2 fb1a36c0 2022-01-09 op * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 fb1a36c0 2022-01-09 op * Permission to use, copy, modify, and distribute this software for any
5 fb1a36c0 2022-01-09 op * purpose with or without fee is hereby granted, provided that the above
6 fb1a36c0 2022-01-09 op * copyright notice and this permission notice appear in all copies.
8 fb1a36c0 2022-01-09 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 fb1a36c0 2022-01-09 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 fb1a36c0 2022-01-09 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 fb1a36c0 2022-01-09 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 fb1a36c0 2022-01-09 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 fb1a36c0 2022-01-09 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 fb1a36c0 2022-01-09 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 bbcba3ed 2022-01-10 op #include "compat.h"
19 fb1a36c0 2022-01-09 op #include <sys/types.h>
20 fb1a36c0 2022-01-09 op #include <sys/socket.h>
22 fb1a36c0 2022-01-09 op #include <netdb.h>
24 fb1a36c0 2022-01-09 op #include <assert.h>
25 fb1a36c0 2022-01-09 op #include <errno.h>
26 fb1a36c0 2022-01-09 op #include <fcntl.h>
27 fb1a36c0 2022-01-09 op #include <inttypes.h>
28 fb1a36c0 2022-01-09 op #include <signal.h>
29 fb1a36c0 2022-01-09 op #include <stdio.h>
30 fb1a36c0 2022-01-09 op #include <stdlib.h>
31 fb1a36c0 2022-01-09 op #include <string.h>
32 fb1a36c0 2022-01-09 op #include <syslog.h>
33 fb1a36c0 2022-01-09 op #include <tls.h>
34 fb1a36c0 2022-01-09 op #include <unistd.h>
36 fb1a36c0 2022-01-09 op #include "kami.h"
37 fb1a36c0 2022-01-09 op #include "log.h"
38 fb1a36c0 2022-01-09 op #include "utils.h"
39 893d3be6 2022-01-19 op #include "9pclib.h"
41 fb1a36c0 2022-01-09 op #define DEBUG_PACKETS 0
43 fb1a36c0 2022-01-09 op #define PROMPT "=% "
48 fb1a36c0 2022-01-09 op const char *keypath;
49 fb1a36c0 2022-01-09 op const char *crtpath;
50 fb1a36c0 2022-01-09 op const char *host;
51 fb1a36c0 2022-01-09 op const char *port;
54 fb1a36c0 2022-01-09 op struct tls_config *tlsconf;
55 fb1a36c0 2022-01-09 op struct tls *ctx;
56 fb1a36c0 2022-01-09 op struct bufferevent *bev, *inbev;
58 fb1a36c0 2022-01-09 op static void __dead usage(int);
60 fb1a36c0 2022-01-09 op static void sig_handler(int, short, void *);
62 fb1a36c0 2022-01-09 op static int openconn(void);
63 fb1a36c0 2022-01-09 op static void mark_nonblock(int);
65 fb1a36c0 2022-01-09 op static void tls_readcb(int, short, void *);
66 fb1a36c0 2022-01-09 op static void tls_writecb(int, short, void *);
68 fb1a36c0 2022-01-09 op static void client_read(struct bufferevent *, void *);
69 fb1a36c0 2022-01-09 op static void client_write(struct bufferevent *, void *);
70 fb1a36c0 2022-01-09 op static void client_error(struct bufferevent *, short, void *);
72 fb1a36c0 2022-01-09 op static void repl_read(struct bufferevent *, void *);
73 fb1a36c0 2022-01-09 op static void repl_error(struct bufferevent *, short, void *);
75 fb1a36c0 2022-01-09 op static void excmd_version(const char **, int);
76 fb1a36c0 2022-01-09 op static void excmd_attach(const char **, int);
77 fb1a36c0 2022-01-09 op static void excmd_clunk(const char **, int);
78 fb1a36c0 2022-01-09 op static void excmd_flush(const char **, int);
79 fb1a36c0 2022-01-09 op static void excmd_walk(const char ** , int);
80 fb1a36c0 2022-01-09 op static void excmd_open(const char ** , int);
81 fb1a36c0 2022-01-09 op static void excmd_create(const char ** , int);
82 fb1a36c0 2022-01-09 op static void excmd_read(const char ** , int);
83 fb1a36c0 2022-01-09 op static void excmd_write(const char **, int);
84 fb1a36c0 2022-01-09 op static void excmd(const char **, int);
86 fb1a36c0 2022-01-09 op static void pp_qid(const uint8_t *, uint32_t);
87 fb1a36c0 2022-01-09 op static void pp_msg(uint32_t, uint8_t, uint16_t, const uint8_t *);
88 fb1a36c0 2022-01-09 op static void handle_9p(const uint8_t *, size_t);
89 fb1a36c0 2022-01-09 op static void clr(void);
90 fb1a36c0 2022-01-09 op static void prompt(void);
92 fb1a36c0 2022-01-09 op static void __dead
93 fb1a36c0 2022-01-09 op usage(int ret)
95 fb1a36c0 2022-01-09 op fprintf(stderr,
96 fb1a36c0 2022-01-09 op "usage: %s [-chv] [-C crt] [-K key] [-H host] [-P port]\n",
97 fb1a36c0 2022-01-09 op getprogname());
98 fb1a36c0 2022-01-09 op fprintf(stderr, "kamid suite version " KAMID_VERSION "\n");
103 fb1a36c0 2022-01-09 op sig_handler(int sig, short event, void *d)
106 fb1a36c0 2022-01-09 op * Normal signal handler rules don't apply because libevent
107 fb1a36c0 2022-01-09 op * decouples for us.
110 fb1a36c0 2022-01-09 op switch (sig) {
112 fb1a36c0 2022-01-09 op case SIGTERM:
114 fb1a36c0 2022-01-09 op log_warnx("Shutting down...");
115 fb1a36c0 2022-01-09 op event_loopbreak();
118 fb1a36c0 2022-01-09 op fatalx("unexpected signal %d", sig);
123 fb1a36c0 2022-01-09 op openconn(void)
125 fb1a36c0 2022-01-09 op struct addrinfo hints, *res, *res0;
127 fb1a36c0 2022-01-09 op int save_errno;
129 fb1a36c0 2022-01-09 op const char *cause = NULL;
131 fb1a36c0 2022-01-09 op memset(&hints, 0, sizeof(hints));
132 fb1a36c0 2022-01-09 op hints.ai_family = AF_UNSPEC;
133 fb1a36c0 2022-01-09 op hints.ai_socktype = SOCK_STREAM;
134 fb1a36c0 2022-01-09 op if ((error = getaddrinfo(host, port, &hints, &res0))) {
135 fb1a36c0 2022-01-09 op warnx("%s", gai_strerror(error));
140 fb1a36c0 2022-01-09 op for (res = res0; res; res = res->ai_next) {
141 fb1a36c0 2022-01-09 op s = socket(res->ai_family, res->ai_socktype,
142 fb1a36c0 2022-01-09 op res->ai_protocol);
143 fb1a36c0 2022-01-09 op if (s == -1) {
144 fb1a36c0 2022-01-09 op cause = "socket";
148 fb1a36c0 2022-01-09 op if (connect(s, res->ai_addr, res->ai_addrlen) == -1) {
149 fb1a36c0 2022-01-09 op cause = "connect";
150 fb1a36c0 2022-01-09 op save_errno = errno;
152 fb1a36c0 2022-01-09 op errno = save_errno;
160 fb1a36c0 2022-01-09 op freeaddrinfo(res0);
163 fb1a36c0 2022-01-09 op warn("%s", cause);
169 fb1a36c0 2022-01-09 op mark_nonblock(int fd)
173 fb1a36c0 2022-01-09 op if ((flags = fcntl(fd, F_GETFL)) == -1)
174 fb1a36c0 2022-01-09 op fatal("fcntl(F_GETFL)");
175 fb1a36c0 2022-01-09 op if (fcntl(fd, F_SETFL, flags | O_NONBLOCK) == -1)
176 fb1a36c0 2022-01-09 op fatal("fcntl(F_SETFL)");
180 fb1a36c0 2022-01-09 op tls_readcb(int fd, short event, void *d)
182 fb1a36c0 2022-01-09 op struct bufferevent *bufev = d;
183 fb1a36c0 2022-01-09 op char buf[IBUF_READ_SIZE];
184 fb1a36c0 2022-01-09 op int what = EVBUFFER_READ;
185 fb1a36c0 2022-01-09 op int howmuch = IBUF_READ_SIZE;
189 fb1a36c0 2022-01-09 op if (event == EV_TIMEOUT) {
190 fb1a36c0 2022-01-09 op what |= EVBUFFER_TIMEOUT;
194 fb1a36c0 2022-01-09 op if (bufev->wm_read.high != 0)
195 fb1a36c0 2022-01-09 op howmuch = MIN(sizeof(buf), bufev->wm_read.high);
197 fb1a36c0 2022-01-09 op switch (ret = tls_read(ctx, buf, howmuch)) {
198 fb1a36c0 2022-01-09 op case TLS_WANT_POLLIN:
199 fb1a36c0 2022-01-09 op case TLS_WANT_POLLOUT:
202 fb1a36c0 2022-01-09 op what |= EVBUFFER_ERROR;
207 fb1a36c0 2022-01-09 op if (len == 0) {
208 fb1a36c0 2022-01-09 op what |= EVBUFFER_EOF;
212 fb1a36c0 2022-01-09 op if (evbuffer_add(bufev->input, buf, len) == -1) {
213 fb1a36c0 2022-01-09 op what |= EVBUFFER_ERROR;
217 fb1a36c0 2022-01-09 op event_add(&bufev->ev_read, NULL);
219 fb1a36c0 2022-01-09 op len = EVBUFFER_LENGTH(bufev->input);
220 fb1a36c0 2022-01-09 op if (bufev->wm_read.low != 0 && len < bufev->wm_read.low)
222 fb1a36c0 2022-01-09 op if (bufev->readcb != NULL)
223 fb1a36c0 2022-01-09 op (*bufev->readcb)(bufev, bufev->cbarg);
227 fb1a36c0 2022-01-09 op event_add(&bufev->ev_read, NULL);
231 fb1a36c0 2022-01-09 op (*bufev->errorcb)(bufev, what, bufev->cbarg);
235 fb1a36c0 2022-01-09 op tls_writecb(int fd, short event, void *d)
237 fb1a36c0 2022-01-09 op struct bufferevent *bufev = d;
240 fb1a36c0 2022-01-09 op short what = EVBUFFER_WRITE;
243 fb1a36c0 2022-01-09 op if (event == EV_TIMEOUT) {
244 fb1a36c0 2022-01-09 op what |= EVBUFFER_TIMEOUT;
248 fb1a36c0 2022-01-09 op len = EVBUFFER_LENGTH(bufev->output);
249 fb1a36c0 2022-01-09 op if (len != 0) {
250 fb1a36c0 2022-01-09 op data = EVBUFFER_DATA(bufev->output);
252 fb1a36c0 2022-01-09 op #if DEBUG_PACKETS
253 fb1a36c0 2022-01-09 op hexdump("outgoing msg", data, len);
256 fb1a36c0 2022-01-09 op switch (ret = tls_write(ctx, data, len)) {
257 fb1a36c0 2022-01-09 op case TLS_WANT_POLLIN:
258 fb1a36c0 2022-01-09 op case TLS_WANT_POLLOUT:
261 fb1a36c0 2022-01-09 op what |= EVBUFFER_ERROR;
264 fb1a36c0 2022-01-09 op evbuffer_drain(bufev->output, ret);
267 fb1a36c0 2022-01-09 op if (EVBUFFER_LENGTH(bufev->output) != 0)
268 fb1a36c0 2022-01-09 op event_add(&bufev->ev_write, NULL);
270 fb1a36c0 2022-01-09 op if (bufev->writecb != NULL &&
271 fb1a36c0 2022-01-09 op EVBUFFER_LENGTH(bufev->output) <= bufev->wm_write.low)
272 fb1a36c0 2022-01-09 op (*bufev->writecb)(bufev, bufev->cbarg);
276 fb1a36c0 2022-01-09 op event_add(&bufev->ev_write, NULL);
279 fb1a36c0 2022-01-09 op (*bufev->errorcb)(bufev, what, bufev->cbarg);
283 fb1a36c0 2022-01-09 op client_read(struct bufferevent *bev, void *d)
285 fb1a36c0 2022-01-09 op struct evbuffer *src = EVBUFFER_INPUT(bev);
286 fb1a36c0 2022-01-09 op uint32_t len;
287 fb1a36c0 2022-01-09 op uint8_t *data;
290 fb1a36c0 2022-01-09 op if (EVBUFFER_LENGTH(src) < sizeof(len))
293 fb1a36c0 2022-01-09 op data = EVBUFFER_DATA(src);
295 fb1a36c0 2022-01-09 op memcpy(&len, data, sizeof(len));
296 fb1a36c0 2022-01-09 op len = le32toh(len);
298 fb1a36c0 2022-01-09 op if (len < HEADERSIZE)
299 fb1a36c0 2022-01-09 op fatal("incoming message is too small! (%d bytes)",
302 fb1a36c0 2022-01-09 op if (len > EVBUFFER_LENGTH(src))
305 fb1a36c0 2022-01-09 op #if DEBUG_PACKETS
306 fb1a36c0 2022-01-09 op hexdump("incoming msg", data, len);
309 fb1a36c0 2022-01-09 op handle_9p(data, len);
310 fb1a36c0 2022-01-09 op evbuffer_drain(src, len);
315 fb1a36c0 2022-01-09 op client_write(struct bufferevent *bev, void *data)
317 fb1a36c0 2022-01-09 op return; /* nothing to do */
321 fb1a36c0 2022-01-09 op client_error(struct bufferevent *bev, short err, void *data)
323 fb1a36c0 2022-01-09 op if (err & EVBUFFER_ERROR)
324 fb1a36c0 2022-01-09 op fatal("buffer event error");
326 fb1a36c0 2022-01-09 op if (err & EVBUFFER_EOF) {
328 fb1a36c0 2022-01-09 op log_info("EOF");
329 fb1a36c0 2022-01-09 op event_loopbreak();
334 fb1a36c0 2022-01-09 op log_warnx("unknown event error");
335 fb1a36c0 2022-01-09 op event_loopbreak();
339 fb1a36c0 2022-01-09 op repl_read(struct bufferevent *bev, void *d)
343 fb1a36c0 2022-01-09 op const char *argv[10], **ap;
346 fb1a36c0 2022-01-09 op line = evbuffer_readln(bev->input, &len, EVBUFFER_EOL_LF);
347 fb1a36c0 2022-01-09 op if (line == NULL)
350 fb1a36c0 2022-01-09 op for (argc = 0, ap = argv; ap < &argv[9] &&
351 fb1a36c0 2022-01-09 op (*ap = strsep(&line, " \t")) != NULL;) {
352 fb1a36c0 2022-01-09 op if (**ap != '\0')
353 fb1a36c0 2022-01-09 op ap++, argc++;
357 fb1a36c0 2022-01-09 op excmd(argv, argc);
364 fb1a36c0 2022-01-09 op repl_error(struct bufferevent *bev, short error, void *d)
366 fb1a36c0 2022-01-09 op fatalx("an error occurred");
369 fb1a36c0 2022-01-09 op static inline void
370 fb1a36c0 2022-01-09 op do_send(void)
372 fb1a36c0 2022-01-09 op bufferevent_write_buffer(bev, evb);
375 fb1a36c0 2022-01-09 op /* version [version-str] */
377 fb1a36c0 2022-01-09 op excmd_version(const char **argv, int argc)
379 fb1a36c0 2022-01-09 op const char *s;
381 fb1a36c0 2022-01-09 op s = VERSION9P;
382 fb1a36c0 2022-01-09 op if (argc == 2)
385 fb1a36c0 2022-01-09 op tversion(s, MSIZE9P);
389 fb1a36c0 2022-01-09 op /* attach fid uname aname */
391 fb1a36c0 2022-01-09 op excmd_attach(const char **argv, int argc)
393 fb1a36c0 2022-01-09 op uint32_t fid;
394 fb1a36c0 2022-01-09 op const char *errstr;
396 fb1a36c0 2022-01-09 op if (argc != 4)
399 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
400 fb1a36c0 2022-01-09 op if (errstr != NULL) {
401 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
405 fb1a36c0 2022-01-09 op tattach(fid, NOFID, argv[2], argv[3]);
410 fb1a36c0 2022-01-09 op log_warnx("usage: attach fid uname aname");
413 fb1a36c0 2022-01-09 op /* clunk fid */
415 fb1a36c0 2022-01-09 op excmd_clunk(const char **argv, int argc)
417 fb1a36c0 2022-01-09 op uint32_t fid;
418 fb1a36c0 2022-01-09 op const char *errstr;
420 fb1a36c0 2022-01-09 op if (argc != 2)
423 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
424 fb1a36c0 2022-01-09 op if (errstr != NULL) {
425 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
434 fb1a36c0 2022-01-09 op log_warnx("usage: clunk fid");
437 fb1a36c0 2022-01-09 op /* flush oldtag */
439 fb1a36c0 2022-01-09 op excmd_flush(const char **argv, int argc)
441 fb1a36c0 2022-01-09 op uint16_t oldtag;
442 fb1a36c0 2022-01-09 op const char *errstr;
444 fb1a36c0 2022-01-09 op if (argc != 2)
447 fb1a36c0 2022-01-09 op oldtag = strtonum(argv[1], 0, UINT16_MAX, &errstr);
448 fb1a36c0 2022-01-09 op if (errstr != NULL) {
449 fb1a36c0 2022-01-09 op log_warnx("oldtag is %s: %s", errstr, argv[1]);
453 fb1a36c0 2022-01-09 op tflush(oldtag);
458 fb1a36c0 2022-01-09 op log_warnx("usage: flush oldtag");
461 fb1a36c0 2022-01-09 op /* walk fid newfid wnames... */
463 fb1a36c0 2022-01-09 op excmd_walk(const char **argv, int argc)
465 fb1a36c0 2022-01-09 op uint32_t fid, newfid;
466 fb1a36c0 2022-01-09 op const char *errstr;
468 fb1a36c0 2022-01-09 op if (argc < 3)
471 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
472 fb1a36c0 2022-01-09 op if (errstr != NULL) {
473 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
477 fb1a36c0 2022-01-09 op newfid = strtonum(argv[2], 0, UINT32_MAX, &errstr);
478 fb1a36c0 2022-01-09 op if (errstr != NULL) {
479 fb1a36c0 2022-01-09 op log_warnx("newfid is %s: %s", errstr, argv[1]);
483 fb1a36c0 2022-01-09 op twalk(fid, newfid, argv + 3, argc - 3);
488 fb1a36c0 2022-01-09 op log_warnx("usage: walk fid newfid wnames...");
491 fb1a36c0 2022-01-09 op /* open fid mode [flag] */
493 fb1a36c0 2022-01-09 op excmd_open(const char **argv, int argc)
495 fb1a36c0 2022-01-09 op const char *errstr;
496 fb1a36c0 2022-01-09 op uint32_t fid;
497 fb1a36c0 2022-01-09 op uint8_t mode = 0;
499 fb1a36c0 2022-01-09 op if (argc != 3 && argc != 4)
502 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
503 fb1a36c0 2022-01-09 op if (errstr != NULL) {
504 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
508 fb1a36c0 2022-01-09 op /* parse mode */
509 fb1a36c0 2022-01-09 op if (!strcmp("read", argv[2]) || !strcmp("r", argv[2]))
510 fb1a36c0 2022-01-09 op mode = KOREAD;
511 fb1a36c0 2022-01-09 op else if (!strcmp("write", argv[2]) || !strcmp("w", argv[2]))
512 fb1a36c0 2022-01-09 op mode = KOWRITE;
513 fb1a36c0 2022-01-09 op else if (!strcmp("readwrite", argv[2]) || !strcmp("rw", argv[2]))
514 fb1a36c0 2022-01-09 op mode = KORDWR;
516 fb1a36c0 2022-01-09 op log_warnx("invalid mode %s", argv[2]);
520 fb1a36c0 2022-01-09 op /* parse flag */
521 fb1a36c0 2022-01-09 op if (argv[3] != NULL) {
522 fb1a36c0 2022-01-09 op if (!strcmp("trunc", argv[3]))
523 fb1a36c0 2022-01-09 op mode |= KOTRUNC;
524 fb1a36c0 2022-01-09 op else if (!strcmp("rclose", argv[3]))
525 fb1a36c0 2022-01-09 op mode |= KORCLOSE;
527 fb1a36c0 2022-01-09 op log_warnx("invalid flag %s", argv[3]);
532 fb1a36c0 2022-01-09 op topen(fid, mode);
537 fb1a36c0 2022-01-09 op log_warnx("usage: open fid mode [flag]");
540 fb1a36c0 2022-01-09 op /* create fid path perm mode */
542 fb1a36c0 2022-01-09 op excmd_create(const char **argv, int argc)
544 fb1a36c0 2022-01-09 op const char *errstr;
545 fb1a36c0 2022-01-09 op uint32_t fid;
546 fb1a36c0 2022-01-09 op uint8_t mode = 0;
548 fb1a36c0 2022-01-09 op if (argc != 5)
551 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
552 fb1a36c0 2022-01-09 op if (errstr != NULL) {
553 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
557 fb1a36c0 2022-01-09 op /* parse mode */
558 fb1a36c0 2022-01-09 op if (!strcmp("write", argv[4]) || !strcmp("w", argv[4]))
559 fb1a36c0 2022-01-09 op mode = KOWRITE;
560 fb1a36c0 2022-01-09 op else if (!strcmp("readwrite", argv[4]) || !strcmp("rw", argv[4]))
561 fb1a36c0 2022-01-09 op mode = KORDWR;
563 fb1a36c0 2022-01-09 op log_warnx("invalid mode %s for create", argv[4]);
567 fb1a36c0 2022-01-09 op tcreate(fid, argv[2], 0, mode);
572 fb1a36c0 2022-01-09 op log_warnx("usage: create fid path perm mode ; perm is unused");
576 fb1a36c0 2022-01-09 op /* read fid offset count */
578 fb1a36c0 2022-01-09 op excmd_read(const char **argv, int argc)
580 fb1a36c0 2022-01-09 op uint64_t off;
581 fb1a36c0 2022-01-09 op uint32_t fid, count;
582 fb1a36c0 2022-01-09 op const char *errstr;
584 fb1a36c0 2022-01-09 op if (argc != 4)
587 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
588 fb1a36c0 2022-01-09 op if (errstr != NULL) {
589 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
593 fb1a36c0 2022-01-09 op /* should really be UNT64_MAX but it fails... */
594 fb1a36c0 2022-01-09 op off = strtonum(argv[2], -1, UINT32_MAX, &errstr);
595 fb1a36c0 2022-01-09 op if (errstr != NULL) {
596 fb1a36c0 2022-01-09 op log_warnx("offset is %s: %s", errstr, argv[2]);
600 fb1a36c0 2022-01-09 op count = strtonum(argv[3], 0, UINT32_MAX, &errstr);
601 fb1a36c0 2022-01-09 op if (errstr != NULL) {
602 fb1a36c0 2022-01-09 op log_warnx("count is %s: %s", errstr, argv[3]);
606 fb1a36c0 2022-01-09 op tread(fid, off, count);
611 fb1a36c0 2022-01-09 op log_warnx("usage: read fid offset count");
614 fb1a36c0 2022-01-09 op /* write fid offset content */
616 fb1a36c0 2022-01-09 op excmd_write(const char **argv, int argc)
618 fb1a36c0 2022-01-09 op uint64_t off;
619 fb1a36c0 2022-01-09 op uint32_t fid, count;
620 fb1a36c0 2022-01-09 op const char *errstr;
622 fb1a36c0 2022-01-09 op if (argc != 4)
625 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
626 fb1a36c0 2022-01-09 op if (errstr != NULL) {
627 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
631 fb1a36c0 2022-01-09 op /* should really be UINT64_MAX but... */
632 fb1a36c0 2022-01-09 op off = strtonum(argv[2], 0, UINT32_MAX, &errstr);
633 fb1a36c0 2022-01-09 op if (errstr != NULL) {
634 fb1a36c0 2022-01-09 op log_warnx("offset is %s: %s", errstr, argv[2]);
638 fb1a36c0 2022-01-09 op count = strlen(argv[3]);
639 fb1a36c0 2022-01-09 op twrite(fid, off, argv[3], count);
644 fb1a36c0 2022-01-09 op log_warnx("usage: write fid offset content");
647 fb1a36c0 2022-01-09 op /* remove fid */
649 fb1a36c0 2022-01-09 op excmd_remove(const char **argv, int argc)
651 fb1a36c0 2022-01-09 op const char *errstr;
652 fb1a36c0 2022-01-09 op uint32_t fid;
654 fb1a36c0 2022-01-09 op if (argc != 2)
657 fb1a36c0 2022-01-09 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
658 fb1a36c0 2022-01-09 op if (errstr != NULL) {
659 fb1a36c0 2022-01-09 op log_warnx("fid is %s: %s", errstr, argv[1]);
663 fb1a36c0 2022-01-09 op tremove(fid);
668 fb1a36c0 2022-01-09 op log_warnx("usage: remove fid");
672 fb1a36c0 2022-01-09 op excmd(const char **argv, int argc)
675 fb1a36c0 2022-01-09 op const char *name;
676 fb1a36c0 2022-01-09 op void (*fn)(const char **, int);
678 fb1a36c0 2022-01-09 op {"version", excmd_version},
679 fb1a36c0 2022-01-09 op {"attach", excmd_attach},
680 fb1a36c0 2022-01-09 op {"clunk", excmd_clunk},
681 fb1a36c0 2022-01-09 op {"flush", excmd_flush},
682 fb1a36c0 2022-01-09 op {"walk", excmd_walk},
683 fb1a36c0 2022-01-09 op {"open", excmd_open},
684 fb1a36c0 2022-01-09 op {"create", excmd_create},
685 fb1a36c0 2022-01-09 op {"read", excmd_read},
686 fb1a36c0 2022-01-09 op {"write", excmd_write},
687 fb1a36c0 2022-01-09 op /* TODO: stat */
688 fb1a36c0 2022-01-09 op {"remove", excmd_remove},
692 fb1a36c0 2022-01-09 op if (argc == 0)
695 fb1a36c0 2022-01-09 op for (i = 0; i < sizeof(cmds)/sizeof(cmds[0]); ++i) {
696 fb1a36c0 2022-01-09 op if (!strcmp(cmds[i].name, argv[0])) {
697 fb1a36c0 2022-01-09 op cmds[i].fn(argv, argc);
702 fb1a36c0 2022-01-09 op log_warnx("Unknown command %s", *argv);
706 fb1a36c0 2022-01-09 op pp_qid(const uint8_t *d, uint32_t len)
708 fb1a36c0 2022-01-09 op uint64_t path;
709 fb1a36c0 2022-01-09 op uint32_t vers;
710 fb1a36c0 2022-01-09 op uint8_t type;
712 fb1a36c0 2022-01-09 op if (len < 13) {
713 fb1a36c0 2022-01-09 op printf("invalid");
719 fb1a36c0 2022-01-09 op memcpy(&vers, d, sizeof(vers));
720 fb1a36c0 2022-01-09 op d += sizeof(vers);
721 fb1a36c0 2022-01-09 op vers = le64toh(vers);
723 fb1a36c0 2022-01-09 op memcpy(&path, d, sizeof(path));
724 fb1a36c0 2022-01-09 op d += sizeof(path);
725 fb1a36c0 2022-01-09 op path = le64toh(path);
727 fb1a36c0 2022-01-09 op printf("qid{path=%"PRIu64" version=%"PRIu32" type=0x%x\"%s\"}",
728 fb1a36c0 2022-01-09 op path, vers, type, pp_qid_type(type));
732 fb1a36c0 2022-01-09 op pp_msg(uint32_t len, uint8_t type, uint16_t tag, const uint8_t *d)
734 fb1a36c0 2022-01-09 op uint32_t msize, iounit, count;
735 fb1a36c0 2022-01-09 op uint16_t slen;
738 fb1a36c0 2022-01-09 op printf("len=%"PRIu32" type=%d[%s] tag=0x%x[%d] ", len,
739 fb1a36c0 2022-01-09 op type, pp_msg_type(type), tag, tag);
741 fb1a36c0 2022-01-09 op len -= HEADERSIZE;
743 fb1a36c0 2022-01-09 op switch (type) {
744 fb1a36c0 2022-01-09 op case Rversion:
745 fb1a36c0 2022-01-09 op if (len < 6) {
746 fb1a36c0 2022-01-09 op printf("invalid: not enough space for msize "
747 fb1a36c0 2022-01-09 op "and version provided.");
751 fb1a36c0 2022-01-09 op memcpy(&msize, d, sizeof(msize));
752 fb1a36c0 2022-01-09 op d += sizeof(msize);
753 fb1a36c0 2022-01-09 op len -= sizeof(msize);
754 fb1a36c0 2022-01-09 op msize = le32toh(msize);
756 fb1a36c0 2022-01-09 op memcpy(&slen, d, sizeof(slen));
757 fb1a36c0 2022-01-09 op d += sizeof(slen);
758 fb1a36c0 2022-01-09 op len -= sizeof(slen);
759 fb1a36c0 2022-01-09 op slen = le16toh(slen);
761 fb1a36c0 2022-01-09 op if (len != slen) {
762 fb1a36c0 2022-01-09 op printf("invalid: version string length doesn't "
763 fb1a36c0 2022-01-09 op "match. Got %d; want %d", slen, len);
767 fb1a36c0 2022-01-09 op printf("msize=%"PRIu32" version[%"PRIu16"]=\"",
768 fb1a36c0 2022-01-09 op msize, slen);
769 fb1a36c0 2022-01-09 op fwrite(d, 1, slen, stdout);
770 fb1a36c0 2022-01-09 op printf("\"");
774 fb1a36c0 2022-01-09 op case Rattach:
775 fb1a36c0 2022-01-09 op pp_qid(d, len);
780 fb1a36c0 2022-01-09 op case Rremove:
781 fb1a36c0 2022-01-09 op if (len != 0)
782 fb1a36c0 2022-01-09 op printf("invalid %s: %"PRIu32" extra bytes",
783 fb1a36c0 2022-01-09 op pp_msg_type(type), len);
787 fb1a36c0 2022-01-09 op if (len < 2) {
788 fb1a36c0 2022-01-09 op printf("invaild Rwalk: less than two bytes (%d)",
793 fb1a36c0 2022-01-09 op memcpy(&slen, d, sizeof(slen));
794 fb1a36c0 2022-01-09 op d += sizeof(slen);
795 fb1a36c0 2022-01-09 op len -= sizeof(slen);
796 fb1a36c0 2022-01-09 op slen = le16toh(slen);
798 fb1a36c0 2022-01-09 op if (len != QIDSIZE * slen) {
799 fb1a36c0 2022-01-09 op printf("invalid Rwalk: wanted %d bytes for %d qids "
800 fb1a36c0 2022-01-09 op "but got %"PRIu32" bytes instead",
801 fb1a36c0 2022-01-09 op QIDSIZE*slen, slen, len);
805 fb1a36c0 2022-01-09 op printf("nwqid=%"PRIu16, slen);
807 fb1a36c0 2022-01-09 op for (; slen != 0; slen--) {
809 fb1a36c0 2022-01-09 op pp_qid(d, len);
810 fb1a36c0 2022-01-09 op d += QIDSIZE;
811 fb1a36c0 2022-01-09 op len -= QIDSIZE;
817 fb1a36c0 2022-01-09 op case Rcreate:
818 fb1a36c0 2022-01-09 op if (len != QIDSIZE + 4) {
819 fb1a36c0 2022-01-09 op printf("invalid %s: expected %d bytes; "
820 fb1a36c0 2022-01-09 op "got %u\n", pp_msg_type(type), QIDSIZE + 4, len);
824 fb1a36c0 2022-01-09 op pp_qid(d, len);
825 fb1a36c0 2022-01-09 op d += QIDSIZE;
826 fb1a36c0 2022-01-09 op len -= QIDSIZE;
828 fb1a36c0 2022-01-09 op memcpy(&iounit, d, sizeof(iounit));
829 fb1a36c0 2022-01-09 op d += sizeof(iounit);
830 fb1a36c0 2022-01-09 op len -= sizeof(iounit);
831 fb1a36c0 2022-01-09 op iounit = le32toh(iounit);
832 fb1a36c0 2022-01-09 op printf(" iounit=%"PRIu32, iounit);
836 fb1a36c0 2022-01-09 op if (len < sizeof(count)) {
837 fb1a36c0 2022-01-09 op printf("invalid Rread: expected %zu bytes at least; "
838 fb1a36c0 2022-01-09 op "got %u\n", sizeof(count), len);
842 fb1a36c0 2022-01-09 op memcpy(&count, d, sizeof(count));
843 fb1a36c0 2022-01-09 op d += sizeof(count);
844 fb1a36c0 2022-01-09 op len -= sizeof(count);
845 fb1a36c0 2022-01-09 op count = le32toh(count);
847 fb1a36c0 2022-01-09 op if (len != count) {
848 fb1a36c0 2022-01-09 op printf("invalid Rread: expected %d data bytes; "
849 fb1a36c0 2022-01-09 op "got %u\n", count, len);
853 fb1a36c0 2022-01-09 op /* allocates three extra bytes, oh well... */
854 fb1a36c0 2022-01-09 op if ((v = calloc(count + 1, 4)) == NULL)
855 fb1a36c0 2022-01-09 op fatal("calloc");
856 fb1a36c0 2022-01-09 op strvisx(v, d, count, VIS_SAFE | VIS_TAB | VIS_NL | VIS_CSTYLE);
857 fb1a36c0 2022-01-09 op printf("data=%s", v);
863 fb1a36c0 2022-01-09 op if (len != sizeof(count)) {
864 fb1a36c0 2022-01-09 op printf("invalid Rwrite: expected %zu data bytes; "
865 fb1a36c0 2022-01-09 op "got %u\n", sizeof(count), len);
869 fb1a36c0 2022-01-09 op memcpy(&count, d, sizeof(count));
870 fb1a36c0 2022-01-09 op d += sizeof(count);
871 fb1a36c0 2022-01-09 op len -= sizeof(count);
872 fb1a36c0 2022-01-09 op count = le32toh(count);
874 fb1a36c0 2022-01-09 op printf("count=%d", count);
878 fb1a36c0 2022-01-09 op memcpy(&slen, d, sizeof(slen));
879 fb1a36c0 2022-01-09 op d += sizeof(slen);
880 fb1a36c0 2022-01-09 op len -= sizeof(slen);
881 fb1a36c0 2022-01-09 op slen = le16toh(slen);
883 fb1a36c0 2022-01-09 op if (slen != len) {
884 fb1a36c0 2022-01-09 op printf("invalid: error string length doesn't "
885 fb1a36c0 2022-01-09 op "match. Got %d; want %d", slen, len);
889 fb1a36c0 2022-01-09 op printf("error=\"");
890 fb1a36c0 2022-01-09 op fwrite(d, 1, slen, stdout);
891 fb1a36c0 2022-01-09 op printf("\"");
896 fb1a36c0 2022-01-09 op if ((v = calloc(len + 1, 4)) == NULL)
897 fb1a36c0 2022-01-09 op fatal("calloc");
898 fb1a36c0 2022-01-09 op strvisx(v, d, len, VIS_SAFE | VIS_TAB | VIS_NL | VIS_CSTYLE);
899 fb1a36c0 2022-01-09 op printf("body=%s", v);
903 fb1a36c0 2022-01-09 op printf("\n");
907 fb1a36c0 2022-01-09 op handle_9p(const uint8_t *data, size_t size)
909 fb1a36c0 2022-01-09 op uint32_t len;
910 fb1a36c0 2022-01-09 op uint16_t tag;
911 fb1a36c0 2022-01-09 op uint8_t type;
913 fb1a36c0 2022-01-09 op assert(size >= HEADERSIZE);
915 fb1a36c0 2022-01-09 op memcpy(&len, data, sizeof(len));
916 fb1a36c0 2022-01-09 op data += sizeof(len);
918 fb1a36c0 2022-01-09 op memcpy(&type, data, sizeof(type));
919 fb1a36c0 2022-01-09 op data += sizeof(type);
921 fb1a36c0 2022-01-09 op memcpy(&tag, data, sizeof(tag));
922 fb1a36c0 2022-01-09 op data += sizeof(tag);
924 fb1a36c0 2022-01-09 op len = le32toh(len);
925 fb1a36c0 2022-01-09 op /* type is one byte long, no endianness issues */
926 fb1a36c0 2022-01-09 op tag = le16toh(tag);
929 fb1a36c0 2022-01-09 op pp_msg(len, type, tag, data);
936 fb1a36c0 2022-01-09 op printf("\r");
937 fb1a36c0 2022-01-09 op fflush(stdout);
943 fb1a36c0 2022-01-09 op printf("%s", PROMPT);
944 fb1a36c0 2022-01-09 op fflush(stdout);
948 fb1a36c0 2022-01-09 op main(int argc, char **argv)
950 fb1a36c0 2022-01-09 op int ch, sock, handshake;
951 fb1a36c0 2022-01-09 op struct event ev_sigint, ev_sigterm;
953 fb1a36c0 2022-01-09 op signal(SIGPIPE, SIG_IGN);
955 fb1a36c0 2022-01-09 op while ((ch = getopt(argc, argv, "C:cH:hK:P:v")) != -1) {
956 fb1a36c0 2022-01-09 op switch (ch) {
958 fb1a36c0 2022-01-09 op crtpath = optarg;
964 fb1a36c0 2022-01-09 op host = optarg;
970 fb1a36c0 2022-01-09 op keypath = optarg;
973 fb1a36c0 2022-01-09 op port = optarg;
983 fb1a36c0 2022-01-09 op if (host == NULL)
984 fb1a36c0 2022-01-09 op host = "localhost";
985 fb1a36c0 2022-01-09 op if (port == NULL)
986 fb1a36c0 2022-01-09 op port = "1337";
988 fb1a36c0 2022-01-09 op argc -= optind;
989 fb1a36c0 2022-01-09 op argv += optind;
991 fb1a36c0 2022-01-09 op if (argc != 0)
993 fb1a36c0 2022-01-09 op /* if (!tls || (crtpath != NULL || keypath != NULL)) */
994 fb1a36c0 2022-01-09 op /* usage(1); */
996 fb1a36c0 2022-01-09 op errx(1, "must enable tls (for now)");
998 fb1a36c0 2022-01-09 op log_init(1, LOG_DAEMON);
999 fb1a36c0 2022-01-09 op log_setverbose(verbose);
1000 fb1a36c0 2022-01-09 op log_procinit(getprogname());
1002 fb1a36c0 2022-01-09 op if ((tlsconf = tls_config_new()) == NULL)
1003 fb1a36c0 2022-01-09 op fatalx("tls_config_new");
1004 fb1a36c0 2022-01-09 op tls_config_insecure_noverifycert(tlsconf);
1005 fb1a36c0 2022-01-09 op tls_config_insecure_noverifyname(tlsconf);
1006 fb1a36c0 2022-01-09 op if (tls_config_set_keypair_file(tlsconf, crtpath, keypath) == -1)
1007 fb1a36c0 2022-01-09 op fatalx("can't load certs (%s, %s)", crtpath, keypath);
1009 fb1a36c0 2022-01-09 op if ((ctx = tls_client()) == NULL)
1010 fb1a36c0 2022-01-09 op fatal("tls_client");
1011 fb1a36c0 2022-01-09 op if (tls_configure(ctx, tlsconf) == -1)
1012 fb1a36c0 2022-01-09 op fatalx("tls_configure: %s", tls_error(ctx));
1014 fb1a36c0 2022-01-09 op log_info("connecting to %s:%s...", host, port);
1016 fb1a36c0 2022-01-09 op if ((sock = openconn()) == -1)
1017 fb1a36c0 2022-01-09 op fatalx("can't connect to %s:%s", host, port);
1019 fb1a36c0 2022-01-09 op if (tls_connect_socket(ctx, sock, host) == -1)
1020 fb1a36c0 2022-01-09 op fatalx("tls_connect_socket: %s", tls_error(ctx));
1022 fb1a36c0 2022-01-09 op for (handshake = 0; !handshake;) {
1023 fb1a36c0 2022-01-09 op switch (tls_handshake(ctx)) {
1025 fb1a36c0 2022-01-09 op fatalx("tls_handshake: %s", tls_error(ctx));
1027 fb1a36c0 2022-01-09 op handshake = 1;
1032 fb1a36c0 2022-01-09 op log_info("connected!");
1034 fb1a36c0 2022-01-09 op mark_nonblock(sock);
1036 fb1a36c0 2022-01-09 op event_init();
1038 fb1a36c0 2022-01-09 op /* initialize global evb */
1039 fb1a36c0 2022-01-09 op if ((evb = evbuffer_new()) == NULL)
1040 fb1a36c0 2022-01-09 op fatal("evbuffer_new");
1042 fb1a36c0 2022-01-09 op signal_set(&ev_sigint, SIGINT, sig_handler, NULL);
1043 fb1a36c0 2022-01-09 op signal_set(&ev_sigterm, SIGINT, sig_handler, NULL);
1045 fb1a36c0 2022-01-09 op signal_add(&ev_sigint, NULL);
1046 fb1a36c0 2022-01-09 op signal_add(&ev_sigterm, NULL);
1048 fb1a36c0 2022-01-09 op bev = bufferevent_new(sock, client_read, client_write, client_error,
1050 fb1a36c0 2022-01-09 op if (bev == NULL)
1051 fb1a36c0 2022-01-09 op fatal("bufferevent_new");
1053 fb1a36c0 2022-01-09 op /* setup tls/io */
1054 fb1a36c0 2022-01-09 op event_set(&bev->ev_read, sock, EV_READ, tls_readcb, bev);
1055 fb1a36c0 2022-01-09 op event_set(&bev->ev_write, sock, EV_WRITE, tls_writecb, bev);
1057 fb1a36c0 2022-01-09 op bufferevent_enable(bev, EV_READ|EV_WRITE);
1059 fb1a36c0 2022-01-09 op mark_nonblock(0);
1060 fb1a36c0 2022-01-09 op inbev = bufferevent_new(0, repl_read, NULL, repl_error, NULL);
1061 fb1a36c0 2022-01-09 op bufferevent_enable(inbev, EV_READ);
1064 fb1a36c0 2022-01-09 op event_dispatch();
1066 fb1a36c0 2022-01-09 op bufferevent_free(bev);
1067 fb1a36c0 2022-01-09 op tls_free(ctx);
1068 fb1a36c0 2022-01-09 op tls_config_free(tlsconf);
1069 fb1a36c0 2022-01-09 op close(sock);