2012-08-07 18:19:44 -04:00
|
|
|
/*******************************************************************************
|
|
|
|
|
2015-05-13 13:22:28 -04:00
|
|
|
Copyright(C) Jonas 'Sortie' Termansen 2012, 2013, 2014, 2015.
|
2012-08-07 18:19:44 -04:00
|
|
|
|
|
|
|
This file is part of Sortix.
|
|
|
|
|
|
|
|
Sortix is free software: you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation, either version 3 of the License, or (at your option) any later
|
|
|
|
version.
|
|
|
|
|
|
|
|
Sortix is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
|
|
|
FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
|
|
|
|
details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
Sortix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
descriptor.cpp
|
|
|
|
A file descriptor.
|
|
|
|
|
|
|
|
*******************************************************************************/
|
|
|
|
|
2013-10-26 20:42:10 -04:00
|
|
|
#include <sys/types.h>
|
|
|
|
|
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
2014-05-07 08:14:38 -04:00
|
|
|
#include <fsmarshall-msg.h>
|
2013-10-26 20:42:10 -04:00
|
|
|
#include <stdint.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
#include <sortix/dirent.h>
|
|
|
|
#include <sortix/fcntl.h>
|
2014-05-07 08:14:38 -04:00
|
|
|
#include <sortix/mount.h>
|
2012-08-07 18:19:44 -04:00
|
|
|
#include <sortix/seek.h>
|
|
|
|
#include <sortix/stat.h>
|
2013-10-26 20:42:10 -04:00
|
|
|
|
2014-05-07 08:14:38 -04:00
|
|
|
#include <sortix/kernel/copy.h>
|
2013-10-26 20:42:10 -04:00
|
|
|
#include <sortix/kernel/descriptor.h>
|
|
|
|
#include <sortix/kernel/fsfunc.h>
|
|
|
|
#include <sortix/kernel/inode.h>
|
|
|
|
#include <sortix/kernel/ioctx.h>
|
|
|
|
#include <sortix/kernel/kernel.h>
|
|
|
|
#include <sortix/kernel/kthread.h>
|
|
|
|
#include <sortix/kernel/process.h>
|
|
|
|
#include <sortix/kernel/refcount.h>
|
|
|
|
#include <sortix/kernel/string.h>
|
|
|
|
#include <sortix/kernel/vnode.h>
|
2012-08-07 18:19:44 -04:00
|
|
|
|
|
|
|
namespace Sortix {
|
|
|
|
|
2013-03-21 10:26:08 -04:00
|
|
|
// Flags for the various base modes to open a file in.
|
2014-10-26 19:17:34 -04:00
|
|
|
static const int ACCESS_FLAGS = O_READ | O_WRITE | O_EXEC | O_SEARCH;
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Flags that only make sense at open time.
|
2014-10-26 19:17:34 -04:00
|
|
|
static const int OPEN_FLAGS = O_CREATE | O_DIRECTORY | O_EXCL | O_TRUNC |
|
|
|
|
O_NOFOLLOW | O_SYMLINK_NOFOLLOW | O_NOCTTY |
|
|
|
|
O_TTY_INIT;
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Flags that only make sense for descriptors.
|
2014-10-26 19:17:34 -04:00
|
|
|
static const int DESCRIPTOR_FLAGS = O_APPEND | O_NONBLOCK;
|
2013-03-21 10:26:08 -04:00
|
|
|
|
2014-10-26 19:17:34 -04:00
|
|
|
bool LinkInodeInDir(ioctx_t* ctx,
|
|
|
|
Ref<Descriptor> dir,
|
|
|
|
const char* name,
|
2012-08-07 18:19:44 -04:00
|
|
|
Ref<Inode> inode)
|
|
|
|
{
|
|
|
|
Ref<Vnode> vnode(new Vnode(inode, Ref<Vnode>(), 0, 0));
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !vnode )
|
|
|
|
return false;
|
2012-08-07 18:19:44 -04:00
|
|
|
Ref<Descriptor> desc(new Descriptor(Ref<Vnode>(vnode), 0));
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !desc )
|
|
|
|
return false;
|
2012-08-07 18:19:44 -04:00
|
|
|
return dir->link(ctx, name, desc) != 0;
|
|
|
|
}
|
|
|
|
|
2014-10-26 19:17:34 -04:00
|
|
|
Ref<Descriptor> OpenDirContainingPath(ioctx_t* ctx,
|
|
|
|
Ref<Descriptor> from,
|
|
|
|
const char* path,
|
|
|
|
char** final_ptr)
|
2012-08-07 18:19:44 -04:00
|
|
|
{
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !path[0] )
|
|
|
|
return errno = EINVAL, Ref<Descriptor>();
|
2012-08-07 18:19:44 -04:00
|
|
|
char* dirpath;
|
|
|
|
char* final;
|
|
|
|
if ( !SplitFinalElem(path, &dirpath, &final) )
|
|
|
|
return Ref<Descriptor>();
|
|
|
|
// TODO: Removing trailing slashes in final may not the right thing.
|
2014-10-26 19:17:34 -04:00
|
|
|
size_t final_length = strlen(final);
|
|
|
|
while ( final_length && final[final_length-1] == '/' )
|
|
|
|
final[--final_length] = 0;
|
|
|
|
// There is room for a single character as final is not the empty string.
|
|
|
|
if ( !final_length )
|
|
|
|
{
|
|
|
|
final[0] = '.';
|
2012-08-07 18:19:44 -04:00
|
|
|
final[1] = '\0';
|
2014-10-26 19:17:34 -04:00
|
|
|
}
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !dirpath[0] )
|
|
|
|
{
|
|
|
|
delete[] dirpath;
|
2014-10-26 19:17:34 -04:00
|
|
|
*final_ptr = final;
|
2012-08-07 18:19:44 -04:00
|
|
|
return from;
|
|
|
|
}
|
2013-03-21 10:26:08 -04:00
|
|
|
Ref<Descriptor> ret = from->open(ctx, dirpath, O_READ | O_DIRECTORY, 0);
|
2012-08-07 18:19:44 -04:00
|
|
|
delete[] dirpath;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !ret )
|
|
|
|
return delete[] final, Ref<Descriptor>();
|
|
|
|
*final_ptr = final;
|
2012-08-07 18:19:44 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: Add security checks.
|
|
|
|
|
2014-05-07 08:14:38 -04:00
|
|
|
Descriptor::Descriptor()
|
|
|
|
{
|
|
|
|
current_offset_lock = KTHREAD_MUTEX_INITIALIZER;
|
|
|
|
this->vnode = Ref<Vnode>(NULL);
|
|
|
|
this->ino = 0;
|
|
|
|
this->dev = 0;
|
|
|
|
this->type = 0;
|
|
|
|
this->dflags = 0;
|
|
|
|
checked_seekable = false;
|
|
|
|
seekable = false /* unused */;
|
|
|
|
current_offset = 0;
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
Descriptor::Descriptor(Ref<Vnode> vnode, int dflags)
|
|
|
|
{
|
2014-10-26 19:17:34 -04:00
|
|
|
current_offset_lock = KTHREAD_MUTEX_INITIALIZER;
|
2014-05-07 08:14:38 -04:00
|
|
|
this->vnode = Ref<Vnode>(NULL);
|
|
|
|
this->ino = 0;
|
|
|
|
this->dev = 0;
|
|
|
|
this->type = 0;
|
|
|
|
this->dflags = 0;
|
|
|
|
checked_seekable = false;
|
|
|
|
seekable = false /* unused */;
|
|
|
|
current_offset = 0;
|
|
|
|
LateConstruct(vnode, dflags);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Descriptor::LateConstruct(Ref<Vnode> vnode, int dflags)
|
|
|
|
{
|
2012-08-07 18:19:44 -04:00
|
|
|
this->vnode = vnode;
|
|
|
|
this->ino = vnode->ino;
|
|
|
|
this->dev = vnode->dev;
|
|
|
|
this->type = vnode->type;
|
|
|
|
this->dflags = dflags;
|
|
|
|
}
|
|
|
|
|
|
|
|
Descriptor::~Descriptor()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2013-01-14 08:50:49 -05:00
|
|
|
bool Descriptor::SetFlags(int new_dflags)
|
|
|
|
{
|
|
|
|
// TODO: Hmm, there is race condition between changing the flags here and
|
|
|
|
// the code that uses the flags below. We could add a lock, but that
|
|
|
|
// would kinda prevent concurrency on the same file descriptor. Since
|
|
|
|
// the chances of this becoming a problem is rather slim (but could
|
|
|
|
// happen!), we'll do the unsafe thing for now. (See below also)
|
2014-01-16 14:44:18 -05:00
|
|
|
dflags = (dflags & ~DESCRIPTOR_FLAGS) | (new_dflags & DESCRIPTOR_FLAGS);
|
2013-01-14 08:50:49 -05:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::GetFlags()
|
|
|
|
{
|
|
|
|
// TODO: The race condition also applies here if the variable can change.
|
|
|
|
return dflags;
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
Ref<Descriptor> Descriptor::Fork()
|
|
|
|
{
|
2015-05-13 13:22:28 -04:00
|
|
|
ScopedLock lock(¤t_offset_lock);
|
2012-08-07 18:19:44 -04:00
|
|
|
Ref<Descriptor> ret(new Descriptor(vnode, dflags));
|
|
|
|
if ( !ret )
|
|
|
|
return Ref<Descriptor>();
|
2014-10-26 19:17:34 -04:00
|
|
|
ret->current_offset = current_offset;
|
2012-08-07 18:19:44 -04:00
|
|
|
ret->checked_seekable = checked_seekable;
|
|
|
|
ret->seekable = seekable;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Descriptor::IsSeekable()
|
|
|
|
{
|
2014-10-26 19:17:34 -04:00
|
|
|
ScopedLock lock(¤t_offset_lock);
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !checked_seekable )
|
|
|
|
{
|
|
|
|
// TODO: Is this enough? Check that errno happens to be ESPIPE?
|
2014-09-23 16:55:13 -04:00
|
|
|
int saved_errno = errno;
|
2012-08-07 18:19:44 -04:00
|
|
|
ioctx_t ctx; SetupKernelIOCtx(&ctx);
|
2014-10-26 19:17:34 -04:00
|
|
|
seekable = S_ISDIR(vnode->type) || 0 <= vnode->lseek(&ctx, SEEK_SET, 0);
|
2012-08-07 18:19:44 -04:00
|
|
|
checked_seekable = true;
|
2014-09-23 16:55:13 -04:00
|
|
|
errno = saved_errno;
|
2012-08-07 18:19:44 -04:00
|
|
|
}
|
|
|
|
return seekable;
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::sync(ioctx_t* ctx)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
// TODO: Possible denial-of-service attack if someone opens the file without
|
|
|
|
// that much rights and just syncs it a whole lot and slows down the
|
|
|
|
// system as a whole.
|
2012-08-07 18:19:44 -04:00
|
|
|
return vnode->sync(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::stat(ioctx_t* ctx, struct stat* st)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
// TODO: Possible information leak if not O_READ | O_WRITE and the caller
|
|
|
|
// is told about the file size.
|
2012-08-07 18:19:44 -04:00
|
|
|
return vnode->stat(ctx, st);
|
|
|
|
}
|
|
|
|
|
2014-01-20 18:53:18 -05:00
|
|
|
int Descriptor::statvfs(ioctx_t* ctx, struct statvfs* stvfs)
|
|
|
|
{
|
|
|
|
// TODO: Possible information leak if not O_READ | O_WRITE and the caller
|
|
|
|
// is told about the file size.
|
|
|
|
return vnode->statvfs(ctx, stvfs);
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
int Descriptor::chmod(ioctx_t* ctx, mode_t mode)
|
|
|
|
{
|
|
|
|
return vnode->chmod(ctx, mode);
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::chown(ioctx_t* ctx, uid_t owner, gid_t group)
|
|
|
|
{
|
|
|
|
return vnode->chown(ctx, owner, group);
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::truncate(ioctx_t* ctx, off_t length)
|
|
|
|
{
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( length < 0 )
|
|
|
|
return errno = EINVAL, -1;
|
2013-03-21 10:26:08 -04:00
|
|
|
if ( !(dflags & O_WRITE) )
|
|
|
|
return errno = EPERM, -1;
|
2012-08-07 18:19:44 -04:00
|
|
|
return vnode->truncate(ctx, length);
|
|
|
|
}
|
|
|
|
|
|
|
|
off_t Descriptor::lseek(ioctx_t* ctx, off_t offset, int whence)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
// TODO: Possible information leak to let someone without O_READ | O_WRITE
|
|
|
|
// seek the file and get information about data holes.
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !IsSeekable() )
|
|
|
|
return vnode->lseek(ctx, offset, whence);
|
2014-10-26 19:17:34 -04:00
|
|
|
|
|
|
|
ScopedLock lock(¤t_offset_lock);
|
2012-08-07 18:19:44 -04:00
|
|
|
off_t reloff;
|
|
|
|
if ( whence == SEEK_SET )
|
|
|
|
reloff = 0;
|
|
|
|
else if ( whence == SEEK_CUR )
|
2014-10-26 19:17:34 -04:00
|
|
|
reloff = current_offset;
|
2012-08-07 18:19:44 -04:00
|
|
|
else if ( whence == SEEK_END )
|
|
|
|
{
|
|
|
|
if ( (reloff = vnode->lseek(ctx, offset, SEEK_END)) < 0 )
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return errno = EINVAL, -1;
|
|
|
|
|
|
|
|
if ( offset < 0 && reloff + offset < 0 )
|
|
|
|
return errno = EOVERFLOW, -1;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( OFF_MAX - current_offset < offset )
|
2012-08-07 18:19:44 -04:00
|
|
|
return errno = EOVERFLOW, -1;
|
|
|
|
|
2014-10-26 19:17:34 -04:00
|
|
|
return current_offset = reloff + offset;
|
2012-08-07 18:19:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t Descriptor::read(ioctx_t* ctx, uint8_t* buf, size_t count)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
if ( !(dflags & O_READ) )
|
|
|
|
return errno = EPERM, -1;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !count )
|
|
|
|
return 0;
|
|
|
|
if ( SIZE_MAX < count )
|
|
|
|
count = SSIZE_MAX;
|
2013-03-31 11:18:42 -04:00
|
|
|
ctx->dflags = dflags;
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !IsSeekable() )
|
|
|
|
return vnode->read(ctx, buf, count);
|
2014-10-26 19:17:34 -04:00
|
|
|
ScopedLock lock(¤t_offset_lock);
|
|
|
|
ssize_t ret = vnode->pread(ctx, buf, count, current_offset);
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( 0 <= ret )
|
2014-10-26 19:17:34 -04:00
|
|
|
current_offset += ret;
|
2012-08-07 18:19:44 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t Descriptor::pread(ioctx_t* ctx, uint8_t* buf, size_t count, off_t off)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
if ( !(dflags & O_READ) )
|
|
|
|
return errno = EPERM, -1;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( off < 0 )
|
|
|
|
return errno = EINVAL, -1;
|
|
|
|
if ( !count )
|
|
|
|
return 0;
|
|
|
|
if ( SSIZE_MAX < count )
|
|
|
|
count = SSIZE_MAX;
|
2013-03-31 11:18:42 -04:00
|
|
|
ctx->dflags = dflags;
|
2012-08-07 18:19:44 -04:00
|
|
|
return vnode->pread(ctx, buf, count, off);
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t Descriptor::write(ioctx_t* ctx, const uint8_t* buf, size_t count)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
if ( !(dflags & O_WRITE) )
|
|
|
|
return errno = EPERM, -1;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !count )
|
|
|
|
return 0;
|
|
|
|
if ( SSIZE_MAX < count )
|
|
|
|
count = SSIZE_MAX;
|
2013-03-31 11:18:42 -04:00
|
|
|
ctx->dflags = dflags;
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !IsSeekable() )
|
|
|
|
return vnode->write(ctx, buf, count);
|
2014-10-26 19:17:34 -04:00
|
|
|
ScopedLock lock(¤t_offset_lock);
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( dflags & O_APPEND )
|
2014-10-26 19:17:34 -04:00
|
|
|
{
|
|
|
|
off_t end = vnode->lseek(ctx, 0, SEEK_END);
|
|
|
|
if ( end < 0 )
|
|
|
|
return -1;
|
|
|
|
current_offset = end;
|
|
|
|
}
|
|
|
|
ssize_t ret = vnode->pwrite(ctx, buf, count, current_offset);
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( 0 <= ret )
|
2014-10-26 19:17:34 -04:00
|
|
|
current_offset += ret;
|
2012-08-07 18:19:44 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t Descriptor::pwrite(ioctx_t* ctx, const uint8_t* buf, size_t count, off_t off)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
if ( !(dflags & O_WRITE) )
|
|
|
|
return errno = EPERM, -1;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( off < 0 )
|
|
|
|
return errno = EINVAL, -1;
|
|
|
|
if ( !count )
|
|
|
|
return 0;
|
|
|
|
if ( SSIZE_MAX < count )
|
|
|
|
count = SSIZE_MAX;
|
2013-03-31 11:18:42 -04:00
|
|
|
ctx->dflags = dflags;
|
2012-08-07 18:19:44 -04:00
|
|
|
return vnode->pwrite(ctx, buf, count, off);
|
|
|
|
}
|
|
|
|
|
2014-10-26 19:17:34 -04:00
|
|
|
int Descriptor::utimens(ioctx_t* ctx,
|
|
|
|
const struct timespec* atime,
|
2013-05-16 11:58:16 -04:00
|
|
|
const struct timespec* ctime,
|
|
|
|
const struct timespec* mtime)
|
2012-08-07 18:19:44 -04:00
|
|
|
{
|
2013-05-16 11:58:16 -04:00
|
|
|
return vnode->utimens(ctx, atime, ctime, mtime);
|
2012-08-07 18:19:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::isatty(ioctx_t* ctx)
|
|
|
|
{
|
|
|
|
return vnode->isatty(ctx);
|
|
|
|
}
|
|
|
|
|
2014-10-26 19:17:34 -04:00
|
|
|
ssize_t Descriptor::readdirents(ioctx_t* ctx,
|
|
|
|
struct kernel_dirent* dirent,
|
|
|
|
size_t size,
|
|
|
|
size_t maxcount)
|
2012-08-07 18:19:44 -04:00
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
// TODO: COMPATIBILITY HACK: Traditionally, you can open a directory with
|
|
|
|
// O_RDONLY and pass it to fdopendir and then use it, which doesn't
|
|
|
|
// set the needed O_SEARCH flag! I think some software even do it with
|
|
|
|
// write permissions! Currently, we just let you search the directory
|
|
|
|
// if you opened with any of the O_SEARCH, O_READ or O_WRITE flags.
|
|
|
|
// A better solution would be to make fdopendir try to add the
|
|
|
|
// O_SEARCH flag to the file descriptor. Or perhaps just recheck the
|
|
|
|
// permissions to search (execute) the directory manually every time,
|
|
|
|
// though that is less pure. Unfortunately, POSIX is pretty vague on
|
|
|
|
// how O_SEARCH should be interpreted and most existing Unix systems
|
|
|
|
// such as Linux doesn't even have that flag! And how about combining
|
|
|
|
// it with the O_EXEC flag - POSIX allows that and it makes sense
|
|
|
|
// because the execute bit on directories control search permission.
|
|
|
|
if ( !(dflags & (O_SEARCH | O_READ | O_WRITE)) )
|
|
|
|
return errno = EPERM, -1;
|
|
|
|
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !maxcount )
|
|
|
|
return 0;
|
|
|
|
if ( 1 < maxcount )
|
|
|
|
maxcount = 1;
|
|
|
|
if ( SSIZE_MAX < size )
|
|
|
|
size = SSIZE_MAX;
|
|
|
|
if ( size < sizeof(*dirent) )
|
|
|
|
return errno = EINVAL, -1;
|
|
|
|
ScopedLock lock(¤t_offset_lock);
|
|
|
|
ssize_t ret = vnode->readdirents(ctx, dirent, size, current_offset, maxcount);
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( ret == 0 )
|
|
|
|
{
|
|
|
|
const char* name = "";
|
2014-10-26 19:17:34 -04:00
|
|
|
size_t name_length = strlen(name);
|
|
|
|
size_t needed = sizeof(*dirent) + name_length + 1;
|
2012-08-07 18:19:44 -04:00
|
|
|
struct kernel_dirent retdirent;
|
|
|
|
memset(&retdirent, 0, sizeof(retdirent));
|
|
|
|
retdirent.d_reclen = needed;
|
2014-01-03 17:21:43 -05:00
|
|
|
retdirent.d_nextoff = 0;
|
2014-10-26 19:17:34 -04:00
|
|
|
retdirent.d_namlen = name_length;
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !ctx->copy_to_dest(dirent, &retdirent, sizeof(retdirent)) )
|
|
|
|
return -1;
|
|
|
|
if ( size < needed )
|
|
|
|
return errno = ERANGE, -1;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !ctx->copy_to_dest(dirent->d_name, name, name_length+1) )
|
2012-08-07 18:19:44 -04:00
|
|
|
return -1;
|
|
|
|
return needed;
|
|
|
|
}
|
|
|
|
if ( 0 < ret )
|
2014-10-26 19:17:34 -04:00
|
|
|
current_offset++;
|
2012-08-07 18:19:44 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-03-21 10:26:08 -04:00
|
|
|
static bool IsSaneFlagModeCombination(int flags, mode_t /*mode*/)
|
|
|
|
{
|
2013-09-27 08:44:52 -04:00
|
|
|
// It doesn't make sense to pass O_CREATE or O_TRUNC when attempting to open
|
2013-03-21 10:26:08 -04:00
|
|
|
// a directory. We also reject O_TRUNC | O_DIRECTORY early to prevent
|
|
|
|
// opening a directory, attempting to truncate it, and then aborting with an
|
|
|
|
// error because a directory was opened.
|
2013-09-27 08:44:52 -04:00
|
|
|
if ( (flags & (O_CREATE | O_TRUNC)) && (flags & (O_DIRECTORY)) )
|
2013-03-21 10:26:08 -04:00
|
|
|
return errno = EINVAL, false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool IsLastPathElement(const char* elem)
|
|
|
|
{
|
|
|
|
while ( !(*elem == '/' || *elem == '\0') )
|
|
|
|
elem++;
|
|
|
|
while ( *elem == '/' )
|
|
|
|
elem++;
|
|
|
|
return *elem == '\0';
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
Ref<Descriptor> Descriptor::open(ioctx_t* ctx, const char* filename, int flags,
|
|
|
|
mode_t mode)
|
|
|
|
{
|
2013-05-16 16:03:15 -04:00
|
|
|
Process* process = CurrentProcess();
|
|
|
|
kthread_mutex_lock(&process->idlock);
|
|
|
|
mode &= ~process->umask;
|
|
|
|
kthread_mutex_unlock(&process->idlock);
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !filename[0] )
|
|
|
|
return errno = ENOENT, Ref<Descriptor>();
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Reject some non-sensical flag combinations early.
|
|
|
|
if ( !IsSaneFlagModeCombination(flags, mode) )
|
2012-08-07 18:19:44 -04:00
|
|
|
return errno = EINVAL, Ref<Descriptor>();
|
2013-03-21 10:26:08 -04:00
|
|
|
|
2014-09-22 11:35:54 -04:00
|
|
|
char* filename_mine = NULL;
|
|
|
|
|
|
|
|
size_t symlink_iteration = 0;
|
|
|
|
const size_t MAX_SYMLINK_ITERATION = 20;
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
Ref<Descriptor> desc(this);
|
|
|
|
while ( filename[0] )
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
// Reaching a slash in the path means that the caller intended what came
|
|
|
|
// before to be a directory, stop the open call if it isn't.
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( filename[0] == '/' )
|
|
|
|
{
|
|
|
|
if ( !S_ISDIR(desc->type) )
|
2014-09-22 11:35:54 -04:00
|
|
|
return delete[] filename_mine, errno = ENOTDIR, Ref<Descriptor>();
|
2012-08-07 18:19:44 -04:00
|
|
|
filename++;
|
|
|
|
continue;
|
|
|
|
}
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Cut out the next path element from the input string.
|
2012-08-07 18:19:44 -04:00
|
|
|
size_t slashpos = strcspn(filename, "/");
|
|
|
|
char* elem = String::Substring(filename, 0, slashpos);
|
|
|
|
if ( !elem )
|
2014-09-22 11:35:54 -04:00
|
|
|
return delete[] filename_mine, Ref<Descriptor>();
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Decide how to open the next element in the path.
|
|
|
|
bool lastelem = IsLastPathElement(filename);
|
|
|
|
int open_flags = lastelem ? flags : O_READ | O_DIRECTORY;
|
2012-08-07 18:19:44 -04:00
|
|
|
mode_t open_mode = lastelem ? mode : 0;
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Open the next element in the path.
|
2012-08-07 18:19:44 -04:00
|
|
|
Ref<Descriptor> next = desc->open_elem(ctx, elem, open_flags, open_mode);
|
|
|
|
delete[] elem;
|
2013-03-21 10:26:08 -04:00
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !next )
|
2014-09-22 11:35:54 -04:00
|
|
|
return delete[] filename_mine, Ref<Descriptor>();
|
2013-03-21 10:26:08 -04:00
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
filename += slashpos;
|
2014-09-22 11:35:54 -04:00
|
|
|
|
|
|
|
bool want_the_symlink_itself = lastelem && (flags & O_SYMLINK_NOFOLLOW);
|
|
|
|
if ( S_ISLNK(next->type) && !want_the_symlink_itself )
|
|
|
|
{
|
|
|
|
if ( (flags & O_NOFOLLOW) && lastelem )
|
|
|
|
return delete[] filename_mine, errno = ELOOP, Ref<Descriptor>();
|
|
|
|
|
|
|
|
if ( symlink_iteration++ == MAX_SYMLINK_ITERATION )
|
|
|
|
return delete[] filename_mine, errno = ELOOP, Ref<Descriptor>();
|
|
|
|
|
|
|
|
ioctx_t kctx;
|
|
|
|
SetupKernelIOCtx(&kctx);
|
|
|
|
|
|
|
|
struct stat st;
|
|
|
|
if ( next->stat(&kctx, &st) < 0 )
|
|
|
|
return delete[] filename_mine, Ref<Descriptor>();
|
|
|
|
assert(0 <= st.st_size);
|
|
|
|
|
|
|
|
if ( (uintmax_t) SIZE_MAX <= (uintmax_t) st.st_size )
|
|
|
|
return delete[] filename_mine, Ref<Descriptor>();
|
|
|
|
|
|
|
|
size_t linkpath_length = (size_t) st.st_size;
|
|
|
|
char* linkpath = new char[linkpath_length + 1];
|
|
|
|
if ( !linkpath )
|
|
|
|
return delete[] filename_mine, Ref<Descriptor>();
|
|
|
|
|
|
|
|
ssize_t linkpath_ret = next->readlink(&kctx, linkpath, linkpath_length);
|
|
|
|
if ( linkpath_ret < 0 )
|
|
|
|
return delete[] linkpath, delete[] filename_mine, Ref<Descriptor>();
|
|
|
|
linkpath[linkpath_length] = '\0';
|
|
|
|
|
|
|
|
linkpath_length = strlen(linkpath);
|
|
|
|
if ( linkpath_length == 0 )
|
|
|
|
return delete[] linkpath, delete[] filename_mine,
|
|
|
|
errno = ENOENT, Ref<Descriptor>();
|
|
|
|
bool link_from_root = linkpath[0] == '/';
|
|
|
|
|
|
|
|
// Either filename is the empty string or starts with a slash.
|
|
|
|
size_t filename_length = strlen(filename);
|
|
|
|
// TODO: Avoid overflow here.
|
|
|
|
size_t new_filename_length = linkpath_length + filename_length;
|
|
|
|
char* new_filename = new char[new_filename_length + 1];
|
|
|
|
if ( !new_filename )
|
|
|
|
return delete[] linkpath, delete[] filename_mine,
|
|
|
|
errno = ENOENT, Ref<Descriptor>();
|
|
|
|
stpcpy(stpcpy(new_filename, linkpath), filename);
|
|
|
|
delete[] filename_mine;
|
|
|
|
filename = filename_mine = new_filename;
|
|
|
|
|
|
|
|
if ( link_from_root )
|
|
|
|
desc = CurrentProcess()->GetRoot();
|
|
|
|
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
desc = next;
|
2012-08-07 18:19:44 -04:00
|
|
|
}
|
2013-03-21 10:26:08 -04:00
|
|
|
|
2014-09-22 11:35:54 -04:00
|
|
|
delete[] filename_mine;
|
|
|
|
|
2013-03-21 10:26:08 -04:00
|
|
|
// Abort the open if the user wanted a directory but this wasn't.
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( flags & O_DIRECTORY && !S_ISDIR(desc->type) )
|
|
|
|
return errno = ENOTDIR, Ref<Descriptor>();
|
|
|
|
|
|
|
|
// TODO: The new file descriptor may not be opened with the correct
|
|
|
|
// permissions in the below case!
|
|
|
|
// If the path only contains slashes, we'll get outselves back, be sure to
|
|
|
|
// get ourselves back.
|
|
|
|
return desc == this ? Fork() : desc;
|
|
|
|
}
|
|
|
|
|
|
|
|
Ref<Descriptor> Descriptor::open_elem(ioctx_t* ctx, const char* filename,
|
|
|
|
int flags, mode_t mode)
|
|
|
|
{
|
|
|
|
assert(!strchr(filename, '/'));
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Verify that at least one of the base access modes are being used.
|
|
|
|
if ( !(flags & ACCESS_FLAGS) )
|
|
|
|
return errno = EINVAL, Ref<Descriptor>();
|
|
|
|
|
|
|
|
// Filter away flags that only make sense for descriptors.
|
|
|
|
int retvnode_flags = flags & ~DESCRIPTOR_FLAGS;
|
|
|
|
Ref<Vnode> retvnode = vnode->open(ctx, filename, retvnode_flags, mode);
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !retvnode )
|
|
|
|
return Ref<Descriptor>();
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Filter away flags that only made sense at during the open call.
|
|
|
|
int ret_flags = flags & ~OPEN_FLAGS;
|
|
|
|
Ref<Descriptor> ret(new Descriptor(retvnode, ret_flags));
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( !ret )
|
|
|
|
return Ref<Descriptor>();
|
2013-03-21 10:26:08 -04:00
|
|
|
|
|
|
|
// Truncate the file if requested.
|
|
|
|
// TODO: This is a bit dodgy, should this be moved to the inode open method
|
|
|
|
// or something? And how should error handling be done here?
|
2012-08-07 18:19:44 -04:00
|
|
|
if ( (flags & O_TRUNC) && S_ISREG(ret->type) )
|
2013-03-21 10:26:08 -04:00
|
|
|
if ( flags & O_WRITE )
|
2012-08-07 18:19:44 -04:00
|
|
|
ret->truncate(ctx, 0);
|
2013-03-21 10:26:08 -04:00
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::mkdir(ioctx_t* ctx, const char* filename, mode_t mode)
|
|
|
|
{
|
2013-05-16 16:03:15 -04:00
|
|
|
Process* process = CurrentProcess();
|
|
|
|
kthread_mutex_lock(&process->idlock);
|
|
|
|
mode &= ~process->umask;
|
|
|
|
kthread_mutex_unlock(&process->idlock);
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
char* final;
|
|
|
|
Ref<Descriptor> dir = OpenDirContainingPath(ctx, Ref<Descriptor>(this),
|
|
|
|
filename, &final);
|
|
|
|
if ( !dir )
|
|
|
|
return -1;
|
|
|
|
int ret = dir->vnode->mkdir(ctx, final, mode);
|
|
|
|
delete[] final;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::link(ioctx_t* ctx, const char* filename, Ref<Descriptor> node)
|
|
|
|
{
|
|
|
|
char* final;
|
|
|
|
Ref<Descriptor> dir = OpenDirContainingPath(ctx, Ref<Descriptor>(this),
|
|
|
|
filename, &final);
|
|
|
|
if ( !dir )
|
|
|
|
return -1;
|
|
|
|
int ret = dir->vnode->link(ctx, final, node->vnode);
|
|
|
|
delete[] final;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-05-13 12:49:31 -04:00
|
|
|
int Descriptor::unlinkat(ioctx_t* ctx, const char* filename, int flags)
|
2012-08-07 18:19:44 -04:00
|
|
|
{
|
2015-05-13 12:49:31 -04:00
|
|
|
if ( flags & ~(AT_REMOVEFILE | AT_REMOVEDIR) )
|
|
|
|
return errno = EINVAL, -1;
|
|
|
|
if ( !(flags & (AT_REMOVEFILE | AT_REMOVEDIR)) )
|
|
|
|
flags |= AT_REMOVEFILE;
|
2012-08-07 18:19:44 -04:00
|
|
|
char* final;
|
|
|
|
Ref<Descriptor> dir = OpenDirContainingPath(ctx, Ref<Descriptor>(this),
|
|
|
|
filename, &final);
|
|
|
|
if ( !dir )
|
|
|
|
return -1;
|
2015-05-13 12:49:31 -04:00
|
|
|
int ret = -1;
|
|
|
|
if ( ret < 0 && (flags & AT_REMOVEFILE) )
|
|
|
|
ret = dir->vnode->unlink(ctx, final);
|
|
|
|
if ( ret < 0 && (flags & AT_REMOVEDIR) )
|
|
|
|
ret = dir->vnode->rmdir(ctx, final);
|
2012-08-07 18:19:44 -04:00
|
|
|
delete[] final;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::symlink(ioctx_t* ctx, const char* oldname, const char* filename)
|
|
|
|
{
|
|
|
|
char* final;
|
|
|
|
Ref<Descriptor> dir = OpenDirContainingPath(ctx, Ref<Descriptor>(this),
|
|
|
|
filename, &final);
|
|
|
|
if ( !dir )
|
|
|
|
return -1;
|
|
|
|
int ret = dir->vnode->symlink(ctx, oldname, final);
|
|
|
|
delete[] final;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-12-20 10:19:07 -05:00
|
|
|
int Descriptor::rename_here(ioctx_t* ctx, Ref<Descriptor> from,
|
|
|
|
const char* oldpath, const char* newpath)
|
|
|
|
{
|
|
|
|
char* olddir_elem;
|
|
|
|
char* newdir_elem;
|
|
|
|
Ref<Descriptor> olddir = OpenDirContainingPath(ctx, from, oldpath,
|
|
|
|
&olddir_elem);
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !olddir )
|
|
|
|
return -1;
|
2012-12-20 10:19:07 -05:00
|
|
|
|
|
|
|
Ref<Descriptor> newdir = OpenDirContainingPath(ctx, Ref<Descriptor>(this),
|
|
|
|
newpath, &newdir_elem);
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( !newdir )
|
|
|
|
return delete[] olddir_elem, -1;
|
2012-12-20 10:19:07 -05:00
|
|
|
|
|
|
|
int ret = newdir->vnode->rename_here(ctx, olddir->vnode, olddir_elem,
|
|
|
|
newdir_elem);
|
|
|
|
|
|
|
|
delete[] newdir_elem;
|
|
|
|
delete[] olddir_elem;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
ssize_t Descriptor::readlink(ioctx_t* ctx, char* buf, size_t bufsize)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
if ( !(dflags & O_READ) )
|
|
|
|
return errno = EPERM, -1;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( SSIZE_MAX < bufsize )
|
|
|
|
bufsize = SSIZE_MAX;
|
2012-08-07 18:19:44 -04:00
|
|
|
return vnode->readlink(ctx, buf, bufsize);
|
|
|
|
}
|
|
|
|
|
2013-12-20 15:55:05 -05:00
|
|
|
int Descriptor::tcgetwincurpos(ioctx_t* ctx, struct wincurpos* wcp)
|
|
|
|
{
|
|
|
|
return vnode->tcgetwincurpos(ctx, wcp);
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
int Descriptor::tcgetwinsize(ioctx_t* ctx, struct winsize* ws)
|
|
|
|
{
|
|
|
|
return vnode->tcgetwinsize(ctx, ws);
|
|
|
|
}
|
|
|
|
|
2013-06-11 20:18:07 -04:00
|
|
|
int Descriptor::tcsetpgrp(ioctx_t* ctx, pid_t pgid)
|
|
|
|
{
|
|
|
|
return vnode->tcsetpgrp(ctx, pgid);
|
|
|
|
}
|
|
|
|
|
|
|
|
pid_t Descriptor::tcgetpgrp(ioctx_t* ctx)
|
|
|
|
{
|
|
|
|
return vnode->tcgetpgrp(ctx);
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
int Descriptor::settermmode(ioctx_t* ctx, unsigned mode)
|
|
|
|
{
|
|
|
|
return vnode->settermmode(ctx, mode);
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::gettermmode(ioctx_t* ctx, unsigned* mode)
|
|
|
|
{
|
|
|
|
return vnode->gettermmode(ctx, mode);
|
|
|
|
}
|
|
|
|
|
2012-12-29 17:09:09 -05:00
|
|
|
int Descriptor::poll(ioctx_t* ctx, PollNode* node)
|
|
|
|
{
|
2013-03-21 10:26:08 -04:00
|
|
|
// TODO: Perhaps deny polling against some kind of events if this
|
|
|
|
// descriptor's dflags would reject doing these operations?
|
2012-12-29 17:09:09 -05:00
|
|
|
return vnode->poll(ctx, node);
|
|
|
|
}
|
|
|
|
|
2013-03-19 17:40:37 -04:00
|
|
|
Ref<Descriptor> Descriptor::accept(ioctx_t* ctx, uint8_t* addr, size_t* addrlen, int flags)
|
|
|
|
{
|
|
|
|
Ref<Vnode> retvnode = vnode->accept(ctx, addr, addrlen, flags);
|
|
|
|
if ( !retvnode )
|
|
|
|
return Ref<Descriptor>();
|
|
|
|
return Ref<Descriptor>(new Descriptor(retvnode, O_READ | O_WRITE));
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::bind(ioctx_t* ctx, const uint8_t* addr, size_t addrlen)
|
|
|
|
{
|
|
|
|
return vnode->bind(ctx, addr, addrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::connect(ioctx_t* ctx, const uint8_t* addr, size_t addrlen)
|
|
|
|
{
|
|
|
|
return vnode->connect(ctx, addr, addrlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::listen(ioctx_t* ctx, int backlog)
|
|
|
|
{
|
|
|
|
return vnode->listen(ctx, backlog);
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t Descriptor::recv(ioctx_t* ctx, uint8_t* buf, size_t count, int flags)
|
|
|
|
{
|
|
|
|
return vnode->recv(ctx, buf, count, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t Descriptor::send(ioctx_t* ctx, const uint8_t* buf, size_t count, int flags)
|
|
|
|
{
|
|
|
|
return vnode->send(ctx, buf, count, flags);
|
|
|
|
}
|
|
|
|
|
2014-02-28 11:10:08 -05:00
|
|
|
int Descriptor::getsockopt(ioctx_t* ctx, int level, int option_name,
|
|
|
|
void* option_value, size_t* option_size_ptr)
|
|
|
|
{
|
|
|
|
return vnode->getsockopt(ctx, level, option_name, option_value, option_size_ptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::setsockopt(ioctx_t* ctx, int level, int option_name,
|
|
|
|
const void* option_value, size_t option_size)
|
|
|
|
{
|
|
|
|
return vnode->setsockopt(ctx, level, option_name, option_value, option_size);
|
|
|
|
}
|
|
|
|
|
2014-05-05 15:36:40 -04:00
|
|
|
ssize_t Descriptor::tcgetblob(ioctx_t* ctx, const char* name, void* buffer, size_t count)
|
|
|
|
{
|
|
|
|
if ( name && !name[0] )
|
|
|
|
name = NULL;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( SSIZE_MAX < count )
|
|
|
|
count = SSIZE_MAX;
|
2014-05-05 15:36:40 -04:00
|
|
|
return vnode->tcgetblob(ctx, name, buffer, count);
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t Descriptor::tcsetblob(ioctx_t* ctx, const char* name, const void* buffer, size_t count)
|
|
|
|
{
|
|
|
|
if ( name && !name[0] )
|
|
|
|
name = NULL;
|
2014-10-26 19:17:34 -04:00
|
|
|
if ( SSIZE_MAX < count )
|
2014-05-05 15:36:40 -04:00
|
|
|
return errno = EFBIG, -1;
|
|
|
|
return vnode->tcsetblob(ctx, name, buffer, count);
|
|
|
|
}
|
|
|
|
|
2014-05-07 08:14:38 -04:00
|
|
|
int Descriptor::unmount(ioctx_t* ctx, const char* filename, int flags)
|
|
|
|
{
|
|
|
|
if ( flags & ~(UNMOUNT_FORCE | UNMOUNT_DETACH | UNMOUNT_NOFOLLOW) )
|
|
|
|
return errno = EINVAL, -1;
|
|
|
|
int subflags = flags & ~(UNMOUNT_NOFOLLOW);
|
|
|
|
char* final;
|
|
|
|
// TODO: This may follow a symlink when not supposed to!
|
|
|
|
Ref<Descriptor> dir =
|
|
|
|
OpenDirContainingPath(ctx, Ref<Descriptor>(this), filename, &final);
|
|
|
|
if ( !dir )
|
|
|
|
return -1;
|
|
|
|
if ( !(flags & UNMOUNT_NOFOLLOW) )
|
|
|
|
{
|
|
|
|
// TODO: Potentially follow a symlink here!
|
|
|
|
}
|
|
|
|
int ret = dir->vnode->unmount(ctx, final, subflags);
|
|
|
|
delete[] final;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int Descriptor::fsm_fsbind(ioctx_t* ctx, Ref<Descriptor> target, int flags)
|
|
|
|
{
|
|
|
|
return vnode->fsm_fsbind(ctx, target->vnode, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
Ref<Descriptor> Descriptor::fsm_mount(ioctx_t* ctx,
|
|
|
|
const char* filename,
|
|
|
|
const struct stat* rootst,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
if ( flags & ~(FSM_MOUNT_NOFOLLOW | FSM_MOUNT_NONBLOCK) )
|
|
|
|
return errno = EINVAL, Ref<Descriptor>(NULL);
|
|
|
|
int result_dflags = O_READ | O_WRITE;
|
|
|
|
if ( flags & FSM_MOUNT_NOFOLLOW ) result_dflags |= O_NONBLOCK;
|
|
|
|
int subflags = flags & ~(FSM_MOUNT_NOFOLLOW | FSM_MOUNT_NONBLOCK);
|
|
|
|
char* final;
|
|
|
|
// TODO: This may follow a symlink when not supposed to!
|
|
|
|
Ref<Descriptor> dir =
|
|
|
|
OpenDirContainingPath(ctx, Ref<Descriptor>(this), filename, &final);
|
|
|
|
if ( !dir )
|
|
|
|
return errno = EINVAL, Ref<Descriptor>(NULL);
|
|
|
|
if ( !(flags & FSM_MOUNT_NOFOLLOW) )
|
|
|
|
{
|
|
|
|
// TODO: Potentially follow a symlink here!
|
|
|
|
}
|
|
|
|
Ref<Descriptor> result(new Descriptor());
|
|
|
|
if ( !result )
|
|
|
|
return Ref<Descriptor>(NULL);
|
|
|
|
Ref<Vnode> result_vnode = dir->vnode->fsm_mount(ctx, final, rootst, subflags);
|
|
|
|
delete[] final;
|
|
|
|
if ( !result_vnode )
|
|
|
|
return Ref<Descriptor>(NULL);
|
|
|
|
result->LateConstruct(result_vnode, result_dflags);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2012-08-07 18:19:44 -04:00
|
|
|
} // namespace Sortix
|