root/src/tools/fs_shell/fd.cpp
/*
 * Copyright 2002-2008, Axel Dörfler, axeld@pinc-software.de.
 * Distributed under the terms of the MIT License.
 */

//! Operations on file descriptors

#include "fd.h"

#include <stdlib.h>

#include "fssh_atomic.h"
#include "fssh_fcntl.h"
#include "fssh_kernel_export.h"
#include "fssh_kernel_priv.h"
#include "fssh_string.h"
#include "fssh_uio.h"
#include "syscalls.h"


//#define TRACE_FD
#ifdef TRACE_FD
#       define TRACE(x) dprintf x
#else
#       define TRACE(x)
#endif


namespace FSShell {


io_context* gKernelIOContext;


/*** General fd routines ***/


#ifdef DEBUG
void dump_fd(int fd, struct file_descriptor *descriptor);

void
dump_fd(int fd,struct file_descriptor *descriptor)
{
        fssh_dprintf("fd[%d] = %p: type = %d, ref_count = %d, ops = %p, u.vnode = %p, u.mount = %p, cookie = %p, open_mode = %x, pos = %lld\n",
                fd, descriptor, (int)descriptor->type, (int)descriptor->ref_count, descriptor->ops,
                descriptor->u.vnode, descriptor->u.mount, descriptor->cookie, (int)descriptor->open_mode, descriptor->pos);
}
#endif


/** Allocates and initializes a new file_descriptor */

struct file_descriptor *
alloc_fd(void)
{
        struct file_descriptor *descriptor;

        descriptor = (file_descriptor*)malloc(sizeof(struct file_descriptor));
        if (descriptor == NULL)
                return NULL;

        descriptor->u.vnode = NULL;
        descriptor->cookie = NULL;
        descriptor->ref_count = 1;
        descriptor->open_count = 0;
        descriptor->open_mode = 0;
        descriptor->pos = 0;

        return descriptor;
}


bool
fd_close_on_exec(struct io_context *context, int fd)
{
        return CHECK_BIT(context->fds_close_on_exec[fd / 8], fd & 7) ? true : false;
}


void
fd_set_close_on_exec(struct io_context *context, int fd, bool closeFD)
{
        if (closeFD)
                context->fds_close_on_exec[fd / 8] |= (1 << (fd & 7));
        else
                context->fds_close_on_exec[fd / 8] &= ~(1 << (fd & 7));
}


/** Searches a free slot in the FD table of the provided I/O context, and inserts
 *      the specified descriptor into it.
 */

int
new_fd_etc(struct io_context *context, struct file_descriptor *descriptor,
        int firstIndex)
{
        int fd = -1;
        uint32_t i;

        fssh_mutex_lock(&context->io_mutex);

        for (i = firstIndex; i < context->table_size; i++) {
                if (!context->fds[i]) {
                        fd = i;
                        break;
                }
        }
        if (fd < 0) {
                fd = FSSH_B_NO_MORE_FDS;
                goto err;
        }

        context->fds[fd] = descriptor;
        context->num_used_fds++;
        fssh_atomic_add(&descriptor->open_count, 1);

err:
        fssh_mutex_unlock(&context->io_mutex);

        return fd;
}


int
new_fd(struct io_context *context, struct file_descriptor *descriptor)
{
        return new_fd_etc(context, descriptor, 0);
}


/**     Reduces the descriptor's reference counter, and frees all resources
 *      when it's no longer used.
 */

void
put_fd(struct file_descriptor *descriptor)
{
        int32_t previous = fssh_atomic_add(&descriptor->ref_count, -1);

        TRACE(("put_fd(descriptor = %p [ref = %ld, cookie = %p])\n",
                descriptor, descriptor->ref_count, descriptor->cookie));

        // free the descriptor if we don't need it anymore
        if (previous == 1) {
                // free the underlying object
                if (descriptor->ops != NULL && descriptor->ops->fd_free != NULL)
                        descriptor->ops->fd_free(descriptor);

                free(descriptor);
        } else if ((descriptor->open_mode & FSSH_O_DISCONNECTED) != 0
                && previous - 1 == descriptor->open_count
                && descriptor->ops != NULL) {
                // the descriptor has been disconnected - it cannot
                // be accessed anymore, let's close it (no one is
                // currently accessing this descriptor)

                if (descriptor->ops->fd_close)
                        descriptor->ops->fd_close(descriptor);
                if (descriptor->ops->fd_free)
                        descriptor->ops->fd_free(descriptor);

                // prevent this descriptor from being closed/freed again
                descriptor->open_count = -1;
                descriptor->ref_count = -1;
                descriptor->ops = NULL;
                descriptor->u.vnode = NULL;

                // the file descriptor is kept intact, so that it's not
                // reused until someone explicetly closes it
        }
}


/**     Decrements the open counter of the file descriptor and invokes
 *      its close hook when appropriate.
 */

void
close_fd(struct file_descriptor *descriptor)
{
        if (fssh_atomic_add(&descriptor->open_count, -1) == 1) {
                vfs_unlock_vnode_if_locked(descriptor);

                if (descriptor->ops != NULL && descriptor->ops->fd_close != NULL)
                        descriptor->ops->fd_close(descriptor);
        }
}


/**     This descriptor's underlying object will be closed and freed
 *      as soon as possible (in one of the next calls to put_fd() -
 *      get_fd() will no longer succeed on this descriptor).
 *      This is useful if the underlying object is gone, for instance
 *      when a (mounted) volume got removed unexpectedly.
 */

void
disconnect_fd(struct file_descriptor *descriptor)
{
        descriptor->open_mode |= FSSH_O_DISCONNECTED;
}


void
inc_fd_ref_count(struct file_descriptor *descriptor)
{
        fssh_atomic_add(&descriptor->ref_count, 1);
}


struct file_descriptor *
get_fd(struct io_context *context, int fd)
{
        struct file_descriptor *descriptor = NULL;

        if (fd < 0)
                return NULL;

        fssh_mutex_lock(&context->io_mutex);

        if ((uint32_t)fd < context->table_size)
                descriptor = context->fds[fd];

        if (descriptor != NULL) {
                // Disconnected descriptors cannot be accessed anymore
                if (descriptor->open_mode & FSSH_O_DISCONNECTED)
                        descriptor = NULL;
                else
                        inc_fd_ref_count(descriptor);
        }

        fssh_mutex_unlock(&context->io_mutex);

        return descriptor;
}


/**     Removes the file descriptor from the specified slot.
 */

static struct file_descriptor *
remove_fd(struct io_context *context, int fd)
{
        struct file_descriptor *descriptor = NULL;

        if (fd < 0)
                return NULL;

        fssh_mutex_lock(&context->io_mutex);

        if ((uint32_t)fd < context->table_size)
                descriptor = context->fds[fd];

        if (descriptor) {
                // fd is valid
                context->fds[fd] = NULL;
                fd_set_close_on_exec(context, fd, false);
                context->num_used_fds--;

                if (descriptor->open_mode & FSSH_O_DISCONNECTED)
                        descriptor = NULL;
        }

        fssh_mutex_unlock(&context->io_mutex);

        return descriptor;
}


static int
dup_fd(int fd, bool kernel)
{
        struct io_context *context = get_current_io_context(kernel);
        struct file_descriptor *descriptor;
        int status;

        TRACE(("dup_fd: fd = %d\n", fd));

        // Try to get the fd structure
        descriptor = get_fd(context, fd);
        if (descriptor == NULL)
                return FSSH_B_FILE_ERROR;

        // now put the fd in place
        status = new_fd(context, descriptor);
        if (status < 0)
                put_fd(descriptor);
        else {
                fssh_mutex_lock(&context->io_mutex);
                fd_set_close_on_exec(context, status, false);
                fssh_mutex_unlock(&context->io_mutex);
        }

        return status;
}


/**     POSIX says this should be the same as:
 *              close(newfd);
 *              fcntl(oldfd, F_DUPFD, newfd);
 *
 *      We do dup2() directly to be thread-safe.
 */

static int
dup2_fd(int oldfd, int newfd, bool kernel)
{
        struct file_descriptor *evicted = NULL;
        struct io_context *context;

        TRACE(("dup2_fd: ofd = %d, nfd = %d\n", oldfd, newfd));

        // quick check
        if (oldfd < 0 || newfd < 0)
                return FSSH_B_FILE_ERROR;

        // Get current I/O context and lock it
        context = get_current_io_context(kernel);
        fssh_mutex_lock(&context->io_mutex);

        // Check if the fds are valid (mutex must be locked because
        // the table size could be changed)
        if ((uint32_t)oldfd >= context->table_size
                || (uint32_t)newfd >= context->table_size
                || context->fds[oldfd] == NULL) {
                fssh_mutex_unlock(&context->io_mutex);
                return FSSH_B_FILE_ERROR;
        }

        // Check for identity, note that it cannot be made above
        // because we always want to return an error on invalid
        // handles
        if (oldfd != newfd) {
                // Now do the work
                evicted = context->fds[newfd];
                fssh_atomic_add(&context->fds[oldfd]->ref_count, 1);
                fssh_atomic_add(&context->fds[oldfd]->open_count, 1);
                context->fds[newfd] = context->fds[oldfd];

                if (evicted == NULL)
                        context->num_used_fds++;
        }

        fd_set_close_on_exec(context, newfd, false);

        fssh_mutex_unlock(&context->io_mutex);

        // Say bye bye to the evicted fd
        if (evicted) {
                close_fd(evicted);
                put_fd(evicted);
        }

        return newfd;
}


fssh_status_t
select_fd(int fd, uint8_t event, uint32_t ref, struct select_sync *sync, bool kernel)
{
//      struct file_descriptor *descriptor;
//      fssh_status_t status;
//
//      TRACE(("select_fd(fd = %d, event = %u, ref = %lu, selectsync = %p)\n", fd, event, ref, sync));
//
//      descriptor = get_fd(get_current_io_context(kernel), fd);
//      if (descriptor == NULL)
//              return FSSH_B_FILE_ERROR;
//
//      if (descriptor->ops->fd_select) {
//              status = descriptor->ops->fd_select(descriptor, event, ref, sync);
//      } else {
//              // if the I/O subsystem doesn't support select(), we will
//              // immediately notify the select call
//              status = notify_select_event((void *)sync, ref, event);
//      }
//
//      put_fd(descriptor);
//      return status;

        return FSSH_B_BAD_VALUE;
}


fssh_status_t
deselect_fd(int fd, uint8_t event, struct select_sync *sync, bool kernel)
{
//      struct file_descriptor *descriptor;
//      fssh_status_t status;
//
//      TRACE(("deselect_fd(fd = %d, event = %u, selectsync = %p)\n", fd, event, sync));
//
//      descriptor = get_fd(get_current_io_context(kernel), fd);
//      if (descriptor == NULL)
//              return FSSH_B_FILE_ERROR;
//
//      if (descriptor->ops->fd_deselect)
//              status = descriptor->ops->fd_deselect(descriptor, event, sync);
//      else
//              status = FSSH_B_OK;
//
//      put_fd(descriptor);
//      return status;

        return FSSH_B_BAD_VALUE;
}


/** This function checks if the specified fd is valid in the current
 *      context. It can be used for a quick check; the fd is not locked
 *      so it could become invalid immediately after this check.
 */

bool
fd_is_valid(int fd, bool kernel)
{
        struct file_descriptor *descriptor = get_fd(get_current_io_context(kernel), fd);
        if (descriptor == NULL)
                return false;

        put_fd(descriptor);
        return true;
}


struct vnode *
fd_vnode(struct file_descriptor *descriptor)
{
        switch (descriptor->type) {
                case FDTYPE_FILE:
                case FDTYPE_DIR:
                case FDTYPE_ATTR_DIR:
                case FDTYPE_ATTR:
                        return descriptor->u.vnode;
        }

        return NULL;
}


static fssh_status_t
common_close(int fd, bool kernel)
{
        struct io_context *io = get_current_io_context(kernel);
        struct file_descriptor *descriptor = remove_fd(io, fd);

        if (descriptor == NULL)
                return FSSH_B_FILE_ERROR;

#ifdef TRACE_FD
        if (!kernel)
                TRACE(("_user_close(descriptor = %p)\n", descriptor));
#endif

        close_fd(descriptor);
        put_fd(descriptor);
                // the reference associated with the slot

        return FSSH_B_OK;
}


//      #pragma mark -
//      Kernel calls


fssh_ssize_t
_kern_read(int fd, fssh_off_t pos, void *buffer, fssh_size_t length)
{
        struct file_descriptor *descriptor;
        fssh_ssize_t bytesRead;

        descriptor = get_fd(get_current_io_context(true), fd);
        if (!descriptor)
                return FSSH_B_FILE_ERROR;
        if ((descriptor->open_mode & FSSH_O_RWMASK) == FSSH_O_WRONLY) {
                put_fd(descriptor);
                return FSSH_B_FILE_ERROR;
        }

        if (pos == -1)
                pos = descriptor->pos;

        if (descriptor->ops->fd_read) {
                bytesRead = descriptor->ops->fd_read(descriptor, pos, buffer, &length);
                if (bytesRead >= FSSH_B_OK) {
                        if (length > FSSH_SSIZE_MAX)
                                bytesRead = FSSH_SSIZE_MAX;
                        else
                                bytesRead = (fssh_ssize_t)length;

                        descriptor->pos = pos + length;
                }
        } else
                bytesRead = FSSH_B_BAD_VALUE;

        put_fd(descriptor);
        return bytesRead;
}


fssh_ssize_t
_kern_readv(int fd, fssh_off_t pos, const fssh_iovec *vecs, fssh_size_t count)
{
        struct file_descriptor *descriptor;
        fssh_ssize_t bytesRead = 0;
        fssh_status_t status;
        uint32_t i;

        descriptor = get_fd(get_current_io_context(true), fd);
        if (!descriptor)
                return FSSH_B_FILE_ERROR;
        if ((descriptor->open_mode & FSSH_O_RWMASK) == FSSH_O_WRONLY) {
                put_fd(descriptor);
                return FSSH_B_FILE_ERROR;
        }

        if (pos == -1)
                pos = descriptor->pos;

        if (descriptor->ops->fd_read) {
                for (i = 0; i < count; i++) {
                        fssh_size_t length = vecs[i].iov_len;
                        status = descriptor->ops->fd_read(descriptor, pos, vecs[i].iov_base, &length);
                        if (status < FSSH_B_OK) {
                                bytesRead = status;
                                break;
                        }

                        if ((uint32_t)bytesRead + length > FSSH_SSIZE_MAX)
                                bytesRead = FSSH_SSIZE_MAX;
                        else
                                bytesRead += (fssh_ssize_t)length;

                        pos += vecs[i].iov_len;
                }
        } else
                bytesRead = FSSH_B_BAD_VALUE;

        descriptor->pos = pos;
        put_fd(descriptor);
        return bytesRead;
}


fssh_ssize_t
_kern_write(int fd, fssh_off_t pos, const void *buffer, fssh_size_t length)
{
        struct file_descriptor *descriptor;
        fssh_ssize_t bytesWritten;

        descriptor = get_fd(get_current_io_context(true), fd);
        if (descriptor == NULL)
                return FSSH_B_FILE_ERROR;
        if ((descriptor->open_mode & FSSH_O_RWMASK) == FSSH_O_RDONLY) {
                put_fd(descriptor);
                return FSSH_B_FILE_ERROR;
        }

        if (pos == -1)
                pos = descriptor->pos;

        if (descriptor->ops->fd_write) {
                bytesWritten = descriptor->ops->fd_write(descriptor, pos, buffer, &length);
                if (bytesWritten >= FSSH_B_OK) {
                        if (length > FSSH_SSIZE_MAX)
                                bytesWritten = FSSH_SSIZE_MAX;
                        else
                                bytesWritten = (fssh_ssize_t)length;

                        descriptor->pos = pos + length;
                }
        } else
                bytesWritten = FSSH_B_BAD_VALUE;

        put_fd(descriptor);
        return bytesWritten;
}


fssh_ssize_t
_kern_writev(int fd, fssh_off_t pos, const fssh_iovec *vecs, fssh_size_t count)
{
        struct file_descriptor *descriptor;
        fssh_ssize_t bytesWritten = 0;
        fssh_status_t status;
        uint32_t i;

        descriptor = get_fd(get_current_io_context(true), fd);
        if (!descriptor)
                return FSSH_B_FILE_ERROR;
        if ((descriptor->open_mode & FSSH_O_RWMASK) == FSSH_O_RDONLY) {
                put_fd(descriptor);
                return FSSH_B_FILE_ERROR;
        }

        if (pos == -1)
                pos = descriptor->pos;

        if (descriptor->ops->fd_write) {
                for (i = 0; i < count; i++) {
                        fssh_size_t length = vecs[i].iov_len;
                        status = descriptor->ops->fd_write(descriptor, pos, vecs[i].iov_base, &length);
                        if (status < FSSH_B_OK) {
                                bytesWritten = status;
                                break;
                        }

                        if ((uint32_t)bytesWritten + length > FSSH_SSIZE_MAX)
                                bytesWritten = FSSH_SSIZE_MAX;
                        else
                                bytesWritten += (fssh_ssize_t)length;

                        pos += vecs[i].iov_len;
                }
        } else
                bytesWritten = FSSH_B_BAD_VALUE;

        descriptor->pos = pos;
        put_fd(descriptor);
        return bytesWritten;
}


fssh_off_t
_kern_seek(int fd, fssh_off_t pos, int seekType)
{
        struct file_descriptor *descriptor;

        descriptor = get_fd(get_current_io_context(true), fd);
        if (!descriptor)
                return FSSH_B_FILE_ERROR;

        if (descriptor->ops->fd_seek)
                pos = descriptor->ops->fd_seek(descriptor, pos, seekType);
        else
                pos = FSSH_ESPIPE;

        put_fd(descriptor);
        return pos;
}


fssh_status_t
_kern_ioctl(int fd, uint32_t op, void *buffer, fssh_size_t length)
{
        struct file_descriptor *descriptor;
        int status;

        TRACE(("sys_ioctl: fd %d\n", fd));

        descriptor = get_fd(get_current_io_context(true), fd);
        if (descriptor == NULL)
                return FSSH_B_FILE_ERROR;

        if (descriptor->ops->fd_ioctl)
                status = descriptor->ops->fd_ioctl(descriptor, op, buffer, length);
        else
                status = FSSH_EOPNOTSUPP;

        put_fd(descriptor);
        return status;
}


fssh_ssize_t
_kern_read_dir(int fd, struct fssh_dirent *buffer, fssh_size_t bufferSize, uint32_t maxCount)
{
        struct file_descriptor *descriptor;
        fssh_ssize_t retval;

        TRACE(("sys_read_dir(fd = %d, buffer = %p, bufferSize = %ld, count = %lu)\n",fd, buffer, bufferSize, maxCount));

        descriptor = get_fd(get_current_io_context(true), fd);
        if (descriptor == NULL)
                return FSSH_B_FILE_ERROR;

        if (descriptor->ops->fd_read_dir) {
                uint32_t count = maxCount;
                retval = descriptor->ops->fd_read_dir(descriptor, buffer, bufferSize, &count);
                if (retval >= 0)
                        retval = count;
        } else
                retval = FSSH_EOPNOTSUPP;

        put_fd(descriptor);
        return retval;
}


fssh_status_t
_kern_rewind_dir(int fd)
{
        struct file_descriptor *descriptor;
        fssh_status_t status;

        TRACE(("sys_rewind_dir(fd = %d)\n",fd));

        descriptor = get_fd(get_current_io_context(true), fd);
        if (descriptor == NULL)
                return FSSH_B_FILE_ERROR;

        if (descriptor->ops->fd_rewind_dir)
                status = descriptor->ops->fd_rewind_dir(descriptor);
        else
                status = FSSH_EOPNOTSUPP;

        put_fd(descriptor);
        return status;
}


fssh_status_t
_kern_close(int fd)
{
        return common_close(fd, true);
}


int
_kern_dup(int fd)
{
        return dup_fd(fd, true);
}


int
_kern_dup2(int ofd, int nfd)
{
        return dup2_fd(ofd, nfd, true);
}

}       // namespace FSShell