There is a 'malloc' call, which can be unsuccessful.
Add the malloc failure checking to avoid possible null
dereference.

Signed-off-by: Kunwu Chan <chen...@kylinos.cn>
---
 tools/testing/selftests/bpf/prog_tests/tp_attach_query.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c 
b/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c
index 655d69f0ff0b..302b25408a53 100644
--- a/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c
+++ b/tools/testing/selftests/bpf/prog_tests/tp_attach_query.c
@@ -39,6 +39,9 @@ void serial_test_tp_attach_query(void)
        attr.wakeup_events = 1;
 
        query = malloc(sizeof(*query) + sizeof(__u32) * num_progs);
+       if (CHECK(!query, "malloc()", "error:%s\n", strerror(errno)))
+               return;
+
        for (i = 0; i < num_progs; i++) {
                err = bpf_prog_test_load(file, BPF_PROG_TYPE_TRACEPOINT, 
&obj[i],
                                    &prog_fd[i]);
-- 
2.40.1


Reply via email to