blob: a37d7c00da65e4eed68e0bc4cf838357dfad804f [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07002#ifndef _LINUX_PTRACE_H
3#define _LINUX_PTRACE_H
Linus Torvalds1da177e2005-04-16 15:20:36 -07004
David Howells607ca462012-10-13 10:46:48 +01005#include <linux/compiler.h> /* For unlikely. */
6#include <linux/sched.h> /* For struct task_struct. */
Ingo Molnar3f07c012017-02-08 18:51:30 +01007#include <linux/sched/signal.h> /* For send_sig(), same_thread_group(), etc. */
David Howells607ca462012-10-13 10:46:48 +01008#include <linux/err.h> /* for IS_ERR_VALUE */
9#include <linux/bug.h> /* For BUG_ON. */
Matthew Dempsky4e523652014-06-06 14:36:42 -070010#include <linux/pid_namespace.h> /* For task_active_pid_ns. */
David Howells607ca462012-10-13 10:46:48 +010011#include <uapi/linux/ptrace.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070012
Eric W. Biederman84d77d32016-11-22 12:06:50 -060013extern int ptrace_access_vm(struct task_struct *tsk, unsigned long addr,
14 void *buf, int len, unsigned int gup_flags);
15
Linus Torvalds1da177e2005-04-16 15:20:36 -070016/*
17 * Ptrace flags
Eric W. Biederman260ea102006-06-23 02:05:18 -070018 *
19 * The owner ship rules for task->ptrace which holds the ptrace
20 * flags is simple. When a task is running it owns it's task->ptrace
21 * flags. When the a task is stopped the ptracer owns task->ptrace.
Linus Torvalds1da177e2005-04-16 15:20:36 -070022 */
23
Tejun Heo3544d722011-06-14 11:20:15 +020024#define PT_SEIZED 0x00010000 /* SEIZE used, enable new behavior */
Linus Torvalds1da177e2005-04-16 15:20:36 -070025#define PT_PTRACED 0x00000001
26#define PT_DTRACE 0x00000002 /* delayed trace (used on m68k, i386) */
Tejun Heo643ad832011-06-17 16:50:35 +020027
Denys Vlasenko86b6c1f2012-03-23 15:02:41 -070028#define PT_OPT_FLAG_SHIFT 3
Tejun Heo643ad832011-06-17 16:50:35 +020029/* PT_TRACE_* event enable flags */
Denys Vlasenko86b6c1f2012-03-23 15:02:41 -070030#define PT_EVENT_FLAG(event) (1 << (PT_OPT_FLAG_SHIFT + (event)))
31#define PT_TRACESYSGOOD PT_EVENT_FLAG(0)
Tejun Heo643ad832011-06-17 16:50:35 +020032#define PT_TRACE_FORK PT_EVENT_FLAG(PTRACE_EVENT_FORK)
33#define PT_TRACE_VFORK PT_EVENT_FLAG(PTRACE_EVENT_VFORK)
34#define PT_TRACE_CLONE PT_EVENT_FLAG(PTRACE_EVENT_CLONE)
35#define PT_TRACE_EXEC PT_EVENT_FLAG(PTRACE_EVENT_EXEC)
36#define PT_TRACE_VFORK_DONE PT_EVENT_FLAG(PTRACE_EVENT_VFORK_DONE)
37#define PT_TRACE_EXIT PT_EVENT_FLAG(PTRACE_EVENT_EXIT)
Will Drewryfb0fadf2012-04-12 16:48:02 -050038#define PT_TRACE_SECCOMP PT_EVENT_FLAG(PTRACE_EVENT_SECCOMP)
Linus Torvalds1da177e2005-04-16 15:20:36 -070039
Oleg Nesterov992fb6e2012-12-17 16:03:07 -080040#define PT_EXITKILL (PTRACE_O_EXITKILL << PT_OPT_FLAG_SHIFT)
Tycho Andersen13c4a902015-06-13 09:02:48 -060041#define PT_SUSPEND_SECCOMP (PTRACE_O_SUSPEND_SECCOMP << PT_OPT_FLAG_SHIFT)
Oleg Nesterov992fb6e2012-12-17 16:03:07 -080042
Linus Torvalds1da177e2005-04-16 15:20:36 -070043/* single stepping state bits (used on ARM and PA-RISC) */
44#define PT_SINGLESTEP_BIT 31
45#define PT_SINGLESTEP (1<<PT_SINGLESTEP_BIT)
46#define PT_BLOCKSTEP_BIT 30
47#define PT_BLOCKSTEP (1<<PT_BLOCKSTEP_BIT)
48
Namhyung Kim9b05a692010-10-27 15:33:47 -070049extern long arch_ptrace(struct task_struct *child, long request,
50 unsigned long addr, unsigned long data);
Linus Torvalds1da177e2005-04-16 15:20:36 -070051extern int ptrace_readdata(struct task_struct *tsk, unsigned long src, char __user *dst, int len);
52extern int ptrace_writedata(struct task_struct *tsk, char __user *src, unsigned long dst, int len);
Linus Torvalds1da177e2005-04-16 15:20:36 -070053extern void ptrace_disable(struct task_struct *);
Namhyung Kim4abf9862010-10-27 15:33:45 -070054extern int ptrace_request(struct task_struct *child, long request,
55 unsigned long addr, unsigned long data);
Linus Torvalds1da177e2005-04-16 15:20:36 -070056extern void ptrace_notify(int exit_code);
57extern void __ptrace_link(struct task_struct *child,
Eric W. Biedermanc70d9d82017-05-22 15:40:12 -050058 struct task_struct *new_parent,
59 const struct cred *ptracer_cred);
Linus Torvalds1da177e2005-04-16 15:20:36 -070060extern void __ptrace_unlink(struct task_struct *child);
Oleg Nesterov7c8bd232014-12-10 15:45:33 -080061extern void exit_ptrace(struct task_struct *tracer, struct list_head *dead);
Eric Paris69f594a2012-01-03 12:25:15 -050062#define PTRACE_MODE_READ 0x01
63#define PTRACE_MODE_ATTACH 0x02
64#define PTRACE_MODE_NOAUDIT 0x04
Jiri Kosinadbfe2952018-09-25 14:38:18 +020065#define PTRACE_MODE_FSCREDS 0x08
66#define PTRACE_MODE_REALCREDS 0x10
67#define PTRACE_MODE_SCHED 0x20
68#define PTRACE_MODE_IBPB 0x40
Jann Horncaaee622016-01-20 15:00:04 -080069
70/* shorthands for READ/ATTACH and FSCREDS/REALCREDS combinations */
71#define PTRACE_MODE_READ_FSCREDS (PTRACE_MODE_READ | PTRACE_MODE_FSCREDS)
72#define PTRACE_MODE_READ_REALCREDS (PTRACE_MODE_READ | PTRACE_MODE_REALCREDS)
73#define PTRACE_MODE_ATTACH_FSCREDS (PTRACE_MODE_ATTACH | PTRACE_MODE_FSCREDS)
74#define PTRACE_MODE_ATTACH_REALCREDS (PTRACE_MODE_ATTACH | PTRACE_MODE_REALCREDS)
Jiri Kosinadbfe2952018-09-25 14:38:18 +020075#define PTRACE_MODE_SPEC_IBPB (PTRACE_MODE_ATTACH_REALCREDS | PTRACE_MODE_IBPB)
Jann Horncaaee622016-01-20 15:00:04 -080076
77/**
78 * ptrace_may_access - check whether the caller is permitted to access
79 * a target task.
80 * @task: target task
81 * @mode: selects type of access and caller credentials
82 *
83 * Returns true on success, false on denial.
84 *
85 * One of the flags PTRACE_MODE_FSCREDS and PTRACE_MODE_REALCREDS must
86 * be set in @mode to specify whether the access was requested through
87 * a filesystem syscall (should use effective capabilities and fsuid
88 * of the caller) or through an explicit syscall such as
89 * process_vm_writev or ptrace (and should use the real credentials).
90 */
Stephen Smalley006ebb42008-05-19 08:32:49 -040091extern bool ptrace_may_access(struct task_struct *task, unsigned int mode);
Linus Torvalds1da177e2005-04-16 15:20:36 -070092
Jiri Kosinadbfe2952018-09-25 14:38:18 +020093/**
94 * ptrace_may_access - check whether the caller is permitted to access
95 * a target task.
96 * @task: target task
97 * @mode: selects type of access and caller credentials
98 *
99 * Returns true on success, false on denial.
100 *
101 * Similar to ptrace_may_access(). Only to be called from context switch
102 * code. Does not call into audit and the regular LSM hooks due to locking
103 * constraints.
104 */
105extern bool ptrace_may_access_sched(struct task_struct *task, unsigned int mode);
106
Oleg Nesterov53b6f9f2008-04-30 00:53:13 -0700107static inline int ptrace_reparented(struct task_struct *child)
108{
Oleg Nesterov0347e172011-06-24 17:34:06 +0200109 return !same_thread_group(child->real_parent, child->parent);
Oleg Nesterov53b6f9f2008-04-30 00:53:13 -0700110}
Oleg Nesterovc6a47cc2009-12-15 16:47:15 -0800111
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112static inline void ptrace_unlink(struct task_struct *child)
113{
114 if (unlikely(child->ptrace))
115 __ptrace_unlink(child);
116}
117
Namhyung Kim4abf9862010-10-27 15:33:45 -0700118int generic_ptrace_peekdata(struct task_struct *tsk, unsigned long addr,
119 unsigned long data);
120int generic_ptrace_pokedata(struct task_struct *tsk, unsigned long addr,
121 unsigned long data);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122
Roland McGrath88ac2922008-07-25 19:45:43 -0700123/**
Tejun Heo06d98472011-06-17 16:50:40 +0200124 * ptrace_parent - return the task that is tracing the given task
125 * @task: task to consider
126 *
127 * Returns %NULL if no one is tracing @task, or the &struct task_struct
128 * pointer to its tracer.
129 *
130 * Must called under rcu_read_lock(). The pointer returned might be kept
131 * live only by RCU. During exec, this may be called with task_lock() held
132 * on @task, still held from when check_unsafe_exec() was called.
133 */
134static inline struct task_struct *ptrace_parent(struct task_struct *task)
135{
136 if (unlikely(task->ptrace))
137 return rcu_dereference(task->parent);
138 return NULL;
139}
140
141/**
Tejun Heo643ad832011-06-17 16:50:35 +0200142 * ptrace_event_enabled - test whether a ptrace event is enabled
143 * @task: ptracee of interest
144 * @event: %PTRACE_EVENT_* to test
145 *
146 * Test whether @event is enabled for ptracee @task.
147 *
148 * Returns %true if @event is enabled, %false otherwise.
149 */
150static inline bool ptrace_event_enabled(struct task_struct *task, int event)
151{
152 return task->ptrace & PT_EVENT_FLAG(event);
153}
154
155/**
Roland McGrath88ac2922008-07-25 19:45:43 -0700156 * ptrace_event - possibly stop for a ptrace event notification
Tejun Heo643ad832011-06-17 16:50:35 +0200157 * @event: %PTRACE_EVENT_* value to report
Roland McGrath88ac2922008-07-25 19:45:43 -0700158 * @message: value for %PTRACE_GETEVENTMSG to return
159 *
Tejun Heo643ad832011-06-17 16:50:35 +0200160 * Check whether @event is enabled and, if so, report @event and @message
161 * to the ptrace parent.
Roland McGrath88ac2922008-07-25 19:45:43 -0700162 *
Roland McGrath88ac2922008-07-25 19:45:43 -0700163 * Called without locks.
164 */
Tejun Heof3c04b92011-06-17 16:50:36 +0200165static inline void ptrace_event(int event, unsigned long message)
Roland McGrath88ac2922008-07-25 19:45:43 -0700166{
Tejun Heof3c04b92011-06-17 16:50:36 +0200167 if (unlikely(ptrace_event_enabled(current, event))) {
168 current->ptrace_message = message;
169 ptrace_notify((event << 8) | SIGTRAP);
Oleg Nesterovb1845ff2012-03-23 15:02:40 -0700170 } else if (event == PTRACE_EVENT_EXEC) {
Tejun Heof3c04b92011-06-17 16:50:36 +0200171 /* legacy EXEC report via SIGTRAP */
Oleg Nesterovb1845ff2012-03-23 15:02:40 -0700172 if ((current->ptrace & (PT_PTRACED|PT_SEIZED)) == PT_PTRACED)
173 send_sig(SIGTRAP, current, 0);
Tejun Heof3c04b92011-06-17 16:50:36 +0200174 }
Roland McGrath88ac2922008-07-25 19:45:43 -0700175}
176
Roland McGrath09a05392008-07-25 19:45:47 -0700177/**
Matthew Dempsky4e523652014-06-06 14:36:42 -0700178 * ptrace_event_pid - possibly stop for a ptrace event notification
179 * @event: %PTRACE_EVENT_* value to report
180 * @pid: process identifier for %PTRACE_GETEVENTMSG to return
181 *
182 * Check whether @event is enabled and, if so, report @event and @pid
183 * to the ptrace parent. @pid is reported as the pid_t seen from the
184 * the ptrace parent's pid namespace.
185 *
186 * Called without locks.
187 */
188static inline void ptrace_event_pid(int event, struct pid *pid)
189{
190 /*
191 * FIXME: There's a potential race if a ptracer in a different pid
192 * namespace than parent attaches between computing message below and
193 * when we acquire tasklist_lock in ptrace_stop(). If this happens,
194 * the ptracer will get a bogus pid from PTRACE_GETEVENTMSG.
195 */
196 unsigned long message = 0;
197 struct pid_namespace *ns;
198
199 rcu_read_lock();
200 ns = task_active_pid_ns(rcu_dereference(current->parent));
201 if (ns)
202 message = pid_nr_ns(pid, ns);
203 rcu_read_unlock();
204
205 ptrace_event(event, message);
206}
207
208/**
Roland McGrath09a05392008-07-25 19:45:47 -0700209 * ptrace_init_task - initialize ptrace state for a new child
210 * @child: new child task
211 * @ptrace: true if child should be ptrace'd by parent's tracer
212 *
213 * This is called immediately after adding @child to its parent's children
214 * list. @ptrace is false in the normal case, and true to ptrace @child.
215 *
216 * Called with current's siglock and write_lock_irq(&tasklist_lock) held.
217 */
218static inline void ptrace_init_task(struct task_struct *child, bool ptrace)
219{
220 INIT_LIST_HEAD(&child->ptrace_entry);
221 INIT_LIST_HEAD(&child->ptraced);
Oleg Nesterov6634ae12011-07-08 19:13:39 +0200222 child->jobctl = 0;
223 child->ptrace = 0;
224 child->parent = child->real_parent;
225
226 if (unlikely(ptrace) && current->ptrace) {
227 child->ptrace = current->ptrace;
Eric W. Biedermanc70d9d82017-05-22 15:40:12 -0500228 __ptrace_link(child, current->parent, current->ptracer_cred);
Oleg Nesterovdcace062011-07-08 19:13:54 +0200229
Oleg Nesterovd184d6e2011-07-08 19:14:17 +0200230 if (child->ptrace & PT_SEIZED)
231 task_set_jobctl_pending(child, JOBCTL_TRAP_STOP);
232 else
233 sigaddset(&child->pending.signal, SIGSTOP);
Oleg Nesterov6634ae12011-07-08 19:13:39 +0200234 }
Eric W. Biedermanc70d9d82017-05-22 15:40:12 -0500235 else
236 child->ptracer_cred = NULL;
Roland McGrath09a05392008-07-25 19:45:47 -0700237}
238
Roland McGrathdae33572008-07-25 19:45:48 -0700239/**
240 * ptrace_release_task - final ptrace-related cleanup of a zombie being reaped
241 * @task: task in %EXIT_DEAD state
242 *
243 * Called with write_lock(&tasklist_lock) held.
244 */
245static inline void ptrace_release_task(struct task_struct *task)
246{
247 BUG_ON(!list_empty(&task->ptraced));
248 ptrace_unlink(task);
249 BUG_ON(!list_empty(&task->ptrace_entry));
250}
251
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252#ifndef force_successful_syscall_return
253/*
254 * System call handlers that, upon successful completion, need to return a
255 * negative value should call force_successful_syscall_return() right before
256 * returning. On architectures where the syscall convention provides for a
257 * separate error flag (e.g., alpha, ia64, ppc{,64}, sparc{,64}, possibly
258 * others), this macro can be used to ensure that the error flag will not get
259 * set. On architectures which do not support a separate error flag, the macro
260 * is a no-op and the spurious error condition needs to be filtered out by some
261 * other means (e.g., in user-level, by passing an extra argument to the
262 * syscall handler, or something along those lines).
263 */
264#define force_successful_syscall_return() do { } while (0)
265#endif
266
Eric Parisd7e75282012-01-03 14:23:06 -0500267#ifndef is_syscall_success
268/*
269 * On most systems we can tell if a syscall is a success based on if the retval
270 * is an error value. On some systems like ia64 and powerpc they have different
271 * indicators of success/failure and must define their own.
272 */
273#define is_syscall_success(regs) (!IS_ERR_VALUE((unsigned long)(regs_return_value(regs))))
274#endif
275
Roland McGrathfb7fa8f2008-01-30 13:30:47 +0100276/*
277 * <asm/ptrace.h> should define the following things inside #ifdef __KERNEL__.
278 *
279 * These do-nothing inlines are used when the arch does not
280 * implement single-step. The kerneldoc comments are here
281 * to document the interface for all arch definitions.
282 */
283
284#ifndef arch_has_single_step
285/**
286 * arch_has_single_step - does this CPU support user-mode single-step?
287 *
288 * If this is defined, then there must be function declarations or
289 * inlines for user_enable_single_step() and user_disable_single_step().
290 * arch_has_single_step() should evaluate to nonzero iff the machine
291 * supports instruction single-step for user mode.
292 * It can be a constant or it can test a CPU feature bit.
293 */
294#define arch_has_single_step() (0)
295
296/**
297 * user_enable_single_step - single-step in user-mode task
298 * @task: either current or a task stopped in %TASK_TRACED
299 *
300 * This can only be called when arch_has_single_step() has returned nonzero.
301 * Set @task so that when it returns to user mode, it will trap after the
Roland McGrathdc802c22008-01-30 13:30:53 +0100302 * next single instruction executes. If arch_has_block_step() is defined,
303 * this must clear the effects of user_enable_block_step() too.
Roland McGrathfb7fa8f2008-01-30 13:30:47 +0100304 */
305static inline void user_enable_single_step(struct task_struct *task)
306{
307 BUG(); /* This can never be called. */
308}
309
310/**
311 * user_disable_single_step - cancel user-mode single-step
312 * @task: either current or a task stopped in %TASK_TRACED
313 *
Roland McGrathdc802c22008-01-30 13:30:53 +0100314 * Clear @task of the effects of user_enable_single_step() and
315 * user_enable_block_step(). This can be called whether or not either
316 * of those was ever called on @task, and even if arch_has_single_step()
317 * returned zero.
Roland McGrathfb7fa8f2008-01-30 13:30:47 +0100318 */
319static inline void user_disable_single_step(struct task_struct *task)
320{
321}
Christoph Hellwigdacbe412010-03-10 15:22:46 -0800322#else
323extern void user_enable_single_step(struct task_struct *);
324extern void user_disable_single_step(struct task_struct *);
Roland McGrathfb7fa8f2008-01-30 13:30:47 +0100325#endif /* arch_has_single_step */
326
Roland McGrathdc802c22008-01-30 13:30:53 +0100327#ifndef arch_has_block_step
328/**
329 * arch_has_block_step - does this CPU support user-mode block-step?
330 *
331 * If this is defined, then there must be a function declaration or inline
332 * for user_enable_block_step(), and arch_has_single_step() must be defined
333 * too. arch_has_block_step() should evaluate to nonzero iff the machine
334 * supports step-until-branch for user mode. It can be a constant or it
335 * can test a CPU feature bit.
336 */
Roland McGrath5b88abb2008-01-30 13:30:53 +0100337#define arch_has_block_step() (0)
Roland McGrathdc802c22008-01-30 13:30:53 +0100338
339/**
340 * user_enable_block_step - step until branch in user-mode task
341 * @task: either current or a task stopped in %TASK_TRACED
342 *
343 * This can only be called when arch_has_block_step() has returned nonzero,
344 * and will never be called when single-instruction stepping is being used.
345 * Set @task so that when it returns to user mode, it will trap after the
346 * next branch or trap taken.
347 */
348static inline void user_enable_block_step(struct task_struct *task)
349{
350 BUG(); /* This can never be called. */
351}
Christoph Hellwigdacbe412010-03-10 15:22:46 -0800352#else
353extern void user_enable_block_step(struct task_struct *);
Roland McGrathdc802c22008-01-30 13:30:53 +0100354#endif /* arch_has_block_step */
355
Eric W. Biedermanefc463a2018-04-16 14:18:26 -0500356#ifdef ARCH_HAS_USER_SINGLE_STEP_REPORT
357extern void user_single_step_report(struct pt_regs *regs);
Oleg Nesterov85ec7fd2009-12-15 16:47:17 -0800358#else
Eric W. Biedermanefc463a2018-04-16 14:18:26 -0500359static inline void user_single_step_report(struct pt_regs *regs)
Oleg Nesterov85ec7fd2009-12-15 16:47:17 -0800360{
Eric W. Biedermanae7795b2018-09-25 11:27:20 +0200361 kernel_siginfo_t info;
Eric W. Biedermanefc463a2018-04-16 14:18:26 -0500362 clear_siginfo(&info);
363 info.si_signo = SIGTRAP;
364 info.si_errno = 0;
365 info.si_code = SI_USER;
366 info.si_pid = 0;
367 info.si_uid = 0;
368 force_sig_info(info.si_signo, &info, current);
Oleg Nesterov85ec7fd2009-12-15 16:47:17 -0800369}
370#endif
371
Roland McGrath1a669c22008-02-06 01:37:37 -0800372#ifndef arch_ptrace_stop_needed
373/**
374 * arch_ptrace_stop_needed - Decide whether arch_ptrace_stop() should be called
375 * @code: current->exit_code value ptrace will stop with
376 * @info: siginfo_t pointer (or %NULL) for signal ptrace will stop with
377 *
378 * This is called with the siglock held, to decide whether or not it's
379 * necessary to release the siglock and call arch_ptrace_stop() with the
380 * same @code and @info arguments. It can be defined to a constant if
381 * arch_ptrace_stop() is never required, or always is. On machines where
382 * this makes sense, it should be defined to a quick test to optimize out
383 * calling arch_ptrace_stop() when it would be superfluous. For example,
384 * if the thread has not been back to user mode since the last stop, the
385 * thread state might indicate that nothing needs to be done.
Tejun Heob9cd18d2014-07-03 15:43:15 -0400386 *
387 * This is guaranteed to be invoked once before a task stops for ptrace and
388 * may include arch-specific operations necessary prior to a ptrace stop.
Roland McGrath1a669c22008-02-06 01:37:37 -0800389 */
390#define arch_ptrace_stop_needed(code, info) (0)
391#endif
392
393#ifndef arch_ptrace_stop
394/**
395 * arch_ptrace_stop - Do machine-specific work before stopping for ptrace
396 * @code: current->exit_code value ptrace will stop with
397 * @info: siginfo_t pointer (or %NULL) for signal ptrace will stop with
398 *
399 * This is called with no locks held when arch_ptrace_stop_needed() has
400 * just returned nonzero. It is allowed to block, e.g. for user memory
401 * access. The arch can have machine-specific work to be done before
402 * ptrace stops. On ia64, register backing store gets written back to user
403 * memory here. Since this can be costly (requires dropping the siglock),
404 * we only do it when the arch requires it for this particular stop, as
405 * indicated by arch_ptrace_stop_needed().
406 */
407#define arch_ptrace_stop(code, info) do { } while (0)
408#endif
409
Al Viroa3460a52012-09-30 13:12:36 -0400410#ifndef current_pt_regs
411#define current_pt_regs() task_pt_regs(current)
412#endif
413
Al Viro22062a92012-11-05 13:00:27 -0500414/*
415 * unlike current_pt_regs(), this one is equal to task_pt_regs(current)
416 * on *all* architectures; the only reason to have a per-arch definition
417 * is optimisation.
418 */
419#ifndef signal_pt_regs
420#define signal_pt_regs() task_pt_regs(current)
421#endif
422
Al Viro1ca97bb2012-11-18 12:50:10 -0500423#ifndef current_user_stack_pointer
424#define current_user_stack_pointer() user_stack_pointer(current_pt_regs())
425#endif
426
Roland McGrathbbc69862008-07-25 19:45:59 -0700427extern int task_current_syscall(struct task_struct *target, long *callno,
428 unsigned long args[6], unsigned int maxargs,
429 unsigned long *sp, unsigned long *pc);
430
Yi Wang89f579c2018-11-22 10:04:09 +0800431extern void sigaction_compat_abi(struct k_sigaction *act, struct k_sigaction *oact);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432#endif