Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2545717pxb; Mon, 19 Apr 2021 08:08:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzNAds1RTeFWQnQxmhXQemDSSsr1+A3HTB8QnzGnQQahskWjV6ENZJzytVRoVzv2GxqIYGX X-Received: by 2002:a63:d755:: with SMTP id w21mr12603570pgi.400.1618844929720; Mon, 19 Apr 2021 08:08:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618844929; cv=none; d=google.com; s=arc-20160816; b=rW12dRLro9fGSMOO6C+YbmXjX4Nb8vsmny1aFh8BHRWA/J0zh+AL+IeHjoJZ6GkdUb eZf/v9/BXcws433M0ZYUSsZnFMlneirQtIYyPL/+2Y5uggUhq4K+6pE5IoCMjKuaOnCQ 3AGz61Ba1jHP7/LCFSV5AaJJwfkSjkjRw3+mp0OITW4eXhLoEinNggeYyDBnYqfSxyWF bG+gulq5MbNvte+djW/d53OvHBTaEPqxcHyhaSk9ZtbPHtcfdLAttvukRxMU2rgL0GMT d+Trffr8iMuHQm0E7hOA6W9BjBBCKEJZ1Do9cKpkjkQkzLz1EH/B17HJAUPAQkrvZBS3 LlRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rBlFsZwcDkYsluLQB0xbz64N+mhmejk+TyInZTQ5BMs=; b=A7Se3hwDaglg+6kfEkr8ktdcqU0jjmdEN287zwDWSYWLG7VNl5y5fCy9JtIUj9+oVR 7NhjvxCyV3MxqTKziYXgln2N3pEDcompuH7t4Zukgnb1fiGN+OVacpraQd803hpo5YiG e5vYVfl1WzwRMhIF6ifgp+/dvv0T0+DKKklc7t3tpqcOlHyUE0WZINoP33qq4SKlyLxo rYXoXtoLFxxUYwBjzn7X9P0AmDIOom5xqEA/mK1/oR66cPY1FnWpDBs9pdWOTPfLzGSS fNcaZh1e1cXtIA+mVE/KxBkbrscF+T3bXr7+ZalWdkIbl0I7bz9kWAam3h+C5BfE/aTP jYyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fCmOZ7CT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s7si17216487pfu.336.2021.04.19.08.08.37; Mon, 19 Apr 2021 08:08:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fCmOZ7CT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240040AbhDSNMT (ORCPT + 99 others); Mon, 19 Apr 2021 09:12:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:46224 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239570AbhDSNKj (ORCPT ); Mon, 19 Apr 2021 09:10:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 335806128C; Mon, 19 Apr 2021 13:10:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1618837808; bh=IgI4zozI+D92Ifo00TD20wheW8iwvsLj3PA/KWEXrn4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fCmOZ7CTrBDmvu8w/S/6UmyMx6+vuawQlIkbaHFd4uioncAbJwiO5s37U+0+Nl/vg PrbRSpzipYFcmgOhfY6OU3cQhUjtOxsI49u69MxMrpPWY+1e8willjv/SjQa2ZwQTo 4zlcqTerJgRPipIOHdNjuLJTJAK+lu2AI9TGNiJ4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Al Viro , Linus Torvalds Subject: [PATCH 5.11 060/122] readdir: make sure to verify directory entry for legacy interfaces too Date: Mon, 19 Apr 2021 15:05:40 +0200 Message-Id: <20210419130532.219682227@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210419130530.166331793@linuxfoundation.org> References: <20210419130530.166331793@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit 0c93ac69407d63a85be0129aa55ffaec27ffebd3 upstream. This does the directory entry name verification for the legacy "fillonedir" (and compat) interface that goes all the way back to the dark ages before we had a proper dirent, and the readdir() system call returned just a single entry at a time. Nobody should use this interface unless you still have binaries from 1991, but let's do it right. This came up during discussions about unsafe_copy_to_user() and proper checking of all the inputs to it, as the networking layer is looking to use it in a few new places. So let's make sure the _old_ users do it all right and proper, before we add new ones. See also commit 8a23eb804ca4 ("Make filldir[64]() verify the directory entry filename is valid") which did the proper modern interfaces that people actually use. It had a note: Note that I didn't bother adding the checks to any legacy interfaces that nobody uses. which this now corrects. Note that we really don't care about POSIX and the presense of '/' in a directory entry, but verify_dirent_name() also ends up doing the proper name length verification which is what the input checking discussion was about. [ Another option would be to remove the support for this particular very old interface: any binaries that use it are likely a.out binaries, and they will no longer run anyway since we removed a.out binftm support in commit eac616557050 ("x86: Deprecate a.out support"). But I'm not sure which came first: getdents() or ELF support, so let's pretend somebody might still have a working binary that uses the legacy readdir() case.. ] Link: https://lore.kernel.org/lkml/CAHk-=wjbvzCAhAtvG0d81W5o0-KT5PPTHhfJ5ieDFq+bGtgOYg@mail.gmail.com/ Acked-by: Al Viro Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/readdir.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/fs/readdir.c +++ b/fs/readdir.c @@ -150,6 +150,9 @@ static int fillonedir(struct dir_context if (buf->result) return -EINVAL; + buf->result = verify_dirent_name(name, namlen); + if (buf->result < 0) + return buf->result; d_ino = ino; if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { buf->result = -EOVERFLOW; @@ -405,6 +408,9 @@ static int compat_fillonedir(struct dir_ if (buf->result) return -EINVAL; + buf->result = verify_dirent_name(name, namlen); + if (buf->result < 0) + return buf->result; d_ino = ino; if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { buf->result = -EOVERFLOW;