auditsc: for seccomp events, log syscall compat state using in_compat_syscall
authorAndy Lutomirski <luto@kernel.org>
Tue, 22 Mar 2016 21:24:58 +0000 (14:24 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Tue, 22 Mar 2016 22:36:02 +0000 (15:36 -0700)
Except on SPARC, this is what the code always did.  SPARC compat seccomp
was buggy, although the impact of the bug was limited because SPARC
32-bit and 64-bit syscall numbers are the same.

Signed-off-by: Andy Lutomirski <luto@kernel.org>
Cc: Paul Moore <paul@paul-moore.com>
Cc: Eric Paris <eparis@redhat.com>
Cc: David Miller <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
kernel/auditsc.c

index 195ffaee50b984c690409023db023e1301144771..7d0e3cf8abe1d687325bc8096368eaba38d9bd0d 100644 (file)
@@ -2412,8 +2412,8 @@ void __audit_seccomp(unsigned long syscall, long signr, int code)
                return;
        audit_log_task(ab);
        audit_log_format(ab, " sig=%ld arch=%x syscall=%ld compat=%d ip=0x%lx code=0x%x",
-                        signr, syscall_get_arch(), syscall, is_compat_task(),
-                        KSTK_EIP(current), code);
+                        signr, syscall_get_arch(), syscall,
+                        in_compat_syscall(), KSTK_EIP(current), code);
        audit_log_end(ab);
 }