2019-05-29 00:57:20 +08:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0-only */
|
2008-07-27 14:51:35 +08:00
|
|
|
/*
|
|
|
|
* Access to user system call parameters and results
|
|
|
|
*
|
|
|
|
* Copyright (C) 2008 Red Hat, Inc. All rights reserved.
|
|
|
|
*
|
|
|
|
* See asm-generic/syscall.h for descriptions of what we must do here.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _ASM_SYSCALL_H
|
|
|
|
#define _ASM_SYSCALL_H 1
|
|
|
|
|
2014-03-12 01:50:46 +08:00
|
|
|
#include <uapi/linux/audit.h>
|
2008-07-27 14:51:35 +08:00
|
|
|
#include <linux/sched.h>
|
2014-04-23 00:07:30 +08:00
|
|
|
#include <linux/thread_info.h>
|
2008-07-27 14:51:35 +08:00
|
|
|
|
2011-02-03 01:27:24 +08:00
|
|
|
/* ftrace syscalls requires exporting the sys_call_table */
|
powerpc: Fix sys_call_table declaration to enable syscall tracing
Declaring sys_call_table as a pointer causes the compiler to generate
the wrong lookup code in arch_syscall_addr().
<arch_syscall_addr>:
lis r9,-16384
rlwinm r3,r3,2,0,29
- lwz r11,30640(r9)
- lwzx r3,r11,r3
+ addi r9,r9,30640
+ lwzx r3,r9,r3
blr
The actual sys_call_table symbol, declared in assembler, is an
array. If we lie about that to the compiler we get the wrong code
generated, as above.
This definition seems only to be used by the syscall tracing code in
kernel/trace/trace_syscalls.c. With this patch I can successfully use
the syscall tracepoints:
bash-3815 [002] .... 333.239082: sys_write -> 0x2
bash-3815 [002] .... 333.239087: sys_dup2(oldfd: a, newfd: 1)
bash-3815 [002] .... 333.239088: sys_dup2 -> 0x1
bash-3815 [002] .... 333.239092: sys_fcntl(fd: a, cmd: 1, arg: 0)
bash-3815 [002] .... 333.239093: sys_fcntl -> 0x1
bash-3815 [002] .... 333.239094: sys_close(fd: a)
bash-3815 [002] .... 333.239094: sys_close -> 0x0
Signed-off-by: Romeo Cane <romeo.cane.ext@coriant.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2014-10-02 22:41:39 +08:00
|
|
|
extern const unsigned long sys_call_table[];
|
2018-12-17 18:40:35 +08:00
|
|
|
extern const unsigned long compat_sys_call_table[];
|
2011-02-03 01:27:24 +08:00
|
|
|
|
2015-07-23 18:21:07 +08:00
|
|
|
static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
|
2008-07-27 14:51:35 +08:00
|
|
|
{
|
2015-07-23 18:21:07 +08:00
|
|
|
/*
|
|
|
|
* Note that we are returning an int here. That means 0xffffffff, ie.
|
|
|
|
* 32-bit negative 1, will be interpreted as -1 on a 64-bit kernel.
|
|
|
|
* This is important for seccomp so that compat tasks can set r0 = -1
|
|
|
|
* to reject the syscall.
|
|
|
|
*/
|
|
|
|
return TRAP(regs) == 0xc00 ? regs->gpr[0] : -1;
|
2008-07-27 14:51:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void syscall_rollback(struct task_struct *task,
|
|
|
|
struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
regs->gpr[3] = regs->orig_gpr3;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline long syscall_get_return_value(struct task_struct *task,
|
|
|
|
struct pt_regs *regs)
|
|
|
|
{
|
|
|
|
return regs->gpr[3];
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void syscall_set_return_value(struct task_struct *task,
|
|
|
|
struct pt_regs *regs,
|
|
|
|
int error, long val)
|
|
|
|
{
|
2015-07-23 18:21:04 +08:00
|
|
|
/*
|
|
|
|
* In the general case it's not obvious that we must deal with CCR
|
|
|
|
* here, as the syscall exit path will also do that for us. However
|
|
|
|
* there are some places, eg. the signal code, which check ccr to
|
|
|
|
* decide if the value in r3 is actually an error.
|
|
|
|
*/
|
2008-07-27 14:51:35 +08:00
|
|
|
if (error) {
|
2010-03-12 21:16:02 +08:00
|
|
|
regs->ccr |= 0x10000000L;
|
2015-07-23 18:21:04 +08:00
|
|
|
regs->gpr[3] = error;
|
2008-07-27 14:51:35 +08:00
|
|
|
} else {
|
2010-03-12 21:16:02 +08:00
|
|
|
regs->ccr &= ~0x10000000L;
|
2008-07-27 14:51:35 +08:00
|
|
|
regs->gpr[3] = val;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void syscall_get_arguments(struct task_struct *task,
|
|
|
|
struct pt_regs *regs,
|
|
|
|
unsigned long *args)
|
|
|
|
{
|
2015-07-23 18:21:06 +08:00
|
|
|
unsigned long val, mask = -1UL;
|
2016-11-08 05:26:37 +08:00
|
|
|
unsigned int n = 6;
|
2015-07-23 18:21:05 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
|
|
if (test_tsk_thread_flag(task, TIF_32BIT))
|
|
|
|
mask = 0xffffffff;
|
2008-07-27 14:51:35 +08:00
|
|
|
#endif
|
2015-07-23 18:21:06 +08:00
|
|
|
while (n--) {
|
2016-11-08 05:26:37 +08:00
|
|
|
if (n == 0)
|
2015-07-23 18:21:06 +08:00
|
|
|
val = regs->orig_gpr3;
|
|
|
|
else
|
2016-11-08 05:26:37 +08:00
|
|
|
val = regs->gpr[3 + n];
|
2015-07-23 18:21:06 +08:00
|
|
|
|
|
|
|
args[n] = val & mask;
|
|
|
|
}
|
2008-07-27 14:51:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void syscall_set_arguments(struct task_struct *task,
|
|
|
|
struct pt_regs *regs,
|
|
|
|
const unsigned long *args)
|
|
|
|
{
|
2019-03-28 08:07:31 +08:00
|
|
|
memcpy(®s->gpr[3], args, 6 * sizeof(args[0]));
|
2015-07-23 18:21:06 +08:00
|
|
|
|
|
|
|
/* Also copy the first argument into orig_gpr3 */
|
2019-03-28 08:07:31 +08:00
|
|
|
regs->orig_gpr3 = args[0];
|
2008-07-27 14:51:35 +08:00
|
|
|
}
|
|
|
|
|
2019-03-18 07:30:18 +08:00
|
|
|
static inline int syscall_get_arch(struct task_struct *task)
|
2014-03-12 01:50:46 +08:00
|
|
|
{
|
2019-03-18 07:30:18 +08:00
|
|
|
int arch;
|
|
|
|
|
|
|
|
if (IS_ENABLED(CONFIG_PPC64) && !test_tsk_thread_flag(task, TIF_32BIT))
|
|
|
|
arch = AUDIT_ARCH_PPC64;
|
|
|
|
else
|
|
|
|
arch = AUDIT_ARCH_PPC;
|
|
|
|
|
2014-12-10 04:37:07 +08:00
|
|
|
#ifdef __LITTLE_ENDIAN__
|
|
|
|
arch |= __AUDIT_ARCH_LE;
|
|
|
|
#endif
|
|
|
|
return arch;
|
2014-03-12 01:50:46 +08:00
|
|
|
}
|
2008-07-27 14:51:35 +08:00
|
|
|
#endif /* _ASM_SYSCALL_H */
|