, second, third, fourth);
185 return sys_msgsnd(first, (struct msgbuf __user *) ptr,
190 struct ipc_kludge tmp;
193 if (copy_from_user(&tmp,(struct ipc_kludge __user *)ptr,
196 return sys_msgrcv (first, tmp.msgp, second,
200 return sys_msgrcv (first,
201 (struct msgbuf __user *) ptr,
202 second, fifth, third);
205 return sys_msgget ((key_t) first, second);
207 return sys_msgctl(first, second, (struct msqid_ds __user *)ptr);
213 ret = do_shmat(first, (char __user *)ptr, second, &raddr);
216 return put_user(raddr, (ulong __user *)third);
218 case 1: /* Of course, we don't support iBCS2! */
222 return sys_shmdt ((char __user *)ptr);
224 return sys_shmget (first, second, third);
226 return sys_shmctl (first, second,
227 (struct shmid_ds __user *) ptr);
233 /* Fork a new task - this creates a new program thread.
234 * This is called indirectly via a small wrapper
236 asmlinkage int sys_fork(struct pt_regs *regs)
238 return do_fork(SIGCHLD, regs->ARM_sp, regs, 0, NULL, NULL);
241 /* Clone a task - this clones the calling program thread.
242 * This is called indirectly via a small wrapper
244 asmlinkage int sys_clone(unsigned long clone_flags, unsigned long newsp,
245 int __user *parent_tidptr, int tls_val,
246 int __user *child_tidptr, struct pt_regs *regs)
249 newsp = regs->ARM_sp;
251 return do_fork(clone_flags, newsp, regs, 0, parent_tidptr, child_tidptr);
254 asmlinkage int sys_vfork(struct pt_regs *regs)
256 return do_fork(CLONE_VFORK | CLONE_VM | SIGCHLD, regs->ARM_sp, regs, 0, NULL, NULL);
259 /* sys_execve() executes a new program.
260 * This is called indirectly via a small wrapper
262 asmlinkage int sys_execve(char __user *filenamei, char __user * __user *argv,
263 char __user * __user *envp, struct pt_regs *regs)
268 filename = getname(filenamei);
269 error = PTR_ERR(filename);
270 if (IS_ERR(filename))
272 error = do_execve(filename, argv, envp, regs);
278 long execve(const char *filename, char **argv, char **envp)
283 memset(®s, 0, sizeof(struct pt_regs));
284 ret = do_execve((char *)filename, (char __user * __user *)argv,
285 (char __user * __user *)envp, ®s);
290 * Save argc to the register structure for userspace.
295 * We were successful. We won't be returning to our caller, but
296 * instead to user space by manipulating the kernel stack.
298 asm( "add r0, %0, %1\n\t"
301 "bl memmove\n\t" /* copy regs to top of stack */
302 "mov r8, #0\n\t" /* not a syscall */
303 "mov r9, %0\n\t" /* thread structure */
304 "mov sp, r0\n\t" /* reposition stack pointer */
307 : "r" (current_thread_info()),
308 "Ir" (THREAD_SIZE - 8 - sizeof(regs)),
311 : "r0", "r1", "r2", "r3", "ip", "memory");
316 EXPORT_SYMBOL(execve);