12522fe45SThomas Gleixner /* SPDX-License-Identifier: GPL-2.0-only */ 2bb898558SAl Viro /* 3bb898558SAl Viro * Access to user system call parameters and results 4bb898558SAl Viro * 518c1e2c8SRoland McGrath * Copyright (C) 2008-2009 Red Hat, Inc. All rights reserved. 6bb898558SAl Viro * 7bb898558SAl Viro * See asm-generic/syscall.h for descriptions of what we must do here. 8bb898558SAl Viro */ 9bb898558SAl Viro 105e1b0075SH. Peter Anvin #ifndef _ASM_X86_SYSCALL_H 115e1b0075SH. Peter Anvin #define _ASM_X86_SYSCALL_H 12bb898558SAl Viro 13579ec9e1SEric Paris #include <uapi/linux/audit.h> 14bb898558SAl Viro #include <linux/sched.h> 15bb898558SAl Viro #include <linux/err.h> 1672142fd4SH. Peter Anvin #include <asm/asm-offsets.h> /* For NR_syscalls */ 17b7456536SWill Drewry #include <asm/thread_info.h> /* for TS_COMPAT */ 18fca460f9SH. Peter Anvin #include <asm/unistd.h> 19bb898558SAl Viro 20f8781c4aSDominik Brodowski #ifdef CONFIG_X86_64 21fa697140SDominik Brodowski typedef asmlinkage long (*sys_call_ptr_t)(const struct pt_regs *); 22fa697140SDominik Brodowski #else 23eb974c62SAndy Lutomirski typedef asmlinkage long (*sys_call_ptr_t)(unsigned long, unsigned long, 24eb974c62SAndy Lutomirski unsigned long, unsigned long, 25eb974c62SAndy Lutomirski unsigned long, unsigned long); 26f8781c4aSDominik Brodowski #endif /* CONFIG_X86_64 */ 271599e8fcSAndi Kleen extern const sys_call_ptr_t sys_call_table[]; 28e7b8e675SMike Frysinger 29034042ccSAndy Lutomirski #if defined(CONFIG_X86_32) 30034042ccSAndy Lutomirski #define ia32_sys_call_table sys_call_table 31034042ccSAndy Lutomirski #define __NR_syscall_compat_max __NR_syscall_max 32034042ccSAndy Lutomirski #define IA32_NR_syscalls NR_syscalls 33034042ccSAndy Lutomirski #endif 34034042ccSAndy Lutomirski 35034042ccSAndy Lutomirski #if defined(CONFIG_IA32_EMULATION) 36034042ccSAndy Lutomirski extern const sys_call_ptr_t ia32_sys_call_table[]; 37034042ccSAndy Lutomirski #endif 38034042ccSAndy Lutomirski 396365b842SAndy Lutomirski #ifdef CONFIG_X86_X32_ABI 406365b842SAndy Lutomirski extern const sys_call_ptr_t x32_sys_call_table[]; 416365b842SAndy Lutomirski #endif 426365b842SAndy Lutomirski 43bb898558SAl Viro /* 4418c1e2c8SRoland McGrath * Only the low 32 bits of orig_ax are meaningful, so we return int. 4518c1e2c8SRoland McGrath * This importantly ignores the high bits on 64-bit, so comparisons 4618c1e2c8SRoland McGrath * sign-extend the low 32 bits. 47bb898558SAl Viro */ 4818c1e2c8SRoland McGrath static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs) 4918c1e2c8SRoland McGrath { 508b4b9f27SPaul Moore return regs->orig_ax; 51bb898558SAl Viro } 52bb898558SAl Viro 53bb898558SAl Viro static inline void syscall_rollback(struct task_struct *task, 54bb898558SAl Viro struct pt_regs *regs) 55bb898558SAl Viro { 568b4b9f27SPaul Moore regs->ax = regs->orig_ax; 57bb898558SAl Viro } 58bb898558SAl Viro 59bb898558SAl Viro static inline long syscall_get_error(struct task_struct *task, 60bb898558SAl Viro struct pt_regs *regs) 61bb898558SAl Viro { 62bb898558SAl Viro unsigned long error = regs->ax; 63bb898558SAl Viro #ifdef CONFIG_IA32_EMULATION 64bb898558SAl Viro /* 65bb898558SAl Viro * TS_COMPAT is set for 32-bit syscall entries and then 66bb898558SAl Viro * remains set until we return to user mode. 67bb898558SAl Viro */ 6837a8f7c3SAndy Lutomirski if (task->thread_info.status & (TS_COMPAT|TS_I386_REGS_POKED)) 69bb898558SAl Viro /* 70bb898558SAl Viro * Sign-extend the value so (int)-EFOO becomes (long)-EFOO 71bb898558SAl Viro * and will match correctly in comparisons. 72bb898558SAl Viro */ 73bb898558SAl Viro error = (long) (int) error; 74bb898558SAl Viro #endif 75bb898558SAl Viro return IS_ERR_VALUE(error) ? error : 0; 76bb898558SAl Viro } 77bb898558SAl Viro 78bb898558SAl Viro static inline long syscall_get_return_value(struct task_struct *task, 79bb898558SAl Viro struct pt_regs *regs) 80bb898558SAl Viro { 81bb898558SAl Viro return regs->ax; 82bb898558SAl Viro } 83bb898558SAl Viro 84bb898558SAl Viro static inline void syscall_set_return_value(struct task_struct *task, 85bb898558SAl Viro struct pt_regs *regs, 86bb898558SAl Viro int error, long val) 87bb898558SAl Viro { 88bb898558SAl Viro regs->ax = (long) error ?: val; 89bb898558SAl Viro } 90bb898558SAl Viro 91bb898558SAl Viro #ifdef CONFIG_X86_32 92bb898558SAl Viro 93bb898558SAl Viro static inline void syscall_get_arguments(struct task_struct *task, 94bb898558SAl Viro struct pt_regs *regs, 95bb898558SAl Viro unsigned long *args) 96bb898558SAl Viro { 97b35f549dSSteven Rostedt (Red Hat) memcpy(args, ®s->bx, 6 * sizeof(args[0])); 98bb898558SAl Viro } 99bb898558SAl Viro 100bb898558SAl Viro static inline void syscall_set_arguments(struct task_struct *task, 101bb898558SAl Viro struct pt_regs *regs, 102bb898558SAl Viro unsigned int i, unsigned int n, 103bb898558SAl Viro const unsigned long *args) 104bb898558SAl Viro { 105bb898558SAl Viro BUG_ON(i + n > 6); 106bb898558SAl Viro memcpy(®s->bx + i, args, n * sizeof(args[0])); 107bb898558SAl Viro } 108bb898558SAl Viro 10916add411SDmitry V. Levin static inline int syscall_get_arch(struct task_struct *task) 110b7456536SWill Drewry { 111b7456536SWill Drewry return AUDIT_ARCH_I386; 112b7456536SWill Drewry } 113b7456536SWill Drewry 114bb898558SAl Viro #else /* CONFIG_X86_64 */ 115bb898558SAl Viro 116bb898558SAl Viro static inline void syscall_get_arguments(struct task_struct *task, 117bb898558SAl Viro struct pt_regs *regs, 118bb898558SAl Viro unsigned long *args) 119bb898558SAl Viro { 120bb898558SAl Viro # ifdef CONFIG_IA32_EMULATION 121b35f549dSSteven Rostedt (Red Hat) if (task->thread_info.status & TS_COMPAT) { 122bb898558SAl Viro *args++ = regs->bx; 123c3c9897cSLinus Torvalds *args++ = regs->cx; 124c3c9897cSLinus Torvalds *args++ = regs->dx; 125c3c9897cSLinus Torvalds *args++ = regs->si; 126c3c9897cSLinus Torvalds *args++ = regs->di; 127b35f549dSSteven Rostedt (Red Hat) *args = regs->bp; 128b35f549dSSteven Rostedt (Red Hat) } else 129bb898558SAl Viro # endif 130b35f549dSSteven Rostedt (Red Hat) { 131bb898558SAl Viro *args++ = regs->di; 132c3c9897cSLinus Torvalds *args++ = regs->si; 133c3c9897cSLinus Torvalds *args++ = regs->dx; 134c3c9897cSLinus Torvalds *args++ = regs->r10; 135c3c9897cSLinus Torvalds *args++ = regs->r8; 136b35f549dSSteven Rostedt (Red Hat) *args = regs->r9; 137bb898558SAl Viro } 138bb898558SAl Viro } 139bb898558SAl Viro 140bb898558SAl Viro static inline void syscall_set_arguments(struct task_struct *task, 141bb898558SAl Viro struct pt_regs *regs, 142bb898558SAl Viro const unsigned long *args) 143bb898558SAl Viro { 144bb898558SAl Viro # ifdef CONFIG_IA32_EMULATION 14532d92586SSteven Rostedt (VMware) if (task->thread_info.status & TS_COMPAT) { 146bb898558SAl Viro regs->bx = *args++; 147c3c9897cSLinus Torvalds regs->cx = *args++; 148c3c9897cSLinus Torvalds regs->dx = *args++; 149c3c9897cSLinus Torvalds regs->si = *args++; 150c3c9897cSLinus Torvalds regs->di = *args++; 15132d92586SSteven Rostedt (VMware) regs->bp = *args; 15232d92586SSteven Rostedt (VMware) } else 153bb898558SAl Viro # endif 15432d92586SSteven Rostedt (VMware) { 155bb898558SAl Viro regs->di = *args++; 156c3c9897cSLinus Torvalds regs->si = *args++; 157c3c9897cSLinus Torvalds regs->dx = *args++; 158c3c9897cSLinus Torvalds regs->r10 = *args++; 159c3c9897cSLinus Torvalds regs->r8 = *args++; 16032d92586SSteven Rostedt (VMware) regs->r9 = *args; 161bb898558SAl Viro } 162bb898558SAl Viro } 163bb898558SAl Viro 16416add411SDmitry V. Levin static inline int syscall_get_arch(struct task_struct *task) 165b7456536SWill Drewry { 166b9d989c7SAndy Lutomirski /* x32 tasks should be considered AUDIT_ARCH_X86_64. */ 16716add411SDmitry V. Levin return (IS_ENABLED(CONFIG_IA32_EMULATION) && 16816add411SDmitry V. Levin task->thread_info.status & TS_COMPAT) 16916add411SDmitry V. Levin ? AUDIT_ARCH_I386 : AUDIT_ARCH_X86_64; 170b7456536SWill Drewry } 171*99ce3255SBenjamin Thiel 172*99ce3255SBenjamin Thiel void do_syscall_64(unsigned long nr, struct pt_regs *regs); 173*99ce3255SBenjamin Thiel void do_int80_syscall_32(struct pt_regs *regs); 174*99ce3255SBenjamin Thiel long do_fast_syscall_32(struct pt_regs *regs); 175*99ce3255SBenjamin Thiel 176bb898558SAl Viro #endif /* CONFIG_X86_32 */ 177bb898558SAl Viro 1785e1b0075SH. Peter Anvin #endif /* _ASM_X86_SYSCALL_H */ 179