]>
Commit | Line | Data |
---|---|---|
70fc55eb | 1 | /* |
d57b7800 | 2 | * 9p system.posix* xattr callback |
70fc55eb AK |
3 | * |
4 | * Copyright IBM, Corp. 2010 | |
5 | * | |
6 | * Authors: | |
7 | * Aneesh Kumar K.V <[email protected]> | |
8 | * | |
9 | * This work is licensed under the terms of the GNU GPL, version 2. See | |
10 | * the COPYING file in the top-level directory. | |
11 | * | |
12 | */ | |
13 | ||
6f569084 CS |
14 | /* |
15 | * Not so fast! You might want to read the 9p developer docs first: | |
16 | * https://wiki.qemu.org/Documentation/9p | |
17 | */ | |
18 | ||
fbc04127 | 19 | #include "qemu/osdep.h" |
1de7afc9 | 20 | #include "qemu/xattr.h" |
ebe74f8b | 21 | #include "9p.h" |
353ac78d | 22 | #include "fsdev/file-op-9p.h" |
267ae092 | 23 | #include "9p-xattr.h" |
70fc55eb AK |
24 | |
25 | #define MAP_ACL_ACCESS "user.virtfs.system.posix_acl_access" | |
26 | #define MAP_ACL_DEFAULT "user.virtfs.system.posix_acl_default" | |
27 | #define ACL_ACCESS "system.posix_acl_access" | |
28 | #define ACL_DEFAULT "system.posix_acl_default" | |
29 | ||
30 | static ssize_t mp_pacl_getxattr(FsContext *ctx, const char *path, | |
31 | const char *name, void *value, size_t size) | |
32 | { | |
56ad3e54 | 33 | return local_getxattr_nofollow(ctx, path, MAP_ACL_ACCESS, value, size); |
70fc55eb AK |
34 | } |
35 | ||
36 | static ssize_t mp_pacl_listxattr(FsContext *ctx, const char *path, | |
37 | char *name, void *value, size_t osize) | |
38 | { | |
39 | ssize_t len = sizeof(ACL_ACCESS); | |
40 | ||
41 | if (!value) { | |
42 | return len; | |
43 | } | |
44 | ||
45 | if (osize < len) { | |
46 | errno = ERANGE; | |
47 | return -1; | |
48 | } | |
49 | ||
9238c209 JM |
50 | /* len includes the trailing NUL */ |
51 | memcpy(value, ACL_ACCESS, len); | |
70fc55eb AK |
52 | return 0; |
53 | } | |
54 | ||
55 | static int mp_pacl_setxattr(FsContext *ctx, const char *path, const char *name, | |
56 | void *value, size_t size, int flags) | |
57 | { | |
3e36aba7 GK |
58 | return local_setxattr_nofollow(ctx, path, MAP_ACL_ACCESS, value, size, |
59 | flags); | |
70fc55eb AK |
60 | } |
61 | ||
62 | static int mp_pacl_removexattr(FsContext *ctx, | |
63 | const char *path, const char *name) | |
64 | { | |
65 | int ret; | |
4fa4ce71 | 66 | |
72f0d0bf | 67 | ret = local_removexattr_nofollow(ctx, path, MAP_ACL_ACCESS); |
9ea31646 CS |
68 | /* |
69 | * macOS returns ENOATTR (!=ENODATA on macOS), whereas Linux returns | |
70 | * ENODATA (==ENOATTR on Linux), so checking for ENOATTR is fine | |
71 | */ | |
72 | if (ret == -1 && errno == ENOATTR) { | |
70fc55eb | 73 | /* |
a0994761 | 74 | * We don't get ENODATA error when trying to remove a |
70fc55eb AK |
75 | * posix acl that is not present. So don't throw the error |
76 | * even in case of mapped security model | |
77 | */ | |
78 | errno = 0; | |
79 | ret = 0; | |
80 | } | |
81 | return ret; | |
82 | } | |
83 | ||
84 | static ssize_t mp_dacl_getxattr(FsContext *ctx, const char *path, | |
85 | const char *name, void *value, size_t size) | |
86 | { | |
56ad3e54 | 87 | return local_getxattr_nofollow(ctx, path, MAP_ACL_DEFAULT, value, size); |
70fc55eb AK |
88 | } |
89 | ||
90 | static ssize_t mp_dacl_listxattr(FsContext *ctx, const char *path, | |
91 | char *name, void *value, size_t osize) | |
92 | { | |
93 | ssize_t len = sizeof(ACL_DEFAULT); | |
94 | ||
95 | if (!value) { | |
96 | return len; | |
97 | } | |
98 | ||
99 | if (osize < len) { | |
100 | errno = ERANGE; | |
101 | return -1; | |
102 | } | |
103 | ||
9238c209 | 104 | /* len includes the trailing NUL */ |
9005c3b3 | 105 | memcpy(value, ACL_DEFAULT, len); |
70fc55eb AK |
106 | return 0; |
107 | } | |
108 | ||
109 | static int mp_dacl_setxattr(FsContext *ctx, const char *path, const char *name, | |
110 | void *value, size_t size, int flags) | |
111 | { | |
3e36aba7 GK |
112 | return local_setxattr_nofollow(ctx, path, MAP_ACL_DEFAULT, value, size, |
113 | flags); | |
70fc55eb AK |
114 | } |
115 | ||
116 | static int mp_dacl_removexattr(FsContext *ctx, | |
117 | const char *path, const char *name) | |
118 | { | |
a0994761 | 119 | int ret; |
4fa4ce71 | 120 | |
72f0d0bf | 121 | ret = local_removexattr_nofollow(ctx, path, MAP_ACL_DEFAULT); |
9ea31646 CS |
122 | /* |
123 | * macOS returns ENOATTR (!=ENODATA on macOS), whereas Linux returns | |
124 | * ENODATA (==ENOATTR on Linux), so checking for ENOATTR is fine | |
125 | */ | |
126 | if (ret == -1 && errno == ENOATTR) { | |
a0994761 AK |
127 | /* |
128 | * We don't get ENODATA error when trying to remove a | |
129 | * posix acl that is not present. So don't throw the error | |
130 | * even in case of mapped security model | |
131 | */ | |
132 | errno = 0; | |
133 | ret = 0; | |
134 | } | |
135 | return ret; | |
70fc55eb AK |
136 | } |
137 | ||
138 | ||
139 | XattrOperations mapped_pacl_xattr = { | |
140 | .name = "system.posix_acl_access", | |
141 | .getxattr = mp_pacl_getxattr, | |
142 | .setxattr = mp_pacl_setxattr, | |
143 | .listxattr = mp_pacl_listxattr, | |
144 | .removexattr = mp_pacl_removexattr, | |
145 | }; | |
146 | ||
147 | XattrOperations mapped_dacl_xattr = { | |
148 | .name = "system.posix_acl_default", | |
149 | .getxattr = mp_dacl_getxattr, | |
150 | .setxattr = mp_dacl_setxattr, | |
151 | .listxattr = mp_dacl_listxattr, | |
152 | .removexattr = mp_dacl_removexattr, | |
153 | }; | |
154 | ||
155 | XattrOperations passthrough_acl_xattr = { | |
156 | .name = "system.posix_acl_", | |
157 | .getxattr = pt_getxattr, | |
158 | .setxattr = pt_setxattr, | |
159 | .listxattr = pt_listxattr, | |
160 | .removexattr = pt_removexattr, | |
161 | }; | |
162 | ||
163 | XattrOperations none_acl_xattr = { | |
164 | .name = "system.posix_acl_", | |
165 | .getxattr = notsup_getxattr, | |
166 | .setxattr = notsup_setxattr, | |
167 | .listxattr = notsup_listxattr, | |
168 | .removexattr = notsup_removexattr, | |
169 | }; |