cpu.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113
  1. /*
  2. * cpu.c - Make a connection to a cpu server
  3. *
  4. * Invoked by listen as 'cpu -R | -N service net netdir'
  5. * by users as 'cpu [-h system] [-c cmd args ...]'
  6. */
  7. #include <u.h>
  8. #include <libc.h>
  9. #include <bio.h>
  10. #include <auth.h>
  11. #include <fcall.h>
  12. #include <libsec.h>
  13. #define Maxfdata 8192
  14. #define MaxStr 128
  15. void remoteside(int);
  16. void fatal(int, char*, ...);
  17. void lclnoteproc(int);
  18. void rmtnoteproc(void);
  19. void catcher(void*, char*);
  20. void usage(void);
  21. void writestr(int, char*, char*, int);
  22. int readstr(int, char*, int);
  23. char *rexcall(int*, char*, char*);
  24. int setamalg(char*);
  25. char *keyspec = "";
  26. int notechan;
  27. char *system;
  28. int cflag;
  29. int dbg;
  30. char *user;
  31. char *srvname = "ncpu";
  32. char *exportfs = "/bin/exportfs";
  33. char *ealgs = "rc4_256 sha1";
  34. /* message size for exportfs; may be larger so we can do big graphics in CPU window */
  35. int msgsize = Maxfdata+IOHDRSZ;
  36. /* authentication mechanisms */
  37. static int netkeyauth(int);
  38. static int netkeysrvauth(int, char*);
  39. static int p9auth(int);
  40. static int srvp9auth(int, char*);
  41. static int noauth(int);
  42. static int srvnoauth(int, char*);
  43. typedef struct AuthMethod AuthMethod;
  44. struct AuthMethod {
  45. char *name; /* name of method */
  46. int (*cf)(int); /* client side authentication */
  47. int (*sf)(int, char*); /* server side authentication */
  48. } authmethod[] =
  49. {
  50. { "p9", p9auth, srvp9auth,},
  51. { "netkey", netkeyauth, netkeysrvauth,},
  52. // { "none", noauth, srvnoauth,},
  53. { nil, nil}
  54. };
  55. AuthMethod *am = authmethod; /* default is p9 */
  56. char *p9authproto = "p9any";
  57. int setam(char*);
  58. void
  59. usage(void)
  60. {
  61. fprint(2, "usage: cpu [-h system] [-a authmethod] [-e 'crypt hash'] [-k keypattern] [-c cmd args ...]\n");
  62. exits("usage");
  63. }
  64. int fdd;
  65. void
  66. main(int argc, char **argv)
  67. {
  68. char dat[MaxStr], buf[MaxStr], cmd[MaxStr], *p, *err;
  69. int fd, ms, data;
  70. /* see if we should use a larger message size */
  71. fd = open("/dev/draw", OREAD);
  72. if(fd > 0){
  73. ms = iounit(fd);
  74. if(msgsize < ms+IOHDRSZ)
  75. msgsize = ms+IOHDRSZ;
  76. close(fd);
  77. }
  78. user = getuser();
  79. if(user == nil)
  80. fatal(1, "can't read user name");
  81. ARGBEGIN{
  82. case 'a':
  83. p = EARGF(usage());
  84. if(setam(p) < 0)
  85. fatal(0, "unknown auth method %s", p);
  86. break;
  87. case 'e':
  88. ealgs = EARGF(usage());
  89. if(*ealgs == 0 || strcmp(ealgs, "clear") == 0)
  90. ealgs = nil;
  91. break;
  92. case 'd':
  93. dbg++;
  94. break;
  95. case 'f':
  96. /* ignored but accepted for compatibility */
  97. break;
  98. case 'O':
  99. p9authproto = "p9sk2";
  100. remoteside(1); /* From listen */
  101. break;
  102. case 'R': /* From listen */
  103. remoteside(0);
  104. break;
  105. case 'h':
  106. system = EARGF(usage());
  107. break;
  108. case 'c':
  109. cflag++;
  110. cmd[0] = '!';
  111. cmd[1] = '\0';
  112. while(p = ARGF()) {
  113. strcat(cmd, " ");
  114. strcat(cmd, p);
  115. }
  116. break;
  117. case 'k':
  118. keyspec = EARGF(usage());
  119. break;
  120. default:
  121. usage();
  122. }ARGEND;
  123. if(argc != 0)
  124. usage();
  125. if(system == nil) {
  126. p = getenv("cpu");
  127. if(p == 0)
  128. fatal(0, "set $cpu");
  129. system = p;
  130. }
  131. if(err = rexcall(&data, system, srvname))
  132. fatal(1, "%s: %s", err, system);
  133. /* Tell the remote side the command to execute and where our working directory is */
  134. if(cflag)
  135. writestr(data, cmd, "command", 0);
  136. if(getwd(dat, sizeof(dat)) == 0)
  137. writestr(data, "NO", "dir", 0);
  138. else
  139. writestr(data, dat, "dir", 0);
  140. /* start up a process to pass along notes */
  141. lclnoteproc(data);
  142. /*
  143. * Wait for the other end to execute and start our file service
  144. * of /mnt/term
  145. */
  146. if(readstr(data, buf, sizeof(buf)) < 0)
  147. fatal(1, "waiting for FS");
  148. if(strncmp("FS", buf, 2) != 0) {
  149. print("remote cpu: %s", buf);
  150. exits(buf);
  151. }
  152. /* Begin serving the gnot namespace */
  153. close(0);
  154. dup(data, 0);
  155. close(data);
  156. sprint(buf, "%d", msgsize);
  157. if(dbg)
  158. execl(exportfs, exportfs, "-dm", buf, 0);
  159. else
  160. execl(exportfs, exportfs, "-m", buf, 0);
  161. fatal(1, "starting exportfs");
  162. }
  163. void
  164. fatal(int syserr, char *fmt, ...)
  165. {
  166. Fmt f;
  167. char *str;
  168. va_list arg;
  169. fmtstrinit(&f);
  170. fmtprint(&f, "cpu: ");
  171. va_start(arg, fmt);
  172. fmtvprint(&f, fmt, arg);
  173. va_end(arg);
  174. if(syserr)
  175. fmtprint(&f, ": %r");
  176. fmtprint(&f, "\n");
  177. str = fmtstrflush(&f);
  178. write(2, str, strlen(str));
  179. exits(str);
  180. }
  181. char *negstr = "negotiating authentication method";
  182. char bug[256];
  183. int
  184. old9p(int fd)
  185. {
  186. int p[2];
  187. if(pipe(p) < 0)
  188. fatal(1, "pipe");
  189. switch(rfork(RFPROC|RFFDG|RFNAMEG)) {
  190. case -1:
  191. fatal(1, "rfork srvold9p");
  192. case 0:
  193. if(fd != 1){
  194. dup(fd, 1);
  195. close(fd);
  196. }
  197. if(p[0] != 0){
  198. dup(p[0], 0);
  199. close(p[0]);
  200. }
  201. close(p[1]);
  202. if(0){
  203. fd = open("/sys/log/cpu", OWRITE);
  204. if(fd != 2){
  205. dup(fd, 2);
  206. close(fd);
  207. }
  208. execl("/bin/srvold9p", "srvold9p", "-ds", 0);
  209. } else
  210. execl("/bin/srvold9p", "srvold9p", "-s", 0);
  211. fatal(1, "exec srvold9p");
  212. default:
  213. close(fd);
  214. close(p[0]);
  215. }
  216. return p[1];
  217. }
  218. /* Invoked with stdin, stdout and stderr connected to the network connection */
  219. void
  220. remoteside(int old)
  221. {
  222. char user[MaxStr], home[MaxStr], buf[MaxStr], xdir[MaxStr], cmd[MaxStr];
  223. int i, n, fd, badchdir, gotcmd;
  224. fd = 0;
  225. /* negotiate authentication mechanism */
  226. n = readstr(fd, cmd, sizeof(cmd));
  227. if(n < 0)
  228. fatal(1, "authenticating");
  229. if(setamalg(cmd) < 0){
  230. writestr(fd, "unsupported auth method", nil, 0);
  231. fatal(1, "bad auth method %s", cmd);
  232. } else
  233. writestr(fd, "", "", 1);
  234. fd = (*am->sf)(fd, user);
  235. if(fd < 0)
  236. fatal(1, "srvauth");
  237. /* Set environment values for the user */
  238. putenv("user", user);
  239. sprint(home, "/usr/%s", user);
  240. putenv("home", home);
  241. /* Now collect invoking cpu's current directory or possibly a command */
  242. gotcmd = 0;
  243. if(readstr(fd, xdir, sizeof(xdir)) < 0)
  244. fatal(1, "dir/cmd");
  245. if(xdir[0] == '!') {
  246. strcpy(cmd, &xdir[1]);
  247. gotcmd = 1;
  248. if(readstr(fd, xdir, sizeof(xdir)) < 0)
  249. fatal(1, "dir");
  250. }
  251. /* Establish the new process at the current working directory of the
  252. * gnot */
  253. badchdir = 0;
  254. if(strcmp(xdir, "NO") == 0)
  255. chdir(home);
  256. else if(chdir(xdir) < 0) {
  257. badchdir = 1;
  258. chdir(home);
  259. }
  260. /* Start the gnot serving its namespace */
  261. writestr(fd, "FS", "FS", 0);
  262. writestr(fd, "/", "exportfs dir", 0);
  263. n = read(fd, buf, sizeof(buf));
  264. if(n != 2 || buf[0] != 'O' || buf[1] != 'K')
  265. exits("remote tree");
  266. if(old)
  267. fd = old9p(fd);
  268. /* make sure buffers are big by doing fversion explicitly; pick a huge number; other side will trim */
  269. strcpy(buf, VERSION9P);
  270. if(fversion(fd, 64*1024, buf, sizeof buf) < 0)
  271. exits("fversion failed");
  272. if(mount(fd, -1, "/mnt/term", MCREATE|MREPL, "") < 0)
  273. exits("mount failed");
  274. close(fd);
  275. /* the remote noteproc uses the mount so it must follow it */
  276. rmtnoteproc();
  277. for(i = 0; i < 3; i++)
  278. close(i);
  279. if(open("/mnt/term/dev/cons", OREAD) != 0)
  280. exits("open stdin");
  281. if(open("/mnt/term/dev/cons", OWRITE) != 1)
  282. exits("open stdout");
  283. dup(1, 2);
  284. if(badchdir)
  285. print("cpu: failed to chdir to '%s'\n", xdir);
  286. if(gotcmd)
  287. execl("/bin/rc", "rc", "-lc", cmd, 0);
  288. else
  289. execl("/bin/rc", "rc", "-li", 0);
  290. fatal(1, "exec shell");
  291. }
  292. char*
  293. rexcall(int *fd, char *host, char *service)
  294. {
  295. char *na;
  296. char dir[MaxStr];
  297. char err[ERRMAX];
  298. char msg[MaxStr];
  299. int n;
  300. na = netmkaddr(host, 0, service);
  301. if((*fd = dial(na, 0, dir, 0)) < 0)
  302. return "can't dial";
  303. /* negotiate authentication mechanism */
  304. if(ealgs != nil)
  305. snprint(msg, sizeof(msg), "%s %s", am->name, ealgs);
  306. else
  307. snprint(msg, sizeof(msg), "%s", am->name);
  308. writestr(*fd, msg, negstr, 0);
  309. n = readstr(*fd, err, sizeof err);
  310. if(n < 0)
  311. return negstr;
  312. if(*err){
  313. werrstr(err);
  314. return negstr;
  315. }
  316. /* authenticate */
  317. *fd = (*am->cf)(*fd);
  318. if(*fd < 0)
  319. return "can't authenticate";
  320. return 0;
  321. }
  322. void
  323. writestr(int fd, char *str, char *thing, int ignore)
  324. {
  325. int l, n;
  326. l = strlen(str);
  327. n = write(fd, str, l+1);
  328. if(!ignore && n < 0)
  329. fatal(1, "writing network: %s", thing);
  330. }
  331. int
  332. readstr(int fd, char *str, int len)
  333. {
  334. int n;
  335. while(len) {
  336. n = read(fd, str, 1);
  337. if(n < 0)
  338. return -1;
  339. if(*str == '\0')
  340. return 0;
  341. str++;
  342. len--;
  343. }
  344. return -1;
  345. }
  346. static int
  347. readln(char *buf, int n)
  348. {
  349. int i;
  350. char *p;
  351. n--; /* room for \0 */
  352. p = buf;
  353. for(i=0; i<n; i++){
  354. if(read(0, p, 1) != 1)
  355. break;
  356. if(*p == '\n' || *p == '\r')
  357. break;
  358. p++;
  359. }
  360. *p = '\0';
  361. return p-buf;
  362. }
  363. /*
  364. * user level challenge/response
  365. */
  366. static int
  367. netkeyauth(int fd)
  368. {
  369. char chall[32];
  370. char resp[32];
  371. strecpy(chall, chall+sizeof chall, getuser());
  372. print("user[%s]: ", chall);
  373. if(readln(resp, sizeof(resp)) < 0)
  374. return -1;
  375. if(*resp != 0)
  376. strcpy(chall, resp);
  377. writestr(fd, chall, "challenge/response", 1);
  378. for(;;){
  379. if(readstr(fd, chall, sizeof chall) < 0)
  380. break;
  381. if(*chall == 0)
  382. return fd;
  383. print("challenge: %s\nresponse: ", chall);
  384. if(readln(resp, sizeof(resp)) < 0)
  385. break;
  386. writestr(fd, resp, "challenge/response", 1);
  387. }
  388. return -1;
  389. }
  390. static int
  391. netkeysrvauth(int fd, char *user)
  392. {
  393. char response[32];
  394. Chalstate *ch;
  395. int tries;
  396. AuthInfo *ai;
  397. if(readstr(fd, user, 32) < 0)
  398. return -1;
  399. ai = nil;
  400. ch = nil;
  401. for(tries = 0; tries < 10; tries++){
  402. if((ch = auth_challenge("proto=p9cr role=server user=%q", user)) == nil)
  403. return -1;
  404. writestr(fd, ch->chal, "challenge", 1);
  405. if(readstr(fd, response, sizeof response) < 0)
  406. return -1;
  407. ch->resp = response;
  408. ch->nresp = strlen(response);
  409. if((ai = auth_response(ch)) != nil)
  410. break;
  411. }
  412. auth_freechal(ch);
  413. if(ai == nil)
  414. return -1;
  415. writestr(fd, "", "challenge", 1);
  416. if(auth_chuid(ai, 0) < 0)
  417. fatal(1, "newns");
  418. auth_freeAI(ai);
  419. return fd;
  420. }
  421. static void
  422. mksecret(char *t, uchar *f)
  423. {
  424. sprint(t, "%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux",
  425. f[0], f[1], f[2], f[3], f[4], f[5], f[6], f[7], f[8], f[9]);
  426. }
  427. /*
  428. * plan9 authentication followed by rc4 encryption
  429. */
  430. static int
  431. p9auth(int fd)
  432. {
  433. uchar key[16];
  434. uchar digest[SHA1dlen];
  435. char fromclientsecret[21];
  436. char fromserversecret[21];
  437. int i;
  438. AuthInfo *ai;
  439. ai = auth_proxy(fd, auth_getkey, "proto=%q role=client %s", p9authproto, keyspec);
  440. if(ai == nil)
  441. return -1;
  442. memmove(key+4, ai->secret, ai->nsecret);
  443. if(ealgs == nil)
  444. return fd;
  445. /* exchange random numbers */
  446. srand(truerand());
  447. for(i = 0; i < 4; i++)
  448. key[i] = rand();
  449. if(write(fd, key, 4) != 4)
  450. return -1;
  451. if(readn(fd, key+12, 4) != 4)
  452. return -1;
  453. /* scramble into two secrets */
  454. sha1(key, sizeof(key), digest, nil);
  455. mksecret(fromclientsecret, digest);
  456. mksecret(fromserversecret, digest+10);
  457. /* set up encryption */
  458. i = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
  459. if(i < 0)
  460. werrstr("can't establish ssl connection: %r");
  461. return i;
  462. }
  463. static int
  464. noauth(int fd)
  465. {
  466. ealgs = nil;
  467. return fd;
  468. }
  469. static int
  470. srvnoauth(int fd, char *user)
  471. {
  472. strecpy(user, user+MaxStr, getuser());
  473. ealgs = nil;
  474. return fd;
  475. }
  476. void
  477. loghex(uchar *p, int n)
  478. {
  479. char buf[100];
  480. int i;
  481. for(i = 0; i < n; i++)
  482. sprint(buf+2*i, "%2.2ux", p[i]);
  483. syslog(0, "cpu", buf);
  484. }
  485. static int
  486. srvp9auth(int fd, char *user)
  487. {
  488. uchar key[16];
  489. uchar digest[SHA1dlen];
  490. char fromclientsecret[21];
  491. char fromserversecret[21];
  492. int i;
  493. AuthInfo *ai;
  494. ai = auth_proxy(0, nil, "proto=%q role=server %s", p9authproto, keyspec);
  495. if(ai == nil)
  496. return -1;
  497. if(auth_chuid(ai, nil) < 0)
  498. return -1;
  499. strecpy(user, user+MaxStr, ai->cuid);
  500. memmove(key+4, ai->secret, ai->nsecret);
  501. if(ealgs == nil)
  502. return fd;
  503. /* exchange random numbers */
  504. srand(truerand());
  505. for(i = 0; i < 4; i++)
  506. key[i+12] = rand();
  507. if(readn(fd, key, 4) != 4)
  508. return -1;
  509. if(write(fd, key+12, 4) != 4)
  510. return -1;
  511. /* scramble into two secrets */
  512. sha1(key, sizeof(key), digest, nil);
  513. mksecret(fromclientsecret, digest);
  514. mksecret(fromserversecret, digest+10);
  515. /* set up encryption */
  516. i = pushssl(fd, ealgs, fromserversecret, fromclientsecret, nil);
  517. if(i < 0)
  518. werrstr("can't establish ssl connection: %r");
  519. return i;
  520. }
  521. /*
  522. * set authentication mechanism
  523. */
  524. int
  525. setam(char *name)
  526. {
  527. for(am = authmethod; am->name != nil; am++)
  528. if(strcmp(am->name, name) == 0)
  529. return 0;
  530. am = authmethod;
  531. return -1;
  532. }
  533. /*
  534. * set authentication mechanism and encryption/hash algs
  535. */
  536. int
  537. setamalg(char *s)
  538. {
  539. ealgs = strchr(s, ' ');
  540. if(ealgs != nil)
  541. *ealgs++ = 0;
  542. return setam(s);
  543. }
  544. char *rmtnotefile = "/mnt/term/dev/cpunote";
  545. /*
  546. * loop reading /mnt/term/dev/note looking for notes.
  547. * The child returns to start the shell.
  548. */
  549. void
  550. rmtnoteproc(void)
  551. {
  552. int n, fd, pid, notepid;
  553. char buf[256];
  554. /* new proc returns to start shell */
  555. pid = rfork(RFPROC|RFFDG|RFNOTEG|RFNAMEG|RFMEM);
  556. switch(pid){
  557. case -1:
  558. syslog(0, "cpu", "cpu -R: can't start noteproc: %r");
  559. return;
  560. case 0:
  561. return;
  562. }
  563. /* new proc reads notes from other side and posts them to shell */
  564. switch(notepid = rfork(RFPROC|RFFDG|RFMEM)){
  565. case -1:
  566. syslog(0, "cpu", "cpu -R: can't start wait proc: %r");
  567. _exits(0);
  568. case 0:
  569. fd = open(rmtnotefile, OREAD);
  570. if(fd < 0){
  571. syslog(0, "cpu", "cpu -R: can't open %s", rmtnotefile);
  572. _exits(0);
  573. }
  574. for(;;){
  575. n = read(fd, buf, sizeof(buf)-1);
  576. if(n <= 0){
  577. postnote(PNGROUP, pid, "hangup");
  578. _exits(0);
  579. }
  580. buf[n] = 0;
  581. postnote(PNGROUP, pid, buf);
  582. }
  583. break;
  584. }
  585. /* original proc waits for shell proc to die and kills note proc */
  586. for(;;){
  587. n = waitpid();
  588. if(n < 0 || n == pid)
  589. break;
  590. }
  591. postnote(PNPROC, notepid, "kill");
  592. _exits(0);
  593. }
  594. enum
  595. {
  596. Qdir,
  597. Qcpunote,
  598. Nfid = 32,
  599. };
  600. struct {
  601. char *name;
  602. Qid qid;
  603. ulong perm;
  604. } fstab[] =
  605. {
  606. [Qdir] { ".", {Qdir, 0, QTDIR}, DMDIR|0555 },
  607. [Qcpunote] { "cpunote", {Qcpunote, 0}, 0444 },
  608. };
  609. typedef struct Note Note;
  610. struct Note
  611. {
  612. Note *next;
  613. char msg[ERRMAX];
  614. };
  615. typedef struct Request Request;
  616. struct Request
  617. {
  618. Request *next;
  619. Fcall f;
  620. };
  621. typedef struct Fid Fid;
  622. struct Fid
  623. {
  624. int fid;
  625. int file;
  626. };
  627. Fid fids[Nfid];
  628. struct {
  629. Lock;
  630. Note *nfirst, *nlast;
  631. Request *rfirst, *rlast;
  632. } nfs;
  633. int
  634. fsreply(int fd, Fcall *f)
  635. {
  636. uchar buf[IOHDRSZ+Maxfdata];
  637. int n;
  638. if(dbg)
  639. fprint(2, "<-%F\n", f);
  640. n = convS2M(f, buf, sizeof buf);
  641. if(n > 0){
  642. if(write(fd, buf, n) != n){
  643. close(fd);
  644. return -1;
  645. }
  646. }
  647. return 0;
  648. }
  649. /* match a note read request with a note, reply to the request */
  650. int
  651. kick(int fd)
  652. {
  653. Request *rp;
  654. Note *np;
  655. int rv;
  656. for(;;){
  657. lock(&nfs);
  658. rp = nfs.rfirst;
  659. np = nfs.nfirst;
  660. if(rp == nil || np == nil){
  661. unlock(&nfs);
  662. break;
  663. }
  664. nfs.rfirst = rp->next;
  665. nfs.nfirst = np->next;
  666. unlock(&nfs);
  667. rp->f.type = Rread;
  668. rp->f.count = strlen(np->msg);
  669. rp->f.data = np->msg;
  670. rv = fsreply(fd, &rp->f);
  671. free(rp);
  672. free(np);
  673. if(rv < 0)
  674. return -1;
  675. }
  676. return 0;
  677. }
  678. void
  679. flushreq(int tag)
  680. {
  681. Request **l, *rp;
  682. lock(&nfs);
  683. for(l = &nfs.rfirst; *l != nil; l = &(*l)->next){
  684. rp = *l;
  685. if(rp->f.tag == tag){
  686. *l = rp->next;
  687. unlock(&nfs);
  688. free(rp);
  689. return;
  690. }
  691. }
  692. unlock(&nfs);
  693. }
  694. Fid*
  695. getfid(int fid)
  696. {
  697. int i, freefid;
  698. freefid = -1;
  699. for(i = 0; i < Nfid; i++){
  700. if(freefid < 0 && fids[i].file < 0)
  701. freefid = i;
  702. if(fids[i].fid == fid)
  703. return &fids[i];
  704. }
  705. if(freefid >= 0){
  706. fids[freefid].fid = fid;
  707. return &fids[freefid];
  708. }
  709. return nil;
  710. }
  711. int
  712. fsstat(int fd, Fid *fid, Fcall *f)
  713. {
  714. Dir d;
  715. uchar statbuf[256];
  716. memset(&d, 0, sizeof(d));
  717. d.name = fstab[fid->file].name;
  718. d.uid = user;
  719. d.gid = user;
  720. d.muid = user;
  721. d.qid = fstab[fid->file].qid;
  722. d.mode = fstab[fid->file].perm;
  723. d.atime = d.mtime = time(0);
  724. f->stat = statbuf;
  725. f->nstat = convD2M(&d, statbuf, sizeof statbuf);
  726. return fsreply(fd, f);
  727. }
  728. int
  729. fsread(int fd, Fid *fid, Fcall *f)
  730. {
  731. Dir d;
  732. uchar buf[256];
  733. Request *rp;
  734. switch(fid->file){
  735. default:
  736. return -1;
  737. case Qdir:
  738. if(f->offset == 0 && f->count >0){
  739. memset(&d, 0, sizeof(d));
  740. d.name = fstab[Qcpunote].name;
  741. d.uid = user;
  742. d.gid = user;
  743. d.muid = user;
  744. d.qid = fstab[Qcpunote].qid;
  745. d.mode = fstab[Qcpunote].perm;
  746. d.atime = d.mtime = time(0);
  747. f->count = convD2M(&d, buf, sizeof buf);
  748. f->data = (char*)buf;
  749. } else
  750. f->count = 0;
  751. return fsreply(fd, f);
  752. case Qcpunote:
  753. rp = mallocz(sizeof(*rp), 1);
  754. if(rp == nil)
  755. return -1;
  756. rp->f = *f;
  757. lock(&nfs);
  758. if(nfs.rfirst == nil)
  759. nfs.rfirst = rp;
  760. else
  761. nfs.rlast->next = rp;
  762. nfs.rlast = rp;
  763. unlock(&nfs);
  764. return kick(fd);;
  765. }
  766. }
  767. char Eperm[] = "permission denied";
  768. char Enofile[] = "out of files";
  769. char Enotdir[] = "not a directory";
  770. void
  771. notefs(int fd)
  772. {
  773. uchar buf[IOHDRSZ+Maxfdata];
  774. int i, j, n;
  775. char err[ERRMAX];
  776. Fcall f;
  777. Fid *fid, *nfid;
  778. int doreply;
  779. rfork(RFNOTEG);
  780. fmtinstall('F', fcallfmt);
  781. for(n = 0; n < Nfid; n++)
  782. fids[n].file = -1;
  783. for(;;){
  784. n = read9pmsg(fd, buf, sizeof(buf));
  785. if(n <= 0){
  786. if(dbg)
  787. fprint(2, "read9pmsg(%d) returns %d: %r\n", fd, n);
  788. break;
  789. }
  790. if(convM2S(buf, n, &f) < 0)
  791. break;
  792. if(dbg)
  793. fprint(2, "->%F\n", &f);
  794. doreply = 1;
  795. fid = getfid(f.fid);
  796. if(fid == nil){
  797. nofids:
  798. f.type = Rerror;
  799. f.ename = Enofile;
  800. fsreply(fd, &f);
  801. continue;
  802. }
  803. switch(f.type++){
  804. default:
  805. f.type = Rerror;
  806. f.ename = "unknown type";
  807. break;
  808. case Tflush:
  809. flushreq(f.oldtag);
  810. break;
  811. case Tversion:
  812. if(f.msize > IOHDRSZ+Maxfdata)
  813. f.msize = IOHDRSZ+Maxfdata;
  814. break;
  815. case Tauth:
  816. f.type = Rerror;
  817. f.ename = "cpu: authentication not required";
  818. break;
  819. case Tattach:
  820. f.qid = fstab[Qdir].qid;
  821. fid->file = Qdir;
  822. break;
  823. case Twalk:
  824. nfid = nil;
  825. if(f.newfid != f.fid){
  826. nfid = getfid(f.newfid);
  827. if(nfid == nil)
  828. goto nofids;
  829. nfid->file = fid->file;
  830. fid = nfid;
  831. }
  832. f.ename = nil;
  833. for(i=0; i<f.nwname; i++){
  834. if(i > MAXWELEM){
  835. f.type = Rerror;
  836. f.ename = "too many name elements";
  837. break;
  838. }
  839. if(fid->file != Qdir){
  840. f.type = Rerror;
  841. f.ename = Enotdir;
  842. break;
  843. }
  844. if(strcmp(f.wname[i], "cpunote") == 0){
  845. fid->file = Qcpunote;
  846. f.wqid[i] = fstab[Qcpunote].qid;
  847. continue;
  848. }
  849. f.type = Rerror;
  850. f.ename = err;
  851. strcpy(err, "cpu: file \"");
  852. for(j=0; j<=i; j++){
  853. if(strlen(err)+1+strlen(f.wname[j])+32 > sizeof err)
  854. break;
  855. if(j != 0)
  856. strcat(err, "/");
  857. strcat(err, f.wname[j]);
  858. }
  859. strcat(err, "\" does not exist");
  860. break;
  861. }
  862. if(nfid != nil && (f.ename != nil || i < f.nwname))
  863. nfid ->file = -1;
  864. if(f.type != Rerror)
  865. f.nwqid = i;
  866. break;
  867. case Topen:
  868. if(f.mode != OREAD){
  869. f.type = Rerror;
  870. f.ename = Eperm;
  871. }
  872. f.qid = fstab[fid->file].qid;
  873. break;
  874. case Tcreate:
  875. f.type = Rerror;
  876. f.ename = Eperm;
  877. break;
  878. case Tread:
  879. if(fsread(fd, fid, &f) < 0)
  880. goto err;
  881. doreply = 0;
  882. break;
  883. case Twrite:
  884. f.type = Rerror;
  885. f.ename = Eperm;
  886. break;
  887. case Tclunk:
  888. fid->file = -1;
  889. break;
  890. case Tremove:
  891. f.type = Rerror;
  892. f.ename = Eperm;
  893. break;
  894. case Tstat:
  895. if(fsstat(fd, fid, &f) < 0)
  896. goto err;
  897. doreply = 0;
  898. break;
  899. case Twstat:
  900. f.type = Rerror;
  901. f.ename = Eperm;
  902. break;
  903. }
  904. if(doreply)
  905. if(fsreply(fd, &f) < 0)
  906. break;
  907. }
  908. err:
  909. if(dbg)
  910. fprint(2, "notefs exiting: %r\n");
  911. close(fd);
  912. }
  913. char notebuf[ERRMAX];
  914. void
  915. catcher(void*, char *text)
  916. {
  917. int n;
  918. n = strlen(text);
  919. if(n >= sizeof(notebuf))
  920. n = sizeof(notebuf)-1;
  921. memmove(notebuf, text, n);
  922. notebuf[n] = '\0';
  923. noted(NCONT);
  924. }
  925. /*
  926. * mount in /dev a note file for the remote side to read.
  927. */
  928. void
  929. lclnoteproc(int netfd)
  930. {
  931. int exportfspid;
  932. Waitmsg *w;
  933. Note *np;
  934. int pfd[2];
  935. if(pipe(pfd) < 0){
  936. fprint(2, "cpu: can't start note proc: pipe: %r\n");
  937. return;
  938. }
  939. /* new proc mounts and returns to start exportfs */
  940. switch(exportfspid = rfork(RFPROC|RFNAMEG|RFFDG|RFMEM)){
  941. case -1:
  942. fprint(2, "cpu: can't start note proc: rfork: %r\n");
  943. return;
  944. case 0:
  945. close(pfd[0]);
  946. if(mount(pfd[1], -1, "/dev", MBEFORE, "") < 0)
  947. fprint(2, "cpu: can't mount note proc: %r\n");
  948. close(pfd[1]);
  949. return;
  950. }
  951. close(netfd);
  952. close(pfd[1]);
  953. /* new proc listens for note file system rpc's */
  954. switch(rfork(RFPROC|RFNAMEG|RFMEM)){
  955. case -1:
  956. fprint(2, "cpu: can't start note proc: rfork1: %r\n");
  957. _exits(0);
  958. case 0:
  959. notefs(pfd[0]);
  960. _exits(0);
  961. }
  962. /* original proc waits for notes */
  963. notify(catcher);
  964. w = nil;
  965. for(;;) {
  966. *notebuf = 0;
  967. free(w);
  968. w = wait();
  969. if(w == nil) {
  970. if(*notebuf == 0)
  971. break;
  972. np = mallocz(sizeof(Note), 1);
  973. if(np != nil){
  974. strcpy(np->msg, notebuf);
  975. lock(&nfs);
  976. if(nfs.nfirst == nil)
  977. nfs.nfirst = np;
  978. else
  979. nfs.nlast->next = np;
  980. nfs.nlast = np;
  981. unlock(&nfs);
  982. kick(pfd[0]);
  983. }
  984. unlock(&nfs);
  985. } else if(w->pid == exportfspid)
  986. break;
  987. }
  988. if(w == nil)
  989. exits(nil);
  990. exits(w->msg);
  991. }