Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2830138pxb; Mon, 19 Apr 2021 15:22:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw5iUB45GWu8bWEuWKsU3NbFkHk4nRDRMOQysLljTaVY0h81NtnAsZfauKir+ad1Qoy+bjJ X-Received: by 2002:a17:902:da8a:b029:ec:9032:35f6 with SMTP id j10-20020a170902da8ab02900ec903235f6mr13351504plx.37.1618870964374; Mon, 19 Apr 2021 15:22:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618870964; cv=none; d=google.com; s=arc-20160816; b=G+m0G+bDzwgz5Oxfc5wQWJzKGiuwPV71ysERxoZPi8oLloycUReoFLY9Alc8etmPBj sbWIwl35wD7KcDHGS3NriDxYD4UMyn0TVxp/ojnT+zVF2OegSxiF/2QWyMJcT51uvPcK haaaG559fCKFUrFFCnbgF51P/HL38ARG/1iiKRCsb+mmoB7x+W33xhAfUSr3rRHvC1HQ 0U0FlKDNukR7pCbCr6RvCFrIIS3X/BasS5fKr7e2irhJLy7VLGwZF2QrbCFSCXkmxU2/ He9Snea0XupB9OOOTp0OZKTzIE5xqzyyT2eZe1/22JtYAoE/Ke3HJgkudVtMul+lCo6L ClNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=F0pZ9VA/JLs1AAvo7W/iJnh6qta0wjKB/cPemGHnoRc=; b=w8HYlVitRQQmMch90tfUiVVounu2pZ7oQyRP2ipLYJrWDSEQM9QlCveYnHhWFV2s+S 47I4ebTL3827fLtONOQiF6eHouiItuvvDlBlG4ZTD4ggRS3C4GkssXvlqw6xGwJdyQ9Q qm+fRv9oOqENkZ3uJbW8QFvZER5+KqXeLX2kM1te2aaBblePY5Z5QoRRLkUImgZ4K2h4 CurLPv8v07SWMqkY7BG3vUhss5artdhaqkA+f87oilRIzfo+GxaMX9r+EIePPduHzzit 1wS9bz1SThUqYRoyiTzwiVl5LixmYUcX790YsZ/6xg6C6DrGdkM6BTk7cAhkQj9VDXnH uxSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="GnMn5N/G"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j3si867646pjs.116.2021.04.19.15.22.18; Mon, 19 Apr 2021 15:22:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="GnMn5N/G"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238405AbhDSUqJ (ORCPT + 99 others); Mon, 19 Apr 2021 16:46:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:54476 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242573AbhDSUot (ORCPT ); Mon, 19 Apr 2021 16:44:49 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 437A061104; Mon, 19 Apr 2021 20:44:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1618865059; bh=8ebH80wLSzpKsXllnqDHsURT7pA6qJAmK3LBb8kMWVo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GnMn5N/GtNVt3usYOoeWnuhcozXsta7QP1hMnXJxaQPXgDzzM+4NFnnbiE5gnL0nc i9nQNXBQrkDc9J4Imde+J9SHl4cd2z4ouRl1nhSTNOLJWL+xlcwrZxY+y6lRzOO9/A dXcRdjPdMEsr7pCNr+UuG+Eatr16xOeduKO13pZflAnmIfZ0xTmbM6I31oLpCD8gqe 3OvTfuUqVLVuoq/C0gsmzDL4Q5Mx9wn5ICm7dUxzHx+rpB/H53jzgXvgmN4ByisVSk /2YcJV7nTfsDPRABh1OWk5dmOvSBKbtqzIPGPUM0Btw6P/426VpLpzc3JXYIlxmO5m VAG0JxlcHldZQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Linus Torvalds , Al Viro , Sasha Levin , linux-fsdevel@vger.kernel.org Subject: [PATCH AUTOSEL 5.11 23/23] readdir: make sure to verify directory entry for legacy interfaces too Date: Mon, 19 Apr 2021 16:43:42 -0400 Message-Id: <20210419204343.6134-23-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210419204343.6134-1-sashal@kernel.org> References: <20210419204343.6134-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linus Torvalds [ Upstream commit 0c93ac69407d63a85be0129aa55ffaec27ffebd3 ] This does the directory entry name verification for the legacy "fillonedir" (and compat) interface that goes all the way back to the dark ages before we had a proper dirent, and the readdir() system call returned just a single entry at a time. Nobody should use this interface unless you still have binaries from 1991, but let's do it right. This came up during discussions about unsafe_copy_to_user() and proper checking of all the inputs to it, as the networking layer is looking to use it in a few new places. So let's make sure the _old_ users do it all right and proper, before we add new ones. See also commit 8a23eb804ca4 ("Make filldir[64]() verify the directory entry filename is valid") which did the proper modern interfaces that people actually use. It had a note: Note that I didn't bother adding the checks to any legacy interfaces that nobody uses. which this now corrects. Note that we really don't care about POSIX and the presense of '/' in a directory entry, but verify_dirent_name() also ends up doing the proper name length verification which is what the input checking discussion was about. [ Another option would be to remove the support for this particular very old interface: any binaries that use it are likely a.out binaries, and they will no longer run anyway since we removed a.out binftm support in commit eac616557050 ("x86: Deprecate a.out support"). But I'm not sure which came first: getdents() or ELF support, so let's pretend somebody might still have a working binary that uses the legacy readdir() case.. ] Link: https://lore.kernel.org/lkml/CAHk-=wjbvzCAhAtvG0d81W5o0-KT5PPTHhfJ5ieDFq+bGtgOYg@mail.gmail.com/ Acked-by: Al Viro Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/readdir.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/fs/readdir.c b/fs/readdir.c index 19434b3c982c..09e8ed7d4161 100644 --- a/fs/readdir.c +++ b/fs/readdir.c @@ -150,6 +150,9 @@ static int fillonedir(struct dir_context *ctx, const char *name, int namlen, if (buf->result) return -EINVAL; + buf->result = verify_dirent_name(name, namlen); + if (buf->result < 0) + return buf->result; d_ino = ino; if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { buf->result = -EOVERFLOW; @@ -405,6 +408,9 @@ static int compat_fillonedir(struct dir_context *ctx, const char *name, if (buf->result) return -EINVAL; + buf->result = verify_dirent_name(name, namlen); + if (buf->result < 0) + return buf->result; d_ino = ino; if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { buf->result = -EOVERFLOW; -- 2.30.2