diff --git a/fs/verity/signature.c b/fs/verity/signature.c index 89093c55eccaf792da0917c18ba581ab605514c8..e153a37dfe6bacdf9db1603238ec33a5c057ddd5 100644 --- a/fs/verity/signature.c +++ b/fs/verity/signature.c @@ -63,7 +63,7 @@ static inline int fsverity_verify_certchain(struct fsverity_info *vi, int ret = 0; CALL_HCK_LITE_HOOK(code_sign_verify_certchain_lhck, - raw_pkcs7, pkcs7_len, &vi->fcs_info, &ret); + raw_pkcs7, pkcs7_len, vi, &ret); if (ret > 0) { fsverity_set_cert_type(vi, ret); ret = 0; diff --git a/include/linux/hck/lite_hck_code_sign.h b/include/linux/hck/lite_hck_code_sign.h index cde82bc34ab1176d5ec50e6aea4dcab7e66f2f5f..83bcddaf0011a08aab079a0adbf070e4e47d9b96 100644 --- a/include/linux/hck/lite_hck_code_sign.h +++ b/include/linux/hck/lite_hck_code_sign.h @@ -18,9 +18,9 @@ #else DECLARE_HCK_LITE_HOOK(code_sign_verify_certchain_lhck, - TP_PROTO(const void *raw_pkcs7, size_t pkcs7_len, struct cs_info *cs_info, + TP_PROTO(const void *raw_pkcs7, size_t pkcs7_len, struct fsverity_info *vi, int *ret), - TP_ARGS(raw_pkcs7, pkcs7_len, cs_info, ret)); + TP_ARGS(raw_pkcs7, pkcs7_len, vi, ret)); DECLARE_HCK_LITE_HOOK(code_sign_check_descriptor_lhck, TP_PROTO(const struct inode *inode, const void *desc, int *ret),