diff options
author | Adin Scannell <ascannell@google.com> | 2018-09-07 16:52:02 -0700 |
---|---|---|
committer | Shentubot <shentubot@google.com> | 2018-09-07 16:53:12 -0700 |
commit | 6cfb5cd56d4660cc0de6cd991a7ed4601824a7e6 (patch) | |
tree | 9c197fdc7083acebc1b89eeed3bfd458bd8ab6d2 /pkg/p9/handlers.go | |
parent | 8ce3fbf9f87677ac34c577be9fb9b395ede8e714 (diff) |
Add additional sanity checks for walk.
PiperOrigin-RevId: 212058684
Change-Id: I319709b9ffcfccb3231bac98df345d2a20eca24b
Diffstat (limited to 'pkg/p9/handlers.go')
-rw-r--r-- | pkg/p9/handlers.go | 221 |
1 files changed, 168 insertions, 53 deletions
diff --git a/pkg/p9/handlers.go b/pkg/p9/handlers.go index 7da9eff5f..ea41f97c7 100644 --- a/pkg/p9/handlers.go +++ b/pkg/p9/handlers.go @@ -17,6 +17,7 @@ package p9 import ( "io" "os" + "path" "strings" "sync/atomic" "syscall" @@ -94,39 +95,6 @@ func isSafeName(name string) bool { } // handle implements handler.handle. -func (t *Twalk) handle(cs *connState) message { - // Check the names. - for _, name := range t.Names { - if !isSafeName(name) { - return newErr(syscall.EINVAL) - } - } - - // Lookup the FID. - ref, ok := cs.LookupFID(t.FID) - if !ok { - return newErr(syscall.EBADF) - } - defer ref.DecRef() - - // Has it been opened already? - if _, opened := ref.OpenFlags(); opened { - return newErr(syscall.EBUSY) - } - - // Do the walk. - qids, sf, err := ref.file.Walk(t.Names) - if err != nil { - return newErr(err) - } - - // Install the new FID. - cs.InsertFID(t.NewFID, &fidRef{file: sf}) - - return &Rwalk{QIDs: qids} -} - -// handle implements handler.handle. func (t *Tclunk) handle(cs *connState) message { if !cs.DeleteFID(t.FID) { return newErr(syscall.EBADF) @@ -175,14 +143,57 @@ func (t *Tattach) handle(cs *connState) message { return newErr(syscall.EINVAL) } - // Do the attach. - sf, err := cs.server.attacher.Attach(t.Auth.AttachName) + // Must provide an absolute path. + if path.IsAbs(t.Auth.AttachName) { + // Trim off the leading / if the path is absolute. We always + // treat attach paths as absolute and call attach with the root + // argument on the server file for clarity. + t.Auth.AttachName = t.Auth.AttachName[1:] + } + + // Do the attach on the root. + sf, err := cs.server.attacher.Attach() if err != nil { return newErr(err) } - cs.InsertFID(t.FID, &fidRef{file: sf}) + _, valid, attr, err := sf.GetAttr(AttrMaskAll()) + if err != nil { + sf.Close() // Drop file. + return newErr(err) + } + if !valid.Mode { + sf.Close() // Drop file. + return newErr(syscall.EINVAL) + } + + // Build a transient reference. + root := &fidRef{ + file: sf, + refs: 1, + walkable: attr.Mode.IsDir(), + } + defer root.DecRef() + + // Attach the root? + if len(t.Auth.AttachName) == 0 { + cs.InsertFID(t.FID, root) + return &Rattach{} + } + + // We want the same traversal checks to apply on attach, so always + // attach at the root and use the regular walk paths. + names := strings.Split(t.Auth.AttachName, "/") + _, target, _, attr, err := doWalk(cs, root, names) + if err != nil { + return newErr(err) + } + + // Insert the FID. + cs.InsertFID(t.FID, &fidRef{ + file: target, + walkable: attr.Mode.IsDir(), + }) - // Return an empty QID. return &Rattach{} } @@ -678,15 +689,104 @@ func (t *Tflushf) handle(cs *connState) message { return &Rflushf{} } -// handle implements handler.handle. -func (t *Twalkgetattr) handle(cs *connState) message { +// walkOne walks zero or one path elements. +// +// The slice passed as qids is append and returned. +func walkOne(qids []QID, from File, names []string) ([]QID, File, AttrMask, Attr, error) { + if len(names) > 1 { + // We require exactly zero or one elements. + return nil, nil, AttrMask{}, Attr{}, syscall.EINVAL + } + var localQIDs []QID + localQIDs, sf, valid, attr, err := from.WalkGetAttr(names) + if err == syscall.ENOSYS { + localQIDs, sf, err = from.Walk(names) + if err != nil { + // No way to walk this element. + return nil, nil, AttrMask{}, Attr{}, err + } + // Need a manual getattr. + _, valid, attr, err = sf.GetAttr(AttrMaskAll()) + if err != nil { + // Don't leak the file. + sf.Close() + } + } + if err != nil { + // Error walking, don't return anything. + return nil, nil, AttrMask{}, Attr{}, err + } + if len(localQIDs) != 1 { + // Expected a single QID. + sf.Close() + return nil, nil, AttrMask{}, Attr{}, syscall.EINVAL + } + return append(qids, localQIDs...), sf, valid, attr, nil +} + +// doWalk walks from a given fidRef. +// +// This enforces that all intermediate nodes are walkable (directories). +func doWalk(cs *connState, ref *fidRef, names []string) (qids []QID, sf File, valid AttrMask, attr Attr, err error) { // Check the names. - for _, name := range t.Names { + for _, name := range names { if !isSafeName(name) { - return newErr(syscall.EINVAL) + err = syscall.EINVAL + return + } + } + + // Has it been opened already? + if _, opened := ref.OpenFlags(); opened { + err = syscall.EBUSY + return + } + + // Is this an empty list? Handle specially. We don't actually need to + // validate anything since this is always permitted. + if len(names) == 0 { + return walkOne(nil, ref.file, nil) + } + + // Is it walkable? + if !ref.walkable { + err = syscall.EINVAL + return + } + + from := ref.file // Start at the passed ref. + + // Do the walk, one element at a time. + for i := 0; i < len(names); i++ { + qids, sf, valid, attr, err = walkOne(qids, from, names[i:i+1]) + + // Close the intermediate file. Note that we don't close the + // first file because in that case we are walking from the + // existing reference. + if i > 0 { + from.Close() + } + from = sf // Use the new file. + + // Was there an error walking? + if err != nil { + return nil, nil, AttrMask{}, Attr{}, err + } + + // We won't allow beyond past symlinks; stop here if this isn't + // a proper directory and we have additional paths to walk. + if !valid.Mode || (!attr.Mode.IsDir() && i < len(names)-1) { + from.Close() // Not using the file object. + return nil, nil, AttrMask{}, Attr{}, syscall.EINVAL } } + // Success. + return qids, sf, valid, attr, nil +} + +// handle implements handler.handle. +func (t *Twalk) handle(cs *connState) message { // Lookup the FID. ref, ok := cs.LookupFID(t.FID) if !ok { @@ -694,26 +794,41 @@ func (t *Twalkgetattr) handle(cs *connState) message { } defer ref.DecRef() - // Has it been opened already? - if _, opened := ref.OpenFlags(); opened { - return newErr(syscall.EBUSY) + // Do the walk. + qids, sf, _, attr, err := doWalk(cs, ref, t.Names) + if err != nil { + return newErr(err) } - // Do the walk. - qids, sf, valid, attr, err := ref.file.WalkGetAttr(t.Names) - if err == syscall.ENOSYS { - qids, sf, err = ref.file.Walk(t.Names) - if err != nil { - return newErr(err) - } - _, valid, attr, err = sf.GetAttr(AttrMaskAll()) + // Install the new FID. + cs.InsertFID(t.NewFID, &fidRef{ + file: sf, + walkable: attr.Mode.IsDir(), + }) + + return &Rwalk{QIDs: qids} +} + +// handle implements handler.handle. +func (t *Twalkgetattr) handle(cs *connState) message { + // Lookup the FID. + ref, ok := cs.LookupFID(t.FID) + if !ok { + return newErr(syscall.EBADF) } + defer ref.DecRef() + + // Do the walk. + qids, sf, valid, attr, err := doWalk(cs, ref, t.Names) if err != nil { return newErr(err) } // Install the new FID. - cs.InsertFID(t.NewFID, &fidRef{file: sf}) + cs.InsertFID(t.NewFID, &fidRef{ + file: sf, + walkable: attr.Mode.IsDir(), + }) return &Rwalkgetattr{QIDs: qids, Valid: valid, Attr: attr} } |