From nobody Thu Apr 16 19:12:45 2026 Received: from mail-pf1-f194.google.com (mail-pf1-f194.google.com [209.85.210.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B9E2139282C for ; Thu, 26 Feb 2026 07:58:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.194 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772092695; cv=none; b=SnZQj8zKoZU3tqx+QLZI8w36pcFVOoeRoJmb8SEtiJe+WbeW0ih5vkEHdhkUoPZkC4jF+02PPSNnkktROewGggwzN7KAgiqRsOqPpsFLavTHIGLAmWC/Xid/DHC8+vigxut/H9f+55cizc51qE4wtjZs8LRJUrcvDUEjyNAWVGs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772092695; c=relaxed/simple; bh=gGVWYxuqBAKRWboZgB22e5eeNoS9Nlu8uKEOSkH2WZI=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=MqPWBwI/IyV22d0W4iiqwBdHWqTDvapMF//m3Br2WJF3xk9apNHPBQJkvwAoj5XRhJPIQzp2aDtA1XaUCznycTeZw1a78Dn8ALsroEqVdFyLDCvvRJBSCNOzNRzZzeJ7NvMozj5e8BG65MNrQqie7MJ+8UeMdxUPJj0OnG59TqI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=kZE4UIWj; arc=none smtp.client-ip=209.85.210.194 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="kZE4UIWj" Received: by mail-pf1-f194.google.com with SMTP id d2e1a72fcca58-827270d50d4so628925b3a.3 for ; Wed, 25 Feb 2026 23:58:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1772092692; x=1772697492; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=eUDb1Uv2996od0EfWXbTj1EoPcd9eJP51i6xtNWuFfk=; b=kZE4UIWjq6JNDcD/2wRly97yHkjRp2brP29x1wgp2X2xTZEnDev/ReVObT1sG5vVh3 DqSLjVBqQdv6Rs8XZtl4nQMvAEs0LmWfPZeNI27Y2czQ62PHx7ziVJ8yEBDG20mBwR8C kreVdZFCsjT5gopZdI7ig0oAQi92TS9u5LfWDibDm52Du4dIPBJlTHDweQIHsJ2fF4WP BO5y5aXT19wNsNHRHMY7EMWCvO42i0frKDL2qS19LzFOi6LBF5K5+WH/pVSutod695jo jlICYZ7rlsv2mjFe3d35XIWb26r9Qefo+C6GdcjvukwCFMuSns+cVPRApGoOJFA6ILcU intw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772092692; x=1772697492; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=eUDb1Uv2996od0EfWXbTj1EoPcd9eJP51i6xtNWuFfk=; b=qe9F6MldhieO+AbJ8toKJYd0zxXRRbkH1EypEJl5dxz1GajQUQ23nfx9PNSXL0qr4p oQ/F8aPE4FfxSgUmC+uLoZQ6UbwTMvYRbWtBfx/H8S+JRCtcELp/2fk2/ALNN4b/80ed +X1cvHKtgFCy7akYuKYP4v+amH4XMj65JdSX/xsql4Mns4EVkBDXhsbU069wLYp3Ts4C kh/2MEp71X8kOKBW7ZOmLdetsibTsGMeHdUXoeMHV3/h2cnZen5r+iqfGPUTMDUCCRa4 5GfxxyBglsBmRR1TzaFGt4nT3cXeMUlKj26EE7ulR7D7wT6OYeT//7p1oN/YVEsgf0oN TMXw== X-Forwarded-Encrypted: i=1; AJvYcCWcCxdOfTuicdxM1WFSPDOji8KU6i/VtFjcrshpOe5vC0a9UkoUOoGJttBDiFoMuDTrYkGgkBKme1GwvJA=@vger.kernel.org X-Gm-Message-State: AOJu0Yz13oOjeGlKaaTkrbEBZ/waPBaAOvRbg91xpag0s2ti2rutJM77 GWm35P4UyAvHs6OB6jLmbCFMcef4HLFjPPhEqiMcoN7DndLewUfmvku1 X-Gm-Gg: ATEYQzwo/EPDlRT3GtHJA1aPY7Dgu6m9sLNPRtDkXYh/Y1pUGIIXEG8xAV+WRLFLsm1 eDhgnHXEy0yftchG1enDzYzB1dhC53tnGzfI3/P8GLMyahhzZv6DB694UHaL6hC7kXejjW0w3hN a4plRGKQsGBOls6Y1a0MoAZeEkXNZYTReBLV2SGF56x9PT2sUvcfPeRExWKXR4hf8ysEcPd+oEI 1+BPkCY45bPVIG5Y/3gz0n4XBjNcXJatMy2WaLEsAdL32eLSZQA7Fz/cpkw0gUm5G9N6Z9gMiEq JDNPFzoDnH4qg/Wh5S3HtD6Ci990F1HJWDeQc28wFCZxvHdqehqC5cd9+gMEBYTbVBN1qOoSyPj J8NTQLcNz5zrnNEBo+7JjUBf7VgOM+Z7uNpr+bgCI/ZhjDlP9T3gmZZJfmFlcyYEhxbNttH1pBn unaeym+uDrjquIrLTyt2cR0yfO5XxiyFpRjTFpfSheRQcrJOa/bnviyaGiM53nGOLQag9b X-Received: by 2002:a05:6a00:2290:b0:824:9edb:454 with SMTP id d2e1a72fcca58-8273bfa1d7bmr1758347b3a.37.1772092691828; Wed, 25 Feb 2026 23:58:11 -0800 (PST) Received: from zeeshan-Standard-PC-Q35-ICH9-2009.. ([110.93.227.54]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-82739ff1ccasm1483485b3a.39.2026.02.25.23.58.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 Feb 2026 23:58:11 -0800 (PST) From: Zeeshan Ahmad To: Sridhar Samudrala , "David S . Miller" , Jakub Kicinski , Paolo Abeni , Eric Dumazet Cc: netdev@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org, Simon Horman , Zeeshan Ahmad Subject: [PATCH net v2] net: core: failover: fix NULL pointer dereference in failover_slave_register() Date: Thu, 26 Feb 2026 12:57:37 +0500 Message-ID: <20260226075737.8948-1-zeeshanahmad022019@gmail.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Smatch warns that 'fops' is dereferenced at line 69 without a NULL check. While other callbacks in this function properly check 'fops', the rx_handler registration does not. If failover_get_bymac() returns a valid failover_dev but a NULL fops, the kernel will encounter a NULL pointer dereference when registering the rx_handler. Following the pattern of other failover callers, add a WARN_ON_ONCE() to catch this misconfiguration. Abort the registration if fops is missing to prevent an inconsistent state where a slave is logically linked to a master but lacks a functional data path hook. Fixes: 30c8bd5aa8b2 ("net: Introduce generic failover module") Signed-off-by: Zeeshan Ahmad --- v2: - Target 'net' tree as this is a bug fix. - Change logic from an early return (v1) to WARN_ON_ONCE() and abort registration to prevent inconsistent state, as discussed with Simon Horman. - Update commit message with detailed impact analysis. net/core/failover.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/net/core/failover.c b/net/core/failover.c index 2a140b3ea669..1702bb1feca1 100644 --- a/net/core/failover.c +++ b/net/core/failover.c @@ -63,6 +63,9 @@ static int failover_slave_register(struct net_device *sla= ve_dev) fops->slave_pre_register(slave_dev, failover_dev)) goto done; =20 + if (WARN_ON_ONCE(!fops)) + goto done; + err =3D netdev_rx_handler_register(slave_dev, fops->slave_handle_frame, failover_dev); if (err) { --=20 2.43.0