Received: by 2002:a17:90a:9103:0:0:0:0 with SMTP id k3csp11804988pjo; Thu, 2 Jan 2020 14:34:57 -0800 (PST) X-Google-Smtp-Source: APXvYqxNe1W6ed0Bg6Gpgoh5Lu/xlBB1p3JTKXShKWAi0rWsla2MlYpvN2AMNqnEYFI7187CWKNW X-Received: by 2002:a05:6808:b1c:: with SMTP id s28mr3194309oij.2.1578004496841; Thu, 02 Jan 2020 14:34:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578004496; cv=none; d=google.com; s=arc-20160816; b=lb20V8U46DhG/+r0qDE635EDe+melOZhGTdy9UkI8zzDrnYqnBRaNxfyWm9+VI9PFB +tcraDsgt1KtMlSyP2df8YLHYTxIH9PDA8e1Dutn4On8LS7HditvZMKWKcN5OvxmFNYW BzlF3MPip4CA6FYnLJ5dLYQ/r5J6RTklZkN/THikhTKAPxOjHz0Ysk3eJkK0OGQ63eJr iSpCHqlQ/o7xEeRO1MaIL/+910yFoXYBTutv6rizCKlbzRtfcTv3GVb2MJrmDldAsUCd HUZ2yWDZ+S97e+flXWYkKczpGk+3awQsOby/5YmHXKjM+muX01ojIJhd3xwIfcz6Np6O /NKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+VXf6DNAQFEwq/SIhp+K4kIxsxUCvZqpRGpizonqtSk=; b=MkeHOvm0N1outw2uuU1hcQSpqxAk8kolaaQ2Jz32dVmmDOjCI72NAZ4SsjcY/9nW7T TQLS4KpkjZLb7Qhqd4s9AG2nTaeYduSicd2GQOZgGdxYJUfoB+r41MxPE0M0vsucJrkO aI1DAZKoA5IdBUE1oazNUlX1qk0pmyrXaJT/omEKk3mUb14vc/6DopjTjwwHNKw/6TXq W/eusyr4sqjExXgoQSinRAC5WUGLH2vITnwxCbfY4bGWROkCdf2alwumHnovSDM9TWMj sbHWkRzt+BST5xKrlz68dNhdG3zcWH6fHbZD2sVTLfxCx588OueiP0tA5P7LqPpjbJdj FHRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UT2I0mtu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o128si26690936oih.66.2020.01.02.14.34.45; Thu, 02 Jan 2020 14:34:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=UT2I0mtu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730456AbgABWdv (ORCPT + 99 others); Thu, 2 Jan 2020 17:33:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:41648 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730202AbgABWdt (ORCPT ); Thu, 2 Jan 2020 17:33:49 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3B03E20863; Thu, 2 Jan 2020 22:33:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578004428; bh=JZ80ThWIog+FolcMXpSKaik1yjlU0edrlPqLSvayDvM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UT2I0mtu5neknr9COdlZfwBMPGwGOAGsgZJYOGUqCEE4tRLQjh60VnNLk17P20AC3 QIvfm2+a7208bPW9RjCFib888oYSqFK22dRVI24Rhl1CvgADuVRnhU5Hn3zDNq3rEL bWM9nQ1VNzJ70mAXD1Ah2rfEiRNXquOyxwb6R4SY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+3031f712c7ad5dd4d926@syzkaller.appspotmail.com, Linus Torvalds , Siddharth Chandrasekaran Subject: [PATCH 4.9 157/171] filldir[64]: remove WARN_ON_ONCE() for bad directory entries Date: Thu, 2 Jan 2020 23:08:08 +0100 Message-Id: <20200102220608.584364685@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102220546.960200039@linuxfoundation.org> References: <20200102220546.960200039@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit b9959c7a347d6adbb558fba7e36e9fef3cba3b07 upstream. This was always meant to be a temporary thing, just for testing and to see if it actually ever triggered. The only thing that reported it was syzbot doing disk image fuzzing, and then that warning is expected. So let's just remove it before -rc4, because the extra sanity testing should probably go to -stable, but we don't want the warning to do so. Reported-by: syzbot+3031f712c7ad5dd4d926@syzkaller.appspotmail.com Fixes: 8a23eb804ca4 ("Make filldir[64]() verify the directory entry filename is valid") Signed-off-by: Linus Torvalds Signed-off-by: Siddharth Chandrasekaran Signed-off-by: Greg Kroah-Hartman --- fs/readdir.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/fs/readdir.c +++ b/fs/readdir.c @@ -90,9 +90,9 @@ EXPORT_SYMBOL(iterate_dir); */ static int verify_dirent_name(const char *name, int len) { - if (WARN_ON_ONCE(!len)) + if (!len) return -EIO; - if (WARN_ON_ONCE(memchr(name, '/', len))) + if (memchr(name, '/', len)) return -EIO; return 0; }