2 * linux/arch/arm/kernel/sys_arm.c
4 * Copyright (C) People who wrote linux/arch/i386/kernel/sys_i386.c
5 * Copyright (C) 1995, 1996 Russell King.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This file contains various random system calls that
12 * have a non-standard calling sequence on the Linux/arm
15 #include <linux/module.h>
16 #include <linux/errno.h>
17 #include <linux/sched.h>
18 #include <linux/slab.h>
20 #include <linux/sem.h>
21 #include <linux/msg.h>
22 #include <linux/shm.h>
23 #include <linux/stat.h>
24 #include <linux/syscalls.h>
25 #include <linux/mman.h>
27 #include <linux/file.h>
28 #include <linux/ipc.h>
29 #include <linux/uaccess.h>
31 struct mmap_arg_struct
{
40 asmlinkage
int old_mmap(struct mmap_arg_struct __user
*arg
)
43 struct mmap_arg_struct a
;
45 if (copy_from_user(&a
, arg
, sizeof(a
)))
49 if (a
.offset
& ~PAGE_MASK
)
52 error
= sys_mmap_pgoff(a
.addr
, a
.len
, a
.prot
, a
.flags
, a
.fd
, a
.offset
>> PAGE_SHIFT
);
58 * Perform the select(nd, in, out, ex, tv) and mmap() system
62 struct sel_arg_struct
{
64 fd_set __user
*inp
, *outp
, *exp
;
65 struct timeval __user
*tvp
;
68 asmlinkage
int old_select(struct sel_arg_struct __user
*arg
)
70 struct sel_arg_struct a
;
72 if (copy_from_user(&a
, arg
, sizeof(a
)))
74 /* sys_select() does the appropriate kernel locking */
75 return sys_select(a
.n
, a
.inp
, a
.outp
, a
.exp
, a
.tvp
);
78 #if !defined(CONFIG_AEABI) || defined(CONFIG_OABI_COMPAT)
80 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
82 * This is really horribly ugly.
84 asmlinkage
int sys_ipc(uint call
, int first
, int second
, int third
,
85 void __user
*ptr
, long fifth
)
89 version
= call
>> 16; /* hack for backward compatibility */
94 return sys_semtimedop (first
, (struct sembuf __user
*)ptr
, second
, NULL
);
96 return sys_semtimedop(first
, (struct sembuf __user
*)ptr
, second
,
97 (const struct timespec __user
*)fifth
);
100 return sys_semget (first
, second
, third
);
105 if (get_user(fourth
.__pad
, (void __user
* __user
*) ptr
))
107 return sys_semctl (first
, second
, third
, fourth
);
111 return sys_msgsnd(first
, (struct msgbuf __user
*) ptr
,
116 struct ipc_kludge tmp
;
119 if (copy_from_user(&tmp
,(struct ipc_kludge __user
*)ptr
,
122 return sys_msgrcv (first
, tmp
.msgp
, second
,
126 return sys_msgrcv (first
,
127 (struct msgbuf __user
*) ptr
,
128 second
, fifth
, third
);
131 return sys_msgget ((key_t
) first
, second
);
133 return sys_msgctl(first
, second
, (struct msqid_ds __user
*)ptr
);
139 ret
= do_shmat(first
, (char __user
*)ptr
, second
, &raddr
);
142 return put_user(raddr
, (ulong __user
*)third
);
144 case 1: /* Of course, we don't support iBCS2! */
148 return sys_shmdt ((char __user
*)ptr
);
150 return sys_shmget (first
, second
, third
);
152 return sys_shmctl (first
, second
,
153 (struct shmid_ds __user
*) ptr
);
160 /* Fork a new task - this creates a new program thread.
161 * This is called indirectly via a small wrapper
163 asmlinkage
int sys_fork(struct pt_regs
*regs
)
166 return do_fork(SIGCHLD
, regs
->ARM_sp
, regs
, 0, NULL
, NULL
);
168 /* can not support in nommu mode */
173 /* Clone a task - this clones the calling program thread.
174 * This is called indirectly via a small wrapper
176 asmlinkage
int sys_clone(unsigned long clone_flags
, unsigned long newsp
,
177 int __user
*parent_tidptr
, int tls_val
,
178 int __user
*child_tidptr
, struct pt_regs
*regs
)
181 newsp
= regs
->ARM_sp
;
183 return do_fork(clone_flags
, newsp
, regs
, 0, parent_tidptr
, child_tidptr
);
186 asmlinkage
int sys_vfork(struct pt_regs
*regs
)
188 return do_fork(CLONE_VFORK
| CLONE_VM
| SIGCHLD
, regs
->ARM_sp
, regs
, 0, NULL
, NULL
);
191 /* sys_execve() executes a new program.
192 * This is called indirectly via a small wrapper
194 asmlinkage
int sys_execve(char __user
*filenamei
, char __user
* __user
*argv
,
195 char __user
* __user
*envp
, struct pt_regs
*regs
)
200 filename
= getname(filenamei
);
201 error
= PTR_ERR(filename
);
202 if (IS_ERR(filename
))
204 error
= do_execve(filename
, argv
, envp
, regs
);
210 int kernel_execve(const char *filename
, char *const argv
[], char *const envp
[])
215 memset(®s
, 0, sizeof(struct pt_regs
));
216 ret
= do_execve((char *)filename
, (char __user
* __user
*)argv
,
217 (char __user
* __user
*)envp
, ®s
);
222 * Save argc to the register structure for userspace.
227 * We were successful. We won't be returning to our caller, but
228 * instead to user space by manipulating the kernel stack.
230 asm( "add r0, %0, %1\n\t"
233 "bl memmove\n\t" /* copy regs to top of stack */
234 "mov r8, #0\n\t" /* not a syscall */
235 "mov r9, %0\n\t" /* thread structure */
236 "mov sp, r0\n\t" /* reposition stack pointer */
239 : "r" (current_thread_info()),
240 "Ir" (THREAD_START_SP
- sizeof(regs
)),
243 : "r0", "r1", "r2", "r3", "ip", "lr", "memory");
248 EXPORT_SYMBOL(kernel_execve
);
251 * Since loff_t is a 64 bit type we avoid a lot of ABI hassle
252 * with a different argument ordering.
254 asmlinkage
long sys_arm_fadvise64_64(int fd
, int advice
,
255 loff_t offset
, loff_t len
)
257 return sys_fadvise64_64(fd
, offset
, len
, advice
);