1 /* hairy bits of Hurd file name lookup
2 Copyright (C) 1992-2019 Free Software Foundation, Inc.
3 This file is part of the GNU C Library.
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public
16 License along with the GNU C Library; if not, see
17 <https://www.gnu.org/licenses/>. */
20 #include <hurd/lookup.h>
21 #include <hurd/term.h>
22 #include <hurd/paths.h>
27 #include <eloop-threshold.h>
30 /* Translate the error from dir_lookup into the error the user sees. */
32 lookup_error (error_t error
)
38 /* These indicate that the server does not understand dir_lookup
39 at all. If it were a directory, it would, by definition. */
47 __hurd_file_name_lookup_retry (error_t (*use_init_port
)
48 (int which
, error_t (*operate
) (file_t
)),
49 file_t (*get_dtable_port
) (int fd
),
51 (file_t dir
, const char *name
,
52 int flags
, mode_t mode
,
53 retry_type
*do_retry
, string_t retry_name
,
55 enum retry_type doretry
,
57 int flags
, mode_t mode
,
63 file_t lastdir
= MACH_PORT_NULL
;
65 error_t
lookup_op (file_t startdir
)
67 if (file_name
[0] == '/' && file_name
[1] != '\0')
69 while (file_name
[1] == '/')
70 /* Remove double leading slash. */
72 if (file_name
[1] != '\0')
73 /* Remove leading slash when we have more than the slash. */
77 return lookup_error ((*lookup
) (startdir
, file_name
, flags
, mode
,
78 &doretry
, retryname
, result
));
80 error_t
reauthenticate (file_t unauth
)
83 mach_port_t ref
= __mach_reply_port ();
84 error_t
reauth (auth_t auth
)
86 return __auth_user_authenticate (auth
, ref
,
87 MACH_MSG_TYPE_MAKE_SEND
,
90 err
= __io_reauthenticate (unauth
, ref
, MACH_MSG_TYPE_MAKE_SEND
);
92 err
= (*use_init_port
) (INIT_PORT_AUTH
, &reauth
);
93 __mach_port_destroy (__mach_task_self (), ref
);
94 __mach_port_deallocate (__mach_task_self (), unauth
);
99 lookup
= __dir_lookup
;
105 file_t startdir
= MACH_PORT_NULL
;
106 int dirport
= INIT_PORT_CWDIR
;
110 case FS_RETRY_REAUTH
:
111 if (err
= reauthenticate (*result
))
115 case FS_RETRY_NORMAL
:
116 if (nloops
++ >= __eloop_threshold ())
118 __mach_port_deallocate (__mach_task_self (), *result
);
123 /* An empty RETRYNAME indicates we have the final port. */
124 if (retryname
[0] == '\0'
125 /* If reauth'd, we must do one more retry on "" to give the new
126 translator a chance to make a new port for us. */
127 && doretry
== FS_RETRY_NORMAL
)
129 if (flags
& O_NOFOLLOW
)
131 /* In Linux, O_NOFOLLOW means to reject symlinks. If we
132 did an O_NOLINK lookup above and io_stat here to check
133 for S_IFLNK only, a translator like firmlink could easily
134 spoof this check by not showing S_IFLNK, but in fact
135 redirecting the lookup to some other name
136 (i.e. opening the very same holes a symlink would).
138 Instead we do an O_NOTRANS lookup above, and stat the
139 underlying node: if it has a translator set, and its
140 owner is not root (st_uid 0) then we reject it.
141 Since the motivation for this feature is security, and
142 that security presumes we trust the containing
143 directory, this check approximates the security of
144 refusing symlinks while accepting mount points.
145 Note that we actually permit something Linux doesn't:
146 we follow root-owned symlinks; if that is deemed
147 undesireable, we can add a final check for that
148 one exception to our general translator-based rule. */
150 err
= __io_stat (*result
, &st
);
153 if (flags
& O_DIRECTORY
&& !S_ISDIR (st
.st_mode
))
155 if (S_ISLNK (st
.st_mode
))
157 else if (st
.st_mode
& (S_IPTRANS
|S_IATRANS
))
161 else if (st
.st_mode
& S_IPTRANS
)
165 size_t translen
= sizeof buf
;
166 err
= __file_get_translator (*result
,
169 && translen
> sizeof _HURD_SYMLINK
171 _HURD_SYMLINK
, sizeof _HURD_SYMLINK
))
178 /* We got a successful translation. Now apply any open-time
179 action flags we were passed. */
181 if (!err
&& (flags
& O_TRUNC
)) /* Asked to truncate the file. */
182 err
= __file_set_size (*result
, 0);
185 __mach_port_deallocate (__mach_task_self (), *result
);
190 file_name
= retryname
;
193 case FS_RETRY_MAGICAL
:
194 switch (retryname
[0])
197 dirport
= INIT_PORT_CRDIR
;
198 if (*result
!= MACH_PORT_NULL
)
199 __mach_port_deallocate (__mach_task_self (), *result
);
200 if (nloops
++ >= __eloop_threshold ())
205 file_name
= &retryname
[1];
209 if (retryname
[1] == 'd' && retryname
[2] == '/')
215 fd
= (int) __strtoul_internal (&retryname
[3], &end
, 10, 0);
216 if (end
== NULL
|| errno
/* Malformed number. */
217 /* Check for excess text after the number. A slash
218 is valid; it ends the component. Anything else
219 does not name a numeric file descriptor. */
220 || (*end
!= '/' && *end
!= '\0'))
226 if (! get_dtable_port
)
230 *result
= (*get_dtable_port
) (fd
);
231 if (*result
== MACH_PORT_NULL
)
233 /* If the name was a proper number, but the file
234 descriptor does not exist, we return EBADF instead
250 /* Do a normal retry on the remaining components. */
252 file_name
= end
+ 1; /* Skip the slash. */
261 if (retryname
[1] == 'a' && retryname
[2] == 'c'
262 && retryname
[3] == 'h' && retryname
[4] == 't'
263 && retryname
[5] == 'y' && retryname
[6] == 'p'
264 && retryname
[7] == 'e')
267 struct host_basic_info hostinfo
;
268 mach_msg_type_number_t hostinfocnt
= HOST_BASIC_INFO_COUNT
;
270 /* XXX want client's host */
271 if (err
= __host_info (__mach_host_self (), HOST_BASIC_INFO
,
272 (integer_t
*) &hostinfo
,
275 if (hostinfocnt
!= HOST_BASIC_INFO_COUNT
)
280 p
= _itoa (hostinfo
.cpu_subtype
, &retryname
[8], 10, 0);
282 p
= _itoa (hostinfo
.cpu_type
, &retryname
[8], 10, 0);
284 abort (); /* XXX write this right if this ever happens */
286 strcpy (retryname
, p
);
294 if (retryname
[1] == 't' && retryname
[2] == 'y')
295 switch (retryname
[3])
297 error_t
opentty (file_t
*result
)
300 error_t
ctty_open (file_t port
)
302 if (port
== MACH_PORT_NULL
)
303 return ENXIO
; /* No controlling terminal. */
304 return __termctty_open_terminal (port
,
308 err
= (*use_init_port
) (INIT_PORT_CTTYID
, &ctty_open
);
310 err
= reauthenticate (*result
);
315 err
= opentty (result
);
318 if (err
= opentty (&startdir
))
320 strcpy (retryname
, &retryname
[4]);
330 if (retryname
[1] == 'i' && retryname
[2] == 'd'
331 && (retryname
[3] == '/' || retryname
[3] == 0))
333 char *p
, buf
[1024]; /* XXX */
335 p
= _itoa (__getpid (), &buf
[sizeof buf
], 10, 0);
336 len
= &buf
[sizeof buf
] - p
;
337 memcpy (buf
, p
, len
);
338 strcpy (buf
+ len
, &retryname
[3]);
339 strcpy (retryname
, buf
);
341 /* Do a normal retry on the remaining components. */
342 __mach_port_mod_refs (__mach_task_self (), lastdir
,
343 MACH_PORT_RIGHT_SEND
, 1);
345 file_name
= retryname
;
363 if (MACH_PORT_VALID (*result
) && *result
!= lastdir
)
365 if (MACH_PORT_VALID (lastdir
))
366 __mach_port_deallocate (__mach_task_self (), lastdir
);
369 __mach_port_mod_refs (__mach_task_self (), lastdir
,
370 MACH_PORT_RIGHT_SEND
, 1);
373 if (startdir
!= MACH_PORT_NULL
)
375 err
= lookup_op (startdir
);
376 __mach_port_deallocate (__mach_task_self (), startdir
);
377 startdir
= MACH_PORT_NULL
;
380 err
= (*use_init_port
) (dirport
, &lookup_op
);
384 if (MACH_PORT_VALID (lastdir
))
385 __mach_port_deallocate (__mach_task_self (), lastdir
);
389 weak_alias (__hurd_file_name_lookup_retry
, hurd_file_name_lookup_retry
)