2019-06-03 05:44:50 +00:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0-only */
|
2012-03-05 11:49:32 +00:00
|
|
|
/*
|
2012-10-10 14:16:13 +00:00
|
|
|
* AArch32 (compat) system call definitions.
|
2012-03-05 11:49:32 +00:00
|
|
|
*
|
|
|
|
* Copyright (C) 2001-2005 Russell King
|
|
|
|
* Copyright (C) 2012 ARM Ltd.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __SYSCALL
|
|
|
|
#define __SYSCALL(x, y)
|
|
|
|
#endif
|
|
|
|
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_restart_syscall 0
|
|
|
|
__SYSCALL(__NR_restart_syscall, sys_restart_syscall)
|
|
|
|
#define __NR_exit 1
|
|
|
|
__SYSCALL(__NR_exit, sys_exit)
|
|
|
|
#define __NR_fork 2
|
|
|
|
__SYSCALL(__NR_fork, sys_fork)
|
|
|
|
#define __NR_read 3
|
|
|
|
__SYSCALL(__NR_read, sys_read)
|
|
|
|
#define __NR_write 4
|
|
|
|
__SYSCALL(__NR_write, sys_write)
|
|
|
|
#define __NR_open 5
|
|
|
|
__SYSCALL(__NR_open, compat_sys_open)
|
|
|
|
#define __NR_close 6
|
|
|
|
__SYSCALL(__NR_close, sys_close)
|
|
|
|
/* 7 was sys_waitpid */
|
|
|
|
__SYSCALL(7, sys_ni_syscall)
|
|
|
|
#define __NR_creat 8
|
|
|
|
__SYSCALL(__NR_creat, sys_creat)
|
|
|
|
#define __NR_link 9
|
|
|
|
__SYSCALL(__NR_link, sys_link)
|
|
|
|
#define __NR_unlink 10
|
|
|
|
__SYSCALL(__NR_unlink, sys_unlink)
|
|
|
|
#define __NR_execve 11
|
|
|
|
__SYSCALL(__NR_execve, compat_sys_execve)
|
|
|
|
#define __NR_chdir 12
|
|
|
|
__SYSCALL(__NR_chdir, sys_chdir)
|
|
|
|
/* 13 was sys_time */
|
|
|
|
__SYSCALL(13, sys_ni_syscall)
|
|
|
|
#define __NR_mknod 14
|
|
|
|
__SYSCALL(__NR_mknod, sys_mknod)
|
|
|
|
#define __NR_chmod 15
|
|
|
|
__SYSCALL(__NR_chmod, sys_chmod)
|
|
|
|
#define __NR_lchown 16
|
|
|
|
__SYSCALL(__NR_lchown, sys_lchown16)
|
|
|
|
/* 17 was sys_break */
|
|
|
|
__SYSCALL(17, sys_ni_syscall)
|
|
|
|
/* 18 was sys_stat */
|
|
|
|
__SYSCALL(18, sys_ni_syscall)
|
|
|
|
#define __NR_lseek 19
|
|
|
|
__SYSCALL(__NR_lseek, compat_sys_lseek)
|
|
|
|
#define __NR_getpid 20
|
|
|
|
__SYSCALL(__NR_getpid, sys_getpid)
|
|
|
|
#define __NR_mount 21
|
2020-09-17 08:22:34 +00:00
|
|
|
__SYSCALL(__NR_mount, sys_mount)
|
2014-01-30 17:56:56 +00:00
|
|
|
/* 22 was sys_umount */
|
|
|
|
__SYSCALL(22, sys_ni_syscall)
|
|
|
|
#define __NR_setuid 23
|
|
|
|
__SYSCALL(__NR_setuid, sys_setuid16)
|
|
|
|
#define __NR_getuid 24
|
|
|
|
__SYSCALL(__NR_getuid, sys_getuid16)
|
|
|
|
/* 25 was sys_stime */
|
|
|
|
__SYSCALL(25, sys_ni_syscall)
|
|
|
|
#define __NR_ptrace 26
|
|
|
|
__SYSCALL(__NR_ptrace, compat_sys_ptrace)
|
|
|
|
/* 27 was sys_alarm */
|
|
|
|
__SYSCALL(27, sys_ni_syscall)
|
|
|
|
/* 28 was sys_fstat */
|
|
|
|
__SYSCALL(28, sys_ni_syscall)
|
|
|
|
#define __NR_pause 29
|
|
|
|
__SYSCALL(__NR_pause, sys_pause)
|
|
|
|
/* 30 was sys_utime */
|
|
|
|
__SYSCALL(30, sys_ni_syscall)
|
|
|
|
/* 31 was sys_stty */
|
|
|
|
__SYSCALL(31, sys_ni_syscall)
|
|
|
|
/* 32 was sys_gtty */
|
|
|
|
__SYSCALL(32, sys_ni_syscall)
|
|
|
|
#define __NR_access 33
|
|
|
|
__SYSCALL(__NR_access, sys_access)
|
|
|
|
#define __NR_nice 34
|
|
|
|
__SYSCALL(__NR_nice, sys_nice)
|
|
|
|
/* 35 was sys_ftime */
|
|
|
|
__SYSCALL(35, sys_ni_syscall)
|
|
|
|
#define __NR_sync 36
|
|
|
|
__SYSCALL(__NR_sync, sys_sync)
|
|
|
|
#define __NR_kill 37
|
|
|
|
__SYSCALL(__NR_kill, sys_kill)
|
|
|
|
#define __NR_rename 38
|
|
|
|
__SYSCALL(__NR_rename, sys_rename)
|
|
|
|
#define __NR_mkdir 39
|
|
|
|
__SYSCALL(__NR_mkdir, sys_mkdir)
|
|
|
|
#define __NR_rmdir 40
|
|
|
|
__SYSCALL(__NR_rmdir, sys_rmdir)
|
|
|
|
#define __NR_dup 41
|
|
|
|
__SYSCALL(__NR_dup, sys_dup)
|
|
|
|
#define __NR_pipe 42
|
|
|
|
__SYSCALL(__NR_pipe, sys_pipe)
|
|
|
|
#define __NR_times 43
|
|
|
|
__SYSCALL(__NR_times, compat_sys_times)
|
|
|
|
/* 44 was sys_prof */
|
|
|
|
__SYSCALL(44, sys_ni_syscall)
|
|
|
|
#define __NR_brk 45
|
|
|
|
__SYSCALL(__NR_brk, sys_brk)
|
|
|
|
#define __NR_setgid 46
|
|
|
|
__SYSCALL(__NR_setgid, sys_setgid16)
|
|
|
|
#define __NR_getgid 47
|
|
|
|
__SYSCALL(__NR_getgid, sys_getgid16)
|
|
|
|
/* 48 was sys_signal */
|
|
|
|
__SYSCALL(48, sys_ni_syscall)
|
|
|
|
#define __NR_geteuid 49
|
|
|
|
__SYSCALL(__NR_geteuid, sys_geteuid16)
|
|
|
|
#define __NR_getegid 50
|
|
|
|
__SYSCALL(__NR_getegid, sys_getegid16)
|
|
|
|
#define __NR_acct 51
|
|
|
|
__SYSCALL(__NR_acct, sys_acct)
|
|
|
|
#define __NR_umount2 52
|
|
|
|
__SYSCALL(__NR_umount2, sys_umount)
|
|
|
|
/* 53 was sys_lock */
|
|
|
|
__SYSCALL(53, sys_ni_syscall)
|
|
|
|
#define __NR_ioctl 54
|
|
|
|
__SYSCALL(__NR_ioctl, compat_sys_ioctl)
|
|
|
|
#define __NR_fcntl 55
|
|
|
|
__SYSCALL(__NR_fcntl, compat_sys_fcntl)
|
|
|
|
/* 56 was sys_mpx */
|
|
|
|
__SYSCALL(56, sys_ni_syscall)
|
|
|
|
#define __NR_setpgid 57
|
|
|
|
__SYSCALL(__NR_setpgid, sys_setpgid)
|
|
|
|
/* 58 was sys_ulimit */
|
|
|
|
__SYSCALL(58, sys_ni_syscall)
|
|
|
|
/* 59 was sys_olduname */
|
|
|
|
__SYSCALL(59, sys_ni_syscall)
|
|
|
|
#define __NR_umask 60
|
|
|
|
__SYSCALL(__NR_umask, sys_umask)
|
|
|
|
#define __NR_chroot 61
|
|
|
|
__SYSCALL(__NR_chroot, sys_chroot)
|
|
|
|
#define __NR_ustat 62
|
|
|
|
__SYSCALL(__NR_ustat, compat_sys_ustat)
|
|
|
|
#define __NR_dup2 63
|
|
|
|
__SYSCALL(__NR_dup2, sys_dup2)
|
|
|
|
#define __NR_getppid 64
|
|
|
|
__SYSCALL(__NR_getppid, sys_getppid)
|
|
|
|
#define __NR_getpgrp 65
|
|
|
|
__SYSCALL(__NR_getpgrp, sys_getpgrp)
|
|
|
|
#define __NR_setsid 66
|
|
|
|
__SYSCALL(__NR_setsid, sys_setsid)
|
|
|
|
#define __NR_sigaction 67
|
|
|
|
__SYSCALL(__NR_sigaction, compat_sys_sigaction)
|
|
|
|
/* 68 was sys_sgetmask */
|
|
|
|
__SYSCALL(68, sys_ni_syscall)
|
|
|
|
/* 69 was sys_ssetmask */
|
|
|
|
__SYSCALL(69, sys_ni_syscall)
|
|
|
|
#define __NR_setreuid 70
|
|
|
|
__SYSCALL(__NR_setreuid, sys_setreuid16)
|
|
|
|
#define __NR_setregid 71
|
|
|
|
__SYSCALL(__NR_setregid, sys_setregid16)
|
|
|
|
#define __NR_sigsuspend 72
|
|
|
|
__SYSCALL(__NR_sigsuspend, sys_sigsuspend)
|
|
|
|
#define __NR_sigpending 73
|
|
|
|
__SYSCALL(__NR_sigpending, compat_sys_sigpending)
|
|
|
|
#define __NR_sethostname 74
|
|
|
|
__SYSCALL(__NR_sethostname, sys_sethostname)
|
|
|
|
#define __NR_setrlimit 75
|
|
|
|
__SYSCALL(__NR_setrlimit, compat_sys_setrlimit)
|
|
|
|
/* 76 was compat_sys_getrlimit */
|
|
|
|
__SYSCALL(76, sys_ni_syscall)
|
|
|
|
#define __NR_getrusage 77
|
|
|
|
__SYSCALL(__NR_getrusage, compat_sys_getrusage)
|
|
|
|
#define __NR_gettimeofday 78
|
|
|
|
__SYSCALL(__NR_gettimeofday, compat_sys_gettimeofday)
|
|
|
|
#define __NR_settimeofday 79
|
|
|
|
__SYSCALL(__NR_settimeofday, compat_sys_settimeofday)
|
|
|
|
#define __NR_getgroups 80
|
|
|
|
__SYSCALL(__NR_getgroups, sys_getgroups16)
|
|
|
|
#define __NR_setgroups 81
|
|
|
|
__SYSCALL(__NR_setgroups, sys_setgroups16)
|
|
|
|
/* 82 was compat_sys_select */
|
|
|
|
__SYSCALL(82, sys_ni_syscall)
|
|
|
|
#define __NR_symlink 83
|
|
|
|
__SYSCALL(__NR_symlink, sys_symlink)
|
|
|
|
/* 84 was sys_lstat */
|
|
|
|
__SYSCALL(84, sys_ni_syscall)
|
|
|
|
#define __NR_readlink 85
|
|
|
|
__SYSCALL(__NR_readlink, sys_readlink)
|
|
|
|
#define __NR_uselib 86
|
|
|
|
__SYSCALL(__NR_uselib, sys_uselib)
|
|
|
|
#define __NR_swapon 87
|
|
|
|
__SYSCALL(__NR_swapon, sys_swapon)
|
|
|
|
#define __NR_reboot 88
|
|
|
|
__SYSCALL(__NR_reboot, sys_reboot)
|
|
|
|
/* 89 was sys_readdir */
|
|
|
|
__SYSCALL(89, sys_ni_syscall)
|
|
|
|
/* 90 was sys_mmap */
|
|
|
|
__SYSCALL(90, sys_ni_syscall)
|
|
|
|
#define __NR_munmap 91
|
|
|
|
__SYSCALL(__NR_munmap, sys_munmap)
|
|
|
|
#define __NR_truncate 92
|
|
|
|
__SYSCALL(__NR_truncate, compat_sys_truncate)
|
|
|
|
#define __NR_ftruncate 93
|
|
|
|
__SYSCALL(__NR_ftruncate, compat_sys_ftruncate)
|
|
|
|
#define __NR_fchmod 94
|
|
|
|
__SYSCALL(__NR_fchmod, sys_fchmod)
|
|
|
|
#define __NR_fchown 95
|
|
|
|
__SYSCALL(__NR_fchown, sys_fchown16)
|
|
|
|
#define __NR_getpriority 96
|
|
|
|
__SYSCALL(__NR_getpriority, sys_getpriority)
|
|
|
|
#define __NR_setpriority 97
|
|
|
|
__SYSCALL(__NR_setpriority, sys_setpriority)
|
|
|
|
/* 98 was sys_profil */
|
|
|
|
__SYSCALL(98, sys_ni_syscall)
|
|
|
|
#define __NR_statfs 99
|
|
|
|
__SYSCALL(__NR_statfs, compat_sys_statfs)
|
|
|
|
#define __NR_fstatfs 100
|
|
|
|
__SYSCALL(__NR_fstatfs, compat_sys_fstatfs)
|
|
|
|
/* 101 was sys_ioperm */
|
|
|
|
__SYSCALL(101, sys_ni_syscall)
|
|
|
|
/* 102 was sys_socketcall */
|
|
|
|
__SYSCALL(102, sys_ni_syscall)
|
|
|
|
#define __NR_syslog 103
|
|
|
|
__SYSCALL(__NR_syslog, sys_syslog)
|
|
|
|
#define __NR_setitimer 104
|
|
|
|
__SYSCALL(__NR_setitimer, compat_sys_setitimer)
|
|
|
|
#define __NR_getitimer 105
|
|
|
|
__SYSCALL(__NR_getitimer, compat_sys_getitimer)
|
|
|
|
#define __NR_stat 106
|
|
|
|
__SYSCALL(__NR_stat, compat_sys_newstat)
|
|
|
|
#define __NR_lstat 107
|
|
|
|
__SYSCALL(__NR_lstat, compat_sys_newlstat)
|
|
|
|
#define __NR_fstat 108
|
|
|
|
__SYSCALL(__NR_fstat, compat_sys_newfstat)
|
|
|
|
/* 109 was sys_uname */
|
|
|
|
__SYSCALL(109, sys_ni_syscall)
|
|
|
|
/* 110 was sys_iopl */
|
|
|
|
__SYSCALL(110, sys_ni_syscall)
|
|
|
|
#define __NR_vhangup 111
|
|
|
|
__SYSCALL(__NR_vhangup, sys_vhangup)
|
|
|
|
/* 112 was sys_idle */
|
|
|
|
__SYSCALL(112, sys_ni_syscall)
|
|
|
|
/* 113 was sys_syscall */
|
|
|
|
__SYSCALL(113, sys_ni_syscall)
|
|
|
|
#define __NR_wait4 114
|
|
|
|
__SYSCALL(__NR_wait4, compat_sys_wait4)
|
|
|
|
#define __NR_swapoff 115
|
|
|
|
__SYSCALL(__NR_swapoff, sys_swapoff)
|
|
|
|
#define __NR_sysinfo 116
|
|
|
|
__SYSCALL(__NR_sysinfo, compat_sys_sysinfo)
|
|
|
|
/* 117 was sys_ipc */
|
|
|
|
__SYSCALL(117, sys_ni_syscall)
|
|
|
|
#define __NR_fsync 118
|
|
|
|
__SYSCALL(__NR_fsync, sys_fsync)
|
|
|
|
#define __NR_sigreturn 119
|
2018-07-11 13:56:41 +00:00
|
|
|
__SYSCALL(__NR_sigreturn, compat_sys_sigreturn)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_clone 120
|
|
|
|
__SYSCALL(__NR_clone, sys_clone)
|
|
|
|
#define __NR_setdomainname 121
|
|
|
|
__SYSCALL(__NR_setdomainname, sys_setdomainname)
|
|
|
|
#define __NR_uname 122
|
|
|
|
__SYSCALL(__NR_uname, sys_newuname)
|
|
|
|
/* 123 was sys_modify_ldt */
|
|
|
|
__SYSCALL(123, sys_ni_syscall)
|
|
|
|
#define __NR_adjtimex 124
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_adjtimex, sys_adjtimex_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_mprotect 125
|
|
|
|
__SYSCALL(__NR_mprotect, sys_mprotect)
|
|
|
|
#define __NR_sigprocmask 126
|
|
|
|
__SYSCALL(__NR_sigprocmask, compat_sys_sigprocmask)
|
|
|
|
/* 127 was sys_create_module */
|
|
|
|
__SYSCALL(127, sys_ni_syscall)
|
|
|
|
#define __NR_init_module 128
|
|
|
|
__SYSCALL(__NR_init_module, sys_init_module)
|
|
|
|
#define __NR_delete_module 129
|
|
|
|
__SYSCALL(__NR_delete_module, sys_delete_module)
|
|
|
|
/* 130 was sys_get_kernel_syms */
|
|
|
|
__SYSCALL(130, sys_ni_syscall)
|
|
|
|
#define __NR_quotactl 131
|
|
|
|
__SYSCALL(__NR_quotactl, sys_quotactl)
|
|
|
|
#define __NR_getpgid 132
|
|
|
|
__SYSCALL(__NR_getpgid, sys_getpgid)
|
|
|
|
#define __NR_fchdir 133
|
|
|
|
__SYSCALL(__NR_fchdir, sys_fchdir)
|
|
|
|
#define __NR_bdflush 134
|
|
|
|
__SYSCALL(__NR_bdflush, sys_bdflush)
|
|
|
|
#define __NR_sysfs 135
|
|
|
|
__SYSCALL(__NR_sysfs, sys_sysfs)
|
|
|
|
#define __NR_personality 136
|
|
|
|
__SYSCALL(__NR_personality, sys_personality)
|
|
|
|
/* 137 was sys_afs_syscall */
|
|
|
|
__SYSCALL(137, sys_ni_syscall)
|
|
|
|
#define __NR_setfsuid 138
|
|
|
|
__SYSCALL(__NR_setfsuid, sys_setfsuid16)
|
|
|
|
#define __NR_setfsgid 139
|
|
|
|
__SYSCALL(__NR_setfsgid, sys_setfsgid16)
|
|
|
|
#define __NR__llseek 140
|
|
|
|
__SYSCALL(__NR__llseek, sys_llseek)
|
|
|
|
#define __NR_getdents 141
|
|
|
|
__SYSCALL(__NR_getdents, compat_sys_getdents)
|
|
|
|
#define __NR__newselect 142
|
|
|
|
__SYSCALL(__NR__newselect, compat_sys_select)
|
|
|
|
#define __NR_flock 143
|
|
|
|
__SYSCALL(__NR_flock, sys_flock)
|
|
|
|
#define __NR_msync 144
|
|
|
|
__SYSCALL(__NR_msync, sys_msync)
|
|
|
|
#define __NR_readv 145
|
2020-09-25 04:51:43 +00:00
|
|
|
__SYSCALL(__NR_readv, sys_readv)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_writev 146
|
2020-09-25 04:51:43 +00:00
|
|
|
__SYSCALL(__NR_writev, sys_writev)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_getsid 147
|
|
|
|
__SYSCALL(__NR_getsid, sys_getsid)
|
|
|
|
#define __NR_fdatasync 148
|
|
|
|
__SYSCALL(__NR_fdatasync, sys_fdatasync)
|
2020-08-15 00:31:07 +00:00
|
|
|
/* 149 was sys_sysctl */
|
|
|
|
__SYSCALL(149, sys_ni_syscall)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_mlock 150
|
|
|
|
__SYSCALL(__NR_mlock, sys_mlock)
|
|
|
|
#define __NR_munlock 151
|
|
|
|
__SYSCALL(__NR_munlock, sys_munlock)
|
|
|
|
#define __NR_mlockall 152
|
|
|
|
__SYSCALL(__NR_mlockall, sys_mlockall)
|
|
|
|
#define __NR_munlockall 153
|
|
|
|
__SYSCALL(__NR_munlockall, sys_munlockall)
|
|
|
|
#define __NR_sched_setparam 154
|
|
|
|
__SYSCALL(__NR_sched_setparam, sys_sched_setparam)
|
|
|
|
#define __NR_sched_getparam 155
|
|
|
|
__SYSCALL(__NR_sched_getparam, sys_sched_getparam)
|
|
|
|
#define __NR_sched_setscheduler 156
|
|
|
|
__SYSCALL(__NR_sched_setscheduler, sys_sched_setscheduler)
|
|
|
|
#define __NR_sched_getscheduler 157
|
|
|
|
__SYSCALL(__NR_sched_getscheduler, sys_sched_getscheduler)
|
|
|
|
#define __NR_sched_yield 158
|
|
|
|
__SYSCALL(__NR_sched_yield, sys_sched_yield)
|
|
|
|
#define __NR_sched_get_priority_max 159
|
|
|
|
__SYSCALL(__NR_sched_get_priority_max, sys_sched_get_priority_max)
|
|
|
|
#define __NR_sched_get_priority_min 160
|
|
|
|
__SYSCALL(__NR_sched_get_priority_min, sys_sched_get_priority_min)
|
|
|
|
#define __NR_sched_rr_get_interval 161
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_sched_rr_get_interval, sys_sched_rr_get_interval_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_nanosleep 162
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_nanosleep, sys_nanosleep_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_mremap 163
|
|
|
|
__SYSCALL(__NR_mremap, sys_mremap)
|
|
|
|
#define __NR_setresuid 164
|
|
|
|
__SYSCALL(__NR_setresuid, sys_setresuid16)
|
|
|
|
#define __NR_getresuid 165
|
|
|
|
__SYSCALL(__NR_getresuid, sys_getresuid16)
|
|
|
|
/* 166 was sys_vm86 */
|
|
|
|
__SYSCALL(166, sys_ni_syscall)
|
|
|
|
/* 167 was sys_query_module */
|
|
|
|
__SYSCALL(167, sys_ni_syscall)
|
|
|
|
#define __NR_poll 168
|
|
|
|
__SYSCALL(__NR_poll, sys_poll)
|
|
|
|
#define __NR_nfsservctl 169
|
|
|
|
__SYSCALL(__NR_nfsservctl, sys_ni_syscall)
|
|
|
|
#define __NR_setresgid 170
|
|
|
|
__SYSCALL(__NR_setresgid, sys_setresgid16)
|
|
|
|
#define __NR_getresgid 171
|
|
|
|
__SYSCALL(__NR_getresgid, sys_getresgid16)
|
|
|
|
#define __NR_prctl 172
|
|
|
|
__SYSCALL(__NR_prctl, sys_prctl)
|
|
|
|
#define __NR_rt_sigreturn 173
|
2018-07-11 13:56:41 +00:00
|
|
|
__SYSCALL(__NR_rt_sigreturn, compat_sys_rt_sigreturn)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_rt_sigaction 174
|
|
|
|
__SYSCALL(__NR_rt_sigaction, compat_sys_rt_sigaction)
|
|
|
|
#define __NR_rt_sigprocmask 175
|
|
|
|
__SYSCALL(__NR_rt_sigprocmask, compat_sys_rt_sigprocmask)
|
|
|
|
#define __NR_rt_sigpending 176
|
|
|
|
__SYSCALL(__NR_rt_sigpending, compat_sys_rt_sigpending)
|
|
|
|
#define __NR_rt_sigtimedwait 177
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_rt_sigtimedwait, compat_sys_rt_sigtimedwait_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_rt_sigqueueinfo 178
|
|
|
|
__SYSCALL(__NR_rt_sigqueueinfo, compat_sys_rt_sigqueueinfo)
|
|
|
|
#define __NR_rt_sigsuspend 179
|
|
|
|
__SYSCALL(__NR_rt_sigsuspend, compat_sys_rt_sigsuspend)
|
|
|
|
#define __NR_pread64 180
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_pread64, compat_sys_aarch32_pread64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_pwrite64 181
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_pwrite64, compat_sys_aarch32_pwrite64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_chown 182
|
|
|
|
__SYSCALL(__NR_chown, sys_chown16)
|
|
|
|
#define __NR_getcwd 183
|
|
|
|
__SYSCALL(__NR_getcwd, sys_getcwd)
|
|
|
|
#define __NR_capget 184
|
|
|
|
__SYSCALL(__NR_capget, sys_capget)
|
|
|
|
#define __NR_capset 185
|
|
|
|
__SYSCALL(__NR_capset, sys_capset)
|
|
|
|
#define __NR_sigaltstack 186
|
|
|
|
__SYSCALL(__NR_sigaltstack, compat_sys_sigaltstack)
|
|
|
|
#define __NR_sendfile 187
|
|
|
|
__SYSCALL(__NR_sendfile, compat_sys_sendfile)
|
|
|
|
/* 188 reserved */
|
|
|
|
__SYSCALL(188, sys_ni_syscall)
|
|
|
|
/* 189 reserved */
|
|
|
|
__SYSCALL(189, sys_ni_syscall)
|
|
|
|
#define __NR_vfork 190
|
|
|
|
__SYSCALL(__NR_vfork, sys_vfork)
|
|
|
|
#define __NR_ugetrlimit 191 /* SuS compliant getrlimit */
|
|
|
|
__SYSCALL(__NR_ugetrlimit, compat_sys_getrlimit) /* SuS compliant getrlimit */
|
|
|
|
#define __NR_mmap2 192
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_mmap2, compat_sys_aarch32_mmap2)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_truncate64 193
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_truncate64, compat_sys_aarch32_truncate64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_ftruncate64 194
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_ftruncate64, compat_sys_aarch32_ftruncate64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_stat64 195
|
|
|
|
__SYSCALL(__NR_stat64, sys_stat64)
|
|
|
|
#define __NR_lstat64 196
|
|
|
|
__SYSCALL(__NR_lstat64, sys_lstat64)
|
|
|
|
#define __NR_fstat64 197
|
|
|
|
__SYSCALL(__NR_fstat64, sys_fstat64)
|
|
|
|
#define __NR_lchown32 198
|
|
|
|
__SYSCALL(__NR_lchown32, sys_lchown)
|
|
|
|
#define __NR_getuid32 199
|
|
|
|
__SYSCALL(__NR_getuid32, sys_getuid)
|
|
|
|
#define __NR_getgid32 200
|
|
|
|
__SYSCALL(__NR_getgid32, sys_getgid)
|
|
|
|
#define __NR_geteuid32 201
|
|
|
|
__SYSCALL(__NR_geteuid32, sys_geteuid)
|
|
|
|
#define __NR_getegid32 202
|
|
|
|
__SYSCALL(__NR_getegid32, sys_getegid)
|
|
|
|
#define __NR_setreuid32 203
|
|
|
|
__SYSCALL(__NR_setreuid32, sys_setreuid)
|
|
|
|
#define __NR_setregid32 204
|
|
|
|
__SYSCALL(__NR_setregid32, sys_setregid)
|
|
|
|
#define __NR_getgroups32 205
|
|
|
|
__SYSCALL(__NR_getgroups32, sys_getgroups)
|
|
|
|
#define __NR_setgroups32 206
|
|
|
|
__SYSCALL(__NR_setgroups32, sys_setgroups)
|
|
|
|
#define __NR_fchown32 207
|
|
|
|
__SYSCALL(__NR_fchown32, sys_fchown)
|
|
|
|
#define __NR_setresuid32 208
|
|
|
|
__SYSCALL(__NR_setresuid32, sys_setresuid)
|
|
|
|
#define __NR_getresuid32 209
|
|
|
|
__SYSCALL(__NR_getresuid32, sys_getresuid)
|
|
|
|
#define __NR_setresgid32 210
|
|
|
|
__SYSCALL(__NR_setresgid32, sys_setresgid)
|
|
|
|
#define __NR_getresgid32 211
|
|
|
|
__SYSCALL(__NR_getresgid32, sys_getresgid)
|
|
|
|
#define __NR_chown32 212
|
|
|
|
__SYSCALL(__NR_chown32, sys_chown)
|
|
|
|
#define __NR_setuid32 213
|
|
|
|
__SYSCALL(__NR_setuid32, sys_setuid)
|
|
|
|
#define __NR_setgid32 214
|
|
|
|
__SYSCALL(__NR_setgid32, sys_setgid)
|
|
|
|
#define __NR_setfsuid32 215
|
|
|
|
__SYSCALL(__NR_setfsuid32, sys_setfsuid)
|
|
|
|
#define __NR_setfsgid32 216
|
|
|
|
__SYSCALL(__NR_setfsgid32, sys_setfsgid)
|
|
|
|
#define __NR_getdents64 217
|
2017-04-08 18:34:51 +00:00
|
|
|
__SYSCALL(__NR_getdents64, sys_getdents64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_pivot_root 218
|
|
|
|
__SYSCALL(__NR_pivot_root, sys_pivot_root)
|
|
|
|
#define __NR_mincore 219
|
|
|
|
__SYSCALL(__NR_mincore, sys_mincore)
|
|
|
|
#define __NR_madvise 220
|
|
|
|
__SYSCALL(__NR_madvise, sys_madvise)
|
|
|
|
#define __NR_fcntl64 221
|
|
|
|
__SYSCALL(__NR_fcntl64, compat_sys_fcntl64)
|
|
|
|
/* 222 for tux */
|
|
|
|
__SYSCALL(222, sys_ni_syscall)
|
|
|
|
/* 223 is unused */
|
|
|
|
__SYSCALL(223, sys_ni_syscall)
|
|
|
|
#define __NR_gettid 224
|
|
|
|
__SYSCALL(__NR_gettid, sys_gettid)
|
|
|
|
#define __NR_readahead 225
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_readahead, compat_sys_aarch32_readahead)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_setxattr 226
|
|
|
|
__SYSCALL(__NR_setxattr, sys_setxattr)
|
|
|
|
#define __NR_lsetxattr 227
|
|
|
|
__SYSCALL(__NR_lsetxattr, sys_lsetxattr)
|
|
|
|
#define __NR_fsetxattr 228
|
|
|
|
__SYSCALL(__NR_fsetxattr, sys_fsetxattr)
|
|
|
|
#define __NR_getxattr 229
|
|
|
|
__SYSCALL(__NR_getxattr, sys_getxattr)
|
|
|
|
#define __NR_lgetxattr 230
|
|
|
|
__SYSCALL(__NR_lgetxattr, sys_lgetxattr)
|
|
|
|
#define __NR_fgetxattr 231
|
|
|
|
__SYSCALL(__NR_fgetxattr, sys_fgetxattr)
|
|
|
|
#define __NR_listxattr 232
|
|
|
|
__SYSCALL(__NR_listxattr, sys_listxattr)
|
|
|
|
#define __NR_llistxattr 233
|
|
|
|
__SYSCALL(__NR_llistxattr, sys_llistxattr)
|
|
|
|
#define __NR_flistxattr 234
|
|
|
|
__SYSCALL(__NR_flistxattr, sys_flistxattr)
|
|
|
|
#define __NR_removexattr 235
|
|
|
|
__SYSCALL(__NR_removexattr, sys_removexattr)
|
|
|
|
#define __NR_lremovexattr 236
|
|
|
|
__SYSCALL(__NR_lremovexattr, sys_lremovexattr)
|
|
|
|
#define __NR_fremovexattr 237
|
|
|
|
__SYSCALL(__NR_fremovexattr, sys_fremovexattr)
|
|
|
|
#define __NR_tkill 238
|
|
|
|
__SYSCALL(__NR_tkill, sys_tkill)
|
|
|
|
#define __NR_sendfile64 239
|
|
|
|
__SYSCALL(__NR_sendfile64, sys_sendfile64)
|
|
|
|
#define __NR_futex 240
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_futex, sys_futex_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_sched_setaffinity 241
|
|
|
|
__SYSCALL(__NR_sched_setaffinity, compat_sys_sched_setaffinity)
|
|
|
|
#define __NR_sched_getaffinity 242
|
|
|
|
__SYSCALL(__NR_sched_getaffinity, compat_sys_sched_getaffinity)
|
|
|
|
#define __NR_io_setup 243
|
|
|
|
__SYSCALL(__NR_io_setup, compat_sys_io_setup)
|
|
|
|
#define __NR_io_destroy 244
|
|
|
|
__SYSCALL(__NR_io_destroy, sys_io_destroy)
|
|
|
|
#define __NR_io_getevents 245
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_io_getevents, sys_io_getevents_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_io_submit 246
|
|
|
|
__SYSCALL(__NR_io_submit, compat_sys_io_submit)
|
|
|
|
#define __NR_io_cancel 247
|
|
|
|
__SYSCALL(__NR_io_cancel, sys_io_cancel)
|
|
|
|
#define __NR_exit_group 248
|
|
|
|
__SYSCALL(__NR_exit_group, sys_exit_group)
|
|
|
|
#define __NR_lookup_dcookie 249
|
|
|
|
__SYSCALL(__NR_lookup_dcookie, compat_sys_lookup_dcookie)
|
|
|
|
#define __NR_epoll_create 250
|
|
|
|
__SYSCALL(__NR_epoll_create, sys_epoll_create)
|
|
|
|
#define __NR_epoll_ctl 251
|
|
|
|
__SYSCALL(__NR_epoll_ctl, sys_epoll_ctl)
|
|
|
|
#define __NR_epoll_wait 252
|
|
|
|
__SYSCALL(__NR_epoll_wait, sys_epoll_wait)
|
|
|
|
#define __NR_remap_file_pages 253
|
|
|
|
__SYSCALL(__NR_remap_file_pages, sys_remap_file_pages)
|
|
|
|
/* 254 for set_thread_area */
|
|
|
|
__SYSCALL(254, sys_ni_syscall)
|
|
|
|
/* 255 for get_thread_area */
|
|
|
|
__SYSCALL(255, sys_ni_syscall)
|
|
|
|
#define __NR_set_tid_address 256
|
|
|
|
__SYSCALL(__NR_set_tid_address, sys_set_tid_address)
|
|
|
|
#define __NR_timer_create 257
|
|
|
|
__SYSCALL(__NR_timer_create, compat_sys_timer_create)
|
|
|
|
#define __NR_timer_settime 258
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_timer_settime, sys_timer_settime32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_timer_gettime 259
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_timer_gettime, sys_timer_gettime32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_timer_getoverrun 260
|
|
|
|
__SYSCALL(__NR_timer_getoverrun, sys_timer_getoverrun)
|
|
|
|
#define __NR_timer_delete 261
|
|
|
|
__SYSCALL(__NR_timer_delete, sys_timer_delete)
|
|
|
|
#define __NR_clock_settime 262
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_clock_settime, sys_clock_settime32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_clock_gettime 263
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_clock_gettime, sys_clock_gettime32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_clock_getres 264
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_clock_getres, sys_clock_getres_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_clock_nanosleep 265
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_clock_nanosleep, sys_clock_nanosleep_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_statfs64 266
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_statfs64, compat_sys_aarch32_statfs64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_fstatfs64 267
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_fstatfs64, compat_sys_aarch32_fstatfs64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_tgkill 268
|
|
|
|
__SYSCALL(__NR_tgkill, sys_tgkill)
|
|
|
|
#define __NR_utimes 269
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_utimes, sys_utimes_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_arm_fadvise64_64 270
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_arm_fadvise64_64, compat_sys_aarch32_fadvise64_64)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_pciconfig_iobase 271
|
|
|
|
__SYSCALL(__NR_pciconfig_iobase, sys_pciconfig_iobase)
|
|
|
|
#define __NR_pciconfig_read 272
|
|
|
|
__SYSCALL(__NR_pciconfig_read, sys_pciconfig_read)
|
|
|
|
#define __NR_pciconfig_write 273
|
|
|
|
__SYSCALL(__NR_pciconfig_write, sys_pciconfig_write)
|
|
|
|
#define __NR_mq_open 274
|
|
|
|
__SYSCALL(__NR_mq_open, compat_sys_mq_open)
|
|
|
|
#define __NR_mq_unlink 275
|
|
|
|
__SYSCALL(__NR_mq_unlink, sys_mq_unlink)
|
|
|
|
#define __NR_mq_timedsend 276
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_mq_timedsend, sys_mq_timedsend_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_mq_timedreceive 277
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_mq_timedreceive, sys_mq_timedreceive_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_mq_notify 278
|
|
|
|
__SYSCALL(__NR_mq_notify, compat_sys_mq_notify)
|
|
|
|
#define __NR_mq_getsetattr 279
|
|
|
|
__SYSCALL(__NR_mq_getsetattr, compat_sys_mq_getsetattr)
|
|
|
|
#define __NR_waitid 280
|
|
|
|
__SYSCALL(__NR_waitid, compat_sys_waitid)
|
|
|
|
#define __NR_socket 281
|
|
|
|
__SYSCALL(__NR_socket, sys_socket)
|
|
|
|
#define __NR_bind 282
|
|
|
|
__SYSCALL(__NR_bind, sys_bind)
|
|
|
|
#define __NR_connect 283
|
|
|
|
__SYSCALL(__NR_connect, sys_connect)
|
|
|
|
#define __NR_listen 284
|
|
|
|
__SYSCALL(__NR_listen, sys_listen)
|
|
|
|
#define __NR_accept 285
|
|
|
|
__SYSCALL(__NR_accept, sys_accept)
|
|
|
|
#define __NR_getsockname 286
|
|
|
|
__SYSCALL(__NR_getsockname, sys_getsockname)
|
|
|
|
#define __NR_getpeername 287
|
|
|
|
__SYSCALL(__NR_getpeername, sys_getpeername)
|
|
|
|
#define __NR_socketpair 288
|
|
|
|
__SYSCALL(__NR_socketpair, sys_socketpair)
|
|
|
|
#define __NR_send 289
|
|
|
|
__SYSCALL(__NR_send, sys_send)
|
|
|
|
#define __NR_sendto 290
|
|
|
|
__SYSCALL(__NR_sendto, sys_sendto)
|
|
|
|
#define __NR_recv 291
|
|
|
|
__SYSCALL(__NR_recv, compat_sys_recv)
|
|
|
|
#define __NR_recvfrom 292
|
|
|
|
__SYSCALL(__NR_recvfrom, compat_sys_recvfrom)
|
|
|
|
#define __NR_shutdown 293
|
|
|
|
__SYSCALL(__NR_shutdown, sys_shutdown)
|
|
|
|
#define __NR_setsockopt 294
|
2020-07-17 06:23:15 +00:00
|
|
|
__SYSCALL(__NR_setsockopt, sys_setsockopt)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_getsockopt 295
|
2020-07-17 06:23:15 +00:00
|
|
|
__SYSCALL(__NR_getsockopt, sys_getsockopt)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_sendmsg 296
|
|
|
|
__SYSCALL(__NR_sendmsg, compat_sys_sendmsg)
|
|
|
|
#define __NR_recvmsg 297
|
|
|
|
__SYSCALL(__NR_recvmsg, compat_sys_recvmsg)
|
|
|
|
#define __NR_semop 298
|
|
|
|
__SYSCALL(__NR_semop, sys_semop)
|
|
|
|
#define __NR_semget 299
|
|
|
|
__SYSCALL(__NR_semget, sys_semget)
|
|
|
|
#define __NR_semctl 300
|
ipc: rename old-style shmctl/semctl/msgctl syscalls
The behavior of these system calls is slightly different between
architectures, as determined by the CONFIG_ARCH_WANT_IPC_PARSE_VERSION
symbol. Most architectures that implement the split IPC syscalls don't set
that symbol and only get the modern version, but alpha, arm, microblaze,
mips-n32, mips-n64 and xtensa expect the caller to pass the IPC_64 flag.
For the architectures that so far only implement sys_ipc(), i.e. m68k,
mips-o32, powerpc, s390, sh, sparc, and x86-32, we want the new behavior
when adding the split syscalls, so we need to distinguish between the
two groups of architectures.
The method I picked for this distinction is to have a separate system call
entry point: sys_old_*ctl() now uses ipc_parse_version, while sys_*ctl()
does not. The system call tables of the five architectures are changed
accordingly.
As an additional benefit, we no longer need the configuration specific
definition for ipc_parse_version(), it always does the same thing now,
but simply won't get called on architectures with the modern interface.
A small downside is that on architectures that do set
ARCH_WANT_IPC_PARSE_VERSION, we now have an extra set of entry points
that are never called. They only add a few bytes of bloat, so it seems
better to keep them compared to adding yet another Kconfig symbol.
I considered adding new syscall numbers for the IPC_64 variants for
consistency, but decided against that for now.
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2018-12-31 21:22:40 +00:00
|
|
|
__SYSCALL(__NR_semctl, compat_sys_old_semctl)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_msgsnd 301
|
|
|
|
__SYSCALL(__NR_msgsnd, compat_sys_msgsnd)
|
|
|
|
#define __NR_msgrcv 302
|
|
|
|
__SYSCALL(__NR_msgrcv, compat_sys_msgrcv)
|
|
|
|
#define __NR_msgget 303
|
|
|
|
__SYSCALL(__NR_msgget, sys_msgget)
|
|
|
|
#define __NR_msgctl 304
|
ipc: rename old-style shmctl/semctl/msgctl syscalls
The behavior of these system calls is slightly different between
architectures, as determined by the CONFIG_ARCH_WANT_IPC_PARSE_VERSION
symbol. Most architectures that implement the split IPC syscalls don't set
that symbol and only get the modern version, but alpha, arm, microblaze,
mips-n32, mips-n64 and xtensa expect the caller to pass the IPC_64 flag.
For the architectures that so far only implement sys_ipc(), i.e. m68k,
mips-o32, powerpc, s390, sh, sparc, and x86-32, we want the new behavior
when adding the split syscalls, so we need to distinguish between the
two groups of architectures.
The method I picked for this distinction is to have a separate system call
entry point: sys_old_*ctl() now uses ipc_parse_version, while sys_*ctl()
does not. The system call tables of the five architectures are changed
accordingly.
As an additional benefit, we no longer need the configuration specific
definition for ipc_parse_version(), it always does the same thing now,
but simply won't get called on architectures with the modern interface.
A small downside is that on architectures that do set
ARCH_WANT_IPC_PARSE_VERSION, we now have an extra set of entry points
that are never called. They only add a few bytes of bloat, so it seems
better to keep them compared to adding yet another Kconfig symbol.
I considered adding new syscall numbers for the IPC_64 variants for
consistency, but decided against that for now.
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2018-12-31 21:22:40 +00:00
|
|
|
__SYSCALL(__NR_msgctl, compat_sys_old_msgctl)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_shmat 305
|
|
|
|
__SYSCALL(__NR_shmat, compat_sys_shmat)
|
|
|
|
#define __NR_shmdt 306
|
|
|
|
__SYSCALL(__NR_shmdt, sys_shmdt)
|
|
|
|
#define __NR_shmget 307
|
|
|
|
__SYSCALL(__NR_shmget, sys_shmget)
|
|
|
|
#define __NR_shmctl 308
|
ipc: rename old-style shmctl/semctl/msgctl syscalls
The behavior of these system calls is slightly different between
architectures, as determined by the CONFIG_ARCH_WANT_IPC_PARSE_VERSION
symbol. Most architectures that implement the split IPC syscalls don't set
that symbol and only get the modern version, but alpha, arm, microblaze,
mips-n32, mips-n64 and xtensa expect the caller to pass the IPC_64 flag.
For the architectures that so far only implement sys_ipc(), i.e. m68k,
mips-o32, powerpc, s390, sh, sparc, and x86-32, we want the new behavior
when adding the split syscalls, so we need to distinguish between the
two groups of architectures.
The method I picked for this distinction is to have a separate system call
entry point: sys_old_*ctl() now uses ipc_parse_version, while sys_*ctl()
does not. The system call tables of the five architectures are changed
accordingly.
As an additional benefit, we no longer need the configuration specific
definition for ipc_parse_version(), it always does the same thing now,
but simply won't get called on architectures with the modern interface.
A small downside is that on architectures that do set
ARCH_WANT_IPC_PARSE_VERSION, we now have an extra set of entry points
that are never called. They only add a few bytes of bloat, so it seems
better to keep them compared to adding yet another Kconfig symbol.
I considered adding new syscall numbers for the IPC_64 variants for
consistency, but decided against that for now.
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2018-12-31 21:22:40 +00:00
|
|
|
__SYSCALL(__NR_shmctl, compat_sys_old_shmctl)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_add_key 309
|
|
|
|
__SYSCALL(__NR_add_key, sys_add_key)
|
|
|
|
#define __NR_request_key 310
|
|
|
|
__SYSCALL(__NR_request_key, sys_request_key)
|
|
|
|
#define __NR_keyctl 311
|
|
|
|
__SYSCALL(__NR_keyctl, compat_sys_keyctl)
|
|
|
|
#define __NR_semtimedop 312
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_semtimedop, sys_semtimedop_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_vserver 313
|
|
|
|
__SYSCALL(__NR_vserver, sys_ni_syscall)
|
|
|
|
#define __NR_ioprio_set 314
|
|
|
|
__SYSCALL(__NR_ioprio_set, sys_ioprio_set)
|
|
|
|
#define __NR_ioprio_get 315
|
|
|
|
__SYSCALL(__NR_ioprio_get, sys_ioprio_get)
|
|
|
|
#define __NR_inotify_init 316
|
|
|
|
__SYSCALL(__NR_inotify_init, sys_inotify_init)
|
|
|
|
#define __NR_inotify_add_watch 317
|
|
|
|
__SYSCALL(__NR_inotify_add_watch, sys_inotify_add_watch)
|
|
|
|
#define __NR_inotify_rm_watch 318
|
|
|
|
__SYSCALL(__NR_inotify_rm_watch, sys_inotify_rm_watch)
|
|
|
|
#define __NR_mbind 319
|
|
|
|
__SYSCALL(__NR_mbind, compat_sys_mbind)
|
|
|
|
#define __NR_get_mempolicy 320
|
|
|
|
__SYSCALL(__NR_get_mempolicy, compat_sys_get_mempolicy)
|
|
|
|
#define __NR_set_mempolicy 321
|
|
|
|
__SYSCALL(__NR_set_mempolicy, compat_sys_set_mempolicy)
|
|
|
|
#define __NR_openat 322
|
|
|
|
__SYSCALL(__NR_openat, compat_sys_openat)
|
|
|
|
#define __NR_mkdirat 323
|
|
|
|
__SYSCALL(__NR_mkdirat, sys_mkdirat)
|
|
|
|
#define __NR_mknodat 324
|
|
|
|
__SYSCALL(__NR_mknodat, sys_mknodat)
|
|
|
|
#define __NR_fchownat 325
|
|
|
|
__SYSCALL(__NR_fchownat, sys_fchownat)
|
|
|
|
#define __NR_futimesat 326
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_futimesat, sys_futimesat_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_fstatat64 327
|
|
|
|
__SYSCALL(__NR_fstatat64, sys_fstatat64)
|
|
|
|
#define __NR_unlinkat 328
|
|
|
|
__SYSCALL(__NR_unlinkat, sys_unlinkat)
|
|
|
|
#define __NR_renameat 329
|
|
|
|
__SYSCALL(__NR_renameat, sys_renameat)
|
|
|
|
#define __NR_linkat 330
|
|
|
|
__SYSCALL(__NR_linkat, sys_linkat)
|
|
|
|
#define __NR_symlinkat 331
|
|
|
|
__SYSCALL(__NR_symlinkat, sys_symlinkat)
|
|
|
|
#define __NR_readlinkat 332
|
|
|
|
__SYSCALL(__NR_readlinkat, sys_readlinkat)
|
|
|
|
#define __NR_fchmodat 333
|
|
|
|
__SYSCALL(__NR_fchmodat, sys_fchmodat)
|
|
|
|
#define __NR_faccessat 334
|
|
|
|
__SYSCALL(__NR_faccessat, sys_faccessat)
|
|
|
|
#define __NR_pselect6 335
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_pselect6, compat_sys_pselect6_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_ppoll 336
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_ppoll, compat_sys_ppoll_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_unshare 337
|
|
|
|
__SYSCALL(__NR_unshare, sys_unshare)
|
|
|
|
#define __NR_set_robust_list 338
|
|
|
|
__SYSCALL(__NR_set_robust_list, compat_sys_set_robust_list)
|
|
|
|
#define __NR_get_robust_list 339
|
|
|
|
__SYSCALL(__NR_get_robust_list, compat_sys_get_robust_list)
|
|
|
|
#define __NR_splice 340
|
|
|
|
__SYSCALL(__NR_splice, sys_splice)
|
|
|
|
#define __NR_sync_file_range2 341
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_sync_file_range2, compat_sys_aarch32_sync_file_range2)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_tee 342
|
|
|
|
__SYSCALL(__NR_tee, sys_tee)
|
|
|
|
#define __NR_vmsplice 343
|
2020-09-25 04:51:44 +00:00
|
|
|
__SYSCALL(__NR_vmsplice, sys_vmsplice)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_move_pages 344
|
|
|
|
__SYSCALL(__NR_move_pages, compat_sys_move_pages)
|
|
|
|
#define __NR_getcpu 345
|
|
|
|
__SYSCALL(__NR_getcpu, sys_getcpu)
|
|
|
|
#define __NR_epoll_pwait 346
|
|
|
|
__SYSCALL(__NR_epoll_pwait, compat_sys_epoll_pwait)
|
|
|
|
#define __NR_kexec_load 347
|
|
|
|
__SYSCALL(__NR_kexec_load, compat_sys_kexec_load)
|
|
|
|
#define __NR_utimensat 348
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_utimensat, sys_utimensat_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_signalfd 349
|
|
|
|
__SYSCALL(__NR_signalfd, compat_sys_signalfd)
|
|
|
|
#define __NR_timerfd_create 350
|
|
|
|
__SYSCALL(__NR_timerfd_create, sys_timerfd_create)
|
|
|
|
#define __NR_eventfd 351
|
|
|
|
__SYSCALL(__NR_eventfd, sys_eventfd)
|
|
|
|
#define __NR_fallocate 352
|
2018-07-11 13:56:55 +00:00
|
|
|
__SYSCALL(__NR_fallocate, compat_sys_aarch32_fallocate)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_timerfd_settime 353
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_timerfd_settime, sys_timerfd_settime32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_timerfd_gettime 354
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_timerfd_gettime, sys_timerfd_gettime32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_signalfd4 355
|
|
|
|
__SYSCALL(__NR_signalfd4, compat_sys_signalfd4)
|
|
|
|
#define __NR_eventfd2 356
|
|
|
|
__SYSCALL(__NR_eventfd2, sys_eventfd2)
|
|
|
|
#define __NR_epoll_create1 357
|
|
|
|
__SYSCALL(__NR_epoll_create1, sys_epoll_create1)
|
|
|
|
#define __NR_dup3 358
|
|
|
|
__SYSCALL(__NR_dup3, sys_dup3)
|
|
|
|
#define __NR_pipe2 359
|
|
|
|
__SYSCALL(__NR_pipe2, sys_pipe2)
|
|
|
|
#define __NR_inotify_init1 360
|
|
|
|
__SYSCALL(__NR_inotify_init1, sys_inotify_init1)
|
|
|
|
#define __NR_preadv 361
|
|
|
|
__SYSCALL(__NR_preadv, compat_sys_preadv)
|
|
|
|
#define __NR_pwritev 362
|
|
|
|
__SYSCALL(__NR_pwritev, compat_sys_pwritev)
|
|
|
|
#define __NR_rt_tgsigqueueinfo 363
|
|
|
|
__SYSCALL(__NR_rt_tgsigqueueinfo, compat_sys_rt_tgsigqueueinfo)
|
|
|
|
#define __NR_perf_event_open 364
|
|
|
|
__SYSCALL(__NR_perf_event_open, sys_perf_event_open)
|
|
|
|
#define __NR_recvmmsg 365
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_recvmmsg, compat_sys_recvmmsg_time32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_accept4 366
|
|
|
|
__SYSCALL(__NR_accept4, sys_accept4)
|
|
|
|
#define __NR_fanotify_init 367
|
|
|
|
__SYSCALL(__NR_fanotify_init, sys_fanotify_init)
|
|
|
|
#define __NR_fanotify_mark 368
|
|
|
|
__SYSCALL(__NR_fanotify_mark, compat_sys_fanotify_mark)
|
|
|
|
#define __NR_prlimit64 369
|
|
|
|
__SYSCALL(__NR_prlimit64, sys_prlimit64)
|
|
|
|
#define __NR_name_to_handle_at 370
|
|
|
|
__SYSCALL(__NR_name_to_handle_at, sys_name_to_handle_at)
|
|
|
|
#define __NR_open_by_handle_at 371
|
|
|
|
__SYSCALL(__NR_open_by_handle_at, compat_sys_open_by_handle_at)
|
|
|
|
#define __NR_clock_adjtime 372
|
2019-01-06 23:33:08 +00:00
|
|
|
__SYSCALL(__NR_clock_adjtime, sys_clock_adjtime32)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_syncfs 373
|
|
|
|
__SYSCALL(__NR_syncfs, sys_syncfs)
|
|
|
|
#define __NR_sendmmsg 374
|
|
|
|
__SYSCALL(__NR_sendmmsg, compat_sys_sendmmsg)
|
|
|
|
#define __NR_setns 375
|
|
|
|
__SYSCALL(__NR_setns, sys_setns)
|
|
|
|
#define __NR_process_vm_readv 376
|
2020-09-25 04:51:45 +00:00
|
|
|
__SYSCALL(__NR_process_vm_readv, sys_process_vm_readv)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_process_vm_writev 377
|
2020-09-25 04:51:45 +00:00
|
|
|
__SYSCALL(__NR_process_vm_writev, sys_process_vm_writev)
|
2014-01-30 17:56:56 +00:00
|
|
|
#define __NR_kcmp 378
|
|
|
|
__SYSCALL(__NR_kcmp, sys_kcmp)
|
|
|
|
#define __NR_finit_module 379
|
|
|
|
__SYSCALL(__NR_finit_module, sys_finit_module)
|
|
|
|
#define __NR_sched_setattr 380
|
|
|
|
__SYSCALL(__NR_sched_setattr, sys_sched_setattr)
|
|
|
|
#define __NR_sched_getattr 381
|
|
|
|
__SYSCALL(__NR_sched_getattr, sys_sched_getattr)
|
|
|
|
#define __NR_renameat2 382
|
|
|
|
__SYSCALL(__NR_renameat2, sys_renameat2)
|
2014-11-28 05:26:37 +00:00
|
|
|
#define __NR_seccomp 383
|
|
|
|
__SYSCALL(__NR_seccomp, sys_seccomp)
|
2014-08-11 13:23:37 +00:00
|
|
|
#define __NR_getrandom 384
|
|
|
|
__SYSCALL(__NR_getrandom, sys_getrandom)
|
|
|
|
#define __NR_memfd_create 385
|
|
|
|
__SYSCALL(__NR_memfd_create, sys_memfd_create)
|
2014-11-05 16:26:35 +00:00
|
|
|
#define __NR_bpf 386
|
|
|
|
__SYSCALL(__NR_bpf, sys_bpf)
|
2015-01-12 16:46:21 +00:00
|
|
|
#define __NR_execveat 387
|
|
|
|
__SYSCALL(__NR_execveat, compat_sys_execveat)
|
2015-10-14 12:20:36 +00:00
|
|
|
#define __NR_userfaultfd 388
|
|
|
|
__SYSCALL(__NR_userfaultfd, sys_userfaultfd)
|
|
|
|
#define __NR_membarrier 389
|
|
|
|
__SYSCALL(__NR_membarrier, sys_membarrier)
|
2016-06-01 17:48:20 +00:00
|
|
|
#define __NR_mlock2 390
|
|
|
|
__SYSCALL(__NR_mlock2, sys_mlock2)
|
|
|
|
#define __NR_copy_file_range 391
|
|
|
|
__SYSCALL(__NR_copy_file_range, sys_copy_file_range)
|
|
|
|
#define __NR_preadv2 392
|
|
|
|
__SYSCALL(__NR_preadv2, compat_sys_preadv2)
|
|
|
|
#define __NR_pwritev2 393
|
|
|
|
__SYSCALL(__NR_pwritev2, compat_sys_pwritev2)
|
2017-03-21 18:04:26 +00:00
|
|
|
#define __NR_pkey_mprotect 394
|
|
|
|
__SYSCALL(__NR_pkey_mprotect, sys_pkey_mprotect)
|
|
|
|
#define __NR_pkey_alloc 395
|
|
|
|
__SYSCALL(__NR_pkey_alloc, sys_pkey_alloc)
|
|
|
|
#define __NR_pkey_free 396
|
|
|
|
__SYSCALL(__NR_pkey_free, sys_pkey_free)
|
|
|
|
#define __NR_statx 397
|
|
|
|
__SYSCALL(__NR_statx, sys_statx)
|
2018-06-20 13:46:50 +00:00
|
|
|
#define __NR_rseq 398
|
|
|
|
__SYSCALL(__NR_rseq, sys_rseq)
|
2019-01-03 17:55:12 +00:00
|
|
|
#define __NR_io_pgetevents 399
|
|
|
|
__SYSCALL(__NR_io_pgetevents, compat_sys_io_pgetevents)
|
2018-12-30 20:43:07 +00:00
|
|
|
#define __NR_migrate_pages 400
|
|
|
|
__SYSCALL(__NR_migrate_pages, compat_sys_migrate_pages)
|
2018-12-30 21:01:52 +00:00
|
|
|
#define __NR_kexec_file_load 401
|
|
|
|
__SYSCALL(__NR_kexec_file_load, sys_kexec_file_load)
|
2019-01-10 11:45:11 +00:00
|
|
|
/* 402 is unused */
|
|
|
|
#define __NR_clock_gettime64 403
|
|
|
|
__SYSCALL(__NR_clock_gettime64, sys_clock_gettime)
|
|
|
|
#define __NR_clock_settime64 404
|
|
|
|
__SYSCALL(__NR_clock_settime64, sys_clock_settime)
|
|
|
|
#define __NR_clock_adjtime64 405
|
|
|
|
__SYSCALL(__NR_clock_adjtime64, sys_clock_adjtime)
|
|
|
|
#define __NR_clock_getres_time64 406
|
|
|
|
__SYSCALL(__NR_clock_getres_time64, sys_clock_getres)
|
|
|
|
#define __NR_clock_nanosleep_time64 407
|
|
|
|
__SYSCALL(__NR_clock_nanosleep_time64, sys_clock_nanosleep)
|
|
|
|
#define __NR_timer_gettime64 408
|
|
|
|
__SYSCALL(__NR_timer_gettime64, sys_timer_gettime)
|
|
|
|
#define __NR_timer_settime64 409
|
|
|
|
__SYSCALL(__NR_timer_settime64, sys_timer_settime)
|
|
|
|
#define __NR_timerfd_gettime64 410
|
|
|
|
__SYSCALL(__NR_timerfd_gettime64, sys_timerfd_gettime)
|
|
|
|
#define __NR_timerfd_settime64 411
|
|
|
|
__SYSCALL(__NR_timerfd_settime64, sys_timerfd_settime)
|
|
|
|
#define __NR_utimensat_time64 412
|
|
|
|
__SYSCALL(__NR_utimensat_time64, sys_utimensat)
|
|
|
|
#define __NR_pselect6_time64 413
|
|
|
|
__SYSCALL(__NR_pselect6_time64, compat_sys_pselect6_time64)
|
|
|
|
#define __NR_ppoll_time64 414
|
|
|
|
__SYSCALL(__NR_ppoll_time64, compat_sys_ppoll_time64)
|
|
|
|
#define __NR_io_pgetevents_time64 416
|
|
|
|
__SYSCALL(__NR_io_pgetevents_time64, sys_io_pgetevents)
|
|
|
|
#define __NR_recvmmsg_time64 417
|
|
|
|
__SYSCALL(__NR_recvmmsg_time64, compat_sys_recvmmsg_time64)
|
|
|
|
#define __NR_mq_timedsend_time64 418
|
|
|
|
__SYSCALL(__NR_mq_timedsend_time64, sys_mq_timedsend)
|
|
|
|
#define __NR_mq_timedreceive_time64 419
|
|
|
|
__SYSCALL(__NR_mq_timedreceive_time64, sys_mq_timedreceive)
|
|
|
|
#define __NR_semtimedop_time64 420
|
|
|
|
__SYSCALL(__NR_semtimedop_time64, sys_semtimedop)
|
|
|
|
#define __NR_rt_sigtimedwait_time64 421
|
|
|
|
__SYSCALL(__NR_rt_sigtimedwait_time64, compat_sys_rt_sigtimedwait_time64)
|
|
|
|
#define __NR_futex_time64 422
|
|
|
|
__SYSCALL(__NR_futex_time64, sys_futex)
|
|
|
|
#define __NR_sched_rr_get_interval_time64 423
|
|
|
|
__SYSCALL(__NR_sched_rr_get_interval_time64, sys_sched_rr_get_interval)
|
2019-02-28 12:59:19 +00:00
|
|
|
#define __NR_pidfd_send_signal 424
|
|
|
|
__SYSCALL(__NR_pidfd_send_signal, sys_pidfd_send_signal)
|
|
|
|
#define __NR_io_uring_setup 425
|
|
|
|
__SYSCALL(__NR_io_uring_setup, sys_io_uring_setup)
|
|
|
|
#define __NR_io_uring_enter 426
|
|
|
|
__SYSCALL(__NR_io_uring_enter, sys_io_uring_enter)
|
|
|
|
#define __NR_io_uring_register 427
|
|
|
|
__SYSCALL(__NR_io_uring_register, sys_io_uring_register)
|
2019-05-16 11:52:34 +00:00
|
|
|
#define __NR_open_tree 428
|
|
|
|
__SYSCALL(__NR_open_tree, sys_open_tree)
|
|
|
|
#define __NR_move_mount 429
|
|
|
|
__SYSCALL(__NR_move_mount, sys_move_mount)
|
|
|
|
#define __NR_fsopen 430
|
|
|
|
__SYSCALL(__NR_fsopen, sys_fsopen)
|
|
|
|
#define __NR_fsconfig 431
|
|
|
|
__SYSCALL(__NR_fsconfig, sys_fsconfig)
|
|
|
|
#define __NR_fsmount 432
|
|
|
|
__SYSCALL(__NR_fsmount, sys_fsmount)
|
|
|
|
#define __NR_fspick 433
|
|
|
|
__SYSCALL(__NR_fspick, sys_fspick)
|
2019-05-24 10:44:59 +00:00
|
|
|
#define __NR_pidfd_open 434
|
|
|
|
__SYSCALL(__NR_pidfd_open, sys_pidfd_open)
|
2019-07-11 17:09:44 +00:00
|
|
|
#define __NR_clone3 435
|
2019-05-25 09:37:43 +00:00
|
|
|
__SYSCALL(__NR_clone3, sys_clone3)
|
2019-05-24 09:31:44 +00:00
|
|
|
#define __NR_close_range 436
|
|
|
|
__SYSCALL(__NR_close_range, sys_close_range)
|
open: introduce openat2(2) syscall
/* Background. */
For a very long time, extending openat(2) with new features has been
incredibly frustrating. This stems from the fact that openat(2) is
possibly the most famous counter-example to the mantra "don't silently
accept garbage from userspace" -- it doesn't check whether unknown flags
are present[1].
This means that (generally) the addition of new flags to openat(2) has
been fraught with backwards-compatibility issues (O_TMPFILE has to be
defined as __O_TMPFILE|O_DIRECTORY|[O_RDWR or O_WRONLY] to ensure old
kernels gave errors, since it's insecure to silently ignore the
flag[2]). All new security-related flags therefore have a tough road to
being added to openat(2).
Userspace also has a hard time figuring out whether a particular flag is
supported on a particular kernel. While it is now possible with
contemporary kernels (thanks to [3]), older kernels will expose unknown
flag bits through fcntl(F_GETFL). Giving a clear -EINVAL during
openat(2) time matches modern syscall designs and is far more
fool-proof.
In addition, the newly-added path resolution restriction LOOKUP flags
(which we would like to expose to user-space) don't feel related to the
pre-existing O_* flag set -- they affect all components of path lookup.
We'd therefore like to add a new flag argument.
Adding a new syscall allows us to finally fix the flag-ignoring problem,
and we can make it extensible enough so that we will hopefully never
need an openat3(2).
/* Syscall Prototype. */
/*
* open_how is an extensible structure (similar in interface to
* clone3(2) or sched_setattr(2)). The size parameter must be set to
* sizeof(struct open_how), to allow for future extensions. All future
* extensions will be appended to open_how, with their zero value
* acting as a no-op default.
*/
struct open_how { /* ... */ };
int openat2(int dfd, const char *pathname,
struct open_how *how, size_t size);
/* Description. */
The initial version of 'struct open_how' contains the following fields:
flags
Used to specify openat(2)-style flags. However, any unknown flag
bits or otherwise incorrect flag combinations (like O_PATH|O_RDWR)
will result in -EINVAL. In addition, this field is 64-bits wide to
allow for more O_ flags than currently permitted with openat(2).
mode
The file mode for O_CREAT or O_TMPFILE.
Must be set to zero if flags does not contain O_CREAT or O_TMPFILE.
resolve
Restrict path resolution (in contrast to O_* flags they affect all
path components). The current set of flags are as follows (at the
moment, all of the RESOLVE_ flags are implemented as just passing
the corresponding LOOKUP_ flag).
RESOLVE_NO_XDEV => LOOKUP_NO_XDEV
RESOLVE_NO_SYMLINKS => LOOKUP_NO_SYMLINKS
RESOLVE_NO_MAGICLINKS => LOOKUP_NO_MAGICLINKS
RESOLVE_BENEATH => LOOKUP_BENEATH
RESOLVE_IN_ROOT => LOOKUP_IN_ROOT
open_how does not contain an embedded size field, because it is of
little benefit (userspace can figure out the kernel open_how size at
runtime fairly easily without it). It also only contains u64s (even
though ->mode arguably should be a u16) to avoid having padding fields
which are never used in the future.
Note that as a result of the new how->flags handling, O_PATH|O_TMPFILE
is no longer permitted for openat(2). As far as I can tell, this has
always been a bug and appears to not be used by userspace (and I've not
seen any problems on my machines by disallowing it). If it turns out
this breaks something, we can special-case it and only permit it for
openat(2) but not openat2(2).
After input from Florian Weimer, the new open_how and flag definitions
are inside a separate header from uapi/linux/fcntl.h, to avoid problems
that glibc has with importing that header.
/* Testing. */
In a follow-up patch there are over 200 selftests which ensure that this
syscall has the correct semantics and will correctly handle several
attack scenarios.
In addition, I've written a userspace library[4] which provides
convenient wrappers around openat2(RESOLVE_IN_ROOT) (this is necessary
because no other syscalls support RESOLVE_IN_ROOT, and thus lots of care
must be taken when using RESOLVE_IN_ROOT'd file descriptors with other
syscalls). During the development of this patch, I've run numerous
verification tests using libpathrs (showing that the API is reasonably
usable by userspace).
/* Future Work. */
Additional RESOLVE_ flags have been suggested during the review period.
These can be easily implemented separately (such as blocking auto-mount
during resolution).
Furthermore, there are some other proposed changes to the openat(2)
interface (the most obvious example is magic-link hardening[5]) which
would be a good opportunity to add a way for userspace to restrict how
O_PATH file descriptors can be re-opened.
Another possible avenue of future work would be some kind of
CHECK_FIELDS[6] flag which causes the kernel to indicate to userspace
which openat2(2) flags and fields are supported by the current kernel
(to avoid userspace having to go through several guesses to figure it
out).
[1]: https://lwn.net/Articles/588444/
[2]: https://lore.kernel.org/lkml/CA+55aFyyxJL1LyXZeBsf2ypriraj5ut1XkNDsunRBqgVjZU_6Q@mail.gmail.com
[3]: commit 629e014bb834 ("fs: completely ignore unknown open flags")
[4]: https://sourceware.org/bugzilla/show_bug.cgi?id=17523
[5]: https://lore.kernel.org/lkml/20190930183316.10190-2-cyphar@cyphar.com/
[6]: https://youtu.be/ggD-eb3yPVs
Suggested-by: Christian Brauner <christian.brauner@ubuntu.com>
Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2020-01-18 12:07:59 +00:00
|
|
|
#define __NR_openat2 437
|
|
|
|
__SYSCALL(__NR_openat2, sys_openat2)
|
2020-01-07 17:59:26 +00:00
|
|
|
#define __NR_pidfd_getfd 438
|
|
|
|
__SYSCALL(__NR_pidfd_getfd, sys_pidfd_getfd)
|
2020-05-14 14:44:25 +00:00
|
|
|
#define __NR_faccessat2 439
|
|
|
|
__SYSCALL(__NR_faccessat2, sys_faccessat2)
|
mm/madvise: introduce process_madvise() syscall: an external memory hinting API
There is usecase that System Management Software(SMS) want to give a
memory hint like MADV_[COLD|PAGEEOUT] to other processes and in the
case of Android, it is the ActivityManagerService.
The information required to make the reclaim decision is not known to the
app. Instead, it is known to the centralized userspace
daemon(ActivityManagerService), and that daemon must be able to initiate
reclaim on its own without any app involvement.
To solve the issue, this patch introduces a new syscall
process_madvise(2). It uses pidfd of an external process to give the
hint. It also supports vector address range because Android app has
thousands of vmas due to zygote so it's totally waste of CPU and power if
we should call the syscall one by one for each vma.(With testing 2000-vma
syscall vs 1-vector syscall, it showed 15% performance improvement. I
think it would be bigger in real practice because the testing ran very
cache friendly environment).
Another potential use case for the vector range is to amortize the cost
ofTLB shootdowns for multiple ranges when using MADV_DONTNEED; this could
benefit users like TCP receive zerocopy and malloc implementations. In
future, we could find more usecases for other advises so let's make it
happens as API since we introduce a new syscall at this moment. With
that, existing madvise(2) user could replace it with process_madvise(2)
with their own pid if they want to have batch address ranges support
feature.
ince it could affect other process's address range, only privileged
process(PTRACE_MODE_ATTACH_FSCREDS) or something else(e.g., being the same
UID) gives it the right to ptrace the process could use it successfully.
The flag argument is reserved for future use if we need to extend the API.
I think supporting all hints madvise has/will supported/support to
process_madvise is rather risky. Because we are not sure all hints make
sense from external process and implementation for the hint may rely on
the caller being in the current context so it could be error-prone. Thus,
I just limited hints as MADV_[COLD|PAGEOUT] in this patch.
If someone want to add other hints, we could hear the usecase and review
it for each hint. It's safer for maintenance rather than introducing a
buggy syscall but hard to fix it later.
So finally, the API is as follows,
ssize_t process_madvise(int pidfd, const struct iovec *iovec,
unsigned long vlen, int advice, unsigned int flags);
DESCRIPTION
The process_madvise() system call is used to give advice or directions
to the kernel about the address ranges from external process as well as
local process. It provides the advice to address ranges of process
described by iovec and vlen. The goal of such advice is to improve
system or application performance.
The pidfd selects the process referred to by the PID file descriptor
specified in pidfd. (See pidofd_open(2) for further information)
The pointer iovec points to an array of iovec structures, defined in
<sys/uio.h> as:
struct iovec {
void *iov_base; /* starting address */
size_t iov_len; /* number of bytes to be advised */
};
The iovec describes address ranges beginning at address(iov_base)
and with size length of bytes(iov_len).
The vlen represents the number of elements in iovec.
The advice is indicated in the advice argument, which is one of the
following at this moment if the target process specified by pidfd is
external.
MADV_COLD
MADV_PAGEOUT
Permission to provide a hint to external process is governed by a
ptrace access mode PTRACE_MODE_ATTACH_FSCREDS check; see ptrace(2).
The process_madvise supports every advice madvise(2) has if target
process is in same thread group with calling process so user could
use process_madvise(2) to extend existing madvise(2) to support
vector address ranges.
RETURN VALUE
On success, process_madvise() returns the number of bytes advised.
This return value may be less than the total number of requested
bytes, if an error occurred. The caller should check return value
to determine whether a partial advice occurred.
FAQ:
Q.1 - Why does any external entity have better knowledge?
Quote from Sandeep
"For Android, every application (including the special SystemServer)
are forked from Zygote. The reason of course is to share as many
libraries and classes between the two as possible to benefit from the
preloading during boot.
After applications start, (almost) all of the APIs end up calling into
this SystemServer process over IPC (binder) and back to the
application.
In a fully running system, the SystemServer monitors every single
process periodically to calculate their PSS / RSS and also decides
which process is "important" to the user for interactivity.
So, because of how these processes start _and_ the fact that the
SystemServer is looping to monitor each process, it does tend to *know*
which address range of the application is not used / useful.
Besides, we can never rely on applications to clean things up
themselves. We've had the "hey app1, the system is low on memory,
please trim your memory usage down" notifications for a long time[1].
They rely on applications honoring the broadcasts and very few do.
So, if we want to avoid the inevitable killing of the application and
restarting it, some way to be able to tell the OS about unimportant
memory in these applications will be useful.
- ssp
Q.2 - How to guarantee the race(i.e., object validation) between when
giving a hint from an external process and get the hint from the target
process?
process_madvise operates on the target process's address space as it
exists at the instant that process_madvise is called. If the space
target process can run between the time the process_madvise process
inspects the target process address space and the time that
process_madvise is actually called, process_madvise may operate on
memory regions that the calling process does not expect. It's the
responsibility of the process calling process_madvise to close this
race condition. For example, the calling process can suspend the
target process with ptrace, SIGSTOP, or the freezer cgroup so that it
doesn't have an opportunity to change its own address space before
process_madvise is called. Another option is to operate on memory
regions that the caller knows a priori will be unchanged in the target
process. Yet another option is to accept the race for certain
process_madvise calls after reasoning that mistargeting will do no
harm. The suggested API itself does not provide synchronization. It
also apply other APIs like move_pages, process_vm_write.
The race isn't really a problem though. Why is it so wrong to require
that callers do their own synchronization in some manner? Nobody
objects to write(2) merely because it's possible for two processes to
open the same file and clobber each other's writes --- instead, we tell
people to use flock or something. Think about mmap. It never
guarantees newly allocated address space is still valid when the user
tries to access it because other threads could unmap the memory right
before. That's where we need synchronization by using other API or
design from userside. It shouldn't be part of API itself. If someone
needs more fine-grained synchronization rather than process level,
there were two ideas suggested - cookie[2] and anon-fd[3]. Both are
applicable via using last reserved argument of the API but I don't
think it's necessary right now since we have already ways to prevent
the race so don't want to add additional complexity with more
fine-grained optimization model.
To make the API extend, it reserved an unsigned long as last argument
so we could support it in future if someone really needs it.
Q.3 - Why doesn't ptrace work?
Injecting an madvise in the target process using ptrace would not work
for us because such injected madvise would have to be executed by the
target process, which means that process would have to be runnable and
that creates the risk of the abovementioned race and hinting a wrong
VMA. Furthermore, we want to act the hint in caller's context, not the
callee's, because the callee is usually limited in cpuset/cgroups or
even freezed state so they can't act by themselves quick enough, which
causes more thrashing/kill. It doesn't work if the target process are
ptraced(e.g., strace, debugger, minidump) because a process can have at
most one ptracer.
[1] https://developer.android.com/topic/performance/memory"
[2] process_getinfo for getting the cookie which is updated whenever
vma of process address layout are changed - Daniel Colascione -
https://lore.kernel.org/lkml/20190520035254.57579-1-minchan@kernel.org/T/#m7694416fd179b2066a2c62b5b139b14e3894e224
[3] anonymous fd which is used for the object(i.e., address range)
validation - Michal Hocko -
https://lore.kernel.org/lkml/20200120112722.GY18451@dhcp22.suse.cz/
[minchan@kernel.org: fix process_madvise build break for arm64]
Link: http://lkml.kernel.org/r/20200303145756.GA219683@google.com
[minchan@kernel.org: fix build error for mips of process_madvise]
Link: http://lkml.kernel.org/r/20200508052517.GA197378@google.com
[akpm@linux-foundation.org: fix patch ordering issue]
[akpm@linux-foundation.org: fix arm64 whoops]
[minchan@kernel.org: make process_madvise() vlen arg have type size_t, per Florian]
[akpm@linux-foundation.org: fix i386 build]
[sfr@canb.auug.org.au: fix syscall numbering]
Link: https://lkml.kernel.org/r/20200905142639.49fc3f1a@canb.auug.org.au
[sfr@canb.auug.org.au: madvise.c needs compat.h]
Link: https://lkml.kernel.org/r/20200908204547.285646b4@canb.auug.org.au
[minchan@kernel.org: fix mips build]
Link: https://lkml.kernel.org/r/20200909173655.GC2435453@google.com
[yuehaibing@huawei.com: remove duplicate header which is included twice]
Link: https://lkml.kernel.org/r/20200915121550.30584-1-yuehaibing@huawei.com
[minchan@kernel.org: do not use helper functions for process_madvise]
Link: https://lkml.kernel.org/r/20200921175539.GB387368@google.com
[akpm@linux-foundation.org: pidfd_get_pid() gained an argument]
[sfr@canb.auug.org.au: fix up for "iov_iter: transparently handle compat iovecs in import_iovec"]
Link: https://lkml.kernel.org/r/20200928212542.468e1fef@canb.auug.org.au
Signed-off-by: Minchan Kim <minchan@kernel.org>
Signed-off-by: YueHaibing <yuehaibing@huawei.com>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Reviewed-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
Acked-by: David Rientjes <rientjes@google.com>
Cc: Alexander Duyck <alexander.h.duyck@linux.intel.com>
Cc: Brian Geffon <bgeffon@google.com>
Cc: Christian Brauner <christian@brauner.io>
Cc: Daniel Colascione <dancol@google.com>
Cc: Jann Horn <jannh@google.com>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: Joel Fernandes <joel@joelfernandes.org>
Cc: Johannes Weiner <hannes@cmpxchg.org>
Cc: John Dias <joaodias@google.com>
Cc: Kirill Tkhai <ktkhai@virtuozzo.com>
Cc: Michal Hocko <mhocko@suse.com>
Cc: Oleksandr Natalenko <oleksandr@redhat.com>
Cc: Sandeep Patil <sspatil@google.com>
Cc: SeongJae Park <sj38.park@gmail.com>
Cc: SeongJae Park <sjpark@amazon.de>
Cc: Shakeel Butt <shakeelb@google.com>
Cc: Sonny Rao <sonnyrao@google.com>
Cc: Tim Murray <timmurray@google.com>
Cc: Christian Brauner <christian.brauner@ubuntu.com>
Cc: Florian Weimer <fw@deneb.enyo.de>
Cc: <linux-man@vger.kernel.org>
Link: http://lkml.kernel.org/r/20200302193630.68771-3-minchan@kernel.org
Link: http://lkml.kernel.org/r/20200508183320.GA125527@google.com
Link: http://lkml.kernel.org/r/20200622192900.22757-4-minchan@kernel.org
Link: https://lkml.kernel.org/r/20200901000633.1920247-4-minchan@kernel.org
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2020-10-17 23:14:59 +00:00
|
|
|
#define __NR_process_madvise 440
|
|
|
|
__SYSCALL(__NR_process_madvise, sys_process_madvise)
|
2020-12-18 22:05:41 +00:00
|
|
|
#define __NR_epoll_pwait2 441
|
2020-12-20 09:58:30 +00:00
|
|
|
__SYSCALL(__NR_epoll_pwait2, compat_sys_epoll_pwait2)
|
fs: add mount_setattr()
This implements the missing mount_setattr() syscall. While the new mount
api allows to change the properties of a superblock there is currently
no way to change the properties of a mount or a mount tree using file
descriptors which the new mount api is based on. In addition the old
mount api has the restriction that mount options cannot be applied
recursively. This hasn't changed since changing mount options on a
per-mount basis was implemented in [1] and has been a frequent request
not just for convenience but also for security reasons. The legacy
mount syscall is unable to accommodate this behavior without introducing
a whole new set of flags because MS_REC | MS_REMOUNT | MS_BIND |
MS_RDONLY | MS_NOEXEC | [...] only apply the mount option to the topmost
mount. Changing MS_REC to apply to the whole mount tree would mean
introducing a significant uapi change and would likely cause significant
regressions.
The new mount_setattr() syscall allows to recursively clear and set
mount options in one shot. Multiple calls to change mount options
requesting the same changes are idempotent:
int mount_setattr(int dfd, const char *path, unsigned flags,
struct mount_attr *uattr, size_t usize);
Flags to modify path resolution behavior are specified in the @flags
argument. Currently, AT_EMPTY_PATH, AT_RECURSIVE, AT_SYMLINK_NOFOLLOW,
and AT_NO_AUTOMOUNT are supported. If useful, additional lookup flags to
restrict path resolution as introduced with openat2() might be supported
in the future.
The mount_setattr() syscall can be expected to grow over time and is
designed with extensibility in mind. It follows the extensible syscall
pattern we have used with other syscalls such as openat2(), clone3(),
sched_{set,get}attr(), and others.
The set of mount options is passed in the uapi struct mount_attr which
currently has the following layout:
struct mount_attr {
__u64 attr_set;
__u64 attr_clr;
__u64 propagation;
__u64 userns_fd;
};
The @attr_set and @attr_clr members are used to clear and set mount
options. This way a user can e.g. request that a set of flags is to be
raised such as turning mounts readonly by raising MOUNT_ATTR_RDONLY in
@attr_set while at the same time requesting that another set of flags is
to be lowered such as removing noexec from a mount tree by specifying
MOUNT_ATTR_NOEXEC in @attr_clr.
Note, since the MOUNT_ATTR_<atime> values are an enum starting from 0,
not a bitmap, users wanting to transition to a different atime setting
cannot simply specify the atime setting in @attr_set, but must also
specify MOUNT_ATTR__ATIME in the @attr_clr field. So we ensure that
MOUNT_ATTR__ATIME can't be partially set in @attr_clr and that @attr_set
can't have any atime bits set if MOUNT_ATTR__ATIME isn't set in
@attr_clr.
The @propagation field lets callers specify the propagation type of a
mount tree. Propagation is a single property that has four different
settings and as such is not really a flag argument but an enum.
Specifically, it would be unclear what setting and clearing propagation
settings in combination would amount to. The legacy mount() syscall thus
forbids the combination of multiple propagation settings too. The goal
is to keep the semantics of mount propagation somewhat simple as they
are overly complex as it is.
The @userns_fd field lets user specify a user namespace whose idmapping
becomes the idmapping of the mount. This is implemented and explained in
detail in the next patch.
[1]: commit 2e4b7fcd9260 ("[PATCH] r/o bind mounts: honor mount writer counts at remount")
Link: https://lore.kernel.org/r/20210121131959.646623-35-christian.brauner@ubuntu.com
Cc: David Howells <dhowells@redhat.com>
Cc: Aleksa Sarai <cyphar@cyphar.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: linux-fsdevel@vger.kernel.org
Cc: linux-api@vger.kernel.org
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
2021-01-21 13:19:53 +00:00
|
|
|
#define __NR_mount_setattr 442
|
|
|
|
__SYSCALL(__NR_mount_setattr, sys_mount_setattr)
|
2015-10-14 12:20:36 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Please add new compat syscalls above this comment and update
|
|
|
|
* __NR_compat_syscalls in asm/unistd.h.
|
|
|
|
*/
|