2 * linux/arch/m32r/kernel/sys_m32r.c
4 * This file contains various random system calls that
5 * have a non-standard calling sequence on the Linux/M32R platform.
7 * Taken from i386 version.
10 #include <linux/errno.h>
11 #include <linux/sched.h>
14 #include <linux/smp.h>
15 #include <linux/sem.h>
16 #include <linux/msg.h>
17 #include <linux/shm.h>
18 #include <linux/stat.h>
19 #include <linux/syscalls.h>
20 #include <linux/mman.h>
21 #include <linux/file.h>
22 #include <linux/utsname.h>
23 #include <linux/ipc.h>
25 #include <asm/uaccess.h>
26 #include <asm/cachectl.h>
27 #include <asm/cacheflush.h>
28 #include <asm/syscall.h>
29 #include <asm/unistd.h>
32 * sys_tas() - test-and-set
34 asmlinkage int sys_tas(int __user *addr)
38 if (!access_ok(VERIFY_WRITE, addr, sizeof (int)))
42 * oldval = *addr; *addr = 1;
44 __asm__ __volatile__ (
45 DCACHE_CLEAR("%0", "r4", "%1")
48 " lock %0, @%1 -> unlock %2, @%1\n"
51 * The m32r processor can accept interrupts only
52 * at the 32-bit instruction boundary.
53 * So, in the above code, the "unlock" instruction
54 * can be executed continuously after the "lock"
55 * instruction execution without any interruptions.
57 ".section .fixup,\"ax\"\n"
60 " seth r14, #high(2b)\n"
61 " or3 r14, r14, #low(2b)\n"
64 ".section __ex_table,\"a\"\n"
69 : "r" (addr), "r" (1), "i"(-EFAULT)
71 #ifdef CONFIG_CHIP_M32700_TS1
73 #endif /* CONFIG_CHIP_M32700_TS1 */
80 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
82 * This is really horribly ugly.
84 asmlinkage int sys_ipc(uint call, int first, int second,
85 int third, void __user *ptr, long fifth)
89 version = call >> 16; /* hack for backward compatibility */
94 return sys_semtimedop(first, (struct sembuf __user *)ptr,
97 return sys_semtimedop(first, (struct sembuf __user *)ptr,
98 second, (const struct timespec __user *)fifth);
100 return sys_semget (first, second, third);
105 if (get_user(fourth.__pad, (void __user * __user *) ptr))
107 return sys_semctl (first, second, third, fourth);
111 return sys_msgsnd (first, (struct msgbuf __user *) ptr,
116 struct ipc_kludge tmp;
120 if (copy_from_user(&tmp,
121 (struct ipc_kludge __user *) ptr,
124 return sys_msgrcv (first, tmp.msgp, second,
128 return sys_msgrcv (first,
129 (struct msgbuf __user *) ptr,
130 second, fifth, third);
133 return sys_msgget ((key_t) first, second);
135 return sys_msgctl (first, second,
136 (struct msqid_ds __user *) ptr);
140 if (!access_ok(VERIFY_WRITE, (ulong __user *) third,
143 ret = do_shmat (first, (char __user *) ptr, second, &raddr);
146 return put_user (raddr, (ulong __user *) third);
149 return sys_shmdt ((char __user *)ptr);
151 return sys_shmget (first, second, third);
153 return sys_shmctl (first, second,
154 (struct shmid_ds __user *) ptr);
160 asmlinkage int sys_uname(struct old_utsname __user * name)
166 err = copy_to_user(name, utsname(), sizeof (*name));
168 return err?-EFAULT:0;
171 asmlinkage int sys_cacheflush(void *addr, int bytes, int cache)
173 /* This should flush more selectively ... */
178 asmlinkage int sys_cachectl(char *addr, int nbytes, int op)
180 /* Not implemented yet. */
185 * Do a system call from kernel instead of calling sys_execve so we
186 * end up with proper pt_regs.
188 int kernel_execve(const char *filename, char *const argv[], char *const envp[])
190 register long __scno __asm__ ("r7") = __NR_execve;
191 register long __arg3 __asm__ ("r2") = (long)(envp);
192 register long __arg2 __asm__ ("r1") = (long)(argv);
193 register long __res __asm__ ("r0") = (long)(filename);
194 __asm__ __volatile__ (
195 "trap #" SYSCALL_VECTOR "|| nop"
197 : "r" (__scno), "0" (__res), "r" (__arg2),