From nobody Mon Apr 13 14:01:05 2026 Received: from mail-pg1-f169.google.com (mail-pg1-f169.google.com [209.85.215.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CC83326ED48 for ; Fri, 6 Mar 2026 03:15:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.215.169 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772766943; cv=none; b=N9/27Pnm3yceLn0OtQFXu8xuw6Y/lJbHWZimrMxOj4E9DGW0iDyaJXFMqVtqPA6D7LvbhWXHr8CM2raITQkyTmeK9C4HYvSdKQSrAMAoauTwy1gU/+SGn9Cm1DMQ8dfp5KSfjV/JSxrGQnzDvmAiuJ7D7zp+OygsU5YuLqBc74w= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772766943; c=relaxed/simple; bh=YBM2nx2DnIzIO3TVuGwkWkpvx7Nec1PF9XT0zn1L/Z0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Kzc0LKL7tTgaXy5uUkvAHHJu1wdnnwX7B5yYBEIKXrQgu+PsqPsgUVMBQpXjQPyzQ7opOX0/anhP6XV4BNTo4iD5pi09t57MtC5u2O7ZDCxlnKAuf5tFNW32oZIFS7qEmllZNOxw2XOCyfWieTWAYT8oURXRFhUrP5H4elXRdJg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=mQ9whKKf; arc=none smtp.client-ip=209.85.215.169 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="mQ9whKKf" Received: by mail-pg1-f169.google.com with SMTP id 41be03b00d2f7-c738a4231a2so617295a12.2 for ; Thu, 05 Mar 2026 19:15:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1772766942; x=1773371742; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=szH+BrgvDUz3EpyaqRQfCdtnJOPT4dyA96vzzgjsuCI=; b=mQ9whKKfnS2X/+nnwSqBRALwStAktXAIYXl1Hvusu/rVF9b+b/eDNiYkH+ucbF+Y9W X6BxfKULt1PO7PRrVdXSqzkOsTqXHR4DgS0ACwN8IlVxYa73Uw5FM/kOB9Ay1nAmNEGZ qiN4bETESDdknqJzFQHEtx59MzjNhi0LuMi4vv184rmlNe1Fm/om3sPPpHkaowKIqNqd VB/VUr9vBlOpqfzKgMMkToYsiWEmrl0LCuukkZyaU+WccspOtIgsdlusl0hqq/KoSzMb +Gn5XEDROlNSF6PePe4MUooseGSfbjG38anEXVrfIJ4zmbPjBJvnRqeAv5rwoR+ay2Bn Xlzw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772766942; x=1773371742; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=szH+BrgvDUz3EpyaqRQfCdtnJOPT4dyA96vzzgjsuCI=; b=TWy58NtPLgRQtmCAHeEs82Pkcz4dNBnvX8AVPEegXQPJBMLdM9bG+H6VggeBI16YqT b5gvR1OXq6lJXtKdUrLy7BV24pm81lDyASolGAZphfsryWEdV/3DwT0pOw2azJr5/Kzi /KMR3o971p/LcaiOoKVQc63/ImhCYLyK/FpNgsiju1j//4cftkjrpdSDZ5lzOj3oeS3b c4uqW+fisNkMcHSbcSQc2pZcml3wKrC8Yjgu2pjX97gK6uZu8now3IOLbEzIn4D1zY3G aJhhcna3ymkndEAVC+Qq6zpkALKdDyKMZWmSFw7a7JaAyAlKWp/iDpxSBJubkLqvDWHE Jg0w== X-Gm-Message-State: AOJu0YxglC834UDpY+vCZ+k0Rr/13X50c7LhOMeIEeojbG4XFkqEI/5t hH1sJmz2wSvc4QY5sLFFdv1v8eyXKkQ4Aga8zu9I5cCHqPoalG+BiE+l X-Gm-Gg: ATEYQzxzFYtiaiJQpZCYRM3T3EZ+HGxIWgvuQdflke2JMQlFSpJvkgcJnyi6/FbTY1b sj+C/kBMKJqRGMSYq1ABpwg7EcuAdE0GOV0bhw7Lmu8Wxt1ha6MAw1JQbMMnpnNnTnh6tAZlXcd 6hf0sKAXgpvvadHmL3cc2UbgjsuCAr369KXF6lkQdRVdY2V09Kj0QOvqJpRaG+MaOKATC5i/31E +lDZfB09DEQT4IGtkGgfq3UaGAgqTl6L0GNVvTaWjqI9S2/ILKD5hdpzhaS1iVgJkTSauUajJ8w pvVDieMwfDGVlkku6SAFqz+2DFmMIeKXVYKmZtWuRQU8+R0txwkxRStfAbWZ4VG85Qjh0Qj5AQI 2Jl8XvN0KzXwLsP2bITgCeBBSnt4cMnp2lT8fDOSEXHpcIanpaUE4uyQLoYUmSb15NzfFoXVBIN dEnNL/1R1g0qFQXAdAqlLBoIos0LgC53Yy/tqGvKF2QFEiDmZoq75GTqpMvQ== X-Received: by 2002:a05:6a20:2595:b0:361:2c56:fca8 with SMTP id adf61e73a8af0-398590b5a26mr830732637.50.1772766942050; Thu, 05 Mar 2026 19:15:42 -0800 (PST) Received: from DESKTOP-MOQC9AF.mioffice.cn ([43.224.245.226]) by smtp.gmail.com with ESMTPSA id 41be03b00d2f7-c739e195fc2sm102258a12.32.2026.03.05.19.15.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Mar 2026 19:15:41 -0800 (PST) From: Zhan Xusheng X-Google-Original-From: Zhan Xusheng To: Alexei Starovoitov Cc: linux-kernel@vger.kernel.org, Zhan Xusheng Subject: [PATCH] bpf: Fix potential NULL pointer dereference in bpf_prog_dev_bound_destroy Date: Fri, 6 Mar 2026 11:15:37 +0800 Message-ID: <20260306031537.7262-1-zhanxusheng@xiaomi.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The function bpf_prog_dev_bound_destroy can potentially dereference a NULL pointer when calling ondev->offdev. This patch adds a NULL check for ondev to prevent such a dereference. Signed-off-by: Zhan Xusheng --- kernel/bpf/offload.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/bpf/offload.c b/kernel/bpf/offload.c index 0ad97d643bf4..2a48dab16a22 100644 --- a/kernel/bpf/offload.c +++ b/kernel/bpf/offload.c @@ -383,7 +383,7 @@ void bpf_prog_dev_bound_destroy(struct bpf_prog *prog) __bpf_prog_offload_destroy(prog); =20 ondev =3D bpf_offload_find_netdev(netdev); - if (!ondev->offdev && list_empty(&ondev->progs)) + if (ondev && !ondev->offdev && list_empty(&ondev->progs)) __bpf_offload_dev_netdev_unregister(NULL, netdev); } up_write(&bpf_devs_lock); --=20 2.43.0