Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2672045pxb; Mon, 19 Apr 2021 10:54:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzthXC3UOdZ3LODZ6J2o6itCAED7lTeF3lPNevJerXkNnkA77kyZP5j14TGDTtvE0Ban+nK X-Received: by 2002:a62:194f:0:b029:25c:37cb:2132 with SMTP id 76-20020a62194f0000b029025c37cb2132mr11478458pfz.37.1618854880872; Mon, 19 Apr 2021 10:54:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618854880; cv=none; d=google.com; s=arc-20160816; b=Nk5xe/2t2zMzStxqzZpLpxo1Pxt7T2/3+nKF/Wi1zmvjVOYlgomMRFhMOr1plhviOk 4pPlZNeHKrNholcUn7FJ/l08UJ6Y3Xe5HDJ8ZDtx6coBDqcsSC3wRRWd5judawCXs7HN S+XeeerHt8vdkfK36K3JeYM4wzJ8RQwc6eQRQsbrLqzErJLNU9LYabVW0nwwQb5IsVj3 xhqkK+LjhMTv533mHCHuMt0n9mR54w9YeDWTi9hUhVVDXorrZSI04d442TJVEN3Cs4aw LiPOM4noFULUBve2LipwX7tHJaGEzv5NyLKRhVtKdHXUq9hChdg/wmx0xQmYwWA6LxGw z9Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rBlFsZwcDkYsluLQB0xbz64N+mhmejk+TyInZTQ5BMs=; b=BCl0s+FgXtzoPopRXyTPjFe/YMZDM/f7cLIG1MR/fku98ec0tPObJq/p6Yd2QhKEIL 70v0vxOfuck9gutSX+0DFEjba5IFZdeoauJR9zwmRfaXkTonvFRsI1HD/b0LuEOyfs4o sMQPDSuQOEx8ROjsBVSwHVBMhyQDxSwRwdE9wEdMvUXJ9R/RLSoxFRpdEKRSzn3qWBWW sv7CUjFttABb03qH0z2TJmW7YDSkLk7mr24sdOXTPrDoBcPgvLOykz4RRWldasBEcIC6 45opXJ2npjudTfi4huNcbUhZCUt/I0wrgsRddJ7XF5SIBom8QfPchAIAX7skv+HfWkY0 lU6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AS9a5G3e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h19si200704pjq.75.2021.04.19.10.54.27; Mon, 19 Apr 2021 10:54:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=AS9a5G3e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241740AbhDSN1a (ORCPT + 99 others); Mon, 19 Apr 2021 09:27:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:56310 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241024AbhDSNTq (ORCPT ); Mon, 19 Apr 2021 09:19:46 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6EBDD613BF; Mon, 19 Apr 2021 13:15:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1618838122; bh=IgI4zozI+D92Ifo00TD20wheW8iwvsLj3PA/KWEXrn4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AS9a5G3eDorb9k4qjiGmzdbZgXG3OkRh7PZ6UGbpnxI2ywp7ZH6rFjJJJKnAIMDDb VZaG808rMk4Z3pekXvu9WwXOSXZd0VCXw3AzVJkgUIcytcaZbWMl8Af1aaf4DGS7Eo 4aXuZ2MoeSDw04RHh9+fJGl/GwECUam5ftHkTm6M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Al Viro , Linus Torvalds Subject: [PATCH 5.10 051/103] readdir: make sure to verify directory entry for legacy interfaces too Date: Mon, 19 Apr 2021 15:06:02 +0200 Message-Id: <20210419130529.569975633@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210419130527.791982064@linuxfoundation.org> References: <20210419130527.791982064@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds commit 0c93ac69407d63a85be0129aa55ffaec27ffebd3 upstream. This does the directory entry name verification for the legacy "fillonedir" (and compat) interface that goes all the way back to the dark ages before we had a proper dirent, and the readdir() system call returned just a single entry at a time. Nobody should use this interface unless you still have binaries from 1991, but let's do it right. This came up during discussions about unsafe_copy_to_user() and proper checking of all the inputs to it, as the networking layer is looking to use it in a few new places. So let's make sure the _old_ users do it all right and proper, before we add new ones. See also commit 8a23eb804ca4 ("Make filldir[64]() verify the directory entry filename is valid") which did the proper modern interfaces that people actually use. It had a note: Note that I didn't bother adding the checks to any legacy interfaces that nobody uses. which this now corrects. Note that we really don't care about POSIX and the presense of '/' in a directory entry, but verify_dirent_name() also ends up doing the proper name length verification which is what the input checking discussion was about. [ Another option would be to remove the support for this particular very old interface: any binaries that use it are likely a.out binaries, and they will no longer run anyway since we removed a.out binftm support in commit eac616557050 ("x86: Deprecate a.out support"). But I'm not sure which came first: getdents() or ELF support, so let's pretend somebody might still have a working binary that uses the legacy readdir() case.. ] Link: https://lore.kernel.org/lkml/CAHk-=wjbvzCAhAtvG0d81W5o0-KT5PPTHhfJ5ieDFq+bGtgOYg@mail.gmail.com/ Acked-by: Al Viro Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/readdir.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/fs/readdir.c +++ b/fs/readdir.c @@ -150,6 +150,9 @@ static int fillonedir(struct dir_context if (buf->result) return -EINVAL; + buf->result = verify_dirent_name(name, namlen); + if (buf->result < 0) + return buf->result; d_ino = ino; if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { buf->result = -EOVERFLOW; @@ -405,6 +408,9 @@ static int compat_fillonedir(struct dir_ if (buf->result) return -EINVAL; + buf->result = verify_dirent_name(name, namlen); + if (buf->result < 0) + return buf->result; d_ino = ino; if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { buf->result = -EOVERFLOW;