summaryrefslogtreecommitdiff
path: root/libnetfs/fsys-get-children.c
blob: fb3af914441931e53cc1e94445490e64da2371d6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
/* fsys_get_children

   Copyright (C) 2013 Free Software Foundation, Inc.

   Written by Justus Winter <4winter@informatik.uni-hamburg.de>

   This file is part of the GNU Hurd.

   The GNU Hurd is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 2, or (at your option)
   any later version.

   The GNU Hurd is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with the GNU Hurd.  If not, see <http://www.gnu.org/licenses/>.  */

#include "priv.h"

#include <argz.h>

/* Return any active translators bound to nodes of the receiving
   filesystem.  CHILDREN is an argz vector containing file names
   relative to the root of the receiving translator.  */
error_t
netfs_S_fsys_get_children (fsys_t server,
			   mach_port_t reply,
			   mach_msg_type_name_t replyPoly,
			   char **children,
			   mach_msg_type_number_t *children_len)
{
  error_t err;

  struct protid *cred = ports_lookup_port (netfs_port_bucket,
					   server,
					   netfs_protid_class);
  if (! cred)
    return EOPNOTSUPP;

  /* check_access performs the same permission check as is normally
     done, i.e. it checks that all but the last path components are
     executable by the requesting user and that the last component is
     readable.	*/
  error_t check_access (const char *path)
  {
    error_t err;
    char *elements = NULL;
    size_t elements_len = 0;

    err = argz_create_sep (path, '/', &elements, &elements_len);
    if (err)
      return err;

    struct node *dp = netfs_root_node;

    /* Lock the root node. netfs_attempt_lookup expects the directory to
       be locked.  */
    pthread_mutex_lock (&dp->lock);

    /* Increase the reference count, it will be decremented in the loop
       ahead.  */
    netfs_nref (dp);

    for (char *entry = elements;
	 entry;
	 entry = argz_next (elements, elements_len, entry))
      {
	struct node *next;
	err = netfs_attempt_lookup (cred->user, dp, entry, &next);
	/* netfs_attempt_lookup has unlocked dp and returned next
	   locked, so there is no locking to do here.  */

	/* Decrease reference count.  */
	netfs_nrele (dp);

	if (err)
	  goto errout;

	dp = next;
      }

    err = fshelp_access (&dp->nn_stat, S_IRUSR, cred->user);

  errout:
    /* Unlock and unreference the last node.  */
    netfs_nput (dp);

    free (elements);
    return err;
  }

  char *c = NULL;
  size_t c_len = 0;

  err = fshelp_get_active_translators (&c, &c_len, check_access);
  if (err)
    goto errout;

  err = iohelp_return_malloced_buffer (c, c_len, children, children_len);
  if (err)
    goto errout;

  c = NULL; /* c was freed by iohelp_return_malloced_buffer. */

 errout:
  free (c);
  return err;
}