From 23648c23cd3ad055c72b6b9807920a2070f4e8d8 Mon Sep 17 00:00:00 2001 From: Randy Dunlap Date: Sat, 21 Jan 2012 11:02:24 -0800 Subject: [PATCH] --- yaml --- r: 286611 b: refs/heads/master c: 42ae610c1a820ddecb80943d4ccfc936f7772535 h: refs/heads/master i: 286609: 2807285639ccbeb3f207a3f4006e18f4fccb3306 286607: 1ba467f9dca66442cbb95b966ebef320770d7424 v: v3 --- [refs] | 2 +- trunk/kernel/auditsc.c | 5 +++-- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/[refs] b/[refs] index 0d254b3151ed..6e8d20f9e076 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: 70c95b00b87f85ce5a15b7899aaa862eacd2364a +refs/heads/master: 42ae610c1a820ddecb80943d4ccfc936f7772535 diff --git a/trunk/kernel/auditsc.c b/trunk/kernel/auditsc.c index caaea6e944f8..af1de0f34eae 100644 --- a/trunk/kernel/auditsc.c +++ b/trunk/kernel/auditsc.c @@ -1863,11 +1863,12 @@ void __audit_syscall_entry(int arch, int major, /** * audit_syscall_exit - deallocate audit context after a system call - * @pt_regs: syscall registers + * @success: success value of the syscall + * @return_code: return value of the syscall * * Tear down after system call. If the audit context has been marked as * auditable (either because of the AUDIT_RECORD_CONTEXT state from - * filtering, or because some other part of the kernel write an audit + * filtering, or because some other part of the kernel wrote an audit * message), then write out the syscall information. In call cases, * free the names stored from getname(). */