diff options
| author | Oleg Nesterov <[email protected]> | 2013-09-11 14:24:42 -0700 |
|---|---|---|
| committer | Linus Torvalds <[email protected]> | 2013-09-11 15:59:05 -0700 |
| commit | 92eaa565add62d56b90987f58ea9feafc5a7c183 (patch) | |
| tree | 78f7bfaa0b99b2b2f5b554bc883b67ac68412e21 /tools/perf/scripts/python/event_analyzing_sample.py | |
| parent | 52f14282bb0c3d3e5ba2a9eaacb12ff37a033e7e (diff) | |
exec: kill ->load_binary != NULL check in search_binary_handler()
search_binary_handler() checks ->load_binary != NULL for no reason, this
method should be always defined. Turn this check into WARN_ON() and move
it into __register_binfmt().
Also, kill the function pointer. The current code looks confusing, as if
->load_binary can go away after read_unlock(&binfmt_lock). But we rely on
module_get(fmt->module), this fmt can't be changed or unregistered,
otherwise this code is buggy anyway.
Signed-off-by: Oleg Nesterov <[email protected]>
Acked-by: Kees Cook <[email protected]>
Cc: Al Viro <[email protected]>
Cc: Evgeniy Polyakov <[email protected]>
Cc: Zach Levis <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions