2020-06-11 22:20:15 +02:00
|
|
|
package fusefrontend
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"syscall"
|
|
|
|
|
2020-06-11 23:39:27 +02:00
|
|
|
"golang.org/x/sys/unix"
|
|
|
|
|
2020-06-11 22:20:15 +02:00
|
|
|
"github.com/hanwen/go-fuse/v2/fs"
|
|
|
|
"github.com/hanwen/go-fuse/v2/fuse"
|
|
|
|
|
2020-06-21 13:25:12 +02:00
|
|
|
"github.com/rfjakob/gocryptfs/internal/nametransform"
|
2020-06-11 23:39:27 +02:00
|
|
|
"github.com/rfjakob/gocryptfs/internal/syscallcompat"
|
2020-06-21 13:25:12 +02:00
|
|
|
"github.com/rfjakob/gocryptfs/internal/tlog"
|
2020-06-11 22:20:15 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// Node is a file or directory in the filesystem tree
|
|
|
|
// in a gocryptfs mount.
|
|
|
|
type Node struct {
|
|
|
|
fs.Inode
|
|
|
|
}
|
|
|
|
|
2020-07-04 21:16:20 +02:00
|
|
|
// Lookup - FUSE call for discovering a file.
|
|
|
|
func (n *Node) Lookup(ctx context.Context, name string, out *fuse.EntryOut) (ch *fs.Inode, errno syscall.Errno) {
|
|
|
|
dirfd, cName, errno := n.prepareAtSyscall(name)
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
2020-06-11 23:39:27 +02:00
|
|
|
}
|
2020-06-21 12:42:18 +02:00
|
|
|
defer syscall.Close(dirfd)
|
2020-07-04 21:16:20 +02:00
|
|
|
|
2020-06-11 23:39:27 +02:00
|
|
|
// Get device number and inode number into `st`
|
|
|
|
st, err := syscallcompat.Fstatat2(dirfd, cName, unix.AT_SYMLINK_NOFOLLOW)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fs.ToErrno(err)
|
|
|
|
}
|
2020-07-26 19:49:26 +02:00
|
|
|
|
|
|
|
// Create new inode and fill `out`
|
2020-07-19 13:15:18 +02:00
|
|
|
ch = n.newChild(ctx, st, out)
|
2020-07-26 19:49:26 +02:00
|
|
|
|
|
|
|
// Translate ciphertext size in `out.Attr.Size` to plaintext size
|
|
|
|
n.translateSize(dirfd, cName, &out.Attr)
|
|
|
|
|
2020-06-11 23:39:27 +02:00
|
|
|
return ch, 0
|
2020-06-11 22:20:15 +02:00
|
|
|
}
|
|
|
|
|
2020-06-21 14:08:53 +02:00
|
|
|
// GetAttr - FUSE call for stat()ing a file.
|
|
|
|
//
|
|
|
|
// GetAttr is symlink-safe through use of openBackingDir() and Fstatat().
|
2020-07-04 21:16:20 +02:00
|
|
|
func (n *Node) Getattr(ctx context.Context, f fs.FileHandle, out *fuse.AttrOut) (errno syscall.Errno) {
|
2020-07-12 15:08:17 +02:00
|
|
|
// If the kernel gives us a file handle, use it.
|
|
|
|
if f != nil {
|
|
|
|
return f.(fs.FileGetattrer).Getattr(ctx, out)
|
|
|
|
}
|
|
|
|
|
2020-07-04 21:16:20 +02:00
|
|
|
dirfd, cName, errno := n.prepareAtSyscall("")
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
2020-06-21 12:42:18 +02:00
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
2020-06-11 22:20:15 +02:00
|
|
|
|
2020-06-21 12:42:18 +02:00
|
|
|
st, err := syscallcompat.Fstatat2(dirfd, cName, unix.AT_SYMLINK_NOFOLLOW)
|
|
|
|
if err != nil {
|
|
|
|
return fs.ToErrno(err)
|
|
|
|
}
|
2020-07-12 15:03:42 +02:00
|
|
|
|
|
|
|
// Fix inode number
|
|
|
|
rn := n.rootNode()
|
|
|
|
rn.inoMap.TranslateStat(st)
|
2020-06-21 12:42:18 +02:00
|
|
|
out.Attr.FromStat(st)
|
2020-07-12 15:03:42 +02:00
|
|
|
|
2020-07-26 19:49:26 +02:00
|
|
|
// Translate ciphertext size in `out.Attr.Size` to plaintext size
|
|
|
|
n.translateSize(dirfd, cName, &out.Attr)
|
|
|
|
|
2020-07-12 15:03:42 +02:00
|
|
|
if rn.args.ForceOwner != nil {
|
|
|
|
out.Owner = *rn.args.ForceOwner
|
|
|
|
}
|
2020-06-21 12:42:18 +02:00
|
|
|
return 0
|
2020-06-11 22:20:15 +02:00
|
|
|
}
|
2020-06-21 13:25:12 +02:00
|
|
|
|
2020-06-21 14:08:53 +02:00
|
|
|
// Unlink - FUSE call. Delete a file.
|
|
|
|
//
|
|
|
|
// Symlink-safe through use of Unlinkat().
|
2020-07-04 21:16:20 +02:00
|
|
|
func (n *Node) Unlink(ctx context.Context, name string) (errno syscall.Errno) {
|
|
|
|
dirfd, cName, errno := n.prepareAtSyscall(name)
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
2020-06-21 14:08:53 +02:00
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
2020-07-04 21:16:20 +02:00
|
|
|
|
2020-06-21 14:08:53 +02:00
|
|
|
// Delete content
|
2020-07-04 21:16:20 +02:00
|
|
|
err := syscallcompat.Unlinkat(dirfd, cName, 0)
|
2020-06-21 14:08:53 +02:00
|
|
|
if err != nil {
|
|
|
|
return fs.ToErrno(err)
|
|
|
|
}
|
|
|
|
// Delete ".name" file
|
2020-07-04 21:16:20 +02:00
|
|
|
if !n.rootNode().args.PlaintextNames && nametransform.IsLongContent(cName) {
|
2020-06-21 14:08:53 +02:00
|
|
|
err = nametransform.DeleteLongNameAt(dirfd, cName)
|
|
|
|
if err != nil {
|
|
|
|
tlog.Warn.Printf("Unlink: could not delete .name file: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return fs.ToErrno(err)
|
|
|
|
}
|
2020-07-04 20:32:02 +02:00
|
|
|
|
|
|
|
// Readlink - FUSE call.
|
|
|
|
//
|
|
|
|
// Symlink-safe through openBackingDir() + Readlinkat().
|
2020-07-04 21:16:20 +02:00
|
|
|
func (n *Node) Readlink(ctx context.Context) (out []byte, errno syscall.Errno) {
|
|
|
|
dirfd, cName, errno := n.prepareAtSyscall("")
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
2020-07-04 20:32:02 +02:00
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
|
|
|
|
2020-07-26 19:49:26 +02:00
|
|
|
return n.readlink(dirfd, cName)
|
2020-07-04 20:32:02 +02:00
|
|
|
}
|
2020-07-04 21:37:44 +02:00
|
|
|
|
2020-07-05 20:05:07 +02:00
|
|
|
// Setattr - FUSE call. Called for chmod, truncate, utimens, ...
|
|
|
|
func (n *Node) Setattr(ctx context.Context, f fs.FileHandle, in *fuse.SetAttrIn, out *fuse.AttrOut) (errno syscall.Errno) {
|
2020-07-12 20:17:15 +02:00
|
|
|
// Use the fd if the kernel gave us one
|
2020-07-05 20:05:07 +02:00
|
|
|
if f != nil {
|
2020-08-16 12:48:16 +02:00
|
|
|
f2 := f.(*File)
|
2020-07-12 20:17:15 +02:00
|
|
|
return f2.Setattr(ctx, in, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
dirfd, cName, errno := n.prepareAtSyscall("")
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
|
|
|
|
|
|
|
// chmod(2)
|
2021-01-10 08:06:09 +01:00
|
|
|
//
|
|
|
|
// gocryptfs.diriv & gocryptfs.longname.[sha256].name files do NOT get chmod'ed
|
|
|
|
// or chown'ed with their parent file/dir for simplicity.
|
|
|
|
// See nametransform/perms.go for details.
|
2020-07-12 20:17:15 +02:00
|
|
|
if mode, ok := in.GetMode(); ok {
|
|
|
|
errno = fs.ToErrno(syscallcompat.FchmodatNofollow(dirfd, cName, mode))
|
|
|
|
if errno != 0 {
|
|
|
|
return errno
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// chown(2)
|
|
|
|
uid32, uOk := in.GetUID()
|
|
|
|
gid32, gOk := in.GetGID()
|
|
|
|
if uOk || gOk {
|
|
|
|
uid := -1
|
|
|
|
gid := -1
|
|
|
|
|
|
|
|
if uOk {
|
|
|
|
uid = int(uid32)
|
|
|
|
}
|
|
|
|
if gOk {
|
|
|
|
gid = int(gid32)
|
|
|
|
}
|
|
|
|
errno = fs.ToErrno(syscallcompat.Fchownat(dirfd, cName, uid, gid, unix.AT_SYMLINK_NOFOLLOW))
|
|
|
|
if errno != 0 {
|
|
|
|
return errno
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// utimens(2)
|
|
|
|
mtime, mok := in.GetMTime()
|
|
|
|
atime, aok := in.GetATime()
|
|
|
|
if mok || aok {
|
|
|
|
ap := &atime
|
|
|
|
mp := &mtime
|
|
|
|
if !aok {
|
|
|
|
ap = nil
|
|
|
|
}
|
|
|
|
if !mok {
|
|
|
|
mp = nil
|
|
|
|
}
|
|
|
|
errno = fs.ToErrno(syscallcompat.UtimesNanoAtNofollow(dirfd, cName, ap, mp))
|
|
|
|
if errno != 0 {
|
|
|
|
return errno
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// For truncate, the user has to have write permissions. That means we can
|
|
|
|
// depend on opening a RDWR fd and letting the File handle truncate.
|
|
|
|
if sz, ok := in.GetSize(); ok {
|
2020-07-05 20:05:07 +02:00
|
|
|
f, _, errno := n.Open(ctx, syscall.O_RDWR)
|
|
|
|
if errno != 0 {
|
|
|
|
return errno
|
|
|
|
}
|
2020-08-16 12:48:16 +02:00
|
|
|
f2 := f.(*File)
|
2020-07-12 21:17:52 +02:00
|
|
|
defer f2.Release(ctx)
|
2020-07-12 20:17:15 +02:00
|
|
|
errno = syscall.Errno(f2.truncate(sz))
|
|
|
|
if errno != 0 {
|
|
|
|
return errno
|
|
|
|
}
|
2020-07-12 21:17:52 +02:00
|
|
|
return f2.Getattr(ctx, out)
|
2020-07-05 20:05:07 +02:00
|
|
|
}
|
2020-07-12 21:17:52 +02:00
|
|
|
|
|
|
|
return n.Getattr(ctx, nil, out)
|
2020-07-05 20:05:07 +02:00
|
|
|
}
|
2020-07-11 18:59:54 +02:00
|
|
|
|
|
|
|
// StatFs - FUSE call. Returns information about the filesystem.
|
|
|
|
//
|
|
|
|
// Symlink-safe because the path is ignored.
|
|
|
|
func (n *Node) Statfs(ctx context.Context, out *fuse.StatfsOut) syscall.Errno {
|
|
|
|
p := n.rootNode().args.Cipherdir
|
|
|
|
var st syscall.Statfs_t
|
|
|
|
err := syscall.Statfs(p, &st)
|
|
|
|
if err != nil {
|
|
|
|
return fs.ToErrno(err)
|
|
|
|
}
|
|
|
|
out.FromStatfsT(&st)
|
|
|
|
return 0
|
|
|
|
}
|
2020-07-11 19:23:04 +02:00
|
|
|
|
|
|
|
// Mknod - FUSE call. Create a device file.
|
|
|
|
//
|
|
|
|
// Symlink-safe through use of Mknodat().
|
|
|
|
func (n *Node) Mknod(ctx context.Context, name string, mode, rdev uint32, out *fuse.EntryOut) (inode *fs.Inode, errno syscall.Errno) {
|
2020-07-12 20:19:29 +02:00
|
|
|
dirfd, cName, errno := n.prepareAtSyscall(name)
|
2020-07-11 19:23:04 +02:00
|
|
|
if errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
|
|
|
|
|
|
|
// Make sure context is nil if we don't want to preserve the owner
|
|
|
|
rn := n.rootNode()
|
|
|
|
if !rn.args.PreserveOwner {
|
|
|
|
ctx = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create ".name" file to store long file name (except in PlaintextNames mode)
|
|
|
|
var err error
|
2020-07-11 19:44:45 +02:00
|
|
|
ctx2 := toFuseCtx(ctx)
|
2020-07-11 19:23:04 +02:00
|
|
|
if !rn.args.PlaintextNames && nametransform.IsLongContent(cName) {
|
|
|
|
err := rn.nameTransform.WriteLongNameAt(dirfd, cName, name)
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Create "gocryptfs.longfile." device node
|
2020-07-11 19:44:45 +02:00
|
|
|
err = syscallcompat.MknodatUser(dirfd, cName, mode, int(rdev), ctx2)
|
2020-07-11 19:23:04 +02:00
|
|
|
if err != nil {
|
|
|
|
nametransform.DeleteLongNameAt(dirfd, cName)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Create regular device node
|
2020-07-11 19:44:45 +02:00
|
|
|
err = syscallcompat.MknodatUser(dirfd, cName, mode, int(rdev), ctx2)
|
2020-07-11 19:23:04 +02:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
st, err := syscallcompat.Fstatat2(dirfd, cName, unix.AT_SYMLINK_NOFOLLOW)
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
inode = n.newChild(ctx, st, out)
|
|
|
|
return inode, 0
|
|
|
|
}
|
2020-07-11 19:32:38 +02:00
|
|
|
|
|
|
|
// Link - FUSE call. Creates a hard link at "newPath" pointing to file
|
|
|
|
// "oldPath".
|
|
|
|
//
|
|
|
|
// Symlink-safe through use of Linkat().
|
|
|
|
func (n *Node) Link(ctx context.Context, target fs.InodeEmbedder, name string, out *fuse.EntryOut) (inode *fs.Inode, errno syscall.Errno) {
|
|
|
|
dirfd, cName, errno := n.prepareAtSyscall(name)
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
|
|
|
|
2020-07-11 20:27:47 +02:00
|
|
|
n2 := toNode(target)
|
2020-07-11 19:32:38 +02:00
|
|
|
dirfd2, cName2, errno := n2.prepareAtSyscall("")
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd2)
|
|
|
|
|
|
|
|
// Handle long file name (except in PlaintextNames mode)
|
|
|
|
rn := n.rootNode()
|
|
|
|
var err error
|
|
|
|
if !rn.args.PlaintextNames && nametransform.IsLongContent(cName) {
|
|
|
|
err = rn.nameTransform.WriteLongNameAt(dirfd, cName, name)
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Create "gocryptfs.longfile." link
|
2021-06-05 15:06:30 +02:00
|
|
|
err = unix.Linkat(dirfd2, cName2, dirfd, cName, 0)
|
2020-07-11 19:32:38 +02:00
|
|
|
if err != nil {
|
|
|
|
nametransform.DeleteLongNameAt(dirfd, cName)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Create regular link
|
2021-06-05 15:06:30 +02:00
|
|
|
err = unix.Linkat(dirfd2, cName2, dirfd, cName, 0)
|
2020-07-11 19:32:38 +02:00
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
st, err := syscallcompat.Fstatat2(dirfd, cName, unix.AT_SYMLINK_NOFOLLOW)
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
inode = n.newChild(ctx, st, out)
|
|
|
|
return inode, 0
|
|
|
|
}
|
2020-07-11 19:43:07 +02:00
|
|
|
|
|
|
|
// Symlink - FUSE call. Create a symlink.
|
|
|
|
//
|
|
|
|
// Symlink-safe through use of Symlinkat.
|
|
|
|
func (n *Node) Symlink(ctx context.Context, target, name string, out *fuse.EntryOut) (inode *fs.Inode, errno syscall.Errno) {
|
|
|
|
dirfd, cName, errno := n.prepareAtSyscall(name)
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
|
|
|
|
|
|
|
// Make sure context is nil if we don't want to preserve the owner
|
|
|
|
rn := n.rootNode()
|
|
|
|
if !rn.args.PreserveOwner {
|
|
|
|
ctx = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
cTarget := target
|
|
|
|
if !rn.args.PlaintextNames {
|
|
|
|
// Symlinks are encrypted like file contents (GCM) and base64-encoded
|
|
|
|
cTarget = rn.encryptSymlinkTarget(target)
|
|
|
|
}
|
|
|
|
// Create ".name" file to store long file name (except in PlaintextNames mode)
|
|
|
|
var err error
|
|
|
|
ctx2 := toFuseCtx(ctx)
|
|
|
|
if !rn.args.PlaintextNames && nametransform.IsLongContent(cName) {
|
|
|
|
err = rn.nameTransform.WriteLongNameAt(dirfd, cName, name)
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Create "gocryptfs.longfile." symlink
|
|
|
|
err = syscallcompat.SymlinkatUser(cTarget, dirfd, cName, ctx2)
|
|
|
|
if err != nil {
|
|
|
|
nametransform.DeleteLongNameAt(dirfd, cName)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Create symlink
|
|
|
|
err = syscallcompat.SymlinkatUser(cTarget, dirfd, cName, ctx2)
|
|
|
|
}
|
|
|
|
|
|
|
|
st, err := syscallcompat.Fstatat2(dirfd, cName, unix.AT_SYMLINK_NOFOLLOW)
|
|
|
|
if err != nil {
|
|
|
|
errno = fs.ToErrno(err)
|
|
|
|
return
|
|
|
|
}
|
2021-06-06 19:22:16 +02:00
|
|
|
// Report the plaintext size, not the encrypted blob size
|
|
|
|
st.Size = int64(len(target))
|
|
|
|
|
2020-07-11 19:43:07 +02:00
|
|
|
inode = n.newChild(ctx, st, out)
|
|
|
|
return inode, 0
|
|
|
|
}
|
2020-07-11 19:56:45 +02:00
|
|
|
|
2021-05-08 15:39:49 +02:00
|
|
|
// xfstests generic/013 now also exercises RENAME_EXCHANGE and RENAME_WHITEOUT,
|
|
|
|
// uncovering lots of problems with longnames
|
|
|
|
//
|
|
|
|
// Reject those flags with syscall.EINVAL.
|
|
|
|
// If we can handle the flags, this function returns 0.
|
|
|
|
func rejectRenameFlags(flags uint32) syscall.Errno {
|
2021-05-15 17:19:49 +02:00
|
|
|
// Normal rename, we can handle that
|
|
|
|
if flags == 0 {
|
2021-05-08 15:39:49 +02:00
|
|
|
return 0
|
2021-05-15 17:19:49 +02:00
|
|
|
}
|
|
|
|
// We also can handle RENAME_NOREPLACE
|
|
|
|
if flags == syscallcompat.RENAME_NOREPLACE {
|
2021-05-08 15:39:49 +02:00
|
|
|
return 0
|
|
|
|
}
|
2021-05-15 17:19:49 +02:00
|
|
|
// We cannot handle RENAME_EXCHANGE and RENAME_WHITEOUT yet.
|
|
|
|
// Needs extra code for .name files.
|
|
|
|
return syscall.EINVAL
|
2021-05-08 15:39:49 +02:00
|
|
|
}
|
|
|
|
|
2020-07-11 19:56:45 +02:00
|
|
|
// Rename - FUSE call.
|
2020-07-12 13:53:47 +02:00
|
|
|
// This function is called on the PARENT DIRECTORY of `name`.
|
2020-07-11 19:56:45 +02:00
|
|
|
//
|
|
|
|
// Symlink-safe through Renameat().
|
|
|
|
func (n *Node) Rename(ctx context.Context, name string, newParent fs.InodeEmbedder, newName string, flags uint32) (errno syscall.Errno) {
|
2021-05-08 15:39:49 +02:00
|
|
|
if errno = rejectRenameFlags(flags); errno != 0 {
|
|
|
|
return errno
|
|
|
|
}
|
|
|
|
|
2020-07-11 19:56:45 +02:00
|
|
|
dirfd, cName, errno := n.prepareAtSyscall(name)
|
|
|
|
if errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd)
|
|
|
|
|
2020-07-11 20:27:47 +02:00
|
|
|
n2 := toNode(newParent)
|
2020-07-12 13:53:47 +02:00
|
|
|
dirfd2, cName2, errno := n2.prepareAtSyscall(newName)
|
2020-07-11 19:56:45 +02:00
|
|
|
if errno != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer syscall.Close(dirfd2)
|
|
|
|
|
|
|
|
// Easy case.
|
|
|
|
rn := n.rootNode()
|
|
|
|
if rn.args.PlaintextNames {
|
2020-09-09 11:17:19 +02:00
|
|
|
return fs.ToErrno(syscallcompat.Renameat2(dirfd, cName, dirfd2, cName2, uint(flags)))
|
2020-07-11 19:56:45 +02:00
|
|
|
}
|
|
|
|
// Long destination file name: create .name file
|
|
|
|
nameFileAlreadyThere := false
|
|
|
|
var err error
|
|
|
|
if nametransform.IsLongContent(cName2) {
|
|
|
|
err = rn.nameTransform.WriteLongNameAt(dirfd2, cName2, newName)
|
|
|
|
// Failure to write the .name file is expected when the target path already
|
|
|
|
// exists. Since hashes are pretty unique, there is no need to modify the
|
|
|
|
// .name file in this case, and we ignore the error.
|
|
|
|
if err == syscall.EEXIST {
|
|
|
|
nameFileAlreadyThere = true
|
|
|
|
} else if err != nil {
|
|
|
|
return fs.ToErrno(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Actual rename
|
|
|
|
tlog.Debug.Printf("Renameat %d/%s -> %d/%s\n", dirfd, cName, dirfd2, cName2)
|
2020-09-09 11:17:19 +02:00
|
|
|
err = syscallcompat.Renameat2(dirfd, cName, dirfd2, cName2, uint(flags))
|
|
|
|
if (flags&syscallcompat.RENAME_NOREPLACE == 0) && (err == syscall.ENOTEMPTY || err == syscall.EEXIST) {
|
2020-07-11 19:56:45 +02:00
|
|
|
// If an empty directory is overwritten we will always get an error as
|
|
|
|
// the "empty" directory will still contain gocryptfs.diriv.
|
|
|
|
// Interestingly, ext4 returns ENOTEMPTY while xfs returns EEXIST.
|
|
|
|
// We handle that by trying to fs.Rmdir() the target directory and trying
|
|
|
|
// again.
|
|
|
|
tlog.Debug.Printf("Rename: Handling ENOTEMPTY")
|
|
|
|
if n2.Rmdir(ctx, newName) == 0 {
|
2020-09-09 11:17:19 +02:00
|
|
|
err = syscallcompat.Renameat2(dirfd, cName, dirfd2, cName2, uint(flags))
|
2020-07-11 19:56:45 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
if nametransform.IsLongContent(cName2) && nameFileAlreadyThere == false {
|
|
|
|
// Roll back .name creation unless the .name file was already there
|
|
|
|
nametransform.DeleteLongNameAt(dirfd2, cName2)
|
|
|
|
}
|
|
|
|
return fs.ToErrno(err)
|
|
|
|
}
|
|
|
|
if nametransform.IsLongContent(cName) {
|
|
|
|
nametransform.DeleteLongNameAt(dirfd, cName)
|
|
|
|
}
|
|
|
|
return 0
|
|
|
|
}
|