1
linux/arch/mips/kernel/syscalls/syscall_n64.tbl
Jeff Xu ff388fe5c4 mseal: wire up mseal syscall
Patch series "Introduce mseal", v10.

This patchset proposes a new mseal() syscall for the Linux kernel.

In a nutshell, mseal() protects the VMAs of a given virtual memory range
against modifications, such as changes to their permission bits.

Modern CPUs support memory permissions, such as the read/write (RW) and
no-execute (NX) bits.  Linux has supported NX since the release of kernel
version 2.6.8 in August 2004 [1].  The memory permission feature improves
the security stance on memory corruption bugs, as an attacker cannot
simply write to arbitrary memory and point the code to it.  The memory
must be marked with the X bit, or else an exception will occur. 
Internally, the kernel maintains the memory permissions in a data
structure called VMA (vm_area_struct).  mseal() additionally protects the
VMA itself against modifications of the selected seal type.

Memory sealing is useful to mitigate memory corruption issues where a
corrupted pointer is passed to a memory management system.  For example,
such an attacker primitive can break control-flow integrity guarantees
since read-only memory that is supposed to be trusted can become writable
or .text pages can get remapped.  Memory sealing can automatically be
applied by the runtime loader to seal .text and .rodata pages and
applications can additionally seal security critical data at runtime.  A
similar feature already exists in the XNU kernel with the
VM_FLAGS_PERMANENT [3] flag and on OpenBSD with the mimmutable syscall
[4].  Also, Chrome wants to adopt this feature for their CFI work [2] and
this patchset has been designed to be compatible with the Chrome use case.

Two system calls are involved in sealing the map:  mmap() and mseal().

The new mseal() is an syscall on 64 bit CPU, and with following signature:

int mseal(void addr, size_t len, unsigned long flags)
addr/len: memory range.
flags: reserved.

mseal() blocks following operations for the given memory range.

1> Unmapping, moving to another location, and shrinking the size,
   via munmap() and mremap(), can leave an empty space, therefore can
   be replaced with a VMA with a new set of attributes.

2> Moving or expanding a different VMA into the current location,
   via mremap().

3> Modifying a VMA via mmap(MAP_FIXED).

4> Size expansion, via mremap(), does not appear to pose any specific
   risks to sealed VMAs. It is included anyway because the use case is
   unclear. In any case, users can rely on merging to expand a sealed VMA.

5> mprotect() and pkey_mprotect().

6> Some destructive madvice() behaviors (e.g. MADV_DONTNEED) for anonymous
   memory, when users don't have write permission to the memory. Those
   behaviors can alter region contents by discarding pages, effectively a
   memset(0) for anonymous memory.

The idea that inspired this patch comes from Stephen Röttger’s work in
V8 CFI [5].  Chrome browser in ChromeOS will be the first user of this
API.

Indeed, the Chrome browser has very specific requirements for sealing,
which are distinct from those of most applications.  For example, in the
case of libc, sealing is only applied to read-only (RO) or read-execute
(RX) memory segments (such as .text and .RELRO) to prevent them from
becoming writable, the lifetime of those mappings are tied to the lifetime
of the process.

Chrome wants to seal two large address space reservations that are managed
by different allocators.  The memory is mapped RW- and RWX respectively
but write access to it is restricted using pkeys (or in the future ARM
permission overlay extensions).  The lifetime of those mappings are not
tied to the lifetime of the process, therefore, while the memory is
sealed, the allocators still need to free or discard the unused memory. 
For example, with madvise(DONTNEED).

However, always allowing madvise(DONTNEED) on this range poses a security
risk.  For example if a jump instruction crosses a page boundary and the
second page gets discarded, it will overwrite the target bytes with zeros
and change the control flow.  Checking write-permission before the discard
operation allows us to control when the operation is valid.  In this case,
the madvise will only succeed if the executing thread has PKEY write
permissions and PKRU changes are protected in software by control-flow
integrity.

Although the initial version of this patch series is targeting the Chrome
browser as its first user, it became evident during upstream discussions
that we would also want to ensure that the patch set eventually is a
complete solution for memory sealing and compatible with other use cases. 
The specific scenario currently in mind is glibc's use case of loading and
sealing ELF executables.  To this end, Stephen is working on a change to
glibc to add sealing support to the dynamic linker, which will seal all
non-writable segments at startup.  Once this work is completed, all
applications will be able to automatically benefit from these new
protections.

In closing, I would like to formally acknowledge the valuable
contributions received during the RFC process, which were instrumental in
shaping this patch:

Jann Horn: raising awareness and providing valuable insights on the
  destructive madvise operations.
Liam R. Howlett: perf optimization.
Linus Torvalds: assisting in defining system call signature and scope.
Theo de Raadt: sharing the experiences and insight gained from
  implementing mimmutable() in OpenBSD.

MM perf benchmarks
==================
This patch adds a loop in the mprotect/munmap/madvise(DONTNEED) to
check the VMAs’ sealing flag, so that no partial update can be made,
when any segment within the given memory range is sealed.

To measure the performance impact of this loop, two tests are developed.
[8]

The first is measuring the time taken for a particular system call,
by using clock_gettime(CLOCK_MONOTONIC). The second is using
PERF_COUNT_HW_REF_CPU_CYCLES (exclude user space). Both tests have
similar results.

The tests have roughly below sequence:
for (i = 0; i < 1000, i++)
    create 1000 mappings (1 page per VMA)
    start the sampling
    for (j = 0; j < 1000, j++)
        mprotect one mapping
    stop and save the sample
    delete 1000 mappings
calculates all samples.

Below tests are performed on Intel(R) Pentium(R) Gold 7505 @ 2.00GHz,
4G memory, Chromebook.

Based on the latest upstream code:
The first test (measuring time)
syscall__	vmas	t	t_mseal	delta_ns	per_vma	%
munmap__  	1	909	944	35	35	104%
munmap__  	2	1398	1502	104	52	107%
munmap__  	4	2444	2594	149	37	106%
munmap__  	8	4029	4323	293	37	107%
munmap__  	16	6647	6935	288	18	104%
munmap__  	32	11811	12398	587	18	105%
mprotect	1	439	465	26	26	106%
mprotect	2	1659	1745	86	43	105%
mprotect	4	3747	3889	142	36	104%
mprotect	8	6755	6969	215	27	103%
mprotect	16	13748	14144	396	25	103%
mprotect	32	27827	28969	1142	36	104%
madvise_	1	240	262	22	22	109%
madvise_	2	366	442	76	38	121%
madvise_	4	623	751	128	32	121%
madvise_	8	1110	1324	215	27	119%
madvise_	16	2127	2451	324	20	115%
madvise_	32	4109	4642	534	17	113%

The second test (measuring cpu cycle)
syscall__	vmas	cpu	cmseal	delta_cpu	per_vma	%
munmap__	1	1790	1890	100	100	106%
munmap__	2	2819	3033	214	107	108%
munmap__	4	4959	5271	312	78	106%
munmap__	8	8262	8745	483	60	106%
munmap__	16	13099	14116	1017	64	108%
munmap__	32	23221	24785	1565	49	107%
mprotect	1	906	967	62	62	107%
mprotect	2	3019	3203	184	92	106%
mprotect	4	6149	6569	420	105	107%
mprotect	8	9978	10524	545	68	105%
mprotect	16	20448	21427	979	61	105%
mprotect	32	40972	42935	1963	61	105%
madvise_	1	434	497	63	63	115%
madvise_	2	752	899	147	74	120%
madvise_	4	1313	1513	200	50	115%
madvise_	8	2271	2627	356	44	116%
madvise_	16	4312	4883	571	36	113%
madvise_	32	8376	9319	943	29	111%

Based on the result, for 6.8 kernel, sealing check adds
20-40 nano seconds, or around 50-100 CPU cycles, per VMA.

In addition, I applied the sealing to 5.10 kernel:
The first test (measuring time)
syscall__	vmas	t	tmseal	delta_ns	per_vma	%
munmap__	1	357	390	33	33	109%
munmap__	2	442	463	21	11	105%
munmap__	4	614	634	20	5	103%
munmap__	8	1017	1137	120	15	112%
munmap__	16	1889	2153	263	16	114%
munmap__	32	4109	4088	-21	-1	99%
mprotect	1	235	227	-7	-7	97%
mprotect	2	495	464	-30	-15	94%
mprotect	4	741	764	24	6	103%
mprotect	8	1434	1437	2	0	100%
mprotect	16	2958	2991	33	2	101%
mprotect	32	6431	6608	177	6	103%
madvise_	1	191	208	16	16	109%
madvise_	2	300	324	24	12	108%
madvise_	4	450	473	23	6	105%
madvise_	8	753	806	53	7	107%
madvise_	16	1467	1592	125	8	108%
madvise_	32	2795	3405	610	19	122%
					
The second test (measuring cpu cycle)
syscall__	nbr_vma	cpu	cmseal	delta_cpu	per_vma	%
munmap__	1	684	715	31	31	105%
munmap__	2	861	898	38	19	104%
munmap__	4	1183	1235	51	13	104%
munmap__	8	1999	2045	46	6	102%
munmap__	16	3839	3816	-23	-1	99%
munmap__	32	7672	7887	216	7	103%
mprotect	1	397	443	46	46	112%
mprotect	2	738	788	50	25	107%
mprotect	4	1221	1256	35	9	103%
mprotect	8	2356	2429	72	9	103%
mprotect	16	4961	4935	-26	-2	99%
mprotect	32	9882	10172	291	9	103%
madvise_	1	351	380	29	29	108%
madvise_	2	565	615	49	25	109%
madvise_	4	872	933	61	15	107%
madvise_	8	1508	1640	132	16	109%
madvise_	16	3078	3323	245	15	108%
madvise_	32	5893	6704	811	25	114%

For 5.10 kernel, sealing check adds 0-15 ns in time, or 10-30
CPU cycles, there is even decrease in some cases.

It might be interesting to compare 5.10 and 6.8 kernel
The first test (measuring time)
syscall__	vmas	t_5_10	t_6_8	delta_ns	per_vma	%
munmap__	1	357	909	552	552	254%
munmap__	2	442	1398	956	478	316%
munmap__	4	614	2444	1830	458	398%
munmap__	8	1017	4029	3012	377	396%
munmap__	16	1889	6647	4758	297	352%
munmap__	32	4109	11811	7702	241	287%
mprotect	1	235	439	204	204	187%
mprotect	2	495	1659	1164	582	335%
mprotect	4	741	3747	3006	752	506%
mprotect	8	1434	6755	5320	665	471%
mprotect	16	2958	13748	10790	674	465%
mprotect	32	6431	27827	21397	669	433%
madvise_	1	191	240	49	49	125%
madvise_	2	300	366	67	33	122%
madvise_	4	450	623	173	43	138%
madvise_	8	753	1110	357	45	147%
madvise_	16	1467	2127	660	41	145%
madvise_	32	2795	4109	1314	41	147%

The second test (measuring cpu cycle)
syscall__	vmas	cpu_5_10	c_6_8	delta_cpu	per_vma	%
munmap__	1	684	1790	1106	1106	262%
munmap__	2	861	2819	1958	979	327%
munmap__	4	1183	4959	3776	944	419%
munmap__	8	1999	8262	6263	783	413%
munmap__	16	3839	13099	9260	579	341%
munmap__	32	7672	23221	15549	486	303%
mprotect	1	397	906	509	509	228%
mprotect	2	738	3019	2281	1140	409%
mprotect	4	1221	6149	4929	1232	504%
mprotect	8	2356	9978	7622	953	423%
mprotect	16	4961	20448	15487	968	412%
mprotect	32	9882	40972	31091	972	415%
madvise_	1	351	434	82	82	123%
madvise_	2	565	752	186	93	133%
madvise_	4	872	1313	442	110	151%
madvise_	8	1508	2271	763	95	151%
madvise_	16	3078	4312	1234	77	140%
madvise_	32	5893	8376	2483	78	142%

From 5.10 to 6.8
munmap: added 250-550 ns in time, or 500-1100 in cpu cycle, per vma.
mprotect: added 200-750 ns in time, or 500-1200 in cpu cycle, per vma.
madvise: added 33-50 ns in time, or 70-110 in cpu cycle, per vma.

In comparison to mseal, which adds 20-40 ns or 50-100 CPU cycles, the
increase from 5.10 to 6.8 is significantly larger, approximately ten times
greater for munmap and mprotect.

When I discuss the mm performance with Brian Makin, an engineer who worked
on performance, it was brought to my attention that such performance
benchmarks, which measuring millions of mm syscall in a tight loop, may
not accurately reflect real-world scenarios, such as that of a database
service.  Also this is tested using a single HW and ChromeOS, the data
from another HW or distribution might be different.  It might be best to
take this data with a grain of salt.


This patch (of 5):

Wire up mseal syscall for all architectures.

Link: https://lkml.kernel.org/r/20240415163527.626541-1-jeffxu@chromium.org
Link: https://lkml.kernel.org/r/20240415163527.626541-2-jeffxu@chromium.org
Signed-off-by: Jeff Xu <jeffxu@chromium.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Liam R. Howlett <Liam.Howlett@oracle.com>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Guenter Roeck <groeck@chromium.org>
Cc: Jann Horn <jannh@google.com> [Bug #2]
Cc: Jeff Xu <jeffxu@google.com>
Cc: Jonathan Corbet <corbet@lwn.net>
Cc: Jorge Lucangeli Obes <jorgelo@chromium.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Matthew Wilcox (Oracle) <willy@infradead.org>
Cc: Muhammad Usama Anjum <usama.anjum@collabora.com>
Cc: Pedro Falcato <pedro.falcato@gmail.com>
Cc: Stephen Röttger <sroettger@google.com>
Cc: Suren Baghdasaryan <surenb@google.com>
Cc: Amer Al Shanawany <amer.shanawany@gmail.com>
Cc: Javier Carrasco <javier.carrasco.cruz@gmail.com>
Cc: Shuah Khan <shuah@kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
2024-05-23 19:40:26 -07:00

380 lines
13 KiB
Plaintext

# SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note
#
# system call numbers and entry vectors for mips
#
# The format is:
# <number> <abi> <name> <entry point>
#
# The <abi> is always "n64" for this file.
#
0 n64 read sys_read
1 n64 write sys_write
2 n64 open sys_open
3 n64 close sys_close
4 n64 stat sys_newstat
5 n64 fstat sys_newfstat
6 n64 lstat sys_newlstat
7 n64 poll sys_poll
8 n64 lseek sys_lseek
9 n64 mmap sys_mips_mmap
10 n64 mprotect sys_mprotect
11 n64 munmap sys_munmap
12 n64 brk sys_brk
13 n64 rt_sigaction sys_rt_sigaction
14 n64 rt_sigprocmask sys_rt_sigprocmask
15 n64 ioctl sys_ioctl
16 n64 pread64 sys_pread64
17 n64 pwrite64 sys_pwrite64
18 n64 readv sys_readv
19 n64 writev sys_writev
20 n64 access sys_access
21 n64 pipe sysm_pipe
22 n64 _newselect sys_select
23 n64 sched_yield sys_sched_yield
24 n64 mremap sys_mremap
25 n64 msync sys_msync
26 n64 mincore sys_mincore
27 n64 madvise sys_madvise
28 n64 shmget sys_shmget
29 n64 shmat sys_shmat
30 n64 shmctl sys_old_shmctl
31 n64 dup sys_dup
32 n64 dup2 sys_dup2
33 n64 pause sys_pause
34 n64 nanosleep sys_nanosleep
35 n64 getitimer sys_getitimer
36 n64 setitimer sys_setitimer
37 n64 alarm sys_alarm
38 n64 getpid sys_getpid
39 n64 sendfile sys_sendfile64
40 n64 socket sys_socket
41 n64 connect sys_connect
42 n64 accept sys_accept
43 n64 sendto sys_sendto
44 n64 recvfrom sys_recvfrom
45 n64 sendmsg sys_sendmsg
46 n64 recvmsg sys_recvmsg
47 n64 shutdown sys_shutdown
48 n64 bind sys_bind
49 n64 listen sys_listen
50 n64 getsockname sys_getsockname
51 n64 getpeername sys_getpeername
52 n64 socketpair sys_socketpair
53 n64 setsockopt sys_setsockopt
54 n64 getsockopt sys_getsockopt
55 n64 clone __sys_clone
56 n64 fork __sys_fork
57 n64 execve sys_execve
58 n64 exit sys_exit
59 n64 wait4 sys_wait4
60 n64 kill sys_kill
61 n64 uname sys_newuname
62 n64 semget sys_semget
63 n64 semop sys_semop
64 n64 semctl sys_old_semctl
65 n64 shmdt sys_shmdt
66 n64 msgget sys_msgget
67 n64 msgsnd sys_msgsnd
68 n64 msgrcv sys_msgrcv
69 n64 msgctl sys_old_msgctl
70 n64 fcntl sys_fcntl
71 n64 flock sys_flock
72 n64 fsync sys_fsync
73 n64 fdatasync sys_fdatasync
74 n64 truncate sys_truncate
75 n64 ftruncate sys_ftruncate
76 n64 getdents sys_getdents
77 n64 getcwd sys_getcwd
78 n64 chdir sys_chdir
79 n64 fchdir sys_fchdir
80 n64 rename sys_rename
81 n64 mkdir sys_mkdir
82 n64 rmdir sys_rmdir
83 n64 creat sys_creat
84 n64 link sys_link
85 n64 unlink sys_unlink
86 n64 symlink sys_symlink
87 n64 readlink sys_readlink
88 n64 chmod sys_chmod
89 n64 fchmod sys_fchmod
90 n64 chown sys_chown
91 n64 fchown sys_fchown
92 n64 lchown sys_lchown
93 n64 umask sys_umask
94 n64 gettimeofday sys_gettimeofday
95 n64 getrlimit sys_getrlimit
96 n64 getrusage sys_getrusage
97 n64 sysinfo sys_sysinfo
98 n64 times sys_times
99 n64 ptrace sys_ptrace
100 n64 getuid sys_getuid
101 n64 syslog sys_syslog
102 n64 getgid sys_getgid
103 n64 setuid sys_setuid
104 n64 setgid sys_setgid
105 n64 geteuid sys_geteuid
106 n64 getegid sys_getegid
107 n64 setpgid sys_setpgid
108 n64 getppid sys_getppid
109 n64 getpgrp sys_getpgrp
110 n64 setsid sys_setsid
111 n64 setreuid sys_setreuid
112 n64 setregid sys_setregid
113 n64 getgroups sys_getgroups
114 n64 setgroups sys_setgroups
115 n64 setresuid sys_setresuid
116 n64 getresuid sys_getresuid
117 n64 setresgid sys_setresgid
118 n64 getresgid sys_getresgid
119 n64 getpgid sys_getpgid
120 n64 setfsuid sys_setfsuid
121 n64 setfsgid sys_setfsgid
122 n64 getsid sys_getsid
123 n64 capget sys_capget
124 n64 capset sys_capset
125 n64 rt_sigpending sys_rt_sigpending
126 n64 rt_sigtimedwait sys_rt_sigtimedwait
127 n64 rt_sigqueueinfo sys_rt_sigqueueinfo
128 n64 rt_sigsuspend sys_rt_sigsuspend
129 n64 sigaltstack sys_sigaltstack
130 n64 utime sys_utime
131 n64 mknod sys_mknod
132 n64 personality sys_personality
133 n64 ustat sys_ustat
134 n64 statfs sys_statfs
135 n64 fstatfs sys_fstatfs
136 n64 sysfs sys_sysfs
137 n64 getpriority sys_getpriority
138 n64 setpriority sys_setpriority
139 n64 sched_setparam sys_sched_setparam
140 n64 sched_getparam sys_sched_getparam
141 n64 sched_setscheduler sys_sched_setscheduler
142 n64 sched_getscheduler sys_sched_getscheduler
143 n64 sched_get_priority_max sys_sched_get_priority_max
144 n64 sched_get_priority_min sys_sched_get_priority_min
145 n64 sched_rr_get_interval sys_sched_rr_get_interval
146 n64 mlock sys_mlock
147 n64 munlock sys_munlock
148 n64 mlockall sys_mlockall
149 n64 munlockall sys_munlockall
150 n64 vhangup sys_vhangup
151 n64 pivot_root sys_pivot_root
152 n64 _sysctl sys_ni_syscall
153 n64 prctl sys_prctl
154 n64 adjtimex sys_adjtimex
155 n64 setrlimit sys_setrlimit
156 n64 chroot sys_chroot
157 n64 sync sys_sync
158 n64 acct sys_acct
159 n64 settimeofday sys_settimeofday
160 n64 mount sys_mount
161 n64 umount2 sys_umount
162 n64 swapon sys_swapon
163 n64 swapoff sys_swapoff
164 n64 reboot sys_reboot
165 n64 sethostname sys_sethostname
166 n64 setdomainname sys_setdomainname
167 n64 create_module sys_ni_syscall
168 n64 init_module sys_init_module
169 n64 delete_module sys_delete_module
170 n64 get_kernel_syms sys_ni_syscall
171 n64 query_module sys_ni_syscall
172 n64 quotactl sys_quotactl
173 n64 nfsservctl sys_ni_syscall
174 n64 getpmsg sys_ni_syscall
175 n64 putpmsg sys_ni_syscall
176 n64 afs_syscall sys_ni_syscall
# 177 reserved for security
177 n64 reserved177 sys_ni_syscall
178 n64 gettid sys_gettid
179 n64 readahead sys_readahead
180 n64 setxattr sys_setxattr
181 n64 lsetxattr sys_lsetxattr
182 n64 fsetxattr sys_fsetxattr
183 n64 getxattr sys_getxattr
184 n64 lgetxattr sys_lgetxattr
185 n64 fgetxattr sys_fgetxattr
186 n64 listxattr sys_listxattr
187 n64 llistxattr sys_llistxattr
188 n64 flistxattr sys_flistxattr
189 n64 removexattr sys_removexattr
190 n64 lremovexattr sys_lremovexattr
191 n64 fremovexattr sys_fremovexattr
192 n64 tkill sys_tkill
193 n64 reserved193 sys_ni_syscall
194 n64 futex sys_futex
195 n64 sched_setaffinity sys_sched_setaffinity
196 n64 sched_getaffinity sys_sched_getaffinity
197 n64 cacheflush sys_cacheflush
198 n64 cachectl sys_cachectl
199 n64 sysmips __sys_sysmips
200 n64 io_setup sys_io_setup
201 n64 io_destroy sys_io_destroy
202 n64 io_getevents sys_io_getevents
203 n64 io_submit sys_io_submit
204 n64 io_cancel sys_io_cancel
205 n64 exit_group sys_exit_group
206 n64 lookup_dcookie sys_ni_syscall
207 n64 epoll_create sys_epoll_create
208 n64 epoll_ctl sys_epoll_ctl
209 n64 epoll_wait sys_epoll_wait
210 n64 remap_file_pages sys_remap_file_pages
211 n64 rt_sigreturn sys_rt_sigreturn
212 n64 set_tid_address sys_set_tid_address
213 n64 restart_syscall sys_restart_syscall
214 n64 semtimedop sys_semtimedop
215 n64 fadvise64 sys_fadvise64_64
216 n64 timer_create sys_timer_create
217 n64 timer_settime sys_timer_settime
218 n64 timer_gettime sys_timer_gettime
219 n64 timer_getoverrun sys_timer_getoverrun
220 n64 timer_delete sys_timer_delete
221 n64 clock_settime sys_clock_settime
222 n64 clock_gettime sys_clock_gettime
223 n64 clock_getres sys_clock_getres
224 n64 clock_nanosleep sys_clock_nanosleep
225 n64 tgkill sys_tgkill
226 n64 utimes sys_utimes
227 n64 mbind sys_mbind
228 n64 get_mempolicy sys_get_mempolicy
229 n64 set_mempolicy sys_set_mempolicy
230 n64 mq_open sys_mq_open
231 n64 mq_unlink sys_mq_unlink
232 n64 mq_timedsend sys_mq_timedsend
233 n64 mq_timedreceive sys_mq_timedreceive
234 n64 mq_notify sys_mq_notify
235 n64 mq_getsetattr sys_mq_getsetattr
236 n64 vserver sys_ni_syscall
237 n64 waitid sys_waitid
# 238 was sys_setaltroot
239 n64 add_key sys_add_key
240 n64 request_key sys_request_key
241 n64 keyctl sys_keyctl
242 n64 set_thread_area sys_set_thread_area
243 n64 inotify_init sys_inotify_init
244 n64 inotify_add_watch sys_inotify_add_watch
245 n64 inotify_rm_watch sys_inotify_rm_watch
246 n64 migrate_pages sys_migrate_pages
247 n64 openat sys_openat
248 n64 mkdirat sys_mkdirat
249 n64 mknodat sys_mknodat
250 n64 fchownat sys_fchownat
251 n64 futimesat sys_futimesat
252 n64 newfstatat sys_newfstatat
253 n64 unlinkat sys_unlinkat
254 n64 renameat sys_renameat
255 n64 linkat sys_linkat
256 n64 symlinkat sys_symlinkat
257 n64 readlinkat sys_readlinkat
258 n64 fchmodat sys_fchmodat
259 n64 faccessat sys_faccessat
260 n64 pselect6 sys_pselect6
261 n64 ppoll sys_ppoll
262 n64 unshare sys_unshare
263 n64 splice sys_splice
264 n64 sync_file_range sys_sync_file_range
265 n64 tee sys_tee
266 n64 vmsplice sys_vmsplice
267 n64 move_pages sys_move_pages
268 n64 set_robust_list sys_set_robust_list
269 n64 get_robust_list sys_get_robust_list
270 n64 kexec_load sys_kexec_load
271 n64 getcpu sys_getcpu
272 n64 epoll_pwait sys_epoll_pwait
273 n64 ioprio_set sys_ioprio_set
274 n64 ioprio_get sys_ioprio_get
275 n64 utimensat sys_utimensat
276 n64 signalfd sys_signalfd
277 n64 timerfd sys_ni_syscall
278 n64 eventfd sys_eventfd
279 n64 fallocate sys_fallocate
280 n64 timerfd_create sys_timerfd_create
281 n64 timerfd_gettime sys_timerfd_gettime
282 n64 timerfd_settime sys_timerfd_settime
283 n64 signalfd4 sys_signalfd4
284 n64 eventfd2 sys_eventfd2
285 n64 epoll_create1 sys_epoll_create1
286 n64 dup3 sys_dup3
287 n64 pipe2 sys_pipe2
288 n64 inotify_init1 sys_inotify_init1
289 n64 preadv sys_preadv
290 n64 pwritev sys_pwritev
291 n64 rt_tgsigqueueinfo sys_rt_tgsigqueueinfo
292 n64 perf_event_open sys_perf_event_open
293 n64 accept4 sys_accept4
294 n64 recvmmsg sys_recvmmsg
295 n64 fanotify_init sys_fanotify_init
296 n64 fanotify_mark sys_fanotify_mark
297 n64 prlimit64 sys_prlimit64
298 n64 name_to_handle_at sys_name_to_handle_at
299 n64 open_by_handle_at sys_open_by_handle_at
300 n64 clock_adjtime sys_clock_adjtime
301 n64 syncfs sys_syncfs
302 n64 sendmmsg sys_sendmmsg
303 n64 setns sys_setns
304 n64 process_vm_readv sys_process_vm_readv
305 n64 process_vm_writev sys_process_vm_writev
306 n64 kcmp sys_kcmp
307 n64 finit_module sys_finit_module
308 n64 getdents64 sys_getdents64
309 n64 sched_setattr sys_sched_setattr
310 n64 sched_getattr sys_sched_getattr
311 n64 renameat2 sys_renameat2
312 n64 seccomp sys_seccomp
313 n64 getrandom sys_getrandom
314 n64 memfd_create sys_memfd_create
315 n64 bpf sys_bpf
316 n64 execveat sys_execveat
317 n64 userfaultfd sys_userfaultfd
318 n64 membarrier sys_membarrier
319 n64 mlock2 sys_mlock2
320 n64 copy_file_range sys_copy_file_range
321 n64 preadv2 sys_preadv2
322 n64 pwritev2 sys_pwritev2
323 n64 pkey_mprotect sys_pkey_mprotect
324 n64 pkey_alloc sys_pkey_alloc
325 n64 pkey_free sys_pkey_free
326 n64 statx sys_statx
327 n64 rseq sys_rseq
328 n64 io_pgetevents sys_io_pgetevents
# 329 through 423 are reserved to sync up with other architectures
424 n64 pidfd_send_signal sys_pidfd_send_signal
425 n64 io_uring_setup sys_io_uring_setup
426 n64 io_uring_enter sys_io_uring_enter
427 n64 io_uring_register sys_io_uring_register
428 n64 open_tree sys_open_tree
429 n64 move_mount sys_move_mount
430 n64 fsopen sys_fsopen
431 n64 fsconfig sys_fsconfig
432 n64 fsmount sys_fsmount
433 n64 fspick sys_fspick
434 n64 pidfd_open sys_pidfd_open
435 n64 clone3 __sys_clone3
436 n64 close_range sys_close_range
437 n64 openat2 sys_openat2
438 n64 pidfd_getfd sys_pidfd_getfd
439 n64 faccessat2 sys_faccessat2
440 n64 process_madvise sys_process_madvise
441 n64 epoll_pwait2 sys_epoll_pwait2
442 n64 mount_setattr sys_mount_setattr
443 n64 quotactl_fd sys_quotactl_fd
444 n64 landlock_create_ruleset sys_landlock_create_ruleset
445 n64 landlock_add_rule sys_landlock_add_rule
446 n64 landlock_restrict_self sys_landlock_restrict_self
# 447 reserved for memfd_secret
448 n64 process_mrelease sys_process_mrelease
449 n64 futex_waitv sys_futex_waitv
450 common set_mempolicy_home_node sys_set_mempolicy_home_node
451 n64 cachestat sys_cachestat
452 n64 fchmodat2 sys_fchmodat2
453 n64 map_shadow_stack sys_map_shadow_stack
454 n64 futex_wake sys_futex_wake
455 n64 futex_wait sys_futex_wait
456 n64 futex_requeue sys_futex_requeue
457 n64 statmount sys_statmount
458 n64 listmount sys_listmount
459 n64 lsm_get_self_attr sys_lsm_get_self_attr
460 n64 lsm_set_self_attr sys_lsm_set_self_attr
461 n64 lsm_list_modules sys_lsm_list_modules
462 n64 mseal sys_mseal