gvisor.dev/gvisor@v0.0.0-20240520182842-f9d4d51c7e0f/pkg/sentry/syscalls/linux/sys_stat.go (about) 1 // Copyright 2020 The gVisor Authors. 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // http://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 package linux 16 17 import ( 18 "gvisor.dev/gvisor/pkg/abi/linux" 19 "gvisor.dev/gvisor/pkg/bits" 20 "gvisor.dev/gvisor/pkg/errors/linuxerr" 21 "gvisor.dev/gvisor/pkg/fspath" 22 "gvisor.dev/gvisor/pkg/hostarch" 23 "gvisor.dev/gvisor/pkg/sentry/arch" 24 "gvisor.dev/gvisor/pkg/sentry/kernel" 25 "gvisor.dev/gvisor/pkg/sentry/kernel/auth" 26 "gvisor.dev/gvisor/pkg/sentry/vfs" 27 ) 28 29 // Stat implements Linux syscall stat(2). 30 func Stat(t *kernel.Task, sysno uintptr, args arch.SyscallArguments) (uintptr, *kernel.SyscallControl, error) { 31 pathAddr := args[0].Pointer() 32 statAddr := args[1].Pointer() 33 return 0, nil, fstatat(t, linux.AT_FDCWD, pathAddr, statAddr, 0 /* flags */) 34 } 35 36 // Lstat implements Linux syscall lstat(2). 37 func Lstat(t *kernel.Task, sysno uintptr, args arch.SyscallArguments) (uintptr, *kernel.SyscallControl, error) { 38 pathAddr := args[0].Pointer() 39 statAddr := args[1].Pointer() 40 return 0, nil, fstatat(t, linux.AT_FDCWD, pathAddr, statAddr, linux.AT_SYMLINK_NOFOLLOW) 41 } 42 43 // Newfstatat implements Linux syscall newfstatat, which backs fstatat(2). 44 func Newfstatat(t *kernel.Task, sysno uintptr, args arch.SyscallArguments) (uintptr, *kernel.SyscallControl, error) { 45 dirfd := args[0].Int() 46 pathAddr := args[1].Pointer() 47 statAddr := args[2].Pointer() 48 flags := args[3].Int() 49 return 0, nil, fstatat(t, dirfd, pathAddr, statAddr, flags) 50 } 51 52 func fstatat(t *kernel.Task, dirfd int32, pathAddr, statAddr hostarch.Addr, flags int32) error { 53 // TODO(b/270247637): gVisor does not yet support automount, so 54 // AT_NO_AUTOMOUNT flag is a no-op. 55 flags &= ^linux.AT_NO_AUTOMOUNT 56 if flags&^(linux.AT_EMPTY_PATH|linux.AT_SYMLINK_NOFOLLOW) != 0 { 57 return linuxerr.EINVAL 58 } 59 60 opts := vfs.StatOptions{ 61 Mask: linux.STATX_BASIC_STATS, 62 } 63 64 path, err := copyInPath(t, pathAddr) 65 if err != nil { 66 return err 67 } 68 69 root := t.FSContext().RootDirectory() 70 defer root.DecRef(t) 71 start := root 72 if !path.Absolute { 73 if !path.HasComponents() && flags&linux.AT_EMPTY_PATH == 0 { 74 return linuxerr.ENOENT 75 } 76 if dirfd == linux.AT_FDCWD { 77 start = t.FSContext().WorkingDirectory() 78 defer start.DecRef(t) 79 } else { 80 dirfile := t.GetFile(dirfd) 81 if dirfile == nil { 82 return linuxerr.EBADF 83 } 84 if !path.HasComponents() { 85 // Use FileDescription.Stat() instead of 86 // VirtualFilesystem.StatAt() for fstatat(fd, ""), since the 87 // former may be able to use opened file state to expedite the 88 // Stat. 89 statx, err := dirfile.Stat(t, opts) 90 dirfile.DecRef(t) 91 if err != nil { 92 return err 93 } 94 var stat linux.Stat 95 convertStatxToUserStat(t, &statx, &stat) 96 _, err = stat.CopyOut(t, statAddr) 97 return err 98 } 99 start = dirfile.VirtualDentry() 100 start.IncRef() 101 defer start.DecRef(t) 102 dirfile.DecRef(t) 103 } 104 } 105 106 statx, err := t.Kernel().VFS().StatAt(t, t.Credentials(), &vfs.PathOperation{ 107 Root: root, 108 Start: start, 109 Path: path, 110 FollowFinalSymlink: flags&linux.AT_SYMLINK_NOFOLLOW == 0, 111 }, &opts) 112 if err != nil { 113 return err 114 } 115 var stat linux.Stat 116 convertStatxToUserStat(t, &statx, &stat) 117 _, err = stat.CopyOut(t, statAddr) 118 return err 119 } 120 121 func timespecFromStatxTimestamp(sxts linux.StatxTimestamp) linux.Timespec { 122 return linux.Timespec{ 123 Sec: sxts.Sec, 124 Nsec: int64(sxts.Nsec), 125 } 126 } 127 128 // Fstat implements Linux syscall fstat(2). 129 func Fstat(t *kernel.Task, sysno uintptr, args arch.SyscallArguments) (uintptr, *kernel.SyscallControl, error) { 130 fd := args[0].Int() 131 statAddr := args[1].Pointer() 132 133 file := t.GetFile(fd) 134 if file == nil { 135 return 0, nil, linuxerr.EBADF 136 } 137 defer file.DecRef(t) 138 139 statx, err := file.Stat(t, vfs.StatOptions{ 140 Mask: linux.STATX_BASIC_STATS, 141 }) 142 if err != nil { 143 return 0, nil, err 144 } 145 var stat linux.Stat 146 convertStatxToUserStat(t, &statx, &stat) 147 _, err = stat.CopyOut(t, statAddr) 148 return 0, nil, err 149 } 150 151 // Statx implements Linux syscall statx(2). 152 func Statx(t *kernel.Task, sysno uintptr, args arch.SyscallArguments) (uintptr, *kernel.SyscallControl, error) { 153 dirfd := args[0].Int() 154 pathAddr := args[1].Pointer() 155 flags := args[2].Int() 156 mask := args[3].Uint() 157 statxAddr := args[4].Pointer() 158 159 // TODO(b/270247637): gVisor does not yet support automount, so 160 // AT_NO_AUTOMOUNT flag is a no-op. 161 flags &= ^linux.AT_NO_AUTOMOUNT 162 163 if flags&^(linux.AT_EMPTY_PATH|linux.AT_SYMLINK_NOFOLLOW|linux.AT_STATX_SYNC_TYPE) != 0 { 164 return 0, nil, linuxerr.EINVAL 165 } 166 // Make sure that only one sync type option is set. 167 syncType := uint32(flags & linux.AT_STATX_SYNC_TYPE) 168 if syncType != 0 && !bits.IsPowerOfTwo32(syncType) { 169 return 0, nil, linuxerr.EINVAL 170 } 171 if mask&linux.STATX__RESERVED != 0 { 172 return 0, nil, linuxerr.EINVAL 173 } 174 175 opts := vfs.StatOptions{ 176 Mask: mask, 177 Sync: uint32(flags & linux.AT_STATX_SYNC_TYPE), 178 } 179 180 path, err := copyInPath(t, pathAddr) 181 if err != nil { 182 return 0, nil, err 183 } 184 185 root := t.FSContext().RootDirectory() 186 defer root.DecRef(t) 187 start := root 188 if !path.Absolute { 189 if !path.HasComponents() && flags&linux.AT_EMPTY_PATH == 0 { 190 return 0, nil, linuxerr.ENOENT 191 } 192 if dirfd == linux.AT_FDCWD { 193 start = t.FSContext().WorkingDirectory() 194 defer start.DecRef(t) 195 } else { 196 dirfile := t.GetFile(dirfd) 197 if dirfile == nil { 198 return 0, nil, linuxerr.EBADF 199 } 200 if !path.HasComponents() { 201 // Use FileDescription.Stat() instead of 202 // VirtualFilesystem.StatAt() for statx(fd, ""), since the 203 // former may be able to use opened file state to expedite the 204 // Stat. 205 statx, err := dirfile.Stat(t, opts) 206 dirfile.DecRef(t) 207 if err != nil { 208 return 0, nil, err 209 } 210 userifyStatx(t, &statx) 211 _, err = statx.CopyOut(t, statxAddr) 212 return 0, nil, err 213 } 214 start = dirfile.VirtualDentry() 215 start.IncRef() 216 defer start.DecRef(t) 217 dirfile.DecRef(t) 218 } 219 } 220 221 statx, err := t.Kernel().VFS().StatAt(t, t.Credentials(), &vfs.PathOperation{ 222 Root: root, 223 Start: start, 224 Path: path, 225 FollowFinalSymlink: flags&linux.AT_SYMLINK_NOFOLLOW == 0, 226 }, &opts) 227 if err != nil { 228 return 0, nil, err 229 } 230 userifyStatx(t, &statx) 231 _, err = statx.CopyOut(t, statxAddr) 232 return 0, nil, err 233 } 234 235 func userifyStatx(t *kernel.Task, statx *linux.Statx) { 236 userns := t.UserNamespace() 237 statx.UID = uint32(auth.KUID(statx.UID).In(userns).OrOverflow()) 238 statx.GID = uint32(auth.KGID(statx.GID).In(userns).OrOverflow()) 239 } 240 241 // Statfs implements Linux syscall statfs(2). 242 func Statfs(t *kernel.Task, sysno uintptr, args arch.SyscallArguments) (uintptr, *kernel.SyscallControl, error) { 243 pathAddr := args[0].Pointer() 244 bufAddr := args[1].Pointer() 245 246 path, err := copyInPath(t, pathAddr) 247 if err != nil { 248 return 0, nil, err 249 } 250 tpop, err := getTaskPathOperation(t, linux.AT_FDCWD, path, disallowEmptyPath, followFinalSymlink) 251 if err != nil { 252 return 0, nil, err 253 } 254 defer tpop.Release(t) 255 256 statfs, err := t.Kernel().VFS().StatFSAt(t, t.Credentials(), &tpop.pop) 257 if err != nil { 258 return 0, nil, err 259 } 260 _, err = statfs.CopyOut(t, bufAddr) 261 return 0, nil, err 262 } 263 264 // Fstatfs implements Linux syscall fstatfs(2). 265 func Fstatfs(t *kernel.Task, sysno uintptr, args arch.SyscallArguments) (uintptr, *kernel.SyscallControl, error) { 266 fd := args[0].Int() 267 bufAddr := args[1].Pointer() 268 269 tpop, err := getTaskPathOperation(t, fd, fspath.Path{}, allowEmptyPath, nofollowFinalSymlink) 270 if err != nil { 271 return 0, nil, err 272 } 273 defer tpop.Release(t) 274 275 statfs, err := t.Kernel().VFS().StatFSAt(t, t.Credentials(), &tpop.pop) 276 if err != nil { 277 return 0, nil, err 278 } 279 _, err = statfs.CopyOut(t, bufAddr) 280 return 0, nil, err 281 }