2003-01-30 01:26:44 +01:00
|
|
|
/*
|
|
|
|
* Server-side file descriptor management
|
|
|
|
*
|
2003-03-18 06:04:33 +01:00
|
|
|
* Copyright (C) 2000, 2003 Alexandre Julliard
|
2003-01-30 01:26:44 +01:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
2006-05-18 14:49:52 +02:00
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
2003-01-30 01:26:44 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
|
|
|
#include <assert.h>
|
2020-05-29 05:28:09 +02:00
|
|
|
#include <dirent.h>
|
2003-03-18 06:04:33 +01:00
|
|
|
#include <errno.h>
|
2003-03-12 23:38:14 +01:00
|
|
|
#include <fcntl.h>
|
2003-03-18 06:04:33 +01:00
|
|
|
#include <limits.h>
|
2003-02-19 01:33:32 +01:00
|
|
|
#include <signal.h>
|
2004-04-16 06:31:35 +02:00
|
|
|
#include <stdarg.h>
|
2003-01-30 01:26:44 +01:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdlib.h>
|
2005-03-04 13:38:36 +01:00
|
|
|
#include <poll.h>
|
2006-11-01 13:28:05 +01:00
|
|
|
#ifdef HAVE_LINUX_MAJOR_H
|
|
|
|
#include <linux/major.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_STATVFS_H
|
|
|
|
#include <sys/statvfs.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_VFS_H
|
2015-10-05 10:01:56 +02:00
|
|
|
/* Work around a conflict with Solaris' system list defined in sys/list.h. */
|
2008-04-10 17:03:18 +02:00
|
|
|
#define list SYSLIST
|
|
|
|
#define list_next SYSLIST_NEXT
|
|
|
|
#define list_prev SYSLIST_PREV
|
|
|
|
#define list_head SYSLIST_HEAD
|
|
|
|
#define list_tail SYSLIST_TAIL
|
|
|
|
#define list_move_tail SYSLIST_MOVE_TAIL
|
|
|
|
#define list_remove SYSLIST_REMOVE
|
2006-11-01 13:28:05 +01:00
|
|
|
#include <sys/vfs.h>
|
2008-04-10 17:03:18 +02:00
|
|
|
#undef list
|
|
|
|
#undef list_next
|
|
|
|
#undef list_prev
|
|
|
|
#undef list_head
|
|
|
|
#undef list_tail
|
|
|
|
#undef list_move_tail
|
|
|
|
#undef list_remove
|
2006-11-01 13:28:05 +01:00
|
|
|
#endif
|
2006-11-05 06:50:45 +01:00
|
|
|
#ifdef HAVE_SYS_PARAM_H
|
|
|
|
#include <sys/param.h>
|
|
|
|
#endif
|
2006-11-01 13:28:05 +01:00
|
|
|
#ifdef HAVE_SYS_MOUNT_H
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_STATFS_H
|
|
|
|
#include <sys/statfs.h>
|
|
|
|
#endif
|
2007-06-15 12:41:43 +02:00
|
|
|
#ifdef HAVE_SYS_SYSCTL_H
|
|
|
|
#include <sys/sysctl.h>
|
|
|
|
#endif
|
2006-08-04 22:11:00 +02:00
|
|
|
#ifdef HAVE_SYS_EVENT_H
|
|
|
|
#include <sys/event.h>
|
|
|
|
#undef LIST_INIT
|
|
|
|
#undef LIST_ENTRY
|
|
|
|
#endif
|
2004-09-23 06:48:24 +02:00
|
|
|
#ifdef HAVE_STDINT_H
|
|
|
|
#include <stdint.h>
|
|
|
|
#endif
|
2003-03-12 23:38:14 +01:00
|
|
|
#include <sys/stat.h>
|
2003-02-19 01:33:32 +01:00
|
|
|
#include <sys/time.h>
|
2016-04-17 21:25:38 +02:00
|
|
|
#ifdef MAJOR_IN_MKDEV
|
|
|
|
#include <sys/mkdev.h>
|
|
|
|
#elif defined(MAJOR_IN_SYSMACROS)
|
|
|
|
#include <sys/sysmacros.h>
|
|
|
|
#endif
|
2003-02-19 01:33:32 +01:00
|
|
|
#include <sys/types.h>
|
2003-01-30 01:26:44 +01:00
|
|
|
#include <unistd.h>
|
2013-09-26 12:15:15 +02:00
|
|
|
#ifdef HAVE_SYS_SYSCALL_H
|
|
|
|
#include <sys/syscall.h>
|
|
|
|
#endif
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2005-11-28 17:32:54 +01:00
|
|
|
#include "ntstatus.h"
|
|
|
|
#define WIN32_NO_STATUS
|
2003-01-30 01:26:44 +01:00
|
|
|
#include "object.h"
|
|
|
|
#include "file.h"
|
|
|
|
#include "handle.h"
|
|
|
|
#include "process.h"
|
|
|
|
#include "request.h"
|
|
|
|
|
2004-04-16 06:31:35 +02:00
|
|
|
#include "winternl.h"
|
2007-04-16 14:54:52 +02:00
|
|
|
#include "winioctl.h"
|
2020-05-25 20:25:50 +02:00
|
|
|
#include "ddk/wdm.h"
|
2004-04-16 06:31:35 +02:00
|
|
|
|
2004-09-23 06:48:24 +02:00
|
|
|
#if defined(HAVE_SYS_EPOLL_H) && defined(HAVE_EPOLL_CREATE)
|
2004-10-27 03:03:30 +02:00
|
|
|
# include <sys/epoll.h>
|
2004-09-23 06:48:24 +02:00
|
|
|
# define USE_EPOLL
|
2004-10-27 03:03:30 +02:00
|
|
|
#elif defined(linux) && defined(__i386__) && defined(HAVE_STDINT_H)
|
|
|
|
# define USE_EPOLL
|
|
|
|
# define EPOLLIN POLLIN
|
|
|
|
# define EPOLLOUT POLLOUT
|
|
|
|
# define EPOLLERR POLLERR
|
|
|
|
# define EPOLLHUP POLLHUP
|
|
|
|
# define EPOLL_CTL_ADD 1
|
|
|
|
# define EPOLL_CTL_DEL 2
|
|
|
|
# define EPOLL_CTL_MOD 3
|
|
|
|
|
|
|
|
typedef union epoll_data
|
|
|
|
{
|
|
|
|
void *ptr;
|
|
|
|
int fd;
|
|
|
|
uint32_t u32;
|
|
|
|
uint64_t u64;
|
|
|
|
} epoll_data_t;
|
|
|
|
|
|
|
|
struct epoll_event
|
|
|
|
{
|
|
|
|
uint32_t events;
|
|
|
|
epoll_data_t data;
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline int epoll_create( int size )
|
|
|
|
{
|
2010-12-23 16:10:12 +01:00
|
|
|
return syscall( 254 /*NR_epoll_create*/, size );
|
2004-10-27 03:03:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline int epoll_ctl( int epfd, int op, int fd, const struct epoll_event *event )
|
|
|
|
{
|
2010-12-23 16:10:12 +01:00
|
|
|
return syscall( 255 /*NR_epoll_ctl*/, epfd, op, fd, event );
|
2004-10-27 03:03:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline int epoll_wait( int epfd, struct epoll_event *events, int maxevents, int timeout )
|
|
|
|
{
|
2010-12-23 16:10:12 +01:00
|
|
|
return syscall( 256 /*NR_epoll_wait*/, epfd, events, maxevents, timeout );
|
2004-10-27 03:03:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* linux && __i386__ && HAVE_STDINT_H */
|
|
|
|
|
2009-11-21 00:35:26 +01:00
|
|
|
#if defined(HAVE_PORT_H) && defined(HAVE_PORT_CREATE)
|
|
|
|
# include <port.h>
|
|
|
|
# define USE_EVENT_PORTS
|
|
|
|
#endif /* HAVE_PORT_H && HAVE_PORT_CREATE */
|
2004-09-23 06:48:24 +02:00
|
|
|
|
2003-03-18 06:04:33 +01:00
|
|
|
/* Because of the stupid Posix locking semantics, we need to keep
|
|
|
|
* track of all file descriptors referencing a given file, and not
|
|
|
|
* close a single one until all the locks are gone (sigh).
|
|
|
|
*/
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
/* file descriptor object */
|
|
|
|
|
|
|
|
/* closed_fd is used to keep track of the unix fd belonging to a closed fd object */
|
|
|
|
struct closed_fd
|
|
|
|
{
|
2004-04-02 21:50:49 +02:00
|
|
|
struct list entry; /* entry in inode closed list */
|
2005-07-28 12:48:57 +02:00
|
|
|
int unix_fd; /* the unix file descriptor */
|
2018-11-09 12:01:12 +01:00
|
|
|
int unlink; /* whether to unlink on close: -1 - implicit FILE_DELETE_ON_CLOSE, 1 - explicit disposition */
|
2015-08-19 11:17:26 +02:00
|
|
|
char *unix_name; /* name to unlink on close, points to parent fd unix_name */
|
2003-03-12 23:38:14 +01:00
|
|
|
};
|
|
|
|
|
2003-01-30 01:26:44 +01:00
|
|
|
struct fd
|
|
|
|
{
|
2003-03-12 23:38:14 +01:00
|
|
|
struct object obj; /* object header */
|
|
|
|
const struct fd_ops *fd_ops; /* file descriptor operations */
|
|
|
|
struct inode *inode; /* inode that this fd belongs to */
|
|
|
|
struct list inode_entry; /* entry in inode fd list */
|
|
|
|
struct closed_fd *closed; /* structure to store the unix fd at destroy time */
|
|
|
|
struct object *user; /* object using this file descriptor */
|
2003-03-18 06:04:33 +01:00
|
|
|
struct list locks; /* list of locks on this fd */
|
2005-12-12 16:46:17 +01:00
|
|
|
unsigned int access; /* file access (FILE_READ_DATA etc.) */
|
2007-04-10 22:25:07 +02:00
|
|
|
unsigned int options; /* file options (FILE_DELETE_ON_CLOSE, FILE_SYNCHRONOUS...) */
|
2004-03-27 21:48:42 +01:00
|
|
|
unsigned int sharing; /* file sharing mode */
|
2009-11-12 15:10:12 +01:00
|
|
|
char *unix_name; /* unix file name */
|
2021-02-09 14:11:07 +01:00
|
|
|
WCHAR *nt_name; /* NT file name */
|
|
|
|
data_size_t nt_namelen; /* length of NT file name */
|
2003-03-12 23:38:14 +01:00
|
|
|
int unix_fd; /* unix file descriptor */
|
2007-04-18 16:05:59 +02:00
|
|
|
unsigned int no_fd_status;/* status to return when unix_fd is -1 */
|
2010-08-23 17:09:45 +02:00
|
|
|
unsigned int cacheable :1;/* can the fd be cached on the client side? */
|
2009-10-01 00:22:55 +02:00
|
|
|
unsigned int signaled :1; /* is the fd signaled? */
|
|
|
|
unsigned int fs_locks :1; /* can we use filesystem locks for this fd? */
|
2003-03-12 23:38:14 +01:00
|
|
|
int poll_index; /* index of fd in poll array */
|
2017-07-04 15:26:19 +02:00
|
|
|
struct async_queue read_q; /* async readers of this fd */
|
|
|
|
struct async_queue write_q; /* async writers of this fd */
|
|
|
|
struct async_queue wait_q; /* other async waiters of this fd */
|
2007-09-27 22:03:39 +02:00
|
|
|
struct completion *completion; /* completion object attached to this fd */
|
2008-12-15 13:29:38 +01:00
|
|
|
apc_param_t comp_key; /* completion key to set in completion events */
|
2018-10-25 14:55:24 +02:00
|
|
|
unsigned int comp_flags; /* completion flags */
|
2003-01-30 01:26:44 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static void fd_dump( struct object *obj, int verbose );
|
|
|
|
static void fd_destroy( struct object *obj );
|
|
|
|
|
|
|
|
static const struct object_ops fd_ops =
|
|
|
|
{
|
|
|
|
sizeof(struct fd), /* size */
|
2021-02-04 13:44:18 +01:00
|
|
|
&no_type, /* type */
|
2003-01-30 01:26:44 +01:00
|
|
|
fd_dump, /* dump */
|
|
|
|
no_add_queue, /* add_queue */
|
|
|
|
NULL, /* remove_queue */
|
|
|
|
NULL, /* signaled */
|
|
|
|
NULL, /* satisfied */
|
2005-04-24 19:35:52 +02:00
|
|
|
no_signal, /* signal */
|
2003-02-19 01:33:32 +01:00
|
|
|
no_get_fd, /* get_fd */
|
2021-02-05 12:10:44 +01:00
|
|
|
default_map_access, /* map_access */
|
2007-10-03 14:10:37 +02:00
|
|
|
default_get_sd, /* get_sd */
|
|
|
|
default_set_sd, /* set_sd */
|
2020-09-22 16:52:31 +02:00
|
|
|
no_get_full_name, /* get_full_name */
|
2005-11-22 15:55:42 +01:00
|
|
|
no_lookup_name, /* lookup_name */
|
2016-02-04 13:07:19 +01:00
|
|
|
no_link_name, /* link_name */
|
|
|
|
NULL, /* unlink_name */
|
2007-03-22 11:44:29 +01:00
|
|
|
no_open_file, /* open_file */
|
2019-03-25 14:37:09 +01:00
|
|
|
no_kernel_obj_list, /* get_kernel_obj_list */
|
2005-06-09 17:39:52 +02:00
|
|
|
no_close_handle, /* close_handle */
|
2003-01-30 01:26:44 +01:00
|
|
|
fd_destroy /* destroy */
|
|
|
|
};
|
|
|
|
|
2005-07-30 21:09:43 +02:00
|
|
|
/* device object */
|
|
|
|
|
|
|
|
#define DEVICE_HASH_SIZE 7
|
|
|
|
#define INODE_HASH_SIZE 17
|
|
|
|
|
|
|
|
struct device
|
|
|
|
{
|
|
|
|
struct object obj; /* object header */
|
|
|
|
struct list entry; /* entry in device hash list */
|
|
|
|
dev_t dev; /* device number */
|
2005-08-24 20:33:50 +02:00
|
|
|
int removable; /* removable device? (or -1 if unknown) */
|
2005-07-30 21:09:43 +02:00
|
|
|
struct list inode_hash[INODE_HASH_SIZE]; /* inodes hash table */
|
|
|
|
};
|
|
|
|
|
|
|
|
static void device_dump( struct object *obj, int verbose );
|
|
|
|
static void device_destroy( struct object *obj );
|
|
|
|
|
|
|
|
static const struct object_ops device_ops =
|
|
|
|
{
|
|
|
|
sizeof(struct device), /* size */
|
2021-02-04 13:44:18 +01:00
|
|
|
&no_type, /* type */
|
2005-07-30 21:09:43 +02:00
|
|
|
device_dump, /* dump */
|
|
|
|
no_add_queue, /* add_queue */
|
|
|
|
NULL, /* remove_queue */
|
|
|
|
NULL, /* signaled */
|
|
|
|
NULL, /* satisfied */
|
|
|
|
no_signal, /* signal */
|
|
|
|
no_get_fd, /* get_fd */
|
2021-02-05 12:10:44 +01:00
|
|
|
default_map_access, /* map_access */
|
2007-10-03 14:10:37 +02:00
|
|
|
default_get_sd, /* get_sd */
|
|
|
|
default_set_sd, /* set_sd */
|
2020-09-22 16:52:31 +02:00
|
|
|
no_get_full_name, /* get_full_name */
|
2005-11-22 15:55:42 +01:00
|
|
|
no_lookup_name, /* lookup_name */
|
2016-02-04 13:07:19 +01:00
|
|
|
no_link_name, /* link_name */
|
|
|
|
NULL, /* unlink_name */
|
2007-03-22 11:44:29 +01:00
|
|
|
no_open_file, /* open_file */
|
2019-03-25 14:37:09 +01:00
|
|
|
no_kernel_obj_list, /* get_kernel_obj_list */
|
2005-07-30 21:09:43 +02:00
|
|
|
no_close_handle, /* close_handle */
|
|
|
|
device_destroy /* destroy */
|
|
|
|
};
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
/* inode object */
|
|
|
|
|
|
|
|
struct inode
|
|
|
|
{
|
|
|
|
struct object obj; /* object header */
|
|
|
|
struct list entry; /* inode hash list entry */
|
2005-07-30 21:09:43 +02:00
|
|
|
struct device *device; /* device containing this inode */
|
2003-03-12 23:38:14 +01:00
|
|
|
ino_t ino; /* inode number */
|
|
|
|
struct list open; /* list of open file descriptors */
|
2003-03-18 06:04:33 +01:00
|
|
|
struct list locks; /* list of file locks */
|
2004-04-02 21:50:49 +02:00
|
|
|
struct list closed; /* list of file descriptors to close at destroy time */
|
2003-03-12 23:38:14 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static void inode_dump( struct object *obj, int verbose );
|
|
|
|
static void inode_destroy( struct object *obj );
|
|
|
|
|
|
|
|
static const struct object_ops inode_ops =
|
|
|
|
{
|
|
|
|
sizeof(struct inode), /* size */
|
2021-02-04 13:44:18 +01:00
|
|
|
&no_type, /* type */
|
2003-03-12 23:38:14 +01:00
|
|
|
inode_dump, /* dump */
|
|
|
|
no_add_queue, /* add_queue */
|
|
|
|
NULL, /* remove_queue */
|
|
|
|
NULL, /* signaled */
|
|
|
|
NULL, /* satisfied */
|
2005-04-24 19:35:52 +02:00
|
|
|
no_signal, /* signal */
|
2003-03-12 23:38:14 +01:00
|
|
|
no_get_fd, /* get_fd */
|
2021-02-05 12:10:44 +01:00
|
|
|
default_map_access, /* map_access */
|
2007-10-03 14:10:37 +02:00
|
|
|
default_get_sd, /* get_sd */
|
|
|
|
default_set_sd, /* set_sd */
|
2020-09-22 16:52:31 +02:00
|
|
|
no_get_full_name, /* get_full_name */
|
2005-11-22 15:55:42 +01:00
|
|
|
no_lookup_name, /* lookup_name */
|
2016-02-04 13:07:19 +01:00
|
|
|
no_link_name, /* link_name */
|
|
|
|
NULL, /* unlink_name */
|
2007-03-22 11:44:29 +01:00
|
|
|
no_open_file, /* open_file */
|
2019-03-25 14:37:09 +01:00
|
|
|
no_kernel_obj_list, /* get_kernel_obj_list */
|
2005-06-09 17:39:52 +02:00
|
|
|
no_close_handle, /* close_handle */
|
2003-03-12 23:38:14 +01:00
|
|
|
inode_destroy /* destroy */
|
|
|
|
};
|
|
|
|
|
2003-03-18 06:04:33 +01:00
|
|
|
/* file lock object */
|
|
|
|
|
|
|
|
struct file_lock
|
|
|
|
{
|
|
|
|
struct object obj; /* object header */
|
|
|
|
struct fd *fd; /* fd owning this lock */
|
|
|
|
struct list fd_entry; /* entry in list of locks on a given fd */
|
|
|
|
struct list inode_entry; /* entry in inode list of locks */
|
|
|
|
int shared; /* shared lock? */
|
|
|
|
file_pos_t start; /* locked region is interval [start;end) */
|
|
|
|
file_pos_t end;
|
|
|
|
struct process *process; /* process owning this lock */
|
|
|
|
struct list proc_entry; /* entry in list of locks owned by the process */
|
|
|
|
};
|
|
|
|
|
|
|
|
static void file_lock_dump( struct object *obj, int verbose );
|
2013-08-26 11:55:04 +02:00
|
|
|
static int file_lock_signaled( struct object *obj, struct wait_queue_entry *entry );
|
2003-03-18 06:04:33 +01:00
|
|
|
|
|
|
|
static const struct object_ops file_lock_ops =
|
|
|
|
{
|
|
|
|
sizeof(struct file_lock), /* size */
|
2021-02-04 13:44:18 +01:00
|
|
|
&no_type, /* type */
|
2003-03-18 06:04:33 +01:00
|
|
|
file_lock_dump, /* dump */
|
|
|
|
add_queue, /* add_queue */
|
|
|
|
remove_queue, /* remove_queue */
|
|
|
|
file_lock_signaled, /* signaled */
|
|
|
|
no_satisfied, /* satisfied */
|
2005-04-24 19:35:52 +02:00
|
|
|
no_signal, /* signal */
|
2003-03-18 06:04:33 +01:00
|
|
|
no_get_fd, /* get_fd */
|
2021-02-05 12:10:44 +01:00
|
|
|
default_map_access, /* map_access */
|
2007-10-03 14:10:37 +02:00
|
|
|
default_get_sd, /* get_sd */
|
|
|
|
default_set_sd, /* set_sd */
|
2020-09-22 16:52:31 +02:00
|
|
|
no_get_full_name, /* get_full_name */
|
2005-11-22 15:55:42 +01:00
|
|
|
no_lookup_name, /* lookup_name */
|
2016-02-04 13:07:19 +01:00
|
|
|
no_link_name, /* link_name */
|
|
|
|
NULL, /* unlink_name */
|
2007-03-22 11:44:29 +01:00
|
|
|
no_open_file, /* open_file */
|
2019-03-25 14:37:09 +01:00
|
|
|
no_kernel_obj_list, /* get_kernel_obj_list */
|
2005-06-09 17:39:52 +02:00
|
|
|
no_close_handle, /* close_handle */
|
2003-03-18 06:04:33 +01:00
|
|
|
no_destroy /* destroy */
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
#define OFF_T_MAX (~((file_pos_t)1 << (8*sizeof(off_t)-1)))
|
|
|
|
#define FILE_POS_T_MAX (~(file_pos_t)0)
|
|
|
|
|
|
|
|
static file_pos_t max_unix_offset = OFF_T_MAX;
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
#define DUMP_LONG_LONG(val) do { \
|
|
|
|
if (sizeof(val) > sizeof(unsigned long) && (val) > ~0UL) \
|
2006-06-15 14:14:31 +02:00
|
|
|
fprintf( stderr, "%lx%08lx", (unsigned long)((unsigned long long)(val) >> 32), (unsigned long)(val) ); \
|
2003-03-12 23:38:14 +01:00
|
|
|
else \
|
|
|
|
fprintf( stderr, "%lx", (unsigned long)(val) ); \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2003-02-19 01:33:32 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* timeouts support */
|
|
|
|
|
|
|
|
struct timeout_user
|
|
|
|
{
|
2004-09-08 06:17:31 +02:00
|
|
|
struct list entry; /* entry in sorted timeout list */
|
2020-04-06 17:21:03 +02:00
|
|
|
abstime_t when; /* timeout expiry */
|
2003-02-19 01:33:32 +01:00
|
|
|
timeout_callback callback; /* callback function */
|
|
|
|
void *private; /* callback private data */
|
|
|
|
};
|
|
|
|
|
2020-04-06 17:21:03 +02:00
|
|
|
static struct list abs_timeout_list = LIST_INIT(abs_timeout_list); /* sorted absolute timeouts list */
|
|
|
|
static struct list rel_timeout_list = LIST_INIT(rel_timeout_list); /* sorted relative timeouts list */
|
2007-04-17 20:08:59 +02:00
|
|
|
timeout_t current_time;
|
2020-04-06 17:21:03 +02:00
|
|
|
timeout_t monotonic_time;
|
2007-04-17 20:08:59 +02:00
|
|
|
|
2020-05-25 20:25:50 +02:00
|
|
|
struct _KUSER_SHARED_DATA *user_shared_data = NULL;
|
|
|
|
static const int user_shared_data_timeout = 16;
|
|
|
|
|
2021-09-03 23:15:26 +02:00
|
|
|
static void atomic_store_ulong(volatile ULONG *ptr, ULONG value)
|
2020-05-25 20:25:50 +02:00
|
|
|
{
|
2021-09-03 23:15:26 +02:00
|
|
|
/* on x86 there should be total store order guarantees, so volatile is
|
|
|
|
* enough to ensure the stores aren't reordered by the compiler, and then
|
|
|
|
* they will always be seen in-order from other CPUs. On other archs, we
|
|
|
|
* need atomic intrinsics to guarantee that. */
|
|
|
|
#if defined(__i386__) || defined(__x86_64__)
|
|
|
|
*ptr = value;
|
|
|
|
#else
|
|
|
|
__atomic_store_n(ptr, value, __ATOMIC_SEQ_CST);
|
|
|
|
#endif
|
|
|
|
}
|
2020-05-25 20:25:50 +02:00
|
|
|
|
2021-09-03 23:15:26 +02:00
|
|
|
static void atomic_store_long(volatile LONG *ptr, LONG value)
|
|
|
|
{
|
2020-05-25 20:25:50 +02:00
|
|
|
#if defined(__i386__) || defined(__x86_64__)
|
2021-09-03 23:15:26 +02:00
|
|
|
*ptr = value;
|
2020-05-25 20:25:50 +02:00
|
|
|
#else
|
2021-09-03 23:15:26 +02:00
|
|
|
__atomic_store_n(ptr, value, __ATOMIC_SEQ_CST);
|
2020-05-25 20:25:50 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2021-09-03 23:15:26 +02:00
|
|
|
static void set_user_shared_data_time(void)
|
|
|
|
{
|
|
|
|
timeout_t tick_count = monotonic_time / 10000;
|
2021-09-03 23:15:27 +02:00
|
|
|
static timeout_t last_timezone_update;
|
|
|
|
timeout_t timezone_bias;
|
|
|
|
struct tm *tm;
|
|
|
|
time_t now;
|
|
|
|
|
|
|
|
if (monotonic_time - last_timezone_update > TICKS_PER_SEC)
|
|
|
|
{
|
|
|
|
now = time( NULL );
|
|
|
|
tm = gmtime( &now );
|
|
|
|
timezone_bias = mktime( tm ) - now;
|
|
|
|
tm = localtime( &now );
|
|
|
|
if (tm->tm_isdst) timezone_bias -= 3600;
|
|
|
|
timezone_bias *= TICKS_PER_SEC;
|
|
|
|
|
|
|
|
atomic_store_long(&user_shared_data->TimeZoneBias.High2Time, timezone_bias >> 32);
|
|
|
|
atomic_store_ulong(&user_shared_data->TimeZoneBias.LowPart, timezone_bias);
|
|
|
|
atomic_store_long(&user_shared_data->TimeZoneBias.High1Time, timezone_bias >> 32);
|
|
|
|
|
|
|
|
last_timezone_update = monotonic_time;
|
|
|
|
}
|
2021-09-03 23:15:26 +02:00
|
|
|
|
|
|
|
atomic_store_long(&user_shared_data->SystemTime.High2Time, current_time >> 32);
|
|
|
|
atomic_store_ulong(&user_shared_data->SystemTime.LowPart, current_time);
|
|
|
|
atomic_store_long(&user_shared_data->SystemTime.High1Time, current_time >> 32);
|
|
|
|
|
|
|
|
atomic_store_long(&user_shared_data->InterruptTime.High2Time, monotonic_time >> 32);
|
|
|
|
atomic_store_ulong(&user_shared_data->InterruptTime.LowPart, monotonic_time);
|
|
|
|
atomic_store_long(&user_shared_data->InterruptTime.High1Time, monotonic_time >> 32);
|
|
|
|
|
|
|
|
atomic_store_long(&user_shared_data->TickCount.High2Time, tick_count >> 32);
|
|
|
|
atomic_store_ulong(&user_shared_data->TickCount.LowPart, tick_count);
|
|
|
|
atomic_store_long(&user_shared_data->TickCount.High1Time, tick_count >> 32);
|
|
|
|
atomic_store_ulong(&user_shared_data->TickCountLowDeprecated, tick_count);
|
|
|
|
}
|
|
|
|
|
2020-04-06 17:20:58 +02:00
|
|
|
void set_current_time(void)
|
2007-04-17 20:08:59 +02:00
|
|
|
{
|
|
|
|
static const timeout_t ticks_1601_to_1970 = (timeout_t)86400 * (369 * 365 + 89) * TICKS_PER_SEC;
|
|
|
|
struct timeval now;
|
|
|
|
gettimeofday( &now, NULL );
|
|
|
|
current_time = (timeout_t)now.tv_sec * TICKS_PER_SEC + now.tv_usec * 10 + ticks_1601_to_1970;
|
2020-04-06 17:21:03 +02:00
|
|
|
monotonic_time = monotonic_counter();
|
2020-05-25 20:25:50 +02:00
|
|
|
if (user_shared_data) set_user_shared_data_time();
|
2007-04-17 20:08:59 +02:00
|
|
|
}
|
2003-02-19 01:33:32 +01:00
|
|
|
|
|
|
|
/* add a timeout user */
|
2007-04-17 20:08:59 +02:00
|
|
|
struct timeout_user *add_timeout_user( timeout_t when, timeout_callback func, void *private )
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
|
|
|
struct timeout_user *user;
|
2004-09-08 06:17:31 +02:00
|
|
|
struct list *ptr;
|
2003-02-19 01:33:32 +01:00
|
|
|
|
|
|
|
if (!(user = mem_alloc( sizeof(*user) ))) return NULL;
|
2020-04-06 17:21:03 +02:00
|
|
|
user->when = timeout_to_abstime( when );
|
2003-02-19 01:33:32 +01:00
|
|
|
user->callback = func;
|
|
|
|
user->private = private;
|
|
|
|
|
|
|
|
/* Now insert it in the linked list */
|
|
|
|
|
2020-04-06 17:21:03 +02:00
|
|
|
if (user->when > 0)
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
2020-04-06 17:21:03 +02:00
|
|
|
LIST_FOR_EACH( ptr, &abs_timeout_list )
|
|
|
|
{
|
|
|
|
struct timeout_user *timeout = LIST_ENTRY( ptr, struct timeout_user, entry );
|
|
|
|
if (timeout->when >= user->when) break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LIST_FOR_EACH( ptr, &rel_timeout_list )
|
|
|
|
{
|
|
|
|
struct timeout_user *timeout = LIST_ENTRY( ptr, struct timeout_user, entry );
|
|
|
|
if (timeout->when <= user->when) break;
|
|
|
|
}
|
2003-02-19 01:33:32 +01:00
|
|
|
}
|
2004-09-08 06:17:31 +02:00
|
|
|
list_add_before( ptr, &user->entry );
|
2003-02-19 01:33:32 +01:00
|
|
|
return user;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove a timeout user */
|
|
|
|
void remove_timeout_user( struct timeout_user *user )
|
|
|
|
{
|
2004-09-08 06:17:31 +02:00
|
|
|
list_remove( &user->entry );
|
2003-02-19 01:33:32 +01:00
|
|
|
free( user );
|
|
|
|
}
|
|
|
|
|
2007-04-17 20:08:59 +02:00
|
|
|
/* return a text description of a timeout for debugging purposes */
|
|
|
|
const char *get_timeout_str( timeout_t timeout )
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
2007-04-17 20:08:59 +02:00
|
|
|
static char buffer[64];
|
|
|
|
long secs, nsecs;
|
|
|
|
|
|
|
|
if (!timeout) return "0";
|
|
|
|
if (timeout == TIMEOUT_INFINITE) return "infinite";
|
|
|
|
|
|
|
|
if (timeout < 0) /* relative */
|
|
|
|
{
|
|
|
|
secs = -timeout / TICKS_PER_SEC;
|
|
|
|
nsecs = -timeout % TICKS_PER_SEC;
|
|
|
|
sprintf( buffer, "+%ld.%07ld", secs, nsecs );
|
|
|
|
}
|
|
|
|
else /* absolute */
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
2007-04-17 20:08:59 +02:00
|
|
|
secs = (timeout - current_time) / TICKS_PER_SEC;
|
|
|
|
nsecs = (timeout - current_time) % TICKS_PER_SEC;
|
|
|
|
if (nsecs < 0)
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
2007-04-17 20:08:59 +02:00
|
|
|
nsecs += TICKS_PER_SEC;
|
|
|
|
secs--;
|
2003-02-19 01:33:32 +01:00
|
|
|
}
|
2007-04-17 20:08:59 +02:00
|
|
|
if (secs >= 0)
|
|
|
|
sprintf( buffer, "%x%08x (+%ld.%07ld)",
|
|
|
|
(unsigned int)(timeout >> 32), (unsigned int)timeout, secs, nsecs );
|
|
|
|
else
|
|
|
|
sprintf( buffer, "%x%08x (-%ld.%07ld)",
|
|
|
|
(unsigned int)(timeout >> 32), (unsigned int)timeout,
|
|
|
|
-(secs + 1), TICKS_PER_SEC - nsecs );
|
2003-02-19 01:33:32 +01:00
|
|
|
}
|
2007-04-17 20:08:59 +02:00
|
|
|
return buffer;
|
2003-02-19 01:33:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************************************************************/
|
|
|
|
/* poll support */
|
|
|
|
|
|
|
|
static struct fd **poll_users; /* users array */
|
|
|
|
static struct pollfd *pollfd; /* poll fd array */
|
|
|
|
static int nb_users; /* count of array entries actually in use */
|
|
|
|
static int active_users; /* current number of active users */
|
|
|
|
static int allocated_users; /* count of allocated entries in the array */
|
|
|
|
static struct fd **freelist; /* list of free entries in the array */
|
|
|
|
|
2006-08-03 19:56:55 +02:00
|
|
|
static int get_next_timeout(void);
|
|
|
|
|
2007-12-03 10:47:31 +01:00
|
|
|
static inline void fd_poll_event( struct fd *fd, int event )
|
|
|
|
{
|
|
|
|
fd->fd_ops->poll_event( fd, event );
|
|
|
|
}
|
|
|
|
|
2004-09-23 06:48:24 +02:00
|
|
|
#ifdef USE_EPOLL
|
|
|
|
|
2006-08-04 22:11:00 +02:00
|
|
|
static int epoll_fd = -1;
|
2006-08-03 19:56:55 +02:00
|
|
|
|
|
|
|
static inline void init_epoll(void)
|
|
|
|
{
|
|
|
|
epoll_fd = epoll_create( 128 );
|
|
|
|
}
|
2004-09-23 06:48:24 +02:00
|
|
|
|
|
|
|
/* set the events that epoll waits for on this fd; helper for set_fd_events */
|
|
|
|
static inline void set_fd_epoll_events( struct fd *fd, int user, int events )
|
|
|
|
{
|
|
|
|
struct epoll_event ev;
|
|
|
|
int ctl;
|
|
|
|
|
|
|
|
if (epoll_fd == -1) return;
|
|
|
|
|
|
|
|
if (events == -1) /* stop waiting on this fd completely */
|
|
|
|
{
|
|
|
|
if (pollfd[user].fd == -1) return; /* already removed */
|
|
|
|
ctl = EPOLL_CTL_DEL;
|
|
|
|
}
|
|
|
|
else if (pollfd[user].fd == -1)
|
|
|
|
{
|
|
|
|
ctl = EPOLL_CTL_ADD;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (pollfd[user].events == events) return; /* nothing to do */
|
|
|
|
ctl = EPOLL_CTL_MOD;
|
|
|
|
}
|
|
|
|
|
|
|
|
ev.events = events;
|
2006-01-27 16:17:51 +01:00
|
|
|
memset(&ev.data, 0, sizeof(ev.data));
|
2004-09-23 06:48:24 +02:00
|
|
|
ev.data.u32 = user;
|
|
|
|
|
|
|
|
if (epoll_ctl( epoll_fd, ctl, fd->unix_fd, &ev ) == -1)
|
|
|
|
{
|
|
|
|
if (errno == ENOMEM) /* not enough memory, give up on epoll */
|
|
|
|
{
|
|
|
|
close( epoll_fd );
|
|
|
|
epoll_fd = -1;
|
|
|
|
}
|
|
|
|
else perror( "epoll_ctl" ); /* should not happen */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-03 19:56:55 +02:00
|
|
|
static inline void remove_epoll_user( struct fd *fd, int user )
|
|
|
|
{
|
|
|
|
if (epoll_fd == -1) return;
|
2004-09-23 06:48:24 +02:00
|
|
|
|
2006-08-03 19:56:55 +02:00
|
|
|
if (pollfd[user].fd != -1)
|
|
|
|
{
|
|
|
|
struct epoll_event dummy;
|
|
|
|
epoll_ctl( epoll_fd, EPOLL_CTL_DEL, fd->unix_fd, &dummy );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void main_loop_epoll(void)
|
2004-09-23 06:48:24 +02:00
|
|
|
{
|
2006-08-03 19:56:55 +02:00
|
|
|
int i, ret, timeout;
|
|
|
|
struct epoll_event events[128];
|
|
|
|
|
|
|
|
assert( POLLIN == EPOLLIN );
|
|
|
|
assert( POLLOUT == EPOLLOUT );
|
|
|
|
assert( POLLERR == EPOLLERR );
|
|
|
|
assert( POLLHUP == EPOLLHUP );
|
|
|
|
|
|
|
|
if (epoll_fd == -1) return;
|
|
|
|
|
|
|
|
while (active_users)
|
|
|
|
{
|
|
|
|
timeout = get_next_timeout();
|
|
|
|
|
|
|
|
if (!active_users) break; /* last user removed by a timeout */
|
|
|
|
if (epoll_fd == -1) break; /* an error occurred with epoll */
|
|
|
|
|
2018-10-22 22:39:01 +02:00
|
|
|
ret = epoll_wait( epoll_fd, events, ARRAY_SIZE( events ), timeout );
|
2007-04-17 20:08:59 +02:00
|
|
|
set_current_time();
|
2006-08-03 19:56:55 +02:00
|
|
|
|
|
|
|
/* put the events into the pollfd array first, like poll does */
|
|
|
|
for (i = 0; i < ret; i++)
|
|
|
|
{
|
|
|
|
int user = events[i].data.u32;
|
|
|
|
pollfd[user].revents = events[i].events;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* read events from the pollfd array, as set_fd_events may modify them */
|
|
|
|
for (i = 0; i < ret; i++)
|
|
|
|
{
|
|
|
|
int user = events[i].data.u32;
|
|
|
|
if (pollfd[user].revents) fd_poll_event( poll_users[user], pollfd[user].revents );
|
|
|
|
}
|
|
|
|
}
|
2004-09-23 06:48:24 +02:00
|
|
|
}
|
|
|
|
|
2006-08-04 22:11:00 +02:00
|
|
|
#elif defined(HAVE_KQUEUE)
|
|
|
|
|
|
|
|
static int kqueue_fd = -1;
|
|
|
|
|
|
|
|
static inline void init_epoll(void)
|
|
|
|
{
|
2007-06-15 12:41:43 +02:00
|
|
|
kqueue_fd = kqueue();
|
2006-08-04 22:11:00 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void set_fd_epoll_events( struct fd *fd, int user, int events )
|
|
|
|
{
|
|
|
|
struct kevent ev[2];
|
|
|
|
|
|
|
|
if (kqueue_fd == -1) return;
|
|
|
|
|
2016-02-26 10:46:06 +01:00
|
|
|
EV_SET( &ev[0], fd->unix_fd, EVFILT_READ, 0, NOTE_LOWAT, 1, (void *)(long)user );
|
|
|
|
EV_SET( &ev[1], fd->unix_fd, EVFILT_WRITE, 0, NOTE_LOWAT, 1, (void *)(long)user );
|
2006-08-04 22:11:00 +02:00
|
|
|
|
|
|
|
if (events == -1) /* stop waiting on this fd completely */
|
|
|
|
{
|
|
|
|
if (pollfd[user].fd == -1) return; /* already removed */
|
|
|
|
ev[0].flags |= EV_DELETE;
|
|
|
|
ev[1].flags |= EV_DELETE;
|
|
|
|
}
|
|
|
|
else if (pollfd[user].fd == -1)
|
|
|
|
{
|
|
|
|
ev[0].flags |= EV_ADD | ((events & POLLIN) ? EV_ENABLE : EV_DISABLE);
|
|
|
|
ev[1].flags |= EV_ADD | ((events & POLLOUT) ? EV_ENABLE : EV_DISABLE);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (pollfd[user].events == events) return; /* nothing to do */
|
|
|
|
ev[0].flags |= (events & POLLIN) ? EV_ENABLE : EV_DISABLE;
|
|
|
|
ev[1].flags |= (events & POLLOUT) ? EV_ENABLE : EV_DISABLE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (kevent( kqueue_fd, ev, 2, NULL, 0, NULL ) == -1)
|
|
|
|
{
|
|
|
|
if (errno == ENOMEM) /* not enough memory, give up on kqueue */
|
|
|
|
{
|
|
|
|
close( kqueue_fd );
|
|
|
|
kqueue_fd = -1;
|
|
|
|
}
|
|
|
|
else perror( "kevent" ); /* should not happen */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void remove_epoll_user( struct fd *fd, int user )
|
|
|
|
{
|
|
|
|
if (kqueue_fd == -1) return;
|
|
|
|
|
|
|
|
if (pollfd[user].fd != -1)
|
|
|
|
{
|
|
|
|
struct kevent ev[2];
|
|
|
|
|
|
|
|
EV_SET( &ev[0], fd->unix_fd, EVFILT_READ, EV_DELETE, 0, 0, 0 );
|
|
|
|
EV_SET( &ev[1], fd->unix_fd, EVFILT_WRITE, EV_DELETE, 0, 0, 0 );
|
|
|
|
kevent( kqueue_fd, ev, 2, NULL, 0, NULL );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void main_loop_epoll(void)
|
|
|
|
{
|
|
|
|
int i, ret, timeout;
|
|
|
|
struct kevent events[128];
|
|
|
|
|
|
|
|
if (kqueue_fd == -1) return;
|
|
|
|
|
|
|
|
while (active_users)
|
|
|
|
{
|
|
|
|
timeout = get_next_timeout();
|
|
|
|
|
|
|
|
if (!active_users) break; /* last user removed by a timeout */
|
|
|
|
if (kqueue_fd == -1) break; /* an error occurred with kqueue */
|
|
|
|
|
|
|
|
if (timeout != -1)
|
|
|
|
{
|
|
|
|
struct timespec ts;
|
|
|
|
|
|
|
|
ts.tv_sec = timeout / 1000;
|
|
|
|
ts.tv_nsec = (timeout % 1000) * 1000000;
|
2018-10-22 22:39:01 +02:00
|
|
|
ret = kevent( kqueue_fd, NULL, 0, events, ARRAY_SIZE( events ), &ts );
|
2006-08-04 22:11:00 +02:00
|
|
|
}
|
2018-10-22 22:39:01 +02:00
|
|
|
else ret = kevent( kqueue_fd, NULL, 0, events, ARRAY_SIZE( events ), NULL );
|
2006-08-04 22:11:00 +02:00
|
|
|
|
2007-04-17 20:08:59 +02:00
|
|
|
set_current_time();
|
2006-08-10 16:42:09 +02:00
|
|
|
|
2006-08-04 22:11:00 +02:00
|
|
|
/* put the events into the pollfd array first, like poll does */
|
|
|
|
for (i = 0; i < ret; i++)
|
|
|
|
{
|
|
|
|
long user = (long)events[i].udata;
|
|
|
|
pollfd[user].revents = 0;
|
|
|
|
}
|
|
|
|
for (i = 0; i < ret; i++)
|
|
|
|
{
|
|
|
|
long user = (long)events[i].udata;
|
|
|
|
if (events[i].filter == EVFILT_READ) pollfd[user].revents |= POLLIN;
|
|
|
|
else if (events[i].filter == EVFILT_WRITE) pollfd[user].revents |= POLLOUT;
|
|
|
|
if (events[i].flags & EV_EOF) pollfd[user].revents |= POLLHUP;
|
|
|
|
if (events[i].flags & EV_ERROR) pollfd[user].revents |= POLLERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* read events from the pollfd array, as set_fd_events may modify them */
|
|
|
|
for (i = 0; i < ret; i++)
|
|
|
|
{
|
|
|
|
long user = (long)events[i].udata;
|
|
|
|
if (pollfd[user].revents) fd_poll_event( poll_users[user], pollfd[user].revents );
|
|
|
|
pollfd[user].revents = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-11-21 00:35:26 +01:00
|
|
|
#elif defined(USE_EVENT_PORTS)
|
|
|
|
|
|
|
|
static int port_fd = -1;
|
|
|
|
|
|
|
|
static inline void init_epoll(void)
|
|
|
|
{
|
|
|
|
port_fd = port_create();
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void set_fd_epoll_events( struct fd *fd, int user, int events )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (port_fd == -1) return;
|
|
|
|
|
|
|
|
if (events == -1) /* stop waiting on this fd completely */
|
|
|
|
{
|
|
|
|
if (pollfd[user].fd == -1) return; /* already removed */
|
|
|
|
port_dissociate( port_fd, PORT_SOURCE_FD, fd->unix_fd );
|
|
|
|
}
|
|
|
|
else if (pollfd[user].fd == -1)
|
|
|
|
{
|
|
|
|
ret = port_associate( port_fd, PORT_SOURCE_FD, fd->unix_fd, events, (void *)user );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (pollfd[user].events == events) return; /* nothing to do */
|
|
|
|
ret = port_associate( port_fd, PORT_SOURCE_FD, fd->unix_fd, events, (void *)user );
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret == -1)
|
|
|
|
{
|
|
|
|
if (errno == ENOMEM) /* not enough memory, give up on port_associate */
|
|
|
|
{
|
|
|
|
close( port_fd );
|
|
|
|
port_fd = -1;
|
|
|
|
}
|
|
|
|
else perror( "port_associate" ); /* should not happen */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void remove_epoll_user( struct fd *fd, int user )
|
|
|
|
{
|
|
|
|
if (port_fd == -1) return;
|
|
|
|
|
|
|
|
if (pollfd[user].fd != -1)
|
|
|
|
{
|
|
|
|
port_dissociate( port_fd, PORT_SOURCE_FD, fd->unix_fd );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void main_loop_epoll(void)
|
|
|
|
{
|
|
|
|
int i, nget, ret, timeout;
|
|
|
|
port_event_t events[128];
|
|
|
|
|
|
|
|
if (port_fd == -1) return;
|
|
|
|
|
|
|
|
while (active_users)
|
|
|
|
{
|
|
|
|
timeout = get_next_timeout();
|
|
|
|
nget = 1;
|
|
|
|
|
|
|
|
if (!active_users) break; /* last user removed by a timeout */
|
|
|
|
if (port_fd == -1) break; /* an error occurred with event completion */
|
|
|
|
|
|
|
|
if (timeout != -1)
|
|
|
|
{
|
|
|
|
struct timespec ts;
|
|
|
|
|
|
|
|
ts.tv_sec = timeout / 1000;
|
|
|
|
ts.tv_nsec = (timeout % 1000) * 1000000;
|
2018-10-22 22:39:01 +02:00
|
|
|
ret = port_getn( port_fd, events, ARRAY_SIZE( events ), &nget, &ts );
|
2009-11-21 00:35:26 +01:00
|
|
|
}
|
2018-10-22 22:39:01 +02:00
|
|
|
else ret = port_getn( port_fd, events, ARRAY_SIZE( events ), &nget, NULL );
|
2009-11-21 00:35:26 +01:00
|
|
|
|
|
|
|
if (ret == -1) break; /* an error occurred with event completion */
|
|
|
|
|
|
|
|
set_current_time();
|
|
|
|
|
|
|
|
/* put the events into the pollfd array first, like poll does */
|
|
|
|
for (i = 0; i < nget; i++)
|
|
|
|
{
|
|
|
|
long user = (long)events[i].portev_user;
|
|
|
|
pollfd[user].revents = events[i].portev_events;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* read events from the pollfd array, as set_fd_events may modify them */
|
|
|
|
for (i = 0; i < nget; i++)
|
|
|
|
{
|
|
|
|
long user = (long)events[i].portev_user;
|
|
|
|
if (pollfd[user].revents) fd_poll_event( poll_users[user], pollfd[user].revents );
|
|
|
|
/* if we are still interested, reassociate the fd */
|
|
|
|
if (pollfd[user].fd != -1) {
|
|
|
|
port_associate( port_fd, PORT_SOURCE_FD, pollfd[user].fd, pollfd[user].events, (void *)user );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-04 22:11:00 +02:00
|
|
|
#else /* HAVE_KQUEUE */
|
2006-08-03 19:56:55 +02:00
|
|
|
|
|
|
|
static inline void init_epoll(void) { }
|
|
|
|
static inline void set_fd_epoll_events( struct fd *fd, int user, int events ) { }
|
|
|
|
static inline void remove_epoll_user( struct fd *fd, int user ) { }
|
|
|
|
static inline void main_loop_epoll(void) { }
|
|
|
|
|
2004-09-23 06:48:24 +02:00
|
|
|
#endif /* USE_EPOLL */
|
|
|
|
|
|
|
|
|
2003-02-19 01:33:32 +01:00
|
|
|
/* add a user in the poll array and return its index, or -1 on failure */
|
|
|
|
static int add_poll_user( struct fd *fd )
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
if (freelist)
|
|
|
|
{
|
|
|
|
ret = freelist - poll_users;
|
|
|
|
freelist = (struct fd **)poll_users[ret];
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (nb_users == allocated_users)
|
|
|
|
{
|
|
|
|
struct fd **newusers;
|
|
|
|
struct pollfd *newpoll;
|
|
|
|
int new_count = allocated_users ? (allocated_users + allocated_users / 2) : 16;
|
|
|
|
if (!(newusers = realloc( poll_users, new_count * sizeof(*poll_users) ))) return -1;
|
|
|
|
if (!(newpoll = realloc( pollfd, new_count * sizeof(*pollfd) )))
|
|
|
|
{
|
|
|
|
if (allocated_users)
|
|
|
|
poll_users = newusers;
|
|
|
|
else
|
|
|
|
free( newusers );
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
poll_users = newusers;
|
|
|
|
pollfd = newpoll;
|
2006-08-03 19:56:55 +02:00
|
|
|
if (!allocated_users) init_epoll();
|
2003-02-19 01:33:32 +01:00
|
|
|
allocated_users = new_count;
|
|
|
|
}
|
|
|
|
ret = nb_users++;
|
|
|
|
}
|
|
|
|
pollfd[ret].fd = -1;
|
|
|
|
pollfd[ret].events = 0;
|
|
|
|
pollfd[ret].revents = 0;
|
|
|
|
poll_users[ret] = fd;
|
|
|
|
active_users++;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove a user from the poll list */
|
|
|
|
static void remove_poll_user( struct fd *fd, int user )
|
|
|
|
{
|
|
|
|
assert( user >= 0 );
|
|
|
|
assert( poll_users[user] == fd );
|
2004-09-23 06:48:24 +02:00
|
|
|
|
2006-08-03 19:56:55 +02:00
|
|
|
remove_epoll_user( fd, user );
|
2003-02-19 01:33:32 +01:00
|
|
|
pollfd[user].fd = -1;
|
|
|
|
pollfd[user].events = 0;
|
|
|
|
pollfd[user].revents = 0;
|
|
|
|
poll_users[user] = (struct fd *)freelist;
|
|
|
|
freelist = &poll_users[user];
|
|
|
|
active_users--;
|
|
|
|
}
|
|
|
|
|
2004-09-20 21:14:35 +02:00
|
|
|
/* process pending timeouts and return the time until the next timeout, in milliseconds */
|
|
|
|
static int get_next_timeout(void)
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
2020-05-25 20:25:50 +02:00
|
|
|
int ret = user_shared_data ? user_shared_data_timeout : -1;
|
|
|
|
|
2020-04-06 17:21:03 +02:00
|
|
|
if (!list_empty( &abs_timeout_list ) || !list_empty( &rel_timeout_list ))
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
2004-09-20 21:14:35 +02:00
|
|
|
struct list expired_list, *ptr;
|
2004-09-08 01:28:14 +02:00
|
|
|
|
2004-09-20 21:14:35 +02:00
|
|
|
/* first remove all expired timers from the list */
|
2004-09-08 06:17:31 +02:00
|
|
|
|
2004-09-20 21:14:35 +02:00
|
|
|
list_init( &expired_list );
|
2020-04-06 17:21:03 +02:00
|
|
|
while ((ptr = list_head( &abs_timeout_list )) != NULL)
|
2004-09-20 21:14:35 +02:00
|
|
|
{
|
|
|
|
struct timeout_user *timeout = LIST_ENTRY( ptr, struct timeout_user, entry );
|
2004-09-08 01:28:14 +02:00
|
|
|
|
2007-04-17 20:08:59 +02:00
|
|
|
if (timeout->when <= current_time)
|
2004-09-08 01:28:14 +02:00
|
|
|
{
|
2004-09-08 06:17:31 +02:00
|
|
|
list_remove( &timeout->entry );
|
2004-09-20 21:14:35 +02:00
|
|
|
list_add_tail( &expired_list, &timeout->entry );
|
2004-09-08 01:28:14 +02:00
|
|
|
}
|
2004-09-20 21:14:35 +02:00
|
|
|
else break;
|
|
|
|
}
|
2020-04-06 17:21:03 +02:00
|
|
|
while ((ptr = list_head( &rel_timeout_list )) != NULL)
|
|
|
|
{
|
|
|
|
struct timeout_user *timeout = LIST_ENTRY( ptr, struct timeout_user, entry );
|
|
|
|
|
|
|
|
if (-timeout->when <= monotonic_time)
|
|
|
|
{
|
|
|
|
list_remove( &timeout->entry );
|
|
|
|
list_add_tail( &expired_list, &timeout->entry );
|
|
|
|
}
|
|
|
|
else break;
|
|
|
|
}
|
2004-09-08 01:28:14 +02:00
|
|
|
|
2004-09-20 21:14:35 +02:00
|
|
|
/* now call the callback for all the removed timers */
|
2004-09-08 01:28:14 +02:00
|
|
|
|
2004-09-20 21:14:35 +02:00
|
|
|
while ((ptr = list_head( &expired_list )) != NULL)
|
|
|
|
{
|
|
|
|
struct timeout_user *timeout = LIST_ENTRY( ptr, struct timeout_user, entry );
|
|
|
|
list_remove( &timeout->entry );
|
|
|
|
timeout->callback( timeout->private );
|
|
|
|
free( timeout );
|
|
|
|
}
|
|
|
|
|
2020-04-06 17:21:03 +02:00
|
|
|
if ((ptr = list_head( &abs_timeout_list )) != NULL)
|
2004-09-20 21:14:35 +02:00
|
|
|
{
|
|
|
|
struct timeout_user *timeout = LIST_ENTRY( ptr, struct timeout_user, entry );
|
2020-09-20 15:59:52 +02:00
|
|
|
timeout_t diff = (timeout->when - current_time + 9999) / 10000;
|
|
|
|
if (diff > INT_MAX) diff = INT_MAX;
|
|
|
|
else if (diff < 0) diff = 0;
|
2020-05-25 20:25:50 +02:00
|
|
|
if (ret == -1 || diff < ret) ret = diff;
|
2020-04-06 17:21:03 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if ((ptr = list_head( &rel_timeout_list )) != NULL)
|
|
|
|
{
|
|
|
|
struct timeout_user *timeout = LIST_ENTRY( ptr, struct timeout_user, entry );
|
2020-09-20 15:59:52 +02:00
|
|
|
timeout_t diff = (-timeout->when - monotonic_time + 9999) / 10000;
|
|
|
|
if (diff > INT_MAX) diff = INT_MAX;
|
|
|
|
else if (diff < 0) diff = 0;
|
2020-04-06 17:21:03 +02:00
|
|
|
if (ret == -1 || diff < ret) ret = diff;
|
2003-02-19 01:33:32 +01:00
|
|
|
}
|
2004-09-20 21:14:35 +02:00
|
|
|
}
|
2020-05-25 20:25:50 +02:00
|
|
|
return ret;
|
2004-09-20 21:14:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* server main poll() loop */
|
|
|
|
void main_loop(void)
|
|
|
|
{
|
|
|
|
int i, ret, timeout;
|
|
|
|
|
2007-04-17 20:08:59 +02:00
|
|
|
set_current_time();
|
|
|
|
server_start_time = current_time;
|
2006-08-10 16:42:09 +02:00
|
|
|
|
2006-08-03 19:56:55 +02:00
|
|
|
main_loop_epoll();
|
2004-09-23 06:48:24 +02:00
|
|
|
/* fall through to normal poll loop */
|
|
|
|
|
2004-09-20 21:14:35 +02:00
|
|
|
while (active_users)
|
|
|
|
{
|
|
|
|
timeout = get_next_timeout();
|
|
|
|
|
|
|
|
if (!active_users) break; /* last user removed by a timeout */
|
2004-09-08 01:28:14 +02:00
|
|
|
|
2004-09-20 21:14:35 +02:00
|
|
|
ret = poll( pollfd, nb_users, timeout );
|
2007-04-17 20:08:59 +02:00
|
|
|
set_current_time();
|
2006-08-10 16:42:09 +02:00
|
|
|
|
2003-02-19 01:33:32 +01:00
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
for (i = 0; i < nb_users; i++)
|
|
|
|
{
|
|
|
|
if (pollfd[i].revents)
|
|
|
|
{
|
|
|
|
fd_poll_event( poll_users[i], pollfd[i].revents );
|
|
|
|
if (!--ret) break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
|
|
|
|
/****************************************************************/
|
2005-07-30 21:09:43 +02:00
|
|
|
/* device functions */
|
|
|
|
|
|
|
|
static struct list device_hash[DEVICE_HASH_SIZE];
|
|
|
|
|
2006-11-01 13:28:05 +01:00
|
|
|
static int is_device_removable( dev_t dev, int unix_fd )
|
|
|
|
{
|
|
|
|
#if defined(linux) && defined(HAVE_FSTATFS)
|
|
|
|
struct statfs stfs;
|
|
|
|
|
|
|
|
/* check for floppy disk */
|
|
|
|
if (major(dev) == FLOPPY_MAJOR) return 1;
|
|
|
|
|
|
|
|
if (fstatfs( unix_fd, &stfs ) == -1) return 0;
|
|
|
|
return (stfs.f_type == 0x9660 || /* iso9660 */
|
|
|
|
stfs.f_type == 0x9fa1 || /* supermount */
|
|
|
|
stfs.f_type == 0x15013346); /* udf */
|
2012-05-28 19:21:04 +02:00
|
|
|
#elif defined(__FreeBSD__) || defined(__FreeBSD_kernel__) || defined(__DragonFly__) || defined(__APPLE__)
|
2006-11-01 13:28:05 +01:00
|
|
|
struct statfs stfs;
|
|
|
|
|
|
|
|
if (fstatfs( unix_fd, &stfs ) == -1) return 0;
|
2007-08-29 12:02:13 +02:00
|
|
|
return (!strcmp("cd9660", stfs.f_fstypename) || !strcmp("udf", stfs.f_fstypename));
|
2006-11-01 13:28:05 +01:00
|
|
|
#elif defined(__NetBSD__)
|
|
|
|
struct statvfs stfs;
|
|
|
|
|
|
|
|
if (fstatvfs( unix_fd, &stfs ) == -1) return 0;
|
2007-08-29 12:02:13 +02:00
|
|
|
return (!strcmp("cd9660", stfs.f_fstypename) || !strcmp("udf", stfs.f_fstypename));
|
2006-11-01 13:28:05 +01:00
|
|
|
#elif defined(sun)
|
|
|
|
# include <sys/dkio.h>
|
|
|
|
# include <sys/vtoc.h>
|
|
|
|
struct dk_cinfo dkinf;
|
|
|
|
if (ioctl( unix_fd, DKIOCINFO, &dkinf ) == -1) return 0;
|
|
|
|
return (dkinf.dki_ctype == DKC_CDROM ||
|
|
|
|
dkinf.dki_ctype == DKC_NCRFLOPPY ||
|
|
|
|
dkinf.dki_ctype == DKC_SMSFLOPPY ||
|
|
|
|
dkinf.dki_ctype == DKC_INTEL82072 ||
|
|
|
|
dkinf.dki_ctype == DKC_INTEL82077);
|
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2005-07-30 21:09:43 +02:00
|
|
|
/* retrieve the device object for a given fd, creating it if needed */
|
2006-11-01 13:28:05 +01:00
|
|
|
static struct device *get_device( dev_t dev, int unix_fd )
|
2005-07-30 21:09:43 +02:00
|
|
|
{
|
|
|
|
struct device *device;
|
|
|
|
unsigned int i, hash = dev % DEVICE_HASH_SIZE;
|
2003-03-12 23:38:14 +01:00
|
|
|
|
2005-07-30 21:09:43 +02:00
|
|
|
if (device_hash[hash].next)
|
|
|
|
{
|
|
|
|
LIST_FOR_EACH_ENTRY( device, &device_hash[hash], struct device, entry )
|
|
|
|
if (device->dev == dev) return (struct device *)grab_object( device );
|
|
|
|
}
|
|
|
|
else list_init( &device_hash[hash] );
|
|
|
|
|
|
|
|
/* not found, create it */
|
2005-10-27 13:20:50 +02:00
|
|
|
|
2006-11-01 13:28:05 +01:00
|
|
|
if (unix_fd == -1) return NULL;
|
2005-07-30 21:09:43 +02:00
|
|
|
if ((device = alloc_object( &device_ops )))
|
|
|
|
{
|
|
|
|
device->dev = dev;
|
2006-11-01 13:28:05 +01:00
|
|
|
device->removable = is_device_removable( dev, unix_fd );
|
2005-07-30 21:09:43 +02:00
|
|
|
for (i = 0; i < INODE_HASH_SIZE; i++) list_init( &device->inode_hash[i] );
|
|
|
|
list_add_head( &device_hash[hash], &device->entry );
|
|
|
|
}
|
|
|
|
return device;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void device_dump( struct object *obj, int verbose )
|
|
|
|
{
|
|
|
|
struct device *device = (struct device *)obj;
|
|
|
|
fprintf( stderr, "Device dev=" );
|
|
|
|
DUMP_LONG_LONG( device->dev );
|
|
|
|
fprintf( stderr, "\n" );
|
|
|
|
}
|
2003-03-12 23:38:14 +01:00
|
|
|
|
2005-07-30 21:09:43 +02:00
|
|
|
static void device_destroy( struct object *obj )
|
|
|
|
{
|
|
|
|
struct device *device = (struct device *)obj;
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
for (i = 0; i < INODE_HASH_SIZE; i++)
|
|
|
|
assert( list_empty(&device->inode_hash[i]) );
|
|
|
|
|
|
|
|
list_remove( &device->entry ); /* remove it from the hash table */
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************************************************************/
|
|
|
|
/* inode functions */
|
2003-03-12 23:38:14 +01:00
|
|
|
|
2003-03-18 06:04:33 +01:00
|
|
|
/* close all pending file descriptors in the closed list */
|
2005-08-08 17:11:03 +02:00
|
|
|
static void inode_close_pending( struct inode *inode, int keep_unlinks )
|
2003-03-18 06:04:33 +01:00
|
|
|
{
|
2004-04-02 21:50:49 +02:00
|
|
|
struct list *ptr = list_head( &inode->closed );
|
|
|
|
|
|
|
|
while (ptr)
|
2003-03-18 06:04:33 +01:00
|
|
|
{
|
2004-04-02 21:50:49 +02:00
|
|
|
struct closed_fd *fd = LIST_ENTRY( ptr, struct closed_fd, entry );
|
|
|
|
struct list *next = list_next( &inode->closed, ptr );
|
|
|
|
|
2005-07-28 12:48:57 +02:00
|
|
|
if (fd->unix_fd != -1)
|
2004-04-02 21:50:49 +02:00
|
|
|
{
|
2005-07-28 12:48:57 +02:00
|
|
|
close( fd->unix_fd );
|
|
|
|
fd->unix_fd = -1;
|
2004-04-02 21:50:49 +02:00
|
|
|
}
|
2015-08-19 11:17:26 +02:00
|
|
|
if (!keep_unlinks || !fd->unlink) /* get rid of it unless there's an unlink pending on that file */
|
2004-04-02 21:50:49 +02:00
|
|
|
{
|
|
|
|
list_remove( ptr );
|
2015-08-19 11:17:26 +02:00
|
|
|
free( fd->unix_name );
|
2004-04-02 21:50:49 +02:00
|
|
|
free( fd );
|
|
|
|
}
|
|
|
|
ptr = next;
|
2003-03-18 06:04:33 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
static void inode_dump( struct object *obj, int verbose )
|
|
|
|
{
|
|
|
|
struct inode *inode = (struct inode *)obj;
|
2005-07-30 21:09:43 +02:00
|
|
|
fprintf( stderr, "Inode device=%p ino=", inode->device );
|
2003-03-12 23:38:14 +01:00
|
|
|
DUMP_LONG_LONG( inode->ino );
|
|
|
|
fprintf( stderr, "\n" );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void inode_destroy( struct object *obj )
|
|
|
|
{
|
|
|
|
struct inode *inode = (struct inode *)obj;
|
2004-04-02 21:50:49 +02:00
|
|
|
struct list *ptr;
|
2003-03-12 23:38:14 +01:00
|
|
|
|
2003-03-18 06:04:33 +01:00
|
|
|
assert( list_empty(&inode->open) );
|
|
|
|
assert( list_empty(&inode->locks) );
|
2003-03-12 23:38:14 +01:00
|
|
|
|
|
|
|
list_remove( &inode->entry );
|
2004-04-02 21:50:49 +02:00
|
|
|
|
|
|
|
while ((ptr = list_head( &inode->closed )))
|
|
|
|
{
|
|
|
|
struct closed_fd *fd = LIST_ENTRY( ptr, struct closed_fd, entry );
|
|
|
|
list_remove( ptr );
|
2005-07-28 12:48:57 +02:00
|
|
|
if (fd->unix_fd != -1) close( fd->unix_fd );
|
2015-08-19 11:17:26 +02:00
|
|
|
if (fd->unlink)
|
2004-04-02 21:50:49 +02:00
|
|
|
{
|
|
|
|
/* make sure it is still the same file */
|
|
|
|
struct stat st;
|
2015-08-19 11:17:26 +02:00
|
|
|
if (!stat( fd->unix_name, &st ) && st.st_dev == inode->device->dev && st.st_ino == inode->ino)
|
2004-04-16 06:31:35 +02:00
|
|
|
{
|
2015-08-19 11:17:26 +02:00
|
|
|
if (S_ISDIR(st.st_mode)) rmdir( fd->unix_name );
|
|
|
|
else unlink( fd->unix_name );
|
2004-04-16 06:31:35 +02:00
|
|
|
}
|
2004-04-02 21:50:49 +02:00
|
|
|
}
|
2015-08-19 11:17:26 +02:00
|
|
|
free( fd->unix_name );
|
2004-04-02 21:50:49 +02:00
|
|
|
free( fd );
|
|
|
|
}
|
2005-07-30 21:09:43 +02:00
|
|
|
release_object( inode->device );
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* retrieve the inode object for a given fd, creating it if needed */
|
2006-11-01 13:28:05 +01:00
|
|
|
static struct inode *get_inode( dev_t dev, ino_t ino, int unix_fd )
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
2005-07-30 21:09:43 +02:00
|
|
|
struct device *device;
|
2003-03-12 23:38:14 +01:00
|
|
|
struct inode *inode;
|
2005-07-30 21:09:43 +02:00
|
|
|
unsigned int hash = ino % INODE_HASH_SIZE;
|
2003-03-12 23:38:14 +01:00
|
|
|
|
2006-11-01 13:28:05 +01:00
|
|
|
if (!(device = get_device( dev, unix_fd ))) return NULL;
|
2005-07-30 21:09:43 +02:00
|
|
|
|
|
|
|
LIST_FOR_EACH_ENTRY( inode, &device->inode_hash[hash], struct inode, entry )
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
2005-07-30 21:09:43 +02:00
|
|
|
if (inode->ino == ino)
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
2005-07-30 21:09:43 +02:00
|
|
|
release_object( device );
|
|
|
|
return (struct inode *)grab_object( inode );
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* not found, create it */
|
|
|
|
if ((inode = alloc_object( &inode_ops )))
|
|
|
|
{
|
2005-07-30 21:09:43 +02:00
|
|
|
inode->device = device;
|
2003-03-12 23:38:14 +01:00
|
|
|
inode->ino = ino;
|
|
|
|
list_init( &inode->open );
|
2003-03-18 06:04:33 +01:00
|
|
|
list_init( &inode->locks );
|
2004-04-02 21:50:49 +02:00
|
|
|
list_init( &inode->closed );
|
2005-07-30 21:09:43 +02:00
|
|
|
list_add_head( &device->inode_hash[hash], &inode->entry );
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
2005-07-30 21:09:43 +02:00
|
|
|
else release_object( device );
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
return inode;
|
|
|
|
}
|
|
|
|
|
2005-07-28 12:48:57 +02:00
|
|
|
/* add fd to the inode list of file descriptors to close */
|
2003-03-12 23:38:14 +01:00
|
|
|
static void inode_add_closed_fd( struct inode *inode, struct closed_fd *fd )
|
|
|
|
{
|
2003-03-18 06:04:33 +01:00
|
|
|
if (!list_empty( &inode->locks ))
|
|
|
|
{
|
2004-04-02 21:50:49 +02:00
|
|
|
list_add_head( &inode->closed, &fd->entry );
|
2003-03-18 06:04:33 +01:00
|
|
|
}
|
2015-08-19 11:17:26 +02:00
|
|
|
else if (fd->unlink) /* close the fd but keep the structure around for unlink */
|
2004-04-02 21:50:49 +02:00
|
|
|
{
|
2005-07-28 12:48:57 +02:00
|
|
|
if (fd->unix_fd != -1) close( fd->unix_fd );
|
|
|
|
fd->unix_fd = -1;
|
2004-04-02 21:50:49 +02:00
|
|
|
list_add_head( &inode->closed, &fd->entry );
|
|
|
|
}
|
|
|
|
else /* no locks on this inode and no unlink, get rid of the fd */
|
2003-03-18 06:04:33 +01:00
|
|
|
{
|
2005-07-28 12:48:57 +02:00
|
|
|
if (fd->unix_fd != -1) close( fd->unix_fd );
|
2015-08-19 11:17:26 +02:00
|
|
|
free( fd->unix_name );
|
2003-03-18 06:04:33 +01:00
|
|
|
free( fd );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/****************************************************************/
|
|
|
|
/* file lock functions */
|
|
|
|
|
|
|
|
static void file_lock_dump( struct object *obj, int verbose )
|
|
|
|
{
|
|
|
|
struct file_lock *lock = (struct file_lock *)obj;
|
|
|
|
fprintf( stderr, "Lock %s fd=%p proc=%p start=",
|
|
|
|
lock->shared ? "shared" : "excl", lock->fd, lock->process );
|
|
|
|
DUMP_LONG_LONG( lock->start );
|
|
|
|
fprintf( stderr, " end=" );
|
|
|
|
DUMP_LONG_LONG( lock->end );
|
|
|
|
fprintf( stderr, "\n" );
|
|
|
|
}
|
|
|
|
|
2013-08-26 11:55:04 +02:00
|
|
|
static int file_lock_signaled( struct object *obj, struct wait_queue_entry *entry )
|
2003-03-18 06:04:33 +01:00
|
|
|
{
|
|
|
|
struct file_lock *lock = (struct file_lock *)obj;
|
|
|
|
/* lock is signaled if it has lost its owner */
|
|
|
|
return !lock->process;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* set (or remove) a Unix lock if possible for the given range */
|
2003-07-03 20:12:02 +02:00
|
|
|
static int set_unix_lock( struct fd *fd, file_pos_t start, file_pos_t end, int type )
|
2003-03-18 06:04:33 +01:00
|
|
|
{
|
|
|
|
struct flock fl;
|
|
|
|
|
2003-07-03 20:12:02 +02:00
|
|
|
if (!fd->fs_locks) return 1; /* no fs locks possible for this fd */
|
2003-03-18 06:04:33 +01:00
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
if (start == end) return 1; /* can't set zero-byte lock */
|
|
|
|
if (start > max_unix_offset) return 1; /* ignore it */
|
|
|
|
fl.l_type = type;
|
|
|
|
fl.l_whence = SEEK_SET;
|
|
|
|
fl.l_start = start;
|
|
|
|
if (!end || end > max_unix_offset) fl.l_len = 0;
|
|
|
|
else fl.l_len = end - start;
|
|
|
|
if (fcntl( fd->unix_fd, F_SETLK, &fl ) != -1) return 1;
|
|
|
|
|
|
|
|
switch(errno)
|
|
|
|
{
|
2003-07-03 20:12:02 +02:00
|
|
|
case EACCES:
|
|
|
|
/* check whether locks work at all on this file system */
|
|
|
|
if (fcntl( fd->unix_fd, F_GETLK, &fl ) != -1)
|
|
|
|
{
|
|
|
|
set_error( STATUS_FILE_LOCK_CONFLICT );
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* fall through */
|
2003-05-11 04:45:33 +02:00
|
|
|
case EIO:
|
|
|
|
case ENOLCK:
|
2014-06-18 17:53:06 +02:00
|
|
|
case ENOTSUP:
|
2003-05-11 04:45:33 +02:00
|
|
|
/* no locking on this fs, just ignore it */
|
2003-07-03 20:12:02 +02:00
|
|
|
fd->fs_locks = 0;
|
2003-05-11 04:45:33 +02:00
|
|
|
return 1;
|
2003-03-18 06:04:33 +01:00
|
|
|
case EAGAIN:
|
|
|
|
set_error( STATUS_FILE_LOCK_CONFLICT );
|
|
|
|
return 0;
|
2003-03-21 22:31:35 +01:00
|
|
|
case EBADF:
|
|
|
|
/* this can happen if we try to set a write lock on a read-only file */
|
2014-05-08 22:03:10 +02:00
|
|
|
/* try to at least grab a read lock */
|
|
|
|
if (fl.l_type == F_WRLCK)
|
|
|
|
{
|
|
|
|
type = F_RDLCK;
|
|
|
|
break; /* retry */
|
|
|
|
}
|
2003-03-21 22:31:35 +01:00
|
|
|
set_error( STATUS_ACCESS_DENIED );
|
|
|
|
return 0;
|
2004-01-02 21:11:35 +01:00
|
|
|
#ifdef EOVERFLOW
|
2003-03-18 06:04:33 +01:00
|
|
|
case EOVERFLOW:
|
2004-01-02 21:11:35 +01:00
|
|
|
#endif
|
2003-05-11 04:45:33 +02:00
|
|
|
case EINVAL:
|
2003-03-18 06:04:33 +01:00
|
|
|
/* this can happen if off_t is 64-bit but the kernel only supports 32-bit */
|
|
|
|
/* in that case we shrink the limit and retry */
|
|
|
|
if (max_unix_offset > INT_MAX)
|
|
|
|
{
|
|
|
|
max_unix_offset = INT_MAX;
|
|
|
|
break; /* retry */
|
|
|
|
}
|
|
|
|
/* fall through */
|
|
|
|
default:
|
|
|
|
file_set_error();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check if interval [start;end) overlaps the lock */
|
2007-03-17 11:52:14 +01:00
|
|
|
static inline int lock_overlaps( struct file_lock *lock, file_pos_t start, file_pos_t end )
|
2003-03-18 06:04:33 +01:00
|
|
|
{
|
|
|
|
if (lock->end && start >= lock->end) return 0;
|
|
|
|
if (end && lock->start >= end) return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove Unix locks for all bytes in the specified area that are no longer locked */
|
2003-07-03 20:12:02 +02:00
|
|
|
static void remove_unix_locks( struct fd *fd, file_pos_t start, file_pos_t end )
|
2003-03-18 06:04:33 +01:00
|
|
|
{
|
|
|
|
struct hole
|
|
|
|
{
|
|
|
|
struct hole *next;
|
|
|
|
struct hole *prev;
|
|
|
|
file_pos_t start;
|
|
|
|
file_pos_t end;
|
|
|
|
} *first, *cur, *next, *buffer;
|
|
|
|
|
|
|
|
struct list *ptr;
|
|
|
|
int count = 0;
|
|
|
|
|
|
|
|
if (!fd->inode) return;
|
2003-07-03 20:12:02 +02:00
|
|
|
if (!fd->fs_locks) return;
|
2003-03-18 06:04:33 +01:00
|
|
|
if (start == end || start > max_unix_offset) return;
|
|
|
|
if (!end || end > max_unix_offset) end = max_unix_offset + 1;
|
|
|
|
|
|
|
|
/* count the number of locks overlapping the specified area */
|
|
|
|
|
|
|
|
LIST_FOR_EACH( ptr, &fd->inode->locks )
|
|
|
|
{
|
|
|
|
struct file_lock *lock = LIST_ENTRY( ptr, struct file_lock, inode_entry );
|
|
|
|
if (lock->start == lock->end) continue;
|
|
|
|
if (lock_overlaps( lock, start, end )) count++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!count) /* no locks at all, we can unlock everything */
|
|
|
|
{
|
|
|
|
set_unix_lock( fd, start, end, F_UNLCK );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* allocate space for the list of holes */
|
|
|
|
/* max. number of holes is number of locks + 1 */
|
|
|
|
|
|
|
|
if (!(buffer = malloc( sizeof(*buffer) * (count+1) ))) return;
|
|
|
|
first = buffer;
|
|
|
|
first->next = NULL;
|
|
|
|
first->prev = NULL;
|
|
|
|
first->start = start;
|
|
|
|
first->end = end;
|
|
|
|
next = first + 1;
|
|
|
|
|
|
|
|
/* build a sorted list of unlocked holes in the specified area */
|
|
|
|
|
|
|
|
LIST_FOR_EACH( ptr, &fd->inode->locks )
|
|
|
|
{
|
|
|
|
struct file_lock *lock = LIST_ENTRY( ptr, struct file_lock, inode_entry );
|
|
|
|
if (lock->start == lock->end) continue;
|
|
|
|
if (!lock_overlaps( lock, start, end )) continue;
|
|
|
|
|
|
|
|
/* go through all the holes touched by this lock */
|
|
|
|
for (cur = first; cur; cur = cur->next)
|
|
|
|
{
|
|
|
|
if (cur->end <= lock->start) continue; /* hole is before start of lock */
|
|
|
|
if (lock->end && cur->start >= lock->end) break; /* hole is after end of lock */
|
|
|
|
|
|
|
|
/* now we know that lock is overlapping hole */
|
|
|
|
|
|
|
|
if (cur->start >= lock->start) /* lock starts before hole, shrink from start */
|
|
|
|
{
|
|
|
|
cur->start = lock->end;
|
|
|
|
if (cur->start && cur->start < cur->end) break; /* done with this lock */
|
|
|
|
/* now hole is empty, remove it */
|
|
|
|
if (cur->next) cur->next->prev = cur->prev;
|
|
|
|
if (cur->prev) cur->prev->next = cur->next;
|
|
|
|
else if (!(first = cur->next)) goto done; /* no more holes at all */
|
|
|
|
}
|
|
|
|
else if (!lock->end || cur->end <= lock->end) /* lock larger than hole, shrink from end */
|
|
|
|
{
|
|
|
|
cur->end = lock->start;
|
|
|
|
assert( cur->start < cur->end );
|
|
|
|
}
|
|
|
|
else /* lock is in the middle of hole, split hole in two */
|
|
|
|
{
|
|
|
|
next->prev = cur;
|
|
|
|
next->next = cur->next;
|
|
|
|
cur->next = next;
|
|
|
|
next->start = lock->end;
|
|
|
|
next->end = cur->end;
|
|
|
|
cur->end = lock->start;
|
|
|
|
assert( next->start < next->end );
|
|
|
|
assert( cur->end < next->start );
|
|
|
|
next++;
|
|
|
|
break; /* done with this lock */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* clear Unix locks for all the holes */
|
|
|
|
|
|
|
|
for (cur = first; cur; cur = cur->next)
|
|
|
|
set_unix_lock( fd, cur->start, cur->end, F_UNLCK );
|
|
|
|
|
|
|
|
done:
|
|
|
|
free( buffer );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* create a new lock on a fd */
|
|
|
|
static struct file_lock *add_lock( struct fd *fd, int shared, file_pos_t start, file_pos_t end )
|
|
|
|
{
|
|
|
|
struct file_lock *lock;
|
|
|
|
|
|
|
|
if (!(lock = alloc_object( &file_lock_ops ))) return NULL;
|
|
|
|
lock->shared = shared;
|
|
|
|
lock->start = start;
|
|
|
|
lock->end = end;
|
|
|
|
lock->fd = fd;
|
|
|
|
lock->process = current->process;
|
|
|
|
|
|
|
|
/* now try to set a Unix lock */
|
|
|
|
if (!set_unix_lock( lock->fd, lock->start, lock->end, lock->shared ? F_RDLCK : F_WRLCK ))
|
|
|
|
{
|
|
|
|
release_object( lock );
|
|
|
|
return NULL;
|
|
|
|
}
|
2011-10-12 12:58:57 +02:00
|
|
|
list_add_tail( &fd->locks, &lock->fd_entry );
|
|
|
|
list_add_tail( &fd->inode->locks, &lock->inode_entry );
|
|
|
|
list_add_tail( &lock->process->locks, &lock->proc_entry );
|
2003-03-18 06:04:33 +01:00
|
|
|
return lock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove an existing lock */
|
|
|
|
static void remove_lock( struct file_lock *lock, int remove_unix )
|
|
|
|
{
|
|
|
|
struct inode *inode = lock->fd->inode;
|
|
|
|
|
|
|
|
list_remove( &lock->fd_entry );
|
|
|
|
list_remove( &lock->inode_entry );
|
|
|
|
list_remove( &lock->proc_entry );
|
|
|
|
if (remove_unix) remove_unix_locks( lock->fd, lock->start, lock->end );
|
2005-08-08 17:11:03 +02:00
|
|
|
if (list_empty( &inode->locks )) inode_close_pending( inode, 1 );
|
2003-03-18 06:04:33 +01:00
|
|
|
lock->process = NULL;
|
|
|
|
wake_up( &lock->obj, 0 );
|
|
|
|
release_object( lock );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove all locks owned by a given process */
|
|
|
|
void remove_process_locks( struct process *process )
|
|
|
|
{
|
|
|
|
struct list *ptr;
|
|
|
|
|
|
|
|
while ((ptr = list_head( &process->locks )))
|
|
|
|
{
|
|
|
|
struct file_lock *lock = LIST_ENTRY( ptr, struct file_lock, proc_entry );
|
|
|
|
remove_lock( lock, 1 ); /* this removes it from the list */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove all locks on a given fd */
|
|
|
|
static void remove_fd_locks( struct fd *fd )
|
|
|
|
{
|
|
|
|
file_pos_t start = FILE_POS_T_MAX, end = 0;
|
|
|
|
struct list *ptr;
|
|
|
|
|
|
|
|
while ((ptr = list_head( &fd->locks )))
|
|
|
|
{
|
|
|
|
struct file_lock *lock = LIST_ENTRY( ptr, struct file_lock, fd_entry );
|
|
|
|
if (lock->start < start) start = lock->start;
|
|
|
|
if (!lock->end || lock->end > end) end = lock->end - 1;
|
|
|
|
remove_lock( lock, 0 );
|
|
|
|
}
|
|
|
|
if (start < end) remove_unix_locks( fd, start, end + 1 );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* add a lock on an fd */
|
|
|
|
/* returns handle to wait on */
|
|
|
|
obj_handle_t lock_fd( struct fd *fd, file_pos_t start, file_pos_t count, int shared, int wait )
|
|
|
|
{
|
|
|
|
struct list *ptr;
|
|
|
|
file_pos_t end = start + count;
|
|
|
|
|
2007-06-20 13:14:55 +02:00
|
|
|
if (!fd->inode) /* not a regular file */
|
|
|
|
{
|
|
|
|
set_error( STATUS_INVALID_DEVICE_REQUEST );
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-03-18 06:04:33 +01:00
|
|
|
/* don't allow wrapping locks */
|
|
|
|
if (end && end < start)
|
|
|
|
{
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check if another lock on that file overlaps the area */
|
|
|
|
LIST_FOR_EACH( ptr, &fd->inode->locks )
|
|
|
|
{
|
|
|
|
struct file_lock *lock = LIST_ENTRY( ptr, struct file_lock, inode_entry );
|
|
|
|
if (!lock_overlaps( lock, start, end )) continue;
|
2011-10-12 12:58:57 +02:00
|
|
|
if (shared && (lock->shared || lock->fd == fd)) continue;
|
2003-03-18 06:04:33 +01:00
|
|
|
/* found one */
|
|
|
|
if (!wait)
|
|
|
|
{
|
|
|
|
set_error( STATUS_FILE_LOCK_CONFLICT );
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
set_error( STATUS_PENDING );
|
|
|
|
return alloc_handle( current->process, lock, SYNCHRONIZE, 0 );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* not found, add it */
|
|
|
|
if (add_lock( fd, shared, start, end )) return 0;
|
|
|
|
if (get_error() == STATUS_FILE_LOCK_CONFLICT)
|
|
|
|
{
|
|
|
|
/* Unix lock conflict -> tell client to wait and retry */
|
|
|
|
if (wait) set_error( STATUS_PENDING );
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* remove a lock on an fd */
|
|
|
|
void unlock_fd( struct fd *fd, file_pos_t start, file_pos_t count )
|
|
|
|
{
|
|
|
|
struct list *ptr;
|
|
|
|
file_pos_t end = start + count;
|
|
|
|
|
|
|
|
/* find an existing lock with the exact same parameters */
|
|
|
|
LIST_FOR_EACH( ptr, &fd->locks )
|
|
|
|
{
|
|
|
|
struct file_lock *lock = LIST_ENTRY( ptr, struct file_lock, fd_entry );
|
|
|
|
if ((lock->start == start) && (lock->end == end))
|
|
|
|
{
|
|
|
|
remove_lock( lock, 1 );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
set_error( STATUS_FILE_LOCK_CONFLICT );
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-02-19 01:33:32 +01:00
|
|
|
/****************************************************************/
|
|
|
|
/* file descriptor functions */
|
|
|
|
|
2003-01-30 01:26:44 +01:00
|
|
|
static void fd_dump( struct object *obj, int verbose )
|
|
|
|
{
|
|
|
|
struct fd *fd = (struct fd *)obj;
|
2007-04-10 22:25:07 +02:00
|
|
|
fprintf( stderr, "Fd unix_fd=%d user=%p options=%08x", fd->unix_fd, fd->user, fd->options );
|
2015-08-19 11:17:26 +02:00
|
|
|
if (fd->inode) fprintf( stderr, " inode=%p unlink=%d", fd->inode, fd->closed->unlink );
|
2005-02-03 11:45:18 +01:00
|
|
|
fprintf( stderr, "\n" );
|
2003-01-30 01:26:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void fd_destroy( struct object *obj )
|
|
|
|
{
|
|
|
|
struct fd *fd = (struct fd *)obj;
|
2003-02-19 01:33:32 +01:00
|
|
|
|
2017-07-04 15:26:19 +02:00
|
|
|
free_async_queue( &fd->read_q );
|
|
|
|
free_async_queue( &fd->write_q );
|
|
|
|
free_async_queue( &fd->wait_q );
|
2005-06-07 22:09:01 +02:00
|
|
|
|
2007-09-27 22:03:39 +02:00
|
|
|
if (fd->completion) release_object( fd->completion );
|
2003-03-18 06:04:33 +01:00
|
|
|
remove_fd_locks( fd );
|
2003-03-12 23:38:14 +01:00
|
|
|
list_remove( &fd->inode_entry );
|
2003-02-19 01:33:32 +01:00
|
|
|
if (fd->poll_index != -1) remove_poll_user( fd, fd->poll_index );
|
2021-02-09 14:11:07 +01:00
|
|
|
free( fd->nt_name );
|
2003-03-12 23:38:14 +01:00
|
|
|
if (fd->inode)
|
|
|
|
{
|
|
|
|
inode_add_closed_fd( fd->inode, fd->closed );
|
|
|
|
release_object( fd->inode );
|
|
|
|
}
|
|
|
|
else /* no inode, close it right away */
|
|
|
|
{
|
|
|
|
if (fd->unix_fd != -1) close( fd->unix_fd );
|
2015-08-19 11:17:26 +02:00
|
|
|
free( fd->unix_name );
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
2003-01-30 01:26:44 +01:00
|
|
|
}
|
|
|
|
|
2011-04-18 13:41:32 +02:00
|
|
|
/* check if the desired access is possible without violating */
|
|
|
|
/* the sharing mode of other opens of the same file */
|
|
|
|
static unsigned int check_sharing( struct fd *fd, unsigned int access, unsigned int sharing,
|
|
|
|
unsigned int open_flags, unsigned int options )
|
|
|
|
{
|
2011-07-01 18:33:33 +02:00
|
|
|
/* only a few access bits are meaningful wrt sharing */
|
|
|
|
const unsigned int read_access = FILE_READ_DATA | FILE_EXECUTE;
|
|
|
|
const unsigned int write_access = FILE_WRITE_DATA | FILE_APPEND_DATA;
|
|
|
|
const unsigned int all_access = read_access | write_access | DELETE;
|
|
|
|
|
2011-04-18 13:41:32 +02:00
|
|
|
unsigned int existing_sharing = FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE;
|
|
|
|
unsigned int existing_access = 0;
|
|
|
|
struct list *ptr;
|
|
|
|
|
|
|
|
fd->access = access;
|
|
|
|
fd->sharing = sharing;
|
|
|
|
|
|
|
|
LIST_FOR_EACH( ptr, &fd->inode->open )
|
|
|
|
{
|
|
|
|
struct fd *fd_ptr = LIST_ENTRY( ptr, struct fd, inode_entry );
|
|
|
|
if (fd_ptr != fd)
|
|
|
|
{
|
|
|
|
/* if access mode is 0, sharing mode is ignored */
|
2011-07-01 18:33:33 +02:00
|
|
|
if (fd_ptr->access & all_access) existing_sharing &= fd_ptr->sharing;
|
|
|
|
existing_access |= fd_ptr->access;
|
2011-04-18 13:41:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-01 18:33:33 +02:00
|
|
|
if (((access & read_access) && !(existing_sharing & FILE_SHARE_READ)) ||
|
|
|
|
((access & write_access) && !(existing_sharing & FILE_SHARE_WRITE)) ||
|
2011-04-18 13:41:32 +02:00
|
|
|
((access & DELETE) && !(existing_sharing & FILE_SHARE_DELETE)))
|
|
|
|
return STATUS_SHARING_VIOLATION;
|
|
|
|
if (((existing_access & FILE_MAPPING_WRITE) && !(sharing & FILE_SHARE_WRITE)) ||
|
2011-07-01 18:33:33 +02:00
|
|
|
((existing_access & FILE_MAPPING_IMAGE) && (access & FILE_WRITE_DATA)))
|
2011-04-18 13:41:32 +02:00
|
|
|
return STATUS_SHARING_VIOLATION;
|
|
|
|
if ((existing_access & FILE_MAPPING_IMAGE) && (options & FILE_DELETE_ON_CLOSE))
|
|
|
|
return STATUS_CANNOT_DELETE;
|
|
|
|
if ((existing_access & FILE_MAPPING_ACCESS) && (open_flags & O_TRUNC))
|
|
|
|
return STATUS_USER_MAPPED_FILE;
|
2011-07-01 18:33:33 +02:00
|
|
|
if (!(access & all_access))
|
|
|
|
return 0; /* if access mode is 0, sharing mode is ignored (except for mappings) */
|
|
|
|
if (((existing_access & read_access) && !(sharing & FILE_SHARE_READ)) ||
|
|
|
|
((existing_access & write_access) && !(sharing & FILE_SHARE_WRITE)) ||
|
2011-04-18 13:41:32 +02:00
|
|
|
((existing_access & DELETE) && !(sharing & FILE_SHARE_DELETE)))
|
|
|
|
return STATUS_SHARING_VIOLATION;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-02-19 01:33:32 +01:00
|
|
|
/* set the events that select waits for on this fd */
|
|
|
|
void set_fd_events( struct fd *fd, int events )
|
|
|
|
{
|
|
|
|
int user = fd->poll_index;
|
|
|
|
assert( poll_users[user] == fd );
|
2004-09-23 06:48:24 +02:00
|
|
|
|
|
|
|
set_fd_epoll_events( fd, user, events );
|
|
|
|
|
2003-02-19 01:33:32 +01:00
|
|
|
if (events == -1) /* stop waiting on this fd completely */
|
|
|
|
{
|
|
|
|
pollfd[user].fd = -1;
|
|
|
|
pollfd[user].events = POLLERR;
|
|
|
|
pollfd[user].revents = 0;
|
|
|
|
}
|
2021-05-18 04:29:58 +02:00
|
|
|
else
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
|
|
|
pollfd[user].fd = fd->unix_fd;
|
|
|
|
pollfd[user].events = events;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-08-08 17:11:03 +02:00
|
|
|
/* prepare an fd for unmounting its corresponding device */
|
|
|
|
static inline void unmount_fd( struct fd *fd )
|
|
|
|
{
|
|
|
|
assert( fd->inode );
|
|
|
|
|
2017-07-04 15:26:19 +02:00
|
|
|
async_wake_up( &fd->read_q, STATUS_VOLUME_DISMOUNTED );
|
|
|
|
async_wake_up( &fd->write_q, STATUS_VOLUME_DISMOUNTED );
|
2005-08-08 17:11:03 +02:00
|
|
|
|
|
|
|
if (fd->poll_index != -1) set_fd_events( fd, -1 );
|
|
|
|
|
|
|
|
if (fd->unix_fd != -1) close( fd->unix_fd );
|
|
|
|
|
|
|
|
fd->unix_fd = -1;
|
2007-04-18 16:05:59 +02:00
|
|
|
fd->no_fd_status = STATUS_VOLUME_DISMOUNTED;
|
2005-08-08 17:11:03 +02:00
|
|
|
fd->closed->unix_fd = -1;
|
2015-08-19 11:17:26 +02:00
|
|
|
fd->closed->unlink = 0;
|
2005-08-08 17:11:03 +02:00
|
|
|
|
|
|
|
/* stop using Unix locks on this fd (existing locks have been removed by close) */
|
|
|
|
fd->fs_locks = 0;
|
|
|
|
}
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
/* allocate an fd object, without setting the unix fd yet */
|
2006-01-24 13:30:55 +01:00
|
|
|
static struct fd *alloc_fd_object(void)
|
2003-01-30 01:26:44 +01:00
|
|
|
{
|
2003-02-19 01:33:32 +01:00
|
|
|
struct fd *fd = alloc_object( &fd_ops );
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
if (!fd) return NULL;
|
|
|
|
|
2006-01-24 13:30:55 +01:00
|
|
|
fd->fd_ops = NULL;
|
|
|
|
fd->user = NULL;
|
2003-03-12 23:38:14 +01:00
|
|
|
fd->inode = NULL;
|
|
|
|
fd->closed = NULL;
|
2004-03-27 21:48:42 +01:00
|
|
|
fd->access = 0;
|
2007-04-10 22:25:07 +02:00
|
|
|
fd->options = 0;
|
2004-03-27 21:48:42 +01:00
|
|
|
fd->sharing = 0;
|
2003-03-12 23:38:14 +01:00
|
|
|
fd->unix_fd = -1;
|
2009-11-12 15:10:12 +01:00
|
|
|
fd->unix_name = NULL;
|
2021-02-09 14:11:07 +01:00
|
|
|
fd->nt_name = NULL;
|
|
|
|
fd->nt_namelen = 0;
|
2010-08-23 17:09:45 +02:00
|
|
|
fd->cacheable = 0;
|
2007-04-04 19:39:29 +02:00
|
|
|
fd->signaled = 1;
|
2003-07-03 20:12:02 +02:00
|
|
|
fd->fs_locks = 1;
|
2003-02-19 01:33:32 +01:00
|
|
|
fd->poll_index = -1;
|
2007-09-27 22:03:39 +02:00
|
|
|
fd->completion = NULL;
|
2018-10-25 14:55:24 +02:00
|
|
|
fd->comp_flags = 0;
|
2017-07-04 15:26:19 +02:00
|
|
|
init_async_queue( &fd->read_q );
|
|
|
|
init_async_queue( &fd->write_q );
|
|
|
|
init_async_queue( &fd->wait_q );
|
2003-03-12 23:38:14 +01:00
|
|
|
list_init( &fd->inode_entry );
|
2003-03-18 06:04:33 +01:00
|
|
|
list_init( &fd->locks );
|
2003-03-12 23:38:14 +01:00
|
|
|
|
|
|
|
if ((fd->poll_index = add_poll_user( fd )) == -1)
|
|
|
|
{
|
|
|
|
release_object( fd );
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2005-12-12 14:27:45 +01:00
|
|
|
/* allocate a pseudo fd object, for objects that need to behave like files but don't have a unix fd */
|
2007-05-03 16:07:30 +02:00
|
|
|
struct fd *alloc_pseudo_fd( const struct fd_ops *fd_user_ops, struct object *user, unsigned int options )
|
2005-12-12 14:27:45 +01:00
|
|
|
{
|
|
|
|
struct fd *fd = alloc_object( &fd_ops );
|
|
|
|
|
|
|
|
if (!fd) return NULL;
|
|
|
|
|
|
|
|
fd->fd_ops = fd_user_ops;
|
|
|
|
fd->user = user;
|
|
|
|
fd->inode = NULL;
|
|
|
|
fd->closed = NULL;
|
|
|
|
fd->access = 0;
|
2007-05-03 16:07:30 +02:00
|
|
|
fd->options = options;
|
2005-12-12 14:27:45 +01:00
|
|
|
fd->sharing = 0;
|
2009-11-12 15:10:12 +01:00
|
|
|
fd->unix_name = NULL;
|
2021-02-09 14:11:07 +01:00
|
|
|
fd->nt_name = NULL;
|
|
|
|
fd->nt_namelen = 0;
|
2005-12-12 14:27:45 +01:00
|
|
|
fd->unix_fd = -1;
|
2010-08-23 17:09:45 +02:00
|
|
|
fd->cacheable = 0;
|
2021-09-14 08:02:46 +02:00
|
|
|
fd->signaled = 1;
|
2005-12-12 14:27:45 +01:00
|
|
|
fd->fs_locks = 0;
|
|
|
|
fd->poll_index = -1;
|
2007-09-27 22:03:39 +02:00
|
|
|
fd->completion = NULL;
|
2018-10-25 14:55:24 +02:00
|
|
|
fd->comp_flags = 0;
|
2007-04-18 16:05:59 +02:00
|
|
|
fd->no_fd_status = STATUS_BAD_DEVICE_TYPE;
|
2017-07-04 15:26:19 +02:00
|
|
|
init_async_queue( &fd->read_q );
|
|
|
|
init_async_queue( &fd->write_q );
|
|
|
|
init_async_queue( &fd->wait_q );
|
2005-12-12 14:27:45 +01:00
|
|
|
list_init( &fd->inode_entry );
|
|
|
|
list_init( &fd->locks );
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2009-11-23 16:16:46 +01:00
|
|
|
/* duplicate an fd object for a different user */
|
2009-11-23 17:09:08 +01:00
|
|
|
struct fd *dup_fd_object( struct fd *orig, unsigned int access, unsigned int sharing, unsigned int options )
|
2009-11-23 16:16:46 +01:00
|
|
|
{
|
2011-04-18 13:41:32 +02:00
|
|
|
unsigned int err;
|
2010-08-30 00:09:53 +02:00
|
|
|
struct fd *fd = alloc_fd_object();
|
2009-11-23 16:16:46 +01:00
|
|
|
|
|
|
|
if (!fd) return NULL;
|
|
|
|
|
2009-11-23 17:09:08 +01:00
|
|
|
fd->options = options;
|
2010-08-23 17:09:45 +02:00
|
|
|
fd->cacheable = orig->cacheable;
|
2009-11-23 16:16:46 +01:00
|
|
|
|
2010-08-30 00:09:53 +02:00
|
|
|
if (orig->unix_name)
|
|
|
|
{
|
|
|
|
if (!(fd->unix_name = mem_alloc( strlen(orig->unix_name) + 1 ))) goto failed;
|
|
|
|
strcpy( fd->unix_name, orig->unix_name );
|
|
|
|
}
|
2021-02-09 14:11:07 +01:00
|
|
|
if (orig->nt_namelen)
|
|
|
|
{
|
|
|
|
if (!(fd->nt_name = memdup( orig->nt_name, orig->nt_namelen ))) goto failed;
|
|
|
|
fd->nt_namelen = orig->nt_namelen;
|
|
|
|
}
|
2009-11-23 16:16:46 +01:00
|
|
|
|
|
|
|
if (orig->inode)
|
|
|
|
{
|
|
|
|
struct closed_fd *closed = mem_alloc( sizeof(*closed) );
|
|
|
|
if (!closed) goto failed;
|
|
|
|
if ((fd->unix_fd = dup( orig->unix_fd )) == -1)
|
|
|
|
{
|
2010-04-01 15:40:23 +02:00
|
|
|
file_set_error();
|
2009-11-23 16:16:46 +01:00
|
|
|
free( closed );
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
closed->unix_fd = fd->unix_fd;
|
2015-08-19 11:17:26 +02:00
|
|
|
closed->unlink = 0;
|
|
|
|
closed->unix_name = fd->unix_name;
|
2009-11-23 16:16:46 +01:00
|
|
|
fd->closed = closed;
|
|
|
|
fd->inode = (struct inode *)grab_object( orig->inode );
|
|
|
|
list_add_head( &fd->inode->open, &fd->inode_entry );
|
2011-04-18 13:41:32 +02:00
|
|
|
if ((err = check_sharing( fd, access, sharing, 0, options )))
|
|
|
|
{
|
|
|
|
set_error( err );
|
|
|
|
goto failed;
|
|
|
|
}
|
2009-11-23 16:16:46 +01:00
|
|
|
}
|
2010-04-01 15:40:23 +02:00
|
|
|
else if ((fd->unix_fd = dup( orig->unix_fd )) == -1)
|
|
|
|
{
|
|
|
|
file_set_error();
|
|
|
|
goto failed;
|
|
|
|
}
|
2009-11-23 16:16:46 +01:00
|
|
|
return fd;
|
|
|
|
|
|
|
|
failed:
|
|
|
|
release_object( fd );
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2011-04-19 17:19:31 +02:00
|
|
|
/* find an existing fd object that can be reused for a mapping */
|
|
|
|
struct fd *get_fd_object_for_mapping( struct fd *fd, unsigned int access, unsigned int sharing )
|
|
|
|
{
|
|
|
|
struct fd *fd_ptr;
|
|
|
|
|
|
|
|
if (!fd->inode) return NULL;
|
|
|
|
|
|
|
|
LIST_FOR_EACH_ENTRY( fd_ptr, &fd->inode->open, struct fd, inode_entry )
|
|
|
|
if (fd_ptr->access == access && fd_ptr->sharing == sharing)
|
|
|
|
return (struct fd *)grab_object( fd_ptr );
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2006-01-24 13:30:55 +01:00
|
|
|
/* sets the user of an fd that previously had no user */
|
|
|
|
void set_fd_user( struct fd *fd, const struct fd_ops *user_ops, struct object *user )
|
|
|
|
{
|
|
|
|
assert( fd->fd_ops == NULL );
|
|
|
|
fd->fd_ops = user_ops;
|
|
|
|
fd->user = user;
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:26:44 +02:00
|
|
|
char *dup_fd_name( struct fd *root, const char *name )
|
2009-12-01 17:38:24 +01:00
|
|
|
{
|
|
|
|
char *ret;
|
|
|
|
|
|
|
|
if (!root) return strdup( name );
|
|
|
|
if (!root->unix_name) return NULL;
|
|
|
|
|
|
|
|
/* skip . prefix */
|
|
|
|
if (name[0] == '.' && (!name[1] || name[1] == '/')) name++;
|
|
|
|
|
|
|
|
if ((ret = malloc( strlen(root->unix_name) + strlen(name) + 2 )))
|
|
|
|
{
|
|
|
|
strcpy( ret, root->unix_name );
|
|
|
|
if (name[0] && name[0] != '/') strcat( ret, "/" );
|
|
|
|
strcat( ret, name );
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-02-09 14:11:07 +01:00
|
|
|
static WCHAR *dup_nt_name( struct fd *root, struct unicode_str name, data_size_t *len )
|
|
|
|
{
|
|
|
|
WCHAR *ret;
|
|
|
|
data_size_t retlen;
|
|
|
|
|
|
|
|
if (!root)
|
|
|
|
{
|
|
|
|
*len = name.len;
|
|
|
|
if (!name.len) return NULL;
|
|
|
|
return memdup( name.str, name.len );
|
|
|
|
}
|
|
|
|
if (!root->nt_namelen) return NULL;
|
|
|
|
retlen = root->nt_namelen;
|
|
|
|
|
|
|
|
/* skip . prefix */
|
|
|
|
if (name.len && name.str[0] == '.' && (name.len == sizeof(WCHAR) || name.str[1] == '\\'))
|
|
|
|
{
|
|
|
|
name.str++;
|
|
|
|
name.len -= sizeof(WCHAR);
|
|
|
|
}
|
2022-01-20 23:12:32 +01:00
|
|
|
if ((ret = malloc( retlen + name.len + sizeof(WCHAR) )))
|
2021-02-09 14:11:07 +01:00
|
|
|
{
|
|
|
|
memcpy( ret, root->nt_name, root->nt_namelen );
|
|
|
|
if (name.len && name.str[0] != '\\' &&
|
|
|
|
root->nt_namelen && root->nt_name[root->nt_namelen / sizeof(WCHAR) - 1] != '\\')
|
|
|
|
{
|
|
|
|
ret[retlen / sizeof(WCHAR)] = '\\';
|
|
|
|
retlen += sizeof(WCHAR);
|
|
|
|
}
|
|
|
|
memcpy( ret + retlen / sizeof(WCHAR), name.str, name.len );
|
|
|
|
*len = retlen + name.len;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
void get_nt_name( struct fd *fd, struct unicode_str *name )
|
|
|
|
{
|
|
|
|
name->str = fd->nt_name;
|
|
|
|
name->len = fd->nt_namelen;
|
|
|
|
}
|
|
|
|
|
2006-01-24 13:30:55 +01:00
|
|
|
/* open() wrapper that returns a struct fd with no fd user set */
|
2021-02-09 14:11:07 +01:00
|
|
|
struct fd *open_fd( struct fd *root, const char *name, struct unicode_str nt_name,
|
|
|
|
int flags, mode_t *mode, unsigned int access,
|
2006-01-24 13:30:55 +01:00
|
|
|
unsigned int sharing, unsigned int options )
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
struct closed_fd *closed_fd;
|
2006-01-24 13:30:55 +01:00
|
|
|
struct fd *fd;
|
2009-12-01 17:38:24 +01:00
|
|
|
int root_fd = -1;
|
2006-01-25 15:06:48 +01:00
|
|
|
int rw_mode;
|
2020-03-20 18:15:24 +01:00
|
|
|
char *path;
|
2003-03-12 23:38:14 +01:00
|
|
|
|
2009-12-08 12:18:44 +01:00
|
|
|
if (((options & FILE_DELETE_ON_CLOSE) && !(access & DELETE)) ||
|
|
|
|
((options & FILE_DIRECTORY_FILE) && (flags & O_TRUNC)))
|
2006-01-27 15:50:38 +01:00
|
|
|
{
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2006-01-24 13:30:55 +01:00
|
|
|
if (!(fd = alloc_fd_object())) return NULL;
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2007-04-10 22:25:07 +02:00
|
|
|
fd->options = options;
|
2015-08-19 11:17:26 +02:00
|
|
|
if (!(closed_fd = mem_alloc( sizeof(*closed_fd) )))
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
|
|
|
release_object( fd );
|
|
|
|
return NULL;
|
|
|
|
}
|
2006-01-25 15:06:48 +01:00
|
|
|
|
2009-12-01 17:38:24 +01:00
|
|
|
if (root)
|
|
|
|
{
|
|
|
|
if ((root_fd = get_unix_fd( root )) == -1) goto error;
|
|
|
|
if (fchdir( root_fd ) == -1)
|
|
|
|
{
|
|
|
|
file_set_error();
|
|
|
|
root_fd = -1;
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-04-27 04:27:09 +02:00
|
|
|
/* create the directory if needed */
|
|
|
|
if ((options & FILE_DIRECTORY_FILE) && (flags & O_CREAT))
|
|
|
|
{
|
2013-11-08 20:04:56 +01:00
|
|
|
if (mkdir( name, *mode ) == -1)
|
2004-04-27 04:27:09 +02:00
|
|
|
{
|
|
|
|
if (errno != EEXIST || (flags & O_EXCL))
|
|
|
|
{
|
|
|
|
file_set_error();
|
2006-01-24 13:30:55 +01:00
|
|
|
goto error;
|
2004-04-27 04:27:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
|
|
|
|
}
|
2006-01-25 15:06:48 +01:00
|
|
|
|
|
|
|
if ((access & FILE_UNIX_WRITE_ACCESS) && !(options & FILE_DIRECTORY_FILE))
|
|
|
|
{
|
|
|
|
if (access & FILE_UNIX_READ_ACCESS) rw_mode = O_RDWR;
|
|
|
|
else rw_mode = O_WRONLY;
|
|
|
|
}
|
|
|
|
else rw_mode = O_RDONLY;
|
|
|
|
|
|
|
|
if ((fd->unix_fd = open( name, rw_mode | (flags & ~O_TRUNC), *mode )) == -1)
|
2003-02-19 01:33:32 +01:00
|
|
|
{
|
2006-01-25 15:06:48 +01:00
|
|
|
/* if we tried to open a directory for write access, retry read-only */
|
2009-12-08 12:18:44 +01:00
|
|
|
if (errno == EISDIR)
|
|
|
|
{
|
|
|
|
if ((access & FILE_UNIX_WRITE_ACCESS) || (flags & O_CREAT))
|
|
|
|
fd->unix_fd = open( name, O_RDONLY | (flags & ~(O_TRUNC | O_CREAT | O_EXCL)), *mode );
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fd->unix_fd == -1)
|
2006-01-25 15:06:48 +01:00
|
|
|
{
|
|
|
|
file_set_error();
|
|
|
|
goto error;
|
|
|
|
}
|
2003-02-19 01:33:32 +01:00
|
|
|
}
|
2006-01-25 15:06:48 +01:00
|
|
|
|
2021-02-09 14:11:07 +01:00
|
|
|
fd->nt_name = dup_nt_name( root, nt_name, &fd->nt_namelen );
|
2020-03-20 18:15:24 +01:00
|
|
|
fd->unix_name = NULL;
|
|
|
|
if ((path = dup_fd_name( root, name )))
|
|
|
|
{
|
|
|
|
fd->unix_name = realpath( path, NULL );
|
|
|
|
free( path );
|
|
|
|
}
|
|
|
|
|
2005-07-28 12:48:57 +02:00
|
|
|
closed_fd->unix_fd = fd->unix_fd;
|
2015-08-19 11:17:26 +02:00
|
|
|
closed_fd->unlink = 0;
|
|
|
|
closed_fd->unix_name = fd->unix_name;
|
2003-03-12 23:38:14 +01:00
|
|
|
fstat( fd->unix_fd, &st );
|
|
|
|
*mode = st.st_mode;
|
|
|
|
|
2004-04-16 06:31:35 +02:00
|
|
|
/* only bother with an inode for normal files and directories */
|
|
|
|
if (S_ISREG(st.st_mode) || S_ISDIR(st.st_mode))
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
2009-11-23 17:24:09 +01:00
|
|
|
unsigned int err;
|
2006-11-01 13:28:05 +01:00
|
|
|
struct inode *inode = get_inode( st.st_dev, st.st_ino, fd->unix_fd );
|
2003-03-12 23:38:14 +01:00
|
|
|
|
|
|
|
if (!inode)
|
|
|
|
{
|
|
|
|
/* we can close the fd because there are no others open on the same file,
|
|
|
|
* otherwise we wouldn't have failed to allocate a new inode
|
|
|
|
*/
|
2004-04-16 06:31:35 +02:00
|
|
|
goto error;
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
|
|
|
fd->inode = inode;
|
|
|
|
fd->closed = closed_fd;
|
2010-08-23 17:09:45 +02:00
|
|
|
fd->cacheable = !inode->device->removable;
|
2003-03-12 23:38:14 +01:00
|
|
|
list_add_head( &inode->open, &fd->inode_entry );
|
2015-09-24 04:20:18 +02:00
|
|
|
closed_fd = NULL;
|
2004-09-09 02:28:36 +02:00
|
|
|
|
|
|
|
/* check directory options */
|
|
|
|
if ((options & FILE_DIRECTORY_FILE) && !S_ISDIR(st.st_mode))
|
|
|
|
{
|
|
|
|
set_error( STATUS_NOT_A_DIRECTORY );
|
2015-09-24 04:20:18 +02:00
|
|
|
goto error;
|
2004-09-09 02:28:36 +02:00
|
|
|
}
|
|
|
|
if ((options & FILE_NON_DIRECTORY_FILE) && S_ISDIR(st.st_mode))
|
|
|
|
{
|
|
|
|
set_error( STATUS_FILE_IS_A_DIRECTORY );
|
2015-09-24 04:20:18 +02:00
|
|
|
goto error;
|
2004-09-09 02:28:36 +02:00
|
|
|
}
|
2009-11-23 17:24:09 +01:00
|
|
|
if ((err = check_sharing( fd, access, sharing, flags, options )))
|
2004-03-27 21:48:42 +01:00
|
|
|
{
|
2009-11-23 17:24:09 +01:00
|
|
|
set_error( err );
|
2015-09-24 04:20:18 +02:00
|
|
|
goto error;
|
2004-03-27 21:48:42 +01:00
|
|
|
}
|
2015-11-11 01:21:41 +01:00
|
|
|
|
|
|
|
/* can't unlink files if we don't have permission to access */
|
|
|
|
if ((options & FILE_DELETE_ON_CLOSE) && !(flags & O_CREAT) &&
|
|
|
|
!(st.st_mode & (S_IWUSR | S_IWGRP | S_IWOTH)))
|
|
|
|
{
|
|
|
|
set_error( STATUS_CANNOT_DELETE );
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2018-11-09 12:01:12 +01:00
|
|
|
fd->closed->unlink = (options & FILE_DELETE_ON_CLOSE) ? -1 : 0;
|
2009-12-08 12:18:44 +01:00
|
|
|
if (flags & O_TRUNC)
|
|
|
|
{
|
|
|
|
if (S_ISDIR(st.st_mode))
|
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_NAME_COLLISION );
|
2015-09-24 04:20:18 +02:00
|
|
|
goto error;
|
2009-12-08 12:18:44 +01:00
|
|
|
}
|
|
|
|
ftruncate( fd->unix_fd, 0 );
|
|
|
|
}
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
2004-09-09 02:28:36 +02:00
|
|
|
else /* special file */
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
2015-08-19 11:17:26 +02:00
|
|
|
if (options & FILE_DELETE_ON_CLOSE) /* we can't unlink special files */
|
2004-04-02 21:50:49 +02:00
|
|
|
{
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
2004-04-16 06:31:35 +02:00
|
|
|
goto error;
|
2004-04-02 21:50:49 +02:00
|
|
|
}
|
2004-04-16 06:31:35 +02:00
|
|
|
free( closed_fd );
|
2010-08-23 17:09:45 +02:00
|
|
|
fd->cacheable = 1;
|
2003-03-12 23:38:14 +01:00
|
|
|
}
|
2021-08-20 13:12:53 +02:00
|
|
|
|
|
|
|
#ifdef HAVE_POSIX_FADVISE
|
|
|
|
switch (options & (FILE_SEQUENTIAL_ONLY | FILE_RANDOM_ACCESS))
|
|
|
|
{
|
|
|
|
case FILE_SEQUENTIAL_ONLY:
|
|
|
|
posix_fadvise( fd->unix_fd, 0, 0, POSIX_FADV_SEQUENTIAL );
|
|
|
|
break;
|
|
|
|
case FILE_RANDOM_ACCESS:
|
|
|
|
posix_fadvise( fd->unix_fd, 0, 0, POSIX_FADV_RANDOM );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-09-24 04:20:18 +02:00
|
|
|
if (root_fd != -1) fchdir( server_dir_fd ); /* go back to the server dir */
|
2003-02-19 01:33:32 +01:00
|
|
|
return fd;
|
2004-04-16 06:31:35 +02:00
|
|
|
|
|
|
|
error:
|
|
|
|
release_object( fd );
|
|
|
|
free( closed_fd );
|
2009-12-01 17:38:24 +01:00
|
|
|
if (root_fd != -1) fchdir( server_dir_fd ); /* go back to the server dir */
|
2004-04-16 06:31:35 +02:00
|
|
|
return NULL;
|
2003-01-30 01:26:44 +01:00
|
|
|
}
|
|
|
|
|
2003-03-12 23:38:14 +01:00
|
|
|
/* create an fd for an anonymous file */
|
|
|
|
/* if the function fails the unix fd is closed */
|
2007-04-10 22:25:07 +02:00
|
|
|
struct fd *create_anonymous_fd( const struct fd_ops *fd_user_ops, int unix_fd, struct object *user,
|
|
|
|
unsigned int options )
|
2003-03-12 23:38:14 +01:00
|
|
|
{
|
2006-01-24 13:30:55 +01:00
|
|
|
struct fd *fd = alloc_fd_object();
|
2003-03-12 23:38:14 +01:00
|
|
|
|
|
|
|
if (fd)
|
|
|
|
{
|
2006-01-24 13:30:55 +01:00
|
|
|
set_fd_user( fd, fd_user_ops, user );
|
2003-03-12 23:38:14 +01:00
|
|
|
fd->unix_fd = unix_fd;
|
2007-04-10 22:25:07 +02:00
|
|
|
fd->options = options;
|
2003-03-12 23:38:14 +01:00
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
close( unix_fd );
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2003-02-14 21:27:09 +01:00
|
|
|
/* retrieve the object that is using an fd */
|
|
|
|
void *get_fd_user( struct fd *fd )
|
2003-01-30 01:26:44 +01:00
|
|
|
{
|
2003-02-14 21:27:09 +01:00
|
|
|
return fd->user;
|
|
|
|
}
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2007-04-10 22:25:07 +02:00
|
|
|
/* retrieve the opening options for the fd */
|
|
|
|
unsigned int get_fd_options( struct fd *fd )
|
|
|
|
{
|
|
|
|
return fd->options;
|
|
|
|
}
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
/* retrieve the completion flags for the fd */
|
|
|
|
unsigned int get_fd_comp_flags( struct fd *fd )
|
|
|
|
{
|
|
|
|
return fd->comp_flags;
|
|
|
|
}
|
|
|
|
|
2018-10-31 16:44:56 +01:00
|
|
|
/* check if fd is in overlapped mode */
|
|
|
|
int is_fd_overlapped( struct fd *fd )
|
|
|
|
{
|
|
|
|
return !(fd->options & (FILE_SYNCHRONOUS_IO_ALERT | FILE_SYNCHRONOUS_IO_NONALERT));
|
|
|
|
}
|
|
|
|
|
2003-02-14 21:27:09 +01:00
|
|
|
/* retrieve the unix fd for an object */
|
|
|
|
int get_unix_fd( struct fd *fd )
|
|
|
|
{
|
2007-04-18 16:05:59 +02:00
|
|
|
if (fd->unix_fd == -1) set_error( fd->no_fd_status );
|
2003-02-19 01:33:32 +01:00
|
|
|
return fd->unix_fd;
|
2003-01-30 01:26:44 +01:00
|
|
|
}
|
|
|
|
|
2004-03-27 21:48:42 +01:00
|
|
|
/* check if two file descriptors point to the same file */
|
|
|
|
int is_same_file_fd( struct fd *fd1, struct fd *fd2 )
|
|
|
|
{
|
|
|
|
return fd1->inode == fd2->inode;
|
|
|
|
}
|
|
|
|
|
2010-08-23 17:09:45 +02:00
|
|
|
/* allow the fd to be cached (can't be reset once set) */
|
|
|
|
void allow_fd_caching( struct fd *fd )
|
|
|
|
{
|
|
|
|
fd->cacheable = 1;
|
|
|
|
}
|
|
|
|
|
2007-01-12 14:42:43 +01:00
|
|
|
/* check if fd is on a removable device */
|
|
|
|
int is_fd_removable( struct fd *fd )
|
|
|
|
{
|
|
|
|
return (fd->inode && fd->inode->device->removable);
|
|
|
|
}
|
|
|
|
|
2007-04-04 19:39:29 +02:00
|
|
|
/* set or clear the fd signaled state */
|
|
|
|
void set_fd_signaled( struct fd *fd, int signaled )
|
|
|
|
{
|
2018-11-01 12:40:04 +01:00
|
|
|
if (fd->comp_flags & FILE_SKIP_SET_EVENT_ON_HANDLE) return;
|
2007-04-04 19:39:29 +02:00
|
|
|
fd->signaled = signaled;
|
|
|
|
if (signaled) wake_up( fd->user, 0 );
|
|
|
|
}
|
|
|
|
|
2003-02-14 21:27:09 +01:00
|
|
|
/* check if events are pending and if yes return which one(s) */
|
|
|
|
int check_fd_events( struct fd *fd, int events )
|
|
|
|
{
|
|
|
|
struct pollfd pfd;
|
|
|
|
|
2005-08-08 17:11:03 +02:00
|
|
|
if (fd->unix_fd == -1) return POLLERR;
|
2007-04-10 17:07:27 +02:00
|
|
|
if (fd->inode) return events; /* regular files are always signaled */
|
2005-08-08 17:11:03 +02:00
|
|
|
|
2003-02-14 21:27:09 +01:00
|
|
|
pfd.fd = fd->unix_fd;
|
|
|
|
pfd.events = events;
|
|
|
|
if (poll( &pfd, 1, 0 ) <= 0) return 0;
|
|
|
|
return pfd.revents;
|
2003-01-30 01:26:44 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* default signaled() routine for objects that poll() on an fd */
|
2013-08-26 11:55:04 +02:00
|
|
|
int default_fd_signaled( struct object *obj, struct wait_queue_entry *entry )
|
2003-01-30 01:26:44 +01:00
|
|
|
{
|
2003-02-19 01:33:32 +01:00
|
|
|
struct fd *fd = get_obj_fd( obj );
|
2007-04-04 19:39:29 +02:00
|
|
|
int ret = fd->signaled;
|
2003-02-19 01:33:32 +01:00
|
|
|
release_object( fd );
|
|
|
|
return ret;
|
2003-01-30 01:26:44 +01:00
|
|
|
}
|
|
|
|
|
2005-06-07 22:09:01 +02:00
|
|
|
int default_fd_get_poll_events( struct fd *fd )
|
|
|
|
{
|
|
|
|
int events = 0;
|
|
|
|
|
2017-07-04 15:26:19 +02:00
|
|
|
if (async_waiting( &fd->read_q )) events |= POLLIN;
|
|
|
|
if (async_waiting( &fd->write_q )) events |= POLLOUT;
|
2005-06-07 22:09:01 +02:00
|
|
|
return events;
|
|
|
|
}
|
|
|
|
|
2003-02-14 21:27:09 +01:00
|
|
|
/* default handler for poll() events */
|
|
|
|
void default_poll_event( struct fd *fd, int event )
|
|
|
|
{
|
2017-07-04 15:26:19 +02:00
|
|
|
if (event & (POLLIN | POLLERR | POLLHUP)) async_wake_up( &fd->read_q, STATUS_ALERTED );
|
|
|
|
if (event & (POLLOUT | POLLERR | POLLHUP)) async_wake_up( &fd->write_q, STATUS_ALERTED );
|
2005-06-07 22:09:01 +02:00
|
|
|
|
|
|
|
/* if an error occurred, stop polling this fd to avoid busy-looping */
|
2003-02-19 01:33:32 +01:00
|
|
|
if (event & (POLLERR | POLLHUP)) set_fd_events( fd, -1 );
|
2007-04-10 17:07:27 +02:00
|
|
|
else if (!fd->inode) set_fd_events( fd, fd->fd_ops->get_poll_events( fd ) );
|
2003-02-14 21:27:09 +01:00
|
|
|
}
|
|
|
|
|
2017-07-04 15:26:35 +02:00
|
|
|
void fd_queue_async( struct fd *fd, struct async *async, int type )
|
2005-06-07 22:09:01 +02:00
|
|
|
{
|
2007-04-02 20:09:29 +02:00
|
|
|
struct async_queue *queue;
|
2005-06-07 22:09:01 +02:00
|
|
|
|
|
|
|
switch (type)
|
|
|
|
{
|
|
|
|
case ASYNC_TYPE_READ:
|
2017-07-04 15:26:19 +02:00
|
|
|
queue = &fd->read_q;
|
2005-06-07 22:09:01 +02:00
|
|
|
break;
|
|
|
|
case ASYNC_TYPE_WRITE:
|
2017-07-04 15:26:19 +02:00
|
|
|
queue = &fd->write_q;
|
2005-06-07 22:09:01 +02:00
|
|
|
break;
|
2007-04-02 12:47:52 +02:00
|
|
|
case ASYNC_TYPE_WAIT:
|
2017-07-04 15:26:19 +02:00
|
|
|
queue = &fd->wait_q;
|
2007-04-02 12:47:52 +02:00
|
|
|
break;
|
2005-06-07 22:09:01 +02:00
|
|
|
default:
|
2007-04-20 13:11:54 +02:00
|
|
|
queue = NULL;
|
2007-04-02 20:24:55 +02:00
|
|
|
assert(0);
|
2005-06-07 22:09:01 +02:00
|
|
|
}
|
|
|
|
|
2017-02-22 14:50:49 +01:00
|
|
|
queue_async( queue, async );
|
|
|
|
|
|
|
|
if (type != ASYNC_TYPE_WAIT)
|
2007-04-02 20:41:59 +02:00
|
|
|
{
|
2017-02-22 14:50:49 +01:00
|
|
|
if (!fd->inode)
|
|
|
|
set_fd_events( fd, fd->fd_ops->get_poll_events( fd ) );
|
|
|
|
else /* regular files are always ready for read and write */
|
|
|
|
async_wake_up( queue, STATUS_ALERTED );
|
2007-04-02 20:41:59 +02:00
|
|
|
}
|
2005-06-07 22:09:01 +02:00
|
|
|
}
|
|
|
|
|
2007-04-02 20:09:29 +02:00
|
|
|
void fd_async_wake_up( struct fd *fd, int type, unsigned int status )
|
2007-04-02 12:47:52 +02:00
|
|
|
{
|
|
|
|
switch (type)
|
|
|
|
{
|
|
|
|
case ASYNC_TYPE_READ:
|
2017-07-04 15:26:19 +02:00
|
|
|
async_wake_up( &fd->read_q, status );
|
2007-04-02 12:47:52 +02:00
|
|
|
break;
|
|
|
|
case ASYNC_TYPE_WRITE:
|
2017-07-04 15:26:19 +02:00
|
|
|
async_wake_up( &fd->write_q, status );
|
2007-04-02 12:47:52 +02:00
|
|
|
break;
|
|
|
|
case ASYNC_TYPE_WAIT:
|
2017-07-04 15:26:19 +02:00
|
|
|
async_wake_up( &fd->wait_q, status );
|
2007-04-02 12:47:52 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
assert(0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-04 06:11:38 +02:00
|
|
|
void fd_cancel_async( struct fd *fd, struct async *async )
|
|
|
|
{
|
|
|
|
fd->fd_ops->cancel_async( fd, async );
|
|
|
|
}
|
|
|
|
|
2007-04-10 17:07:27 +02:00
|
|
|
void fd_reselect_async( struct fd *fd, struct async_queue *queue )
|
|
|
|
{
|
|
|
|
fd->fd_ops->reselect_async( fd, queue );
|
|
|
|
}
|
|
|
|
|
2017-02-15 22:12:45 +01:00
|
|
|
void no_fd_queue_async( struct fd *fd, struct async *async, int type, int count )
|
2009-11-23 16:16:46 +01:00
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
}
|
|
|
|
|
2021-09-04 06:11:38 +02:00
|
|
|
void default_fd_cancel_async( struct fd *fd, struct async *async )
|
|
|
|
{
|
|
|
|
async_terminate( async, STATUS_CANCELLED );
|
|
|
|
}
|
|
|
|
|
2017-02-15 22:12:45 +01:00
|
|
|
void default_fd_queue_async( struct fd *fd, struct async *async, int type, int count )
|
2005-07-14 14:18:05 +02:00
|
|
|
{
|
2017-07-04 15:26:35 +02:00
|
|
|
fd_queue_async( fd, async, type );
|
|
|
|
set_error( STATUS_PENDING );
|
2005-07-14 14:18:05 +02:00
|
|
|
}
|
|
|
|
|
2007-04-10 17:07:27 +02:00
|
|
|
/* default reselect_async() fd routine */
|
|
|
|
void default_fd_reselect_async( struct fd *fd, struct async_queue *queue )
|
|
|
|
{
|
2017-07-04 15:26:19 +02:00
|
|
|
if (queue == &fd->read_q || queue == &fd->write_q)
|
2007-04-10 17:07:27 +02:00
|
|
|
{
|
|
|
|
int poll_events = fd->fd_ops->get_poll_events( fd );
|
|
|
|
int events = check_fd_events( fd, poll_events );
|
|
|
|
if (events) fd->fd_ops->poll_event( fd, events );
|
|
|
|
else set_fd_events( fd, poll_events );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-10-03 14:54:21 +02:00
|
|
|
static inline int is_valid_mounted_device( struct stat *st )
|
|
|
|
{
|
|
|
|
#if defined(linux) || defined(__sun__)
|
|
|
|
return S_ISBLK( st->st_mode );
|
|
|
|
#else
|
|
|
|
/* disks are char devices on *BSD */
|
|
|
|
return S_ISCHR( st->st_mode );
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2005-08-08 17:11:03 +02:00
|
|
|
/* close all Unix file descriptors on a device to allow unmounting it */
|
2005-10-27 13:20:50 +02:00
|
|
|
static void unmount_device( struct fd *device_fd )
|
2005-08-08 17:11:03 +02:00
|
|
|
{
|
|
|
|
unsigned int i;
|
2005-10-27 13:20:50 +02:00
|
|
|
struct stat st;
|
|
|
|
struct device *device;
|
2005-08-08 17:11:03 +02:00
|
|
|
struct inode *inode;
|
|
|
|
struct fd *fd;
|
2005-12-12 14:27:45 +01:00
|
|
|
int unix_fd = get_unix_fd( device_fd );
|
2005-08-08 17:11:03 +02:00
|
|
|
|
2005-12-12 14:27:45 +01:00
|
|
|
if (unix_fd == -1) return;
|
|
|
|
|
2006-10-03 14:54:21 +02:00
|
|
|
if (fstat( unix_fd, &st ) == -1 || !is_valid_mounted_device( &st ))
|
2005-10-27 13:20:50 +02:00
|
|
|
{
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2006-11-01 13:28:05 +01:00
|
|
|
if (!(device = get_device( st.st_rdev, -1 ))) return;
|
2005-10-27 13:20:50 +02:00
|
|
|
|
2005-08-08 17:11:03 +02:00
|
|
|
for (i = 0; i < INODE_HASH_SIZE; i++)
|
|
|
|
{
|
|
|
|
LIST_FOR_EACH_ENTRY( inode, &device->inode_hash[i], struct inode, entry )
|
|
|
|
{
|
|
|
|
LIST_FOR_EACH_ENTRY( fd, &inode->open, struct fd, inode_entry )
|
|
|
|
{
|
|
|
|
unmount_fd( fd );
|
|
|
|
}
|
|
|
|
inode_close_pending( inode, 0 );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* remove it from the hash table */
|
|
|
|
list_remove( &device->entry );
|
|
|
|
list_init( &device->entry );
|
2005-10-27 13:20:50 +02:00
|
|
|
release_object( device );
|
2005-08-08 17:11:03 +02:00
|
|
|
}
|
|
|
|
|
2015-05-05 05:17:45 +02:00
|
|
|
/* default read() routine */
|
2021-09-03 02:08:51 +02:00
|
|
|
void no_fd_read( struct fd *fd, struct async *async, file_pos_t pos )
|
2015-05-05 05:17:45 +02:00
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* default write() routine */
|
2021-09-03 02:08:52 +02:00
|
|
|
void no_fd_write( struct fd *fd, struct async *async, file_pos_t pos )
|
2015-05-05 05:17:45 +02:00
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
}
|
|
|
|
|
|
|
|
/* default flush() routine */
|
2021-09-03 02:08:53 +02:00
|
|
|
void no_fd_flush( struct fd *fd, struct async *async )
|
2015-05-05 05:17:45 +02:00
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
}
|
|
|
|
|
2017-12-21 16:12:01 +01:00
|
|
|
/* default get_file_info() routine */
|
2018-10-15 13:40:36 +02:00
|
|
|
void no_fd_get_file_info( struct fd *fd, obj_handle_t handle, unsigned int info_class )
|
2017-12-21 16:12:01 +01:00
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
}
|
|
|
|
|
2018-10-23 17:45:06 +02:00
|
|
|
/* default get_file_info() routine */
|
|
|
|
void default_fd_get_file_info( struct fd *fd, obj_handle_t handle, unsigned int info_class )
|
|
|
|
{
|
2018-10-23 17:45:21 +02:00
|
|
|
switch (info_class)
|
|
|
|
{
|
|
|
|
case FileAccessInformation:
|
|
|
|
{
|
|
|
|
FILE_ACCESS_INFORMATION info;
|
|
|
|
if (get_reply_max_size() < sizeof(info))
|
|
|
|
{
|
|
|
|
set_error( STATUS_INFO_LENGTH_MISMATCH );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
info.AccessFlags = get_handle_access( current->process, handle );
|
|
|
|
set_reply_data( &info, sizeof(info) );
|
|
|
|
break;
|
|
|
|
}
|
2018-10-29 15:48:30 +01:00
|
|
|
case FileModeInformation:
|
|
|
|
{
|
|
|
|
FILE_MODE_INFORMATION info;
|
|
|
|
if (get_reply_max_size() < sizeof(info))
|
|
|
|
{
|
|
|
|
set_error( STATUS_INFO_LENGTH_MISMATCH );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
info.Mode = fd->options & ( FILE_WRITE_THROUGH
|
|
|
|
| FILE_SEQUENTIAL_ONLY
|
|
|
|
| FILE_NO_INTERMEDIATE_BUFFERING
|
|
|
|
| FILE_SYNCHRONOUS_IO_ALERT
|
|
|
|
| FILE_SYNCHRONOUS_IO_NONALERT );
|
|
|
|
set_reply_data( &info, sizeof(info) );
|
|
|
|
break;
|
|
|
|
}
|
2018-10-23 17:45:42 +02:00
|
|
|
case FileIoCompletionNotificationInformation:
|
|
|
|
{
|
|
|
|
FILE_IO_COMPLETION_NOTIFICATION_INFORMATION info;
|
|
|
|
if (get_reply_max_size() < sizeof(info))
|
|
|
|
{
|
|
|
|
set_error( STATUS_INFO_LENGTH_MISMATCH );
|
|
|
|
return;
|
|
|
|
}
|
2018-10-25 14:55:24 +02:00
|
|
|
info.Flags = fd->comp_flags;
|
2018-10-23 17:45:42 +02:00
|
|
|
set_reply_data( &info, sizeof(info) );
|
|
|
|
break;
|
|
|
|
}
|
2018-10-23 17:45:21 +02:00
|
|
|
default:
|
|
|
|
set_error( STATUS_NOT_IMPLEMENTED );
|
|
|
|
}
|
2018-10-23 17:45:06 +02:00
|
|
|
}
|
|
|
|
|
2017-10-02 16:42:16 +02:00
|
|
|
/* default get_volume_info() routine */
|
2021-09-03 02:08:50 +02:00
|
|
|
void no_fd_get_volume_info( struct fd *fd, struct async *async, unsigned int info_class )
|
2017-10-02 16:42:16 +02:00
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
}
|
|
|
|
|
2015-05-05 05:17:45 +02:00
|
|
|
/* default ioctl() routine */
|
2021-09-03 02:08:54 +02:00
|
|
|
void no_fd_ioctl( struct fd *fd, ioctl_code_t code, struct async *async )
|
2009-11-23 16:16:46 +01:00
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
}
|
|
|
|
|
2007-04-16 14:54:52 +02:00
|
|
|
/* default ioctl() routine */
|
2021-09-03 02:08:54 +02:00
|
|
|
void default_fd_ioctl( struct fd *fd, ioctl_code_t code, struct async *async )
|
2007-04-16 14:54:52 +02:00
|
|
|
{
|
|
|
|
switch(code)
|
|
|
|
{
|
|
|
|
case FSCTL_DISMOUNT_VOLUME:
|
|
|
|
unmount_device( fd );
|
2021-09-03 02:08:54 +02:00
|
|
|
break;
|
|
|
|
|
2007-04-16 14:54:52 +02:00
|
|
|
default:
|
|
|
|
set_error( STATUS_NOT_SUPPORTED );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-01-30 01:26:44 +01:00
|
|
|
/* same as get_handle_obj but retrieve the struct fd associated to the object */
|
|
|
|
static struct fd *get_handle_fd_obj( struct process *process, obj_handle_t handle,
|
|
|
|
unsigned int access )
|
|
|
|
{
|
|
|
|
struct fd *fd = NULL;
|
|
|
|
struct object *obj;
|
|
|
|
|
2003-02-14 21:27:09 +01:00
|
|
|
if ((obj = get_handle_obj( process, handle, access, NULL )))
|
2003-01-30 01:26:44 +01:00
|
|
|
{
|
2003-04-17 04:14:04 +02:00
|
|
|
fd = get_obj_fd( obj );
|
2003-01-30 01:26:44 +01:00
|
|
|
release_object( obj );
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2020-05-29 05:28:09 +02:00
|
|
|
static int is_dir_empty( int fd )
|
|
|
|
{
|
|
|
|
DIR *dir;
|
|
|
|
int empty;
|
|
|
|
struct dirent *de;
|
|
|
|
|
|
|
|
if ((fd = dup( fd )) == -1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (!(dir = fdopendir( fd )))
|
|
|
|
{
|
|
|
|
close( fd );
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
empty = 1;
|
|
|
|
while (empty && (de = readdir( dir )))
|
|
|
|
{
|
|
|
|
if (!strcmp( de->d_name, "." ) || !strcmp( de->d_name, ".." )) continue;
|
|
|
|
empty = 0;
|
|
|
|
}
|
|
|
|
closedir( dir );
|
|
|
|
return empty;
|
|
|
|
}
|
|
|
|
|
2015-08-19 11:18:01 +02:00
|
|
|
/* set disposition for the fd */
|
|
|
|
static void set_fd_disposition( struct fd *fd, int unlink )
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
|
|
|
|
if (!fd->inode)
|
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fd->unix_fd == -1)
|
|
|
|
{
|
|
|
|
set_error( fd->no_fd_status );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-05-29 05:28:09 +02:00
|
|
|
if (unlink)
|
2015-08-19 11:18:01 +02:00
|
|
|
{
|
2021-06-25 07:28:49 +02:00
|
|
|
struct fd *fd_ptr;
|
|
|
|
|
|
|
|
LIST_FOR_EACH_ENTRY( fd_ptr, &fd->inode->open, struct fd, inode_entry )
|
|
|
|
{
|
|
|
|
if (fd_ptr->access & FILE_MAPPING_ACCESS)
|
|
|
|
{
|
|
|
|
set_error( STATUS_CANNOT_DELETE );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-29 05:28:09 +02:00
|
|
|
if (fstat( fd->unix_fd, &st ) == -1)
|
|
|
|
{
|
|
|
|
file_set_error();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (S_ISREG( st.st_mode )) /* can't unlink files we don't have permission to write */
|
|
|
|
{
|
|
|
|
if (!(st.st_mode & (S_IWUSR | S_IWGRP | S_IWOTH)))
|
|
|
|
{
|
|
|
|
set_error( STATUS_CANNOT_DELETE );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (S_ISDIR( st.st_mode )) /* can't remove non-empty directories */
|
|
|
|
{
|
|
|
|
switch (is_dir_empty( fd->unix_fd ))
|
|
|
|
{
|
|
|
|
case -1:
|
|
|
|
file_set_error();
|
|
|
|
return;
|
|
|
|
case 0:
|
|
|
|
set_error( STATUS_DIRECTORY_NOT_EMPTY );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else /* can't unlink special files */
|
|
|
|
{
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
return;
|
|
|
|
}
|
2015-08-19 11:18:27 +02:00
|
|
|
}
|
|
|
|
|
2018-11-09 12:01:12 +01:00
|
|
|
fd->closed->unlink = unlink ? 1 : 0;
|
|
|
|
if (fd->options & FILE_DELETE_ON_CLOSE)
|
|
|
|
fd->closed->unlink = -1;
|
2015-08-19 11:18:01 +02:00
|
|
|
}
|
|
|
|
|
2015-08-20 10:25:15 +02:00
|
|
|
/* set new name for the fd */
|
2021-02-09 14:11:07 +01:00
|
|
|
static void set_fd_name( struct fd *fd, struct fd *root, const char *nameptr, data_size_t len,
|
|
|
|
struct unicode_str nt_name, int create_link, int replace )
|
2015-08-20 10:25:15 +02:00
|
|
|
{
|
|
|
|
struct inode *inode;
|
2020-03-11 04:38:24 +01:00
|
|
|
struct stat st, st2;
|
2015-08-20 10:25:15 +02:00
|
|
|
char *name;
|
|
|
|
|
|
|
|
if (!fd->inode || !fd->unix_name)
|
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
return;
|
|
|
|
}
|
2020-03-11 04:38:24 +01:00
|
|
|
if (fd->unix_fd == -1)
|
|
|
|
{
|
|
|
|
set_error( fd->no_fd_status );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-08-20 10:25:15 +02:00
|
|
|
if (!len || ((nameptr[0] == '/') ^ !root))
|
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_PATH_SYNTAX_BAD );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!(name = mem_alloc( len + 1 ))) return;
|
|
|
|
memcpy( name, nameptr, len );
|
|
|
|
name[len] = 0;
|
|
|
|
|
|
|
|
if (root)
|
|
|
|
{
|
|
|
|
char *combined_name = dup_fd_name( root, name );
|
|
|
|
if (!combined_name)
|
|
|
|
{
|
|
|
|
set_error( STATUS_NO_MEMORY );
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
free( name );
|
|
|
|
name = combined_name;
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:25:12 +02:00
|
|
|
/* when creating a hard link, source cannot be a dir */
|
2020-03-11 04:38:24 +01:00
|
|
|
if (create_link && !fstat( fd->unix_fd, &st ) && S_ISDIR( st.st_mode ))
|
2015-08-21 07:25:12 +02:00
|
|
|
{
|
|
|
|
set_error( STATUS_FILE_IS_A_DIRECTORY );
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
2015-08-20 10:25:15 +02:00
|
|
|
if (!stat( name, &st ))
|
|
|
|
{
|
2020-03-11 04:38:24 +01:00
|
|
|
if (!fstat( fd->unix_fd, &st2 ) && st.st_ino == st2.st_ino && st.st_dev == st2.st_dev)
|
|
|
|
{
|
|
|
|
if (create_link && !replace) set_error( STATUS_OBJECT_NAME_COLLISION );
|
|
|
|
free( name );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-03-11 04:38:23 +01:00
|
|
|
if (!replace)
|
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_NAME_COLLISION );
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
2015-08-20 10:25:15 +02:00
|
|
|
/* can't replace directories or special files */
|
|
|
|
if (!S_ISREG( st.st_mode ))
|
|
|
|
{
|
|
|
|
set_error( STATUS_ACCESS_DENIED );
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* can't replace an opened file */
|
|
|
|
if ((inode = get_inode( st.st_dev, st.st_ino, -1 )))
|
|
|
|
{
|
|
|
|
int is_empty = list_empty( &inode->open );
|
|
|
|
release_object( inode );
|
|
|
|
if (!is_empty)
|
|
|
|
{
|
|
|
|
set_error( STATUS_ACCESS_DENIED );
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:25:12 +02:00
|
|
|
/* link() expects that the target doesn't exist */
|
2015-08-20 10:25:15 +02:00
|
|
|
/* rename() cannot replace files with directories */
|
2020-03-11 04:38:24 +01:00
|
|
|
if (create_link || S_ISDIR( st2.st_mode ))
|
2015-08-20 10:25:15 +02:00
|
|
|
{
|
2015-08-21 07:25:12 +02:00
|
|
|
if (unlink( name ))
|
|
|
|
{
|
|
|
|
file_set_error();
|
|
|
|
goto failed;
|
|
|
|
}
|
2015-08-20 10:25:15 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-21 07:25:12 +02:00
|
|
|
if (create_link)
|
|
|
|
{
|
|
|
|
if (link( fd->unix_name, name ))
|
|
|
|
file_set_error();
|
|
|
|
free( name );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-08-20 10:25:15 +02:00
|
|
|
if (rename( fd->unix_name, name ))
|
|
|
|
{
|
|
|
|
file_set_error();
|
|
|
|
goto failed;
|
|
|
|
}
|
|
|
|
|
2020-03-11 04:38:25 +01:00
|
|
|
if (is_file_executable( fd->unix_name ) != is_file_executable( name ) && !fstat( fd->unix_fd, &st ))
|
|
|
|
{
|
2020-03-30 07:12:18 +02:00
|
|
|
if (is_file_executable( name ))
|
2020-03-11 04:38:25 +01:00
|
|
|
/* set executable bit where read bit is set */
|
|
|
|
st.st_mode |= (st.st_mode & 0444) >> 2;
|
|
|
|
else
|
|
|
|
st.st_mode &= ~0111;
|
|
|
|
fchmod( fd->unix_fd, st.st_mode );
|
|
|
|
}
|
|
|
|
|
2021-02-09 14:11:07 +01:00
|
|
|
free( fd->nt_name );
|
|
|
|
fd->nt_name = dup_nt_name( root, nt_name, &fd->nt_namelen );
|
2015-08-20 10:25:15 +02:00
|
|
|
free( fd->unix_name );
|
2020-03-20 18:15:24 +01:00
|
|
|
fd->closed->unix_name = fd->unix_name = realpath( name, NULL );
|
|
|
|
free( name );
|
|
|
|
if (!fd->unix_name)
|
|
|
|
set_error( STATUS_NO_MEMORY );
|
2015-08-20 10:25:15 +02:00
|
|
|
return;
|
|
|
|
|
|
|
|
failed:
|
|
|
|
free( name );
|
|
|
|
}
|
|
|
|
|
2021-06-25 07:28:51 +02:00
|
|
|
static void set_fd_eof( struct fd *fd, file_pos_t eof )
|
|
|
|
{
|
|
|
|
struct stat st;
|
|
|
|
|
|
|
|
if (!fd->inode)
|
|
|
|
{
|
|
|
|
set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fd->unix_fd == -1)
|
|
|
|
{
|
|
|
|
set_error( fd->no_fd_status );
|
|
|
|
return;
|
|
|
|
}
|
2021-06-25 07:28:52 +02:00
|
|
|
if (fstat( fd->unix_fd, &st) == -1)
|
|
|
|
{
|
2021-06-25 07:28:51 +02:00
|
|
|
file_set_error();
|
2021-06-25 07:28:52 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (eof < st.st_size)
|
|
|
|
{
|
|
|
|
struct fd *fd_ptr;
|
|
|
|
LIST_FOR_EACH_ENTRY( fd_ptr, &fd->inode->open, struct fd, inode_entry )
|
|
|
|
{
|
|
|
|
if (fd_ptr->access & FILE_MAPPING_ACCESS)
|
|
|
|
{
|
|
|
|
set_error( STATUS_USER_MAPPED_FILE );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ftruncate( fd->unix_fd, eof ) == -1) file_set_error();
|
|
|
|
}
|
|
|
|
else grow_file( fd->unix_fd, eof );
|
2021-06-25 07:28:51 +02:00
|
|
|
}
|
|
|
|
|
2009-03-02 20:34:39 +01:00
|
|
|
struct completion *fd_get_completion( struct fd *fd, apc_param_t *p_key )
|
2007-11-09 23:11:48 +01:00
|
|
|
{
|
2007-12-17 20:06:17 +01:00
|
|
|
*p_key = fd->comp_key;
|
2009-03-02 20:34:39 +01:00
|
|
|
return fd->completion ? (struct completion *)grab_object( fd->completion ) : NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void fd_copy_completion( struct fd *src, struct fd *dst )
|
|
|
|
{
|
|
|
|
assert( !dst->completion );
|
|
|
|
dst->completion = fd_get_completion( src, &dst->comp_key );
|
2018-10-25 14:55:24 +02:00
|
|
|
dst->comp_flags = src->comp_flags;
|
2007-11-09 23:11:48 +01:00
|
|
|
}
|
|
|
|
|
2003-01-30 01:26:44 +01:00
|
|
|
/* flush a file buffers */
|
2015-05-05 05:23:08 +02:00
|
|
|
DECL_HANDLER(flush)
|
2003-01-30 01:26:44 +01:00
|
|
|
{
|
2015-05-05 05:23:08 +02:00
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->async.handle, 0 );
|
2017-02-15 22:13:17 +01:00
|
|
|
struct async *async;
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2017-02-15 22:13:17 +01:00
|
|
|
if (!fd) return;
|
|
|
|
|
2018-10-25 14:56:08 +02:00
|
|
|
if ((async = create_request_async( fd, fd->comp_flags, &req->async )))
|
2003-01-30 01:26:44 +01:00
|
|
|
{
|
2021-09-03 02:08:49 +02:00
|
|
|
fd->fd_ops->flush( fd, async );
|
|
|
|
reply->event = async_handoff( async, NULL, 1 );
|
2017-02-15 22:13:17 +01:00
|
|
|
release_object( async );
|
2003-02-14 21:27:09 +01:00
|
|
|
}
|
2017-02-15 22:13:17 +01:00
|
|
|
release_object( fd );
|
2003-02-14 21:27:09 +01:00
|
|
|
}
|
|
|
|
|
2017-12-21 16:12:01 +01:00
|
|
|
/* query file info */
|
|
|
|
DECL_HANDLER(get_file_info)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->handle, 0 );
|
|
|
|
|
|
|
|
if (fd)
|
|
|
|
{
|
2018-10-15 13:40:36 +02:00
|
|
|
fd->fd_ops->get_file_info( fd, req->handle, req->info_class );
|
2017-12-21 16:12:01 +01:00
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-02 16:42:16 +02:00
|
|
|
/* query volume info */
|
|
|
|
DECL_HANDLER(get_volume_info)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->handle, 0 );
|
2020-05-24 05:39:41 +02:00
|
|
|
struct async *async;
|
2017-10-02 16:42:16 +02:00
|
|
|
|
2020-05-24 05:39:41 +02:00
|
|
|
if (!fd) return;
|
|
|
|
|
|
|
|
if ((async = create_request_async( fd, fd->comp_flags, &req->async )))
|
2017-10-02 16:42:16 +02:00
|
|
|
{
|
2021-09-03 02:08:49 +02:00
|
|
|
fd->fd_ops->get_volume_info( fd, async, req->info_class );
|
|
|
|
reply->wait = async_handoff( async, NULL, 1 );
|
2020-05-24 05:39:41 +02:00
|
|
|
release_object( async );
|
2017-10-02 16:42:16 +02:00
|
|
|
}
|
2020-05-24 05:39:41 +02:00
|
|
|
release_object( fd );
|
2017-10-02 16:42:16 +02:00
|
|
|
}
|
|
|
|
|
2005-12-12 14:27:45 +01:00
|
|
|
/* open a file object */
|
|
|
|
DECL_HANDLER(open_file_object)
|
|
|
|
{
|
2016-01-29 08:36:45 +01:00
|
|
|
struct unicode_str name = get_req_unicode_str();
|
2016-02-09 12:19:34 +01:00
|
|
|
struct object *obj, *result, *root = NULL;
|
2005-12-12 14:27:45 +01:00
|
|
|
|
2016-02-09 12:19:34 +01:00
|
|
|
if (req->rootdir && !(root = get_handle_obj( current->process, req->rootdir, 0, NULL ))) return;
|
|
|
|
|
|
|
|
obj = open_named_object( root, NULL, &name, req->attributes );
|
|
|
|
if (root) release_object( root );
|
|
|
|
if (!obj) return;
|
2005-12-12 14:27:45 +01:00
|
|
|
|
2015-08-21 07:26:44 +02:00
|
|
|
if ((result = obj->ops->open_file( obj, req->access, req->sharing, req->options )))
|
|
|
|
{
|
|
|
|
reply->handle = alloc_handle( current->process, result, req->access, req->attributes );
|
|
|
|
release_object( result );
|
|
|
|
}
|
|
|
|
release_object( obj );
|
2005-12-12 14:27:45 +01:00
|
|
|
}
|
|
|
|
|
2009-11-12 15:10:12 +01:00
|
|
|
/* get the Unix name from a file handle */
|
|
|
|
DECL_HANDLER(get_handle_unix_name)
|
|
|
|
{
|
|
|
|
struct fd *fd;
|
|
|
|
|
|
|
|
if ((fd = get_handle_fd_obj( current->process, req->handle, 0 )))
|
|
|
|
{
|
|
|
|
if (fd->unix_name)
|
|
|
|
{
|
|
|
|
data_size_t name_len = strlen( fd->unix_name );
|
|
|
|
reply->name_len = name_len;
|
|
|
|
if (name_len <= get_reply_max_size()) set_reply_data( fd->unix_name, name_len );
|
|
|
|
else set_error( STATUS_BUFFER_OVERFLOW );
|
|
|
|
}
|
2010-10-19 17:03:40 +02:00
|
|
|
else set_error( STATUS_OBJECT_TYPE_MISMATCH );
|
2009-11-12 15:10:12 +01:00
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-02-14 21:27:09 +01:00
|
|
|
/* get a Unix fd to access a file */
|
|
|
|
DECL_HANDLER(get_handle_fd)
|
|
|
|
{
|
|
|
|
struct fd *fd;
|
|
|
|
|
2007-04-10 22:32:46 +02:00
|
|
|
if ((fd = get_handle_fd_obj( current->process, req->handle, 0 )))
|
2003-02-14 21:27:09 +01:00
|
|
|
{
|
2007-04-18 16:05:59 +02:00
|
|
|
int unix_fd = get_unix_fd( fd );
|
2016-10-24 17:48:56 +02:00
|
|
|
reply->cacheable = fd->cacheable;
|
2007-04-18 16:05:59 +02:00
|
|
|
if (unix_fd != -1)
|
2003-02-14 21:27:09 +01:00
|
|
|
{
|
2007-04-18 16:05:59 +02:00
|
|
|
reply->type = fd->fd_ops->get_fd_type( fd );
|
|
|
|
reply->options = fd->options;
|
|
|
|
reply->access = get_handle_access( current->process, req->handle );
|
2008-02-19 16:51:16 +01:00
|
|
|
send_client_fd( current->process, unix_fd, req->handle );
|
2003-02-14 21:27:09 +01:00
|
|
|
}
|
2003-01-30 01:26:44 +01:00
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-05 05:50:51 +02:00
|
|
|
/* perform a read on a file object */
|
|
|
|
DECL_HANDLER(read)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->async.handle, FILE_READ_DATA );
|
2017-02-15 22:12:37 +01:00
|
|
|
struct async *async;
|
2015-05-05 05:50:51 +02:00
|
|
|
|
2017-01-26 00:51:49 +01:00
|
|
|
if (!fd) return;
|
|
|
|
|
2018-10-25 14:56:08 +02:00
|
|
|
if ((async = create_request_async( fd, fd->comp_flags, &req->async )))
|
2015-05-05 05:50:51 +02:00
|
|
|
{
|
2021-09-03 02:08:49 +02:00
|
|
|
fd->fd_ops->read( fd, async, req->pos );
|
|
|
|
reply->wait = async_handoff( async, NULL, 0 );
|
2017-06-13 16:46:41 +02:00
|
|
|
reply->options = fd->options;
|
|
|
|
release_object( async );
|
2015-05-05 05:50:51 +02:00
|
|
|
}
|
2017-01-26 00:51:49 +01:00
|
|
|
release_object( fd );
|
2015-05-05 05:50:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* perform a write on a file object */
|
|
|
|
DECL_HANDLER(write)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->async.handle, FILE_WRITE_DATA );
|
2017-02-15 22:12:37 +01:00
|
|
|
struct async *async;
|
2015-05-05 05:50:51 +02:00
|
|
|
|
2017-01-26 00:51:49 +01:00
|
|
|
if (!fd) return;
|
|
|
|
|
2018-10-25 14:56:08 +02:00
|
|
|
if ((async = create_request_async( fd, fd->comp_flags, &req->async )))
|
2015-05-05 05:50:51 +02:00
|
|
|
{
|
2021-09-03 02:08:49 +02:00
|
|
|
fd->fd_ops->write( fd, async, req->pos );
|
|
|
|
reply->wait = async_handoff( async, &reply->size, 0 );
|
2017-06-26 12:18:23 +02:00
|
|
|
reply->options = fd->options;
|
|
|
|
release_object( async );
|
2015-05-05 05:50:51 +02:00
|
|
|
}
|
2017-01-26 00:51:49 +01:00
|
|
|
release_object( fd );
|
2015-05-05 05:50:51 +02:00
|
|
|
}
|
|
|
|
|
2007-04-16 14:45:03 +02:00
|
|
|
/* perform an ioctl on a file */
|
|
|
|
DECL_HANDLER(ioctl)
|
|
|
|
{
|
|
|
|
unsigned int access = (req->code >> 14) & (FILE_READ_DATA|FILE_WRITE_DATA);
|
2008-12-26 12:17:20 +01:00
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->async.handle, access );
|
2017-02-15 22:12:59 +01:00
|
|
|
struct async *async;
|
2007-04-16 14:45:03 +02:00
|
|
|
|
2017-02-15 22:12:59 +01:00
|
|
|
if (!fd) return;
|
|
|
|
|
2018-10-25 14:56:08 +02:00
|
|
|
if ((async = create_request_async( fd, fd->comp_flags, &req->async )))
|
2007-04-16 14:45:03 +02:00
|
|
|
{
|
2021-09-03 02:08:49 +02:00
|
|
|
fd->fd_ops->ioctl( fd, req->code, async );
|
|
|
|
reply->wait = async_handoff( async, NULL, 0 );
|
2017-06-26 12:20:10 +02:00
|
|
|
reply->options = fd->options;
|
|
|
|
release_object( async );
|
2007-04-16 14:45:03 +02:00
|
|
|
}
|
2017-02-15 22:12:59 +01:00
|
|
|
release_object( fd );
|
2007-04-16 14:45:03 +02:00
|
|
|
}
|
|
|
|
|
2003-01-30 01:26:44 +01:00
|
|
|
/* create / reschedule an async I/O */
|
|
|
|
DECL_HANDLER(register_async)
|
|
|
|
{
|
2007-04-02 20:24:55 +02:00
|
|
|
unsigned int access;
|
2017-02-15 22:12:45 +01:00
|
|
|
struct async *async;
|
2007-04-02 20:24:55 +02:00
|
|
|
struct fd *fd;
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2007-04-02 20:24:55 +02:00
|
|
|
switch(req->type)
|
|
|
|
{
|
|
|
|
case ASYNC_TYPE_READ:
|
|
|
|
access = FILE_READ_DATA;
|
|
|
|
break;
|
|
|
|
case ASYNC_TYPE_WRITE:
|
|
|
|
access = FILE_WRITE_DATA;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
return;
|
|
|
|
}
|
2003-01-30 01:26:44 +01:00
|
|
|
|
2008-12-26 12:17:20 +01:00
|
|
|
if ((fd = get_handle_fd_obj( current->process, req->async.handle, access )))
|
2003-01-30 01:26:44 +01:00
|
|
|
{
|
2017-06-26 12:19:28 +02:00
|
|
|
if (get_unix_fd( fd ) != -1 && (async = create_async( fd, current, &req->async, NULL )))
|
2017-02-15 22:12:45 +01:00
|
|
|
{
|
|
|
|
fd->fd_ops->queue_async( fd, async, req->type, req->count );
|
|
|
|
release_object( async );
|
|
|
|
}
|
2003-01-30 01:26:44 +01:00
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
2005-01-14 20:54:38 +01:00
|
|
|
|
2007-09-27 22:03:39 +02:00
|
|
|
/* attach completion object to a fd */
|
|
|
|
DECL_HANDLER(set_completion_info)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->handle, 0 );
|
|
|
|
|
|
|
|
if (fd)
|
|
|
|
{
|
2018-10-31 16:44:56 +01:00
|
|
|
if (is_fd_overlapped( fd ) && !fd->completion)
|
2007-09-27 22:03:39 +02:00
|
|
|
{
|
|
|
|
fd->completion = get_completion_obj( current->process, req->chandle, IO_COMPLETION_MODIFY_STATE );
|
|
|
|
fd->comp_key = req->ckey;
|
|
|
|
}
|
|
|
|
else set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
2007-11-09 23:11:58 +01:00
|
|
|
|
|
|
|
/* push new completion msg into a completion queue attached to the fd */
|
|
|
|
DECL_HANDLER(add_fd_completion)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->handle, 0 );
|
|
|
|
if (fd)
|
|
|
|
{
|
2018-10-25 14:56:24 +02:00
|
|
|
if (fd->completion && (req->async || !(fd->comp_flags & FILE_SKIP_COMPLETION_PORT_ON_SUCCESS)))
|
2007-12-17 20:06:17 +01:00
|
|
|
add_completion( fd->completion, fd->comp_key, req->cvalue, req->status, req->information );
|
2007-11-09 23:11:58 +01:00
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
2015-08-19 11:18:01 +02:00
|
|
|
|
2018-10-25 14:55:24 +02:00
|
|
|
/* set fd completion information */
|
|
|
|
DECL_HANDLER(set_fd_completion_mode)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->handle, 0 );
|
|
|
|
if (fd)
|
|
|
|
{
|
2018-10-31 16:44:56 +01:00
|
|
|
if (is_fd_overlapped( fd ))
|
2018-10-25 14:55:24 +02:00
|
|
|
{
|
2018-11-01 12:40:04 +01:00
|
|
|
if (req->flags & FILE_SKIP_SET_EVENT_ON_HANDLE)
|
|
|
|
set_fd_signaled( fd, 0 );
|
|
|
|
/* removing flags is not allowed */
|
2018-10-25 14:55:24 +02:00
|
|
|
fd->comp_flags |= req->flags & ( FILE_SKIP_COMPLETION_PORT_ON_SUCCESS
|
|
|
|
| FILE_SKIP_SET_EVENT_ON_HANDLE
|
|
|
|
| FILE_SKIP_SET_USER_EVENT_ON_FAST_IO );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-20 10:25:15 +02:00
|
|
|
/* set fd disposition information */
|
|
|
|
DECL_HANDLER(set_fd_disp_info)
|
2015-08-19 11:18:01 +02:00
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->handle, DELETE );
|
|
|
|
if (fd)
|
|
|
|
{
|
|
|
|
set_fd_disposition( fd, req->unlink );
|
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|
2015-08-20 10:25:15 +02:00
|
|
|
|
|
|
|
/* set fd name information */
|
|
|
|
DECL_HANDLER(set_fd_name_info)
|
|
|
|
{
|
|
|
|
struct fd *fd, *root_fd = NULL;
|
2021-02-09 14:11:07 +01:00
|
|
|
struct unicode_str nt_name;
|
2015-08-20 10:25:15 +02:00
|
|
|
|
2021-02-09 13:31:26 +01:00
|
|
|
if (req->namelen > get_req_data_size())
|
|
|
|
{
|
|
|
|
set_error( STATUS_INVALID_PARAMETER );
|
|
|
|
return;
|
|
|
|
}
|
2021-02-09 14:11:07 +01:00
|
|
|
nt_name.str = get_req_data();
|
|
|
|
nt_name.len = (req->namelen / sizeof(WCHAR)) * sizeof(WCHAR);
|
2021-02-09 13:31:26 +01:00
|
|
|
|
2015-08-20 10:25:15 +02:00
|
|
|
if (req->rootdir)
|
|
|
|
{
|
|
|
|
struct dir *root;
|
|
|
|
|
|
|
|
if (!(root = get_dir_obj( current->process, req->rootdir, 0 ))) return;
|
|
|
|
root_fd = get_obj_fd( (struct object *)root );
|
|
|
|
release_object( root );
|
|
|
|
if (!root_fd) return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((fd = get_handle_fd_obj( current->process, req->handle, 0 )))
|
|
|
|
{
|
2021-02-09 13:31:26 +01:00
|
|
|
set_fd_name( fd, root_fd, (const char *)get_req_data() + req->namelen,
|
2021-02-09 14:11:07 +01:00
|
|
|
get_req_data_size() - req->namelen, nt_name, req->link, req->replace );
|
2015-08-20 10:25:15 +02:00
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
if (root_fd) release_object( root_fd );
|
|
|
|
}
|
2021-06-25 07:28:51 +02:00
|
|
|
|
|
|
|
/* set fd eof information */
|
|
|
|
DECL_HANDLER(set_fd_eof_info)
|
|
|
|
{
|
|
|
|
struct fd *fd = get_handle_fd_obj( current->process, req->handle, 0 );
|
|
|
|
if (fd)
|
|
|
|
{
|
|
|
|
set_fd_eof( fd, req->eof );
|
|
|
|
release_object( fd );
|
|
|
|
}
|
|
|
|
}
|