bpf, libbpf, smatch: Fix potential NULL pointer dereference
authorLeo Yan <leo.yan@linaro.org>
Tue, 2 Jul 2019 10:25:31 +0000 (18:25 +0800)
committerDaniel Borkmann <daniel@iogearbox.net>
Wed, 3 Jul 2019 10:17:29 +0000 (12:17 +0200)
commit33bae185f74d49a0d7b1bfaafb8e959efce0f243
tree267fab5843b79dcbc9dde80e5038f9b55334b8a2
parentcdfc7f888c2a355b01308e97c6df108f1c2b64e8
bpf, libbpf, smatch: Fix potential NULL pointer dereference

Based on the following report from Smatch, fix the potential NULL
pointer dereference check:

  tools/lib/bpf/libbpf.c:3493
  bpf_prog_load_xattr() warn: variable dereferenced before check 'attr'
  (see line 3483)

  3479 int bpf_prog_load_xattr(const struct bpf_prog_load_attr *attr,
  3480                         struct bpf_object **pobj, int *prog_fd)
  3481 {
  3482         struct bpf_object_open_attr open_attr = {
  3483                 .file           = attr->file,
  3484                 .prog_type      = attr->prog_type,
                                         ^^^^^^
  3485         };

At the head of function, it directly access 'attr' without checking
if it's NULL pointer. This patch moves the values assignment after
validating 'attr' and 'attr->file'.

Signed-off-by: Leo Yan <leo.yan@linaro.org>
Acked-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
tools/lib/bpf/libbpf.c