]>
Commit | Line | Data |
---|---|---|
4c793dda MK |
1 | /* |
2 | * Virtio 9p Proxy callback | |
3 | * | |
4 | * Copyright IBM, Corp. 2011 | |
5 | * | |
6 | * Authors: | |
7 | * M. Mohan Kumar <mohan@in.ibm.com> | |
8 | * | |
9 | * This work is licensed under the terms of the GNU GPL, version 2. See | |
10 | * the COPYING file in the top-level directory. | |
11 | */ | |
12 | #include <sys/socket.h> | |
13 | #include <sys/un.h> | |
14 | #include "hw/virtio.h" | |
15 | #include "virtio-9p.h" | |
16 | #include "fsdev/qemu-fsdev.h" | |
17 | #include "virtio-9p-proxy.h" | |
18 | ||
19 | typedef struct V9fsProxy { | |
20 | int sockfd; | |
21 | QemuMutex mutex; | |
39f8c32c MK |
22 | struct iovec in_iovec; |
23 | struct iovec out_iovec; | |
4c793dda MK |
24 | } V9fsProxy; |
25 | ||
daf0b9ac MK |
26 | /* |
27 | * Return received file descriptor on success in *status. | |
28 | * errno is also returned on *status (which will be < 0) | |
29 | * return < 0 on transport error. | |
30 | */ | |
31 | static int v9fs_receivefd(int sockfd, int *status) | |
32 | { | |
33 | struct iovec iov; | |
34 | struct msghdr msg; | |
35 | struct cmsghdr *cmsg; | |
36 | int retval, data, fd; | |
37 | union MsgControl msg_control; | |
38 | ||
39 | iov.iov_base = &data; | |
40 | iov.iov_len = sizeof(data); | |
41 | ||
42 | memset(&msg, 0, sizeof(msg)); | |
43 | msg.msg_iov = &iov; | |
44 | msg.msg_iovlen = 1; | |
45 | msg.msg_control = &msg_control; | |
46 | msg.msg_controllen = sizeof(msg_control); | |
47 | ||
48 | do { | |
49 | retval = recvmsg(sockfd, &msg, 0); | |
50 | } while (retval < 0 && errno == EINTR); | |
51 | if (retval <= 0) { | |
52 | return retval; | |
53 | } | |
54 | /* | |
55 | * data is set to V9FS_FD_VALID, if ancillary data is sent. If this | |
56 | * request doesn't need ancillary data (fd) or an error occurred, | |
57 | * data is set to negative errno value. | |
58 | */ | |
59 | if (data != V9FS_FD_VALID) { | |
60 | *status = data; | |
61 | return 0; | |
62 | } | |
63 | /* | |
64 | * File descriptor (fd) is sent in the ancillary data. Check if we | |
65 | * indeed received it. One of the reasons to fail to receive it is if | |
66 | * we exceeded the maximum number of file descriptors! | |
67 | */ | |
68 | for (cmsg = CMSG_FIRSTHDR(&msg); cmsg; cmsg = CMSG_NXTHDR(&msg, cmsg)) { | |
69 | if (cmsg->cmsg_len != CMSG_LEN(sizeof(int)) || | |
70 | cmsg->cmsg_level != SOL_SOCKET || | |
71 | cmsg->cmsg_type != SCM_RIGHTS) { | |
72 | continue; | |
73 | } | |
74 | fd = *((int *)CMSG_DATA(cmsg)); | |
75 | *status = fd; | |
76 | return 0; | |
77 | } | |
78 | *status = -ENFILE; /* Ancillary data sent but not received */ | |
79 | return 0; | |
80 | } | |
81 | ||
39f8c32c MK |
82 | static ssize_t socket_read(int sockfd, void *buff, size_t size) |
83 | { | |
84 | ssize_t retval, total = 0; | |
85 | ||
86 | while (size) { | |
87 | retval = read(sockfd, buff, size); | |
88 | if (retval == 0) { | |
89 | return -EIO; | |
90 | } | |
91 | if (retval < 0) { | |
92 | if (errno == EINTR) { | |
93 | continue; | |
94 | } | |
95 | return -errno; | |
96 | } | |
97 | size -= retval; | |
98 | buff += retval; | |
99 | total += retval; | |
100 | } | |
101 | return total; | |
102 | } | |
103 | ||
b178adc3 MK |
104 | /* Converts proxy_statfs to VFS statfs structure */ |
105 | static void prstatfs_to_statfs(struct statfs *stfs, ProxyStatFS *prstfs) | |
106 | { | |
107 | memset(stfs, 0, sizeof(*stfs)); | |
108 | stfs->f_type = prstfs->f_type; | |
109 | stfs->f_bsize = prstfs->f_bsize; | |
110 | stfs->f_blocks = prstfs->f_blocks; | |
111 | stfs->f_bfree = prstfs->f_bfree; | |
112 | stfs->f_bavail = prstfs->f_bavail; | |
113 | stfs->f_files = prstfs->f_files; | |
114 | stfs->f_ffree = prstfs->f_ffree; | |
115 | stfs->f_fsid.__val[0] = prstfs->f_fsid[0] & 0xFFFFFFFFUL; | |
116 | stfs->f_fsid.__val[1] = prstfs->f_fsid[1] >> 32 & 0xFFFFFFFFFUL; | |
117 | stfs->f_namelen = prstfs->f_namelen; | |
118 | stfs->f_frsize = prstfs->f_frsize; | |
119 | } | |
120 | ||
121 | /* Converts proxy_stat structure to VFS stat structure */ | |
122 | static void prstat_to_stat(struct stat *stbuf, ProxyStat *prstat) | |
123 | { | |
124 | memset(stbuf, 0, sizeof(*stbuf)); | |
125 | stbuf->st_dev = prstat->st_dev; | |
126 | stbuf->st_ino = prstat->st_ino; | |
127 | stbuf->st_nlink = prstat->st_nlink; | |
128 | stbuf->st_mode = prstat->st_mode; | |
129 | stbuf->st_uid = prstat->st_uid; | |
130 | stbuf->st_gid = prstat->st_gid; | |
131 | stbuf->st_rdev = prstat->st_rdev; | |
132 | stbuf->st_size = prstat->st_size; | |
133 | stbuf->st_blksize = prstat->st_blksize; | |
134 | stbuf->st_blocks = prstat->st_blocks; | |
135 | stbuf->st_atim.tv_sec = prstat->st_atim_sec; | |
136 | stbuf->st_atim.tv_nsec = prstat->st_atim_nsec; | |
137 | stbuf->st_mtime = prstat->st_mtim_sec; | |
138 | stbuf->st_mtim.tv_nsec = prstat->st_mtim_nsec; | |
139 | stbuf->st_ctime = prstat->st_ctim_sec; | |
140 | stbuf->st_ctim.tv_nsec = prstat->st_ctim_nsec; | |
141 | } | |
142 | ||
143 | /* | |
144 | * Response contains two parts | |
145 | * {header, data} | |
146 | * header.type == T_ERROR, data -> -errno | |
147 | * header.type == T_SUCCESS, data -> response | |
148 | * size of errno/response is given by header.size | |
149 | * returns < 0, on transport error. response is | |
150 | * valid only if status >= 0. | |
151 | */ | |
152 | static int v9fs_receive_response(V9fsProxy *proxy, int type, | |
153 | int *status, void *response) | |
154 | { | |
155 | int retval; | |
156 | ProxyHeader header; | |
157 | struct iovec *reply = &proxy->in_iovec; | |
158 | ||
159 | *status = 0; | |
160 | reply->iov_len = 0; | |
161 | retval = socket_read(proxy->sockfd, reply->iov_base, PROXY_HDR_SZ); | |
162 | if (retval < 0) { | |
163 | return retval; | |
164 | } | |
165 | reply->iov_len = PROXY_HDR_SZ; | |
166 | proxy_unmarshal(reply, 0, "dd", &header.type, &header.size); | |
167 | /* | |
168 | * if response size > PROXY_MAX_IO_SZ, read the response but ignore it and | |
169 | * return -ENOBUFS | |
170 | */ | |
171 | if (header.size > PROXY_MAX_IO_SZ) { | |
172 | int count; | |
173 | while (header.size > 0) { | |
174 | count = MIN(PROXY_MAX_IO_SZ, header.size); | |
175 | count = socket_read(proxy->sockfd, reply->iov_base, count); | |
176 | if (count < 0) { | |
177 | return count; | |
178 | } | |
179 | header.size -= count; | |
180 | } | |
181 | *status = -ENOBUFS; | |
182 | return 0; | |
183 | } | |
184 | ||
185 | retval = socket_read(proxy->sockfd, | |
186 | reply->iov_base + PROXY_HDR_SZ, header.size); | |
187 | if (retval < 0) { | |
188 | return retval; | |
189 | } | |
190 | reply->iov_len += header.size; | |
191 | /* there was an error during processing request */ | |
192 | if (header.type == T_ERROR) { | |
193 | int ret; | |
194 | ret = proxy_unmarshal(reply, PROXY_HDR_SZ, "d", status); | |
195 | if (ret < 0) { | |
196 | *status = ret; | |
197 | } | |
198 | return 0; | |
199 | } | |
200 | ||
201 | switch (type) { | |
202 | case T_LSTAT: { | |
203 | ProxyStat prstat; | |
204 | retval = proxy_unmarshal(reply, PROXY_HDR_SZ, | |
205 | "qqqdddqqqqqqqqqq", &prstat.st_dev, | |
206 | &prstat.st_ino, &prstat.st_nlink, | |
207 | &prstat.st_mode, &prstat.st_uid, | |
208 | &prstat.st_gid, &prstat.st_rdev, | |
209 | &prstat.st_size, &prstat.st_blksize, | |
210 | &prstat.st_blocks, | |
211 | &prstat.st_atim_sec, &prstat.st_atim_nsec, | |
212 | &prstat.st_mtim_sec, &prstat.st_mtim_nsec, | |
213 | &prstat.st_ctim_sec, &prstat.st_ctim_nsec); | |
214 | prstat_to_stat(response, &prstat); | |
215 | break; | |
216 | } | |
217 | case T_STATFS: { | |
218 | ProxyStatFS prstfs; | |
219 | retval = proxy_unmarshal(reply, PROXY_HDR_SZ, | |
220 | "qqqqqqqqqqq", &prstfs.f_type, | |
221 | &prstfs.f_bsize, &prstfs.f_blocks, | |
222 | &prstfs.f_bfree, &prstfs.f_bavail, | |
223 | &prstfs.f_files, &prstfs.f_ffree, | |
224 | &prstfs.f_fsid[0], &prstfs.f_fsid[1], | |
225 | &prstfs.f_namelen, &prstfs.f_frsize); | |
226 | prstatfs_to_statfs(response, &prstfs); | |
227 | break; | |
228 | } | |
229 | case T_READLINK: { | |
230 | V9fsString target; | |
231 | v9fs_string_init(&target); | |
232 | retval = proxy_unmarshal(reply, PROXY_HDR_SZ, "s", &target); | |
233 | strcpy(response, target.data); | |
234 | v9fs_string_free(&target); | |
235 | break; | |
236 | } | |
237 | default: | |
238 | return -1; | |
239 | } | |
240 | if (retval < 0) { | |
241 | *status = retval; | |
242 | } | |
243 | return 0; | |
244 | } | |
245 | ||
39f8c32c MK |
246 | /* |
247 | * return < 0 on transport error. | |
248 | * *status is valid only if return >= 0 | |
249 | */ | |
250 | static int v9fs_receive_status(V9fsProxy *proxy, | |
251 | struct iovec *reply, int *status) | |
252 | { | |
253 | int retval; | |
254 | ProxyHeader header; | |
255 | ||
256 | *status = 0; | |
257 | reply->iov_len = 0; | |
258 | retval = socket_read(proxy->sockfd, reply->iov_base, PROXY_HDR_SZ); | |
259 | if (retval < 0) { | |
260 | return retval; | |
261 | } | |
262 | reply->iov_len = PROXY_HDR_SZ; | |
263 | proxy_unmarshal(reply, 0, "dd", &header.type, &header.size); | |
264 | if (header.size != sizeof(int)) { | |
265 | *status = -ENOBUFS; | |
266 | return 0; | |
267 | } | |
268 | retval = socket_read(proxy->sockfd, | |
269 | reply->iov_base + PROXY_HDR_SZ, header.size); | |
270 | if (retval < 0) { | |
271 | return retval; | |
272 | } | |
273 | reply->iov_len += header.size; | |
274 | proxy_unmarshal(reply, PROXY_HDR_SZ, "d", status); | |
275 | return 0; | |
276 | } | |
277 | ||
daf0b9ac MK |
278 | /* |
279 | * Proxy->header and proxy->request written to socket by QEMU process. | |
280 | * This request read by proxy helper process | |
281 | * returns 0 on success and -errno on error | |
282 | */ | |
283 | static int v9fs_request(V9fsProxy *proxy, int type, | |
284 | void *response, const char *fmt, ...) | |
285 | { | |
39f8c32c | 286 | dev_t rdev; |
daf0b9ac | 287 | va_list ap; |
b178adc3 | 288 | int size = 0; |
daf0b9ac | 289 | int retval = 0; |
ea75fc4e | 290 | uint64_t offset; |
daf0b9ac | 291 | ProxyHeader header = { 0, 0}; |
ea75fc4e | 292 | struct timespec spec[2]; |
daf0b9ac | 293 | int flags, mode, uid, gid; |
39f8c32c MK |
294 | V9fsString *path, *oldpath; |
295 | struct iovec *iovec = NULL, *reply = NULL; | |
daf0b9ac MK |
296 | |
297 | qemu_mutex_lock(&proxy->mutex); | |
298 | ||
299 | if (proxy->sockfd == -1) { | |
300 | retval = -EIO; | |
301 | goto err_out; | |
302 | } | |
39f8c32c MK |
303 | iovec = &proxy->out_iovec; |
304 | reply = &proxy->in_iovec; | |
daf0b9ac MK |
305 | va_start(ap, fmt); |
306 | switch (type) { | |
307 | case T_OPEN: | |
308 | path = va_arg(ap, V9fsString *); | |
309 | flags = va_arg(ap, int); | |
310 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "sd", path, flags); | |
311 | if (retval > 0) { | |
312 | header.size = retval; | |
313 | header.type = T_OPEN; | |
314 | } | |
315 | break; | |
316 | case T_CREATE: | |
317 | path = va_arg(ap, V9fsString *); | |
318 | flags = va_arg(ap, int); | |
319 | mode = va_arg(ap, int); | |
320 | uid = va_arg(ap, int); | |
321 | gid = va_arg(ap, int); | |
322 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "sdddd", path, | |
323 | flags, mode, uid, gid); | |
324 | if (retval > 0) { | |
325 | header.size = retval; | |
326 | header.type = T_CREATE; | |
327 | } | |
328 | break; | |
39f8c32c MK |
329 | case T_MKNOD: |
330 | path = va_arg(ap, V9fsString *); | |
331 | mode = va_arg(ap, int); | |
332 | rdev = va_arg(ap, long int); | |
333 | uid = va_arg(ap, int); | |
334 | gid = va_arg(ap, int); | |
335 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "ddsdq", | |
336 | uid, gid, path, mode, rdev); | |
337 | if (retval > 0) { | |
338 | header.size = retval; | |
339 | header.type = T_MKNOD; | |
340 | } | |
341 | break; | |
342 | case T_MKDIR: | |
343 | path = va_arg(ap, V9fsString *); | |
344 | mode = va_arg(ap, int); | |
345 | uid = va_arg(ap, int); | |
346 | gid = va_arg(ap, int); | |
347 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "ddsd", | |
348 | uid, gid, path, mode); | |
349 | if (retval > 0) { | |
350 | header.size = retval; | |
351 | header.type = T_MKDIR; | |
352 | } | |
353 | break; | |
354 | case T_SYMLINK: | |
355 | oldpath = va_arg(ap, V9fsString *); | |
356 | path = va_arg(ap, V9fsString *); | |
357 | uid = va_arg(ap, int); | |
358 | gid = va_arg(ap, int); | |
359 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "ddss", | |
360 | uid, gid, oldpath, path); | |
361 | if (retval > 0) { | |
362 | header.size = retval; | |
363 | header.type = T_SYMLINK; | |
364 | } | |
365 | break; | |
366 | case T_LINK: | |
367 | oldpath = va_arg(ap, V9fsString *); | |
368 | path = va_arg(ap, V9fsString *); | |
369 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "ss", | |
370 | oldpath, path); | |
371 | if (retval > 0) { | |
372 | header.size = retval; | |
373 | header.type = T_LINK; | |
374 | } | |
375 | break; | |
b178adc3 MK |
376 | case T_LSTAT: |
377 | path = va_arg(ap, V9fsString *); | |
378 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "s", path); | |
379 | if (retval > 0) { | |
380 | header.size = retval; | |
381 | header.type = T_LSTAT; | |
382 | } | |
383 | break; | |
384 | case T_READLINK: | |
385 | path = va_arg(ap, V9fsString *); | |
386 | size = va_arg(ap, int); | |
387 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "sd", path, size); | |
388 | if (retval > 0) { | |
389 | header.size = retval; | |
390 | header.type = T_READLINK; | |
391 | } | |
392 | break; | |
393 | case T_STATFS: | |
394 | path = va_arg(ap, V9fsString *); | |
395 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "s", path); | |
396 | if (retval > 0) { | |
397 | header.size = retval; | |
398 | header.type = T_STATFS; | |
399 | } | |
400 | break; | |
ea75fc4e MK |
401 | case T_CHMOD: |
402 | path = va_arg(ap, V9fsString *); | |
403 | mode = va_arg(ap, int); | |
404 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "sd", path, mode); | |
405 | if (retval > 0) { | |
406 | header.size = retval; | |
407 | header.type = T_CHMOD; | |
408 | } | |
409 | break; | |
410 | case T_CHOWN: | |
411 | path = va_arg(ap, V9fsString *); | |
412 | uid = va_arg(ap, int); | |
413 | gid = va_arg(ap, int); | |
414 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "sdd", path, uid, gid); | |
415 | if (retval > 0) { | |
416 | header.size = retval; | |
417 | header.type = T_CHOWN; | |
418 | } | |
419 | break; | |
420 | case T_TRUNCATE: | |
421 | path = va_arg(ap, V9fsString *); | |
422 | offset = va_arg(ap, uint64_t); | |
423 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "sq", path, offset); | |
424 | if (retval > 0) { | |
425 | header.size = retval; | |
426 | header.type = T_TRUNCATE; | |
427 | } | |
428 | break; | |
429 | case T_UTIME: | |
430 | path = va_arg(ap, V9fsString *); | |
431 | spec[0].tv_sec = va_arg(ap, long); | |
432 | spec[0].tv_nsec = va_arg(ap, long); | |
433 | spec[1].tv_sec = va_arg(ap, long); | |
434 | spec[1].tv_nsec = va_arg(ap, long); | |
435 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "sqqqq", path, | |
436 | spec[0].tv_sec, spec[1].tv_nsec, | |
437 | spec[1].tv_sec, spec[1].tv_nsec); | |
438 | if (retval > 0) { | |
439 | header.size = retval; | |
440 | header.type = T_UTIME; | |
441 | } | |
442 | break; | |
443 | case T_RENAME: | |
444 | oldpath = va_arg(ap, V9fsString *); | |
445 | path = va_arg(ap, V9fsString *); | |
446 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "ss", oldpath, path); | |
447 | if (retval > 0) { | |
448 | header.size = retval; | |
449 | header.type = T_RENAME; | |
450 | } | |
451 | break; | |
452 | case T_REMOVE: | |
453 | path = va_arg(ap, V9fsString *); | |
454 | retval = proxy_marshal(iovec, PROXY_HDR_SZ, "s", path); | |
455 | if (retval > 0) { | |
456 | header.size = retval; | |
457 | header.type = T_REMOVE; | |
458 | } | |
459 | break; | |
daf0b9ac MK |
460 | default: |
461 | error_report("Invalid type %d\n", type); | |
462 | retval = -EINVAL; | |
463 | break; | |
464 | } | |
465 | va_end(ap); | |
466 | ||
467 | if (retval < 0) { | |
468 | goto err_out; | |
469 | } | |
470 | ||
471 | /* marshal the header details */ | |
472 | proxy_marshal(iovec, 0, "dd", header.type, header.size); | |
473 | header.size += PROXY_HDR_SZ; | |
474 | ||
475 | retval = qemu_write_full(proxy->sockfd, iovec->iov_base, header.size); | |
476 | if (retval != header.size) { | |
477 | goto close_error; | |
478 | } | |
479 | ||
480 | switch (type) { | |
481 | case T_OPEN: | |
482 | case T_CREATE: | |
483 | /* | |
484 | * A file descriptor is returned as response for | |
485 | * T_OPEN,T_CREATE on success | |
486 | */ | |
487 | if (v9fs_receivefd(proxy->sockfd, &retval) < 0) { | |
488 | goto close_error; | |
489 | } | |
490 | break; | |
39f8c32c MK |
491 | case T_MKNOD: |
492 | case T_MKDIR: | |
493 | case T_SYMLINK: | |
494 | case T_LINK: | |
ea75fc4e MK |
495 | case T_CHMOD: |
496 | case T_CHOWN: | |
497 | case T_RENAME: | |
498 | case T_TRUNCATE: | |
499 | case T_UTIME: | |
500 | case T_REMOVE: | |
39f8c32c MK |
501 | if (v9fs_receive_status(proxy, reply, &retval) < 0) { |
502 | goto close_error; | |
503 | } | |
504 | break; | |
b178adc3 MK |
505 | case T_LSTAT: |
506 | case T_READLINK: | |
507 | case T_STATFS: | |
508 | if (v9fs_receive_response(proxy, type, &retval, response) < 0) { | |
509 | goto close_error; | |
510 | } | |
511 | break; | |
daf0b9ac MK |
512 | } |
513 | ||
514 | err_out: | |
515 | qemu_mutex_unlock(&proxy->mutex); | |
516 | return retval; | |
517 | ||
518 | close_error: | |
519 | close(proxy->sockfd); | |
520 | proxy->sockfd = -1; | |
521 | qemu_mutex_unlock(&proxy->mutex); | |
522 | return -EIO; | |
523 | } | |
524 | ||
4c793dda MK |
525 | static int proxy_lstat(FsContext *fs_ctx, V9fsPath *fs_path, struct stat *stbuf) |
526 | { | |
b178adc3 MK |
527 | int retval; |
528 | retval = v9fs_request(fs_ctx->private, T_LSTAT, stbuf, "s", fs_path); | |
529 | if (retval < 0) { | |
530 | errno = -retval; | |
531 | return -1; | |
532 | } | |
533 | return retval; | |
4c793dda MK |
534 | } |
535 | ||
536 | static ssize_t proxy_readlink(FsContext *fs_ctx, V9fsPath *fs_path, | |
537 | char *buf, size_t bufsz) | |
538 | { | |
b178adc3 MK |
539 | int retval; |
540 | retval = v9fs_request(fs_ctx->private, T_READLINK, buf, "sd", | |
541 | fs_path, bufsz); | |
542 | if (retval < 0) { | |
543 | errno = -retval; | |
544 | return -1; | |
545 | } | |
546 | return strlen(buf); | |
4c793dda MK |
547 | } |
548 | ||
549 | static int proxy_close(FsContext *ctx, V9fsFidOpenState *fs) | |
550 | { | |
551 | return close(fs->fd); | |
552 | } | |
553 | ||
554 | static int proxy_closedir(FsContext *ctx, V9fsFidOpenState *fs) | |
555 | { | |
556 | return closedir(fs->dir); | |
557 | } | |
558 | ||
559 | static int proxy_open(FsContext *ctx, V9fsPath *fs_path, | |
560 | int flags, V9fsFidOpenState *fs) | |
561 | { | |
daf0b9ac MK |
562 | fs->fd = v9fs_request(ctx->private, T_OPEN, NULL, "sd", fs_path, flags); |
563 | if (fs->fd < 0) { | |
564 | errno = -fs->fd; | |
565 | fs->fd = -1; | |
566 | } | |
4c793dda MK |
567 | return fs->fd; |
568 | } | |
569 | ||
570 | static int proxy_opendir(FsContext *ctx, | |
571 | V9fsPath *fs_path, V9fsFidOpenState *fs) | |
572 | { | |
daf0b9ac MK |
573 | int serrno, fd; |
574 | ||
4c793dda | 575 | fs->dir = NULL; |
daf0b9ac MK |
576 | fd = v9fs_request(ctx->private, T_OPEN, NULL, "sd", fs_path, O_DIRECTORY); |
577 | if (fd < 0) { | |
578 | errno = -fd; | |
579 | return -1; | |
580 | } | |
581 | fs->dir = fdopendir(fd); | |
582 | if (!fs->dir) { | |
583 | serrno = errno; | |
584 | close(fd); | |
585 | errno = serrno; | |
586 | return -1; | |
587 | } | |
588 | return 0; | |
4c793dda MK |
589 | } |
590 | ||
591 | static void proxy_rewinddir(FsContext *ctx, V9fsFidOpenState *fs) | |
592 | { | |
593 | return rewinddir(fs->dir); | |
594 | } | |
595 | ||
596 | static off_t proxy_telldir(FsContext *ctx, V9fsFidOpenState *fs) | |
597 | { | |
598 | return telldir(fs->dir); | |
599 | } | |
600 | ||
601 | static int proxy_readdir_r(FsContext *ctx, V9fsFidOpenState *fs, | |
602 | struct dirent *entry, | |
603 | struct dirent **result) | |
604 | { | |
605 | return readdir_r(fs->dir, entry, result); | |
606 | } | |
607 | ||
608 | static void proxy_seekdir(FsContext *ctx, V9fsFidOpenState *fs, off_t off) | |
609 | { | |
610 | return seekdir(fs->dir, off); | |
611 | } | |
612 | ||
613 | static ssize_t proxy_preadv(FsContext *ctx, V9fsFidOpenState *fs, | |
614 | const struct iovec *iov, | |
615 | int iovcnt, off_t offset) | |
616 | { | |
617 | #ifdef CONFIG_PREADV | |
618 | return preadv(fs->fd, iov, iovcnt, offset); | |
619 | #else | |
620 | int err = lseek(fs->fd, offset, SEEK_SET); | |
621 | if (err == -1) { | |
622 | return err; | |
623 | } else { | |
624 | return readv(fs->fd, iov, iovcnt); | |
625 | } | |
626 | #endif | |
627 | } | |
628 | ||
629 | static ssize_t proxy_pwritev(FsContext *ctx, V9fsFidOpenState *fs, | |
630 | const struct iovec *iov, | |
631 | int iovcnt, off_t offset) | |
632 | { | |
633 | ssize_t ret; | |
634 | ||
635 | #ifdef CONFIG_PREADV | |
636 | ret = pwritev(fs->fd, iov, iovcnt, offset); | |
637 | #else | |
638 | int err = lseek(fs->fd, offset, SEEK_SET); | |
639 | if (err == -1) { | |
640 | return err; | |
641 | } else { | |
642 | ret = writev(fs->fd, iov, iovcnt); | |
643 | } | |
644 | #endif | |
645 | #ifdef CONFIG_SYNC_FILE_RANGE | |
646 | if (ret > 0 && ctx->export_flags & V9FS_IMMEDIATE_WRITEOUT) { | |
647 | /* | |
648 | * Initiate a writeback. This is not a data integrity sync. | |
649 | * We want to ensure that we don't leave dirty pages in the cache | |
650 | * after write when writeout=immediate is sepcified. | |
651 | */ | |
652 | sync_file_range(fs->fd, offset, ret, | |
653 | SYNC_FILE_RANGE_WAIT_BEFORE | SYNC_FILE_RANGE_WRITE); | |
654 | } | |
655 | #endif | |
656 | return ret; | |
657 | } | |
658 | ||
659 | static int proxy_chmod(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) | |
660 | { | |
ea75fc4e MK |
661 | int retval; |
662 | retval = v9fs_request(fs_ctx->private, T_CHMOD, NULL, "sd", | |
663 | fs_path, credp->fc_mode); | |
664 | if (retval < 0) { | |
665 | errno = -retval; | |
666 | } | |
667 | return retval; | |
4c793dda MK |
668 | } |
669 | ||
670 | static int proxy_mknod(FsContext *fs_ctx, V9fsPath *dir_path, | |
671 | const char *name, FsCred *credp) | |
672 | { | |
39f8c32c MK |
673 | int retval; |
674 | V9fsString fullname; | |
675 | ||
676 | v9fs_string_init(&fullname); | |
677 | v9fs_string_sprintf(&fullname, "%s/%s", dir_path->data, name); | |
678 | ||
679 | retval = v9fs_request(fs_ctx->private, T_MKNOD, NULL, "sdqdd", | |
680 | &fullname, credp->fc_mode, credp->fc_rdev, | |
681 | credp->fc_uid, credp->fc_gid); | |
682 | v9fs_string_free(&fullname); | |
683 | if (retval < 0) { | |
684 | errno = -retval; | |
685 | retval = -1; | |
686 | } | |
687 | return retval; | |
4c793dda MK |
688 | } |
689 | ||
690 | static int proxy_mkdir(FsContext *fs_ctx, V9fsPath *dir_path, | |
691 | const char *name, FsCred *credp) | |
692 | { | |
39f8c32c MK |
693 | int retval; |
694 | V9fsString fullname; | |
695 | ||
696 | v9fs_string_init(&fullname); | |
697 | v9fs_string_sprintf(&fullname, "%s/%s", dir_path->data, name); | |
698 | ||
699 | retval = v9fs_request(fs_ctx->private, T_MKDIR, NULL, "sddd", &fullname, | |
700 | credp->fc_mode, credp->fc_uid, credp->fc_gid); | |
701 | v9fs_string_free(&fullname); | |
702 | if (retval < 0) { | |
703 | errno = -retval; | |
704 | retval = -1; | |
705 | } | |
706 | v9fs_string_free(&fullname); | |
707 | return retval; | |
4c793dda MK |
708 | } |
709 | ||
710 | static int proxy_fstat(FsContext *fs_ctx, int fid_type, | |
711 | V9fsFidOpenState *fs, struct stat *stbuf) | |
712 | { | |
713 | int fd; | |
714 | ||
715 | if (fid_type == P9_FID_DIR) { | |
716 | fd = dirfd(fs->dir); | |
717 | } else { | |
718 | fd = fs->fd; | |
719 | } | |
720 | return fstat(fd, stbuf); | |
721 | } | |
722 | ||
723 | static int proxy_open2(FsContext *fs_ctx, V9fsPath *dir_path, const char *name, | |
724 | int flags, FsCred *credp, V9fsFidOpenState *fs) | |
725 | { | |
daf0b9ac MK |
726 | V9fsString fullname; |
727 | ||
728 | v9fs_string_init(&fullname); | |
729 | v9fs_string_sprintf(&fullname, "%s/%s", dir_path->data, name); | |
730 | ||
731 | fs->fd = v9fs_request(fs_ctx->private, T_CREATE, NULL, "sdddd", | |
732 | &fullname, flags, credp->fc_mode, | |
733 | credp->fc_uid, credp->fc_gid); | |
734 | v9fs_string_free(&fullname); | |
735 | if (fs->fd < 0) { | |
736 | errno = -fs->fd; | |
737 | fs->fd = -1; | |
738 | } | |
739 | return fs->fd; | |
4c793dda MK |
740 | } |
741 | ||
4c793dda MK |
742 | static int proxy_symlink(FsContext *fs_ctx, const char *oldpath, |
743 | V9fsPath *dir_path, const char *name, FsCred *credp) | |
744 | { | |
39f8c32c MK |
745 | int retval; |
746 | V9fsString fullname, target; | |
747 | ||
748 | v9fs_string_init(&fullname); | |
749 | v9fs_string_init(&target); | |
750 | ||
751 | v9fs_string_sprintf(&fullname, "%s/%s", dir_path->data, name); | |
752 | v9fs_string_sprintf(&target, "%s", oldpath); | |
753 | ||
754 | retval = v9fs_request(fs_ctx->private, T_SYMLINK, NULL, "ssdd", | |
755 | &target, &fullname, credp->fc_uid, credp->fc_gid); | |
756 | v9fs_string_free(&fullname); | |
757 | v9fs_string_free(&target); | |
758 | if (retval < 0) { | |
759 | errno = -retval; | |
760 | retval = -1; | |
761 | } | |
762 | return retval; | |
4c793dda MK |
763 | } |
764 | ||
765 | static int proxy_link(FsContext *ctx, V9fsPath *oldpath, | |
766 | V9fsPath *dirpath, const char *name) | |
767 | { | |
39f8c32c MK |
768 | int retval; |
769 | V9fsString newpath; | |
770 | ||
771 | v9fs_string_init(&newpath); | |
772 | v9fs_string_sprintf(&newpath, "%s/%s", dirpath->data, name); | |
773 | ||
b178adc3 | 774 | retval = v9fs_request(ctx->private, T_LINK, NULL, "ss", oldpath, &newpath); |
39f8c32c MK |
775 | v9fs_string_free(&newpath); |
776 | if (retval < 0) { | |
777 | errno = -retval; | |
778 | retval = -1; | |
779 | } | |
780 | return retval; | |
4c793dda MK |
781 | } |
782 | ||
783 | static int proxy_truncate(FsContext *ctx, V9fsPath *fs_path, off_t size) | |
784 | { | |
ea75fc4e MK |
785 | int retval; |
786 | ||
787 | retval = v9fs_request(ctx->private, T_TRUNCATE, NULL, "sq", fs_path, size); | |
788 | if (retval < 0) { | |
789 | errno = -retval; | |
790 | return -1; | |
791 | } | |
792 | return 0; | |
4c793dda MK |
793 | } |
794 | ||
795 | static int proxy_rename(FsContext *ctx, const char *oldpath, | |
796 | const char *newpath) | |
797 | { | |
ea75fc4e MK |
798 | int retval; |
799 | V9fsString oldname, newname; | |
800 | ||
801 | v9fs_string_init(&oldname); | |
802 | v9fs_string_init(&newname); | |
803 | ||
804 | v9fs_string_sprintf(&oldname, "%s", oldpath); | |
805 | v9fs_string_sprintf(&newname, "%s", newpath); | |
806 | retval = v9fs_request(ctx->private, T_RENAME, NULL, "ss", | |
807 | &oldname, &newname); | |
808 | v9fs_string_free(&oldname); | |
809 | v9fs_string_free(&newname); | |
810 | if (retval < 0) { | |
811 | errno = -retval; | |
812 | } | |
813 | return retval; | |
4c793dda MK |
814 | } |
815 | ||
816 | static int proxy_chown(FsContext *fs_ctx, V9fsPath *fs_path, FsCred *credp) | |
817 | { | |
ea75fc4e MK |
818 | int retval; |
819 | retval = v9fs_request(fs_ctx->private, T_CHOWN, NULL, "sdd", | |
820 | fs_path, credp->fc_uid, credp->fc_gid); | |
821 | if (retval < 0) { | |
822 | errno = -retval; | |
823 | } | |
824 | return retval; | |
4c793dda MK |
825 | } |
826 | ||
827 | static int proxy_utimensat(FsContext *s, V9fsPath *fs_path, | |
828 | const struct timespec *buf) | |
829 | { | |
ea75fc4e MK |
830 | int retval; |
831 | retval = v9fs_request(s->private, T_UTIME, NULL, "sqqqq", | |
832 | fs_path, | |
833 | buf[0].tv_sec, buf[0].tv_nsec, | |
834 | buf[1].tv_sec, buf[1].tv_nsec); | |
835 | if (retval < 0) { | |
836 | errno = -retval; | |
837 | } | |
838 | return retval; | |
4c793dda MK |
839 | } |
840 | ||
841 | static int proxy_remove(FsContext *ctx, const char *path) | |
842 | { | |
ea75fc4e MK |
843 | int retval; |
844 | V9fsString name; | |
845 | v9fs_string_init(&name); | |
846 | v9fs_string_sprintf(&name, "%s", path); | |
847 | retval = v9fs_request(ctx->private, T_REMOVE, NULL, "s", &name); | |
848 | v9fs_string_free(&name); | |
849 | if (retval < 0) { | |
850 | errno = -retval; | |
851 | } | |
852 | return retval; | |
4c793dda MK |
853 | } |
854 | ||
855 | static int proxy_fsync(FsContext *ctx, int fid_type, | |
856 | V9fsFidOpenState *fs, int datasync) | |
857 | { | |
858 | int fd; | |
859 | ||
860 | if (fid_type == P9_FID_DIR) { | |
861 | fd = dirfd(fs->dir); | |
862 | } else { | |
863 | fd = fs->fd; | |
864 | } | |
865 | ||
866 | if (datasync) { | |
867 | return qemu_fdatasync(fd); | |
868 | } else { | |
869 | return fsync(fd); | |
870 | } | |
871 | } | |
872 | ||
873 | static int proxy_statfs(FsContext *s, V9fsPath *fs_path, struct statfs *stbuf) | |
874 | { | |
b178adc3 MK |
875 | int retval; |
876 | retval = v9fs_request(s->private, T_STATFS, stbuf, "s", fs_path); | |
877 | if (retval < 0) { | |
878 | errno = -retval; | |
879 | return -1; | |
880 | } | |
881 | return retval; | |
4c793dda MK |
882 | } |
883 | ||
884 | static ssize_t proxy_lgetxattr(FsContext *ctx, V9fsPath *fs_path, | |
885 | const char *name, void *value, size_t size) | |
886 | { | |
887 | errno = EOPNOTSUPP; | |
888 | return -1; | |
889 | } | |
890 | ||
891 | static ssize_t proxy_llistxattr(FsContext *ctx, V9fsPath *fs_path, | |
892 | void *value, size_t size) | |
893 | { | |
894 | errno = EOPNOTSUPP; | |
895 | return -1; | |
896 | } | |
897 | ||
898 | static int proxy_lsetxattr(FsContext *ctx, V9fsPath *fs_path, const char *name, | |
899 | void *value, size_t size, int flags) | |
900 | { | |
901 | errno = EOPNOTSUPP; | |
902 | return -1; | |
903 | } | |
904 | ||
905 | static int proxy_lremovexattr(FsContext *ctx, V9fsPath *fs_path, | |
906 | const char *name) | |
907 | { | |
908 | errno = EOPNOTSUPP; | |
909 | return -1; | |
910 | } | |
911 | ||
912 | static int proxy_name_to_path(FsContext *ctx, V9fsPath *dir_path, | |
913 | const char *name, V9fsPath *target) | |
914 | { | |
915 | if (dir_path) { | |
916 | v9fs_string_sprintf((V9fsString *)target, "%s/%s", | |
917 | dir_path->data, name); | |
918 | } else { | |
919 | v9fs_string_sprintf((V9fsString *)target, "%s", name); | |
920 | } | |
921 | /* Bump the size for including terminating NULL */ | |
922 | target->size++; | |
923 | return 0; | |
924 | } | |
925 | ||
926 | static int proxy_renameat(FsContext *ctx, V9fsPath *olddir, | |
927 | const char *old_name, V9fsPath *newdir, | |
928 | const char *new_name) | |
929 | { | |
930 | int ret; | |
931 | V9fsString old_full_name, new_full_name; | |
932 | ||
933 | v9fs_string_init(&old_full_name); | |
934 | v9fs_string_init(&new_full_name); | |
935 | ||
936 | v9fs_string_sprintf(&old_full_name, "%s/%s", olddir->data, old_name); | |
937 | v9fs_string_sprintf(&new_full_name, "%s/%s", newdir->data, new_name); | |
938 | ||
939 | ret = proxy_rename(ctx, old_full_name.data, new_full_name.data); | |
940 | v9fs_string_free(&old_full_name); | |
941 | v9fs_string_free(&new_full_name); | |
942 | return ret; | |
943 | } | |
944 | ||
945 | static int proxy_unlinkat(FsContext *ctx, V9fsPath *dir, | |
946 | const char *name, int flags) | |
947 | { | |
948 | int ret; | |
949 | V9fsString fullname; | |
950 | v9fs_string_init(&fullname); | |
951 | ||
952 | v9fs_string_sprintf(&fullname, "%s/%s", dir->data, name); | |
953 | ret = proxy_remove(ctx, fullname.data); | |
954 | v9fs_string_free(&fullname); | |
955 | ||
956 | return ret; | |
957 | } | |
958 | ||
959 | static int proxy_parse_opts(QemuOpts *opts, struct FsDriverEntry *fs) | |
960 | { | |
961 | const char *sock_fd = qemu_opt_get(opts, "sock_fd"); | |
962 | ||
963 | if (sock_fd) { | |
964 | fprintf(stderr, "sock_fd option not specified\n"); | |
965 | return -1; | |
966 | } | |
967 | fs->path = g_strdup(sock_fd); | |
968 | return 0; | |
969 | } | |
970 | ||
971 | static int proxy_init(FsContext *ctx) | |
972 | { | |
973 | V9fsProxy *proxy = g_malloc(sizeof(V9fsProxy)); | |
974 | int sock_id; | |
975 | ||
976 | sock_id = atoi(ctx->fs_root); | |
977 | if (sock_id < 0) { | |
978 | fprintf(stderr, "socket descriptor not initialized\n"); | |
979 | return -1; | |
980 | } | |
981 | g_free(ctx->fs_root); | |
982 | ||
39f8c32c MK |
983 | proxy->in_iovec.iov_base = g_malloc(PROXY_MAX_IO_SZ + PROXY_HDR_SZ); |
984 | proxy->in_iovec.iov_len = PROXY_MAX_IO_SZ + PROXY_HDR_SZ; | |
985 | proxy->out_iovec.iov_base = g_malloc(PROXY_MAX_IO_SZ + PROXY_HDR_SZ); | |
986 | proxy->out_iovec.iov_len = PROXY_MAX_IO_SZ + PROXY_HDR_SZ; | |
987 | ||
4c793dda MK |
988 | ctx->private = proxy; |
989 | proxy->sockfd = sock_id; | |
990 | qemu_mutex_init(&proxy->mutex); | |
991 | ||
992 | ctx->export_flags |= V9FS_PATHNAME_FSCONTEXT; | |
993 | return 0; | |
994 | } | |
995 | ||
996 | FileOperations proxy_ops = { | |
997 | .parse_opts = proxy_parse_opts, | |
998 | .init = proxy_init, | |
999 | .lstat = proxy_lstat, | |
1000 | .readlink = proxy_readlink, | |
1001 | .close = proxy_close, | |
1002 | .closedir = proxy_closedir, | |
1003 | .open = proxy_open, | |
1004 | .opendir = proxy_opendir, | |
1005 | .rewinddir = proxy_rewinddir, | |
1006 | .telldir = proxy_telldir, | |
1007 | .readdir_r = proxy_readdir_r, | |
1008 | .seekdir = proxy_seekdir, | |
1009 | .preadv = proxy_preadv, | |
1010 | .pwritev = proxy_pwritev, | |
1011 | .chmod = proxy_chmod, | |
1012 | .mknod = proxy_mknod, | |
1013 | .mkdir = proxy_mkdir, | |
1014 | .fstat = proxy_fstat, | |
1015 | .open2 = proxy_open2, | |
1016 | .symlink = proxy_symlink, | |
1017 | .link = proxy_link, | |
1018 | .truncate = proxy_truncate, | |
1019 | .rename = proxy_rename, | |
1020 | .chown = proxy_chown, | |
1021 | .utimensat = proxy_utimensat, | |
1022 | .remove = proxy_remove, | |
1023 | .fsync = proxy_fsync, | |
1024 | .statfs = proxy_statfs, | |
1025 | .lgetxattr = proxy_lgetxattr, | |
1026 | .llistxattr = proxy_llistxattr, | |
1027 | .lsetxattr = proxy_lsetxattr, | |
1028 | .lremovexattr = proxy_lremovexattr, | |
1029 | .name_to_path = proxy_name_to_path, | |
1030 | .renameat = proxy_renameat, | |
1031 | .unlinkat = proxy_unlinkat, | |
1032 | }; |