forked from mirrors/linux
		
	-----BEGIN PGP SIGNATURE-----
 
 iQJIBAABCAAyFiEES0KozwfymdVUl37v6iDy2pc3iXMFAlzRrzoUHHBhdWxAcGF1
 bC1tb29yZS5jb20ACgkQ6iDy2pc3iXNc7hAApgsi+3Jf9i29mgrKdrTciZ35TegK
 C8pTlOIndpBcmdwDakR50/PgfMHdHll8M9TReVNEjbe0S+Ww5GTE7eWtL3YqoPC2
 MuXEqcriz6UNi5Xma6vCZrDznWLXkXnzMDoDoYGDSoKuUYxef0fuqxDBnERM60Ht
 s52+0XvR5ZseBw7I1KIv/ix2fXuCGq6eCdqassm0rvLPQ7bq6nWzFAlNXOLud303
 DjIWu6Op2EL0+fJSmG+9Z76zFjyEbhMIhw5OPDeH4eO3pxX29AIv0m0JlI7ZXxfc
 /VVC3r5G4WrsWxwKMstOokbmsQxZ5pB3ZaceYpco7U+9N2e3SlpsNM9TV+Y/0ac/
 ynhYa//GK195LpMXx1BmWmLpjBHNgL8MvQkVTIpDia0GT+5sX7+haDxNLGYbocmw
 A/mR+KM2jAU3QzNseGh6c659j3K4tbMIFMNxt7pUBxVPLafcccNngFGTpzCwu5GU
 b7y4d21g6g/3Irj14NYU/qS8dTjW0rYrCMDquTpxmMfZ2xYuSvQmnBw91NQzVBp2
 98L2/fsUG3yOa5MApgv+ryJySsIM+SW+7leKS5tjy/IJINzyPEZ85l3o8ck8X4eT
 nohpKc/ELmeyi3omFYq18ecvFf2YRS5jRnz89i9q65/3ESgGiC0wyGOhNTvjvsyv
 k4jT0slIK614aGk=
 =p8Fp
 -----END PGP SIGNATURE-----
Merge tag 'audit-pr-20190507' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit
Pull audit updates from Paul Moore:
 "We've got a reasonably broad set of audit patches for the v5.2 merge
  window, the highlights are below:
   - The biggest change, and the source of all the arch/* changes, is
     the patchset from Dmitry to help enable some of the work he is
     doing around PTRACE_GET_SYSCALL_INFO.
     To be honest, including this in the audit tree is a bit of a
     stretch, but it does help move audit a little further along towards
     proper syscall auditing for all arches, and everyone else seemed to
     agree that audit was a "good" spot for this to land (or maybe they
     just didn't want to merge it? dunno.).
   - We can now audit time/NTP adjustments.
   - We continue the work to connect associated audit records into a
     single event"
* tag 'audit-pr-20190507' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit: (21 commits)
  audit: fix a memory leak bug
  ntp: Audit NTP parameters adjustment
  timekeeping: Audit clock adjustments
  audit: purge unnecessary list_empty calls
  audit: link integrity evm_write_xattrs record to syscall event
  syscall_get_arch: add "struct task_struct *" argument
  unicore32: define syscall_get_arch()
  Move EM_UNICORE to uapi/linux/elf-em.h
  nios2: define syscall_get_arch()
  nds32: define syscall_get_arch()
  Move EM_NDS32 to uapi/linux/elf-em.h
  m68k: define syscall_get_arch()
  hexagon: define syscall_get_arch()
  Move EM_HEXAGON to uapi/linux/elf-em.h
  h8300: define syscall_get_arch()
  c6x: define syscall_get_arch()
  arc: define syscall_get_arch()
  Move EM_ARCOMPACT and EM_ARCV2 to uapi/linux/elf-em.h
  audit: Make audit_log_cap and audit_copy_inode static
  audit: connect LOGIN record to its syscall record
  ...
		
	
			
		
			
				
	
	
		
			142 lines
		
	
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			142 lines
		
	
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* SPDX-License-Identifier: GPL-2.0 */
 | 
						|
#ifndef __ASM_SPARC_SYSCALL_H
 | 
						|
#define __ASM_SPARC_SYSCALL_H
 | 
						|
 | 
						|
#include <uapi/linux/audit.h>
 | 
						|
#include <linux/kernel.h>
 | 
						|
#include <linux/compat.h>
 | 
						|
#include <linux/sched.h>
 | 
						|
#include <asm/ptrace.h>
 | 
						|
#include <asm/thread_info.h>
 | 
						|
 | 
						|
/*
 | 
						|
 * The syscall table always contains 32 bit pointers since we know that the
 | 
						|
 * address of the function to be called is (way) below 4GB.  So the "int"
 | 
						|
 * type here is what we want [need] for both 32 bit and 64 bit systems.
 | 
						|
 */
 | 
						|
extern const unsigned int sys_call_table[];
 | 
						|
 | 
						|
/* The system call number is given by the user in %g1 */
 | 
						|
static inline long syscall_get_nr(struct task_struct *task,
 | 
						|
				  struct pt_regs *regs)
 | 
						|
{
 | 
						|
	int syscall_p = pt_regs_is_syscall(regs);
 | 
						|
 | 
						|
	return (syscall_p ? regs->u_regs[UREG_G1] : -1L);
 | 
						|
}
 | 
						|
 | 
						|
static inline void syscall_rollback(struct task_struct *task,
 | 
						|
				    struct pt_regs *regs)
 | 
						|
{
 | 
						|
	/* XXX This needs some thought.  On Sparc we don't
 | 
						|
	 * XXX save away the original %o0 value somewhere.
 | 
						|
	 * XXX Instead we hold it in register %l5 at the top
 | 
						|
	 * XXX level trap frame and pass this down to the signal
 | 
						|
	 * XXX dispatch code which is the only place that value
 | 
						|
	 * XXX ever was needed.
 | 
						|
	 */
 | 
						|
}
 | 
						|
 | 
						|
#ifdef CONFIG_SPARC32
 | 
						|
static inline bool syscall_has_error(struct pt_regs *regs)
 | 
						|
{
 | 
						|
	return (regs->psr & PSR_C) ? true : false;
 | 
						|
}
 | 
						|
static inline void syscall_set_error(struct pt_regs *regs)
 | 
						|
{
 | 
						|
	regs->psr |= PSR_C;
 | 
						|
}
 | 
						|
static inline void syscall_clear_error(struct pt_regs *regs)
 | 
						|
{
 | 
						|
	regs->psr &= ~PSR_C;
 | 
						|
}
 | 
						|
#else
 | 
						|
static inline bool syscall_has_error(struct pt_regs *regs)
 | 
						|
{
 | 
						|
	return (regs->tstate & (TSTATE_XCARRY | TSTATE_ICARRY)) ? true : false;
 | 
						|
}
 | 
						|
static inline void syscall_set_error(struct pt_regs *regs)
 | 
						|
{
 | 
						|
	regs->tstate |= (TSTATE_XCARRY | TSTATE_ICARRY);
 | 
						|
}
 | 
						|
static inline void syscall_clear_error(struct pt_regs *regs)
 | 
						|
{
 | 
						|
	regs->tstate &= ~(TSTATE_XCARRY | TSTATE_ICARRY);
 | 
						|
}
 | 
						|
#endif
 | 
						|
 | 
						|
static inline long syscall_get_error(struct task_struct *task,
 | 
						|
				     struct pt_regs *regs)
 | 
						|
{
 | 
						|
	long val = regs->u_regs[UREG_I0];
 | 
						|
 | 
						|
	return (syscall_has_error(regs) ? -val : 0);
 | 
						|
}
 | 
						|
 | 
						|
static inline long syscall_get_return_value(struct task_struct *task,
 | 
						|
					    struct pt_regs *regs)
 | 
						|
{
 | 
						|
	long val = regs->u_regs[UREG_I0];
 | 
						|
 | 
						|
	return val;
 | 
						|
}
 | 
						|
 | 
						|
static inline void syscall_set_return_value(struct task_struct *task,
 | 
						|
					    struct pt_regs *regs,
 | 
						|
					    int error, long val)
 | 
						|
{
 | 
						|
	if (error) {
 | 
						|
		syscall_set_error(regs);
 | 
						|
		regs->u_regs[UREG_I0] = -error;
 | 
						|
	} else {
 | 
						|
		syscall_clear_error(regs);
 | 
						|
		regs->u_regs[UREG_I0] = val;
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static inline void syscall_get_arguments(struct task_struct *task,
 | 
						|
					 struct pt_regs *regs,
 | 
						|
					 unsigned long *args)
 | 
						|
{
 | 
						|
	int zero_extend = 0;
 | 
						|
	unsigned int j;
 | 
						|
	unsigned int n = 6;
 | 
						|
 | 
						|
#ifdef CONFIG_SPARC64
 | 
						|
	if (test_tsk_thread_flag(task, TIF_32BIT))
 | 
						|
		zero_extend = 1;
 | 
						|
#endif
 | 
						|
 | 
						|
	for (j = 0; j < n; j++) {
 | 
						|
		unsigned long val = regs->u_regs[UREG_I0 + j];
 | 
						|
 | 
						|
		if (zero_extend)
 | 
						|
			args[j] = (u32) val;
 | 
						|
		else
 | 
						|
			args[j] = val;
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static inline void syscall_set_arguments(struct task_struct *task,
 | 
						|
					 struct pt_regs *regs,
 | 
						|
					 const unsigned long *args)
 | 
						|
{
 | 
						|
	unsigned int i;
 | 
						|
 | 
						|
	for (i = 0; i < 6; i++)
 | 
						|
		regs->u_regs[UREG_I0 + i] = args[i];
 | 
						|
}
 | 
						|
 | 
						|
static inline int syscall_get_arch(struct task_struct *task)
 | 
						|
{
 | 
						|
#if defined(CONFIG_SPARC64) && defined(CONFIG_COMPAT)
 | 
						|
	return test_tsk_thread_flag(task, TIF_32BIT)
 | 
						|
		? AUDIT_ARCH_SPARC : AUDIT_ARCH_SPARC64;
 | 
						|
#elif defined(CONFIG_SPARC64)
 | 
						|
	return AUDIT_ARCH_SPARC64;
 | 
						|
#else
 | 
						|
	return AUDIT_ARCH_SPARC;
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
#endif /* __ASM_SPARC_SYSCALL_H */
 |