555 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			555 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * This file contains the procedures that look up path names in the directory
 | 
						|
 * system and determine the pnode number that goes with a given path name.
 | 
						|
 *
 | 
						|
 * Created (based on MFS):
 | 
						|
 *   June 2011 (Evgeniy Ivanov)
 | 
						|
 */
 | 
						|
 | 
						|
#include "fs.h"
 | 
						|
 | 
						|
#include <sys/cdefs.h>
 | 
						|
#include <sys/stat.h>
 | 
						|
#include <sys/types.h>
 | 
						|
 | 
						|
#include <assert.h>
 | 
						|
#include <errno.h>
 | 
						|
#include <puffs.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <string.h>
 | 
						|
 | 
						|
#include <minix/endpoint.h>
 | 
						|
#include <minix/vfsif.h>
 | 
						|
#include <minix/libminixfs.h>
 | 
						|
 | 
						|
#include "puffs.h"
 | 
						|
#include "puffs_priv.h"
 | 
						|
 | 
						|
char dot2[3] = "..";	/* permissions for . and ..		    */
 | 
						|
 | 
						|
static char *get_name(char *name, char string[NAME_MAX+1]);
 | 
						|
static int ltraverse(struct puffs_node *pn, char *suffix);
 | 
						|
static int parse_path(pino_t dir_ino, pino_t root_ino, int flags, struct
 | 
						|
	puffs_node **res_inop, size_t *offsetp, int *symlinkp);
 | 
						|
 | 
						|
/*===========================================================================*
 | 
						|
 *                             fs_lookup				     *
 | 
						|
 *===========================================================================*/
 | 
						|
int fs_lookup(void)
 | 
						|
{
 | 
						|
  cp_grant_id_t grant;
 | 
						|
  int r, r1, flags, symlinks;
 | 
						|
  unsigned int len;
 | 
						|
  size_t offset = 0, path_size;
 | 
						|
  pino_t dir_ino, root_ino;
 | 
						|
  struct puffs_node *pn;
 | 
						|
 | 
						|
  grant		= (cp_grant_id_t) fs_m_in.REQ_GRANT;
 | 
						|
  path_size	= (size_t) fs_m_in.REQ_PATH_SIZE;	/* Size of the buffer */
 | 
						|
  len		= (int) fs_m_in.REQ_PATH_LEN;	/* including terminating nul */
 | 
						|
  dir_ino	= (pino_t) fs_m_in.REQ_DIR_INO;
 | 
						|
  root_ino	= (pino_t) fs_m_in.REQ_ROOT_INO;
 | 
						|
  flags		= (int) fs_m_in.REQ_FLAGS;
 | 
						|
 | 
						|
  /* Check length. */
 | 
						|
  if (len > sizeof(user_path)) return(E2BIG);	/* too big for buffer */
 | 
						|
  if (len == 0) return(EINVAL);			/* too small */
 | 
						|
 | 
						|
  /* Copy the pathname and set up caller's user and group id */
 | 
						|
  r = sys_safecopyfrom(VFS_PROC_NR, grant, /*offset*/ 0,
 | 
						|
            (vir_bytes) user_path, (size_t) len);
 | 
						|
  if (r != OK) return(r);
 | 
						|
 | 
						|
  /* Verify this is a null-terminated path. */
 | 
						|
  if (user_path[len - 1] != '\0') return(EINVAL);
 | 
						|
 | 
						|
  memset(&credentials, 0, sizeof(credentials));
 | 
						|
  if(!(flags & PATH_GET_UCRED)) { /* Do we have to copy uid/gid credentials? */
 | 
						|
        caller_uid      = (uid_t) fs_m_in.REQ_UID;
 | 
						|
        caller_gid      = (gid_t) fs_m_in.REQ_GID;
 | 
						|
  } else {
 | 
						|
	if((r=fs_lookup_credentials(&credentials,
 | 
						|
		&caller_uid, &caller_gid,
 | 
						|
		(cp_grant_id_t) fs_m_in.REQ_GRANT2,
 | 
						|
		(size_t) fs_m_in.REQ_UCRED_SIZE)) != OK)
 | 
						|
		return r;
 | 
						|
  }
 | 
						|
 | 
						|
 | 
						|
  /* Lookup pnode */
 | 
						|
  pn = NULL;
 | 
						|
  r = parse_path(dir_ino, root_ino, flags, &pn, &offset, &symlinks);
 | 
						|
 | 
						|
  if (symlinks != 0 && (r == ELEAVEMOUNT || r == EENTERMOUNT || r == ESYMLINK)){
 | 
						|
	len = strlen(user_path)+1;
 | 
						|
	if (len > path_size) return(ENAMETOOLONG);
 | 
						|
 | 
						|
	r1 = sys_safecopyto(VFS_PROC_NR, grant, (vir_bytes) 0,
 | 
						|
			    (vir_bytes) user_path, (size_t) len);
 | 
						|
	if (r1 != OK) return(r1);
 | 
						|
  }
 | 
						|
 | 
						|
  if (r == ELEAVEMOUNT || r == ESYMLINK) {
 | 
						|
	/* Report offset and the error */
 | 
						|
	fs_m_out.RES_OFFSET = offset;
 | 
						|
	fs_m_out.RES_SYMLOOP = symlinks;
 | 
						|
	
 | 
						|
	return(r);
 | 
						|
  }
 | 
						|
 | 
						|
  if (r != OK && r != EENTERMOUNT) {
 | 
						|
	return(r);
 | 
						|
  }
 | 
						|
 | 
						|
  if (r == OK) {
 | 
						|
	/* Open pnode */
 | 
						|
	pn->pn_count++;
 | 
						|
  }
 | 
						|
 | 
						|
  fs_m_out.RES_INODE_NR		= pn->pn_va.va_fileid;
 | 
						|
  fs_m_out.RES_MODE		= pn->pn_va.va_mode;
 | 
						|
  fs_m_out.RES_FILE_SIZE	= pn->pn_va.va_size;
 | 
						|
  fs_m_out.RES_SYMLOOP		= symlinks;
 | 
						|
  fs_m_out.RES_UID		= pn->pn_va.va_uid;
 | 
						|
  fs_m_out.RES_GID		= pn->pn_va.va_gid;
 | 
						|
 | 
						|
  /* This is only valid for block and character specials. But it doesn't
 | 
						|
   * cause any harm to set RES_DEV always. */
 | 
						|
  fs_m_out.RES_DEV		= pn->pn_va.va_rdev;
 | 
						|
 | 
						|
  if (r == EENTERMOUNT) {
 | 
						|
	fs_m_out.RES_OFFSET	= offset;
 | 
						|
  }
 | 
						|
  
 | 
						|
  return(r);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/*===========================================================================*
 | 
						|
 *                             parse_path				     *
 | 
						|
 *===========================================================================*/
 | 
						|
static int parse_path(
 | 
						|
	pino_t dir_ino,
 | 
						|
	pino_t root_ino,
 | 
						|
	int flags,
 | 
						|
	struct puffs_node **res_inop,
 | 
						|
	size_t *offsetp,
 | 
						|
	int *symlinkp
 | 
						|
)
 | 
						|
{
 | 
						|
  /* Parse the path in user_path, starting at dir_ino. If the path is the empty
 | 
						|
   * string, just return dir_ino. It is upto the caller to treat an empty
 | 
						|
   * path in a special way. Otherwise, if the path consists of just one or
 | 
						|
   * more slash ('/') characters, the path is replaced with ".". Otherwise,
 | 
						|
   * just look up the first (or only) component in path after skipping any
 | 
						|
   * leading slashes.
 | 
						|
   */
 | 
						|
  int r, leaving_mount;
 | 
						|
  struct puffs_node *pn, *pn_dir;
 | 
						|
  char *cp, *next_cp; /* component and next component */
 | 
						|
  char component[NAME_MAX+1];
 | 
						|
 | 
						|
  /* Start parsing path at the first component in user_path */
 | 
						|
  cp = user_path;
 | 
						|
 | 
						|
  /* No symlinks encountered yet */
 | 
						|
  *symlinkp = 0;
 | 
						|
 | 
						|
  /* Find starting pnode according to the request message */
 | 
						|
  /* XXX it's deffinitely OK to use nodewalk here */
 | 
						|
  if ((pn = puffs_pn_nodewalk(global_pu, 0, &dir_ino)) == NULL) {
 | 
						|
	lpuffs_debug("nodewalk failed\n");
 | 
						|
	return(ENOENT);
 | 
						|
  }
 | 
						|
 | 
						|
  /* If dir has been removed return ENOENT. */
 | 
						|
  if (pn->pn_va.va_nlink == NO_LINK) return(ENOENT);
 | 
						|
 | 
						|
  /* If the given start pnode is a mountpoint, we must be here because the file
 | 
						|
   * system mounted on top returned an ELEAVEMOUNT error. In this case, we must
 | 
						|
   * only accept ".." as the first path component.
 | 
						|
   */
 | 
						|
  leaving_mount = pn->pn_mountpoint; /* True iff pn is a mountpoint */
 | 
						|
 | 
						|
  /* Scan the path component by component. */
 | 
						|
  while (TRUE) {
 | 
						|
	if (cp[0] == '\0') {
 | 
						|
		/* We're done; either the path was empty or we've parsed all
 | 
						|
		   components of the path */
 | 
						|
 | 
						|
		*res_inop = pn;
 | 
						|
		*offsetp += cp - user_path;
 | 
						|
 | 
						|
		/* Return EENTERMOUNT if we are at a mount point */
 | 
						|
		if (pn->pn_mountpoint) return(EENTERMOUNT);
 | 
						|
 | 
						|
		return(OK);
 | 
						|
	}
 | 
						|
 | 
						|
	while(cp[0] == '/') cp++;
 | 
						|
	next_cp = get_name(cp, component);
 | 
						|
	if (next_cp == NULL) {
 | 
						|
		return(err_code);
 | 
						|
	}
 | 
						|
 | 
						|
	/* Special code for '..'. A process is not allowed to leave a chrooted
 | 
						|
	 * environment. A lookup of '..' at the root of a mounted filesystem
 | 
						|
	 * has to return ELEAVEMOUNT. In both cases, the caller needs search
 | 
						|
	 * permission for the current pnode, as it is used as directory.
 | 
						|
	 */
 | 
						|
	if (strcmp(component, "..") == 0) {
 | 
						|
		/* 'pn' is now accessed as directory */
 | 
						|
		if ((r = forbidden(pn, X_BIT)) != OK) {
 | 
						|
			return(r);
 | 
						|
		}
 | 
						|
 | 
						|
		if (pn->pn_va.va_fileid == root_ino) {
 | 
						|
			cp = next_cp;
 | 
						|
			continue;	/* Ignore the '..' at a process' root
 | 
						|
					   and move on to the next component */
 | 
						|
		}
 | 
						|
 | 
						|
		if (pn->pn_va.va_fileid == global_pu->pu_pn_root->pn_va.va_fileid
 | 
						|
			&& !is_root_fs) {
 | 
						|
			/* Climbing up to parent FS */
 | 
						|
			*offsetp += cp - user_path;
 | 
						|
			return(ELEAVEMOUNT);
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	/* Only check for a mount point if we are not coming from one. */
 | 
						|
	if (!leaving_mount && pn->pn_mountpoint) {
 | 
						|
		/* Going to enter a child FS */
 | 
						|
 | 
						|
		*res_inop = pn;
 | 
						|
		*offsetp += cp - user_path;
 | 
						|
		return(EENTERMOUNT);
 | 
						|
	}
 | 
						|
 | 
						|
	/* There is more path.  Keep parsing.
 | 
						|
	 * If we're leaving a mountpoint, skip directory permission checks.
 | 
						|
	 */
 | 
						|
	pn_dir = pn;
 | 
						|
	if ((pn_dir->pn_va.va_mode & I_TYPE) != I_DIRECTORY)  {
 | 
						|
		return(ENOTDIR);
 | 
						|
	}
 | 
						|
	pn = advance(pn_dir, leaving_mount ? dot2 : component, CHK_PERM);
 | 
						|
	if (err_code == ELEAVEMOUNT || err_code == EENTERMOUNT)
 | 
						|
		err_code = OK;
 | 
						|
 | 
						|
	if (err_code != OK) {
 | 
						|
		return(err_code);
 | 
						|
	}
 | 
						|
	
 | 
						|
	assert(pn != NULL);
 | 
						|
 | 
						|
	leaving_mount = 0;
 | 
						|
 | 
						|
	/* The call to advance() succeeded.  Fetch next component. */
 | 
						|
	if (S_ISLNK(pn->pn_va.va_mode)) {
 | 
						|
		if (next_cp[0] == '\0' && (flags & PATH_RET_SYMLINK)) {
 | 
						|
			*res_inop = pn;
 | 
						|
			*offsetp += next_cp - user_path;
 | 
						|
			return(OK);
 | 
						|
		}
 | 
						|
 | 
						|
		/* Extract path name from the symlink file */
 | 
						|
		r = ltraverse(pn, next_cp);
 | 
						|
		next_cp = user_path;
 | 
						|
		*offsetp = 0;
 | 
						|
 | 
						|
		/* Symloop limit reached? */
 | 
						|
		if (++(*symlinkp) > _POSIX_SYMLOOP_MAX)
 | 
						|
			r = ELOOP;
 | 
						|
 | 
						|
		if (r != OK)
 | 
						|
			return(r);
 | 
						|
 | 
						|
		if (next_cp[0] == '/')
 | 
						|
                        return(ESYMLINK);
 | 
						|
 | 
						|
		pn = pn_dir;
 | 
						|
	}
 | 
						|
 | 
						|
	cp = next_cp; /* Process subsequent component in next round */
 | 
						|
  }
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/*===========================================================================*
 | 
						|
 *                             ltraverse				     *
 | 
						|
 *===========================================================================*/
 | 
						|
static int ltraverse(
 | 
						|
	struct puffs_node *pn,	/* symbolic link */
 | 
						|
	char *suffix		/* current remaining path. Has to point in the
 | 
						|
				 * user_path buffer
 | 
						|
				 */
 | 
						|
)
 | 
						|
{
 | 
						|
/* Traverse a symbolic link. Copy the link text from the pnode and insert
 | 
						|
 * the text into the path. Return error code or report success. Base
 | 
						|
 * directory has to be determined according to the first character of the
 | 
						|
 * new pathname.
 | 
						|
 */
 | 
						|
  int r;
 | 
						|
  char sp[PATH_MAX];
 | 
						|
  size_t llen = PATH_MAX; /* length of link */
 | 
						|
  size_t slen;	          /* length of suffix */
 | 
						|
  PUFFS_MAKECRED(pcr, &global_kcred);
 | 
						|
 | 
						|
 | 
						|
  if (!S_ISLNK(pn->pn_va.va_mode))
 | 
						|
	r = EACCES;
 | 
						|
 | 
						|
  if (global_pu->pu_ops.puffs_node_readlink == NULL)
 | 
						|
	return(EINVAL);
 | 
						|
 | 
						|
  if (global_pu->pu_ops.puffs_node_readlink(global_pu, pn, pcr, sp, &llen) != 0)
 | 
						|
	return(EINVAL);
 | 
						|
 | 
						|
  slen = strlen(suffix);
 | 
						|
 | 
						|
  /* The path we're parsing looks like this:
 | 
						|
   * /already/processed/path/<link> or
 | 
						|
   * /already/processed/path/<link>/not/yet/processed/path
 | 
						|
   * After expanding the <link>, the path will look like
 | 
						|
   * <expandedlink> or
 | 
						|
   * <expandedlink>/not/yet/processed
 | 
						|
   * In both cases user_path must have enough room to hold <expandedlink>.
 | 
						|
   * However, in the latter case we have to move /not/yet/processed to the
 | 
						|
   * right place first, before we expand <link>. When strlen(<expandedlink>) is
 | 
						|
   * smaller than strlen(/already/processes/path), we move the suffix to the
 | 
						|
   * left. Is strlen(<expandedlink>) greater then we move it to the right. Else
 | 
						|
   * we do nothing.
 | 
						|
   */
 | 
						|
 | 
						|
  if (slen > 0) { /* Do we have path after the link? */
 | 
						|
	/* For simplicity we require that suffix starts with a slash */
 | 
						|
	if (suffix[0] != '/') {
 | 
						|
		panic("ltraverse: suffix does not start with a slash");
 | 
						|
	}
 | 
						|
 | 
						|
	/* To be able to expand the <link>, we have to move the 'suffix'
 | 
						|
	 * to the right place.
 | 
						|
	 */
 | 
						|
	if (slen + llen + 1 > sizeof(user_path))
 | 
						|
		return(ENAMETOOLONG);/* <expandedlink>+suffix+\0 does not fit*/
 | 
						|
	if ((unsigned)(suffix - user_path) != llen) {
 | 
						|
		/* Move suffix left or right if needed */
 | 
						|
		memmove(&user_path[llen], suffix, slen+1);
 | 
						|
	}
 | 
						|
  } else {
 | 
						|
	if (llen + 1 > sizeof(user_path))
 | 
						|
		return(ENAMETOOLONG); /* <expandedlink> + \0 does not fit */
 | 
						|
 | 
						|
	/* Set terminating nul */
 | 
						|
	user_path[llen]= '\0';
 | 
						|
  }
 | 
						|
 | 
						|
  /* Everything is set, now copy the expanded link to user_path */
 | 
						|
  memmove(user_path, sp, llen);
 | 
						|
 | 
						|
  return(OK);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/*===========================================================================*
 | 
						|
 *				advance					     *
 | 
						|
 *===========================================================================*/
 | 
						|
struct puffs_node *advance(
 | 
						|
	struct puffs_node *pn_dir,	/* pnode for directory to be searched */
 | 
						|
	char string[NAME_MAX + 1],	/* component name to look for */
 | 
						|
	int chk_perm			/* check permissions when string is
 | 
						|
					 * looked up*/
 | 
						|
)
 | 
						|
{
 | 
						|
/* Given a directory and a component of a path, look up the component in
 | 
						|
 * the directory, find the pnode, open it, and return a pointer to its pnode
 | 
						|
 * slot.
 | 
						|
 * TODO: instead of string, should get pcn.
 | 
						|
 */
 | 
						|
  struct puffs_node *pn;
 | 
						|
 | 
						|
  struct puffs_newinfo pni;
 | 
						|
 | 
						|
  struct puffs_kcn pkcnp;
 | 
						|
  PUFFS_MAKECRED(pcr, &global_kcred);
 | 
						|
  struct puffs_cn pcn = {&pkcnp, (struct puffs_cred *) __UNCONST(pcr), {0,0,0}};
 | 
						|
 | 
						|
  enum vtype node_vtype;
 | 
						|
  voff_t size;
 | 
						|
  dev_t rdev;
 | 
						|
  int error;
 | 
						|
 | 
						|
  err_code = OK;
 | 
						|
 | 
						|
  /* If 'string' is empty, return an error. */
 | 
						|
  if (string[0] == '\0') {
 | 
						|
	err_code = ENOENT;
 | 
						|
	return(NULL);
 | 
						|
  }
 | 
						|
 | 
						|
  /* Check for NULL. */
 | 
						|
  if (pn_dir == NULL)
 | 
						|
	return(NULL);
 | 
						|
 | 
						|
  if (chk_perm) {
 | 
						|
	/* Just search permission is checked */
 | 
						|
	if (forbidden(pn_dir, X_BIT)) {
 | 
						|
		err_code = EACCES;
 | 
						|
		return(NULL);
 | 
						|
	}
 | 
						|
  }
 | 
						|
 | 
						|
  if (strcmp(string, ".") == 0) {
 | 
						|
	/* Otherwise we will fall into trouble: path for pnode to be looked up
 | 
						|
	 * will be parent path (same pnode as the one to be looked up) +
 | 
						|
	 * requested path. E.g. after several lookups we might get advance
 | 
						|
	 * for "." with parent path "/././././././././.".
 | 
						|
	 *
 | 
						|
	 * Another problem is that after lookup pnode will be added
 | 
						|
	 * to the pu_pnodelst, which already contains pnode instance for this
 | 
						|
	 * pnode. It will cause lot of troubles.
 | 
						|
	 */
 | 
						|
	return pn_dir;
 | 
						|
  }
 | 
						|
 | 
						|
  pni.pni_cookie = (void** )&pn;
 | 
						|
  pni.pni_vtype = &node_vtype;
 | 
						|
  pni.pni_size = &size;
 | 
						|
  pni.pni_rdev = &rdev;
 | 
						|
 | 
						|
  pcn.pcn_namelen = strlen(string);
 | 
						|
  assert(pcn.pcn_namelen <= MAXPATHLEN);
 | 
						|
  strcpy(pcn.pcn_name, string);
 | 
						|
 | 
						|
  if (buildpath) {
 | 
						|
	if (puffs_path_pcnbuild(global_pu, &pcn, pn_dir) != 0) {
 | 
						|
		lpuffs_debug("pathbuild error\n");
 | 
						|
		err_code = ENOENT;
 | 
						|
		return(NULL);
 | 
						|
	}
 | 
						|
  }
 | 
						|
 | 
						|
  /* lookup *must* be present */
 | 
						|
  error = global_pu->pu_ops.puffs_node_lookup(global_pu, pn_dir,
 | 
						|
		  &pni, &pcn);
 | 
						|
 | 
						|
  if (buildpath) {
 | 
						|
	if (error) {
 | 
						|
		global_pu->pu_pathfree(global_pu, &pcn.pcn_po_full);
 | 
						|
		err_code = ENOENT;
 | 
						|
		return(NULL);
 | 
						|
	} else {
 | 
						|
		struct puffs_node *_pn;
 | 
						|
 | 
						|
		/*
 | 
						|
		 * did we get a new node or a
 | 
						|
		 * recycled node?
 | 
						|
		 */
 | 
						|
		_pn = PU_CMAP(global_pu, pn);
 | 
						|
		if (_pn->pn_po.po_path == NULL)
 | 
						|
			_pn->pn_po = pcn.pcn_po_full;
 | 
						|
		else
 | 
						|
			global_pu->pu_pathfree(global_pu, &pcn.pcn_po_full);
 | 
						|
	}
 | 
						|
  }
 | 
						|
 | 
						|
  if (error) {
 | 
						|
	err_code = error < 0 ? error : -error;
 | 
						|
	return(NULL);
 | 
						|
  } else {
 | 
						|
	/* In MFS/ext2 it's set by search_dir, puffs_node_lookup error codes are unclear,
 | 
						|
	 * so we use error variable there
 | 
						|
	 */
 | 
						|
	err_code = OK;
 | 
						|
  }
 | 
						|
 | 
						|
  assert(pn != NULL);
 | 
						|
 | 
						|
  /* The following test is for "mountpoint/.." where mountpoint is a
 | 
						|
   * mountpoint. ".." will refer to the root of the mounted filesystem,
 | 
						|
   * but has to become a reference to the parent of the 'mountpoint'
 | 
						|
   * directory.
 | 
						|
   *
 | 
						|
   * This case is recognized by the looked up name pointing to a
 | 
						|
   * root pnode, and the directory in which it is held being a
 | 
						|
   * root pnode, _and_ the name[1] being '.'. (This is a test for '..'
 | 
						|
   * and excludes '.'.)
 | 
						|
   */
 | 
						|
  if (pn->pn_va.va_fileid == global_pu->pu_pn_root->pn_va.va_fileid) {
 | 
						|
	  if (pn_dir->pn_va.va_fileid == global_pu->pu_pn_root->pn_va.va_fileid) {
 | 
						|
		  if (string[1] == '.') {
 | 
						|
			  if (!is_root_fs) {
 | 
						|
				  /* Climbing up mountpoint */
 | 
						|
				  err_code = ELEAVEMOUNT;
 | 
						|
			  }
 | 
						|
		  }
 | 
						|
	  }
 | 
						|
  }
 | 
						|
 | 
						|
  /* See if the pnode is mounted on.  If so, switch to root directory of the
 | 
						|
   * mounted file system.  The super_block provides the linkage between the
 | 
						|
   * pnode mounted on and the root directory of the mounted file system.
 | 
						|
   */
 | 
						|
  if (pn->pn_mountpoint) {
 | 
						|
	  /* Mountpoint encountered, report it */
 | 
						|
	  err_code = EENTERMOUNT;
 | 
						|
  }
 | 
						|
 | 
						|
  return(pn);
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/*===========================================================================*
 | 
						|
 *				get_name				     *
 | 
						|
 *===========================================================================*/
 | 
						|
static char *get_name(
 | 
						|
	char *path_name,         /* path name to parse */
 | 
						|
	char string[NAME_MAX+1]  /* component extracted from 'old_name' */
 | 
						|
)
 | 
						|
{
 | 
						|
/* Given a pointer to a path name in fs space, 'path_name', copy the first
 | 
						|
 * component to 'string' (truncated if necessary, always nul terminated).
 | 
						|
 * A pointer to the string after the first component of the name as yet
 | 
						|
 * unparsed is returned.  Roughly speaking,
 | 
						|
 * 'get_name' = 'path_name' - 'string'.
 | 
						|
 *
 | 
						|
 * This routine follows the standard convention that /usr/ast, /usr//ast,
 | 
						|
 * //usr///ast and /usr/ast/ are all equivalent.
 | 
						|
 *
 | 
						|
 * If len of component is greater, than allowed, then return 0.
 | 
						|
 */
 | 
						|
  size_t len;
 | 
						|
  char *cp, *ep;
 | 
						|
 | 
						|
  cp = path_name;
 | 
						|
 | 
						|
  /* Skip leading slashes */
 | 
						|
  while (cp[0] == '/') cp++;
 | 
						|
 | 
						|
  /* Find the end of the first component */
 | 
						|
  ep = cp;
 | 
						|
  while (ep[0] != '\0' && ep[0] != '/')
 | 
						|
	ep++;
 | 
						|
 | 
						|
  len = (size_t) (ep - cp);
 | 
						|
 
 | 
						|
  /* XXX we don't check name_max of fileserver (probably we can't) */
 | 
						|
  if (len > NAME_MAX) {
 | 
						|
  	err_code = ENAMETOOLONG;
 | 
						|
	return(NULL);
 | 
						|
  }
 | 
						|
 | 
						|
  /* Special case of the string at cp is empty */
 | 
						|
  if (len == 0)
 | 
						|
	strcpy(string, ".");  /* Return "." */
 | 
						|
  else {
 | 
						|
	memcpy(string, cp, len);
 | 
						|
	string[len]= '\0';
 | 
						|
  }
 | 
						|
 | 
						|
  return(ep);
 | 
						|
}
 |