Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2676229imj; Mon, 11 Feb 2019 06:53:11 -0800 (PST) X-Google-Smtp-Source: AHgI3IbSVH8yebrAZlmG99qbhdJ5pj5Po/hxYf3U9sOLck8fjSGInZaCLsIGcAwtqKFP3F5wNOfN X-Received: by 2002:a65:40ca:: with SMTP id u10mr34059138pgp.321.1549896791196; Mon, 11 Feb 2019 06:53:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549896791; cv=none; d=google.com; s=arc-20160816; b=ZO+t9MvmZ7nuD46Ri7M/ajCs5bj3ULhijecSk63xYpuryqIxQsAfBvRmD8Xnk5+Fs1 k1u7rZJFFk5aT1szggckeRjqNjsthi6fTB0Kukz3yzdgTD+EcMQdQHMpltCdsA5B+9a1 U+yA2c6MEKjjpsUarn3DpUZ4mrkoVUuVlQMgNHFrAeJTqsACsCEpzB6VuhXr5a54CdAX 72J2izQPRJ4Kc8FI2ZbLKUgseKLjJRCg/UdPRTDcgovIiW2ytIC5u6abD+2+zjAAsn2F WegUQWt9ZatZ541Lufp2PdO2BxSQp1Mtce+m+NjhqhB3eCXyss/hfSUG8yBvKuEkl5uY G84Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aVDJrs+I4ekWeGzxKmSVQShTwLYJ/RmpajDSiPADFk8=; b=F9vaF03uXslWO+kinXPMua0tEdpJc8sxkmgpHTC9RT7gw1QyA/YCKY+I4zJKTXhhHb PhTxke/FZQDT2gNW93dIYLS76iAqj0Bwd5xtnuTXlTlQ4lL2VRZ7cKkUq+v+Lu63tIHY X5aDDN/UBFnP3eeebtSP7tuWkfVOMKmQbuOHJgGPPL/IXRq1vGBOUaG8h80fZ2OxQNGY nHJb4lNhmrx81uD3ZA0VrVOFs/RRXvE1n/iOvN1N2SuVB0vDr+pOFUV3429F2Je0evge RQajEYgNPLgmkAGBCMFTTEWxAKQYWpoRmuZvnMd1mx2QLSBEM6K2aW62NoQ707sCzOsv JhtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xWNHtUtK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l66si10053323pfi.5.2019.02.11.06.52.54; Mon, 11 Feb 2019 06:53:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xWNHtUtK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388137AbfBKOul (ORCPT + 99 others); Mon, 11 Feb 2019 09:50:41 -0500 Received: from mail.kernel.org ([198.145.29.99]:36476 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388113AbfBKOue (ORCPT ); Mon, 11 Feb 2019 09:50:34 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 451CD20700; Mon, 11 Feb 2019 14:50:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549896633; bh=Vmnu2LaRbmsB8ctH47yQrgFg2U5Kx0Tcc4IHtCbFmOA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xWNHtUtKFyNrwqBDewGvnk5pNxtDS1VHth8JZnDEjeCxZs9Fo2Q78lhJaGHv1ioo0 rDRc/EbsiAQtOLHf+lntSieJbfzJR3hjm9/tfFQjPONcyP3liqxP65bPQRxVnMCjbk RIr8utPjEA/4VNnv+vRG8V+RuZS/UXFEdzZwCi+E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stephen Smalley , Ondrej Mosnacek , Tejun Heo , Sasha Levin Subject: [PATCH 4.19 222/313] cgroup: fix parsing empty mount option string Date: Mon, 11 Feb 2019 15:18:22 +0100 Message-Id: <20190211141908.074341297@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141852.749630980@linuxfoundation.org> References: <20190211141852.749630980@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit e250d91d65750a0c0c62483ac4f9f357e7317617 ] This fixes the case where all mount options specified are consumed by an LSM and all that's left is an empty string. In this case cgroupfs should accept the string and not fail. How to reproduce (with SELinux enabled): # umount /sys/fs/cgroup/unified # mount -o context=system_u:object_r:cgroup_t:s0 -t cgroup2 cgroup2 /sys/fs/cgroup/unified mount: /sys/fs/cgroup/unified: wrong fs type, bad option, bad superblock on cgroup2, missing codepage or helper program, or other error. # dmesg | tail -n 1 [ 31.575952] cgroup: cgroup2: unknown option "" Fixes: 67e9c74b8a87 ("cgroup: replace __DEVEL__sane_behavior with cgroup2 fs type") [NOTE: should apply on top of commit 5136f6365ce3 ("cgroup: implement "nsdelegate" mount option"), older versions need manual rebase] Suggested-by: Stephen Smalley Signed-off-by: Ondrej Mosnacek Signed-off-by: Tejun Heo Signed-off-by: Sasha Levin --- kernel/cgroup/cgroup.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/cgroup/cgroup.c b/kernel/cgroup/cgroup.c index 1aa517908561..e578c3999970 100644 --- a/kernel/cgroup/cgroup.c +++ b/kernel/cgroup/cgroup.c @@ -1743,7 +1743,7 @@ static int parse_cgroup_root_flags(char *data, unsigned int *root_flags) *root_flags = 0; - if (!data) + if (!data || *data == '\0') return 0; while ((token = strsep(&data, ",")) != NULL) { -- 2.19.1