Files
libguestfs/daemon
Cole Robinson a2e7dfc73b New API: ntfs_chmod
Add an API to do the equivalent of `chmod [-r] MODE PATH` for
NTFS filesystems.

Files created on a linux ntfs-3g mount can not change permissions
directly. New files and directories are created with rough windows
equivalent of `chmod 777`. These wide open permissions can generate
security warnings on windows after virt-v2v installs bits into
`Program Files\Guestfs`.

Behind the scenes we use `ntfssecaudit(8)` from `ntfsprogs`
which is already part of the appliance. We only expose the chmod-style
feature; the rest of `ntfssecaudit` is concerned reporting and
managing fine grained windows security info which is way more than
we need.

Also note, `ntfssecaudit` needs to run on an unmounted partition
so using this is more complicated than a traditional `chmod` call.

Related: https://issues.redhat.com/browse/RHEL-104352

Signed-off-by: Cole Robinson <crobinso@redhat.com>
2025-09-09 16:29:13 +01:00
..
2022-03-09 09:28:02 +00:00
2017-07-27 17:31:41 +01:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2025-05-11 12:37:23 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2025-02-16 17:00:46 +00:00
2025-05-11 21:29:23 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-05-11 21:29:23 +01:00
2017-07-27 17:31:41 +01:00
2017-07-27 17:31:41 +01:00
2017-07-27 17:31:41 +01:00
2025-02-16 17:00:46 +00:00
2018-04-19 11:30:29 +02:00
2025-02-16 17:00:46 +00:00
2025-04-29 19:05:07 +01:00
2025-02-16 17:00:46 +00:00
2025-05-11 12:37:23 +01:00
2025-02-16 17:00:46 +00:00
2025-05-11 21:29:23 +01:00
2017-07-27 17:31:41 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-05-11 21:29:23 +01:00
2025-03-03 14:22:37 +00:00
2025-02-16 17:00:46 +00:00
2025-03-03 14:22:37 +00:00
2025-03-03 14:22:37 +00:00
2025-05-11 12:37:23 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2025-05-11 21:29:23 +01:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-05-11 21:29:23 +01:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2025-05-11 21:29:23 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-09-09 16:29:13 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2017-07-27 17:31:41 +01:00
2017-07-27 17:31:41 +01:00
2025-05-11 21:29:23 +01:00
2025-02-19 12:01:10 +00:00
2017-07-27 17:31:41 +01:00
2017-07-27 17:31:41 +01:00
2017-07-10 17:01:59 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2025-02-16 17:00:46 +00:00
2021-03-30 12:56:58 +01:00
2025-02-16 17:00:46 +00:00
2017-07-27 17:31:41 +01:00