The important bit here is that at the end of the function we know that since "addr" isn't be NULL, it means we don't need to test "addr + offset" for NULL. The NULL test generates a static checker warning because often something else is intended. For example, a common bug looks like: addr = strchr(buf, ':') + 1; if (addr) { In that example, we intended to test the return of strchr() instead of "strchr() + 1". Techinically, with these static checker warnings you could worry about the addition wrapping but the NULL check wouldn't prevent "addr" from pointing to some other invalid memory outside the text area. Also pointer wrapping is undefined behavior in C. Signed-off-by: Dan Carpenter <dan.carpenter@xxxxxxxxxx> --- v2: more cleanups and changelog diff --git a/kernel/kprobes.c b/kernel/kprobes.c index d733479a10ee..ad30b5e22bda 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -1395,7 +1395,7 @@ static kprobe_opcode_t *_kprobe_addr(kprobe_opcode_t *addr, const char *symbol_name, unsigned int offset) { if ((symbol_name && addr) || (!symbol_name && !addr)) - goto invalid; + return ERR_PTR(-EINVAL); if (symbol_name) { kprobe_lookup_name(symbol_name, addr); @@ -1403,12 +1403,7 @@ static kprobe_opcode_t *_kprobe_addr(kprobe_opcode_t *addr, return ERR_PTR(-ENOENT); } - addr = (kprobe_opcode_t *)(((char *)addr) + offset); - if (addr) - return addr; - -invalid: - return ERR_PTR(-EINVAL); + return (kprobe_opcode_t *)(((char *)addr) + offset); } static kprobe_opcode_t *kprobe_addr(struct kprobe *p) -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html