xref: /openbmc/linux/arch/x86/include/asm/syscall.h (revision 2522fe45a186e6276583e02723b78e1d1987cdd5)
1*2522fe45SThomas Gleixner /* SPDX-License-Identifier: GPL-2.0-only */
2bb898558SAl Viro /*
3bb898558SAl Viro  * Access to user system call parameters and results
4bb898558SAl Viro  *
518c1e2c8SRoland McGrath  * Copyright (C) 2008-2009 Red Hat, Inc.  All rights reserved.
6bb898558SAl Viro  *
7bb898558SAl Viro  * See asm-generic/syscall.h for descriptions of what we must do here.
8bb898558SAl Viro  */
9bb898558SAl Viro 
105e1b0075SH. Peter Anvin #ifndef _ASM_X86_SYSCALL_H
115e1b0075SH. Peter Anvin #define _ASM_X86_SYSCALL_H
12bb898558SAl Viro 
13579ec9e1SEric Paris #include <uapi/linux/audit.h>
14bb898558SAl Viro #include <linux/sched.h>
15bb898558SAl Viro #include <linux/err.h>
1672142fd4SH. Peter Anvin #include <asm/asm-offsets.h>	/* For NR_syscalls */
17b7456536SWill Drewry #include <asm/thread_info.h>	/* for TS_COMPAT */
18fca460f9SH. Peter Anvin #include <asm/unistd.h>
19bb898558SAl Viro 
20f8781c4aSDominik Brodowski #ifdef CONFIG_X86_64
21fa697140SDominik Brodowski typedef asmlinkage long (*sys_call_ptr_t)(const struct pt_regs *);
22fa697140SDominik Brodowski #else
23eb974c62SAndy Lutomirski typedef asmlinkage long (*sys_call_ptr_t)(unsigned long, unsigned long,
24eb974c62SAndy Lutomirski 					  unsigned long, unsigned long,
25eb974c62SAndy Lutomirski 					  unsigned long, unsigned long);
26f8781c4aSDominik Brodowski #endif /* CONFIG_X86_64 */
271599e8fcSAndi Kleen extern const sys_call_ptr_t sys_call_table[];
28e7b8e675SMike Frysinger 
29034042ccSAndy Lutomirski #if defined(CONFIG_X86_32)
30034042ccSAndy Lutomirski #define ia32_sys_call_table sys_call_table
31034042ccSAndy Lutomirski #define __NR_syscall_compat_max __NR_syscall_max
32034042ccSAndy Lutomirski #define IA32_NR_syscalls NR_syscalls
33034042ccSAndy Lutomirski #endif
34034042ccSAndy Lutomirski 
35034042ccSAndy Lutomirski #if defined(CONFIG_IA32_EMULATION)
36034042ccSAndy Lutomirski extern const sys_call_ptr_t ia32_sys_call_table[];
37034042ccSAndy Lutomirski #endif
38034042ccSAndy Lutomirski 
39bb898558SAl Viro /*
4018c1e2c8SRoland McGrath  * Only the low 32 bits of orig_ax are meaningful, so we return int.
4118c1e2c8SRoland McGrath  * This importantly ignores the high bits on 64-bit, so comparisons
4218c1e2c8SRoland McGrath  * sign-extend the low 32 bits.
43bb898558SAl Viro  */
4418c1e2c8SRoland McGrath static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
4518c1e2c8SRoland McGrath {
468b4b9f27SPaul Moore 	return regs->orig_ax;
47bb898558SAl Viro }
48bb898558SAl Viro 
49bb898558SAl Viro static inline void syscall_rollback(struct task_struct *task,
50bb898558SAl Viro 				    struct pt_regs *regs)
51bb898558SAl Viro {
528b4b9f27SPaul Moore 	regs->ax = regs->orig_ax;
53bb898558SAl Viro }
54bb898558SAl Viro 
55bb898558SAl Viro static inline long syscall_get_error(struct task_struct *task,
56bb898558SAl Viro 				     struct pt_regs *regs)
57bb898558SAl Viro {
58bb898558SAl Viro 	unsigned long error = regs->ax;
59bb898558SAl Viro #ifdef CONFIG_IA32_EMULATION
60bb898558SAl Viro 	/*
61bb898558SAl Viro 	 * TS_COMPAT is set for 32-bit syscall entries and then
62bb898558SAl Viro 	 * remains set until we return to user mode.
63bb898558SAl Viro 	 */
6437a8f7c3SAndy Lutomirski 	if (task->thread_info.status & (TS_COMPAT|TS_I386_REGS_POKED))
65bb898558SAl Viro 		/*
66bb898558SAl Viro 		 * Sign-extend the value so (int)-EFOO becomes (long)-EFOO
67bb898558SAl Viro 		 * and will match correctly in comparisons.
68bb898558SAl Viro 		 */
69bb898558SAl Viro 		error = (long) (int) error;
70bb898558SAl Viro #endif
71bb898558SAl Viro 	return IS_ERR_VALUE(error) ? error : 0;
72bb898558SAl Viro }
73bb898558SAl Viro 
74bb898558SAl Viro static inline long syscall_get_return_value(struct task_struct *task,
75bb898558SAl Viro 					    struct pt_regs *regs)
76bb898558SAl Viro {
77bb898558SAl Viro 	return regs->ax;
78bb898558SAl Viro }
79bb898558SAl Viro 
80bb898558SAl Viro static inline void syscall_set_return_value(struct task_struct *task,
81bb898558SAl Viro 					    struct pt_regs *regs,
82bb898558SAl Viro 					    int error, long val)
83bb898558SAl Viro {
84bb898558SAl Viro 	regs->ax = (long) error ?: val;
85bb898558SAl Viro }
86bb898558SAl Viro 
87bb898558SAl Viro #ifdef CONFIG_X86_32
88bb898558SAl Viro 
89bb898558SAl Viro static inline void syscall_get_arguments(struct task_struct *task,
90bb898558SAl Viro 					 struct pt_regs *regs,
91bb898558SAl Viro 					 unsigned long *args)
92bb898558SAl Viro {
93b35f549dSSteven Rostedt (Red Hat) 	memcpy(args, &regs->bx, 6 * sizeof(args[0]));
94bb898558SAl Viro }
95bb898558SAl Viro 
96bb898558SAl Viro static inline void syscall_set_arguments(struct task_struct *task,
97bb898558SAl Viro 					 struct pt_regs *regs,
98bb898558SAl Viro 					 unsigned int i, unsigned int n,
99bb898558SAl Viro 					 const unsigned long *args)
100bb898558SAl Viro {
101bb898558SAl Viro 	BUG_ON(i + n > 6);
102bb898558SAl Viro 	memcpy(&regs->bx + i, args, n * sizeof(args[0]));
103bb898558SAl Viro }
104bb898558SAl Viro 
10516add411SDmitry V. Levin static inline int syscall_get_arch(struct task_struct *task)
106b7456536SWill Drewry {
107b7456536SWill Drewry 	return AUDIT_ARCH_I386;
108b7456536SWill Drewry }
109b7456536SWill Drewry 
110bb898558SAl Viro #else	 /* CONFIG_X86_64 */
111bb898558SAl Viro 
112bb898558SAl Viro static inline void syscall_get_arguments(struct task_struct *task,
113bb898558SAl Viro 					 struct pt_regs *regs,
114bb898558SAl Viro 					 unsigned long *args)
115bb898558SAl Viro {
116bb898558SAl Viro # ifdef CONFIG_IA32_EMULATION
117b35f549dSSteven Rostedt (Red Hat) 	if (task->thread_info.status & TS_COMPAT) {
118bb898558SAl Viro 		*args++ = regs->bx;
119c3c9897cSLinus Torvalds 		*args++ = regs->cx;
120c3c9897cSLinus Torvalds 		*args++ = regs->dx;
121c3c9897cSLinus Torvalds 		*args++ = regs->si;
122c3c9897cSLinus Torvalds 		*args++ = regs->di;
123b35f549dSSteven Rostedt (Red Hat) 		*args   = regs->bp;
124b35f549dSSteven Rostedt (Red Hat) 	} else
125bb898558SAl Viro # endif
126b35f549dSSteven Rostedt (Red Hat) 	{
127bb898558SAl Viro 		*args++ = regs->di;
128c3c9897cSLinus Torvalds 		*args++ = regs->si;
129c3c9897cSLinus Torvalds 		*args++ = regs->dx;
130c3c9897cSLinus Torvalds 		*args++ = regs->r10;
131c3c9897cSLinus Torvalds 		*args++ = regs->r8;
132b35f549dSSteven Rostedt (Red Hat) 		*args   = regs->r9;
133bb898558SAl Viro 	}
134bb898558SAl Viro }
135bb898558SAl Viro 
136bb898558SAl Viro static inline void syscall_set_arguments(struct task_struct *task,
137bb898558SAl Viro 					 struct pt_regs *regs,
138bb898558SAl Viro 					 const unsigned long *args)
139bb898558SAl Viro {
140bb898558SAl Viro # ifdef CONFIG_IA32_EMULATION
14132d92586SSteven Rostedt (VMware) 	if (task->thread_info.status & TS_COMPAT) {
142bb898558SAl Viro 		regs->bx = *args++;
143c3c9897cSLinus Torvalds 		regs->cx = *args++;
144c3c9897cSLinus Torvalds 		regs->dx = *args++;
145c3c9897cSLinus Torvalds 		regs->si = *args++;
146c3c9897cSLinus Torvalds 		regs->di = *args++;
14732d92586SSteven Rostedt (VMware) 		regs->bp = *args;
14832d92586SSteven Rostedt (VMware) 	} else
149bb898558SAl Viro # endif
15032d92586SSteven Rostedt (VMware) 	{
151bb898558SAl Viro 		regs->di = *args++;
152c3c9897cSLinus Torvalds 		regs->si = *args++;
153c3c9897cSLinus Torvalds 		regs->dx = *args++;
154c3c9897cSLinus Torvalds 		regs->r10 = *args++;
155c3c9897cSLinus Torvalds 		regs->r8 = *args++;
15632d92586SSteven Rostedt (VMware) 		regs->r9 = *args;
157bb898558SAl Viro 	}
158bb898558SAl Viro }
159bb898558SAl Viro 
16016add411SDmitry V. Levin static inline int syscall_get_arch(struct task_struct *task)
161b7456536SWill Drewry {
162b9d989c7SAndy Lutomirski 	/* x32 tasks should be considered AUDIT_ARCH_X86_64. */
16316add411SDmitry V. Levin 	return (IS_ENABLED(CONFIG_IA32_EMULATION) &&
16416add411SDmitry V. Levin 		task->thread_info.status & TS_COMPAT)
16516add411SDmitry V. Levin 		? AUDIT_ARCH_I386 : AUDIT_ARCH_X86_64;
166b7456536SWill Drewry }
167bb898558SAl Viro #endif	/* CONFIG_X86_32 */
168bb898558SAl Viro 
1695e1b0075SH. Peter Anvin #endif	/* _ASM_X86_SYSCALL_H */
170