audit: tie SECCOMP records to syscall
Since seccomp events are triggered by user activity, tie the SECCOMP record to the syscall record to collect all records from the same event. See: https://github.com/linux-audit/audit-kernel/issues/87 Signed-off-by: Richard Guy Briggs <rgb@redhat.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
29c1372d6a
commit
9b8753fffe
|
@ -2485,7 +2485,7 @@ void audit_seccomp(unsigned long syscall, long signr, int code)
|
||||||
{
|
{
|
||||||
struct audit_buffer *ab;
|
struct audit_buffer *ab;
|
||||||
|
|
||||||
ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_SECCOMP);
|
ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_SECCOMP);
|
||||||
if (unlikely(!ab))
|
if (unlikely(!ab))
|
||||||
return;
|
return;
|
||||||
audit_log_task(ab);
|
audit_log_task(ab);
|
||||||
|
|
Loading…
Reference in New Issue