Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1636479pxb; Fri, 13 Nov 2020 19:34:08 -0800 (PST) X-Google-Smtp-Source: ABdhPJyWCG43WE68b4/8vQZzAjWqGPaDBr3GvK42i9nCbu1wtWG7gOa4+c15M+MZsQkzKUwewceX X-Received: by 2002:a17:906:c298:: with SMTP id r24mr5031566ejz.38.1605324848765; Fri, 13 Nov 2020 19:34:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605324848; cv=none; d=google.com; s=arc-20160816; b=XDJfBKf0NtqUadXEYsveh3R7+Ul/8jw+Bv6CU182X6bFHL0i0TpSWlF9XDdMKDjYiT dw4A9jUuZFz5mbb8vr8zx65I1X0ZFwBqb7PA2LsHNi5lgbHxnNtJpeyZPJd8umkfwGnr BaGzNtXz0rTOaOlxKqU3O1ODQcMdLJNeEyhcdaxlKW8upPE0PzeIAVTuz8u6QoTKbEu2 P/7ytNIegKMRHEnEaDvwz9HAPdkeYc0kaTUhLhAnpIrqzVvW7sDTvGE+/bSpal2EvCeq AaO/RfiiUJ6blfKvCjLDiRMYgVCjfLKom+MONTX5DxcasKP0no/QXF2H2DHz8C8P3NQW dBqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=uF17IuOGRMDn0Pt4uG0UrI9YuZTNukWGGUkq0Gvw2JE=; b=d3I38HsuHceapdUgt7EixOL9v0vUyd5uEzWbU/LzMJLI1GXb+CuAq/bhTLq8GBwt/T kSojkJVkrjgxLuGJdTIFgo0EMCoynXDhGbDxl0285FB2pe480x2/XRDfmLFAdo/ABxnv gRa4FkOBCp8OYvunXXsduLMisG8Ca+kZhbCc9XTMFQuFXrKRqfiItg8u3vbh5qPPYovi soXqv97rGcUIi5gQV8tl7nIO8E8akACv1bKxvw3bJwmYDYwf46muvnyiUQK0S1z7otwe E5olV8eTjgk3s1PiVzVxtrStlhztmu/ya22n8QWo4RIiVgQN7UtTbBOX1gZFXwUjYsqF morQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hd32si4904614ejc.160.2020.11.13.19.33.45; Fri, 13 Nov 2020 19:34:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726525AbgKNDaI (ORCPT + 99 others); Fri, 13 Nov 2020 22:30:08 -0500 Received: from bhuna.collabora.co.uk ([46.235.227.227]:58646 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726494AbgKNDaH (ORCPT ); Fri, 13 Nov 2020 22:30:07 -0500 Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: krisman) with ESMTPSA id 165F61F47991 From: Gabriel Krisman Bertazi To: tglx@linutronix.de Cc: mingo@redhat.com, keescook@chromium.org, arnd@arndb.de, luto@amacapital.net, wad@chromium.org, rostedt@goodmis.org, paul@paul-moore.com, eparis@redhat.com, oleg@redhat.com, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org, Gabriel Krisman Bertazi , kernel@collabora.com Subject: [PATCH 08/10] audit: Migrate to use SYSCALL_WORK flag Date: Fri, 13 Nov 2020 22:29:15 -0500 Message-Id: <20201114032917.1205658-9-krisman@collabora.com> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201114032917.1205658-1-krisman@collabora.com> References: <20201114032917.1205658-1-krisman@collabora.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For architectures that rely on the generic syscall entry code, use the syscall_work field in struct thread_info and the specific SYSCALL_WORK flag. This set of flags has the advantage of being architecture independent. Users of the flag outside of the generic entry code should rely on the accessor macros, such that the flag is still correctly resolved for architectures that don't use the generic entry code and still rely on TIF flags for system call work. Signed-off-by: Gabriel Krisman Bertazi --- include/asm-generic/syscall.h | 14 +++++++------- include/linux/entry-common.h | 18 ++++++------------ include/linux/thread_info.h | 2 ++ kernel/auditsc.c | 4 ++-- 4 files changed, 17 insertions(+), 21 deletions(-) diff --git a/include/asm-generic/syscall.h b/include/asm-generic/syscall.h index 5042d1ba4bc5..66ada3b099eb 100644 --- a/include/asm-generic/syscall.h +++ b/include/asm-generic/syscall.h @@ -43,7 +43,7 @@ int syscall_get_nr(struct task_struct *task, struct pt_regs *regs); * @regs: task_pt_regs() of @task * * It's only valid to call this when @task is stopped for system - * call exit tracing (due to SYSCALL_TRACE or TIF_SYSCALL_AUDIT), + * call exit tracing (due to SYSCALL_TRACE or SYSCALL_AUDIT), * after tracehook_report_syscall_entry() returned nonzero to prevent * the system call from taking place. * @@ -63,7 +63,7 @@ void syscall_rollback(struct task_struct *task, struct pt_regs *regs); * Returns 0 if the system call succeeded, or -ERRORCODE if it failed. * * It's only valid to call this when @task is stopped for tracing on exit - * from a system call, due to %SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. + * from a system call, due to %SYSCALL_TRACE or %SYSCALL_AUDIT. */ long syscall_get_error(struct task_struct *task, struct pt_regs *regs); @@ -76,7 +76,7 @@ long syscall_get_error(struct task_struct *task, struct pt_regs *regs); * This value is meaningless if syscall_get_error() returned nonzero. * * It's only valid to call this when @task is stopped for tracing on exit - * from a system call, due to %SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. + * from a system call, due to %SYSCALL_TRACE or %SYSCALL_AUDIT. */ long syscall_get_return_value(struct task_struct *task, struct pt_regs *regs); @@ -93,7 +93,7 @@ long syscall_get_return_value(struct task_struct *task, struct pt_regs *regs); * code; the user sees a failed system call with this errno code. * * It's only valid to call this when @task is stopped for tracing on exit - * from a system call, due to %SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. + * from a system call, due to %SYSCALL_TRACE or %SYSCALL_AUDIT. */ void syscall_set_return_value(struct task_struct *task, struct pt_regs *regs, int error, long val); @@ -108,7 +108,7 @@ void syscall_set_return_value(struct task_struct *task, struct pt_regs *regs, * @args[0], and so on. * * It's only valid to call this when @task is stopped for tracing on - * entry to a system call, due to %SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. + * entry to a system call, due to %SYSCALL_TRACE or %SYSCALL_AUDIT. */ void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs, unsigned long *args); @@ -123,7 +123,7 @@ void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs, * The first argument gets value @args[0], and so on. * * It's only valid to call this when @task is stopped for tracing on - * entry to a system call, due to %SYSCALL_TRACE or %TIF_SYSCALL_AUDIT. + * entry to a system call, due to %SYSCALL_TRACE or %SYSCALL_AUDIT. */ void syscall_set_arguments(struct task_struct *task, struct pt_regs *regs, const unsigned long *args); @@ -135,7 +135,7 @@ void syscall_set_arguments(struct task_struct *task, struct pt_regs *regs, * Returns the AUDIT_ARCH_* based on the system call convention in use. * * It's only valid to call this when @task is stopped on entry to a system - * call, due to %SYSCALL_TRACE, %TIF_SYSCALL_AUDIT, or %TIF_SECCOMP. + * call, due to %SYSCALL_TRACE, %SYSCALL_AUDIT, or %TIF_SECCOMP. * * Architectures which permit CONFIG_HAVE_ARCH_SECCOMP_FILTER must * provide an implementation of this. diff --git a/include/linux/entry-common.h b/include/linux/entry-common.h index 39d56558818d..afeb927e8545 100644 --- a/include/linux/entry-common.h +++ b/include/linux/entry-common.h @@ -13,10 +13,6 @@ * Define dummy _TIF work flags if not defined by the architecture or for * disabled functionality. */ -#ifndef _TIF_SYSCALL_AUDIT -# define _TIF_SYSCALL_AUDIT (0) -#endif - #ifndef _TIF_PATCH_PENDING # define _TIF_PATCH_PENDING (0) #endif @@ -36,9 +32,7 @@ # define ARCH_SYSCALL_ENTER_WORK (0) #endif -#define SYSCALL_ENTER_WORK \ - (_TIF_SYSCALL_AUDIT | \ - ARCH_SYSCALL_ENTER_WORK) +#define SYSCALL_ENTER_WORK ARCH_SYSCALL_ENTER_WORK /* * TIF flags handled in syscall_exit_to_user_mode() @@ -47,16 +41,16 @@ # define ARCH_SYSCALL_EXIT_WORK (0) #endif -#define SYSCALL_EXIT_WORK \ - (_TIF_SYSCALL_AUDIT | \ - ARCH_SYSCALL_EXIT_WORK) +#define SYSCALL_EXIT_WORK ARCH_SYSCALL_EXIT_WORK #define SYSCALL_WORK_ENTER (SYSCALL_WORK_SECCOMP | \ SYSCALL_WORK_SYSCALL_TRACEPOINT | \ SYSCALL_WORK_SYSCALL_TRACE | \ - SYSCALL_WORK_SYSCALL_EMU) + SYSCALL_WORK_SYSCALL_EMU | \ + SYSCALL_WORK_SYSCALL_AUDIT) #define SYSCALL_WORK_EXIT (SYSCALL_WORK_SYSCALL_TRACEPOINT | \ - SYSCALL_WORK_SYSCALL_TRACE) + SYSCALL_WORK_SYSCALL_TRACE | \ + SYSCALL_WORK_SYSCALL_AUDIT) /* * TIF flags handled in exit_to_user_mode_loop() diff --git a/include/linux/thread_info.h b/include/linux/thread_info.h index 3c7dedadf94d..3fb475583af0 100644 --- a/include/linux/thread_info.h +++ b/include/linux/thread_info.h @@ -41,12 +41,14 @@ enum syscall_work_bit { SYSCALL_WORK_SYSCALL_TRACEPOINT = 1, SYSCALL_WORK_SYSCALL_TRACE = 2, SYSCALL_WORK_SYSCALL_EMU = 3, + SYSCALL_WORK_SYSCALL_AUDIT = 4, }; #define _SYSCALL_WORK_SECCOMP BIT(SYSCALL_WORK_SECCOMP) #define _SYSCALL_WORK_SYSCALL_TRACEPOINT BIT(SYSCALL_WORK_SYSCALL_TRACEPOINT) #define _SYSCALL_WORK_SYSCALL_TRACE BIT(SYSCALL_WORK_SYSCALL_TRACE) #define _SYSCALL_WORK_SYSCALL_EMU BIT(SYSCALL_WORK_SYSCALL_EMU) +#define _SYSCALL_WORK_SYSCALL_AUDIT BIT(SYSCALL_WORK_SYSCALL_AUDIT) #include diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 8dba8f0983b5..c00aa5837965 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c @@ -952,7 +952,7 @@ int audit_alloc(struct task_struct *tsk) state = audit_filter_task(tsk, &key); if (state == AUDIT_DISABLED) { - clear_tsk_thread_flag(tsk, TIF_SYSCALL_AUDIT); + clear_task_syscall_work(tsk, SYSCALL_AUDIT); return 0; } @@ -964,7 +964,7 @@ int audit_alloc(struct task_struct *tsk) context->filterkey = key; audit_set_context(tsk, context); - set_tsk_thread_flag(tsk, TIF_SYSCALL_AUDIT); + set_task_syscall_work(tsk, SYSCALL_AUDIT); return 0; } -- 2.29.2