2 * Implementation of various system calls for Linux/PowerPC
4 * Copyright (C) 1995-1996 Gary Thomas (gdt@linuxppc.org)
6 * Derived from "arch/i386/kernel/sys_i386.c"
7 * Adapted from the i386 version by Gary Thomas
8 * Modified by Cort Dougan (cort@cs.nmt.edu)
9 * and Paul Mackerras (paulus@cs.anu.edu.au).
11 * This file contains various random system calls that
12 * have a non-standard calling sequence on the Linux/PPC
15 * This program is free software; you can redistribute it and/or
16 * modify it under the terms of the GNU General Public License
17 * as published by the Free Software Foundation; either version
18 * 2 of the License, or (at your option) any later version.
22 #include <linux/errno.h>
23 #include <linux/sched.h>
24 #include <linux/syscalls.h>
27 #include <linux/smp.h>
28 #include <linux/sem.h>
29 #include <linux/msg.h>
30 #include <linux/shm.h>
31 #include <linux/stat.h>
32 #include <linux/mman.h>
33 #include <linux/sys.h>
34 #include <linux/ipc.h>
35 #include <linux/utsname.h>
36 #include <linux/file.h>
37 #include <linux/personality.h>
39 #include <asm/uaccess.h>
40 #include <asm/syscalls.h>
42 #include <asm/unistd.h>
44 static inline unsigned long do_mmap2(unsigned long addr
, size_t len
,
45 unsigned long prot
, unsigned long flags
,
46 unsigned long fd
, unsigned long off
, int shift
)
48 unsigned long ret
= -EINVAL
;
50 if (!arch_validate_prot(prot
))
54 if (off
& ((1 << shift
) - 1))
59 ret
= sys_mmap_pgoff(addr
, len
, prot
, flags
, fd
, off
);
64 unsigned long sys_mmap2(unsigned long addr
, size_t len
,
65 unsigned long prot
, unsigned long flags
,
66 unsigned long fd
, unsigned long pgoff
)
68 return do_mmap2(addr
, len
, prot
, flags
, fd
, pgoff
, PAGE_SHIFT
-12);
71 unsigned long sys_mmap(unsigned long addr
, size_t len
,
72 unsigned long prot
, unsigned long flags
,
73 unsigned long fd
, off_t offset
)
75 return do_mmap2(addr
, len
, prot
, flags
, fd
, offset
, PAGE_SHIFT
);
80 * Due to some executables calling the wrong select we sometimes
81 * get wrong args. This determines how the args are being passed
82 * (a single ptr to them all args passed) then calls
83 * sys_select() with the appropriate args. -- Cort
86 ppc_select(int n
, fd_set __user
*inp
, fd_set __user
*outp
, fd_set __user
*exp
, struct timeval __user
*tvp
)
88 if ( (unsigned long)n
>= 4096 )
90 unsigned long __user
*buffer
= (unsigned long __user
*)n
;
91 if (!access_ok(VERIFY_READ
, buffer
, 5*sizeof(unsigned long))
92 || __get_user(n
, buffer
)
93 || __get_user(inp
, ((fd_set __user
* __user
*)(buffer
+1)))
94 || __get_user(outp
, ((fd_set __user
* __user
*)(buffer
+2)))
95 || __get_user(exp
, ((fd_set __user
* __user
*)(buffer
+3)))
96 || __get_user(tvp
, ((struct timeval __user
* __user
*)(buffer
+4))))
99 return sys_select(n
, inp
, outp
, exp
, tvp
);
104 long ppc64_personality(unsigned long personality
)
108 if (personality(current
->personality
) == PER_LINUX32
109 && personality(personality
) == PER_LINUX
)
110 personality
= (personality
& ~PER_MASK
) | PER_LINUX32
;
111 ret
= sys_personality(personality
);
112 if (personality(ret
) == PER_LINUX32
)
113 ret
= (ret
& ~PER_MASK
) | PER_LINUX
;
118 long ppc_fadvise64_64(int fd
, int advice
, u32 offset_high
, u32 offset_low
,
119 u32 len_high
, u32 len_low
)
121 return sys_fadvise64(fd
, (u64
)offset_high
<< 32 | offset_low
,
122 (u64
)len_high
<< 32 | len_low
, advice
);
125 void do_show_syscall(unsigned long r3
, unsigned long r4
, unsigned long r5
,
126 unsigned long r6
, unsigned long r7
, unsigned long r8
,
127 struct pt_regs
*regs
)
129 printk("syscall %ld(%lx, %lx, %lx, %lx, %lx, %lx) regs=%p current=%p"
130 " cpu=%d\n", regs
->gpr
[0], r3
, r4
, r5
, r6
, r7
, r8
, regs
,
131 current
, smp_processor_id());
134 void do_show_syscall_exit(unsigned long r3
)
136 printk(" -> %lx, current=%p cpu=%d\n", r3
, current
, smp_processor_id());