2 1e84c7b7 2022-01-10 op * Copyright (c) 2021, 2022 Omar Polo <op@omarpolo.com>
4 fb1a36c0 2022-01-09 op * Permission to use, copy, modify, and distribute this software for any
5 fb1a36c0 2022-01-09 op * purpose with or without fee is hereby granted, provided that the above
6 fb1a36c0 2022-01-09 op * copyright notice and this permission notice appear in all copies.
8 fb1a36c0 2022-01-09 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 fb1a36c0 2022-01-09 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 fb1a36c0 2022-01-09 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 fb1a36c0 2022-01-09 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 fb1a36c0 2022-01-09 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 fb1a36c0 2022-01-09 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 fb1a36c0 2022-01-09 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 bbcba3ed 2022-01-10 op #include "compat.h"
19 fb1a36c0 2022-01-09 op #include <sys/stat.h>
20 fb1a36c0 2022-01-09 op #include <sys/types.h>
21 fb1a36c0 2022-01-09 op #include <sys/uio.h>
23 fb1a36c0 2022-01-09 op #include <dirent.h>
24 fb1a36c0 2022-01-09 op #include <endian.h>
25 fb1a36c0 2022-01-09 op #include <errno.h>
26 fb1a36c0 2022-01-09 op #include <fcntl.h>
27 755d75bf 2022-01-17 op #include <inttypes.h>
28 755d75bf 2022-01-17 op #include <libgen.h>
29 fb1a36c0 2022-01-09 op #include <pwd.h>
30 fb1a36c0 2022-01-09 op #include <signal.h>
31 fb1a36c0 2022-01-09 op #include <stdint.h>
32 755d75bf 2022-01-17 op #include <stdio.h>
33 fb1a36c0 2022-01-09 op #include <stdlib.h>
34 fb1a36c0 2022-01-09 op #include <string.h>
35 fb1a36c0 2022-01-09 op #include <syslog.h>
36 fb1a36c0 2022-01-09 op #include <unistd.h>
38 fb1a36c0 2022-01-09 op #include "client.h"
39 fb1a36c0 2022-01-09 op #include "kami.h"
40 fb1a36c0 2022-01-09 op #include "kamid.h"
41 fb1a36c0 2022-01-09 op #include "log.h"
42 fb1a36c0 2022-01-09 op #include "sandbox.h"
43 fb1a36c0 2022-01-09 op #include "utils.h"
46 fbeaf87b 2022-05-22 op * Max message size aviable via a single imsg.
48 fbeaf87b 2022-05-22 op #define IMSG_MAXSIZE (MAX_IMSGSIZE - IMSG_HEADER_SIZE)
51 6be59daa 2022-05-22 op * The minimum value allowed for the msize.
53 6be59daa 2022-05-22 op #define MIN_MSIZE 256
55 fb1a36c0 2022-01-09 op #define DEBUG_PACKETS 0
57 fb1a36c0 2022-01-09 op /* straight outta /src/usr.bin/ssh/scp.c */
58 fb1a36c0 2022-01-09 op #define TYPE_OVERFLOW(type, val) \
59 fb1a36c0 2022-01-09 op ((sizeof(type) == 4 && (val) > INT32_MAX) || \
60 fb1a36c0 2022-01-09 op (sizeof(type) == 8 && (val) > INT64_MAX) || \
61 fb1a36c0 2022-01-09 op (sizeof(type) != 4 && sizeof(type) != 8))
63 fb1a36c0 2022-01-09 op STAILQ_HEAD(dirhead, dir) dirs;
67 fb1a36c0 2022-01-09 op STAILQ_ENTRY(dir) entries;
70 fb1a36c0 2022-01-09 op STAILQ_HEAD(fidhead, fid) fids;
74 46e4e74b 2022-01-17 op char fname[NAME_MAX];
77 fb1a36c0 2022-01-09 op * the flags passed to open(2). O_CLOEXEC means ORCLOSE, that
78 fb1a36c0 2022-01-09 op * is to unlink the file upon Tclunk.
83 fb1a36c0 2022-01-09 op * if fd is not -1 this fid was opened, fd represents its
84 fb1a36c0 2022-01-09 op * file descriptor and iomode the flags passed to open(2).
88 fb1a36c0 2022-01-09 op struct evbuffer *evb;
91 fb1a36c0 2022-01-09 op * expected offset for Tread against a directory.
93 fb1a36c0 2022-01-09 op uint64_t offset;
95 fb1a36c0 2022-01-09 op struct qid qid;
96 fb1a36c0 2022-01-09 op struct dir *dir;
97 fb1a36c0 2022-01-09 op STAILQ_ENTRY(fid) entries;
100 fb1a36c0 2022-01-09 op static struct imsgev *iev_listener;
101 fb1a36c0 2022-01-09 op static struct evbuffer *evb;
102 fb1a36c0 2022-01-09 op static uint32_t peerid;
104 fb1a36c0 2022-01-09 op static int handshaked;
105 fb1a36c0 2022-01-09 op uint32_t msize;
107 fb1a36c0 2022-01-09 op static __dead void client_shutdown(void);
108 fb1a36c0 2022-01-09 op static void client_sig_handler(int, short, void *);
109 fb1a36c0 2022-01-09 op static void client_dispatch_listener(int, short, void *);
110 fb1a36c0 2022-01-09 op static void client_privdrop(const char *, const char *);
112 5c69b561 2022-01-29 op static int client_send_listenerp(int, uint32_t, const void *, uint16_t);
113 fb1a36c0 2022-01-09 op static int client_send_listener(int, const void *, uint16_t);
115 fb1a36c0 2022-01-09 op static void qid_update_from_sb(struct qid *, struct stat *);
117 fb1a36c0 2022-01-09 op static struct dir *new_dir(int);
118 fb1a36c0 2022-01-09 op static struct dir *dir_incref(struct dir *);
119 fb1a36c0 2022-01-09 op static void dir_decref(struct dir *);
121 fb1a36c0 2022-01-09 op static struct fid *new_fid(struct dir *, uint32_t, const char *, struct qid *);
122 fb1a36c0 2022-01-09 op static struct fid *fid_by_id(uint32_t);
123 fb1a36c0 2022-01-09 op static void free_fid(struct fid *);
125 fb1a36c0 2022-01-09 op static void parse_message(const uint8_t *, size_t,
126 fb1a36c0 2022-01-09 op struct np_msg_header *, uint8_t **);
128 fb1a36c0 2022-01-09 op static void np_write16(struct evbuffer *, uint16_t);
129 fb1a36c0 2022-01-09 op static void np_write32(struct evbuffer *, uint32_t);
130 fb1a36c0 2022-01-09 op static void np_write64(struct evbuffer *, uint64_t);
131 fb1a36c0 2022-01-09 op static void np_header(uint32_t, uint8_t, uint16_t);
132 fb1a36c0 2022-01-09 op static void np_string(struct evbuffer *, uint16_t, const char *);
133 fb1a36c0 2022-01-09 op static void np_qid(struct evbuffer *, struct qid *);
134 fb1a36c0 2022-01-09 op static void do_send(void);
136 fb1a36c0 2022-01-09 op static void np_version(uint16_t, uint32_t, const char *);
137 fb1a36c0 2022-01-09 op static void np_attach(uint16_t, struct qid *);
138 fb1a36c0 2022-01-09 op static void np_clunk(uint16_t);
139 fb1a36c0 2022-01-09 op static void np_flush(uint16_t);
140 fb1a36c0 2022-01-09 op static void np_walk(uint16_t, int, struct qid *);
141 fb1a36c0 2022-01-09 op static void np_open(uint16_t, struct qid *, uint32_t);
142 fb1a36c0 2022-01-09 op static void np_create(uint16_t, struct qid *, uint32_t);
143 fb1a36c0 2022-01-09 op static void np_read(uint16_t, uint32_t, void *);
144 fb1a36c0 2022-01-09 op static void np_write(uint16_t, uint32_t);
145 70540bb5 2022-02-02 op static void np_stat(uint16_t, uint16_t, void *);
146 755d75bf 2022-01-17 op static void np_wstat(uint16_t);
147 fb1a36c0 2022-01-09 op static void np_remove(uint16_t);
148 fb1a36c0 2022-01-09 op static void np_error(uint16_t, const char *);
149 fb1a36c0 2022-01-09 op static void np_errno(uint16_t);
151 fb1a36c0 2022-01-09 op static int np_read8(const char *, const char *, uint8_t *,
152 fb1a36c0 2022-01-09 op const uint8_t **, size_t *);
153 fb1a36c0 2022-01-09 op static int np_read16(const char *, const char *, uint16_t *,
154 fb1a36c0 2022-01-09 op const uint8_t **, size_t *);
155 fb1a36c0 2022-01-09 op static int np_read32(const char *, const char *, uint32_t *,
156 fb1a36c0 2022-01-09 op const uint8_t **, size_t *);
157 fb1a36c0 2022-01-09 op static int np_read64(const char *, const char *, uint64_t *,
158 fb1a36c0 2022-01-09 op const uint8_t **, size_t *);
160 fb1a36c0 2022-01-09 op #define READSTRERR -1
161 fb1a36c0 2022-01-09 op #define READSTRTRUNC -2
162 fb1a36c0 2022-01-09 op static int np_readstr(const char *, const char *, char *, size_t,
163 fb1a36c0 2022-01-09 op const uint8_t **, size_t *);
165 755d75bf 2022-01-17 op static int np_readst(const char *, const char *, struct np_stat *,
166 755d75bf 2022-01-17 op char *, size_t, const uint8_t **, size_t *);
168 fb1a36c0 2022-01-09 op #define NPREAD8(f, dst, src, len) np_read8(__func__, f, dst, src, len)
169 fb1a36c0 2022-01-09 op #define NPREAD16(f, dst, src, len) np_read16(__func__, f, dst, src, len)
170 fb1a36c0 2022-01-09 op #define NPREAD32(f, dst, src, len) np_read32(__func__, f, dst, src, len)
171 fb1a36c0 2022-01-09 op #define NPREAD64(f, dst, src, len) np_read64(__func__, f, dst, src, len)
173 fb1a36c0 2022-01-09 op #define NPREADSTR(f, b, bl, src, len) np_readstr(__func__, f, b, bl, src, len)
175 755d75bf 2022-01-17 op #define NPREADST(f, dst, n, nl, src, len) np_readst(__func__, f, dst, n, nl, src, len)
177 fb1a36c0 2022-01-09 op static void tversion(struct np_msg_header *, const uint8_t *, size_t);
178 fb1a36c0 2022-01-09 op static void tattach(struct np_msg_header *, const uint8_t *, size_t);
179 fb1a36c0 2022-01-09 op static void tclunk(struct np_msg_header *, const uint8_t *, size_t);
180 fb1a36c0 2022-01-09 op static void tflush(struct np_msg_header *, const uint8_t *, size_t);
181 fb1a36c0 2022-01-09 op static void twalk(struct np_msg_header *, const uint8_t *, size_t);
182 fb1a36c0 2022-01-09 op static void topen(struct np_msg_header *, const uint8_t *, size_t);
183 fb1a36c0 2022-01-09 op static void tcreate(struct np_msg_header *, const uint8_t *, size_t);
184 fb1a36c0 2022-01-09 op static void tread(struct np_msg_header *, const uint8_t *, size_t);
185 f9d8661b 2022-05-23 op static void twrite(struct np_msg_header *, const uint8_t *, size_t, struct fid **, off_t *, size_t *, size_t *, int *);
186 f9d8661b 2022-05-23 op static void twrite_cont(struct fid *, off_t *, size_t *, size_t *, int *, uint16_t, const uint8_t *, size_t);
187 fb1a36c0 2022-01-09 op static void tstat(struct np_msg_header *, const uint8_t *, size_t);
188 755d75bf 2022-01-17 op static void twstat(struct np_msg_header *, const uint8_t *, size_t);
189 fb1a36c0 2022-01-09 op static void tremove(struct np_msg_header *, const uint8_t *, size_t);
190 8b0a5062 2022-05-22 op static void handle_message(struct imsg *, size_t, int);
193 fb1a36c0 2022-01-09 op client(int debug, int verbose)
195 fb1a36c0 2022-01-09 op struct event ev_sigint, ev_sigterm;
197 fb1a36c0 2022-01-09 op log_init(debug, LOG_DAEMON);
198 fb1a36c0 2022-01-09 op log_setverbose(verbose);
200 fb1a36c0 2022-01-09 op setproctitle("client");
201 fb1a36c0 2022-01-09 op log_procinit("client");
203 fb1a36c0 2022-01-09 op log_debug("warming up");
205 fb1a36c0 2022-01-09 op event_init();
207 fb1a36c0 2022-01-09 op /* Setup signal handlers */
208 fb1a36c0 2022-01-09 op signal_set(&ev_sigint, SIGINT, client_sig_handler, NULL);
209 fb1a36c0 2022-01-09 op signal_set(&ev_sigterm, SIGTERM, client_sig_handler, NULL);
211 fb1a36c0 2022-01-09 op signal_add(&ev_sigint, NULL);
212 fb1a36c0 2022-01-09 op signal_add(&ev_sigterm, NULL);
214 fb1a36c0 2022-01-09 op signal(SIGPIPE, SIG_IGN);
215 fb1a36c0 2022-01-09 op signal(SIGHUP, SIG_IGN);
217 fb1a36c0 2022-01-09 op /* Setup pipe and event handler to the listener process */
218 fb1a36c0 2022-01-09 op if ((iev_listener = malloc(sizeof(*iev_listener))) == NULL)
221 fb1a36c0 2022-01-09 op imsg_init(&iev_listener->ibuf, 3);
222 fb1a36c0 2022-01-09 op iev_listener->handler = client_dispatch_listener;
224 fb1a36c0 2022-01-09 op /* Setup event handlers. */
225 fb1a36c0 2022-01-09 op iev_listener->events = EV_READ;
226 fb1a36c0 2022-01-09 op event_set(&iev_listener->ev, iev_listener->ibuf.fd,
227 fb1a36c0 2022-01-09 op iev_listener->events, iev_listener->handler, iev_listener);
228 fb1a36c0 2022-01-09 op event_add(&iev_listener->ev, NULL);
230 fb1a36c0 2022-01-09 op event_dispatch();
231 fb1a36c0 2022-01-09 op client_shutdown();
234 fb1a36c0 2022-01-09 op static __dead void
235 fb1a36c0 2022-01-09 op client_shutdown(void)
237 fb1a36c0 2022-01-09 op if (evb != NULL)
238 fb1a36c0 2022-01-09 op evbuffer_free(evb);
240 fb1a36c0 2022-01-09 op msgbuf_clear(&iev_listener->ibuf.w);
241 fb1a36c0 2022-01-09 op close(iev_listener->ibuf.fd);
243 fb1a36c0 2022-01-09 op free(iev_listener);
245 fb1a36c0 2022-01-09 op log_debug("client exiting");
250 fb1a36c0 2022-01-09 op client_sig_handler(int sig, short event, void *d)
253 fb1a36c0 2022-01-09 op * Normal signal handler rules don't apply because libevent
254 fb1a36c0 2022-01-09 op * decouples for us.
257 fb1a36c0 2022-01-09 op switch (sig) {
259 fb1a36c0 2022-01-09 op case SIGTERM:
260 fb1a36c0 2022-01-09 op client_shutdown();
262 fb1a36c0 2022-01-09 op fatalx("unexpected signal %d", sig);
267 fb1a36c0 2022-01-09 op client_dispatch_listener(int fd, short event, void *d)
269 1e84c7b7 2022-01-10 op static int auth = 0;
270 1e84c7b7 2022-01-10 op struct kd_auth_proc rauth;
271 5c69b561 2022-01-29 op struct kd_debug_info debug;
272 5c69b561 2022-01-29 op struct fid *f;
273 fb1a36c0 2022-01-09 op struct imsg imsg;
274 fb1a36c0 2022-01-09 op struct imsgev *iev = d;
275 fb1a36c0 2022-01-09 op struct imsgbuf *ibuf;
277 fb1a36c0 2022-01-09 op int shut = 0;
279 fb1a36c0 2022-01-09 op ibuf = &iev->ibuf;
281 fb1a36c0 2022-01-09 op if (event & EV_READ) {
282 fb1a36c0 2022-01-09 op if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN)
283 fb1a36c0 2022-01-09 op fatal("imsg_read error");
284 fb1a36c0 2022-01-09 op if (n == 0) /* Connection closed */
287 fb1a36c0 2022-01-09 op if (event & EV_WRITE) {
288 fb1a36c0 2022-01-09 op if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN)
289 fb1a36c0 2022-01-09 op fatal("msgbuf_write");
290 fb1a36c0 2022-01-09 op if (n == 0) /* Connection closed */
295 fb1a36c0 2022-01-09 op if ((n = imsg_get(ibuf, &imsg)) == -1)
296 fb1a36c0 2022-01-09 op fatal("%s: imsg_get error", __func__);
297 fb1a36c0 2022-01-09 op if (n == 0) /* No more messages. */
300 fb1a36c0 2022-01-09 op switch (imsg.hdr.type) {
301 982f38dc 2022-01-23 op case IMSG_CTL_LOG_VERBOSE:
302 982f38dc 2022-01-23 op if (IMSG_DATA_SIZE(imsg) != sizeof(verbose))
303 982f38dc 2022-01-23 op fatalx("%s: IMSG_CTL_LOG_VERBOSE wrong size",
305 982f38dc 2022-01-23 op memcpy(&verbose, imsg.data, sizeof(verbose));
306 982f38dc 2022-01-23 op log_setverbose(verbose);
308 5c69b561 2022-01-29 op case IMSG_CTL_DEBUG:
309 5c69b561 2022-01-29 op STAILQ_FOREACH(f, &fids, entries) {
310 5c69b561 2022-01-29 op memset(&debug, 0, sizeof(debug));
311 5c69b561 2022-01-29 op debug.fid = f->fid;
312 5c69b561 2022-01-29 op strlcpy(debug.path, f->fname,
313 5c69b561 2022-01-29 op sizeof(debug.path));
314 5c69b561 2022-01-29 op client_send_listenerp(IMSG_CTL_DEBUG_BACK,
315 5c69b561 2022-01-29 op imsg.hdr.peerid, &debug, sizeof(debug));
317 5c69b561 2022-01-29 op client_send_listenerp(IMSG_CTL_DEBUG_END,
318 5c69b561 2022-01-29 op imsg.hdr.peerid, NULL, 0);
320 fb1a36c0 2022-01-09 op case IMSG_AUTH:
321 fb1a36c0 2022-01-09 op peerid = imsg.hdr.peerid;
323 fb1a36c0 2022-01-09 op fatalx("%s: IMSG_AUTH already done", __func__);
326 1e84c7b7 2022-01-10 op if (IMSG_DATA_SIZE(imsg) != sizeof(rauth))
327 1e84c7b7 2022-01-10 op fatalx("mismatching size for IMSG_AUTH");
328 1e84c7b7 2022-01-10 op memcpy(&rauth, imsg.data, sizeof(rauth));
329 1e84c7b7 2022-01-10 op if (rauth.uname[sizeof(rauth.uname)-1] != '\0' ||
330 1e84c7b7 2022-01-10 op rauth.dir[sizeof(rauth.dir)-1] != '\0')
331 1e84c7b7 2022-01-10 op fatalx("IMSG_AUTH strings not NUL-terminated");
333 1e84c7b7 2022-01-10 op client_privdrop(rauth.uname, rauth.dir);
334 1e84c7b7 2022-01-10 op explicit_bzero(&rauth, sizeof(rauth));
336 fb1a36c0 2022-01-09 op case IMSG_BUF:
337 8b0a5062 2022-05-22 op case IMSG_BUF_CONT:
339 fb1a36c0 2022-01-09 op fatalx("%s: can't handle messages before"
340 fb1a36c0 2022-01-09 op " doing the auth", __func__);
341 8b0a5062 2022-05-22 op handle_message(&imsg, IMSG_DATA_SIZE(imsg),
342 8b0a5062 2022-05-22 op imsg.hdr.type == IMSG_BUF_CONT);
344 fb1a36c0 2022-01-09 op case IMSG_CONN_GONE:
345 fb1a36c0 2022-01-09 op log_debug("closing");
349 fb1a36c0 2022-01-09 op log_debug("%s: unexpected imsg %d",
350 fb1a36c0 2022-01-09 op __func__, imsg.hdr.type);
353 fb1a36c0 2022-01-09 op imsg_free(&imsg);
357 fb1a36c0 2022-01-09 op imsg_event_add(iev);
359 fb1a36c0 2022-01-09 op /* This pipe is dead. Remove its event handler. */
360 fb1a36c0 2022-01-09 op event_del(&iev->ev);
361 fb1a36c0 2022-01-09 op log_debug("pipe closed, shutting down...");
362 fb1a36c0 2022-01-09 op event_loopexit(NULL);
367 fb1a36c0 2022-01-09 op client_privdrop(const char *username, const char *dir)
369 fb1a36c0 2022-01-09 op struct passwd *pw;
371 fb1a36c0 2022-01-09 op setproctitle("client %s", username);
373 fb1a36c0 2022-01-09 op if ((pw = getpwnam(username)) == NULL)
374 fb1a36c0 2022-01-09 op fatalx("getpwnam(%s) failed", username);
376 fb1a36c0 2022-01-09 op if (chroot(dir) == -1)
377 fb1a36c0 2022-01-09 op fatal("chroot");
378 fb1a36c0 2022-01-09 op if (chdir("/") == -1)
379 fb1a36c0 2022-01-09 op fatal("chdir(\"/\")");
381 fb1a36c0 2022-01-09 op if (setgroups(1, &pw->pw_gid) ||
382 fb1a36c0 2022-01-09 op setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
383 fb1a36c0 2022-01-09 op setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
384 fb1a36c0 2022-01-09 op fatal("can't drop privileges");
386 fb1a36c0 2022-01-09 op sandbox_client();
387 fb1a36c0 2022-01-09 op log_debug("client ready; user=%s dir=%s", username, dir);
389 fb1a36c0 2022-01-09 op if ((evb = evbuffer_new()) == NULL)
390 fb1a36c0 2022-01-09 op fatal("evbuffer_new");
394 5c69b561 2022-01-29 op client_send_listenerp(int type, uint32_t peerid, const void *data, uint16_t len)
398 fb1a36c0 2022-01-09 op if ((ret = imsg_compose(&iev_listener->ibuf, type, peerid, 0, -1,
399 fb1a36c0 2022-01-09 op data, len)) != -1)
400 fb1a36c0 2022-01-09 op imsg_event_add(iev_listener);
406 5c69b561 2022-01-29 op client_send_listener(int type, const void *data, uint16_t len)
408 865dd323 2022-01-29 op return client_send_listenerp(type, peerid, data, len);
411 fb1a36c0 2022-01-09 op /* set qid fields from sb */
413 fb1a36c0 2022-01-09 op qid_update_from_sb(struct qid *qid, struct stat *sb)
415 fb1a36c0 2022-01-09 op qid->path = sb->st_ino;
418 fb1a36c0 2022-01-09 op * Theoretically (and hopefully!) this should be a 64 bit
419 fb1a36c0 2022-01-09 op * number. Unfortunately, 9P uses 32 bit timestamps.
421 fb1a36c0 2022-01-09 op qid->vers = sb->st_mtim.tv_sec;
423 fb1a36c0 2022-01-09 op if (S_ISREG(sb->st_mode))
424 fb1a36c0 2022-01-09 op qid->type = QTFILE;
425 fb1a36c0 2022-01-09 op else if (S_ISDIR(sb->st_mode))
426 fb1a36c0 2022-01-09 op qid->type = QTDIR;
427 fb1a36c0 2022-01-09 op else if (S_ISLNK(sb->st_mode))
428 fb1a36c0 2022-01-09 op qid->type = QTSYMLINK;
431 fb1a36c0 2022-01-09 op /* creates a qid given a fd */
432 fb1a36c0 2022-01-09 op static struct dir *
433 fb1a36c0 2022-01-09 op new_dir(int fd)
435 fb1a36c0 2022-01-09 op struct dir *dir;
437 fb1a36c0 2022-01-09 op if ((dir = calloc(1, sizeof(*dir))) == NULL)
440 fb1a36c0 2022-01-09 op dir->fd = fd;
441 fb1a36c0 2022-01-09 op STAILQ_INSERT_HEAD(&dirs, dir, entries);
445 fb1a36c0 2022-01-09 op static struct dir *
446 fb1a36c0 2022-01-09 op dir_incref(struct dir *dir)
448 fb1a36c0 2022-01-09 op dir->refcount++;
453 fb1a36c0 2022-01-09 op dir_decref(struct dir *dir)
455 fb1a36c0 2022-01-09 op if (--dir->refcount > 0)
458 fb1a36c0 2022-01-09 op STAILQ_REMOVE(&dirs, dir, dir, entries);
460 fb1a36c0 2022-01-09 op close(dir->fd);
464 fb1a36c0 2022-01-09 op static struct fid *
465 fb1a36c0 2022-01-09 op new_fid(struct dir *dir, uint32_t fid, const char *path, struct qid *qid)
467 fb1a36c0 2022-01-09 op struct fid *f;
468 fb1a36c0 2022-01-09 op struct qid q;
469 fb1a36c0 2022-01-09 op struct stat sb;
471 fb1a36c0 2022-01-09 op if (qid == NULL) {
472 fb1a36c0 2022-01-09 op if (fstatat(dir->fd, path, &sb, 0)) {
473 fb1a36c0 2022-01-09 op log_warn("fstatat(%s)", path);
476 fb1a36c0 2022-01-09 op qid_update_from_sb(&q, &sb);
480 fb1a36c0 2022-01-09 op if ((f = calloc(1, sizeof(*f))) == NULL)
483 fb1a36c0 2022-01-09 op f->dir = dir_incref(dir);
484 fb1a36c0 2022-01-09 op f->fid = fid;
487 543fc013 2022-01-17 op strlcpy(f->fname, path, sizeof(f->fname));
489 fb1a36c0 2022-01-09 op memcpy(&f->qid, qid, sizeof(f->qid));
491 fb1a36c0 2022-01-09 op STAILQ_INSERT_HEAD(&fids, f, entries);
496 fb1a36c0 2022-01-09 op static struct fid *
497 fb1a36c0 2022-01-09 op fid_by_id(uint32_t fid)
499 fb1a36c0 2022-01-09 op struct fid *f;
501 fb1a36c0 2022-01-09 op STAILQ_FOREACH(f, &fids, entries) {
502 fb1a36c0 2022-01-09 op if (f->fid == fid)
510 fb1a36c0 2022-01-09 op free_fid(struct fid *f)
514 fb1a36c0 2022-01-09 op if (f->fd != -1) {
515 fb1a36c0 2022-01-09 op if (f->d != NULL)
516 fb1a36c0 2022-01-09 op r = closedir(f->d);
518 fb1a36c0 2022-01-09 op r = close(f->fd);
521 fb1a36c0 2022-01-09 op fatal("can't close fid %d", f->fid);
523 fb1a36c0 2022-01-09 op if (f->evb != NULL)
524 fb1a36c0 2022-01-09 op evbuffer_free(f->evb);
526 fb1a36c0 2022-01-09 op /* try to honour ORCLOSE if requested */
527 fb1a36c0 2022-01-09 op if (f->iomode & O_CLOEXEC)
528 543fc013 2022-01-17 op unlinkat(f->dir->fd, f->fname, 0);
531 fb1a36c0 2022-01-09 op dir_decref(f->dir);
533 fb1a36c0 2022-01-09 op STAILQ_REMOVE(&fids, f, fid, entries);
538 fb1a36c0 2022-01-09 op parse_message(const uint8_t *data, size_t len, struct np_msg_header *hdr,
539 fb1a36c0 2022-01-09 op uint8_t **cnt)
541 fb1a36c0 2022-01-09 op size_t olen = len;
543 fb1a36c0 2022-01-09 op if (!NPREAD32("len", &hdr->len, &data, &len) ||
544 fb1a36c0 2022-01-09 op !NPREAD8("type", &hdr->type, &data, &len) ||
545 fb1a36c0 2022-01-09 op !NPREAD16("tag", &hdr->tag, &data, &len))
549 a9eb1af3 2022-05-23 op * Allow only "jumbo" Twrites.
551 a9eb1af3 2022-05-23 op if (hdr->type != Twrite && olen != hdr->len)
554 fb1a36c0 2022-01-09 op if (hdr->type < Tversion ||
555 fb1a36c0 2022-01-09 op hdr->type >= Tmax ||
556 fb1a36c0 2022-01-09 op hdr->type == Terror ||
557 fb1a36c0 2022-01-09 op (hdr->type & 0x1) != 0) /* cannot recv a R* */
560 fb1a36c0 2022-01-09 op hdr->tag = le32toh(hdr->tag);
562 fb1a36c0 2022-01-09 op *cnt = (uint8_t *)data;
566 182b48dc 2022-05-22 op log_warnx("got invalid message: (%d, %d, %d)",
567 182b48dc 2022-05-22 op hdr->len, hdr->type, hdr->tag);
568 182b48dc 2022-05-22 op client_send_listener(IMSG_CLOSE, NULL, 0);
569 182b48dc 2022-05-22 op client_shutdown();
573 fb1a36c0 2022-01-09 op np_write16(struct evbuffer *e, uint16_t x)
575 fb1a36c0 2022-01-09 op x = htole16(x);
576 fb1a36c0 2022-01-09 op evbuffer_add(e, &x, sizeof(x));
580 fb1a36c0 2022-01-09 op np_write32(struct evbuffer *e, uint32_t x)
582 fb1a36c0 2022-01-09 op x = htole32(x);
583 fb1a36c0 2022-01-09 op evbuffer_add(e, &x, sizeof(x));
587 fb1a36c0 2022-01-09 op np_write64(struct evbuffer *e, uint64_t x)
589 fb1a36c0 2022-01-09 op x = htole64(x);
590 fb1a36c0 2022-01-09 op evbuffer_add(e, &x, sizeof(x));
594 fb1a36c0 2022-01-09 op np_writebuf(struct evbuffer *e, size_t len, void *data)
596 fb1a36c0 2022-01-09 op evbuffer_add(e, data, len);
600 fb1a36c0 2022-01-09 op np_header(uint32_t len, uint8_t type, uint16_t tag)
602 fb1a36c0 2022-01-09 op len += HEADERSIZE;
604 fb1a36c0 2022-01-09 op len = htole32(len);
605 fb1a36c0 2022-01-09 op tag = htole16(tag);
607 fb1a36c0 2022-01-09 op evbuffer_add(evb, &len, sizeof(len));
608 fb1a36c0 2022-01-09 op evbuffer_add(evb, &type, sizeof(type));
609 fb1a36c0 2022-01-09 op evbuffer_add(evb, &tag, sizeof(tag));
613 fb1a36c0 2022-01-09 op np_string(struct evbuffer *e, uint16_t len, const char *str)
615 fb1a36c0 2022-01-09 op uint16_t l = len;
617 fb1a36c0 2022-01-09 op len = htole16(len);
618 fb1a36c0 2022-01-09 op evbuffer_add(e, &len, sizeof(len));
619 fb1a36c0 2022-01-09 op evbuffer_add(e, str, l);
623 fb1a36c0 2022-01-09 op np_qid(struct evbuffer *e, struct qid *qid)
625 fb1a36c0 2022-01-09 op uint64_t path;
626 fb1a36c0 2022-01-09 op uint32_t vers;
628 fb1a36c0 2022-01-09 op path = htole64(qid->path);
629 fb1a36c0 2022-01-09 op vers = htole32(qid->vers);
631 fb1a36c0 2022-01-09 op evbuffer_add(e, &qid->type, sizeof(qid->type));
632 fb1a36c0 2022-01-09 op evbuffer_add(e, &vers, sizeof(vers));
633 fb1a36c0 2022-01-09 op evbuffer_add(e, &path, sizeof(path));
637 fb1a36c0 2022-01-09 op do_send(void)
640 66926cfc 2022-05-23 op uint8_t *data;
642 fb1a36c0 2022-01-09 op len = EVBUFFER_LENGTH(evb);
643 fb1a36c0 2022-01-09 op data = EVBUFFER_DATA(evb);
645 fb1a36c0 2022-01-09 op #if DEBUG_PACKETS
646 fb1a36c0 2022-01-09 op hexdump("outgoing packet", data, len);
649 66926cfc 2022-05-23 op while (len > IMSG_MAXSIZE) {
650 66926cfc 2022-05-23 op client_send_listener(IMSG_BUF, data, IMSG_MAXSIZE);
651 66926cfc 2022-05-23 op evbuffer_drain(evb, IMSG_MAXSIZE);
652 66926cfc 2022-05-23 op len -= IMSG_MAXSIZE;
653 66926cfc 2022-05-23 op data += IMSG_MAXSIZE;
656 66926cfc 2022-05-23 op if (len != 0) {
657 66926cfc 2022-05-23 op client_send_listener(IMSG_BUF, data, len);
658 66926cfc 2022-05-23 op evbuffer_drain(evb, len);
663 fb1a36c0 2022-01-09 op np_version(uint16_t tag, uint32_t msize, const char *version)
667 fb1a36c0 2022-01-09 op l = strlen(version);
669 fb1a36c0 2022-01-09 op msize = htole32(msize);
671 fb1a36c0 2022-01-09 op np_header(sizeof(msize) + sizeof(l) + l, Rversion, tag);
672 fb1a36c0 2022-01-09 op evbuffer_add(evb, &msize, sizeof(msize));
673 fb1a36c0 2022-01-09 op np_string(evb, l, version);
678 fb1a36c0 2022-01-09 op np_attach(uint16_t tag, struct qid *qid)
680 fb1a36c0 2022-01-09 op np_header(QIDSIZE, Rattach, tag);
681 fb1a36c0 2022-01-09 op np_qid(evb, qid);
686 fb1a36c0 2022-01-09 op np_clunk(uint16_t tag)
688 fb1a36c0 2022-01-09 op np_header(0, Rclunk, tag);
693 fb1a36c0 2022-01-09 op np_flush(uint16_t tag)
695 fb1a36c0 2022-01-09 op np_header(0, Rflush, tag);
700 fb1a36c0 2022-01-09 op np_walk(uint16_t tag, int nwqid, struct qid *wqid)
704 fb1a36c0 2022-01-09 op /* two bytes for the counter */
705 fb1a36c0 2022-01-09 op np_header(2 + QIDSIZE * nwqid, Rwalk, tag);
706 fb1a36c0 2022-01-09 op np_write16(evb, nwqid);
707 fb1a36c0 2022-01-09 op for (i = 0; i < nwqid; ++i)
708 fb1a36c0 2022-01-09 op np_qid(evb, wqid + i);
714 fb1a36c0 2022-01-09 op np_open(uint16_t tag, struct qid *qid, uint32_t iounit)
716 fb1a36c0 2022-01-09 op np_header(QIDSIZE + sizeof(iounit), Ropen, tag);
717 fb1a36c0 2022-01-09 op np_qid(evb, qid);
718 fb1a36c0 2022-01-09 op np_write32(evb, iounit);
723 fb1a36c0 2022-01-09 op np_create(uint16_t tag, struct qid *qid, uint32_t iounit)
725 fb1a36c0 2022-01-09 op np_header(QIDSIZE + sizeof(iounit), Rcreate, tag);
726 fb1a36c0 2022-01-09 op np_qid(evb, qid);
727 fb1a36c0 2022-01-09 op np_write32(evb, iounit);
732 fb1a36c0 2022-01-09 op np_read(uint16_t tag, uint32_t count, void *data)
734 23fbe390 2022-05-23 op if (sizeof(count) + count + HEADERSIZE > msize) {
735 fb1a36c0 2022-01-09 op np_error(tag, "Rread would overflow");
739 fb1a36c0 2022-01-09 op np_header(sizeof(count) + count, Rread, tag);
740 fb1a36c0 2022-01-09 op np_write32(evb, count);
741 fb1a36c0 2022-01-09 op np_writebuf(evb, count, data);
746 fb1a36c0 2022-01-09 op np_write(uint16_t tag, uint32_t count)
748 fb1a36c0 2022-01-09 op np_header(sizeof(count), Rwrite, tag);
749 fb1a36c0 2022-01-09 op np_write32(evb, count);
754 70540bb5 2022-02-02 op np_stat(uint16_t tag, uint16_t count, void *data)
756 fb1a36c0 2022-01-09 op if (sizeof(count) + count + HEADERSIZE >= msize) {
757 fb1a36c0 2022-01-09 op np_error(tag, "Rstat would overflow");
761 70540bb5 2022-02-02 op np_header(sizeof(count) + count, Rstat, tag);
762 70540bb5 2022-02-02 op np_write16(evb, count);
763 fb1a36c0 2022-01-09 op np_writebuf(evb, count, data);
768 755d75bf 2022-01-17 op np_wstat(uint16_t tag)
770 755d75bf 2022-01-17 op np_header(0, Rwstat, tag);
775 fb1a36c0 2022-01-09 op np_remove(uint16_t tag)
777 fb1a36c0 2022-01-09 op np_header(0, Rremove, tag);
782 fb1a36c0 2022-01-09 op np_error(uint16_t tag, const char *errstr)
786 fb1a36c0 2022-01-09 op l = strlen(errstr);
788 fb1a36c0 2022-01-09 op np_header(sizeof(l) + l, Rerror, tag);
789 fb1a36c0 2022-01-09 op np_string(evb, l, errstr);
794 fb1a36c0 2022-01-09 op np_errno(uint16_t tag)
796 fb1a36c0 2022-01-09 op int saved_errno;
797 fb1a36c0 2022-01-09 op char buf[NL_TEXTMAX] = {0};
799 fb1a36c0 2022-01-09 op saved_errno = errno;
801 fb1a36c0 2022-01-09 op strerror_r(errno, buf, sizeof(buf));
802 fb1a36c0 2022-01-09 op np_error(tag, buf);
804 fb1a36c0 2022-01-09 op errno = saved_errno;
808 fb1a36c0 2022-01-09 op np_read8(const char *t, const char *f, uint8_t *dst, const uint8_t **src,
811 fb1a36c0 2022-01-09 op if (*len < sizeof(*dst)) {
812 fb1a36c0 2022-01-09 op log_warnx("%s: wanted %zu bytes for the %s field but only "
813 fb1a36c0 2022-01-09 op "%zu are available.", t, sizeof(*dst), f, *len);
817 fb1a36c0 2022-01-09 op memcpy(dst, *src, sizeof(*dst));
818 fb1a36c0 2022-01-09 op *src += sizeof(*dst);
819 fb1a36c0 2022-01-09 op *len -= sizeof(*dst);
825 fb1a36c0 2022-01-09 op np_read16(const char *t, const char *f, uint16_t *dst, const uint8_t **src,
828 fb1a36c0 2022-01-09 op if (*len < sizeof(*dst)) {
829 fb1a36c0 2022-01-09 op log_warnx("%s: wanted %zu bytes for the %s field but only "
830 fb1a36c0 2022-01-09 op "%zu are available.", t, sizeof(*dst), f, *len);
834 fb1a36c0 2022-01-09 op memcpy(dst, *src, sizeof(*dst));
835 fb1a36c0 2022-01-09 op *src += sizeof(*dst);
836 fb1a36c0 2022-01-09 op *len -= sizeof(*dst);
837 fb1a36c0 2022-01-09 op *dst = le16toh(*dst);
843 fb1a36c0 2022-01-09 op np_read32(const char *t, const char *f, uint32_t *dst, const uint8_t **src,
846 fb1a36c0 2022-01-09 op if (*len < sizeof(*dst)) {
847 fb1a36c0 2022-01-09 op log_warnx("%s: wanted %zu bytes for the %s field but only "
848 fb1a36c0 2022-01-09 op "%zu are available.", t, sizeof(*dst), f, *len);
852 fb1a36c0 2022-01-09 op memcpy(dst, *src, sizeof(*dst));
853 fb1a36c0 2022-01-09 op *src += sizeof(*dst);
854 fb1a36c0 2022-01-09 op *len -= sizeof(*dst);
855 fb1a36c0 2022-01-09 op *dst = le32toh(*dst);
861 fb1a36c0 2022-01-09 op np_read64(const char *t, const char *f, uint64_t *dst, const uint8_t **src,
864 fb1a36c0 2022-01-09 op if (*len < sizeof(*dst)) {
865 fb1a36c0 2022-01-09 op log_warnx("%s: wanted %zu bytes for the %s field but only "
866 fb1a36c0 2022-01-09 op "%zu are available.", t, sizeof(*dst), f, *len);
870 fb1a36c0 2022-01-09 op memcpy(dst, *src, sizeof(*dst));
871 fb1a36c0 2022-01-09 op *src += sizeof(*dst);
872 fb1a36c0 2022-01-09 op *len -= sizeof(*dst);
873 fb1a36c0 2022-01-09 op *dst = le64toh(*dst);
879 fb1a36c0 2022-01-09 op np_readstr(const char *t, const char *f, char *res, size_t reslen,
880 fb1a36c0 2022-01-09 op const uint8_t **src, size_t *len)
883 fb1a36c0 2022-01-09 op char buf[32];
885 fb1a36c0 2022-01-09 op strlcpy(buf, f, sizeof(buf));
886 fb1a36c0 2022-01-09 op strlcat(buf, "-len", sizeof(buf));
888 fb1a36c0 2022-01-09 op if (!np_read16(t, buf, &sl, src, len))
889 fb1a36c0 2022-01-09 op return READSTRERR;
891 fb1a36c0 2022-01-09 op if (*len < sl) {
892 fb1a36c0 2022-01-09 op log_warnx("%s: wanted %d bytes for the %s field but only "
893 fb1a36c0 2022-01-09 op "%zu are available.", t, sl, f, *len);
894 fb1a36c0 2022-01-09 op return READSTRERR;
897 fb1a36c0 2022-01-09 op if (*len > reslen-1)
898 fb1a36c0 2022-01-09 op return READSTRTRUNC;
900 fb1a36c0 2022-01-09 op memcpy(res, *src, sl);
901 fb1a36c0 2022-01-09 op res[sl] = '\0';
909 755d75bf 2022-01-17 op np_readst(const char *t, const char *f, struct np_stat *st,
910 755d75bf 2022-01-17 op char *name, size_t namelen, const uint8_t **src, size_t *len)
912 755d75bf 2022-01-17 op memset(st, 0, sizeof(*st));
914 4e7aba8f 2022-02-02 op /* len is sent twice! */
915 4e7aba8f 2022-02-02 op if (!np_read16(t, "stat len", &st->size, src, len) ||
916 4e7aba8f 2022-02-02 op !np_read16(t, "stat.size", &st->size, src, len) ||
917 9029ac6f 2022-01-19 op !np_read16(t, "stat.type", &st->type, src, len) ||
918 755d75bf 2022-01-17 op !np_read32(t, "stat.dev", &st->dev, src, len) ||
919 755d75bf 2022-01-17 op !np_read64(t, "stat.qid.path", &st->qid.path, src, len) ||
920 755d75bf 2022-01-17 op !np_read32(t, "stat.qid.vers", &st->qid.vers, src, len) ||
921 755d75bf 2022-01-17 op !np_read8(t, "stat.qid.type", &st->qid.type, src, len) ||
922 755d75bf 2022-01-17 op !np_read32(t, "stat.mode", &st->mode, src, len) ||
923 755d75bf 2022-01-17 op !np_read32(t, "stat.atime", &st->atime, src, len) ||
924 755d75bf 2022-01-17 op !np_read32(t, "stat.mtime", &st->mtime, src, len) ||
925 755d75bf 2022-01-17 op !np_read64(t, "stat.length", &st->length, src, len))
926 755d75bf 2022-01-17 op return READSTRERR;
929 755d75bf 2022-01-17 op * ignore everything but the name, we don't support
930 755d75bf 2022-01-17 op * changing those fields anyway
932 755d75bf 2022-01-17 op st->name = name;
933 755d75bf 2022-01-17 op return np_readstr(t, "stat.name", name, namelen, src, len);
937 fb1a36c0 2022-01-09 op tversion(struct np_msg_header *hdr, const uint8_t *data, size_t len)
939 fb1a36c0 2022-01-09 op char *dot, version[32];
941 fb1a36c0 2022-01-09 op if (handshaked)
944 fb1a36c0 2022-01-09 op /* msize[4] version[s] */
945 fb1a36c0 2022-01-09 op if (!NPREAD32("msize", &msize, &data, &len))
948 fb1a36c0 2022-01-09 op switch (NPREADSTR("version", version, sizeof(version), &data, &len)) {
949 fb1a36c0 2022-01-09 op case READSTRERR:
951 fb1a36c0 2022-01-09 op case READSTRTRUNC:
952 fb1a36c0 2022-01-09 op log_warnx("9P version string too long, truncated");
953 6be59daa 2022-05-22 op np_version(hdr->tag, MSIZE9P, "unknown");
957 bcdb46a7 2022-01-19 op if (len != 0)
960 fb1a36c0 2022-01-09 op if ((dot = strchr(version, '.')) != NULL)
963 6be59daa 2022-05-22 op if (strcmp(version, VERSION9P) != 0) {
964 6be59daa 2022-05-22 op log_warnx("unknown 9P version \"%s\"; want "VERSION9P,
966 6be59daa 2022-05-22 op np_version(hdr->tag, MSIZE9P, "unknown");
970 6be59daa 2022-05-22 op if (msize < MIN_MSIZE) {
971 6be59daa 2022-05-22 op log_warnx("msize too small: %"PRIu32"; want %d at least",
972 6be59daa 2022-05-22 op msize, MIN_MSIZE);
973 6be59daa 2022-05-22 op np_version(hdr->tag, MSIZE9P, "unknown");
977 fb1a36c0 2022-01-09 op /* version matched */
978 fb1a36c0 2022-01-09 op handshaked = 1;
979 8b0a5062 2022-05-22 op msize = MIN(msize, MSIZE9P);
980 fb1a36c0 2022-01-09 op client_send_listener(IMSG_MSIZE, &msize, sizeof(msize));
981 fb1a36c0 2022-01-09 op np_version(hdr->tag, msize, VERSION9P);
985 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
986 fb1a36c0 2022-01-09 op client_shutdown();
990 fb1a36c0 2022-01-09 op tattach(struct np_msg_header *hdr, const uint8_t *data, size_t len)
992 fb1a36c0 2022-01-09 op struct dir *dir;
993 fb1a36c0 2022-01-09 op struct fid *f;
994 fb1a36c0 2022-01-09 op uint32_t fid, afid;
996 fb1a36c0 2022-01-09 op char aname[PATH_MAX];
998 fb1a36c0 2022-01-09 op /* fid[4] afid[4] uname[s] aname[s] */
1000 fb1a36c0 2022-01-09 op if (!NPREAD32("fid", &fid, &data, &len) ||
1001 fb1a36c0 2022-01-09 op !NPREAD32("afid", &afid, &data, &len))
1004 fb1a36c0 2022-01-09 op /* read the uname but don't actually use it */
1005 fb1a36c0 2022-01-09 op switch (NPREADSTR("uname", aname, sizeof(aname), &data, &len)) {
1006 fb1a36c0 2022-01-09 op case READSTRERR:
1008 fb1a36c0 2022-01-09 op case READSTRTRUNC:
1009 fb1a36c0 2022-01-09 op np_error(hdr->tag, "name too long");
1013 fb1a36c0 2022-01-09 op switch (NPREADSTR("aname", aname, sizeof(aname), &data, &len)) {
1014 fb1a36c0 2022-01-09 op case READSTRERR:
1016 fb1a36c0 2022-01-09 op case READSTRTRUNC:
1017 fb1a36c0 2022-01-09 op np_error(hdr->tag, "name too long");
1021 73df5ca2 2022-02-02 op if (*aname == '\0')
1022 73df5ca2 2022-02-02 op strlcpy(aname, "/", sizeof(aname));
1024 bcdb46a7 2022-01-19 op if (len != 0)
1027 fb1a36c0 2022-01-09 op if (fid_by_id(fid) != NULL || afid != NOFID) {
1028 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid or afid");
1032 fb1a36c0 2022-01-09 op if ((fd = open(aname, O_RDONLY|O_DIRECTORY)) == -1)
1035 fb1a36c0 2022-01-09 op if ((dir = new_dir(fd)) == NULL)
1038 fb1a36c0 2022-01-09 op log_debug("attached %s to %d", aname, fid);
1040 fb1a36c0 2022-01-09 op if ((f = new_fid(dir, fid, aname, NULL)) == NULL) {
1041 fb1a36c0 2022-01-09 op dir_decref(dir);
1045 fb1a36c0 2022-01-09 op np_attach(hdr->tag, &f->qid);
1049 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1050 fb1a36c0 2022-01-09 op log_warn("failed to attach %s", aname);
1054 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1055 fb1a36c0 2022-01-09 op client_shutdown();
1059 fb1a36c0 2022-01-09 op tclunk(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1061 fb1a36c0 2022-01-09 op struct fid *f;
1062 fb1a36c0 2022-01-09 op uint32_t fid;
1064 fb1a36c0 2022-01-09 op /* fid[4] */
1065 bcdb46a7 2022-01-19 op if (!NPREAD32("fid", &fid, &data, &len) ||
1067 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1068 fb1a36c0 2022-01-09 op client_shutdown();
1072 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL) {
1073 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1077 fb1a36c0 2022-01-09 op free_fid(f);
1078 fb1a36c0 2022-01-09 op np_clunk(hdr->tag);
1082 fb1a36c0 2022-01-09 op tflush(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1084 fb1a36c0 2022-01-09 op uint16_t oldtag;
1087 fb1a36c0 2022-01-09 op * We're doing only synchronous I/O. Tflush is implemented
1088 fb1a36c0 2022-01-09 op * only because it's illegal to reply with a Rerror.
1091 fb1a36c0 2022-01-09 op /* oldtag[2] */
1092 fb1a36c0 2022-01-09 op if (len != sizeof(oldtag)) {
1093 fb1a36c0 2022-01-09 op log_warnx("Tflush with the wrong size: got %zu want %zu",
1094 fb1a36c0 2022-01-09 op len, sizeof(oldtag));
1095 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1096 fb1a36c0 2022-01-09 op client_shutdown();
1100 fb1a36c0 2022-01-09 op np_flush(hdr->tag);
1104 fb1a36c0 2022-01-09 op twalk(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1106 fb1a36c0 2022-01-09 op struct stat sb;
1107 fb1a36c0 2022-01-09 op struct dir *dir;
1108 fb1a36c0 2022-01-09 op struct qid wqid[MAXWELEM] = {0};
1109 fb1a36c0 2022-01-09 op struct fid *f, *nf;
1110 fb1a36c0 2022-01-09 op uint32_t fid, newfid;
1111 fb1a36c0 2022-01-09 op uint16_t nwname;
1112 fb1a36c0 2022-01-09 op int fd, oldfd, no, nwqid = 0;
1113 fb1a36c0 2022-01-09 op char wnam[PATH_MAX];
1115 fb1a36c0 2022-01-09 op if (!NPREAD32("fid", &fid, &data, &len) ||
1116 fb1a36c0 2022-01-09 op !NPREAD32("newfid", &newfid, &data, &len) ||
1117 fb1a36c0 2022-01-09 op !NPREAD16("nwname", &nwname, &data, &len))
1120 fb1a36c0 2022-01-09 op if (nwname > MAXWELEM) {
1121 fb1a36c0 2022-01-09 op log_warnx("Twalk: more than %d path elements: %d",
1122 fb1a36c0 2022-01-09 op MAXWELEM, nwname);
1126 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL) {
1127 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1131 fb1a36c0 2022-01-09 op if (f->fd != -1) {
1132 fb1a36c0 2022-01-09 op np_error(hdr->tag, "fid already opened for I/O");
1136 fb1a36c0 2022-01-09 op if (fid == newfid)
1138 fb1a36c0 2022-01-09 op else if ((nf = fid_by_id(newfid)) != NULL) {
1139 fb1a36c0 2022-01-09 op np_error(hdr->tag, "newfid already in use");
1144 fb1a36c0 2022-01-09 op /* special case: fid duplication */
1145 fb1a36c0 2022-01-09 op if (nwname == 0) {
1147 fb1a36c0 2022-01-09 op * TODO: should we forbid fids duplication when fid ==
1150 fb1a36c0 2022-01-09 op if (nf == NULL &&
1151 543fc013 2022-01-17 op (nf = new_fid(f->dir, newfid, f->fname, &f->qid)) == NULL)
1152 fb1a36c0 2022-01-09 op fatal("new_fid duplication");
1154 fb1a36c0 2022-01-09 op np_walk(hdr->tag, 0, NULL);
1158 fb1a36c0 2022-01-09 op if (!(f->qid.type & QTDIR)) {
1159 fb1a36c0 2022-01-09 op np_error(hdr->tag, "fid doesn't represent a directory");
1163 fb1a36c0 2022-01-09 op oldfd = f->dir->fd;
1165 fb1a36c0 2022-01-09 op for (nwqid = 0; nwqid < nwname; nwqid++) {
1166 fb1a36c0 2022-01-09 op switch (NPREADSTR("wname", wnam, sizeof(wnam), &data, &len)) {
1167 fb1a36c0 2022-01-09 op case READSTRERR:
1169 fb1a36c0 2022-01-09 op case READSTRTRUNC:
1170 fb1a36c0 2022-01-09 op np_error(hdr->tag, "wname too long");
1174 fb1a36c0 2022-01-09 op if (*wnam == '\0' ||
1175 fb1a36c0 2022-01-09 op strchr(wnam, '/') != NULL ||
1176 fb1a36c0 2022-01-09 op !strcmp(wnam, ".")) {
1177 fb1a36c0 2022-01-09 op errno = EINVAL;
1178 fb1a36c0 2022-01-09 op goto cantopen;
1181 fb1a36c0 2022-01-09 op if ((fd = openat(oldfd, wnam, O_RDONLY|O_DIRECTORY)) == -1 &&
1182 fb1a36c0 2022-01-09 op errno != ENOTDIR)
1183 fb1a36c0 2022-01-09 op goto cantopen;
1185 fb1a36c0 2022-01-09 op if ((fd == -1 && fstatat(oldfd, wnam, &sb, 0) == -1) ||
1186 fb1a36c0 2022-01-09 op (fd != -1 && fstat(fd, &sb) == -1))
1187 fb1a36c0 2022-01-09 op goto cantopen;
1189 fb1a36c0 2022-01-09 op qid_update_from_sb(&wqid[nwqid], &sb);
1191 fb1a36c0 2022-01-09 op /* reached a file but we still have other components */
1192 fb1a36c0 2022-01-09 op if (fd == -1 && nwqid+1 < nwname)
1193 fb1a36c0 2022-01-09 op goto cantopen;
1195 fb1a36c0 2022-01-09 op /* reached the end and found a file */
1196 fb1a36c0 2022-01-09 op if (fd == -1 && nwqid+1 == nwname)
1199 fb1a36c0 2022-01-09 op if (oldfd != f->dir->fd)
1200 fb1a36c0 2022-01-09 op close(oldfd);
1204 bcdb46a7 2022-01-19 op if (len != 0)
1208 fb1a36c0 2022-01-09 op * If fd is -1 we've reached a file, otherwise we've just
1209 fb1a36c0 2022-01-09 op * reached another directory. We must pay attention to what
1210 fb1a36c0 2022-01-09 op * file descriptor we use to create the dir, because if we've
1211 fb1a36c0 2022-01-09 op * reached a file and oldfd is f->dir->fd then we *must* share
1212 fb1a36c0 2022-01-09 op * the same dir (it was a walk of one path from a directory to a
1213 fb1a36c0 2022-01-09 op * file, otherwise fun is bound to happen as soon as the client
1214 fb1a36c0 2022-01-09 op * closes the fid for the directory but keeps the one for the
1217 fb1a36c0 2022-01-09 op if (fd == -1 && oldfd == f->dir->fd)
1218 fb1a36c0 2022-01-09 op dir = f->dir;
1219 fb1a36c0 2022-01-09 op else if (fd == -1)
1220 fb1a36c0 2022-01-09 op dir = new_dir(oldfd);
1222 fb1a36c0 2022-01-09 op dir = new_dir(fd);
1224 fb1a36c0 2022-01-09 op if (dir == NULL)
1225 fb1a36c0 2022-01-09 op fatal("new_dir");
1227 fb1a36c0 2022-01-09 op if (nf == NULL) {
1228 fb1a36c0 2022-01-09 op if ((nf = new_fid(dir, newfid, wnam, &wqid[nwqid-1])) == NULL)
1229 fb1a36c0 2022-01-09 op fatal("new fid");
1231 fb1a36c0 2022-01-09 op /* update the dir */
1232 fb1a36c0 2022-01-09 op dir_decref(nf->dir);
1233 fb1a36c0 2022-01-09 op nf->dir = dir_incref(dir);
1236 fb1a36c0 2022-01-09 op np_walk(hdr->tag, nwqid, wqid);
1240 fb1a36c0 2022-01-09 op if (oldfd != f->dir->fd)
1241 fb1a36c0 2022-01-09 op close(oldfd);
1243 fb1a36c0 2022-01-09 op if (nwqid == 0)
1244 fb1a36c0 2022-01-09 op np_error(hdr->tag, strerror(no));
1246 fb1a36c0 2022-01-09 op np_walk(hdr->tag, nwqid, wqid);
1250 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1251 fb1a36c0 2022-01-09 op client_shutdown();
1254 fb1a36c0 2022-01-09 op static inline int
1255 fb1a36c0 2022-01-09 op npmode_to_unix(uint8_t mode, int *flags)
1257 fb1a36c0 2022-01-09 op switch (mode & 0x0F) {
1258 fb1a36c0 2022-01-09 op case KOREAD:
1259 fb1a36c0 2022-01-09 op *flags = O_RDONLY;
1261 fb1a36c0 2022-01-09 op case KOWRITE:
1262 fb1a36c0 2022-01-09 op *flags = O_WRONLY;
1264 fb1a36c0 2022-01-09 op case KORDWR:
1265 fb1a36c0 2022-01-09 op *flags = O_RDWR;
1267 fb1a36c0 2022-01-09 op case KOEXEC:
1268 fb1a36c0 2022-01-09 op log_warnx("tried to open something with KOEXEC");
1269 fb1a36c0 2022-01-09 op /* fallthrough */
1274 fb1a36c0 2022-01-09 op if (mode & KOTRUNC)
1275 fb1a36c0 2022-01-09 op *flags |= O_TRUNC;
1276 fb1a36c0 2022-01-09 op if (mode & KORCLOSE)
1277 fb1a36c0 2022-01-09 op *flags |= O_CLOEXEC;
1283 fb1a36c0 2022-01-09 op topen(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1285 fb1a36c0 2022-01-09 op struct stat sb;
1286 fb1a36c0 2022-01-09 op struct qid qid;
1287 fb1a36c0 2022-01-09 op struct fid *f;
1288 fb1a36c0 2022-01-09 op uint32_t fid;
1289 fb1a36c0 2022-01-09 op uint8_t mode;
1290 fb1a36c0 2022-01-09 op const char *path;
1292 fb1a36c0 2022-01-09 op /* fid[4] mode[1] */
1293 fb1a36c0 2022-01-09 op if (!NPREAD32("fid", &fid, &data, &len) ||
1294 bcdb46a7 2022-01-19 op !NPREAD8("mode", &mode, &data, &len) ||
1296 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1297 fb1a36c0 2022-01-09 op client_shutdown();
1301 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL || f->fd != -1) {
1302 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1306 fb1a36c0 2022-01-09 op if (npmode_to_unix(mode, &f->iomode) == -1) {
1307 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid mode");
1311 543fc013 2022-01-17 op path = f->fname;
1312 fb1a36c0 2022-01-09 op if (f->qid.type & QTDIR)
1315 fb1a36c0 2022-01-09 op if ((f->fd = openat(f->dir->fd, path, f->iomode)) == -1) {
1316 fb1a36c0 2022-01-09 op np_error(hdr->tag, strerror(errno));
1320 fb1a36c0 2022-01-09 op if (fstat(f->fd, &sb) == -1)
1321 fb1a36c0 2022-01-09 op fatal("fstat");
1323 fb1a36c0 2022-01-09 op if (S_ISDIR(sb.st_mode)) {
1324 fb1a36c0 2022-01-09 op if ((f->d = fdopendir(f->fd)) == NULL) {
1325 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1326 fb1a36c0 2022-01-09 op close(f->fd);
1331 fb1a36c0 2022-01-09 op if ((f->evb = evbuffer_new()) == NULL) {
1332 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1333 fb1a36c0 2022-01-09 op closedir(f->d);
1334 fb1a36c0 2022-01-09 op f->d = NULL;
1339 fb1a36c0 2022-01-09 op f->offset = 0;
1341 fb1a36c0 2022-01-09 op qid_update_from_sb(&qid, &sb);
1342 fb1a36c0 2022-01-09 op np_open(hdr->tag, &qid, sb.st_blksize);
1346 fb1a36c0 2022-01-09 op tcreate(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1348 fb1a36c0 2022-01-09 op struct stat sb;
1349 fb1a36c0 2022-01-09 op struct qid qid;
1350 fb1a36c0 2022-01-09 op struct fid *f;
1351 fb1a36c0 2022-01-09 op uint32_t fid, perm;
1352 fb1a36c0 2022-01-09 op uint8_t mode;
1353 fb1a36c0 2022-01-09 op char name[PATH_MAX];
1355 fb1a36c0 2022-01-09 op /* fid[4] name[s] perm[4] mode[1] */
1356 fb1a36c0 2022-01-09 op if (!NPREAD32("fid", &fid, &data, &len))
1358 fb1a36c0 2022-01-09 op switch (NPREADSTR("name", name, sizeof(name), &data, &len)) {
1359 fb1a36c0 2022-01-09 op case READSTRERR:
1361 fb1a36c0 2022-01-09 op case READSTRTRUNC:
1362 fb1a36c0 2022-01-09 op np_error(hdr->tag, "name too long");
1365 fb1a36c0 2022-01-09 op if (!NPREAD32("perm", &perm, &data, &len) ||
1366 bcdb46a7 2022-01-19 op !NPREAD8("mode", &mode, &data, &len) ||
1370 fb1a36c0 2022-01-09 op if (!strcmp(name, ".") || !strcmp(name, "..") ||
1371 fb1a36c0 2022-01-09 op strchr(name, '/') != NULL) {
1372 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid name");
1376 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL || f->fd != -1) {
1377 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1381 fb1a36c0 2022-01-09 op if (!(f->qid.type & QTDIR)) {
1382 fb1a36c0 2022-01-09 op np_error(hdr->tag, "fid doesn't identify a directory");
1386 fb1a36c0 2022-01-09 op if (npmode_to_unix(mode, &f->iomode) == -1) {
1387 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid mode");
1391 fb1a36c0 2022-01-09 op if (f->iomode & O_RDONLY) {
1392 fb1a36c0 2022-01-09 op np_error(hdr->tag, "can't create a read-only file");
1396 fb1a36c0 2022-01-09 op /* TODO: parse the mode */
1398 fb1a36c0 2022-01-09 op if (perm & 0x80000000) {
1399 fb1a36c0 2022-01-09 op /* create a directory */
1400 fb1a36c0 2022-01-09 op f->fd = mkdirat(f->dir->fd, name, 0755);
1402 fb1a36c0 2022-01-09 op /* create a file */
1403 fb1a36c0 2022-01-09 op f->fd = openat(f->dir->fd, name, f->iomode | O_CREAT | O_TRUNC,
1407 fb1a36c0 2022-01-09 op if (f->fd == -1) {
1408 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1412 fb1a36c0 2022-01-09 op if (fstat(f->fd, &sb) == -1)
1413 fb1a36c0 2022-01-09 op fatal("fstat");
1415 fb1a36c0 2022-01-09 op if (S_ISDIR(sb.st_mode)) {
1416 fb1a36c0 2022-01-09 op if ((f->d = fdopendir(f->fd)) == NULL) {
1417 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1418 fb1a36c0 2022-01-09 op close(f->fd);
1423 fb1a36c0 2022-01-09 op if ((f->evb = evbuffer_new()) == NULL) {
1424 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1425 fb1a36c0 2022-01-09 op closedir(f->d);
1426 fb1a36c0 2022-01-09 op f->d = NULL;
1431 fb1a36c0 2022-01-09 op f->offset = 0;
1433 fb1a36c0 2022-01-09 op qid_update_from_sb(&qid, &sb);
1434 fb1a36c0 2022-01-09 op np_create(hdr->tag, &qid, sb.st_blksize);
1439 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1440 fb1a36c0 2022-01-09 op client_shutdown();
1443 91f48e25 2022-02-02 op static inline int
1444 fb1a36c0 2022-01-09 op serialize_stat(const char *fname, struct stat *sb, struct evbuffer *evb)
1446 fb1a36c0 2022-01-09 op struct qid qid;
1447 fb1a36c0 2022-01-09 op const char *uid, *gid, *muid;
1449 bee0a9e3 2022-02-02 op uint32_t mode;
1450 fb1a36c0 2022-01-09 op uint16_t namlen, uidlen, gidlen, ulen;
1452 fb1a36c0 2022-01-09 op qid_update_from_sb(&qid, sb);
1454 fb1a36c0 2022-01-09 op /* TODO: fill these fields */
1459 fb1a36c0 2022-01-09 op namlen = strlen(fname);
1460 fb1a36c0 2022-01-09 op uidlen = strlen(uid);
1461 fb1a36c0 2022-01-09 op gidlen = strlen(gid);
1462 fb1a36c0 2022-01-09 op ulen = strlen(muid);
1464 fb1a36c0 2022-01-09 op tot = NPSTATSIZ(namlen, uidlen, gidlen, ulen);
1465 91f48e25 2022-02-02 op if (tot > UINT16_MAX) {
1466 fb1a36c0 2022-01-09 op log_warnx("stat info for dir entry %s would overflow",
1471 bee0a9e3 2022-02-02 op mode = sb->st_mode & 0xFFFF;
1472 bee0a9e3 2022-02-02 op if (qid.type & QTDIR)
1473 bee0a9e3 2022-02-02 op mode |= 0x80000000;
1475 fb1a36c0 2022-01-09 op np_write16(evb, tot); /* size[2] */
1476 fb1a36c0 2022-01-09 op np_write16(evb, sb->st_rdev); /* type[2] */
1477 fb1a36c0 2022-01-09 op np_write32(evb, sb->st_dev); /* dev[4] */
1478 fb1a36c0 2022-01-09 op np_qid(evb, &qid); /* qid[13] */
1479 bee0a9e3 2022-02-02 op np_write32(evb, mode); /* mode[4] */
1480 fb1a36c0 2022-01-09 op np_write32(evb, sb->st_atim.tv_sec); /* atime[4] */
1481 fb1a36c0 2022-01-09 op np_write32(evb, sb->st_mtim.tv_sec); /* mtime[4] */
1483 68a7ef68 2022-01-16 op /* special case: directories have size 0 */
1484 68a7ef68 2022-01-16 op if (qid.type & QTDIR)
1485 68a7ef68 2022-01-16 op np_write64(evb, 0);
1487 68a7ef68 2022-01-16 op np_write64(evb, sb->st_size); /* length[8] */
1489 fb1a36c0 2022-01-09 op np_string(evb, namlen, fname); /* name[s] */
1490 fb1a36c0 2022-01-09 op np_string(evb, uidlen, uid); /* uid[s] */
1491 fb1a36c0 2022-01-09 op np_string(evb, gidlen, gid); /* gid[s] */
1492 fb1a36c0 2022-01-09 op np_string(evb, ulen, muid); /* muid[s] */
1498 fb1a36c0 2022-01-09 op tread(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1500 66926cfc 2022-05-23 op static char buf[MSIZE9P - HEADERSIZE - 4];
1501 fb1a36c0 2022-01-09 op struct fid *f;
1503 fb1a36c0 2022-01-09 op size_t howmuch;
1504 fb1a36c0 2022-01-09 op uint64_t off;
1505 fb1a36c0 2022-01-09 op uint32_t fid, count;
1507 fb1a36c0 2022-01-09 op /* fid[4] offset[8] count[4] */
1508 fb1a36c0 2022-01-09 op if (!NPREAD32("fid", &fid, &data, &len) ||
1509 fb1a36c0 2022-01-09 op !NPREAD64("offset", &off, &data, &len) ||
1510 bcdb46a7 2022-01-19 op !NPREAD32("count", &count, &data, &len) ||
1512 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1513 fb1a36c0 2022-01-09 op client_shutdown();
1517 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL || f->fd == -1) {
1518 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1522 fb1a36c0 2022-01-09 op if (TYPE_OVERFLOW(off_t, off)) {
1523 fb1a36c0 2022-01-09 op log_warnx("unexpected off_t size");
1524 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid offset");
1528 fb1a36c0 2022-01-09 op if (f->d == NULL) {
1529 fb1a36c0 2022-01-09 op /* read a file */
1530 fb1a36c0 2022-01-09 op howmuch = MIN(sizeof(buf), count);
1531 fb1a36c0 2022-01-09 op r = pread(f->fd, buf, howmuch, (off_t)off);
1532 fb1a36c0 2022-01-09 op if (r == -1)
1533 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1535 fb1a36c0 2022-01-09 op np_read(hdr->tag, r, buf);
1537 fb1a36c0 2022-01-09 op if (off == 0 && f->offset != 0) {
1538 fb1a36c0 2022-01-09 op rewinddir(f->d);
1539 fb1a36c0 2022-01-09 op f->offset = 0;
1540 fb1a36c0 2022-01-09 op evbuffer_drain(f->evb, EVBUFFER_LENGTH(f->evb));
1543 fb1a36c0 2022-01-09 op if (off != f->offset) {
1544 fb1a36c0 2022-01-09 op np_error(hdr->tag, "can't seek in directories");
1548 fb1a36c0 2022-01-09 op while (EVBUFFER_LENGTH(f->evb) < count) {
1549 fb1a36c0 2022-01-09 op struct dirent *d;
1550 fb1a36c0 2022-01-09 op struct stat sb;
1552 fb1a36c0 2022-01-09 op if ((d = readdir(f->d)) == NULL)
1554 ff6f19b1 2022-02-02 op if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, ".."))
1556 fb1a36c0 2022-01-09 op if (fstatat(f->fd, d->d_name, &sb, 0) == -1) {
1557 fb1a36c0 2022-01-09 op warn("fstatat");
1560 fb1a36c0 2022-01-09 op serialize_stat(d->d_name, &sb, f->evb);
1563 fb1a36c0 2022-01-09 op count = MIN(count, EVBUFFER_LENGTH(f->evb));
1564 fb1a36c0 2022-01-09 op np_read(hdr->tag, count, EVBUFFER_DATA(f->evb));
1565 fb1a36c0 2022-01-09 op evbuffer_drain(f->evb, count);
1567 fb1a36c0 2022-01-09 op f->offset += count;
1572 8b0a5062 2022-05-22 op twrite(struct np_msg_header *hdr, const uint8_t *data, size_t len,
1573 f9d8661b 2022-05-23 op struct fid **writefid, off_t *writepos, size_t *writetot,
1574 f9d8661b 2022-05-23 op size_t *writeleft, int *writeskip)
1576 fb1a36c0 2022-01-09 op struct fid *f;
1578 fb1a36c0 2022-01-09 op uint64_t off;
1579 fb1a36c0 2022-01-09 op uint32_t fid, count;
1581 fb1a36c0 2022-01-09 op /* fid[4] offset[8] count[4] data[count] */
1582 fb1a36c0 2022-01-09 op if (!NPREAD32("fid", &fid, &data, &len) ||
1583 fb1a36c0 2022-01-09 op !NPREAD64("off", &off, &data, &len) ||
1584 fb1a36c0 2022-01-09 op !NPREAD32("count", &count, &data, &len) ||
1585 8b0a5062 2022-05-22 op count < len) {
1586 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1587 fb1a36c0 2022-01-09 op client_shutdown();
1591 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL || f->fd == -1) {
1592 8b0a5062 2022-05-22 op *writeskip = 1;
1593 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1597 fb1a36c0 2022-01-09 op if (!(f->iomode & O_WRONLY) &&
1598 fb1a36c0 2022-01-09 op !(f->iomode & O_RDWR)) {
1599 8b0a5062 2022-05-22 op *writeskip = 1;
1600 fb1a36c0 2022-01-09 op np_error(hdr->tag, "fid not opened for writing");
1604 fb1a36c0 2022-01-09 op if (TYPE_OVERFLOW(off_t, off)) {
1605 8b0a5062 2022-05-22 op *writeskip = 1;
1606 fb1a36c0 2022-01-09 op log_warnx("unexpected off_t size");
1607 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid offset");
1611 8b0a5062 2022-05-22 op if ((r = pwrite(f->fd, data, len, off)) == -1) {
1612 8b0a5062 2022-05-22 op *writeskip = 1;
1613 8b0a5062 2022-05-22 op np_errno(hdr->tag);
1614 8b0a5062 2022-05-22 op } else if (count == len)
1615 fb1a36c0 2022-01-09 op np_write(hdr->tag, r);
1617 8b0a5062 2022-05-22 op /* account for a continuated write */
1618 8b0a5062 2022-05-22 op if (count > len) {
1619 8b0a5062 2022-05-22 op *writefid = f;
1620 8b0a5062 2022-05-22 op *writepos = off + len;
1621 f9d8661b 2022-05-23 op *writetot = len;
1622 8b0a5062 2022-05-22 op *writeleft = count - len;
1623 8b0a5062 2022-05-22 op *writeskip = 0;
1628 f9d8661b 2022-05-23 op twrite_cont(struct fid *f, off_t *writepos, size_t *writetot,
1629 f9d8661b 2022-05-23 op size_t *writeleft, int *writeskip, uint16_t tag, const uint8_t *data,
1634 8b0a5062 2022-05-22 op if (len > *writeleft) {
1635 8b0a5062 2022-05-22 op client_send_listener(IMSG_CLOSE, NULL, 0);
1636 8b0a5062 2022-05-22 op client_shutdown();
1640 8b0a5062 2022-05-22 op if ((r = pwrite(f->fd, data, len, *writepos)) == -1) {
1641 8b0a5062 2022-05-22 op *writeskip = 1;
1642 8b0a5062 2022-05-22 op np_errno(tag);
1646 f9d8661b 2022-05-23 op *writetot += len;
1647 8b0a5062 2022-05-22 op *writeleft -= len;
1648 8b0a5062 2022-05-22 op *writepos += len;
1650 8b0a5062 2022-05-22 op if (*writeleft == 0)
1651 f9d8661b 2022-05-23 op np_write(tag, *writetot);
1655 fb1a36c0 2022-01-09 op tstat(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1657 fb1a36c0 2022-01-09 op struct evbuffer *evb;
1658 fb1a36c0 2022-01-09 op struct stat sb;
1659 fb1a36c0 2022-01-09 op struct fid *f;
1661 fb1a36c0 2022-01-09 op uint32_t fid;
1663 fb1a36c0 2022-01-09 op /* fid[4] */
1664 bcdb46a7 2022-01-19 op if (!NPREAD32("fid", &fid, &data, &len) ||
1666 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1667 fb1a36c0 2022-01-09 op client_shutdown();
1672 fb1a36c0 2022-01-09 op * plan9' stat(9P) is not clear on whether the stat is allowed
1673 fb1a36c0 2022-01-09 op * on opened fids or not. We're allowing stat regardless of the
1674 fb1a36c0 2022-01-09 op * status of the fid.
1677 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL) {
1678 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1682 fb1a36c0 2022-01-09 op if ((evb = evbuffer_new()) == NULL)
1683 fb1a36c0 2022-01-09 op fatal("evbuffer_new");
1685 fb1a36c0 2022-01-09 op if (f->fd != -1)
1686 fb1a36c0 2022-01-09 op r = fstat(f->fd, &sb);
1687 fb1a36c0 2022-01-09 op else if (f->qid.type & QTDIR)
1688 fb1a36c0 2022-01-09 op r = fstat(f->dir->fd, &sb);
1690 543fc013 2022-01-17 op r = fstatat(f->dir->fd, f->fname, &sb, 0);
1692 fb1a36c0 2022-01-09 op if (r == -1) {
1693 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1694 fb1a36c0 2022-01-09 op evbuffer_free(evb);
1698 91f48e25 2022-02-02 op if (serialize_stat(f->fname, &sb, evb) == -1)
1699 91f48e25 2022-02-02 op np_error(hdr->tag, "stat would overflow");
1701 91f48e25 2022-02-02 op np_stat(hdr->tag, EVBUFFER_LENGTH(evb), EVBUFFER_DATA(evb));
1702 fb1a36c0 2022-01-09 op evbuffer_free(evb);
1706 755d75bf 2022-01-17 op twstat(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1708 755d75bf 2022-01-17 op struct timespec times[2];
1709 755d75bf 2022-01-17 op struct np_stat st;
1710 755d75bf 2022-01-17 op struct fid *f;
1712 755d75bf 2022-01-17 op uint32_t fid;
1713 755d75bf 2022-01-17 op char name[PATH_MAX];
1715 755d75bf 2022-01-17 op /* fid[4] stat[n] */
1716 755d75bf 2022-01-17 op if (!NPREAD32("fid", &fid, &data, &len))
1719 755d75bf 2022-01-17 op switch (NPREADST("stat", &st, name, sizeof(name), &data, &len)) {
1720 755d75bf 2022-01-17 op case READSTRERR:
1722 755d75bf 2022-01-17 op case READSTRTRUNC:
1723 755d75bf 2022-01-17 op log_warnx("wstat new name would overflow");
1724 755d75bf 2022-01-17 op np_error(hdr->tag, "new name too long");
1729 f4ad0146 2022-01-19 op * We skip the reading of some fields voluntarily because we
1730 f4ad0146 2022-01-19 op * don't support chown, so len will always be > 0!
1732 f4ad0146 2022-01-19 op #ifdef notyet
1733 bcdb46a7 2022-01-19 op if (len != 0)
1737 755d75bf 2022-01-17 op if ((f = fid_by_id(fid)) == NULL) {
1738 755d75bf 2022-01-17 op np_error(hdr->tag, "invalid fid");
1743 755d75bf 2022-01-17 op * 9P wants these edits to be done in an atomic fashion,
1744 755d75bf 2022-01-17 op * something that I don't think it's possible on UNIX without
1745 755d75bf 2022-01-17 op * some special kernel help. Changing atime or mtime,
1746 755d75bf 2022-01-17 op * permissions, or rename the file are different syscalls.
1748 755d75bf 2022-01-17 op * Also, silently ignore stuff we can't/don't want to modify.
1751 755d75bf 2022-01-17 op /* change the permissions */
1752 755d75bf 2022-01-17 op if (st.mode != (uint32_t)-1) {
1753 b7c2d377 2022-02-13 op mode_t m = st.mode & 0x7FF; /* silently truncate higer bits */
1754 755d75bf 2022-01-17 op if (f->fd != -1)
1755 755d75bf 2022-01-17 op r = fchmod(f->fd, m);
1757 543fc013 2022-01-17 op r = fchmodat(f->dir->fd, f->fname, m, 0);
1759 755d75bf 2022-01-17 op if (r == -1) {
1760 755d75bf 2022-01-17 op np_errno(hdr->tag);
1765 755d75bf 2022-01-17 op /* change the atime/mtime of the fid, opened or not */
1766 755d75bf 2022-01-17 op if (st.atime != (uint32_t)-1 || st.mtime != (uint32_t)-1) {
1767 755d75bf 2022-01-17 op times[0].tv_nsec = UTIME_OMIT;
1768 755d75bf 2022-01-17 op times[1].tv_nsec = UTIME_OMIT;
1770 755d75bf 2022-01-17 op if (st.atime != (uint32_t)-1) {
1771 755d75bf 2022-01-17 op times[0].tv_sec = st.atime;
1772 755d75bf 2022-01-17 op times[0].tv_nsec = 0;
1774 755d75bf 2022-01-17 op if (st.mtime != (uint32_t)-1) {
1775 755d75bf 2022-01-17 op times[1].tv_sec = st.mtime;
1776 755d75bf 2022-01-17 op times[1].tv_nsec = 0;
1779 755d75bf 2022-01-17 op if (f->fd != -1)
1780 755d75bf 2022-01-17 op r = futimens(f->fd, times);
1782 543fc013 2022-01-17 op r = utimensat(f->dir->fd, f->fname, times, 0);
1784 755d75bf 2022-01-17 op if (r == -1) {
1785 755d75bf 2022-01-17 op np_errno(hdr->tag);
1790 755d75bf 2022-01-17 op /* truncate */
1791 755d75bf 2022-01-17 op if (st.length != (uint64_t)-1) {
1792 755d75bf 2022-01-17 op if (f->fd == -1) {
1793 755d75bf 2022-01-17 op np_error(hdr->tag, "can't truncate a non-opened fid");
1797 755d75bf 2022-01-17 op if (f->qid.type & QTDIR && st.length != 0) {
1798 755d75bf 2022-01-17 op np_error(hdr->tag, "can't truncate directories");
1802 755d75bf 2022-01-17 op if (TYPE_OVERFLOW(off_t, st.length)) {
1803 755d75bf 2022-01-17 op log_warnx("truncate request overflows off_t: %"PRIu64,
1805 755d75bf 2022-01-17 op np_error(hdr->tag, "length overflows");
1809 6d3d71a9 2022-01-19 op if (f->qid.type == 0 &&
1810 755d75bf 2022-01-17 op ftruncate(f->fd, st.length) == -1) {
1811 755d75bf 2022-01-17 op np_errno(hdr->tag);
1816 755d75bf 2022-01-17 op /* rename (change the name entry) */
1817 755d75bf 2022-01-17 op if (*st.name != '\0') {
1818 755d75bf 2022-01-17 op struct stat sb;
1819 755d75bf 2022-01-17 op const char *newname;
1822 755d75bf 2022-01-17 op * XXX: 9P requires that we disallow changing the name
1823 755d75bf 2022-01-17 op * to that of an existing file. We can't do that
1824 755d75bf 2022-01-17 op * atomically (rename is happy about stealing names)
1825 755d75bf 2022-01-17 op * so this is just a best effort.
1827 755d75bf 2022-01-17 op if (fstatat(f->dir->fd, st.name, &sb, 0) == -1 &&
1828 755d75bf 2022-01-17 op errno != ENOENT) {
1829 755d75bf 2022-01-17 op np_error(hdr->tag, "target file exists");
1833 543fc013 2022-01-17 op r = renameat(f->dir->fd, f->fname, f->dir->fd, st.name);
1834 755d75bf 2022-01-17 op if (r == -1) {
1835 755d75bf 2022-01-17 op np_errno(hdr->tag);
1839 755d75bf 2022-01-17 op /* fix the fid so it points to the new file */
1841 755d75bf 2022-01-17 op if ((newname = strchr(st.name, '/')) != NULL)
1842 755d75bf 2022-01-17 op newname++; /* skip / */
1844 755d75bf 2022-01-17 op newname = st.name;
1845 543fc013 2022-01-17 op strlcpy(f->fname, newname, sizeof(f->fname));
1847 755d75bf 2022-01-17 op if (strchr(st.name, '/') != NULL) {
1848 755d75bf 2022-01-17 op struct dir *dir;
1849 755d75bf 2022-01-17 op char *dname;
1852 755d75bf 2022-01-17 op dname = dirname(st.name);
1853 755d75bf 2022-01-17 op fd = openat(f->dir->fd, dname, O_RDONLY|O_DIRECTORY);
1854 755d75bf 2022-01-17 op if (fd == -1) {
1855 755d75bf 2022-01-17 op np_errno(hdr->tag);
1856 755d75bf 2022-01-17 op free_fid(f);
1860 755d75bf 2022-01-17 op if ((dir = new_dir(fd)) == NULL) {
1861 755d75bf 2022-01-17 op np_errno(hdr->tag);
1862 755d75bf 2022-01-17 op free_fid(f);
1866 755d75bf 2022-01-17 op dir_decref(f->dir);
1867 755d75bf 2022-01-17 op f->dir = dir_incref(dir);
1871 755d75bf 2022-01-17 op np_wstat(hdr->tag);
1875 755d75bf 2022-01-17 op client_send_listener(IMSG_CLOSE, NULL, 0);
1876 755d75bf 2022-01-17 op client_shutdown();
1880 fb1a36c0 2022-01-09 op tremove(struct np_msg_header *hdr, const uint8_t *data, size_t len)
1882 fb1a36c0 2022-01-09 op struct fid *f;
1883 fb1a36c0 2022-01-09 op uint32_t fid;
1885 fb1a36c0 2022-01-09 op char dirpath[PATH_MAX + 3];
1887 fb1a36c0 2022-01-09 op /* fid[4] */
1888 bcdb46a7 2022-01-19 op if (!NPREAD32("fid", &fid, &data, &len) ||
1890 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1891 fb1a36c0 2022-01-09 op client_shutdown();
1895 fb1a36c0 2022-01-09 op if ((f = fid_by_id(fid)) == NULL) {
1896 fb1a36c0 2022-01-09 op np_error(hdr->tag, "invalid fid");
1900 fb1a36c0 2022-01-09 op if (f->qid.type & QTDIR) { /* directory */
1901 fb1a36c0 2022-01-09 op strlcpy(dirpath, "../", sizeof(dirpath));
1902 543fc013 2022-01-17 op strlcat(dirpath, f->fname, sizeof(dirpath));
1903 fb1a36c0 2022-01-09 op r = unlinkat(f->dir->fd, dirpath, AT_REMOVEDIR);
1904 fb1a36c0 2022-01-09 op } else /* file */
1905 543fc013 2022-01-17 op r = unlinkat(f->dir->fd, f->fname, 0);
1907 fb1a36c0 2022-01-09 op if (r == -1)
1908 fb1a36c0 2022-01-09 op np_errno(hdr->tag);
1910 fb1a36c0 2022-01-09 op np_remove(hdr->tag);
1912 fb1a36c0 2022-01-09 op free_fid(f);
1916 8b0a5062 2022-05-22 op handle_message(struct imsg *imsg, size_t len, int cont)
1918 8b0a5062 2022-05-22 op static struct fid *writefid;
1919 8b0a5062 2022-05-22 op static off_t writepos;
1920 f9d8661b 2022-05-23 op static size_t writetot;
1921 8b0a5062 2022-05-22 op static size_t writeleft;
1922 8b0a5062 2022-05-22 op static int writeskip;
1923 8b0a5062 2022-05-22 op static uint16_t writetag;
1924 fb1a36c0 2022-01-09 op struct msg {
1925 fb1a36c0 2022-01-09 op uint8_t type;
1926 fb1a36c0 2022-01-09 op void (*fn)(struct np_msg_header *, const uint8_t *, size_t);
1927 fb1a36c0 2022-01-09 op } msgs[] = {
1928 fb1a36c0 2022-01-09 op {Tversion, tversion},
1929 fb1a36c0 2022-01-09 op {Tattach, tattach},
1930 fb1a36c0 2022-01-09 op {Tclunk, tclunk},
1931 fb1a36c0 2022-01-09 op {Tflush, tflush},
1932 fb1a36c0 2022-01-09 op {Twalk, twalk},
1933 fb1a36c0 2022-01-09 op {Topen, topen},
1934 fb1a36c0 2022-01-09 op {Tcreate, tcreate},
1935 fb1a36c0 2022-01-09 op {Tread, tread},
1936 8b0a5062 2022-05-22 op /* {Twrite, twrite}, */
1937 fb1a36c0 2022-01-09 op {Tstat, tstat},
1938 755d75bf 2022-01-17 op {Twstat, twstat},
1939 fb1a36c0 2022-01-09 op {Tremove, tremove},
1941 fb1a36c0 2022-01-09 op struct np_msg_header hdr;
1943 fb1a36c0 2022-01-09 op uint8_t *data;
1945 fb1a36c0 2022-01-09 op #if DEBUG_PACKETS
1946 fb1a36c0 2022-01-09 op hexdump("incoming packet", imsg->data, len);
1950 8b0a5062 2022-05-22 op * Twrite is special and can be "continued" to allow writing
1951 8b0a5062 2022-05-22 op * more than what the imsg framework would allow us to.
1954 8b0a5062 2022-05-22 op if (writeskip)
1957 8b0a5062 2022-05-22 op if (writefid == NULL) {
1958 8b0a5062 2022-05-22 op log_warnx("received a continuation message without "
1959 8b0a5062 2022-05-22 op "seeing a Twrite");
1960 8b0a5062 2022-05-22 op client_send_listener(IMSG_CLOSE, NULL, 0);
1961 8b0a5062 2022-05-22 op client_shutdown();
1965 f9d8661b 2022-05-23 op twrite_cont(writefid, &writepos, &writetot, &writeleft,
1966 f9d8661b 2022-05-23 op &writeskip, writetag, imsg->data, len);
1970 ec5d75ef 2022-05-23 op if (writeleft > 0) {
1971 ec5d75ef 2022-05-23 op log_warnx("received a non continuation message when still "
1972 ec5d75ef 2022-05-23 op "missed %zu bytes to write", writeleft);
1973 ec5d75ef 2022-05-23 op client_send_listener(IMSG_CLOSE, NULL, 0);
1974 ec5d75ef 2022-05-23 op client_shutdown();
1978 8b0a5062 2022-05-22 op writefid = NULL;
1979 8b0a5062 2022-05-22 op writepos = -1;
1980 f9d8661b 2022-05-23 op writetot = 0;
1981 8b0a5062 2022-05-22 op writeleft = 0;
1982 8b0a5062 2022-05-22 op writeskip = 0;
1984 fb1a36c0 2022-01-09 op parse_message(imsg->data, len, &hdr, &data);
1985 fb1a36c0 2022-01-09 op len -= HEADERSIZE;
1987 fb1a36c0 2022-01-09 op log_debug("got request: len=%d type=%d[%s] tag=%d",
1988 fb1a36c0 2022-01-09 op hdr.len, hdr.type, pp_msg_type(hdr.type), hdr.tag);
1990 fb1a36c0 2022-01-09 op if (!handshaked && hdr.type != Tversion) {
1991 fb1a36c0 2022-01-09 op client_send_listener(IMSG_CLOSE, NULL, 0);
1992 fb1a36c0 2022-01-09 op client_shutdown();
1996 8b0a5062 2022-05-22 op if (hdr.type == Twrite) {
1997 8b0a5062 2022-05-22 op writetag = hdr.tag;
1998 f9d8661b 2022-05-23 op twrite(&hdr, data, len, &writefid, &writepos, &writetot,
1999 f9d8661b 2022-05-23 op &writeleft, &writeskip);
2003 fbeaf87b 2022-05-22 op if (len > IMSG_MAXSIZE) {
2004 fbeaf87b 2022-05-22 op log_warnx("can't handle message: too long for its type");
2005 fbeaf87b 2022-05-22 op client_send_listener(IMSG_CLOSE, NULL, 0);
2006 fbeaf87b 2022-05-22 op client_shutdown();
2010 fb1a36c0 2022-01-09 op for (i = 0; i < sizeof(msgs)/sizeof(msgs[0]); ++i) {
2011 fb1a36c0 2022-01-09 op if (msgs[i].type != hdr.type)
2014 fb1a36c0 2022-01-09 op msgs[i].fn(&hdr, data, len);
2018 fb1a36c0 2022-01-09 op np_error(hdr.tag, "Not supported.");