xref: /netbsd-src/sys/fs/udf/udf_rename.c (revision 002d97bff0c8a01a572600e42b4958b0d5a71708)
1*002d97bfSthorpej /* $NetBSD: udf_rename.c,v 1.16 2024/05/18 00:04:01 thorpej Exp $ */
2a7795a09Sreinoud 
3a7795a09Sreinoud /*
4a7795a09Sreinoud  * Copyright (c) 2013 Reinoud Zandijk
5a7795a09Sreinoud  * All rights reserved.
6a7795a09Sreinoud  *
7a7795a09Sreinoud  * Redistribution and use in source and binary forms, with or without
8a7795a09Sreinoud  * modification, are permitted provided that the following conditions
9a7795a09Sreinoud  * are met:
10a7795a09Sreinoud  * 1. Redistributions of source code must retain the above copyright
11a7795a09Sreinoud  *    notice, this list of conditions and the following disclaimer.
12a7795a09Sreinoud  * 2. Redistributions in binary form must reproduce the above copyright
13a7795a09Sreinoud  *    notice, this list of conditions and the following disclaimer in the
14a7795a09Sreinoud  *    documentation and/or other materials provided with the distribution.
15a7795a09Sreinoud  *
16a7795a09Sreinoud  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17a7795a09Sreinoud  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18a7795a09Sreinoud  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19a7795a09Sreinoud  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20a7795a09Sreinoud  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21a7795a09Sreinoud  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22a7795a09Sreinoud  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23a7795a09Sreinoud  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24a7795a09Sreinoud  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25a7795a09Sreinoud  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26a7795a09Sreinoud  *
27a7795a09Sreinoud  * Comments and trivial code from the reference implementation in tmpfs.
28a7795a09Sreinoud  */
29a7795a09Sreinoud 
30a7795a09Sreinoud #include <sys/cdefs.h>
31*002d97bfSthorpej __KERNEL_RCSID(0, "$NetBSD: udf_rename.c,v 1.16 2024/05/18 00:04:01 thorpej Exp $");
32a7795a09Sreinoud 
33a7795a09Sreinoud #include <sys/param.h>
34a7795a09Sreinoud #include <sys/errno.h>
35a7795a09Sreinoud #include <sys/kauth.h>
36a7795a09Sreinoud #include <sys/mount.h>
37a7795a09Sreinoud #include <sys/namei.h>
38a7795a09Sreinoud #include <sys/stat.h>
39a7795a09Sreinoud #include <sys/dirent.h>
40a7795a09Sreinoud #include <sys/vnode.h>
41a7795a09Sreinoud #include <sys/vnode_if.h>
42a7795a09Sreinoud 
43a7795a09Sreinoud #include <miscfs/genfs/genfs.h>
44a7795a09Sreinoud 
45a7795a09Sreinoud #include <fs/udf/ecma167-udf.h>
46a7795a09Sreinoud #include <fs/udf/udf_mount.h>
47a7795a09Sreinoud #include <sys/dirhash.h>
48a7795a09Sreinoud 
49a7795a09Sreinoud #include "udf.h"
50a7795a09Sreinoud #include "udf_subr.h"
51a7795a09Sreinoud #include "udf_bswap.h"
52a7795a09Sreinoud 
53a7795a09Sreinoud 
54a7795a09Sreinoud /* forwards */
55a7795a09Sreinoud static int udf_sane_rename( struct vnode *, struct componentname *,
56a7795a09Sreinoud     struct vnode *, struct componentname *,
57a7795a09Sreinoud     kauth_cred_t, bool);
58a7795a09Sreinoud static bool udf_rmdired_p(struct vnode *);
59a7795a09Sreinoud static int udf_gro_lock_directory(struct mount *, struct vnode *);
60a7795a09Sreinoud 
61a7795a09Sreinoud static const struct genfs_rename_ops udf_genfs_rename_ops;
62a7795a09Sreinoud 
63a7795a09Sreinoud 
64a7795a09Sreinoud #define VTOI(vnode) ((struct udf_node *) (vnode)->v_data)
65a7795a09Sreinoud 
66a7795a09Sreinoud 
67a7795a09Sreinoud /*
68a7795a09Sreinoud  * udf_sane_rename: The hairiest vop, with the saner API.
69a7795a09Sreinoud  *
70a7795a09Sreinoud  * Arguments:
71a7795a09Sreinoud  *
72a7795a09Sreinoud  * . fdvp (from directory vnode),
73a7795a09Sreinoud  * . fcnp (from component name),
74a7795a09Sreinoud  * . tdvp (to directory vnode),
75a7795a09Sreinoud  * . tcnp (to component name),
76a7795a09Sreinoud  * . cred (credentials structure), and
77a7795a09Sreinoud  * . posixly_correct (flag for behaviour if target & source link same file).
78a7795a09Sreinoud  *
79a7795a09Sreinoud  * fdvp and tdvp may be the same, and must be referenced and unlocked.
80a7795a09Sreinoud  */
81a7795a09Sreinoud static int
udf_sane_rename(struct vnode * fdvp,struct componentname * fcnp,struct vnode * tdvp,struct componentname * tcnp,kauth_cred_t cred,bool posixly_correct)82a7795a09Sreinoud udf_sane_rename( struct vnode *fdvp, struct componentname *fcnp,
83a7795a09Sreinoud     struct vnode *tdvp, struct componentname *tcnp,
84a7795a09Sreinoud     kauth_cred_t cred, bool posixly_correct)
85a7795a09Sreinoud {
86a7795a09Sreinoud 	DPRINTF(CALL, ("udf_sane_rename '%s' -> '%s'\n",
87a7795a09Sreinoud 		fcnp->cn_nameptr, tcnp->cn_nameptr));
88a7795a09Sreinoud 	return genfs_sane_rename(&udf_genfs_rename_ops,
89da865624Sreinoud 	    fdvp, fcnp, NULL, tdvp, tcnp, NULL,
90a7795a09Sreinoud 	    cred, posixly_correct);
91a7795a09Sreinoud }
92a7795a09Sreinoud 
93a7795a09Sreinoud 
94a7795a09Sreinoud /*
95a7795a09Sreinoud  * udf_rename: the hairiest vop, with the insanest API. Pass to
96a7795a09Sreinoud  * genfs_insane_rename immediately.
97a7795a09Sreinoud  */
98a7795a09Sreinoud int
udf_rename(void * v)99a7795a09Sreinoud udf_rename(void *v)
100a7795a09Sreinoud {
101a7795a09Sreinoud 	struct vop_rename_args /* {
102a7795a09Sreinoud 		struct vnode *a_fdvp;
103a7795a09Sreinoud 		struct vnode *a_fvp;
104a7795a09Sreinoud 		struct componentname *a_fcnp;
105a7795a09Sreinoud 		struct vnode *a_tdvp;
106a7795a09Sreinoud 		struct vnode *a_tvp;
107a7795a09Sreinoud 		struct componentname *a_tcnp;
108a7795a09Sreinoud 	} */ *ap = v;
109a7795a09Sreinoud 	DPRINTF(CALL, ("udf_rename called\n"));
110a7795a09Sreinoud 	return genfs_insane_rename(ap, &udf_sane_rename);
111a7795a09Sreinoud }
112a7795a09Sreinoud 
113a7795a09Sreinoud 
114a7795a09Sreinoud /*
115a7795a09Sreinoud  * udf_gro_directory_empty_p: return true if the directory vp is empty. dvp is
116a7795a09Sreinoud  * its parent.
117a7795a09Sreinoud  *
118a7795a09Sreinoud  * vp and dvp must be locked and referenced.
119a7795a09Sreinoud  */
120a7795a09Sreinoud static bool
udf_gro_directory_empty_p(struct mount * mp,kauth_cred_t cred,struct vnode * vp,struct vnode * dvp)121a7795a09Sreinoud udf_gro_directory_empty_p(struct mount *mp, kauth_cred_t cred,
122a7795a09Sreinoud     struct vnode *vp, struct vnode *dvp)
123a7795a09Sreinoud {
124a7795a09Sreinoud 	struct udf_node *udf_node = VTOI(vp);
125a7795a09Sreinoud 	int error, isempty;
126a7795a09Sreinoud 
127a7795a09Sreinoud 	KASSERT(mp != NULL);
128a7795a09Sreinoud 	KASSERT(vp != NULL);
129a7795a09Sreinoud 	KASSERT(dvp != NULL);
130a7795a09Sreinoud 	KASSERT(vp != dvp);
131a7795a09Sreinoud 	KASSERT(vp->v_mount == mp);
132a7795a09Sreinoud 	KASSERT(dvp->v_mount == mp);
133a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(vp) == LK_EXCLUSIVE);
134a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(dvp) == LK_EXCLUSIVE);
135a7795a09Sreinoud 
136a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_directory_empty_p called\n"));
137a7795a09Sreinoud 	/* make sure our `leaf' node's hash is populated */
138a7795a09Sreinoud 	dirhash_get(&udf_node->dir_hash);
139a7795a09Sreinoud 	error = udf_dirhash_fill(udf_node);
140a7795a09Sreinoud 	if (error) {
141a7795a09Sreinoud 		dirhash_put(udf_node->dir_hash);
1428ad309e6Sreinoud 		/* VERY unlikely, answer its not empty */
1438ad309e6Sreinoud 		return 0;
144a7795a09Sreinoud 	}
145a7795a09Sreinoud 
146a7795a09Sreinoud 	/* check to see if the directory is empty */
147a7795a09Sreinoud 	isempty = dirhash_dir_isempty(udf_node->dir_hash);
148a7795a09Sreinoud 	dirhash_put(udf_node->dir_hash);
149a7795a09Sreinoud 
150a7795a09Sreinoud 	return isempty;
151a7795a09Sreinoud }
152a7795a09Sreinoud 
153a7795a09Sreinoud 
154a7795a09Sreinoud /*
155a7795a09Sreinoud  * udf_gro_rename_check_possible: check whether a rename is possible
156a7795a09Sreinoud  * independent of credentials.
157a7795a09Sreinoud  */
158a7795a09Sreinoud static int
udf_gro_rename_check_possible(struct mount * mp,struct vnode * fdvp,struct vnode * fvp,struct vnode * tdvp,struct vnode * tvp)159a7795a09Sreinoud udf_gro_rename_check_possible(struct mount *mp,
160a7795a09Sreinoud     struct vnode *fdvp, struct vnode *fvp,
161a7795a09Sreinoud     struct vnode *tdvp, struct vnode *tvp)
162a7795a09Sreinoud {
163a7795a09Sreinoud 	(void)mp;
164a7795a09Sreinoud 	KASSERT(mp != NULL);
165a7795a09Sreinoud 	KASSERT(fdvp != NULL);
166a7795a09Sreinoud 	KASSERT(fvp != NULL);
167a7795a09Sreinoud 	KASSERT(tdvp != NULL);
168a7795a09Sreinoud 	KASSERT(fdvp != fvp);
169a7795a09Sreinoud 	KASSERT(fdvp != tvp);
170a7795a09Sreinoud 	KASSERT(tdvp != fvp);
171a7795a09Sreinoud 	KASSERT(tdvp != tvp);
172a7795a09Sreinoud 	KASSERT(fvp != tvp);
173a7795a09Sreinoud 	KASSERT(fdvp->v_type == VDIR);
174a7795a09Sreinoud 	KASSERT(tdvp->v_type == VDIR);
175a7795a09Sreinoud 	KASSERT(fdvp->v_mount == mp);
176a7795a09Sreinoud 	KASSERT(fvp->v_mount == mp);
177a7795a09Sreinoud 	KASSERT(tdvp->v_mount == mp);
178a7795a09Sreinoud 	KASSERT((tvp == NULL) || (tvp->v_mount == mp));
179a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(fdvp) == LK_EXCLUSIVE);
180a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(fvp) == LK_EXCLUSIVE);
181a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(tdvp) == LK_EXCLUSIVE);
182a7795a09Sreinoud 	KASSERT((tvp == NULL) || (VOP_ISLOCKED(tvp) == LK_EXCLUSIVE));
183a7795a09Sreinoud 
184a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_rename_check_possible called\n"));
185a7795a09Sreinoud 
186a7795a09Sreinoud 	/* flags not implemented since they are not defined (yet) in UDF */
187a7795a09Sreinoud 	return 0;
188a7795a09Sreinoud }
189a7795a09Sreinoud 
190a7795a09Sreinoud 
191a7795a09Sreinoud /*
192a7795a09Sreinoud  * udf_gro_rename_check_permitted: check whether a rename is permitted given
193a7795a09Sreinoud  * our credentials.
194a7795a09Sreinoud  */
195a7795a09Sreinoud static int
udf_gro_rename_check_permitted(struct mount * mp,kauth_cred_t cred,struct vnode * fdvp,struct vnode * fvp,struct vnode * tdvp,struct vnode * tvp)196a7795a09Sreinoud udf_gro_rename_check_permitted(struct mount *mp, kauth_cred_t cred,
197a7795a09Sreinoud     struct vnode *fdvp, struct vnode *fvp,
198a7795a09Sreinoud     struct vnode *tdvp, struct vnode *tvp)
199a7795a09Sreinoud {
200a7795a09Sreinoud 	struct udf_node *fdir_node = VTOI(fdvp);
201a7795a09Sreinoud 	struct udf_node *tdir_node = VTOI(tdvp);
202a7795a09Sreinoud 	struct udf_node *f_node = VTOI(fvp);
203a7795a09Sreinoud 	struct udf_node *t_node = (tvp? VTOI(tvp): NULL);
204a7795a09Sreinoud 	mode_t fdmode, tdmode;
205a7795a09Sreinoud 	uid_t fduid, tduid, fuid, tuid;
206a7795a09Sreinoud 	gid_t gdummy;
207a7795a09Sreinoud 
208a7795a09Sreinoud 	(void)mp;
209a7795a09Sreinoud 	KASSERT(mp != NULL);
210a7795a09Sreinoud 	KASSERT(fdvp != NULL);
211a7795a09Sreinoud 	KASSERT(fvp != NULL);
212a7795a09Sreinoud 	KASSERT(tdvp != NULL);
213a7795a09Sreinoud 	KASSERT(fdvp != fvp);
214a7795a09Sreinoud 	KASSERT(fdvp != tvp);
215a7795a09Sreinoud 	KASSERT(tdvp != fvp);
216a7795a09Sreinoud 	KASSERT(tdvp != tvp);
217a7795a09Sreinoud 	KASSERT(fvp != tvp);
218a7795a09Sreinoud 	KASSERT(fdvp->v_type == VDIR);
219a7795a09Sreinoud 	KASSERT(tdvp->v_type == VDIR);
220a7795a09Sreinoud 	KASSERT(fdvp->v_mount == mp);
221a7795a09Sreinoud 	KASSERT(fvp->v_mount == mp);
222a7795a09Sreinoud 	KASSERT(tdvp->v_mount == mp);
223a7795a09Sreinoud 	KASSERT((tvp == NULL) || (tvp->v_mount == mp));
224a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(fdvp) == LK_EXCLUSIVE);
225a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(fvp) == LK_EXCLUSIVE);
226a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(tdvp) == LK_EXCLUSIVE);
227a7795a09Sreinoud 	KASSERT((tvp == NULL) || (VOP_ISLOCKED(tvp) == LK_EXCLUSIVE));
228a7795a09Sreinoud 
229a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_rename_check_permitted called\n"));
230a7795a09Sreinoud 	fdmode = udf_getaccessmode(fdir_node);
231a7795a09Sreinoud 	tdmode = udf_getaccessmode(tdir_node);
232a7795a09Sreinoud 
233a7795a09Sreinoud 	udf_getownership(fdir_node, &fduid, &gdummy);
234a7795a09Sreinoud 	udf_getownership(tdir_node, &tduid, &gdummy);
235a7795a09Sreinoud 	udf_getownership(f_node,    &fuid, &gdummy);
236a7795a09Sreinoud 
237a7795a09Sreinoud 	tuid = 0;
238a7795a09Sreinoud 	if (t_node)
239a7795a09Sreinoud 		udf_getownership(t_node, &tuid, &gdummy);
240a7795a09Sreinoud 
241a7795a09Sreinoud 	return genfs_ufslike_rename_check_permitted(cred,
242a7795a09Sreinoud 	    fdvp, fdmode, fduid,
243a7795a09Sreinoud 	    fvp,  fuid,
244a7795a09Sreinoud 	    tdvp, tdmode, tduid,
245a7795a09Sreinoud 	    tvp,  tuid);
246a7795a09Sreinoud }
247a7795a09Sreinoud 
248a7795a09Sreinoud 
249a7795a09Sreinoud /*
250a7795a09Sreinoud  * udf_gro_remove_check_possible: check whether a remove is possible
251a7795a09Sreinoud  * independent of credentials.
252a7795a09Sreinoud  *
253a7795a09Sreinoud  * XXX could check for special attributes?
254a7795a09Sreinoud  */
255a7795a09Sreinoud static int
udf_gro_remove_check_possible(struct mount * mp,struct vnode * dvp,struct vnode * vp)256a7795a09Sreinoud udf_gro_remove_check_possible(struct mount *mp,
257a7795a09Sreinoud     struct vnode *dvp, struct vnode *vp)
258a7795a09Sreinoud {
259a7795a09Sreinoud 	(void)mp;
260a7795a09Sreinoud 	KASSERT(mp != NULL);
261a7795a09Sreinoud 	KASSERT(dvp != NULL);
262a7795a09Sreinoud 	KASSERT(vp != NULL);
263a7795a09Sreinoud 	KASSERT(dvp != vp);
264a7795a09Sreinoud 	KASSERT(dvp->v_type == VDIR);
265a7795a09Sreinoud 	KASSERT(vp->v_type != VDIR);
266a7795a09Sreinoud 	KASSERT(dvp->v_mount == mp);
267a7795a09Sreinoud 	KASSERT(vp->v_mount == mp);
268a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(dvp) == LK_EXCLUSIVE);
269a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(vp) == LK_EXCLUSIVE);
270a7795a09Sreinoud 
271a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_remove_check_possible called\n"));
272a7795a09Sreinoud 
273a7795a09Sreinoud 	/* flags not implemented since they are not defined (yet) in UDF */
274a7795a09Sreinoud 	return 0;
275a7795a09Sreinoud }
276a7795a09Sreinoud 
277a7795a09Sreinoud 
278a7795a09Sreinoud /*
279a7795a09Sreinoud  * udf_gro_remove_check_permitted: check whether a remove is permitted given
280a7795a09Sreinoud  * our credentials.
281a7795a09Sreinoud  */
282a7795a09Sreinoud static int
udf_gro_remove_check_permitted(struct mount * mp,kauth_cred_t cred,struct vnode * dvp,struct vnode * vp)283a7795a09Sreinoud udf_gro_remove_check_permitted(struct mount *mp, kauth_cred_t cred,
284a7795a09Sreinoud     struct vnode *dvp, struct vnode *vp)
285a7795a09Sreinoud {
286a7795a09Sreinoud 	struct udf_node *dir_node = VTOI(dvp);
287a7795a09Sreinoud 	struct udf_node *udf_node = VTOI(vp);
288a7795a09Sreinoud 	mode_t dmode;
289a7795a09Sreinoud 	uid_t duid, uid;
290a7795a09Sreinoud 	gid_t gdummy;
291a7795a09Sreinoud 
292a7795a09Sreinoud 	(void)mp;
293a7795a09Sreinoud 	KASSERT(mp != NULL);
294a7795a09Sreinoud 	KASSERT(dvp != NULL);
295a7795a09Sreinoud 	KASSERT(vp != NULL);
296a7795a09Sreinoud 	KASSERT(dvp != vp);
297a7795a09Sreinoud 	KASSERT(dvp->v_type == VDIR);
298a7795a09Sreinoud 	KASSERT(vp->v_type != VDIR);
299a7795a09Sreinoud 	KASSERT(dvp->v_mount == mp);
300a7795a09Sreinoud 	KASSERT(vp->v_mount == mp);
301a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(dvp) == LK_EXCLUSIVE);
302a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(vp) == LK_EXCLUSIVE);
303a7795a09Sreinoud 
304a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_remove_check_permitted called\n"));
305a7795a09Sreinoud 	dmode = udf_getaccessmode(dir_node);
306a7795a09Sreinoud 
307a7795a09Sreinoud 	udf_getownership(dir_node, &duid, &gdummy);
308a7795a09Sreinoud 	udf_getownership(udf_node, &uid,  &gdummy);
309a7795a09Sreinoud 
310a7795a09Sreinoud 	return genfs_ufslike_remove_check_permitted(cred,
311a7795a09Sreinoud 	    dvp, dmode, duid,
312a7795a09Sreinoud 	    vp, uid);
313a7795a09Sreinoud }
314a7795a09Sreinoud 
315a7795a09Sreinoud 
316a7795a09Sreinoud /*
317a7795a09Sreinoud  * udf_gro_rename: actually perform the rename operation.
318a7795a09Sreinoud  */
319a7795a09Sreinoud static int
udf_gro_rename(struct mount * mp,kauth_cred_t cred,struct vnode * fdvp,struct componentname * fcnp,void * fde,struct vnode * fvp,struct vnode * tdvp,struct componentname * tcnp,void * tde,struct vnode * tvp,nlink_t * tvp_nlinkp)320a7795a09Sreinoud udf_gro_rename(struct mount *mp, kauth_cred_t cred,
321a7795a09Sreinoud     struct vnode *fdvp, struct componentname *fcnp,
322a7795a09Sreinoud     void *fde, struct vnode *fvp,
323a7795a09Sreinoud     struct vnode *tdvp, struct componentname *tcnp,
324982ae832Sthorpej     void *tde, struct vnode *tvp, nlink_t *tvp_nlinkp)
325a7795a09Sreinoud {
326a7795a09Sreinoud 	struct udf_node *fnode, *fdnode, *tnode, *tdnode;
327a7795a09Sreinoud 	struct vattr fvap;
328a7795a09Sreinoud 	int error;
329a7795a09Sreinoud 
330a7795a09Sreinoud 	(void)cred;
331a7795a09Sreinoud 	KASSERT(mp != NULL);
332a7795a09Sreinoud 	KASSERT(fdvp != NULL);
333a7795a09Sreinoud 	KASSERT(fcnp != NULL);
334a7795a09Sreinoud 	KASSERT(fvp != NULL);
335a7795a09Sreinoud 	KASSERT(tdvp != NULL);
336a7795a09Sreinoud 	KASSERT(tcnp != NULL);
337a7795a09Sreinoud 	KASSERT(fdvp != fvp);
338a7795a09Sreinoud 	KASSERT(fdvp != tvp);
339a7795a09Sreinoud 	KASSERT(tdvp != fvp);
340a7795a09Sreinoud 	KASSERT(tdvp != tvp);
341a7795a09Sreinoud 	KASSERT(fvp != tvp);
342a7795a09Sreinoud 	KASSERT(fdvp->v_mount == mp);
343a7795a09Sreinoud 	KASSERT(fvp->v_mount == mp);
344a7795a09Sreinoud 	KASSERT(tdvp->v_mount == mp);
345a7795a09Sreinoud 	KASSERT((tvp == NULL) || (tvp->v_mount == mp));
346a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(fdvp) == LK_EXCLUSIVE);
347a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(fvp) == LK_EXCLUSIVE);
348a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(tdvp) == LK_EXCLUSIVE);
349a7795a09Sreinoud 	KASSERT((tvp == NULL) || (VOP_ISLOCKED(tvp) == LK_EXCLUSIVE));
350a7795a09Sreinoud 
351a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_rename called\n"));
352a7795a09Sreinoud 	DPRINTF(NODE, ("udf_gro_rename called : %s -> %s\n",
353a7795a09Sreinoud 		fcnp->cn_nameptr, tcnp->cn_nameptr));
354a7795a09Sreinoud 
355a7795a09Sreinoud 	fnode  = VTOI(fvp);
356a7795a09Sreinoud 	fdnode = VTOI(fdvp);
357a7795a09Sreinoud 	tnode  = (tvp == NULL) ? NULL : VTOI(tvp);
358a7795a09Sreinoud 	tdnode = VTOI(tdvp);
359a7795a09Sreinoud 
360a7795a09Sreinoud 	/* get attribute information */
361a7795a09Sreinoud 	error = VOP_GETATTR(fvp, &fvap, NULL);
362a7795a09Sreinoud 	if (error)
363a7795a09Sreinoud 		return error;
364a7795a09Sreinoud 
365a7795a09Sreinoud 	/* remove existing entry if present */
366982ae832Sthorpej 	if (tvp) {
367a7795a09Sreinoud 		udf_dir_detach(tdnode->ump, tdnode, tnode, tcnp);
368982ae832Sthorpej 		if (tnode->fe) {
369982ae832Sthorpej 			*tvp_nlinkp = udf_rw16(tnode->fe->link_cnt);
370982ae832Sthorpej 		} else {
371982ae832Sthorpej 			KASSERT(tnode->efe != NULL);
372982ae832Sthorpej 			*tvp_nlinkp = udf_rw16(tnode->efe->link_cnt);
373982ae832Sthorpej 		}
374982ae832Sthorpej 	}
375a7795a09Sreinoud 
376a7795a09Sreinoud 	/* create new directory entry for the node */
377a7795a09Sreinoud 	error = udf_dir_attach(tdnode->ump, tdnode, fnode, &fvap, tcnp);
378a7795a09Sreinoud 	if (error)
379a7795a09Sreinoud 		return error;
380a7795a09Sreinoud 
381a7795a09Sreinoud 	/* unlink old directory entry for the node, if failing, unattach new */
382a7795a09Sreinoud 	error = udf_dir_detach(tdnode->ump, fdnode, fnode, fcnp);
3832b159138Sreinoud 	if (error)
3842b159138Sreinoud 		goto rollback_attach;
3852b159138Sreinoud 
3862b159138Sreinoud 	if ((fdnode != tdnode) && (fvp->v_type == VDIR)) {
387a7795a09Sreinoud 		/* update fnode's '..' entry */
388a7795a09Sreinoud 		error = udf_dir_update_rootentry(fnode->ump, fnode, tdnode);
3892b159138Sreinoud 		if (error)
3902b159138Sreinoud 			goto rollback;
391a7795a09Sreinoud 	}
392a7795a09Sreinoud 
393a7795a09Sreinoud 	genfs_rename_cache_purge(fdvp, fvp, tdvp, tvp);
3942b159138Sreinoud 	return 0;
3952b159138Sreinoud 
3962b159138Sreinoud rollback:
3972b159138Sreinoud 	/* 'try' to recover from this situation */
3982b159138Sreinoud 	udf_dir_attach(tdnode->ump, fdnode, fnode, &fvap, fcnp);
3992b159138Sreinoud rollback_attach:
4002b159138Sreinoud 	udf_dir_detach(tdnode->ump, tdnode, fnode, tcnp);
401a7795a09Sreinoud 
402a7795a09Sreinoud 	return error;
403a7795a09Sreinoud }
404a7795a09Sreinoud 
405a7795a09Sreinoud 
406a7795a09Sreinoud /*
407a7795a09Sreinoud  * udf_gro_remove: rename an object over another link to itself, effectively
408a7795a09Sreinoud  * removing just the original link.
409a7795a09Sreinoud  */
410a7795a09Sreinoud static int
udf_gro_remove(struct mount * mp,kauth_cred_t cred,struct vnode * dvp,struct componentname * cnp,void * de,struct vnode * vp,nlink_t * tvp_nlinkp)411a7795a09Sreinoud udf_gro_remove(struct mount *mp, kauth_cred_t cred,
412982ae832Sthorpej     struct vnode *dvp, struct componentname *cnp, void *de, struct vnode *vp,
413982ae832Sthorpej     nlink_t *tvp_nlinkp)
414a7795a09Sreinoud {
415a7795a09Sreinoud 	struct udf_node *dir_node, *udf_node;
416a7795a09Sreinoud 
417a7795a09Sreinoud 	KASSERT(mp != NULL);
418a7795a09Sreinoud 	KASSERT(dvp != NULL);
419a7795a09Sreinoud 	KASSERT(cnp != NULL);
420a7795a09Sreinoud 	KASSERT(vp != NULL);
421a7795a09Sreinoud 	KASSERT(dvp != vp);
422a7795a09Sreinoud 	KASSERT(dvp->v_mount == mp);
423a7795a09Sreinoud 	KASSERT(vp->v_mount == mp);
424a7795a09Sreinoud 	KASSERT(dvp->v_type == VDIR);
425a7795a09Sreinoud 	KASSERT(vp->v_type != VDIR);
426a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(dvp) == LK_EXCLUSIVE);
427a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(vp) == LK_EXCLUSIVE);
428a7795a09Sreinoud 
429a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_remove called\n"));
430a7795a09Sreinoud 
431a7795a09Sreinoud 	dir_node = VTOI(dvp);
432a7795a09Sreinoud 	udf_node = VTOI(vp);
433a7795a09Sreinoud 	udf_dir_detach(dir_node->ump, dir_node, udf_node, cnp);
434a7795a09Sreinoud 
435982ae832Sthorpej 	if (udf_node->fe) {
436982ae832Sthorpej 		*tvp_nlinkp = udf_rw16(udf_node->fe->link_cnt);
437982ae832Sthorpej 	} else {
438982ae832Sthorpej 		KASSERT(udf_node->efe != NULL);
439982ae832Sthorpej 		*tvp_nlinkp = udf_rw16(udf_node->efe->link_cnt);
440982ae832Sthorpej 	}
441982ae832Sthorpej 
442a7795a09Sreinoud 	return 0;
443a7795a09Sreinoud }
444a7795a09Sreinoud 
445a7795a09Sreinoud 
446a7795a09Sreinoud /*
447a7795a09Sreinoud  * udf_gro_lookup: look up and save the lookup results.
448a7795a09Sreinoud  */
449a7795a09Sreinoud static int
udf_gro_lookup(struct mount * mp,struct vnode * dvp,struct componentname * cnp,void * de_ret,struct vnode ** vp_ret)450a7795a09Sreinoud udf_gro_lookup(struct mount *mp, struct vnode *dvp,
451a7795a09Sreinoud     struct componentname *cnp, void *de_ret, struct vnode **vp_ret)
452a7795a09Sreinoud {
453a7795a09Sreinoud 	struct udf_node *dir_node, *res_node;
454a7795a09Sreinoud 	struct long_ad   icb_loc;
455a7795a09Sreinoud 	const char *name;
456a7795a09Sreinoud 	int namelen, error;
457a7795a09Sreinoud 	int found;
458a7795a09Sreinoud 
459a7795a09Sreinoud 	(void)mp;
460a7795a09Sreinoud 	KASSERT(mp != NULL);
461a7795a09Sreinoud 	KASSERT(dvp != NULL);
462a7795a09Sreinoud 	KASSERT(cnp != NULL);
463a7795a09Sreinoud 	KASSERT(vp_ret != NULL);
464a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(dvp) == LK_EXCLUSIVE);
465a7795a09Sreinoud 
466a7795a09Sreinoud 	dir_node = VTOI(dvp);
467a7795a09Sreinoud 
468a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_lookup called\n"));
469a7795a09Sreinoud 
470a7795a09Sreinoud 	/* lookup filename in the directory; location icb_loc */
471a7795a09Sreinoud 	name    = cnp->cn_nameptr;
472a7795a09Sreinoud 	namelen = cnp->cn_namelen;
473a7795a09Sreinoud 	error = udf_lookup_name_in_dir(dvp, name, namelen,
474a7795a09Sreinoud 			&icb_loc, &found);
475a7795a09Sreinoud 	if (error)
476a7795a09Sreinoud 		return error;
477a7795a09Sreinoud 	if (!found)
478a7795a09Sreinoud 		return ENOENT;
479a7795a09Sreinoud 
480a7795a09Sreinoud 	DPRINTF(LOOKUP, ("udf_gro_lookup found '%s'\n", name));
481c2e9cb94Sad 	error = udf_get_node(dir_node->ump, &icb_loc, &res_node, LK_EXCLUSIVE);
482a7795a09Sreinoud 	if (error)
483a7795a09Sreinoud 		return error;
484a7795a09Sreinoud 	*vp_ret = res_node->vnode;
485a7795a09Sreinoud 	VOP_UNLOCK(res_node->vnode);
486a7795a09Sreinoud 
487a7795a09Sreinoud 	return 0;
488a7795a09Sreinoud }
489a7795a09Sreinoud 
490a7795a09Sreinoud 
491a7795a09Sreinoud /*
492a7795a09Sreinoud  * udf_rmdired_p: check whether the directory vp has been rmdired.
493a7795a09Sreinoud  *
494a7795a09Sreinoud  * vp must be locked and referenced.
495a7795a09Sreinoud  */
496a7795a09Sreinoud static bool
udf_rmdired_p(struct vnode * vp)497a7795a09Sreinoud udf_rmdired_p(struct vnode *vp)
498a7795a09Sreinoud {
499a7795a09Sreinoud 	DPRINTF(CALL, ("udf_rmdired_p called\n"));
500a7795a09Sreinoud 
501a7795a09Sreinoud 	KASSERT(vp != NULL);
502a7795a09Sreinoud 	KASSERT(VOP_ISLOCKED(vp) == LK_EXCLUSIVE);
503a7795a09Sreinoud 	KASSERT(vp->v_type == VDIR);
504a7795a09Sreinoud 
505d9c51d93Sreinoud 	return (VTOI(vp)->i_flags & IN_DELETED);
506a7795a09Sreinoud }
507a7795a09Sreinoud 
508a7795a09Sreinoud 
509a7795a09Sreinoud /*
510a7795a09Sreinoud  * udf_gro_genealogy: analyze the genealogy of the source and target
511a7795a09Sreinoud  * directories.
512a7795a09Sreinoud  */
513a7795a09Sreinoud static int
udf_gro_genealogy(struct mount * mp,kauth_cred_t cred,struct vnode * fdvp,struct vnode * tdvp,struct vnode ** intermediate_node_ret)514a7795a09Sreinoud udf_gro_genealogy(struct mount *mp, kauth_cred_t cred,
515a7795a09Sreinoud     struct vnode *fdvp, struct vnode *tdvp,
516a7795a09Sreinoud     struct vnode **intermediate_node_ret)
517a7795a09Sreinoud {
518a7795a09Sreinoud 	struct udf_mount *ump;
519420d7ac7Sreinoud 	struct udf_node *parent_node;
520420d7ac7Sreinoud 	struct vnode *vp, *dvp;
521a7795a09Sreinoud 	struct long_ad parent_loc;
522a7795a09Sreinoud 	const char *name;
523a7795a09Sreinoud 	int namelen;
524a7795a09Sreinoud 	int error, found;
525a7795a09Sreinoud 
526a7795a09Sreinoud 	(void)cred;
527a7795a09Sreinoud 	KASSERT(mp != NULL);
528a7795a09Sreinoud 	KASSERT(fdvp != NULL);
529a7795a09Sreinoud 	KASSERT(tdvp != NULL);
530a7795a09Sreinoud 	KASSERT(fdvp != tdvp);
531a7795a09Sreinoud 	KASSERT(intermediate_node_ret != NULL);
532a7795a09Sreinoud 	KASSERT(fdvp->v_mount == mp);
533a7795a09Sreinoud 	KASSERT(tdvp->v_mount == mp);
534a7795a09Sreinoud 	KASSERT(fdvp->v_type == VDIR);
535a7795a09Sreinoud 	KASSERT(tdvp->v_type == VDIR);
536a7795a09Sreinoud 
537a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_genealogy called\n"));
538a7795a09Sreinoud 
539a7795a09Sreinoud 	/*
540a7795a09Sreinoud 	 * We need to provisionally lock tdvp to keep rmdir from deleting it
541a7795a09Sreinoud 	 * -- or any ancestor -- at an inopportune moment.
542a7795a09Sreinoud 	 *
543a7795a09Sreinoud 	 * XXX WHY is this not in genfs's rename? XXX
544a7795a09Sreinoud 	 */
545a7795a09Sreinoud 	error = udf_gro_lock_directory(mp, tdvp);
546a7795a09Sreinoud 	if (error)
547a7795a09Sreinoud 		return error;
548a7795a09Sreinoud 
549a7795a09Sreinoud 	name     = "..";
550a7795a09Sreinoud 	namelen  = 2;
551a7795a09Sreinoud 	error    = 0;
552a7795a09Sreinoud 
553420d7ac7Sreinoud 	ump = VTOI(tdvp)->ump;
554a7795a09Sreinoud 
555a7795a09Sreinoud 	/* if nodes are equal, it is no use looking */
556420d7ac7Sreinoud 	KASSERT(udf_compare_icb(&VTOI(fdvp)->loc, &VTOI(tdvp)->loc) != 0);
557a7795a09Sreinoud 
558420d7ac7Sreinoud 	/* start at destination vnode and walk up the tree */
559420d7ac7Sreinoud 	vp = tdvp;
560420d7ac7Sreinoud 	vref(vp);
561a7795a09Sreinoud 
562a7795a09Sreinoud 	for (;;) {
563420d7ac7Sreinoud 		KASSERT(vp != NULL);
564420d7ac7Sreinoud 		KASSERT(VOP_ISLOCKED(vp) == LK_EXCLUSIVE);
565420d7ac7Sreinoud 		KASSERT(vp->v_mount == mp);
566420d7ac7Sreinoud 		KASSERT(vp->v_type == VDIR);
567420d7ac7Sreinoud 		KASSERT(!udf_rmdired_p(vp));
568420d7ac7Sreinoud 
569a7795a09Sreinoud 		DPRINTF(NODE, ("udf_gro_genealogy : "
570420d7ac7Sreinoud 			"fdvp %p, looking at vp %p\n",
571420d7ac7Sreinoud 			fdvp, vp));
572a7795a09Sreinoud 
573a7795a09Sreinoud 		/* sanity check */
574420d7ac7Sreinoud 		if (vp->v_type != VDIR) {
575420d7ac7Sreinoud 			vput(vp);
576a7795a09Sreinoud 			return ENOTDIR;
577a7795a09Sreinoud 		}
578a7795a09Sreinoud 
579a7795a09Sreinoud 		/* go down one level */
580420d7ac7Sreinoud 		error = udf_lookup_name_in_dir(vp, name, namelen,
581a7795a09Sreinoud 			&parent_loc, &found);
582a7795a09Sreinoud 		DPRINTF(NODE, ("\tlookup of parent '..' resulted in error %d, "
583a7795a09Sreinoud 			"found %d\n", error, found));
584a7795a09Sreinoud 		if (!found)
585a7795a09Sreinoud 			error = ENOENT;
586a7795a09Sreinoud 		if (error) {
587420d7ac7Sreinoud 			vput(vp);
588a7795a09Sreinoud 			return error;
589a7795a09Sreinoud 		}
590a7795a09Sreinoud 
591a7795a09Sreinoud 		/* did we encounter the root node? i.e. loop back */
592420d7ac7Sreinoud 		if (udf_compare_icb(&parent_loc, &VTOI(vp)->loc) == 0) {
593a7795a09Sreinoud 			DPRINTF(NODE, ("ROOT found!\n"));
594420d7ac7Sreinoud 			vput(vp);
595a7795a09Sreinoud 			*intermediate_node_ret = NULL;
596a7795a09Sreinoud 			return 0;
597a7795a09Sreinoud 		}
598a7795a09Sreinoud 
599420d7ac7Sreinoud 		/* Did we find that fdvp is an ancestor of tdvp? */
600420d7ac7Sreinoud 		if (udf_compare_icb(&parent_loc, &VTOI(fdvp)->loc) == 0) {
601420d7ac7Sreinoud 			DPRINTF(NODE, ("fdvp is ancestor of tdvp\n"));
602420d7ac7Sreinoud 			*intermediate_node_ret = vp;
603420d7ac7Sreinoud 			VOP_UNLOCK(vp);
604a7795a09Sreinoud 			return 0;
605a7795a09Sreinoud 		}
606a7795a09Sreinoud 
6074600888aSreinoud 		/*
6084600888aSreinoud 		 * Unlock vp so that we can lock the parent, but keep child vp
6094600888aSreinoud 		 * referenced until after we have found the parent, so that
610420d7ac7Sreinoud 		 * parent_node will not be recycled.
6114600888aSreinoud 		 */
612a7795a09Sreinoud 		DPRINTF(NODE, ("\tgetting the parent node\n"));
613420d7ac7Sreinoud 		VOP_UNLOCK(vp);
614c2e9cb94Sad 		error = udf_get_node(ump, &parent_loc, &parent_node,
615c2e9cb94Sad 		    LK_EXCLUSIVE);
616420d7ac7Sreinoud 		vrele(vp);
6174600888aSreinoud 		if (error)
618a7795a09Sreinoud 			return error;
6194600888aSreinoud 
620420d7ac7Sreinoud 		dvp = parent_node->vnode;
621420d7ac7Sreinoud 
622420d7ac7Sreinoud 		/* switch */
623420d7ac7Sreinoud 		KASSERT(dvp != NULL);
624420d7ac7Sreinoud 		KASSERT(VOP_ISLOCKED(dvp) == LK_EXCLUSIVE);
625420d7ac7Sreinoud 		vp  = dvp;
626420d7ac7Sreinoud 
6274600888aSreinoud 		/* sanity check */
628420d7ac7Sreinoud 		if (vp->v_type != VDIR) {
6294600888aSreinoud 			/*
630cb40c69bSandvar 			 * Odd, but can happen if we lose the race and the
6314600888aSreinoud 			 * '..' node has been recycled.
6324600888aSreinoud 			 */
633420d7ac7Sreinoud 			vput(vp);
6344600888aSreinoud 			return ENOTDIR;
635a7795a09Sreinoud 		}
636a7795a09Sreinoud 
637420d7ac7Sreinoud 		if (udf_rmdired_p(vp)) {
638420d7ac7Sreinoud 			vput(vp);
639a7795a09Sreinoud 			return ENOENT;
640a7795a09Sreinoud 		}
641a7795a09Sreinoud 	}
642a7795a09Sreinoud }
643a7795a09Sreinoud 
644a7795a09Sreinoud 
645a7795a09Sreinoud /*
646a7795a09Sreinoud  * udf_gro_lock_directory: lock the directory vp, but fail if it has been
647a7795a09Sreinoud  * rmdir'd.
648a7795a09Sreinoud  */
649a7795a09Sreinoud static int
udf_gro_lock_directory(struct mount * mp,struct vnode * vp)650a7795a09Sreinoud udf_gro_lock_directory(struct mount *mp, struct vnode *vp)
651a7795a09Sreinoud {
652a7795a09Sreinoud 
653a7795a09Sreinoud 	(void)mp;
654a7795a09Sreinoud 	KASSERT(mp != NULL);
655a7795a09Sreinoud 	KASSERT(vp != NULL);
656a7795a09Sreinoud 	KASSERT(vp->v_mount == mp);
657a7795a09Sreinoud 
658a7795a09Sreinoud 	DPRINTF(CALL, ("udf_gro_lock_directory called\n"));
659a7795a09Sreinoud 	DPRINTF(LOCKING, ("udf_gro_lock_directory called\n"));
660a7795a09Sreinoud 
661a7795a09Sreinoud 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
662a7795a09Sreinoud 
663a7795a09Sreinoud 	if (udf_rmdired_p(vp)) {
664a7795a09Sreinoud 		VOP_UNLOCK(vp);
665a7795a09Sreinoud 		return ENOENT;
666a7795a09Sreinoud 	}
667a7795a09Sreinoud 
668a7795a09Sreinoud 	return 0;
669a7795a09Sreinoud }
670a7795a09Sreinoud 
671a7795a09Sreinoud 
672a7795a09Sreinoud static const struct genfs_rename_ops udf_genfs_rename_ops = {
673a7795a09Sreinoud 	.gro_directory_empty_p		= udf_gro_directory_empty_p,
674a7795a09Sreinoud 	.gro_rename_check_possible	= udf_gro_rename_check_possible,
675a7795a09Sreinoud 	.gro_rename_check_permitted	= udf_gro_rename_check_permitted,
676a7795a09Sreinoud 	.gro_remove_check_possible	= udf_gro_remove_check_possible,
677a7795a09Sreinoud 	.gro_remove_check_permitted	= udf_gro_remove_check_permitted,
678a7795a09Sreinoud 	.gro_rename			= udf_gro_rename,
679a7795a09Sreinoud 	.gro_remove			= udf_gro_remove,
680a7795a09Sreinoud 	.gro_lookup			= udf_gro_lookup,
681a7795a09Sreinoud 	.gro_genealogy			= udf_gro_genealogy,
682a7795a09Sreinoud 	.gro_lock_directory		= udf_gro_lock_directory,
683a7795a09Sreinoud };
684