perfuse.c revision 1.24 1 1.24 manu /* $NetBSD: perfuse.c,v 1.24 2011/12/28 17:33:53 manu Exp $ */
2 1.1 manu
3 1.1 manu /*-
4 1.12 manu * Copyright (c) 2010-2011 Emmanuel Dreyfus. All rights reserved.
5 1.1 manu *
6 1.1 manu * Redistribution and use in source and binary forms, with or without
7 1.1 manu * modification, are permitted provided that the following conditions
8 1.1 manu * are met:
9 1.1 manu * 1. Redistributions of source code must retain the above copyright
10 1.1 manu * notice, this list of conditions and the following disclaimer.
11 1.1 manu * 2. Redistributions in binary form must reproduce the above copyright
12 1.1 manu * notice, this list of conditions and the following disclaimer in the
13 1.1 manu * documentation and/or other materials provided with the distribution.
14 1.1 manu *
15 1.1 manu * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 manu * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 manu * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 manu * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 manu * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 manu * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 manu * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 manu * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 manu * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 manu * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 manu * POSSIBILITY OF SUCH DAMAGE.
26 1.1 manu */
27 1.1 manu
28 1.1 manu #include <stdio.h>
29 1.1 manu #include <unistd.h>
30 1.1 manu #include <stdlib.h>
31 1.1 manu #include <fcntl.h>
32 1.1 manu #include <string.h>
33 1.1 manu #include <errno.h>
34 1.1 manu #include <puffs.h>
35 1.1 manu #include <sys/types.h>
36 1.19 manu #include <sys/mman.h>
37 1.22 manu #include <sys/resource.h>
38 1.1 manu #include <sys/socket.h>
39 1.16 manu #include <sys/extattr.h>
40 1.1 manu #include <sys/un.h>
41 1.6 manu #include <machine/vmparam.h>
42 1.1 manu
43 1.1 manu #define LIBPERFUSE
44 1.1 manu #include "perfuse.h"
45 1.1 manu #include "perfuse_if.h"
46 1.1 manu #include "perfuse_priv.h"
47 1.1 manu
48 1.1 manu int perfuse_diagflags = 0; /* global used only in DPRINTF/DERR/DWARN */
49 1.12 manu extern char **environ;
50 1.1 manu
51 1.1 manu static struct perfuse_state *init_state(void);
52 1.1 manu static int get_fd(const char *);
53 1.1 manu
54 1.12 manu
55 1.1 manu static struct perfuse_state *
56 1.1 manu init_state(void)
57 1.1 manu {
58 1.1 manu struct perfuse_state *ps;
59 1.12 manu char opts[1024];
60 1.1 manu
61 1.1 manu if ((ps = malloc(sizeof(*ps))) == NULL)
62 1.18 christos DERR(EX_OSERR, "%s: malloc failed", __func__);
63 1.1 manu
64 1.1 manu (void)memset(ps, 0, sizeof(*ps));
65 1.1 manu ps->ps_max_write = UINT_MAX;
66 1.1 manu ps->ps_max_readahead = UINT_MAX;
67 1.24 manu TAILQ_INIT(&ps->ps_trace);
68 1.1 manu
69 1.12 manu /*
70 1.12 manu * Most of the time, access() is broken because the filesystem
71 1.12 manu * performs the check with root privileges. glusterfs will do that
72 1.12 manu * if the Linux-specific setfsuid() is missing, for instance.
73 1.12 manu */
74 1.12 manu ps->ps_flags |= PS_NO_ACCESS;
75 1.12 manu
76 1.12 manu /*
77 1.12 manu * This is a temporary way to toggle access and creat usage.
78 1.12 manu * It would be nice if that could be provided as mount options,
79 1.12 manu * but that will not be obvious to do.
80 1.12 manu */
81 1.12 manu if (getenv_r("PERFUSE_OPTIONS", opts, sizeof(opts)) != -1) {
82 1.12 manu char *optname;
83 1.12 manu char *last;
84 1.12 manu
85 1.12 manu for ((optname = strtok_r(opts, ",", &last));
86 1.12 manu optname != NULL;
87 1.12 manu (optname = strtok_r(NULL, ",", &last))) {
88 1.12 manu if (strcmp(optname, "enable_access") == 0)
89 1.12 manu ps->ps_flags &= ~PS_NO_ACCESS;
90 1.12 manu
91 1.12 manu if (strcmp(optname, "disable_access") == 0)
92 1.12 manu ps->ps_flags |= PS_NO_ACCESS;
93 1.12 manu
94 1.12 manu if (strcmp(optname, "enable_creat") == 0)
95 1.12 manu ps->ps_flags &= ~PS_NO_CREAT;
96 1.12 manu
97 1.12 manu if (strcmp(optname, "disable_creat") == 0)
98 1.12 manu ps->ps_flags |= PS_NO_CREAT;
99 1.12 manu }
100 1.12 manu }
101 1.12 manu
102 1.12 manu
103 1.1 manu return ps;
104 1.1 manu }
105 1.1 manu
106 1.1 manu
107 1.1 manu static int
108 1.1 manu get_fd(data)
109 1.1 manu const char *data;
110 1.1 manu {
111 1.1 manu char *string;
112 1.1 manu const char fdopt[] = "fd=";
113 1.1 manu char *lastp;
114 1.1 manu char *opt;
115 1.1 manu int fd = -1;
116 1.1 manu
117 1.1 manu if ((string = strdup(data)) == NULL)
118 1.1 manu return -1;
119 1.1 manu
120 1.1 manu for (opt = strtok_r(string, ",", &lastp);
121 1.1 manu opt != NULL;
122 1.1 manu opt = strtok_r(NULL, ",", &lastp)) {
123 1.1 manu if (strncmp(opt, fdopt, strlen(fdopt)) == 0) {
124 1.1 manu fd = atoi(opt + strlen(fdopt));
125 1.1 manu break;
126 1.1 manu }
127 1.1 manu }
128 1.1 manu
129 1.1 manu /*
130 1.1 manu * No file descriptor found
131 1.1 manu */
132 1.1 manu if (fd == -1)
133 1.1 manu errno = EINVAL;
134 1.1 manu
135 1.1 manu free(string);
136 1.1 manu return fd;
137 1.1 manu
138 1.1 manu }
139 1.1 manu
140 1.1 manu int
141 1.1 manu perfuse_open(path, flags, mode)
142 1.1 manu const char *path;
143 1.1 manu int flags;
144 1.1 manu mode_t mode;
145 1.1 manu {
146 1.2 manu int sv[2];
147 1.1 manu struct sockaddr_un sun;
148 1.1 manu struct sockaddr *sa;
149 1.2 manu char progname[] = _PATH_PERFUSED;
150 1.2 manu char minus_i[] = "-i";
151 1.2 manu char fdstr[16];
152 1.2 manu char *const argv[] = { progname, minus_i, fdstr, NULL};
153 1.6 manu uint32_t opt;
154 1.12 manu uint32_t optlen;
155 1.15 manu int sock_type = SOCK_SEQPACKET;
156 1.1 manu
157 1.1 manu if (strcmp(path, _PATH_FUSE) != 0)
158 1.1 manu return open(path, flags, mode);
159 1.1 manu
160 1.15 manu /*
161 1.15 manu * Try SOCK_SEQPACKET then SOCK_DGRAM if unavailable
162 1.15 manu */
163 1.15 manu if ((sv[0] = socket(PF_LOCAL, SOCK_SEQPACKET, 0)) == -1) {
164 1.15 manu sock_type = SOCK_DGRAM;
165 1.15 manu DWARNX("SEQPACKET local sockets unavailable, using less "
166 1.15 manu "reliable DGRAM sockets. Expect file operation hangs.");
167 1.15 manu
168 1.15 manu if ((sv[0] = socket(PF_LOCAL, SOCK_DGRAM, 0)) == -1) {
169 1.1 manu #ifdef PERFUSE_DEBUG
170 1.18 christos DWARN("%s: %d socket failed", __func__, __LINE__);
171 1.1 manu #endif
172 1.15 manu return -1;
173 1.15 manu }
174 1.1 manu }
175 1.1 manu
176 1.6 manu /*
177 1.6 manu * Set a buffer lentgh large enough so that any FUSE packet
178 1.6 manu * will fit.
179 1.6 manu */
180 1.20 christos opt = (uint32_t)FUSE_BUFSIZE;
181 1.12 manu optlen = sizeof(opt);
182 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
183 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
184 1.6 manu
185 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
186 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
187 1.6 manu
188 1.1 manu sa = (struct sockaddr *)(void *)&sun;
189 1.1 manu sun.sun_len = sizeof(sun);
190 1.1 manu sun.sun_family = AF_LOCAL;
191 1.1 manu (void)strcpy(sun.sun_path, path);
192 1.1 manu
193 1.15 manu if (connect(sv[0], sa, (socklen_t)sun.sun_len) == 0)
194 1.2 manu return sv[0];
195 1.2 manu
196 1.2 manu /*
197 1.2 manu * Attempt to run perfused on our own
198 1.2 manu * if it does not run yet; In that case
199 1.2 manu * we will talk using a socketpair
200 1.2 manu * instead of /dev/fuse.
201 1.2 manu */
202 1.15 manu if (socketpair(PF_LOCAL, sock_type, 0, sv) != 0) {
203 1.5 manu DWARN("%s:%d: socketpair failed", __func__, __LINE__);
204 1.1 manu return -1;
205 1.1 manu }
206 1.1 manu
207 1.6 manu /*
208 1.6 manu * Set a buffer lentgh large enough so that any FUSE packet
209 1.6 manu * will fit.
210 1.6 manu */
211 1.20 christos opt = (uint32_t)(4 * FUSE_BUFSIZE);
212 1.12 manu optlen = sizeof(opt);
213 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
214 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
215 1.6 manu
216 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
217 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
218 1.6 manu
219 1.12 manu if (setsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
220 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
221 1.6 manu
222 1.12 manu if (setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
223 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
224 1.6 manu
225 1.6 manu /*
226 1.6 manu * Request peer credentials. This musr be done before first
227 1.6 manu * frame is sent.
228 1.6 manu */
229 1.6 manu opt = 1;
230 1.12 manu optlen = sizeof(opt);
231 1.12 manu if (setsockopt(sv[1], 0, LOCAL_CREDS, &opt, optlen) != 0)
232 1.6 manu DWARN("%s: setsockopt LOCAL_CREDS failed", __func__);
233 1.6 manu
234 1.2 manu (void)sprintf(fdstr, "%d", sv[1]);
235 1.2 manu
236 1.2 manu switch(fork()) {
237 1.2 manu case -1:
238 1.2 manu #ifdef PERFUSE_DEBUG
239 1.5 manu DWARN("%s:%d: fork failed", __func__, __LINE__);
240 1.2 manu #endif
241 1.2 manu return -1;
242 1.2 manu /* NOTREACHED */
243 1.2 manu break;
244 1.2 manu case 0:
245 1.12 manu (void)execve(argv[0], argv, environ);
246 1.2 manu #ifdef PERFUSE_DEBUG
247 1.5 manu DWARN("%s:%d: execve failed", __func__, __LINE__);
248 1.2 manu #endif
249 1.2 manu return -1;
250 1.2 manu /* NOTREACHED */
251 1.2 manu break;
252 1.2 manu default:
253 1.2 manu break;
254 1.2 manu }
255 1.2 manu
256 1.2 manu return sv[0];
257 1.1 manu }
258 1.1 manu
259 1.1 manu int
260 1.1 manu perfuse_mount(source, target, filesystemtype, mountflags, data)
261 1.1 manu const char *source;
262 1.1 manu const char *target;
263 1.1 manu const char *filesystemtype;
264 1.1 manu long mountflags;
265 1.1 manu const void *data;
266 1.1 manu {
267 1.1 manu int s;
268 1.1 manu size_t len;
269 1.6 manu struct perfuse_mount_out *pmo;
270 1.6 manu struct sockaddr_storage ss;
271 1.7 manu struct sockaddr_un *sun;
272 1.6 manu struct sockaddr *sa;
273 1.6 manu socklen_t sa_len;
274 1.6 manu size_t sock_len;
275 1.6 manu char *frame;
276 1.6 manu char *cp;
277 1.1 manu
278 1.1 manu #ifdef PERFUSE_DEBUG
279 1.5 manu if (perfuse_diagflags & PDF_MISC)
280 1.5 manu DPRINTF("%s(\"%s\", \"%s\", \"%s\", 0x%lx, \"%s\")\n",
281 1.5 manu __func__, source, target, filesystemtype,
282 1.5 manu mountflags, (const char *)data);
283 1.1 manu #endif
284 1.1 manu
285 1.1 manu if ((s = get_fd(data)) == -1)
286 1.1 manu return -1;
287 1.1 manu
288 1.6 manu /*
289 1.6 manu * If we are connected to /dev/fuse, we need a second
290 1.6 manu * socket to get replies from perfused.
291 1.6 manu * XXX This socket is not removed at exit time yet
292 1.6 manu */
293 1.6 manu sock_len = 0;
294 1.6 manu sa = (struct sockaddr *)(void *)&ss;
295 1.7 manu sun = (struct sockaddr_un *)(void *)&ss;
296 1.6 manu sa_len = sizeof(ss);
297 1.6 manu if ((getpeername(s, sa, &sa_len) == 0) &&
298 1.6 manu (sa->sa_family = AF_LOCAL) &&
299 1.7 manu (strcmp(sun->sun_path, _PATH_FUSE) == 0)) {
300 1.6 manu
301 1.7 manu sun->sun_len = sizeof(*sun);
302 1.7 manu sun->sun_family = AF_LOCAL;
303 1.7 manu (void)sprintf(sun->sun_path, "%s/%s-%d",
304 1.6 manu _PATH_TMP, getprogname(), getpid());
305 1.6 manu
306 1.7 manu if (bind(s, sa, (socklen_t)sa->sa_len) != 0)
307 1.6 manu DERR(EX_OSERR, "%s:%d bind to \"%s\" failed",
308 1.7 manu __func__, __LINE__, sun->sun_path);
309 1.6 manu
310 1.7 manu sock_len = strlen(sun->sun_path) + 1;
311 1.6 manu }
312 1.6 manu
313 1.6 manu len = sizeof(*pmo);
314 1.6 manu len += source ? (uint32_t)strlen(source) + 1 : 0;
315 1.6 manu len += target ? (uint32_t)strlen(target) + 1 : 0;
316 1.6 manu len += filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
317 1.6 manu len += data ? (uint32_t)strlen(data) + 1 : 0;
318 1.6 manu len += sock_len;
319 1.6 manu
320 1.6 manu if ((frame = malloc(len)) == NULL) {
321 1.1 manu #ifdef PERFUSE_DEBUG
322 1.5 manu if (perfuse_diagflags & PDF_MISC)
323 1.6 manu DWARN("%s:%d malloc failed", __func__, __LINE__);
324 1.1 manu #endif
325 1.1 manu return -1;
326 1.1 manu }
327 1.6 manu
328 1.6 manu pmo = (struct perfuse_mount_out *)(void *)frame;
329 1.12 manu pmo->pmo_len = (uint32_t)len;
330 1.6 manu pmo->pmo_error = 0;
331 1.6 manu pmo->pmo_unique = (uint64_t)-1;
332 1.6 manu (void)strcpy(pmo->pmo_magic, PERFUSE_MOUNT_MAGIC);
333 1.6 manu
334 1.6 manu pmo->pmo_source_len = source ? (uint32_t)strlen(source) + 1 : 0;
335 1.6 manu pmo->pmo_target_len = target ? (uint32_t)strlen(target) + 1: 0;
336 1.6 manu pmo->pmo_filesystemtype_len =
337 1.6 manu filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
338 1.6 manu pmo->pmo_mountflags = (uint32_t)mountflags;
339 1.6 manu pmo->pmo_data_len = data ? (uint32_t)strlen(data) + 1 : 0;
340 1.12 manu pmo->pmo_sock_len = (uint32_t)sock_len;
341 1.1 manu
342 1.6 manu cp = (char *)(void *)(pmo + 1);
343 1.6 manu
344 1.1 manu if (source) {
345 1.6 manu (void)strcpy(cp, source);
346 1.6 manu cp += pmo->pmo_source_len;
347 1.1 manu }
348 1.1 manu
349 1.1 manu if (target) {
350 1.6 manu (void)strcpy(cp, target);
351 1.6 manu cp += pmo->pmo_target_len;
352 1.1 manu }
353 1.6 manu
354 1.1 manu if (filesystemtype) {
355 1.6 manu (void)strcpy(cp, filesystemtype);
356 1.6 manu cp += pmo->pmo_filesystemtype_len;
357 1.1 manu }
358 1.1 manu
359 1.1 manu if (data) {
360 1.6 manu (void)strcpy(cp, data);
361 1.6 manu cp += pmo->pmo_data_len;
362 1.6 manu }
363 1.6 manu
364 1.6 manu if (sock_len != 0) {
365 1.7 manu (void)strcpy(cp, sun->sun_path);
366 1.6 manu cp += pmo->pmo_sock_len;
367 1.6 manu }
368 1.6 manu
369 1.12 manu if (send(s, frame, len, MSG_NOSIGNAL) != (ssize_t)len) {
370 1.1 manu #ifdef PERFUSE_DEBUG
371 1.6 manu DWARN("%s:%d sendto failed", __func__, __LINE__);
372 1.1 manu #endif
373 1.6 manu return -1;
374 1.1 manu }
375 1.1 manu
376 1.1 manu return 0;
377 1.1 manu }
378 1.1 manu
379 1.1 manu
380 1.1 manu uint64_t
381 1.1 manu perfuse_next_unique(pu)
382 1.1 manu struct puffs_usermount *pu;
383 1.1 manu {
384 1.1 manu struct perfuse_state *ps;
385 1.1 manu
386 1.1 manu ps = puffs_getspecific(pu);
387 1.1 manu
388 1.1 manu return ps->ps_unique++;
389 1.1 manu }
390 1.1 manu
391 1.1 manu struct puffs_usermount *
392 1.1 manu perfuse_init(pc, pmi)
393 1.1 manu struct perfuse_callbacks *pc;
394 1.1 manu struct perfuse_mount_info *pmi;
395 1.1 manu {
396 1.1 manu struct perfuse_state *ps;
397 1.1 manu struct puffs_usermount *pu;
398 1.1 manu struct puffs_ops *pops;
399 1.13 manu const char *source = _PATH_PUFFS;
400 1.13 manu char *fstype;
401 1.1 manu unsigned int puffs_flags;
402 1.1 manu struct puffs_node *pn_root;
403 1.1 manu struct puffs_pathobj *po_root;
404 1.22 manu struct rlimit rl;
405 1.22 manu
406 1.22 manu /*
407 1.22 manu * perfused can grow quite large, let assume there's enough ram ...
408 1.22 manu */
409 1.22 manu if (getrlimit(RLIMIT_DATA, &rl) < 0) {
410 1.22 manu DERR(EX_OSERR, "%s: getrlimit failed: %s", __func__,
411 1.22 manu strerror(errno));
412 1.22 manu } else {
413 1.22 manu rl.rlim_cur = rl.rlim_max;
414 1.22 manu if (setrlimit(RLIMIT_DATA, &rl) < 0) {
415 1.22 manu DERR(EX_OSERR, "%s: setrlimit failed: %s", __func__,
416 1.22 manu strerror(errno));
417 1.22 manu }
418 1.22 manu }
419 1.22 manu
420 1.1 manu
421 1.1 manu ps = init_state();
422 1.2 manu ps->ps_owner_uid = pmi->pmi_uid;
423 1.1 manu
424 1.13 manu if (pmi->pmi_source) {
425 1.13 manu if ((ps->ps_source = strdup(pmi->pmi_source)) == NULL)
426 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
427 1.13 manu
428 1.13 manu source = ps->ps_source;
429 1.13 manu }
430 1.13 manu
431 1.13 manu if (pmi->pmi_filesystemtype) {
432 1.13 manu size_t len;
433 1.13 manu
434 1.1 manu ps->ps_filesystemtype = strdup(pmi->pmi_filesystemtype);
435 1.13 manu if (ps->ps_filesystemtype == NULL)
436 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
437 1.13 manu
438 1.13 manu len = sizeof("perfuse|") + strlen(ps->ps_filesystemtype) + 1;
439 1.13 manu if ((fstype = malloc(len)) == NULL)
440 1.18 christos DERR(EX_OSERR, "%s: malloc failed", __func__);
441 1.13 manu
442 1.13 manu (void)sprintf(fstype, "perfuse|%s", ps->ps_filesystemtype);
443 1.13 manu } else {
444 1.13 manu if ((fstype = strdup("perfuse")) == NULL)
445 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
446 1.13 manu }
447 1.13 manu
448 1.13 manu if ((ps->ps_target = strdup(pmi->pmi_target)) == NULL)
449 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
450 1.13 manu
451 1.1 manu ps->ps_mountflags = pmi->pmi_mountflags;
452 1.1 manu
453 1.1 manu /*
454 1.1 manu * Some options are forbidden for non root users
455 1.1 manu */
456 1.2 manu if (ps->ps_owner_uid != 0)
457 1.1 manu ps->ps_mountflags |= MNT_NOSUID|MNT_NODEV;
458 1.1 manu
459 1.1 manu PUFFSOP_INIT(pops);
460 1.1 manu PUFFSOP_SET(pops, perfuse, fs, unmount);
461 1.1 manu PUFFSOP_SET(pops, perfuse, fs, statvfs);
462 1.1 manu PUFFSOP_SET(pops, perfuse, fs, sync);
463 1.1 manu PUFFSOP_SET(pops, perfuse, node, lookup);
464 1.1 manu PUFFSOP_SET(pops, perfuse, node, create);
465 1.1 manu PUFFSOP_SET(pops, perfuse, node, mknod);
466 1.1 manu PUFFSOP_SET(pops, perfuse, node, open);
467 1.1 manu PUFFSOP_SET(pops, perfuse, node, close);
468 1.1 manu PUFFSOP_SET(pops, perfuse, node, access);
469 1.1 manu PUFFSOP_SET(pops, perfuse, node, getattr);
470 1.1 manu PUFFSOP_SET(pops, perfuse, node, setattr);
471 1.1 manu PUFFSOP_SET(pops, perfuse, node, poll);
472 1.1 manu #if 0
473 1.1 manu PUFFSOP_SET(pops, perfuse, node, mmap);
474 1.1 manu #endif
475 1.1 manu PUFFSOP_SET(pops, perfuse, node, fsync);
476 1.1 manu PUFFSOP_SET(pops, perfuse, node, seek);
477 1.1 manu PUFFSOP_SET(pops, perfuse, node, remove);
478 1.1 manu PUFFSOP_SET(pops, perfuse, node, link);
479 1.1 manu PUFFSOP_SET(pops, perfuse, node, rename);
480 1.1 manu PUFFSOP_SET(pops, perfuse, node, mkdir);
481 1.1 manu PUFFSOP_SET(pops, perfuse, node, rmdir);
482 1.1 manu PUFFSOP_SET(pops, perfuse, node, symlink);
483 1.1 manu PUFFSOP_SET(pops, perfuse, node, readdir);
484 1.1 manu PUFFSOP_SET(pops, perfuse, node, readlink);
485 1.1 manu PUFFSOP_SET(pops, perfuse, node, reclaim);
486 1.1 manu PUFFSOP_SET(pops, perfuse, node, inactive);
487 1.1 manu PUFFSOP_SET(pops, perfuse, node, print);
488 1.1 manu PUFFSOP_SET(pops, perfuse, node, advlock);
489 1.1 manu PUFFSOP_SET(pops, perfuse, node, read);
490 1.1 manu PUFFSOP_SET(pops, perfuse, node, write);
491 1.16 manu #ifdef PUFFS_EXTNAMELEN
492 1.16 manu PUFFSOP_SET(pops, perfuse, node, getextattr);
493 1.16 manu PUFFSOP_SET(pops, perfuse, node, setextattr);
494 1.16 manu PUFFSOP_SET(pops, perfuse, node, listextattr);
495 1.16 manu PUFFSOP_SET(pops, perfuse, node, deleteextattr);
496 1.16 manu #endif /* PUFFS_EXTNAMELEN */
497 1.1 manu
498 1.17 manu /*
499 1.17 manu * We used to have PUFFS_KFLAG_WTCACHE here, which uses the
500 1.17 manu * page cache (highly desirable to get mmap(2)), but still sends
501 1.17 manu * all writes to the filesystem. In fact it does not send the
502 1.17 manu * data written, but the pages that contain it.
503 1.17 manu *
504 1.17 manu * There is a nasty bug hidden somewhere, possibly in libpuffs'
505 1.17 manu * VOP_FSYNC, which sends an asynchronous PUFFS_SETATTR that
506 1.17 manu * update file size. When writes are in progress, it will cause
507 1.17 manu * the file to be truncated and we get a zero-filled chunk at the
508 1.17 manu * beginning of a page. Removing PUFFS_KFLAG_WTCACHE fixes that
509 1.17 manu * problem.
510 1.17 manu *
511 1.17 manu * The other consequences are that changes will not be propagated
512 1.17 manu * immediatly to the filesystem, and we get a huge performance gain
513 1.17 manu * because much less requests are sent. A test case for the above
514 1.17 manu * mentioned bug got its execution time slashed by factor 50.
515 1.23 manu *
516 1.23 manu * PUFFS_KFLAG_NOCACHE_NAME is required so that we can see changes
517 1.23 manu * done by other machines in networked filesystems.
518 1.17 manu */
519 1.23 manu puffs_flags = PUFFS_KFLAG_NOCACHE_NAME;
520 1.9 manu
521 1.1 manu if (perfuse_diagflags & PDF_PUFFS)
522 1.1 manu puffs_flags |= PUFFS_FLAG_OPDUMP;
523 1.1 manu
524 1.13 manu if ((pu = puffs_init(pops, source, fstype, ps, puffs_flags)) == NULL)
525 1.18 christos DERR(EX_OSERR, "%s: puffs_init failed", __func__);
526 1.1 manu
527 1.1 manu ps->ps_pu = pu;
528 1.1 manu
529 1.1 manu /*
530 1.1 manu * Setup filesystem root
531 1.1 manu */
532 1.10 manu pn_root = perfuse_new_pn(pu, "", NULL);
533 1.23 manu PERFUSE_NODE_DATA(pn_root)->pnd_nodeid = FUSE_ROOT_ID;
534 1.3 manu PERFUSE_NODE_DATA(pn_root)->pnd_parent = pn_root;
535 1.1 manu puffs_setroot(pu, pn_root);
536 1.1 manu ps->ps_fsid = pn_root->pn_va.va_fsid;
537 1.1 manu
538 1.1 manu po_root = puffs_getrootpathobj(pu);
539 1.1 manu if ((po_root->po_path = strdup("/")) == NULL)
540 1.1 manu DERRX(EX_OSERR, "perfuse_mount_start() failed");
541 1.1 manu
542 1.1 manu po_root->po_len = 1;
543 1.1 manu puffs_path_buildhash(pu, po_root);
544 1.1 manu
545 1.1 manu puffs_vattr_null(&pn_root->pn_va);
546 1.1 manu pn_root->pn_va.va_type = VDIR;
547 1.1 manu pn_root->pn_va.va_mode = 0755;
548 1.23 manu pn_root->pn_va.va_fileid = FUSE_ROOT_ID;
549 1.1 manu
550 1.1 manu ps->ps_root = pn_root;
551 1.1 manu
552 1.1 manu /*
553 1.1 manu * Callbacks
554 1.1 manu */
555 1.1 manu ps->ps_new_msg = pc->pc_new_msg;
556 1.1 manu ps->ps_xchg_msg = pc->pc_xchg_msg;
557 1.1 manu ps->ps_destroy_msg = pc->pc_destroy_msg;
558 1.1 manu ps->ps_get_inhdr = pc->pc_get_inhdr;
559 1.1 manu ps->ps_get_inpayload = pc->pc_get_inpayload;
560 1.1 manu ps->ps_get_outhdr = pc->pc_get_outhdr;
561 1.1 manu ps->ps_get_outpayload = pc->pc_get_outpayload;
562 1.15 manu ps->ps_umount = pc->pc_umount;
563 1.1 manu
564 1.1 manu return pu;
565 1.1 manu }
566 1.1 manu
567 1.1 manu void
568 1.1 manu perfuse_setspecific(pu, priv)
569 1.1 manu struct puffs_usermount *pu;
570 1.1 manu void *priv;
571 1.1 manu {
572 1.1 manu struct perfuse_state *ps;
573 1.1 manu
574 1.1 manu ps = puffs_getspecific(pu);
575 1.1 manu ps->ps_private = priv;
576 1.1 manu
577 1.1 manu return;
578 1.1 manu }
579 1.1 manu
580 1.1 manu void *
581 1.1 manu perfuse_getspecific(pu)
582 1.1 manu struct puffs_usermount *pu;
583 1.1 manu {
584 1.1 manu struct perfuse_state *ps;
585 1.1 manu
586 1.1 manu ps = puffs_getspecific(pu);
587 1.1 manu
588 1.1 manu return ps->ps_private;
589 1.1 manu }
590 1.1 manu
591 1.1 manu int
592 1.1 manu perfuse_inloop(pu)
593 1.1 manu struct puffs_usermount *pu;
594 1.1 manu {
595 1.1 manu struct perfuse_state *ps;
596 1.1 manu
597 1.1 manu ps = puffs_getspecific(pu);
598 1.1 manu
599 1.1 manu return ps->ps_flags & PS_INLOOP;
600 1.1 manu }
601 1.1 manu
602 1.1 manu int
603 1.1 manu perfuse_mainloop(pu)
604 1.1 manu struct puffs_usermount *pu;
605 1.1 manu {
606 1.1 manu struct perfuse_state *ps;
607 1.1 manu
608 1.1 manu ps = puffs_getspecific(pu);
609 1.1 manu
610 1.1 manu ps->ps_flags |= PS_INLOOP;
611 1.15 manu if (puffs_mainloop(ps->ps_pu) != 0) {
612 1.18 christos DERR(EX_OSERR, "%s: failed", __func__);
613 1.15 manu return -1;
614 1.15 manu }
615 1.1 manu
616 1.15 manu /*
617 1.15 manu * Normal exit after unmount
618 1.15 manu */
619 1.15 manu return 0;
620 1.1 manu }
621 1.1 manu
622 1.1 manu /* ARGSUSED0 */
623 1.1 manu uint64_t
624 1.23 manu perfuse_get_nodeid(pu, opc)
625 1.1 manu struct puffs_usermount *pu;
626 1.1 manu puffs_cookie_t opc;
627 1.1 manu {
628 1.23 manu return PERFUSE_NODE_DATA(opc)->pnd_nodeid;
629 1.1 manu }
630 1.2 manu
631 1.2 manu int
632 1.2 manu perfuse_unmount(pu)
633 1.2 manu struct puffs_usermount *pu;
634 1.2 manu {
635 1.2 manu struct perfuse_state *ps;
636 1.2 manu
637 1.2 manu ps = puffs_getspecific(pu);
638 1.2 manu
639 1.2 manu return unmount(ps->ps_target, MNT_FORCE);
640 1.2 manu }
641