source: mainline/uspace/srv/vfs/vfs_ops.c@ 9a8c188

lfn serial ticket/834-toolchain-update topic/msim-upgrade topic/simplify-dev-export
Last change on this file since 9a8c188 was 9a8c188, checked in by Ji?? Z?rev?cky <zarevucky.jiri@…>, 12 years ago

Fix a bug and work around applications that call open() incorrectly.

  • Property mode set to 100644
File size: 39.1 KB
Line 
1/*
2 * Copyright (c) 2008 Jakub Jermar
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 *
9 * - Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 * - The name of the author may not be used to endorse or promote products
15 * derived from this software without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 */
28
29/** @addtogroup fs
30 * @{
31 */
32
33/**
34 * @file vfs_ops.c
35 * @brief Operations that VFS offers to its clients.
36 */
37
38#include "vfs.h"
39#include <macros.h>
40#include <stdint.h>
41#include <async.h>
42#include <errno.h>
43#include <stdio.h>
44#include <stdlib.h>
45#include <str.h>
46#include <stdbool.h>
47#include <fibril_synch.h>
48#include <adt/list.h>
49#include <unistd.h>
50#include <ctype.h>
51#include <fcntl.h>
52#include <assert.h>
53#include <vfs/canonify.h>
54#include <vfs/vfs_mtab.h>
55
56FIBRIL_MUTEX_INITIALIZE(mtab_list_lock);
57LIST_INITIALIZE(mtab_list);
58static size_t mtab_size = 0;
59
60/* Forward declarations of static functions. */
61static int vfs_truncate_internal(fs_handle_t, service_id_t, fs_index_t,
62 aoff64_t);
63
64/**
65 * This rwlock prevents the race between a triplet-to-VFS-node resolution and a
66 * concurrent VFS operation which modifies the file system namespace.
67 */
68FIBRIL_RWLOCK_INITIALIZE(namespace_rwlock);
69
70vfs_pair_t rootfs = {
71 .fs_handle = 0,
72 .service_id = 0
73};
74
75static int vfs_mount_internal(ipc_callid_t rid, service_id_t service_id,
76 fs_handle_t fs_handle, char *mp, char *opts)
77{
78 vfs_lookup_res_t mp_res;
79 vfs_lookup_res_t mr_res;
80 vfs_node_t *mp_node = NULL;
81 vfs_node_t *mr_node;
82 fs_index_t rindex;
83 aoff64_t rsize;
84 unsigned rlnkcnt;
85 async_exch_t *exch;
86 sysarg_t rc;
87 aid_t msg;
88 ipc_call_t answer;
89
90 /* Resolve the path to the mountpoint. */
91 fibril_rwlock_write_lock(&namespace_rwlock);
92 if (rootfs.fs_handle) {
93 /* We already have the root FS. */
94 if (str_cmp(mp, "/") == 0) {
95 /* Trying to mount root FS over root FS */
96 fibril_rwlock_write_unlock(&namespace_rwlock);
97 async_answer_0(rid, EBUSY);
98 return EBUSY;
99 }
100
101 rc = vfs_lookup_internal(mp, L_MP, &mp_res, NULL);
102 if (rc != EOK) {
103 /* The lookup failed for some reason. */
104 fibril_rwlock_write_unlock(&namespace_rwlock);
105 async_answer_0(rid, rc);
106 return rc;
107 }
108
109 mp_node = vfs_node_get(&mp_res);
110 if (!mp_node) {
111 fibril_rwlock_write_unlock(&namespace_rwlock);
112 async_answer_0(rid, ENOMEM);
113 return ENOMEM;
114 }
115
116 /*
117 * Now we hold a reference to mp_node.
118 * It will be dropped upon the corresponding VFS_IN_UNMOUNT.
119 * This prevents the mount point from being deleted.
120 */
121 } else {
122 /* We still don't have the root file system mounted. */
123 if (str_cmp(mp, "/") == 0) {
124 /*
125 * For this simple, but important case,
126 * we are almost done.
127 */
128
129 /* Tell the mountee that it is being mounted. */
130 exch = vfs_exchange_grab(fs_handle);
131 msg = async_send_1(exch, VFS_OUT_MOUNTED,
132 (sysarg_t) service_id, &answer);
133 /* Send the mount options */
134 rc = async_data_write_start(exch, (void *)opts,
135 str_size(opts));
136 vfs_exchange_release(exch);
137
138 if (rc != EOK) {
139 async_forget(msg);
140 fibril_rwlock_write_unlock(&namespace_rwlock);
141 async_answer_0(rid, rc);
142 return rc;
143 }
144 async_wait_for(msg, &rc);
145
146 if (rc != EOK) {
147 fibril_rwlock_write_unlock(&namespace_rwlock);
148 async_answer_0(rid, rc);
149 return rc;
150 }
151
152 rindex = (fs_index_t) IPC_GET_ARG1(answer);
153 rsize = (aoff64_t) MERGE_LOUP32(IPC_GET_ARG2(answer),
154 IPC_GET_ARG3(answer));
155 rlnkcnt = (unsigned) IPC_GET_ARG4(answer);
156
157 mr_res.triplet.fs_handle = fs_handle;
158 mr_res.triplet.service_id = service_id;
159 mr_res.triplet.index = rindex;
160 mr_res.size = rsize;
161 mr_res.lnkcnt = rlnkcnt;
162 mr_res.type = VFS_NODE_DIRECTORY;
163
164 rootfs.fs_handle = fs_handle;
165 rootfs.service_id = service_id;
166
167 /* Add reference to the mounted root. */
168 mr_node = vfs_node_get(&mr_res);
169 assert(mr_node);
170
171 fibril_rwlock_write_unlock(&namespace_rwlock);
172 async_answer_0(rid, rc);
173 return rc;
174 } else {
175 /*
176 * We can't resolve this without the root filesystem
177 * being mounted first.
178 */
179 fibril_rwlock_write_unlock(&namespace_rwlock);
180 async_answer_0(rid, ENOENT);
181 return ENOENT;
182 }
183 }
184
185 /*
186 * At this point, we have all necessary pieces: file system handle
187 * and service ID, and we know the mount point VFS node.
188 */
189
190 async_exch_t *mountee_exch = vfs_exchange_grab(fs_handle);
191 assert(mountee_exch);
192
193 exch = vfs_exchange_grab(mp_res.triplet.fs_handle);
194 msg = async_send_4(exch, VFS_OUT_MOUNT,
195 (sysarg_t) mp_res.triplet.service_id,
196 (sysarg_t) mp_res.triplet.index,
197 (sysarg_t) fs_handle,
198 (sysarg_t) service_id, &answer);
199
200 /* Send connection */
201 rc = async_exchange_clone(exch, mountee_exch);
202 vfs_exchange_release(mountee_exch);
203
204 if (rc != EOK) {
205 vfs_exchange_release(exch);
206 async_forget(msg);
207
208 /* Mount failed, drop reference to mp_node. */
209 if (mp_node)
210 vfs_node_put(mp_node);
211
212 async_answer_0(rid, rc);
213 fibril_rwlock_write_unlock(&namespace_rwlock);
214 return rc;
215 }
216
217 /* send the mount options */
218 rc = async_data_write_start(exch, (void *) opts, str_size(opts));
219 if (rc != EOK) {
220 vfs_exchange_release(exch);
221 async_forget(msg);
222
223 /* Mount failed, drop reference to mp_node. */
224 if (mp_node)
225 vfs_node_put(mp_node);
226
227 fibril_rwlock_write_unlock(&namespace_rwlock);
228 async_answer_0(rid, rc);
229 return rc;
230 }
231
232 /*
233 * Wait for the answer before releasing the exchange to avoid deadlock
234 * in case the answer depends on further calls to the same file system.
235 * Think of a case when mounting a FS on a file_bd backed by a file on
236 * the same FS.
237 */
238 async_wait_for(msg, &rc);
239 vfs_exchange_release(exch);
240
241 if (rc == EOK) {
242 rindex = (fs_index_t) IPC_GET_ARG1(answer);
243 rsize = (aoff64_t) MERGE_LOUP32(IPC_GET_ARG2(answer),
244 IPC_GET_ARG3(answer));
245 rlnkcnt = (unsigned) IPC_GET_ARG4(answer);
246
247 mr_res.triplet.fs_handle = fs_handle;
248 mr_res.triplet.service_id = service_id;
249 mr_res.triplet.index = rindex;
250 mr_res.size = rsize;
251 mr_res.lnkcnt = rlnkcnt;
252 mr_res.type = VFS_NODE_DIRECTORY;
253
254 /* Add reference to the mounted root. */
255 mr_node = vfs_node_get(&mr_res);
256 assert(mr_node);
257 } else {
258 /* Mount failed, drop reference to mp_node. */
259 if (mp_node)
260 vfs_node_put(mp_node);
261 }
262
263 async_answer_0(rid, rc);
264 fibril_rwlock_write_unlock(&namespace_rwlock);
265 return rc;
266}
267
268void vfs_mount(ipc_callid_t rid, ipc_call_t *request)
269{
270 service_id_t service_id;
271
272 /*
273 * We expect the library to do the device-name to device-handle
274 * translation for us, thus the device handle will arrive as ARG1
275 * in the request.
276 */
277 service_id = (service_id_t) IPC_GET_ARG1(*request);
278
279 /*
280 * Mount flags are passed as ARG2.
281 */
282 unsigned int flags = (unsigned int) IPC_GET_ARG2(*request);
283
284 /*
285 * Instance number is passed as ARG3.
286 */
287 unsigned int instance = IPC_GET_ARG3(*request);
288
289 /* We want the client to send us the mount point. */
290 char *mp;
291 int rc = async_data_write_accept((void **) &mp, true, 0, MAX_PATH_LEN,
292 0, NULL);
293 if (rc != EOK) {
294 async_answer_0(rid, rc);
295 return;
296 }
297
298 /* Now we expect to receive the mount options. */
299 char *opts;
300 rc = async_data_write_accept((void **) &opts, true, 0, MAX_MNTOPTS_LEN,
301 0, NULL);
302 if (rc != EOK) {
303 free(mp);
304 async_answer_0(rid, rc);
305 return;
306 }
307
308 /*
309 * Now, we expect the client to send us data with the name of the file
310 * system.
311 */
312 char *fs_name;
313 rc = async_data_write_accept((void **) &fs_name, true, 0,
314 FS_NAME_MAXLEN, 0, NULL);
315 if (rc != EOK) {
316 free(mp);
317 free(opts);
318 async_answer_0(rid, rc);
319 return;
320 }
321
322 /*
323 * Wait for VFS_IN_PING so that we can return an error if we don't know
324 * fs_name.
325 */
326 ipc_call_t data;
327 ipc_callid_t callid = async_get_call(&data);
328 if (IPC_GET_IMETHOD(data) != VFS_IN_PING) {
329 async_answer_0(callid, ENOTSUP);
330 async_answer_0(rid, ENOTSUP);
331 free(mp);
332 free(opts);
333 free(fs_name);
334 return;
335 }
336
337 /*
338 * Check if we know a file system with the same name as is in fs_name.
339 * This will also give us its file system handle.
340 */
341 fibril_mutex_lock(&fs_list_lock);
342 fs_handle_t fs_handle;
343recheck:
344 fs_handle = fs_name_to_handle(instance, fs_name, false);
345 if (!fs_handle) {
346 if (flags & IPC_FLAG_BLOCKING) {
347 fibril_condvar_wait(&fs_list_cv, &fs_list_lock);
348 goto recheck;
349 }
350
351 fibril_mutex_unlock(&fs_list_lock);
352 async_answer_0(callid, ENOENT);
353 async_answer_0(rid, ENOENT);
354 free(mp);
355 free(fs_name);
356 free(opts);
357 return;
358 }
359 fibril_mutex_unlock(&fs_list_lock);
360
361 /* Add the filesystem info to the list of mounted filesystems */
362 mtab_ent_t *mtab_ent = malloc(sizeof(mtab_ent_t));
363 if (!mtab_ent) {
364 async_answer_0(callid, ENOMEM);
365 async_answer_0(rid, ENOMEM);
366 free(mp);
367 free(fs_name);
368 free(opts);
369 return;
370 }
371
372 /* Do the mount */
373 rc = vfs_mount_internal(rid, service_id, fs_handle, mp, opts);
374 if (rc != EOK) {
375 async_answer_0(callid, ENOTSUP);
376 async_answer_0(rid, ENOTSUP);
377 free(mtab_ent);
378 free(mp);
379 free(opts);
380 free(fs_name);
381 return;
382 }
383
384 /* Add the filesystem info to the list of mounted filesystems */
385
386 str_cpy(mtab_ent->mp, MAX_PATH_LEN, mp);
387 str_cpy(mtab_ent->fs_name, FS_NAME_MAXLEN, fs_name);
388 str_cpy(mtab_ent->opts, MAX_MNTOPTS_LEN, opts);
389 mtab_ent->instance = instance;
390 mtab_ent->service_id = service_id;
391
392 link_initialize(&mtab_ent->link);
393
394 fibril_mutex_lock(&mtab_list_lock);
395 list_append(&mtab_ent->link, &mtab_list);
396 mtab_size++;
397 fibril_mutex_unlock(&mtab_list_lock);
398
399 free(mp);
400 free(fs_name);
401 free(opts);
402
403 /* Acknowledge that we know fs_name. */
404 async_answer_0(callid, EOK);
405}
406
407void vfs_unmount(ipc_callid_t rid, ipc_call_t *request)
408{
409 int rc;
410 char *mp;
411 vfs_lookup_res_t mp_res;
412 vfs_lookup_res_t mr_res;
413 vfs_node_t *mr_node;
414 async_exch_t *exch;
415
416 /*
417 * Receive the mount point path.
418 */
419 rc = async_data_write_accept((void **) &mp, true, 0, MAX_PATH_LEN,
420 0, NULL);
421 if (rc != EOK)
422 async_answer_0(rid, rc);
423
424 /*
425 * Taking the namespace lock will do two things for us. First, it will
426 * prevent races with other lookup operations. Second, it will stop new
427 * references to already existing VFS nodes and creation of new VFS
428 * nodes. This is because new references are added as a result of some
429 * lookup operation or at least of some operation which is protected by
430 * the namespace lock.
431 */
432 fibril_rwlock_write_lock(&namespace_rwlock);
433
434 /*
435 * Lookup the mounted root and instantiate it.
436 */
437 rc = vfs_lookup_internal(mp, L_ROOT, &mr_res, NULL);
438 if (rc != EOK) {
439 fibril_rwlock_write_unlock(&namespace_rwlock);
440 free(mp);
441 async_answer_0(rid, rc);
442 return;
443 }
444 mr_node = vfs_node_get(&mr_res);
445 if (!mr_node) {
446 fibril_rwlock_write_unlock(&namespace_rwlock);
447 free(mp);
448 async_answer_0(rid, ENOMEM);
449 return;
450 }
451
452 /*
453 * Count the total number of references for the mounted file system. We
454 * are expecting at least two. One which we got above and one which we
455 * got when the file system was mounted. If we find more, it means that
456 * the file system cannot be gracefully unmounted at the moment because
457 * someone is working with it.
458 */
459 if (vfs_nodes_refcount_sum_get(mr_node->fs_handle,
460 mr_node->service_id) != 2) {
461 fibril_rwlock_write_unlock(&namespace_rwlock);
462 vfs_node_put(mr_node);
463 free(mp);
464 async_answer_0(rid, EBUSY);
465 return;
466 }
467
468 if (str_cmp(mp, "/") == 0) {
469
470 /*
471 * Unmounting the root file system.
472 *
473 * In this case, there is no mount point node and we send
474 * VFS_OUT_UNMOUNTED directly to the mounted file system.
475 */
476
477 exch = vfs_exchange_grab(mr_node->fs_handle);
478 rc = async_req_1_0(exch, VFS_OUT_UNMOUNTED,
479 mr_node->service_id);
480 vfs_exchange_release(exch);
481
482 if (rc != EOK) {
483 fibril_rwlock_write_unlock(&namespace_rwlock);
484 free(mp);
485 vfs_node_put(mr_node);
486 async_answer_0(rid, rc);
487 return;
488 }
489
490 rootfs.fs_handle = 0;
491 rootfs.service_id = 0;
492 } else {
493
494 /*
495 * Unmounting a non-root file system.
496 *
497 * We have a regular mount point node representing the parent
498 * file system, so we delegate the operation to it.
499 */
500
501 rc = vfs_lookup_internal(mp, L_MP, &mp_res, NULL);
502 if (rc != EOK) {
503 fibril_rwlock_write_unlock(&namespace_rwlock);
504 free(mp);
505 vfs_node_put(mr_node);
506 async_answer_0(rid, rc);
507 return;
508 }
509
510 vfs_node_t *mp_node = vfs_node_get(&mp_res);
511 if (!mp_node) {
512 fibril_rwlock_write_unlock(&namespace_rwlock);
513 free(mp);
514 vfs_node_put(mr_node);
515 async_answer_0(rid, ENOMEM);
516 return;
517 }
518
519 exch = vfs_exchange_grab(mp_node->fs_handle);
520 rc = async_req_2_0(exch, VFS_OUT_UNMOUNT,
521 mp_node->service_id, mp_node->index);
522 vfs_exchange_release(exch);
523
524 if (rc != EOK) {
525 fibril_rwlock_write_unlock(&namespace_rwlock);
526 free(mp);
527 vfs_node_put(mp_node);
528 vfs_node_put(mr_node);
529 async_answer_0(rid, rc);
530 return;
531 }
532
533 /* Drop the reference we got above. */
534 vfs_node_put(mp_node);
535 /* Drop the reference from when the file system was mounted. */
536 vfs_node_put(mp_node);
537 }
538
539 /*
540 * All went well, the mounted file system was successfully unmounted.
541 * The only thing left is to forget the unmounted root VFS node.
542 */
543 vfs_node_forget(mr_node);
544 fibril_rwlock_write_unlock(&namespace_rwlock);
545
546 fibril_mutex_lock(&mtab_list_lock);
547
548 int found = 0;
549
550 list_foreach(mtab_list, cur) {
551 mtab_ent_t *mtab_ent = list_get_instance(cur, mtab_ent_t,
552 link);
553
554 if (str_cmp(mtab_ent->mp, mp) == 0) {
555 list_remove(&mtab_ent->link);
556 mtab_size--;
557 free(mtab_ent);
558 found = 1;
559 break;
560 }
561 }
562 assert(found);
563 fibril_mutex_unlock(&mtab_list_lock);
564
565 free(mp);
566
567 async_answer_0(rid, EOK);
568}
569
570static inline bool walk_flags_valid(int flags)
571{
572 if ((flags&~WALK_ALL_FLAGS) != 0) {
573 return false;
574 }
575 if ((flags&WALK_MAY_CREATE) && (flags&WALK_MUST_CREATE)) {
576 return false;
577 }
578 if ((flags&WALK_REGULAR) && (flags&WALK_DIRECTORY)) {
579 return false;
580 }
581 if ((flags&WALK_MAY_CREATE) || (flags&WALK_MUST_CREATE)) {
582 if (!(flags&WALK_DIRECTORY) && !(flags&WALK_REGULAR)) {
583 return false;
584 }
585 }
586 return true;
587}
588
589static inline int walk_lookup_flags(int flags)
590{
591 int lflags = 0;
592 if (flags&WALK_MAY_CREATE || flags&WALK_MUST_CREATE) {
593 lflags |= L_CREATE;
594 }
595 if (flags&WALK_MUST_CREATE) {
596 lflags |= L_EXCLUSIVE;
597 }
598 if (flags&WALK_REGULAR) {
599 lflags |= L_FILE;
600 }
601 if (flags&WALK_DIRECTORY) {
602 lflags |= L_DIRECTORY;
603 }
604 return lflags;
605}
606
607void vfs_walk(ipc_callid_t rid, ipc_call_t *request)
608{
609 /*
610 * Parent is our relative root for file lookup.
611 * For defined flags, see <ipc/vfs.h>.
612 */
613 int parentfd = IPC_GET_ARG1(*request);
614 int flags = IPC_GET_ARG2(*request);
615
616 if (!walk_flags_valid(flags)) {
617 async_answer_0(rid, EINVAL);
618 return;
619 }
620
621 char *path;
622 int rc = async_data_write_accept((void **)&path, true, 0, 0, 0, NULL);
623
624 /* Lookup the file structure corresponding to the file descriptor. */
625 vfs_file_t *parent = NULL;
626 vfs_pair_t *parent_node = NULL;
627 // TODO: Client-side root.
628 if (parentfd != -1) {
629 parent = vfs_file_get(parentfd);
630 if (!parent) {
631 free(path);
632 async_answer_0(rid, EBADF);
633 return;
634 }
635 parent_node = (vfs_pair_t *)parent->node;
636 }
637
638 fibril_rwlock_read_lock(&namespace_rwlock);
639
640 vfs_lookup_res_t lr;
641 rc = vfs_lookup_internal(path, walk_lookup_flags(flags), &lr, parent_node);
642 free(path);
643
644 if (rc != EOK) {
645 fibril_rwlock_read_unlock(&namespace_rwlock);
646 if (parent) {
647 vfs_file_put(parent);
648 }
649 async_answer_0(rid, rc);
650 return;
651 }
652
653 vfs_node_t *node = vfs_node_get(&lr);
654
655 int fd = vfs_fd_alloc(false);
656 if (fd < 0) {
657 vfs_node_put(node);
658 if (parent) {
659 vfs_file_put(parent);
660 }
661 async_answer_0(rid, fd);
662 return;
663 }
664
665 vfs_file_t *file = vfs_file_get(fd);
666 assert(file != NULL);
667
668 file->node = node;
669 if (parent) {
670 file->permissions = parent->permissions;
671 } else {
672 file->permissions = MODE_READ | MODE_WRITE | MODE_APPEND;
673 }
674 file->open_read = false;
675 file->open_write = false;
676
677 vfs_node_addref(node);
678 vfs_node_put(node);
679 vfs_file_put(file);
680 if (parent) {
681 vfs_file_put(parent);
682 }
683
684 fibril_rwlock_read_unlock(&namespace_rwlock);
685
686 async_answer_1(rid, EOK, fd);
687}
688
689void vfs_open2(ipc_callid_t rid, ipc_call_t *request)
690{
691 int fd = IPC_GET_ARG1(*request);
692 int flags = IPC_GET_ARG2(*request);
693
694 if (flags == 0) {
695 async_answer_0(rid, EINVAL);
696 return;
697 }
698
699 vfs_file_t *file = vfs_file_get(fd);
700 if (!file) {
701 async_answer_0(rid, EBADF);
702 return;
703 }
704
705 if ((flags & ~file->permissions) != 0) {
706 vfs_file_put(file);
707 async_answer_0(rid, EPERM);
708 return;
709 }
710
711 file->open_read = (flags & MODE_READ) != 0;
712 file->open_write = (flags & (MODE_WRITE | MODE_APPEND)) != 0;
713 file->append = (flags & MODE_APPEND) != 0;
714
715 if (!file->open_read && !file->open_write) {
716 vfs_file_put(file);
717 async_answer_0(rid, EINVAL);
718 return;
719 }
720
721 if (file->node->type == VFS_NODE_DIRECTORY && file->open_write) {
722 file->open_read = file->open_write = false;
723 vfs_file_put(file);
724 async_answer_0(rid, EINVAL);
725 return;
726 }
727
728 int rc = vfs_open_node_remote(file->node);
729 if (rc != EOK) {
730 file->open_read = file->open_write = false;
731 vfs_file_put(file);
732 async_answer_0(rid, rc);
733 return;
734 }
735
736 vfs_file_put(file);
737 async_answer_0(rid, EOK);
738}
739
740void vfs_open(ipc_callid_t rid, ipc_call_t *request)
741{
742 /*
743 * The POSIX interface is open(path, oflag, mode).
744 * We can receive oflags and mode along with the VFS_IN_OPEN call;
745 * the path will need to arrive in another call.
746 *
747 * We also receive one private, non-POSIX set of flags called lflag
748 * used to pass information to vfs_lookup_internal().
749 */
750 int lflag = IPC_GET_ARG1(*request);
751 int oflag = IPC_GET_ARG2(*request);
752 int mode = IPC_GET_ARG3(*request);
753
754 /* Ignore mode for now. */
755 (void) mode;
756
757 /*
758 * Make sure that we are called with exactly one of L_FILE and
759 * L_DIRECTORY. Make sure that the user does not pass L_OPEN,
760 * L_ROOT or L_MP.
761 */
762 if (((lflag & (L_FILE | L_DIRECTORY)) == 0) ||
763 ((lflag & (L_FILE | L_DIRECTORY)) == (L_FILE | L_DIRECTORY)) ||
764 (lflag & (L_OPEN | L_ROOT | L_MP))) {
765 async_answer_0(rid, EINVAL);
766 return;
767 }
768
769 if ((((oflag & O_RDONLY) != 0) + ((oflag & O_WRONLY) != 0) + ((oflag & O_RDWR) != 0)) != 1) {
770 async_answer_0(rid, EINVAL);
771 return;
772 }
773
774 if (oflag & O_CREAT)
775 lflag |= L_CREATE;
776 if (oflag & O_EXCL)
777 lflag |= L_EXCLUSIVE;
778
779 char *path;
780 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
781 if (rc != EOK) {
782 async_answer_0(rid, rc);
783 return;
784 }
785
786 /*
787 * Avoid the race condition in which the file can be deleted before we
788 * find/create-and-lock the VFS node corresponding to the looked-up
789 * triplet.
790 */
791 if (lflag & L_CREATE)
792 fibril_rwlock_write_lock(&namespace_rwlock);
793 else
794 fibril_rwlock_read_lock(&namespace_rwlock);
795
796 /* The path is now populated and we can call vfs_lookup_internal(). */
797 vfs_lookup_res_t lr;
798 rc = vfs_lookup_internal(path, lflag | L_OPEN, &lr, NULL);
799 if (rc != EOK) {
800 if (lflag & L_CREATE)
801 fibril_rwlock_write_unlock(&namespace_rwlock);
802 else
803 fibril_rwlock_read_unlock(&namespace_rwlock);
804 async_answer_0(rid, rc);
805 free(path);
806 return;
807 }
808
809 /* Path is no longer needed. */
810 free(path);
811
812 vfs_node_t *node = vfs_node_get(&lr);
813 if (lflag & L_CREATE)
814 fibril_rwlock_write_unlock(&namespace_rwlock);
815 else
816 fibril_rwlock_read_unlock(&namespace_rwlock);
817
818 /* Truncate the file if requested and if necessary. */
819 if (oflag & O_TRUNC) {
820 fibril_rwlock_write_lock(&node->contents_rwlock);
821 if (node->size) {
822 rc = vfs_truncate_internal(node->fs_handle,
823 node->service_id, node->index, 0);
824 if (rc) {
825 fibril_rwlock_write_unlock(&node->contents_rwlock);
826 vfs_node_put(node);
827 async_answer_0(rid, rc);
828 return;
829 }
830 node->size = 0;
831 }
832 fibril_rwlock_write_unlock(&node->contents_rwlock);
833 }
834
835 /*
836 * Get ourselves a file descriptor and the corresponding vfs_file_t
837 * structure.
838 */
839 int fd = vfs_fd_alloc((oflag & O_DESC) != 0);
840 if (fd < 0) {
841 vfs_node_put(node);
842 async_answer_0(rid, fd);
843 return;
844 }
845 vfs_file_t *file = vfs_file_get(fd);
846
847 /* FIXME: There is a potential race with another fibril of a malicious client. */
848 assert(file);
849
850 file->node = node;
851 if (oflag & O_RDONLY)
852 file->open_read = true;
853 if (oflag & O_WRONLY)
854 file->open_write = true;
855 if (oflag & O_RDWR)
856 file->open_read = file->open_write = true;
857 if (oflag & O_APPEND)
858 file->append = true;
859 assert(file->open_read || file->open_write);
860
861 /*
862 * The following increase in reference count is for the fact that the
863 * file is being opened and that a file structure is pointing to it.
864 * It is necessary so that the file will not disappear when
865 * vfs_node_put() is called. The reference will be dropped by the
866 * respective VFS_IN_CLOSE.
867 */
868 vfs_node_addref(node);
869 vfs_node_put(node);
870 vfs_file_put(file);
871
872 /* Success! Return the new file descriptor to the client. */
873 async_answer_1(rid, EOK, fd);
874}
875
876void vfs_sync(ipc_callid_t rid, ipc_call_t *request)
877{
878 int fd = IPC_GET_ARG1(*request);
879
880 /* Lookup the file structure corresponding to the file descriptor. */
881 vfs_file_t *file = vfs_file_get(fd);
882 if (!file) {
883 async_answer_0(rid, ENOENT);
884 return;
885 }
886
887 /*
888 * Lock the open file structure so that no other thread can manipulate
889 * the same open file at a time.
890 */
891 fibril_mutex_lock(&file->lock);
892 async_exch_t *fs_exch = vfs_exchange_grab(file->node->fs_handle);
893
894 /* Make a VFS_OUT_SYMC request at the destination FS server. */
895 aid_t msg;
896 ipc_call_t answer;
897 msg = async_send_2(fs_exch, VFS_OUT_SYNC, file->node->service_id,
898 file->node->index, &answer);
899
900 vfs_exchange_release(fs_exch);
901
902 /* Wait for reply from the FS server. */
903 sysarg_t rc;
904 async_wait_for(msg, &rc);
905
906 fibril_mutex_unlock(&file->lock);
907
908 vfs_file_put(file);
909 async_answer_0(rid, rc);
910}
911
912void vfs_close(ipc_callid_t rid, ipc_call_t *request)
913{
914 int fd = IPC_GET_ARG1(*request);
915 int ret = vfs_fd_free(fd);
916 async_answer_0(rid, ret);
917}
918
919static void vfs_rdwr(ipc_callid_t rid, ipc_call_t *request, bool read)
920{
921 /*
922 * The following code strongly depends on the fact that the files data
923 * structure can be only accessed by a single fibril and all file
924 * operations are serialized (i.e. the reads and writes cannot
925 * interleave and a file cannot be closed while it is being read).
926 *
927 * Additional synchronization needs to be added once the table of
928 * open files supports parallel access!
929 */
930
931 int fd = IPC_GET_ARG1(*request);
932
933 /* Lookup the file structure corresponding to the file descriptor. */
934 vfs_file_t *file = vfs_file_get(fd);
935 if (!file) {
936 async_answer_0(rid, ENOENT);
937 return;
938 }
939
940 /*
941 * Lock the open file structure so that no other thread can manipulate
942 * the same open file at a time.
943 */
944 fibril_mutex_lock(&file->lock);
945
946 if ((read && !file->open_read) || (!read && !file->open_write)) {
947 fibril_mutex_unlock(&file->lock);
948 async_answer_0(rid, EINVAL);
949 return;
950 }
951
952 vfs_info_t *fs_info = fs_handle_to_info(file->node->fs_handle);
953 assert(fs_info);
954
955 /*
956 * Lock the file's node so that no other client can read/write to it at
957 * the same time unless the FS supports concurrent reads/writes and its
958 * write implementation does not modify the file size.
959 */
960 if ((read) ||
961 ((fs_info->concurrent_read_write) && (fs_info->write_retains_size)))
962 fibril_rwlock_read_lock(&file->node->contents_rwlock);
963 else
964 fibril_rwlock_write_lock(&file->node->contents_rwlock);
965
966 if (file->node->type == VFS_NODE_DIRECTORY) {
967 /*
968 * Make sure that no one is modifying the namespace
969 * while we are in readdir().
970 */
971 assert(read);
972 fibril_rwlock_read_lock(&namespace_rwlock);
973 }
974
975 async_exch_t *fs_exch = vfs_exchange_grab(file->node->fs_handle);
976
977 /*
978 * Make a VFS_READ/VFS_WRITE request at the destination FS server
979 * and forward the IPC_M_DATA_READ/IPC_M_DATA_WRITE request to the
980 * destination FS server. The call will be routed as if sent by
981 * ourselves. Note that call arguments are immutable in this case so we
982 * don't have to bother.
983 */
984 sysarg_t rc;
985 ipc_call_t answer;
986 if (read) {
987 rc = async_data_read_forward_4_1(fs_exch, VFS_OUT_READ,
988 file->node->service_id, file->node->index,
989 LOWER32(file->pos), UPPER32(file->pos), &answer);
990 } else {
991 if (file->append)
992 file->pos = file->node->size;
993
994 rc = async_data_write_forward_4_1(fs_exch, VFS_OUT_WRITE,
995 file->node->service_id, file->node->index,
996 LOWER32(file->pos), UPPER32(file->pos), &answer);
997 }
998
999 vfs_exchange_release(fs_exch);
1000
1001 size_t bytes = IPC_GET_ARG1(answer);
1002
1003 if (file->node->type == VFS_NODE_DIRECTORY)
1004 fibril_rwlock_read_unlock(&namespace_rwlock);
1005
1006 /* Unlock the VFS node. */
1007 if ((read) ||
1008 ((fs_info->concurrent_read_write) && (fs_info->write_retains_size)))
1009 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
1010 else {
1011 /* Update the cached version of node's size. */
1012 if (rc == EOK)
1013 file->node->size = MERGE_LOUP32(IPC_GET_ARG2(answer),
1014 IPC_GET_ARG3(answer));
1015 fibril_rwlock_write_unlock(&file->node->contents_rwlock);
1016 }
1017
1018 /* Update the position pointer and unlock the open file. */
1019 if (rc == EOK)
1020 file->pos += bytes;
1021 fibril_mutex_unlock(&file->lock);
1022 vfs_file_put(file);
1023
1024 /*
1025 * FS server's reply is the final result of the whole operation we
1026 * return to the client.
1027 */
1028 async_answer_1(rid, rc, bytes);
1029}
1030
1031void vfs_read(ipc_callid_t rid, ipc_call_t *request)
1032{
1033 vfs_rdwr(rid, request, true);
1034}
1035
1036void vfs_write(ipc_callid_t rid, ipc_call_t *request)
1037{
1038 vfs_rdwr(rid, request, false);
1039}
1040
1041void vfs_seek(ipc_callid_t rid, ipc_call_t *request)
1042{
1043 int fd = (int) IPC_GET_ARG1(*request);
1044 off64_t off = (off64_t) MERGE_LOUP32(IPC_GET_ARG2(*request),
1045 IPC_GET_ARG3(*request));
1046 int whence = (int) IPC_GET_ARG4(*request);
1047
1048 /* Lookup the file structure corresponding to the file descriptor. */
1049 vfs_file_t *file = vfs_file_get(fd);
1050 if (!file) {
1051 async_answer_0(rid, ENOENT);
1052 return;
1053 }
1054
1055 fibril_mutex_lock(&file->lock);
1056
1057 off64_t newoff;
1058 switch (whence) {
1059 case SEEK_SET:
1060 if (off >= 0) {
1061 file->pos = (aoff64_t) off;
1062 fibril_mutex_unlock(&file->lock);
1063 vfs_file_put(file);
1064 async_answer_1(rid, EOK, off);
1065 return;
1066 }
1067 break;
1068 case SEEK_CUR:
1069 if ((off >= 0) && (file->pos + off < file->pos)) {
1070 fibril_mutex_unlock(&file->lock);
1071 vfs_file_put(file);
1072 async_answer_0(rid, EOVERFLOW);
1073 return;
1074 }
1075
1076 if ((off < 0) && (file->pos < (aoff64_t) -off)) {
1077 fibril_mutex_unlock(&file->lock);
1078 vfs_file_put(file);
1079 async_answer_0(rid, EOVERFLOW);
1080 return;
1081 }
1082
1083 file->pos += off;
1084 newoff = (file->pos > OFF64_MAX) ? OFF64_MAX : file->pos;
1085
1086 fibril_mutex_unlock(&file->lock);
1087 vfs_file_put(file);
1088 async_answer_2(rid, EOK, LOWER32(newoff),
1089 UPPER32(newoff));
1090 return;
1091 case SEEK_END:
1092 fibril_rwlock_read_lock(&file->node->contents_rwlock);
1093 aoff64_t size = file->node->size;
1094
1095 if ((off >= 0) && (size + off < size)) {
1096 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
1097 fibril_mutex_unlock(&file->lock);
1098 vfs_file_put(file);
1099 async_answer_0(rid, EOVERFLOW);
1100 return;
1101 }
1102
1103 if ((off < 0) && (size < (aoff64_t) -off)) {
1104 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
1105 fibril_mutex_unlock(&file->lock);
1106 vfs_file_put(file);
1107 async_answer_0(rid, EOVERFLOW);
1108 return;
1109 }
1110
1111 file->pos = size + off;
1112 newoff = (file->pos > OFF64_MAX) ? OFF64_MAX : file->pos;
1113
1114 fibril_rwlock_read_unlock(&file->node->contents_rwlock);
1115 fibril_mutex_unlock(&file->lock);
1116 vfs_file_put(file);
1117 async_answer_2(rid, EOK, LOWER32(newoff), UPPER32(newoff));
1118 return;
1119 }
1120
1121 fibril_mutex_unlock(&file->lock);
1122 vfs_file_put(file);
1123 async_answer_0(rid, EINVAL);
1124}
1125
1126int vfs_truncate_internal(fs_handle_t fs_handle, service_id_t service_id,
1127 fs_index_t index, aoff64_t size)
1128{
1129 async_exch_t *exch = vfs_exchange_grab(fs_handle);
1130 sysarg_t rc = async_req_4_0(exch, VFS_OUT_TRUNCATE,
1131 (sysarg_t) service_id, (sysarg_t) index, LOWER32(size),
1132 UPPER32(size));
1133 vfs_exchange_release(exch);
1134
1135 return (int) rc;
1136}
1137
1138void vfs_truncate(ipc_callid_t rid, ipc_call_t *request)
1139{
1140 int fd = IPC_GET_ARG1(*request);
1141 aoff64_t size = (aoff64_t) MERGE_LOUP32(IPC_GET_ARG2(*request),
1142 IPC_GET_ARG3(*request));
1143 int rc;
1144
1145 vfs_file_t *file = vfs_file_get(fd);
1146 if (!file) {
1147 async_answer_0(rid, ENOENT);
1148 return;
1149 }
1150 fibril_mutex_lock(&file->lock);
1151
1152 fibril_rwlock_write_lock(&file->node->contents_rwlock);
1153 rc = vfs_truncate_internal(file->node->fs_handle,
1154 file->node->service_id, file->node->index, size);
1155 if (rc == EOK)
1156 file->node->size = size;
1157 fibril_rwlock_write_unlock(&file->node->contents_rwlock);
1158
1159 fibril_mutex_unlock(&file->lock);
1160 vfs_file_put(file);
1161 async_answer_0(rid, (sysarg_t)rc);
1162}
1163
1164void vfs_fstat(ipc_callid_t rid, ipc_call_t *request)
1165{
1166 int fd = IPC_GET_ARG1(*request);
1167 sysarg_t rc;
1168
1169 vfs_file_t *file = vfs_file_get(fd);
1170 if (!file) {
1171 async_answer_0(rid, ENOENT);
1172 return;
1173 }
1174
1175 ipc_callid_t callid;
1176 if (!async_data_read_receive(&callid, NULL)) {
1177 vfs_file_put(file);
1178 async_answer_0(callid, EINVAL);
1179 async_answer_0(rid, EINVAL);
1180 return;
1181 }
1182
1183 fibril_mutex_lock(&file->lock);
1184
1185 async_exch_t *exch = vfs_exchange_grab(file->node->fs_handle);
1186
1187 aid_t msg;
1188 msg = async_send_3(exch, VFS_OUT_STAT, file->node->service_id,
1189 file->node->index, true, NULL);
1190 async_forward_fast(callid, exch, 0, 0, 0, IPC_FF_ROUTE_FROM_ME);
1191
1192 vfs_exchange_release(exch);
1193
1194 async_wait_for(msg, &rc);
1195
1196 fibril_mutex_unlock(&file->lock);
1197 vfs_file_put(file);
1198 async_answer_0(rid, rc);
1199}
1200
1201void vfs_stat(ipc_callid_t rid, ipc_call_t *request)
1202{
1203 char *path;
1204 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
1205 if (rc != EOK) {
1206 async_answer_0(rid, rc);
1207 return;
1208 }
1209
1210 ipc_callid_t callid;
1211 if (!async_data_read_receive(&callid, NULL)) {
1212 free(path);
1213 async_answer_0(callid, EINVAL);
1214 async_answer_0(rid, EINVAL);
1215 return;
1216 }
1217
1218 vfs_lookup_res_t lr;
1219 fibril_rwlock_read_lock(&namespace_rwlock);
1220 rc = vfs_lookup_internal(path, L_NONE, &lr, NULL);
1221 free(path);
1222 if (rc != EOK) {
1223 fibril_rwlock_read_unlock(&namespace_rwlock);
1224 async_answer_0(callid, rc);
1225 async_answer_0(rid, rc);
1226 return;
1227 }
1228 vfs_node_t *node = vfs_node_get(&lr);
1229 if (!node) {
1230 fibril_rwlock_read_unlock(&namespace_rwlock);
1231 async_answer_0(callid, ENOMEM);
1232 async_answer_0(rid, ENOMEM);
1233 return;
1234 }
1235
1236 fibril_rwlock_read_unlock(&namespace_rwlock);
1237
1238 async_exch_t *exch = vfs_exchange_grab(node->fs_handle);
1239
1240 aid_t msg;
1241 msg = async_send_3(exch, VFS_OUT_STAT, node->service_id,
1242 node->index, false, NULL);
1243 async_forward_fast(callid, exch, 0, 0, 0, IPC_FF_ROUTE_FROM_ME);
1244
1245 vfs_exchange_release(exch);
1246
1247 sysarg_t rv;
1248 async_wait_for(msg, &rv);
1249
1250 async_answer_0(rid, rv);
1251
1252 vfs_node_put(node);
1253}
1254
1255void vfs_mkdir(ipc_callid_t rid, ipc_call_t *request)
1256{
1257 int mode = IPC_GET_ARG1(*request);
1258
1259 char *path;
1260 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
1261 if (rc != EOK) {
1262 async_answer_0(rid, rc);
1263 return;
1264 }
1265
1266 /* Ignore mode for now. */
1267 (void) mode;
1268
1269 fibril_rwlock_write_lock(&namespace_rwlock);
1270 int lflag = L_DIRECTORY | L_CREATE | L_EXCLUSIVE;
1271 rc = vfs_lookup_internal(path, lflag, NULL, NULL);
1272 fibril_rwlock_write_unlock(&namespace_rwlock);
1273 free(path);
1274 async_answer_0(rid, rc);
1275}
1276
1277void vfs_unlink(ipc_callid_t rid, ipc_call_t *request)
1278{
1279 int lflag = IPC_GET_ARG1(*request);
1280
1281 char *path;
1282 int rc = async_data_write_accept((void **) &path, true, 0, 0, 0, NULL);
1283 if (rc != EOK) {
1284 async_answer_0(rid, rc);
1285 return;
1286 }
1287
1288 fibril_rwlock_write_lock(&namespace_rwlock);
1289 lflag &= L_DIRECTORY; /* sanitize lflag */
1290 vfs_lookup_res_t lr;
1291 rc = vfs_lookup_internal(path, lflag | L_UNLINK, &lr, NULL);
1292 free(path);
1293 if (rc != EOK) {
1294 fibril_rwlock_write_unlock(&namespace_rwlock);
1295 async_answer_0(rid, rc);
1296 return;
1297 }
1298
1299 /*
1300 * The name has already been unlinked by vfs_lookup_internal().
1301 * We have to get and put the VFS node to ensure that it is
1302 * VFS_OUT_DESTROY'ed after the last reference to it is dropped.
1303 */
1304 vfs_node_t *node = vfs_node_get(&lr);
1305 fibril_mutex_lock(&nodes_mutex);
1306 node->lnkcnt--;
1307 fibril_mutex_unlock(&nodes_mutex);
1308 fibril_rwlock_write_unlock(&namespace_rwlock);
1309 vfs_node_put(node);
1310 async_answer_0(rid, EOK);
1311}
1312
1313void vfs_rename(ipc_callid_t rid, ipc_call_t *request)
1314{
1315 /* Retrieve the old path. */
1316 char *old;
1317 int rc = async_data_write_accept((void **) &old, true, 0, 0, 0, NULL);
1318 if (rc != EOK) {
1319 async_answer_0(rid, rc);
1320 return;
1321 }
1322
1323 /* Retrieve the new path. */
1324 char *new;
1325 rc = async_data_write_accept((void **) &new, true, 0, 0, 0, NULL);
1326 if (rc != EOK) {
1327 free(old);
1328 async_answer_0(rid, rc);
1329 return;
1330 }
1331
1332 size_t olen;
1333 size_t nlen;
1334 char *oldc = canonify(old, &olen);
1335 char *newc = canonify(new, &nlen);
1336
1337 if ((!oldc) || (!newc)) {
1338 async_answer_0(rid, EINVAL);
1339 free(old);
1340 free(new);
1341 return;
1342 }
1343
1344 oldc[olen] = '\0';
1345 newc[nlen] = '\0';
1346
1347 if ((!str_lcmp(newc, oldc, str_length(oldc))) &&
1348 ((newc[str_length(oldc)] == '/') ||
1349 (str_length(oldc) == 1) ||
1350 (str_length(oldc) == str_length(newc)))) {
1351 /*
1352 * oldc is a prefix of newc and either
1353 * - newc continues with a / where oldc ends, or
1354 * - oldc was / itself, or
1355 * - oldc and newc are equal.
1356 */
1357 async_answer_0(rid, EINVAL);
1358 free(old);
1359 free(new);
1360 return;
1361 }
1362
1363 vfs_lookup_res_t old_lr;
1364 vfs_lookup_res_t new_lr;
1365 vfs_lookup_res_t new_par_lr;
1366 fibril_rwlock_write_lock(&namespace_rwlock);
1367
1368 /* Lookup the node belonging to the old file name. */
1369 rc = vfs_lookup_internal(oldc, L_NONE, &old_lr, NULL);
1370 if (rc != EOK) {
1371 fibril_rwlock_write_unlock(&namespace_rwlock);
1372 async_answer_0(rid, rc);
1373 free(old);
1374 free(new);
1375 return;
1376 }
1377
1378 vfs_node_t *old_node = vfs_node_get(&old_lr);
1379 if (!old_node) {
1380 fibril_rwlock_write_unlock(&namespace_rwlock);
1381 async_answer_0(rid, ENOMEM);
1382 free(old);
1383 free(new);
1384 return;
1385 }
1386
1387 /* Determine the path to the parent of the node with the new name. */
1388 char *parentc = str_dup(newc);
1389 if (!parentc) {
1390 fibril_rwlock_write_unlock(&namespace_rwlock);
1391 vfs_node_put(old_node);
1392 async_answer_0(rid, rc);
1393 free(old);
1394 free(new);
1395 return;
1396 }
1397
1398 char *lastsl = str_rchr(parentc + 1, '/');
1399 if (lastsl)
1400 *lastsl = '\0';
1401 else
1402 parentc[1] = '\0';
1403
1404 /* Lookup parent of the new file name. */
1405 rc = vfs_lookup_internal(parentc, L_NONE, &new_par_lr, NULL);
1406 free(parentc); /* not needed anymore */
1407 if (rc != EOK) {
1408 fibril_rwlock_write_unlock(&namespace_rwlock);
1409 vfs_node_put(old_node);
1410 async_answer_0(rid, rc);
1411 free(old);
1412 free(new);
1413 return;
1414 }
1415
1416 /* Check whether linking to the same file system instance. */
1417 if ((old_node->fs_handle != new_par_lr.triplet.fs_handle) ||
1418 (old_node->service_id != new_par_lr.triplet.service_id)) {
1419 fibril_rwlock_write_unlock(&namespace_rwlock);
1420 vfs_node_put(old_node);
1421 async_answer_0(rid, EXDEV); /* different file systems */
1422 free(old);
1423 free(new);
1424 return;
1425 }
1426
1427 /* Destroy the old link for the new name. */
1428 vfs_node_t *new_node = NULL;
1429 rc = vfs_lookup_internal(newc, L_UNLINK, &new_lr, NULL);
1430
1431 switch (rc) {
1432 case ENOENT:
1433 /* simply not in our way */
1434 break;
1435 case EOK:
1436 new_node = vfs_node_get(&new_lr);
1437 if (!new_node) {
1438 fibril_rwlock_write_unlock(&namespace_rwlock);
1439 vfs_node_put(old_node);
1440 async_answer_0(rid, ENOMEM);
1441 free(old);
1442 free(new);
1443 return;
1444 }
1445 fibril_mutex_lock(&nodes_mutex);
1446 new_node->lnkcnt--;
1447 fibril_mutex_unlock(&nodes_mutex);
1448 break;
1449 default:
1450 fibril_rwlock_write_unlock(&namespace_rwlock);
1451 vfs_node_put(old_node);
1452 async_answer_0(rid, ENOTEMPTY);
1453 free(old);
1454 free(new);
1455 return;
1456 }
1457
1458 /* Create the new link for the new name. */
1459 rc = vfs_lookup_internal(newc, L_LINK, NULL, NULL, old_node->index);
1460 if (rc != EOK) {
1461 fibril_rwlock_write_unlock(&namespace_rwlock);
1462 vfs_node_put(old_node);
1463 if (new_node)
1464 vfs_node_put(new_node);
1465 async_answer_0(rid, rc);
1466 free(old);
1467 free(new);
1468 return;
1469 }
1470
1471 fibril_mutex_lock(&nodes_mutex);
1472 old_node->lnkcnt++;
1473 fibril_mutex_unlock(&nodes_mutex);
1474
1475 /* Destroy the link for the old name. */
1476 rc = vfs_lookup_internal(oldc, L_UNLINK, NULL, NULL);
1477 if (rc != EOK) {
1478 fibril_rwlock_write_unlock(&namespace_rwlock);
1479 vfs_node_put(old_node);
1480 if (new_node)
1481 vfs_node_put(new_node);
1482 async_answer_0(rid, rc);
1483 free(old);
1484 free(new);
1485 return;
1486 }
1487
1488 fibril_mutex_lock(&nodes_mutex);
1489 old_node->lnkcnt--;
1490 fibril_mutex_unlock(&nodes_mutex);
1491 fibril_rwlock_write_unlock(&namespace_rwlock);
1492 vfs_node_put(old_node);
1493
1494 if (new_node)
1495 vfs_node_put(new_node);
1496
1497 free(old);
1498 free(new);
1499 async_answer_0(rid, EOK);
1500}
1501
1502void vfs_dup(ipc_callid_t rid, ipc_call_t *request)
1503{
1504 int oldfd = IPC_GET_ARG1(*request);
1505 int newfd = IPC_GET_ARG2(*request);
1506
1507 /* If the file descriptors are the same, do nothing. */
1508 if (oldfd == newfd) {
1509 async_answer_1(rid, EOK, newfd);
1510 return;
1511 }
1512
1513 /* Lookup the file structure corresponding to oldfd. */
1514 vfs_file_t *oldfile = vfs_file_get(oldfd);
1515 if (!oldfile) {
1516 async_answer_0(rid, EBADF);
1517 return;
1518 }
1519
1520 /*
1521 * Lock the open file structure so that no other thread can manipulate
1522 * the same open file at a time.
1523 */
1524 fibril_mutex_lock(&oldfile->lock);
1525
1526 /* Make sure newfd is closed. */
1527 (void) vfs_fd_free(newfd);
1528
1529 /* Assign the old file to newfd. */
1530 int ret = vfs_fd_assign(oldfile, newfd);
1531 fibril_mutex_unlock(&oldfile->lock);
1532 vfs_file_put(oldfile);
1533
1534 if (ret != EOK)
1535 async_answer_0(rid, ret);
1536 else
1537 async_answer_1(rid, EOK, newfd);
1538}
1539
1540void vfs_wait_handle(ipc_callid_t rid, ipc_call_t *request)
1541{
1542 int fd = vfs_wait_handle_internal();
1543 async_answer_1(rid, EOK, fd);
1544}
1545
1546void vfs_get_mtab(ipc_callid_t rid, ipc_call_t *request)
1547{
1548 ipc_callid_t callid;
1549 ipc_call_t data;
1550 sysarg_t rc = EOK;
1551 size_t len;
1552
1553 fibril_mutex_lock(&mtab_list_lock);
1554
1555 /* Send to the caller the number of mounted filesystems */
1556 callid = async_get_call(&data);
1557 if (IPC_GET_IMETHOD(data) != VFS_IN_PING) {
1558 rc = ENOTSUP;
1559 async_answer_0(callid, rc);
1560 goto exit;
1561 }
1562 async_answer_1(callid, EOK, mtab_size);
1563
1564 list_foreach(mtab_list, cur) {
1565 mtab_ent_t *mtab_ent = list_get_instance(cur, mtab_ent_t,
1566 link);
1567
1568 rc = ENOTSUP;
1569
1570 if (!async_data_read_receive(&callid, &len)) {
1571 async_answer_0(callid, rc);
1572 goto exit;
1573 }
1574
1575 (void) async_data_read_finalize(callid, mtab_ent->mp,
1576 str_size(mtab_ent->mp));
1577
1578 if (!async_data_read_receive(&callid, &len)) {
1579 async_answer_0(callid, rc);
1580 goto exit;
1581 }
1582
1583 (void) async_data_read_finalize(callid, mtab_ent->opts,
1584 str_size(mtab_ent->opts));
1585
1586 if (!async_data_read_receive(&callid, &len)) {
1587 async_answer_0(callid, rc);
1588 goto exit;
1589 }
1590
1591 (void) async_data_read_finalize(callid, mtab_ent->fs_name,
1592 str_size(mtab_ent->fs_name));
1593
1594 callid = async_get_call(&data);
1595
1596 if (IPC_GET_IMETHOD(data) != VFS_IN_PING) {
1597 async_answer_0(callid, rc);
1598 goto exit;
1599 }
1600
1601 rc = EOK;
1602 async_answer_2(callid, rc, mtab_ent->instance,
1603 mtab_ent->service_id);
1604 }
1605
1606exit:
1607 fibril_mutex_unlock(&mtab_list_lock);
1608 async_answer_0(rid, rc);
1609}
1610
1611/**
1612 * @}
1613 */
Note: See TracBrowser for help on using the repository browser.