summaryrefslogtreecommitdiff
path: root/linux-Fix-fchmodat-with-AT_SYMLINK_NOFOLLOW-for-64-b.patch
diff options
context:
space:
mode:
Diffstat (limited to 'linux-Fix-fchmodat-with-AT_SYMLINK_NOFOLLOW-for-64-b.patch')
-rw-r--r--linux-Fix-fchmodat-with-AT_SYMLINK_NOFOLLOW-for-64-b.patch139
1 files changed, 139 insertions, 0 deletions
diff --git a/linux-Fix-fchmodat-with-AT_SYMLINK_NOFOLLOW-for-64-b.patch b/linux-Fix-fchmodat-with-AT_SYMLINK_NOFOLLOW-for-64-b.patch
new file mode 100644
index 0000000..023912b
--- /dev/null
+++ b/linux-Fix-fchmodat-with-AT_SYMLINK_NOFOLLOW-for-64-b.patch
@@ -0,0 +1,139 @@
+From 88a8637cb4658cd91a002659db05867716b88b36 Mon Sep 17 00:00:00 2001
+From: Adhemerval Zanella <adhemerval.zanella@linaro.org>
+Date: Wed, 27 Apr 2022 13:40:30 -0300
+Subject: [PATCH] linux: Fix fchmodat with AT_SYMLINK_NOFOLLOW for 64 bit
+ time_t (BZ#29097)
+
+The AT_SYMLINK_NOFOLLOW emulation ues the default 32 bit stat internal
+calls, which fails with EOVERFLOW if the file constains timestamps
+beyond 2038.
+
+Checked on i686-linux-gnu.
+
+(cherry picked from commit 118a2aee07f64d605b6668cbe195c1f44eac6be6)
+---
+ NEWS | 2 ++
+ io/Makefile | 8 +++++---
+ io/tst-lchmod-time64.c | 2 ++
+ io/tst-lchmod.c | 22 +++++++++++++++++++++-
+ sysdeps/unix/sysv/linux/fchmodat.c | 4 ++--
+ 5 files changed, 32 insertions(+), 6 deletions(-)
+ create mode 100644 io/tst-lchmod-time64.c
+
+diff --git a/NEWS b/NEWS
+index 4965818..b444478 100644
+--- a/NEWS
++++ b/NEWS
+@@ -39,6 +39,8 @@ The following bugs are resolved with this release:
+ without /sys and /proc
+ [29029] nptl: poll() spuriously returns EINTR during thread
+ cancellation and with cancellation disabled
++ [29097] time: fchmodat does not handle 64 bit time_t for
++ AT_SYMLINK_NOFOLLOW
+
+
+ Version 2.34
+diff --git a/io/Makefile b/io/Makefile
+index 9871ecb..01968b8 100644
+--- a/io/Makefile
++++ b/io/Makefile
+@@ -82,16 +82,17 @@ tests := test-utime test-stat test-stat2 test-lfs tst-getcwd \
+ tst-ftw-bz28126
+
+ tests-time64 := \
++ tst-fcntl-time64 \
++ tst-fts-time64 \
+ tst-futimens-time64 \
+ tst-futimes-time64\
+- tst-fts-time64 \
++ tst-futimesat-time64 \
++ tst-lchmod-time64 \
+ tst-lutimes-time64 \
+ tst-stat-time64 \
+- tst-futimesat-time64 \
+ tst-utime-time64 \
+ tst-utimensat-time64 \
+ tst-utimes-time64 \
+- tst-fcntl-time64 \
+ # tests-time64
+
+ # Likewise for statx, but we do not need static linking here.
+@@ -134,6 +135,7 @@ CFLAGS-close.c += -fexceptions -fasynchronous-unwind-tables
+
+ CFLAGS-test-stat.c += -D_FILE_OFFSET_BITS=64 -D_LARGEFILE64_SOURCE
+ CFLAGS-test-lfs.c += -D_LARGEFILE64_SOURCE
++CFLAGS-tst-lchmod.c += -D_FILE_OFFSET_BITS=64
+
+ test-stat2-ARGS = Makefile . $(objpfx)test-stat2
+
+diff --git a/io/tst-lchmod-time64.c b/io/tst-lchmod-time64.c
+new file mode 100644
+index 0000000..f2b7cc9
+--- /dev/null
++++ b/io/tst-lchmod-time64.c
+@@ -0,0 +1,2 @@
++#define CHECK_TIME64
++#include "tst-lchmod.c"
+diff --git a/io/tst-lchmod.c b/io/tst-lchmod.c
+index 0fe98e0..472766b 100644
+--- a/io/tst-lchmod.c
++++ b/io/tst-lchmod.c
+@@ -67,9 +67,26 @@ select_path (bool do_relative_path, const char *full_path, const char *relative_
+ }
+
+ static void
++update_file_time_to_y2038 (const char *fname, int flags)
++{
++#ifdef CHECK_TIME64
++ /* Y2038 threshold plus 1 second. */
++ const struct timespec ts[] = { { 0x80000001LL, 0}, { 0x80000001LL } };
++ TEST_VERIFY_EXIT (utimensat (AT_FDCWD, fname, ts, flags) == 0);
++#endif
++}
++
++static void
+ test_1 (bool do_relative_path, int (*chmod_func) (int fd, const char *, mode_t, int))
+ {
+ char *tempdir = support_create_temp_directory ("tst-lchmod-");
++#ifdef CHECK_TIME64
++ if (!support_path_support_time64 (tempdir))
++ {
++ puts ("info: test skipped, filesystem does not support 64 bit time_t");
++ return;
++ }
++#endif
+
+ char *path_dangling = xasprintf ("%s/dangling", tempdir);
+ char *path_file = xasprintf ("%s/file", tempdir);
+@@ -93,9 +110,12 @@ test_1 (bool do_relative_path, int (*chmod_func) (int fd, const char *, mode_t,
+ xsymlink ("loop", path_loop);
+ xsymlink ("target-does-not-exist", path_dangling);
+
++ update_file_time_to_y2038 (path_file, 0);
++ update_file_time_to_y2038 (path_to_file, AT_SYMLINK_NOFOLLOW);
++
+ /* Check that the modes do not collide with what we will use in the
+ test. */
+- struct stat64 st;
++ struct stat st;
+ xstat (path_file, &st);
+ TEST_VERIFY ((st.st_mode & 0777) != 1);
+ xlstat (path_to_file, &st);
+diff --git a/sysdeps/unix/sysv/linux/fchmodat.c b/sysdeps/unix/sysv/linux/fchmodat.c
+index 5bd1eb9..b0cf619 100644
+--- a/sysdeps/unix/sysv/linux/fchmodat.c
++++ b/sysdeps/unix/sysv/linux/fchmodat.c
+@@ -48,8 +48,8 @@ fchmodat (int fd, const char *file, mode_t mode, int flag)
+
+ /* Use fstatat because fstat does not work on O_PATH descriptors
+ before Linux 3.6. */
+- struct stat64 st;
+- if (__fstatat64 (pathfd, "", &st, AT_EMPTY_PATH) != 0)
++ struct __stat64_t64 st;
++ if (__fstatat64_time64 (pathfd, "", &st, AT_EMPTY_PATH) != 0)
+ {
+ __close_nocancel (pathfd);
+ return -1;
+--
+1.8.3.1
+