From patchwork Tue Oct 18 03:47:15 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: shaozhengchao X-Patchwork-Id: 13009838 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id D87FDC43219 for ; Tue, 18 Oct 2022 03:42:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230044AbiJRDmt (ORCPT ); Mon, 17 Oct 2022 23:42:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39942 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230063AbiJRDmS (ORCPT ); Mon, 17 Oct 2022 23:42:18 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5736BCDB for ; Mon, 17 Oct 2022 20:39:23 -0700 (PDT) Received: from dggpeml500026.china.huawei.com (unknown [172.30.72.55]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4Mrzxq4TMpz1P76H; Tue, 18 Oct 2022 11:34:39 +0800 (CST) Received: from huawei.com (10.175.101.6) by dggpeml500026.china.huawei.com (7.185.36.106) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 18 Oct 2022 11:39:21 +0800 From: Zhengchao Shao To: , , , , , , , , , CC: , , , Subject: [PATCH net 0/3] fix null pointer access issue in qdisc Date: Tue, 18 Oct 2022 11:47:15 +0800 Message-ID: <20221018034718.82389-1-shaozhengchao@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 X-Originating-IP: [10.175.101.6] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpeml500026.china.huawei.com (7.185.36.106) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: kuba@kernel.org These three patches fix the same type of problem. Set the default qdisc, and then construct an init failure scenario when the dev qdisc is configured on mqprio to trigger the reset process. NULL pointer access may occur during the reset process. Zhengchao Shao (3): net: sched: cake: fix null pointer access issue when cake_init() fails net: sched: fq_codel: fix null pointer access issue when fq_codel_init() fails net: sched: sfb: fix null pointer access issue when sfb_init() fails net/sched/sch_cake.c | 4 ++++ net/sched/sch_fq_codel.c | 20 ++++++++++++++------ net/sched/sch_sfb.c | 3 ++- 3 files changed, 20 insertions(+), 7 deletions(-)