source: mainline/uspace/srv/vfs/vfs_ops.c@ a68f737

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since a68f737 was 05b9912, checked in by Martin Decky <martin@…>, 16 years ago

VFS rewrite:

  • add new VFS methods
    • VFS_NODE for getting VFS node for a file descriptor
    • VFS_OPEN_NODE for opening an i-node directly
    • VFS_DEVICE for getting the underlying device of a file (if any)
    • VFS_SYNC for syncing buffers
  • L_OPEN flag is set to underlying filesystem in VFS_LOOKUP when opening a file to support initialization (if any)
  • VFS_CLOSE is now propagated to underlying filesystem to support cleanup (if any)
  • Property mode set to 100644
File size: 31.5 KB
RevLine 
[861e7d1]1/*
2 * Copyright (c) 2008 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup fs
30 * @{
[8dc72b64]31 */
[861e7d1]32
33/**
[8dc72b64]34 * @file vfs_ops.c
35 * @brief Operations that VFS offers to its clients.
[861e7d1]36 */
37
[a8e9ab8d]38#include "vfs.h"
[861e7d1]39#include <ipc/ipc.h>
40#include <async.h>
41#include <errno.h>
42#include <stdio.h>
43#include <stdlib.h>
44#include <string.h>
45#include <bool.h>
46#include <futex.h>
47#include <rwlock.h>
48#include <libadt/list.h>
49#include <unistd.h>
50#include <ctype.h>
[2db4ac8]51#include <fcntl.h>
[861e7d1]52#include <assert.h>
[a8e9ab8d]53#include <vfs/canonify.h>
[861e7d1]54
[7fe1f75]55/* Forward declarations of static functions. */
[f2ec8c8]56static int vfs_truncate_internal(fs_handle_t, dev_handle_t, fs_index_t, size_t);
[7fe1f75]57
[8dc72b64]58/** Pending mount structure. */
59typedef struct {
60 link_t link;
61 char *fs_name; /**< File system name */
62 char *mp; /**< Mount point */
[594303b]63 char *opts; /**< Mount options. */
[8dc72b64]64 ipc_callid_t callid; /**< Call ID waiting for the mount */
65 ipc_callid_t rid; /**< Request ID */
66 dev_handle_t dev_handle; /**< Device handle */
67} pending_req_t;
68
69LIST_INITIALIZE(pending_req);
70
[861e7d1]71/**
72 * This rwlock prevents the race between a triplet-to-VFS-node resolution and a
73 * concurrent VFS operation which modifies the file system namespace.
74 */
75RWLOCK_INITIALIZE(namespace_rwlock);
76
[f49b0ea]77vfs_pair_t rootfs = {
[861e7d1]78 .fs_handle = 0,
[f49b0ea]79 .dev_handle = 0
[861e7d1]80};
81
[8dc72b64]82static void vfs_mount_internal(ipc_callid_t rid, dev_handle_t dev_handle,
[594303b]83 fs_handle_t fs_handle, char *mp, char *opts)
[861e7d1]84{
[8dc72b64]85 vfs_lookup_res_t mp_res;
[83937ccd]86 vfs_lookup_res_t mr_res;
[861e7d1]87 vfs_node_t *mp_node = NULL;
[83937ccd]88 vfs_node_t *mr_node;
89 fs_index_t rindex;
90 size_t rsize;
91 unsigned rlnkcnt;
[594303b]92 ipcarg_t rc;
[64b67c3]93 int phone;
[594303b]94 aid_t msg;
95 ipc_call_t answer;
[05b9912]96
[594303b]97 /* Resolve the path to the mountpoint. */
[493853ec]98 rwlock_write_lock(&namespace_rwlock);
[861e7d1]99 if (rootfs.fs_handle) {
[72bde81]100 /* We already have the root FS. */
[92fd52d7]101 if (str_cmp(mp, "/") == 0) {
[2f60a529]102 /* Trying to mount root FS over root FS */
103 ipc_answer_0(rid, EBUSY);
[493853ec]104 rwlock_write_unlock(&namespace_rwlock);
[2f60a529]105 return;
106 }
[8dc72b64]107
108 rc = vfs_lookup_internal(mp, L_DIRECTORY, &mp_res, NULL);
[861e7d1]109 if (rc != EOK) {
[72bde81]110 /* The lookup failed for some reason. */
[861e7d1]111 ipc_answer_0(rid, rc);
[493853ec]112 rwlock_write_unlock(&namespace_rwlock);
[861e7d1]113 return;
114 }
[8dc72b64]115
[eb27ce5a]116 mp_node = vfs_node_get(&mp_res);
[861e7d1]117 if (!mp_node) {
118 ipc_answer_0(rid, ENOMEM);
[493853ec]119 rwlock_write_unlock(&namespace_rwlock);
[861e7d1]120 return;
121 }
[8dc72b64]122
[861e7d1]123 /*
124 * Now we hold a reference to mp_node.
125 * It will be dropped upon the corresponding VFS_UNMOUNT.
126 * This prevents the mount point from being deleted.
127 */
128 } else {
[72bde81]129 /* We still don't have the root file system mounted. */
[92fd52d7]130 if (str_cmp(mp, "/") == 0) {
[64b67c3]131 /*
132 * For this simple, but important case,
133 * we are almost done.
134 */
135
[f49b0ea]136 /* Tell the mountee that it is being mounted. */
137 phone = vfs_grab_phone(fs_handle);
[594303b]138 msg = async_send_1(phone, VFS_MOUNTED,
139 (ipcarg_t) dev_handle, &answer);
140 /* send the mount options */
141 rc = ipc_data_write_start(phone, (void *)opts,
142 str_size(opts));
143 if (rc != EOK) {
144 async_wait_for(msg, NULL);
145 vfs_release_phone(phone);
146 ipc_answer_0(rid, rc);
[493853ec]147 rwlock_write_unlock(&namespace_rwlock);
[594303b]148 return;
149 }
150 async_wait_for(msg, &rc);
[64b67c3]151 vfs_release_phone(phone);
[5ab597d]152
153 if (rc != EOK) {
154 ipc_answer_0(rid, rc);
[493853ec]155 rwlock_write_unlock(&namespace_rwlock);
[5ab597d]156 return;
[f49b0ea]157 }
[594303b]158
159 rindex = (fs_index_t) IPC_GET_ARG1(answer);
160 rsize = (size_t) IPC_GET_ARG2(answer);
161 rlnkcnt = (unsigned) IPC_GET_ARG3(answer);
[8dc72b64]162
[5ab597d]163 mr_res.triplet.fs_handle = fs_handle;
164 mr_res.triplet.dev_handle = dev_handle;
[594303b]165 mr_res.triplet.index = rindex;
166 mr_res.size = rsize;
167 mr_res.lnkcnt = rlnkcnt;
[b17186d]168 mr_res.type = VFS_NODE_DIRECTORY;
[8dc72b64]169
[5ab597d]170 rootfs.fs_handle = fs_handle;
171 rootfs.dev_handle = dev_handle;
[8dc72b64]172
[5ab597d]173 /* Add reference to the mounted root. */
174 mr_node = vfs_node_get(&mr_res);
175 assert(mr_node);
[8dc72b64]176
[64b67c3]177 ipc_answer_0(rid, rc);
[493853ec]178 rwlock_write_unlock(&namespace_rwlock);
[861e7d1]179 return;
180 } else {
181 /*
182 * We can't resolve this without the root filesystem
183 * being mounted first.
184 */
185 ipc_answer_0(rid, ENOENT);
[493853ec]186 rwlock_write_unlock(&namespace_rwlock);
[861e7d1]187 return;
188 }
189 }
190
191 /*
192 * At this point, we have all necessary pieces: file system and device
[f49b0ea]193 * handles, and we know the mount point VFS node.
[861e7d1]194 */
[8dc72b64]195
[83937ccd]196 int mountee_phone = vfs_grab_phone(fs_handle);
197 assert(mountee_phone >= 0);
198 vfs_release_phone(mountee_phone);
199
[64b67c3]200 phone = vfs_grab_phone(mp_res.triplet.fs_handle);
[594303b]201 msg = async_send_4(phone, VFS_MOUNT,
[eb27ce5a]202 (ipcarg_t) mp_res.triplet.dev_handle,
[ce7311fc]203 (ipcarg_t) mp_res.triplet.index,
[f49b0ea]204 (ipcarg_t) fs_handle,
[594303b]205 (ipcarg_t) dev_handle, &answer);
[83937ccd]206
207 /* send connection */
208 rc = async_req_1_0(phone, IPC_M_CONNECTION_CLONE, mountee_phone);
209 if (rc != EOK) {
210 async_wait_for(msg, NULL);
211 vfs_release_phone(phone);
212 /* Mount failed, drop reference to mp_node. */
213 if (mp_node)
214 vfs_node_put(mp_node);
215 ipc_answer_0(rid, rc);
[493853ec]216 rwlock_write_unlock(&namespace_rwlock);
[83937ccd]217 return;
218 }
219
[594303b]220 /* send the mount options */
221 rc = ipc_data_write_start(phone, (void *)opts, str_size(opts));
222 if (rc != EOK) {
223 async_wait_for(msg, NULL);
224 vfs_release_phone(phone);
225 /* Mount failed, drop reference to mp_node. */
226 if (mp_node)
227 vfs_node_put(mp_node);
228 ipc_answer_0(rid, rc);
[493853ec]229 rwlock_write_unlock(&namespace_rwlock);
[594303b]230 return;
231 }
232 async_wait_for(msg, &rc);
[861e7d1]233 vfs_release_phone(phone);
[8dc72b64]234
[493853ec]235 if (rc == EOK) {
236 rindex = (fs_index_t) IPC_GET_ARG1(answer);
237 rsize = (size_t) IPC_GET_ARG2(answer);
238 rlnkcnt = (unsigned) IPC_GET_ARG3(answer);
239
240 mr_res.triplet.fs_handle = fs_handle;
241 mr_res.triplet.dev_handle = dev_handle;
242 mr_res.triplet.index = rindex;
243 mr_res.size = rsize;
244 mr_res.lnkcnt = rlnkcnt;
245 mr_res.type = VFS_NODE_DIRECTORY;
246
247 /* Add reference to the mounted root. */
248 mr_node = vfs_node_get(&mr_res);
249 assert(mr_node);
250 } else {
[f49b0ea]251 /* Mount failed, drop reference to mp_node. */
[861e7d1]252 if (mp_node)
253 vfs_node_put(mp_node);
254 }
[83937ccd]255
[ce7311fc]256 ipc_answer_0(rid, rc);
[493853ec]257 rwlock_write_unlock(&namespace_rwlock);
[861e7d1]258}
259
[8dc72b64]260/** Process pending mount requests */
[0c0b800]261void vfs_process_pending_mount(void)
[8dc72b64]262{
263 link_t *cur;
264
265loop:
266 for (cur = pending_req.next; cur != &pending_req; cur = cur->next) {
267 pending_req_t *pr = list_get_instance(cur, pending_req_t, link);
268
269 fs_handle_t fs_handle = fs_name_to_handle(pr->fs_name, true);
270 if (!fs_handle)
271 continue;
272
273 /* Acknowledge that we know fs_name. */
274 ipc_answer_0(pr->callid, EOK);
275
276 /* Do the mount */
[594303b]277 vfs_mount_internal(pr->rid, pr->dev_handle, fs_handle, pr->mp,
278 pr->opts);
[8dc72b64]279
280 free(pr->fs_name);
281 free(pr->mp);
[594303b]282 free(pr->opts);
[8dc72b64]283 list_remove(cur);
284 free(pr);
285 goto loop;
286 }
287}
288
289void vfs_mount(ipc_callid_t rid, ipc_call_t *request)
290{
291 /*
292 * We expect the library to do the device-name to device-handle
293 * translation for us, thus the device handle will arrive as ARG1
294 * in the request.
295 */
296 dev_handle_t dev_handle = (dev_handle_t) IPC_GET_ARG1(*request);
297
298 /*
299 * Mount flags are passed as ARG2.
300 */
301 unsigned int flags = (unsigned int) IPC_GET_ARG2(*request);
302
303 /*
304 * For now, don't make use of ARG3, but it can be used to
305 * carry mount options in the future.
306 */
307
308 /* We want the client to send us the mount point. */
309 ipc_callid_t callid;
310 size_t size;
311 if (!ipc_data_write_receive(&callid, &size)) {
312 ipc_answer_0(callid, EINVAL);
313 ipc_answer_0(rid, EINVAL);
314 return;
315 }
316
317 /* Check whether size is reasonable wrt. the mount point. */
318 if ((size < 1) || (size > MAX_PATH_LEN)) {
319 ipc_answer_0(callid, EINVAL);
320 ipc_answer_0(rid, EINVAL);
321 return;
322 }
323
324 /* Allocate buffer for the mount point data being received. */
325 char *mp = malloc(size + 1);
326 if (!mp) {
327 ipc_answer_0(callid, ENOMEM);
328 ipc_answer_0(rid, ENOMEM);
329 return;
330 }
331
332 /* Deliver the mount point. */
333 ipcarg_t retval = ipc_data_write_finalize(callid, mp, size);
334 if (retval != EOK) {
[58d7280]335 ipc_answer_0(rid, retval);
[8dc72b64]336 free(mp);
337 return;
338 }
339 mp[size] = '\0';
340
[594303b]341 /* Now we expect to receive the mount options. */
342 if (!ipc_data_write_receive(&callid, &size)) {
343 ipc_answer_0(callid, EINVAL);
344 ipc_answer_0(rid, EINVAL);
345 free(mp);
346 return;
347 }
348
349 /* Check the offered options size. */
350 if (size < 0 || size > MAX_MNTOPTS_LEN) {
351 ipc_answer_0(callid, EINVAL);
352 ipc_answer_0(rid, EINVAL);
353 free(mp);
354 return;
355 }
356
357 /* Allocate buffer for the mount options. */
358 char *opts = (char *) malloc(size + 1);
359 if (!opts) {
360 ipc_answer_0(callid, ENOMEM);
361 ipc_answer_0(rid, ENOMEM);
362 free(mp);
363 return;
364 }
365
366 /* Deliver the mount options. */
367 retval = ipc_data_write_finalize(callid, opts, size);
368 if (retval != EOK) {
369 ipc_answer_0(rid, retval);
370 free(mp);
371 free(opts);
372 return;
373 }
374 opts[size] = '\0';
375
[8dc72b64]376 /*
377 * Now, we expect the client to send us data with the name of the file
378 * system.
379 */
380 if (!ipc_data_write_receive(&callid, &size)) {
381 ipc_answer_0(callid, EINVAL);
382 ipc_answer_0(rid, EINVAL);
383 free(mp);
[594303b]384 free(opts);
[8dc72b64]385 return;
386 }
387
388 /*
389 * Don't receive more than is necessary for storing a full file system
390 * name.
391 */
392 if ((size < 1) || (size > FS_NAME_MAXLEN)) {
393 ipc_answer_0(callid, EINVAL);
394 ipc_answer_0(rid, EINVAL);
395 free(mp);
[594303b]396 free(opts);
[8dc72b64]397 return;
398 }
399
400 /*
401 * Allocate buffer for file system name.
402 */
403 char *fs_name = (char *) malloc(size + 1);
404 if (fs_name == NULL) {
405 ipc_answer_0(callid, ENOMEM);
[58d7280]406 ipc_answer_0(rid, ENOMEM);
[8dc72b64]407 free(mp);
[594303b]408 free(opts);
[8dc72b64]409 return;
410 }
411
412 /* Deliver the file system name. */
413 retval = ipc_data_write_finalize(callid, fs_name, size);
414 if (retval != EOK) {
[58d7280]415 ipc_answer_0(rid, retval);
[8dc72b64]416 free(mp);
[594303b]417 free(opts);
[8dc72b64]418 free(fs_name);
419 return;
420 }
421 fs_name[size] = '\0';
[c08c355]422
423 /*
424 * Wait for IPC_M_PING so that we can return an error if we don't know
425 * fs_name.
426 */
427 ipc_call_t data;
428 callid = async_get_call(&data);
429 if (IPC_GET_METHOD(data) != IPC_M_PING) {
430 ipc_answer_0(callid, ENOTSUP);
431 ipc_answer_0(rid, ENOTSUP);
432 free(mp);
[594303b]433 free(opts);
[c08c355]434 free(fs_name);
435 return;
436 }
437
[8dc72b64]438 /*
439 * Check if we know a file system with the same name as is in fs_name.
440 * This will also give us its file system handle.
441 */
442 fs_handle_t fs_handle = fs_name_to_handle(fs_name, true);
443 if (!fs_handle) {
444 if (flags & IPC_FLAG_BLOCKING) {
[c08c355]445 pending_req_t *pr;
446
[8dc72b64]447 /* Blocking mount, add to pending list */
[c08c355]448 pr = (pending_req_t *) malloc(sizeof(pending_req_t));
[8dc72b64]449 if (!pr) {
450 ipc_answer_0(callid, ENOMEM);
451 ipc_answer_0(rid, ENOMEM);
452 free(mp);
453 free(fs_name);
[594303b]454 free(opts);
[8dc72b64]455 return;
456 }
457
458 pr->fs_name = fs_name;
459 pr->mp = mp;
[594303b]460 pr->opts = opts;
[8dc72b64]461 pr->callid = callid;
462 pr->rid = rid;
463 pr->dev_handle = dev_handle;
[db90860]464 link_initialize(&pr->link);
[8dc72b64]465 list_append(&pr->link, &pending_req);
466 return;
467 }
468
469 ipc_answer_0(callid, ENOENT);
470 ipc_answer_0(rid, ENOENT);
471 free(mp);
472 free(fs_name);
[594303b]473 free(opts);
[8dc72b64]474 return;
475 }
476
477 /* Acknowledge that we know fs_name. */
478 ipc_answer_0(callid, EOK);
479
480 /* Do the mount */
[594303b]481 vfs_mount_internal(rid, dev_handle, fs_handle, mp, opts);
[8dc72b64]482 free(mp);
483 free(fs_name);
[594303b]484 free(opts);
[8dc72b64]485}
486
[861e7d1]487void vfs_open(ipc_callid_t rid, ipc_call_t *request)
488{
489 if (!vfs_files_init()) {
490 ipc_answer_0(rid, ENOMEM);
491 return;
492 }
[05b9912]493
[861e7d1]494 /*
[ae78b530]495 * The POSIX interface is open(path, oflag, mode).
496 * We can receive oflags and mode along with the VFS_OPEN call; the path
[861e7d1]497 * will need to arrive in another call.
[ae78b530]498 *
499 * We also receive one private, non-POSIX set of flags called lflag
500 * used to pass information to vfs_lookup_internal().
[861e7d1]501 */
[ae78b530]502 int lflag = IPC_GET_ARG1(*request);
503 int oflag = IPC_GET_ARG2(*request);
504 int mode = IPC_GET_ARG3(*request);
[861e7d1]505 size_t len;
[05b9912]506
[b17186d]507 /*
508 * Make sure that we are called with exactly one of L_FILE and
[05b9912]509 * L_DIRECTORY. Make sure that the user does not pass L_OPEN.
[b17186d]510 */
[05b9912]511 if (((lflag & (L_FILE | L_DIRECTORY)) == 0)
512 || ((lflag & (L_FILE | L_DIRECTORY)) == (L_FILE | L_DIRECTORY))
513 || ((lflag & L_OPEN) != 0)) {
[b17186d]514 ipc_answer_0(rid, EINVAL);
515 return;
516 }
[05b9912]517
[2db4ac8]518 if (oflag & O_CREAT)
519 lflag |= L_CREATE;
520 if (oflag & O_EXCL)
521 lflag |= L_EXCLUSIVE;
[05b9912]522
[861e7d1]523 ipc_callid_t callid;
524 if (!ipc_data_write_receive(&callid, &len)) {
525 ipc_answer_0(callid, EINVAL);
526 ipc_answer_0(rid, EINVAL);
527 return;
528 }
[05b9912]529
[d6084ef]530 char *path = malloc(len + 1);
[861e7d1]531 if (!path) {
532 ipc_answer_0(callid, ENOMEM);
533 ipc_answer_0(rid, ENOMEM);
534 return;
535 }
[05b9912]536
[861e7d1]537 int rc;
538 if ((rc = ipc_data_write_finalize(callid, path, len))) {
539 ipc_answer_0(rid, rc);
540 free(path);
541 return;
542 }
[d6084ef]543 path[len] = '\0';
[861e7d1]544
545 /*
546 * Avoid the race condition in which the file can be deleted before we
547 * find/create-and-lock the VFS node corresponding to the looked-up
548 * triplet.
549 */
[2db4ac8]550 if (lflag & L_CREATE)
551 rwlock_write_lock(&namespace_rwlock);
552 else
553 rwlock_read_lock(&namespace_rwlock);
[05b9912]554
[72bde81]555 /* The path is now populated and we can call vfs_lookup_internal(). */
[eb27ce5a]556 vfs_lookup_res_t lr;
[05b9912]557 rc = vfs_lookup_internal(path, lflag | L_OPEN, &lr, NULL);
558 if (rc != EOK) {
[2db4ac8]559 if (lflag & L_CREATE)
560 rwlock_write_unlock(&namespace_rwlock);
561 else
562 rwlock_read_unlock(&namespace_rwlock);
[861e7d1]563 ipc_answer_0(rid, rc);
564 free(path);
565 return;
566 }
[05b9912]567
[7fe1f75]568 /* Path is no longer needed. */
[861e7d1]569 free(path);
[05b9912]570
[eb27ce5a]571 vfs_node_t *node = vfs_node_get(&lr);
[2db4ac8]572 if (lflag & L_CREATE)
573 rwlock_write_unlock(&namespace_rwlock);
574 else
575 rwlock_read_unlock(&namespace_rwlock);
[05b9912]576
[7fe1f75]577 /* Truncate the file if requested and if necessary. */
578 if (oflag & O_TRUNC) {
[ee68e4bc]579 rwlock_write_lock(&node->contents_rwlock);
[7fe1f75]580 if (node->size) {
581 rc = vfs_truncate_internal(node->fs_handle,
582 node->dev_handle, node->index, 0);
583 if (rc) {
[ee68e4bc]584 rwlock_write_unlock(&node->contents_rwlock);
[7fe1f75]585 vfs_node_put(node);
586 ipc_answer_0(rid, rc);
587 return;
588 }
589 node->size = 0;
590 }
[ee68e4bc]591 rwlock_write_unlock(&node->contents_rwlock);
[7fe1f75]592 }
[05b9912]593
[861e7d1]594 /*
595 * Get ourselves a file descriptor and the corresponding vfs_file_t
596 * structure.
597 */
598 int fd = vfs_fd_alloc();
599 if (fd < 0) {
600 vfs_node_put(node);
601 ipc_answer_0(rid, fd);
602 return;
603 }
604 vfs_file_t *file = vfs_file_get(fd);
605 file->node = node;
[05b9912]606 if (oflag & O_APPEND)
[15b9970]607 file->append = true;
[05b9912]608
[861e7d1]609 /*
610 * The following increase in reference count is for the fact that the
611 * file is being opened and that a file structure is pointing to it.
612 * It is necessary so that the file will not disappear when
613 * vfs_node_put() is called. The reference will be dropped by the
614 * respective VFS_CLOSE.
615 */
616 vfs_node_addref(node);
617 vfs_node_put(node);
[05b9912]618
619 /* Success! Return the new file descriptor to the client. */
620 ipc_answer_1(rid, EOK, fd);
621}
[861e7d1]622
[05b9912]623void vfs_open_node(ipc_callid_t rid, ipc_call_t *request)
624{
625 // FIXME: check for sanity of the supplied fs, dev and index
626
627 if (!vfs_files_init()) {
628 ipc_answer_0(rid, ENOMEM);
629 return;
630 }
631
632 /*
633 * The interface is open_node(fs, dev, index, oflag).
634 */
635 vfs_lookup_res_t lr;
636
637 lr.triplet.fs_handle = IPC_GET_ARG1(*request);
638 lr.triplet.dev_handle = IPC_GET_ARG2(*request);
639 lr.triplet.index = IPC_GET_ARG3(*request);
640 int oflag = IPC_GET_ARG4(*request);
641
642 rwlock_read_lock(&namespace_rwlock);
643
644 int rc = vfs_open_node_internal(&lr);
645 if (rc != EOK) {
646 rwlock_read_unlock(&namespace_rwlock);
647 ipc_answer_0(rid, rc);
648 return;
649 }
650
651 vfs_node_t *node = vfs_node_get(&lr);
652 rwlock_read_unlock(&namespace_rwlock);
653
654 /* Truncate the file if requested and if necessary. */
655 if (oflag & O_TRUNC) {
656 rwlock_write_lock(&node->contents_rwlock);
657 if (node->size) {
658 rc = vfs_truncate_internal(node->fs_handle,
659 node->dev_handle, node->index, 0);
660 if (rc) {
661 rwlock_write_unlock(&node->contents_rwlock);
662 vfs_node_put(node);
663 ipc_answer_0(rid, rc);
664 return;
665 }
666 node->size = 0;
667 }
668 rwlock_write_unlock(&node->contents_rwlock);
669 }
670
671 /*
672 * Get ourselves a file descriptor and the corresponding vfs_file_t
673 * structure.
674 */
675 int fd = vfs_fd_alloc();
676 if (fd < 0) {
677 vfs_node_put(node);
678 ipc_answer_0(rid, fd);
679 return;
680 }
681 vfs_file_t *file = vfs_file_get(fd);
682 file->node = node;
683 if (oflag & O_APPEND)
684 file->append = true;
685
686 /*
687 * The following increase in reference count is for the fact that the
688 * file is being opened and that a file structure is pointing to it.
689 * It is necessary so that the file will not disappear when
690 * vfs_node_put() is called. The reference will be dropped by the
691 * respective VFS_CLOSE.
692 */
693 vfs_node_addref(node);
694 vfs_node_put(node);
695
[72bde81]696 /* Success! Return the new file descriptor to the client. */
[861e7d1]697 ipc_answer_1(rid, EOK, fd);
698}
699
[05b9912]700void vfs_node(ipc_callid_t rid, ipc_call_t *request)
[e704503]701{
702 int fd = IPC_GET_ARG1(*request);
[05b9912]703
704 /* Lookup the file structure corresponding to the file descriptor. */
705 vfs_file_t *file = vfs_file_get(fd);
706 if (!file) {
707 ipc_answer_0(rid, ENOENT);
708 return;
709 }
710
711 ipc_answer_3(rid, EOK, file->node->fs_handle,
712 file->node->dev_handle, file->node->index);
713}
714
715void vfs_device(ipc_callid_t rid, ipc_call_t *request)
716{
717 int fd = IPC_GET_ARG1(*request);
718
719 /* Lookup the file structure corresponding to the file descriptor. */
720 vfs_file_t *file = vfs_file_get(fd);
721 if (!file) {
722 ipc_answer_0(rid, ENOENT);
723 return;
724 }
725
726 /*
727 * Lock the open file structure so that no other thread can manipulate
728 * the same open file at a time.
729 */
730 futex_down(&file->lock);
731 int fs_phone = vfs_grab_phone(file->node->fs_handle);
732
733 /* Make a VFS_DEVICE request at the destination FS server. */
734 aid_t msg;
735 ipc_call_t answer;
736 msg = async_send_2(fs_phone, IPC_GET_METHOD(*request),
737 file->node->dev_handle, file->node->index, &answer);
738
739 /* Wait for reply from the FS server. */
740 ipcarg_t rc;
741 async_wait_for(msg, &rc);
742
743 vfs_release_phone(fs_phone);
744 futex_up(&file->lock);
745
746 ipc_answer_1(rid, EOK, IPC_GET_ARG1(answer));
747}
748
749void vfs_sync(ipc_callid_t rid, ipc_call_t *request)
750{
751 int fd = IPC_GET_ARG1(*request);
752
753 /* Lookup the file structure corresponding to the file descriptor. */
754 vfs_file_t *file = vfs_file_get(fd);
755 if (!file) {
756 ipc_answer_0(rid, ENOENT);
757 return;
758 }
759
760 /*
761 * Lock the open file structure so that no other thread can manipulate
762 * the same open file at a time.
763 */
764 futex_down(&file->lock);
765 int fs_phone = vfs_grab_phone(file->node->fs_handle);
766
767 /* Make a VFS_SYMC request at the destination FS server. */
768 aid_t msg;
769 ipc_call_t answer;
770 msg = async_send_2(fs_phone, IPC_GET_METHOD(*request),
771 file->node->dev_handle, file->node->index, &answer);
772
773 /* Wait for reply from the FS server. */
774 ipcarg_t rc;
775 async_wait_for(msg, &rc);
776
777 vfs_release_phone(fs_phone);
778 futex_up(&file->lock);
779
[b7f9087]780 ipc_answer_0(rid, rc);
[e704503]781}
782
[05b9912]783void vfs_close(ipc_callid_t rid, ipc_call_t *request)
784{
785 int fd = IPC_GET_ARG1(*request);
786
787 /* Lookup the file structure corresponding to the file descriptor. */
788 vfs_file_t *file = vfs_file_get(fd);
789 if (!file) {
790 ipc_answer_0(rid, ENOENT);
791 return;
792 }
793
794 /*
795 * Lock the open file structure so that no other thread can manipulate
796 * the same open file at a time.
797 */
798 futex_down(&file->lock);
799
800 int fs_phone = vfs_grab_phone(file->node->fs_handle);
801
802 /* Make a VFS_CLOSE request at the destination FS server. */
803 aid_t msg;
804 ipc_call_t answer;
805 msg = async_send_2(fs_phone, IPC_GET_METHOD(*request),
806 file->node->dev_handle, file->node->index, &answer);
807
808 /* Wait for reply from the FS server. */
809 ipcarg_t rc;
810 async_wait_for(msg, &rc);
811
812 vfs_release_phone(fs_phone);
813 futex_up(&file->lock);
814
815 int retval = IPC_GET_ARG1(answer);
816 if (retval != EOK)
817 ipc_answer_0(rid, retval);
818
819 retval = vfs_fd_free(fd);
820 ipc_answer_0(rid, retval);
821}
822
[861e7d1]823static void vfs_rdwr(ipc_callid_t rid, ipc_call_t *request, bool read)
824{
825
826 /*
827 * The following code strongly depends on the fact that the files data
828 * structure can be only accessed by a single fibril and all file
829 * operations are serialized (i.e. the reads and writes cannot
830 * interleave and a file cannot be closed while it is being read).
831 *
832 * Additional synchronization needs to be added once the table of
833 * open files supports parallel access!
834 */
835
836 int fd = IPC_GET_ARG1(*request);
[6c89f20]837
[72bde81]838 /* Lookup the file structure corresponding to the file descriptor. */
[861e7d1]839 vfs_file_t *file = vfs_file_get(fd);
840 if (!file) {
841 ipc_answer_0(rid, ENOENT);
842 return;
843 }
[6c89f20]844
[861e7d1]845 /*
846 * Now we need to receive a call with client's
847 * IPC_M_DATA_READ/IPC_M_DATA_WRITE request.
848 */
849 ipc_callid_t callid;
850 int res;
851 if (read)
852 res = ipc_data_read_receive(&callid, NULL);
853 else
854 res = ipc_data_write_receive(&callid, NULL);
855 if (!res) {
856 ipc_answer_0(callid, EINVAL);
857 ipc_answer_0(rid, EINVAL);
858 return;
859 }
[6c89f20]860
[861e7d1]861 /*
862 * Lock the open file structure so that no other thread can manipulate
863 * the same open file at a time.
864 */
865 futex_down(&file->lock);
[b17186d]866
[861e7d1]867 /*
868 * Lock the file's node so that no other client can read/write to it at
869 * the same time.
870 */
871 if (read)
872 rwlock_read_lock(&file->node->contents_rwlock);
873 else
874 rwlock_write_lock(&file->node->contents_rwlock);
[b17186d]875
876 if (file->node->type == VFS_NODE_DIRECTORY) {
877 /*
878 * Make sure that no one is modifying the namespace
879 * while we are in readdir().
880 */
881 assert(read);
882 rwlock_read_lock(&namespace_rwlock);
883 }
[6c89f20]884
[861e7d1]885 int fs_phone = vfs_grab_phone(file->node->fs_handle);
886
[72bde81]887 /* Make a VFS_READ/VFS_WRITE request at the destination FS server. */
[861e7d1]888 aid_t msg;
889 ipc_call_t answer;
[15b9970]890 if (!read && file->append)
891 file->pos = file->node->size;
[861e7d1]892 msg = async_send_3(fs_phone, IPC_GET_METHOD(*request),
893 file->node->dev_handle, file->node->index, file->pos, &answer);
894
895 /*
896 * Forward the IPC_M_DATA_READ/IPC_M_DATA_WRITE request to the
897 * destination FS server. The call will be routed as if sent by
898 * ourselves. Note that call arguments are immutable in this case so we
899 * don't have to bother.
900 */
901 ipc_forward_fast(callid, fs_phone, 0, 0, 0, IPC_FF_ROUTE_FROM_ME);
[6c89f20]902
[72bde81]903 /* Wait for reply from the FS server. */
[861e7d1]904 ipcarg_t rc;
905 async_wait_for(msg, &rc);
[05b9912]906
907 vfs_release_phone(fs_phone);
908
[861e7d1]909 size_t bytes = IPC_GET_ARG1(answer);
[b17186d]910
911 if (file->node->type == VFS_NODE_DIRECTORY)
912 rwlock_read_unlock(&namespace_rwlock);
[6c89f20]913
[72bde81]914 /* Unlock the VFS node. */
[861e7d1]915 if (read)
916 rwlock_read_unlock(&file->node->contents_rwlock);
917 else {
918 /* Update the cached version of node's size. */
[f7017572]919 if (rc == EOK)
920 file->node->size = IPC_GET_ARG2(answer);
[861e7d1]921 rwlock_write_unlock(&file->node->contents_rwlock);
922 }
[6c89f20]923
[72bde81]924 /* Update the position pointer and unlock the open file. */
[f7017572]925 if (rc == EOK)
926 file->pos += bytes;
[861e7d1]927 futex_up(&file->lock);
[6c89f20]928
[861e7d1]929 /*
930 * FS server's reply is the final result of the whole operation we
931 * return to the client.
932 */
933 ipc_answer_1(rid, rc, bytes);
934}
935
936void vfs_read(ipc_callid_t rid, ipc_call_t *request)
937{
938 vfs_rdwr(rid, request, true);
939}
940
941void vfs_write(ipc_callid_t rid, ipc_call_t *request)
942{
943 vfs_rdwr(rid, request, false);
944}
945
946void vfs_seek(ipc_callid_t rid, ipc_call_t *request)
947{
948 int fd = (int) IPC_GET_ARG1(*request);
949 off_t off = (off_t) IPC_GET_ARG2(*request);
950 int whence = (int) IPC_GET_ARG3(*request);
951
952
[72bde81]953 /* Lookup the file structure corresponding to the file descriptor. */
[861e7d1]954 vfs_file_t *file = vfs_file_get(fd);
955 if (!file) {
956 ipc_answer_0(rid, ENOENT);
957 return;
958 }
959
960 off_t newpos;
961 futex_down(&file->lock);
962 if (whence == SEEK_SET) {
963 file->pos = off;
964 futex_up(&file->lock);
965 ipc_answer_1(rid, EOK, off);
966 return;
967 }
968 if (whence == SEEK_CUR) {
969 if (file->pos + off < file->pos) {
970 futex_up(&file->lock);
971 ipc_answer_0(rid, EOVERFLOW);
972 return;
973 }
974 file->pos += off;
975 newpos = file->pos;
976 futex_up(&file->lock);
977 ipc_answer_1(rid, EOK, newpos);
978 return;
979 }
980 if (whence == SEEK_END) {
981 rwlock_read_lock(&file->node->contents_rwlock);
982 size_t size = file->node->size;
983 rwlock_read_unlock(&file->node->contents_rwlock);
984 if (size + off < size) {
985 futex_up(&file->lock);
986 ipc_answer_0(rid, EOVERFLOW);
987 return;
988 }
989 newpos = size + off;
990 futex_up(&file->lock);
991 ipc_answer_1(rid, EOK, newpos);
992 return;
993 }
994 futex_up(&file->lock);
995 ipc_answer_0(rid, EINVAL);
996}
997
[f2ec8c8]998int
999vfs_truncate_internal(fs_handle_t fs_handle, dev_handle_t dev_handle,
1000 fs_index_t index, size_t size)
[7fe1f75]1001{
1002 ipcarg_t rc;
1003 int fs_phone;
1004
1005 fs_phone = vfs_grab_phone(fs_handle);
1006 rc = async_req_3_0(fs_phone, VFS_TRUNCATE, (ipcarg_t)dev_handle,
1007 (ipcarg_t)index, (ipcarg_t)size);
1008 vfs_release_phone(fs_phone);
1009 return (int)rc;
1010}
1011
[0ee4322]1012void vfs_truncate(ipc_callid_t rid, ipc_call_t *request)
1013{
1014 int fd = IPC_GET_ARG1(*request);
1015 size_t size = IPC_GET_ARG2(*request);
[7fe1f75]1016 int rc;
[0ee4322]1017
1018 vfs_file_t *file = vfs_file_get(fd);
1019 if (!file) {
1020 ipc_answer_0(rid, ENOENT);
1021 return;
1022 }
1023 futex_down(&file->lock);
1024
1025 rwlock_write_lock(&file->node->contents_rwlock);
[7fe1f75]1026 rc = vfs_truncate_internal(file->node->fs_handle,
1027 file->node->dev_handle, file->node->index, size);
[0ee4322]1028 if (rc == EOK)
1029 file->node->size = size;
1030 rwlock_write_unlock(&file->node->contents_rwlock);
1031
1032 futex_up(&file->lock);
[7fe1f75]1033 ipc_answer_0(rid, (ipcarg_t)rc);
[861e7d1]1034}
1035
[72bde81]1036void vfs_mkdir(ipc_callid_t rid, ipc_call_t *request)
1037{
1038 int mode = IPC_GET_ARG1(*request);
1039
[f15cf1a6]1040 size_t len;
[72bde81]1041 ipc_callid_t callid;
1042
1043 if (!ipc_data_write_receive(&callid, &len)) {
1044 ipc_answer_0(callid, EINVAL);
1045 ipc_answer_0(rid, EINVAL);
1046 return;
1047 }
[d6084ef]1048 char *path = malloc(len + 1);
[72bde81]1049 if (!path) {
1050 ipc_answer_0(callid, ENOMEM);
1051 ipc_answer_0(rid, ENOMEM);
1052 return;
1053 }
1054 int rc;
1055 if ((rc = ipc_data_write_finalize(callid, path, len))) {
1056 ipc_answer_0(rid, rc);
1057 free(path);
1058 return;
1059 }
[d6084ef]1060 path[len] = '\0';
[72bde81]1061
1062 rwlock_write_lock(&namespace_rwlock);
1063 int lflag = L_DIRECTORY | L_CREATE | L_EXCLUSIVE;
[d6084ef]1064 rc = vfs_lookup_internal(path, lflag, NULL, NULL);
[72bde81]1065 rwlock_write_unlock(&namespace_rwlock);
1066 free(path);
1067 ipc_answer_0(rid, rc);
1068}
1069
[f15cf1a6]1070void vfs_unlink(ipc_callid_t rid, ipc_call_t *request)
1071{
1072 int lflag = IPC_GET_ARG1(*request);
1073
1074 size_t len;
1075 ipc_callid_t callid;
1076
1077 if (!ipc_data_write_receive(&callid, &len)) {
1078 ipc_answer_0(callid, EINVAL);
1079 ipc_answer_0(rid, EINVAL);
1080 return;
1081 }
[d6084ef]1082 char *path = malloc(len + 1);
[f15cf1a6]1083 if (!path) {
1084 ipc_answer_0(callid, ENOMEM);
1085 ipc_answer_0(rid, ENOMEM);
1086 return;
1087 }
1088 int rc;
1089 if ((rc = ipc_data_write_finalize(callid, path, len))) {
1090 ipc_answer_0(rid, rc);
1091 free(path);
1092 return;
1093 }
[d6084ef]1094 path[len] = '\0';
[f15cf1a6]1095
1096 rwlock_write_lock(&namespace_rwlock);
1097 lflag &= L_DIRECTORY; /* sanitize lflag */
1098 vfs_lookup_res_t lr;
[a8e9ab8d]1099 rc = vfs_lookup_internal(path, lflag | L_UNLINK, &lr, NULL);
[f15cf1a6]1100 free(path);
1101 if (rc != EOK) {
1102 rwlock_write_unlock(&namespace_rwlock);
1103 ipc_answer_0(rid, rc);
1104 return;
1105 }
1106
1107 /*
1108 * The name has already been unlinked by vfs_lookup_internal().
1109 * We have to get and put the VFS node to ensure that it is
[fdb7795]1110 * VFS_DESTROY'ed after the last reference to it is dropped.
[f15cf1a6]1111 */
1112 vfs_node_t *node = vfs_node_get(&lr);
[c31d773]1113 futex_down(&nodes_futex);
[f15cf1a6]1114 node->lnkcnt--;
[c31d773]1115 futex_up(&nodes_futex);
[f15cf1a6]1116 rwlock_write_unlock(&namespace_rwlock);
1117 vfs_node_put(node);
1118 ipc_answer_0(rid, EOK);
1119}
1120
[a8e9ab8d]1121void vfs_rename(ipc_callid_t rid, ipc_call_t *request)
1122{
[732bb0c]1123 size_t olen, nlen;
[a8e9ab8d]1124 ipc_callid_t callid;
1125 int rc;
1126
1127 /* Retrieve the old path. */
[732bb0c]1128 if (!ipc_data_write_receive(&callid, &olen)) {
[a8e9ab8d]1129 ipc_answer_0(callid, EINVAL);
1130 ipc_answer_0(rid, EINVAL);
1131 return;
1132 }
[732bb0c]1133 char *old = malloc(olen + 1);
[a8e9ab8d]1134 if (!old) {
1135 ipc_answer_0(callid, ENOMEM);
1136 ipc_answer_0(rid, ENOMEM);
1137 return;
1138 }
[732bb0c]1139 if ((rc = ipc_data_write_finalize(callid, old, olen))) {
[a8e9ab8d]1140 ipc_answer_0(rid, rc);
1141 free(old);
1142 return;
1143 }
[732bb0c]1144 old[olen] = '\0';
[a8e9ab8d]1145
1146 /* Retrieve the new path. */
[732bb0c]1147 if (!ipc_data_write_receive(&callid, &nlen)) {
[a8e9ab8d]1148 ipc_answer_0(callid, EINVAL);
1149 ipc_answer_0(rid, EINVAL);
1150 free(old);
1151 return;
1152 }
[732bb0c]1153 char *new = malloc(nlen + 1);
[a8e9ab8d]1154 if (!new) {
1155 ipc_answer_0(callid, ENOMEM);
1156 ipc_answer_0(rid, ENOMEM);
1157 free(old);
1158 return;
1159 }
[732bb0c]1160 if ((rc = ipc_data_write_finalize(callid, new, nlen))) {
[a8e9ab8d]1161 ipc_answer_0(rid, rc);
1162 free(old);
1163 free(new);
1164 return;
1165 }
[732bb0c]1166 new[nlen] = '\0';
[a8e9ab8d]1167
[732bb0c]1168 char *oldc = canonify(old, &olen);
1169 char *newc = canonify(new, &nlen);
[a8e9ab8d]1170 if (!oldc || !newc) {
1171 ipc_answer_0(rid, EINVAL);
1172 free(old);
1173 free(new);
1174 return;
1175 }
[732bb0c]1176 oldc[olen] = '\0';
1177 newc[nlen] = '\0';
[14040e5]1178 if ((!str_lcmp(newc, oldc, str_length(oldc))) &&
1179 ((newc[str_length(oldc)] == '/') ||
1180 (str_length(oldc) == 1) ||
1181 (str_length(oldc) == str_length(newc)))) {
1182 /*
1183 * oldc is a prefix of newc and either
1184 * - newc continues with a / where oldc ends, or
1185 * - oldc was / itself, or
1186 * - oldc and newc are equal.
1187 */
[a8e9ab8d]1188 ipc_answer_0(rid, EINVAL);
1189 free(old);
1190 free(new);
1191 return;
1192 }
1193
1194 vfs_lookup_res_t old_lr;
1195 vfs_lookup_res_t new_lr;
1196 vfs_lookup_res_t new_par_lr;
1197 rwlock_write_lock(&namespace_rwlock);
1198 /* Lookup the node belonging to the old file name. */
1199 rc = vfs_lookup_internal(oldc, L_NONE, &old_lr, NULL);
1200 if (rc != EOK) {
1201 rwlock_write_unlock(&namespace_rwlock);
1202 ipc_answer_0(rid, rc);
1203 free(old);
1204 free(new);
1205 return;
1206 }
1207 vfs_node_t *old_node = vfs_node_get(&old_lr);
1208 if (!old_node) {
1209 rwlock_write_unlock(&namespace_rwlock);
1210 ipc_answer_0(rid, ENOMEM);
1211 free(old);
1212 free(new);
1213 return;
1214 }
[4f46695e]1215 /* Determine the path to the parent of the node with the new name. */
1216 char *parentc = str_dup(newc);
1217 if (!parentc) {
1218 rwlock_write_unlock(&namespace_rwlock);
1219 ipc_answer_0(rid, rc);
1220 free(old);
1221 free(new);
1222 return;
1223 }
[ae55ee8]1224 char *lastsl = str_rchr(parentc + 1, '/');
[4f46695e]1225 if (lastsl)
1226 *lastsl = '\0';
1227 else
1228 parentc[1] = '\0';
[a8e9ab8d]1229 /* Lookup parent of the new file name. */
[4f46695e]1230 rc = vfs_lookup_internal(parentc, L_NONE, &new_par_lr, NULL);
1231 free(parentc); /* not needed anymore */
[a8e9ab8d]1232 if (rc != EOK) {
1233 rwlock_write_unlock(&namespace_rwlock);
1234 ipc_answer_0(rid, rc);
1235 free(old);
1236 free(new);
1237 return;
1238 }
1239 /* Check whether linking to the same file system instance. */
1240 if ((old_node->fs_handle != new_par_lr.triplet.fs_handle) ||
1241 (old_node->dev_handle != new_par_lr.triplet.dev_handle)) {
1242 rwlock_write_unlock(&namespace_rwlock);
1243 ipc_answer_0(rid, EXDEV); /* different file systems */
1244 free(old);
1245 free(new);
1246 return;
1247 }
1248 /* Destroy the old link for the new name. */
1249 vfs_node_t *new_node = NULL;
1250 rc = vfs_lookup_internal(newc, L_UNLINK, &new_lr, NULL);
1251 switch (rc) {
1252 case ENOENT:
1253 /* simply not in our way */
1254 break;
1255 case EOK:
1256 new_node = vfs_node_get(&new_lr);
1257 if (!new_node) {
1258 rwlock_write_unlock(&namespace_rwlock);
1259 ipc_answer_0(rid, ENOMEM);
1260 free(old);
1261 free(new);
1262 return;
1263 }
[c31d773]1264 futex_down(&nodes_futex);
[a8e9ab8d]1265 new_node->lnkcnt--;
[c31d773]1266 futex_up(&nodes_futex);
[a8e9ab8d]1267 break;
1268 default:
1269 rwlock_write_unlock(&namespace_rwlock);
1270 ipc_answer_0(rid, ENOTEMPTY);
1271 free(old);
1272 free(new);
1273 return;
1274 }
1275 /* Create the new link for the new name. */
1276 rc = vfs_lookup_internal(newc, L_LINK, NULL, NULL, old_node->index);
1277 if (rc != EOK) {
1278 rwlock_write_unlock(&namespace_rwlock);
1279 if (new_node)
1280 vfs_node_put(new_node);
1281 ipc_answer_0(rid, rc);
1282 free(old);
1283 free(new);
1284 return;
1285 }
[c31d773]1286 futex_down(&nodes_futex);
[a8e9ab8d]1287 old_node->lnkcnt++;
[c31d773]1288 futex_up(&nodes_futex);
[a8e9ab8d]1289 /* Destroy the link for the old name. */
1290 rc = vfs_lookup_internal(oldc, L_UNLINK, NULL, NULL);
1291 if (rc != EOK) {
1292 rwlock_write_unlock(&namespace_rwlock);
1293 vfs_node_put(old_node);
1294 if (new_node)
1295 vfs_node_put(new_node);
1296 ipc_answer_0(rid, rc);
1297 free(old);
1298 free(new);
1299 return;
1300 }
[c31d773]1301 futex_down(&nodes_futex);
[a8e9ab8d]1302 old_node->lnkcnt--;
[c31d773]1303 futex_up(&nodes_futex);
[a8e9ab8d]1304 rwlock_write_unlock(&namespace_rwlock);
1305 vfs_node_put(old_node);
1306 if (new_node)
1307 vfs_node_put(new_node);
1308 free(old);
1309 free(new);
1310 ipc_answer_0(rid, EOK);
1311}
1312
[861e7d1]1313/**
1314 * @}
[05b9912]1315 */
Note: See TracBrowser for help on using the repository browser.