statx: add mount ID
[linux-block.git] / fs / stat.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * linux/fs/stat.c
4 *
5 * Copyright (C) 1991, 1992 Linus Torvalds
6 */
7
630d9c47 8#include <linux/export.h>
1da177e4
LT
9#include <linux/mm.h>
10#include <linux/errno.h>
11#include <linux/file.h>
1da177e4
LT
12#include <linux/highuid.h>
13#include <linux/fs.h>
14#include <linux/namei.h>
15#include <linux/security.h>
5b825c3a 16#include <linux/cred.h>
1da177e4 17#include <linux/syscalls.h>
ba52de12 18#include <linux/pagemap.h>
ac565de3 19#include <linux/compat.h>
1da177e4 20
7c0f6ba6 21#include <linux/uaccess.h>
1da177e4
LT
22#include <asm/unistd.h>
23
3934e36f 24#include "internal.h"
fa2fcf4f 25#include "mount.h"
3934e36f 26
a528d35e
DH
27/**
28 * generic_fillattr - Fill in the basic attributes from the inode struct
29 * @inode: Inode to use as the source
30 * @stat: Where to fill in the attributes
31 *
32 * Fill in the basic attributes in the kstat structure from data that's to be
33 * found on the VFS inode structure. This is the default if no getattr inode
34 * operation is supplied.
35 */
1da177e4
LT
36void generic_fillattr(struct inode *inode, struct kstat *stat)
37{
38 stat->dev = inode->i_sb->s_dev;
39 stat->ino = inode->i_ino;
40 stat->mode = inode->i_mode;
41 stat->nlink = inode->i_nlink;
42 stat->uid = inode->i_uid;
43 stat->gid = inode->i_gid;
44 stat->rdev = inode->i_rdev;
3ddcd056 45 stat->size = i_size_read(inode);
1da177e4
LT
46 stat->atime = inode->i_atime;
47 stat->mtime = inode->i_mtime;
48 stat->ctime = inode->i_ctime;
93407472 49 stat->blksize = i_blocksize(inode);
3ddcd056 50 stat->blocks = inode->i_blocks;
a528d35e 51}
1da177e4
LT
52EXPORT_SYMBOL(generic_fillattr);
53
b7a6ec52
BF
54/**
55 * vfs_getattr_nosec - getattr without security checks
56 * @path: file to get attributes from
57 * @stat: structure to return attributes in
a528d35e
DH
58 * @request_mask: STATX_xxx flags indicating what the caller wants
59 * @query_flags: Query mode (KSTAT_QUERY_FLAGS)
b7a6ec52
BF
60 *
61 * Get attributes without calling security_inode_getattr.
62 *
63 * Currently the only caller other than vfs_getattr is internal to the
a528d35e
DH
64 * filehandle lookup code, which uses only the inode number and returns no
65 * attributes to any user. Any other code probably wants vfs_getattr.
b7a6ec52 66 */
a528d35e
DH
67int vfs_getattr_nosec(const struct path *path, struct kstat *stat,
68 u32 request_mask, unsigned int query_flags)
1da177e4 69{
bb668734 70 struct inode *inode = d_backing_inode(path->dentry);
1da177e4 71
a528d35e
DH
72 memset(stat, 0, sizeof(*stat));
73 stat->result_mask |= STATX_BASIC_STATS;
a528d35e 74 query_flags &= KSTAT_QUERY_FLAGS;
801e5237
CH
75
76 /* allow the fs to override these if it really wants to */
761e28fa
MS
77 /* SB_NOATIME means filesystem supplies dummy atime value */
78 if (inode->i_sb->s_flags & SB_NOATIME)
801e5237
CH
79 stat->result_mask &= ~STATX_ATIME;
80 if (IS_AUTOMOUNT(inode))
81 stat->attributes |= STATX_ATTR_AUTOMOUNT;
82
1da177e4 83 if (inode->i_op->getattr)
a528d35e
DH
84 return inode->i_op->getattr(path, stat, request_mask,
85 query_flags);
1da177e4
LT
86
87 generic_fillattr(inode, stat);
1da177e4
LT
88 return 0;
89}
b7a6ec52
BF
90EXPORT_SYMBOL(vfs_getattr_nosec);
91
a528d35e
DH
92/*
93 * vfs_getattr - Get the enhanced basic attributes of a file
94 * @path: The file of interest
95 * @stat: Where to return the statistics
96 * @request_mask: STATX_xxx flags indicating what the caller wants
97 * @query_flags: Query mode (KSTAT_QUERY_FLAGS)
98 *
99 * Ask the filesystem for a file's attributes. The caller must indicate in
100 * request_mask and query_flags to indicate what they want.
101 *
102 * If the file is remote, the filesystem can be forced to update the attributes
103 * from the backing store by passing AT_STATX_FORCE_SYNC in query_flags or can
104 * suppress the update by passing AT_STATX_DONT_SYNC.
105 *
106 * Bits must have been set in request_mask to indicate which attributes the
107 * caller wants retrieving. Any such attribute not requested may be returned
108 * anyway, but the value may be approximate, and, if remote, may not have been
109 * synchronised with the server.
110 *
111 * 0 will be returned on success, and a -ve error code if unsuccessful.
112 */
113int vfs_getattr(const struct path *path, struct kstat *stat,
114 u32 request_mask, unsigned int query_flags)
b7a6ec52
BF
115{
116 int retval;
117
3f7036a0 118 retval = security_inode_getattr(path);
b7a6ec52
BF
119 if (retval)
120 return retval;
a528d35e 121 return vfs_getattr_nosec(path, stat, request_mask, query_flags);
b7a6ec52 122}
1da177e4
LT
123EXPORT_SYMBOL(vfs_getattr);
124
a528d35e
DH
125/**
126 * vfs_statx_fd - Get the enhanced basic attributes by file descriptor
127 * @fd: The file descriptor referring to the file of interest
128 * @stat: The result structure to fill in.
129 * @request_mask: STATX_xxx flags indicating what the caller wants
130 * @query_flags: Query mode (KSTAT_QUERY_FLAGS)
131 *
132 * This function is a wrapper around vfs_getattr(). The main difference is
133 * that it uses a file descriptor to determine the file location.
134 *
135 * 0 will be returned on success, and a -ve error code if unsuccessful.
136 */
137int vfs_statx_fd(unsigned int fd, struct kstat *stat,
138 u32 request_mask, unsigned int query_flags)
1da177e4 139{
8c7493aa 140 struct fd f;
1da177e4
LT
141 int error = -EBADF;
142
8c7493aa
EB
143 if (query_flags & ~KSTAT_QUERY_FLAGS)
144 return -EINVAL;
145
146 f = fdget_raw(fd);
2903ff01 147 if (f.file) {
a528d35e
DH
148 error = vfs_getattr(&f.file->f_path, stat,
149 request_mask, query_flags);
2903ff01 150 fdput(f);
1da177e4
LT
151 }
152 return error;
153}
a528d35e 154EXPORT_SYMBOL(vfs_statx_fd);
1da177e4 155
3934e36f
JA
156inline unsigned vfs_stat_set_lookup_flags(unsigned *lookup_flags, int flags)
157{
158 if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT |
159 AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0)
160 return -EINVAL;
161
162 *lookup_flags = LOOKUP_FOLLOW | LOOKUP_AUTOMOUNT;
163 if (flags & AT_SYMLINK_NOFOLLOW)
164 *lookup_flags &= ~LOOKUP_FOLLOW;
165 if (flags & AT_NO_AUTOMOUNT)
166 *lookup_flags &= ~LOOKUP_AUTOMOUNT;
167 if (flags & AT_EMPTY_PATH)
168 *lookup_flags |= LOOKUP_EMPTY;
169
170 return 0;
171}
172
a528d35e
DH
173/**
174 * vfs_statx - Get basic and extra attributes by filename
175 * @dfd: A file descriptor representing the base dir for a relative filename
176 * @filename: The name of the file of interest
177 * @flags: Flags to control the query
178 * @stat: The result structure to fill in.
179 * @request_mask: STATX_xxx flags indicating what the caller wants
180 *
181 * This function is a wrapper around vfs_getattr(). The main difference is
182 * that it uses a filename and base directory to determine the file location.
183 * Additionally, the use of AT_SYMLINK_NOFOLLOW in flags will prevent a symlink
184 * at the given name from being referenced.
185 *
a528d35e
DH
186 * 0 will be returned on success, and a -ve error code if unsuccessful.
187 */
188int vfs_statx(int dfd, const char __user *filename, int flags,
189 struct kstat *stat, u32 request_mask)
0112fc22 190{
2eae7a18 191 struct path path;
0112fc22 192 int error = -EINVAL;
3934e36f 193 unsigned lookup_flags;
0112fc22 194
3934e36f 195 if (vfs_stat_set_lookup_flags(&lookup_flags, flags))
a528d35e 196 return -EINVAL;
836fb7e7 197retry:
2eae7a18
CH
198 error = user_path_at(dfd, filename, lookup_flags, &path);
199 if (error)
200 goto out;
201
a528d35e 202 error = vfs_getattr(&path, stat, request_mask, flags);
fa2fcf4f
MS
203 stat->mnt_id = real_mount(path.mnt)->mnt_id;
204 stat->result_mask |= STATX_MNT_ID;
2eae7a18 205 path_put(&path);
836fb7e7
JL
206 if (retry_estale(error, lookup_flags)) {
207 lookup_flags |= LOOKUP_REVAL;
208 goto retry;
209 }
0112fc22
OD
210out:
211 return error;
212}
a528d35e 213EXPORT_SYMBOL(vfs_statx);
2eae7a18 214
0112fc22 215
1da177e4
LT
216#ifdef __ARCH_WANT_OLD_STAT
217
218/*
219 * For backward compatibility? Maybe this should be moved
220 * into arch/i386 instead?
221 */
222static int cp_old_stat(struct kstat *stat, struct __old_kernel_stat __user * statbuf)
223{
224 static int warncount = 5;
225 struct __old_kernel_stat tmp;
a528d35e 226
1da177e4
LT
227 if (warncount > 0) {
228 warncount--;
229 printk(KERN_WARNING "VFS: Warning: %s using old stat() call. Recompile your binary.\n",
230 current->comm);
231 } else if (warncount < 0) {
232 /* it's laughable, but... */
233 warncount = 0;
234 }
235
236 memset(&tmp, 0, sizeof(struct __old_kernel_stat));
237 tmp.st_dev = old_encode_dev(stat->dev);
238 tmp.st_ino = stat->ino;
afefdbb2
DH
239 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
240 return -EOVERFLOW;
1da177e4
LT
241 tmp.st_mode = stat->mode;
242 tmp.st_nlink = stat->nlink;
243 if (tmp.st_nlink != stat->nlink)
244 return -EOVERFLOW;
a7c1938e
EB
245 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
246 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
1da177e4
LT
247 tmp.st_rdev = old_encode_dev(stat->rdev);
248#if BITS_PER_LONG == 32
249 if (stat->size > MAX_NON_LFS)
250 return -EOVERFLOW;
a528d35e 251#endif
1da177e4
LT
252 tmp.st_size = stat->size;
253 tmp.st_atime = stat->atime.tv_sec;
254 tmp.st_mtime = stat->mtime.tv_sec;
255 tmp.st_ctime = stat->ctime.tv_sec;
256 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0;
257}
258
c7887325
DH
259SYSCALL_DEFINE2(stat, const char __user *, filename,
260 struct __old_kernel_stat __user *, statbuf)
1da177e4
LT
261{
262 struct kstat stat;
2eae7a18 263 int error;
1da177e4 264
2eae7a18
CH
265 error = vfs_stat(filename, &stat);
266 if (error)
267 return error;
1da177e4 268
2eae7a18 269 return cp_old_stat(&stat, statbuf);
1da177e4 270}
257ac264 271
c7887325
DH
272SYSCALL_DEFINE2(lstat, const char __user *, filename,
273 struct __old_kernel_stat __user *, statbuf)
1da177e4
LT
274{
275 struct kstat stat;
2eae7a18 276 int error;
1da177e4 277
2eae7a18
CH
278 error = vfs_lstat(filename, &stat);
279 if (error)
280 return error;
1da177e4 281
2eae7a18 282 return cp_old_stat(&stat, statbuf);
1da177e4 283}
257ac264
HC
284
285SYSCALL_DEFINE2(fstat, unsigned int, fd, struct __old_kernel_stat __user *, statbuf)
1da177e4
LT
286{
287 struct kstat stat;
288 int error = vfs_fstat(fd, &stat);
289
290 if (!error)
291 error = cp_old_stat(&stat, statbuf);
292
293 return error;
294}
295
296#endif /* __ARCH_WANT_OLD_STAT */
297
82b355d1
AB
298#ifdef __ARCH_WANT_NEW_STAT
299
a52dd971
LT
300#if BITS_PER_LONG == 32
301# define choose_32_64(a,b) a
302#else
303# define choose_32_64(a,b) b
304#endif
305
4c416f42 306#define valid_dev(x) choose_32_64(old_valid_dev(x),true)
a52dd971
LT
307#define encode_dev(x) choose_32_64(old_encode_dev,new_encode_dev)(x)
308
8529f613
LT
309#ifndef INIT_STRUCT_STAT_PADDING
310# define INIT_STRUCT_STAT_PADDING(st) memset(&st, 0, sizeof(st))
311#endif
312
1da177e4
LT
313static int cp_new_stat(struct kstat *stat, struct stat __user *statbuf)
314{
315 struct stat tmp;
316
a52dd971 317 if (!valid_dev(stat->dev) || !valid_dev(stat->rdev))
1da177e4 318 return -EOVERFLOW;
a52dd971
LT
319#if BITS_PER_LONG == 32
320 if (stat->size > MAX_NON_LFS)
1da177e4
LT
321 return -EOVERFLOW;
322#endif
323
8529f613 324 INIT_STRUCT_STAT_PADDING(tmp);
a52dd971 325 tmp.st_dev = encode_dev(stat->dev);
1da177e4 326 tmp.st_ino = stat->ino;
afefdbb2
DH
327 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
328 return -EOVERFLOW;
1da177e4
LT
329 tmp.st_mode = stat->mode;
330 tmp.st_nlink = stat->nlink;
331 if (tmp.st_nlink != stat->nlink)
332 return -EOVERFLOW;
a7c1938e
EB
333 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
334 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
a52dd971 335 tmp.st_rdev = encode_dev(stat->rdev);
1da177e4
LT
336 tmp.st_size = stat->size;
337 tmp.st_atime = stat->atime.tv_sec;
338 tmp.st_mtime = stat->mtime.tv_sec;
339 tmp.st_ctime = stat->ctime.tv_sec;
340#ifdef STAT_HAVE_NSEC
341 tmp.st_atime_nsec = stat->atime.tv_nsec;
342 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
343 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
344#endif
345 tmp.st_blocks = stat->blocks;
346 tmp.st_blksize = stat->blksize;
347 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0;
348}
349
c7887325
DH
350SYSCALL_DEFINE2(newstat, const char __user *, filename,
351 struct stat __user *, statbuf)
5590ff0d
UD
352{
353 struct kstat stat;
2eae7a18 354 int error = vfs_stat(filename, &stat);
5590ff0d 355
2eae7a18
CH
356 if (error)
357 return error;
358 return cp_new_stat(&stat, statbuf);
5590ff0d
UD
359}
360
c7887325
DH
361SYSCALL_DEFINE2(newlstat, const char __user *, filename,
362 struct stat __user *, statbuf)
1da177e4
LT
363{
364 struct kstat stat;
2eae7a18 365 int error;
1da177e4 366
2eae7a18
CH
367 error = vfs_lstat(filename, &stat);
368 if (error)
369 return error;
1da177e4 370
2eae7a18 371 return cp_new_stat(&stat, statbuf);
1da177e4 372}
5590ff0d 373
2833c28a 374#if !defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_SYS_NEWFSTATAT)
c7887325 375SYSCALL_DEFINE4(newfstatat, int, dfd, const char __user *, filename,
6559eed8 376 struct stat __user *, statbuf, int, flag)
1da177e4
LT
377{
378 struct kstat stat;
0112fc22 379 int error;
1da177e4 380
0112fc22
OD
381 error = vfs_fstatat(dfd, filename, &stat, flag);
382 if (error)
383 return error;
384 return cp_new_stat(&stat, statbuf);
1da177e4 385}
cff2b760 386#endif
5590ff0d 387
257ac264 388SYSCALL_DEFINE2(newfstat, unsigned int, fd, struct stat __user *, statbuf)
1da177e4
LT
389{
390 struct kstat stat;
391 int error = vfs_fstat(fd, &stat);
392
393 if (!error)
394 error = cp_new_stat(&stat, statbuf);
395
396 return error;
397}
82b355d1 398#endif
1da177e4 399
2dae0248
DB
400static int do_readlinkat(int dfd, const char __user *pathname,
401 char __user *buf, int bufsiz)
1da177e4 402{
2d8f3038 403 struct path path;
1da177e4 404 int error;
1fa1e7f6 405 int empty = 0;
7955119e 406 unsigned int lookup_flags = LOOKUP_EMPTY;
1da177e4
LT
407
408 if (bufsiz <= 0)
409 return -EINVAL;
410
7955119e
JL
411retry:
412 error = user_path_at_empty(dfd, pathname, lookup_flags, &path, &empty);
1da177e4 413 if (!error) {
bb668734 414 struct inode *inode = d_backing_inode(path.dentry);
1da177e4 415
1fa1e7f6 416 error = empty ? -ENOENT : -EINVAL;
fd4a0edf
MS
417 /*
418 * AFS mountpoints allow readlink(2) but are not symlinks
419 */
420 if (d_is_symlink(path.dentry) || inode->i_op->readlink) {
2d8f3038 421 error = security_inode_readlink(path.dentry);
1da177e4 422 if (!error) {
68ac1234 423 touch_atime(&path);
fd4a0edf 424 error = vfs_readlink(path.dentry, buf, bufsiz);
1da177e4
LT
425 }
426 }
2d8f3038 427 path_put(&path);
7955119e
JL
428 if (retry_estale(error, lookup_flags)) {
429 lookup_flags |= LOOKUP_REVAL;
430 goto retry;
431 }
1da177e4
LT
432 }
433 return error;
434}
435
2dae0248
DB
436SYSCALL_DEFINE4(readlinkat, int, dfd, const char __user *, pathname,
437 char __user *, buf, int, bufsiz)
438{
439 return do_readlinkat(dfd, pathname, buf, bufsiz);
440}
441
002c8976
HC
442SYSCALL_DEFINE3(readlink, const char __user *, path, char __user *, buf,
443 int, bufsiz)
5590ff0d 444{
2dae0248 445 return do_readlinkat(AT_FDCWD, path, buf, bufsiz);
5590ff0d
UD
446}
447
1da177e4
LT
448
449/* ---------- LFS-64 ----------- */
0753f70f 450#if defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_COMPAT_STAT64)
1da177e4 451
8529f613
LT
452#ifndef INIT_STRUCT_STAT64_PADDING
453# define INIT_STRUCT_STAT64_PADDING(st) memset(&st, 0, sizeof(st))
454#endif
455
1da177e4
LT
456static long cp_new_stat64(struct kstat *stat, struct stat64 __user *statbuf)
457{
458 struct stat64 tmp;
459
8529f613 460 INIT_STRUCT_STAT64_PADDING(tmp);
1da177e4
LT
461#ifdef CONFIG_MIPS
462 /* mips has weird padding, so we don't get 64 bits there */
1da177e4
LT
463 tmp.st_dev = new_encode_dev(stat->dev);
464 tmp.st_rdev = new_encode_dev(stat->rdev);
465#else
466 tmp.st_dev = huge_encode_dev(stat->dev);
467 tmp.st_rdev = huge_encode_dev(stat->rdev);
468#endif
469 tmp.st_ino = stat->ino;
afefdbb2
DH
470 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
471 return -EOVERFLOW;
1da177e4
LT
472#ifdef STAT64_HAS_BROKEN_ST_INO
473 tmp.__st_ino = stat->ino;
474#endif
475 tmp.st_mode = stat->mode;
476 tmp.st_nlink = stat->nlink;
a7c1938e
EB
477 tmp.st_uid = from_kuid_munged(current_user_ns(), stat->uid);
478 tmp.st_gid = from_kgid_munged(current_user_ns(), stat->gid);
1da177e4
LT
479 tmp.st_atime = stat->atime.tv_sec;
480 tmp.st_atime_nsec = stat->atime.tv_nsec;
481 tmp.st_mtime = stat->mtime.tv_sec;
482 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
483 tmp.st_ctime = stat->ctime.tv_sec;
484 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
485 tmp.st_size = stat->size;
486 tmp.st_blocks = stat->blocks;
487 tmp.st_blksize = stat->blksize;
488 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0;
489}
490
c7887325
DH
491SYSCALL_DEFINE2(stat64, const char __user *, filename,
492 struct stat64 __user *, statbuf)
1da177e4
LT
493{
494 struct kstat stat;
495 int error = vfs_stat(filename, &stat);
496
497 if (!error)
498 error = cp_new_stat64(&stat, statbuf);
499
500 return error;
501}
257ac264 502
c7887325
DH
503SYSCALL_DEFINE2(lstat64, const char __user *, filename,
504 struct stat64 __user *, statbuf)
1da177e4
LT
505{
506 struct kstat stat;
507 int error = vfs_lstat(filename, &stat);
508
509 if (!error)
510 error = cp_new_stat64(&stat, statbuf);
511
512 return error;
513}
257ac264
HC
514
515SYSCALL_DEFINE2(fstat64, unsigned long, fd, struct stat64 __user *, statbuf)
1da177e4
LT
516{
517 struct kstat stat;
518 int error = vfs_fstat(fd, &stat);
519
520 if (!error)
521 error = cp_new_stat64(&stat, statbuf);
522
523 return error;
524}
525
c7887325 526SYSCALL_DEFINE4(fstatat64, int, dfd, const char __user *, filename,
6559eed8 527 struct stat64 __user *, statbuf, int, flag)
cff2b760
UD
528{
529 struct kstat stat;
0112fc22 530 int error;
cff2b760 531
0112fc22
OD
532 error = vfs_fstatat(dfd, filename, &stat, flag);
533 if (error)
534 return error;
535 return cp_new_stat64(&stat, statbuf);
cff2b760 536}
0753f70f 537#endif /* __ARCH_WANT_STAT64 || __ARCH_WANT_COMPAT_STAT64 */
1da177e4 538
3934e36f 539noinline_for_stack int
64bd7204 540cp_statx(const struct kstat *stat, struct statx __user *buffer)
a528d35e 541{
64bd7204
EB
542 struct statx tmp;
543
544 memset(&tmp, 0, sizeof(tmp));
545
546 tmp.stx_mask = stat->result_mask;
547 tmp.stx_blksize = stat->blksize;
548 tmp.stx_attributes = stat->attributes;
549 tmp.stx_nlink = stat->nlink;
550 tmp.stx_uid = from_kuid_munged(current_user_ns(), stat->uid);
551 tmp.stx_gid = from_kgid_munged(current_user_ns(), stat->gid);
552 tmp.stx_mode = stat->mode;
553 tmp.stx_ino = stat->ino;
554 tmp.stx_size = stat->size;
555 tmp.stx_blocks = stat->blocks;
3209f68b 556 tmp.stx_attributes_mask = stat->attributes_mask;
64bd7204
EB
557 tmp.stx_atime.tv_sec = stat->atime.tv_sec;
558 tmp.stx_atime.tv_nsec = stat->atime.tv_nsec;
559 tmp.stx_btime.tv_sec = stat->btime.tv_sec;
560 tmp.stx_btime.tv_nsec = stat->btime.tv_nsec;
561 tmp.stx_ctime.tv_sec = stat->ctime.tv_sec;
562 tmp.stx_ctime.tv_nsec = stat->ctime.tv_nsec;
563 tmp.stx_mtime.tv_sec = stat->mtime.tv_sec;
564 tmp.stx_mtime.tv_nsec = stat->mtime.tv_nsec;
565 tmp.stx_rdev_major = MAJOR(stat->rdev);
566 tmp.stx_rdev_minor = MINOR(stat->rdev);
567 tmp.stx_dev_major = MAJOR(stat->dev);
568 tmp.stx_dev_minor = MINOR(stat->dev);
fa2fcf4f 569 tmp.stx_mnt_id = stat->mnt_id;
64bd7204
EB
570
571 return copy_to_user(buffer, &tmp, sizeof(tmp)) ? -EFAULT : 0;
a528d35e
DH
572}
573
574/**
575 * sys_statx - System call to get enhanced stats
576 * @dfd: Base directory to pathwalk from *or* fd to stat.
1e2f82d1 577 * @filename: File to stat or "" with AT_EMPTY_PATH
a528d35e
DH
578 * @flags: AT_* flags to control pathwalk.
579 * @mask: Parts of statx struct actually required.
580 * @buffer: Result buffer.
581 *
1e2f82d1
DH
582 * Note that fstat() can be emulated by setting dfd to the fd of interest,
583 * supplying "" as the filename and setting AT_EMPTY_PATH in the flags.
a528d35e
DH
584 */
585SYSCALL_DEFINE5(statx,
586 int, dfd, const char __user *, filename, unsigned, flags,
587 unsigned int, mask,
588 struct statx __user *, buffer)
589{
590 struct kstat stat;
591 int error;
592
47071aee
DH
593 if (mask & STATX__RESERVED)
594 return -EINVAL;
a528d35e
DH
595 if ((flags & AT_STATX_SYNC_TYPE) == AT_STATX_SYNC_TYPE)
596 return -EINVAL;
a528d35e 597
1e2f82d1 598 error = vfs_statx(dfd, filename, flags, &stat, mask);
a528d35e
DH
599 if (error)
600 return error;
64bd7204
EB
601
602 return cp_statx(&stat, buffer);
a528d35e
DH
603}
604
ac565de3
AV
605#ifdef CONFIG_COMPAT
606static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
607{
608 struct compat_stat tmp;
609
610 if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev))
611 return -EOVERFLOW;
612
613 memset(&tmp, 0, sizeof(tmp));
614 tmp.st_dev = old_encode_dev(stat->dev);
615 tmp.st_ino = stat->ino;
616 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
617 return -EOVERFLOW;
618 tmp.st_mode = stat->mode;
619 tmp.st_nlink = stat->nlink;
620 if (tmp.st_nlink != stat->nlink)
621 return -EOVERFLOW;
622 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
623 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
624 tmp.st_rdev = old_encode_dev(stat->rdev);
625 if ((u64) stat->size > MAX_NON_LFS)
626 return -EOVERFLOW;
627 tmp.st_size = stat->size;
628 tmp.st_atime = stat->atime.tv_sec;
629 tmp.st_atime_nsec = stat->atime.tv_nsec;
630 tmp.st_mtime = stat->mtime.tv_sec;
631 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
632 tmp.st_ctime = stat->ctime.tv_sec;
633 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
634 tmp.st_blocks = stat->blocks;
635 tmp.st_blksize = stat->blksize;
636 return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0;
637}
638
639COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename,
640 struct compat_stat __user *, statbuf)
641{
642 struct kstat stat;
643 int error;
644
645 error = vfs_stat(filename, &stat);
646 if (error)
647 return error;
648 return cp_compat_stat(&stat, statbuf);
649}
650
651COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename,
652 struct compat_stat __user *, statbuf)
653{
654 struct kstat stat;
655 int error;
656
657 error = vfs_lstat(filename, &stat);
658 if (error)
659 return error;
660 return cp_compat_stat(&stat, statbuf);
661}
662
663#ifndef __ARCH_WANT_STAT64
664COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd,
665 const char __user *, filename,
666 struct compat_stat __user *, statbuf, int, flag)
667{
668 struct kstat stat;
669 int error;
670
671 error = vfs_fstatat(dfd, filename, &stat, flag);
672 if (error)
673 return error;
674 return cp_compat_stat(&stat, statbuf);
675}
676#endif
677
678COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd,
679 struct compat_stat __user *, statbuf)
680{
681 struct kstat stat;
682 int error = vfs_fstat(fd, &stat);
683
684 if (!error)
685 error = cp_compat_stat(&stat, statbuf);
686 return error;
687}
688#endif
689
b462707e
DM
690/* Caller is here responsible for sufficient locking (ie. inode->i_lock) */
691void __inode_add_bytes(struct inode *inode, loff_t bytes)
1da177e4 692{
1da177e4
LT
693 inode->i_blocks += bytes >> 9;
694 bytes &= 511;
695 inode->i_bytes += bytes;
696 if (inode->i_bytes >= 512) {
697 inode->i_blocks++;
698 inode->i_bytes -= 512;
699 }
b462707e 700}
eb315d2a 701EXPORT_SYMBOL(__inode_add_bytes);
b462707e
DM
702
703void inode_add_bytes(struct inode *inode, loff_t bytes)
704{
705 spin_lock(&inode->i_lock);
706 __inode_add_bytes(inode, bytes);
1da177e4
LT
707 spin_unlock(&inode->i_lock);
708}
709
710EXPORT_SYMBOL(inode_add_bytes);
711
1c8924eb 712void __inode_sub_bytes(struct inode *inode, loff_t bytes)
1da177e4 713{
1da177e4
LT
714 inode->i_blocks -= bytes >> 9;
715 bytes &= 511;
716 if (inode->i_bytes < bytes) {
717 inode->i_blocks--;
718 inode->i_bytes += 512;
719 }
720 inode->i_bytes -= bytes;
1c8924eb
JK
721}
722
723EXPORT_SYMBOL(__inode_sub_bytes);
724
725void inode_sub_bytes(struct inode *inode, loff_t bytes)
726{
727 spin_lock(&inode->i_lock);
728 __inode_sub_bytes(inode, bytes);
1da177e4
LT
729 spin_unlock(&inode->i_lock);
730}
731
732EXPORT_SYMBOL(inode_sub_bytes);
733
734loff_t inode_get_bytes(struct inode *inode)
735{
736 loff_t ret;
737
738 spin_lock(&inode->i_lock);
f4a8116a 739 ret = __inode_get_bytes(inode);
1da177e4
LT
740 spin_unlock(&inode->i_lock);
741 return ret;
742}
743
744EXPORT_SYMBOL(inode_get_bytes);
745
746void inode_set_bytes(struct inode *inode, loff_t bytes)
747{
748 /* Caller is here responsible for sufficient locking
749 * (ie. inode->i_lock) */
750 inode->i_blocks = bytes >> 9;
751 inode->i_bytes = bytes & 511;
752}
753
754EXPORT_SYMBOL(inode_set_bytes);