From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from [140.186.70.92] (port=37726 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1OC0XV-00009l-FK for qemu-devel@nongnu.org; Tue, 11 May 2010 21:15:10 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.69) (envelope-from ) id 1OC0XL-000760-Bb for qemu-devel@nongnu.org; Tue, 11 May 2010 21:15:09 -0400 Received: from e35.co.us.ibm.com ([32.97.110.153]:38333) by eggs.gnu.org with esmtp (Exim 4.69) (envelope-from ) id 1OC0XL-00075W-5G for qemu-devel@nongnu.org; Tue, 11 May 2010 21:14:59 -0400 Received: from d03relay03.boulder.ibm.com (d03relay03.boulder.ibm.com [9.17.195.228]) by e35.co.us.ibm.com (8.14.3/8.13.1) with ESMTP id o4C18sn1006742 for ; Tue, 11 May 2010 19:08:54 -0600 Received: from d03av02.boulder.ibm.com (d03av02.boulder.ibm.com [9.17.195.168]) by d03relay03.boulder.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id o4C1EwhH138364 for ; Tue, 11 May 2010 19:14:58 -0600 Received: from d03av02.boulder.ibm.com (loopback [127.0.0.1]) by d03av02.boulder.ibm.com (8.14.3/8.13.1/NCO v10.0 AVout) with ESMTP id o4C1Ewnk010556 for ; Tue, 11 May 2010 19:14:58 -0600 From: "Venkateswararao Jujjuri (JV)" Date: Tue, 11 May 2010 18:18:41 -0700 Message-Id: <1273627123-32534-6-git-send-email-jvrao@linux.vnet.ibm.com> In-Reply-To: <1273627123-32534-1-git-send-email-jvrao@linux.vnet.ibm.com> References: <1273627123-32534-1-git-send-email-jvrao@linux.vnet.ibm.com> Subject: [Qemu-devel] [PATCH-V2 5/7] virtio-9p: Implemented security model for symlink and link. List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: aliguori@us.ibm.com, "Venkateswararao Jujjuri (JV)" Signed-off-by: Venkateswararao Jujjuri --- hw/file-op-9p.h | 4 +- hw/virtio-9p-local.c | 75 ++++++++++++++++++++++++++++++++++++++------------ hw/virtio-9p.c | 24 +++++++++++---- 3 files changed, 76 insertions(+), 27 deletions(-) diff --git a/hw/file-op-9p.h b/hw/file-op-9p.h index 752fbad..0a9c10a 100644 --- a/hw/file-op-9p.h +++ b/hw/file-op-9p.h @@ -54,8 +54,8 @@ typedef struct FileOperations int (*mknod)(FsContext *, const char *, FsCred *); int (*utime)(FsContext *, const char *, const struct utimbuf *); int (*remove)(FsContext *, const char *); - int (*symlink)(FsContext *, const char *, const char *); - int (*link)(FsContext *, const char *, const char *); + int (*symlink)(FsContext *, const char *, const char *, FsCred *); + int (*link)(FsContext *, const char *, const char *, FsCred *); int (*setuid)(FsContext *, uid_t); int (*close)(FsContext *, int); int (*closedir)(FsContext *, DIR *); diff --git a/hw/virtio-9p-local.c b/hw/virtio-9p-local.c index 5d3d99c..992ad09 100644 --- a/hw/virtio-9p-local.c +++ b/hw/virtio-9p-local.c @@ -64,12 +64,25 @@ static int local_set_xattr(const char *path, FsCred *credp) } } return 0; - } +} -static ssize_t local_readlink(FsContext *ctx, const char *path, - char *buf, size_t bufsz) +static ssize_t local_readlink(FsContext *fs_ctx, const char *path, + char *buf, size_t bufsz) { - return readlink(rpath(ctx, path), buf, bufsz); + ssize_t tsize = -1; + if (fs_ctx->fs_sm == sm_mapped) { + int fd; + fd = open(rpath(fs_ctx, path), O_RDONLY); + if (fd == -1) { + return -1; + } + tsize = read(fd, (void *)buf, bufsz); + close(fd); + return tsize; + } else if (fs_ctx->fs_sm == sm_passthrough) { + tsize = readlink(rpath(fs_ctx, path), buf, bufsz); + } + return tsize; } static int local_close(FsContext *ctx, int fd) @@ -212,32 +225,58 @@ err_end: return fd; } -static int local_symlink(FsContext *ctx, const char *oldpath, - const char *newpath) + +static int local_symlink(FsContext *fs_ctx, const char *oldpath, + const char *newpath, FsCred *credp) { - return symlink(oldpath, rpath(ctx, newpath)); + int err = -1; + /* Determine the security model */ + if (fs_ctx->fs_sm == sm_mapped) { + int fd; + ssize_t oldpath_size, write_size; + fd = open(rpath(fs_ctx, newpath), O_CREAT|O_EXCL|O_RDWR, + SM_LOCAL_MODE_BITS); + if (fd == -1) { + return -1; + } + /* Write the oldpath (target) to the file. */ + oldpath_size = strlen(oldpath) + 1; + write_size = write(fd, (void *)oldpath, oldpath_size); + if (write_size != oldpath_size) { + close(fd); + remove(rpath(fs_ctx, newpath)); + return -1; + } + close(fd); + /* Set cleint credentials in symlink's xattr */ + credp->fc_mode = credp->fc_mode|S_IFLNK; + err = local_set_xattr(rpath(fs_ctx, newpath), credp); + if (err == -1) { + remove(rpath(fs_ctx, newpath)); + return err; + } + } else if (fs_ctx->fs_sm == sm_passthrough) { + err = symlink(oldpath, rpath(fs_ctx, newpath)); + chmod(rpath(fs_ctx, newpath), credp->fc_mode & 07777); + chown(rpath(fs_ctx, newpath), credp->fc_uid, credp->fc_gid); + } + return err; } -static int local_link(FsContext *ctx, const char *oldpath, const char *newpath) +static int local_link(FsContext *fs_ctx, const char *oldpath, + const char *newpath, FsCred *credp) { - char *tmp = qemu_strdup(rpath(ctx, oldpath)); - int err, serrno = 0; + char *tmp = qemu_strdup(rpath(fs_ctx, oldpath)); + int err; if (tmp == NULL) { return -ENOMEM; } - err = link(tmp, rpath(ctx, newpath)); - if (err == -1) { - serrno = errno; - } + err = link(tmp, rpath(fs_ctx, newpath)); qemu_free(tmp); - if (err == -1) { - errno = serrno; - } - return err; } diff --git a/hw/virtio-9p.c b/hw/virtio-9p.c index 30f649d..fbc846b 100644 --- a/hw/virtio-9p.c +++ b/hw/virtio-9p.c @@ -197,15 +197,25 @@ static int v9fs_do_open2(V9fsState *s, V9fsCreateState *vs) return s->ops->open2(&s->ctx, vs->fullname.data, flags, &cred); } -static int v9fs_do_symlink(V9fsState *s, V9fsString *oldpath, - V9fsString *newpath) +static int v9fs_do_symlink(V9fsState *s, V9fsCreateState *vs) { - return s->ops->symlink(&s->ctx, oldpath->data, newpath->data); + FsCred cred; + cred_init(&cred); + cred.fc_uid = vs->fidp->uid; + cred.fc_mode = vs->perm | 0777; + + return s->ops->symlink(&s->ctx, vs->extension.data, vs->fullname.data, + &cred); } -static int v9fs_do_link(V9fsState *s, V9fsString *oldpath, V9fsString *newpath) +static int v9fs_do_link(V9fsState *s, V9fsFidState *nfidp, V9fsCreateState *vs) { - return s->ops->link(&s->ctx, oldpath->data, newpath->data); + FsCred cred; + cred_init(&cred); + cred.fc_uid = nfidp->uid; + cred.fc_mode = vs->perm & 0777; + + return s->ops->link(&s->ctx, nfidp->path.data, vs->fullname.data, &cred); } static int v9fs_do_truncate(V9fsState *s, V9fsString *path, off_t size) @@ -1782,7 +1792,7 @@ static void v9fs_create_post_lstat(V9fsState *s, V9fsCreateState *vs, int err) err = v9fs_do_mkdir(s, vs); v9fs_create_post_mkdir(s, vs, err); } else if (vs->perm & P9_STAT_MODE_SYMLINK) { - err = v9fs_do_symlink(s, &vs->extension, &vs->fullname); + err = v9fs_do_symlink(s, vs); v9fs_create_post_perms(s, vs, err); } else if (vs->perm & P9_STAT_MODE_LINK) { int32_t nfid = atoi(vs->extension.data); @@ -1791,7 +1801,7 @@ static void v9fs_create_post_lstat(V9fsState *s, V9fsCreateState *vs, int err) err = -errno; v9fs_post_create(s, vs, err); } - err = v9fs_do_link(s, &nfidp->path, &vs->fullname); + err = v9fs_do_link(s, nfidp, vs); v9fs_create_post_perms(s, vs, err); } else if (vs->perm & P9_STAT_MODE_DEVICE) { char ctype; -- 1.6.5.2