source: mainline/uspace/srv/vfs/vfs_ops.c@ cb65bbe

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since cb65bbe was cb65bbe, checked in by Ji?? Z?rev?cky <zarevucky.jiri@…>, 12 years ago

Implement server side of VFS_WALK and VFS_OPEN2.

  • Property mode set to 100644
File size: 38.2 KB
RevLine 
[861e7d1]1/*
2 * Copyright (c) 2008 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup fs
30 * @{
[8dc72b64]31 */
[861e7d1]32
33/**
[8dc72b64]34 * @file vfs_ops.c
35 * @brief Operations that VFS offers to its clients.
[861e7d1]36 */
37
[a8e9ab8d]38#include "vfs.h"
[ed903174]39#include <macros.h>
[9539be6]40#include <stdint.h>
[861e7d1]41#include <async.h>
42#include <errno.h>
43#include <stdio.h>
44#include <stdlib.h>
[19f857a]45#include <str.h>
[3e6a98c5]46#include <stdbool.h>
[1e4cada]47#include <fibril_synch.h>
[d9c8c81]48#include <adt/list.h>
[861e7d1]49#include <unistd.h>
50#include <ctype.h>
[2db4ac8]51#include <fcntl.h>
[861e7d1]52#include <assert.h>
[a8e9ab8d]53#include <vfs/canonify.h>
[10e4cd7]54#include <vfs/vfs_mtab.h>
55
56FIBRIL_MUTEX_INITIALIZE(mtab_list_lock);
57LIST_INITIALIZE(mtab_list);
58static size_t mtab_size = 0;
[861e7d1]59
[7fe1f75]60/* Forward declarations of static functions. */
[15f3c3f]61static int vfs_truncate_internal(fs_handle_t, service_id_t, fs_index_t,
[8df8415]62 aoff64_t);
[7fe1f75]63
[861e7d1]64/**
65 * This rwlock prevents the race between a triplet-to-VFS-node resolution and a
66 * concurrent VFS operation which modifies the file system namespace.
67 */
[230260ac]68FIBRIL_RWLOCK_INITIALIZE(namespace_rwlock);
[861e7d1]69
[f49b0ea]70vfs_pair_t rootfs = {
[861e7d1]71 .fs_handle = 0,
[15f3c3f]72 .service_id = 0
[861e7d1]73};
74
[6f9ef87a]75static int vfs_mount_internal(ipc_callid_t rid, service_id_t service_id,
[594303b]76 fs_handle_t fs_handle, char *mp, char *opts)
[861e7d1]77{
[8dc72b64]78 vfs_lookup_res_t mp_res;
[83937ccd]79 vfs_lookup_res_t mr_res;
[861e7d1]80 vfs_node_t *mp_node = NULL;
[83937ccd]81 vfs_node_t *mr_node;
82 fs_index_t rindex;
[7eb0fed8]83 aoff64_t rsize;
[83937ccd]84 unsigned rlnkcnt;
[79ae36dd]85 async_exch_t *exch;
[96b02eb9]86 sysarg_t rc;
[594303b]87 aid_t msg;
88 ipc_call_t answer;
[05b9912]89
[594303b]90 /* Resolve the path to the mountpoint. */
[230260ac]91 fibril_rwlock_write_lock(&namespace_rwlock);
[861e7d1]92 if (rootfs.fs_handle) {
[72bde81]93 /* We already have the root FS. */
[92fd52d7]94 if (str_cmp(mp, "/") == 0) {
[2f60a529]95 /* Trying to mount root FS over root FS */
[230260ac]96 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]97 async_answer_0(rid, EBUSY);
[6f9ef87a]98 return EBUSY;
[2f60a529]99 }
[8dc72b64]100
[ea44bd1]101 rc = vfs_lookup_internal(mp, L_MP, &mp_res, NULL);
[861e7d1]102 if (rc != EOK) {
[72bde81]103 /* The lookup failed for some reason. */
[230260ac]104 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]105 async_answer_0(rid, rc);
[6f9ef87a]106 return rc;
[861e7d1]107 }
[8dc72b64]108
[eb27ce5a]109 mp_node = vfs_node_get(&mp_res);
[861e7d1]110 if (!mp_node) {
[230260ac]111 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]112 async_answer_0(rid, ENOMEM);
[6f9ef87a]113 return ENOMEM;
[861e7d1]114 }
[8dc72b64]115
[861e7d1]116 /*
117 * Now we hold a reference to mp_node.
[4198f9c3]118 * It will be dropped upon the corresponding VFS_IN_UNMOUNT.
[861e7d1]119 * This prevents the mount point from being deleted.
120 */
121 } else {
[72bde81]122 /* We still don't have the root file system mounted. */
[92fd52d7]123 if (str_cmp(mp, "/") == 0) {
[64b67c3]124 /*
125 * For this simple, but important case,
126 * we are almost done.
127 */
128
[f49b0ea]129 /* Tell the mountee that it is being mounted. */
[79ae36dd]130 exch = vfs_exchange_grab(fs_handle);
131 msg = async_send_1(exch, VFS_OUT_MOUNTED,
[15f3c3f]132 (sysarg_t) service_id, &answer);
[79ae36dd]133 /* Send the mount options */
134 rc = async_data_write_start(exch, (void *)opts,
[594303b]135 str_size(opts));
[79ae36dd]136 vfs_exchange_release(exch);
137
[594303b]138 if (rc != EOK) {
[50b581d]139 async_forget(msg);
[230260ac]140 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]141 async_answer_0(rid, rc);
[6f9ef87a]142 return rc;
[594303b]143 }
[230260ac]144 async_wait_for(msg, &rc);
[5ab597d]145
146 if (rc != EOK) {
[230260ac]147 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]148 async_answer_0(rid, rc);
[6f9ef87a]149 return rc;
[f49b0ea]150 }
[594303b]151
152 rindex = (fs_index_t) IPC_GET_ARG1(answer);
[286286c]153 rsize = (aoff64_t) MERGE_LOUP32(IPC_GET_ARG2(answer),
154 IPC_GET_ARG3(answer));
[7eb0fed8]155 rlnkcnt = (unsigned) IPC_GET_ARG4(answer);
[8dc72b64]156
[5ab597d]157 mr_res.triplet.fs_handle = fs_handle;
[15f3c3f]158 mr_res.triplet.service_id = service_id;
[594303b]159 mr_res.triplet.index = rindex;
160 mr_res.size = rsize;
161 mr_res.lnkcnt = rlnkcnt;
[b17186d]162 mr_res.type = VFS_NODE_DIRECTORY;
[8dc72b64]163
[5ab597d]164 rootfs.fs_handle = fs_handle;
[15f3c3f]165 rootfs.service_id = service_id;
[8dc72b64]166
[5ab597d]167 /* Add reference to the mounted root. */
168 mr_node = vfs_node_get(&mr_res);
169 assert(mr_node);
[8dc72b64]170
[230260ac]171 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]172 async_answer_0(rid, rc);
[6f9ef87a]173 return rc;
[861e7d1]174 } else {
175 /*
176 * We can't resolve this without the root filesystem
177 * being mounted first.
178 */
[230260ac]179 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]180 async_answer_0(rid, ENOENT);
[6f9ef87a]181 return ENOENT;
[861e7d1]182 }
183 }
184
185 /*
[15f3c3f]186 * At this point, we have all necessary pieces: file system handle
187 * and service ID, and we know the mount point VFS node.
[861e7d1]188 */
[8dc72b64]189
[79ae36dd]190 async_exch_t *mountee_exch = vfs_exchange_grab(fs_handle);
191 assert(mountee_exch);
192
193 exch = vfs_exchange_grab(mp_res.triplet.fs_handle);
194 msg = async_send_4(exch, VFS_OUT_MOUNT,
[15f3c3f]195 (sysarg_t) mp_res.triplet.service_id,
[96b02eb9]196 (sysarg_t) mp_res.triplet.index,
197 (sysarg_t) fs_handle,
[15f3c3f]198 (sysarg_t) service_id, &answer);
[83937ccd]199
[79ae36dd]200 /* Send connection */
201 rc = async_exchange_clone(exch, mountee_exch);
202 vfs_exchange_release(mountee_exch);
203
[83937ccd]204 if (rc != EOK) {
[79ae36dd]205 vfs_exchange_release(exch);
[50b581d]206 async_forget(msg);
[79ae36dd]207
[83937ccd]208 /* Mount failed, drop reference to mp_node. */
209 if (mp_node)
210 vfs_node_put(mp_node);
[79ae36dd]211
[ffa2c8ef]212 async_answer_0(rid, rc);
[230260ac]213 fibril_rwlock_write_unlock(&namespace_rwlock);
[6f9ef87a]214 return rc;
[83937ccd]215 }
216
[594303b]217 /* send the mount options */
[79ae36dd]218 rc = async_data_write_start(exch, (void *) opts, str_size(opts));
[594303b]219 if (rc != EOK) {
[79ae36dd]220 vfs_exchange_release(exch);
[50b581d]221 async_forget(msg);
[79ae36dd]222
[594303b]223 /* Mount failed, drop reference to mp_node. */
224 if (mp_node)
225 vfs_node_put(mp_node);
[79ae36dd]226
[230260ac]227 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]228 async_answer_0(rid, rc);
[6f9ef87a]229 return rc;
[594303b]230 }
[79ae36dd]231
[c69646f8]232 /*
233 * Wait for the answer before releasing the exchange to avoid deadlock
234 * in case the answer depends on further calls to the same file system.
235 * Think of a case when mounting a FS on a file_bd backed by a file on
236 * the same FS.
237 */
[230260ac]238 async_wait_for(msg, &rc);
[c69646f8]239 vfs_exchange_release(exch);
[8dc72b64]240
[493853ec]241 if (rc == EOK) {
242 rindex = (fs_index_t) IPC_GET_ARG1(answer);
[7eb0fed8]243 rsize = (aoff64_t) MERGE_LOUP32(IPC_GET_ARG2(answer),
244 IPC_GET_ARG3(answer));
245 rlnkcnt = (unsigned) IPC_GET_ARG4(answer);
[79ae36dd]246
[493853ec]247 mr_res.triplet.fs_handle = fs_handle;
[15f3c3f]248 mr_res.triplet.service_id = service_id;
[493853ec]249 mr_res.triplet.index = rindex;
250 mr_res.size = rsize;
251 mr_res.lnkcnt = rlnkcnt;
252 mr_res.type = VFS_NODE_DIRECTORY;
[79ae36dd]253
[493853ec]254 /* Add reference to the mounted root. */
255 mr_node = vfs_node_get(&mr_res);
256 assert(mr_node);
257 } else {
[f49b0ea]258 /* Mount failed, drop reference to mp_node. */
[861e7d1]259 if (mp_node)
260 vfs_node_put(mp_node);
261 }
[79ae36dd]262
[ffa2c8ef]263 async_answer_0(rid, rc);
[230260ac]264 fibril_rwlock_write_unlock(&namespace_rwlock);
[6f9ef87a]265 return rc;
[861e7d1]266}
267
[8dc72b64]268void vfs_mount(ipc_callid_t rid, ipc_call_t *request)
269{
[15f3c3f]270 service_id_t service_id;
[8df8415]271
[8dc72b64]272 /*
273 * We expect the library to do the device-name to device-handle
274 * translation for us, thus the device handle will arrive as ARG1
275 * in the request.
276 */
[15f3c3f]277 service_id = (service_id_t) IPC_GET_ARG1(*request);
[8dc72b64]278
279 /*
280 * Mount flags are passed as ARG2.
281 */
282 unsigned int flags = (unsigned int) IPC_GET_ARG2(*request);
283
[4979403]284 /*
285 * Instance number is passed as ARG3.
286 */
287 unsigned int instance = IPC_GET_ARG3(*request);
288
[8dc72b64]289 /* We want the client to send us the mount point. */
[472c09d]290 char *mp;
[4cac2d69]291 int rc = async_data_write_accept((void **) &mp, true, 0, MAX_PATH_LEN,
[eda925a]292 0, NULL);
[472c09d]293 if (rc != EOK) {
[ffa2c8ef]294 async_answer_0(rid, rc);
[8dc72b64]295 return;
296 }
297
[594303b]298 /* Now we expect to receive the mount options. */
[472c09d]299 char *opts;
[4cac2d69]300 rc = async_data_write_accept((void **) &opts, true, 0, MAX_MNTOPTS_LEN,
[eda925a]301 0, NULL);
[472c09d]302 if (rc != EOK) {
[594303b]303 free(mp);
[ffa2c8ef]304 async_answer_0(rid, rc);
[594303b]305 return;
306 }
307
[8dc72b64]308 /*
309 * Now, we expect the client to send us data with the name of the file
310 * system.
311 */
[472c09d]312 char *fs_name;
[8df8415]313 rc = async_data_write_accept((void **) &fs_name, true, 0,
314 FS_NAME_MAXLEN, 0, NULL);
[472c09d]315 if (rc != EOK) {
[8dc72b64]316 free(mp);
[594303b]317 free(opts);
[ffa2c8ef]318 async_answer_0(rid, rc);
[8dc72b64]319 return;
320 }
321
[c08c355]322 /*
[79ae36dd]323 * Wait for VFS_IN_PING so that we can return an error if we don't know
[c08c355]324 * fs_name.
325 */
326 ipc_call_t data;
[472c09d]327 ipc_callid_t callid = async_get_call(&data);
[79ae36dd]328 if (IPC_GET_IMETHOD(data) != VFS_IN_PING) {
[ffa2c8ef]329 async_answer_0(callid, ENOTSUP);
330 async_answer_0(rid, ENOTSUP);
[c08c355]331 free(mp);
[594303b]332 free(opts);
[c08c355]333 free(fs_name);
334 return;
335 }
336
[8dc72b64]337 /*
338 * Check if we know a file system with the same name as is in fs_name.
339 * This will also give us its file system handle.
340 */
[b72efe8]341 fibril_mutex_lock(&fs_list_lock);
[7b47fa2]342 fs_handle_t fs_handle;
343recheck:
[4979403]344 fs_handle = fs_name_to_handle(instance, fs_name, false);
[8dc72b64]345 if (!fs_handle) {
346 if (flags & IPC_FLAG_BLOCKING) {
[b72efe8]347 fibril_condvar_wait(&fs_list_cv, &fs_list_lock);
[7b47fa2]348 goto recheck;
[8dc72b64]349 }
350
[b72efe8]351 fibril_mutex_unlock(&fs_list_lock);
[ffa2c8ef]352 async_answer_0(callid, ENOENT);
353 async_answer_0(rid, ENOENT);
[8dc72b64]354 free(mp);
355 free(fs_name);
[594303b]356 free(opts);
[8dc72b64]357 return;
358 }
[b72efe8]359 fibril_mutex_unlock(&fs_list_lock);
[6f9ef87a]360
[460514d]361 /* Add the filesystem info to the list of mounted filesystems */
362 mtab_ent_t *mtab_ent = malloc(sizeof(mtab_ent_t));
363 if (!mtab_ent) {
364 async_answer_0(callid, ENOMEM);
365 async_answer_0(rid, ENOMEM);
366 free(mp);
367 free(fs_name);
368 free(opts);
369 return;
370 }
371
[6f9ef87a]372 /* Do the mount */
373 rc = vfs_mount_internal(rid, service_id, fs_handle, mp, opts);
374 if (rc != EOK) {
375 async_answer_0(callid, ENOTSUP);
376 async_answer_0(rid, ENOTSUP);
[460514d]377 free(mtab_ent);
[6f9ef87a]378 free(mp);
379 free(opts);
380 free(fs_name);
381 return;
382 }
383
[10e4cd7]384 /* Add the filesystem info to the list of mounted filesystems */
385
386 str_cpy(mtab_ent->mp, MAX_PATH_LEN, mp);
387 str_cpy(mtab_ent->fs_name, FS_NAME_MAXLEN, fs_name);
388 str_cpy(mtab_ent->opts, MAX_MNTOPTS_LEN, opts);
389 mtab_ent->instance = instance;
[6b8e5b74]390 mtab_ent->service_id = service_id;
[10e4cd7]391
[8d6a41c]392 link_initialize(&mtab_ent->link);
[10e4cd7]393
394 fibril_mutex_lock(&mtab_list_lock);
[8d6a41c]395 list_append(&mtab_ent->link, &mtab_list);
[10e4cd7]396 mtab_size++;
397 fibril_mutex_unlock(&mtab_list_lock);
398
[daf8ff2]399 free(mp);
400 free(fs_name);
401 free(opts);
402
[10e4cd7]403 /* Acknowledge that we know fs_name. */
404 async_answer_0(callid, EOK);
[8dc72b64]405}
406
[7f5e070]407void vfs_unmount(ipc_callid_t rid, ipc_call_t *request)
408{
[ae75e2e3]409 int rc;
410 char *mp;
411 vfs_lookup_res_t mp_res;
412 vfs_lookup_res_t mr_res;
413 vfs_node_t *mr_node;
[79ae36dd]414 async_exch_t *exch;
415
[ae75e2e3]416 /*
417 * Receive the mount point path.
418 */
[4cac2d69]419 rc = async_data_write_accept((void **) &mp, true, 0, MAX_PATH_LEN,
[eda925a]420 0, NULL);
[ae75e2e3]421 if (rc != EOK)
[ffa2c8ef]422 async_answer_0(rid, rc);
[79ae36dd]423
[ae75e2e3]424 /*
425 * Taking the namespace lock will do two things for us. First, it will
426 * prevent races with other lookup operations. Second, it will stop new
427 * references to already existing VFS nodes and creation of new VFS
428 * nodes. This is because new references are added as a result of some
429 * lookup operation or at least of some operation which is protected by
430 * the namespace lock.
431 */
432 fibril_rwlock_write_lock(&namespace_rwlock);
433
434 /*
435 * Lookup the mounted root and instantiate it.
436 */
[f7376cbf]437 rc = vfs_lookup_internal(mp, L_ROOT, &mr_res, NULL);
[ae75e2e3]438 if (rc != EOK) {
439 fibril_rwlock_write_unlock(&namespace_rwlock);
440 free(mp);
[ffa2c8ef]441 async_answer_0(rid, rc);
[ae75e2e3]442 return;
443 }
444 mr_node = vfs_node_get(&mr_res);
445 if (!mr_node) {
446 fibril_rwlock_write_unlock(&namespace_rwlock);
447 free(mp);
[ffa2c8ef]448 async_answer_0(rid, ENOMEM);
[ae75e2e3]449 return;
450 }
[79ae36dd]451
[ae75e2e3]452 /*
453 * Count the total number of references for the mounted file system. We
454 * are expecting at least two. One which we got above and one which we
455 * got when the file system was mounted. If we find more, it means that
456 * the file system cannot be gracefully unmounted at the moment because
457 * someone is working with it.
458 */
459 if (vfs_nodes_refcount_sum_get(mr_node->fs_handle,
[15f3c3f]460 mr_node->service_id) != 2) {
[ae75e2e3]461 fibril_rwlock_write_unlock(&namespace_rwlock);
462 vfs_node_put(mr_node);
463 free(mp);
[ffa2c8ef]464 async_answer_0(rid, EBUSY);
[ae75e2e3]465 return;
466 }
[79ae36dd]467
[ae75e2e3]468 if (str_cmp(mp, "/") == 0) {
[79ae36dd]469
[ae75e2e3]470 /*
471 * Unmounting the root file system.
472 *
473 * In this case, there is no mount point node and we send
474 * VFS_OUT_UNMOUNTED directly to the mounted file system.
475 */
[79ae36dd]476
477 exch = vfs_exchange_grab(mr_node->fs_handle);
478 rc = async_req_1_0(exch, VFS_OUT_UNMOUNTED,
[15f3c3f]479 mr_node->service_id);
[79ae36dd]480 vfs_exchange_release(exch);
481
[ae75e2e3]482 if (rc != EOK) {
483 fibril_rwlock_write_unlock(&namespace_rwlock);
[76a67ce]484 free(mp);
[ae75e2e3]485 vfs_node_put(mr_node);
[ffa2c8ef]486 async_answer_0(rid, rc);
[ae75e2e3]487 return;
488 }
[79ae36dd]489
[ae75e2e3]490 rootfs.fs_handle = 0;
[15f3c3f]491 rootfs.service_id = 0;
[ae75e2e3]492 } else {
[79ae36dd]493
[ae75e2e3]494 /*
495 * Unmounting a non-root file system.
496 *
497 * We have a regular mount point node representing the parent
498 * file system, so we delegate the operation to it.
499 */
[79ae36dd]500
[f7376cbf]501 rc = vfs_lookup_internal(mp, L_MP, &mp_res, NULL);
[ae75e2e3]502 if (rc != EOK) {
503 fibril_rwlock_write_unlock(&namespace_rwlock);
[76a67ce]504 free(mp);
[ae75e2e3]505 vfs_node_put(mr_node);
[ffa2c8ef]506 async_answer_0(rid, rc);
[ae75e2e3]507 return;
508 }
[79ae36dd]509
[ae75e2e3]510 vfs_node_t *mp_node = vfs_node_get(&mp_res);
511 if (!mp_node) {
512 fibril_rwlock_write_unlock(&namespace_rwlock);
[76a67ce]513 free(mp);
[ae75e2e3]514 vfs_node_put(mr_node);
[ffa2c8ef]515 async_answer_0(rid, ENOMEM);
[ae75e2e3]516 return;
517 }
[79ae36dd]518
519 exch = vfs_exchange_grab(mp_node->fs_handle);
520 rc = async_req_2_0(exch, VFS_OUT_UNMOUNT,
[15f3c3f]521 mp_node->service_id, mp_node->index);
[79ae36dd]522 vfs_exchange_release(exch);
523
[ae75e2e3]524 if (rc != EOK) {
525 fibril_rwlock_write_unlock(&namespace_rwlock);
[76a67ce]526 free(mp);
[ae75e2e3]527 vfs_node_put(mp_node);
528 vfs_node_put(mr_node);
[ffa2c8ef]529 async_answer_0(rid, rc);
[ae75e2e3]530 return;
531 }
[79ae36dd]532
[ae75e2e3]533 /* Drop the reference we got above. */
534 vfs_node_put(mp_node);
535 /* Drop the reference from when the file system was mounted. */
536 vfs_node_put(mp_node);
537 }
[79ae36dd]538
[ae75e2e3]539 /*
540 * All went well, the mounted file system was successfully unmounted.
541 * The only thing left is to forget the unmounted root VFS node.
542 */
543 vfs_node_forget(mr_node);
544 fibril_rwlock_write_unlock(&namespace_rwlock);
[76a67ce]545
546 fibril_mutex_lock(&mtab_list_lock);
547
548 int found = 0;
549
550 list_foreach(mtab_list, cur) {
[8d6a41c]551 mtab_ent_t *mtab_ent = list_get_instance(cur, mtab_ent_t,
[76a67ce]552 link);
553
554 if (str_cmp(mtab_ent->mp, mp) == 0) {
[8d6a41c]555 list_remove(&mtab_ent->link);
[76a67ce]556 mtab_size--;
[8d6a41c]557 free(mtab_ent);
[76a67ce]558 found = 1;
559 break;
560 }
561 }
562 assert(found);
[4af2f36]563 fibril_mutex_unlock(&mtab_list_lock);
[76a67ce]564
565 free(mp);
566
[ffa2c8ef]567 async_answer_0(rid, EOK);
[7f5e070]568}
569
[cb65bbe]570void vfs_walk(ipc_callid_t rid, ipc_call_t *request)
571{
572 /*
573 * Parent is our relative root for file lookup.
574 * For defined flags, see <ipc/vfs.h>.
575 */
576 int parentfd = IPC_GET_ARG1(*request);
577 int flags = IPC_GET_ARG2(*request);
578
579 if ((flags&~WALK_ALL_FLAGS) != 0) {
580 /* Invalid flags. */
581 async_answer_0(rid, EINVAL);
582 return;
583 }
584
585 char *path;
586 int rc = async_data_write_accept((void **)&path, true, 0, 0, 0, NULL);
587
588 /* Lookup the file structure corresponding to the file descriptor. */
589 vfs_file_t *parent = NULL;
590 vfs_pair_t *parent_node = NULL;
591 // TODO: Client-side root.
592 if (parentfd != -1) {
593 parent = vfs_file_get(parentfd);
594 if (!parent) {
595 free(path);
596 async_answer_0(rid, EBADF);
597 return;
598 }
599 parent_node = (vfs_pair_t *)parent->node;
600 }
601
602 fibril_rwlock_read_lock(&namespace_rwlock);
603
604 vfs_lookup_res_t lr;
605 rc = vfs_lookup_internal(path, 0, &lr, parent_node);
606 free(path);
607
608 if (rc != EOK) {
609 fibril_rwlock_read_unlock(&namespace_rwlock);
610 if (parent) {
611 vfs_file_put(parent);
612 }
613 async_answer_0(rid, rc);
614 return;
615 }
616
617 vfs_node_t *node = vfs_node_get(&lr);
618
619 int fd = vfs_fd_alloc(false);
620 if (fd < 0) {
621 vfs_node_put(node);
622 if (parent) {
623 vfs_file_put(parent);
624 }
625 async_answer_0(rid, fd);
626 return;
627 }
628
629 vfs_file_t *file = vfs_file_get(fd);
630 assert(file != NULL);
631
632 file->node = node;
633 if (parent) {
634 file->permissions = parent->permissions;
635 } else {
636 file->permissions = MODE_READ | MODE_WRITE | MODE_APPEND;
637 }
638 file->open_read = false;
639 file->open_write = false;
640
641 vfs_node_addref(node);
642 vfs_node_put(node);
643 vfs_file_put(file);
644 if (parent) {
645 vfs_file_put(parent);
646 }
647
648 fibril_rwlock_read_unlock(&namespace_rwlock);
649
650 async_answer_1(rid, EOK, fd);
651}
652
653void vfs_open2(ipc_callid_t rid, ipc_call_t *request)
654{
655 int fd = IPC_GET_ARG1(*request);
656 int flags = IPC_GET_ARG2(*request);
657
658 if (flags == 0) {
659 async_answer_0(rid, EINVAL);
660 return;
661 }
662
663 vfs_file_t *file = vfs_file_get(fd);
664 if (!file) {
665 async_answer_0(rid, EBADF);
666 return;
667 }
668
669 if ((flags & ~file->permissions) != 0) {
670 vfs_file_put(file);
671 async_answer_0(rid, EPERM);
672 return;
673 }
674
675 file->open_read = (flags & MODE_READ) != 0;
676 file->open_write = (flags & (MODE_WRITE | MODE_APPEND)) != 0;
677 file->append = (flags & MODE_APPEND) != 0;
678
679 if (!file->open_read && !file->open_write) {
680 vfs_file_put(file);
681 async_answer_0(rid, EINVAL);
682 return;
683 }
684
685 if (file->node->type == VFS_NODE_DIRECTORY && file->open_write) {
686 file->open_read = file->open_write = false;
687 vfs_file_put(file);
688 async_answer_0(rid, EINVAL);
689 return;
690 }
691
692 int rc = vfs_open_node_remote(file->node);
693 if (rc != EOK) {
694 file->open_read = file->open_write = false;
695 vfs_file_put(file);
696 async_answer_0(rid, rc);
697 return;
698 }
699
700 vfs_file_put(file);
701 async_answer_0(rid, EOK);
702}
703
[861e7d1]704void vfs_open(ipc_callid_t rid, ipc_call_t *request)
705{
706 /*
[ae78b530]707 * The POSIX interface is open(path, oflag, mode).
[4198f9c3]708 * We can receive oflags and mode along with the VFS_IN_OPEN call;
709 * the path will need to arrive in another call.
[ae78b530]710 *
711 * We also receive one private, non-POSIX set of flags called lflag
712 * used to pass information to vfs_lookup_internal().
[861e7d1]713 */
[ae78b530]714 int lflag = IPC_GET_ARG1(*request);
715 int oflag = IPC_GET_ARG2(*request);
716 int mode = IPC_GET_ARG3(*request);
[dd2cfa7]717
718 /* Ignore mode for now. */
719 (void) mode;
[05b9912]720
[b17186d]721 /*
722 * Make sure that we are called with exactly one of L_FILE and
[f7376cbf]723 * L_DIRECTORY. Make sure that the user does not pass L_OPEN,
724 * L_ROOT or L_MP.
[b17186d]725 */
[230260ac]726 if (((lflag & (L_FILE | L_DIRECTORY)) == 0) ||
727 ((lflag & (L_FILE | L_DIRECTORY)) == (L_FILE | L_DIRECTORY)) ||
[f7376cbf]728 (lflag & (L_OPEN | L_ROOT | L_MP))) {
[ffa2c8ef]729 async_answer_0(rid, EINVAL);
[b17186d]730 return;
731 }
[05b9912]732
[2db4ac8]733 if (oflag & O_CREAT)
734 lflag |= L_CREATE;
735 if (oflag & O_EXCL)
736 lflag |= L_EXCLUSIVE;
[05b9912]737
[472c09d]738 char *path;
[4cac2d69]739 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]740 if (rc != EOK) {
[ffa2c8ef]741 async_answer_0(rid, rc);
[861e7d1]742 return;
743 }
744
745 /*
746 * Avoid the race condition in which the file can be deleted before we
747 * find/create-and-lock the VFS node corresponding to the looked-up
748 * triplet.
749 */
[2db4ac8]750 if (lflag & L_CREATE)
[230260ac]751 fibril_rwlock_write_lock(&namespace_rwlock);
[2db4ac8]752 else
[230260ac]753 fibril_rwlock_read_lock(&namespace_rwlock);
[05b9912]754
[72bde81]755 /* The path is now populated and we can call vfs_lookup_internal(). */
[eb27ce5a]756 vfs_lookup_res_t lr;
[05b9912]757 rc = vfs_lookup_internal(path, lflag | L_OPEN, &lr, NULL);
758 if (rc != EOK) {
[2db4ac8]759 if (lflag & L_CREATE)
[230260ac]760 fibril_rwlock_write_unlock(&namespace_rwlock);
[2db4ac8]761 else
[230260ac]762 fibril_rwlock_read_unlock(&namespace_rwlock);
[ffa2c8ef]763 async_answer_0(rid, rc);
[861e7d1]764 free(path);
765 return;
766 }
[05b9912]767
[7fe1f75]768 /* Path is no longer needed. */
[861e7d1]769 free(path);
[05b9912]770
[eb27ce5a]771 vfs_node_t *node = vfs_node_get(&lr);
[2db4ac8]772 if (lflag & L_CREATE)
[230260ac]773 fibril_rwlock_write_unlock(&namespace_rwlock);
[2db4ac8]774 else
[230260ac]775 fibril_rwlock_read_unlock(&namespace_rwlock);
[05b9912]776
[7fe1f75]777 /* Truncate the file if requested and if necessary. */
778 if (oflag & O_TRUNC) {
[230260ac]779 fibril_rwlock_write_lock(&node->contents_rwlock);
[7fe1f75]780 if (node->size) {
781 rc = vfs_truncate_internal(node->fs_handle,
[15f3c3f]782 node->service_id, node->index, 0);
[7fe1f75]783 if (rc) {
[230260ac]784 fibril_rwlock_write_unlock(&node->contents_rwlock);
[7fe1f75]785 vfs_node_put(node);
[ffa2c8ef]786 async_answer_0(rid, rc);
[7fe1f75]787 return;
788 }
789 node->size = 0;
790 }
[230260ac]791 fibril_rwlock_write_unlock(&node->contents_rwlock);
[7fe1f75]792 }
[05b9912]793
[861e7d1]794 /*
795 * Get ourselves a file descriptor and the corresponding vfs_file_t
796 * structure.
797 */
[2b88074b]798 int fd = vfs_fd_alloc((oflag & O_DESC) != 0);
[861e7d1]799 if (fd < 0) {
800 vfs_node_put(node);
[ffa2c8ef]801 async_answer_0(rid, fd);
[861e7d1]802 return;
803 }
804 vfs_file_t *file = vfs_file_get(fd);
[cb65bbe]805
806 /* There is a potential race with another fibril of a malicious client. */
807 if (!file) {
808 vfs_node_put(node);
809 async_answer_0(rid, EBUSY);
810 return;
811 }
812
[861e7d1]813 file->node = node;
[cb65bbe]814 if (oflag & O_RDONLY)
815 file->open_read = true;
816 if (oflag & O_WRONLY)
817 file->open_write = true;
818 if (oflag & O_RDWR)
819 file->open_read = file->open_write = true;
[05b9912]820 if (oflag & O_APPEND)
[15b9970]821 file->append = true;
[05b9912]822
[861e7d1]823 /*
824 * The following increase in reference count is for the fact that the
825 * file is being opened and that a file structure is pointing to it.
826 * It is necessary so that the file will not disappear when
827 * vfs_node_put() is called. The reference will be dropped by the
[4198f9c3]828 * respective VFS_IN_CLOSE.
[861e7d1]829 */
830 vfs_node_addref(node);
831 vfs_node_put(node);
[4fe94c66]832 vfs_file_put(file);
[05b9912]833
834 /* Success! Return the new file descriptor to the client. */
[ffa2c8ef]835 async_answer_1(rid, EOK, fd);
[05b9912]836}
[861e7d1]837
[05b9912]838void vfs_sync(ipc_callid_t rid, ipc_call_t *request)
839{
840 int fd = IPC_GET_ARG1(*request);
841
842 /* Lookup the file structure corresponding to the file descriptor. */
843 vfs_file_t *file = vfs_file_get(fd);
844 if (!file) {
[ffa2c8ef]845 async_answer_0(rid, ENOENT);
[05b9912]846 return;
847 }
848
849 /*
850 * Lock the open file structure so that no other thread can manipulate
851 * the same open file at a time.
852 */
[230260ac]853 fibril_mutex_lock(&file->lock);
[79ae36dd]854 async_exch_t *fs_exch = vfs_exchange_grab(file->node->fs_handle);
[05b9912]855
[4198f9c3]856 /* Make a VFS_OUT_SYMC request at the destination FS server. */
[05b9912]857 aid_t msg;
858 ipc_call_t answer;
[15f3c3f]859 msg = async_send_2(fs_exch, VFS_OUT_SYNC, file->node->service_id,
[4198f9c3]860 file->node->index, &answer);
[79ae36dd]861
862 vfs_exchange_release(fs_exch);
863
[05b9912]864 /* Wait for reply from the FS server. */
[96b02eb9]865 sysarg_t rc;
[05b9912]866 async_wait_for(msg, &rc);
867
[230260ac]868 fibril_mutex_unlock(&file->lock);
[79ae36dd]869
[4fe94c66]870 vfs_file_put(file);
[ffa2c8ef]871 async_answer_0(rid, rc);
[e704503]872}
873
[05b9912]874void vfs_close(ipc_callid_t rid, ipc_call_t *request)
875{
876 int fd = IPC_GET_ARG1(*request);
[79ae36dd]877 int ret = vfs_fd_free(fd);
[ffa2c8ef]878 async_answer_0(rid, ret);
[05b9912]879}
880
[861e7d1]881static void vfs_rdwr(ipc_callid_t rid, ipc_call_t *request, bool read)
882{
883 /*
884 * The following code strongly depends on the fact that the files data
885 * structure can be only accessed by a single fibril and all file
886 * operations are serialized (i.e. the reads and writes cannot
887 * interleave and a file cannot be closed while it is being read).
888 *
889 * Additional synchronization needs to be added once the table of
890 * open files supports parallel access!
891 */
[79ae36dd]892
[861e7d1]893 int fd = IPC_GET_ARG1(*request);
[6c89f20]894
[72bde81]895 /* Lookup the file structure corresponding to the file descriptor. */
[861e7d1]896 vfs_file_t *file = vfs_file_get(fd);
897 if (!file) {
[ffa2c8ef]898 async_answer_0(rid, ENOENT);
[861e7d1]899 return;
900 }
[6c89f20]901
[861e7d1]902 /*
903 * Lock the open file structure so that no other thread can manipulate
904 * the same open file at a time.
905 */
[230260ac]906 fibril_mutex_lock(&file->lock);
[79ae36dd]907
[cb65bbe]908 if ((read && !file->open_read) || (!read && !file->open_write)) {
909 fibril_mutex_unlock(&file->lock);
910 async_answer_0(rid, EINVAL);
911 return;
912 }
913
[79ae36dd]914 vfs_info_t *fs_info = fs_handle_to_info(file->node->fs_handle);
915 assert(fs_info);
916
[861e7d1]917 /*
918 * Lock the file's node so that no other client can read/write to it at
[c2f4b6b]919 * the same time unless the FS supports concurrent reads/writes and its
920 * write implementation does not modify the file size.
[861e7d1]921 */
[79ae36dd]922 if ((read) ||
923 ((fs_info->concurrent_read_write) && (fs_info->write_retains_size)))
[230260ac]924 fibril_rwlock_read_lock(&file->node->contents_rwlock);
[861e7d1]925 else
[230260ac]926 fibril_rwlock_write_lock(&file->node->contents_rwlock);
[79ae36dd]927
[b17186d]928 if (file->node->type == VFS_NODE_DIRECTORY) {
929 /*
930 * Make sure that no one is modifying the namespace
931 * while we are in readdir().
932 */
933 assert(read);
[230260ac]934 fibril_rwlock_read_lock(&namespace_rwlock);
[b17186d]935 }
[6c89f20]936
[79ae36dd]937 async_exch_t *fs_exch = vfs_exchange_grab(file->node->fs_handle);
[861e7d1]938
939 /*
[b4cbef1]940 * Make a VFS_READ/VFS_WRITE request at the destination FS server
941 * and forward the IPC_M_DATA_READ/IPC_M_DATA_WRITE request to the
[861e7d1]942 * destination FS server. The call will be routed as if sent by
943 * ourselves. Note that call arguments are immutable in this case so we
944 * don't have to bother.
945 */
[96b02eb9]946 sysarg_t rc;
[b4cbef1]947 ipc_call_t answer;
948 if (read) {
[5bb9907]949 rc = async_data_read_forward_4_1(fs_exch, VFS_OUT_READ,
[86ffa27f]950 file->node->service_id, file->node->index,
[5bb9907]951 LOWER32(file->pos), UPPER32(file->pos), &answer);
[b4cbef1]952 } else {
[3a4b3ba]953 if (file->append)
954 file->pos = file->node->size;
955
[5bb9907]956 rc = async_data_write_forward_4_1(fs_exch, VFS_OUT_WRITE,
[86ffa27f]957 file->node->service_id, file->node->index,
[5bb9907]958 LOWER32(file->pos), UPPER32(file->pos), &answer);
[b4cbef1]959 }
[05b9912]960
[79ae36dd]961 vfs_exchange_release(fs_exch);
[34ca870]962
[861e7d1]963 size_t bytes = IPC_GET_ARG1(answer);
[b4cbef1]964
[b17186d]965 if (file->node->type == VFS_NODE_DIRECTORY)
[230260ac]966 fibril_rwlock_read_unlock(&namespace_rwlock);
[6c89f20]967
[72bde81]968 /* Unlock the VFS node. */
[79ae36dd]969 if ((read) ||
970 ((fs_info->concurrent_read_write) && (fs_info->write_retains_size)))
[230260ac]971 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
[861e7d1]972 else {
973 /* Update the cached version of node's size. */
[f7017572]974 if (rc == EOK)
[5bb9907]975 file->node->size = MERGE_LOUP32(IPC_GET_ARG2(answer),
976 IPC_GET_ARG3(answer));
[230260ac]977 fibril_rwlock_write_unlock(&file->node->contents_rwlock);
[861e7d1]978 }
[6c89f20]979
[72bde81]980 /* Update the position pointer and unlock the open file. */
[f7017572]981 if (rc == EOK)
982 file->pos += bytes;
[230260ac]983 fibril_mutex_unlock(&file->lock);
[4fe94c66]984 vfs_file_put(file);
985
[861e7d1]986 /*
987 * FS server's reply is the final result of the whole operation we
988 * return to the client.
989 */
[ffa2c8ef]990 async_answer_1(rid, rc, bytes);
[861e7d1]991}
992
993void vfs_read(ipc_callid_t rid, ipc_call_t *request)
994{
995 vfs_rdwr(rid, request, true);
996}
997
998void vfs_write(ipc_callid_t rid, ipc_call_t *request)
999{
1000 vfs_rdwr(rid, request, false);
1001}
1002
1003void vfs_seek(ipc_callid_t rid, ipc_call_t *request)
1004{
1005 int fd = (int) IPC_GET_ARG1(*request);
[8df8415]1006 off64_t off = (off64_t) MERGE_LOUP32(IPC_GET_ARG2(*request),
1007 IPC_GET_ARG3(*request));
[ed903174]1008 int whence = (int) IPC_GET_ARG4(*request);
1009
[72bde81]1010 /* Lookup the file structure corresponding to the file descriptor. */
[861e7d1]1011 vfs_file_t *file = vfs_file_get(fd);
1012 if (!file) {
[ffa2c8ef]1013 async_answer_0(rid, ENOENT);
[861e7d1]1014 return;
1015 }
[ed903174]1016
[230260ac]1017 fibril_mutex_lock(&file->lock);
[ed903174]1018
1019 off64_t newoff;
1020 switch (whence) {
[8df8415]1021 case SEEK_SET:
1022 if (off >= 0) {
1023 file->pos = (aoff64_t) off;
[230260ac]1024 fibril_mutex_unlock(&file->lock);
[4fe94c66]1025 vfs_file_put(file);
[ffa2c8ef]1026 async_answer_1(rid, EOK, off);
[861e7d1]1027 return;
[8df8415]1028 }
1029 break;
1030 case SEEK_CUR:
1031 if ((off >= 0) && (file->pos + off < file->pos)) {
1032 fibril_mutex_unlock(&file->lock);
[4fe94c66]1033 vfs_file_put(file);
[ffa2c8ef]1034 async_answer_0(rid, EOVERFLOW);
[8df8415]1035 return;
1036 }
1037
1038 if ((off < 0) && (file->pos < (aoff64_t) -off)) {
1039 fibril_mutex_unlock(&file->lock);
[4fe94c66]1040 vfs_file_put(file);
[ffa2c8ef]1041 async_answer_0(rid, EOVERFLOW);
[8df8415]1042 return;
1043 }
1044
1045 file->pos += off;
1046 newoff = (file->pos > OFF64_MAX) ? OFF64_MAX : file->pos;
1047
1048 fibril_mutex_unlock(&file->lock);
[4fe94c66]1049 vfs_file_put(file);
[ffa2c8ef]1050 async_answer_2(rid, EOK, LOWER32(newoff),
[8df8415]1051 UPPER32(newoff));
1052 return;
1053 case SEEK_END:
1054 fibril_rwlock_read_lock(&file->node->contents_rwlock);
1055 aoff64_t size = file->node->size;
1056
1057 if ((off >= 0) && (size + off < size)) {
[ed903174]1058 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
[230260ac]1059 fibril_mutex_unlock(&file->lock);
[4fe94c66]1060 vfs_file_put(file);
[ffa2c8ef]1061 async_answer_0(rid, EOVERFLOW);
[861e7d1]1062 return;
[8df8415]1063 }
1064
1065 if ((off < 0) && (size < (aoff64_t) -off)) {
1066 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
1067 fibril_mutex_unlock(&file->lock);
[4fe94c66]1068 vfs_file_put(file);
[ffa2c8ef]1069 async_answer_0(rid, EOVERFLOW);
[8df8415]1070 return;
1071 }
1072
1073 file->pos = size + off;
1074 newoff = (file->pos > OFF64_MAX) ? OFF64_MAX : file->pos;
1075
1076 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
1077 fibril_mutex_unlock(&file->lock);
[4fe94c66]1078 vfs_file_put(file);
[ffa2c8ef]1079 async_answer_2(rid, EOK, LOWER32(newoff), UPPER32(newoff));
[8df8415]1080 return;
[861e7d1]1081 }
[ed903174]1082
[230260ac]1083 fibril_mutex_unlock(&file->lock);
[4fe94c66]1084 vfs_file_put(file);
[ffa2c8ef]1085 async_answer_0(rid, EINVAL);
[861e7d1]1086}
1087
[15f3c3f]1088int vfs_truncate_internal(fs_handle_t fs_handle, service_id_t service_id,
[ed903174]1089 fs_index_t index, aoff64_t size)
[7fe1f75]1090{
[79ae36dd]1091 async_exch_t *exch = vfs_exchange_grab(fs_handle);
1092 sysarg_t rc = async_req_4_0(exch, VFS_OUT_TRUNCATE,
[15f3c3f]1093 (sysarg_t) service_id, (sysarg_t) index, LOWER32(size),
[79ae36dd]1094 UPPER32(size));
1095 vfs_exchange_release(exch);
[7fe1f75]1096
[79ae36dd]1097 return (int) rc;
[7fe1f75]1098}
1099
[0ee4322]1100void vfs_truncate(ipc_callid_t rid, ipc_call_t *request)
1101{
1102 int fd = IPC_GET_ARG1(*request);
[8df8415]1103 aoff64_t size = (aoff64_t) MERGE_LOUP32(IPC_GET_ARG2(*request),
1104 IPC_GET_ARG3(*request));
[7fe1f75]1105 int rc;
[0ee4322]1106
1107 vfs_file_t *file = vfs_file_get(fd);
1108 if (!file) {
[ffa2c8ef]1109 async_answer_0(rid, ENOENT);
[0ee4322]1110 return;
1111 }
[230260ac]1112 fibril_mutex_lock(&file->lock);
[0ee4322]1113
[230260ac]1114 fibril_rwlock_write_lock(&file->node->contents_rwlock);
[7fe1f75]1115 rc = vfs_truncate_internal(file->node->fs_handle,
[15f3c3f]1116 file->node->service_id, file->node->index, size);
[0ee4322]1117 if (rc == EOK)
1118 file->node->size = size;
[230260ac]1119 fibril_rwlock_write_unlock(&file->node->contents_rwlock);
[0ee4322]1120
[230260ac]1121 fibril_mutex_unlock(&file->lock);
[4fe94c66]1122 vfs_file_put(file);
[ffa2c8ef]1123 async_answer_0(rid, (sysarg_t)rc);
[861e7d1]1124}
1125
[852b801]1126void vfs_fstat(ipc_callid_t rid, ipc_call_t *request)
1127{
1128 int fd = IPC_GET_ARG1(*request);
[96b02eb9]1129 sysarg_t rc;
[852b801]1130
1131 vfs_file_t *file = vfs_file_get(fd);
1132 if (!file) {
[ffa2c8ef]1133 async_answer_0(rid, ENOENT);
[852b801]1134 return;
1135 }
1136
1137 ipc_callid_t callid;
[0da4e41]1138 if (!async_data_read_receive(&callid, NULL)) {
[4fe94c66]1139 vfs_file_put(file);
[ffa2c8ef]1140 async_answer_0(callid, EINVAL);
1141 async_answer_0(rid, EINVAL);
[852b801]1142 return;
1143 }
1144
1145 fibril_mutex_lock(&file->lock);
1146
[79ae36dd]1147 async_exch_t *exch = vfs_exchange_grab(file->node->fs_handle);
[852b801]1148
1149 aid_t msg;
[15f3c3f]1150 msg = async_send_3(exch, VFS_OUT_STAT, file->node->service_id,
[852b801]1151 file->node->index, true, NULL);
[79ae36dd]1152 async_forward_fast(callid, exch, 0, 0, 0, IPC_FF_ROUTE_FROM_ME);
1153
1154 vfs_exchange_release(exch);
1155
[852b801]1156 async_wait_for(msg, &rc);
[79ae36dd]1157
[852b801]1158 fibril_mutex_unlock(&file->lock);
[4fe94c66]1159 vfs_file_put(file);
[ffa2c8ef]1160 async_answer_0(rid, rc);
[852b801]1161}
1162
1163void vfs_stat(ipc_callid_t rid, ipc_call_t *request)
1164{
[472c09d]1165 char *path;
[4cac2d69]1166 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]1167 if (rc != EOK) {
[ffa2c8ef]1168 async_answer_0(rid, rc);
[415c7e0d]1169 return;
1170 }
[472c09d]1171
1172 ipc_callid_t callid;
[0da4e41]1173 if (!async_data_read_receive(&callid, NULL)) {
[415c7e0d]1174 free(path);
[ffa2c8ef]1175 async_answer_0(callid, EINVAL);
1176 async_answer_0(rid, EINVAL);
[415c7e0d]1177 return;
1178 }
1179
1180 vfs_lookup_res_t lr;
1181 fibril_rwlock_read_lock(&namespace_rwlock);
1182 rc = vfs_lookup_internal(path, L_NONE, &lr, NULL);
1183 free(path);
1184 if (rc != EOK) {
1185 fibril_rwlock_read_unlock(&namespace_rwlock);
[ffa2c8ef]1186 async_answer_0(callid, rc);
1187 async_answer_0(rid, rc);
[415c7e0d]1188 return;
1189 }
1190 vfs_node_t *node = vfs_node_get(&lr);
1191 if (!node) {
1192 fibril_rwlock_read_unlock(&namespace_rwlock);
[ffa2c8ef]1193 async_answer_0(callid, ENOMEM);
1194 async_answer_0(rid, ENOMEM);
[415c7e0d]1195 return;
1196 }
1197
1198 fibril_rwlock_read_unlock(&namespace_rwlock);
1199
[79ae36dd]1200 async_exch_t *exch = vfs_exchange_grab(node->fs_handle);
1201
[415c7e0d]1202 aid_t msg;
[15f3c3f]1203 msg = async_send_3(exch, VFS_OUT_STAT, node->service_id,
[415c7e0d]1204 node->index, false, NULL);
[79ae36dd]1205 async_forward_fast(callid, exch, 0, 0, 0, IPC_FF_ROUTE_FROM_ME);
1206
1207 vfs_exchange_release(exch);
[057760d3]1208
[96b02eb9]1209 sysarg_t rv;
[057760d3]1210 async_wait_for(msg, &rv);
[415c7e0d]1211
[ffa2c8ef]1212 async_answer_0(rid, rv);
[415c7e0d]1213
1214 vfs_node_put(node);
[852b801]1215}
1216
[72bde81]1217void vfs_mkdir(ipc_callid_t rid, ipc_call_t *request)
1218{
1219 int mode = IPC_GET_ARG1(*request);
[472c09d]1220
1221 char *path;
[4cac2d69]1222 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]1223 if (rc != EOK) {
[ffa2c8ef]1224 async_answer_0(rid, rc);
[72bde81]1225 return;
1226 }
[472c09d]1227
[dd2cfa7]1228 /* Ignore mode for now. */
1229 (void) mode;
[72bde81]1230
[230260ac]1231 fibril_rwlock_write_lock(&namespace_rwlock);
[72bde81]1232 int lflag = L_DIRECTORY | L_CREATE | L_EXCLUSIVE;
[d6084ef]1233 rc = vfs_lookup_internal(path, lflag, NULL, NULL);
[230260ac]1234 fibril_rwlock_write_unlock(&namespace_rwlock);
[72bde81]1235 free(path);
[ffa2c8ef]1236 async_answer_0(rid, rc);
[72bde81]1237}
1238
[f15cf1a6]1239void vfs_unlink(ipc_callid_t rid, ipc_call_t *request)
1240{
1241 int lflag = IPC_GET_ARG1(*request);
[472c09d]1242
1243 char *path;
[4cac2d69]1244 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
[472c09d]1245 if (rc != EOK) {
[ffa2c8ef]1246 async_answer_0(rid, rc);
[f15cf1a6]1247 return;
1248 }
1249
[230260ac]1250 fibril_rwlock_write_lock(&namespace_rwlock);
[f15cf1a6]1251 lflag &= L_DIRECTORY; /* sanitize lflag */
1252 vfs_lookup_res_t lr;
[a8e9ab8d]1253 rc = vfs_lookup_internal(path, lflag | L_UNLINK, &lr, NULL);
[f15cf1a6]1254 free(path);
1255 if (rc != EOK) {
[230260ac]1256 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]1257 async_answer_0(rid, rc);
[f15cf1a6]1258 return;
1259 }
1260
1261 /*
1262 * The name has already been unlinked by vfs_lookup_internal().
1263 * We have to get and put the VFS node to ensure that it is
[4198f9c3]1264 * VFS_OUT_DESTROY'ed after the last reference to it is dropped.
[f15cf1a6]1265 */
1266 vfs_node_t *node = vfs_node_get(&lr);
[553492be]1267 fibril_mutex_lock(&nodes_mutex);
[f15cf1a6]1268 node->lnkcnt--;
[553492be]1269 fibril_mutex_unlock(&nodes_mutex);
[230260ac]1270 fibril_rwlock_write_unlock(&namespace_rwlock);
[f15cf1a6]1271 vfs_node_put(node);
[ffa2c8ef]1272 async_answer_0(rid, EOK);
[f15cf1a6]1273}
1274
[a8e9ab8d]1275void vfs_rename(ipc_callid_t rid, ipc_call_t *request)
1276{
1277 /* Retrieve the old path. */
[472c09d]1278 char *old;
[4cac2d69]1279 int rc = async_data_write_accept((void **) &old, true, 0, 0, 0, NULL);
[472c09d]1280 if (rc != EOK) {
[ffa2c8ef]1281 async_answer_0(rid, rc);
[a8e9ab8d]1282 return;
1283 }
1284
1285 /* Retrieve the new path. */
[472c09d]1286 char *new;
[4cac2d69]1287 rc = async_data_write_accept((void **) &new, true, 0, 0, 0, NULL);
[472c09d]1288 if (rc != EOK) {
[a8e9ab8d]1289 free(old);
[ffa2c8ef]1290 async_answer_0(rid, rc);
[a8e9ab8d]1291 return;
1292 }
[472c09d]1293
1294 size_t olen;
1295 size_t nlen;
[732bb0c]1296 char *oldc = canonify(old, &olen);
1297 char *newc = canonify(new, &nlen);
[472c09d]1298
1299 if ((!oldc) || (!newc)) {
[ffa2c8ef]1300 async_answer_0(rid, EINVAL);
[a8e9ab8d]1301 free(old);
1302 free(new);
1303 return;
1304 }
[472c09d]1305
[732bb0c]1306 oldc[olen] = '\0';
1307 newc[nlen] = '\0';
[472c09d]1308
[14040e5]1309 if ((!str_lcmp(newc, oldc, str_length(oldc))) &&
1310 ((newc[str_length(oldc)] == '/') ||
1311 (str_length(oldc) == 1) ||
1312 (str_length(oldc) == str_length(newc)))) {
1313 /*
1314 * oldc is a prefix of newc and either
1315 * - newc continues with a / where oldc ends, or
1316 * - oldc was / itself, or
1317 * - oldc and newc are equal.
1318 */
[ffa2c8ef]1319 async_answer_0(rid, EINVAL);
[a8e9ab8d]1320 free(old);
1321 free(new);
1322 return;
1323 }
1324
1325 vfs_lookup_res_t old_lr;
1326 vfs_lookup_res_t new_lr;
1327 vfs_lookup_res_t new_par_lr;
[230260ac]1328 fibril_rwlock_write_lock(&namespace_rwlock);
[472c09d]1329
[a8e9ab8d]1330 /* Lookup the node belonging to the old file name. */
1331 rc = vfs_lookup_internal(oldc, L_NONE, &old_lr, NULL);
1332 if (rc != EOK) {
[230260ac]1333 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]1334 async_answer_0(rid, rc);
[a8e9ab8d]1335 free(old);
1336 free(new);
1337 return;
1338 }
[472c09d]1339
[a8e9ab8d]1340 vfs_node_t *old_node = vfs_node_get(&old_lr);
1341 if (!old_node) {
[230260ac]1342 fibril_rwlock_write_unlock(&namespace_rwlock);
[ffa2c8ef]1343 async_answer_0(rid, ENOMEM);
[a8e9ab8d]1344 free(old);
1345 free(new);
1346 return;
1347 }
[472c09d]1348
[4f46695e]1349 /* Determine the path to the parent of the node with the new name. */
1350 char *parentc = str_dup(newc);
1351 if (!parentc) {
[230260ac]1352 fibril_rwlock_write_unlock(&namespace_rwlock);
[71af5a4]1353 vfs_node_put(old_node);
[ffa2c8ef]1354 async_answer_0(rid, rc);
[4f46695e]1355 free(old);
1356 free(new);
1357 return;
1358 }
[472c09d]1359
[ae55ee8]1360 char *lastsl = str_rchr(parentc + 1, '/');
[4f46695e]1361 if (lastsl)
1362 *lastsl = '\0';
1363 else
1364 parentc[1] = '\0';
[472c09d]1365
[a8e9ab8d]1366 /* Lookup parent of the new file name. */
[4f46695e]1367 rc = vfs_lookup_internal(parentc, L_NONE, &new_par_lr, NULL);
1368 free(parentc); /* not needed anymore */
[a8e9ab8d]1369 if (rc != EOK) {
[230260ac]1370 fibril_rwlock_write_unlock(&namespace_rwlock);
[71af5a4]1371 vfs_node_put(old_node);
[ffa2c8ef]1372 async_answer_0(rid, rc);
[a8e9ab8d]1373 free(old);
1374 free(new);
1375 return;
1376 }
[472c09d]1377
[a8e9ab8d]1378 /* Check whether linking to the same file system instance. */
1379 if ((old_node->fs_handle != new_par_lr.triplet.fs_handle) ||
[15f3c3f]1380 (old_node->service_id != new_par_lr.triplet.service_id)) {
[230260ac]1381 fibril_rwlock_write_unlock(&namespace_rwlock);
[71af5a4]1382 vfs_node_put(old_node);
[ffa2c8ef]1383 async_answer_0(rid, EXDEV); /* different file systems */
[a8e9ab8d]1384 free(old);
1385 free(new);
1386 return;
1387 }
[472c09d]1388
[a8e9ab8d]1389 /* Destroy the old link for the new name. */
1390 vfs_node_t *new_node = NULL;
1391 rc = vfs_lookup_internal(newc, L_UNLINK, &new_lr, NULL);
[472c09d]1392
[a8e9ab8d]1393 switch (rc) {
1394 case ENOENT:
1395 /* simply not in our way */
1396 break;
1397 case EOK:
1398 new_node = vfs_node_get(&new_lr);
1399 if (!new_node) {
[230260ac]1400 fibril_rwlock_write_unlock(&namespace_rwlock);
[71af5a4]1401 vfs_node_put(old_node);
[ffa2c8ef]1402 async_answer_0(rid, ENOMEM);
[a8e9ab8d]1403 free(old);
1404 free(new);
1405 return;
1406 }
[553492be]1407 fibril_mutex_lock(&nodes_mutex);
[a8e9ab8d]1408 new_node->lnkcnt--;
[553492be]1409 fibril_mutex_unlock(&nodes_mutex);
[a8e9ab8d]1410 break;
1411 default:
[230260ac]1412 fibril_rwlock_write_unlock(&namespace_rwlock);
[71af5a4]1413 vfs_node_put(old_node);
[ffa2c8ef]1414 async_answer_0(rid, ENOTEMPTY);
[a8e9ab8d]1415 free(old);
1416 free(new);
1417 return;
1418 }
[472c09d]1419
[a8e9ab8d]1420 /* Create the new link for the new name. */
1421 rc = vfs_lookup_internal(newc, L_LINK, NULL, NULL, old_node->index);
1422 if (rc != EOK) {
[230260ac]1423 fibril_rwlock_write_unlock(&namespace_rwlock);
[71af5a4]1424 vfs_node_put(old_node);
[a8e9ab8d]1425 if (new_node)
1426 vfs_node_put(new_node);
[ffa2c8ef]1427 async_answer_0(rid, rc);
[a8e9ab8d]1428 free(old);
1429 free(new);
1430 return;
1431 }
[472c09d]1432
[553492be]1433 fibril_mutex_lock(&nodes_mutex);
[a8e9ab8d]1434 old_node->lnkcnt++;
[553492be]1435 fibril_mutex_unlock(&nodes_mutex);
[472c09d]1436
[a8e9ab8d]1437 /* Destroy the link for the old name. */
1438 rc = vfs_lookup_internal(oldc, L_UNLINK, NULL, NULL);
1439 if (rc != EOK) {
[230260ac]1440 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1441 vfs_node_put(old_node);
1442 if (new_node)
1443 vfs_node_put(new_node);
[ffa2c8ef]1444 async_answer_0(rid, rc);
[a8e9ab8d]1445 free(old);
1446 free(new);
1447 return;
1448 }
[472c09d]1449
[553492be]1450 fibril_mutex_lock(&nodes_mutex);
[a8e9ab8d]1451 old_node->lnkcnt--;
[553492be]1452 fibril_mutex_unlock(&nodes_mutex);
[230260ac]1453 fibril_rwlock_write_unlock(&namespace_rwlock);
[a8e9ab8d]1454 vfs_node_put(old_node);
[472c09d]1455
[a8e9ab8d]1456 if (new_node)
1457 vfs_node_put(new_node);
[472c09d]1458
[a8e9ab8d]1459 free(old);
1460 free(new);
[ffa2c8ef]1461 async_answer_0(rid, EOK);
[a8e9ab8d]1462}
1463
[2b88074b]1464void vfs_dup(ipc_callid_t rid, ipc_call_t *request)
1465{
1466 int oldfd = IPC_GET_ARG1(*request);
1467 int newfd = IPC_GET_ARG2(*request);
1468
[4fe94c66]1469 /* If the file descriptors are the same, do nothing. */
1470 if (oldfd == newfd) {
[ffa2c8ef]1471 async_answer_1(rid, EOK, newfd);
[4fe94c66]1472 return;
1473 }
1474
[2b88074b]1475 /* Lookup the file structure corresponding to oldfd. */
1476 vfs_file_t *oldfile = vfs_file_get(oldfd);
1477 if (!oldfile) {
[ffa2c8ef]1478 async_answer_0(rid, EBADF);
[2b88074b]1479 return;
1480 }
1481
1482 /*
1483 * Lock the open file structure so that no other thread can manipulate
1484 * the same open file at a time.
1485 */
1486 fibril_mutex_lock(&oldfile->lock);
1487
[25bef0ff]1488 /* Make sure newfd is closed. */
1489 (void) vfs_fd_free(newfd);
[2b88074b]1490
1491 /* Assign the old file to newfd. */
1492 int ret = vfs_fd_assign(oldfile, newfd);
1493 fibril_mutex_unlock(&oldfile->lock);
[4fe94c66]1494 vfs_file_put(oldfile);
[2b88074b]1495
1496 if (ret != EOK)
[ffa2c8ef]1497 async_answer_0(rid, ret);
[2b88074b]1498 else
[ffa2c8ef]1499 async_answer_1(rid, EOK, newfd);
[2b88074b]1500}
1501
[27b76ca]1502void vfs_wait_handle(ipc_callid_t rid, ipc_call_t *request)
1503{
1504 int fd = vfs_wait_handle_internal();
1505 async_answer_1(rid, EOK, fd);
1506}
1507
[76a67ce]1508void vfs_get_mtab(ipc_callid_t rid, ipc_call_t *request)
1509{
1510 ipc_callid_t callid;
1511 ipc_call_t data;
1512 sysarg_t rc = EOK;
1513 size_t len;
1514
1515 fibril_mutex_lock(&mtab_list_lock);
1516
1517 /* Send to the caller the number of mounted filesystems */
1518 callid = async_get_call(&data);
1519 if (IPC_GET_IMETHOD(data) != VFS_IN_PING) {
1520 rc = ENOTSUP;
[7e8403b]1521 async_answer_0(callid, rc);
[76a67ce]1522 goto exit;
1523 }
1524 async_answer_1(callid, EOK, mtab_size);
1525
1526 list_foreach(mtab_list, cur) {
[8d6a41c]1527 mtab_ent_t *mtab_ent = list_get_instance(cur, mtab_ent_t,
[76a67ce]1528 link);
1529
1530 rc = ENOTSUP;
1531
[e6da6d5]1532 if (!async_data_read_receive(&callid, &len)) {
1533 async_answer_0(callid, rc);
[76a67ce]1534 goto exit;
[e6da6d5]1535 }
[76a67ce]1536
1537 (void) async_data_read_finalize(callid, mtab_ent->mp,
1538 str_size(mtab_ent->mp));
1539
[e6da6d5]1540 if (!async_data_read_receive(&callid, &len)) {
1541 async_answer_0(callid, rc);
[76a67ce]1542 goto exit;
[e6da6d5]1543 }
[76a67ce]1544
1545 (void) async_data_read_finalize(callid, mtab_ent->opts,
1546 str_size(mtab_ent->opts));
1547
[e6da6d5]1548 if (!async_data_read_receive(&callid, &len)) {
1549 async_answer_0(callid, rc);
[76a67ce]1550 goto exit;
[e6da6d5]1551 }
[76a67ce]1552
1553 (void) async_data_read_finalize(callid, mtab_ent->fs_name,
1554 str_size(mtab_ent->fs_name));
1555
[f8838b8]1556 callid = async_get_call(&data);
1557
1558 if (IPC_GET_IMETHOD(data) != VFS_IN_PING) {
[7e8403b]1559 async_answer_0(callid, rc);
[f8838b8]1560 goto exit;
[76a67ce]1561 }
1562
1563 rc = EOK;
[6b8e5b74]1564 async_answer_2(callid, rc, mtab_ent->instance,
1565 mtab_ent->service_id);
[76a67ce]1566 }
1567
1568exit:
1569 fibril_mutex_unlock(&mtab_list_lock);
1570 async_answer_0(rid, rc);
1571}
1572
[861e7d1]1573/**
1574 * @}
[05b9912]1575 */
Note: See TracBrowser for help on using the repository browser.