forked from luck/tmp_suning_uos_patched
auditsc: for seccomp events, log syscall compat state using in_compat_syscall
Except on SPARC, this is what the code always did. SPARC compat seccomp was buggy, although the impact of the bug was limited because SPARC 32-bit and 64-bit syscall numbers are the same. Signed-off-by: Andy Lutomirski <luto@kernel.org> Cc: Paul Moore <paul@paul-moore.com> Cc: Eric Paris <eparis@redhat.com> Cc: David Miller <davem@davemloft.net> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
parent
5c465217a9
commit
efbc0fbf34
|
@ -2412,8 +2412,8 @@ void __audit_seccomp(unsigned long syscall, long signr, int code)
|
||||||
return;
|
return;
|
||||||
audit_log_task(ab);
|
audit_log_task(ab);
|
||||||
audit_log_format(ab, " sig=%ld arch=%x syscall=%ld compat=%d ip=0x%lx code=0x%x",
|
audit_log_format(ab, " sig=%ld arch=%x syscall=%ld compat=%d ip=0x%lx code=0x%x",
|
||||||
signr, syscall_get_arch(), syscall, is_compat_task(),
|
signr, syscall_get_arch(), syscall,
|
||||||
KSTK_EIP(current), code);
|
in_compat_syscall(), KSTK_EIP(current), code);
|
||||||
audit_log_end(ab);
|
audit_log_end(ab);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user