[d5cdffe] | 1 | /*
|
---|
[41a0d27] | 2 | * Copyright (c) 2008 Jakub Jermar
|
---|
[d5cdffe] | 3 | * All rights reserved.
|
---|
| 4 | *
|
---|
| 5 | * Redistribution and use in source and binary forms, with or without
|
---|
| 6 | * modification, are permitted provided that the following conditions
|
---|
| 7 | * are met:
|
---|
| 8 | *
|
---|
| 9 | * - Redistributions of source code must retain the above copyright
|
---|
| 10 | * notice, this list of conditions and the following disclaimer.
|
---|
| 11 | * - Redistributions in binary form must reproduce the above copyright
|
---|
| 12 | * notice, this list of conditions and the following disclaimer in the
|
---|
| 13 | * documentation and/or other materials provided with the distribution.
|
---|
| 14 | * - The name of the author may not be used to endorse or promote products
|
---|
| 15 | * derived from this software without specific prior written permission.
|
---|
| 16 | *
|
---|
| 17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
---|
| 18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
---|
| 19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
---|
| 20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
---|
| 21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
---|
| 22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
---|
| 23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
---|
| 24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
---|
| 25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
---|
| 26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
---|
| 27 | */
|
---|
| 28 |
|
---|
| 29 | /** @addtogroup fs
|
---|
| 30 | * @{
|
---|
| 31 | */
|
---|
| 32 |
|
---|
| 33 | /**
|
---|
| 34 | * @file tmpfs_ops.c
|
---|
| 35 | * @brief Implementation of VFS operations for the TMPFS file system
|
---|
| 36 | * server.
|
---|
| 37 | */
|
---|
| 38 |
|
---|
| 39 | #include "tmpfs.h"
|
---|
| 40 | #include "../../vfs/vfs.h"
|
---|
| 41 | #include <ipc/ipc.h>
|
---|
| 42 | #include <async.h>
|
---|
| 43 | #include <errno.h>
|
---|
[4b11571] | 44 | #include <atomic.h>
|
---|
| 45 | #include <stdlib.h>
|
---|
| 46 | #include <string.h>
|
---|
| 47 | #include <stdio.h>
|
---|
[5973fd0] | 48 | #include <assert.h>
|
---|
[a4eb8a60] | 49 | #include <sys/types.h>
|
---|
| 50 | #include <libadt/hash_table.h>
|
---|
| 51 | #include <as.h>
|
---|
[2c448fb] | 52 | #include <libfs.h>
|
---|
[a4eb8a60] | 53 |
|
---|
| 54 | #define min(a, b) ((a) < (b) ? (a) : (b))
|
---|
| 55 | #define max(a, b) ((a) > (b) ? (a) : (b))
|
---|
[d5cdffe] | 56 |
|
---|
[a4eb8a60] | 57 | #define DENTRIES_BUCKETS 256
|
---|
| 58 |
|
---|
[3298ddc] | 59 | #define NAMES_BUCKETS 4
|
---|
| 60 |
|
---|
[8d049ee0] | 61 | /** All root nodes have index 0. */
|
---|
| 62 | #define TMPFS_SOME_ROOT 0
|
---|
| 63 | /** Global counter for assigning node indices. Shared by all instances. */
|
---|
| 64 | fs_index_t tmpfs_next_index = 1;
|
---|
[adb5fe3] | 65 |
|
---|
[2c448fb] | 66 | /*
|
---|
| 67 | * Implementation of the libfs interface.
|
---|
| 68 | */
|
---|
[b5553a2] | 69 |
|
---|
[fdb7795] | 70 | /* Forward declarations of static functions. */
|
---|
[b6035ba] | 71 | static fs_node_t *tmpfs_match(fs_node_t *, const char *);
|
---|
| 72 | static fs_node_t *tmpfs_node_get(dev_handle_t, fs_index_t);
|
---|
| 73 | static void tmpfs_node_put(fs_node_t *);
|
---|
| 74 | static fs_node_t *tmpfs_create_node(dev_handle_t, int);
|
---|
| 75 | static int tmpfs_link_node(fs_node_t *, fs_node_t *, const char *);
|
---|
| 76 | static int tmpfs_unlink_node(fs_node_t *, fs_node_t *);
|
---|
| 77 | static int tmpfs_destroy_node(fs_node_t *);
|
---|
[2c448fb] | 78 |
|
---|
| 79 | /* Implementation of helper functions. */
|
---|
[b6035ba] | 80 | static fs_index_t tmpfs_index_get(fs_node_t *fn)
|
---|
[2c448fb] | 81 | {
|
---|
[b6035ba] | 82 | return TMPFS_NODE(fn)->index;
|
---|
[2c448fb] | 83 | }
|
---|
| 84 |
|
---|
[b6035ba] | 85 | static size_t tmpfs_size_get(fs_node_t *fn)
|
---|
[2c448fb] | 86 | {
|
---|
[b6035ba] | 87 | return TMPFS_NODE(fn)->size;
|
---|
[2c448fb] | 88 | }
|
---|
| 89 |
|
---|
[b6035ba] | 90 | static unsigned tmpfs_lnkcnt_get(fs_node_t *fn)
|
---|
[2c448fb] | 91 | {
|
---|
[b6035ba] | 92 | return TMPFS_NODE(fn)->lnkcnt;
|
---|
[2c448fb] | 93 | }
|
---|
| 94 |
|
---|
[b6035ba] | 95 | static bool tmpfs_has_children(fs_node_t *fn)
|
---|
[2c448fb] | 96 | {
|
---|
[b6035ba] | 97 | return TMPFS_NODE(fn)->child != NULL;
|
---|
[2c448fb] | 98 | }
|
---|
| 99 |
|
---|
[b6035ba] | 100 | static fs_node_t *tmpfs_root_get(dev_handle_t dev_handle)
|
---|
[2c448fb] | 101 | {
|
---|
[8d049ee0] | 102 | return tmpfs_node_get(dev_handle, TMPFS_SOME_ROOT);
|
---|
[2c448fb] | 103 | }
|
---|
| 104 |
|
---|
| 105 | static char tmpfs_plb_get_char(unsigned pos)
|
---|
| 106 | {
|
---|
| 107 | return tmpfs_reg.plb_ro[pos % PLB_SIZE];
|
---|
| 108 | }
|
---|
| 109 |
|
---|
[b6035ba] | 110 | static bool tmpfs_is_directory(fs_node_t *fn)
|
---|
[2c448fb] | 111 | {
|
---|
[b6035ba] | 112 | return TMPFS_NODE(fn)->type == TMPFS_DIRECTORY;
|
---|
[2c448fb] | 113 | }
|
---|
| 114 |
|
---|
[b6035ba] | 115 | static bool tmpfs_is_file(fs_node_t *fn)
|
---|
[2c448fb] | 116 | {
|
---|
[b6035ba] | 117 | return TMPFS_NODE(fn)->type == TMPFS_FILE;
|
---|
[2c448fb] | 118 | }
|
---|
| 119 |
|
---|
| 120 | /** libfs operations */
|
---|
| 121 | libfs_ops_t tmpfs_libfs_ops = {
|
---|
| 122 | .match = tmpfs_match,
|
---|
[a8e9ab8d] | 123 | .node_get = tmpfs_node_get,
|
---|
[06901c6b] | 124 | .node_put = tmpfs_node_put,
|
---|
[2c448fb] | 125 | .create = tmpfs_create_node,
|
---|
| 126 | .destroy = tmpfs_destroy_node,
|
---|
| 127 | .link = tmpfs_link_node,
|
---|
| 128 | .unlink = tmpfs_unlink_node,
|
---|
| 129 | .index_get = tmpfs_index_get,
|
---|
| 130 | .size_get = tmpfs_size_get,
|
---|
| 131 | .lnkcnt_get = tmpfs_lnkcnt_get,
|
---|
[736c164] | 132 | .has_children = tmpfs_has_children,
|
---|
[2c448fb] | 133 | .root_get = tmpfs_root_get,
|
---|
| 134 | .plb_get_char = tmpfs_plb_get_char,
|
---|
| 135 | .is_directory = tmpfs_is_directory,
|
---|
| 136 | .is_file = tmpfs_is_file
|
---|
| 137 | };
|
---|
[fdb7795] | 138 |
|
---|
| 139 | /** Hash table of all directory entries. */
|
---|
[a4eb8a60] | 140 | hash_table_t dentries;
|
---|
| 141 |
|
---|
[8d049ee0] | 142 | #define DENTRIES_KEY_INDEX 0
|
---|
| 143 | #define DENTRIES_KEY_DEV 1
|
---|
| 144 |
|
---|
[3298ddc] | 145 | /* Implementation of hash table interface for the dentries hash table. */
|
---|
[8d049ee0] | 146 | static hash_index_t dentries_hash(unsigned long key[])
|
---|
[a4eb8a60] | 147 | {
|
---|
[8d049ee0] | 148 | return key[DENTRIES_KEY_INDEX] % DENTRIES_BUCKETS;
|
---|
[a4eb8a60] | 149 | }
|
---|
| 150 |
|
---|
[8d049ee0] | 151 | static int dentries_compare(unsigned long key[], hash_count_t keys,
|
---|
[a4eb8a60] | 152 | link_t *item)
|
---|
| 153 | {
|
---|
| 154 | tmpfs_dentry_t *dentry = hash_table_get_instance(item, tmpfs_dentry_t,
|
---|
| 155 | dh_link);
|
---|
[8d049ee0] | 156 | return (dentry->index == key[DENTRIES_KEY_INDEX] &&
|
---|
| 157 | dentry->dev_handle == key[DENTRIES_KEY_DEV]);
|
---|
[a4eb8a60] | 158 | }
|
---|
| 159 |
|
---|
| 160 | static void dentries_remove_callback(link_t *item)
|
---|
| 161 | {
|
---|
| 162 | }
|
---|
| 163 |
|
---|
| 164 | /** TMPFS dentries hash table operations. */
|
---|
| 165 | hash_table_operations_t dentries_ops = {
|
---|
| 166 | .hash = dentries_hash,
|
---|
| 167 | .compare = dentries_compare,
|
---|
| 168 | .remove_callback = dentries_remove_callback
|
---|
| 169 | };
|
---|
| 170 |
|
---|
[3298ddc] | 171 | typedef struct {
|
---|
| 172 | char *name;
|
---|
| 173 | tmpfs_dentry_t *parent;
|
---|
| 174 | link_t link;
|
---|
| 175 | } tmpfs_name_t;
|
---|
| 176 |
|
---|
| 177 | /* Implementation of hash table interface for the names hash table. */
|
---|
| 178 | static hash_index_t names_hash(unsigned long *key)
|
---|
| 179 | {
|
---|
| 180 | tmpfs_dentry_t *dentry = (tmpfs_dentry_t *) *key;
|
---|
| 181 | return dentry->index % NAMES_BUCKETS;
|
---|
| 182 | }
|
---|
| 183 |
|
---|
| 184 | static int names_compare(unsigned long *key, hash_count_t keys, link_t *item)
|
---|
| 185 | {
|
---|
| 186 | tmpfs_dentry_t *dentry = (tmpfs_dentry_t *) *key;
|
---|
| 187 | tmpfs_name_t *namep = hash_table_get_instance(item, tmpfs_name_t,
|
---|
| 188 | link);
|
---|
| 189 | return dentry == namep->parent;
|
---|
| 190 | }
|
---|
| 191 |
|
---|
| 192 | static void names_remove_callback(link_t *item)
|
---|
| 193 | {
|
---|
| 194 | tmpfs_name_t *namep = hash_table_get_instance(item, tmpfs_name_t,
|
---|
| 195 | link);
|
---|
| 196 | free(namep->name);
|
---|
| 197 | free(namep);
|
---|
| 198 | }
|
---|
| 199 |
|
---|
| 200 | /** TMPFS node names hash table operations. */
|
---|
| 201 | static hash_table_operations_t names_ops = {
|
---|
| 202 | .hash = names_hash,
|
---|
| 203 | .compare = names_compare,
|
---|
| 204 | .remove_callback = names_remove_callback
|
---|
| 205 | };
|
---|
| 206 |
|
---|
| 207 | static void tmpfs_name_initialize(tmpfs_name_t *namep)
|
---|
| 208 | {
|
---|
| 209 | namep->name = NULL;
|
---|
| 210 | namep->parent = NULL;
|
---|
| 211 | link_initialize(&namep->link);
|
---|
| 212 | }
|
---|
| 213 |
|
---|
| 214 | static bool tmpfs_dentry_initialize(tmpfs_dentry_t *dentry)
|
---|
[4b11571] | 215 | {
|
---|
[b6035ba] | 216 | dentry->bp = NULL;
|
---|
[4b11571] | 217 | dentry->index = 0;
|
---|
[8d049ee0] | 218 | dentry->dev_handle = 0;
|
---|
[4b11571] | 219 | dentry->sibling = NULL;
|
---|
| 220 | dentry->child = NULL;
|
---|
| 221 | dentry->type = TMPFS_NONE;
|
---|
[adc8a63] | 222 | dentry->lnkcnt = 0;
|
---|
[4b11571] | 223 | dentry->size = 0;
|
---|
| 224 | dentry->data = NULL;
|
---|
[a4eb8a60] | 225 | link_initialize(&dentry->dh_link);
|
---|
[3298ddc] | 226 | return (bool)hash_table_create(&dentry->names, NAMES_BUCKETS, 1,
|
---|
| 227 | &names_ops);
|
---|
[4b11571] | 228 | }
|
---|
| 229 |
|
---|
[8d049ee0] | 230 | bool tmpfs_init(void)
|
---|
[4b11571] | 231 | {
|
---|
[8d049ee0] | 232 | if (!hash_table_create(&dentries, DENTRIES_BUCKETS, 2, &dentries_ops))
|
---|
[a4eb8a60] | 233 | return false;
|
---|
[8d049ee0] | 234 |
|
---|
| 235 | return true;
|
---|
| 236 | }
|
---|
| 237 |
|
---|
| 238 | static bool tmpfs_instance_init(dev_handle_t dev_handle)
|
---|
| 239 | {
|
---|
[b6035ba] | 240 | fs_node_t *rfn;
|
---|
[8d049ee0] | 241 |
|
---|
[b6035ba] | 242 | rfn = tmpfs_create_node(dev_handle, L_DIRECTORY);
|
---|
| 243 | if (!rfn)
|
---|
[3298ddc] | 244 | return false;
|
---|
[b6035ba] | 245 | TMPFS_NODE(rfn)->lnkcnt = 0; /* FS root is not linked */
|
---|
[3298ddc] | 246 | return true;
|
---|
[4b11571] | 247 | }
|
---|
| 248 |
|
---|
[d5cdffe] | 249 | /** Compare one component of path to a directory entry.
|
---|
| 250 | *
|
---|
[736c164] | 251 | * @param parentp Pointer to node from which we descended.
|
---|
| 252 | * @param childp Pointer to node to compare the path component with.
|
---|
[b8b23c8] | 253 | * @param component Array of characters holding component name.
|
---|
[d5cdffe] | 254 | *
|
---|
[b8b23c8] | 255 | * @return True on match, false otherwise.
|
---|
[d5cdffe] | 256 | */
|
---|
[736c164] | 257 | static bool
|
---|
| 258 | tmpfs_match_one(tmpfs_dentry_t *parentp, tmpfs_dentry_t *childp,
|
---|
| 259 | const char *component)
|
---|
[d5cdffe] | 260 | {
|
---|
[3298ddc] | 261 | unsigned long key = (unsigned long) parentp;
|
---|
| 262 | link_t *hlp = hash_table_find(&childp->names, &key);
|
---|
| 263 | assert(hlp);
|
---|
| 264 | tmpfs_name_t *namep = hash_table_get_instance(hlp, tmpfs_name_t, link);
|
---|
[92fd52d7] | 265 | return !str_cmp(namep->name, component);
|
---|
[b8b23c8] | 266 | }
|
---|
[4b11571] | 267 |
|
---|
[b6035ba] | 268 | fs_node_t *tmpfs_match(fs_node_t *pfn, const char *component)
|
---|
[736c164] | 269 | {
|
---|
[b6035ba] | 270 | tmpfs_dentry_t *parentp = TMPFS_NODE(pfn);
|
---|
[736c164] | 271 | tmpfs_dentry_t *childp = parentp->child;
|
---|
| 272 |
|
---|
| 273 | while (childp && !tmpfs_match_one(parentp, childp, component))
|
---|
| 274 | childp = childp->sibling;
|
---|
| 275 |
|
---|
[b6035ba] | 276 | return FS_NODE(childp);
|
---|
[736c164] | 277 | }
|
---|
| 278 |
|
---|
[b6035ba] | 279 | fs_node_t *tmpfs_node_get(dev_handle_t dev_handle, fs_index_t index)
|
---|
[a8e9ab8d] | 280 | {
|
---|
[8d049ee0] | 281 | unsigned long key[] = {
|
---|
| 282 | [DENTRIES_KEY_INDEX] = index,
|
---|
| 283 | [DENTRIES_KEY_DEV] = dev_handle
|
---|
| 284 | };
|
---|
| 285 | link_t *lnk = hash_table_find(&dentries, key);
|
---|
[a8e9ab8d] | 286 | if (!lnk)
|
---|
| 287 | return NULL;
|
---|
[b6035ba] | 288 | return FS_NODE(hash_table_get_instance(lnk, tmpfs_dentry_t, dh_link));
|
---|
[a8e9ab8d] | 289 | }
|
---|
| 290 |
|
---|
[b6035ba] | 291 | void tmpfs_node_put(fs_node_t *fn)
|
---|
[06901c6b] | 292 | {
|
---|
| 293 | /* nothing to do */
|
---|
| 294 | }
|
---|
| 295 |
|
---|
[b6035ba] | 296 | fs_node_t *tmpfs_create_node(dev_handle_t dev_handle, int lflag)
|
---|
[b8b23c8] | 297 | {
|
---|
[72bde81] | 298 | assert((lflag & L_FILE) ^ (lflag & L_DIRECTORY));
|
---|
| 299 |
|
---|
[b6035ba] | 300 | fs_node_t *fn = malloc(sizeof(fs_node_t));
|
---|
| 301 | if (!fn)
|
---|
| 302 | return NULL;
|
---|
| 303 |
|
---|
[72bde81] | 304 | tmpfs_dentry_t *node = malloc(sizeof(tmpfs_dentry_t));
|
---|
[b6035ba] | 305 | if (!node) {
|
---|
| 306 | free(fn);
|
---|
[b5553a2] | 307 | return NULL;
|
---|
[b6035ba] | 308 | }
|
---|
[3298ddc] | 309 | if (!tmpfs_dentry_initialize(node)) {
|
---|
[b6035ba] | 310 | free(fn);
|
---|
[3298ddc] | 311 | free(node);
|
---|
| 312 | return NULL;
|
---|
| 313 | }
|
---|
[b6035ba] | 314 | fn->data = node;
|
---|
| 315 | node->bp = fn; /* establish the back pointer */
|
---|
[8d049ee0] | 316 | if (!tmpfs_root_get(dev_handle))
|
---|
| 317 | node->index = TMPFS_SOME_ROOT;
|
---|
| 318 | else
|
---|
| 319 | node->index = tmpfs_next_index++;
|
---|
| 320 | node->dev_handle = dev_handle;
|
---|
[72bde81] | 321 | if (lflag & L_DIRECTORY)
|
---|
| 322 | node->type = TMPFS_DIRECTORY;
|
---|
| 323 | else
|
---|
| 324 | node->type = TMPFS_FILE;
|
---|
| 325 |
|
---|
[fdb7795] | 326 | /* Insert the new node into the dentry hash table. */
|
---|
[8d049ee0] | 327 | unsigned long key[] = {
|
---|
| 328 | [DENTRIES_KEY_INDEX] = node->index,
|
---|
| 329 | [DENTRIES_KEY_DEV] = node->dev_handle
|
---|
| 330 | };
|
---|
| 331 | hash_table_insert(&dentries, key, &node->dh_link);
|
---|
[b6035ba] | 332 | return fn;
|
---|
[fdb7795] | 333 | }
|
---|
| 334 |
|
---|
[b6035ba] | 335 | int tmpfs_link_node(fs_node_t *pfn, fs_node_t *cfn, const char *nm)
|
---|
[fdb7795] | 336 | {
|
---|
[b6035ba] | 337 | tmpfs_dentry_t *parentp = TMPFS_NODE(pfn);
|
---|
| 338 | tmpfs_dentry_t *childp = TMPFS_NODE(cfn);
|
---|
[fdb7795] | 339 |
|
---|
| 340 | assert(parentp->type == TMPFS_DIRECTORY);
|
---|
| 341 |
|
---|
[3298ddc] | 342 | tmpfs_name_t *namep = malloc(sizeof(tmpfs_name_t));
|
---|
| 343 | if (!namep)
|
---|
[0013b9ce] | 344 | return ENOMEM;
|
---|
[3298ddc] | 345 | tmpfs_name_initialize(namep);
|
---|
[92fd52d7] | 346 | size_t size = str_size(nm);
|
---|
| 347 | namep->name = malloc(size + 1);
|
---|
[3298ddc] | 348 | if (!namep->name) {
|
---|
| 349 | free(namep);
|
---|
[0013b9ce] | 350 | return ENOMEM;
|
---|
[3298ddc] | 351 | }
|
---|
[6eb2e96] | 352 | str_cpy(namep->name, size + 1, nm);
|
---|
[3298ddc] | 353 | namep->parent = parentp;
|
---|
[adc8a63] | 354 |
|
---|
| 355 | childp->lnkcnt++;
|
---|
[3298ddc] | 356 |
|
---|
| 357 | unsigned long key = (unsigned long) parentp;
|
---|
| 358 | hash_table_insert(&childp->names, &key, &namep->link);
|
---|
[fdb7795] | 359 |
|
---|
[72bde81] | 360 | /* Insert the new node into the namespace. */
|
---|
[fdb7795] | 361 | if (parentp->child) {
|
---|
| 362 | tmpfs_dentry_t *tmp = parentp->child;
|
---|
[72bde81] | 363 | while (tmp->sibling)
|
---|
| 364 | tmp = tmp->sibling;
|
---|
[fdb7795] | 365 | tmp->sibling = childp;
|
---|
[72bde81] | 366 | } else {
|
---|
[fdb7795] | 367 | parentp->child = childp;
|
---|
[72bde81] | 368 | }
|
---|
| 369 |
|
---|
[0013b9ce] | 370 | return EOK;
|
---|
[b8b23c8] | 371 | }
|
---|
[4b11571] | 372 |
|
---|
[b6035ba] | 373 | int tmpfs_unlink_node(fs_node_t *pfn, fs_node_t *cfn)
|
---|
[b8b23c8] | 374 | {
|
---|
[b6035ba] | 375 | tmpfs_dentry_t *parentp = TMPFS_NODE(pfn);
|
---|
| 376 | tmpfs_dentry_t *childp = TMPFS_NODE(cfn);
|
---|
[16105cba] | 377 |
|
---|
[7b6d98b] | 378 | if (!parentp)
|
---|
[16105cba] | 379 | return EBUSY;
|
---|
| 380 |
|
---|
[7b6d98b] | 381 | if (childp->child)
|
---|
| 382 | return ENOTEMPTY;
|
---|
| 383 |
|
---|
| 384 | if (parentp->child == childp) {
|
---|
| 385 | parentp->child = childp->sibling;
|
---|
[16105cba] | 386 | } else {
|
---|
| 387 | /* TODO: consider doubly linked list for organizing siblings. */
|
---|
[7b6d98b] | 388 | tmpfs_dentry_t *tmp = parentp->child;
|
---|
| 389 | while (tmp->sibling != childp)
|
---|
[16105cba] | 390 | tmp = tmp->sibling;
|
---|
[7b6d98b] | 391 | tmp->sibling = childp->sibling;
|
---|
[16105cba] | 392 | }
|
---|
[7b6d98b] | 393 | childp->sibling = NULL;
|
---|
[16105cba] | 394 |
|
---|
[3298ddc] | 395 | unsigned long key = (unsigned long) parentp;
|
---|
| 396 | hash_table_remove(&childp->names, &key, 1);
|
---|
[fdb7795] | 397 |
|
---|
[7b6d98b] | 398 | childp->lnkcnt--;
|
---|
[adc8a63] | 399 |
|
---|
[16105cba] | 400 | return EOK;
|
---|
[d5cdffe] | 401 | }
|
---|
| 402 |
|
---|
[b6035ba] | 403 | int tmpfs_destroy_node(fs_node_t *fn)
|
---|
[fdb7795] | 404 | {
|
---|
[b6035ba] | 405 | tmpfs_dentry_t *dentry = TMPFS_NODE(fn);
|
---|
[fdb7795] | 406 |
|
---|
[adc8a63] | 407 | assert(!dentry->lnkcnt);
|
---|
[fdb7795] | 408 | assert(!dentry->child);
|
---|
| 409 | assert(!dentry->sibling);
|
---|
| 410 |
|
---|
[8d049ee0] | 411 | unsigned long key[] = {
|
---|
| 412 | [DENTRIES_KEY_INDEX] = dentry->index,
|
---|
| 413 | [DENTRIES_KEY_DEV] = dentry->dev_handle
|
---|
| 414 | };
|
---|
| 415 | hash_table_remove(&dentries, key, 2);
|
---|
[fdb7795] | 416 |
|
---|
[3298ddc] | 417 | hash_table_destroy(&dentry->names);
|
---|
| 418 |
|
---|
[fdb7795] | 419 | if (dentry->type == TMPFS_FILE)
|
---|
| 420 | free(dentry->data);
|
---|
[b6035ba] | 421 | free(dentry->bp);
|
---|
[fdb7795] | 422 | free(dentry);
|
---|
[45f244b] | 423 | return EOK;
|
---|
[fdb7795] | 424 | }
|
---|
| 425 |
|
---|
[f49b0ea] | 426 | void tmpfs_mounted(ipc_callid_t rid, ipc_call_t *request)
|
---|
[64b67c3] | 427 | {
|
---|
[f49b0ea] | 428 | dev_handle_t dev_handle = (dev_handle_t) IPC_GET_ARG1(*request);
|
---|
[64b67c3] | 429 |
|
---|
[594303b] | 430 | /* accept the mount options */
|
---|
| 431 | ipc_callid_t callid;
|
---|
| 432 | size_t size;
|
---|
| 433 | if (!ipc_data_write_receive(&callid, &size)) {
|
---|
| 434 | ipc_answer_0(callid, EINVAL);
|
---|
| 435 | ipc_answer_0(rid, EINVAL);
|
---|
| 436 | return;
|
---|
| 437 | }
|
---|
| 438 | char *opts = malloc(size + 1);
|
---|
| 439 | if (!opts) {
|
---|
| 440 | ipc_answer_0(callid, ENOMEM);
|
---|
| 441 | ipc_answer_0(rid, ENOMEM);
|
---|
| 442 | return;
|
---|
| 443 | }
|
---|
| 444 | ipcarg_t retval = ipc_data_write_finalize(callid, opts, size);
|
---|
| 445 | if (retval != EOK) {
|
---|
| 446 | ipc_answer_0(rid, retval);
|
---|
| 447 | free(opts);
|
---|
| 448 | return;
|
---|
| 449 | }
|
---|
| 450 | opts[size] = '\0';
|
---|
| 451 |
|
---|
[8d049ee0] | 452 | /* Initialize TMPFS instance. */
|
---|
| 453 | if (!tmpfs_instance_init(dev_handle)) {
|
---|
[4b11571] | 454 | ipc_answer_0(rid, ENOMEM);
|
---|
| 455 | return;
|
---|
| 456 | }
|
---|
[f49b0ea] | 457 |
|
---|
[b6035ba] | 458 | tmpfs_dentry_t *root = TMPFS_NODE(tmpfs_root_get(dev_handle));
|
---|
[594303b] | 459 | if (str_cmp(opts, "restore") == 0) {
|
---|
[f49b0ea] | 460 | if (tmpfs_restore(dev_handle))
|
---|
[5ab597d] | 461 | ipc_answer_3(rid, EOK, root->index, root->size,
|
---|
| 462 | root->lnkcnt);
|
---|
[f49b0ea] | 463 | else
|
---|
| 464 | ipc_answer_0(rid, ELIMIT);
|
---|
| 465 | } else {
|
---|
[5ab597d] | 466 | ipc_answer_3(rid, EOK, root->index, root->size, root->lnkcnt);
|
---|
[f49b0ea] | 467 | }
|
---|
| 468 | }
|
---|
| 469 |
|
---|
| 470 | void tmpfs_mount(ipc_callid_t rid, ipc_call_t *request)
|
---|
| 471 | {
|
---|
| 472 | dev_handle_t mp_dev_handle = (dev_handle_t) IPC_GET_ARG1(*request);
|
---|
| 473 | fs_index_t mp_index = (fs_index_t) IPC_GET_ARG2(*request);
|
---|
| 474 | fs_handle_t mr_fs_handle = (fs_handle_t) IPC_GET_ARG3(*request);
|
---|
| 475 | dev_handle_t mr_dev_handle = (dev_handle_t) IPC_GET_ARG4(*request);
|
---|
| 476 |
|
---|
| 477 | ipc_answer_0(rid, ENOTSUP);
|
---|
| 478 | }
|
---|
| 479 |
|
---|
| 480 | void tmpfs_lookup(ipc_callid_t rid, ipc_call_t *request)
|
---|
| 481 | {
|
---|
[2c448fb] | 482 | libfs_lookup(&tmpfs_libfs_ops, tmpfs_reg.fs_handle, rid, request);
|
---|
[d5cdffe] | 483 | }
|
---|
| 484 |
|
---|
[a4eb8a60] | 485 | void tmpfs_read(ipc_callid_t rid, ipc_call_t *request)
|
---|
| 486 | {
|
---|
[f2ec8c8] | 487 | dev_handle_t dev_handle = (dev_handle_t)IPC_GET_ARG1(*request);
|
---|
| 488 | fs_index_t index = (fs_index_t)IPC_GET_ARG2(*request);
|
---|
| 489 | off_t pos = (off_t)IPC_GET_ARG3(*request);
|
---|
[a4eb8a60] | 490 |
|
---|
| 491 | /*
|
---|
| 492 | * Lookup the respective dentry.
|
---|
| 493 | */
|
---|
| 494 | link_t *hlp;
|
---|
[8d049ee0] | 495 | unsigned long key[] = {
|
---|
| 496 | [DENTRIES_KEY_INDEX] = index,
|
---|
| 497 | [DENTRIES_KEY_DEV] = dev_handle,
|
---|
| 498 | };
|
---|
| 499 | hlp = hash_table_find(&dentries, key);
|
---|
[a4eb8a60] | 500 | if (!hlp) {
|
---|
| 501 | ipc_answer_0(rid, ENOENT);
|
---|
| 502 | return;
|
---|
| 503 | }
|
---|
| 504 | tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
|
---|
| 505 | dh_link);
|
---|
| 506 |
|
---|
| 507 | /*
|
---|
[a92da0a] | 508 | * Receive the read request.
|
---|
[a4eb8a60] | 509 | */
|
---|
| 510 | ipc_callid_t callid;
|
---|
[92fd52d7] | 511 | size_t size;
|
---|
| 512 | if (!ipc_data_read_receive(&callid, &size)) {
|
---|
[a4eb8a60] | 513 | ipc_answer_0(callid, EINVAL);
|
---|
| 514 | ipc_answer_0(rid, EINVAL);
|
---|
| 515 | return;
|
---|
| 516 | }
|
---|
| 517 |
|
---|
[5973fd0] | 518 | size_t bytes;
|
---|
| 519 | if (dentry->type == TMPFS_FILE) {
|
---|
[92fd52d7] | 520 | bytes = max(0, min(dentry->size - pos, size));
|
---|
[5973fd0] | 521 | (void) ipc_data_read_finalize(callid, dentry->data + pos,
|
---|
| 522 | bytes);
|
---|
| 523 | } else {
|
---|
| 524 | int i;
|
---|
[75c426b4] | 525 | tmpfs_dentry_t *cur;
|
---|
[5973fd0] | 526 |
|
---|
| 527 | assert(dentry->type == TMPFS_DIRECTORY);
|
---|
| 528 |
|
---|
| 529 | /*
|
---|
| 530 | * Yes, we really use O(n) algorithm here.
|
---|
| 531 | * If it bothers someone, it could be fixed by introducing a
|
---|
| 532 | * hash table.
|
---|
| 533 | */
|
---|
| 534 | for (i = 0, cur = dentry->child; i < pos && cur; i++,
|
---|
| 535 | cur = cur->sibling)
|
---|
| 536 | ;
|
---|
| 537 |
|
---|
| 538 | if (!cur) {
|
---|
| 539 | ipc_answer_0(callid, ENOENT);
|
---|
| 540 | ipc_answer_1(rid, ENOENT, 0);
|
---|
| 541 | return;
|
---|
| 542 | }
|
---|
| 543 |
|
---|
[3298ddc] | 544 | unsigned long key = (unsigned long) dentry;
|
---|
| 545 | link_t *hlp = hash_table_find(&cur->names, &key);
|
---|
| 546 | assert(hlp);
|
---|
| 547 | tmpfs_name_t *namep = hash_table_get_instance(hlp, tmpfs_name_t,
|
---|
| 548 | link);
|
---|
| 549 |
|
---|
| 550 | (void) ipc_data_read_finalize(callid, namep->name,
|
---|
[92fd52d7] | 551 | str_size(namep->name) + 1);
|
---|
[5973fd0] | 552 | bytes = 1;
|
---|
| 553 | }
|
---|
[7dab6b8] | 554 |
|
---|
| 555 | /*
|
---|
| 556 | * Answer the VFS_READ call.
|
---|
| 557 | */
|
---|
| 558 | ipc_answer_1(rid, EOK, bytes);
|
---|
[a4eb8a60] | 559 | }
|
---|
| 560 |
|
---|
[ee1b8ca] | 561 | void tmpfs_write(ipc_callid_t rid, ipc_call_t *request)
|
---|
| 562 | {
|
---|
[f2ec8c8] | 563 | dev_handle_t dev_handle = (dev_handle_t)IPC_GET_ARG1(*request);
|
---|
| 564 | fs_index_t index = (fs_index_t)IPC_GET_ARG2(*request);
|
---|
| 565 | off_t pos = (off_t)IPC_GET_ARG3(*request);
|
---|
[ee1b8ca] | 566 |
|
---|
| 567 | /*
|
---|
| 568 | * Lookup the respective dentry.
|
---|
| 569 | */
|
---|
| 570 | link_t *hlp;
|
---|
[8d049ee0] | 571 | unsigned long key[] = {
|
---|
| 572 | [DENTRIES_KEY_INDEX] = index,
|
---|
| 573 | [DENTRIES_KEY_DEV] = dev_handle
|
---|
| 574 | };
|
---|
| 575 | hlp = hash_table_find(&dentries, key);
|
---|
[ee1b8ca] | 576 | if (!hlp) {
|
---|
| 577 | ipc_answer_0(rid, ENOENT);
|
---|
| 578 | return;
|
---|
| 579 | }
|
---|
| 580 | tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
|
---|
| 581 | dh_link);
|
---|
| 582 |
|
---|
| 583 | /*
|
---|
| 584 | * Receive the write request.
|
---|
| 585 | */
|
---|
| 586 | ipc_callid_t callid;
|
---|
[92fd52d7] | 587 | size_t size;
|
---|
| 588 | if (!ipc_data_write_receive(&callid, &size)) {
|
---|
[ee1b8ca] | 589 | ipc_answer_0(callid, EINVAL);
|
---|
| 590 | ipc_answer_0(rid, EINVAL);
|
---|
| 591 | return;
|
---|
| 592 | }
|
---|
| 593 |
|
---|
[c1bf5cb] | 594 | /*
|
---|
| 595 | * Check whether the file needs to grow.
|
---|
| 596 | */
|
---|
[92fd52d7] | 597 | if (pos + size <= dentry->size) {
|
---|
[c1bf5cb] | 598 | /* The file size is not changing. */
|
---|
[92fd52d7] | 599 | (void) ipc_data_write_finalize(callid, dentry->data + pos, size);
|
---|
| 600 | ipc_answer_2(rid, EOK, size, dentry->size);
|
---|
[c1bf5cb] | 601 | return;
|
---|
| 602 | }
|
---|
[92fd52d7] | 603 | size_t delta = (pos + size) - dentry->size;
|
---|
[ee1b8ca] | 604 | /*
|
---|
| 605 | * At this point, we are deliberately extremely straightforward and
|
---|
[c1bf5cb] | 606 | * simply realloc the contents of the file on every write that grows the
|
---|
| 607 | * file. In the end, the situation might not be as bad as it may look:
|
---|
| 608 | * our heap allocator can save us and just grow the block whenever
|
---|
| 609 | * possible.
|
---|
[ee1b8ca] | 610 | */
|
---|
[c1bf5cb] | 611 | void *newdata = realloc(dentry->data, dentry->size + delta);
|
---|
[ee1b8ca] | 612 | if (!newdata) {
|
---|
| 613 | ipc_answer_0(callid, ENOMEM);
|
---|
[f7017572] | 614 | ipc_answer_2(rid, EOK, 0, dentry->size);
|
---|
[ee1b8ca] | 615 | return;
|
---|
| 616 | }
|
---|
[0ee4322] | 617 | /* Clear any newly allocated memory in order to emulate gaps. */
|
---|
[752ccee] | 618 | memset(newdata + dentry->size, 0, delta);
|
---|
[c1bf5cb] | 619 | dentry->size += delta;
|
---|
[ee1b8ca] | 620 | dentry->data = newdata;
|
---|
[92fd52d7] | 621 | (void) ipc_data_write_finalize(callid, dentry->data + pos, size);
|
---|
| 622 | ipc_answer_2(rid, EOK, size, dentry->size);
|
---|
[ee1b8ca] | 623 | }
|
---|
| 624 |
|
---|
[0ee4322] | 625 | void tmpfs_truncate(ipc_callid_t rid, ipc_call_t *request)
|
---|
| 626 | {
|
---|
[f2ec8c8] | 627 | dev_handle_t dev_handle = (dev_handle_t)IPC_GET_ARG1(*request);
|
---|
| 628 | fs_index_t index = (fs_index_t)IPC_GET_ARG2(*request);
|
---|
| 629 | size_t size = (off_t)IPC_GET_ARG3(*request);
|
---|
[0ee4322] | 630 |
|
---|
| 631 | /*
|
---|
| 632 | * Lookup the respective dentry.
|
---|
| 633 | */
|
---|
| 634 | link_t *hlp;
|
---|
[8d049ee0] | 635 | unsigned long key[] = {
|
---|
| 636 | [DENTRIES_KEY_INDEX] = index,
|
---|
| 637 | [DENTRIES_KEY_DEV] = dev_handle
|
---|
| 638 | };
|
---|
| 639 | hlp = hash_table_find(&dentries, key);
|
---|
[0ee4322] | 640 | if (!hlp) {
|
---|
| 641 | ipc_answer_0(rid, ENOENT);
|
---|
| 642 | return;
|
---|
| 643 | }
|
---|
| 644 | tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
|
---|
| 645 | dh_link);
|
---|
| 646 |
|
---|
| 647 | if (size == dentry->size) {
|
---|
| 648 | ipc_answer_0(rid, EOK);
|
---|
| 649 | return;
|
---|
| 650 | }
|
---|
| 651 |
|
---|
| 652 | void *newdata = realloc(dentry->data, size);
|
---|
| 653 | if (!newdata) {
|
---|
| 654 | ipc_answer_0(rid, ENOMEM);
|
---|
| 655 | return;
|
---|
| 656 | }
|
---|
| 657 | if (size > dentry->size) {
|
---|
| 658 | size_t delta = size - dentry->size;
|
---|
| 659 | memset(newdata + dentry->size, 0, delta);
|
---|
| 660 | }
|
---|
| 661 | dentry->size = size;
|
---|
| 662 | dentry->data = newdata;
|
---|
| 663 | ipc_answer_0(rid, EOK);
|
---|
| 664 | }
|
---|
| 665 |
|
---|
[fdb7795] | 666 | void tmpfs_destroy(ipc_callid_t rid, ipc_call_t *request)
|
---|
[f17667a] | 667 | {
|
---|
[f2ec8c8] | 668 | dev_handle_t dev_handle = (dev_handle_t)IPC_GET_ARG1(*request);
|
---|
| 669 | fs_index_t index = (fs_index_t)IPC_GET_ARG2(*request);
|
---|
[45f244b] | 670 | int rc;
|
---|
[f17667a] | 671 |
|
---|
| 672 | link_t *hlp;
|
---|
[8d049ee0] | 673 | unsigned long key[] = {
|
---|
| 674 | [DENTRIES_KEY_INDEX] = index,
|
---|
| 675 | [DENTRIES_KEY_DEV] = dev_handle
|
---|
| 676 | };
|
---|
| 677 | hlp = hash_table_find(&dentries, key);
|
---|
[f17667a] | 678 | if (!hlp) {
|
---|
| 679 | ipc_answer_0(rid, ENOENT);
|
---|
| 680 | return;
|
---|
| 681 | }
|
---|
| 682 | tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
|
---|
| 683 | dh_link);
|
---|
[b6035ba] | 684 | rc = tmpfs_destroy_node(FS_NODE(dentry));
|
---|
[45f244b] | 685 | ipc_answer_0(rid, rc);
|
---|
[f17667a] | 686 | }
|
---|
| 687 |
|
---|
[d5cdffe] | 688 | /**
|
---|
| 689 | * @}
|
---|
| 690 | */
|
---|