diff options
| author | Klaus Weidner <[email protected]> | 2007-05-16 17:45:42 -0500 |
|---|---|---|
| committer | Al Viro <[email protected]> | 2007-07-22 09:57:02 -0400 |
| commit | c926e4f432af0f61ac2b9b637fb51a4871a3fc91 (patch) | |
| tree | 732a5e76f2405ed84915997b59f8bad921d7ac04 /include/linux/debugobjects.h | |
| parent | 5b9a4262232d632c28990fcdf4f36d0e0ade5f18 (diff) | |
[PATCH] audit: fix broken class-based syscall audit
The sanity check in audit_match_class() is wrong. We are able to audit
2048 syscalls but in audit_match_class() we were accidentally using
sizeof(_u32) instead of number of bits in _u32 when deciding how many
syscalls were valid. On ia64 in particular we were hitting syscall
numbers over the (wrong) limit of 256. Fixing the audit_match_class
check takes care of the problem.
Signed-off-by: Klaus Weidner <[email protected]>
Signed-off-by: Al Viro <[email protected]>
Diffstat (limited to 'include/linux/debugobjects.h')
0 files changed, 0 insertions, 0 deletions