blob: ba0f88f3a30daea20e9c5e9efb322a627678a00c [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001/* SPDX-License-Identifier: GPL-2.0-only */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/*
3 * Access to user system call parameters and results
4 *
5 * Copyright (C) 2008 Red Hat, Inc. All rights reserved.
6 *
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00007 * See asm-generic/syscall.h for descriptions of what we must do here.
8 */
9
10#ifndef _ASM_SYSCALL_H
11#define _ASM_SYSCALL_H 1
12
13#include <uapi/linux/audit.h>
14#include <linux/sched.h>
15#include <linux/thread_info.h>
16
17/* ftrace syscalls requires exporting the sys_call_table */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000018extern const unsigned long sys_call_table[];
David Brazdil0f672f62019-12-10 10:32:29 +000019extern const unsigned long compat_sys_call_table[];
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000020
21static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
22{
23 /*
24 * Note that we are returning an int here. That means 0xffffffff, ie.
25 * 32-bit negative 1, will be interpreted as -1 on a 64-bit kernel.
26 * This is important for seccomp so that compat tasks can set r0 = -1
27 * to reject the syscall.
28 */
Olivier Deprez157378f2022-04-04 15:47:50 +020029 if (trap_is_syscall(regs))
30 return regs->gpr[0];
31 else
32 return -1;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000033}
34
35static inline void syscall_rollback(struct task_struct *task,
36 struct pt_regs *regs)
37{
38 regs->gpr[3] = regs->orig_gpr3;
39}
40
David Brazdil0f672f62019-12-10 10:32:29 +000041static inline long syscall_get_error(struct task_struct *task,
42 struct pt_regs *regs)
43{
Olivier Deprez157378f2022-04-04 15:47:50 +020044 if (trap_is_scv(regs)) {
45 unsigned long error = regs->gpr[3];
46
47 return IS_ERR_VALUE(error) ? error : 0;
48 } else {
49 /*
50 * If the system call failed,
51 * regs->gpr[3] contains a positive ERRORCODE.
52 */
53 return (regs->ccr & 0x10000000UL) ? -regs->gpr[3] : 0;
54 }
David Brazdil0f672f62019-12-10 10:32:29 +000055}
56
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000057static inline long syscall_get_return_value(struct task_struct *task,
58 struct pt_regs *regs)
59{
60 return regs->gpr[3];
61}
62
63static inline void syscall_set_return_value(struct task_struct *task,
64 struct pt_regs *regs,
65 int error, long val)
66{
Olivier Deprez157378f2022-04-04 15:47:50 +020067 if (trap_is_scv(regs)) {
68 regs->gpr[3] = (long) error ?: val;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000069 } else {
Olivier Deprez157378f2022-04-04 15:47:50 +020070 /*
71 * In the general case it's not obvious that we must deal with
72 * CCR here, as the syscall exit path will also do that for us.
73 * However there are some places, eg. the signal code, which
74 * check ccr to decide if the value in r3 is actually an error.
75 */
76 if (error) {
77 regs->ccr |= 0x10000000L;
78 regs->gpr[3] = error;
79 } else {
80 regs->ccr &= ~0x10000000L;
81 regs->gpr[3] = val;
82 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000083 }
84}
85
86static inline void syscall_get_arguments(struct task_struct *task,
87 struct pt_regs *regs,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000088 unsigned long *args)
89{
90 unsigned long val, mask = -1UL;
David Brazdil0f672f62019-12-10 10:32:29 +000091 unsigned int n = 6;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000092
93#ifdef CONFIG_COMPAT
94 if (test_tsk_thread_flag(task, TIF_32BIT))
95 mask = 0xffffffff;
96#endif
97 while (n--) {
David Brazdil0f672f62019-12-10 10:32:29 +000098 if (n == 0)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000099 val = regs->orig_gpr3;
100 else
David Brazdil0f672f62019-12-10 10:32:29 +0000101 val = regs->gpr[3 + n];
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000102
103 args[n] = val & mask;
104 }
105}
106
107static inline void syscall_set_arguments(struct task_struct *task,
108 struct pt_regs *regs,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000109 const unsigned long *args)
110{
David Brazdil0f672f62019-12-10 10:32:29 +0000111 memcpy(&regs->gpr[3], args, 6 * sizeof(args[0]));
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000112
113 /* Also copy the first argument into orig_gpr3 */
David Brazdil0f672f62019-12-10 10:32:29 +0000114 regs->orig_gpr3 = args[0];
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000115}
116
David Brazdil0f672f62019-12-10 10:32:29 +0000117static inline int syscall_get_arch(struct task_struct *task)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000118{
David Brazdil0f672f62019-12-10 10:32:29 +0000119 int arch;
120
121 if (IS_ENABLED(CONFIG_PPC64) && !test_tsk_thread_flag(task, TIF_32BIT))
122 arch = AUDIT_ARCH_PPC64;
123 else
124 arch = AUDIT_ARCH_PPC;
125
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000126#ifdef __LITTLE_ENDIAN__
127 arch |= __AUDIT_ARCH_LE;
128#endif
129 return arch;
130}
131#endif /* _ASM_SYSCALL_H */