Compare commits

..

9 Commits

Author SHA1 Message Date
3e5599e75c
kernel/ext2: Add support for symbolic links
All checks were successful
continuous-integration/drone/pr Build is passing
2023-06-22 20:10:09 +02:00
d1ddf314d6
kernel: Make pivot_root() reset the parent entry of the new root directory
All checks were successful
continuous-integration/drone/pr Build is passing
Otherwise it would just be pointing to the old parent fs, and we don't want that.
2023-06-22 19:57:12 +02:00
6ca131f8b9
kernel/ext2: Implement directory traversal
All checks were successful
continuous-integration/drone/pr Build is passing
2023-06-22 19:41:35 +02:00
393f3dfaca
tools: Generate the Ext2 filesystem using genext2fs instead
mkbootimg's filenames have some kind of bug...
2023-06-22 19:39:43 +02:00
765df906fb
kernel/ext2: Implement Inode::read()
All checks were successful
continuous-integration/drone/pr Build is passing
2023-06-22 16:34:22 +02:00
62ac42ffc3
kernel/Ext2: Read the root inode metadata from the disk
All checks were successful
continuous-integration/drone/pr Build is passing
2023-06-21 21:32:28 +02:00
1461fffba8
mount: Put the source argument first
All checks were successful
continuous-integration/drone/pr Build is passing
2023-06-20 21:44:24 +02:00
73fbc37841 kernel+libc+apps: Add a source parameter to the mount() system call
All checks were successful
continuous-integration/drone/pr Build is passing
2023-06-20 19:40:58 +00:00
479016ab20 kernel: Add an Ext2 filesystem skeleton 2023-06-20 19:40:58 +00:00
2 changed files with 0 additions and 10 deletions

View File

@ -10,8 +10,3 @@
# Example: Adding a compiler flag. This will optimize the kernel aggressively (warning: untested, use at your own discretion).
# target_compile_options(moon PRIVATE -O3)
# Uncomment the line below to allow any filename on file/directory creation (by default, the kernel prohibits filenames with
# control characters, leading/trailing spaces, problematic characters and invalid UTF-8). Keep in mind that this restriction
# is only enforced when creating files; existing files with such illegal filenames are parsed correctly and fully usable.
# target_compile_definitions(moon PRIVATE MOON_DISABLE_FILENAME_RESTRICTIONS)

View File

@ -101,11 +101,6 @@ namespace VFS
Result<void> validate_filename(StringView name)
{
#ifdef MOON_DISABLE_FILENAME_RESTRICTIONS
(void)name;
return {};
#endif
// Forbid problematic characters that could cause trouble in shell scripts and the like.
if (strpbrk(name.chars(), "*?:[]\"<>\\")) return err(EINVAL);