From patchwork Mon Oct 16 18:18:54 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Richard Weinberger X-Patchwork-Id: 826451 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yG66R3Z47z9t3p for ; Tue, 17 Oct 2017 05:19:27 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756562AbdJPSS0 (ORCPT ); Mon, 16 Oct 2017 14:18:26 -0400 Received: from mail.sigma-star.at ([95.130.255.111]:45996 "EHLO mail.sigma-star.at" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754842AbdJPSSZ (ORCPT ); Mon, 16 Oct 2017 14:18:25 -0400 Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.sigma-star.at (Postfix) with ESMTP id C637324E0012; Mon, 16 Oct 2017 20:18:15 +0200 (CEST) Received: from blindfold.corp.sigma-star.at (richard.vpn.sigmapriv.at [10.3.0.5]) by mail.sigma-star.at (Postfix) with ESMTPSA id 2779724E0010; Mon, 16 Oct 2017 20:18:15 +0200 (CEST) From: Richard Weinberger To: netdev@vger.kernel.org Cc: linux-kernel@vger.kernel.org, daniel@iogearbox.net, ast@kernel.org, Richard Weinberger Subject: [PATCH 1/3] bpf: Don't check for current being NULL Date: Mon, 16 Oct 2017 20:18:54 +0200 Message-Id: <20171016181856.12497-1-richard@nod.at> X-Mailer: git-send-email 2.13.6 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org current is never NULL. Signed-off-by: Richard Weinberger --- kernel/bpf/helpers.c | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/kernel/bpf/helpers.c b/kernel/bpf/helpers.c index 3d24e238221e..e8845adcd15e 100644 --- a/kernel/bpf/helpers.c +++ b/kernel/bpf/helpers.c @@ -120,9 +120,6 @@ BPF_CALL_0(bpf_get_current_pid_tgid) { struct task_struct *task = current; - if (unlikely(!task)) - return -EINVAL; - return (u64) task->tgid << 32 | task->pid; } @@ -138,9 +135,6 @@ BPF_CALL_0(bpf_get_current_uid_gid) kuid_t uid; kgid_t gid; - if (unlikely(!task)) - return -EINVAL; - current_uid_gid(&uid, &gid); return (u64) from_kgid(&init_user_ns, gid) << 32 | from_kuid(&init_user_ns, uid); @@ -156,9 +150,6 @@ BPF_CALL_2(bpf_get_current_comm, char *, buf, u32, size) { struct task_struct *task = current; - if (unlikely(!task)) - goto err_clear; - strncpy(buf, task->comm, size); /* Verifier guarantees that size > 0. For task->comm exceeding @@ -167,9 +158,6 @@ BPF_CALL_2(bpf_get_current_comm, char *, buf, u32, size) */ buf[size - 1] = 0; return 0; -err_clear: - memset(buf, 0, size); - return -EINVAL; } const struct bpf_func_proto bpf_get_current_comm_proto = {