[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <30061d06-d91e-738e-3a8b-3c94889f649a@iogearbox.net>
Date: Mon, 3 Dec 2018 23:59:46 +0100
From: Daniel Borkmann <daniel@...earbox.net>
To: "Daniel T. Lee" <danieltimlee@...il.com>,
Alexei Starovoitov <ast@...nel.org>
Cc: netdev@...r.kernel.org
Subject: Re: [PATCH v2] samples: bpf: fix: seg fault with NULL pointer arg
On 12/03/2018 11:39 AM, Daniel T. Lee wrote:
> When NULL pointer accidentally passed to write_kprobe_events,
> due to strlen(NULL), segmentation fault happens.
> Changed code returns -1 to deal with this situation.
>
> Bug issued with Smatch, static analysis.
>
> Signed-off-by: Daniel T. Lee <danieltimlee@...il.com>
Applied to bpf-next, thanks!
Powered by blists - more mailing lists