Subversion Repositories HelenOS

Rev

Rev 2732 | Rev 2735 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed

Rev 2732 Rev 2733
1
/*
1
/*
2
 * Copyright (c) 2008 Jakub Jermar
2
 * Copyright (c) 2008 Jakub Jermar
3
 * All rights reserved.
3
 * All rights reserved.
4
 *
4
 *
5
 * Redistribution and use in source and binary forms, with or without
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
6
 * modification, are permitted provided that the following conditions
7
 * are met:
7
 * are met:
8
 *
8
 *
9
 * - Redistributions of source code must retain the above copyright
9
 * - Redistributions of source code must retain the above copyright
10
 *   notice, this list of conditions and the following disclaimer.
10
 *   notice, this list of conditions and the following disclaimer.
11
 * - Redistributions in binary form must reproduce the above copyright
11
 * - Redistributions in binary form must reproduce the above copyright
12
 *   notice, this list of conditions and the following disclaimer in the
12
 *   notice, this list of conditions and the following disclaimer in the
13
 *   documentation and/or other materials provided with the distribution.
13
 *   documentation and/or other materials provided with the distribution.
14
 * - The name of the author may not be used to endorse or promote products
14
 * - The name of the author may not be used to endorse or promote products
15
 *   derived from this software without specific prior written permission.
15
 *   derived from this software without specific prior written permission.
16
 *
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
 */
27
 */
28
 
28
 
29
/** @addtogroup fs
29
/** @addtogroup fs
30
 * @{
30
 * @{
31
 */
31
 */
32
 
32
 
33
/**
33
/**
34
 * @file    tmpfs_ops.c
34
 * @file    tmpfs_ops.c
35
 * @brief   Implementation of VFS operations for the TMPFS file system
35
 * @brief   Implementation of VFS operations for the TMPFS file system
36
 *      server.
36
 *      server.
37
 */
37
 */
38
 
38
 
39
#include "tmpfs.h"
39
#include "tmpfs.h"
40
#include "../../vfs/vfs.h"
40
#include "../../vfs/vfs.h"
41
#include <ipc/ipc.h>
41
#include <ipc/ipc.h>
42
#include <async.h>
42
#include <async.h>
43
#include <errno.h>
43
#include <errno.h>
44
#include <atomic.h>
44
#include <atomic.h>
45
#include <stdlib.h>
45
#include <stdlib.h>
46
#include <string.h>
46
#include <string.h>
47
#include <stdio.h>
47
#include <stdio.h>
48
#include <dirent.h>
48
#include <dirent.h>
49
#include <assert.h>
49
#include <assert.h>
50
#include <sys/types.h>
50
#include <sys/types.h>
51
#include <libadt/hash_table.h>
51
#include <libadt/hash_table.h>
52
#include <as.h>
52
#include <as.h>
53
 
53
 
54
#define min(a, b)       ((a) < (b) ? (a) : (b))
54
#define min(a, b)       ((a) < (b) ? (a) : (b))
55
#define max(a, b)       ((a) > (b) ? (a) : (b))
55
#define max(a, b)       ((a) > (b) ? (a) : (b))
56
 
56
 
57
#define PLB_GET_CHAR(i)     (tmpfs_reg.plb_ro[(i) % PLB_SIZE])
57
#define PLB_GET_CHAR(i)     (tmpfs_reg.plb_ro[(i) % PLB_SIZE])
58
 
58
 
59
#define DENTRIES_BUCKETS    256
59
#define DENTRIES_BUCKETS    256
60
 
60
 
61
#define TMPFS_GET_INDEX(x)  (((tmpfs_dentry_t *)(x))->index)
61
#define TMPFS_GET_INDEX(x)  (((tmpfs_dentry_t *)(x))->index)
62
#define TMPFS_GET_LNKCNT(x) 1
62
#define TMPFS_GET_LNKCNT(x) 1
63
 
63
 
64
/*
64
/*
65
 * Hash table of all directory entries.
65
 * Hash table of all directory entries.
66
 */
66
 */
67
hash_table_t dentries;
67
hash_table_t dentries;
68
 
68
 
69
static hash_index_t dentries_hash(unsigned long *key)
69
static hash_index_t dentries_hash(unsigned long *key)
70
{
70
{
71
    return *key % DENTRIES_BUCKETS;
71
    return *key % DENTRIES_BUCKETS;
72
}
72
}
73
 
73
 
74
static int dentries_compare(unsigned long *key, hash_count_t keys,
74
static int dentries_compare(unsigned long *key, hash_count_t keys,
75
    link_t *item)
75
    link_t *item)
76
{
76
{
77
    tmpfs_dentry_t *dentry = hash_table_get_instance(item, tmpfs_dentry_t,
77
    tmpfs_dentry_t *dentry = hash_table_get_instance(item, tmpfs_dentry_t,
78
        dh_link);
78
        dh_link);
79
    return dentry->index == *key;
79
    return dentry->index == *key;
80
}
80
}
81
 
81
 
82
static void dentries_remove_callback(link_t *item)
82
static void dentries_remove_callback(link_t *item)
83
{
83
{
84
}
84
}
85
 
85
 
86
/** TMPFS dentries hash table operations. */
86
/** TMPFS dentries hash table operations. */
87
hash_table_operations_t dentries_ops = {
87
hash_table_operations_t dentries_ops = {
88
    .hash = dentries_hash,
88
    .hash = dentries_hash,
89
    .compare = dentries_compare,
89
    .compare = dentries_compare,
90
    .remove_callback = dentries_remove_callback
90
    .remove_callback = dentries_remove_callback
91
};
91
};
92
 
92
 
93
unsigned tmpfs_next_index = 1;
93
unsigned tmpfs_next_index = 1;
94
 
94
 
95
static void tmpfs_dentry_initialize(tmpfs_dentry_t *dentry)
95
static void tmpfs_dentry_initialize(tmpfs_dentry_t *dentry)
96
{
96
{
97
    dentry->index = 0;
97
    dentry->index = 0;
98
    dentry->parent = NULL;
98
    dentry->parent = NULL;
99
    dentry->sibling = NULL;
99
    dentry->sibling = NULL;
100
    dentry->child = NULL;
100
    dentry->child = NULL;
101
    dentry->name = NULL;
101
    dentry->name = NULL;
102
    dentry->type = TMPFS_NONE;
102
    dentry->type = TMPFS_NONE;
103
    dentry->size = 0;
103
    dentry->size = 0;
104
    dentry->data = NULL;
104
    dentry->data = NULL;
105
    link_initialize(&dentry->dh_link);
105
    link_initialize(&dentry->dh_link);
106
}
106
}
107
 
107
 
108
/*
108
/*
109
 * For now, we don't distinguish between different dev_handles/instances. All
109
 * For now, we don't distinguish between different dev_handles/instances. All
110
 * requests resolve to the only instance, rooted in the following variable.
110
 * requests resolve to the only instance, rooted in the following variable.
111
 */
111
 */
112
static tmpfs_dentry_t *root;
112
static tmpfs_dentry_t *root;
113
 
113
 
114
static bool tmpfs_init(void)
114
static bool tmpfs_init(void)
115
{
115
{
116
    if (!hash_table_create(&dentries, DENTRIES_BUCKETS, 1, &dentries_ops))
116
    if (!hash_table_create(&dentries, DENTRIES_BUCKETS, 1, &dentries_ops))
117
        return false;
117
        return false;
118
 
118
 
119
    root = (tmpfs_dentry_t *) malloc(sizeof(tmpfs_dentry_t));
119
    root = (tmpfs_dentry_t *) malloc(sizeof(tmpfs_dentry_t));
120
    if (!root)
120
    if (!root)
121
        return false;
121
        return false;
122
    tmpfs_dentry_initialize(root);
122
    tmpfs_dentry_initialize(root);
123
    root->index = tmpfs_next_index++;
123
    root->index = tmpfs_next_index++;
124
    root->name = "";
124
    root->name = "";
125
    root->type = TMPFS_DIRECTORY;
125
    root->type = TMPFS_DIRECTORY;
126
    hash_table_insert(&dentries, &root->index, &root->dh_link);
126
    hash_table_insert(&dentries, &root->index, &root->dh_link);
127
 
127
 
128
    return true;
128
    return true;
129
}
129
}
130
 
130
 
131
/** Compare one component of path to a directory entry.
131
/** Compare one component of path to a directory entry.
132
 *
132
 *
133
 * @param nodep     Node to compare the path component with.
133
 * @param nodep     Node to compare the path component with.
134
 * @param component Array of characters holding component name.
134
 * @param component Array of characters holding component name.
135
 *
135
 *
136
 * @return      True on match, false otherwise.
136
 * @return      True on match, false otherwise.
137
 */
137
 */
138
static bool match_component(void *nodep, const char *component)
138
static bool match_component(void *nodep, const char *component)
139
{
139
{
140
    tmpfs_dentry_t *dentry = (tmpfs_dentry_t *) nodep;
140
    tmpfs_dentry_t *dentry = (tmpfs_dentry_t *) nodep;
141
 
141
 
142
    return !strcmp(dentry->name, component);
142
    return !strcmp(dentry->name, component);
143
}
143
}
144
 
144
 
145
static void *create_node(void *nodep,
145
static void *create_node(void *nodep,
146
    const char *component, int lflag)
146
    const char *component, int lflag)
147
{
147
{
148
    tmpfs_dentry_t *dentry = (tmpfs_dentry_t *) nodep;
148
    tmpfs_dentry_t *dentry = (tmpfs_dentry_t *) nodep;
149
 
149
 
150
    assert(dentry->type == TMPFS_DIRECTORY);
150
    assert(dentry->type == TMPFS_DIRECTORY);
151
    assert((lflag & L_FILE) ^ (lflag & L_DIRECTORY));
151
    assert((lflag & L_FILE) ^ (lflag & L_DIRECTORY));
152
 
152
 
153
    tmpfs_dentry_t *node = malloc(sizeof(tmpfs_dentry_t));
153
    tmpfs_dentry_t *node = malloc(sizeof(tmpfs_dentry_t));
154
    if (!node)
154
    if (!node)
155
        return NULL;
155
        return NULL;
156
    size_t len = strlen(component);
156
    size_t len = strlen(component);
157
    char *name = malloc(len + 1);
157
    char *name = malloc(len + 1);
158
    if (!name) {
158
    if (!name) {
159
        free(node);
159
        free(node);
160
        return NULL;
160
        return NULL;
161
    }
161
    }
162
    strcpy(name, component);
162
    strcpy(name, component);
163
 
163
 
164
    tmpfs_dentry_initialize(node);
164
    tmpfs_dentry_initialize(node);
165
    node->index = tmpfs_next_index++;
165
    node->index = tmpfs_next_index++;
166
    node->name = name;
166
    node->name = name;
167
    node->parent = dentry;
167
    node->parent = dentry;
168
    if (lflag & L_DIRECTORY)
168
    if (lflag & L_DIRECTORY)
169
        node->type = TMPFS_DIRECTORY;
169
        node->type = TMPFS_DIRECTORY;
170
    else
170
    else
171
        node->type = TMPFS_FILE;
171
        node->type = TMPFS_FILE;
172
 
172
 
173
    /* Insert the new node into the namespace. */
173
    /* Insert the new node into the namespace. */
174
    if (dentry->child) {
174
    if (dentry->child) {
175
        tmpfs_dentry_t *tmp = dentry->child;
175
        tmpfs_dentry_t *tmp = dentry->child;
176
        while (tmp->sibling)
176
        while (tmp->sibling)
177
            tmp = tmp->sibling;
177
            tmp = tmp->sibling;
178
        tmp->sibling = node;
178
        tmp->sibling = node;
179
    } else {
179
    } else {
180
        dentry->child = node;
180
        dentry->child = node;
181
    }
181
    }
182
 
182
 
183
    /* Insert the new node into the dentry hash table. */
183
    /* Insert the new node into the dentry hash table. */
184
    hash_table_insert(&dentries, &node->index, &node->dh_link);
184
    hash_table_insert(&dentries, &node->index, &node->dh_link);
185
    return (void *) node;
185
    return (void *) node;
186
}
186
}
187
 
187
 
188
static int destroy_component(void *nodeptr)
188
static int destroy_component(void *nodeptr)
189
{
189
{
-
 
190
    tmpfs_dentry_t *dentry = (tmpfs_dentry_t *)nodeptr;
-
 
191
 
-
 
192
    if (dentry->child)
-
 
193
        return ENOTEMPTY;
-
 
194
 
-
 
195
    if (!dentry->parent)
-
 
196
        return EBUSY;
-
 
197
 
-
 
198
    if (dentry->parent->child == dentry) {
-
 
199
        dentry->parent->child = dentry->sibling;
-
 
200
    } else {
-
 
201
        /* TODO: consider doubly linked list for organizing siblings. */
-
 
202
        tmpfs_dentry_t *tmp = dentry->parent->child;
-
 
203
        while (tmp->sibling != dentry)
-
 
204
            tmp = tmp->sibling;
-
 
205
        tmp->sibling = dentry->sibling;
-
 
206
    }
-
 
207
 
190
    return EPERM;
208
    return EOK;
191
}
209
}
192
 
210
 
193
void tmpfs_lookup(ipc_callid_t rid, ipc_call_t *request)
211
void tmpfs_lookup(ipc_callid_t rid, ipc_call_t *request)
194
{
212
{
195
    unsigned next = IPC_GET_ARG1(*request);
213
    unsigned next = IPC_GET_ARG1(*request);
196
    unsigned last = IPC_GET_ARG2(*request);
214
    unsigned last = IPC_GET_ARG2(*request);
197
    int dev_handle = IPC_GET_ARG3(*request);
215
    int dev_handle = IPC_GET_ARG3(*request);
198
    int lflag = IPC_GET_ARG4(*request);
216
    int lflag = IPC_GET_ARG4(*request);
199
 
217
 
200
    if (last < next)
218
    if (last < next)
201
        last += PLB_SIZE;
219
        last += PLB_SIZE;
202
 
220
 
203
    /*
221
    /*
204
     * Initialize TMPFS.
222
     * Initialize TMPFS.
205
     */
223
     */
206
    if (!root && !tmpfs_init()) {
224
    if (!root && !tmpfs_init()) {
207
        ipc_answer_0(rid, ENOMEM);
225
        ipc_answer_0(rid, ENOMEM);
208
        return;
226
        return;
209
    }
227
    }
210
 
228
 
211
    tmpfs_dentry_t *dtmp = root->child;
229
    tmpfs_dentry_t *dtmp = root->child;
212
    tmpfs_dentry_t *dcur = root;
230
    tmpfs_dentry_t *dcur = root;
213
 
231
 
214
    if (PLB_GET_CHAR(next) == '/')
232
    if (PLB_GET_CHAR(next) == '/')
215
        next++;     /* eat slash */
233
        next++;     /* eat slash */
216
   
234
   
217
    char component[NAME_MAX + 1];
235
    char component[NAME_MAX + 1];
218
    int len = 0;
236
    int len = 0;
219
    while (dtmp && next <= last) {
237
    while (dtmp && next <= last) {
220
 
238
 
221
        /* collect the component */
239
        /* collect the component */
222
        if (PLB_GET_CHAR(next) != '/') {
240
        if (PLB_GET_CHAR(next) != '/') {
223
            if (len + 1 == NAME_MAX) {
241
            if (len + 1 == NAME_MAX) {
224
                /* comopnent length overflow */
242
                /* comopnent length overflow */
225
                ipc_answer_0(rid, ENAMETOOLONG);
243
                ipc_answer_0(rid, ENAMETOOLONG);
226
                return;
244
                return;
227
            }
245
            }
228
            component[len++] = PLB_GET_CHAR(next);
246
            component[len++] = PLB_GET_CHAR(next);
229
            next++; /* process next character */
247
            next++; /* process next character */
230
            if (next <= last)
248
            if (next <= last)
231
                continue;
249
                continue;
232
        }
250
        }
233
 
251
 
234
        assert(len);
252
        assert(len);
235
        component[len] = '\0';
253
        component[len] = '\0';
236
        next++;     /* eat slash */
254
        next++;     /* eat slash */
237
        len = 0;
255
        len = 0;
238
 
256
 
239
        /* match the component */
257
        /* match the component */
240
        while (dtmp && !match_component(dtmp, component))
258
        while (dtmp && !match_component(dtmp, component))
241
            dtmp = dtmp->sibling;
259
            dtmp = dtmp->sibling;
242
 
260
 
243
        /* handle miss: match amongst siblings */
261
        /* handle miss: match amongst siblings */
244
        if (!dtmp) {
262
        if (!dtmp) {
245
            if ((next > last) && (lflag & L_CREATE)) {
263
            if ((next > last) && (lflag & L_CREATE)) {
246
                /* no components left and L_CREATE specified */
264
                /* no components left and L_CREATE specified */
247
                if (dcur->type != TMPFS_DIRECTORY) {
265
                if (dcur->type != TMPFS_DIRECTORY) {
248
                    ipc_answer_0(rid, ENOTDIR);
266
                    ipc_answer_0(rid, ENOTDIR);
249
                    return;
267
                    return;
250
                }
268
                }
251
                void *nodep = create_node(dcur,
269
                void *nodep = create_node(dcur,
252
                    component, lflag);
270
                    component, lflag);
253
                if (nodep) {
271
                if (nodep) {
254
                    ipc_answer_5(rid, EOK,
272
                    ipc_answer_5(rid, EOK,
255
                        tmpfs_reg.fs_handle, dev_handle,
273
                        tmpfs_reg.fs_handle, dev_handle,
256
                        TMPFS_GET_INDEX(nodep), 0,
274
                        TMPFS_GET_INDEX(nodep), 0,
257
                        TMPFS_GET_LNKCNT(nodep));
275
                        TMPFS_GET_LNKCNT(nodep));
258
                } else {
276
                } else {
259
                    ipc_answer_0(rid, ENOSPC);
277
                    ipc_answer_0(rid, ENOSPC);
260
                }
278
                }
261
                return;
279
                return;
262
            }
280
            }
263
            ipc_answer_0(rid, ENOENT);
281
            ipc_answer_0(rid, ENOENT);
264
            return;
282
            return;
265
        }
283
        }
266
 
284
 
267
        /* descend one level */
285
        /* descend one level */
268
        dcur = dtmp;
286
        dcur = dtmp;
269
        dtmp = dtmp->child;
287
        dtmp = dtmp->child;
270
    }
288
    }
271
 
289
 
272
    /* handle miss: excessive components */
290
    /* handle miss: excessive components */
273
    if (!dtmp && next <= last) {
291
    if (!dtmp && next <= last) {
274
        if (lflag & L_CREATE) {
292
        if (lflag & L_CREATE) {
275
            if (dcur->type != TMPFS_DIRECTORY) {
293
            if (dcur->type != TMPFS_DIRECTORY) {
276
                ipc_answer_0(rid, ENOTDIR);
294
                ipc_answer_0(rid, ENOTDIR);
277
                return;
295
                return;
278
            }
296
            }
279
 
297
 
280
            /* collect next component */
298
            /* collect next component */
281
            while (next <= last) {
299
            while (next <= last) {
282
                if (PLB_GET_CHAR(next) == '/') {
300
                if (PLB_GET_CHAR(next) == '/') {
283
                    /* more than one component */
301
                    /* more than one component */
284
                    ipc_answer_0(rid, ENOENT);
302
                    ipc_answer_0(rid, ENOENT);
285
                    return;
303
                    return;
286
                }
304
                }
287
                if (len + 1 == NAME_MAX) {
305
                if (len + 1 == NAME_MAX) {
288
                    /* component length overflow */
306
                    /* component length overflow */
289
                    ipc_answer_0(rid, ENAMETOOLONG);
307
                    ipc_answer_0(rid, ENAMETOOLONG);
290
                    return;
308
                    return;
291
                }
309
                }
292
                component[len++] = PLB_GET_CHAR(next);
310
                component[len++] = PLB_GET_CHAR(next);
293
                next++; /* process next character */
311
                next++; /* process next character */
294
            }
312
            }
295
            assert(len);
313
            assert(len);
296
            component[len] = '\0';
314
            component[len] = '\0';
297
            len = 0;
315
            len = 0;
298
               
316
               
299
            void *nodep = create_node(dcur, component, lflag);
317
            void *nodep = create_node(dcur, component, lflag);
300
            if (nodep) {
318
            if (nodep) {
301
                ipc_answer_5(rid, EOK, tmpfs_reg.fs_handle,
319
                ipc_answer_5(rid, EOK, tmpfs_reg.fs_handle,
302
                    dev_handle, TMPFS_GET_INDEX(nodep), 0,
320
                    dev_handle, TMPFS_GET_INDEX(nodep), 0,
303
                    TMPFS_GET_LNKCNT(nodep));
321
                    TMPFS_GET_LNKCNT(nodep));
304
            } else {
322
            } else {
305
                ipc_answer_0(rid, ENOSPC);
323
                ipc_answer_0(rid, ENOSPC);
306
            }
324
            }
307
            return;
325
            return;
308
        }
326
        }
309
        ipc_answer_0(rid, ENOENT);
327
        ipc_answer_0(rid, ENOENT);
310
        return;
328
        return;
311
    }
329
    }
312
 
330
 
313
    /* handle hit */
331
    /* handle hit */
314
    if (lflag & L_DESTROY) {
332
    if (lflag & L_DESTROY) {
315
        int res = destroy_component(dcur);
333
        int res = destroy_component(dcur);
-
 
334
        unsigned lnkcnt = (res == EOK) ? 0 : TMPFS_GET_LNKCNT(dcur);
316
        ipc_answer_0(rid, res);
335
        ipc_answer_5(rid, (ipcarg_t)res, tmpfs_reg.fs_handle,
-
 
336
            dev_handle, dcur->index, dcur->size, lnkcnt);
317
        return;
337
        return;
318
    }
338
    }
319
    if ((lflag & (L_CREATE | L_EXCLUSIVE)) == (L_CREATE | L_EXCLUSIVE)) {
339
    if ((lflag & (L_CREATE | L_EXCLUSIVE)) == (L_CREATE | L_EXCLUSIVE)) {
320
        ipc_answer_0(rid, EEXIST);
340
        ipc_answer_0(rid, EEXIST);
321
        return;
341
        return;
322
    }
342
    }
323
    if ((lflag & L_FILE) && (dcur->type != TMPFS_FILE)) {
343
    if ((lflag & L_FILE) && (dcur->type != TMPFS_FILE)) {
324
        ipc_answer_0(rid, EISDIR);
344
        ipc_answer_0(rid, EISDIR);
325
        return;
345
        return;
326
    }
346
    }
327
    if ((lflag & L_DIRECTORY) && (dcur->type != TMPFS_DIRECTORY)) {
347
    if ((lflag & L_DIRECTORY) && (dcur->type != TMPFS_DIRECTORY)) {
328
        ipc_answer_0(rid, ENOTDIR);
348
        ipc_answer_0(rid, ENOTDIR);
329
        return;
349
        return;
330
    }
350
    }
331
 
351
 
332
    ipc_answer_5(rid, EOK, tmpfs_reg.fs_handle, dev_handle, dcur->index,
352
    ipc_answer_5(rid, EOK, tmpfs_reg.fs_handle, dev_handle, dcur->index,
333
        dcur->size, TMPFS_GET_LNKCNT(dcur));
353
        dcur->size, TMPFS_GET_LNKCNT(dcur));
334
}
354
}
335
 
355
 
336
void tmpfs_read(ipc_callid_t rid, ipc_call_t *request)
356
void tmpfs_read(ipc_callid_t rid, ipc_call_t *request)
337
{
357
{
338
    int dev_handle = IPC_GET_ARG1(*request);
358
    int dev_handle = IPC_GET_ARG1(*request);
339
    unsigned long index = IPC_GET_ARG2(*request);
359
    unsigned long index = IPC_GET_ARG2(*request);
340
    off_t pos = IPC_GET_ARG3(*request);
360
    off_t pos = IPC_GET_ARG3(*request);
341
 
361
 
342
    /*
362
    /*
343
     * Lookup the respective dentry.
363
     * Lookup the respective dentry.
344
     */
364
     */
345
    link_t *hlp;
365
    link_t *hlp;
346
    hlp = hash_table_find(&dentries, &index);
366
    hlp = hash_table_find(&dentries, &index);
347
    if (!hlp) {
367
    if (!hlp) {
348
        ipc_answer_0(rid, ENOENT);
368
        ipc_answer_0(rid, ENOENT);
349
        return;
369
        return;
350
    }
370
    }
351
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
371
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
352
        dh_link);
372
        dh_link);
353
 
373
 
354
    /*
374
    /*
355
     * Receive the read request.
375
     * Receive the read request.
356
     */
376
     */
357
    ipc_callid_t callid;
377
    ipc_callid_t callid;
358
    size_t len;
378
    size_t len;
359
    if (!ipc_data_read_receive(&callid, &len)) {
379
    if (!ipc_data_read_receive(&callid, &len)) {
360
        ipc_answer_0(callid, EINVAL);  
380
        ipc_answer_0(callid, EINVAL);  
361
        ipc_answer_0(rid, EINVAL);
381
        ipc_answer_0(rid, EINVAL);
362
        return;
382
        return;
363
    }
383
    }
364
 
384
 
365
    size_t bytes;
385
    size_t bytes;
366
    if (dentry->type == TMPFS_FILE) {
386
    if (dentry->type == TMPFS_FILE) {
367
        bytes = max(0, min(dentry->size - pos, len));
387
        bytes = max(0, min(dentry->size - pos, len));
368
        (void) ipc_data_read_finalize(callid, dentry->data + pos,
388
        (void) ipc_data_read_finalize(callid, dentry->data + pos,
369
            bytes);
389
            bytes);
370
    } else {
390
    } else {
371
        int i;
391
        int i;
372
        tmpfs_dentry_t *cur = dentry->child;
392
        tmpfs_dentry_t *cur = dentry->child;
373
       
393
       
374
        assert(dentry->type == TMPFS_DIRECTORY);
394
        assert(dentry->type == TMPFS_DIRECTORY);
375
       
395
       
376
        /*
396
        /*
377
         * Yes, we really use O(n) algorithm here.
397
         * Yes, we really use O(n) algorithm here.
378
         * If it bothers someone, it could be fixed by introducing a
398
         * If it bothers someone, it could be fixed by introducing a
379
         * hash table.
399
         * hash table.
380
         */
400
         */
381
        for (i = 0, cur = dentry->child; i < pos && cur; i++,
401
        for (i = 0, cur = dentry->child; i < pos && cur; i++,
382
            cur = cur->sibling)
402
            cur = cur->sibling)
383
            ;
403
            ;
384
 
404
 
385
        if (!cur) {
405
        if (!cur) {
386
            ipc_answer_0(callid, ENOENT);
406
            ipc_answer_0(callid, ENOENT);
387
            ipc_answer_1(rid, ENOENT, 0);
407
            ipc_answer_1(rid, ENOENT, 0);
388
            return;
408
            return;
389
        }
409
        }
390
 
410
 
391
        (void) ipc_data_read_finalize(callid, cur->name,
411
        (void) ipc_data_read_finalize(callid, cur->name,
392
            strlen(cur->name) + 1);
412
            strlen(cur->name) + 1);
393
        bytes = 1;
413
        bytes = 1;
394
    }
414
    }
395
 
415
 
396
    /*
416
    /*
397
     * Answer the VFS_READ call.
417
     * Answer the VFS_READ call.
398
     */
418
     */
399
    ipc_answer_1(rid, EOK, bytes);
419
    ipc_answer_1(rid, EOK, bytes);
400
}
420
}
401
 
421
 
402
void tmpfs_write(ipc_callid_t rid, ipc_call_t *request)
422
void tmpfs_write(ipc_callid_t rid, ipc_call_t *request)
403
{
423
{
404
    int dev_handle = IPC_GET_ARG1(*request);
424
    int dev_handle = IPC_GET_ARG1(*request);
405
    unsigned long index = IPC_GET_ARG2(*request);
425
    unsigned long index = IPC_GET_ARG2(*request);
406
    off_t pos = IPC_GET_ARG3(*request);
426
    off_t pos = IPC_GET_ARG3(*request);
407
 
427
 
408
    /*
428
    /*
409
     * Lookup the respective dentry.
429
     * Lookup the respective dentry.
410
     */
430
     */
411
    link_t *hlp;
431
    link_t *hlp;
412
    hlp = hash_table_find(&dentries, &index);
432
    hlp = hash_table_find(&dentries, &index);
413
    if (!hlp) {
433
    if (!hlp) {
414
        ipc_answer_0(rid, ENOENT);
434
        ipc_answer_0(rid, ENOENT);
415
        return;
435
        return;
416
    }
436
    }
417
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
437
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
418
        dh_link);
438
        dh_link);
419
 
439
 
420
    /*
440
    /*
421
     * Receive the write request.
441
     * Receive the write request.
422
     */
442
     */
423
    ipc_callid_t callid;
443
    ipc_callid_t callid;
424
    size_t len;
444
    size_t len;
425
    if (!ipc_data_write_receive(&callid, &len)) {
445
    if (!ipc_data_write_receive(&callid, &len)) {
426
        ipc_answer_0(callid, EINVAL);  
446
        ipc_answer_0(callid, EINVAL);  
427
        ipc_answer_0(rid, EINVAL);
447
        ipc_answer_0(rid, EINVAL);
428
        return;
448
        return;
429
    }
449
    }
430
 
450
 
431
    /*
451
    /*
432
     * Check whether the file needs to grow.
452
     * Check whether the file needs to grow.
433
     */
453
     */
434
    if (pos + len <= dentry->size) {
454
    if (pos + len <= dentry->size) {
435
        /* The file size is not changing. */
455
        /* The file size is not changing. */
436
        (void) ipc_data_write_finalize(callid, dentry->data + pos, len);
456
        (void) ipc_data_write_finalize(callid, dentry->data + pos, len);
437
        ipc_answer_2(rid, EOK, len, dentry->size);
457
        ipc_answer_2(rid, EOK, len, dentry->size);
438
        return;
458
        return;
439
    }
459
    }
440
    size_t delta = (pos + len) - dentry->size;
460
    size_t delta = (pos + len) - dentry->size;
441
    /*
461
    /*
442
     * At this point, we are deliberately extremely straightforward and
462
     * At this point, we are deliberately extremely straightforward and
443
     * simply realloc the contents of the file on every write that grows the
463
     * simply realloc the contents of the file on every write that grows the
444
     * file. In the end, the situation might not be as bad as it may look:
464
     * file. In the end, the situation might not be as bad as it may look:
445
     * our heap allocator can save us and just grow the block whenever
465
     * our heap allocator can save us and just grow the block whenever
446
     * possible.
466
     * possible.
447
     */
467
     */
448
    void *newdata = realloc(dentry->data, dentry->size + delta);
468
    void *newdata = realloc(dentry->data, dentry->size + delta);
449
    if (!newdata) {
469
    if (!newdata) {
450
        ipc_answer_0(callid, ENOMEM);
470
        ipc_answer_0(callid, ENOMEM);
451
        ipc_answer_2(rid, EOK, 0, dentry->size);
471
        ipc_answer_2(rid, EOK, 0, dentry->size);
452
        return;
472
        return;
453
    }
473
    }
454
    /* Clear any newly allocated memory in order to emulate gaps. */
474
    /* Clear any newly allocated memory in order to emulate gaps. */
455
    memset(newdata + dentry->size, 0, delta);
475
    memset(newdata + dentry->size, 0, delta);
456
    dentry->size += delta;
476
    dentry->size += delta;
457
    dentry->data = newdata;
477
    dentry->data = newdata;
458
    (void) ipc_data_write_finalize(callid, dentry->data + pos, len);
478
    (void) ipc_data_write_finalize(callid, dentry->data + pos, len);
459
    ipc_answer_2(rid, EOK, len, dentry->size);
479
    ipc_answer_2(rid, EOK, len, dentry->size);
460
}
480
}
461
 
481
 
462
void tmpfs_truncate(ipc_callid_t rid, ipc_call_t *request)
482
void tmpfs_truncate(ipc_callid_t rid, ipc_call_t *request)
463
{
483
{
464
    int dev_handle = IPC_GET_ARG1(*request);
484
    int dev_handle = IPC_GET_ARG1(*request);
465
    unsigned long index = IPC_GET_ARG2(*request);
485
    unsigned long index = IPC_GET_ARG2(*request);
466
    size_t size = IPC_GET_ARG3(*request);
486
    size_t size = IPC_GET_ARG3(*request);
467
 
487
 
468
    /*
488
    /*
469
     * Lookup the respective dentry.
489
     * Lookup the respective dentry.
470
     */
490
     */
471
    link_t *hlp;
491
    link_t *hlp;
472
    hlp = hash_table_find(&dentries, &index);
492
    hlp = hash_table_find(&dentries, &index);
473
    if (!hlp) {
493
    if (!hlp) {
474
        ipc_answer_0(rid, ENOENT);
494
        ipc_answer_0(rid, ENOENT);
475
        return;
495
        return;
476
    }
496
    }
477
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
497
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
478
        dh_link);
498
        dh_link);
479
 
499
 
480
    if (size == dentry->size) {
500
    if (size == dentry->size) {
481
        ipc_answer_0(rid, EOK);
501
        ipc_answer_0(rid, EOK);
482
        return;
502
        return;
483
    }
503
    }
484
 
504
 
485
    void *newdata = realloc(dentry->data, size);
505
    void *newdata = realloc(dentry->data, size);
486
    if (!newdata) {
506
    if (!newdata) {
487
        ipc_answer_0(rid, ENOMEM);
507
        ipc_answer_0(rid, ENOMEM);
488
        return;
508
        return;
489
    }
509
    }
490
    if (size > dentry->size) {
510
    if (size > dentry->size) {
491
        size_t delta = size - dentry->size;
511
        size_t delta = size - dentry->size;
492
        memset(newdata + dentry->size, 0, delta);
512
        memset(newdata + dentry->size, 0, delta);
493
    }
513
    }
494
    dentry->size = size;
514
    dentry->size = size;
495
    dentry->data = newdata;
515
    dentry->data = newdata;
496
    ipc_answer_0(rid, EOK);
516
    ipc_answer_0(rid, EOK);
497
}
517
}
498
 
518
 
499
void tmpfs_free(ipc_callid_t rid, ipc_call_t *request)
519
void tmpfs_free(ipc_callid_t rid, ipc_call_t *request)
500
{
520
{
501
    int dev_handle = IPC_GET_ARG1(*request);
521
    int dev_handle = IPC_GET_ARG1(*request);
502
    unsigned long index = IPC_GET_ARG2(*request);
522
    unsigned long index = IPC_GET_ARG2(*request);
503
 
523
 
504
    link_t *hlp;
524
    link_t *hlp;
505
    hlp = hash_table_find(&dentries, &index);
525
    hlp = hash_table_find(&dentries, &index);
506
    if (!hlp) {
526
    if (!hlp) {
507
        ipc_answer_0(rid, ENOENT);
527
        ipc_answer_0(rid, ENOENT);
508
        return;
528
        return;
509
    }
529
    }
510
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
530
    tmpfs_dentry_t *dentry = hash_table_get_instance(hlp, tmpfs_dentry_t,
511
        dh_link);
531
        dh_link);
512
   
532
   
513
    assert(!dentry->parent);
533
    assert(!dentry->parent);
514
    assert(!dentry->child);
534
    assert(!dentry->child);
515
    assert(!dentry->sibling);
535
    assert(!dentry->sibling);
516
 
536
 
517
    hash_table_remove(&dentries, &index, 1);
537
    hash_table_remove(&dentries, &index, 1);
518
 
538
 
519
    if (dentry->type == TMPFS_FILE)
539
    if (dentry->type == TMPFS_FILE)
520
        free(dentry->data);
540
        free(dentry->data);
521
    free(dentry->name);
541
    free(dentry->name);
522
    free(dentry);
542
    free(dentry);
523
 
543
 
524
    ipc_answer_0(rid, EOK);
544
    ipc_answer_0(rid, EOK);
525
}
545
}
526
 
546
 
527
/**
547
/**
528
 * @}
548
 * @}
529
 */
549
 */
530
 
550