|
@@ -395,7 +395,7 @@ seccomp_prepare_user_filter(const char __user *user_filter)
|
|
struct seccomp_filter *filter = ERR_PTR(-EFAULT);
|
|
struct seccomp_filter *filter = ERR_PTR(-EFAULT);
|
|
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
#ifdef CONFIG_COMPAT
|
|
- if (is_compat_task()) {
|
|
|
|
|
|
+ if (in_compat_syscall()) {
|
|
struct compat_sock_fprog fprog32;
|
|
struct compat_sock_fprog fprog32;
|
|
if (copy_from_user(&fprog32, user_filter, sizeof(fprog32)))
|
|
if (copy_from_user(&fprog32, user_filter, sizeof(fprog32)))
|
|
goto out;
|
|
goto out;
|
|
@@ -529,7 +529,7 @@ static void __secure_computing_strict(int this_syscall)
|
|
{
|
|
{
|
|
int *syscall_whitelist = mode1_syscalls;
|
|
int *syscall_whitelist = mode1_syscalls;
|
|
#ifdef CONFIG_COMPAT
|
|
#ifdef CONFIG_COMPAT
|
|
- if (is_compat_task())
|
|
|
|
|
|
+ if (in_compat_syscall())
|
|
syscall_whitelist = mode1_syscalls_32;
|
|
syscall_whitelist = mode1_syscalls_32;
|
|
#endif
|
|
#endif
|
|
do {
|
|
do {
|