* [PATCH net] net: hsr: fix NULL pointer dereference in hsr_get_node_data()
@ 2026-05-08 12:46 Quan Sun
2026-05-12 10:40 ` patchwork-bot+netdevbpf
0 siblings, 1 reply; 2+ messages in thread
From: Quan Sun @ 2026-05-08 12:46 UTC (permalink / raw)
To: netdev, davem, edumazet, kuba
Cc: pabeni, horms, fmaurer, bigeasy, luka.gejak, mingo, arvid.brodin,
Quan Sun
In the HSR (High-availability Seamless Redundancy) protocol, node
information is maintained in the node_db. When a supervision frame is
received, node->addr_B_port is updated to track the receiving port type
(e.g., HSR_PT_SLAVE_B).
If the underlying physical interface associated with this slave port is
removed (e.g., via `ip link del`), hsr_del_port() frees the hsr_port
object. However, the stale node->addr_B_port reference is kept in the
node_db until the node ages out.
Subsequently, if userspace queries the node status via the Netlink
command HSR_C_GET_NODE_STATUS, the kernel calls hsr_get_node_data().
This function unconditionally dereferences the pointer returned by
hsr_port_get_hsr():
if (node->addr_B_port != HSR_PT_NONE) {
port = hsr_port_get_hsr(hsr, node->addr_B_port);
*addr_b_ifindex = port->dev->ifindex; // <-- NULL deref
}
If the slave port has been deleted, hsr_port_get_hsr() returns NULL,
resulting in a kernel panic.
Oops: general protection fault, probably for non-canonical address
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
RIP: 0010:hsr_get_node_data+0x7b6/0x9e0
Call Trace:
<TASK>
hsr_get_node_status+0x445/0xa40
Fix this by adding a proper NULL pointer check. If the port lookup fails
due to a stale port type, gracefully treat it as if no valid port exists
and assign -1 to the interface index.
Steps to reproduce:
1. Create an HSR interface with two slave devices.
2. Receive a supervision frame to populate node_db with
addr_B_port assigned to SLAVE_B.
3. Delete the underlying slave device B.
4. Send an HSR_C_GET_NODE_STATUS Netlink message.
Fixes: c5a759117210 ("net/hsr: Use list_head (and rcu) instead of array for slave devices.")
Signed-off-by: Quan Sun <2022090917019@std.uestc.edu.cn>
---
net/hsr/hsr_framereg.c | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/net/hsr/hsr_framereg.c b/net/hsr/hsr_framereg.c
index d09875b335885..124619920d386 100644
--- a/net/hsr/hsr_framereg.c
+++ b/net/hsr/hsr_framereg.c
@@ -889,7 +889,10 @@ int hsr_get_node_data(struct hsr_priv *hsr,
if (node->addr_B_port != HSR_PT_NONE) {
port = hsr_port_get_hsr(hsr, node->addr_B_port);
- *addr_b_ifindex = port->dev->ifindex;
+ if (port)
+ *addr_b_ifindex = port->dev->ifindex;
+ else
+ *addr_b_ifindex = -1;
} else {
*addr_b_ifindex = -1;
}
--
2.43.0
^ permalink raw reply related [flat|nested] 2+ messages in thread* Re: [PATCH net] net: hsr: fix NULL pointer dereference in hsr_get_node_data()
2026-05-08 12:46 [PATCH net] net: hsr: fix NULL pointer dereference in hsr_get_node_data() Quan Sun
@ 2026-05-12 10:40 ` patchwork-bot+netdevbpf
0 siblings, 0 replies; 2+ messages in thread
From: patchwork-bot+netdevbpf @ 2026-05-12 10:40 UTC (permalink / raw)
To: Quan Sun
Cc: netdev, davem, edumazet, kuba, pabeni, horms, fmaurer, bigeasy,
luka.gejak, mingo, arvid.brodin
Hello:
This patch was applied to netdev/net.git (main)
by Paolo Abeni <pabeni@redhat.com>:
On Fri, 8 May 2026 20:46:36 +0800 you wrote:
> In the HSR (High-availability Seamless Redundancy) protocol, node
> information is maintained in the node_db. When a supervision frame is
> received, node->addr_B_port is updated to track the receiving port type
> (e.g., HSR_PT_SLAVE_B).
>
> If the underlying physical interface associated with this slave port is
> removed (e.g., via `ip link del`), hsr_del_port() frees the hsr_port
> object. However, the stale node->addr_B_port reference is kept in the
> node_db until the node ages out.
>
> [...]
Here is the summary with links:
- [net] net: hsr: fix NULL pointer dereference in hsr_get_node_data()
https://git.kernel.org/netdev/net/c/911f54771ca9
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2026-05-12 10:41 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-08 12:46 [PATCH net] net: hsr: fix NULL pointer dereference in hsr_get_node_data() Quan Sun
2026-05-12 10:40 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox