Received: by 2002:a17:90a:9103:0:0:0:0 with SMTP id k3csp11798649pjo; Thu, 2 Jan 2020 14:28:27 -0800 (PST) X-Google-Smtp-Source: APXvYqy9IByH3C1562zIKQRcsm27AQ6CEmeo0SYvUkA6emxFuBU3zS1SNYJjHtRGykw6lWB8IQuz X-Received: by 2002:a05:6830:2116:: with SMTP id i22mr98646773otc.0.1578004106924; Thu, 02 Jan 2020 14:28:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578004106; cv=none; d=google.com; s=arc-20160816; b=dnurl8qtd/6Bn+2cOQlRXHOaq/cUDG8wAukEKA0a+97Jo81Om+FB4gpzp0XZhix0uQ pTP1xlp3wce0aDVWvdTk3whFqZjipI3SIQOH9efb3hoEAp28n9PsjlxRZz0ksitBQSbJ aOlUb/dzlx1hAi9LQtlo5ou+2Mk5/KEU+Yv7O/HYFzkbmWzzQ/xwkP3jojS1DOU7nkmW xW9QCMgYQ8Jj+R06LikzvmF4GeMfKrWueXC1c1KoF7rtcj7fOmTJeOEGff9SyY+HcpP4 ILSggeeQGc8box9HW+e6sxjF53qqJsyT/pGnOYy5fhsyD8wH0u9BcuBRYclzKv0VjZjo KdjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=arlogPB/AyF71QpeUXYKFp1MRc51NtNNY0lYOYIOC74=; b=l7GbEZbLs79nnpgo2NmADy2NjXU1AJ5D4Wjg5JJ7w8w0jvWj9wq+zr85edA7w+qwK9 +e/QKHG4BLXV9xRJWYtpeo51lxPp0dq0rj3t8XLEru4lF7LPvPYB8M8Q3+bEbRSxVHGU oDu2pNcnNHhBbTiSEEB09d0ydCeVxKi9HlDyofSmBn8U19zFXfaHznUuFBSjDiyDGNYF 2UI75Qq1elNHEHy4q5TVNTxNYS2OmX4CoSIz/BEgcyQVlyLlKbn2zATh2dCK+3ySMfK3 DC8yX7khf/dVSF9oSXn66DqfrETld5kKKNSey2x9751eZw8ae7H3n//825DPE72bHh4b KwIg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AVc5KjLM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u21si26737242oiv.267.2020.01.02.14.28.15; Thu, 02 Jan 2020 14:28:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AVc5KjLM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729663AbgABW0n (ORCPT + 99 others); Thu, 2 Jan 2020 17:26:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:54260 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729545AbgABW0l (ORCPT ); Thu, 2 Jan 2020 17:26:41 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D19A724649; Thu, 2 Jan 2020 22:26:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578004000; bh=acmRMlViayMjg+TGBcAMp3fREFhCF9WtXzdHfgDleL0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AVc5KjLMxk6POJwQ/LEZetWqh0NTX8uXnpN4C+nYvbRTlNC6hx+u2KzF9PsfY1tXS HMUQev0X23YVE57E5i6J2XmoGuhtK7oEpALsgojgclwmM1QS4snhd2wZVcHf9QnDz6 jgy9cW4/OY6Vo/Mc05dkUY8yo5pUz4dGmTFE2hP4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+3031f712c7ad5dd4d926@syzkaller.appspotmail.com, Linus Torvalds , Siddharth Chandrasekaran Subject: [PATCH 4.14 62/91] filldir[64]: remove WARN_ON_ONCE() for bad directory entries Date: Thu, 2 Jan 2020 23:07:44 +0100 Message-Id: <20200102220441.560177243@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102220356.856162165@linuxfoundation.org> References: <20200102220356.856162165@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit b9959c7a347d6adbb558fba7e36e9fef3cba3b07 upstream. This was always meant to be a temporary thing, just for testing and to see if it actually ever triggered. The only thing that reported it was syzbot doing disk image fuzzing, and then that warning is expected. So let's just remove it before -rc4, because the extra sanity testing should probably go to -stable, but we don't want the warning to do so. Reported-by: syzbot+3031f712c7ad5dd4d926@syzkaller.appspotmail.com Fixes: 8a23eb804ca4 ("Make filldir[64]() verify the directory entry filename is valid") Signed-off-by: Linus Torvalds Signed-off-by: Siddharth Chandrasekaran Signed-off-by: Greg Kroah-Hartman --- fs/readdir.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/fs/readdir.c +++ b/fs/readdir.c @@ -92,9 +92,9 @@ EXPORT_SYMBOL(iterate_dir); */ static int verify_dirent_name(const char *name, int len) { - if (WARN_ON_ONCE(!len)) + if (!len) return -EIO; - if (WARN_ON_ONCE(memchr(name, '/', len))) + if (memchr(name, '/', len)) return -EIO; return 0; }