-
Notifications
You must be signed in to change notification settings - Fork 145
libbpf: Fix null pointer dereference in btf_dump__free on allocation failure #9136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Upstream branch: f66b4aa |
13e07b5
to
ca6e071
Compare
Upstream branch: a633dab |
78029e4
to
eb99689
Compare
ca6e071
to
2f8bb38
Compare
At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=972865 expired. Closing PR. |
Upstream branch: bd07bd1 |
eb99689
to
54e32a1
Compare
9860b87
to
7801208
Compare
Upstream branch: cd7312a |
54e32a1
to
15c3dbf
Compare
7801208
to
a994d4a
Compare
Upstream branch: e30329b |
15c3dbf
to
8d77f82
Compare
a994d4a
to
e7d5deb
Compare
Upstream branch: 99fe8af |
8d77f82
to
d1e0b5b
Compare
e7d5deb
to
1c12ad1
Compare
Upstream branch: c11f34e |
d1e0b5b
to
ee3e978
Compare
1c12ad1
to
4b5a6fc
Compare
Upstream branch: 3ce7cdd |
…failure When btf_dump__new() fails to allocate memory for the internal hashmap (btf_dump->type_names), it returns an error code. However, the cleanup function btf_dump__free() does not check if btf_dump->type_names is NULL before attempting to free it. This leads to a null pointer dereference when btf_dump__free() is called on a btf_dump object. Fix: 351131b ("libbpf: add btf_dump API for BTF-to-C conversion") Signed-off-by: chenyuan <[email protected]>
ee3e978
to
17f4b2b
Compare
At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=973172 irrelevant now. Closing PR. |
Pull request for series with
subject: libbpf: Fix null pointer dereference in btf_dump__free on allocation failure
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=972865