diff options
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/seccomp.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/kernel/seccomp.c b/kernel/seccomp.c index b7a10048a32c..eda2da3df822 100644 --- a/kernel/seccomp.c +++ b/kernel/seccomp.c | |||
@@ -95,7 +95,7 @@ u32 seccomp_bpf_load(int off) | |||
95 | if (off == BPF_DATA(nr)) | 95 | if (off == BPF_DATA(nr)) |
96 | return syscall_get_nr(current, regs); | 96 | return syscall_get_nr(current, regs); |
97 | if (off == BPF_DATA(arch)) | 97 | if (off == BPF_DATA(arch)) |
98 | return syscall_get_arch(current, regs); | 98 | return syscall_get_arch(); |
99 | if (off >= BPF_DATA(args[0]) && off < BPF_DATA(args[6])) { | 99 | if (off >= BPF_DATA(args[0]) && off < BPF_DATA(args[6])) { |
100 | unsigned long value; | 100 | unsigned long value; |
101 | int arg = (off - BPF_DATA(args[0])) / sizeof(u64); | 101 | int arg = (off - BPF_DATA(args[0])) / sizeof(u64); |
@@ -351,7 +351,7 @@ static void seccomp_send_sigsys(int syscall, int reason) | |||
351 | info.si_code = SYS_SECCOMP; | 351 | info.si_code = SYS_SECCOMP; |
352 | info.si_call_addr = (void __user *)KSTK_EIP(current); | 352 | info.si_call_addr = (void __user *)KSTK_EIP(current); |
353 | info.si_errno = reason; | 353 | info.si_errno = reason; |
354 | info.si_arch = syscall_get_arch(current, task_pt_regs(current)); | 354 | info.si_arch = syscall_get_arch(); |
355 | info.si_syscall = syscall; | 355 | info.si_syscall = syscall; |
356 | force_sig_info(SIGSYS, &info, current); | 356 | force_sig_info(SIGSYS, &info, current); |
357 | } | 357 | } |