19f107513SAnthony Liguori /* 2f00d4f59SWei Liu * 9p Posix callback 39f107513SAnthony Liguori * 49f107513SAnthony Liguori * Copyright IBM, Corp. 2010 59f107513SAnthony Liguori * 69f107513SAnthony Liguori * Authors: 79f107513SAnthony Liguori * Anthony Liguori <aliguori@us.ibm.com> 89f107513SAnthony Liguori * 99f107513SAnthony Liguori * This work is licensed under the terms of the GNU GPL, version 2. See 109f107513SAnthony Liguori * the COPYING file in the top-level directory. 119f107513SAnthony Liguori */ 12873c3213SStefan Weil 136f569084SChristian Schoenebeck /* 146f569084SChristian Schoenebeck * Not so fast! You might want to read the 9p developer docs first: 156f569084SChristian Schoenebeck * https://wiki.qemu.org/Documentation/9p 166f569084SChristian Schoenebeck */ 176f569084SChristian Schoenebeck 18fbc04127SPeter Maydell #include "qemu/osdep.h" 19ebe74f8bSWei Liu #include "9p.h" 20996a0d76SGreg Kurz #include "9p-local.h" 21267ae092SWei Liu #include "9p-xattr.h" 220e35a378SGreg Kurz #include "9p-util.h" 2369b15212SStefan Weil #include "fsdev/qemu-fsdev.h" /* local_ops */ 24c494dd6fSAnthony Liguori #include <arpa/inet.h> 25131dcb25SAnthony Liguori #include <pwd.h> 26131dcb25SAnthony Liguori #include <grp.h> 27c494dd6fSAnthony Liguori #include <sys/socket.h> 28c494dd6fSAnthony Liguori #include <sys/un.h> 291de7afc9SPaolo Bonzini #include "qemu/xattr.h" 30e688df6bSMarkus Armbruster #include "qapi/error.h" 31f348b6d1SVeronia Bahaa #include "qemu/cutils.h" 3263325b18SGreg Kurz #include "qemu/error-report.h" 33922a01a0SMarkus Armbruster #include "qemu/option.h" 342c30dd74SAneesh Kumar K.V #include <libgen.h> 35e0bd743bSKeno Fischer #ifdef CONFIG_LINUX 36e06a765eSHarsh Prateek Bora #include <linux/fs.h> 37e06a765eSHarsh Prateek Bora #ifdef CONFIG_LINUX_MAGIC_H 38e06a765eSHarsh Prateek Bora #include <linux/magic.h> 39e06a765eSHarsh Prateek Bora #endif 40e0bd743bSKeno Fischer #endif 41e06a765eSHarsh Prateek Bora #include <sys/ioctl.h> 42e06a765eSHarsh Prateek Bora 43e06a765eSHarsh Prateek Bora #ifndef XFS_SUPER_MAGIC 44e06a765eSHarsh Prateek Bora #define XFS_SUPER_MAGIC 0x58465342 45e06a765eSHarsh Prateek Bora #endif 46e06a765eSHarsh Prateek Bora #ifndef EXT2_SUPER_MAGIC 47e06a765eSHarsh Prateek Bora #define EXT2_SUPER_MAGIC 0xEF53 48e06a765eSHarsh Prateek Bora #endif 49e06a765eSHarsh Prateek Bora #ifndef REISERFS_SUPER_MAGIC 50e06a765eSHarsh Prateek Bora #define REISERFS_SUPER_MAGIC 0x52654973 51e06a765eSHarsh Prateek Bora #endif 52e06a765eSHarsh Prateek Bora #ifndef BTRFS_SUPER_MAGIC 53e06a765eSHarsh Prateek Bora #define BTRFS_SUPER_MAGIC 0x9123683E 54e06a765eSHarsh Prateek Bora #endif 55131dcb25SAnthony Liguori 560e35a378SGreg Kurz typedef struct { 570e35a378SGreg Kurz int mountfd; 580e35a378SGreg Kurz } LocalData; 590e35a378SGreg Kurz 60996a0d76SGreg Kurz int local_open_nofollow(FsContext *fs_ctx, const char *path, int flags, 61996a0d76SGreg Kurz mode_t mode) 62996a0d76SGreg Kurz { 63996a0d76SGreg Kurz LocalData *data = fs_ctx->private; 643dbcf273SGreg Kurz int fd = data->mountfd; 65996a0d76SGreg Kurz 663dbcf273SGreg Kurz while (*path && fd != -1) { 673dbcf273SGreg Kurz const char *c; 683dbcf273SGreg Kurz int next_fd; 693dbcf273SGreg Kurz char *head; 703dbcf273SGreg Kurz 713dbcf273SGreg Kurz /* Only relative paths without consecutive slashes */ 723dbcf273SGreg Kurz assert(*path != '/'); 733dbcf273SGreg Kurz 743dbcf273SGreg Kurz head = g_strdup(path); 755c99fa37SKeno Fischer c = qemu_strchrnul(path, '/'); 763dbcf273SGreg Kurz if (*c) { 773dbcf273SGreg Kurz /* Intermediate path element */ 783dbcf273SGreg Kurz head[c - path] = 0; 793dbcf273SGreg Kurz path = c + 1; 803dbcf273SGreg Kurz next_fd = openat_dir(fd, head); 813dbcf273SGreg Kurz } else { 823dbcf273SGreg Kurz /* Rightmost path element */ 833dbcf273SGreg Kurz next_fd = openat_file(fd, head, flags, mode); 843dbcf273SGreg Kurz path = c; 853dbcf273SGreg Kurz } 863dbcf273SGreg Kurz g_free(head); 873dbcf273SGreg Kurz if (fd != data->mountfd) { 883dbcf273SGreg Kurz close_preserve_errno(fd); 893dbcf273SGreg Kurz } 903dbcf273SGreg Kurz fd = next_fd; 91996a0d76SGreg Kurz } 92996a0d76SGreg Kurz 933dbcf273SGreg Kurz assert(fd != data->mountfd); 943dbcf273SGreg Kurz return fd; 95996a0d76SGreg Kurz } 96996a0d76SGreg Kurz 97996a0d76SGreg Kurz int local_opendir_nofollow(FsContext *fs_ctx, const char *path) 98996a0d76SGreg Kurz { 99996a0d76SGreg Kurz return local_open_nofollow(fs_ctx, path, O_DIRECTORY | O_RDONLY, 0); 100996a0d76SGreg Kurz } 101996a0d76SGreg Kurz 10299f2cf4bSGreg Kurz static void renameat_preserve_errno(int odirfd, const char *opath, int ndirfd, 10399f2cf4bSGreg Kurz const char *npath) 10499f2cf4bSGreg Kurz { 10599f2cf4bSGreg Kurz int serrno = errno; 10699f2cf4bSGreg Kurz renameat(odirfd, opath, ndirfd, npath); 10799f2cf4bSGreg Kurz errno = serrno; 10899f2cf4bSGreg Kurz } 10999f2cf4bSGreg Kurz 110ad0b46e6SGreg Kurz static void unlinkat_preserve_errno(int dirfd, const char *path, int flags) 111ad0b46e6SGreg Kurz { 112ad0b46e6SGreg Kurz int serrno = errno; 113ad0b46e6SGreg Kurz unlinkat(dirfd, path, flags); 114ad0b46e6SGreg Kurz errno = serrno; 115ad0b46e6SGreg Kurz } 116ad0b46e6SGreg Kurz 1172c30dd74SAneesh Kumar K.V #define VIRTFS_META_DIR ".virtfs_metadata" 11881ffbf5aSGreg Kurz #define VIRTFS_META_ROOT_FILE VIRTFS_META_DIR "_root" 1192c30dd74SAneesh Kumar K.V 120f9aef99bSGreg Kurz static FILE *local_fopenat(int dirfd, const char *name, const char *mode) 1210ceb092eSAneesh Kumar K.V { 1220ceb092eSAneesh Kumar K.V int fd, o_mode = 0; 1230ceb092eSAneesh Kumar K.V FILE *fp; 124f9aef99bSGreg Kurz int flags; 1250ceb092eSAneesh Kumar K.V /* 1260ceb092eSAneesh Kumar K.V * only supports two modes 1270ceb092eSAneesh Kumar K.V */ 1280ceb092eSAneesh Kumar K.V if (mode[0] == 'r') { 129f9aef99bSGreg Kurz flags = O_RDONLY; 1300ceb092eSAneesh Kumar K.V } else if (mode[0] == 'w') { 131f9aef99bSGreg Kurz flags = O_WRONLY | O_TRUNC | O_CREAT; 1320ceb092eSAneesh Kumar K.V o_mode = S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH; 1330ceb092eSAneesh Kumar K.V } else { 1340ceb092eSAneesh Kumar K.V return NULL; 1350ceb092eSAneesh Kumar K.V } 136f9aef99bSGreg Kurz fd = openat_file(dirfd, name, flags, o_mode); 1370ceb092eSAneesh Kumar K.V if (fd == -1) { 1380ceb092eSAneesh Kumar K.V return NULL; 1390ceb092eSAneesh Kumar K.V } 1400ceb092eSAneesh Kumar K.V fp = fdopen(fd, mode); 1410ceb092eSAneesh Kumar K.V if (!fp) { 1420ceb092eSAneesh Kumar K.V close(fd); 1430ceb092eSAneesh Kumar K.V } 1440ceb092eSAneesh Kumar K.V return fp; 1450ceb092eSAneesh Kumar K.V } 1460ceb092eSAneesh Kumar K.V 1472c30dd74SAneesh Kumar K.V #define ATTR_MAX 100 148f9aef99bSGreg Kurz static void local_mapped_file_attr(int dirfd, const char *name, 1492c30dd74SAneesh Kumar K.V struct stat *stbuf) 1502c30dd74SAneesh Kumar K.V { 1512c30dd74SAneesh Kumar K.V FILE *fp; 1522c30dd74SAneesh Kumar K.V char buf[ATTR_MAX]; 153f9aef99bSGreg Kurz int map_dirfd; 1542c30dd74SAneesh Kumar K.V 15581ffbf5aSGreg Kurz if (strcmp(name, ".")) { 15699f2cf4bSGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 157f9aef99bSGreg Kurz if (map_dirfd == -1) { 158f9aef99bSGreg Kurz return; 159f9aef99bSGreg Kurz } 160f9aef99bSGreg Kurz 161f9aef99bSGreg Kurz fp = local_fopenat(map_dirfd, name, "r"); 162f9aef99bSGreg Kurz close_preserve_errno(map_dirfd); 16381ffbf5aSGreg Kurz } else { 16481ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r"); 16581ffbf5aSGreg Kurz } 1662c30dd74SAneesh Kumar K.V if (!fp) { 1672c30dd74SAneesh Kumar K.V return; 1682c30dd74SAneesh Kumar K.V } 1692c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 1702c30dd74SAneesh Kumar K.V while (fgets(buf, ATTR_MAX, fp)) { 1712c30dd74SAneesh Kumar K.V if (!strncmp(buf, "virtfs.uid", 10)) { 1722c30dd74SAneesh Kumar K.V stbuf->st_uid = atoi(buf + 11); 1732c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.gid", 10)) { 1742c30dd74SAneesh Kumar K.V stbuf->st_gid = atoi(buf + 11); 1752c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.mode", 11)) { 1762c30dd74SAneesh Kumar K.V stbuf->st_mode = atoi(buf + 12); 1772c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.rdev", 11)) { 1782c30dd74SAneesh Kumar K.V stbuf->st_rdev = atoi(buf + 12); 1792c30dd74SAneesh Kumar K.V } 1802c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 1812c30dd74SAneesh Kumar K.V } 1822c30dd74SAneesh Kumar K.V fclose(fp); 1832c30dd74SAneesh Kumar K.V } 1842c30dd74SAneesh Kumar K.V 1852289be19SAneesh Kumar K.V static int local_lstat(FsContext *fs_ctx, V9fsPath *fs_path, struct stat *stbuf) 186131dcb25SAnthony Liguori { 187f9aef99bSGreg Kurz int err = -1; 188f9aef99bSGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 189f9aef99bSGreg Kurz char *name = g_path_get_basename(fs_path->data); 190f9aef99bSGreg Kurz int dirfd; 1912289be19SAneesh Kumar K.V 192f9aef99bSGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 193f9aef99bSGreg Kurz if (dirfd == -1) { 194f9aef99bSGreg Kurz goto out; 195f9aef99bSGreg Kurz } 196f9aef99bSGreg Kurz 197f9aef99bSGreg Kurz err = fstatat(dirfd, name, stbuf, AT_SYMLINK_NOFOLLOW); 1981237ad76SVenkateswararao Jujjuri (JV) if (err) { 1994fa4ce71SChen Gang goto err_out; 2001237ad76SVenkateswararao Jujjuri (JV) } 201b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 2021237ad76SVenkateswararao Jujjuri (JV) /* Actual credentials are part of extended attrs */ 2031237ad76SVenkateswararao Jujjuri (JV) uid_t tmp_uid; 2041237ad76SVenkateswararao Jujjuri (JV) gid_t tmp_gid; 2051237ad76SVenkateswararao Jujjuri (JV) mode_t tmp_mode; 2061237ad76SVenkateswararao Jujjuri (JV) dev_t tmp_dev; 207f9aef99bSGreg Kurz 208f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.uid", &tmp_uid, 209f9aef99bSGreg Kurz sizeof(uid_t)) > 0) { 210f8ad4a89SAneesh Kumar K.V stbuf->st_uid = le32_to_cpu(tmp_uid); 2111237ad76SVenkateswararao Jujjuri (JV) } 212f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.gid", &tmp_gid, 213f9aef99bSGreg Kurz sizeof(gid_t)) > 0) { 214f8ad4a89SAneesh Kumar K.V stbuf->st_gid = le32_to_cpu(tmp_gid); 2151237ad76SVenkateswararao Jujjuri (JV) } 216f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.mode", &tmp_mode, 217f9aef99bSGreg Kurz sizeof(mode_t)) > 0) { 218f8ad4a89SAneesh Kumar K.V stbuf->st_mode = le32_to_cpu(tmp_mode); 2191237ad76SVenkateswararao Jujjuri (JV) } 220f9aef99bSGreg Kurz if (fgetxattrat_nofollow(dirfd, name, "user.virtfs.rdev", &tmp_dev, 221f9aef99bSGreg Kurz sizeof(dev_t)) > 0) { 222f8ad4a89SAneesh Kumar K.V stbuf->st_rdev = le64_to_cpu(tmp_dev); 2231237ad76SVenkateswararao Jujjuri (JV) } 2242c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 225f9aef99bSGreg Kurz local_mapped_file_attr(dirfd, name, stbuf); 2261237ad76SVenkateswararao Jujjuri (JV) } 2274fa4ce71SChen Gang 2284fa4ce71SChen Gang err_out: 229f9aef99bSGreg Kurz close_preserve_errno(dirfd); 230f9aef99bSGreg Kurz out: 231f9aef99bSGreg Kurz g_free(name); 232f9aef99bSGreg Kurz g_free(dirpath); 2331237ad76SVenkateswararao Jujjuri (JV) return err; 234131dcb25SAnthony Liguori } 235131dcb25SAnthony Liguori 236e3187a45SGreg Kurz static int local_set_mapped_file_attrat(int dirfd, const char *name, 237e3187a45SGreg Kurz FsCred *credp) 2382c30dd74SAneesh Kumar K.V { 2392c30dd74SAneesh Kumar K.V FILE *fp; 240e3187a45SGreg Kurz int ret; 2412c30dd74SAneesh Kumar K.V char buf[ATTR_MAX]; 2422c30dd74SAneesh Kumar K.V int uid = -1, gid = -1, mode = -1, rdev = -1; 24381ffbf5aSGreg Kurz int map_dirfd = -1, map_fd; 24481ffbf5aSGreg Kurz bool is_root = !strcmp(name, "."); 2452c30dd74SAneesh Kumar K.V 24681ffbf5aSGreg Kurz if (is_root) { 24781ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "r"); 24881ffbf5aSGreg Kurz if (!fp) { 24981ffbf5aSGreg Kurz if (errno == ENOENT) { 25081ffbf5aSGreg Kurz goto update_map_file; 25181ffbf5aSGreg Kurz } else { 25281ffbf5aSGreg Kurz return -1; 25381ffbf5aSGreg Kurz } 25481ffbf5aSGreg Kurz } 25581ffbf5aSGreg Kurz } else { 256e3187a45SGreg Kurz ret = mkdirat(dirfd, VIRTFS_META_DIR, 0700); 257e3187a45SGreg Kurz if (ret < 0 && errno != EEXIST) { 258e3187a45SGreg Kurz return -1; 259e3187a45SGreg Kurz } 260e3187a45SGreg Kurz 261e3187a45SGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 262e3187a45SGreg Kurz if (map_dirfd == -1) { 263e3187a45SGreg Kurz return -1; 264e3187a45SGreg Kurz } 265e3187a45SGreg Kurz 266e3187a45SGreg Kurz fp = local_fopenat(map_dirfd, name, "r"); 2672c30dd74SAneesh Kumar K.V if (!fp) { 268e3187a45SGreg Kurz if (errno == ENOENT) { 269e3187a45SGreg Kurz goto update_map_file; 270e3187a45SGreg Kurz } else { 271e3187a45SGreg Kurz close_preserve_errno(map_dirfd); 272e3187a45SGreg Kurz return -1; 273e3187a45SGreg Kurz } 2742c30dd74SAneesh Kumar K.V } 27581ffbf5aSGreg Kurz } 2762c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 2772c30dd74SAneesh Kumar K.V while (fgets(buf, ATTR_MAX, fp)) { 2782c30dd74SAneesh Kumar K.V if (!strncmp(buf, "virtfs.uid", 10)) { 2792c30dd74SAneesh Kumar K.V uid = atoi(buf + 11); 2802c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.gid", 10)) { 2812c30dd74SAneesh Kumar K.V gid = atoi(buf + 11); 2822c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.mode", 11)) { 2832c30dd74SAneesh Kumar K.V mode = atoi(buf + 12); 2842c30dd74SAneesh Kumar K.V } else if (!strncmp(buf, "virtfs.rdev", 11)) { 2852c30dd74SAneesh Kumar K.V rdev = atoi(buf + 12); 2862c30dd74SAneesh Kumar K.V } 2872c30dd74SAneesh Kumar K.V memset(buf, 0, ATTR_MAX); 2882c30dd74SAneesh Kumar K.V } 2892c30dd74SAneesh Kumar K.V fclose(fp); 2902c30dd74SAneesh Kumar K.V 2912c30dd74SAneesh Kumar K.V update_map_file: 29281ffbf5aSGreg Kurz if (is_root) { 29381ffbf5aSGreg Kurz fp = local_fopenat(dirfd, VIRTFS_META_ROOT_FILE, "w"); 29481ffbf5aSGreg Kurz } else { 295e3187a45SGreg Kurz fp = local_fopenat(map_dirfd, name, "w"); 29681ffbf5aSGreg Kurz /* We can't go this far with map_dirfd not being a valid file descriptor 29781ffbf5aSGreg Kurz * but some versions of gcc aren't smart enough to see it. 29881ffbf5aSGreg Kurz */ 29981ffbf5aSGreg Kurz if (map_dirfd != -1) { 300e3187a45SGreg Kurz close_preserve_errno(map_dirfd); 30181ffbf5aSGreg Kurz } 30281ffbf5aSGreg Kurz } 3032c30dd74SAneesh Kumar K.V if (!fp) { 304e3187a45SGreg Kurz return -1; 3052c30dd74SAneesh Kumar K.V } 3062c30dd74SAneesh Kumar K.V 30781ffbf5aSGreg Kurz map_fd = fileno(fp); 30881ffbf5aSGreg Kurz assert(map_fd != -1); 30981ffbf5aSGreg Kurz ret = fchmod(map_fd, 0600); 31081ffbf5aSGreg Kurz assert(ret == 0); 31181ffbf5aSGreg Kurz 3122c30dd74SAneesh Kumar K.V if (credp->fc_uid != -1) { 3132c30dd74SAneesh Kumar K.V uid = credp->fc_uid; 3142c30dd74SAneesh Kumar K.V } 3152c30dd74SAneesh Kumar K.V if (credp->fc_gid != -1) { 3162c30dd74SAneesh Kumar K.V gid = credp->fc_gid; 3172c30dd74SAneesh Kumar K.V } 318230f1b31SKeno Fischer if (credp->fc_mode != (mode_t)-1) { 3192c30dd74SAneesh Kumar K.V mode = credp->fc_mode; 3202c30dd74SAneesh Kumar K.V } 3212c30dd74SAneesh Kumar K.V if (credp->fc_rdev != -1) { 3222c30dd74SAneesh Kumar K.V rdev = credp->fc_rdev; 3232c30dd74SAneesh Kumar K.V } 3242c30dd74SAneesh Kumar K.V 3252c30dd74SAneesh Kumar K.V if (uid != -1) { 3262c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.uid=%d\n", uid); 3272c30dd74SAneesh Kumar K.V } 3282c30dd74SAneesh Kumar K.V if (gid != -1) { 3292c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.gid=%d\n", gid); 3302c30dd74SAneesh Kumar K.V } 3312c30dd74SAneesh Kumar K.V if (mode != -1) { 3322c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.mode=%d\n", mode); 3332c30dd74SAneesh Kumar K.V } 3342c30dd74SAneesh Kumar K.V if (rdev != -1) { 3352c30dd74SAneesh Kumar K.V fprintf(fp, "virtfs.rdev=%d\n", rdev); 3362c30dd74SAneesh Kumar K.V } 3372c30dd74SAneesh Kumar K.V fclose(fp); 3382c30dd74SAneesh Kumar K.V 339e3187a45SGreg Kurz return 0; 340e3187a45SGreg Kurz } 341e3187a45SGreg Kurz 342e3187a45SGreg Kurz static int fchmodat_nofollow(int dirfd, const char *name, mode_t mode) 343e3187a45SGreg Kurz { 3444751fd53SGreg Kurz struct stat stbuf; 345e3187a45SGreg Kurz int fd, ret; 346e3187a45SGreg Kurz 347e3187a45SGreg Kurz /* FIXME: this should be handled with fchmodat(AT_SYMLINK_NOFOLLOW). 3484751fd53SGreg Kurz * Unfortunately, the linux kernel doesn't implement it yet. 349e3187a45SGreg Kurz */ 3504751fd53SGreg Kurz 3514751fd53SGreg Kurz /* First, we clear non-racing symlinks out of the way. */ 3524751fd53SGreg Kurz if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW)) { 3534751fd53SGreg Kurz return -1; 3544751fd53SGreg Kurz } 3554751fd53SGreg Kurz if (S_ISLNK(stbuf.st_mode)) { 3564751fd53SGreg Kurz errno = ELOOP; 3574751fd53SGreg Kurz return -1; 3584751fd53SGreg Kurz } 3594751fd53SGreg Kurz 360aa5e85a1SGreg Kurz fd = openat_file(dirfd, name, O_RDONLY | O_PATH_9P_UTIL | O_NOFOLLOW, 0); 3614751fd53SGreg Kurz #if O_PATH_9P_UTIL == 0 362aa5e85a1SGreg Kurz /* Fallback for systems that don't support O_PATH: we depend on the file 363aa5e85a1SGreg Kurz * being readable or writable. 364aa5e85a1SGreg Kurz */ 365e3187a45SGreg Kurz if (fd == -1) { 366e3187a45SGreg Kurz /* In case the file is writable-only and isn't a directory. */ 367e3187a45SGreg Kurz if (errno == EACCES) { 368e3187a45SGreg Kurz fd = openat_file(dirfd, name, O_WRONLY, 0); 369e3187a45SGreg Kurz } 370e3187a45SGreg Kurz if (fd == -1 && errno == EISDIR) { 371e3187a45SGreg Kurz errno = EACCES; 372e3187a45SGreg Kurz } 373e3187a45SGreg Kurz } 374e3187a45SGreg Kurz if (fd == -1) { 375e3187a45SGreg Kurz return -1; 376e3187a45SGreg Kurz } 377e3187a45SGreg Kurz ret = fchmod(fd, mode); 3784751fd53SGreg Kurz #else 379aa5e85a1SGreg Kurz /* Access modes are ignored when O_PATH is supported. If name is a symbolic 380aa5e85a1SGreg Kurz * link, O_PATH | O_NOFOLLOW causes openat(2) to return a file descriptor 381aa5e85a1SGreg Kurz * referring to the symbolic link. 382aa5e85a1SGreg Kurz */ 3834751fd53SGreg Kurz if (fd == -1) { 3844751fd53SGreg Kurz return -1; 3854751fd53SGreg Kurz } 3864751fd53SGreg Kurz 3874751fd53SGreg Kurz /* Now we handle racing symlinks. */ 3884751fd53SGreg Kurz ret = fstat(fd, &stbuf); 3894751fd53SGreg Kurz if (!ret) { 3904751fd53SGreg Kurz if (S_ISLNK(stbuf.st_mode)) { 3914751fd53SGreg Kurz errno = ELOOP; 3924751fd53SGreg Kurz ret = -1; 3934751fd53SGreg Kurz } else { 3944751fd53SGreg Kurz char *proc_path = g_strdup_printf("/proc/self/fd/%d", fd); 3954751fd53SGreg Kurz ret = chmod(proc_path, mode); 3964751fd53SGreg Kurz g_free(proc_path); 3974751fd53SGreg Kurz } 3984751fd53SGreg Kurz } 3994751fd53SGreg Kurz #endif 400e3187a45SGreg Kurz close_preserve_errno(fd); 4012c30dd74SAneesh Kumar K.V return ret; 4022c30dd74SAneesh Kumar K.V } 4032c30dd74SAneesh Kumar K.V 404e3187a45SGreg Kurz static int local_set_xattrat(int dirfd, const char *path, FsCred *credp) 405131dcb25SAnthony Liguori { 406758e8e38SVenkateswararao Jujjuri (JV) int err; 4072289be19SAneesh Kumar K.V 408758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_uid != -1) { 409f8ad4a89SAneesh Kumar K.V uint32_t tmp_uid = cpu_to_le32(credp->fc_uid); 410e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.uid", &tmp_uid, 411e3187a45SGreg Kurz sizeof(uid_t), 0); 412758e8e38SVenkateswararao Jujjuri (JV) if (err) { 413758e8e38SVenkateswararao Jujjuri (JV) return err; 414131dcb25SAnthony Liguori } 415131dcb25SAnthony Liguori } 416758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_gid != -1) { 417f8ad4a89SAneesh Kumar K.V uint32_t tmp_gid = cpu_to_le32(credp->fc_gid); 418e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.gid", &tmp_gid, 419e3187a45SGreg Kurz sizeof(gid_t), 0); 420758e8e38SVenkateswararao Jujjuri (JV) if (err) { 421758e8e38SVenkateswararao Jujjuri (JV) return err; 422131dcb25SAnthony Liguori } 423131dcb25SAnthony Liguori } 424230f1b31SKeno Fischer if (credp->fc_mode != (mode_t)-1) { 425f8ad4a89SAneesh Kumar K.V uint32_t tmp_mode = cpu_to_le32(credp->fc_mode); 426e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.mode", &tmp_mode, 427e3187a45SGreg Kurz sizeof(mode_t), 0); 428758e8e38SVenkateswararao Jujjuri (JV) if (err) { 429758e8e38SVenkateswararao Jujjuri (JV) return err; 430131dcb25SAnthony Liguori } 431131dcb25SAnthony Liguori } 432758e8e38SVenkateswararao Jujjuri (JV) if (credp->fc_rdev != -1) { 433f8ad4a89SAneesh Kumar K.V uint64_t tmp_rdev = cpu_to_le64(credp->fc_rdev); 434e3187a45SGreg Kurz err = fsetxattrat_nofollow(dirfd, path, "user.virtfs.rdev", &tmp_rdev, 435e3187a45SGreg Kurz sizeof(dev_t), 0); 436758e8e38SVenkateswararao Jujjuri (JV) if (err) { 437758e8e38SVenkateswararao Jujjuri (JV) return err; 438131dcb25SAnthony Liguori } 439758e8e38SVenkateswararao Jujjuri (JV) } 440131dcb25SAnthony Liguori return 0; 441131dcb25SAnthony Liguori } 442131dcb25SAnthony Liguori 443d815e721SGreg Kurz static int local_set_cred_passthrough(FsContext *fs_ctx, int dirfd, 444d815e721SGreg Kurz const char *name, FsCred *credp) 4454750a96fSVenkateswararao Jujjuri (JV) { 446d815e721SGreg Kurz if (fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 447b314f6a0SGreg Kurz AT_SYMLINK_NOFOLLOW) < 0) { 44812848bfcSAneesh Kumar K.V /* 44912848bfcSAneesh Kumar K.V * If we fail to change ownership and if we are 45012848bfcSAneesh Kumar K.V * using security model none. Ignore the error 45112848bfcSAneesh Kumar K.V */ 452b97400caSAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) { 4534fa4ce71SChen Gang return -1; 4544750a96fSVenkateswararao Jujjuri (JV) } 455d815e721SGreg Kurz } 456d815e721SGreg Kurz 457d815e721SGreg Kurz return fchmodat_nofollow(dirfd, name, credp->fc_mode & 07777); 458d815e721SGreg Kurz } 4594750a96fSVenkateswararao Jujjuri (JV) 4602289be19SAneesh Kumar K.V static ssize_t local_readlink(FsContext *fs_ctx, V9fsPath *fs_path, 461131dcb25SAnthony Liguori char *buf, size_t bufsz) 462131dcb25SAnthony Liguori { 463879c2813SVenkateswararao Jujjuri (JV) ssize_t tsize = -1; 4642289be19SAneesh Kumar K.V 4652c30dd74SAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SM_MAPPED) || 4662c30dd74SAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE)) { 467879c2813SVenkateswararao Jujjuri (JV) int fd; 468bec1e954SGreg Kurz 469bec1e954SGreg Kurz fd = local_open_nofollow(fs_ctx, fs_path->data, O_RDONLY, 0); 470879c2813SVenkateswararao Jujjuri (JV) if (fd == -1) { 471879c2813SVenkateswararao Jujjuri (JV) return -1; 472879c2813SVenkateswararao Jujjuri (JV) } 473879c2813SVenkateswararao Jujjuri (JV) do { 474879c2813SVenkateswararao Jujjuri (JV) tsize = read(fd, (void *)buf, bufsz); 475879c2813SVenkateswararao Jujjuri (JV) } while (tsize == -1 && errno == EINTR); 476bec1e954SGreg Kurz close_preserve_errno(fd); 477b97400caSAneesh Kumar K.V } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 478b97400caSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 479bec1e954SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 480bec1e954SGreg Kurz char *name = g_path_get_basename(fs_path->data); 481bec1e954SGreg Kurz int dirfd; 482bec1e954SGreg Kurz 483bec1e954SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 484bec1e954SGreg Kurz if (dirfd == -1) { 485bec1e954SGreg Kurz goto out; 486bec1e954SGreg Kurz } 487bec1e954SGreg Kurz 488bec1e954SGreg Kurz tsize = readlinkat(dirfd, name, buf, bufsz); 489bec1e954SGreg Kurz close_preserve_errno(dirfd); 490bec1e954SGreg Kurz out: 491bec1e954SGreg Kurz g_free(name); 492bec1e954SGreg Kurz g_free(dirpath); 493879c2813SVenkateswararao Jujjuri (JV) } 494879c2813SVenkateswararao Jujjuri (JV) return tsize; 495131dcb25SAnthony Liguori } 496131dcb25SAnthony Liguori 497cc720ddbSAneesh Kumar K.V static int local_close(FsContext *ctx, V9fsFidOpenState *fs) 498131dcb25SAnthony Liguori { 499cc720ddbSAneesh Kumar K.V return close(fs->fd); 500131dcb25SAnthony Liguori } 501131dcb25SAnthony Liguori 502cc720ddbSAneesh Kumar K.V static int local_closedir(FsContext *ctx, V9fsFidOpenState *fs) 503131dcb25SAnthony Liguori { 504f314ea4eSGreg Kurz return closedir(fs->dir.stream); 505131dcb25SAnthony Liguori } 5069f107513SAnthony Liguori 507cc720ddbSAneesh Kumar K.V static int local_open(FsContext *ctx, V9fsPath *fs_path, 508cc720ddbSAneesh Kumar K.V int flags, V9fsFidOpenState *fs) 509a6568fe2SAnthony Liguori { 51021328e1eSGreg Kurz int fd; 5112289be19SAneesh Kumar K.V 512996a0d76SGreg Kurz fd = local_open_nofollow(ctx, fs_path->data, flags, 0); 51321328e1eSGreg Kurz if (fd == -1) { 51421328e1eSGreg Kurz return -1; 51521328e1eSGreg Kurz } 51621328e1eSGreg Kurz fs->fd = fd; 517cc720ddbSAneesh Kumar K.V return fs->fd; 518a6568fe2SAnthony Liguori } 519a6568fe2SAnthony Liguori 520cc720ddbSAneesh Kumar K.V static int local_opendir(FsContext *ctx, 521cc720ddbSAneesh Kumar K.V V9fsPath *fs_path, V9fsFidOpenState *fs) 522a6568fe2SAnthony Liguori { 523996a0d76SGreg Kurz int dirfd; 52421328e1eSGreg Kurz DIR *stream; 5252289be19SAneesh Kumar K.V 526996a0d76SGreg Kurz dirfd = local_opendir_nofollow(ctx, fs_path->data); 527996a0d76SGreg Kurz if (dirfd == -1) { 528cc720ddbSAneesh Kumar K.V return -1; 529cc720ddbSAneesh Kumar K.V } 530996a0d76SGreg Kurz 531996a0d76SGreg Kurz stream = fdopendir(dirfd); 53221328e1eSGreg Kurz if (!stream) { 533faab207fSGreg Kurz close(dirfd); 534cc720ddbSAneesh Kumar K.V return -1; 535cc720ddbSAneesh Kumar K.V } 53621328e1eSGreg Kurz fs->dir.stream = stream; 537cc720ddbSAneesh Kumar K.V return 0; 538a6568fe2SAnthony Liguori } 539a6568fe2SAnthony Liguori 540cc720ddbSAneesh Kumar K.V static void local_rewinddir(FsContext *ctx, V9fsFidOpenState *fs) 541a9231555SAnthony Liguori { 542f314ea4eSGreg Kurz rewinddir(fs->dir.stream); 543a9231555SAnthony Liguori } 544a9231555SAnthony Liguori 545cc720ddbSAneesh Kumar K.V static off_t local_telldir(FsContext *ctx, V9fsFidOpenState *fs) 546a9231555SAnthony Liguori { 547f314ea4eSGreg Kurz return telldir(fs->dir.stream); 548a9231555SAnthony Liguori } 549a9231555SAnthony Liguori 5507a95434eSGreg Kurz static bool local_is_mapped_file_metadata(FsContext *fs_ctx, const char *name) 5517a95434eSGreg Kurz { 55281ffbf5aSGreg Kurz return 55381ffbf5aSGreg Kurz !strcmp(name, VIRTFS_META_DIR) || !strcmp(name, VIRTFS_META_ROOT_FILE); 5547a95434eSGreg Kurz } 5557a95434eSGreg Kurz 556635324e8SGreg Kurz static struct dirent *local_readdir(FsContext *ctx, V9fsFidOpenState *fs) 557a9231555SAnthony Liguori { 558635324e8SGreg Kurz struct dirent *entry; 5592c30dd74SAneesh Kumar K.V 5602c30dd74SAneesh Kumar K.V again: 561635324e8SGreg Kurz entry = readdir(fs->dir.stream); 562635324e8SGreg Kurz if (!entry) { 563635324e8SGreg Kurz return NULL; 564635324e8SGreg Kurz } 5656b3b279bSKeno Fischer #ifdef CONFIG_DARWIN 5666b3b279bSKeno Fischer int off; 5676b3b279bSKeno Fischer off = telldir(fs->dir.stream); 5686b3b279bSKeno Fischer /* If telldir fails, fail the entire readdir call */ 5696b3b279bSKeno Fischer if (off < 0) { 5706b3b279bSKeno Fischer return NULL; 5716b3b279bSKeno Fischer } 5726b3b279bSKeno Fischer entry->d_seekoff = off; 5736b3b279bSKeno Fischer #endif 574635324e8SGreg Kurz 575840a1bf2SBastian Blank if (ctx->export_flags & V9FS_SM_MAPPED) { 576840a1bf2SBastian Blank entry->d_type = DT_UNKNOWN; 577840a1bf2SBastian Blank } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 5787a95434eSGreg Kurz if (local_is_mapped_file_metadata(ctx, entry->d_name)) { 57981ffbf5aSGreg Kurz /* skip the meta data */ 5802c30dd74SAneesh Kumar K.V goto again; 5812c30dd74SAneesh Kumar K.V } 582840a1bf2SBastian Blank entry->d_type = DT_UNKNOWN; 5832c30dd74SAneesh Kumar K.V } 584635324e8SGreg Kurz 585635324e8SGreg Kurz return entry; 586a9231555SAnthony Liguori } 587a9231555SAnthony Liguori 588cc720ddbSAneesh Kumar K.V static void local_seekdir(FsContext *ctx, V9fsFidOpenState *fs, off_t off) 589a9231555SAnthony Liguori { 590f314ea4eSGreg Kurz seekdir(fs->dir.stream, off); 591a9231555SAnthony Liguori } 592a9231555SAnthony Liguori 593cc720ddbSAneesh Kumar K.V static ssize_t local_preadv(FsContext *ctx, V9fsFidOpenState *fs, 594cc720ddbSAneesh Kumar K.V const struct iovec *iov, 59556d15a53SSanchit Garg int iovcnt, off_t offset) 596a9231555SAnthony Liguori { 59756d15a53SSanchit Garg #ifdef CONFIG_PREADV 598cc720ddbSAneesh Kumar K.V return preadv(fs->fd, iov, iovcnt, offset); 59956d15a53SSanchit Garg #else 600cc720ddbSAneesh Kumar K.V int err = lseek(fs->fd, offset, SEEK_SET); 60156d15a53SSanchit Garg if (err == -1) { 60256d15a53SSanchit Garg return err; 60356d15a53SSanchit Garg } else { 604cc720ddbSAneesh Kumar K.V return readv(fs->fd, iov, iovcnt); 605a9231555SAnthony Liguori } 60656d15a53SSanchit Garg #endif 607a9231555SAnthony Liguori } 608a9231555SAnthony Liguori 609cc720ddbSAneesh Kumar K.V static ssize_t local_pwritev(FsContext *ctx, V9fsFidOpenState *fs, 610cc720ddbSAneesh Kumar K.V const struct iovec *iov, 61156d15a53SSanchit Garg int iovcnt, off_t offset) 6128449360cSAnthony Liguori { 6136fe76accSGreg Kurz ssize_t ret; 61456d15a53SSanchit Garg #ifdef CONFIG_PREADV 615cc720ddbSAneesh Kumar K.V ret = pwritev(fs->fd, iov, iovcnt, offset); 61656d15a53SSanchit Garg #else 617cc720ddbSAneesh Kumar K.V int err = lseek(fs->fd, offset, SEEK_SET); 61856d15a53SSanchit Garg if (err == -1) { 61956d15a53SSanchit Garg return err; 62056d15a53SSanchit Garg } else { 621cc720ddbSAneesh Kumar K.V ret = writev(fs->fd, iov, iovcnt); 6228449360cSAnthony Liguori } 62356d15a53SSanchit Garg #endif 624d3ab98e6SAneesh Kumar K.V #ifdef CONFIG_SYNC_FILE_RANGE 625d3ab98e6SAneesh Kumar K.V if (ret > 0 && ctx->export_flags & V9FS_IMMEDIATE_WRITEOUT) { 626d3ab98e6SAneesh Kumar K.V /* 627d3ab98e6SAneesh Kumar K.V * Initiate a writeback. This is not a data integrity sync. 628d3ab98e6SAneesh Kumar K.V * We want to ensure that we don't leave dirty pages in the cache 629d3ab98e6SAneesh Kumar K.V * after write when writeout=immediate is sepcified. 630d3ab98e6SAneesh Kumar K.V */ 631cc720ddbSAneesh Kumar K.V sync_file_range(fs->fd, offset, ret, 632d3ab98e6SAneesh Kumar K.V SYNC_FILE_RANGE_WAIT_BEFORE | SYNC_FILE_RANGE_WRITE); 633d3ab98e6SAneesh Kumar K.V } 634d3ab98e6SAneesh Kumar K.V #endif 635d3ab98e6SAneesh Kumar K.V return ret; 63656d15a53SSanchit Garg } 6378449360cSAnthony Liguori 6382289be19SAneesh Kumar K.V static int local_chmod(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) 639c494dd6fSAnthony Liguori { 640e3187a45SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 641e3187a45SGreg Kurz char *name = g_path_get_basename(fs_path->data); 6424fa4ce71SChen Gang int ret = -1; 643e3187a45SGreg Kurz int dirfd; 644e3187a45SGreg Kurz 645e3187a45SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 646e3187a45SGreg Kurz if (dirfd == -1) { 647e3187a45SGreg Kurz goto out; 648e3187a45SGreg Kurz } 6492289be19SAneesh Kumar K.V 650b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 651e3187a45SGreg Kurz ret = local_set_xattrat(dirfd, name, credp); 6522c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 653e3187a45SGreg Kurz ret = local_set_mapped_file_attrat(dirfd, name, credp); 654e3187a45SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 655e3187a45SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 656e3187a45SGreg Kurz ret = fchmodat_nofollow(dirfd, name, credp->fc_mode); 657e95ead32SVenkateswararao Jujjuri (JV) } 658e3187a45SGreg Kurz close_preserve_errno(dirfd); 659e3187a45SGreg Kurz 660e3187a45SGreg Kurz out: 661e3187a45SGreg Kurz g_free(dirpath); 662e3187a45SGreg Kurz g_free(name); 6634fa4ce71SChen Gang return ret; 664c494dd6fSAnthony Liguori } 665c494dd6fSAnthony Liguori 6662289be19SAneesh Kumar K.V static int local_mknod(FsContext *fs_ctx, V9fsPath *dir_path, 6672289be19SAneesh Kumar K.V const char *name, FsCred *credp) 668c494dd6fSAnthony Liguori { 6691c293312SVenkateswararao Jujjuri (JV) int err = -1; 670d815e721SGreg Kurz int dirfd; 6711c293312SVenkateswararao Jujjuri (JV) 6727a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 6737a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 6747a95434eSGreg Kurz errno = EINVAL; 6757a95434eSGreg Kurz return -1; 6767a95434eSGreg Kurz } 6777a95434eSGreg Kurz 678d815e721SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 679d815e721SGreg Kurz if (dirfd == -1) { 680d815e721SGreg Kurz return -1; 681d815e721SGreg Kurz } 6822289be19SAneesh Kumar K.V 683d815e721SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 684d815e721SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 685b96feb2cSTobias Schramm err = mknodat(dirfd, name, fs_ctx->fmode | S_IFREG, 0); 686d815e721SGreg Kurz if (err == -1) { 687d815e721SGreg Kurz goto out; 688d815e721SGreg Kurz } 689d815e721SGreg Kurz 690b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 691d815e721SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 692d815e721SGreg Kurz } else { 693d815e721SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 6941c293312SVenkateswararao Jujjuri (JV) } 6951c293312SVenkateswararao Jujjuri (JV) if (err == -1) { 6961c293312SVenkateswararao Jujjuri (JV) goto err_end; 6971c293312SVenkateswararao Jujjuri (JV) } 698d815e721SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 699d815e721SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 700d815e721SGreg Kurz err = mknodat(dirfd, name, credp->fc_mode, credp->fc_rdev); 7012c30dd74SAneesh Kumar K.V if (err == -1) { 7022c30dd74SAneesh Kumar K.V goto out; 7032c30dd74SAneesh Kumar K.V } 704d815e721SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 7052c30dd74SAneesh Kumar K.V if (err == -1) { 7061c293312SVenkateswararao Jujjuri (JV) goto err_end; 7071c293312SVenkateswararao Jujjuri (JV) } 7081c293312SVenkateswararao Jujjuri (JV) } 7092289be19SAneesh Kumar K.V goto out; 7101c293312SVenkateswararao Jujjuri (JV) 7111c293312SVenkateswararao Jujjuri (JV) err_end: 712d815e721SGreg Kurz unlinkat_preserve_errno(dirfd, name, 0); 7132289be19SAneesh Kumar K.V out: 714d815e721SGreg Kurz close_preserve_errno(dirfd); 7151c293312SVenkateswararao Jujjuri (JV) return err; 716c494dd6fSAnthony Liguori } 717c494dd6fSAnthony Liguori 7182289be19SAneesh Kumar K.V static int local_mkdir(FsContext *fs_ctx, V9fsPath *dir_path, 7192289be19SAneesh Kumar K.V const char *name, FsCred *credp) 720c494dd6fSAnthony Liguori { 72100ec5c37SVenkateswararao Jujjuri (JV) int err = -1; 7223f3a1699SGreg Kurz int dirfd; 72300ec5c37SVenkateswararao Jujjuri (JV) 7247a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 7257a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 7267a95434eSGreg Kurz errno = EINVAL; 7277a95434eSGreg Kurz return -1; 7287a95434eSGreg Kurz } 7297a95434eSGreg Kurz 7303f3a1699SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 7313f3a1699SGreg Kurz if (dirfd == -1) { 7323f3a1699SGreg Kurz return -1; 7333f3a1699SGreg Kurz } 7342289be19SAneesh Kumar K.V 7353f3a1699SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 7363f3a1699SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 737b96feb2cSTobias Schramm err = mkdirat(dirfd, name, fs_ctx->dmode); 7383f3a1699SGreg Kurz if (err == -1) { 7393f3a1699SGreg Kurz goto out; 7403f3a1699SGreg Kurz } 7413f3a1699SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFDIR; 7423f3a1699SGreg Kurz 743b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 7443f3a1699SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 7453f3a1699SGreg Kurz } else { 7463f3a1699SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 74700ec5c37SVenkateswararao Jujjuri (JV) } 74800ec5c37SVenkateswararao Jujjuri (JV) if (err == -1) { 74900ec5c37SVenkateswararao Jujjuri (JV) goto err_end; 75000ec5c37SVenkateswararao Jujjuri (JV) } 7513f3a1699SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 7523f3a1699SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 7533f3a1699SGreg Kurz err = mkdirat(dirfd, name, credp->fc_mode); 7542c30dd74SAneesh Kumar K.V if (err == -1) { 7552c30dd74SAneesh Kumar K.V goto out; 7562c30dd74SAneesh Kumar K.V } 7573f3a1699SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 7582c30dd74SAneesh Kumar K.V if (err == -1) { 75900ec5c37SVenkateswararao Jujjuri (JV) goto err_end; 76000ec5c37SVenkateswararao Jujjuri (JV) } 76100ec5c37SVenkateswararao Jujjuri (JV) } 7622289be19SAneesh Kumar K.V goto out; 76300ec5c37SVenkateswararao Jujjuri (JV) 76400ec5c37SVenkateswararao Jujjuri (JV) err_end: 7653f3a1699SGreg Kurz unlinkat_preserve_errno(dirfd, name, AT_REMOVEDIR); 7662289be19SAneesh Kumar K.V out: 7673f3a1699SGreg Kurz close_preserve_errno(dirfd); 76800ec5c37SVenkateswararao Jujjuri (JV) return err; 769c494dd6fSAnthony Liguori } 770c494dd6fSAnthony Liguori 7718b888272SAneesh Kumar K.V static int local_fstat(FsContext *fs_ctx, int fid_type, 772cc720ddbSAneesh Kumar K.V V9fsFidOpenState *fs, struct stat *stbuf) 773c494dd6fSAnthony Liguori { 7748b888272SAneesh Kumar K.V int err, fd; 7758b888272SAneesh Kumar K.V 7768b888272SAneesh Kumar K.V if (fid_type == P9_FID_DIR) { 777f314ea4eSGreg Kurz fd = dirfd(fs->dir.stream); 7788b888272SAneesh Kumar K.V } else { 7798b888272SAneesh Kumar K.V fd = fs->fd; 7808b888272SAneesh Kumar K.V } 7818b888272SAneesh Kumar K.V 7828b888272SAneesh Kumar K.V err = fstat(fd, stbuf); 7831237ad76SVenkateswararao Jujjuri (JV) if (err) { 7841237ad76SVenkateswararao Jujjuri (JV) return err; 7851237ad76SVenkateswararao Jujjuri (JV) } 786b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 7871237ad76SVenkateswararao Jujjuri (JV) /* Actual credentials are part of extended attrs */ 7881237ad76SVenkateswararao Jujjuri (JV) uid_t tmp_uid; 7891237ad76SVenkateswararao Jujjuri (JV) gid_t tmp_gid; 7901237ad76SVenkateswararao Jujjuri (JV) mode_t tmp_mode; 7911237ad76SVenkateswararao Jujjuri (JV) dev_t tmp_dev; 7921237ad76SVenkateswararao Jujjuri (JV) 793*b5989326SKeno Fischer if (qemu_fgetxattr(fd, "user.virtfs.uid", 794*b5989326SKeno Fischer &tmp_uid, sizeof(uid_t)) > 0) { 795f8ad4a89SAneesh Kumar K.V stbuf->st_uid = le32_to_cpu(tmp_uid); 7961237ad76SVenkateswararao Jujjuri (JV) } 797*b5989326SKeno Fischer if (qemu_fgetxattr(fd, "user.virtfs.gid", 798*b5989326SKeno Fischer &tmp_gid, sizeof(gid_t)) > 0) { 799f8ad4a89SAneesh Kumar K.V stbuf->st_gid = le32_to_cpu(tmp_gid); 8001237ad76SVenkateswararao Jujjuri (JV) } 801*b5989326SKeno Fischer if (qemu_fgetxattr(fd, "user.virtfs.mode", 802*b5989326SKeno Fischer &tmp_mode, sizeof(mode_t)) > 0) { 803f8ad4a89SAneesh Kumar K.V stbuf->st_mode = le32_to_cpu(tmp_mode); 8041237ad76SVenkateswararao Jujjuri (JV) } 805*b5989326SKeno Fischer if (qemu_fgetxattr(fd, "user.virtfs.rdev", 806*b5989326SKeno Fischer &tmp_dev, sizeof(dev_t)) > 0) { 807f8ad4a89SAneesh Kumar K.V stbuf->st_rdev = le64_to_cpu(tmp_dev); 8081237ad76SVenkateswararao Jujjuri (JV) } 8092c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 8102c30dd74SAneesh Kumar K.V errno = EOPNOTSUPP; 8112c30dd74SAneesh Kumar K.V return -1; 8121237ad76SVenkateswararao Jujjuri (JV) } 8131237ad76SVenkateswararao Jujjuri (JV) return err; 814c494dd6fSAnthony Liguori } 815c494dd6fSAnthony Liguori 8162289be19SAneesh Kumar K.V static int local_open2(FsContext *fs_ctx, V9fsPath *dir_path, const char *name, 817cc720ddbSAneesh Kumar K.V int flags, FsCred *credp, V9fsFidOpenState *fs) 818c494dd6fSAnthony Liguori { 8194750a96fSVenkateswararao Jujjuri (JV) int fd = -1; 8204750a96fSVenkateswararao Jujjuri (JV) int err = -1; 821a565fea5SGreg Kurz int dirfd; 8224750a96fSVenkateswararao Jujjuri (JV) 8237a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 8247a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 8257a95434eSGreg Kurz errno = EINVAL; 8267a95434eSGreg Kurz return -1; 8277a95434eSGreg Kurz } 8287a95434eSGreg Kurz 8290ceb092eSAneesh Kumar K.V /* 8300ceb092eSAneesh Kumar K.V * Mark all the open to not follow symlinks 8310ceb092eSAneesh Kumar K.V */ 8320ceb092eSAneesh Kumar K.V flags |= O_NOFOLLOW; 8330ceb092eSAneesh Kumar K.V 834a565fea5SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 835a565fea5SGreg Kurz if (dirfd == -1) { 836a565fea5SGreg Kurz return -1; 837a565fea5SGreg Kurz } 8382289be19SAneesh Kumar K.V 8394750a96fSVenkateswararao Jujjuri (JV) /* Determine the security model */ 840a565fea5SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 841a565fea5SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 842b96feb2cSTobias Schramm fd = openat_file(dirfd, name, flags, fs_ctx->fmode); 843a565fea5SGreg Kurz if (fd == -1) { 844a565fea5SGreg Kurz goto out; 845a565fea5SGreg Kurz } 846a565fea5SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFREG; 847b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 8484750a96fSVenkateswararao Jujjuri (JV) /* Set cleint credentials in xattr */ 849a565fea5SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 850a565fea5SGreg Kurz } else { 851a565fea5SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 8524750a96fSVenkateswararao Jujjuri (JV) } 8532c30dd74SAneesh Kumar K.V if (err == -1) { 8542c30dd74SAneesh Kumar K.V goto err_end; 8552c30dd74SAneesh Kumar K.V } 856b97400caSAneesh Kumar K.V } else if ((fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 857b97400caSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 858a565fea5SGreg Kurz fd = openat_file(dirfd, name, flags, credp->fc_mode); 8594750a96fSVenkateswararao Jujjuri (JV) if (fd == -1) { 8602289be19SAneesh Kumar K.V goto out; 8614750a96fSVenkateswararao Jujjuri (JV) } 862a565fea5SGreg Kurz err = local_set_cred_passthrough(fs_ctx, dirfd, name, credp); 8634750a96fSVenkateswararao Jujjuri (JV) if (err == -1) { 8644750a96fSVenkateswararao Jujjuri (JV) goto err_end; 8654750a96fSVenkateswararao Jujjuri (JV) } 8664750a96fSVenkateswararao Jujjuri (JV) } 8672289be19SAneesh Kumar K.V err = fd; 868cc720ddbSAneesh Kumar K.V fs->fd = fd; 8692289be19SAneesh Kumar K.V goto out; 8704750a96fSVenkateswararao Jujjuri (JV) 8714750a96fSVenkateswararao Jujjuri (JV) err_end: 872a565fea5SGreg Kurz unlinkat_preserve_errno(dirfd, name, 873a565fea5SGreg Kurz flags & O_DIRECTORY ? AT_REMOVEDIR : 0); 874a565fea5SGreg Kurz close_preserve_errno(fd); 8752289be19SAneesh Kumar K.V out: 876a565fea5SGreg Kurz close_preserve_errno(dirfd); 8774750a96fSVenkateswararao Jujjuri (JV) return err; 878c494dd6fSAnthony Liguori } 879c494dd6fSAnthony Liguori 880758e8e38SVenkateswararao Jujjuri (JV) 881879c2813SVenkateswararao Jujjuri (JV) static int local_symlink(FsContext *fs_ctx, const char *oldpath, 8822289be19SAneesh Kumar K.V V9fsPath *dir_path, const char *name, FsCred *credp) 883c494dd6fSAnthony Liguori { 884879c2813SVenkateswararao Jujjuri (JV) int err = -1; 88538771613SGreg Kurz int dirfd; 886879c2813SVenkateswararao Jujjuri (JV) 8877a95434eSGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE && 8887a95434eSGreg Kurz local_is_mapped_file_metadata(fs_ctx, name)) { 8897a95434eSGreg Kurz errno = EINVAL; 8907a95434eSGreg Kurz return -1; 8917a95434eSGreg Kurz } 8927a95434eSGreg Kurz 89338771613SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dir_path->data); 89438771613SGreg Kurz if (dirfd == -1) { 89538771613SGreg Kurz return -1; 89638771613SGreg Kurz } 8972289be19SAneesh Kumar K.V 898879c2813SVenkateswararao Jujjuri (JV) /* Determine the security model */ 89938771613SGreg Kurz if (fs_ctx->export_flags & V9FS_SM_MAPPED || 90038771613SGreg Kurz fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 90138771613SGreg Kurz int fd; 90238771613SGreg Kurz ssize_t oldpath_size, write_size; 90338771613SGreg Kurz 90438771613SGreg Kurz fd = openat_file(dirfd, name, O_CREAT | O_EXCL | O_RDWR, 905b96feb2cSTobias Schramm fs_ctx->fmode); 90638771613SGreg Kurz if (fd == -1) { 90738771613SGreg Kurz goto out; 90838771613SGreg Kurz } 90938771613SGreg Kurz /* Write the oldpath (target) to the file. */ 91038771613SGreg Kurz oldpath_size = strlen(oldpath); 91138771613SGreg Kurz do { 91238771613SGreg Kurz write_size = write(fd, (void *)oldpath, oldpath_size); 91338771613SGreg Kurz } while (write_size == -1 && errno == EINTR); 91438771613SGreg Kurz close_preserve_errno(fd); 91538771613SGreg Kurz 91638771613SGreg Kurz if (write_size != oldpath_size) { 91738771613SGreg Kurz goto err_end; 91838771613SGreg Kurz } 91938771613SGreg Kurz /* Set cleint credentials in symlink's xattr */ 92038771613SGreg Kurz credp->fc_mode = credp->fc_mode | S_IFLNK; 92138771613SGreg Kurz 922b97400caSAneesh Kumar K.V if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 92338771613SGreg Kurz err = local_set_xattrat(dirfd, name, credp); 92438771613SGreg Kurz } else { 92538771613SGreg Kurz err = local_set_mapped_file_attrat(dirfd, name, credp); 926879c2813SVenkateswararao Jujjuri (JV) } 927879c2813SVenkateswararao Jujjuri (JV) if (err == -1) { 928879c2813SVenkateswararao Jujjuri (JV) goto err_end; 929879c2813SVenkateswararao Jujjuri (JV) } 93038771613SGreg Kurz } else if (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH || 93138771613SGreg Kurz fs_ctx->export_flags & V9FS_SM_NONE) { 93238771613SGreg Kurz err = symlinkat(oldpath, dirfd, name); 933879c2813SVenkateswararao Jujjuri (JV) if (err) { 9342289be19SAneesh Kumar K.V goto out; 935879c2813SVenkateswararao Jujjuri (JV) } 93638771613SGreg Kurz err = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 93738771613SGreg Kurz AT_SYMLINK_NOFOLLOW); 938879c2813SVenkateswararao Jujjuri (JV) if (err == -1) { 93912848bfcSAneesh Kumar K.V /* 94012848bfcSAneesh Kumar K.V * If we fail to change ownership and if we are 94112848bfcSAneesh Kumar K.V * using security model none. Ignore the error 94212848bfcSAneesh Kumar K.V */ 943b97400caSAneesh Kumar K.V if ((fs_ctx->export_flags & V9FS_SEC_MASK) != V9FS_SM_NONE) { 944879c2813SVenkateswararao Jujjuri (JV) goto err_end; 94538771613SGreg Kurz } else { 94612848bfcSAneesh Kumar K.V err = 0; 947879c2813SVenkateswararao Jujjuri (JV) } 948879c2813SVenkateswararao Jujjuri (JV) } 94938771613SGreg Kurz } 9502289be19SAneesh Kumar K.V goto out; 951879c2813SVenkateswararao Jujjuri (JV) 952879c2813SVenkateswararao Jujjuri (JV) err_end: 95338771613SGreg Kurz unlinkat_preserve_errno(dirfd, name, 0); 9542289be19SAneesh Kumar K.V out: 95538771613SGreg Kurz close_preserve_errno(dirfd); 956879c2813SVenkateswararao Jujjuri (JV) return err; 957c494dd6fSAnthony Liguori } 958c494dd6fSAnthony Liguori 9592289be19SAneesh Kumar K.V static int local_link(FsContext *ctx, V9fsPath *oldpath, 9602289be19SAneesh Kumar K.V V9fsPath *dirpath, const char *name) 961c494dd6fSAnthony Liguori { 962ad0b46e6SGreg Kurz char *odirpath = g_path_get_dirname(oldpath->data); 963ad0b46e6SGreg Kurz char *oname = g_path_get_basename(oldpath->data); 964ad0b46e6SGreg Kurz int ret = -1; 965ad0b46e6SGreg Kurz int odirfd, ndirfd; 966c494dd6fSAnthony Liguori 9677a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 9687a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 9697a95434eSGreg Kurz errno = EINVAL; 970841b8d09SJiajun Chen goto out; 9717a95434eSGreg Kurz } 9727a95434eSGreg Kurz 973ad0b46e6SGreg Kurz odirfd = local_opendir_nofollow(ctx, odirpath); 974ad0b46e6SGreg Kurz if (odirfd == -1) { 9756dd4b1f1SGreg Kurz goto out; 9766dd4b1f1SGreg Kurz } 9772289be19SAneesh Kumar K.V 978ad0b46e6SGreg Kurz ndirfd = local_opendir_nofollow(ctx, dirpath->data); 979ad0b46e6SGreg Kurz if (ndirfd == -1) { 980ad0b46e6SGreg Kurz close_preserve_errno(odirfd); 981ad0b46e6SGreg Kurz goto out; 982ad0b46e6SGreg Kurz } 983ad0b46e6SGreg Kurz 984ad0b46e6SGreg Kurz ret = linkat(odirfd, oname, ndirfd, name, 0); 985ad0b46e6SGreg Kurz if (ret < 0) { 986ad0b46e6SGreg Kurz goto out_close; 987ad0b46e6SGreg Kurz } 9882c30dd74SAneesh Kumar K.V 9892c30dd74SAneesh Kumar K.V /* now link the virtfs_metadata files */ 9906dd4b1f1SGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 991ad0b46e6SGreg Kurz int omap_dirfd, nmap_dirfd; 9926dd4b1f1SGreg Kurz 993ad0b46e6SGreg Kurz ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700); 994ad0b46e6SGreg Kurz if (ret < 0 && errno != EEXIST) { 995ad0b46e6SGreg Kurz goto err_undo_link; 9962c30dd74SAneesh Kumar K.V } 997ad0b46e6SGreg Kurz 998ad0b46e6SGreg Kurz omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR); 999ad0b46e6SGreg Kurz if (omap_dirfd == -1) { 1000ad0b46e6SGreg Kurz goto err; 1001ad0b46e6SGreg Kurz } 1002ad0b46e6SGreg Kurz 1003ad0b46e6SGreg Kurz nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR); 1004ad0b46e6SGreg Kurz if (nmap_dirfd == -1) { 1005ad0b46e6SGreg Kurz close_preserve_errno(omap_dirfd); 1006ad0b46e6SGreg Kurz goto err; 1007ad0b46e6SGreg Kurz } 1008ad0b46e6SGreg Kurz 1009ad0b46e6SGreg Kurz ret = linkat(omap_dirfd, oname, nmap_dirfd, name, 0); 1010ad0b46e6SGreg Kurz close_preserve_errno(nmap_dirfd); 1011ad0b46e6SGreg Kurz close_preserve_errno(omap_dirfd); 10122c30dd74SAneesh Kumar K.V if (ret < 0 && errno != ENOENT) { 1013ad0b46e6SGreg Kurz goto err_undo_link; 10142c30dd74SAneesh Kumar K.V } 10156dd4b1f1SGreg Kurz 1016ad0b46e6SGreg Kurz ret = 0; 10172c30dd74SAneesh Kumar K.V } 1018ad0b46e6SGreg Kurz goto out_close; 1019ad0b46e6SGreg Kurz 1020ad0b46e6SGreg Kurz err: 1021ad0b46e6SGreg Kurz ret = -1; 1022ad0b46e6SGreg Kurz err_undo_link: 1023ad0b46e6SGreg Kurz unlinkat_preserve_errno(ndirfd, name, 0); 1024ad0b46e6SGreg Kurz out_close: 1025ad0b46e6SGreg Kurz close_preserve_errno(ndirfd); 1026ad0b46e6SGreg Kurz close_preserve_errno(odirfd); 10276dd4b1f1SGreg Kurz out: 1028ad0b46e6SGreg Kurz g_free(oname); 1029ad0b46e6SGreg Kurz g_free(odirpath); 10302289be19SAneesh Kumar K.V return ret; 1031c494dd6fSAnthony Liguori } 1032c494dd6fSAnthony Liguori 10332289be19SAneesh Kumar K.V static int local_truncate(FsContext *ctx, V9fsPath *fs_path, off_t size) 10348cf89e00SAnthony Liguori { 1035ac125d99SGreg Kurz int fd, ret; 10362289be19SAneesh Kumar K.V 1037ac125d99SGreg Kurz fd = local_open_nofollow(ctx, fs_path->data, O_WRONLY, 0); 1038ac125d99SGreg Kurz if (fd == -1) { 1039ac125d99SGreg Kurz return -1; 1040ac125d99SGreg Kurz } 1041ac125d99SGreg Kurz ret = ftruncate(fd, size); 1042ac125d99SGreg Kurz close_preserve_errno(fd); 10434fa4ce71SChen Gang return ret; 10448cf89e00SAnthony Liguori } 10458cf89e00SAnthony Liguori 10462289be19SAneesh Kumar K.V static int local_chown(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) 10478cf89e00SAnthony Liguori { 1048d369f207SGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 1049d369f207SGreg Kurz char *name = g_path_get_basename(fs_path->data); 10504fa4ce71SChen Gang int ret = -1; 1051d369f207SGreg Kurz int dirfd; 1052d369f207SGreg Kurz 1053d369f207SGreg Kurz dirfd = local_opendir_nofollow(fs_ctx, dirpath); 1054d369f207SGreg Kurz if (dirfd == -1) { 1055d369f207SGreg Kurz goto out; 1056d369f207SGreg Kurz } 10572289be19SAneesh Kumar K.V 1058c79ce737SSripathi Kodi if ((credp->fc_uid == -1 && credp->fc_gid == -1) || 105917b1971fSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_PASSTHROUGH) || 106017b1971fSAneesh Kumar K.V (fs_ctx->export_flags & V9FS_SM_NONE)) { 1061d369f207SGreg Kurz ret = fchownat(dirfd, name, credp->fc_uid, credp->fc_gid, 1062d369f207SGreg Kurz AT_SYMLINK_NOFOLLOW); 1063b97400caSAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED) { 1064d369f207SGreg Kurz ret = local_set_xattrat(dirfd, name, credp); 10652c30dd74SAneesh Kumar K.V } else if (fs_ctx->export_flags & V9FS_SM_MAPPED_FILE) { 1066d369f207SGreg Kurz ret = local_set_mapped_file_attrat(dirfd, name, credp); 1067f7613beeSVenkateswararao Jujjuri (JV) } 1068d369f207SGreg Kurz 1069d369f207SGreg Kurz close_preserve_errno(dirfd); 1070d369f207SGreg Kurz out: 1071d369f207SGreg Kurz g_free(name); 1072d369f207SGreg Kurz g_free(dirpath); 10734fa4ce71SChen Gang return ret; 10748cf89e00SAnthony Liguori } 10758cf89e00SAnthony Liguori 10762289be19SAneesh Kumar K.V static int local_utimensat(FsContext *s, V9fsPath *fs_path, 107774bc02b2SM. Mohan Kumar const struct timespec *buf) 10788cf89e00SAnthony Liguori { 1079a33eda0dSGreg Kurz char *dirpath = g_path_get_dirname(fs_path->data); 1080a33eda0dSGreg Kurz char *name = g_path_get_basename(fs_path->data); 1081a33eda0dSGreg Kurz int dirfd, ret = -1; 10822289be19SAneesh Kumar K.V 1083a33eda0dSGreg Kurz dirfd = local_opendir_nofollow(s, dirpath); 1084a33eda0dSGreg Kurz if (dirfd == -1) { 1085a33eda0dSGreg Kurz goto out; 1086a33eda0dSGreg Kurz } 1087a33eda0dSGreg Kurz 1088a33eda0dSGreg Kurz ret = utimensat(dirfd, name, buf, AT_SYMLINK_NOFOLLOW); 1089a33eda0dSGreg Kurz close_preserve_errno(dirfd); 1090a33eda0dSGreg Kurz out: 1091a33eda0dSGreg Kurz g_free(dirpath); 1092a33eda0dSGreg Kurz g_free(name); 10934fa4ce71SChen Gang return ret; 10948cf89e00SAnthony Liguori } 10958cf89e00SAnthony Liguori 1096df4938a6SGreg Kurz static int local_unlinkat_common(FsContext *ctx, int dirfd, const char *name, 1097df4938a6SGreg Kurz int flags) 10985bae1900SAnthony Liguori { 1099846cf408SDaniel Henrique Barboza int ret; 11002c30dd74SAneesh Kumar K.V 11012c30dd74SAneesh Kumar K.V if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 1102df4938a6SGreg Kurz int map_dirfd; 1103df4938a6SGreg Kurz 11046a87e792SGreg Kurz /* We need to remove the metadata as well: 11056a87e792SGreg Kurz * - the metadata directory if we're removing a directory 11066a87e792SGreg Kurz * - the metadata file in the parent's metadata directory 11076a87e792SGreg Kurz * 11086a87e792SGreg Kurz * If any of these are missing (ie, ENOENT) then we're probably 11096a87e792SGreg Kurz * trying to remove something that wasn't created in mapped-file 11106a87e792SGreg Kurz * mode. We just ignore the error. 11116a87e792SGreg Kurz */ 1112df4938a6SGreg Kurz if (flags == AT_REMOVEDIR) { 1113df4938a6SGreg Kurz int fd; 1114df4938a6SGreg Kurz 1115b003fc0dSGreg Kurz fd = openat_dir(dirfd, name); 1116df4938a6SGreg Kurz if (fd == -1) { 1117846cf408SDaniel Henrique Barboza return -1; 11182c30dd74SAneesh Kumar K.V } 1119df4938a6SGreg Kurz ret = unlinkat(fd, VIRTFS_META_DIR, AT_REMOVEDIR); 1120df4938a6SGreg Kurz close_preserve_errno(fd); 1121df4938a6SGreg Kurz if (ret < 0 && errno != ENOENT) { 1122846cf408SDaniel Henrique Barboza return -1; 11232c30dd74SAneesh Kumar K.V } 11242c30dd74SAneesh Kumar K.V } 1125df4938a6SGreg Kurz map_dirfd = openat_dir(dirfd, VIRTFS_META_DIR); 11266a87e792SGreg Kurz if (map_dirfd != -1) { 1127df4938a6SGreg Kurz ret = unlinkat(map_dirfd, name, 0); 1128df4938a6SGreg Kurz close_preserve_errno(map_dirfd); 1129df4938a6SGreg Kurz if (ret < 0 && errno != ENOENT) { 1130846cf408SDaniel Henrique Barboza return -1; 11316a87e792SGreg Kurz } 11326a87e792SGreg Kurz } else if (errno != ENOENT) { 1133846cf408SDaniel Henrique Barboza return -1; 11342c30dd74SAneesh Kumar K.V } 11352c30dd74SAneesh Kumar K.V } 11364fa4ce71SChen Gang 1137846cf408SDaniel Henrique Barboza return unlinkat(dirfd, name, flags); 1138df4938a6SGreg Kurz } 1139df4938a6SGreg Kurz 11408cf89e00SAnthony Liguori static int local_remove(FsContext *ctx, const char *path) 11418cf89e00SAnthony Liguori { 11428cf89e00SAnthony Liguori struct stat stbuf; 1143a0e640a8SGreg Kurz char *dirpath = g_path_get_dirname(path); 1144a0e640a8SGreg Kurz char *name = g_path_get_basename(path); 1145a0e640a8SGreg Kurz int flags = 0; 1146a0e640a8SGreg Kurz int dirfd; 1147a0e640a8SGreg Kurz int err = -1; 11488cf89e00SAnthony Liguori 1149a0e640a8SGreg Kurz dirfd = local_opendir_nofollow(ctx, dirpath); 1150b7361d46SGreg Kurz if (dirfd == -1) { 1151a0e640a8SGreg Kurz goto out; 1152a0e640a8SGreg Kurz } 1153a0e640a8SGreg Kurz 1154790db7efSBruce Rogers if (fstatat(dirfd, name, &stbuf, AT_SYMLINK_NOFOLLOW) < 0) { 11558cf89e00SAnthony Liguori goto err_out; 11568cf89e00SAnthony Liguori } 1157a0e640a8SGreg Kurz 11588cf89e00SAnthony Liguori if (S_ISDIR(stbuf.st_mode)) { 1159a0e640a8SGreg Kurz flags |= AT_REMOVEDIR; 1160faa44e3dSVenkateswararao Jujjuri (JV) } 11614fa4ce71SChen Gang 1162a0e640a8SGreg Kurz err = local_unlinkat_common(ctx, dirfd, name, flags); 11632c30dd74SAneesh Kumar K.V err_out: 1164a0e640a8SGreg Kurz close_preserve_errno(dirfd); 1165a0e640a8SGreg Kurz out: 1166a0e640a8SGreg Kurz g_free(name); 1167a0e640a8SGreg Kurz g_free(dirpath); 11682c30dd74SAneesh Kumar K.V return err; 11695bae1900SAnthony Liguori } 11705bae1900SAnthony Liguori 11718b888272SAneesh Kumar K.V static int local_fsync(FsContext *ctx, int fid_type, 11728b888272SAneesh Kumar K.V V9fsFidOpenState *fs, int datasync) 11738cf89e00SAnthony Liguori { 11748b888272SAneesh Kumar K.V int fd; 11758b888272SAneesh Kumar K.V 11768b888272SAneesh Kumar K.V if (fid_type == P9_FID_DIR) { 1177f314ea4eSGreg Kurz fd = dirfd(fs->dir.stream); 117849594973SVenkateswararao Jujjuri (JV) } else { 11798b888272SAneesh Kumar K.V fd = fs->fd; 11808b888272SAneesh Kumar K.V } 11818b888272SAneesh Kumar K.V 11828b888272SAneesh Kumar K.V if (datasync) { 11838b888272SAneesh Kumar K.V return qemu_fdatasync(fd); 11848b888272SAneesh Kumar K.V } else { 11858b888272SAneesh Kumar K.V return fsync(fd); 11868cf89e00SAnthony Liguori } 118749594973SVenkateswararao Jujjuri (JV) } 11888cf89e00SAnthony Liguori 11892289be19SAneesh Kumar K.V static int local_statfs(FsContext *s, V9fsPath *fs_path, struct statfs *stbuf) 1190be940c87SM. Mohan Kumar { 119131e51d1cSGreg Kurz int fd, ret; 11922289be19SAneesh Kumar K.V 119331e51d1cSGreg Kurz fd = local_open_nofollow(s, fs_path->data, O_RDONLY, 0); 119423da0145SGreg Kurz if (fd == -1) { 119523da0145SGreg Kurz return -1; 119623da0145SGreg Kurz } 119731e51d1cSGreg Kurz ret = fstatfs(fd, stbuf); 119831e51d1cSGreg Kurz close_preserve_errno(fd); 11994fa4ce71SChen Gang return ret; 1200be940c87SM. Mohan Kumar } 1201be940c87SM. Mohan Kumar 12022289be19SAneesh Kumar K.V static ssize_t local_lgetxattr(FsContext *ctx, V9fsPath *fs_path, 1203fa32ef88SAneesh Kumar K.V const char *name, void *value, size_t size) 1204fa32ef88SAneesh Kumar K.V { 12052289be19SAneesh Kumar K.V char *path = fs_path->data; 12062289be19SAneesh Kumar K.V 1207fc22118dSAneesh Kumar K.V return v9fs_get_xattr(ctx, path, name, value, size); 1208fa32ef88SAneesh Kumar K.V } 1209fa32ef88SAneesh Kumar K.V 12102289be19SAneesh Kumar K.V static ssize_t local_llistxattr(FsContext *ctx, V9fsPath *fs_path, 1211fa32ef88SAneesh Kumar K.V void *value, size_t size) 1212fa32ef88SAneesh Kumar K.V { 12132289be19SAneesh Kumar K.V char *path = fs_path->data; 12142289be19SAneesh Kumar K.V 1215fc22118dSAneesh Kumar K.V return v9fs_list_xattr(ctx, path, value, size); 121661b6c499SAneesh Kumar K.V } 121761b6c499SAneesh Kumar K.V 12182289be19SAneesh Kumar K.V static int local_lsetxattr(FsContext *ctx, V9fsPath *fs_path, const char *name, 121910b468bdSAneesh Kumar K.V void *value, size_t size, int flags) 122010b468bdSAneesh Kumar K.V { 12212289be19SAneesh Kumar K.V char *path = fs_path->data; 12222289be19SAneesh Kumar K.V 1223fc22118dSAneesh Kumar K.V return v9fs_set_xattr(ctx, path, name, value, size, flags); 122410b468bdSAneesh Kumar K.V } 122510b468bdSAneesh Kumar K.V 12262289be19SAneesh Kumar K.V static int local_lremovexattr(FsContext *ctx, V9fsPath *fs_path, 12272289be19SAneesh Kumar K.V const char *name) 12289ed3ef26SAneesh Kumar K.V { 12292289be19SAneesh Kumar K.V char *path = fs_path->data; 12302289be19SAneesh Kumar K.V 1231fc22118dSAneesh Kumar K.V return v9fs_remove_xattr(ctx, path, name); 12329ed3ef26SAneesh Kumar K.V } 12339ed3ef26SAneesh Kumar K.V 12342289be19SAneesh Kumar K.V static int local_name_to_path(FsContext *ctx, V9fsPath *dir_path, 12352289be19SAneesh Kumar K.V const char *name, V9fsPath *target) 12362289be19SAneesh Kumar K.V { 12377a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 12387a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 12397a95434eSGreg Kurz errno = EINVAL; 12407a95434eSGreg Kurz return -1; 12417a95434eSGreg Kurz } 12427a95434eSGreg Kurz 12432289be19SAneesh Kumar K.V if (dir_path) { 1244f57f5878SGreg Kurz if (!strcmp(name, ".")) { 1245f57f5878SGreg Kurz /* "." relative to "foo/bar" is "foo/bar" */ 1246f57f5878SGreg Kurz v9fs_path_copy(target, dir_path); 1247f57f5878SGreg Kurz } else if (!strcmp(name, "..")) { 1248f57f5878SGreg Kurz if (!strcmp(dir_path->data, ".")) { 1249f57f5878SGreg Kurz /* ".." relative to the root is "." */ 1250f57f5878SGreg Kurz v9fs_path_sprintf(target, "."); 12519c6b899fSGreg Kurz } else { 1252f57f5878SGreg Kurz char *tmp = g_path_get_dirname(dir_path->data); 1253f57f5878SGreg Kurz /* Symbolic links are resolved by the client. We can assume 1254f57f5878SGreg Kurz * that ".." relative to "foo/bar" is equivalent to "foo" 12559c6b899fSGreg Kurz */ 1256f57f5878SGreg Kurz v9fs_path_sprintf(target, "%s", tmp); 1257f57f5878SGreg Kurz g_free(tmp); 1258f57f5878SGreg Kurz } 1259f57f5878SGreg Kurz } else { 1260f57f5878SGreg Kurz assert(!strchr(name, '/')); 1261f57f5878SGreg Kurz v9fs_path_sprintf(target, "%s/%s", dir_path->data, name); 1262f57f5878SGreg Kurz } 1263f57f5878SGreg Kurz } else if (!strcmp(name, "/") || !strcmp(name, ".") || 1264f57f5878SGreg Kurz !strcmp(name, "..")) { 1265f57f5878SGreg Kurz /* This is the root fid */ 1266f57f5878SGreg Kurz v9fs_path_sprintf(target, "."); 1267f57f5878SGreg Kurz } else { 1268f57f5878SGreg Kurz assert(!strchr(name, '/')); 1269f57f5878SGreg Kurz v9fs_path_sprintf(target, "./%s", name); 12702289be19SAneesh Kumar K.V } 12712289be19SAneesh Kumar K.V return 0; 12722289be19SAneesh Kumar K.V } 12732289be19SAneesh Kumar K.V 12742289be19SAneesh Kumar K.V static int local_renameat(FsContext *ctx, V9fsPath *olddir, 12752289be19SAneesh Kumar K.V const char *old_name, V9fsPath *newdir, 12762289be19SAneesh Kumar K.V const char *new_name) 12772289be19SAneesh Kumar K.V { 12782289be19SAneesh Kumar K.V int ret; 127999f2cf4bSGreg Kurz int odirfd, ndirfd; 12802289be19SAneesh Kumar K.V 12817a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 12827a95434eSGreg Kurz (local_is_mapped_file_metadata(ctx, old_name) || 12837a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, new_name))) { 12847a95434eSGreg Kurz errno = EINVAL; 12857a95434eSGreg Kurz return -1; 12867a95434eSGreg Kurz } 12877a95434eSGreg Kurz 128899f2cf4bSGreg Kurz odirfd = local_opendir_nofollow(ctx, olddir->data); 128999f2cf4bSGreg Kurz if (odirfd == -1) { 129099f2cf4bSGreg Kurz return -1; 129199f2cf4bSGreg Kurz } 12922289be19SAneesh Kumar K.V 129399f2cf4bSGreg Kurz ndirfd = local_opendir_nofollow(ctx, newdir->data); 129499f2cf4bSGreg Kurz if (ndirfd == -1) { 129599f2cf4bSGreg Kurz close_preserve_errno(odirfd); 129699f2cf4bSGreg Kurz return -1; 129799f2cf4bSGreg Kurz } 12982289be19SAneesh Kumar K.V 129999f2cf4bSGreg Kurz ret = renameat(odirfd, old_name, ndirfd, new_name); 130099f2cf4bSGreg Kurz if (ret < 0) { 130199f2cf4bSGreg Kurz goto out; 130299f2cf4bSGreg Kurz } 130399f2cf4bSGreg Kurz 130499f2cf4bSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 130599f2cf4bSGreg Kurz int omap_dirfd, nmap_dirfd; 130699f2cf4bSGreg Kurz 130799f2cf4bSGreg Kurz ret = mkdirat(ndirfd, VIRTFS_META_DIR, 0700); 130899f2cf4bSGreg Kurz if (ret < 0 && errno != EEXIST) { 130999f2cf4bSGreg Kurz goto err_undo_rename; 131099f2cf4bSGreg Kurz } 131199f2cf4bSGreg Kurz 13126dd4b1f1SGreg Kurz omap_dirfd = openat_dir(odirfd, VIRTFS_META_DIR); 131399f2cf4bSGreg Kurz if (omap_dirfd == -1) { 131499f2cf4bSGreg Kurz goto err; 131599f2cf4bSGreg Kurz } 131699f2cf4bSGreg Kurz 13176dd4b1f1SGreg Kurz nmap_dirfd = openat_dir(ndirfd, VIRTFS_META_DIR); 131899f2cf4bSGreg Kurz if (nmap_dirfd == -1) { 131999f2cf4bSGreg Kurz close_preserve_errno(omap_dirfd); 132099f2cf4bSGreg Kurz goto err; 132199f2cf4bSGreg Kurz } 132299f2cf4bSGreg Kurz 132399f2cf4bSGreg Kurz /* rename the .virtfs_metadata files */ 132499f2cf4bSGreg Kurz ret = renameat(omap_dirfd, old_name, nmap_dirfd, new_name); 132599f2cf4bSGreg Kurz close_preserve_errno(nmap_dirfd); 132699f2cf4bSGreg Kurz close_preserve_errno(omap_dirfd); 132799f2cf4bSGreg Kurz if (ret < 0 && errno != ENOENT) { 132899f2cf4bSGreg Kurz goto err_undo_rename; 132999f2cf4bSGreg Kurz } 133099f2cf4bSGreg Kurz 133199f2cf4bSGreg Kurz ret = 0; 133299f2cf4bSGreg Kurz } 133399f2cf4bSGreg Kurz goto out; 133499f2cf4bSGreg Kurz 133599f2cf4bSGreg Kurz err: 133699f2cf4bSGreg Kurz ret = -1; 133799f2cf4bSGreg Kurz err_undo_rename: 133899f2cf4bSGreg Kurz renameat_preserve_errno(ndirfd, new_name, odirfd, old_name); 133999f2cf4bSGreg Kurz out: 134099f2cf4bSGreg Kurz close_preserve_errno(ndirfd); 134199f2cf4bSGreg Kurz close_preserve_errno(odirfd); 13422289be19SAneesh Kumar K.V return ret; 13432289be19SAneesh Kumar K.V } 13442289be19SAneesh Kumar K.V 1345d2767edeSGreg Kurz static void v9fs_path_init_dirname(V9fsPath *path, const char *str) 1346d2767edeSGreg Kurz { 1347d2767edeSGreg Kurz path->data = g_path_get_dirname(str); 1348d2767edeSGreg Kurz path->size = strlen(path->data) + 1; 1349d2767edeSGreg Kurz } 1350d2767edeSGreg Kurz 1351d2767edeSGreg Kurz static int local_rename(FsContext *ctx, const char *oldpath, 1352d2767edeSGreg Kurz const char *newpath) 1353d2767edeSGreg Kurz { 1354d2767edeSGreg Kurz int err; 1355d2767edeSGreg Kurz char *oname = g_path_get_basename(oldpath); 1356d2767edeSGreg Kurz char *nname = g_path_get_basename(newpath); 1357d2767edeSGreg Kurz V9fsPath olddir, newdir; 1358d2767edeSGreg Kurz 1359d2767edeSGreg Kurz v9fs_path_init_dirname(&olddir, oldpath); 1360d2767edeSGreg Kurz v9fs_path_init_dirname(&newdir, newpath); 1361d2767edeSGreg Kurz 1362d2767edeSGreg Kurz err = local_renameat(ctx, &olddir, oname, &newdir, nname); 1363d2767edeSGreg Kurz 1364d2767edeSGreg Kurz v9fs_path_free(&newdir); 1365d2767edeSGreg Kurz v9fs_path_free(&olddir); 1366d2767edeSGreg Kurz g_free(nname); 1367d2767edeSGreg Kurz g_free(oname); 1368d2767edeSGreg Kurz 1369d2767edeSGreg Kurz return err; 1370d2767edeSGreg Kurz } 1371d2767edeSGreg Kurz 13722289be19SAneesh Kumar K.V static int local_unlinkat(FsContext *ctx, V9fsPath *dir, 13732289be19SAneesh Kumar K.V const char *name, int flags) 13742289be19SAneesh Kumar K.V { 13752289be19SAneesh Kumar K.V int ret; 1376df4938a6SGreg Kurz int dirfd; 13772c30dd74SAneesh Kumar K.V 13787a95434eSGreg Kurz if (ctx->export_flags & V9FS_SM_MAPPED_FILE && 13797a95434eSGreg Kurz local_is_mapped_file_metadata(ctx, name)) { 13807a95434eSGreg Kurz errno = EINVAL; 13817a95434eSGreg Kurz return -1; 13827a95434eSGreg Kurz } 13837a95434eSGreg Kurz 1384df4938a6SGreg Kurz dirfd = local_opendir_nofollow(ctx, dir->data); 1385df4938a6SGreg Kurz if (dirfd == -1) { 1386df4938a6SGreg Kurz return -1; 1387df4938a6SGreg Kurz } 13882289be19SAneesh Kumar K.V 1389df4938a6SGreg Kurz ret = local_unlinkat_common(ctx, dirfd, name, flags); 1390df4938a6SGreg Kurz close_preserve_errno(dirfd); 13912289be19SAneesh Kumar K.V return ret; 13922289be19SAneesh Kumar K.V } 13939ed3ef26SAneesh Kumar K.V 13945b7b2f9aSKeno Fischer #ifdef FS_IOC_GETVERSION 1395e06a765eSHarsh Prateek Bora static int local_ioc_getversion(FsContext *ctx, V9fsPath *path, 1396e06a765eSHarsh Prateek Bora mode_t st_mode, uint64_t *st_gen) 1397e06a765eSHarsh Prateek Bora { 13980e5fc994SKirill A. Shutemov int err; 1399cc720ddbSAneesh Kumar K.V V9fsFidOpenState fid_open; 1400cc720ddbSAneesh Kumar K.V 1401e06a765eSHarsh Prateek Bora /* 1402e06a765eSHarsh Prateek Bora * Do not try to open special files like device nodes, fifos etc 1403e06a765eSHarsh Prateek Bora * We can get fd for regular files and directories only 1404e06a765eSHarsh Prateek Bora */ 1405e06a765eSHarsh Prateek Bora if (!S_ISREG(st_mode) && !S_ISDIR(st_mode)) { 14061a9978a5SKirill A. Shutemov errno = ENOTTY; 14071a9978a5SKirill A. Shutemov return -1; 1408e06a765eSHarsh Prateek Bora } 1409cc720ddbSAneesh Kumar K.V err = local_open(ctx, path, O_RDONLY, &fid_open); 1410cc720ddbSAneesh Kumar K.V if (err < 0) { 1411cc720ddbSAneesh Kumar K.V return err; 1412e06a765eSHarsh Prateek Bora } 1413cc720ddbSAneesh Kumar K.V err = ioctl(fid_open.fd, FS_IOC_GETVERSION, st_gen); 1414cc720ddbSAneesh Kumar K.V local_close(ctx, &fid_open); 1415e06a765eSHarsh Prateek Bora return err; 14165b7b2f9aSKeno Fischer } 14170e5fc994SKirill A. Shutemov #endif 1418e06a765eSHarsh Prateek Bora 14195b7b2f9aSKeno Fischer static int local_ioc_getversion_init(FsContext *ctx, LocalData *data, Error **errp) 14200174fe73SAneesh Kumar K.V { 142100c90bd1SGreg Kurz #ifdef FS_IOC_GETVERSION 14225b7b2f9aSKeno Fischer struct statfs stbuf; 14235b7b2f9aSKeno Fischer 142400c90bd1SGreg Kurz /* 142500c90bd1SGreg Kurz * use ioc_getversion only if the ioctl is definied 142600c90bd1SGreg Kurz */ 14270e35a378SGreg Kurz if (fstatfs(data->mountfd, &stbuf) < 0) { 14282306271cSKeno Fischer error_setg_errno(errp, errno, 14292306271cSKeno Fischer "failed to stat file system at '%s'", ctx->fs_root); 14305b7b2f9aSKeno Fischer return -1; 143100c90bd1SGreg Kurz } 143200c90bd1SGreg Kurz switch (stbuf.f_type) { 143300c90bd1SGreg Kurz case EXT2_SUPER_MAGIC: 143400c90bd1SGreg Kurz case BTRFS_SUPER_MAGIC: 143500c90bd1SGreg Kurz case REISERFS_SUPER_MAGIC: 143600c90bd1SGreg Kurz case XFS_SUPER_MAGIC: 143700c90bd1SGreg Kurz ctx->exops.get_st_gen = local_ioc_getversion; 143800c90bd1SGreg Kurz break; 143900c90bd1SGreg Kurz } 144000c90bd1SGreg Kurz #endif 14415b7b2f9aSKeno Fischer return 0; 14425b7b2f9aSKeno Fischer } 14435b7b2f9aSKeno Fischer 14445b7b2f9aSKeno Fischer static int local_init(FsContext *ctx, Error **errp) 14455b7b2f9aSKeno Fischer { 14465b7b2f9aSKeno Fischer LocalData *data = g_malloc(sizeof(*data)); 14475b7b2f9aSKeno Fischer 14485b7b2f9aSKeno Fischer data->mountfd = open(ctx->fs_root, O_DIRECTORY | O_RDONLY); 14495b7b2f9aSKeno Fischer if (data->mountfd == -1) { 14505b7b2f9aSKeno Fischer error_setg_errno(errp, errno, "failed to open '%s'", ctx->fs_root); 14515b7b2f9aSKeno Fischer goto err; 14525b7b2f9aSKeno Fischer } 14535b7b2f9aSKeno Fischer 14545b7b2f9aSKeno Fischer if (local_ioc_getversion_init(ctx, data, errp) < 0) { 14555b7b2f9aSKeno Fischer close(data->mountfd); 14565b7b2f9aSKeno Fischer goto err; 14575b7b2f9aSKeno Fischer } 1458e06a765eSHarsh Prateek Bora 14592c30dd74SAneesh Kumar K.V if (ctx->export_flags & V9FS_SM_PASSTHROUGH) { 14602c30dd74SAneesh Kumar K.V ctx->xops = passthrough_xattr_ops; 14612c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_MAPPED) { 14622c30dd74SAneesh Kumar K.V ctx->xops = mapped_xattr_ops; 14632c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_NONE) { 14642c30dd74SAneesh Kumar K.V ctx->xops = none_xattr_ops; 14652c30dd74SAneesh Kumar K.V } else if (ctx->export_flags & V9FS_SM_MAPPED_FILE) { 14662c30dd74SAneesh Kumar K.V /* 14672c30dd74SAneesh Kumar K.V * xattr operation for mapped-file and passthrough 14682c30dd74SAneesh Kumar K.V * remain same. 14692c30dd74SAneesh Kumar K.V */ 14702c30dd74SAneesh Kumar K.V ctx->xops = passthrough_xattr_ops; 14712c30dd74SAneesh Kumar K.V } 1472c98f1d4aSAneesh Kumar K.V ctx->export_flags |= V9FS_PATHNAME_FSCONTEXT; 147300c90bd1SGreg Kurz 14740e35a378SGreg Kurz ctx->private = data; 147500c90bd1SGreg Kurz return 0; 14760e35a378SGreg Kurz 14770e35a378SGreg Kurz err: 14780e35a378SGreg Kurz g_free(data); 14790e35a378SGreg Kurz return -1; 1480e06a765eSHarsh Prateek Bora } 14810e35a378SGreg Kurz 14820e35a378SGreg Kurz static void local_cleanup(FsContext *ctx) 14830e35a378SGreg Kurz { 14840e35a378SGreg Kurz LocalData *data = ctx->private; 14850e35a378SGreg Kurz 1486c0da0cb7SGreg Kurz if (!data) { 1487c0da0cb7SGreg Kurz return; 1488c0da0cb7SGreg Kurz } 1489c0da0cb7SGreg Kurz 14900e35a378SGreg Kurz close(data->mountfd); 14910e35a378SGreg Kurz g_free(data); 14920174fe73SAneesh Kumar K.V } 14930174fe73SAneesh Kumar K.V 14944c5ec47eSVladimir Sementsov-Ogievskiy static void error_append_security_model_hint(Error *const *errp) 149591cda4e8SGreg Kurz { 149691cda4e8SGreg Kurz error_append_hint(errp, "Valid options are: security_model=" 149791cda4e8SGreg Kurz "[passthrough|mapped-xattr|mapped-file|none]\n"); 149891cda4e8SGreg Kurz } 149991cda4e8SGreg Kurz 150091cda4e8SGreg Kurz static int local_parse_opts(QemuOpts *opts, FsDriverEntry *fse, Error **errp) 150199519f0aSAneesh Kumar K.V { 150292c45122SVladimir Sementsov-Ogievskiy ERRP_GUARD(); 150399519f0aSAneesh Kumar K.V const char *sec_model = qemu_opt_get(opts, "security_model"); 150499519f0aSAneesh Kumar K.V const char *path = qemu_opt_get(opts, "path"); 15051a6ed33cSAntonios Motakis const char *multidevs = qemu_opt_get(opts, "multidevs"); 150699519f0aSAneesh Kumar K.V 150799519f0aSAneesh Kumar K.V if (!sec_model) { 150891cda4e8SGreg Kurz error_setg(errp, "security_model property not set"); 150991cda4e8SGreg Kurz error_append_security_model_hint(errp); 151099519f0aSAneesh Kumar K.V return -1; 151199519f0aSAneesh Kumar K.V } 151299519f0aSAneesh Kumar K.V 151399519f0aSAneesh Kumar K.V if (!strcmp(sec_model, "passthrough")) { 151499519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_PASSTHROUGH; 15152c30dd74SAneesh Kumar K.V } else if (!strcmp(sec_model, "mapped") || 15162c30dd74SAneesh Kumar K.V !strcmp(sec_model, "mapped-xattr")) { 151799519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_MAPPED; 151899519f0aSAneesh Kumar K.V } else if (!strcmp(sec_model, "none")) { 151999519f0aSAneesh Kumar K.V fse->export_flags |= V9FS_SM_NONE; 15202c30dd74SAneesh Kumar K.V } else if (!strcmp(sec_model, "mapped-file")) { 15212c30dd74SAneesh Kumar K.V fse->export_flags |= V9FS_SM_MAPPED_FILE; 152299519f0aSAneesh Kumar K.V } else { 152391cda4e8SGreg Kurz error_setg(errp, "invalid security_model property '%s'", sec_model); 152491cda4e8SGreg Kurz error_append_security_model_hint(errp); 152599519f0aSAneesh Kumar K.V return -1; 152699519f0aSAneesh Kumar K.V } 152799519f0aSAneesh Kumar K.V 15281a6ed33cSAntonios Motakis if (multidevs) { 15291a6ed33cSAntonios Motakis if (!strcmp(multidevs, "remap")) { 15301a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_FORBID_MULTIDEVS; 15311a6ed33cSAntonios Motakis fse->export_flags |= V9FS_REMAP_INODES; 15321a6ed33cSAntonios Motakis } else if (!strcmp(multidevs, "forbid")) { 15331a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_REMAP_INODES; 15341a6ed33cSAntonios Motakis fse->export_flags |= V9FS_FORBID_MULTIDEVS; 15351a6ed33cSAntonios Motakis } else if (!strcmp(multidevs, "warn")) { 15361a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_FORBID_MULTIDEVS; 15371a6ed33cSAntonios Motakis fse->export_flags &= ~V9FS_REMAP_INODES; 15381a6ed33cSAntonios Motakis } else { 153992c45122SVladimir Sementsov-Ogievskiy error_setg(errp, "invalid multidevs property '%s'", 15401a6ed33cSAntonios Motakis multidevs); 154192c45122SVladimir Sementsov-Ogievskiy error_append_hint(errp, "Valid options are: multidevs=" 15421a6ed33cSAntonios Motakis "[remap|forbid|warn]\n"); 15431a6ed33cSAntonios Motakis return -1; 15441a6ed33cSAntonios Motakis } 15451a6ed33cSAntonios Motakis } 15461a6ed33cSAntonios Motakis 154799519f0aSAneesh Kumar K.V if (!path) { 154891cda4e8SGreg Kurz error_setg(errp, "path property not set"); 154999519f0aSAneesh Kumar K.V return -1; 155099519f0aSAneesh Kumar K.V } 1551b8bbdb88SPradeep Jagadeesh 155292c45122SVladimir Sementsov-Ogievskiy if (fsdev_throttle_parse_opts(opts, &fse->fst, errp)) { 155392c45122SVladimir Sementsov-Ogievskiy error_prepend(errp, "invalid throttle configuration: "); 1554b8bbdb88SPradeep Jagadeesh return -1; 1555b8bbdb88SPradeep Jagadeesh } 1556b8bbdb88SPradeep Jagadeesh 1557b96feb2cSTobias Schramm if (fse->export_flags & V9FS_SM_MAPPED || 1558b96feb2cSTobias Schramm fse->export_flags & V9FS_SM_MAPPED_FILE) { 1559b96feb2cSTobias Schramm fse->fmode = 1560b96feb2cSTobias Schramm qemu_opt_get_number(opts, "fmode", SM_LOCAL_MODE_BITS) & 0777; 1561b96feb2cSTobias Schramm fse->dmode = 1562b96feb2cSTobias Schramm qemu_opt_get_number(opts, "dmode", SM_LOCAL_DIR_MODE_BITS) & 0777; 1563b96feb2cSTobias Schramm } else { 1564b96feb2cSTobias Schramm if (qemu_opt_find(opts, "fmode")) { 156591cda4e8SGreg Kurz error_setg(errp, "fmode is only valid for mapped security modes"); 1566b96feb2cSTobias Schramm return -1; 1567b96feb2cSTobias Schramm } 1568b96feb2cSTobias Schramm if (qemu_opt_find(opts, "dmode")) { 156991cda4e8SGreg Kurz error_setg(errp, "dmode is only valid for mapped security modes"); 1570b96feb2cSTobias Schramm return -1; 1571b96feb2cSTobias Schramm } 1572b96feb2cSTobias Schramm } 1573b96feb2cSTobias Schramm 157499519f0aSAneesh Kumar K.V fse->path = g_strdup(path); 157599519f0aSAneesh Kumar K.V 157699519f0aSAneesh Kumar K.V return 0; 157799519f0aSAneesh Kumar K.V } 157899519f0aSAneesh Kumar K.V 15799f107513SAnthony Liguori FileOperations local_ops = { 158099519f0aSAneesh Kumar K.V .parse_opts = local_parse_opts, 15810174fe73SAneesh Kumar K.V .init = local_init, 15820e35a378SGreg Kurz .cleanup = local_cleanup, 1583131dcb25SAnthony Liguori .lstat = local_lstat, 1584131dcb25SAnthony Liguori .readlink = local_readlink, 1585131dcb25SAnthony Liguori .close = local_close, 1586131dcb25SAnthony Liguori .closedir = local_closedir, 1587a6568fe2SAnthony Liguori .open = local_open, 1588a6568fe2SAnthony Liguori .opendir = local_opendir, 1589a9231555SAnthony Liguori .rewinddir = local_rewinddir, 1590a9231555SAnthony Liguori .telldir = local_telldir, 1591635324e8SGreg Kurz .readdir = local_readdir, 1592a9231555SAnthony Liguori .seekdir = local_seekdir, 159356d15a53SSanchit Garg .preadv = local_preadv, 159456d15a53SSanchit Garg .pwritev = local_pwritev, 1595c494dd6fSAnthony Liguori .chmod = local_chmod, 1596c494dd6fSAnthony Liguori .mknod = local_mknod, 1597c494dd6fSAnthony Liguori .mkdir = local_mkdir, 1598c494dd6fSAnthony Liguori .fstat = local_fstat, 1599c494dd6fSAnthony Liguori .open2 = local_open2, 1600c494dd6fSAnthony Liguori .symlink = local_symlink, 1601c494dd6fSAnthony Liguori .link = local_link, 16028cf89e00SAnthony Liguori .truncate = local_truncate, 16038cf89e00SAnthony Liguori .rename = local_rename, 16048cf89e00SAnthony Liguori .chown = local_chown, 160574bc02b2SM. Mohan Kumar .utimensat = local_utimensat, 16065bae1900SAnthony Liguori .remove = local_remove, 16078cf89e00SAnthony Liguori .fsync = local_fsync, 1608be940c87SM. Mohan Kumar .statfs = local_statfs, 1609fa32ef88SAneesh Kumar K.V .lgetxattr = local_lgetxattr, 1610fa32ef88SAneesh Kumar K.V .llistxattr = local_llistxattr, 161110b468bdSAneesh Kumar K.V .lsetxattr = local_lsetxattr, 16129ed3ef26SAneesh Kumar K.V .lremovexattr = local_lremovexattr, 16132289be19SAneesh Kumar K.V .name_to_path = local_name_to_path, 16142289be19SAneesh Kumar K.V .renameat = local_renameat, 16152289be19SAneesh Kumar K.V .unlinkat = local_unlinkat, 16169f107513SAnthony Liguori }; 1617