audit: bail before bug check if audit disabled
authorRichard Guy Briggs <rgb@redhat.com>
Thu, 15 Feb 2018 02:47:44 +0000 (21:47 -0500)
committerPaul Moore <paul@paul-moore.com>
Thu, 15 Feb 2018 19:40:25 +0000 (14:40 -0500)
If audit is disabled, who cares if there is a bug indicating syscall in
process or names already recorded.  Bail immediately on audit disabled.

Signed-off-by: Richard Guy Briggs <rgb@redhat.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
kernel/auditsc.c

index bc534bfb49a40ea9fae3c25896c7bda522e1de33..4e0a4ac803db72499f67822233f6db70d7b6f3b8 100644 (file)
@@ -1511,14 +1511,11 @@ void __audit_syscall_entry(int major, unsigned long a1, unsigned long a2,
        struct audit_context *context = tsk->audit_context;
        enum audit_state     state;
 
-       if (!context)
+       if (!audit_enabled || !context)
                return;
 
        BUG_ON(context->in_syscall || context->name_count);
 
-       if (!audit_enabled)
-               return;
-
        state = context->state;
        if (state == AUDIT_DISABLED)
                return;