xref: /freebsd/sys/kern/vfs_lookup.c (revision b52b9d56d4e96089873a75f9e29062eec19fabba)
1 /*
2  * Copyright (c) 1982, 1986, 1989, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  * (c) UNIX System Laboratories, Inc.
5  * All or some portions of this file are derived from material licensed
6  * to the University of California by American Telephone and Telegraph
7  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8  * the permission of UNIX System Laboratories, Inc.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. All advertising materials mentioning features or use of this software
19  *    must display the following acknowledgement:
20  *	This product includes software developed by the University of
21  *	California, Berkeley and its contributors.
22  * 4. Neither the name of the University nor the names of its contributors
23  *    may be used to endorse or promote products derived from this software
24  *    without specific prior written permission.
25  *
26  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36  * SUCH DAMAGE.
37  *
38  *	@(#)vfs_lookup.c	8.4 (Berkeley) 2/16/94
39  * $FreeBSD$
40  */
41 
42 #include "opt_ktrace.h"
43 
44 #include <sys/param.h>
45 #include <sys/systm.h>
46 #include <sys/kernel.h>
47 #include <sys/lock.h>
48 #include <sys/mutex.h>
49 #include <sys/namei.h>
50 #include <sys/vnode.h>
51 #include <sys/mount.h>
52 #include <sys/filedesc.h>
53 #include <sys/proc.h>
54 #ifdef KTRACE
55 #include <sys/ktrace.h>
56 #endif
57 
58 #include <vm/uma.h>
59 
60 /*
61  * Allocation zone for namei
62  */
63 uma_zone_t namei_zone;
64 
65 static void
66 nameiinit(void *dummy __unused)
67 {
68 	namei_zone = uma_zcreate("NAMEI", MAXPATHLEN, NULL, NULL, NULL, NULL,
69 	    UMA_ALIGN_PTR, 0);
70 
71 }
72 SYSINIT(vfs, SI_SUB_VFS, SI_ORDER_SECOND, nameiinit, NULL)
73 
74 /*
75  * Convert a pathname into a pointer to a locked inode.
76  *
77  * The FOLLOW flag is set when symbolic links are to be followed
78  * when they occur at the end of the name translation process.
79  * Symbolic links are always followed for all other pathname
80  * components other than the last.
81  *
82  * The segflg defines whether the name is to be copied from user
83  * space or kernel space.
84  *
85  * Overall outline of namei:
86  *
87  *	copy in name
88  *	get starting directory
89  *	while (!done && !error) {
90  *		call lookup to search path.
91  *		if symbolic link, massage name in buffer and continue
92  *	}
93  */
94 int
95 namei(ndp)
96 	register struct nameidata *ndp;
97 {
98 	register struct filedesc *fdp;	/* pointer to file descriptor state */
99 	register char *cp;		/* pointer into pathname argument */
100 	register struct vnode *dp;	/* the directory we are searching */
101 	struct iovec aiov;		/* uio for reading symbolic links */
102 	struct uio auio;
103 	int error, linklen;
104 	struct componentname *cnp = &ndp->ni_cnd;
105 	struct thread *td = cnp->cn_thread;
106 	struct proc *p = td->td_proc;
107 
108 	ndp->ni_cnd.cn_cred = ndp->ni_cnd.cn_thread->td_ucred;
109 	KASSERT(cnp->cn_cred && p, ("namei: bad cred/proc"));
110 	KASSERT((cnp->cn_nameiop & (~OPMASK)) == 0,
111 	    ("namei: nameiop contaminated with flags"));
112 	KASSERT((cnp->cn_flags & OPMASK) == 0,
113 	    ("namei: flags contaminated with nameiops"));
114 	fdp = p->p_fd;
115 
116 	/*
117 	 * Get a buffer for the name to be translated, and copy the
118 	 * name into the buffer.
119 	 */
120 	if ((cnp->cn_flags & HASBUF) == 0)
121 		cnp->cn_pnbuf = uma_zalloc(namei_zone, M_WAITOK);
122 	if (ndp->ni_segflg == UIO_SYSSPACE)
123 		error = copystr(ndp->ni_dirp, cnp->cn_pnbuf,
124 			    MAXPATHLEN, (size_t *)&ndp->ni_pathlen);
125 	else
126 		error = copyinstr(ndp->ni_dirp, cnp->cn_pnbuf,
127 			    MAXPATHLEN, (size_t *)&ndp->ni_pathlen);
128 
129 	/*
130 	 * Don't allow empty pathnames.
131 	 */
132 	if (!error && *cnp->cn_pnbuf == '\0')
133 		error = ENOENT;
134 
135 	if (error) {
136 		uma_zfree(namei_zone, cnp->cn_pnbuf);
137 #ifdef DIAGNOSTIC
138 		cnp->cn_pnbuf = NULL;
139 		cnp->cn_nameptr = NULL;
140 #endif
141 		ndp->ni_vp = NULL;
142 		return (error);
143 	}
144 	ndp->ni_loopcnt = 0;
145 #ifdef KTRACE
146 	if (KTRPOINT(td, KTR_NAMEI)) {
147 		KASSERT(cnp->cn_thread == curthread,
148 		    ("namei not using curthread"));
149 		ktrnamei(cnp->cn_pnbuf);
150 	}
151 #endif
152 
153 	/*
154 	 * Get starting point for the translation.
155 	 */
156 	FILEDESC_LOCK(fdp);
157 	ndp->ni_rootdir = fdp->fd_rdir;
158 	ndp->ni_topdir = fdp->fd_jdir;
159 
160 	dp = fdp->fd_cdir;
161 	VREF(dp);
162 	FILEDESC_UNLOCK(fdp);
163 	for (;;) {
164 		/*
165 		 * Check if root directory should replace current directory.
166 		 * Done at start of translation and after symbolic link.
167 		 */
168 		cnp->cn_nameptr = cnp->cn_pnbuf;
169 		if (*(cnp->cn_nameptr) == '/') {
170 			vrele(dp);
171 			while (*(cnp->cn_nameptr) == '/') {
172 				cnp->cn_nameptr++;
173 				ndp->ni_pathlen--;
174 			}
175 			dp = ndp->ni_rootdir;
176 			VREF(dp);
177 		}
178 		ndp->ni_startdir = dp;
179 		error = lookup(ndp);
180 		if (error) {
181 			uma_zfree(namei_zone, cnp->cn_pnbuf);
182 #ifdef DIAGNOSTIC
183 			cnp->cn_pnbuf = NULL;
184 			cnp->cn_nameptr = NULL;
185 #endif
186 			return (error);
187 		}
188 		/*
189 		 * Check for symbolic link
190 		 */
191 		if ((cnp->cn_flags & ISSYMLINK) == 0) {
192 			if ((cnp->cn_flags & (SAVENAME | SAVESTART)) == 0) {
193 				uma_zfree(namei_zone, cnp->cn_pnbuf);
194 #ifdef DIAGNOSTIC
195 				cnp->cn_pnbuf = NULL;
196 				cnp->cn_nameptr = NULL;
197 #endif
198 			} else
199 				cnp->cn_flags |= HASBUF;
200 
201 			if (vn_canvmio(ndp->ni_vp) == TRUE &&
202 				(cnp->cn_nameiop != DELETE) &&
203 				((cnp->cn_flags & (NOOBJ|LOCKLEAF)) ==
204 				 LOCKLEAF))
205 				vfs_object_create(ndp->ni_vp, td,
206 					ndp->ni_cnd.cn_cred);
207 
208 			return (0);
209 		}
210 		if ((cnp->cn_flags & LOCKPARENT) && ndp->ni_pathlen == 1)
211 			VOP_UNLOCK(ndp->ni_dvp, 0, td);
212 		if (ndp->ni_loopcnt++ >= MAXSYMLINKS) {
213 			error = ELOOP;
214 			break;
215 		}
216 		if (ndp->ni_pathlen > 1)
217 			cp = uma_zalloc(namei_zone, M_WAITOK);
218 		else
219 			cp = cnp->cn_pnbuf;
220 		aiov.iov_base = cp;
221 		aiov.iov_len = MAXPATHLEN;
222 		auio.uio_iov = &aiov;
223 		auio.uio_iovcnt = 1;
224 		auio.uio_offset = 0;
225 		auio.uio_rw = UIO_READ;
226 		auio.uio_segflg = UIO_SYSSPACE;
227 		auio.uio_td = (struct thread *)0;
228 		auio.uio_resid = MAXPATHLEN;
229 		error = VOP_READLINK(ndp->ni_vp, &auio, cnp->cn_cred);
230 		if (error) {
231 			if (ndp->ni_pathlen > 1)
232 				uma_zfree(namei_zone, cp);
233 			break;
234 		}
235 		linklen = MAXPATHLEN - auio.uio_resid;
236 		if (linklen == 0) {
237 			if (ndp->ni_pathlen > 1)
238 				uma_zfree(namei_zone, cp);
239 			error = ENOENT;
240 			break;
241 		}
242 		if (linklen + ndp->ni_pathlen >= MAXPATHLEN) {
243 			if (ndp->ni_pathlen > 1)
244 				uma_zfree(namei_zone, cp);
245 			error = ENAMETOOLONG;
246 			break;
247 		}
248 		if (ndp->ni_pathlen > 1) {
249 			bcopy(ndp->ni_next, cp + linklen, ndp->ni_pathlen);
250 			uma_zfree(namei_zone, cnp->cn_pnbuf);
251 			cnp->cn_pnbuf = cp;
252 		} else
253 			cnp->cn_pnbuf[linklen] = '\0';
254 		ndp->ni_pathlen += linklen;
255 		vput(ndp->ni_vp);
256 		dp = ndp->ni_dvp;
257 	}
258 	uma_zfree(namei_zone, cnp->cn_pnbuf);
259 #ifdef DIAGNOSTIC
260 	cnp->cn_pnbuf = NULL;
261 	cnp->cn_nameptr = NULL;
262 #endif
263 	vrele(ndp->ni_dvp);
264 	vput(ndp->ni_vp);
265 	ndp->ni_vp = NULL;
266 	return (error);
267 }
268 
269 /*
270  * Search a pathname.
271  * This is a very central and rather complicated routine.
272  *
273  * The pathname is pointed to by ni_ptr and is of length ni_pathlen.
274  * The starting directory is taken from ni_startdir. The pathname is
275  * descended until done, or a symbolic link is encountered. The variable
276  * ni_more is clear if the path is completed; it is set to one if a
277  * symbolic link needing interpretation is encountered.
278  *
279  * The flag argument is LOOKUP, CREATE, RENAME, or DELETE depending on
280  * whether the name is to be looked up, created, renamed, or deleted.
281  * When CREATE, RENAME, or DELETE is specified, information usable in
282  * creating, renaming, or deleting a directory entry may be calculated.
283  * If flag has LOCKPARENT or'ed into it, the parent directory is returned
284  * locked. If flag has WANTPARENT or'ed into it, the parent directory is
285  * returned unlocked. Otherwise the parent directory is not returned. If
286  * the target of the pathname exists and LOCKLEAF is or'ed into the flag
287  * the target is returned locked, otherwise it is returned unlocked.
288  * When creating or renaming and LOCKPARENT is specified, the target may not
289  * be ".".  When deleting and LOCKPARENT is specified, the target may be ".".
290  *
291  * Overall outline of lookup:
292  *
293  * dirloop:
294  *	identify next component of name at ndp->ni_ptr
295  *	handle degenerate case where name is null string
296  *	if .. and crossing mount points and on mounted filesys, find parent
297  *	call VOP_LOOKUP routine for next component name
298  *	    directory vnode returned in ni_dvp, unlocked unless LOCKPARENT set
299  *	    component vnode returned in ni_vp (if it exists), locked.
300  *	if result vnode is mounted on and crossing mount points,
301  *	    find mounted on vnode
302  *	if more components of name, do next level at dirloop
303  *	return the answer in ni_vp, locked if LOCKLEAF set
304  *	    if LOCKPARENT set, return locked parent in ni_dvp
305  *	    if WANTPARENT set, return unlocked parent in ni_dvp
306  */
307 int
308 lookup(ndp)
309 	register struct nameidata *ndp;
310 {
311 	register char *cp;		/* pointer into pathname argument */
312 	register struct vnode *dp = 0;	/* the directory we are searching */
313 	struct vnode *tdp;		/* saved dp */
314 	struct mount *mp;		/* mount table entry */
315 	int docache;			/* == 0 do not cache last component */
316 	int wantparent;			/* 1 => wantparent or lockparent flag */
317 	int rdonly;			/* lookup read-only flag bit */
318 	int trailing_slash;
319 	int error = 0;
320 	int dpunlocked = 0;		/* dp has already been unlocked */
321 	struct componentname *cnp = &ndp->ni_cnd;
322 	struct thread *td = cnp->cn_thread;
323 
324 	/*
325 	 * Setup: break out flag bits into variables.
326 	 */
327 	wantparent = cnp->cn_flags & (LOCKPARENT | WANTPARENT);
328 	docache = (cnp->cn_flags & NOCACHE) ^ NOCACHE;
329 	if (cnp->cn_nameiop == DELETE ||
330 	    (wantparent && cnp->cn_nameiop != CREATE &&
331 	     cnp->cn_nameiop != LOOKUP))
332 		docache = 0;
333 	rdonly = cnp->cn_flags & RDONLY;
334 	ndp->ni_dvp = NULL;
335 	cnp->cn_flags &= ~ISSYMLINK;
336 	dp = ndp->ni_startdir;
337 	ndp->ni_startdir = NULLVP;
338 	vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td);
339 
340 dirloop:
341 	/*
342 	 * Search a new directory.
343 	 *
344 	 * The last component of the filename is left accessible via
345 	 * cnp->cn_nameptr for callers that need the name. Callers needing
346 	 * the name set the SAVENAME flag. When done, they assume
347 	 * responsibility for freeing the pathname buffer.
348 	 */
349 	cnp->cn_consume = 0;
350 	for (cp = cnp->cn_nameptr; *cp != 0 && *cp != '/'; cp++)
351 		continue;
352 	cnp->cn_namelen = cp - cnp->cn_nameptr;
353 	if (cnp->cn_namelen > NAME_MAX) {
354 		error = ENAMETOOLONG;
355 		goto bad;
356 	}
357 #ifdef NAMEI_DIAGNOSTIC
358 	{ char c = *cp;
359 	*cp = '\0';
360 	printf("{%s}: ", cnp->cn_nameptr);
361 	*cp = c; }
362 #endif
363 	ndp->ni_pathlen -= cnp->cn_namelen;
364 	ndp->ni_next = cp;
365 
366 	/*
367 	 * Replace multiple slashes by a single slash and trailing slashes
368 	 * by a null.  This must be done before VOP_LOOKUP() because some
369 	 * fs's don't know about trailing slashes.  Remember if there were
370 	 * trailing slashes to handle symlinks, existing non-directories
371 	 * and non-existing files that won't be directories specially later.
372 	 */
373 	trailing_slash = 0;
374 	while (*cp == '/' && (cp[1] == '/' || cp[1] == '\0')) {
375 		cp++;
376 		ndp->ni_pathlen--;
377 		if (*cp == '\0') {
378 			trailing_slash = 1;
379 			*ndp->ni_next = '\0';	/* XXX for direnter() ... */
380 		}
381 	}
382 	ndp->ni_next = cp;
383 
384 	cnp->cn_flags |= MAKEENTRY;
385 	if (*cp == '\0' && docache == 0)
386 		cnp->cn_flags &= ~MAKEENTRY;
387 	if (cnp->cn_namelen == 2 &&
388 	    cnp->cn_nameptr[1] == '.' && cnp->cn_nameptr[0] == '.')
389 		cnp->cn_flags |= ISDOTDOT;
390 	else
391 		cnp->cn_flags &= ~ISDOTDOT;
392 	if (*ndp->ni_next == 0)
393 		cnp->cn_flags |= ISLASTCN;
394 	else
395 		cnp->cn_flags &= ~ISLASTCN;
396 
397 
398 	/*
399 	 * Check for degenerate name (e.g. / or "")
400 	 * which is a way of talking about a directory,
401 	 * e.g. like "/." or ".".
402 	 */
403 	if (cnp->cn_nameptr[0] == '\0') {
404 		if (dp->v_type != VDIR) {
405 			error = ENOTDIR;
406 			goto bad;
407 		}
408 		if (cnp->cn_nameiop != LOOKUP) {
409 			error = EISDIR;
410 			goto bad;
411 		}
412 		if (wantparent) {
413 			ndp->ni_dvp = dp;
414 			VREF(dp);
415 		}
416 		ndp->ni_vp = dp;
417 		if (!(cnp->cn_flags & (LOCKPARENT | LOCKLEAF)))
418 			VOP_UNLOCK(dp, 0, td);
419 		/* XXX This should probably move to the top of function. */
420 		if (cnp->cn_flags & SAVESTART)
421 			panic("lookup: SAVESTART");
422 		return (0);
423 	}
424 
425 	/*
426 	 * Handle "..": two special cases.
427 	 * 1. If at root directory (e.g. after chroot)
428 	 *    or at absolute root directory
429 	 *    then ignore it so can't get out.
430 	 * 2. If this vnode is the root of a mounted
431 	 *    filesystem, then replace it with the
432 	 *    vnode which was mounted on so we take the
433 	 *    .. in the other filesystem.
434 	 * 3. If the vnode is the top directory of
435 	 *    the jail or chroot, don't let them out.
436 	 */
437 	if (cnp->cn_flags & ISDOTDOT) {
438 		for (;;) {
439 			if (dp == ndp->ni_rootdir ||
440 			    dp == ndp->ni_topdir ||
441 			    dp == rootvnode) {
442 				ndp->ni_dvp = dp;
443 				ndp->ni_vp = dp;
444 				VREF(dp);
445 				goto nextname;
446 			}
447 			if ((dp->v_flag & VROOT) == 0 ||
448 			    (cnp->cn_flags & NOCROSSMOUNT))
449 				break;
450 			if (dp->v_mount == NULL) {	/* forced unmount */
451 				error = EBADF;
452 				goto bad;
453 			}
454 			tdp = dp;
455 			dp = dp->v_mount->mnt_vnodecovered;
456 			vput(tdp);
457 			VREF(dp);
458 			vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td);
459 		}
460 	}
461 
462 	/*
463 	 * We now have a segment name to search for, and a directory to search.
464 	 */
465 unionlookup:
466 	ndp->ni_dvp = dp;
467 	ndp->ni_vp = NULL;
468 	cnp->cn_flags &= ~PDIRUNLOCK;
469 	ASSERT_VOP_LOCKED(dp, "lookup");
470 	if ((error = VOP_LOOKUP(dp, &ndp->ni_vp, cnp)) != 0) {
471 		KASSERT(ndp->ni_vp == NULL, ("leaf should be empty"));
472 #ifdef NAMEI_DIAGNOSTIC
473 		printf("not found\n");
474 #endif
475 		if ((error == ENOENT) &&
476 		    (dp->v_flag & VROOT) && (dp->v_mount != NULL) &&
477 		    (dp->v_mount->mnt_flag & MNT_UNION)) {
478 			tdp = dp;
479 			dp = dp->v_mount->mnt_vnodecovered;
480 			if (cnp->cn_flags & PDIRUNLOCK)
481 				vrele(tdp);
482 			else
483 				vput(tdp);
484 			VREF(dp);
485 			vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td);
486 			goto unionlookup;
487 		}
488 
489 		if (error != EJUSTRETURN)
490 			goto bad;
491 		/*
492 		 * If creating and at end of pathname, then can consider
493 		 * allowing file to be created.
494 		 */
495 		if (rdonly) {
496 			error = EROFS;
497 			goto bad;
498 		}
499 		if (*cp == '\0' && trailing_slash &&
500 		     !(cnp->cn_flags & WILLBEDIR)) {
501 			error = ENOENT;
502 			goto bad;
503 		}
504 		/*
505 		 * We return with ni_vp NULL to indicate that the entry
506 		 * doesn't currently exist, leaving a pointer to the
507 		 * (possibly locked) directory inode in ndp->ni_dvp.
508 		 */
509 		if (cnp->cn_flags & SAVESTART) {
510 			ndp->ni_startdir = ndp->ni_dvp;
511 			VREF(ndp->ni_startdir);
512 		}
513 		return (0);
514 	}
515 #ifdef NAMEI_DIAGNOSTIC
516 	printf("found\n");
517 #endif
518 
519 	ASSERT_VOP_LOCKED(ndp->ni_vp, "lookup");
520 
521 	/*
522 	 * Take into account any additional components consumed by
523 	 * the underlying filesystem.
524 	 */
525 	if (cnp->cn_consume > 0) {
526 		cnp->cn_nameptr += cnp->cn_consume;
527 		ndp->ni_next += cnp->cn_consume;
528 		ndp->ni_pathlen -= cnp->cn_consume;
529 		cnp->cn_consume = 0;
530 	}
531 
532 	dp = ndp->ni_vp;
533 
534 	/*
535 	 * Check to see if the vnode has been mounted on;
536 	 * if so find the root of the mounted filesystem.
537 	 */
538 	while (dp->v_type == VDIR && (mp = dp->v_mountedhere) &&
539 	       (cnp->cn_flags & NOCROSSMOUNT) == 0) {
540 		if (vfs_busy(mp, 0, 0, td))
541 			continue;
542 		VOP_UNLOCK(dp, 0, td);
543 		error = VFS_ROOT(mp, &tdp);
544 		vfs_unbusy(mp, td);
545 		if (error) {
546 			dpunlocked = 1;
547 			goto bad2;
548 		}
549 		vrele(dp);
550 		ndp->ni_vp = dp = tdp;
551 	}
552 
553 	/*
554 	 * Check for symbolic link
555 	 */
556 	if ((dp->v_type == VLNK) &&
557 	    ((cnp->cn_flags & FOLLOW) || trailing_slash ||
558 	     *ndp->ni_next == '/')) {
559 		cnp->cn_flags |= ISSYMLINK;
560 		if (dp->v_mount == NULL) {
561 			/* We can't know whether the directory was mounted with
562 			 * NOSYMFOLLOW, so we can't follow safely. */
563 			error = EBADF;
564 			goto bad2;
565 		}
566 		if (dp->v_mount->mnt_flag & MNT_NOSYMFOLLOW) {
567 			error = EACCES;
568 			goto bad2;
569 		}
570 		return (0);
571 	}
572 
573 	/*
574 	 * Check for bogus trailing slashes.
575 	 */
576 	if (trailing_slash && dp->v_type != VDIR) {
577 		error = ENOTDIR;
578 		goto bad2;
579 	}
580 
581 nextname:
582 	/*
583 	 * Not a symbolic link.  If more pathname,
584 	 * continue at next component, else return.
585 	 */
586 	if (*ndp->ni_next == '/') {
587 		cnp->cn_nameptr = ndp->ni_next;
588 		while (*cnp->cn_nameptr == '/') {
589 			cnp->cn_nameptr++;
590 			ndp->ni_pathlen--;
591 		}
592 		if (ndp->ni_dvp != ndp->ni_vp)
593 			ASSERT_VOP_UNLOCKED(ndp->ni_dvp, "lookup");
594 		vrele(ndp->ni_dvp);
595 		goto dirloop;
596 	}
597 	/*
598 	 * Disallow directory write attempts on read-only filesystems.
599 	 */
600 	if (rdonly &&
601 	    (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) {
602 		error = EROFS;
603 		goto bad2;
604 	}
605 	if (cnp->cn_flags & SAVESTART) {
606 		ndp->ni_startdir = ndp->ni_dvp;
607 		VREF(ndp->ni_startdir);
608 	}
609 	if (!wantparent)
610 		vrele(ndp->ni_dvp);
611 
612 	if ((cnp->cn_flags & LOCKLEAF) == 0)
613 		VOP_UNLOCK(dp, 0, td);
614 	return (0);
615 
616 bad2:
617 	if ((cnp->cn_flags & (LOCKPARENT | PDIRUNLOCK)) == LOCKPARENT &&
618 	    *ndp->ni_next == '\0')
619 		VOP_UNLOCK(ndp->ni_dvp, 0, td);
620 	vrele(ndp->ni_dvp);
621 bad:
622 	if (dpunlocked)
623 		vrele(dp);
624 	else
625 		vput(dp);
626 	ndp->ni_vp = NULL;
627 	return (error);
628 }
629 
630 /*
631  * relookup - lookup a path name component
632  *    Used by lookup to re-aquire things.
633  */
634 int
635 relookup(dvp, vpp, cnp)
636 	struct vnode *dvp, **vpp;
637 	struct componentname *cnp;
638 {
639 	struct thread *td = cnp->cn_thread;
640 	struct vnode *dp = 0;		/* the directory we are searching */
641 	int docache;			/* == 0 do not cache last component */
642 	int wantparent;			/* 1 => wantparent or lockparent flag */
643 	int rdonly;			/* lookup read-only flag bit */
644 	int error = 0;
645 #ifdef NAMEI_DIAGNOSTIC
646 	int newhash;			/* DEBUG: check name hash */
647 	char *cp;			/* DEBUG: check name ptr/len */
648 #endif
649 
650 	/*
651 	 * Setup: break out flag bits into variables.
652 	 */
653 	wantparent = cnp->cn_flags & (LOCKPARENT|WANTPARENT);
654 	docache = (cnp->cn_flags & NOCACHE) ^ NOCACHE;
655 	if (cnp->cn_nameiop == DELETE ||
656 	    (wantparent && cnp->cn_nameiop != CREATE))
657 		docache = 0;
658 	rdonly = cnp->cn_flags & RDONLY;
659 	cnp->cn_flags &= ~ISSYMLINK;
660 	dp = dvp;
661 	vn_lock(dp, LK_EXCLUSIVE | LK_RETRY, td);
662 
663 /* dirloop: */
664 	/*
665 	 * Search a new directory.
666 	 *
667 	 * The last component of the filename is left accessible via
668 	 * cnp->cn_nameptr for callers that need the name. Callers needing
669 	 * the name set the SAVENAME flag. When done, they assume
670 	 * responsibility for freeing the pathname buffer.
671 	 */
672 #ifdef NAMEI_DIAGNOSTIC
673 	if (cnp->cn_namelen != cp - cnp->cn_nameptr)
674 		panic ("relookup: bad len");
675 	if (*cp != 0)
676 		panic("relookup: not last component");
677 	printf("{%s}: ", cnp->cn_nameptr);
678 #endif
679 
680 	/*
681 	 * Check for degenerate name (e.g. / or "")
682 	 * which is a way of talking about a directory,
683 	 * e.g. like "/." or ".".
684 	 */
685 	if (cnp->cn_nameptr[0] == '\0') {
686 		if (cnp->cn_nameiop != LOOKUP || wantparent) {
687 			error = EISDIR;
688 			goto bad;
689 		}
690 		if (dp->v_type != VDIR) {
691 			error = ENOTDIR;
692 			goto bad;
693 		}
694 		if (!(cnp->cn_flags & LOCKLEAF))
695 			VOP_UNLOCK(dp, 0, td);
696 		*vpp = dp;
697 		/* XXX This should probably move to the top of function. */
698 		if (cnp->cn_flags & SAVESTART)
699 			panic("lookup: SAVESTART");
700 		return (0);
701 	}
702 
703 	if (cnp->cn_flags & ISDOTDOT)
704 		panic ("relookup: lookup on dot-dot");
705 
706 	/*
707 	 * We now have a segment name to search for, and a directory to search.
708 	 */
709 	if ((error = VOP_LOOKUP(dp, vpp, cnp)) != 0) {
710 		KASSERT(*vpp == NULL, ("leaf should be empty"));
711 		if (error != EJUSTRETURN)
712 			goto bad;
713 		/*
714 		 * If creating and at end of pathname, then can consider
715 		 * allowing file to be created.
716 		 */
717 		if (rdonly) {
718 			error = EROFS;
719 			goto bad;
720 		}
721 		/* ASSERT(dvp == ndp->ni_startdir) */
722 		if (cnp->cn_flags & SAVESTART)
723 			VREF(dvp);
724 		/*
725 		 * We return with ni_vp NULL to indicate that the entry
726 		 * doesn't currently exist, leaving a pointer to the
727 		 * (possibly locked) directory inode in ndp->ni_dvp.
728 		 */
729 		return (0);
730 	}
731 	dp = *vpp;
732 
733 	/*
734 	 * Check for symbolic link
735 	 */
736 	KASSERT(dp->v_type != VLNK || !(cnp->cn_flags & FOLLOW),
737 	    ("relookup: symlink found.\n"));
738 
739 	/*
740 	 * Disallow directory write attempts on read-only filesystems.
741 	 */
742 	if (rdonly &&
743 	    (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) {
744 		error = EROFS;
745 		goto bad2;
746 	}
747 	/* ASSERT(dvp == ndp->ni_startdir) */
748 	if (cnp->cn_flags & SAVESTART)
749 		VREF(dvp);
750 
751 	if (!wantparent)
752 		vrele(dvp);
753 
754 	if (vn_canvmio(dp) == TRUE &&
755 		((cnp->cn_flags & (NOOBJ|LOCKLEAF)) == LOCKLEAF))
756 		vfs_object_create(dp, td, cnp->cn_cred);
757 
758 	if ((cnp->cn_flags & LOCKLEAF) == 0)
759 		VOP_UNLOCK(dp, 0, td);
760 	return (0);
761 
762 bad2:
763 	if ((cnp->cn_flags & LOCKPARENT) && (cnp->cn_flags & ISLASTCN))
764 		VOP_UNLOCK(dvp, 0, td);
765 	vrele(dvp);
766 bad:
767 	vput(dp);
768 	*vpp = NULL;
769 	return (error);
770 }
771