Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
[linux-block.git] / fs / stat.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/stat.c
3 *
4 * Copyright (C) 1991, 1992 Linus Torvalds
5 */
6
630d9c47 7#include <linux/export.h>
1da177e4
LT
8#include <linux/mm.h>
9#include <linux/errno.h>
10#include <linux/file.h>
1da177e4
LT
11#include <linux/highuid.h>
12#include <linux/fs.h>
13#include <linux/namei.h>
14#include <linux/security.h>
5b825c3a 15#include <linux/cred.h>
1da177e4 16#include <linux/syscalls.h>
ba52de12 17#include <linux/pagemap.h>
1da177e4 18
7c0f6ba6 19#include <linux/uaccess.h>
1da177e4
LT
20#include <asm/unistd.h>
21
a528d35e
DH
22/**
23 * generic_fillattr - Fill in the basic attributes from the inode struct
24 * @inode: Inode to use as the source
25 * @stat: Where to fill in the attributes
26 *
27 * Fill in the basic attributes in the kstat structure from data that's to be
28 * found on the VFS inode structure. This is the default if no getattr inode
29 * operation is supplied.
30 */
1da177e4
LT
31void generic_fillattr(struct inode *inode, struct kstat *stat)
32{
33 stat->dev = inode->i_sb->s_dev;
34 stat->ino = inode->i_ino;
35 stat->mode = inode->i_mode;
36 stat->nlink = inode->i_nlink;
37 stat->uid = inode->i_uid;
38 stat->gid = inode->i_gid;
39 stat->rdev = inode->i_rdev;
3ddcd056 40 stat->size = i_size_read(inode);
1da177e4
LT
41 stat->atime = inode->i_atime;
42 stat->mtime = inode->i_mtime;
43 stat->ctime = inode->i_ctime;
93407472 44 stat->blksize = i_blocksize(inode);
3ddcd056 45 stat->blocks = inode->i_blocks;
1da177e4 46
a528d35e
DH
47 if (IS_NOATIME(inode))
48 stat->result_mask &= ~STATX_ATIME;
49 if (IS_AUTOMOUNT(inode))
50 stat->attributes |= STATX_ATTR_AUTOMOUNT;
51}
1da177e4
LT
52EXPORT_SYMBOL(generic_fillattr);
53
b7a6ec52
BF
54/**
55 * vfs_getattr_nosec - getattr without security checks
56 * @path: file to get attributes from
57 * @stat: structure to return attributes in
a528d35e
DH
58 * @request_mask: STATX_xxx flags indicating what the caller wants
59 * @query_flags: Query mode (KSTAT_QUERY_FLAGS)
b7a6ec52
BF
60 *
61 * Get attributes without calling security_inode_getattr.
62 *
63 * Currently the only caller other than vfs_getattr is internal to the
a528d35e
DH
64 * filehandle lookup code, which uses only the inode number and returns no
65 * attributes to any user. Any other code probably wants vfs_getattr.
b7a6ec52 66 */
a528d35e
DH
67int vfs_getattr_nosec(const struct path *path, struct kstat *stat,
68 u32 request_mask, unsigned int query_flags)
1da177e4 69{
bb668734 70 struct inode *inode = d_backing_inode(path->dentry);
1da177e4 71
a528d35e
DH
72 memset(stat, 0, sizeof(*stat));
73 stat->result_mask |= STATX_BASIC_STATS;
74 request_mask &= STATX_ALL;
75 query_flags &= KSTAT_QUERY_FLAGS;
1da177e4 76 if (inode->i_op->getattr)
a528d35e
DH
77 return inode->i_op->getattr(path, stat, request_mask,
78 query_flags);
1da177e4
LT
79
80 generic_fillattr(inode, stat);
1da177e4
LT
81 return 0;
82}
b7a6ec52
BF
83EXPORT_SYMBOL(vfs_getattr_nosec);
84
a528d35e
DH
85/*
86 * vfs_getattr - Get the enhanced basic attributes of a file
87 * @path: The file of interest
88 * @stat: Where to return the statistics
89 * @request_mask: STATX_xxx flags indicating what the caller wants
90 * @query_flags: Query mode (KSTAT_QUERY_FLAGS)
91 *
92 * Ask the filesystem for a file's attributes. The caller must indicate in
93 * request_mask and query_flags to indicate what they want.
94 *
95 * If the file is remote, the filesystem can be forced to update the attributes
96 * from the backing store by passing AT_STATX_FORCE_SYNC in query_flags or can
97 * suppress the update by passing AT_STATX_DONT_SYNC.
98 *
99 * Bits must have been set in request_mask to indicate which attributes the
100 * caller wants retrieving. Any such attribute not requested may be returned
101 * anyway, but the value may be approximate, and, if remote, may not have been
102 * synchronised with the server.
103 *
104 * 0 will be returned on success, and a -ve error code if unsuccessful.
105 */
106int vfs_getattr(const struct path *path, struct kstat *stat,
107 u32 request_mask, unsigned int query_flags)
b7a6ec52
BF
108{
109 int retval;
110
3f7036a0 111 retval = security_inode_getattr(path);
b7a6ec52
BF
112 if (retval)
113 return retval;
a528d35e 114 return vfs_getattr_nosec(path, stat, request_mask, query_flags);
b7a6ec52 115}
1da177e4
LT
116EXPORT_SYMBOL(vfs_getattr);
117
a528d35e
DH
118/**
119 * vfs_statx_fd - Get the enhanced basic attributes by file descriptor
120 * @fd: The file descriptor referring to the file of interest
121 * @stat: The result structure to fill in.
122 * @request_mask: STATX_xxx flags indicating what the caller wants
123 * @query_flags: Query mode (KSTAT_QUERY_FLAGS)
124 *
125 * This function is a wrapper around vfs_getattr(). The main difference is
126 * that it uses a file descriptor to determine the file location.
127 *
128 * 0 will be returned on success, and a -ve error code if unsuccessful.
129 */
130int vfs_statx_fd(unsigned int fd, struct kstat *stat,
131 u32 request_mask, unsigned int query_flags)
1da177e4 132{
8c7493aa 133 struct fd f;
1da177e4
LT
134 int error = -EBADF;
135
8c7493aa
EB
136 if (query_flags & ~KSTAT_QUERY_FLAGS)
137 return -EINVAL;
138
139 f = fdget_raw(fd);
2903ff01 140 if (f.file) {
a528d35e
DH
141 error = vfs_getattr(&f.file->f_path, stat,
142 request_mask, query_flags);
2903ff01 143 fdput(f);
1da177e4
LT
144 }
145 return error;
146}
a528d35e 147EXPORT_SYMBOL(vfs_statx_fd);
1da177e4 148
a528d35e
DH
149/**
150 * vfs_statx - Get basic and extra attributes by filename
151 * @dfd: A file descriptor representing the base dir for a relative filename
152 * @filename: The name of the file of interest
153 * @flags: Flags to control the query
154 * @stat: The result structure to fill in.
155 * @request_mask: STATX_xxx flags indicating what the caller wants
156 *
157 * This function is a wrapper around vfs_getattr(). The main difference is
158 * that it uses a filename and base directory to determine the file location.
159 * Additionally, the use of AT_SYMLINK_NOFOLLOW in flags will prevent a symlink
160 * at the given name from being referenced.
161 *
a528d35e
DH
162 * 0 will be returned on success, and a -ve error code if unsuccessful.
163 */
164int vfs_statx(int dfd, const char __user *filename, int flags,
165 struct kstat *stat, u32 request_mask)
0112fc22 166{
2eae7a18 167 struct path path;
0112fc22 168 int error = -EINVAL;
a528d35e 169 unsigned int lookup_flags = LOOKUP_FOLLOW | LOOKUP_AUTOMOUNT;
0112fc22 170
a528d35e
DH
171 if ((flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT |
172 AT_EMPTY_PATH | KSTAT_QUERY_FLAGS)) != 0)
173 return -EINVAL;
0112fc22 174
a528d35e
DH
175 if (flags & AT_SYMLINK_NOFOLLOW)
176 lookup_flags &= ~LOOKUP_FOLLOW;
177 if (flags & AT_NO_AUTOMOUNT)
178 lookup_flags &= ~LOOKUP_AUTOMOUNT;
179 if (flags & AT_EMPTY_PATH)
65cfc672 180 lookup_flags |= LOOKUP_EMPTY;
a528d35e 181
836fb7e7 182retry:
2eae7a18
CH
183 error = user_path_at(dfd, filename, lookup_flags, &path);
184 if (error)
185 goto out;
186
a528d35e 187 error = vfs_getattr(&path, stat, request_mask, flags);
2eae7a18 188 path_put(&path);
836fb7e7
JL
189 if (retry_estale(error, lookup_flags)) {
190 lookup_flags |= LOOKUP_REVAL;
191 goto retry;
192 }
0112fc22
OD
193out:
194 return error;
195}
a528d35e 196EXPORT_SYMBOL(vfs_statx);
2eae7a18 197
0112fc22 198
1da177e4
LT
199#ifdef __ARCH_WANT_OLD_STAT
200
201/*
202 * For backward compatibility? Maybe this should be moved
203 * into arch/i386 instead?
204 */
205static int cp_old_stat(struct kstat *stat, struct __old_kernel_stat __user * statbuf)
206{
207 static int warncount = 5;
208 struct __old_kernel_stat tmp;
a528d35e 209
1da177e4
LT
210 if (warncount > 0) {
211 warncount--;
212 printk(KERN_WARNING "VFS: Warning: %s using old stat() call. Recompile your binary.\n",
213 current->comm);
214 } else if (warncount < 0) {
215 /* it's laughable, but... */
216 warncount = 0;
217 }
218
219 memset(&tmp, 0, sizeof(struct __old_kernel_stat));
220 tmp.st_dev = old_encode_dev(stat->dev);
221 tmp.st_ino = stat->ino;
afefdbb2
DH
222 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
223 return -EOVERFLOW;
1da177e4
LT
224 tmp.st_mode = stat->mode;
225 tmp.st_nlink = stat->nlink;
226 if (tmp.st_nlink != stat->nlink)
227 return -EOVERFLOW;
a7c1938e
EB
228 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
229 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
1da177e4
LT
230 tmp.st_rdev = old_encode_dev(stat->rdev);
231#if BITS_PER_LONG == 32
232 if (stat->size > MAX_NON_LFS)
233 return -EOVERFLOW;
a528d35e 234#endif
1da177e4
LT
235 tmp.st_size = stat->size;
236 tmp.st_atime = stat->atime.tv_sec;
237 tmp.st_mtime = stat->mtime.tv_sec;
238 tmp.st_ctime = stat->ctime.tv_sec;
239 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0;
240}
241
c7887325
DH
242SYSCALL_DEFINE2(stat, const char __user *, filename,
243 struct __old_kernel_stat __user *, statbuf)
1da177e4
LT
244{
245 struct kstat stat;
2eae7a18 246 int error;
1da177e4 247
2eae7a18
CH
248 error = vfs_stat(filename, &stat);
249 if (error)
250 return error;
1da177e4 251
2eae7a18 252 return cp_old_stat(&stat, statbuf);
1da177e4 253}
257ac264 254
c7887325
DH
255SYSCALL_DEFINE2(lstat, const char __user *, filename,
256 struct __old_kernel_stat __user *, statbuf)
1da177e4
LT
257{
258 struct kstat stat;
2eae7a18 259 int error;
1da177e4 260
2eae7a18
CH
261 error = vfs_lstat(filename, &stat);
262 if (error)
263 return error;
1da177e4 264
2eae7a18 265 return cp_old_stat(&stat, statbuf);
1da177e4 266}
257ac264
HC
267
268SYSCALL_DEFINE2(fstat, unsigned int, fd, struct __old_kernel_stat __user *, statbuf)
1da177e4
LT
269{
270 struct kstat stat;
271 int error = vfs_fstat(fd, &stat);
272
273 if (!error)
274 error = cp_old_stat(&stat, statbuf);
275
276 return error;
277}
278
279#endif /* __ARCH_WANT_OLD_STAT */
280
a52dd971
LT
281#if BITS_PER_LONG == 32
282# define choose_32_64(a,b) a
283#else
284# define choose_32_64(a,b) b
285#endif
286
4c416f42 287#define valid_dev(x) choose_32_64(old_valid_dev(x),true)
a52dd971
LT
288#define encode_dev(x) choose_32_64(old_encode_dev,new_encode_dev)(x)
289
8529f613
LT
290#ifndef INIT_STRUCT_STAT_PADDING
291# define INIT_STRUCT_STAT_PADDING(st) memset(&st, 0, sizeof(st))
292#endif
293
1da177e4
LT
294static int cp_new_stat(struct kstat *stat, struct stat __user *statbuf)
295{
296 struct stat tmp;
297
a52dd971 298 if (!valid_dev(stat->dev) || !valid_dev(stat->rdev))
1da177e4 299 return -EOVERFLOW;
a52dd971
LT
300#if BITS_PER_LONG == 32
301 if (stat->size > MAX_NON_LFS)
1da177e4
LT
302 return -EOVERFLOW;
303#endif
304
8529f613 305 INIT_STRUCT_STAT_PADDING(tmp);
a52dd971 306 tmp.st_dev = encode_dev(stat->dev);
1da177e4 307 tmp.st_ino = stat->ino;
afefdbb2
DH
308 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
309 return -EOVERFLOW;
1da177e4
LT
310 tmp.st_mode = stat->mode;
311 tmp.st_nlink = stat->nlink;
312 if (tmp.st_nlink != stat->nlink)
313 return -EOVERFLOW;
a7c1938e
EB
314 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
315 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
a52dd971 316 tmp.st_rdev = encode_dev(stat->rdev);
1da177e4
LT
317 tmp.st_size = stat->size;
318 tmp.st_atime = stat->atime.tv_sec;
319 tmp.st_mtime = stat->mtime.tv_sec;
320 tmp.st_ctime = stat->ctime.tv_sec;
321#ifdef STAT_HAVE_NSEC
322 tmp.st_atime_nsec = stat->atime.tv_nsec;
323 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
324 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
325#endif
326 tmp.st_blocks = stat->blocks;
327 tmp.st_blksize = stat->blksize;
328 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0;
329}
330
c7887325
DH
331SYSCALL_DEFINE2(newstat, const char __user *, filename,
332 struct stat __user *, statbuf)
5590ff0d
UD
333{
334 struct kstat stat;
2eae7a18 335 int error = vfs_stat(filename, &stat);
5590ff0d 336
2eae7a18
CH
337 if (error)
338 return error;
339 return cp_new_stat(&stat, statbuf);
5590ff0d
UD
340}
341
c7887325
DH
342SYSCALL_DEFINE2(newlstat, const char __user *, filename,
343 struct stat __user *, statbuf)
1da177e4
LT
344{
345 struct kstat stat;
2eae7a18 346 int error;
1da177e4 347
2eae7a18
CH
348 error = vfs_lstat(filename, &stat);
349 if (error)
350 return error;
1da177e4 351
2eae7a18 352 return cp_new_stat(&stat, statbuf);
1da177e4 353}
5590ff0d 354
2833c28a 355#if !defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_SYS_NEWFSTATAT)
c7887325 356SYSCALL_DEFINE4(newfstatat, int, dfd, const char __user *, filename,
6559eed8 357 struct stat __user *, statbuf, int, flag)
1da177e4
LT
358{
359 struct kstat stat;
0112fc22 360 int error;
1da177e4 361
0112fc22
OD
362 error = vfs_fstatat(dfd, filename, &stat, flag);
363 if (error)
364 return error;
365 return cp_new_stat(&stat, statbuf);
1da177e4 366}
cff2b760 367#endif
5590ff0d 368
257ac264 369SYSCALL_DEFINE2(newfstat, unsigned int, fd, struct stat __user *, statbuf)
1da177e4
LT
370{
371 struct kstat stat;
372 int error = vfs_fstat(fd, &stat);
373
374 if (!error)
375 error = cp_new_stat(&stat, statbuf);
376
377 return error;
378}
379
6559eed8
HC
380SYSCALL_DEFINE4(readlinkat, int, dfd, const char __user *, pathname,
381 char __user *, buf, int, bufsiz)
1da177e4 382{
2d8f3038 383 struct path path;
1da177e4 384 int error;
1fa1e7f6 385 int empty = 0;
7955119e 386 unsigned int lookup_flags = LOOKUP_EMPTY;
1da177e4
LT
387
388 if (bufsiz <= 0)
389 return -EINVAL;
390
7955119e
JL
391retry:
392 error = user_path_at_empty(dfd, pathname, lookup_flags, &path, &empty);
1da177e4 393 if (!error) {
bb668734 394 struct inode *inode = d_backing_inode(path.dentry);
1da177e4 395
1fa1e7f6 396 error = empty ? -ENOENT : -EINVAL;
fd4a0edf
MS
397 /*
398 * AFS mountpoints allow readlink(2) but are not symlinks
399 */
400 if (d_is_symlink(path.dentry) || inode->i_op->readlink) {
2d8f3038 401 error = security_inode_readlink(path.dentry);
1da177e4 402 if (!error) {
68ac1234 403 touch_atime(&path);
fd4a0edf 404 error = vfs_readlink(path.dentry, buf, bufsiz);
1da177e4
LT
405 }
406 }
2d8f3038 407 path_put(&path);
7955119e
JL
408 if (retry_estale(error, lookup_flags)) {
409 lookup_flags |= LOOKUP_REVAL;
410 goto retry;
411 }
1da177e4
LT
412 }
413 return error;
414}
415
002c8976
HC
416SYSCALL_DEFINE3(readlink, const char __user *, path, char __user *, buf,
417 int, bufsiz)
5590ff0d
UD
418{
419 return sys_readlinkat(AT_FDCWD, path, buf, bufsiz);
420}
421
1da177e4
LT
422
423/* ---------- LFS-64 ----------- */
0753f70f 424#if defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_COMPAT_STAT64)
1da177e4 425
8529f613
LT
426#ifndef INIT_STRUCT_STAT64_PADDING
427# define INIT_STRUCT_STAT64_PADDING(st) memset(&st, 0, sizeof(st))
428#endif
429
1da177e4
LT
430static long cp_new_stat64(struct kstat *stat, struct stat64 __user *statbuf)
431{
432 struct stat64 tmp;
433
8529f613 434 INIT_STRUCT_STAT64_PADDING(tmp);
1da177e4
LT
435#ifdef CONFIG_MIPS
436 /* mips has weird padding, so we don't get 64 bits there */
1da177e4
LT
437 tmp.st_dev = new_encode_dev(stat->dev);
438 tmp.st_rdev = new_encode_dev(stat->rdev);
439#else
440 tmp.st_dev = huge_encode_dev(stat->dev);
441 tmp.st_rdev = huge_encode_dev(stat->rdev);
442#endif
443 tmp.st_ino = stat->ino;
afefdbb2
DH
444 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
445 return -EOVERFLOW;
1da177e4
LT
446#ifdef STAT64_HAS_BROKEN_ST_INO
447 tmp.__st_ino = stat->ino;
448#endif
449 tmp.st_mode = stat->mode;
450 tmp.st_nlink = stat->nlink;
a7c1938e
EB
451 tmp.st_uid = from_kuid_munged(current_user_ns(), stat->uid);
452 tmp.st_gid = from_kgid_munged(current_user_ns(), stat->gid);
1da177e4
LT
453 tmp.st_atime = stat->atime.tv_sec;
454 tmp.st_atime_nsec = stat->atime.tv_nsec;
455 tmp.st_mtime = stat->mtime.tv_sec;
456 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
457 tmp.st_ctime = stat->ctime.tv_sec;
458 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
459 tmp.st_size = stat->size;
460 tmp.st_blocks = stat->blocks;
461 tmp.st_blksize = stat->blksize;
462 return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0;
463}
464
c7887325
DH
465SYSCALL_DEFINE2(stat64, const char __user *, filename,
466 struct stat64 __user *, statbuf)
1da177e4
LT
467{
468 struct kstat stat;
469 int error = vfs_stat(filename, &stat);
470
471 if (!error)
472 error = cp_new_stat64(&stat, statbuf);
473
474 return error;
475}
257ac264 476
c7887325
DH
477SYSCALL_DEFINE2(lstat64, const char __user *, filename,
478 struct stat64 __user *, statbuf)
1da177e4
LT
479{
480 struct kstat stat;
481 int error = vfs_lstat(filename, &stat);
482
483 if (!error)
484 error = cp_new_stat64(&stat, statbuf);
485
486 return error;
487}
257ac264
HC
488
489SYSCALL_DEFINE2(fstat64, unsigned long, fd, struct stat64 __user *, statbuf)
1da177e4
LT
490{
491 struct kstat stat;
492 int error = vfs_fstat(fd, &stat);
493
494 if (!error)
495 error = cp_new_stat64(&stat, statbuf);
496
497 return error;
498}
499
c7887325 500SYSCALL_DEFINE4(fstatat64, int, dfd, const char __user *, filename,
6559eed8 501 struct stat64 __user *, statbuf, int, flag)
cff2b760
UD
502{
503 struct kstat stat;
0112fc22 504 int error;
cff2b760 505
0112fc22
OD
506 error = vfs_fstatat(dfd, filename, &stat, flag);
507 if (error)
508 return error;
509 return cp_new_stat64(&stat, statbuf);
cff2b760 510}
0753f70f 511#endif /* __ARCH_WANT_STAT64 || __ARCH_WANT_COMPAT_STAT64 */
1da177e4 512
64bd7204
EB
513static noinline_for_stack int
514cp_statx(const struct kstat *stat, struct statx __user *buffer)
a528d35e 515{
64bd7204
EB
516 struct statx tmp;
517
518 memset(&tmp, 0, sizeof(tmp));
519
520 tmp.stx_mask = stat->result_mask;
521 tmp.stx_blksize = stat->blksize;
522 tmp.stx_attributes = stat->attributes;
523 tmp.stx_nlink = stat->nlink;
524 tmp.stx_uid = from_kuid_munged(current_user_ns(), stat->uid);
525 tmp.stx_gid = from_kgid_munged(current_user_ns(), stat->gid);
526 tmp.stx_mode = stat->mode;
527 tmp.stx_ino = stat->ino;
528 tmp.stx_size = stat->size;
529 tmp.stx_blocks = stat->blocks;
3209f68b 530 tmp.stx_attributes_mask = stat->attributes_mask;
64bd7204
EB
531 tmp.stx_atime.tv_sec = stat->atime.tv_sec;
532 tmp.stx_atime.tv_nsec = stat->atime.tv_nsec;
533 tmp.stx_btime.tv_sec = stat->btime.tv_sec;
534 tmp.stx_btime.tv_nsec = stat->btime.tv_nsec;
535 tmp.stx_ctime.tv_sec = stat->ctime.tv_sec;
536 tmp.stx_ctime.tv_nsec = stat->ctime.tv_nsec;
537 tmp.stx_mtime.tv_sec = stat->mtime.tv_sec;
538 tmp.stx_mtime.tv_nsec = stat->mtime.tv_nsec;
539 tmp.stx_rdev_major = MAJOR(stat->rdev);
540 tmp.stx_rdev_minor = MINOR(stat->rdev);
541 tmp.stx_dev_major = MAJOR(stat->dev);
542 tmp.stx_dev_minor = MINOR(stat->dev);
543
544 return copy_to_user(buffer, &tmp, sizeof(tmp)) ? -EFAULT : 0;
a528d35e
DH
545}
546
547/**
548 * sys_statx - System call to get enhanced stats
549 * @dfd: Base directory to pathwalk from *or* fd to stat.
550 * @filename: File to stat *or* NULL.
551 * @flags: AT_* flags to control pathwalk.
552 * @mask: Parts of statx struct actually required.
553 * @buffer: Result buffer.
554 *
555 * Note that if filename is NULL, then it does the equivalent of fstat() using
556 * dfd to indicate the file of interest.
557 */
558SYSCALL_DEFINE5(statx,
559 int, dfd, const char __user *, filename, unsigned, flags,
560 unsigned int, mask,
561 struct statx __user *, buffer)
562{
563 struct kstat stat;
564 int error;
565
47071aee
DH
566 if (mask & STATX__RESERVED)
567 return -EINVAL;
a528d35e
DH
568 if ((flags & AT_STATX_SYNC_TYPE) == AT_STATX_SYNC_TYPE)
569 return -EINVAL;
a528d35e
DH
570
571 if (filename)
572 error = vfs_statx(dfd, filename, flags, &stat, mask);
573 else
574 error = vfs_statx_fd(dfd, &stat, mask, flags);
575 if (error)
576 return error;
64bd7204
EB
577
578 return cp_statx(&stat, buffer);
a528d35e
DH
579}
580
b462707e
DM
581/* Caller is here responsible for sufficient locking (ie. inode->i_lock) */
582void __inode_add_bytes(struct inode *inode, loff_t bytes)
1da177e4 583{
1da177e4
LT
584 inode->i_blocks += bytes >> 9;
585 bytes &= 511;
586 inode->i_bytes += bytes;
587 if (inode->i_bytes >= 512) {
588 inode->i_blocks++;
589 inode->i_bytes -= 512;
590 }
b462707e
DM
591}
592
593void inode_add_bytes(struct inode *inode, loff_t bytes)
594{
595 spin_lock(&inode->i_lock);
596 __inode_add_bytes(inode, bytes);
1da177e4
LT
597 spin_unlock(&inode->i_lock);
598}
599
600EXPORT_SYMBOL(inode_add_bytes);
601
1c8924eb 602void __inode_sub_bytes(struct inode *inode, loff_t bytes)
1da177e4 603{
1da177e4
LT
604 inode->i_blocks -= bytes >> 9;
605 bytes &= 511;
606 if (inode->i_bytes < bytes) {
607 inode->i_blocks--;
608 inode->i_bytes += 512;
609 }
610 inode->i_bytes -= bytes;
1c8924eb
JK
611}
612
613EXPORT_SYMBOL(__inode_sub_bytes);
614
615void inode_sub_bytes(struct inode *inode, loff_t bytes)
616{
617 spin_lock(&inode->i_lock);
618 __inode_sub_bytes(inode, bytes);
1da177e4
LT
619 spin_unlock(&inode->i_lock);
620}
621
622EXPORT_SYMBOL(inode_sub_bytes);
623
624loff_t inode_get_bytes(struct inode *inode)
625{
626 loff_t ret;
627
628 spin_lock(&inode->i_lock);
629 ret = (((loff_t)inode->i_blocks) << 9) + inode->i_bytes;
630 spin_unlock(&inode->i_lock);
631 return ret;
632}
633
634EXPORT_SYMBOL(inode_get_bytes);
635
636void inode_set_bytes(struct inode *inode, loff_t bytes)
637{
638 /* Caller is here responsible for sufficient locking
639 * (ie. inode->i_lock) */
640 inode->i_blocks = bytes >> 9;
641 inode->i_bytes = bytes & 511;
642}
643
644EXPORT_SYMBOL(inode_set_bytes);