| // Copyright 2019 The Fuchsia Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "local-filesystem.h" |
| |
| #include <lib/fdio/directory.h> |
| #include <lib/fdio/namespace.h> |
| #include <lib/fit/defer.h> |
| #include <lib/stdcompat/string_view.h> |
| #include <lib/zx/channel.h> |
| #include <lib/zxio/types.h> |
| #include <zircon/processargs.h> |
| |
| #include <new> |
| |
| #include <fbl/auto_lock.h> |
| #include <fbl/mutex.h> |
| #include <fbl/ref_counted.h> |
| #include <fbl/ref_ptr.h> |
| #include <fbl/string.h> |
| #include <sdk/lib/fdio/zxio.h> |
| |
| #include "local-connection.h" |
| #include "local-vnode.h" |
| |
| namespace fio = fuchsia_io; |
| |
| namespace { |
| |
| struct ExportState { |
| // The minimum size of flat namespace which will contain all the |
| // information about this |fdio_namespace|. |
| size_t bytes; |
| // The total number of entries (path + handle pairs) in this namespace. |
| size_t count; |
| // A (moving) pointer to start of the next path. |
| char* buffer; |
| zx_handle_t* handle; |
| uint32_t* type; |
| char** path; |
| }; |
| |
| std::pair<std::string_view, bool> FindNextPathSegment(std::string_view path) { |
| auto next_slash = path.find('/'); |
| if (next_slash == std::string_view::npos) { |
| return {path, true}; |
| } |
| return {std::string_view(path.data(), next_slash), false}; |
| } |
| |
| } // namespace |
| |
| fdio_namespace::fdio_namespace() : root_(LocalVnode::Create(nullptr, {}, "")) {} |
| |
| fdio_namespace::~fdio_namespace() { |
| fbl::AutoLock lock(&lock_); |
| root_->Unlink(); |
| } |
| |
| zx_status_t fdio_namespace::WalkLocked(fbl::RefPtr<LocalVnode>* in_out_vn, |
| std::string_view* in_out_path) const { |
| fbl::RefPtr<LocalVnode> vn = *in_out_vn; |
| std::string_view path_remaining = *in_out_path; |
| |
| // Empty path or "." matches initial node. |
| if (path_remaining.empty() || path_remaining == ".") { |
| return ZX_OK; |
| } |
| |
| for (;;) { |
| // Find the next path segment. |
| auto [next_path_segment, is_last_segment] = FindNextPathSegment(path_remaining); |
| |
| // Path segments may not longer than NAME_MAX. |
| if (next_path_segment.length() > NAME_MAX) { |
| return ZX_ERR_BAD_PATH; |
| } |
| |
| // "." matches current node. |
| if (next_path_segment != ".") { |
| fbl::RefPtr<LocalVnode> child = vn->Lookup(next_path_segment); |
| if (child == nullptr) { |
| // If no child exists with this name, we either failed to lookup a node, |
| // or we must transmit this request to the remote node. |
| if (!vn->RemoteValid()) { |
| return ZX_ERR_NOT_FOUND; |
| } |
| |
| *in_out_vn = vn; |
| *in_out_path = path_remaining; |
| return ZX_OK; |
| } |
| vn = child; |
| } |
| |
| if (is_last_segment) { |
| // Lookup has completed successfully for all nodes, and no path remains. |
| // Return the requested local node. |
| *in_out_vn = vn; |
| *in_out_path = "."; |
| return ZX_OK; |
| } |
| |
| // Lookup completed successfully, but more segments exist. |
| path_remaining.remove_prefix(next_path_segment.length() + 1); |
| } |
| } |
| |
| // Open |path| relative to |vn|. |
| // |
| // |flags| and |mode| are passed to |fuchsia.io.Directory/Open| as |flags| and |mode|, respectively. |
| // |
| // If |flags| includes |fio::wire::OpenFlags::kDescribe|, this function reads the resulting |
| // |fuchsia.io.Node/OnOpen| event from the newly created channel and creates an |
| // appropriate object to interact with the remote object. |
| // |
| // Otherwise, this function creates a generic "remote" object. |
| zx::status<fdio_ptr> fdio_namespace::Open(fbl::RefPtr<LocalVnode> vn, std::string_view path, |
| fio::wire::OpenFlags flags, uint32_t mode) const { |
| { |
| fbl::AutoLock lock(&lock_); |
| zx_status_t status = WalkLocked(&vn, &path); |
| if (status != ZX_OK) { |
| return zx::error(status); |
| } |
| |
| if (!vn->RemoteValid()) { |
| // The Vnode exists, but it has no remote object. Open a local reference. |
| return CreateConnection(vn); |
| } |
| } |
| |
| // If we're trying to mkdir over top of a mount point, |
| // the correct error is EEXIST |
| if ((flags & fio::wire::OpenFlags::kCreate) && path == ".") { |
| return zx::error(ZX_ERR_ALREADY_EXISTS); |
| } |
| |
| // Active remote connections are immutable, so referencing remote here |
| // is safe. We don't want to do a blocking open under the ns lock. |
| return fdio_internal::open_async(vn->Remote(), path, flags, mode); |
| } |
| |
| zx_status_t fdio_namespace::AddInotifyFilter(fbl::RefPtr<LocalVnode> vn, std::string_view path, |
| uint32_t mask, uint32_t watch_descriptor, |
| zx::socket socket) const { |
| fbl::AutoLock lock(&lock_); |
| zx_status_t status = WalkLocked(&vn, &path); |
| if (status != ZX_OK) { |
| return status; |
| } |
| |
| if (!vn->RemoteValid()) { |
| // The Vnode exists, but it has no remote object. |
| // we simply return a ZX_ERR_NOT_SUPPORTED |
| // as we do not support inotify for local-namespace filesystem |
| // at the time. |
| return ZX_ERR_NOT_SUPPORTED; |
| } |
| |
| // Active remote connections are immutable, so referencing remote here |
| // is safe. But we do not want to do a blocking call under the ns lock. |
| return zxio_add_inotify_filter(vn->Remote(), path.data(), path.length(), mask, watch_descriptor, |
| socket.release()); |
| } |
| |
| zx_status_t fdio_namespace::Readdir(const LocalVnode& vn, DirentIteratorState* state, |
| zxio_dirent_t* inout_entry) const { |
| fbl::AutoLock lock(&lock_); |
| |
| auto populate_entry = [](zxio_dirent_t* inout_entry, std::string_view name) { |
| if (name.size() > NAME_MAX) { |
| return ZX_ERR_INVALID_ARGS; |
| } |
| ZXIO_DIRENT_SET(*inout_entry, protocols, ZXIO_NODE_PROTOCOL_DIRECTORY); |
| uint8_t name_size = static_cast<uint8_t>(name.size()); |
| inout_entry->name_length = name_size; |
| memcpy(inout_entry->name, name.data(), name_size); |
| inout_entry->name[name_size] = '\0'; |
| return ZX_OK; |
| }; |
| |
| if (!state->encountered_dot) { |
| zx_status_t status = populate_entry(inout_entry, std::string_view(".")); |
| if (status != ZX_OK) { |
| return status; |
| } |
| state->encountered_dot = true; |
| return ZX_OK; |
| } |
| fbl::RefPtr<LocalVnode> child_vnode; |
| vn.Readdir(&state->last_seen, &child_vnode); |
| if (!child_vnode) { |
| return ZX_ERR_NOT_FOUND; |
| } |
| return populate_entry(inout_entry, child_vnode->Name()); |
| } |
| |
| zx::status<fdio_ptr> fdio_namespace::CreateConnection(fbl::RefPtr<LocalVnode> vn) const { |
| return fdio_internal::CreateLocalConnection(fbl::RefPtr(this), std::move(vn)); |
| } |
| |
| zx_status_t fdio_namespace::Connect(std::string_view path, fio::wire::OpenFlags flags, |
| fidl::ServerEnd<fio::Node> server_end) const { |
| // Require that we start at / |
| if (!cpp20::starts_with(path, '/')) { |
| return ZX_ERR_NOT_FOUND; |
| } |
| // Skip leading slash. |
| path.remove_prefix(1); |
| |
| fbl::RefPtr<LocalVnode> vn; |
| { |
| fbl::AutoLock lock(&lock_); |
| vn = root_; |
| zx_status_t status = WalkLocked(&vn, &path); |
| if (status != ZX_OK) { |
| return status; |
| } |
| |
| // cannot connect via non-mountpoint nodes |
| if (!vn->RemoteValid()) { |
| return ZX_ERR_NOT_SUPPORTED; |
| } |
| } |
| |
| zx_handle_t borrowed_handle = ZX_HANDLE_INVALID; |
| zx_status_t status = zxio_borrow(vn->Remote(), &borrowed_handle); |
| if (status != ZX_OK) { |
| return status; |
| } |
| |
| fidl::UnownedClientEnd<fio::Directory> directory(borrowed_handle); |
| |
| return fdio_internal::fdio_open_at(directory, path, flags, std::move(server_end)); |
| } |
| |
| zx_status_t fdio_namespace::Unbind(std::string_view path) { |
| if (!cpp20::starts_with(path, '/')) { |
| return ZX_ERR_INVALID_ARGS; |
| } |
| |
| // Skip leading slash. |
| path.remove_prefix(1); |
| |
| if (path.empty()) { |
| // The path was "/" so we're trying to unbind to the root vnode. |
| return ZX_ERR_NOT_SUPPORTED; |
| } |
| |
| fbl::AutoLock lock(&lock_); |
| fbl::RefPtr<LocalVnode> vn = root_; |
| // If we remove a vnode, we may create one or more childless intermediate parent nodes. |
| // This node denotes the "highest" such node in the filesystem hierarchy. |
| fbl::RefPtr<LocalVnode> removable_origin_vn; |
| |
| for (;;) { |
| auto [next_path_segment, is_last_segment] = FindNextPathSegment(path); |
| |
| if (next_path_segment.length() > NAME_MAX) { |
| return ZX_ERR_BAD_PATH; |
| } |
| |
| if (vn->RemoteValid()) { |
| // Since shadowing is disallowed, this must refer to an invalid path. |
| return ZX_ERR_NOT_FOUND; |
| } |
| |
| vn = vn->Lookup(next_path_segment); |
| if (vn == nullptr) { |
| return ZX_ERR_NOT_FOUND; |
| } |
| |
| size_t children_count = 0; |
| vn->ForAllChildren([&children_count](const LocalVnode& vn) { |
| if (++children_count > 1) { |
| return ZX_ERR_STOP; |
| } |
| return ZX_OK; |
| }); |
| |
| if (children_count > 1) { |
| // If this node has multiple children (including something OTHER than the node |
| // we're potentially unbinding), we shouldn't try to remove it while deleting |
| // childless intermediate nodes. |
| removable_origin_vn = nullptr; |
| } else if (removable_origin_vn == nullptr) { |
| // If this node has one or fewer children, it's a viable candidate for removal. |
| // Only set this if it's the "highest" node we've seen satisfying this property. |
| removable_origin_vn = vn; |
| } |
| |
| if (is_last_segment) { |
| // This is the last segment; we must match. |
| if (!vn->RemoteValid()) { |
| return ZX_ERR_NOT_FOUND; |
| } |
| // This assertion must hold without shadowing: |vn| should |
| // have no children, so at minimum, |removable_origin_vn| = |vn|. |
| ZX_DEBUG_ASSERT(removable_origin_vn != nullptr); |
| removable_origin_vn->Unlink(); |
| return ZX_OK; |
| } |
| |
| path.remove_prefix(next_path_segment.length() + 1); |
| } |
| } |
| |
| bool fdio_namespace::IsBound(std::string_view path) { |
| if (!cpp20::starts_with(path, '/')) { |
| return false; |
| } |
| path.remove_prefix(1); |
| |
| fbl::AutoLock lock(&lock_); |
| fbl::RefPtr<LocalVnode> vn = root_; |
| zx_status_t status = WalkLocked(&vn, &path); |
| if (status != ZX_OK) { |
| return false; |
| } |
| return path == "." && vn->RemoteValid(); |
| } |
| |
| zx_status_t fdio_namespace::Bind(std::string_view path, fidl::ClientEnd<fio::Directory> remote) { |
| if (!remote.is_valid()) { |
| return ZX_ERR_BAD_HANDLE; |
| } |
| if (!cpp20::starts_with(path, '/')) { |
| return ZX_ERR_INVALID_ARGS; |
| } |
| |
| // Skip leading slash. |
| path.remove_prefix(1); |
| |
| fbl::AutoLock lock(&lock_); |
| if (path.empty()) { |
| if (root_->RemoteValid()) { |
| // Cannot re-bind after initial bind. |
| return ZX_ERR_ALREADY_EXISTS; |
| } |
| if (root_->has_children()) { |
| // Overlay remotes are disallowed. |
| return ZX_ERR_NOT_SUPPORTED; |
| } |
| // The path was "/" so we're trying to bind to the root vnode. |
| root_ = LocalVnode::Create(nullptr, std::move(remote), ""); |
| return ZX_OK; |
| } |
| |
| fbl::RefPtr<LocalVnode> vn = root_; |
| fbl::RefPtr<LocalVnode> first_new_node = nullptr; |
| |
| // If we fail, but leave any intermediate nodes, we need to clean them up |
| // before unlocking and returning. |
| auto cleanup = fit::defer([&first_new_node]() { |
| if (first_new_node != nullptr) { |
| first_new_node->Unlink(); |
| } |
| }); |
| |
| for (;;) { |
| auto [next_path_segment, is_last_segment] = FindNextPathSegment(path); |
| |
| if (next_path_segment.length() > NAME_MAX) { |
| return ZX_ERR_BAD_PATH; |
| } |
| |
| if (vn->RemoteValid()) { |
| // Shadowing is disallowed. |
| return ZX_ERR_NOT_SUPPORTED; |
| } |
| |
| if (is_last_segment) { |
| // Final segment. Create the leaf vnode and stop. |
| if (vn->Lookup(next_path_segment) != nullptr) { |
| return ZX_ERR_ALREADY_EXISTS; |
| } |
| vn = LocalVnode::Create(vn, std::move(remote), fbl::String(next_path_segment)); |
| break; |
| } else { |
| // Not the final segment. |
| fbl::RefPtr<LocalVnode> child = vn->Lookup(next_path_segment); |
| if (child == nullptr) { |
| // Create a new intermediate node. |
| vn = LocalVnode::Create(vn, {}, fbl::String(next_path_segment)); |
| |
| // Keep track of the first node we create. If any subsequent |
| // operation fails during bind, we will need to delete all nodes |
| // in this subtree. |
| if (first_new_node == nullptr) { |
| first_new_node = vn; |
| } |
| } else { |
| // Re-use an existing intermediate node. |
| vn = child; |
| } |
| path.remove_prefix(next_path_segment.length() + 1); |
| } |
| } |
| |
| cleanup.cancel(); |
| return ZX_OK; |
| } |
| |
| zx::status<fdio_ptr> fdio_namespace::OpenRoot() const { |
| fbl::RefPtr<LocalVnode> vn = [this]() { |
| fbl::AutoLock lock(&lock_); |
| return root_; |
| }(); |
| |
| if (!vn->RemoteValid()) { |
| return CreateConnection(vn); |
| } |
| |
| zx::status endpoints = fidl::CreateEndpoints<fio::Node>(); |
| if (endpoints.is_error()) { |
| return endpoints.take_error(); |
| } |
| |
| zx::channel clone; |
| zx_status_t status = |
| zxio_reopen(vn->Remote(), ZXIO_REOPEN_DESCRIBE, clone.reset_and_get_address()); |
| |
| if (status != ZX_OK) { |
| return zx::error(status); |
| } |
| |
| return fdio::create_with_on_open(fidl::ClientEnd<fio::Node>(std::move(clone))); |
| } |
| |
| zx_status_t fdio_namespace::SetRoot(fdio_t* io) { |
| fbl::RefPtr<LocalVnode> vn = fdio_internal::GetLocalNodeFromConnectionIfAny(io); |
| |
| if (!vn) { |
| fidl::ClientEnd<fio::Directory> client_end; |
| zx_status_t status = io->clone(client_end.channel().reset_and_get_address()); |
| if (status != ZX_OK) { |
| return status; |
| } |
| |
| vn = LocalVnode::Create(nullptr, std::move(client_end), ""); |
| } |
| |
| fbl::AutoLock lock(&lock_); |
| if (vn == root_) { |
| // Nothing to do. |
| return ZX_OK; |
| } |
| |
| vn->UnlinkFromParent(); |
| std::swap(root_, vn); |
| vn->Unlink(); |
| return ZX_OK; |
| } |
| |
| zx_status_t fdio_namespace::Export(fdio_flat_namespace_t** out) const { |
| ExportState es; |
| es.bytes = sizeof(fdio_flat_namespace_t); |
| es.count = 0; |
| |
| fbl::RefPtr<LocalVnode> vn = [this]() { |
| fbl::AutoLock lock(&lock_); |
| return root_; |
| }(); |
| |
| auto count_callback = [&es](std::string_view path, zxio_t* remote) { |
| // Each entry needs one slot in the handle table, |
| // one slot in the type table, and one slot in the |
| // path table, plus storage for the path and NUL |
| es.bytes += sizeof(zx_handle_t) + sizeof(uint32_t) + sizeof(char**) + path.length() + 1; |
| es.count += 1; |
| return ZX_OK; |
| }; |
| if (zx_status_t status = fdio_internal::EnumerateRemotes(*vn, count_callback); status != ZX_OK) { |
| return status; |
| } |
| |
| fdio_flat_namespace_t* flat = static_cast<fdio_flat_namespace_t*>(malloc(es.bytes)); |
| if (flat == nullptr) { |
| return ZX_ERR_NO_MEMORY; |
| } |
| // We've allocated enough memory for the flat struct |
| // followed by count handles, followed by count types, |
| // followed by count path ptrs followed by enough bytes |
| // for all the path strings. Point es.* at the right |
| // slices of that memory: |
| es.handle = reinterpret_cast<zx_handle_t*>(flat + 1); |
| es.type = reinterpret_cast<uint32_t*>(es.handle + es.count); |
| es.path = reinterpret_cast<char**>(es.type + es.count); |
| es.buffer = reinterpret_cast<char*>(es.path + es.count); |
| es.count = 0; |
| |
| auto export_callback = [&es](std::string_view path, zxio_t* remote) { |
| zx::channel remote_clone; |
| zx_status_t status = zxio_clone(remote, remote_clone.reset_and_get_address()); |
| if (status != ZX_OK) { |
| return status; |
| } |
| strlcpy(es.buffer, path.data(), path.length() + 1); |
| es.path[es.count] = es.buffer; |
| es.handle[es.count] = remote_clone.release(); |
| es.type[es.count] = PA_HND(PA_NS_DIR, static_cast<uint32_t>(es.count)); |
| es.buffer += (path.length() + 1); |
| es.count++; |
| return ZX_OK; |
| }; |
| |
| if (zx_status_t status = fdio_internal::EnumerateRemotes(*vn, export_callback); status != ZX_OK) { |
| zx_handle_close_many(es.handle, es.count); |
| free(flat); |
| return status; |
| } |
| |
| flat->count = es.count; |
| flat->handle = es.handle; |
| flat->type = es.type; |
| flat->path = es.path; |
| *out = flat; |
| return ZX_OK; |
| } |