On 14/07/17, Mark Brown wrote: > From: Mark Brown <[email protected]> > > Commit 3efe33f5d2 (audit: x86: drop arch from __audit_syscall_entry() > interface) removed the arch parameter from __audit_syscall_entry() and > updated the only current user in mainline but this breaks the ARMv8 audit > code that has been added in -next. Fix this by making the equivalent > update to ARMv8. > > Signed-off-by: Mark Brown <[email protected]>
Signed-off-by: Richard Guy Briggs <[email protected]> I'm not sure the best way to propagate this patch, but it will be necessary. > --- > arch/arm64/kernel/ptrace.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/arm64/kernel/ptrace.c b/arch/arm64/kernel/ptrace.c > index 70526cfda056..310842e3d477 100644 > --- a/arch/arm64/kernel/ptrace.c > +++ b/arch/arm64/kernel/ptrace.c > @@ -1115,8 +1115,8 @@ asmlinkage int syscall_trace_enter(struct pt_regs *regs) > if (test_thread_flag(TIF_SYSCALL_TRACEPOINT)) > trace_sys_enter(regs, regs->syscallno); > > - audit_syscall_entry(syscall_get_arch(), regs->syscallno, > - regs->orig_x0, regs->regs[1], regs->regs[2], regs->regs[3]); > + audit_syscall_entry(regs->syscallno, regs->orig_x0, regs->regs[1], > + regs->regs[2], regs->regs[3]); > > return regs->syscallno; > } > -- > 2.0.1 > - RGB -- Richard Guy Briggs <[email protected]> Senior Software Engineer, Kernel Security, AMER ENG Base Operating Systems, Red Hat Remote, Ottawa, Canada Voice: +1.647.777.2635, Internal: (81) 32635, Alt: +1.613.693.0684x3545 -- Linux-audit mailing list [email protected] https://www.redhat.com/mailman/listinfo/linux-audit
