1 // SPDX-License-Identifier: GPL-2.0
5 * Copyright (C) 1995 Linus Torvalds
8 #include <linux/stddef.h>
9 #include <linux/kernel.h>
10 #include <linux/export.h>
11 #include <linux/time.h>
13 #include <linux/errno.h>
14 #include <linux/stat.h>
15 #include <linux/file.h>
17 #include <linux/fsnotify.h>
18 #include <linux/dirent.h>
19 #include <linux/security.h>
20 #include <linux/syscalls.h>
21 #include <linux/unistd.h>
22 #include <linux/compat.h>
23 #include <linux/uaccess.h>
25 #include <asm/unaligned.h>
28 * Note the "unsafe_put_user() semantics: we goto a
31 #define unsafe_copy_dirent_name(_dst, _src, _len, label) do { \
32 char __user *dst = (_dst); \
33 const char *src = (_src); \
34 size_t len = (_len); \
35 unsafe_put_user(0, dst+len, label); \
36 unsafe_copy_to_user(dst, src, len, label); \
40 int iterate_dir(struct file
*file
, struct dir_context
*ctx
)
42 struct inode
*inode
= file_inode(file
);
45 if (file
->f_op
->iterate_shared
)
47 else if (!file
->f_op
->iterate
)
50 res
= security_file_permission(file
, MAY_READ
);
55 res
= down_read_killable(&inode
->i_rwsem
);
57 res
= down_write_killable(&inode
->i_rwsem
);
62 if (!IS_DEADDIR(inode
)) {
63 ctx
->pos
= file
->f_pos
;
65 res
= file
->f_op
->iterate_shared(file
, ctx
);
67 res
= file
->f_op
->iterate(file
, ctx
);
68 file
->f_pos
= ctx
->pos
;
69 fsnotify_access(file
);
73 inode_unlock_shared(inode
);
79 EXPORT_SYMBOL(iterate_dir
);
82 * POSIX says that a dirent name cannot contain NULL or a '/'.
84 * It's not 100% clear what we should really do in this case.
85 * The filesystem is clearly corrupted, but returning a hard
86 * error means that you now don't see any of the other names
87 * either, so that isn't a perfect alternative.
89 * And if you return an error, what error do you use? Several
90 * filesystems seem to have decided on EUCLEAN being the error
91 * code for EFSCORRUPTED, and that may be the error to use. Or
92 * just EIO, which is perhaps more obvious to users.
94 * In order to see the other file names in the directory, the
95 * caller might want to make this a "soft" error: skip the
96 * entry, and return the error at the end instead.
98 * Note that this should likely do a "memchr(name, 0, len)"
99 * check too, since that would be filesystem corruption as
100 * well. However, that case can't actually confuse user space,
101 * which has to do a strlen() on the name anyway to find the
102 * filename length, and the above "soft error" worry means
103 * that it's probably better left alone until we have that
106 * Note the PATH_MAX check - it's arbitrary but the real
107 * kernel limit on a possible path component, not NAME_MAX,
108 * which is the technical standard limit.
110 static int verify_dirent_name(const char *name
, int len
)
112 if (len
<= 0 || len
>= PATH_MAX
)
114 if (memchr(name
, '/', len
))
120 * Traditional linux readdir() handling..
122 * "count=1" is a special case, meaning that the buffer is one
123 * dirent-structure in size and that the code can't handle more
124 * anyway. Thus the special "fillonedir()" function for that
125 * case (the low-level handlers don't need to care about this).
128 #ifdef __ARCH_WANT_OLD_READDIR
130 struct old_linux_dirent
{
132 unsigned long d_offset
;
133 unsigned short d_namlen
;
137 struct readdir_callback
{
138 struct dir_context ctx
;
139 struct old_linux_dirent __user
* dirent
;
143 static int fillonedir(struct dir_context
*ctx
, const char *name
, int namlen
,
144 loff_t offset
, u64 ino
, unsigned int d_type
)
146 struct readdir_callback
*buf
=
147 container_of(ctx
, struct readdir_callback
, ctx
);
148 struct old_linux_dirent __user
* dirent
;
153 buf
->result
= verify_dirent_name(name
, namlen
);
157 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
) {
158 buf
->result
= -EOVERFLOW
;
162 dirent
= buf
->dirent
;
163 if (!user_write_access_begin(dirent
,
164 (unsigned long)(dirent
->d_name
+ namlen
+ 1) -
165 (unsigned long)dirent
))
167 unsafe_put_user(d_ino
, &dirent
->d_ino
, efault_end
);
168 unsafe_put_user(offset
, &dirent
->d_offset
, efault_end
);
169 unsafe_put_user(namlen
, &dirent
->d_namlen
, efault_end
);
170 unsafe_copy_dirent_name(dirent
->d_name
, name
, namlen
, efault_end
);
171 user_write_access_end();
174 user_write_access_end();
176 buf
->result
= -EFAULT
;
180 SYSCALL_DEFINE3(old_readdir
, unsigned int, fd
,
181 struct old_linux_dirent __user
*, dirent
, unsigned int, count
)
184 struct fd f
= fdget_pos(fd
);
185 struct readdir_callback buf
= {
186 .ctx
.actor
= fillonedir
,
193 error
= iterate_dir(f
.file
, &buf
.ctx
);
201 #endif /* __ARCH_WANT_OLD_READDIR */
204 * New, all-improved, singing, dancing, iBCS2-compliant getdents()
207 struct linux_dirent
{
210 unsigned short d_reclen
;
214 struct getdents_callback
{
215 struct dir_context ctx
;
216 struct linux_dirent __user
* current_dir
;
222 static int filldir(struct dir_context
*ctx
, const char *name
, int namlen
,
223 loff_t offset
, u64 ino
, unsigned int d_type
)
225 struct linux_dirent __user
*dirent
, *prev
;
226 struct getdents_callback
*buf
=
227 container_of(ctx
, struct getdents_callback
, ctx
);
229 int reclen
= ALIGN(offsetof(struct linux_dirent
, d_name
) + namlen
+ 2,
233 buf
->error
= verify_dirent_name(name
, namlen
);
234 if (unlikely(buf
->error
))
236 buf
->error
= -EINVAL
; /* only used if we fail.. */
237 if (reclen
> buf
->count
)
240 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
) {
241 buf
->error
= -EOVERFLOW
;
244 prev_reclen
= buf
->prev_reclen
;
245 if (prev_reclen
&& signal_pending(current
))
247 dirent
= buf
->current_dir
;
248 prev
= (void __user
*) dirent
- prev_reclen
;
249 if (!user_write_access_begin(prev
, reclen
+ prev_reclen
))
252 /* This might be 'dirent->d_off', but if so it will get overwritten */
253 unsafe_put_user(offset
, &prev
->d_off
, efault_end
);
254 unsafe_put_user(d_ino
, &dirent
->d_ino
, efault_end
);
255 unsafe_put_user(reclen
, &dirent
->d_reclen
, efault_end
);
256 unsafe_put_user(d_type
, (char __user
*) dirent
+ reclen
- 1, efault_end
);
257 unsafe_copy_dirent_name(dirent
->d_name
, name
, namlen
, efault_end
);
258 user_write_access_end();
260 buf
->current_dir
= (void __user
*)dirent
+ reclen
;
261 buf
->prev_reclen
= reclen
;
262 buf
->count
-= reclen
;
265 user_write_access_end();
267 buf
->error
= -EFAULT
;
271 SYSCALL_DEFINE3(getdents
, unsigned int, fd
,
272 struct linux_dirent __user
*, dirent
, unsigned int, count
)
275 struct getdents_callback buf
= {
276 .ctx
.actor
= filldir
,
278 .current_dir
= dirent
286 error
= iterate_dir(f
.file
, &buf
.ctx
);
289 if (buf
.prev_reclen
) {
290 struct linux_dirent __user
* lastdirent
;
291 lastdirent
= (void __user
*)buf
.current_dir
- buf
.prev_reclen
;
293 if (put_user(buf
.ctx
.pos
, &lastdirent
->d_off
))
296 error
= count
- buf
.count
;
302 struct getdents_callback64
{
303 struct dir_context ctx
;
304 struct linux_dirent64 __user
* current_dir
;
310 static int filldir64(struct dir_context
*ctx
, const char *name
, int namlen
,
311 loff_t offset
, u64 ino
, unsigned int d_type
)
313 struct linux_dirent64 __user
*dirent
, *prev
;
314 struct getdents_callback64
*buf
=
315 container_of(ctx
, struct getdents_callback64
, ctx
);
316 int reclen
= ALIGN(offsetof(struct linux_dirent64
, d_name
) + namlen
+ 1,
320 buf
->error
= verify_dirent_name(name
, namlen
);
321 if (unlikely(buf
->error
))
323 buf
->error
= -EINVAL
; /* only used if we fail.. */
324 if (reclen
> buf
->count
)
326 prev_reclen
= buf
->prev_reclen
;
327 if (prev_reclen
&& signal_pending(current
))
329 dirent
= buf
->current_dir
;
330 prev
= (void __user
*)dirent
- prev_reclen
;
331 if (!user_write_access_begin(prev
, reclen
+ prev_reclen
))
334 /* This might be 'dirent->d_off', but if so it will get overwritten */
335 unsafe_put_user(offset
, &prev
->d_off
, efault_end
);
336 unsafe_put_user(ino
, &dirent
->d_ino
, efault_end
);
337 unsafe_put_user(reclen
, &dirent
->d_reclen
, efault_end
);
338 unsafe_put_user(d_type
, &dirent
->d_type
, efault_end
);
339 unsafe_copy_dirent_name(dirent
->d_name
, name
, namlen
, efault_end
);
340 user_write_access_end();
342 buf
->prev_reclen
= reclen
;
343 buf
->current_dir
= (void __user
*)dirent
+ reclen
;
344 buf
->count
-= reclen
;
348 user_write_access_end();
350 buf
->error
= -EFAULT
;
354 SYSCALL_DEFINE3(getdents64
, unsigned int, fd
,
355 struct linux_dirent64 __user
*, dirent
, unsigned int, count
)
358 struct getdents_callback64 buf
= {
359 .ctx
.actor
= filldir64
,
361 .current_dir
= dirent
369 error
= iterate_dir(f
.file
, &buf
.ctx
);
372 if (buf
.prev_reclen
) {
373 struct linux_dirent64 __user
* lastdirent
;
374 typeof(lastdirent
->d_off
) d_off
= buf
.ctx
.pos
;
376 lastdirent
= (void __user
*) buf
.current_dir
- buf
.prev_reclen
;
377 if (put_user(d_off
, &lastdirent
->d_off
))
380 error
= count
- buf
.count
;
387 struct compat_old_linux_dirent
{
388 compat_ulong_t d_ino
;
389 compat_ulong_t d_offset
;
390 unsigned short d_namlen
;
394 struct compat_readdir_callback
{
395 struct dir_context ctx
;
396 struct compat_old_linux_dirent __user
*dirent
;
400 static int compat_fillonedir(struct dir_context
*ctx
, const char *name
,
401 int namlen
, loff_t offset
, u64 ino
,
404 struct compat_readdir_callback
*buf
=
405 container_of(ctx
, struct compat_readdir_callback
, ctx
);
406 struct compat_old_linux_dirent __user
*dirent
;
407 compat_ulong_t d_ino
;
411 buf
->result
= verify_dirent_name(name
, namlen
);
415 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
) {
416 buf
->result
= -EOVERFLOW
;
420 dirent
= buf
->dirent
;
421 if (!user_write_access_begin(dirent
,
422 (unsigned long)(dirent
->d_name
+ namlen
+ 1) -
423 (unsigned long)dirent
))
425 unsafe_put_user(d_ino
, &dirent
->d_ino
, efault_end
);
426 unsafe_put_user(offset
, &dirent
->d_offset
, efault_end
);
427 unsafe_put_user(namlen
, &dirent
->d_namlen
, efault_end
);
428 unsafe_copy_dirent_name(dirent
->d_name
, name
, namlen
, efault_end
);
429 user_write_access_end();
432 user_write_access_end();
434 buf
->result
= -EFAULT
;
438 COMPAT_SYSCALL_DEFINE3(old_readdir
, unsigned int, fd
,
439 struct compat_old_linux_dirent __user
*, dirent
, unsigned int, count
)
442 struct fd f
= fdget_pos(fd
);
443 struct compat_readdir_callback buf
= {
444 .ctx
.actor
= compat_fillonedir
,
451 error
= iterate_dir(f
.file
, &buf
.ctx
);
459 struct compat_linux_dirent
{
460 compat_ulong_t d_ino
;
461 compat_ulong_t d_off
;
462 unsigned short d_reclen
;
466 struct compat_getdents_callback
{
467 struct dir_context ctx
;
468 struct compat_linux_dirent __user
*current_dir
;
474 static int compat_filldir(struct dir_context
*ctx
, const char *name
, int namlen
,
475 loff_t offset
, u64 ino
, unsigned int d_type
)
477 struct compat_linux_dirent __user
*dirent
, *prev
;
478 struct compat_getdents_callback
*buf
=
479 container_of(ctx
, struct compat_getdents_callback
, ctx
);
480 compat_ulong_t d_ino
;
481 int reclen
= ALIGN(offsetof(struct compat_linux_dirent
, d_name
) +
482 namlen
+ 2, sizeof(compat_long_t
));
485 buf
->error
= verify_dirent_name(name
, namlen
);
486 if (unlikely(buf
->error
))
488 buf
->error
= -EINVAL
; /* only used if we fail.. */
489 if (reclen
> buf
->count
)
492 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
) {
493 buf
->error
= -EOVERFLOW
;
496 prev_reclen
= buf
->prev_reclen
;
497 if (prev_reclen
&& signal_pending(current
))
499 dirent
= buf
->current_dir
;
500 prev
= (void __user
*) dirent
- prev_reclen
;
501 if (!user_write_access_begin(prev
, reclen
+ prev_reclen
))
504 unsafe_put_user(offset
, &prev
->d_off
, efault_end
);
505 unsafe_put_user(d_ino
, &dirent
->d_ino
, efault_end
);
506 unsafe_put_user(reclen
, &dirent
->d_reclen
, efault_end
);
507 unsafe_put_user(d_type
, (char __user
*) dirent
+ reclen
- 1, efault_end
);
508 unsafe_copy_dirent_name(dirent
->d_name
, name
, namlen
, efault_end
);
509 user_write_access_end();
511 buf
->prev_reclen
= reclen
;
512 buf
->current_dir
= (void __user
*)dirent
+ reclen
;
513 buf
->count
-= reclen
;
516 user_write_access_end();
518 buf
->error
= -EFAULT
;
522 COMPAT_SYSCALL_DEFINE3(getdents
, unsigned int, fd
,
523 struct compat_linux_dirent __user
*, dirent
, unsigned int, count
)
526 struct compat_getdents_callback buf
= {
527 .ctx
.actor
= compat_filldir
,
528 .current_dir
= dirent
,
537 error
= iterate_dir(f
.file
, &buf
.ctx
);
540 if (buf
.prev_reclen
) {
541 struct compat_linux_dirent __user
* lastdirent
;
542 lastdirent
= (void __user
*)buf
.current_dir
- buf
.prev_reclen
;
544 if (put_user(buf
.ctx
.pos
, &lastdirent
->d_off
))
547 error
= count
- buf
.count
;