Commit b05d8447 authored by Eric Paris's avatar Eric Paris Committed by Al Viro

audit: inline audit_syscall_entry to reduce burden on archs

Every arch calls:

if (unlikely(current->audit_context))
	audit_syscall_entry()

which requires knowledge about audit (the existance of audit_context) in
the arch code.  Just do it all in static inline in audit.h so that arch's
can remain blissfully ignorant.
Signed-off-by: default avatarEric Paris <eparis@redhat.com>
parent f031cd25
...@@ -1246,15 +1246,8 @@ syscall_trace_enter (long arg0, long arg1, long arg2, long arg3, ...@@ -1246,15 +1246,8 @@ syscall_trace_enter (long arg0, long arg1, long arg2, long arg3,
if (test_thread_flag(TIF_RESTORE_RSE)) if (test_thread_flag(TIF_RESTORE_RSE))
ia64_sync_krbs(); ia64_sync_krbs();
if (unlikely(current->audit_context)) {
long syscall;
int arch;
syscall = regs.r15; audit_syscall_entry(AUDIT_ARCH_IA64, regs.r15, arg0, arg1, arg2, arg3);
arch = AUDIT_ARCH_IA64;
audit_syscall_entry(arch, syscall, arg0, arg1, arg2, arg3);
}
return 0; return 0;
} }
......
...@@ -147,9 +147,7 @@ asmlinkage long do_syscall_trace_enter(struct pt_regs *regs) ...@@ -147,9 +147,7 @@ asmlinkage long do_syscall_trace_enter(struct pt_regs *regs)
*/ */
ret = -1L; ret = -1L;
if (unlikely(current->audit_context)) audit_syscall_entry(EM_MICROBLAZE, regs->r12, regs->r5, regs->r6,
audit_syscall_entry(EM_MICROBLAZE, regs->r12,
regs->r5, regs->r6,
regs->r7, regs->r8); regs->r7, regs->r8);
return ret ?: regs->r12; return ret ?: regs->r12;
......
...@@ -560,7 +560,6 @@ asmlinkage void syscall_trace_enter(struct pt_regs *regs) ...@@ -560,7 +560,6 @@ asmlinkage void syscall_trace_enter(struct pt_regs *regs)
} }
out: out:
if (unlikely(current->audit_context))
audit_syscall_entry(audit_arch(), regs->regs[2], audit_syscall_entry(audit_arch(), regs->regs[2],
regs->regs[4], regs->regs[5], regs->regs[4], regs->regs[5],
regs->regs[6], regs->regs[7]); regs->regs[6], regs->regs[7]);
......
...@@ -1724,7 +1724,6 @@ long do_syscall_trace_enter(struct pt_regs *regs) ...@@ -1724,7 +1724,6 @@ long do_syscall_trace_enter(struct pt_regs *regs)
if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT))) if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
trace_sys_enter(regs, regs->gpr[0]); trace_sys_enter(regs, regs->gpr[0]);
if (unlikely(current->audit_context)) {
#ifdef CONFIG_PPC64 #ifdef CONFIG_PPC64
if (!is_32bit_task()) if (!is_32bit_task())
audit_syscall_entry(AUDIT_ARCH_PPC64, audit_syscall_entry(AUDIT_ARCH_PPC64,
...@@ -1739,7 +1738,6 @@ long do_syscall_trace_enter(struct pt_regs *regs) ...@@ -1739,7 +1738,6 @@ long do_syscall_trace_enter(struct pt_regs *regs)
regs->gpr[4] & 0xffffffff, regs->gpr[4] & 0xffffffff,
regs->gpr[5] & 0xffffffff, regs->gpr[5] & 0xffffffff,
regs->gpr[6] & 0xffffffff); regs->gpr[6] & 0xffffffff);
}
return ret ?: regs->gpr[0]; return ret ?: regs->gpr[0];
} }
......
...@@ -740,7 +740,6 @@ asmlinkage long do_syscall_trace_enter(struct pt_regs *regs) ...@@ -740,7 +740,6 @@ asmlinkage long do_syscall_trace_enter(struct pt_regs *regs)
if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT))) if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
trace_sys_enter(regs, regs->gprs[2]); trace_sys_enter(regs, regs->gprs[2]);
if (unlikely(current->audit_context))
audit_syscall_entry(is_compat_task() ? audit_syscall_entry(is_compat_task() ?
AUDIT_ARCH_S390 : AUDIT_ARCH_S390X, AUDIT_ARCH_S390 : AUDIT_ARCH_S390X,
regs->gprs[2], regs->orig_gpr2, regs->gprs[2], regs->orig_gpr2,
......
...@@ -518,7 +518,6 @@ asmlinkage long do_syscall_trace_enter(struct pt_regs *regs) ...@@ -518,7 +518,6 @@ asmlinkage long do_syscall_trace_enter(struct pt_regs *regs)
if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT))) if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
trace_sys_enter(regs, regs->regs[0]); trace_sys_enter(regs, regs->regs[0]);
if (unlikely(current->audit_context))
audit_syscall_entry(audit_arch(), regs->regs[3], audit_syscall_entry(audit_arch(), regs->regs[3],
regs->regs[4], regs->regs[5], regs->regs[4], regs->regs[5],
regs->regs[6], regs->regs[7]); regs->regs[6], regs->regs[7]);
......
...@@ -536,7 +536,6 @@ asmlinkage long long do_syscall_trace_enter(struct pt_regs *regs) ...@@ -536,7 +536,6 @@ asmlinkage long long do_syscall_trace_enter(struct pt_regs *regs)
if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT))) if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
trace_sys_enter(regs, regs->regs[9]); trace_sys_enter(regs, regs->regs[9]);
if (unlikely(current->audit_context))
audit_syscall_entry(audit_arch(), regs->regs[1], audit_syscall_entry(audit_arch(), regs->regs[1],
regs->regs[2], regs->regs[3], regs->regs[2], regs->regs[3],
regs->regs[4], regs->regs[5]); regs->regs[4], regs->regs[5]);
......
...@@ -1071,7 +1071,6 @@ asmlinkage int syscall_trace_enter(struct pt_regs *regs) ...@@ -1071,7 +1071,6 @@ asmlinkage int syscall_trace_enter(struct pt_regs *regs)
if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT))) if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
trace_sys_enter(regs, regs->u_regs[UREG_G1]); trace_sys_enter(regs, regs->u_regs[UREG_G1]);
if (unlikely(current->audit_context) && !ret)
audit_syscall_entry((test_thread_flag(TIF_32BIT) ? audit_syscall_entry((test_thread_flag(TIF_32BIT) ?
AUDIT_ARCH_SPARC : AUDIT_ARCH_SPARC :
AUDIT_ARCH_SPARC64), AUDIT_ARCH_SPARC64),
......
...@@ -167,7 +167,6 @@ void syscall_trace(struct uml_pt_regs *regs, int entryexit) ...@@ -167,7 +167,6 @@ void syscall_trace(struct uml_pt_regs *regs, int entryexit)
int is_singlestep = (current->ptrace & PT_DTRACE) && entryexit; int is_singlestep = (current->ptrace & PT_DTRACE) && entryexit;
int tracesysgood; int tracesysgood;
if (unlikely(current->audit_context)) {
if (!entryexit) if (!entryexit)
audit_syscall_entry(HOST_AUDIT_ARCH, audit_syscall_entry(HOST_AUDIT_ARCH,
UPT_SYSCALL_NR(regs), UPT_SYSCALL_NR(regs),
...@@ -177,7 +176,6 @@ void syscall_trace(struct uml_pt_regs *regs, int entryexit) ...@@ -177,7 +176,6 @@ void syscall_trace(struct uml_pt_regs *regs, int entryexit)
UPT_SYSCALL_ARG4(regs)); UPT_SYSCALL_ARG4(regs));
else else
audit_syscall_exit(regs); audit_syscall_exit(regs);
}
/* Fake a debug trap */ /* Fake a debug trap */
if (is_singlestep) if (is_singlestep)
......
...@@ -192,7 +192,7 @@ sysexit_from_sys_call: ...@@ -192,7 +192,7 @@ sysexit_from_sys_call:
movl %ebx,%edx /* 3rd arg: 1st syscall arg */ movl %ebx,%edx /* 3rd arg: 1st syscall arg */
movl %eax,%esi /* 2nd arg: syscall number */ movl %eax,%esi /* 2nd arg: syscall number */
movl $AUDIT_ARCH_I386,%edi /* 1st arg: audit arch */ movl $AUDIT_ARCH_I386,%edi /* 1st arg: audit arch */
call audit_syscall_entry call __audit_syscall_entry
movl RAX-ARGOFFSET(%rsp),%eax /* reload syscall number */ movl RAX-ARGOFFSET(%rsp),%eax /* reload syscall number */
cmpq $(IA32_NR_syscalls-1),%rax cmpq $(IA32_NR_syscalls-1),%rax
ja ia32_badsys ja ia32_badsys
......
...@@ -456,7 +456,7 @@ sysenter_audit: ...@@ -456,7 +456,7 @@ sysenter_audit:
movl %ebx,%ecx /* 3rd arg: 1st syscall arg */ movl %ebx,%ecx /* 3rd arg: 1st syscall arg */
movl %eax,%edx /* 2nd arg: syscall number */ movl %eax,%edx /* 2nd arg: syscall number */
movl $AUDIT_ARCH_I386,%eax /* 1st arg: audit arch */ movl $AUDIT_ARCH_I386,%eax /* 1st arg: audit arch */
call audit_syscall_entry call __audit_syscall_entry
pushl_cfi %ebx pushl_cfi %ebx
movl PT_EAX(%esp),%eax /* reload syscall number */ movl PT_EAX(%esp),%eax /* reload syscall number */
jmp sysenter_do_call jmp sysenter_do_call
......
...@@ -549,7 +549,7 @@ badsys: ...@@ -549,7 +549,7 @@ badsys:
#ifdef CONFIG_AUDITSYSCALL #ifdef CONFIG_AUDITSYSCALL
/* /*
* Fast path for syscall audit without full syscall trace. * Fast path for syscall audit without full syscall trace.
* We just call audit_syscall_entry() directly, and then * We just call __audit_syscall_entry() directly, and then
* jump back to the normal fast path. * jump back to the normal fast path.
*/ */
auditsys: auditsys:
...@@ -559,7 +559,7 @@ auditsys: ...@@ -559,7 +559,7 @@ auditsys:
movq %rdi,%rdx /* 3rd arg: 1st syscall arg */ movq %rdi,%rdx /* 3rd arg: 1st syscall arg */
movq %rax,%rsi /* 2nd arg: syscall number */ movq %rax,%rsi /* 2nd arg: syscall number */
movl $AUDIT_ARCH_X86_64,%edi /* 1st arg: audit arch */ movl $AUDIT_ARCH_X86_64,%edi /* 1st arg: audit arch */
call audit_syscall_entry call __audit_syscall_entry
LOAD_ARGS 0 /* reload call-clobbered registers */ LOAD_ARGS 0 /* reload call-clobbered registers */
jmp system_call_fastpath jmp system_call_fastpath
......
...@@ -1392,7 +1392,6 @@ long syscall_trace_enter(struct pt_regs *regs) ...@@ -1392,7 +1392,6 @@ long syscall_trace_enter(struct pt_regs *regs)
if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT))) if (unlikely(test_thread_flag(TIF_SYSCALL_TRACEPOINT)))
trace_sys_enter(regs, regs->orig_ax); trace_sys_enter(regs, regs->orig_ax);
if (unlikely(current->audit_context)) {
if (IS_IA32) if (IS_IA32)
audit_syscall_entry(AUDIT_ARCH_I386, audit_syscall_entry(AUDIT_ARCH_I386,
regs->orig_ax, regs->orig_ax,
...@@ -1405,7 +1404,6 @@ long syscall_trace_enter(struct pt_regs *regs) ...@@ -1405,7 +1404,6 @@ long syscall_trace_enter(struct pt_regs *regs)
regs->di, regs->si, regs->di, regs->si,
regs->dx, regs->r10); regs->dx, regs->r10);
#endif #endif
}
return ret ?: regs->orig_ax; return ret ?: regs->orig_ax;
} }
......
...@@ -334,7 +334,6 @@ void do_syscall_trace_enter(struct pt_regs *regs) ...@@ -334,7 +334,6 @@ void do_syscall_trace_enter(struct pt_regs *regs)
do_syscall_trace(); do_syscall_trace();
#if 0 #if 0
if (unlikely(current->audit_context))
audit_syscall_entry(current, AUDIT_ARCH_XTENSA..); audit_syscall_entry(current, AUDIT_ARCH_XTENSA..);
#endif #endif
} }
......
...@@ -418,7 +418,7 @@ extern int audit_classify_arch(int arch); ...@@ -418,7 +418,7 @@ extern int audit_classify_arch(int arch);
extern void audit_finish_fork(struct task_struct *child); extern void audit_finish_fork(struct task_struct *child);
extern int audit_alloc(struct task_struct *task); extern int audit_alloc(struct task_struct *task);
extern void audit_free(struct task_struct *task); extern void audit_free(struct task_struct *task);
extern void audit_syscall_entry(int arch, extern void __audit_syscall_entry(int arch,
int major, unsigned long a0, unsigned long a1, int major, unsigned long a0, unsigned long a1,
unsigned long a2, unsigned long a3); unsigned long a2, unsigned long a3);
extern void __audit_syscall_exit(int ret_success, long ret_value); extern void __audit_syscall_exit(int ret_success, long ret_value);
...@@ -435,6 +435,13 @@ static inline int audit_dummy_context(void) ...@@ -435,6 +435,13 @@ static inline int audit_dummy_context(void)
void *p = current->audit_context; void *p = current->audit_context;
return !p || *(int *)p; return !p || *(int *)p;
} }
static inline void audit_syscall_entry(int arch, int major, unsigned long a0,
unsigned long a1, unsigned long a2,
unsigned long a3)
{
if (unlikely(!audit_dummy_context()))
__audit_syscall_entry(arch, major, a0, a1, a2, a3);
}
static inline void audit_syscall_exit(void *pt_regs) static inline void audit_syscall_exit(void *pt_regs)
{ {
if (unlikely(current->audit_context)) { if (unlikely(current->audit_context)) {
......
...@@ -1632,7 +1632,7 @@ void audit_free(struct task_struct *tsk) ...@@ -1632,7 +1632,7 @@ void audit_free(struct task_struct *tsk)
* will only be written if another part of the kernel requests that it * will only be written if another part of the kernel requests that it
* be written). * be written).
*/ */
void audit_syscall_entry(int arch, int major, void __audit_syscall_entry(int arch, int major,
unsigned long a1, unsigned long a2, unsigned long a1, unsigned long a2,
unsigned long a3, unsigned long a4) unsigned long a3, unsigned long a4)
{ {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment