22db15c06f
conjuction with 'thread' argument passing which is always curthread. Remove the unuseful extra-argument and pass explicitly curthread to lower layer functions, when necessary. KPI results broken by this change, which should affect several ports, so version bumping and manpage update will be further committed. Tested by: kris, pho, Diego Sardina <siarodx at gmail dot com>
1272 lines
30 KiB
C
1272 lines
30 KiB
C
/*-
|
|
* Copyright (c) 2000-2001 Boris Popov
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by Boris Popov.
|
|
* 4. Neither the name of the author nor the names of any co-contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/namei.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/bio.h>
|
|
#include <sys/buf.h>
|
|
#include <sys/fcntl.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/unistd.h>
|
|
#include <sys/vnode.h>
|
|
#include <sys/limits.h>
|
|
#include <sys/lockf.h>
|
|
#include <sys/stat.h>
|
|
|
|
#include <vm/vm.h>
|
|
#include <vm/vm_extern.h>
|
|
|
|
|
|
#include <netsmb/smb.h>
|
|
#include <netsmb/smb_conn.h>
|
|
#include <netsmb/smb_subr.h>
|
|
|
|
#include <fs/smbfs/smbfs.h>
|
|
#include <fs/smbfs/smbfs_node.h>
|
|
#include <fs/smbfs/smbfs_subr.h>
|
|
|
|
/*
|
|
* Prototypes for SMBFS vnode operations
|
|
*/
|
|
static vop_create_t smbfs_create;
|
|
static vop_mknod_t smbfs_mknod;
|
|
static vop_open_t smbfs_open;
|
|
static vop_close_t smbfs_close;
|
|
static vop_access_t smbfs_access;
|
|
static vop_getattr_t smbfs_getattr;
|
|
static vop_setattr_t smbfs_setattr;
|
|
static vop_read_t smbfs_read;
|
|
static vop_write_t smbfs_write;
|
|
static vop_fsync_t smbfs_fsync;
|
|
static vop_remove_t smbfs_remove;
|
|
static vop_link_t smbfs_link;
|
|
static vop_lookup_t smbfs_lookup;
|
|
static vop_rename_t smbfs_rename;
|
|
static vop_mkdir_t smbfs_mkdir;
|
|
static vop_rmdir_t smbfs_rmdir;
|
|
static vop_symlink_t smbfs_symlink;
|
|
static vop_readdir_t smbfs_readdir;
|
|
static vop_strategy_t smbfs_strategy;
|
|
static vop_print_t smbfs_print;
|
|
static vop_pathconf_t smbfs_pathconf;
|
|
static vop_advlock_t smbfs_advlock;
|
|
static vop_getextattr_t smbfs_getextattr;
|
|
|
|
struct vop_vector smbfs_vnodeops = {
|
|
.vop_default = &default_vnodeops,
|
|
|
|
.vop_access = smbfs_access,
|
|
.vop_advlock = smbfs_advlock,
|
|
.vop_close = smbfs_close,
|
|
.vop_create = smbfs_create,
|
|
.vop_fsync = smbfs_fsync,
|
|
.vop_getattr = smbfs_getattr,
|
|
.vop_getextattr = smbfs_getextattr,
|
|
.vop_getpages = smbfs_getpages,
|
|
.vop_inactive = smbfs_inactive,
|
|
.vop_ioctl = smbfs_ioctl,
|
|
.vop_link = smbfs_link,
|
|
.vop_lookup = smbfs_lookup,
|
|
.vop_mkdir = smbfs_mkdir,
|
|
.vop_mknod = smbfs_mknod,
|
|
.vop_open = smbfs_open,
|
|
.vop_pathconf = smbfs_pathconf,
|
|
.vop_print = smbfs_print,
|
|
.vop_putpages = smbfs_putpages,
|
|
.vop_read = smbfs_read,
|
|
.vop_readdir = smbfs_readdir,
|
|
.vop_reclaim = smbfs_reclaim,
|
|
.vop_remove = smbfs_remove,
|
|
.vop_rename = smbfs_rename,
|
|
.vop_rmdir = smbfs_rmdir,
|
|
.vop_setattr = smbfs_setattr,
|
|
/* .vop_setextattr = smbfs_setextattr,*/
|
|
.vop_strategy = smbfs_strategy,
|
|
.vop_symlink = smbfs_symlink,
|
|
.vop_write = smbfs_write,
|
|
};
|
|
|
|
static int
|
|
smbfs_access(ap)
|
|
struct vop_access_args /* {
|
|
struct vnode *a_vp;
|
|
int a_mode;
|
|
struct ucred *a_cred;
|
|
struct thread *a_td;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
mode_t mode = ap->a_mode;
|
|
mode_t mpmode;
|
|
struct smbmount *smp = VTOSMBFS(vp);
|
|
|
|
SMBVDEBUG("\n");
|
|
if ((mode & VWRITE) && (vp->v_mount->mnt_flag & MNT_RDONLY)) {
|
|
switch (vp->v_type) {
|
|
case VREG: case VDIR: case VLNK:
|
|
return EROFS;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
mpmode = vp->v_type == VREG ? smp->sm_file_mode : smp->sm_dir_mode;
|
|
return (vaccess(vp->v_type, mpmode, smp->sm_uid,
|
|
smp->sm_gid, ap->a_mode, ap->a_cred, NULL));
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static int
|
|
smbfs_open(ap)
|
|
struct vop_open_args /* {
|
|
struct vnode *a_vp;
|
|
int a_mode;
|
|
struct ucred *a_cred;
|
|
struct thread *a_td;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct smb_cred scred;
|
|
struct vattr vattr;
|
|
int mode = ap->a_mode;
|
|
int error, accmode;
|
|
|
|
SMBVDEBUG("%s,%d\n", np->n_name, (np->n_flag & NOPEN) != 0);
|
|
if (vp->v_type != VREG && vp->v_type != VDIR) {
|
|
SMBFSERR("open eacces vtype=%d\n", vp->v_type);
|
|
return EACCES;
|
|
}
|
|
if (vp->v_type == VDIR) {
|
|
np->n_flag |= NOPEN;
|
|
return 0;
|
|
}
|
|
if (np->n_flag & NMODIFIED) {
|
|
if ((error = smbfs_vinvalbuf(vp, ap->a_td)) == EINTR)
|
|
return error;
|
|
smbfs_attr_cacheremove(vp);
|
|
error = VOP_GETATTR(vp, &vattr, ap->a_cred, ap->a_td);
|
|
if (error)
|
|
return error;
|
|
np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
|
|
} else {
|
|
error = VOP_GETATTR(vp, &vattr, ap->a_cred, ap->a_td);
|
|
if (error)
|
|
return error;
|
|
if (np->n_mtime.tv_sec != vattr.va_mtime.tv_sec) {
|
|
error = smbfs_vinvalbuf(vp, ap->a_td);
|
|
if (error == EINTR)
|
|
return error;
|
|
np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
|
|
}
|
|
}
|
|
if ((np->n_flag & NOPEN) != 0)
|
|
return 0;
|
|
/*
|
|
* Use DENYNONE to give unixy semantics of permitting
|
|
* everything not forbidden by permissions. Ie denial
|
|
* is up to server with clients/openers needing to use
|
|
* advisory locks for further control.
|
|
*/
|
|
accmode = SMB_SM_DENYNONE|SMB_AM_OPENREAD;
|
|
if ((vp->v_mount->mnt_flag & MNT_RDONLY) == 0)
|
|
accmode = SMB_SM_DENYNONE|SMB_AM_OPENRW;
|
|
smb_makescred(&scred, ap->a_td, ap->a_cred);
|
|
error = smbfs_smb_open(np, accmode, &scred);
|
|
if (error) {
|
|
if (mode & FWRITE)
|
|
return EACCES;
|
|
else if ((vp->v_mount->mnt_flag & MNT_RDONLY) == 0) {
|
|
accmode = SMB_SM_DENYNONE|SMB_AM_OPENREAD;
|
|
error = smbfs_smb_open(np, accmode, &scred);
|
|
}
|
|
}
|
|
if (error == 0) {
|
|
np->n_flag |= NOPEN;
|
|
vnode_create_vobject(ap->a_vp, vattr.va_size, ap->a_td);
|
|
}
|
|
smbfs_attr_cacheremove(vp);
|
|
return error;
|
|
}
|
|
|
|
static int
|
|
smbfs_close(ap)
|
|
struct vop_close_args /* {
|
|
struct vnodeop_desc *a_desc;
|
|
struct vnode *a_vp;
|
|
int a_fflag;
|
|
struct ucred *a_cred;
|
|
struct thread *a_td;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct thread *td = ap->a_td;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct smb_cred scred;
|
|
|
|
if (vp->v_type == VDIR && (np->n_flag & NOPEN) != 0 &&
|
|
np->n_dirseq != NULL) {
|
|
smb_makescred(&scred, td, ap->a_cred);
|
|
smbfs_findclose(np->n_dirseq, &scred);
|
|
np->n_dirseq = NULL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* smbfs_getattr call from vfs.
|
|
*/
|
|
static int
|
|
smbfs_getattr(ap)
|
|
struct vop_getattr_args /* {
|
|
struct vnode *a_vp;
|
|
struct vattr *a_vap;
|
|
struct ucred *a_cred;
|
|
struct thread *a_td;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct vattr *va=ap->a_vap;
|
|
struct smbfattr fattr;
|
|
struct smb_cred scred;
|
|
u_quad_t oldsize;
|
|
int error;
|
|
|
|
SMBVDEBUG("%lx: '%s' %d\n", (long)vp, np->n_name, (vp->v_vflag & VV_ROOT) != 0);
|
|
error = smbfs_attr_cachelookup(vp, va);
|
|
if (!error)
|
|
return 0;
|
|
SMBVDEBUG("not in the cache\n");
|
|
smb_makescred(&scred, ap->a_td, ap->a_cred);
|
|
oldsize = np->n_size;
|
|
error = smbfs_smb_lookup(np, NULL, 0, &fattr, &scred);
|
|
if (error) {
|
|
SMBVDEBUG("error %d\n", error);
|
|
return error;
|
|
}
|
|
smbfs_attr_cacheenter(vp, &fattr);
|
|
smbfs_attr_cachelookup(vp, va);
|
|
if (np->n_flag & NOPEN)
|
|
np->n_size = oldsize;
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
smbfs_setattr(ap)
|
|
struct vop_setattr_args /* {
|
|
struct vnode *a_vp;
|
|
struct vattr *a_vap;
|
|
struct ucred *a_cred;
|
|
struct thread *a_td;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct vattr *vap = ap->a_vap;
|
|
struct timespec *mtime, *atime;
|
|
struct smb_cred scred;
|
|
struct smb_share *ssp = np->n_mount->sm_share;
|
|
struct smb_vc *vcp = SSTOVC(ssp);
|
|
u_quad_t tsize = 0;
|
|
int isreadonly, doclose, error = 0;
|
|
int old_n_dosattr;
|
|
|
|
SMBVDEBUG("\n");
|
|
if (vap->va_flags != VNOVAL)
|
|
return EOPNOTSUPP;
|
|
isreadonly = (vp->v_mount->mnt_flag & MNT_RDONLY);
|
|
/*
|
|
* Disallow write attempts if the filesystem is mounted read-only.
|
|
*/
|
|
if ((vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL ||
|
|
vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL ||
|
|
vap->va_mode != (mode_t)VNOVAL) && isreadonly)
|
|
return EROFS;
|
|
smb_makescred(&scred, ap->a_td, ap->a_cred);
|
|
if (vap->va_size != VNOVAL) {
|
|
switch (vp->v_type) {
|
|
case VDIR:
|
|
return EISDIR;
|
|
case VREG:
|
|
break;
|
|
default:
|
|
return EINVAL;
|
|
};
|
|
if (isreadonly)
|
|
return EROFS;
|
|
doclose = 0;
|
|
vnode_pager_setsize(vp, (u_long)vap->va_size);
|
|
tsize = np->n_size;
|
|
np->n_size = vap->va_size;
|
|
if ((np->n_flag & NOPEN) == 0) {
|
|
error = smbfs_smb_open(np,
|
|
SMB_SM_DENYNONE|SMB_AM_OPENRW,
|
|
&scred);
|
|
if (error == 0)
|
|
doclose = 1;
|
|
}
|
|
if (error == 0)
|
|
error = smbfs_smb_setfsize(np, vap->va_size, &scred);
|
|
if (doclose)
|
|
smbfs_smb_close(ssp, np->n_fid, NULL, &scred);
|
|
if (error) {
|
|
np->n_size = tsize;
|
|
vnode_pager_setsize(vp, (u_long)tsize);
|
|
return error;
|
|
}
|
|
}
|
|
if (vap->va_mode != (mode_t)VNOVAL) {
|
|
old_n_dosattr = np->n_dosattr;
|
|
if (vap->va_mode & S_IWUSR)
|
|
np->n_dosattr &= ~SMB_FA_RDONLY;
|
|
else
|
|
np->n_dosattr |= SMB_FA_RDONLY;
|
|
if (np->n_dosattr != old_n_dosattr) {
|
|
error = smbfs_smb_setpattr(np, np->n_dosattr, NULL, &scred);
|
|
if (error)
|
|
return error;
|
|
}
|
|
}
|
|
mtime = atime = NULL;
|
|
if (vap->va_mtime.tv_sec != VNOVAL)
|
|
mtime = &vap->va_mtime;
|
|
if (vap->va_atime.tv_sec != VNOVAL)
|
|
atime = &vap->va_atime;
|
|
if (mtime != atime) {
|
|
if (vap->va_vaflags & VA_UTIMES_NULL) {
|
|
error = VOP_ACCESS(vp, VADMIN, ap->a_cred, ap->a_td);
|
|
if (error)
|
|
error = VOP_ACCESS(vp, VWRITE, ap->a_cred,
|
|
ap->a_td);
|
|
} else
|
|
error = VOP_ACCESS(vp, VADMIN, ap->a_cred, ap->a_td);
|
|
#if 0
|
|
if (mtime == NULL)
|
|
mtime = &np->n_mtime;
|
|
if (atime == NULL)
|
|
atime = &np->n_atime;
|
|
#endif
|
|
/*
|
|
* If file is opened, then we can use handle based calls.
|
|
* If not, use path based ones.
|
|
*/
|
|
if ((np->n_flag & NOPEN) == 0) {
|
|
if (vcp->vc_flags & SMBV_WIN95) {
|
|
error = VOP_OPEN(vp, FWRITE, ap->a_cred, ap->a_td, NULL);
|
|
if (!error) {
|
|
/* error = smbfs_smb_setfattrNT(np, 0, mtime, atime, &scred);
|
|
VOP_GETATTR(vp, &vattr, ap->a_cred, ap->a_td);*/
|
|
if (mtime)
|
|
np->n_mtime = *mtime;
|
|
VOP_CLOSE(vp, FWRITE, ap->a_cred, ap->a_td);
|
|
}
|
|
} else if ((vcp->vc_sopt.sv_caps & SMB_CAP_NT_SMBS)) {
|
|
error = smbfs_smb_setptime2(np, mtime, atime, 0, &scred);
|
|
/* error = smbfs_smb_setpattrNT(np, 0, mtime, atime, &scred);*/
|
|
} else if (SMB_DIALECT(vcp) >= SMB_DIALECT_LANMAN2_0) {
|
|
error = smbfs_smb_setptime2(np, mtime, atime, 0, &scred);
|
|
} else {
|
|
error = smbfs_smb_setpattr(np, 0, mtime, &scred);
|
|
}
|
|
} else {
|
|
if (vcp->vc_sopt.sv_caps & SMB_CAP_NT_SMBS) {
|
|
error = smbfs_smb_setfattrNT(np, 0, mtime, atime, &scred);
|
|
} else if (SMB_DIALECT(vcp) >= SMB_DIALECT_LANMAN1_0) {
|
|
error = smbfs_smb_setftime(np, mtime, atime, &scred);
|
|
} else {
|
|
/*
|
|
* I have no idea how to handle this for core
|
|
* level servers. The possible solution is to
|
|
* update mtime after file is closed.
|
|
*/
|
|
SMBERROR("can't update times on an opened file\n");
|
|
}
|
|
}
|
|
}
|
|
/*
|
|
* Invalidate attribute cache in case if server doesn't set
|
|
* required attributes.
|
|
*/
|
|
smbfs_attr_cacheremove(vp); /* invalidate cache */
|
|
VOP_GETATTR(vp, vap, ap->a_cred, ap->a_td);
|
|
np->n_mtime.tv_sec = vap->va_mtime.tv_sec;
|
|
return error;
|
|
}
|
|
/*
|
|
* smbfs_read call.
|
|
*/
|
|
static int
|
|
smbfs_read(ap)
|
|
struct vop_read_args /* {
|
|
struct vnode *a_vp;
|
|
struct uio *a_uio;
|
|
int a_ioflag;
|
|
struct ucred *a_cred;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct uio *uio = ap->a_uio;
|
|
|
|
SMBVDEBUG("\n");
|
|
if (vp->v_type != VREG && vp->v_type != VDIR)
|
|
return EPERM;
|
|
return smbfs_readvnode(vp, uio, ap->a_cred);
|
|
}
|
|
|
|
static int
|
|
smbfs_write(ap)
|
|
struct vop_write_args /* {
|
|
struct vnode *a_vp;
|
|
struct uio *a_uio;
|
|
int a_ioflag;
|
|
struct ucred *a_cred;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct uio *uio = ap->a_uio;
|
|
|
|
SMBVDEBUG("%d,ofs=%d,sz=%d\n",vp->v_type, (int)uio->uio_offset, uio->uio_resid);
|
|
if (vp->v_type != VREG)
|
|
return (EPERM);
|
|
return smbfs_writevnode(vp, uio, ap->a_cred,ap->a_ioflag);
|
|
}
|
|
/*
|
|
* smbfs_create call
|
|
* Create a regular file. On entry the directory to contain the file being
|
|
* created is locked. We must release before we return. We must also free
|
|
* the pathname buffer pointed at by cnp->cn_pnbuf, always on error, or
|
|
* only if the SAVESTART bit in cn_flags is clear on success.
|
|
*/
|
|
static int
|
|
smbfs_create(ap)
|
|
struct vop_create_args /* {
|
|
struct vnode *a_dvp;
|
|
struct vnode **a_vpp;
|
|
struct componentname *a_cnp;
|
|
struct vattr *a_vap;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *dvp = ap->a_dvp;
|
|
struct vattr *vap = ap->a_vap;
|
|
struct vnode **vpp=ap->a_vpp;
|
|
struct componentname *cnp = ap->a_cnp;
|
|
struct smbnode *dnp = VTOSMB(dvp);
|
|
struct vnode *vp;
|
|
struct vattr vattr;
|
|
struct smbfattr fattr;
|
|
struct smb_cred scred;
|
|
char *name = cnp->cn_nameptr;
|
|
int nmlen = cnp->cn_namelen;
|
|
int error;
|
|
|
|
|
|
SMBVDEBUG("\n");
|
|
*vpp = NULL;
|
|
if (vap->va_type != VREG)
|
|
return EOPNOTSUPP;
|
|
if ((error = VOP_GETATTR(dvp, &vattr, cnp->cn_cred, cnp->cn_thread)))
|
|
return error;
|
|
smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
|
|
|
|
error = smbfs_smb_create(dnp, name, nmlen, &scred);
|
|
if (error)
|
|
return error;
|
|
error = smbfs_smb_lookup(dnp, name, nmlen, &fattr, &scred);
|
|
if (error)
|
|
return error;
|
|
error = smbfs_nget(VTOVFS(dvp), dvp, name, nmlen, &fattr, &vp);
|
|
if (error)
|
|
return error;
|
|
*vpp = vp;
|
|
if (cnp->cn_flags & MAKEENTRY)
|
|
cache_enter(dvp, vp, cnp);
|
|
return error;
|
|
}
|
|
|
|
static int
|
|
smbfs_remove(ap)
|
|
struct vop_remove_args /* {
|
|
struct vnodeop_desc *a_desc;
|
|
struct vnode * a_dvp;
|
|
struct vnode * a_vp;
|
|
struct componentname * a_cnp;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
/* struct vnode *dvp = ap->a_dvp;*/
|
|
struct componentname *cnp = ap->a_cnp;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct smb_cred scred;
|
|
int error;
|
|
|
|
if (vp->v_type == VDIR || (np->n_flag & NOPEN) != 0 || vrefcnt(vp) != 1)
|
|
return EPERM;
|
|
smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
|
|
error = smbfs_smb_delete(np, &scred);
|
|
if (error == 0)
|
|
np->n_flag |= NGONE;
|
|
cache_purge(vp);
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* smbfs_file rename call
|
|
*/
|
|
static int
|
|
smbfs_rename(ap)
|
|
struct vop_rename_args /* {
|
|
struct vnode *a_fdvp;
|
|
struct vnode *a_fvp;
|
|
struct componentname *a_fcnp;
|
|
struct vnode *a_tdvp;
|
|
struct vnode *a_tvp;
|
|
struct componentname *a_tcnp;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *fvp = ap->a_fvp;
|
|
struct vnode *tvp = ap->a_tvp;
|
|
struct vnode *fdvp = ap->a_fdvp;
|
|
struct vnode *tdvp = ap->a_tdvp;
|
|
struct componentname *tcnp = ap->a_tcnp;
|
|
/* struct componentname *fcnp = ap->a_fcnp;*/
|
|
struct smb_cred scred;
|
|
u_int16_t flags = 6;
|
|
int error=0;
|
|
|
|
/* Check for cross-device rename */
|
|
if ((fvp->v_mount != tdvp->v_mount) ||
|
|
(tvp && (fvp->v_mount != tvp->v_mount))) {
|
|
error = EXDEV;
|
|
goto out;
|
|
}
|
|
|
|
if (tvp && vrefcnt(tvp) > 1) {
|
|
error = EBUSY;
|
|
goto out;
|
|
}
|
|
flags = 0x10; /* verify all writes */
|
|
if (fvp->v_type == VDIR) {
|
|
flags |= 2;
|
|
} else if (fvp->v_type == VREG) {
|
|
flags |= 1;
|
|
} else {
|
|
error = EINVAL;
|
|
goto out;
|
|
}
|
|
smb_makescred(&scred, tcnp->cn_thread, tcnp->cn_cred);
|
|
/*
|
|
* It seems that Samba doesn't implement SMB_COM_MOVE call...
|
|
*/
|
|
#ifdef notnow
|
|
if (SMB_DIALECT(SSTOCN(smp->sm_share)) >= SMB_DIALECT_LANMAN1_0) {
|
|
error = smbfs_smb_move(VTOSMB(fvp), VTOSMB(tdvp),
|
|
tcnp->cn_nameptr, tcnp->cn_namelen, flags, &scred);
|
|
} else
|
|
#endif
|
|
{
|
|
/*
|
|
* We have to do the work atomicaly
|
|
*/
|
|
if (tvp && tvp != fvp) {
|
|
error = smbfs_smb_delete(VTOSMB(tvp), &scred);
|
|
if (error)
|
|
goto out_cacherem;
|
|
VTOSMB(fvp)->n_flag |= NGONE;
|
|
}
|
|
error = smbfs_smb_rename(VTOSMB(fvp), VTOSMB(tdvp),
|
|
tcnp->cn_nameptr, tcnp->cn_namelen, &scred);
|
|
}
|
|
|
|
if (fvp->v_type == VDIR) {
|
|
if (tvp != NULL && tvp->v_type == VDIR)
|
|
cache_purge(tdvp);
|
|
cache_purge(fdvp);
|
|
}
|
|
|
|
out_cacherem:
|
|
smbfs_attr_cacheremove(fdvp);
|
|
smbfs_attr_cacheremove(tdvp);
|
|
out:
|
|
if (tdvp == tvp)
|
|
vrele(tdvp);
|
|
else
|
|
vput(tdvp);
|
|
if (tvp)
|
|
vput(tvp);
|
|
vrele(fdvp);
|
|
vrele(fvp);
|
|
#ifdef possible_mistake
|
|
vgone(fvp);
|
|
if (tvp)
|
|
vgone(tvp);
|
|
#endif
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* somtime it will come true...
|
|
*/
|
|
static int
|
|
smbfs_link(ap)
|
|
struct vop_link_args /* {
|
|
struct vnode *a_tdvp;
|
|
struct vnode *a_vp;
|
|
struct componentname *a_cnp;
|
|
} */ *ap;
|
|
{
|
|
return EOPNOTSUPP;
|
|
}
|
|
|
|
/*
|
|
* smbfs_symlink link create call.
|
|
* Sometime it will be functional...
|
|
*/
|
|
static int
|
|
smbfs_symlink(ap)
|
|
struct vop_symlink_args /* {
|
|
struct vnode *a_dvp;
|
|
struct vnode **a_vpp;
|
|
struct componentname *a_cnp;
|
|
struct vattr *a_vap;
|
|
char *a_target;
|
|
} */ *ap;
|
|
{
|
|
return EOPNOTSUPP;
|
|
}
|
|
|
|
static int
|
|
smbfs_mknod(ap)
|
|
struct vop_mknod_args /* {
|
|
} */ *ap;
|
|
{
|
|
return EOPNOTSUPP;
|
|
}
|
|
|
|
static int
|
|
smbfs_mkdir(ap)
|
|
struct vop_mkdir_args /* {
|
|
struct vnode *a_dvp;
|
|
struct vnode **a_vpp;
|
|
struct componentname *a_cnp;
|
|
struct vattr *a_vap;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *dvp = ap->a_dvp;
|
|
/* struct vattr *vap = ap->a_vap;*/
|
|
struct vnode *vp;
|
|
struct componentname *cnp = ap->a_cnp;
|
|
struct smbnode *dnp = VTOSMB(dvp);
|
|
struct vattr vattr;
|
|
struct smb_cred scred;
|
|
struct smbfattr fattr;
|
|
char *name = cnp->cn_nameptr;
|
|
int len = cnp->cn_namelen;
|
|
int error;
|
|
|
|
if ((error = VOP_GETATTR(dvp, &vattr, cnp->cn_cred, cnp->cn_thread))) {
|
|
return error;
|
|
}
|
|
if ((name[0] == '.') && ((len == 1) || ((len == 2) && (name[1] == '.'))))
|
|
return EEXIST;
|
|
smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
|
|
error = smbfs_smb_mkdir(dnp, name, len, &scred);
|
|
if (error)
|
|
return error;
|
|
error = smbfs_smb_lookup(dnp, name, len, &fattr, &scred);
|
|
if (error)
|
|
return error;
|
|
error = smbfs_nget(VTOVFS(dvp), dvp, name, len, &fattr, &vp);
|
|
if (error)
|
|
return error;
|
|
*ap->a_vpp = vp;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* smbfs_remove directory call
|
|
*/
|
|
static int
|
|
smbfs_rmdir(ap)
|
|
struct vop_rmdir_args /* {
|
|
struct vnode *a_dvp;
|
|
struct vnode *a_vp;
|
|
struct componentname *a_cnp;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct vnode *dvp = ap->a_dvp;
|
|
struct componentname *cnp = ap->a_cnp;
|
|
/* struct smbmount *smp = VTOSMBFS(vp);*/
|
|
struct smbnode *dnp = VTOSMB(dvp);
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct smb_cred scred;
|
|
int error;
|
|
|
|
if (dvp == vp)
|
|
return EINVAL;
|
|
|
|
smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
|
|
error = smbfs_smb_rmdir(np, &scred);
|
|
if (error == 0)
|
|
np->n_flag |= NGONE;
|
|
dnp->n_flag |= NMODIFIED;
|
|
smbfs_attr_cacheremove(dvp);
|
|
/* cache_purge(dvp);*/
|
|
cache_purge(vp);
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* smbfs_readdir call
|
|
*/
|
|
static int
|
|
smbfs_readdir(ap)
|
|
struct vop_readdir_args /* {
|
|
struct vnode *a_vp;
|
|
struct uio *a_uio;
|
|
struct ucred *a_cred;
|
|
int *a_eofflag;
|
|
u_long *a_cookies;
|
|
int a_ncookies;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct uio *uio = ap->a_uio;
|
|
int error;
|
|
|
|
if (vp->v_type != VDIR)
|
|
return (EPERM);
|
|
#ifdef notnow
|
|
if (ap->a_ncookies) {
|
|
printf("smbfs_readdir: no support for cookies now...");
|
|
return (EOPNOTSUPP);
|
|
}
|
|
#endif
|
|
error = smbfs_readvnode(vp, uio, ap->a_cred);
|
|
return error;
|
|
}
|
|
|
|
/* ARGSUSED */
|
|
static int
|
|
smbfs_fsync(ap)
|
|
struct vop_fsync_args /* {
|
|
struct vnodeop_desc *a_desc;
|
|
struct vnode * a_vp;
|
|
struct ucred * a_cred;
|
|
int a_waitfor;
|
|
struct thread * a_td;
|
|
} */ *ap;
|
|
{
|
|
/* return (smb_flush(ap->a_vp, ap->a_cred, ap->a_waitfor, ap->a_td, 1));*/
|
|
return (0);
|
|
}
|
|
|
|
static
|
|
int smbfs_print (ap)
|
|
struct vop_print_args /* {
|
|
struct vnode *a_vp;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
|
|
if (np == NULL) {
|
|
printf("no smbnode data\n");
|
|
return (0);
|
|
}
|
|
printf("\tname = %s, parent = %p, open = %d\n", np->n_name,
|
|
np->n_parent ? np->n_parent : NULL, (np->n_flag & NOPEN) != 0);
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
smbfs_pathconf (ap)
|
|
struct vop_pathconf_args /* {
|
|
struct vnode *vp;
|
|
int name;
|
|
register_t *retval;
|
|
} */ *ap;
|
|
{
|
|
struct smbmount *smp = VFSTOSMBFS(VTOVFS(ap->a_vp));
|
|
struct smb_vc *vcp = SSTOVC(smp->sm_share);
|
|
register_t *retval = ap->a_retval;
|
|
int error = 0;
|
|
|
|
switch (ap->a_name) {
|
|
case _PC_LINK_MAX:
|
|
*retval = 0;
|
|
break;
|
|
case _PC_NAME_MAX:
|
|
*retval = (vcp->vc_hflags2 & SMB_FLAGS2_KNOWS_LONG_NAMES) ? 255 : 12;
|
|
break;
|
|
case _PC_PATH_MAX:
|
|
*retval = 800; /* XXX: a correct one ? */
|
|
break;
|
|
default:
|
|
error = EINVAL;
|
|
}
|
|
return error;
|
|
}
|
|
|
|
static int
|
|
smbfs_strategy (ap)
|
|
struct vop_strategy_args /* {
|
|
struct buf *a_bp
|
|
} */ *ap;
|
|
{
|
|
struct buf *bp=ap->a_bp;
|
|
struct ucred *cr;
|
|
struct thread *td;
|
|
int error = 0;
|
|
|
|
SMBVDEBUG("\n");
|
|
if (bp->b_flags & B_ASYNC)
|
|
td = (struct thread *)0;
|
|
else
|
|
td = curthread; /* XXX */
|
|
if (bp->b_iocmd == BIO_READ)
|
|
cr = bp->b_rcred;
|
|
else
|
|
cr = bp->b_wcred;
|
|
|
|
if ((bp->b_flags & B_ASYNC) == 0 )
|
|
error = smbfs_doio(ap->a_vp, bp, cr, td);
|
|
return error;
|
|
}
|
|
|
|
int
|
|
smbfs_ioctl(ap)
|
|
struct vop_ioctl_args /* {
|
|
struct vnode *a_vp;
|
|
u_long a_command;
|
|
caddr_t a_data;
|
|
int fflag;
|
|
struct ucred *cred;
|
|
struct thread *td;
|
|
} */ *ap;
|
|
{
|
|
return ENOTTY;
|
|
}
|
|
|
|
static char smbfs_atl[] = "rhsvda";
|
|
static int
|
|
smbfs_getextattr(struct vop_getextattr_args *ap)
|
|
/* {
|
|
IN struct vnode *a_vp;
|
|
IN char *a_name;
|
|
INOUT struct uio *a_uio;
|
|
IN struct ucred *a_cred;
|
|
IN struct thread *a_td;
|
|
};
|
|
*/
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct thread *td = ap->a_td;
|
|
struct ucred *cred = ap->a_cred;
|
|
struct uio *uio = ap->a_uio;
|
|
const char *name = ap->a_name;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct vattr vattr;
|
|
char buf[10];
|
|
int i, attr, error;
|
|
|
|
error = VOP_ACCESS(vp, VREAD, cred, td);
|
|
if (error)
|
|
return error;
|
|
error = VOP_GETATTR(vp, &vattr, cred, td);
|
|
if (error)
|
|
return error;
|
|
if (strcmp(name, "dosattr") == 0) {
|
|
attr = np->n_dosattr;
|
|
for (i = 0; i < 6; i++, attr >>= 1)
|
|
buf[i] = (attr & 1) ? smbfs_atl[i] : '-';
|
|
buf[i] = 0;
|
|
error = uiomove(buf, i, uio);
|
|
|
|
} else
|
|
error = EINVAL;
|
|
return error;
|
|
}
|
|
|
|
/*
|
|
* Since we expected to support F_GETLK (and SMB protocol has no such function),
|
|
* it is necessary to use lf_advlock(). It would be nice if this function had
|
|
* a callback mechanism because it will help to improve a level of consistency.
|
|
*/
|
|
int
|
|
smbfs_advlock(ap)
|
|
struct vop_advlock_args /* {
|
|
struct vnode *a_vp;
|
|
caddr_t a_id;
|
|
int a_op;
|
|
struct flock *a_fl;
|
|
int a_flags;
|
|
} */ *ap;
|
|
{
|
|
struct vnode *vp = ap->a_vp;
|
|
struct smbnode *np = VTOSMB(vp);
|
|
struct flock *fl = ap->a_fl;
|
|
caddr_t id = (caddr_t)1 /* ap->a_id */;
|
|
/* int flags = ap->a_flags;*/
|
|
struct thread *td = curthread;
|
|
struct smb_cred scred;
|
|
u_quad_t size;
|
|
off_t start, end, oadd;
|
|
int error, lkop;
|
|
|
|
if (vp->v_type == VDIR) {
|
|
/*
|
|
* SMB protocol have no support for directory locking.
|
|
* Although locks can be processed on local machine, I don't
|
|
* think that this is a good idea, because some programs
|
|
* can work wrong assuming directory is locked. So, we just
|
|
* return 'operation not supported
|
|
*/
|
|
return EOPNOTSUPP;
|
|
}
|
|
size = np->n_size;
|
|
switch (fl->l_whence) {
|
|
|
|
case SEEK_SET:
|
|
case SEEK_CUR:
|
|
start = fl->l_start;
|
|
break;
|
|
|
|
case SEEK_END:
|
|
if (size > OFF_MAX ||
|
|
(fl->l_start > 0 && size > OFF_MAX - fl->l_start))
|
|
return EOVERFLOW;
|
|
start = size + fl->l_start;
|
|
break;
|
|
|
|
default:
|
|
return EINVAL;
|
|
}
|
|
if (start < 0)
|
|
return EINVAL;
|
|
if (fl->l_len < 0) {
|
|
if (start == 0)
|
|
return EINVAL;
|
|
end = start - 1;
|
|
start += fl->l_len;
|
|
if (start < 0)
|
|
return EINVAL;
|
|
} else if (fl->l_len == 0)
|
|
end = -1;
|
|
else {
|
|
oadd = fl->l_len - 1;
|
|
if (oadd > OFF_MAX - start)
|
|
return EOVERFLOW;
|
|
end = start + oadd;
|
|
}
|
|
smb_makescred(&scred, td, td->td_ucred);
|
|
switch (ap->a_op) {
|
|
case F_SETLK:
|
|
switch (fl->l_type) {
|
|
case F_WRLCK:
|
|
lkop = SMB_LOCK_EXCL;
|
|
break;
|
|
case F_RDLCK:
|
|
lkop = SMB_LOCK_SHARED;
|
|
break;
|
|
case F_UNLCK:
|
|
lkop = SMB_LOCK_RELEASE;
|
|
break;
|
|
default:
|
|
return EINVAL;
|
|
}
|
|
error = lf_advlock(ap, &np->n_lockf, size);
|
|
if (error)
|
|
break;
|
|
lkop = SMB_LOCK_EXCL;
|
|
error = smbfs_smb_lock(np, lkop, id, start, end, &scred);
|
|
if (error) {
|
|
ap->a_op = F_UNLCK;
|
|
lf_advlock(ap, &np->n_lockf, size);
|
|
}
|
|
break;
|
|
case F_UNLCK:
|
|
lf_advlock(ap, &np->n_lockf, size);
|
|
error = smbfs_smb_lock(np, SMB_LOCK_RELEASE, id, start, end, &scred);
|
|
break;
|
|
case F_GETLK:
|
|
error = lf_advlock(ap, &np->n_lockf, size);
|
|
break;
|
|
default:
|
|
return EINVAL;
|
|
}
|
|
return error;
|
|
}
|
|
|
|
static int
|
|
smbfs_pathcheck(struct smbmount *smp, const char *name, int nmlen, int nameiop)
|
|
{
|
|
static const char *badchars = "*/:<>;?";
|
|
static const char *badchars83 = " +|,[]=";
|
|
const char *cp;
|
|
int i, error;
|
|
|
|
/*
|
|
* Backslash characters, being a path delimiter, are prohibited
|
|
* within a path component even for LOOKUP operations.
|
|
*/
|
|
if (index(name, '\\') != NULL)
|
|
return ENOENT;
|
|
|
|
if (nameiop == LOOKUP)
|
|
return 0;
|
|
error = ENOENT;
|
|
if (SMB_DIALECT(SSTOVC(smp->sm_share)) < SMB_DIALECT_LANMAN2_0) {
|
|
/*
|
|
* Name should conform 8.3 format
|
|
*/
|
|
if (nmlen > 12)
|
|
return ENAMETOOLONG;
|
|
cp = index(name, '.');
|
|
if (cp == NULL)
|
|
return error;
|
|
if (cp == name || (cp - name) > 8)
|
|
return error;
|
|
cp = index(cp + 1, '.');
|
|
if (cp != NULL)
|
|
return error;
|
|
for (cp = name, i = 0; i < nmlen; i++, cp++)
|
|
if (index(badchars83, *cp) != NULL)
|
|
return error;
|
|
}
|
|
for (cp = name, i = 0; i < nmlen; i++, cp++)
|
|
if (index(badchars, *cp) != NULL)
|
|
return error;
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Things go even weird without fixed inode numbers...
|
|
*/
|
|
int
|
|
smbfs_lookup(ap)
|
|
struct vop_lookup_args /* {
|
|
struct vnodeop_desc *a_desc;
|
|
struct vnode *a_dvp;
|
|
struct vnode **a_vpp;
|
|
struct componentname *a_cnp;
|
|
} */ *ap;
|
|
{
|
|
struct componentname *cnp = ap->a_cnp;
|
|
struct thread *td = cnp->cn_thread;
|
|
struct vnode *dvp = ap->a_dvp;
|
|
struct vnode **vpp = ap->a_vpp;
|
|
struct vnode *vp;
|
|
struct smbmount *smp;
|
|
struct mount *mp = dvp->v_mount;
|
|
struct smbnode *dnp;
|
|
struct smbfattr fattr, *fap;
|
|
struct smb_cred scred;
|
|
char *name = cnp->cn_nameptr;
|
|
int flags = cnp->cn_flags;
|
|
int nameiop = cnp->cn_nameiop;
|
|
int nmlen = cnp->cn_namelen;
|
|
int error, islastcn, isdot;
|
|
int killit;
|
|
|
|
SMBVDEBUG("\n");
|
|
if (dvp->v_type != VDIR)
|
|
return ENOTDIR;
|
|
if ((flags & ISDOTDOT) && (dvp->v_vflag & VV_ROOT)) {
|
|
SMBFSERR("invalid '..'\n");
|
|
return EIO;
|
|
}
|
|
#ifdef SMB_VNODE_DEBUG
|
|
{
|
|
char *cp, c;
|
|
|
|
cp = name + nmlen;
|
|
c = *cp;
|
|
*cp = 0;
|
|
SMBVDEBUG("%d '%s' in '%s' id=d\n", nameiop, name,
|
|
VTOSMB(dvp)->n_name);
|
|
*cp = c;
|
|
}
|
|
#endif
|
|
islastcn = flags & ISLASTCN;
|
|
if (islastcn && (mp->mnt_flag & MNT_RDONLY) && (nameiop != LOOKUP))
|
|
return EROFS;
|
|
if ((error = VOP_ACCESS(dvp, VEXEC, cnp->cn_cred, td)) != 0)
|
|
return error;
|
|
smp = VFSTOSMBFS(mp);
|
|
dnp = VTOSMB(dvp);
|
|
isdot = (nmlen == 1 && name[0] == '.');
|
|
|
|
error = smbfs_pathcheck(smp, cnp->cn_nameptr, cnp->cn_namelen, nameiop);
|
|
|
|
if (error)
|
|
return ENOENT;
|
|
|
|
error = cache_lookup(dvp, vpp, cnp);
|
|
SMBVDEBUG("cache_lookup returned %d\n", error);
|
|
if (error > 0)
|
|
return error;
|
|
if (error) { /* name was found */
|
|
struct vattr vattr;
|
|
|
|
killit = 0;
|
|
vp = *vpp;
|
|
error = VOP_GETATTR(vp, &vattr, cnp->cn_cred, td);
|
|
/*
|
|
* If the file type on the server is inconsistent
|
|
* with what it was when we created the vnode,
|
|
* kill the bogus vnode now and fall through to
|
|
* the code below to create a new one with the
|
|
* right type.
|
|
*/
|
|
if (error == 0 &&
|
|
((vp->v_type == VDIR &&
|
|
(VTOSMB(vp)->n_dosattr & SMB_FA_DIR) == 0) ||
|
|
(vp->v_type == VREG &&
|
|
(VTOSMB(vp)->n_dosattr & SMB_FA_DIR) != 0)))
|
|
killit = 1;
|
|
else if (error == 0
|
|
/* && vattr.va_ctime.tv_sec == VTOSMB(vp)->n_ctime*/) {
|
|
if (nameiop != LOOKUP && islastcn)
|
|
cnp->cn_flags |= SAVENAME;
|
|
SMBVDEBUG("use cached vnode\n");
|
|
return (0);
|
|
}
|
|
cache_purge(vp);
|
|
/*
|
|
* XXX This is not quite right, if '.' is
|
|
* inconsistent, we really need to start the lookup
|
|
* all over again. Hopefully there is some other
|
|
* guarantee that prevents this case from happening.
|
|
*/
|
|
if (killit && vp != dvp)
|
|
vgone(vp);
|
|
if (vp != dvp)
|
|
vput(vp);
|
|
else
|
|
vrele(vp);
|
|
*vpp = NULLVP;
|
|
}
|
|
/*
|
|
* entry is not in the cache or has been expired
|
|
*/
|
|
error = 0;
|
|
*vpp = NULLVP;
|
|
smb_makescred(&scred, td, cnp->cn_cred);
|
|
fap = &fattr;
|
|
if (flags & ISDOTDOT) {
|
|
error = smbfs_smb_lookup(VTOSMB(dnp->n_parent), NULL, 0, fap,
|
|
&scred);
|
|
SMBVDEBUG("result of dotdot lookup: %d\n", error);
|
|
} else {
|
|
fap = &fattr;
|
|
error = smbfs_smb_lookup(dnp, name, nmlen, fap, &scred);
|
|
/* if (cnp->cn_namelen == 1 && cnp->cn_nameptr[0] == '.')*/
|
|
SMBVDEBUG("result of smbfs_smb_lookup: %d\n", error);
|
|
}
|
|
if (error && error != ENOENT)
|
|
return error;
|
|
if (error) { /* entry not found */
|
|
/*
|
|
* Handle RENAME or CREATE case...
|
|
*/
|
|
if ((nameiop == CREATE || nameiop == RENAME) && islastcn) {
|
|
error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred, td);
|
|
if (error)
|
|
return error;
|
|
cnp->cn_flags |= SAVENAME;
|
|
return (EJUSTRETURN);
|
|
}
|
|
return ENOENT;
|
|
}/* else {
|
|
SMBVDEBUG("Found entry %s with id=%d\n", fap->entryName, fap->dirEntNum);
|
|
}*/
|
|
/*
|
|
* handle DELETE case ...
|
|
*/
|
|
if (nameiop == DELETE && islastcn) { /* delete last component */
|
|
error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred, td);
|
|
if (error)
|
|
return error;
|
|
if (isdot) {
|
|
VREF(dvp);
|
|
*vpp = dvp;
|
|
return 0;
|
|
}
|
|
error = smbfs_nget(mp, dvp, name, nmlen, fap, &vp);
|
|
if (error)
|
|
return error;
|
|
*vpp = vp;
|
|
cnp->cn_flags |= SAVENAME;
|
|
return 0;
|
|
}
|
|
if (nameiop == RENAME && islastcn) {
|
|
error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred, td);
|
|
if (error)
|
|
return error;
|
|
if (isdot)
|
|
return EISDIR;
|
|
error = smbfs_nget(mp, dvp, name, nmlen, fap, &vp);
|
|
if (error)
|
|
return error;
|
|
*vpp = vp;
|
|
cnp->cn_flags |= SAVENAME;
|
|
return 0;
|
|
}
|
|
if (flags & ISDOTDOT) {
|
|
VOP_UNLOCK(dvp, 0);
|
|
error = smbfs_nget(mp, dvp, name, nmlen, NULL, &vp);
|
|
vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
|
|
if (error)
|
|
return error;
|
|
*vpp = vp;
|
|
} else if (isdot) {
|
|
vref(dvp);
|
|
*vpp = dvp;
|
|
} else {
|
|
error = smbfs_nget(mp, dvp, name, nmlen, fap, &vp);
|
|
if (error)
|
|
return error;
|
|
*vpp = vp;
|
|
SMBVDEBUG("lookup: getnewvp!\n");
|
|
}
|
|
if ((cnp->cn_flags & MAKEENTRY)/* && !islastcn*/) {
|
|
/* VTOSMB(*vpp)->n_ctime = VTOSMB(*vpp)->n_vattr.va_ctime.tv_sec;*/
|
|
cache_enter(dvp, *vpp, cnp);
|
|
}
|
|
return 0;
|
|
}
|