source: mainline/uspace/srv/vfs/vfs_ops.c@ 64d2b10

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 64d2b10 was 4fe94c66, checked in by Jakub Jermar <jakub@…>, 14 years ago

Now when the table of open files is shared by multiple connections of
one client task, it became necessary to maintain the vfs_file_t
references obtained from vfs_file_get() explicitly.

  • Property mode set to 100644
File size: 35.2 KB
RevLine 
[861e7d1]1/*
2 * Copyright (c) 2008 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup fs
30 * @{
[8dc72b64]31 */
[861e7d1]32
33/**
[8dc72b64]34 * @file vfs_ops.c
35 * @brief Operations that VFS offers to its clients.
[861e7d1]36 */
37
[a8e9ab8d]38#include "vfs.h"
[861e7d1]39#include <ipc/ipc.h>
[ed903174]40#include <macros.h>
[9539be6]41#include <stdint.h>
[861e7d1]42#include <async.h>
43#include <errno.h>
44#include <stdio.h>
45#include <stdlib.h>
[19f857a]46#include <str.h>
[861e7d1]47#include <bool.h>
[1e4cada]48#include <fibril_synch.h>
[d9c8c81]49#include <adt/list.h>
[861e7d1]50#include <unistd.h>
51#include <ctype.h>
[2db4ac8]52#include <fcntl.h>
[861e7d1]53#include <assert.h>
[a8e9ab8d]54#include <vfs/canonify.h>
[861e7d1]55
[7fe1f75]56/* Forward declarations of static functions. */
[8df8415]57static int vfs_truncate_internal(fs_handle_t, devmap_handle_t, fs_index_t,
58 aoff64_t);
[7fe1f75]59
[861e7d1]60/**
61 * This rwlock prevents the race between a triplet-to-VFS-node resolution and a
62 * concurrent VFS operation which modifies the file system namespace.
63 */
[230260ac]64FIBRIL_RWLOCK_INITIALIZE(namespace_rwlock);
[861e7d1]65
[f49b0ea]66vfs_pair_t rootfs = {
[861e7d1]67 .fs_handle = 0,
[991f645]68 .devmap_handle = 0
[861e7d1]69};
70
[991f645]71static void vfs_mount_internal(ipc_callid_t rid, devmap_handle_t devmap_handle,
[594303b]72 fs_handle_t fs_handle, char *mp, char *opts)
[861e7d1]73{
[8dc72b64]74 vfs_lookup_res_t mp_res;
[83937ccd]75 vfs_lookup_res_t mr_res;
[861e7d1]76 vfs_node_t *mp_node = NULL;
[83937ccd]77 vfs_node_t *mr_node;
78 fs_index_t rindex;
79 size_t rsize;
80 unsigned rlnkcnt;
[96b02eb9]81 sysarg_t rc;
[64b67c3]82 int phone;
[594303b]83 aid_t msg;
84 ipc_call_t answer;
[05b9912]85
[594303b]86 /* Resolve the path to the mountpoint. */
[230260ac]87 fibril_rwlock_write_lock(&namespace_rwlock);
[861e7d1]88 if (rootfs.fs_handle) {
[72bde81]89 /* We already have the root FS. */
[92fd52d7]90 if (str_cmp(mp, "/") == 0) {
[2f60a529]91 /* Trying to mount root FS over root FS */
[230260ac]92 fibril_rwlock_write_unlock(&namespace_rwlock);
[2f60a529]93 ipc_answer_0(rid, EBUSY);
94 return;
95 }
[8dc72b64]96
[ea44bd1]97 rc = vfs_lookup_internal(mp, L_MP, &mp_res, NULL);
[861e7d1]98 if (rc != EOK) {
[72bde81]99 /* The lookup failed for some reason. */
[230260ac]100 fibril_rwlock_write_unlock(&namespace_rwlock);
[861e7d1]101 ipc_answer_0(rid, rc);
102 return;
103 }
[8dc72b64]104
[eb27ce5a]105 mp_node = vfs_node_get(&mp_res);
[861e7d1]106 if (!mp_node) {
[230260ac]107 fibril_rwlock_write_unlock(&namespace_rwlock);
[861e7d1]108 ipc_answer_0(rid, ENOMEM);
109 return;
110 }
[8dc72b64]111
[861e7d1]112 /*
113 * Now we hold a reference to mp_node.
[4198f9c3]114 * It will be dropped upon the corresponding VFS_IN_UNMOUNT.
[861e7d1]115 * This prevents the mount point from being deleted.
116 */
117 } else {
[72bde81]118 /* We still don't have the root file system mounted. */
[92fd52d7]119 if (str_cmp(mp, "/") == 0) {
[64b67c3]120 /*
121 * For this simple, but important case,
122 * we are almost done.
123 */
124
[f49b0ea]125 /* Tell the mountee that it is being mounted. */
126 phone = vfs_grab_phone(fs_handle);
[4198f9c3]127 msg = async_send_1(phone, VFS_OUT_MOUNTED,
[96b02eb9]128 (sysarg_t) devmap_handle, &answer);
[594303b]129 /* send the mount options */
[0da4e41]130 rc = async_data_write_start(phone, (void *)opts,
[594303b]131 str_size(opts));
132 if (rc != EOK) {
[230260ac]133 async_wait_for(msg, NULL);
[df908b3]134 vfs_release_phone(fs_handle, phone);
[230260ac]135 fibril_rwlock_write_unlock(&namespace_rwlock);
[594303b]136 ipc_answer_0(rid, rc);
137 return;
138 }
[230260ac]139 async_wait_for(msg, &rc);
[df908b3]140 vfs_release_phone(fs_handle, phone);
[5ab597d]141
142 if (rc != EOK) {
[230260ac]143 fibril_rwlock_write_unlock(&namespace_rwlock);
[5ab597d]144 ipc_answer_0(rid, rc);
145 return;
[f49b0ea]146 }
[594303b]147
148 rindex = (fs_index_t) IPC_GET_ARG1(answer);
149 rsize = (size_t) IPC_GET_ARG2(answer);
150 rlnkcnt = (unsigned) IPC_GET_ARG3(answer);
[8dc72b64]151
[5ab597d]152 mr_res.triplet.fs_handle = fs_handle;
[991f645]153 mr_res.triplet.devmap_handle = devmap_handle;
[594303b]154 mr_res.triplet.index = rindex;
155 mr_res.size = rsize;
156 mr_res.lnkcnt = rlnkcnt;
[b17186d]157 mr_res.type = VFS_NODE_DIRECTORY;
[8dc72b64]158
[5ab597d]159 rootfs.fs_handle = fs_handle;
[991f645]160 rootfs.devmap_handle = devmap_handle;
[8dc72b64]161
[5ab597d]162 /* Add reference to the mounted root. */
163 mr_node = vfs_node_get(&mr_res);
164 assert(mr_node);
[8dc72b64]165
[230260ac]166 fibril_rwlock_write_unlock(&namespace_rwlock);
[64b67c3]167 ipc_answer_0(rid, rc);
[861e7d1]168 return;
169 } else {
170 /*
171 * We can't resolve this without the root filesystem
172 * being mounted first.
173 */
[230260ac]174 fibril_rwlock_write_unlock(&namespace_rwlock);
[861e7d1]175 ipc_answer_0(rid, ENOENT);
176 return;
177 }
178 }
179
180 /*
181 * At this point, we have all necessary pieces: file system and device
[f49b0ea]182 * handles, and we know the mount point VFS node.
[861e7d1]183 */
[8dc72b64]184
[83937ccd]185 int mountee_phone = vfs_grab_phone(fs_handle);
186 assert(mountee_phone >= 0);
187
[64b67c3]188 phone = vfs_grab_phone(mp_res.triplet.fs_handle);
[4198f9c3]189 msg = async_send_4(phone, VFS_OUT_MOUNT,
[96b02eb9]190 (sysarg_t) mp_res.triplet.devmap_handle,
191 (sysarg_t) mp_res.triplet.index,
192 (sysarg_t) fs_handle,
193 (sysarg_t) devmap_handle, &answer);
[83937ccd]194
195 /* send connection */
196 rc = async_req_1_0(phone, IPC_M_CONNECTION_CLONE, mountee_phone);
197 if (rc != EOK) {
[230260ac]198 async_wait_for(msg, NULL);
[df908b3]199 vfs_release_phone(fs_handle, mountee_phone);
200 vfs_release_phone(mp_res.triplet.fs_handle, phone);
[83937ccd]201 /* Mount failed, drop reference to mp_node. */
202 if (mp_node)
203 vfs_node_put(mp_node);
204 ipc_answer_0(rid, rc);
[230260ac]205 fibril_rwlock_write_unlock(&namespace_rwlock);
[83937ccd]206 return;
207 }
[34ca870]208
[df908b3]209 vfs_release_phone(fs_handle, mountee_phone);
[83937ccd]210
[594303b]211 /* send the mount options */
[0da4e41]212 rc = async_data_write_start(phone, (void *)opts, str_size(opts));
[594303b]213 if (rc != EOK) {
[230260ac]214 async_wait_for(msg, NULL);
[df908b3]215 vfs_release_phone(mp_res.triplet.fs_handle, phone);
[594303b]216 /* Mount failed, drop reference to mp_node. */
217 if (mp_node)
218 vfs_node_put(mp_node);
[230260ac]219 fibril_rwlock_write_unlock(&namespace_rwlock);
[594303b]220 ipc_answer_0(rid, rc);
221 return;
222 }
[230260ac]223 async_wait_for(msg, &rc);
[df908b3]224 vfs_release_phone(mp_res.triplet.fs_handle, phone);
[8dc72b64]225
[493853ec]226 if (rc == EOK) {
227 rindex = (fs_index_t) IPC_GET_ARG1(answer);
228 rsize = (size_t) IPC_GET_ARG2(answer);
229 rlnkcnt = (unsigned) IPC_GET_ARG3(answer);
230
231 mr_res.triplet.fs_handle = fs_handle;
[991f645]232 mr_res.triplet.devmap_handle = devmap_handle;
[493853ec]233 mr_res.triplet.index = rindex;
234 mr_res.size = rsize;
235 mr_res.lnkcnt = rlnkcnt;
236 mr_res.type = VFS_NODE_DIRECTORY;
237
238 /* Add reference to the mounted root. */
239 mr_node = vfs_node_get(&mr_res);
240 assert(mr_node);
241 } else {
[f49b0ea]242 /* Mount failed, drop reference to mp_node. */
[861e7d1]243 if (mp_node)
244 vfs_node_put(mp_node);
245 }
[83937ccd]246
[ce7311fc]247 ipc_answer_0(rid, rc);
[230260ac]248 fibril_rwlock_write_unlock(&namespace_rwlock);
[861e7d1]249}
250
[8dc72b64]251void vfs_mount(ipc_callid_t rid, ipc_call_t *request)
252{
[8df8415]253 devmap_handle_t devmap_handle;
254
[8dc72b64]255 /*
256 * We expect the library to do the device-name to device-handle
257 * translation for us, thus the device handle will arrive as ARG1
258 * in the request.
259 */
[8df8415]260 devmap_handle = (devmap_handle_t) IPC_GET_ARG1(*request);
[8dc72b64]261
262 /*
263 * Mount flags are passed as ARG2.
264 */
265 unsigned int flags = (unsigned int) IPC_GET_ARG2(*request);
266
267 /*
268 * For now, don't make use of ARG3, but it can be used to
269 * carry mount options in the future.
270 */
271
272 /* We want the client to send us the mount point. */
[472c09d]273 char *mp;
[4cac2d69]274 int rc = async_data_write_accept((void **) &mp, true, 0, MAX_PATH_LEN,
[eda925a]275 0, NULL);
[472c09d]276 if (rc != EOK) {
277 ipc_answer_0(rid, rc);
[8dc72b64]278 return;
279 }
280
[594303b]281 /* Now we expect to receive the mount options. */
[472c09d]282 char *opts;
[4cac2d69]283 rc = async_data_write_accept((void **) &opts, true, 0, MAX_MNTOPTS_LEN,
[eda925a]284 0, NULL);
[472c09d]285 if (rc != EOK) {
[594303b]286 free(mp);
[472c09d]287 ipc_answer_0(rid, rc);
[594303b]288 return;
289 }
290
[8dc72b64]291 /*
292 * Now, we expect the client to send us data with the name of the file
293 * system.
294 */
[472c09d]295 char *fs_name;
[8df8415]296 rc = async_data_write_accept((void **) &fs_name, true, 0,
297 FS_NAME_MAXLEN, 0, NULL);
[472c09d]298 if (rc != EOK) {
[8dc72b64]299 free(mp);
[594303b]300 free(opts);
[472c09d]301 ipc_answer_0(rid, rc);
[8dc72b64]302 return;
303 }
304
[c08c355]305 /*
306 * Wait for IPC_M_PING so that we can return an error if we don't know
307 * fs_name.
308 */
309 ipc_call_t data;
[472c09d]310 ipc_callid_t callid = async_get_call(&data);
[228e490]311 if (IPC_GET_IMETHOD(data) != IPC_M_PING) {
[c08c355]312 ipc_answer_0(callid, ENOTSUP);
313 ipc_answer_0(rid, ENOTSUP);
314 free(mp);
[594303b]315 free(opts);
[c08c355]316 free(fs_name);
317 return;
318 }
319
[8dc72b64]320 /*
321 * Check if we know a file system with the same name as is in fs_name.
322 * This will also give us its file system handle.
323 */
[af7383f3]324 fibril_mutex_lock(&fs_head_lock);
[7b47fa2]325 fs_handle_t fs_handle;
326recheck:
327 fs_handle = fs_name_to_handle(fs_name, false);
[8dc72b64]328 if (!fs_handle) {
329 if (flags & IPC_FLAG_BLOCKING) {
[7b47fa2]330 fibril_condvar_wait(&fs_head_cv, &fs_head_lock);
331 goto recheck;
[8dc72b64]332 }
333
[af7383f3]334 fibril_mutex_unlock(&fs_head_lock);
[8dc72b64]335 ipc_answer_0(callid, ENOENT);
336 ipc_answer_0(rid, ENOENT);
337 free(mp);
338 free(fs_name);
[594303b]339 free(opts);
[8dc72b64]340 return;
341 }
[af7383f3]342 fibril_mutex_unlock(&fs_head_lock);
[8dc72b64]343
344 /* Acknowledge that we know fs_name. */
345 ipc_answer_0(callid, EOK);
346
347 /* Do the mount */
[991f645]348 vfs_mount_internal(rid, devmap_handle, fs_handle, mp, opts);
[8dc72b64]349 free(mp);
350 free(fs_name);
[594303b]351 free(opts);
[8dc72b64]352}
353
[7f5e070]354void vfs_unmount(ipc_callid_t rid, ipc_call_t *request)
355{
[ae75e2e3]356 int rc;
357 char *mp;
358 vfs_lookup_res_t mp_res;
359 vfs_lookup_res_t mr_res;
360 vfs_node_t *mr_node;
361 int phone;
362
363 /*
364 * Receive the mount point path.
365 */
[4cac2d69]366 rc = async_data_write_accept((void **) &mp, true, 0, MAX_PATH_LEN,
[eda925a]367 0, NULL);
[ae75e2e3]368 if (rc != EOK)
369 ipc_answer_0(rid, rc);
370
371 /*
372 * Taking the namespace lock will do two things for us. First, it will
373 * prevent races with other lookup operations. Second, it will stop new
374 * references to already existing VFS nodes and creation of new VFS
375 * nodes. This is because new references are added as a result of some
376 * lookup operation or at least of some operation which is protected by
377 * the namespace lock.
378 */
379 fibril_rwlock_write_lock(&namespace_rwlock);
380
381 /*
382 * Lookup the mounted root and instantiate it.
383 */
[f7376cbf]384 rc = vfs_lookup_internal(mp, L_ROOT, &mr_res, NULL);
[ae75e2e3]385 if (rc != EOK) {
386 fibril_rwlock_write_unlock(&namespace_rwlock);
387 free(mp);
388 ipc_answer_0(rid, rc);
389 return;
390 }
391 mr_node = vfs_node_get(&mr_res);
392 if (!mr_node) {
393 fibril_rwlock_write_unlock(&namespace_rwlock);
394 free(mp);
395 ipc_answer_0(rid, ENOMEM);
396 return;
397 }
398
399 /*
400 * Count the total number of references for the mounted file system. We
401 * are expecting at least two. One which we got above and one which we
402 * got when the file system was mounted. If we find more, it means that
403 * the file system cannot be gracefully unmounted at the moment because
404 * someone is working with it.
405 */
406 if (vfs_nodes_refcount_sum_get(mr_node->fs_handle,
[991f645]407 mr_node->devmap_handle) != 2) {
[ae75e2e3]408 fibril_rwlock_write_unlock(&namespace_rwlock);
409 vfs_node_put(mr_node);
410 free(mp);
411 ipc_answer_0(rid, EBUSY);
412 return;
413 }
414
415 if (str_cmp(mp, "/") == 0) {
416
417 /*
418 * Unmounting the root file system.
419 *
420 * In this case, there is no mount point node and we send
421 * VFS_OUT_UNMOUNTED directly to the mounted file system.
422 */
423
424 free(mp);
425 phone = vfs_grab_phone(mr_node->fs_handle);
426 rc = async_req_1_0(phone, VFS_OUT_UNMOUNTED,
[991f645]427 mr_node->devmap_handle);
[df908b3]428 vfs_release_phone(mr_node->fs_handle, phone);
[ae75e2e3]429 if (rc != EOK) {
430 fibril_rwlock_write_unlock(&namespace_rwlock);
431 vfs_node_put(mr_node);
432 ipc_answer_0(rid, rc);
433 return;
434 }
435 rootfs.fs_handle = 0;
[991f645]436 rootfs.devmap_handle = 0;
[ae75e2e3]437 } else {
438
439 /*
440 * Unmounting a non-root file system.
441 *
442 * We have a regular mount point node representing the parent
443 * file system, so we delegate the operation to it.
444 */
445
[f7376cbf]446 rc = vfs_lookup_internal(mp, L_MP, &mp_res, NULL);
[ae75e2e3]447 free(mp);
448 if (rc != EOK) {
449 fibril_rwlock_write_unlock(&namespace_rwlock);
450 vfs_node_put(mr_node);
451 ipc_answer_0(rid, rc);
452 return;
453 }
454 vfs_node_t *mp_node = vfs_node_get(&mp_res);
455 if (!mp_node) {
456 fibril_rwlock_write_unlock(&namespace_rwlock);
457 vfs_node_put(mr_node);
458 ipc_answer_0(rid, ENOMEM);
459 return;
460 }
461
462 phone = vfs_grab_phone(mp_node->fs_handle);
[8df8415]463 rc = async_req_2_0(phone, VFS_OUT_UNMOUNT,
464 mp_node->devmap_handle, mp_node->index);
[df908b3]465 vfs_release_phone(mp_node->fs_handle, phone);
[ae75e2e3]466 if (rc != EOK) {
467 fibril_rwlock_write_unlock(&namespace_rwlock);
468 vfs_node_put(mp_node);
469 vfs_node_put(mr_node);
470 ipc_answer_0(rid, rc);
471 return;
472 }
473
474 /* Drop the reference we got above. */
475 vfs_node_put(mp_node);
476 /* Drop the reference from when the file system was mounted. */
477 vfs_node_put(mp_node);
478 }
479
480
481 /*
482 * All went well, the mounted file system was successfully unmounted.
483 * The only thing left is to forget the unmounted root VFS node.
484 */
485 vfs_node_forget(mr_node);
486
487 fibril_rwlock_write_unlock(&namespace_rwlock);
488 ipc_answer_0(rid, EOK);
[7f5e070]489}
490
[861e7d1]491void vfs_open(ipc_callid_t rid, ipc_call_t *request)
492{
493 /*
[ae78b530]494 * The POSIX interface is open(path, oflag, mode).
[4198f9c3]495 * We can receive oflags and mode along with the VFS_IN_OPEN call;
496 * the path will need to arrive in another call.
[ae78b530]497 *
498 * We also receive one private, non-POSIX set of flags called lflag
499 * used to pass information to vfs_lookup_internal().
[861e7d1]500 */
[ae78b530]501 int lflag = IPC_GET_ARG1(*request);
502 int oflag = IPC_GET_ARG2(*request);
503 int mode = IPC_GET_ARG3(*request);
[dd2cfa7]504
505 /* Ignore mode for now. */
506 (void) mode;
[05b9912]507
[b17186d]508 /*
509 * Make sure that we are called with exactly one of L_FILE and
[f7376cbf]510 * L_DIRECTORY. Make sure that the user does not pass L_OPEN,
511 * L_ROOT or L_MP.
[b17186d]512 */
[230260ac]513 if (((lflag & (L_FILE | L_DIRECTORY)) == 0) ||
514 ((lflag & (L_FILE | L_DIRECTORY)) == (L_FILE | L_DIRECTORY)) ||
[f7376cbf]515 (lflag & (L_OPEN | L_ROOT | L_MP))) {
[b17186d]516 ipc_answer_0(rid, EINVAL);
517 return;
518 }
[05b9912]519
[2db4ac8]520 if (oflag & O_CREAT)
521 lflag |= L_CREATE;
522 if (oflag & O_EXCL)
523 lflag |= L_EXCLUSIVE;
[05b9912]524
[472c09d]525 char *path;
[4cac2d69]526 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]527 if (rc != EOK) {
[861e7d1]528 ipc_answer_0(rid, rc);
529 return;
530 }
531
532 /*
533 * Avoid the race condition in which the file can be deleted before we
534 * find/create-and-lock the VFS node corresponding to the looked-up
535 * triplet.
536 */
[2db4ac8]537 if (lflag & L_CREATE)
[230260ac]538 fibril_rwlock_write_lock(&namespace_rwlock);
[2db4ac8]539 else
[230260ac]540 fibril_rwlock_read_lock(&namespace_rwlock);
[05b9912]541
[72bde81]542 /* The path is now populated and we can call vfs_lookup_internal(). */
[eb27ce5a]543 vfs_lookup_res_t lr;
[05b9912]544 rc = vfs_lookup_internal(path, lflag | L_OPEN, &lr, NULL);
545 if (rc != EOK) {
[2db4ac8]546 if (lflag & L_CREATE)
[230260ac]547 fibril_rwlock_write_unlock(&namespace_rwlock);
[2db4ac8]548 else
[230260ac]549 fibril_rwlock_read_unlock(&namespace_rwlock);
[861e7d1]550 ipc_answer_0(rid, rc);
551 free(path);
552 return;
553 }
[05b9912]554
[7fe1f75]555 /* Path is no longer needed. */
[861e7d1]556 free(path);
[05b9912]557
[eb27ce5a]558 vfs_node_t *node = vfs_node_get(&lr);
[2db4ac8]559 if (lflag & L_CREATE)
[230260ac]560 fibril_rwlock_write_unlock(&namespace_rwlock);
[2db4ac8]561 else
[230260ac]562 fibril_rwlock_read_unlock(&namespace_rwlock);
[05b9912]563
[7fe1f75]564 /* Truncate the file if requested and if necessary. */
565 if (oflag & O_TRUNC) {
[230260ac]566 fibril_rwlock_write_lock(&node->contents_rwlock);
[7fe1f75]567 if (node->size) {
568 rc = vfs_truncate_internal(node->fs_handle,
[991f645]569 node->devmap_handle, node->index, 0);
[7fe1f75]570 if (rc) {
[230260ac]571 fibril_rwlock_write_unlock(&node->contents_rwlock);
[7fe1f75]572 vfs_node_put(node);
573 ipc_answer_0(rid, rc);
574 return;
575 }
576 node->size = 0;
577 }
[230260ac]578 fibril_rwlock_write_unlock(&node->contents_rwlock);
[7fe1f75]579 }
[05b9912]580
[861e7d1]581 /*
582 * Get ourselves a file descriptor and the corresponding vfs_file_t
583 * structure.
584 */
[2b88074b]585 int fd = vfs_fd_alloc((oflag & O_DESC) != 0);
[861e7d1]586 if (fd < 0) {
587 vfs_node_put(node);
588 ipc_answer_0(rid, fd);
589 return;
590 }
591 vfs_file_t *file = vfs_file_get(fd);
[179d052]592 assert(file);
[861e7d1]593 file->node = node;
[05b9912]594 if (oflag & O_APPEND)
[15b9970]595 file->append = true;
[05b9912]596
[861e7d1]597 /*
598 * The following increase in reference count is for the fact that the
599 * file is being opened and that a file structure is pointing to it.
600 * It is necessary so that the file will not disappear when
601 * vfs_node_put() is called. The reference will be dropped by the
[4198f9c3]602 * respective VFS_IN_CLOSE.
[861e7d1]603 */
604 vfs_node_addref(node);
605 vfs_node_put(node);
[4fe94c66]606 vfs_file_put(file);
[05b9912]607
608 /* Success! Return the new file descriptor to the client. */
609 ipc_answer_1(rid, EOK, fd);
610}
[861e7d1]611
[05b9912]612void vfs_open_node(ipc_callid_t rid, ipc_call_t *request)
613{
614 // FIXME: check for sanity of the supplied fs, dev and index
615
616 /*
617 * The interface is open_node(fs, dev, index, oflag).
618 */
619 vfs_lookup_res_t lr;
620
621 lr.triplet.fs_handle = IPC_GET_ARG1(*request);
[991f645]622 lr.triplet.devmap_handle = IPC_GET_ARG2(*request);
[05b9912]623 lr.triplet.index = IPC_GET_ARG3(*request);
624 int oflag = IPC_GET_ARG4(*request);
625
[230260ac]626 fibril_rwlock_read_lock(&namespace_rwlock);
[05b9912]627
628 int rc = vfs_open_node_internal(&lr);
629 if (rc != EOK) {
[230260ac]630 fibril_rwlock_read_unlock(&namespace_rwlock);
[05b9912]631 ipc_answer_0(rid, rc);
632 return;
633 }
634
635 vfs_node_t *node = vfs_node_get(&lr);
[230260ac]636 fibril_rwlock_read_unlock(&namespace_rwlock);
[05b9912]637
638 /* Truncate the file if requested and if necessary. */
639 if (oflag & O_TRUNC) {
[230260ac]640 fibril_rwlock_write_lock(&node->contents_rwlock);
[05b9912]641 if (node->size) {
642 rc = vfs_truncate_internal(node->fs_handle,
[991f645]643 node->devmap_handle, node->index, 0);
[05b9912]644 if (rc) {
[230260ac]645 fibril_rwlock_write_unlock(&node->contents_rwlock);
[05b9912]646 vfs_node_put(node);
647 ipc_answer_0(rid, rc);
648 return;
649 }
650 node->size = 0;
651 }
[230260ac]652 fibril_rwlock_write_unlock(&node->contents_rwlock);
[05b9912]653 }
654
655 /*
656 * Get ourselves a file descriptor and the corresponding vfs_file_t
657 * structure.
658 */
[2b88074b]659 int fd = vfs_fd_alloc((oflag & O_DESC) != 0);
[05b9912]660 if (fd < 0) {
661 vfs_node_put(node);
662 ipc_answer_0(rid, fd);
663 return;
664 }
665 vfs_file_t *file = vfs_file_get(fd);
666 file->node = node;
667 if (oflag & O_APPEND)
668 file->append = true;
669
670 /*
671 * The following increase in reference count is for the fact that the
672 * file is being opened and that a file structure is pointing to it.
673 * It is necessary so that the file will not disappear when
674 * vfs_node_put() is called. The reference will be dropped by the
[4198f9c3]675 * respective VFS_IN_CLOSE.
[05b9912]676 */
677 vfs_node_addref(node);
678 vfs_node_put(node);
[4fe94c66]679 vfs_file_put(file);
[05b9912]680
[72bde81]681 /* Success! Return the new file descriptor to the client. */
[861e7d1]682 ipc_answer_1(rid, EOK, fd);
683}
684
[05b9912]685void vfs_sync(ipc_callid_t rid, ipc_call_t *request)
686{
687 int fd = IPC_GET_ARG1(*request);
688
689 /* Lookup the file structure corresponding to the file descriptor. */
690 vfs_file_t *file = vfs_file_get(fd);
691 if (!file) {
692 ipc_answer_0(rid, ENOENT);
693 return;
694 }
695
696 /*
697 * Lock the open file structure so that no other thread can manipulate
698 * the same open file at a time.
699 */
[230260ac]700 fibril_mutex_lock(&file->lock);
[05b9912]701 int fs_phone = vfs_grab_phone(file->node->fs_handle);
702
[4198f9c3]703 /* Make a VFS_OUT_SYMC request at the destination FS server. */
[05b9912]704 aid_t msg;
705 ipc_call_t answer;
[991f645]706 msg = async_send_2(fs_phone, VFS_OUT_SYNC, file->node->devmap_handle,
[4198f9c3]707 file->node->index, &answer);
[230260ac]708
[05b9912]709 /* Wait for reply from the FS server. */
[96b02eb9]710 sysarg_t rc;
[05b9912]711 async_wait_for(msg, &rc);
712
[df908b3]713 vfs_release_phone(file->node->fs_handle, fs_phone);
[230260ac]714 fibril_mutex_unlock(&file->lock);
[4fe94c66]715
716 vfs_file_put(file);
[b7f9087]717 ipc_answer_0(rid, rc);
[e704503]718}
719
[f29a3a2]720int vfs_close_internal(vfs_file_t *file)
[2b88074b]721{
722 /*
723 * Lock the open file structure so that no other thread can manipulate
724 * the same open file at a time.
725 */
726 fibril_mutex_lock(&file->lock);
727
728 if (file->refcnt <= 1) {
729 /* Only close the file on the destination FS server
730 if there are no more file descriptors (except the
731 present one) pointing to this file. */
732
733 int fs_phone = vfs_grab_phone(file->node->fs_handle);
734
735 /* Make a VFS_OUT_CLOSE request at the destination FS server. */
736 aid_t msg;
737 ipc_call_t answer;
[8df8415]738 msg = async_send_2(fs_phone, VFS_OUT_CLOSE,
739 file->node->devmap_handle, file->node->index, &answer);
[2b88074b]740
741 /* Wait for reply from the FS server. */
[96b02eb9]742 sysarg_t rc;
[2b88074b]743 async_wait_for(msg, &rc);
744
[df908b3]745 vfs_release_phone(file->node->fs_handle, fs_phone);
[2b88074b]746 fibril_mutex_unlock(&file->lock);
747
748 return IPC_GET_ARG1(answer);
749 }
750
751 fibril_mutex_unlock(&file->lock);
752 return EOK;
753}
754
[05b9912]755void vfs_close(ipc_callid_t rid, ipc_call_t *request)
756{
757 int fd = IPC_GET_ARG1(*request);
758
759 /* Lookup the file structure corresponding to the file descriptor. */
760 vfs_file_t *file = vfs_file_get(fd);
761 if (!file) {
762 ipc_answer_0(rid, ENOENT);
763 return;
764 }
765
[2b88074b]766 int ret = vfs_close_internal(file);
767 if (ret != EOK)
768 ipc_answer_0(rid, ret);
[05b9912]769
[4fe94c66]770 vfs_file_put(file);
[2b88074b]771 ret = vfs_fd_free(fd);
772 ipc_answer_0(rid, ret);
[05b9912]773}
774
[861e7d1]775static void vfs_rdwr(ipc_callid_t rid, ipc_call_t *request, bool read)
776{
[c2f4b6b]777 vfs_info_t *vi;
[861e7d1]778
779 /*
780 * The following code strongly depends on the fact that the files data
781 * structure can be only accessed by a single fibril and all file
782 * operations are serialized (i.e. the reads and writes cannot
783 * interleave and a file cannot be closed while it is being read).
784 *
785 * Additional synchronization needs to be added once the table of
786 * open files supports parallel access!
787 */
788
789 int fd = IPC_GET_ARG1(*request);
[6c89f20]790
[72bde81]791 /* Lookup the file structure corresponding to the file descriptor. */
[861e7d1]792 vfs_file_t *file = vfs_file_get(fd);
793 if (!file) {
794 ipc_answer_0(rid, ENOENT);
795 return;
796 }
[6c89f20]797
[861e7d1]798 /*
799 * Lock the open file structure so that no other thread can manipulate
800 * the same open file at a time.
801 */
[230260ac]802 fibril_mutex_lock(&file->lock);
[b17186d]803
[c2f4b6b]804 vi = fs_handle_to_info(file->node->fs_handle);
805 assert(vi);
806
[861e7d1]807 /*
808 * Lock the file's node so that no other client can read/write to it at
[c2f4b6b]809 * the same time unless the FS supports concurrent reads/writes and its
810 * write implementation does not modify the file size.
[861e7d1]811 */
[c2f4b6b]812 if (read || (vi->concurrent_read_write && vi->write_retains_size))
[230260ac]813 fibril_rwlock_read_lock(&file->node->contents_rwlock);
[861e7d1]814 else
[230260ac]815 fibril_rwlock_write_lock(&file->node->contents_rwlock);
[b17186d]816
817 if (file->node->type == VFS_NODE_DIRECTORY) {
818 /*
819 * Make sure that no one is modifying the namespace
820 * while we are in readdir().
821 */
822 assert(read);
[230260ac]823 fibril_rwlock_read_lock(&namespace_rwlock);
[b17186d]824 }
[6c89f20]825
[b4cbef1]826 int fs_phone = vfs_grab_phone(file->node->fs_handle);
[861e7d1]827
828 /*
[b4cbef1]829 * Make a VFS_READ/VFS_WRITE request at the destination FS server
830 * and forward the IPC_M_DATA_READ/IPC_M_DATA_WRITE request to the
[861e7d1]831 * destination FS server. The call will be routed as if sent by
832 * ourselves. Note that call arguments are immutable in this case so we
833 * don't have to bother.
834 */
[96b02eb9]835 sysarg_t rc;
[b4cbef1]836 ipc_call_t answer;
837 if (read) {
838 rc = async_data_read_forward_3_1(fs_phone, VFS_OUT_READ,
[991f645]839 file->node->devmap_handle, file->node->index, file->pos,
[b4cbef1]840 &answer);
841 } else {
[3a4b3ba]842 if (file->append)
843 file->pos = file->node->size;
844
[eda925a]845 rc = async_data_write_forward_3_1(fs_phone, VFS_OUT_WRITE,
[991f645]846 file->node->devmap_handle, file->node->index, file->pos,
[b4cbef1]847 &answer);
848 }
[05b9912]849
[df908b3]850 vfs_release_phone(file->node->fs_handle, fs_phone);
[34ca870]851
[861e7d1]852 size_t bytes = IPC_GET_ARG1(answer);
[b4cbef1]853
[b17186d]854 if (file->node->type == VFS_NODE_DIRECTORY)
[230260ac]855 fibril_rwlock_read_unlock(&namespace_rwlock);
[6c89f20]856
[72bde81]857 /* Unlock the VFS node. */
[c2f4b6b]858 if (read || (vi->concurrent_read_write && vi->write_retains_size))
[230260ac]859 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
[861e7d1]860 else {
861 /* Update the cached version of node's size. */
[f7017572]862 if (rc == EOK)
863 file->node->size = IPC_GET_ARG2(answer);
[230260ac]864 fibril_rwlock_write_unlock(&file->node->contents_rwlock);
[861e7d1]865 }
[6c89f20]866
[72bde81]867 /* Update the position pointer and unlock the open file. */
[f7017572]868 if (rc == EOK)
869 file->pos += bytes;
[230260ac]870 fibril_mutex_unlock(&file->lock);
[4fe94c66]871 vfs_file_put(file);
872
[861e7d1]873 /*
874 * FS server's reply is the final result of the whole operation we
875 * return to the client.
876 */
877 ipc_answer_1(rid, rc, bytes);
878}
879
880void vfs_read(ipc_callid_t rid, ipc_call_t *request)
881{
882 vfs_rdwr(rid, request, true);
883}
884
885void vfs_write(ipc_callid_t rid, ipc_call_t *request)
886{
887 vfs_rdwr(rid, request, false);
888}
889
890void vfs_seek(ipc_callid_t rid, ipc_call_t *request)
891{
892 int fd = (int) IPC_GET_ARG1(*request);
[8df8415]893 off64_t off = (off64_t) MERGE_LOUP32(IPC_GET_ARG2(*request),
894 IPC_GET_ARG3(*request));
[ed903174]895 int whence = (int) IPC_GET_ARG4(*request);
896
[72bde81]897 /* Lookup the file structure corresponding to the file descriptor. */
[861e7d1]898 vfs_file_t *file = vfs_file_get(fd);
899 if (!file) {
900 ipc_answer_0(rid, ENOENT);
901 return;
902 }
[ed903174]903
[230260ac]904 fibril_mutex_lock(&file->lock);
[ed903174]905
906 off64_t newoff;
907 switch (whence) {
[8df8415]908 case SEEK_SET:
909 if (off >= 0) {
910 file->pos = (aoff64_t) off;
[230260ac]911 fibril_mutex_unlock(&file->lock);
[4fe94c66]912 vfs_file_put(file);
[8df8415]913 ipc_answer_1(rid, EOK, off);
[861e7d1]914 return;
[8df8415]915 }
916 break;
917 case SEEK_CUR:
918 if ((off >= 0) && (file->pos + off < file->pos)) {
919 fibril_mutex_unlock(&file->lock);
[4fe94c66]920 vfs_file_put(file);
[8df8415]921 ipc_answer_0(rid, EOVERFLOW);
922 return;
923 }
924
925 if ((off < 0) && (file->pos < (aoff64_t) -off)) {
926 fibril_mutex_unlock(&file->lock);
[4fe94c66]927 vfs_file_put(file);
[8df8415]928 ipc_answer_0(rid, EOVERFLOW);
929 return;
930 }
931
932 file->pos += off;
933 newoff = (file->pos > OFF64_MAX) ? OFF64_MAX : file->pos;
934
935 fibril_mutex_unlock(&file->lock);
[4fe94c66]936 vfs_file_put(file);
[8df8415]937 ipc_answer_2(rid, EOK, LOWER32(newoff),
938 UPPER32(newoff));
939 return;
940 case SEEK_END:
941 fibril_rwlock_read_lock(&file->node->contents_rwlock);
942 aoff64_t size = file->node->size;
943
944 if ((off >= 0) && (size + off < size)) {
[ed903174]945 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
[230260ac]946 fibril_mutex_unlock(&file->lock);
[4fe94c66]947 vfs_file_put(file);
[8df8415]948 ipc_answer_0(rid, EOVERFLOW);
[861e7d1]949 return;
[8df8415]950 }
951
952 if ((off < 0) && (size < (aoff64_t) -off)) {
953 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
954 fibril_mutex_unlock(&file->lock);
[4fe94c66]955 vfs_file_put(file);
[8df8415]956 ipc_answer_0(rid, EOVERFLOW);
957 return;
958 }
959
960 file->pos = size + off;
961 newoff = (file->pos > OFF64_MAX) ? OFF64_MAX : file->pos;
962
963 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
964 fibril_mutex_unlock(&file->lock);
[4fe94c66]965 vfs_file_put(file);
[8df8415]966 ipc_answer_2(rid, EOK, LOWER32(newoff), UPPER32(newoff));
967 return;
[861e7d1]968 }
[ed903174]969
[230260ac]970 fibril_mutex_unlock(&file->lock);
[4fe94c66]971 vfs_file_put(file);
[861e7d1]972 ipc_answer_0(rid, EINVAL);
973}
974
[991f645]975int vfs_truncate_internal(fs_handle_t fs_handle, devmap_handle_t devmap_handle,
[ed903174]976 fs_index_t index, aoff64_t size)
[7fe1f75]977{
[96b02eb9]978 sysarg_t rc;
[7fe1f75]979 int fs_phone;
980
981 fs_phone = vfs_grab_phone(fs_handle);
[96b02eb9]982 rc = async_req_4_0(fs_phone, VFS_OUT_TRUNCATE, (sysarg_t) devmap_handle,
983 (sysarg_t) index, LOWER32(size), UPPER32(size));
[df908b3]984 vfs_release_phone(fs_handle, fs_phone);
[7fe1f75]985 return (int)rc;
986}
987
[0ee4322]988void vfs_truncate(ipc_callid_t rid, ipc_call_t *request)
989{
990 int fd = IPC_GET_ARG1(*request);
[8df8415]991 aoff64_t size = (aoff64_t) MERGE_LOUP32(IPC_GET_ARG2(*request),
992 IPC_GET_ARG3(*request));
[7fe1f75]993 int rc;
[0ee4322]994
995 vfs_file_t *file = vfs_file_get(fd);
996 if (!file) {
997 ipc_answer_0(rid, ENOENT);
998 return;
999 }
[230260ac]1000 fibril_mutex_lock(&file->lock);
[0ee4322]1001
[230260ac]1002 fibril_rwlock_write_lock(&file->node->contents_rwlock);
[7fe1f75]1003 rc = vfs_truncate_internal(file->node->fs_handle,
[991f645]1004 file->node->devmap_handle, file->node->index, size);
[0ee4322]1005 if (rc == EOK)
1006 file->node->size = size;
[230260ac]1007 fibril_rwlock_write_unlock(&file->node->contents_rwlock);
[0ee4322]1008
[230260ac]1009 fibril_mutex_unlock(&file->lock);
[4fe94c66]1010 vfs_file_put(file);
[96b02eb9]1011 ipc_answer_0(rid, (sysarg_t)rc);
[861e7d1]1012}
1013
[852b801]1014void vfs_fstat(ipc_callid_t rid, ipc_call_t *request)
1015{
1016 int fd = IPC_GET_ARG1(*request);
[96b02eb9]1017 sysarg_t rc;
[852b801]1018
1019 vfs_file_t *file = vfs_file_get(fd);
1020 if (!file) {
1021 ipc_answer_0(rid, ENOENT);
1022 return;
1023 }
1024
1025 ipc_callid_t callid;
[0da4e41]1026 if (!async_data_read_receive(&callid, NULL)) {
[4fe94c66]1027 vfs_file_put(file);
[852b801]1028 ipc_answer_0(callid, EINVAL);
1029 ipc_answer_0(rid, EINVAL);
1030 return;
1031 }
1032
1033 fibril_mutex_lock(&file->lock);
1034
1035 int fs_phone = vfs_grab_phone(file->node->fs_handle);
1036
1037 aid_t msg;
[991f645]1038 msg = async_send_3(fs_phone, VFS_OUT_STAT, file->node->devmap_handle,
[852b801]1039 file->node->index, true, NULL);
1040 ipc_forward_fast(callid, fs_phone, 0, 0, 0, IPC_FF_ROUTE_FROM_ME);
1041 async_wait_for(msg, &rc);
[df908b3]1042 vfs_release_phone(file->node->fs_handle, fs_phone);
[852b801]1043
1044 fibril_mutex_unlock(&file->lock);
[4fe94c66]1045 vfs_file_put(file);
[852b801]1046 ipc_answer_0(rid, rc);
1047}
1048
1049void vfs_stat(ipc_callid_t rid, ipc_call_t *request)
1050{
[472c09d]1051 char *path;
[4cac2d69]1052 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]1053 if (rc != EOK) {
[415c7e0d]1054 ipc_answer_0(rid, rc);
1055 return;
1056 }
[472c09d]1057
1058 ipc_callid_t callid;
[0da4e41]1059 if (!async_data_read_receive(&callid, NULL)) {
[415c7e0d]1060 free(path);
1061 ipc_answer_0(callid, EINVAL);
1062 ipc_answer_0(rid, EINVAL);
1063 return;
1064 }
1065
1066 vfs_lookup_res_t lr;
1067 fibril_rwlock_read_lock(&namespace_rwlock);
1068 rc = vfs_lookup_internal(path, L_NONE, &lr, NULL);
1069 free(path);
1070 if (rc != EOK) {
1071 fibril_rwlock_read_unlock(&namespace_rwlock);
1072 ipc_answer_0(callid, rc);
1073 ipc_answer_0(rid, rc);
1074 return;
1075 }
1076 vfs_node_t *node = vfs_node_get(&lr);
1077 if (!node) {
1078 fibril_rwlock_read_unlock(&namespace_rwlock);
1079 ipc_answer_0(callid, ENOMEM);
1080 ipc_answer_0(rid, ENOMEM);
1081 return;
1082 }
1083
1084 fibril_rwlock_read_unlock(&namespace_rwlock);
1085
1086 int fs_phone = vfs_grab_phone(node->fs_handle);
1087 aid_t msg;
[991f645]1088 msg = async_send_3(fs_phone, VFS_OUT_STAT, node->devmap_handle,
[415c7e0d]1089 node->index, false, NULL);
1090 ipc_forward_fast(callid, fs_phone, 0, 0, 0, IPC_FF_ROUTE_FROM_ME);
[057760d3]1091
[96b02eb9]1092 sysarg_t rv;
[057760d3]1093 async_wait_for(msg, &rv);
[df908b3]1094 vfs_release_phone(node->fs_handle, fs_phone);
[415c7e0d]1095
[057760d3]1096 ipc_answer_0(rid, rv);
[415c7e0d]1097
1098 vfs_node_put(node);
[852b801]1099}
1100
[72bde81]1101void vfs_mkdir(ipc_callid_t rid, ipc_call_t *request)
1102{
1103 int mode = IPC_GET_ARG1(*request);
[472c09d]1104
1105 char *path;
[4cac2d69]1106 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]1107 if (rc != EOK) {
[72bde81]1108 ipc_answer_0(rid, rc);
1109 return;
1110 }
[472c09d]1111
[dd2cfa7]1112 /* Ignore mode for now. */
1113 (void) mode;
[72bde81]1114
[230260ac]1115 fibril_rwlock_write_lock(&namespace_rwlock);
[72bde81]1116 int lflag = L_DIRECTORY | L_CREATE | L_EXCLUSIVE;
[d6084ef]1117 rc = vfs_lookup_internal(path, lflag, NULL, NULL);
[230260ac]1118 fibril_rwlock_write_unlock(&namespace_rwlock);
[72bde81]1119 free(path);
1120 ipc_answer_0(rid, rc);
1121}
1122
[f15cf1a6]1123void vfs_unlink(ipc_callid_t rid, ipc_call_t *request)
1124{
1125 int lflag = IPC_GET_ARG1(*request);
[472c09d]1126
1127 char *path;
[4cac2d69]1128 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]1129 if (rc != EOK) {
[f15cf1a6]1130 ipc_answer_0(rid, rc);
1131 return;
1132 }
1133
[230260ac]1134 fibril_rwlock_write_lock(&namespace_rwlock);
[f15cf1a6]1135 lflag &= L_DIRECTORY; /* sanitize lflag */
1136 vfs_lookup_res_t lr;
[a8e9ab8d]1137 rc = vfs_lookup_internal(path, lflag | L_UNLINK, &lr, NULL);
[f15cf1a6]1138 free(path);
1139 if (rc != EOK) {
[230260ac]1140 fibril_rwlock_write_unlock(&namespace_rwlock);
[f15cf1a6]1141 ipc_answer_0(rid, rc);
1142 return;
1143 }
1144
1145 /*
1146 * The name has already been unlinked by vfs_lookup_internal().
1147 * We have to get and put the VFS node to ensure that it is
[4198f9c3]1148 * VFS_OUT_DESTROY'ed after the last reference to it is dropped.
[f15cf1a6]1149 */
1150 vfs_node_t *node = vfs_node_get(&lr);
[553492be]1151 fibril_mutex_lock(&nodes_mutex);
[f15cf1a6]1152 node->lnkcnt--;
[553492be]1153 fibril_mutex_unlock(&nodes_mutex);
[230260ac]1154 fibril_rwlock_write_unlock(&namespace_rwlock);
[f15cf1a6]1155 vfs_node_put(node);
1156 ipc_answer_0(rid, EOK);
1157}
1158
[a8e9ab8d]1159void vfs_rename(ipc_callid_t rid, ipc_call_t *request)
1160{
1161 /* Retrieve the old path. */
[472c09d]1162 char *old;
[4cac2d69]1163 int rc = async_data_write_accept((void **) &old, true, 0, 0, 0, NULL);
[472c09d]1164 if (rc != EOK) {
[a8e9ab8d]1165 ipc_answer_0(rid, rc);
1166 return;
1167 }
1168
1169 /* Retrieve the new path. */
[472c09d]1170 char *new;
[4cac2d69]1171 rc = async_data_write_accept((void **) &new, true, 0, 0, 0, NULL);
[472c09d]1172 if (rc != EOK) {
[a8e9ab8d]1173 free(old);
1174 ipc_answer_0(rid, rc);
1175 return;
1176 }
[472c09d]1177
1178 size_t olen;
1179 size_t nlen;
[732bb0c]1180 char *oldc = canonify(old, &olen);
1181 char *newc = canonify(new, &nlen);
[472c09d]1182
1183 if ((!oldc) || (!newc)) {
[a8e9ab8d]1184 ipc_answer_0(rid, EINVAL);
1185 free(old);
1186 free(new);
1187 return;
1188 }
[472c09d]1189
[732bb0c]1190 oldc[olen] = '\0';
1191 newc[nlen] = '\0';
[472c09d]1192
[14040e5]1193 if ((!str_lcmp(newc, oldc, str_length(oldc))) &&
1194 ((newc[str_length(oldc)] == '/') ||
1195 (str_length(oldc) == 1) ||
1196 (str_length(oldc) == str_length(newc)))) {
1197 /*
1198 * oldc is a prefix of newc and either
1199 * - newc continues with a / where oldc ends, or
1200 * - oldc was / itself, or
1201 * - oldc and newc are equal.
1202 */
[a8e9ab8d]1203 ipc_answer_0(rid, EINVAL);
1204 free(old);
1205 free(new);
1206 return;
1207 }
1208
1209 vfs_lookup_res_t old_lr;
1210 vfs_lookup_res_t new_lr;
1211 vfs_lookup_res_t new_par_lr;
[230260ac]1212 fibril_rwlock_write_lock(&namespace_rwlock);
[472c09d]1213
[a8e9ab8d]1214 /* Lookup the node belonging to the old file name. */
1215 rc = vfs_lookup_internal(oldc, L_NONE, &old_lr, NULL);
1216 if (rc != EOK) {
[230260ac]1217 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1218 ipc_answer_0(rid, rc);
1219 free(old);
1220 free(new);
1221 return;
1222 }
[472c09d]1223
[a8e9ab8d]1224 vfs_node_t *old_node = vfs_node_get(&old_lr);
1225 if (!old_node) {
[230260ac]1226 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1227 ipc_answer_0(rid, ENOMEM);
1228 free(old);
1229 free(new);
1230 return;
1231 }
[472c09d]1232
[4f46695e]1233 /* Determine the path to the parent of the node with the new name. */
1234 char *parentc = str_dup(newc);
1235 if (!parentc) {
[230260ac]1236 fibril_rwlock_write_unlock(&namespace_rwlock);
[4f46695e]1237 ipc_answer_0(rid, rc);
1238 free(old);
1239 free(new);
1240 return;
1241 }
[472c09d]1242
[ae55ee8]1243 char *lastsl = str_rchr(parentc + 1, '/');
[4f46695e]1244 if (lastsl)
1245 *lastsl = '\0';
1246 else
1247 parentc[1] = '\0';
[472c09d]1248
[a8e9ab8d]1249 /* Lookup parent of the new file name. */
[4f46695e]1250 rc = vfs_lookup_internal(parentc, L_NONE, &new_par_lr, NULL);
1251 free(parentc); /* not needed anymore */
[a8e9ab8d]1252 if (rc != EOK) {
[230260ac]1253 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1254 ipc_answer_0(rid, rc);
1255 free(old);
1256 free(new);
1257 return;
1258 }
[472c09d]1259
[a8e9ab8d]1260 /* Check whether linking to the same file system instance. */
1261 if ((old_node->fs_handle != new_par_lr.triplet.fs_handle) ||
[991f645]1262 (old_node->devmap_handle != new_par_lr.triplet.devmap_handle)) {
[230260ac]1263 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1264 ipc_answer_0(rid, EXDEV); /* different file systems */
1265 free(old);
1266 free(new);
1267 return;
1268 }
[472c09d]1269
[a8e9ab8d]1270 /* Destroy the old link for the new name. */
1271 vfs_node_t *new_node = NULL;
1272 rc = vfs_lookup_internal(newc, L_UNLINK, &new_lr, NULL);
[472c09d]1273
[a8e9ab8d]1274 switch (rc) {
1275 case ENOENT:
1276 /* simply not in our way */
1277 break;
1278 case EOK:
1279 new_node = vfs_node_get(&new_lr);
1280 if (!new_node) {
[230260ac]1281 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1282 ipc_answer_0(rid, ENOMEM);
1283 free(old);
1284 free(new);
1285 return;
1286 }
[553492be]1287 fibril_mutex_lock(&nodes_mutex);
[a8e9ab8d]1288 new_node->lnkcnt--;
[553492be]1289 fibril_mutex_unlock(&nodes_mutex);
[a8e9ab8d]1290 break;
1291 default:
[230260ac]1292 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1293 ipc_answer_0(rid, ENOTEMPTY);
1294 free(old);
1295 free(new);
1296 return;
1297 }
[472c09d]1298
[a8e9ab8d]1299 /* Create the new link for the new name. */
1300 rc = vfs_lookup_internal(newc, L_LINK, NULL, NULL, old_node->index);
1301 if (rc != EOK) {
[230260ac]1302 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1303 if (new_node)
1304 vfs_node_put(new_node);
1305 ipc_answer_0(rid, rc);
1306 free(old);
1307 free(new);
1308 return;
1309 }
[472c09d]1310
[553492be]1311 fibril_mutex_lock(&nodes_mutex);
[a8e9ab8d]1312 old_node->lnkcnt++;
[553492be]1313 fibril_mutex_unlock(&nodes_mutex);
[472c09d]1314
[a8e9ab8d]1315 /* Destroy the link for the old name. */
1316 rc = vfs_lookup_internal(oldc, L_UNLINK, NULL, NULL);
1317 if (rc != EOK) {
[230260ac]1318 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1319 vfs_node_put(old_node);
1320 if (new_node)
1321 vfs_node_put(new_node);
1322 ipc_answer_0(rid, rc);
1323 free(old);
1324 free(new);
1325 return;
1326 }
[472c09d]1327
[553492be]1328 fibril_mutex_lock(&nodes_mutex);
[a8e9ab8d]1329 old_node->lnkcnt--;
[553492be]1330 fibril_mutex_unlock(&nodes_mutex);
[230260ac]1331 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1332 vfs_node_put(old_node);
[472c09d]1333
[a8e9ab8d]1334 if (new_node)
1335 vfs_node_put(new_node);
[472c09d]1336
[a8e9ab8d]1337 free(old);
1338 free(new);
1339 ipc_answer_0(rid, EOK);
1340}
1341
[2b88074b]1342void vfs_dup(ipc_callid_t rid, ipc_call_t *request)
1343{
1344 int oldfd = IPC_GET_ARG1(*request);
1345 int newfd = IPC_GET_ARG2(*request);
1346
[4fe94c66]1347 /* If the file descriptors are the same, do nothing. */
1348 if (oldfd == newfd) {
1349 ipc_answer_1(rid, EOK, newfd);
1350 return;
1351 }
1352
[2b88074b]1353 /* Lookup the file structure corresponding to oldfd. */
1354 vfs_file_t *oldfile = vfs_file_get(oldfd);
1355 if (!oldfile) {
1356 ipc_answer_0(rid, EBADF);
1357 return;
1358 }
1359
1360 /*
1361 * Lock the open file structure so that no other thread can manipulate
1362 * the same open file at a time.
1363 */
1364 fibril_mutex_lock(&oldfile->lock);
1365
1366 /* Lookup an open file structure possibly corresponding to newfd. */
1367 vfs_file_t *newfile = vfs_file_get(newfd);
1368 if (newfile) {
1369 /* Close the originally opened file. */
1370 int ret = vfs_close_internal(newfile);
1371 if (ret != EOK) {
[1882525]1372 fibril_mutex_unlock(&oldfile->lock);
[4fe94c66]1373 vfs_file_put(oldfile);
1374 vfs_file_put(newfile);
[2b88074b]1375 ipc_answer_0(rid, ret);
1376 return;
1377 }
1378
1379 ret = vfs_fd_free(newfd);
1380 if (ret != EOK) {
[1882525]1381 fibril_mutex_unlock(&oldfile->lock);
[4fe94c66]1382 vfs_file_put(oldfile);
1383 vfs_file_put(newfile);
[2b88074b]1384 ipc_answer_0(rid, ret);
1385 return;
1386 }
[4fe94c66]1387 vfs_file_put(newfile);
[2b88074b]1388 }
1389
1390 /* Assign the old file to newfd. */
1391 int ret = vfs_fd_assign(oldfile, newfd);
1392 fibril_mutex_unlock(&oldfile->lock);
[4fe94c66]1393 vfs_file_put(oldfile);
[2b88074b]1394
1395 if (ret != EOK)
1396 ipc_answer_0(rid, ret);
1397 else
1398 ipc_answer_1(rid, EOK, newfd);
1399}
1400
[861e7d1]1401/**
1402 * @}
[05b9912]1403 */
Note: See TracBrowser for help on using the repository browser.