]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - arch/powerpc/include/asm/syscall.h
UBUNTU: Ubuntu-5.15.0-39.42
[mirror_ubuntu-jammy-kernel.git] / arch / powerpc / include / asm / syscall.h
CommitLineData
2522fe45 1/* SPDX-License-Identifier: GPL-2.0-only */
f1ba1285
RM
2/*
3 * Access to user system call parameters and results
4 *
5 * Copyright (C) 2008 Red Hat, Inc. All rights reserved.
6 *
f1ba1285
RM
7 * See asm-generic/syscall.h for descriptions of what we must do here.
8 */
9
10#ifndef _ASM_SYSCALL_H
11#define _ASM_SYSCALL_H 1
12
ce5d1128 13#include <uapi/linux/audit.h>
f1ba1285 14#include <linux/sched.h>
75dddcbd 15#include <linux/thread_info.h>
f1ba1285 16
02424d89 17/* ftrace syscalls requires exporting the sys_call_table */
1028ccf5 18extern const unsigned long sys_call_table[];
fbf508da 19extern const unsigned long compat_sys_call_table[];
02424d89 20
e9fbe686 21static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
f1ba1285 22{
e9fbe686
ME
23 /*
24 * Note that we are returning an int here. That means 0xffffffff, ie.
25 * 32-bit negative 1, will be interpreted as -1 on a 64-bit kernel.
26 * This is important for seccomp so that compat tasks can set r0 = -1
27 * to reject the syscall.
28 */
912237ea
NP
29 if (trap_is_syscall(regs))
30 return regs->gpr[0];
31 else
32 return -1;
f1ba1285
RM
33}
34
35static inline void syscall_rollback(struct task_struct *task,
36 struct pt_regs *regs)
37{
38 regs->gpr[3] = regs->orig_gpr3;
39}
40
f296f1df
DL
41static inline long syscall_get_error(struct task_struct *task,
42 struct pt_regs *regs)
43{
d72500f9
NP
44 if (trap_is_scv(regs)) {
45 unsigned long error = regs->gpr[3];
46
47 return IS_ERR_VALUE(error) ? error : 0;
48 } else {
49 /*
50 * If the system call failed,
51 * regs->gpr[3] contains a positive ERRORCODE.
52 */
53 return (regs->ccr & 0x10000000UL) ? -regs->gpr[3] : 0;
54 }
f296f1df
DL
55}
56
f1ba1285
RM
57static inline long syscall_get_return_value(struct task_struct *task,
58 struct pt_regs *regs)
59{
60 return regs->gpr[3];
61}
62
63static inline void syscall_set_return_value(struct task_struct *task,
64 struct pt_regs *regs,
65 int error, long val)
66{
d72500f9
NP
67 if (trap_is_scv(regs)) {
68 regs->gpr[3] = (long) error ?: val;
f1ba1285 69 } else {
d72500f9
NP
70 /*
71 * In the general case it's not obvious that we must deal with
72 * CCR here, as the syscall exit path will also do that for us.
73 * However there are some places, eg. the signal code, which
74 * check ccr to decide if the value in r3 is actually an error.
75 */
76 if (error) {
77 regs->ccr |= 0x10000000L;
78 regs->gpr[3] = error;
79 } else {
80 regs->ccr &= ~0x10000000L;
81 regs->gpr[3] = val;
82 }
f1ba1285
RM
83 }
84}
85
86static inline void syscall_get_arguments(struct task_struct *task,
87 struct pt_regs *regs,
f1ba1285
RM
88 unsigned long *args)
89{
1cb9839b 90 unsigned long val, mask = -1UL;
b35f549d 91 unsigned int n = 6;
a7657844 92
853eae63 93 if (is_tsk_32bit_task(task))
a7657844 94 mask = 0xffffffff;
898a1ef0 95
1cb9839b 96 while (n--) {
b35f549d 97 if (n == 0)
1cb9839b
ME
98 val = regs->orig_gpr3;
99 else
b35f549d 100 val = regs->gpr[3 + n];
1cb9839b
ME
101
102 args[n] = val & mask;
103 }
f1ba1285
RM
104}
105
106static inline void syscall_set_arguments(struct task_struct *task,
107 struct pt_regs *regs,
f1ba1285
RM
108 const unsigned long *args)
109{
32d92586 110 memcpy(&regs->gpr[3], args, 6 * sizeof(args[0]));
1cb9839b
ME
111
112 /* Also copy the first argument into orig_gpr3 */
32d92586 113 regs->orig_gpr3 = args[0];
f1ba1285
RM
114}
115
16add411 116static inline int syscall_get_arch(struct task_struct *task)
ce5d1128 117{
853eae63 118 if (is_tsk_32bit_task(task))
770cec16
CL
119 return AUDIT_ARCH_PPC;
120 else if (IS_ENABLED(CONFIG_CPU_LITTLE_ENDIAN))
121 return AUDIT_ARCH_PPC64LE;
16add411 122 else
770cec16 123 return AUDIT_ARCH_PPC64;
ce5d1128 124}
f1ba1285 125#endif /* _ASM_SYSCALL_H */