ptrace.c (b7d3622a39fde7658170b7f3cf6c6889bb8db30d) | ptrace.c (c90f06943e05519a87140dc407cf589c220aeedf) |
---|---|
1/* 2 * Kernel support for the ptrace() and syscall tracing interfaces. 3 * 4 * Copyright (C) 2000 Hewlett-Packard Co, Linuxcare Inc. 5 * Copyright (C) 2000 Matthew Wilcox <matthew@wil.cx> 6 * Copyright (C) 2000 David Huggins-Daines <dhd@debian.org> 7 * Copyright (C) 2008 Helge Deller <deller@gmx.de> 8 */ --- 256 unchanged lines hidden (view full) --- 265 return ret; 266} 267#endif 268 269long do_syscall_trace_enter(struct pt_regs *regs) 270{ 271 long ret = 0; 272 | 1/* 2 * Kernel support for the ptrace() and syscall tracing interfaces. 3 * 4 * Copyright (C) 2000 Hewlett-Packard Co, Linuxcare Inc. 5 * Copyright (C) 2000 Matthew Wilcox <matthew@wil.cx> 6 * Copyright (C) 2000 David Huggins-Daines <dhd@debian.org> 7 * Copyright (C) 2008 Helge Deller <deller@gmx.de> 8 */ --- 256 unchanged lines hidden (view full) --- 265 return ret; 266} 267#endif 268 269long do_syscall_trace_enter(struct pt_regs *regs) 270{ 271 long ret = 0; 272 |
273 /* Do the secure computing check first. */ 274 if (secure_computing(regs->gr[20])) { 275 /* seccomp failures shouldn't expose any additional code. */ 276 return -1; 277 } 278 |
|
273 if (test_thread_flag(TIF_SYSCALL_TRACE) && 274 tracehook_report_syscall_entry(regs)) 275 ret = -1L; 276 277#ifdef CONFIG_64BIT 278 if (!is_compat_task()) 279 audit_syscall_entry(AUDIT_ARCH_PARISC64, 280 regs->gr[20], --- 24 unchanged lines hidden --- | 279 if (test_thread_flag(TIF_SYSCALL_TRACE) && 280 tracehook_report_syscall_entry(regs)) 281 ret = -1L; 282 283#ifdef CONFIG_64BIT 284 if (!is_compat_task()) 285 audit_syscall_entry(AUDIT_ARCH_PARISC64, 286 regs->gr[20], --- 24 unchanged lines hidden --- |