diff mbox series

bpf: remove redundant null pointer check before consume_skb

Message ID 1537436772-42545-1-git-send-email-zhongjiang@huawei.com
State Accepted, archived
Delegated to: BPF Maintainers
Headers show
Series bpf: remove redundant null pointer check before consume_skb | expand

Commit Message

zhong jiang Sept. 20, 2018, 9:46 a.m. UTC
consume_skb has taken the null pointer into account. hence it is safe
to remove the redundant null pointer check before consume_skb.

Signed-off-by: zhong jiang <zhongjiang@huawei.com>
---
 kernel/bpf/sockmap.c | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

Comments

Song Liu Sept. 20, 2018, 5:53 p.m. UTC | #1
On Thu, Sep 20, 2018 at 3:00 AM zhong jiang <zhongjiang@huawei.com> wrote:
>
> consume_skb has taken the null pointer into account. hence it is safe
> to remove the redundant null pointer check before consume_skb.
>
> Signed-off-by: zhong jiang <zhongjiang@huawei.com>

Acked-by: Song Liu <songliubraving@fb.com>

> ---
>  kernel/bpf/sockmap.c | 6 ++----
>  1 file changed, 2 insertions(+), 4 deletions(-)
>
> diff --git a/kernel/bpf/sockmap.c b/kernel/bpf/sockmap.c
> index 488ef96..a9359cb 100644
> --- a/kernel/bpf/sockmap.c
> +++ b/kernel/bpf/sockmap.c
> @@ -590,8 +590,7 @@ static int free_sg(struct sock *sk, int start,
>                 if (i == MAX_SKB_FRAGS)
>                         i = 0;
>         }
> -       if (md->skb)
> -               consume_skb(md->skb);
> +       consume_skb(md->skb);
>
>         return free;
>  }
> @@ -973,8 +972,7 @@ static int bpf_tcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len,
>
>                 if (!sg->length && md->sg_start == md->sg_end) {
>                         list_del(&md->list);
> -                       if (md->skb)
> -                               consume_skb(md->skb);
> +                       consume_skb(md->skb);
>                         kfree(md);
>                 }
>         }
> --
> 1.7.12.4
>
Daniel Borkmann Sept. 22, 2018, 1:08 a.m. UTC | #2
On 09/20/2018 11:46 AM, zhong jiang wrote:
> consume_skb has taken the null pointer into account. hence it is safe
> to remove the redundant null pointer check before consume_skb.
> 
> Signed-off-by: zhong jiang <zhongjiang@huawei.com>

Applied to bpf-next, thanks Zhong!
diff mbox series

Patch

diff --git a/kernel/bpf/sockmap.c b/kernel/bpf/sockmap.c
index 488ef96..a9359cb 100644
--- a/kernel/bpf/sockmap.c
+++ b/kernel/bpf/sockmap.c
@@ -590,8 +590,7 @@  static int free_sg(struct sock *sk, int start,
 		if (i == MAX_SKB_FRAGS)
 			i = 0;
 	}
-	if (md->skb)
-		consume_skb(md->skb);
+	consume_skb(md->skb);
 
 	return free;
 }
@@ -973,8 +972,7 @@  static int bpf_tcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len,
 
 		if (!sg->length && md->sg_start == md->sg_end) {
 			list_del(&md->list);
-			if (md->skb)
-				consume_skb(md->skb);
+			consume_skb(md->skb);
 			kfree(md);
 		}
 	}