From nobody Wed Apr 8 03:09:21 2026 Received: from ewsoutbound.kpnmail.nl (ewsoutbound.kpnmail.nl [195.121.94.186]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8CF783E8C6A for ; Tue, 10 Mar 2026 20:44:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=195.121.94.186 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773175482; cv=none; b=FGkSGGIKg1ISDu4cJs/vG1ZJk2LqaROMs+dJwzUIdQAgdPD+261xog1f6gHrIqBxhbSVRlmPHGw8BdwEhZMs7XtmAS+BcqJ062MqM4CahRTgtW8LSJ9y4jI2sOwE5PhE9WqJnvJcZHnvzpMsJuJqQtf68SPvkznV/Xe6snfT1nI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773175482; c=relaxed/simple; bh=WNg46g3df6saNK5G2Aum2Ymkqna2qK01Rs4ISdgpQ1g=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Ov2pFIFT7s61JwBnJ3vjWkr74t46b49vrq+QI11izzQzlDX8JR9rs3F4WYF71zM58JFxCT/N9wopkx0qSQ1ZYWVenbNQyd7AyFEB9y3rOFhZgSrPrJuayCsfd1tv5goQbbCmkk0cUJ+r/tEa8ZuihCxMtRyU0bCaSmC6E8CLu5Q= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=xs4all.nl; spf=pass smtp.mailfrom=xs4all.nl; dkim=pass (2048-bit key) header.d=xs4all.nl header.i=@xs4all.nl header.b=MM6d5x4Q; arc=none smtp.client-ip=195.121.94.186 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=xs4all.nl Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=xs4all.nl Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=xs4all.nl header.i=@xs4all.nl header.b="MM6d5x4Q" X-KPN-MessageId: f0872402-1cc1-11f1-89dd-00505699b430 Received: from smtp.kpnmail.nl (unknown [10.31.155.6]) by ewsoutbound.so.kpn.org (Halon) with ESMTPS id f0872402-1cc1-11f1-89dd-00505699b430; Tue, 10 Mar 2026 21:44:31 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=xs4all.nl; s=xs4all01; h=mime-version:message-id:date:subject:to:from; bh=wp7ph0GxfocxZsIU1uEVImJtoPS/WVjNFCt1MEqrtvY=; b=MM6d5x4QU57rH9ghnYAJ6+qV+DVcZxUzCvg+BczkANATuP8uM5kJata+CatOa+BW4gpYtrtTDPVMX rhuw6tOiWuTJrbrSomC1e/ZqMQB5qWuA1Rizg8kuQ4ntpWeqgOWX68wAKIM0BDoDWbw+PsuMqb2aMi BodZnuN1R5Jsfu3JSkz+3IMRCtmjV5xBQnYldzKo3npWx64rA838Ndszbc7u5/ME4bs/K8b28xgPET vMx4NBUhpB6VMlU2bX7Hnfd3tIUQh0yqtGwauHwojli2q7J60xEp5q2Bj5b19VHdWFSVHxr/jK7CPC BqdXIOyInJECb9EddUq0hhFI5VPicXA== X-KPN-MID: 33|VDeIT+tgDWOFljAr27nyLP8oZBknVvUtfKssnzskgmOPzgGmZStkW4avFG/pA6F kif8WWgPIn5DlAvRr9gB1X04agCKaxiV0470zeDPqxKk= X-KPN-VerifiedSender: Yes X-CMASSUN: 33|rgnMZJsN9b24T928XSiC6hoq0vnv8WCPsRBjtGWHKaHyR0KpXqsDMZlSlSfjqEb V7rbOVwfwW3QWamq7kni4nA== Received: from daedalus.home (unknown [178.231.15.72]) by smtp.xs4all.nl (Halon) with ESMTPSA id ed64047e-1cc1-11f1-bff7-00505699772e; Tue, 10 Mar 2026 21:44:31 +0100 (CET) From: Jori Koolstra To: ricardo@marliere.net, Alexander Viro , Christian Brauner , Jan Kara , Jeff Layton , Chuck Lever , Alexander Aring Cc: Jori Koolstra , linux-fsdevel@vger.kernel.org (open list:FILE LOCKING (flock() and fcntl()/lockf())), linux-kernel@vger.kernel.org (open list) Subject: [PATCH v3] vfs: add support for empty path to openat2(2) Date: Tue, 10 Mar 2026 21:44:33 +0100 Message-ID: <20260310204434.1840450-1-jkoolstra@xs4all.nl> X-Mailer: git-send-email 2.53.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" To get an operable version of an O_PATH file descriptor, it is possible to use openat(fd, ".", O_DIRECTORY) for directories, but other files currently require going through open("/proc//fd/"), which depends on a functioning procfs. This patch adds the OPENAT2_EMPTY_PATH flag to openat2(2). If passed, LOOKUP_EMPTY is set at path resolve time. Note: This implies that you cannot rely anymore on disabling procfs from being mounted (e.g. inside a container without procfs mounted and with CAP_SYS_ADMIN dropped) to prevent O_PATH fds from being re-opened read-write. Signed-off-by: Jori Koolstra --- fs/fcntl.c | 4 ++-- fs/open.c | 11 +++++------ include/linux/fcntl.h | 5 ++++- include/uapi/linux/openat2.h | 4 ++++ 4 files changed, 15 insertions(+), 9 deletions(-) diff --git a/fs/fcntl.c b/fs/fcntl.c index beab8080badf..d9ae3c71edfe 100644 --- a/fs/fcntl.c +++ b/fs/fcntl.c @@ -1169,8 +1169,8 @@ static int __init fcntl_init(void) * Exceptions: O_NONBLOCK is a two bit define on parisc; O_NDELAY * is defined as O_NONBLOCK on some platforms and not on others. */ - BUILD_BUG_ON(20 - 1 /* for O_RDONLY being 0 */ !=3D - HWEIGHT32( + BUILD_BUG_ON(21 - 1 /* for O_RDONLY being 0 */ !=3D + HWEIGHT64( (VALID_OPEN_FLAGS & ~(O_NONBLOCK | O_NDELAY)) | __FMODE_EXEC)); =20 diff --git a/fs/open.c b/fs/open.c index 91f1139591ab..e019ddecc73c 100644 --- a/fs/open.c +++ b/fs/open.c @@ -1160,12 +1160,12 @@ struct file *kernel_file_open(const struct path *pa= th, int flags, EXPORT_SYMBOL_GPL(kernel_file_open); =20 #define WILL_CREATE(flags) (flags & (O_CREAT | __O_TMPFILE)) -#define O_PATH_FLAGS (O_DIRECTORY | O_NOFOLLOW | O_PATH | O_CLOEXEC) +#define O_PATH_FLAGS (O_DIRECTORY | O_NOFOLLOW | O_PATH | O_CLOEXEC | OPE= NAT2_EMPTY_PATH) =20 inline struct open_how build_open_how(int flags, umode_t mode) { struct open_how how =3D { - .flags =3D flags & VALID_OPEN_FLAGS, + .flags =3D ((unsigned int) flags) & VALID_OPEN_FLAGS, .mode =3D mode & S_IALLUGO, }; =20 @@ -1185,9 +1185,6 @@ inline int build_open_flags(const struct open_how *ho= w, struct open_flags *op) int lookup_flags =3D 0; int acc_mode =3D ACC_MODE(flags); =20 - BUILD_BUG_ON_MSG(upper_32_bits(VALID_OPEN_FLAGS), - "struct open_flags doesn't yet handle flags > 32 bits"); - /* * Strip flags that aren't relevant in determining struct open_flags. */ @@ -1281,6 +1278,8 @@ inline int build_open_flags(const struct open_how *ho= w, struct open_flags *op) lookup_flags |=3D LOOKUP_DIRECTORY; if (!(flags & O_NOFOLLOW)) lookup_flags |=3D LOOKUP_FOLLOW; + if (flags & OPENAT2_EMPTY_PATH) + lookup_flags |=3D LOOKUP_EMPTY; =20 if (how->resolve & RESOLVE_NO_XDEV) lookup_flags |=3D LOOKUP_NO_XDEV; @@ -1362,7 +1361,7 @@ static int do_sys_openat2(int dfd, const char __user = *filename, if (unlikely(err)) return err; =20 - CLASS(filename, name)(filename); + CLASS(filename_flags, name)(filename, op.lookup_flags); return FD_ADD(how->flags, do_file_open(dfd, name, &op)); } =20 diff --git a/include/linux/fcntl.h b/include/linux/fcntl.h index a332e79b3207..d1bb87ff70e3 100644 --- a/include/linux/fcntl.h +++ b/include/linux/fcntl.h @@ -7,10 +7,13 @@ =20 /* List of all valid flags for the open/openat flags argument: */ #define VALID_OPEN_FLAGS \ + /* lower 32-bit flags */ \ (O_RDONLY | O_WRONLY | O_RDWR | O_CREAT | O_EXCL | O_NOCTTY | O_TRUNC | \ O_APPEND | O_NDELAY | O_NONBLOCK | __O_SYNC | O_DSYNC | \ FASYNC | O_DIRECT | O_LARGEFILE | O_DIRECTORY | O_NOFOLLOW | \ - O_NOATIME | O_CLOEXEC | O_PATH | __O_TMPFILE) + O_NOATIME | O_CLOEXEC | O_PATH | __O_TMPFILE | \ + /* upper 32-bit flags (openat2(2) only) */ \ + OPENAT2_EMPTY_PATH) =20 /* List of all valid flags for the how->resolve argument: */ #define VALID_RESOLVE_FLAGS \ diff --git a/include/uapi/linux/openat2.h b/include/uapi/linux/openat2.h index a5feb7604948..c34f32e6fa96 100644 --- a/include/uapi/linux/openat2.h +++ b/include/uapi/linux/openat2.h @@ -40,4 +40,8 @@ struct open_how { return -EAGAIN if that's not possible. */ =20 +/* openat2(2) exclusive flags are defined in the upper 32 bits of + open_how->flags */ +#define OPENAT2_EMPTY_PATH 0x100000000 /* (1ULL << 32) */ + #endif /* _UAPI_LINUX_OPENAT2_H */ --=20 2.53.0