1 // SPDX-License-Identifier: GPL-2.0 1 // SPDX-License-Identifier: GPL-2.0 2 /* 2 /* 3 * linux/fs/stat.c 3 * linux/fs/stat.c 4 * 4 * 5 * Copyright (C) 1991, 1992 Linus Torvalds 5 * Copyright (C) 1991, 1992 Linus Torvalds 6 */ 6 */ 7 7 8 #include <linux/blkdev.h> << 9 #include <linux/export.h> 8 #include <linux/export.h> 10 #include <linux/mm.h> 9 #include <linux/mm.h> 11 #include <linux/errno.h> 10 #include <linux/errno.h> 12 #include <linux/file.h> 11 #include <linux/file.h> 13 #include <linux/highuid.h> 12 #include <linux/highuid.h> 14 #include <linux/fs.h> 13 #include <linux/fs.h> 15 #include <linux/namei.h> 14 #include <linux/namei.h> 16 #include <linux/security.h> 15 #include <linux/security.h> 17 #include <linux/cred.h> 16 #include <linux/cred.h> 18 #include <linux/syscalls.h> 17 #include <linux/syscalls.h> 19 #include <linux/pagemap.h> 18 #include <linux/pagemap.h> 20 #include <linux/compat.h> 19 #include <linux/compat.h> 21 #include <linux/iversion.h> << 22 20 23 #include <linux/uaccess.h> 21 #include <linux/uaccess.h> 24 #include <asm/unistd.h> 22 #include <asm/unistd.h> 25 23 26 #include "internal.h" << 27 #include "mount.h" << 28 << 29 /** 24 /** 30 * generic_fillattr - Fill in the basic attrib 25 * generic_fillattr - Fill in the basic attributes from the inode struct 31 * @idmap: idmap of the mount the !! 26 * @inode: Inode to use as the source 32 * @request_mask: statx request_mask !! 27 * @stat: Where to fill in the attributes 33 * @inode: Inode to use as the so << 34 * @stat: Where to fill in the a << 35 * 28 * 36 * Fill in the basic attributes in the kstat s 29 * Fill in the basic attributes in the kstat structure from data that's to be 37 * found on the VFS inode structure. This is 30 * found on the VFS inode structure. This is the default if no getattr inode 38 * operation is supplied. 31 * operation is supplied. 39 * << 40 * If the inode has been found through an idma << 41 * the vfsmount must be passed through @idmap. << 42 * take care to map the inode according to @id << 43 * uid and gid filds. On non-idmapped mounts o << 44 * performed on the raw inode simply pass @nop << 45 */ 32 */ 46 void generic_fillattr(struct mnt_idmap *idmap, !! 33 void generic_fillattr(struct inode *inode, struct kstat *stat) 47 struct inode *inode, str << 48 { 34 { 49 vfsuid_t vfsuid = i_uid_into_vfsuid(id << 50 vfsgid_t vfsgid = i_gid_into_vfsgid(id << 51 << 52 stat->dev = inode->i_sb->s_dev; 35 stat->dev = inode->i_sb->s_dev; 53 stat->ino = inode->i_ino; 36 stat->ino = inode->i_ino; 54 stat->mode = inode->i_mode; 37 stat->mode = inode->i_mode; 55 stat->nlink = inode->i_nlink; 38 stat->nlink = inode->i_nlink; 56 stat->uid = vfsuid_into_kuid(vfsuid); !! 39 stat->uid = inode->i_uid; 57 stat->gid = vfsgid_into_kgid(vfsgid); !! 40 stat->gid = inode->i_gid; 58 stat->rdev = inode->i_rdev; 41 stat->rdev = inode->i_rdev; 59 stat->size = i_size_read(inode); 42 stat->size = i_size_read(inode); 60 stat->atime = inode_get_atime(inode); !! 43 stat->atime = inode->i_atime; 61 stat->mtime = inode_get_mtime(inode); !! 44 stat->mtime = inode->i_mtime; 62 stat->ctime = inode_get_ctime(inode); !! 45 stat->ctime = inode->i_ctime; 63 stat->blksize = i_blocksize(inode); 46 stat->blksize = i_blocksize(inode); 64 stat->blocks = inode->i_blocks; 47 stat->blocks = inode->i_blocks; 65 << 66 if ((request_mask & STATX_CHANGE_COOKI << 67 stat->result_mask |= STATX_CHA << 68 stat->change_cookie = inode_qu << 69 } << 70 << 71 } 48 } 72 EXPORT_SYMBOL(generic_fillattr); 49 EXPORT_SYMBOL(generic_fillattr); 73 50 74 /** 51 /** 75 * generic_fill_statx_attr - Fill in the statx << 76 * @inode: Inode to use as the source << 77 * @stat: Where to fill in the attribute << 78 * << 79 * Fill in the STATX_ATTR_* flags in the kstat << 80 * inode that are published on i_flags and enf << 81 */ << 82 void generic_fill_statx_attr(struct inode *ino << 83 { << 84 if (inode->i_flags & S_IMMUTABLE) << 85 stat->attributes |= STATX_ATTR << 86 if (inode->i_flags & S_APPEND) << 87 stat->attributes |= STATX_ATTR << 88 stat->attributes_mask |= KSTAT_ATTR_VF << 89 } << 90 EXPORT_SYMBOL(generic_fill_statx_attr); << 91 << 92 /** << 93 * generic_fill_statx_atomic_writes - Fill in << 94 * @stat: Where to fill in the attribute << 95 * @unit_min: Minimum supported atomic write << 96 * @unit_max: Maximum supported atomic write << 97 * << 98 * Fill in the STATX{_ATTR}_WRITE_ATOMIC flags << 99 * atomic write unit_min and unit_max values. << 100 */ << 101 void generic_fill_statx_atomic_writes(struct k << 102 unsigned << 103 unsigned << 104 { << 105 /* Confirm that the request type is kn << 106 stat->result_mask |= STATX_WRITE_ATOMI << 107 << 108 /* Confirm that the file attribute typ << 109 stat->attributes_mask |= STATX_ATTR_WR << 110 << 111 if (unit_min) { << 112 stat->atomic_write_unit_min = << 113 stat->atomic_write_unit_max = << 114 /* Initially only allow 1x seg << 115 stat->atomic_write_segments_ma << 116 << 117 /* Confirm atomic writes are a << 118 stat->attributes |= STATX_ATTR << 119 } << 120 } << 121 EXPORT_SYMBOL_GPL(generic_fill_statx_atomic_wr << 122 << 123 /** << 124 * vfs_getattr_nosec - getattr without securit 52 * vfs_getattr_nosec - getattr without security checks 125 * @path: file to get attributes from 53 * @path: file to get attributes from 126 * @stat: structure to return attributes in 54 * @stat: structure to return attributes in 127 * @request_mask: STATX_xxx flags indicating w 55 * @request_mask: STATX_xxx flags indicating what the caller wants 128 * @query_flags: Query mode (AT_STATX_SYNC_TYP !! 56 * @query_flags: Query mode (KSTAT_QUERY_FLAGS) 129 * 57 * 130 * Get attributes without calling security_ino 58 * Get attributes without calling security_inode_getattr. 131 * 59 * 132 * Currently the only caller other than vfs_ge 60 * Currently the only caller other than vfs_getattr is internal to the 133 * filehandle lookup code, which uses only the 61 * filehandle lookup code, which uses only the inode number and returns no 134 * attributes to any user. Any other code pro 62 * attributes to any user. Any other code probably wants vfs_getattr. 135 */ 63 */ 136 int vfs_getattr_nosec(const struct path *path, 64 int vfs_getattr_nosec(const struct path *path, struct kstat *stat, 137 u32 request_mask, unsign 65 u32 request_mask, unsigned int query_flags) 138 { 66 { 139 struct mnt_idmap *idmap; << 140 struct inode *inode = d_backing_inode( 67 struct inode *inode = d_backing_inode(path->dentry); 141 68 142 memset(stat, 0, sizeof(*stat)); 69 memset(stat, 0, sizeof(*stat)); 143 stat->result_mask |= STATX_BASIC_STATS 70 stat->result_mask |= STATX_BASIC_STATS; 144 query_flags &= AT_STATX_SYNC_TYPE; !! 71 request_mask &= STATX_ALL; >> 72 query_flags &= KSTAT_QUERY_FLAGS; 145 73 146 /* allow the fs to override these if i 74 /* allow the fs to override these if it really wants to */ 147 /* SB_NOATIME means filesystem supplie !! 75 if (IS_NOATIME(inode)) 148 if (inode->i_sb->s_flags & SB_NOATIME) << 149 stat->result_mask &= ~STATX_AT 76 stat->result_mask &= ~STATX_ATIME; 150 << 151 /* << 152 * Note: If you add another clause to << 153 * update attributes_mask below. << 154 */ << 155 if (IS_AUTOMOUNT(inode)) 77 if (IS_AUTOMOUNT(inode)) 156 stat->attributes |= STATX_ATTR 78 stat->attributes |= STATX_ATTR_AUTOMOUNT; 157 79 158 if (IS_DAX(inode)) << 159 stat->attributes |= STATX_ATTR << 160 << 161 stat->attributes_mask |= (STATX_ATTR_A << 162 STATX_ATTR_D << 163 << 164 idmap = mnt_idmap(path->mnt); << 165 if (inode->i_op->getattr) 80 if (inode->i_op->getattr) 166 return inode->i_op->getattr(id !! 81 return inode->i_op->getattr(path, stat, request_mask, 167 re !! 82 query_flags); 168 qu << 169 83 170 generic_fillattr(idmap, request_mask, !! 84 generic_fillattr(inode, stat); 171 return 0; 85 return 0; 172 } 86 } 173 EXPORT_SYMBOL(vfs_getattr_nosec); 87 EXPORT_SYMBOL(vfs_getattr_nosec); 174 88 175 /* 89 /* 176 * vfs_getattr - Get the enhanced basic attrib 90 * vfs_getattr - Get the enhanced basic attributes of a file 177 * @path: The file of interest 91 * @path: The file of interest 178 * @stat: Where to return the statistics 92 * @stat: Where to return the statistics 179 * @request_mask: STATX_xxx flags indicating w 93 * @request_mask: STATX_xxx flags indicating what the caller wants 180 * @query_flags: Query mode (AT_STATX_SYNC_TYP !! 94 * @query_flags: Query mode (KSTAT_QUERY_FLAGS) 181 * 95 * 182 * Ask the filesystem for a file's attributes. 96 * Ask the filesystem for a file's attributes. The caller must indicate in 183 * request_mask and query_flags to indicate wh 97 * request_mask and query_flags to indicate what they want. 184 * 98 * 185 * If the file is remote, the filesystem can b 99 * If the file is remote, the filesystem can be forced to update the attributes 186 * from the backing store by passing AT_STATX_ 100 * from the backing store by passing AT_STATX_FORCE_SYNC in query_flags or can 187 * suppress the update by passing AT_STATX_DON 101 * suppress the update by passing AT_STATX_DONT_SYNC. 188 * 102 * 189 * Bits must have been set in request_mask to 103 * Bits must have been set in request_mask to indicate which attributes the 190 * caller wants retrieving. Any such attribut 104 * caller wants retrieving. Any such attribute not requested may be returned 191 * anyway, but the value may be approximate, a 105 * anyway, but the value may be approximate, and, if remote, may not have been 192 * synchronised with the server. 106 * synchronised with the server. 193 * 107 * 194 * 0 will be returned on success, and a -ve er 108 * 0 will be returned on success, and a -ve error code if unsuccessful. 195 */ 109 */ 196 int vfs_getattr(const struct path *path, struc 110 int vfs_getattr(const struct path *path, struct kstat *stat, 197 u32 request_mask, unsigned int 111 u32 request_mask, unsigned int query_flags) 198 { 112 { 199 int retval; 113 int retval; 200 114 201 if (WARN_ON_ONCE(query_flags & AT_GETA << 202 return -EPERM; << 203 << 204 retval = security_inode_getattr(path); 115 retval = security_inode_getattr(path); 205 if (retval) 116 if (retval) 206 return retval; 117 return retval; 207 return vfs_getattr_nosec(path, stat, r 118 return vfs_getattr_nosec(path, stat, request_mask, query_flags); 208 } 119 } 209 EXPORT_SYMBOL(vfs_getattr); 120 EXPORT_SYMBOL(vfs_getattr); 210 121 211 /** 122 /** 212 * vfs_fstat - Get the basic attributes by fil !! 123 * vfs_statx_fd - Get the enhanced basic attributes by file descriptor 213 * @fd: The file descriptor referring to the f 124 * @fd: The file descriptor referring to the file of interest 214 * @stat: The result structure to fill in. 125 * @stat: The result structure to fill in. >> 126 * @request_mask: STATX_xxx flags indicating what the caller wants >> 127 * @query_flags: Query mode (KSTAT_QUERY_FLAGS) 215 * 128 * 216 * This function is a wrapper around vfs_getat 129 * This function is a wrapper around vfs_getattr(). The main difference is 217 * that it uses a file descriptor to determine 130 * that it uses a file descriptor to determine the file location. 218 * 131 * 219 * 0 will be returned on success, and a -ve er 132 * 0 will be returned on success, and a -ve error code if unsuccessful. 220 */ 133 */ 221 int vfs_fstat(int fd, struct kstat *stat) !! 134 int vfs_statx_fd(unsigned int fd, struct kstat *stat, >> 135 u32 request_mask, unsigned int query_flags) 222 { 136 { 223 struct fd f; 137 struct fd f; 224 int error; !! 138 int error = -EBADF; 225 << 226 f = fdget_raw(fd); << 227 if (!f.file) << 228 return -EBADF; << 229 error = vfs_getattr(&f.file->f_path, s << 230 fdput(f); << 231 return error; << 232 } << 233 << 234 int getname_statx_lookup_flags(int flags) << 235 { << 236 int lookup_flags = 0; << 237 << 238 if (!(flags & AT_SYMLINK_NOFOLLOW)) << 239 lookup_flags |= LOOKUP_FOLLOW; << 240 if (!(flags & AT_NO_AUTOMOUNT)) << 241 lookup_flags |= LOOKUP_AUTOMOU << 242 if (flags & AT_EMPTY_PATH) << 243 lookup_flags |= LOOKUP_EMPTY; << 244 139 245 return lookup_flags; !! 140 if (query_flags & ~KSTAT_QUERY_FLAGS) 246 } !! 141 return -EINVAL; 247 << 248 static int vfs_statx_path(struct path *path, i << 249 u32 request_mask) << 250 { << 251 int error = vfs_getattr(path, stat, re << 252 142 253 if (request_mask & STATX_MNT_ID_UNIQUE !! 143 f = fdget_raw(fd); 254 stat->mnt_id = real_mount(path !! 144 if (f.file) { 255 stat->result_mask |= STATX_MNT !! 145 error = vfs_getattr(&f.file->f_path, stat, 256 } else { !! 146 request_mask, query_flags); 257 stat->mnt_id = real_mount(path !! 147 fdput(f); 258 stat->result_mask |= STATX_MNT << 259 } 148 } 260 << 261 if (path_mounted(path)) << 262 stat->attributes |= STATX_ATTR << 263 stat->attributes_mask |= STATX_ATTR_MO << 264 << 265 /* << 266 * If this is a block device inode, ov << 267 * attributes with the block device sp << 268 * obtained from the bdev backing inod << 269 */ << 270 if (S_ISBLK(stat->mode)) << 271 bdev_statx(path, stat, request << 272 << 273 return error; 149 return error; 274 } 150 } 275 !! 151 EXPORT_SYMBOL(vfs_statx_fd); 276 static int vfs_statx_fd(int fd, int flags, str << 277 u32 request_mask) << 278 { << 279 CLASS(fd_raw, f)(fd); << 280 if (!f.file) << 281 return -EBADF; << 282 return vfs_statx_path(&f.file->f_path, << 283 } << 284 152 285 /** 153 /** 286 * vfs_statx - Get basic and extra attributes 154 * vfs_statx - Get basic and extra attributes by filename 287 * @dfd: A file descriptor representing the ba 155 * @dfd: A file descriptor representing the base dir for a relative filename 288 * @filename: The name of the file of interest 156 * @filename: The name of the file of interest 289 * @flags: Flags to control the query 157 * @flags: Flags to control the query 290 * @stat: The result structure to fill in. 158 * @stat: The result structure to fill in. 291 * @request_mask: STATX_xxx flags indicating w 159 * @request_mask: STATX_xxx flags indicating what the caller wants 292 * 160 * 293 * This function is a wrapper around vfs_getat 161 * This function is a wrapper around vfs_getattr(). The main difference is 294 * that it uses a filename and base directory 162 * that it uses a filename and base directory to determine the file location. 295 * Additionally, the use of AT_SYMLINK_NOFOLLO 163 * Additionally, the use of AT_SYMLINK_NOFOLLOW in flags will prevent a symlink 296 * at the given name from being referenced. 164 * at the given name from being referenced. 297 * 165 * 298 * 0 will be returned on success, and a -ve er 166 * 0 will be returned on success, and a -ve error code if unsuccessful. 299 */ 167 */ 300 static int vfs_statx(int dfd, struct filename !! 168 int vfs_statx(int dfd, const char __user *filename, int flags, 301 struct kstat *stat, u32 request_ 169 struct kstat *stat, u32 request_mask) 302 { 170 { 303 struct path path; 171 struct path path; 304 unsigned int lookup_flags = getname_st !! 172 int error = -EINVAL; 305 int error; !! 173 unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_AUTOMOUNT; 306 174 307 if (flags & ~(AT_SYMLINK_NOFOLLOW | AT !! 175 if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT | 308 AT_STATX_SYNC_TYPE)) !! 176 AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0) 309 return -EINVAL; 177 return -EINVAL; 310 178 >> 179 if (flags & AT_SYMLINK_NOFOLLOW) >> 180 lookup_flags &= ~LOOKUP_FOLLOW; >> 181 if (flags & AT_NO_AUTOMOUNT) >> 182 lookup_flags &= ~LOOKUP_AUTOMOUNT; >> 183 if (flags & AT_EMPTY_PATH) >> 184 lookup_flags |= LOOKUP_EMPTY; >> 185 311 retry: 186 retry: 312 error = filename_lookup(dfd, filename, !! 187 error = user_path_at(dfd, filename, lookup_flags, &path); 313 if (error) 188 if (error) 314 return error; !! 189 goto out; 315 error = vfs_statx_path(&path, flags, s !! 190 >> 191 error = vfs_getattr(&path, stat, request_mask, flags); 316 path_put(&path); 192 path_put(&path); 317 if (retry_estale(error, lookup_flags)) 193 if (retry_estale(error, lookup_flags)) { 318 lookup_flags |= LOOKUP_REVAL; 194 lookup_flags |= LOOKUP_REVAL; 319 goto retry; 195 goto retry; 320 } 196 } >> 197 out: 321 return error; 198 return error; 322 } 199 } >> 200 EXPORT_SYMBOL(vfs_statx); 323 201 324 int vfs_fstatat(int dfd, const char __user *fi << 325 struct kstat *st << 326 { << 327 int ret; << 328 int statx_flags = flags | AT_NO_AUTOMO << 329 struct filename *name; << 330 << 331 /* << 332 * Work around glibc turning fstat() i << 333 * << 334 * If AT_EMPTY_PATH is set, we expect << 335 * empty path, and avoid doing all the << 336 */ << 337 if (flags == AT_EMPTY_PATH && vfs_empt << 338 return vfs_fstat(dfd, stat); << 339 << 340 name = getname_flags(filename, getname << 341 ret = vfs_statx(dfd, name, statx_flags << 342 putname(name); << 343 << 344 return ret; << 345 } << 346 202 347 #ifdef __ARCH_WANT_OLD_STAT 203 #ifdef __ARCH_WANT_OLD_STAT 348 204 349 /* 205 /* 350 * For backward compatibility? Maybe this sho 206 * For backward compatibility? Maybe this should be moved 351 * into arch/i386 instead? 207 * into arch/i386 instead? 352 */ 208 */ 353 static int cp_old_stat(struct kstat *stat, str 209 static int cp_old_stat(struct kstat *stat, struct __old_kernel_stat __user * statbuf) 354 { 210 { 355 static int warncount = 5; 211 static int warncount = 5; 356 struct __old_kernel_stat tmp; 212 struct __old_kernel_stat tmp; 357 213 358 if (warncount > 0) { 214 if (warncount > 0) { 359 warncount--; 215 warncount--; 360 printk(KERN_WARNING "VFS: Warn 216 printk(KERN_WARNING "VFS: Warning: %s using old stat() call. Recompile your binary.\n", 361 current->comm); 217 current->comm); 362 } else if (warncount < 0) { 218 } else if (warncount < 0) { 363 /* it's laughable, but... */ 219 /* it's laughable, but... */ 364 warncount = 0; 220 warncount = 0; 365 } 221 } 366 222 367 memset(&tmp, 0, sizeof(struct __old_ke 223 memset(&tmp, 0, sizeof(struct __old_kernel_stat)); 368 tmp.st_dev = old_encode_dev(stat->dev) 224 tmp.st_dev = old_encode_dev(stat->dev); 369 tmp.st_ino = stat->ino; 225 tmp.st_ino = stat->ino; 370 if (sizeof(tmp.st_ino) < sizeof(stat-> 226 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 371 return -EOVERFLOW; 227 return -EOVERFLOW; 372 tmp.st_mode = stat->mode; 228 tmp.st_mode = stat->mode; 373 tmp.st_nlink = stat->nlink; 229 tmp.st_nlink = stat->nlink; 374 if (tmp.st_nlink != stat->nlink) 230 if (tmp.st_nlink != stat->nlink) 375 return -EOVERFLOW; 231 return -EOVERFLOW; 376 SET_UID(tmp.st_uid, from_kuid_munged(c 232 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid)); 377 SET_GID(tmp.st_gid, from_kgid_munged(c 233 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid)); 378 tmp.st_rdev = old_encode_dev(stat->rde 234 tmp.st_rdev = old_encode_dev(stat->rdev); 379 #if BITS_PER_LONG == 32 235 #if BITS_PER_LONG == 32 380 if (stat->size > MAX_NON_LFS) 236 if (stat->size > MAX_NON_LFS) 381 return -EOVERFLOW; 237 return -EOVERFLOW; 382 #endif 238 #endif 383 tmp.st_size = stat->size; 239 tmp.st_size = stat->size; 384 tmp.st_atime = stat->atime.tv_sec; 240 tmp.st_atime = stat->atime.tv_sec; 385 tmp.st_mtime = stat->mtime.tv_sec; 241 tmp.st_mtime = stat->mtime.tv_sec; 386 tmp.st_ctime = stat->ctime.tv_sec; 242 tmp.st_ctime = stat->ctime.tv_sec; 387 return copy_to_user(statbuf,&tmp,sizeo 243 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0; 388 } 244 } 389 245 390 SYSCALL_DEFINE2(stat, const char __user *, fil 246 SYSCALL_DEFINE2(stat, const char __user *, filename, 391 struct __old_kernel_stat __use 247 struct __old_kernel_stat __user *, statbuf) 392 { 248 { 393 struct kstat stat; 249 struct kstat stat; 394 int error; 250 int error; 395 251 396 error = vfs_stat(filename, &stat); 252 error = vfs_stat(filename, &stat); 397 if (error) 253 if (error) 398 return error; 254 return error; 399 255 400 return cp_old_stat(&stat, statbuf); 256 return cp_old_stat(&stat, statbuf); 401 } 257 } 402 258 403 SYSCALL_DEFINE2(lstat, const char __user *, fi 259 SYSCALL_DEFINE2(lstat, const char __user *, filename, 404 struct __old_kernel_stat __use 260 struct __old_kernel_stat __user *, statbuf) 405 { 261 { 406 struct kstat stat; 262 struct kstat stat; 407 int error; 263 int error; 408 264 409 error = vfs_lstat(filename, &stat); 265 error = vfs_lstat(filename, &stat); 410 if (error) 266 if (error) 411 return error; 267 return error; 412 268 413 return cp_old_stat(&stat, statbuf); 269 return cp_old_stat(&stat, statbuf); 414 } 270 } 415 271 416 SYSCALL_DEFINE2(fstat, unsigned int, fd, struc 272 SYSCALL_DEFINE2(fstat, unsigned int, fd, struct __old_kernel_stat __user *, statbuf) 417 { 273 { 418 struct kstat stat; 274 struct kstat stat; 419 int error = vfs_fstat(fd, &stat); 275 int error = vfs_fstat(fd, &stat); 420 276 421 if (!error) 277 if (!error) 422 error = cp_old_stat(&stat, sta 278 error = cp_old_stat(&stat, statbuf); 423 279 424 return error; 280 return error; 425 } 281 } 426 282 427 #endif /* __ARCH_WANT_OLD_STAT */ 283 #endif /* __ARCH_WANT_OLD_STAT */ 428 284 429 #ifdef __ARCH_WANT_NEW_STAT 285 #ifdef __ARCH_WANT_NEW_STAT 430 286 >> 287 #if BITS_PER_LONG == 32 >> 288 # define choose_32_64(a,b) a >> 289 #else >> 290 # define choose_32_64(a,b) b >> 291 #endif >> 292 >> 293 #define valid_dev(x) choose_32_64(old_valid_dev(x),true) >> 294 #define encode_dev(x) choose_32_64(old_encode_dev,new_encode_dev)(x) >> 295 431 #ifndef INIT_STRUCT_STAT_PADDING 296 #ifndef INIT_STRUCT_STAT_PADDING 432 # define INIT_STRUCT_STAT_PADDING(st) memset( 297 # define INIT_STRUCT_STAT_PADDING(st) memset(&st, 0, sizeof(st)) 433 #endif 298 #endif 434 299 435 static int cp_new_stat(struct kstat *stat, str 300 static int cp_new_stat(struct kstat *stat, struct stat __user *statbuf) 436 { 301 { 437 struct stat tmp; 302 struct stat tmp; 438 303 439 if (sizeof(tmp.st_dev) < 4 && !old_val !! 304 if (!valid_dev(stat->dev) || !valid_dev(stat->rdev)) 440 return -EOVERFLOW; << 441 if (sizeof(tmp.st_rdev) < 4 && !old_va << 442 return -EOVERFLOW; 305 return -EOVERFLOW; 443 #if BITS_PER_LONG == 32 306 #if BITS_PER_LONG == 32 444 if (stat->size > MAX_NON_LFS) 307 if (stat->size > MAX_NON_LFS) 445 return -EOVERFLOW; 308 return -EOVERFLOW; 446 #endif 309 #endif 447 310 448 INIT_STRUCT_STAT_PADDING(tmp); 311 INIT_STRUCT_STAT_PADDING(tmp); 449 tmp.st_dev = new_encode_dev(stat->dev) !! 312 tmp.st_dev = encode_dev(stat->dev); 450 tmp.st_ino = stat->ino; 313 tmp.st_ino = stat->ino; 451 if (sizeof(tmp.st_ino) < sizeof(stat-> 314 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 452 return -EOVERFLOW; 315 return -EOVERFLOW; 453 tmp.st_mode = stat->mode; 316 tmp.st_mode = stat->mode; 454 tmp.st_nlink = stat->nlink; 317 tmp.st_nlink = stat->nlink; 455 if (tmp.st_nlink != stat->nlink) 318 if (tmp.st_nlink != stat->nlink) 456 return -EOVERFLOW; 319 return -EOVERFLOW; 457 SET_UID(tmp.st_uid, from_kuid_munged(c 320 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid)); 458 SET_GID(tmp.st_gid, from_kgid_munged(c 321 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid)); 459 tmp.st_rdev = new_encode_dev(stat->rde !! 322 tmp.st_rdev = encode_dev(stat->rdev); 460 tmp.st_size = stat->size; 323 tmp.st_size = stat->size; 461 tmp.st_atime = stat->atime.tv_sec; 324 tmp.st_atime = stat->atime.tv_sec; 462 tmp.st_mtime = stat->mtime.tv_sec; 325 tmp.st_mtime = stat->mtime.tv_sec; 463 tmp.st_ctime = stat->ctime.tv_sec; 326 tmp.st_ctime = stat->ctime.tv_sec; 464 #ifdef STAT_HAVE_NSEC 327 #ifdef STAT_HAVE_NSEC 465 tmp.st_atime_nsec = stat->atime.tv_nse 328 tmp.st_atime_nsec = stat->atime.tv_nsec; 466 tmp.st_mtime_nsec = stat->mtime.tv_nse 329 tmp.st_mtime_nsec = stat->mtime.tv_nsec; 467 tmp.st_ctime_nsec = stat->ctime.tv_nse 330 tmp.st_ctime_nsec = stat->ctime.tv_nsec; 468 #endif 331 #endif 469 tmp.st_blocks = stat->blocks; 332 tmp.st_blocks = stat->blocks; 470 tmp.st_blksize = stat->blksize; 333 tmp.st_blksize = stat->blksize; 471 return copy_to_user(statbuf,&tmp,sizeo 334 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0; 472 } 335 } 473 336 474 SYSCALL_DEFINE2(newstat, const char __user *, 337 SYSCALL_DEFINE2(newstat, const char __user *, filename, 475 struct stat __user *, statbuf) 338 struct stat __user *, statbuf) 476 { 339 { 477 struct kstat stat; 340 struct kstat stat; 478 int error = vfs_stat(filename, &stat); 341 int error = vfs_stat(filename, &stat); 479 342 480 if (error) 343 if (error) 481 return error; 344 return error; 482 return cp_new_stat(&stat, statbuf); 345 return cp_new_stat(&stat, statbuf); 483 } 346 } 484 347 485 SYSCALL_DEFINE2(newlstat, const char __user *, 348 SYSCALL_DEFINE2(newlstat, const char __user *, filename, 486 struct stat __user *, statbuf) 349 struct stat __user *, statbuf) 487 { 350 { 488 struct kstat stat; 351 struct kstat stat; 489 int error; 352 int error; 490 353 491 error = vfs_lstat(filename, &stat); 354 error = vfs_lstat(filename, &stat); 492 if (error) 355 if (error) 493 return error; 356 return error; 494 357 495 return cp_new_stat(&stat, statbuf); 358 return cp_new_stat(&stat, statbuf); 496 } 359 } 497 360 498 #if !defined(__ARCH_WANT_STAT64) || defined(__ 361 #if !defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_SYS_NEWFSTATAT) 499 SYSCALL_DEFINE4(newfstatat, int, dfd, const ch 362 SYSCALL_DEFINE4(newfstatat, int, dfd, const char __user *, filename, 500 struct stat __user *, statbuf, 363 struct stat __user *, statbuf, int, flag) 501 { 364 { 502 struct kstat stat; 365 struct kstat stat; 503 int error; 366 int error; 504 367 505 error = vfs_fstatat(dfd, filename, &st 368 error = vfs_fstatat(dfd, filename, &stat, flag); 506 if (error) 369 if (error) 507 return error; 370 return error; 508 return cp_new_stat(&stat, statbuf); 371 return cp_new_stat(&stat, statbuf); 509 } 372 } 510 #endif 373 #endif 511 374 512 SYSCALL_DEFINE2(newfstat, unsigned int, fd, st 375 SYSCALL_DEFINE2(newfstat, unsigned int, fd, struct stat __user *, statbuf) 513 { 376 { 514 struct kstat stat; 377 struct kstat stat; 515 int error = vfs_fstat(fd, &stat); 378 int error = vfs_fstat(fd, &stat); 516 379 517 if (!error) 380 if (!error) 518 error = cp_new_stat(&stat, sta 381 error = cp_new_stat(&stat, statbuf); 519 382 520 return error; 383 return error; 521 } 384 } 522 #endif 385 #endif 523 386 524 static int do_readlinkat(int dfd, const char _ 387 static int do_readlinkat(int dfd, const char __user *pathname, 525 char __user *buf, int 388 char __user *buf, int bufsiz) 526 { 389 { 527 struct path path; 390 struct path path; 528 struct filename *name; << 529 int error; 391 int error; >> 392 int empty = 0; 530 unsigned int lookup_flags = LOOKUP_EMP 393 unsigned int lookup_flags = LOOKUP_EMPTY; 531 394 532 if (bufsiz <= 0) 395 if (bufsiz <= 0) 533 return -EINVAL; 396 return -EINVAL; 534 397 535 retry: 398 retry: 536 name = getname_flags(pathname, lookup_ !! 399 error = user_path_at_empty(dfd, pathname, lookup_flags, &path, &empty); 537 error = filename_lookup(dfd, name, loo !! 400 if (!error) { 538 if (unlikely(error)) { !! 401 struct inode *inode = d_backing_inode(path.dentry); 539 putname(name); !! 402 540 return error; !! 403 error = empty ? -ENOENT : -EINVAL; 541 } !! 404 /* 542 !! 405 * AFS mountpoints allow readlink(2) but are not symlinks 543 /* !! 406 */ 544 * AFS mountpoints allow readlink(2) b !! 407 if (d_is_symlink(path.dentry) || inode->i_op->readlink) { 545 */ !! 408 error = security_inode_readlink(path.dentry); 546 if (d_is_symlink(path.dentry) || !! 409 if (!error) { 547 d_backing_inode(path.dentry)->i_op !! 410 touch_atime(&path); 548 error = security_inode_readlin !! 411 error = vfs_readlink(path.dentry, buf, bufsiz); 549 if (!error) { !! 412 } 550 touch_atime(&path); !! 413 } 551 error = vfs_readlink(p !! 414 path_put(&path); >> 415 if (retry_estale(error, lookup_flags)) { >> 416 lookup_flags |= LOOKUP_REVAL; >> 417 goto retry; 552 } 418 } 553 } else { << 554 error = (name->name[0] == '\0' << 555 } << 556 path_put(&path); << 557 putname(name); << 558 if (retry_estale(error, lookup_flags)) << 559 lookup_flags |= LOOKUP_REVAL; << 560 goto retry; << 561 } 419 } 562 return error; 420 return error; 563 } 421 } 564 422 565 SYSCALL_DEFINE4(readlinkat, int, dfd, const ch 423 SYSCALL_DEFINE4(readlinkat, int, dfd, const char __user *, pathname, 566 char __user *, buf, int, bufsi 424 char __user *, buf, int, bufsiz) 567 { 425 { 568 return do_readlinkat(dfd, pathname, bu 426 return do_readlinkat(dfd, pathname, buf, bufsiz); 569 } 427 } 570 428 571 SYSCALL_DEFINE3(readlink, const char __user *, 429 SYSCALL_DEFINE3(readlink, const char __user *, path, char __user *, buf, 572 int, bufsiz) 430 int, bufsiz) 573 { 431 { 574 return do_readlinkat(AT_FDCWD, path, b 432 return do_readlinkat(AT_FDCWD, path, buf, bufsiz); 575 } 433 } 576 434 577 435 578 /* ---------- LFS-64 ----------- */ 436 /* ---------- LFS-64 ----------- */ 579 #if defined(__ARCH_WANT_STAT64) || defined(__A 437 #if defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_COMPAT_STAT64) 580 438 581 #ifndef INIT_STRUCT_STAT64_PADDING 439 #ifndef INIT_STRUCT_STAT64_PADDING 582 # define INIT_STRUCT_STAT64_PADDING(st) memse 440 # define INIT_STRUCT_STAT64_PADDING(st) memset(&st, 0, sizeof(st)) 583 #endif 441 #endif 584 442 585 static long cp_new_stat64(struct kstat *stat, 443 static long cp_new_stat64(struct kstat *stat, struct stat64 __user *statbuf) 586 { 444 { 587 struct stat64 tmp; 445 struct stat64 tmp; 588 446 589 INIT_STRUCT_STAT64_PADDING(tmp); 447 INIT_STRUCT_STAT64_PADDING(tmp); 590 #ifdef CONFIG_MIPS 448 #ifdef CONFIG_MIPS 591 /* mips has weird padding, so we don't 449 /* mips has weird padding, so we don't get 64 bits there */ 592 tmp.st_dev = new_encode_dev(stat->dev) 450 tmp.st_dev = new_encode_dev(stat->dev); 593 tmp.st_rdev = new_encode_dev(stat->rde 451 tmp.st_rdev = new_encode_dev(stat->rdev); 594 #else 452 #else 595 tmp.st_dev = huge_encode_dev(stat->dev 453 tmp.st_dev = huge_encode_dev(stat->dev); 596 tmp.st_rdev = huge_encode_dev(stat->rd 454 tmp.st_rdev = huge_encode_dev(stat->rdev); 597 #endif 455 #endif 598 tmp.st_ino = stat->ino; 456 tmp.st_ino = stat->ino; 599 if (sizeof(tmp.st_ino) < sizeof(stat-> 457 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 600 return -EOVERFLOW; 458 return -EOVERFLOW; 601 #ifdef STAT64_HAS_BROKEN_ST_INO 459 #ifdef STAT64_HAS_BROKEN_ST_INO 602 tmp.__st_ino = stat->ino; 460 tmp.__st_ino = stat->ino; 603 #endif 461 #endif 604 tmp.st_mode = stat->mode; 462 tmp.st_mode = stat->mode; 605 tmp.st_nlink = stat->nlink; 463 tmp.st_nlink = stat->nlink; 606 tmp.st_uid = from_kuid_munged(current_ 464 tmp.st_uid = from_kuid_munged(current_user_ns(), stat->uid); 607 tmp.st_gid = from_kgid_munged(current_ 465 tmp.st_gid = from_kgid_munged(current_user_ns(), stat->gid); 608 tmp.st_atime = stat->atime.tv_sec; 466 tmp.st_atime = stat->atime.tv_sec; 609 tmp.st_atime_nsec = stat->atime.tv_nse 467 tmp.st_atime_nsec = stat->atime.tv_nsec; 610 tmp.st_mtime = stat->mtime.tv_sec; 468 tmp.st_mtime = stat->mtime.tv_sec; 611 tmp.st_mtime_nsec = stat->mtime.tv_nse 469 tmp.st_mtime_nsec = stat->mtime.tv_nsec; 612 tmp.st_ctime = stat->ctime.tv_sec; 470 tmp.st_ctime = stat->ctime.tv_sec; 613 tmp.st_ctime_nsec = stat->ctime.tv_nse 471 tmp.st_ctime_nsec = stat->ctime.tv_nsec; 614 tmp.st_size = stat->size; 472 tmp.st_size = stat->size; 615 tmp.st_blocks = stat->blocks; 473 tmp.st_blocks = stat->blocks; 616 tmp.st_blksize = stat->blksize; 474 tmp.st_blksize = stat->blksize; 617 return copy_to_user(statbuf,&tmp,sizeo 475 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0; 618 } 476 } 619 477 620 SYSCALL_DEFINE2(stat64, const char __user *, f 478 SYSCALL_DEFINE2(stat64, const char __user *, filename, 621 struct stat64 __user *, statbu 479 struct stat64 __user *, statbuf) 622 { 480 { 623 struct kstat stat; 481 struct kstat stat; 624 int error = vfs_stat(filename, &stat); 482 int error = vfs_stat(filename, &stat); 625 483 626 if (!error) 484 if (!error) 627 error = cp_new_stat64(&stat, s 485 error = cp_new_stat64(&stat, statbuf); 628 486 629 return error; 487 return error; 630 } 488 } 631 489 632 SYSCALL_DEFINE2(lstat64, const char __user *, 490 SYSCALL_DEFINE2(lstat64, const char __user *, filename, 633 struct stat64 __user *, statbu 491 struct stat64 __user *, statbuf) 634 { 492 { 635 struct kstat stat; 493 struct kstat stat; 636 int error = vfs_lstat(filename, &stat) 494 int error = vfs_lstat(filename, &stat); 637 495 638 if (!error) 496 if (!error) 639 error = cp_new_stat64(&stat, s 497 error = cp_new_stat64(&stat, statbuf); 640 498 641 return error; 499 return error; 642 } 500 } 643 501 644 SYSCALL_DEFINE2(fstat64, unsigned long, fd, st 502 SYSCALL_DEFINE2(fstat64, unsigned long, fd, struct stat64 __user *, statbuf) 645 { 503 { 646 struct kstat stat; 504 struct kstat stat; 647 int error = vfs_fstat(fd, &stat); 505 int error = vfs_fstat(fd, &stat); 648 506 649 if (!error) 507 if (!error) 650 error = cp_new_stat64(&stat, s 508 error = cp_new_stat64(&stat, statbuf); 651 509 652 return error; 510 return error; 653 } 511 } 654 512 655 SYSCALL_DEFINE4(fstatat64, int, dfd, const cha 513 SYSCALL_DEFINE4(fstatat64, int, dfd, const char __user *, filename, 656 struct stat64 __user *, statbu 514 struct stat64 __user *, statbuf, int, flag) 657 { 515 { 658 struct kstat stat; 516 struct kstat stat; 659 int error; 517 int error; 660 518 661 error = vfs_fstatat(dfd, filename, &st 519 error = vfs_fstatat(dfd, filename, &stat, flag); 662 if (error) 520 if (error) 663 return error; 521 return error; 664 return cp_new_stat64(&stat, statbuf); 522 return cp_new_stat64(&stat, statbuf); 665 } 523 } 666 #endif /* __ARCH_WANT_STAT64 || __ARCH_WANT_CO 524 #endif /* __ARCH_WANT_STAT64 || __ARCH_WANT_COMPAT_STAT64 */ 667 525 668 static noinline_for_stack int 526 static noinline_for_stack int 669 cp_statx(const struct kstat *stat, struct stat 527 cp_statx(const struct kstat *stat, struct statx __user *buffer) 670 { 528 { 671 struct statx tmp; 529 struct statx tmp; 672 530 673 memset(&tmp, 0, sizeof(tmp)); 531 memset(&tmp, 0, sizeof(tmp)); 674 532 675 /* STATX_CHANGE_COOKIE is kernel-only !! 533 tmp.stx_mask = stat->result_mask; 676 tmp.stx_mask = stat->result_mask & ~ST << 677 tmp.stx_blksize = stat->blksize; 534 tmp.stx_blksize = stat->blksize; 678 /* STATX_ATTR_CHANGE_MONOTONIC is kern !! 535 tmp.stx_attributes = stat->attributes; 679 tmp.stx_attributes = stat->attributes << 680 tmp.stx_nlink = stat->nlink; 536 tmp.stx_nlink = stat->nlink; 681 tmp.stx_uid = from_kuid_munged(current 537 tmp.stx_uid = from_kuid_munged(current_user_ns(), stat->uid); 682 tmp.stx_gid = from_kgid_munged(current 538 tmp.stx_gid = from_kgid_munged(current_user_ns(), stat->gid); 683 tmp.stx_mode = stat->mode; 539 tmp.stx_mode = stat->mode; 684 tmp.stx_ino = stat->ino; 540 tmp.stx_ino = stat->ino; 685 tmp.stx_size = stat->size; 541 tmp.stx_size = stat->size; 686 tmp.stx_blocks = stat->blocks; 542 tmp.stx_blocks = stat->blocks; 687 tmp.stx_attributes_mask = stat->attrib 543 tmp.stx_attributes_mask = stat->attributes_mask; 688 tmp.stx_atime.tv_sec = stat->atime.tv_ 544 tmp.stx_atime.tv_sec = stat->atime.tv_sec; 689 tmp.stx_atime.tv_nsec = stat->atime.tv 545 tmp.stx_atime.tv_nsec = stat->atime.tv_nsec; 690 tmp.stx_btime.tv_sec = stat->btime.tv_ 546 tmp.stx_btime.tv_sec = stat->btime.tv_sec; 691 tmp.stx_btime.tv_nsec = stat->btime.tv 547 tmp.stx_btime.tv_nsec = stat->btime.tv_nsec; 692 tmp.stx_ctime.tv_sec = stat->ctime.tv_ 548 tmp.stx_ctime.tv_sec = stat->ctime.tv_sec; 693 tmp.stx_ctime.tv_nsec = stat->ctime.tv 549 tmp.stx_ctime.tv_nsec = stat->ctime.tv_nsec; 694 tmp.stx_mtime.tv_sec = stat->mtime.tv_ 550 tmp.stx_mtime.tv_sec = stat->mtime.tv_sec; 695 tmp.stx_mtime.tv_nsec = stat->mtime.tv 551 tmp.stx_mtime.tv_nsec = stat->mtime.tv_nsec; 696 tmp.stx_rdev_major = MAJOR(stat->rdev) 552 tmp.stx_rdev_major = MAJOR(stat->rdev); 697 tmp.stx_rdev_minor = MINOR(stat->rdev) 553 tmp.stx_rdev_minor = MINOR(stat->rdev); 698 tmp.stx_dev_major = MAJOR(stat->dev); 554 tmp.stx_dev_major = MAJOR(stat->dev); 699 tmp.stx_dev_minor = MINOR(stat->dev); 555 tmp.stx_dev_minor = MINOR(stat->dev); 700 tmp.stx_mnt_id = stat->mnt_id; << 701 tmp.stx_dio_mem_align = stat->dio_mem_ << 702 tmp.stx_dio_offset_align = stat->dio_o << 703 tmp.stx_subvol = stat->subvol; << 704 tmp.stx_atomic_write_unit_min = stat-> << 705 tmp.stx_atomic_write_unit_max = stat-> << 706 tmp.stx_atomic_write_segments_max = st << 707 556 708 return copy_to_user(buffer, &tmp, size 557 return copy_to_user(buffer, &tmp, sizeof(tmp)) ? -EFAULT : 0; 709 } 558 } 710 559 711 int do_statx(int dfd, struct filename *filenam << 712 unsigned int mask, struct statx _ << 713 { << 714 struct kstat stat; << 715 int error; << 716 << 717 if (mask & STATX__RESERVED) << 718 return -EINVAL; << 719 if ((flags & AT_STATX_SYNC_TYPE) == AT << 720 return -EINVAL; << 721 << 722 /* << 723 * STATX_CHANGE_COOKIE is kernel-only << 724 * from userland. << 725 */ << 726 mask &= ~STATX_CHANGE_COOKIE; << 727 << 728 error = vfs_statx(dfd, filename, flags << 729 if (error) << 730 return error; << 731 << 732 return cp_statx(&stat, buffer); << 733 } << 734 << 735 int do_statx_fd(int fd, unsigned int flags, un << 736 struct statx __user *buffer) << 737 { << 738 struct kstat stat; << 739 int error; << 740 << 741 if (mask & STATX__RESERVED) << 742 return -EINVAL; << 743 if ((flags & AT_STATX_SYNC_TYPE) == AT << 744 return -EINVAL; << 745 << 746 /* << 747 * STATX_CHANGE_COOKIE is kernel-only << 748 * from userland. << 749 */ << 750 mask &= ~STATX_CHANGE_COOKIE; << 751 << 752 error = vfs_statx_fd(fd, flags, &stat, << 753 if (error) << 754 return error; << 755 << 756 return cp_statx(&stat, buffer); << 757 } << 758 << 759 /** 560 /** 760 * sys_statx - System call to get enhanced sta 561 * sys_statx - System call to get enhanced stats 761 * @dfd: Base directory to pathwalk from *or* 562 * @dfd: Base directory to pathwalk from *or* fd to stat. 762 * @filename: File to stat or either NULL or " !! 563 * @filename: File to stat or "" with AT_EMPTY_PATH 763 * @flags: AT_* flags to control pathwalk. 564 * @flags: AT_* flags to control pathwalk. 764 * @mask: Parts of statx struct actually requi 565 * @mask: Parts of statx struct actually required. 765 * @buffer: Result buffer. 566 * @buffer: Result buffer. 766 * 567 * 767 * Note that fstat() can be emulated by settin 568 * Note that fstat() can be emulated by setting dfd to the fd of interest, 768 * supplying "" (or preferably NULL) as the fi !! 569 * supplying "" as the filename and setting AT_EMPTY_PATH in the flags. 769 * in the flags. << 770 */ 570 */ 771 SYSCALL_DEFINE5(statx, 571 SYSCALL_DEFINE5(statx, 772 int, dfd, const char __user *, 572 int, dfd, const char __user *, filename, unsigned, flags, 773 unsigned int, mask, 573 unsigned int, mask, 774 struct statx __user *, buffer) 574 struct statx __user *, buffer) 775 { 575 { 776 int ret; !! 576 struct kstat stat; 777 unsigned lflags; !! 577 int error; 778 struct filename *name; << 779 << 780 /* << 781 * Short-circuit handling of NULL and << 782 * << 783 * For a NULL path we require and acce << 784 * (possibly |'d with AT_STATX flags). << 785 * << 786 * However, glibc on 32-bit architectu << 787 * with the "" pathname and AT_NO_AUTO << 788 * Supporting this results in the ugli << 789 */ << 790 lflags = flags & ~(AT_NO_AUTOMOUNT | A << 791 if (lflags == AT_EMPTY_PATH && vfs_emp << 792 return do_statx_fd(dfd, flags << 793 << 794 name = getname_flags(filename, getname << 795 ret = do_statx(dfd, name, flags, mask, << 796 putname(name); << 797 578 798 return ret; !! 579 if (mask & STATX__RESERVED) >> 580 return -EINVAL; >> 581 if ((flags & AT_STATX_SYNC_TYPE) == AT_STATX_SYNC_TYPE) >> 582 return -EINVAL; >> 583 >> 584 error = vfs_statx(dfd, filename, flags, &stat, mask); >> 585 if (error) >> 586 return error; >> 587 >> 588 return cp_statx(&stat, buffer); 799 } 589 } 800 590 801 #if defined(CONFIG_COMPAT) && defined(__ARCH_W !! 591 #ifdef CONFIG_COMPAT 802 static int cp_compat_stat(struct kstat *stat, 592 static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf) 803 { 593 { 804 struct compat_stat tmp; 594 struct compat_stat tmp; 805 595 806 if (sizeof(tmp.st_dev) < 4 && !old_val !! 596 if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev)) 807 return -EOVERFLOW; << 808 if (sizeof(tmp.st_rdev) < 4 && !old_va << 809 return -EOVERFLOW; 597 return -EOVERFLOW; 810 598 811 memset(&tmp, 0, sizeof(tmp)); 599 memset(&tmp, 0, sizeof(tmp)); 812 tmp.st_dev = new_encode_dev(stat->dev) !! 600 tmp.st_dev = old_encode_dev(stat->dev); 813 tmp.st_ino = stat->ino; 601 tmp.st_ino = stat->ino; 814 if (sizeof(tmp.st_ino) < sizeof(stat-> 602 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 815 return -EOVERFLOW; 603 return -EOVERFLOW; 816 tmp.st_mode = stat->mode; 604 tmp.st_mode = stat->mode; 817 tmp.st_nlink = stat->nlink; 605 tmp.st_nlink = stat->nlink; 818 if (tmp.st_nlink != stat->nlink) 606 if (tmp.st_nlink != stat->nlink) 819 return -EOVERFLOW; 607 return -EOVERFLOW; 820 SET_UID(tmp.st_uid, from_kuid_munged(c 608 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid)); 821 SET_GID(tmp.st_gid, from_kgid_munged(c 609 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid)); 822 tmp.st_rdev = new_encode_dev(stat->rde !! 610 tmp.st_rdev = old_encode_dev(stat->rdev); 823 if ((u64) stat->size > MAX_NON_LFS) 611 if ((u64) stat->size > MAX_NON_LFS) 824 return -EOVERFLOW; 612 return -EOVERFLOW; 825 tmp.st_size = stat->size; 613 tmp.st_size = stat->size; 826 tmp.st_atime = stat->atime.tv_sec; 614 tmp.st_atime = stat->atime.tv_sec; 827 tmp.st_atime_nsec = stat->atime.tv_nse 615 tmp.st_atime_nsec = stat->atime.tv_nsec; 828 tmp.st_mtime = stat->mtime.tv_sec; 616 tmp.st_mtime = stat->mtime.tv_sec; 829 tmp.st_mtime_nsec = stat->mtime.tv_nse 617 tmp.st_mtime_nsec = stat->mtime.tv_nsec; 830 tmp.st_ctime = stat->ctime.tv_sec; 618 tmp.st_ctime = stat->ctime.tv_sec; 831 tmp.st_ctime_nsec = stat->ctime.tv_nse 619 tmp.st_ctime_nsec = stat->ctime.tv_nsec; 832 tmp.st_blocks = stat->blocks; 620 tmp.st_blocks = stat->blocks; 833 tmp.st_blksize = stat->blksize; 621 tmp.st_blksize = stat->blksize; 834 return copy_to_user(ubuf, &tmp, sizeof 622 return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0; 835 } 623 } 836 624 837 COMPAT_SYSCALL_DEFINE2(newstat, const char __u 625 COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename, 838 struct compat_stat __us 626 struct compat_stat __user *, statbuf) 839 { 627 { 840 struct kstat stat; 628 struct kstat stat; 841 int error; 629 int error; 842 630 843 error = vfs_stat(filename, &stat); 631 error = vfs_stat(filename, &stat); 844 if (error) 632 if (error) 845 return error; 633 return error; 846 return cp_compat_stat(&stat, statbuf); 634 return cp_compat_stat(&stat, statbuf); 847 } 635 } 848 636 849 COMPAT_SYSCALL_DEFINE2(newlstat, const char __ 637 COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename, 850 struct compat_stat __us 638 struct compat_stat __user *, statbuf) 851 { 639 { 852 struct kstat stat; 640 struct kstat stat; 853 int error; 641 int error; 854 642 855 error = vfs_lstat(filename, &stat); 643 error = vfs_lstat(filename, &stat); 856 if (error) 644 if (error) 857 return error; 645 return error; 858 return cp_compat_stat(&stat, statbuf); 646 return cp_compat_stat(&stat, statbuf); 859 } 647 } 860 648 861 #ifndef __ARCH_WANT_STAT64 649 #ifndef __ARCH_WANT_STAT64 862 COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned in 650 COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd, 863 const char __user *, fi 651 const char __user *, filename, 864 struct compat_stat __us 652 struct compat_stat __user *, statbuf, int, flag) 865 { 653 { 866 struct kstat stat; 654 struct kstat stat; 867 int error; 655 int error; 868 656 869 error = vfs_fstatat(dfd, filename, &st 657 error = vfs_fstatat(dfd, filename, &stat, flag); 870 if (error) 658 if (error) 871 return error; 659 return error; 872 return cp_compat_stat(&stat, statbuf); 660 return cp_compat_stat(&stat, statbuf); 873 } 661 } 874 #endif 662 #endif 875 663 876 COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, 664 COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd, 877 struct compat_stat __us 665 struct compat_stat __user *, statbuf) 878 { 666 { 879 struct kstat stat; 667 struct kstat stat; 880 int error = vfs_fstat(fd, &stat); 668 int error = vfs_fstat(fd, &stat); 881 669 882 if (!error) 670 if (!error) 883 error = cp_compat_stat(&stat, 671 error = cp_compat_stat(&stat, statbuf); 884 return error; 672 return error; 885 } 673 } 886 #endif 674 #endif 887 675 888 /* Caller is here responsible for sufficient l 676 /* Caller is here responsible for sufficient locking (ie. inode->i_lock) */ 889 void __inode_add_bytes(struct inode *inode, lo 677 void __inode_add_bytes(struct inode *inode, loff_t bytes) 890 { 678 { 891 inode->i_blocks += bytes >> 9; 679 inode->i_blocks += bytes >> 9; 892 bytes &= 511; 680 bytes &= 511; 893 inode->i_bytes += bytes; 681 inode->i_bytes += bytes; 894 if (inode->i_bytes >= 512) { 682 if (inode->i_bytes >= 512) { 895 inode->i_blocks++; 683 inode->i_blocks++; 896 inode->i_bytes -= 512; 684 inode->i_bytes -= 512; 897 } 685 } 898 } 686 } 899 EXPORT_SYMBOL(__inode_add_bytes); 687 EXPORT_SYMBOL(__inode_add_bytes); 900 688 901 void inode_add_bytes(struct inode *inode, loff 689 void inode_add_bytes(struct inode *inode, loff_t bytes) 902 { 690 { 903 spin_lock(&inode->i_lock); 691 spin_lock(&inode->i_lock); 904 __inode_add_bytes(inode, bytes); 692 __inode_add_bytes(inode, bytes); 905 spin_unlock(&inode->i_lock); 693 spin_unlock(&inode->i_lock); 906 } 694 } 907 695 908 EXPORT_SYMBOL(inode_add_bytes); 696 EXPORT_SYMBOL(inode_add_bytes); 909 697 910 void __inode_sub_bytes(struct inode *inode, lo 698 void __inode_sub_bytes(struct inode *inode, loff_t bytes) 911 { 699 { 912 inode->i_blocks -= bytes >> 9; 700 inode->i_blocks -= bytes >> 9; 913 bytes &= 511; 701 bytes &= 511; 914 if (inode->i_bytes < bytes) { 702 if (inode->i_bytes < bytes) { 915 inode->i_blocks--; 703 inode->i_blocks--; 916 inode->i_bytes += 512; 704 inode->i_bytes += 512; 917 } 705 } 918 inode->i_bytes -= bytes; 706 inode->i_bytes -= bytes; 919 } 707 } 920 708 921 EXPORT_SYMBOL(__inode_sub_bytes); 709 EXPORT_SYMBOL(__inode_sub_bytes); 922 710 923 void inode_sub_bytes(struct inode *inode, loff 711 void inode_sub_bytes(struct inode *inode, loff_t bytes) 924 { 712 { 925 spin_lock(&inode->i_lock); 713 spin_lock(&inode->i_lock); 926 __inode_sub_bytes(inode, bytes); 714 __inode_sub_bytes(inode, bytes); 927 spin_unlock(&inode->i_lock); 715 spin_unlock(&inode->i_lock); 928 } 716 } 929 717 930 EXPORT_SYMBOL(inode_sub_bytes); 718 EXPORT_SYMBOL(inode_sub_bytes); 931 719 932 loff_t inode_get_bytes(struct inode *inode) 720 loff_t inode_get_bytes(struct inode *inode) 933 { 721 { 934 loff_t ret; 722 loff_t ret; 935 723 936 spin_lock(&inode->i_lock); 724 spin_lock(&inode->i_lock); 937 ret = __inode_get_bytes(inode); 725 ret = __inode_get_bytes(inode); 938 spin_unlock(&inode->i_lock); 726 spin_unlock(&inode->i_lock); 939 return ret; 727 return ret; 940 } 728 } 941 729 942 EXPORT_SYMBOL(inode_get_bytes); 730 EXPORT_SYMBOL(inode_get_bytes); 943 731 944 void inode_set_bytes(struct inode *inode, loff 732 void inode_set_bytes(struct inode *inode, loff_t bytes) 945 { 733 { 946 /* Caller is here responsible for suff 734 /* Caller is here responsible for sufficient locking 947 * (ie. inode->i_lock) */ 735 * (ie. inode->i_lock) */ 948 inode->i_blocks = bytes >> 9; 736 inode->i_blocks = bytes >> 9; 949 inode->i_bytes = bytes & 511; 737 inode->i_bytes = bytes & 511; 950 } 738 } 951 739 952 EXPORT_SYMBOL(inode_set_bytes); 740 EXPORT_SYMBOL(inode_set_bytes); 953 741
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.