19f107513SAnthony Liguori /* 2f00d4f59SWei Liu * 9p Posix callback 39f107513SAnthony Liguori * 49f107513SAnthony Liguori * Copyright IBM, Corp. 2010 59f107513SAnthony Liguori * 69f107513SAnthony Liguori * Authors: 79f107513SAnthony Liguori * Anthony Liguori <aliguori@us.ibm.com> 89f107513SAnthony Liguori * 99f107513SAnthony Liguori * This work is licensed under the terms of the GNU GPL, version 2. See 109f107513SAnthony Liguori * the COPYING file in the top-level directory. 119f107513SAnthony Liguori * 129f107513SAnthony Liguori */ 13873c3213SStefan Weil 14fbc04127SPeter Maydell #include "qemu/osdep.h" 15ebe74f8bSWei Liu #include "9p.h" 16996a0d76SGreg Kurz #include "9p-local.h" 17267ae092SWei Liu #include "9p-xattr.h" 180e35a378SGreg Kurz #include "9p-util.h" 1969b15212SStefan Weil #include "fsdev/qemu-fsdev.h" /* local_ops */ 20c494dd6fSAnthony Liguori #include <arpa/inet.h> 21131dcb25SAnthony Liguori #include <pwd.h> 22131dcb25SAnthony Liguori #include <grp.h> 23c494dd6fSAnthony Liguori #include <sys/socket.h> 24c494dd6fSAnthony Liguori #include <sys/un.h> 251de7afc9SPaolo Bonzini #include "qemu/xattr.h" 26f348b6d1SVeronia Bahaa #include "qemu/cutils.h" 2763325b18SGreg Kurz #include "qemu/error-report.h" 282c30dd74SAneesh Kumar K.V #include <libgen.h> 29e06a765eSHarsh Prateek Bora #include <linux/fs.h> 30e06a765eSHarsh Prateek Bora #ifdef CONFIG_LINUX_MAGIC_H 31e06a765eSHarsh Prateek Bora #include <linux/magic.h> 32e06a765eSHarsh Prateek Bora #endif 33e06a765eSHarsh Prateek Bora #include <sys/ioctl.h> 34e06a765eSHarsh Prateek Bora 35e06a765eSHarsh Prateek Bora #ifndef XFS_SUPER_MAGIC 36e06a765eSHarsh Prateek Bora #define XFS_SUPER_MAGIC 0x58465342 37e06a765eSHarsh Prateek Bora #endif 38e06a765eSHarsh Prateek Bora #ifndef EXT2_SUPER_MAGIC 39e06a765eSHarsh Prateek Bora #define EXT2_SUPER_MAGIC 0xEF53 40e06a765eSHarsh Prateek Bora #endif 41e06a765eSHarsh Prateek Bora #ifndef REISERFS_SUPER_MAGIC 42e06a765eSHarsh Prateek Bora #define REISERFS_SUPER_MAGIC 0x52654973 43e06a765eSHarsh Prateek Bora #endif 44e06a765eSHarsh Prateek Bora #ifndef BTRFS_SUPER_MAGIC 45e06a765eSHarsh Prateek Bora #define BTRFS_SUPER_MAGIC 0x9123683E 46e06a765eSHarsh Prateek Bora #endif 47131dcb25SAnthony Liguori 480e35a378SGreg Kurz typedef struct { 490e35a378SGreg Kurz int mountfd; 500e35a378SGreg Kurz } LocalData; 510e35a378SGreg Kurz 52996a0d76SGreg Kurz int local_open_nofollow(FsContext *fs_ctx, const char *path, int flags, 53996a0d76SGreg Kurz mode_t mode) 54996a0d76SGreg Kurz { 55996a0d76SGreg Kurz LocalData *data = fs_ctx->private; 563dbcf273SGreg Kurz int fd = data->mountfd; 57996a0d76SGreg Kurz 583dbcf273SGreg Kurz while (*path && fd != -1) { 593dbcf273SGreg Kurz const char *c; 603dbcf273SGreg Kurz int next_fd; 613dbcf273SGreg Kurz char *head; 623dbcf273SGreg Kurz 633dbcf273SGreg Kurz /* Only relative paths without consecutive slashes */ 643dbcf273SGreg Kurz assert(*path != '/'); 653dbcf273SGreg Kurz 663dbcf273SGreg Kurz head = g_strdup(path); 673dbcf273SGreg Kurz c = strchrnul(path, '/'); 683dbcf273SGreg Kurz if (*c) { 693dbcf273SGreg Kurz /* Intermediate path element */ 703dbcf273SGreg Kurz head[c - path] = 0; 713dbcf273SGreg Kurz path = c + 1; 723dbcf273SGreg Kurz next_fd = openat_dir(fd, head); 733dbcf273SGreg Kurz } else { 743dbcf273SGreg Kurz /* Rightmost path element */ 753dbcf273SGreg Kurz next_fd = openat_file(fd, head, flags, mode); 763dbcf273SGreg Kurz path = c; 773dbcf273SGreg Kurz } 783dbcf273SGreg Kurz g_free(head); 793dbcf273SGreg Kurz if (fd != data->mountfd) { 803dbcf273SGreg Kurz close_preserve_errno(fd); 813dbcf273SGreg Kurz } 823dbcf273SGreg Kurz fd = next_fd; 83996a0d76SGreg Kurz } 84996a0d76SGreg Kurz 853dbcf273SGreg Kurz assert(fd != data->mountfd); 863dbcf273SGreg Kurz return fd; 87996a0d76SGreg Kurz } 88996a0d76SGreg Kurz 89996a0d76SGreg Kurz int local_opendir_nofollow(FsContext *fs_ctx, const char *path) 90996a0d76SGreg Kurz { 91996a0d76SGreg Kurz return local_open_nofollow(fs_ctx, path, O_DIRECTORY | O_RDONLY, 0); 92996a0d76SGreg Kurz } 93996a0d76SGreg Kurz 9499f2cf4bSGreg Kurz static void renameat_preserve_errno(int odirfd, const char *opath, int ndirfd, 9599f2cf4bSGreg Kurz const char *npath) 9699f2cf4bSGreg Kurz { 9799f2cf4bSGreg Kurz int serrno = errno; 9899f2cf4bSGreg Kurz renameat(odirfd, opath, ndirfd, npath); 9999f2cf4bSGreg Kurz errno = serrno; 10099f2cf4bSGreg Kurz } 10199f2cf4bSGreg Kurz 102ad0b46e6SGreg Kurz static void unlinkat_preserve_errno(int dirfd, const char *path, int flags) 103ad0b46e6SGreg Kurz { 104ad0b46e6SGreg Kurz int serrno = errno; 105ad0b46e6SGreg Kurz unlinkat(dirfd, path, flags); 106ad0b46e6SGreg Kurz errno = serrno; 107ad0b46e6SGreg Kurz } 108ad0b46e6SGreg Kurz 1092c30dd74SAneesh Kumar K.V #define VIRTFS_META_DIR ".virtfs_metadata" 11081ffbf5aSGreg Kurz #define VIRTFS_META_ROOT_FILE VIRTFS_META_DIR "_root" 1112c30dd74SAneesh Kumar K.V 112f9aef99bSGreg Kurz static FILE *local_fopenat(int dirfd, const char *name, const char *mode) 1130ceb092eSAneesh Kumar K.V { 1140ceb092eSAneesh Kumar K.V int fd, o_mode = 0; 1150ceb092eSAneesh Kumar K.V FILE *fp; 116f9aef99bSGreg Kurz int flags; 1170ceb092eSAneesh Kumar K.V /* 1180ceb092eSAneesh Kumar K.V * only supports two modes 1190ceb092eSAneesh Kumar K.V */ 1200ceb092eSAneesh Kumar K.V if (mode[0] == 'r') { 121f9aef99bSGreg Kurz flags = O_RDONLY; 1220ceb092eSAneesh Kumar K.V } else if (mode[0] == 'w') { 123f9aef99bSGreg Kurz flags = O_WRONLY | O_TRUNC | O_CREAT; 1240ceb092eSAneesh Kumar K.V o_mode = S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH; 1250ceb092eSAneesh Kumar K.V } else { 1260ceb092eSAneesh Kumar K.V return NULL; 1270ceb092eSAneesh Kumar K.V } 128f9aef99bSGreg Kurz fd = openat_file(dirfd, name, flags, o_mode); 1290ceb092eSAneesh Kumar K.V if (fd == -1) { 1300ceb092eSAneesh Kumar K.V return NULL; 1310ceb092eSAneesh Kumar K.V } 1320ceb092eSAneesh Kumar K.V fp = fdopen(fd, mode); 1330ceb092eSAneesh Kumar K.V if (!fp) { 1340ceb092eSAneesh Kumar K.V close(fd); 1350ceb092eSAneesh Kumar K.V } 1360ceb092eSAneesh Kumar K.V return fp; 1370ceb092eSAneesh Kumar K.V } 1380ceb092eSAneesh Kumar K.V 1392c30dd74SAneesh Kumar K.V #define ATTR_MAX 100 140f9aef99bSGreg Kurz static void local_mapped_file_attr(int dirfd, const char *name, 1412c30dd74SAneesh Kumar K.V struct stat *stbuf) 1422c30dd74SAneesh Kumar K.V { 1432c30dd74SAneesh Kumar K.V FILE *fp; 1442c30dd74SAneesh Kumar K.V char buf[ATTR_MAX]; 145f9aef99bSGreg Kurz int map_dirfd; 1462c30dd74SAneesh Kumar K.V 14781ffbf5aSGreg Kurz if (strcmp(name, ".")) { 14899f2cf4bSGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 149f9aef99bSGreg Kurz if (map_dirfd == -1) { 150f9aef99bSGreg Kurz return; 151f9aef99bSGreg Kurz } 152f9aef99bSGreg Kurz 153f9aef99bSGreg Kurz fp = local_fopenat(map_dirfd, name, "r"); 154f9aef99bSGreg Kurz close_preserve_errno(map_dirfd); 15581ffbf5aSGreg Kurz } else { 15681ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r"); 15781ffbf5aSGreg Kurz } 1582c30dd74SAneesh Kumar K.V if (!fp) { 1592c30dd74SAneesh Kumar K.V return; 1602c30dd74SAneesh Kumar K.V } 1612c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 1622c30dd74SAneesh Kumar K.V while (fgets(buf, ATTR_MAX, fp)) { 1632c30dd74SAneesh Kumar K.V if (!strncmp(buf, "virtfs.uid", 10)) { 1642c30dd74SAneesh Kumar K.V stbuf->st_uid = atoi(buf+11); 1652c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.gid", 10)) { 1662c30dd74SAneesh Kumar K.V stbuf->st_gid = atoi(buf+11); 1672c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.mode", 11)) { 1682c30dd74SAneesh Kumar K.V stbuf->st_mode = atoi(buf+12); 1692c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.rdev", 11)) { 1702c30dd74SAneesh Kumar K.V stbuf->st_rdev = atoi(buf+12); 1712c30dd74SAneesh Kumar K.V } 1722c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 1732c30dd74SAneesh Kumar K.V } 1742c30dd74SAneesh Kumar K.V fclose(fp); 1752c30dd74SAneesh Kumar K.V } 1762c30dd74SAneesh Kumar K.V 1772289be19SAneesh Kumar K.V static int local_lstat(FsContext *fs_ctx, V9fsPath *fs_path, struct stat *stbuf) 178131dcb25SAnthony Liguori { 179f9aef99bSGreg Kurz int err = -1; 180f9aef99bSGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 181f9aef99bSGreg Kurz char *name = g_path_get_basename(fs_path->data); 182f9aef99bSGreg Kurz int dirfd; 1832289be19SAneesh Kumar K.V 184f9aef99bSGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 185f9aef99bSGreg Kurz if (dirfd == -1) { 186f9aef99bSGreg Kurz goto out; 187f9aef99bSGreg Kurz } 188f9aef99bSGreg Kurz 189f9aef99bSGreg Kurz err = fstatat(dirfd, name, stbuf, AT_SYMLINK_NOFOLLOW); 1901237ad76SVenkateswararao Jujjuri (JV) if (err) { 1914fa4ce71SChen Gang goto err_out; 1921237ad76SVenkateswararao Jujjuri (JV) } 193b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 1941237ad76SVenkateswararao Jujjuri (JV) /* Actual credentials are part of extended attrs */ 1951237ad76SVenkateswararao Jujjuri (JV) uid_t tmp_uid; 1961237ad76SVenkateswararao Jujjuri (JV) gid_t tmp_gid; 1971237ad76SVenkateswararao Jujjuri (JV) mode_t tmp_mode; 1981237ad76SVenkateswararao Jujjuri (JV) dev_t tmp_dev; 199f9aef99bSGreg Kurz 200f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.uid", &tmp_uid, 201f9aef99bSGreg Kurz sizeof(uid_t)) > 0) { 202f8ad4a89SAneesh Kumar K.V stbuf->st_uid = le32_to_cpu(tmp_uid); 2031237ad76SVenkateswararao Jujjuri (JV) } 204f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.gid", &tmp_gid, 205f9aef99bSGreg Kurz sizeof(gid_t)) > 0) { 206f8ad4a89SAneesh Kumar K.V stbuf->st_gid = le32_to_cpu(tmp_gid); 2071237ad76SVenkateswararao Jujjuri (JV) } 208f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.mode", &tmp_mode, 209f9aef99bSGreg Kurz sizeof(mode_t)) > 0) { 210f8ad4a89SAneesh Kumar K.V stbuf->st_mode = le32_to_cpu(tmp_mode); 2111237ad76SVenkateswararao Jujjuri (JV) } 212f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.rdev", &tmp_dev, 213f9aef99bSGreg Kurz sizeof(dev_t)) > 0) { 214f8ad4a89SAneesh Kumar K.V stbuf->st_rdev = le64_to_cpu(tmp_dev); 2151237ad76SVenkateswararao Jujjuri (JV) } 2162c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 217f9aef99bSGreg Kurz local_mapped_file_attr(dirfd, name, stbuf); 2181237ad76SVenkateswararao Jujjuri (JV) } 2194fa4ce71SChen Gang 2204fa4ce71SChen Gang err_out: 221f9aef99bSGreg Kurz close_preserve_errno(dirfd); 222f9aef99bSGreg Kurz out: 223f9aef99bSGreg Kurz g_free(name); 224f9aef99bSGreg Kurz g_free(dirpath); 2251237ad76SVenkateswararao Jujjuri (JV) return err; 226131dcb25SAnthony Liguori } 227131dcb25SAnthony Liguori 228e3187a45SGreg Kurz static int local_set_mapped_file_attrat(int dirfd, const char *name, 229e3187a45SGreg Kurz FsCred *credp) 2302c30dd74SAneesh Kumar K.V { 2312c30dd74SAneesh Kumar K.V FILE *fp; 232e3187a45SGreg Kurz int ret; 2332c30dd74SAneesh Kumar K.V char buf[ATTR_MAX]; 2342c30dd74SAneesh Kumar K.V int uid = -1, gid = -1, mode = -1, rdev = -1; 23581ffbf5aSGreg Kurz int map_dirfd = -1, map_fd; 23681ffbf5aSGreg Kurz bool is_root = !strcmp(name, "."); 2372c30dd74SAneesh Kumar K.V 23881ffbf5aSGreg Kurz if (is_root) { 23981ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r"); 24081ffbf5aSGreg Kurz if (!fp) { 24181ffbf5aSGreg Kurz if (errno == ENOENT) { 24281ffbf5aSGreg Kurz goto update_map_file; 24381ffbf5aSGreg Kurz } else { 24481ffbf5aSGreg Kurz return -1; 24581ffbf5aSGreg Kurz } 24681ffbf5aSGreg Kurz } 24781ffbf5aSGreg Kurz } else { 248e3187a45SGreg Kurz ret = mkdirat(dirfd, VIRTFS_META_DIR, 0700); 249e3187a45SGreg Kurz if (ret < 0 && errno != EEXIST) { 250e3187a45SGreg Kurz return -1; 251e3187a45SGreg Kurz } 252e3187a45SGreg Kurz 253e3187a45SGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 254e3187a45SGreg Kurz if (map_dirfd == -1) { 255e3187a45SGreg Kurz return -1; 256e3187a45SGreg Kurz } 257e3187a45SGreg Kurz 258e3187a45SGreg Kurz fp = local_fopenat(map_dirfd, name, "r"); 2592c30dd74SAneesh Kumar K.V if (!fp) { 260e3187a45SGreg Kurz if (errno == ENOENT) { 261e3187a45SGreg Kurz goto update_map_file; 262e3187a45SGreg Kurz } else { 263e3187a45SGreg Kurz close_preserve_errno(map_dirfd); 264e3187a45SGreg Kurz return -1; 265e3187a45SGreg Kurz } 2662c30dd74SAneesh Kumar K.V } 26781ffbf5aSGreg Kurz } 2682c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 2692c30dd74SAneesh Kumar K.V while (fgets(buf, ATTR_MAX, fp)) { 2702c30dd74SAneesh Kumar K.V if (!strncmp(buf, "virtfs.uid", 10)) { 2712c30dd74SAneesh Kumar K.V uid = atoi(buf + 11); 2722c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.gid", 10)) { 2732c30dd74SAneesh Kumar K.V gid = atoi(buf + 11); 2742c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.mode", 11)) { 2752c30dd74SAneesh Kumar K.V mode = atoi(buf + 12); 2762c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.rdev", 11)) { 2772c30dd74SAneesh Kumar K.V rdev = atoi(buf + 12); 2782c30dd74SAneesh Kumar K.V } 2792c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 2802c30dd74SAneesh Kumar K.V } 2812c30dd74SAneesh Kumar K.V fclose(fp); 2822c30dd74SAneesh Kumar K.V 2832c30dd74SAneesh Kumar K.V update_map_file: 28481ffbf5aSGreg Kurz if (is_root) { 28581ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "w"); 28681ffbf5aSGreg Kurz } else { 287e3187a45SGreg Kurz fp = local_fopenat(map_dirfd, name, "w"); 28881ffbf5aSGreg Kurz /* We can't go this far with map_dirfd not being a valid file descriptor 28981ffbf5aSGreg Kurz * but some versions of gcc aren't smart enough to see it. 29081ffbf5aSGreg Kurz */ 29181ffbf5aSGreg Kurz if (map_dirfd != -1) { 292e3187a45SGreg Kurz close_preserve_errno(map_dirfd); 29381ffbf5aSGreg Kurz } 29481ffbf5aSGreg Kurz } 2952c30dd74SAneesh Kumar K.V if (!fp) { 296e3187a45SGreg Kurz return -1; 2972c30dd74SAneesh Kumar K.V } 2982c30dd74SAneesh Kumar K.V 29981ffbf5aSGreg Kurz map_fd = fileno(fp); 30081ffbf5aSGreg Kurz assert(map_fd != -1); 30181ffbf5aSGreg Kurz ret = fchmod(map_fd, 0600); 30281ffbf5aSGreg Kurz assert(ret == 0); 30381ffbf5aSGreg Kurz 3042c30dd74SAneesh Kumar K.V if (credp->fc_uid != -1) { 3052c30dd74SAneesh Kumar K.V uid = credp->fc_uid; 3062c30dd74SAneesh Kumar K.V } 3072c30dd74SAneesh Kumar K.V if (credp->fc_gid != -1) { 3082c30dd74SAneesh Kumar K.V gid = credp->fc_gid; 3092c30dd74SAneesh Kumar K.V } 3102c30dd74SAneesh Kumar K.V if (credp->fc_mode != -1) { 3112c30dd74SAneesh Kumar K.V mode = credp->fc_mode; 3122c30dd74SAneesh Kumar K.V } 3132c30dd74SAneesh Kumar K.V if (credp->fc_rdev != -1) { 3142c30dd74SAneesh Kumar K.V rdev = credp->fc_rdev; 3152c30dd74SAneesh Kumar K.V } 3162c30dd74SAneesh Kumar K.V 3172c30dd74SAneesh Kumar K.V if (uid != -1) { 3182c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.uid=%d\n", uid); 3192c30dd74SAneesh Kumar K.V } 3202c30dd74SAneesh Kumar K.V if (gid != -1) { 3212c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.gid=%d\n", gid); 3222c30dd74SAneesh Kumar K.V } 3232c30dd74SAneesh Kumar K.V if (mode != -1) { 3242c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.mode=%d\n", mode); 3252c30dd74SAneesh Kumar K.V } 3262c30dd74SAneesh Kumar K.V if (rdev != -1) { 3272c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.rdev=%d\n", rdev); 3282c30dd74SAneesh Kumar K.V } 3292c30dd74SAneesh Kumar K.V fclose(fp); 3302c30dd74SAneesh Kumar K.V 331e3187a45SGreg Kurz return 0; 332e3187a45SGreg Kurz } 333e3187a45SGreg Kurz 334e3187a45SGreg Kurz static int fchmodat_nofollow(int dirfd, const char *name, mode_t mode) 335e3187a45SGreg Kurz { 3364751fd53SGreg Kurz struct stat stbuf; 337e3187a45SGreg Kurz int fd, ret; 338e3187a45SGreg Kurz 339e3187a45SGreg Kurz /* FIXME: this should be handled with fchmodat(AT_SYMLINK_NOFOLLOW). 3404751fd53SGreg Kurz * Unfortunately, the linux kernel doesn't implement it yet. 341e3187a45SGreg Kurz */ 3424751fd53SGreg Kurz 3434751fd53SGreg Kurz /* First, we clear non-racing symlinks out of the way. */ 3444751fd53SGreg Kurz if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW)) { 3454751fd53SGreg Kurz return -1; 3464751fd53SGreg Kurz } 3474751fd53SGreg Kurz if (S_ISLNK(stbuf.st_mode)) { 3484751fd53SGreg Kurz errno = ELOOP; 3494751fd53SGreg Kurz return -1; 3504751fd53SGreg Kurz } 3514751fd53SGreg Kurz 352aa5e85a1SGreg Kurz fd = openat_file(dirfd, name, O_RDONLY | O_PATH_9P_UTIL | O_NOFOLLOW, 0); 3534751fd53SGreg Kurz #if O_PATH_9P_UTIL == 0 354aa5e85a1SGreg Kurz /* Fallback for systems that don't support O_PATH: we depend on the file 355aa5e85a1SGreg Kurz * being readable or writable. 356aa5e85a1SGreg Kurz */ 357e3187a45SGreg Kurz if (fd == -1) { 358e3187a45SGreg Kurz /* In case the file is writable-only and isn't a directory. */ 359e3187a45SGreg Kurz if (errno == EACCES) { 360e3187a45SGreg Kurz fd = openat_file(dirfd, name, O_WRONLY, 0); 361e3187a45SGreg Kurz } 362e3187a45SGreg Kurz if (fd == -1 && errno == EISDIR) { 363e3187a45SGreg Kurz errno = EACCES; 364e3187a45SGreg Kurz } 365e3187a45SGreg Kurz } 366e3187a45SGreg Kurz if (fd == -1) { 367e3187a45SGreg Kurz return -1; 368e3187a45SGreg Kurz } 369e3187a45SGreg Kurz ret = fchmod(fd, mode); 3704751fd53SGreg Kurz #else 371aa5e85a1SGreg Kurz /* Access modes are ignored when O_PATH is supported. If name is a symbolic 372aa5e85a1SGreg Kurz * link, O_PATH | O_NOFOLLOW causes openat(2) to return a file descriptor 373aa5e85a1SGreg Kurz * referring to the symbolic link. 374aa5e85a1SGreg Kurz */ 3754751fd53SGreg Kurz if (fd == -1) { 3764751fd53SGreg Kurz return -1; 3774751fd53SGreg Kurz } 3784751fd53SGreg Kurz 3794751fd53SGreg Kurz /* Now we handle racing symlinks. */ 3804751fd53SGreg Kurz ret = fstat(fd, &stbuf); 3814751fd53SGreg Kurz if (!ret) { 3824751fd53SGreg Kurz if (S_ISLNK(stbuf.st_mode)) { 3834751fd53SGreg Kurz errno = ELOOP; 3844751fd53SGreg Kurz ret = -1; 3854751fd53SGreg Kurz } else { 3864751fd53SGreg Kurz char *proc_path = g_strdup_printf("/proc/self/fd/%d", fd); 3874751fd53SGreg Kurz ret = chmod(proc_path, mode); 3884751fd53SGreg Kurz g_free(proc_path); 3894751fd53SGreg Kurz } 3904751fd53SGreg Kurz } 3914751fd53SGreg Kurz #endif 392e3187a45SGreg Kurz close_preserve_errno(fd); 3932c30dd74SAneesh Kumar K.V return ret; 3942c30dd74SAneesh Kumar K.V } 3952c30dd74SAneesh Kumar K.V 396e3187a45SGreg Kurz static int local_set_xattrat(int dirfd, const char *path, FsCred *credp) 397131dcb25SAnthony Liguori { 398758e8e38SVenkateswararao Jujjuri (JV) int err; 3992289be19SAneesh Kumar K.V 400758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_uid != -1) { 401f8ad4a89SAneesh Kumar K.V uint32_t tmp_uid = cpu_to_le32(credp->fc_uid); 402e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.uid", &tmp_uid, 403e3187a45SGreg Kurz sizeof(uid_t), 0); 404758e8e38SVenkateswararao Jujjuri (JV) if (err) { 405758e8e38SVenkateswararao Jujjuri (JV) return err; 406131dcb25SAnthony Liguori } 407131dcb25SAnthony Liguori } 408758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_gid != -1) { 409f8ad4a89SAneesh Kumar K.V uint32_t tmp_gid = cpu_to_le32(credp->fc_gid); 410e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.gid", &tmp_gid, 411e3187a45SGreg Kurz sizeof(gid_t), 0); 412758e8e38SVenkateswararao Jujjuri (JV) if (err) { 413758e8e38SVenkateswararao Jujjuri (JV) return err; 414131dcb25SAnthony Liguori } 415131dcb25SAnthony Liguori } 416758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_mode != -1) { 417f8ad4a89SAneesh Kumar K.V uint32_t tmp_mode = cpu_to_le32(credp->fc_mode); 418e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.mode", &tmp_mode, 419e3187a45SGreg Kurz sizeof(mode_t), 0); 420758e8e38SVenkateswararao Jujjuri (JV) if (err) { 421758e8e38SVenkateswararao Jujjuri (JV) return err; 422131dcb25SAnthony Liguori } 423131dcb25SAnthony Liguori } 424758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_rdev != -1) { 425f8ad4a89SAneesh Kumar K.V uint64_t tmp_rdev = cpu_to_le64(credp->fc_rdev); 426e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.rdev", &tmp_rdev, 427e3187a45SGreg Kurz sizeof(dev_t), 0); 428758e8e38SVenkateswararao Jujjuri (JV) if (err) { 429758e8e38SVenkateswararao Jujjuri (JV) return err; 430131dcb25SAnthony Liguori } 431758e8e38SVenkateswararao Jujjuri (JV) } 432131dcb25SAnthony Liguori return 0; 433131dcb25SAnthony Liguori } 434131dcb25SAnthony Liguori 435d815e721SGreg Kurz static int local_set_cred_passthrough(FsContext *fs_ctx, int dirfd, 436d815e721SGreg Kurz const char *name, FsCred *credp) 4374750a96fSVenkateswararao Jujjuri (JV) { 438d815e721SGreg Kurz if (fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 439b314f6a0SGreg Kurz AT_SYMLINK_NOFOLLOW) < 0) { 44012848bfcSAneesh Kumar K.V /* 44112848bfcSAneesh Kumar K.V * If we fail to change ownership and if we are 44212848bfcSAneesh Kumar K.V * using security model none. Ignore the error 44312848bfcSAneesh Kumar K.V */ 444b97400caSAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) { 4454fa4ce71SChen Gang return -1; 4464750a96fSVenkateswararao Jujjuri (JV) } 447d815e721SGreg Kurz } 448d815e721SGreg Kurz 449d815e721SGreg Kurz return fchmodat_nofollow(dirfd, name, credp->fc_mode & 07777); 450d815e721SGreg Kurz } 4514750a96fSVenkateswararao Jujjuri (JV) 4522289be19SAneesh Kumar K.V static ssize_t local_readlink(FsContext *fs_ctx, V9fsPath *fs_path, 453131dcb25SAnthony Liguori char *buf, size_t bufsz) 454131dcb25SAnthony Liguori { 455879c2813SVenkateswararao Jujjuri (JV) ssize_t tsize = -1; 4562289be19SAneesh Kumar K.V 4572c30dd74SAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SM_MAPPED) || 4582c30dd74SAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE)) { 459879c2813SVenkateswararao Jujjuri (JV) int fd; 460bec1e954SGreg Kurz 461bec1e954SGreg Kurz fd = local_open_nofollow(fs_ctx, fs_path->data, O_RDONLY, 0); 462879c2813SVenkateswararao Jujjuri (JV) if (fd == -1) { 463879c2813SVenkateswararao Jujjuri (JV) return -1; 464879c2813SVenkateswararao Jujjuri (JV) } 465879c2813SVenkateswararao Jujjuri (JV) do { 466879c2813SVenkateswararao Jujjuri (JV) tsize = read(fd, (void *)buf, bufsz); 467879c2813SVenkateswararao Jujjuri (JV) } while (tsize == -1 && errno == EINTR); 468bec1e954SGreg Kurz close_preserve_errno(fd); 469b97400caSAneesh Kumar K.V } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 470b97400caSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 471bec1e954SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 472bec1e954SGreg Kurz char *name = g_path_get_basename(fs_path->data); 473bec1e954SGreg Kurz int dirfd; 474bec1e954SGreg Kurz 475bec1e954SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 476bec1e954SGreg Kurz if (dirfd == -1) { 477bec1e954SGreg Kurz goto out; 478bec1e954SGreg Kurz } 479bec1e954SGreg Kurz 480bec1e954SGreg Kurz tsize = readlinkat(dirfd, name, buf, bufsz); 481bec1e954SGreg Kurz close_preserve_errno(dirfd); 482bec1e954SGreg Kurz out: 483bec1e954SGreg Kurz g_free(name); 484bec1e954SGreg Kurz g_free(dirpath); 485879c2813SVenkateswararao Jujjuri (JV) } 486879c2813SVenkateswararao Jujjuri (JV) return tsize; 487131dcb25SAnthony Liguori } 488131dcb25SAnthony Liguori 489cc720ddbSAneesh Kumar K.V static int local_close(FsContext *ctx, V9fsFidOpenState *fs) 490131dcb25SAnthony Liguori { 491cc720ddbSAneesh Kumar K.V return close(fs->fd); 492131dcb25SAnthony Liguori } 493131dcb25SAnthony Liguori 494cc720ddbSAneesh Kumar K.V static int local_closedir(FsContext *ctx, V9fsFidOpenState *fs) 495131dcb25SAnthony Liguori { 496f314ea4eSGreg Kurz return closedir(fs->dir.stream); 497131dcb25SAnthony Liguori } 4989f107513SAnthony Liguori 499cc720ddbSAneesh Kumar K.V static int local_open(FsContext *ctx, V9fsPath *fs_path, 500cc720ddbSAneesh Kumar K.V int flags, V9fsFidOpenState *fs) 501a6568fe2SAnthony Liguori { 50221328e1eSGreg Kurz int fd; 5032289be19SAneesh Kumar K.V 504996a0d76SGreg Kurz fd = local_open_nofollow(ctx, fs_path->data, flags, 0); 50521328e1eSGreg Kurz if (fd == -1) { 50621328e1eSGreg Kurz return -1; 50721328e1eSGreg Kurz } 50821328e1eSGreg Kurz fs->fd = fd; 509cc720ddbSAneesh Kumar K.V return fs->fd; 510a6568fe2SAnthony Liguori } 511a6568fe2SAnthony Liguori 512cc720ddbSAneesh Kumar K.V static int local_opendir(FsContext *ctx, 513cc720ddbSAneesh Kumar K.V V9fsPath *fs_path, V9fsFidOpenState *fs) 514a6568fe2SAnthony Liguori { 515996a0d76SGreg Kurz int dirfd; 51621328e1eSGreg Kurz DIR *stream; 5172289be19SAneesh Kumar K.V 518996a0d76SGreg Kurz dirfd = local_opendir_nofollow(ctx, fs_path->data); 519996a0d76SGreg Kurz if (dirfd == -1) { 520cc720ddbSAneesh Kumar K.V return -1; 521cc720ddbSAneesh Kumar K.V } 522996a0d76SGreg Kurz 523996a0d76SGreg Kurz stream = fdopendir(dirfd); 52421328e1eSGreg Kurz if (!stream) { 525faab207fSGreg Kurz close(dirfd); 526cc720ddbSAneesh Kumar K.V return -1; 527cc720ddbSAneesh Kumar K.V } 52821328e1eSGreg Kurz fs->dir.stream = stream; 529cc720ddbSAneesh Kumar K.V return 0; 530a6568fe2SAnthony Liguori } 531a6568fe2SAnthony Liguori 532cc720ddbSAneesh Kumar K.V static void local_rewinddir(FsContext *ctx, V9fsFidOpenState *fs) 533a9231555SAnthony Liguori { 534f314ea4eSGreg Kurz rewinddir(fs->dir.stream); 535a9231555SAnthony Liguori } 536a9231555SAnthony Liguori 537cc720ddbSAneesh Kumar K.V static off_t local_telldir(FsContext *ctx, V9fsFidOpenState *fs) 538a9231555SAnthony Liguori { 539f314ea4eSGreg Kurz return telldir(fs->dir.stream); 540a9231555SAnthony Liguori } 541a9231555SAnthony Liguori 5427a95434eSGreg Kurz static bool local_is_mapped_file_metadata(FsContext *fs_ctx, const char *name) 5437a95434eSGreg Kurz { 54481ffbf5aSGreg Kurz return 54581ffbf5aSGreg Kurz !strcmp(name, VIRTFS_META_DIR) || !strcmp(name, VIRTFS_META_ROOT_FILE); 5467a95434eSGreg Kurz } 5477a95434eSGreg Kurz 548635324e8SGreg Kurz static struct dirent *local_readdir(FsContext *ctx, V9fsFidOpenState *fs) 549a9231555SAnthony Liguori { 550635324e8SGreg Kurz struct dirent *entry; 5512c30dd74SAneesh Kumar K.V 5522c30dd74SAneesh Kumar K.V again: 553635324e8SGreg Kurz entry = readdir(fs->dir.stream); 554635324e8SGreg Kurz if (!entry) { 555635324e8SGreg Kurz return NULL; 556635324e8SGreg Kurz } 557635324e8SGreg Kurz 558840a1bf2SBastian Blank if (ctx->export_flags & V9FS_SM_MAPPED) { 559840a1bf2SBastian Blank entry->d_type = DT_UNKNOWN; 560840a1bf2SBastian Blank } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 5617a95434eSGreg Kurz if (local_is_mapped_file_metadata(ctx, entry->d_name)) { 56281ffbf5aSGreg Kurz /* skip the meta data */ 5632c30dd74SAneesh Kumar K.V goto again; 5642c30dd74SAneesh Kumar K.V } 565840a1bf2SBastian Blank entry->d_type = DT_UNKNOWN; 5662c30dd74SAneesh Kumar K.V } 567635324e8SGreg Kurz 568635324e8SGreg Kurz return entry; 569a9231555SAnthony Liguori } 570a9231555SAnthony Liguori 571cc720ddbSAneesh Kumar K.V static void local_seekdir(FsContext *ctx, V9fsFidOpenState *fs, off_t off) 572a9231555SAnthony Liguori { 573f314ea4eSGreg Kurz seekdir(fs->dir.stream, off); 574a9231555SAnthony Liguori } 575a9231555SAnthony Liguori 576cc720ddbSAneesh Kumar K.V static ssize_t local_preadv(FsContext *ctx, V9fsFidOpenState *fs, 577cc720ddbSAneesh Kumar K.V const struct iovec *iov, 57856d15a53SSanchit Garg int iovcnt, off_t offset) 579a9231555SAnthony Liguori { 58056d15a53SSanchit Garg #ifdef CONFIG_PREADV 581cc720ddbSAneesh Kumar K.V return preadv(fs->fd, iov, iovcnt, offset); 58256d15a53SSanchit Garg #else 583cc720ddbSAneesh Kumar K.V int err = lseek(fs->fd, offset, SEEK_SET); 58456d15a53SSanchit Garg if (err == -1) { 58556d15a53SSanchit Garg return err; 58656d15a53SSanchit Garg } else { 587cc720ddbSAneesh Kumar K.V return readv(fs->fd, iov, iovcnt); 588a9231555SAnthony Liguori } 58956d15a53SSanchit Garg #endif 590a9231555SAnthony Liguori } 591a9231555SAnthony Liguori 592cc720ddbSAneesh Kumar K.V static ssize_t local_pwritev(FsContext *ctx, V9fsFidOpenState *fs, 593cc720ddbSAneesh Kumar K.V const struct iovec *iov, 59456d15a53SSanchit Garg int iovcnt, off_t offset) 5958449360cSAnthony Liguori { 5966fe76accSGreg Kurz ssize_t ret; 59756d15a53SSanchit Garg #ifdef CONFIG_PREADV 598cc720ddbSAneesh Kumar K.V ret = pwritev(fs->fd, iov, iovcnt, offset); 59956d15a53SSanchit Garg #else 600cc720ddbSAneesh Kumar K.V int err = lseek(fs->fd, offset, SEEK_SET); 60156d15a53SSanchit Garg if (err == -1) { 60256d15a53SSanchit Garg return err; 60356d15a53SSanchit Garg } else { 604cc720ddbSAneesh Kumar K.V ret = writev(fs->fd, iov, iovcnt); 6058449360cSAnthony Liguori } 60656d15a53SSanchit Garg #endif 607d3ab98e6SAneesh Kumar K.V #ifdef CONFIG_SYNC_FILE_RANGE 608d3ab98e6SAneesh Kumar K.V if (ret > 0 && ctx->export_flags & V9FS_IMMEDIATE_WRITEOUT) { 609d3ab98e6SAneesh Kumar K.V /* 610d3ab98e6SAneesh Kumar K.V * Initiate a writeback. This is not a data integrity sync. 611d3ab98e6SAneesh Kumar K.V * We want to ensure that we don't leave dirty pages in the cache 612d3ab98e6SAneesh Kumar K.V * after write when writeout=immediate is sepcified. 613d3ab98e6SAneesh Kumar K.V */ 614cc720ddbSAneesh Kumar K.V sync_file_range(fs->fd, offset, ret, 615d3ab98e6SAneesh Kumar K.V SYNC_FILE_RANGE_WAIT_BEFORE | SYNC_FILE_RANGE_WRITE); 616d3ab98e6SAneesh Kumar K.V } 617d3ab98e6SAneesh Kumar K.V #endif 618d3ab98e6SAneesh Kumar K.V return ret; 61956d15a53SSanchit Garg } 6208449360cSAnthony Liguori 6212289be19SAneesh Kumar K.V static int local_chmod(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) 622c494dd6fSAnthony Liguori { 623e3187a45SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 624e3187a45SGreg Kurz char *name = g_path_get_basename(fs_path->data); 6254fa4ce71SChen Gang int ret = -1; 626e3187a45SGreg Kurz int dirfd; 627e3187a45SGreg Kurz 628e3187a45SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 629e3187a45SGreg Kurz if (dirfd == -1) { 630e3187a45SGreg Kurz goto out; 631e3187a45SGreg Kurz } 6322289be19SAneesh Kumar K.V 633b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 634e3187a45SGreg Kurz ret = local_set_xattrat(dirfd, name, credp); 6352c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 636e3187a45SGreg Kurz ret = local_set_mapped_file_attrat(dirfd, name, credp); 637e3187a45SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 638e3187a45SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 639e3187a45SGreg Kurz ret = fchmodat_nofollow(dirfd, name, credp->fc_mode); 640e95ead32SVenkateswararao Jujjuri (JV) } 641e3187a45SGreg Kurz close_preserve_errno(dirfd); 642e3187a45SGreg Kurz 643e3187a45SGreg Kurz out: 644e3187a45SGreg Kurz g_free(dirpath); 645e3187a45SGreg Kurz g_free(name); 6464fa4ce71SChen Gang return ret; 647c494dd6fSAnthony Liguori } 648c494dd6fSAnthony Liguori 6492289be19SAneesh Kumar K.V static int local_mknod(FsContext *fs_ctx, V9fsPath *dir_path, 6502289be19SAneesh Kumar K.V const char *name, FsCred *credp) 651c494dd6fSAnthony Liguori { 6521c293312SVenkateswararao Jujjuri (JV) int err = -1; 653d815e721SGreg Kurz int dirfd; 6541c293312SVenkateswararao Jujjuri (JV) 6557a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 6567a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 6577a95434eSGreg Kurz errno = EINVAL; 6587a95434eSGreg Kurz return -1; 6597a95434eSGreg Kurz } 6607a95434eSGreg Kurz 661d815e721SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 662d815e721SGreg Kurz if (dirfd == -1) { 663d815e721SGreg Kurz return -1; 664d815e721SGreg Kurz } 6652289be19SAneesh Kumar K.V 666d815e721SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 667d815e721SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 668b96feb2cSTobias Schramm err = mknodat(dirfd, name, fs_ctx->fmode | S_IFREG, 0); 669d815e721SGreg Kurz if (err == -1) { 670d815e721SGreg Kurz goto out; 671d815e721SGreg Kurz } 672d815e721SGreg Kurz 673b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 674d815e721SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 675d815e721SGreg Kurz } else { 676d815e721SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 6771c293312SVenkateswararao Jujjuri (JV) } 6781c293312SVenkateswararao Jujjuri (JV) if (err == -1) { 6791c293312SVenkateswararao Jujjuri (JV) goto err_end; 6801c293312SVenkateswararao Jujjuri (JV) } 681d815e721SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 682d815e721SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 683d815e721SGreg Kurz err = mknodat(dirfd, name, credp->fc_mode, credp->fc_rdev); 6842c30dd74SAneesh Kumar K.V if (err == -1) { 6852c30dd74SAneesh Kumar K.V goto out; 6862c30dd74SAneesh Kumar K.V } 687d815e721SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 6882c30dd74SAneesh Kumar K.V if (err == -1) { 6891c293312SVenkateswararao Jujjuri (JV) goto err_end; 6901c293312SVenkateswararao Jujjuri (JV) } 6911c293312SVenkateswararao Jujjuri (JV) } 6922289be19SAneesh Kumar K.V goto out; 6931c293312SVenkateswararao Jujjuri (JV) 6941c293312SVenkateswararao Jujjuri (JV) err_end: 695d815e721SGreg Kurz unlinkat_preserve_errno(dirfd, name, 0); 6962289be19SAneesh Kumar K.V out: 697d815e721SGreg Kurz close_preserve_errno(dirfd); 6981c293312SVenkateswararao Jujjuri (JV) return err; 699c494dd6fSAnthony Liguori } 700c494dd6fSAnthony Liguori 7012289be19SAneesh Kumar K.V static int local_mkdir(FsContext *fs_ctx, V9fsPath *dir_path, 7022289be19SAneesh Kumar K.V const char *name, FsCred *credp) 703c494dd6fSAnthony Liguori { 70400ec5c37SVenkateswararao Jujjuri (JV) int err = -1; 7053f3a1699SGreg Kurz int dirfd; 70600ec5c37SVenkateswararao Jujjuri (JV) 7077a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 7087a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 7097a95434eSGreg Kurz errno = EINVAL; 7107a95434eSGreg Kurz return -1; 7117a95434eSGreg Kurz } 7127a95434eSGreg Kurz 7133f3a1699SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 7143f3a1699SGreg Kurz if (dirfd == -1) { 7153f3a1699SGreg Kurz return -1; 7163f3a1699SGreg Kurz } 7172289be19SAneesh Kumar K.V 7183f3a1699SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 7193f3a1699SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 720b96feb2cSTobias Schramm err = mkdirat(dirfd, name, fs_ctx->dmode); 7213f3a1699SGreg Kurz if (err == -1) { 7223f3a1699SGreg Kurz goto out; 7233f3a1699SGreg Kurz } 7243f3a1699SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFDIR; 7253f3a1699SGreg Kurz 726b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 7273f3a1699SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 7283f3a1699SGreg Kurz } else { 7293f3a1699SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 73000ec5c37SVenkateswararao Jujjuri (JV) } 73100ec5c37SVenkateswararao Jujjuri (JV) if (err == -1) { 73200ec5c37SVenkateswararao Jujjuri (JV) goto err_end; 73300ec5c37SVenkateswararao Jujjuri (JV) } 7343f3a1699SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 7353f3a1699SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 7363f3a1699SGreg Kurz err = mkdirat(dirfd, name, credp->fc_mode); 7372c30dd74SAneesh Kumar K.V if (err == -1) { 7382c30dd74SAneesh Kumar K.V goto out; 7392c30dd74SAneesh Kumar K.V } 7403f3a1699SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 7412c30dd74SAneesh Kumar K.V if (err == -1) { 74200ec5c37SVenkateswararao Jujjuri (JV) goto err_end; 74300ec5c37SVenkateswararao Jujjuri (JV) } 74400ec5c37SVenkateswararao Jujjuri (JV) } 7452289be19SAneesh Kumar K.V goto out; 74600ec5c37SVenkateswararao Jujjuri (JV) 74700ec5c37SVenkateswararao Jujjuri (JV) err_end: 7483f3a1699SGreg Kurz unlinkat_preserve_errno(dirfd, name, AT_REMOVEDIR); 7492289be19SAneesh Kumar K.V out: 7503f3a1699SGreg Kurz close_preserve_errno(dirfd); 75100ec5c37SVenkateswararao Jujjuri (JV) return err; 752c494dd6fSAnthony Liguori } 753c494dd6fSAnthony Liguori 7548b888272SAneesh Kumar K.V static int local_fstat(FsContext *fs_ctx, int fid_type, 755cc720ddbSAneesh Kumar K.V V9fsFidOpenState *fs, struct stat *stbuf) 756c494dd6fSAnthony Liguori { 7578b888272SAneesh Kumar K.V int err, fd; 7588b888272SAneesh Kumar K.V 7598b888272SAneesh Kumar K.V if (fid_type == P9_FID_DIR) { 760f314ea4eSGreg Kurz fd = dirfd(fs->dir.stream); 7618b888272SAneesh Kumar K.V } else { 7628b888272SAneesh Kumar K.V fd = fs->fd; 7638b888272SAneesh Kumar K.V } 7648b888272SAneesh Kumar K.V 7658b888272SAneesh Kumar K.V err = fstat(fd, stbuf); 7661237ad76SVenkateswararao Jujjuri (JV) if (err) { 7671237ad76SVenkateswararao Jujjuri (JV) return err; 7681237ad76SVenkateswararao Jujjuri (JV) } 769b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 7701237ad76SVenkateswararao Jujjuri (JV) /* Actual credentials are part of extended attrs */ 7711237ad76SVenkateswararao Jujjuri (JV) uid_t tmp_uid; 7721237ad76SVenkateswararao Jujjuri (JV) gid_t tmp_gid; 7731237ad76SVenkateswararao Jujjuri (JV) mode_t tmp_mode; 7741237ad76SVenkateswararao Jujjuri (JV) dev_t tmp_dev; 7751237ad76SVenkateswararao Jujjuri (JV) 776f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.uid", &tmp_uid, sizeof(uid_t)) > 0) { 777f8ad4a89SAneesh Kumar K.V stbuf->st_uid = le32_to_cpu(tmp_uid); 7781237ad76SVenkateswararao Jujjuri (JV) } 779f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.gid", &tmp_gid, sizeof(gid_t)) > 0) { 780f8ad4a89SAneesh Kumar K.V stbuf->st_gid = le32_to_cpu(tmp_gid); 7811237ad76SVenkateswararao Jujjuri (JV) } 782f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.mode", &tmp_mode, sizeof(mode_t)) > 0) { 783f8ad4a89SAneesh Kumar K.V stbuf->st_mode = le32_to_cpu(tmp_mode); 7841237ad76SVenkateswararao Jujjuri (JV) } 785f8ad4a89SAneesh Kumar K.V if (fgetxattr(fd, "user.virtfs.rdev", &tmp_dev, sizeof(dev_t)) > 0) { 786f8ad4a89SAneesh Kumar K.V stbuf->st_rdev = le64_to_cpu(tmp_dev); 7871237ad76SVenkateswararao Jujjuri (JV) } 7882c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 7892c30dd74SAneesh Kumar K.V errno = EOPNOTSUPP; 7902c30dd74SAneesh Kumar K.V return -1; 7911237ad76SVenkateswararao Jujjuri (JV) } 7921237ad76SVenkateswararao Jujjuri (JV) return err; 793c494dd6fSAnthony Liguori } 794c494dd6fSAnthony Liguori 7952289be19SAneesh Kumar K.V static int local_open2(FsContext *fs_ctx, V9fsPath *dir_path, const char *name, 796cc720ddbSAneesh Kumar K.V int flags, FsCred *credp, V9fsFidOpenState *fs) 797c494dd6fSAnthony Liguori { 7984750a96fSVenkateswararao Jujjuri (JV) int fd = -1; 7994750a96fSVenkateswararao Jujjuri (JV) int err = -1; 800a565fea5SGreg Kurz int dirfd; 8014750a96fSVenkateswararao Jujjuri (JV) 8027a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 8037a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 8047a95434eSGreg Kurz errno = EINVAL; 8057a95434eSGreg Kurz return -1; 8067a95434eSGreg Kurz } 8077a95434eSGreg Kurz 8080ceb092eSAneesh Kumar K.V /* 8090ceb092eSAneesh Kumar K.V * Mark all the open to not follow symlinks 8100ceb092eSAneesh Kumar K.V */ 8110ceb092eSAneesh Kumar K.V flags |= O_NOFOLLOW; 8120ceb092eSAneesh Kumar K.V 813a565fea5SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 814a565fea5SGreg Kurz if (dirfd == -1) { 815a565fea5SGreg Kurz return -1; 816a565fea5SGreg Kurz } 8172289be19SAneesh Kumar K.V 8184750a96fSVenkateswararao Jujjuri (JV) /* Determine the security model */ 819a565fea5SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 820a565fea5SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 821b96feb2cSTobias Schramm fd = openat_file(dirfd, name, flags, fs_ctx->fmode); 822a565fea5SGreg Kurz if (fd == -1) { 823a565fea5SGreg Kurz goto out; 824a565fea5SGreg Kurz } 825a565fea5SGreg Kurz credp->fc_mode = credp->fc_mode|S_IFREG; 826b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 8274750a96fSVenkateswararao Jujjuri (JV) /* Set cleint credentials in xattr */ 828a565fea5SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 829a565fea5SGreg Kurz } else { 830a565fea5SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 8314750a96fSVenkateswararao Jujjuri (JV) } 8322c30dd74SAneesh Kumar K.V if (err == -1) { 8332c30dd74SAneesh Kumar K.V goto err_end; 8342c30dd74SAneesh Kumar K.V } 835b97400caSAneesh Kumar K.V } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 836b97400caSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 837a565fea5SGreg Kurz fd = openat_file(dirfd, name, flags, credp->fc_mode); 8384750a96fSVenkateswararao Jujjuri (JV) if (fd == -1) { 8392289be19SAneesh Kumar K.V goto out; 8404750a96fSVenkateswararao Jujjuri (JV) } 841a565fea5SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 8424750a96fSVenkateswararao Jujjuri (JV) if (err == -1) { 8434750a96fSVenkateswararao Jujjuri (JV) goto err_end; 8444750a96fSVenkateswararao Jujjuri (JV) } 8454750a96fSVenkateswararao Jujjuri (JV) } 8462289be19SAneesh Kumar K.V err = fd; 847cc720ddbSAneesh Kumar K.V fs->fd = fd; 8482289be19SAneesh Kumar K.V goto out; 8494750a96fSVenkateswararao Jujjuri (JV) 8504750a96fSVenkateswararao Jujjuri (JV) err_end: 851a565fea5SGreg Kurz unlinkat_preserve_errno(dirfd, name, 852a565fea5SGreg Kurz flags & O_DIRECTORY ? AT_REMOVEDIR : 0); 853a565fea5SGreg Kurz close_preserve_errno(fd); 8542289be19SAneesh Kumar K.V out: 855a565fea5SGreg Kurz close_preserve_errno(dirfd); 8564750a96fSVenkateswararao Jujjuri (JV) return err; 857c494dd6fSAnthony Liguori } 858c494dd6fSAnthony Liguori 859758e8e38SVenkateswararao Jujjuri (JV) 860879c2813SVenkateswararao Jujjuri (JV) static int local_symlink(FsContext *fs_ctx, const char *oldpath, 8612289be19SAneesh Kumar K.V V9fsPath *dir_path, const char *name, FsCred *credp) 862c494dd6fSAnthony Liguori { 863879c2813SVenkateswararao Jujjuri (JV) int err = -1; 86438771613SGreg Kurz int dirfd; 865879c2813SVenkateswararao Jujjuri (JV) 8667a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 8677a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 8687a95434eSGreg Kurz errno = EINVAL; 8697a95434eSGreg Kurz return -1; 8707a95434eSGreg Kurz } 8717a95434eSGreg Kurz 87238771613SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 87338771613SGreg Kurz if (dirfd == -1) { 87438771613SGreg Kurz return -1; 87538771613SGreg Kurz } 8762289be19SAneesh Kumar K.V 877879c2813SVenkateswararao Jujjuri (JV) /* Determine the security model */ 87838771613SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 87938771613SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 88038771613SGreg Kurz int fd; 88138771613SGreg Kurz ssize_t oldpath_size, write_size; 88238771613SGreg Kurz 88338771613SGreg Kurz fd = openat_file(dirfd, name, O_CREAT | O_EXCL | O_RDWR, 884b96feb2cSTobias Schramm fs_ctx->fmode); 88538771613SGreg Kurz if (fd == -1) { 88638771613SGreg Kurz goto out; 88738771613SGreg Kurz } 88838771613SGreg Kurz /* Write the oldpath (target) to the file. */ 88938771613SGreg Kurz oldpath_size = strlen(oldpath); 89038771613SGreg Kurz do { 89138771613SGreg Kurz write_size = write(fd, (void *)oldpath, oldpath_size); 89238771613SGreg Kurz } while (write_size == -1 && errno == EINTR); 89338771613SGreg Kurz close_preserve_errno(fd); 89438771613SGreg Kurz 89538771613SGreg Kurz if (write_size != oldpath_size) { 89638771613SGreg Kurz goto err_end; 89738771613SGreg Kurz } 89838771613SGreg Kurz /* Set cleint credentials in symlink's xattr */ 89938771613SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFLNK; 90038771613SGreg Kurz 901b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 90238771613SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 90338771613SGreg Kurz } else { 90438771613SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 905879c2813SVenkateswararao Jujjuri (JV) } 906879c2813SVenkateswararao Jujjuri (JV) if (err == -1) { 907879c2813SVenkateswararao Jujjuri (JV) goto err_end; 908879c2813SVenkateswararao Jujjuri (JV) } 90938771613SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 91038771613SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 91138771613SGreg Kurz err = symlinkat(oldpath, dirfd, name); 912879c2813SVenkateswararao Jujjuri (JV) if (err) { 9132289be19SAneesh Kumar K.V goto out; 914879c2813SVenkateswararao Jujjuri (JV) } 91538771613SGreg Kurz err = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 91638771613SGreg Kurz AT_SYMLINK_NOFOLLOW); 917879c2813SVenkateswararao Jujjuri (JV) if (err == -1) { 91812848bfcSAneesh Kumar K.V /* 91912848bfcSAneesh Kumar K.V * If we fail to change ownership and if we are 92012848bfcSAneesh Kumar K.V * using security model none. Ignore the error 92112848bfcSAneesh Kumar K.V */ 922b97400caSAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) { 923879c2813SVenkateswararao Jujjuri (JV) goto err_end; 92438771613SGreg Kurz } else { 92512848bfcSAneesh Kumar K.V err = 0; 926879c2813SVenkateswararao Jujjuri (JV) } 927879c2813SVenkateswararao Jujjuri (JV) } 92838771613SGreg Kurz } 9292289be19SAneesh Kumar K.V goto out; 930879c2813SVenkateswararao Jujjuri (JV) 931879c2813SVenkateswararao Jujjuri (JV) err_end: 93238771613SGreg Kurz unlinkat_preserve_errno(dirfd, name, 0); 9332289be19SAneesh Kumar K.V out: 93438771613SGreg Kurz close_preserve_errno(dirfd); 935879c2813SVenkateswararao Jujjuri (JV) return err; 936c494dd6fSAnthony Liguori } 937c494dd6fSAnthony Liguori 9382289be19SAneesh Kumar K.V static int local_link(FsContext *ctx, V9fsPath *oldpath, 9392289be19SAneesh Kumar K.V V9fsPath *dirpath, const char *name) 940c494dd6fSAnthony Liguori { 941ad0b46e6SGreg Kurz char *odirpath = g_path_get_dirname(oldpath->data); 942ad0b46e6SGreg Kurz char *oname = g_path_get_basename(oldpath->data); 943ad0b46e6SGreg Kurz int ret = -1; 944ad0b46e6SGreg Kurz int odirfd, ndirfd; 945c494dd6fSAnthony Liguori 9467a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 9477a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 9487a95434eSGreg Kurz errno = EINVAL; 9497a95434eSGreg Kurz return -1; 9507a95434eSGreg Kurz } 9517a95434eSGreg Kurz 952ad0b46e6SGreg Kurz odirfd = local_opendir_nofollow(ctx, odirpath); 953ad0b46e6SGreg Kurz if (odirfd == -1) { 9546dd4b1f1SGreg Kurz goto out; 9556dd4b1f1SGreg Kurz } 9562289be19SAneesh Kumar K.V 957ad0b46e6SGreg Kurz ndirfd = local_opendir_nofollow(ctx, dirpath->data); 958ad0b46e6SGreg Kurz if (ndirfd == -1) { 959ad0b46e6SGreg Kurz close_preserve_errno(odirfd); 960ad0b46e6SGreg Kurz goto out; 961ad0b46e6SGreg Kurz } 962ad0b46e6SGreg Kurz 963ad0b46e6SGreg Kurz ret = linkat(odirfd, oname, ndirfd, name, 0); 964ad0b46e6SGreg Kurz if (ret < 0) { 965ad0b46e6SGreg Kurz goto out_close; 966ad0b46e6SGreg Kurz } 9672c30dd74SAneesh Kumar K.V 9682c30dd74SAneesh Kumar K.V /* now link the virtfs_metadata files */ 9696dd4b1f1SGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 970ad0b46e6SGreg Kurz int omap_dirfd, nmap_dirfd; 9716dd4b1f1SGreg Kurz 972ad0b46e6SGreg Kurz ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700); 973ad0b46e6SGreg Kurz if (ret < 0 && errno != EEXIST) { 974ad0b46e6SGreg Kurz goto err_undo_link; 9752c30dd74SAneesh Kumar K.V } 976ad0b46e6SGreg Kurz 977ad0b46e6SGreg Kurz omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR); 978ad0b46e6SGreg Kurz if (omap_dirfd == -1) { 979ad0b46e6SGreg Kurz goto err; 980ad0b46e6SGreg Kurz } 981ad0b46e6SGreg Kurz 982ad0b46e6SGreg Kurz nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR); 983ad0b46e6SGreg Kurz if (nmap_dirfd == -1) { 984ad0b46e6SGreg Kurz close_preserve_errno(omap_dirfd); 985ad0b46e6SGreg Kurz goto err; 986ad0b46e6SGreg Kurz } 987ad0b46e6SGreg Kurz 988ad0b46e6SGreg Kurz ret = linkat(omap_dirfd, oname, nmap_dirfd, name, 0); 989ad0b46e6SGreg Kurz close_preserve_errno(nmap_dirfd); 990ad0b46e6SGreg Kurz close_preserve_errno(omap_dirfd); 9912c30dd74SAneesh Kumar K.V if (ret < 0 && errno != ENOENT) { 992ad0b46e6SGreg Kurz goto err_undo_link; 9932c30dd74SAneesh Kumar K.V } 9946dd4b1f1SGreg Kurz 995ad0b46e6SGreg Kurz ret = 0; 9962c30dd74SAneesh Kumar K.V } 997ad0b46e6SGreg Kurz goto out_close; 998ad0b46e6SGreg Kurz 999ad0b46e6SGreg Kurz err: 1000ad0b46e6SGreg Kurz ret = -1; 1001ad0b46e6SGreg Kurz err_undo_link: 1002ad0b46e6SGreg Kurz unlinkat_preserve_errno(ndirfd, name, 0); 1003ad0b46e6SGreg Kurz out_close: 1004ad0b46e6SGreg Kurz close_preserve_errno(ndirfd); 1005ad0b46e6SGreg Kurz close_preserve_errno(odirfd); 10066dd4b1f1SGreg Kurz out: 1007ad0b46e6SGreg Kurz g_free(oname); 1008ad0b46e6SGreg Kurz g_free(odirpath); 10092289be19SAneesh Kumar K.V return ret; 1010c494dd6fSAnthony Liguori } 1011c494dd6fSAnthony Liguori 10122289be19SAneesh Kumar K.V static int local_truncate(FsContext *ctx, V9fsPath *fs_path, off_t size) 10138cf89e00SAnthony Liguori { 1014ac125d99SGreg Kurz int fd, ret; 10152289be19SAneesh Kumar K.V 1016ac125d99SGreg Kurz fd = local_open_nofollow(ctx, fs_path->data, O_WRONLY, 0); 1017ac125d99SGreg Kurz if (fd == -1) { 1018ac125d99SGreg Kurz return -1; 1019ac125d99SGreg Kurz } 1020ac125d99SGreg Kurz ret = ftruncate(fd, size); 1021ac125d99SGreg Kurz close_preserve_errno(fd); 10224fa4ce71SChen Gang return ret; 10238cf89e00SAnthony Liguori } 10248cf89e00SAnthony Liguori 10252289be19SAneesh Kumar K.V static int local_chown(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) 10268cf89e00SAnthony Liguori { 1027d369f207SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 1028d369f207SGreg Kurz char *name = g_path_get_basename(fs_path->data); 10294fa4ce71SChen Gang int ret = -1; 1030d369f207SGreg Kurz int dirfd; 1031d369f207SGreg Kurz 1032d369f207SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 1033d369f207SGreg Kurz if (dirfd == -1) { 1034d369f207SGreg Kurz goto out; 1035d369f207SGreg Kurz } 10362289be19SAneesh Kumar K.V 1037c79ce737SSripathi Kodi if ((credp->fc_uid == -1 && credp->fc_gid == -1) || 103817b1971fSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 103917b1971fSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 1040d369f207SGreg Kurz ret = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 1041d369f207SGreg Kurz AT_SYMLINK_NOFOLLOW); 1042b97400caSAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 1043d369f207SGreg Kurz ret = local_set_xattrat(dirfd, name, credp); 10442c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 1045d369f207SGreg Kurz ret = local_set_mapped_file_attrat(dirfd, name, credp); 1046f7613beeSVenkateswararao Jujjuri (JV) } 1047d369f207SGreg Kurz 1048d369f207SGreg Kurz close_preserve_errno(dirfd); 1049d369f207SGreg Kurz out: 1050d369f207SGreg Kurz g_free(name); 1051d369f207SGreg Kurz g_free(dirpath); 10524fa4ce71SChen Gang return ret; 10538cf89e00SAnthony Liguori } 10548cf89e00SAnthony Liguori 10552289be19SAneesh Kumar K.V static int local_utimensat(FsContext *s, V9fsPath *fs_path, 105674bc02b2SM. Mohan Kumar const struct timespec *buf) 10578cf89e00SAnthony Liguori { 1058a33eda0dSGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 1059a33eda0dSGreg Kurz char *name = g_path_get_basename(fs_path->data); 1060a33eda0dSGreg Kurz int dirfd, ret = -1; 10612289be19SAneesh Kumar K.V 1062a33eda0dSGreg Kurz dirfd = local_opendir_nofollow(s, dirpath); 1063a33eda0dSGreg Kurz if (dirfd == -1) { 1064a33eda0dSGreg Kurz goto out; 1065a33eda0dSGreg Kurz } 1066a33eda0dSGreg Kurz 1067a33eda0dSGreg Kurz ret = utimensat(dirfd, name, buf, AT_SYMLINK_NOFOLLOW); 1068a33eda0dSGreg Kurz close_preserve_errno(dirfd); 1069a33eda0dSGreg Kurz out: 1070a33eda0dSGreg Kurz g_free(dirpath); 1071a33eda0dSGreg Kurz g_free(name); 10724fa4ce71SChen Gang return ret; 10738cf89e00SAnthony Liguori } 10748cf89e00SAnthony Liguori 1075df4938a6SGreg Kurz static int local_unlinkat_common(FsContext *ctx, int dirfd, const char *name, 1076df4938a6SGreg Kurz int flags) 10775bae1900SAnthony Liguori { 1078df4938a6SGreg Kurz int ret = -1; 10792c30dd74SAneesh Kumar K.V 10802c30dd74SAneesh Kumar K.V if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 1081df4938a6SGreg Kurz int map_dirfd; 1082df4938a6SGreg Kurz 10836a87e792SGreg Kurz /* We need to remove the metadata as well: 10846a87e792SGreg Kurz * - the metadata directory if we're removing a directory 10856a87e792SGreg Kurz * - the metadata file in the parent's metadata directory 10866a87e792SGreg Kurz * 10876a87e792SGreg Kurz * If any of these are missing (ie, ENOENT) then we're probably 10886a87e792SGreg Kurz * trying to remove something that wasn't created in mapped-file 10896a87e792SGreg Kurz * mode. We just ignore the error. 10906a87e792SGreg Kurz */ 1091df4938a6SGreg Kurz if (flags == AT_REMOVEDIR) { 1092df4938a6SGreg Kurz int fd; 1093df4938a6SGreg Kurz 1094b003fc0dSGreg Kurz fd = openat_dir(dirfd, name); 1095df4938a6SGreg Kurz if (fd == -1) { 10962c30dd74SAneesh Kumar K.V goto err_out; 10972c30dd74SAneesh Kumar K.V } 1098df4938a6SGreg Kurz ret = unlinkat(fd, VIRTFS_META_DIR, AT_REMOVEDIR); 1099df4938a6SGreg Kurz close_preserve_errno(fd); 1100df4938a6SGreg Kurz if (ret < 0 && errno != ENOENT) { 11012c30dd74SAneesh Kumar K.V goto err_out; 11022c30dd74SAneesh Kumar K.V } 11032c30dd74SAneesh Kumar K.V } 1104df4938a6SGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 11056a87e792SGreg Kurz if (map_dirfd != -1) { 1106df4938a6SGreg Kurz ret = unlinkat(map_dirfd, name, 0); 1107df4938a6SGreg Kurz close_preserve_errno(map_dirfd); 1108df4938a6SGreg Kurz if (ret < 0 && errno != ENOENT) { 11096a87e792SGreg Kurz goto err_out; 11106a87e792SGreg Kurz } 11116a87e792SGreg Kurz } else if (errno != ENOENT) { 11122c30dd74SAneesh Kumar K.V goto err_out; 11132c30dd74SAneesh Kumar K.V } 11142c30dd74SAneesh Kumar K.V } 11154fa4ce71SChen Gang 1116df4938a6SGreg Kurz ret = unlinkat(dirfd, name, flags); 11172c30dd74SAneesh Kumar K.V err_out: 1118df4938a6SGreg Kurz return ret; 1119df4938a6SGreg Kurz } 1120df4938a6SGreg Kurz 11218cf89e00SAnthony Liguori static int local_remove(FsContext *ctx, const char *path) 11228cf89e00SAnthony Liguori { 11238cf89e00SAnthony Liguori struct stat stbuf; 1124a0e640a8SGreg Kurz char *dirpath = g_path_get_dirname(path); 1125a0e640a8SGreg Kurz char *name = g_path_get_basename(path); 1126a0e640a8SGreg Kurz int flags = 0; 1127a0e640a8SGreg Kurz int dirfd; 1128a0e640a8SGreg Kurz int err = -1; 11298cf89e00SAnthony Liguori 1130a0e640a8SGreg Kurz dirfd = local_opendir_nofollow(ctx, dirpath); 1131b7361d46SGreg Kurz if (dirfd == -1) { 1132a0e640a8SGreg Kurz goto out; 1133a0e640a8SGreg Kurz } 1134a0e640a8SGreg Kurz 1135790db7efSBruce Rogers if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW) < 0) { 11368cf89e00SAnthony Liguori goto err_out; 11378cf89e00SAnthony Liguori } 1138a0e640a8SGreg Kurz 11398cf89e00SAnthony Liguori if (S_ISDIR(stbuf.st_mode)) { 1140a0e640a8SGreg Kurz flags |= AT_REMOVEDIR; 11418cf89e00SAnthony Liguori } 11425bae1900SAnthony Liguori 1143a0e640a8SGreg Kurz err = local_unlinkat_common(ctx, dirfd, name, flags); 11442c30dd74SAneesh Kumar K.V err_out: 1145a0e640a8SGreg Kurz close_preserve_errno(dirfd); 1146a0e640a8SGreg Kurz out: 1147a0e640a8SGreg Kurz g_free(name); 1148a0e640a8SGreg Kurz g_free(dirpath); 11492c30dd74SAneesh Kumar K.V return err; 11505bae1900SAnthony Liguori } 11515bae1900SAnthony Liguori 11528b888272SAneesh Kumar K.V static int local_fsync(FsContext *ctx, int fid_type, 11538b888272SAneesh Kumar K.V V9fsFidOpenState *fs, int datasync) 11548cf89e00SAnthony Liguori { 11558b888272SAneesh Kumar K.V int fd; 11568b888272SAneesh Kumar K.V 11578b888272SAneesh Kumar K.V if (fid_type == P9_FID_DIR) { 1158f314ea4eSGreg Kurz fd = dirfd(fs->dir.stream); 115949594973SVenkateswararao Jujjuri (JV) } else { 11608b888272SAneesh Kumar K.V fd = fs->fd; 11618b888272SAneesh Kumar K.V } 11628b888272SAneesh Kumar K.V 11638b888272SAneesh Kumar K.V if (datasync) { 11648b888272SAneesh Kumar K.V return qemu_fdatasync(fd); 11658b888272SAneesh Kumar K.V } else { 11668b888272SAneesh Kumar K.V return fsync(fd); 11678cf89e00SAnthony Liguori } 116849594973SVenkateswararao Jujjuri (JV) } 11698cf89e00SAnthony Liguori 11702289be19SAneesh Kumar K.V static int local_statfs(FsContext *s, V9fsPath *fs_path, struct statfs *stbuf) 1171be940c87SM. Mohan Kumar { 117231e51d1cSGreg Kurz int fd, ret; 11732289be19SAneesh Kumar K.V 117431e51d1cSGreg Kurz fd = local_open_nofollow(s, fs_path->data, O_RDONLY, 0); 117523da0145SGreg Kurz if (fd == -1) { 117623da0145SGreg Kurz return -1; 117723da0145SGreg Kurz } 117831e51d1cSGreg Kurz ret = fstatfs(fd, stbuf); 117931e51d1cSGreg Kurz close_preserve_errno(fd); 11804fa4ce71SChen Gang return ret; 1181be940c87SM. Mohan Kumar } 1182be940c87SM. Mohan Kumar 11832289be19SAneesh Kumar K.V static ssize_t local_lgetxattr(FsContext *ctx, V9fsPath *fs_path, 1184fa32ef88SAneesh Kumar K.V const char *name, void *value, size_t size) 1185fa32ef88SAneesh Kumar K.V { 11862289be19SAneesh Kumar K.V char *path = fs_path->data; 11872289be19SAneesh Kumar K.V 1188fc22118dSAneesh Kumar K.V return v9fs_get_xattr(ctx, path, name, value, size); 1189fa32ef88SAneesh Kumar K.V } 1190fa32ef88SAneesh Kumar K.V 11912289be19SAneesh Kumar K.V static ssize_t local_llistxattr(FsContext *ctx, V9fsPath *fs_path, 1192fa32ef88SAneesh Kumar K.V void *value, size_t size) 1193fa32ef88SAneesh Kumar K.V { 11942289be19SAneesh Kumar K.V char *path = fs_path->data; 11952289be19SAneesh Kumar K.V 1196fc22118dSAneesh Kumar K.V return v9fs_list_xattr(ctx, path, value, size); 119761b6c499SAneesh Kumar K.V } 119861b6c499SAneesh Kumar K.V 11992289be19SAneesh Kumar K.V static int local_lsetxattr(FsContext *ctx, V9fsPath *fs_path, const char *name, 120010b468bdSAneesh Kumar K.V void *value, size_t size, int flags) 120110b468bdSAneesh Kumar K.V { 12022289be19SAneesh Kumar K.V char *path = fs_path->data; 12032289be19SAneesh Kumar K.V 1204fc22118dSAneesh Kumar K.V return v9fs_set_xattr(ctx, path, name, value, size, flags); 120510b468bdSAneesh Kumar K.V } 120610b468bdSAneesh Kumar K.V 12072289be19SAneesh Kumar K.V static int local_lremovexattr(FsContext *ctx, V9fsPath *fs_path, 12082289be19SAneesh Kumar K.V const char *name) 12099ed3ef26SAneesh Kumar K.V { 12102289be19SAneesh Kumar K.V char *path = fs_path->data; 12112289be19SAneesh Kumar K.V 1212fc22118dSAneesh Kumar K.V return v9fs_remove_xattr(ctx, path, name); 12139ed3ef26SAneesh Kumar K.V } 12149ed3ef26SAneesh Kumar K.V 12152289be19SAneesh Kumar K.V static int local_name_to_path(FsContext *ctx, V9fsPath *dir_path, 12162289be19SAneesh Kumar K.V const char *name, V9fsPath *target) 12172289be19SAneesh Kumar K.V { 12187a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 12197a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 12207a95434eSGreg Kurz errno = EINVAL; 12217a95434eSGreg Kurz return -1; 12227a95434eSGreg Kurz } 12237a95434eSGreg Kurz 12242289be19SAneesh Kumar K.V if (dir_path) { 1225f57f5878SGreg Kurz if (!strcmp(name, ".")) { 1226f57f5878SGreg Kurz /* "." relative to "foo/bar" is "foo/bar" */ 1227f57f5878SGreg Kurz v9fs_path_copy(target, dir_path); 1228f57f5878SGreg Kurz } else if (!strcmp(name, "..")) { 1229f57f5878SGreg Kurz if (!strcmp(dir_path->data, ".")) { 1230f57f5878SGreg Kurz /* ".." relative to the root is "." */ 1231f57f5878SGreg Kurz v9fs_path_sprintf(target, "."); 12329c6b899fSGreg Kurz } else { 1233f57f5878SGreg Kurz char *tmp = g_path_get_dirname(dir_path->data); 1234f57f5878SGreg Kurz /* Symbolic links are resolved by the client. We can assume 1235f57f5878SGreg Kurz * that ".." relative to "foo/bar" is equivalent to "foo" 12369c6b899fSGreg Kurz */ 1237f57f5878SGreg Kurz v9fs_path_sprintf(target, "%s", tmp); 1238f57f5878SGreg Kurz g_free(tmp); 1239f57f5878SGreg Kurz } 1240f57f5878SGreg Kurz } else { 1241f57f5878SGreg Kurz assert(!strchr(name, '/')); 1242f57f5878SGreg Kurz v9fs_path_sprintf(target, "%s/%s", dir_path->data, name); 1243f57f5878SGreg Kurz } 1244f57f5878SGreg Kurz } else if (!strcmp(name, "/") || !strcmp(name, ".") || 1245f57f5878SGreg Kurz !strcmp(name, "..")) { 1246f57f5878SGreg Kurz /* This is the root fid */ 1247f57f5878SGreg Kurz v9fs_path_sprintf(target, "."); 1248f57f5878SGreg Kurz } else { 1249f57f5878SGreg Kurz assert(!strchr(name, '/')); 1250f57f5878SGreg Kurz v9fs_path_sprintf(target, "./%s", name); 12512289be19SAneesh Kumar K.V } 12522289be19SAneesh Kumar K.V return 0; 12532289be19SAneesh Kumar K.V } 12542289be19SAneesh Kumar K.V 12552289be19SAneesh Kumar K.V static int local_renameat(FsContext *ctx, V9fsPath *olddir, 12562289be19SAneesh Kumar K.V const char *old_name, V9fsPath *newdir, 12572289be19SAneesh Kumar K.V const char *new_name) 12582289be19SAneesh Kumar K.V { 12592289be19SAneesh Kumar K.V int ret; 126099f2cf4bSGreg Kurz int odirfd, ndirfd; 12612289be19SAneesh Kumar K.V 12627a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 12637a95434eSGreg Kurz (local_is_mapped_file_metadata(ctx, old_name) || 12647a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, new_name))) { 12657a95434eSGreg Kurz errno = EINVAL; 12667a95434eSGreg Kurz return -1; 12677a95434eSGreg Kurz } 12687a95434eSGreg Kurz 126999f2cf4bSGreg Kurz odirfd = local_opendir_nofollow(ctx, olddir->data); 127099f2cf4bSGreg Kurz if (odirfd == -1) { 127199f2cf4bSGreg Kurz return -1; 127299f2cf4bSGreg Kurz } 12732289be19SAneesh Kumar K.V 127499f2cf4bSGreg Kurz ndirfd = local_opendir_nofollow(ctx, newdir->data); 127599f2cf4bSGreg Kurz if (ndirfd == -1) { 127699f2cf4bSGreg Kurz close_preserve_errno(odirfd); 127799f2cf4bSGreg Kurz return -1; 127899f2cf4bSGreg Kurz } 12792289be19SAneesh Kumar K.V 128099f2cf4bSGreg Kurz ret = renameat(odirfd, old_name, ndirfd, new_name); 128199f2cf4bSGreg Kurz if (ret < 0) { 128299f2cf4bSGreg Kurz goto out; 128399f2cf4bSGreg Kurz } 128499f2cf4bSGreg Kurz 128599f2cf4bSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 128699f2cf4bSGreg Kurz int omap_dirfd, nmap_dirfd; 128799f2cf4bSGreg Kurz 128899f2cf4bSGreg Kurz ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700); 128999f2cf4bSGreg Kurz if (ret < 0 && errno != EEXIST) { 129099f2cf4bSGreg Kurz goto err_undo_rename; 129199f2cf4bSGreg Kurz } 129299f2cf4bSGreg Kurz 12936dd4b1f1SGreg Kurz omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR); 129499f2cf4bSGreg Kurz if (omap_dirfd == -1) { 129599f2cf4bSGreg Kurz goto err; 129699f2cf4bSGreg Kurz } 129799f2cf4bSGreg Kurz 12986dd4b1f1SGreg Kurz nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR); 129999f2cf4bSGreg Kurz if (nmap_dirfd == -1) { 130099f2cf4bSGreg Kurz close_preserve_errno(omap_dirfd); 130199f2cf4bSGreg Kurz goto err; 130299f2cf4bSGreg Kurz } 130399f2cf4bSGreg Kurz 130499f2cf4bSGreg Kurz /* rename the .virtfs_metadata files */ 130599f2cf4bSGreg Kurz ret = renameat(omap_dirfd, old_name, nmap_dirfd, new_name); 130699f2cf4bSGreg Kurz close_preserve_errno(nmap_dirfd); 130799f2cf4bSGreg Kurz close_preserve_errno(omap_dirfd); 130899f2cf4bSGreg Kurz if (ret < 0 && errno != ENOENT) { 130999f2cf4bSGreg Kurz goto err_undo_rename; 131099f2cf4bSGreg Kurz } 131199f2cf4bSGreg Kurz 131299f2cf4bSGreg Kurz ret = 0; 131399f2cf4bSGreg Kurz } 131499f2cf4bSGreg Kurz goto out; 131599f2cf4bSGreg Kurz 131699f2cf4bSGreg Kurz err: 131799f2cf4bSGreg Kurz ret = -1; 131899f2cf4bSGreg Kurz err_undo_rename: 131999f2cf4bSGreg Kurz renameat_preserve_errno(ndirfd, new_name, odirfd, old_name); 132099f2cf4bSGreg Kurz out: 132199f2cf4bSGreg Kurz close_preserve_errno(ndirfd); 132299f2cf4bSGreg Kurz close_preserve_errno(odirfd); 13232289be19SAneesh Kumar K.V return ret; 13242289be19SAneesh Kumar K.V } 13252289be19SAneesh Kumar K.V 1326d2767edeSGreg Kurz static void v9fs_path_init_dirname(V9fsPath *path, const char *str) 1327d2767edeSGreg Kurz { 1328d2767edeSGreg Kurz path->data = g_path_get_dirname(str); 1329d2767edeSGreg Kurz path->size = strlen(path->data) + 1; 1330d2767edeSGreg Kurz } 1331d2767edeSGreg Kurz 1332d2767edeSGreg Kurz static int local_rename(FsContext *ctx, const char *oldpath, 1333d2767edeSGreg Kurz const char *newpath) 1334d2767edeSGreg Kurz { 1335d2767edeSGreg Kurz int err; 1336d2767edeSGreg Kurz char *oname = g_path_get_basename(oldpath); 1337d2767edeSGreg Kurz char *nname = g_path_get_basename(newpath); 1338d2767edeSGreg Kurz V9fsPath olddir, newdir; 1339d2767edeSGreg Kurz 1340d2767edeSGreg Kurz v9fs_path_init_dirname(&olddir, oldpath); 1341d2767edeSGreg Kurz v9fs_path_init_dirname(&newdir, newpath); 1342d2767edeSGreg Kurz 1343d2767edeSGreg Kurz err = local_renameat(ctx, &olddir, oname, &newdir, nname); 1344d2767edeSGreg Kurz 1345d2767edeSGreg Kurz v9fs_path_free(&newdir); 1346d2767edeSGreg Kurz v9fs_path_free(&olddir); 1347d2767edeSGreg Kurz g_free(nname); 1348d2767edeSGreg Kurz g_free(oname); 1349d2767edeSGreg Kurz 1350d2767edeSGreg Kurz return err; 1351d2767edeSGreg Kurz } 1352d2767edeSGreg Kurz 13532289be19SAneesh Kumar K.V static int local_unlinkat(FsContext *ctx, V9fsPath *dir, 13542289be19SAneesh Kumar K.V const char *name, int flags) 13552289be19SAneesh Kumar K.V { 13562289be19SAneesh Kumar K.V int ret; 1357df4938a6SGreg Kurz int dirfd; 13582c30dd74SAneesh Kumar K.V 13597a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 13607a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 13617a95434eSGreg Kurz errno = EINVAL; 13627a95434eSGreg Kurz return -1; 13637a95434eSGreg Kurz } 13647a95434eSGreg Kurz 1365df4938a6SGreg Kurz dirfd = local_opendir_nofollow(ctx, dir->data); 1366df4938a6SGreg Kurz if (dirfd == -1) { 1367df4938a6SGreg Kurz return -1; 1368df4938a6SGreg Kurz } 13692289be19SAneesh Kumar K.V 1370df4938a6SGreg Kurz ret = local_unlinkat_common(ctx, dirfd, name, flags); 1371df4938a6SGreg Kurz close_preserve_errno(dirfd); 13722289be19SAneesh Kumar K.V return ret; 13732289be19SAneesh Kumar K.V } 13749ed3ef26SAneesh Kumar K.V 1375e06a765eSHarsh Prateek Bora static int local_ioc_getversion(FsContext *ctx, V9fsPath *path, 1376e06a765eSHarsh Prateek Bora mode_t st_mode, uint64_t *st_gen) 1377e06a765eSHarsh Prateek Bora { 1378ae0f940eSPaolo Bonzini #ifdef FS_IOC_GETVERSION 13790e5fc994SKirill A. Shutemov int err; 1380cc720ddbSAneesh Kumar K.V V9fsFidOpenState fid_open; 1381cc720ddbSAneesh Kumar K.V 1382e06a765eSHarsh Prateek Bora /* 1383e06a765eSHarsh Prateek Bora * Do not try to open special files like device nodes, fifos etc 1384e06a765eSHarsh Prateek Bora * We can get fd for regular files and directories only 1385e06a765eSHarsh Prateek Bora */ 1386e06a765eSHarsh Prateek Bora if (!S_ISREG(st_mode) && !S_ISDIR(st_mode)) { 13871a9978a5SKirill A. Shutemov errno = ENOTTY; 13881a9978a5SKirill A. Shutemov return -1; 1389e06a765eSHarsh Prateek Bora } 1390cc720ddbSAneesh Kumar K.V err = local_open(ctx, path, O_RDONLY, &fid_open); 1391cc720ddbSAneesh Kumar K.V if (err < 0) { 1392cc720ddbSAneesh Kumar K.V return err; 1393e06a765eSHarsh Prateek Bora } 1394cc720ddbSAneesh Kumar K.V err = ioctl(fid_open.fd, FS_IOC_GETVERSION, st_gen); 1395cc720ddbSAneesh Kumar K.V local_close(ctx, &fid_open); 1396e06a765eSHarsh Prateek Bora return err; 13970e5fc994SKirill A. Shutemov #else 13980e5fc994SKirill A. Shutemov errno = ENOTTY; 13990e5fc994SKirill A. Shutemov return -1; 14000e5fc994SKirill A. Shutemov #endif 1401e06a765eSHarsh Prateek Bora } 1402e06a765eSHarsh Prateek Bora 14030174fe73SAneesh Kumar K.V static int local_init(FsContext *ctx) 14040174fe73SAneesh Kumar K.V { 1405e06a765eSHarsh Prateek Bora struct statfs stbuf; 14060e35a378SGreg Kurz LocalData *data = g_malloc(sizeof(*data)); 14070e35a378SGreg Kurz 14080e35a378SGreg Kurz data->mountfd = open(ctx->fs_root, O_DIRECTORY | O_RDONLY); 14090e35a378SGreg Kurz if (data->mountfd == -1) { 14100e35a378SGreg Kurz goto err; 14110e35a378SGreg Kurz } 1412e06a765eSHarsh Prateek Bora 141300c90bd1SGreg Kurz #ifdef FS_IOC_GETVERSION 141400c90bd1SGreg Kurz /* 141500c90bd1SGreg Kurz * use ioc_getversion only if the ioctl is definied 141600c90bd1SGreg Kurz */ 14170e35a378SGreg Kurz if (fstatfs(data->mountfd, &stbuf) < 0) { 14180e35a378SGreg Kurz close_preserve_errno(data->mountfd); 14190e35a378SGreg Kurz goto err; 142000c90bd1SGreg Kurz } 142100c90bd1SGreg Kurz switch (stbuf.f_type) { 142200c90bd1SGreg Kurz case EXT2_SUPER_MAGIC: 142300c90bd1SGreg Kurz case BTRFS_SUPER_MAGIC: 142400c90bd1SGreg Kurz case REISERFS_SUPER_MAGIC: 142500c90bd1SGreg Kurz case XFS_SUPER_MAGIC: 142600c90bd1SGreg Kurz ctx->exops.get_st_gen = local_ioc_getversion; 142700c90bd1SGreg Kurz break; 142800c90bd1SGreg Kurz } 142900c90bd1SGreg Kurz #endif 14300174fe73SAneesh Kumar K.V 14312c30dd74SAneesh Kumar K.V if (ctx->export_flags & V9FS_SM_PASSTHROUGH) { 14322c30dd74SAneesh Kumar K.V ctx->xops = passthrough_xattr_ops; 14332c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_MAPPED) { 14342c30dd74SAneesh Kumar K.V ctx->xops = mapped_xattr_ops; 14352c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_NONE) { 14362c30dd74SAneesh Kumar K.V ctx->xops = none_xattr_ops; 14372c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 14382c30dd74SAneesh Kumar K.V /* 14392c30dd74SAneesh Kumar K.V * xattr operation for mapped-file and passthrough 14402c30dd74SAneesh Kumar K.V * remain same. 14412c30dd74SAneesh Kumar K.V */ 14422c30dd74SAneesh Kumar K.V ctx->xops = passthrough_xattr_ops; 14432c30dd74SAneesh Kumar K.V } 1444c98f1d4aSAneesh Kumar K.V ctx->export_flags |= V9FS_PATHNAME_FSCONTEXT; 144500c90bd1SGreg Kurz 14460e35a378SGreg Kurz ctx->private = data; 144700c90bd1SGreg Kurz return 0; 14480e35a378SGreg Kurz 14490e35a378SGreg Kurz err: 14500e35a378SGreg Kurz g_free(data); 14510e35a378SGreg Kurz return -1; 1452e06a765eSHarsh Prateek Bora } 14530e35a378SGreg Kurz 14540e35a378SGreg Kurz static void local_cleanup(FsContext *ctx) 14550e35a378SGreg Kurz { 14560e35a378SGreg Kurz LocalData *data = ctx->private; 14570e35a378SGreg Kurz 14580e35a378SGreg Kurz close(data->mountfd); 14590e35a378SGreg Kurz g_free(data); 14600174fe73SAneesh Kumar K.V } 14610174fe73SAneesh Kumar K.V 1462*91cda4e8SGreg Kurz static void error_append_security_model_hint(Error **errp) 1463*91cda4e8SGreg Kurz { 1464*91cda4e8SGreg Kurz error_append_hint(errp, "Valid options are: security_model=" 1465*91cda4e8SGreg Kurz "[passthrough|mapped-xattr|mapped-file|none]\n"); 1466*91cda4e8SGreg Kurz } 1467*91cda4e8SGreg Kurz 1468*91cda4e8SGreg Kurz static int local_parse_opts(QemuOpts *opts, FsDriverEntry *fse, Error **errp) 146999519f0aSAneesh Kumar K.V { 147099519f0aSAneesh Kumar K.V const char *sec_model = qemu_opt_get(opts, "security_model"); 147199519f0aSAneesh Kumar K.V const char *path = qemu_opt_get(opts, "path"); 1472*91cda4e8SGreg Kurz Error *local_err = NULL; 147399519f0aSAneesh Kumar K.V 147499519f0aSAneesh Kumar K.V if (!sec_model) { 1475*91cda4e8SGreg Kurz error_setg(errp, "security_model property not set"); 1476*91cda4e8SGreg Kurz error_append_security_model_hint(errp); 147799519f0aSAneesh Kumar K.V return -1; 147899519f0aSAneesh Kumar K.V } 147999519f0aSAneesh Kumar K.V 148099519f0aSAneesh Kumar K.V if (!strcmp(sec_model, "passthrough")) { 148199519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_PASSTHROUGH; 14822c30dd74SAneesh Kumar K.V } else if (!strcmp(sec_model, "mapped") || 14832c30dd74SAneesh Kumar K.V !strcmp(sec_model, "mapped-xattr")) { 148499519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_MAPPED; 148599519f0aSAneesh Kumar K.V } else if (!strcmp(sec_model, "none")) { 148699519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_NONE; 14872c30dd74SAneesh Kumar K.V } else if (!strcmp(sec_model, "mapped-file")) { 14882c30dd74SAneesh Kumar K.V fse->export_flags |= V9FS_SM_MAPPED_FILE; 148999519f0aSAneesh Kumar K.V } else { 1490*91cda4e8SGreg Kurz error_setg(errp, "invalid security_model property '%s'", sec_model); 1491*91cda4e8SGreg Kurz error_append_security_model_hint(errp); 149299519f0aSAneesh Kumar K.V return -1; 149399519f0aSAneesh Kumar K.V } 149499519f0aSAneesh Kumar K.V 149599519f0aSAneesh Kumar K.V if (!path) { 1496*91cda4e8SGreg Kurz error_setg(errp, "path property not set"); 149799519f0aSAneesh Kumar K.V return -1; 149899519f0aSAneesh Kumar K.V } 1499b8bbdb88SPradeep Jagadeesh 1500*91cda4e8SGreg Kurz fsdev_throttle_parse_opts(opts, &fse->fst, &local_err); 1501*91cda4e8SGreg Kurz if (local_err) { 1502*91cda4e8SGreg Kurz error_propagate(errp, local_err); 1503*91cda4e8SGreg Kurz error_prepend(errp, "invalid throttle configuration: "); 1504b8bbdb88SPradeep Jagadeesh return -1; 1505b8bbdb88SPradeep Jagadeesh } 1506b8bbdb88SPradeep Jagadeesh 1507b96feb2cSTobias Schramm if (fse->export_flags & V9FS_SM_MAPPED || 1508b96feb2cSTobias Schramm fse->export_flags & V9FS_SM_MAPPED_FILE) { 1509b96feb2cSTobias Schramm fse->fmode = 1510b96feb2cSTobias Schramm qemu_opt_get_number(opts, "fmode", SM_LOCAL_MODE_BITS) & 0777; 1511b96feb2cSTobias Schramm fse->dmode = 1512b96feb2cSTobias Schramm qemu_opt_get_number(opts, "dmode", SM_LOCAL_DIR_MODE_BITS) & 0777; 1513b96feb2cSTobias Schramm } else { 1514b96feb2cSTobias Schramm if (qemu_opt_find(opts, "fmode")) { 1515*91cda4e8SGreg Kurz error_setg(errp, "fmode is only valid for mapped security modes"); 1516b96feb2cSTobias Schramm return -1; 1517b96feb2cSTobias Schramm } 1518b96feb2cSTobias Schramm if (qemu_opt_find(opts, "dmode")) { 1519*91cda4e8SGreg Kurz error_setg(errp, "dmode is only valid for mapped security modes"); 1520b96feb2cSTobias Schramm return -1; 1521b96feb2cSTobias Schramm } 1522b96feb2cSTobias Schramm } 1523b96feb2cSTobias Schramm 152499519f0aSAneesh Kumar K.V fse->path = g_strdup(path); 152599519f0aSAneesh Kumar K.V 152699519f0aSAneesh Kumar K.V return 0; 152799519f0aSAneesh Kumar K.V } 152899519f0aSAneesh Kumar K.V 15299f107513SAnthony Liguori FileOperations local_ops = { 153099519f0aSAneesh Kumar K.V .parse_opts = local_parse_opts, 15310174fe73SAneesh Kumar K.V .init = local_init, 15320e35a378SGreg Kurz .cleanup = local_cleanup, 1533131dcb25SAnthony Liguori .lstat = local_lstat, 1534131dcb25SAnthony Liguori .readlink = local_readlink, 1535131dcb25SAnthony Liguori .close = local_close, 1536131dcb25SAnthony Liguori .closedir = local_closedir, 1537a6568fe2SAnthony Liguori .open = local_open, 1538a6568fe2SAnthony Liguori .opendir = local_opendir, 1539a9231555SAnthony Liguori .rewinddir = local_rewinddir, 1540a9231555SAnthony Liguori .telldir = local_telldir, 1541635324e8SGreg Kurz .readdir = local_readdir, 1542a9231555SAnthony Liguori .seekdir = local_seekdir, 154356d15a53SSanchit Garg .preadv = local_preadv, 154456d15a53SSanchit Garg .pwritev = local_pwritev, 1545c494dd6fSAnthony Liguori .chmod = local_chmod, 1546c494dd6fSAnthony Liguori .mknod = local_mknod, 1547c494dd6fSAnthony Liguori .mkdir = local_mkdir, 1548c494dd6fSAnthony Liguori .fstat = local_fstat, 1549c494dd6fSAnthony Liguori .open2 = local_open2, 1550c494dd6fSAnthony Liguori .symlink = local_symlink, 1551c494dd6fSAnthony Liguori .link = local_link, 15528cf89e00SAnthony Liguori .truncate = local_truncate, 15538cf89e00SAnthony Liguori .rename = local_rename, 15548cf89e00SAnthony Liguori .chown = local_chown, 155574bc02b2SM. Mohan Kumar .utimensat = local_utimensat, 15565bae1900SAnthony Liguori .remove = local_remove, 15578cf89e00SAnthony Liguori .fsync = local_fsync, 1558be940c87SM. Mohan Kumar .statfs = local_statfs, 1559fa32ef88SAneesh Kumar K.V .lgetxattr = local_lgetxattr, 1560fa32ef88SAneesh Kumar K.V .llistxattr = local_llistxattr, 156110b468bdSAneesh Kumar K.V .lsetxattr = local_lsetxattr, 15629ed3ef26SAneesh Kumar K.V .lremovexattr = local_lremovexattr, 15632289be19SAneesh Kumar K.V .name_to_path = local_name_to_path, 15642289be19SAneesh Kumar K.V .renameat = local_renameat, 15652289be19SAneesh Kumar K.V .unlinkat = local_unlinkat, 15669f107513SAnthony Liguori }; 1567