shithub: riscv

ref: d73c67660bd2573787e99c300806c2f1394a8b52
dir: /sys/src/cmd/sshfs.c/

View raw version
#include <u.h>
#include <libc.h>
#include <fcall.h>
#include <thread.h>
#include <9p.h>
#include <libsec.h>

int readonly;
int debug;
char *root = ".";
#define dprint(...) if(debug) fprint(2, __VA_ARGS__)
#pragma	varargck	type	"Σ"	int

enum {
	MAXPACK = 34000,
	MAXWRITE = 32768,
	MAXATTRIB = 64,
	VERSION = 3,
	MAXREQID = 32,
	HASH = 64
};

enum {
	SSH_FXP_INIT = 1,
	SSH_FXP_VERSION = 2,
	SSH_FXP_OPEN = 3,
	SSH_FXP_CLOSE = 4,
	SSH_FXP_READ = 5,
	SSH_FXP_WRITE = 6,
	SSH_FXP_LSTAT = 7,
	SSH_FXP_FSTAT = 8,
	SSH_FXP_SETSTAT = 9,
	SSH_FXP_FSETSTAT = 10,
	SSH_FXP_OPENDIR = 11,
	SSH_FXP_READDIR = 12,
	SSH_FXP_REMOVE = 13,
	SSH_FXP_MKDIR = 14,
	SSH_FXP_RMDIR = 15,
	SSH_FXP_REALPATH = 16,
	SSH_FXP_STAT = 17,
	SSH_FXP_RENAME = 18,
	SSH_FXP_READLINK = 19,
	SSH_FXP_SYMLINK = 20,
	SSH_FXP_STATUS = 101,
	SSH_FXP_HANDLE = 102,
	SSH_FXP_DATA = 103,
	SSH_FXP_NAME = 104,
	SSH_FXP_ATTRS = 105,
	SSH_FXP_EXTENDED = 200,
	SSH_FXP_EXTENDED_REPLY = 201,
	
	SSH_FXF_READ = 0x00000001,
	SSH_FXF_WRITE = 0x00000002,
	SSH_FXF_APPEND = 0x00000004,
	SSH_FXF_CREAT = 0x00000008,
	SSH_FXF_TRUNC = 0x00000010,
	SSH_FXF_EXCL = 0x00000020,
	SSH_FILEXFER_ATTR_SIZE = 0x00000001,
	SSH_FILEXFER_ATTR_UIDGID = 0x00000002,
	SSH_FILEXFER_ATTR_PERMISSIONS = 0x00000004,
	SSH_FILEXFER_ATTR_ACMODTIME = 0x00000008,
	SSH_FILEXFER_ATTR_EXTENDED = 0x80000000,

	SSH_FX_OK = 0,
	SSH_FX_EOF = 1,
	SSH_FX_NO_SUCH_FILE = 2,
	SSH_FX_PERMISSION_DENIED = 3,
	SSH_FX_FAILURE = 4,
	SSH_FX_BAD_MESSAGE = 5,
	SSH_FX_NO_CONNECTION = 6,
	SSH_FX_CONNECTION_LOST = 7,
	SSH_FX_OP_UNSUPPORTED = 8,
};

char *errors[] = {
	[SSH_FX_OK] "success",
	[SSH_FX_EOF] "end of file",
	[SSH_FX_NO_SUCH_FILE] "file does not exist",
	[SSH_FX_PERMISSION_DENIED] "permission denied",
	[SSH_FX_FAILURE] "failure",
	[SSH_FX_BAD_MESSAGE] "bad message",
	[SSH_FX_NO_CONNECTION] "no connection",
	[SSH_FX_CONNECTION_LOST] "connection lost",
	[SSH_FX_OP_UNSUPPORTED] "unsupported operation",
};

typedef struct SFid SFid;
typedef struct SReq SReq;
typedef struct IDEnt IDEnt;

struct SFid {
	RWLock;
	char *fn;
	uchar *hand;
	int handn;
	Qid qid;
	int dirreads;
	Dir *dirent;
	int ndirent, dirpos;
	uchar direof;
};

struct SReq {
	Req *req;
	SFid *closefid;
	int reqid;
	SReq *next;
};

struct IDEnt {
	char *name;
	int id;
	IDEnt *next;
};
IDEnt *uidtab[HASH], *gidtab[HASH];

int rdfd, wrfd;
SReq *sreqrd[MAXREQID];
QLock sreqidlock;
Rendez sreqidrend = {.l = &sreqidlock};

SReq *sreqwr, **sreqlast = &sreqwr;
QLock sreqwrlock;
Rendez writerend = {.l = &sreqwrlock};

#define PUT4(p, u) (p)[0] = (u)>>24, (p)[1] = (u)>>16, (p)[2] = (u)>>8, (p)[3] = (u)
#define GET4(p)	((u32int)(p)[3] | (u32int)(p)[2]<<8 | (u32int)(p)[1]<<16 | (u32int)(p)[0]<<24)

int
fxpfmt(Fmt *f)
{
	int n;
	
	n = va_arg(f->args, int);
	switch(n){
	case SSH_FXP_INIT: fmtstrcpy(f, "SSH_FXP_INIT"); break;
	case SSH_FXP_VERSION: fmtstrcpy(f, "SSH_FXP_VERSION"); break;
	case SSH_FXP_OPEN: fmtstrcpy(f, "SSH_FXP_OPEN"); break;
	case SSH_FXP_CLOSE: fmtstrcpy(f, "SSH_FXP_CLOSE"); break;
	case SSH_FXP_READ: fmtstrcpy(f, "SSH_FXP_READ"); break;
	case SSH_FXP_WRITE: fmtstrcpy(f, "SSH_FXP_WRITE"); break;
	case SSH_FXP_LSTAT: fmtstrcpy(f, "SSH_FXP_LSTAT"); break;
	case SSH_FXP_FSTAT: fmtstrcpy(f, "SSH_FXP_FSTAT"); break;
	case SSH_FXP_SETSTAT: fmtstrcpy(f, "SSH_FXP_SETSTAT"); break;
	case SSH_FXP_FSETSTAT: fmtstrcpy(f, "SSH_FXP_FSETSTAT"); break;
	case SSH_FXP_OPENDIR: fmtstrcpy(f, "SSH_FXP_OPENDIR"); break;
	case SSH_FXP_READDIR: fmtstrcpy(f, "SSH_FXP_READDIR"); break;
	case SSH_FXP_REMOVE: fmtstrcpy(f, "SSH_FXP_REMOVE"); break;
	case SSH_FXP_MKDIR: fmtstrcpy(f, "SSH_FXP_MKDIR"); break;
	case SSH_FXP_RMDIR: fmtstrcpy(f, "SSH_FXP_RMDIR"); break;
	case SSH_FXP_REALPATH: fmtstrcpy(f, "SSH_FXP_REALPATH"); break;
	case SSH_FXP_STAT: fmtstrcpy(f, "SSH_FXP_STAT"); break;
	case SSH_FXP_RENAME: fmtstrcpy(f, "SSH_FXP_RENAME"); break;
	case SSH_FXP_READLINK: fmtstrcpy(f, "SSH_FXP_READLINK"); break;
	case SSH_FXP_SYMLINK: fmtstrcpy(f, "SSH_FXP_SYMLINK"); break;
	case SSH_FXP_STATUS: fmtstrcpy(f, "SSH_FXP_STATUS"); break;
	case SSH_FXP_HANDLE: fmtstrcpy(f, "SSH_FXP_HANDLE"); break;
	case SSH_FXP_DATA: fmtstrcpy(f, "SSH_FXP_DATA"); break;
	case SSH_FXP_NAME: fmtstrcpy(f, "SSH_FXP_NAME"); break;
	case SSH_FXP_ATTRS: fmtstrcpy(f, "SSH_FXP_ATTRS"); break;
	case SSH_FXP_EXTENDED: fmtstrcpy(f, "SSH_FXP_EXTENDED"); break;
	case SSH_FXP_EXTENDED_REPLY: fmtstrcpy(f, "SSH_FXP_EXTENDED_REPLY");
	default: fmtprint(f, "%d", n);
	}
	return 0;
}

char *
idlookup(IDEnt **tab, int id)
{
	IDEnt *p;
	
	for(p = tab[(ulong)id % HASH]; p != nil; p = p->next)
		if(p->id == id)
			return estrdup9p(p->name);
	return smprint("%d", id);
}

int
namelookup(IDEnt **tab, char *name)
{
	IDEnt *p;
	int i;
	char *q;
	
	for(i = 0; i < HASH; i++)
		for(p = tab[i]; p != nil; p = p->next)
			if(strcmp(p->name, name) == 0)
				return p->id;
	i = strtol(name, &q, 10);
	if(*q == 0) return i;
	werrstr("unknown %s '%s'", tab == uidtab ? "user" : "group", name);
	return -1;
}

int
vpack(uchar *p, int n, char *fmt, va_list a)
{
	uchar *p0 = p, *e = p+n;
	u32int u;
	u64int v;
	void *s;
	int c;

	for(;;){
		switch(c = *fmt++){
		case '\0':
			return p - p0;
		case '_':
			if(++p > e) goto err;
			break;
		case '.':
			*va_arg(a, void**) = p;
			break;
		case 'b':
			if(p >= e) goto err;
			*p++ = va_arg(a, int);
			break;
		case '[':
		case 's':
			s = va_arg(a, void*);
			u = va_arg(a, int);
			if(c == 's'){
				if(p+4 > e) goto err;
				PUT4(p, u), p += 4;
			}
			if(u > e-p) goto err;
			memmove(p, s, u);
			p += u;
			break;
		case 'u':
			u = va_arg(a, int);
			if(p+4 > e) goto err;
			PUT4(p, u), p += 4;
			break;
		case 'v':
			v = va_arg(a, vlong);
			if(p+8 > e) goto err;
			u = v>>32; PUT4(p, u), p += 4;
			u = v; PUT4(p, u), p += 4;
			break;
		}
	}
err:
	return -1;
}

int
vunpack(uchar *p, int n, char *fmt, va_list a)
{
	uchar *p0 = p, *e = p+n;
	u32int u;
	u64int v;
	void *s;

	for(;;){
		switch(*fmt++){
		case '\0':
			return p - p0;
		case '_':
			if(++p > e) goto err;
			break;
		case '.':
			*va_arg(a, void**) = p;
			break;
		case 'b':
			if(p >= e) goto err;
			*va_arg(a, int*) = *p++;
			break;
		case 's':
			if(p+4 > e) goto err;
			u = GET4(p), p += 4;
			if(u > e-p) goto err;
			*va_arg(a, void**) = p;
			*va_arg(a, int*) = u;
			p += u;
			break;
		case '[':
			s = va_arg(a, void*);
			u = va_arg(a, int);
			if(u > e-p) goto err;
			memmove(s, p, u);
			p += u;
			break;
		case 'u':
			if(p+4 > e) goto err;
			u = GET4(p);
			*va_arg(a, int*) = u;
			p += 4;
			break;
		case 'v':
			if(p+8 > e) goto err;
			v = (u64int)GET4(p) << 32;
			v |= (u32int)GET4(p+4);
			*va_arg(a, vlong*) = v;
			p += 8;
			break;
		}
	}
err:
	return -1;
}

int
pack(uchar *p, int n, char *fmt, ...)
{
	va_list a;
	va_start(a, fmt);
	n = vpack(p, n, fmt, a);
	va_end(a);
	return n;
}
int
unpack(uchar *p, int n, char *fmt, ...)
{
	va_list a;
	va_start(a, fmt);
	n = vunpack(p, n, fmt, a);
	va_end(a);
	return n;
}

void
sendpkt(char *fmt, ...)
{
	static uchar buf[MAXPACK];
	int n;
	va_list a;

	va_start(a, fmt);
	n = vpack(buf+4, sizeof(buf)-4, fmt, a);
	va_end(a);
	if(n < 0) {
		sysfatal("sendpkt: message too big");
		return;
	}
	PUT4(buf, n);
	n += 4;

	dprint("SFTP --> %Σ\n", (int)buf[4]);
	if(write(wrfd, buf, n) != n)
		sysfatal("write: %r");
}

static uchar rxpkt[MAXPACK];
static int rxlen;

int
recvpkt(void)
{
	static uchar rxbuf[MAXPACK];
	static int rxfill;
	int rc;
	
	while(rxfill < 4 || rxfill < (rxlen = GET4(rxbuf) + 4) && rxlen <= MAXPACK){
		rc = read(rdfd, rxbuf + rxfill, MAXPACK - rxfill);
		if(rc < 0) sysfatal("read: %r");
		if(rc == 0) sysfatal("read: eof");
		rxfill += rc;
	}
	if(rxlen > MAXPACK) sysfatal("received garbage");
	memmove(rxpkt, rxbuf + 4, rxlen - 4);
	memmove(rxbuf, rxbuf + rxlen, rxfill - rxlen);
	rxfill -= rxlen;
	rxlen -= 4;
	dprint("SFTP <-- %Σ\n", (int)rxpkt[0]);
	return rxpkt[0];
}

void
freedir1(Dir *d)
{
	free(d->name);
	free(d->uid);
	free(d->gid);
	free(d->muid);
}

void
freedir(SFid *s)
{
	int i;

	for(i = 0; i < s->ndirent; i++)
		freedir1(&s->dirent[i]);
	free(s->dirent);
	s->dirent = nil;
	s->ndirent = 0;
	s->dirpos = 0;
}


void
putsfid(SFid *s)
{
	if(s == nil) return;
	free(s->fn);
	free(s->hand);
	freedir(s);
	free(s);
}

void
putsreq(SReq *s)
{
	if(s == nil) return;
	if(s->reqid != -1){
		qlock(&sreqidlock);
		sreqrd[s->reqid] = nil;
		rwakeup(&sreqidrend);
		qunlock(&sreqidlock);
	}
	putsfid(s->closefid);
	free(s);
}

void
submitsreq(SReq *s)
{
	qlock(&sreqwrlock);
	*sreqlast = s;
	sreqlast = &s->next;
	rwakeup(&writerend);
	qunlock(&sreqwrlock);
}


void
submitreq(Req *r)
{
	SReq *s;
	
	s = emalloc9p(sizeof(SReq));
	s->reqid = -1;
	s->req = r;
	submitsreq(s);
}

char *
pathcat(char *p, char *c)
{
	return cleanname(smprint("%s/%s", p, c));
}

char *
parentdir(char *p)
{
	return pathcat(p, "..");
}

char *
finalelem(char *p)
{
	char *q;
	
	q = strrchr(p, '/');
	if(q == nil) return estrdup9p(p);
	return estrdup9p(q+1);
}

u64int
qidcalc(char *c)
{
	uchar dig[SHA1dlen];

	sha1((uchar *) c, strlen(c), dig, nil);
	return dig[0] | dig[1] << 8 | dig[2] << 16 | dig[3] << 24 | (uvlong)dig[4] << 32 | (uvlong)dig[5] << 40 | (uvlong)dig[6] << 48 | (uvlong)dig[7] << 56;
}

void
walkprocess(Req *r, char *e)
{
	char *p;
	SFid *sf;
	
	sf = r->newfid->aux;
	if(e != nil){
		r->ofcall.nwqid--;
		if(r->ofcall.nwqid == 0){
			respond(r, e);
			return;
		}
		p = r->aux;
		r->aux = parentdir(p);
		free(p);
		submitreq(r);
	}else{
		assert(r->ofcall.nwqid > 0);
		wlock(sf);
		free(sf->fn);
		sf->fn = r->aux;
		r->aux = nil;
		sf->qid = r->ofcall.wqid[r->ofcall.nwqid - 1];
		wunlock(sf);
		respond(r, nil);
	}
}

int
attrib2dir(uchar *p0, uchar *ep, Dir *d)
{
	uchar *p;
	int i, rc, extn, extvn;
	u32int flags, uid, gid, perm, next;
	uchar *exts,  *extvs;
	
	p = p0;
	if(p + 4 > ep) return -1;
	flags = GET4(p), p += 4;
	if((flags & SSH_FILEXFER_ATTR_SIZE) != 0){
		rc = unpack(p, ep - p, "v", &d->length); if(rc < 0) return -1; p += rc;
	}
	if((flags & SSH_FILEXFER_ATTR_UIDGID) != 0){
		rc = unpack(p, ep - p, "uu", &uid, &gid); if(rc < 0) return -1; p += rc;
		d->uid = idlookup(uidtab, uid);
		d->gid = idlookup(gidtab, gid);
	}else{
		d->uid = estrdup9p("sshfs");
		d->gid = estrdup9p("sshfs");
	}
	d->muid = estrdup9p(d->uid);
	if((flags & SSH_FILEXFER_ATTR_PERMISSIONS) != 0){
		rc = unpack(p, ep - p, "u", &perm); if(rc < 0) return -1; p += rc;
		d->mode = perm & 0777;
		if((perm & 0170000) == 0040000) d->mode |= DMDIR;
	}
	d->qid.type = d->mode >> 24;
	if((flags & SSH_FILEXFER_ATTR_ACMODTIME) != 0){
		rc = unpack(p, ep - p, "uu", &d->atime, &d->mtime); if(rc < 0) return -1; p += rc;
		d->qid.vers = d->mtime;
	}
	if((flags & SSH_FILEXFER_ATTR_EXTENDED) != 0){
		rc = unpack(p, ep - p, "u", &next); if(rc < 0) return -1; p += rc;
		for(i = 0; i < next; i++){
			rc = unpack(p, ep - p, "ss", &exts, &extn, &extvs, &extvn); if(rc < 0) return -1; p += rc;
			exts[extn] = extvs[extvn] = 0;
		}
	}
	return p - p0;
}

int
dir2attrib(Dir *d, uchar **rp)
{
	int rc;
	uchar *r, *p, *e;
	u32int fl;
	int uid, gid;

	werrstr("phase error");
	r = emalloc9p(MAXATTRIB);
	e = r + MAXATTRIB;
	fl = 0;
	p = r + 4;
	if(d->length != (uvlong)-1){
		fl |= SSH_FILEXFER_ATTR_SIZE;
		rc = pack(p, e - p, "v", d->length); if(rc < 0) return -1; p += rc;
	}
	if(d->uid != nil && *d->uid != 0 || d->gid != nil && *d->gid != 0){
		/* FIXME: sending -1 for "don't change" works with openssh, but violates the spec */
		if(d->uid != nil && *d->uid != 0){
			uid = namelookup(uidtab, d->uid);
			if(uid == -1)
				return -1;
		}else
			uid = -1;
		if(d->gid != nil && *d->gid != 0){
			gid = namelookup(gidtab, d->gid);
			if(gid == -1)
				return -1;
		}else
			gid = -1;
		fl |= SSH_FILEXFER_ATTR_UIDGID;
		rc = pack(p, e - p, "uu", uid, gid); if(rc < 0) return -1; p += rc;
	}
	if(d->mode != (ulong)-1){
		fl |= SSH_FILEXFER_ATTR_PERMISSIONS;
		rc = pack(p, e - p, "u", d->mode); if(rc < 0) return -1; p += rc;
	}
	if(d->atime != (ulong)-1 || d->mtime != (ulong)-1){
		/* FIXME: see above */
		fl |= SSH_FILEXFER_ATTR_ACMODTIME;
		rc = pack(p, e - p, "uu", d->atime, d->mtime); if(rc < 0) return -1; p += rc;
	}
	PUT4(r, fl);
	*rp = r;
	return p - r;
}

int
attrfixupqid(Qid *qid)
{
	u32int flags;
	uchar *p;

	if(unpack(rxpkt, rxlen, "_____u", &flags) < 0) return -1;
	p = rxpkt + 9;
	if(flags & SSH_FILEXFER_ATTR_SIZE) p += 8;
	if(flags & SSH_FILEXFER_ATTR_UIDGID) p += 8;
	if(flags & SSH_FILEXFER_ATTR_PERMISSIONS){
		if(p + 4 > rxpkt + rxlen) return -1;
		if((GET4(p) & 0170000) != 0040000) qid->type = 0;
		else qid->type = QTDIR;
		p += 4;
	}
	if(flags & SSH_FILEXFER_ATTR_ACMODTIME){
		if(p + 8 > rxpkt + rxlen) return -1;
		p += 4;
		qid->vers = GET4(p);	/* mtime for qid.vers */
	}
	return 0;
}

int
parsedir(SFid *sf)
{
	int i, rc;
	Dir *d;
	u32int c;
	uchar *p, *ep;
	char *fn, *ln;
	int fns, lns;
	char *s;

	if(unpack(rxpkt, rxlen, "_____u", &c) < 0) return -1;
	wlock(sf);
	freedir(sf);
	sf->dirent = emalloc9p(c * sizeof(Dir));
	d = sf->dirent;
	p = rxpkt + 9;
	ep = rxpkt + rxlen;
	for(i = 0; i < c; i++){
		memset(d, 0, sizeof(Dir));
		rc = unpack(p, ep - p, "ss", &fn, &fns, &ln, &lns); if(rc < 0) goto err; p += rc;
		rc = attrib2dir(p, ep, d); if(rc < 0) goto err; p += rc;
		if(fn[0] == '.' && (fns == 1 || fns == 2 && fn[1] == '.')){
			freedir1(d);
			continue;
		}
		d->name = emalloc9p(fns + 1);
		memcpy(d->name, fn, fns);
		d->name[fns] = 0;
		s = pathcat(sf->fn, d->name);
		d->qid.path = qidcalc(s);
		free(s);
		sf->ndirent++;
		d++;
	}
	wunlock(sf);
	return 0;
err:
	freedir1(d);
	wunlock(sf);
	return -1;
}


void
readprocess(Req *r)
{
	int i;
	uchar *p, *ep;
	uint rv;
	SFid *sf;
	
	sf = r->fid->aux;
	wlock(sf);
	if(sf->direof){
		wunlock(sf);
		respond(r, nil);
		return;
	}
	i = sf->dirpos;
	p = (uchar*)r->ofcall.data + r->ofcall.count;
	ep = (uchar*)r->ofcall.data + r->ifcall.count;
	rv = ep - p;
	while(p < ep){
		if(i >= sf->ndirent)
			break;
		rv = convD2M(&sf->dirent[i], p, ep-p);
		if(rv <= BIT16SZ)
			break;
		p += rv;
		i++;
	}
	sf->dirpos = i;
	if(i >= sf->ndirent)
		freedir(sf);
	wunlock(sf);
	r->ofcall.count = p - (uchar*)r->ofcall.data;
	if(rv <= BIT16SZ)
		respond(r, nil);
	else
		submitreq(r);
}

void
sshfsread(Req *r)
{
	SFid *sf;

	if((r->fid->qid.type & QTDIR) == 0){
		submitreq(r);
		return;
	}
	sf = r->fid->aux;	
	if(r->ifcall.offset == 0){
		wlock(sf);
		freedir(sf);
		if(sf->dirreads > 0){
			r->aux = (void*)-1;
			submitreq(r);
			wunlock(sf);
			return;
		}
		wunlock(sf);
	}
	readprocess(r);
}

void
sshfsattach(Req *r)
{
	SFid *sf;

	if(r->aux == nil){
		sf = emalloc9p(sizeof(SFid));
		if(r->ifcall.aname != nil)
			switch(*r->ifcall.aname){
			case '~':
				switch(r->ifcall.aname[1]){
				case 0: sf->fn = estrdup9p("."); break;
				case '/': sf->fn = estrdup9p(r->ifcall.aname + 2); break;
				default:
					free(sf);
					respond(r, "invalid attach name");
					return;
				}
				break;
			case '/':
				sf->fn = estrdup9p(r->ifcall.aname);
				break;
			case 0:
				sf->fn = estrdup9p(root);
				break;
			default:
				sf->fn = pathcat(root, r->ifcall.aname);
			}
		else
			sf->fn = estrdup9p(root);
		r->fid->aux = sf;
		submitreq(r);
	}else{
		sf = r->fid->aux;
		sf->qid = (Qid){qidcalc(sf->fn), 0, QTDIR};
		r->ofcall.qid = sf->qid;
		r->fid->qid = sf->qid;
		respond(r, nil);
	}
}

void
sendproc(void *)
{
	SReq *r;
	SFid *sf;
	int i;
	int x, y;
	char *s, *t;

	threadsetname("send");

	for(;;){
		qlock(&sreqwrlock);
		while(sreqwr == nil)
			rsleep(&writerend);
		r = sreqwr;
		sreqwr = r->next;
		if(sreqwr == nil) sreqlast = &sreqwr;
		qunlock(&sreqwrlock);
		
		qlock(&sreqidlock);
	idagain:
		for(i = 0; i < MAXREQID; i++)
			if(sreqrd[i] == nil){
				sreqrd[i] = r;
				r->reqid = i;
				break;
			}
		if(i == MAXREQID){
			rsleep(&sreqidrend);
			goto idagain;
		}
		qunlock(&sreqidlock);

		if(r->closefid != nil){
			sendpkt("bus", SSH_FXP_CLOSE, r->reqid, r->closefid->hand, r->closefid->handn);
			continue;
		}
		if(r->req == nil)
			sysfatal("nil request in queue");

		sf = r->req->fid != nil ? r->req->fid->aux : nil;
		switch(r->req->ifcall.type){
		case Tattach:
			sendpkt("bus", SSH_FXP_STAT, r->reqid, sf->fn, strlen(sf->fn));
			break;
		case Twalk:
			sendpkt("bus", SSH_FXP_STAT, r->reqid, r->req->aux, strlen(r->req->aux));
			break;
		case Topen:
			rlock(sf);
			if((r->req->ofcall.qid.type & QTDIR) != 0)
				sendpkt("bus", SSH_FXP_OPENDIR, r->reqid, sf->fn, strlen(sf->fn));
			else{
				x = r->req->ifcall.mode;
				y = 0;
				switch(x & 3){
				case OREAD: y = SSH_FXF_READ; break;
				case OWRITE: y = SSH_FXF_WRITE; break;
				case ORDWR: y = SSH_FXF_READ | SSH_FXF_WRITE; break;
				}
				if(readonly && (y & SSH_FXF_WRITE) != 0){
					respond(r->req, "mounted read-only");
					runlock(sf);
					putsreq(r);
					break;
				}
				if((x & OTRUNC) != 0)
					y |= SSH_FXF_TRUNC;
				sendpkt("busuu", SSH_FXP_OPEN, r->reqid, sf->fn, strlen(sf->fn), y, 0);
			}
			runlock(sf);
			break;
		case Tcreate:
			rlock(sf);
			s = pathcat(sf->fn, r->req->ifcall.name);
			runlock(sf);
			if((r->req->ifcall.perm & DMDIR) != 0){
				if(r->req->aux == nil){
					sendpkt("busuu", SSH_FXP_MKDIR, r->reqid, s, strlen(s),
						SSH_FILEXFER_ATTR_PERMISSIONS, r->req->ifcall.perm & 0777);
					r->req->aux = (void*)-1;
				}else{
					sendpkt("bus", SSH_FXP_OPENDIR, r->reqid, s, strlen(s));
					r->req->aux = (void*)-2;
				}
				free(s);
				break;
			}
			x = r->req->ifcall.mode;
			y = SSH_FXF_CREAT | SSH_FXF_EXCL;
			switch(x & 3){
			case OREAD: y |= SSH_FXF_READ; break;
			case OWRITE: y |= SSH_FXF_WRITE; break;
			case ORDWR: y |= SSH_FXF_READ | SSH_FXF_WRITE; break;
			}
			sendpkt("busuuu", SSH_FXP_OPEN, r->reqid, s, strlen(s), y,
				SSH_FILEXFER_ATTR_PERMISSIONS, r->req->ifcall.perm & 0777);
			free(s);
			break;
		case Tread:
			if((r->req->fid->qid.type & QTDIR) != 0){
				wlock(sf);
				if(r->req->aux == (void*)-1){
					sendpkt("bus", SSH_FXP_CLOSE, r->reqid, sf->hand, sf->handn);
					free(sf->hand);
					sf->hand = nil;
					sf->handn = 0;
					sf->direof = 0;
					sf->dirreads = 0;
				}else if(r->req->aux == (void*)-2){
					sendpkt("bus", SSH_FXP_OPENDIR, r->reqid, sf->fn, strlen(sf->fn));
				}else{
					sf->dirreads++;
					sendpkt("bus", SSH_FXP_READDIR, r->reqid, sf->hand, sf->handn);
				}
				wunlock(sf);
			}else{
				rlock(sf);
				sendpkt("busvuu", SSH_FXP_READ, r->reqid, sf->hand, sf->handn,
					r->req->ifcall.offset, r->req->ifcall.count);
				runlock(sf);
			}
			break;
		case Twrite:
			x = r->req->ifcall.count - r->req->ofcall.count;
			if(x >= MAXWRITE) x = MAXWRITE;
			rlock(sf);
			sendpkt("busvs", SSH_FXP_WRITE, r->reqid, sf->hand, sf->handn,
				r->req->ifcall.offset + r->req->ofcall.count,
				r->req->ifcall.data + r->req->ofcall.count,
				x);
			runlock(sf);
			r->req->ofcall.offset = x;
			break;
		case Tstat:
			rlock(sf);
			r->req->d.name = finalelem(sf->fn);
			r->req->d.qid = sf->qid;
			if(sf->handn > 0 && (sf->qid.type & QTDIR) == 0)
				sendpkt("bus", SSH_FXP_FSTAT, r->reqid, sf->hand, sf->handn);
			else
				sendpkt("bus", SSH_FXP_STAT, r->reqid, sf->fn, strlen(sf->fn));
			runlock(sf);
			break;
		case Twstat:
			if(r->req->aux == (void *) -1){
				rlock(sf);
				s = parentdir(sf->fn);
				t = pathcat(s, r->req->d.name);
				free(s);
				r->req->aux = t;
				sendpkt("buss", SSH_FXP_RENAME, r->reqid, sf->fn, strlen(sf->fn), t, strlen(t));
				runlock(sf);
				break;
			}
			x = dir2attrib(&r->req->d, (uchar **) &s);
			if(x < 0){
				responderror(r->req);
				putsreq(r);
				break;
			}
			rlock(sf);
			if(sf->handn > 0)
				sendpkt("bus[", SSH_FXP_FSETSTAT, r->reqid, sf->hand, sf->handn, s, x);
			else
				sendpkt("bus[", SSH_FXP_SETSTAT, r->reqid, sf->fn, strlen(sf->fn), s, x);
			runlock(sf);
			free(s);
			break;
		case Tremove:
			rlock(sf);
			if((sf->qid.type & QTDIR) != 0)
				sendpkt("bus", SSH_FXP_RMDIR, r->reqid, sf->fn, strlen(sf->fn));
			else
				sendpkt("bus", SSH_FXP_REMOVE, r->reqid, sf->fn, strlen(sf->fn));
			runlock(sf);
			break;
		default:
			fprint(2, "sendproc: unimplemented 9p request %F in queue\n", &r->req->ifcall);
			respond(r->req, "phase error");
			putsreq(r);
		}
	}
}

void
recvproc(void *)
{
	static char ebuf[256];

	SReq *r;
	SFid *sf;
	int t, id;
	u32int code;
	char *msg, *lang, *hand, *s;
	int msgn, langn, handn;
	int okresp;
	char *e;
	
	threadsetname("recv");
	
	for(;;){
		e = "phase error";
		switch(t = recvpkt()){
		case SSH_FXP_STATUS:
		case SSH_FXP_HANDLE:
		case SSH_FXP_DATA:
		case SSH_FXP_NAME:
		case SSH_FXP_ATTRS:
			break;
		default:
			fprint(2, "sshfs: received unexpected packet of type %Σ\n", t);
			continue;
		}
		id = GET4(rxpkt + 1);
		if(id >= MAXREQID){
			fprint(2, "sshfs: received %Σ response with id out of range, %d > %d\n", t, id, MAXREQID);
			continue;
		}
		qlock(&sreqidlock);
		r = sreqrd[id];
		if(r != nil){
			sreqrd[id] = nil;
			r->reqid = -1;
			rwakeup(&sreqidrend);
		}
		qunlock(&sreqidlock);
		if(r == nil){
			fprint(2, "sshfs: received %Σ response to non-existent request (req id = %d)\n", t, id);
			continue;
		}
		if(r->closefid != nil){
			putsreq(r);
			continue;
		}
		if(r->req == nil)
			sysfatal("recvproc: r->req == nil");

		sf = r->req->fid != nil ? r->req->fid->aux : nil;
		okresp = rxlen >= 9 && t == SSH_FXP_STATUS && GET4(rxpkt+5) == SSH_FX_OK;
		switch(r->req->ifcall.type){
		case Tattach:
			if(t != SSH_FXP_ATTRS) goto common;
			if(attrfixupqid(&r->req->ofcall.qid) < 0)
				goto garbage;
			r->req->aux = (void*)-1;
			if((r->req->ofcall.qid.type & QTDIR) == 0)
				respond(r->req, "not a directory");
			else
				sshfsattach(r->req);
			break;
		case Twalk:
			if(t != SSH_FXP_ATTRS) goto common;
			if(r->req->ofcall.nwqid <= 0
			|| attrfixupqid(&r->req->ofcall.wqid[r->req->ofcall.nwqid - 1]) < 0)
				goto garbage;
			walkprocess(r->req, nil);
			break;
		case Tcreate:
			if(okresp && r->req->aux == (void*)-1){
				submitreq(r->req);
				break;
			}
			/* wet floor */
		case Topen: opendir:
			if(t != SSH_FXP_HANDLE) goto common;
			if(unpack(rxpkt, rxlen, "_____s", &hand, &handn) < 0) goto garbage;
			wlock(sf);
			sf->handn = handn;
			sf->hand = emalloc9p(sf->handn);
			memcpy(sf->hand, hand, sf->handn);
			if(r->req->ifcall.type == Tcreate){
				s = sf->fn;
				sf->fn = pathcat(s, r->req->ifcall.name);
				free(s);
				sf->qid = (Qid){qidcalc(sf->fn), 0, (r->req->ifcall.perm & DMDIR) != 0 ? QTDIR : 0};
				r->req->ofcall.qid = sf->qid;
				r->req->fid->qid = sf->qid;
			}
			wunlock(sf);
			if(r->req->ifcall.type == Tread){
				r->req->aux = nil;
				readprocess(r->req);
			}else
				respond(r->req, nil);
			break;
		case Tread:
			if((r->req->fid->qid.type & QTDIR) != 0){
				if(r->req->aux == (void*)-1){
					if(t != SSH_FXP_STATUS) goto common;
					/* reopen even if close failed */
					r->req->aux = (void*)-2;
					submitreq(r->req);
				}else if(r->req->aux == (void*)-2)
					goto opendir;
				else{
					if(t != SSH_FXP_NAME) goto common;
					if(parsedir(sf) < 0) goto garbage;
					readprocess(r->req);
				}
				break;
			}
			if(t != SSH_FXP_DATA) goto common;
			if(unpack(rxpkt, rxlen, "_____s", &msg, &msgn) < 0) goto garbage;
			if(msgn > r->req->ifcall.count) msgn = r->req->ifcall.count;
			r->req->ofcall.count = msgn;
			memcpy(r->req->ofcall.data, msg, msgn);
			respond(r->req, nil);
			break;
		case Twrite:
			if(t != SSH_FXP_STATUS) goto common;
			if(okresp){
				r->req->ofcall.count += r->req->ofcall.offset;
				if(r->req->ofcall.count == r->req->ifcall.count)
					respond(r->req, nil);
				else
					submitreq(r->req);
				break;
			}
			if(r->req->ofcall.count == 0) goto common;
			respond(r->req, nil);
			break;
		case Tstat:
			if(t != SSH_FXP_ATTRS) goto common;
			if(attrib2dir(rxpkt + 5, rxpkt + rxlen, &r->req->d) < 0) goto garbage;
			respond(r->req, nil);
			break;
		case Twstat:
			if(!okresp) goto common;
			if(!r->req->d.name[0]){
				respond(r->req, nil);
				break;
			}
			if(r->req->aux == nil){
				r->req->aux = (void *) -1;
				submitreq(r->req);
			}else{
				wlock(sf);
				free(sf->fn);
				sf->fn = r->req->aux;
				wunlock(sf);
				respond(r->req, nil);
			}
			break;
		case Tremove:
			goto common;
		default:
			fprint(2, "sendproc: unimplemented 9p request %F in queue\n", &r->req->ifcall);
			respond(r->req, "phase error");
		}
		putsreq(r);
		continue;
		
	common:
		switch(t){
		case SSH_FXP_STATUS:
			if(unpack(rxpkt, rxlen, "_____uss", &code, &msg, &msgn, &lang, &langn) < 0){
	garbage:
				fprint(2, "sshfs: garbled packet in response to 9p request %F\n", &r->req->ifcall);
				break;
			}
			if(code == SSH_FX_OK)
				e = nil;
			else if(code == SSH_FX_EOF && r->req->ifcall.type == Tread){
				if((r->req->fid->qid.type & QTDIR) != 0){
					wlock(sf);
					sf->direof = 1;
					wunlock(sf);
					readprocess(r->req);
					putsreq(r);
					continue;
				}
				r->req->ofcall.count = 0;
				e = nil;
			}else if(msgn > 0){
				e = msg;
				e[msgn] = 0;
			}else if(code < nelem(errors))
				e = errors[code];
			else{
				snprint(ebuf, sizeof(ebuf), "error code %d", code);
				e = ebuf;
			}
			break;
		default:
			fprint(2, "sshfs: received unexpected packet %Σ for 9p request %F\n", t, &r->req->ifcall);
		}
		if(r->req->ifcall.type == Twalk)
			walkprocess(r->req, e);
		else
			respond(r->req, e);
		putsreq(r);
		continue;
	}
}

void
sshfswalk(Req *r)
{
	SFid *s, *t;
	char *p, *q;
	int i;

	if(r->fid != r->newfid){
		r->newfid->qid = r->fid->qid;
		s = r->fid->aux;
		t = emalloc9p(sizeof(SFid));
		t->fn = estrdup9p(s->fn);
		t->qid = s->qid;
		r->newfid->aux = t;
	}else
		t = r->fid->aux;
	if(r->ifcall.nwname == 0){
		respond(r, nil);
		return;
	}
	p = estrdup9p(t->fn);
	for(i = 0; i < r->ifcall.nwname; i++){
		q = pathcat(p, r->ifcall.wname[i]);
		free(p);
		p = q;
		r->ofcall.wqid[i] = (Qid){qidcalc(p), 0, QTDIR};
	}
	r->ofcall.nwqid = r->ifcall.nwname;
	r->aux = p;
	submitreq(r);
}

void
sshfsdestroyfid(Fid *f)
{
	SFid *sf;
	SReq *sr;

	sf = f->aux;
	if(sf == nil)
		return;
	if(sf->hand != nil){
		sr = emalloc9p(sizeof(SReq));
		sr->reqid = -1;
		sr->closefid = sf;
		submitsreq(sr);
	}else
		putsfid(sf);
}

void
sshfsdestroyreq(Req *r)
{
	if(r->ifcall.type == Twalk)
		free(r->aux);
}

void
sshfsstart(Srv *)
{
	proccreate(sendproc, nil, mainstacksize);
	proccreate(recvproc, nil, mainstacksize);
}

void
sshfsend(Srv *)
{
	dprint("sshfs: ending\n");
	threadexitsall(nil);
}

Srv sshfssrv = {
	.start sshfsstart,
	.attach sshfsattach,
	.walk sshfswalk,
	.open submitreq,
	.create submitreq,
	.read sshfsread,
	.write submitreq,
	.stat submitreq,
	.wstat submitreq,
	.remove submitreq,
	.destroyfid sshfsdestroyfid,
	.destroyreq sshfsdestroyreq,
	.end sshfsend,
};

char *
readfile(char *fn)
{
	char *hand, *dat;
	int handn, datn;
	u32int code;
	char *p;
	int off;
	
	if(fn == nil) return nil;
	sendpkt("busuu", SSH_FXP_OPEN, 0, fn, strlen(fn), SSH_FXF_READ, 0);
	if(recvpkt() != SSH_FXP_HANDLE) return nil;
	if(unpack(rxpkt, rxlen, "_____s", &dat, &handn) < 0) return nil;
	hand = emalloc9p(handn);
	memcpy(hand, dat, handn);
	off = 0;
	p = nil;
	for(;;){
		sendpkt("busvu", SSH_FXP_READ, 0, hand, handn, (uvlong)off, MAXWRITE);
		switch(recvpkt()){
		case SSH_FXP_STATUS:
			if(unpack(rxpkt, rxlen, "_____u", &code) < 0) goto err;
			if(code == SSH_FX_EOF) goto out;
		default:
			goto err;
		case SSH_FXP_DATA:
			if(unpack(rxpkt, rxlen, "_____s", &dat, &datn) < 0) goto err;
			break;
		}
		p = erealloc9p(p, off + datn + 1);
		memcpy(p + off, dat, datn);
		off += datn;
		p[off] = 0;
	}
err:
	p = nil;
out:
	sendpkt("bus", SSH_FXP_CLOSE, 0, hand, handn);
	free(hand);
	recvpkt();
	return p;
}

void
passwdparse(IDEnt **tab, char *s)
{
	IDEnt *e, **b;
	char *p, *n;
	int id;

	if(s == nil)
		return;
	for(p = s;;){
		n = p;
		p = strpbrk(p, ":\n"); if(p == nil) break; if(*p != ':'){ p++; continue; }
		*p = 0;
		p = strpbrk(p+1, ":\n");
		p = strpbrk(p, ":\n"); if(p == nil) break; if(*p != ':'){ p++; continue; }
		id = strtol(p+1, &p, 10);
		p = strchr(p, '\n');
		if(p == nil) break;
		p++;
		e = emalloc9p(sizeof(IDEnt));
		e->name = estrdup9p(n);
		e->id = id;
		b = &tab[((ulong)e->id) % HASH];
		e->next = *b;
		*b = e;
	}
	free(s);
}

int pfd[2];
int sshargc;
char **sshargv;

void
startssh(void *)
{
	char *f;

	close(pfd[0]);
	dup(pfd[1], 0);
	dup(pfd[1], 1);
	close(pfd[1]);
	if(strncmp(sshargv[0], "./", 2) != 0)
		f = smprint("/bin/%s", sshargv[0]);
	else
		f = sshargv[0];
	procexec(nil, f, sshargv);
	sysfatal("exec: %r");
}

void
usage(void)
{
	static char *common = "[-abdRUG] [-s service] [-m mtpt] [-u uidfile] [-g gidfile]";
	fprint(2, "usage: %s %s [-- ssh-options] [user@]host\n", argv0, common);
	fprint(2, "       %s %s -c cmdline\n", argv0, common);
	fprint(2, "       %s %s -p\n", argv0, common);
	exits("usage");
}

void
threadmain(int argc, char **argv)
{
	u32int x;
	static int pflag, cflag;
	static char *svc, *mtpt;
	static int mflag;
	static char *uidfile, *gidfile;
	
	fmtinstall(L'Σ', fxpfmt);
	
	mtpt = "/n/ssh";
	uidfile = "/etc/passwd";
	gidfile = "/etc/group";
	ARGBEGIN{
	case 'R': readonly++; break;
	case 'd': debug++; chatty9p++; break;
	case 'p': pflag++; break;
	case 'c': cflag++; break;
	case 's': svc = EARGF(usage()); break;
	case 'a': mflag |= MAFTER; break;
	case 'b': mflag |= MBEFORE; break;
	case 'm': mtpt = EARGF(usage()); break;
	case 'M': mtpt = nil; break;
	case 'u': uidfile = EARGF(usage()); break;
	case 'U': uidfile = nil; break;
	case 'g': gidfile = EARGF(usage()); break;
	case 'G': gidfile = nil; break;
	case 'r': root = EARGF(usage()); break;
	default: usage();
	}ARGEND;
	
	if(readonly){
		sshfssrv.create = nil;
		sshfssrv.write = nil;
		sshfssrv.wstat = nil;
		sshfssrv.remove = nil;
	}
	
	if(pflag){
		rdfd = 0;
		wrfd = 1;
	}else{
		if(argc == 0) usage();
		if(cflag){
			sshargc = argc;
			sshargv = argv;
		}else{
			sshargc = argc + 2;
			sshargv = emalloc9p(sizeof(char *) * (sshargc + 1));
			sshargv[0] = "ssh";
			memcpy(sshargv + 1, argv, argc * sizeof(char *));
			sshargv[sshargc - 1] = "#sftp";
		}
		pipe(pfd);
		rdfd = wrfd = pfd[0];
		procrfork(startssh, nil, mainstacksize, RFFDG|RFNOTEG|RFNAMEG);
		close(pfd[1]);
	}

	sendpkt("bu", SSH_FXP_INIT, VERSION);
	if(recvpkt() != SSH_FXP_VERSION || unpack(rxpkt, rxlen, "_u", &x) < 0) sysfatal("received garbage");
	if(x != VERSION) sysfatal("server replied with incompatible version %d", x);
	
	passwdparse(uidtab, readfile(uidfile));
	passwdparse(gidtab, readfile(gidfile));
	
	threadpostmountsrv(&sshfssrv, svc, mtpt, MCREATE | mflag);
}