2020-10-02 20:38:16 +03:00
// SPDX-License-Identifier: GPL-2.0-only
# include <linux/fs.h>
# include <linux/fs_struct.h>
# include <linux/kernel_read_file.h>
# include <linux/security.h>
# include <linux/vmalloc.h>
2020-10-02 20:38:18 +03:00
/**
* kernel_read_file ( ) - read file contents into a kernel buffer
*
* @ file file to read from
2020-10-02 20:38:25 +03:00
* @ offset where to start reading from ( see below ) .
2020-10-02 20:38:18 +03:00
* @ buf pointer to a " void * " buffer for reading into ( if
* * @ buf is NULL , a buffer will be allocated , and
* @ buf_size will be ignored )
* @ buf_size size of buf , if already allocated . If @ buf not
* allocated , this is the largest size to allocate .
2020-10-02 20:38:19 +03:00
* @ file_size if non - NULL , the full size of @ file will be
* written here .
2020-10-02 20:38:18 +03:00
* @ id the kernel_read_file_id identifying the type of
* file contents being read ( for LSMs to examine )
*
2020-10-02 20:38:25 +03:00
* @ offset must be 0 unless both @ buf and @ file_size are non - NULL
* ( i . e . the caller must be expecting to read partial file contents
* via an already - allocated @ buf , in at most @ buf_size chunks , and
* will be able to determine when the entire file was read by
* checking @ file_size ) . This isn ' t a recommended way to read a
* file , though , since it is possible that the contents might
* change between calls to kernel_read_file ( ) .
*
2020-10-02 20:38:18 +03:00
* Returns number of bytes read ( no single read will be bigger
* than INT_MAX ) , or negative on error .
*
*/
2020-10-02 20:38:25 +03:00
int kernel_read_file ( struct file * file , loff_t offset , void * * buf ,
2020-10-02 20:38:19 +03:00
size_t buf_size , size_t * file_size ,
enum kernel_read_file_id id )
2020-10-02 20:38:16 +03:00
{
loff_t i_size , pos ;
2020-10-02 20:38:25 +03:00
size_t copied ;
2020-10-02 20:38:16 +03:00
void * allocated = NULL ;
2020-10-02 20:38:25 +03:00
bool whole_file ;
2020-10-02 20:38:16 +03:00
int ret ;
2020-10-02 20:38:25 +03:00
if ( offset ! = 0 & & ( ! * buf | | ! file_size ) )
return - EINVAL ;
2020-10-02 20:38:18 +03:00
if ( ! S_ISREG ( file_inode ( file ) - > i_mode ) )
2020-10-02 20:38:16 +03:00
return - EINVAL ;
ret = deny_write_access ( file ) ;
if ( ret )
return ret ;
i_size = i_size_read ( file_inode ( file ) ) ;
if ( i_size < = 0 ) {
ret = - EINVAL ;
goto out ;
}
2020-10-02 20:38:25 +03:00
/* The file is too big for sane activities. */
if ( i_size > INT_MAX ) {
ret = - EFBIG ;
goto out ;
}
/* The entire file cannot be read in one buffer. */
if ( ! file_size & & offset = = 0 & & i_size > buf_size ) {
2020-10-02 20:38:16 +03:00
ret = - EFBIG ;
goto out ;
}
2020-10-02 20:38:25 +03:00
whole_file = ( offset = = 0 & & i_size < = buf_size ) ;
ret = security_kernel_read_file ( file , id , whole_file ) ;
if ( ret )
goto out ;
2020-10-02 20:38:19 +03:00
if ( file_size )
* file_size = i_size ;
2020-10-02 20:38:16 +03:00
if ( ! * buf )
* buf = allocated = vmalloc ( i_size ) ;
if ( ! * buf ) {
ret = - ENOMEM ;
goto out ;
}
2020-10-02 20:38:25 +03:00
pos = offset ;
copied = 0 ;
while ( copied < buf_size ) {
ssize_t bytes ;
size_t wanted = min_t ( size_t , buf_size - copied ,
i_size - pos ) ;
bytes = kernel_read ( file , * buf + copied , wanted , & pos ) ;
2020-10-02 20:38:16 +03:00
if ( bytes < 0 ) {
ret = bytes ;
goto out_free ;
}
if ( bytes = = 0 )
break ;
2020-10-02 20:38:25 +03:00
copied + = bytes ;
2020-10-02 20:38:16 +03:00
}
2020-10-02 20:38:25 +03:00
if ( whole_file ) {
if ( pos ! = i_size ) {
ret = - EIO ;
goto out_free ;
}
2020-10-02 20:38:16 +03:00
2020-10-02 20:38:25 +03:00
ret = security_kernel_post_read_file ( file , * buf , i_size , id ) ;
}
2020-10-02 20:38:16 +03:00
out_free :
if ( ret < 0 ) {
if ( allocated ) {
vfree ( * buf ) ;
* buf = NULL ;
}
}
out :
allow_write_access ( file ) ;
2020-10-02 20:38:25 +03:00
return ret = = 0 ? copied : ret ;
2020-10-02 20:38:16 +03:00
}
EXPORT_SYMBOL_GPL ( kernel_read_file ) ;
2020-10-02 20:38:25 +03:00
int kernel_read_file_from_path ( const char * path , loff_t offset , void * * buf ,
2020-10-02 20:38:19 +03:00
size_t buf_size , size_t * file_size ,
enum kernel_read_file_id id )
2020-10-02 20:38:16 +03:00
{
struct file * file ;
int ret ;
if ( ! path | | ! * path )
return - EINVAL ;
file = filp_open ( path , O_RDONLY , 0 ) ;
if ( IS_ERR ( file ) )
return PTR_ERR ( file ) ;
2020-10-02 20:38:25 +03:00
ret = kernel_read_file ( file , offset , buf , buf_size , file_size , id ) ;
2020-10-02 20:38:16 +03:00
fput ( file ) ;
return ret ;
}
EXPORT_SYMBOL_GPL ( kernel_read_file_from_path ) ;
2020-10-02 20:38:25 +03:00
int kernel_read_file_from_path_initns ( const char * path , loff_t offset ,
void * * buf , size_t buf_size ,
size_t * file_size ,
2020-10-02 20:38:16 +03:00
enum kernel_read_file_id id )
{
struct file * file ;
struct path root ;
int ret ;
if ( ! path | | ! * path )
return - EINVAL ;
task_lock ( & init_task ) ;
get_fs_root ( init_task . fs , & root ) ;
task_unlock ( & init_task ) ;
2021-04-02 02:00:57 +03:00
file = file_open_root ( & root , path , O_RDONLY , 0 ) ;
2020-10-02 20:38:16 +03:00
path_put ( & root ) ;
if ( IS_ERR ( file ) )
return PTR_ERR ( file ) ;
2020-10-02 20:38:25 +03:00
ret = kernel_read_file ( file , offset , buf , buf_size , file_size , id ) ;
2020-10-02 20:38:16 +03:00
fput ( file ) ;
return ret ;
}
EXPORT_SYMBOL_GPL ( kernel_read_file_from_path_initns ) ;
2020-10-02 20:38:25 +03:00
int kernel_read_file_from_fd ( int fd , loff_t offset , void * * buf ,
size_t buf_size , size_t * file_size ,
2020-10-02 20:38:16 +03:00
enum kernel_read_file_id id )
{
struct fd f = fdget ( fd ) ;
int ret = - EBADF ;
if ( ! f . file )
goto out ;
2020-10-02 20:38:25 +03:00
ret = kernel_read_file ( f . file , offset , buf , buf_size , file_size , id ) ;
2020-10-02 20:38:16 +03:00
out :
fdput ( f ) ;
return ret ;
}
EXPORT_SYMBOL_GPL ( kernel_read_file_from_fd ) ;