On Wed, 11 May 2011, Will Drewry wrote: > +void seccomp_filter_log_failure(int syscall) > +{ > + printk(KERN_INFO > + "%s[%d]: system call %d (%s) blocked at ip:%lx\n", > + current->comm, task_pid_nr(current), syscall, > + syscall_nr_to_name(syscall), KSTK_EIP(current)); > +} I think it'd be a good idea to utilize the audit facility here. - James -- James Morris <jmorris@xxxxxxxxx>