]>
Commit | Line | Data |
---|---|---|
2522fe45 | 1 | /* SPDX-License-Identifier: GPL-2.0-only */ |
f1ba1285 RM |
2 | /* |
3 | * Access to user system call parameters and results | |
4 | * | |
5 | * Copyright (C) 2008 Red Hat, Inc. All rights reserved. | |
6 | * | |
f1ba1285 RM |
7 | * See asm-generic/syscall.h for descriptions of what we must do here. |
8 | */ | |
9 | ||
10 | #ifndef _ASM_SYSCALL_H | |
11 | #define _ASM_SYSCALL_H 1 | |
12 | ||
ce5d1128 | 13 | #include <uapi/linux/audit.h> |
f1ba1285 | 14 | #include <linux/sched.h> |
75dddcbd | 15 | #include <linux/thread_info.h> |
f1ba1285 | 16 | |
02424d89 | 17 | /* ftrace syscalls requires exporting the sys_call_table */ |
1028ccf5 | 18 | extern const unsigned long sys_call_table[]; |
fbf508da | 19 | extern const unsigned long compat_sys_call_table[]; |
02424d89 | 20 | |
e9fbe686 | 21 | static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs) |
f1ba1285 | 22 | { |
e9fbe686 ME |
23 | /* |
24 | * Note that we are returning an int here. That means 0xffffffff, ie. | |
25 | * 32-bit negative 1, will be interpreted as -1 on a 64-bit kernel. | |
26 | * This is important for seccomp so that compat tasks can set r0 = -1 | |
27 | * to reject the syscall. | |
28 | */ | |
912237ea NP |
29 | if (trap_is_syscall(regs)) |
30 | return regs->gpr[0]; | |
31 | else | |
32 | return -1; | |
f1ba1285 RM |
33 | } |
34 | ||
35 | static inline void syscall_rollback(struct task_struct *task, | |
36 | struct pt_regs *regs) | |
37 | { | |
38 | regs->gpr[3] = regs->orig_gpr3; | |
39 | } | |
40 | ||
f296f1df DL |
41 | static inline long syscall_get_error(struct task_struct *task, |
42 | struct pt_regs *regs) | |
43 | { | |
d72500f9 NP |
44 | if (trap_is_scv(regs)) { |
45 | unsigned long error = regs->gpr[3]; | |
46 | ||
47 | return IS_ERR_VALUE(error) ? error : 0; | |
48 | } else { | |
49 | /* | |
50 | * If the system call failed, | |
51 | * regs->gpr[3] contains a positive ERRORCODE. | |
52 | */ | |
53 | return (regs->ccr & 0x10000000UL) ? -regs->gpr[3] : 0; | |
54 | } | |
f296f1df DL |
55 | } |
56 | ||
f1ba1285 RM |
57 | static inline long syscall_get_return_value(struct task_struct *task, |
58 | struct pt_regs *regs) | |
59 | { | |
60 | return regs->gpr[3]; | |
61 | } | |
62 | ||
63 | static inline void syscall_set_return_value(struct task_struct *task, | |
64 | struct pt_regs *regs, | |
65 | int error, long val) | |
66 | { | |
d72500f9 NP |
67 | if (trap_is_scv(regs)) { |
68 | regs->gpr[3] = (long) error ?: val; | |
f1ba1285 | 69 | } else { |
d72500f9 NP |
70 | /* |
71 | * In the general case it's not obvious that we must deal with | |
72 | * CCR here, as the syscall exit path will also do that for us. | |
73 | * However there are some places, eg. the signal code, which | |
74 | * check ccr to decide if the value in r3 is actually an error. | |
75 | */ | |
76 | if (error) { | |
77 | regs->ccr |= 0x10000000L; | |
78 | regs->gpr[3] = error; | |
79 | } else { | |
80 | regs->ccr &= ~0x10000000L; | |
81 | regs->gpr[3] = val; | |
82 | } | |
f1ba1285 RM |
83 | } |
84 | } | |
85 | ||
86 | static inline void syscall_get_arguments(struct task_struct *task, | |
87 | struct pt_regs *regs, | |
f1ba1285 RM |
88 | unsigned long *args) |
89 | { | |
1cb9839b | 90 | unsigned long val, mask = -1UL; |
b35f549d | 91 | unsigned int n = 6; |
a7657844 | 92 | |
853eae63 | 93 | if (is_tsk_32bit_task(task)) |
a7657844 | 94 | mask = 0xffffffff; |
898a1ef0 | 95 | |
1cb9839b | 96 | while (n--) { |
b35f549d | 97 | if (n == 0) |
1cb9839b ME |
98 | val = regs->orig_gpr3; |
99 | else | |
b35f549d | 100 | val = regs->gpr[3 + n]; |
1cb9839b ME |
101 | |
102 | args[n] = val & mask; | |
103 | } | |
f1ba1285 RM |
104 | } |
105 | ||
106 | static inline void syscall_set_arguments(struct task_struct *task, | |
107 | struct pt_regs *regs, | |
f1ba1285 RM |
108 | const unsigned long *args) |
109 | { | |
32d92586 | 110 | memcpy(®s->gpr[3], args, 6 * sizeof(args[0])); |
1cb9839b ME |
111 | |
112 | /* Also copy the first argument into orig_gpr3 */ | |
32d92586 | 113 | regs->orig_gpr3 = args[0]; |
f1ba1285 RM |
114 | } |
115 | ||
16add411 | 116 | static inline int syscall_get_arch(struct task_struct *task) |
ce5d1128 | 117 | { |
853eae63 | 118 | if (is_tsk_32bit_task(task)) |
770cec16 CL |
119 | return AUDIT_ARCH_PPC; |
120 | else if (IS_ENABLED(CONFIG_CPU_LITTLE_ENDIAN)) | |
121 | return AUDIT_ARCH_PPC64LE; | |
16add411 | 122 | else |
770cec16 | 123 | return AUDIT_ARCH_PPC64; |
ce5d1128 | 124 | } |
f1ba1285 | 125 | #endif /* _ASM_SYSCALL_H */ |