mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
910cd32e55
The seccomp filter support requires careful handling of task registers. This includes reloading of the return value (%r28) and proper syscall exit if secure_computing() returned -1. Additionally we need to sign-extend the syscall number from signed 32bit to signed 64bit in do_syscall_trace_enter() since the ptrace interface only allows storing 32bit values in compat mode. Signed-off-by: Helge Deller <deller@gmx.de> Cc: stable@vger.kernel.org # v4.5
65 lines
1.2 KiB
C
65 lines
1.2 KiB
C
/* syscall.h */
|
|
|
|
#ifndef _ASM_PARISC_SYSCALL_H_
|
|
#define _ASM_PARISC_SYSCALL_H_
|
|
|
|
#include <uapi/linux/audit.h>
|
|
#include <linux/compat.h>
|
|
#include <linux/err.h>
|
|
#include <asm/ptrace.h>
|
|
|
|
static inline long syscall_get_nr(struct task_struct *tsk,
|
|
struct pt_regs *regs)
|
|
{
|
|
return regs->gr[20];
|
|
}
|
|
|
|
static inline void syscall_get_arguments(struct task_struct *tsk,
|
|
struct pt_regs *regs, unsigned int i,
|
|
unsigned int n, unsigned long *args)
|
|
{
|
|
BUG_ON(i);
|
|
|
|
switch (n) {
|
|
case 6:
|
|
args[5] = regs->gr[21];
|
|
case 5:
|
|
args[4] = regs->gr[22];
|
|
case 4:
|
|
args[3] = regs->gr[23];
|
|
case 3:
|
|
args[2] = regs->gr[24];
|
|
case 2:
|
|
args[1] = regs->gr[25];
|
|
case 1:
|
|
args[0] = regs->gr[26];
|
|
break;
|
|
default:
|
|
BUG();
|
|
}
|
|
}
|
|
|
|
static inline void syscall_set_return_value(struct task_struct *task,
|
|
struct pt_regs *regs,
|
|
int error, long val)
|
|
{
|
|
regs->gr[28] = error ? error : val;
|
|
}
|
|
|
|
static inline void syscall_rollback(struct task_struct *task,
|
|
struct pt_regs *regs)
|
|
{
|
|
/* do nothing */
|
|
}
|
|
|
|
static inline int syscall_get_arch(void)
|
|
{
|
|
int arch = AUDIT_ARCH_PARISC;
|
|
#ifdef CONFIG_64BIT
|
|
if (!is_compat_task())
|
|
arch = AUDIT_ARCH_PARISC64;
|
|
#endif
|
|
return arch;
|
|
}
|
|
#endif /*_ASM_PARISC_SYSCALL_H_*/
|