|
@@ -1050,31 +1050,17 @@ long arch_ptrace(struct task_struct *child, long request, long addr, long data)
|
|
|
return ret;
|
|
|
}
|
|
|
|
|
|
-asmlinkage int syscall_trace(struct pt_regs *regs, int syscall_exit_p)
|
|
|
+asmlinkage int syscall_trace_enter(struct pt_regs *regs)
|
|
|
{
|
|
|
int ret = 0;
|
|
|
|
|
|
/* do the secure computing check first */
|
|
|
secure_computing(regs->u_regs[UREG_G1]);
|
|
|
|
|
|
- if (unlikely(current->audit_context) && syscall_exit_p) {
|
|
|
- unsigned long tstate = regs->tstate;
|
|
|
- int result = AUDITSC_SUCCESS;
|
|
|
-
|
|
|
- if (unlikely(tstate & (TSTATE_XCARRY | TSTATE_ICARRY)))
|
|
|
- result = AUDITSC_FAILURE;
|
|
|
-
|
|
|
- audit_syscall_exit(result, regs->u_regs[UREG_I0]);
|
|
|
- }
|
|
|
-
|
|
|
- if (test_thread_flag(TIF_SYSCALL_TRACE)) {
|
|
|
- if (syscall_exit_p)
|
|
|
- tracehook_report_syscall_exit(regs, 0);
|
|
|
- else
|
|
|
- ret = tracehook_report_syscall_entry(regs);
|
|
|
- }
|
|
|
+ if (test_thread_flag(TIF_SYSCALL_TRACE))
|
|
|
+ ret = tracehook_report_syscall_entry(regs);
|
|
|
|
|
|
- if (unlikely(current->audit_context) && !syscall_exit_p && !ret)
|
|
|
+ if (unlikely(current->audit_context) && !ret)
|
|
|
audit_syscall_entry((test_thread_flag(TIF_32BIT) ?
|
|
|
AUDIT_ARCH_SPARC :
|
|
|
AUDIT_ARCH_SPARC64),
|
|
@@ -1086,3 +1072,19 @@ asmlinkage int syscall_trace(struct pt_regs *regs, int syscall_exit_p)
|
|
|
|
|
|
return ret;
|
|
|
}
|
|
|
+
|
|
|
+asmlinkage void syscall_trace_leave(struct pt_regs *regs)
|
|
|
+{
|
|
|
+ if (unlikely(current->audit_context)) {
|
|
|
+ unsigned long tstate = regs->tstate;
|
|
|
+ int result = AUDITSC_SUCCESS;
|
|
|
+
|
|
|
+ if (unlikely(tstate & (TSTATE_XCARRY | TSTATE_ICARRY)))
|
|
|
+ result = AUDITSC_FAILURE;
|
|
|
+
|
|
|
+ audit_syscall_exit(result, regs->u_regs[UREG_I0]);
|
|
|
+ }
|
|
|
+
|
|
|
+ if (test_thread_flag(TIF_SYSCALL_TRACE))
|
|
|
+ tracehook_report_syscall_exit(regs, 0);
|
|
|
+}
|