[PATCH v2] kprobes: cleanup _kprobe_addr()
From: Dan Carpenter
Date: Fri Mar 24 2017 - 05:51:52 EST
The important bit here is that at the end of the function we know that
since "addr" isn't be NULL, it means we don't need to test
"addr + offset" for NULL.
The NULL test generates a static checker warning because often something
else is intended. For example, a common bug looks like:
addr = strchr(buf, ':') + 1;
if (addr) {
In that example, we intended to test the return of strchr() instead of
"strchr() + 1".
Techinically, with these static checker warnings you could worry about
the addition wrapping but the NULL check wouldn't prevent "addr" from
pointing to some other invalid memory outside the text area. Also
pointer wrapping is undefined behavior in C.
Signed-off-by: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
---
v2: more cleanups and changelog
diff --git a/kernel/kprobes.c b/kernel/kprobes.c
index d733479a10ee..ad30b5e22bda 100644
--- a/kernel/kprobes.c
+++ b/kernel/kprobes.c
@@ -1395,7 +1395,7 @@ static kprobe_opcode_t *_kprobe_addr(kprobe_opcode_t *addr,
const char *symbol_name, unsigned int offset)
{
if ((symbol_name && addr) || (!symbol_name && !addr))
- goto invalid;
+ return ERR_PTR(-EINVAL);
if (symbol_name) {
kprobe_lookup_name(symbol_name, addr);
@@ -1403,12 +1403,7 @@ static kprobe_opcode_t *_kprobe_addr(kprobe_opcode_t *addr,
return ERR_PTR(-ENOENT);
}
- addr = (kprobe_opcode_t *)(((char *)addr) + offset);
- if (addr)
- return addr;
-
-invalid:
- return ERR_PTR(-EINVAL);
+ return (kprobe_opcode_t *)(((char *)addr) + offset);
}
static kprobe_opcode_t *kprobe_addr(struct kprobe *p)