Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp3220281imd; Mon, 29 Oct 2018 03:50:03 -0700 (PDT) X-Google-Smtp-Source: AJdET5dKLGsoPaELmUbZn6WAY2AduKIRWtSbvGoGLnAb2Mnf9Lqot+dO+eeELL66uLMthK3hPxSP X-Received: by 2002:a63:7c13:: with SMTP id x19mr13164303pgc.45.1540810202947; Mon, 29 Oct 2018 03:50:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540810202; cv=none; d=google.com; s=arc-20160816; b=Hsjen740kvTucMoHA5LJe6GqdlFc3tcXyuYs2KYCNbvXBQQUT2xYr6GF/PBwuEf6jk 8vEUGyrON/v9+fzbQ7KQspyRpp1nQ8zM05Edk0cUYqyEq5OORZHe95M1TiOJ4KKW84jd 220YqBWGvtkWfw55sl7W2OSzLFyI7OiUBomxypxEcv+7+TEf6/QoBpmucwhI2hkWxyAs Ir5VCp5JQL9uQvqvcyRlfihfa2EEnY3gyJ/7I62NHzImSx/qLhnKoTtzCxW90P0xRYhe bVFxxEBWsxggRP2hRXkaliQVSMieKBIfq0of6zt7JOp7bVaAykDk5u+/YXAAOschr1CF v4dQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=+c9fdXn0k/9YSXFnqXuzG8DyHJveP7cCSIpNxHle8KI=; b=s7UIEA5z/8OKivx32VbON9qUxR6Oqk6bV1UXWV1+l51PYquis8x34+oouizvPIvH1t 0nEmIsdvOlrzexZiLkRqkfiv2hq7F7Xh0ip9Ndl926YpP8XHB5oHBVaK4dM1u1dcpdhf YZpPwFXknTddnuOB/oQHRawj+2aQp3PRc/asyIXyR4LvnfT8rK0e2gYxUEyY8wBhBCSE ZmZ89v6NyxLekpnr2HuysSmFePZKGpG7QKBXGBG5IXla2/Z39JFZDplN1sYmB1mHyMBl rbVeW50TSrv5KlAsYp/3yAopGV8VOH6oi6Lg1Z+KeqpCTSQI75Ulp2g3Hgfd/qyAW8Sp HrRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Yjjxb2YA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v141-v6si7121116pfc.193.2018.10.29.03.49.47; Mon, 29 Oct 2018 03:50:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Yjjxb2YA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729793AbeJ2Tha (ORCPT + 99 others); Mon, 29 Oct 2018 15:37:30 -0400 Received: from mail-wm1-f65.google.com ([209.85.128.65]:33258 "EHLO mail-wm1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729751AbeJ2Tha (ORCPT ); Mon, 29 Oct 2018 15:37:30 -0400 Received: by mail-wm1-f65.google.com with SMTP id y140-v6so9227680wmd.0 for ; Mon, 29 Oct 2018 03:49:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=+c9fdXn0k/9YSXFnqXuzG8DyHJveP7cCSIpNxHle8KI=; b=Yjjxb2YAl8o4LhvkhK5JfVQNknCjSrF34vW7+ZnynASehYrI7py892n3sAKAyvn0VP ch+CSEDXC5rHPa+qjbQbWxAUv0oWg9ApnKiWCth96vhKXonzJuF31OTidMC/bIW4Lsni wxBKQ9gNgqE0y6j3y8ElqCj2a0xMshydbcG2tFFAm0iS0+BvBvXmYmOfKqxLOOGPBUrl sHKefNO0NmeKv9TxqB1BDWHB5/nLY6ff/v5dHX5R9vspwrdhEncVb7EGw9nklaWJ9usO AoM1OaEnkKxejrIV4ACBct0QfojOHgdzK/xqwunkzrKqEhK7lMTSVi+8GJ8dmWol6X+w QRyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=+c9fdXn0k/9YSXFnqXuzG8DyHJveP7cCSIpNxHle8KI=; b=qmAxyi/m26a37+PiXvR2Yh5VKD7r+1EkLJd9tfp8f9YsAZ6MEN8VYzlqP3Xm5HhsAx Xf3q00XnAv/fIDEB7B40imG5Nk+RhT/DULsSh/PBM18fZ38D3IMkHYBSnrh61Ble/A/8 sKYGZ0GHFJg/ZYq5k9w1Z3Nlha7/odrSpAjC1VlWJdkdgQvUlbcCUVhaSdjywm+11oyQ CTGlWotFsIotNsckSXsa1mtTmd93j2k8+gb7byIoyzU+Srw7jMVfhT5zWrAF8mhnFy0o mB7IYbbQqRjlLriXX5mBW55uxOMZ6FJMV0Z7L4ZGyNfBC1Yud+oDLbjPRENBRgIo9c+P gRUQ== X-Gm-Message-State: AGRZ1gLW7cG0uIjNhZfEaJ/XfVAcZXPLZwkZuhS0K3odVVZgrD5Obiy1 YjklLKp8jtPVnzBwV/Z+lYk= X-Received: by 2002:a1c:2484:: with SMTP id k126-v6mr14096651wmk.63.1540810160048; Mon, 29 Oct 2018 03:49:20 -0700 (PDT) Received: from localhost.localdomain (ip-76.net-89-3-178.rev.numericable.fr. [89.3.178.76]) by smtp.gmail.com with ESMTPSA id l70-v6sm36360609wma.0.2018.10.29.03.49.19 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 29 Oct 2018 03:49:19 -0700 (PDT) From: David Abdurachmanov To: palmer@sifive.com, aou@eecs.berkeley.edu, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-audit@redhat.com Cc: David Abdurachmanov Subject: [PATCH 1/2] riscv: add audit support Date: Mon, 29 Oct 2018 11:48:53 +0100 Message-Id: <20181029104854.17432-2-david.abdurachmanov@gmail.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20181029104854.17432-1-david.abdurachmanov@gmail.com> References: <20181029104854.17432-1-david.abdurachmanov@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On RISC-V (riscv) audit is supported through generic lib/audit.c. The patch adds required arch specific definitions. Signed-off-by: David Abdurachmanov --- arch/riscv/Kconfig | 1 + arch/riscv/include/asm/ptrace.h | 5 +++++ arch/riscv/include/asm/syscall.h | 10 ++++++++++ arch/riscv/include/asm/thread_info.h | 6 ++++++ arch/riscv/kernel/entry.S | 4 ++-- include/uapi/linux/audit.h | 2 ++ 6 files changed, 26 insertions(+), 2 deletions(-) diff --git a/arch/riscv/Kconfig b/arch/riscv/Kconfig index a344980287a5..8e6d404a4ed0 100644 --- a/arch/riscv/Kconfig +++ b/arch/riscv/Kconfig @@ -28,6 +28,7 @@ config RISCV select GENERIC_STRNLEN_USER select GENERIC_SMP_IDLE_THREAD select GENERIC_ATOMIC64 if !64BIT || !RISCV_ISA_A + select HAVE_ARCH_AUDITSYSCALL select HAVE_MEMBLOCK select HAVE_MEMBLOCK_NODE_MAP select HAVE_DMA_CONTIGUOUS diff --git a/arch/riscv/include/asm/ptrace.h b/arch/riscv/include/asm/ptrace.h index 2c5df945d43c..62c5e9d35596 100644 --- a/arch/riscv/include/asm/ptrace.h +++ b/arch/riscv/include/asm/ptrace.h @@ -113,6 +113,11 @@ static inline void frame_pointer_set(struct pt_regs *regs, SET_FP(regs, val); } +static inline unsigned long regs_return_value(struct pt_regs *regs) +{ + return regs->a0; +} + #endif /* __ASSEMBLY__ */ #endif /* _ASM_RISCV_PTRACE_H */ diff --git a/arch/riscv/include/asm/syscall.h b/arch/riscv/include/asm/syscall.h index 8d25f8904c00..bba3da6ef157 100644 --- a/arch/riscv/include/asm/syscall.h +++ b/arch/riscv/include/asm/syscall.h @@ -18,6 +18,7 @@ #ifndef _ASM_RISCV_SYSCALL_H #define _ASM_RISCV_SYSCALL_H +#include #include #include @@ -99,4 +100,13 @@ static inline void syscall_set_arguments(struct task_struct *task, memcpy(®s->a1 + i * sizeof(regs->a1), args, n * sizeof(regs->a0)); } +static inline int syscall_get_arch(void) +{ +#ifdef CONFIG_64BIT + return AUDIT_ARCH_RISCV64; +#else + return AUDIT_ARCH_RISCV32; +#endif +} + #endif /* _ASM_RISCV_SYSCALL_H */ diff --git a/arch/riscv/include/asm/thread_info.h b/arch/riscv/include/asm/thread_info.h index f8fa1cd2dad9..1c9cc8389928 100644 --- a/arch/riscv/include/asm/thread_info.h +++ b/arch/riscv/include/asm/thread_info.h @@ -80,13 +80,19 @@ struct thread_info { #define TIF_RESTORE_SIGMASK 4 /* restore signal mask in do_signal() */ #define TIF_MEMDIE 5 /* is terminating due to OOM killer */ #define TIF_SYSCALL_TRACEPOINT 6 /* syscall tracepoint instrumentation */ +#define TIF_SYSCALL_AUDIT 7 /* syscall auditing */ #define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE) #define _TIF_NOTIFY_RESUME (1 << TIF_NOTIFY_RESUME) #define _TIF_SIGPENDING (1 << TIF_SIGPENDING) #define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED) +#define _TIF_SYSCALL_TRACEPOINT (1 << TIF_SYSCALL_TRACEPOINT) +#define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT) #define _TIF_WORK_MASK \ (_TIF_NOTIFY_RESUME | _TIF_SIGPENDING | _TIF_NEED_RESCHED) +#define _TIF_SYSCALL_WORK \ + (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_TRACEPOINT | _TIF_SYSCALL_AUDIT) + #endif /* _ASM_RISCV_THREAD_INFO_H */ diff --git a/arch/riscv/kernel/entry.S b/arch/riscv/kernel/entry.S index fa2c08e3c05e..2a6c2e7aaff3 100644 --- a/arch/riscv/kernel/entry.S +++ b/arch/riscv/kernel/entry.S @@ -202,7 +202,7 @@ handle_syscall: REG_S s2, PT_SEPC(sp) /* Trace syscalls, but only if requested by the user. */ REG_L t0, TASK_TI_FLAGS(tp) - andi t0, t0, _TIF_SYSCALL_TRACE + andi t0, t0, _TIF_SYSCALL_WORK bnez t0, handle_syscall_trace_enter check_syscall_nr: /* Check to make sure we don't jump to a bogus syscall number. */ @@ -222,7 +222,7 @@ ret_from_syscall: REG_S a0, PT_A0(sp) /* Trace syscalls, but only if requested by the user. */ REG_L t0, TASK_TI_FLAGS(tp) - andi t0, t0, _TIF_SYSCALL_TRACE + andi t0, t0, _TIF_SYSCALL_WORK bnez t0, handle_syscall_trace_exit ret_from_exception: diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h index 818ae690ab79..d0e037a96a7b 100644 --- a/include/uapi/linux/audit.h +++ b/include/uapi/linux/audit.h @@ -399,6 +399,8 @@ enum { /* do not define AUDIT_ARCH_PPCLE since it is not supported by audit */ #define AUDIT_ARCH_PPC64 (EM_PPC64|__AUDIT_ARCH_64BIT) #define AUDIT_ARCH_PPC64LE (EM_PPC64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) +#define AUDIT_ARCH_RISCV32 (EM_RISCV|__AUDIT_ARCH_LE) +#define AUDIT_ARCH_RISCV64 (EM_RISCV|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) #define AUDIT_ARCH_S390 (EM_S390) #define AUDIT_ARCH_S390X (EM_S390|__AUDIT_ARCH_64BIT) #define AUDIT_ARCH_SH (EM_SH) -- 2.17.2