On 12/03/2018 11:39 AM, Daniel T. Lee wrote: > When NULL pointer accidentally passed to write_kprobe_events, > due to strlen(NULL), segmentation fault happens. > Changed code returns -1 to deal with this situation. > > Bug issued with Smatch, static analysis. > > Signed-off-by: Daniel T. Lee <danieltim...@gmail.com>
Applied to bpf-next, thanks!