summaryrefslogtreecommitdiff
path: root/net/ipv4
diff options
context:
space:
mode:
authorJerry Wu <w.7erry@foxmail.com>2025-12-25 20:36:17 +0000
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2026-01-17 16:35:22 +0100
commitf490af47bbee02441e356a1e0b86e3b3dd5120ff (patch)
treeaea679b36f0cff3bbd49afb24a6b53d525a0cbe8 /net/ipv4
parentb53fca69f45500eb83f379c1804275b8b578b031 (diff)
downloadlinux-f490af47bbee02441e356a1e0b86e3b3dd5120ff.tar.gz
linux-f490af47bbee02441e356a1e0b86e3b3dd5120ff.tar.bz2
linux-f490af47bbee02441e356a1e0b86e3b3dd5120ff.zip
net: mscc: ocelot: Fix crash when adding interface under a lag
[ Upstream commit 34f3ff52cb9fa7dbf04f5c734fcc4cb6ed5d1a95 ] Commit 15faa1f67ab4 ("lan966x: Fix crash when adding interface under a lag") fixed a similar issue in the lan966x driver caused by a NULL pointer dereference. The ocelot_set_aggr_pgids() function in the ocelot driver has similar logic and is susceptible to the same crash. This issue specifically affects the ocelot_vsc7514.c frontend, which leaves unused ports as NULL pointers. The felix_vsc9959.c frontend is unaffected as it uses the DSA framework which registers all ports. Fix this by checking if the port pointer is valid before accessing it. Fixes: 528d3f190c98 ("net: mscc: ocelot: drop the use of the "lags" array") Signed-off-by: Jerry Wu <w.7erry@foxmail.com> Reviewed-by: Vladimir Oltean <vladimir.oltean@nxp.com> Link: https://patch.msgid.link/tencent_75EF812B305E26B0869C673DD1160866C90A@qq.com Signed-off-by: Jakub Kicinski <kuba@kernel.org> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'net/ipv4')
0 files changed, 0 insertions, 0 deletions