Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp909675yba; Thu, 18 Apr 2019 11:37:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqy/cdiH/vckt2rPeun3+eLdbOBDtaedDgBIQcl8yJj/JRO6D98viJ+VW7Jk+7xctwNf3NkN X-Received: by 2002:a65:625a:: with SMTP id q26mr91393277pgv.68.1555612639890; Thu, 18 Apr 2019 11:37:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555612639; cv=none; d=google.com; s=arc-20160816; b=y41pZXQQRY8qn59S2cn7bfsW3Sx1eL/0Naea227xJFi/Kr5iqBOsJ1f04FwFS7f1PL njqNPz3xhOCrxGp1SIO7EoBBH+F0CWJyHPlLDEwPhtkws1VaC+d9aeFhZ6hZpFXl8NmZ 8Bl/GLjxsmLx1/ug5p7Qf3NWbGWDHcCuDB02ARbzc76H5Cu0VIGWc8YhN49Hg04OqHBn +RYDAkaSEwr2BBNxuksUIeSvEe/OxTX2ygWxrHLKohHhXzw1HeJRRskgSE05ozW6kpNV C6yacV6lKmospBItxB4IfCfPctxaYtdbmMOCMJ+Rt7WzwfSPsoF6ZtpQ4bcLCSxOLJAB Izrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NLOr/2OrMHu0XogZ1+Wmpuik3YWyWx2mDUO4MWkYKwc=; b=h2W6JyL59J25ET0gDNS8dsPC8pvuqAfValaLPYR/IBy20+De4qBAxAFkXz+arrD2XP jnmo6+Qw1CFSq7lexyspM37MDkk+KPqkKo1P0WMnpbjsrmMPWxKdOmuY5eTTRWr3GItl ddh8+1zrHnTNrS1g1R3PmG4l+q0ht4FdbcRYwdtoF1aeOJmUvQg9G9vonuZoVce3p3kp erVWtV+KtVYiRpzSsWhsswfo44iGgpoaLoZaNblBjB+ZNMsZeMcJQr1scP2mukd3XyZX oUpAII4RuS3ldo45aL3rwQGn8Exa4Uuk6NJr2BDWGg7mT5uJfzvGqsncvfkSyn35cssc Lpvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ULGvHgyA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h18si2790925plr.321.2019.04.18.11.37.05; Thu, 18 Apr 2019 11:37:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ULGvHgyA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390300AbfDRSeq (ORCPT + 99 others); Thu, 18 Apr 2019 14:34:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:52812 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389883AbfDRR6g (ORCPT ); Thu, 18 Apr 2019 13:58:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 55206217FA; Thu, 18 Apr 2019 17:58:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610315; bh=EeKTikSizQZ/J9EcfmHYN84AY0ue2uB7f4LvH1R05a0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ULGvHgyAv/YcBGcQb1AElgADa54S+tVQQUxryZO/5p6RadgSVJzZd0hKPjH9J235j zrBIoqIMPMTzZcDeSgqj4eZ0rZtUxFCUeQSt7k474XTe1KCLRN9yQ1BTO1Y3vI5oLg 9lRKIy+texyDPznXnGpes8e76ekgM1LrTLtY5TM0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Feng Tang , Jason Gunthorpe , Sasha Levin Subject: [PATCH 4.19 014/110] i40iw: Avoid panic when handling the inetdev event Date: Thu, 18 Apr 2019 19:56:03 +0200 Message-Id: <20190418160438.724778159@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418160437.484158340@linuxfoundation.org> References: <20190418160437.484158340@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit ec4fe4bcc584b55e24e8d1768f5510a62c0fd619 ] There is a panic reported that on a system with x722 ethernet, when doing the operations like: # ip link add br0 type bridge # ip link set eno1 master br0 # systemctl restart systemd-networkd The system will panic "BUG: unable to handle kernel null pointer dereference at 0000000000000034", with call chain: i40iw_inetaddr_event notifier_call_chain blocking_notifier_call_chain notifier_call_chain __inet_del_ifa inet_rtm_deladdr rtnetlink_rcv_msg netlink_rcv_skb rtnetlink_rcv netlink_unicast netlink_sendmsg sock_sendmsg __sys_sendto It is caused by "local_ipaddr = ntohl(in->ifa_list->ifa_address)", while the in->ifa_list is NULL. So add a check for the "in->ifa_list == NULL" case, and skip the ARP operation accordingly. Signed-off-by: Feng Tang Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/hw/i40iw/i40iw_utils.c | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/drivers/infiniband/hw/i40iw/i40iw_utils.c b/drivers/infiniband/hw/i40iw/i40iw_utils.c index a9ea966877f2..dda8e79d4b27 100644 --- a/drivers/infiniband/hw/i40iw/i40iw_utils.c +++ b/drivers/infiniband/hw/i40iw/i40iw_utils.c @@ -173,7 +173,12 @@ int i40iw_inetaddr_event(struct notifier_block *notifier, rcu_read_lock(); in = __in_dev_get_rcu(upper_dev); - local_ipaddr = ntohl(in->ifa_list->ifa_address); + + if (!in->ifa_list) + local_ipaddr = 0; + else + local_ipaddr = ntohl(in->ifa_list->ifa_address); + rcu_read_unlock(); } else { local_ipaddr = ntohl(ifa->ifa_address); @@ -185,6 +190,11 @@ int i40iw_inetaddr_event(struct notifier_block *notifier, case NETDEV_UP: /* Fall through */ case NETDEV_CHANGEADDR: + + /* Just skip if no need to handle ARP cache */ + if (!local_ipaddr) + break; + i40iw_manage_arp_cache(iwdev, netdev->dev_addr, &local_ipaddr, -- 2.19.1