diff options
author | Alex Dewar <[email protected]> | 2020-10-12 18:09:53 +0100 |
---|---|---|
committer | Daniel Borkmann <[email protected]> | 2020-10-15 21:05:23 +0200 |
commit | 83c11c17553c0fca217105c17444c4ef5ab2403f (patch) | |
tree | 8f1cdaab67e2766fd7d76e634098dc03ce1caf07 /net/unix/scm.c | |
parent | 8a3feed90e75283f15f830b1051bf048e4127c91 (diff) |
net, sockmap: Don't call bpf_prog_put() on NULL pointer
If bpf_prog_inc_not_zero() fails for skb_parser, then bpf_prog_put() is
called unconditionally on skb_verdict, even though it may be NULL. Fix
and tidy up error path.
Fixes: 743df8b7749f ("bpf, sockmap: Check skb_verdict and skb_parser programs explicitly")
Addresses-Coverity-ID: 1497799: Null pointer dereferences (FORWARD_NULL)
Signed-off-by: Alex Dewar <[email protected]>
Signed-off-by: Daniel Borkmann <[email protected]>
Acked-by: Jakub Sitnicki <[email protected]>
Acked-by: John Fastabend <[email protected]>
Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'net/unix/scm.c')
0 files changed, 0 insertions, 0 deletions