linux-user: fix to handle variably sized SIOCGSTAMP with new kernels
[qemu/ar7.git] / hw / 9pfs / 9p-posix-acl.c
blobbbf89064f7aedd79ea4741b509094337cd03759c
1 /*
2 * 9p system.posix* xattr callback
4 * Copyright IBM, Corp. 2010
6 * Authors:
7 * Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
14 #include "qemu/osdep.h"
15 #include "qemu/xattr.h"
16 #include "9p.h"
17 #include "fsdev/file-op-9p.h"
18 #include "9p-xattr.h"
20 #define MAP_ACL_ACCESS "user.virtfs.system.posix_acl_access"
21 #define MAP_ACL_DEFAULT "user.virtfs.system.posix_acl_default"
22 #define ACL_ACCESS "system.posix_acl_access"
23 #define ACL_DEFAULT "system.posix_acl_default"
25 static ssize_t mp_pacl_getxattr(FsContext *ctx, const char *path,
26 const char *name, void *value, size_t size)
28 return local_getxattr_nofollow(ctx, path, MAP_ACL_ACCESS, value, size);
31 static ssize_t mp_pacl_listxattr(FsContext *ctx, const char *path,
32 char *name, void *value, size_t osize)
34 ssize_t len = sizeof(ACL_ACCESS);
36 if (!value) {
37 return len;
40 if (osize < len) {
41 errno = ERANGE;
42 return -1;
45 /* len includes the trailing NUL */
46 memcpy(value, ACL_ACCESS, len);
47 return 0;
50 static int mp_pacl_setxattr(FsContext *ctx, const char *path, const char *name,
51 void *value, size_t size, int flags)
53 return local_setxattr_nofollow(ctx, path, MAP_ACL_ACCESS, value, size,
54 flags);
57 static int mp_pacl_removexattr(FsContext *ctx,
58 const char *path, const char *name)
60 int ret;
62 ret = local_removexattr_nofollow(ctx, path, MAP_ACL_ACCESS);
63 if (ret == -1 && errno == ENODATA) {
65 * We don't get ENODATA error when trying to remove a
66 * posix acl that is not present. So don't throw the error
67 * even in case of mapped security model
69 errno = 0;
70 ret = 0;
72 return ret;
75 static ssize_t mp_dacl_getxattr(FsContext *ctx, const char *path,
76 const char *name, void *value, size_t size)
78 return local_getxattr_nofollow(ctx, path, MAP_ACL_DEFAULT, value, size);
81 static ssize_t mp_dacl_listxattr(FsContext *ctx, const char *path,
82 char *name, void *value, size_t osize)
84 ssize_t len = sizeof(ACL_DEFAULT);
86 if (!value) {
87 return len;
90 if (osize < len) {
91 errno = ERANGE;
92 return -1;
95 /* len includes the trailing NUL */
96 memcpy(value, ACL_DEFAULT, len);
97 return 0;
100 static int mp_dacl_setxattr(FsContext *ctx, const char *path, const char *name,
101 void *value, size_t size, int flags)
103 return local_setxattr_nofollow(ctx, path, MAP_ACL_DEFAULT, value, size,
104 flags);
107 static int mp_dacl_removexattr(FsContext *ctx,
108 const char *path, const char *name)
110 int ret;
112 ret = local_removexattr_nofollow(ctx, path, MAP_ACL_DEFAULT);
113 if (ret == -1 && errno == ENODATA) {
115 * We don't get ENODATA error when trying to remove a
116 * posix acl that is not present. So don't throw the error
117 * even in case of mapped security model
119 errno = 0;
120 ret = 0;
122 return ret;
126 XattrOperations mapped_pacl_xattr = {
127 .name = "system.posix_acl_access",
128 .getxattr = mp_pacl_getxattr,
129 .setxattr = mp_pacl_setxattr,
130 .listxattr = mp_pacl_listxattr,
131 .removexattr = mp_pacl_removexattr,
134 XattrOperations mapped_dacl_xattr = {
135 .name = "system.posix_acl_default",
136 .getxattr = mp_dacl_getxattr,
137 .setxattr = mp_dacl_setxattr,
138 .listxattr = mp_dacl_listxattr,
139 .removexattr = mp_dacl_removexattr,
142 XattrOperations passthrough_acl_xattr = {
143 .name = "system.posix_acl_",
144 .getxattr = pt_getxattr,
145 .setxattr = pt_setxattr,
146 .listxattr = pt_listxattr,
147 .removexattr = pt_removexattr,
150 XattrOperations none_acl_xattr = {
151 .name = "system.posix_acl_",
152 .getxattr = notsup_getxattr,
153 .setxattr = notsup_setxattr,
154 .listxattr = notsup_listxattr,
155 .removexattr = notsup_removexattr,