On Friday 07 September 2012, Catalin Marinas wrote: > +/* > + * sys_execve() executes a new program. > + */ > +asmlinkage long sys_execve(const char __user *filenamei, > + const char __user *const __user *argv, > + const char __user *const __user *envp, > + struct pt_regs *regs) > +{ > + long error; > + char * filename; > + > + filename = getname(filenamei); > + error = PTR_ERR(filename); > + if (IS_ERR(filename)) > + goto out; > + error = do_execve(filename, argv, envp, regs); > + putname(filename); > +out: > + return error; > +} > + > +int kernel_execve(const char *filename, > + const char *const argv[], > + const char *const envp[]) > +{ > + struct pt_regs regs; > + int ret; > + > + memset(®s, 0, sizeof(struct pt_regs)); > + ret = do_execve(filename, > + (const char __user *const __user *)argv, > + (const char __user *const __user *)envp, ®s); > + if (ret < 0) > + goto out; > + > + /* > + * Save argc to the register structure for userspace. > + */ > + regs.regs[0] = ret; > + > + /* > + * We were successful. We won't be returning to our caller, but > + * instead to user space by manipulating the kernel stack. > + */ > + asm( "add x0, %0, %1\n\t" > + "mov x1, %2\n\t" > + "mov x2, %3\n\t" > + "bl memmove\n\t" /* copy regs to top of stack */ > + "mov x27, #0\n\t" /* not a syscall */ > + "mov x28, %0\n\t" /* thread structure */ > + "mov sp, x0\n\t" /* reposition stack pointer */ > + "b ret_to_user" > + : > + : "r" (current_thread_info()), > + "Ir" (THREAD_START_SP - sizeof(regs)), > + "r" (®s), > + "Ir" (sizeof(regs)) > + : "x0", "x1", "x2", "x27", "x28", "x30", "memory"); > + > + out: > + return ret; > +} Al Viro is currently reworking this code across all architectures, please have a look at https://git.kernel.org/?p=linux/kernel/git/viro/signal.git;a=shortlog;h=refs/heads/execve2 > +EXPORT_SYMBOL(kernel_execve); You certainly don't need to export it. Arnd -- To unsubscribe from this list: send the line "unsubscribe linux-arch" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html