Add null check to avoid a potential null pointer dereference.
Addresses-Coverity-ID: 1408831 Signed-off-by: Gustavo A. R. Silva garsilva@embeddedor.com --- drivers/net/gtp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/net/gtp.c b/drivers/net/gtp.c index 4fea1b3..7b652bb 100644 --- a/drivers/net/gtp.c +++ b/drivers/net/gtp.c @@ -873,7 +873,7 @@ static struct gtp_dev *gtp_find_dev(struct net *src_net, struct nlattr *nla[])
/* Check if there's an existing gtpX device to configure */ dev = dev_get_by_index_rcu(net, nla_get_u32(nla[GTPA_LINK])); - if (dev->netdev_ops == >p_netdev_ops) + if (dev && dev->netdev_ops == >p_netdev_ops) gtp = netdev_priv(dev);
put_net(net);
On Tue, May 23, 2017 at 06:18:37PM -0500, Gustavo A. R. Silva wrote:
Add null check to avoid a potential null pointer dereference.
Addresses-Coverity-ID: 1408831 Signed-off-by: Gustavo A. R. Silva garsilva@embeddedor.com
Acked-by: Pablo Neira Ayuso pablo@netfilter.org
This is a fix for the net.git tree BTW.
From: "Gustavo A. R. Silva" garsilva@embeddedor.com Date: Tue, 23 May 2017 18:18:37 -0500
Add null check to avoid a potential null pointer dereference.
Addresses-Coverity-ID: 1408831 Signed-off-by: Gustavo A. R. Silva garsilva@embeddedor.com
Applied, thank you.
osmocom-net-gprs@lists.osmocom.org