On Mon, Apr 09, 2018 at 12:24:58AM +0000, Sasha Levin wrote:
From: David Daney david.daney@cavium.com
[ Upstream commit 669c4092225f0ed5df12ebee654581b558a5e3ed ]
KProbes of __seccomp_filter() are not very useful without access to the syscall arguments.
Do what x86 does, and populate a struct seccomp_data to be passed to __secure_computing(). This allows samples/bpf/tracex5 to extract a sensible trace.
This broke o32 indirect syscalls, and was fixed by commit 3d729deaf287 ("MIPS: seccomp: Fix indirect syscall args").
Cheers James