On Mon, Apr 09, 2018 at 12:24:58AM +0000, Sasha Levin wrote:
> From: David Daney <david.da...@cavium.com>
> [ Upstream commit 669c4092225f0ed5df12ebee654581b558a5e3ed ]
> KProbes of __seccomp_filter() are not very useful without access to
> the syscall arguments.
> Do what x86 does, and populate a struct seccomp_data to be passed to
> __secure_computing().  This allows samples/bpf/tracex5 to extract a
> sensible trace.

This broke o32 indirect syscalls, and was fixed by commit 3d729deaf287
("MIPS: seccomp: Fix indirect syscall args").


Attachment: signature.asc
Description: Digital signature

Reply via email to