1bf2c9f98SWade Farnsworth /* 2bf2c9f98SWade Farnsworth * Access to user system call parameters and results 3bf2c9f98SWade Farnsworth * 4bf2c9f98SWade Farnsworth * See asm-generic/syscall.h for descriptions of what we must do here. 5bf2c9f98SWade Farnsworth */ 6bf2c9f98SWade Farnsworth 7bf2c9f98SWade Farnsworth #ifndef _ASM_ARM_SYSCALL_H 8bf2c9f98SWade Farnsworth #define _ASM_ARM_SYSCALL_H 9bf2c9f98SWade Farnsworth 101f59d13bSWill Drewry #include <linux/audit.h> /* for AUDIT_ARCH_* */ 111f59d13bSWill Drewry #include <linux/elf.h> /* for ELF_EM */ 12bf2c9f98SWade Farnsworth #include <linux/err.h> 138ef102c6SWade Farnsworth #include <linux/sched.h> 14bf2c9f98SWade Farnsworth 151f66e06fSWade Farnsworth #include <asm/unistd.h> 161f66e06fSWade Farnsworth 171f66e06fSWade Farnsworth #define NR_syscalls (__NR_syscalls) 181f66e06fSWade Farnsworth 19bf2c9f98SWade Farnsworth extern const unsigned long sys_call_table[]; 20bf2c9f98SWade Farnsworth 21bf2c9f98SWade Farnsworth static inline int syscall_get_nr(struct task_struct *task, 22bf2c9f98SWade Farnsworth struct pt_regs *regs) 23bf2c9f98SWade Farnsworth { 24bf2c9f98SWade Farnsworth return task_thread_info(task)->syscall; 25bf2c9f98SWade Farnsworth } 26bf2c9f98SWade Farnsworth 27bf2c9f98SWade Farnsworth static inline void syscall_rollback(struct task_struct *task, 28bf2c9f98SWade Farnsworth struct pt_regs *regs) 29bf2c9f98SWade Farnsworth { 30bf2c9f98SWade Farnsworth regs->ARM_r0 = regs->ARM_ORIG_r0; 31bf2c9f98SWade Farnsworth } 32bf2c9f98SWade Farnsworth 33bf2c9f98SWade Farnsworth static inline long syscall_get_error(struct task_struct *task, 34bf2c9f98SWade Farnsworth struct pt_regs *regs) 35bf2c9f98SWade Farnsworth { 36bf2c9f98SWade Farnsworth unsigned long error = regs->ARM_r0; 37bf2c9f98SWade Farnsworth return IS_ERR_VALUE(error) ? error : 0; 38bf2c9f98SWade Farnsworth } 39bf2c9f98SWade Farnsworth 40bf2c9f98SWade Farnsworth static inline long syscall_get_return_value(struct task_struct *task, 41bf2c9f98SWade Farnsworth struct pt_regs *regs) 42bf2c9f98SWade Farnsworth { 43bf2c9f98SWade Farnsworth return regs->ARM_r0; 44bf2c9f98SWade Farnsworth } 45bf2c9f98SWade Farnsworth 46bf2c9f98SWade Farnsworth static inline void syscall_set_return_value(struct task_struct *task, 47bf2c9f98SWade Farnsworth struct pt_regs *regs, 48bf2c9f98SWade Farnsworth int error, long val) 49bf2c9f98SWade Farnsworth { 50bf2c9f98SWade Farnsworth regs->ARM_r0 = (long) error ? error : val; 51bf2c9f98SWade Farnsworth } 52bf2c9f98SWade Farnsworth 53bf2c9f98SWade Farnsworth #define SYSCALL_MAX_ARGS 7 54bf2c9f98SWade Farnsworth 55bf2c9f98SWade Farnsworth static inline void syscall_get_arguments(struct task_struct *task, 56bf2c9f98SWade Farnsworth struct pt_regs *regs, 57bf2c9f98SWade Farnsworth unsigned int i, unsigned int n, 58bf2c9f98SWade Farnsworth unsigned long *args) 59bf2c9f98SWade Farnsworth { 603c1532dfSAKASHI Takahiro if (n == 0) 613c1532dfSAKASHI Takahiro return; 623c1532dfSAKASHI Takahiro 63bf2c9f98SWade Farnsworth if (i + n > SYSCALL_MAX_ARGS) { 64bf2c9f98SWade Farnsworth unsigned long *args_bad = args + SYSCALL_MAX_ARGS - i; 65bf2c9f98SWade Farnsworth unsigned int n_bad = n + i - SYSCALL_MAX_ARGS; 66bf2c9f98SWade Farnsworth pr_warning("%s called with max args %d, handling only %d\n", 67bf2c9f98SWade Farnsworth __func__, i + n, SYSCALL_MAX_ARGS); 68bf2c9f98SWade Farnsworth memset(args_bad, 0, n_bad * sizeof(args[0])); 69bf2c9f98SWade Farnsworth n = SYSCALL_MAX_ARGS - i; 70bf2c9f98SWade Farnsworth } 71bf2c9f98SWade Farnsworth 72bf2c9f98SWade Farnsworth if (i == 0) { 73bf2c9f98SWade Farnsworth args[0] = regs->ARM_ORIG_r0; 74bf2c9f98SWade Farnsworth args++; 75bf2c9f98SWade Farnsworth i++; 76bf2c9f98SWade Farnsworth n--; 77bf2c9f98SWade Farnsworth } 78bf2c9f98SWade Farnsworth 79bf2c9f98SWade Farnsworth memcpy(args, ®s->ARM_r0 + i, n * sizeof(args[0])); 80bf2c9f98SWade Farnsworth } 81bf2c9f98SWade Farnsworth 82bf2c9f98SWade Farnsworth static inline void syscall_set_arguments(struct task_struct *task, 83bf2c9f98SWade Farnsworth struct pt_regs *regs, 84bf2c9f98SWade Farnsworth unsigned int i, unsigned int n, 85bf2c9f98SWade Farnsworth const unsigned long *args) 86bf2c9f98SWade Farnsworth { 873c1532dfSAKASHI Takahiro if (n == 0) 883c1532dfSAKASHI Takahiro return; 893c1532dfSAKASHI Takahiro 90bf2c9f98SWade Farnsworth if (i + n > SYSCALL_MAX_ARGS) { 91bf2c9f98SWade Farnsworth pr_warning("%s called with max args %d, handling only %d\n", 92bf2c9f98SWade Farnsworth __func__, i + n, SYSCALL_MAX_ARGS); 93bf2c9f98SWade Farnsworth n = SYSCALL_MAX_ARGS - i; 94bf2c9f98SWade Farnsworth } 95bf2c9f98SWade Farnsworth 96bf2c9f98SWade Farnsworth if (i == 0) { 97bf2c9f98SWade Farnsworth regs->ARM_ORIG_r0 = args[0]; 98bf2c9f98SWade Farnsworth args++; 99bf2c9f98SWade Farnsworth i++; 100bf2c9f98SWade Farnsworth n--; 101bf2c9f98SWade Farnsworth } 102bf2c9f98SWade Farnsworth 103bf2c9f98SWade Farnsworth memcpy(®s->ARM_r0 + i, args, n * sizeof(args[0])); 104bf2c9f98SWade Farnsworth } 105bf2c9f98SWade Farnsworth 1061f59d13bSWill Drewry static inline int syscall_get_arch(struct task_struct *task, 1071f59d13bSWill Drewry struct pt_regs *regs) 1081f59d13bSWill Drewry { 1091f59d13bSWill Drewry /* ARM tasks don't change audit architectures on the fly. */ 1101f59d13bSWill Drewry return AUDIT_ARCH_ARM; 1111f59d13bSWill Drewry } 1121f59d13bSWill Drewry 113bf2c9f98SWade Farnsworth #endif /* _ASM_ARM_SYSCALL_H */ 114