On 12/03/2018 11:39 AM, Daniel T. Lee wrote:
> When NULL pointer accidentally passed to write_kprobe_events,
> due to strlen(NULL), segmentation fault happens.
> Changed code returns -1 to deal with this situation.
> 
> Bug issued with Smatch, static analysis.
> 
> Signed-off-by: Daniel T. Lee <danieltim...@gmail.com>

Applied to bpf-next, thanks!

Reply via email to