Loading...
1/* SPDX-License-Identifier: GPL-2.0 */
2/*
3 * Access to user system call parameters and results
4 *
5 * See asm-generic/syscall.h for descriptions of what we must do here.
6 */
7
8#ifndef _ASM_ARM_SYSCALL_H
9#define _ASM_ARM_SYSCALL_H
10
11#include <uapi/linux/audit.h> /* for AUDIT_ARCH_* */
12#include <linux/elf.h> /* for ELF_EM */
13#include <linux/err.h>
14#include <linux/sched.h>
15
16#include <asm/unistd.h>
17
18#define NR_syscalls (__NR_syscalls)
19
20extern const unsigned long sys_call_table[];
21
22static inline int syscall_get_nr(struct task_struct *task,
23 struct pt_regs *regs)
24{
25 if (IS_ENABLED(CONFIG_AEABI) && !IS_ENABLED(CONFIG_OABI_COMPAT))
26 return task_thread_info(task)->abi_syscall;
27
28 if (task_thread_info(task)->abi_syscall == -1)
29 return -1;
30
31 return task_thread_info(task)->abi_syscall & __NR_SYSCALL_MASK;
32}
33
34static inline bool __in_oabi_syscall(struct task_struct *task)
35{
36 return IS_ENABLED(CONFIG_OABI_COMPAT) &&
37 (task_thread_info(task)->abi_syscall & __NR_OABI_SYSCALL_BASE);
38}
39
40static inline bool in_oabi_syscall(void)
41{
42 return __in_oabi_syscall(current);
43}
44
45static inline void syscall_rollback(struct task_struct *task,
46 struct pt_regs *regs)
47{
48 regs->ARM_r0 = regs->ARM_ORIG_r0;
49}
50
51static inline long syscall_get_error(struct task_struct *task,
52 struct pt_regs *regs)
53{
54 unsigned long error = regs->ARM_r0;
55 return IS_ERR_VALUE(error) ? error : 0;
56}
57
58static inline long syscall_get_return_value(struct task_struct *task,
59 struct pt_regs *regs)
60{
61 return regs->ARM_r0;
62}
63
64static inline void syscall_set_return_value(struct task_struct *task,
65 struct pt_regs *regs,
66 int error, long val)
67{
68 regs->ARM_r0 = (long) error ? error : val;
69}
70
71#define SYSCALL_MAX_ARGS 7
72
73static inline void syscall_get_arguments(struct task_struct *task,
74 struct pt_regs *regs,
75 unsigned long *args)
76{
77 args[0] = regs->ARM_ORIG_r0;
78 args++;
79
80 memcpy(args, ®s->ARM_r0 + 1, 5 * sizeof(args[0]));
81}
82
83static inline int syscall_get_arch(struct task_struct *task)
84{
85 /* ARM tasks don't change audit architectures on the fly. */
86 return AUDIT_ARCH_ARM;
87}
88
89#endif /* _ASM_ARM_SYSCALL_H */
1/* SPDX-License-Identifier: GPL-2.0 */
2/*
3 * Access to user system call parameters and results
4 *
5 * See asm-generic/syscall.h for descriptions of what we must do here.
6 */
7
8#ifndef _ASM_ARM_SYSCALL_H
9#define _ASM_ARM_SYSCALL_H
10
11#include <uapi/linux/audit.h> /* for AUDIT_ARCH_* */
12#include <linux/elf.h> /* for ELF_EM */
13#include <linux/err.h>
14#include <linux/sched.h>
15
16#include <asm/unistd.h>
17
18#define NR_syscalls (__NR_syscalls)
19
20extern const unsigned long sys_call_table[];
21
22static inline int syscall_get_nr(struct task_struct *task,
23 struct pt_regs *regs)
24{
25 return task_thread_info(task)->syscall;
26}
27
28static inline void syscall_rollback(struct task_struct *task,
29 struct pt_regs *regs)
30{
31 regs->ARM_r0 = regs->ARM_ORIG_r0;
32}
33
34static inline long syscall_get_error(struct task_struct *task,
35 struct pt_regs *regs)
36{
37 unsigned long error = regs->ARM_r0;
38 return IS_ERR_VALUE(error) ? error : 0;
39}
40
41static inline long syscall_get_return_value(struct task_struct *task,
42 struct pt_regs *regs)
43{
44 return regs->ARM_r0;
45}
46
47static inline void syscall_set_return_value(struct task_struct *task,
48 struct pt_regs *regs,
49 int error, long val)
50{
51 regs->ARM_r0 = (long) error ? error : val;
52}
53
54#define SYSCALL_MAX_ARGS 7
55
56static inline void syscall_get_arguments(struct task_struct *task,
57 struct pt_regs *regs,
58 unsigned int i, unsigned int n,
59 unsigned long *args)
60{
61 if (n == 0)
62 return;
63
64 if (i + n > SYSCALL_MAX_ARGS) {
65 unsigned long *args_bad = args + SYSCALL_MAX_ARGS - i;
66 unsigned int n_bad = n + i - SYSCALL_MAX_ARGS;
67 pr_warn("%s called with max args %d, handling only %d\n",
68 __func__, i + n, SYSCALL_MAX_ARGS);
69 memset(args_bad, 0, n_bad * sizeof(args[0]));
70 n = SYSCALL_MAX_ARGS - i;
71 }
72
73 if (i == 0) {
74 args[0] = regs->ARM_ORIG_r0;
75 args++;
76 i++;
77 n--;
78 }
79
80 memcpy(args, ®s->ARM_r0 + i, n * sizeof(args[0]));
81}
82
83static inline void syscall_set_arguments(struct task_struct *task,
84 struct pt_regs *regs,
85 unsigned int i, unsigned int n,
86 const unsigned long *args)
87{
88 if (n == 0)
89 return;
90
91 if (i + n > SYSCALL_MAX_ARGS) {
92 pr_warn("%s called with max args %d, handling only %d\n",
93 __func__, i + n, SYSCALL_MAX_ARGS);
94 n = SYSCALL_MAX_ARGS - i;
95 }
96
97 if (i == 0) {
98 regs->ARM_ORIG_r0 = args[0];
99 args++;
100 i++;
101 n--;
102 }
103
104 memcpy(®s->ARM_r0 + i, args, n * sizeof(args[0]));
105}
106
107static inline int syscall_get_arch(void)
108{
109 /* ARM tasks don't change audit architectures on the fly. */
110 return AUDIT_ARCH_ARM;
111}
112
113#endif /* _ASM_ARM_SYSCALL_H */