On Mon, Apr 09, 2018 at 12:24:58AM +0000, Sasha Levin wrote: > From: David Daney <david.da...@cavium.com> > > [ Upstream commit 669c4092225f0ed5df12ebee654581b558a5e3ed ] > > KProbes of __seccomp_filter() are not very useful without access to > the syscall arguments. > > Do what x86 does, and populate a struct seccomp_data to be passed to > __secure_computing(). This allows samples/bpf/tracex5 to extract a > sensible trace.
This broke o32 indirect syscalls, and was fixed by commit 3d729deaf287 ("MIPS: seccomp: Fix indirect syscall args"). Cheers James
Description: Digital signature