2 * arch/s390/kernel/sys_s390.c
5 * Copyright (C) 1999,2000 IBM Deutschland Entwicklung GmbH, IBM Corporation
6 * Author(s): Martin Schwidefsky (schwidefsky@de.ibm.com),
7 * Thomas Spatzier (tspat@de.ibm.com)
9 * Derived from "arch/i386/kernel/sys_i386.c"
11 * This file contains various random system calls that
12 * have a non-standard calling sequence on the Linux/s390
16 #include <linux/errno.h>
17 #include <linux/sched.h>
20 #include <linux/smp.h>
21 #include <linux/sem.h>
22 #include <linux/msg.h>
23 #include <linux/shm.h>
24 #include <linux/stat.h>
25 #include <linux/syscalls.h>
26 #include <linux/mman.h>
27 #include <linux/file.h>
28 #include <linux/utsname.h>
29 #include <linux/personality.h>
30 #include <linux/unistd.h>
31 #include <linux/ipc.h>
32 #include <linux/syscalls.h>
33 #include <asm/uaccess.h>
36 /* common code for old and new mmaps */
37 static inline long do_mmap2(
38 unsigned long addr, unsigned long len,
39 unsigned long prot, unsigned long flags,
40 unsigned long fd, unsigned long pgoff)
43 struct file * file = NULL;
45 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
46 if (!(flags & MAP_ANONYMOUS)) {
52 down_write(¤t->mm->mmap_sem);
53 error = do_mmap_pgoff(file, addr, len, prot, flags, pgoff);
54 up_write(¤t->mm->mmap_sem);
63 * Perform the select(nd, in, out, ex, tv) and mmap() system
64 * calls. Linux for S/390 isn't able to handle more than 5
65 * system call parameters, so these system calls used a memory
66 * block for parameter passing..
69 struct mmap_arg_struct {
78 SYSCALL_DEFINE1(mmap2, struct mmap_arg_struct __user *, arg)
80 struct mmap_arg_struct a;
83 if (copy_from_user(&a, arg, sizeof(a)))
85 error = do_mmap2(a.addr, a.len, a.prot, a.flags, a.fd, a.offset);
90 SYSCALL_DEFINE1(s390_old_mmap, struct mmap_arg_struct __user *, arg)
92 struct mmap_arg_struct a;
95 if (copy_from_user(&a, arg, sizeof(a)))
99 if (a.offset & ~PAGE_MASK)
102 error = do_mmap2(a.addr, a.len, a.prot, a.flags, a.fd, a.offset >> PAGE_SHIFT);
108 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
110 * This is really horribly ugly.
112 SYSCALL_DEFINE5(ipc, uint, call, int, first, unsigned long, second,
113 unsigned long, third, void __user *, ptr)
115 struct ipc_kludge tmp;
120 return sys_semtimedop(first, (struct sembuf __user *)ptr,
121 (unsigned)second, NULL);
123 return sys_semtimedop(first, (struct sembuf __user *)ptr,
125 (const struct timespec __user *) third);
127 return sys_semget(first, (int)second, third);
132 if (get_user(fourth.__pad, (void __user * __user *) ptr))
134 return sys_semctl(first, (int)second, third, fourth);
137 return sys_msgsnd (first, (struct msgbuf __user *) ptr,
138 (size_t)second, third);
143 if (copy_from_user (&tmp, (struct ipc_kludge __user *) ptr,
144 sizeof (struct ipc_kludge)))
146 return sys_msgrcv (first, tmp.msgp,
147 (size_t)second, tmp.msgtyp, third);
149 return sys_msgget((key_t)first, (int)second);
151 return sys_msgctl(first, (int)second,
152 (struct msqid_ds __user *)ptr);
156 ret = do_shmat(first, (char __user *)ptr,
157 (int)second, &raddr);
160 return put_user (raddr, (ulong __user *) third);
164 return sys_shmdt ((char __user *)ptr);
166 return sys_shmget(first, (size_t)second, third);
168 return sys_shmctl(first, (int)second,
169 (struct shmid_ds __user *) ptr);
179 SYSCALL_DEFINE1(s390_newuname, struct new_utsname __user *, name)
181 int ret = sys_newuname(name);
183 if (personality(current->personality) == PER_LINUX32 && !ret) {
184 ret = copy_to_user(name->machine, "s390\0\0\0\0", 8);
185 if (ret) ret = -EFAULT;
190 SYSCALL_DEFINE1(s390_personality, unsigned long, personality)
194 if (current->personality == PER_LINUX32 && personality == PER_LINUX)
195 personality = PER_LINUX32;
196 ret = sys_personality(personality);
197 if (ret == PER_LINUX32)
202 #endif /* CONFIG_64BIT */
205 * Wrapper function for sys_fadvise64/fadvise64_64
209 SYSCALL_DEFINE5(s390_fadvise64, int, fd, u32, offset_high, u32, offset_low,
210 size_t, len, int, advice)
212 return sys_fadvise64(fd, (u64) offset_high << 32 | offset_low,
216 struct fadvise64_64_args {
223 SYSCALL_DEFINE1(s390_fadvise64_64, struct fadvise64_64_args __user *, args)
225 struct fadvise64_64_args a;
227 if ( copy_from_user(&a, args, sizeof(a)) )
229 return sys_fadvise64_64(a.fd, a.offset, a.len, a.advice);
233 * This is a wrapper to call sys_fallocate(). For 31 bit s390 the last
234 * 64 bit argument "len" is split into the upper and lower 32 bits. The
235 * system call wrapper in the user space loads the value to %r6/%r7.
236 * The code in entry.S keeps the values in %r2 - %r6 where they are and
237 * stores %r7 to 96(%r15). But the standard C linkage requires that
238 * the whole 64 bit value for len is stored on the stack and doesn't
239 * use %r6 at all. So s390_fallocate has to convert the arguments from
240 * %r2: fd, %r3: mode, %r4/%r5: offset, %r6/96(%r15)-99(%r15): len
242 * %r2: fd, %r3: mode, %r4/%r5: offset, 96(%r15)-103(%r15): len
244 SYSCALL_DEFINE(s390_fallocate)(int fd, int mode, loff_t offset,
245 u32 len_high, u32 len_low)
247 return sys_fallocate(fd, mode, offset, ((u64)len_high << 32) | len_low);
249 #ifdef CONFIG_HAVE_SYSCALL_WRAPPERS
250 asmlinkage long SyS_s390_fallocate(long fd, long mode, loff_t offset,
251 long len_high, long len_low)
253 return SYSC_s390_fallocate((int) fd, (int) mode, offset,
254 (u32) len_high, (u32) len_low);
256 SYSCALL_ALIAS(sys_s390_fallocate, SyS_s390_fallocate);