2 Unix SMB/CIFS implementation.
3 Wrap disk only vfs functions to sidestep dodgy compilers.
4 Copyright (C) Tim Potter 1998
5 Copyright (C) Jeremy Allison 2007
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #define DBGC_CLASS DBGC_VFS
26 /* Check for NULL pointer parameters in vfswrap_* functions */
28 /* We don't want to have NULL function pointers lying around. Someone
29 is sure to try and execute them. These stubs are used to prevent
32 static int vfswrap_connect(vfs_handle_struct *handle, const char *service, const char *user)
34 return 0; /* Return >= 0 for success */
37 static void vfswrap_disconnect(vfs_handle_struct *handle)
43 static uint64_t vfswrap_disk_free(vfs_handle_struct *handle, const char *path, bool small_query, uint64_t *bsize,
44 uint64_t *dfree, uint64_t *dsize)
48 result = sys_disk_free(handle->conn, path, small_query, bsize, dfree, dsize);
52 static int vfswrap_get_quota(struct vfs_handle_struct *handle, enum SMB_QUOTA_TYPE qtype, unid_t id, SMB_DISK_QUOTA *qt)
54 #ifdef HAVE_SYS_QUOTAS
57 START_PROFILE(syscall_get_quota);
58 result = sys_get_quota(handle->conn->connectpath, qtype, id, qt);
59 END_PROFILE(syscall_get_quota);
67 static int vfswrap_set_quota(struct vfs_handle_struct *handle, enum SMB_QUOTA_TYPE qtype, unid_t id, SMB_DISK_QUOTA *qt)
69 #ifdef HAVE_SYS_QUOTAS
72 START_PROFILE(syscall_set_quota);
73 result = sys_set_quota(handle->conn->connectpath, qtype, id, qt);
74 END_PROFILE(syscall_set_quota);
82 static int vfswrap_get_shadow_copy_data(struct vfs_handle_struct *handle, struct files_struct *fsp, SHADOW_COPY_DATA *shadow_copy_data, bool labels)
85 return -1; /* Not implemented. */
88 static int vfswrap_statvfs(struct vfs_handle_struct *handle, const char *path, vfs_statvfs_struct *statbuf)
90 return sys_statvfs(path, statbuf);
93 static uint32_t vfswrap_fs_capabilities(struct vfs_handle_struct *handle,
94 enum timestamp_set_resolution *p_ts_res)
96 connection_struct *conn = handle->conn;
97 uint32_t caps = FILE_CASE_SENSITIVE_SEARCH | FILE_CASE_PRESERVED_NAMES;
98 struct smb_filename *smb_fname_cpath = NULL;
102 #if defined(DARWINOS)
103 struct vfs_statvfs_struct statbuf;
104 ZERO_STRUCT(statbuf);
105 sys_statvfs(conn->connectpath, &statbuf);
106 caps = statbuf.FsCapabilities;
109 *p_ts_res = TIMESTAMP_SET_SECONDS;
111 /* Work out what timestamp resolution we can
112 * use when setting a timestamp. */
114 status = create_synthetic_smb_fname(talloc_tos(),
119 if (!NT_STATUS_IS_OK(status)) {
123 ret = SMB_VFS_STAT(conn, smb_fname_cpath);
125 TALLOC_FREE(smb_fname_cpath);
129 if (smb_fname_cpath->st.st_ex_mtime.tv_nsec ||
130 smb_fname_cpath->st.st_ex_atime.tv_nsec ||
131 smb_fname_cpath->st.st_ex_ctime.tv_nsec) {
132 /* If any of the normal UNIX directory timestamps
133 * have a non-zero tv_nsec component assume
134 * we might be able to set sub-second timestamps.
135 * See what filetime set primitives we have.
137 #if defined(HAVE_UTIMENSAT)
138 *p_ts_res = TIMESTAMP_SET_NT_OR_BETTER;
139 #elif defined(HAVE_UTIMES)
140 /* utimes allows msec timestamps to be set. */
141 *p_ts_res = TIMESTAMP_SET_MSEC;
142 #elif defined(HAVE_UTIME)
143 /* utime only allows sec timestamps to be set. */
144 *p_ts_res = TIMESTAMP_SET_SECONDS;
147 DEBUG(10,("vfswrap_fs_capabilities: timestamp "
149 "available on share %s, directory %s\n",
150 *p_ts_res == TIMESTAMP_SET_MSEC ? "msec" : "sec",
151 lp_servicename(conn->cnum),
152 conn->connectpath ));
154 TALLOC_FREE(smb_fname_cpath);
158 /* Directory operations */
160 static SMB_STRUCT_DIR *vfswrap_opendir(vfs_handle_struct *handle, const char *fname, const char *mask, uint32 attr)
162 SMB_STRUCT_DIR *result;
164 START_PROFILE(syscall_opendir);
165 result = sys_opendir(fname);
166 END_PROFILE(syscall_opendir);
170 static SMB_STRUCT_DIRENT *vfswrap_readdir(vfs_handle_struct *handle,
171 SMB_STRUCT_DIR *dirp,
172 SMB_STRUCT_STAT *sbuf)
174 SMB_STRUCT_DIRENT *result;
176 START_PROFILE(syscall_readdir);
177 result = sys_readdir(dirp);
178 /* Default Posix readdir() does not give us stat info.
179 * Set to invalid to indicate we didn't return this info. */
181 SET_STAT_INVALID(*sbuf);
182 END_PROFILE(syscall_readdir);
186 static void vfswrap_seekdir(vfs_handle_struct *handle, SMB_STRUCT_DIR *dirp, long offset)
188 START_PROFILE(syscall_seekdir);
189 sys_seekdir(dirp, offset);
190 END_PROFILE(syscall_seekdir);
193 static long vfswrap_telldir(vfs_handle_struct *handle, SMB_STRUCT_DIR *dirp)
196 START_PROFILE(syscall_telldir);
197 result = sys_telldir(dirp);
198 END_PROFILE(syscall_telldir);
202 static void vfswrap_rewinddir(vfs_handle_struct *handle, SMB_STRUCT_DIR *dirp)
204 START_PROFILE(syscall_rewinddir);
206 END_PROFILE(syscall_rewinddir);
209 static int vfswrap_mkdir(vfs_handle_struct *handle, const char *path, mode_t mode)
212 bool has_dacl = False;
215 START_PROFILE(syscall_mkdir);
217 if (lp_inherit_acls(SNUM(handle->conn))
218 && parent_dirname(talloc_tos(), path, &parent, NULL)
219 && (has_dacl = directory_has_default_acl(handle->conn, parent)))
224 result = mkdir(path, mode);
226 if (result == 0 && !has_dacl) {
228 * We need to do this as the default behavior of POSIX ACLs
229 * is to set the mask to be the requested group permission
230 * bits, not the group permission bits to be the requested
231 * group permission bits. This is not what we want, as it will
232 * mess up any inherited ACL bits that were set. JRA.
234 int saved_errno = errno; /* We may get ENOSYS */
235 if ((SMB_VFS_CHMOD_ACL(handle->conn, path, mode) == -1) && (errno == ENOSYS))
239 END_PROFILE(syscall_mkdir);
243 static int vfswrap_rmdir(vfs_handle_struct *handle, const char *path)
247 START_PROFILE(syscall_rmdir);
248 result = rmdir(path);
249 END_PROFILE(syscall_rmdir);
253 static int vfswrap_closedir(vfs_handle_struct *handle, SMB_STRUCT_DIR *dirp)
257 START_PROFILE(syscall_closedir);
258 result = sys_closedir(dirp);
259 END_PROFILE(syscall_closedir);
263 static void vfswrap_init_search_op(vfs_handle_struct *handle,
264 SMB_STRUCT_DIR *dirp)
266 /* Default behavior is a NOOP */
269 /* File operations */
271 static int vfswrap_open(vfs_handle_struct *handle,
272 struct smb_filename *smb_fname,
273 files_struct *fsp, int flags, mode_t mode)
277 START_PROFILE(syscall_open);
279 if (smb_fname->stream_name) {
284 result = sys_open(smb_fname->base_name, flags, mode);
286 END_PROFILE(syscall_open);
290 static NTSTATUS vfswrap_create_file(vfs_handle_struct *handle,
291 struct smb_request *req,
292 uint16_t root_dir_fid,
293 struct smb_filename *smb_fname,
294 uint32_t access_mask,
295 uint32_t share_access,
296 uint32_t create_disposition,
297 uint32_t create_options,
298 uint32_t file_attributes,
299 uint32_t oplock_request,
300 uint64_t allocation_size,
301 struct security_descriptor *sd,
302 struct ea_list *ea_list,
303 files_struct **result,
306 return create_file_default(handle->conn, req, root_dir_fid, smb_fname,
307 access_mask, share_access,
308 create_disposition, create_options,
309 file_attributes, oplock_request,
310 allocation_size, sd, ea_list, result,
314 static int vfswrap_close(vfs_handle_struct *handle, files_struct *fsp)
318 START_PROFILE(syscall_close);
319 result = fd_close_posix(fsp);
320 END_PROFILE(syscall_close);
324 static ssize_t vfswrap_read(vfs_handle_struct *handle, files_struct *fsp, void *data, size_t n)
328 START_PROFILE_BYTES(syscall_read, n);
329 result = sys_read(fsp->fh->fd, data, n);
330 END_PROFILE(syscall_read);
334 static ssize_t vfswrap_pread(vfs_handle_struct *handle, files_struct *fsp, void *data,
335 size_t n, SMB_OFF_T offset)
339 #if defined(HAVE_PREAD) || defined(HAVE_PREAD64)
340 START_PROFILE_BYTES(syscall_pread, n);
341 result = sys_pread(fsp->fh->fd, data, n, offset);
342 END_PROFILE(syscall_pread);
344 if (result == -1 && errno == ESPIPE) {
345 /* Maintain the fiction that pipes can be seeked (sought?) on. */
346 result = SMB_VFS_READ(fsp, data, n);
350 #else /* HAVE_PREAD */
354 curr = SMB_VFS_LSEEK(fsp, 0, SEEK_CUR);
355 if (curr == -1 && errno == ESPIPE) {
356 /* Maintain the fiction that pipes can be seeked (sought?) on. */
357 result = SMB_VFS_READ(fsp, data, n);
362 if (SMB_VFS_LSEEK(fsp, offset, SEEK_SET) == -1) {
367 result = SMB_VFS_READ(fsp, data, n);
370 SMB_VFS_LSEEK(fsp, curr, SEEK_SET);
373 #endif /* HAVE_PREAD */
378 static ssize_t vfswrap_write(vfs_handle_struct *handle, files_struct *fsp, const void *data, size_t n)
382 START_PROFILE_BYTES(syscall_write, n);
383 result = sys_write(fsp->fh->fd, data, n);
384 END_PROFILE(syscall_write);
388 static ssize_t vfswrap_pwrite(vfs_handle_struct *handle, files_struct *fsp, const void *data,
389 size_t n, SMB_OFF_T offset)
393 #if defined(HAVE_PWRITE) || defined(HAVE_PRWITE64)
394 START_PROFILE_BYTES(syscall_pwrite, n);
395 result = sys_pwrite(fsp->fh->fd, data, n, offset);
396 END_PROFILE(syscall_pwrite);
398 if (result == -1 && errno == ESPIPE) {
399 /* Maintain the fiction that pipes can be sought on. */
400 result = SMB_VFS_WRITE(fsp, data, n);
403 #else /* HAVE_PWRITE */
407 curr = SMB_VFS_LSEEK(fsp, 0, SEEK_CUR);
412 if (SMB_VFS_LSEEK(fsp, offset, SEEK_SET) == -1) {
416 result = SMB_VFS_WRITE(fsp, data, n);
419 SMB_VFS_LSEEK(fsp, curr, SEEK_SET);
422 #endif /* HAVE_PWRITE */
427 static SMB_OFF_T vfswrap_lseek(vfs_handle_struct *handle, files_struct *fsp, SMB_OFF_T offset, int whence)
429 SMB_OFF_T result = 0;
431 START_PROFILE(syscall_lseek);
433 /* Cope with 'stat' file opens. */
434 if (fsp->fh->fd != -1)
435 result = sys_lseek(fsp->fh->fd, offset, whence);
438 * We want to maintain the fiction that we can seek
439 * on a fifo for file system purposes. This allows
440 * people to set up UNIX fifo's that feed data to Windows
444 if((result == -1) && (errno == ESPIPE)) {
449 END_PROFILE(syscall_lseek);
453 static ssize_t vfswrap_sendfile(vfs_handle_struct *handle, int tofd, files_struct *fromfsp, const DATA_BLOB *hdr,
454 SMB_OFF_T offset, size_t n)
458 START_PROFILE_BYTES(syscall_sendfile, n);
459 result = sys_sendfile(tofd, fromfsp->fh->fd, hdr, offset, n);
460 END_PROFILE(syscall_sendfile);
464 static ssize_t vfswrap_recvfile(vfs_handle_struct *handle,
472 START_PROFILE_BYTES(syscall_recvfile, n);
473 result = sys_recvfile(fromfd, tofsp->fh->fd, offset, n);
474 END_PROFILE(syscall_recvfile);
478 /*********************************************************
479 For rename across filesystems Patch from Warren Birnbaum
480 <warrenb@hpcvscdp.cv.hp.com>
481 **********************************************************/
483 static int copy_reg(const char *source, const char *dest)
485 SMB_STRUCT_STAT source_stats;
490 if (sys_lstat (source, &source_stats) == -1)
493 if (!S_ISREG (source_stats.st_ex_mode))
496 if((ifd = sys_open (source, O_RDONLY, 0)) < 0)
499 if (unlink (dest) && errno != ENOENT)
503 if((ofd = sys_open (dest, O_WRONLY | O_CREAT | O_TRUNC | O_NOFOLLOW, 0600)) < 0 )
505 if((ofd = sys_open (dest, O_WRONLY | O_CREAT | O_TRUNC , 0600)) < 0 )
509 if (transfer_file(ifd, ofd, (size_t)-1) == -1)
513 * Try to preserve ownership. For non-root it might fail, but that's ok.
514 * But root probably wants to know, e.g. if NFS disallows it.
518 if ((fchown(ofd, source_stats.st_ex_uid, source_stats.st_ex_gid) == -1) && (errno != EPERM))
520 if ((chown(dest, source_stats.st_ex_uid, source_stats.st_ex_gid) == -1) && (errno != EPERM))
525 * fchown turns off set[ug]id bits for non-root,
526 * so do the chmod last.
529 #if defined(HAVE_FCHMOD)
530 if (fchmod (ofd, source_stats.st_ex_mode & 07777))
532 if (chmod (dest, source_stats.st_ex_mode & 07777))
536 if (close (ifd) == -1)
539 if (close (ofd) == -1)
542 /* Try to copy the old file's modtime and access time. */
546 tv.actime = convert_timespec_to_time_t(source_stats.st_ex_atime);
547 tv.modtime = convert_timespec_to_time_t(source_stats.st_ex_mtime);
551 if (unlink (source) == -1)
567 static int vfswrap_rename(vfs_handle_struct *handle,
568 const struct smb_filename *smb_fname_src,
569 const struct smb_filename *smb_fname_dst)
573 START_PROFILE(syscall_rename);
575 if (smb_fname_src->stream_name || smb_fname_dst->stream_name) {
580 result = rename(smb_fname_src->base_name, smb_fname_dst->base_name);
581 if ((result == -1) && (errno == EXDEV)) {
582 /* Rename across filesystems needed. */
583 result = copy_reg(smb_fname_src->base_name,
584 smb_fname_dst->base_name);
588 END_PROFILE(syscall_rename);
592 static int vfswrap_fsync(vfs_handle_struct *handle, files_struct *fsp)
597 START_PROFILE(syscall_fsync);
598 result = fsync(fsp->fh->fd);
599 END_PROFILE(syscall_fsync);
606 static int vfswrap_stat(vfs_handle_struct *handle,
607 struct smb_filename *smb_fname)
611 START_PROFILE(syscall_stat);
613 if (smb_fname->stream_name) {
618 result = sys_stat(smb_fname->base_name, &smb_fname->st);
620 END_PROFILE(syscall_stat);
624 static int vfswrap_fstat(vfs_handle_struct *handle, files_struct *fsp, SMB_STRUCT_STAT *sbuf)
628 START_PROFILE(syscall_fstat);
629 result = sys_fstat(fsp->fh->fd, sbuf);
630 END_PROFILE(syscall_fstat);
634 static int vfswrap_lstat(vfs_handle_struct *handle,
635 struct smb_filename *smb_fname)
639 START_PROFILE(syscall_lstat);
641 if (smb_fname->stream_name) {
646 result = sys_lstat(smb_fname->base_name, &smb_fname->st);
648 END_PROFILE(syscall_lstat);
652 static NTSTATUS vfswrap_translate_name(vfs_handle_struct *handle,
654 enum vfs_translate_direction direction)
656 /* Default behavior is a NOOP */
658 if (*mapped_name != NULL)
661 return NT_STATUS_INVALID_PARAMETER;
663 /********************************************************************
664 Given a stat buffer return the allocated size on disk, taking into
665 account sparse files.
666 ********************************************************************/
667 static uint64_t vfswrap_get_alloc_size(vfs_handle_struct *handle,
668 struct files_struct *fsp,
669 const SMB_STRUCT_STAT *sbuf)
673 START_PROFILE(syscall_get_alloc_size);
675 if(S_ISDIR(sbuf->st_ex_mode)) {
680 #if defined(HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
681 result = (uint64_t)STAT_ST_BLOCKSIZE * (uint64_t)sbuf->st_ex_blocks;
683 result = get_file_size_stat(sbuf);
686 if (fsp && fsp->initial_allocation_size)
687 result = MAX(result,fsp->initial_allocation_size);
689 result = smb_roundup(handle->conn, result);
692 END_PROFILE(syscall_get_alloc_size);
696 static int vfswrap_unlink(vfs_handle_struct *handle,
697 const struct smb_filename *smb_fname)
701 START_PROFILE(syscall_unlink);
703 if (smb_fname->stream_name) {
707 result = unlink(smb_fname->base_name);
710 END_PROFILE(syscall_unlink);
714 static int vfswrap_chmod(vfs_handle_struct *handle, const char *path, mode_t mode)
718 START_PROFILE(syscall_chmod);
721 * We need to do this due to the fact that the default POSIX ACL
722 * chmod modifies the ACL *mask* for the group owner, not the
723 * group owner bits directly. JRA.
728 int saved_errno = errno; /* We might get ENOSYS */
729 if ((result = SMB_VFS_CHMOD_ACL(handle->conn, path, mode)) == 0) {
730 END_PROFILE(syscall_chmod);
733 /* Error - return the old errno. */
737 result = chmod(path, mode);
738 END_PROFILE(syscall_chmod);
742 static int vfswrap_fchmod(vfs_handle_struct *handle, files_struct *fsp, mode_t mode)
746 START_PROFILE(syscall_fchmod);
749 * We need to do this due to the fact that the default POSIX ACL
750 * chmod modifies the ACL *mask* for the group owner, not the
751 * group owner bits directly. JRA.
755 int saved_errno = errno; /* We might get ENOSYS */
756 if ((result = SMB_VFS_FCHMOD_ACL(fsp, mode)) == 0) {
757 END_PROFILE(syscall_fchmod);
760 /* Error - return the old errno. */
764 #if defined(HAVE_FCHMOD)
765 result = fchmod(fsp->fh->fd, mode);
771 END_PROFILE(syscall_fchmod);
775 static int vfswrap_chown(vfs_handle_struct *handle, const char *path, uid_t uid, gid_t gid)
779 START_PROFILE(syscall_chown);
780 result = chown(path, uid, gid);
781 END_PROFILE(syscall_chown);
785 static int vfswrap_fchown(vfs_handle_struct *handle, files_struct *fsp, uid_t uid, gid_t gid)
790 START_PROFILE(syscall_fchown);
791 result = fchown(fsp->fh->fd, uid, gid);
792 END_PROFILE(syscall_fchown);
800 static int vfswrap_lchown(vfs_handle_struct *handle, const char *path, uid_t uid, gid_t gid)
804 START_PROFILE(syscall_lchown);
805 result = lchown(path, uid, gid);
806 END_PROFILE(syscall_lchown);
810 static int vfswrap_chdir(vfs_handle_struct *handle, const char *path)
814 START_PROFILE(syscall_chdir);
815 result = chdir(path);
816 END_PROFILE(syscall_chdir);
820 static char *vfswrap_getwd(vfs_handle_struct *handle, char *path)
824 START_PROFILE(syscall_getwd);
825 result = sys_getwd(path);
826 END_PROFILE(syscall_getwd);
830 /*********************************************************************
831 nsec timestamp resolution call. Convert down to whatever the underlying
833 **********************************************************************/
835 static int vfswrap_ntimes(vfs_handle_struct *handle,
836 const struct smb_filename *smb_fname,
837 struct smb_file_time *ft)
841 START_PROFILE(syscall_ntimes);
843 if (smb_fname->stream_name) {
848 if (null_timespec(ft->atime)) {
849 ft->atime= smb_fname->st.st_ex_atime;
852 if (null_timespec(ft->mtime)) {
853 ft->mtime = smb_fname->st.st_ex_mtime;
856 if (!null_timespec(ft->create_time) &&
857 lp_store_create_time(SNUM(handle->conn))) {
858 set_create_timespec_ea(handle->conn,
864 if ((timespec_compare(&ft->atime,
865 &smb_fname->st.st_ex_atime) == 0) &&
866 (timespec_compare(&ft->mtime,
867 &smb_fname->st.st_ex_mtime) == 0)) {
871 #if defined(HAVE_UTIMENSAT)
873 struct timespec ts[2];
876 result = utimensat(AT_FDCWD, smb_fname->base_name, ts, 0);
878 result = utimensat(AT_FDCWD, smb_fname->base_name, NULL, 0);
880 #elif defined(HAVE_UTIMES)
882 struct timeval tv[2];
883 tv[0] = convert_timespec_to_timeval(ft->atime);
884 tv[1] = convert_timespec_to_timeval(ft->mtime);
885 result = utimes(smb_fname->base_name, tv);
887 result = utimes(smb_fname->base_name, NULL);
889 #elif defined(HAVE_UTIME)
891 struct utimbuf times;
892 times.actime = convert_timespec_to_time_t(ft->atime);
893 times.modtime = convert_timespec_to_time_t(ft->mtime);
894 result = utime(smb_fname->base_name, ×);
896 result = utime(smb_fname->base_name, NULL);
904 END_PROFILE(syscall_ntimes);
908 /*********************************************************************
909 A version of ftruncate that will write the space on disk if strict
911 **********************************************************************/
913 static int strict_allocate_ftruncate(vfs_handle_struct *handle, files_struct *fsp, SMB_OFF_T len)
916 SMB_OFF_T currpos = SMB_VFS_LSEEK(fsp, 0, SEEK_CUR);
917 unsigned char zero_space[4096];
918 SMB_OFF_T space_to_write;
923 if (SMB_VFS_FSTAT(fsp, &st) == -1)
926 space_to_write = len - st.st_ex_size;
929 if (S_ISFIFO(st.st_ex_mode))
933 if (st.st_ex_size == len)
936 /* Shrink - just ftruncate. */
937 if (st.st_ex_size > len)
938 return sys_ftruncate(fsp->fh->fd, len);
940 /* available disk space is enough or not? */
941 if (lp_strict_allocate(SNUM(fsp->conn))){
942 uint64_t space_avail;
943 uint64_t bsize,dfree,dsize;
945 space_avail = get_dfree_info(fsp->conn,
946 fsp->fsp_name->base_name, false,
947 &bsize, &dfree, &dsize);
948 /* space_avail is 1k blocks */
949 if (space_avail == (uint64_t)-1 ||
950 ((uint64_t)space_to_write/1024 > space_avail) ) {
956 /* Write out the real space on disk. */
957 if (SMB_VFS_LSEEK(fsp, st.st_ex_size, SEEK_SET) != st.st_ex_size)
960 space_to_write = len - st.st_ex_size;
962 memset(zero_space, '\0', sizeof(zero_space));
963 while ( space_to_write > 0) {
965 SMB_OFF_T current_len_to_write = MIN(sizeof(zero_space),space_to_write);
967 retlen = SMB_VFS_WRITE(fsp,(char *)zero_space,current_len_to_write);
971 space_to_write -= retlen;
974 /* Seek to where we were */
975 if (SMB_VFS_LSEEK(fsp, currpos, SEEK_SET) != currpos)
981 static int vfswrap_ftruncate(vfs_handle_struct *handle, files_struct *fsp, SMB_OFF_T len)
988 START_PROFILE(syscall_ftruncate);
990 if (lp_strict_allocate(SNUM(fsp->conn))) {
991 result = strict_allocate_ftruncate(handle, fsp, len);
992 END_PROFILE(syscall_ftruncate);
996 /* we used to just check HAVE_FTRUNCATE_EXTEND and only use
997 sys_ftruncate if the system supports it. Then I discovered that
998 you can have some filesystems that support ftruncate
999 expansion and some that don't! On Linux fat can't do
1000 ftruncate extend but ext2 can. */
1002 result = sys_ftruncate(fsp->fh->fd, len);
1006 /* According to W. R. Stevens advanced UNIX prog. Pure 4.3 BSD cannot
1007 extend a file with ftruncate. Provide alternate implementation
1009 currpos = SMB_VFS_LSEEK(fsp, 0, SEEK_CUR);
1010 if (currpos == -1) {
1014 /* Do an fstat to see if the file is longer than the requested
1015 size in which case the ftruncate above should have
1016 succeeded or shorter, in which case seek to len - 1 and
1017 write 1 byte of zero */
1018 if (SMB_VFS_FSTAT(fsp, &st) == -1) {
1023 if (S_ISFIFO(st.st_ex_mode)) {
1029 if (st.st_ex_size == len) {
1034 if (st.st_ex_size > len) {
1035 /* the sys_ftruncate should have worked */
1039 if (SMB_VFS_LSEEK(fsp, len-1, SEEK_SET) != len -1)
1042 if (SMB_VFS_WRITE(fsp, &c, 1)!=1)
1045 /* Seek to where we were */
1046 if (SMB_VFS_LSEEK(fsp, currpos, SEEK_SET) != currpos)
1052 END_PROFILE(syscall_ftruncate);
1056 static bool vfswrap_lock(vfs_handle_struct *handle, files_struct *fsp, int op, SMB_OFF_T offset, SMB_OFF_T count, int type)
1060 START_PROFILE(syscall_fcntl_lock);
1061 result = fcntl_lock(fsp->fh->fd, op, offset, count, type);
1062 END_PROFILE(syscall_fcntl_lock);
1066 static int vfswrap_kernel_flock(vfs_handle_struct *handle, files_struct *fsp,
1067 uint32 share_mode, uint32 access_mask)
1069 START_PROFILE(syscall_kernel_flock);
1070 kernel_flock(fsp->fh->fd, share_mode, access_mask);
1071 END_PROFILE(syscall_kernel_flock);
1075 static bool vfswrap_getlock(vfs_handle_struct *handle, files_struct *fsp, SMB_OFF_T *poffset, SMB_OFF_T *pcount, int *ptype, pid_t *ppid)
1079 START_PROFILE(syscall_fcntl_getlock);
1080 result = fcntl_getlock(fsp->fh->fd, poffset, pcount, ptype, ppid);
1081 END_PROFILE(syscall_fcntl_getlock);
1085 static int vfswrap_linux_setlease(vfs_handle_struct *handle, files_struct *fsp,
1090 START_PROFILE(syscall_linux_setlease);
1092 #ifdef HAVE_KERNEL_OPLOCKS_LINUX
1093 /* first set the signal handler */
1094 if(linux_set_lease_sighandler(fsp->fh->fd) == -1) {
1098 result = linux_setlease(fsp->fh->fd, leasetype);
1102 END_PROFILE(syscall_linux_setlease);
1106 static int vfswrap_symlink(vfs_handle_struct *handle, const char *oldpath, const char *newpath)
1110 START_PROFILE(syscall_symlink);
1111 result = symlink(oldpath, newpath);
1112 END_PROFILE(syscall_symlink);
1116 static int vfswrap_readlink(vfs_handle_struct *handle, const char *path, char *buf, size_t bufsiz)
1120 START_PROFILE(syscall_readlink);
1121 result = readlink(path, buf, bufsiz);
1122 END_PROFILE(syscall_readlink);
1126 static int vfswrap_link(vfs_handle_struct *handle, const char *oldpath, const char *newpath)
1130 START_PROFILE(syscall_link);
1131 result = link(oldpath, newpath);
1132 END_PROFILE(syscall_link);
1136 static int vfswrap_mknod(vfs_handle_struct *handle, const char *pathname, mode_t mode, SMB_DEV_T dev)
1140 START_PROFILE(syscall_mknod);
1141 result = sys_mknod(pathname, mode, dev);
1142 END_PROFILE(syscall_mknod);
1146 static char *vfswrap_realpath(vfs_handle_struct *handle, const char *path, char *resolved_path)
1150 START_PROFILE(syscall_realpath);
1151 result = realpath(path, resolved_path);
1152 END_PROFILE(syscall_realpath);
1156 static NTSTATUS vfswrap_notify_watch(vfs_handle_struct *vfs_handle,
1157 struct sys_notify_context *ctx,
1158 struct notify_entry *e,
1159 void (*callback)(struct sys_notify_context *ctx,
1161 struct notify_event *ev),
1162 void *private_data, void *handle)
1165 * So far inotify is the only supported default notify mechanism. If
1166 * another platform like the the BSD's or a proprietary Unix comes
1167 * along and wants another default, we can play the same trick we
1168 * played with Posix ACLs.
1170 * Until that is the case, hard-code inotify here.
1173 if (lp_kernel_change_notify(ctx->conn->params)) {
1174 return inotify_watch(ctx, e, callback, private_data, handle);
1178 * Do nothing, leave everything to notify_internal.c
1180 return NT_STATUS_OK;
1183 static int vfswrap_chflags(vfs_handle_struct *handle, const char *path,
1187 return chflags(path, flags);
1194 static struct file_id vfswrap_file_id_create(struct vfs_handle_struct *handle,
1195 const SMB_STRUCT_STAT *sbuf)
1199 /* the ZERO_STRUCT ensures padding doesn't break using the key as a
1203 key.devid = sbuf->st_ex_dev;
1204 key.inode = sbuf->st_ex_ino;
1205 /* key.extid is unused by default. */
1210 static NTSTATUS vfswrap_streaminfo(vfs_handle_struct *handle,
1211 struct files_struct *fsp,
1213 TALLOC_CTX *mem_ctx,
1214 unsigned int *pnum_streams,
1215 struct stream_struct **pstreams)
1217 SMB_STRUCT_STAT sbuf;
1218 unsigned int num_streams = 0;
1219 struct stream_struct *streams = NULL;
1222 if ((fsp != NULL) && (fsp->is_directory)) {
1224 * No default streams on directories
1229 if ((fsp != NULL) && (fsp->fh->fd != -1)) {
1230 ret = SMB_VFS_FSTAT(fsp, &sbuf);
1233 struct smb_filename *smb_fname = NULL;
1236 status = create_synthetic_smb_fname(talloc_tos(), fname, NULL,
1238 if (!NT_STATUS_IS_OK(status)) {
1241 if (lp_posix_pathnames()) {
1242 ret = SMB_VFS_LSTAT(handle->conn, smb_fname);
1244 ret = SMB_VFS_STAT(handle->conn, smb_fname);
1246 sbuf = smb_fname->st;
1247 TALLOC_FREE(smb_fname);
1251 return map_nt_error_from_unix(errno);
1254 if (S_ISDIR(sbuf.st_ex_mode)) {
1258 streams = talloc(mem_ctx, struct stream_struct);
1260 if (streams == NULL) {
1261 return NT_STATUS_NO_MEMORY;
1264 streams->size = sbuf.st_ex_size;
1265 streams->alloc_size = SMB_VFS_GET_ALLOC_SIZE(handle->conn, fsp, &sbuf);
1267 streams->name = talloc_strdup(streams, "::$DATA");
1268 if (streams->name == NULL) {
1269 TALLOC_FREE(streams);
1270 return NT_STATUS_NO_MEMORY;
1275 *pnum_streams = num_streams;
1276 *pstreams = streams;
1277 return NT_STATUS_OK;
1280 static int vfswrap_get_real_filename(struct vfs_handle_struct *handle,
1283 TALLOC_CTX *mem_ctx,
1287 * Don't fall back to get_real_filename so callers can differentiate
1288 * between a full directory scan and an actual case-insensitive stat.
1294 static const char *vfswrap_connectpath(struct vfs_handle_struct *handle,
1297 return handle->conn->connectpath;
1300 static NTSTATUS vfswrap_brl_lock_windows(struct vfs_handle_struct *handle,
1301 struct byte_range_lock *br_lck,
1302 struct lock_struct *plock,
1304 struct blocking_lock_record *blr)
1306 SMB_ASSERT(plock->lock_flav == WINDOWS_LOCK);
1308 /* Note: blr is not used in the default implementation. */
1309 return brl_lock_windows_default(br_lck, plock, blocking_lock);
1312 static bool vfswrap_brl_unlock_windows(struct vfs_handle_struct *handle,
1313 struct messaging_context *msg_ctx,
1314 struct byte_range_lock *br_lck,
1315 const struct lock_struct *plock)
1317 SMB_ASSERT(plock->lock_flav == WINDOWS_LOCK);
1319 return brl_unlock_windows_default(msg_ctx, br_lck, plock);
1322 static bool vfswrap_brl_cancel_windows(struct vfs_handle_struct *handle,
1323 struct byte_range_lock *br_lck,
1324 struct lock_struct *plock,
1325 struct blocking_lock_record *blr)
1327 SMB_ASSERT(plock->lock_flav == WINDOWS_LOCK);
1329 /* Note: blr is not used in the default implementation. */
1330 return brl_lock_cancel_default(br_lck, plock);
1333 static bool vfswrap_strict_lock(struct vfs_handle_struct *handle,
1335 struct lock_struct *plock)
1337 SMB_ASSERT(plock->lock_type == READ_LOCK ||
1338 plock->lock_type == WRITE_LOCK);
1340 return strict_lock_default(fsp, plock);
1343 static void vfswrap_strict_unlock(struct vfs_handle_struct *handle,
1345 struct lock_struct *plock)
1347 SMB_ASSERT(plock->lock_type == READ_LOCK ||
1348 plock->lock_type == WRITE_LOCK);
1350 strict_unlock_default(fsp, plock);
1353 /* NT ACL operations. */
1355 static NTSTATUS vfswrap_fget_nt_acl(vfs_handle_struct *handle,
1357 uint32 security_info, SEC_DESC **ppdesc)
1361 START_PROFILE(fget_nt_acl);
1362 result = posix_fget_nt_acl(fsp, security_info, ppdesc);
1363 END_PROFILE(fget_nt_acl);
1367 static NTSTATUS vfswrap_get_nt_acl(vfs_handle_struct *handle,
1369 uint32 security_info, SEC_DESC **ppdesc)
1373 START_PROFILE(get_nt_acl);
1374 result = posix_get_nt_acl(handle->conn, name, security_info, ppdesc);
1375 END_PROFILE(get_nt_acl);
1379 static NTSTATUS vfswrap_fset_nt_acl(vfs_handle_struct *handle, files_struct *fsp, uint32 security_info_sent, const SEC_DESC *psd)
1383 START_PROFILE(fset_nt_acl);
1384 result = set_nt_acl(fsp, security_info_sent, psd);
1385 END_PROFILE(fset_nt_acl);
1389 static int vfswrap_chmod_acl(vfs_handle_struct *handle, const char *name, mode_t mode)
1397 START_PROFILE(chmod_acl);
1398 result = chmod_acl(handle->conn, name, mode);
1399 END_PROFILE(chmod_acl);
1404 static int vfswrap_fchmod_acl(vfs_handle_struct *handle, files_struct *fsp, mode_t mode)
1412 START_PROFILE(fchmod_acl);
1413 result = fchmod_acl(fsp, mode);
1414 END_PROFILE(fchmod_acl);
1419 static int vfswrap_sys_acl_get_entry(vfs_handle_struct *handle, SMB_ACL_T theacl, int entry_id, SMB_ACL_ENTRY_T *entry_p)
1421 return sys_acl_get_entry(theacl, entry_id, entry_p);
1424 static int vfswrap_sys_acl_get_tag_type(vfs_handle_struct *handle, SMB_ACL_ENTRY_T entry_d, SMB_ACL_TAG_T *tag_type_p)
1426 return sys_acl_get_tag_type(entry_d, tag_type_p);
1429 static int vfswrap_sys_acl_get_permset(vfs_handle_struct *handle, SMB_ACL_ENTRY_T entry_d, SMB_ACL_PERMSET_T *permset_p)
1431 return sys_acl_get_permset(entry_d, permset_p);
1434 static void * vfswrap_sys_acl_get_qualifier(vfs_handle_struct *handle, SMB_ACL_ENTRY_T entry_d)
1436 return sys_acl_get_qualifier(entry_d);
1439 static SMB_ACL_T vfswrap_sys_acl_get_file(vfs_handle_struct *handle, const char *path_p, SMB_ACL_TYPE_T type)
1441 return sys_acl_get_file(handle, path_p, type);
1444 static SMB_ACL_T vfswrap_sys_acl_get_fd(vfs_handle_struct *handle, files_struct *fsp)
1446 return sys_acl_get_fd(handle, fsp);
1449 static int vfswrap_sys_acl_clear_perms(vfs_handle_struct *handle, SMB_ACL_PERMSET_T permset)
1451 return sys_acl_clear_perms(permset);
1454 static int vfswrap_sys_acl_add_perm(vfs_handle_struct *handle, SMB_ACL_PERMSET_T permset, SMB_ACL_PERM_T perm)
1456 return sys_acl_add_perm(permset, perm);
1459 static char * vfswrap_sys_acl_to_text(vfs_handle_struct *handle, SMB_ACL_T theacl, ssize_t *plen)
1461 return sys_acl_to_text(theacl, plen);
1464 static SMB_ACL_T vfswrap_sys_acl_init(vfs_handle_struct *handle, int count)
1466 return sys_acl_init(count);
1469 static int vfswrap_sys_acl_create_entry(vfs_handle_struct *handle, SMB_ACL_T *pacl, SMB_ACL_ENTRY_T *pentry)
1471 return sys_acl_create_entry(pacl, pentry);
1474 static int vfswrap_sys_acl_set_tag_type(vfs_handle_struct *handle, SMB_ACL_ENTRY_T entry, SMB_ACL_TAG_T tagtype)
1476 return sys_acl_set_tag_type(entry, tagtype);
1479 static int vfswrap_sys_acl_set_qualifier(vfs_handle_struct *handle, SMB_ACL_ENTRY_T entry, void *qual)
1481 return sys_acl_set_qualifier(entry, qual);
1484 static int vfswrap_sys_acl_set_permset(vfs_handle_struct *handle, SMB_ACL_ENTRY_T entry, SMB_ACL_PERMSET_T permset)
1486 return sys_acl_set_permset(entry, permset);
1489 static int vfswrap_sys_acl_valid(vfs_handle_struct *handle, SMB_ACL_T theacl )
1491 return sys_acl_valid(theacl );
1494 static int vfswrap_sys_acl_set_file(vfs_handle_struct *handle, const char *name, SMB_ACL_TYPE_T acltype, SMB_ACL_T theacl)
1496 return sys_acl_set_file(handle, name, acltype, theacl);
1499 static int vfswrap_sys_acl_set_fd(vfs_handle_struct *handle, files_struct *fsp, SMB_ACL_T theacl)
1501 return sys_acl_set_fd(handle, fsp, theacl);
1504 static int vfswrap_sys_acl_delete_def_file(vfs_handle_struct *handle, const char *path)
1506 return sys_acl_delete_def_file(handle, path);
1509 static int vfswrap_sys_acl_get_perm(vfs_handle_struct *handle, SMB_ACL_PERMSET_T permset, SMB_ACL_PERM_T perm)
1511 return sys_acl_get_perm(permset, perm);
1514 static int vfswrap_sys_acl_free_text(vfs_handle_struct *handle, char *text)
1516 return sys_acl_free_text(text);
1519 static int vfswrap_sys_acl_free_acl(vfs_handle_struct *handle, SMB_ACL_T posix_acl)
1521 return sys_acl_free_acl(posix_acl);
1524 static int vfswrap_sys_acl_free_qualifier(vfs_handle_struct *handle, void *qualifier, SMB_ACL_TAG_T tagtype)
1526 return sys_acl_free_qualifier(qualifier, tagtype);
1529 /****************************************************************
1530 Extended attribute operations.
1531 *****************************************************************/
1533 static ssize_t vfswrap_getxattr(struct vfs_handle_struct *handle,const char *path, const char *name, void *value, size_t size)
1535 return sys_getxattr(path, name, value, size);
1538 static ssize_t vfswrap_lgetxattr(struct vfs_handle_struct *handle,const char *path, const char *name, void *value, size_t size)
1540 return sys_lgetxattr(path, name, value, size);
1543 static ssize_t vfswrap_fgetxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name, void *value, size_t size)
1545 return sys_fgetxattr(fsp->fh->fd, name, value, size);
1548 static ssize_t vfswrap_listxattr(struct vfs_handle_struct *handle, const char *path, char *list, size_t size)
1550 return sys_listxattr(path, list, size);
1553 ssize_t vfswrap_llistxattr(struct vfs_handle_struct *handle, const char *path, char *list, size_t size)
1555 return sys_llistxattr(path, list, size);
1558 ssize_t vfswrap_flistxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, char *list, size_t size)
1560 return sys_flistxattr(fsp->fh->fd, list, size);
1563 static int vfswrap_removexattr(struct vfs_handle_struct *handle, const char *path, const char *name)
1565 return sys_removexattr(path, name);
1568 static int vfswrap_lremovexattr(struct vfs_handle_struct *handle, const char *path, const char *name)
1570 return sys_lremovexattr(path, name);
1573 static int vfswrap_fremovexattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name)
1575 return sys_fremovexattr(fsp->fh->fd, name);
1578 static int vfswrap_setxattr(struct vfs_handle_struct *handle, const char *path, const char *name, const void *value, size_t size, int flags)
1580 return sys_setxattr(path, name, value, size, flags);
1583 static int vfswrap_lsetxattr(struct vfs_handle_struct *handle, const char *path, const char *name, const void *value, size_t size, int flags)
1585 return sys_lsetxattr(path, name, value, size, flags);
1588 static int vfswrap_fsetxattr(struct vfs_handle_struct *handle, struct files_struct *fsp, const char *name, const void *value, size_t size, int flags)
1590 return sys_fsetxattr(fsp->fh->fd, name, value, size, flags);
1593 static int vfswrap_aio_read(struct vfs_handle_struct *handle, struct files_struct *fsp, SMB_STRUCT_AIOCB *aiocb)
1597 * aio_read must be done as root, because in the glibc aio
1598 * implementation the helper thread needs to be able to send a signal
1599 * to the main thread, even when it has done a seteuid() to a
1603 ret = sys_aio_read(aiocb);
1608 static int vfswrap_aio_write(struct vfs_handle_struct *handle, struct files_struct *fsp, SMB_STRUCT_AIOCB *aiocb)
1612 * aio_write must be done as root, because in the glibc aio
1613 * implementation the helper thread needs to be able to send a signal
1614 * to the main thread, even when it has done a seteuid() to a
1618 ret = sys_aio_write(aiocb);
1623 static ssize_t vfswrap_aio_return(struct vfs_handle_struct *handle, struct files_struct *fsp, SMB_STRUCT_AIOCB *aiocb)
1625 return sys_aio_return(aiocb);
1628 static int vfswrap_aio_cancel(struct vfs_handle_struct *handle, struct files_struct *fsp, SMB_STRUCT_AIOCB *aiocb)
1630 return sys_aio_cancel(fsp->fh->fd, aiocb);
1633 static int vfswrap_aio_error(struct vfs_handle_struct *handle, struct files_struct *fsp, SMB_STRUCT_AIOCB *aiocb)
1635 return sys_aio_error(aiocb);
1638 static int vfswrap_aio_fsync(struct vfs_handle_struct *handle, struct files_struct *fsp, int op, SMB_STRUCT_AIOCB *aiocb)
1640 return sys_aio_fsync(op, aiocb);
1643 static int vfswrap_aio_suspend(struct vfs_handle_struct *handle, struct files_struct *fsp, const SMB_STRUCT_AIOCB * const aiocb[], int n, const struct timespec *timeout)
1645 return sys_aio_suspend(aiocb, n, timeout);
1648 static bool vfswrap_aio_force(struct vfs_handle_struct *handle, struct files_struct *fsp)
1653 static bool vfswrap_is_offline(struct vfs_handle_struct *handle, const char *path, SMB_STRUCT_STAT *sbuf)
1655 if (ISDOT(path) || ISDOTDOT(path)) {
1659 if (!lp_dmapi_support(SNUM(handle->conn)) || !dmapi_have_session()) {
1660 #if defined(ENOTSUP)
1666 return (dmapi_file_flags(path) & FILE_ATTRIBUTE_OFFLINE) != 0;
1669 static int vfswrap_set_offline(struct vfs_handle_struct *handle, const char *path)
1671 /* We don't know how to set offline bit by default, needs to be overriden in the vfs modules */
1672 #if defined(ENOTSUP)
1678 static struct vfs_fn_pointers vfs_default_fns = {
1679 /* Disk operations */
1681 .connect_fn = vfswrap_connect,
1682 .disconnect = vfswrap_disconnect,
1683 .disk_free = vfswrap_disk_free,
1684 .get_quota = vfswrap_get_quota,
1685 .set_quota = vfswrap_set_quota,
1686 .get_shadow_copy_data = vfswrap_get_shadow_copy_data,
1687 .statvfs = vfswrap_statvfs,
1688 .fs_capabilities = vfswrap_fs_capabilities,
1690 /* Directory operations */
1692 .opendir = vfswrap_opendir,
1693 .readdir = vfswrap_readdir,
1694 .seekdir = vfswrap_seekdir,
1695 .telldir = vfswrap_telldir,
1696 .rewind_dir = vfswrap_rewinddir,
1697 .mkdir = vfswrap_mkdir,
1698 .rmdir = vfswrap_rmdir,
1699 .closedir = vfswrap_closedir,
1700 .init_search_op = vfswrap_init_search_op,
1702 /* File operations */
1704 .open = vfswrap_open,
1705 .create_file = vfswrap_create_file,
1706 .close_fn = vfswrap_close,
1707 .vfs_read = vfswrap_read,
1708 .pread = vfswrap_pread,
1709 .write = vfswrap_write,
1710 .pwrite = vfswrap_pwrite,
1711 .lseek = vfswrap_lseek,
1712 .sendfile = vfswrap_sendfile,
1713 .recvfile = vfswrap_recvfile,
1714 .rename = vfswrap_rename,
1715 .fsync = vfswrap_fsync,
1716 .stat = vfswrap_stat,
1717 .fstat = vfswrap_fstat,
1718 .lstat = vfswrap_lstat,
1719 .get_alloc_size = vfswrap_get_alloc_size,
1720 .unlink = vfswrap_unlink,
1721 .chmod = vfswrap_chmod,
1722 .fchmod = vfswrap_fchmod,
1723 .chown = vfswrap_chown,
1724 .fchown = vfswrap_fchown,
1725 .lchown = vfswrap_lchown,
1726 .chdir = vfswrap_chdir,
1727 .getwd = vfswrap_getwd,
1728 .ntimes = vfswrap_ntimes,
1729 .ftruncate = vfswrap_ftruncate,
1730 .lock = vfswrap_lock,
1731 .kernel_flock = vfswrap_kernel_flock,
1732 .linux_setlease = vfswrap_linux_setlease,
1733 .getlock = vfswrap_getlock,
1734 .symlink = vfswrap_symlink,
1735 .vfs_readlink = vfswrap_readlink,
1736 .link = vfswrap_link,
1737 .mknod = vfswrap_mknod,
1738 .realpath = vfswrap_realpath,
1739 .notify_watch = vfswrap_notify_watch,
1740 .chflags = vfswrap_chflags,
1741 .file_id_create = vfswrap_file_id_create,
1742 .streaminfo = vfswrap_streaminfo,
1743 .get_real_filename = vfswrap_get_real_filename,
1744 .connectpath = vfswrap_connectpath,
1745 .brl_lock_windows = vfswrap_brl_lock_windows,
1746 .brl_unlock_windows = vfswrap_brl_unlock_windows,
1747 .brl_cancel_windows = vfswrap_brl_cancel_windows,
1748 .strict_lock = vfswrap_strict_lock,
1749 .strict_unlock = vfswrap_strict_unlock,
1750 .translate_name = vfswrap_translate_name,
1752 /* NT ACL operations. */
1754 .fget_nt_acl = vfswrap_fget_nt_acl,
1755 .get_nt_acl = vfswrap_get_nt_acl,
1756 .fset_nt_acl = vfswrap_fset_nt_acl,
1758 /* POSIX ACL operations. */
1760 .chmod_acl = vfswrap_chmod_acl,
1761 .fchmod_acl = vfswrap_fchmod_acl,
1763 .sys_acl_get_entry = vfswrap_sys_acl_get_entry,
1764 .sys_acl_get_tag_type = vfswrap_sys_acl_get_tag_type,
1765 .sys_acl_get_permset = vfswrap_sys_acl_get_permset,
1766 .sys_acl_get_qualifier = vfswrap_sys_acl_get_qualifier,
1767 .sys_acl_get_file = vfswrap_sys_acl_get_file,
1768 .sys_acl_get_fd = vfswrap_sys_acl_get_fd,
1769 .sys_acl_clear_perms = vfswrap_sys_acl_clear_perms,
1770 .sys_acl_add_perm = vfswrap_sys_acl_add_perm,
1771 .sys_acl_to_text = vfswrap_sys_acl_to_text,
1772 .sys_acl_init = vfswrap_sys_acl_init,
1773 .sys_acl_create_entry = vfswrap_sys_acl_create_entry,
1774 .sys_acl_set_tag_type = vfswrap_sys_acl_set_tag_type,
1775 .sys_acl_set_qualifier = vfswrap_sys_acl_set_qualifier,
1776 .sys_acl_set_permset = vfswrap_sys_acl_set_permset,
1777 .sys_acl_valid = vfswrap_sys_acl_valid,
1778 .sys_acl_set_file = vfswrap_sys_acl_set_file,
1779 .sys_acl_set_fd = vfswrap_sys_acl_set_fd,
1780 .sys_acl_delete_def_file = vfswrap_sys_acl_delete_def_file,
1781 .sys_acl_get_perm = vfswrap_sys_acl_get_perm,
1782 .sys_acl_free_text = vfswrap_sys_acl_free_text,
1783 .sys_acl_free_acl = vfswrap_sys_acl_free_acl,
1784 .sys_acl_free_qualifier = vfswrap_sys_acl_free_qualifier,
1786 /* EA operations. */
1787 .getxattr = vfswrap_getxattr,
1788 .lgetxattr = vfswrap_lgetxattr,
1789 .fgetxattr = vfswrap_fgetxattr,
1790 .listxattr = vfswrap_listxattr,
1791 .llistxattr = vfswrap_llistxattr,
1792 .flistxattr = vfswrap_flistxattr,
1793 .removexattr = vfswrap_removexattr,
1794 .lremovexattr = vfswrap_lremovexattr,
1795 .fremovexattr = vfswrap_fremovexattr,
1796 .setxattr = vfswrap_setxattr,
1797 .lsetxattr = vfswrap_lsetxattr,
1798 .fsetxattr = vfswrap_fsetxattr,
1800 /* aio operations */
1801 .aio_read = vfswrap_aio_read,
1802 .aio_write = vfswrap_aio_write,
1803 .aio_return_fn = vfswrap_aio_return,
1804 .aio_cancel = vfswrap_aio_cancel,
1805 .aio_error_fn = vfswrap_aio_error,
1806 .aio_fsync = vfswrap_aio_fsync,
1807 .aio_suspend = vfswrap_aio_suspend,
1808 .aio_force = vfswrap_aio_force,
1810 /* offline operations */
1811 .is_offline = vfswrap_is_offline,
1812 .set_offline = vfswrap_set_offline
1815 NTSTATUS vfs_default_init(void);
1816 NTSTATUS vfs_default_init(void)
1818 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION,
1819 DEFAULT_VFS_MODULE_NAME, &vfs_default_fns);