1SYSCALL(2)                 Linux Programmer's Manual                SYSCALL(2)
2
3
4

NAME

6       syscall - indirect system call
7

SYNOPSIS

9       #define _GNU_SOURCE         /* See feature_test_macros(7) */
10       #include <unistd.h>
11       #include <sys/syscall.h>   /* For SYS_xxx definitions */
12
13       long syscall(long number, ...);
14

DESCRIPTION

16       syscall()  is  a  small  library  function that invokes the system call
17       whose assembly language interface has the  specified  number  with  the
18       specified  arguments.  Employing syscall() is useful, for example, when
19       invoking a system call that has no wrapper function in the C library.
20
21       syscall() saves CPU registers before making the system  call,  restores
22       the  registers  upon  return from the system call, and stores any error
23       code returned by the system call in errno(3) if an error occurs.
24
25       Symbolic constants for system call numbers can be found in  the  header
26       file <sys/syscall.h>.
27

RETURN VALUE

29       The  return value is defined by the system call being invoked.  In gen‐
30       eral, a 0 return value indicates success.  A -1 return value  indicates
31       an error, and an error code is stored in errno.
32

NOTES

34       syscall() first appeared in 4BSD.
35
36   Architecture-specific requirements
37       Each architecture ABI has its own requirements on how system call argu‐
38       ments are passed to the kernel.  For system calls  that  have  a  glibc
39       wrapper (e.g., most system calls), glibc handles the details of copying
40       arguments to the right registers in a manner suitable for the architec‐
41       ture.   However, when using syscall() to make a system call, the caller
42       might need to handle architecture-dependent details;  this  requirement
43       is most commonly encountered on certain 32-bit architectures.
44
45       For  example,  on  the  ARM  architecture Embedded ABI (EABI), a 64-bit
46       value (e.g., long long) must be  aligned  to  an  even  register  pair.
47       Thus,  using  syscall()  instead  of the wrapper provided by glibc, the
48       readahead() system call would be invoked as follows on the  ARM  archi‐
49       tecture with the EABI in little endian mode:
50
51           syscall(SYS_readahead, fd, 0,
52                   (unsigned int) (offset & 0xFFFFFFFF),
53                   (unsigned int) (offset >> 32),
54                   count);
55
56       Since  the  offset  argument is 64 bits, and the first argument (fd) is
57       passed in r0, the caller must manually split and align the 64-bit value
58       so  that it is passed in the r2/r3 register pair.  That means inserting
59       a dummy value into r1 (the second argument of 0).  Care  also  must  be
60       taken  so that the split follows endian conventions (according to the C
61       ABI for the platform).
62
63       Similar issues can occur on MIPS with the O32 ABI, on PowerPC with  the
64       32-bit ABI, and on Xtensa.
65
66       Note  that  while the parisc C ABI also uses aligned register pairs, it
67       uses a shim layer to hide the issue from user space.
68
69       The  affected  system  calls   are   fadvise64_64(2),   ftruncate64(2),
70       posix_fadvise(2),      pread64(2),      pwrite64(2),      readahead(2),
71       sync_file_range(2), and truncate64(2).
72
73       This does not affect syscalls that manually split and  assemble  64-bit
74       values  such  as  _llseek(2),  preadv(2),  preadv2(2), pwritev(2).  and
75       pwritev2(2).  Welcome to the wonderful world of historical baggage.
76
77   Architecture calling conventions
78       Every architecture has its own way of invoking and passing arguments to
79       the  kernel.   The  details for various architectures are listed in the
80       two tables below.
81
82       The first table lists the instruction used to transition to kernel mode
83       (which  might  not be the fastest or best way to transition to the ker‐
84       nel, so you might have to refer to vdso(7)), the register used to indi‐
85       cate  the  system  call  number, the register used to return the system
86       call result, and the register used to signal an error.
87
88       arch/ABI    instruction           syscall #  retval  error    Notes
89       ────────────────────────────────────────────────────────────────────
90       alpha       callsys               v0         a0      a3       [1]
91       arc         trap0                 r8         r0      -
92       arm/OABI    swi NR                -          a1      -        [2]
93       arm/EABI    swi 0x0               r7         r0      -
94       arm64       svc #0                x8         x0      -
95       blackfin    excpt 0x0             P0         R0      -
96       i386        int $0x80             eax        eax     -
97       ia64        break 0x100000        r15        r8      r10      [1]
98       m68k        trap #0               d0         d0      -
99       microblaze  brki r14,8            r12        r3      -
100       mips        syscall               v0         v0      a3       [1]
101       nios2       trap                  r2         r2      r7
102       parisc      ble 0x100(%sr2, %r0)  r20        r28     -
103       powerpc     sc                    r0         r3      r0       [1]
104       riscv       scall                 a7         a0      -
105       s390        svc 0                 r1         r2      -        [3]
106       s390x       svc 0                 r1         r2      -        [3]
107       superh      trap #0x17            r3         r0      -        [4]
108       sparc/32    t 0x10                g1         o0      psr/csr  [1]
109       sparc/64    t 0x6d                g1         o0      psr/csr  [1]
110       tile        swint1                R10        R00     R01      [1]
111       x86-64      syscall               rax        rax     -        [5]
112       x32         syscall               rax        rax     -        [5]
113       xtensa      syscall               a2         a2      -
114
115       Notes:
116
117           [1] On a few architectures, a register is  used  as  a  boolean  (0
118               indicating no error, and -1 indicating an error) to signal that
119               the system call failed.  The actual error value is  still  con‐
120               tained  in  the return register.  On sparc, the carry bit (csr)
121               in the processor status register (psr) is  used  instead  of  a
122               full register.
123
124           [2] NR is the system call number.
125
126           [3] For  s390  and s390x, NR (the system call number) may be passed
127               directly with svc NR if it is less than 256.
128
129           [4] On SuperH, the trap number controls the maximum number of argu‐
130               ments  passed.   A  trap #0x10 can be used with only 0-argument
131               system calls, a trap #0x11 can be used with  0-  or  1-argument
132               system  calls, and so on up to trap #0x17 for 7-argument system
133               calls.
134
135           [5] The x32 ABI uses the same instruction as the x86-64 ABI and  is
136               used  on  the  same processors.  To differentiate between them,
137               the bit mask __X32_SYSCALL_BIT is bitwise-ORed into the  system
138               call  number  for  system calls under the x32 ABI.  Both system
139               call tables are available though, so setting the bit is  not  a
140               hard requirement.
141
142       The second table shows the registers used to pass the system call argu‐
143       ments.
144
145       arch/ABI      arg1  arg2  arg3  arg4  arg5  arg6  arg7  Notes
146       ──────────────────────────────────────────────────────────────
147       alpha         a0    a1    a2    a3    a4    a5    -
148       arc           r0    r1    r2    r3    r4    r5    -
149       arm/OABI      a1    a2    a3    a4    v1    v2    v3
150       arm/EABI      r0    r1    r2    r3    r4    r5    r6
151       arm64         x0    x1    x2    x3    x4    x5    -
152       blackfin      R0    R1    R2    R3    R4    R5    -
153       i386          ebx   ecx   edx   esi   edi   ebp   -
154       ia64          out0  out1  out2  out3  out4  out5  -
155       m68k          d1    d2    d3    d4    d5    a0    -
156       microblaze    r5    r6    r7    r8    r9    r10   -
157       mips/o32      a0    a1    a2    a3    -     -     -     [1]
158       mips/n32,64   a0    a1    a2    a3    a4    a5    -
159       nios2         r4    r5    r6    r7    r8    r9    -
160       parisc        r26   r25   r24   r23   r22   r21   -
161       powerpc       r3    r4    r5    r6    r7    r8    r9
162       riscv         a0    a1    a2    a3    a4    a5    -
163       s390          r2    r3    r4    r5    r6    r7    -
164       s390x         r2    r3    r4    r5    r6    r7    -
165       superh        r4    r5    r6    r7    r0    r1    r2
166       sparc/32      o0    o1    o2    o3    o4    o5    -
167       sparc/64      o0    o1    o2    o3    o4    o5    -
168       tile          R00   R01   R02   R03   R04   R05   -
169       x86-64        rdi   rsi   rdx   r10   r8    r9    -
170       x32           rdi   rsi   rdx   r10   r8    r9    -
171       xtensa        a6    a3    a4    a5    a8    a9    -
172
173       Notes:
174
175           [1] The mips/o32 system call convention passes arguments 5  through
176               8 on the user stack.
177
178       Note  that  these tables don't cover the entire calling convention—some
179       architectures may indiscriminately clobber other registers  not  listed
180       here.
181

EXAMPLE

183       #define _GNU_SOURCE
184       #include <unistd.h>
185       #include <sys/syscall.h>
186       #include <sys/types.h>
187       #include <signal.h>
188
189       int
190       main(int argc, char *argv[])
191       {
192           pid_t tid;
193
194           tid = syscall(SYS_gettid);
195           syscall(SYS_tgkill, getpid(), tid, SIGHUP);
196       }
197

SEE ALSO

199       _syscall(2), intro(2), syscalls(2), errno(3), vdso(7)
200

COLOPHON

202       This  page  is  part of release 4.16 of the Linux man-pages project.  A
203       description of the project, information about reporting bugs,  and  the
204       latest     version     of     this    page,    can    be    found    at
205       https://www.kernel.org/doc/man-pages/.
206
207
208
209Linux                             2018-04-30                        SYSCALL(2)
Impressum