diff options
| author | Quentin Monnet <[email protected]> | 2024-03-14 15:04:38 +0000 |
|---|---|---|
| committer | Andrii Nakryiko <[email protected]> | 2024-03-14 13:41:17 -0700 |
| commit | 9bf48fa19a4b1d186e08b20bf7e5de26a15644fb (patch) | |
| tree | 1fcbb6ba740bcc479893149a2ad3f1dc2f83db8d /tools/perf/scripts/python/arm-cs-trace-disasm.py | |
| parent | fe879bb42f8a6513ed18e9d22efb99cb35590201 (diff) | |
libbpf: Prevent null-pointer dereference when prog to load has no BTF
In bpf_objec_load_prog(), there's no guarantee that obj->btf is non-NULL
when passing it to btf__fd(), and this function does not perform any
check before dereferencing its argument (as bpf_object__btf_fd() used to
do). As a consequence, we get segmentation fault errors in bpftool (for
example) when trying to load programs that come without BTF information.
v2: Keep btf__fd() in the fix instead of reverting to bpf_object__btf_fd().
Fixes: df7c3f7d3a3d ("libbpf: make uniform use of btf__fd() accessor inside libbpf")
Suggested-by: Andrii Nakryiko <[email protected]>
Signed-off-by: Quentin Monnet <[email protected]>
Signed-off-by: Andrii Nakryiko <[email protected]>
Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'tools/perf/scripts/python/arm-cs-trace-disasm.py')
0 files changed, 0 insertions, 0 deletions