blob: 7ea3c40441861c93f83db4ef811a4b890109ab51 [file] [log] [blame]
Thomas Gleixner2522fe42019-05-28 09:57:20 -07001/* SPDX-License-Identifier: GPL-2.0-only */
Roland McGrathf1ba1282008-07-27 16:51:35 +10002/*
3 * Access to user system call parameters and results
4 *
5 * Copyright (C) 2008 Red Hat, Inc. All rights reserved.
6 *
Roland McGrathf1ba1282008-07-27 16:51:35 +10007 * See asm-generic/syscall.h for descriptions of what we must do here.
8 */
9
10#ifndef _ASM_SYSCALL_H
11#define _ASM_SYSCALL_H 1
12
Eric Parisce5d1122014-03-11 13:50:46 -040013#include <uapi/linux/audit.h>
Roland McGrathf1ba1282008-07-27 16:51:35 +100014#include <linux/sched.h>
Eric Paris75dddcb2014-04-22 12:07:30 -040015#include <linux/thread_info.h>
Roland McGrathf1ba1282008-07-27 16:51:35 +100016
Ian Munsie02424d82011-02-02 17:27:24 +000017/* ftrace syscalls requires exporting the sys_call_table */
Romeo Cane1028ccf2014-10-02 15:41:39 +010018extern const unsigned long sys_call_table[];
Firoz Khanfbf508d2018-12-17 16:10:35 +053019extern const unsigned long compat_sys_call_table[];
Ian Munsie02424d82011-02-02 17:27:24 +000020
Michael Ellermane9fbe682015-07-23 20:21:07 +100021static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
Roland McGrathf1ba1282008-07-27 16:51:35 +100022{
Michael Ellermane9fbe682015-07-23 20:21:07 +100023 /*
24 * Note that we are returning an int here. That means 0xffffffff, ie.
25 * 32-bit negative 1, will be interpreted as -1 on a 64-bit kernel.
26 * This is important for seccomp so that compat tasks can set r0 = -1
27 * to reject the syscall.
28 */
Nicholas Piggin912237e2020-05-07 22:13:31 +100029 if (trap_is_syscall(regs))
30 return regs->gpr[0];
31 else
32 return -1;
Roland McGrathf1ba1282008-07-27 16:51:35 +100033}
34
35static inline void syscall_rollback(struct task_struct *task,
36 struct pt_regs *regs)
37{
38 regs->gpr[3] = regs->orig_gpr3;
39}
40
Dmitry V. Levinf296f1d2019-07-16 16:29:39 -070041static inline long syscall_get_error(struct task_struct *task,
42 struct pt_regs *regs)
43{
Nicholas Piggind72500f2021-05-20 21:19:31 +100044 if (trap_is_scv(regs)) {
45 unsigned long error = regs->gpr[3];
46
47 return IS_ERR_VALUE(error) ? error : 0;
48 } else {
49 /*
50 * If the system call failed,
51 * regs->gpr[3] contains a positive ERRORCODE.
52 */
53 return (regs->ccr & 0x10000000UL) ? -regs->gpr[3] : 0;
54 }
Dmitry V. Levinf296f1d2019-07-16 16:29:39 -070055}
56
Roland McGrathf1ba1282008-07-27 16:51:35 +100057static inline long syscall_get_return_value(struct task_struct *task,
58 struct pt_regs *regs)
59{
60 return regs->gpr[3];
61}
62
63static inline void syscall_set_return_value(struct task_struct *task,
64 struct pt_regs *regs,
65 int error, long val)
66{
Nicholas Piggind72500f2021-05-20 21:19:31 +100067 if (trap_is_scv(regs)) {
68 regs->gpr[3] = (long) error ?: val;
Roland McGrathf1ba1282008-07-27 16:51:35 +100069 } else {
Nicholas Piggind72500f2021-05-20 21:19:31 +100070 /*
71 * In the general case it's not obvious that we must deal with
72 * CCR here, as the syscall exit path will also do that for us.
73 * However there are some places, eg. the signal code, which
74 * check ccr to decide if the value in r3 is actually an error.
75 */
76 if (error) {
77 regs->ccr |= 0x10000000L;
78 regs->gpr[3] = error;
79 } else {
80 regs->ccr &= ~0x10000000L;
81 regs->gpr[3] = val;
82 }
Roland McGrathf1ba1282008-07-27 16:51:35 +100083 }
84}
85
86static inline void syscall_get_arguments(struct task_struct *task,
87 struct pt_regs *regs,
Roland McGrathf1ba1282008-07-27 16:51:35 +100088 unsigned long *args)
89{
Michael Ellerman1cb98392015-07-23 20:21:06 +100090 unsigned long val, mask = -1UL;
Steven Rostedt (Red Hat)b35f5492016-11-07 16:26:37 -050091 unsigned int n = 6;
Michael Ellermana7657842015-07-23 20:21:05 +100092
Christophe Leroy898a1ef2021-08-20 09:28:19 +000093 if (is_32bit_task())
Michael Ellermana7657842015-07-23 20:21:05 +100094 mask = 0xffffffff;
Christophe Leroy898a1ef2021-08-20 09:28:19 +000095
Michael Ellerman1cb98392015-07-23 20:21:06 +100096 while (n--) {
Steven Rostedt (Red Hat)b35f5492016-11-07 16:26:37 -050097 if (n == 0)
Michael Ellerman1cb98392015-07-23 20:21:06 +100098 val = regs->orig_gpr3;
99 else
Steven Rostedt (Red Hat)b35f5492016-11-07 16:26:37 -0500100 val = regs->gpr[3 + n];
Michael Ellerman1cb98392015-07-23 20:21:06 +1000101
102 args[n] = val & mask;
103 }
Roland McGrathf1ba1282008-07-27 16:51:35 +1000104}
105
106static inline void syscall_set_arguments(struct task_struct *task,
107 struct pt_regs *regs,
Roland McGrathf1ba1282008-07-27 16:51:35 +1000108 const unsigned long *args)
109{
Steven Rostedt (VMware)32d92582019-03-27 20:07:31 -0400110 memcpy(&regs->gpr[3], args, 6 * sizeof(args[0]));
Michael Ellerman1cb98392015-07-23 20:21:06 +1000111
112 /* Also copy the first argument into orig_gpr3 */
Steven Rostedt (VMware)32d92582019-03-27 20:07:31 -0400113 regs->orig_gpr3 = args[0];
Roland McGrathf1ba1282008-07-27 16:51:35 +1000114}
115
Dmitry V. Levin16add412019-03-18 02:30:18 +0300116static inline int syscall_get_arch(struct task_struct *task)
Eric Parisce5d1122014-03-11 13:50:46 -0400117{
Dmitry V. Levin16add412019-03-18 02:30:18 +0300118 int arch;
119
120 if (IS_ENABLED(CONFIG_PPC64) && !test_tsk_thread_flag(task, TIF_32BIT))
121 arch = AUDIT_ARCH_PPC64;
122 else
123 arch = AUDIT_ARCH_PPC;
124
Richard Guy Briggs63f13442014-12-09 15:37:07 -0500125#ifdef __LITTLE_ENDIAN__
126 arch |= __AUDIT_ARCH_LE;
127#endif
128 return arch;
Eric Parisce5d1122014-03-11 13:50:46 -0400129}
Roland McGrathf1ba1282008-07-27 16:51:35 +1000130#endif /* _ASM_SYSCALL_H */