]>
Commit | Line | Data |
---|---|---|
9f107513 AL |
1 | /* |
2 | * Virtio 9p backend | |
3 | * | |
4 | * Copyright IBM, Corp. 2010 | |
5 | * | |
6 | * Authors: | |
7 | * Anthony Liguori <aliguori@us.ibm.com> | |
8 | * | |
9 | * This work is licensed under the terms of the GNU GPL, version 2. See | |
10 | * the COPYING file in the top-level directory. | |
11 | * | |
12 | */ | |
13 | ||
6f569084 CS |
14 | /* |
15 | * Not so fast! You might want to read the 9p developer docs first: | |
16 | * https://wiki.qemu.org/Documentation/9p | |
17 | */ | |
18 | ||
fbc04127 | 19 | #include "qemu/osdep.h" |
e3e83f2e | 20 | #include <glib/gprintf.h> |
0d09e41a | 21 | #include "hw/virtio/virtio.h" |
da34e65c | 22 | #include "qapi/error.h" |
d49b6836 | 23 | #include "qemu/error-report.h" |
cd4bfbb2 | 24 | #include "qemu/iov.h" |
db725815 | 25 | #include "qemu/main-loop.h" |
1de7afc9 | 26 | #include "qemu/sockets.h" |
9f107513 AL |
27 | #include "virtio-9p.h" |
28 | #include "fsdev/qemu-fsdev.h" | |
267ae092 | 29 | #include "9p-xattr.h" |
fe52840c | 30 | #include "coth.h" |
c572f23a | 31 | #include "trace.h" |
795c40b8 | 32 | #include "migration/blocker.h" |
1a6ed33c | 33 | #include "qemu/xxhash.h" |
6b6aa828 | 34 | #include <math.h> |
03556ea9 | 35 | #include <linux/limits.h> |
9f107513 | 36 | |
7a462745 AK |
37 | int open_fd_hw; |
38 | int total_open_fd; | |
39 | static int open_fd_rc; | |
9f107513 | 40 | |
fac4f111 VJ |
41 | enum { |
42 | Oread = 0x00, | |
43 | Owrite = 0x01, | |
44 | Ordwr = 0x02, | |
45 | Oexec = 0x03, | |
46 | Oexcl = 0x04, | |
47 | Otrunc = 0x10, | |
48 | Orexec = 0x20, | |
49 | Orclose = 0x40, | |
50 | Oappend = 0x80, | |
51 | }; | |
52 | ||
75673590 | 53 | static ssize_t pdu_marshal(V9fsPDU *pdu, size_t offset, const char *fmt, ...) |
0e2082d9 WL |
54 | { |
55 | ssize_t ret; | |
56 | va_list ap; | |
57 | ||
58 | va_start(ap, fmt); | |
ea83441c | 59 | ret = pdu->s->transport->pdu_vmarshal(pdu, offset, fmt, ap); |
0e2082d9 WL |
60 | va_end(ap); |
61 | ||
62 | return ret; | |
63 | } | |
64 | ||
75673590 | 65 | static ssize_t pdu_unmarshal(V9fsPDU *pdu, size_t offset, const char *fmt, ...) |
0e2082d9 WL |
66 | { |
67 | ssize_t ret; | |
68 | va_list ap; | |
69 | ||
70 | va_start(ap, fmt); | |
ea83441c | 71 | ret = pdu->s->transport->pdu_vunmarshal(pdu, offset, fmt, ap); |
0e2082d9 WL |
72 | va_end(ap); |
73 | ||
74 | return ret; | |
75 | } | |
76 | ||
fac4f111 VJ |
77 | static int omode_to_uflags(int8_t mode) |
78 | { | |
79 | int ret = 0; | |
80 | ||
81 | switch (mode & 3) { | |
82 | case Oread: | |
83 | ret = O_RDONLY; | |
84 | break; | |
85 | case Ordwr: | |
86 | ret = O_RDWR; | |
87 | break; | |
88 | case Owrite: | |
89 | ret = O_WRONLY; | |
90 | break; | |
91 | case Oexec: | |
92 | ret = O_RDONLY; | |
93 | break; | |
94 | } | |
95 | ||
96 | if (mode & Otrunc) { | |
97 | ret |= O_TRUNC; | |
98 | } | |
99 | ||
100 | if (mode & Oappend) { | |
101 | ret |= O_APPEND; | |
102 | } | |
103 | ||
104 | if (mode & Oexcl) { | |
105 | ret |= O_EXCL; | |
106 | } | |
107 | ||
108 | return ret; | |
109 | } | |
110 | ||
8e71b96c | 111 | typedef struct DotlOpenflagMap { |
9844081b MK |
112 | int dotl_flag; |
113 | int open_flag; | |
8e71b96c | 114 | } DotlOpenflagMap; |
9844081b MK |
115 | |
116 | static int dotl_to_open_flags(int flags) | |
117 | { | |
118 | int i; | |
119 | /* | |
120 | * We have same bits for P9_DOTL_READONLY, P9_DOTL_WRONLY | |
121 | * and P9_DOTL_NOACCESS | |
122 | */ | |
123 | int oflags = flags & O_ACCMODE; | |
124 | ||
8e71b96c | 125 | DotlOpenflagMap dotl_oflag_map[] = { |
9844081b MK |
126 | { P9_DOTL_CREATE, O_CREAT }, |
127 | { P9_DOTL_EXCL, O_EXCL }, | |
128 | { P9_DOTL_NOCTTY , O_NOCTTY }, | |
129 | { P9_DOTL_TRUNC, O_TRUNC }, | |
130 | { P9_DOTL_APPEND, O_APPEND }, | |
131 | { P9_DOTL_NONBLOCK, O_NONBLOCK } , | |
132 | { P9_DOTL_DSYNC, O_DSYNC }, | |
133 | { P9_DOTL_FASYNC, FASYNC }, | |
134 | { P9_DOTL_DIRECT, O_DIRECT }, | |
135 | { P9_DOTL_LARGEFILE, O_LARGEFILE }, | |
136 | { P9_DOTL_DIRECTORY, O_DIRECTORY }, | |
137 | { P9_DOTL_NOFOLLOW, O_NOFOLLOW }, | |
138 | { P9_DOTL_NOATIME, O_NOATIME }, | |
139 | { P9_DOTL_SYNC, O_SYNC }, | |
140 | }; | |
141 | ||
142 | for (i = 0; i < ARRAY_SIZE(dotl_oflag_map); i++) { | |
143 | if (flags & dotl_oflag_map[i].dotl_flag) { | |
144 | oflags |= dotl_oflag_map[i].open_flag; | |
145 | } | |
146 | } | |
147 | ||
148 | return oflags; | |
149 | } | |
150 | ||
758e8e38 | 151 | void cred_init(FsCred *credp) |
131dcb25 | 152 | { |
758e8e38 VJ |
153 | credp->fc_uid = -1; |
154 | credp->fc_gid = -1; | |
155 | credp->fc_mode = -1; | |
156 | credp->fc_rdev = -1; | |
131dcb25 AL |
157 | } |
158 | ||
d3ab98e6 AK |
159 | static int get_dotl_openflags(V9fsState *s, int oflags) |
160 | { | |
161 | int flags; | |
162 | /* | |
163 | * Filter the client open flags | |
164 | */ | |
9844081b MK |
165 | flags = dotl_to_open_flags(oflags); |
166 | flags &= ~(O_NOCTTY | O_ASYNC | O_CREAT); | |
d3ab98e6 AK |
167 | /* |
168 | * Ignore direct disk access hint until the server supports it. | |
169 | */ | |
170 | flags &= ~O_DIRECT; | |
171 | return flags; | |
172 | } | |
173 | ||
2289be19 AK |
174 | void v9fs_path_init(V9fsPath *path) |
175 | { | |
176 | path->data = NULL; | |
177 | path->size = 0; | |
178 | } | |
179 | ||
180 | void v9fs_path_free(V9fsPath *path) | |
181 | { | |
182 | g_free(path->data); | |
183 | path->data = NULL; | |
184 | path->size = 0; | |
185 | } | |
186 | ||
e3e83f2e GK |
187 | |
188 | void GCC_FMT_ATTR(2, 3) | |
189 | v9fs_path_sprintf(V9fsPath *path, const char *fmt, ...) | |
190 | { | |
191 | va_list ap; | |
192 | ||
193 | v9fs_path_free(path); | |
194 | ||
195 | va_start(ap, fmt); | |
196 | /* Bump the size for including terminating NULL */ | |
197 | path->size = g_vasprintf(&path->data, fmt, ap) + 1; | |
198 | va_end(ap); | |
199 | } | |
200 | ||
e446a1eb | 201 | void v9fs_path_copy(V9fsPath *dst, const V9fsPath *src) |
2289be19 | 202 | { |
e446a1eb MAL |
203 | v9fs_path_free(dst); |
204 | dst->size = src->size; | |
205 | dst->data = g_memdup(src->data, src->size); | |
2289be19 AK |
206 | } |
207 | ||
208 | int v9fs_name_to_path(V9fsState *s, V9fsPath *dirpath, | |
209 | const char *name, V9fsPath *path) | |
210 | { | |
211 | int err; | |
212 | err = s->ops->name_to_path(&s->ctx, dirpath, name, path); | |
213 | if (err < 0) { | |
214 | err = -errno; | |
215 | } | |
216 | return err; | |
217 | } | |
218 | ||
936532a4 MN |
219 | /* |
220 | * Return TRUE if s1 is an ancestor of s2. | |
221 | * | |
222 | * E.g. "a/b" is an ancestor of "a/b/c" but not of "a/bc/d". | |
223 | * As a special case, We treat s1 as ancestor of s2 if they are same! | |
224 | */ | |
2289be19 | 225 | static int v9fs_path_is_ancestor(V9fsPath *s1, V9fsPath *s2) |
936532a4 | 226 | { |
2289be19 AK |
227 | if (!strncmp(s1->data, s2->data, s1->size - 1)) { |
228 | if (s2->data[s1->size - 1] == '\0' || s2->data[s1->size - 1] == '/') { | |
936532a4 MN |
229 | return 1; |
230 | } | |
231 | } | |
232 | return 0; | |
233 | } | |
234 | ||
a03f7874 AL |
235 | static size_t v9fs_string_size(V9fsString *str) |
236 | { | |
237 | return str->size; | |
238 | } | |
239 | ||
b9cb88b0 AK |
240 | /* |
241 | * returns 0 if fid got re-opened, 1 if not, < 0 on error */ | |
8440e22e | 242 | static int coroutine_fn v9fs_reopen_fid(V9fsPDU *pdu, V9fsFidState *f) |
b9cb88b0 AK |
243 | { |
244 | int err = 1; | |
245 | if (f->fid_type == P9_FID_FILE) { | |
246 | if (f->fs.fd == -1) { | |
247 | do { | |
bccacf6c AK |
248 | err = v9fs_co_open(pdu, f, f->open_flags); |
249 | } while (err == -EINTR && !pdu->cancelled); | |
b9cb88b0 AK |
250 | } |
251 | } else if (f->fid_type == P9_FID_DIR) { | |
f314ea4e | 252 | if (f->fs.dir.stream == NULL) { |
b9cb88b0 | 253 | do { |
bccacf6c AK |
254 | err = v9fs_co_opendir(pdu, f); |
255 | } while (err == -EINTR && !pdu->cancelled); | |
b9cb88b0 AK |
256 | } |
257 | } | |
258 | return err; | |
259 | } | |
260 | ||
8440e22e | 261 | static V9fsFidState *coroutine_fn get_fid(V9fsPDU *pdu, int32_t fid) |
286d5652 | 262 | { |
7a462745 | 263 | int err; |
286d5652 | 264 | V9fsFidState *f; |
bccacf6c | 265 | V9fsState *s = pdu->s; |
286d5652 | 266 | |
feabd6cf | 267 | QSIMPLEQ_FOREACH(f, &s->fid_list, next) { |
84dfb926 | 268 | BUG_ON(f->clunked); |
286d5652 | 269 | if (f->fid == fid) { |
7a462745 AK |
270 | /* |
271 | * Update the fid ref upfront so that | |
272 | * we don't get reclaimed when we yield | |
273 | * in open later. | |
274 | */ | |
84dfb926 | 275 | f->ref++; |
7a462745 AK |
276 | /* |
277 | * check whether we need to reopen the | |
278 | * file. We might have closed the fd | |
279 | * while trying to free up some file | |
280 | * descriptors. | |
281 | */ | |
bccacf6c | 282 | err = v9fs_reopen_fid(pdu, f); |
b9cb88b0 AK |
283 | if (err < 0) { |
284 | f->ref--; | |
285 | return NULL; | |
286 | } | |
7a462745 AK |
287 | /* |
288 | * Mark the fid as referenced so that the LRU | |
289 | * reclaim won't close the file descriptor | |
290 | */ | |
291 | f->flags |= FID_REFERENCED; | |
286d5652 AL |
292 | return f; |
293 | } | |
294 | } | |
286d5652 AL |
295 | return NULL; |
296 | } | |
297 | ||
298 | static V9fsFidState *alloc_fid(V9fsState *s, int32_t fid) | |
299 | { | |
300 | V9fsFidState *f; | |
301 | ||
feabd6cf | 302 | QSIMPLEQ_FOREACH(f, &s->fid_list, next) { |
84dfb926 AK |
303 | /* If fid is already there return NULL */ |
304 | BUG_ON(f->clunked); | |
305 | if (f->fid == fid) { | |
306 | return NULL; | |
307 | } | |
286d5652 | 308 | } |
7267c094 | 309 | f = g_malloc0(sizeof(V9fsFidState)); |
286d5652 | 310 | f->fid = fid; |
d62dbb51 | 311 | f->fid_type = P9_FID_NONE; |
84dfb926 | 312 | f->ref = 1; |
7a462745 AK |
313 | /* |
314 | * Mark the fid as referenced so that the LRU | |
315 | * reclaim won't close the file descriptor | |
316 | */ | |
317 | f->flags |= FID_REFERENCED; | |
20b7f45b | 318 | QSIMPLEQ_INSERT_TAIL(&s->fid_list, f, next); |
286d5652 | 319 | |
d2c5cf7c CS |
320 | v9fs_readdir_init(s->proto_version, &f->fs.dir); |
321 | v9fs_readdir_init(s->proto_version, &f->fs_reclaim.dir); | |
7cde47d4 | 322 | |
286d5652 AL |
323 | return f; |
324 | } | |
325 | ||
8440e22e | 326 | static int coroutine_fn v9fs_xattr_fid_clunk(V9fsPDU *pdu, V9fsFidState *fidp) |
10b468bd AK |
327 | { |
328 | int retval = 0; | |
329 | ||
dd28fbbc | 330 | if (fidp->fs.xattr.xattrwalk_fid) { |
10b468bd AK |
331 | /* getxattr/listxattr fid */ |
332 | goto free_value; | |
333 | } | |
334 | /* | |
335 | * if this is fid for setxattr. clunk should | |
336 | * result in setxattr localcall | |
337 | */ | |
338 | if (fidp->fs.xattr.len != fidp->fs.xattr.copied_len) { | |
339 | /* clunk after partial write */ | |
340 | retval = -EINVAL; | |
341 | goto free_out; | |
342 | } | |
9ed3ef26 | 343 | if (fidp->fs.xattr.len) { |
bccacf6c | 344 | retval = v9fs_co_lsetxattr(pdu, &fidp->path, &fidp->fs.xattr.name, |
9ed3ef26 AK |
345 | fidp->fs.xattr.value, |
346 | fidp->fs.xattr.len, | |
347 | fidp->fs.xattr.flags); | |
348 | } else { | |
bccacf6c | 349 | retval = v9fs_co_lremovexattr(pdu, &fidp->path, &fidp->fs.xattr.name); |
9ed3ef26 | 350 | } |
10b468bd AK |
351 | free_out: |
352 | v9fs_string_free(&fidp->fs.xattr.name); | |
353 | free_value: | |
9e288406 | 354 | g_free(fidp->fs.xattr.value); |
10b468bd AK |
355 | return retval; |
356 | } | |
357 | ||
8440e22e | 358 | static int coroutine_fn free_fid(V9fsPDU *pdu, V9fsFidState *fidp) |
286d5652 | 359 | { |
10b468bd | 360 | int retval = 0; |
84dfb926 AK |
361 | |
362 | if (fidp->fid_type == P9_FID_FILE) { | |
7a462745 AK |
363 | /* If we reclaimed the fd no need to close */ |
364 | if (fidp->fs.fd != -1) { | |
cc720ddb | 365 | retval = v9fs_co_close(pdu, &fidp->fs); |
7a462745 | 366 | } |
84dfb926 | 367 | } else if (fidp->fid_type == P9_FID_DIR) { |
f314ea4e | 368 | if (fidp->fs.dir.stream != NULL) { |
cc720ddb | 369 | retval = v9fs_co_closedir(pdu, &fidp->fs); |
95f65511 | 370 | } |
84dfb926 | 371 | } else if (fidp->fid_type == P9_FID_XATTR) { |
bccacf6c | 372 | retval = v9fs_xattr_fid_clunk(pdu, fidp); |
84dfb926 | 373 | } |
2289be19 | 374 | v9fs_path_free(&fidp->path); |
84dfb926 AK |
375 | g_free(fidp); |
376 | return retval; | |
377 | } | |
378 | ||
8440e22e | 379 | static int coroutine_fn put_fid(V9fsPDU *pdu, V9fsFidState *fidp) |
84dfb926 AK |
380 | { |
381 | BUG_ON(!fidp->ref); | |
382 | fidp->ref--; | |
7a462745 AK |
383 | /* |
384 | * Don't free the fid if it is in reclaim list | |
385 | */ | |
84dfb926 | 386 | if (!fidp->ref && fidp->clunked) { |
e9a0152b AK |
387 | if (fidp->fid == pdu->s->root_fid) { |
388 | /* | |
389 | * if the clunked fid is root fid then we | |
390 | * have unmounted the fs on the client side. | |
391 | * delete the migration blocker. Ideally, this | |
392 | * should be hooked to transport close notification | |
393 | */ | |
394 | if (pdu->s->migration_blocker) { | |
395 | migrate_del_blocker(pdu->s->migration_blocker); | |
396 | error_free(pdu->s->migration_blocker); | |
397 | pdu->s->migration_blocker = NULL; | |
398 | } | |
399 | } | |
a911a182 | 400 | return free_fid(pdu, fidp); |
84dfb926 | 401 | } |
a911a182 | 402 | return 0; |
84dfb926 AK |
403 | } |
404 | ||
ce421a19 | 405 | static V9fsFidState *clunk_fid(V9fsState *s, int32_t fid) |
84dfb926 | 406 | { |
feabd6cf | 407 | V9fsFidState *fidp; |
286d5652 | 408 | |
feabd6cf GK |
409 | QSIMPLEQ_FOREACH(fidp, &s->fid_list, next) { |
410 | if (fidp->fid == fid) { | |
411 | QSIMPLEQ_REMOVE(&s->fid_list, fidp, V9fsFidState, next); | |
412 | fidp->clunked = true; | |
413 | return fidp; | |
286d5652 AL |
414 | } |
415 | } | |
feabd6cf | 416 | return NULL; |
286d5652 AL |
417 | } |
418 | ||
8440e22e | 419 | void coroutine_fn v9fs_reclaim_fd(V9fsPDU *pdu) |
7a462745 AK |
420 | { |
421 | int reclaim_count = 0; | |
bccacf6c | 422 | V9fsState *s = pdu->s; |
81f9766b GK |
423 | V9fsFidState *f; |
424 | QSLIST_HEAD(, V9fsFidState) reclaim_list = | |
425 | QSLIST_HEAD_INITIALIZER(reclaim_list); | |
7a462745 | 426 | |
feabd6cf | 427 | QSIMPLEQ_FOREACH(f, &s->fid_list, next) { |
7a462745 AK |
428 | /* |
429 | * Unlink fids cannot be reclaimed. Check | |
430 | * for them and skip them. Also skip fids | |
431 | * currently being operated on. | |
432 | */ | |
433 | if (f->ref || f->flags & FID_NON_RECLAIMABLE) { | |
434 | continue; | |
435 | } | |
436 | /* | |
437 | * if it is a recently referenced fid | |
438 | * we leave the fid untouched and clear the | |
439 | * reference bit. We come back to it later | |
440 | * in the next iteration. (a simple LRU without | |
441 | * moving list elements around) | |
442 | */ | |
443 | if (f->flags & FID_REFERENCED) { | |
444 | f->flags &= ~FID_REFERENCED; | |
445 | continue; | |
446 | } | |
447 | /* | |
448 | * Add fids to reclaim list. | |
449 | */ | |
450 | if (f->fid_type == P9_FID_FILE) { | |
451 | if (f->fs.fd != -1) { | |
452 | /* | |
453 | * Up the reference count so that | |
454 | * a clunk request won't free this fid | |
455 | */ | |
456 | f->ref++; | |
81f9766b | 457 | QSLIST_INSERT_HEAD(&reclaim_list, f, reclaim_next); |
7a462745 AK |
458 | f->fs_reclaim.fd = f->fs.fd; |
459 | f->fs.fd = -1; | |
460 | reclaim_count++; | |
461 | } | |
95f65511 | 462 | } else if (f->fid_type == P9_FID_DIR) { |
f314ea4e | 463 | if (f->fs.dir.stream != NULL) { |
95f65511 AK |
464 | /* |
465 | * Up the reference count so that | |
466 | * a clunk request won't free this fid | |
467 | */ | |
468 | f->ref++; | |
81f9766b | 469 | QSLIST_INSERT_HEAD(&reclaim_list, f, reclaim_next); |
f314ea4e GK |
470 | f->fs_reclaim.dir.stream = f->fs.dir.stream; |
471 | f->fs.dir.stream = NULL; | |
95f65511 AK |
472 | reclaim_count++; |
473 | } | |
7a462745 AK |
474 | } |
475 | if (reclaim_count >= open_fd_rc) { | |
476 | break; | |
477 | } | |
478 | } | |
479 | /* | |
480 | * Now close the fid in reclaim list. Free them if they | |
481 | * are already clunked. | |
482 | */ | |
81f9766b GK |
483 | while (!QSLIST_EMPTY(&reclaim_list)) { |
484 | f = QSLIST_FIRST(&reclaim_list); | |
485 | QSLIST_REMOVE(&reclaim_list, f, V9fsFidState, reclaim_next); | |
7a462745 | 486 | if (f->fid_type == P9_FID_FILE) { |
cc720ddb | 487 | v9fs_co_close(pdu, &f->fs_reclaim); |
95f65511 | 488 | } else if (f->fid_type == P9_FID_DIR) { |
cc720ddb | 489 | v9fs_co_closedir(pdu, &f->fs_reclaim); |
7a462745 | 490 | } |
7a462745 AK |
491 | /* |
492 | * Now drop the fid reference, free it | |
493 | * if clunked. | |
494 | */ | |
bccacf6c | 495 | put_fid(pdu, f); |
7a462745 AK |
496 | } |
497 | } | |
498 | ||
8440e22e | 499 | static int coroutine_fn v9fs_mark_fids_unreclaim(V9fsPDU *pdu, V9fsPath *path) |
7a462745 AK |
500 | { |
501 | int err; | |
bccacf6c | 502 | V9fsState *s = pdu->s; |
20b7f45b | 503 | V9fsFidState *fidp, *fidp_next; |
7a462745 | 504 | |
20b7f45b GK |
505 | fidp = QSIMPLEQ_FIRST(&s->fid_list); |
506 | if (!fidp) { | |
507 | return 0; | |
508 | } | |
509 | ||
510 | /* | |
511 | * v9fs_reopen_fid() can yield : a reference on the fid must be held | |
512 | * to ensure its pointer remains valid and we can safely pass it to | |
513 | * QSIMPLEQ_NEXT(). The corresponding put_fid() can also yield so | |
514 | * we must keep a reference on the next fid as well. So the logic here | |
515 | * is to get a reference on a fid and only put it back during the next | |
516 | * iteration after we could get a reference on the next fid. Start with | |
517 | * the first one. | |
518 | */ | |
519 | for (fidp->ref++; fidp; fidp = fidp_next) { | |
520 | if (fidp->path.size == path->size && | |
521 | !memcmp(fidp->path.data, path->data, path->size)) { | |
7a462745 AK |
522 | /* Mark the fid non reclaimable. */ |
523 | fidp->flags |= FID_NON_RECLAIMABLE; | |
b9cb88b0 AK |
524 | |
525 | /* reopen the file/dir if already closed */ | |
bccacf6c | 526 | err = v9fs_reopen_fid(pdu, fidp); |
b9cb88b0 | 527 | if (err < 0) { |
20b7f45b | 528 | put_fid(pdu, fidp); |
267fcadf | 529 | return err; |
b9cb88b0 | 530 | } |
20b7f45b GK |
531 | } |
532 | ||
533 | fidp_next = QSIMPLEQ_NEXT(fidp, next); | |
534 | ||
535 | if (fidp_next) { | |
b9cb88b0 | 536 | /* |
20b7f45b GK |
537 | * Ensure the next fid survives a potential clunk request during |
538 | * put_fid() below and v9fs_reopen_fid() in the next iteration. | |
b9cb88b0 | 539 | */ |
20b7f45b | 540 | fidp_next->ref++; |
7a462745 | 541 | } |
20b7f45b GK |
542 | |
543 | /* We're done with this fid */ | |
544 | put_fid(pdu, fidp); | |
7a462745 | 545 | } |
20b7f45b | 546 | |
7a462745 AK |
547 | return 0; |
548 | } | |
549 | ||
8440e22e | 550 | static void coroutine_fn virtfs_reset(V9fsPDU *pdu) |
b41e2992 DS |
551 | { |
552 | V9fsState *s = pdu->s; | |
79decce3 | 553 | V9fsFidState *fidp; |
b41e2992 DS |
554 | |
555 | /* Free all fids */ | |
feabd6cf | 556 | while (!QSIMPLEQ_EMPTY(&s->fid_list)) { |
6d54af0e | 557 | /* Get fid */ |
feabd6cf | 558 | fidp = QSIMPLEQ_FIRST(&s->fid_list); |
6d54af0e GK |
559 | fidp->ref++; |
560 | ||
561 | /* Clunk fid */ | |
feabd6cf | 562 | QSIMPLEQ_REMOVE(&s->fid_list, fidp, V9fsFidState, next); |
2e53160f | 563 | fidp->clunked = true; |
b41e2992 | 564 | |
6d54af0e | 565 | put_fid(pdu, fidp); |
b41e2992 | 566 | } |
b41e2992 DS |
567 | } |
568 | ||
286d5652 AL |
569 | #define P9_QID_TYPE_DIR 0x80 |
570 | #define P9_QID_TYPE_SYMLINK 0x02 | |
571 | ||
572 | #define P9_STAT_MODE_DIR 0x80000000 | |
573 | #define P9_STAT_MODE_APPEND 0x40000000 | |
574 | #define P9_STAT_MODE_EXCL 0x20000000 | |
575 | #define P9_STAT_MODE_MOUNT 0x10000000 | |
576 | #define P9_STAT_MODE_AUTH 0x08000000 | |
577 | #define P9_STAT_MODE_TMP 0x04000000 | |
578 | #define P9_STAT_MODE_SYMLINK 0x02000000 | |
579 | #define P9_STAT_MODE_LINK 0x01000000 | |
580 | #define P9_STAT_MODE_DEVICE 0x00800000 | |
581 | #define P9_STAT_MODE_NAMED_PIPE 0x00200000 | |
582 | #define P9_STAT_MODE_SOCKET 0x00100000 | |
583 | #define P9_STAT_MODE_SETUID 0x00080000 | |
584 | #define P9_STAT_MODE_SETGID 0x00040000 | |
585 | #define P9_STAT_MODE_SETVTX 0x00010000 | |
586 | ||
587 | #define P9_STAT_MODE_TYPE_BITS (P9_STAT_MODE_DIR | \ | |
588 | P9_STAT_MODE_SYMLINK | \ | |
589 | P9_STAT_MODE_LINK | \ | |
590 | P9_STAT_MODE_DEVICE | \ | |
591 | P9_STAT_MODE_NAMED_PIPE | \ | |
592 | P9_STAT_MODE_SOCKET) | |
593 | ||
6b6aa828 CS |
594 | /* Mirrors all bits of a byte. So e.g. binary 10100000 would become 00000101. */ |
595 | static inline uint8_t mirror8bit(uint8_t byte) | |
596 | { | |
597 | return (byte * 0x0202020202ULL & 0x010884422010ULL) % 1023; | |
598 | } | |
599 | ||
600 | /* Same as mirror8bit() just for a 64 bit data type instead for a byte. */ | |
601 | static inline uint64_t mirror64bit(uint64_t value) | |
602 | { | |
603 | return ((uint64_t)mirror8bit(value & 0xff) << 56) | | |
604 | ((uint64_t)mirror8bit((value >> 8) & 0xff) << 48) | | |
605 | ((uint64_t)mirror8bit((value >> 16) & 0xff) << 40) | | |
606 | ((uint64_t)mirror8bit((value >> 24) & 0xff) << 32) | | |
607 | ((uint64_t)mirror8bit((value >> 32) & 0xff) << 24) | | |
608 | ((uint64_t)mirror8bit((value >> 40) & 0xff) << 16) | | |
609 | ((uint64_t)mirror8bit((value >> 48) & 0xff) << 8) | | |
610 | ((uint64_t)mirror8bit((value >> 56) & 0xff)); | |
611 | } | |
612 | ||
613 | /** | |
614 | * @brief Parameter k for the Exponential Golomb algorihm to be used. | |
615 | * | |
616 | * The smaller this value, the smaller the minimum bit count for the Exp. | |
617 | * Golomb generated affixes will be (at lowest index) however for the | |
618 | * price of having higher maximum bit count of generated affixes (at highest | |
619 | * index). Likewise increasing this parameter yields in smaller maximum bit | |
620 | * count for the price of having higher minimum bit count. | |
621 | * | |
622 | * In practice that means: a good value for k depends on the expected amount | |
623 | * of devices to be exposed by one export. For a small amount of devices k | |
624 | * should be small, for a large amount of devices k might be increased | |
625 | * instead. The default of k=0 should be fine for most users though. | |
626 | * | |
627 | * @b IMPORTANT: In case this ever becomes a runtime parameter; the value of | |
628 | * k should not change as long as guest is still running! Because that would | |
629 | * cause completely different inode numbers to be generated on guest. | |
630 | */ | |
631 | #define EXP_GOLOMB_K 0 | |
632 | ||
633 | /** | |
634 | * @brief Exponential Golomb algorithm for arbitrary k (including k=0). | |
635 | * | |
636 | * The Exponential Golomb algorithm generates @b prefixes (@b not suffixes!) | |
637 | * with growing length and with the mathematical property of being | |
638 | * "prefix-free". The latter means the generated prefixes can be prepended | |
639 | * in front of arbitrary numbers and the resulting concatenated numbers are | |
640 | * guaranteed to be always unique. | |
641 | * | |
642 | * This is a minor adjustment to the original Exp. Golomb algorithm in the | |
643 | * sense that lowest allowed index (@param n) starts with 1, not with zero. | |
644 | * | |
645 | * @param n - natural number (or index) of the prefix to be generated | |
646 | * (1, 2, 3, ...) | |
647 | * @param k - parameter k of Exp. Golomb algorithm to be used | |
648 | * (see comment on EXP_GOLOMB_K macro for details about k) | |
649 | */ | |
650 | static VariLenAffix expGolombEncode(uint64_t n, int k) | |
651 | { | |
652 | const uint64_t value = n + (1 << k) - 1; | |
653 | const int bits = (int) log2(value) + 1; | |
654 | return (VariLenAffix) { | |
655 | .type = AffixType_Prefix, | |
656 | .value = value, | |
657 | .bits = bits + MAX((bits - 1 - k), 0) | |
658 | }; | |
659 | } | |
660 | ||
661 | /** | |
662 | * @brief Converts a suffix into a prefix, or a prefix into a suffix. | |
663 | * | |
664 | * Simply mirror all bits of the affix value, for the purpose to preserve | |
665 | * respectively the mathematical "prefix-free" or "suffix-free" property | |
666 | * after the conversion. | |
667 | * | |
668 | * If a passed prefix is suitable to create unique numbers, then the | |
669 | * returned suffix is suitable to create unique numbers as well (and vice | |
670 | * versa). | |
671 | */ | |
672 | static VariLenAffix invertAffix(const VariLenAffix *affix) | |
673 | { | |
674 | return (VariLenAffix) { | |
675 | .type = | |
676 | (affix->type == AffixType_Suffix) ? | |
677 | AffixType_Prefix : AffixType_Suffix, | |
678 | .value = | |
679 | mirror64bit(affix->value) >> | |
680 | ((sizeof(affix->value) * 8) - affix->bits), | |
681 | .bits = affix->bits | |
682 | }; | |
683 | } | |
684 | ||
685 | /** | |
686 | * @brief Generates suffix numbers with "suffix-free" property. | |
687 | * | |
688 | * This is just a wrapper function on top of the Exp. Golomb algorithm. | |
689 | * | |
690 | * Since the Exp. Golomb algorithm generates prefixes, but we need suffixes, | |
691 | * this function converts the Exp. Golomb prefixes into appropriate suffixes | |
692 | * which are still suitable for generating unique numbers. | |
693 | * | |
694 | * @param n - natural number (or index) of the suffix to be generated | |
695 | * (1, 2, 3, ...) | |
696 | */ | |
697 | static VariLenAffix affixForIndex(uint64_t index) | |
698 | { | |
699 | VariLenAffix prefix; | |
700 | prefix = expGolombEncode(index, EXP_GOLOMB_K); | |
701 | return invertAffix(&prefix); /* convert prefix to suffix */ | |
702 | } | |
703 | ||
1a6ed33c AM |
704 | /* creative abuse of tb_hash_func7, which is based on xxhash */ |
705 | static uint32_t qpp_hash(QppEntry e) | |
706 | { | |
707 | return qemu_xxhash7(e.ino_prefix, e.dev, 0, 0, 0); | |
708 | } | |
709 | ||
f3fe4a2d AM |
710 | static uint32_t qpf_hash(QpfEntry e) |
711 | { | |
712 | return qemu_xxhash7(e.ino, e.dev, 0, 0, 0); | |
713 | } | |
714 | ||
6b6aa828 CS |
715 | static bool qpd_cmp_func(const void *obj, const void *userp) |
716 | { | |
717 | const QpdEntry *e1 = obj, *e2 = userp; | |
718 | return e1->dev == e2->dev; | |
719 | } | |
720 | ||
721 | static bool qpp_cmp_func(const void *obj, const void *userp) | |
1a6ed33c AM |
722 | { |
723 | const QppEntry *e1 = obj, *e2 = userp; | |
724 | return e1->dev == e2->dev && e1->ino_prefix == e2->ino_prefix; | |
725 | } | |
726 | ||
6b6aa828 | 727 | static bool qpf_cmp_func(const void *obj, const void *userp) |
f3fe4a2d AM |
728 | { |
729 | const QpfEntry *e1 = obj, *e2 = userp; | |
730 | return e1->dev == e2->dev && e1->ino == e2->ino; | |
731 | } | |
732 | ||
733 | static void qp_table_remove(void *p, uint32_t h, void *up) | |
1a6ed33c AM |
734 | { |
735 | g_free(p); | |
736 | } | |
737 | ||
f3fe4a2d | 738 | static void qp_table_destroy(struct qht *ht) |
1a6ed33c AM |
739 | { |
740 | if (!ht || !ht->map) { | |
741 | return; | |
742 | } | |
f3fe4a2d | 743 | qht_iter(ht, qp_table_remove, NULL); |
1a6ed33c AM |
744 | qht_destroy(ht); |
745 | } | |
746 | ||
6b6aa828 CS |
747 | static void qpd_table_init(struct qht *ht) |
748 | { | |
749 | qht_init(ht, qpd_cmp_func, 1, QHT_MODE_AUTO_RESIZE); | |
750 | } | |
751 | ||
1a6ed33c AM |
752 | static void qpp_table_init(struct qht *ht) |
753 | { | |
6b6aa828 | 754 | qht_init(ht, qpp_cmp_func, 1, QHT_MODE_AUTO_RESIZE); |
1a6ed33c AM |
755 | } |
756 | ||
f3fe4a2d AM |
757 | static void qpf_table_init(struct qht *ht) |
758 | { | |
6b6aa828 CS |
759 | qht_init(ht, qpf_cmp_func, 1 << 16, QHT_MODE_AUTO_RESIZE); |
760 | } | |
761 | ||
762 | /* | |
763 | * Returns how many (high end) bits of inode numbers of the passed fs | |
764 | * device shall be used (in combination with the device number) to | |
765 | * generate hash values for qpp_table entries. | |
766 | * | |
767 | * This function is required if variable length suffixes are used for inode | |
768 | * number mapping on guest level. Since a device may end up having multiple | |
769 | * entries in qpp_table, each entry most probably with a different suffix | |
770 | * length, we thus need this function in conjunction with qpd_table to | |
771 | * "agree" about a fix amount of bits (per device) to be always used for | |
772 | * generating hash values for the purpose of accessing qpp_table in order | |
773 | * get consistent behaviour when accessing qpp_table. | |
774 | */ | |
775 | static int qid_inode_prefix_hash_bits(V9fsPDU *pdu, dev_t dev) | |
776 | { | |
777 | QpdEntry lookup = { | |
778 | .dev = dev | |
779 | }, *val; | |
780 | uint32_t hash = dev; | |
781 | VariLenAffix affix; | |
782 | ||
783 | val = qht_lookup(&pdu->s->qpd_table, &lookup, hash); | |
784 | if (!val) { | |
785 | val = g_malloc0(sizeof(QpdEntry)); | |
786 | *val = lookup; | |
787 | affix = affixForIndex(pdu->s->qp_affix_next); | |
788 | val->prefix_bits = affix.bits; | |
789 | qht_insert(&pdu->s->qpd_table, val, hash, NULL); | |
790 | pdu->s->qp_ndevices++; | |
791 | } | |
792 | return val->prefix_bits; | |
f3fe4a2d AM |
793 | } |
794 | ||
6b6aa828 CS |
795 | /** |
796 | * @brief Slow / full mapping host inode nr -> guest inode nr. | |
797 | * | |
798 | * This function performs a slower and much more costly remapping of an | |
799 | * original file inode number on host to an appropriate different inode | |
800 | * number on guest. For every (dev, inode) combination on host a new | |
801 | * sequential number is generated, cached and exposed as inode number on | |
802 | * guest. | |
803 | * | |
804 | * This is just a "last resort" fallback solution if the much faster/cheaper | |
805 | * qid_path_suffixmap() failed. In practice this slow / full mapping is not | |
806 | * expected ever to be used at all though. | |
807 | * | |
808 | * @see qid_path_suffixmap() for details | |
809 | * | |
810 | */ | |
f3fe4a2d AM |
811 | static int qid_path_fullmap(V9fsPDU *pdu, const struct stat *stbuf, |
812 | uint64_t *path) | |
813 | { | |
814 | QpfEntry lookup = { | |
815 | .dev = stbuf->st_dev, | |
816 | .ino = stbuf->st_ino | |
817 | }, *val; | |
818 | uint32_t hash = qpf_hash(lookup); | |
6b6aa828 | 819 | VariLenAffix affix; |
f3fe4a2d AM |
820 | |
821 | val = qht_lookup(&pdu->s->qpf_table, &lookup, hash); | |
822 | ||
823 | if (!val) { | |
824 | if (pdu->s->qp_fullpath_next == 0) { | |
825 | /* no more files can be mapped :'( */ | |
826 | error_report_once( | |
827 | "9p: No more prefixes available for remapping inodes from " | |
828 | "host to guest." | |
829 | ); | |
830 | return -ENFILE; | |
831 | } | |
832 | ||
833 | val = g_malloc0(sizeof(QppEntry)); | |
834 | *val = lookup; | |
835 | ||
836 | /* new unique inode and device combo */ | |
6b6aa828 CS |
837 | affix = affixForIndex( |
838 | 1ULL << (sizeof(pdu->s->qp_affix_next) * 8) | |
839 | ); | |
840 | val->path = (pdu->s->qp_fullpath_next++ << affix.bits) | affix.value; | |
841 | pdu->s->qp_fullpath_next &= ((1ULL << (64 - affix.bits)) - 1); | |
f3fe4a2d AM |
842 | qht_insert(&pdu->s->qpf_table, val, hash, NULL); |
843 | } | |
844 | ||
845 | *path = val->path; | |
846 | return 0; | |
847 | } | |
848 | ||
6b6aa828 CS |
849 | /** |
850 | * @brief Quick mapping host inode nr -> guest inode nr. | |
1a6ed33c | 851 | * |
6b6aa828 CS |
852 | * This function performs quick remapping of an original file inode number |
853 | * on host to an appropriate different inode number on guest. This remapping | |
854 | * of inodes is required to avoid inode nr collisions on guest which would | |
855 | * happen if the 9p export contains more than 1 exported file system (or | |
856 | * more than 1 file system data set), because unlike on host level where the | |
857 | * files would have different device nrs, all files exported by 9p would | |
858 | * share the same device nr on guest (the device nr of the virtual 9p device | |
859 | * that is). | |
860 | * | |
861 | * Inode remapping is performed by chopping off high end bits of the original | |
862 | * inode number from host, shifting the result upwards and then assigning a | |
863 | * generated suffix number for the low end bits, where the same suffix number | |
864 | * will be shared by all inodes with the same device id AND the same high end | |
865 | * bits that have been chopped off. That approach utilizes the fact that inode | |
866 | * numbers very likely share the same high end bits (i.e. due to their common | |
867 | * sequential generation by file systems) and hence we only have to generate | |
868 | * and track a very limited amount of suffixes in practice due to that. | |
869 | * | |
870 | * We generate variable size suffixes for that purpose. The 1st generated | |
871 | * suffix will only have 1 bit and hence we only need to chop off 1 bit from | |
872 | * the original inode number. The subsequent suffixes being generated will | |
873 | * grow in (bit) size subsequently, i.e. the 2nd and 3rd suffix being | |
874 | * generated will have 3 bits and hence we have to chop off 3 bits from their | |
875 | * original inodes, and so on. That approach of using variable length suffixes | |
876 | * (i.e. over fixed size ones) utilizes the fact that in practice only a very | |
877 | * limited amount of devices are shared by the same export (e.g. typically | |
878 | * less than 2 dozen devices per 9p export), so in practice we need to chop | |
879 | * off less bits than with fixed size prefixes and yet are flexible to add | |
880 | * new devices at runtime below host's export directory at any time without | |
881 | * having to reboot guest nor requiring to reconfigure guest for that. And due | |
882 | * to the very limited amount of original high end bits that we chop off that | |
883 | * way, the total amount of suffixes we need to generate is less than by using | |
884 | * fixed size prefixes and hence it also improves performance of the inode | |
885 | * remapping algorithm, and finally has the nice side effect that the inode | |
886 | * numbers on guest will be much smaller & human friendly. ;-) | |
1a6ed33c | 887 | */ |
6b6aa828 | 888 | static int qid_path_suffixmap(V9fsPDU *pdu, const struct stat *stbuf, |
1a6ed33c AM |
889 | uint64_t *path) |
890 | { | |
6b6aa828 | 891 | const int ino_hash_bits = qid_inode_prefix_hash_bits(pdu, stbuf->st_dev); |
1a6ed33c AM |
892 | QppEntry lookup = { |
893 | .dev = stbuf->st_dev, | |
6b6aa828 | 894 | .ino_prefix = (uint16_t) (stbuf->st_ino >> (64 - ino_hash_bits)) |
1a6ed33c AM |
895 | }, *val; |
896 | uint32_t hash = qpp_hash(lookup); | |
897 | ||
898 | val = qht_lookup(&pdu->s->qpp_table, &lookup, hash); | |
899 | ||
900 | if (!val) { | |
6b6aa828 CS |
901 | if (pdu->s->qp_affix_next == 0) { |
902 | /* we ran out of affixes */ | |
f3fe4a2d AM |
903 | warn_report_once( |
904 | "9p: Potential degraded performance of inode remapping" | |
1a6ed33c AM |
905 | ); |
906 | return -ENFILE; | |
907 | } | |
908 | ||
909 | val = g_malloc0(sizeof(QppEntry)); | |
910 | *val = lookup; | |
911 | ||
6b6aa828 CS |
912 | /* new unique inode affix and device combo */ |
913 | val->qp_affix_index = pdu->s->qp_affix_next++; | |
914 | val->qp_affix = affixForIndex(val->qp_affix_index); | |
1a6ed33c AM |
915 | qht_insert(&pdu->s->qpp_table, val, hash, NULL); |
916 | } | |
6b6aa828 CS |
917 | /* assuming generated affix to be suffix type, not prefix */ |
918 | *path = (stbuf->st_ino << val->qp_affix.bits) | val->qp_affix.value; | |
1a6ed33c AM |
919 | return 0; |
920 | } | |
921 | ||
3b5ee9e8 | 922 | static int stat_to_qid(V9fsPDU *pdu, const struct stat *stbuf, V9fsQID *qidp) |
286d5652 | 923 | { |
1a6ed33c | 924 | int err; |
286d5652 AL |
925 | size_t size; |
926 | ||
1a6ed33c AM |
927 | if (pdu->s->ctx.export_flags & V9FS_REMAP_INODES) { |
928 | /* map inode+device to qid path (fast path) */ | |
6b6aa828 | 929 | err = qid_path_suffixmap(pdu, stbuf, &qidp->path); |
f3fe4a2d AM |
930 | if (err == -ENFILE) { |
931 | /* fast path didn't work, fall back to full map */ | |
932 | err = qid_path_fullmap(pdu, stbuf, &qidp->path); | |
933 | } | |
1a6ed33c AM |
934 | if (err) { |
935 | return err; | |
936 | } | |
937 | } else { | |
938 | if (pdu->s->dev_id != stbuf->st_dev) { | |
939 | if (pdu->s->ctx.export_flags & V9FS_FORBID_MULTIDEVS) { | |
940 | error_report_once( | |
941 | "9p: Multiple devices detected in same VirtFS export. " | |
942 | "Access of guest to additional devices is (partly) " | |
943 | "denied due to virtfs option 'multidevs=forbid' being " | |
944 | "effective." | |
945 | ); | |
946 | return -ENODEV; | |
947 | } else { | |
948 | warn_report_once( | |
949 | "9p: Multiple devices detected in same VirtFS export, " | |
950 | "which might lead to file ID collisions and severe " | |
951 | "misbehaviours on guest! You should either use a " | |
952 | "separate export for each device shared from host or " | |
953 | "use virtfs option 'multidevs=remap'!" | |
954 | ); | |
955 | } | |
956 | } | |
957 | memset(&qidp->path, 0, sizeof(qidp->path)); | |
958 | size = MIN(sizeof(stbuf->st_ino), sizeof(qidp->path)); | |
959 | memcpy(&qidp->path, &stbuf->st_ino, size); | |
3b5ee9e8 AM |
960 | } |
961 | ||
286d5652 AL |
962 | qidp->version = stbuf->st_mtime ^ (stbuf->st_size << 8); |
963 | qidp->type = 0; | |
964 | if (S_ISDIR(stbuf->st_mode)) { | |
965 | qidp->type |= P9_QID_TYPE_DIR; | |
966 | } | |
967 | if (S_ISLNK(stbuf->st_mode)) { | |
968 | qidp->type |= P9_QID_TYPE_SYMLINK; | |
969 | } | |
3b5ee9e8 AM |
970 | |
971 | return 0; | |
286d5652 AL |
972 | } |
973 | ||
4b311c5f | 974 | V9fsPDU *pdu_alloc(V9fsState *s) |
9f107513 AL |
975 | { |
976 | V9fsPDU *pdu = NULL; | |
977 | ||
978 | if (!QLIST_EMPTY(&s->free_list)) { | |
bccacf6c AK |
979 | pdu = QLIST_FIRST(&s->free_list); |
980 | QLIST_REMOVE(pdu, next); | |
981 | QLIST_INSERT_HEAD(&s->active_list, pdu, next); | |
9f107513 AL |
982 | } |
983 | return pdu; | |
984 | } | |
985 | ||
4b311c5f | 986 | void pdu_free(V9fsPDU *pdu) |
9f107513 | 987 | { |
6868a420 | 988 | V9fsState *s = pdu->s; |
f74e27bf GK |
989 | |
990 | g_assert(!pdu->cancelled); | |
991 | QLIST_REMOVE(pdu, next); | |
992 | QLIST_INSERT_HEAD(&s->free_list, pdu, next); | |
9f107513 AL |
993 | } |
994 | ||
8440e22e | 995 | static void coroutine_fn pdu_complete(V9fsPDU *pdu, ssize_t len) |
405a549a AL |
996 | { |
997 | int8_t id = pdu->id + 1; /* Response */ | |
ad38ce9e | 998 | V9fsState *s = pdu->s; |
06a37db7 | 999 | int ret; |
405a549a | 1000 | |
fc78d5ee KF |
1001 | /* |
1002 | * The 9p spec requires that successfully cancelled pdus receive no reply. | |
1003 | * Sending a reply would confuse clients because they would | |
1004 | * assume that any EINTR is the actual result of the operation, | |
1005 | * rather than a consequence of the cancellation. However, if | |
1006 | * the operation completed (succesfully or with an error other | |
1007 | * than caused be cancellation), we do send out that reply, both | |
1008 | * for efficiency and to avoid confusing the rest of the state machine | |
1009 | * that assumes passing a non-error here will mean a successful | |
1010 | * transmission of the reply. | |
1011 | */ | |
1012 | bool discard = pdu->cancelled && len == -EINTR; | |
1013 | if (discard) { | |
1014 | trace_v9fs_rcancel(pdu->tag, pdu->id); | |
1015 | pdu->size = 0; | |
1016 | goto out_notify; | |
1017 | } | |
1018 | ||
405a549a | 1019 | if (len < 0) { |
405a549a | 1020 | int err = -len; |
8f4d1ca5 | 1021 | len = 7; |
405a549a | 1022 | |
8f4d1ca5 AB |
1023 | if (s->proto_version != V9FS_PROTO_2000L) { |
1024 | V9fsString str; | |
1025 | ||
1026 | str.data = strerror(err); | |
1027 | str.size = strlen(str.data); | |
1028 | ||
06a37db7 GK |
1029 | ret = pdu_marshal(pdu, len, "s", &str); |
1030 | if (ret < 0) { | |
1031 | goto out_notify; | |
1032 | } | |
1033 | len += ret; | |
8f4d1ca5 AB |
1034 | id = P9_RERROR; |
1035 | } | |
405a549a | 1036 | |
06a37db7 GK |
1037 | ret = pdu_marshal(pdu, len, "d", err); |
1038 | if (ret < 0) { | |
1039 | goto out_notify; | |
1040 | } | |
1041 | len += ret; | |
405a549a | 1042 | |
8f4d1ca5 AB |
1043 | if (s->proto_version == V9FS_PROTO_2000L) { |
1044 | id = P9_RLERROR; | |
1045 | } | |
7999f7e1 | 1046 | trace_v9fs_rerror(pdu->tag, pdu->id, err); /* Trace ERROR */ |
405a549a AL |
1047 | } |
1048 | ||
1049 | /* fill out the header */ | |
06a37db7 GK |
1050 | if (pdu_marshal(pdu, 0, "dbw", (int32_t)len, id, pdu->tag) < 0) { |
1051 | goto out_notify; | |
1052 | } | |
405a549a AL |
1053 | |
1054 | /* keep these in sync */ | |
1055 | pdu->size = len; | |
1056 | pdu->id = id; | |
1057 | ||
06a37db7 | 1058 | out_notify: |
a17d8659 | 1059 | pdu->s->transport->push_and_notify(pdu); |
405a549a | 1060 | |
bccacf6c | 1061 | /* Now wakeup anybody waiting in flush for this request */ |
f74e27bf GK |
1062 | if (!qemu_co_queue_next(&pdu->complete)) { |
1063 | pdu_free(pdu); | |
1064 | } | |
405a549a AL |
1065 | } |
1066 | ||
bb9e3216 AL |
1067 | static mode_t v9mode_to_mode(uint32_t mode, V9fsString *extension) |
1068 | { | |
1069 | mode_t ret; | |
1070 | ||
1071 | ret = mode & 0777; | |
1072 | if (mode & P9_STAT_MODE_DIR) { | |
1073 | ret |= S_IFDIR; | |
1074 | } | |
1075 | ||
cf03eb2c AB |
1076 | if (mode & P9_STAT_MODE_SYMLINK) { |
1077 | ret |= S_IFLNK; | |
1078 | } | |
1079 | if (mode & P9_STAT_MODE_SOCKET) { | |
1080 | ret |= S_IFSOCK; | |
1081 | } | |
1082 | if (mode & P9_STAT_MODE_NAMED_PIPE) { | |
1083 | ret |= S_IFIFO; | |
1084 | } | |
1085 | if (mode & P9_STAT_MODE_DEVICE) { | |
c7e587b7 | 1086 | if (extension->size && extension->data[0] == 'c') { |
cf03eb2c AB |
1087 | ret |= S_IFCHR; |
1088 | } else { | |
1089 | ret |= S_IFBLK; | |
bb9e3216 AL |
1090 | } |
1091 | } | |
1092 | ||
01011733 | 1093 | if (!(ret & ~0777)) { |
bb9e3216 AL |
1094 | ret |= S_IFREG; |
1095 | } | |
1096 | ||
1097 | if (mode & P9_STAT_MODE_SETUID) { | |
1098 | ret |= S_ISUID; | |
1099 | } | |
1100 | if (mode & P9_STAT_MODE_SETGID) { | |
1101 | ret |= S_ISGID; | |
1102 | } | |
1103 | if (mode & P9_STAT_MODE_SETVTX) { | |
1104 | ret |= S_ISVTX; | |
1105 | } | |
1106 | ||
1107 | return ret; | |
1108 | } | |
1109 | ||
1110 | static int donttouch_stat(V9fsStat *stat) | |
1111 | { | |
1112 | if (stat->type == -1 && | |
1113 | stat->dev == -1 && | |
87032833 AM |
1114 | stat->qid.type == 0xff && |
1115 | stat->qid.version == (uint32_t) -1 && | |
1116 | stat->qid.path == (uint64_t) -1 && | |
bb9e3216 AL |
1117 | stat->mode == -1 && |
1118 | stat->atime == -1 && | |
1119 | stat->mtime == -1 && | |
1120 | stat->length == -1 && | |
1121 | !stat->name.size && | |
1122 | !stat->uid.size && | |
1123 | !stat->gid.size && | |
1124 | !stat->muid.size && | |
1125 | stat->n_uid == -1 && | |
1126 | stat->n_gid == -1 && | |
1127 | stat->n_muid == -1) { | |
1128 | return 1; | |
1129 | } | |
1130 | ||
1131 | return 0; | |
1132 | } | |
1133 | ||
ddca7f86 MK |
1134 | static void v9fs_stat_init(V9fsStat *stat) |
1135 | { | |
1136 | v9fs_string_init(&stat->name); | |
1137 | v9fs_string_init(&stat->uid); | |
1138 | v9fs_string_init(&stat->gid); | |
1139 | v9fs_string_init(&stat->muid); | |
1140 | v9fs_string_init(&stat->extension); | |
1141 | } | |
1142 | ||
bb9e3216 AL |
1143 | static void v9fs_stat_free(V9fsStat *stat) |
1144 | { | |
1145 | v9fs_string_free(&stat->name); | |
1146 | v9fs_string_free(&stat->uid); | |
1147 | v9fs_string_free(&stat->gid); | |
1148 | v9fs_string_free(&stat->muid); | |
1149 | v9fs_string_free(&stat->extension); | |
1150 | } | |
1151 | ||
1152 | static uint32_t stat_to_v9mode(const struct stat *stbuf) | |
1153 | { | |
1154 | uint32_t mode; | |
1155 | ||
1156 | mode = stbuf->st_mode & 0777; | |
1157 | if (S_ISDIR(stbuf->st_mode)) { | |
1158 | mode |= P9_STAT_MODE_DIR; | |
1159 | } | |
1160 | ||
cf03eb2c AB |
1161 | if (S_ISLNK(stbuf->st_mode)) { |
1162 | mode |= P9_STAT_MODE_SYMLINK; | |
1163 | } | |
bb9e3216 | 1164 | |
cf03eb2c AB |
1165 | if (S_ISSOCK(stbuf->st_mode)) { |
1166 | mode |= P9_STAT_MODE_SOCKET; | |
1167 | } | |
bb9e3216 | 1168 | |
cf03eb2c AB |
1169 | if (S_ISFIFO(stbuf->st_mode)) { |
1170 | mode |= P9_STAT_MODE_NAMED_PIPE; | |
1171 | } | |
bb9e3216 | 1172 | |
cf03eb2c AB |
1173 | if (S_ISBLK(stbuf->st_mode) || S_ISCHR(stbuf->st_mode)) { |
1174 | mode |= P9_STAT_MODE_DEVICE; | |
1175 | } | |
bb9e3216 | 1176 | |
cf03eb2c AB |
1177 | if (stbuf->st_mode & S_ISUID) { |
1178 | mode |= P9_STAT_MODE_SETUID; | |
1179 | } | |
bb9e3216 | 1180 | |
cf03eb2c AB |
1181 | if (stbuf->st_mode & S_ISGID) { |
1182 | mode |= P9_STAT_MODE_SETGID; | |
1183 | } | |
bb9e3216 | 1184 | |
cf03eb2c AB |
1185 | if (stbuf->st_mode & S_ISVTX) { |
1186 | mode |= P9_STAT_MODE_SETVTX; | |
bb9e3216 AL |
1187 | } |
1188 | ||
1189 | return mode; | |
1190 | } | |
1191 | ||
6069537f JD |
1192 | static int coroutine_fn stat_to_v9stat(V9fsPDU *pdu, V9fsPath *path, |
1193 | const char *basename, | |
8440e22e GK |
1194 | const struct stat *stbuf, |
1195 | V9fsStat *v9stat) | |
bb9e3216 AL |
1196 | { |
1197 | int err; | |
bb9e3216 AL |
1198 | |
1199 | memset(v9stat, 0, sizeof(*v9stat)); | |
1200 | ||
3b5ee9e8 AM |
1201 | err = stat_to_qid(pdu, stbuf, &v9stat->qid); |
1202 | if (err < 0) { | |
1203 | return err; | |
1204 | } | |
bb9e3216 AL |
1205 | v9stat->mode = stat_to_v9mode(stbuf); |
1206 | v9stat->atime = stbuf->st_atime; | |
1207 | v9stat->mtime = stbuf->st_mtime; | |
1208 | v9stat->length = stbuf->st_size; | |
1209 | ||
abdf0086 GK |
1210 | v9fs_string_free(&v9stat->uid); |
1211 | v9fs_string_free(&v9stat->gid); | |
1212 | v9fs_string_free(&v9stat->muid); | |
bb9e3216 | 1213 | |
cf03eb2c AB |
1214 | v9stat->n_uid = stbuf->st_uid; |
1215 | v9stat->n_gid = stbuf->st_gid; | |
1216 | v9stat->n_muid = 0; | |
bb9e3216 | 1217 | |
abdf0086 | 1218 | v9fs_string_free(&v9stat->extension); |
bb9e3216 | 1219 | |
cf03eb2c | 1220 | if (v9stat->mode & P9_STAT_MODE_SYMLINK) { |
6069537f | 1221 | err = v9fs_co_readlink(pdu, path, &v9stat->extension); |
7a5ca31e | 1222 | if (err < 0) { |
cf03eb2c | 1223 | return err; |
bb9e3216 | 1224 | } |
cf03eb2c AB |
1225 | } else if (v9stat->mode & P9_STAT_MODE_DEVICE) { |
1226 | v9fs_string_sprintf(&v9stat->extension, "%c %u %u", | |
1227 | S_ISCHR(stbuf->st_mode) ? 'c' : 'b', | |
1228 | major(stbuf->st_rdev), minor(stbuf->st_rdev)); | |
1229 | } else if (S_ISDIR(stbuf->st_mode) || S_ISREG(stbuf->st_mode)) { | |
c9ba47dc SW |
1230 | v9fs_string_sprintf(&v9stat->extension, "%s %lu", |
1231 | "HARDLINKCOUNT", (unsigned long)stbuf->st_nlink); | |
bb9e3216 AL |
1232 | } |
1233 | ||
6069537f | 1234 | v9fs_string_sprintf(&v9stat->name, "%s", basename); |
bb9e3216 AL |
1235 | |
1236 | v9stat->size = 61 + | |
1237 | v9fs_string_size(&v9stat->name) + | |
1238 | v9fs_string_size(&v9stat->uid) + | |
1239 | v9fs_string_size(&v9stat->gid) + | |
1240 | v9fs_string_size(&v9stat->muid) + | |
1241 | v9fs_string_size(&v9stat->extension); | |
1242 | return 0; | |
1243 | } | |
1244 | ||
00ede4c2 SK |
1245 | #define P9_STATS_MODE 0x00000001ULL |
1246 | #define P9_STATS_NLINK 0x00000002ULL | |
1247 | #define P9_STATS_UID 0x00000004ULL | |
1248 | #define P9_STATS_GID 0x00000008ULL | |
1249 | #define P9_STATS_RDEV 0x00000010ULL | |
1250 | #define P9_STATS_ATIME 0x00000020ULL | |
1251 | #define P9_STATS_MTIME 0x00000040ULL | |
1252 | #define P9_STATS_CTIME 0x00000080ULL | |
1253 | #define P9_STATS_INO 0x00000100ULL | |
1254 | #define P9_STATS_SIZE 0x00000200ULL | |
1255 | #define P9_STATS_BLOCKS 0x00000400ULL | |
1256 | ||
1257 | #define P9_STATS_BTIME 0x00000800ULL | |
1258 | #define P9_STATS_GEN 0x00001000ULL | |
1259 | #define P9_STATS_DATA_VERSION 0x00002000ULL | |
1260 | ||
1261 | #define P9_STATS_BASIC 0x000007ffULL /* Mask for fields up to BLOCKS */ | |
1262 | #define P9_STATS_ALL 0x00003fffULL /* Mask for All fields above */ | |
1263 | ||
1264 | ||
3b5ee9e8 | 1265 | static int stat_to_v9stat_dotl(V9fsPDU *pdu, const struct stat *stbuf, |
8db21ce7 | 1266 | V9fsStatDotl *v9lstat) |
00ede4c2 SK |
1267 | { |
1268 | memset(v9lstat, 0, sizeof(*v9lstat)); | |
1269 | ||
1270 | v9lstat->st_mode = stbuf->st_mode; | |
1271 | v9lstat->st_nlink = stbuf->st_nlink; | |
1272 | v9lstat->st_uid = stbuf->st_uid; | |
1273 | v9lstat->st_gid = stbuf->st_gid; | |
1274 | v9lstat->st_rdev = stbuf->st_rdev; | |
1275 | v9lstat->st_size = stbuf->st_size; | |
1276 | v9lstat->st_blksize = stbuf->st_blksize; | |
1277 | v9lstat->st_blocks = stbuf->st_blocks; | |
1278 | v9lstat->st_atime_sec = stbuf->st_atime; | |
1279 | v9lstat->st_atime_nsec = stbuf->st_atim.tv_nsec; | |
1280 | v9lstat->st_mtime_sec = stbuf->st_mtime; | |
1281 | v9lstat->st_mtime_nsec = stbuf->st_mtim.tv_nsec; | |
1282 | v9lstat->st_ctime_sec = stbuf->st_ctime; | |
1283 | v9lstat->st_ctime_nsec = stbuf->st_ctim.tv_nsec; | |
1284 | /* Currently we only support BASIC fields in stat */ | |
1285 | v9lstat->st_result_mask = P9_STATS_BASIC; | |
1286 | ||
3b5ee9e8 | 1287 | return stat_to_qid(pdu, stbuf, &v9lstat->qid); |
00ede4c2 SK |
1288 | } |
1289 | ||
1f5a89bf AL |
1290 | static void print_sg(struct iovec *sg, int cnt) |
1291 | { | |
1292 | int i; | |
1293 | ||
1294 | printf("sg[%d]: {", cnt); | |
1295 | for (i = 0; i < cnt; i++) { | |
1296 | if (i) { | |
1297 | printf(", "); | |
1298 | } | |
1299 | printf("(%p, %zd)", sg[i].iov_base, sg[i].iov_len); | |
1300 | } | |
1301 | printf("}\n"); | |
1302 | } | |
1303 | ||
2289be19 AK |
1304 | /* Will call this only for path name based fid */ |
1305 | static void v9fs_fix_path(V9fsPath *dst, V9fsPath *src, int len) | |
8cf89e00 | 1306 | { |
2289be19 AK |
1307 | V9fsPath str; |
1308 | v9fs_path_init(&str); | |
1309 | v9fs_path_copy(&str, dst); | |
e3e83f2e | 1310 | v9fs_path_sprintf(dst, "%s%s", src->data, str.data + len); |
2289be19 | 1311 | v9fs_path_free(&str); |
8cf89e00 AL |
1312 | } |
1313 | ||
2c74c2cb MK |
1314 | static inline bool is_ro_export(FsContext *ctx) |
1315 | { | |
1316 | return ctx->export_flags & V9FS_RDONLY; | |
1317 | } | |
1318 | ||
8440e22e | 1319 | static void coroutine_fn v9fs_version(void *opaque) |
9f107513 | 1320 | { |
ddca7f86 | 1321 | ssize_t err; |
ff06030f VJ |
1322 | V9fsPDU *pdu = opaque; |
1323 | V9fsState *s = pdu->s; | |
92c1ad03 AL |
1324 | V9fsString version; |
1325 | size_t offset = 7; | |
1326 | ||
ddca7f86 MK |
1327 | v9fs_string_init(&version); |
1328 | err = pdu_unmarshal(pdu, offset, "ds", &s->msize, &version); | |
1329 | if (err < 0) { | |
ddca7f86 MK |
1330 | goto out; |
1331 | } | |
c572f23a | 1332 | trace_v9fs_version(pdu->tag, pdu->id, s->msize, version.data); |
92c1ad03 | 1333 | |
b41e2992 DS |
1334 | virtfs_reset(pdu); |
1335 | ||
84151514 MK |
1336 | if (!strcmp(version.data, "9P2000.u")) { |
1337 | s->proto_version = V9FS_PROTO_2000U; | |
1338 | } else if (!strcmp(version.data, "9P2000.L")) { | |
1339 | s->proto_version = V9FS_PROTO_2000L; | |
1340 | } else { | |
92c1ad03 | 1341 | v9fs_string_sprintf(&version, "unknown"); |
e16453a3 CS |
1342 | /* skip min. msize check, reporting invalid version has priority */ |
1343 | goto marshal; | |
9f107513 | 1344 | } |
92c1ad03 | 1345 | |
e16453a3 CS |
1346 | if (s->msize < P9_MIN_MSIZE) { |
1347 | err = -EMSGSIZE; | |
1348 | error_report( | |
1349 | "9pfs: Client requested msize < minimum msize (" | |
1350 | stringify(P9_MIN_MSIZE) ") supported by this server." | |
1351 | ); | |
1352 | goto out; | |
1353 | } | |
1354 | ||
62777d82 | 1355 | /* 8192 is the default msize of Linux clients */ |
c418f935 | 1356 | if (s->msize <= 8192 && !(s->ctx.export_flags & V9FS_NO_PERF_WARN)) { |
62777d82 CS |
1357 | warn_report_once( |
1358 | "9p: degraded performance: a reasonable high msize should be " | |
1359 | "chosen on client/guest side (chosen msize is <= 8192). See " | |
1360 | "https://wiki.qemu.org/Documentation/9psetup#msize for details." | |
1361 | ); | |
1362 | } | |
1363 | ||
e16453a3 | 1364 | marshal: |
ddca7f86 MK |
1365 | err = pdu_marshal(pdu, offset, "ds", s->msize, &version); |
1366 | if (err < 0) { | |
ddca7f86 MK |
1367 | goto out; |
1368 | } | |
403a905b | 1369 | err += offset; |
c572f23a | 1370 | trace_v9fs_version_return(pdu->tag, pdu->id, s->msize, version.data); |
ddca7f86 | 1371 | out: |
403a905b | 1372 | pdu_complete(pdu, err); |
92c1ad03 | 1373 | v9fs_string_free(&version); |
9f107513 AL |
1374 | } |
1375 | ||
8440e22e | 1376 | static void coroutine_fn v9fs_attach(void *opaque) |
9f107513 | 1377 | { |
ff06030f VJ |
1378 | V9fsPDU *pdu = opaque; |
1379 | V9fsState *s = pdu->s; | |
955efc47 AL |
1380 | int32_t fid, afid, n_uname; |
1381 | V9fsString uname, aname; | |
1382 | V9fsFidState *fidp; | |
955efc47 | 1383 | size_t offset = 7; |
8c158561 | 1384 | V9fsQID qid; |
955efc47 | 1385 | ssize_t err; |
11024375 | 1386 | struct stat stbuf; |
955efc47 | 1387 | |
ddca7f86 MK |
1388 | v9fs_string_init(&uname); |
1389 | v9fs_string_init(&aname); | |
1390 | err = pdu_unmarshal(pdu, offset, "ddssd", &fid, | |
1391 | &afid, &uname, &aname, &n_uname); | |
1392 | if (err < 0) { | |
1393 | goto out_nofid; | |
1394 | } | |
c572f23a | 1395 | trace_v9fs_attach(pdu->tag, pdu->id, fid, afid, uname.data, aname.data); |
955efc47 AL |
1396 | |
1397 | fidp = alloc_fid(s, fid); | |
1398 | if (fidp == NULL) { | |
1399 | err = -EINVAL; | |
84dfb926 | 1400 | goto out_nofid; |
9f107513 | 1401 | } |
955efc47 | 1402 | fidp->uid = n_uname; |
bccacf6c | 1403 | err = v9fs_co_name_to_path(pdu, NULL, "/", &fidp->path); |
2289be19 AK |
1404 | if (err < 0) { |
1405 | err = -EINVAL; | |
1406 | clunk_fid(s, fid); | |
1407 | goto out; | |
1408 | } | |
11024375 CS |
1409 | err = v9fs_co_lstat(pdu, &fidp->path, &stbuf); |
1410 | if (err < 0) { | |
1411 | err = -EINVAL; | |
1412 | clunk_fid(s, fid); | |
1413 | goto out; | |
1414 | } | |
1415 | err = stat_to_qid(pdu, &stbuf, &qid); | |
8c158561 | 1416 | if (err < 0) { |
955efc47 | 1417 | err = -EINVAL; |
84dfb926 | 1418 | clunk_fid(s, fid); |
955efc47 AL |
1419 | goto out; |
1420 | } | |
fe44dc91 | 1421 | |
4cdc0789 AK |
1422 | /* |
1423 | * disable migration if we haven't done already. | |
1424 | * attach could get called multiple times for the same export. | |
1425 | */ | |
1426 | if (!s->migration_blocker) { | |
f231b88d CR |
1427 | error_setg(&s->migration_blocker, |
1428 | "Migration is disabled when VirtFS export path '%s' is mounted in the guest using mount_tag '%s'", | |
1429 | s->ctx.fs_root ? s->ctx.fs_root : "NULL", s->tag); | |
9261ef5e MA |
1430 | err = migrate_add_blocker(s->migration_blocker, NULL); |
1431 | if (err < 0) { | |
fe44dc91 AA |
1432 | error_free(s->migration_blocker); |
1433 | s->migration_blocker = NULL; | |
1434 | clunk_fid(s, fid); | |
1435 | goto out; | |
1436 | } | |
1437 | s->root_fid = fid; | |
1438 | } | |
1439 | ||
1440 | err = pdu_marshal(pdu, offset, "Q", &qid); | |
1441 | if (err < 0) { | |
1442 | clunk_fid(s, fid); | |
1443 | goto out; | |
4cdc0789 | 1444 | } |
fe44dc91 AA |
1445 | err += offset; |
1446 | ||
11024375 | 1447 | memcpy(&s->root_st, &stbuf, sizeof(stbuf)); |
fe44dc91 AA |
1448 | trace_v9fs_attach_return(pdu->tag, pdu->id, |
1449 | qid.type, qid.version, qid.path); | |
955efc47 | 1450 | out: |
bccacf6c | 1451 | put_fid(pdu, fidp); |
84dfb926 | 1452 | out_nofid: |
dc295f83 | 1453 | pdu_complete(pdu, err); |
955efc47 AL |
1454 | v9fs_string_free(&uname); |
1455 | v9fs_string_free(&aname); | |
9f107513 AL |
1456 | } |
1457 | ||
8440e22e | 1458 | static void coroutine_fn v9fs_stat(void *opaque) |
9f107513 | 1459 | { |
4da7d3fa | 1460 | int32_t fid; |
d8e0c29e | 1461 | V9fsStat v9stat; |
4da7d3fa | 1462 | ssize_t err = 0; |
d8e0c29e AK |
1463 | size_t offset = 7; |
1464 | struct stat stbuf; | |
1465 | V9fsFidState *fidp; | |
1466 | V9fsPDU *pdu = opaque; | |
6069537f | 1467 | char *basename; |
4da7d3fa | 1468 | |
ddca7f86 MK |
1469 | err = pdu_unmarshal(pdu, offset, "d", &fid); |
1470 | if (err < 0) { | |
1471 | goto out_nofid; | |
1472 | } | |
c572f23a | 1473 | trace_v9fs_stat(pdu->tag, pdu->id, fid); |
84dfb926 | 1474 | |
bccacf6c | 1475 | fidp = get_fid(pdu, fid); |
d8e0c29e | 1476 | if (fidp == NULL) { |
4da7d3fa | 1477 | err = -ENOENT; |
84dfb926 | 1478 | goto out_nofid; |
9f107513 | 1479 | } |
bccacf6c | 1480 | err = v9fs_co_lstat(pdu, &fidp->path, &stbuf); |
d8e0c29e AK |
1481 | if (err < 0) { |
1482 | goto out; | |
1483 | } | |
6069537f JD |
1484 | basename = g_path_get_basename(fidp->path.data); |
1485 | err = stat_to_v9stat(pdu, &fidp->path, basename, &stbuf, &v9stat); | |
1486 | g_free(basename); | |
d8e0c29e AK |
1487 | if (err < 0) { |
1488 | goto out; | |
1489 | } | |
ddca7f86 MK |
1490 | err = pdu_marshal(pdu, offset, "wS", 0, &v9stat); |
1491 | if (err < 0) { | |
1492 | v9fs_stat_free(&v9stat); | |
1493 | goto out; | |
1494 | } | |
7999f7e1 AK |
1495 | trace_v9fs_stat_return(pdu->tag, pdu->id, v9stat.mode, |
1496 | v9stat.atime, v9stat.mtime, v9stat.length); | |
ddca7f86 | 1497 | err += offset; |
d8e0c29e | 1498 | v9fs_stat_free(&v9stat); |
4da7d3fa | 1499 | out: |
bccacf6c | 1500 | put_fid(pdu, fidp); |
84dfb926 | 1501 | out_nofid: |
dc295f83 | 1502 | pdu_complete(pdu, err); |
9f107513 AL |
1503 | } |
1504 | ||
8440e22e | 1505 | static void coroutine_fn v9fs_getattr(void *opaque) |
00ede4c2 SK |
1506 | { |
1507 | int32_t fid; | |
8db21ce7 AK |
1508 | size_t offset = 7; |
1509 | ssize_t retval = 0; | |
1510 | struct stat stbuf; | |
00ede4c2 SK |
1511 | V9fsFidState *fidp; |
1512 | uint64_t request_mask; | |
8db21ce7 AK |
1513 | V9fsStatDotl v9stat_dotl; |
1514 | V9fsPDU *pdu = opaque; | |
00ede4c2 | 1515 | |
ddca7f86 MK |
1516 | retval = pdu_unmarshal(pdu, offset, "dq", &fid, &request_mask); |
1517 | if (retval < 0) { | |
1518 | goto out_nofid; | |
1519 | } | |
c572f23a | 1520 | trace_v9fs_getattr(pdu->tag, pdu->id, fid, request_mask); |
00ede4c2 | 1521 | |
bccacf6c | 1522 | fidp = get_fid(pdu, fid); |
00ede4c2 | 1523 | if (fidp == NULL) { |
8db21ce7 | 1524 | retval = -ENOENT; |
84dfb926 | 1525 | goto out_nofid; |
00ede4c2 | 1526 | } |
8db21ce7 AK |
1527 | /* |
1528 | * Currently we only support BASIC fields in stat, so there is no | |
00ede4c2 SK |
1529 | * need to look at request_mask. |
1530 | */ | |
bccacf6c | 1531 | retval = v9fs_co_lstat(pdu, &fidp->path, &stbuf); |
8db21ce7 AK |
1532 | if (retval < 0) { |
1533 | goto out; | |
1534 | } | |
3b5ee9e8 AM |
1535 | retval = stat_to_v9stat_dotl(pdu, &stbuf, &v9stat_dotl); |
1536 | if (retval < 0) { | |
1537 | goto out; | |
1538 | } | |
e06a765e HPB |
1539 | |
1540 | /* fill st_gen if requested and supported by underlying fs */ | |
1541 | if (request_mask & P9_STATS_GEN) { | |
1542 | retval = v9fs_co_st_gen(pdu, &fidp->path, stbuf.st_mode, &v9stat_dotl); | |
f8b7ee38 KS |
1543 | switch (retval) { |
1544 | case 0: | |
1545 | /* we have valid st_gen: update result mask */ | |
1546 | v9stat_dotl.st_result_mask |= P9_STATS_GEN; | |
1547 | break; | |
1548 | case -EINTR: | |
1549 | /* request cancelled, e.g. by Tflush */ | |
e06a765e | 1550 | goto out; |
f8b7ee38 KS |
1551 | default: |
1552 | /* failed to get st_gen: not fatal, ignore */ | |
1553 | break; | |
e06a765e | 1554 | } |
e06a765e | 1555 | } |
ddca7f86 MK |
1556 | retval = pdu_marshal(pdu, offset, "A", &v9stat_dotl); |
1557 | if (retval < 0) { | |
1558 | goto out; | |
1559 | } | |
1560 | retval += offset; | |
c572f23a HPB |
1561 | trace_v9fs_getattr_return(pdu->tag, pdu->id, v9stat_dotl.st_result_mask, |
1562 | v9stat_dotl.st_mode, v9stat_dotl.st_uid, | |
1563 | v9stat_dotl.st_gid); | |
7999f7e1 AK |
1564 | out: |
1565 | put_fid(pdu, fidp); | |
1566 | out_nofid: | |
dc295f83 | 1567 | pdu_complete(pdu, retval); |
00ede4c2 SK |
1568 | } |
1569 | ||
e4027caf AK |
1570 | /* Attribute flags */ |
1571 | #define P9_ATTR_MODE (1 << 0) | |
1572 | #define P9_ATTR_UID (1 << 1) | |
1573 | #define P9_ATTR_GID (1 << 2) | |
1574 | #define P9_ATTR_SIZE (1 << 3) | |
1575 | #define P9_ATTR_ATIME (1 << 4) | |
1576 | #define P9_ATTR_MTIME (1 << 5) | |
1577 | #define P9_ATTR_CTIME (1 << 6) | |
1578 | #define P9_ATTR_ATIME_SET (1 << 7) | |
1579 | #define P9_ATTR_MTIME_SET (1 << 8) | |
1580 | ||
1581 | #define P9_ATTR_MASK 127 | |
c79ce737 | 1582 | |
8440e22e | 1583 | static void coroutine_fn v9fs_setattr(void *opaque) |
c79ce737 | 1584 | { |
65c05f9a AK |
1585 | int err = 0; |
1586 | int32_t fid; | |
1587 | V9fsFidState *fidp; | |
1588 | size_t offset = 7; | |
1589 | V9fsIattr v9iattr; | |
1590 | V9fsPDU *pdu = opaque; | |
c79ce737 | 1591 | |
ddca7f86 MK |
1592 | err = pdu_unmarshal(pdu, offset, "dI", &fid, &v9iattr); |
1593 | if (err < 0) { | |
1594 | goto out_nofid; | |
1595 | } | |
c79ce737 | 1596 | |
8f9c64bf GK |
1597 | trace_v9fs_setattr(pdu->tag, pdu->id, fid, |
1598 | v9iattr.valid, v9iattr.mode, v9iattr.uid, v9iattr.gid, | |
1599 | v9iattr.size, v9iattr.atime_sec, v9iattr.mtime_sec); | |
1600 | ||
bccacf6c | 1601 | fidp = get_fid(pdu, fid); |
65c05f9a AK |
1602 | if (fidp == NULL) { |
1603 | err = -EINVAL; | |
84dfb926 | 1604 | goto out_nofid; |
c79ce737 | 1605 | } |
e4027caf | 1606 | if (v9iattr.valid & P9_ATTR_MODE) { |
bccacf6c | 1607 | err = v9fs_co_chmod(pdu, &fidp->path, v9iattr.mode); |
65c05f9a AK |
1608 | if (err < 0) { |
1609 | goto out; | |
c79ce737 | 1610 | } |
c79ce737 | 1611 | } |
e4027caf | 1612 | if (v9iattr.valid & (P9_ATTR_ATIME | P9_ATTR_MTIME)) { |
c79ce737 | 1613 | struct timespec times[2]; |
e4027caf AK |
1614 | if (v9iattr.valid & P9_ATTR_ATIME) { |
1615 | if (v9iattr.valid & P9_ATTR_ATIME_SET) { | |
65c05f9a AK |
1616 | times[0].tv_sec = v9iattr.atime_sec; |
1617 | times[0].tv_nsec = v9iattr.atime_nsec; | |
c79ce737 SK |
1618 | } else { |
1619 | times[0].tv_nsec = UTIME_NOW; | |
1620 | } | |
1621 | } else { | |
1622 | times[0].tv_nsec = UTIME_OMIT; | |
1623 | } | |
e4027caf AK |
1624 | if (v9iattr.valid & P9_ATTR_MTIME) { |
1625 | if (v9iattr.valid & P9_ATTR_MTIME_SET) { | |
65c05f9a AK |
1626 | times[1].tv_sec = v9iattr.mtime_sec; |
1627 | times[1].tv_nsec = v9iattr.mtime_nsec; | |
c79ce737 SK |
1628 | } else { |
1629 | times[1].tv_nsec = UTIME_NOW; | |
1630 | } | |
1631 | } else { | |
1632 | times[1].tv_nsec = UTIME_OMIT; | |
1633 | } | |
bccacf6c | 1634 | err = v9fs_co_utimensat(pdu, &fidp->path, times); |
65c05f9a AK |
1635 | if (err < 0) { |
1636 | goto out; | |
1637 | } | |
c79ce737 | 1638 | } |
65c05f9a AK |
1639 | /* |
1640 | * If the only valid entry in iattr is ctime we can call | |
1641 | * chown(-1,-1) to update the ctime of the file | |
1642 | */ | |
e4027caf AK |
1643 | if ((v9iattr.valid & (P9_ATTR_UID | P9_ATTR_GID)) || |
1644 | ((v9iattr.valid & P9_ATTR_CTIME) | |
1645 | && !((v9iattr.valid & P9_ATTR_MASK) & ~P9_ATTR_CTIME))) { | |
1646 | if (!(v9iattr.valid & P9_ATTR_UID)) { | |
65c05f9a AK |
1647 | v9iattr.uid = -1; |
1648 | } | |
e4027caf | 1649 | if (!(v9iattr.valid & P9_ATTR_GID)) { |
65c05f9a AK |
1650 | v9iattr.gid = -1; |
1651 | } | |
bccacf6c | 1652 | err = v9fs_co_chown(pdu, &fidp->path, v9iattr.uid, |
65c05f9a AK |
1653 | v9iattr.gid); |
1654 | if (err < 0) { | |
1655 | goto out; | |
1656 | } | |
c79ce737 | 1657 | } |
e4027caf | 1658 | if (v9iattr.valid & (P9_ATTR_SIZE)) { |
bccacf6c | 1659 | err = v9fs_co_truncate(pdu, &fidp->path, v9iattr.size); |
65c05f9a AK |
1660 | if (err < 0) { |
1661 | goto out; | |
1662 | } | |
c79ce737 | 1663 | } |
65c05f9a | 1664 | err = offset; |
8f9c64bf | 1665 | trace_v9fs_setattr_return(pdu->tag, pdu->id); |
c79ce737 | 1666 | out: |
bccacf6c | 1667 | put_fid(pdu, fidp); |
84dfb926 | 1668 | out_nofid: |
dc295f83 | 1669 | pdu_complete(pdu, err); |
c79ce737 SK |
1670 | } |
1671 | ||
3cc19c0c | 1672 | static int v9fs_walk_marshal(V9fsPDU *pdu, uint16_t nwnames, V9fsQID *qids) |
ff5e54c9 AL |
1673 | { |
1674 | int i; | |
ddca7f86 | 1675 | ssize_t err; |
3cc19c0c | 1676 | size_t offset = 7; |
ddca7f86 MK |
1677 | |
1678 | err = pdu_marshal(pdu, offset, "w", nwnames); | |
1679 | if (err < 0) { | |
1680 | return err; | |
1681 | } | |
1682 | offset += err; | |
3cc19c0c | 1683 | for (i = 0; i < nwnames; i++) { |
ddca7f86 MK |
1684 | err = pdu_marshal(pdu, offset, "Q", &qids[i]); |
1685 | if (err < 0) { | |
1686 | return err; | |
1687 | } | |
1688 | offset += err; | |
ff5e54c9 | 1689 | } |
3cc19c0c | 1690 | return offset; |
ff5e54c9 AL |
1691 | } |
1692 | ||
fff39a7a GK |
1693 | static bool name_is_illegal(const char *name) |
1694 | { | |
1695 | return !*name || strchr(name, '/') != NULL; | |
1696 | } | |
1697 | ||
f22cad42 | 1698 | static bool same_stat_id(const struct stat *a, const struct stat *b) |
56f101ec | 1699 | { |
f22cad42 | 1700 | return a->st_dev == b->st_dev && a->st_ino == b->st_ino; |
56f101ec GK |
1701 | } |
1702 | ||
8440e22e | 1703 | static void coroutine_fn v9fs_walk(void *opaque) |
9f107513 | 1704 | { |
3cc19c0c AK |
1705 | int name_idx; |
1706 | V9fsQID *qids = NULL; | |
1707 | int i, err = 0; | |
8d6cb100 | 1708 | V9fsPath dpath, path, *pathes = NULL; |
3cc19c0c | 1709 | uint16_t nwnames; |
8d6cb100 | 1710 | struct stat stbuf, fidst, *stbufs = NULL; |
3cc19c0c AK |
1711 | size_t offset = 7; |
1712 | int32_t fid, newfid; | |
1713 | V9fsString *wnames = NULL; | |
1714 | V9fsFidState *fidp; | |
3a93113a | 1715 | V9fsFidState *newfidp = NULL; |
ff06030f VJ |
1716 | V9fsPDU *pdu = opaque; |
1717 | V9fsState *s = pdu->s; | |
56f101ec | 1718 | V9fsQID qid; |
ff5e54c9 | 1719 | |
ddca7f86 MK |
1720 | err = pdu_unmarshal(pdu, offset, "ddw", &fid, &newfid, &nwnames); |
1721 | if (err < 0) { | |
dc295f83 | 1722 | pdu_complete(pdu, err); |
ddca7f86 MK |
1723 | return ; |
1724 | } | |
1725 | offset += err; | |
ff5e54c9 | 1726 | |
c572f23a HPB |
1727 | trace_v9fs_walk(pdu->tag, pdu->id, fid, newfid, nwnames); |
1728 | ||
232a4d2c CS |
1729 | if (nwnames > P9_MAXWELEM) { |
1730 | err = -EINVAL; | |
1731 | goto out_nofid; | |
1732 | } | |
1733 | if (nwnames) { | |
1923923b GK |
1734 | wnames = g_new0(V9fsString, nwnames); |
1735 | qids = g_new0(V9fsQID, nwnames); | |
8d6cb100 CS |
1736 | stbufs = g_new0(struct stat, nwnames); |
1737 | pathes = g_new0(V9fsPath, nwnames); | |
3cc19c0c | 1738 | for (i = 0; i < nwnames; i++) { |
ddca7f86 MK |
1739 | err = pdu_unmarshal(pdu, offset, "s", &wnames[i]); |
1740 | if (err < 0) { | |
1741 | goto out_nofid; | |
1742 | } | |
fff39a7a GK |
1743 | if (name_is_illegal(wnames[i].data)) { |
1744 | err = -ENOENT; | |
1745 | goto out_nofid; | |
1746 | } | |
ddca7f86 | 1747 | offset += err; |
ff5e54c9 AL |
1748 | } |
1749 | } | |
bccacf6c | 1750 | fidp = get_fid(pdu, fid); |
3cc19c0c | 1751 | if (fidp == NULL) { |
ff5e54c9 | 1752 | err = -ENOENT; |
84dfb926 | 1753 | goto out_nofid; |
ff5e54c9 | 1754 | } |
56f101ec | 1755 | |
13fd08e6 GK |
1756 | v9fs_path_init(&dpath); |
1757 | v9fs_path_init(&path); | |
8d6cb100 CS |
1758 | /* |
1759 | * Both dpath and path initially point to fidp. | |
1760 | * Needed to handle request with nwnames == 0 | |
1761 | */ | |
1762 | v9fs_path_copy(&dpath, &fidp->path); | |
1763 | v9fs_path_copy(&path, &fidp->path); | |
13fd08e6 | 1764 | |
8d6cb100 CS |
1765 | /* |
1766 | * To keep latency (i.e. overall execution time for processing this | |
1767 | * Twalk client request) as small as possible, run all the required fs | |
1768 | * driver code altogether inside the following block. | |
1769 | */ | |
1770 | v9fs_co_run_in_worker({ | |
1771 | if (v9fs_request_cancelled(pdu)) { | |
1772 | err = -EINTR; | |
1773 | break; | |
1774 | } | |
1775 | err = s->ops->lstat(&s->ctx, &dpath, &fidst); | |
1776 | if (err < 0) { | |
1777 | err = -errno; | |
1778 | break; | |
1779 | } | |
1780 | stbuf = fidst; | |
1781 | for (name_idx = 0; name_idx < nwnames; name_idx++) { | |
1782 | if (v9fs_request_cancelled(pdu)) { | |
1783 | err = -EINTR; | |
1784 | break; | |
1785 | } | |
1786 | if (!same_stat_id(&pdu->s->root_st, &stbuf) || | |
1787 | strcmp("..", wnames[name_idx].data)) | |
1788 | { | |
1789 | err = s->ops->name_to_path(&s->ctx, &dpath, | |
97b1d8fd CS |
1790 | wnames[name_idx].data, |
1791 | &pathes[name_idx]); | |
8d6cb100 CS |
1792 | if (err < 0) { |
1793 | err = -errno; | |
1794 | break; | |
1795 | } | |
1796 | if (v9fs_request_cancelled(pdu)) { | |
1797 | err = -EINTR; | |
1798 | break; | |
1799 | } | |
97b1d8fd | 1800 | err = s->ops->lstat(&s->ctx, &pathes[name_idx], &stbuf); |
8d6cb100 CS |
1801 | if (err < 0) { |
1802 | err = -errno; | |
1803 | break; | |
1804 | } | |
1805 | stbufs[name_idx] = stbuf; | |
97b1d8fd | 1806 | v9fs_path_copy(&dpath, &pathes[name_idx]); |
8d6cb100 CS |
1807 | } |
1808 | } | |
1809 | }); | |
1810 | /* | |
1811 | * Handle all the rest of this Twalk request on main thread ... | |
1812 | */ | |
1d0fc0d0 CS |
1813 | if (err < 0) { |
1814 | goto out; | |
1815 | } | |
8d6cb100 CS |
1816 | |
1817 | err = stat_to_qid(pdu, &fidst, &qid); | |
56f101ec GK |
1818 | if (err < 0) { |
1819 | goto out; | |
1820 | } | |
8d6cb100 | 1821 | stbuf = fidst; |
56f101ec | 1822 | |
8d6cb100 | 1823 | /* reset dpath and path */ |
2289be19 AK |
1824 | v9fs_path_copy(&dpath, &fidp->path); |
1825 | v9fs_path_copy(&path, &fidp->path); | |
8d6cb100 | 1826 | |
2289be19 | 1827 | for (name_idx = 0; name_idx < nwnames; name_idx++) { |
f22cad42 | 1828 | if (!same_stat_id(&pdu->s->root_st, &stbuf) || |
8d6cb100 CS |
1829 | strcmp("..", wnames[name_idx].data)) |
1830 | { | |
1831 | stbuf = stbufs[name_idx]; | |
3b5ee9e8 AM |
1832 | err = stat_to_qid(pdu, &stbuf, &qid); |
1833 | if (err < 0) { | |
1834 | goto out; | |
1835 | } | |
8d6cb100 | 1836 | v9fs_path_copy(&path, &pathes[name_idx]); |
56f101ec | 1837 | v9fs_path_copy(&dpath, &path); |
2289be19 | 1838 | } |
56f101ec | 1839 | memcpy(&qids[name_idx], &qid, sizeof(qid)); |
2289be19 | 1840 | } |
ff5e54c9 | 1841 | if (fid == newfid) { |
49dd946b GK |
1842 | if (fidp->fid_type != P9_FID_NONE) { |
1843 | err = -EINVAL; | |
1844 | goto out; | |
1845 | } | |
5b3c77aa | 1846 | v9fs_path_write_lock(s); |
2289be19 | 1847 | v9fs_path_copy(&fidp->path, &path); |
5b3c77aa | 1848 | v9fs_path_unlock(s); |
ff5e54c9 | 1849 | } else { |
3cc19c0c AK |
1850 | newfidp = alloc_fid(s, newfid); |
1851 | if (newfidp == NULL) { | |
ff5e54c9 AL |
1852 | err = -EINVAL; |
1853 | goto out; | |
1854 | } | |
3cc19c0c | 1855 | newfidp->uid = fidp->uid; |
2289be19 | 1856 | v9fs_path_copy(&newfidp->path, &path); |
9f107513 | 1857 | } |
3cc19c0c | 1858 | err = v9fs_walk_marshal(pdu, nwnames, qids); |
7999f7e1 | 1859 | trace_v9fs_walk_return(pdu->tag, pdu->id, nwnames, qids); |
ff5e54c9 | 1860 | out: |
bccacf6c | 1861 | put_fid(pdu, fidp); |
84dfb926 | 1862 | if (newfidp) { |
bccacf6c | 1863 | put_fid(pdu, newfidp); |
84dfb926 | 1864 | } |
2289be19 AK |
1865 | v9fs_path_free(&dpath); |
1866 | v9fs_path_free(&path); | |
84dfb926 | 1867 | out_nofid: |
dc295f83 | 1868 | pdu_complete(pdu, err); |
3cc19c0c AK |
1869 | if (nwnames && nwnames <= P9_MAXWELEM) { |
1870 | for (name_idx = 0; name_idx < nwnames; name_idx++) { | |
1871 | v9fs_string_free(&wnames[name_idx]); | |
8d6cb100 | 1872 | v9fs_path_free(&pathes[name_idx]); |
3cc19c0c AK |
1873 | } |
1874 | g_free(wnames); | |
1875 | g_free(qids); | |
8d6cb100 CS |
1876 | g_free(stbufs); |
1877 | g_free(pathes); | |
3cc19c0c | 1878 | } |
9f107513 AL |
1879 | } |
1880 | ||
8440e22e | 1881 | static int32_t coroutine_fn get_iounit(V9fsPDU *pdu, V9fsPath *path) |
5e94c103 MK |
1882 | { |
1883 | struct statfs stbuf; | |
1884 | int32_t iounit = 0; | |
bccacf6c | 1885 | V9fsState *s = pdu->s; |
5e94c103 MK |
1886 | |
1887 | /* | |
1888 | * iounit should be multiples of f_bsize (host filesystem block size | |
1889 | * and as well as less than (client msize - P9_IOHDRSZ)) | |
1890 | */ | |
bccacf6c | 1891 | if (!v9fs_co_statfs(pdu, path, &stbuf)) { |
68d654da DS |
1892 | if (stbuf.f_bsize) { |
1893 | iounit = stbuf.f_bsize; | |
1894 | iounit *= (s->msize - P9_IOHDRSZ) / stbuf.f_bsize; | |
1895 | } | |
5e94c103 | 1896 | } |
5e94c103 MK |
1897 | if (!iounit) { |
1898 | iounit = s->msize - P9_IOHDRSZ; | |
1899 | } | |
1900 | return iounit; | |
1901 | } | |
1902 | ||
8440e22e | 1903 | static void coroutine_fn v9fs_open(void *opaque) |
5e94c103 | 1904 | { |
857bc158 | 1905 | int flags; |
857bc158 AK |
1906 | int32_t fid; |
1907 | int32_t mode; | |
1908 | V9fsQID qid; | |
7999f7e1 | 1909 | int iounit = 0; |
857bc158 AK |
1910 | ssize_t err = 0; |
1911 | size_t offset = 7; | |
1912 | struct stat stbuf; | |
1913 | V9fsFidState *fidp; | |
1914 | V9fsPDU *pdu = opaque; | |
1915 | V9fsState *s = pdu->s; | |
5e94c103 | 1916 | |
857bc158 | 1917 | if (s->proto_version == V9FS_PROTO_2000L) { |
ddca7f86 | 1918 | err = pdu_unmarshal(pdu, offset, "dd", &fid, &mode); |
857bc158 | 1919 | } else { |
67d6fa53 BH |
1920 | uint8_t modebyte; |
1921 | err = pdu_unmarshal(pdu, offset, "db", &fid, &modebyte); | |
1922 | mode = modebyte; | |
ddca7f86 MK |
1923 | } |
1924 | if (err < 0) { | |
1925 | goto out_nofid; | |
857bc158 | 1926 | } |
c572f23a HPB |
1927 | trace_v9fs_open(pdu->tag, pdu->id, fid, mode); |
1928 | ||
bccacf6c | 1929 | fidp = get_fid(pdu, fid); |
857bc158 AK |
1930 | if (fidp == NULL) { |
1931 | err = -ENOENT; | |
84dfb926 | 1932 | goto out_nofid; |
a6568fe2 | 1933 | } |
49dd946b GK |
1934 | if (fidp->fid_type != P9_FID_NONE) { |
1935 | err = -EINVAL; | |
1936 | goto out; | |
1937 | } | |
a6568fe2 | 1938 | |
bccacf6c | 1939 | err = v9fs_co_lstat(pdu, &fidp->path, &stbuf); |
857bc158 | 1940 | if (err < 0) { |
a6568fe2 AL |
1941 | goto out; |
1942 | } | |
3b5ee9e8 AM |
1943 | err = stat_to_qid(pdu, &stbuf, &qid); |
1944 | if (err < 0) { | |
1945 | goto out; | |
1946 | } | |
857bc158 | 1947 | if (S_ISDIR(stbuf.st_mode)) { |
bccacf6c | 1948 | err = v9fs_co_opendir(pdu, fidp); |
857bc158 AK |
1949 | if (err < 0) { |
1950 | goto out; | |
1951 | } | |
1952 | fidp->fid_type = P9_FID_DIR; | |
ddca7f86 MK |
1953 | err = pdu_marshal(pdu, offset, "Qd", &qid, 0); |
1954 | if (err < 0) { | |
1955 | goto out; | |
1956 | } | |
1957 | err += offset; | |
a6568fe2 | 1958 | } else { |
771e9d4c | 1959 | if (s->proto_version == V9FS_PROTO_2000L) { |
d3ab98e6 | 1960 | flags = get_dotl_openflags(s, mode); |
771e9d4c | 1961 | } else { |
857bc158 | 1962 | flags = omode_to_uflags(mode); |
771e9d4c | 1963 | } |
2c74c2cb MK |
1964 | if (is_ro_export(&s->ctx)) { |
1965 | if (mode & O_WRONLY || mode & O_RDWR || | |
1966 | mode & O_APPEND || mode & O_TRUNC) { | |
1967 | err = -EROFS; | |
1968 | goto out; | |
1969 | } | |
2c74c2cb | 1970 | } |
bccacf6c | 1971 | err = v9fs_co_open(pdu, fidp, flags); |
857bc158 AK |
1972 | if (err < 0) { |
1973 | goto out; | |
1974 | } | |
1975 | fidp->fid_type = P9_FID_FILE; | |
7a462745 AK |
1976 | fidp->open_flags = flags; |
1977 | if (flags & O_EXCL) { | |
1978 | /* | |
1979 | * We let the host file system do O_EXCL check | |
1980 | * We should not reclaim such fd | |
1981 | */ | |
1982 | fidp->flags |= FID_NON_RECLAIMABLE; | |
1983 | } | |
bccacf6c | 1984 | iounit = get_iounit(pdu, &fidp->path); |
ddca7f86 MK |
1985 | err = pdu_marshal(pdu, offset, "Qd", &qid, iounit); |
1986 | if (err < 0) { | |
1987 | goto out; | |
1988 | } | |
1989 | err += offset; | |
a6568fe2 | 1990 | } |
7999f7e1 AK |
1991 | trace_v9fs_open_return(pdu->tag, pdu->id, |
1992 | qid.type, qid.version, qid.path, iounit); | |
a6568fe2 | 1993 | out: |
bccacf6c | 1994 | put_fid(pdu, fidp); |
84dfb926 | 1995 | out_nofid: |
dc295f83 | 1996 | pdu_complete(pdu, err); |
a6568fe2 AL |
1997 | } |
1998 | ||
8440e22e | 1999 | static void coroutine_fn v9fs_lcreate(void *opaque) |
c1568af5 VJ |
2000 | { |
2001 | int32_t dfid, flags, mode; | |
2002 | gid_t gid; | |
c1568af5 | 2003 | ssize_t err = 0; |
36f8981f | 2004 | ssize_t offset = 7; |
36f8981f VJ |
2005 | V9fsString name; |
2006 | V9fsFidState *fidp; | |
2007 | struct stat stbuf; | |
2008 | V9fsQID qid; | |
2009 | int32_t iounit; | |
2010 | V9fsPDU *pdu = opaque; | |
c1568af5 | 2011 | |
ddca7f86 MK |
2012 | v9fs_string_init(&name); |
2013 | err = pdu_unmarshal(pdu, offset, "dsddd", &dfid, | |
2014 | &name, &flags, &mode, &gid); | |
2015 | if (err < 0) { | |
2016 | goto out_nofid; | |
2017 | } | |
c572f23a | 2018 | trace_v9fs_lcreate(pdu->tag, pdu->id, dfid, flags, mode, gid); |
c1568af5 | 2019 | |
fff39a7a GK |
2020 | if (name_is_illegal(name.data)) { |
2021 | err = -ENOENT; | |
2022 | goto out_nofid; | |
2023 | } | |
2024 | ||
805b5d98 GK |
2025 | if (!strcmp(".", name.data) || !strcmp("..", name.data)) { |
2026 | err = -EEXIST; | |
2027 | goto out_nofid; | |
2028 | } | |
2029 | ||
bccacf6c | 2030 | fidp = get_fid(pdu, dfid); |
36f8981f | 2031 | if (fidp == NULL) { |
c1568af5 | 2032 | err = -ENOENT; |
84dfb926 | 2033 | goto out_nofid; |
c1568af5 | 2034 | } |
d63fb193 LQ |
2035 | if (fidp->fid_type != P9_FID_NONE) { |
2036 | err = -EINVAL; | |
2037 | goto out; | |
2038 | } | |
c1568af5 | 2039 | |
d3ab98e6 | 2040 | flags = get_dotl_openflags(pdu->s, flags); |
bccacf6c | 2041 | err = v9fs_co_open2(pdu, fidp, &name, gid, |
02cb7f3a | 2042 | flags | O_CREAT, mode, &stbuf); |
36f8981f VJ |
2043 | if (err < 0) { |
2044 | goto out; | |
2045 | } | |
2046 | fidp->fid_type = P9_FID_FILE; | |
7a462745 AK |
2047 | fidp->open_flags = flags; |
2048 | if (flags & O_EXCL) { | |
2049 | /* | |
2050 | * We let the host file system do O_EXCL check | |
2051 | * We should not reclaim such fd | |
2052 | */ | |
2053 | fidp->flags |= FID_NON_RECLAIMABLE; | |
2054 | } | |
bccacf6c | 2055 | iounit = get_iounit(pdu, &fidp->path); |
3b5ee9e8 AM |
2056 | err = stat_to_qid(pdu, &stbuf, &qid); |
2057 | if (err < 0) { | |
2058 | goto out; | |
2059 | } | |
ddca7f86 MK |
2060 | err = pdu_marshal(pdu, offset, "Qd", &qid, iounit); |
2061 | if (err < 0) { | |
2062 | goto out; | |
2063 | } | |
2064 | err += offset; | |
7999f7e1 AK |
2065 | trace_v9fs_lcreate_return(pdu->tag, pdu->id, |
2066 | qid.type, qid.version, qid.path, iounit); | |
c1568af5 | 2067 | out: |
bccacf6c | 2068 | put_fid(pdu, fidp); |
84dfb926 | 2069 | out_nofid: |
dc295f83 | 2070 | pdu_complete(pdu, err); |
36f8981f | 2071 | v9fs_string_free(&name); |
c1568af5 VJ |
2072 | } |
2073 | ||
a1bf8b74 | 2074 | static void coroutine_fn v9fs_fsync(void *opaque) |
b41e95d3 | 2075 | { |
4e9ad444 | 2076 | int err; |
b41e95d3 | 2077 | int32_t fid; |
4e9ad444 | 2078 | int datasync; |
b41e95d3 VJ |
2079 | size_t offset = 7; |
2080 | V9fsFidState *fidp; | |
4e9ad444 | 2081 | V9fsPDU *pdu = opaque; |
b41e95d3 | 2082 | |
ddca7f86 MK |
2083 | err = pdu_unmarshal(pdu, offset, "dd", &fid, &datasync); |
2084 | if (err < 0) { | |
2085 | goto out_nofid; | |
2086 | } | |
c572f23a HPB |
2087 | trace_v9fs_fsync(pdu->tag, pdu->id, fid, datasync); |
2088 | ||
bccacf6c | 2089 | fidp = get_fid(pdu, fid); |
b41e95d3 VJ |
2090 | if (fidp == NULL) { |
2091 | err = -ENOENT; | |
84dfb926 | 2092 | goto out_nofid; |
b41e95d3 | 2093 | } |
bccacf6c | 2094 | err = v9fs_co_fsync(pdu, fidp, datasync); |
4e9ad444 AK |
2095 | if (!err) { |
2096 | err = offset; | |
2097 | } | |
bccacf6c | 2098 | put_fid(pdu, fidp); |
84dfb926 | 2099 | out_nofid: |
dc295f83 | 2100 | pdu_complete(pdu, err); |
b41e95d3 VJ |
2101 | } |
2102 | ||
8440e22e | 2103 | static void coroutine_fn v9fs_clunk(void *opaque) |
a6568fe2 | 2104 | { |
c540ee51 | 2105 | int err; |
bbd5697b AL |
2106 | int32_t fid; |
2107 | size_t offset = 7; | |
84dfb926 | 2108 | V9fsFidState *fidp; |
c540ee51 AK |
2109 | V9fsPDU *pdu = opaque; |
2110 | V9fsState *s = pdu->s; | |
bbd5697b | 2111 | |
ddca7f86 MK |
2112 | err = pdu_unmarshal(pdu, offset, "d", &fid); |
2113 | if (err < 0) { | |
2114 | goto out_nofid; | |
2115 | } | |
c572f23a | 2116 | trace_v9fs_clunk(pdu->tag, pdu->id, fid); |
84dfb926 | 2117 | |
ce421a19 | 2118 | fidp = clunk_fid(s, fid); |
84dfb926 AK |
2119 | if (fidp == NULL) { |
2120 | err = -ENOENT; | |
2121 | goto out_nofid; | |
2122 | } | |
ce421a19 AK |
2123 | /* |
2124 | * Bump the ref so that put_fid will | |
2125 | * free the fid. | |
2126 | */ | |
2127 | fidp->ref++; | |
a911a182 AK |
2128 | err = put_fid(pdu, fidp); |
2129 | if (!err) { | |
2130 | err = offset; | |
2131 | } | |
84dfb926 | 2132 | out_nofid: |
dc295f83 | 2133 | pdu_complete(pdu, err); |
9f107513 AL |
2134 | } |
2135 | ||
bcb8998f SS |
2136 | /* |
2137 | * Create a QEMUIOVector for a sub-region of PDU iovecs | |
2138 | * | |
2139 | * @qiov: uninitialized QEMUIOVector | |
2140 | * @skip: number of bytes to skip from beginning of PDU | |
2141 | * @size: number of bytes to include | |
2142 | * @is_write: true - write, false - read | |
2143 | * | |
2144 | * The resulting QEMUIOVector has heap-allocated iovecs and must be cleaned up | |
2145 | * with qemu_iovec_destroy(). | |
2146 | */ | |
2147 | static void v9fs_init_qiov_from_pdu(QEMUIOVector *qiov, V9fsPDU *pdu, | |
cf45183b | 2148 | size_t skip, size_t size, |
bcb8998f SS |
2149 | bool is_write) |
2150 | { | |
2151 | QEMUIOVector elem; | |
2152 | struct iovec *iov; | |
2153 | unsigned int niov; | |
2154 | ||
88da0b03 | 2155 | if (is_write) { |
cf45183b | 2156 | pdu->s->transport->init_out_iov_from_pdu(pdu, &iov, &niov, size + skip); |
88da0b03 | 2157 | } else { |
cf45183b | 2158 | pdu->s->transport->init_in_iov_from_pdu(pdu, &iov, &niov, size + skip); |
88da0b03 | 2159 | } |
bcb8998f SS |
2160 | |
2161 | qemu_iovec_init_external(&elem, iov, niov); | |
2162 | qemu_iovec_init(qiov, niov); | |
cf45183b | 2163 | qemu_iovec_concat(qiov, &elem, skip, size); |
bcb8998f SS |
2164 | } |
2165 | ||
2f008a8c AK |
2166 | static int v9fs_xattr_read(V9fsState *s, V9fsPDU *pdu, V9fsFidState *fidp, |
2167 | uint64_t off, uint32_t max_count) | |
a9231555 | 2168 | { |
ddca7f86 | 2169 | ssize_t err; |
d208a0e0 | 2170 | size_t offset = 7; |
cf45183b | 2171 | uint64_t read_count; |
bcb8998f | 2172 | QEMUIOVector qiov_full; |
a9231555 | 2173 | |
7e55d65c LQ |
2174 | if (fidp->fs.xattr.len < off) { |
2175 | read_count = 0; | |
16724a17 | 2176 | } else { |
cf45183b SS |
2177 | read_count = fidp->fs.xattr.len - off; |
2178 | } | |
2179 | if (read_count > max_count) { | |
d208a0e0 | 2180 | read_count = max_count; |
a9231555 | 2181 | } |
ddca7f86 MK |
2182 | err = pdu_marshal(pdu, offset, "d", read_count); |
2183 | if (err < 0) { | |
2184 | return err; | |
2185 | } | |
2186 | offset += err; | |
00588a0a | 2187 | |
cf45183b | 2188 | v9fs_init_qiov_from_pdu(&qiov_full, pdu, offset, read_count, false); |
fa0eb5c5 | 2189 | err = v9fs_pack(qiov_full.iov, qiov_full.niov, 0, |
ddca7f86 MK |
2190 | ((char *)fidp->fs.xattr.value) + off, |
2191 | read_count); | |
bcb8998f | 2192 | qemu_iovec_destroy(&qiov_full); |
ddca7f86 MK |
2193 | if (err < 0) { |
2194 | return err; | |
2195 | } | |
2196 | offset += err; | |
d208a0e0 | 2197 | return offset; |
a9231555 AL |
2198 | } |
2199 | ||
8440e22e GK |
2200 | static int coroutine_fn v9fs_do_readdir_with_stat(V9fsPDU *pdu, |
2201 | V9fsFidState *fidp, | |
2202 | uint32_t max_count) | |
a9231555 | 2203 | { |
2289be19 | 2204 | V9fsPath path; |
d208a0e0 AK |
2205 | V9fsStat v9stat; |
2206 | int len, err = 0; | |
2207 | int32_t count = 0; | |
2208 | struct stat stbuf; | |
2209 | off_t saved_dir_pos; | |
635324e8 | 2210 | struct dirent *dent; |
a9231555 | 2211 | |
d208a0e0 | 2212 | /* save the directory position */ |
bccacf6c | 2213 | saved_dir_pos = v9fs_co_telldir(pdu, fidp); |
d208a0e0 AK |
2214 | if (saved_dir_pos < 0) { |
2215 | return saved_dir_pos; | |
a9231555 | 2216 | } |
5f524c1e | 2217 | |
d208a0e0 | 2218 | while (1) { |
2289be19 | 2219 | v9fs_path_init(&path); |
7cde47d4 GK |
2220 | |
2221 | v9fs_readdir_lock(&fidp->fs.dir); | |
2222 | ||
635324e8 GK |
2223 | err = v9fs_co_readdir(pdu, fidp, &dent); |
2224 | if (err || !dent) { | |
d208a0e0 AK |
2225 | break; |
2226 | } | |
bccacf6c | 2227 | err = v9fs_co_name_to_path(pdu, &fidp->path, dent->d_name, &path); |
d208a0e0 | 2228 | if (err < 0) { |
8762a46d | 2229 | break; |
d208a0e0 | 2230 | } |
bccacf6c | 2231 | err = v9fs_co_lstat(pdu, &path, &stbuf); |
2289be19 | 2232 | if (err < 0) { |
8762a46d | 2233 | break; |
2289be19 | 2234 | } |
6069537f | 2235 | err = stat_to_v9stat(pdu, &path, dent->d_name, &stbuf, &v9stat); |
d208a0e0 | 2236 | if (err < 0) { |
8762a46d | 2237 | break; |
a9231555 | 2238 | } |
772a7369 JD |
2239 | if ((count + v9stat.size + 2) > max_count) { |
2240 | v9fs_readdir_unlock(&fidp->fs.dir); | |
2241 | ||
2242 | /* Ran out of buffer. Set dir back to old position and return */ | |
2243 | v9fs_co_seekdir(pdu, fidp, saved_dir_pos); | |
2244 | v9fs_stat_free(&v9stat); | |
2245 | v9fs_path_free(&path); | |
2246 | return count; | |
2247 | } | |
2248 | ||
d208a0e0 AK |
2249 | /* 11 = 7 + 4 (7 = start offset, 4 = space for storing count) */ |
2250 | len = pdu_marshal(pdu, 11 + count, "S", &v9stat); | |
7cde47d4 GK |
2251 | |
2252 | v9fs_readdir_unlock(&fidp->fs.dir); | |
2253 | ||
772a7369 | 2254 | if (len < 0) { |
bccacf6c | 2255 | v9fs_co_seekdir(pdu, fidp, saved_dir_pos); |
d208a0e0 | 2256 | v9fs_stat_free(&v9stat); |
2289be19 | 2257 | v9fs_path_free(&path); |
772a7369 | 2258 | return len; |
d208a0e0 AK |
2259 | } |
2260 | count += len; | |
2261 | v9fs_stat_free(&v9stat); | |
2289be19 | 2262 | v9fs_path_free(&path); |
d208a0e0 | 2263 | saved_dir_pos = dent->d_off; |
a9231555 | 2264 | } |
8762a46d | 2265 | |
7cde47d4 GK |
2266 | v9fs_readdir_unlock(&fidp->fs.dir); |
2267 | ||
2289be19 | 2268 | v9fs_path_free(&path); |
d208a0e0 AK |
2269 | if (err < 0) { |
2270 | return err; | |
fa32ef88 | 2271 | } |
d208a0e0 | 2272 | return count; |
fa32ef88 AK |
2273 | } |
2274 | ||
8440e22e | 2275 | static void coroutine_fn v9fs_read(void *opaque) |
9f107513 | 2276 | { |
a9231555 | 2277 | int32_t fid; |
2f008a8c | 2278 | uint64_t off; |
a9231555 | 2279 | ssize_t err = 0; |
d208a0e0 AK |
2280 | int32_t count = 0; |
2281 | size_t offset = 7; | |
2f008a8c | 2282 | uint32_t max_count; |
d208a0e0 AK |
2283 | V9fsFidState *fidp; |
2284 | V9fsPDU *pdu = opaque; | |
2285 | V9fsState *s = pdu->s; | |
a9231555 | 2286 | |
ddca7f86 MK |
2287 | err = pdu_unmarshal(pdu, offset, "dqd", &fid, &off, &max_count); |
2288 | if (err < 0) { | |
2289 | goto out_nofid; | |
2290 | } | |
c572f23a | 2291 | trace_v9fs_read(pdu->tag, pdu->id, fid, off, max_count); |
84dfb926 | 2292 | |
bccacf6c | 2293 | fidp = get_fid(pdu, fid); |
d208a0e0 | 2294 | if (fidp == NULL) { |
a9231555 | 2295 | err = -EINVAL; |
84dfb926 | 2296 | goto out_nofid; |
a9231555 | 2297 | } |
d208a0e0 | 2298 | if (fidp->fid_type == P9_FID_DIR) { |
d2c5cf7c CS |
2299 | if (s->proto_version != V9FS_PROTO_2000U) { |
2300 | warn_report_once( | |
2301 | "9p: bad client: T_read request on directory only expected " | |
2302 | "with 9P2000.u protocol version" | |
2303 | ); | |
2304 | err = -EOPNOTSUPP; | |
2305 | goto out; | |
2306 | } | |
d208a0e0 | 2307 | if (off == 0) { |
bccacf6c | 2308 | v9fs_co_rewinddir(pdu, fidp); |
a9231555 | 2309 | } |
bccacf6c | 2310 | count = v9fs_do_readdir_with_stat(pdu, fidp, max_count); |
d208a0e0 AK |
2311 | if (count < 0) { |
2312 | err = count; | |
2313 | goto out; | |
56d15a53 | 2314 | } |
ddca7f86 MK |
2315 | err = pdu_marshal(pdu, offset, "d", count); |
2316 | if (err < 0) { | |
2317 | goto out; | |
2318 | } | |
2319 | err += offset + count; | |
d208a0e0 | 2320 | } else if (fidp->fid_type == P9_FID_FILE) { |
302a0d3e SH |
2321 | QEMUIOVector qiov_full; |
2322 | QEMUIOVector qiov; | |
d208a0e0 | 2323 | int32_t len; |
d208a0e0 | 2324 | |
cf45183b | 2325 | v9fs_init_qiov_from_pdu(&qiov_full, pdu, offset + 4, max_count, false); |
302a0d3e | 2326 | qemu_iovec_init(&qiov, qiov_full.niov); |
d208a0e0 | 2327 | do { |
302a0d3e | 2328 | qemu_iovec_reset(&qiov); |
1b093c48 | 2329 | qemu_iovec_concat(&qiov, &qiov_full, count, qiov_full.size - count); |
d208a0e0 | 2330 | if (0) { |
302a0d3e | 2331 | print_sg(qiov.iov, qiov.niov); |
d208a0e0 AK |
2332 | } |
2333 | /* Loop in case of EINTR */ | |
2334 | do { | |
302a0d3e | 2335 | len = v9fs_co_preadv(pdu, fidp, qiov.iov, qiov.niov, off); |
d208a0e0 AK |
2336 | if (len >= 0) { |
2337 | off += len; | |
2338 | count += len; | |
2339 | } | |
bccacf6c | 2340 | } while (len == -EINTR && !pdu->cancelled); |
d208a0e0 AK |
2341 | if (len < 0) { |
2342 | /* IO error return the error */ | |
2343 | err = len; | |
e95c9a49 | 2344 | goto out_free_iovec; |
d208a0e0 | 2345 | } |
d208a0e0 | 2346 | } while (count < max_count && len > 0); |
ddca7f86 MK |
2347 | err = pdu_marshal(pdu, offset, "d", count); |
2348 | if (err < 0) { | |
e95c9a49 | 2349 | goto out_free_iovec; |
ddca7f86 MK |
2350 | } |
2351 | err += offset + count; | |
e95c9a49 | 2352 | out_free_iovec: |
302a0d3e SH |
2353 | qemu_iovec_destroy(&qiov); |
2354 | qemu_iovec_destroy(&qiov_full); | |
d208a0e0 AK |
2355 | } else if (fidp->fid_type == P9_FID_XATTR) { |
2356 | err = v9fs_xattr_read(s, pdu, fidp, off, max_count); | |
a9231555 AL |
2357 | } else { |
2358 | err = -EINVAL; | |
9f107513 | 2359 | } |
7999f7e1 | 2360 | trace_v9fs_read_return(pdu->tag, pdu->id, count, err); |
a9231555 | 2361 | out: |
bccacf6c | 2362 | put_fid(pdu, fidp); |
84dfb926 | 2363 | out_nofid: |
dc295f83 | 2364 | pdu_complete(pdu, err); |
9f107513 AL |
2365 | } |
2366 | ||
29c9d2ca CS |
2367 | /** |
2368 | * Returns size required in Rreaddir response for the passed dirent @p name. | |
2369 | * | |
2370 | * @param name - directory entry's name (i.e. file name, directory name) | |
2371 | * @returns required size in bytes | |
2372 | */ | |
2373 | size_t v9fs_readdir_response_size(V9fsString *name) | |
c18e2f94 | 2374 | { |
5e4eaa79 AK |
2375 | /* |
2376 | * Size of each dirent on the wire: size of qid (13) + size of offset (8) | |
2377 | * size of type (1) + size of name.size (2) + strlen(name.data) | |
2378 | */ | |
2379 | return 24 + v9fs_string_size(name); | |
c18e2f94 SK |
2380 | } |
2381 | ||
0c4356ba CS |
2382 | static void v9fs_free_dirents(struct V9fsDirEnt *e) |
2383 | { | |
2384 | struct V9fsDirEnt *next = NULL; | |
2385 | ||
2386 | for (; e; e = next) { | |
2387 | next = e->next; | |
2388 | g_free(e->dent); | |
2389 | g_free(e->st); | |
2390 | g_free(e); | |
2391 | } | |
2392 | } | |
2393 | ||
8440e22e | 2394 | static int coroutine_fn v9fs_do_readdir(V9fsPDU *pdu, V9fsFidState *fidp, |
0c4356ba | 2395 | off_t offset, int32_t max_count) |
c18e2f94 | 2396 | { |
c18e2f94 | 2397 | size_t size; |
5e4eaa79 AK |
2398 | V9fsQID qid; |
2399 | V9fsString name; | |
2400 | int len, err = 0; | |
2401 | int32_t count = 0; | |
635324e8 | 2402 | struct dirent *dent; |
0c4356ba CS |
2403 | struct stat *st; |
2404 | struct V9fsDirEnt *entries = NULL; | |
c18e2f94 | 2405 | |
0c4356ba CS |
2406 | /* |
2407 | * inode remapping requires the device id, which in turn might be | |
2408 | * different for different directory entries, so if inode remapping is | |
2409 | * enabled we have to make a full stat for each directory entry | |
2410 | */ | |
2411 | const bool dostat = pdu->s->ctx.export_flags & V9FS_REMAP_INODES; | |
7cde47d4 | 2412 | |
0c4356ba CS |
2413 | /* |
2414 | * Fetch all required directory entries altogether on a background IO | |
2415 | * thread from fs driver. We don't want to do that for each entry | |
2416 | * individually, because hopping between threads (this main IO thread | |
2417 | * and background IO driver thread) would sum up to huge latencies. | |
2418 | */ | |
2419 | count = v9fs_co_readdir_many(pdu, fidp, &entries, offset, max_count, | |
2420 | dostat); | |
2421 | if (count < 0) { | |
2422 | err = count; | |
2423 | count = 0; | |
2424 | goto out; | |
2425 | } | |
2426 | count = 0; | |
7cde47d4 | 2427 | |
0c4356ba CS |
2428 | for (struct V9fsDirEnt *e = entries; e; e = e->next) { |
2429 | dent = e->dent; | |
1a6ed33c AM |
2430 | |
2431 | if (pdu->s->ctx.export_flags & V9FS_REMAP_INODES) { | |
0c4356ba CS |
2432 | st = e->st; |
2433 | /* e->st should never be NULL, but just to be sure */ | |
2434 | if (!st) { | |
2435 | err = -1; | |
2436 | break; | |
2437 | } | |
2438 | ||
2439 | /* remap inode */ | |
2440 | err = stat_to_qid(pdu, st, &qid); | |
1a6ed33c | 2441 | if (err < 0) { |
0c4356ba | 2442 | break; |
1a6ed33c AM |
2443 | } |
2444 | } else { | |
2445 | /* | |
2446 | * Fill up just the path field of qid because the client uses | |
2447 | * only that. To fill the entire qid structure we will have | |
2448 | * to stat each dirent found, which is expensive. For the | |
0c4356ba | 2449 | * latter reason we don't call stat_to_qid() here. Only drawback |
1a6ed33c AM |
2450 | * is that no multi-device export detection of stat_to_qid() |
2451 | * would be done and provided as error to the user here. But | |
2452 | * user would get that error anyway when accessing those | |
2453 | * files/dirs through other ways. | |
2454 | */ | |
2455 | size = MIN(sizeof(dent->d_ino), sizeof(qid.path)); | |
2456 | memcpy(&qid.path, &dent->d_ino, size); | |
2457 | /* Fill the other fields with dummy values */ | |
2458 | qid.type = 0; | |
2459 | qid.version = 0; | |
2460 | } | |
c18e2f94 | 2461 | |
0c4356ba CS |
2462 | v9fs_string_init(&name); |
2463 | v9fs_string_sprintf(&name, "%s", dent->d_name); | |
2464 | ||
5e4eaa79 AK |
2465 | /* 11 = 7 + 4 (7 = start offset, 4 = space for storing count) */ |
2466 | len = pdu_marshal(pdu, 11 + count, "Qqbs", | |
2467 | &qid, dent->d_off, | |
2468 | dent->d_type, &name); | |
7cde47d4 | 2469 | |
0c4356ba | 2470 | v9fs_string_free(&name); |
7cde47d4 | 2471 | |
ddca7f86 | 2472 | if (len < 0) { |
0c4356ba CS |
2473 | err = len; |
2474 | break; | |
ddca7f86 | 2475 | } |
0c4356ba | 2476 | |
5e4eaa79 | 2477 | count += len; |
5e4eaa79 | 2478 | } |
7cde47d4 | 2479 | |
0c4356ba CS |
2480 | out: |
2481 | v9fs_free_dirents(entries); | |
5e4eaa79 AK |
2482 | if (err < 0) { |
2483 | return err; | |
2484 | } | |
2485 | return count; | |
c18e2f94 SK |
2486 | } |
2487 | ||
8440e22e | 2488 | static void coroutine_fn v9fs_readdir(void *opaque) |
c18e2f94 SK |
2489 | { |
2490 | int32_t fid; | |
5e4eaa79 AK |
2491 | V9fsFidState *fidp; |
2492 | ssize_t retval = 0; | |
c18e2f94 | 2493 | size_t offset = 7; |
2f008a8c AK |
2494 | uint64_t initial_offset; |
2495 | int32_t count; | |
2496 | uint32_t max_count; | |
5e4eaa79 | 2497 | V9fsPDU *pdu = opaque; |
d36a5c22 | 2498 | V9fsState *s = pdu->s; |
c18e2f94 | 2499 | |
ddca7f86 MK |
2500 | retval = pdu_unmarshal(pdu, offset, "dqd", &fid, |
2501 | &initial_offset, &max_count); | |
2502 | if (retval < 0) { | |
2503 | goto out_nofid; | |
2504 | } | |
c572f23a HPB |
2505 | trace_v9fs_readdir(pdu->tag, pdu->id, fid, initial_offset, max_count); |
2506 | ||
d36a5c22 CS |
2507 | /* Enough space for a R_readdir header: size[4] Rreaddir tag[2] count[4] */ |
2508 | if (max_count > s->msize - 11) { | |
2509 | max_count = s->msize - 11; | |
2510 | warn_report_once( | |
2511 | "9p: bad client: T_readdir with count > msize - 11" | |
2512 | ); | |
2513 | } | |
2514 | ||
bccacf6c | 2515 | fidp = get_fid(pdu, fid); |
84dfb926 AK |
2516 | if (fidp == NULL) { |
2517 | retval = -EINVAL; | |
2518 | goto out_nofid; | |
2519 | } | |
f314ea4e | 2520 | if (!fidp->fs.dir.stream) { |
5e4eaa79 | 2521 | retval = -EINVAL; |
c18e2f94 SK |
2522 | goto out; |
2523 | } | |
d2c5cf7c CS |
2524 | if (s->proto_version != V9FS_PROTO_2000L) { |
2525 | warn_report_once( | |
2526 | "9p: bad client: T_readdir request only expected with 9P2000.L " | |
2527 | "protocol version" | |
2528 | ); | |
2529 | retval = -EOPNOTSUPP; | |
2530 | goto out; | |
2531 | } | |
0c4356ba | 2532 | count = v9fs_do_readdir(pdu, fidp, (off_t) initial_offset, max_count); |
5e4eaa79 AK |
2533 | if (count < 0) { |
2534 | retval = count; | |
2535 | goto out; | |
2536 | } | |
ddca7f86 MK |
2537 | retval = pdu_marshal(pdu, offset, "d", count); |
2538 | if (retval < 0) { | |
2539 | goto out; | |
2540 | } | |
2541 | retval += count + offset; | |
7999f7e1 | 2542 | trace_v9fs_readdir_return(pdu->tag, pdu->id, count, retval); |
c18e2f94 | 2543 | out: |
bccacf6c | 2544 | put_fid(pdu, fidp); |
84dfb926 | 2545 | out_nofid: |
dc295f83 | 2546 | pdu_complete(pdu, retval); |
c18e2f94 SK |
2547 | } |
2548 | ||
d7a90491 | 2549 | static int v9fs_xattr_write(V9fsState *s, V9fsPDU *pdu, V9fsFidState *fidp, |
2f008a8c | 2550 | uint64_t off, uint32_t count, |
d7a90491 | 2551 | struct iovec *sg, int cnt) |
10b468bd AK |
2552 | { |
2553 | int i, to_copy; | |
2554 | ssize_t err = 0; | |
7e55d65c | 2555 | uint64_t write_count; |
d7a90491 | 2556 | size_t offset = 7; |
10b468bd | 2557 | |
d7a90491 | 2558 | |
7e55d65c | 2559 | if (fidp->fs.xattr.len < off) { |
b858e80a | 2560 | return -ENOSPC; |
10b468bd | 2561 | } |
7e55d65c LQ |
2562 | write_count = fidp->fs.xattr.len - off; |
2563 | if (write_count > count) { | |
2564 | write_count = count; | |
2565 | } | |
ddca7f86 MK |
2566 | err = pdu_marshal(pdu, offset, "d", write_count); |
2567 | if (err < 0) { | |
2568 | return err; | |
2569 | } | |
2570 | err += offset; | |
d7a90491 | 2571 | fidp->fs.xattr.copied_len += write_count; |
10b468bd AK |
2572 | /* |
2573 | * Now copy the content from sg list | |
2574 | */ | |
d7a90491 AK |
2575 | for (i = 0; i < cnt; i++) { |
2576 | if (write_count > sg[i].iov_len) { | |
2577 | to_copy = sg[i].iov_len; | |
10b468bd AK |
2578 | } else { |
2579 | to_copy = write_count; | |
2580 | } | |
d7a90491 | 2581 | memcpy((char *)fidp->fs.xattr.value + off, sg[i].iov_base, to_copy); |
10b468bd | 2582 | /* updating vs->off since we are not using below */ |
d7a90491 | 2583 | off += to_copy; |
10b468bd AK |
2584 | write_count -= to_copy; |
2585 | } | |
b858e80a | 2586 | |
d7a90491 | 2587 | return err; |
10b468bd AK |
2588 | } |
2589 | ||
8440e22e | 2590 | static void coroutine_fn v9fs_write(void *opaque) |
9f107513 | 2591 | { |
d7a90491 AK |
2592 | ssize_t err; |
2593 | int32_t fid; | |
2f008a8c AK |
2594 | uint64_t off; |
2595 | uint32_t count; | |
d7a90491 AK |
2596 | int32_t len = 0; |
2597 | int32_t total = 0; | |
2598 | size_t offset = 7; | |
2599 | V9fsFidState *fidp; | |
ff06030f VJ |
2600 | V9fsPDU *pdu = opaque; |
2601 | V9fsState *s = pdu->s; | |
302a0d3e SH |
2602 | QEMUIOVector qiov_full; |
2603 | QEMUIOVector qiov; | |
8449360c | 2604 | |
ddca7f86 MK |
2605 | err = pdu_unmarshal(pdu, offset, "dqd", &fid, &off, &count); |
2606 | if (err < 0) { | |
dc295f83 | 2607 | pdu_complete(pdu, err); |
0289a412 | 2608 | return; |
ddca7f86 MK |
2609 | } |
2610 | offset += err; | |
cf45183b | 2611 | v9fs_init_qiov_from_pdu(&qiov_full, pdu, offset, count, true); |
302a0d3e | 2612 | trace_v9fs_write(pdu->tag, pdu->id, fid, off, count, qiov_full.niov); |
84dfb926 | 2613 | |
bccacf6c | 2614 | fidp = get_fid(pdu, fid); |
d7a90491 | 2615 | if (fidp == NULL) { |
8449360c | 2616 | err = -EINVAL; |
84dfb926 | 2617 | goto out_nofid; |
9f107513 | 2618 | } |
d7a90491 AK |
2619 | if (fidp->fid_type == P9_FID_FILE) { |
2620 | if (fidp->fs.fd == -1) { | |
10b468bd AK |
2621 | err = -EINVAL; |
2622 | goto out; | |
2623 | } | |
d7a90491 | 2624 | } else if (fidp->fid_type == P9_FID_XATTR) { |
10b468bd AK |
2625 | /* |
2626 | * setxattr operation | |
2627 | */ | |
302a0d3e SH |
2628 | err = v9fs_xattr_write(s, pdu, fidp, off, count, |
2629 | qiov_full.iov, qiov_full.niov); | |
d7a90491 | 2630 | goto out; |
10b468bd | 2631 | } else { |
8449360c AL |
2632 | err = -EINVAL; |
2633 | goto out; | |
2634 | } | |
302a0d3e | 2635 | qemu_iovec_init(&qiov, qiov_full.niov); |
d7a90491 | 2636 | do { |
302a0d3e | 2637 | qemu_iovec_reset(&qiov); |
1b093c48 | 2638 | qemu_iovec_concat(&qiov, &qiov_full, total, qiov_full.size - total); |
d7a90491 | 2639 | if (0) { |
302a0d3e | 2640 | print_sg(qiov.iov, qiov.niov); |
56d15a53 | 2641 | } |
d7a90491 AK |
2642 | /* Loop in case of EINTR */ |
2643 | do { | |
302a0d3e | 2644 | len = v9fs_co_pwritev(pdu, fidp, qiov.iov, qiov.niov, off); |
d7a90491 AK |
2645 | if (len >= 0) { |
2646 | off += len; | |
2647 | total += len; | |
2648 | } | |
bccacf6c | 2649 | } while (len == -EINTR && !pdu->cancelled); |
d7a90491 AK |
2650 | if (len < 0) { |
2651 | /* IO error return the error */ | |
2652 | err = len; | |
302a0d3e | 2653 | goto out_qiov; |
d7a90491 | 2654 | } |
d7a90491 | 2655 | } while (total < count && len > 0); |
302a0d3e SH |
2656 | |
2657 | offset = 7; | |
ddca7f86 MK |
2658 | err = pdu_marshal(pdu, offset, "d", total); |
2659 | if (err < 0) { | |
fdfcc9ae | 2660 | goto out_qiov; |
ddca7f86 MK |
2661 | } |
2662 | err += offset; | |
7999f7e1 | 2663 | trace_v9fs_write_return(pdu->tag, pdu->id, total, err); |
302a0d3e SH |
2664 | out_qiov: |
2665 | qemu_iovec_destroy(&qiov); | |
8449360c | 2666 | out: |
bccacf6c | 2667 | put_fid(pdu, fidp); |
84dfb926 | 2668 | out_nofid: |
302a0d3e | 2669 | qemu_iovec_destroy(&qiov_full); |
dc295f83 | 2670 | pdu_complete(pdu, err); |
9f107513 AL |
2671 | } |
2672 | ||
8440e22e | 2673 | static void coroutine_fn v9fs_create(void *opaque) |
5e94c103 | 2674 | { |
baaa86d9 VJ |
2675 | int32_t fid; |
2676 | int err = 0; | |
2677 | size_t offset = 7; | |
2678 | V9fsFidState *fidp; | |
2679 | V9fsQID qid; | |
2680 | int32_t perm; | |
2681 | int8_t mode; | |
2289be19 | 2682 | V9fsPath path; |
baaa86d9 VJ |
2683 | struct stat stbuf; |
2684 | V9fsString name; | |
2685 | V9fsString extension; | |
baaa86d9 VJ |
2686 | int iounit; |
2687 | V9fsPDU *pdu = opaque; | |
5b3c77aa | 2688 | V9fsState *s = pdu->s; |
c494dd6f | 2689 | |
2289be19 | 2690 | v9fs_path_init(&path); |
ddca7f86 MK |
2691 | v9fs_string_init(&name); |
2692 | v9fs_string_init(&extension); | |
2693 | err = pdu_unmarshal(pdu, offset, "dsdbs", &fid, &name, | |
2694 | &perm, &mode, &extension); | |
2695 | if (err < 0) { | |
2696 | goto out_nofid; | |
2697 | } | |
c572f23a HPB |
2698 | trace_v9fs_create(pdu->tag, pdu->id, fid, name.data, perm, mode); |
2699 | ||
fff39a7a GK |
2700 | if (name_is_illegal(name.data)) { |
2701 | err = -ENOENT; | |
2702 | goto out_nofid; | |
2703 | } | |
2704 | ||
805b5d98 GK |
2705 | if (!strcmp(".", name.data) || !strcmp("..", name.data)) { |
2706 | err = -EEXIST; | |
2707 | goto out_nofid; | |
2708 | } | |
2709 | ||
bccacf6c | 2710 | fidp = get_fid(pdu, fid); |
baaa86d9 VJ |
2711 | if (fidp == NULL) { |
2712 | err = -EINVAL; | |
84dfb926 | 2713 | goto out_nofid; |
c494dd6f | 2714 | } |
d63fb193 LQ |
2715 | if (fidp->fid_type != P9_FID_NONE) { |
2716 | err = -EINVAL; | |
2717 | goto out; | |
2718 | } | |
baaa86d9 | 2719 | if (perm & P9_STAT_MODE_DIR) { |
bccacf6c | 2720 | err = v9fs_co_mkdir(pdu, fidp, &name, perm & 0777, |
02cb7f3a | 2721 | fidp->uid, -1, &stbuf); |
baaa86d9 VJ |
2722 | if (err < 0) { |
2723 | goto out; | |
2724 | } | |
bccacf6c | 2725 | err = v9fs_co_name_to_path(pdu, &fidp->path, name.data, &path); |
2289be19 AK |
2726 | if (err < 0) { |
2727 | goto out; | |
2728 | } | |
5b3c77aa | 2729 | v9fs_path_write_lock(s); |
2289be19 | 2730 | v9fs_path_copy(&fidp->path, &path); |
5b3c77aa | 2731 | v9fs_path_unlock(s); |
bccacf6c | 2732 | err = v9fs_co_opendir(pdu, fidp); |
baaa86d9 VJ |
2733 | if (err < 0) { |
2734 | goto out; | |
2735 | } | |
2736 | fidp->fid_type = P9_FID_DIR; | |
2737 | } else if (perm & P9_STAT_MODE_SYMLINK) { | |
bccacf6c | 2738 | err = v9fs_co_symlink(pdu, fidp, &name, |
02cb7f3a | 2739 | extension.data, -1 , &stbuf); |
baaa86d9 | 2740 | if (err < 0) { |
baaa86d9 VJ |
2741 | goto out; |
2742 | } | |
bccacf6c | 2743 | err = v9fs_co_name_to_path(pdu, &fidp->path, name.data, &path); |
2289be19 AK |
2744 | if (err < 0) { |
2745 | goto out; | |
2746 | } | |
5b3c77aa | 2747 | v9fs_path_write_lock(s); |
2289be19 | 2748 | v9fs_path_copy(&fidp->path, &path); |
5b3c77aa | 2749 | v9fs_path_unlock(s); |
baaa86d9 | 2750 | } else if (perm & P9_STAT_MODE_LINK) { |
2289be19 | 2751 | int32_t ofid = atoi(extension.data); |
bccacf6c | 2752 | V9fsFidState *ofidp = get_fid(pdu, ofid); |
2289be19 | 2753 | if (ofidp == NULL) { |
baaa86d9 VJ |
2754 | err = -EINVAL; |
2755 | goto out; | |
2756 | } | |
bccacf6c AK |
2757 | err = v9fs_co_link(pdu, ofidp, fidp, &name); |
2758 | put_fid(pdu, ofidp); | |
2289be19 AK |
2759 | if (err < 0) { |
2760 | goto out; | |
2761 | } | |
bccacf6c | 2762 | err = v9fs_co_name_to_path(pdu, &fidp->path, name.data, &path); |
baaa86d9 | 2763 | if (err < 0) { |
2289be19 | 2764 | fidp->fid_type = P9_FID_NONE; |
baaa86d9 | 2765 | goto out; |
c494dd6f | 2766 | } |
5b3c77aa | 2767 | v9fs_path_write_lock(s); |
2289be19 | 2768 | v9fs_path_copy(&fidp->path, &path); |
5b3c77aa | 2769 | v9fs_path_unlock(s); |
bccacf6c | 2770 | err = v9fs_co_lstat(pdu, &fidp->path, &stbuf); |
02cb7f3a AK |
2771 | if (err < 0) { |
2772 | fidp->fid_type = P9_FID_NONE; | |
2773 | goto out; | |
2774 | } | |
baaa86d9 | 2775 | } else if (perm & P9_STAT_MODE_DEVICE) { |
c494dd6f AL |
2776 | char ctype; |
2777 | uint32_t major, minor; | |
2778 | mode_t nmode = 0; | |
2779 | ||
baaa86d9 | 2780 | if (sscanf(extension.data, "%c %u %u", &ctype, &major, &minor) != 3) { |
c494dd6f | 2781 | err = -errno; |
baaa86d9 | 2782 | goto out; |
c494dd6f AL |
2783 | } |
2784 | ||
2785 | switch (ctype) { | |
2786 | case 'c': | |
2787 | nmode = S_IFCHR; | |
2788 | break; | |
2789 | case 'b': | |
2790 | nmode = S_IFBLK; | |
2791 | break; | |
2792 | default: | |
2793 | err = -EIO; | |
baaa86d9 VJ |
2794 | goto out; |
2795 | } | |
c1568af5 | 2796 | |
baaa86d9 | 2797 | nmode |= perm & 0777; |
bccacf6c | 2798 | err = v9fs_co_mknod(pdu, fidp, &name, fidp->uid, -1, |
02cb7f3a | 2799 | makedev(major, minor), nmode, &stbuf); |
baaa86d9 VJ |
2800 | if (err < 0) { |
2801 | goto out; | |
2802 | } | |
bccacf6c | 2803 | err = v9fs_co_name_to_path(pdu, &fidp->path, name.data, &path); |
2289be19 AK |
2804 | if (err < 0) { |
2805 | goto out; | |
2806 | } | |
5b3c77aa | 2807 | v9fs_path_write_lock(s); |
2289be19 | 2808 | v9fs_path_copy(&fidp->path, &path); |
5b3c77aa | 2809 | v9fs_path_unlock(s); |
baaa86d9 | 2810 | } else if (perm & P9_STAT_MODE_NAMED_PIPE) { |
bccacf6c | 2811 | err = v9fs_co_mknod(pdu, fidp, &name, fidp->uid, -1, |
02cb7f3a | 2812 | 0, S_IFIFO | (perm & 0777), &stbuf); |
baaa86d9 VJ |
2813 | if (err < 0) { |
2814 | goto out; | |
2815 | } | |
bccacf6c | 2816 | err = v9fs_co_name_to_path(pdu, &fidp->path, name.data, &path); |
2289be19 AK |
2817 | if (err < 0) { |
2818 | goto out; | |
2819 | } | |
5b3c77aa | 2820 | v9fs_path_write_lock(s); |
2289be19 | 2821 | v9fs_path_copy(&fidp->path, &path); |
5b3c77aa | 2822 | v9fs_path_unlock(s); |
baaa86d9 | 2823 | } else if (perm & P9_STAT_MODE_SOCKET) { |
bccacf6c | 2824 | err = v9fs_co_mknod(pdu, fidp, &name, fidp->uid, -1, |
02cb7f3a | 2825 | 0, S_IFSOCK | (perm & 0777), &stbuf); |
baaa86d9 VJ |
2826 | if (err < 0) { |
2827 | goto out; | |
2828 | } | |
bccacf6c | 2829 | err = v9fs_co_name_to_path(pdu, &fidp->path, name.data, &path); |
2289be19 AK |
2830 | if (err < 0) { |
2831 | goto out; | |
2832 | } | |
5b3c77aa | 2833 | v9fs_path_write_lock(s); |
2289be19 | 2834 | v9fs_path_copy(&fidp->path, &path); |
5b3c77aa | 2835 | v9fs_path_unlock(s); |
baaa86d9 | 2836 | } else { |
bccacf6c | 2837 | err = v9fs_co_open2(pdu, fidp, &name, -1, |
01011733 | 2838 | omode_to_uflags(mode) | O_CREAT, perm, &stbuf); |
baaa86d9 VJ |
2839 | if (err < 0) { |
2840 | goto out; | |
2841 | } | |
2842 | fidp->fid_type = P9_FID_FILE; | |
7a462745 AK |
2843 | fidp->open_flags = omode_to_uflags(mode); |
2844 | if (fidp->open_flags & O_EXCL) { | |
2845 | /* | |
2846 | * We let the host file system do O_EXCL check | |
2847 | * We should not reclaim such fd | |
2848 | */ | |
2849 | fidp->flags |= FID_NON_RECLAIMABLE; | |
2850 | } | |
c494dd6f | 2851 | } |
bccacf6c | 2852 | iounit = get_iounit(pdu, &fidp->path); |
3b5ee9e8 AM |
2853 | err = stat_to_qid(pdu, &stbuf, &qid); |
2854 | if (err < 0) { | |
2855 | goto out; | |
2856 | } | |
ddca7f86 MK |
2857 | err = pdu_marshal(pdu, offset, "Qd", &qid, iounit); |
2858 | if (err < 0) { | |
2859 | goto out; | |
2860 | } | |
2861 | err += offset; | |
7999f7e1 AK |
2862 | trace_v9fs_create_return(pdu->tag, pdu->id, |
2863 | qid.type, qid.version, qid.path, iounit); | |
c494dd6f | 2864 | out: |
bccacf6c | 2865 | put_fid(pdu, fidp); |
84dfb926 | 2866 | out_nofid: |
dc295f83 | 2867 | pdu_complete(pdu, err); |
baaa86d9 VJ |
2868 | v9fs_string_free(&name); |
2869 | v9fs_string_free(&extension); | |
2289be19 | 2870 | v9fs_path_free(&path); |
9f107513 AL |
2871 | } |
2872 | ||
8440e22e | 2873 | static void coroutine_fn v9fs_symlink(void *opaque) |
08c60fc9 | 2874 | { |
ff06030f | 2875 | V9fsPDU *pdu = opaque; |
3fa2a8d1 VJ |
2876 | V9fsString name; |
2877 | V9fsString symname; | |
3fa2a8d1 VJ |
2878 | V9fsFidState *dfidp; |
2879 | V9fsQID qid; | |
2880 | struct stat stbuf; | |
08c60fc9 | 2881 | int32_t dfid; |
08c60fc9 VJ |
2882 | int err = 0; |
2883 | gid_t gid; | |
3fa2a8d1 | 2884 | size_t offset = 7; |
08c60fc9 | 2885 | |
ddca7f86 MK |
2886 | v9fs_string_init(&name); |
2887 | v9fs_string_init(&symname); | |
2888 | err = pdu_unmarshal(pdu, offset, "dssd", &dfid, &name, &symname, &gid); | |
2889 | if (err < 0) { | |
2890 | goto out_nofid; | |
2891 | } | |
c572f23a | 2892 | trace_v9fs_symlink(pdu->tag, pdu->id, dfid, name.data, symname.data, gid); |
08c60fc9 | 2893 | |
fff39a7a GK |
2894 | if (name_is_illegal(name.data)) { |
2895 | err = -ENOENT; | |
2896 | goto out_nofid; | |
2897 | } | |
2898 | ||
805b5d98 GK |
2899 | if (!strcmp(".", name.data) || !strcmp("..", name.data)) { |
2900 | err = -EEXIST; | |
2901 | goto out_nofid; | |
2902 | } | |
2903 | ||
bccacf6c | 2904 | dfidp = get_fid(pdu, dfid); |
3fa2a8d1 | 2905 | if (dfidp == NULL) { |
08c60fc9 | 2906 | err = -EINVAL; |
84dfb926 | 2907 | goto out_nofid; |
08c60fc9 | 2908 | } |
bccacf6c | 2909 | err = v9fs_co_symlink(pdu, dfidp, &name, symname.data, gid, &stbuf); |
3fa2a8d1 VJ |
2910 | if (err < 0) { |
2911 | goto out; | |
2912 | } | |
3b5ee9e8 AM |
2913 | err = stat_to_qid(pdu, &stbuf, &qid); |
2914 | if (err < 0) { | |
2915 | goto out; | |
2916 | } | |
ddca7f86 MK |
2917 | err = pdu_marshal(pdu, offset, "Q", &qid); |
2918 | if (err < 0) { | |
2919 | goto out; | |
2920 | } | |
2921 | err += offset; | |
7999f7e1 AK |
2922 | trace_v9fs_symlink_return(pdu->tag, pdu->id, |
2923 | qid.type, qid.version, qid.path); | |
08c60fc9 | 2924 | out: |
bccacf6c | 2925 | put_fid(pdu, dfidp); |
84dfb926 | 2926 | out_nofid: |
dc295f83 | 2927 | pdu_complete(pdu, err); |
3fa2a8d1 VJ |
2928 | v9fs_string_free(&name); |
2929 | v9fs_string_free(&symname); | |
08c60fc9 VJ |
2930 | } |
2931 | ||
a1bf8b74 | 2932 | static void coroutine_fn v9fs_flush(void *opaque) |
9f107513 | 2933 | { |
ddca7f86 | 2934 | ssize_t err; |
bccacf6c AK |
2935 | int16_t tag; |
2936 | size_t offset = 7; | |
d5f2af7b | 2937 | V9fsPDU *cancel_pdu = NULL; |
ff06030f VJ |
2938 | V9fsPDU *pdu = opaque; |
2939 | V9fsState *s = pdu->s; | |
bccacf6c | 2940 | |
ddca7f86 MK |
2941 | err = pdu_unmarshal(pdu, offset, "w", &tag); |
2942 | if (err < 0) { | |
dc295f83 | 2943 | pdu_complete(pdu, err); |
ddca7f86 MK |
2944 | return; |
2945 | } | |
c572f23a | 2946 | trace_v9fs_flush(pdu->tag, pdu->id, tag); |
bccacf6c | 2947 | |
d5f2af7b | 2948 | if (pdu->tag == tag) { |
3dc6f869 | 2949 | warn_report("the guest sent a self-referencing 9P flush request"); |
d5f2af7b GK |
2950 | } else { |
2951 | QLIST_FOREACH(cancel_pdu, &s->active_list, next) { | |
2952 | if (cancel_pdu->tag == tag) { | |
2953 | break; | |
2954 | } | |
bccacf6c AK |
2955 | } |
2956 | } | |
2957 | if (cancel_pdu) { | |
2958 | cancel_pdu->cancelled = 1; | |
2959 | /* | |
2960 | * Wait for pdu to complete. | |
2961 | */ | |
1ace7cea | 2962 | qemu_co_queue_wait(&cancel_pdu->complete, NULL); |
18adde86 GK |
2963 | if (!qemu_co_queue_next(&cancel_pdu->complete)) { |
2964 | cancel_pdu->cancelled = 0; | |
2965 | pdu_free(cancel_pdu); | |
2966 | } | |
bccacf6c | 2967 | } |
dc295f83 | 2968 | pdu_complete(pdu, 7); |
9f107513 AL |
2969 | } |
2970 | ||
8440e22e | 2971 | static void coroutine_fn v9fs_link(void *opaque) |
b2c224be | 2972 | { |
ff06030f | 2973 | V9fsPDU *pdu = opaque; |
b2c224be VJ |
2974 | int32_t dfid, oldfid; |
2975 | V9fsFidState *dfidp, *oldfidp; | |
3a93113a | 2976 | V9fsString name; |
b2c224be VJ |
2977 | size_t offset = 7; |
2978 | int err = 0; | |
2979 | ||
ddca7f86 MK |
2980 | v9fs_string_init(&name); |
2981 | err = pdu_unmarshal(pdu, offset, "dds", &dfid, &oldfid, &name); | |
2982 | if (err < 0) { | |
2983 | goto out_nofid; | |
2984 | } | |
c572f23a | 2985 | trace_v9fs_link(pdu->tag, pdu->id, dfid, oldfid, name.data); |
b2c224be | 2986 | |
fff39a7a GK |
2987 | if (name_is_illegal(name.data)) { |
2988 | err = -ENOENT; | |
2989 | goto out_nofid; | |
2990 | } | |
2991 | ||
805b5d98 GK |
2992 | if (!strcmp(".", name.data) || !strcmp("..", name.data)) { |
2993 | err = -EEXIST; | |
2994 | goto out_nofid; | |
2995 | } | |
2996 | ||
bccacf6c | 2997 | dfidp = get_fid(pdu, dfid); |
b2c224be | 2998 | if (dfidp == NULL) { |
ffd66876 | 2999 | err = -ENOENT; |
84dfb926 | 3000 | goto out_nofid; |
b2c224be VJ |
3001 | } |
3002 | ||
bccacf6c | 3003 | oldfidp = get_fid(pdu, oldfid); |
b2c224be | 3004 | if (oldfidp == NULL) { |
ffd66876 | 3005 | err = -ENOENT; |
b2c224be VJ |
3006 | goto out; |
3007 | } | |
bccacf6c | 3008 | err = v9fs_co_link(pdu, oldfidp, dfidp, &name); |
ffd66876 VJ |
3009 | if (!err) { |
3010 | err = offset; | |
b2c224be | 3011 | } |
4c158678 | 3012 | put_fid(pdu, oldfidp); |
b2c224be | 3013 | out: |
bccacf6c | 3014 | put_fid(pdu, dfidp); |
84dfb926 | 3015 | out_nofid: |
b2c224be | 3016 | v9fs_string_free(&name); |
dc295f83 | 3017 | pdu_complete(pdu, err); |
b2c224be VJ |
3018 | } |
3019 | ||
532decb7 | 3020 | /* Only works with path name based fid */ |
8440e22e | 3021 | static void coroutine_fn v9fs_remove(void *opaque) |
9f107513 | 3022 | { |
5bae1900 | 3023 | int32_t fid; |
5bae1900 | 3024 | int err = 0; |
ae1ef571 VJ |
3025 | size_t offset = 7; |
3026 | V9fsFidState *fidp; | |
3027 | V9fsPDU *pdu = opaque; | |
5bae1900 | 3028 | |
ddca7f86 MK |
3029 | err = pdu_unmarshal(pdu, offset, "d", &fid); |
3030 | if (err < 0) { | |
3031 | goto out_nofid; | |
3032 | } | |
c572f23a | 3033 | trace_v9fs_remove(pdu->tag, pdu->id, fid); |
5bae1900 | 3034 | |
bccacf6c | 3035 | fidp = get_fid(pdu, fid); |
ae1ef571 | 3036 | if (fidp == NULL) { |
5bae1900 | 3037 | err = -EINVAL; |
84dfb926 | 3038 | goto out_nofid; |
9f107513 | 3039 | } |
532decb7 | 3040 | /* if fs driver is not path based, return EOPNOTSUPP */ |
c98f1d4a | 3041 | if (!(pdu->s->ctx.export_flags & V9FS_PATHNAME_FSCONTEXT)) { |
532decb7 AK |
3042 | err = -EOPNOTSUPP; |
3043 | goto out_err; | |
3044 | } | |
7a462745 AK |
3045 | /* |
3046 | * IF the file is unlinked, we cannot reopen | |
3047 | * the file later. So don't reclaim fd | |
3048 | */ | |
bccacf6c | 3049 | err = v9fs_mark_fids_unreclaim(pdu, &fidp->path); |
7a462745 AK |
3050 | if (err < 0) { |
3051 | goto out_err; | |
3052 | } | |
bccacf6c | 3053 | err = v9fs_co_remove(pdu, &fidp->path); |
ae1ef571 VJ |
3054 | if (!err) { |
3055 | err = offset; | |
3056 | } | |
7a462745 | 3057 | out_err: |
ae1ef571 | 3058 | /* For TREMOVE we need to clunk the fid even on failed remove */ |
84dfb926 | 3059 | clunk_fid(pdu->s, fidp->fid); |
bccacf6c | 3060 | put_fid(pdu, fidp); |
84dfb926 | 3061 | out_nofid: |
dc295f83 | 3062 | pdu_complete(pdu, err); |
9f107513 AL |
3063 | } |
3064 | ||
8440e22e | 3065 | static void coroutine_fn v9fs_unlinkat(void *opaque) |
7834cf77 AK |
3066 | { |
3067 | int err = 0; | |
3068 | V9fsString name; | |
67e87345 | 3069 | int32_t dfid, flags, rflags = 0; |
7834cf77 | 3070 | size_t offset = 7; |
2289be19 | 3071 | V9fsPath path; |
7834cf77 AK |
3072 | V9fsFidState *dfidp; |
3073 | V9fsPDU *pdu = opaque; | |
7834cf77 | 3074 | |
ddca7f86 MK |
3075 | v9fs_string_init(&name); |
3076 | err = pdu_unmarshal(pdu, offset, "dsd", &dfid, &name, &flags); | |
3077 | if (err < 0) { | |
3078 | goto out_nofid; | |
3079 | } | |
fff39a7a GK |
3080 | |
3081 | if (name_is_illegal(name.data)) { | |
3082 | err = -ENOENT; | |
3083 | goto out_nofid; | |
3084 | } | |
3085 | ||
805b5d98 GK |
3086 | if (!strcmp(".", name.data)) { |
3087 | err = -EINVAL; | |
3088 | goto out_nofid; | |
3089 | } | |
3090 | ||
3091 | if (!strcmp("..", name.data)) { | |
3092 | err = -ENOTEMPTY; | |
3093 | goto out_nofid; | |
3094 | } | |
3095 | ||
67e87345 KF |
3096 | if (flags & ~P9_DOTL_AT_REMOVEDIR) { |
3097 | err = -EINVAL; | |
3098 | goto out_nofid; | |
3099 | } | |
3100 | ||
3101 | if (flags & P9_DOTL_AT_REMOVEDIR) { | |
3102 | rflags |= AT_REMOVEDIR; | |
3103 | } | |
3104 | ||
bccacf6c | 3105 | dfidp = get_fid(pdu, dfid); |
7834cf77 AK |
3106 | if (dfidp == NULL) { |
3107 | err = -EINVAL; | |
3108 | goto out_nofid; | |
3109 | } | |
7834cf77 AK |
3110 | /* |
3111 | * IF the file is unlinked, we cannot reopen | |
3112 | * the file later. So don't reclaim fd | |
3113 | */ | |
2289be19 | 3114 | v9fs_path_init(&path); |
bccacf6c | 3115 | err = v9fs_co_name_to_path(pdu, &dfidp->path, name.data, &path); |
2289be19 AK |
3116 | if (err < 0) { |
3117 | goto out_err; | |
3118 | } | |
bccacf6c | 3119 | err = v9fs_mark_fids_unreclaim(pdu, &path); |
7834cf77 AK |
3120 | if (err < 0) { |
3121 | goto out_err; | |
3122 | } | |
67e87345 | 3123 | err = v9fs_co_unlinkat(pdu, &dfidp->path, &name, rflags); |
7834cf77 AK |
3124 | if (!err) { |
3125 | err = offset; | |
3126 | } | |
3127 | out_err: | |
bccacf6c | 3128 | put_fid(pdu, dfidp); |
2289be19 | 3129 | v9fs_path_free(&path); |
7834cf77 | 3130 | out_nofid: |
dc295f83 | 3131 | pdu_complete(pdu, err); |
7834cf77 AK |
3132 | v9fs_string_free(&name); |
3133 | } | |
3134 | ||
2289be19 AK |
3135 | |
3136 | /* Only works with path name based fid */ | |
8440e22e GK |
3137 | static int coroutine_fn v9fs_complete_rename(V9fsPDU *pdu, V9fsFidState *fidp, |
3138 | int32_t newdirfid, | |
3139 | V9fsString *name) | |
8cf89e00 | 3140 | { |
c7b4b0b3 | 3141 | int err = 0; |
2289be19 AK |
3142 | V9fsPath new_path; |
3143 | V9fsFidState *tfidp; | |
bccacf6c | 3144 | V9fsState *s = pdu->s; |
84dfb926 | 3145 | V9fsFidState *dirfidp = NULL; |
8cf89e00 | 3146 | |
2289be19 | 3147 | v9fs_path_init(&new_path); |
930b1e17 | 3148 | if (newdirfid != -1) { |
bccacf6c | 3149 | dirfidp = get_fid(pdu, newdirfid); |
c7b4b0b3 | 3150 | if (dirfidp == NULL) { |
b858e80a | 3151 | return -ENOENT; |
c7b4b0b3 | 3152 | } |
49dd946b GK |
3153 | if (fidp->fid_type != P9_FID_NONE) { |
3154 | err = -EINVAL; | |
3155 | goto out; | |
3156 | } | |
4fa62005 GK |
3157 | err = v9fs_co_name_to_path(pdu, &dirfidp->path, name->data, &new_path); |
3158 | if (err < 0) { | |
3159 | goto out; | |
3160 | } | |
c7b4b0b3 | 3161 | } else { |
4d8bc733 JD |
3162 | char *dir_name = g_path_get_dirname(fidp->path.data); |
3163 | V9fsPath dir_path; | |
3164 | ||
3165 | v9fs_path_init(&dir_path); | |
3166 | v9fs_path_sprintf(&dir_path, "%s", dir_name); | |
3167 | g_free(dir_name); | |
3168 | ||
3169 | err = v9fs_co_name_to_path(pdu, &dir_path, name->data, &new_path); | |
3170 | v9fs_path_free(&dir_path); | |
4fa62005 GK |
3171 | if (err < 0) { |
3172 | goto out; | |
3173 | } | |
c7b4b0b3 | 3174 | } |
bccacf6c | 3175 | err = v9fs_co_rename(pdu, &fidp->path, &new_path); |
2289be19 AK |
3176 | if (err < 0) { |
3177 | goto out; | |
3178 | } | |
3179 | /* | |
3180 | * Fixup fid's pointing to the old name to | |
3181 | * start pointing to the new name | |
3182 | */ | |
feabd6cf | 3183 | QSIMPLEQ_FOREACH(tfidp, &s->fid_list, next) { |
2289be19 AK |
3184 | if (v9fs_path_is_ancestor(&fidp->path, &tfidp->path)) { |
3185 | /* replace the name */ | |
3186 | v9fs_fix_path(&tfidp->path, &new_path, strlen(fidp->path.data)); | |
8cf89e00 AL |
3187 | } |
3188 | } | |
c7b4b0b3 | 3189 | out: |
84dfb926 | 3190 | if (dirfidp) { |
bccacf6c | 3191 | put_fid(pdu, dirfidp); |
84dfb926 | 3192 | } |
2289be19 | 3193 | v9fs_path_free(&new_path); |
c7b4b0b3 MK |
3194 | return err; |
3195 | } | |
3196 | ||
532decb7 | 3197 | /* Only works with path name based fid */ |
8440e22e | 3198 | static void coroutine_fn v9fs_rename(void *opaque) |
c7b4b0b3 MK |
3199 | { |
3200 | int32_t fid; | |
c7b4b0b3 | 3201 | ssize_t err = 0; |
930b1e17 AK |
3202 | size_t offset = 7; |
3203 | V9fsString name; | |
3204 | int32_t newdirfid; | |
3205 | V9fsFidState *fidp; | |
3206 | V9fsPDU *pdu = opaque; | |
3207 | V9fsState *s = pdu->s; | |
c7b4b0b3 | 3208 | |
ddca7f86 MK |
3209 | v9fs_string_init(&name); |
3210 | err = pdu_unmarshal(pdu, offset, "dds", &fid, &newdirfid, &name); | |
3211 | if (err < 0) { | |
3212 | goto out_nofid; | |
3213 | } | |
fff39a7a GK |
3214 | |
3215 | if (name_is_illegal(name.data)) { | |
3216 | err = -ENOENT; | |
3217 | goto out_nofid; | |
3218 | } | |
3219 | ||
805b5d98 GK |
3220 | if (!strcmp(".", name.data) || !strcmp("..", name.data)) { |
3221 | err = -EISDIR; | |
3222 | goto out_nofid; | |
3223 | } | |
3224 | ||
bccacf6c | 3225 | fidp = get_fid(pdu, fid); |
930b1e17 | 3226 | if (fidp == NULL) { |
c7b4b0b3 | 3227 | err = -ENOENT; |
84dfb926 | 3228 | goto out_nofid; |
c7b4b0b3 | 3229 | } |
49dd946b GK |
3230 | if (fidp->fid_type != P9_FID_NONE) { |
3231 | err = -EINVAL; | |
3232 | goto out; | |
3233 | } | |
532decb7 | 3234 | /* if fs driver is not path based, return EOPNOTSUPP */ |
c98f1d4a | 3235 | if (!(pdu->s->ctx.export_flags & V9FS_PATHNAME_FSCONTEXT)) { |
532decb7 AK |
3236 | err = -EOPNOTSUPP; |
3237 | goto out; | |
3238 | } | |
3239 | v9fs_path_write_lock(s); | |
bccacf6c | 3240 | err = v9fs_complete_rename(pdu, fidp, newdirfid, &name); |
532decb7 | 3241 | v9fs_path_unlock(s); |
930b1e17 AK |
3242 | if (!err) { |
3243 | err = offset; | |
3244 | } | |
532decb7 | 3245 | out: |
bccacf6c | 3246 | put_fid(pdu, fidp); |
84dfb926 | 3247 | out_nofid: |
dc295f83 | 3248 | pdu_complete(pdu, err); |
930b1e17 | 3249 | v9fs_string_free(&name); |
c7b4b0b3 MK |
3250 | } |
3251 | ||
4fa62005 GK |
3252 | static int coroutine_fn v9fs_fix_fid_paths(V9fsPDU *pdu, V9fsPath *olddir, |
3253 | V9fsString *old_name, | |
3254 | V9fsPath *newdir, | |
3255 | V9fsString *new_name) | |
2289be19 AK |
3256 | { |
3257 | V9fsFidState *tfidp; | |
3258 | V9fsPath oldpath, newpath; | |
bccacf6c | 3259 | V9fsState *s = pdu->s; |
4fa62005 | 3260 | int err; |
2289be19 AK |
3261 | |
3262 | v9fs_path_init(&oldpath); | |
3263 | v9fs_path_init(&newpath); | |
4fa62005 GK |
3264 | err = v9fs_co_name_to_path(pdu, olddir, old_name->data, &oldpath); |
3265 | if (err < 0) { | |
3266 | goto out; | |
3267 | } | |
3268 | err = v9fs_co_name_to_path(pdu, newdir, new_name->data, &newpath); | |
3269 | if (err < 0) { | |
3270 | goto out; | |
3271 | } | |
2289be19 AK |
3272 | |
3273 | /* | |
3274 | * Fixup fid's pointing to the old name to | |
3275 | * start pointing to the new name | |
3276 | */ | |
feabd6cf | 3277 | QSIMPLEQ_FOREACH(tfidp, &s->fid_list, next) { |
2289be19 AK |
3278 | if (v9fs_path_is_ancestor(&oldpath, &tfidp->path)) { |
3279 | /* replace the name */ | |
3280 | v9fs_fix_path(&tfidp->path, &newpath, strlen(oldpath.data)); | |
3281 | } | |
3282 | } | |
4fa62005 | 3283 | out: |
2289be19 AK |
3284 | v9fs_path_free(&oldpath); |
3285 | v9fs_path_free(&newpath); | |
4fa62005 | 3286 | return err; |
2289be19 AK |
3287 | } |
3288 | ||
8440e22e GK |
3289 | static int coroutine_fn v9fs_complete_renameat(V9fsPDU *pdu, int32_t olddirfid, |
3290 | V9fsString *old_name, | |
3291 | int32_t newdirfid, | |
3292 | V9fsString *new_name) | |
89bf6593 AK |
3293 | { |
3294 | int err = 0; | |
bccacf6c | 3295 | V9fsState *s = pdu->s; |
89bf6593 AK |
3296 | V9fsFidState *newdirfidp = NULL, *olddirfidp = NULL; |
3297 | ||
bccacf6c | 3298 | olddirfidp = get_fid(pdu, olddirfid); |
89bf6593 AK |
3299 | if (olddirfidp == NULL) { |
3300 | err = -ENOENT; | |
3301 | goto out; | |
3302 | } | |
89bf6593 | 3303 | if (newdirfid != -1) { |
bccacf6c | 3304 | newdirfidp = get_fid(pdu, newdirfid); |
89bf6593 AK |
3305 | if (newdirfidp == NULL) { |
3306 | err = -ENOENT; | |
3307 | goto out; | |
3308 | } | |
89bf6593 | 3309 | } else { |
bccacf6c | 3310 | newdirfidp = get_fid(pdu, olddirfid); |
89bf6593 AK |
3311 | } |
3312 | ||
bccacf6c | 3313 | err = v9fs_co_renameat(pdu, &olddirfidp->path, old_name, |
2289be19 AK |
3314 | &newdirfidp->path, new_name); |
3315 | if (err < 0) { | |
3316 | goto out; | |
89bf6593 | 3317 | } |
c98f1d4a | 3318 | if (s->ctx.export_flags & V9FS_PATHNAME_FSCONTEXT) { |
532decb7 | 3319 | /* Only for path based fid we need to do the below fixup */ |
4fa62005 GK |
3320 | err = v9fs_fix_fid_paths(pdu, &olddirfidp->path, old_name, |
3321 | &newdirfidp->path, new_name); | |
532decb7 | 3322 | } |
89bf6593 AK |
3323 | out: |
3324 | if (olddirfidp) { | |
bccacf6c | 3325 | put_fid(pdu, olddirfidp); |
89bf6593 AK |
3326 | } |
3327 | if (newdirfidp) { | |
bccacf6c | 3328 | put_fid(pdu, newdirfidp); |
89bf6593 | 3329 | } |
89bf6593 AK |
3330 | return err; |
3331 | } | |
3332 | ||
8440e22e | 3333 | static void coroutine_fn v9fs_renameat(void *opaque) |
89bf6593 AK |
3334 | { |
3335 | ssize_t err = 0; | |
3336 | size_t offset = 7; | |
3337 | V9fsPDU *pdu = opaque; | |
3338 | V9fsState *s = pdu->s; | |
3339 | int32_t olddirfid, newdirfid; | |
3340 | V9fsString old_name, new_name; | |
3341 | ||
ddca7f86 MK |
3342 | v9fs_string_init(&old_name); |
3343 | v9fs_string_init(&new_name); | |
3344 | err = pdu_unmarshal(pdu, offset, "dsds", &olddirfid, | |
3345 | &old_name, &newdirfid, &new_name); | |
3346 | if (err < 0) { | |
3347 | goto out_err; | |
3348 | } | |
89bf6593 | 3349 | |
fff39a7a GK |
3350 | if (name_is_illegal(old_name.data) || name_is_illegal(new_name.data)) { |
3351 | err = -ENOENT; | |
3352 | goto out_err; | |
3353 | } | |
3354 | ||
805b5d98 GK |
3355 | if (!strcmp(".", old_name.data) || !strcmp("..", old_name.data) || |
3356 | !strcmp(".", new_name.data) || !strcmp("..", new_name.data)) { | |
3357 | err = -EISDIR; | |
3358 | goto out_err; | |
3359 | } | |
3360 | ||
532decb7 | 3361 | v9fs_path_write_lock(s); |
bccacf6c AK |
3362 | err = v9fs_complete_renameat(pdu, olddirfid, |
3363 | &old_name, newdirfid, &new_name); | |
532decb7 | 3364 | v9fs_path_unlock(s); |
89bf6593 AK |
3365 | if (!err) { |
3366 | err = offset; | |
3367 | } | |
ddca7f86 MK |
3368 | |
3369 | out_err: | |
dc295f83 | 3370 | pdu_complete(pdu, err); |
89bf6593 AK |
3371 | v9fs_string_free(&old_name); |
3372 | v9fs_string_free(&new_name); | |
3373 | } | |
3374 | ||
8440e22e | 3375 | static void coroutine_fn v9fs_wstat(void *opaque) |
8cf89e00 | 3376 | { |
b81d685e AK |
3377 | int32_t fid; |
3378 | int err = 0; | |
3379 | int16_t unused; | |
3380 | V9fsStat v9stat; | |
3381 | size_t offset = 7; | |
3382 | struct stat stbuf; | |
3383 | V9fsFidState *fidp; | |
3384 | V9fsPDU *pdu = opaque; | |
1d203986 | 3385 | V9fsState *s = pdu->s; |
8cf89e00 | 3386 | |
ddca7f86 MK |
3387 | v9fs_stat_init(&v9stat); |
3388 | err = pdu_unmarshal(pdu, offset, "dwS", &fid, &unused, &v9stat); | |
3389 | if (err < 0) { | |
3390 | goto out_nofid; | |
3391 | } | |
c572f23a HPB |
3392 | trace_v9fs_wstat(pdu->tag, pdu->id, fid, |
3393 | v9stat.mode, v9stat.atime, v9stat.mtime); | |
84dfb926 | 3394 | |
bccacf6c | 3395 | fidp = get_fid(pdu, fid); |
b81d685e AK |
3396 | if (fidp == NULL) { |
3397 | err = -EINVAL; | |
84dfb926 | 3398 | goto out_nofid; |
8cf89e00 | 3399 | } |
b81d685e AK |
3400 | /* do we need to sync the file? */ |
3401 | if (donttouch_stat(&v9stat)) { | |
bccacf6c | 3402 | err = v9fs_co_fsync(pdu, fidp, 0); |
8cf89e00 AL |
3403 | goto out; |
3404 | } | |
b81d685e AK |
3405 | if (v9stat.mode != -1) { |
3406 | uint32_t v9_mode; | |
bccacf6c | 3407 | err = v9fs_co_lstat(pdu, &fidp->path, &stbuf); |
b81d685e AK |
3408 | if (err < 0) { |
3409 | goto out; | |
3410 | } | |
3411 | v9_mode = stat_to_v9mode(&stbuf); | |
3412 | if ((v9stat.mode & P9_STAT_MODE_TYPE_BITS) != | |
3413 | (v9_mode & P9_STAT_MODE_TYPE_BITS)) { | |
3414 | /* Attempting to change the type */ | |
3415 | err = -EIO; | |
3416 | goto out; | |
3417 | } | |
bccacf6c | 3418 | err = v9fs_co_chmod(pdu, &fidp->path, |
b81d685e AK |
3419 | v9mode_to_mode(v9stat.mode, |
3420 | &v9stat.extension)); | |
3421 | if (err < 0) { | |
3422 | goto out; | |
3423 | } | |
3424 | } | |
3425 | if (v9stat.mtime != -1 || v9stat.atime != -1) { | |
8fc39ae4 | 3426 | struct timespec times[2]; |
b81d685e AK |
3427 | if (v9stat.atime != -1) { |
3428 | times[0].tv_sec = v9stat.atime; | |
8fc39ae4 SK |
3429 | times[0].tv_nsec = 0; |
3430 | } else { | |
3431 | times[0].tv_nsec = UTIME_OMIT; | |
3432 | } | |
b81d685e AK |
3433 | if (v9stat.mtime != -1) { |
3434 | times[1].tv_sec = v9stat.mtime; | |
8fc39ae4 SK |
3435 | times[1].tv_nsec = 0; |
3436 | } else { | |
3437 | times[1].tv_nsec = UTIME_OMIT; | |
3438 | } | |
bccacf6c | 3439 | err = v9fs_co_utimensat(pdu, &fidp->path, times); |
b81d685e AK |
3440 | if (err < 0) { |
3441 | goto out; | |
8cf89e00 AL |
3442 | } |
3443 | } | |
b81d685e | 3444 | if (v9stat.n_gid != -1 || v9stat.n_uid != -1) { |
bccacf6c | 3445 | err = v9fs_co_chown(pdu, &fidp->path, v9stat.n_uid, v9stat.n_gid); |
b81d685e | 3446 | if (err < 0) { |
8cf89e00 | 3447 | goto out; |
b81d685e | 3448 | } |
8cf89e00 | 3449 | } |
b81d685e | 3450 | if (v9stat.name.size != 0) { |
1d203986 | 3451 | v9fs_path_write_lock(s); |
bccacf6c | 3452 | err = v9fs_complete_rename(pdu, fidp, -1, &v9stat.name); |
1d203986 | 3453 | v9fs_path_unlock(s); |
b81d685e AK |
3454 | if (err < 0) { |
3455 | goto out; | |
3456 | } | |
8cf89e00 | 3457 | } |
b81d685e | 3458 | if (v9stat.length != -1) { |
bccacf6c | 3459 | err = v9fs_co_truncate(pdu, &fidp->path, v9stat.length); |
b81d685e AK |
3460 | if (err < 0) { |
3461 | goto out; | |
3462 | } | |
8cf89e00 | 3463 | } |
b81d685e | 3464 | err = offset; |
8cf89e00 | 3465 | out: |
bccacf6c | 3466 | put_fid(pdu, fidp); |
84dfb926 | 3467 | out_nofid: |
b81d685e | 3468 | v9fs_stat_free(&v9stat); |
dc295f83 | 3469 | pdu_complete(pdu, err); |
9f107513 AL |
3470 | } |
3471 | ||
88a4763e AK |
3472 | static int v9fs_fill_statfs(V9fsState *s, V9fsPDU *pdu, struct statfs *stbuf) |
3473 | { | |
3474 | uint32_t f_type; | |
3475 | uint32_t f_bsize; | |
3476 | uint64_t f_blocks; | |
3477 | uint64_t f_bfree; | |
3478 | uint64_t f_bavail; | |
3479 | uint64_t f_files; | |
3480 | uint64_t f_ffree; | |
3481 | uint64_t fsid_val; | |
3482 | uint32_t f_namelen; | |
3483 | size_t offset = 7; | |
5e94c103 MK |
3484 | int32_t bsize_factor; |
3485 | ||
5e94c103 MK |
3486 | /* |
3487 | * compute bsize factor based on host file system block size | |
3488 | * and client msize | |
3489 | */ | |
01011733 | 3490 | bsize_factor = (s->msize - P9_IOHDRSZ) / stbuf->f_bsize; |
5e94c103 MK |
3491 | if (!bsize_factor) { |
3492 | bsize_factor = 1; | |
3493 | } | |
88a4763e AK |
3494 | f_type = stbuf->f_type; |
3495 | f_bsize = stbuf->f_bsize; | |
3496 | f_bsize *= bsize_factor; | |
5e94c103 MK |
3497 | /* |
3498 | * f_bsize is adjusted(multiplied) by bsize factor, so we need to | |
3499 | * adjust(divide) the number of blocks, free blocks and available | |
3500 | * blocks by bsize factor | |
3501 | */ | |
01011733 XZ |
3502 | f_blocks = stbuf->f_blocks / bsize_factor; |
3503 | f_bfree = stbuf->f_bfree / bsize_factor; | |
3504 | f_bavail = stbuf->f_bavail / bsize_factor; | |
88a4763e AK |
3505 | f_files = stbuf->f_files; |
3506 | f_ffree = stbuf->f_ffree; | |
3507 | fsid_val = (unsigned int) stbuf->f_fsid.__val[0] | | |
3508 | (unsigned long long)stbuf->f_fsid.__val[1] << 32; | |
3509 | f_namelen = stbuf->f_namelen; | |
be940c87 | 3510 | |
88a4763e AK |
3511 | return pdu_marshal(pdu, offset, "ddqqqqqqd", |
3512 | f_type, f_bsize, f_blocks, f_bfree, | |
3513 | f_bavail, f_files, f_ffree, | |
3514 | fsid_val, f_namelen); | |
be940c87 MK |
3515 | } |
3516 | ||
8440e22e | 3517 | static void coroutine_fn v9fs_statfs(void *opaque) |
be940c87 | 3518 | { |
88a4763e AK |
3519 | int32_t fid; |
3520 | ssize_t retval = 0; | |
3521 | size_t offset = 7; | |
3522 | V9fsFidState *fidp; | |
3523 | struct statfs stbuf; | |
ff06030f VJ |
3524 | V9fsPDU *pdu = opaque; |
3525 | V9fsState *s = pdu->s; | |
be940c87 | 3526 | |
ddca7f86 MK |
3527 | retval = pdu_unmarshal(pdu, offset, "d", &fid); |
3528 | if (retval < 0) { | |
3529 | goto out_nofid; | |
3530 | } | |
bccacf6c | 3531 | fidp = get_fid(pdu, fid); |
88a4763e AK |
3532 | if (fidp == NULL) { |
3533 | retval = -ENOENT; | |
84dfb926 | 3534 | goto out_nofid; |
be940c87 | 3535 | } |
bccacf6c | 3536 | retval = v9fs_co_statfs(pdu, &fidp->path, &stbuf); |
88a4763e AK |
3537 | if (retval < 0) { |
3538 | goto out; | |
3539 | } | |
ddca7f86 MK |
3540 | retval = v9fs_fill_statfs(s, pdu, &stbuf); |
3541 | if (retval < 0) { | |
3542 | goto out; | |
3543 | } | |
3544 | retval += offset; | |
be940c87 | 3545 | out: |
bccacf6c | 3546 | put_fid(pdu, fidp); |
84dfb926 | 3547 | out_nofid: |
dc295f83 | 3548 | pdu_complete(pdu, retval); |
be940c87 MK |
3549 | } |
3550 | ||
8440e22e | 3551 | static void coroutine_fn v9fs_mknod(void *opaque) |
5268cecc | 3552 | { |
1b733fed AK |
3553 | |
3554 | int mode; | |
3555 | gid_t gid; | |
5268cecc | 3556 | int32_t fid; |
1b733fed | 3557 | V9fsQID qid; |
5268cecc | 3558 | int err = 0; |
5268cecc | 3559 | int major, minor; |
1b733fed AK |
3560 | size_t offset = 7; |
3561 | V9fsString name; | |
3562 | struct stat stbuf; | |
1b733fed AK |
3563 | V9fsFidState *fidp; |
3564 | V9fsPDU *pdu = opaque; | |
5268cecc | 3565 | |
ddca7f86 MK |
3566 | v9fs_string_init(&name); |
3567 | err = pdu_unmarshal(pdu, offset, "dsdddd", &fid, &name, &mode, | |
3568 | &major, &minor, &gid); | |
3569 | if (err < 0) { | |
3570 | goto out_nofid; | |
3571 | } | |
c572f23a | 3572 | trace_v9fs_mknod(pdu->tag, pdu->id, fid, mode, major, minor); |
5268cecc | 3573 | |
fff39a7a GK |
3574 | if (name_is_illegal(name.data)) { |
3575 | err = -ENOENT; | |
3576 | goto out_nofid; | |
3577 | } | |
3578 | ||
805b5d98 GK |
3579 | if (!strcmp(".", name.data) || !strcmp("..", name.data)) { |
3580 | err = -EEXIST; | |
3581 | goto out_nofid; | |
3582 | } | |
3583 | ||
bccacf6c | 3584 | fidp = get_fid(pdu, fid); |
5268cecc MK |
3585 | if (fidp == NULL) { |
3586 | err = -ENOENT; | |
84dfb926 | 3587 | goto out_nofid; |
5268cecc | 3588 | } |
bccacf6c | 3589 | err = v9fs_co_mknod(pdu, fidp, &name, fidp->uid, gid, |
02cb7f3a | 3590 | makedev(major, minor), mode, &stbuf); |
1b733fed AK |
3591 | if (err < 0) { |
3592 | goto out; | |
3593 | } | |
3b5ee9e8 AM |
3594 | err = stat_to_qid(pdu, &stbuf, &qid); |
3595 | if (err < 0) { | |
3596 | goto out; | |
3597 | } | |
ddca7f86 MK |
3598 | err = pdu_marshal(pdu, offset, "Q", &qid); |
3599 | if (err < 0) { | |
3600 | goto out; | |
3601 | } | |
3602 | err += offset; | |
7999f7e1 AK |
3603 | trace_v9fs_mknod_return(pdu->tag, pdu->id, |
3604 | qid.type, qid.version, qid.path); | |
5268cecc | 3605 | out: |
bccacf6c | 3606 | put_fid(pdu, fidp); |
84dfb926 | 3607 | out_nofid: |
dc295f83 | 3608 | pdu_complete(pdu, err); |
1b733fed | 3609 | v9fs_string_free(&name); |
5268cecc MK |
3610 | } |
3611 | ||
82cc3ee8 MK |
3612 | /* |
3613 | * Implement posix byte range locking code | |
3614 | * Server side handling of locking code is very simple, because 9p server in | |
3615 | * QEMU can handle only one client. And most of the lock handling | |
3616 | * (like conflict, merging) etc is done by the VFS layer itself, so no need to | |
3617 | * do any thing in * qemu 9p server side lock code path. | |
3618 | * So when a TLOCK request comes, always return success | |
3619 | */ | |
8440e22e | 3620 | static void coroutine_fn v9fs_lock(void *opaque) |
82cc3ee8 | 3621 | { |
ddca7f86 | 3622 | V9fsFlock flock; |
0c27bf2a AK |
3623 | size_t offset = 7; |
3624 | struct stat stbuf; | |
3625 | V9fsFidState *fidp; | |
3626 | int32_t fid, err = 0; | |
ff06030f | 3627 | V9fsPDU *pdu = opaque; |
82cc3ee8 | 3628 | |
ddca7f86 MK |
3629 | v9fs_string_init(&flock.client_id); |
3630 | err = pdu_unmarshal(pdu, offset, "dbdqqds", &fid, &flock.type, | |
3631 | &flock.flags, &flock.start, &flock.length, | |
3632 | &flock.proc_id, &flock.client_id); | |
3633 | if (err < 0) { | |
3634 | goto out_nofid; | |
3635 | } | |
c572f23a | 3636 | trace_v9fs_lock(pdu->tag, pdu->id, fid, |
ddca7f86 | 3637 | flock.type, flock.start, flock.length); |
c572f23a | 3638 | |
82cc3ee8 MK |
3639 | |
3640 | /* We support only block flag now (that too ignored currently) */ | |
ddca7f86 | 3641 | if (flock.flags & ~P9_LOCK_FLAGS_BLOCK) { |
82cc3ee8 | 3642 | err = -EINVAL; |
84dfb926 | 3643 | goto out_nofid; |
82cc3ee8 | 3644 | } |
bccacf6c | 3645 | fidp = get_fid(pdu, fid); |
0c27bf2a | 3646 | if (fidp == NULL) { |
82cc3ee8 | 3647 | err = -ENOENT; |
84dfb926 | 3648 | goto out_nofid; |
82cc3ee8 | 3649 | } |
cc720ddb | 3650 | err = v9fs_co_fstat(pdu, fidp, &stbuf); |
82cc3ee8 | 3651 | if (err < 0) { |
82cc3ee8 MK |
3652 | goto out; |
3653 | } | |
4bae2b39 PB |
3654 | err = pdu_marshal(pdu, offset, "b", P9_LOCK_SUCCESS); |
3655 | if (err < 0) { | |
3656 | goto out; | |
3657 | } | |
3658 | err += offset; | |
3659 | trace_v9fs_lock_return(pdu->tag, pdu->id, P9_LOCK_SUCCESS); | |
82cc3ee8 | 3660 | out: |
bccacf6c | 3661 | put_fid(pdu, fidp); |
84dfb926 | 3662 | out_nofid: |
dc295f83 | 3663 | pdu_complete(pdu, err); |
ddca7f86 | 3664 | v9fs_string_free(&flock.client_id); |
82cc3ee8 MK |
3665 | } |
3666 | ||
8f354003 MK |
3667 | /* |
3668 | * When a TGETLOCK request comes, always return success because all lock | |
3669 | * handling is done by client's VFS layer. | |
3670 | */ | |
8440e22e | 3671 | static void coroutine_fn v9fs_getlock(void *opaque) |
8f354003 | 3672 | { |
e4e414a4 AK |
3673 | size_t offset = 7; |
3674 | struct stat stbuf; | |
3675 | V9fsFidState *fidp; | |
ddca7f86 | 3676 | V9fsGetlock glock; |
e4e414a4 | 3677 | int32_t fid, err = 0; |
ff06030f | 3678 | V9fsPDU *pdu = opaque; |
8f354003 | 3679 | |
ddca7f86 MK |
3680 | v9fs_string_init(&glock.client_id); |
3681 | err = pdu_unmarshal(pdu, offset, "dbqqds", &fid, &glock.type, | |
3682 | &glock.start, &glock.length, &glock.proc_id, | |
3683 | &glock.client_id); | |
3684 | if (err < 0) { | |
3685 | goto out_nofid; | |
3686 | } | |
c572f23a | 3687 | trace_v9fs_getlock(pdu->tag, pdu->id, fid, |
ddca7f86 | 3688 | glock.type, glock.start, glock.length); |
c572f23a | 3689 | |
bccacf6c | 3690 | fidp = get_fid(pdu, fid); |
e4e414a4 | 3691 | if (fidp == NULL) { |
8f354003 | 3692 | err = -ENOENT; |
84dfb926 | 3693 | goto out_nofid; |
8f354003 | 3694 | } |
cc720ddb | 3695 | err = v9fs_co_fstat(pdu, fidp, &stbuf); |
8f354003 | 3696 | if (err < 0) { |
8f354003 MK |
3697 | goto out; |
3698 | } | |
ddca7f86 MK |
3699 | glock.type = P9_LOCK_TYPE_UNLCK; |
3700 | err = pdu_marshal(pdu, offset, "bqqds", glock.type, | |
3701 | glock.start, glock.length, glock.proc_id, | |
3702 | &glock.client_id); | |
3703 | if (err < 0) { | |
3704 | goto out; | |
3705 | } | |
3706 | err += offset; | |
3707 | trace_v9fs_getlock_return(pdu->tag, pdu->id, glock.type, glock.start, | |
3708 | glock.length, glock.proc_id); | |
8f354003 | 3709 | out: |
bccacf6c | 3710 | put_fid(pdu, fidp); |
84dfb926 | 3711 | out_nofid: |
dc295f83 | 3712 | pdu_complete(pdu, err); |
ddca7f86 | 3713 | v9fs_string_free(&glock.client_id); |
8f354003 MK |
3714 | } |
3715 | ||
8440e22e | 3716 | static void coroutine_fn v9fs_mkdir(void *opaque) |
b67592ea | 3717 | { |
ff06030f | 3718 | V9fsPDU *pdu = opaque; |
e84861f7 | 3719 | size_t offset = 7; |
b67592ea | 3720 | int32_t fid; |
e84861f7 | 3721 | struct stat stbuf; |
e84861f7 | 3722 | V9fsQID qid; |
02cb7f3a | 3723 | V9fsString name; |
b67592ea MK |
3724 | V9fsFidState *fidp; |
3725 | gid_t gid; | |
3726 | int mode; | |
e84861f7 | 3727 | int err = 0; |
b67592ea | 3728 | |
ddca7f86 MK |
3729 | v9fs_string_init(&name); |
3730 | err = pdu_unmarshal(pdu, offset, "dsdd", &fid, &name, &mode, &gid); | |
3731 | if (err < 0) { | |
3732 | goto out_nofid; | |
3733 | } | |
c572f23a HPB |
3734 | trace_v9fs_mkdir(pdu->tag, pdu->id, fid, name.data, mode, gid); |
3735 | ||
fff39a7a GK |
3736 | if (name_is_illegal(name.data)) { |
3737 | err = -ENOENT; | |
3738 | goto out_nofid; | |
3739 | } | |
3740 | ||
805b5d98 GK |
3741 | if (!strcmp(".", name.data) || !strcmp("..", name.data)) { |
3742 | err = -EEXIST; | |
3743 | goto out_nofid; | |
3744 | } | |
3745 | ||
bccacf6c | 3746 | fidp = get_fid(pdu, fid); |
b67592ea MK |
3747 | if (fidp == NULL) { |
3748 | err = -ENOENT; | |
84dfb926 | 3749 | goto out_nofid; |
b67592ea | 3750 | } |
bccacf6c | 3751 | err = v9fs_co_mkdir(pdu, fidp, &name, mode, fidp->uid, gid, &stbuf); |
e84861f7 VJ |
3752 | if (err < 0) { |
3753 | goto out; | |
3754 | } | |
3b5ee9e8 AM |
3755 | err = stat_to_qid(pdu, &stbuf, &qid); |
3756 | if (err < 0) { | |
3757 | goto out; | |
3758 | } | |
ddca7f86 MK |
3759 | err = pdu_marshal(pdu, offset, "Q", &qid); |
3760 | if (err < 0) { | |
3761 | goto out; | |
3762 | } | |
3763 | err += offset; | |
7999f7e1 AK |
3764 | trace_v9fs_mkdir_return(pdu->tag, pdu->id, |
3765 | qid.type, qid.version, qid.path, err); | |
b67592ea | 3766 | out: |
bccacf6c | 3767 | put_fid(pdu, fidp); |
84dfb926 | 3768 | out_nofid: |
dc295f83 | 3769 | pdu_complete(pdu, err); |
e84861f7 | 3770 | v9fs_string_free(&name); |
b67592ea MK |
3771 | } |
3772 | ||
8440e22e | 3773 | static void coroutine_fn v9fs_xattrwalk(void *opaque) |
fa32ef88 | 3774 | { |
670185a6 AK |
3775 | int64_t size; |
3776 | V9fsString name; | |
fa32ef88 | 3777 | ssize_t err = 0; |
670185a6 | 3778 | size_t offset = 7; |
fa32ef88 | 3779 | int32_t fid, newfid; |
670185a6 | 3780 | V9fsFidState *file_fidp; |
84dfb926 | 3781 | V9fsFidState *xattr_fidp = NULL; |
670185a6 AK |
3782 | V9fsPDU *pdu = opaque; |
3783 | V9fsState *s = pdu->s; | |
fa32ef88 | 3784 | |
ddca7f86 MK |
3785 | v9fs_string_init(&name); |
3786 | err = pdu_unmarshal(pdu, offset, "dds", &fid, &newfid, &name); | |
3787 | if (err < 0) { | |
3788 | goto out_nofid; | |
3789 | } | |
c572f23a HPB |
3790 | trace_v9fs_xattrwalk(pdu->tag, pdu->id, fid, newfid, name.data); |
3791 | ||
bccacf6c | 3792 | file_fidp = get_fid(pdu, fid); |
670185a6 | 3793 | if (file_fidp == NULL) { |
fa32ef88 | 3794 | err = -ENOENT; |
84dfb926 | 3795 | goto out_nofid; |
fa32ef88 | 3796 | } |
670185a6 AK |
3797 | xattr_fidp = alloc_fid(s, newfid); |
3798 | if (xattr_fidp == NULL) { | |
fa32ef88 AK |
3799 | err = -EINVAL; |
3800 | goto out; | |
3801 | } | |
2289be19 | 3802 | v9fs_path_copy(&xattr_fidp->path, &file_fidp->path); |
ba42ebb8 | 3803 | if (!v9fs_string_size(&name)) { |
fa32ef88 AK |
3804 | /* |
3805 | * listxattr request. Get the size first | |
3806 | */ | |
bccacf6c | 3807 | size = v9fs_co_llistxattr(pdu, &xattr_fidp->path, NULL, 0); |
670185a6 AK |
3808 | if (size < 0) { |
3809 | err = size; | |
84dfb926 | 3810 | clunk_fid(s, xattr_fidp->fid); |
670185a6 | 3811 | goto out; |
fa32ef88 | 3812 | } |
670185a6 AK |
3813 | /* |
3814 | * Read the xattr value | |
3815 | */ | |
3816 | xattr_fidp->fs.xattr.len = size; | |
3817 | xattr_fidp->fid_type = P9_FID_XATTR; | |
dd28fbbc | 3818 | xattr_fidp->fs.xattr.xattrwalk_fid = true; |
a647502c | 3819 | xattr_fidp->fs.xattr.value = g_malloc0(size); |
670185a6 | 3820 | if (size) { |
bccacf6c | 3821 | err = v9fs_co_llistxattr(pdu, &xattr_fidp->path, |
670185a6 AK |
3822 | xattr_fidp->fs.xattr.value, |
3823 | xattr_fidp->fs.xattr.len); | |
3824 | if (err < 0) { | |
84dfb926 | 3825 | clunk_fid(s, xattr_fidp->fid); |
670185a6 AK |
3826 | goto out; |
3827 | } | |
3828 | } | |
ddca7f86 MK |
3829 | err = pdu_marshal(pdu, offset, "q", size); |
3830 | if (err < 0) { | |
3831 | goto out; | |
3832 | } | |
3833 | err += offset; | |
fa32ef88 AK |
3834 | } else { |
3835 | /* | |
3836 | * specific xattr fid. We check for xattr | |
3837 | * presence also collect the xattr size | |
3838 | */ | |
bccacf6c | 3839 | size = v9fs_co_lgetxattr(pdu, &xattr_fidp->path, |
670185a6 AK |
3840 | &name, NULL, 0); |
3841 | if (size < 0) { | |
3842 | err = size; | |
84dfb926 | 3843 | clunk_fid(s, xattr_fidp->fid); |
670185a6 | 3844 | goto out; |
fa32ef88 | 3845 | } |
670185a6 AK |
3846 | /* |
3847 | * Read the xattr value | |
3848 | */ | |
3849 | xattr_fidp->fs.xattr.len = size; | |
3850 | xattr_fidp->fid_type = P9_FID_XATTR; | |
dd28fbbc | 3851 | xattr_fidp->fs.xattr.xattrwalk_fid = true; |
a647502c | 3852 | xattr_fidp->fs.xattr.value = g_malloc0(size); |
670185a6 | 3853 | if (size) { |
bccacf6c | 3854 | err = v9fs_co_lgetxattr(pdu, &xattr_fidp->path, |
670185a6 AK |
3855 | &name, xattr_fidp->fs.xattr.value, |
3856 | xattr_fidp->fs.xattr.len); | |
3857 | if (err < 0) { | |
84dfb926 | 3858 | clunk_fid(s, xattr_fidp->fid); |
670185a6 AK |
3859 | goto out; |
3860 | } | |
3861 | } | |
ddca7f86 MK |
3862 | err = pdu_marshal(pdu, offset, "q", size); |
3863 | if (err < 0) { | |
3864 | goto out; | |
3865 | } | |
3866 | err += offset; | |
fa32ef88 | 3867 | } |
7999f7e1 | 3868 | trace_v9fs_xattrwalk_return(pdu->tag, pdu->id, size); |
fa32ef88 | 3869 | out: |
bccacf6c | 3870 | put_fid(pdu, file_fidp); |
84dfb926 | 3871 | if (xattr_fidp) { |
bccacf6c | 3872 | put_fid(pdu, xattr_fidp); |
84dfb926 AK |
3873 | } |
3874 | out_nofid: | |
dc295f83 | 3875 | pdu_complete(pdu, err); |
670185a6 | 3876 | v9fs_string_free(&name); |
fa32ef88 AK |
3877 | } |
3878 | ||
8440e22e | 3879 | static void coroutine_fn v9fs_xattrcreate(void *opaque) |
10b468bd | 3880 | { |
aca6897f | 3881 | int flags, rflags = 0; |
10b468bd | 3882 | int32_t fid; |
3b79ef2c | 3883 | uint64_t size; |
10b468bd | 3884 | ssize_t err = 0; |
f10ff58d AK |
3885 | V9fsString name; |
3886 | size_t offset = 7; | |
3887 | V9fsFidState *file_fidp; | |
3888 | V9fsFidState *xattr_fidp; | |
3889 | V9fsPDU *pdu = opaque; | |
10b468bd | 3890 | |
ddca7f86 MK |
3891 | v9fs_string_init(&name); |
3892 | err = pdu_unmarshal(pdu, offset, "dsqd", &fid, &name, &size, &flags); | |
3893 | if (err < 0) { | |
3894 | goto out_nofid; | |
3895 | } | |
c572f23a | 3896 | trace_v9fs_xattrcreate(pdu->tag, pdu->id, fid, name.data, size, flags); |
10b468bd | 3897 | |
aca6897f KF |
3898 | if (flags & ~(P9_XATTR_CREATE | P9_XATTR_REPLACE)) { |
3899 | err = -EINVAL; | |
3900 | goto out_nofid; | |
3901 | } | |
3902 | ||
3903 | if (flags & P9_XATTR_CREATE) { | |
3904 | rflags |= XATTR_CREATE; | |
3905 | } | |
3906 | ||
3907 | if (flags & P9_XATTR_REPLACE) { | |
3908 | rflags |= XATTR_REPLACE; | |
3909 | } | |
3910 | ||
3b79ef2c GK |
3911 | if (size > XATTR_SIZE_MAX) { |
3912 | err = -E2BIG; | |
3913 | goto out_nofid; | |
3914 | } | |
3915 | ||
bccacf6c | 3916 | file_fidp = get_fid(pdu, fid); |
f10ff58d | 3917 | if (file_fidp == NULL) { |
10b468bd | 3918 | err = -EINVAL; |
84dfb926 | 3919 | goto out_nofid; |
10b468bd | 3920 | } |
dd654e03 GK |
3921 | if (file_fidp->fid_type != P9_FID_NONE) { |
3922 | err = -EINVAL; | |
3923 | goto out_put_fid; | |
3924 | } | |
3925 | ||
10b468bd | 3926 | /* Make the file fid point to xattr */ |
f10ff58d AK |
3927 | xattr_fidp = file_fidp; |
3928 | xattr_fidp->fid_type = P9_FID_XATTR; | |
3929 | xattr_fidp->fs.xattr.copied_len = 0; | |
dd28fbbc | 3930 | xattr_fidp->fs.xattr.xattrwalk_fid = false; |
f10ff58d | 3931 | xattr_fidp->fs.xattr.len = size; |
aca6897f | 3932 | xattr_fidp->fs.xattr.flags = rflags; |
f10ff58d AK |
3933 | v9fs_string_init(&xattr_fidp->fs.xattr.name); |
3934 | v9fs_string_copy(&xattr_fidp->fs.xattr.name, &name); | |
eb687602 | 3935 | xattr_fidp->fs.xattr.value = g_malloc0(size); |
f10ff58d | 3936 | err = offset; |
dd654e03 | 3937 | out_put_fid: |
bccacf6c | 3938 | put_fid(pdu, file_fidp); |
84dfb926 | 3939 | out_nofid: |
dc295f83 | 3940 | pdu_complete(pdu, err); |
f10ff58d | 3941 | v9fs_string_free(&name); |
10b468bd | 3942 | } |
fa32ef88 | 3943 | |
8440e22e | 3944 | static void coroutine_fn v9fs_readlink(void *opaque) |
df0973a4 | 3945 | { |
ff06030f | 3946 | V9fsPDU *pdu = opaque; |
7a5ca31e VJ |
3947 | size_t offset = 7; |
3948 | V9fsString target; | |
df0973a4 | 3949 | int32_t fid; |
df0973a4 MK |
3950 | int err = 0; |
3951 | V9fsFidState *fidp; | |
3952 | ||
ddca7f86 MK |
3953 | err = pdu_unmarshal(pdu, offset, "d", &fid); |
3954 | if (err < 0) { | |
3955 | goto out_nofid; | |
3956 | } | |
c572f23a | 3957 | trace_v9fs_readlink(pdu->tag, pdu->id, fid); |
bccacf6c | 3958 | fidp = get_fid(pdu, fid); |
df0973a4 MK |
3959 | if (fidp == NULL) { |
3960 | err = -ENOENT; | |
84dfb926 | 3961 | goto out_nofid; |
df0973a4 MK |
3962 | } |
3963 | ||
7a5ca31e | 3964 | v9fs_string_init(&target); |
bccacf6c | 3965 | err = v9fs_co_readlink(pdu, &fidp->path, &target); |
7a5ca31e VJ |
3966 | if (err < 0) { |
3967 | goto out; | |
3968 | } | |
ddca7f86 MK |
3969 | err = pdu_marshal(pdu, offset, "s", &target); |
3970 | if (err < 0) { | |
3971 | v9fs_string_free(&target); | |
3972 | goto out; | |
3973 | } | |
3974 | err += offset; | |
7999f7e1 | 3975 | trace_v9fs_readlink_return(pdu->tag, pdu->id, target.data); |
7a5ca31e | 3976 | v9fs_string_free(&target); |
df0973a4 | 3977 | out: |
bccacf6c | 3978 | put_fid(pdu, fidp); |
84dfb926 | 3979 | out_nofid: |
dc295f83 | 3980 | pdu_complete(pdu, err); |
df0973a4 MK |
3981 | } |
3982 | ||
ff06030f | 3983 | static CoroutineEntry *pdu_co_handlers[] = { |
c18e2f94 | 3984 | [P9_TREADDIR] = v9fs_readdir, |
be940c87 | 3985 | [P9_TSTATFS] = v9fs_statfs, |
00ede4c2 | 3986 | [P9_TGETATTR] = v9fs_getattr, |
c79ce737 | 3987 | [P9_TSETATTR] = v9fs_setattr, |
fa32ef88 | 3988 | [P9_TXATTRWALK] = v9fs_xattrwalk, |
10b468bd | 3989 | [P9_TXATTRCREATE] = v9fs_xattrcreate, |
5268cecc | 3990 | [P9_TMKNOD] = v9fs_mknod, |
c7b4b0b3 | 3991 | [P9_TRENAME] = v9fs_rename, |
82cc3ee8 | 3992 | [P9_TLOCK] = v9fs_lock, |
8f354003 | 3993 | [P9_TGETLOCK] = v9fs_getlock, |
89bf6593 | 3994 | [P9_TRENAMEAT] = v9fs_renameat, |
df0973a4 | 3995 | [P9_TREADLINK] = v9fs_readlink, |
7834cf77 | 3996 | [P9_TUNLINKAT] = v9fs_unlinkat, |
b67592ea | 3997 | [P9_TMKDIR] = v9fs_mkdir, |
9f107513 | 3998 | [P9_TVERSION] = v9fs_version, |
771e9d4c | 3999 | [P9_TLOPEN] = v9fs_open, |
9f107513 AL |
4000 | [P9_TATTACH] = v9fs_attach, |
4001 | [P9_TSTAT] = v9fs_stat, | |
4002 | [P9_TWALK] = v9fs_walk, | |
4003 | [P9_TCLUNK] = v9fs_clunk, | |
b41e95d3 | 4004 | [P9_TFSYNC] = v9fs_fsync, |
9f107513 AL |
4005 | [P9_TOPEN] = v9fs_open, |
4006 | [P9_TREAD] = v9fs_read, | |
4007 | #if 0 | |
4008 | [P9_TAUTH] = v9fs_auth, | |
4009 | #endif | |
4010 | [P9_TFLUSH] = v9fs_flush, | |
b2c224be | 4011 | [P9_TLINK] = v9fs_link, |
08c60fc9 | 4012 | [P9_TSYMLINK] = v9fs_symlink, |
9f107513 | 4013 | [P9_TCREATE] = v9fs_create, |
c1568af5 | 4014 | [P9_TLCREATE] = v9fs_lcreate, |
9f107513 AL |
4015 | [P9_TWRITE] = v9fs_write, |
4016 | [P9_TWSTAT] = v9fs_wstat, | |
4017 | [P9_TREMOVE] = v9fs_remove, | |
4018 | }; | |
4019 | ||
8440e22e | 4020 | static void coroutine_fn v9fs_op_not_supp(void *opaque) |
5c3234c6 | 4021 | { |
ff06030f | 4022 | V9fsPDU *pdu = opaque; |
dc295f83 | 4023 | pdu_complete(pdu, -EOPNOTSUPP); |
5c3234c6 AK |
4024 | } |
4025 | ||
8440e22e | 4026 | static void coroutine_fn v9fs_fs_ro(void *opaque) |
2c74c2cb MK |
4027 | { |
4028 | V9fsPDU *pdu = opaque; | |
dc295f83 | 4029 | pdu_complete(pdu, -EROFS); |
2c74c2cb MK |
4030 | } |
4031 | ||
4032 | static inline bool is_read_only_op(V9fsPDU *pdu) | |
4033 | { | |
4034 | switch (pdu->id) { | |
4035 | case P9_TREADDIR: | |
4036 | case P9_TSTATFS: | |
4037 | case P9_TGETATTR: | |
4038 | case P9_TXATTRWALK: | |
4039 | case P9_TLOCK: | |
4040 | case P9_TGETLOCK: | |
4041 | case P9_TREADLINK: | |
4042 | case P9_TVERSION: | |
4043 | case P9_TLOPEN: | |
4044 | case P9_TATTACH: | |
4045 | case P9_TSTAT: | |
4046 | case P9_TWALK: | |
4047 | case P9_TCLUNK: | |
4048 | case P9_TFSYNC: | |
4049 | case P9_TOPEN: | |
4050 | case P9_TREAD: | |
4051 | case P9_TAUTH: | |
4052 | case P9_TFLUSH: | |
4053 | return 1; | |
4054 | default: | |
4055 | return 0; | |
4056 | } | |
4057 | } | |
4058 | ||
506f3275 | 4059 | void pdu_submit(V9fsPDU *pdu, P9MsgHeader *hdr) |
9f107513 | 4060 | { |
ff06030f VJ |
4061 | Coroutine *co; |
4062 | CoroutineEntry *handler; | |
ad38ce9e | 4063 | V9fsState *s = pdu->s; |
9f107513 | 4064 | |
506f3275 GK |
4065 | pdu->size = le32_to_cpu(hdr->size_le); |
4066 | pdu->id = hdr->id; | |
4067 | pdu->tag = le16_to_cpu(hdr->tag_le); | |
4068 | ||
ff06030f VJ |
4069 | if (pdu->id >= ARRAY_SIZE(pdu_co_handlers) || |
4070 | (pdu_co_handlers[pdu->id] == NULL)) { | |
5c3234c6 | 4071 | handler = v9fs_op_not_supp; |
d1471233 GK |
4072 | } else if (is_ro_export(&s->ctx) && !is_read_only_op(pdu)) { |
4073 | handler = v9fs_fs_ro; | |
5c3234c6 | 4074 | } else { |
ff06030f | 4075 | handler = pdu_co_handlers[pdu->id]; |
5c3234c6 | 4076 | } |
2c74c2cb | 4077 | |
506f3275 | 4078 | qemu_co_queue_init(&pdu->complete); |
0b8b8753 PB |
4079 | co = qemu_coroutine_create(handler, pdu); |
4080 | qemu_coroutine_enter(co); | |
9f107513 AL |
4081 | } |
4082 | ||
2a0c56aa | 4083 | /* Returns 0 on success, 1 on failure. */ |
066eb006 GK |
4084 | int v9fs_device_realize_common(V9fsState *s, const V9fsTransport *t, |
4085 | Error **errp) | |
2a0c56aa | 4086 | { |
92c45122 | 4087 | ERRP_GUARD(); |
2a0c56aa WL |
4088 | int i, len; |
4089 | struct stat stat; | |
4090 | FsDriverEntry *fse; | |
4091 | V9fsPath path; | |
4092 | int rc = 1; | |
4093 | ||
066eb006 GK |
4094 | assert(!s->transport); |
4095 | s->transport = t; | |
4096 | ||
2a0c56aa WL |
4097 | /* initialize pdu allocator */ |
4098 | QLIST_INIT(&s->free_list); | |
4099 | QLIST_INIT(&s->active_list); | |
0d78289c | 4100 | for (i = 0; i < MAX_REQ; i++) { |
583f21f8 SS |
4101 | QLIST_INSERT_HEAD(&s->free_list, &s->pdus[i], next); |
4102 | s->pdus[i].s = s; | |
4103 | s->pdus[i].idx = i; | |
2a0c56aa WL |
4104 | } |
4105 | ||
4106 | v9fs_path_init(&path); | |
4107 | ||
4108 | fse = get_fsdev_fsentry(s->fsconf.fsdev_id); | |
4109 | ||
4110 | if (!fse) { | |
4111 | /* We don't have a fsdev identified by fsdev_id */ | |
4112 | error_setg(errp, "9pfs device couldn't find fsdev with the " | |
4113 | "id = %s", | |
4114 | s->fsconf.fsdev_id ? s->fsconf.fsdev_id : "NULL"); | |
4115 | goto out; | |
4116 | } | |
4117 | ||
4118 | if (!s->fsconf.tag) { | |
4119 | /* we haven't specified a mount_tag */ | |
4120 | error_setg(errp, "fsdev with id %s needs mount_tag arguments", | |
4121 | s->fsconf.fsdev_id); | |
4122 | goto out; | |
4123 | } | |
4124 | ||
4125 | s->ctx.export_flags = fse->export_flags; | |
4126 | s->ctx.fs_root = g_strdup(fse->path); | |
4127 | s->ctx.exops.get_st_gen = NULL; | |
4128 | len = strlen(s->fsconf.tag); | |
4129 | if (len > MAX_TAG_LEN - 1) { | |
4130 | error_setg(errp, "mount tag '%s' (%d bytes) is longer than " | |
4131 | "maximum (%d bytes)", s->fsconf.tag, len, MAX_TAG_LEN - 1); | |
4132 | goto out; | |
4133 | } | |
4134 | ||
4135 | s->tag = g_strdup(s->fsconf.tag); | |
4136 | s->ctx.uid = -1; | |
4137 | ||
4138 | s->ops = fse->ops; | |
4139 | ||
b96feb2c TS |
4140 | s->ctx.fmode = fse->fmode; |
4141 | s->ctx.dmode = fse->dmode; | |
4142 | ||
feabd6cf | 4143 | QSIMPLEQ_INIT(&s->fid_list); |
2a0c56aa WL |
4144 | qemu_co_rwlock_init(&s->rename_lock); |
4145 | ||
65603a80 GK |
4146 | if (s->ops->init(&s->ctx, errp) < 0) { |
4147 | error_prepend(errp, "cannot initialize fsdev '%s': ", | |
4148 | s->fsconf.fsdev_id); | |
2a0c56aa WL |
4149 | goto out; |
4150 | } | |
4151 | ||
4152 | /* | |
4153 | * Check details of export path, We need to use fs driver | |
4154 | * call back to do that. Since we are in the init path, we don't | |
4155 | * use co-routines here. | |
4156 | */ | |
4157 | if (s->ops->name_to_path(&s->ctx, NULL, "/", &path) < 0) { | |
4158 | error_setg(errp, | |
4159 | "error in converting name to path %s", strerror(errno)); | |
4160 | goto out; | |
4161 | } | |
4162 | if (s->ops->lstat(&s->ctx, &path, &stat)) { | |
4163 | error_setg(errp, "share path %s does not exist", fse->path); | |
4164 | goto out; | |
4165 | } else if (!S_ISDIR(stat.st_mode)) { | |
4166 | error_setg(errp, "share path %s is not a directory", fse->path); | |
4167 | goto out; | |
4168 | } | |
b8bbdb88 | 4169 | |
3b5ee9e8 AM |
4170 | s->dev_id = stat.st_dev; |
4171 | ||
6b6aa828 CS |
4172 | /* init inode remapping : */ |
4173 | /* hash table for variable length inode suffixes */ | |
4174 | qpd_table_init(&s->qpd_table); | |
4175 | /* hash table for slow/full inode remapping (most users won't need it) */ | |
4176 | qpf_table_init(&s->qpf_table); | |
4177 | /* hash table for quick inode remapping */ | |
1a6ed33c | 4178 | qpp_table_init(&s->qpp_table); |
6b6aa828 CS |
4179 | s->qp_ndevices = 0; |
4180 | s->qp_affix_next = 1; /* reserve 0 to detect overflow */ | |
f3fe4a2d | 4181 | s->qp_fullpath_next = 1; |
1a6ed33c | 4182 | |
b8bbdb88 PJ |
4183 | s->ctx.fst = &fse->fst; |
4184 | fsdev_throttle_init(s->ctx.fst); | |
4185 | ||
2a0c56aa WL |
4186 | rc = 0; |
4187 | out: | |
4188 | if (rc) { | |
b69c3c21 | 4189 | v9fs_device_unrealize_common(s); |
2a0c56aa | 4190 | } |
c0da0cb7 | 4191 | v9fs_path_free(&path); |
2a0c56aa WL |
4192 | return rc; |
4193 | } | |
4194 | ||
b69c3c21 | 4195 | void v9fs_device_unrealize_common(V9fsState *s) |
2a0c56aa | 4196 | { |
c0da0cb7 | 4197 | if (s->ops && s->ops->cleanup) { |
702dbcc2 LQ |
4198 | s->ops->cleanup(&s->ctx); |
4199 | } | |
c0da0cb7 GK |
4200 | if (s->ctx.fst) { |
4201 | fsdev_throttle_cleanup(s->ctx.fst); | |
4202 | } | |
2a0c56aa | 4203 | g_free(s->tag); |
6b6aa828 | 4204 | qp_table_destroy(&s->qpd_table); |
f3fe4a2d AM |
4205 | qp_table_destroy(&s->qpp_table); |
4206 | qp_table_destroy(&s->qpf_table); | |
4774718e | 4207 | g_free(s->ctx.fs_root); |
2a0c56aa WL |
4208 | } |
4209 | ||
0e44a0fd GK |
4210 | typedef struct VirtfsCoResetData { |
4211 | V9fsPDU pdu; | |
4212 | bool done; | |
4213 | } VirtfsCoResetData; | |
4214 | ||
4215 | static void coroutine_fn virtfs_co_reset(void *opaque) | |
4216 | { | |
4217 | VirtfsCoResetData *data = opaque; | |
4218 | ||
4219 | virtfs_reset(&data->pdu); | |
4220 | data->done = true; | |
4221 | } | |
4222 | ||
4223 | void v9fs_reset(V9fsState *s) | |
4224 | { | |
4225 | VirtfsCoResetData data = { .pdu = { .s = s }, .done = false }; | |
4226 | Coroutine *co; | |
4227 | ||
4228 | while (!QLIST_EMPTY(&s->active_list)) { | |
4229 | aio_poll(qemu_get_aio_context(), true); | |
4230 | } | |
4231 | ||
4232 | co = qemu_coroutine_create(virtfs_co_reset, &data); | |
4233 | qemu_coroutine_enter(co); | |
4234 | ||
4235 | while (!data.done) { | |
4236 | aio_poll(qemu_get_aio_context(), true); | |
4237 | } | |
4238 | } | |
4239 | ||
72a18977 | 4240 | static void __attribute__((__constructor__)) v9fs_set_fd_limit(void) |
7a462745 AK |
4241 | { |
4242 | struct rlimit rlim; | |
4243 | if (getrlimit(RLIMIT_NOFILE, &rlim) < 0) { | |
63325b18 | 4244 | error_report("Failed to get the resource limit"); |
7a462745 AK |
4245 | exit(1); |
4246 | } | |
01011733 XZ |
4247 | open_fd_hw = rlim.rlim_cur - MIN(400, rlim.rlim_cur / 3); |
4248 | open_fd_rc = rlim.rlim_cur / 2; | |
7a462745 | 4249 | } |