aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/net_dropmonitor.py
diff options
context:
space:
mode:
authorAlex Dewar <[email protected]>2020-10-12 18:09:53 +0100
committerDaniel Borkmann <[email protected]>2020-10-15 21:05:23 +0200
commit83c11c17553c0fca217105c17444c4ef5ab2403f (patch)
tree8f1cdaab67e2766fd7d76e634098dc03ce1caf07 /tools/perf/scripts/python/net_dropmonitor.py
parent8a3feed90e75283f15f830b1051bf048e4127c91 (diff)
net, sockmap: Don't call bpf_prog_put() on NULL pointer
If bpf_prog_inc_not_zero() fails for skb_parser, then bpf_prog_put() is called unconditionally on skb_verdict, even though it may be NULL. Fix and tidy up error path. Fixes: 743df8b7749f ("bpf, sockmap: Check skb_verdict and skb_parser programs explicitly") Addresses-Coverity-ID: 1497799: Null pointer dereferences (FORWARD_NULL) Signed-off-by: Alex Dewar <[email protected]> Signed-off-by: Daniel Borkmann <[email protected]> Acked-by: Jakub Sitnicki <[email protected]> Acked-by: John Fastabend <[email protected]> Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'tools/perf/scripts/python/net_dropmonitor.py')
0 files changed, 0 insertions, 0 deletions