Snap for 9976130 from 83318488b9 to android14-6.1-keystone-qcom-release
Change-Id: Idad6ee1ffa53831991f94bc57b9a0af24ab86f04
This commit is contained in:
commit
4ab56270e0
10 changed files with 2759 additions and 0 deletions
|
|
@ -2,3 +2,4 @@
|
|||
# commonly used symbols
|
||||
module_layout
|
||||
__put_task_struct
|
||||
utf8_data_table
|
||||
|
|
|
|||
File diff suppressed because it is too large
Load diff
|
|
@ -2043,12 +2043,44 @@
|
|||
trace_event_raw_init
|
||||
trace_event_reg
|
||||
trace_handle_return
|
||||
__traceiter_android_rvh_commit_creds
|
||||
__traceiter_android_rvh_exit_creds
|
||||
__traceiter_android_rvh_override_creds
|
||||
__traceiter_android_rvh_revert_creds
|
||||
__traceiter_android_rvh_selinux_avc_insert
|
||||
__traceiter_android_rvh_selinux_avc_node_delete
|
||||
__traceiter_android_rvh_selinux_avc_node_replace
|
||||
__traceiter_android_rvh_selinux_avc_lookup
|
||||
__traceiter_android_rvh_selinux_is_initialized
|
||||
__traceiter_android_rvh_set_module_permit_before_init
|
||||
__traceiter_android_rvh_set_module_permit_after_init
|
||||
__traceiter_android_rvh_set_module_core_rw_nx
|
||||
__traceiter_android_rvh_set_module_init_rw_nx
|
||||
__traceiter_android_vh_check_mmap_file
|
||||
__traceiter_android_vh_check_file_open
|
||||
__traceiter_android_vh_check_bpf_syscall
|
||||
__traceiter_android_vh_ufs_clock_scaling
|
||||
__traceiter_gpu_mem_total
|
||||
__traceiter_mmap_lock_acquire_returned
|
||||
__traceiter_mmap_lock_released
|
||||
__traceiter_mmap_lock_start_locking
|
||||
trace_output_call
|
||||
__tracepoint_android_rvh_commit_creds
|
||||
__tracepoint_android_rvh_exit_creds
|
||||
__tracepoint_android_rvh_override_creds
|
||||
__tracepoint_android_rvh_revert_creds
|
||||
__tracepoint_android_rvh_selinux_avc_insert
|
||||
__tracepoint_android_rvh_selinux_avc_node_delete
|
||||
__tracepoint_android_rvh_selinux_avc_node_replace
|
||||
__tracepoint_android_rvh_selinux_avc_lookup
|
||||
__tracepoint_android_rvh_selinux_is_initialized
|
||||
__tracepoint_android_rvh_set_module_permit_before_init
|
||||
__tracepoint_android_rvh_set_module_permit_after_init
|
||||
__tracepoint_android_rvh_set_module_core_rw_nx
|
||||
__tracepoint_android_rvh_set_module_init_rw_nx
|
||||
__tracepoint_android_vh_check_mmap_file
|
||||
__tracepoint_android_vh_check_file_open
|
||||
__tracepoint_android_vh_check_bpf_syscall
|
||||
__tracepoint_android_vh_ufs_clock_scaling
|
||||
__tracepoint_gpu_mem_total
|
||||
__tracepoint_mmap_lock_acquire_returned
|
||||
|
|
|
|||
|
|
@ -479,6 +479,7 @@ CONFIG_USB_HIDDEV=y
|
|||
CONFIG_USB_ANNOUNCE_NEW_DEVICES=y
|
||||
CONFIG_USB_OTG=y
|
||||
CONFIG_USB_XHCI_HCD=y
|
||||
CONFIG_USB_XHCI_PCI_RENESAS=y
|
||||
CONFIG_USB_EHCI_HCD=y
|
||||
CONFIG_USB_EHCI_ROOT_HUB_TT=y
|
||||
CONFIG_USB_EHCI_HCD_PLATFORM=y
|
||||
|
|
|
|||
|
|
@ -446,6 +446,7 @@ CONFIG_HID_WIIMOTE=y
|
|||
CONFIG_USB_HIDDEV=y
|
||||
CONFIG_USB_ANNOUNCE_NEW_DEVICES=y
|
||||
CONFIG_USB_XHCI_HCD=y
|
||||
CONFIG_USB_XHCI_PCI_RENESAS=y
|
||||
CONFIG_USB_EHCI_HCD=y
|
||||
CONFIG_USB_EHCI_ROOT_HUB_TT=y
|
||||
CONFIG_USB_EHCI_HCD_PLATFORM=y
|
||||
|
|
|
|||
|
|
@ -36,6 +36,8 @@
|
|||
#include <trace/hooks/cpuidle_psci.h>
|
||||
#include <trace/hooks/vmscan.h>
|
||||
#include <trace/hooks/avc.h>
|
||||
#include <trace/hooks/creds.h>
|
||||
#include <trace/hooks/module.h>
|
||||
#include <trace/hooks/selinux.h>
|
||||
#include <trace/hooks/syscall_check.h>
|
||||
#include <trace/hooks/remoteproc.h>
|
||||
|
|
@ -131,6 +133,14 @@ EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_selinux_avc_insert);
|
|||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_selinux_avc_node_delete);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_selinux_avc_node_replace);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_selinux_avc_lookup);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_commit_creds);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_exit_creds);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_override_creds);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_revert_creds);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_set_module_core_rw_nx);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_set_module_init_rw_nx);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_set_module_permit_before_init);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_set_module_permit_after_init);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_selinux_is_initialized);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_rvh_shmem_get_folio);
|
||||
EXPORT_TRACEPOINT_SYMBOL_GPL(android_vh_check_mmap_file);
|
||||
|
|
|
|||
33
include/trace/hooks/creds.h
Normal file
33
include/trace/hooks/creds.h
Normal file
|
|
@ -0,0 +1,33 @@
|
|||
/* SPDX-License-Identifier: GPL-2.0 */
|
||||
#undef TRACE_SYSTEM
|
||||
#define TRACE_SYSTEM creds
|
||||
|
||||
#define TRACE_INCLUDE_PATH trace/hooks
|
||||
#if !defined(_TRACE_HOOK_CREDS_H) || defined(TRACE_HEADER_MULTI_READ)
|
||||
#define _TRACE_HOOK_CREDS_H
|
||||
#include <trace/hooks/vendor_hooks.h>
|
||||
/*
|
||||
* Following tracepoints are not exported in tracefs and provide a
|
||||
* mechanism for vendor modules to hook and extend functionality
|
||||
*/
|
||||
struct cred;
|
||||
struct task_struct;
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_commit_creds,
|
||||
TP_PROTO(const struct task_struct *task, const struct cred *new),
|
||||
TP_ARGS(task, new), 1);
|
||||
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_exit_creds,
|
||||
TP_PROTO(const struct task_struct *task, const struct cred *cred),
|
||||
TP_ARGS(task, cred), 1);
|
||||
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_override_creds,
|
||||
TP_PROTO(const struct task_struct *task, const struct cred *new),
|
||||
TP_ARGS(task, new), 1);
|
||||
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_revert_creds,
|
||||
TP_PROTO(const struct task_struct *task, const struct cred *old),
|
||||
TP_ARGS(task, old), 1);
|
||||
|
||||
#endif /* _TRACE_HOOK_CREDS_H */
|
||||
/* This part must be outside protection */
|
||||
#include <trace/define_trace.h>
|
||||
32
include/trace/hooks/module.h
Normal file
32
include/trace/hooks/module.h
Normal file
|
|
@ -0,0 +1,32 @@
|
|||
/* SPDX-License-Identifier: GPL-2.0 */
|
||||
#undef TRACE_SYSTEM
|
||||
#define TRACE_SYSTEM module
|
||||
|
||||
#define TRACE_INCLUDE_PATH trace/hooks
|
||||
#if !defined(_TRACE_HOOK_MODULE_H) || defined(TRACE_HEADER_MULTI_READ)
|
||||
#define _TRACE_HOOK_MODULE_H
|
||||
#include <trace/hooks/vendor_hooks.h>
|
||||
/*
|
||||
* Following tracepoints are not exported in tracefs and provide a
|
||||
* mechanism for vendor modules to hook and extend functionality
|
||||
*/
|
||||
struct module;
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_set_module_permit_before_init,
|
||||
TP_PROTO(const struct module *mod),
|
||||
TP_ARGS(mod), 1);
|
||||
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_set_module_permit_after_init,
|
||||
TP_PROTO(const struct module *mod),
|
||||
TP_ARGS(mod), 1);
|
||||
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_set_module_core_rw_nx,
|
||||
TP_PROTO(const struct module *mod),
|
||||
TP_ARGS(mod), 1);
|
||||
|
||||
DECLARE_RESTRICTED_HOOK(android_rvh_set_module_init_rw_nx,
|
||||
TP_PROTO(const struct module *mod),
|
||||
TP_ARGS(mod), 1);
|
||||
|
||||
#endif /* _TRACE_HOOK_MODULE_H */
|
||||
/* This part must be outside protection */
|
||||
#include <trace/define_trace.h>
|
||||
|
|
@ -17,6 +17,8 @@
|
|||
#include <linux/cn_proc.h>
|
||||
#include <linux/uidgid.h>
|
||||
|
||||
#include <trace/hooks/creds.h>
|
||||
|
||||
#if 0
|
||||
#define kdebug(FMT, ...) \
|
||||
printk("[%-5.5s%5u] " FMT "\n", \
|
||||
|
|
@ -181,6 +183,7 @@ void exit_creds(struct task_struct *tsk)
|
|||
key_put(tsk->cached_requested_key);
|
||||
tsk->cached_requested_key = NULL;
|
||||
#endif
|
||||
trace_android_rvh_exit_creds(tsk, cred);
|
||||
}
|
||||
|
||||
/**
|
||||
|
|
@ -499,6 +502,7 @@ int commit_creds(struct cred *new)
|
|||
inc_rlimit_ucounts(new->ucounts, UCOUNT_RLIMIT_NPROC, 1);
|
||||
rcu_assign_pointer(task->real_cred, new);
|
||||
rcu_assign_pointer(task->cred, new);
|
||||
trace_android_rvh_commit_creds(task, new);
|
||||
if (new->user != old->user || new->user_ns != old->user_ns)
|
||||
dec_rlimit_ucounts(old->ucounts, UCOUNT_RLIMIT_NPROC, 1);
|
||||
alter_cred_subscribers(old, -2);
|
||||
|
|
@ -576,6 +580,7 @@ const struct cred *override_creds(const struct cred *new)
|
|||
get_new_cred((struct cred *)new);
|
||||
alter_cred_subscribers(new, 1);
|
||||
rcu_assign_pointer(current->cred, new);
|
||||
trace_android_rvh_override_creds(current, new);
|
||||
alter_cred_subscribers(old, -1);
|
||||
|
||||
kdebug("override_creds() = %p{%d,%d}", old,
|
||||
|
|
@ -604,6 +609,7 @@ void revert_creds(const struct cred *old)
|
|||
validate_creds(override);
|
||||
alter_cred_subscribers(old, 1);
|
||||
rcu_assign_pointer(current->cred, old);
|
||||
trace_android_rvh_revert_creds(current, old);
|
||||
alter_cred_subscribers(override, -1);
|
||||
put_cred(override);
|
||||
}
|
||||
|
|
|
|||
|
|
@ -60,6 +60,9 @@
|
|||
#define CREATE_TRACE_POINTS
|
||||
#include <trace/events/module.h>
|
||||
|
||||
#undef CREATE_TRACE_POINTS
|
||||
#include <trace/hooks/module.h>
|
||||
|
||||
/*
|
||||
* Mutex protects:
|
||||
* 1) List of modules (also safely readable with preempt_disable),
|
||||
|
|
@ -1208,6 +1211,7 @@ static void free_module(struct module *mod)
|
|||
|
||||
/* This may be empty, but that's OK */
|
||||
module_arch_freeing_init(mod);
|
||||
trace_android_rvh_set_module_init_rw_nx(mod);
|
||||
module_memfree(mod->init_layout.base);
|
||||
kfree(mod->args);
|
||||
percpu_modfree(mod);
|
||||
|
|
@ -1216,6 +1220,7 @@ static void free_module(struct module *mod)
|
|||
lockdep_free_key_range(mod->data_layout.base, mod->data_layout.size);
|
||||
|
||||
/* Finally, free the core (containing the module structure) */
|
||||
trace_android_rvh_set_module_core_rw_nx(mod);
|
||||
module_memfree(mod->core_layout.base);
|
||||
#ifdef CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
|
||||
vfree(mod->data_layout.base);
|
||||
|
|
@ -2373,7 +2378,9 @@ static void module_deallocate(struct module *mod, struct load_info *info)
|
|||
{
|
||||
percpu_modfree(mod);
|
||||
module_arch_freeing_init(mod);
|
||||
trace_android_rvh_set_module_init_rw_nx(mod);
|
||||
module_memfree(mod->init_layout.base);
|
||||
trace_android_rvh_set_module_core_rw_nx(mod);
|
||||
module_memfree(mod->core_layout.base);
|
||||
#ifdef CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
|
||||
vfree(mod->data_layout.base);
|
||||
|
|
@ -2526,8 +2533,10 @@ static noinline int do_init_module(struct module *mod)
|
|||
rcu_assign_pointer(mod->kallsyms, &mod->core_kallsyms);
|
||||
#endif
|
||||
module_enable_ro(mod, true);
|
||||
trace_android_rvh_set_module_permit_after_init(mod);
|
||||
mod_tree_remove_init(mod);
|
||||
module_arch_freeing_init(mod);
|
||||
trace_android_rvh_set_module_init_rw_nx(mod);
|
||||
mod->init_layout.base = NULL;
|
||||
mod->init_layout.size = 0;
|
||||
mod->init_layout.ro_size = 0;
|
||||
|
|
@ -2657,6 +2666,7 @@ static int complete_formation(struct module *mod, struct load_info *info)
|
|||
module_enable_ro(mod, false);
|
||||
module_enable_nx(mod);
|
||||
module_enable_x(mod);
|
||||
trace_android_rvh_set_module_permit_before_init(mod);
|
||||
|
||||
/*
|
||||
* Mark state as coming so strong_try_module_get() ignores us,
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue