diff options
author | Jann Horn <jannh@google.com> | 2018-04-20 18:16:30 +0200 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2018-04-20 22:09:51 +0200 |
commit | 6ab690aa439803347743c0d899ac422774fdd5e7 (patch) | |
tree | 00b5f22bc75eef2a0fdc135578490f9d70c2acfb /kernel/bpf/sockmap.c | |
parent | tools/bpf: fix test_sock and test_sock_addr.sh failure (diff) | |
download | linux-6ab690aa439803347743c0d899ac422774fdd5e7.tar.xz linux-6ab690aa439803347743c0d899ac422774fdd5e7.zip |
bpf: sockmap remove dead check
Remove dead code that bails on `attr->value_size > KMALLOC_MAX_SIZE` - the
previous check already bails on `attr->value_size != 4`.
Signed-off-by: Jann Horn <jannh@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'kernel/bpf/sockmap.c')
-rw-r--r-- | kernel/bpf/sockmap.c | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/kernel/bpf/sockmap.c b/kernel/bpf/sockmap.c index 8dd9210d7db7..a3b21385e947 100644 --- a/kernel/bpf/sockmap.c +++ b/kernel/bpf/sockmap.c @@ -1442,9 +1442,6 @@ static struct bpf_map *sock_map_alloc(union bpf_attr *attr) attr->value_size != 4 || attr->map_flags & ~SOCK_CREATE_FLAG_MASK) return ERR_PTR(-EINVAL); - if (attr->value_size > KMALLOC_MAX_SIZE) - return ERR_PTR(-E2BIG); - err = bpf_tcp_ulp_register(); if (err && err != -EEXIST) return ERR_PTR(err); |