2 27909800 2021-07-26 op * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 27909800 2021-07-26 op * Permission to use, copy, modify, and distribute this software for any
5 27909800 2021-07-26 op * purpose with or without fee is hereby granted, provided that the above
6 27909800 2021-07-26 op * copyright notice and this permission notice appear in all copies.
8 27909800 2021-07-26 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 27909800 2021-07-26 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 27909800 2021-07-26 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 27909800 2021-07-26 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 27909800 2021-07-26 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 27909800 2021-07-26 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 27909800 2021-07-26 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 27909800 2021-07-26 op #include "compat.h"
19 27909800 2021-07-26 op #include <sys/types.h>
20 27909800 2021-07-26 op #include <sys/socket.h>
22 27909800 2021-07-26 op #include <netdb.h>
24 27909800 2021-07-26 op #include <assert.h>
25 27909800 2021-07-26 op #include <endian.h>
26 27909800 2021-07-26 op #include <errno.h>
27 9d5307de 2021-07-27 op #include <fcntl.h>
28 27909800 2021-07-26 op #include <inttypes.h>
29 27909800 2021-07-26 op #include <signal.h>
30 27909800 2021-07-26 op #include <stdio.h>
31 27909800 2021-07-26 op #include <stdlib.h>
32 27909800 2021-07-26 op #include <string.h>
33 27909800 2021-07-26 op #include <syslog.h>
34 27909800 2021-07-26 op #include <tls.h>
35 27909800 2021-07-26 op #include <unistd.h>
37 4e83b30f 2021-12-14 op #include "9pclib.h"
38 27909800 2021-07-26 op #include "kamid.h"
39 27909800 2021-07-26 op #include "log.h"
40 27909800 2021-07-26 op #include "utils.h"
42 9991b526 2021-08-01 op #define DEBUG_PACKETS 0
44 01d4b7a4 2021-07-29 op #define PROMPT "=% "
49 27909800 2021-07-26 op const char *keypath;
50 27909800 2021-07-26 op const char *crtpath;
51 27909800 2021-07-26 op const char *host;
52 27909800 2021-07-26 op const char *port;
55 27909800 2021-07-26 op struct tls_config *tlsconf;
56 27909800 2021-07-26 op struct tls *ctx;
57 9d5307de 2021-07-27 op struct bufferevent *bev, *inbev;
59 27909800 2021-07-26 op static void ATTR_DEAD usage(int);
61 27909800 2021-07-26 op static void sig_handler(int, short, void *);
63 27909800 2021-07-26 op static int openconn(void);
64 9d5307de 2021-07-27 op static void mark_nonblock(int);
66 27909800 2021-07-26 op static void tls_readcb(int, short, void *);
67 27909800 2021-07-26 op static void tls_writecb(int, short, void *);
69 27909800 2021-07-26 op static void client_read(struct bufferevent *, void *);
70 27909800 2021-07-26 op static void client_write(struct bufferevent *, void *);
71 27909800 2021-07-26 op static void client_error(struct bufferevent *, short, void *);
73 9d5307de 2021-07-27 op static void repl_read(struct bufferevent *, void *);
74 9d5307de 2021-07-27 op static void repl_error(struct bufferevent *, short, void *);
76 afaad60e 2021-07-29 op static void excmd_version(const char **, int);
77 afaad60e 2021-07-29 op static void excmd_attach(const char **, int);
78 25359fc4 2021-07-30 op static void excmd_clunk(const char **, int);
79 5ed7f718 2021-07-30 op static void excmd_flush(const char **, int);
80 29bc9fe5 2021-08-01 op static void excmd_walk(const char ** , int);
81 f16f7555 2021-12-15 op static void excmd_open(const char ** , int);
82 c7f145d4 2021-12-20 op static void excmd_create(const char ** , int);
83 f16f7555 2021-12-15 op static void excmd_read(const char ** , int);
84 c7f145d4 2021-12-20 op static void excmd_write(const char **, int);
85 9d5307de 2021-07-27 op static void excmd(const char **, int);
87 9cb5f957 2021-07-29 op static const char *pp_qid_type(uint8_t);
88 9cb5f957 2021-07-29 op static void pp_qid(const uint8_t *, uint32_t);
89 ff3a2c18 2021-07-29 op static void pp_msg(uint32_t, uint8_t, uint16_t, const uint8_t *);
90 de678634 2021-07-28 op static void handle_9p(const uint8_t *, size_t);
91 5c57fb10 2021-07-26 op static void clr(void);
92 27909800 2021-07-26 op static void prompt(void);
94 27909800 2021-07-26 op static void ATTR_DEAD
95 27909800 2021-07-26 op usage(int ret)
97 27909800 2021-07-26 op fprintf(stderr,
98 27909800 2021-07-26 op "usage: %s [-chv] [-C crt] [-K key] [-H host] [-P port]\n",
99 27909800 2021-07-26 op getprogname());
100 27909800 2021-07-26 op fprintf(stderr, PACKAGE_NAME " suite version " PACKAGE_VERSION "\n");
105 27909800 2021-07-26 op sig_handler(int sig, short event, void *d)
108 27909800 2021-07-26 op * Normal signal handler rules don't apply because libevent
109 27909800 2021-07-26 op * decouples for us.
112 27909800 2021-07-26 op switch (sig) {
114 27909800 2021-07-26 op case SIGTERM:
116 5c57fb10 2021-07-26 op log_warnx("Shutting down...");
117 27909800 2021-07-26 op event_loopbreak();
120 27909800 2021-07-26 op fatalx("unexpected signal %d", sig);
125 27909800 2021-07-26 op openconn(void)
127 27909800 2021-07-26 op struct addrinfo hints, *res, *res0;
129 27909800 2021-07-26 op int save_errno;
131 27909800 2021-07-26 op const char *cause = NULL;
133 27909800 2021-07-26 op memset(&hints, 0, sizeof(hints));
134 27909800 2021-07-26 op hints.ai_family = AF_UNSPEC;
135 27909800 2021-07-26 op hints.ai_socktype = SOCK_STREAM;
136 27909800 2021-07-26 op if ((error = getaddrinfo(host, port, &hints, &res0))) {
137 27909800 2021-07-26 op warnx("%s", gai_strerror(error));
142 27909800 2021-07-26 op for (res = res0; res; res = res->ai_next) {
143 27909800 2021-07-26 op s = socket(res->ai_family, res->ai_socktype,
144 27909800 2021-07-26 op res->ai_protocol);
145 27909800 2021-07-26 op if (s == -1) {
146 27909800 2021-07-26 op cause = "socket";
150 27909800 2021-07-26 op if (connect(s, res->ai_addr, res->ai_addrlen) == -1) {
151 27909800 2021-07-26 op cause = "connect";
152 27909800 2021-07-26 op save_errno = errno;
154 27909800 2021-07-26 op errno = save_errno;
162 27909800 2021-07-26 op freeaddrinfo(res0);
165 27909800 2021-07-26 op warn("%s", cause);
171 9d5307de 2021-07-27 op mark_nonblock(int fd)
175 9d5307de 2021-07-27 op if ((flags = fcntl(fd, F_GETFL)) == -1)
176 9d5307de 2021-07-27 op fatal("fcntl(F_GETFL)");
177 9d5307de 2021-07-27 op if (fcntl(fd, F_SETFL, flags | O_NONBLOCK) == -1)
178 9d5307de 2021-07-27 op fatal("fcntl(F_SETFL)");
182 27909800 2021-07-26 op tls_readcb(int fd, short event, void *d)
184 27909800 2021-07-26 op struct bufferevent *bufev = d;
185 27909800 2021-07-26 op char buf[IBUF_READ_SIZE];
186 27909800 2021-07-26 op int what = EVBUFFER_READ;
187 27909800 2021-07-26 op int howmuch = IBUF_READ_SIZE;
191 27909800 2021-07-26 op if (event == EV_TIMEOUT) {
192 27909800 2021-07-26 op what |= EVBUFFER_TIMEOUT;
196 27909800 2021-07-26 op if (bufev->wm_read.high != 0)
197 27909800 2021-07-26 op howmuch = MIN(sizeof(buf), bufev->wm_read.high);
199 27909800 2021-07-26 op switch (ret = tls_read(ctx, buf, howmuch)) {
200 27909800 2021-07-26 op case TLS_WANT_POLLIN:
201 27909800 2021-07-26 op case TLS_WANT_POLLOUT:
204 27909800 2021-07-26 op what |= EVBUFFER_ERROR;
209 27909800 2021-07-26 op if (len == 0) {
210 27909800 2021-07-26 op what |= EVBUFFER_EOF;
214 27909800 2021-07-26 op if (evbuffer_add(bufev->input, buf, len) == -1) {
215 27909800 2021-07-26 op what |= EVBUFFER_ERROR;
219 27909800 2021-07-26 op event_add(&bufev->ev_read, NULL);
221 27909800 2021-07-26 op len = EVBUFFER_LENGTH(bufev->input);
222 27909800 2021-07-26 op if (bufev->wm_read.low != 0 && len < bufev->wm_read.low)
224 27909800 2021-07-26 op if (bufev->readcb != NULL)
225 27909800 2021-07-26 op (*bufev->readcb)(bufev, bufev->cbarg);
229 27909800 2021-07-26 op event_add(&bufev->ev_read, NULL);
233 27909800 2021-07-26 op (*bufev->errorcb)(bufev, what, bufev->cbarg);
237 27909800 2021-07-26 op tls_writecb(int fd, short event, void *d)
239 27909800 2021-07-26 op struct bufferevent *bufev = d;
242 27909800 2021-07-26 op short what = EVBUFFER_WRITE;
245 27909800 2021-07-26 op if (event == EV_TIMEOUT) {
246 27909800 2021-07-26 op what |= EVBUFFER_TIMEOUT;
250 9991b526 2021-08-01 op len = EVBUFFER_LENGTH(bufev->output);
251 9991b526 2021-08-01 op if (len != 0) {
252 9991b526 2021-08-01 op data = EVBUFFER_DATA(bufev->output);
254 9991b526 2021-08-01 op #if DEBUG_PACKETS
255 9991b526 2021-08-01 op hexdump("outgoing msg", data, len);
258 9991b526 2021-08-01 op switch (ret = tls_write(ctx, data, len)) {
259 27909800 2021-07-26 op case TLS_WANT_POLLIN:
260 27909800 2021-07-26 op case TLS_WANT_POLLOUT:
263 27909800 2021-07-26 op what |= EVBUFFER_ERROR;
266 27909800 2021-07-26 op evbuffer_drain(bufev->output, ret);
269 27909800 2021-07-26 op if (EVBUFFER_LENGTH(bufev->output) != 0)
270 27909800 2021-07-26 op event_add(&bufev->ev_write, NULL);
272 27909800 2021-07-26 op if (bufev->writecb != NULL &&
273 27909800 2021-07-26 op EVBUFFER_LENGTH(bufev->output) <= bufev->wm_write.low)
274 27909800 2021-07-26 op (*bufev->writecb)(bufev, bufev->cbarg);
278 27909800 2021-07-26 op event_add(&bufev->ev_write, NULL);
281 27909800 2021-07-26 op (*bufev->errorcb)(bufev, what, bufev->cbarg);
285 9991b526 2021-08-01 op client_read(struct bufferevent *bev, void *d)
287 27909800 2021-07-26 op struct evbuffer *src = EVBUFFER_INPUT(bev);
288 27909800 2021-07-26 op uint32_t len;
289 9991b526 2021-08-01 op uint8_t *data;
292 ba4a37ea 2021-07-28 op if (EVBUFFER_LENGTH(src) < sizeof(len))
295 9991b526 2021-08-01 op data = EVBUFFER_DATA(src);
297 9991b526 2021-08-01 op memcpy(&len, data, sizeof(len));
298 27909800 2021-07-26 op len = le32toh(len);
300 c26e4201 2021-08-01 op if (len < HEADERSIZE)
301 c26e4201 2021-08-01 op fatal("incoming message is too small! (%d bytes)",
304 27909800 2021-07-26 op if (len > EVBUFFER_LENGTH(src))
307 9991b526 2021-08-01 op #if DEBUG_PACKETS
308 9991b526 2021-08-01 op hexdump("incoming msg", data, len);
311 9991b526 2021-08-01 op handle_9p(data, len);
312 27909800 2021-07-26 op evbuffer_drain(src, len);
317 27909800 2021-07-26 op client_write(struct bufferevent *bev, void *data)
319 27909800 2021-07-26 op return; /* nothing to do */
323 27909800 2021-07-26 op client_error(struct bufferevent *bev, short err, void *data)
325 27909800 2021-07-26 op if (err & EVBUFFER_ERROR)
326 27909800 2021-07-26 op fatal("buffer event error");
328 27909800 2021-07-26 op if (err & EVBUFFER_EOF) {
330 27909800 2021-07-26 op log_info("EOF");
331 27909800 2021-07-26 op event_loopbreak();
336 27909800 2021-07-26 op log_warnx("unknown event error");
337 27909800 2021-07-26 op event_loopbreak();
341 9d5307de 2021-07-27 op repl_read(struct bufferevent *bev, void *d)
345 9d5307de 2021-07-27 op const char *argv[10], **ap;
348 9d5307de 2021-07-27 op line = evbuffer_readln(bev->input, &len, EVBUFFER_EOL_LF);
349 9d5307de 2021-07-27 op if (line == NULL)
352 9d5307de 2021-07-27 op for (argc = 0, ap = argv; ap < &argv[9] &&
353 9d5307de 2021-07-27 op (*ap = strsep(&line, " \t")) != NULL;) {
354 9d5307de 2021-07-27 op if (**ap != '\0')
355 9d5307de 2021-07-27 op ap++, argc++;
359 9d5307de 2021-07-27 op excmd(argv, argc);
366 9d5307de 2021-07-27 op repl_error(struct bufferevent *bev, short error, void *d)
368 9d5307de 2021-07-27 op fatalx("an error occurred");
371 4e83b30f 2021-12-14 op static inline void
372 4e83b30f 2021-12-14 op do_send(void)
374 4e83b30f 2021-12-14 op bufferevent_write_buffer(bev, evb);
377 afaad60e 2021-07-29 op /* version [version-str] */
379 afaad60e 2021-07-29 op excmd_version(const char **argv, int argc)
381 afaad60e 2021-07-29 op const char *s;
383 afaad60e 2021-07-29 op s = VERSION9P;
384 afaad60e 2021-07-29 op if (argc == 2)
387 4e83b30f 2021-12-14 op tversion(s, MSIZE9P);
391 afaad60e 2021-07-29 op /* attach fid uname aname */
393 afaad60e 2021-07-29 op excmd_attach(const char **argv, int argc)
395 4e83b30f 2021-12-14 op uint32_t fid;
396 4e83b30f 2021-12-14 op const char *errstr;
398 afaad60e 2021-07-29 op if (argc != 4)
401 afaad60e 2021-07-29 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
402 afaad60e 2021-07-29 op if (errstr != NULL) {
403 afaad60e 2021-07-29 op log_warnx("fid is %s: %s", errstr, argv[1]);
407 4e83b30f 2021-12-14 op tattach(fid, NOFID, argv[2], argv[3]);
412 afaad60e 2021-07-29 op log_warnx("usage: attach fid uname aname");
415 25359fc4 2021-07-30 op /* clunk fid */
417 25359fc4 2021-07-30 op excmd_clunk(const char **argv, int argc)
419 4e83b30f 2021-12-14 op uint32_t fid;
420 25359fc4 2021-07-30 op const char *errstr;
422 25359fc4 2021-07-30 op if (argc != 2)
425 25359fc4 2021-07-30 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
426 25359fc4 2021-07-30 op if (errstr != NULL) {
427 25359fc4 2021-07-30 op log_warnx("fid is %s: %s", errstr, argv[1]);
436 25359fc4 2021-07-30 op log_warnx("usage: clunk fid");
439 5ed7f718 2021-07-30 op /* flush oldtag */
441 5ed7f718 2021-07-30 op excmd_flush(const char **argv, int argc)
443 5ed7f718 2021-07-30 op uint16_t oldtag;
444 5ed7f718 2021-07-30 op const char *errstr;
446 5ed7f718 2021-07-30 op if (argc != 2)
449 5ed7f718 2021-07-30 op oldtag = strtonum(argv[1], 0, UINT16_MAX, &errstr);
450 5ed7f718 2021-07-30 op if (errstr != NULL) {
451 5ed7f718 2021-07-30 op log_warnx("oldtag is %s: %s", errstr, argv[1]);
455 4e83b30f 2021-12-14 op tflush(oldtag);
460 5ed7f718 2021-07-30 op log_warnx("usage: flush oldtag");
463 29bc9fe5 2021-08-01 op /* walk fid newfid wnames... */
465 29bc9fe5 2021-08-01 op excmd_walk(const char **argv, int argc)
467 4e83b30f 2021-12-14 op uint32_t fid, newfid;
468 29bc9fe5 2021-08-01 op const char *errstr;
470 29bc9fe5 2021-08-01 op if (argc < 3)
473 29bc9fe5 2021-08-01 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
474 29bc9fe5 2021-08-01 op if (errstr != NULL) {
475 29bc9fe5 2021-08-01 op log_warnx("fid is %s: %s", errstr, argv[1]);
479 29bc9fe5 2021-08-01 op newfid = strtonum(argv[2], 0, UINT32_MAX, &errstr);
480 29bc9fe5 2021-08-01 op if (errstr != NULL) {
481 29bc9fe5 2021-08-01 op log_warnx("newfid is %s: %s", errstr, argv[1]);
485 4e83b30f 2021-12-14 op twalk(fid, newfid, argv + 3, argc - 3);
490 29bc9fe5 2021-08-01 op log_warnx("usage: walk fid newfid wnames...");
493 f16f7555 2021-12-15 op /* open fid mode [flag] */
495 f16f7555 2021-12-15 op excmd_open(const char **argv, int argc)
497 f16f7555 2021-12-15 op const char *errstr;
498 f16f7555 2021-12-15 op uint32_t fid;
499 f16f7555 2021-12-15 op uint8_t mode = 0;
501 f16f7555 2021-12-15 op if (argc != 3 && argc != 4)
504 f16f7555 2021-12-15 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
505 f16f7555 2021-12-15 op if (errstr != NULL) {
506 f16f7555 2021-12-15 op log_warnx("fid is %s: %s", errstr, argv[1]);
510 f16f7555 2021-12-15 op /* parse mode */
511 f16f7555 2021-12-15 op if (!strcmp("read", argv[2]) || !strcmp("r", argv[2]))
512 f16f7555 2021-12-15 op mode = KOREAD;
513 f16f7555 2021-12-15 op else if (!strcmp("write", argv[2]) || !strcmp("w", argv[2]))
514 f16f7555 2021-12-15 op mode = KOWRITE;
515 f16f7555 2021-12-15 op else if (!strcmp("readwrite", argv[2]) || !strcmp("rw", argv[2]))
516 f16f7555 2021-12-15 op mode = KORDWR;
518 f16f7555 2021-12-15 op log_warnx("invalid mode %s", argv[2]);
522 f16f7555 2021-12-15 op /* parse flag */
523 f16f7555 2021-12-15 op if (argv[3] != NULL) {
524 f16f7555 2021-12-15 op if (!strcmp("trunc", argv[3]))
525 f16f7555 2021-12-15 op mode |= KOTRUNC;
526 f16f7555 2021-12-15 op else if (!strcmp("rclose", argv[3]))
527 f16f7555 2021-12-15 op mode |= KORCLOSE;
529 f16f7555 2021-12-15 op log_warnx("invalid flag %s", argv[3]);
534 f16f7555 2021-12-15 op topen(fid, mode);
539 f16f7555 2021-12-15 op log_warnx("usage: open fid mode [flag]");
542 c7f145d4 2021-12-20 op /* create fid path perm mode */
544 c7f145d4 2021-12-20 op excmd_create(const char **argv, int argc)
546 c7f145d4 2021-12-20 op const char *errstr;
547 c7f145d4 2021-12-20 op uint32_t fid;
548 c7f145d4 2021-12-20 op uint8_t mode = 0;
550 c7f145d4 2021-12-20 op if (argc != 5)
553 c7f145d4 2021-12-20 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
554 c7f145d4 2021-12-20 op if (errstr != NULL) {
555 c7f145d4 2021-12-20 op log_warnx("fid is %s: %s", errstr, argv[1]);
559 c7f145d4 2021-12-20 op /* parse mode */
560 c7f145d4 2021-12-20 op if (!strcmp("write", argv[4]) || !strcmp("w", argv[4]))
561 c7f145d4 2021-12-20 op mode = KOWRITE;
562 c7f145d4 2021-12-20 op else if (!strcmp("readwrite", argv[4]) || !strcmp("rw", argv[4]))
563 c7f145d4 2021-12-20 op mode = KORDWR;
565 c7f145d4 2021-12-20 op log_warnx("invalid mode %s for create", argv[4]);
569 c7f145d4 2021-12-20 op tcreate(fid, argv[2], 0, mode);
574 c7f145d4 2021-12-20 op log_warnx("usage: create fid path perm mode ; perm is unused");
578 f16f7555 2021-12-15 op /* read fid offset count */
580 f16f7555 2021-12-15 op excmd_read(const char **argv, int argc)
582 f16f7555 2021-12-15 op uint64_t off;
583 f16f7555 2021-12-15 op uint32_t fid, count;
584 f16f7555 2021-12-15 op const char *errstr;
586 f16f7555 2021-12-15 op if (argc != 4)
589 f16f7555 2021-12-15 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
590 f16f7555 2021-12-15 op if (errstr != NULL) {
591 f16f7555 2021-12-15 op log_warnx("fid is %s: %s", errstr, argv[1]);
595 f16f7555 2021-12-15 op /* should really be UNT64_MAX but it fails... */
596 f16f7555 2021-12-15 op off = strtonum(argv[2], -1, UINT32_MAX, &errstr);
597 f16f7555 2021-12-15 op if (errstr != NULL) {
598 f16f7555 2021-12-15 op log_warnx("offset is %s: %s", errstr, argv[2]);
602 f16f7555 2021-12-15 op count = strtonum(argv[3], 0, UINT32_MAX, &errstr);
603 f16f7555 2021-12-15 op if (errstr != NULL) {
604 f16f7555 2021-12-15 op log_warnx("count is %s: %s", errstr, argv[3]);
608 f16f7555 2021-12-15 op tread(fid, off, count);
613 f16f7555 2021-12-15 op log_warnx("usage: read fid offset count");
616 c7f145d4 2021-12-20 op /* write fid offset content */
618 c7f145d4 2021-12-20 op excmd_write(const char **argv, int argc)
620 c7f145d4 2021-12-20 op uint64_t off;
621 c7f145d4 2021-12-20 op uint32_t fid, count;
622 c7f145d4 2021-12-20 op const char *errstr;
624 c7f145d4 2021-12-20 op if (argc != 4)
627 c7f145d4 2021-12-20 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
628 c7f145d4 2021-12-20 op if (errstr != NULL) {
629 c7f145d4 2021-12-20 op log_warnx("fid is %s: %s", errstr, argv[1]);
633 c7f145d4 2021-12-20 op /* should really be UINT64_MAX but... */
634 c7f145d4 2021-12-20 op off = strtonum(argv[2], 0, UINT32_MAX, &errstr);
635 c7f145d4 2021-12-20 op if (errstr != NULL) {
636 c7f145d4 2021-12-20 op log_warnx("offset is %s: %s", errstr, argv[2]);
640 c7f145d4 2021-12-20 op count = strlen(argv[3]);
641 c7f145d4 2021-12-20 op twrite(fid, off, argv[3], count);
646 c7f145d4 2021-12-20 op log_warnx("usage: write fid offset content");
649 c7f145d4 2021-12-20 op /* remove fid */
651 c7f145d4 2021-12-20 op excmd_remove(const char **argv, int argc)
653 c7f145d4 2021-12-20 op const char *errstr;
654 c7f145d4 2021-12-20 op uint32_t fid;
656 c7f145d4 2021-12-20 op if (argc != 2)
659 c7f145d4 2021-12-20 op fid = strtonum(argv[1], 0, UINT32_MAX, &errstr);
660 c7f145d4 2021-12-20 op if (errstr != NULL) {
661 c7f145d4 2021-12-20 op log_warnx("fid is %s: %s", errstr, argv[1]);
665 c7f145d4 2021-12-20 op tremove(fid);
670 c7f145d4 2021-12-20 op log_warnx("usage: remove fid");
674 afaad60e 2021-07-29 op excmd(const char **argv, int argc)
677 afaad60e 2021-07-29 op const char *name;
678 afaad60e 2021-07-29 op void (*fn)(const char **, int);
680 6b93b2b7 2021-07-29 op {"version", excmd_version},
681 6b93b2b7 2021-07-29 op {"attach", excmd_attach},
682 25359fc4 2021-07-30 op {"clunk", excmd_clunk},
683 5ed7f718 2021-07-30 op {"flush", excmd_flush},
684 29bc9fe5 2021-08-01 op {"walk", excmd_walk},
685 f16f7555 2021-12-15 op {"open", excmd_open},
686 c7f145d4 2021-12-20 op {"create", excmd_create},
687 f16f7555 2021-12-15 op {"read", excmd_read},
688 c7f145d4 2021-12-20 op {"write", excmd_write},
689 c7f145d4 2021-12-20 op /* TODO: stat */
690 c7f145d4 2021-12-20 op {"remove", excmd_remove},
694 a8802990 2021-07-30 op if (argc == 0)
697 afaad60e 2021-07-29 op for (i = 0; i < sizeof(cmds)/sizeof(cmds[0]); ++i) {
698 afaad60e 2021-07-29 op if (!strcmp(cmds[i].name, argv[0])) {
699 afaad60e 2021-07-29 op cmds[i].fn(argv, argc);
704 afaad60e 2021-07-29 op log_warnx("Unknown command %s", *argv);
707 9cb5f957 2021-07-29 op static const char *
708 9cb5f957 2021-07-29 op pp_qid_type(uint8_t type)
710 9cb5f957 2021-07-29 op switch (type) {
711 6b93b2b7 2021-07-29 op case QTDIR: return "dir";
712 6b93b2b7 2021-07-29 op case QTAPPEND: return "append-only";
713 6b93b2b7 2021-07-29 op case QTEXCL: return "exclusive";
714 6b93b2b7 2021-07-29 op case QTMOUNT: return "mounted-channel";
715 6b93b2b7 2021-07-29 op case QTAUTH: return "authentication";
716 6b93b2b7 2021-07-29 op case QTTMP: return "non-backed-up";
717 9cb5f957 2021-07-29 op case QTSYMLINK: return "symlink";
718 6b93b2b7 2021-07-29 op case QTFILE: return "file";
721 9cb5f957 2021-07-29 op return "unknown";
725 9cb5f957 2021-07-29 op pp_qid(const uint8_t *d, uint32_t len)
727 9cb5f957 2021-07-29 op uint64_t path;
728 9cb5f957 2021-07-29 op uint32_t vers;
729 9cb5f957 2021-07-29 op uint8_t type;
731 9cb5f957 2021-07-29 op if (len < 13) {
732 9cb5f957 2021-07-29 op printf("invalid");
738 9cb5f957 2021-07-29 op memcpy(&vers, d, sizeof(vers));
739 9cb5f957 2021-07-29 op d += sizeof(vers);
740 4fa53a98 2021-07-29 op vers = le64toh(vers);
742 d28f26db 2021-07-31 op memcpy(&path, d, sizeof(path));
743 d28f26db 2021-07-31 op d += sizeof(path);
744 d28f26db 2021-07-31 op path = le64toh(path);
746 787867cb 2021-07-30 op printf("qid{path=%"PRIu64" version=%"PRIu32" type=0x%x\"%s\"}",
747 9cb5f957 2021-07-29 op path, vers, type, pp_qid_type(type));
751 ff3a2c18 2021-07-29 op pp_msg(uint32_t len, uint8_t type, uint16_t tag, const uint8_t *d)
753 f16f7555 2021-12-15 op uint32_t msize, iounit, count;
754 f16f7555 2021-12-15 op uint16_t slen;
757 ff3a2c18 2021-07-29 op printf("len=%"PRIu32" type=%d[%s] tag=0x%x[%d] ", len,
758 ff3a2c18 2021-07-29 op type, pp_msg_type(type), tag, tag);
760 ff3a2c18 2021-07-29 op len -= HEADERSIZE;
762 ff3a2c18 2021-07-29 op switch (type) {
763 ff3a2c18 2021-07-29 op case Rversion:
764 ff3a2c18 2021-07-29 op if (len < 6) {
765 ff3a2c18 2021-07-29 op printf("invalid: not enough space for msize "
766 ff3a2c18 2021-07-29 op "and version provided.");
770 ff3a2c18 2021-07-29 op memcpy(&msize, d, sizeof(msize));
771 ff3a2c18 2021-07-29 op d += sizeof(msize);
772 ff3a2c18 2021-07-29 op len -= sizeof(msize);
773 ff3a2c18 2021-07-29 op msize = le32toh(msize);
775 ff3a2c18 2021-07-29 op memcpy(&slen, d, sizeof(slen));
776 ff3a2c18 2021-07-29 op d += sizeof(slen);
777 ff3a2c18 2021-07-29 op len -= sizeof(slen);
778 0a4b3ca8 2021-07-30 op slen = le16toh(slen);
780 ff3a2c18 2021-07-29 op if (len != slen) {
781 ff3a2c18 2021-07-29 op printf("invalid: version string length doesn't "
782 ff3a2c18 2021-07-29 op "match. Got %d; want %d", slen, len);
786 ff3a2c18 2021-07-29 op printf("msize=%"PRIu32" version[%"PRIu16"]=\"",
787 ff3a2c18 2021-07-29 op msize, slen);
788 ff3a2c18 2021-07-29 op fwrite(d, 1, slen, stdout);
789 ff3a2c18 2021-07-29 op printf("\"");
793 9cb5f957 2021-07-29 op case Rattach:
794 9cb5f957 2021-07-29 op pp_qid(d, len);
798 25359fc4 2021-07-30 op if (len != 0)
799 25359fc4 2021-07-30 op printf("invalid Rclunk: %"PRIu32" extra bytes", len);
803 5ed7f718 2021-07-30 op if (len != 0)
804 5ed7f718 2021-07-30 op printf("invalid Rflush: %"PRIu32" extra bytes", len);
808 ef44416c 2021-08-01 op if (len < 2) {
809 ef44416c 2021-08-01 op printf("invaild Rwalk: less than two bytes (%d)",
814 ef44416c 2021-08-01 op memcpy(&slen, d, sizeof(slen));
815 ef44416c 2021-08-01 op d += sizeof(slen);
816 ef44416c 2021-08-01 op len -= sizeof(slen);
817 ef44416c 2021-08-01 op slen = le16toh(slen);
819 ef44416c 2021-08-01 op if (len != QIDSIZE * slen) {
820 ef44416c 2021-08-01 op printf("invalid Rwalk: wanted %d bytes for %d qids "
821 ef44416c 2021-08-01 op "but got %"PRIu32" bytes instead",
822 ef44416c 2021-08-01 op QIDSIZE*slen, slen, len);
826 ef44416c 2021-08-01 op printf("nwqid=%"PRIu16, slen);
828 ef44416c 2021-08-01 op for (; slen != 0; slen--) {
830 ef44416c 2021-08-01 op pp_qid(d, len);
831 ef44416c 2021-08-01 op d += QIDSIZE;
832 ef44416c 2021-08-01 op len -= QIDSIZE;
838 c7f145d4 2021-12-20 op case Rcreate:
839 f16f7555 2021-12-15 op if (len != QIDSIZE + 4) {
840 c7f145d4 2021-12-20 op printf("invalid %s: expected %d bytes; "
841 c7f145d4 2021-12-20 op "got %u\n", pp_msg_type(type), QIDSIZE + 4, len);
845 f16f7555 2021-12-15 op pp_qid(d, len);
846 f16f7555 2021-12-15 op d += QIDSIZE;
847 f16f7555 2021-12-15 op len -= QIDSIZE;
849 f16f7555 2021-12-15 op memcpy(&iounit, d, sizeof(iounit));
850 f16f7555 2021-12-15 op d += sizeof(iounit);
851 f16f7555 2021-12-15 op len -= sizeof(iounit);
852 f16f7555 2021-12-15 op iounit = le32toh(iounit);
853 f16f7555 2021-12-15 op printf(" iounit=%"PRIu32, iounit);
857 f16f7555 2021-12-15 op if (len < sizeof(count)) {
858 f16f7555 2021-12-15 op printf("invalid Rread: expected %zu bytes at least; "
859 f16f7555 2021-12-15 op "got %u\n", sizeof(count), len);
863 f16f7555 2021-12-15 op memcpy(&count, d, sizeof(count));
864 f16f7555 2021-12-15 op d += sizeof(count);
865 f16f7555 2021-12-15 op len -= sizeof(count);
866 f16f7555 2021-12-15 op count = le32toh(count);
868 f16f7555 2021-12-15 op if (len != count) {
869 f16f7555 2021-12-15 op printf("invalid Rread: expected %d data bytes; "
870 f16f7555 2021-12-15 op "got %u\n", count, len);
874 f16f7555 2021-12-15 op /* allocates three extra bytes, oh well... */
875 f16f7555 2021-12-15 op if ((v = calloc(count + 1, 4)) == NULL)
876 f16f7555 2021-12-15 op fatal("calloc");
877 f16f7555 2021-12-15 op strvisx(v, d, count, VIS_SAFE | VIS_TAB | VIS_NL | VIS_CSTYLE);
878 f16f7555 2021-12-15 op printf("data=%s", v);
884 c7f145d4 2021-12-20 op if (len != sizeof(count)) {
885 c7f145d4 2021-12-20 op printf("invalid Rwrite: expected %zu data bytes; "
886 c7f145d4 2021-12-20 op "got %u\n", sizeof(count), len);
890 c7f145d4 2021-12-20 op memcpy(&count, d, sizeof(count));
891 c7f145d4 2021-12-20 op d += sizeof(count);
892 c7f145d4 2021-12-20 op len -= sizeof(count);
893 c7f145d4 2021-12-20 op count = le32toh(count);
895 c7f145d4 2021-12-20 op printf("count=%d", count);
898 c7f145d4 2021-12-20 op case Rremove:
899 c7f145d4 2021-12-20 op if (len != 0)
900 c7f145d4 2021-12-20 op printf("invalid Rremove: %"PRIu32" extra bytes", len);
904 8e504ac0 2021-07-30 op memcpy(&slen, d, sizeof(slen));
905 8e504ac0 2021-07-30 op d += sizeof(slen);
906 8e504ac0 2021-07-30 op len -= sizeof(slen);
907 8e504ac0 2021-07-30 op slen = le16toh(slen);
909 8e504ac0 2021-07-30 op if (slen != len) {
910 8e504ac0 2021-07-30 op printf("invalid: error string length doesn't "
911 8e504ac0 2021-07-30 op "match. Got %d; want %d", slen, len);
915 8e504ac0 2021-07-30 op printf("error=\"");
916 8e504ac0 2021-07-30 op fwrite(d, 1, slen, stdout);
917 8e504ac0 2021-07-30 op printf("\"");
922 f16f7555 2021-12-15 op if ((v = calloc(len + 1, 4)) == NULL)
923 f16f7555 2021-12-15 op fatal("calloc");
924 f16f7555 2021-12-15 op strvisx(v, d, len, VIS_SAFE | VIS_TAB | VIS_NL | VIS_CSTYLE);
925 f16f7555 2021-12-15 op printf("body=%s", v);
929 ff3a2c18 2021-07-29 op printf("\n");
933 de16f136 2021-07-28 op handle_9p(const uint8_t *data, size_t size)
935 de16f136 2021-07-28 op uint32_t len;
936 de16f136 2021-07-28 op uint16_t tag;
937 de16f136 2021-07-28 op uint8_t type;
939 de16f136 2021-07-28 op assert(size >= HEADERSIZE);
941 de16f136 2021-07-28 op memcpy(&len, data, sizeof(len));
942 de16f136 2021-07-28 op data += sizeof(len);
944 de16f136 2021-07-28 op memcpy(&type, data, sizeof(type));
945 de16f136 2021-07-28 op data += sizeof(type);
947 de16f136 2021-07-28 op memcpy(&tag, data, sizeof(tag));
948 de16f136 2021-07-28 op data += sizeof(tag);
950 de16f136 2021-07-28 op len = le32toh(len);
951 27909800 2021-07-26 op /* type is one byte long, no endianness issues */
952 de16f136 2021-07-28 op tag = le16toh(tag);
955 ff3a2c18 2021-07-29 op pp_msg(len, type, tag, data);
962 5c57fb10 2021-07-26 op printf("\r");
963 5c57fb10 2021-07-26 op fflush(stdout);
969 27909800 2021-07-26 op printf("%s", PROMPT);
970 27909800 2021-07-26 op fflush(stdout);
974 27909800 2021-07-26 op main(int argc, char **argv)
976 9d5307de 2021-07-27 op int ch, sock, handshake;
977 9d5307de 2021-07-27 op struct event ev_sigint, ev_sigterm;
979 27909800 2021-07-26 op signal(SIGPIPE, SIG_IGN);
981 27909800 2021-07-26 op while ((ch = getopt(argc, argv, "C:cH:hK:P:v")) != -1) {
982 27909800 2021-07-26 op switch (ch) {
984 27909800 2021-07-26 op crtpath = optarg;
990 27909800 2021-07-26 op host = optarg;
996 27909800 2021-07-26 op keypath = optarg;
999 27909800 2021-07-26 op port = optarg;
1002 27909800 2021-07-26 op verbose = 1;
1009 27909800 2021-07-26 op if (host == NULL)
1010 27909800 2021-07-26 op host = "localhost";
1011 27909800 2021-07-26 op if (port == NULL)
1012 27909800 2021-07-26 op port = "1337";
1014 27909800 2021-07-26 op argc -= optind;
1015 27909800 2021-07-26 op argv += optind;
1017 27909800 2021-07-26 op if (argc != 0)
1019 27909800 2021-07-26 op /* if (!tls || (crtpath != NULL || keypath != NULL)) */
1020 27909800 2021-07-26 op /* usage(1); */
1022 27909800 2021-07-26 op errx(1, "must enable tls (for now)");
1024 27909800 2021-07-26 op log_init(1, LOG_DAEMON);
1025 27909800 2021-07-26 op log_setverbose(verbose);
1026 27909800 2021-07-26 op log_procinit(getprogname());
1028 27909800 2021-07-26 op if ((tlsconf = tls_config_new()) == NULL)
1029 27909800 2021-07-26 op fatalx("tls_config_new");
1030 27909800 2021-07-26 op tls_config_insecure_noverifycert(tlsconf);
1031 27909800 2021-07-26 op tls_config_insecure_noverifyname(tlsconf);
1032 27909800 2021-07-26 op if (tls_config_set_keypair_file(tlsconf, crtpath, keypath) == -1)
1033 27909800 2021-07-26 op fatalx("can't load certs (%s, %s)", crtpath, keypath);
1035 27909800 2021-07-26 op if ((ctx = tls_client()) == NULL)
1036 27909800 2021-07-26 op fatal("tls_client");
1037 27909800 2021-07-26 op if (tls_configure(ctx, tlsconf) == -1)
1038 27909800 2021-07-26 op fatalx("tls_configure: %s", tls_error(ctx));
1040 27909800 2021-07-26 op log_info("connecting to %s:%s...", host, port);
1042 27909800 2021-07-26 op if ((sock = openconn()) == -1)
1043 27909800 2021-07-26 op fatalx("can't connect to %s:%s", host, port);
1045 27909800 2021-07-26 op if (tls_connect_socket(ctx, sock, host) == -1)
1046 27909800 2021-07-26 op fatalx("tls_connect_socket: %s", tls_error(ctx));
1048 27909800 2021-07-26 op for (handshake = 0; !handshake;) {
1049 27909800 2021-07-26 op switch (tls_handshake(ctx)) {
1051 27909800 2021-07-26 op fatalx("tls_handshake: %s", tls_error(ctx));
1053 27909800 2021-07-26 op handshake = 1;
1058 27909800 2021-07-26 op log_info("connected!");
1060 9d5307de 2021-07-27 op mark_nonblock(sock);
1062 27909800 2021-07-26 op event_init();
1064 4e83b30f 2021-12-14 op /* initialize global evb */
1065 4e83b30f 2021-12-14 op if ((evb = evbuffer_new()) == NULL)
1066 4e83b30f 2021-12-14 op fatal("evbuffer_new");
1068 27909800 2021-07-26 op signal_set(&ev_sigint, SIGINT, sig_handler, NULL);
1069 27909800 2021-07-26 op signal_set(&ev_sigterm, SIGINT, sig_handler, NULL);
1071 27909800 2021-07-26 op signal_add(&ev_sigint, NULL);
1072 27909800 2021-07-26 op signal_add(&ev_sigterm, NULL);
1074 27909800 2021-07-26 op bev = bufferevent_new(sock, client_read, client_write, client_error,
1076 27909800 2021-07-26 op if (bev == NULL)
1077 27909800 2021-07-26 op fatal("bufferevent_new");
1079 27909800 2021-07-26 op /* setup tls/io */
1080 27909800 2021-07-26 op event_set(&bev->ev_read, sock, EV_READ, tls_readcb, bev);
1081 27909800 2021-07-26 op event_set(&bev->ev_write, sock, EV_WRITE, tls_writecb, bev);
1083 27909800 2021-07-26 op bufferevent_enable(bev, EV_READ|EV_WRITE);
1085 9d5307de 2021-07-27 op mark_nonblock(0);
1086 9d5307de 2021-07-27 op inbev = bufferevent_new(0, repl_read, NULL, repl_error, NULL);
1087 9d5307de 2021-07-27 op bufferevent_enable(inbev, EV_READ);
1090 27909800 2021-07-26 op event_dispatch();
1092 27909800 2021-07-26 op bufferevent_free(bev);
1093 27909800 2021-07-26 op tls_free(ctx);
1094 27909800 2021-07-26 op tls_config_free(tlsconf);
1095 27909800 2021-07-26 op close(sock);