2 * arch/s390/kernel/sys_s390.c
5 * Copyright (C) 1999,2000 IBM Deutschland Entwicklung GmbH, IBM Corporation
6 * Author(s): Martin Schwidefsky (schwidefsky@de.ibm.com),
7 * Thomas Spatzier (tspat@de.ibm.com)
9 * Derived from "arch/i386/kernel/sys_i386.c"
11 * This file contains various random system calls that
12 * have a non-standard calling sequence on the Linux/s390
16 #include <linux/errno.h>
17 #include <linux/sched.h>
20 #include <linux/smp.h>
21 #include <linux/sem.h>
22 #include <linux/msg.h>
23 #include <linux/shm.h>
24 #include <linux/stat.h>
25 #include <linux/syscalls.h>
26 #include <linux/mman.h>
27 #include <linux/file.h>
28 #include <linux/utsname.h>
29 #include <linux/personality.h>
30 #include <linux/unistd.h>
31 #include <linux/ipc.h>
32 #include <linux/syscalls.h>
33 #include <asm/uaccess.h>
36 /* common code for old and new mmaps */
37 static inline long do_mmap2(
38 unsigned long addr, unsigned long len,
39 unsigned long prot, unsigned long flags,
40 unsigned long fd, unsigned long pgoff)
43 struct file * file = NULL;
45 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
46 if (!(flags & MAP_ANONYMOUS)) {
52 down_write(¤t->mm->mmap_sem);
53 error = do_mmap_pgoff(file, addr, len, prot, flags, pgoff);
54 up_write(¤t->mm->mmap_sem);
63 * Perform the select(nd, in, out, ex, tv) and mmap() system
64 * calls. Linux for S/390 isn't able to handle more than 5
65 * system call parameters, so these system calls used a memory
66 * block for parameter passing..
69 struct mmap_arg_struct {
78 SYSCALL_DEFINE1(mmap2, struct mmap_arg_struct __user *, arg)
80 struct mmap_arg_struct a;
83 if (copy_from_user(&a, arg, sizeof(a)))
85 error = do_mmap2(a.addr, a.len, a.prot, a.flags, a.fd, a.offset);
90 SYSCALL_DEFINE1(s390_old_mmap, struct mmap_arg_struct __user *, arg)
92 struct mmap_arg_struct a;
95 if (copy_from_user(&a, arg, sizeof(a)))
99 if (a.offset & ~PAGE_MASK)
102 error = do_mmap2(a.addr, a.len, a.prot, a.flags, a.fd, a.offset >> PAGE_SHIFT);
108 struct sel_arg_struct {
110 fd_set __user *inp, *outp, *exp;
111 struct timeval __user *tvp;
114 asmlinkage long old_select(struct sel_arg_struct __user *arg)
116 struct sel_arg_struct a;
118 if (copy_from_user(&a, arg, sizeof(a)))
120 /* sys_select() does the appropriate kernel locking */
121 return sys_select(a.n, a.inp, a.outp, a.exp, a.tvp);
124 #endif /* CONFIG_64BIT */
127 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
129 * This is really horribly ugly.
131 SYSCALL_DEFINE5(ipc, uint, call, int, first, unsigned long, second,
132 unsigned long, third, void __user *, ptr)
134 struct ipc_kludge tmp;
139 return sys_semtimedop(first, (struct sembuf __user *)ptr,
140 (unsigned)second, NULL);
142 return sys_semtimedop(first, (struct sembuf __user *)ptr,
144 (const struct timespec __user *) third);
146 return sys_semget(first, (int)second, third);
151 if (get_user(fourth.__pad, (void __user * __user *) ptr))
153 return sys_semctl(first, (int)second, third, fourth);
156 return sys_msgsnd (first, (struct msgbuf __user *) ptr,
157 (size_t)second, third);
162 if (copy_from_user (&tmp, (struct ipc_kludge __user *) ptr,
163 sizeof (struct ipc_kludge)))
165 return sys_msgrcv (first, tmp.msgp,
166 (size_t)second, tmp.msgtyp, third);
168 return sys_msgget((key_t)first, (int)second);
170 return sys_msgctl(first, (int)second,
171 (struct msqid_ds __user *)ptr);
175 ret = do_shmat(first, (char __user *)ptr,
176 (int)second, &raddr);
179 return put_user (raddr, (ulong __user *) third);
183 return sys_shmdt ((char __user *)ptr);
185 return sys_shmget(first, (size_t)second, third);
187 return sys_shmctl(first, (int)second,
188 (struct shmid_ds __user *) ptr);
198 SYSCALL_DEFINE1(s390_newuname, struct new_utsname __user *, name)
200 int ret = sys_newuname(name);
202 if (current->personality == PER_LINUX32 && !ret) {
203 ret = copy_to_user(name->machine, "s390\0\0\0\0", 8);
204 if (ret) ret = -EFAULT;
209 SYSCALL_DEFINE1(s390_personality, unsigned long, personality)
213 if (current->personality == PER_LINUX32 && personality == PER_LINUX)
214 personality = PER_LINUX32;
215 ret = sys_personality(personality);
216 if (ret == PER_LINUX32)
221 #endif /* CONFIG_64BIT */
224 * Wrapper function for sys_fadvise64/fadvise64_64
228 SYSCALL_DEFINE5(s390_fadvise64, int, fd, u32, offset_high, u32, offset_low,
229 size_t, len, int, advice)
231 return sys_fadvise64(fd, (u64) offset_high << 32 | offset_low,
235 struct fadvise64_64_args {
242 SYSCALL_DEFINE1(s390_fadvise64_64, struct fadvise64_64_args __user *, args)
244 struct fadvise64_64_args a;
246 if ( copy_from_user(&a, args, sizeof(a)) )
248 return sys_fadvise64_64(a.fd, a.offset, a.len, a.advice);
252 * This is a wrapper to call sys_fallocate(). For 31 bit s390 the last
253 * 64 bit argument "len" is split into the upper and lower 32 bits. The
254 * system call wrapper in the user space loads the value to %r6/%r7.
255 * The code in entry.S keeps the values in %r2 - %r6 where they are and
256 * stores %r7 to 96(%r15). But the standard C linkage requires that
257 * the whole 64 bit value for len is stored on the stack and doesn't
258 * use %r6 at all. So s390_fallocate has to convert the arguments from
259 * %r2: fd, %r3: mode, %r4/%r5: offset, %r6/96(%r15)-99(%r15): len
261 * %r2: fd, %r3: mode, %r4/%r5: offset, 96(%r15)-103(%r15): len
263 SYSCALL_DEFINE(s390_fallocate)(int fd, int mode, loff_t offset,
264 u32 len_high, u32 len_low)
266 return sys_fallocate(fd, mode, offset, ((u64)len_high << 32) | len_low);
268 #ifdef CONFIG_HAVE_SYSCALL_WRAPPERS
269 asmlinkage long SyS_s390_fallocate(long fd, long mode, loff_t offset,
270 long len_high, long len_low)
272 return SYSC_s390_fallocate((int) fd, (int) mode, offset,
273 (u32) len_high, (u32) len_low);
275 SYSCALL_ALIAS(sys_s390_fallocate, SyS_s390_fallocate);