2003-08-07 20:26:28 +04:00
|
|
|
/* $NetBSD: cd9660_lookup.c,v 1.6 2003/08/07 16:31:34 agc Exp $ */
|
1994-06-29 10:29:24 +04:00
|
|
|
|
1994-06-08 15:22:45 +04:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 1989, 1993, 1994
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley
|
|
|
|
* by Pace Willisson (pace@blitz.com). The Rock Ridge Extension
|
|
|
|
* Support code is derived from software contributed to Berkeley
|
|
|
|
* by Atsushi Murai (amurai@spec.co.jp).
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2003-08-07 20:26:28 +04:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1994-06-08 15:22:45 +04:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* from: @(#)ufs_lookup.c 7.33 (Berkeley) 5/19/91
|
1994-12-14 01:33:10 +03:00
|
|
|
*
|
1998-03-01 05:20:01 +03:00
|
|
|
* @(#)cd9660_lookup.c 8.5 (Berkeley) 5/27/95
|
1994-06-08 15:22:45 +04:00
|
|
|
*/
|
|
|
|
|
2001-11-12 18:25:01 +03:00
|
|
|
#include <sys/cdefs.h>
|
2003-08-07 20:26:28 +04:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: cd9660_lookup.c,v 1.6 2003/08/07 16:31:34 agc Exp $");
|
2001-11-12 18:25:01 +03:00
|
|
|
|
1994-06-08 15:22:45 +04:00
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/namei.h>
|
|
|
|
#include <sys/buf.h>
|
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/vnode.h>
|
|
|
|
#include <sys/mount.h>
|
1996-02-10 00:31:50 +03:00
|
|
|
#include <sys/systm.h>
|
1994-06-08 15:22:45 +04:00
|
|
|
|
2002-12-23 20:52:02 +03:00
|
|
|
#include <fs/cd9660/iso.h>
|
|
|
|
#include <fs/cd9660/cd9660_extern.h>
|
|
|
|
#include <fs/cd9660/cd9660_node.h>
|
|
|
|
#include <fs/cd9660/iso_rrip.h>
|
|
|
|
#include <fs/cd9660/cd9660_rrip.h>
|
|
|
|
#include <fs/cd9660/cd9660_mount.h>
|
1994-06-08 15:22:45 +04:00
|
|
|
|
|
|
|
struct nchstats iso_nchstats;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Convert a component of a pathname into a pointer to a locked inode.
|
|
|
|
* This is a very central and rather complicated routine.
|
|
|
|
* If the file system is not maintained in a strict tree hierarchy,
|
|
|
|
* this can result in a deadlock situation (see comments in code below).
|
|
|
|
*
|
|
|
|
* The flag argument is LOOKUP, CREATE, RENAME, or DELETE depending on
|
|
|
|
* whether the name is to be looked up, created, renamed, or deleted.
|
|
|
|
* When CREATE, RENAME, or DELETE is specified, information usable in
|
|
|
|
* creating, renaming, or deleting a directory entry may be calculated.
|
|
|
|
* If flag has LOCKPARENT or'ed into it and the target of the pathname
|
|
|
|
* exists, lookup returns both the target and its parent directory locked.
|
|
|
|
* When creating or renaming and LOCKPARENT is specified, the target may
|
|
|
|
* not be ".". When deleting and LOCKPARENT is specified, the target may
|
|
|
|
* be "."., but the caller must check to ensure it does an vrele and iput
|
|
|
|
* instead of two iputs.
|
|
|
|
*
|
|
|
|
* Overall outline of ufs_lookup:
|
|
|
|
*
|
|
|
|
* check accessibility of directory
|
|
|
|
* look for name in cache, if found, then if at end of path
|
|
|
|
* and deleting or creating, drop it, else return name
|
|
|
|
* search for name in directory, to found or notfound
|
|
|
|
* notfound:
|
|
|
|
* if creating, return locked directory, leaving info on available slots
|
|
|
|
* else return error
|
|
|
|
* found:
|
|
|
|
* if at end of path and deleting, return information to allow delete
|
|
|
|
* if at end of path and rewriting (RENAME and LOCKPARENT), lock target
|
|
|
|
* inode and return info to allow rewrite
|
|
|
|
* if not at end, add name to cache; if at end and neither creating
|
|
|
|
* nor deleting, add name to cache
|
|
|
|
*
|
|
|
|
* NOTE: (LOOKUP | LOCKPARENT) currently returns the parent inode unlocked.
|
|
|
|
*/
|
1994-12-24 18:30:03 +03:00
|
|
|
int
|
1996-02-10 00:31:50 +03:00
|
|
|
cd9660_lookup(v)
|
|
|
|
void *v;
|
|
|
|
{
|
1994-06-08 15:22:45 +04:00
|
|
|
struct vop_lookup_args /* {
|
|
|
|
struct vnode *a_dvp;
|
|
|
|
struct vnode **a_vpp;
|
|
|
|
struct componentname *a_cnp;
|
1996-02-10 00:31:50 +03:00
|
|
|
} */ *ap = v;
|
2000-03-30 16:13:30 +04:00
|
|
|
struct vnode *vdp; /* vnode for directory being searched */
|
|
|
|
struct iso_node *dp; /* inode for directory being searched */
|
|
|
|
struct iso_mnt *imp; /* file system that directory is in */
|
1994-06-08 15:22:45 +04:00
|
|
|
struct buf *bp; /* a buffer of directory entries */
|
1996-02-10 00:31:50 +03:00
|
|
|
struct iso_directory_record *ep = NULL;
|
|
|
|
/* the current directory entry */
|
1994-06-08 15:22:45 +04:00
|
|
|
int entryoffsetinblock; /* offset of ep in bp's buffer */
|
1996-02-10 00:31:50 +03:00
|
|
|
int saveoffset = -1; /* offset of last directory entry in dir */
|
1994-06-08 15:22:45 +04:00
|
|
|
int numdirpasses; /* strategy for directory search */
|
|
|
|
doff_t endsearch; /* offset to end directory search */
|
1994-07-14 02:30:07 +04:00
|
|
|
struct vnode *pdp; /* saved dp during symlink work */
|
|
|
|
struct vnode *tdp; /* returned by cd9660_vget_internal */
|
1994-07-19 19:07:36 +04:00
|
|
|
u_long bmask; /* block offset mask */
|
1994-06-08 15:22:45 +04:00
|
|
|
int lockparent; /* 1 => lockparent flag is set */
|
|
|
|
int error;
|
|
|
|
ino_t ino = 0;
|
|
|
|
int reclen;
|
|
|
|
u_short namelen;
|
|
|
|
char altname[NAME_MAX];
|
|
|
|
int res;
|
|
|
|
int assoc, len;
|
1996-10-26 03:13:58 +04:00
|
|
|
const char *name;
|
1994-06-08 15:22:45 +04:00
|
|
|
struct vnode **vpp = ap->a_vpp;
|
|
|
|
struct componentname *cnp = ap->a_cnp;
|
|
|
|
struct ucred *cred = cnp->cn_cred;
|
1999-07-08 05:05:58 +04:00
|
|
|
int flags;
|
1994-06-08 15:22:45 +04:00
|
|
|
int nameiop = cnp->cn_nameiop;
|
|
|
|
|
1999-07-08 05:05:58 +04:00
|
|
|
cnp->cn_flags &= ~PDIRUNLOCK;
|
|
|
|
flags = cnp->cn_flags;
|
|
|
|
|
1994-06-08 15:22:45 +04:00
|
|
|
bp = NULL;
|
|
|
|
*vpp = NULL;
|
|
|
|
vdp = ap->a_dvp;
|
|
|
|
dp = VTOI(vdp);
|
|
|
|
imp = dp->i_mnt;
|
|
|
|
lockparent = flags & LOCKPARENT;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check accessiblity of directory.
|
|
|
|
*/
|
2003-06-30 02:28:00 +04:00
|
|
|
if ((error = VOP_ACCESS(vdp, VEXEC, cred, cnp->cn_proc)) != 0)
|
1994-06-08 15:22:45 +04:00
|
|
|
return (error);
|
1998-03-01 05:20:01 +03:00
|
|
|
|
|
|
|
if ((flags & ISLASTCN) && (vdp->v_mount->mnt_flag & MNT_RDONLY) &&
|
|
|
|
(cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME))
|
|
|
|
return (EROFS);
|
|
|
|
|
1994-06-08 15:22:45 +04:00
|
|
|
/*
|
|
|
|
* We now have a segment name to search for, and a directory to search.
|
|
|
|
*
|
|
|
|
* Before tediously performing a linear scan of the directory,
|
|
|
|
* check the name cache to see if the directory/name pair
|
|
|
|
* we are looking for is known already.
|
|
|
|
*/
|
1999-09-06 14:10:05 +04:00
|
|
|
if ((error = cache_lookup(vdp, vpp, cnp)) >= 0)
|
|
|
|
return (error);
|
1994-06-08 15:22:45 +04:00
|
|
|
|
|
|
|
len = cnp->cn_namelen;
|
|
|
|
name = cnp->cn_nameptr;
|
|
|
|
/*
|
|
|
|
* A leading `=' means, we are looking for an associated file
|
|
|
|
*/
|
1996-02-10 00:31:50 +03:00
|
|
|
assoc = (imp->iso_ftype != ISO_FTYPE_RRIP && *name == ASSOCCHAR);
|
|
|
|
if (assoc) {
|
1994-06-08 15:22:45 +04:00
|
|
|
len--;
|
|
|
|
name++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there is cached information on a previous search of
|
|
|
|
* this directory, pick up where we last left off.
|
|
|
|
* We cache only lookups as these are the most common
|
|
|
|
* and have the greatest payoff. Caching CREATE has little
|
|
|
|
* benefit as it usually must search the entire directory
|
|
|
|
* to determine that the entry does not exist. Caching the
|
|
|
|
* location of the last DELETE or RENAME has not reduced
|
|
|
|
* profiling time and hence has been removed in the interest
|
|
|
|
* of simplicity.
|
|
|
|
*/
|
1994-07-19 19:07:36 +04:00
|
|
|
bmask = imp->im_bmask;
|
1994-06-08 15:22:45 +04:00
|
|
|
if (nameiop != LOOKUP || dp->i_diroff == 0 ||
|
|
|
|
dp->i_diroff > dp->i_size) {
|
|
|
|
entryoffsetinblock = 0;
|
|
|
|
dp->i_offset = 0;
|
|
|
|
numdirpasses = 1;
|
|
|
|
} else {
|
|
|
|
dp->i_offset = dp->i_diroff;
|
1994-07-19 19:07:36 +04:00
|
|
|
if ((entryoffsetinblock = dp->i_offset & bmask) &&
|
|
|
|
(error = VOP_BLKATOFF(vdp, (off_t)dp->i_offset, NULL, &bp)))
|
1994-06-08 15:22:45 +04:00
|
|
|
return (error);
|
|
|
|
numdirpasses = 2;
|
|
|
|
iso_nchstats.ncs_2passes++;
|
|
|
|
}
|
1994-07-19 18:14:08 +04:00
|
|
|
endsearch = dp->i_size;
|
1994-06-08 15:22:45 +04:00
|
|
|
|
|
|
|
searchloop:
|
|
|
|
while (dp->i_offset < endsearch) {
|
|
|
|
/*
|
|
|
|
* If offset is on a block boundary,
|
|
|
|
* read the next directory block.
|
|
|
|
* Release previous if it exists.
|
|
|
|
*/
|
1994-07-19 19:14:07 +04:00
|
|
|
if ((dp->i_offset & bmask) == 0) {
|
1994-06-08 15:22:45 +04:00
|
|
|
if (bp != NULL)
|
|
|
|
brelse(bp);
|
1996-02-10 00:31:50 +03:00
|
|
|
error = VOP_BLKATOFF(vdp, (off_t)dp->i_offset,
|
|
|
|
NULL, &bp);
|
|
|
|
if (error)
|
1994-06-08 15:22:45 +04:00
|
|
|
return (error);
|
|
|
|
entryoffsetinblock = 0;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Get pointer to next entry.
|
|
|
|
*/
|
|
|
|
ep = (struct iso_directory_record *)
|
1994-07-19 19:07:36 +04:00
|
|
|
((char *)bp->b_data + entryoffsetinblock);
|
1994-06-08 15:22:45 +04:00
|
|
|
|
1994-07-19 19:07:36 +04:00
|
|
|
reclen = isonum_711(ep->length);
|
1994-06-08 15:22:45 +04:00
|
|
|
if (reclen == 0) {
|
|
|
|
/* skip to next block, if any */
|
1994-07-20 10:09:38 +04:00
|
|
|
dp->i_offset =
|
|
|
|
(dp->i_offset & ~bmask) + imp->logical_block_size;
|
1994-06-08 15:22:45 +04:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (reclen < ISO_DIRECTORY_RECORD_SIZE)
|
|
|
|
/* illegal entry, stop */
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (entryoffsetinblock + reclen > imp->logical_block_size)
|
|
|
|
/* entries are not allowed to cross boundaries */
|
|
|
|
break;
|
|
|
|
|
|
|
|
namelen = isonum_711(ep->name_len);
|
|
|
|
|
|
|
|
if (reclen < ISO_DIRECTORY_RECORD_SIZE + namelen)
|
|
|
|
/* illegal entry, stop */
|
|
|
|
break;
|
|
|
|
|
1994-07-19 19:07:36 +04:00
|
|
|
/*
|
|
|
|
* Check for a name match.
|
|
|
|
*/
|
1994-06-08 15:22:45 +04:00
|
|
|
switch (imp->iso_ftype) {
|
|
|
|
default:
|
|
|
|
if ((!(isonum_711(ep->flags)&4)) == !assoc) {
|
|
|
|
if ((len == 1
|
|
|
|
&& *name == '.')
|
|
|
|
|| (flags & ISDOTDOT)) {
|
|
|
|
if (namelen == 1
|
|
|
|
&& ep->name[0] == ((flags & ISDOTDOT) ? 1 : 0)) {
|
|
|
|
/*
|
|
|
|
* Save directory entry's inode number and
|
1994-07-23 03:17:59 +04:00
|
|
|
* release directory buffer.
|
1994-06-08 15:22:45 +04:00
|
|
|
*/
|
1994-07-19 18:14:08 +04:00
|
|
|
dp->i_ino = isodirino(ep, imp);
|
1994-06-08 15:22:45 +04:00
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
if (namelen != 1
|
|
|
|
|| ep->name[0] != 0)
|
|
|
|
goto notfound;
|
|
|
|
} else if (!(res = isofncmp(name,len,
|
1999-07-13 15:12:05 +04:00
|
|
|
ep->name,namelen,
|
|
|
|
imp->im_joliet_level))) {
|
1994-06-08 15:22:45 +04:00
|
|
|
if (isonum_711(ep->flags)&2)
|
1994-07-19 18:14:08 +04:00
|
|
|
ino = isodirino(ep, imp);
|
1994-06-08 15:22:45 +04:00
|
|
|
else
|
|
|
|
ino = dbtob(bp->b_blkno)
|
|
|
|
+ entryoffsetinblock;
|
|
|
|
saveoffset = dp->i_offset;
|
|
|
|
} else if (ino)
|
|
|
|
goto foundino;
|
|
|
|
#ifdef NOSORTBUG /* On some CDs directory entries are not sorted correctly */
|
|
|
|
else if (res < 0)
|
|
|
|
goto notfound;
|
|
|
|
else if (res > 0 && numdirpasses == 2)
|
|
|
|
numdirpasses++;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ISO_FTYPE_RRIP:
|
|
|
|
if (isonum_711(ep->flags)&2)
|
1994-07-19 18:14:08 +04:00
|
|
|
ino = isodirino(ep, imp);
|
1994-06-08 15:22:45 +04:00
|
|
|
else
|
|
|
|
ino = dbtob(bp->b_blkno) + entryoffsetinblock;
|
|
|
|
dp->i_ino = ino;
|
|
|
|
cd9660_rrip_getname(ep,altname,&namelen,&dp->i_ino,imp);
|
2000-07-16 01:40:42 +04:00
|
|
|
if (namelen == cnp->cn_namelen) {
|
|
|
|
if (imp->im_flags & ISOFSMNT_RRCASEINS) {
|
|
|
|
if (strncasecmp(name, altname, namelen) == 0)
|
|
|
|
goto found;
|
|
|
|
} else {
|
|
|
|
if (memcmp(name, altname, namelen) == 0)
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
}
|
1994-06-08 15:22:45 +04:00
|
|
|
ino = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
dp->i_offset += reclen;
|
|
|
|
entryoffsetinblock += reclen;
|
|
|
|
}
|
|
|
|
if (ino) {
|
|
|
|
foundino:
|
|
|
|
dp->i_ino = ino;
|
|
|
|
if (saveoffset != dp->i_offset) {
|
1994-07-19 18:14:08 +04:00
|
|
|
if (lblkno(imp, dp->i_offset) !=
|
|
|
|
lblkno(imp, saveoffset)) {
|
1994-06-08 15:22:45 +04:00
|
|
|
if (bp != NULL)
|
|
|
|
brelse(bp);
|
1996-02-10 00:31:50 +03:00
|
|
|
if ((error = VOP_BLKATOFF(vdp,
|
|
|
|
(off_t)saveoffset, NULL, &bp)) != 0)
|
1994-06-08 15:22:45 +04:00
|
|
|
return (error);
|
|
|
|
}
|
1994-07-20 10:09:38 +04:00
|
|
|
entryoffsetinblock = saveoffset & bmask;
|
1994-06-15 03:54:44 +04:00
|
|
|
ep = (struct iso_directory_record *)
|
1994-07-20 10:09:38 +04:00
|
|
|
((char *)bp->b_data + entryoffsetinblock);
|
1994-06-08 15:22:45 +04:00
|
|
|
dp->i_offset = saveoffset;
|
|
|
|
}
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
notfound:
|
|
|
|
/*
|
|
|
|
* If we started in the middle of the directory and failed
|
|
|
|
* to find our target, we must check the beginning as well.
|
|
|
|
*/
|
|
|
|
if (numdirpasses == 2) {
|
|
|
|
numdirpasses--;
|
|
|
|
dp->i_offset = 0;
|
|
|
|
endsearch = dp->i_diroff;
|
|
|
|
goto searchloop;
|
|
|
|
}
|
|
|
|
if (bp != NULL)
|
|
|
|
brelse(bp);
|
1994-07-23 03:17:59 +04:00
|
|
|
|
1994-06-08 15:22:45 +04:00
|
|
|
/*
|
|
|
|
* Insert name into cache (as non-existent) if appropriate.
|
|
|
|
*/
|
|
|
|
if (cnp->cn_flags & MAKEENTRY)
|
|
|
|
cache_enter(vdp, *vpp, cnp);
|
|
|
|
if (nameiop == CREATE || nameiop == RENAME)
|
1999-04-08 01:37:11 +04:00
|
|
|
return (EROFS);
|
1994-06-08 15:22:45 +04:00
|
|
|
return (ENOENT);
|
|
|
|
|
|
|
|
found:
|
|
|
|
if (numdirpasses == 2)
|
|
|
|
iso_nchstats.ncs_pass2++;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Found component in pathname.
|
|
|
|
* If the final component of path name, save information
|
|
|
|
* in the cache as to where the entry was found.
|
|
|
|
*/
|
|
|
|
if ((flags & ISLASTCN) && nameiop == LOOKUP)
|
|
|
|
dp->i_diroff = dp->i_offset;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Step through the translation in the name. We do not `iput' the
|
|
|
|
* directory because we may need it again if a symbolic link
|
|
|
|
* is relative to the current directory. Instead we save it
|
|
|
|
* unlocked as "pdp". We must get the target inode before unlocking
|
|
|
|
* the directory to insure that the inode will not be removed
|
|
|
|
* before we get it. We prevent deadlock by always fetching
|
|
|
|
* inodes from the root, moving down the directory tree. Thus
|
|
|
|
* when following backward pointers ".." we must unlock the
|
|
|
|
* parent directory before getting the requested directory.
|
|
|
|
* There is a potential race condition here if both the current
|
|
|
|
* and parent directories are removed before the `iget' for the
|
|
|
|
* inode associated with ".." returns. We hope that this occurs
|
|
|
|
* infrequently since we cannot avoid this race condition without
|
|
|
|
* implementing a sophisticated deadlock detection algorithm.
|
|
|
|
* Note also that this simple deadlock detection scheme will not
|
|
|
|
* work if the file system has any hard links other than ".."
|
|
|
|
* that point backwards in the directory structure.
|
|
|
|
*/
|
1994-07-14 02:30:07 +04:00
|
|
|
pdp = vdp;
|
1994-06-08 15:22:45 +04:00
|
|
|
/*
|
|
|
|
* If ino is different from dp->i_ino,
|
|
|
|
* it's a relocated directory.
|
|
|
|
*/
|
|
|
|
if (flags & ISDOTDOT) {
|
1998-03-01 05:20:01 +03:00
|
|
|
VOP_UNLOCK(pdp, 0); /* race to get the inode */
|
1999-07-08 05:05:58 +04:00
|
|
|
cnp->cn_flags |= PDIRUNLOCK;
|
1994-07-23 03:17:59 +04:00
|
|
|
error = cd9660_vget_internal(vdp->v_mount, dp->i_ino, &tdp,
|
2003-06-29 22:43:21 +04:00
|
|
|
dp->i_ino != ino, ep);
|
1994-07-23 03:17:59 +04:00
|
|
|
brelse(bp);
|
|
|
|
if (error) {
|
1999-07-08 05:05:58 +04:00
|
|
|
if (vn_lock(pdp, LK_EXCLUSIVE | LK_RETRY) == 0)
|
|
|
|
cnp->cn_flags &= ~PDIRUNLOCK;
|
1994-07-14 02:30:07 +04:00
|
|
|
return (error);
|
|
|
|
}
|
1999-08-04 22:40:47 +04:00
|
|
|
if (lockparent && (flags & ISLASTCN)) {
|
|
|
|
if ((error = vn_lock(pdp, LK_EXCLUSIVE))) {
|
|
|
|
vput(tdp);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
cnp->cn_flags &= ~PDIRUNLOCK;
|
1994-06-08 15:22:45 +04:00
|
|
|
}
|
1994-07-14 02:30:07 +04:00
|
|
|
*vpp = tdp;
|
1994-06-08 15:22:45 +04:00
|
|
|
} else if (dp->i_number == dp->i_ino) {
|
1994-07-23 03:17:59 +04:00
|
|
|
brelse(bp);
|
1994-06-08 15:22:45 +04:00
|
|
|
VREF(vdp); /* we want ourself, ie "." */
|
|
|
|
*vpp = vdp;
|
|
|
|
} else {
|
1994-07-23 03:17:59 +04:00
|
|
|
error = cd9660_vget_internal(vdp->v_mount, dp->i_ino, &tdp,
|
2003-06-29 22:43:21 +04:00
|
|
|
dp->i_ino != ino, ep);
|
1994-07-23 03:17:59 +04:00
|
|
|
brelse(bp);
|
|
|
|
if (error)
|
1994-06-08 15:22:45 +04:00
|
|
|
return (error);
|
1999-07-08 05:05:58 +04:00
|
|
|
if (!lockparent || !(flags & ISLASTCN)) {
|
1998-03-01 05:20:01 +03:00
|
|
|
VOP_UNLOCK(pdp, 0);
|
1999-07-08 05:05:58 +04:00
|
|
|
cnp->cn_flags |= PDIRUNLOCK;
|
|
|
|
}
|
1994-07-14 02:30:07 +04:00
|
|
|
*vpp = tdp;
|
1994-06-08 15:22:45 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Insert name into cache if appropriate.
|
|
|
|
*/
|
|
|
|
if (cnp->cn_flags & MAKEENTRY)
|
|
|
|
cache_enter(vdp, *vpp, cnp);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
1994-07-19 18:14:08 +04:00
|
|
|
* Return buffer with the contents of block "offset" from the beginning of
|
|
|
|
* directory "ip". If "res" is non-zero, fill it in with a pointer to the
|
1994-06-08 15:22:45 +04:00
|
|
|
* remaining space in the directory.
|
|
|
|
*/
|
1994-07-19 18:14:08 +04:00
|
|
|
int
|
1996-02-10 00:31:50 +03:00
|
|
|
cd9660_blkatoff(v)
|
|
|
|
void *v;
|
|
|
|
{
|
1994-07-19 18:14:08 +04:00
|
|
|
struct vop_blkatoff_args /* {
|
|
|
|
struct vnode *a_vp;
|
|
|
|
off_t a_offset;
|
|
|
|
char **a_res;
|
|
|
|
struct buf **a_bpp;
|
1996-02-10 00:31:50 +03:00
|
|
|
} */ *ap = v;
|
1994-07-19 18:14:08 +04:00
|
|
|
struct iso_node *ip;
|
2000-03-30 16:13:30 +04:00
|
|
|
struct iso_mnt *imp;
|
1994-06-08 15:22:45 +04:00
|
|
|
struct buf *bp;
|
1994-07-19 18:14:08 +04:00
|
|
|
daddr_t lbn;
|
|
|
|
int bsize, error;
|
|
|
|
|
|
|
|
ip = VTOI(ap->a_vp);
|
|
|
|
imp = ip->i_mnt;
|
|
|
|
lbn = lblkno(imp, ap->a_offset);
|
|
|
|
bsize = blksize(imp, ip, lbn);
|
1994-06-08 15:22:45 +04:00
|
|
|
|
1996-02-10 00:31:50 +03:00
|
|
|
if ((error = bread(ap->a_vp, lbn, bsize, NOCRED, &bp)) != 0) {
|
1994-06-08 15:22:45 +04:00
|
|
|
brelse(bp);
|
1994-07-19 18:14:08 +04:00
|
|
|
*ap->a_bpp = NULL;
|
1994-06-08 15:22:45 +04:00
|
|
|
return (error);
|
|
|
|
}
|
1994-07-19 18:14:08 +04:00
|
|
|
if (ap->a_res)
|
|
|
|
*ap->a_res = (char *)bp->b_data + blkoff(imp, ap->a_offset);
|
|
|
|
*ap->a_bpp = bp;
|
1994-06-08 15:22:45 +04:00
|
|
|
return (0);
|
|
|
|
}
|