perfuse.c revision 1.25 1 1.25 manu /* $NetBSD: perfuse.c,v 1.25 2012/02/03 15:54:15 manu Exp $ */
2 1.1 manu
3 1.1 manu /*-
4 1.12 manu * Copyright (c) 2010-2011 Emmanuel Dreyfus. All rights reserved.
5 1.1 manu *
6 1.1 manu * Redistribution and use in source and binary forms, with or without
7 1.1 manu * modification, are permitted provided that the following conditions
8 1.1 manu * are met:
9 1.1 manu * 1. Redistributions of source code must retain the above copyright
10 1.1 manu * notice, this list of conditions and the following disclaimer.
11 1.1 manu * 2. Redistributions in binary form must reproduce the above copyright
12 1.1 manu * notice, this list of conditions and the following disclaimer in the
13 1.1 manu * documentation and/or other materials provided with the distribution.
14 1.1 manu *
15 1.1 manu * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 1.1 manu * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 1.1 manu * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 1.1 manu * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 1.1 manu * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 1.1 manu * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 1.1 manu * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 1.1 manu * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 1.1 manu * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 1.1 manu * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 1.1 manu * POSSIBILITY OF SUCH DAMAGE.
26 1.1 manu */
27 1.1 manu
28 1.1 manu #include <stdio.h>
29 1.1 manu #include <unistd.h>
30 1.1 manu #include <stdlib.h>
31 1.1 manu #include <fcntl.h>
32 1.1 manu #include <string.h>
33 1.1 manu #include <errno.h>
34 1.1 manu #include <puffs.h>
35 1.1 manu #include <sys/types.h>
36 1.19 manu #include <sys/mman.h>
37 1.22 manu #include <sys/resource.h>
38 1.1 manu #include <sys/socket.h>
39 1.16 manu #include <sys/extattr.h>
40 1.1 manu #include <sys/un.h>
41 1.6 manu #include <machine/vmparam.h>
42 1.1 manu
43 1.1 manu #define LIBPERFUSE
44 1.1 manu #include "perfuse.h"
45 1.1 manu #include "perfuse_if.h"
46 1.1 manu #include "perfuse_priv.h"
47 1.1 manu
48 1.1 manu int perfuse_diagflags = 0; /* global used only in DPRINTF/DERR/DWARN */
49 1.12 manu extern char **environ;
50 1.1 manu
51 1.1 manu static struct perfuse_state *init_state(void);
52 1.1 manu static int get_fd(const char *);
53 1.1 manu
54 1.12 manu
55 1.1 manu static struct perfuse_state *
56 1.1 manu init_state(void)
57 1.1 manu {
58 1.1 manu struct perfuse_state *ps;
59 1.12 manu char opts[1024];
60 1.1 manu
61 1.1 manu if ((ps = malloc(sizeof(*ps))) == NULL)
62 1.18 christos DERR(EX_OSERR, "%s: malloc failed", __func__);
63 1.1 manu
64 1.1 manu (void)memset(ps, 0, sizeof(*ps));
65 1.1 manu ps->ps_max_write = UINT_MAX;
66 1.1 manu ps->ps_max_readahead = UINT_MAX;
67 1.24 manu TAILQ_INIT(&ps->ps_trace);
68 1.1 manu
69 1.12 manu /*
70 1.12 manu * Most of the time, access() is broken because the filesystem
71 1.12 manu * performs the check with root privileges. glusterfs will do that
72 1.12 manu * if the Linux-specific setfsuid() is missing, for instance.
73 1.12 manu */
74 1.12 manu ps->ps_flags |= PS_NO_ACCESS;
75 1.12 manu
76 1.12 manu /*
77 1.12 manu * This is a temporary way to toggle access and creat usage.
78 1.12 manu * It would be nice if that could be provided as mount options,
79 1.12 manu * but that will not be obvious to do.
80 1.12 manu */
81 1.12 manu if (getenv_r("PERFUSE_OPTIONS", opts, sizeof(opts)) != -1) {
82 1.12 manu char *optname;
83 1.12 manu char *last;
84 1.12 manu
85 1.12 manu for ((optname = strtok_r(opts, ",", &last));
86 1.12 manu optname != NULL;
87 1.12 manu (optname = strtok_r(NULL, ",", &last))) {
88 1.12 manu if (strcmp(optname, "enable_access") == 0)
89 1.12 manu ps->ps_flags &= ~PS_NO_ACCESS;
90 1.12 manu
91 1.12 manu if (strcmp(optname, "disable_access") == 0)
92 1.12 manu ps->ps_flags |= PS_NO_ACCESS;
93 1.12 manu
94 1.12 manu if (strcmp(optname, "enable_creat") == 0)
95 1.12 manu ps->ps_flags &= ~PS_NO_CREAT;
96 1.12 manu
97 1.12 manu if (strcmp(optname, "disable_creat") == 0)
98 1.12 manu ps->ps_flags |= PS_NO_CREAT;
99 1.12 manu }
100 1.12 manu }
101 1.12 manu
102 1.12 manu
103 1.1 manu return ps;
104 1.1 manu }
105 1.1 manu
106 1.1 manu
107 1.1 manu static int
108 1.1 manu get_fd(data)
109 1.1 manu const char *data;
110 1.1 manu {
111 1.1 manu char *string;
112 1.1 manu const char fdopt[] = "fd=";
113 1.1 manu char *lastp;
114 1.1 manu char *opt;
115 1.1 manu int fd = -1;
116 1.1 manu
117 1.1 manu if ((string = strdup(data)) == NULL)
118 1.1 manu return -1;
119 1.1 manu
120 1.1 manu for (opt = strtok_r(string, ",", &lastp);
121 1.1 manu opt != NULL;
122 1.1 manu opt = strtok_r(NULL, ",", &lastp)) {
123 1.1 manu if (strncmp(opt, fdopt, strlen(fdopt)) == 0) {
124 1.1 manu fd = atoi(opt + strlen(fdopt));
125 1.1 manu break;
126 1.1 manu }
127 1.1 manu }
128 1.1 manu
129 1.1 manu /*
130 1.1 manu * No file descriptor found
131 1.1 manu */
132 1.1 manu if (fd == -1)
133 1.1 manu errno = EINVAL;
134 1.1 manu
135 1.1 manu free(string);
136 1.1 manu return fd;
137 1.1 manu
138 1.1 manu }
139 1.1 manu
140 1.1 manu int
141 1.1 manu perfuse_open(path, flags, mode)
142 1.1 manu const char *path;
143 1.1 manu int flags;
144 1.1 manu mode_t mode;
145 1.1 manu {
146 1.2 manu int sv[2];
147 1.1 manu struct sockaddr_un sun;
148 1.1 manu struct sockaddr *sa;
149 1.2 manu char progname[] = _PATH_PERFUSED;
150 1.2 manu char minus_i[] = "-i";
151 1.2 manu char fdstr[16];
152 1.2 manu char *const argv[] = { progname, minus_i, fdstr, NULL};
153 1.6 manu uint32_t opt;
154 1.12 manu uint32_t optlen;
155 1.15 manu int sock_type = SOCK_SEQPACKET;
156 1.1 manu
157 1.1 manu if (strcmp(path, _PATH_FUSE) != 0)
158 1.1 manu return open(path, flags, mode);
159 1.1 manu
160 1.15 manu /*
161 1.15 manu * Try SOCK_SEQPACKET then SOCK_DGRAM if unavailable
162 1.15 manu */
163 1.15 manu if ((sv[0] = socket(PF_LOCAL, SOCK_SEQPACKET, 0)) == -1) {
164 1.15 manu sock_type = SOCK_DGRAM;
165 1.15 manu DWARNX("SEQPACKET local sockets unavailable, using less "
166 1.15 manu "reliable DGRAM sockets. Expect file operation hangs.");
167 1.15 manu
168 1.15 manu if ((sv[0] = socket(PF_LOCAL, SOCK_DGRAM, 0)) == -1) {
169 1.1 manu #ifdef PERFUSE_DEBUG
170 1.18 christos DWARN("%s: %d socket failed", __func__, __LINE__);
171 1.1 manu #endif
172 1.15 manu return -1;
173 1.15 manu }
174 1.1 manu }
175 1.1 manu
176 1.6 manu /*
177 1.6 manu * Set a buffer lentgh large enough so that any FUSE packet
178 1.6 manu * will fit.
179 1.6 manu */
180 1.20 christos opt = (uint32_t)FUSE_BUFSIZE;
181 1.12 manu optlen = sizeof(opt);
182 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
183 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
184 1.6 manu
185 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
186 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
187 1.6 manu
188 1.1 manu sa = (struct sockaddr *)(void *)&sun;
189 1.1 manu sun.sun_len = sizeof(sun);
190 1.1 manu sun.sun_family = AF_LOCAL;
191 1.1 manu (void)strcpy(sun.sun_path, path);
192 1.1 manu
193 1.15 manu if (connect(sv[0], sa, (socklen_t)sun.sun_len) == 0)
194 1.2 manu return sv[0];
195 1.2 manu
196 1.2 manu /*
197 1.2 manu * Attempt to run perfused on our own
198 1.2 manu * if it does not run yet; In that case
199 1.2 manu * we will talk using a socketpair
200 1.2 manu * instead of /dev/fuse.
201 1.2 manu */
202 1.15 manu if (socketpair(PF_LOCAL, sock_type, 0, sv) != 0) {
203 1.5 manu DWARN("%s:%d: socketpair failed", __func__, __LINE__);
204 1.1 manu return -1;
205 1.1 manu }
206 1.1 manu
207 1.6 manu /*
208 1.6 manu * Set a buffer lentgh large enough so that any FUSE packet
209 1.6 manu * will fit.
210 1.6 manu */
211 1.20 christos opt = (uint32_t)(4 * FUSE_BUFSIZE);
212 1.12 manu optlen = sizeof(opt);
213 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
214 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
215 1.6 manu
216 1.12 manu if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
217 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
218 1.6 manu
219 1.12 manu if (setsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
220 1.6 manu DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
221 1.6 manu
222 1.12 manu if (setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
223 1.6 manu DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
224 1.6 manu
225 1.6 manu /*
226 1.6 manu * Request peer credentials. This musr be done before first
227 1.6 manu * frame is sent.
228 1.6 manu */
229 1.6 manu opt = 1;
230 1.12 manu optlen = sizeof(opt);
231 1.12 manu if (setsockopt(sv[1], 0, LOCAL_CREDS, &opt, optlen) != 0)
232 1.6 manu DWARN("%s: setsockopt LOCAL_CREDS failed", __func__);
233 1.6 manu
234 1.2 manu (void)sprintf(fdstr, "%d", sv[1]);
235 1.2 manu
236 1.2 manu switch(fork()) {
237 1.2 manu case -1:
238 1.2 manu #ifdef PERFUSE_DEBUG
239 1.5 manu DWARN("%s:%d: fork failed", __func__, __LINE__);
240 1.2 manu #endif
241 1.2 manu return -1;
242 1.2 manu /* NOTREACHED */
243 1.2 manu break;
244 1.2 manu case 0:
245 1.25 manu (void)close(sv[0]);
246 1.12 manu (void)execve(argv[0], argv, environ);
247 1.2 manu #ifdef PERFUSE_DEBUG
248 1.5 manu DWARN("%s:%d: execve failed", __func__, __LINE__);
249 1.2 manu #endif
250 1.2 manu return -1;
251 1.2 manu /* NOTREACHED */
252 1.2 manu break;
253 1.2 manu default:
254 1.2 manu break;
255 1.2 manu }
256 1.2 manu
257 1.25 manu (void)close(sv[1]);
258 1.2 manu return sv[0];
259 1.1 manu }
260 1.1 manu
261 1.1 manu int
262 1.1 manu perfuse_mount(source, target, filesystemtype, mountflags, data)
263 1.1 manu const char *source;
264 1.1 manu const char *target;
265 1.1 manu const char *filesystemtype;
266 1.1 manu long mountflags;
267 1.1 manu const void *data;
268 1.1 manu {
269 1.1 manu int s;
270 1.1 manu size_t len;
271 1.6 manu struct perfuse_mount_out *pmo;
272 1.6 manu struct sockaddr_storage ss;
273 1.7 manu struct sockaddr_un *sun;
274 1.6 manu struct sockaddr *sa;
275 1.6 manu socklen_t sa_len;
276 1.6 manu size_t sock_len;
277 1.6 manu char *frame;
278 1.6 manu char *cp;
279 1.1 manu
280 1.1 manu #ifdef PERFUSE_DEBUG
281 1.5 manu if (perfuse_diagflags & PDF_MISC)
282 1.5 manu DPRINTF("%s(\"%s\", \"%s\", \"%s\", 0x%lx, \"%s\")\n",
283 1.5 manu __func__, source, target, filesystemtype,
284 1.5 manu mountflags, (const char *)data);
285 1.1 manu #endif
286 1.1 manu
287 1.1 manu if ((s = get_fd(data)) == -1)
288 1.1 manu return -1;
289 1.1 manu
290 1.6 manu /*
291 1.6 manu * If we are connected to /dev/fuse, we need a second
292 1.6 manu * socket to get replies from perfused.
293 1.6 manu * XXX This socket is not removed at exit time yet
294 1.6 manu */
295 1.6 manu sock_len = 0;
296 1.6 manu sa = (struct sockaddr *)(void *)&ss;
297 1.7 manu sun = (struct sockaddr_un *)(void *)&ss;
298 1.6 manu sa_len = sizeof(ss);
299 1.6 manu if ((getpeername(s, sa, &sa_len) == 0) &&
300 1.6 manu (sa->sa_family = AF_LOCAL) &&
301 1.7 manu (strcmp(sun->sun_path, _PATH_FUSE) == 0)) {
302 1.6 manu
303 1.7 manu sun->sun_len = sizeof(*sun);
304 1.7 manu sun->sun_family = AF_LOCAL;
305 1.7 manu (void)sprintf(sun->sun_path, "%s/%s-%d",
306 1.6 manu _PATH_TMP, getprogname(), getpid());
307 1.6 manu
308 1.7 manu if (bind(s, sa, (socklen_t)sa->sa_len) != 0)
309 1.6 manu DERR(EX_OSERR, "%s:%d bind to \"%s\" failed",
310 1.7 manu __func__, __LINE__, sun->sun_path);
311 1.6 manu
312 1.7 manu sock_len = strlen(sun->sun_path) + 1;
313 1.6 manu }
314 1.6 manu
315 1.6 manu len = sizeof(*pmo);
316 1.6 manu len += source ? (uint32_t)strlen(source) + 1 : 0;
317 1.6 manu len += target ? (uint32_t)strlen(target) + 1 : 0;
318 1.6 manu len += filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
319 1.6 manu len += data ? (uint32_t)strlen(data) + 1 : 0;
320 1.6 manu len += sock_len;
321 1.6 manu
322 1.6 manu if ((frame = malloc(len)) == NULL) {
323 1.1 manu #ifdef PERFUSE_DEBUG
324 1.5 manu if (perfuse_diagflags & PDF_MISC)
325 1.6 manu DWARN("%s:%d malloc failed", __func__, __LINE__);
326 1.1 manu #endif
327 1.1 manu return -1;
328 1.1 manu }
329 1.6 manu
330 1.6 manu pmo = (struct perfuse_mount_out *)(void *)frame;
331 1.12 manu pmo->pmo_len = (uint32_t)len;
332 1.6 manu pmo->pmo_error = 0;
333 1.6 manu pmo->pmo_unique = (uint64_t)-1;
334 1.6 manu (void)strcpy(pmo->pmo_magic, PERFUSE_MOUNT_MAGIC);
335 1.6 manu
336 1.6 manu pmo->pmo_source_len = source ? (uint32_t)strlen(source) + 1 : 0;
337 1.6 manu pmo->pmo_target_len = target ? (uint32_t)strlen(target) + 1: 0;
338 1.6 manu pmo->pmo_filesystemtype_len =
339 1.6 manu filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
340 1.6 manu pmo->pmo_mountflags = (uint32_t)mountflags;
341 1.6 manu pmo->pmo_data_len = data ? (uint32_t)strlen(data) + 1 : 0;
342 1.12 manu pmo->pmo_sock_len = (uint32_t)sock_len;
343 1.1 manu
344 1.6 manu cp = (char *)(void *)(pmo + 1);
345 1.6 manu
346 1.1 manu if (source) {
347 1.6 manu (void)strcpy(cp, source);
348 1.6 manu cp += pmo->pmo_source_len;
349 1.1 manu }
350 1.1 manu
351 1.1 manu if (target) {
352 1.6 manu (void)strcpy(cp, target);
353 1.6 manu cp += pmo->pmo_target_len;
354 1.1 manu }
355 1.6 manu
356 1.1 manu if (filesystemtype) {
357 1.6 manu (void)strcpy(cp, filesystemtype);
358 1.6 manu cp += pmo->pmo_filesystemtype_len;
359 1.1 manu }
360 1.1 manu
361 1.1 manu if (data) {
362 1.6 manu (void)strcpy(cp, data);
363 1.6 manu cp += pmo->pmo_data_len;
364 1.6 manu }
365 1.6 manu
366 1.6 manu if (sock_len != 0) {
367 1.7 manu (void)strcpy(cp, sun->sun_path);
368 1.6 manu cp += pmo->pmo_sock_len;
369 1.6 manu }
370 1.6 manu
371 1.12 manu if (send(s, frame, len, MSG_NOSIGNAL) != (ssize_t)len) {
372 1.1 manu #ifdef PERFUSE_DEBUG
373 1.6 manu DWARN("%s:%d sendto failed", __func__, __LINE__);
374 1.1 manu #endif
375 1.6 manu return -1;
376 1.1 manu }
377 1.1 manu
378 1.1 manu return 0;
379 1.1 manu }
380 1.1 manu
381 1.1 manu
382 1.1 manu uint64_t
383 1.1 manu perfuse_next_unique(pu)
384 1.1 manu struct puffs_usermount *pu;
385 1.1 manu {
386 1.1 manu struct perfuse_state *ps;
387 1.1 manu
388 1.1 manu ps = puffs_getspecific(pu);
389 1.1 manu
390 1.1 manu return ps->ps_unique++;
391 1.1 manu }
392 1.1 manu
393 1.1 manu struct puffs_usermount *
394 1.1 manu perfuse_init(pc, pmi)
395 1.1 manu struct perfuse_callbacks *pc;
396 1.1 manu struct perfuse_mount_info *pmi;
397 1.1 manu {
398 1.1 manu struct perfuse_state *ps;
399 1.1 manu struct puffs_usermount *pu;
400 1.1 manu struct puffs_ops *pops;
401 1.13 manu const char *source = _PATH_PUFFS;
402 1.13 manu char *fstype;
403 1.1 manu unsigned int puffs_flags;
404 1.1 manu struct puffs_node *pn_root;
405 1.1 manu struct puffs_pathobj *po_root;
406 1.22 manu struct rlimit rl;
407 1.22 manu
408 1.22 manu /*
409 1.22 manu * perfused can grow quite large, let assume there's enough ram ...
410 1.22 manu */
411 1.22 manu if (getrlimit(RLIMIT_DATA, &rl) < 0) {
412 1.22 manu DERR(EX_OSERR, "%s: getrlimit failed: %s", __func__,
413 1.22 manu strerror(errno));
414 1.22 manu } else {
415 1.22 manu rl.rlim_cur = rl.rlim_max;
416 1.22 manu if (setrlimit(RLIMIT_DATA, &rl) < 0) {
417 1.22 manu DERR(EX_OSERR, "%s: setrlimit failed: %s", __func__,
418 1.22 manu strerror(errno));
419 1.22 manu }
420 1.22 manu }
421 1.22 manu
422 1.1 manu
423 1.1 manu ps = init_state();
424 1.2 manu ps->ps_owner_uid = pmi->pmi_uid;
425 1.1 manu
426 1.13 manu if (pmi->pmi_source) {
427 1.13 manu if ((ps->ps_source = strdup(pmi->pmi_source)) == NULL)
428 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
429 1.13 manu
430 1.13 manu source = ps->ps_source;
431 1.13 manu }
432 1.13 manu
433 1.13 manu if (pmi->pmi_filesystemtype) {
434 1.13 manu size_t len;
435 1.13 manu
436 1.1 manu ps->ps_filesystemtype = strdup(pmi->pmi_filesystemtype);
437 1.13 manu if (ps->ps_filesystemtype == NULL)
438 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
439 1.13 manu
440 1.13 manu len = sizeof("perfuse|") + strlen(ps->ps_filesystemtype) + 1;
441 1.13 manu if ((fstype = malloc(len)) == NULL)
442 1.18 christos DERR(EX_OSERR, "%s: malloc failed", __func__);
443 1.13 manu
444 1.13 manu (void)sprintf(fstype, "perfuse|%s", ps->ps_filesystemtype);
445 1.13 manu } else {
446 1.13 manu if ((fstype = strdup("perfuse")) == NULL)
447 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
448 1.13 manu }
449 1.13 manu
450 1.13 manu if ((ps->ps_target = strdup(pmi->pmi_target)) == NULL)
451 1.18 christos DERR(EX_OSERR, "%s: strdup failed", __func__);
452 1.13 manu
453 1.1 manu ps->ps_mountflags = pmi->pmi_mountflags;
454 1.1 manu
455 1.1 manu /*
456 1.1 manu * Some options are forbidden for non root users
457 1.1 manu */
458 1.2 manu if (ps->ps_owner_uid != 0)
459 1.1 manu ps->ps_mountflags |= MNT_NOSUID|MNT_NODEV;
460 1.1 manu
461 1.1 manu PUFFSOP_INIT(pops);
462 1.1 manu PUFFSOP_SET(pops, perfuse, fs, unmount);
463 1.1 manu PUFFSOP_SET(pops, perfuse, fs, statvfs);
464 1.1 manu PUFFSOP_SET(pops, perfuse, fs, sync);
465 1.1 manu PUFFSOP_SET(pops, perfuse, node, lookup);
466 1.1 manu PUFFSOP_SET(pops, perfuse, node, create);
467 1.1 manu PUFFSOP_SET(pops, perfuse, node, mknod);
468 1.1 manu PUFFSOP_SET(pops, perfuse, node, open);
469 1.1 manu PUFFSOP_SET(pops, perfuse, node, close);
470 1.1 manu PUFFSOP_SET(pops, perfuse, node, access);
471 1.1 manu PUFFSOP_SET(pops, perfuse, node, getattr);
472 1.1 manu PUFFSOP_SET(pops, perfuse, node, setattr);
473 1.1 manu PUFFSOP_SET(pops, perfuse, node, poll);
474 1.1 manu #if 0
475 1.1 manu PUFFSOP_SET(pops, perfuse, node, mmap);
476 1.1 manu #endif
477 1.1 manu PUFFSOP_SET(pops, perfuse, node, fsync);
478 1.1 manu PUFFSOP_SET(pops, perfuse, node, seek);
479 1.1 manu PUFFSOP_SET(pops, perfuse, node, remove);
480 1.1 manu PUFFSOP_SET(pops, perfuse, node, link);
481 1.1 manu PUFFSOP_SET(pops, perfuse, node, rename);
482 1.1 manu PUFFSOP_SET(pops, perfuse, node, mkdir);
483 1.1 manu PUFFSOP_SET(pops, perfuse, node, rmdir);
484 1.1 manu PUFFSOP_SET(pops, perfuse, node, symlink);
485 1.1 manu PUFFSOP_SET(pops, perfuse, node, readdir);
486 1.1 manu PUFFSOP_SET(pops, perfuse, node, readlink);
487 1.1 manu PUFFSOP_SET(pops, perfuse, node, reclaim);
488 1.1 manu PUFFSOP_SET(pops, perfuse, node, inactive);
489 1.1 manu PUFFSOP_SET(pops, perfuse, node, print);
490 1.1 manu PUFFSOP_SET(pops, perfuse, node, advlock);
491 1.1 manu PUFFSOP_SET(pops, perfuse, node, read);
492 1.1 manu PUFFSOP_SET(pops, perfuse, node, write);
493 1.16 manu #ifdef PUFFS_EXTNAMELEN
494 1.16 manu PUFFSOP_SET(pops, perfuse, node, getextattr);
495 1.16 manu PUFFSOP_SET(pops, perfuse, node, setextattr);
496 1.16 manu PUFFSOP_SET(pops, perfuse, node, listextattr);
497 1.16 manu PUFFSOP_SET(pops, perfuse, node, deleteextattr);
498 1.16 manu #endif /* PUFFS_EXTNAMELEN */
499 1.1 manu
500 1.17 manu /*
501 1.17 manu * We used to have PUFFS_KFLAG_WTCACHE here, which uses the
502 1.17 manu * page cache (highly desirable to get mmap(2)), but still sends
503 1.17 manu * all writes to the filesystem. In fact it does not send the
504 1.17 manu * data written, but the pages that contain it.
505 1.17 manu *
506 1.17 manu * There is a nasty bug hidden somewhere, possibly in libpuffs'
507 1.17 manu * VOP_FSYNC, which sends an asynchronous PUFFS_SETATTR that
508 1.17 manu * update file size. When writes are in progress, it will cause
509 1.17 manu * the file to be truncated and we get a zero-filled chunk at the
510 1.17 manu * beginning of a page. Removing PUFFS_KFLAG_WTCACHE fixes that
511 1.17 manu * problem.
512 1.17 manu *
513 1.17 manu * The other consequences are that changes will not be propagated
514 1.17 manu * immediatly to the filesystem, and we get a huge performance gain
515 1.17 manu * because much less requests are sent. A test case for the above
516 1.17 manu * mentioned bug got its execution time slashed by factor 50.
517 1.23 manu *
518 1.23 manu * PUFFS_KFLAG_NOCACHE_NAME is required so that we can see changes
519 1.23 manu * done by other machines in networked filesystems.
520 1.17 manu */
521 1.23 manu puffs_flags = PUFFS_KFLAG_NOCACHE_NAME;
522 1.9 manu
523 1.1 manu if (perfuse_diagflags & PDF_PUFFS)
524 1.1 manu puffs_flags |= PUFFS_FLAG_OPDUMP;
525 1.1 manu
526 1.13 manu if ((pu = puffs_init(pops, source, fstype, ps, puffs_flags)) == NULL)
527 1.18 christos DERR(EX_OSERR, "%s: puffs_init failed", __func__);
528 1.1 manu
529 1.1 manu ps->ps_pu = pu;
530 1.1 manu
531 1.1 manu /*
532 1.1 manu * Setup filesystem root
533 1.1 manu */
534 1.10 manu pn_root = perfuse_new_pn(pu, "", NULL);
535 1.23 manu PERFUSE_NODE_DATA(pn_root)->pnd_nodeid = FUSE_ROOT_ID;
536 1.3 manu PERFUSE_NODE_DATA(pn_root)->pnd_parent = pn_root;
537 1.1 manu puffs_setroot(pu, pn_root);
538 1.1 manu ps->ps_fsid = pn_root->pn_va.va_fsid;
539 1.1 manu
540 1.1 manu po_root = puffs_getrootpathobj(pu);
541 1.1 manu if ((po_root->po_path = strdup("/")) == NULL)
542 1.1 manu DERRX(EX_OSERR, "perfuse_mount_start() failed");
543 1.1 manu
544 1.1 manu po_root->po_len = 1;
545 1.1 manu puffs_path_buildhash(pu, po_root);
546 1.1 manu
547 1.1 manu puffs_vattr_null(&pn_root->pn_va);
548 1.1 manu pn_root->pn_va.va_type = VDIR;
549 1.1 manu pn_root->pn_va.va_mode = 0755;
550 1.23 manu pn_root->pn_va.va_fileid = FUSE_ROOT_ID;
551 1.1 manu
552 1.1 manu ps->ps_root = pn_root;
553 1.1 manu
554 1.1 manu /*
555 1.1 manu * Callbacks
556 1.1 manu */
557 1.1 manu ps->ps_new_msg = pc->pc_new_msg;
558 1.1 manu ps->ps_xchg_msg = pc->pc_xchg_msg;
559 1.1 manu ps->ps_destroy_msg = pc->pc_destroy_msg;
560 1.1 manu ps->ps_get_inhdr = pc->pc_get_inhdr;
561 1.1 manu ps->ps_get_inpayload = pc->pc_get_inpayload;
562 1.1 manu ps->ps_get_outhdr = pc->pc_get_outhdr;
563 1.1 manu ps->ps_get_outpayload = pc->pc_get_outpayload;
564 1.15 manu ps->ps_umount = pc->pc_umount;
565 1.1 manu
566 1.1 manu return pu;
567 1.1 manu }
568 1.1 manu
569 1.1 manu void
570 1.1 manu perfuse_setspecific(pu, priv)
571 1.1 manu struct puffs_usermount *pu;
572 1.1 manu void *priv;
573 1.1 manu {
574 1.1 manu struct perfuse_state *ps;
575 1.1 manu
576 1.1 manu ps = puffs_getspecific(pu);
577 1.1 manu ps->ps_private = priv;
578 1.1 manu
579 1.1 manu return;
580 1.1 manu }
581 1.1 manu
582 1.1 manu void *
583 1.1 manu perfuse_getspecific(pu)
584 1.1 manu struct puffs_usermount *pu;
585 1.1 manu {
586 1.1 manu struct perfuse_state *ps;
587 1.1 manu
588 1.1 manu ps = puffs_getspecific(pu);
589 1.1 manu
590 1.1 manu return ps->ps_private;
591 1.1 manu }
592 1.1 manu
593 1.1 manu int
594 1.1 manu perfuse_inloop(pu)
595 1.1 manu struct puffs_usermount *pu;
596 1.1 manu {
597 1.1 manu struct perfuse_state *ps;
598 1.1 manu
599 1.1 manu ps = puffs_getspecific(pu);
600 1.1 manu
601 1.1 manu return ps->ps_flags & PS_INLOOP;
602 1.1 manu }
603 1.1 manu
604 1.1 manu int
605 1.1 manu perfuse_mainloop(pu)
606 1.1 manu struct puffs_usermount *pu;
607 1.1 manu {
608 1.1 manu struct perfuse_state *ps;
609 1.1 manu
610 1.1 manu ps = puffs_getspecific(pu);
611 1.1 manu
612 1.1 manu ps->ps_flags |= PS_INLOOP;
613 1.15 manu if (puffs_mainloop(ps->ps_pu) != 0) {
614 1.18 christos DERR(EX_OSERR, "%s: failed", __func__);
615 1.15 manu return -1;
616 1.15 manu }
617 1.1 manu
618 1.15 manu /*
619 1.15 manu * Normal exit after unmount
620 1.15 manu */
621 1.15 manu return 0;
622 1.1 manu }
623 1.1 manu
624 1.1 manu /* ARGSUSED0 */
625 1.1 manu uint64_t
626 1.23 manu perfuse_get_nodeid(pu, opc)
627 1.1 manu struct puffs_usermount *pu;
628 1.1 manu puffs_cookie_t opc;
629 1.1 manu {
630 1.23 manu return PERFUSE_NODE_DATA(opc)->pnd_nodeid;
631 1.1 manu }
632 1.2 manu
633 1.2 manu int
634 1.2 manu perfuse_unmount(pu)
635 1.2 manu struct puffs_usermount *pu;
636 1.2 manu {
637 1.2 manu struct perfuse_state *ps;
638 1.2 manu
639 1.2 manu ps = puffs_getspecific(pu);
640 1.2 manu
641 1.2 manu return unmount(ps->ps_target, MNT_FORCE);
642 1.2 manu }
643