19f107513SAnthony Liguori /* 2f00d4f59SWei Liu * 9p Posix callback 39f107513SAnthony Liguori * 49f107513SAnthony Liguori * Copyright IBM, Corp. 2010 59f107513SAnthony Liguori * 69f107513SAnthony Liguori * Authors: 79f107513SAnthony Liguori * Anthony Liguori <aliguori@us.ibm.com> 89f107513SAnthony Liguori * 99f107513SAnthony Liguori * This work is licensed under the terms of the GNU GPL, version 2. See 109f107513SAnthony Liguori * the COPYING file in the top-level directory. 119f107513SAnthony Liguori */ 12873c3213SStefan Weil 13*6f569084SChristian Schoenebeck /* 14*6f569084SChristian Schoenebeck * Not so fast! You might want to read the 9p developer docs first: 15*6f569084SChristian Schoenebeck * https://wiki.qemu.org/Documentation/9p 16*6f569084SChristian Schoenebeck */ 17*6f569084SChristian Schoenebeck 18fbc04127SPeter Maydell #include "qemu/osdep.h" 19ebe74f8bSWei Liu #include "9p.h" 20996a0d76SGreg Kurz #include "9p-local.h" 21267ae092SWei Liu #include "9p-xattr.h" 220e35a378SGreg Kurz #include "9p-util.h" 2369b15212SStefan Weil #include "fsdev/qemu-fsdev.h" /* local_ops */ 24c494dd6fSAnthony Liguori #include <arpa/inet.h> 25131dcb25SAnthony Liguori #include <pwd.h> 26131dcb25SAnthony Liguori #include <grp.h> 27c494dd6fSAnthony Liguori #include <sys/socket.h> 28c494dd6fSAnthony Liguori #include <sys/un.h> 291de7afc9SPaolo Bonzini #include "qemu/xattr.h" 30e688df6bSMarkus Armbruster #include "qapi/error.h" 31f348b6d1SVeronia Bahaa #include "qemu/cutils.h" 3263325b18SGreg Kurz #include "qemu/error-report.h" 33922a01a0SMarkus Armbruster #include "qemu/option.h" 342c30dd74SAneesh Kumar K.V #include <libgen.h> 35e06a765eSHarsh Prateek Bora #include <linux/fs.h> 36e06a765eSHarsh Prateek Bora #ifdef CONFIG_LINUX_MAGIC_H 37e06a765eSHarsh Prateek Bora #include <linux/magic.h> 38e06a765eSHarsh Prateek Bora #endif 39e06a765eSHarsh Prateek Bora #include <sys/ioctl.h> 40e06a765eSHarsh Prateek Bora 41e06a765eSHarsh Prateek Bora #ifndef XFS_SUPER_MAGIC 42e06a765eSHarsh Prateek Bora #define XFS_SUPER_MAGIC 0x58465342 43e06a765eSHarsh Prateek Bora #endif 44e06a765eSHarsh Prateek Bora #ifndef EXT2_SUPER_MAGIC 45e06a765eSHarsh Prateek Bora #define EXT2_SUPER_MAGIC 0xEF53 46e06a765eSHarsh Prateek Bora #endif 47e06a765eSHarsh Prateek Bora #ifndef REISERFS_SUPER_MAGIC 48e06a765eSHarsh Prateek Bora #define REISERFS_SUPER_MAGIC 0x52654973 49e06a765eSHarsh Prateek Bora #endif 50e06a765eSHarsh Prateek Bora #ifndef BTRFS_SUPER_MAGIC 51e06a765eSHarsh Prateek Bora #define BTRFS_SUPER_MAGIC 0x9123683E 52e06a765eSHarsh Prateek Bora #endif 53131dcb25SAnthony Liguori 540e35a378SGreg Kurz typedef struct { 550e35a378SGreg Kurz int mountfd; 560e35a378SGreg Kurz } LocalData; 570e35a378SGreg Kurz 58996a0d76SGreg Kurz int local_open_nofollow(FsContext *fs_ctx, const char *path, int flags, 59996a0d76SGreg Kurz mode_t mode) 60996a0d76SGreg Kurz { 61996a0d76SGreg Kurz LocalData *data = fs_ctx->private; 623dbcf273SGreg Kurz int fd = data->mountfd; 63996a0d76SGreg Kurz 643dbcf273SGreg Kurz while (*path && fd != -1) { 653dbcf273SGreg Kurz const char *c; 663dbcf273SGreg Kurz int next_fd; 673dbcf273SGreg Kurz char *head; 683dbcf273SGreg Kurz 693dbcf273SGreg Kurz /* Only relative paths without consecutive slashes */ 703dbcf273SGreg Kurz assert(*path != '/'); 713dbcf273SGreg Kurz 723dbcf273SGreg Kurz head = g_strdup(path); 735c99fa37SKeno Fischer c = qemu_strchrnul(path, '/'); 743dbcf273SGreg Kurz if (*c) { 753dbcf273SGreg Kurz /* Intermediate path element */ 763dbcf273SGreg Kurz head[c - path] = 0; 773dbcf273SGreg Kurz path = c + 1; 783dbcf273SGreg Kurz next_fd = openat_dir(fd, head); 793dbcf273SGreg Kurz } else { 803dbcf273SGreg Kurz /* Rightmost path element */ 813dbcf273SGreg Kurz next_fd = openat_file(fd, head, flags, mode); 823dbcf273SGreg Kurz path = c; 833dbcf273SGreg Kurz } 843dbcf273SGreg Kurz g_free(head); 853dbcf273SGreg Kurz if (fd != data->mountfd) { 863dbcf273SGreg Kurz close_preserve_errno(fd); 873dbcf273SGreg Kurz } 883dbcf273SGreg Kurz fd = next_fd; 89996a0d76SGreg Kurz } 90996a0d76SGreg Kurz 913dbcf273SGreg Kurz assert(fd != data->mountfd); 923dbcf273SGreg Kurz return fd; 93996a0d76SGreg Kurz } 94996a0d76SGreg Kurz 95996a0d76SGreg Kurz int local_opendir_nofollow(FsContext *fs_ctx, const char *path) 96996a0d76SGreg Kurz { 97996a0d76SGreg Kurz return local_open_nofollow(fs_ctx, path, O_DIRECTORY | O_RDONLY, 0); 98996a0d76SGreg Kurz } 99996a0d76SGreg Kurz 10099f2cf4bSGreg Kurz static void renameat_preserve_errno(int odirfd, const char *opath, int ndirfd, 10199f2cf4bSGreg Kurz const char *npath) 10299f2cf4bSGreg Kurz { 10399f2cf4bSGreg Kurz int serrno = errno; 10499f2cf4bSGreg Kurz renameat(odirfd, opath, ndirfd, npath); 10599f2cf4bSGreg Kurz errno = serrno; 10699f2cf4bSGreg Kurz } 10799f2cf4bSGreg Kurz 108ad0b46e6SGreg Kurz static void unlinkat_preserve_errno(int dirfd, const char *path, int flags) 109ad0b46e6SGreg Kurz { 110ad0b46e6SGreg Kurz int serrno = errno; 111ad0b46e6SGreg Kurz unlinkat(dirfd, path, flags); 112ad0b46e6SGreg Kurz errno = serrno; 113ad0b46e6SGreg Kurz } 114ad0b46e6SGreg Kurz 1152c30dd74SAneesh Kumar K.V #define VIRTFS_META_DIR ".virtfs_metadata" 11681ffbf5aSGreg Kurz #define VIRTFS_META_ROOT_FILE VIRTFS_META_DIR "_root" 1172c30dd74SAneesh Kumar K.V 118f9aef99bSGreg Kurz static FILE *local_fopenat(int dirfd, const char *name, const char *mode) 1190ceb092eSAneesh Kumar K.V { 1200ceb092eSAneesh Kumar K.V int fd, o_mode = 0; 1210ceb092eSAneesh Kumar K.V FILE *fp; 122f9aef99bSGreg Kurz int flags; 1230ceb092eSAneesh Kumar K.V /* 1240ceb092eSAneesh Kumar K.V * only supports two modes 1250ceb092eSAneesh Kumar K.V */ 1260ceb092eSAneesh Kumar K.V if (mode[0] == 'r') { 127f9aef99bSGreg Kurz flags = O_RDONLY; 1280ceb092eSAneesh Kumar K.V } else if (mode[0] == 'w') { 129f9aef99bSGreg Kurz flags = O_WRONLY | O_TRUNC | O_CREAT; 1300ceb092eSAneesh Kumar K.V o_mode = S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH; 1310ceb092eSAneesh Kumar K.V } else { 1320ceb092eSAneesh Kumar K.V return NULL; 1330ceb092eSAneesh Kumar K.V } 134f9aef99bSGreg Kurz fd = openat_file(dirfd, name, flags, o_mode); 1350ceb092eSAneesh Kumar K.V if (fd == -1) { 1360ceb092eSAneesh Kumar K.V return NULL; 1370ceb092eSAneesh Kumar K.V } 1380ceb092eSAneesh Kumar K.V fp = fdopen(fd, mode); 1390ceb092eSAneesh Kumar K.V if (!fp) { 1400ceb092eSAneesh Kumar K.V close(fd); 1410ceb092eSAneesh Kumar K.V } 1420ceb092eSAneesh Kumar K.V return fp; 1430ceb092eSAneesh Kumar K.V } 1440ceb092eSAneesh Kumar K.V 1452c30dd74SAneesh Kumar K.V #define ATTR_MAX 100 146f9aef99bSGreg Kurz static void local_mapped_file_attr(int dirfd, const char *name, 1472c30dd74SAneesh Kumar K.V struct stat *stbuf) 1482c30dd74SAneesh Kumar K.V { 1492c30dd74SAneesh Kumar K.V FILE *fp; 1502c30dd74SAneesh Kumar K.V char buf[ATTR_MAX]; 151f9aef99bSGreg Kurz int map_dirfd; 1522c30dd74SAneesh Kumar K.V 15381ffbf5aSGreg Kurz if (strcmp(name, ".")) { 15499f2cf4bSGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 155f9aef99bSGreg Kurz if (map_dirfd == -1) { 156f9aef99bSGreg Kurz return; 157f9aef99bSGreg Kurz } 158f9aef99bSGreg Kurz 159f9aef99bSGreg Kurz fp = local_fopenat(map_dirfd, name, "r"); 160f9aef99bSGreg Kurz close_preserve_errno(map_dirfd); 16181ffbf5aSGreg Kurz } else { 16281ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r"); 16381ffbf5aSGreg Kurz } 1642c30dd74SAneesh Kumar K.V if (!fp) { 1652c30dd74SAneesh Kumar K.V return; 1662c30dd74SAneesh Kumar K.V } 1672c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 1682c30dd74SAneesh Kumar K.V while (fgets(buf, ATTR_MAX, fp)) { 1692c30dd74SAneesh Kumar K.V if (!strncmp(buf, "virtfs.uid", 10)) { 1702c30dd74SAneesh Kumar K.V stbuf->st_uid = atoi(buf + 11); 1712c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.gid", 10)) { 1722c30dd74SAneesh Kumar K.V stbuf->st_gid = atoi(buf + 11); 1732c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.mode", 11)) { 1742c30dd74SAneesh Kumar K.V stbuf->st_mode = atoi(buf + 12); 1752c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.rdev", 11)) { 1762c30dd74SAneesh Kumar K.V stbuf->st_rdev = atoi(buf + 12); 1772c30dd74SAneesh Kumar K.V } 1782c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 1792c30dd74SAneesh Kumar K.V } 1802c30dd74SAneesh Kumar K.V fclose(fp); 1812c30dd74SAneesh Kumar K.V } 1822c30dd74SAneesh Kumar K.V 1832289be19SAneesh Kumar K.V static int local_lstat(FsContext *fs_ctx, V9fsPath *fs_path, struct stat *stbuf) 184131dcb25SAnthony Liguori { 185f9aef99bSGreg Kurz int err = -1; 186f9aef99bSGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 187f9aef99bSGreg Kurz char *name = g_path_get_basename(fs_path->data); 188f9aef99bSGreg Kurz int dirfd; 1892289be19SAneesh Kumar K.V 190f9aef99bSGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 191f9aef99bSGreg Kurz if (dirfd == -1) { 192f9aef99bSGreg Kurz goto out; 193f9aef99bSGreg Kurz } 194f9aef99bSGreg Kurz 195f9aef99bSGreg Kurz err = fstatat(dirfd, name, stbuf, AT_SYMLINK_NOFOLLOW); 1961237ad76SVenkateswararao Jujjuri (JV) if (err) { 1974fa4ce71SChen Gang goto err_out; 1981237ad76SVenkateswararao Jujjuri (JV) } 199b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 2001237ad76SVenkateswararao Jujjuri (JV) /* Actual credentials are part of extended attrs */ 2011237ad76SVenkateswararao Jujjuri (JV) uid_t tmp_uid; 2021237ad76SVenkateswararao Jujjuri (JV) gid_t tmp_gid; 2031237ad76SVenkateswararao Jujjuri (JV) mode_t tmp_mode; 2041237ad76SVenkateswararao Jujjuri (JV) dev_t tmp_dev; 205f9aef99bSGreg Kurz 206f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.uid", &tmp_uid, 207f9aef99bSGreg Kurz sizeof(uid_t)) > 0) { 208f8ad4a89SAneesh Kumar K.V stbuf->st_uid = le32_to_cpu(tmp_uid); 2091237ad76SVenkateswararao Jujjuri (JV) } 210f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.gid", &tmp_gid, 211f9aef99bSGreg Kurz sizeof(gid_t)) > 0) { 212f8ad4a89SAneesh Kumar K.V stbuf->st_gid = le32_to_cpu(tmp_gid); 2131237ad76SVenkateswararao Jujjuri (JV) } 214f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.mode", &tmp_mode, 215f9aef99bSGreg Kurz sizeof(mode_t)) > 0) { 216f8ad4a89SAneesh Kumar K.V stbuf->st_mode = le32_to_cpu(tmp_mode); 2171237ad76SVenkateswararao Jujjuri (JV) } 218f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.rdev", &tmp_dev, 219f9aef99bSGreg Kurz sizeof(dev_t)) > 0) { 220f8ad4a89SAneesh Kumar K.V stbuf->st_rdev = le64_to_cpu(tmp_dev); 2211237ad76SVenkateswararao Jujjuri (JV) } 2222c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 223f9aef99bSGreg Kurz local_mapped_file_attr(dirfd, name, stbuf); 2241237ad76SVenkateswararao Jujjuri (JV) } 2254fa4ce71SChen Gang 2264fa4ce71SChen Gang err_out: 227f9aef99bSGreg Kurz close_preserve_errno(dirfd); 228f9aef99bSGreg Kurz out: 229f9aef99bSGreg Kurz g_free(name); 230f9aef99bSGreg Kurz g_free(dirpath); 2311237ad76SVenkateswararao Jujjuri (JV) return err; 232131dcb25SAnthony Liguori } 233131dcb25SAnthony Liguori 234e3187a45SGreg Kurz static int local_set_mapped_file_attrat(int dirfd, const char *name, 235e3187a45SGreg Kurz FsCred *credp) 2362c30dd74SAneesh Kumar K.V { 2372c30dd74SAneesh Kumar K.V FILE *fp; 238e3187a45SGreg Kurz int ret; 2392c30dd74SAneesh Kumar K.V char buf[ATTR_MAX]; 2402c30dd74SAneesh Kumar K.V int uid = -1, gid = -1, mode = -1, rdev = -1; 24181ffbf5aSGreg Kurz int map_dirfd = -1, map_fd; 24281ffbf5aSGreg Kurz bool is_root = !strcmp(name, "."); 2432c30dd74SAneesh Kumar K.V 24481ffbf5aSGreg Kurz if (is_root) { 24581ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r"); 24681ffbf5aSGreg Kurz if (!fp) { 24781ffbf5aSGreg Kurz if (errno == ENOENT) { 24881ffbf5aSGreg Kurz goto update_map_file; 24981ffbf5aSGreg Kurz } else { 25081ffbf5aSGreg Kurz return -1; 25181ffbf5aSGreg Kurz } 25281ffbf5aSGreg Kurz } 25381ffbf5aSGreg Kurz } else { 254e3187a45SGreg Kurz ret = mkdirat(dirfd, VIRTFS_META_DIR, 0700); 255e3187a45SGreg Kurz if (ret < 0 && errno != EEXIST) { 256e3187a45SGreg Kurz return -1; 257e3187a45SGreg Kurz } 258e3187a45SGreg Kurz 259e3187a45SGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 260e3187a45SGreg Kurz if (map_dirfd == -1) { 261e3187a45SGreg Kurz return -1; 262e3187a45SGreg Kurz } 263e3187a45SGreg Kurz 264e3187a45SGreg Kurz fp = local_fopenat(map_dirfd, name, "r"); 2652c30dd74SAneesh Kumar K.V if (!fp) { 266e3187a45SGreg Kurz if (errno == ENOENT) { 267e3187a45SGreg Kurz goto update_map_file; 268e3187a45SGreg Kurz } else { 269e3187a45SGreg Kurz close_preserve_errno(map_dirfd); 270e3187a45SGreg Kurz return -1; 271e3187a45SGreg Kurz } 2722c30dd74SAneesh Kumar K.V } 27381ffbf5aSGreg Kurz } 2742c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 2752c30dd74SAneesh Kumar K.V while (fgets(buf, ATTR_MAX, fp)) { 2762c30dd74SAneesh Kumar K.V if (!strncmp(buf, "virtfs.uid", 10)) { 2772c30dd74SAneesh Kumar K.V uid = atoi(buf + 11); 2782c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.gid", 10)) { 2792c30dd74SAneesh Kumar K.V gid = atoi(buf + 11); 2802c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.mode", 11)) { 2812c30dd74SAneesh Kumar K.V mode = atoi(buf + 12); 2822c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.rdev", 11)) { 2832c30dd74SAneesh Kumar K.V rdev = atoi(buf + 12); 2842c30dd74SAneesh Kumar K.V } 2852c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 2862c30dd74SAneesh Kumar K.V } 2872c30dd74SAneesh Kumar K.V fclose(fp); 2882c30dd74SAneesh Kumar K.V 2892c30dd74SAneesh Kumar K.V update_map_file: 29081ffbf5aSGreg Kurz if (is_root) { 29181ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "w"); 29281ffbf5aSGreg Kurz } else { 293e3187a45SGreg Kurz fp = local_fopenat(map_dirfd, name, "w"); 29481ffbf5aSGreg Kurz /* We can't go this far with map_dirfd not being a valid file descriptor 29581ffbf5aSGreg Kurz * but some versions of gcc aren't smart enough to see it. 29681ffbf5aSGreg Kurz */ 29781ffbf5aSGreg Kurz if (map_dirfd != -1) { 298e3187a45SGreg Kurz close_preserve_errno(map_dirfd); 29981ffbf5aSGreg Kurz } 30081ffbf5aSGreg Kurz } 3012c30dd74SAneesh Kumar K.V if (!fp) { 302e3187a45SGreg Kurz return -1; 3032c30dd74SAneesh Kumar K.V } 3042c30dd74SAneesh Kumar K.V 30581ffbf5aSGreg Kurz map_fd = fileno(fp); 30681ffbf5aSGreg Kurz assert(map_fd != -1); 30781ffbf5aSGreg Kurz ret = fchmod(map_fd, 0600); 30881ffbf5aSGreg Kurz assert(ret == 0); 30981ffbf5aSGreg Kurz 3102c30dd74SAneesh Kumar K.V if (credp->fc_uid != -1) { 3112c30dd74SAneesh Kumar K.V uid = credp->fc_uid; 3122c30dd74SAneesh Kumar K.V } 3132c30dd74SAneesh Kumar K.V if (credp->fc_gid != -1) { 3142c30dd74SAneesh Kumar K.V gid = credp->fc_gid; 3152c30dd74SAneesh Kumar K.V } 316230f1b31SKeno Fischer if (credp->fc_mode != (mode_t)-1) { 3172c30dd74SAneesh Kumar K.V mode = credp->fc_mode; 3182c30dd74SAneesh Kumar K.V } 3192c30dd74SAneesh Kumar K.V if (credp->fc_rdev != -1) { 3202c30dd74SAneesh Kumar K.V rdev = credp->fc_rdev; 3212c30dd74SAneesh Kumar K.V } 3222c30dd74SAneesh Kumar K.V 3232c30dd74SAneesh Kumar K.V if (uid != -1) { 3242c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.uid=%d\n", uid); 3252c30dd74SAneesh Kumar K.V } 3262c30dd74SAneesh Kumar K.V if (gid != -1) { 3272c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.gid=%d\n", gid); 3282c30dd74SAneesh Kumar K.V } 3292c30dd74SAneesh Kumar K.V if (mode != -1) { 3302c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.mode=%d\n", mode); 3312c30dd74SAneesh Kumar K.V } 3322c30dd74SAneesh Kumar K.V if (rdev != -1) { 3332c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.rdev=%d\n", rdev); 3342c30dd74SAneesh Kumar K.V } 3352c30dd74SAneesh Kumar K.V fclose(fp); 3362c30dd74SAneesh Kumar K.V 337e3187a45SGreg Kurz return 0; 338e3187a45SGreg Kurz } 339e3187a45SGreg Kurz 340e3187a45SGreg Kurz static int fchmodat_nofollow(int dirfd, const char *name, mode_t mode) 341e3187a45SGreg Kurz { 3424751fd53SGreg Kurz struct stat stbuf; 343e3187a45SGreg Kurz int fd, ret; 344e3187a45SGreg Kurz 345e3187a45SGreg Kurz /* FIXME: this should be handled with fchmodat(AT_SYMLINK_NOFOLLOW). 3464751fd53SGreg Kurz * Unfortunately, the linux kernel doesn't implement it yet. 347e3187a45SGreg Kurz */ 3484751fd53SGreg Kurz 3494751fd53SGreg Kurz /* First, we clear non-racing symlinks out of the way. */ 3504751fd53SGreg Kurz if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW)) { 3514751fd53SGreg Kurz return -1; 3524751fd53SGreg Kurz } 3534751fd53SGreg Kurz if (S_ISLNK(stbuf.st_mode)) { 3544751fd53SGreg Kurz errno = ELOOP; 3554751fd53SGreg Kurz return -1; 3564751fd53SGreg Kurz } 3574751fd53SGreg Kurz 358aa5e85a1SGreg Kurz fd = openat_file(dirfd, name, O_RDONLY | O_PATH_9P_UTIL | O_NOFOLLOW, 0); 3594751fd53SGreg Kurz #if O_PATH_9P_UTIL == 0 360aa5e85a1SGreg Kurz /* Fallback for systems that don't support O_PATH: we depend on the file 361aa5e85a1SGreg Kurz * being readable or writable. 362aa5e85a1SGreg Kurz */ 363e3187a45SGreg Kurz if (fd == -1) { 364e3187a45SGreg Kurz /* In case the file is writable-only and isn't a directory. */ 365e3187a45SGreg Kurz if (errno == EACCES) { 366e3187a45SGreg Kurz fd = openat_file(dirfd, name, O_WRONLY, 0); 367e3187a45SGreg Kurz } 368e3187a45SGreg Kurz if (fd == -1 && errno == EISDIR) { 369e3187a45SGreg Kurz errno = EACCES; 370e3187a45SGreg Kurz } 371e3187a45SGreg Kurz } 372e3187a45SGreg Kurz if (fd == -1) { 373e3187a45SGreg Kurz return -1; 374e3187a45SGreg Kurz } 375e3187a45SGreg Kurz ret = fchmod(fd, mode); 3764751fd53SGreg Kurz #else 377aa5e85a1SGreg Kurz /* Access modes are ignored when O_PATH is supported. If name is a symbolic 378aa5e85a1SGreg Kurz * link, O_PATH | O_NOFOLLOW causes openat(2) to return a file descriptor 379aa5e85a1SGreg Kurz * referring to the symbolic link. 380aa5e85a1SGreg Kurz */ 3814751fd53SGreg Kurz if (fd == -1) { 3824751fd53SGreg Kurz return -1; 3834751fd53SGreg Kurz } 3844751fd53SGreg Kurz 3854751fd53SGreg Kurz /* Now we handle racing symlinks. */ 3864751fd53SGreg Kurz ret = fstat(fd, &stbuf); 3874751fd53SGreg Kurz if (!ret) { 3884751fd53SGreg Kurz if (S_ISLNK(stbuf.st_mode)) { 3894751fd53SGreg Kurz errno = ELOOP; 3904751fd53SGreg Kurz ret = -1; 3914751fd53SGreg Kurz } else { 3924751fd53SGreg Kurz char *proc_path = g_strdup_printf("/proc/self/fd/%d", fd); 3934751fd53SGreg Kurz ret = chmod(proc_path, mode); 3944751fd53SGreg Kurz g_free(proc_path); 3954751fd53SGreg Kurz } 3964751fd53SGreg Kurz } 3974751fd53SGreg Kurz #endif 398e3187a45SGreg Kurz close_preserve_errno(fd); 3992c30dd74SAneesh Kumar K.V return ret; 4002c30dd74SAneesh Kumar K.V } 4012c30dd74SAneesh Kumar K.V 402e3187a45SGreg Kurz static int local_set_xattrat(int dirfd, const char *path, FsCred *credp) 403131dcb25SAnthony Liguori { 404758e8e38SVenkateswararao Jujjuri (JV) int err; 4052289be19SAneesh Kumar K.V 406758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_uid != -1) { 407f8ad4a89SAneesh Kumar K.V uint32_t tmp_uid = cpu_to_le32(credp->fc_uid); 408e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.uid", &tmp_uid, 409e3187a45SGreg Kurz sizeof(uid_t), 0); 410758e8e38SVenkateswararao Jujjuri (JV) if (err) { 411758e8e38SVenkateswararao Jujjuri (JV) return err; 412131dcb25SAnthony Liguori } 413131dcb25SAnthony Liguori } 414758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_gid != -1) { 415f8ad4a89SAneesh Kumar K.V uint32_t tmp_gid = cpu_to_le32(credp->fc_gid); 416e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.gid", &tmp_gid, 417e3187a45SGreg Kurz sizeof(gid_t), 0); 418758e8e38SVenkateswararao Jujjuri (JV) if (err) { 419758e8e38SVenkateswararao Jujjuri (JV) return err; 420131dcb25SAnthony Liguori } 421131dcb25SAnthony Liguori } 422230f1b31SKeno Fischer if (credp->fc_mode != (mode_t)-1) { 423f8ad4a89SAneesh Kumar K.V uint32_t tmp_mode = cpu_to_le32(credp->fc_mode); 424e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.mode", &tmp_mode, 425e3187a45SGreg Kurz sizeof(mode_t), 0); 426758e8e38SVenkateswararao Jujjuri (JV) if (err) { 427758e8e38SVenkateswararao Jujjuri (JV) return err; 428131dcb25SAnthony Liguori } 429131dcb25SAnthony Liguori } 430758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_rdev != -1) { 431f8ad4a89SAneesh Kumar K.V uint64_t tmp_rdev = cpu_to_le64(credp->fc_rdev); 432e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.rdev", &tmp_rdev, 433e3187a45SGreg Kurz sizeof(dev_t), 0); 434758e8e38SVenkateswararao Jujjuri (JV) if (err) { 435758e8e38SVenkateswararao Jujjuri (JV) return err; 436131dcb25SAnthony Liguori } 437758e8e38SVenkateswararao Jujjuri (JV) } 438131dcb25SAnthony Liguori return 0; 439131dcb25SAnthony Liguori } 440131dcb25SAnthony Liguori 441d815e721SGreg Kurz static int local_set_cred_passthrough(FsContext *fs_ctx, int dirfd, 442d815e721SGreg Kurz const char *name, FsCred *credp) 4434750a96fSVenkateswararao Jujjuri (JV) { 444d815e721SGreg Kurz if (fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 445b314f6a0SGreg Kurz AT_SYMLINK_NOFOLLOW) < 0) { 44612848bfcSAneesh Kumar K.V /* 44712848bfcSAneesh Kumar K.V * If we fail to change ownership and if we are 44812848bfcSAneesh Kumar K.V * using security model none. Ignore the error 44912848bfcSAneesh Kumar K.V */ 450b97400caSAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) { 4514fa4ce71SChen Gang return -1; 4524750a96fSVenkateswararao Jujjuri (JV) } 453d815e721SGreg Kurz } 454d815e721SGreg Kurz 455d815e721SGreg Kurz return fchmodat_nofollow(dirfd, name, credp->fc_mode & 07777); 456d815e721SGreg Kurz } 4574750a96fSVenkateswararao Jujjuri (JV) 4582289be19SAneesh Kumar K.V static ssize_t local_readlink(FsContext *fs_ctx, V9fsPath *fs_path, 459131dcb25SAnthony Liguori char *buf, size_t bufsz) 460131dcb25SAnthony Liguori { 461879c2813SVenkateswararao Jujjuri (JV) ssize_t tsize = -1; 4622289be19SAneesh Kumar K.V 4632c30dd74SAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SM_MAPPED) || 4642c30dd74SAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE)) { 465879c2813SVenkateswararao Jujjuri (JV) int fd; 466bec1e954SGreg Kurz 467bec1e954SGreg Kurz fd = local_open_nofollow(fs_ctx, fs_path->data, O_RDONLY, 0); 468879c2813SVenkateswararao Jujjuri (JV) if (fd == -1) { 469879c2813SVenkateswararao Jujjuri (JV) return -1; 470879c2813SVenkateswararao Jujjuri (JV) } 471879c2813SVenkateswararao Jujjuri (JV) do { 472879c2813SVenkateswararao Jujjuri (JV) tsize = read(fd, (void *)buf, bufsz); 473879c2813SVenkateswararao Jujjuri (JV) } while (tsize == -1 && errno == EINTR); 474bec1e954SGreg Kurz close_preserve_errno(fd); 475b97400caSAneesh Kumar K.V } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 476b97400caSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 477bec1e954SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 478bec1e954SGreg Kurz char *name = g_path_get_basename(fs_path->data); 479bec1e954SGreg Kurz int dirfd; 480bec1e954SGreg Kurz 481bec1e954SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 482bec1e954SGreg Kurz if (dirfd == -1) { 483bec1e954SGreg Kurz goto out; 484bec1e954SGreg Kurz } 485bec1e954SGreg Kurz 486bec1e954SGreg Kurz tsize = readlinkat(dirfd, name, buf, bufsz); 487bec1e954SGreg Kurz close_preserve_errno(dirfd); 488bec1e954SGreg Kurz out: 489bec1e954SGreg Kurz g_free(name); 490bec1e954SGreg Kurz g_free(dirpath); 491879c2813SVenkateswararao Jujjuri (JV) } 492879c2813SVenkateswararao Jujjuri (JV) return tsize; 493131dcb25SAnthony Liguori } 494131dcb25SAnthony Liguori 495cc720ddbSAneesh Kumar K.V static int local_close(FsContext *ctx, V9fsFidOpenState *fs) 496131dcb25SAnthony Liguori { 497cc720ddbSAneesh Kumar K.V return close(fs->fd); 498131dcb25SAnthony Liguori } 499131dcb25SAnthony Liguori 500cc720ddbSAneesh Kumar K.V static int local_closedir(FsContext *ctx, V9fsFidOpenState *fs) 501131dcb25SAnthony Liguori { 502f314ea4eSGreg Kurz return closedir(fs->dir.stream); 503131dcb25SAnthony Liguori } 5049f107513SAnthony Liguori 505cc720ddbSAneesh Kumar K.V static int local_open(FsContext *ctx, V9fsPath *fs_path, 506cc720ddbSAneesh Kumar K.V int flags, V9fsFidOpenState *fs) 507a6568fe2SAnthony Liguori { 50821328e1eSGreg Kurz int fd; 5092289be19SAneesh Kumar K.V 510996a0d76SGreg Kurz fd = local_open_nofollow(ctx, fs_path->data, flags, 0); 51121328e1eSGreg Kurz if (fd == -1) { 51221328e1eSGreg Kurz return -1; 51321328e1eSGreg Kurz } 51421328e1eSGreg Kurz fs->fd = fd; 515cc720ddbSAneesh Kumar K.V return fs->fd; 516a6568fe2SAnthony Liguori } 517a6568fe2SAnthony Liguori 518cc720ddbSAneesh Kumar K.V static int local_opendir(FsContext *ctx, 519cc720ddbSAneesh Kumar K.V V9fsPath *fs_path, V9fsFidOpenState *fs) 520a6568fe2SAnthony Liguori { 521996a0d76SGreg Kurz int dirfd; 52221328e1eSGreg Kurz DIR *stream; 5232289be19SAneesh Kumar K.V 524996a0d76SGreg Kurz dirfd = local_opendir_nofollow(ctx, fs_path->data); 525996a0d76SGreg Kurz if (dirfd == -1) { 526cc720ddbSAneesh Kumar K.V return -1; 527cc720ddbSAneesh Kumar K.V } 528996a0d76SGreg Kurz 529996a0d76SGreg Kurz stream = fdopendir(dirfd); 53021328e1eSGreg Kurz if (!stream) { 531faab207fSGreg Kurz close(dirfd); 532cc720ddbSAneesh Kumar K.V return -1; 533cc720ddbSAneesh Kumar K.V } 53421328e1eSGreg Kurz fs->dir.stream = stream; 535cc720ddbSAneesh Kumar K.V return 0; 536a6568fe2SAnthony Liguori } 537a6568fe2SAnthony Liguori 538cc720ddbSAneesh Kumar K.V static void local_rewinddir(FsContext *ctx, V9fsFidOpenState *fs) 539a9231555SAnthony Liguori { 540f314ea4eSGreg Kurz rewinddir(fs->dir.stream); 541a9231555SAnthony Liguori } 542a9231555SAnthony Liguori 543cc720ddbSAneesh Kumar K.V static off_t local_telldir(FsContext *ctx, V9fsFidOpenState *fs) 544a9231555SAnthony Liguori { 545f314ea4eSGreg Kurz return telldir(fs->dir.stream); 546a9231555SAnthony Liguori } 547a9231555SAnthony Liguori 5487a95434eSGreg Kurz static bool local_is_mapped_file_metadata(FsContext *fs_ctx, const char *name) 5497a95434eSGreg Kurz { 55081ffbf5aSGreg Kurz return 55181ffbf5aSGreg Kurz !strcmp(name, VIRTFS_META_DIR) || !strcmp(name, VIRTFS_META_ROOT_FILE); 5527a95434eSGreg Kurz } 5537a95434eSGreg Kurz 554635324e8SGreg Kurz static struct dirent *local_readdir(FsContext *ctx, V9fsFidOpenState *fs) 555a9231555SAnthony Liguori { 556635324e8SGreg Kurz struct dirent *entry; 5572c30dd74SAneesh Kumar K.V 5582c30dd74SAneesh Kumar K.V again: 559635324e8SGreg Kurz entry = readdir(fs->dir.stream); 560635324e8SGreg Kurz if (!entry) { 561635324e8SGreg Kurz return NULL; 562635324e8SGreg Kurz } 563635324e8SGreg Kurz 564840a1bf2SBastian Blank if (ctx->export_flags & V9FS_SM_MAPPED) { 565840a1bf2SBastian Blank entry->d_type = DT_UNKNOWN; 566840a1bf2SBastian Blank } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 5677a95434eSGreg Kurz if (local_is_mapped_file_metadata(ctx, entry->d_name)) { 56881ffbf5aSGreg Kurz /* skip the meta data */ 5692c30dd74SAneesh Kumar K.V goto again; 5702c30dd74SAneesh Kumar K.V } 571840a1bf2SBastian Blank entry->d_type = DT_UNKNOWN; 5722c30dd74SAneesh Kumar K.V } 573635324e8SGreg Kurz 574635324e8SGreg Kurz return entry; 575a9231555SAnthony Liguori } 576a9231555SAnthony Liguori 577cc720ddbSAneesh Kumar K.V static void local_seekdir(FsContext *ctx, V9fsFidOpenState *fs, off_t off) 578a9231555SAnthony Liguori { 579f314ea4eSGreg Kurz seekdir(fs->dir.stream, off); 580a9231555SAnthony Liguori } 581a9231555SAnthony Liguori 582cc720ddbSAneesh Kumar K.V static ssize_t local_preadv(FsContext *ctx, V9fsFidOpenState *fs, 583cc720ddbSAneesh Kumar K.V const struct iovec *iov, 58456d15a53SSanchit Garg int iovcnt, off_t offset) 585a9231555SAnthony Liguori { 58656d15a53SSanchit Garg #ifdef CONFIG_PREADV 587cc720ddbSAneesh Kumar K.V return preadv(fs->fd, iov, iovcnt, offset); 58856d15a53SSanchit Garg #else 589cc720ddbSAneesh Kumar K.V int err = lseek(fs->fd, offset, SEEK_SET); 59056d15a53SSanchit Garg if (err == -1) { 59156d15a53SSanchit Garg return err; 59256d15a53SSanchit Garg } else { 593cc720ddbSAneesh Kumar K.V return readv(fs->fd, iov, iovcnt); 594a9231555SAnthony Liguori } 59556d15a53SSanchit Garg #endif 596a9231555SAnthony Liguori } 597a9231555SAnthony Liguori 598cc720ddbSAneesh Kumar K.V static ssize_t local_pwritev(FsContext *ctx, V9fsFidOpenState *fs, 599cc720ddbSAneesh Kumar K.V const struct iovec *iov, 60056d15a53SSanchit Garg int iovcnt, off_t offset) 6018449360cSAnthony Liguori { 6026fe76accSGreg Kurz ssize_t ret; 60356d15a53SSanchit Garg #ifdef CONFIG_PREADV 604cc720ddbSAneesh Kumar K.V ret = pwritev(fs->fd, iov, iovcnt, offset); 60556d15a53SSanchit Garg #else 606cc720ddbSAneesh Kumar K.V int err = lseek(fs->fd, offset, SEEK_SET); 60756d15a53SSanchit Garg if (err == -1) { 60856d15a53SSanchit Garg return err; 60956d15a53SSanchit Garg } else { 610cc720ddbSAneesh Kumar K.V ret = writev(fs->fd, iov, iovcnt); 6118449360cSAnthony Liguori } 61256d15a53SSanchit Garg #endif 613d3ab98e6SAneesh Kumar K.V #ifdef CONFIG_SYNC_FILE_RANGE 614d3ab98e6SAneesh Kumar K.V if (ret > 0 && ctx->export_flags & V9FS_IMMEDIATE_WRITEOUT) { 615d3ab98e6SAneesh Kumar K.V /* 616d3ab98e6SAneesh Kumar K.V * Initiate a writeback. This is not a data integrity sync. 617d3ab98e6SAneesh Kumar K.V * We want to ensure that we don't leave dirty pages in the cache 618d3ab98e6SAneesh Kumar K.V * after write when writeout=immediate is sepcified. 619d3ab98e6SAneesh Kumar K.V */ 620cc720ddbSAneesh Kumar K.V sync_file_range(fs->fd, offset, ret, 621d3ab98e6SAneesh Kumar K.V SYNC_FILE_RANGE_WAIT_BEFORE | SYNC_FILE_RANGE_WRITE); 622d3ab98e6SAneesh Kumar K.V } 623d3ab98e6SAneesh Kumar K.V #endif 624d3ab98e6SAneesh Kumar K.V return ret; 62556d15a53SSanchit Garg } 6268449360cSAnthony Liguori 6272289be19SAneesh Kumar K.V static int local_chmod(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) 628c494dd6fSAnthony Liguori { 629e3187a45SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 630e3187a45SGreg Kurz char *name = g_path_get_basename(fs_path->data); 6314fa4ce71SChen Gang int ret = -1; 632e3187a45SGreg Kurz int dirfd; 633e3187a45SGreg Kurz 634e3187a45SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 635e3187a45SGreg Kurz if (dirfd == -1) { 636e3187a45SGreg Kurz goto out; 637e3187a45SGreg Kurz } 6382289be19SAneesh Kumar K.V 639b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 640e3187a45SGreg Kurz ret = local_set_xattrat(dirfd, name, credp); 6412c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 642e3187a45SGreg Kurz ret = local_set_mapped_file_attrat(dirfd, name, credp); 643e3187a45SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 644e3187a45SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 645e3187a45SGreg Kurz ret = fchmodat_nofollow(dirfd, name, credp->fc_mode); 646e95ead32SVenkateswararao Jujjuri (JV) } 647e3187a45SGreg Kurz close_preserve_errno(dirfd); 648e3187a45SGreg Kurz 649e3187a45SGreg Kurz out: 650e3187a45SGreg Kurz g_free(dirpath); 651e3187a45SGreg Kurz g_free(name); 6524fa4ce71SChen Gang return ret; 653c494dd6fSAnthony Liguori } 654c494dd6fSAnthony Liguori 6552289be19SAneesh Kumar K.V static int local_mknod(FsContext *fs_ctx, V9fsPath *dir_path, 6562289be19SAneesh Kumar K.V const char *name, FsCred *credp) 657c494dd6fSAnthony Liguori { 6581c293312SVenkateswararao Jujjuri (JV) int err = -1; 659d815e721SGreg Kurz int dirfd; 6601c293312SVenkateswararao Jujjuri (JV) 6617a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 6627a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 6637a95434eSGreg Kurz errno = EINVAL; 6647a95434eSGreg Kurz return -1; 6657a95434eSGreg Kurz } 6667a95434eSGreg Kurz 667d815e721SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 668d815e721SGreg Kurz if (dirfd == -1) { 669d815e721SGreg Kurz return -1; 670d815e721SGreg Kurz } 6712289be19SAneesh Kumar K.V 672d815e721SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 673d815e721SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 674b96feb2cSTobias Schramm err = mknodat(dirfd, name, fs_ctx->fmode | S_IFREG, 0); 675d815e721SGreg Kurz if (err == -1) { 676d815e721SGreg Kurz goto out; 677d815e721SGreg Kurz } 678d815e721SGreg Kurz 679b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 680d815e721SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 681d815e721SGreg Kurz } else { 682d815e721SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 6831c293312SVenkateswararao Jujjuri (JV) } 6841c293312SVenkateswararao Jujjuri (JV) if (err == -1) { 6851c293312SVenkateswararao Jujjuri (JV) goto err_end; 6861c293312SVenkateswararao Jujjuri (JV) } 687d815e721SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 688d815e721SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 689d815e721SGreg Kurz err = mknodat(dirfd, name, credp->fc_mode, credp->fc_rdev); 6902c30dd74SAneesh Kumar K.V if (err == -1) { 6912c30dd74SAneesh Kumar K.V goto out; 6922c30dd74SAneesh Kumar K.V } 693d815e721SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 6942c30dd74SAneesh Kumar K.V if (err == -1) { 6951c293312SVenkateswararao Jujjuri (JV) goto err_end; 6961c293312SVenkateswararao Jujjuri (JV) } 6971c293312SVenkateswararao Jujjuri (JV) } 6982289be19SAneesh Kumar K.V goto out; 6991c293312SVenkateswararao Jujjuri (JV) 7001c293312SVenkateswararao Jujjuri (JV) err_end: 701d815e721SGreg Kurz unlinkat_preserve_errno(dirfd, name, 0); 7022289be19SAneesh Kumar K.V out: 703d815e721SGreg Kurz close_preserve_errno(dirfd); 7041c293312SVenkateswararao Jujjuri (JV) return err; 705c494dd6fSAnthony Liguori } 706c494dd6fSAnthony Liguori 7072289be19SAneesh Kumar K.V static int local_mkdir(FsContext *fs_ctx, V9fsPath *dir_path, 7082289be19SAneesh Kumar K.V const char *name, FsCred *credp) 709c494dd6fSAnthony Liguori { 71000ec5c37SVenkateswararao Jujjuri (JV) int err = -1; 7113f3a1699SGreg Kurz int dirfd; 71200ec5c37SVenkateswararao Jujjuri (JV) 7137a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 7147a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 7157a95434eSGreg Kurz errno = EINVAL; 7167a95434eSGreg Kurz return -1; 7177a95434eSGreg Kurz } 7187a95434eSGreg Kurz 7193f3a1699SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 7203f3a1699SGreg Kurz if (dirfd == -1) { 7213f3a1699SGreg Kurz return -1; 7223f3a1699SGreg Kurz } 7232289be19SAneesh Kumar K.V 7243f3a1699SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 7253f3a1699SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 726b96feb2cSTobias Schramm err = mkdirat(dirfd, name, fs_ctx->dmode); 7273f3a1699SGreg Kurz if (err == -1) { 7283f3a1699SGreg Kurz goto out; 7293f3a1699SGreg Kurz } 7303f3a1699SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFDIR; 7313f3a1699SGreg Kurz 732b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 7333f3a1699SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 7343f3a1699SGreg Kurz } else { 7353f3a1699SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 73600ec5c37SVenkateswararao Jujjuri (JV) } 73700ec5c37SVenkateswararao Jujjuri (JV) if (err == -1) { 73800ec5c37SVenkateswararao Jujjuri (JV) goto err_end; 73900ec5c37SVenkateswararao Jujjuri (JV) } 7403f3a1699SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 7413f3a1699SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 7423f3a1699SGreg Kurz err = mkdirat(dirfd, name, credp->fc_mode); 7432c30dd74SAneesh Kumar K.V if (err == -1) { 7442c30dd74SAneesh Kumar K.V goto out; 7452c30dd74SAneesh Kumar K.V } 7463f3a1699SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 7472c30dd74SAneesh Kumar K.V if (err == -1) { 74800ec5c37SVenkateswararao Jujjuri (JV) goto err_end; 74900ec5c37SVenkateswararao Jujjuri (JV) } 75000ec5c37SVenkateswararao Jujjuri (JV) } 7512289be19SAneesh Kumar K.V goto out; 75200ec5c37SVenkateswararao Jujjuri (JV) 75300ec5c37SVenkateswararao Jujjuri (JV) err_end: 7543f3a1699SGreg Kurz unlinkat_preserve_errno(dirfd, name, AT_REMOVEDIR); 7552289be19SAneesh Kumar K.V out: 7563f3a1699SGreg Kurz close_preserve_errno(dirfd); 75700ec5c37SVenkateswararao Jujjuri (JV) return err; 758c494dd6fSAnthony Liguori } 759c494dd6fSAnthony Liguori 7608b888272SAneesh Kumar K.V static int local_fstat(FsContext *fs_ctx, int fid_type, 761cc720ddbSAneesh Kumar K.V V9fsFidOpenState *fs, struct stat *stbuf) 762c494dd6fSAnthony Liguori { 7638b888272SAneesh Kumar K.V int err, fd; 7648b888272SAneesh Kumar K.V 7658b888272SAneesh Kumar K.V if (fid_type == P9_FID_DIR) { 766f314ea4eSGreg Kurz fd = dirfd(fs->dir.stream); 7678b888272SAneesh Kumar K.V } else { 7688b888272SAneesh Kumar K.V fd = fs->fd; 7698b888272SAneesh Kumar K.V } 7708b888272SAneesh Kumar K.V 7718b888272SAneesh Kumar K.V err = fstat(fd, stbuf); 7721237ad76SVenkateswararao Jujjuri (JV) if (err) { 7731237ad76SVenkateswararao Jujjuri (JV) return err; 7741237ad76SVenkateswararao Jujjuri (JV) } 775b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 7761237ad76SVenkateswararao Jujjuri (JV) /* Actual credentials are part of extended attrs */ 7771237ad76SVenkateswararao Jujjuri (JV) uid_t tmp_uid; 7781237ad76SVenkateswararao Jujjuri (JV) gid_t tmp_gid; 7791237ad76SVenkateswararao Jujjuri (JV) mode_t tmp_mode; 7801237ad76SVenkateswararao Jujjuri (JV) dev_t tmp_dev; 7811237ad76SVenkateswararao Jujjuri (JV) 782f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.uid", &tmp_uid, sizeof(uid_t)) > 0) { 783f8ad4a89SAneesh Kumar K.V stbuf->st_uid = le32_to_cpu(tmp_uid); 7841237ad76SVenkateswararao Jujjuri (JV) } 785f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.gid", &tmp_gid, sizeof(gid_t)) > 0) { 786f8ad4a89SAneesh Kumar K.V stbuf->st_gid = le32_to_cpu(tmp_gid); 7871237ad76SVenkateswararao Jujjuri (JV) } 788f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.mode", &tmp_mode, sizeof(mode_t)) > 0) { 789f8ad4a89SAneesh Kumar K.V stbuf->st_mode = le32_to_cpu(tmp_mode); 7901237ad76SVenkateswararao Jujjuri (JV) } 791f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.rdev", &tmp_dev, sizeof(dev_t)) > 0) { 792f8ad4a89SAneesh Kumar K.V stbuf->st_rdev = le64_to_cpu(tmp_dev); 7931237ad76SVenkateswararao Jujjuri (JV) } 7942c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 7952c30dd74SAneesh Kumar K.V errno = EOPNOTSUPP; 7962c30dd74SAneesh Kumar K.V return -1; 7971237ad76SVenkateswararao Jujjuri (JV) } 7981237ad76SVenkateswararao Jujjuri (JV) return err; 799c494dd6fSAnthony Liguori } 800c494dd6fSAnthony Liguori 8012289be19SAneesh Kumar K.V static int local_open2(FsContext *fs_ctx, V9fsPath *dir_path, const char *name, 802cc720ddbSAneesh Kumar K.V int flags, FsCred *credp, V9fsFidOpenState *fs) 803c494dd6fSAnthony Liguori { 8044750a96fSVenkateswararao Jujjuri (JV) int fd = -1; 8054750a96fSVenkateswararao Jujjuri (JV) int err = -1; 806a565fea5SGreg Kurz int dirfd; 8074750a96fSVenkateswararao Jujjuri (JV) 8087a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 8097a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 8107a95434eSGreg Kurz errno = EINVAL; 8117a95434eSGreg Kurz return -1; 8127a95434eSGreg Kurz } 8137a95434eSGreg Kurz 8140ceb092eSAneesh Kumar K.V /* 8150ceb092eSAneesh Kumar K.V * Mark all the open to not follow symlinks 8160ceb092eSAneesh Kumar K.V */ 8170ceb092eSAneesh Kumar K.V flags |= O_NOFOLLOW; 8180ceb092eSAneesh Kumar K.V 819a565fea5SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 820a565fea5SGreg Kurz if (dirfd == -1) { 821a565fea5SGreg Kurz return -1; 822a565fea5SGreg Kurz } 8232289be19SAneesh Kumar K.V 8244750a96fSVenkateswararao Jujjuri (JV) /* Determine the security model */ 825a565fea5SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 826a565fea5SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 827b96feb2cSTobias Schramm fd = openat_file(dirfd, name, flags, fs_ctx->fmode); 828a565fea5SGreg Kurz if (fd == -1) { 829a565fea5SGreg Kurz goto out; 830a565fea5SGreg Kurz } 831a565fea5SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFREG; 832b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 8334750a96fSVenkateswararao Jujjuri (JV) /* Set cleint credentials in xattr */ 834a565fea5SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 835a565fea5SGreg Kurz } else { 836a565fea5SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 8374750a96fSVenkateswararao Jujjuri (JV) } 8382c30dd74SAneesh Kumar K.V if (err == -1) { 8392c30dd74SAneesh Kumar K.V goto err_end; 8402c30dd74SAneesh Kumar K.V } 841b97400caSAneesh Kumar K.V } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 842b97400caSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 843a565fea5SGreg Kurz fd = openat_file(dirfd, name, flags, credp->fc_mode); 8444750a96fSVenkateswararao Jujjuri (JV) if (fd == -1) { 8452289be19SAneesh Kumar K.V goto out; 8464750a96fSVenkateswararao Jujjuri (JV) } 847a565fea5SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 8484750a96fSVenkateswararao Jujjuri (JV) if (err == -1) { 8494750a96fSVenkateswararao Jujjuri (JV) goto err_end; 8504750a96fSVenkateswararao Jujjuri (JV) } 8514750a96fSVenkateswararao Jujjuri (JV) } 8522289be19SAneesh Kumar K.V err = fd; 853cc720ddbSAneesh Kumar K.V fs->fd = fd; 8542289be19SAneesh Kumar K.V goto out; 8554750a96fSVenkateswararao Jujjuri (JV) 8564750a96fSVenkateswararao Jujjuri (JV) err_end: 857a565fea5SGreg Kurz unlinkat_preserve_errno(dirfd, name, 858a565fea5SGreg Kurz flags & O_DIRECTORY ? AT_REMOVEDIR : 0); 859a565fea5SGreg Kurz close_preserve_errno(fd); 8602289be19SAneesh Kumar K.V out: 861a565fea5SGreg Kurz close_preserve_errno(dirfd); 8624750a96fSVenkateswararao Jujjuri (JV) return err; 863c494dd6fSAnthony Liguori } 864c494dd6fSAnthony Liguori 865758e8e38SVenkateswararao Jujjuri (JV) 866879c2813SVenkateswararao Jujjuri (JV) static int local_symlink(FsContext *fs_ctx, const char *oldpath, 8672289be19SAneesh Kumar K.V V9fsPath *dir_path, const char *name, FsCred *credp) 868c494dd6fSAnthony Liguori { 869879c2813SVenkateswararao Jujjuri (JV) int err = -1; 87038771613SGreg Kurz int dirfd; 871879c2813SVenkateswararao Jujjuri (JV) 8727a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 8737a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 8747a95434eSGreg Kurz errno = EINVAL; 8757a95434eSGreg Kurz return -1; 8767a95434eSGreg Kurz } 8777a95434eSGreg Kurz 87838771613SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 87938771613SGreg Kurz if (dirfd == -1) { 88038771613SGreg Kurz return -1; 88138771613SGreg Kurz } 8822289be19SAneesh Kumar K.V 883879c2813SVenkateswararao Jujjuri (JV) /* Determine the security model */ 88438771613SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 88538771613SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 88638771613SGreg Kurz int fd; 88738771613SGreg Kurz ssize_t oldpath_size, write_size; 88838771613SGreg Kurz 88938771613SGreg Kurz fd = openat_file(dirfd, name, O_CREAT | O_EXCL | O_RDWR, 890b96feb2cSTobias Schramm fs_ctx->fmode); 89138771613SGreg Kurz if (fd == -1) { 89238771613SGreg Kurz goto out; 89338771613SGreg Kurz } 89438771613SGreg Kurz /* Write the oldpath (target) to the file. */ 89538771613SGreg Kurz oldpath_size = strlen(oldpath); 89638771613SGreg Kurz do { 89738771613SGreg Kurz write_size = write(fd, (void *)oldpath, oldpath_size); 89838771613SGreg Kurz } while (write_size == -1 && errno == EINTR); 89938771613SGreg Kurz close_preserve_errno(fd); 90038771613SGreg Kurz 90138771613SGreg Kurz if (write_size != oldpath_size) { 90238771613SGreg Kurz goto err_end; 90338771613SGreg Kurz } 90438771613SGreg Kurz /* Set cleint credentials in symlink's xattr */ 90538771613SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFLNK; 90638771613SGreg Kurz 907b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 90838771613SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 90938771613SGreg Kurz } else { 91038771613SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 911879c2813SVenkateswararao Jujjuri (JV) } 912879c2813SVenkateswararao Jujjuri (JV) if (err == -1) { 913879c2813SVenkateswararao Jujjuri (JV) goto err_end; 914879c2813SVenkateswararao Jujjuri (JV) } 91538771613SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 91638771613SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 91738771613SGreg Kurz err = symlinkat(oldpath, dirfd, name); 918879c2813SVenkateswararao Jujjuri (JV) if (err) { 9192289be19SAneesh Kumar K.V goto out; 920879c2813SVenkateswararao Jujjuri (JV) } 92138771613SGreg Kurz err = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 92238771613SGreg Kurz AT_SYMLINK_NOFOLLOW); 923879c2813SVenkateswararao Jujjuri (JV) if (err == -1) { 92412848bfcSAneesh Kumar K.V /* 92512848bfcSAneesh Kumar K.V * If we fail to change ownership and if we are 92612848bfcSAneesh Kumar K.V * using security model none. Ignore the error 92712848bfcSAneesh Kumar K.V */ 928b97400caSAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) { 929879c2813SVenkateswararao Jujjuri (JV) goto err_end; 93038771613SGreg Kurz } else { 93112848bfcSAneesh Kumar K.V err = 0; 932879c2813SVenkateswararao Jujjuri (JV) } 933879c2813SVenkateswararao Jujjuri (JV) } 93438771613SGreg Kurz } 9352289be19SAneesh Kumar K.V goto out; 936879c2813SVenkateswararao Jujjuri (JV) 937879c2813SVenkateswararao Jujjuri (JV) err_end: 93838771613SGreg Kurz unlinkat_preserve_errno(dirfd, name, 0); 9392289be19SAneesh Kumar K.V out: 94038771613SGreg Kurz close_preserve_errno(dirfd); 941879c2813SVenkateswararao Jujjuri (JV) return err; 942c494dd6fSAnthony Liguori } 943c494dd6fSAnthony Liguori 9442289be19SAneesh Kumar K.V static int local_link(FsContext *ctx, V9fsPath *oldpath, 9452289be19SAneesh Kumar K.V V9fsPath *dirpath, const char *name) 946c494dd6fSAnthony Liguori { 947ad0b46e6SGreg Kurz char *odirpath = g_path_get_dirname(oldpath->data); 948ad0b46e6SGreg Kurz char *oname = g_path_get_basename(oldpath->data); 949ad0b46e6SGreg Kurz int ret = -1; 950ad0b46e6SGreg Kurz int odirfd, ndirfd; 951c494dd6fSAnthony Liguori 9527a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 9537a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 9547a95434eSGreg Kurz errno = EINVAL; 955841b8d09SJiajun Chen goto out; 9567a95434eSGreg Kurz } 9577a95434eSGreg Kurz 958ad0b46e6SGreg Kurz odirfd = local_opendir_nofollow(ctx, odirpath); 959ad0b46e6SGreg Kurz if (odirfd == -1) { 9606dd4b1f1SGreg Kurz goto out; 9616dd4b1f1SGreg Kurz } 9622289be19SAneesh Kumar K.V 963ad0b46e6SGreg Kurz ndirfd = local_opendir_nofollow(ctx, dirpath->data); 964ad0b46e6SGreg Kurz if (ndirfd == -1) { 965ad0b46e6SGreg Kurz close_preserve_errno(odirfd); 966ad0b46e6SGreg Kurz goto out; 967ad0b46e6SGreg Kurz } 968ad0b46e6SGreg Kurz 969ad0b46e6SGreg Kurz ret = linkat(odirfd, oname, ndirfd, name, 0); 970ad0b46e6SGreg Kurz if (ret < 0) { 971ad0b46e6SGreg Kurz goto out_close; 972ad0b46e6SGreg Kurz } 9732c30dd74SAneesh Kumar K.V 9742c30dd74SAneesh Kumar K.V /* now link the virtfs_metadata files */ 9756dd4b1f1SGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 976ad0b46e6SGreg Kurz int omap_dirfd, nmap_dirfd; 9776dd4b1f1SGreg Kurz 978ad0b46e6SGreg Kurz ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700); 979ad0b46e6SGreg Kurz if (ret < 0 && errno != EEXIST) { 980ad0b46e6SGreg Kurz goto err_undo_link; 9812c30dd74SAneesh Kumar K.V } 982ad0b46e6SGreg Kurz 983ad0b46e6SGreg Kurz omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR); 984ad0b46e6SGreg Kurz if (omap_dirfd == -1) { 985ad0b46e6SGreg Kurz goto err; 986ad0b46e6SGreg Kurz } 987ad0b46e6SGreg Kurz 988ad0b46e6SGreg Kurz nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR); 989ad0b46e6SGreg Kurz if (nmap_dirfd == -1) { 990ad0b46e6SGreg Kurz close_preserve_errno(omap_dirfd); 991ad0b46e6SGreg Kurz goto err; 992ad0b46e6SGreg Kurz } 993ad0b46e6SGreg Kurz 994ad0b46e6SGreg Kurz ret = linkat(omap_dirfd, oname, nmap_dirfd, name, 0); 995ad0b46e6SGreg Kurz close_preserve_errno(nmap_dirfd); 996ad0b46e6SGreg Kurz close_preserve_errno(omap_dirfd); 9972c30dd74SAneesh Kumar K.V if (ret < 0 && errno != ENOENT) { 998ad0b46e6SGreg Kurz goto err_undo_link; 9992c30dd74SAneesh Kumar K.V } 10006dd4b1f1SGreg Kurz 1001ad0b46e6SGreg Kurz ret = 0; 10022c30dd74SAneesh Kumar K.V } 1003ad0b46e6SGreg Kurz goto out_close; 1004ad0b46e6SGreg Kurz 1005ad0b46e6SGreg Kurz err: 1006ad0b46e6SGreg Kurz ret = -1; 1007ad0b46e6SGreg Kurz err_undo_link: 1008ad0b46e6SGreg Kurz unlinkat_preserve_errno(ndirfd, name, 0); 1009ad0b46e6SGreg Kurz out_close: 1010ad0b46e6SGreg Kurz close_preserve_errno(ndirfd); 1011ad0b46e6SGreg Kurz close_preserve_errno(odirfd); 10126dd4b1f1SGreg Kurz out: 1013ad0b46e6SGreg Kurz g_free(oname); 1014ad0b46e6SGreg Kurz g_free(odirpath); 10152289be19SAneesh Kumar K.V return ret; 1016c494dd6fSAnthony Liguori } 1017c494dd6fSAnthony Liguori 10182289be19SAneesh Kumar K.V static int local_truncate(FsContext *ctx, V9fsPath *fs_path, off_t size) 10198cf89e00SAnthony Liguori { 1020ac125d99SGreg Kurz int fd, ret; 10212289be19SAneesh Kumar K.V 1022ac125d99SGreg Kurz fd = local_open_nofollow(ctx, fs_path->data, O_WRONLY, 0); 1023ac125d99SGreg Kurz if (fd == -1) { 1024ac125d99SGreg Kurz return -1; 1025ac125d99SGreg Kurz } 1026ac125d99SGreg Kurz ret = ftruncate(fd, size); 1027ac125d99SGreg Kurz close_preserve_errno(fd); 10284fa4ce71SChen Gang return ret; 10298cf89e00SAnthony Liguori } 10308cf89e00SAnthony Liguori 10312289be19SAneesh Kumar K.V static int local_chown(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) 10328cf89e00SAnthony Liguori { 1033d369f207SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 1034d369f207SGreg Kurz char *name = g_path_get_basename(fs_path->data); 10354fa4ce71SChen Gang int ret = -1; 1036d369f207SGreg Kurz int dirfd; 1037d369f207SGreg Kurz 1038d369f207SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 1039d369f207SGreg Kurz if (dirfd == -1) { 1040d369f207SGreg Kurz goto out; 1041d369f207SGreg Kurz } 10422289be19SAneesh Kumar K.V 1043c79ce737SSripathi Kodi if ((credp->fc_uid == -1 && credp->fc_gid == -1) || 104417b1971fSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 104517b1971fSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 1046d369f207SGreg Kurz ret = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 1047d369f207SGreg Kurz AT_SYMLINK_NOFOLLOW); 1048b97400caSAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 1049d369f207SGreg Kurz ret = local_set_xattrat(dirfd, name, credp); 10502c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 1051d369f207SGreg Kurz ret = local_set_mapped_file_attrat(dirfd, name, credp); 1052f7613beeSVenkateswararao Jujjuri (JV) } 1053d369f207SGreg Kurz 1054d369f207SGreg Kurz close_preserve_errno(dirfd); 1055d369f207SGreg Kurz out: 1056d369f207SGreg Kurz g_free(name); 1057d369f207SGreg Kurz g_free(dirpath); 10584fa4ce71SChen Gang return ret; 10598cf89e00SAnthony Liguori } 10608cf89e00SAnthony Liguori 10612289be19SAneesh Kumar K.V static int local_utimensat(FsContext *s, V9fsPath *fs_path, 106274bc02b2SM. Mohan Kumar const struct timespec *buf) 10638cf89e00SAnthony Liguori { 1064a33eda0dSGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 1065a33eda0dSGreg Kurz char *name = g_path_get_basename(fs_path->data); 1066a33eda0dSGreg Kurz int dirfd, ret = -1; 10672289be19SAneesh Kumar K.V 1068a33eda0dSGreg Kurz dirfd = local_opendir_nofollow(s, dirpath); 1069a33eda0dSGreg Kurz if (dirfd == -1) { 1070a33eda0dSGreg Kurz goto out; 1071a33eda0dSGreg Kurz } 1072a33eda0dSGreg Kurz 1073a33eda0dSGreg Kurz ret = utimensat(dirfd, name, buf, AT_SYMLINK_NOFOLLOW); 1074a33eda0dSGreg Kurz close_preserve_errno(dirfd); 1075a33eda0dSGreg Kurz out: 1076a33eda0dSGreg Kurz g_free(dirpath); 1077a33eda0dSGreg Kurz g_free(name); 10784fa4ce71SChen Gang return ret; 10798cf89e00SAnthony Liguori } 10808cf89e00SAnthony Liguori 1081df4938a6SGreg Kurz static int local_unlinkat_common(FsContext *ctx, int dirfd, const char *name, 1082df4938a6SGreg Kurz int flags) 10835bae1900SAnthony Liguori { 1084846cf408SDaniel Henrique Barboza int ret; 10852c30dd74SAneesh Kumar K.V 10862c30dd74SAneesh Kumar K.V if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 1087df4938a6SGreg Kurz int map_dirfd; 1088df4938a6SGreg Kurz 10896a87e792SGreg Kurz /* We need to remove the metadata as well: 10906a87e792SGreg Kurz * - the metadata directory if we're removing a directory 10916a87e792SGreg Kurz * - the metadata file in the parent's metadata directory 10926a87e792SGreg Kurz * 10936a87e792SGreg Kurz * If any of these are missing (ie, ENOENT) then we're probably 10946a87e792SGreg Kurz * trying to remove something that wasn't created in mapped-file 10956a87e792SGreg Kurz * mode. We just ignore the error. 10966a87e792SGreg Kurz */ 1097df4938a6SGreg Kurz if (flags == AT_REMOVEDIR) { 1098df4938a6SGreg Kurz int fd; 1099df4938a6SGreg Kurz 1100b003fc0dSGreg Kurz fd = openat_dir(dirfd, name); 1101df4938a6SGreg Kurz if (fd == -1) { 1102846cf408SDaniel Henrique Barboza return -1; 11032c30dd74SAneesh Kumar K.V } 1104df4938a6SGreg Kurz ret = unlinkat(fd, VIRTFS_META_DIR, AT_REMOVEDIR); 1105df4938a6SGreg Kurz close_preserve_errno(fd); 1106df4938a6SGreg Kurz if (ret < 0 && errno != ENOENT) { 1107846cf408SDaniel Henrique Barboza return -1; 11082c30dd74SAneesh Kumar K.V } 11092c30dd74SAneesh Kumar K.V } 1110df4938a6SGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 11116a87e792SGreg Kurz if (map_dirfd != -1) { 1112df4938a6SGreg Kurz ret = unlinkat(map_dirfd, name, 0); 1113df4938a6SGreg Kurz close_preserve_errno(map_dirfd); 1114df4938a6SGreg Kurz if (ret < 0 && errno != ENOENT) { 1115846cf408SDaniel Henrique Barboza return -1; 11166a87e792SGreg Kurz } 11176a87e792SGreg Kurz } else if (errno != ENOENT) { 1118846cf408SDaniel Henrique Barboza return -1; 11192c30dd74SAneesh Kumar K.V } 11202c30dd74SAneesh Kumar K.V } 11214fa4ce71SChen Gang 1122846cf408SDaniel Henrique Barboza return unlinkat(dirfd, name, flags); 1123df4938a6SGreg Kurz } 1124df4938a6SGreg Kurz 11258cf89e00SAnthony Liguori static int local_remove(FsContext *ctx, const char *path) 11268cf89e00SAnthony Liguori { 11278cf89e00SAnthony Liguori struct stat stbuf; 1128a0e640a8SGreg Kurz char *dirpath = g_path_get_dirname(path); 1129a0e640a8SGreg Kurz char *name = g_path_get_basename(path); 1130a0e640a8SGreg Kurz int flags = 0; 1131a0e640a8SGreg Kurz int dirfd; 1132a0e640a8SGreg Kurz int err = -1; 11338cf89e00SAnthony Liguori 1134a0e640a8SGreg Kurz dirfd = local_opendir_nofollow(ctx, dirpath); 1135b7361d46SGreg Kurz if (dirfd == -1) { 1136a0e640a8SGreg Kurz goto out; 1137a0e640a8SGreg Kurz } 1138a0e640a8SGreg Kurz 1139790db7efSBruce Rogers if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW) < 0) { 11408cf89e00SAnthony Liguori goto err_out; 11418cf89e00SAnthony Liguori } 1142a0e640a8SGreg Kurz 11438cf89e00SAnthony Liguori if (S_ISDIR(stbuf.st_mode)) { 1144a0e640a8SGreg Kurz flags |= AT_REMOVEDIR; 1145faa44e3dSVenkateswararao Jujjuri (JV) } 11464fa4ce71SChen Gang 1147a0e640a8SGreg Kurz err = local_unlinkat_common(ctx, dirfd, name, flags); 11482c30dd74SAneesh Kumar K.V err_out: 1149a0e640a8SGreg Kurz close_preserve_errno(dirfd); 1150a0e640a8SGreg Kurz out: 1151a0e640a8SGreg Kurz g_free(name); 1152a0e640a8SGreg Kurz g_free(dirpath); 11532c30dd74SAneesh Kumar K.V return err; 11545bae1900SAnthony Liguori } 11555bae1900SAnthony Liguori 11568b888272SAneesh Kumar K.V static int local_fsync(FsContext *ctx, int fid_type, 11578b888272SAneesh Kumar K.V V9fsFidOpenState *fs, int datasync) 11588cf89e00SAnthony Liguori { 11598b888272SAneesh Kumar K.V int fd; 11608b888272SAneesh Kumar K.V 11618b888272SAneesh Kumar K.V if (fid_type == P9_FID_DIR) { 1162f314ea4eSGreg Kurz fd = dirfd(fs->dir.stream); 116349594973SVenkateswararao Jujjuri (JV) } else { 11648b888272SAneesh Kumar K.V fd = fs->fd; 11658b888272SAneesh Kumar K.V } 11668b888272SAneesh Kumar K.V 11678b888272SAneesh Kumar K.V if (datasync) { 11688b888272SAneesh Kumar K.V return qemu_fdatasync(fd); 11698b888272SAneesh Kumar K.V } else { 11708b888272SAneesh Kumar K.V return fsync(fd); 11718cf89e00SAnthony Liguori } 117249594973SVenkateswararao Jujjuri (JV) } 11738cf89e00SAnthony Liguori 11742289be19SAneesh Kumar K.V static int local_statfs(FsContext *s, V9fsPath *fs_path, struct statfs *stbuf) 1175be940c87SM. Mohan Kumar { 117631e51d1cSGreg Kurz int fd, ret; 11772289be19SAneesh Kumar K.V 117831e51d1cSGreg Kurz fd = local_open_nofollow(s, fs_path->data, O_RDONLY, 0); 117923da0145SGreg Kurz if (fd == -1) { 118023da0145SGreg Kurz return -1; 118123da0145SGreg Kurz } 118231e51d1cSGreg Kurz ret = fstatfs(fd, stbuf); 118331e51d1cSGreg Kurz close_preserve_errno(fd); 11844fa4ce71SChen Gang return ret; 1185be940c87SM. Mohan Kumar } 1186be940c87SM. Mohan Kumar 11872289be19SAneesh Kumar K.V static ssize_t local_lgetxattr(FsContext *ctx, V9fsPath *fs_path, 1188fa32ef88SAneesh Kumar K.V const char *name, void *value, size_t size) 1189fa32ef88SAneesh Kumar K.V { 11902289be19SAneesh Kumar K.V char *path = fs_path->data; 11912289be19SAneesh Kumar K.V 1192fc22118dSAneesh Kumar K.V return v9fs_get_xattr(ctx, path, name, value, size); 1193fa32ef88SAneesh Kumar K.V } 1194fa32ef88SAneesh Kumar K.V 11952289be19SAneesh Kumar K.V static ssize_t local_llistxattr(FsContext *ctx, V9fsPath *fs_path, 1196fa32ef88SAneesh Kumar K.V void *value, size_t size) 1197fa32ef88SAneesh Kumar K.V { 11982289be19SAneesh Kumar K.V char *path = fs_path->data; 11992289be19SAneesh Kumar K.V 1200fc22118dSAneesh Kumar K.V return v9fs_list_xattr(ctx, path, value, size); 120161b6c499SAneesh Kumar K.V } 120261b6c499SAneesh Kumar K.V 12032289be19SAneesh Kumar K.V static int local_lsetxattr(FsContext *ctx, V9fsPath *fs_path, const char *name, 120410b468bdSAneesh Kumar K.V void *value, size_t size, int flags) 120510b468bdSAneesh Kumar K.V { 12062289be19SAneesh Kumar K.V char *path = fs_path->data; 12072289be19SAneesh Kumar K.V 1208fc22118dSAneesh Kumar K.V return v9fs_set_xattr(ctx, path, name, value, size, flags); 120910b468bdSAneesh Kumar K.V } 121010b468bdSAneesh Kumar K.V 12112289be19SAneesh Kumar K.V static int local_lremovexattr(FsContext *ctx, V9fsPath *fs_path, 12122289be19SAneesh Kumar K.V const char *name) 12139ed3ef26SAneesh Kumar K.V { 12142289be19SAneesh Kumar K.V char *path = fs_path->data; 12152289be19SAneesh Kumar K.V 1216fc22118dSAneesh Kumar K.V return v9fs_remove_xattr(ctx, path, name); 12179ed3ef26SAneesh Kumar K.V } 12189ed3ef26SAneesh Kumar K.V 12192289be19SAneesh Kumar K.V static int local_name_to_path(FsContext *ctx, V9fsPath *dir_path, 12202289be19SAneesh Kumar K.V const char *name, V9fsPath *target) 12212289be19SAneesh Kumar K.V { 12227a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 12237a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 12247a95434eSGreg Kurz errno = EINVAL; 12257a95434eSGreg Kurz return -1; 12267a95434eSGreg Kurz } 12277a95434eSGreg Kurz 12282289be19SAneesh Kumar K.V if (dir_path) { 1229f57f5878SGreg Kurz if (!strcmp(name, ".")) { 1230f57f5878SGreg Kurz /* "." relative to "foo/bar" is "foo/bar" */ 1231f57f5878SGreg Kurz v9fs_path_copy(target, dir_path); 1232f57f5878SGreg Kurz } else if (!strcmp(name, "..")) { 1233f57f5878SGreg Kurz if (!strcmp(dir_path->data, ".")) { 1234f57f5878SGreg Kurz /* ".." relative to the root is "." */ 1235f57f5878SGreg Kurz v9fs_path_sprintf(target, "."); 12369c6b899fSGreg Kurz } else { 1237f57f5878SGreg Kurz char *tmp = g_path_get_dirname(dir_path->data); 1238f57f5878SGreg Kurz /* Symbolic links are resolved by the client. We can assume 1239f57f5878SGreg Kurz * that ".." relative to "foo/bar" is equivalent to "foo" 12409c6b899fSGreg Kurz */ 1241f57f5878SGreg Kurz v9fs_path_sprintf(target, "%s", tmp); 1242f57f5878SGreg Kurz g_free(tmp); 1243f57f5878SGreg Kurz } 1244f57f5878SGreg Kurz } else { 1245f57f5878SGreg Kurz assert(!strchr(name, '/')); 1246f57f5878SGreg Kurz v9fs_path_sprintf(target, "%s/%s", dir_path->data, name); 1247f57f5878SGreg Kurz } 1248f57f5878SGreg Kurz } else if (!strcmp(name, "/") || !strcmp(name, ".") || 1249f57f5878SGreg Kurz !strcmp(name, "..")) { 1250f57f5878SGreg Kurz /* This is the root fid */ 1251f57f5878SGreg Kurz v9fs_path_sprintf(target, "."); 1252f57f5878SGreg Kurz } else { 1253f57f5878SGreg Kurz assert(!strchr(name, '/')); 1254f57f5878SGreg Kurz v9fs_path_sprintf(target, "./%s", name); 12552289be19SAneesh Kumar K.V } 12562289be19SAneesh Kumar K.V return 0; 12572289be19SAneesh Kumar K.V } 12582289be19SAneesh Kumar K.V 12592289be19SAneesh Kumar K.V static int local_renameat(FsContext *ctx, V9fsPath *olddir, 12602289be19SAneesh Kumar K.V const char *old_name, V9fsPath *newdir, 12612289be19SAneesh Kumar K.V const char *new_name) 12622289be19SAneesh Kumar K.V { 12632289be19SAneesh Kumar K.V int ret; 126499f2cf4bSGreg Kurz int odirfd, ndirfd; 12652289be19SAneesh Kumar K.V 12667a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 12677a95434eSGreg Kurz (local_is_mapped_file_metadata(ctx, old_name) || 12687a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, new_name))) { 12697a95434eSGreg Kurz errno = EINVAL; 12707a95434eSGreg Kurz return -1; 12717a95434eSGreg Kurz } 12727a95434eSGreg Kurz 127399f2cf4bSGreg Kurz odirfd = local_opendir_nofollow(ctx, olddir->data); 127499f2cf4bSGreg Kurz if (odirfd == -1) { 127599f2cf4bSGreg Kurz return -1; 127699f2cf4bSGreg Kurz } 12772289be19SAneesh Kumar K.V 127899f2cf4bSGreg Kurz ndirfd = local_opendir_nofollow(ctx, newdir->data); 127999f2cf4bSGreg Kurz if (ndirfd == -1) { 128099f2cf4bSGreg Kurz close_preserve_errno(odirfd); 128199f2cf4bSGreg Kurz return -1; 128299f2cf4bSGreg Kurz } 12832289be19SAneesh Kumar K.V 128499f2cf4bSGreg Kurz ret = renameat(odirfd, old_name, ndirfd, new_name); 128599f2cf4bSGreg Kurz if (ret < 0) { 128699f2cf4bSGreg Kurz goto out; 128799f2cf4bSGreg Kurz } 128899f2cf4bSGreg Kurz 128999f2cf4bSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 129099f2cf4bSGreg Kurz int omap_dirfd, nmap_dirfd; 129199f2cf4bSGreg Kurz 129299f2cf4bSGreg Kurz ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700); 129399f2cf4bSGreg Kurz if (ret < 0 && errno != EEXIST) { 129499f2cf4bSGreg Kurz goto err_undo_rename; 129599f2cf4bSGreg Kurz } 129699f2cf4bSGreg Kurz 12976dd4b1f1SGreg Kurz omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR); 129899f2cf4bSGreg Kurz if (omap_dirfd == -1) { 129999f2cf4bSGreg Kurz goto err; 130099f2cf4bSGreg Kurz } 130199f2cf4bSGreg Kurz 13026dd4b1f1SGreg Kurz nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR); 130399f2cf4bSGreg Kurz if (nmap_dirfd == -1) { 130499f2cf4bSGreg Kurz close_preserve_errno(omap_dirfd); 130599f2cf4bSGreg Kurz goto err; 130699f2cf4bSGreg Kurz } 130799f2cf4bSGreg Kurz 130899f2cf4bSGreg Kurz /* rename the .virtfs_metadata files */ 130999f2cf4bSGreg Kurz ret = renameat(omap_dirfd, old_name, nmap_dirfd, new_name); 131099f2cf4bSGreg Kurz close_preserve_errno(nmap_dirfd); 131199f2cf4bSGreg Kurz close_preserve_errno(omap_dirfd); 131299f2cf4bSGreg Kurz if (ret < 0 && errno != ENOENT) { 131399f2cf4bSGreg Kurz goto err_undo_rename; 131499f2cf4bSGreg Kurz } 131599f2cf4bSGreg Kurz 131699f2cf4bSGreg Kurz ret = 0; 131799f2cf4bSGreg Kurz } 131899f2cf4bSGreg Kurz goto out; 131999f2cf4bSGreg Kurz 132099f2cf4bSGreg Kurz err: 132199f2cf4bSGreg Kurz ret = -1; 132299f2cf4bSGreg Kurz err_undo_rename: 132399f2cf4bSGreg Kurz renameat_preserve_errno(ndirfd, new_name, odirfd, old_name); 132499f2cf4bSGreg Kurz out: 132599f2cf4bSGreg Kurz close_preserve_errno(ndirfd); 132699f2cf4bSGreg Kurz close_preserve_errno(odirfd); 13272289be19SAneesh Kumar K.V return ret; 13282289be19SAneesh Kumar K.V } 13292289be19SAneesh Kumar K.V 1330d2767edeSGreg Kurz static void v9fs_path_init_dirname(V9fsPath *path, const char *str) 1331d2767edeSGreg Kurz { 1332d2767edeSGreg Kurz path->data = g_path_get_dirname(str); 1333d2767edeSGreg Kurz path->size = strlen(path->data) + 1; 1334d2767edeSGreg Kurz } 1335d2767edeSGreg Kurz 1336d2767edeSGreg Kurz static int local_rename(FsContext *ctx, const char *oldpath, 1337d2767edeSGreg Kurz const char *newpath) 1338d2767edeSGreg Kurz { 1339d2767edeSGreg Kurz int err; 1340d2767edeSGreg Kurz char *oname = g_path_get_basename(oldpath); 1341d2767edeSGreg Kurz char *nname = g_path_get_basename(newpath); 1342d2767edeSGreg Kurz V9fsPath olddir, newdir; 1343d2767edeSGreg Kurz 1344d2767edeSGreg Kurz v9fs_path_init_dirname(&olddir, oldpath); 1345d2767edeSGreg Kurz v9fs_path_init_dirname(&newdir, newpath); 1346d2767edeSGreg Kurz 1347d2767edeSGreg Kurz err = local_renameat(ctx, &olddir, oname, &newdir, nname); 1348d2767edeSGreg Kurz 1349d2767edeSGreg Kurz v9fs_path_free(&newdir); 1350d2767edeSGreg Kurz v9fs_path_free(&olddir); 1351d2767edeSGreg Kurz g_free(nname); 1352d2767edeSGreg Kurz g_free(oname); 1353d2767edeSGreg Kurz 1354d2767edeSGreg Kurz return err; 1355d2767edeSGreg Kurz } 1356d2767edeSGreg Kurz 13572289be19SAneesh Kumar K.V static int local_unlinkat(FsContext *ctx, V9fsPath *dir, 13582289be19SAneesh Kumar K.V const char *name, int flags) 13592289be19SAneesh Kumar K.V { 13602289be19SAneesh Kumar K.V int ret; 1361df4938a6SGreg Kurz int dirfd; 13622c30dd74SAneesh Kumar K.V 13637a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 13647a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 13657a95434eSGreg Kurz errno = EINVAL; 13667a95434eSGreg Kurz return -1; 13677a95434eSGreg Kurz } 13687a95434eSGreg Kurz 1369df4938a6SGreg Kurz dirfd = local_opendir_nofollow(ctx, dir->data); 1370df4938a6SGreg Kurz if (dirfd == -1) { 1371df4938a6SGreg Kurz return -1; 1372df4938a6SGreg Kurz } 13732289be19SAneesh Kumar K.V 1374df4938a6SGreg Kurz ret = local_unlinkat_common(ctx, dirfd, name, flags); 1375df4938a6SGreg Kurz close_preserve_errno(dirfd); 13762289be19SAneesh Kumar K.V return ret; 13772289be19SAneesh Kumar K.V } 13789ed3ef26SAneesh Kumar K.V 13795b7b2f9aSKeno Fischer #ifdef FS_IOC_GETVERSION 1380e06a765eSHarsh Prateek Bora static int local_ioc_getversion(FsContext *ctx, V9fsPath *path, 1381e06a765eSHarsh Prateek Bora mode_t st_mode, uint64_t *st_gen) 1382e06a765eSHarsh Prateek Bora { 13830e5fc994SKirill A. Shutemov int err; 1384cc720ddbSAneesh Kumar K.V V9fsFidOpenState fid_open; 1385cc720ddbSAneesh Kumar K.V 1386e06a765eSHarsh Prateek Bora /* 1387e06a765eSHarsh Prateek Bora * Do not try to open special files like device nodes, fifos etc 1388e06a765eSHarsh Prateek Bora * We can get fd for regular files and directories only 1389e06a765eSHarsh Prateek Bora */ 1390e06a765eSHarsh Prateek Bora if (!S_ISREG(st_mode) && !S_ISDIR(st_mode)) { 13911a9978a5SKirill A. Shutemov errno = ENOTTY; 13921a9978a5SKirill A. Shutemov return -1; 1393e06a765eSHarsh Prateek Bora } 1394cc720ddbSAneesh Kumar K.V err = local_open(ctx, path, O_RDONLY, &fid_open); 1395cc720ddbSAneesh Kumar K.V if (err < 0) { 1396cc720ddbSAneesh Kumar K.V return err; 1397e06a765eSHarsh Prateek Bora } 1398cc720ddbSAneesh Kumar K.V err = ioctl(fid_open.fd, FS_IOC_GETVERSION, st_gen); 1399cc720ddbSAneesh Kumar K.V local_close(ctx, &fid_open); 1400e06a765eSHarsh Prateek Bora return err; 14015b7b2f9aSKeno Fischer } 14020e5fc994SKirill A. Shutemov #endif 1403e06a765eSHarsh Prateek Bora 14045b7b2f9aSKeno Fischer static int local_ioc_getversion_init(FsContext *ctx, LocalData *data, Error **errp) 14050174fe73SAneesh Kumar K.V { 140600c90bd1SGreg Kurz #ifdef FS_IOC_GETVERSION 14075b7b2f9aSKeno Fischer struct statfs stbuf; 14085b7b2f9aSKeno Fischer 140900c90bd1SGreg Kurz /* 141000c90bd1SGreg Kurz * use ioc_getversion only if the ioctl is definied 141100c90bd1SGreg Kurz */ 14120e35a378SGreg Kurz if (fstatfs(data->mountfd, &stbuf) < 0) { 14132306271cSKeno Fischer error_setg_errno(errp, errno, 14142306271cSKeno Fischer "failed to stat file system at '%s'", ctx->fs_root); 14155b7b2f9aSKeno Fischer return -1; 141600c90bd1SGreg Kurz } 141700c90bd1SGreg Kurz switch (stbuf.f_type) { 141800c90bd1SGreg Kurz case EXT2_SUPER_MAGIC: 141900c90bd1SGreg Kurz case BTRFS_SUPER_MAGIC: 142000c90bd1SGreg Kurz case REISERFS_SUPER_MAGIC: 142100c90bd1SGreg Kurz case XFS_SUPER_MAGIC: 142200c90bd1SGreg Kurz ctx->exops.get_st_gen = local_ioc_getversion; 142300c90bd1SGreg Kurz break; 142400c90bd1SGreg Kurz } 142500c90bd1SGreg Kurz #endif 14265b7b2f9aSKeno Fischer return 0; 14275b7b2f9aSKeno Fischer } 14285b7b2f9aSKeno Fischer 14295b7b2f9aSKeno Fischer static int local_init(FsContext *ctx, Error **errp) 14305b7b2f9aSKeno Fischer { 14315b7b2f9aSKeno Fischer LocalData *data = g_malloc(sizeof(*data)); 14325b7b2f9aSKeno Fischer 14335b7b2f9aSKeno Fischer data->mountfd = open(ctx->fs_root, O_DIRECTORY | O_RDONLY); 14345b7b2f9aSKeno Fischer if (data->mountfd == -1) { 14355b7b2f9aSKeno Fischer error_setg_errno(errp, errno, "failed to open '%s'", ctx->fs_root); 14365b7b2f9aSKeno Fischer goto err; 14375b7b2f9aSKeno Fischer } 14385b7b2f9aSKeno Fischer 14395b7b2f9aSKeno Fischer if (local_ioc_getversion_init(ctx, data, errp) < 0) { 14405b7b2f9aSKeno Fischer close(data->mountfd); 14415b7b2f9aSKeno Fischer goto err; 14425b7b2f9aSKeno Fischer } 1443e06a765eSHarsh Prateek Bora 14442c30dd74SAneesh Kumar K.V if (ctx->export_flags & V9FS_SM_PASSTHROUGH) { 14452c30dd74SAneesh Kumar K.V ctx->xops = passthrough_xattr_ops; 14462c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_MAPPED) { 14472c30dd74SAneesh Kumar K.V ctx->xops = mapped_xattr_ops; 14482c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_NONE) { 14492c30dd74SAneesh Kumar K.V ctx->xops = none_xattr_ops; 14502c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 14512c30dd74SAneesh Kumar K.V /* 14522c30dd74SAneesh Kumar K.V * xattr operation for mapped-file and passthrough 14532c30dd74SAneesh Kumar K.V * remain same. 14542c30dd74SAneesh Kumar K.V */ 14552c30dd74SAneesh Kumar K.V ctx->xops = passthrough_xattr_ops; 14562c30dd74SAneesh Kumar K.V } 1457c98f1d4aSAneesh Kumar K.V ctx->export_flags |= V9FS_PATHNAME_FSCONTEXT; 145800c90bd1SGreg Kurz 14590e35a378SGreg Kurz ctx->private = data; 146000c90bd1SGreg Kurz return 0; 14610e35a378SGreg Kurz 14620e35a378SGreg Kurz err: 14630e35a378SGreg Kurz g_free(data); 14640e35a378SGreg Kurz return -1; 1465e06a765eSHarsh Prateek Bora } 14660e35a378SGreg Kurz 14670e35a378SGreg Kurz static void local_cleanup(FsContext *ctx) 14680e35a378SGreg Kurz { 14690e35a378SGreg Kurz LocalData *data = ctx->private; 14700e35a378SGreg Kurz 1471c0da0cb7SGreg Kurz if (!data) { 1472c0da0cb7SGreg Kurz return; 1473c0da0cb7SGreg Kurz } 1474c0da0cb7SGreg Kurz 14750e35a378SGreg Kurz close(data->mountfd); 14760e35a378SGreg Kurz g_free(data); 14770174fe73SAneesh Kumar K.V } 14780174fe73SAneesh Kumar K.V 14794c5ec47eSVladimir Sementsov-Ogievskiy static void error_append_security_model_hint(Error *const *errp) 148091cda4e8SGreg Kurz { 148191cda4e8SGreg Kurz error_append_hint(errp, "Valid options are: security_model=" 148291cda4e8SGreg Kurz "[passthrough|mapped-xattr|mapped-file|none]\n"); 148391cda4e8SGreg Kurz } 148491cda4e8SGreg Kurz 148591cda4e8SGreg Kurz static int local_parse_opts(QemuOpts *opts, FsDriverEntry *fse, Error **errp) 148699519f0aSAneesh Kumar K.V { 148792c45122SVladimir Sementsov-Ogievskiy ERRP_GUARD(); 148899519f0aSAneesh Kumar K.V const char *sec_model = qemu_opt_get(opts, "security_model"); 148999519f0aSAneesh Kumar K.V const char *path = qemu_opt_get(opts, "path"); 14901a6ed33cSAntonios Motakis const char *multidevs = qemu_opt_get(opts, "multidevs"); 149199519f0aSAneesh Kumar K.V 149299519f0aSAneesh Kumar K.V if (!sec_model) { 149391cda4e8SGreg Kurz error_setg(errp, "security_model property not set"); 149491cda4e8SGreg Kurz error_append_security_model_hint(errp); 149599519f0aSAneesh Kumar K.V return -1; 149699519f0aSAneesh Kumar K.V } 149799519f0aSAneesh Kumar K.V 149899519f0aSAneesh Kumar K.V if (!strcmp(sec_model, "passthrough")) { 149999519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_PASSTHROUGH; 15002c30dd74SAneesh Kumar K.V } else if (!strcmp(sec_model, "mapped") || 15012c30dd74SAneesh Kumar K.V !strcmp(sec_model, "mapped-xattr")) { 150299519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_MAPPED; 150399519f0aSAneesh Kumar K.V } else if (!strcmp(sec_model, "none")) { 150499519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_NONE; 15052c30dd74SAneesh Kumar K.V } else if (!strcmp(sec_model, "mapped-file")) { 15062c30dd74SAneesh Kumar K.V fse->export_flags |= V9FS_SM_MAPPED_FILE; 150799519f0aSAneesh Kumar K.V } else { 150891cda4e8SGreg Kurz error_setg(errp, "invalid security_model property '%s'", sec_model); 150991cda4e8SGreg Kurz error_append_security_model_hint(errp); 151099519f0aSAneesh Kumar K.V return -1; 151199519f0aSAneesh Kumar K.V } 151299519f0aSAneesh Kumar K.V 15131a6ed33cSAntonios Motakis if (multidevs) { 15141a6ed33cSAntonios Motakis if (!strcmp(multidevs, "remap")) { 15151a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_FORBID_MULTIDEVS; 15161a6ed33cSAntonios Motakis fse->export_flags |= V9FS_REMAP_INODES; 15171a6ed33cSAntonios Motakis } else if (!strcmp(multidevs, "forbid")) { 15181a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_REMAP_INODES; 15191a6ed33cSAntonios Motakis fse->export_flags |= V9FS_FORBID_MULTIDEVS; 15201a6ed33cSAntonios Motakis } else if (!strcmp(multidevs, "warn")) { 15211a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_FORBID_MULTIDEVS; 15221a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_REMAP_INODES; 15231a6ed33cSAntonios Motakis } else { 152492c45122SVladimir Sementsov-Ogievskiy error_setg(errp, "invalid multidevs property '%s'", 15251a6ed33cSAntonios Motakis multidevs); 152692c45122SVladimir Sementsov-Ogievskiy error_append_hint(errp, "Valid options are: multidevs=" 15271a6ed33cSAntonios Motakis "[remap|forbid|warn]\n"); 15281a6ed33cSAntonios Motakis return -1; 15291a6ed33cSAntonios Motakis } 15301a6ed33cSAntonios Motakis } 15311a6ed33cSAntonios Motakis 153299519f0aSAneesh Kumar K.V if (!path) { 153391cda4e8SGreg Kurz error_setg(errp, "path property not set"); 153499519f0aSAneesh Kumar K.V return -1; 153599519f0aSAneesh Kumar K.V } 1536b8bbdb88SPradeep Jagadeesh 153792c45122SVladimir Sementsov-Ogievskiy if (fsdev_throttle_parse_opts(opts, &fse->fst, errp)) { 153892c45122SVladimir Sementsov-Ogievskiy error_prepend(errp, "invalid throttle configuration: "); 1539b8bbdb88SPradeep Jagadeesh return -1; 1540b8bbdb88SPradeep Jagadeesh } 1541b8bbdb88SPradeep Jagadeesh 1542b96feb2cSTobias Schramm if (fse->export_flags & V9FS_SM_MAPPED || 1543b96feb2cSTobias Schramm fse->export_flags & V9FS_SM_MAPPED_FILE) { 1544b96feb2cSTobias Schramm fse->fmode = 1545b96feb2cSTobias Schramm qemu_opt_get_number(opts, "fmode", SM_LOCAL_MODE_BITS) & 0777; 1546b96feb2cSTobias Schramm fse->dmode = 1547b96feb2cSTobias Schramm qemu_opt_get_number(opts, "dmode", SM_LOCAL_DIR_MODE_BITS) & 0777; 1548b96feb2cSTobias Schramm } else { 1549b96feb2cSTobias Schramm if (qemu_opt_find(opts, "fmode")) { 155091cda4e8SGreg Kurz error_setg(errp, "fmode is only valid for mapped security modes"); 1551b96feb2cSTobias Schramm return -1; 1552b96feb2cSTobias Schramm } 1553b96feb2cSTobias Schramm if (qemu_opt_find(opts, "dmode")) { 155491cda4e8SGreg Kurz error_setg(errp, "dmode is only valid for mapped security modes"); 1555b96feb2cSTobias Schramm return -1; 1556b96feb2cSTobias Schramm } 1557b96feb2cSTobias Schramm } 1558b96feb2cSTobias Schramm 155999519f0aSAneesh Kumar K.V fse->path = g_strdup(path); 156099519f0aSAneesh Kumar K.V 156199519f0aSAneesh Kumar K.V return 0; 156299519f0aSAneesh Kumar K.V } 156399519f0aSAneesh Kumar K.V 15649f107513SAnthony Liguori FileOperations local_ops = { 156599519f0aSAneesh Kumar K.V .parse_opts = local_parse_opts, 15660174fe73SAneesh Kumar K.V .init = local_init, 15670e35a378SGreg Kurz .cleanup = local_cleanup, 1568131dcb25SAnthony Liguori .lstat = local_lstat, 1569131dcb25SAnthony Liguori .readlink = local_readlink, 1570131dcb25SAnthony Liguori .close = local_close, 1571131dcb25SAnthony Liguori .closedir = local_closedir, 1572a6568fe2SAnthony Liguori .open = local_open, 1573a6568fe2SAnthony Liguori .opendir = local_opendir, 1574a9231555SAnthony Liguori .rewinddir = local_rewinddir, 1575a9231555SAnthony Liguori .telldir = local_telldir, 1576635324e8SGreg Kurz .readdir = local_readdir, 1577a9231555SAnthony Liguori .seekdir = local_seekdir, 157856d15a53SSanchit Garg .preadv = local_preadv, 157956d15a53SSanchit Garg .pwritev = local_pwritev, 1580c494dd6fSAnthony Liguori .chmod = local_chmod, 1581c494dd6fSAnthony Liguori .mknod = local_mknod, 1582c494dd6fSAnthony Liguori .mkdir = local_mkdir, 1583c494dd6fSAnthony Liguori .fstat = local_fstat, 1584c494dd6fSAnthony Liguori .open2 = local_open2, 1585c494dd6fSAnthony Liguori .symlink = local_symlink, 1586c494dd6fSAnthony Liguori .link = local_link, 15878cf89e00SAnthony Liguori .truncate = local_truncate, 15888cf89e00SAnthony Liguori .rename = local_rename, 15898cf89e00SAnthony Liguori .chown = local_chown, 159074bc02b2SM. Mohan Kumar .utimensat = local_utimensat, 15915bae1900SAnthony Liguori .remove = local_remove, 15928cf89e00SAnthony Liguori .fsync = local_fsync, 1593be940c87SM. Mohan Kumar .statfs = local_statfs, 1594fa32ef88SAneesh Kumar K.V .lgetxattr = local_lgetxattr, 1595fa32ef88SAneesh Kumar K.V .llistxattr = local_llistxattr, 159610b468bdSAneesh Kumar K.V .lsetxattr = local_lsetxattr, 15979ed3ef26SAneesh Kumar K.V .lremovexattr = local_lremovexattr, 15982289be19SAneesh Kumar K.V .name_to_path = local_name_to_path, 15992289be19SAneesh Kumar K.V .renameat = local_renameat, 16002289be19SAneesh Kumar K.V .unlinkat = local_unlinkat, 16019f107513SAnthony Liguori }; 1602