xref: /qemu/hw/9pfs/9p-local.c (revision 6f569084277dc7ae351141cfa6ad3649e92a1390)
19f107513SAnthony Liguori /*
2f00d4f59SWei Liu  * 9p Posix callback
39f107513SAnthony Liguori  *
49f107513SAnthony Liguori  * Copyright IBM, Corp. 2010
59f107513SAnthony Liguori  *
69f107513SAnthony Liguori  * Authors:
79f107513SAnthony Liguori  *  Anthony Liguori   <aliguori@us.ibm.com>
89f107513SAnthony Liguori  *
99f107513SAnthony Liguori  * This work is licensed under the terms of the GNU GPL, version 2.  See
109f107513SAnthony Liguori  * the COPYING file in the top-level directory.
119f107513SAnthony Liguori  */
12873c3213SStefan Weil 
13*6f569084SChristian Schoenebeck /*
14*6f569084SChristian Schoenebeck  * Not so fast! You might want to read the 9p developer docs first:
15*6f569084SChristian Schoenebeck  * https://wiki.qemu.org/Documentation/9p
16*6f569084SChristian Schoenebeck  */
17*6f569084SChristian Schoenebeck 
18fbc04127SPeter Maydell #include "qemu/osdep.h"
19ebe74f8bSWei Liu #include "9p.h"
20996a0d76SGreg Kurz #include "9p-local.h"
21267ae092SWei Liu #include "9p-xattr.h"
220e35a378SGreg Kurz #include "9p-util.h"
2369b15212SStefan Weil #include "fsdev/qemu-fsdev.h"   /* local_ops */
24c494dd6fSAnthony Liguori #include <arpa/inet.h>
25131dcb25SAnthony Liguori #include <pwd.h>
26131dcb25SAnthony Liguori #include <grp.h>
27c494dd6fSAnthony Liguori #include <sys/socket.h>
28c494dd6fSAnthony Liguori #include <sys/un.h>
291de7afc9SPaolo Bonzini #include "qemu/xattr.h"
30e688df6bSMarkus Armbruster #include "qapi/error.h"
31f348b6d1SVeronia Bahaa #include "qemu/cutils.h"
3263325b18SGreg Kurz #include "qemu/error-report.h"
33922a01a0SMarkus Armbruster #include "qemu/option.h"
342c30dd74SAneesh Kumar K.V #include <libgen.h>
35e06a765eSHarsh Prateek Bora #include <linux/fs.h>
36e06a765eSHarsh Prateek Bora #ifdef CONFIG_LINUX_MAGIC_H
37e06a765eSHarsh Prateek Bora #include <linux/magic.h>
38e06a765eSHarsh Prateek Bora #endif
39e06a765eSHarsh Prateek Bora #include <sys/ioctl.h>
40e06a765eSHarsh Prateek Bora 
41e06a765eSHarsh Prateek Bora #ifndef XFS_SUPER_MAGIC
42e06a765eSHarsh Prateek Bora #define XFS_SUPER_MAGIC  0x58465342
43e06a765eSHarsh Prateek Bora #endif
44e06a765eSHarsh Prateek Bora #ifndef EXT2_SUPER_MAGIC
45e06a765eSHarsh Prateek Bora #define EXT2_SUPER_MAGIC 0xEF53
46e06a765eSHarsh Prateek Bora #endif
47e06a765eSHarsh Prateek Bora #ifndef REISERFS_SUPER_MAGIC
48e06a765eSHarsh Prateek Bora #define REISERFS_SUPER_MAGIC 0x52654973
49e06a765eSHarsh Prateek Bora #endif
50e06a765eSHarsh Prateek Bora #ifndef BTRFS_SUPER_MAGIC
51e06a765eSHarsh Prateek Bora #define BTRFS_SUPER_MAGIC 0x9123683E
52e06a765eSHarsh Prateek Bora #endif
53131dcb25SAnthony Liguori 
540e35a378SGreg Kurz typedef struct {
550e35a378SGreg Kurz     int mountfd;
560e35a378SGreg Kurz } LocalData;
570e35a378SGreg Kurz 
58996a0d76SGreg Kurz int local_open_nofollow(FsContext *fs_ctx, const char *path, int flags,
59996a0d76SGreg Kurz                         mode_t mode)
60996a0d76SGreg Kurz {
61996a0d76SGreg Kurz     LocalData *data = fs_ctx->private;
623dbcf273SGreg Kurz     int fd = data->mountfd;
63996a0d76SGreg Kurz 
643dbcf273SGreg Kurz     while (*path && fd != -1) {
653dbcf273SGreg Kurz         const char *c;
663dbcf273SGreg Kurz         int next_fd;
673dbcf273SGreg Kurz         char *head;
683dbcf273SGreg Kurz 
693dbcf273SGreg Kurz         /* Only relative paths without consecutive slashes */
703dbcf273SGreg Kurz         assert(*path != '/');
713dbcf273SGreg Kurz 
723dbcf273SGreg Kurz         head = g_strdup(path);
735c99fa37SKeno Fischer         c = qemu_strchrnul(path, '/');
743dbcf273SGreg Kurz         if (*c) {
753dbcf273SGreg Kurz             /* Intermediate path element */
763dbcf273SGreg Kurz             head[c - path] = 0;
773dbcf273SGreg Kurz             path = c + 1;
783dbcf273SGreg Kurz             next_fd = openat_dir(fd, head);
793dbcf273SGreg Kurz         } else {
803dbcf273SGreg Kurz             /* Rightmost path element */
813dbcf273SGreg Kurz             next_fd = openat_file(fd, head, flags, mode);
823dbcf273SGreg Kurz             path = c;
833dbcf273SGreg Kurz         }
843dbcf273SGreg Kurz         g_free(head);
853dbcf273SGreg Kurz         if (fd != data->mountfd) {
863dbcf273SGreg Kurz             close_preserve_errno(fd);
873dbcf273SGreg Kurz         }
883dbcf273SGreg Kurz         fd = next_fd;
89996a0d76SGreg Kurz     }
90996a0d76SGreg Kurz 
913dbcf273SGreg Kurz     assert(fd != data->mountfd);
923dbcf273SGreg Kurz     return fd;
93996a0d76SGreg Kurz }
94996a0d76SGreg Kurz 
95996a0d76SGreg Kurz int local_opendir_nofollow(FsContext *fs_ctx, const char *path)
96996a0d76SGreg Kurz {
97996a0d76SGreg Kurz     return local_open_nofollow(fs_ctx, path, O_DIRECTORY | O_RDONLY, 0);
98996a0d76SGreg Kurz }
99996a0d76SGreg Kurz 
10099f2cf4bSGreg Kurz static void renameat_preserve_errno(int odirfd, const char *opath, int ndirfd,
10199f2cf4bSGreg Kurz                                     const char *npath)
10299f2cf4bSGreg Kurz {
10399f2cf4bSGreg Kurz     int serrno = errno;
10499f2cf4bSGreg Kurz     renameat(odirfd, opath, ndirfd, npath);
10599f2cf4bSGreg Kurz     errno = serrno;
10699f2cf4bSGreg Kurz }
10799f2cf4bSGreg Kurz 
108ad0b46e6SGreg Kurz static void unlinkat_preserve_errno(int dirfd, const char *path, int flags)
109ad0b46e6SGreg Kurz {
110ad0b46e6SGreg Kurz     int serrno = errno;
111ad0b46e6SGreg Kurz     unlinkat(dirfd, path, flags);
112ad0b46e6SGreg Kurz     errno = serrno;
113ad0b46e6SGreg Kurz }
114ad0b46e6SGreg Kurz 
1152c30dd74SAneesh Kumar K.V #define VIRTFS_META_DIR ".virtfs_metadata"
11681ffbf5aSGreg Kurz #define VIRTFS_META_ROOT_FILE VIRTFS_META_DIR "_root"
1172c30dd74SAneesh Kumar K.V 
118f9aef99bSGreg Kurz static FILE *local_fopenat(int dirfd, const char *name, const char *mode)
1190ceb092eSAneesh Kumar K.V {
1200ceb092eSAneesh Kumar K.V     int fd, o_mode = 0;
1210ceb092eSAneesh Kumar K.V     FILE *fp;
122f9aef99bSGreg Kurz     int flags;
1230ceb092eSAneesh Kumar K.V     /*
1240ceb092eSAneesh Kumar K.V      * only supports two modes
1250ceb092eSAneesh Kumar K.V      */
1260ceb092eSAneesh Kumar K.V     if (mode[0] == 'r') {
127f9aef99bSGreg Kurz         flags = O_RDONLY;
1280ceb092eSAneesh Kumar K.V     } else if (mode[0] == 'w') {
129f9aef99bSGreg Kurz         flags = O_WRONLY | O_TRUNC | O_CREAT;
1300ceb092eSAneesh Kumar K.V         o_mode = S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH;
1310ceb092eSAneesh Kumar K.V     } else {
1320ceb092eSAneesh Kumar K.V         return NULL;
1330ceb092eSAneesh Kumar K.V     }
134f9aef99bSGreg Kurz     fd = openat_file(dirfd, name, flags, o_mode);
1350ceb092eSAneesh Kumar K.V     if (fd == -1) {
1360ceb092eSAneesh Kumar K.V         return NULL;
1370ceb092eSAneesh Kumar K.V     }
1380ceb092eSAneesh Kumar K.V     fp = fdopen(fd, mode);
1390ceb092eSAneesh Kumar K.V     if (!fp) {
1400ceb092eSAneesh Kumar K.V         close(fd);
1410ceb092eSAneesh Kumar K.V     }
1420ceb092eSAneesh Kumar K.V     return fp;
1430ceb092eSAneesh Kumar K.V }
1440ceb092eSAneesh Kumar K.V 
1452c30dd74SAneesh Kumar K.V #define ATTR_MAX 100
146f9aef99bSGreg Kurz static void local_mapped_file_attr(int dirfd, const char *name,
1472c30dd74SAneesh Kumar K.V                                    struct stat *stbuf)
1482c30dd74SAneesh Kumar K.V {
1492c30dd74SAneesh Kumar K.V     FILE *fp;
1502c30dd74SAneesh Kumar K.V     char buf[ATTR_MAX];
151f9aef99bSGreg Kurz     int map_dirfd;
1522c30dd74SAneesh Kumar K.V 
15381ffbf5aSGreg Kurz     if (strcmp(name, ".")) {
15499f2cf4bSGreg Kurz         map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR);
155f9aef99bSGreg Kurz         if (map_dirfd == -1) {
156f9aef99bSGreg Kurz             return;
157f9aef99bSGreg Kurz         }
158f9aef99bSGreg Kurz 
159f9aef99bSGreg Kurz         fp = local_fopenat(map_dirfd, name, "r");
160f9aef99bSGreg Kurz         close_preserve_errno(map_dirfd);
16181ffbf5aSGreg Kurz     } else {
16281ffbf5aSGreg Kurz         fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r");
16381ffbf5aSGreg Kurz     }
1642c30dd74SAneesh Kumar K.V     if (!fp) {
1652c30dd74SAneesh Kumar K.V         return;
1662c30dd74SAneesh Kumar K.V     }
1672c30dd74SAneesh Kumar K.V     memset(buf, 0, ATTR_MAX);
1682c30dd74SAneesh Kumar K.V     while (fgets(buf, ATTR_MAX, fp)) {
1692c30dd74SAneesh Kumar K.V         if (!strncmp(buf, "virtfs.uid", 10)) {
1702c30dd74SAneesh Kumar K.V             stbuf->st_uid = atoi(buf + 11);
1712c30dd74SAneesh Kumar K.V         } else if (!strncmp(buf, "virtfs.gid", 10)) {
1722c30dd74SAneesh Kumar K.V             stbuf->st_gid = atoi(buf + 11);
1732c30dd74SAneesh Kumar K.V         } else if (!strncmp(buf, "virtfs.mode", 11)) {
1742c30dd74SAneesh Kumar K.V             stbuf->st_mode = atoi(buf + 12);
1752c30dd74SAneesh Kumar K.V         } else if (!strncmp(buf, "virtfs.rdev", 11)) {
1762c30dd74SAneesh Kumar K.V             stbuf->st_rdev = atoi(buf + 12);
1772c30dd74SAneesh Kumar K.V         }
1782c30dd74SAneesh Kumar K.V         memset(buf, 0, ATTR_MAX);
1792c30dd74SAneesh Kumar K.V     }
1802c30dd74SAneesh Kumar K.V     fclose(fp);
1812c30dd74SAneesh Kumar K.V }
1822c30dd74SAneesh Kumar K.V 
1832289be19SAneesh Kumar K.V static int local_lstat(FsContext *fs_ctx, V9fsPath *fs_path, struct stat *stbuf)
184131dcb25SAnthony Liguori {
185f9aef99bSGreg Kurz     int err = -1;
186f9aef99bSGreg Kurz     char *dirpath = g_path_get_dirname(fs_path->data);
187f9aef99bSGreg Kurz     char *name = g_path_get_basename(fs_path->data);
188f9aef99bSGreg Kurz     int dirfd;
1892289be19SAneesh Kumar K.V 
190f9aef99bSGreg Kurz     dirfd = local_opendir_nofollow(fs_ctx, dirpath);
191f9aef99bSGreg Kurz     if (dirfd == -1) {
192f9aef99bSGreg Kurz         goto out;
193f9aef99bSGreg Kurz     }
194f9aef99bSGreg Kurz 
195f9aef99bSGreg Kurz     err = fstatat(dirfd, name, stbuf, AT_SYMLINK_NOFOLLOW);
1961237ad76SVenkateswararao Jujjuri (JV)     if (err) {
1974fa4ce71SChen Gang         goto err_out;
1981237ad76SVenkateswararao Jujjuri (JV)     }
199b97400caSAneesh Kumar K.V     if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
2001237ad76SVenkateswararao Jujjuri (JV)         /* Actual credentials are part of extended attrs */
2011237ad76SVenkateswararao Jujjuri (JV)         uid_t tmp_uid;
2021237ad76SVenkateswararao Jujjuri (JV)         gid_t tmp_gid;
2031237ad76SVenkateswararao Jujjuri (JV)         mode_t tmp_mode;
2041237ad76SVenkateswararao Jujjuri (JV)         dev_t tmp_dev;
205f9aef99bSGreg Kurz 
206f9aef99bSGreg Kurz         if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.uid", &tmp_uid,
207f9aef99bSGreg Kurz                                  sizeof(uid_t)) > 0) {
208f8ad4a89SAneesh Kumar K.V             stbuf->st_uid = le32_to_cpu(tmp_uid);
2091237ad76SVenkateswararao Jujjuri (JV)         }
210f9aef99bSGreg Kurz         if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.gid", &tmp_gid,
211f9aef99bSGreg Kurz                                  sizeof(gid_t)) > 0) {
212f8ad4a89SAneesh Kumar K.V             stbuf->st_gid = le32_to_cpu(tmp_gid);
2131237ad76SVenkateswararao Jujjuri (JV)         }
214f9aef99bSGreg Kurz         if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.mode", &tmp_mode,
215f9aef99bSGreg Kurz                                  sizeof(mode_t)) > 0) {
216f8ad4a89SAneesh Kumar K.V             stbuf->st_mode = le32_to_cpu(tmp_mode);
2171237ad76SVenkateswararao Jujjuri (JV)         }
218f9aef99bSGreg Kurz         if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.rdev", &tmp_dev,
219f9aef99bSGreg Kurz                                  sizeof(dev_t)) > 0) {
220f8ad4a89SAneesh Kumar K.V             stbuf->st_rdev = le64_to_cpu(tmp_dev);
2211237ad76SVenkateswararao Jujjuri (JV)         }
2222c30dd74SAneesh Kumar K.V     } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
223f9aef99bSGreg Kurz         local_mapped_file_attr(dirfd, name, stbuf);
2241237ad76SVenkateswararao Jujjuri (JV)     }
2254fa4ce71SChen Gang 
2264fa4ce71SChen Gang err_out:
227f9aef99bSGreg Kurz     close_preserve_errno(dirfd);
228f9aef99bSGreg Kurz out:
229f9aef99bSGreg Kurz     g_free(name);
230f9aef99bSGreg Kurz     g_free(dirpath);
2311237ad76SVenkateswararao Jujjuri (JV)     return err;
232131dcb25SAnthony Liguori }
233131dcb25SAnthony Liguori 
234e3187a45SGreg Kurz static int local_set_mapped_file_attrat(int dirfd, const char *name,
235e3187a45SGreg Kurz                                         FsCred *credp)
2362c30dd74SAneesh Kumar K.V {
2372c30dd74SAneesh Kumar K.V     FILE *fp;
238e3187a45SGreg Kurz     int ret;
2392c30dd74SAneesh Kumar K.V     char buf[ATTR_MAX];
2402c30dd74SAneesh Kumar K.V     int uid = -1, gid = -1, mode = -1, rdev = -1;
24181ffbf5aSGreg Kurz     int map_dirfd = -1, map_fd;
24281ffbf5aSGreg Kurz     bool is_root = !strcmp(name, ".");
2432c30dd74SAneesh Kumar K.V 
24481ffbf5aSGreg Kurz     if (is_root) {
24581ffbf5aSGreg Kurz         fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r");
24681ffbf5aSGreg Kurz         if (!fp) {
24781ffbf5aSGreg Kurz             if (errno == ENOENT) {
24881ffbf5aSGreg Kurz                 goto update_map_file;
24981ffbf5aSGreg Kurz             } else {
25081ffbf5aSGreg Kurz                 return -1;
25181ffbf5aSGreg Kurz             }
25281ffbf5aSGreg Kurz         }
25381ffbf5aSGreg Kurz     } else {
254e3187a45SGreg Kurz         ret = mkdirat(dirfd, VIRTFS_META_DIR, 0700);
255e3187a45SGreg Kurz         if (ret < 0 && errno != EEXIST) {
256e3187a45SGreg Kurz             return -1;
257e3187a45SGreg Kurz         }
258e3187a45SGreg Kurz 
259e3187a45SGreg Kurz         map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR);
260e3187a45SGreg Kurz         if (map_dirfd == -1) {
261e3187a45SGreg Kurz             return -1;
262e3187a45SGreg Kurz         }
263e3187a45SGreg Kurz 
264e3187a45SGreg Kurz         fp = local_fopenat(map_dirfd, name, "r");
2652c30dd74SAneesh Kumar K.V         if (!fp) {
266e3187a45SGreg Kurz             if (errno == ENOENT) {
267e3187a45SGreg Kurz                 goto update_map_file;
268e3187a45SGreg Kurz             } else {
269e3187a45SGreg Kurz                 close_preserve_errno(map_dirfd);
270e3187a45SGreg Kurz                 return -1;
271e3187a45SGreg Kurz             }
2722c30dd74SAneesh Kumar K.V         }
27381ffbf5aSGreg Kurz     }
2742c30dd74SAneesh Kumar K.V     memset(buf, 0, ATTR_MAX);
2752c30dd74SAneesh Kumar K.V     while (fgets(buf, ATTR_MAX, fp)) {
2762c30dd74SAneesh Kumar K.V         if (!strncmp(buf, "virtfs.uid", 10)) {
2772c30dd74SAneesh Kumar K.V             uid = atoi(buf + 11);
2782c30dd74SAneesh Kumar K.V         } else if (!strncmp(buf, "virtfs.gid", 10)) {
2792c30dd74SAneesh Kumar K.V             gid = atoi(buf + 11);
2802c30dd74SAneesh Kumar K.V         } else if (!strncmp(buf, "virtfs.mode", 11)) {
2812c30dd74SAneesh Kumar K.V             mode = atoi(buf + 12);
2822c30dd74SAneesh Kumar K.V         } else if (!strncmp(buf, "virtfs.rdev", 11)) {
2832c30dd74SAneesh Kumar K.V             rdev = atoi(buf + 12);
2842c30dd74SAneesh Kumar K.V         }
2852c30dd74SAneesh Kumar K.V         memset(buf, 0, ATTR_MAX);
2862c30dd74SAneesh Kumar K.V     }
2872c30dd74SAneesh Kumar K.V     fclose(fp);
2882c30dd74SAneesh Kumar K.V 
2892c30dd74SAneesh Kumar K.V update_map_file:
29081ffbf5aSGreg Kurz     if (is_root) {
29181ffbf5aSGreg Kurz         fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "w");
29281ffbf5aSGreg Kurz     } else {
293e3187a45SGreg Kurz         fp = local_fopenat(map_dirfd, name, "w");
29481ffbf5aSGreg Kurz         /* We can't go this far with map_dirfd not being a valid file descriptor
29581ffbf5aSGreg Kurz          * but some versions of gcc aren't smart enough to see it.
29681ffbf5aSGreg Kurz          */
29781ffbf5aSGreg Kurz         if (map_dirfd != -1) {
298e3187a45SGreg Kurz             close_preserve_errno(map_dirfd);
29981ffbf5aSGreg Kurz         }
30081ffbf5aSGreg Kurz     }
3012c30dd74SAneesh Kumar K.V     if (!fp) {
302e3187a45SGreg Kurz         return -1;
3032c30dd74SAneesh Kumar K.V     }
3042c30dd74SAneesh Kumar K.V 
30581ffbf5aSGreg Kurz     map_fd = fileno(fp);
30681ffbf5aSGreg Kurz     assert(map_fd != -1);
30781ffbf5aSGreg Kurz     ret = fchmod(map_fd, 0600);
30881ffbf5aSGreg Kurz     assert(ret == 0);
30981ffbf5aSGreg Kurz 
3102c30dd74SAneesh Kumar K.V     if (credp->fc_uid != -1) {
3112c30dd74SAneesh Kumar K.V         uid = credp->fc_uid;
3122c30dd74SAneesh Kumar K.V     }
3132c30dd74SAneesh Kumar K.V     if (credp->fc_gid != -1) {
3142c30dd74SAneesh Kumar K.V         gid = credp->fc_gid;
3152c30dd74SAneesh Kumar K.V     }
316230f1b31SKeno Fischer     if (credp->fc_mode != (mode_t)-1) {
3172c30dd74SAneesh Kumar K.V         mode = credp->fc_mode;
3182c30dd74SAneesh Kumar K.V     }
3192c30dd74SAneesh Kumar K.V     if (credp->fc_rdev != -1) {
3202c30dd74SAneesh Kumar K.V         rdev = credp->fc_rdev;
3212c30dd74SAneesh Kumar K.V     }
3222c30dd74SAneesh Kumar K.V 
3232c30dd74SAneesh Kumar K.V     if (uid != -1) {
3242c30dd74SAneesh Kumar K.V         fprintf(fp, "virtfs.uid=%d\n", uid);
3252c30dd74SAneesh Kumar K.V     }
3262c30dd74SAneesh Kumar K.V     if (gid != -1) {
3272c30dd74SAneesh Kumar K.V         fprintf(fp, "virtfs.gid=%d\n", gid);
3282c30dd74SAneesh Kumar K.V     }
3292c30dd74SAneesh Kumar K.V     if (mode != -1) {
3302c30dd74SAneesh Kumar K.V         fprintf(fp, "virtfs.mode=%d\n", mode);
3312c30dd74SAneesh Kumar K.V     }
3322c30dd74SAneesh Kumar K.V     if (rdev != -1) {
3332c30dd74SAneesh Kumar K.V         fprintf(fp, "virtfs.rdev=%d\n", rdev);
3342c30dd74SAneesh Kumar K.V     }
3352c30dd74SAneesh Kumar K.V     fclose(fp);
3362c30dd74SAneesh Kumar K.V 
337e3187a45SGreg Kurz     return 0;
338e3187a45SGreg Kurz }
339e3187a45SGreg Kurz 
340e3187a45SGreg Kurz static int fchmodat_nofollow(int dirfd, const char *name, mode_t mode)
341e3187a45SGreg Kurz {
3424751fd53SGreg Kurz     struct stat stbuf;
343e3187a45SGreg Kurz     int fd, ret;
344e3187a45SGreg Kurz 
345e3187a45SGreg Kurz     /* FIXME: this should be handled with fchmodat(AT_SYMLINK_NOFOLLOW).
3464751fd53SGreg Kurz      * Unfortunately, the linux kernel doesn't implement it yet.
347e3187a45SGreg Kurz      */
3484751fd53SGreg Kurz 
3494751fd53SGreg Kurz      /* First, we clear non-racing symlinks out of the way. */
3504751fd53SGreg Kurz     if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW)) {
3514751fd53SGreg Kurz         return -1;
3524751fd53SGreg Kurz     }
3534751fd53SGreg Kurz     if (S_ISLNK(stbuf.st_mode)) {
3544751fd53SGreg Kurz         errno = ELOOP;
3554751fd53SGreg Kurz         return -1;
3564751fd53SGreg Kurz     }
3574751fd53SGreg Kurz 
358aa5e85a1SGreg Kurz     fd = openat_file(dirfd, name, O_RDONLY | O_PATH_9P_UTIL | O_NOFOLLOW, 0);
3594751fd53SGreg Kurz #if O_PATH_9P_UTIL == 0
360aa5e85a1SGreg Kurz     /* Fallback for systems that don't support O_PATH: we depend on the file
361aa5e85a1SGreg Kurz      * being readable or writable.
362aa5e85a1SGreg Kurz      */
363e3187a45SGreg Kurz     if (fd == -1) {
364e3187a45SGreg Kurz         /* In case the file is writable-only and isn't a directory. */
365e3187a45SGreg Kurz         if (errno == EACCES) {
366e3187a45SGreg Kurz             fd = openat_file(dirfd, name, O_WRONLY, 0);
367e3187a45SGreg Kurz         }
368e3187a45SGreg Kurz         if (fd == -1 && errno == EISDIR) {
369e3187a45SGreg Kurz             errno = EACCES;
370e3187a45SGreg Kurz         }
371e3187a45SGreg Kurz     }
372e3187a45SGreg Kurz     if (fd == -1) {
373e3187a45SGreg Kurz         return -1;
374e3187a45SGreg Kurz     }
375e3187a45SGreg Kurz     ret = fchmod(fd, mode);
3764751fd53SGreg Kurz #else
377aa5e85a1SGreg Kurz     /* Access modes are ignored when O_PATH is supported. If name is a symbolic
378aa5e85a1SGreg Kurz      * link, O_PATH | O_NOFOLLOW causes openat(2) to return a file descriptor
379aa5e85a1SGreg Kurz      * referring to the symbolic link.
380aa5e85a1SGreg Kurz      */
3814751fd53SGreg Kurz     if (fd == -1) {
3824751fd53SGreg Kurz         return -1;
3834751fd53SGreg Kurz     }
3844751fd53SGreg Kurz 
3854751fd53SGreg Kurz     /* Now we handle racing symlinks. */
3864751fd53SGreg Kurz     ret = fstat(fd, &stbuf);
3874751fd53SGreg Kurz     if (!ret) {
3884751fd53SGreg Kurz         if (S_ISLNK(stbuf.st_mode)) {
3894751fd53SGreg Kurz             errno = ELOOP;
3904751fd53SGreg Kurz             ret = -1;
3914751fd53SGreg Kurz         } else {
3924751fd53SGreg Kurz             char *proc_path = g_strdup_printf("/proc/self/fd/%d", fd);
3934751fd53SGreg Kurz             ret = chmod(proc_path, mode);
3944751fd53SGreg Kurz             g_free(proc_path);
3954751fd53SGreg Kurz         }
3964751fd53SGreg Kurz     }
3974751fd53SGreg Kurz #endif
398e3187a45SGreg Kurz     close_preserve_errno(fd);
3992c30dd74SAneesh Kumar K.V     return ret;
4002c30dd74SAneesh Kumar K.V }
4012c30dd74SAneesh Kumar K.V 
402e3187a45SGreg Kurz static int local_set_xattrat(int dirfd, const char *path, FsCred *credp)
403131dcb25SAnthony Liguori {
404758e8e38SVenkateswararao Jujjuri (JV)     int err;
4052289be19SAneesh Kumar K.V 
406758e8e38SVenkateswararao Jujjuri (JV)     if (credp->fc_uid != -1) {
407f8ad4a89SAneesh Kumar K.V         uint32_t tmp_uid = cpu_to_le32(credp->fc_uid);
408e3187a45SGreg Kurz         err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.uid", &tmp_uid,
409e3187a45SGreg Kurz                                    sizeof(uid_t), 0);
410758e8e38SVenkateswararao Jujjuri (JV)         if (err) {
411758e8e38SVenkateswararao Jujjuri (JV)             return err;
412131dcb25SAnthony Liguori         }
413131dcb25SAnthony Liguori     }
414758e8e38SVenkateswararao Jujjuri (JV)     if (credp->fc_gid != -1) {
415f8ad4a89SAneesh Kumar K.V         uint32_t tmp_gid = cpu_to_le32(credp->fc_gid);
416e3187a45SGreg Kurz         err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.gid", &tmp_gid,
417e3187a45SGreg Kurz                                    sizeof(gid_t), 0);
418758e8e38SVenkateswararao Jujjuri (JV)         if (err) {
419758e8e38SVenkateswararao Jujjuri (JV)             return err;
420131dcb25SAnthony Liguori         }
421131dcb25SAnthony Liguori     }
422230f1b31SKeno Fischer     if (credp->fc_mode != (mode_t)-1) {
423f8ad4a89SAneesh Kumar K.V         uint32_t tmp_mode = cpu_to_le32(credp->fc_mode);
424e3187a45SGreg Kurz         err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.mode", &tmp_mode,
425e3187a45SGreg Kurz                                    sizeof(mode_t), 0);
426758e8e38SVenkateswararao Jujjuri (JV)         if (err) {
427758e8e38SVenkateswararao Jujjuri (JV)             return err;
428131dcb25SAnthony Liguori         }
429131dcb25SAnthony Liguori     }
430758e8e38SVenkateswararao Jujjuri (JV)     if (credp->fc_rdev != -1) {
431f8ad4a89SAneesh Kumar K.V         uint64_t tmp_rdev = cpu_to_le64(credp->fc_rdev);
432e3187a45SGreg Kurz         err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.rdev", &tmp_rdev,
433e3187a45SGreg Kurz                                    sizeof(dev_t), 0);
434758e8e38SVenkateswararao Jujjuri (JV)         if (err) {
435758e8e38SVenkateswararao Jujjuri (JV)             return err;
436131dcb25SAnthony Liguori         }
437758e8e38SVenkateswararao Jujjuri (JV)     }
438131dcb25SAnthony Liguori     return 0;
439131dcb25SAnthony Liguori }
440131dcb25SAnthony Liguori 
441d815e721SGreg Kurz static int local_set_cred_passthrough(FsContext *fs_ctx, int dirfd,
442d815e721SGreg Kurz                                       const char *name, FsCred *credp)
4434750a96fSVenkateswararao Jujjuri (JV) {
444d815e721SGreg Kurz     if (fchownat(dirfd, name, credp->fc_uid, credp->fc_gid,
445b314f6a0SGreg Kurz                  AT_SYMLINK_NOFOLLOW) < 0) {
44612848bfcSAneesh Kumar K.V         /*
44712848bfcSAneesh Kumar K.V          * If we fail to change ownership and if we are
44812848bfcSAneesh Kumar K.V          * using security model none. Ignore the error
44912848bfcSAneesh Kumar K.V          */
450b97400caSAneesh Kumar K.V         if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) {
4514fa4ce71SChen Gang             return -1;
4524750a96fSVenkateswararao Jujjuri (JV)         }
453d815e721SGreg Kurz     }
454d815e721SGreg Kurz 
455d815e721SGreg Kurz     return fchmodat_nofollow(dirfd, name, credp->fc_mode & 07777);
456d815e721SGreg Kurz }
4574750a96fSVenkateswararao Jujjuri (JV) 
4582289be19SAneesh Kumar K.V static ssize_t local_readlink(FsContext *fs_ctx, V9fsPath *fs_path,
459131dcb25SAnthony Liguori                               char *buf, size_t bufsz)
460131dcb25SAnthony Liguori {
461879c2813SVenkateswararao Jujjuri (JV)     ssize_t tsize = -1;
4622289be19SAneesh Kumar K.V 
4632c30dd74SAneesh Kumar K.V     if ((fs_ctx->export_flags & V9FS_SM_MAPPED) ||
4642c30dd74SAneesh Kumar K.V         (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE)) {
465879c2813SVenkateswararao Jujjuri (JV)         int fd;
466bec1e954SGreg Kurz 
467bec1e954SGreg Kurz         fd = local_open_nofollow(fs_ctx, fs_path->data, O_RDONLY, 0);
468879c2813SVenkateswararao Jujjuri (JV)         if (fd == -1) {
469879c2813SVenkateswararao Jujjuri (JV)             return -1;
470879c2813SVenkateswararao Jujjuri (JV)         }
471879c2813SVenkateswararao Jujjuri (JV)         do {
472879c2813SVenkateswararao Jujjuri (JV)             tsize = read(fd, (void *)buf, bufsz);
473879c2813SVenkateswararao Jujjuri (JV)         } while (tsize == -1 && errno == EINTR);
474bec1e954SGreg Kurz         close_preserve_errno(fd);
475b97400caSAneesh Kumar K.V     } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) ||
476b97400caSAneesh Kumar K.V                (fs_ctx->export_flags & V9FS_SM_NONE)) {
477bec1e954SGreg Kurz         char *dirpath = g_path_get_dirname(fs_path->data);
478bec1e954SGreg Kurz         char *name = g_path_get_basename(fs_path->data);
479bec1e954SGreg Kurz         int dirfd;
480bec1e954SGreg Kurz 
481bec1e954SGreg Kurz         dirfd = local_opendir_nofollow(fs_ctx, dirpath);
482bec1e954SGreg Kurz         if (dirfd == -1) {
483bec1e954SGreg Kurz             goto out;
484bec1e954SGreg Kurz         }
485bec1e954SGreg Kurz 
486bec1e954SGreg Kurz         tsize = readlinkat(dirfd, name, buf, bufsz);
487bec1e954SGreg Kurz         close_preserve_errno(dirfd);
488bec1e954SGreg Kurz     out:
489bec1e954SGreg Kurz         g_free(name);
490bec1e954SGreg Kurz         g_free(dirpath);
491879c2813SVenkateswararao Jujjuri (JV)     }
492879c2813SVenkateswararao Jujjuri (JV)     return tsize;
493131dcb25SAnthony Liguori }
494131dcb25SAnthony Liguori 
495cc720ddbSAneesh Kumar K.V static int local_close(FsContext *ctx, V9fsFidOpenState *fs)
496131dcb25SAnthony Liguori {
497cc720ddbSAneesh Kumar K.V     return close(fs->fd);
498131dcb25SAnthony Liguori }
499131dcb25SAnthony Liguori 
500cc720ddbSAneesh Kumar K.V static int local_closedir(FsContext *ctx, V9fsFidOpenState *fs)
501131dcb25SAnthony Liguori {
502f314ea4eSGreg Kurz     return closedir(fs->dir.stream);
503131dcb25SAnthony Liguori }
5049f107513SAnthony Liguori 
505cc720ddbSAneesh Kumar K.V static int local_open(FsContext *ctx, V9fsPath *fs_path,
506cc720ddbSAneesh Kumar K.V                       int flags, V9fsFidOpenState *fs)
507a6568fe2SAnthony Liguori {
50821328e1eSGreg Kurz     int fd;
5092289be19SAneesh Kumar K.V 
510996a0d76SGreg Kurz     fd = local_open_nofollow(ctx, fs_path->data, flags, 0);
51121328e1eSGreg Kurz     if (fd == -1) {
51221328e1eSGreg Kurz         return -1;
51321328e1eSGreg Kurz     }
51421328e1eSGreg Kurz     fs->fd = fd;
515cc720ddbSAneesh Kumar K.V     return fs->fd;
516a6568fe2SAnthony Liguori }
517a6568fe2SAnthony Liguori 
518cc720ddbSAneesh Kumar K.V static int local_opendir(FsContext *ctx,
519cc720ddbSAneesh Kumar K.V                          V9fsPath *fs_path, V9fsFidOpenState *fs)
520a6568fe2SAnthony Liguori {
521996a0d76SGreg Kurz     int dirfd;
52221328e1eSGreg Kurz     DIR *stream;
5232289be19SAneesh Kumar K.V 
524996a0d76SGreg Kurz     dirfd = local_opendir_nofollow(ctx, fs_path->data);
525996a0d76SGreg Kurz     if (dirfd == -1) {
526cc720ddbSAneesh Kumar K.V         return -1;
527cc720ddbSAneesh Kumar K.V     }
528996a0d76SGreg Kurz 
529996a0d76SGreg Kurz     stream = fdopendir(dirfd);
53021328e1eSGreg Kurz     if (!stream) {
531faab207fSGreg Kurz         close(dirfd);
532cc720ddbSAneesh Kumar K.V         return -1;
533cc720ddbSAneesh Kumar K.V     }
53421328e1eSGreg Kurz     fs->dir.stream = stream;
535cc720ddbSAneesh Kumar K.V     return 0;
536a6568fe2SAnthony Liguori }
537a6568fe2SAnthony Liguori 
538cc720ddbSAneesh Kumar K.V static void local_rewinddir(FsContext *ctx, V9fsFidOpenState *fs)
539a9231555SAnthony Liguori {
540f314ea4eSGreg Kurz     rewinddir(fs->dir.stream);
541a9231555SAnthony Liguori }
542a9231555SAnthony Liguori 
543cc720ddbSAneesh Kumar K.V static off_t local_telldir(FsContext *ctx, V9fsFidOpenState *fs)
544a9231555SAnthony Liguori {
545f314ea4eSGreg Kurz     return telldir(fs->dir.stream);
546a9231555SAnthony Liguori }
547a9231555SAnthony Liguori 
5487a95434eSGreg Kurz static bool local_is_mapped_file_metadata(FsContext *fs_ctx, const char *name)
5497a95434eSGreg Kurz {
55081ffbf5aSGreg Kurz     return
55181ffbf5aSGreg Kurz         !strcmp(name, VIRTFS_META_DIR) || !strcmp(name, VIRTFS_META_ROOT_FILE);
5527a95434eSGreg Kurz }
5537a95434eSGreg Kurz 
554635324e8SGreg Kurz static struct dirent *local_readdir(FsContext *ctx, V9fsFidOpenState *fs)
555a9231555SAnthony Liguori {
556635324e8SGreg Kurz     struct dirent *entry;
5572c30dd74SAneesh Kumar K.V 
5582c30dd74SAneesh Kumar K.V again:
559635324e8SGreg Kurz     entry = readdir(fs->dir.stream);
560635324e8SGreg Kurz     if (!entry) {
561635324e8SGreg Kurz         return NULL;
562635324e8SGreg Kurz     }
563635324e8SGreg Kurz 
564840a1bf2SBastian Blank     if (ctx->export_flags & V9FS_SM_MAPPED) {
565840a1bf2SBastian Blank         entry->d_type = DT_UNKNOWN;
566840a1bf2SBastian Blank     } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) {
5677a95434eSGreg Kurz         if (local_is_mapped_file_metadata(ctx, entry->d_name)) {
56881ffbf5aSGreg Kurz             /* skip the meta data */
5692c30dd74SAneesh Kumar K.V             goto again;
5702c30dd74SAneesh Kumar K.V         }
571840a1bf2SBastian Blank         entry->d_type = DT_UNKNOWN;
5722c30dd74SAneesh Kumar K.V     }
573635324e8SGreg Kurz 
574635324e8SGreg Kurz     return entry;
575a9231555SAnthony Liguori }
576a9231555SAnthony Liguori 
577cc720ddbSAneesh Kumar K.V static void local_seekdir(FsContext *ctx, V9fsFidOpenState *fs, off_t off)
578a9231555SAnthony Liguori {
579f314ea4eSGreg Kurz     seekdir(fs->dir.stream, off);
580a9231555SAnthony Liguori }
581a9231555SAnthony Liguori 
582cc720ddbSAneesh Kumar K.V static ssize_t local_preadv(FsContext *ctx, V9fsFidOpenState *fs,
583cc720ddbSAneesh Kumar K.V                             const struct iovec *iov,
58456d15a53SSanchit Garg                             int iovcnt, off_t offset)
585a9231555SAnthony Liguori {
58656d15a53SSanchit Garg #ifdef CONFIG_PREADV
587cc720ddbSAneesh Kumar K.V     return preadv(fs->fd, iov, iovcnt, offset);
58856d15a53SSanchit Garg #else
589cc720ddbSAneesh Kumar K.V     int err = lseek(fs->fd, offset, SEEK_SET);
59056d15a53SSanchit Garg     if (err == -1) {
59156d15a53SSanchit Garg         return err;
59256d15a53SSanchit Garg     } else {
593cc720ddbSAneesh Kumar K.V         return readv(fs->fd, iov, iovcnt);
594a9231555SAnthony Liguori     }
59556d15a53SSanchit Garg #endif
596a9231555SAnthony Liguori }
597a9231555SAnthony Liguori 
598cc720ddbSAneesh Kumar K.V static ssize_t local_pwritev(FsContext *ctx, V9fsFidOpenState *fs,
599cc720ddbSAneesh Kumar K.V                              const struct iovec *iov,
60056d15a53SSanchit Garg                              int iovcnt, off_t offset)
6018449360cSAnthony Liguori {
6026fe76accSGreg Kurz     ssize_t ret;
60356d15a53SSanchit Garg #ifdef CONFIG_PREADV
604cc720ddbSAneesh Kumar K.V     ret = pwritev(fs->fd, iov, iovcnt, offset);
60556d15a53SSanchit Garg #else
606cc720ddbSAneesh Kumar K.V     int err = lseek(fs->fd, offset, SEEK_SET);
60756d15a53SSanchit Garg     if (err == -1) {
60856d15a53SSanchit Garg         return err;
60956d15a53SSanchit Garg     } else {
610cc720ddbSAneesh Kumar K.V         ret = writev(fs->fd, iov, iovcnt);
6118449360cSAnthony Liguori     }
61256d15a53SSanchit Garg #endif
613d3ab98e6SAneesh Kumar K.V #ifdef CONFIG_SYNC_FILE_RANGE
614d3ab98e6SAneesh Kumar K.V     if (ret > 0 && ctx->export_flags & V9FS_IMMEDIATE_WRITEOUT) {
615d3ab98e6SAneesh Kumar K.V         /*
616d3ab98e6SAneesh Kumar K.V          * Initiate a writeback. This is not a data integrity sync.
617d3ab98e6SAneesh Kumar K.V          * We want to ensure that we don't leave dirty pages in the cache
618d3ab98e6SAneesh Kumar K.V          * after write when writeout=immediate is sepcified.
619d3ab98e6SAneesh Kumar K.V          */
620cc720ddbSAneesh Kumar K.V         sync_file_range(fs->fd, offset, ret,
621d3ab98e6SAneesh Kumar K.V                         SYNC_FILE_RANGE_WAIT_BEFORE | SYNC_FILE_RANGE_WRITE);
622d3ab98e6SAneesh Kumar K.V     }
623d3ab98e6SAneesh Kumar K.V #endif
624d3ab98e6SAneesh Kumar K.V     return ret;
62556d15a53SSanchit Garg }
6268449360cSAnthony Liguori 
6272289be19SAneesh Kumar K.V static int local_chmod(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp)
628c494dd6fSAnthony Liguori {
629e3187a45SGreg Kurz     char *dirpath = g_path_get_dirname(fs_path->data);
630e3187a45SGreg Kurz     char *name = g_path_get_basename(fs_path->data);
6314fa4ce71SChen Gang     int ret = -1;
632e3187a45SGreg Kurz     int dirfd;
633e3187a45SGreg Kurz 
634e3187a45SGreg Kurz     dirfd = local_opendir_nofollow(fs_ctx, dirpath);
635e3187a45SGreg Kurz     if (dirfd == -1) {
636e3187a45SGreg Kurz         goto out;
637e3187a45SGreg Kurz     }
6382289be19SAneesh Kumar K.V 
639b97400caSAneesh Kumar K.V     if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
640e3187a45SGreg Kurz         ret = local_set_xattrat(dirfd, name, credp);
6412c30dd74SAneesh Kumar K.V     } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
642e3187a45SGreg Kurz         ret = local_set_mapped_file_attrat(dirfd, name, credp);
643e3187a45SGreg Kurz     } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH ||
644e3187a45SGreg Kurz                fs_ctx->export_flags & V9FS_SM_NONE) {
645e3187a45SGreg Kurz         ret = fchmodat_nofollow(dirfd, name, credp->fc_mode);
646e95ead32SVenkateswararao Jujjuri (JV)     }
647e3187a45SGreg Kurz     close_preserve_errno(dirfd);
648e3187a45SGreg Kurz 
649e3187a45SGreg Kurz out:
650e3187a45SGreg Kurz     g_free(dirpath);
651e3187a45SGreg Kurz     g_free(name);
6524fa4ce71SChen Gang     return ret;
653c494dd6fSAnthony Liguori }
654c494dd6fSAnthony Liguori 
6552289be19SAneesh Kumar K.V static int local_mknod(FsContext *fs_ctx, V9fsPath *dir_path,
6562289be19SAneesh Kumar K.V                        const char *name, FsCred *credp)
657c494dd6fSAnthony Liguori {
6581c293312SVenkateswararao Jujjuri (JV)     int err = -1;
659d815e721SGreg Kurz     int dirfd;
6601c293312SVenkateswararao Jujjuri (JV) 
6617a95434eSGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE &&
6627a95434eSGreg Kurz         local_is_mapped_file_metadata(fs_ctx, name)) {
6637a95434eSGreg Kurz         errno = EINVAL;
6647a95434eSGreg Kurz         return -1;
6657a95434eSGreg Kurz     }
6667a95434eSGreg Kurz 
667d815e721SGreg Kurz     dirfd = local_opendir_nofollow(fs_ctx, dir_path->data);
668d815e721SGreg Kurz     if (dirfd == -1) {
669d815e721SGreg Kurz         return -1;
670d815e721SGreg Kurz     }
6712289be19SAneesh Kumar K.V 
672d815e721SGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED ||
673d815e721SGreg Kurz         fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
674b96feb2cSTobias Schramm         err = mknodat(dirfd, name, fs_ctx->fmode | S_IFREG, 0);
675d815e721SGreg Kurz         if (err == -1) {
676d815e721SGreg Kurz             goto out;
677d815e721SGreg Kurz         }
678d815e721SGreg Kurz 
679b97400caSAneesh Kumar K.V         if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
680d815e721SGreg Kurz             err = local_set_xattrat(dirfd, name, credp);
681d815e721SGreg Kurz         } else {
682d815e721SGreg Kurz             err = local_set_mapped_file_attrat(dirfd, name, credp);
6831c293312SVenkateswararao Jujjuri (JV)         }
6841c293312SVenkateswararao Jujjuri (JV)         if (err == -1) {
6851c293312SVenkateswararao Jujjuri (JV)             goto err_end;
6861c293312SVenkateswararao Jujjuri (JV)         }
687d815e721SGreg Kurz     } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH ||
688d815e721SGreg Kurz                fs_ctx->export_flags & V9FS_SM_NONE) {
689d815e721SGreg Kurz         err = mknodat(dirfd, name, credp->fc_mode, credp->fc_rdev);
6902c30dd74SAneesh Kumar K.V         if (err == -1) {
6912c30dd74SAneesh Kumar K.V             goto out;
6922c30dd74SAneesh Kumar K.V         }
693d815e721SGreg Kurz         err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp);
6942c30dd74SAneesh Kumar K.V         if (err == -1) {
6951c293312SVenkateswararao Jujjuri (JV)             goto err_end;
6961c293312SVenkateswararao Jujjuri (JV)         }
6971c293312SVenkateswararao Jujjuri (JV)     }
6982289be19SAneesh Kumar K.V     goto out;
6991c293312SVenkateswararao Jujjuri (JV) 
7001c293312SVenkateswararao Jujjuri (JV) err_end:
701d815e721SGreg Kurz     unlinkat_preserve_errno(dirfd, name, 0);
7022289be19SAneesh Kumar K.V out:
703d815e721SGreg Kurz     close_preserve_errno(dirfd);
7041c293312SVenkateswararao Jujjuri (JV)     return err;
705c494dd6fSAnthony Liguori }
706c494dd6fSAnthony Liguori 
7072289be19SAneesh Kumar K.V static int local_mkdir(FsContext *fs_ctx, V9fsPath *dir_path,
7082289be19SAneesh Kumar K.V                        const char *name, FsCred *credp)
709c494dd6fSAnthony Liguori {
71000ec5c37SVenkateswararao Jujjuri (JV)     int err = -1;
7113f3a1699SGreg Kurz     int dirfd;
71200ec5c37SVenkateswararao Jujjuri (JV) 
7137a95434eSGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE &&
7147a95434eSGreg Kurz         local_is_mapped_file_metadata(fs_ctx, name)) {
7157a95434eSGreg Kurz         errno = EINVAL;
7167a95434eSGreg Kurz         return -1;
7177a95434eSGreg Kurz     }
7187a95434eSGreg Kurz 
7193f3a1699SGreg Kurz     dirfd = local_opendir_nofollow(fs_ctx, dir_path->data);
7203f3a1699SGreg Kurz     if (dirfd == -1) {
7213f3a1699SGreg Kurz         return -1;
7223f3a1699SGreg Kurz     }
7232289be19SAneesh Kumar K.V 
7243f3a1699SGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED ||
7253f3a1699SGreg Kurz         fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
726b96feb2cSTobias Schramm         err = mkdirat(dirfd, name, fs_ctx->dmode);
7273f3a1699SGreg Kurz         if (err == -1) {
7283f3a1699SGreg Kurz             goto out;
7293f3a1699SGreg Kurz         }
7303f3a1699SGreg Kurz         credp->fc_mode = credp->fc_mode | S_IFDIR;
7313f3a1699SGreg Kurz 
732b97400caSAneesh Kumar K.V         if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
7333f3a1699SGreg Kurz             err = local_set_xattrat(dirfd, name, credp);
7343f3a1699SGreg Kurz         } else {
7353f3a1699SGreg Kurz             err = local_set_mapped_file_attrat(dirfd, name, credp);
73600ec5c37SVenkateswararao Jujjuri (JV)         }
73700ec5c37SVenkateswararao Jujjuri (JV)         if (err == -1) {
73800ec5c37SVenkateswararao Jujjuri (JV)             goto err_end;
73900ec5c37SVenkateswararao Jujjuri (JV)         }
7403f3a1699SGreg Kurz     } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH ||
7413f3a1699SGreg Kurz                fs_ctx->export_flags & V9FS_SM_NONE) {
7423f3a1699SGreg Kurz         err = mkdirat(dirfd, name, credp->fc_mode);
7432c30dd74SAneesh Kumar K.V         if (err == -1) {
7442c30dd74SAneesh Kumar K.V             goto out;
7452c30dd74SAneesh Kumar K.V         }
7463f3a1699SGreg Kurz         err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp);
7472c30dd74SAneesh Kumar K.V         if (err == -1) {
74800ec5c37SVenkateswararao Jujjuri (JV)             goto err_end;
74900ec5c37SVenkateswararao Jujjuri (JV)         }
75000ec5c37SVenkateswararao Jujjuri (JV)     }
7512289be19SAneesh Kumar K.V     goto out;
75200ec5c37SVenkateswararao Jujjuri (JV) 
75300ec5c37SVenkateswararao Jujjuri (JV) err_end:
7543f3a1699SGreg Kurz     unlinkat_preserve_errno(dirfd, name, AT_REMOVEDIR);
7552289be19SAneesh Kumar K.V out:
7563f3a1699SGreg Kurz     close_preserve_errno(dirfd);
75700ec5c37SVenkateswararao Jujjuri (JV)     return err;
758c494dd6fSAnthony Liguori }
759c494dd6fSAnthony Liguori 
7608b888272SAneesh Kumar K.V static int local_fstat(FsContext *fs_ctx, int fid_type,
761cc720ddbSAneesh Kumar K.V                        V9fsFidOpenState *fs, struct stat *stbuf)
762c494dd6fSAnthony Liguori {
7638b888272SAneesh Kumar K.V     int err, fd;
7648b888272SAneesh Kumar K.V 
7658b888272SAneesh Kumar K.V     if (fid_type == P9_FID_DIR) {
766f314ea4eSGreg Kurz         fd = dirfd(fs->dir.stream);
7678b888272SAneesh Kumar K.V     } else {
7688b888272SAneesh Kumar K.V         fd = fs->fd;
7698b888272SAneesh Kumar K.V     }
7708b888272SAneesh Kumar K.V 
7718b888272SAneesh Kumar K.V     err = fstat(fd, stbuf);
7721237ad76SVenkateswararao Jujjuri (JV)     if (err) {
7731237ad76SVenkateswararao Jujjuri (JV)         return err;
7741237ad76SVenkateswararao Jujjuri (JV)     }
775b97400caSAneesh Kumar K.V     if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
7761237ad76SVenkateswararao Jujjuri (JV)         /* Actual credentials are part of extended attrs */
7771237ad76SVenkateswararao Jujjuri (JV)         uid_t tmp_uid;
7781237ad76SVenkateswararao Jujjuri (JV)         gid_t tmp_gid;
7791237ad76SVenkateswararao Jujjuri (JV)         mode_t tmp_mode;
7801237ad76SVenkateswararao Jujjuri (JV)         dev_t tmp_dev;
7811237ad76SVenkateswararao Jujjuri (JV) 
782f8ad4a89SAneesh Kumar K.V         if (fgetxattr(fd, "user.virtfs.uid", &tmp_uid, sizeof(uid_t)) > 0) {
783f8ad4a89SAneesh Kumar K.V             stbuf->st_uid = le32_to_cpu(tmp_uid);
7841237ad76SVenkateswararao Jujjuri (JV)         }
785f8ad4a89SAneesh Kumar K.V         if (fgetxattr(fd, "user.virtfs.gid", &tmp_gid, sizeof(gid_t)) > 0) {
786f8ad4a89SAneesh Kumar K.V             stbuf->st_gid = le32_to_cpu(tmp_gid);
7871237ad76SVenkateswararao Jujjuri (JV)         }
788f8ad4a89SAneesh Kumar K.V         if (fgetxattr(fd, "user.virtfs.mode", &tmp_mode, sizeof(mode_t)) > 0) {
789f8ad4a89SAneesh Kumar K.V             stbuf->st_mode = le32_to_cpu(tmp_mode);
7901237ad76SVenkateswararao Jujjuri (JV)         }
791f8ad4a89SAneesh Kumar K.V         if (fgetxattr(fd, "user.virtfs.rdev", &tmp_dev, sizeof(dev_t)) > 0) {
792f8ad4a89SAneesh Kumar K.V             stbuf->st_rdev = le64_to_cpu(tmp_dev);
7931237ad76SVenkateswararao Jujjuri (JV)         }
7942c30dd74SAneesh Kumar K.V     } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
7952c30dd74SAneesh Kumar K.V         errno = EOPNOTSUPP;
7962c30dd74SAneesh Kumar K.V         return -1;
7971237ad76SVenkateswararao Jujjuri (JV)     }
7981237ad76SVenkateswararao Jujjuri (JV)     return err;
799c494dd6fSAnthony Liguori }
800c494dd6fSAnthony Liguori 
8012289be19SAneesh Kumar K.V static int local_open2(FsContext *fs_ctx, V9fsPath *dir_path, const char *name,
802cc720ddbSAneesh Kumar K.V                        int flags, FsCred *credp, V9fsFidOpenState *fs)
803c494dd6fSAnthony Liguori {
8044750a96fSVenkateswararao Jujjuri (JV)     int fd = -1;
8054750a96fSVenkateswararao Jujjuri (JV)     int err = -1;
806a565fea5SGreg Kurz     int dirfd;
8074750a96fSVenkateswararao Jujjuri (JV) 
8087a95434eSGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE &&
8097a95434eSGreg Kurz         local_is_mapped_file_metadata(fs_ctx, name)) {
8107a95434eSGreg Kurz         errno = EINVAL;
8117a95434eSGreg Kurz         return -1;
8127a95434eSGreg Kurz     }
8137a95434eSGreg Kurz 
8140ceb092eSAneesh Kumar K.V     /*
8150ceb092eSAneesh Kumar K.V      * Mark all the open to not follow symlinks
8160ceb092eSAneesh Kumar K.V      */
8170ceb092eSAneesh Kumar K.V     flags |= O_NOFOLLOW;
8180ceb092eSAneesh Kumar K.V 
819a565fea5SGreg Kurz     dirfd = local_opendir_nofollow(fs_ctx, dir_path->data);
820a565fea5SGreg Kurz     if (dirfd == -1) {
821a565fea5SGreg Kurz         return -1;
822a565fea5SGreg Kurz     }
8232289be19SAneesh Kumar K.V 
8244750a96fSVenkateswararao Jujjuri (JV)     /* Determine the security model */
825a565fea5SGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED ||
826a565fea5SGreg Kurz         fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
827b96feb2cSTobias Schramm         fd = openat_file(dirfd, name, flags, fs_ctx->fmode);
828a565fea5SGreg Kurz         if (fd == -1) {
829a565fea5SGreg Kurz             goto out;
830a565fea5SGreg Kurz         }
831a565fea5SGreg Kurz         credp->fc_mode = credp->fc_mode | S_IFREG;
832b97400caSAneesh Kumar K.V         if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
8334750a96fSVenkateswararao Jujjuri (JV)             /* Set cleint credentials in xattr */
834a565fea5SGreg Kurz             err = local_set_xattrat(dirfd, name, credp);
835a565fea5SGreg Kurz         } else {
836a565fea5SGreg Kurz             err = local_set_mapped_file_attrat(dirfd, name, credp);
8374750a96fSVenkateswararao Jujjuri (JV)         }
8382c30dd74SAneesh Kumar K.V         if (err == -1) {
8392c30dd74SAneesh Kumar K.V             goto err_end;
8402c30dd74SAneesh Kumar K.V         }
841b97400caSAneesh Kumar K.V     } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) ||
842b97400caSAneesh Kumar K.V                (fs_ctx->export_flags & V9FS_SM_NONE)) {
843a565fea5SGreg Kurz         fd = openat_file(dirfd, name, flags, credp->fc_mode);
8444750a96fSVenkateswararao Jujjuri (JV)         if (fd == -1) {
8452289be19SAneesh Kumar K.V             goto out;
8464750a96fSVenkateswararao Jujjuri (JV)         }
847a565fea5SGreg Kurz         err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp);
8484750a96fSVenkateswararao Jujjuri (JV)         if (err == -1) {
8494750a96fSVenkateswararao Jujjuri (JV)             goto err_end;
8504750a96fSVenkateswararao Jujjuri (JV)         }
8514750a96fSVenkateswararao Jujjuri (JV)     }
8522289be19SAneesh Kumar K.V     err = fd;
853cc720ddbSAneesh Kumar K.V     fs->fd = fd;
8542289be19SAneesh Kumar K.V     goto out;
8554750a96fSVenkateswararao Jujjuri (JV) 
8564750a96fSVenkateswararao Jujjuri (JV) err_end:
857a565fea5SGreg Kurz     unlinkat_preserve_errno(dirfd, name,
858a565fea5SGreg Kurz                             flags & O_DIRECTORY ? AT_REMOVEDIR : 0);
859a565fea5SGreg Kurz     close_preserve_errno(fd);
8602289be19SAneesh Kumar K.V out:
861a565fea5SGreg Kurz     close_preserve_errno(dirfd);
8624750a96fSVenkateswararao Jujjuri (JV)     return err;
863c494dd6fSAnthony Liguori }
864c494dd6fSAnthony Liguori 
865758e8e38SVenkateswararao Jujjuri (JV) 
866879c2813SVenkateswararao Jujjuri (JV) static int local_symlink(FsContext *fs_ctx, const char *oldpath,
8672289be19SAneesh Kumar K.V                          V9fsPath *dir_path, const char *name, FsCred *credp)
868c494dd6fSAnthony Liguori {
869879c2813SVenkateswararao Jujjuri (JV)     int err = -1;
87038771613SGreg Kurz     int dirfd;
871879c2813SVenkateswararao Jujjuri (JV) 
8727a95434eSGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE &&
8737a95434eSGreg Kurz         local_is_mapped_file_metadata(fs_ctx, name)) {
8747a95434eSGreg Kurz         errno = EINVAL;
8757a95434eSGreg Kurz         return -1;
8767a95434eSGreg Kurz     }
8777a95434eSGreg Kurz 
87838771613SGreg Kurz     dirfd = local_opendir_nofollow(fs_ctx, dir_path->data);
87938771613SGreg Kurz     if (dirfd == -1) {
88038771613SGreg Kurz         return -1;
88138771613SGreg Kurz     }
8822289be19SAneesh Kumar K.V 
883879c2813SVenkateswararao Jujjuri (JV)     /* Determine the security model */
88438771613SGreg Kurz     if (fs_ctx->export_flags & V9FS_SM_MAPPED ||
88538771613SGreg Kurz         fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
88638771613SGreg Kurz         int fd;
88738771613SGreg Kurz         ssize_t oldpath_size, write_size;
88838771613SGreg Kurz 
88938771613SGreg Kurz         fd = openat_file(dirfd, name, O_CREAT | O_EXCL | O_RDWR,
890b96feb2cSTobias Schramm                          fs_ctx->fmode);
89138771613SGreg Kurz         if (fd == -1) {
89238771613SGreg Kurz             goto out;
89338771613SGreg Kurz         }
89438771613SGreg Kurz         /* Write the oldpath (target) to the file. */
89538771613SGreg Kurz         oldpath_size = strlen(oldpath);
89638771613SGreg Kurz         do {
89738771613SGreg Kurz             write_size = write(fd, (void *)oldpath, oldpath_size);
89838771613SGreg Kurz         } while (write_size == -1 && errno == EINTR);
89938771613SGreg Kurz         close_preserve_errno(fd);
90038771613SGreg Kurz 
90138771613SGreg Kurz         if (write_size != oldpath_size) {
90238771613SGreg Kurz             goto err_end;
90338771613SGreg Kurz         }
90438771613SGreg Kurz         /* Set cleint credentials in symlink's xattr */
90538771613SGreg Kurz         credp->fc_mode = credp->fc_mode | S_IFLNK;
90638771613SGreg Kurz 
907b97400caSAneesh Kumar K.V         if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
90838771613SGreg Kurz             err = local_set_xattrat(dirfd, name, credp);
90938771613SGreg Kurz         } else {
91038771613SGreg Kurz             err = local_set_mapped_file_attrat(dirfd, name, credp);
911879c2813SVenkateswararao Jujjuri (JV)         }
912879c2813SVenkateswararao Jujjuri (JV)         if (err == -1) {
913879c2813SVenkateswararao Jujjuri (JV)             goto err_end;
914879c2813SVenkateswararao Jujjuri (JV)         }
91538771613SGreg Kurz     } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH ||
91638771613SGreg Kurz                fs_ctx->export_flags & V9FS_SM_NONE) {
91738771613SGreg Kurz         err = symlinkat(oldpath, dirfd, name);
918879c2813SVenkateswararao Jujjuri (JV)         if (err) {
9192289be19SAneesh Kumar K.V             goto out;
920879c2813SVenkateswararao Jujjuri (JV)         }
92138771613SGreg Kurz         err = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid,
92238771613SGreg Kurz                        AT_SYMLINK_NOFOLLOW);
923879c2813SVenkateswararao Jujjuri (JV)         if (err == -1) {
92412848bfcSAneesh Kumar K.V             /*
92512848bfcSAneesh Kumar K.V              * If we fail to change ownership and if we are
92612848bfcSAneesh Kumar K.V              * using security model none. Ignore the error
92712848bfcSAneesh Kumar K.V              */
928b97400caSAneesh Kumar K.V             if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) {
929879c2813SVenkateswararao Jujjuri (JV)                 goto err_end;
93038771613SGreg Kurz             } else {
93112848bfcSAneesh Kumar K.V                 err = 0;
932879c2813SVenkateswararao Jujjuri (JV)             }
933879c2813SVenkateswararao Jujjuri (JV)         }
93438771613SGreg Kurz     }
9352289be19SAneesh Kumar K.V     goto out;
936879c2813SVenkateswararao Jujjuri (JV) 
937879c2813SVenkateswararao Jujjuri (JV) err_end:
93838771613SGreg Kurz     unlinkat_preserve_errno(dirfd, name, 0);
9392289be19SAneesh Kumar K.V out:
94038771613SGreg Kurz     close_preserve_errno(dirfd);
941879c2813SVenkateswararao Jujjuri (JV)     return err;
942c494dd6fSAnthony Liguori }
943c494dd6fSAnthony Liguori 
9442289be19SAneesh Kumar K.V static int local_link(FsContext *ctx, V9fsPath *oldpath,
9452289be19SAneesh Kumar K.V                       V9fsPath *dirpath, const char *name)
946c494dd6fSAnthony Liguori {
947ad0b46e6SGreg Kurz     char *odirpath = g_path_get_dirname(oldpath->data);
948ad0b46e6SGreg Kurz     char *oname = g_path_get_basename(oldpath->data);
949ad0b46e6SGreg Kurz     int ret = -1;
950ad0b46e6SGreg Kurz     int odirfd, ndirfd;
951c494dd6fSAnthony Liguori 
9527a95434eSGreg Kurz     if (ctx->export_flags & V9FS_SM_MAPPED_FILE &&
9537a95434eSGreg Kurz         local_is_mapped_file_metadata(ctx, name)) {
9547a95434eSGreg Kurz         errno = EINVAL;
955841b8d09SJiajun Chen         goto out;
9567a95434eSGreg Kurz     }
9577a95434eSGreg Kurz 
958ad0b46e6SGreg Kurz     odirfd = local_opendir_nofollow(ctx, odirpath);
959ad0b46e6SGreg Kurz     if (odirfd == -1) {
9606dd4b1f1SGreg Kurz         goto out;
9616dd4b1f1SGreg Kurz     }
9622289be19SAneesh Kumar K.V 
963ad0b46e6SGreg Kurz     ndirfd = local_opendir_nofollow(ctx, dirpath->data);
964ad0b46e6SGreg Kurz     if (ndirfd == -1) {
965ad0b46e6SGreg Kurz         close_preserve_errno(odirfd);
966ad0b46e6SGreg Kurz         goto out;
967ad0b46e6SGreg Kurz     }
968ad0b46e6SGreg Kurz 
969ad0b46e6SGreg Kurz     ret = linkat(odirfd, oname, ndirfd, name, 0);
970ad0b46e6SGreg Kurz     if (ret < 0) {
971ad0b46e6SGreg Kurz         goto out_close;
972ad0b46e6SGreg Kurz     }
9732c30dd74SAneesh Kumar K.V 
9742c30dd74SAneesh Kumar K.V     /* now link the virtfs_metadata files */
9756dd4b1f1SGreg Kurz     if (ctx->export_flags & V9FS_SM_MAPPED_FILE) {
976ad0b46e6SGreg Kurz         int omap_dirfd, nmap_dirfd;
9776dd4b1f1SGreg Kurz 
978ad0b46e6SGreg Kurz         ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700);
979ad0b46e6SGreg Kurz         if (ret < 0 && errno != EEXIST) {
980ad0b46e6SGreg Kurz             goto err_undo_link;
9812c30dd74SAneesh Kumar K.V         }
982ad0b46e6SGreg Kurz 
983ad0b46e6SGreg Kurz         omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR);
984ad0b46e6SGreg Kurz         if (omap_dirfd == -1) {
985ad0b46e6SGreg Kurz             goto err;
986ad0b46e6SGreg Kurz         }
987ad0b46e6SGreg Kurz 
988ad0b46e6SGreg Kurz         nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR);
989ad0b46e6SGreg Kurz         if (nmap_dirfd == -1) {
990ad0b46e6SGreg Kurz             close_preserve_errno(omap_dirfd);
991ad0b46e6SGreg Kurz             goto err;
992ad0b46e6SGreg Kurz         }
993ad0b46e6SGreg Kurz 
994ad0b46e6SGreg Kurz         ret = linkat(omap_dirfd, oname, nmap_dirfd, name, 0);
995ad0b46e6SGreg Kurz         close_preserve_errno(nmap_dirfd);
996ad0b46e6SGreg Kurz         close_preserve_errno(omap_dirfd);
9972c30dd74SAneesh Kumar K.V         if (ret < 0 && errno != ENOENT) {
998ad0b46e6SGreg Kurz             goto err_undo_link;
9992c30dd74SAneesh Kumar K.V         }
10006dd4b1f1SGreg Kurz 
1001ad0b46e6SGreg Kurz         ret = 0;
10022c30dd74SAneesh Kumar K.V     }
1003ad0b46e6SGreg Kurz     goto out_close;
1004ad0b46e6SGreg Kurz 
1005ad0b46e6SGreg Kurz err:
1006ad0b46e6SGreg Kurz     ret = -1;
1007ad0b46e6SGreg Kurz err_undo_link:
1008ad0b46e6SGreg Kurz     unlinkat_preserve_errno(ndirfd, name, 0);
1009ad0b46e6SGreg Kurz out_close:
1010ad0b46e6SGreg Kurz     close_preserve_errno(ndirfd);
1011ad0b46e6SGreg Kurz     close_preserve_errno(odirfd);
10126dd4b1f1SGreg Kurz out:
1013ad0b46e6SGreg Kurz     g_free(oname);
1014ad0b46e6SGreg Kurz     g_free(odirpath);
10152289be19SAneesh Kumar K.V     return ret;
1016c494dd6fSAnthony Liguori }
1017c494dd6fSAnthony Liguori 
10182289be19SAneesh Kumar K.V static int local_truncate(FsContext *ctx, V9fsPath *fs_path, off_t size)
10198cf89e00SAnthony Liguori {
1020ac125d99SGreg Kurz     int fd, ret;
10212289be19SAneesh Kumar K.V 
1022ac125d99SGreg Kurz     fd = local_open_nofollow(ctx, fs_path->data, O_WRONLY, 0);
1023ac125d99SGreg Kurz     if (fd == -1) {
1024ac125d99SGreg Kurz         return -1;
1025ac125d99SGreg Kurz     }
1026ac125d99SGreg Kurz     ret = ftruncate(fd, size);
1027ac125d99SGreg Kurz     close_preserve_errno(fd);
10284fa4ce71SChen Gang     return ret;
10298cf89e00SAnthony Liguori }
10308cf89e00SAnthony Liguori 
10312289be19SAneesh Kumar K.V static int local_chown(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp)
10328cf89e00SAnthony Liguori {
1033d369f207SGreg Kurz     char *dirpath = g_path_get_dirname(fs_path->data);
1034d369f207SGreg Kurz     char *name = g_path_get_basename(fs_path->data);
10354fa4ce71SChen Gang     int ret = -1;
1036d369f207SGreg Kurz     int dirfd;
1037d369f207SGreg Kurz 
1038d369f207SGreg Kurz     dirfd = local_opendir_nofollow(fs_ctx, dirpath);
1039d369f207SGreg Kurz     if (dirfd == -1) {
1040d369f207SGreg Kurz         goto out;
1041d369f207SGreg Kurz     }
10422289be19SAneesh Kumar K.V 
1043c79ce737SSripathi Kodi     if ((credp->fc_uid == -1 && credp->fc_gid == -1) ||
104417b1971fSAneesh Kumar K.V         (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) ||
104517b1971fSAneesh Kumar K.V         (fs_ctx->export_flags & V9FS_SM_NONE)) {
1046d369f207SGreg Kurz         ret = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid,
1047d369f207SGreg Kurz                        AT_SYMLINK_NOFOLLOW);
1048b97400caSAneesh Kumar K.V     } else if (fs_ctx->export_flags & V9FS_SM_MAPPED) {
1049d369f207SGreg Kurz         ret = local_set_xattrat(dirfd, name, credp);
10502c30dd74SAneesh Kumar K.V     } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) {
1051d369f207SGreg Kurz         ret = local_set_mapped_file_attrat(dirfd, name, credp);
1052f7613beeSVenkateswararao Jujjuri (JV)     }
1053d369f207SGreg Kurz 
1054d369f207SGreg Kurz     close_preserve_errno(dirfd);
1055d369f207SGreg Kurz out:
1056d369f207SGreg Kurz     g_free(name);
1057d369f207SGreg Kurz     g_free(dirpath);
10584fa4ce71SChen Gang     return ret;
10598cf89e00SAnthony Liguori }
10608cf89e00SAnthony Liguori 
10612289be19SAneesh Kumar K.V static int local_utimensat(FsContext *s, V9fsPath *fs_path,
106274bc02b2SM. Mohan Kumar                            const struct timespec *buf)
10638cf89e00SAnthony Liguori {
1064a33eda0dSGreg Kurz     char *dirpath = g_path_get_dirname(fs_path->data);
1065a33eda0dSGreg Kurz     char *name = g_path_get_basename(fs_path->data);
1066a33eda0dSGreg Kurz     int dirfd, ret = -1;
10672289be19SAneesh Kumar K.V 
1068a33eda0dSGreg Kurz     dirfd = local_opendir_nofollow(s, dirpath);
1069a33eda0dSGreg Kurz     if (dirfd == -1) {
1070a33eda0dSGreg Kurz         goto out;
1071a33eda0dSGreg Kurz     }
1072a33eda0dSGreg Kurz 
1073a33eda0dSGreg Kurz     ret = utimensat(dirfd, name, buf, AT_SYMLINK_NOFOLLOW);
1074a33eda0dSGreg Kurz     close_preserve_errno(dirfd);
1075a33eda0dSGreg Kurz out:
1076a33eda0dSGreg Kurz     g_free(dirpath);
1077a33eda0dSGreg Kurz     g_free(name);
10784fa4ce71SChen Gang     return ret;
10798cf89e00SAnthony Liguori }
10808cf89e00SAnthony Liguori 
1081df4938a6SGreg Kurz static int local_unlinkat_common(FsContext *ctx, int dirfd, const char *name,
1082df4938a6SGreg Kurz                                  int flags)
10835bae1900SAnthony Liguori {
1084846cf408SDaniel Henrique Barboza     int ret;
10852c30dd74SAneesh Kumar K.V 
10862c30dd74SAneesh Kumar K.V     if (ctx->export_flags & V9FS_SM_MAPPED_FILE) {
1087df4938a6SGreg Kurz         int map_dirfd;
1088df4938a6SGreg Kurz 
10896a87e792SGreg Kurz         /* We need to remove the metadata as well:
10906a87e792SGreg Kurz          * - the metadata directory if we're removing a directory
10916a87e792SGreg Kurz          * - the metadata file in the parent's metadata directory
10926a87e792SGreg Kurz          *
10936a87e792SGreg Kurz          * If any of these are missing (ie, ENOENT) then we're probably
10946a87e792SGreg Kurz          * trying to remove something that wasn't created in mapped-file
10956a87e792SGreg Kurz          * mode. We just ignore the error.
10966a87e792SGreg Kurz          */
1097df4938a6SGreg Kurz         if (flags == AT_REMOVEDIR) {
1098df4938a6SGreg Kurz             int fd;
1099df4938a6SGreg Kurz 
1100b003fc0dSGreg Kurz             fd = openat_dir(dirfd, name);
1101df4938a6SGreg Kurz             if (fd == -1) {
1102846cf408SDaniel Henrique Barboza                 return -1;
11032c30dd74SAneesh Kumar K.V             }
1104df4938a6SGreg Kurz             ret = unlinkat(fd, VIRTFS_META_DIR, AT_REMOVEDIR);
1105df4938a6SGreg Kurz             close_preserve_errno(fd);
1106df4938a6SGreg Kurz             if (ret < 0 && errno != ENOENT) {
1107846cf408SDaniel Henrique Barboza                 return -1;
11082c30dd74SAneesh Kumar K.V             }
11092c30dd74SAneesh Kumar K.V         }
1110df4938a6SGreg Kurz         map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR);
11116a87e792SGreg Kurz         if (map_dirfd != -1) {
1112df4938a6SGreg Kurz             ret = unlinkat(map_dirfd, name, 0);
1113df4938a6SGreg Kurz             close_preserve_errno(map_dirfd);
1114df4938a6SGreg Kurz             if (ret < 0 && errno != ENOENT) {
1115846cf408SDaniel Henrique Barboza                 return -1;
11166a87e792SGreg Kurz             }
11176a87e792SGreg Kurz         } else if (errno != ENOENT) {
1118846cf408SDaniel Henrique Barboza             return -1;
11192c30dd74SAneesh Kumar K.V         }
11202c30dd74SAneesh Kumar K.V     }
11214fa4ce71SChen Gang 
1122846cf408SDaniel Henrique Barboza     return unlinkat(dirfd, name, flags);
1123df4938a6SGreg Kurz }
1124df4938a6SGreg Kurz 
11258cf89e00SAnthony Liguori static int local_remove(FsContext *ctx, const char *path)
11268cf89e00SAnthony Liguori {
11278cf89e00SAnthony Liguori     struct stat stbuf;
1128a0e640a8SGreg Kurz     char *dirpath = g_path_get_dirname(path);
1129a0e640a8SGreg Kurz     char *name = g_path_get_basename(path);
1130a0e640a8SGreg Kurz     int flags = 0;
1131a0e640a8SGreg Kurz     int dirfd;
1132a0e640a8SGreg Kurz     int err = -1;
11338cf89e00SAnthony Liguori 
1134a0e640a8SGreg Kurz     dirfd = local_opendir_nofollow(ctx, dirpath);
1135b7361d46SGreg Kurz     if (dirfd == -1) {
1136a0e640a8SGreg Kurz         goto out;
1137a0e640a8SGreg Kurz     }
1138a0e640a8SGreg Kurz 
1139790db7efSBruce Rogers     if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW) < 0) {
11408cf89e00SAnthony Liguori         goto err_out;
11418cf89e00SAnthony Liguori     }
1142a0e640a8SGreg Kurz 
11438cf89e00SAnthony Liguori     if (S_ISDIR(stbuf.st_mode)) {
1144a0e640a8SGreg Kurz         flags |= AT_REMOVEDIR;
1145faa44e3dSVenkateswararao Jujjuri (JV)     }
11464fa4ce71SChen Gang 
1147a0e640a8SGreg Kurz     err = local_unlinkat_common(ctx, dirfd, name, flags);
11482c30dd74SAneesh Kumar K.V err_out:
1149a0e640a8SGreg Kurz     close_preserve_errno(dirfd);
1150a0e640a8SGreg Kurz out:
1151a0e640a8SGreg Kurz     g_free(name);
1152a0e640a8SGreg Kurz     g_free(dirpath);
11532c30dd74SAneesh Kumar K.V     return err;
11545bae1900SAnthony Liguori }
11555bae1900SAnthony Liguori 
11568b888272SAneesh Kumar K.V static int local_fsync(FsContext *ctx, int fid_type,
11578b888272SAneesh Kumar K.V                        V9fsFidOpenState *fs, int datasync)
11588cf89e00SAnthony Liguori {
11598b888272SAneesh Kumar K.V     int fd;
11608b888272SAneesh Kumar K.V 
11618b888272SAneesh Kumar K.V     if (fid_type == P9_FID_DIR) {
1162f314ea4eSGreg Kurz         fd = dirfd(fs->dir.stream);
116349594973SVenkateswararao Jujjuri (JV)     } else {
11648b888272SAneesh Kumar K.V         fd = fs->fd;
11658b888272SAneesh Kumar K.V     }
11668b888272SAneesh Kumar K.V 
11678b888272SAneesh Kumar K.V     if (datasync) {
11688b888272SAneesh Kumar K.V         return qemu_fdatasync(fd);
11698b888272SAneesh Kumar K.V     } else {
11708b888272SAneesh Kumar K.V         return fsync(fd);
11718cf89e00SAnthony Liguori     }
117249594973SVenkateswararao Jujjuri (JV) }
11738cf89e00SAnthony Liguori 
11742289be19SAneesh Kumar K.V static int local_statfs(FsContext *s, V9fsPath *fs_path, struct statfs *stbuf)
1175be940c87SM. Mohan Kumar {
117631e51d1cSGreg Kurz     int fd, ret;
11772289be19SAneesh Kumar K.V 
117831e51d1cSGreg Kurz     fd = local_open_nofollow(s, fs_path->data, O_RDONLY, 0);
117923da0145SGreg Kurz     if (fd == -1) {
118023da0145SGreg Kurz         return -1;
118123da0145SGreg Kurz     }
118231e51d1cSGreg Kurz     ret = fstatfs(fd, stbuf);
118331e51d1cSGreg Kurz     close_preserve_errno(fd);
11844fa4ce71SChen Gang     return ret;
1185be940c87SM. Mohan Kumar }
1186be940c87SM. Mohan Kumar 
11872289be19SAneesh Kumar K.V static ssize_t local_lgetxattr(FsContext *ctx, V9fsPath *fs_path,
1188fa32ef88SAneesh Kumar K.V                                const char *name, void *value, size_t size)
1189fa32ef88SAneesh Kumar K.V {
11902289be19SAneesh Kumar K.V     char *path = fs_path->data;
11912289be19SAneesh Kumar K.V 
1192fc22118dSAneesh Kumar K.V     return v9fs_get_xattr(ctx, path, name, value, size);
1193fa32ef88SAneesh Kumar K.V }
1194fa32ef88SAneesh Kumar K.V 
11952289be19SAneesh Kumar K.V static ssize_t local_llistxattr(FsContext *ctx, V9fsPath *fs_path,
1196fa32ef88SAneesh Kumar K.V                                 void *value, size_t size)
1197fa32ef88SAneesh Kumar K.V {
11982289be19SAneesh Kumar K.V     char *path = fs_path->data;
11992289be19SAneesh Kumar K.V 
1200fc22118dSAneesh Kumar K.V     return v9fs_list_xattr(ctx, path, value, size);
120161b6c499SAneesh Kumar K.V }
120261b6c499SAneesh Kumar K.V 
12032289be19SAneesh Kumar K.V static int local_lsetxattr(FsContext *ctx, V9fsPath *fs_path, const char *name,
120410b468bdSAneesh Kumar K.V                            void *value, size_t size, int flags)
120510b468bdSAneesh Kumar K.V {
12062289be19SAneesh Kumar K.V     char *path = fs_path->data;
12072289be19SAneesh Kumar K.V 
1208fc22118dSAneesh Kumar K.V     return v9fs_set_xattr(ctx, path, name, value, size, flags);
120910b468bdSAneesh Kumar K.V }
121010b468bdSAneesh Kumar K.V 
12112289be19SAneesh Kumar K.V static int local_lremovexattr(FsContext *ctx, V9fsPath *fs_path,
12122289be19SAneesh Kumar K.V                               const char *name)
12139ed3ef26SAneesh Kumar K.V {
12142289be19SAneesh Kumar K.V     char *path = fs_path->data;
12152289be19SAneesh Kumar K.V 
1216fc22118dSAneesh Kumar K.V     return v9fs_remove_xattr(ctx, path, name);
12179ed3ef26SAneesh Kumar K.V }
12189ed3ef26SAneesh Kumar K.V 
12192289be19SAneesh Kumar K.V static int local_name_to_path(FsContext *ctx, V9fsPath *dir_path,
12202289be19SAneesh Kumar K.V                               const char *name, V9fsPath *target)
12212289be19SAneesh Kumar K.V {
12227a95434eSGreg Kurz     if (ctx->export_flags & V9FS_SM_MAPPED_FILE &&
12237a95434eSGreg Kurz         local_is_mapped_file_metadata(ctx, name)) {
12247a95434eSGreg Kurz         errno = EINVAL;
12257a95434eSGreg Kurz         return -1;
12267a95434eSGreg Kurz     }
12277a95434eSGreg Kurz 
12282289be19SAneesh Kumar K.V     if (dir_path) {
1229f57f5878SGreg Kurz         if (!strcmp(name, ".")) {
1230f57f5878SGreg Kurz             /* "." relative to "foo/bar" is "foo/bar" */
1231f57f5878SGreg Kurz             v9fs_path_copy(target, dir_path);
1232f57f5878SGreg Kurz         } else if (!strcmp(name, "..")) {
1233f57f5878SGreg Kurz             if (!strcmp(dir_path->data, ".")) {
1234f57f5878SGreg Kurz                 /* ".." relative to the root is "." */
1235f57f5878SGreg Kurz                 v9fs_path_sprintf(target, ".");
12369c6b899fSGreg Kurz             } else {
1237f57f5878SGreg Kurz                 char *tmp = g_path_get_dirname(dir_path->data);
1238f57f5878SGreg Kurz                 /* Symbolic links are resolved by the client. We can assume
1239f57f5878SGreg Kurz                  * that ".." relative to "foo/bar" is equivalent to "foo"
12409c6b899fSGreg Kurz                  */
1241f57f5878SGreg Kurz                 v9fs_path_sprintf(target, "%s", tmp);
1242f57f5878SGreg Kurz                 g_free(tmp);
1243f57f5878SGreg Kurz             }
1244f57f5878SGreg Kurz         } else {
1245f57f5878SGreg Kurz             assert(!strchr(name, '/'));
1246f57f5878SGreg Kurz             v9fs_path_sprintf(target, "%s/%s", dir_path->data, name);
1247f57f5878SGreg Kurz         }
1248f57f5878SGreg Kurz     } else if (!strcmp(name, "/") || !strcmp(name, ".") ||
1249f57f5878SGreg Kurz                !strcmp(name, "..")) {
1250f57f5878SGreg Kurz             /* This is the root fid */
1251f57f5878SGreg Kurz         v9fs_path_sprintf(target, ".");
1252f57f5878SGreg Kurz     } else {
1253f57f5878SGreg Kurz         assert(!strchr(name, '/'));
1254f57f5878SGreg Kurz         v9fs_path_sprintf(target, "./%s", name);
12552289be19SAneesh Kumar K.V     }
12562289be19SAneesh Kumar K.V     return 0;
12572289be19SAneesh Kumar K.V }
12582289be19SAneesh Kumar K.V 
12592289be19SAneesh Kumar K.V static int local_renameat(FsContext *ctx, V9fsPath *olddir,
12602289be19SAneesh Kumar K.V                           const char *old_name, V9fsPath *newdir,
12612289be19SAneesh Kumar K.V                           const char *new_name)
12622289be19SAneesh Kumar K.V {
12632289be19SAneesh Kumar K.V     int ret;
126499f2cf4bSGreg Kurz     int odirfd, ndirfd;
12652289be19SAneesh Kumar K.V 
12667a95434eSGreg Kurz     if (ctx->export_flags & V9FS_SM_MAPPED_FILE &&
12677a95434eSGreg Kurz         (local_is_mapped_file_metadata(ctx, old_name) ||
12687a95434eSGreg Kurz          local_is_mapped_file_metadata(ctx, new_name))) {
12697a95434eSGreg Kurz         errno = EINVAL;
12707a95434eSGreg Kurz         return -1;
12717a95434eSGreg Kurz     }
12727a95434eSGreg Kurz 
127399f2cf4bSGreg Kurz     odirfd = local_opendir_nofollow(ctx, olddir->data);
127499f2cf4bSGreg Kurz     if (odirfd == -1) {
127599f2cf4bSGreg Kurz         return -1;
127699f2cf4bSGreg Kurz     }
12772289be19SAneesh Kumar K.V 
127899f2cf4bSGreg Kurz     ndirfd = local_opendir_nofollow(ctx, newdir->data);
127999f2cf4bSGreg Kurz     if (ndirfd == -1) {
128099f2cf4bSGreg Kurz         close_preserve_errno(odirfd);
128199f2cf4bSGreg Kurz         return -1;
128299f2cf4bSGreg Kurz     }
12832289be19SAneesh Kumar K.V 
128499f2cf4bSGreg Kurz     ret = renameat(odirfd, old_name, ndirfd, new_name);
128599f2cf4bSGreg Kurz     if (ret < 0) {
128699f2cf4bSGreg Kurz         goto out;
128799f2cf4bSGreg Kurz     }
128899f2cf4bSGreg Kurz 
128999f2cf4bSGreg Kurz     if (ctx->export_flags & V9FS_SM_MAPPED_FILE) {
129099f2cf4bSGreg Kurz         int omap_dirfd, nmap_dirfd;
129199f2cf4bSGreg Kurz 
129299f2cf4bSGreg Kurz         ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700);
129399f2cf4bSGreg Kurz         if (ret < 0 && errno != EEXIST) {
129499f2cf4bSGreg Kurz             goto err_undo_rename;
129599f2cf4bSGreg Kurz         }
129699f2cf4bSGreg Kurz 
12976dd4b1f1SGreg Kurz         omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR);
129899f2cf4bSGreg Kurz         if (omap_dirfd == -1) {
129999f2cf4bSGreg Kurz             goto err;
130099f2cf4bSGreg Kurz         }
130199f2cf4bSGreg Kurz 
13026dd4b1f1SGreg Kurz         nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR);
130399f2cf4bSGreg Kurz         if (nmap_dirfd == -1) {
130499f2cf4bSGreg Kurz             close_preserve_errno(omap_dirfd);
130599f2cf4bSGreg Kurz             goto err;
130699f2cf4bSGreg Kurz         }
130799f2cf4bSGreg Kurz 
130899f2cf4bSGreg Kurz         /* rename the .virtfs_metadata files */
130999f2cf4bSGreg Kurz         ret = renameat(omap_dirfd, old_name, nmap_dirfd, new_name);
131099f2cf4bSGreg Kurz         close_preserve_errno(nmap_dirfd);
131199f2cf4bSGreg Kurz         close_preserve_errno(omap_dirfd);
131299f2cf4bSGreg Kurz         if (ret < 0 && errno != ENOENT) {
131399f2cf4bSGreg Kurz             goto err_undo_rename;
131499f2cf4bSGreg Kurz         }
131599f2cf4bSGreg Kurz 
131699f2cf4bSGreg Kurz         ret = 0;
131799f2cf4bSGreg Kurz     }
131899f2cf4bSGreg Kurz     goto out;
131999f2cf4bSGreg Kurz 
132099f2cf4bSGreg Kurz err:
132199f2cf4bSGreg Kurz     ret = -1;
132299f2cf4bSGreg Kurz err_undo_rename:
132399f2cf4bSGreg Kurz     renameat_preserve_errno(ndirfd, new_name, odirfd, old_name);
132499f2cf4bSGreg Kurz out:
132599f2cf4bSGreg Kurz     close_preserve_errno(ndirfd);
132699f2cf4bSGreg Kurz     close_preserve_errno(odirfd);
13272289be19SAneesh Kumar K.V     return ret;
13282289be19SAneesh Kumar K.V }
13292289be19SAneesh Kumar K.V 
1330d2767edeSGreg Kurz static void v9fs_path_init_dirname(V9fsPath *path, const char *str)
1331d2767edeSGreg Kurz {
1332d2767edeSGreg Kurz     path->data = g_path_get_dirname(str);
1333d2767edeSGreg Kurz     path->size = strlen(path->data) + 1;
1334d2767edeSGreg Kurz }
1335d2767edeSGreg Kurz 
1336d2767edeSGreg Kurz static int local_rename(FsContext *ctx, const char *oldpath,
1337d2767edeSGreg Kurz                         const char *newpath)
1338d2767edeSGreg Kurz {
1339d2767edeSGreg Kurz     int err;
1340d2767edeSGreg Kurz     char *oname = g_path_get_basename(oldpath);
1341d2767edeSGreg Kurz     char *nname = g_path_get_basename(newpath);
1342d2767edeSGreg Kurz     V9fsPath olddir, newdir;
1343d2767edeSGreg Kurz 
1344d2767edeSGreg Kurz     v9fs_path_init_dirname(&olddir, oldpath);
1345d2767edeSGreg Kurz     v9fs_path_init_dirname(&newdir, newpath);
1346d2767edeSGreg Kurz 
1347d2767edeSGreg Kurz     err = local_renameat(ctx, &olddir, oname, &newdir, nname);
1348d2767edeSGreg Kurz 
1349d2767edeSGreg Kurz     v9fs_path_free(&newdir);
1350d2767edeSGreg Kurz     v9fs_path_free(&olddir);
1351d2767edeSGreg Kurz     g_free(nname);
1352d2767edeSGreg Kurz     g_free(oname);
1353d2767edeSGreg Kurz 
1354d2767edeSGreg Kurz     return err;
1355d2767edeSGreg Kurz }
1356d2767edeSGreg Kurz 
13572289be19SAneesh Kumar K.V static int local_unlinkat(FsContext *ctx, V9fsPath *dir,
13582289be19SAneesh Kumar K.V                           const char *name, int flags)
13592289be19SAneesh Kumar K.V {
13602289be19SAneesh Kumar K.V     int ret;
1361df4938a6SGreg Kurz     int dirfd;
13622c30dd74SAneesh Kumar K.V 
13637a95434eSGreg Kurz     if (ctx->export_flags & V9FS_SM_MAPPED_FILE &&
13647a95434eSGreg Kurz         local_is_mapped_file_metadata(ctx, name)) {
13657a95434eSGreg Kurz         errno = EINVAL;
13667a95434eSGreg Kurz         return -1;
13677a95434eSGreg Kurz     }
13687a95434eSGreg Kurz 
1369df4938a6SGreg Kurz     dirfd = local_opendir_nofollow(ctx, dir->data);
1370df4938a6SGreg Kurz     if (dirfd == -1) {
1371df4938a6SGreg Kurz         return -1;
1372df4938a6SGreg Kurz     }
13732289be19SAneesh Kumar K.V 
1374df4938a6SGreg Kurz     ret = local_unlinkat_common(ctx, dirfd, name, flags);
1375df4938a6SGreg Kurz     close_preserve_errno(dirfd);
13762289be19SAneesh Kumar K.V     return ret;
13772289be19SAneesh Kumar K.V }
13789ed3ef26SAneesh Kumar K.V 
13795b7b2f9aSKeno Fischer #ifdef FS_IOC_GETVERSION
1380e06a765eSHarsh Prateek Bora static int local_ioc_getversion(FsContext *ctx, V9fsPath *path,
1381e06a765eSHarsh Prateek Bora                                 mode_t st_mode, uint64_t *st_gen)
1382e06a765eSHarsh Prateek Bora {
13830e5fc994SKirill A. Shutemov     int err;
1384cc720ddbSAneesh Kumar K.V     V9fsFidOpenState fid_open;
1385cc720ddbSAneesh Kumar K.V 
1386e06a765eSHarsh Prateek Bora     /*
1387e06a765eSHarsh Prateek Bora      * Do not try to open special files like device nodes, fifos etc
1388e06a765eSHarsh Prateek Bora      * We can get fd for regular files and directories only
1389e06a765eSHarsh Prateek Bora      */
1390e06a765eSHarsh Prateek Bora     if (!S_ISREG(st_mode) && !S_ISDIR(st_mode)) {
13911a9978a5SKirill A. Shutemov         errno = ENOTTY;
13921a9978a5SKirill A. Shutemov         return -1;
1393e06a765eSHarsh Prateek Bora     }
1394cc720ddbSAneesh Kumar K.V     err = local_open(ctx, path, O_RDONLY, &fid_open);
1395cc720ddbSAneesh Kumar K.V     if (err < 0) {
1396cc720ddbSAneesh Kumar K.V         return err;
1397e06a765eSHarsh Prateek Bora     }
1398cc720ddbSAneesh Kumar K.V     err = ioctl(fid_open.fd, FS_IOC_GETVERSION, st_gen);
1399cc720ddbSAneesh Kumar K.V     local_close(ctx, &fid_open);
1400e06a765eSHarsh Prateek Bora     return err;
14015b7b2f9aSKeno Fischer }
14020e5fc994SKirill A. Shutemov #endif
1403e06a765eSHarsh Prateek Bora 
14045b7b2f9aSKeno Fischer static int local_ioc_getversion_init(FsContext *ctx, LocalData *data, Error **errp)
14050174fe73SAneesh Kumar K.V {
140600c90bd1SGreg Kurz #ifdef FS_IOC_GETVERSION
14075b7b2f9aSKeno Fischer     struct statfs stbuf;
14085b7b2f9aSKeno Fischer 
140900c90bd1SGreg Kurz     /*
141000c90bd1SGreg Kurz      * use ioc_getversion only if the ioctl is definied
141100c90bd1SGreg Kurz      */
14120e35a378SGreg Kurz     if (fstatfs(data->mountfd, &stbuf) < 0) {
14132306271cSKeno Fischer         error_setg_errno(errp, errno,
14142306271cSKeno Fischer                          "failed to stat file system at '%s'", ctx->fs_root);
14155b7b2f9aSKeno Fischer         return -1;
141600c90bd1SGreg Kurz     }
141700c90bd1SGreg Kurz     switch (stbuf.f_type) {
141800c90bd1SGreg Kurz     case EXT2_SUPER_MAGIC:
141900c90bd1SGreg Kurz     case BTRFS_SUPER_MAGIC:
142000c90bd1SGreg Kurz     case REISERFS_SUPER_MAGIC:
142100c90bd1SGreg Kurz     case XFS_SUPER_MAGIC:
142200c90bd1SGreg Kurz         ctx->exops.get_st_gen = local_ioc_getversion;
142300c90bd1SGreg Kurz         break;
142400c90bd1SGreg Kurz     }
142500c90bd1SGreg Kurz #endif
14265b7b2f9aSKeno Fischer     return 0;
14275b7b2f9aSKeno Fischer }
14285b7b2f9aSKeno Fischer 
14295b7b2f9aSKeno Fischer static int local_init(FsContext *ctx, Error **errp)
14305b7b2f9aSKeno Fischer {
14315b7b2f9aSKeno Fischer     LocalData *data = g_malloc(sizeof(*data));
14325b7b2f9aSKeno Fischer 
14335b7b2f9aSKeno Fischer     data->mountfd = open(ctx->fs_root, O_DIRECTORY | O_RDONLY);
14345b7b2f9aSKeno Fischer     if (data->mountfd == -1) {
14355b7b2f9aSKeno Fischer         error_setg_errno(errp, errno, "failed to open '%s'", ctx->fs_root);
14365b7b2f9aSKeno Fischer         goto err;
14375b7b2f9aSKeno Fischer     }
14385b7b2f9aSKeno Fischer 
14395b7b2f9aSKeno Fischer     if (local_ioc_getversion_init(ctx, data, errp) < 0) {
14405b7b2f9aSKeno Fischer         close(data->mountfd);
14415b7b2f9aSKeno Fischer         goto err;
14425b7b2f9aSKeno Fischer     }
1443e06a765eSHarsh Prateek Bora 
14442c30dd74SAneesh Kumar K.V     if (ctx->export_flags & V9FS_SM_PASSTHROUGH) {
14452c30dd74SAneesh Kumar K.V         ctx->xops = passthrough_xattr_ops;
14462c30dd74SAneesh Kumar K.V     } else if (ctx->export_flags & V9FS_SM_MAPPED) {
14472c30dd74SAneesh Kumar K.V         ctx->xops = mapped_xattr_ops;
14482c30dd74SAneesh Kumar K.V     } else if (ctx->export_flags & V9FS_SM_NONE) {
14492c30dd74SAneesh Kumar K.V         ctx->xops = none_xattr_ops;
14502c30dd74SAneesh Kumar K.V     } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) {
14512c30dd74SAneesh Kumar K.V         /*
14522c30dd74SAneesh Kumar K.V          * xattr operation for mapped-file and passthrough
14532c30dd74SAneesh Kumar K.V          * remain same.
14542c30dd74SAneesh Kumar K.V          */
14552c30dd74SAneesh Kumar K.V         ctx->xops = passthrough_xattr_ops;
14562c30dd74SAneesh Kumar K.V     }
1457c98f1d4aSAneesh Kumar K.V     ctx->export_flags |= V9FS_PATHNAME_FSCONTEXT;
145800c90bd1SGreg Kurz 
14590e35a378SGreg Kurz     ctx->private = data;
146000c90bd1SGreg Kurz     return 0;
14610e35a378SGreg Kurz 
14620e35a378SGreg Kurz err:
14630e35a378SGreg Kurz     g_free(data);
14640e35a378SGreg Kurz     return -1;
1465e06a765eSHarsh Prateek Bora }
14660e35a378SGreg Kurz 
14670e35a378SGreg Kurz static void local_cleanup(FsContext *ctx)
14680e35a378SGreg Kurz {
14690e35a378SGreg Kurz     LocalData *data = ctx->private;
14700e35a378SGreg Kurz 
1471c0da0cb7SGreg Kurz     if (!data) {
1472c0da0cb7SGreg Kurz         return;
1473c0da0cb7SGreg Kurz     }
1474c0da0cb7SGreg Kurz 
14750e35a378SGreg Kurz     close(data->mountfd);
14760e35a378SGreg Kurz     g_free(data);
14770174fe73SAneesh Kumar K.V }
14780174fe73SAneesh Kumar K.V 
14794c5ec47eSVladimir Sementsov-Ogievskiy static void error_append_security_model_hint(Error *const *errp)
148091cda4e8SGreg Kurz {
148191cda4e8SGreg Kurz     error_append_hint(errp, "Valid options are: security_model="
148291cda4e8SGreg Kurz                       "[passthrough|mapped-xattr|mapped-file|none]\n");
148391cda4e8SGreg Kurz }
148491cda4e8SGreg Kurz 
148591cda4e8SGreg Kurz static int local_parse_opts(QemuOpts *opts, FsDriverEntry *fse, Error **errp)
148699519f0aSAneesh Kumar K.V {
148792c45122SVladimir Sementsov-Ogievskiy     ERRP_GUARD();
148899519f0aSAneesh Kumar K.V     const char *sec_model = qemu_opt_get(opts, "security_model");
148999519f0aSAneesh Kumar K.V     const char *path = qemu_opt_get(opts, "path");
14901a6ed33cSAntonios Motakis     const char *multidevs = qemu_opt_get(opts, "multidevs");
149199519f0aSAneesh Kumar K.V 
149299519f0aSAneesh Kumar K.V     if (!sec_model) {
149391cda4e8SGreg Kurz         error_setg(errp, "security_model property not set");
149491cda4e8SGreg Kurz         error_append_security_model_hint(errp);
149599519f0aSAneesh Kumar K.V         return -1;
149699519f0aSAneesh Kumar K.V     }
149799519f0aSAneesh Kumar K.V 
149899519f0aSAneesh Kumar K.V     if (!strcmp(sec_model, "passthrough")) {
149999519f0aSAneesh Kumar K.V         fse->export_flags |= V9FS_SM_PASSTHROUGH;
15002c30dd74SAneesh Kumar K.V     } else if (!strcmp(sec_model, "mapped") ||
15012c30dd74SAneesh Kumar K.V                !strcmp(sec_model, "mapped-xattr")) {
150299519f0aSAneesh Kumar K.V         fse->export_flags |= V9FS_SM_MAPPED;
150399519f0aSAneesh Kumar K.V     } else if (!strcmp(sec_model, "none")) {
150499519f0aSAneesh Kumar K.V         fse->export_flags |= V9FS_SM_NONE;
15052c30dd74SAneesh Kumar K.V     } else if (!strcmp(sec_model, "mapped-file")) {
15062c30dd74SAneesh Kumar K.V         fse->export_flags |= V9FS_SM_MAPPED_FILE;
150799519f0aSAneesh Kumar K.V     } else {
150891cda4e8SGreg Kurz         error_setg(errp, "invalid security_model property '%s'", sec_model);
150991cda4e8SGreg Kurz         error_append_security_model_hint(errp);
151099519f0aSAneesh Kumar K.V         return -1;
151199519f0aSAneesh Kumar K.V     }
151299519f0aSAneesh Kumar K.V 
15131a6ed33cSAntonios Motakis     if (multidevs) {
15141a6ed33cSAntonios Motakis         if (!strcmp(multidevs, "remap")) {
15151a6ed33cSAntonios Motakis             fse->export_flags &= ~V9FS_FORBID_MULTIDEVS;
15161a6ed33cSAntonios Motakis             fse->export_flags |= V9FS_REMAP_INODES;
15171a6ed33cSAntonios Motakis         } else if (!strcmp(multidevs, "forbid")) {
15181a6ed33cSAntonios Motakis             fse->export_flags &= ~V9FS_REMAP_INODES;
15191a6ed33cSAntonios Motakis             fse->export_flags |= V9FS_FORBID_MULTIDEVS;
15201a6ed33cSAntonios Motakis         } else if (!strcmp(multidevs, "warn")) {
15211a6ed33cSAntonios Motakis             fse->export_flags &= ~V9FS_FORBID_MULTIDEVS;
15221a6ed33cSAntonios Motakis             fse->export_flags &= ~V9FS_REMAP_INODES;
15231a6ed33cSAntonios Motakis         } else {
152492c45122SVladimir Sementsov-Ogievskiy             error_setg(errp, "invalid multidevs property '%s'",
15251a6ed33cSAntonios Motakis                        multidevs);
152692c45122SVladimir Sementsov-Ogievskiy             error_append_hint(errp, "Valid options are: multidevs="
15271a6ed33cSAntonios Motakis                               "[remap|forbid|warn]\n");
15281a6ed33cSAntonios Motakis             return -1;
15291a6ed33cSAntonios Motakis         }
15301a6ed33cSAntonios Motakis     }
15311a6ed33cSAntonios Motakis 
153299519f0aSAneesh Kumar K.V     if (!path) {
153391cda4e8SGreg Kurz         error_setg(errp, "path property not set");
153499519f0aSAneesh Kumar K.V         return -1;
153599519f0aSAneesh Kumar K.V     }
1536b8bbdb88SPradeep Jagadeesh 
153792c45122SVladimir Sementsov-Ogievskiy     if (fsdev_throttle_parse_opts(opts, &fse->fst, errp)) {
153892c45122SVladimir Sementsov-Ogievskiy         error_prepend(errp, "invalid throttle configuration: ");
1539b8bbdb88SPradeep Jagadeesh         return -1;
1540b8bbdb88SPradeep Jagadeesh     }
1541b8bbdb88SPradeep Jagadeesh 
1542b96feb2cSTobias Schramm     if (fse->export_flags & V9FS_SM_MAPPED ||
1543b96feb2cSTobias Schramm         fse->export_flags & V9FS_SM_MAPPED_FILE) {
1544b96feb2cSTobias Schramm         fse->fmode =
1545b96feb2cSTobias Schramm             qemu_opt_get_number(opts, "fmode", SM_LOCAL_MODE_BITS) & 0777;
1546b96feb2cSTobias Schramm         fse->dmode =
1547b96feb2cSTobias Schramm             qemu_opt_get_number(opts, "dmode", SM_LOCAL_DIR_MODE_BITS) & 0777;
1548b96feb2cSTobias Schramm     } else {
1549b96feb2cSTobias Schramm         if (qemu_opt_find(opts, "fmode")) {
155091cda4e8SGreg Kurz             error_setg(errp, "fmode is only valid for mapped security modes");
1551b96feb2cSTobias Schramm             return -1;
1552b96feb2cSTobias Schramm         }
1553b96feb2cSTobias Schramm         if (qemu_opt_find(opts, "dmode")) {
155491cda4e8SGreg Kurz             error_setg(errp, "dmode is only valid for mapped security modes");
1555b96feb2cSTobias Schramm             return -1;
1556b96feb2cSTobias Schramm         }
1557b96feb2cSTobias Schramm     }
1558b96feb2cSTobias Schramm 
155999519f0aSAneesh Kumar K.V     fse->path = g_strdup(path);
156099519f0aSAneesh Kumar K.V 
156199519f0aSAneesh Kumar K.V     return 0;
156299519f0aSAneesh Kumar K.V }
156399519f0aSAneesh Kumar K.V 
15649f107513SAnthony Liguori FileOperations local_ops = {
156599519f0aSAneesh Kumar K.V     .parse_opts = local_parse_opts,
15660174fe73SAneesh Kumar K.V     .init  = local_init,
15670e35a378SGreg Kurz     .cleanup = local_cleanup,
1568131dcb25SAnthony Liguori     .lstat = local_lstat,
1569131dcb25SAnthony Liguori     .readlink = local_readlink,
1570131dcb25SAnthony Liguori     .close = local_close,
1571131dcb25SAnthony Liguori     .closedir = local_closedir,
1572a6568fe2SAnthony Liguori     .open = local_open,
1573a6568fe2SAnthony Liguori     .opendir = local_opendir,
1574a9231555SAnthony Liguori     .rewinddir = local_rewinddir,
1575a9231555SAnthony Liguori     .telldir = local_telldir,
1576635324e8SGreg Kurz     .readdir = local_readdir,
1577a9231555SAnthony Liguori     .seekdir = local_seekdir,
157856d15a53SSanchit Garg     .preadv = local_preadv,
157956d15a53SSanchit Garg     .pwritev = local_pwritev,
1580c494dd6fSAnthony Liguori     .chmod = local_chmod,
1581c494dd6fSAnthony Liguori     .mknod = local_mknod,
1582c494dd6fSAnthony Liguori     .mkdir = local_mkdir,
1583c494dd6fSAnthony Liguori     .fstat = local_fstat,
1584c494dd6fSAnthony Liguori     .open2 = local_open2,
1585c494dd6fSAnthony Liguori     .symlink = local_symlink,
1586c494dd6fSAnthony Liguori     .link = local_link,
15878cf89e00SAnthony Liguori     .truncate = local_truncate,
15888cf89e00SAnthony Liguori     .rename = local_rename,
15898cf89e00SAnthony Liguori     .chown = local_chown,
159074bc02b2SM. Mohan Kumar     .utimensat = local_utimensat,
15915bae1900SAnthony Liguori     .remove = local_remove,
15928cf89e00SAnthony Liguori     .fsync = local_fsync,
1593be940c87SM. Mohan Kumar     .statfs = local_statfs,
1594fa32ef88SAneesh Kumar K.V     .lgetxattr = local_lgetxattr,
1595fa32ef88SAneesh Kumar K.V     .llistxattr = local_llistxattr,
159610b468bdSAneesh Kumar K.V     .lsetxattr = local_lsetxattr,
15979ed3ef26SAneesh Kumar K.V     .lremovexattr = local_lremovexattr,
15982289be19SAneesh Kumar K.V     .name_to_path = local_name_to_path,
15992289be19SAneesh Kumar K.V     .renameat  = local_renameat,
16002289be19SAneesh Kumar K.V     .unlinkat = local_unlinkat,
16019f107513SAnthony Liguori };
1602