1 /* 2 * Copyright (c) 1982, 1986, 1989, 1993 3 * The Regents of the University of California. All rights reserved. 4 * (c) UNIX System Laboratories, Inc. 5 * All or some portions of this file are derived from material licensed 6 * to the University of California by American Telephone and Telegraph 7 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 8 * the permission of UNIX System Laboratories, Inc. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)vfs_lookup.c 8.4 (Berkeley) 2/16/94 39 * $FreeBSD$ 40 */ 41 42 #include "opt_ktrace.h" 43 44 #include <sys/param.h> 45 #include <sys/systm.h> 46 #include <sys/kernel.h> 47 #include <sys/lock.h> 48 #include <sys/mutex.h> 49 #include <sys/namei.h> 50 #include <sys/vnode.h> 51 #include <sys/mount.h> 52 #include <sys/filedesc.h> 53 #include <sys/proc.h> 54 #ifdef KTRACE 55 #include <sys/ktrace.h> 56 #endif 57 58 #include <vm/uma.h> 59 60 /* 61 * Allocation zone for namei 62 */ 63 uma_zone_t namei_zone; 64 65 static void 66 nameiinit(void *dummy __unused) 67 { 68 namei_zone = uma_zcreate("NAMEI", MAXPATHLEN, NULL, NULL, NULL, NULL, 69 UMA_ALIGN_PTR, 0); 70 71 } 72 SYSINIT(vfs, SI_SUB_VFS, SI_ORDER_SECOND, nameiinit, NULL) 73 74 /* 75 * Convert a pathname into a pointer to a locked inode. 76 * 77 * The FOLLOW flag is set when symbolic links are to be followed 78 * when they occur at the end of the name translation process. 79 * Symbolic links are always followed for all other pathname 80 * components other than the last. 81 * 82 * The segflg defines whether the name is to be copied from user 83 * space or kernel space. 84 * 85 * Overall outline of namei: 86 * 87 * copy in name 88 * get starting directory 89 * while (!done && !error) { 90 * call lookup to search path. 91 * if symbolic link, massage name in buffer and continue 92 * } 93 */ 94 int 95 namei(ndp) 96 register struct nameidata *ndp; 97 { 98 register struct filedesc *fdp; /* pointer to file descriptor state */ 99 register char *cp; /* pointer into pathname argument */ 100 register struct vnode *dp; /* the directory we are searching */ 101 struct iovec aiov; /* uio for reading symbolic links */ 102 struct uio auio; 103 int error, linklen; 104 struct componentname *cnp = &ndp->ni_cnd; 105 struct thread *td = cnp->cn_thread; 106 struct proc *p = td->td_proc; 107 108 ndp->ni_cnd.cn_cred = ndp->ni_cnd.cn_thread->td_ucred; 109 KASSERT(cnp->cn_cred && p, ("namei: bad cred/proc")); 110 KASSERT((cnp->cn_nameiop & (~OPMASK)) == 0, 111 ("namei: nameiop contaminated with flags")); 112 KASSERT((cnp->cn_flags & OPMASK) == 0, 113 ("namei: flags contaminated with nameiops")); 114 fdp = p->p_fd; 115 116 /* 117 * Get a buffer for the name to be translated, and copy the 118 * name into the buffer. 119 */ 120 if ((cnp->cn_flags & HASBUF) == 0) 121 cnp->cn_pnbuf = uma_zalloc(namei_zone, M_WAITOK); 122 if (ndp->ni_segflg == UIO_SYSSPACE) 123 error = copystr(ndp->ni_dirp, cnp->cn_pnbuf, 124 MAXPATHLEN, (size_t *)&ndp->ni_pathlen); 125 else 126 error = copyinstr(ndp->ni_dirp, cnp->cn_pnbuf, 127 MAXPATHLEN, (size_t *)&ndp->ni_pathlen); 128 129 /* 130 * Don't allow empty pathnames. 131 */ 132 if (!error && *cnp->cn_pnbuf == '\0') 133 error = ENOENT; 134 135 if (error) { 136 uma_zfree(namei_zone, cnp->cn_pnbuf); 137 ndp->ni_vp = NULL; 138 return (error); 139 } 140 ndp->ni_loopcnt = 0; 141 #ifdef KTRACE 142 if (KTRPOINT(td, KTR_NAMEI)) { 143 KASSERT(cnp->cn_thread == curthread, 144 ("namei not using curthread")); 145 ktrnamei(cnp->cn_pnbuf); 146 } 147 #endif 148 149 /* 150 * Get starting point for the translation. 151 */ 152 FILEDESC_LOCK(fdp); 153 ndp->ni_rootdir = fdp->fd_rdir; 154 ndp->ni_topdir = fdp->fd_jdir; 155 156 dp = fdp->fd_cdir; 157 VREF(dp); 158 FILEDESC_UNLOCK(fdp); 159 for (;;) { 160 /* 161 * Check if root directory should replace current directory. 162 * Done at start of translation and after symbolic link. 163 */ 164 cnp->cn_nameptr = cnp->cn_pnbuf; 165 if (*(cnp->cn_nameptr) == '/') { 166 vrele(dp); 167 while (*(cnp->cn_nameptr) == '/') { 168 cnp->cn_nameptr++; 169 ndp->ni_pathlen--; 170 } 171 dp = ndp->ni_rootdir; 172 VREF(dp); 173 } 174 ndp->ni_startdir = dp; 175 error = lookup(ndp); 176 if (error) { 177 uma_zfree(namei_zone, cnp->cn_pnbuf); 178 return (error); 179 } 180 /* 181 * Check for symbolic link 182 */ 183 if ((cnp->cn_flags & ISSYMLINK) == 0) { 184 if ((cnp->cn_flags & (SAVENAME | SAVESTART)) == 0) 185 uma_zfree(namei_zone, cnp->cn_pnbuf); 186 else 187 cnp->cn_flags |= HASBUF; 188 189 if (vn_canvmio(ndp->ni_vp) == TRUE && 190 (cnp->cn_nameiop != DELETE) && 191 ((cnp->cn_flags & (NOOBJ|LOCKLEAF)) == 192 LOCKLEAF)) 193 vfs_object_create(ndp->ni_vp, td, 194 ndp->ni_cnd.cn_cred); 195 196 return (0); 197 } 198 if ((cnp->cn_flags & LOCKPARENT) && ndp->ni_pathlen == 1) 199 VOP_UNLOCK(ndp->ni_dvp, 0, td); 200 if (ndp->ni_loopcnt++ >= MAXSYMLINKS) { 201 error = ELOOP; 202 break; 203 } 204 if (ndp->ni_pathlen > 1) 205 cp = uma_zalloc(namei_zone, M_WAITOK); 206 else 207 cp = cnp->cn_pnbuf; 208 aiov.iov_base = cp; 209 aiov.iov_len = MAXPATHLEN; 210 auio.uio_iov = &aiov; 211 auio.uio_iovcnt = 1; 212 auio.uio_offset = 0; 213 auio.uio_rw = UIO_READ; 214 auio.uio_segflg = UIO_SYSSPACE; 215 auio.uio_td = (struct thread *)0; 216 auio.uio_resid = MAXPATHLEN; 217 error = VOP_READLINK(ndp->ni_vp, &auio, cnp->cn_cred); 218 if (error) { 219 if (ndp->ni_pathlen > 1) 220 uma_zfree(namei_zone, cp); 221 break; 222 } 223 linklen = MAXPATHLEN - auio.uio_resid; 224 if (linklen == 0) { 225 if (ndp->ni_pathlen > 1) 226 uma_zfree(namei_zone, cp); 227 error = ENOENT; 228 break; 229 } 230 if (linklen + ndp->ni_pathlen >= MAXPATHLEN) { 231 if (ndp->ni_pathlen > 1) 232 uma_zfree(namei_zone, cp); 233 error = ENAMETOOLONG; 234 break; 235 } 236 if (ndp->ni_pathlen > 1) { 237 bcopy(ndp->ni_next, cp + linklen, ndp->ni_pathlen); 238 uma_zfree(namei_zone, cnp->cn_pnbuf); 239 cnp->cn_pnbuf = cp; 240 } else 241 cnp->cn_pnbuf[linklen] = '\0'; 242 ndp->ni_pathlen += linklen; 243 vput(ndp->ni_vp); 244 dp = ndp->ni_dvp; 245 } 246 uma_zfree(namei_zone, cnp->cn_pnbuf); 247 vrele(ndp->ni_dvp); 248 vput(ndp->ni_vp); 249 ndp->ni_vp = NULL; 250 return (error); 251 } 252 253 /* 254 * Search a pathname. 255 * This is a very central and rather complicated routine. 256 * 257 * The pathname is pointed to by ni_ptr and is of length ni_pathlen. 258 * The starting directory is taken from ni_startdir. The pathname is 259 * descended until done, or a symbolic link is encountered. The variable 260 * ni_more is clear if the path is completed; it is set to one if a 261 * symbolic link needing interpretation is encountered. 262 * 263 * The flag argument is LOOKUP, CREATE, RENAME, or DELETE depending on 264 * whether the name is to be looked up, created, renamed, or deleted. 265 * When CREATE, RENAME, or DELETE is specified, information usable in 266 * creating, renaming, or deleting a directory entry may be calculated. 267 * If flag has LOCKPARENT or'ed into it, the parent directory is returned 268 * locked. If flag has WANTPARENT or'ed into it, the parent directory is 269 * returned unlocked. Otherwise the parent directory is not returned. If 270 * the target of the pathname exists and LOCKLEAF is or'ed into the flag 271 * the target is returned locked, otherwise it is returned unlocked. 272 * When creating or renaming and LOCKPARENT is specified, the target may not 273 * be ".". When deleting and LOCKPARENT is specified, the target may be ".". 274 * 275 * Overall outline of lookup: 276 * 277 * dirloop: 278 * identify next component of name at ndp->ni_ptr 279 * handle degenerate case where name is null string 280 * if .. and crossing mount points and on mounted filesys, find parent 281 * call VOP_LOOKUP routine for next component name 282 * directory vnode returned in ni_dvp, unlocked unless LOCKPARENT set 283 * component vnode returned in ni_vp (if it exists), locked. 284 * if result vnode is mounted on and crossing mount points, 285 * find mounted on vnode 286 * if more components of name, do next level at dirloop 287 * return the answer in ni_vp, locked if LOCKLEAF set 288 * if LOCKPARENT set, return locked parent in ni_dvp 289 * if WANTPARENT set, return unlocked parent in ni_dvp 290 */ 291 int 292 lookup(ndp) 293 register struct nameidata *ndp; 294 { 295 register char *cp; /* pointer into pathname argument */ 296 register struct vnode *dp = 0; /* the directory we are searching */ 297 struct vnode *tdp; /* saved dp */ 298 struct mount *mp; /* mount table entry */ 299 int docache; /* == 0 do not cache last component */ 300 int wantparent; /* 1 => wantparent or lockparent flag */ 301 int rdonly; /* lookup read-only flag bit */ 302 int trailing_slash; 303 int error = 0; 304 int dpunlocked = 0; /* dp has already been unlocked */ 305 struct componentname *cnp = &ndp->ni_cnd; 306 struct thread *td = cnp->cn_thread; 307 308 /* 309 * Setup: break out flag bits into variables. 310 */ 311 wantparent = cnp->cn_flags & (LOCKPARENT | WANTPARENT); 312 docache = (cnp->cn_flags & NOCACHE) ^ NOCACHE; 313 if (cnp->cn_nameiop == DELETE || 314 (wantparent && cnp->cn_nameiop != CREATE && 315 cnp->cn_nameiop != LOOKUP)) 316 docache = 0; 317 rdonly = cnp->cn_flags & RDONLY; 318 ndp->ni_dvp = NULL; 319 cnp->cn_flags &= ~ISSYMLINK; 320 dp = ndp->ni_startdir; 321 ndp->ni_startdir = NULLVP; 322 vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td); 323 324 dirloop: 325 /* 326 * Search a new directory. 327 * 328 * The last component of the filename is left accessible via 329 * cnp->cn_nameptr for callers that need the name. Callers needing 330 * the name set the SAVENAME flag. When done, they assume 331 * responsibility for freeing the pathname buffer. 332 */ 333 cnp->cn_consume = 0; 334 for (cp = cnp->cn_nameptr; *cp != 0 && *cp != '/'; cp++) 335 continue; 336 cnp->cn_namelen = cp - cnp->cn_nameptr; 337 if (cnp->cn_namelen > NAME_MAX) { 338 error = ENAMETOOLONG; 339 goto bad; 340 } 341 #ifdef NAMEI_DIAGNOSTIC 342 { char c = *cp; 343 *cp = '\0'; 344 printf("{%s}: ", cnp->cn_nameptr); 345 *cp = c; } 346 #endif 347 ndp->ni_pathlen -= cnp->cn_namelen; 348 ndp->ni_next = cp; 349 350 /* 351 * Replace multiple slashes by a single slash and trailing slashes 352 * by a null. This must be done before VOP_LOOKUP() because some 353 * fs's don't know about trailing slashes. Remember if there were 354 * trailing slashes to handle symlinks, existing non-directories 355 * and non-existing files that won't be directories specially later. 356 */ 357 trailing_slash = 0; 358 while (*cp == '/' && (cp[1] == '/' || cp[1] == '\0')) { 359 cp++; 360 ndp->ni_pathlen--; 361 if (*cp == '\0') { 362 trailing_slash = 1; 363 *ndp->ni_next = '\0'; /* XXX for direnter() ... */ 364 } 365 } 366 ndp->ni_next = cp; 367 368 cnp->cn_flags |= MAKEENTRY; 369 if (*cp == '\0' && docache == 0) 370 cnp->cn_flags &= ~MAKEENTRY; 371 if (cnp->cn_namelen == 2 && 372 cnp->cn_nameptr[1] == '.' && cnp->cn_nameptr[0] == '.') 373 cnp->cn_flags |= ISDOTDOT; 374 else 375 cnp->cn_flags &= ~ISDOTDOT; 376 if (*ndp->ni_next == 0) 377 cnp->cn_flags |= ISLASTCN; 378 else 379 cnp->cn_flags &= ~ISLASTCN; 380 381 382 /* 383 * Check for degenerate name (e.g. / or "") 384 * which is a way of talking about a directory, 385 * e.g. like "/." or ".". 386 */ 387 if (cnp->cn_nameptr[0] == '\0') { 388 if (dp->v_type != VDIR) { 389 error = ENOTDIR; 390 goto bad; 391 } 392 if (cnp->cn_nameiop != LOOKUP) { 393 error = EISDIR; 394 goto bad; 395 } 396 if (wantparent) { 397 ndp->ni_dvp = dp; 398 VREF(dp); 399 } 400 ndp->ni_vp = dp; 401 if (!(cnp->cn_flags & (LOCKPARENT | LOCKLEAF))) 402 VOP_UNLOCK(dp, 0, td); 403 /* XXX This should probably move to the top of function. */ 404 if (cnp->cn_flags & SAVESTART) 405 panic("lookup: SAVESTART"); 406 return (0); 407 } 408 409 /* 410 * Handle "..": two special cases. 411 * 1. If at root directory (e.g. after chroot) 412 * or at absolute root directory 413 * then ignore it so can't get out. 414 * 2. If this vnode is the root of a mounted 415 * filesystem, then replace it with the 416 * vnode which was mounted on so we take the 417 * .. in the other filesystem. 418 * 3. If the vnode is the top directory of 419 * the jail or chroot, don't let them out. 420 */ 421 if (cnp->cn_flags & ISDOTDOT) { 422 for (;;) { 423 if (dp == ndp->ni_rootdir || 424 dp == ndp->ni_topdir || 425 dp == rootvnode) { 426 ndp->ni_dvp = dp; 427 ndp->ni_vp = dp; 428 VREF(dp); 429 goto nextname; 430 } 431 if ((dp->v_flag & VROOT) == 0 || 432 (cnp->cn_flags & NOCROSSMOUNT)) 433 break; 434 if (dp->v_mount == NULL) { /* forced unmount */ 435 error = EBADF; 436 goto bad; 437 } 438 tdp = dp; 439 dp = dp->v_mount->mnt_vnodecovered; 440 vput(tdp); 441 VREF(dp); 442 vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td); 443 } 444 } 445 446 /* 447 * We now have a segment name to search for, and a directory to search. 448 */ 449 unionlookup: 450 ndp->ni_dvp = dp; 451 ndp->ni_vp = NULL; 452 cnp->cn_flags &= ~PDIRUNLOCK; 453 ASSERT_VOP_LOCKED(dp, "lookup"); 454 if ((error = VOP_LOOKUP(dp, &ndp->ni_vp, cnp)) != 0) { 455 KASSERT(ndp->ni_vp == NULL, ("leaf should be empty")); 456 #ifdef NAMEI_DIAGNOSTIC 457 printf("not found\n"); 458 #endif 459 if ((error == ENOENT) && 460 (dp->v_flag & VROOT) && (dp->v_mount != NULL) && 461 (dp->v_mount->mnt_flag & MNT_UNION)) { 462 tdp = dp; 463 dp = dp->v_mount->mnt_vnodecovered; 464 if (cnp->cn_flags & PDIRUNLOCK) 465 vrele(tdp); 466 else 467 vput(tdp); 468 VREF(dp); 469 vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td); 470 goto unionlookup; 471 } 472 473 if (error != EJUSTRETURN) 474 goto bad; 475 /* 476 * If creating and at end of pathname, then can consider 477 * allowing file to be created. 478 */ 479 if (rdonly) { 480 error = EROFS; 481 goto bad; 482 } 483 if (*cp == '\0' && trailing_slash && 484 !(cnp->cn_flags & WILLBEDIR)) { 485 error = ENOENT; 486 goto bad; 487 } 488 /* 489 * We return with ni_vp NULL to indicate that the entry 490 * doesn't currently exist, leaving a pointer to the 491 * (possibly locked) directory inode in ndp->ni_dvp. 492 */ 493 if (cnp->cn_flags & SAVESTART) { 494 ndp->ni_startdir = ndp->ni_dvp; 495 VREF(ndp->ni_startdir); 496 } 497 return (0); 498 } 499 #ifdef NAMEI_DIAGNOSTIC 500 printf("found\n"); 501 #endif 502 503 ASSERT_VOP_LOCKED(ndp->ni_vp, "lookup"); 504 505 /* 506 * Take into account any additional components consumed by 507 * the underlying filesystem. 508 */ 509 if (cnp->cn_consume > 0) { 510 cnp->cn_nameptr += cnp->cn_consume; 511 ndp->ni_next += cnp->cn_consume; 512 ndp->ni_pathlen -= cnp->cn_consume; 513 cnp->cn_consume = 0; 514 } 515 516 dp = ndp->ni_vp; 517 518 /* 519 * Check to see if the vnode has been mounted on; 520 * if so find the root of the mounted filesystem. 521 */ 522 while (dp->v_type == VDIR && (mp = dp->v_mountedhere) && 523 (cnp->cn_flags & NOCROSSMOUNT) == 0) { 524 if (vfs_busy(mp, 0, 0, td)) 525 continue; 526 VOP_UNLOCK(dp, 0, td); 527 error = VFS_ROOT(mp, &tdp); 528 vfs_unbusy(mp, td); 529 if (error) { 530 dpunlocked = 1; 531 goto bad2; 532 } 533 vrele(dp); 534 ndp->ni_vp = dp = tdp; 535 } 536 537 /* 538 * Check for symbolic link 539 */ 540 if ((dp->v_type == VLNK) && 541 ((cnp->cn_flags & FOLLOW) || trailing_slash || 542 *ndp->ni_next == '/')) { 543 cnp->cn_flags |= ISSYMLINK; 544 if (dp->v_mount == NULL) { 545 /* We can't know whether the directory was mounted with 546 * NOSYMFOLLOW, so we can't follow safely. */ 547 error = EBADF; 548 goto bad2; 549 } 550 if (dp->v_mount->mnt_flag & MNT_NOSYMFOLLOW) { 551 error = EACCES; 552 goto bad2; 553 } 554 return (0); 555 } 556 557 /* 558 * Check for bogus trailing slashes. 559 */ 560 if (trailing_slash && dp->v_type != VDIR) { 561 error = ENOTDIR; 562 goto bad2; 563 } 564 565 nextname: 566 /* 567 * Not a symbolic link. If more pathname, 568 * continue at next component, else return. 569 */ 570 if (*ndp->ni_next == '/') { 571 cnp->cn_nameptr = ndp->ni_next; 572 while (*cnp->cn_nameptr == '/') { 573 cnp->cn_nameptr++; 574 ndp->ni_pathlen--; 575 } 576 if (ndp->ni_dvp != ndp->ni_vp) 577 ASSERT_VOP_UNLOCKED(ndp->ni_dvp, "lookup"); 578 vrele(ndp->ni_dvp); 579 goto dirloop; 580 } 581 /* 582 * Disallow directory write attempts on read-only filesystems. 583 */ 584 if (rdonly && 585 (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) { 586 error = EROFS; 587 goto bad2; 588 } 589 if (cnp->cn_flags & SAVESTART) { 590 ndp->ni_startdir = ndp->ni_dvp; 591 VREF(ndp->ni_startdir); 592 } 593 if (!wantparent) 594 vrele(ndp->ni_dvp); 595 596 if ((cnp->cn_flags & LOCKLEAF) == 0) 597 VOP_UNLOCK(dp, 0, td); 598 return (0); 599 600 bad2: 601 if ((cnp->cn_flags & (LOCKPARENT | PDIRUNLOCK)) == LOCKPARENT && 602 *ndp->ni_next == '\0') 603 VOP_UNLOCK(ndp->ni_dvp, 0, td); 604 vrele(ndp->ni_dvp); 605 bad: 606 if (dpunlocked) 607 vrele(dp); 608 else 609 vput(dp); 610 ndp->ni_vp = NULL; 611 return (error); 612 } 613 614 /* 615 * relookup - lookup a path name component 616 * Used by lookup to re-aquire things. 617 */ 618 int 619 relookup(dvp, vpp, cnp) 620 struct vnode *dvp, **vpp; 621 struct componentname *cnp; 622 { 623 struct thread *td = cnp->cn_thread; 624 struct vnode *dp = 0; /* the directory we are searching */ 625 int docache; /* == 0 do not cache last component */ 626 int wantparent; /* 1 => wantparent or lockparent flag */ 627 int rdonly; /* lookup read-only flag bit */ 628 int error = 0; 629 #ifdef NAMEI_DIAGNOSTIC 630 int newhash; /* DEBUG: check name hash */ 631 char *cp; /* DEBUG: check name ptr/len */ 632 #endif 633 634 /* 635 * Setup: break out flag bits into variables. 636 */ 637 wantparent = cnp->cn_flags & (LOCKPARENT|WANTPARENT); 638 docache = (cnp->cn_flags & NOCACHE) ^ NOCACHE; 639 if (cnp->cn_nameiop == DELETE || 640 (wantparent && cnp->cn_nameiop != CREATE)) 641 docache = 0; 642 rdonly = cnp->cn_flags & RDONLY; 643 cnp->cn_flags &= ~ISSYMLINK; 644 dp = dvp; 645 vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td); 646 647 /* dirloop: */ 648 /* 649 * Search a new directory. 650 * 651 * The last component of the filename is left accessible via 652 * cnp->cn_nameptr for callers that need the name. Callers needing 653 * the name set the SAVENAME flag. When done, they assume 654 * responsibility for freeing the pathname buffer. 655 */ 656 #ifdef NAMEI_DIAGNOSTIC 657 if (cnp->cn_namelen != cp - cnp->cn_nameptr) 658 panic ("relookup: bad len"); 659 if (*cp != 0) 660 panic("relookup: not last component"); 661 printf("{%s}: ", cnp->cn_nameptr); 662 #endif 663 664 /* 665 * Check for degenerate name (e.g. / or "") 666 * which is a way of talking about a directory, 667 * e.g. like "/." or ".". 668 */ 669 if (cnp->cn_nameptr[0] == '\0') { 670 if (cnp->cn_nameiop != LOOKUP || wantparent) { 671 error = EISDIR; 672 goto bad; 673 } 674 if (dp->v_type != VDIR) { 675 error = ENOTDIR; 676 goto bad; 677 } 678 if (!(cnp->cn_flags & LOCKLEAF)) 679 VOP_UNLOCK(dp, 0, td); 680 *vpp = dp; 681 /* XXX This should probably move to the top of function. */ 682 if (cnp->cn_flags & SAVESTART) 683 panic("lookup: SAVESTART"); 684 return (0); 685 } 686 687 if (cnp->cn_flags & ISDOTDOT) 688 panic ("relookup: lookup on dot-dot"); 689 690 /* 691 * We now have a segment name to search for, and a directory to search. 692 */ 693 if ((error = VOP_LOOKUP(dp, vpp, cnp)) != 0) { 694 KASSERT(*vpp == NULL, ("leaf should be empty")); 695 if (error != EJUSTRETURN) 696 goto bad; 697 /* 698 * If creating and at end of pathname, then can consider 699 * allowing file to be created. 700 */ 701 if (rdonly) { 702 error = EROFS; 703 goto bad; 704 } 705 /* ASSERT(dvp == ndp->ni_startdir) */ 706 if (cnp->cn_flags & SAVESTART) 707 VREF(dvp); 708 /* 709 * We return with ni_vp NULL to indicate that the entry 710 * doesn't currently exist, leaving a pointer to the 711 * (possibly locked) directory inode in ndp->ni_dvp. 712 */ 713 return (0); 714 } 715 dp = *vpp; 716 717 /* 718 * Check for symbolic link 719 */ 720 KASSERT(dp->v_type != VLNK || !(cnp->cn_flags & FOLLOW), 721 ("relookup: symlink found.\n")); 722 723 /* 724 * Disallow directory write attempts on read-only filesystems. 725 */ 726 if (rdonly && 727 (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) { 728 error = EROFS; 729 goto bad2; 730 } 731 /* ASSERT(dvp == ndp->ni_startdir) */ 732 if (cnp->cn_flags & SAVESTART) 733 VREF(dvp); 734 735 if (!wantparent) 736 vrele(dvp); 737 738 if (vn_canvmio(dp) == TRUE && 739 ((cnp->cn_flags & (NOOBJ|LOCKLEAF)) == LOCKLEAF)) 740 vfs_object_create(dp, td, cnp->cn_cred); 741 742 if ((cnp->cn_flags & LOCKLEAF) == 0) 743 VOP_UNLOCK(dp, 0, td); 744 return (0); 745 746 bad2: 747 if ((cnp->cn_flags & LOCKPARENT) && (cnp->cn_flags & ISLASTCN)) 748 VOP_UNLOCK(dvp, 0, td); 749 vrele(dvp); 750 bad: 751 vput(dp); 752 *vpp = NULL; 753 return (error); 754 } 755