2 * linux/arch/arm/kernel/sys_arm.c
4 * Copyright (C) People who wrote linux/arch/i386/kernel/sys_i386.c
5 * Copyright (C) 1995, 1996 Russell King.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This file contains various random system calls that
12 * have a non-standard calling sequence on the Linux/arm
15 #include <linux/module.h>
16 #include <linux/errno.h>
17 #include <linux/sched.h>
18 #include <linux/slab.h>
20 #include <linux/sem.h>
21 #include <linux/msg.h>
22 #include <linux/shm.h>
23 #include <linux/stat.h>
24 #include <linux/syscalls.h>
25 #include <linux/mman.h>
27 #include <linux/file.h>
28 #include <linux/utsname.h>
30 #include <asm/uaccess.h>
33 extern unsigned long do_mremap(unsigned long addr
, unsigned long old_len
,
34 unsigned long new_len
, unsigned long flags
,
35 unsigned long new_addr
);
38 * sys_pipe() is the normal C calling standard for creating
39 * a pipe. It's not the way unix traditionally does this, though.
41 asmlinkage
int sys_pipe(unsigned long __user
*fildes
)
48 if (copy_to_user(fildes
, fd
, 2*sizeof(int)))
55 * This is the lowest virtual address we can permit any user space
56 * mapping to be mapped at. This is particularly important for
57 * non-high vector CPUs.
59 #define MIN_MAP_ADDR (PAGE_SIZE)
61 /* common code for old and new mmaps */
63 unsigned long addr
, unsigned long len
,
64 unsigned long prot
, unsigned long flags
,
65 unsigned long fd
, unsigned long pgoff
)
68 struct file
* file
= NULL
;
70 flags
&= ~(MAP_EXECUTABLE
| MAP_DENYWRITE
);
72 if (flags
& MAP_FIXED
&& addr
< MIN_MAP_ADDR
)
76 if (!(flags
& MAP_ANONYMOUS
)) {
82 down_write(¤t
->mm
->mmap_sem
);
83 error
= do_mmap_pgoff(file
, addr
, len
, prot
, flags
, pgoff
);
84 up_write(¤t
->mm
->mmap_sem
);
92 struct mmap_arg_struct
{
101 asmlinkage
int old_mmap(struct mmap_arg_struct __user
*arg
)
104 struct mmap_arg_struct a
;
106 if (copy_from_user(&a
, arg
, sizeof(a
)))
110 if (a
.offset
& ~PAGE_MASK
)
113 error
= do_mmap2(a
.addr
, a
.len
, a
.prot
, a
.flags
, a
.fd
, a
.offset
>> PAGE_SHIFT
);
118 asmlinkage
unsigned long
119 sys_arm_mremap(unsigned long addr
, unsigned long old_len
,
120 unsigned long new_len
, unsigned long flags
,
121 unsigned long new_addr
)
123 unsigned long ret
= -EINVAL
;
125 if (flags
& MREMAP_FIXED
&& new_addr
< MIN_MAP_ADDR
)
128 down_write(¤t
->mm
->mmap_sem
);
129 ret
= do_mremap(addr
, old_len
, new_len
, flags
, new_addr
);
130 up_write(¤t
->mm
->mmap_sem
);
137 * Perform the select(nd, in, out, ex, tv) and mmap() system
141 struct sel_arg_struct
{
143 fd_set __user
*inp
, *outp
, *exp
;
144 struct timeval __user
*tvp
;
147 asmlinkage
int old_select(struct sel_arg_struct __user
*arg
)
149 struct sel_arg_struct a
;
151 if (copy_from_user(&a
, arg
, sizeof(a
)))
153 /* sys_select() does the appropriate kernel locking */
154 return sys_select(a
.n
, a
.inp
, a
.outp
, a
.exp
, a
.tvp
);
158 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
160 * This is really horribly ugly.
162 asmlinkage
int sys_ipc(uint call
, int first
, int second
, int third
,
163 void __user
*ptr
, long fifth
)
167 version
= call
>> 16; /* hack for backward compatibility */
172 return sys_semtimedop (first
, (struct sembuf __user
*)ptr
, second
, NULL
);
174 return sys_semtimedop(first
, (struct sembuf __user
*)ptr
, second
,
175 (const struct timespec __user
*)fifth
);
178 return sys_semget (first
, second
, third
);
183 if (get_user(fourth
.__pad
, (void __user
* __user
*) ptr
))
185 return sys_semctl (first
, second
, third
, fourth
);
189 return sys_msgsnd(first
, (struct msgbuf __user
*) ptr
,
194 struct ipc_kludge tmp
;
197 if (copy_from_user(&tmp
,(struct ipc_kludge __user
*)ptr
,
200 return sys_msgrcv (first
, tmp
.msgp
, second
,
204 return sys_msgrcv (first
,
205 (struct msgbuf __user
*) ptr
,
206 second
, fifth
, third
);
209 return sys_msgget ((key_t
) first
, second
);
211 return sys_msgctl(first
, second
, (struct msqid_ds __user
*)ptr
);
217 ret
= do_shmat(first
, (char __user
*)ptr
, second
, &raddr
);
220 return put_user(raddr
, (ulong __user
*)third
);
222 case 1: /* Of course, we don't support iBCS2! */
226 return sys_shmdt ((char __user
*)ptr
);
228 return sys_shmget (first
, second
, third
);
230 return sys_shmctl (first
, second
,
231 (struct shmid_ds __user
*) ptr
);
237 asmlinkage
long sys_shmat(int shmid
, char __user
*shmaddr
, int shmflg
,
238 unsigned long __user
*addr
)
243 err
= do_shmat(shmid
, shmaddr
, shmflg
, &ret
);
245 err
= put_user(ret
, addr
);
249 /* Fork a new task - this creates a new program thread.
250 * This is called indirectly via a small wrapper
252 asmlinkage
int sys_fork(struct pt_regs
*regs
)
254 return do_fork(SIGCHLD
, regs
->ARM_sp
, regs
, 0, NULL
, NULL
);
257 /* Clone a task - this clones the calling program thread.
258 * This is called indirectly via a small wrapper
260 asmlinkage
int sys_clone(unsigned long clone_flags
, unsigned long newsp
,
261 int __user
*parent_tidptr
, int tls_val
,
262 int __user
*child_tidptr
, struct pt_regs
*regs
)
265 newsp
= regs
->ARM_sp
;
267 return do_fork(clone_flags
, newsp
, regs
, 0, parent_tidptr
, child_tidptr
);
270 asmlinkage
int sys_vfork(struct pt_regs
*regs
)
272 return do_fork(CLONE_VFORK
| CLONE_VM
| SIGCHLD
, regs
->ARM_sp
, regs
, 0, NULL
, NULL
);
275 /* sys_execve() executes a new program.
276 * This is called indirectly via a small wrapper
278 asmlinkage
int sys_execve(char __user
*filenamei
, char __user
* __user
*argv
,
279 char __user
* __user
*envp
, struct pt_regs
*regs
)
284 filename
= getname(filenamei
);
285 error
= PTR_ERR(filename
);
286 if (IS_ERR(filename
))
288 error
= do_execve(filename
, argv
, envp
, regs
);
294 long execve(const char *filename
, char **argv
, char **envp
)
299 memset(®s
, 0, sizeof(struct pt_regs
));
300 ret
= do_execve((char *)filename
, (char __user
* __user
*)argv
,
301 (char __user
* __user
*)envp
, ®s
);
306 * Save argc to the register structure for userspace.
311 * We were successful. We won't be returning to our caller, but
312 * instead to user space by manipulating the kernel stack.
314 asm( "add r0, %0, %1\n\t"
317 "bl memmove\n\t" /* copy regs to top of stack */
318 "mov r8, #0\n\t" /* not a syscall */
319 "mov r9, %0\n\t" /* thread structure */
320 "mov sp, r0\n\t" /* reposition stack pointer */
323 : "r" (current_thread_info()),
324 "Ir" (THREAD_SIZE
- 8 - sizeof(regs
)),
327 : "r0", "r1", "r2", "r3", "ip", "memory");
332 EXPORT_SYMBOL(execve
);