Skip to content
Commit c926e4f4 authored by Klaus Weidner's avatar Klaus Weidner Committed by Al Viro
Browse files

[PATCH] audit: fix broken class-based syscall audit



The sanity check in audit_match_class() is wrong.  We are able to audit
2048 syscalls but in audit_match_class() we were accidentally using
sizeof(_u32) instead of number of bits in _u32 when deciding how many
syscalls were valid.  On ia64 in particular we were hitting syscall
numbers over the (wrong) limit of 256.  Fixing the audit_match_class
check takes care of the problem.

Signed-off-by: default avatarKlaus Weidner <klaus@atsec.com>
Signed-off-by: default avatarAl Viro <viro@zeniv.linux.org.uk>
parent 5b9a4262
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment