diff --git a/fs/verity/signature.c b/fs/verity/signature.c index 006378d85ff04b95c7387578c5b9044819516bfa..3747ccbc07bbca37d8e1ca6a7a05f03d0aa21c88 100644 --- a/fs/verity/signature.c +++ b/fs/verity/signature.c @@ -55,7 +55,7 @@ static inline int fsverity_verify_certchain(struct fsverity_info *vi, int ret = 0; CALL_HCK_LITE_HOOK(code_sign_verify_certchain_lhck, - raw_pkcs7, pkcs7_len, &vi->fcs_info, &ret); + raw_pkcs7, pkcs7_len, vi, &ret); if (ret > 0) { fsverity_set_cert_type(vi, ret); ret = 0; diff --git a/include/linux/hck/lite_hck_code_sign.h b/include/linux/hck/lite_hck_code_sign.h index d479babbf5cb45ba85bdad2f04e2076c550dd7f5..425a49212bf00130a837a1f5b33bd4c0933f4208 100644 --- a/include/linux/hck/lite_hck_code_sign.h +++ b/include/linux/hck/lite_hck_code_sign.h @@ -17,9 +17,9 @@ #else DECLARE_HCK_LITE_HOOK(code_sign_verify_certchain_lhck, - TP_PROTO(const void *raw_pkcs7, size_t pkcs7_len, struct cs_info *cs_info, + TP_PROTO(const void *raw_pkcs7, size_t pkcs7_len, struct fsverity_info *vi, int *ret), - TP_ARGS(raw_pkcs7, pkcs7_len, cs_info, ret)); + TP_ARGS(raw_pkcs7, pkcs7_len, vi, ret)); DECLARE_HCK_LITE_HOOK(code_sign_check_descriptor_lhck, TP_PROTO(const struct inode *inode, const void *desc, int *ret),