2021-09-28 07:12:29 -04:00
|
|
|
/*
|
2023-07-17 05:59:28 -04:00
|
|
|
* SPDX-FileCopyrightText: 2015-2023 Espressif Systems (Shanghai) CO LTD
|
2021-09-28 07:12:29 -04:00
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*/
|
2016-10-25 09:02:39 -04:00
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <sys/errno.h>
|
2017-10-23 06:03:23 -04:00
|
|
|
#include <sys/fcntl.h>
|
|
|
|
#include <sys/ioctl.h>
|
2020-11-05 23:00:07 -05:00
|
|
|
#include <sys/reent.h>
|
2017-10-23 06:03:23 -04:00
|
|
|
#include <sys/unistd.h>
|
2018-05-07 03:01:56 -04:00
|
|
|
#include <sys/lock.h>
|
2018-05-03 04:41:10 -04:00
|
|
|
#include <sys/param.h>
|
2017-10-23 06:03:23 -04:00
|
|
|
#include <dirent.h>
|
2018-05-03 04:41:10 -04:00
|
|
|
#include "freertos/FreeRTOS.h"
|
|
|
|
#include "freertos/semphr.h"
|
2016-10-25 09:02:39 -04:00
|
|
|
#include "esp_vfs.h"
|
2021-10-21 00:46:24 -04:00
|
|
|
#include "esp_vfs_private.h"
|
2018-05-29 05:01:25 -04:00
|
|
|
#include "sdkconfig.h"
|
|
|
|
|
2021-09-20 10:17:59 -04:00
|
|
|
// Warn about using deprecated option
|
|
|
|
#ifdef CONFIG_LWIP_USE_ONLY_LWIP_SELECT
|
2021-10-11 11:14:03 -04:00
|
|
|
#warning CONFIG_LWIP_USE_ONLY_LWIP_SELECT is deprecated: Please use CONFIG_VFS_SUPPORT_SELECT instead
|
2021-09-20 10:17:59 -04:00
|
|
|
#endif
|
|
|
|
|
2019-07-02 11:14:58 -04:00
|
|
|
#ifdef CONFIG_VFS_SUPPRESS_SELECT_DEBUG_OUTPUT
|
2018-05-29 05:01:25 -04:00
|
|
|
#define LOG_LOCAL_LEVEL ESP_LOG_NONE
|
2019-07-02 11:14:58 -04:00
|
|
|
#endif //CONFIG_VFS_SUPPRESS_SELECT_DEBUG_OUTPUT
|
2016-10-25 09:02:39 -04:00
|
|
|
#include "esp_log.h"
|
|
|
|
|
2018-05-29 05:01:25 -04:00
|
|
|
static const char *TAG = "vfs";
|
|
|
|
|
2023-04-13 09:37:37 -04:00
|
|
|
/* Max number of VFS entries (registered filesystems) */
|
|
|
|
#ifdef CONFIG_VFS_MAX_COUNT
|
|
|
|
#define VFS_MAX_COUNT CONFIG_VFS_MAX_COUNT
|
|
|
|
#else
|
|
|
|
/* If IO support is disabled, keep this defined to 1 to avoid compiler warnings in this file.
|
|
|
|
* The s_vfs array and the functions defined here will be removed by the linker, anyway.
|
|
|
|
*/
|
|
|
|
#define VFS_MAX_COUNT 1
|
|
|
|
#endif
|
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
#define LEN_PATH_PREFIX_IGNORED SIZE_MAX /* special length value for VFS which is never recognised by open() */
|
2021-08-06 03:36:59 -04:00
|
|
|
#define FD_TABLE_ENTRY_UNUSED (fd_table_t) { .permanent = false, .has_pending_close = false, .has_pending_select = false, .vfs_index = -1, .local_fd = -1 }
|
2018-04-19 23:51:41 -04:00
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
typedef uint8_t local_fd_t;
|
|
|
|
_Static_assert((1 << (sizeof(local_fd_t)*8)) >= MAX_FDS, "file descriptor type too small");
|
2018-04-19 23:51:41 -04:00
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
typedef int8_t vfs_index_t;
|
2023-04-13 09:37:37 -04:00
|
|
|
_Static_assert((1 << (sizeof(vfs_index_t)*8)) >= VFS_MAX_COUNT, "VFS index type too small");
|
2018-05-07 03:01:56 -04:00
|
|
|
_Static_assert(((vfs_index_t) -1) < 0, "vfs_index_t must be a signed type");
|
2016-10-25 09:02:39 -04:00
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
typedef struct {
|
2021-08-06 03:36:59 -04:00
|
|
|
bool permanent :1;
|
|
|
|
bool has_pending_close :1;
|
|
|
|
bool has_pending_select :1;
|
|
|
|
uint8_t _reserved :5;
|
2018-05-07 03:01:56 -04:00
|
|
|
vfs_index_t vfs_index;
|
|
|
|
local_fd_t local_fd;
|
|
|
|
} fd_table_t;
|
2017-10-03 01:56:55 -04:00
|
|
|
|
2018-05-03 04:41:10 -04:00
|
|
|
typedef struct {
|
|
|
|
bool isset; // none or at least one bit is set in the following 3 fd sets
|
|
|
|
fd_set readfds;
|
|
|
|
fd_set writefds;
|
|
|
|
fd_set errorfds;
|
|
|
|
} fds_triple_t;
|
|
|
|
|
2023-04-13 09:37:37 -04:00
|
|
|
static vfs_entry_t* s_vfs[VFS_MAX_COUNT] = { 0 };
|
2016-10-25 09:02:39 -04:00
|
|
|
static size_t s_vfs_count = 0;
|
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
static fd_table_t s_fd_table[MAX_FDS] = { [0 ... MAX_FDS-1] = FD_TABLE_ENTRY_UNUSED };
|
|
|
|
static _lock_t s_fd_table_lock;
|
|
|
|
|
2021-10-21 00:46:24 -04:00
|
|
|
esp_err_t esp_vfs_register_common(const char* base_path, size_t len, const esp_vfs_t* vfs, void* ctx, int *vfs_index)
|
2016-10-25 09:02:39 -04:00
|
|
|
{
|
2017-10-03 01:56:55 -04:00
|
|
|
if (len != LEN_PATH_PREFIX_IGNORED) {
|
2020-07-09 18:13:13 -04:00
|
|
|
/* empty prefix is allowed, "/" is not allowed */
|
|
|
|
if ((len == 1) || (len > ESP_VFS_PATH_MAX)) {
|
2017-10-03 01:56:55 -04:00
|
|
|
return ESP_ERR_INVALID_ARG;
|
|
|
|
}
|
2020-07-09 18:13:13 -04:00
|
|
|
/* prefix has to start with "/" and not end with "/" */
|
|
|
|
if (len >= 2 && ((base_path[0] != '/') || (base_path[len - 1] == '/'))) {
|
2017-10-03 01:56:55 -04:00
|
|
|
return ESP_ERR_INVALID_ARG;
|
|
|
|
}
|
2016-10-25 09:02:39 -04:00
|
|
|
}
|
2023-11-20 07:36:58 -05:00
|
|
|
vfs_entry_t *entry = (vfs_entry_t*) heap_caps_malloc(sizeof(vfs_entry_t), VFS_MALLOC_FLAGS);
|
2016-10-25 09:02:39 -04:00
|
|
|
if (entry == NULL) {
|
|
|
|
return ESP_ERR_NO_MEM;
|
|
|
|
}
|
2016-12-29 09:21:29 -05:00
|
|
|
size_t index;
|
|
|
|
for (index = 0; index < s_vfs_count; ++index) {
|
|
|
|
if (s_vfs[index] == NULL) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (index == s_vfs_count) {
|
2023-04-13 09:37:37 -04:00
|
|
|
if (s_vfs_count >= VFS_MAX_COUNT) {
|
2016-12-29 09:21:29 -05:00
|
|
|
free(entry);
|
|
|
|
return ESP_ERR_NO_MEM;
|
|
|
|
}
|
|
|
|
++s_vfs_count;
|
|
|
|
}
|
|
|
|
s_vfs[index] = entry;
|
2017-10-03 01:56:55 -04:00
|
|
|
if (len != LEN_PATH_PREFIX_IGNORED) {
|
|
|
|
strcpy(entry->path_prefix, base_path); // we have already verified argument length
|
|
|
|
} else {
|
|
|
|
bzero(entry->path_prefix, sizeof(entry->path_prefix));
|
|
|
|
}
|
2016-10-25 09:02:39 -04:00
|
|
|
memcpy(&entry->vfs, vfs, sizeof(esp_vfs_t));
|
|
|
|
entry->path_prefix_len = len;
|
|
|
|
entry->ctx = ctx;
|
2016-12-29 09:21:29 -05:00
|
|
|
entry->offset = index;
|
2017-10-03 01:56:55 -04:00
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
if (vfs_index) {
|
|
|
|
*vfs_index = index;
|
2017-10-03 01:56:55 -04:00
|
|
|
}
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
2017-10-03 01:56:55 -04:00
|
|
|
esp_err_t esp_vfs_register(const char* base_path, const esp_vfs_t* vfs, void* ctx)
|
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
return esp_vfs_register_common(base_path, strlen(base_path), vfs, ctx, NULL);
|
2017-10-03 01:56:55 -04:00
|
|
|
}
|
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
esp_err_t esp_vfs_register_fd_range(const esp_vfs_t *vfs, void *ctx, int min_fd, int max_fd)
|
2017-10-03 01:56:55 -04:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
if (min_fd < 0 || max_fd < 0 || min_fd > MAX_FDS || max_fd > MAX_FDS || min_fd > max_fd) {
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "Invalid arguments: esp_vfs_register_fd_range(0x%x, 0x%x, %d, %d)", (int) vfs, (int) ctx, min_fd, max_fd);
|
2018-05-07 03:01:56 -04:00
|
|
|
return ESP_ERR_INVALID_ARG;
|
|
|
|
}
|
|
|
|
|
|
|
|
int index = -1;
|
|
|
|
esp_err_t ret = esp_vfs_register_common("", LEN_PATH_PREFIX_IGNORED, vfs, ctx, &index);
|
|
|
|
|
|
|
|
if (ret == ESP_OK) {
|
|
|
|
_lock_acquire(&s_fd_table_lock);
|
|
|
|
for (int i = min_fd; i < max_fd; ++i) {
|
|
|
|
if (s_fd_table[i].vfs_index != -1) {
|
2021-08-13 01:30:28 -04:00
|
|
|
free(s_vfs[index]);
|
|
|
|
s_vfs[index] = NULL;
|
2018-05-07 03:01:56 -04:00
|
|
|
for (int j = min_fd; j < i; ++j) {
|
|
|
|
if (s_fd_table[j].vfs_index == index) {
|
|
|
|
s_fd_table[j] = FD_TABLE_ENTRY_UNUSED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_lock_release(&s_fd_table_lock);
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "esp_vfs_register_fd_range cannot set fd %d (used by other VFS)", i);
|
2018-05-07 03:01:56 -04:00
|
|
|
return ESP_ERR_INVALID_ARG;
|
|
|
|
}
|
|
|
|
s_fd_table[i].permanent = true;
|
|
|
|
s_fd_table[i].vfs_index = index;
|
|
|
|
s_fd_table[i].local_fd = i;
|
|
|
|
}
|
|
|
|
_lock_release(&s_fd_table_lock);
|
|
|
|
|
2021-08-13 01:30:28 -04:00
|
|
|
ESP_LOGW(TAG, "esp_vfs_register_fd_range is successful for range <%d; %d) and VFS ID %d", min_fd, max_fd, index);
|
|
|
|
}
|
2018-05-29 05:01:25 -04:00
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
return ret;
|
2017-10-03 01:56:55 -04:00
|
|
|
}
|
|
|
|
|
2018-05-11 09:56:53 -04:00
|
|
|
esp_err_t esp_vfs_register_with_id(const esp_vfs_t *vfs, void *ctx, esp_vfs_id_t *vfs_id)
|
|
|
|
{
|
|
|
|
if (vfs_id == NULL) {
|
|
|
|
return ESP_ERR_INVALID_ARG;
|
|
|
|
}
|
|
|
|
|
|
|
|
*vfs_id = -1;
|
|
|
|
return esp_vfs_register_common("", LEN_PATH_PREFIX_IGNORED, vfs, ctx, vfs_id);
|
|
|
|
}
|
|
|
|
|
2021-03-07 20:44:58 -05:00
|
|
|
esp_err_t esp_vfs_unregister_with_id(esp_vfs_id_t vfs_id)
|
|
|
|
{
|
2023-04-13 09:37:37 -04:00
|
|
|
if (vfs_id < 0 || vfs_id >= VFS_MAX_COUNT || s_vfs[vfs_id] == NULL) {
|
2021-03-07 20:44:58 -05:00
|
|
|
return ESP_ERR_INVALID_ARG;
|
|
|
|
}
|
|
|
|
vfs_entry_t* vfs = s_vfs[vfs_id];
|
|
|
|
free(vfs);
|
|
|
|
s_vfs[vfs_id] = NULL;
|
|
|
|
|
|
|
|
_lock_acquire(&s_fd_table_lock);
|
|
|
|
// Delete all references from the FD lookup-table
|
2023-04-13 09:37:37 -04:00
|
|
|
for (int j = 0; j < VFS_MAX_COUNT; ++j) {
|
2021-03-07 20:44:58 -05:00
|
|
|
if (s_fd_table[j].vfs_index == vfs_id) {
|
|
|
|
s_fd_table[j] = FD_TABLE_ENTRY_UNUSED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_lock_release(&s_fd_table_lock);
|
|
|
|
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
|
2016-12-29 09:21:29 -05:00
|
|
|
esp_err_t esp_vfs_unregister(const char* base_path)
|
|
|
|
{
|
2018-12-06 06:30:05 -05:00
|
|
|
const size_t base_path_len = strlen(base_path);
|
2016-12-29 09:21:29 -05:00
|
|
|
for (size_t i = 0; i < s_vfs_count; ++i) {
|
|
|
|
vfs_entry_t* vfs = s_vfs[i];
|
2017-06-21 01:54:04 -04:00
|
|
|
if (vfs == NULL) {
|
|
|
|
continue;
|
|
|
|
}
|
2018-12-06 06:30:05 -05:00
|
|
|
if (base_path_len == vfs->path_prefix_len &&
|
|
|
|
memcmp(base_path, vfs->path_prefix, vfs->path_prefix_len) == 0) {
|
2021-03-07 20:44:58 -05:00
|
|
|
return esp_vfs_unregister_with_id(i);
|
2016-12-29 09:21:29 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return ESP_ERR_INVALID_STATE;
|
|
|
|
}
|
|
|
|
|
2021-03-08 06:52:05 -05:00
|
|
|
esp_err_t esp_vfs_register_fd(esp_vfs_id_t vfs_id, int *fd)
|
|
|
|
{
|
|
|
|
return esp_vfs_register_fd_with_local_fd(vfs_id, -1, true, fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
esp_err_t esp_vfs_register_fd_with_local_fd(esp_vfs_id_t vfs_id, int local_fd, bool permanent, int *fd)
|
2018-05-11 09:56:53 -04:00
|
|
|
{
|
|
|
|
if (vfs_id < 0 || vfs_id >= s_vfs_count || fd == NULL) {
|
2021-03-08 06:52:05 -05:00
|
|
|
ESP_LOGD(TAG, "Invalid arguments for esp_vfs_register_fd_with_local_fd(%d, %d, %d, 0x%p)",
|
|
|
|
vfs_id, local_fd, permanent, fd);
|
2018-05-11 09:56:53 -04:00
|
|
|
return ESP_ERR_INVALID_ARG;
|
|
|
|
}
|
|
|
|
|
|
|
|
esp_err_t ret = ESP_ERR_NO_MEM;
|
|
|
|
_lock_acquire(&s_fd_table_lock);
|
|
|
|
for (int i = 0; i < MAX_FDS; ++i) {
|
|
|
|
if (s_fd_table[i].vfs_index == -1) {
|
2021-03-07 20:44:58 -05:00
|
|
|
s_fd_table[i].permanent = permanent;
|
2018-05-11 09:56:53 -04:00
|
|
|
s_fd_table[i].vfs_index = vfs_id;
|
2021-03-07 20:44:58 -05:00
|
|
|
if (local_fd >= 0) {
|
|
|
|
s_fd_table[i].local_fd = local_fd;
|
|
|
|
} else {
|
|
|
|
s_fd_table[i].local_fd = i;
|
|
|
|
}
|
2018-05-11 09:56:53 -04:00
|
|
|
*fd = i;
|
|
|
|
ret = ESP_OK;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_lock_release(&s_fd_table_lock);
|
|
|
|
|
2021-03-08 06:52:05 -05:00
|
|
|
ESP_LOGD(TAG, "esp_vfs_register_fd_with_local_fd(%d, %d, %d, 0x%p) finished with %s",
|
|
|
|
vfs_id, local_fd, permanent, fd, esp_err_to_name(ret));
|
2018-05-29 05:01:25 -04:00
|
|
|
|
2018-05-11 09:56:53 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
esp_err_t esp_vfs_unregister_fd(esp_vfs_id_t vfs_id, int fd)
|
|
|
|
{
|
|
|
|
esp_err_t ret = ESP_ERR_INVALID_ARG;
|
|
|
|
|
|
|
|
if (vfs_id < 0 || vfs_id >= s_vfs_count || fd < 0 || fd >= MAX_FDS) {
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "Invalid arguments for esp_vfs_unregister_fd(%d, %d)", vfs_id, fd);
|
2018-05-11 09:56:53 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
_lock_acquire(&s_fd_table_lock);
|
|
|
|
fd_table_t *item = s_fd_table + fd;
|
|
|
|
if (item->permanent == true && item->vfs_index == vfs_id && item->local_fd == fd) {
|
|
|
|
*item = FD_TABLE_ENTRY_UNUSED;
|
|
|
|
ret = ESP_OK;
|
|
|
|
}
|
|
|
|
_lock_release(&s_fd_table_lock);
|
|
|
|
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "esp_vfs_unregister_fd(%d, %d) finished with %s", vfs_id, fd, esp_err_to_name(ret));
|
|
|
|
|
2018-05-11 09:56:53 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-07-17 05:59:28 -04:00
|
|
|
/*
|
|
|
|
* Set ESP_VFS_FLAG_READONLY_FS read-only flag for a registered virtual filesystem
|
|
|
|
* for given path prefix. Should be only called from the esp_vfs_*filesystem* register
|
|
|
|
* or helper mount functions where vfs_t is not available to set the read-only
|
|
|
|
* flag directly (e.g. esp_vfs_fat_spiflash_mount_rw_wl).
|
|
|
|
*/
|
|
|
|
esp_err_t esp_vfs_set_readonly_flag(const char* base_path)
|
|
|
|
{
|
|
|
|
const size_t base_path_len = strlen(base_path);
|
|
|
|
for (size_t i = 0; i < s_vfs_count; ++i) {
|
|
|
|
vfs_entry_t* vfs = s_vfs[i];
|
|
|
|
if (vfs == NULL) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (base_path_len == vfs->path_prefix_len &&
|
|
|
|
memcmp(base_path, vfs->path_prefix, vfs->path_prefix_len) == 0) {
|
|
|
|
vfs->vfs.flags |= ESP_VFS_FLAG_READONLY_FS;
|
|
|
|
return ESP_OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ESP_ERR_INVALID_STATE;
|
|
|
|
}
|
|
|
|
|
2021-10-21 00:46:24 -04:00
|
|
|
const vfs_entry_t *get_vfs_for_index(int index)
|
2016-10-25 09:02:39 -04:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
if (index < 0 || index >= s_vfs_count) {
|
2016-10-25 09:02:39 -04:00
|
|
|
return NULL;
|
2018-05-07 03:01:56 -04:00
|
|
|
} else {
|
|
|
|
return s_vfs[index];
|
2016-10-25 09:02:39 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
static inline bool fd_valid(int fd)
|
2016-10-25 09:02:39 -04:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
return (fd < MAX_FDS) && (fd >= 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const vfs_entry_t *get_vfs_for_fd(int fd)
|
|
|
|
{
|
|
|
|
const vfs_entry_t *vfs = NULL;
|
|
|
|
if (fd_valid(fd)) {
|
|
|
|
const int index = s_fd_table[fd].vfs_index; // single read -> no locking is required
|
|
|
|
vfs = get_vfs_for_index(index);
|
|
|
|
}
|
|
|
|
return vfs;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int get_local_fd(const vfs_entry_t *vfs, int fd)
|
|
|
|
{
|
|
|
|
int local_fd = -1;
|
|
|
|
|
|
|
|
if (vfs && fd_valid(fd)) {
|
|
|
|
local_fd = s_fd_table[fd].local_fd; // single read -> no locking is required
|
2017-10-03 01:56:55 -04:00
|
|
|
}
|
2018-05-07 03:01:56 -04:00
|
|
|
|
|
|
|
return local_fd;
|
2016-10-25 09:02:39 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
static const char* translate_path(const vfs_entry_t* vfs, const char* src_path)
|
|
|
|
{
|
|
|
|
assert(strncmp(src_path, vfs->path_prefix, vfs->path_prefix_len) == 0);
|
2017-06-20 13:21:14 -04:00
|
|
|
if (strlen(src_path) == vfs->path_prefix_len) {
|
|
|
|
// special case when src_path matches the path prefix exactly
|
|
|
|
return "/";
|
|
|
|
}
|
2016-10-25 09:02:39 -04:00
|
|
|
return src_path + vfs->path_prefix_len;
|
|
|
|
}
|
|
|
|
|
2021-10-21 00:46:24 -04:00
|
|
|
const vfs_entry_t* get_vfs_for_path(const char* path)
|
2016-10-25 09:02:39 -04:00
|
|
|
{
|
2017-06-21 02:17:14 -04:00
|
|
|
const vfs_entry_t* best_match = NULL;
|
|
|
|
ssize_t best_match_prefix_len = -1;
|
2016-10-25 09:02:39 -04:00
|
|
|
size_t len = strlen(path);
|
|
|
|
for (size_t i = 0; i < s_vfs_count; ++i) {
|
|
|
|
const vfs_entry_t* vfs = s_vfs[i];
|
2017-10-03 01:56:55 -04:00
|
|
|
if (!vfs || vfs->path_prefix_len == LEN_PATH_PREFIX_IGNORED) {
|
2017-05-04 07:57:11 -04:00
|
|
|
continue;
|
|
|
|
}
|
2017-06-20 13:21:14 -04:00
|
|
|
// match path prefix
|
|
|
|
if (len < vfs->path_prefix_len ||
|
|
|
|
memcmp(path, vfs->path_prefix, vfs->path_prefix_len) != 0) {
|
2016-10-25 09:02:39 -04:00
|
|
|
continue;
|
|
|
|
}
|
2017-06-23 08:07:43 -04:00
|
|
|
// this is the default VFS and we don't have a better match yet.
|
|
|
|
if (vfs->path_prefix_len == 0 && !best_match) {
|
|
|
|
best_match = vfs;
|
|
|
|
continue;
|
|
|
|
}
|
2017-06-20 13:21:14 -04:00
|
|
|
// if path is not equal to the prefix, expect to see a path separator
|
|
|
|
// i.e. don't match "/data" prefix for "/data1/foo.txt" path
|
|
|
|
if (len > vfs->path_prefix_len &&
|
|
|
|
path[vfs->path_prefix_len] != '/') {
|
2016-10-25 09:02:39 -04:00
|
|
|
continue;
|
|
|
|
}
|
2017-06-21 02:17:14 -04:00
|
|
|
// Out of all matching path prefixes, select the longest one;
|
|
|
|
// i.e. if "/dev" and "/dev/uart" both match, for "/dev/uart/1" path,
|
|
|
|
// choose "/dev/uart",
|
|
|
|
// This causes all s_vfs_count VFS entries to be scanned when opening
|
|
|
|
// a file by name. This can be optimized by introducing a table for
|
|
|
|
// FS search order, sorted so that longer prefixes are checked first.
|
|
|
|
if (best_match_prefix_len < (ssize_t) vfs->path_prefix_len) {
|
|
|
|
best_match_prefix_len = (ssize_t) vfs->path_prefix_len;
|
|
|
|
best_match = vfs;
|
2016-10-25 09:02:39 -04:00
|
|
|
}
|
|
|
|
}
|
2017-06-21 02:17:14 -04:00
|
|
|
return best_match;
|
2016-10-25 09:02:39 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Using huge multi-line macros is never nice, but in this case
|
|
|
|
* the only alternative is to repeat this chunk of code (with different function names)
|
|
|
|
* for each syscall being implemented. Given that this define is contained within a single
|
|
|
|
* file, this looks like a good tradeoff.
|
|
|
|
*
|
|
|
|
* First we check if syscall is implemented by VFS (corresponding member is not NULL),
|
|
|
|
* then call the right flavor of the method (e.g. open or open_p) depending on
|
|
|
|
* ESP_VFS_FLAG_CONTEXT_PTR flag. If ESP_VFS_FLAG_CONTEXT_PTR is set, context is passed
|
|
|
|
* in as first argument and _p variant is used for the call.
|
|
|
|
* It is enough to check just one of them for NULL, as both variants are part of a union.
|
|
|
|
*/
|
|
|
|
#define CHECK_AND_CALL(ret, r, pvfs, func, ...) \
|
|
|
|
if (pvfs->vfs.func == NULL) { \
|
|
|
|
__errno_r(r) = ENOSYS; \
|
|
|
|
return -1; \
|
|
|
|
} \
|
|
|
|
if (pvfs->vfs.flags & ESP_VFS_FLAG_CONTEXT_PTR) { \
|
|
|
|
ret = (*pvfs->vfs.func ## _p)(pvfs->ctx, __VA_ARGS__); \
|
|
|
|
} else { \
|
|
|
|
ret = (*pvfs->vfs.func)(__VA_ARGS__);\
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-01-02 14:26:25 -05:00
|
|
|
#define CHECK_AND_CALLV(r, pvfs, func, ...) \
|
|
|
|
if (pvfs->vfs.func == NULL) { \
|
|
|
|
__errno_r(r) = ENOSYS; \
|
|
|
|
return; \
|
|
|
|
} \
|
|
|
|
if (pvfs->vfs.flags & ESP_VFS_FLAG_CONTEXT_PTR) { \
|
|
|
|
(*pvfs->vfs.func ## _p)(pvfs->ctx, __VA_ARGS__); \
|
|
|
|
} else { \
|
|
|
|
(*pvfs->vfs.func)(__VA_ARGS__);\
|
|
|
|
}
|
|
|
|
|
|
|
|
#define CHECK_AND_CALLP(ret, r, pvfs, func, ...) \
|
|
|
|
if (pvfs->vfs.func == NULL) { \
|
|
|
|
__errno_r(r) = ENOSYS; \
|
|
|
|
return NULL; \
|
|
|
|
} \
|
|
|
|
if (pvfs->vfs.flags & ESP_VFS_FLAG_CONTEXT_PTR) { \
|
|
|
|
ret = (*pvfs->vfs.func ## _p)(pvfs->ctx, __VA_ARGS__); \
|
|
|
|
} else { \
|
|
|
|
ret = (*pvfs->vfs.func)(__VA_ARGS__);\
|
|
|
|
}
|
|
|
|
|
2023-07-17 05:59:28 -04:00
|
|
|
#define CHECK_VFS_READONLY_FLAG(flags) \
|
|
|
|
if (flags & ESP_VFS_FLAG_READONLY_FS) { \
|
|
|
|
__errno_r(r) = EROFS; \
|
|
|
|
return -1; \
|
|
|
|
}
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
int esp_vfs_open(struct _reent *r, const char * path, int flags, int mode)
|
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
const vfs_entry_t *vfs = get_vfs_for_path(path);
|
2016-10-25 09:02:39 -04:00
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
int acc_mode = flags & O_ACCMODE;
|
|
|
|
int ro_filesystem = vfs->vfs.flags & ESP_VFS_FLAG_READONLY_FS;
|
|
|
|
if (acc_mode != O_RDONLY && ro_filesystem) {
|
|
|
|
__errno_r(r) = EROFS;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2018-05-07 03:01:56 -04:00
|
|
|
const char *path_within_vfs = translate_path(vfs, path);
|
|
|
|
int fd_within_vfs;
|
|
|
|
CHECK_AND_CALL(fd_within_vfs, r, vfs, open, path_within_vfs, flags, mode);
|
|
|
|
if (fd_within_vfs >= 0) {
|
|
|
|
_lock_acquire(&s_fd_table_lock);
|
|
|
|
for (int i = 0; i < MAX_FDS; ++i) {
|
|
|
|
if (s_fd_table[i].vfs_index == -1) {
|
|
|
|
s_fd_table[i].permanent = false;
|
|
|
|
s_fd_table[i].vfs_index = vfs->offset;
|
|
|
|
s_fd_table[i].local_fd = fd_within_vfs;
|
|
|
|
_lock_release(&s_fd_table_lock);
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_lock_release(&s_fd_table_lock);
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, close, fd_within_vfs);
|
2018-05-29 05:01:25 -04:00
|
|
|
(void) ret; // remove "set but not used" warning
|
2018-05-07 03:01:56 -04:00
|
|
|
__errno_r(r) = ENOMEM;
|
|
|
|
return -1;
|
2016-11-07 01:26:21 -05:00
|
|
|
}
|
2021-12-08 05:38:12 -05:00
|
|
|
__errno_r(r) = errno;
|
2018-05-07 03:01:56 -04:00
|
|
|
return -1;
|
2016-10-25 09:02:39 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t esp_vfs_write(struct _reent *r, int fd, const void * data, size_t size)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
2018-05-07 03:01:56 -04:00
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
2016-10-25 09:02:39 -04:00
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
2017-06-08 12:48:17 -04:00
|
|
|
ssize_t ret;
|
2018-04-19 23:51:41 -04:00
|
|
|
CHECK_AND_CALL(ret, r, vfs, write, local_fd, data, size);
|
2016-10-25 09:02:39 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-10-26 02:05:56 -04:00
|
|
|
off_t esp_vfs_lseek(struct _reent *r, int fd, off_t size, int mode)
|
2016-10-25 09:02:39 -04:00
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
2018-05-07 03:01:56 -04:00
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
2016-10-25 09:02:39 -04:00
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
2017-06-08 12:48:17 -04:00
|
|
|
off_t ret;
|
2018-04-19 23:51:41 -04:00
|
|
|
CHECK_AND_CALL(ret, r, vfs, lseek, local_fd, size, mode);
|
2016-10-25 09:02:39 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t esp_vfs_read(struct _reent *r, int fd, void * dst, size_t size)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
2018-05-07 03:01:56 -04:00
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
2016-10-25 09:02:39 -04:00
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
2017-06-08 12:48:17 -04:00
|
|
|
ssize_t ret;
|
2018-04-19 23:51:41 -04:00
|
|
|
CHECK_AND_CALL(ret, r, vfs, read, local_fd, dst, size);
|
2016-10-25 09:02:39 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-07-01 05:08:57 -04:00
|
|
|
ssize_t esp_vfs_pread(int fd, void *dst, size_t size, off_t offset)
|
|
|
|
{
|
|
|
|
struct _reent *r = __getreent();
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
ssize_t ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, pread, local_fd, dst, size, offset);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t esp_vfs_pwrite(int fd, const void *src, size_t size, off_t offset)
|
|
|
|
{
|
|
|
|
struct _reent *r = __getreent();
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
ssize_t ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, pwrite, local_fd, src, size, offset);
|
|
|
|
return ret;
|
|
|
|
}
|
2016-10-25 09:02:39 -04:00
|
|
|
|
|
|
|
int esp_vfs_close(struct _reent *r, int fd)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
2018-05-07 03:01:56 -04:00
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
2016-10-25 09:02:39 -04:00
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
2018-04-19 23:51:41 -04:00
|
|
|
CHECK_AND_CALL(ret, r, vfs, close, local_fd);
|
2018-05-07 03:01:56 -04:00
|
|
|
|
|
|
|
_lock_acquire(&s_fd_table_lock);
|
|
|
|
if (!s_fd_table[fd].permanent) {
|
2021-08-06 03:36:59 -04:00
|
|
|
if (s_fd_table[fd].has_pending_select) {
|
|
|
|
s_fd_table[fd].has_pending_close = true;
|
|
|
|
} else {
|
|
|
|
s_fd_table[fd] = FD_TABLE_ENTRY_UNUSED;
|
|
|
|
}
|
2018-05-07 03:01:56 -04:00
|
|
|
}
|
|
|
|
_lock_release(&s_fd_table_lock);
|
2016-10-25 09:02:39 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int esp_vfs_fstat(struct _reent *r, int fd, struct stat * st)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
2018-05-07 03:01:56 -04:00
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
2016-10-25 09:02:39 -04:00
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
2018-04-19 23:51:41 -04:00
|
|
|
CHECK_AND_CALL(ret, r, vfs, fstat, local_fd, st);
|
2016-10-25 09:02:39 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:35:00 -04:00
|
|
|
int esp_vfs_fcntl_r(struct _reent *r, int fd, int cmd, int arg)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, fcntl, local_fd, cmd, arg);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int esp_vfs_ioctl(int fd, int cmd, ...)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
va_list args;
|
|
|
|
va_start(args, cmd);
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, ioctl, local_fd, cmd, args);
|
|
|
|
va_end(args);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int esp_vfs_fsync(int fd)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, fsync, local_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_VFS_SUPPORT_DIR
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
int esp_vfs_stat(struct _reent *r, const char * path, struct stat * st)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(path);
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
const char* path_within_vfs = translate_path(vfs, path);
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, stat, path_within_vfs, st);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:35:00 -04:00
|
|
|
int esp_vfs_utime(const char *path, const struct utimbuf *times)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(path);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
const char* path_within_vfs = translate_path(vfs, path);
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, utime, path_within_vfs, times);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
int esp_vfs_link(struct _reent *r, const char* n1, const char* n2)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(n1);
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
const vfs_entry_t* vfs2 = get_vfs_for_path(n2);
|
|
|
|
if (vfs != vfs2) {
|
|
|
|
__errno_r(r) = EXDEV;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs2->vfs.flags);
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
const char* path1_within_vfs = translate_path(vfs, n1);
|
|
|
|
const char* path2_within_vfs = translate_path(vfs, n2);
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, link, path1_within_vfs, path2_within_vfs);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int esp_vfs_unlink(struct _reent *r, const char *path)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(path);
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs->vfs.flags);
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
const char* path_within_vfs = translate_path(vfs, path);
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, unlink, path_within_vfs);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int esp_vfs_rename(struct _reent *r, const char *src, const char *dst)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(src);
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs->vfs.flags);
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
const vfs_entry_t* vfs_dst = get_vfs_for_path(dst);
|
|
|
|
if (vfs != vfs_dst) {
|
|
|
|
__errno_r(r) = EXDEV;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs_dst->vfs.flags);
|
|
|
|
|
2016-10-25 09:02:39 -04:00
|
|
|
const char* src_within_vfs = translate_path(vfs, src);
|
|
|
|
const char* dst_within_vfs = translate_path(vfs, dst);
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, rename, src_within_vfs, dst_within_vfs);
|
|
|
|
return ret;
|
|
|
|
}
|
2017-01-02 14:26:25 -05:00
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
DIR* esp_vfs_opendir(const char* name)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(name);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
const char* path_within_vfs = translate_path(vfs, name);
|
|
|
|
DIR* ret;
|
|
|
|
CHECK_AND_CALLP(ret, r, vfs, opendir, path_within_vfs);
|
|
|
|
if (ret != NULL) {
|
2018-05-07 03:01:56 -04:00
|
|
|
ret->dd_vfs_idx = vfs->offset;
|
2017-01-02 14:26:25 -05:00
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
struct dirent* esp_vfs_readdir(DIR* pdir)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
const vfs_entry_t* vfs = get_vfs_for_index(pdir->dd_vfs_idx);
|
2017-01-02 14:26:25 -05:00
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
struct dirent* ret;
|
|
|
|
CHECK_AND_CALLP(ret, r, vfs, readdir, pdir);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
int esp_vfs_readdir_r(DIR* pdir, struct dirent* entry, struct dirent** out_dirent)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
const vfs_entry_t* vfs = get_vfs_for_index(pdir->dd_vfs_idx);
|
2017-01-02 14:26:25 -05:00
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
errno = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, readdir_r, pdir, entry, out_dirent);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
long esp_vfs_telldir(DIR* pdir)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
const vfs_entry_t* vfs = get_vfs_for_index(pdir->dd_vfs_idx);
|
2017-01-02 14:26:25 -05:00
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
errno = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
long ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, telldir, pdir);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
void esp_vfs_seekdir(DIR* pdir, long loc)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
const vfs_entry_t* vfs = get_vfs_for_index(pdir->dd_vfs_idx);
|
2017-01-02 14:26:25 -05:00
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
errno = EBADF;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
CHECK_AND_CALLV(r, vfs, seekdir, pdir, loc);
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
void esp_vfs_rewinddir(DIR* pdir)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
|
|
|
seekdir(pdir, 0);
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
int esp_vfs_closedir(DIR* pdir)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
2018-05-07 03:01:56 -04:00
|
|
|
const vfs_entry_t* vfs = get_vfs_for_index(pdir->dd_vfs_idx);
|
2017-01-02 14:26:25 -05:00
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
errno = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, closedir, pdir);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
int esp_vfs_mkdir(const char* name, mode_t mode)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(name);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs->vfs.flags);
|
|
|
|
|
2017-01-02 14:26:25 -05:00
|
|
|
const char* path_within_vfs = translate_path(vfs, name);
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, mkdir, path_within_vfs, mode);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
int esp_vfs_rmdir(const char* name)
|
2017-01-02 14:26:25 -05:00
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(name);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs->vfs.flags);
|
|
|
|
|
2017-01-02 14:26:25 -05:00
|
|
|
const char* path_within_vfs = translate_path(vfs, name);
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, rmdir, path_within_vfs);
|
|
|
|
return ret;
|
|
|
|
}
|
2017-08-16 02:58:06 -04:00
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
int esp_vfs_access(const char *path, int amode)
|
2018-05-04 05:44:38 -04:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(path);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
const char* path_within_vfs = translate_path(vfs, path);
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, access, path_within_vfs, amode);
|
|
|
|
return ret;
|
|
|
|
}
|
2018-05-03 04:41:10 -04:00
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
int esp_vfs_truncate(const char *path, off_t length)
|
2018-06-12 06:29:05 -04:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_path(path);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL) {
|
|
|
|
__errno_r(r) = ENOENT;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs->vfs.flags);
|
|
|
|
|
2018-06-12 06:29:05 -04:00
|
|
|
const char* path_within_vfs = translate_path(vfs, path);
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, truncate, path_within_vfs, length);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2022-03-07 13:31:48 -05:00
|
|
|
int esp_vfs_ftruncate(int fd, off_t length)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
2023-07-17 05:59:28 -04:00
|
|
|
|
|
|
|
CHECK_VFS_READONLY_FLAG(vfs->vfs.flags);
|
|
|
|
|
2022-03-07 13:31:48 -05:00
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, ftruncate, local_fd, length);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-03-20 08:35:00 -04:00
|
|
|
#endif // CONFIG_VFS_SUPPORT_DIR
|
|
|
|
|
|
|
|
#ifdef CONFIG_VFS_SUPPORT_SELECT
|
|
|
|
|
2019-07-10 08:08:21 -04:00
|
|
|
static void call_end_selects(int end_index, const fds_triple_t *vfs_fds_triple, void **driver_args)
|
2018-05-03 04:41:10 -04:00
|
|
|
{
|
|
|
|
for (int i = 0; i < end_index; ++i) {
|
|
|
|
const vfs_entry_t *vfs = get_vfs_for_index(i);
|
|
|
|
const fds_triple_t *item = &vfs_fds_triple[i];
|
|
|
|
if (vfs && vfs->vfs.end_select && item->isset) {
|
2019-07-10 08:08:21 -04:00
|
|
|
esp_err_t err = vfs->vfs.end_select(driver_args[i]);
|
|
|
|
if (err != ESP_OK) {
|
|
|
|
ESP_LOGD(TAG, "end_select failed: %s", esp_err_to_name(err));
|
|
|
|
}
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-29 05:01:25 -04:00
|
|
|
static inline bool esp_vfs_safe_fd_isset(int fd, const fd_set *fds)
|
|
|
|
{
|
|
|
|
return fds && FD_ISSET(fd, fds);
|
|
|
|
}
|
|
|
|
|
2018-05-03 04:41:10 -04:00
|
|
|
static int set_global_fd_sets(const fds_triple_t *vfs_fds_triple, int size, fd_set *readfds, fd_set *writefds, fd_set *errorfds)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
for (int i = 0; i < size; ++i) {
|
|
|
|
const fds_triple_t *item = &vfs_fds_triple[i];
|
|
|
|
if (item->isset) {
|
|
|
|
for (int fd = 0; fd < MAX_FDS; ++fd) {
|
2021-03-07 20:44:58 -05:00
|
|
|
if (s_fd_table[fd].vfs_index == i) {
|
|
|
|
const int local_fd = s_fd_table[fd].local_fd; // single read -> no locking is required
|
|
|
|
if (readfds && esp_vfs_safe_fd_isset(local_fd, &item->readfds)) {
|
|
|
|
ESP_LOGD(TAG, "FD %d in readfds was set from VFS ID %d", fd, i);
|
|
|
|
FD_SET(fd, readfds);
|
|
|
|
++ret;
|
|
|
|
}
|
|
|
|
if (writefds && esp_vfs_safe_fd_isset(local_fd, &item->writefds)) {
|
|
|
|
ESP_LOGD(TAG, "FD %d in writefds was set from VFS ID %d", fd, i);
|
|
|
|
FD_SET(fd, writefds);
|
|
|
|
++ret;
|
|
|
|
}
|
|
|
|
if (errorfds && esp_vfs_safe_fd_isset(local_fd, &item->errorfds)) {
|
|
|
|
ESP_LOGD(TAG, "FD %d in errorfds was set from VFS ID %d", fd, i);
|
|
|
|
FD_SET(fd, errorfds);
|
|
|
|
++ret;
|
|
|
|
}
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-05-29 05:01:25 -04:00
|
|
|
static void esp_vfs_log_fd_set(const char *fds_name, const fd_set *fds)
|
|
|
|
{
|
|
|
|
if (fds_name && fds) {
|
|
|
|
ESP_LOGD(TAG, "FDs in %s =", fds_name);
|
|
|
|
for (int i = 0; i < MAX_FDS; ++i) {
|
2018-05-29 05:01:25 -04:00
|
|
|
if (esp_vfs_safe_fd_isset(i, fds)) {
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "%d", i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-03 04:41:10 -04:00
|
|
|
int esp_vfs_select(int nfds, fd_set *readfds, fd_set *writefds, fd_set *errorfds, struct timeval *timeout)
|
|
|
|
{
|
2019-07-17 03:59:21 -04:00
|
|
|
// NOTE: Please see the "Synchronous input/output multiplexing" section of the ESP-IDF Programming Guide
|
|
|
|
// (API Reference -> Storage -> Virtual Filesystem) for a general overview of the implementation of VFS select().
|
2018-05-03 04:41:10 -04:00
|
|
|
int ret = 0;
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "esp_vfs_select starts with nfds = %d", nfds);
|
|
|
|
if (timeout) {
|
2020-01-09 23:58:54 -05:00
|
|
|
ESP_LOGD(TAG, "timeout is %lds + %ldus", (long)timeout->tv_sec, timeout->tv_usec);
|
2018-05-29 05:01:25 -04:00
|
|
|
}
|
|
|
|
esp_vfs_log_fd_set("readfds", readfds);
|
|
|
|
esp_vfs_log_fd_set("writefds", writefds);
|
|
|
|
esp_vfs_log_fd_set("errorfds", errorfds);
|
|
|
|
|
2018-05-03 04:41:10 -04:00
|
|
|
if (nfds > MAX_FDS || nfds < 0) {
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "incorrect nfds");
|
2018-05-03 04:41:10 -04:00
|
|
|
__errno_r(r) = EINVAL;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-10-14 03:22:55 -04:00
|
|
|
// Capture s_vfs_count to a local variable in case a new driver is registered or removed during this actual select()
|
|
|
|
// call. s_vfs_count cannot be protected with a mutex during a select() call (which can be one without a timeout)
|
|
|
|
// because that could block the registration of new driver.
|
|
|
|
const size_t vfs_count = s_vfs_count;
|
2018-05-03 04:41:10 -04:00
|
|
|
fds_triple_t *vfs_fds_triple;
|
2023-11-20 07:36:58 -05:00
|
|
|
if ((vfs_fds_triple = heap_caps_calloc(vfs_count, sizeof(fds_triple_t), VFS_MALLOC_FLAGS)) == NULL) {
|
2018-05-03 04:41:10 -04:00
|
|
|
__errno_r(r) = ENOMEM;
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "calloc is unsuccessful");
|
2018-05-03 04:41:10 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-03-20 10:43:31 -04:00
|
|
|
esp_vfs_select_sem_t sel_sem = {
|
|
|
|
.is_sem_local = false,
|
|
|
|
.sem = NULL,
|
|
|
|
};
|
|
|
|
|
2018-05-03 04:41:10 -04:00
|
|
|
int (*socket_select)(int, fd_set *, fd_set *, fd_set *, struct timeval *) = NULL;
|
|
|
|
for (int fd = 0; fd < nfds; ++fd) {
|
|
|
|
_lock_acquire(&s_fd_table_lock);
|
|
|
|
const bool is_socket_fd = s_fd_table[fd].permanent;
|
|
|
|
const int vfs_index = s_fd_table[fd].vfs_index;
|
|
|
|
const int local_fd = s_fd_table[fd].local_fd;
|
2021-08-06 03:36:59 -04:00
|
|
|
if (esp_vfs_safe_fd_isset(fd, errorfds)) {
|
|
|
|
s_fd_table[fd].has_pending_select = true;
|
|
|
|
}
|
2018-05-03 04:41:10 -04:00
|
|
|
_lock_release(&s_fd_table_lock);
|
|
|
|
|
|
|
|
if (vfs_index < 0) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2018-05-24 04:02:24 -04:00
|
|
|
if (is_socket_fd) {
|
|
|
|
if (!socket_select) {
|
|
|
|
// no socket_select found yet so take a look
|
2018-05-29 05:01:25 -04:00
|
|
|
if (esp_vfs_safe_fd_isset(fd, readfds) ||
|
|
|
|
esp_vfs_safe_fd_isset(fd, writefds) ||
|
|
|
|
esp_vfs_safe_fd_isset(fd, errorfds)) {
|
2018-05-24 04:02:24 -04:00
|
|
|
const vfs_entry_t *vfs = s_vfs[vfs_index];
|
|
|
|
socket_select = vfs->vfs.socket_select;
|
2019-03-20 10:43:31 -04:00
|
|
|
sel_sem.sem = vfs->vfs.get_socket_select_semaphore();
|
2018-05-24 04:02:24 -04:00
|
|
|
}
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
fds_triple_t *item = &vfs_fds_triple[vfs_index]; // FD sets for VFS which belongs to fd
|
2018-05-29 05:01:25 -04:00
|
|
|
if (esp_vfs_safe_fd_isset(fd, readfds)) {
|
2018-05-03 04:41:10 -04:00
|
|
|
item->isset = true;
|
|
|
|
FD_SET(local_fd, &item->readfds);
|
|
|
|
FD_CLR(fd, readfds);
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "removing %d from readfds and adding as local FD %d to fd_set of VFS ID %d", fd, local_fd, vfs_index);
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
2018-05-29 05:01:25 -04:00
|
|
|
if (esp_vfs_safe_fd_isset(fd, writefds)) {
|
2018-05-03 04:41:10 -04:00
|
|
|
item->isset = true;
|
|
|
|
FD_SET(local_fd, &item->writefds);
|
|
|
|
FD_CLR(fd, writefds);
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "removing %d from writefds and adding as local FD %d to fd_set of VFS ID %d", fd, local_fd, vfs_index);
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
2018-05-29 05:01:25 -04:00
|
|
|
if (esp_vfs_safe_fd_isset(fd, errorfds)) {
|
2018-05-03 04:41:10 -04:00
|
|
|
item->isset = true;
|
|
|
|
FD_SET(local_fd, &item->errorfds);
|
|
|
|
FD_CLR(fd, errorfds);
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "removing %d from errorfds and adding as local FD %d to fd_set of VFS ID %d", fd, local_fd, vfs_index);
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// all non-socket VFSs have their FD sets in vfs_fds_triple
|
|
|
|
// the global readfds, writefds and errorfds contain only socket FDs (if
|
|
|
|
// there any)
|
|
|
|
|
|
|
|
if (!socket_select) {
|
|
|
|
// There is no socket VFS registered or select() wasn't called for
|
|
|
|
// any socket. Therefore, we will use our own signalization.
|
2019-03-20 10:43:31 -04:00
|
|
|
sel_sem.is_sem_local = true;
|
|
|
|
if ((sel_sem.sem = xSemaphoreCreateBinary()) == NULL) {
|
2018-05-03 04:41:10 -04:00
|
|
|
free(vfs_fds_triple);
|
|
|
|
__errno_r(r) = ENOMEM;
|
2019-03-20 10:43:31 -04:00
|
|
|
ESP_LOGD(TAG, "cannot create select semaphore");
|
2018-05-03 04:41:10 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-11-20 07:36:58 -05:00
|
|
|
void **driver_args = heap_caps_calloc(vfs_count, sizeof(void *), VFS_MALLOC_FLAGS);
|
2019-07-10 08:08:21 -04:00
|
|
|
|
|
|
|
if (driver_args == NULL) {
|
|
|
|
free(vfs_fds_triple);
|
|
|
|
__errno_r(r) = ENOMEM;
|
|
|
|
ESP_LOGD(TAG, "calloc is unsuccessful for driver args");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-11-16 23:48:35 -05:00
|
|
|
for (size_t i = 0; i < vfs_count; ++i) {
|
2018-05-03 04:41:10 -04:00
|
|
|
const vfs_entry_t *vfs = get_vfs_for_index(i);
|
|
|
|
fds_triple_t *item = &vfs_fds_triple[i];
|
|
|
|
|
2023-05-22 10:23:35 -04:00
|
|
|
if (vfs && !vfs->vfs.start_select) {
|
|
|
|
ESP_LOGD(TAG, "start_select function callback for this vfs (s_vfs[%d]) is not defined", vfs->offset);
|
|
|
|
} else if (vfs && vfs->vfs.start_select && item->isset) {
|
2018-05-03 04:41:10 -04:00
|
|
|
// call start_select for all non-socket VFSs with has at least one FD set in readfds, writefds, or errorfds
|
|
|
|
// note: it can point to socket VFS but item->isset will be false for that
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "calling start_select for VFS ID %d with the following local FDs", i);
|
|
|
|
esp_vfs_log_fd_set("readfds", &item->readfds);
|
|
|
|
esp_vfs_log_fd_set("writefds", &item->writefds);
|
|
|
|
esp_vfs_log_fd_set("errorfds", &item->errorfds);
|
2019-07-10 08:08:21 -04:00
|
|
|
esp_err_t err = vfs->vfs.start_select(nfds, &item->readfds, &item->writefds, &item->errorfds, sel_sem,
|
|
|
|
driver_args + i);
|
2018-05-03 04:41:10 -04:00
|
|
|
|
|
|
|
if (err != ESP_OK) {
|
2023-05-22 10:23:35 -04:00
|
|
|
if (err != ESP_ERR_NOT_SUPPORTED) {
|
|
|
|
call_end_selects(i, vfs_fds_triple, driver_args);
|
|
|
|
}
|
2019-10-14 03:22:55 -04:00
|
|
|
(void) set_global_fd_sets(vfs_fds_triple, vfs_count, readfds, writefds, errorfds);
|
2019-03-20 10:43:31 -04:00
|
|
|
if (sel_sem.is_sem_local && sel_sem.sem) {
|
|
|
|
vSemaphoreDelete(sel_sem.sem);
|
|
|
|
sel_sem.sem = NULL;
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
|
|
|
free(vfs_fds_triple);
|
2019-07-10 08:08:21 -04:00
|
|
|
free(driver_args);
|
2018-05-29 05:01:25 -04:00
|
|
|
__errno_r(r) = EINTR;
|
2019-03-20 10:43:31 -04:00
|
|
|
ESP_LOGD(TAG, "start_select failed: %s", esp_err_to_name(err));
|
2018-05-03 04:41:10 -04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (socket_select) {
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "calling socket_select with the following FDs");
|
|
|
|
esp_vfs_log_fd_set("readfds", readfds);
|
|
|
|
esp_vfs_log_fd_set("writefds", writefds);
|
|
|
|
esp_vfs_log_fd_set("errorfds", errorfds);
|
2018-05-03 04:41:10 -04:00
|
|
|
ret = socket_select(nfds, readfds, writefds, errorfds, timeout);
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "socket_select returned %d and the FDs are the following", ret);
|
|
|
|
esp_vfs_log_fd_set("readfds", readfds);
|
|
|
|
esp_vfs_log_fd_set("writefds", writefds);
|
|
|
|
esp_vfs_log_fd_set("errorfds", errorfds);
|
2018-05-03 04:41:10 -04:00
|
|
|
} else {
|
|
|
|
if (readfds) {
|
|
|
|
FD_ZERO(readfds);
|
|
|
|
}
|
|
|
|
if (writefds) {
|
|
|
|
FD_ZERO(writefds);
|
|
|
|
}
|
|
|
|
if (errorfds) {
|
|
|
|
FD_ZERO(errorfds);
|
|
|
|
}
|
|
|
|
|
|
|
|
TickType_t ticks_to_wait = portMAX_DELAY;
|
|
|
|
if (timeout) {
|
2021-09-28 07:12:29 -04:00
|
|
|
uint32_t timeout_ms = (timeout->tv_sec * 1000) + (timeout->tv_usec / 1000);
|
|
|
|
/* Round up the number of ticks.
|
|
|
|
* Not only we need to round up the number of ticks, but we also need to add 1.
|
|
|
|
* Indeed, `select` function shall wait for AT LEAST timeout, but on FreeRTOS,
|
|
|
|
* if we specify a timeout of 1 tick to `xSemaphoreTake`, it will take AT MOST
|
|
|
|
* 1 tick before triggering a timeout. Thus, we need to pass 2 ticks as a timeout
|
|
|
|
* to `xSemaphoreTake`. */
|
|
|
|
ticks_to_wait = ((timeout_ms + portTICK_PERIOD_MS - 1) / portTICK_PERIOD_MS) + 1;
|
2022-10-06 10:16:32 -04:00
|
|
|
ESP_LOGD(TAG, "timeout is %" PRIu32 "ms", timeout_ms);
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
2018-05-29 05:01:25 -04:00
|
|
|
ESP_LOGD(TAG, "waiting without calling socket_select");
|
2019-03-20 10:43:31 -04:00
|
|
|
xSemaphoreTake(sel_sem.sem, ticks_to_wait);
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
|
|
|
|
2019-10-14 03:22:55 -04:00
|
|
|
call_end_selects(vfs_count, vfs_fds_triple, driver_args); // for VFSs for start_select was called before
|
2021-08-06 03:36:59 -04:00
|
|
|
|
2018-05-03 04:41:10 -04:00
|
|
|
if (ret >= 0) {
|
2019-10-14 03:22:55 -04:00
|
|
|
ret += set_global_fd_sets(vfs_fds_triple, vfs_count, readfds, writefds, errorfds);
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
2022-05-06 08:40:12 -04:00
|
|
|
if (sel_sem.sem) { // Cleanup the select semaphore
|
|
|
|
if (sel_sem.is_sem_local) {
|
|
|
|
vSemaphoreDelete(sel_sem.sem);
|
|
|
|
} else if (socket_select) {
|
|
|
|
SemaphoreHandle_t *s = sel_sem.sem;
|
|
|
|
/* Select might have been triggered from both lwip and vfs fds at the same time, and
|
|
|
|
* we have to make sure that the lwip semaphore is cleared when we exit select().
|
|
|
|
* It is safe, as the semaphore belongs to the calling thread. */
|
|
|
|
xSemaphoreTake(*s, 0);
|
|
|
|
}
|
2019-03-20 10:43:31 -04:00
|
|
|
sel_sem.sem = NULL;
|
2018-05-03 04:41:10 -04:00
|
|
|
}
|
2021-11-24 22:19:08 -05:00
|
|
|
_lock_acquire(&s_fd_table_lock);
|
2021-08-06 03:36:59 -04:00
|
|
|
for (int fd = 0; fd < nfds; ++fd) {
|
|
|
|
if (s_fd_table[fd].has_pending_close) {
|
|
|
|
s_fd_table[fd] = FD_TABLE_ENTRY_UNUSED;
|
|
|
|
}
|
|
|
|
}
|
2021-11-24 22:19:08 -05:00
|
|
|
_lock_release(&s_fd_table_lock);
|
2018-05-03 04:41:10 -04:00
|
|
|
free(vfs_fds_triple);
|
2019-07-10 08:08:21 -04:00
|
|
|
free(driver_args);
|
2018-05-29 05:01:25 -04:00
|
|
|
|
|
|
|
ESP_LOGD(TAG, "esp_vfs_select returns %d", ret);
|
|
|
|
esp_vfs_log_fd_set("readfds", readfds);
|
|
|
|
esp_vfs_log_fd_set("writefds", writefds);
|
|
|
|
esp_vfs_log_fd_set("errorfds", errorfds);
|
2018-05-03 04:41:10 -04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-03-20 10:43:31 -04:00
|
|
|
void esp_vfs_select_triggered(esp_vfs_select_sem_t sem)
|
2018-05-03 04:41:10 -04:00
|
|
|
{
|
2019-03-20 10:43:31 -04:00
|
|
|
if (sem.is_sem_local) {
|
|
|
|
xSemaphoreGive(sem.sem);
|
2018-05-03 04:41:10 -04:00
|
|
|
} else {
|
|
|
|
// Another way would be to go through s_fd_table and find the VFS
|
|
|
|
// which has a permanent FD. But in order to avoid to lock
|
|
|
|
// s_fd_table_lock we go through the VFS table.
|
|
|
|
for (int i = 0; i < s_vfs_count; ++i) {
|
2019-10-14 03:22:55 -04:00
|
|
|
// Note: s_vfs_count could have changed since the start of vfs_select() call. However, that change doesn't
|
|
|
|
// matter here stop_socket_select() will be called for only valid VFS drivers.
|
2018-05-03 04:41:10 -04:00
|
|
|
const vfs_entry_t *vfs = s_vfs[i];
|
|
|
|
if (vfs != NULL && vfs->vfs.stop_socket_select != NULL) {
|
2019-03-20 10:43:31 -04:00
|
|
|
vfs->vfs.stop_socket_select(sem.sem);
|
2018-05-03 04:41:10 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-20 10:43:31 -04:00
|
|
|
void esp_vfs_select_triggered_isr(esp_vfs_select_sem_t sem, BaseType_t *woken)
|
2018-05-03 04:41:10 -04:00
|
|
|
{
|
2019-03-20 10:43:31 -04:00
|
|
|
if (sem.is_sem_local) {
|
|
|
|
xSemaphoreGiveFromISR(sem.sem, woken);
|
2018-05-03 04:41:10 -04:00
|
|
|
} else {
|
|
|
|
// Another way would be to go through s_fd_table and find the VFS
|
|
|
|
// which has a permanent FD. But in order to avoid to lock
|
|
|
|
// s_fd_table_lock we go through the VFS table.
|
|
|
|
for (int i = 0; i < s_vfs_count; ++i) {
|
2019-10-14 03:22:55 -04:00
|
|
|
// Note: s_vfs_count could have changed since the start of vfs_select() call. However, that change doesn't
|
|
|
|
// matter here stop_socket_select() will be called for only valid VFS drivers.
|
2018-05-03 04:41:10 -04:00
|
|
|
const vfs_entry_t *vfs = s_vfs[i];
|
|
|
|
if (vfs != NULL && vfs->vfs.stop_socket_select_isr != NULL) {
|
2023-07-19 06:28:39 -04:00
|
|
|
// Note: If the UART ISR resides in IRAM, the function referenced by stop_socket_select_isr should also be placed in IRAM.
|
2019-03-20 10:43:31 -04:00
|
|
|
vfs->vfs.stop_socket_select_isr(sem.sem, woken);
|
2018-05-03 04:41:10 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-08-14 07:39:30 -04:00
|
|
|
|
2020-03-20 08:35:00 -04:00
|
|
|
#endif // CONFIG_VFS_SUPPORT_SELECT
|
|
|
|
|
2019-07-02 11:14:58 -04:00
|
|
|
#ifdef CONFIG_VFS_SUPPORT_TERMIOS
|
2020-03-20 08:35:00 -04:00
|
|
|
|
2018-08-14 07:39:30 -04:00
|
|
|
int tcgetattr(int fd, struct termios *p)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, tcgetattr, local_fd, p);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int tcsetattr(int fd, int optional_actions, const struct termios *p)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, tcsetattr, local_fd, optional_actions, p);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int tcdrain(int fd)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, tcdrain, local_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int tcflush(int fd, int select)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, tcflush, local_fd, select);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int tcflow(int fd, int action)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, tcflow, local_fd, action);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
pid_t tcgetsid(int fd)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, tcgetsid, local_fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int tcsendbreak(int fd, int duration)
|
|
|
|
{
|
|
|
|
const vfs_entry_t* vfs = get_vfs_for_fd(fd);
|
|
|
|
const int local_fd = get_local_fd(vfs, fd);
|
|
|
|
struct _reent* r = __getreent();
|
|
|
|
if (vfs == NULL || local_fd < 0) {
|
|
|
|
__errno_r(r) = EBADF;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
int ret;
|
|
|
|
CHECK_AND_CALL(ret, r, vfs, tcsendbreak, local_fd, duration);
|
|
|
|
return ret;
|
|
|
|
}
|
2019-07-02 11:14:58 -04:00
|
|
|
#endif // CONFIG_VFS_SUPPORT_TERMIOS
|
2018-10-25 05:53:52 -04:00
|
|
|
|
2019-02-19 07:18:40 -05:00
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
/* Create aliases for newlib syscalls
|
2019-02-19 07:18:40 -05:00
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
These functions are also available in ROM as stubs which use the syscall table, but linking them
|
|
|
|
directly here saves an additional function call when a software function is linked to one, and
|
|
|
|
makes linking with -stdlib easier.
|
|
|
|
*/
|
|
|
|
#ifdef CONFIG_VFS_SUPPORT_IO
|
|
|
|
int _open_r(struct _reent *r, const char * path, int flags, int mode)
|
|
|
|
__attribute__((alias("esp_vfs_open")));
|
|
|
|
int _close_r(struct _reent *r, int fd)
|
|
|
|
__attribute__((alias("esp_vfs_close")));
|
|
|
|
ssize_t _read_r(struct _reent *r, int fd, void * dst, size_t size)
|
|
|
|
__attribute__((alias("esp_vfs_read")));
|
|
|
|
ssize_t _write_r(struct _reent *r, int fd, const void * data, size_t size)
|
|
|
|
__attribute__((alias("esp_vfs_write")));
|
|
|
|
ssize_t pread(int fd, void *dst, size_t size, off_t offset)
|
|
|
|
__attribute__((alias("esp_vfs_pread")));
|
|
|
|
ssize_t pwrite(int fd, const void *src, size_t size, off_t offset)
|
|
|
|
__attribute__((alias("esp_vfs_pwrite")));
|
|
|
|
off_t _lseek_r(struct _reent *r, int fd, off_t size, int mode)
|
|
|
|
__attribute__((alias("esp_vfs_lseek")));
|
|
|
|
int _fcntl_r(struct _reent *r, int fd, int cmd, int arg)
|
|
|
|
__attribute__((alias("esp_vfs_fcntl_r")));
|
|
|
|
int _fstat_r(struct _reent *r, int fd, struct stat * st)
|
|
|
|
__attribute__((alias("esp_vfs_fstat")));
|
|
|
|
int fsync(int fd)
|
|
|
|
__attribute__((alias("esp_vfs_fsync")));
|
|
|
|
int ioctl(int fd, int cmd, ...)
|
|
|
|
__attribute__((alias("esp_vfs_ioctl")));
|
|
|
|
#endif // CONFIG_VFS_SUPPORT_IO
|
2019-02-19 07:18:40 -05:00
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
#ifdef CONFIG_VFS_SUPPORT_SELECT
|
|
|
|
int select(int nfds, fd_set *readfds, fd_set *writefds, fd_set *errorfds, struct timeval *timeout)
|
|
|
|
__attribute__((alias("esp_vfs_select")));
|
|
|
|
#endif // CONFIG_VFS_SUPPORT_SELECT
|
2019-02-19 07:18:40 -05:00
|
|
|
|
2020-03-20 08:36:44 -04:00
|
|
|
#ifdef CONFIG_VFS_SUPPORT_DIR
|
|
|
|
int _stat_r(struct _reent *r, const char * path, struct stat * st)
|
|
|
|
__attribute__((alias("esp_vfs_stat")));
|
|
|
|
int _link_r(struct _reent *r, const char* n1, const char* n2)
|
|
|
|
__attribute__((alias("esp_vfs_link")));
|
|
|
|
int _unlink_r(struct _reent *r, const char *path)
|
|
|
|
__attribute__((alias("esp_vfs_unlink")));
|
|
|
|
int _rename_r(struct _reent *r, const char *src, const char *dst)
|
|
|
|
__attribute__((alias("esp_vfs_rename")));
|
|
|
|
int truncate(const char *path, off_t length)
|
|
|
|
__attribute__((alias("esp_vfs_truncate")));
|
2022-03-07 13:31:48 -05:00
|
|
|
int ftruncate(int fd, off_t length)
|
|
|
|
__attribute__((alias("esp_vfs_ftruncate")));
|
2020-03-20 08:36:44 -04:00
|
|
|
int access(const char *path, int amode)
|
|
|
|
__attribute__((alias("esp_vfs_access")));
|
|
|
|
int utime(const char *path, const struct utimbuf *times)
|
|
|
|
__attribute__((alias("esp_vfs_utime")));
|
|
|
|
int rmdir(const char* name)
|
|
|
|
__attribute__((alias("esp_vfs_rmdir")));
|
|
|
|
int mkdir(const char* name, mode_t mode)
|
|
|
|
__attribute__((alias("esp_vfs_mkdir")));
|
|
|
|
DIR* opendir(const char* name)
|
|
|
|
__attribute__((alias("esp_vfs_opendir")));
|
|
|
|
int closedir(DIR* pdir)
|
|
|
|
__attribute__((alias("esp_vfs_closedir")));
|
|
|
|
int readdir_r(DIR* pdir, struct dirent* entry, struct dirent** out_dirent)
|
|
|
|
__attribute__((alias("esp_vfs_readdir_r")));
|
|
|
|
struct dirent* readdir(DIR* pdir)
|
|
|
|
__attribute__((alias("esp_vfs_readdir")));
|
|
|
|
long telldir(DIR* pdir)
|
|
|
|
__attribute__((alias("esp_vfs_telldir")));
|
|
|
|
void seekdir(DIR* pdir, long loc)
|
|
|
|
__attribute__((alias("esp_vfs_seekdir")));
|
|
|
|
void rewinddir(DIR* pdir)
|
|
|
|
__attribute__((alias("esp_vfs_rewinddir")));
|
|
|
|
#endif // CONFIG_VFS_SUPPORT_DIR
|
2019-04-14 23:45:08 -04:00
|
|
|
|
2019-07-16 05:33:30 -04:00
|
|
|
void vfs_include_syscalls_impl(void)
|
2019-04-14 23:45:08 -04:00
|
|
|
{
|
2023-11-24 01:56:08 -05:00
|
|
|
// Linker hook function, exists to make the linker examine this file
|
2019-04-14 23:45:08 -04:00
|
|
|
}
|