diff options
Diffstat (limited to 'arch/ppc/kernel/ptrace.c')
| -rw-r--r-- | arch/ppc/kernel/ptrace.c | 40 |
1 files changed, 36 insertions, 4 deletions
diff --git a/arch/ppc/kernel/ptrace.c b/arch/ppc/kernel/ptrace.c index 59d59a8dc249..e7aee4108dea 100644 --- a/arch/ppc/kernel/ptrace.c +++ b/arch/ppc/kernel/ptrace.c | |||
| @@ -27,6 +27,9 @@ | |||
| 27 | #include <linux/user.h> | 27 | #include <linux/user.h> |
| 28 | #include <linux/security.h> | 28 | #include <linux/security.h> |
| 29 | #include <linux/signal.h> | 29 | #include <linux/signal.h> |
| 30 | #include <linux/seccomp.h> | ||
| 31 | #include <linux/audit.h> | ||
| 32 | #include <linux/module.h> | ||
| 30 | 33 | ||
| 31 | #include <asm/uaccess.h> | 34 | #include <asm/uaccess.h> |
| 32 | #include <asm/page.h> | 35 | #include <asm/page.h> |
| @@ -455,11 +458,10 @@ out: | |||
| 455 | return ret; | 458 | return ret; |
| 456 | } | 459 | } |
| 457 | 460 | ||
| 458 | void do_syscall_trace(void) | 461 | static void do_syscall_trace(void) |
| 459 | { | 462 | { |
| 460 | if (!test_thread_flag(TIF_SYSCALL_TRACE) | 463 | /* the 0x80 provides a way for the tracing parent to distinguish |
| 461 | || !(current->ptrace & PT_PTRACED)) | 464 | between a syscall stop and SIGTRAP delivery */ |
| 462 | return; | ||
| 463 | ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD) | 465 | ptrace_notify(SIGTRAP | ((current->ptrace & PT_TRACESYSGOOD) |
| 464 | ? 0x80 : 0)); | 466 | ? 0x80 : 0)); |
| 465 | 467 | ||
| @@ -473,3 +475,33 @@ void do_syscall_trace(void) | |||
| 473 | current->exit_code = 0; | 475 | current->exit_code = 0; |
| 474 | } | 476 | } |
| 475 | } | 477 | } |
| 478 | |||
| 479 | void do_syscall_trace_enter(struct pt_regs *regs) | ||
| 480 | { | ||
| 481 | if (test_thread_flag(TIF_SYSCALL_TRACE) | ||
| 482 | && (current->ptrace & PT_PTRACED)) | ||
| 483 | do_syscall_trace(); | ||
| 484 | |||
| 485 | if (unlikely(current->audit_context)) | ||
| 486 | audit_syscall_entry(current, AUDIT_ARCH_PPC, | ||
| 487 | regs->gpr[0], | ||
| 488 | regs->gpr[3], regs->gpr[4], | ||
| 489 | regs->gpr[5], regs->gpr[6]); | ||
| 490 | } | ||
| 491 | |||
| 492 | void do_syscall_trace_leave(struct pt_regs *regs) | ||
| 493 | { | ||
| 494 | secure_computing(regs->gpr[0]); | ||
| 495 | |||
| 496 | if (unlikely(current->audit_context)) | ||
| 497 | audit_syscall_exit(current, | ||
| 498 | (regs->ccr&0x1000)?AUDITSC_FAILURE:AUDITSC_SUCCESS, | ||
| 499 | regs->result); | ||
| 500 | |||
| 501 | if ((test_thread_flag(TIF_SYSCALL_TRACE)) | ||
| 502 | && (current->ptrace & PT_PTRACED)) | ||
| 503 | do_syscall_trace(); | ||
| 504 | } | ||
| 505 | |||
| 506 | EXPORT_SYMBOL(do_syscall_trace_enter); | ||
| 507 | EXPORT_SYMBOL(do_syscall_trace_leave); | ||
