Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Dec 2025 22:41:23 +0000
From:      Dag-Erling=?utf-8?Q? Sm=C3=B8rg?=rav <des@FreeBSD.org>
To:        src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-main@FreeBSD.org
Subject:   git: a678e87f5533 - main - unionfs: Support renaming symbolic links
Message-ID:  <69433193.a340.2abd3248@gitrepo.freebsd.org>

index | next in thread | raw e-mail

The branch main has been updated by des:

URL: https://cgit.FreeBSD.org/src/commit/?id=a678e87f5533521f6dec1a4e85c3decb1c3b6584

commit a678e87f5533521f6dec1a4e85c3decb1c3b6584
Author:     Dag-Erling Smørgrav <des@FreeBSD.org>
AuthorDate: 2025-12-17 22:38:11 +0000
Commit:     Dag-Erling Smørgrav <des@FreeBSD.org>
CommitDate: 2025-12-17 22:40:59 +0000

    unionfs: Support renaming symbolic links
    
    This adds support for renaming a symbolic link found on the lower fs,
    which necessitates copying it to the upper fs, as well as basic tests.
    
    MFC after:      1 week
    Sponsored by:   Klara, Inc.
    Sponsored by:   NetApp, Inc.
    Reviewed by:    olce, siderop1_netapp.com, jah
    Differential Revision:  https://reviews.freebsd.org/D54229
---
 etc/mtree/BSD.tests.dist             |   2 +
 sys/fs/unionfs/union.h               |   1 +
 sys/fs/unionfs/union_subr.c          | 168 +++++++++++++++++++++++++++++++++++
 sys/fs/unionfs/union_vnops.c         |  10 +++
 tests/sys/fs/Makefile                |   1 +
 tests/sys/fs/unionfs/Makefile        |   8 ++
 tests/sys/fs/unionfs/unionfs_test.sh | 165 ++++++++++++++++++++++++++++++++++
 7 files changed, 355 insertions(+)

diff --git a/etc/mtree/BSD.tests.dist b/etc/mtree/BSD.tests.dist
index e2b8c8ede325..5d004964e4e2 100644
--- a/etc/mtree/BSD.tests.dist
+++ b/etc/mtree/BSD.tests.dist
@@ -826,6 +826,8 @@
             ..
             tmpfs
             ..
+            unionfs
+            ..
         ..
         geom
             class
diff --git a/sys/fs/unionfs/union.h b/sys/fs/unionfs/union.h
index 0bd1894a2195..fe5a578ef4dc 100644
--- a/sys/fs/unionfs/union.h
+++ b/sys/fs/unionfs/union.h
@@ -142,6 +142,7 @@ void	unionfs_tryrem_node_status(struct unionfs_node *,
 int	unionfs_check_rmdir(struct vnode *, struct ucred *, struct thread *td);
 int	unionfs_copyfile(struct vnode *, int, struct ucred *,
 	    struct thread *);
+int	unionfs_copylink(struct vnode *, struct ucred *, struct thread *);
 void	unionfs_create_uppervattr_core(struct unionfs_mount *, struct vattr *,
 	    struct vattr *, struct thread *);
 int	unionfs_create_uppervattr(struct unionfs_mount *, struct vnode *,
diff --git a/sys/fs/unionfs/union_subr.c b/sys/fs/unionfs/union_subr.c
index b6d6db60ca3d..0774d4fb69be 100644
--- a/sys/fs/unionfs/union_subr.c
+++ b/sys/fs/unionfs/union_subr.c
@@ -1516,6 +1516,174 @@ unionfs_copyfile_cleanup:
 	return (error);
 }
 
+/*
+ * Create a new symbolic link on upper.
+ *
+ * If an error is returned, *vpp will be invalid, otherwise it will hold a
+ * locked, referenced and opened vnode.
+ *
+ * unp is never updated.
+ */
+static int
+unionfs_vn_symlink_on_upper(struct vnode **vpp, struct vnode *udvp,
+    struct vnode *vp, struct vattr *uvap, const char *target,
+    struct thread *td)
+{
+	struct unionfs_mount *ump;
+	struct unionfs_node *unp;
+	struct vnode   *uvp;
+	struct vnode   *lvp;
+	struct ucred   *cred;
+	struct vattr	lva;
+	struct nameidata nd;
+	int		error;
+
+	ASSERT_VOP_ELOCKED(vp, __func__);
+	unp = VTOUNIONFS(vp);
+	ump = MOUNTTOUNIONFSMOUNT(UNIONFSTOV(unp)->v_mount);
+	uvp = NULL;
+	lvp = unp->un_lowervp;
+	cred = td->td_ucred;
+	error = 0;
+
+	if ((error = VOP_GETATTR(lvp, &lva, cred)) != 0)
+		return (error);
+	unionfs_create_uppervattr_core(ump, &lva, uvap, td);
+
+	if (unp->un_path == NULL)
+		panic("%s: NULL un_path", __func__);
+
+	nd.ni_cnd.cn_namelen = unp->un_pathlen;
+	nd.ni_cnd.cn_pnbuf = unp->un_path;
+	nd.ni_cnd.cn_nameiop = CREATE;
+	nd.ni_cnd.cn_flags = LOCKPARENT | LOCKLEAF | ISLASTCN;
+	nd.ni_cnd.cn_lkflags = LK_EXCLUSIVE;
+	nd.ni_cnd.cn_cred = cred;
+	nd.ni_cnd.cn_nameptr = nd.ni_cnd.cn_pnbuf;
+	NDPREINIT(&nd);
+
+	vref(udvp);
+	VOP_UNLOCK(vp);
+	if ((error = vfs_relookup(udvp, &uvp, &nd.ni_cnd, false)) != 0) {
+		vrele(udvp);
+		return (error);
+	}
+
+	if (uvp != NULL) {
+		if (uvp == udvp)
+			vrele(uvp);
+		else
+			vput(uvp);
+		error = EEXIST;
+		goto unionfs_vn_symlink_on_upper_cleanup;
+	}
+
+	error = VOP_SYMLINK(udvp, &uvp, &nd.ni_cnd, uvap, target);
+	if (error == 0)
+		*vpp = uvp;
+
+unionfs_vn_symlink_on_upper_cleanup:
+	vput(udvp);
+	return (error);
+}
+
+/*
+ * Copy symbolic link from lower to upper.
+ *
+ * vp is a unionfs vnode that should be locked on entry and will be
+ * locked on return.
+ *
+ * If no error returned, unp will be updated.
+ */
+int
+unionfs_copylink(struct vnode *vp, struct ucred *cred,
+    struct thread *td)
+{
+	struct unionfs_node *unp;
+	struct unionfs_node *dunp;
+	struct mount   *mp;
+	struct vnode   *udvp;
+	struct vnode   *lvp;
+	struct vnode   *uvp;
+	struct vattr	uva;
+	char	       *buf = NULL;
+	struct uio	uio;
+	struct iovec	iov;
+	int		error;
+
+	ASSERT_VOP_ELOCKED(vp, __func__);
+	unp = VTOUNIONFS(vp);
+	lvp = unp->un_lowervp;
+	uvp = NULL;
+
+	if ((UNIONFSTOV(unp)->v_mount->mnt_flag & MNT_RDONLY))
+		return (EROFS);
+	if (unp->un_dvp == NULL)
+		return (EINVAL);
+	if (unp->un_uppervp != NULL)
+		return (EEXIST);
+
+	udvp = NULL;
+	VI_LOCK(unp->un_dvp);
+	dunp = VTOUNIONFS(unp->un_dvp);
+	if (dunp != NULL)
+		udvp = dunp->un_uppervp;
+	VI_UNLOCK(unp->un_dvp);
+
+	if (udvp == NULL)
+		return (EROFS);
+	if ((udvp->v_mount->mnt_flag & MNT_RDONLY))
+		return (EROFS);
+	ASSERT_VOP_UNLOCKED(udvp, __func__);
+
+	error = unionfs_set_in_progress_flag(vp, UNIONFS_COPY_IN_PROGRESS);
+	if (error == EJUSTRETURN)
+		return (0);
+	else if (error != 0)
+		return (error);
+
+	uio.uio_td = td;
+	uio.uio_segflg = UIO_SYSSPACE;
+	uio.uio_offset = 0;
+	uio.uio_iov = &iov;
+	uio.uio_iovcnt = 1;
+	iov.iov_base = buf = malloc(MAXPATHLEN, M_TEMP, M_WAITOK);
+	uio.uio_resid = iov.iov_len = MAXPATHLEN;
+	uio.uio_rw = UIO_READ;
+
+	if ((error = VOP_READLINK(lvp, &uio, cred)) != 0)
+		goto unionfs_copylink_cleanup;
+	buf[iov.iov_len - uio.uio_resid] = '\0';
+	if ((error = vn_start_write(udvp, &mp, V_WAIT | V_PCATCH)) != 0)
+		goto unionfs_copylink_cleanup;
+	error = unionfs_vn_symlink_on_upper(&uvp, udvp, vp, &uva, buf, td);
+	vn_finished_write(mp);
+	if (error != 0) {
+		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
+		goto unionfs_copylink_cleanup;
+	}
+
+	vn_lock_pair(vp, false, LK_EXCLUSIVE, uvp, true, LK_EXCLUSIVE);
+	unp = VTOUNIONFS(vp);
+	if (unp == NULL) {
+		error = ENOENT;
+		goto unionfs_copylink_cleanup;
+	}
+
+	if (error == 0) {
+		/* Reset the attributes. Ignore errors. */
+		uva.va_type = VNON;
+		VOP_SETATTR(uvp, &uva, cred);
+		unionfs_node_update(unp, uvp, td);
+	}
+
+unionfs_copylink_cleanup:
+	if (buf != NULL)
+		free(buf, M_TEMP);
+	unionfs_clear_in_progress_flag(vp, UNIONFS_COPY_IN_PROGRESS);
+	return (error);
+}
+
 /*
  * Determine if the unionfs view of a directory is empty such that
  * an rmdir operation can be permitted.
diff --git a/sys/fs/unionfs/union_vnops.c b/sys/fs/unionfs/union_vnops.c
index 060863866fcf..cefd591a9a0f 100644
--- a/sys/fs/unionfs/union_vnops.c
+++ b/sys/fs/unionfs/union_vnops.c
@@ -1478,6 +1478,13 @@ unionfs_rename(struct vop_rename_args *ap)
 			 */
 			VOP_UNLOCK(tdvp);
 			relock_tdvp = true;
+		} else if (fvp->v_type == VLNK) {
+			/*
+			 * The symbolic link case is similar to the
+			 * regular file case.
+			 */
+			VOP_UNLOCK(tdvp);
+			relock_tdvp = true;
 		} else if (fvp->v_type == VDIR && tdvp != fdvp) {
 			/*
 			 * For directories, unionfs_mkshadowdir() will expect
@@ -1501,6 +1508,9 @@ unionfs_rename(struct vop_rename_args *ap)
 			case VREG:
 				error = unionfs_copyfile(fvp, 1, fcnp->cn_cred, td);
 				break;
+			case VLNK:
+				error = unionfs_copylink(fvp, fcnp->cn_cred, td);
+				break;
 			case VDIR:
 				error = unionfs_mkshadowdir(fdvp, fvp, fcnp, td);
 				break;
diff --git a/tests/sys/fs/Makefile b/tests/sys/fs/Makefile
index e36a97d2335a..254394f43714 100644
--- a/tests/sys/fs/Makefile
+++ b/tests/sys/fs/Makefile
@@ -14,6 +14,7 @@ TESTS_SUBDIRS+=		fusefs
 .endif
 TESTS_SUBDIRS+=		tarfs
 TESTS_SUBDIRS+=		tmpfs
+TESTS_SUBDIRS+=		unionfs
 
 ${PACKAGE}FILES+=	h_funcs.subr
 ${PACKAGE}FILESDIR=	${TESTSDIR}
diff --git a/tests/sys/fs/unionfs/Makefile b/tests/sys/fs/unionfs/Makefile
new file mode 100644
index 000000000000..da25fcefb473
--- /dev/null
+++ b/tests/sys/fs/unionfs/Makefile
@@ -0,0 +1,8 @@
+PACKAGE=	tests
+
+TESTSDIR=	${TESTSBASE}/sys/fs/unionfs
+BINDIR=		${TESTSDIR}
+
+ATF_TESTS_SH+=	unionfs_test
+
+.include <bsd.test.mk>
diff --git a/tests/sys/fs/unionfs/unionfs_test.sh b/tests/sys/fs/unionfs/unionfs_test.sh
new file mode 100644
index 000000000000..ee8a9bae19e7
--- /dev/null
+++ b/tests/sys/fs/unionfs/unionfs_test.sh
@@ -0,0 +1,165 @@
+#!/bin/sh
+#-
+# SPDX-License-Identifier: BSD-2-Clause
+#
+# Copyright (c) 2025 Klara, Inc.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+#    notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+#    notice, this list of conditions and the following disclaimer in the
+#    documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+
+# Create and mount a filesystem for use in our tests
+unionfs_mkfs() {
+	local name=$1
+	local size=${2:-1}
+	# Create mountpoint
+	atf_check mkdir ${name}
+	# Create filesystem image
+	atf_check -e ignore dd if=/dev/zero of=${name}.img bs=1m count=${size}
+	echo ${name} >>imgs
+	# Create memory disk
+	atf_check -o save:${name}.md mdconfig ${name}.img
+	md=$(cat ${name}.md)
+	echo ${md} >>mds
+	# Format and mount filesystem
+	atf_check -o ignore newfs /dev/${md}
+	atf_check mount /dev/${md} ${name}
+	echo ${name} >>mounts
+}
+
+# Mount a unionfs
+unionfs_mount() {
+	local upper=$1
+	local lower=$2
+	# Mount upper over lower
+	atf_check mount -t unionfs ${upper} ${lower}
+	echo ${lower} >>mounts
+}
+
+# Clean up after a test
+unionfs_cleanup() {
+	# Unmount filesystems
+	if [ -f mounts ]; then
+		tail -r mounts | while read mount; do
+			umount ${mount} || true
+		done
+	fi
+	# Destroy memory disks
+	if [ -f mds ]; then
+		tail -r mds | while read md; do
+			mdconfig -d -u ${md} || true
+		done
+	fi
+	# Delete filesystem images and mountpoints
+	if [ -f imgs ]; then
+		tail -r imgs | while read name; do
+			rm -f ${name}.img || true
+			rmdir ${name} || true
+		done
+	fi
+}
+
+atf_test_case unionfs_basic cleanup
+unionfs_basic_head() {
+	atf_set "descr" "Basic function test"
+	atf_set "require.user" "root"
+	atf_set "require.kmods" "unionfs"
+}
+unionfs_basic_body() {
+	# Create upper and lower
+	unionfs_mkfs upper
+	unionfs_mkfs lower
+	# Mount upper over lower
+	unionfs_mount upper lower
+	# Create object on unionfs
+	atf_check touch upper/file
+	atf_check mkdir upper/dir
+	atf_check touch lower/dir/file
+	# Verify that objects were created on upper
+	atf_check test -f lower/file
+	atf_check test -d lower/dir
+	atf_check test -f upper/dir/file
+}
+unionfs_basic_cleanup() {
+	unionfs_cleanup
+}
+
+atf_test_case unionfs_exec cleanup
+unionfs_exec_head() {
+	atf_set "descr" "Test executing programs"
+	atf_set "require.user" "root"
+	atf_set "require.kmods" "unionfs"
+}
+unionfs_exec_body() {
+	# Create upper and copy a binary to it
+	unionfs_mkfs upper
+	atf_check cp -p /usr/bin/true upper/upper
+	# Create lower and copy a binary to it
+	unionfs_mkfs lower
+	atf_check cp -p /usr/bin/true lower/lower
+	# Mount upper over lower
+	unionfs_mount upper lower
+	# Execute both binaries
+	atf_check lower/lower
+	atf_check lower/upper
+}
+unionfs_exec_cleanup() {
+	unionfs_cleanup
+}
+
+atf_test_case unionfs_rename cleanup
+unionfs_rename_head() {
+	atf_set "descr" "Test renaming objects on lower"
+	atf_set "require.user" "root"
+	atf_set "require.kmods" "unionfs"
+}
+unionfs_rename_body() {
+	# Create upper and lower
+	unionfs_mkfs upper
+	unionfs_mkfs lower
+	# Create objects on lower
+	atf_check touch lower/file
+	atf_check mkdir lower/dir
+	atf_check ln -s dead lower/link
+	# Mount upper over lower
+	unionfs_mount upper lower
+	# Rename objects
+	atf_check mv lower/file lower/newfile
+	atf_check mv lower/dir lower/newdir
+	atf_check mv lower/link lower/newlink
+	# Verify that old names no longer exist
+	atf_check test ! -f lower/file
+	atf_check test ! -d lower/dir
+	atf_check test ! -L lower/link
+	# Verify that new names exist on upper
+	atf_check test -f upper/newfile
+	atf_check test -d upper/newdir
+	atf_check test -L upper/newlink
+}
+unionfs_rename_cleanup() {
+	unionfs_cleanup
+}
+
+atf_init_test_cases() {
+	atf_add_test_case unionfs_basic
+	atf_add_test_case unionfs_exec
+	atf_add_test_case unionfs_rename
+}


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69433193.a340.2abd3248>