1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
|
/*
* Virtio 9p user. xattr callback
*
* Copyright IBM, Corp. 2010
*
* Authors:
* Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
*
* This work is licensed under the terms of the GNU GPL, version 2. See
* the COPYING file in the top-level directory.
*
*/
#include <sys/types.h>
#include "hw/virtio/virtio.h"
#include "virtio-9p.h"
#include "fsdev/file-op-9p.h"
#include "virtio-9p-xattr.h"
static ssize_t mp_user_getxattr(FsContext *ctx, const char *path,
const char *name, void *value, size_t size)
{
char buffer[PATH_MAX];
if (strncmp(name, "user.virtfs.", 12) == 0) {
/*
* Don't allow fetch of user.virtfs namesapce
* in case of mapped security
*/
errno = ENOATTR;
return -1;
}
#ifdef CONFIG_LINUX
return lgetxattr(rpath(ctx, path, buffer), name, value, size);
#else
return getxattr(rpath(ctx, path, buffer), name, value, size, 0, XATTR_NOFOLLOW);
#endif
}
static ssize_t mp_user_listxattr(FsContext *ctx, const char *path,
char *name, void *value, size_t size)
{
int name_size = strlen(name) + 1;
if (strncmp(name, "user.virtfs.", 12) == 0) {
/* check if it is a mapped posix acl */
if (strncmp(name, "user.virtfs.system.posix_acl_", 29) == 0) {
/* adjust the name and size */
name += 12;
name_size -= 12;
} else {
/*
* Don't allow fetch of user.virtfs namesapce
* in case of mapped security
*/
return 0;
}
}
if (!value) {
return name_size;
}
if (size < name_size) {
errno = ERANGE;
return -1;
}
/* name_size includes the trailing NUL. */
memcpy(value, name, name_size);
return name_size;
}
static int mp_user_setxattr(FsContext *ctx, const char *path, const char *name,
void *value, size_t size, int flags)
{
char buffer[PATH_MAX];
if (strncmp(name, "user.virtfs.", 12) == 0) {
/*
* Don't allow fetch of user.virtfs namesapce
* in case of mapped security
*/
errno = EACCES;
return -1;
}
#ifdef CONFIG_LINUX
return lsetxattr(rpath(ctx, path, buffer), name, value, size, flags);
#else
return setxattr(rpath(ctx, path, buffer), name, value, size, 0, flags | XATTR_NOFOLLOW);
#endif
}
static int mp_user_removexattr(FsContext *ctx,
const char *path, const char *name)
{
char buffer[PATH_MAX];
if (strncmp(name, "user.virtfs.", 12) == 0) {
/*
* Don't allow fetch of user.virtfs namesapce
* in case of mapped security
*/
errno = EACCES;
return -1;
}
#ifdef CONFIG_LINUX
return lremovexattr(rpath(ctx, path, buffer), name);
#else
return removexattr(rpath(ctx, path, buffer), name, XATTR_NOFOLLOW);
#endif
}
XattrOperations mapped_user_xattr = {
.name = "user.",
.getxattr = mp_user_getxattr,
.setxattr = mp_user_setxattr,
.listxattr = mp_user_listxattr,
.removexattr = mp_user_removexattr,
};
XattrOperations passthrough_user_xattr = {
.name = "user.",
.getxattr = pt_getxattr,
.setxattr = pt_setxattr,
.listxattr = pt_listxattr,
.removexattr = pt_removexattr,
};
|