lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <tip-bfb3d7b8b906b66551424d7636182126e1d134c8@git.kernel.org> Date: Sat, 21 Apr 2018 00:49:58 -0700 From: tip-bot for Jiri Olsa <tipbot@...or.com> To: linux-tip-commits@...r.kernel.org Cc: hpa@...or.com, linux-kernel@...r.kernel.org, acme@...hat.com, peterz@...radead.org, jolsa@...nel.org, andi@...stfloor.org, namhyung@...nel.org, tglx@...utronix.de, mingo@...nel.org, alexander.shishkin@...ux.intel.com Subject: [tip:perf/urgent] perf: Remove superfluous allocation error check Commit-ID: bfb3d7b8b906b66551424d7636182126e1d134c8 Gitweb: https://git.kernel.org/tip/bfb3d7b8b906b66551424d7636182126e1d134c8 Author: Jiri Olsa <jolsa@...nel.org> AuthorDate: Sun, 15 Apr 2018 11:23:52 +0200 Committer: Arnaldo Carvalho de Melo <acme@...hat.com> CommitDate: Tue, 17 Apr 2018 09:47:40 -0300 perf: Remove superfluous allocation error check If the get_callchain_buffers fails to allocate the buffer it will decrease the nr_callchain_events right away. There's no point of checking the allocation error for nr_callchain_events > 1. Removing that check. Signed-off-by: Jiri Olsa <jolsa@...nel.org> Tested-by: Arnaldo Carvalho de Melo <acme@...hat.com> Cc: Alexander Shishkin <alexander.shishkin@...ux.intel.com> Cc: Andi Kleen <andi@...stfloor.org> Cc: H. Peter Anvin <hpa@...or.com> Cc: Namhyung Kim <namhyung@...nel.org> Cc: Peter Zijlstra <peterz@...radead.org> Cc: Thomas Gleixner <tglx@...utronix.de> Cc: syzkaller-bugs@...glegroups.com Cc: x86@...nel.org Link: http://lkml.kernel.org/r/20180415092352.12403-3-jolsa@kernel.org Signed-off-by: Arnaldo Carvalho de Melo <acme@...hat.com> --- kernel/events/callchain.c | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/kernel/events/callchain.c b/kernel/events/callchain.c index 73cc26e321de..c187aa3df3c8 100644 --- a/kernel/events/callchain.c +++ b/kernel/events/callchain.c @@ -131,14 +131,8 @@ int get_callchain_buffers(int event_max_stack) goto exit; } - if (count > 1) { - /* If the allocation failed, give up */ - if (!callchain_cpus_entries) - err = -ENOMEM; - goto exit; - } - - err = alloc_callchain_buffers(); + if (count == 1) + err = alloc_callchain_buffers(); exit: if (err) atomic_dec(&nr_callchain_events);
Powered by blists - more mailing lists