genode/os/src/server/ram_fs
Stefan Kalkowski 65291902e0 os: manage/dissolve Signal_rpc_member in class
Instead of, passing responsibility to manage and dissolve Signal_rpc_member
objects at a corresponding entrypoint to the user, hand over entrypoint's
reference to the constructor, and do it in the constructor resp. destructor
of the class.

Fixes #1022
2014-01-16 18:34:06 +01:00
..
chunk.h Update copyright headers to 2013 2013-01-10 21:44:47 +01:00
directory.h base: Add const qualifiers to 'util/list.h' 2013-09-18 14:58:55 +02:00
file.h Introduce notifications to file-system interface 2013-01-15 10:18:07 +01:00
main.cc os: manage/dissolve Signal_rpc_member in class 2014-01-16 18:34:06 +01:00
node_handle_registry.h Introduce notifications to file-system interface 2013-01-15 10:18:07 +01:00
node.h Introduce notifications to file-system interface 2013-01-15 10:18:07 +01:00
README Allow defining ram_fs file content from config 2012-05-18 17:07:30 +02:00
symlink.h Add support for symbolic links 2012-10-08 15:05:02 +02:00
target.mk ram_fs: use server skeleton library 2013-11-26 14:32:06 +01:00
util.h File-system interface, ram_fs, libc-fs 2012-05-17 20:33:53 +02:00

This directory contains an in-memory file-system implementation.

Configuration
~~~~~~~~~~~~~

Access to the file system can be tailored for each session depending on the
session's label. By default, no permissions are granted to any session.
To selectively permit access to (a part of) the file system, at least one
ram_fs policy must be defined.

The following configuration illustates the way of how to express policy.

! <config>
!   <!-- preload RAM file system with some ROM images -->
!   <content>
!     <dir name="tmp">
!       <rom name="init" as="blubb" />
!     </dir>
!     <dir name="home">
!       <dir name="user">
!         <inline name=".vimrc">
!           set hidden
!         </inline>
!       </dir>
!     </dir>
!   </content>
!   <!-- constrain sessions according to their labels -->
!   <policy label="noux -> root" root="/" />
!   <policy label="noux -> home" root="/home/user" writeable="yes" />
!   <policy label="noux -> tmp"  root="/tmp"       writeable="yes" />
! </config>

The '<content>' sub node of the '<config>' node provides a way to pre-populate
the file system with directories and files. Note that '<dir>' nodes can be
arbitrarily nested. Files can be loaded from the ROM service. By adding the
optional 'at' attribute to a rom node, the file name can be defined
independently from the ROM module name. In addition to creating files from
ROM modules, files can be created from data specified directly as part of the
configuration using '<inline>' nodes. The content of such nodes is used as
file content as is.

Session-specific access-control policy is expressed via one or more '<policy>'
nodes. At session-creation time, each policy node is matched against the label
of the new session. If the label of a policy node matches, the defined policy
is applied. If multiple policies match, the one with the longest 'label'
attribute (the most specific one) is selected.

A policy node may contain the following attributes. The mandatory 'root'
attribute defines the viewport of the session onto the file system. The
optional 'writeable' attribute grants the permission to modify the file system.


Example
~~~~~~~

To illustrate the use of ram_fs, refer to the 'libports/run/libc_fs.run'
script.