2020-01-18 09:38:21 +01:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice, this
|
|
|
|
* list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
|
|
* CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
2020-03-23 13:45:10 +01:00
|
|
|
#include <AK/StringView.h>
|
2019-06-07 09:36:51 +02:00
|
|
|
#include <Kernel/FileSystem/FileDescription.h>
|
2019-06-07 11:43:58 +02:00
|
|
|
#include <Kernel/FileSystem/Inode.h>
|
|
|
|
#include <Kernel/FileSystem/InodeFile.h>
|
2019-05-30 13:39:17 +02:00
|
|
|
#include <Kernel/FileSystem/VirtualFileSystem.h>
|
|
|
|
#include <Kernel/Process.h>
|
2020-02-28 20:47:27 +01:00
|
|
|
#include <Kernel/VM/PrivateInodeVMObject.h>
|
2020-02-28 20:29:14 +01:00
|
|
|
#include <Kernel/VM/SharedInodeVMObject.h>
|
2019-05-30 13:39:17 +02:00
|
|
|
|
2020-02-16 01:27:42 +01:00
|
|
|
namespace Kernel {
|
|
|
|
|
2019-06-21 18:37:47 +02:00
|
|
|
InodeFile::InodeFile(NonnullRefPtr<Inode>&& inode)
|
2019-05-30 13:39:17 +02:00
|
|
|
: m_inode(move(inode))
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
InodeFile::~InodeFile()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2020-08-04 18:02:23 +02:00
|
|
|
KResultOr<size_t> InodeFile::read(FileDescription& description, size_t offset, u8* buffer, size_t count)
|
2019-05-30 13:39:17 +02:00
|
|
|
{
|
2020-04-10 19:44:42 +10:00
|
|
|
ssize_t nread = m_inode->read_bytes(offset, count, buffer, &description);
|
2019-12-01 17:36:06 +01:00
|
|
|
if (nread > 0)
|
2020-06-28 15:34:31 -06:00
|
|
|
Thread::current()->did_file_read(nread);
|
2020-08-04 18:02:23 +02:00
|
|
|
if (nread < 0)
|
|
|
|
return KResult(nread);
|
2019-12-01 17:36:06 +01:00
|
|
|
return nread;
|
2019-05-30 13:39:17 +02:00
|
|
|
}
|
|
|
|
|
2020-08-04 18:02:23 +02:00
|
|
|
KResultOr<size_t> InodeFile::write(FileDescription& description, size_t offset, const u8* data, size_t count)
|
2019-05-30 13:39:17 +02:00
|
|
|
{
|
2020-04-10 19:44:42 +10:00
|
|
|
ssize_t nwritten = m_inode->write_bytes(offset, count, data, &description);
|
2019-12-01 17:36:06 +01:00
|
|
|
if (nwritten > 0) {
|
2019-10-22 22:23:58 +02:00
|
|
|
m_inode->set_mtime(kgettimeofday().tv_sec);
|
2020-06-28 15:34:31 -06:00
|
|
|
Thread::current()->did_file_write(nwritten);
|
2019-12-01 17:36:06 +01:00
|
|
|
}
|
2020-08-04 18:02:23 +02:00
|
|
|
if (nwritten < 0)
|
|
|
|
return KResult(nwritten);
|
2019-12-01 17:36:06 +01:00
|
|
|
return nwritten;
|
2019-05-30 13:39:17 +02:00
|
|
|
}
|
|
|
|
|
2020-02-28 20:47:27 +01:00
|
|
|
KResultOr<Region*> InodeFile::mmap(Process& process, FileDescription& description, VirtualAddress preferred_vaddr, size_t offset, size_t size, int prot, bool shared)
|
2019-05-30 13:39:17 +02:00
|
|
|
{
|
|
|
|
// FIXME: If PROT_EXEC, check that the underlying file system isn't mounted noexec.
|
2020-02-28 20:47:27 +01:00
|
|
|
RefPtr<InodeVMObject> vmobject;
|
|
|
|
if (shared)
|
|
|
|
vmobject = SharedInodeVMObject::create_with_inode(inode());
|
|
|
|
else
|
|
|
|
vmobject = PrivateInodeVMObject::create_with_inode(inode());
|
|
|
|
if (!vmobject)
|
|
|
|
return KResult(-ENOMEM);
|
|
|
|
auto* region = process.allocate_region_with_vmobject(preferred_vaddr, size, *vmobject, offset, description.absolute_path(), prot);
|
2019-05-30 13:39:17 +02:00
|
|
|
if (!region)
|
|
|
|
return KResult(-ENOMEM);
|
|
|
|
return region;
|
|
|
|
}
|
|
|
|
|
2019-06-13 22:03:04 +02:00
|
|
|
String InodeFile::absolute_path(const FileDescription& description) const
|
2019-05-30 13:39:17 +02:00
|
|
|
{
|
2019-05-30 21:29:26 +02:00
|
|
|
ASSERT_NOT_REACHED();
|
2019-06-13 22:03:04 +02:00
|
|
|
ASSERT(description.custody());
|
|
|
|
return description.absolute_path();
|
2019-05-30 13:39:17 +02:00
|
|
|
}
|
|
|
|
|
2020-02-08 12:07:04 +01:00
|
|
|
KResult InodeFile::truncate(u64 size)
|
2019-05-30 13:39:17 +02:00
|
|
|
{
|
2020-01-08 13:56:49 +01:00
|
|
|
auto truncate_result = m_inode->truncate(size);
|
|
|
|
if (truncate_result.is_error())
|
|
|
|
return truncate_result;
|
|
|
|
int mtime_result = m_inode->set_mtime(kgettimeofday().tv_sec);
|
|
|
|
if (mtime_result != 0)
|
|
|
|
return KResult(mtime_result);
|
|
|
|
return KSuccess;
|
2019-05-30 13:39:17 +02:00
|
|
|
}
|
2020-01-03 20:14:56 +01:00
|
|
|
|
2020-05-28 17:32:20 +03:00
|
|
|
KResult InodeFile::chown(FileDescription& description, uid_t uid, gid_t gid)
|
2020-01-03 20:14:56 +01:00
|
|
|
{
|
2020-05-28 17:32:20 +03:00
|
|
|
ASSERT(description.inode() == m_inode);
|
2020-05-28 17:41:04 +03:00
|
|
|
ASSERT(description.custody());
|
|
|
|
return VFS::the().chown(*description.custody(), uid, gid);
|
2020-01-03 20:14:56 +01:00
|
|
|
}
|
|
|
|
|
2020-05-28 17:32:20 +03:00
|
|
|
KResult InodeFile::chmod(FileDescription& description, mode_t mode)
|
2020-01-03 20:14:56 +01:00
|
|
|
{
|
2020-05-28 17:32:20 +03:00
|
|
|
ASSERT(description.inode() == m_inode);
|
2020-05-28 17:41:04 +03:00
|
|
|
ASSERT(description.custody());
|
|
|
|
return VFS::the().chmod(*description.custody(), mode);
|
2020-01-03 20:14:56 +01:00
|
|
|
}
|
2020-02-16 01:27:42 +01:00
|
|
|
|
|
|
|
}
|