diff --git a/arch/arm/kernel/entry-common.S b/arch/arm/kernel/entry-common.S index c314304f77e..5b52787419e 100644 --- a/arch/arm/kernel/entry-common.S +++ b/arch/arm/kernel/entry-common.S @@ -452,7 +452,12 @@ ENTRY(vector_swi) #ifdef CONFIG_SECCOMP tst r10, #_TIF_SECCOMP - bne __sys_trace + beq 1f + mov r0, scno + bl __secure_computing + add r0, sp, #S_R0 + S_OFF @ pointer to regs + ldmia r0, {r0 - r3} @ have to reload r0 - r3 +1: #endif tst r10, #_TIF_SYSCALL_WORK @ are we tracing syscalls? diff --git a/arch/arm/kernel/ptrace.c b/arch/arm/kernel/ptrace.c index 282a99e1be1..d407ebf4180 100644 --- a/arch/arm/kernel/ptrace.c +++ b/arch/arm/kernel/ptrace.c @@ -910,16 +910,12 @@ long arch_ptrace(struct task_struct *child, long request, asmlinkage int syscall_trace(int why, struct pt_regs *regs, int scno) { unsigned long ip; - current_thread_info()->syscall = scno; if (why) audit_syscall_exit(regs); - else { - if (secure_computing(scno) == -1) - return -1; + else audit_syscall_entry(AUDIT_ARCH_ARM, scno, regs->ARM_r0, regs->ARM_r1, regs->ARM_r2, regs->ARM_r3); - } if (why == 0 && test_and_clear_thread_flag(TIF_SYSCALL_RESTARTSYS)) scno = __NR_restart_syscall - __NR_SYSCALL_BASE; @@ -928,12 +924,7 @@ asmlinkage int syscall_trace(int why, struct pt_regs *regs, int scno) if (!(current->ptrace & PT_PTRACED)) return scno; - /* - * IP is used to denote syscall entry/exit: - * IP = 0 -> entry, =1 -> exit - */ - ip = regs->ARM_ip; - regs->ARM_ip = why; + current_thread_info()->syscall = scno; /* * IP is used to denote syscall entry/exit: