2 * linux/arch/h8300/kernel/sys_h8300.c
4 * This file contains various random system calls that
5 * have a non-standard calling sequence on the H8/300
9 #include <linux/errno.h>
10 #include <linux/sched.h>
12 #include <linux/smp.h>
13 #include <linux/sem.h>
14 #include <linux/msg.h>
15 #include <linux/shm.h>
16 #include <linux/stat.h>
17 #include <linux/syscalls.h>
18 #include <linux/mman.h>
19 #include <linux/file.h>
20 #include <linux/utsname.h>
22 #include <linux/ipc.h>
24 #include <asm/setup.h>
25 #include <asm/uaccess.h>
26 #include <asm/cachectl.h>
27 #include <asm/traps.h>
28 #include <asm/unistd.h>
30 /* common code for old and new mmaps */
31 static inline long do_mmap2(
32 unsigned long addr, unsigned long len,
33 unsigned long prot, unsigned long flags,
34 unsigned long fd, unsigned long pgoff)
37 struct file * file = NULL;
39 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
40 if (!(flags & MAP_ANONYMOUS)) {
46 down_write(¤t->mm->mmap_sem);
47 error = do_mmap_pgoff(file, addr, len, prot, flags, pgoff);
48 up_write(¤t->mm->mmap_sem);
56 asmlinkage long sys_mmap2(unsigned long addr, unsigned long len,
57 unsigned long prot, unsigned long flags,
58 unsigned long fd, unsigned long pgoff)
60 return do_mmap2(addr, len, prot, flags, fd, pgoff);
64 * Perform the select(nd, in, out, ex, tv) and mmap() system
65 * calls. Linux/m68k cloned Linux/i386, which didn't use to be able to
66 * handle more than 4 system call parameters, so these system calls
67 * used a memory block for parameter passing..
70 struct mmap_arg_struct {
79 asmlinkage int old_mmap(struct mmap_arg_struct *arg)
81 struct mmap_arg_struct a;
84 if (copy_from_user(&a, arg, sizeof(a)))
88 if (a.offset & ~PAGE_MASK)
91 a.flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
93 error = do_mmap2(a.addr, a.len, a.prot, a.flags, a.fd, a.offset >> PAGE_SHIFT);
98 #if 0 /* DAVIDM - do we want this */
99 struct mmap_arg_struct64 {
104 __u64 offset; /* 64 bits */
108 asmlinkage long sys_mmap64(struct mmap_arg_struct64 *arg)
111 struct file * file = NULL;
112 struct mmap_arg_struct64 a;
115 if (copy_from_user(&a, arg, sizeof(a)))
118 if ((long)a.offset & ~PAGE_MASK)
121 pgoff = a.offset >> PAGE_SHIFT;
122 if ((a.offset >> PAGE_SHIFT) != pgoff)
125 if (!(a.flags & MAP_ANONYMOUS)) {
131 a.flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
133 down_write(¤t->mm->mmap_sem);
134 error = do_mmap_pgoff(file, a.addr, a.len, a.prot, a.flags, pgoff);
135 up_write(¤t->mm->mmap_sem);
143 struct sel_arg_struct {
145 fd_set *inp, *outp, *exp;
149 asmlinkage int old_select(struct sel_arg_struct *arg)
151 struct sel_arg_struct a;
153 if (copy_from_user(&a, arg, sizeof(a)))
155 /* sys_select() does the appropriate kernel locking */
156 return sys_select(a.n, a.inp, a.outp, a.exp, a.tvp);
160 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
162 * This is really horribly ugly.
164 asmlinkage int sys_ipc (uint call, int first, int second,
165 int third, void *ptr, long fifth)
169 version = call >> 16; /* hack for backward compatibility */
175 return sys_semop (first, (struct sembuf *)ptr, second);
177 return sys_semget (first, second, third);
182 if (get_user(fourth.__pad, (void **) ptr))
184 return sys_semctl (first, second, third, fourth);
192 return sys_msgsnd (first, (struct msgbuf *) ptr,
197 struct ipc_kludge tmp;
200 if (copy_from_user (&tmp,
201 (struct ipc_kludge *)ptr,
204 return sys_msgrcv (first, tmp.msgp, second,
208 return sys_msgrcv (first,
209 (struct msgbuf *) ptr,
210 second, fifth, third);
213 return sys_msgget ((key_t) first, second);
215 return sys_msgctl (first, second,
216 (struct msqid_ds *) ptr);
226 ret = do_shmat (first, (char *) ptr,
230 return put_user (raddr, (ulong *) third);
234 return sys_shmdt ((char *)ptr);
236 return sys_shmget (first, second, third);
238 return sys_shmctl (first, second,
239 (struct shmid_ds *) ptr);
247 /* sys_cacheflush -- no support. */
249 sys_cacheflush (unsigned long addr, int scope, int cache, unsigned long len)
254 asmlinkage int sys_getpagesize(void)
259 #if defined(CONFIG_SYSCALL_PRINT)
260 asmlinkage void syscall_print(void *dummy,...)
262 struct pt_regs *regs = (struct pt_regs *) ((unsigned char *)&dummy-4);
263 printk("call %06lx:%ld 1:%08lx,2:%08lx,3:%08lx,ret:%08lx\n",
264 ((regs->pc)&0xffffff)-2,regs->orig_er0,regs->er1,regs->er2,regs->er3,regs->er0);
269 * Do a system call from kernel instead of calling sys_execve so we
270 * end up with proper pt_regs.
272 int kernel_execve(const char *filename, char *const argv[], char *const envp[])
274 register long res __asm__("er0");
275 register char *const *_c __asm__("er3") = envp;
276 register char *const *_b __asm__("er2") = argv;
277 register const char * _a __asm__("er1") = filename;
278 __asm__ __volatile__ ("mov.l %1,er0\n\t"