Blame view
fs/open.c
26.7 KB
1da177e4c
|
1 2 3 4 5 6 7 8 |
/* * linux/fs/open.c * * Copyright (C) 1991, 1992 Linus Torvalds */ #include <linux/string.h> #include <linux/mm.h> |
1da177e4c
|
9 |
#include <linux/file.h> |
9f3acc314
|
10 |
#include <linux/fdtable.h> |
0eeca2830
|
11 |
#include <linux/fsnotify.h> |
1da177e4c
|
12 |
#include <linux/module.h> |
1da177e4c
|
13 14 15 |
#include <linux/tty.h> #include <linux/namei.h> #include <linux/backing-dev.h> |
16f7e0fe2
|
16 |
#include <linux/capability.h> |
086f7316f
|
17 |
#include <linux/securebits.h> |
1da177e4c
|
18 19 |
#include <linux/security.h> #include <linux/mount.h> |
5590ff0d5
|
20 |
#include <linux/fcntl.h> |
5a0e3ad6a
|
21 |
#include <linux/slab.h> |
1da177e4c
|
22 23 |
#include <asm/uaccess.h> #include <linux/fs.h> |
ef3daeda7
|
24 |
#include <linux/personality.h> |
1da177e4c
|
25 26 |
#include <linux/pagemap.h> #include <linux/syscalls.h> |
ab2af1f50
|
27 |
#include <linux/rcupdate.h> |
73241ccca
|
28 |
#include <linux/audit.h> |
97ac73506
|
29 |
#include <linux/falloc.h> |
5ad4e53bd
|
30 |
#include <linux/fs_struct.h> |
b65a9cfc2
|
31 |
#include <linux/ima.h> |
2dfc1cae4
|
32 |
#include <linux/dnotify.h> |
1da177e4c
|
33 |
|
e81e3f4dc
|
34 |
#include "internal.h" |
4a30131e7
|
35 36 |
int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs, struct file *filp) |
1da177e4c
|
37 |
{ |
939a9421e
|
38 |
int ret; |
1da177e4c
|
39 40 41 42 43 44 45 |
struct iattr newattrs; /* Not pretty: "inode->i_size" shouldn't really be signed. But it is. */ if (length < 0) return -EINVAL; newattrs.ia_size = length; |
4a30131e7
|
46 |
newattrs.ia_valid = ATTR_SIZE | time_attrs; |
cc4e69dee
|
47 48 49 50 |
if (filp) { newattrs.ia_file = filp; newattrs.ia_valid |= ATTR_FILE; } |
1da177e4c
|
51 |
|
7b82dc0e6
|
52 |
/* Remove suid/sgid on truncate too */ |
939a9421e
|
53 54 55 |
ret = should_remove_suid(dentry); if (ret) newattrs.ia_valid |= ret | ATTR_FORCE; |
7b82dc0e6
|
56 |
|
1b1dcc1b5
|
57 |
mutex_lock(&dentry->d_inode->i_mutex); |
939a9421e
|
58 |
ret = notify_change(dentry, &newattrs); |
1b1dcc1b5
|
59 |
mutex_unlock(&dentry->d_inode->i_mutex); |
939a9421e
|
60 |
return ret; |
1da177e4c
|
61 |
} |
2d8f30380
|
62 |
static long do_sys_truncate(const char __user *pathname, loff_t length) |
1da177e4c
|
63 |
{ |
2d8f30380
|
64 65 |
struct path path; struct inode *inode; |
1da177e4c
|
66 67 68 69 70 |
int error; error = -EINVAL; if (length < 0) /* sorry, but loff_t says... */ goto out; |
2d8f30380
|
71 |
error = user_path(pathname, &path); |
1da177e4c
|
72 73 |
if (error) goto out; |
2d8f30380
|
74 |
inode = path.dentry->d_inode; |
1da177e4c
|
75 76 77 78 79 80 81 82 83 |
/* For directories it's -EISDIR, for other non-regulars - -EINVAL */ error = -EISDIR; if (S_ISDIR(inode->i_mode)) goto dput_and_out; error = -EINVAL; if (!S_ISREG(inode->i_mode)) goto dput_and_out; |
2d8f30380
|
84 |
error = mnt_want_write(path.mnt); |
1da177e4c
|
85 86 |
if (error) goto dput_and_out; |
256984a83
|
87 |
error = inode_permission(inode, MAY_WRITE); |
9ac9b8474
|
88 89 |
if (error) goto mnt_drop_write_and_out; |
1da177e4c
|
90 91 |
error = -EPERM; |
c82e42da8
|
92 |
if (IS_APPEND(inode)) |
9ac9b8474
|
93 |
goto mnt_drop_write_and_out; |
1da177e4c
|
94 |
|
9700382c3
|
95 |
error = get_write_access(inode); |
1da177e4c
|
96 |
if (error) |
9ac9b8474
|
97 |
goto mnt_drop_write_and_out; |
1da177e4c
|
98 |
|
9700382c3
|
99 100 101 102 |
/* * Make sure that there are no leases. get_write_access() protects * against the truncate racing with a lease-granting setlease(). */ |
8737c9305
|
103 |
error = break_lease(inode, O_WRONLY); |
1da177e4c
|
104 |
if (error) |
9700382c3
|
105 |
goto put_write_and_out; |
1da177e4c
|
106 107 |
error = locks_verify_truncate(inode, NULL, length); |
be6d3e56a
|
108 |
if (!error) |
ea0d3ab23
|
109 |
error = security_path_truncate(&path); |
907f4554e
|
110 |
if (!error) |
2d8f30380
|
111 |
error = do_truncate(path.dentry, length, 0, NULL); |
1da177e4c
|
112 |
|
9700382c3
|
113 114 |
put_write_and_out: put_write_access(inode); |
9ac9b8474
|
115 |
mnt_drop_write_and_out: |
2d8f30380
|
116 |
mnt_drop_write(path.mnt); |
1da177e4c
|
117 |
dput_and_out: |
2d8f30380
|
118 |
path_put(&path); |
1da177e4c
|
119 120 121 |
out: return error; } |
4fd8da8d6
|
122 |
SYSCALL_DEFINE2(truncate, const char __user *, path, long, length) |
1da177e4c
|
123 |
{ |
4fd8da8d6
|
124 |
return do_sys_truncate(path, length); |
1da177e4c
|
125 |
} |
b01ec0ef6
|
126 |
static long do_sys_ftruncate(unsigned int fd, loff_t length, int small) |
1da177e4c
|
127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 |
{ struct inode * inode; struct dentry *dentry; struct file * file; int error; error = -EINVAL; if (length < 0) goto out; error = -EBADF; file = fget(fd); if (!file) goto out; /* explicitly opened as large or we are on 64-bit box */ if (file->f_flags & O_LARGEFILE) small = 0; |
0f7fc9e4d
|
144 |
dentry = file->f_path.dentry; |
1da177e4c
|
145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 |
inode = dentry->d_inode; error = -EINVAL; if (!S_ISREG(inode->i_mode) || !(file->f_mode & FMODE_WRITE)) goto out_putf; error = -EINVAL; /* Cannot ftruncate over 2^31 bytes without large file support */ if (small && length > MAX_NON_LFS) goto out_putf; error = -EPERM; if (IS_APPEND(inode)) goto out_putf; error = locks_verify_truncate(inode, file, length); if (!error) |
ea0d3ab23
|
161 |
error = security_path_truncate(&file->f_path); |
be6d3e56a
|
162 |
if (!error) |
6e656be89
|
163 |
error = do_truncate(dentry, length, ATTR_MTIME|ATTR_CTIME, file); |
1da177e4c
|
164 165 166 167 168 |
out_putf: fput(file); out: return error; } |
bdc480e3b
|
169 |
SYSCALL_DEFINE2(ftruncate, unsigned int, fd, unsigned long, length) |
1da177e4c
|
170 |
{ |
0a489cb3b
|
171 |
long ret = do_sys_ftruncate(fd, length, 1); |
385910f2b
|
172 |
/* avoid REGPARM breakage on x86: */ |
54a015104
|
173 |
asmlinkage_protect(2, ret, fd, length); |
0a489cb3b
|
174 |
return ret; |
1da177e4c
|
175 176 177 178 |
} /* LFS versions of truncate are only needed on 32 bit machines */ #if BITS_PER_LONG == 32 |
6673e0c3f
|
179 |
SYSCALL_DEFINE(truncate64)(const char __user * path, loff_t length) |
1da177e4c
|
180 181 182 |
{ return do_sys_truncate(path, length); } |
6673e0c3f
|
183 184 185 186 187 188 189 |
#ifdef CONFIG_HAVE_SYSCALL_WRAPPERS asmlinkage long SyS_truncate64(long path, loff_t length) { return SYSC_truncate64((const char __user *) path, length); } SYSCALL_ALIAS(sys_truncate64, SyS_truncate64); #endif |
1da177e4c
|
190 |
|
6673e0c3f
|
191 |
SYSCALL_DEFINE(ftruncate64)(unsigned int fd, loff_t length) |
1da177e4c
|
192 |
{ |
0a489cb3b
|
193 |
long ret = do_sys_ftruncate(fd, length, 0); |
385910f2b
|
194 |
/* avoid REGPARM breakage on x86: */ |
54a015104
|
195 |
asmlinkage_protect(2, ret, fd, length); |
0a489cb3b
|
196 |
return ret; |
1da177e4c
|
197 |
} |
6673e0c3f
|
198 199 200 201 202 203 |
#ifdef CONFIG_HAVE_SYSCALL_WRAPPERS asmlinkage long SyS_ftruncate64(long fd, loff_t length) { return SYSC_ftruncate64((unsigned int) fd, length); } SYSCALL_ALIAS(sys_ftruncate64, SyS_ftruncate64); |
1da177e4c
|
204 |
#endif |
6673e0c3f
|
205 |
#endif /* BITS_PER_LONG == 32 */ |
1da177e4c
|
206 |
|
3e63cbb1e
|
207 208 |
int do_fallocate(struct file *file, int mode, loff_t offset, loff_t len) |
97ac73506
|
209 |
{ |
3e63cbb1e
|
210 211 |
struct inode *inode = file->f_path.dentry->d_inode; long ret; |
97ac73506
|
212 213 |
if (offset < 0 || len <= 0) |
3e63cbb1e
|
214 |
return -EINVAL; |
97ac73506
|
215 216 |
/* Return error if mode is not supported */ |
79124f18b
|
217 218 219 220 221 222 |
if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE)) return -EOPNOTSUPP; /* Punch hole must have keep size set */ if ((mode & FALLOC_FL_PUNCH_HOLE) && !(mode & FALLOC_FL_KEEP_SIZE)) |
3e63cbb1e
|
223 |
return -EOPNOTSUPP; |
97ac73506
|
224 |
|
97ac73506
|
225 |
if (!(file->f_mode & FMODE_WRITE)) |
3e63cbb1e
|
226 |
return -EBADF; |
1ca551c6c
|
227 228 229 230 231 232 233 |
/* It's not possible punch hole on append only file */ if (mode & FALLOC_FL_PUNCH_HOLE && IS_APPEND(inode)) return -EPERM; if (IS_IMMUTABLE(inode)) return -EPERM; |
97ac73506
|
234 235 236 237 238 239 |
/* * Revalidate the write permissions, in case security policy has * changed since the files were opened. */ ret = security_file_permission(file, MAY_WRITE); if (ret) |
3e63cbb1e
|
240 |
return ret; |
97ac73506
|
241 |
|
97ac73506
|
242 |
if (S_ISFIFO(inode->i_mode)) |
3e63cbb1e
|
243 |
return -ESPIPE; |
97ac73506
|
244 |
|
97ac73506
|
245 246 247 248 249 |
/* * Let individual file system decide if it supports preallocation * for directories or not. */ if (!S_ISREG(inode->i_mode) && !S_ISDIR(inode->i_mode)) |
3e63cbb1e
|
250 |
return -ENODEV; |
97ac73506
|
251 |
|
97ac73506
|
252 253 |
/* Check for wrap through zero too */ if (((offset + len) > inode->i_sb->s_maxbytes) || ((offset + len) < 0)) |
3e63cbb1e
|
254 |
return -EFBIG; |
97ac73506
|
255 |
|
2fe17c107
|
256 |
if (!file->f_op->fallocate) |
3e63cbb1e
|
257 |
return -EOPNOTSUPP; |
97ac73506
|
258 |
|
2fe17c107
|
259 |
return file->f_op->fallocate(file, mode, offset, len); |
3e63cbb1e
|
260 261 262 263 264 265 266 267 268 269 270 271 272 273 |
} SYSCALL_DEFINE(fallocate)(int fd, int mode, loff_t offset, loff_t len) { struct file *file; int error = -EBADF; file = fget(fd); if (file) { error = do_fallocate(file, mode, offset, len); fput(file); } return error; |
97ac73506
|
274 |
} |
3e63cbb1e
|
275 |
|
6673e0c3f
|
276 277 278 279 280 281 282 |
#ifdef CONFIG_HAVE_SYSCALL_WRAPPERS asmlinkage long SyS_fallocate(long fd, long mode, loff_t offset, loff_t len) { return SYSC_fallocate((int)fd, (int)mode, offset, len); } SYSCALL_ALIAS(sys_fallocate, SyS_fallocate); #endif |
97ac73506
|
283 |
|
1da177e4c
|
284 285 286 287 288 |
/* * access() needs to use the real uid/gid, not the effective uid/gid. * We do this by temporarily clearing all FS-related capabilities and * switching the fsuid/fsgid around to the real ones. */ |
6559eed8c
|
289 |
SYSCALL_DEFINE3(faccessat, int, dfd, const char __user *, filename, int, mode) |
1da177e4c
|
290 |
{ |
d84f4f992
|
291 292 |
const struct cred *old_cred; struct cred *override_cred; |
2d8f30380
|
293 |
struct path path; |
256984a83
|
294 |
struct inode *inode; |
1da177e4c
|
295 296 297 298 |
int res; if (mode & ~S_IRWXO) /* where's F_OK, X_OK, W_OK, R_OK? */ return -EINVAL; |
d84f4f992
|
299 300 301 |
override_cred = prepare_creds(); if (!override_cred) return -ENOMEM; |
1da177e4c
|
302 |
|
d84f4f992
|
303 304 |
override_cred->fsuid = override_cred->uid; override_cred->fsgid = override_cred->gid; |
1da177e4c
|
305 |
|
086f7316f
|
306 |
if (!issecure(SECURE_NO_SETUID_FIXUP)) { |
1cdcbec1a
|
307 |
/* Clear the capabilities if we switch to a non-root user */ |
d84f4f992
|
308 309 |
if (override_cred->uid) cap_clear(override_cred->cap_effective); |
086f7316f
|
310 |
else |
d84f4f992
|
311 312 |
override_cred->cap_effective = override_cred->cap_permitted; |
086f7316f
|
313 |
} |
1da177e4c
|
314 |
|
d84f4f992
|
315 |
old_cred = override_creds(override_cred); |
2d8f30380
|
316 |
res = user_path_at(dfd, filename, LOOKUP_FOLLOW, &path); |
6902d925d
|
317 318 |
if (res) goto out; |
2d8f30380
|
319 |
inode = path.dentry->d_inode; |
256984a83
|
320 321 |
if ((mode & MAY_EXEC) && S_ISREG(inode->i_mode)) { |
30524472c
|
322 323 324 325 326 |
/* * MAY_EXEC on regular files is denied if the fs is mounted * with the "noexec" flag. */ res = -EACCES; |
2d8f30380
|
327 |
if (path.mnt->mnt_flags & MNT_NOEXEC) |
30524472c
|
328 329 |
goto out_path_release; } |
256984a83
|
330 |
res = inode_permission(inode, mode | MAY_ACCESS); |
6902d925d
|
331 |
/* SuS v2 requires we report a read only fs too */ |
256984a83
|
332 |
if (res || !(mode & S_IWOTH) || special_file(inode->i_mode)) |
6902d925d
|
333 |
goto out_path_release; |
2f676cbc0
|
334 335 336 337 338 339 340 341 342 343 |
/* * This is a rare case where using __mnt_is_readonly() * is OK without a mnt_want/drop_write() pair. Since * no actual write to the fs is performed here, we do * not need to telegraph to that to anyone. * * By doing this, we accept that this access is * inherently racy and know that the fs may change * state before we even see this result. */ |
2d8f30380
|
344 |
if (__mnt_is_readonly(path.mnt)) |
6902d925d
|
345 |
res = -EROFS; |
1da177e4c
|
346 |
|
6902d925d
|
347 |
out_path_release: |
2d8f30380
|
348 |
path_put(&path); |
6902d925d
|
349 |
out: |
d84f4f992
|
350 351 |
revert_creds(old_cred); put_cred(override_cred); |
1da177e4c
|
352 353 |
return res; } |
ca013e945
|
354 |
SYSCALL_DEFINE2(access, const char __user *, filename, int, mode) |
5590ff0d5
|
355 356 357 |
{ return sys_faccessat(AT_FDCWD, filename, mode); } |
3cdad4288
|
358 |
SYSCALL_DEFINE1(chdir, const char __user *, filename) |
1da177e4c
|
359 |
{ |
2d8f30380
|
360 |
struct path path; |
1da177e4c
|
361 |
int error; |
2d8f30380
|
362 |
error = user_path_dir(filename, &path); |
1da177e4c
|
363 364 |
if (error) goto out; |
9cfcac810
|
365 |
error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); |
1da177e4c
|
366 367 |
if (error) goto dput_and_out; |
2d8f30380
|
368 |
set_fs_pwd(current->fs, &path); |
1da177e4c
|
369 370 |
dput_and_out: |
2d8f30380
|
371 |
path_put(&path); |
1da177e4c
|
372 373 374 |
out: return error; } |
3cdad4288
|
375 |
SYSCALL_DEFINE1(fchdir, unsigned int, fd) |
1da177e4c
|
376 377 |
{ struct file *file; |
1da177e4c
|
378 |
struct inode *inode; |
1da177e4c
|
379 380 381 382 383 384 |
int error; error = -EBADF; file = fget(fd); if (!file) goto out; |
ac748a09f
|
385 |
inode = file->f_path.dentry->d_inode; |
1da177e4c
|
386 387 388 389 |
error = -ENOTDIR; if (!S_ISDIR(inode->i_mode)) goto out_putf; |
9cfcac810
|
390 |
error = inode_permission(inode, MAY_EXEC | MAY_CHDIR); |
1da177e4c
|
391 |
if (!error) |
ac748a09f
|
392 |
set_fs_pwd(current->fs, &file->f_path); |
1da177e4c
|
393 394 395 396 397 |
out_putf: fput(file); out: return error; } |
3480b2574
|
398 |
SYSCALL_DEFINE1(chroot, const char __user *, filename) |
1da177e4c
|
399 |
{ |
2d8f30380
|
400 |
struct path path; |
1da177e4c
|
401 |
int error; |
2d8f30380
|
402 |
error = user_path_dir(filename, &path); |
1da177e4c
|
403 404 |
if (error) goto out; |
9cfcac810
|
405 |
error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); |
1da177e4c
|
406 407 408 409 410 411 |
if (error) goto dput_and_out; error = -EPERM; if (!capable(CAP_SYS_CHROOT)) goto dput_and_out; |
8b8efb440
|
412 413 414 |
error = security_path_chroot(&path); if (error) goto dput_and_out; |
1da177e4c
|
415 |
|
2d8f30380
|
416 |
set_fs_root(current->fs, &path); |
1da177e4c
|
417 418 |
error = 0; dput_and_out: |
2d8f30380
|
419 |
path_put(&path); |
1da177e4c
|
420 421 422 |
out: return error; } |
a26eab240
|
423 |
SYSCALL_DEFINE2(fchmod, unsigned int, fd, mode_t, mode) |
1da177e4c
|
424 425 426 427 428 429 430 431 432 433 |
{ struct inode * inode; struct dentry * dentry; struct file * file; int err = -EBADF; struct iattr newattrs; file = fget(fd); if (!file) goto out; |
0f7fc9e4d
|
434 |
dentry = file->f_path.dentry; |
1da177e4c
|
435 |
inode = dentry->d_inode; |
5a190ae69
|
436 |
audit_inode(NULL, dentry); |
73241ccca
|
437 |
|
96029c4e0
|
438 |
err = mnt_want_write_file(file); |
2af482a7e
|
439 |
if (err) |
1da177e4c
|
440 |
goto out_putf; |
fe542cf59
|
441 |
mutex_lock(&inode->i_mutex); |
89eda0683
|
442 443 |
err = security_path_chmod(dentry, file->f_vfsmnt, mode); if (err) |
fe542cf59
|
444 |
goto out_unlock; |
1da177e4c
|
445 446 447 448 449 |
if (mode == (mode_t) -1) mode = inode->i_mode; newattrs.ia_mode = (mode & S_IALLUGO) | (inode->i_mode & ~S_IALLUGO); newattrs.ia_valid = ATTR_MODE | ATTR_CTIME; err = notify_change(dentry, &newattrs); |
fe542cf59
|
450 |
out_unlock: |
1b1dcc1b5
|
451 |
mutex_unlock(&inode->i_mutex); |
2af482a7e
|
452 |
mnt_drop_write(file->f_path.mnt); |
1da177e4c
|
453 454 455 456 457 |
out_putf: fput(file); out: return err; } |
6559eed8c
|
458 |
SYSCALL_DEFINE3(fchmodat, int, dfd, const char __user *, filename, mode_t, mode) |
1da177e4c
|
459 |
{ |
2d8f30380
|
460 461 |
struct path path; struct inode *inode; |
1da177e4c
|
462 463 |
int error; struct iattr newattrs; |
2d8f30380
|
464 |
error = user_path_at(dfd, filename, LOOKUP_FOLLOW, &path); |
1da177e4c
|
465 466 |
if (error) goto out; |
2d8f30380
|
467 |
inode = path.dentry->d_inode; |
1da177e4c
|
468 |
|
2d8f30380
|
469 |
error = mnt_want_write(path.mnt); |
2af482a7e
|
470 |
if (error) |
1da177e4c
|
471 |
goto dput_and_out; |
fe542cf59
|
472 |
mutex_lock(&inode->i_mutex); |
89eda0683
|
473 474 |
error = security_path_chmod(path.dentry, path.mnt, mode); if (error) |
fe542cf59
|
475 |
goto out_unlock; |
1da177e4c
|
476 477 478 479 |
if (mode == (mode_t) -1) mode = inode->i_mode; newattrs.ia_mode = (mode & S_IALLUGO) | (inode->i_mode & ~S_IALLUGO); newattrs.ia_valid = ATTR_MODE | ATTR_CTIME; |
2d8f30380
|
480 |
error = notify_change(path.dentry, &newattrs); |
fe542cf59
|
481 |
out_unlock: |
1b1dcc1b5
|
482 |
mutex_unlock(&inode->i_mutex); |
2d8f30380
|
483 |
mnt_drop_write(path.mnt); |
1da177e4c
|
484 |
dput_and_out: |
2d8f30380
|
485 |
path_put(&path); |
1da177e4c
|
486 487 488 |
out: return error; } |
a26eab240
|
489 |
SYSCALL_DEFINE2(chmod, const char __user *, filename, mode_t, mode) |
5590ff0d5
|
490 491 492 |
{ return sys_fchmodat(AT_FDCWD, filename, mode); } |
fe542cf59
|
493 |
static int chown_common(struct path *path, uid_t user, gid_t group) |
1da177e4c
|
494 |
{ |
fe542cf59
|
495 |
struct inode *inode = path->dentry->d_inode; |
1da177e4c
|
496 497 |
int error; struct iattr newattrs; |
1da177e4c
|
498 499 500 501 502 503 504 505 506 507 |
newattrs.ia_valid = ATTR_CTIME; if (user != (uid_t) -1) { newattrs.ia_valid |= ATTR_UID; newattrs.ia_uid = user; } if (group != (gid_t) -1) { newattrs.ia_valid |= ATTR_GID; newattrs.ia_gid = group; } if (!S_ISDIR(inode->i_mode)) |
b53767719
|
508 509 |
newattrs.ia_valid |= ATTR_KILL_SUID | ATTR_KILL_SGID | ATTR_KILL_PRIV; |
1b1dcc1b5
|
510 |
mutex_lock(&inode->i_mutex); |
fe542cf59
|
511 512 513 |
error = security_path_chown(path, user, group); if (!error) error = notify_change(path->dentry, &newattrs); |
1b1dcc1b5
|
514 |
mutex_unlock(&inode->i_mutex); |
beb29e058
|
515 |
|
1da177e4c
|
516 517 |
return error; } |
ca013e945
|
518 |
SYSCALL_DEFINE3(chown, const char __user *, filename, uid_t, user, gid_t, group) |
1da177e4c
|
519 |
{ |
2d8f30380
|
520 |
struct path path; |
1da177e4c
|
521 |
int error; |
2d8f30380
|
522 |
error = user_path(filename, &path); |
6902d925d
|
523 524 |
if (error) goto out; |
2d8f30380
|
525 |
error = mnt_want_write(path.mnt); |
2af482a7e
|
526 527 |
if (error) goto out_release; |
fe542cf59
|
528 |
error = chown_common(&path, user, group); |
2d8f30380
|
529 |
mnt_drop_write(path.mnt); |
2af482a7e
|
530 |
out_release: |
2d8f30380
|
531 |
path_put(&path); |
6902d925d
|
532 |
out: |
1da177e4c
|
533 534 |
return error; } |
6559eed8c
|
535 536 |
SYSCALL_DEFINE5(fchownat, int, dfd, const char __user *, filename, uid_t, user, gid_t, group, int, flag) |
5590ff0d5
|
537 |
{ |
2d8f30380
|
538 |
struct path path; |
5590ff0d5
|
539 |
int error = -EINVAL; |
65cfc6722
|
540 |
int lookup_flags; |
5590ff0d5
|
541 |
|
65cfc6722
|
542 |
if ((flag & ~(AT_SYMLINK_NOFOLLOW | AT_EMPTY_PATH)) != 0) |
5590ff0d5
|
543 |
goto out; |
65cfc6722
|
544 545 546 547 |
lookup_flags = (flag & AT_SYMLINK_NOFOLLOW) ? 0 : LOOKUP_FOLLOW; if (flag & AT_EMPTY_PATH) lookup_flags |= LOOKUP_EMPTY; error = user_path_at(dfd, filename, lookup_flags, &path); |
6902d925d
|
548 549 |
if (error) goto out; |
2d8f30380
|
550 |
error = mnt_want_write(path.mnt); |
2af482a7e
|
551 552 |
if (error) goto out_release; |
fe542cf59
|
553 |
error = chown_common(&path, user, group); |
2d8f30380
|
554 |
mnt_drop_write(path.mnt); |
2af482a7e
|
555 |
out_release: |
2d8f30380
|
556 |
path_put(&path); |
5590ff0d5
|
557 558 559 |
out: return error; } |
ca013e945
|
560 |
SYSCALL_DEFINE3(lchown, const char __user *, filename, uid_t, user, gid_t, group) |
1da177e4c
|
561 |
{ |
2d8f30380
|
562 |
struct path path; |
1da177e4c
|
563 |
int error; |
2d8f30380
|
564 |
error = user_lpath(filename, &path); |
6902d925d
|
565 566 |
if (error) goto out; |
2d8f30380
|
567 |
error = mnt_want_write(path.mnt); |
2af482a7e
|
568 569 |
if (error) goto out_release; |
fe542cf59
|
570 |
error = chown_common(&path, user, group); |
2d8f30380
|
571 |
mnt_drop_write(path.mnt); |
2af482a7e
|
572 |
out_release: |
2d8f30380
|
573 |
path_put(&path); |
6902d925d
|
574 |
out: |
1da177e4c
|
575 576 |
return error; } |
ca013e945
|
577 |
SYSCALL_DEFINE3(fchown, unsigned int, fd, uid_t, user, gid_t, group) |
1da177e4c
|
578 579 580 |
{ struct file * file; int error = -EBADF; |
6902d925d
|
581 |
struct dentry * dentry; |
1da177e4c
|
582 583 |
file = fget(fd); |
6902d925d
|
584 585 |
if (!file) goto out; |
96029c4e0
|
586 |
error = mnt_want_write_file(file); |
2af482a7e
|
587 588 |
if (error) goto out_fput; |
0f7fc9e4d
|
589 |
dentry = file->f_path.dentry; |
5a190ae69
|
590 |
audit_inode(NULL, dentry); |
fe542cf59
|
591 |
error = chown_common(&file->f_path, user, group); |
2af482a7e
|
592 593 |
mnt_drop_write(file->f_path.mnt); out_fput: |
6902d925d
|
594 595 |
fput(file); out: |
1da177e4c
|
596 597 |
return error; } |
4a3fd211c
|
598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 |
/* * You have to be very careful that these write * counts get cleaned up in error cases and * upon __fput(). This should probably never * be called outside of __dentry_open(). */ static inline int __get_file_write_access(struct inode *inode, struct vfsmount *mnt) { int error; error = get_write_access(inode); if (error) return error; /* * Do not take mount writer counts on * special files since no writes to * the mount itself will occur. */ if (!special_file(inode->i_mode)) { /* * Balanced in __fput() */ error = mnt_want_write(mnt); if (error) put_write_access(inode); } return error; } |
a1a5b3d93
|
626 |
static struct file *__dentry_open(struct dentry *dentry, struct vfsmount *mnt, |
482928d59
|
627 |
struct file *f, |
745ca2475
|
628 629 |
int (*open)(struct inode *, struct file *), const struct cred *cred) |
1da177e4c
|
630 |
{ |
1abf0c718
|
631 |
static const struct file_operations empty_fops = {}; |
1da177e4c
|
632 633 |
struct inode *inode; int error; |
5300990c0
|
634 |
f->f_mode = OPEN_FMODE(f->f_flags) | FMODE_LSEEK | |
a1a5b3d93
|
635 |
FMODE_PREAD | FMODE_PWRITE; |
1abf0c718
|
636 637 638 |
if (unlikely(f->f_flags & O_PATH)) f->f_mode = FMODE_PATH; |
1da177e4c
|
639 640 |
inode = dentry->d_inode; if (f->f_mode & FMODE_WRITE) { |
4a3fd211c
|
641 |
error = __get_file_write_access(inode, mnt); |
1da177e4c
|
642 643 |
if (error) goto cleanup_file; |
ad775f5a8
|
644 645 |
if (!special_file(inode->i_mode)) file_take_write(f); |
1da177e4c
|
646 647 648 |
} f->f_mapping = inode->i_mapping; |
0f7fc9e4d
|
649 650 |
f->f_path.dentry = dentry; f->f_path.mnt = mnt; |
1da177e4c
|
651 |
f->f_pos = 0; |
ee2ffa0df
|
652 |
file_sb_list_add(f, inode->i_sb); |
1da177e4c
|
653 |
|
1abf0c718
|
654 655 656 657 658 659 |
if (unlikely(f->f_mode & FMODE_PATH)) { f->f_op = &empty_fops; return f; } f->f_op = fops_get(inode->i_fop); |
745ca2475
|
660 |
error = security_dentry_open(f, cred); |
788e7dd4c
|
661 662 |
if (error) goto cleanup_all; |
834f2a4a1
|
663 664 665 666 |
if (!open && f->f_op) open = f->f_op->open; if (open) { error = open(inode, f); |
1da177e4c
|
667 668 669 |
if (error) goto cleanup_all; } |
890275b5e
|
670 671 |
if ((f->f_mode & (FMODE_READ | FMODE_WRITE)) == FMODE_READ) i_readcount_inc(inode); |
834f2a4a1
|
672 |
|
1da177e4c
|
673 674 675 676 677 678 |
f->f_flags &= ~(O_CREAT | O_EXCL | O_NOCTTY | O_TRUNC); file_ra_state_init(&f->f_ra, f->f_mapping->host->i_mapping); /* NB: we're sure to have correct a_ops only after f_op->open */ if (f->f_flags & O_DIRECT) { |
ceffc0785
|
679 680 |
if (!f->f_mapping->a_ops || ((!f->f_mapping->a_ops->direct_IO) && |
70688e4dd
|
681 |
(!f->f_mapping->a_ops->get_xip_mem))) { |
1da177e4c
|
682 683 684 685 686 687 688 689 690 |
fput(f); f = ERR_PTR(-EINVAL); } } return f; cleanup_all: fops_put(f->f_op); |
4a3fd211c
|
691 |
if (f->f_mode & FMODE_WRITE) { |
1da177e4c
|
692 |
put_write_access(inode); |
ad775f5a8
|
693 694 695 696 697 698 699 700 |
if (!special_file(inode->i_mode)) { /* * We don't consider this a real * mnt_want/drop_write() pair * because it all happenend right * here, so just reset the state. */ file_reset_write(f); |
4a3fd211c
|
701 |
mnt_drop_write(mnt); |
ad775f5a8
|
702 |
} |
4a3fd211c
|
703 |
} |
ee2ffa0df
|
704 |
file_sb_list_del(f); |
0f7fc9e4d
|
705 706 |
f->f_path.dentry = NULL; f->f_path.mnt = NULL; |
1da177e4c
|
707 708 |
cleanup_file: put_filp(f); |
1da177e4c
|
709 710 711 712 |
dput(dentry); mntput(mnt); return ERR_PTR(error); } |
834f2a4a1
|
713 714 715 716 717 718 719 720 721 722 |
/** * lookup_instantiate_filp - instantiates the open intent filp * @nd: pointer to nameidata * @dentry: pointer to dentry * @open: open callback * * Helper for filesystems that want to use lookup open intents and pass back * a fully instantiated struct file to the caller. * This function is meant to be called from within a filesystem's * lookup method. |
9a56c2139
|
723 724 725 726 |
* Beware of calling it for non-regular files! Those ->open methods might block * (e.g. in fifo_open), leaving you with parent locked (and in case of fifo, * leading to a deadlock, as nobody can open that fifo anymore, because * another process to open fifo will block on locked parent when doing lookup). |
834f2a4a1
|
727 728 729 730 731 732 733 734 |
* Note that in case of error, nd->intent.open.file is destroyed, but the * path information remains valid. * If the open callback is set to NULL, then the standard f_op->open() * filesystem callback is substituted. */ struct file *lookup_instantiate_filp(struct nameidata *nd, struct dentry *dentry, int (*open)(struct inode *, struct file *)) { |
745ca2475
|
735 |
const struct cred *cred = current_cred(); |
834f2a4a1
|
736 737 738 739 |
if (IS_ERR(nd->intent.open.file)) goto out; if (IS_ERR(dentry)) goto out_err; |
4ac913785
|
740 |
nd->intent.open.file = __dentry_open(dget(dentry), mntget(nd->path.mnt), |
834f2a4a1
|
741 |
nd->intent.open.file, |
745ca2475
|
742 |
open, cred); |
834f2a4a1
|
743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 |
out: return nd->intent.open.file; out_err: release_open_intent(nd); nd->intent.open.file = (struct file *)dentry; goto out; } EXPORT_SYMBOL_GPL(lookup_instantiate_filp); /** * nameidata_to_filp - convert a nameidata to an open filp. * @nd: pointer to nameidata * @flags: open flags * * Note that this function destroys the original nameidata */ |
482928d59
|
759 |
struct file *nameidata_to_filp(struct nameidata *nd) |
834f2a4a1
|
760 |
{ |
745ca2475
|
761 |
const struct cred *cred = current_cred(); |
834f2a4a1
|
762 763 764 765 |
struct file *filp; /* Pick up the filp from the open intent */ filp = nd->intent.open.file; |
2dab59744
|
766 |
nd->intent.open.file = NULL; |
834f2a4a1
|
767 |
/* Has the filesystem initialised the file for us? */ |
d893f1bc2
|
768 769 |
if (filp->f_path.dentry == NULL) { path_get(&nd->path); |
482928d59
|
770 |
filp = __dentry_open(nd->path.dentry, nd->path.mnt, filp, |
745ca2475
|
771 |
NULL, cred); |
d893f1bc2
|
772 |
} |
834f2a4a1
|
773 774 |
return filp; } |
6fdcc2162
|
775 776 777 778 |
/* * dentry_open() will have done dput(dentry) and mntput(mnt) if it returns an * error. */ |
745ca2475
|
779 780 |
struct file *dentry_open(struct dentry *dentry, struct vfsmount *mnt, int flags, const struct cred *cred) |
a1a5b3d93
|
781 782 783 |
{ int error; struct file *f; |
e0e817392
|
784 |
validate_creds(cred); |
c212f9aaf
|
785 786 |
/* We must always pass in a valid mount pointer. */ BUG_ON(!mnt); |
322ee5b36
|
787 |
|
a1a5b3d93
|
788 789 |
error = -ENFILE; f = get_empty_filp(); |
6fdcc2162
|
790 791 792 |
if (f == NULL) { dput(dentry); mntput(mnt); |
a1a5b3d93
|
793 |
return ERR_PTR(error); |
6fdcc2162
|
794 |
} |
a1a5b3d93
|
795 |
|
482928d59
|
796 797 |
f->f_flags = flags; return __dentry_open(dentry, mnt, f, NULL, cred); |
a1a5b3d93
|
798 |
} |
1da177e4c
|
799 |
EXPORT_SYMBOL(dentry_open); |
b01ec0ef6
|
800 |
static void __put_unused_fd(struct files_struct *files, unsigned int fd) |
1da177e4c
|
801 |
{ |
badf16621
|
802 803 |
struct fdtable *fdt = files_fdtable(files); __FD_CLR(fd, fdt->open_fds); |
0c9e63fd3
|
804 805 |
if (fd < files->next_fd) files->next_fd = fd; |
1da177e4c
|
806 |
} |
fc9b52cd8
|
807 |
void put_unused_fd(unsigned int fd) |
1da177e4c
|
808 809 810 811 812 813 814 815 816 817 |
{ struct files_struct *files = current->files; spin_lock(&files->file_lock); __put_unused_fd(files, fd); spin_unlock(&files->file_lock); } EXPORT_SYMBOL(put_unused_fd); /* |
5590ff0d5
|
818 |
* Install a file pointer in the fd array. |
1da177e4c
|
819 820 821 822 823 824 825 826 827 828 |
* * The VFS is full of places where we drop the files lock between * setting the open_fds bitmap and installing the file in the file * array. At any such point, we are vulnerable to a dup2() race * installing a file in the array before us. We need to detect this and * fput() the struct file we are about to overwrite in this case. * * It should never happen - if we allow dup2() do it, _really_ bad things * will follow. */ |
fc9b52cd8
|
829 |
void fd_install(unsigned int fd, struct file *file) |
1da177e4c
|
830 831 |
{ struct files_struct *files = current->files; |
badf16621
|
832 |
struct fdtable *fdt; |
1da177e4c
|
833 |
spin_lock(&files->file_lock); |
badf16621
|
834 |
fdt = files_fdtable(files); |
ab2af1f50
|
835 836 |
BUG_ON(fdt->fd[fd] != NULL); rcu_assign_pointer(fdt->fd[fd], file); |
1da177e4c
|
837 838 839 840 |
spin_unlock(&files->file_lock); } EXPORT_SYMBOL(fd_install); |
47c805dc2
|
841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 |
static inline int build_open_flags(int flags, int mode, struct open_flags *op) { int lookup_flags = 0; int acc_mode; if (!(flags & O_CREAT)) mode = 0; op->mode = mode; /* Must never be set by userspace */ flags &= ~FMODE_NONOTIFY; /* * O_SYNC is implemented as __O_SYNC|O_DSYNC. As many places only * check for O_DSYNC if the need any syncing at all we enforce it's * always set instead of having to deal with possibly weird behaviour * for malicious applications setting only __O_SYNC. */ if (flags & __O_SYNC) flags |= O_DSYNC; |
1abf0c718
|
861 862 863 864 865 866 867 868 869 870 |
/* * If we have O_PATH in the open flag. Then we * cannot have anything other than the below set of flags */ if (flags & O_PATH) { flags &= O_DIRECTORY | O_NOFOLLOW | O_PATH; acc_mode = 0; } else { acc_mode = MAY_OPEN | ACC_MODE(flags); } |
47c805dc2
|
871 |
|
1abf0c718
|
872 |
op->open_flag = flags; |
47c805dc2
|
873 874 875 876 877 878 879 880 881 882 883 |
/* O_TRUNC implies we need access checks for write permissions */ if (flags & O_TRUNC) acc_mode |= MAY_WRITE; /* Allow the LSM permission hook to distinguish append access from general write access. */ if (flags & O_APPEND) acc_mode |= MAY_APPEND; op->acc_mode = acc_mode; |
1abf0c718
|
884 |
op->intent = flags & O_PATH ? 0 : LOOKUP_OPEN; |
47c805dc2
|
885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 |
if (flags & O_CREAT) { op->intent |= LOOKUP_CREATE; if (flags & O_EXCL) op->intent |= LOOKUP_EXCL; } if (flags & O_DIRECTORY) lookup_flags |= LOOKUP_DIRECTORY; if (!(flags & O_NOFOLLOW)) lookup_flags |= LOOKUP_FOLLOW; return lookup_flags; } /** * filp_open - open file and return file pointer * * @filename: path to open * @flags: open flags as per the open(2) second argument * @mode: mode for the new file if O_CREAT is set, else ignored * * This is the helper to open a file from kernelspace if you really * have to. But in generally you should not do this, so please move * along, nothing to see here.. */ struct file *filp_open(const char *filename, int flags, int mode) { struct open_flags op; int lookup = build_open_flags(flags, mode, &op); return do_filp_open(AT_FDCWD, filename, &op, lookup); } EXPORT_SYMBOL(filp_open); |
73d049a40
|
916 917 918 919 920 921 922 923 924 925 926 927 928 |
struct file *file_open_root(struct dentry *dentry, struct vfsmount *mnt, const char *filename, int flags) { struct open_flags op; int lookup = build_open_flags(flags, 0, &op); if (flags & O_CREAT) return ERR_PTR(-EINVAL); if (!filename && (flags & O_DIRECTORY)) if (!dentry->d_inode->i_op->lookup) return ERR_PTR(-ENOTDIR); return do_file_open_root(dentry, mnt, filename, &op, lookup); } EXPORT_SYMBOL(file_open_root); |
5590ff0d5
|
929 |
long do_sys_open(int dfd, const char __user *filename, int flags, int mode) |
1da177e4c
|
930 |
{ |
47c805dc2
|
931 932 |
struct open_flags op; int lookup = build_open_flags(flags, mode, &op); |
e922efc34
|
933 934 |
char *tmp = getname(filename); int fd = PTR_ERR(tmp); |
1da177e4c
|
935 |
|
1da177e4c
|
936 |
if (!IS_ERR(tmp)) { |
f23513e8d
|
937 |
fd = get_unused_fd_flags(flags); |
1da177e4c
|
938 |
if (fd >= 0) { |
47c805dc2
|
939 |
struct file *f = do_filp_open(dfd, tmp, &op, lookup); |
fed2fc18a
|
940 941 942 943 |
if (IS_ERR(f)) { put_unused_fd(fd); fd = PTR_ERR(f); } else { |
2a12a9d78
|
944 |
fsnotify_open(f); |
fed2fc18a
|
945 946 |
fd_install(fd, f); } |
1da177e4c
|
947 |
} |
1da177e4c
|
948 949 950 |
putname(tmp); } return fd; |
1da177e4c
|
951 |
} |
e922efc34
|
952 |
|
ca013e945
|
953 |
SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, int, mode) |
e922efc34
|
954 |
{ |
385910f2b
|
955 |
long ret; |
e922efc34
|
956 957 |
if (force_o_largefile()) flags |= O_LARGEFILE; |
385910f2b
|
958 959 |
ret = do_sys_open(AT_FDCWD, filename, flags, mode); /* avoid REGPARM breakage on x86: */ |
54a015104
|
960 |
asmlinkage_protect(3, ret, filename, flags, mode); |
385910f2b
|
961 |
return ret; |
e922efc34
|
962 |
} |
1da177e4c
|
963 |
|
6559eed8c
|
964 965 |
SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, int, mode) |
5590ff0d5
|
966 |
{ |
385910f2b
|
967 |
long ret; |
5590ff0d5
|
968 969 |
if (force_o_largefile()) flags |= O_LARGEFILE; |
385910f2b
|
970 971 |
ret = do_sys_open(dfd, filename, flags, mode); /* avoid REGPARM breakage on x86: */ |
54a015104
|
972 |
asmlinkage_protect(4, ret, dfd, filename, flags, mode); |
385910f2b
|
973 |
return ret; |
5590ff0d5
|
974 |
} |
5590ff0d5
|
975 |
|
1da177e4c
|
976 977 978 979 980 981 |
#ifndef __alpha__ /* * For backward compatibility? Maybe this should be moved * into arch/i386 instead? */ |
002c8976e
|
982 |
SYSCALL_DEFINE2(creat, const char __user *, pathname, int, mode) |
1da177e4c
|
983 984 985 986 987 988 989 990 991 992 993 994 |
{ return sys_open(pathname, O_CREAT | O_WRONLY | O_TRUNC, mode); } #endif /* * "id" is the POSIX thread ID. We use the * files pointer for this.. */ int filp_close(struct file *filp, fl_owner_t id) { |
45778ca81
|
995 |
int retval = 0; |
1da177e4c
|
996 997 998 999 |
if (!file_count(filp)) { printk(KERN_ERR "VFS: Close: file count is 0 "); |
45778ca81
|
1000 |
return 0; |
1da177e4c
|
1001 |
} |
45778ca81
|
1002 |
if (filp->f_op && filp->f_op->flush) |
75e1fcc0b
|
1003 |
retval = filp->f_op->flush(filp, id); |
1da177e4c
|
1004 |
|
1abf0c718
|
1005 1006 1007 1008 |
if (likely(!(filp->f_mode & FMODE_PATH))) { dnotify_flush(filp, id); locks_remove_posix(filp, id); } |
1da177e4c
|
1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 |
fput(filp); return retval; } EXPORT_SYMBOL(filp_close); /* * Careful here! We test whether the file pointer is NULL before * releasing the fd. This ensures that one clone task can't release * an fd while another clone is opening it. */ |
ca013e945
|
1020 |
SYSCALL_DEFINE1(close, unsigned int, fd) |
1da177e4c
|
1021 1022 1023 |
{ struct file * filp; struct files_struct *files = current->files; |
badf16621
|
1024 |
struct fdtable *fdt; |
ee731f4f7
|
1025 |
int retval; |
1da177e4c
|
1026 1027 |
spin_lock(&files->file_lock); |
badf16621
|
1028 1029 |
fdt = files_fdtable(files); if (fd >= fdt->max_fds) |
1da177e4c
|
1030 |
goto out_unlock; |
badf16621
|
1031 |
filp = fdt->fd[fd]; |
1da177e4c
|
1032 1033 |
if (!filp) goto out_unlock; |
ab2af1f50
|
1034 |
rcu_assign_pointer(fdt->fd[fd], NULL); |
badf16621
|
1035 |
FD_CLR(fd, fdt->close_on_exec); |
1da177e4c
|
1036 1037 |
__put_unused_fd(files, fd); spin_unlock(&files->file_lock); |
ee731f4f7
|
1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 |
retval = filp_close(filp, files); /* can't restart close syscall because file table entry was cleared */ if (unlikely(retval == -ERESTARTSYS || retval == -ERESTARTNOINTR || retval == -ERESTARTNOHAND || retval == -ERESTART_RESTARTBLOCK)) retval = -EINTR; return retval; |
1da177e4c
|
1048 1049 1050 1051 1052 |
out_unlock: spin_unlock(&files->file_lock); return -EBADF; } |
1da177e4c
|
1053 1054 1055 1056 1057 1058 |
EXPORT_SYMBOL(sys_close); /* * This routine simulates a hangup on the tty, to arrange that users * are given clean terminals at login time. */ |
ca013e945
|
1059 |
SYSCALL_DEFINE0(vhangup) |
1da177e4c
|
1060 1061 |
{ if (capable(CAP_SYS_TTY_CONFIG)) { |
2cb5998b5
|
1062 |
tty_vhangup_self(); |
1da177e4c
|
1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 |
return 0; } return -EPERM; } /* * Called when an inode is about to be open. * We use this to disallow opening large files on 32bit systems if * the caller didn't specify O_LARGEFILE. On 64bit systems we force * on this flag in sys_open. */ int generic_file_open(struct inode * inode, struct file * filp) { if (!(filp->f_flags & O_LARGEFILE) && i_size_read(inode) > MAX_NON_LFS) |
a9c62a18a
|
1077 |
return -EOVERFLOW; |
1da177e4c
|
1078 1079 1080 1081 1082 1083 1084 |
return 0; } EXPORT_SYMBOL(generic_file_open); /* * This is used by subsystems that don't want seekable |
06b1e104b
|
1085 1086 1087 |
* file descriptors. The function is not supposed to ever fail, the only * reason it returns an 'int' and not 'void' is so that it can be plugged * directly into file_operations structure. |
1da177e4c
|
1088 1089 1090 1091 1092 1093 1094 1095 |
*/ int nonseekable_open(struct inode *inode, struct file *filp) { filp->f_mode &= ~(FMODE_LSEEK | FMODE_PREAD | FMODE_PWRITE); return 0; } EXPORT_SYMBOL(nonseekable_open); |