The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/fs/smbfs/smbfs_vnops.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*-
    2  * Copyright (c) 2000-2001 Boris Popov
    3  * All rights reserved.
    4  *
    5  * Redistribution and use in source and binary forms, with or without
    6  * modification, are permitted provided that the following conditions
    7  * are met:
    8  * 1. Redistributions of source code must retain the above copyright
    9  *    notice, this list of conditions and the following disclaimer.
   10  * 2. Redistributions in binary form must reproduce the above copyright
   11  *    notice, this list of conditions and the following disclaimer in the
   12  *    documentation and/or other materials provided with the distribution.
   13  *
   14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
   15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
   18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   24  * SUCH DAMAGE.
   25  *
   26  * $FreeBSD$
   27  */
   28 #include <sys/param.h>
   29 #include <sys/systm.h>
   30 #include <sys/namei.h>
   31 #include <sys/kernel.h>
   32 #include <sys/proc.h>
   33 #include <sys/bio.h>
   34 #include <sys/buf.h>
   35 #include <sys/fcntl.h>
   36 #include <sys/mount.h>
   37 #include <sys/unistd.h>
   38 #include <sys/vnode.h>
   39 #include <sys/limits.h>
   40 #include <sys/lockf.h>
   41 #include <sys/stat.h>
   42 
   43 #include <vm/vm.h>
   44 #include <vm/vm_extern.h>
   45 
   46 
   47 #include <netsmb/smb.h>
   48 #include <netsmb/smb_conn.h>
   49 #include <netsmb/smb_subr.h>
   50 
   51 #include <fs/smbfs/smbfs.h>
   52 #include <fs/smbfs/smbfs_node.h>
   53 #include <fs/smbfs/smbfs_subr.h>
   54 
   55 /*
   56  * Prototypes for SMBFS vnode operations
   57  */
   58 static vop_create_t     smbfs_create;
   59 static vop_mknod_t      smbfs_mknod;
   60 static vop_open_t       smbfs_open;
   61 static vop_close_t      smbfs_close;
   62 static vop_access_t     smbfs_access;
   63 static vop_getattr_t    smbfs_getattr;
   64 static vop_setattr_t    smbfs_setattr;
   65 static vop_read_t       smbfs_read;
   66 static vop_write_t      smbfs_write;
   67 static vop_fsync_t      smbfs_fsync;
   68 static vop_remove_t     smbfs_remove;
   69 static vop_link_t       smbfs_link;
   70 static vop_lookup_t     smbfs_lookup;
   71 static vop_rename_t     smbfs_rename;
   72 static vop_mkdir_t      smbfs_mkdir;
   73 static vop_rmdir_t      smbfs_rmdir;
   74 static vop_symlink_t    smbfs_symlink;
   75 static vop_readdir_t    smbfs_readdir;
   76 static vop_strategy_t   smbfs_strategy;
   77 static vop_print_t      smbfs_print;
   78 static vop_pathconf_t   smbfs_pathconf;
   79 static vop_advlock_t    smbfs_advlock;
   80 static vop_getextattr_t smbfs_getextattr;
   81 
   82 struct vop_vector smbfs_vnodeops = {
   83         .vop_default =          &default_vnodeops,
   84 
   85         .vop_access =           smbfs_access,
   86         .vop_advlock =          smbfs_advlock,
   87         .vop_close =            smbfs_close,
   88         .vop_create =           smbfs_create,
   89         .vop_fsync =            smbfs_fsync,
   90         .vop_getattr =          smbfs_getattr,
   91         .vop_getextattr =       smbfs_getextattr,
   92         .vop_getpages =         smbfs_getpages,
   93         .vop_inactive =         smbfs_inactive,
   94         .vop_ioctl =            smbfs_ioctl,
   95         .vop_link =             smbfs_link,
   96         .vop_lookup =           smbfs_lookup,
   97         .vop_mkdir =            smbfs_mkdir,
   98         .vop_mknod =            smbfs_mknod,
   99         .vop_open =             smbfs_open,
  100         .vop_pathconf =         smbfs_pathconf,
  101         .vop_print =            smbfs_print,
  102         .vop_putpages =         smbfs_putpages,
  103         .vop_read =             smbfs_read,
  104         .vop_readdir =          smbfs_readdir,
  105         .vop_reclaim =          smbfs_reclaim,
  106         .vop_remove =           smbfs_remove,
  107         .vop_rename =           smbfs_rename,
  108         .vop_rmdir =            smbfs_rmdir,
  109         .vop_setattr =          smbfs_setattr,
  110 /*      .vop_setextattr =       smbfs_setextattr,*/
  111         .vop_strategy =         smbfs_strategy,
  112         .vop_symlink =          smbfs_symlink,
  113         .vop_write =            smbfs_write,
  114 };
  115 
  116 static int
  117 smbfs_access(ap)
  118         struct vop_access_args /* {
  119                 struct vnode *a_vp;
  120                 accmode_t a_accmode;
  121                 struct ucred *a_cred;
  122                 struct thread *a_td;
  123         } */ *ap;
  124 {
  125         struct vnode *vp = ap->a_vp;
  126         accmode_t accmode = ap->a_accmode;
  127         mode_t mpmode;
  128         struct smbmount *smp = VTOSMBFS(vp);
  129 
  130         SMBVDEBUG("\n");
  131         if ((accmode & VWRITE) && (vp->v_mount->mnt_flag & MNT_RDONLY)) {
  132                 switch (vp->v_type) {
  133                     case VREG: case VDIR: case VLNK:
  134                         return EROFS;
  135                     default:
  136                         break;
  137                 }
  138         }
  139         mpmode = vp->v_type == VREG ? smp->sm_file_mode : smp->sm_dir_mode;
  140         return (vaccess(vp->v_type, mpmode, smp->sm_uid,
  141             smp->sm_gid, ap->a_accmode, ap->a_cred, NULL));
  142 }
  143 
  144 /* ARGSUSED */
  145 static int
  146 smbfs_open(ap)
  147         struct vop_open_args /* {
  148                 struct vnode *a_vp;
  149                 int  a_mode;
  150                 struct ucred *a_cred;
  151                 struct thread *a_td;
  152         } */ *ap;
  153 {
  154         struct vnode *vp = ap->a_vp;
  155         struct smbnode *np = VTOSMB(vp);
  156         struct smb_cred scred;
  157         struct vattr vattr;
  158         int mode = ap->a_mode;
  159         int error, accmode;
  160 
  161         SMBVDEBUG("%s,%d\n", np->n_name, (np->n_flag & NOPEN) != 0);
  162         if (vp->v_type != VREG && vp->v_type != VDIR) { 
  163                 SMBFSERR("open eacces vtype=%d\n", vp->v_type);
  164                 return EACCES;
  165         }
  166         if (vp->v_type == VDIR) {
  167                 np->n_flag |= NOPEN;
  168                 return 0;
  169         }
  170         if (np->n_flag & NMODIFIED) {
  171                 if ((error = smbfs_vinvalbuf(vp, ap->a_td)) == EINTR)
  172                         return error;
  173                 smbfs_attr_cacheremove(vp);
  174                 error = VOP_GETATTR(vp, &vattr, ap->a_cred);
  175                 if (error)
  176                         return error;
  177                 np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
  178         } else {
  179                 error = VOP_GETATTR(vp, &vattr, ap->a_cred);
  180                 if (error)
  181                         return error;
  182                 if (np->n_mtime.tv_sec != vattr.va_mtime.tv_sec) {
  183                         error = smbfs_vinvalbuf(vp, ap->a_td);
  184                         if (error == EINTR)
  185                                 return error;
  186                         np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
  187                 }
  188         }
  189         if ((np->n_flag & NOPEN) != 0)
  190                 return 0;
  191         /*
  192          * Use DENYNONE to give unixy semantics of permitting
  193          * everything not forbidden by permissions.  Ie denial
  194          * is up to server with clients/openers needing to use
  195          * advisory locks for further control.
  196          */
  197         accmode = SMB_SM_DENYNONE|SMB_AM_OPENREAD;
  198         if ((vp->v_mount->mnt_flag & MNT_RDONLY) == 0)
  199                 accmode = SMB_SM_DENYNONE|SMB_AM_OPENRW;
  200         smb_makescred(&scred, ap->a_td, ap->a_cred);
  201         error = smbfs_smb_open(np, accmode, &scred);
  202         if (error) {
  203                 if (mode & FWRITE)
  204                         return EACCES;
  205                 else if ((vp->v_mount->mnt_flag & MNT_RDONLY) == 0) {
  206                         accmode = SMB_SM_DENYNONE|SMB_AM_OPENREAD;
  207                         error = smbfs_smb_open(np, accmode, &scred);
  208                 }
  209         }
  210         if (error == 0) {
  211                 np->n_flag |= NOPEN;
  212                 vnode_create_vobject(ap->a_vp, vattr.va_size, ap->a_td);
  213         }
  214         smbfs_attr_cacheremove(vp);
  215         return error;
  216 }
  217 
  218 static int
  219 smbfs_close(ap)
  220         struct vop_close_args /* {
  221                 struct vnodeop_desc *a_desc;
  222                 struct vnode *a_vp;
  223                 int  a_fflag;
  224                 struct ucred *a_cred;
  225                 struct thread *a_td;
  226         } */ *ap;
  227 {
  228         struct vnode *vp = ap->a_vp;
  229         struct thread *td = ap->a_td;
  230         struct smbnode *np = VTOSMB(vp);
  231         struct smb_cred scred;
  232 
  233         if (vp->v_type == VDIR && (np->n_flag & NOPEN) != 0 &&
  234             np->n_dirseq != NULL) {
  235                 smb_makescred(&scred, td, ap->a_cred);
  236                 smbfs_findclose(np->n_dirseq, &scred);
  237                 np->n_dirseq = NULL;
  238         }
  239         return 0;
  240 }
  241 
  242 /*
  243  * smbfs_getattr call from vfs.
  244  */
  245 static int
  246 smbfs_getattr(ap)
  247         struct vop_getattr_args /* {
  248                 struct vnode *a_vp;
  249                 struct vattr *a_vap;
  250                 struct ucred *a_cred;
  251         } */ *ap;
  252 {
  253         struct vnode *vp = ap->a_vp;
  254         struct smbnode *np = VTOSMB(vp);
  255         struct vattr *va=ap->a_vap;
  256         struct smbfattr fattr;
  257         struct smb_cred scred;
  258         u_quad_t oldsize;
  259         int error;
  260 
  261         SMBVDEBUG("%lx: '%s' %d\n", (long)vp, np->n_name, (vp->v_vflag & VV_ROOT) != 0);
  262         error = smbfs_attr_cachelookup(vp, va);
  263         if (!error)
  264                 return 0;
  265         SMBVDEBUG("not in the cache\n");
  266         smb_makescred(&scred, curthread, ap->a_cred);
  267         oldsize = np->n_size;
  268         error = smbfs_smb_lookup(np, NULL, 0, &fattr, &scred);
  269         if (error) {
  270                 SMBVDEBUG("error %d\n", error);
  271                 return error;
  272         }
  273         smbfs_attr_cacheenter(vp, &fattr);
  274         smbfs_attr_cachelookup(vp, va);
  275         if (np->n_flag & NOPEN)
  276                 np->n_size = oldsize;
  277         return 0;
  278 }
  279 
  280 static int
  281 smbfs_setattr(ap)
  282         struct vop_setattr_args /* {
  283                 struct vnode *a_vp;
  284                 struct vattr *a_vap;
  285                 struct ucred *a_cred;
  286         } */ *ap;
  287 {
  288         struct vnode *vp = ap->a_vp;
  289         struct smbnode *np = VTOSMB(vp);
  290         struct vattr *vap = ap->a_vap;
  291         struct timespec *mtime, *atime;
  292         struct smb_cred scred;
  293         struct smb_share *ssp = np->n_mount->sm_share;
  294         struct smb_vc *vcp = SSTOVC(ssp);
  295         struct thread *td = curthread;
  296         u_quad_t tsize = 0;
  297         int isreadonly, doclose, error = 0;
  298         int old_n_dosattr;
  299 
  300         SMBVDEBUG("\n");
  301         if (vap->va_flags != VNOVAL)
  302                 return EOPNOTSUPP;
  303         isreadonly = (vp->v_mount->mnt_flag & MNT_RDONLY);
  304         /*
  305          * Disallow write attempts if the filesystem is mounted read-only.
  306          */
  307         if ((vap->va_uid != (uid_t)VNOVAL || vap->va_gid != (gid_t)VNOVAL || 
  308              vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL ||
  309              vap->va_mode != (mode_t)VNOVAL) && isreadonly)
  310                 return EROFS;
  311         smb_makescred(&scred, td, ap->a_cred);
  312         if (vap->va_size != VNOVAL) {
  313                 switch (vp->v_type) {
  314                     case VDIR:
  315                         return EISDIR;
  316                     case VREG:
  317                         break;
  318                     default:
  319                         return EINVAL;
  320                 };
  321                 if (isreadonly)
  322                         return EROFS;
  323                 doclose = 0;
  324                 vnode_pager_setsize(vp, (u_long)vap->va_size);
  325                 tsize = np->n_size;
  326                 np->n_size = vap->va_size;
  327                 if ((np->n_flag & NOPEN) == 0) {
  328                         error = smbfs_smb_open(np,
  329                                                SMB_SM_DENYNONE|SMB_AM_OPENRW,
  330                                                &scred);
  331                         if (error == 0)
  332                                 doclose = 1;
  333                 }
  334                 if (error == 0)
  335                         error = smbfs_smb_setfsize(np,
  336                             (int64_t)vap->va_size, &scred);
  337                 if (doclose)
  338                         smbfs_smb_close(ssp, np->n_fid, NULL, &scred);
  339                 if (error) {
  340                         np->n_size = tsize;
  341                         vnode_pager_setsize(vp, (u_long)tsize);
  342                         return error;
  343                 }
  344         }
  345         if (vap->va_mode != (mode_t)VNOVAL) {
  346                 old_n_dosattr = np->n_dosattr;
  347                 if (vap->va_mode & S_IWUSR)
  348                         np->n_dosattr &= ~SMB_FA_RDONLY;
  349                 else
  350                         np->n_dosattr |= SMB_FA_RDONLY;
  351                 if (np->n_dosattr != old_n_dosattr) {
  352                         error = smbfs_smb_setpattr(np, np->n_dosattr, NULL, &scred);
  353                         if (error)
  354                                 return error;
  355                 }
  356         }
  357         mtime = atime = NULL;
  358         if (vap->va_mtime.tv_sec != VNOVAL)
  359                 mtime = &vap->va_mtime;
  360         if (vap->va_atime.tv_sec != VNOVAL)
  361                 atime = &vap->va_atime;
  362         if (mtime != atime) {
  363                 if (vap->va_vaflags & VA_UTIMES_NULL) {
  364                         error = VOP_ACCESS(vp, VADMIN, ap->a_cred, td);
  365                         if (error)
  366                                 error = VOP_ACCESS(vp, VWRITE, ap->a_cred, td);
  367                 } else
  368                         error = VOP_ACCESS(vp, VADMIN, ap->a_cred, td);
  369 #if 0
  370                 if (mtime == NULL)
  371                         mtime = &np->n_mtime;
  372                 if (atime == NULL)
  373                         atime = &np->n_atime;
  374 #endif
  375                 /*
  376                  * If file is opened, then we can use handle based calls.
  377                  * If not, use path based ones.
  378                  */
  379                 if ((np->n_flag & NOPEN) == 0) {
  380                         if (vcp->vc_flags & SMBV_WIN95) {
  381                                 error = VOP_OPEN(vp, FWRITE, ap->a_cred, td,
  382                                     NULL);
  383                                 if (!error) {
  384 /*                                      error = smbfs_smb_setfattrNT(np, 0,
  385                                             mtime, atime, &scred);
  386                                         VOP_GETATTR(vp, &vattr, ap->a_cred); */
  387                                         if (mtime)
  388                                                 np->n_mtime = *mtime;
  389                                         VOP_CLOSE(vp, FWRITE, ap->a_cred, td);
  390                                 }
  391                         } else if ((vcp->vc_sopt.sv_caps & SMB_CAP_NT_SMBS)) {
  392                                 error = smbfs_smb_setptime2(np, mtime, atime, 0, &scred);
  393 /*                              error = smbfs_smb_setpattrNT(np, 0, mtime, atime, &scred);*/
  394                         } else if (SMB_DIALECT(vcp) >= SMB_DIALECT_LANMAN2_0) {
  395                                 error = smbfs_smb_setptime2(np, mtime, atime, 0, &scred);
  396                         } else {
  397                                 error = smbfs_smb_setpattr(np, 0, mtime, &scred);
  398                         }
  399                 } else {
  400                         if (vcp->vc_sopt.sv_caps & SMB_CAP_NT_SMBS) {
  401                                 error = smbfs_smb_setfattrNT(np, 0, mtime, atime, &scred);
  402                         } else if (SMB_DIALECT(vcp) >= SMB_DIALECT_LANMAN1_0) {
  403                                 error = smbfs_smb_setftime(np, mtime, atime, &scred);
  404                         } else {
  405                                 /*
  406                                  * I have no idea how to handle this for core
  407                                  * level servers. The possible solution is to
  408                                  * update mtime after file is closed.
  409                                  */
  410                                  SMBERROR("can't update times on an opened file\n");
  411                         }
  412                 }
  413         }
  414         /*
  415          * Invalidate attribute cache in case if server doesn't set
  416          * required attributes.
  417          */
  418         smbfs_attr_cacheremove(vp);     /* invalidate cache */
  419         VOP_GETATTR(vp, vap, ap->a_cred);
  420         np->n_mtime.tv_sec = vap->va_mtime.tv_sec;
  421         return error;
  422 }
  423 /*
  424  * smbfs_read call.
  425  */
  426 static int
  427 smbfs_read(ap)
  428         struct vop_read_args /* {
  429                 struct vnode *a_vp;
  430                 struct uio *a_uio;
  431                 int  a_ioflag;
  432                 struct ucred *a_cred;
  433         } */ *ap;
  434 {
  435         struct vnode *vp = ap->a_vp;
  436         struct uio *uio = ap->a_uio;
  437 
  438         SMBVDEBUG("\n");
  439         if (vp->v_type != VREG && vp->v_type != VDIR)
  440                 return EPERM;
  441         return smbfs_readvnode(vp, uio, ap->a_cred);
  442 }
  443 
  444 static int
  445 smbfs_write(ap)
  446         struct vop_write_args /* {
  447                 struct vnode *a_vp;
  448                 struct uio *a_uio;
  449                 int  a_ioflag;
  450                 struct ucred *a_cred;
  451         } */ *ap;
  452 {
  453         struct vnode *vp = ap->a_vp;
  454         struct uio *uio = ap->a_uio;
  455 
  456         SMBVDEBUG("%d,ofs=%d,sz=%d\n",vp->v_type, (int)uio->uio_offset, uio->uio_resid);
  457         if (vp->v_type != VREG)
  458                 return (EPERM);
  459         return smbfs_writevnode(vp, uio, ap->a_cred,ap->a_ioflag);
  460 }
  461 /*
  462  * smbfs_create call
  463  * Create a regular file. On entry the directory to contain the file being
  464  * created is locked.  We must release before we return. We must also free
  465  * the pathname buffer pointed at by cnp->cn_pnbuf, always on error, or
  466  * only if the SAVESTART bit in cn_flags is clear on success.
  467  */
  468 static int
  469 smbfs_create(ap)
  470         struct vop_create_args /* {
  471                 struct vnode *a_dvp;
  472                 struct vnode **a_vpp;
  473                 struct componentname *a_cnp;
  474                 struct vattr *a_vap;
  475         } */ *ap;
  476 {
  477         struct vnode *dvp = ap->a_dvp;
  478         struct vattr *vap = ap->a_vap;
  479         struct vnode **vpp=ap->a_vpp;
  480         struct componentname *cnp = ap->a_cnp;
  481         struct smbnode *dnp = VTOSMB(dvp);
  482         struct vnode *vp;
  483         struct vattr vattr;
  484         struct smbfattr fattr;
  485         struct smb_cred scred;
  486         char *name = cnp->cn_nameptr;
  487         int nmlen = cnp->cn_namelen;
  488         int error;
  489         
  490 
  491         SMBVDEBUG("\n");
  492         *vpp = NULL;
  493         if (vap->va_type != VREG)
  494                 return EOPNOTSUPP;
  495         if ((error = VOP_GETATTR(dvp, &vattr, cnp->cn_cred)))
  496                 return error;
  497         smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
  498         
  499         error = smbfs_smb_create(dnp, name, nmlen, &scred);
  500         if (error)
  501                 return error;
  502         error = smbfs_smb_lookup(dnp, name, nmlen, &fattr, &scred);
  503         if (error)
  504                 return error;
  505         error = smbfs_nget(VTOVFS(dvp), dvp, name, nmlen, &fattr, &vp);
  506         if (error)
  507                 return error;
  508         *vpp = vp;
  509         if (cnp->cn_flags & MAKEENTRY)
  510                 cache_enter(dvp, vp, cnp);
  511         return error;
  512 }
  513 
  514 static int
  515 smbfs_remove(ap)
  516         struct vop_remove_args /* {
  517                 struct vnodeop_desc *a_desc;
  518                 struct vnode * a_dvp;
  519                 struct vnode * a_vp;
  520                 struct componentname * a_cnp;
  521         } */ *ap;
  522 {
  523         struct vnode *vp = ap->a_vp;
  524 /*      struct vnode *dvp = ap->a_dvp;*/
  525         struct componentname *cnp = ap->a_cnp;
  526         struct smbnode *np = VTOSMB(vp);
  527         struct smb_cred scred;
  528         int error;
  529 
  530         if (vp->v_type == VDIR || (np->n_flag & NOPEN) != 0 || vrefcnt(vp) != 1)
  531                 return EPERM;
  532         smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
  533         error = smbfs_smb_delete(np, &scred);
  534         if (error == 0)
  535                 np->n_flag |= NGONE;
  536         cache_purge(vp);
  537         return error;
  538 }
  539 
  540 /*
  541  * smbfs_file rename call
  542  */
  543 static int
  544 smbfs_rename(ap)
  545         struct vop_rename_args  /* {
  546                 struct vnode *a_fdvp;
  547                 struct vnode *a_fvp;
  548                 struct componentname *a_fcnp;
  549                 struct vnode *a_tdvp;
  550                 struct vnode *a_tvp;
  551                 struct componentname *a_tcnp;
  552         } */ *ap;
  553 {
  554         struct vnode *fvp = ap->a_fvp;
  555         struct vnode *tvp = ap->a_tvp;
  556         struct vnode *fdvp = ap->a_fdvp;
  557         struct vnode *tdvp = ap->a_tdvp;
  558         struct componentname *tcnp = ap->a_tcnp;
  559 /*      struct componentname *fcnp = ap->a_fcnp;*/
  560         struct smb_cred scred;
  561         u_int16_t flags = 6;
  562         int error=0;
  563 
  564         /* Check for cross-device rename */
  565         if ((fvp->v_mount != tdvp->v_mount) ||
  566             (tvp && (fvp->v_mount != tvp->v_mount))) {
  567                 error = EXDEV;
  568                 goto out;
  569         }
  570 
  571         if (tvp && vrefcnt(tvp) > 1) {
  572                 error = EBUSY;
  573                 goto out;
  574         }
  575         flags = 0x10;                   /* verify all writes */
  576         if (fvp->v_type == VDIR) {
  577                 flags |= 2;
  578         } else if (fvp->v_type == VREG) {
  579                 flags |= 1;
  580         } else {
  581                 error = EINVAL;
  582                 goto out;
  583         }
  584         smb_makescred(&scred, tcnp->cn_thread, tcnp->cn_cred);
  585         /*
  586          * It seems that Samba doesn't implement SMB_COM_MOVE call...
  587          */
  588 #ifdef notnow
  589         if (SMB_DIALECT(SSTOCN(smp->sm_share)) >= SMB_DIALECT_LANMAN1_0) {
  590                 error = smbfs_smb_move(VTOSMB(fvp), VTOSMB(tdvp),
  591                     tcnp->cn_nameptr, tcnp->cn_namelen, flags, &scred);
  592         } else
  593 #endif
  594         {
  595                 /*
  596                  * We have to do the work atomicaly
  597                  */
  598                 if (tvp && tvp != fvp) {
  599                         error = smbfs_smb_delete(VTOSMB(tvp), &scred);
  600                         if (error)
  601                                 goto out_cacherem;
  602                         VTOSMB(fvp)->n_flag |= NGONE;
  603                 }
  604                 error = smbfs_smb_rename(VTOSMB(fvp), VTOSMB(tdvp),
  605                     tcnp->cn_nameptr, tcnp->cn_namelen, &scred);
  606         }
  607 
  608         if (fvp->v_type == VDIR) {
  609                 if (tvp != NULL && tvp->v_type == VDIR)
  610                         cache_purge(tdvp);
  611                 cache_purge(fdvp);
  612         }
  613 
  614 out_cacherem:
  615         smbfs_attr_cacheremove(fdvp);
  616         smbfs_attr_cacheremove(tdvp);
  617 out:
  618         if (tdvp == tvp)
  619                 vrele(tdvp);
  620         else
  621                 vput(tdvp);
  622         if (tvp)
  623                 vput(tvp);
  624         vrele(fdvp);
  625         vrele(fvp);
  626 #ifdef possible_mistake
  627         vgone(fvp);
  628         if (tvp)
  629                 vgone(tvp);
  630 #endif
  631         return error;
  632 }
  633 
  634 /*
  635  * somtime it will come true...
  636  */
  637 static int
  638 smbfs_link(ap)
  639         struct vop_link_args /* {
  640                 struct vnode *a_tdvp;
  641                 struct vnode *a_vp;
  642                 struct componentname *a_cnp;
  643         } */ *ap;
  644 {
  645         return EOPNOTSUPP;
  646 }
  647 
  648 /*
  649  * smbfs_symlink link create call.
  650  * Sometime it will be functional...
  651  */
  652 static int
  653 smbfs_symlink(ap)
  654         struct vop_symlink_args /* {
  655                 struct vnode *a_dvp;
  656                 struct vnode **a_vpp;
  657                 struct componentname *a_cnp;
  658                 struct vattr *a_vap;
  659                 char *a_target;
  660         } */ *ap;
  661 {
  662         return EOPNOTSUPP;
  663 }
  664 
  665 static int
  666 smbfs_mknod(ap) 
  667         struct vop_mknod_args /* {
  668         } */ *ap;
  669 {
  670         return EOPNOTSUPP;
  671 }
  672 
  673 static int
  674 smbfs_mkdir(ap)
  675         struct vop_mkdir_args /* {
  676                 struct vnode *a_dvp;
  677                 struct vnode **a_vpp;
  678                 struct componentname *a_cnp;
  679                 struct vattr *a_vap;
  680         } */ *ap;
  681 {
  682         struct vnode *dvp = ap->a_dvp;
  683 /*      struct vattr *vap = ap->a_vap;*/
  684         struct vnode *vp;
  685         struct componentname *cnp = ap->a_cnp;
  686         struct smbnode *dnp = VTOSMB(dvp);
  687         struct vattr vattr;
  688         struct smb_cred scred;
  689         struct smbfattr fattr;
  690         char *name = cnp->cn_nameptr;
  691         int len = cnp->cn_namelen;
  692         int error;
  693 
  694         if ((error = VOP_GETATTR(dvp, &vattr, cnp->cn_cred))) {
  695                 return error;
  696         }       
  697         if ((name[0] == '.') && ((len == 1) || ((len == 2) && (name[1] == '.'))))
  698                 return EEXIST;
  699         smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
  700         error = smbfs_smb_mkdir(dnp, name, len, &scred);
  701         if (error)
  702                 return error;
  703         error = smbfs_smb_lookup(dnp, name, len, &fattr, &scred);
  704         if (error)
  705                 return error;
  706         error = smbfs_nget(VTOVFS(dvp), dvp, name, len, &fattr, &vp);
  707         if (error)
  708                 return error;
  709         *ap->a_vpp = vp;
  710         return 0;
  711 }
  712 
  713 /*
  714  * smbfs_remove directory call
  715  */
  716 static int
  717 smbfs_rmdir(ap)
  718         struct vop_rmdir_args /* {
  719                 struct vnode *a_dvp;
  720                 struct vnode *a_vp;
  721                 struct componentname *a_cnp;
  722         } */ *ap;
  723 {
  724         struct vnode *vp = ap->a_vp;
  725         struct vnode *dvp = ap->a_dvp;
  726         struct componentname *cnp = ap->a_cnp;
  727 /*      struct smbmount *smp = VTOSMBFS(vp);*/
  728         struct smbnode *dnp = VTOSMB(dvp);
  729         struct smbnode *np = VTOSMB(vp);
  730         struct smb_cred scred;
  731         int error;
  732 
  733         if (dvp == vp)
  734                 return EINVAL;
  735 
  736         smb_makescred(&scred, cnp->cn_thread, cnp->cn_cred);
  737         error = smbfs_smb_rmdir(np, &scred);
  738         if (error == 0)
  739                 np->n_flag |= NGONE;
  740         dnp->n_flag |= NMODIFIED;
  741         smbfs_attr_cacheremove(dvp);
  742 /*      cache_purge(dvp);*/
  743         cache_purge(vp);
  744         return error;
  745 }
  746 
  747 /*
  748  * smbfs_readdir call
  749  */
  750 static int
  751 smbfs_readdir(ap)
  752         struct vop_readdir_args /* {
  753                 struct vnode *a_vp;
  754                 struct uio *a_uio;
  755                 struct ucred *a_cred;
  756                 int *a_eofflag;
  757                 u_long *a_cookies;
  758                 int a_ncookies;
  759         } */ *ap;
  760 {
  761         struct vnode *vp = ap->a_vp;
  762         struct uio *uio = ap->a_uio;
  763         int error;
  764 
  765         if (vp->v_type != VDIR)
  766                 return (EPERM);
  767 #ifdef notnow
  768         if (ap->a_ncookies) {
  769                 printf("smbfs_readdir: no support for cookies now...");
  770                 return (EOPNOTSUPP);
  771         }
  772 #endif
  773         error = smbfs_readvnode(vp, uio, ap->a_cred);
  774         return error;
  775 }
  776 
  777 /* ARGSUSED */
  778 static int
  779 smbfs_fsync(ap)
  780         struct vop_fsync_args /* {
  781                 struct vnodeop_desc *a_desc;
  782                 struct vnode * a_vp;
  783                 struct ucred * a_cred;
  784                 int  a_waitfor;
  785                 struct thread * a_td;
  786         } */ *ap;
  787 {
  788 /*      return (smb_flush(ap->a_vp, ap->a_cred, ap->a_waitfor, ap->a_td, 1));*/
  789     return (0);
  790 }
  791 
  792 static 
  793 int smbfs_print (ap) 
  794         struct vop_print_args /* {
  795         struct vnode *a_vp;
  796         } */ *ap;
  797 {
  798         struct vnode *vp = ap->a_vp;
  799         struct smbnode *np = VTOSMB(vp);
  800 
  801         if (np == NULL) {
  802                 printf("no smbnode data\n");
  803                 return (0);
  804         }
  805         printf("\tname = %s, parent = %p, open = %d\n", np->n_name,
  806             np->n_parent ? np->n_parent : NULL, (np->n_flag & NOPEN) != 0);
  807         return (0);
  808 }
  809 
  810 static int
  811 smbfs_pathconf (ap)
  812         struct vop_pathconf_args  /* {
  813         struct vnode *vp;
  814         int name;
  815         register_t *retval;
  816         } */ *ap;
  817 {
  818         struct smbmount *smp = VFSTOSMBFS(VTOVFS(ap->a_vp));
  819         struct smb_vc *vcp = SSTOVC(smp->sm_share);
  820         register_t *retval = ap->a_retval;
  821         int error = 0;
  822         
  823         switch (ap->a_name) {
  824             case _PC_LINK_MAX:
  825                 *retval = 0;
  826                 break;
  827             case _PC_NAME_MAX:
  828                 *retval = (vcp->vc_hflags2 & SMB_FLAGS2_KNOWS_LONG_NAMES) ? 255 : 12;
  829                 break;
  830             case _PC_PATH_MAX:
  831                 *retval = 800;  /* XXX: a correct one ? */
  832                 break;
  833             default:
  834                 error = EINVAL;
  835         }
  836         return error;
  837 }
  838 
  839 static int
  840 smbfs_strategy (ap) 
  841         struct vop_strategy_args /* {
  842         struct buf *a_bp
  843         } */ *ap;
  844 {
  845         struct buf *bp=ap->a_bp;
  846         struct ucred *cr;
  847         struct thread *td;
  848 
  849         SMBVDEBUG("\n");
  850         if (bp->b_flags & B_ASYNC)
  851                 td = (struct thread *)0;
  852         else
  853                 td = curthread; /* XXX */
  854         if (bp->b_iocmd == BIO_READ)
  855                 cr = bp->b_rcred;
  856         else
  857                 cr = bp->b_wcred;
  858 
  859         if ((bp->b_flags & B_ASYNC) == 0 )
  860                 (void)smbfs_doio(ap->a_vp, bp, cr, td);
  861         return (0);
  862 }
  863 
  864 int
  865 smbfs_ioctl(ap)
  866         struct vop_ioctl_args /* {
  867                 struct vnode *a_vp;
  868                 u_long a_command;
  869                 caddr_t a_data;
  870                 int fflag;
  871                 struct ucred *cred;
  872                 struct thread *td;
  873         } */ *ap;
  874 {
  875         return ENOTTY;
  876 }
  877 
  878 static char smbfs_atl[] = "rhsvda";
  879 static int
  880 smbfs_getextattr(struct vop_getextattr_args *ap)
  881 /* {
  882         IN struct vnode *a_vp;
  883         IN char *a_name;
  884         INOUT struct uio *a_uio;
  885         IN struct ucred *a_cred;
  886         IN struct thread *a_td;
  887 };
  888 */
  889 {
  890         struct vnode *vp = ap->a_vp;
  891         struct thread *td = ap->a_td;
  892         struct ucred *cred = ap->a_cred;
  893         struct uio *uio = ap->a_uio;
  894         const char *name = ap->a_name;
  895         struct smbnode *np = VTOSMB(vp);
  896         struct vattr vattr;
  897         char buf[10];
  898         int i, attr, error;
  899 
  900         error = VOP_ACCESS(vp, VREAD, cred, td);
  901         if (error)
  902                 return error;
  903         error = VOP_GETATTR(vp, &vattr, cred);
  904         if (error)
  905                 return error;
  906         if (strcmp(name, "dosattr") == 0) {
  907                 attr = np->n_dosattr;
  908                 for (i = 0; i < 6; i++, attr >>= 1)
  909                         buf[i] = (attr & 1) ? smbfs_atl[i] : '-';
  910                 buf[i] = 0;
  911                 error = uiomove(buf, i, uio);
  912                 
  913         } else
  914                 error = EINVAL;
  915         return error;
  916 }
  917 
  918 /*
  919  * Since we expected to support F_GETLK (and SMB protocol has no such function),
  920  * it is necessary to use lf_advlock(). It would be nice if this function had
  921  * a callback mechanism because it will help to improve a level of consistency.
  922  */
  923 int
  924 smbfs_advlock(ap)
  925         struct vop_advlock_args /* {
  926                 struct vnode *a_vp;
  927                 caddr_t  a_id;
  928                 int  a_op;
  929                 struct flock *a_fl;
  930                 int  a_flags;
  931         } */ *ap;
  932 {
  933         struct vnode *vp = ap->a_vp;
  934         struct smbnode *np = VTOSMB(vp);
  935         struct flock *fl = ap->a_fl;
  936         caddr_t id = (caddr_t)1 /* ap->a_id */;
  937 /*      int flags = ap->a_flags;*/
  938         struct thread *td = curthread;
  939         struct smb_cred scred;
  940         u_quad_t size;
  941         off_t start, end, oadd;
  942         int error, lkop;
  943 
  944         if (vp->v_type == VDIR) {
  945                 /*
  946                  * SMB protocol have no support for directory locking.
  947                  * Although locks can be processed on local machine, I don't
  948                  * think that this is a good idea, because some programs
  949                  * can work wrong assuming directory is locked. So, we just
  950                  * return 'operation not supported
  951                  */
  952                  return EOPNOTSUPP;
  953         }
  954         size = np->n_size;
  955         switch (fl->l_whence) {
  956 
  957         case SEEK_SET:
  958         case SEEK_CUR:
  959                 start = fl->l_start;
  960                 break;
  961 
  962         case SEEK_END:
  963                 if (size > OFF_MAX ||
  964                     (fl->l_start > 0 && size > OFF_MAX - fl->l_start))
  965                         return EOVERFLOW;
  966                 start = size + fl->l_start;
  967                 break;
  968 
  969         default:
  970                 return EINVAL;
  971         }
  972         if (start < 0)
  973                 return EINVAL;
  974         if (fl->l_len < 0) {
  975                 if (start == 0)
  976                         return EINVAL;
  977                 end = start - 1;
  978                 start += fl->l_len;
  979                 if (start < 0)
  980                         return EINVAL;
  981         } else if (fl->l_len == 0)
  982                 end = -1;
  983         else {
  984                 oadd = fl->l_len - 1;
  985                 if (oadd > OFF_MAX - start)
  986                         return EOVERFLOW;
  987                 end = start + oadd;
  988         }
  989         smb_makescred(&scred, td, td->td_ucred);
  990         switch (ap->a_op) {
  991             case F_SETLK:
  992                 switch (fl->l_type) {
  993                     case F_WRLCK:
  994                         lkop = SMB_LOCK_EXCL;
  995                         break;
  996                     case F_RDLCK:
  997                         lkop = SMB_LOCK_SHARED;
  998                         break;
  999                     case F_UNLCK:
 1000                         lkop = SMB_LOCK_RELEASE;
 1001                         break;
 1002                     default:
 1003                         return EINVAL;
 1004                 }
 1005                 error = lf_advlock(ap, &vp->v_lockf, size);
 1006                 if (error)
 1007                         break;
 1008                 lkop = SMB_LOCK_EXCL;
 1009                 error = smbfs_smb_lock(np, lkop, id, start, end, &scred);
 1010                 if (error) {
 1011                         int oldtype = fl->l_type;
 1012                         fl->l_type = F_UNLCK;
 1013                         ap->a_op = F_UNLCK;
 1014                         lf_advlock(ap, &vp->v_lockf, size);
 1015                         fl->l_type = oldtype;
 1016                 }
 1017                 break;
 1018             case F_UNLCK:
 1019                 lf_advlock(ap, &vp->v_lockf, size);
 1020                 error = smbfs_smb_lock(np, SMB_LOCK_RELEASE, id, start, end, &scred);
 1021                 break;
 1022             case F_GETLK:
 1023                 error = lf_advlock(ap, &vp->v_lockf, size);
 1024                 break;
 1025             default:
 1026                 return EINVAL;
 1027         }
 1028         return error;
 1029 }
 1030 
 1031 static int
 1032 smbfs_pathcheck(struct smbmount *smp, const char *name, int nmlen, int nameiop)
 1033 {
 1034         static const char *badchars = "*/:<>;?";
 1035         static const char *badchars83 = " +|,[]=";
 1036         const char *cp;
 1037         int i, error;
 1038 
 1039         /*
 1040          * Backslash characters, being a path delimiter, are prohibited
 1041          * within a path component even for LOOKUP operations.
 1042          */
 1043         if (index(name, '\\') != NULL)
 1044                 return ENOENT;
 1045 
 1046         if (nameiop == LOOKUP)
 1047                 return 0;
 1048         error = ENOENT;
 1049         if (SMB_DIALECT(SSTOVC(smp->sm_share)) < SMB_DIALECT_LANMAN2_0) {
 1050                 /*
 1051                  * Name should conform 8.3 format
 1052                  */
 1053                 if (nmlen > 12)
 1054                         return ENAMETOOLONG;
 1055                 cp = index(name, '.');
 1056                 if (cp == NULL)
 1057                         return error;
 1058                 if (cp == name || (cp - name) > 8)
 1059                         return error;
 1060                 cp = index(cp + 1, '.');
 1061                 if (cp != NULL)
 1062                         return error;
 1063                 for (cp = name, i = 0; i < nmlen; i++, cp++)
 1064                         if (index(badchars83, *cp) != NULL)
 1065                                 return error;
 1066         }
 1067         for (cp = name, i = 0; i < nmlen; i++, cp++)
 1068                 if (index(badchars, *cp) != NULL)
 1069                         return error;
 1070         return 0;
 1071 }
 1072 
 1073 /*
 1074  * Things go even weird without fixed inode numbers...
 1075  */
 1076 int
 1077 smbfs_lookup(ap)
 1078         struct vop_lookup_args /* {
 1079                 struct vnodeop_desc *a_desc;
 1080                 struct vnode *a_dvp;
 1081                 struct vnode **a_vpp;
 1082                 struct componentname *a_cnp;
 1083         } */ *ap;
 1084 {
 1085         struct componentname *cnp = ap->a_cnp;
 1086         struct thread *td = cnp->cn_thread;
 1087         struct vnode *dvp = ap->a_dvp;
 1088         struct vnode **vpp = ap->a_vpp;
 1089         struct vnode *vp;
 1090         struct smbmount *smp;
 1091         struct mount *mp = dvp->v_mount;
 1092         struct smbnode *dnp;
 1093         struct smbfattr fattr, *fap;
 1094         struct smb_cred scred;
 1095         char *name = cnp->cn_nameptr;
 1096         int flags = cnp->cn_flags;
 1097         int nameiop = cnp->cn_nameiop;
 1098         int nmlen = cnp->cn_namelen;
 1099         int error, islastcn, isdot;
 1100         int killit;
 1101         
 1102         SMBVDEBUG("\n");
 1103         if (dvp->v_type != VDIR)
 1104                 return ENOTDIR;
 1105         if ((flags & ISDOTDOT) && (dvp->v_vflag & VV_ROOT)) {
 1106                 SMBFSERR("invalid '..'\n");
 1107                 return EIO;
 1108         }
 1109 #ifdef SMB_VNODE_DEBUG
 1110         {
 1111                 char *cp, c;
 1112 
 1113                 cp = name + nmlen;
 1114                 c = *cp;
 1115                 *cp = 0;
 1116                 SMBVDEBUG("%d '%s' in '%s' id=d\n", nameiop, name, 
 1117                         VTOSMB(dvp)->n_name);
 1118                 *cp = c;
 1119         }
 1120 #endif
 1121         islastcn = flags & ISLASTCN;
 1122         if (islastcn && (mp->mnt_flag & MNT_RDONLY) && (nameiop != LOOKUP))
 1123                 return EROFS;
 1124         if ((error = VOP_ACCESS(dvp, VEXEC, cnp->cn_cred, td)) != 0)
 1125                 return error;
 1126         smp = VFSTOSMBFS(mp);
 1127         dnp = VTOSMB(dvp);
 1128         isdot = (nmlen == 1 && name[0] == '.');
 1129 
 1130         error = smbfs_pathcheck(smp, cnp->cn_nameptr, cnp->cn_namelen, nameiop);
 1131 
 1132         if (error) 
 1133                 return ENOENT;
 1134 
 1135         error = cache_lookup(dvp, vpp, cnp);
 1136         SMBVDEBUG("cache_lookup returned %d\n", error);
 1137         if (error > 0)
 1138                 return error;
 1139         if (error) {            /* name was found */
 1140                 struct vattr vattr;
 1141 
 1142                 killit = 0;
 1143                 vp = *vpp;
 1144                 error = VOP_GETATTR(vp, &vattr, cnp->cn_cred);
 1145                 /*
 1146                  * If the file type on the server is inconsistent
 1147                  * with what it was when we created the vnode,
 1148                  * kill the bogus vnode now and fall through to
 1149                  * the code below to create a new one with the
 1150                  * right type.
 1151                  */
 1152                 if (error == 0 &&
 1153                    ((vp->v_type == VDIR &&
 1154                    (VTOSMB(vp)->n_dosattr & SMB_FA_DIR) == 0) ||
 1155                    (vp->v_type == VREG &&
 1156                    (VTOSMB(vp)->n_dosattr & SMB_FA_DIR) != 0)))
 1157                    killit = 1;
 1158                 else if (error == 0
 1159              /*    && vattr.va_ctime.tv_sec == VTOSMB(vp)->n_ctime*/) {
 1160                      if (nameiop != LOOKUP && islastcn)
 1161                              cnp->cn_flags |= SAVENAME;
 1162                      SMBVDEBUG("use cached vnode\n");
 1163                      return (0);
 1164                 }
 1165                 cache_purge(vp);
 1166                 /*
 1167                  * XXX This is not quite right, if '.' is
 1168                  * inconsistent, we really need to start the lookup
 1169                  * all over again.  Hopefully there is some other
 1170                  * guarantee that prevents this case from happening.
 1171                  */
 1172                 if (killit && vp != dvp)
 1173                         vgone(vp);
 1174                 if (vp != dvp)
 1175                         vput(vp);
 1176                 else
 1177                         vrele(vp);
 1178                 *vpp = NULLVP;
 1179         }
 1180         /* 
 1181          * entry is not in the cache or has been expired
 1182          */
 1183         error = 0;
 1184         *vpp = NULLVP;
 1185         smb_makescred(&scred, td, cnp->cn_cred);
 1186         fap = &fattr;
 1187         if (flags & ISDOTDOT) {
 1188                 error = smbfs_smb_lookup(VTOSMB(dnp->n_parent), NULL, 0, fap,
 1189                     &scred);
 1190                 SMBVDEBUG("result of dotdot lookup: %d\n", error);
 1191         } else {
 1192                 fap = &fattr;
 1193                 error = smbfs_smb_lookup(dnp, name, nmlen, fap, &scred);
 1194 /*              if (cnp->cn_namelen == 1 && cnp->cn_nameptr[0] == '.')*/
 1195                 SMBVDEBUG("result of smbfs_smb_lookup: %d\n", error);
 1196         }
 1197         if (error && error != ENOENT)
 1198                 return error;
 1199         if (error) {                    /* entry not found */
 1200                 /*
 1201                  * Handle RENAME or CREATE case...
 1202                  */
 1203                 if ((nameiop == CREATE || nameiop == RENAME) && islastcn) {
 1204                         error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred, td);
 1205                         if (error)
 1206                                 return error;
 1207                         cnp->cn_flags |= SAVENAME;
 1208                         return (EJUSTRETURN);
 1209                 }
 1210                 return ENOENT;
 1211         }/* else {
 1212                 SMBVDEBUG("Found entry %s with id=%d\n", fap->entryName, fap->dirEntNum);
 1213         }*/
 1214         /*
 1215          * handle DELETE case ...
 1216          */
 1217         if (nameiop == DELETE && islastcn) {    /* delete last component */
 1218                 error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred, td);
 1219                 if (error)
 1220                         return error;
 1221                 if (isdot) {
 1222                         VREF(dvp);
 1223                         *vpp = dvp;
 1224                         return 0;
 1225                 }
 1226                 error = smbfs_nget(mp, dvp, name, nmlen, fap, &vp);
 1227                 if (error)
 1228                         return error;
 1229                 *vpp = vp;
 1230                 cnp->cn_flags |= SAVENAME;
 1231                 return 0;
 1232         }
 1233         if (nameiop == RENAME && islastcn) {
 1234                 error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred, td);
 1235                 if (error)
 1236                         return error;
 1237                 if (isdot)
 1238                         return EISDIR;
 1239                 error = smbfs_nget(mp, dvp, name, nmlen, fap, &vp);
 1240                 if (error)
 1241                         return error;
 1242                 *vpp = vp;
 1243                 cnp->cn_flags |= SAVENAME;
 1244                 return 0;
 1245         }
 1246         if (flags & ISDOTDOT) {
 1247                 VOP_UNLOCK(dvp, 0);
 1248                 error = smbfs_nget(mp, dvp, name, nmlen, NULL, &vp);
 1249                 vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
 1250                 if (error)
 1251                         return error;
 1252                 *vpp = vp;
 1253         } else if (isdot) {
 1254                 vref(dvp);
 1255                 *vpp = dvp;
 1256         } else {
 1257                 error = smbfs_nget(mp, dvp, name, nmlen, fap, &vp);
 1258                 if (error)
 1259                         return error;
 1260                 *vpp = vp;
 1261                 SMBVDEBUG("lookup: getnewvp!\n");
 1262         }
 1263         if ((cnp->cn_flags & MAKEENTRY)/* && !islastcn*/) {
 1264 /*              VTOSMB(*vpp)->n_ctime = VTOSMB(*vpp)->n_vattr.va_ctime.tv_sec;*/
 1265                 cache_enter(dvp, *vpp, cnp);
 1266         }
 1267         return 0;
 1268 }

Cache object: da20971cb343caedffa8d0aa11f54a25


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.