1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0 21da177e4SLinus Torvalds /* 31da177e4SLinus Torvalds * linux/fs/stat.c 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Copyright (C) 1991, 1992 Linus Torvalds 61da177e4SLinus Torvalds */ 71da177e4SLinus Torvalds 8630d9c47SPaul Gortmaker #include <linux/export.h> 91da177e4SLinus Torvalds #include <linux/mm.h> 101da177e4SLinus Torvalds #include <linux/errno.h> 111da177e4SLinus Torvalds #include <linux/file.h> 121da177e4SLinus Torvalds #include <linux/highuid.h> 131da177e4SLinus Torvalds #include <linux/fs.h> 141da177e4SLinus Torvalds #include <linux/namei.h> 151da177e4SLinus Torvalds #include <linux/security.h> 165b825c3aSIngo Molnar #include <linux/cred.h> 171da177e4SLinus Torvalds #include <linux/syscalls.h> 18ba52de12STheodore Ts'o #include <linux/pagemap.h> 19ac565de3SAl Viro #include <linux/compat.h> 201da177e4SLinus Torvalds 217c0f6ba6SLinus Torvalds #include <linux/uaccess.h> 221da177e4SLinus Torvalds #include <asm/unistd.h> 231da177e4SLinus Torvalds 243934e36fSJens Axboe #include "internal.h" 25fa2fcf4fSMiklos Szeredi #include "mount.h" 263934e36fSJens Axboe 27a528d35eSDavid Howells /** 28a528d35eSDavid Howells * generic_fillattr - Fill in the basic attributes from the inode struct 290d56a451SChristian Brauner * @mnt_userns: user namespace of the mount the inode was found from 30a528d35eSDavid Howells * @inode: Inode to use as the source 31a528d35eSDavid Howells * @stat: Where to fill in the attributes 32a528d35eSDavid Howells * 33a528d35eSDavid Howells * Fill in the basic attributes in the kstat structure from data that's to be 34a528d35eSDavid Howells * found on the VFS inode structure. This is the default if no getattr inode 35a528d35eSDavid Howells * operation is supplied. 360d56a451SChristian Brauner * 370d56a451SChristian Brauner * If the inode has been found through an idmapped mount the user namespace of 380d56a451SChristian Brauner * the vfsmount must be passed through @mnt_userns. This function will then 390d56a451SChristian Brauner * take care to map the inode according to @mnt_userns before filling in the 400d56a451SChristian Brauner * uid and gid filds. On non-idmapped mounts or if permission checking is to be 410d56a451SChristian Brauner * performed on the raw inode simply passs init_user_ns. 42a528d35eSDavid Howells */ 430d56a451SChristian Brauner void generic_fillattr(struct user_namespace *mnt_userns, struct inode *inode, 440d56a451SChristian Brauner struct kstat *stat) 451da177e4SLinus Torvalds { 461da177e4SLinus Torvalds stat->dev = inode->i_sb->s_dev; 471da177e4SLinus Torvalds stat->ino = inode->i_ino; 481da177e4SLinus Torvalds stat->mode = inode->i_mode; 491da177e4SLinus Torvalds stat->nlink = inode->i_nlink; 500d56a451SChristian Brauner stat->uid = i_uid_into_mnt(mnt_userns, inode); 510d56a451SChristian Brauner stat->gid = i_gid_into_mnt(mnt_userns, inode); 521da177e4SLinus Torvalds stat->rdev = inode->i_rdev; 533ddcd056SLinus Torvalds stat->size = i_size_read(inode); 541da177e4SLinus Torvalds stat->atime = inode->i_atime; 551da177e4SLinus Torvalds stat->mtime = inode->i_mtime; 561da177e4SLinus Torvalds stat->ctime = inode->i_ctime; 5793407472SFabian Frederick stat->blksize = i_blocksize(inode); 583ddcd056SLinus Torvalds stat->blocks = inode->i_blocks; 59a528d35eSDavid Howells } 601da177e4SLinus Torvalds EXPORT_SYMBOL(generic_fillattr); 611da177e4SLinus Torvalds 62b7a6ec52SJ. Bruce Fields /** 63b7a6ec52SJ. Bruce Fields * vfs_getattr_nosec - getattr without security checks 64b7a6ec52SJ. Bruce Fields * @path: file to get attributes from 65b7a6ec52SJ. Bruce Fields * @stat: structure to return attributes in 66a528d35eSDavid Howells * @request_mask: STATX_xxx flags indicating what the caller wants 67f2d077ffSChristoph Hellwig * @query_flags: Query mode (AT_STATX_SYNC_TYPE) 68b7a6ec52SJ. Bruce Fields * 69b7a6ec52SJ. Bruce Fields * Get attributes without calling security_inode_getattr. 70b7a6ec52SJ. Bruce Fields * 71b7a6ec52SJ. Bruce Fields * Currently the only caller other than vfs_getattr is internal to the 72a528d35eSDavid Howells * filehandle lookup code, which uses only the inode number and returns no 73a528d35eSDavid Howells * attributes to any user. Any other code probably wants vfs_getattr. 74b7a6ec52SJ. Bruce Fields */ 75a528d35eSDavid Howells int vfs_getattr_nosec(const struct path *path, struct kstat *stat, 76a528d35eSDavid Howells u32 request_mask, unsigned int query_flags) 771da177e4SLinus Torvalds { 78549c7297SChristian Brauner struct user_namespace *mnt_userns; 79bb668734SDavid Howells struct inode *inode = d_backing_inode(path->dentry); 801da177e4SLinus Torvalds 81a528d35eSDavid Howells memset(stat, 0, sizeof(*stat)); 82a528d35eSDavid Howells stat->result_mask |= STATX_BASIC_STATS; 83f2d077ffSChristoph Hellwig query_flags &= AT_STATX_SYNC_TYPE; 84801e5237SChristoph Hellwig 85801e5237SChristoph Hellwig /* allow the fs to override these if it really wants to */ 86761e28faSMiklos Szeredi /* SB_NOATIME means filesystem supplies dummy atime value */ 87761e28faSMiklos Szeredi if (inode->i_sb->s_flags & SB_NOATIME) 88801e5237SChristoph Hellwig stat->result_mask &= ~STATX_ATIME; 89*5afa7e8bSTheodore Ts'o 90*5afa7e8bSTheodore Ts'o /* 91*5afa7e8bSTheodore Ts'o * Note: If you add another clause to set an attribute flag, please 92*5afa7e8bSTheodore Ts'o * update attributes_mask below. 93*5afa7e8bSTheodore Ts'o */ 94801e5237SChristoph Hellwig if (IS_AUTOMOUNT(inode)) 95801e5237SChristoph Hellwig stat->attributes |= STATX_ATTR_AUTOMOUNT; 96801e5237SChristoph Hellwig 97712b2698SIra Weiny if (IS_DAX(inode)) 98712b2698SIra Weiny stat->attributes |= STATX_ATTR_DAX; 99712b2698SIra Weiny 100*5afa7e8bSTheodore Ts'o stat->attributes_mask |= (STATX_ATTR_AUTOMOUNT | 101*5afa7e8bSTheodore Ts'o STATX_ATTR_DAX); 102*5afa7e8bSTheodore Ts'o 103549c7297SChristian Brauner mnt_userns = mnt_user_ns(path->mnt); 1041da177e4SLinus Torvalds if (inode->i_op->getattr) 105549c7297SChristian Brauner return inode->i_op->getattr(mnt_userns, path, stat, 106549c7297SChristian Brauner request_mask, query_flags); 1071da177e4SLinus Torvalds 108549c7297SChristian Brauner generic_fillattr(mnt_userns, inode, stat); 1091da177e4SLinus Torvalds return 0; 1101da177e4SLinus Torvalds } 111b7a6ec52SJ. Bruce Fields EXPORT_SYMBOL(vfs_getattr_nosec); 112b7a6ec52SJ. Bruce Fields 113a528d35eSDavid Howells /* 114a528d35eSDavid Howells * vfs_getattr - Get the enhanced basic attributes of a file 115a528d35eSDavid Howells * @path: The file of interest 116a528d35eSDavid Howells * @stat: Where to return the statistics 117a528d35eSDavid Howells * @request_mask: STATX_xxx flags indicating what the caller wants 118f2d077ffSChristoph Hellwig * @query_flags: Query mode (AT_STATX_SYNC_TYPE) 119a528d35eSDavid Howells * 120a528d35eSDavid Howells * Ask the filesystem for a file's attributes. The caller must indicate in 121a528d35eSDavid Howells * request_mask and query_flags to indicate what they want. 122a528d35eSDavid Howells * 123a528d35eSDavid Howells * If the file is remote, the filesystem can be forced to update the attributes 124a528d35eSDavid Howells * from the backing store by passing AT_STATX_FORCE_SYNC in query_flags or can 125a528d35eSDavid Howells * suppress the update by passing AT_STATX_DONT_SYNC. 126a528d35eSDavid Howells * 127a528d35eSDavid Howells * Bits must have been set in request_mask to indicate which attributes the 128a528d35eSDavid Howells * caller wants retrieving. Any such attribute not requested may be returned 129a528d35eSDavid Howells * anyway, but the value may be approximate, and, if remote, may not have been 130a528d35eSDavid Howells * synchronised with the server. 131a528d35eSDavid Howells * 132a528d35eSDavid Howells * 0 will be returned on success, and a -ve error code if unsuccessful. 133a528d35eSDavid Howells */ 134a528d35eSDavid Howells int vfs_getattr(const struct path *path, struct kstat *stat, 135a528d35eSDavid Howells u32 request_mask, unsigned int query_flags) 136b7a6ec52SJ. Bruce Fields { 137b7a6ec52SJ. Bruce Fields int retval; 138b7a6ec52SJ. Bruce Fields 1393f7036a0SAl Viro retval = security_inode_getattr(path); 140b7a6ec52SJ. Bruce Fields if (retval) 141b7a6ec52SJ. Bruce Fields return retval; 142a528d35eSDavid Howells return vfs_getattr_nosec(path, stat, request_mask, query_flags); 143b7a6ec52SJ. Bruce Fields } 1441da177e4SLinus Torvalds EXPORT_SYMBOL(vfs_getattr); 1451da177e4SLinus Torvalds 146a528d35eSDavid Howells /** 147da9aa5d9SChristoph Hellwig * vfs_fstat - Get the basic attributes by file descriptor 148a528d35eSDavid Howells * @fd: The file descriptor referring to the file of interest 149a528d35eSDavid Howells * @stat: The result structure to fill in. 150a528d35eSDavid Howells * 151a528d35eSDavid Howells * This function is a wrapper around vfs_getattr(). The main difference is 152a528d35eSDavid Howells * that it uses a file descriptor to determine the file location. 153a528d35eSDavid Howells * 154a528d35eSDavid Howells * 0 will be returned on success, and a -ve error code if unsuccessful. 155a528d35eSDavid Howells */ 156da9aa5d9SChristoph Hellwig int vfs_fstat(int fd, struct kstat *stat) 1571da177e4SLinus Torvalds { 1588c7493aaSEric Biggers struct fd f; 159da9aa5d9SChristoph Hellwig int error; 1608c7493aaSEric Biggers 1618c7493aaSEric Biggers f = fdget_raw(fd); 162da9aa5d9SChristoph Hellwig if (!f.file) 163da9aa5d9SChristoph Hellwig return -EBADF; 164da9aa5d9SChristoph Hellwig error = vfs_getattr(&f.file->f_path, stat, STATX_BASIC_STATS, 0); 1652903ff01SAl Viro fdput(f); 1661da177e4SLinus Torvalds return error; 1671da177e4SLinus Torvalds } 1681da177e4SLinus Torvalds 169a528d35eSDavid Howells /** 170a528d35eSDavid Howells * vfs_statx - Get basic and extra attributes by filename 171a528d35eSDavid Howells * @dfd: A file descriptor representing the base dir for a relative filename 172a528d35eSDavid Howells * @filename: The name of the file of interest 173a528d35eSDavid Howells * @flags: Flags to control the query 174a528d35eSDavid Howells * @stat: The result structure to fill in. 175a528d35eSDavid Howells * @request_mask: STATX_xxx flags indicating what the caller wants 176a528d35eSDavid Howells * 177a528d35eSDavid Howells * This function is a wrapper around vfs_getattr(). The main difference is 178a528d35eSDavid Howells * that it uses a filename and base directory to determine the file location. 179a528d35eSDavid Howells * Additionally, the use of AT_SYMLINK_NOFOLLOW in flags will prevent a symlink 180a528d35eSDavid Howells * at the given name from being referenced. 181a528d35eSDavid Howells * 182a528d35eSDavid Howells * 0 will be returned on success, and a -ve error code if unsuccessful. 183a528d35eSDavid Howells */ 18409f1bde4SChristoph Hellwig static int vfs_statx(int dfd, const char __user *filename, int flags, 185a528d35eSDavid Howells struct kstat *stat, u32 request_mask) 1860112fc22SOleg Drokin { 1872eae7a18SChristoph Hellwig struct path path; 188b3f05150SChristoph Hellwig unsigned lookup_flags = 0; 189b3f05150SChristoph Hellwig int error; 1900112fc22SOleg Drokin 191b3f05150SChristoph Hellwig if (flags & ~(AT_SYMLINK_NOFOLLOW | AT_NO_AUTOMOUNT | AT_EMPTY_PATH | 192f2d077ffSChristoph Hellwig AT_STATX_SYNC_TYPE)) 193a528d35eSDavid Howells return -EINVAL; 194b3f05150SChristoph Hellwig 195b3f05150SChristoph Hellwig if (!(flags & AT_SYMLINK_NOFOLLOW)) 196b3f05150SChristoph Hellwig lookup_flags |= LOOKUP_FOLLOW; 197b3f05150SChristoph Hellwig if (!(flags & AT_NO_AUTOMOUNT)) 198b3f05150SChristoph Hellwig lookup_flags |= LOOKUP_AUTOMOUNT; 199b3f05150SChristoph Hellwig if (flags & AT_EMPTY_PATH) 200b3f05150SChristoph Hellwig lookup_flags |= LOOKUP_EMPTY; 201b3f05150SChristoph Hellwig 202836fb7e7SJeff Layton retry: 2032eae7a18SChristoph Hellwig error = user_path_at(dfd, filename, lookup_flags, &path); 2042eae7a18SChristoph Hellwig if (error) 2052eae7a18SChristoph Hellwig goto out; 2062eae7a18SChristoph Hellwig 207a528d35eSDavid Howells error = vfs_getattr(&path, stat, request_mask, flags); 208fa2fcf4fSMiklos Szeredi stat->mnt_id = real_mount(path.mnt)->mnt_id; 209fa2fcf4fSMiklos Szeredi stat->result_mask |= STATX_MNT_ID; 21080340fe3SMiklos Szeredi if (path.mnt->mnt_root == path.dentry) 21180340fe3SMiklos Szeredi stat->attributes |= STATX_ATTR_MOUNT_ROOT; 21280340fe3SMiklos Szeredi stat->attributes_mask |= STATX_ATTR_MOUNT_ROOT; 2132eae7a18SChristoph Hellwig path_put(&path); 214836fb7e7SJeff Layton if (retry_estale(error, lookup_flags)) { 215836fb7e7SJeff Layton lookup_flags |= LOOKUP_REVAL; 216836fb7e7SJeff Layton goto retry; 217836fb7e7SJeff Layton } 2180112fc22SOleg Drokin out: 2190112fc22SOleg Drokin return error; 2200112fc22SOleg Drokin } 2212eae7a18SChristoph Hellwig 22209f1bde4SChristoph Hellwig int vfs_fstatat(int dfd, const char __user *filename, 22309f1bde4SChristoph Hellwig struct kstat *stat, int flags) 22409f1bde4SChristoph Hellwig { 22509f1bde4SChristoph Hellwig return vfs_statx(dfd, filename, flags | AT_NO_AUTOMOUNT, 22609f1bde4SChristoph Hellwig stat, STATX_BASIC_STATS); 22709f1bde4SChristoph Hellwig } 2280112fc22SOleg Drokin 2291da177e4SLinus Torvalds #ifdef __ARCH_WANT_OLD_STAT 2301da177e4SLinus Torvalds 2311da177e4SLinus Torvalds /* 2321da177e4SLinus Torvalds * For backward compatibility? Maybe this should be moved 2331da177e4SLinus Torvalds * into arch/i386 instead? 2341da177e4SLinus Torvalds */ 2351da177e4SLinus Torvalds static int cp_old_stat(struct kstat *stat, struct __old_kernel_stat __user * statbuf) 2361da177e4SLinus Torvalds { 2371da177e4SLinus Torvalds static int warncount = 5; 2381da177e4SLinus Torvalds struct __old_kernel_stat tmp; 2391da177e4SLinus Torvalds 2401da177e4SLinus Torvalds if (warncount > 0) { 2411da177e4SLinus Torvalds warncount--; 2421da177e4SLinus Torvalds printk(KERN_WARNING "VFS: Warning: %s using old stat() call. Recompile your binary.\n", 2431da177e4SLinus Torvalds current->comm); 2441da177e4SLinus Torvalds } else if (warncount < 0) { 2451da177e4SLinus Torvalds /* it's laughable, but... */ 2461da177e4SLinus Torvalds warncount = 0; 2471da177e4SLinus Torvalds } 2481da177e4SLinus Torvalds 2491da177e4SLinus Torvalds memset(&tmp, 0, sizeof(struct __old_kernel_stat)); 2501da177e4SLinus Torvalds tmp.st_dev = old_encode_dev(stat->dev); 2511da177e4SLinus Torvalds tmp.st_ino = stat->ino; 252afefdbb2SDavid Howells if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 253afefdbb2SDavid Howells return -EOVERFLOW; 2541da177e4SLinus Torvalds tmp.st_mode = stat->mode; 2551da177e4SLinus Torvalds tmp.st_nlink = stat->nlink; 2561da177e4SLinus Torvalds if (tmp.st_nlink != stat->nlink) 2571da177e4SLinus Torvalds return -EOVERFLOW; 258a7c1938eSEric W. Biederman SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid)); 259a7c1938eSEric W. Biederman SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid)); 2601da177e4SLinus Torvalds tmp.st_rdev = old_encode_dev(stat->rdev); 2611da177e4SLinus Torvalds #if BITS_PER_LONG == 32 2621da177e4SLinus Torvalds if (stat->size > MAX_NON_LFS) 2631da177e4SLinus Torvalds return -EOVERFLOW; 2641da177e4SLinus Torvalds #endif 2651da177e4SLinus Torvalds tmp.st_size = stat->size; 2661da177e4SLinus Torvalds tmp.st_atime = stat->atime.tv_sec; 2671da177e4SLinus Torvalds tmp.st_mtime = stat->mtime.tv_sec; 2681da177e4SLinus Torvalds tmp.st_ctime = stat->ctime.tv_sec; 2691da177e4SLinus Torvalds return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0; 2701da177e4SLinus Torvalds } 2711da177e4SLinus Torvalds 272c7887325SDavid Howells SYSCALL_DEFINE2(stat, const char __user *, filename, 273c7887325SDavid Howells struct __old_kernel_stat __user *, statbuf) 2741da177e4SLinus Torvalds { 2751da177e4SLinus Torvalds struct kstat stat; 2762eae7a18SChristoph Hellwig int error; 2771da177e4SLinus Torvalds 2782eae7a18SChristoph Hellwig error = vfs_stat(filename, &stat); 2792eae7a18SChristoph Hellwig if (error) 2801da177e4SLinus Torvalds return error; 2812eae7a18SChristoph Hellwig 2822eae7a18SChristoph Hellwig return cp_old_stat(&stat, statbuf); 2831da177e4SLinus Torvalds } 284257ac264SHeiko Carstens 285c7887325SDavid Howells SYSCALL_DEFINE2(lstat, const char __user *, filename, 286c7887325SDavid Howells struct __old_kernel_stat __user *, statbuf) 2871da177e4SLinus Torvalds { 2881da177e4SLinus Torvalds struct kstat stat; 2892eae7a18SChristoph Hellwig int error; 2901da177e4SLinus Torvalds 2912eae7a18SChristoph Hellwig error = vfs_lstat(filename, &stat); 2922eae7a18SChristoph Hellwig if (error) 2931da177e4SLinus Torvalds return error; 2942eae7a18SChristoph Hellwig 2952eae7a18SChristoph Hellwig return cp_old_stat(&stat, statbuf); 2961da177e4SLinus Torvalds } 297257ac264SHeiko Carstens 298257ac264SHeiko Carstens SYSCALL_DEFINE2(fstat, unsigned int, fd, struct __old_kernel_stat __user *, statbuf) 2991da177e4SLinus Torvalds { 3001da177e4SLinus Torvalds struct kstat stat; 3011da177e4SLinus Torvalds int error = vfs_fstat(fd, &stat); 3021da177e4SLinus Torvalds 3031da177e4SLinus Torvalds if (!error) 3041da177e4SLinus Torvalds error = cp_old_stat(&stat, statbuf); 3051da177e4SLinus Torvalds 3061da177e4SLinus Torvalds return error; 3071da177e4SLinus Torvalds } 3081da177e4SLinus Torvalds 3091da177e4SLinus Torvalds #endif /* __ARCH_WANT_OLD_STAT */ 3101da177e4SLinus Torvalds 31182b355d1SArnd Bergmann #ifdef __ARCH_WANT_NEW_STAT 31282b355d1SArnd Bergmann 313a52dd971SLinus Torvalds #if BITS_PER_LONG == 32 314a52dd971SLinus Torvalds # define choose_32_64(a,b) a 315a52dd971SLinus Torvalds #else 316a52dd971SLinus Torvalds # define choose_32_64(a,b) b 317a52dd971SLinus Torvalds #endif 318a52dd971SLinus Torvalds 3194c416f42SYaowei Bai #define valid_dev(x) choose_32_64(old_valid_dev(x),true) 320a52dd971SLinus Torvalds #define encode_dev(x) choose_32_64(old_encode_dev,new_encode_dev)(x) 321a52dd971SLinus Torvalds 3228529f613SLinus Torvalds #ifndef INIT_STRUCT_STAT_PADDING 3238529f613SLinus Torvalds # define INIT_STRUCT_STAT_PADDING(st) memset(&st, 0, sizeof(st)) 3248529f613SLinus Torvalds #endif 3258529f613SLinus Torvalds 3261da177e4SLinus Torvalds static int cp_new_stat(struct kstat *stat, struct stat __user *statbuf) 3271da177e4SLinus Torvalds { 3281da177e4SLinus Torvalds struct stat tmp; 3291da177e4SLinus Torvalds 330a52dd971SLinus Torvalds if (!valid_dev(stat->dev) || !valid_dev(stat->rdev)) 3311da177e4SLinus Torvalds return -EOVERFLOW; 332a52dd971SLinus Torvalds #if BITS_PER_LONG == 32 333a52dd971SLinus Torvalds if (stat->size > MAX_NON_LFS) 3341da177e4SLinus Torvalds return -EOVERFLOW; 3351da177e4SLinus Torvalds #endif 3361da177e4SLinus Torvalds 3378529f613SLinus Torvalds INIT_STRUCT_STAT_PADDING(tmp); 338a52dd971SLinus Torvalds tmp.st_dev = encode_dev(stat->dev); 3391da177e4SLinus Torvalds tmp.st_ino = stat->ino; 340afefdbb2SDavid Howells if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 341afefdbb2SDavid Howells return -EOVERFLOW; 3421da177e4SLinus Torvalds tmp.st_mode = stat->mode; 3431da177e4SLinus Torvalds tmp.st_nlink = stat->nlink; 3441da177e4SLinus Torvalds if (tmp.st_nlink != stat->nlink) 3451da177e4SLinus Torvalds return -EOVERFLOW; 346a7c1938eSEric W. Biederman SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid)); 347a7c1938eSEric W. Biederman SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid)); 348a52dd971SLinus Torvalds tmp.st_rdev = encode_dev(stat->rdev); 3491da177e4SLinus Torvalds tmp.st_size = stat->size; 3501da177e4SLinus Torvalds tmp.st_atime = stat->atime.tv_sec; 3511da177e4SLinus Torvalds tmp.st_mtime = stat->mtime.tv_sec; 3521da177e4SLinus Torvalds tmp.st_ctime = stat->ctime.tv_sec; 3531da177e4SLinus Torvalds #ifdef STAT_HAVE_NSEC 3541da177e4SLinus Torvalds tmp.st_atime_nsec = stat->atime.tv_nsec; 3551da177e4SLinus Torvalds tmp.st_mtime_nsec = stat->mtime.tv_nsec; 3561da177e4SLinus Torvalds tmp.st_ctime_nsec = stat->ctime.tv_nsec; 3571da177e4SLinus Torvalds #endif 3581da177e4SLinus Torvalds tmp.st_blocks = stat->blocks; 3591da177e4SLinus Torvalds tmp.st_blksize = stat->blksize; 3601da177e4SLinus Torvalds return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0; 3611da177e4SLinus Torvalds } 3621da177e4SLinus Torvalds 363c7887325SDavid Howells SYSCALL_DEFINE2(newstat, const char __user *, filename, 364c7887325SDavid Howells struct stat __user *, statbuf) 3651da177e4SLinus Torvalds { 3661da177e4SLinus Torvalds struct kstat stat; 3672eae7a18SChristoph Hellwig int error = vfs_stat(filename, &stat); 3681da177e4SLinus Torvalds 3692eae7a18SChristoph Hellwig if (error) 3701da177e4SLinus Torvalds return error; 3712eae7a18SChristoph Hellwig return cp_new_stat(&stat, statbuf); 3721da177e4SLinus Torvalds } 3735590ff0dSUlrich Drepper 374c7887325SDavid Howells SYSCALL_DEFINE2(newlstat, const char __user *, filename, 375c7887325SDavid Howells struct stat __user *, statbuf) 3761da177e4SLinus Torvalds { 3771da177e4SLinus Torvalds struct kstat stat; 3782eae7a18SChristoph Hellwig int error; 3791da177e4SLinus Torvalds 3802eae7a18SChristoph Hellwig error = vfs_lstat(filename, &stat); 3812eae7a18SChristoph Hellwig if (error) 3821da177e4SLinus Torvalds return error; 3832eae7a18SChristoph Hellwig 3842eae7a18SChristoph Hellwig return cp_new_stat(&stat, statbuf); 3851da177e4SLinus Torvalds } 3865590ff0dSUlrich Drepper 3872833c28aSAndreas Schwab #if !defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_SYS_NEWFSTATAT) 388c7887325SDavid Howells SYSCALL_DEFINE4(newfstatat, int, dfd, const char __user *, filename, 3896559eed8SHeiko Carstens struct stat __user *, statbuf, int, flag) 3905590ff0dSUlrich Drepper { 3915590ff0dSUlrich Drepper struct kstat stat; 3920112fc22SOleg Drokin int error; 3935590ff0dSUlrich Drepper 3940112fc22SOleg Drokin error = vfs_fstatat(dfd, filename, &stat, flag); 3950112fc22SOleg Drokin if (error) 3965590ff0dSUlrich Drepper return error; 3970112fc22SOleg Drokin return cp_new_stat(&stat, statbuf); 3985590ff0dSUlrich Drepper } 399cff2b760SUlrich Drepper #endif 4005590ff0dSUlrich Drepper 401257ac264SHeiko Carstens SYSCALL_DEFINE2(newfstat, unsigned int, fd, struct stat __user *, statbuf) 4021da177e4SLinus Torvalds { 4031da177e4SLinus Torvalds struct kstat stat; 4041da177e4SLinus Torvalds int error = vfs_fstat(fd, &stat); 4051da177e4SLinus Torvalds 4061da177e4SLinus Torvalds if (!error) 4071da177e4SLinus Torvalds error = cp_new_stat(&stat, statbuf); 4081da177e4SLinus Torvalds 4091da177e4SLinus Torvalds return error; 4101da177e4SLinus Torvalds } 41182b355d1SArnd Bergmann #endif 4121da177e4SLinus Torvalds 4132dae0248SDominik Brodowski static int do_readlinkat(int dfd, const char __user *pathname, 4142dae0248SDominik Brodowski char __user *buf, int bufsiz) 4151da177e4SLinus Torvalds { 4162d8f3038SAl Viro struct path path; 4171da177e4SLinus Torvalds int error; 4181fa1e7f6SAndy Whitcroft int empty = 0; 4197955119eSJeff Layton unsigned int lookup_flags = LOOKUP_EMPTY; 4201da177e4SLinus Torvalds 4211da177e4SLinus Torvalds if (bufsiz <= 0) 4221da177e4SLinus Torvalds return -EINVAL; 4231da177e4SLinus Torvalds 4247955119eSJeff Layton retry: 4257955119eSJeff Layton error = user_path_at_empty(dfd, pathname, lookup_flags, &path, &empty); 4261da177e4SLinus Torvalds if (!error) { 427bb668734SDavid Howells struct inode *inode = d_backing_inode(path.dentry); 4281da177e4SLinus Torvalds 4291fa1e7f6SAndy Whitcroft error = empty ? -ENOENT : -EINVAL; 430fd4a0edfSMiklos Szeredi /* 431fd4a0edfSMiklos Szeredi * AFS mountpoints allow readlink(2) but are not symlinks 432fd4a0edfSMiklos Szeredi */ 433fd4a0edfSMiklos Szeredi if (d_is_symlink(path.dentry) || inode->i_op->readlink) { 4342d8f3038SAl Viro error = security_inode_readlink(path.dentry); 4351da177e4SLinus Torvalds if (!error) { 43668ac1234SAl Viro touch_atime(&path); 437fd4a0edfSMiklos Szeredi error = vfs_readlink(path.dentry, buf, bufsiz); 4381da177e4SLinus Torvalds } 4391da177e4SLinus Torvalds } 4402d8f3038SAl Viro path_put(&path); 4417955119eSJeff Layton if (retry_estale(error, lookup_flags)) { 4427955119eSJeff Layton lookup_flags |= LOOKUP_REVAL; 4437955119eSJeff Layton goto retry; 4447955119eSJeff Layton } 4451da177e4SLinus Torvalds } 4461da177e4SLinus Torvalds return error; 4471da177e4SLinus Torvalds } 4481da177e4SLinus Torvalds 4492dae0248SDominik Brodowski SYSCALL_DEFINE4(readlinkat, int, dfd, const char __user *, pathname, 4502dae0248SDominik Brodowski char __user *, buf, int, bufsiz) 4512dae0248SDominik Brodowski { 4522dae0248SDominik Brodowski return do_readlinkat(dfd, pathname, buf, bufsiz); 4532dae0248SDominik Brodowski } 4542dae0248SDominik Brodowski 455002c8976SHeiko Carstens SYSCALL_DEFINE3(readlink, const char __user *, path, char __user *, buf, 456002c8976SHeiko Carstens int, bufsiz) 4575590ff0dSUlrich Drepper { 4582dae0248SDominik Brodowski return do_readlinkat(AT_FDCWD, path, buf, bufsiz); 4595590ff0dSUlrich Drepper } 4605590ff0dSUlrich Drepper 4611da177e4SLinus Torvalds 4621da177e4SLinus Torvalds /* ---------- LFS-64 ----------- */ 4630753f70fSCatalin Marinas #if defined(__ARCH_WANT_STAT64) || defined(__ARCH_WANT_COMPAT_STAT64) 4641da177e4SLinus Torvalds 4658529f613SLinus Torvalds #ifndef INIT_STRUCT_STAT64_PADDING 4668529f613SLinus Torvalds # define INIT_STRUCT_STAT64_PADDING(st) memset(&st, 0, sizeof(st)) 4678529f613SLinus Torvalds #endif 4688529f613SLinus Torvalds 4691da177e4SLinus Torvalds static long cp_new_stat64(struct kstat *stat, struct stat64 __user *statbuf) 4701da177e4SLinus Torvalds { 4711da177e4SLinus Torvalds struct stat64 tmp; 4721da177e4SLinus Torvalds 4738529f613SLinus Torvalds INIT_STRUCT_STAT64_PADDING(tmp); 4741da177e4SLinus Torvalds #ifdef CONFIG_MIPS 4751da177e4SLinus Torvalds /* mips has weird padding, so we don't get 64 bits there */ 4761da177e4SLinus Torvalds tmp.st_dev = new_encode_dev(stat->dev); 4771da177e4SLinus Torvalds tmp.st_rdev = new_encode_dev(stat->rdev); 4781da177e4SLinus Torvalds #else 4791da177e4SLinus Torvalds tmp.st_dev = huge_encode_dev(stat->dev); 4801da177e4SLinus Torvalds tmp.st_rdev = huge_encode_dev(stat->rdev); 4811da177e4SLinus Torvalds #endif 4821da177e4SLinus Torvalds tmp.st_ino = stat->ino; 483afefdbb2SDavid Howells if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 484afefdbb2SDavid Howells return -EOVERFLOW; 4851da177e4SLinus Torvalds #ifdef STAT64_HAS_BROKEN_ST_INO 4861da177e4SLinus Torvalds tmp.__st_ino = stat->ino; 4871da177e4SLinus Torvalds #endif 4881da177e4SLinus Torvalds tmp.st_mode = stat->mode; 4891da177e4SLinus Torvalds tmp.st_nlink = stat->nlink; 490a7c1938eSEric W. Biederman tmp.st_uid = from_kuid_munged(current_user_ns(), stat->uid); 491a7c1938eSEric W. Biederman tmp.st_gid = from_kgid_munged(current_user_ns(), stat->gid); 4921da177e4SLinus Torvalds tmp.st_atime = stat->atime.tv_sec; 4931da177e4SLinus Torvalds tmp.st_atime_nsec = stat->atime.tv_nsec; 4941da177e4SLinus Torvalds tmp.st_mtime = stat->mtime.tv_sec; 4951da177e4SLinus Torvalds tmp.st_mtime_nsec = stat->mtime.tv_nsec; 4961da177e4SLinus Torvalds tmp.st_ctime = stat->ctime.tv_sec; 4971da177e4SLinus Torvalds tmp.st_ctime_nsec = stat->ctime.tv_nsec; 4981da177e4SLinus Torvalds tmp.st_size = stat->size; 4991da177e4SLinus Torvalds tmp.st_blocks = stat->blocks; 5001da177e4SLinus Torvalds tmp.st_blksize = stat->blksize; 5011da177e4SLinus Torvalds return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0; 5021da177e4SLinus Torvalds } 5031da177e4SLinus Torvalds 504c7887325SDavid Howells SYSCALL_DEFINE2(stat64, const char __user *, filename, 505c7887325SDavid Howells struct stat64 __user *, statbuf) 5061da177e4SLinus Torvalds { 5071da177e4SLinus Torvalds struct kstat stat; 5081da177e4SLinus Torvalds int error = vfs_stat(filename, &stat); 5091da177e4SLinus Torvalds 5101da177e4SLinus Torvalds if (!error) 5111da177e4SLinus Torvalds error = cp_new_stat64(&stat, statbuf); 5121da177e4SLinus Torvalds 5131da177e4SLinus Torvalds return error; 5141da177e4SLinus Torvalds } 515257ac264SHeiko Carstens 516c7887325SDavid Howells SYSCALL_DEFINE2(lstat64, const char __user *, filename, 517c7887325SDavid Howells struct stat64 __user *, statbuf) 5181da177e4SLinus Torvalds { 5191da177e4SLinus Torvalds struct kstat stat; 5201da177e4SLinus Torvalds int error = vfs_lstat(filename, &stat); 5211da177e4SLinus Torvalds 5221da177e4SLinus Torvalds if (!error) 5231da177e4SLinus Torvalds error = cp_new_stat64(&stat, statbuf); 5241da177e4SLinus Torvalds 5251da177e4SLinus Torvalds return error; 5261da177e4SLinus Torvalds } 527257ac264SHeiko Carstens 528257ac264SHeiko Carstens SYSCALL_DEFINE2(fstat64, unsigned long, fd, struct stat64 __user *, statbuf) 5291da177e4SLinus Torvalds { 5301da177e4SLinus Torvalds struct kstat stat; 5311da177e4SLinus Torvalds int error = vfs_fstat(fd, &stat); 5321da177e4SLinus Torvalds 5331da177e4SLinus Torvalds if (!error) 5341da177e4SLinus Torvalds error = cp_new_stat64(&stat, statbuf); 5351da177e4SLinus Torvalds 5361da177e4SLinus Torvalds return error; 5371da177e4SLinus Torvalds } 5381da177e4SLinus Torvalds 539c7887325SDavid Howells SYSCALL_DEFINE4(fstatat64, int, dfd, const char __user *, filename, 5406559eed8SHeiko Carstens struct stat64 __user *, statbuf, int, flag) 541cff2b760SUlrich Drepper { 542cff2b760SUlrich Drepper struct kstat stat; 5430112fc22SOleg Drokin int error; 544cff2b760SUlrich Drepper 5450112fc22SOleg Drokin error = vfs_fstatat(dfd, filename, &stat, flag); 5460112fc22SOleg Drokin if (error) 547cff2b760SUlrich Drepper return error; 5480112fc22SOleg Drokin return cp_new_stat64(&stat, statbuf); 549cff2b760SUlrich Drepper } 5500753f70fSCatalin Marinas #endif /* __ARCH_WANT_STAT64 || __ARCH_WANT_COMPAT_STAT64 */ 5511da177e4SLinus Torvalds 5526f88cc17SBijan Mottahedeh static noinline_for_stack int 55364bd7204SEric Biggers cp_statx(const struct kstat *stat, struct statx __user *buffer) 554a528d35eSDavid Howells { 55564bd7204SEric Biggers struct statx tmp; 556a528d35eSDavid Howells 55764bd7204SEric Biggers memset(&tmp, 0, sizeof(tmp)); 558a528d35eSDavid Howells 55964bd7204SEric Biggers tmp.stx_mask = stat->result_mask; 56064bd7204SEric Biggers tmp.stx_blksize = stat->blksize; 56164bd7204SEric Biggers tmp.stx_attributes = stat->attributes; 56264bd7204SEric Biggers tmp.stx_nlink = stat->nlink; 56364bd7204SEric Biggers tmp.stx_uid = from_kuid_munged(current_user_ns(), stat->uid); 56464bd7204SEric Biggers tmp.stx_gid = from_kgid_munged(current_user_ns(), stat->gid); 56564bd7204SEric Biggers tmp.stx_mode = stat->mode; 56664bd7204SEric Biggers tmp.stx_ino = stat->ino; 56764bd7204SEric Biggers tmp.stx_size = stat->size; 56864bd7204SEric Biggers tmp.stx_blocks = stat->blocks; 5693209f68bSDavid Howells tmp.stx_attributes_mask = stat->attributes_mask; 57064bd7204SEric Biggers tmp.stx_atime.tv_sec = stat->atime.tv_sec; 57164bd7204SEric Biggers tmp.stx_atime.tv_nsec = stat->atime.tv_nsec; 57264bd7204SEric Biggers tmp.stx_btime.tv_sec = stat->btime.tv_sec; 57364bd7204SEric Biggers tmp.stx_btime.tv_nsec = stat->btime.tv_nsec; 57464bd7204SEric Biggers tmp.stx_ctime.tv_sec = stat->ctime.tv_sec; 57564bd7204SEric Biggers tmp.stx_ctime.tv_nsec = stat->ctime.tv_nsec; 57664bd7204SEric Biggers tmp.stx_mtime.tv_sec = stat->mtime.tv_sec; 57764bd7204SEric Biggers tmp.stx_mtime.tv_nsec = stat->mtime.tv_nsec; 57864bd7204SEric Biggers tmp.stx_rdev_major = MAJOR(stat->rdev); 57964bd7204SEric Biggers tmp.stx_rdev_minor = MINOR(stat->rdev); 58064bd7204SEric Biggers tmp.stx_dev_major = MAJOR(stat->dev); 58164bd7204SEric Biggers tmp.stx_dev_minor = MINOR(stat->dev); 582fa2fcf4fSMiklos Szeredi tmp.stx_mnt_id = stat->mnt_id; 583a528d35eSDavid Howells 58464bd7204SEric Biggers return copy_to_user(buffer, &tmp, sizeof(tmp)) ? -EFAULT : 0; 585a528d35eSDavid Howells } 586a528d35eSDavid Howells 5870018784fSBijan Mottahedeh int do_statx(int dfd, const char __user *filename, unsigned flags, 5880018784fSBijan Mottahedeh unsigned int mask, struct statx __user *buffer) 5890018784fSBijan Mottahedeh { 5900018784fSBijan Mottahedeh struct kstat stat; 5910018784fSBijan Mottahedeh int error; 5920018784fSBijan Mottahedeh 5930018784fSBijan Mottahedeh if (mask & STATX__RESERVED) 5940018784fSBijan Mottahedeh return -EINVAL; 5950018784fSBijan Mottahedeh if ((flags & AT_STATX_SYNC_TYPE) == AT_STATX_SYNC_TYPE) 5960018784fSBijan Mottahedeh return -EINVAL; 5970018784fSBijan Mottahedeh 5980018784fSBijan Mottahedeh error = vfs_statx(dfd, filename, flags, &stat, mask); 5990018784fSBijan Mottahedeh if (error) 6000018784fSBijan Mottahedeh return error; 6010018784fSBijan Mottahedeh 6020018784fSBijan Mottahedeh return cp_statx(&stat, buffer); 6030018784fSBijan Mottahedeh } 6040018784fSBijan Mottahedeh 605a528d35eSDavid Howells /** 606a528d35eSDavid Howells * sys_statx - System call to get enhanced stats 607a528d35eSDavid Howells * @dfd: Base directory to pathwalk from *or* fd to stat. 6081e2f82d1SDavid Howells * @filename: File to stat or "" with AT_EMPTY_PATH 609a528d35eSDavid Howells * @flags: AT_* flags to control pathwalk. 610a528d35eSDavid Howells * @mask: Parts of statx struct actually required. 611a528d35eSDavid Howells * @buffer: Result buffer. 612a528d35eSDavid Howells * 6131e2f82d1SDavid Howells * Note that fstat() can be emulated by setting dfd to the fd of interest, 6141e2f82d1SDavid Howells * supplying "" as the filename and setting AT_EMPTY_PATH in the flags. 615a528d35eSDavid Howells */ 616a528d35eSDavid Howells SYSCALL_DEFINE5(statx, 617a528d35eSDavid Howells int, dfd, const char __user *, filename, unsigned, flags, 618a528d35eSDavid Howells unsigned int, mask, 619a528d35eSDavid Howells struct statx __user *, buffer) 620a528d35eSDavid Howells { 6210018784fSBijan Mottahedeh return do_statx(dfd, filename, flags, mask, buffer); 622a528d35eSDavid Howells } 623a528d35eSDavid Howells 624ac565de3SAl Viro #ifdef CONFIG_COMPAT 625ac565de3SAl Viro static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf) 626ac565de3SAl Viro { 627ac565de3SAl Viro struct compat_stat tmp; 628ac565de3SAl Viro 629ac565de3SAl Viro if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev)) 630ac565de3SAl Viro return -EOVERFLOW; 631ac565de3SAl Viro 632ac565de3SAl Viro memset(&tmp, 0, sizeof(tmp)); 633ac565de3SAl Viro tmp.st_dev = old_encode_dev(stat->dev); 634ac565de3SAl Viro tmp.st_ino = stat->ino; 635ac565de3SAl Viro if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino) 636ac565de3SAl Viro return -EOVERFLOW; 637ac565de3SAl Viro tmp.st_mode = stat->mode; 638ac565de3SAl Viro tmp.st_nlink = stat->nlink; 639ac565de3SAl Viro if (tmp.st_nlink != stat->nlink) 640ac565de3SAl Viro return -EOVERFLOW; 641ac565de3SAl Viro SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid)); 642ac565de3SAl Viro SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid)); 643ac565de3SAl Viro tmp.st_rdev = old_encode_dev(stat->rdev); 644ac565de3SAl Viro if ((u64) stat->size > MAX_NON_LFS) 645ac565de3SAl Viro return -EOVERFLOW; 646ac565de3SAl Viro tmp.st_size = stat->size; 647ac565de3SAl Viro tmp.st_atime = stat->atime.tv_sec; 648ac565de3SAl Viro tmp.st_atime_nsec = stat->atime.tv_nsec; 649ac565de3SAl Viro tmp.st_mtime = stat->mtime.tv_sec; 650ac565de3SAl Viro tmp.st_mtime_nsec = stat->mtime.tv_nsec; 651ac565de3SAl Viro tmp.st_ctime = stat->ctime.tv_sec; 652ac565de3SAl Viro tmp.st_ctime_nsec = stat->ctime.tv_nsec; 653ac565de3SAl Viro tmp.st_blocks = stat->blocks; 654ac565de3SAl Viro tmp.st_blksize = stat->blksize; 655ac565de3SAl Viro return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0; 656ac565de3SAl Viro } 657ac565de3SAl Viro 658ac565de3SAl Viro COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename, 659ac565de3SAl Viro struct compat_stat __user *, statbuf) 660ac565de3SAl Viro { 661ac565de3SAl Viro struct kstat stat; 662ac565de3SAl Viro int error; 663ac565de3SAl Viro 664ac565de3SAl Viro error = vfs_stat(filename, &stat); 665ac565de3SAl Viro if (error) 666ac565de3SAl Viro return error; 667ac565de3SAl Viro return cp_compat_stat(&stat, statbuf); 668ac565de3SAl Viro } 669ac565de3SAl Viro 670ac565de3SAl Viro COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename, 671ac565de3SAl Viro struct compat_stat __user *, statbuf) 672ac565de3SAl Viro { 673ac565de3SAl Viro struct kstat stat; 674ac565de3SAl Viro int error; 675ac565de3SAl Viro 676ac565de3SAl Viro error = vfs_lstat(filename, &stat); 677ac565de3SAl Viro if (error) 678ac565de3SAl Viro return error; 679ac565de3SAl Viro return cp_compat_stat(&stat, statbuf); 680ac565de3SAl Viro } 681ac565de3SAl Viro 682ac565de3SAl Viro #ifndef __ARCH_WANT_STAT64 683ac565de3SAl Viro COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd, 684ac565de3SAl Viro const char __user *, filename, 685ac565de3SAl Viro struct compat_stat __user *, statbuf, int, flag) 686ac565de3SAl Viro { 687ac565de3SAl Viro struct kstat stat; 688ac565de3SAl Viro int error; 689ac565de3SAl Viro 690ac565de3SAl Viro error = vfs_fstatat(dfd, filename, &stat, flag); 691ac565de3SAl Viro if (error) 692ac565de3SAl Viro return error; 693ac565de3SAl Viro return cp_compat_stat(&stat, statbuf); 694ac565de3SAl Viro } 695ac565de3SAl Viro #endif 696ac565de3SAl Viro 697ac565de3SAl Viro COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd, 698ac565de3SAl Viro struct compat_stat __user *, statbuf) 699ac565de3SAl Viro { 700ac565de3SAl Viro struct kstat stat; 701ac565de3SAl Viro int error = vfs_fstat(fd, &stat); 702ac565de3SAl Viro 703ac565de3SAl Viro if (!error) 704ac565de3SAl Viro error = cp_compat_stat(&stat, statbuf); 705ac565de3SAl Viro return error; 706ac565de3SAl Viro } 707ac565de3SAl Viro #endif 708ac565de3SAl Viro 709b462707eSDmitry Monakhov /* Caller is here responsible for sufficient locking (ie. inode->i_lock) */ 710b462707eSDmitry Monakhov void __inode_add_bytes(struct inode *inode, loff_t bytes) 7111da177e4SLinus Torvalds { 7121da177e4SLinus Torvalds inode->i_blocks += bytes >> 9; 7131da177e4SLinus Torvalds bytes &= 511; 7141da177e4SLinus Torvalds inode->i_bytes += bytes; 7151da177e4SLinus Torvalds if (inode->i_bytes >= 512) { 7161da177e4SLinus Torvalds inode->i_blocks++; 7171da177e4SLinus Torvalds inode->i_bytes -= 512; 7181da177e4SLinus Torvalds } 719b462707eSDmitry Monakhov } 720eb315d2aSAl Viro EXPORT_SYMBOL(__inode_add_bytes); 721b462707eSDmitry Monakhov 722b462707eSDmitry Monakhov void inode_add_bytes(struct inode *inode, loff_t bytes) 723b462707eSDmitry Monakhov { 724b462707eSDmitry Monakhov spin_lock(&inode->i_lock); 725b462707eSDmitry Monakhov __inode_add_bytes(inode, bytes); 7261da177e4SLinus Torvalds spin_unlock(&inode->i_lock); 7271da177e4SLinus Torvalds } 7281da177e4SLinus Torvalds 7291da177e4SLinus Torvalds EXPORT_SYMBOL(inode_add_bytes); 7301da177e4SLinus Torvalds 7311c8924ebSJan Kara void __inode_sub_bytes(struct inode *inode, loff_t bytes) 7321da177e4SLinus Torvalds { 7331da177e4SLinus Torvalds inode->i_blocks -= bytes >> 9; 7341da177e4SLinus Torvalds bytes &= 511; 7351da177e4SLinus Torvalds if (inode->i_bytes < bytes) { 7361da177e4SLinus Torvalds inode->i_blocks--; 7371da177e4SLinus Torvalds inode->i_bytes += 512; 7381da177e4SLinus Torvalds } 7391da177e4SLinus Torvalds inode->i_bytes -= bytes; 7401c8924ebSJan Kara } 7411c8924ebSJan Kara 7421c8924ebSJan Kara EXPORT_SYMBOL(__inode_sub_bytes); 7431c8924ebSJan Kara 7441c8924ebSJan Kara void inode_sub_bytes(struct inode *inode, loff_t bytes) 7451c8924ebSJan Kara { 7461c8924ebSJan Kara spin_lock(&inode->i_lock); 7471c8924ebSJan Kara __inode_sub_bytes(inode, bytes); 7481da177e4SLinus Torvalds spin_unlock(&inode->i_lock); 7491da177e4SLinus Torvalds } 7501da177e4SLinus Torvalds 7511da177e4SLinus Torvalds EXPORT_SYMBOL(inode_sub_bytes); 7521da177e4SLinus Torvalds 7531da177e4SLinus Torvalds loff_t inode_get_bytes(struct inode *inode) 7541da177e4SLinus Torvalds { 7551da177e4SLinus Torvalds loff_t ret; 7561da177e4SLinus Torvalds 7571da177e4SLinus Torvalds spin_lock(&inode->i_lock); 758f4a8116aSJan Kara ret = __inode_get_bytes(inode); 7591da177e4SLinus Torvalds spin_unlock(&inode->i_lock); 7601da177e4SLinus Torvalds return ret; 7611da177e4SLinus Torvalds } 7621da177e4SLinus Torvalds 7631da177e4SLinus Torvalds EXPORT_SYMBOL(inode_get_bytes); 7641da177e4SLinus Torvalds 7651da177e4SLinus Torvalds void inode_set_bytes(struct inode *inode, loff_t bytes) 7661da177e4SLinus Torvalds { 7671da177e4SLinus Torvalds /* Caller is here responsible for sufficient locking 7681da177e4SLinus Torvalds * (ie. inode->i_lock) */ 7691da177e4SLinus Torvalds inode->i_blocks = bytes >> 9; 7701da177e4SLinus Torvalds inode->i_bytes = bytes & 511; 7711da177e4SLinus Torvalds } 7721da177e4SLinus Torvalds 7731da177e4SLinus Torvalds EXPORT_SYMBOL(inode_set_bytes); 774