diff options
author | Catalin Marinas <catalin.marinas@arm.com> | 2014-07-24 15:12:11 +0200 |
---|---|---|
committer | Catalin Marinas <catalin.marinas@arm.com> | 2014-07-24 17:01:17 +0200 |
commit | 2a8f45b040bcb9b2ad2845f061499d1b6f41cc7b (patch) | |
tree | c572d4786682bae3dcbd288fe1c743c109621e2e /arch/arm64/kernel/ptrace.c | |
parent | arm64: Fix barriers used for page table modifications (diff) | |
download | linux-2a8f45b040bcb9b2ad2845f061499d1b6f41cc7b.tar.xz linux-2a8f45b040bcb9b2ad2845f061499d1b6f41cc7b.zip |
arm64: Do not invoke audit_syscall_* functions if !CONFIG_AUDIT_SYSCALL
This is a temporary patch to be able to compile the kernel in linux-next
where the audit_syscall_* API has been changed. To be reverted once the
proper arm64 fix can be applied.
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to 'arch/arm64/kernel/ptrace.c')
-rw-r--r-- | arch/arm64/kernel/ptrace.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/arch/arm64/kernel/ptrace.c b/arch/arm64/kernel/ptrace.c index 70526cfda056..0310811bd77d 100644 --- a/arch/arm64/kernel/ptrace.c +++ b/arch/arm64/kernel/ptrace.c @@ -1115,15 +1115,19 @@ asmlinkage int syscall_trace_enter(struct pt_regs *regs) if (test_thread_flag(TIF_SYSCALL_TRACEPOINT)) trace_sys_enter(regs, regs->syscallno); +#ifdef CONFIG_AUDITSYSCALL audit_syscall_entry(syscall_get_arch(), regs->syscallno, regs->orig_x0, regs->regs[1], regs->regs[2], regs->regs[3]); +#endif return regs->syscallno; } asmlinkage void syscall_trace_exit(struct pt_regs *regs) { +#ifdef CONFIG_AUDITSYSCALL audit_syscall_exit(regs); +#endif if (test_thread_flag(TIF_SYSCALL_TRACEPOINT)) trace_sys_exit(regs, regs_return_value(regs)); |