|
@@ -1349,7 +1349,7 @@ EXPORT_SYMBOL(remove_arg_zero);
|
|
|
/*
|
|
|
* cycle the list of binary formats handler, until one recognizes the image
|
|
|
*/
|
|
|
-int search_binary_handler(struct linux_binprm *bprm,struct pt_regs *regs)
|
|
|
+int search_binary_handler(struct linux_binprm *bprm)
|
|
|
{
|
|
|
unsigned int depth = bprm->recursion_depth;
|
|
|
int try,retval;
|
|
@@ -1380,7 +1380,7 @@ int search_binary_handler(struct linux_binprm *bprm,struct pt_regs *regs)
|
|
|
if (!try_module_get(fmt->module))
|
|
|
continue;
|
|
|
read_unlock(&binfmt_lock);
|
|
|
- retval = fn(bprm, regs);
|
|
|
+ retval = fn(bprm, current_pt_regs());
|
|
|
/*
|
|
|
* Restore the depth counter to its starting value
|
|
|
* in this call, so we don't have to rely on every
|
|
@@ -1447,7 +1447,6 @@ static int do_execve_common(const char *filename,
|
|
|
bool clear_in_exec;
|
|
|
int retval;
|
|
|
const struct cred *cred = current_cred();
|
|
|
- struct pt_regs *regs = current_pt_regs();
|
|
|
|
|
|
/*
|
|
|
* We move the actual failure in case of RLIMIT_NPROC excess from
|
|
@@ -1524,7 +1523,7 @@ static int do_execve_common(const char *filename,
|
|
|
if (retval < 0)
|
|
|
goto out;
|
|
|
|
|
|
- retval = search_binary_handler(bprm,regs);
|
|
|
+ retval = search_binary_handler(bprm);
|
|
|
if (retval < 0)
|
|
|
goto out;
|
|
|
|