udp: Don't dereference uflow before NULL check in udp_reply_sock_handler()
We have an ASSERT() verifying that we're able to look up the flow in udp_reply_sock_handler(). However, we dereference uflow before that in an initializer, rather defeating the point. Rearrange to avoid that. Signed-off-by: David Gibson <david@gibson.dropbear.id.au> Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
This commit is contained in:
parent
d8e05a3fe0
commit
6f913b3af0
1 changed files with 3 additions and 2 deletions
5
udp.c
5
udp.c
|
@ -644,12 +644,13 @@ void udp_reply_sock_handler(const struct ctx *c, union epoll_ref ref,
|
||||||
flow_sidx_t tosidx = flow_sidx_opposite(ref.flowside);
|
flow_sidx_t tosidx = flow_sidx_opposite(ref.flowside);
|
||||||
const struct flowside *toside = flowside_at_sidx(tosidx);
|
const struct flowside *toside = flowside_at_sidx(tosidx);
|
||||||
struct udp_flow *uflow = udp_at_sidx(ref.flowside);
|
struct udp_flow *uflow = udp_at_sidx(ref.flowside);
|
||||||
int from_s = uflow->s[ref.flowside.sidei];
|
|
||||||
uint8_t topif = pif_at_sidx(tosidx);
|
uint8_t topif = pif_at_sidx(tosidx);
|
||||||
int n, i;
|
int n, i, from_s;
|
||||||
|
|
||||||
ASSERT(!c->no_udp && uflow);
|
ASSERT(!c->no_udp && uflow);
|
||||||
|
|
||||||
|
from_s = uflow->s[ref.flowside.sidei];
|
||||||
|
|
||||||
if (udp_sock_errs(c, from_s, events) < 0) {
|
if (udp_sock_errs(c, from_s, events) < 0) {
|
||||||
flow_err(uflow, "Unrecoverable error on reply socket");
|
flow_err(uflow, "Unrecoverable error on reply socket");
|
||||||
flow_err_details(uflow);
|
flow_err_details(uflow);
|
||||||
|
|
Loading…
Reference in a new issue