arm64: Do not invoke audit_syscall_* functions if !CONFIG_AUDIT_SYSCALL
authorCatalin Marinas <catalin.marinas@arm.com>
Thu, 24 Jul 2014 13:12:11 +0000 (14:12 +0100)
committerCatalin Marinas <catalin.marinas@arm.com>
Thu, 24 Jul 2014 15:01:17 +0000 (16:01 +0100)
This is a temporary patch to be able to compile the kernel in linux-next
where the audit_syscall_* API has been changed. To be reverted once the
proper arm64 fix can be applied.

Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
arch/arm64/kernel/ptrace.c

index 70526cfda056e7216ef7f773b059d31b6ca4f88a..0310811bd77d891fe248d0ddb6042af46d3f63ab 100644 (file)
@@ -1115,15 +1115,19 @@ asmlinkage int syscall_trace_enter(struct pt_regs *regs)
        if (test_thread_flag(TIF_SYSCALL_TRACEPOINT))
                trace_sys_enter(regs, regs->syscallno);
 
+#ifdef CONFIG_AUDITSYSCALL
        audit_syscall_entry(syscall_get_arch(), regs->syscallno,
                regs->orig_x0, regs->regs[1], regs->regs[2], regs->regs[3]);
+#endif
 
        return regs->syscallno;
 }
 
 asmlinkage void syscall_trace_exit(struct pt_regs *regs)
 {
+#ifdef CONFIG_AUDITSYSCALL
        audit_syscall_exit(regs);
+#endif
 
        if (test_thread_flag(TIF_SYSCALL_TRACEPOINT))
                trace_sys_exit(regs, regs_return_value(regs));