2000-02-03 05:10:09 +00:00
/*
2002-01-30 06:08:46 +00:00
Unix SMB / CIFS implementation .
2000-10-05 19:04:41 +00:00
Wrap disk only vfs functions to sidestep dodgy compilers .
2000-02-03 05:10:09 +00:00
Copyright ( C ) Tim Potter 1998
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
/* Check for NULL pointer parameters in vfswrap_* functions */
# define VFS_CHECK_NULL
/* We don't want to have NULL function pointers lying around. Someone
is sure to try and execute them . These stubs are used to prevent
this possibility . */
2001-07-04 07:15:53 +00:00
int vfswrap_dummy_connect ( connection_struct * conn , const char * service , const char * user )
2000-02-03 05:10:09 +00:00
{
return 0 ; /* Return >= 0 for success */
}
2000-10-06 18:13:52 +00:00
void vfswrap_dummy_disconnect ( connection_struct * conn )
2000-02-03 05:10:09 +00:00
{
}
/* Disk operations */
2001-07-04 07:15:53 +00:00
SMB_BIG_UINT vfswrap_disk_free ( connection_struct * conn , const char * path , BOOL small_query , SMB_BIG_UINT * bsize ,
2000-02-03 05:10:09 +00:00
SMB_BIG_UINT * dfree , SMB_BIG_UINT * dsize )
{
SMB_BIG_UINT result ;
# ifdef VFS_CHECK_NULL
if ( ( path = = NULL ) | | ( bsize = = NULL ) | | ( dfree = = NULL ) | |
( dsize = = NULL ) ) {
smb_panic ( " NULL pointer passed to vfswrap_disk_free() function \n " ) ;
}
# endif
result = sys_disk_free ( path , small_query , bsize , dfree , dsize ) ;
return result ;
}
/* Directory operations */
2001-07-04 07:15:53 +00:00
DIR * vfswrap_opendir ( connection_struct * conn , const char * fname )
2000-02-03 05:10:09 +00:00
{
DIR * result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_opendir ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( fname = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_opendir() \n " ) ;
}
# endif
result = opendir ( fname ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_opendir ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2000-10-06 03:21:49 +00:00
struct dirent * vfswrap_readdir ( connection_struct * conn , DIR * dirp )
2000-02-03 05:10:09 +00:00
{
struct dirent * result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_readdir ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( dirp = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_readdir() \n " ) ;
}
# endif
result = readdir ( dirp ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_readdir ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-07-04 07:15:53 +00:00
int vfswrap_mkdir ( connection_struct * conn , const char * path , mode_t mode )
2000-02-03 05:10:09 +00:00
{
2002-03-11 21:57:12 +00:00
int result ;
BOOL has_dacl = False ;
2000-02-03 05:10:09 +00:00
2002-03-11 21:57:12 +00:00
START_PROFILE ( syscall_mkdir ) ;
2000-10-06 18:13:52 +00:00
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
2002-03-11 21:57:12 +00:00
if ( path = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_mkdir() \n " ) ;
}
2000-02-03 05:10:09 +00:00
# endif
2002-03-12 00:08:08 +00:00
if ( lp_inherit_acls ( SNUM ( conn ) ) & & ( has_dacl = directory_has_default_acl ( conn , parent_dirname ( path ) ) ) )
2002-03-11 21:57:12 +00:00
mode = 0777 ;
result = mkdir ( path , mode ) ;
2001-01-23 01:52:30 +00:00
2002-03-11 21:57:12 +00:00
if ( result = = 0 & & ! has_dacl ) {
2001-01-23 01:52:30 +00:00
/*
* We need to do this as the default behavior of POSIX ACLs
* is to set the mask to be the requested group permission
* bits , not the group permission bits to be the requested
* group permission bits . This is not what we want , as it will
* mess up any inherited ACL bits that were set . JRA .
*/
2001-03-26 19:18:06 +00:00
int saved_errno = errno ; /* We may get ENOSYS */
2001-01-23 01:52:30 +00:00
if ( conn - > vfs_ops . chmod_acl ! = NULL ) {
2001-03-26 19:18:06 +00:00
if ( ( conn - > vfs_ops . chmod_acl ( conn , path , mode ) = = - 1 ) & & ( errno = = ENOSYS ) )
errno = saved_errno ;
2001-01-23 01:52:30 +00:00
}
}
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_mkdir ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-07-04 07:15:53 +00:00
int vfswrap_rmdir ( connection_struct * conn , const char * path )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_rmdir ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( path = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_rmdir() \n " ) ;
}
# endif
result = rmdir ( path ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_rmdir ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2000-10-06 03:21:49 +00:00
int vfswrap_closedir ( connection_struct * conn , DIR * dirp )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_closedir ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( dirp = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_closedir() \n " ) ;
}
# endif
result = closedir ( dirp ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_closedir ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
/* File operations */
2001-07-04 07:15:53 +00:00
int vfswrap_open ( connection_struct * conn , const char * fname , int flags , mode_t mode )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_open ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( fname = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_open() \n " ) ;
}
# endif
result = sys_open ( fname , flags , mode ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_open ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2000-10-06 03:21:49 +00:00
int vfswrap_close ( files_struct * fsp , int fd )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_close ) ;
2000-02-03 05:10:09 +00:00
result = close ( fd ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_close ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-09-04 19:10:30 +00:00
ssize_t vfswrap_read ( files_struct * fsp , int fd , void * data , size_t n )
2000-02-03 05:10:09 +00:00
{
ssize_t result ;
2000-10-06 18:13:52 +00:00
START_PROFILE_BYTES ( syscall_read , n ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( data = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_read() \n " ) ;
}
# endif
result = read ( fd , data , n ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_read ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-09-04 19:10:30 +00:00
ssize_t vfswrap_write ( files_struct * fsp , int fd , const void * data , size_t n )
2000-02-03 05:10:09 +00:00
{
ssize_t result ;
2000-10-06 18:13:52 +00:00
START_PROFILE_BYTES ( syscall_write , n ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( data = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_write() \n " ) ;
}
# endif
result = write ( fd , data , n ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_write ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2000-10-06 03:21:49 +00:00
SMB_OFF_T vfswrap_lseek ( files_struct * fsp , int filedes , SMB_OFF_T offset , int whence )
2000-02-03 05:10:09 +00:00
{
2002-03-02 00:44:38 +00:00
SMB_OFF_T result ;
2000-02-03 05:10:09 +00:00
2002-03-02 00:44:38 +00:00
START_PROFILE ( syscall_lseek ) ;
2000-10-06 18:13:52 +00:00
2002-03-02 00:44:38 +00:00
result = sys_lseek ( filedes , offset , whence ) ;
/*
* We want to maintain the fiction that we can seek
* on a fifo for file system purposes . This allows
* people to set up UNIX fifo ' s that feed data to Windows
* applications . JRA .
*/
if ( ( result = = - 1 ) & & ( errno = = ESPIPE ) ) {
result = 0 ;
errno = 0 ;
}
END_PROFILE ( syscall_lseek ) ;
return result ;
2000-02-03 05:10:09 +00:00
}
2001-07-04 07:15:53 +00:00
int vfswrap_rename ( connection_struct * conn , const char * old , const char * new )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_rename ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( ( old = = NULL ) | | ( new = = NULL ) ) {
smb_panic ( " NULL pointer passed to vfswrap_rename() \n " ) ;
}
# endif
result = rename ( old , new ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_rename ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2000-10-06 03:21:49 +00:00
int vfswrap_fsync ( files_struct * fsp , int fd )
2000-02-03 05:10:09 +00:00
{
2000-04-04 18:44:04 +00:00
# ifdef HAVE_FSYNC
2000-10-06 18:13:52 +00:00
int result ;
START_PROFILE ( syscall_fsync ) ;
result = fsync ( fd ) ;
END_PROFILE ( syscall_fsync ) ;
return result ;
2000-04-04 18:44:04 +00:00
# else
return 0 ;
# endif
2000-02-03 05:10:09 +00:00
}
2001-07-04 07:15:53 +00:00
int vfswrap_stat ( connection_struct * conn , const char * fname , SMB_STRUCT_STAT * sbuf )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_stat ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( ( fname = = NULL ) | | ( sbuf = = NULL ) ) {
smb_panic ( " NULL pointer passed to vfswrap_stat() \n " ) ;
}
# endif
result = sys_stat ( fname , sbuf ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_stat ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2000-10-06 03:21:49 +00:00
int vfswrap_fstat ( files_struct * fsp , int fd , SMB_STRUCT_STAT * sbuf )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_fstat ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( sbuf = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_fstat() \n " ) ;
}
# endif
result = sys_fstat ( fd , sbuf ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_fstat ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-07-04 07:15:53 +00:00
int vfswrap_lstat ( connection_struct * conn , const char * path , SMB_STRUCT_STAT * sbuf )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_lstat ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( ( path = = NULL ) | | ( sbuf = = NULL ) ) {
smb_panic ( " NULL pointer passed to vfswrap_lstat() \n " ) ;
}
# endif
result = sys_lstat ( path , sbuf ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_lstat ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-07-04 07:15:53 +00:00
int vfswrap_unlink ( connection_struct * conn , const char * path )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_unlink ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( path = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_unlink() \n " ) ;
}
# endif
result = unlink ( path ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_unlink ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-07-04 07:15:53 +00:00
int vfswrap_chmod ( connection_struct * conn , const char * path , mode_t mode )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_chmod ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( path = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_chmod() \n " ) ;
}
# endif
2001-01-23 01:52:30 +00:00
/*
* We need to do this due to the fact that the default POSIX ACL
* chmod modifies the ACL * mask * for the group owner , not the
* group owner bits directly . JRA .
*/
2001-03-26 19:18:06 +00:00
2001-01-23 01:52:30 +00:00
if ( conn - > vfs_ops . chmod_acl ! = NULL ) {
2001-03-26 19:18:06 +00:00
int saved_errno = errno ; /* We might get ENOSYS */
2001-01-23 01:52:30 +00:00
if ( ( result = conn - > vfs_ops . chmod_acl ( conn , path , mode ) ) = = 0 ) {
END_PROFILE ( syscall_chmod ) ;
return result ;
}
2001-03-26 19:18:06 +00:00
/* Error - return the old errno. */
errno = saved_errno ;
2001-01-23 01:52:30 +00:00
}
2000-02-03 05:10:09 +00:00
result = chmod ( path , mode ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_chmod ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2001-04-14 00:19:12 +00:00
int vfswrap_fchmod ( files_struct * fsp , int fd , mode_t mode )
{
int result ;
struct vfs_ops * vfs_ops = & fsp - > conn - > vfs_ops ;
START_PROFILE ( syscall_fchmod ) ;
/*
* We need to do this due to the fact that the default POSIX ACL
* chmod modifies the ACL * mask * for the group owner , not the
* group owner bits directly . JRA .
*/
if ( vfs_ops - > fchmod_acl ! = NULL ) {
int saved_errno = errno ; /* We might get ENOSYS */
if ( ( result = vfs_ops - > fchmod_acl ( fsp , fd , mode ) ) = = 0 ) {
END_PROFILE ( syscall_chmod ) ;
return result ;
}
/* Error - return the old errno. */
errno = saved_errno ;
}
result = fchmod ( fd , mode ) ;
END_PROFILE ( syscall_fchmod ) ;
return result ;
}
2001-07-04 07:15:53 +00:00
int vfswrap_chown ( connection_struct * conn , const char * path , uid_t uid , gid_t gid )
2000-09-27 19:09:59 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_chown ) ;
2000-09-27 19:09:59 +00:00
# ifdef VFS_CHECK_NULL
if ( path = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_chown() \n " ) ;
}
# endif
result = sys_chown ( path , uid , gid ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_chown ) ;
2000-09-27 19:09:59 +00:00
return result ;
}
2001-04-14 00:19:12 +00:00
int vfswrap_fchown ( files_struct * fsp , int fd , uid_t uid , gid_t gid )
{
int result ;
START_PROFILE ( syscall_fchown ) ;
result = fchown ( fd , uid , gid ) ;
END_PROFILE ( syscall_fchown ) ;
return result ;
}
2001-07-04 07:15:53 +00:00
int vfswrap_chdir ( connection_struct * conn , const char * path )
2000-09-27 19:09:59 +00:00
{
2000-10-06 18:13:52 +00:00
int result ;
START_PROFILE ( syscall_chdir ) ;
2000-09-27 19:09:59 +00:00
# ifdef VFS_CHECK_NULL
if ( path = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_chdir() \n " ) ;
}
# endif
2000-10-06 18:13:52 +00:00
result = chdir ( path ) ;
END_PROFILE ( syscall_chdir ) ;
return result ;
2000-09-27 19:09:59 +00:00
}
2000-10-06 03:21:49 +00:00
char * vfswrap_getwd ( connection_struct * conn , char * path )
2000-09-27 19:09:59 +00:00
{
2000-10-06 18:13:52 +00:00
char * result ;
START_PROFILE ( syscall_getwd ) ;
2000-09-27 19:09:59 +00:00
# ifdef VFS_CHECK_NULL
if ( path = = NULL ) {
smb_panic ( " NULL pointer passed to vfswrap_getwd() \n " ) ;
}
# endif
2000-10-06 18:13:52 +00:00
result = sys_getwd ( path ) ;
END_PROFILE ( syscall_getwd ) ;
return result ;
2000-09-27 19:09:59 +00:00
}
2001-07-04 07:15:53 +00:00
int vfswrap_utime ( connection_struct * conn , const char * path , struct utimbuf * times )
2000-02-03 05:10:09 +00:00
{
int result ;
2000-10-06 18:13:52 +00:00
START_PROFILE ( syscall_utime ) ;
2000-02-03 05:10:09 +00:00
# ifdef VFS_CHECK_NULL
if ( ( path = = NULL ) | | ( times = = NULL ) ) {
smb_panic ( " NULL pointer passed to vfswrap_utime() \n " ) ;
}
# endif
result = utime ( path , times ) ;
2000-10-06 18:13:52 +00:00
END_PROFILE ( syscall_utime ) ;
2000-02-03 05:10:09 +00:00
return result ;
}
2000-04-22 00:33:16 +00:00
2002-01-29 01:17:44 +00:00
/*********************************************************************
A version of ftruncate that will write the space on disk if strict
allocate is set .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int strict_allocate_ftruncate ( files_struct * fsp , int fd , SMB_OFF_T len )
{
struct vfs_ops * vfs_ops = & fsp - > conn - > vfs_ops ;
SMB_STRUCT_STAT st ;
SMB_OFF_T currpos = vfs_ops - > lseek ( fsp , fd , 0 , SEEK_CUR ) ;
unsigned char zero_space [ 4096 ] ;
2002-02-27 18:06:47 +00:00
SMB_OFF_T space_to_write ;
2002-01-29 01:17:44 +00:00
if ( currpos = = - 1 )
return - 1 ;
if ( vfs_ops - > fstat ( fsp , fd , & st ) = = - 1 )
return - 1 ;
2002-02-27 18:06:47 +00:00
space_to_write = len - st . st_size ;
2002-01-29 01:17:44 +00:00
# ifdef S_ISFIFO
if ( S_ISFIFO ( st . st_mode ) )
return 0 ;
# endif
if ( st . st_size = = len )
return 0 ;
/* Shrink - just ftruncate. */
if ( st . st_size > len )
return sys_ftruncate ( fd , len ) ;
/* Write out the real space on disk. */
if ( vfs_ops - > lseek ( fsp , fd , st . st_size , SEEK_SET ) ! = st . st_size )
return - 1 ;
space_to_write = len - st . st_size ;
memset ( zero_space , ' \0 ' , sizeof ( zero_space ) ) ;
while ( space_to_write > 0 ) {
SMB_OFF_T retlen ;
SMB_OFF_T current_len_to_write = MIN ( sizeof ( zero_space ) , space_to_write ) ;
retlen = vfs_ops - > write ( fsp , fsp - > fd , ( char * ) zero_space , current_len_to_write ) ;
if ( retlen < = 0 )
return - 1 ;
space_to_write - = retlen ;
}
/* Seek to where we were */
if ( vfs_ops - > lseek ( fsp , fd , currpos , SEEK_SET ) ! = currpos )
return - 1 ;
return 0 ;
}
2000-11-16 00:59:18 +00:00
int vfswrap_ftruncate ( files_struct * fsp , int fd , SMB_OFF_T len )
2000-04-22 00:33:16 +00:00
{
2000-11-16 00:59:18 +00:00
int result = - 1 ;
2001-04-14 00:19:12 +00:00
struct vfs_ops * vfs_ops = & fsp - > conn - > vfs_ops ;
2000-11-16 00:59:18 +00:00
SMB_STRUCT_STAT st ;
char c = 0 ;
SMB_OFF_T currpos ;
2001-07-05 10:33:10 +00:00
START_PROFILE ( syscall_ftruncate ) ;
2002-01-29 01:17:44 +00:00
if ( lp_strict_allocate ( SNUM ( fsp - > conn ) ) ) {
result = strict_allocate_ftruncate ( fsp , fd , len ) ;
END_PROFILE ( syscall_ftruncate ) ;
return result ;
}
2001-07-05 10:33:10 +00:00
/* we used to just check HAVE_FTRUNCATE_EXTEND and only use
sys_ftruncate if the system supports it . Then I discovered that
you can have some filesystems that support ftruncate
expansion and some that don ' t ! On Linux fat can ' t do
ftruncate extend but ext2 can . */
2002-01-29 01:17:44 +00:00
2001-07-05 10:33:10 +00:00
result = sys_ftruncate ( fd , len ) ;
2002-01-29 01:17:44 +00:00
if ( result = = 0 )
goto done ;
2001-07-05 10:33:10 +00:00
/* According to W. R. Stevens advanced UNIX prog. Pure 4.3 BSD cannot
extend a file with ftruncate . Provide alternate implementation
for this */
currpos = vfs_ops - > lseek ( fsp , fd , 0 , SEEK_CUR ) ;
if ( currpos = = - 1 ) {
2000-11-16 00:59:18 +00:00
goto done ;
}
2001-07-05 10:33:10 +00:00
/* Do an fstat to see if the file is longer than the requested
size in which case the ftruncate above should have
succeeded or shorter , in which case seek to len - 1 and
write 1 byte of zero */
2002-01-29 01:17:44 +00:00
if ( vfs_ops - > fstat ( fsp , fd , & st ) = = - 1 ) {
2000-11-16 00:59:18 +00:00
goto done ;
}
# ifdef S_ISFIFO
if ( S_ISFIFO ( st . st_mode ) ) {
result = 0 ;
goto done ;
}
# endif
2001-07-05 10:33:10 +00:00
if ( st . st_size = = len ) {
2000-11-16 00:59:18 +00:00
result = 0 ;
goto done ;
}
2001-07-05 10:33:10 +00:00
if ( st . st_size > len ) {
/* the sys_ftruncate should have worked */
2000-11-16 00:59:18 +00:00
goto done ;
}
2002-01-29 01:17:44 +00:00
if ( vfs_ops - > lseek ( fsp , fd , len - 1 , SEEK_SET ) ! = len - 1 )
2000-11-16 00:59:18 +00:00
goto done ;
2002-01-29 01:17:44 +00:00
if ( vfs_ops - > write ( fsp , fd , & c , 1 ) ! = 1 )
2000-11-16 00:59:18 +00:00
goto done ;
/* Seek to where we were */
2002-01-29 01:17:44 +00:00
if ( vfs_ops - > lseek ( fsp , fd , currpos , SEEK_SET ) ! = currpos )
2000-11-16 00:59:18 +00:00
goto done ;
2001-07-05 10:33:10 +00:00
result = 0 ;
2002-01-29 01:17:44 +00:00
2000-11-16 00:59:18 +00:00
done :
2001-07-05 10:33:10 +00:00
END_PROFILE ( syscall_ftruncate ) ;
return result ;
2000-04-22 00:33:16 +00:00
}
2000-05-02 03:20:47 +00:00
2000-10-06 03:21:49 +00:00
BOOL vfswrap_lock ( files_struct * fsp , int fd , int op , SMB_OFF_T offset , SMB_OFF_T count , int type )
2000-05-02 03:20:47 +00:00
{
2000-10-06 18:13:52 +00:00
BOOL result ;
START_PROFILE ( syscall_fcntl_lock ) ;
result = fcntl_lock ( fd , op , offset , count , type ) ;
END_PROFILE ( syscall_fcntl_lock ) ;
return result ;
}
2001-06-29 22:32:24 +00:00
int vfswrap_symlink ( connection_struct * conn , const char * oldpath , const char * newpath )
{
int result ;
START_PROFILE ( syscall_symlink ) ;
# ifdef VFS_CHECK_NULL
if ( ( oldpath = = NULL ) | | ( newpath = = NULL ) )
smb_panic ( " NULL pointer passed to vfswrap_symlink() \n " ) ;
# endif
result = sys_symlink ( oldpath , newpath ) ;
END_PROFILE ( syscall_symlink ) ;
return result ;
}
int vfswrap_readlink ( connection_struct * conn , const char * path , char * buf , size_t bufsiz )
{
int result ;
START_PROFILE ( syscall_readlink ) ;
# ifdef VFS_CHECK_NULL
if ( ( path = = NULL ) | | ( buf = = NULL ) )
smb_panic ( " NULL pointer passed to vfswrap_readlink() \n " ) ;
# endif
result = sys_readlink ( path , buf , bufsiz ) ;
END_PROFILE ( syscall_readlink ) ;
return result ;
}
2002-01-10 00:28:09 +00:00
int vfswrap_link ( connection_struct * conn , const char * oldpath , const char * newpath )
{
int result ;
START_PROFILE ( syscall_link ) ;
# ifdef VFS_CHECK_NULL
if ( ( oldpath = = NULL ) | | ( newpath = = NULL ) )
smb_panic ( " NULL pointer passed to vfswrap_link() \n " ) ;
# endif
result = sys_link ( oldpath , newpath ) ;
END_PROFILE ( syscall_link ) ;
return result ;
}
int vfswrap_mknod ( connection_struct * conn , const char * pathname , mode_t mode , SMB_DEV_T dev )
{
int result ;
START_PROFILE ( syscall_mknod ) ;
# ifdef VFS_CHECK_NULL
if ( pathname = = NULL )
smb_panic ( " NULL pointer passed to vfswrap_mknod() \n " ) ;
# endif
result = sys_mknod ( pathname , mode , dev ) ;
END_PROFILE ( syscall_mknod ) ;
return result ;
}
2000-10-06 18:13:52 +00:00
size_t vfswrap_fget_nt_acl ( files_struct * fsp , int fd , SEC_DESC * * ppdesc )
{
2001-09-05 18:43:55 +00:00
size_t result ;
START_PROFILE ( fget_nt_acl ) ;
result = get_nt_acl ( fsp , ppdesc ) ;
END_PROFILE ( fget_nt_acl ) ;
return result ;
2000-10-06 18:13:52 +00:00
}
2001-07-04 07:15:53 +00:00
size_t vfswrap_get_nt_acl ( files_struct * fsp , const char * name , SEC_DESC * * ppdesc )
2000-10-06 18:13:52 +00:00
{
2001-09-05 18:43:55 +00:00
size_t result ;
START_PROFILE ( get_nt_acl ) ;
result = get_nt_acl ( fsp , ppdesc ) ;
END_PROFILE ( get_nt_acl ) ;
return result ;
2000-10-06 18:13:52 +00:00
}
BOOL vfswrap_fset_nt_acl ( files_struct * fsp , int fd , uint32 security_info_sent , SEC_DESC * psd )
{
2001-09-05 18:43:55 +00:00
BOOL result ;
START_PROFILE ( fset_nt_acl ) ;
result = set_nt_acl ( fsp , security_info_sent , psd ) ;
END_PROFILE ( fset_nt_acl ) ;
return result ;
2000-10-06 18:13:52 +00:00
}
2001-07-04 07:15:53 +00:00
BOOL vfswrap_set_nt_acl ( files_struct * fsp , const char * name , uint32 security_info_sent , SEC_DESC * psd )
2000-10-06 18:13:52 +00:00
{
2001-09-05 18:43:55 +00:00
BOOL result ;
START_PROFILE ( set_nt_acl ) ;
result = set_nt_acl ( fsp , security_info_sent , psd ) ;
END_PROFILE ( set_nt_acl ) ;
return result ;
2000-05-02 03:20:47 +00:00
}
2001-01-23 01:52:30 +00:00
2001-07-04 07:15:53 +00:00
int vfswrap_chmod_acl ( connection_struct * conn , const char * name , mode_t mode )
2001-01-23 01:52:30 +00:00
{
2001-09-05 18:43:55 +00:00
int result ;
START_PROFILE ( chmod_acl ) ;
2002-03-12 00:08:08 +00:00
result = chmod_acl ( conn , name , mode ) ;
2001-09-05 18:43:55 +00:00
END_PROFILE ( chmod_acl ) ;
return result ;
2001-01-23 01:52:30 +00:00
}
int vfswrap_fchmod_acl ( files_struct * fsp , int fd , mode_t mode )
{
2001-09-05 18:43:55 +00:00
int result ;
START_PROFILE ( fchmod_acl ) ;
2002-03-12 00:08:08 +00:00
result = fchmod_acl ( fsp , fd , mode ) ;
2001-09-05 18:43:55 +00:00
END_PROFILE ( fchmod_acl ) ;
return result ;
2001-01-23 01:52:30 +00:00
}
2002-03-12 00:08:08 +00:00
int vfswrap_sys_acl_get_entry ( struct connection_struct * conn , SMB_ACL_T theacl , int entry_id , SMB_ACL_ENTRY_T * entry_p )
{
return sys_acl_get_entry ( theacl , entry_id , entry_p ) ;
}
int vfswrap_sys_acl_get_tag_type ( struct connection_struct * conn , SMB_ACL_ENTRY_T entry_d , SMB_ACL_TAG_T * tag_type_p )
{
return sys_acl_get_tag_type ( entry_d , tag_type_p ) ;
}
int vfswrap_sys_acl_get_permset ( struct connection_struct * conn , SMB_ACL_ENTRY_T entry_d , SMB_ACL_PERMSET_T * permset_p )
{
return sys_acl_get_permset ( entry_d , permset_p ) ;
}
void * vfswrap_sys_acl_get_qualifier ( struct connection_struct * conn , SMB_ACL_ENTRY_T entry_d )
{
return sys_acl_get_qualifier ( entry_d ) ;
}
SMB_ACL_T vfswrap_sys_acl_get_file ( struct connection_struct * conn , const char * path_p , SMB_ACL_TYPE_T type )
{
return sys_acl_get_file ( path_p , type ) ;
}
SMB_ACL_T vfswrap_sys_acl_get_fd ( struct files_struct * fsp , int fd )
{
return sys_acl_get_fd ( fd ) ;
}
int vfswrap_sys_acl_clear_perms ( struct connection_struct * conn , SMB_ACL_PERMSET_T permset )
{
return sys_acl_clear_perms ( permset ) ;
}
int vfswrap_sys_acl_add_perm ( struct connection_struct * conn , SMB_ACL_PERMSET_T permset , SMB_ACL_PERM_T perm )
{
return sys_acl_add_perm ( permset , perm ) ;
}
char * vfswrap_sys_acl_to_text ( struct connection_struct * conn , SMB_ACL_T theacl , ssize_t * plen )
{
return sys_acl_to_text ( theacl , plen ) ;
}
SMB_ACL_T vfswrap_sys_acl_init ( struct connection_struct * conn , int count )
{
return sys_acl_init ( count ) ;
}
int vfswrap_sys_acl_create_entry ( struct connection_struct * conn , SMB_ACL_T * pacl , SMB_ACL_ENTRY_T * pentry )
{
return sys_acl_create_entry ( pacl , pentry ) ;
}
int vfswrap_sys_acl_set_tag_type ( struct connection_struct * conn , SMB_ACL_ENTRY_T entry , SMB_ACL_TAG_T tagtype )
{
return sys_acl_set_tag_type ( entry , tagtype ) ;
}
int vfswrap_sys_acl_set_qualifier ( struct connection_struct * conn , SMB_ACL_ENTRY_T entry , void * qual )
{
return sys_acl_set_qualifier ( entry , qual ) ;
}
int vfswrap_sys_acl_set_permset ( struct connection_struct * conn , SMB_ACL_ENTRY_T entry , SMB_ACL_PERMSET_T permset )
{
return sys_acl_set_permset ( entry , permset ) ;
}
int vfswrap_sys_acl_valid ( struct connection_struct * conn , SMB_ACL_T theacl )
{
return sys_acl_valid ( theacl ) ;
}
int vfswrap_sys_acl_set_file ( struct connection_struct * conn , const char * name , SMB_ACL_TYPE_T acltype , SMB_ACL_T theacl )
{
return sys_acl_set_file ( name , acltype , theacl ) ;
}
int vfswrap_sys_acl_set_fd ( struct files_struct * fsp , int fd , SMB_ACL_T theacl )
{
return sys_acl_set_fd ( fd , theacl ) ;
}
int vfswrap_sys_acl_delete_def_file ( struct connection_struct * conn , const char * path )
{
return sys_acl_delete_def_file ( path ) ;
}
int vfswrap_sys_acl_get_perm ( struct connection_struct * conn , SMB_ACL_PERMSET_T permset , SMB_ACL_PERM_T perm )
{
return sys_acl_get_perm ( permset , perm ) ;
}
int vfswrap_sys_acl_free_text ( struct connection_struct * conn , char * text )
{
return sys_acl_free_text ( text ) ;
}
int vfswrap_sys_acl_free_acl ( struct connection_struct * conn , SMB_ACL_T posix_acl )
{
return sys_acl_free_acl ( posix_acl ) ;
}
int vfswrap_sys_acl_free_qualifier ( struct connection_struct * conn , void * qualifier , SMB_ACL_TAG_T tagtype )
{
return sys_acl_free_qualifier ( qualifier , tagtype ) ;
}