Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2442573imj; Mon, 18 Feb 2019 06:09:13 -0800 (PST) X-Google-Smtp-Source: AHgI3IY373w9GfHa+wC5W35H9IxtlY/cgC7+4MMt99gKOziFGTRy2ZAaVXx0lTgzYAspBHFZueY7 X-Received: by 2002:a17:902:724c:: with SMTP id c12mr15793577pll.110.1550498953480; Mon, 18 Feb 2019 06:09:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550498953; cv=none; d=google.com; s=arc-20160816; b=SH+wuzjRqlnpcj58QnqyiYRd6FrLs1RF4gcxZnhg9OAVlh5JyrskjrolZO+RjXOAiv YNieADt+jFWAKcrnRgFyWuGyCvm5tRCxyuidz/etmlP0dTqcEpHM5TanQ8NLVAdjRyXR gx9zpLesRh4XVZZ3tnOfgIW95BaX95xGc2tDbEeeCg1EGJ+veB+aD/IEZgId+dWcqfrB jorFMwJvgvrjgYoTrSJ/+ZeJG/UadeNhRrV5G93DcazJPqHYKSvZwurpZzuCxoXxl7/O jYK7Z2fA2rQo8hjjOblGwMKMjN0KRLZSSVZsEs8QfP/Wrd2K1VEPZQCu4hpqh43wcyBR pBjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=OjNAKVDC4MtXDy1h/5bVf84GJaEsDeJzh2xNu6yDDAs=; b=0tPfGADS50t0u49nIXluFxQy1jFy0uwfxwDUiWnexW1FwLi0H0hJeU7PiQaxDxu8Yv GUMiUJSqYEgDnghSJGCwrnzSeDdtxn9KmMR4ksPqTMd9o/t8BXuNRHYeCE7i4ZGsnKha qs9ln1OrgnZGHGkk3a3xmqLDTT3OAxG5q1CC9BNY/gDiF91HQifEpo8o4UUF4h3mRQ7D nf5pr6r/98o3VY5kdeH26A5dyisyhls0rtUDsWJHshPQTrCKq9TjngO4ac4AT2FtWJgo T7S4rPwqFhp1DgO8yRZGQRY+LmwPUvvfyR9wDqwHio7y89RFfbK00ocEV7kT/IqpaNCx ks2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qBaBJqYH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w186si5232331pgd.460.2019.02.18.06.08.57; Mon, 18 Feb 2019 06:09:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qBaBJqYH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390500AbfBROGx (ORCPT + 99 others); Mon, 18 Feb 2019 09:06:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:49904 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390485AbfBROGs (ORCPT ); Mon, 18 Feb 2019 09:06:48 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DD58421929; Mon, 18 Feb 2019 14:06:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550498808; bh=jwc6gL1JcXEPP/zaW9Dg4y1ENlChbmlW+gEjnVuSdws=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qBaBJqYHfiCpXu/z3lwowA8YhdKcsxrF4N1gcF5Ir0W8qmd/upi15urEixLnbcae4 FyZH7i23u0aDphxn6axs5F0leWF4SM87Ctvhm5z8rFtS2VAmEBDcxgK5Lm4ryV3Zdj +oJpGdhhFaFpr9xpeLolEFVjWKgo5Oq2fHVTn+SA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org Subject: [PATCH 4.4 102/143] debugfs: fix debugfs_rename parameter checking Date: Mon, 18 Feb 2019 14:43:50 +0100 Message-Id: <20190218133532.766776385@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190218133529.099444112@linuxfoundation.org> References: <20190218133529.099444112@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Greg Kroah-Hartman commit d88c93f090f708c18195553b352b9f205e65418f upstream. debugfs_rename() needs to check that the dentries passed into it really are valid, as sometimes they are not (i.e. if the return value of another debugfs call is passed into this one.) So fix this up by properly checking if the two parent directories are errors (they are allowed to be NULL), and if the dentry to rename is not NULL or an error. Cc: stable Signed-off-by: Greg Kroah-Hartman --- fs/debugfs/inode.c | 7 +++++++ 1 file changed, 7 insertions(+) --- a/fs/debugfs/inode.c +++ b/fs/debugfs/inode.c @@ -671,6 +671,13 @@ struct dentry *debugfs_rename(struct den struct dentry *dentry = NULL, *trap; struct name_snapshot old_name; + if (IS_ERR(old_dir)) + return old_dir; + if (IS_ERR(new_dir)) + return new_dir; + if (IS_ERR_OR_NULL(old_dentry)) + return old_dentry; + trap = lock_rename(new_dir, old_dir); /* Source or destination directories don't exist? */ if (d_really_is_negative(old_dir) || d_really_is_negative(new_dir))