Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp639014pxb; Wed, 3 Mar 2021 11:25:47 -0800 (PST) X-Google-Smtp-Source: ABdhPJx+7tHRkSdYj7gC5Tqey95kzmuIOjdO8fiHmZdg7T0N/UJK0xhA8M4wXkp/pOK19pwQN6P0 X-Received: by 2002:a17:906:38da:: with SMTP id r26mr350825ejd.251.1614799546894; Wed, 03 Mar 2021 11:25:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614799546; cv=none; d=google.com; s=arc-20160816; b=aOOTVdyitw7pEL031ISUN6BYHaiWNhHoQb5Bvk597FAyXUhSR5yvyz07xmd13U9cDv Rz1tMy+pPz4YcDPUk1rKussjRXD4mPM5zFoZtRYG53/VgaAdU1iOx8URCF/0JdJVdi2v NYItlAvoP4LSOsPv/E8Wg2wNLbE2V5MX4IyT95N3aLvKDpT7MF9KIHMDcD0HU7sXqbtL PlRHO3R3w5zky7pluxuDMmxOk+6zAkyl7H/qTTvBrVzYLjGAfKuMgXOr9wVa8NezeUup aD5BjXvVx0fmvLIROYIkik8Tk5Y/Ml+3q4z+ZpbMLPLoPqIfgukWdRFkSe9BGr/BX/+a zE+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zWAW7huPOewYPV5g8uARlqQOIaDgkmENjmCBKFnh7v0=; b=w/TN7TDCngZ2pw+Mz3T/OR4BYDmm49j80Hg3tgwCOaakt9UObiSZS+1X+LmDi95+y/ Y6EGYqvHqm+nErA9gYzdXRGwjgRIiWNn4M/JxLQXiUUt9KRc5iulLVAyxvSnOssnG1qV epRLgwPtd25pO62Nf6o+xOnVVB70ttWbIxpOlte1P5KvaWa0Swm+3HKR4BkbyRWB0Cfy rdcpDy3+OVhtVB89yjWNmwajON2oF6KlBMWusdGV3LSLbwNN/m1NU/8y2NGOC16lGLBc NowVICpHz5L3/nFWmWeCPlJVtBkJb16gOO5j5j3s4kPYi/C5B3qRBQw7F1v+sUfIGvmG A51Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=c7VujfUg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n20si16422570ejj.318.2021.03.03.11.25.15; Wed, 03 Mar 2021 11:25:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=c7VujfUg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240875AbhCBBXD (ORCPT + 99 others); Mon, 1 Mar 2021 20:23:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:36378 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240795AbhCATGe (ORCPT ); Mon, 1 Mar 2021 14:06:34 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id BAA1065144; Mon, 1 Mar 2021 17:04:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1614618282; bh=oM3VnJ6m/C9CkbW6odQsd7oV4wHBBxj5egG09vHfDXQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=c7VujfUgf87cVyFPZePJdrLwLHoqOZx6YzwGzplVfRIehDoLKyf7R2iVOmYdNqYUV Y0WjSVLqrEKwncDaV1KfM4VpnAK1qmNQLXfO+LwK1zMkJ94Pk0wL5BYHZImFOtYt5q Bkg9/LTfLENr/Sg463g+1h8waBKpH5rEZvS1SwmU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Rafael J. Wysocki" , Michael Walle , Marc Zyngier Subject: [PATCH 5.10 003/663] debugfs: be more robust at handling improper input in debugfs_lookup() Date: Mon, 1 Mar 2021 17:04:11 +0100 Message-Id: <20210301161141.944974108@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210301161141.760350206@linuxfoundation.org> References: <20210301161141.760350206@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman commit bc6de804d36b3709d54fa22bd128cbac91c11526 upstream. debugfs_lookup() doesn't like it if it is passed an illegal name pointer, or if the filesystem isn't even initialized yet. If either of these happen, it will crash the system, so fix it up by properly testing for valid input and that we are up and running before trying to find a file in the filesystem. Cc: "Rafael J. Wysocki" Cc: stable Reported-by: Michael Walle Tested-by: Michael Walle Tested-by: Marc Zyngier Link: https://lore.kernel.org/r/20210218100818.3622317-1-gregkh@linuxfoundation.org Signed-off-by: Greg Kroah-Hartman --- fs/debugfs/inode.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/debugfs/inode.c +++ b/fs/debugfs/inode.c @@ -297,7 +297,7 @@ struct dentry *debugfs_lookup(const char { struct dentry *dentry; - if (IS_ERR(parent)) + if (!debugfs_initialized() || IS_ERR_OR_NULL(name) || IS_ERR(parent)) return NULL; if (!parent)