Commit | Line | Data |
---|---|---|
da7c5cc6 | 1 | /* |
6d0f0ece KM |
2 | * Copyright (c) 1982, 1986, 1989 Regents of the University of California. |
3 | * All rights reserved. | |
da7c5cc6 | 4 | * |
6d0f0ece KM |
5 | * Redistribution and use in source and binary forms are permitted |
6 | * provided that the above copyright notice and this paragraph are | |
7 | * duplicated in all such forms and that any documentation, | |
8 | * advertising materials, and other materials related to such | |
9 | * distribution and use acknowledge that the software was developed | |
10 | * by the University of California, Berkeley. The name of the | |
11 | * University may not be used to endorse or promote products derived | |
12 | * from this software without specific prior written permission. | |
13 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR | |
14 | * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED | |
15 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. | |
16 | * | |
dd4eee4b | 17 | * @(#)vfs_lookup.c 7.19 (Berkeley) %G% |
da7c5cc6 | 18 | */ |
10873320 | 19 | |
94368568 | 20 | #include "param.h" |
6d0f0ece KM |
21 | #include "time.h" |
22 | #include "namei.h" | |
23 | #include "vnode.h" | |
94368568 | 24 | #include "mount.h" |
6d0f0ece | 25 | #include "errno.h" |
c3a74062 | 26 | #include "malloc.h" |
6d0f0ece | 27 | |
658f5fdc | 28 | #ifdef KTRACE |
6d0f0ece | 29 | #include "user.h" |
658f5fdc MT |
30 | #include "proc.h" |
31 | #include "ktrace.h" | |
32 | #endif | |
10873320 BJ |
33 | |
34 | /* | |
7f69b0e6 | 35 | * Convert a pathname into a pointer to a locked inode. |
6bd0bb92 | 36 | * This is a very central and rather complicated routine. |
7f69b0e6 | 37 | * |
6d0f0ece KM |
38 | * The flag argument is LOOKUP, CREATE, RENAME, or DELETE depending on |
39 | * whether the name is to be looked up, created, renamed, or deleted. | |
40 | * When CREATE, RENAME, or DELETE is specified, information usable in | |
41 | * creating, renaming, or deleting a directory entry may be calculated. | |
42 | * If flag has LOCKPARENT or'ed into it and the target of the pathname | |
43 | * exists, namei returns both the target and its parent directory locked. | |
44 | * When creating or renaming and LOCKPARENT is specified, the target may not | |
45 | * be ".". When deleting and LOCKPARENT is specified, the target may be ".". | |
4f083fd7 | 46 | * |
d870be74 | 47 | * The FOLLOW flag is set when symbolic links are to be followed |
4f083fd7 | 48 | * when they occur at the end of the name translation process. |
7f69b0e6 KM |
49 | * Symbolic links are always followed for all other pathname |
50 | * components other than the last. | |
51 | * | |
52 | * The segflg defines whether the name is to be copied from user | |
53 | * space or kernel space. | |
10873320 | 54 | * |
f93197fc | 55 | * Overall outline of namei: |
6bd0bb92 BJ |
56 | * |
57 | * copy in name | |
58 | * get starting directory | |
59 | * dirloop: | |
d870be74 | 60 | * copy next component of name to ndp->ni_dent |
6bd0bb92 | 61 | * handle degenerate case where name is null string |
6d0f0ece KM |
62 | * if .. and on mounted filesys, find parent |
63 | * call lookup routine for next component name | |
64 | * directory vnode returned in ni_dvp, unlocked unless LOCKPARENT set | |
65 | * component vnode returned in ni_vp (if it exists), locked. | |
6bd0bb92 | 66 | * if symbolic link, massage name in buffer and continue at dirloop |
6d0f0ece | 67 | * if result inode is mounted on, find mounted on vnode |
6bd0bb92 | 68 | * if more components of name, do next level at dirloop |
6d0f0ece KM |
69 | * return the answer in ni_vp as locked vnode; |
70 | * if LOCKPARENT set, return locked parent in ni_dvp | |
4f083fd7 | 71 | * |
6d0f0ece | 72 | * NOTE: (LOOKUP | LOCKPARENT) currently returns the parent vnode unlocked. |
10873320 | 73 | */ |
d870be74 KM |
74 | namei(ndp) |
75 | register struct nameidata *ndp; | |
10873320 | 76 | { |
6bd0bb92 | 77 | register char *cp; /* pointer into pathname argument */ |
6d0f0ece KM |
78 | register struct vnode *dp = 0; /* the directory we are searching */ |
79 | register int i; /* Temp counter */ | |
80 | struct vnode *tdp; /* saved dp */ | |
81 | struct mount *mp; /* mount table entry */ | |
87c05e6e | 82 | int docache; /* == 0 do not cache last component */ |
6d0f0ece KM |
83 | int flag; /* LOOKUP, CREATE, RENAME or DELETE */ |
84 | int wantparent; /* 1 => wantparent or lockparent flag */ | |
206be3f9 | 85 | int lockparent; /* 1 => lockparent flag */ |
6d0f0ece | 86 | int error = 0; |
10873320 | 87 | |
dd4eee4b | 88 | ndp->ni_dvp = NULL; |
6d0f0ece KM |
89 | flag = ndp->ni_nameiop & OPFLAG; |
90 | wantparent = ndp->ni_nameiop & (LOCKPARENT|WANTPARENT); | |
206be3f9 | 91 | lockparent = ndp->ni_nameiop & LOCKPARENT; |
d870be74 | 92 | docache = (ndp->ni_nameiop & NOCACHE) ^ NOCACHE; |
6d0f0ece | 93 | if (flag == DELETE || wantparent) |
f93197fc | 94 | docache = 0; |
f5039631 | 95 | /* |
6bd0bb92 BJ |
96 | * Get a buffer for the name to be translated, and copy the |
97 | * name into the buffer. | |
f5039631 | 98 | */ |
6d0f0ece | 99 | MALLOC(ndp->ni_pnbuf, caddr_t, MAXPATHLEN, M_NAMEI, M_WAITOK); |
d870be74 | 100 | if (ndp->ni_segflg == UIO_SYSSPACE) |
6d0f0ece KM |
101 | error = copystr(ndp->ni_dirp, ndp->ni_pnbuf, MAXPATHLEN, |
102 | &ndp->ni_pathlen); | |
d870be74 | 103 | else |
6d0f0ece KM |
104 | error = copyinstr(ndp->ni_dirp, ndp->ni_pnbuf, MAXPATHLEN, |
105 | &ndp->ni_pathlen); | |
d870be74 | 106 | if (error) { |
6d0f0ece | 107 | free(ndp->ni_pnbuf, M_NAMEI); |
51610be6 | 108 | ndp->ni_vp = NULL; |
6d0f0ece | 109 | return (error); |
d870be74 | 110 | } |
6d0f0ece KM |
111 | ndp->ni_ptr = ndp->ni_pnbuf; |
112 | ndp->ni_loopcnt = 0; | |
113 | dp = ndp->ni_cdir; | |
8fe1c702 | 114 | VREF(dp); |
658f5fdc MT |
115 | #ifdef KTRACE |
116 | if (KTRPOINT(u.u_procp, KTR_NAMEI)) | |
6d0f0ece | 117 | ktrnamei(u.u_procp->p_tracep, ndp->ni_pnbuf); |
658f5fdc | 118 | #endif |
6bd0bb92 | 119 | |
6d0f0ece | 120 | start: |
10873320 | 121 | /* |
6bd0bb92 | 122 | * Get starting directory. |
6d0f0ece | 123 | * Done at start of translation and after symbolic link. |
10873320 | 124 | */ |
6d0f0ece KM |
125 | if (*ndp->ni_ptr == '/') { |
126 | vrele(dp); | |
127 | while (*ndp->ni_ptr == '/') { | |
128 | ndp->ni_ptr++; | |
129 | ndp->ni_pathlen--; | |
130 | } | |
131 | if ((dp = ndp->ni_rdir) == NULL) | |
10873320 | 132 | dp = rootdir; |
8fe1c702 | 133 | VREF(dp); |
6d0f0ece KM |
134 | } |
135 | VOP_LOCK(dp); | |
9e7c949b | 136 | ndp->ni_endoff = 0; |
6bd0bb92 | 137 | |
10873320 | 138 | /* |
6bd0bb92 | 139 | * We come to dirloop to search a new directory. |
10873320 | 140 | */ |
6bd0bb92 | 141 | dirloop: |
6bd0bb92 | 142 | /* |
d870be74 | 143 | * Copy next component of name to ndp->ni_dent. |
6d0f0ece KM |
144 | * XXX kern_exec looks at d_name |
145 | * ??? The ni_hash value may be useful for vfs_cache | |
146 | * XXX There must be the last component of the filename left | |
147 | * somewhere accessible via. ndp for NFS (and any other stateless file | |
148 | * systems) in case they are doing a CREATE. The "Towards a..." noted | |
149 | * that ni_ptr would be left pointing to the last component, but since | |
150 | * the ni_pnbuf gets free'd, that is not a good idea. | |
6bd0bb92 | 151 | */ |
26ae96bd KM |
152 | #ifdef notdef |
153 | for (cp = ndp->ni_ptr; *cp != 0 && *cp != '/'; cp++) { | |
154 | if ((*cp & 0200) == 0) | |
155 | continue; | |
156 | if ((*cp&0377) == ('/'|0200) || flag != DELETE) { | |
157 | error = EINVAL; | |
158 | goto bad; | |
159 | } | |
160 | } | |
161 | ndp->ni_namelen = cp - ndp->ni_ptr; | |
162 | if (ndp->ni_namelen >= MAXNAMLEN) { | |
163 | error = ENAMETOOLONG; | |
164 | goto bad; | |
165 | } | |
166 | ndp->ni_pathlen -= ndp->ni_namelen; | |
167 | #ifdef NAMEI_DIAGNOSTIC | |
168 | { char c = *cp; | |
169 | *cp = '\0'; | |
170 | printf("{%s}: ", ndp->ni_ptr); | |
171 | *cp = c; } | |
172 | #endif | |
173 | #else fornow | |
6d0f0ece KM |
174 | ndp->ni_hash = 0; |
175 | for (cp = ndp->ni_ptr, i = 0; *cp != 0 && *cp != '/'; cp++) { | |
6459ebe0 | 176 | if (i >= MAXNAMLEN) { |
6d0f0ece | 177 | error = ENAMETOOLONG; |
d870be74 KM |
178 | goto bad; |
179 | } | |
067da729 KM |
180 | if (*cp & 0200) |
181 | if ((*cp&0377) == ('/'|0200) || flag != DELETE) { | |
6d0f0ece | 182 | error = EINVAL; |
067da729 KM |
183 | goto bad; |
184 | } | |
d870be74 | 185 | ndp->ni_dent.d_name[i++] = *cp; |
6d0f0ece | 186 | ndp->ni_hash += (unsigned char)*cp * i; |
6459ebe0 | 187 | } |
6d0f0ece | 188 | ndp->ni_namelen = i; |
d870be74 KM |
189 | ndp->ni_dent.d_namlen = i; |
190 | ndp->ni_dent.d_name[i] = '\0'; | |
6d0f0ece KM |
191 | ndp->ni_pathlen -= i; |
192 | #ifdef NAMEI_DIAGNOSTIC | |
193 | printf("{%s}: ", ndp->ni_dent.d_name); | |
194 | #endif | |
26ae96bd | 195 | #endif fornow |
6d0f0ece KM |
196 | ndp->ni_next = cp; |
197 | ndp->ni_makeentry = 1; | |
87c05e6e | 198 | if (*cp == '\0' && docache == 0) |
6d0f0ece KM |
199 | ndp->ni_makeentry = 0; |
200 | ndp->ni_isdotdot = (ndp->ni_namelen == 2 && | |
201 | ndp->ni_dent.d_name[1] == '.' && ndp->ni_dent.d_name[0] == '.'); | |
6bd0bb92 BJ |
202 | |
203 | /* | |
204 | * Check for degenerate name (e.g. / or "") | |
205 | * which is a way of talking about a directory, | |
206 | * e.g. like "/." or ".". | |
207 | */ | |
6d0f0ece KM |
208 | if (ndp->ni_ptr[0] == '\0') { |
209 | if (flag != LOOKUP || wantparent) { | |
210 | error = EISDIR; | |
6bd0bb92 | 211 | goto bad; |
f5039631 | 212 | } |
6d0f0ece KM |
213 | free(ndp->ni_pnbuf, M_NAMEI); |
214 | if (!(ndp->ni_nameiop & LOCKLEAF)) | |
215 | VOP_UNLOCK(dp); | |
216 | ndp->ni_vp = dp; | |
217 | return (0); | |
f5039631 | 218 | } |
6bd0bb92 | 219 | |
e47da406 | 220 | /* |
6d0f0ece KM |
221 | * Handle "..": two special cases. |
222 | * 1. If at root directory (e.g. after chroot) | |
223 | * then ignore it so can't get out. | |
224 | * 2. If this vnode is the root of a mounted | |
225 | * file system, then replace it with the | |
226 | * vnode which was mounted on so we take the | |
227 | * .. in the other file system. | |
e47da406 | 228 | */ |
6d0f0ece | 229 | if (ndp->ni_isdotdot) { |
e47da406 | 230 | for (;;) { |
6d0f0ece KM |
231 | if (dp == ndp->ni_rdir || dp == rootdir) { |
232 | ndp->ni_dvp = dp; | |
7655c64a | 233 | ndp->ni_vp = dp; |
8fe1c702 | 234 | VREF(dp); |
6d0f0ece | 235 | goto nextname; |
e47da406 | 236 | } |
6d0f0ece | 237 | if ((dp->v_flag & VROOT) == 0) |
e47da406 | 238 | break; |
6d0f0ece KM |
239 | tdp = dp; |
240 | dp = dp->v_mount->m_vnodecovered; | |
241 | vput(tdp); | |
8fe1c702 | 242 | VREF(dp); |
7655c64a | 243 | VOP_LOCK(dp); |
e47da406 KM |
244 | } |
245 | } | |
246 | ||
f93197fc KM |
247 | /* |
248 | * We now have a segment name to search for, and a directory to search. | |
6459ebe0 | 249 | */ |
6d0f0ece KM |
250 | if (error = VOP_LOOKUP(dp, ndp)) { |
251 | if (ndp->ni_vp != NULL) | |
252 | panic("leaf should be empty"); | |
658f5fdc | 253 | #ifdef NAMEI_DIAGNOSTIC |
6d0f0ece | 254 | printf("not found\n"); |
658f5fdc | 255 | #endif |
1f6ef9f5 KM |
256 | if (flag == LOOKUP || flag == DELETE || |
257 | error != ENOENT || *cp != 0) | |
258 | goto bad; | |
f5039631 | 259 | /* |
6d0f0ece KM |
260 | * If creating and at end of pathname, then can consider |
261 | * allowing file to be created. | |
f5039631 | 262 | */ |
1f6ef9f5 | 263 | if (ndp->ni_dvp->v_mount->m_flag & M_RDONLY) { |
6d0f0ece | 264 | error = EROFS; |
6bd0bb92 | 265 | goto bad; |
1f6ef9f5 | 266 | } |
f5039631 | 267 | /* |
6d0f0ece KM |
268 | * We return with ni_vp NULL to indicate that the entry |
269 | * doesn't currently exist, leaving a pointer to the | |
270 | * (possibly locked) directory inode in ndp->ni_dvp. | |
f5039631 | 271 | */ |
6d0f0ece KM |
272 | FREE(ndp->ni_pnbuf, M_NAMEI); |
273 | return (0); /* should this be ENOENT? */ | |
6bd0bb92 | 274 | } |
658f5fdc | 275 | #ifdef NAMEI_DIAGNOSTIC |
6d0f0ece | 276 | printf("found\n"); |
658f5fdc | 277 | #endif |
6bd0bb92 BJ |
278 | |
279 | /* | |
6d0f0ece | 280 | * Check for symbolic link |
4f083fd7 | 281 | */ |
6d0f0ece KM |
282 | dp = ndp->ni_vp; |
283 | if ((dp->v_type == VLNK) && | |
284 | ((ndp->ni_nameiop & FOLLOW) || *ndp->ni_next == '/')) { | |
285 | struct iovec aiov; | |
286 | struct uio auio; | |
287 | int linklen; | |
288 | ||
289 | if (++ndp->ni_loopcnt > MAXSYMLINKS) { | |
290 | error = ELOOP; | |
291 | goto bad2; | |
4f083fd7 | 292 | } |
0607f104 | 293 | if (ndp->ni_pathlen > 1) |
6d0f0ece KM |
294 | MALLOC(cp, char *, MAXPATHLEN, M_NAMEI, M_WAITOK); |
295 | else | |
296 | cp = ndp->ni_pnbuf; | |
297 | aiov.iov_base = cp; | |
298 | aiov.iov_len = MAXPATHLEN; | |
299 | auio.uio_iov = &aiov; | |
300 | auio.uio_iovcnt = 1; | |
301 | auio.uio_offset = 0; | |
302 | auio.uio_rw = UIO_READ; | |
303 | auio.uio_segflg = UIO_SYSSPACE; | |
304 | auio.uio_resid = MAXPATHLEN; | |
305 | if (error = VOP_READLINK(dp, &auio, ndp->ni_cred)) { | |
0607f104 | 306 | if (ndp->ni_pathlen > 1) |
6d0f0ece | 307 | free(cp, M_NAMEI); |
bde63aa5 | 308 | goto bad2; |
6d0f0ece KM |
309 | } |
310 | linklen = MAXPATHLEN - auio.uio_resid; | |
311 | if (linklen + ndp->ni_pathlen >= MAXPATHLEN) { | |
0607f104 | 312 | if (ndp->ni_pathlen > 1) |
6d0f0ece KM |
313 | free(cp, M_NAMEI); |
314 | error = ENAMETOOLONG; | |
bde63aa5 | 315 | goto bad2; |
f93197fc | 316 | } |
0607f104 KM |
317 | if (ndp->ni_pathlen > 1) { |
318 | bcopy(ndp->ni_next, cp + linklen, ndp->ni_pathlen); | |
6d0f0ece KM |
319 | FREE(ndp->ni_pnbuf, M_NAMEI); |
320 | ndp->ni_pnbuf = cp; | |
206be3f9 | 321 | } else |
0607f104 | 322 | ndp->ni_pnbuf[linklen] = '\0'; |
6d0f0ece | 323 | ndp->ni_ptr = cp; |
6d0f0ece KM |
324 | vput(dp); |
325 | dp = ndp->ni_dvp; | |
ff4672c1 | 326 | if (lockparent && ndp->ni_pathlen == 1) |
206be3f9 | 327 | VOP_UNLOCK(dp); |
ff4672c1 | 328 | ndp->ni_pathlen += linklen; |
6d0f0ece | 329 | goto start; |
f93197fc KM |
330 | } |
331 | ||
6bd0bb92 | 332 | /* |
6d0f0ece KM |
333 | * Check to see if the vnode has been mounted on; |
334 | * if so find the root of the mounted file system. | |
6bd0bb92 | 335 | */ |
6d0f0ece KM |
336 | mntloop: |
337 | while (dp->v_type == VDIR && (mp = dp->v_mountedhere)) { | |
338 | while(mp->m_flag & M_MLOCK) { | |
339 | mp->m_flag |= M_MWAIT; | |
340 | sleep((caddr_t)mp, PVFS); | |
341 | goto mntloop; | |
6bd0bb92 | 342 | } |
6d0f0ece KM |
343 | error = VFS_ROOT(dp->v_mountedhere, &tdp); |
344 | if (error) | |
6bd0bb92 | 345 | goto bad2; |
6d0f0ece KM |
346 | vput(dp); |
347 | ndp->ni_vp = dp = tdp; | |
10873320 | 348 | } |
6bd0bb92 | 349 | |
6d0f0ece | 350 | nextname: |
10873320 | 351 | /* |
6bd0bb92 BJ |
352 | * Not a symbolic link. If more pathname, |
353 | * continue at next component, else return. | |
10873320 | 354 | */ |
6d0f0ece KM |
355 | ndp->ni_ptr = ndp->ni_next; |
356 | if (*ndp->ni_ptr == '/') { | |
357 | while (*ndp->ni_ptr == '/') { | |
358 | ndp->ni_ptr++; | |
359 | ndp->ni_pathlen--; | |
6bd0bb92 | 360 | } |
6d0f0ece KM |
361 | vrele(ndp->ni_dvp); |
362 | goto dirloop; | |
6bd0bb92 BJ |
363 | } |
364 | /* | |
01633fea | 365 | * Check for read-only file systems. |
6bd0bb92 | 366 | */ |
01633fea | 367 | if (flag == DELETE || flag == RENAME) { |
dfc0e8dd | 368 | /* |
01633fea KM |
369 | * Disallow directory write attempts on read-only |
370 | * file systems. | |
dfc0e8dd | 371 | */ |
01633fea KM |
372 | if ((dp->v_mount->m_flag & M_RDONLY) || |
373 | (wantparent && (ndp->ni_dvp->v_mount->m_flag & M_RDONLY))) { | |
dfc0e8dd KM |
374 | error = EROFS; |
375 | goto bad2; | |
376 | } | |
377 | } | |
6d0f0ece KM |
378 | if (!wantparent) |
379 | vrele(ndp->ni_dvp); | |
380 | if ((ndp->ni_nameiop & LOCKLEAF) == 0) | |
381 | VOP_UNLOCK(dp); | |
382 | FREE(ndp->ni_pnbuf, M_NAMEI); | |
383 | return (0); | |
4f083fd7 | 384 | |
6d0f0ece | 385 | bad2: |
206be3f9 KM |
386 | if (lockparent && *ndp->ni_next == '\0') |
387 | VOP_UNLOCK(ndp->ni_dvp); | |
6d0f0ece KM |
388 | vrele(ndp->ni_dvp); |
389 | bad: | |
390 | vput(dp); | |
391 | ndp->ni_vp = NULL; | |
392 | FREE(ndp->ni_pnbuf, M_NAMEI); | |
b1aa93b9 KM |
393 | return (error); |
394 | } |