perfuse.c revision 1.23 1 1.23 manu /* $NetBSD: perfuse.c,v 1.23 2011/10/30 05:11:37 manu Exp $ */
2 1.1 manu
3 1.1 manu /*-
4 1.12 manu * Copyright (c) 2010-2011 Emmanuel Dreyfus. All rights reserved.
5 1.1 manu *
6 1.1 manu * Redistribution and use in source and binary forms, with or without
7 1.1 manu * modification, are permitted provided that the following conditions
8 1.1 manu * are met:
9 1.1 manu * 1. Redistributions of source code must retain the above copyright
10 1.1 manu * notice, this list of conditions and the following disclaimer.
11 1.1 manu * 2. Redistributions in binary form must reproduce the above copyright
12 1.1 manu * notice, this list of conditions and the following disclaimer in the
13 1.1 manu * documentation and/or other materials provided with the distribution.
14 1.1 manu *
15 1.1 manu * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 manu * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 manu * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 manu * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 manu * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 manu * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 manu * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 manu * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 manu * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 manu * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 manu * POSSIBILITY OF SUCH DAMAGE.
26 1.1 manu */
27 1.1 manu
28 1.1 manu #include <stdio.h>
29 1.1 manu #include <unistd.h>
30 1.1 manu #include <stdlib.h>
31 1.1 manu #include <fcntl.h>
32 1.1 manu #include <string.h>
33 1.1 manu #include <errno.h>
34 1.1 manu #include <puffs.h>
35 1.1 manu #include <sys/types.h>
36 1.19 manu #include <sys/mman.h>
37 1.22 manu #include <sys/resource.h>
38 1.1 manu #include <sys/socket.h>
39 1.16 manu #include <sys/extattr.h>
40 1.1 manu #include <sys/un.h>
41 1.6 manu #include <machine/vmparam.h>
42 1.1 manu
43 1.1 manu #define LIBPERFUSE
44 1.1 manu #include "perfuse.h"
45 1.1 manu #include "perfuse_if.h"
46 1.1 manu #include "perfuse_priv.h"
47 1.1 manu
48 1.1 manu int perfuse_diagflags = 0; /* global used only in DPRINTF/DERR/DWARN */
49 1.12 manu extern char **environ;
50 1.1 manu
51 1.1 manu static struct perfuse_state *init_state(void);
52 1.1 manu static int get_fd(const char *);
53 1.1 manu
54 1.12 manu
55 1.1 manu static struct perfuse_state *
56 1.1 manu init_state(void)
57 1.1 manu {
58 1.1 manu struct perfuse_state *ps;
59 1.12 manu char opts[1024];
60 1.1 manu
61 1.1 manu if ((ps = malloc(sizeof(*ps))) == NULL)
62 1.18 christos DERR(EX_OSERR, "%s: malloc failed", __func__);
63 1.1 manu
64 1.1 manu (void)memset(ps, 0, sizeof(*ps));
65 1.1 manu ps->ps_max_write = UINT_MAX;
66 1.1 manu ps->ps_max_readahead = UINT_MAX;
67 1.1 manu
68 1.12 manu /*
69 1.12 manu * Most of the time, access() is broken because the filesystem
70 1.12 manu * performs the check with root privileges. glusterfs will do that
71 1.12 manu * if the Linux-specific setfsuid() is missing, for instance.
72 1.12 manu */
73 1.12 manu ps->ps_flags |= PS_NO_ACCESS;
74 1.12 manu
75 1.12 manu /*
76 1.12 manu * This is a temporary way to toggle access and creat usage.
77 1.12 manu * It would be nice if that could be provided as mount options,
78 1.12 manu * but that will not be obvious to do.
79 1.12 manu */
80 1.12 manu if (getenv_r("PERFUSE_OPTIONS", opts, sizeof(opts)) != -1) {
81 1.12 manu char *optname;
82 1.12 manu char *last;
83 1.12 manu
84 1.12 manu for ((optname = strtok_r(opts, ",", &last));
85 1.12 manu optname != NULL;
86 1.12 manu (optname = strtok_r(NULL, ",", &last))) {
87 1.12 manu if (strcmp(optname, "enable_access") == 0)
88 1.12 manu ps->ps_flags &= ~PS_NO_ACCESS;
89 1.12 manu
90 1.12 manu if (strcmp(optname, "disable_access") == 0)
91 1.12 manu ps->ps_flags |= PS_NO_ACCESS;
92 1.12 manu
93 1.12 manu if (strcmp(optname, "enable_creat") == 0)
94 1.12 manu ps->ps_flags &= ~PS_NO_CREAT;
95 1.12 manu
96 1.12 manu if (strcmp(optname, "disable_creat") == 0)
97 1.12 manu ps->ps_flags |= PS_NO_CREAT;
98 1.12 manu }
99 1.12 manu }
100 1.12 manu
101 1.12 manu
102 1.1 manu return ps;
103 1.1 manu }
104 1.1 manu
105 1.1 manu
106 1.1 manu static int
107 1.1 manu get_fd(data)
108 1.1 manu const char *data;
109 1.1 manu {
110 1.1 manu char *string;
111 1.1 manu const char fdopt[] = "fd=";
112 1.1 manu char *lastp;
113 1.1 manu char *opt;
114 1.1 manu int fd = -1;
115 1.1 manu
116 1.1 manu if ((string = strdup(data)) == NULL)
117 1.1 manu return -1;
118 1.1 manu
119 1.1 manu for (opt = strtok_r(string, ",", &lastp);
120 1.1 manu opt != NULL;
121 1.1 manu opt = strtok_r(NULL, ",", &lastp)) {
122 1.1 manu if (strncmp(opt, fdopt, strlen(fdopt)) == 0) {
123 1.1 manu fd = atoi(opt + strlen(fdopt));
124 1.1 manu break;
125 1.1 manu }
126 1.1 manu }
127 1.1 manu
128 1.1 manu /*
129 1.1 manu * No file descriptor found
130 1.1 manu */
131 1.1 manu if (fd == -1)
132 1.1 manu errno = EINVAL;
133 1.1 manu
134 1.1 manu free(string);
135 1.1 manu return fd;
136 1.1 manu
137 1.1 manu }
138 1.1 manu
139 1.1 manu int
140 1.1 manu perfuse_open(path, flags, mode)
141 1.1 manu const char *path;
142 1.1 manu int flags;
143 1.1 manu mode_t mode;
144 1.1 manu {
145 1.2 manu int sv[2];
146 1.1 manu struct sockaddr_un sun;
147 1.1 manu struct sockaddr *sa;
148 1.2 manu char progname[] = _PATH_PERFUSED;
149 1.2 manu char minus_i[] = "-i";
150 1.2 manu char fdstr[16];
151 1.2 manu char *const argv[] = { progname, minus_i, fdstr, NULL};
152 1.6 manu uint32_t opt;
153 1.12 manu uint32_t optlen;
154 1.15 manu int sock_type = SOCK_SEQPACKET;
155 1.1 manu
156 1.1 manu if (strcmp(path, _PATH_FUSE) != 0)
157 1.1 manu return open(path, flags, mode);
158 1.1 manu
159 1.15 manu /*
160 1.15 manu * Try SOCK_SEQPACKET then SOCK_DGRAM if unavailable
161 1.15 manu */
162 1.15 manu if ((sv[0] = socket(PF_LOCAL, SOCK_SEQPACKET, 0)) == -1) {
163 1.15 manu sock_type = SOCK_DGRAM;
164 1.15 manu DWARNX("SEQPACKET local sockets unavailable, using less "
165 1.15 manu "reliable DGRAM sockets. Expect file operation hangs.");
166 1.15 manu
167 1.15 manu if ((sv[0] = socket(PF_LOCAL, SOCK_DGRAM, 0)) == -1) {
168 1.1 manu #ifdef PERFUSE_DEBUG
169 1.18 christos DWARN("%s: %d socket failed", __func__, __LINE__);
170 1.1 manu #endif
171 1.15 manu return -1;
172 1.15 manu }
173 1.1 manu }
174 1.1 manu
175 1.6 manu /*
176 1.6 manu * Set a buffer lentgh large enough so that any FUSE packet
177 1.6 manu * will fit.
178 1.6 manu */
179 1.20 christos opt = (uint32_t)FUSE_BUFSIZE;
180 1.12 manu optlen = sizeof(opt);
181 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
182 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
183 1.6 manu
184 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
185 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
186 1.6 manu
187 1.1 manu sa = (struct sockaddr *)(void *)&sun;
188 1.1 manu sun.sun_len = sizeof(sun);
189 1.1 manu sun.sun_family = AF_LOCAL;
190 1.1 manu (void)strcpy(sun.sun_path, path);
191 1.1 manu
192 1.15 manu if (connect(sv[0], sa, (socklen_t)sun.sun_len) == 0)
193 1.2 manu return sv[0];
194 1.2 manu
195 1.2 manu /*
196 1.2 manu * Attempt to run perfused on our own
197 1.2 manu * if it does not run yet; In that case
198 1.2 manu * we will talk using a socketpair
199 1.2 manu * instead of /dev/fuse.
200 1.2 manu */
201 1.15 manu if (socketpair(PF_LOCAL, sock_type, 0, sv) != 0) {
202 1.5 manu DWARN("%s:%d: socketpair failed", __func__, __LINE__);
203 1.1 manu return -1;
204 1.1 manu }
205 1.1 manu
206 1.6 manu /*
207 1.6 manu * Set a buffer lentgh large enough so that any FUSE packet
208 1.6 manu * will fit.
209 1.6 manu */
210 1.20 christos opt = (uint32_t)(4 * FUSE_BUFSIZE);
211 1.12 manu optlen = sizeof(opt);
212 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
213 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
214 1.6 manu
215 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
216 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
217 1.6 manu
218 1.12 manu if (setsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
219 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
220 1.6 manu
221 1.12 manu if (setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
222 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
223 1.6 manu
224 1.6 manu /*
225 1.6 manu * Request peer credentials. This musr be done before first
226 1.6 manu * frame is sent.
227 1.6 manu */
228 1.6 manu opt = 1;
229 1.12 manu optlen = sizeof(opt);
230 1.12 manu if (setsockopt(sv[1], 0, LOCAL_CREDS, &opt, optlen) != 0)
231 1.6 manu DWARN("%s: setsockopt LOCAL_CREDS failed", __func__);
232 1.6 manu
233 1.2 manu (void)sprintf(fdstr, "%d", sv[1]);
234 1.2 manu
235 1.2 manu switch(fork()) {
236 1.2 manu case -1:
237 1.2 manu #ifdef PERFUSE_DEBUG
238 1.5 manu DWARN("%s:%d: fork failed", __func__, __LINE__);
239 1.2 manu #endif
240 1.2 manu return -1;
241 1.2 manu /* NOTREACHED */
242 1.2 manu break;
243 1.2 manu case 0:
244 1.12 manu (void)execve(argv[0], argv, environ);
245 1.2 manu #ifdef PERFUSE_DEBUG
246 1.5 manu DWARN("%s:%d: execve failed", __func__, __LINE__);
247 1.2 manu #endif
248 1.2 manu return -1;
249 1.2 manu /* NOTREACHED */
250 1.2 manu break;
251 1.2 manu default:
252 1.2 manu break;
253 1.2 manu }
254 1.2 manu
255 1.2 manu return sv[0];
256 1.1 manu }
257 1.1 manu
258 1.1 manu int
259 1.1 manu perfuse_mount(source, target, filesystemtype, mountflags, data)
260 1.1 manu const char *source;
261 1.1 manu const char *target;
262 1.1 manu const char *filesystemtype;
263 1.1 manu long mountflags;
264 1.1 manu const void *data;
265 1.1 manu {
266 1.1 manu int s;
267 1.1 manu size_t len;
268 1.6 manu struct perfuse_mount_out *pmo;
269 1.6 manu struct sockaddr_storage ss;
270 1.7 manu struct sockaddr_un *sun;
271 1.6 manu struct sockaddr *sa;
272 1.6 manu socklen_t sa_len;
273 1.6 manu size_t sock_len;
274 1.6 manu char *frame;
275 1.6 manu char *cp;
276 1.1 manu
277 1.1 manu #ifdef PERFUSE_DEBUG
278 1.5 manu if (perfuse_diagflags & PDF_MISC)
279 1.5 manu DPRINTF("%s(\"%s\", \"%s\", \"%s\", 0x%lx, \"%s\")\n",
280 1.5 manu __func__, source, target, filesystemtype,
281 1.5 manu mountflags, (const char *)data);
282 1.1 manu #endif
283 1.1 manu
284 1.1 manu if ((s = get_fd(data)) == -1)
285 1.1 manu return -1;
286 1.1 manu
287 1.6 manu /*
288 1.6 manu * If we are connected to /dev/fuse, we need a second
289 1.6 manu * socket to get replies from perfused.
290 1.6 manu * XXX This socket is not removed at exit time yet
291 1.6 manu */
292 1.6 manu sock_len = 0;
293 1.6 manu sa = (struct sockaddr *)(void *)&ss;
294 1.7 manu sun = (struct sockaddr_un *)(void *)&ss;
295 1.6 manu sa_len = sizeof(ss);
296 1.6 manu if ((getpeername(s, sa, &sa_len) == 0) &&
297 1.6 manu (sa->sa_family = AF_LOCAL) &&
298 1.7 manu (strcmp(sun->sun_path, _PATH_FUSE) == 0)) {
299 1.6 manu
300 1.7 manu sun->sun_len = sizeof(*sun);
301 1.7 manu sun->sun_family = AF_LOCAL;
302 1.7 manu (void)sprintf(sun->sun_path, "%s/%s-%d",
303 1.6 manu _PATH_TMP, getprogname(), getpid());
304 1.6 manu
305 1.7 manu if (bind(s, sa, (socklen_t)sa->sa_len) != 0)
306 1.6 manu DERR(EX_OSERR, "%s:%d bind to \"%s\" failed",
307 1.7 manu __func__, __LINE__, sun->sun_path);
308 1.6 manu
309 1.7 manu sock_len = strlen(sun->sun_path) + 1;
310 1.6 manu }
311 1.6 manu
312 1.6 manu len = sizeof(*pmo);
313 1.6 manu len += source ? (uint32_t)strlen(source) + 1 : 0;
314 1.6 manu len += target ? (uint32_t)strlen(target) + 1 : 0;
315 1.6 manu len += filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
316 1.6 manu len += data ? (uint32_t)strlen(data) + 1 : 0;
317 1.6 manu len += sock_len;
318 1.6 manu
319 1.6 manu if ((frame = malloc(len)) == NULL) {
320 1.1 manu #ifdef PERFUSE_DEBUG
321 1.5 manu if (perfuse_diagflags & PDF_MISC)
322 1.6 manu DWARN("%s:%d malloc failed", __func__, __LINE__);
323 1.1 manu #endif
324 1.1 manu return -1;
325 1.1 manu }
326 1.6 manu
327 1.6 manu pmo = (struct perfuse_mount_out *)(void *)frame;
328 1.12 manu pmo->pmo_len = (uint32_t)len;
329 1.6 manu pmo->pmo_error = 0;
330 1.6 manu pmo->pmo_unique = (uint64_t)-1;
331 1.6 manu (void)strcpy(pmo->pmo_magic, PERFUSE_MOUNT_MAGIC);
332 1.6 manu
333 1.6 manu pmo->pmo_source_len = source ? (uint32_t)strlen(source) + 1 : 0;
334 1.6 manu pmo->pmo_target_len = target ? (uint32_t)strlen(target) + 1: 0;
335 1.6 manu pmo->pmo_filesystemtype_len =
336 1.6 manu filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
337 1.6 manu pmo->pmo_mountflags = (uint32_t)mountflags;
338 1.6 manu pmo->pmo_data_len = data ? (uint32_t)strlen(data) + 1 : 0;
339 1.12 manu pmo->pmo_sock_len = (uint32_t)sock_len;
340 1.1 manu
341 1.6 manu cp = (char *)(void *)(pmo + 1);
342 1.6 manu
343 1.1 manu if (source) {
344 1.6 manu (void)strcpy(cp, source);
345 1.6 manu cp += pmo->pmo_source_len;
346 1.1 manu }
347 1.1 manu
348 1.1 manu if (target) {
349 1.6 manu (void)strcpy(cp, target);
350 1.6 manu cp += pmo->pmo_target_len;
351 1.1 manu }
352 1.6 manu
353 1.1 manu if (filesystemtype) {
354 1.6 manu (void)strcpy(cp, filesystemtype);
355 1.6 manu cp += pmo->pmo_filesystemtype_len;
356 1.1 manu }
357 1.1 manu
358 1.1 manu if (data) {
359 1.6 manu (void)strcpy(cp, data);
360 1.6 manu cp += pmo->pmo_data_len;
361 1.6 manu }
362 1.6 manu
363 1.6 manu if (sock_len != 0) {
364 1.7 manu (void)strcpy(cp, sun->sun_path);
365 1.6 manu cp += pmo->pmo_sock_len;
366 1.6 manu }
367 1.6 manu
368 1.12 manu if (send(s, frame, len, MSG_NOSIGNAL) != (ssize_t)len) {
369 1.1 manu #ifdef PERFUSE_DEBUG
370 1.6 manu DWARN("%s:%d sendto failed", __func__, __LINE__);
371 1.1 manu #endif
372 1.6 manu return -1;
373 1.1 manu }
374 1.1 manu
375 1.1 manu return 0;
376 1.1 manu }
377 1.1 manu
378 1.1 manu
379 1.1 manu uint64_t
380 1.1 manu perfuse_next_unique(pu)
381 1.1 manu struct puffs_usermount *pu;
382 1.1 manu {
383 1.1 manu struct perfuse_state *ps;
384 1.1 manu
385 1.1 manu ps = puffs_getspecific(pu);
386 1.1 manu
387 1.1 manu return ps->ps_unique++;
388 1.1 manu }
389 1.1 manu
390 1.1 manu struct puffs_usermount *
391 1.1 manu perfuse_init(pc, pmi)
392 1.1 manu struct perfuse_callbacks *pc;
393 1.1 manu struct perfuse_mount_info *pmi;
394 1.1 manu {
395 1.1 manu struct perfuse_state *ps;
396 1.1 manu struct puffs_usermount *pu;
397 1.1 manu struct puffs_ops *pops;
398 1.13 manu const char *source = _PATH_PUFFS;
399 1.13 manu char *fstype;
400 1.1 manu unsigned int puffs_flags;
401 1.1 manu struct puffs_node *pn_root;
402 1.1 manu struct puffs_pathobj *po_root;
403 1.22 manu struct rlimit rl;
404 1.22 manu
405 1.22 manu /*
406 1.22 manu * perfused can grow quite large, let assume there's enough ram ...
407 1.22 manu */
408 1.22 manu if (getrlimit(RLIMIT_DATA, &rl) < 0) {
409 1.22 manu DERR(EX_OSERR, "%s: getrlimit failed: %s", __func__,
410 1.22 manu strerror(errno));
411 1.22 manu } else {
412 1.22 manu rl.rlim_cur = rl.rlim_max;
413 1.22 manu if (setrlimit(RLIMIT_DATA, &rl) < 0) {
414 1.22 manu DERR(EX_OSERR, "%s: setrlimit failed: %s", __func__,
415 1.22 manu strerror(errno));
416 1.22 manu }
417 1.22 manu }
418 1.22 manu
419 1.1 manu
420 1.1 manu ps = init_state();
421 1.2 manu ps->ps_owner_uid = pmi->pmi_uid;
422 1.1 manu
423 1.13 manu if (pmi->pmi_source) {
424 1.13 manu if ((ps->ps_source = strdup(pmi->pmi_source)) == NULL)
425 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
426 1.13 manu
427 1.13 manu source = ps->ps_source;
428 1.13 manu }
429 1.13 manu
430 1.13 manu if (pmi->pmi_filesystemtype) {
431 1.13 manu size_t len;
432 1.13 manu
433 1.1 manu ps->ps_filesystemtype = strdup(pmi->pmi_filesystemtype);
434 1.13 manu if (ps->ps_filesystemtype == NULL)
435 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
436 1.13 manu
437 1.13 manu len = sizeof("perfuse|") + strlen(ps->ps_filesystemtype) + 1;
438 1.13 manu if ((fstype = malloc(len)) == NULL)
439 1.18 christos DERR(EX_OSERR, "%s: malloc failed", __func__);
440 1.13 manu
441 1.13 manu (void)sprintf(fstype, "perfuse|%s", ps->ps_filesystemtype);
442 1.13 manu } else {
443 1.13 manu if ((fstype = strdup("perfuse")) == NULL)
444 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
445 1.13 manu }
446 1.13 manu
447 1.13 manu if ((ps->ps_target = strdup(pmi->pmi_target)) == NULL)
448 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
449 1.13 manu
450 1.1 manu ps->ps_mountflags = pmi->pmi_mountflags;
451 1.1 manu
452 1.1 manu /*
453 1.1 manu * Some options are forbidden for non root users
454 1.1 manu */
455 1.2 manu if (ps->ps_owner_uid != 0)
456 1.1 manu ps->ps_mountflags |= MNT_NOSUID|MNT_NODEV;
457 1.1 manu
458 1.1 manu PUFFSOP_INIT(pops);
459 1.1 manu PUFFSOP_SET(pops, perfuse, fs, unmount);
460 1.1 manu PUFFSOP_SET(pops, perfuse, fs, statvfs);
461 1.1 manu PUFFSOP_SET(pops, perfuse, fs, sync);
462 1.1 manu PUFFSOP_SET(pops, perfuse, node, lookup);
463 1.1 manu PUFFSOP_SET(pops, perfuse, node, create);
464 1.1 manu PUFFSOP_SET(pops, perfuse, node, mknod);
465 1.1 manu PUFFSOP_SET(pops, perfuse, node, open);
466 1.1 manu PUFFSOP_SET(pops, perfuse, node, close);
467 1.1 manu PUFFSOP_SET(pops, perfuse, node, access);
468 1.1 manu PUFFSOP_SET(pops, perfuse, node, getattr);
469 1.1 manu PUFFSOP_SET(pops, perfuse, node, setattr);
470 1.1 manu PUFFSOP_SET(pops, perfuse, node, poll);
471 1.1 manu #if 0
472 1.1 manu PUFFSOP_SET(pops, perfuse, node, mmap);
473 1.1 manu #endif
474 1.1 manu PUFFSOP_SET(pops, perfuse, node, fsync);
475 1.1 manu PUFFSOP_SET(pops, perfuse, node, seek);
476 1.1 manu PUFFSOP_SET(pops, perfuse, node, remove);
477 1.1 manu PUFFSOP_SET(pops, perfuse, node, link);
478 1.1 manu PUFFSOP_SET(pops, perfuse, node, rename);
479 1.1 manu PUFFSOP_SET(pops, perfuse, node, mkdir);
480 1.1 manu PUFFSOP_SET(pops, perfuse, node, rmdir);
481 1.1 manu PUFFSOP_SET(pops, perfuse, node, symlink);
482 1.1 manu PUFFSOP_SET(pops, perfuse, node, readdir);
483 1.1 manu PUFFSOP_SET(pops, perfuse, node, readlink);
484 1.1 manu PUFFSOP_SET(pops, perfuse, node, reclaim);
485 1.1 manu PUFFSOP_SET(pops, perfuse, node, inactive);
486 1.1 manu PUFFSOP_SET(pops, perfuse, node, print);
487 1.1 manu PUFFSOP_SET(pops, perfuse, node, advlock);
488 1.1 manu PUFFSOP_SET(pops, perfuse, node, read);
489 1.1 manu PUFFSOP_SET(pops, perfuse, node, write);
490 1.16 manu #ifdef PUFFS_EXTNAMELEN
491 1.16 manu PUFFSOP_SET(pops, perfuse, node, getextattr);
492 1.16 manu PUFFSOP_SET(pops, perfuse, node, setextattr);
493 1.16 manu PUFFSOP_SET(pops, perfuse, node, listextattr);
494 1.16 manu PUFFSOP_SET(pops, perfuse, node, deleteextattr);
495 1.16 manu #endif /* PUFFS_EXTNAMELEN */
496 1.1 manu
497 1.17 manu /*
498 1.17 manu * We used to have PUFFS_KFLAG_WTCACHE here, which uses the
499 1.17 manu * page cache (highly desirable to get mmap(2)), but still sends
500 1.17 manu * all writes to the filesystem. In fact it does not send the
501 1.17 manu * data written, but the pages that contain it.
502 1.17 manu *
503 1.17 manu * There is a nasty bug hidden somewhere, possibly in libpuffs'
504 1.17 manu * VOP_FSYNC, which sends an asynchronous PUFFS_SETATTR that
505 1.17 manu * update file size. When writes are in progress, it will cause
506 1.17 manu * the file to be truncated and we get a zero-filled chunk at the
507 1.17 manu * beginning of a page. Removing PUFFS_KFLAG_WTCACHE fixes that
508 1.17 manu * problem.
509 1.17 manu *
510 1.17 manu * The other consequences are that changes will not be propagated
511 1.17 manu * immediatly to the filesystem, and we get a huge performance gain
512 1.17 manu * because much less requests are sent. A test case for the above
513 1.17 manu * mentioned bug got its execution time slashed by factor 50.
514 1.23 manu *
515 1.23 manu * PUFFS_KFLAG_NOCACHE_NAME is required so that we can see changes
516 1.23 manu * done by other machines in networked filesystems.
517 1.17 manu */
518 1.23 manu puffs_flags = PUFFS_KFLAG_NOCACHE_NAME;
519 1.9 manu
520 1.1 manu if (perfuse_diagflags & PDF_PUFFS)
521 1.1 manu puffs_flags |= PUFFS_FLAG_OPDUMP;
522 1.1 manu
523 1.13 manu if ((pu = puffs_init(pops, source, fstype, ps, puffs_flags)) == NULL)
524 1.18 christos DERR(EX_OSERR, "%s: puffs_init failed", __func__);
525 1.1 manu
526 1.1 manu ps->ps_pu = pu;
527 1.1 manu
528 1.1 manu /*
529 1.1 manu * Setup filesystem root
530 1.1 manu */
531 1.10 manu pn_root = perfuse_new_pn(pu, "", NULL);
532 1.23 manu PERFUSE_NODE_DATA(pn_root)->pnd_nodeid = FUSE_ROOT_ID;
533 1.3 manu PERFUSE_NODE_DATA(pn_root)->pnd_parent = pn_root;
534 1.1 manu puffs_setroot(pu, pn_root);
535 1.1 manu ps->ps_fsid = pn_root->pn_va.va_fsid;
536 1.1 manu
537 1.1 manu po_root = puffs_getrootpathobj(pu);
538 1.1 manu if ((po_root->po_path = strdup("/")) == NULL)
539 1.1 manu DERRX(EX_OSERR, "perfuse_mount_start() failed");
540 1.1 manu
541 1.1 manu po_root->po_len = 1;
542 1.1 manu puffs_path_buildhash(pu, po_root);
543 1.1 manu
544 1.1 manu puffs_vattr_null(&pn_root->pn_va);
545 1.1 manu pn_root->pn_va.va_type = VDIR;
546 1.1 manu pn_root->pn_va.va_mode = 0755;
547 1.23 manu pn_root->pn_va.va_fileid = FUSE_ROOT_ID;
548 1.1 manu
549 1.1 manu ps->ps_root = pn_root;
550 1.1 manu
551 1.1 manu /*
552 1.1 manu * Callbacks
553 1.1 manu */
554 1.1 manu ps->ps_new_msg = pc->pc_new_msg;
555 1.1 manu ps->ps_xchg_msg = pc->pc_xchg_msg;
556 1.1 manu ps->ps_destroy_msg = pc->pc_destroy_msg;
557 1.1 manu ps->ps_get_inhdr = pc->pc_get_inhdr;
558 1.1 manu ps->ps_get_inpayload = pc->pc_get_inpayload;
559 1.1 manu ps->ps_get_outhdr = pc->pc_get_outhdr;
560 1.1 manu ps->ps_get_outpayload = pc->pc_get_outpayload;
561 1.15 manu ps->ps_umount = pc->pc_umount;
562 1.1 manu
563 1.1 manu return pu;
564 1.1 manu }
565 1.1 manu
566 1.1 manu void
567 1.1 manu perfuse_setspecific(pu, priv)
568 1.1 manu struct puffs_usermount *pu;
569 1.1 manu void *priv;
570 1.1 manu {
571 1.1 manu struct perfuse_state *ps;
572 1.1 manu
573 1.1 manu ps = puffs_getspecific(pu);
574 1.1 manu ps->ps_private = priv;
575 1.1 manu
576 1.1 manu return;
577 1.1 manu }
578 1.1 manu
579 1.1 manu void *
580 1.1 manu perfuse_getspecific(pu)
581 1.1 manu struct puffs_usermount *pu;
582 1.1 manu {
583 1.1 manu struct perfuse_state *ps;
584 1.1 manu
585 1.1 manu ps = puffs_getspecific(pu);
586 1.1 manu
587 1.1 manu return ps->ps_private;
588 1.1 manu }
589 1.1 manu
590 1.1 manu int
591 1.1 manu perfuse_inloop(pu)
592 1.1 manu struct puffs_usermount *pu;
593 1.1 manu {
594 1.1 manu struct perfuse_state *ps;
595 1.1 manu
596 1.1 manu ps = puffs_getspecific(pu);
597 1.1 manu
598 1.1 manu return ps->ps_flags & PS_INLOOP;
599 1.1 manu }
600 1.1 manu
601 1.1 manu int
602 1.1 manu perfuse_mainloop(pu)
603 1.1 manu struct puffs_usermount *pu;
604 1.1 manu {
605 1.1 manu struct perfuse_state *ps;
606 1.1 manu
607 1.1 manu ps = puffs_getspecific(pu);
608 1.1 manu
609 1.1 manu ps->ps_flags |= PS_INLOOP;
610 1.15 manu if (puffs_mainloop(ps->ps_pu) != 0) {
611 1.18 christos DERR(EX_OSERR, "%s: failed", __func__);
612 1.15 manu return -1;
613 1.15 manu }
614 1.1 manu
615 1.15 manu /*
616 1.15 manu * Normal exit after unmount
617 1.15 manu */
618 1.15 manu return 0;
619 1.1 manu }
620 1.1 manu
621 1.1 manu /* ARGSUSED0 */
622 1.1 manu uint64_t
623 1.23 manu perfuse_get_nodeid(pu, opc)
624 1.1 manu struct puffs_usermount *pu;
625 1.1 manu puffs_cookie_t opc;
626 1.1 manu {
627 1.23 manu return PERFUSE_NODE_DATA(opc)->pnd_nodeid;
628 1.1 manu }
629 1.2 manu
630 1.2 manu int
631 1.2 manu perfuse_unmount(pu)
632 1.2 manu struct puffs_usermount *pu;
633 1.2 manu {
634 1.2 manu struct perfuse_state *ps;
635 1.2 manu
636 1.2 manu ps = puffs_getspecific(pu);
637 1.2 manu
638 1.2 manu return unmount(ps->ps_target, MNT_FORCE);
639 1.2 manu }
640