[edk2-devel] [edk2 PATCH 48/48] OvmfPkg/VirtioFsDxe: handle attribute updates in EFI_FILE_PROTOCOL.SetInfo
Laszlo Ersek
lersek at redhat.com
Wed Dec 16 21:11:25 UTC 2020
Using the functions introduced previously, we can now update file
attributes in VirtioFsSimpleFileSetInfo().
Cc: Ard Biesheuvel <ard.biesheuvel at arm.com>
Cc: Jordan Justen <jordan.l.justen at intel.com>
Cc: Philippe Mathieu-Daudé <philmd at redhat.com>
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3097
Signed-off-by: Laszlo Ersek <lersek at redhat.com>
---
OvmfPkg/VirtioFsDxe/SimpleFsSetInfo.c | 107 +++++++++++++++++++-
1 file changed, 106 insertions(+), 1 deletion(-)
diff --git a/OvmfPkg/VirtioFsDxe/SimpleFsSetInfo.c b/OvmfPkg/VirtioFsDxe/SimpleFsSetInfo.c
index 55169dde78b7..e7cc3d5dc399 100644
--- a/OvmfPkg/VirtioFsDxe/SimpleFsSetInfo.c
+++ b/OvmfPkg/VirtioFsDxe/SimpleFsSetInfo.c
@@ -303,16 +303,121 @@ Rename (
FreeDestination:
if (Destination != NULL) {
FreePool (Destination);
}
return Status;
}
+/**
+ Update the attributes of a VIRTIO_FS_FILE as requested in EFI_FILE_INFO.
+
+ @param[in,out] VirtioFsFile The VIRTIO_FS_FILE to update the attributes of.
+
+ @param[in] NewFileInfo The new attributes requested by
+ EFI_FILE_PROTOCOL.SetInfo(). NewFileInfo->Size
+ and NewFileInfo->FileName are ignored.
+
+ @retval EFI_SUCCESS No attributes had to be updated.
+
+ @retval EFI_SUCCESS The required set of attribute updates has been
+ determined and performed successfully.
+
+ @retval EFI_ACCESS_DENIED NewFileInfo requests an update to a property
+ different from the EFI_FILE_READ_ONLY bit in the
+ Attribute field, but VirtioFsFile is not open for
+ writing.
+
+ @return Error codes propagated from underlying functions.
+**/
+STATIC
+EFI_STATUS
+UpdateAttributes (
+ IN OUT VIRTIO_FS_FILE *VirtioFsFile,
+ IN EFI_FILE_INFO *NewFileInfo
+ )
+{
+ VIRTIO_FS *VirtioFs;
+ EFI_STATUS Status;
+ VIRTIO_FS_FUSE_ATTRIBUTES_RESPONSE FuseAttr;
+ EFI_FILE_INFO FileInfo;
+ BOOLEAN UpdateFileSize;
+ UINT64 FileSize;
+ BOOLEAN UpdateAtime;
+ BOOLEAN UpdateMtime;
+ UINT64 Atime;
+ UINT64 Mtime;
+ BOOLEAN UpdateMode;
+ UINT32 Mode;
+
+ VirtioFs = VirtioFsFile->OwnerFs;
+
+ //
+ // Fetch the current attributes first, so we can build the difference between
+ // them and NewFileInfo.
+ //
+ Status = VirtioFsFuseGetAttr (VirtioFs, VirtioFsFile->NodeId, &FuseAttr);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ Status = VirtioFsFuseAttrToEfiFileInfo (&FuseAttr, &FileInfo);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ //
+ // Collect the updates.
+ //
+ if (VirtioFsFile->IsDirectory) {
+ UpdateFileSize = FALSE;
+ } else {
+ VirtioFsGetFuseSizeUpdate (&FileInfo, NewFileInfo, &UpdateFileSize,
+ &FileSize);
+ }
+
+ Status = VirtioFsGetFuseTimeUpdates (&FileInfo, NewFileInfo, &UpdateAtime,
+ &UpdateMtime, &Atime, &Mtime);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ Status = VirtioFsGetFuseModeUpdate (&FileInfo, NewFileInfo, &UpdateMode,
+ &Mode);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ //
+ // If no attribute updates are necessary, we're done.
+ //
+ if (!UpdateFileSize && !UpdateAtime && !UpdateMtime && !UpdateMode) {
+ return EFI_SUCCESS;
+ }
+ //
+ // If the file is not open for writing, then only Mode may be updated (for
+ // toggling EFI_FILE_READ_ONLY).
+ //
+ if (!VirtioFsFile->IsOpenForWriting &&
+ (UpdateFileSize || UpdateAtime || UpdateMtime)) {
+ return EFI_ACCESS_DENIED;
+ }
+ //
+ // Send the FUSE_SETATTR request now.
+ //
+ Status = VirtioFsFuseSetAttr (
+ VirtioFs,
+ VirtioFsFile->NodeId,
+ UpdateFileSize ? &FileSize : NULL,
+ UpdateAtime ? &Atime : NULL,
+ UpdateMtime ? &Mtime : NULL,
+ UpdateMode ? &Mode : NULL
+ );
+ return Status;
+}
+
/**
Process an EFI_FILE_INFO setting request.
**/
STATIC
EFI_STATUS
SetFileInfo (
IN EFI_FILE_PROTOCOL *This,
IN UINTN BufferSize,
@@ -345,17 +450,17 @@ SetFileInfo (
//
Status = Rename (VirtioFsFile, FileInfo->FileName);
if (EFI_ERROR (Status)) {
return Status;
}
//
// Update any attributes requested.
//
- Status = EFI_UNSUPPORTED;
+ Status = UpdateAttributes (VirtioFsFile, FileInfo);
//
// The UEFI spec does not speak about partial failure in
// EFI_FILE_PROTOCOL.SetInfo(); we won't try to roll back the rename (if
// there was one) in case the attribute updates fail.
//
return Status;
}
--
2.19.1.3.g30247aa5d201
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#69062): https://edk2.groups.io/g/devel/message/69062
Mute This Topic: https://groups.io/mt/79024765/1813853
Group Owner: devel+owner at edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [edk2-devel-archive at redhat.com]
-=-=-=-=-=-=-=-=-=-=-=-
More information about the edk2-devel-archive
mailing list