cpu.c 20 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115
  1. /*
  2. * cpu.c - Make a connection to a cpu server
  3. *
  4. * Invoked by listen as 'cpu -R | -N service net netdir'
  5. * by users as 'cpu [-h system] [-c cmd args ...]'
  6. */
  7. #include <u.h>
  8. #include <libc.h>
  9. #include <bio.h>
  10. #include <auth.h>
  11. #include <fcall.h>
  12. #include <libsec.h>
  13. #define Maxfdata 8192
  14. void remoteside(int);
  15. void fatal(int, char*, ...);
  16. void lclnoteproc(int);
  17. void rmtnoteproc(void);
  18. void catcher(void*, char*);
  19. void usage(void);
  20. void writestr(int, char*, char*, int);
  21. int readstr(int, char*, int);
  22. char *rexcall(int*, char*, char*);
  23. int setamalg(char*);
  24. char *keyspec = "";
  25. int notechan;
  26. char system[32];
  27. int cflag;
  28. int hflag;
  29. int dbg;
  30. char *user;
  31. char *srvname = "ncpu";
  32. char *exportfs = "/bin/exportfs";
  33. char *ealgs = "rc4_256 sha1";
  34. /* message size for exportfs; may be larger so we can do big graphics in CPU window */
  35. int msgsize = Maxfdata+IOHDRSZ;
  36. /* authentication mechanisms */
  37. static int netkeyauth(int);
  38. static int netkeysrvauth(int, char*);
  39. static int p9auth(int);
  40. static int srvp9auth(int, char*);
  41. static int noauth(int);
  42. static int srvnoauth(int, char*);
  43. typedef struct AuthMethod AuthMethod;
  44. struct AuthMethod {
  45. char *name; /* name of method */
  46. int (*cf)(int); /* client side authentication */
  47. int (*sf)(int, char*); /* server side authentication */
  48. } authmethod[] =
  49. {
  50. { "p9", p9auth, srvp9auth,},
  51. { "netkey", netkeyauth, netkeysrvauth,},
  52. // { "none", noauth, srvnoauth,},
  53. { nil, nil}
  54. };
  55. AuthMethod *am = authmethod; /* default is p9 */
  56. char *p9authproto = "p9any";
  57. int setam(char*);
  58. void
  59. usage(void)
  60. {
  61. fprint(2, "usage: cpu [-h system] [-a authmethod] [-e 'crypt hash'] [-k keypattern] [-c cmd args ...]\n");
  62. exits("usage");
  63. }
  64. int fdd;
  65. void
  66. main(int argc, char **argv)
  67. {
  68. char dat[128], buf[128], cmd[128], *p, *err;
  69. int fd, ms, data;
  70. /* see if we should use a larger message size */
  71. fd = open("/dev/draw", OREAD);
  72. if(fd > 0){
  73. ms = iounit(fd);
  74. if(msgsize < ms+IOHDRSZ)
  75. msgsize = ms+IOHDRSZ;
  76. close(fd);
  77. }
  78. user = getuser();
  79. if(user == nil)
  80. fatal(1, "can't read user name");
  81. ARGBEGIN{
  82. case 'a':
  83. p = EARGF(usage());
  84. if(setam(p) < 0)
  85. fatal(0, "unknown auth method %s", p);
  86. break;
  87. case 'e':
  88. ealgs = EARGF(usage());
  89. if(*ealgs == 0 || strcmp(ealgs, "clear") == 0)
  90. ealgs = nil;
  91. break;
  92. case 'd':
  93. dbg++;
  94. break;
  95. case 'f':
  96. /* ignored but accepted for compatibility */
  97. break;
  98. case 'O':
  99. p9authproto = "p9sk2";
  100. remoteside(1); /* From listen */
  101. break;
  102. case 'R': /* From listen */
  103. remoteside(0);
  104. break;
  105. case 'h':
  106. hflag++;
  107. p = EARGF(usage());
  108. strcpy(system, p);
  109. break;
  110. case 'c':
  111. cflag++;
  112. cmd[0] = '!';
  113. cmd[1] = '\0';
  114. while(p = ARGF()) {
  115. strcat(cmd, " ");
  116. strcat(cmd, p);
  117. }
  118. break;
  119. case 'k':
  120. keyspec = EARGF(usage());
  121. break;
  122. default:
  123. usage();
  124. }ARGEND;
  125. if(argc != 0)
  126. usage();
  127. if(hflag == 0) {
  128. p = getenv("cpu");
  129. if(p == 0)
  130. fatal(0, "set $cpu");
  131. strcpy(system, p);
  132. }
  133. if(err = rexcall(&data, system, srvname))
  134. fatal(1, "%s: %s", err, system);
  135. /* Tell the remote side the command to execute and where our working directory is */
  136. if(cflag)
  137. writestr(data, cmd, "command", 0);
  138. if(getwd(dat, sizeof(dat)) == 0)
  139. writestr(data, "NO", "dir", 0);
  140. else
  141. writestr(data, dat, "dir", 0);
  142. /* start up a process to pass along notes */
  143. lclnoteproc(data);
  144. /*
  145. * Wait for the other end to execute and start our file service
  146. * of /mnt/term
  147. */
  148. if(readstr(data, buf, sizeof(buf)) < 0)
  149. fatal(1, "waiting for FS");
  150. if(strncmp("FS", buf, 2) != 0) {
  151. print("remote cpu: %s", buf);
  152. exits(buf);
  153. }
  154. /* Begin serving the gnot namespace */
  155. close(0);
  156. dup(data, 0);
  157. close(data);
  158. sprint(buf, "%d", msgsize);
  159. if(dbg)
  160. execl(exportfs, exportfs, "-dm", buf, 0);
  161. else
  162. execl(exportfs, exportfs, "-m", buf, 0);
  163. fatal(1, "starting exportfs");
  164. }
  165. void
  166. fatal(int syserr, char *fmt, ...)
  167. {
  168. Fmt f;
  169. char *str;
  170. va_list arg;
  171. fmtstrinit(&f);
  172. fmtprint(&f, "cpu: ");
  173. va_start(arg, fmt);
  174. fmtvprint(&f, fmt, arg);
  175. va_end(arg);
  176. if(syserr)
  177. fmtprint(&f, ": %r");
  178. fmtprint(&f, "\n");
  179. str = fmtstrflush(&f);
  180. write(2, str, strlen(str));
  181. exits(str);
  182. }
  183. char *negstr = "negotiating authentication method";
  184. char bug[256];
  185. int
  186. old9p(int fd)
  187. {
  188. int p[2];
  189. if(pipe(p) < 0)
  190. fatal(1, "pipe");
  191. switch(rfork(RFPROC|RFFDG|RFNAMEG)) {
  192. case -1:
  193. fatal(1, "rfork srvold9p");
  194. case 0:
  195. if(fd != 1){
  196. dup(fd, 1);
  197. close(fd);
  198. }
  199. if(p[0] != 0){
  200. dup(p[0], 0);
  201. close(p[0]);
  202. }
  203. close(p[1]);
  204. if(0){
  205. fd = open("/sys/log/cpu", OWRITE);
  206. if(fd != 2){
  207. dup(fd, 2);
  208. close(fd);
  209. }
  210. execl("/bin/srvold9p", "srvold9p", "-ds", 0);
  211. } else
  212. execl("/bin/srvold9p", "srvold9p", "-s", 0);
  213. fatal(1, "exec srvold9p");
  214. default:
  215. close(fd);
  216. close(p[0]);
  217. }
  218. return p[1];
  219. }
  220. /* Invoked with stdin, stdout and stderr connected to the network connection */
  221. void
  222. remoteside(int old)
  223. {
  224. char user[128], home[128], buf[128], xdir[128], cmd[128];
  225. int i, n, fd, badchdir, gotcmd;
  226. fd = 0;
  227. /* negotiate authentication mechanism */
  228. n = readstr(fd, cmd, sizeof(cmd));
  229. if(n < 0)
  230. fatal(1, "authenticating");
  231. if(setamalg(cmd) < 0){
  232. writestr(fd, "unsupported auth method", nil, 0);
  233. fatal(1, "bad auth method %s", cmd);
  234. } else
  235. writestr(fd, "", "", 1);
  236. fd = (*am->sf)(fd, user);
  237. if(fd < 0)
  238. fatal(1, "srvauth");
  239. /* Set environment values for the user */
  240. putenv("user", user);
  241. sprint(home, "/usr/%s", user);
  242. putenv("home", home);
  243. /* Now collect invoking cpu's current directory or possibly a command */
  244. gotcmd = 0;
  245. if(readstr(fd, xdir, sizeof(xdir)) < 0)
  246. fatal(1, "dir/cmd");
  247. if(xdir[0] == '!') {
  248. strcpy(cmd, &xdir[1]);
  249. gotcmd = 1;
  250. if(readstr(fd, xdir, sizeof(xdir)) < 0)
  251. fatal(1, "dir");
  252. }
  253. /* Establish the new process at the current working directory of the
  254. * gnot */
  255. badchdir = 0;
  256. if(strcmp(xdir, "NO") == 0)
  257. chdir(home);
  258. else if(chdir(xdir) < 0) {
  259. badchdir = 1;
  260. chdir(home);
  261. }
  262. /* Start the gnot serving its namespace */
  263. writestr(fd, "FS", "FS", 0);
  264. writestr(fd, "/", "exportfs dir", 0);
  265. n = read(fd, buf, sizeof(buf));
  266. if(n != 2 || buf[0] != 'O' || buf[1] != 'K')
  267. exits("remote tree");
  268. if(old)
  269. fd = old9p(fd);
  270. /* make sure buffers are big by doing fversion explicitly; pick a huge number; other side will trim */
  271. strcpy(buf, VERSION9P);
  272. if(fversion(fd, 64*1024, buf, sizeof buf) < 0)
  273. exits("fversion failed");
  274. if(mount(fd, -1, "/mnt/term", MCREATE|MREPL, "") < 0)
  275. exits("mount failed");
  276. close(fd);
  277. /* the remote noteproc uses the mount so it must follow it */
  278. rmtnoteproc();
  279. for(i = 0; i < 3; i++)
  280. close(i);
  281. if(open("/mnt/term/dev/cons", OREAD) != 0)
  282. exits("open stdin");
  283. if(open("/mnt/term/dev/cons", OWRITE) != 1)
  284. exits("open stdout");
  285. dup(1, 2);
  286. if(badchdir)
  287. print("cpu: failed to chdir to '%s'\n", xdir);
  288. if(gotcmd)
  289. execl("/bin/rc", "rc", "-lc", cmd, 0);
  290. else
  291. execl("/bin/rc", "rc", "-li", 0);
  292. fatal(1, "exec shell");
  293. }
  294. char*
  295. rexcall(int *fd, char *host, char *service)
  296. {
  297. char *na;
  298. char dir[128];
  299. char err[ERRMAX];
  300. char msg[128];
  301. int n;
  302. na = netmkaddr(host, 0, service);
  303. if((*fd = dial(na, 0, dir, 0)) < 0)
  304. return "can't dial";
  305. /* negotiate authentication mechanism */
  306. if(ealgs != nil)
  307. snprint(msg, sizeof(msg), "%s %s", am->name, ealgs);
  308. else
  309. snprint(msg, sizeof(msg), "%s", am->name);
  310. writestr(*fd, msg, negstr, 0);
  311. n = readstr(*fd, err, sizeof err);
  312. if(n < 0)
  313. return negstr;
  314. if(*err){
  315. werrstr(err);
  316. return negstr;
  317. }
  318. /* authenticate */
  319. *fd = (*am->cf)(*fd);
  320. if(*fd < 0)
  321. return "can't authenticate";
  322. return 0;
  323. }
  324. void
  325. writestr(int fd, char *str, char *thing, int ignore)
  326. {
  327. int l, n;
  328. l = strlen(str);
  329. n = write(fd, str, l+1);
  330. if(!ignore && n < 0)
  331. fatal(1, "writing network: %s", thing);
  332. }
  333. int
  334. readstr(int fd, char *str, int len)
  335. {
  336. int n;
  337. while(len) {
  338. n = read(fd, str, 1);
  339. if(n < 0)
  340. return -1;
  341. if(*str == '\0')
  342. return 0;
  343. str++;
  344. len--;
  345. }
  346. return -1;
  347. }
  348. static int
  349. readln(char *buf, int n)
  350. {
  351. int i;
  352. char *p;
  353. n--; /* room for \0 */
  354. p = buf;
  355. for(i=0; i<n; i++){
  356. if(read(0, p, 1) != 1)
  357. break;
  358. if(*p == '\n' || *p == '\r')
  359. break;
  360. p++;
  361. }
  362. *p = '\0';
  363. return p-buf;
  364. }
  365. /*
  366. * user level challenge/response
  367. */
  368. static int
  369. netkeyauth(int fd)
  370. {
  371. char chall[32];
  372. char resp[32];
  373. strcpy(chall, getuser());
  374. print("user[%s]: ", chall);
  375. if(readln(resp, sizeof(resp)) < 0)
  376. return -1;
  377. if(*resp != 0)
  378. strcpy(chall, resp);
  379. writestr(fd, chall, "challenge/response", 1);
  380. for(;;){
  381. if(readstr(fd, chall, sizeof chall) < 0)
  382. break;
  383. if(*chall == 0)
  384. return fd;
  385. print("challenge: %s\nresponse: ", chall);
  386. if(readln(resp, sizeof(resp)) < 0)
  387. break;
  388. writestr(fd, resp, "challenge/response", 1);
  389. }
  390. return -1;
  391. }
  392. static int
  393. netkeysrvauth(int fd, char *user)
  394. {
  395. char response[32];
  396. Chalstate *ch;
  397. int tries;
  398. AuthInfo *ai;
  399. if(readstr(fd, user, 32) < 0)
  400. return -1;
  401. ai = nil;
  402. ch = nil;
  403. for(tries = 0; tries < 10; tries++){
  404. if((ch = auth_challenge("proto=p9cr role=server user=%q", user)) == nil)
  405. return -1;
  406. writestr(fd, ch->chal, "challenge", 1);
  407. if(readstr(fd, response, sizeof response) < 0)
  408. return -1;
  409. ch->resp = response;
  410. ch->nresp = strlen(response);
  411. if((ai = auth_response(ch)) != nil)
  412. break;
  413. }
  414. auth_freechal(ch);
  415. if(ai == nil)
  416. return -1;
  417. writestr(fd, "", "challenge", 1);
  418. if(auth_chuid(ai, 0) < 0)
  419. fatal(1, "newns");
  420. auth_freeAI(ai);
  421. return fd;
  422. }
  423. static void
  424. mksecret(char *t, uchar *f)
  425. {
  426. sprint(t, "%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux%2.2ux",
  427. f[0], f[1], f[2], f[3], f[4], f[5], f[6], f[7], f[8], f[9]);
  428. }
  429. /*
  430. * plan9 authentication followed by rc4 encryption
  431. */
  432. static int
  433. p9auth(int fd)
  434. {
  435. uchar key[16];
  436. uchar digest[SHA1dlen];
  437. char fromclientsecret[21];
  438. char fromserversecret[21];
  439. int i;
  440. AuthInfo *ai;
  441. ai = auth_proxy(fd, auth_getkey, "proto=%q role=client %s", p9authproto, keyspec);
  442. if(ai == nil)
  443. return -1;
  444. memmove(key+4, ai->secret, ai->nsecret);
  445. if(ealgs == nil)
  446. return fd;
  447. /* exchange random numbers */
  448. srand(truerand());
  449. for(i = 0; i < 4; i++)
  450. key[i] = rand();
  451. if(write(fd, key, 4) != 4)
  452. return -1;
  453. if(readn(fd, key+12, 4) != 4)
  454. return -1;
  455. /* scramble into two secrets */
  456. sha1(key, sizeof(key), digest, nil);
  457. mksecret(fromclientsecret, digest);
  458. mksecret(fromserversecret, digest+10);
  459. /* set up encryption */
  460. i = pushssl(fd, ealgs, fromclientsecret, fromserversecret, nil);
  461. if(i < 0)
  462. werrstr("can't establish ssl connection: %r");
  463. return i;
  464. }
  465. static int
  466. noauth(int fd)
  467. {
  468. ealgs = nil;
  469. return fd;
  470. }
  471. static int
  472. srvnoauth(int fd, char *user)
  473. {
  474. strcpy(user, getuser());
  475. ealgs = nil;
  476. return fd;
  477. }
  478. void
  479. loghex(uchar *p, int n)
  480. {
  481. char buf[100];
  482. int i;
  483. for(i = 0; i < n; i++)
  484. sprint(buf+2*i, "%2.2ux", p[i]);
  485. syslog(0, "cpu", buf);
  486. }
  487. static int
  488. srvp9auth(int fd, char *user)
  489. {
  490. uchar key[16];
  491. uchar digest[SHA1dlen];
  492. char fromclientsecret[21];
  493. char fromserversecret[21];
  494. int i;
  495. AuthInfo *ai;
  496. ai = auth_proxy(0, nil, "proto=%q role=server %s", p9authproto, keyspec);
  497. if(ai == nil)
  498. return -1;
  499. if(auth_chuid(ai, nil) < 0)
  500. return -1;
  501. strcpy(user, ai->cuid);
  502. memmove(key+4, ai->secret, ai->nsecret);
  503. if(ealgs == nil)
  504. return fd;
  505. /* exchange random numbers */
  506. srand(truerand());
  507. for(i = 0; i < 4; i++)
  508. key[i+12] = rand();
  509. if(readn(fd, key, 4) != 4)
  510. return -1;
  511. if(write(fd, key+12, 4) != 4)
  512. return -1;
  513. /* scramble into two secrets */
  514. sha1(key, sizeof(key), digest, nil);
  515. mksecret(fromclientsecret, digest);
  516. mksecret(fromserversecret, digest+10);
  517. /* set up encryption */
  518. i = pushssl(fd, ealgs, fromserversecret, fromclientsecret, nil);
  519. if(i < 0)
  520. werrstr("can't establish ssl connection: %r");
  521. return i;
  522. }
  523. /*
  524. * set authentication mechanism
  525. */
  526. int
  527. setam(char *name)
  528. {
  529. for(am = authmethod; am->name != nil; am++)
  530. if(strcmp(am->name, name) == 0)
  531. return 0;
  532. am = authmethod;
  533. return -1;
  534. }
  535. /*
  536. * set authentication mechanism and encryption/hash algs
  537. */
  538. int
  539. setamalg(char *s)
  540. {
  541. ealgs = strchr(s, ' ');
  542. if(ealgs != nil)
  543. *ealgs++ = 0;
  544. return setam(s);
  545. }
  546. char *rmtnotefile = "/mnt/term/dev/cpunote";
  547. /*
  548. * loop reading /mnt/term/dev/note looking for notes.
  549. * The child returns to start the shell.
  550. */
  551. void
  552. rmtnoteproc(void)
  553. {
  554. int n, fd, pid, notepid;
  555. char buf[256];
  556. /* new proc returns to start shell */
  557. pid = rfork(RFPROC|RFFDG|RFNOTEG|RFNAMEG|RFMEM);
  558. switch(pid){
  559. case -1:
  560. syslog(0, "cpu", "cpu -R: can't start noteproc: %r");
  561. return;
  562. case 0:
  563. return;
  564. }
  565. /* new proc reads notes from other side and posts them to shell */
  566. switch(notepid = rfork(RFPROC|RFFDG|RFMEM)){
  567. case -1:
  568. syslog(0, "cpu", "cpu -R: can't start wait proc: %r");
  569. _exits(0);
  570. case 0:
  571. fd = open(rmtnotefile, OREAD);
  572. if(fd < 0){
  573. syslog(0, "cpu", "cpu -R: can't open %s", rmtnotefile);
  574. _exits(0);
  575. }
  576. for(;;){
  577. n = read(fd, buf, sizeof(buf)-1);
  578. if(n <= 0){
  579. postnote(PNGROUP, pid, "hangup");
  580. _exits(0);
  581. }
  582. buf[n] = 0;
  583. postnote(PNGROUP, pid, buf);
  584. }
  585. break;
  586. }
  587. /* original proc waits for shell proc to die and kills note proc */
  588. for(;;){
  589. n = waitpid();
  590. if(n < 0 || n == pid)
  591. break;
  592. }
  593. postnote(PNPROC, notepid, "kill");
  594. _exits(0);
  595. }
  596. enum
  597. {
  598. Qdir,
  599. Qcpunote,
  600. Nfid = 32,
  601. };
  602. struct {
  603. char *name;
  604. Qid qid;
  605. ulong perm;
  606. } fstab[] =
  607. {
  608. [Qdir] { ".", {Qdir, 0, QTDIR}, DMDIR|0555 },
  609. [Qcpunote] { "cpunote", {Qcpunote, 0}, 0444 },
  610. };
  611. typedef struct Note Note;
  612. struct Note
  613. {
  614. Note *next;
  615. char msg[ERRMAX];
  616. };
  617. typedef struct Request Request;
  618. struct Request
  619. {
  620. Request *next;
  621. Fcall f;
  622. };
  623. typedef struct Fid Fid;
  624. struct Fid
  625. {
  626. int fid;
  627. int file;
  628. };
  629. Fid fids[Nfid];
  630. struct {
  631. Lock;
  632. Note *nfirst, *nlast;
  633. Request *rfirst, *rlast;
  634. } nfs;
  635. int
  636. fsreply(int fd, Fcall *f)
  637. {
  638. uchar buf[IOHDRSZ+Maxfdata];
  639. int n;
  640. if(dbg)
  641. fprint(2, "<-%F\n", f);
  642. n = convS2M(f, buf, sizeof buf);
  643. if(n > 0){
  644. if(write(fd, buf, n) != n){
  645. close(fd);
  646. return -1;
  647. }
  648. }
  649. return 0;
  650. }
  651. /* match a note read request with a note, reply to the request */
  652. int
  653. kick(int fd)
  654. {
  655. Request *rp;
  656. Note *np;
  657. int rv;
  658. for(;;){
  659. lock(&nfs);
  660. rp = nfs.rfirst;
  661. np = nfs.nfirst;
  662. if(rp == nil || np == nil){
  663. unlock(&nfs);
  664. break;
  665. }
  666. nfs.rfirst = rp->next;
  667. nfs.nfirst = np->next;
  668. unlock(&nfs);
  669. rp->f.type = Rread;
  670. rp->f.count = strlen(np->msg);
  671. rp->f.data = np->msg;
  672. rv = fsreply(fd, &rp->f);
  673. free(rp);
  674. free(np);
  675. if(rv < 0)
  676. return -1;
  677. }
  678. return 0;
  679. }
  680. void
  681. flushreq(int tag)
  682. {
  683. Request **l, *rp;
  684. lock(&nfs);
  685. for(l = &nfs.rfirst; *l != nil; l = &(*l)->next){
  686. rp = *l;
  687. if(rp->f.tag == tag){
  688. *l = rp->next;
  689. unlock(&nfs);
  690. free(rp);
  691. return;
  692. }
  693. }
  694. unlock(&nfs);
  695. }
  696. Fid*
  697. getfid(int fid)
  698. {
  699. int i, freefid;
  700. freefid = -1;
  701. for(i = 0; i < Nfid; i++){
  702. if(freefid < 0 && fids[i].file < 0)
  703. freefid = i;
  704. if(fids[i].fid == fid)
  705. return &fids[i];
  706. }
  707. if(freefid >= 0){
  708. fids[freefid].fid = fid;
  709. return &fids[freefid];
  710. }
  711. return nil;
  712. }
  713. int
  714. fsstat(int fd, Fid *fid, Fcall *f)
  715. {
  716. Dir d;
  717. uchar statbuf[256];
  718. memset(&d, 0, sizeof(d));
  719. d.name = fstab[fid->file].name;
  720. d.uid = user;
  721. d.gid = user;
  722. d.muid = user;
  723. d.qid = fstab[fid->file].qid;
  724. d.mode = fstab[fid->file].perm;
  725. d.atime = d.mtime = time(0);
  726. f->stat = statbuf;
  727. f->nstat = convD2M(&d, statbuf, sizeof statbuf);
  728. return fsreply(fd, f);
  729. }
  730. int
  731. fsread(int fd, Fid *fid, Fcall *f)
  732. {
  733. Dir d;
  734. uchar buf[256];
  735. Request *rp;
  736. switch(fid->file){
  737. default:
  738. return -1;
  739. case Qdir:
  740. if(f->offset == 0 && f->count >0){
  741. memset(&d, 0, sizeof(d));
  742. d.name = fstab[Qcpunote].name;
  743. d.uid = user;
  744. d.gid = user;
  745. d.muid = user;
  746. d.qid = fstab[Qcpunote].qid;
  747. d.mode = fstab[Qcpunote].perm;
  748. d.atime = d.mtime = time(0);
  749. f->count = convD2M(&d, buf, sizeof buf);
  750. f->data = (char*)buf;
  751. } else
  752. f->count = 0;
  753. return fsreply(fd, f);
  754. case Qcpunote:
  755. rp = mallocz(sizeof(*rp), 1);
  756. if(rp == nil)
  757. return -1;
  758. rp->f = *f;
  759. lock(&nfs);
  760. if(nfs.rfirst == nil)
  761. nfs.rfirst = rp;
  762. else
  763. nfs.rlast->next = rp;
  764. nfs.rlast = rp;
  765. unlock(&nfs);
  766. return kick(fd);;
  767. }
  768. }
  769. char Eperm[] = "permission denied";
  770. char Enofile[] = "out of files";
  771. char Enotdir[] = "not a directory";
  772. void
  773. notefs(int fd)
  774. {
  775. uchar buf[IOHDRSZ+Maxfdata];
  776. int i, j, n;
  777. char err[ERRMAX];
  778. Fcall f;
  779. Fid *fid, *nfid;
  780. int doreply;
  781. rfork(RFNOTEG);
  782. fmtinstall('F', fcallfmt);
  783. for(n = 0; n < Nfid; n++)
  784. fids[n].file = -1;
  785. for(;;){
  786. n = read9pmsg(fd, buf, sizeof(buf));
  787. if(n <= 0){
  788. if(dbg)
  789. fprint(2, "read9pmsg(%d) returns %d: %r\n", fd, n);
  790. break;
  791. }
  792. if(convM2S(buf, n, &f) < 0)
  793. break;
  794. if(dbg)
  795. fprint(2, "->%F\n", &f);
  796. doreply = 1;
  797. fid = getfid(f.fid);
  798. if(fid == nil){
  799. nofids:
  800. f.type = Rerror;
  801. f.ename = Enofile;
  802. fsreply(fd, &f);
  803. continue;
  804. }
  805. switch(f.type++){
  806. default:
  807. f.type = Rerror;
  808. f.ename = "unknown type";
  809. break;
  810. case Tflush:
  811. flushreq(f.oldtag);
  812. break;
  813. case Tversion:
  814. if(f.msize > IOHDRSZ+Maxfdata)
  815. f.msize = IOHDRSZ+Maxfdata;
  816. break;
  817. case Tauth:
  818. f.type = Rerror;
  819. f.ename = "cpu: authentication not required";
  820. break;
  821. case Tattach:
  822. f.qid = fstab[Qdir].qid;
  823. fid->file = Qdir;
  824. break;
  825. case Twalk:
  826. nfid = nil;
  827. if(f.newfid != f.fid){
  828. nfid = getfid(f.newfid);
  829. if(nfid == nil)
  830. goto nofids;
  831. nfid->file = fid->file;
  832. fid = nfid;
  833. }
  834. f.ename = nil;
  835. for(i=0; i<f.nwname; i++){
  836. if(i > MAXWELEM){
  837. f.type = Rerror;
  838. f.ename = "too many name elements";
  839. break;
  840. }
  841. if(fid->file != Qdir){
  842. f.type = Rerror;
  843. f.ename = Enotdir;
  844. break;
  845. }
  846. if(strcmp(f.wname[i], "cpunote") == 0){
  847. fid->file = Qcpunote;
  848. f.wqid[i] = fstab[Qcpunote].qid;
  849. continue;
  850. }
  851. f.type = Rerror;
  852. f.ename = err;
  853. strcpy(err, "cpu: file \"");
  854. for(j=0; j<=i; j++){
  855. if(strlen(err)+1+strlen(f.wname[j])+32 > sizeof err)
  856. break;
  857. if(j != 0)
  858. strcat(err, "/");
  859. strcat(err, f.wname[j]);
  860. }
  861. strcat(err, "\" does not exist");
  862. break;
  863. }
  864. if(nfid != nil && (f.ename != nil || i < f.nwname))
  865. nfid ->file = -1;
  866. if(f.type != Rerror)
  867. f.nwqid = i;
  868. break;
  869. case Topen:
  870. if(f.mode != OREAD){
  871. f.type = Rerror;
  872. f.ename = Eperm;
  873. }
  874. f.qid = fstab[fid->file].qid;
  875. break;
  876. case Tcreate:
  877. f.type = Rerror;
  878. f.ename = Eperm;
  879. break;
  880. case Tread:
  881. if(fsread(fd, fid, &f) < 0)
  882. goto err;
  883. doreply = 0;
  884. break;
  885. case Twrite:
  886. f.type = Rerror;
  887. f.ename = Eperm;
  888. break;
  889. case Tclunk:
  890. fid->file = -1;
  891. break;
  892. case Tremove:
  893. f.type = Rerror;
  894. f.ename = Eperm;
  895. break;
  896. case Tstat:
  897. if(fsstat(fd, fid, &f) < 0)
  898. goto err;
  899. doreply = 0;
  900. break;
  901. case Twstat:
  902. f.type = Rerror;
  903. f.ename = Eperm;
  904. break;
  905. }
  906. if(doreply)
  907. if(fsreply(fd, &f) < 0)
  908. break;
  909. }
  910. err:
  911. if(dbg)
  912. fprint(2, "notefs exiting: %r\n");
  913. close(fd);
  914. }
  915. char notebuf[ERRMAX];
  916. void
  917. catcher(void*, char *text)
  918. {
  919. int n;
  920. n = strlen(text);
  921. if(n >= sizeof(notebuf))
  922. n = sizeof(notebuf)-1;
  923. memmove(notebuf, text, n);
  924. notebuf[n] = '\0';
  925. noted(NCONT);
  926. }
  927. /*
  928. * mount in /dev a note file for the remote side to read.
  929. */
  930. void
  931. lclnoteproc(int netfd)
  932. {
  933. int exportfspid;
  934. Waitmsg *w;
  935. Note *np;
  936. int pfd[2];
  937. if(pipe(pfd) < 0){
  938. fprint(2, "cpu: can't start note proc: pipe: %r\n");
  939. return;
  940. }
  941. /* new proc mounts and returns to start exportfs */
  942. switch(exportfspid = rfork(RFPROC|RFNAMEG|RFFDG|RFMEM)){
  943. case -1:
  944. fprint(2, "cpu: can't start note proc: rfork: %r\n");
  945. return;
  946. case 0:
  947. close(pfd[0]);
  948. if(mount(pfd[1], -1, "/dev", MBEFORE, "") < 0)
  949. fprint(2, "cpu: can't mount note proc: %r\n");
  950. close(pfd[1]);
  951. return;
  952. }
  953. close(netfd);
  954. close(pfd[1]);
  955. /* new proc listens for note file system rpc's */
  956. switch(rfork(RFPROC|RFNAMEG|RFMEM)){
  957. case -1:
  958. fprint(2, "cpu: can't start note proc: rfork1: %r\n");
  959. _exits(0);
  960. case 0:
  961. notefs(pfd[0]);
  962. _exits(0);
  963. }
  964. /* original proc waits for notes */
  965. notify(catcher);
  966. w = nil;
  967. for(;;) {
  968. *notebuf = 0;
  969. free(w);
  970. w = wait();
  971. if(w == nil) {
  972. if(*notebuf == 0)
  973. break;
  974. np = mallocz(sizeof(Note), 1);
  975. if(np != nil){
  976. strcpy(np->msg, notebuf);
  977. lock(&nfs);
  978. if(nfs.nfirst == nil)
  979. nfs.nfirst = np;
  980. else
  981. nfs.nlast->next = np;
  982. nfs.nlast = np;
  983. unlock(&nfs);
  984. kick(pfd[0]);
  985. }
  986. unlock(&nfs);
  987. } else if(w->pid == exportfspid)
  988. break;
  989. }
  990. if(w == nil)
  991. exits(nil);
  992. exits(w->msg);
  993. }