On 4/22/25 11:23 AM, Prabhav Kumar Vaish wrote:
Ensure that 'tcp' is checked for NULL before dereferencing. This resolves
a potential null pointer dereference warning reported by static analysis.

Signed-off-by: Prabhav Kumar Vaish <pvkumar5749...@gmail.com>
---
  tools/testing/selftests/bpf/progs/skb_pkt_end.c | 4 ++--
  1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/tools/testing/selftests/bpf/progs/skb_pkt_end.c 
b/tools/testing/selftests/bpf/progs/skb_pkt_end.c
index 3bb4451524a1..db33ff2839f7 100644
--- a/tools/testing/selftests/bpf/progs/skb_pkt_end.c
+++ b/tools/testing/selftests/bpf/progs/skb_pkt_end.c
@@ -45,10 +45,10 @@ int main_prog(struct __sk_buff *skb)
                goto out;
tcp = (void*)(ip + 1);
-       if (tcp->dest != 0)
-               goto out;
        if (!tcp)

This case will never be hit, so this change is not doing anything other than silencing the static checker. Take a look at commit 9cc873e85800 ("selftests/bpf: Add skb_pkt_end test"). The test was written to have a specific llvm generated code. You will need to check the generated code is still testing what it is supposed to test.

pw-bot: cr

                goto out;
+       if (tcp->dest != 0)
+               goto out;
urg_ptr = tcp->urg_ptr;


Reply via email to