forked from mirrors/linux
		
	 02aff8db64
			
		
	
	
		02aff8db64
		
	
	
	
	
		
			
			-----BEGIN PGP SIGNATURE-----
 
 iQJIBAABCAAyFiEES0KozwfymdVUl37v6iDy2pc3iXMFAlzRrzoUHHBhdWxAcGF1
 bC1tb29yZS5jb20ACgkQ6iDy2pc3iXNc7hAApgsi+3Jf9i29mgrKdrTciZ35TegK
 C8pTlOIndpBcmdwDakR50/PgfMHdHll8M9TReVNEjbe0S+Ww5GTE7eWtL3YqoPC2
 MuXEqcriz6UNi5Xma6vCZrDznWLXkXnzMDoDoYGDSoKuUYxef0fuqxDBnERM60Ht
 s52+0XvR5ZseBw7I1KIv/ix2fXuCGq6eCdqassm0rvLPQ7bq6nWzFAlNXOLud303
 DjIWu6Op2EL0+fJSmG+9Z76zFjyEbhMIhw5OPDeH4eO3pxX29AIv0m0JlI7ZXxfc
 /VVC3r5G4WrsWxwKMstOokbmsQxZ5pB3ZaceYpco7U+9N2e3SlpsNM9TV+Y/0ac/
 ynhYa//GK195LpMXx1BmWmLpjBHNgL8MvQkVTIpDia0GT+5sX7+haDxNLGYbocmw
 A/mR+KM2jAU3QzNseGh6c659j3K4tbMIFMNxt7pUBxVPLafcccNngFGTpzCwu5GU
 b7y4d21g6g/3Irj14NYU/qS8dTjW0rYrCMDquTpxmMfZ2xYuSvQmnBw91NQzVBp2
 98L2/fsUG3yOa5MApgv+ryJySsIM+SW+7leKS5tjy/IJINzyPEZ85l3o8ck8X4eT
 nohpKc/ELmeyi3omFYq18ecvFf2YRS5jRnz89i9q65/3ESgGiC0wyGOhNTvjvsyv
 k4jT0slIK614aGk=
 =p8Fp
 -----END PGP SIGNATURE-----
Merge tag 'audit-pr-20190507' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit
Pull audit updates from Paul Moore:
 "We've got a reasonably broad set of audit patches for the v5.2 merge
  window, the highlights are below:
   - The biggest change, and the source of all the arch/* changes, is
     the patchset from Dmitry to help enable some of the work he is
     doing around PTRACE_GET_SYSCALL_INFO.
     To be honest, including this in the audit tree is a bit of a
     stretch, but it does help move audit a little further along towards
     proper syscall auditing for all arches, and everyone else seemed to
     agree that audit was a "good" spot for this to land (or maybe they
     just didn't want to merge it? dunno.).
   - We can now audit time/NTP adjustments.
   - We continue the work to connect associated audit records into a
     single event"
* tag 'audit-pr-20190507' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit: (21 commits)
  audit: fix a memory leak bug
  ntp: Audit NTP parameters adjustment
  timekeeping: Audit clock adjustments
  audit: purge unnecessary list_empty calls
  audit: link integrity evm_write_xattrs record to syscall event
  syscall_get_arch: add "struct task_struct *" argument
  unicore32: define syscall_get_arch()
  Move EM_UNICORE to uapi/linux/elf-em.h
  nios2: define syscall_get_arch()
  nds32: define syscall_get_arch()
  Move EM_NDS32 to uapi/linux/elf-em.h
  m68k: define syscall_get_arch()
  hexagon: define syscall_get_arch()
  Move EM_HEXAGON to uapi/linux/elf-em.h
  h8300: define syscall_get_arch()
  c6x: define syscall_get_arch()
  arc: define syscall_get_arch()
  Move EM_ARCOMPACT and EM_ARCV2 to uapi/linux/elf-em.h
  audit: Make audit_log_cap and audit_copy_inode static
  audit: connect LOGIN record to its syscall record
  ...
		
	
			
		
			
				
	
	
		
			111 lines
		
	
	
	
		
			2.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			111 lines
		
	
	
	
		
			2.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Access to user system call parameters and results
 | |
|  *
 | |
|  * Copyright (C) 2008 Red Hat, Inc.  All rights reserved.
 | |
|  *
 | |
|  * This copyrighted material is made available to anyone wishing to use,
 | |
|  * modify, copy, or redistribute it subject to the terms and conditions
 | |
|  * of the GNU General Public License v.2.
 | |
|  *
 | |
|  * See asm-generic/syscall.h for descriptions of what we must do here.
 | |
|  */
 | |
| 
 | |
| #ifndef _ASM_SYSCALL_H
 | |
| #define _ASM_SYSCALL_H	1
 | |
| 
 | |
| #include <uapi/linux/audit.h>
 | |
| #include <linux/sched.h>
 | |
| #include <linux/thread_info.h>
 | |
| 
 | |
| /* ftrace syscalls requires exporting the sys_call_table */
 | |
| extern const unsigned long sys_call_table[];
 | |
| extern const unsigned long compat_sys_call_table[];
 | |
| 
 | |
| static inline int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
 | |
| {
 | |
| 	/*
 | |
| 	 * Note that we are returning an int here. That means 0xffffffff, ie.
 | |
| 	 * 32-bit negative 1, will be interpreted as -1 on a 64-bit kernel.
 | |
| 	 * This is important for seccomp so that compat tasks can set r0 = -1
 | |
| 	 * to reject the syscall.
 | |
| 	 */
 | |
| 	return TRAP(regs) == 0xc00 ? regs->gpr[0] : -1;
 | |
| }
 | |
| 
 | |
| static inline void syscall_rollback(struct task_struct *task,
 | |
| 				    struct pt_regs *regs)
 | |
| {
 | |
| 	regs->gpr[3] = regs->orig_gpr3;
 | |
| }
 | |
| 
 | |
| static inline long syscall_get_return_value(struct task_struct *task,
 | |
| 					    struct pt_regs *regs)
 | |
| {
 | |
| 	return regs->gpr[3];
 | |
| }
 | |
| 
 | |
| static inline void syscall_set_return_value(struct task_struct *task,
 | |
| 					    struct pt_regs *regs,
 | |
| 					    int error, long val)
 | |
| {
 | |
| 	/*
 | |
| 	 * In the general case it's not obvious that we must deal with CCR
 | |
| 	 * here, as the syscall exit path will also do that for us. However
 | |
| 	 * there are some places, eg. the signal code, which check ccr to
 | |
| 	 * decide if the value in r3 is actually an error.
 | |
| 	 */
 | |
| 	if (error) {
 | |
| 		regs->ccr |= 0x10000000L;
 | |
| 		regs->gpr[3] = error;
 | |
| 	} else {
 | |
| 		regs->ccr &= ~0x10000000L;
 | |
| 		regs->gpr[3] = val;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static inline void syscall_get_arguments(struct task_struct *task,
 | |
| 					 struct pt_regs *regs,
 | |
| 					 unsigned long *args)
 | |
| {
 | |
| 	unsigned long val, mask = -1UL;
 | |
| 	unsigned int n = 6;
 | |
| 
 | |
| #ifdef CONFIG_COMPAT
 | |
| 	if (test_tsk_thread_flag(task, TIF_32BIT))
 | |
| 		mask = 0xffffffff;
 | |
| #endif
 | |
| 	while (n--) {
 | |
| 		if (n == 0)
 | |
| 			val = regs->orig_gpr3;
 | |
| 		else
 | |
| 			val = regs->gpr[3 + n];
 | |
| 
 | |
| 		args[n] = val & mask;
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static inline void syscall_set_arguments(struct task_struct *task,
 | |
| 					 struct pt_regs *regs,
 | |
| 					 const unsigned long *args)
 | |
| {
 | |
| 	memcpy(®s->gpr[3], args, 6 * sizeof(args[0]));
 | |
| 
 | |
| 	/* Also copy the first argument into orig_gpr3 */
 | |
| 	regs->orig_gpr3 = args[0];
 | |
| }
 | |
| 
 | |
| static inline int syscall_get_arch(struct task_struct *task)
 | |
| {
 | |
| 	int arch;
 | |
| 
 | |
| 	if (IS_ENABLED(CONFIG_PPC64) && !test_tsk_thread_flag(task, TIF_32BIT))
 | |
| 		arch = AUDIT_ARCH_PPC64;
 | |
| 	else
 | |
| 		arch = AUDIT_ARCH_PPC;
 | |
| 
 | |
| #ifdef __LITTLE_ENDIAN__
 | |
| 	arch |= __AUDIT_ARCH_LE;
 | |
| #endif
 | |
| 	return arch;
 | |
| }
 | |
| #endif	/* _ASM_SYSCALL_H */
 |