mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 03:02:45 +00:00 
			
		
		
		
	 c1de46aaaf
			
		
	
	
		c1de46aaaf
		
	
	
	
	
		
			
			If m_unveiled_paths.is_empty(), the root node (which is m_unveiled_paths
itself) is the matching veil. This means we should not return nullptr in
this case, but just use the code path for the general case.
This fixes a bug where calling e.g. unveil("/", "r") would refuse you
access to anything, because find_matching_unveiled_path would wrongly
return nullptr.
Since find_matching_unveiled_path can no longer return nullptr, we can
now just return a reference instead.
		
	
			
		
			
				
	
	
		
			124 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			124 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #pragma once
 | |
| 
 | |
| #include <AK/Badge.h>
 | |
| #include <AK/Function.h>
 | |
| #include <AK/HashMap.h>
 | |
| #include <AK/NonnullOwnPtrVector.h>
 | |
| #include <AK/OwnPtr.h>
 | |
| #include <AK/RefPtr.h>
 | |
| #include <AK/String.h>
 | |
| #include <Kernel/FileSystem/FileSystem.h>
 | |
| #include <Kernel/FileSystem/InodeIdentifier.h>
 | |
| #include <Kernel/FileSystem/InodeMetadata.h>
 | |
| #include <Kernel/KResult.h>
 | |
| #include <Kernel/UnveilNode.h>
 | |
| 
 | |
| namespace Kernel {
 | |
| 
 | |
| class Custody;
 | |
| class Device;
 | |
| class FileDescription;
 | |
| 
 | |
| struct UidAndGid {
 | |
|     uid_t uid;
 | |
|     gid_t gid;
 | |
| };
 | |
| 
 | |
| class VFS {
 | |
|     AK_MAKE_ETERNAL
 | |
| public:
 | |
|     class Mount {
 | |
|     public:
 | |
|         Mount(FS&, Custody* host_custody, int flags);
 | |
|         Mount(Inode& source, Custody& host_custody, int flags);
 | |
| 
 | |
|         const Inode* host() const;
 | |
|         Inode* host();
 | |
| 
 | |
|         const Inode& guest() const { return *m_guest; }
 | |
|         Inode& guest() { return *m_guest; }
 | |
| 
 | |
|         const FS& guest_fs() const { return *m_guest_fs; }
 | |
| 
 | |
|         String absolute_path() const;
 | |
| 
 | |
|         int flags() const { return m_flags; }
 | |
|         void set_flags(int flags) { m_flags = flags; }
 | |
| 
 | |
|     private:
 | |
|         NonnullRefPtr<Inode> m_guest;
 | |
|         NonnullRefPtr<FS> m_guest_fs;
 | |
|         RefPtr<Custody> m_host_custody;
 | |
|         int m_flags;
 | |
|     };
 | |
| 
 | |
|     static void initialize();
 | |
|     static VFS& the();
 | |
| 
 | |
|     VFS();
 | |
|     ~VFS();
 | |
| 
 | |
|     bool mount_root(FS&);
 | |
|     KResult mount(FS&, Custody& mount_point, int flags);
 | |
|     KResult bind_mount(Custody& source, Custody& mount_point, int flags);
 | |
|     KResult remount(Custody& mount_point, int new_flags);
 | |
|     KResult unmount(Inode& guest_inode);
 | |
| 
 | |
|     KResultOr<NonnullRefPtr<FileDescription>> open(StringView path, int options, mode_t mode, Custody& base, Optional<UidAndGid> = {});
 | |
|     KResultOr<NonnullRefPtr<FileDescription>> create(StringView path, int options, mode_t mode, Custody& parent_custody, Optional<UidAndGid> = {});
 | |
|     KResult mkdir(StringView path, mode_t mode, Custody& base);
 | |
|     KResult link(StringView old_path, StringView new_path, Custody& base);
 | |
|     KResult unlink(StringView path, Custody& base);
 | |
|     KResult symlink(StringView target, StringView linkpath, Custody& base);
 | |
|     KResult rmdir(StringView path, Custody& base);
 | |
|     KResult chmod(StringView path, mode_t, Custody& base);
 | |
|     KResult chmod(Custody&, mode_t);
 | |
|     KResult chown(StringView path, uid_t, gid_t, Custody& base);
 | |
|     KResult chown(Custody&, uid_t, gid_t);
 | |
|     KResult access(StringView path, int mode, Custody& base);
 | |
|     KResultOr<InodeMetadata> lookup_metadata(StringView path, Custody& base, int options = 0);
 | |
|     KResult utime(StringView path, Custody& base, time_t atime, time_t mtime);
 | |
|     KResult rename(StringView oldpath, StringView newpath, Custody& base);
 | |
|     KResult mknod(StringView path, mode_t, dev_t, Custody& base);
 | |
|     KResultOr<NonnullRefPtr<Custody>> open_directory(StringView path, Custody& base);
 | |
| 
 | |
|     size_t mount_count() const { return m_mounts.size(); }
 | |
|     void for_each_mount(Function<void(const Mount&)>) const;
 | |
| 
 | |
|     InodeIdentifier root_inode_id() const;
 | |
| 
 | |
|     void sync();
 | |
| 
 | |
|     Custody& root_custody();
 | |
|     KResultOr<NonnullRefPtr<Custody>> resolve_path(StringView path, Custody& base, RefPtr<Custody>* out_parent = nullptr, int options = 0, int symlink_recursion_level = 0);
 | |
|     KResultOr<NonnullRefPtr<Custody>> resolve_path_without_veil(StringView path, Custody& base, RefPtr<Custody>* out_parent = nullptr, int options = 0, int symlink_recursion_level = 0);
 | |
| 
 | |
| private:
 | |
|     friend class FileDescription;
 | |
| 
 | |
|     UnveilNode const& find_matching_unveiled_path(StringView path);
 | |
|     KResult validate_path_against_process_veil(StringView path, int options);
 | |
| 
 | |
|     bool is_vfs_root(InodeIdentifier) const;
 | |
| 
 | |
|     KResult traverse_directory_inode(Inode&, Function<bool(const FS::DirectoryEntryView&)>);
 | |
| 
 | |
|     Mount* find_mount_for_host(Inode&);
 | |
|     Mount* find_mount_for_host(InodeIdentifier);
 | |
|     Mount* find_mount_for_guest(Inode&);
 | |
|     Mount* find_mount_for_guest(InodeIdentifier);
 | |
| 
 | |
|     Lock m_lock { "VFSLock" };
 | |
| 
 | |
|     RefPtr<Inode> m_root_inode;
 | |
|     Vector<Mount, 16> m_mounts;
 | |
|     RefPtr<Custody> m_root_custody;
 | |
| };
 | |
| 
 | |
| }
 |