[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20190814061237.17406-1-m.szyprowski@samsung.com>
Date: Wed, 14 Aug 2019 08:12:37 +0200
From: Marek Szyprowski <m.szyprowski@...sung.com>
To: linux-kernel@...r.kernel.org
Cc: Marek Szyprowski <m.szyprowski@...sung.com>,
Matthew Garrett <mjg59@...gle.com>,
Steven Rostedt <rostedt@...dmis.org>,
James Morris <jmorris@...ei.org>,
Krzysztof Kozlowski <krzk@...nel.org>,
Bartlomiej Zolnierkiewicz <b.zolnierkie@...sung.com>,
linux-security-module@...r.kernel.org, linux-api@...r.kernel.org,
Matthew Garrett <matthewgarrett@...gle.com>
Subject: [PATCH] tracefs: Fix NULL pointer dereference when no lockdown is
used
Commit 757ff7244358 ("tracefs: Restrict tracefs when the kernel is locked
down") added infrastructure for restricting tracefs access when lockdown
is enabled. It however broke tracefs operation when no lockdown is used.
Fix this issue by adding missing check for a NULL ->open() callback.
Fixes: 757ff7244358 ("tracefs: Restrict tracefs when the kernel is locked down")
Reported-by: Krzysztof Kozlowski <krzk@...nel.org>
Signed-off-by: Marek Szyprowski <m.szyprowski@...sung.com>
---
fs/tracefs/inode.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/fs/tracefs/inode.c b/fs/tracefs/inode.c
index 12a325fb4cbd..8efff7603032 100644
--- a/fs/tracefs/inode.c
+++ b/fs/tracefs/inode.c
@@ -43,7 +43,7 @@ static int default_open_file(struct inode *inode, struct file *filp)
return ret;
real_fops = dentry->d_fsdata;
- return real_fops->open(inode, filp);
+ return real_fops->open ? real_fops->open(inode, filp) : 0;
}
static ssize_t default_read_file(struct file *file, char __user *buf,
--
2.17.1
Powered by blists - more mailing lists