On 14/07/17, Mark Brown wrote:
> From: Mark Brown <[email protected]>
> 
> Commit 3efe33f5d2 (audit: x86: drop arch from __audit_syscall_entry()
> interface) removed the arch parameter from __audit_syscall_entry() and
> updated the only current user in mainline but this breaks the ARMv8 audit
> code that has been added in -next. Fix this by making the equivalent
> update to ARMv8.
> 
> Signed-off-by: Mark Brown <[email protected]>

Signed-off-by: Richard Guy Briggs <[email protected]>

I'm not sure the best way to propagate this patch, but it will be
necessary.

> ---
>  arch/arm64/kernel/ptrace.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/arch/arm64/kernel/ptrace.c b/arch/arm64/kernel/ptrace.c
> index 70526cfda056..310842e3d477 100644
> --- a/arch/arm64/kernel/ptrace.c
> +++ b/arch/arm64/kernel/ptrace.c
> @@ -1115,8 +1115,8 @@ asmlinkage int syscall_trace_enter(struct pt_regs *regs)
>       if (test_thread_flag(TIF_SYSCALL_TRACEPOINT))
>               trace_sys_enter(regs, regs->syscallno);
>  
> -     audit_syscall_entry(syscall_get_arch(), regs->syscallno,
> -             regs->orig_x0, regs->regs[1], regs->regs[2], regs->regs[3]);
> +     audit_syscall_entry(regs->syscallno, regs->orig_x0, regs->regs[1],
> +                         regs->regs[2], regs->regs[3]);
>  
>       return regs->syscallno;
>  }
> -- 
> 2.0.1
> 

- RGB

--
Richard Guy Briggs <[email protected]>
Senior Software Engineer, Kernel Security, AMER ENG Base Operating Systems, Red 
Hat
Remote, Ottawa, Canada
Voice: +1.647.777.2635, Internal: (81) 32635, Alt: +1.613.693.0684x3545

--
Linux-audit mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/linux-audit

Reply via email to