perfuse.c revision 1.34 1 /* $NetBSD: perfuse.c,v 1.34 2014/09/03 16:01:45 manu Exp $ */
2
3 /*-
4 * Copyright (c) 2010-2011 Emmanuel Dreyfus. All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
16 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
17 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
18 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
19 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
20 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
21 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
22 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
23 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
24 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
25 * POSSIBILITY OF SUCH DAMAGE.
26 */
27
28 #include <stdio.h>
29 #include <unistd.h>
30 #include <stdlib.h>
31 #include <fcntl.h>
32 #include <string.h>
33 #include <errno.h>
34 #include <puffs.h>
35 #include <sys/types.h>
36 #include <sys/mman.h>
37 #include <sys/resource.h>
38 #include <sys/socket.h>
39 #include <sys/extattr.h>
40 #include <sys/hash.h>
41 #include <sys/un.h>
42 #include <machine/vmparam.h>
43
44 #define LIBPERFUSE
45 #include "perfuse.h"
46 #include "perfuse_if.h"
47 #include "perfuse_priv.h"
48
49 int perfuse_diagflags = 0; /* global used only in DPRINTF/DERR/DWARN */
50 extern char **environ;
51
52 static struct perfuse_state *init_state(void);
53 static int get_fd(const char *);
54
55
56 static struct perfuse_state *
57 init_state(void)
58 {
59 struct perfuse_state *ps;
60 size_t len;
61 char opts[1024];
62 int i;
63
64 if ((ps = malloc(sizeof(*ps))) == NULL)
65 DERR(EX_OSERR, "%s:%d malloc failed", __func__, __LINE__);
66
67 (void)memset(ps, 0, sizeof(*ps));
68 ps->ps_max_write = UINT_MAX;
69 ps->ps_max_readahead = UINT_MAX;
70 TAILQ_INIT(&ps->ps_trace);
71
72 ps->ps_nnidhash = PUFFS_PNODEBUCKETS;
73 len = sizeof(*ps->ps_nidhash) * ps->ps_nnidhash;
74 if ((ps->ps_nidhash = malloc(len)) == NULL)
75 DERR(EX_OSERR, "%s:%d malloc failed", __func__, __LINE__);
76 for (i = 0; i < ps->ps_nnidhash; i++)
77 LIST_INIT(&ps->ps_nidhash[i]);
78
79 /*
80 * Most of the time, access() is broken because the filesystem
81 * performs the check with root privileges. glusterfs will do that
82 * if the Linux-specific setfsuid() is missing, for instance.
83 */
84 ps->ps_flags |= PS_NO_ACCESS;
85
86 /*
87 * This is a temporary way to toggle access and creat usage.
88 * It would be nice if that could be provided as mount options,
89 * but that will not be obvious to do.
90 */
91 if (getenv_r("PERFUSE_OPTIONS", opts, sizeof(opts)) != -1) {
92 char *optname;
93 char *last;
94
95 for ((optname = strtok_r(opts, ",", &last));
96 optname != NULL;
97 (optname = strtok_r(NULL, ",", &last))) {
98 if (strcmp(optname, "enable_access") == 0)
99 ps->ps_flags &= ~PS_NO_ACCESS;
100
101 if (strcmp(optname, "disable_access") == 0)
102 ps->ps_flags |= PS_NO_ACCESS;
103
104 if (strcmp(optname, "enable_creat") == 0)
105 ps->ps_flags &= ~PS_NO_CREAT;
106
107 if (strcmp(optname, "disable_creat") == 0)
108 ps->ps_flags |= PS_NO_CREAT;
109 }
110 }
111
112
113 return ps;
114 }
115
116
117 static int
118 get_fd(const char *data)
119 {
120 char *string;
121 const char fdopt[] = "fd=";
122 char *lastp;
123 char *opt;
124 int fd = -1;
125
126 if ((string = strdup(data)) == NULL)
127 return -1;
128
129 for (opt = strtok_r(string, ",", &lastp);
130 opt != NULL;
131 opt = strtok_r(NULL, ",", &lastp)) {
132 if (strncmp(opt, fdopt, strlen(fdopt)) == 0) {
133 fd = atoi(opt + strlen(fdopt));
134 break;
135 }
136 }
137
138 /*
139 * No file descriptor found
140 */
141 if (fd == -1)
142 errno = EINVAL;
143
144 free(string);
145 return fd;
146
147 }
148
149 int
150 perfuse_open(const char *path, int flags, mode_t mode)
151 {
152 int sv[2];
153 struct sockaddr_un sun;
154 struct sockaddr *sa;
155 char progname[] = _PATH_PERFUSED;
156 char minus_i[] = "-i";
157 char fdstr[16];
158 char *const argv[] = { progname, minus_i, fdstr, NULL};
159 uint32_t opt;
160 uint32_t optlen;
161 int sock_type = SOCK_SEQPACKET;
162
163 if (strcmp(path, _PATH_FUSE) != 0)
164 return open(path, flags, mode);
165
166 /*
167 * Try SOCK_SEQPACKET then SOCK_DGRAM if unavailable
168 */
169 if ((sv[0] = socket(PF_LOCAL, SOCK_SEQPACKET, 0)) == -1) {
170 sock_type = SOCK_DGRAM;
171 DWARNX("SEQPACKET local sockets unavailable, using less "
172 "reliable DGRAM sockets. Expect file operation hangs.");
173
174 if ((sv[0] = socket(PF_LOCAL, SOCK_DGRAM, 0)) == -1) {
175 #ifdef PERFUSE_DEBUG
176 DWARN("%s: %d socket failed", __func__, __LINE__);
177 #endif
178 return -1;
179 }
180 }
181
182 /*
183 * Set a buffer lentgh large enough so that any FUSE packet
184 * will fit.
185 */
186 opt = (uint32_t)FUSE_BUFSIZE;
187 optlen = sizeof(opt);
188 if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
189 DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
190
191 if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
192 DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
193
194 sa = (struct sockaddr *)(void *)&sun;
195 sun.sun_len = sizeof(sun);
196 sun.sun_family = AF_LOCAL;
197 (void)strcpy(sun.sun_path, path);
198
199 if (connect(sv[0], sa, (socklen_t)sun.sun_len) == 0)
200 return sv[0];
201
202 /*
203 * Attempt to run perfused on our own
204 * if it does not run yet; In that case
205 * we will talk using a socketpair
206 * instead of /dev/fuse.
207 */
208 if (socketpair(PF_LOCAL, sock_type, 0, sv) != 0) {
209 DWARN("%s:%d: socketpair failed", __func__, __LINE__);
210 return -1;
211 }
212
213 /*
214 * Set a buffer lentgh large enough so that any FUSE packet
215 * will fit.
216 */
217 opt = (uint32_t)(4 * FUSE_BUFSIZE);
218 optlen = sizeof(opt);
219 if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
220 DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
221
222 if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
223 DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
224
225 if (setsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
226 DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
227
228 if (setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
229 DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
230
231 /*
232 * Request peer credentials. This musr be done before first
233 * frame is sent.
234 */
235 opt = 1;
236 optlen = sizeof(opt);
237 if (setsockopt(sv[1], 0, LOCAL_CREDS, &opt, optlen) != 0)
238 DWARN("%s: setsockopt LOCAL_CREDS failed", __func__);
239
240 (void)sprintf(fdstr, "%d", sv[1]);
241
242 switch(fork()) {
243 case -1:
244 #ifdef PERFUSE_DEBUG
245 DWARN("%s:%d: fork failed", __func__, __LINE__);
246 #endif
247 return -1;
248 /* NOTREACHED */
249 break;
250 case 0:
251 (void)close(sv[0]);
252 (void)execve(argv[0], argv, environ);
253 #ifdef PERFUSE_DEBUG
254 DWARN("%s:%d: execve failed", __func__, __LINE__);
255 #endif
256 return -1;
257 /* NOTREACHED */
258 break;
259 default:
260 break;
261 }
262
263 (void)close(sv[1]);
264 return sv[0];
265 }
266
267 int
268 perfuse_mount(const char *source, const char *target,
269 const char *filesystemtype, long mountflags, const void *data)
270 {
271 int s;
272 size_t len;
273 struct perfuse_mount_out *pmo;
274 struct sockaddr_storage ss;
275 struct sockaddr_un *sun;
276 struct sockaddr *sa;
277 socklen_t sa_len;
278 size_t sock_len;
279 char *frame;
280 char *cp;
281
282 #ifdef PERFUSE_DEBUG
283 if (perfuse_diagflags & PDF_MISC)
284 DPRINTF("%s(\"%s\", \"%s\", \"%s\", 0x%lx, \"%s\")\n",
285 __func__, source, target, filesystemtype,
286 mountflags, (const char *)data);
287 #endif
288
289 if ((s = get_fd(data)) == -1)
290 return -1;
291
292 /*
293 * If we are connected to /dev/fuse, we need a second
294 * socket to get replies from perfused.
295 * XXX This socket is not removed at exit time yet
296 */
297 sock_len = 0;
298 sa = (struct sockaddr *)(void *)&ss;
299 sun = (struct sockaddr_un *)(void *)&ss;
300 sa_len = sizeof(ss);
301 if ((getpeername(s, sa, &sa_len) == 0) &&
302 (sa->sa_family = AF_LOCAL) &&
303 (strcmp(sun->sun_path, _PATH_FUSE) == 0)) {
304
305 sun->sun_len = sizeof(*sun);
306 sun->sun_family = AF_LOCAL;
307 (void)sprintf(sun->sun_path, "%s/%s-%d",
308 _PATH_TMP, getprogname(), getpid());
309
310 if (bind(s, sa, (socklen_t)sa->sa_len) != 0)
311 DERR(EX_OSERR, "%s:%d bind to \"%s\" failed",
312 __func__, __LINE__, sun->sun_path);
313
314 sock_len = strlen(sun->sun_path) + 1;
315 }
316
317 len = sizeof(*pmo);
318 len += source ? (uint32_t)strlen(source) + 1 : 0;
319 len += target ? (uint32_t)strlen(target) + 1 : 0;
320 len += filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
321 len += data ? (uint32_t)strlen(data) + 1 : 0;
322 len += sock_len;
323
324 if ((frame = malloc(len)) == NULL) {
325 #ifdef PERFUSE_DEBUG
326 if (perfuse_diagflags & PDF_MISC)
327 DWARN("%s:%d malloc failed", __func__, __LINE__);
328 #endif
329 return -1;
330 }
331
332 pmo = (struct perfuse_mount_out *)(void *)frame;
333 pmo->pmo_len = (uint32_t)len;
334 pmo->pmo_error = 0;
335 pmo->pmo_unique = (uint64_t)-1;
336 (void)strcpy(pmo->pmo_magic, PERFUSE_MOUNT_MAGIC);
337
338 pmo->pmo_source_len = source ? (uint32_t)strlen(source) + 1 : 0;
339 pmo->pmo_target_len = target ? (uint32_t)strlen(target) + 1: 0;
340 pmo->pmo_filesystemtype_len =
341 filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
342 pmo->pmo_mountflags = (uint32_t)mountflags;
343 pmo->pmo_data_len = data ? (uint32_t)strlen(data) + 1 : 0;
344 pmo->pmo_sock_len = (uint32_t)sock_len;
345
346 cp = (char *)(void *)(pmo + 1);
347
348 if (source) {
349 (void)strcpy(cp, source);
350 cp += pmo->pmo_source_len;
351 }
352
353 if (target) {
354 (void)strcpy(cp, target);
355 cp += pmo->pmo_target_len;
356 }
357
358 if (filesystemtype) {
359 (void)strcpy(cp, filesystemtype);
360 cp += pmo->pmo_filesystemtype_len;
361 }
362
363 if (data) {
364 (void)strcpy(cp, data);
365 cp += pmo->pmo_data_len;
366 }
367
368 if (sock_len != 0) {
369 (void)strcpy(cp, sun->sun_path);
370 cp += pmo->pmo_sock_len;
371 }
372
373 if (send(s, frame, len, MSG_NOSIGNAL) != (ssize_t)len) {
374 #ifdef PERFUSE_DEBUG
375 DWARN("%s:%d sendto failed", __func__, __LINE__);
376 #endif
377 return -1;
378 }
379
380 return 0;
381 }
382
383
384 uint64_t
385 perfuse_next_unique(struct puffs_usermount *pu)
386 {
387 struct perfuse_state *ps;
388
389 ps = puffs_getspecific(pu);
390
391 return ps->ps_unique++;
392 }
393
394 struct puffs_usermount *
395 perfuse_init(struct perfuse_callbacks *pc, struct perfuse_mount_info *pmi)
396 {
397 struct perfuse_state *ps;
398 struct puffs_usermount *pu;
399 struct puffs_ops *pops;
400 const char *source = _PATH_PUFFS;
401 char *fstype;
402 unsigned int puffs_flags;
403 struct puffs_node *pn_root;
404 struct puffs_pathobj *po_root;
405 struct rlimit rl;
406
407 /*
408 * perfused can grow quite large, let assume there's enough ram ...
409 */
410 rl.rlim_cur = RLIM_INFINITY;
411 rl.rlim_max = RLIM_INFINITY;
412
413 if (setrlimit(RLIMIT_DATA, &rl) < 0) {
414 DERR(EX_OSERR, "%s: setrlimit failed: %s", __func__,
415 strerror(errno));
416 }
417
418 if (setrlimit(RLIMIT_AS, &rl) < 0) {
419 DERR(EX_OSERR, "%s: setrlimit failed: %s", __func__,
420 strerror(errno));
421 }
422
423 ps = init_state();
424 ps->ps_owner_uid = pmi->pmi_uid;
425
426 if (pmi->pmi_source) {
427 if ((ps->ps_source = strdup(pmi->pmi_source)) == NULL)
428 DERR(EX_OSERR, "%s: strdup failed", __func__);
429
430 source = ps->ps_source;
431 }
432
433 if (pmi->pmi_filesystemtype) {
434 size_t len;
435
436 ps->ps_filesystemtype = strdup(pmi->pmi_filesystemtype);
437 if (ps->ps_filesystemtype == NULL)
438 DERR(EX_OSERR, "%s: strdup failed", __func__);
439
440 len = sizeof("perfuse|") + strlen(ps->ps_filesystemtype) + 1;
441 if ((fstype = malloc(len)) == NULL)
442 DERR(EX_OSERR, "%s: malloc failed", __func__);
443
444 (void)sprintf(fstype, "perfuse|%s", ps->ps_filesystemtype);
445 } else {
446 if ((fstype = strdup("perfuse")) == NULL)
447 DERR(EX_OSERR, "%s: strdup failed", __func__);
448 }
449
450 if ((ps->ps_target = strdup(pmi->pmi_target)) == NULL)
451 DERR(EX_OSERR, "%s: strdup failed", __func__);
452
453 ps->ps_mountflags = pmi->pmi_mountflags;
454
455 /*
456 * Some options are forbidden for non root users
457 */
458 if (ps->ps_owner_uid != 0)
459 ps->ps_mountflags |= MNT_NOSUID|MNT_NODEV;
460
461 PUFFSOP_INIT(pops);
462 PUFFSOP_SET(pops, perfuse, fs, unmount);
463 PUFFSOP_SET(pops, perfuse, fs, statvfs);
464 PUFFSOP_SET(pops, perfuse, fs, sync);
465 PUFFSOP_SET(pops, perfuse, node, lookup);
466 PUFFSOP_SET(pops, perfuse, node, create);
467 PUFFSOP_SET(pops, perfuse, node, mknod);
468 PUFFSOP_SET(pops, perfuse, node, open);
469 PUFFSOP_SET(pops, perfuse, node, close);
470 PUFFSOP_SET(pops, perfuse, node, access);
471 PUFFSOP_SET(pops, perfuse, node, getattr);
472 PUFFSOP_SET(pops, perfuse, node, setattr);
473 PUFFSOP_SET(pops, perfuse, node, poll);
474 PUFFSOP_SET(pops, perfuse, node, fsync);
475 PUFFSOP_SET(pops, perfuse, node, remove);
476 PUFFSOP_SET(pops, perfuse, node, link);
477 PUFFSOP_SET(pops, perfuse, node, rename);
478 PUFFSOP_SET(pops, perfuse, node, mkdir);
479 PUFFSOP_SET(pops, perfuse, node, rmdir);
480 PUFFSOP_SET(pops, perfuse, node, symlink);
481 PUFFSOP_SET(pops, perfuse, node, readdir);
482 PUFFSOP_SET(pops, perfuse, node, readlink);
483 PUFFSOP_SET(pops, perfuse, node, reclaim);
484 PUFFSOP_SET(pops, perfuse, node, inactive);
485 PUFFSOP_SET(pops, perfuse, node, print);
486 PUFFSOP_SET(pops, perfuse, node, pathconf);
487 PUFFSOP_SET(pops, perfuse, node, advlock);
488 PUFFSOP_SET(pops, perfuse, node, read);
489 PUFFSOP_SET(pops, perfuse, node, write);
490 #ifdef PUFFS_EXTNAMELEN
491 PUFFSOP_SET(pops, perfuse, node, getextattr);
492 PUFFSOP_SET(pops, perfuse, node, setextattr);
493 PUFFSOP_SET(pops, perfuse, node, listextattr);
494 PUFFSOP_SET(pops, perfuse, node, deleteextattr);
495 #endif /* PUFFS_EXTNAMELEN */
496 #ifdef PUFFS_KFLAG_CACHE_FS_TTL
497 PUFFSOP_SET(pops, perfuse, node, getattr_ttl);
498 PUFFSOP_SET(pops, perfuse, node, setattr_ttl);
499 #endif /* PUFFS_KFLAG_CACHE_FS_TTL */
500 #ifdef PUFFS_SETATTR_FAF
501 PUFFSOP_SET(pops, perfuse, node, write2);
502 #endif /* PUFFS_SETATTR_FAF */
503 #ifdef PUFFS_OPEN_IO_DIRECT
504 PUFFSOP_SET(pops, perfuse, node, open2);
505 #endif /* PUFFS_OPEN_IO_DIRECT */
506
507 /*
508 * PUFFS_KFLAG_NOCACHE_NAME is required so that we can see changes
509 * done by other machines in networked filesystems. In later
510 * NetBSD releases we use the alternative PUFFS_KFLAG_CACHE_FS_TTL,
511 * which implement name cache with a filesystem-provided TTL.
512 */
513 #ifdef PUFFS_KFLAG_CACHE_FS_TTL
514 puffs_flags = PUFFS_KFLAG_CACHE_FS_TTL;
515 #else
516 puffs_flags = PUFFS_KFLAG_NOCACHE_NAME;
517 #endif
518
519 /*
520 * Do not lookuo ..
521 * That means we keep all parent vnode active
522 */
523 #ifdef PUFFS_KFLAG_CACHE_DOTDOT
524 puffs_flags |= PUFFS_KFLAG_CACHE_DOTDOT;
525 #endif
526
527 /*
528 * It would be nice to avoid useless inactive, and only
529 * get them on file open for writing (PUFFS does
530 * CLOSE/WRITE/INACTIVE, therefore actual close must be
531 * done at INACTIVE time). Unfortunatley, puffs_setback
532 * crashes when called on OPEN, therefore leave it for
533 * another day.
534 */
535 #ifdef notyet
536 puffs_flags |= PUFFS_FLAG_IAONDEMAND;
537 #endif
538
539 if (perfuse_diagflags & PDF_PUFFS)
540 puffs_flags |= PUFFS_FLAG_OPDUMP;
541
542 if ((pu = puffs_init(pops, source, fstype, ps, puffs_flags)) == NULL)
543 DERR(EX_OSERR, "%s: puffs_init failed", __func__);
544
545 puffs_setncookiehash(pu, PUFFS_PNODEBUCKETS);
546
547 ps->ps_pu = pu;
548
549 /*
550 * Setup filesystem root
551 */
552 pn_root = perfuse_new_pn(pu, "", NULL);
553 PERFUSE_NODE_DATA(pn_root)->pnd_nodeid = FUSE_ROOT_ID;
554 PERFUSE_NODE_DATA(pn_root)->pnd_parent_nodeid = FUSE_ROOT_ID;
555 perfuse_node_cache(ps, pn_root);
556 puffs_setroot(pu, pn_root);
557 ps->ps_fsid = pn_root->pn_va.va_fsid;
558
559 po_root = puffs_getrootpathobj(pu);
560 if ((po_root->po_path = strdup("/")) == NULL)
561 DERRX(EX_OSERR, "perfuse_mount_start() failed");
562
563 po_root->po_len = 1;
564 puffs_path_buildhash(pu, po_root);
565
566 puffs_vattr_null(&pn_root->pn_va);
567 pn_root->pn_va.va_type = VDIR;
568 pn_root->pn_va.va_mode = 0755;
569 pn_root->pn_va.va_fileid = FUSE_ROOT_ID;
570
571 ps->ps_root = pn_root;
572
573 /*
574 * Callbacks
575 */
576 ps->ps_new_msg = pc->pc_new_msg;
577 ps->ps_xchg_msg = pc->pc_xchg_msg;
578 ps->ps_destroy_msg = pc->pc_destroy_msg;
579 ps->ps_get_inhdr = pc->pc_get_inhdr;
580 ps->ps_get_inpayload = pc->pc_get_inpayload;
581 ps->ps_get_outhdr = pc->pc_get_outhdr;
582 ps->ps_get_outpayload = pc->pc_get_outpayload;
583 ps->ps_umount = pc->pc_umount;
584
585 pc->pc_fsreq = *perfuse_fsreq;
586
587 return pu;
588 }
589
590 void
591 perfuse_setspecific(struct puffs_usermount *pu, void *priv)
592 {
593 struct perfuse_state *ps;
594
595 ps = puffs_getspecific(pu);
596 ps->ps_private = priv;
597
598 return;
599 }
600
601 void *
602 perfuse_getspecific(struct puffs_usermount *pu)
603 {
604 struct perfuse_state *ps;
605
606 ps = puffs_getspecific(pu);
607
608 return ps->ps_private;
609 }
610
611 int
612 perfuse_inloop(struct puffs_usermount *pu)
613 {
614 struct perfuse_state *ps;
615
616 ps = puffs_getspecific(pu);
617
618 return ps->ps_flags & PS_INLOOP;
619 }
620
621 int
622 perfuse_mainloop(struct puffs_usermount *pu)
623 {
624 struct perfuse_state *ps;
625
626 ps = puffs_getspecific(pu);
627
628 ps->ps_flags |= PS_INLOOP;
629 if (puffs_mainloop(ps->ps_pu) != 0) {
630 DERR(EX_OSERR, "%s: failed", __func__);
631 return -1;
632 }
633
634 /*
635 * Normal exit after unmount
636 */
637 return 0;
638 }
639
640 /* ARGSUSED0 */
641 uint64_t
642 perfuse_get_nodeid(struct puffs_usermount *pu, puffs_cookie_t opc)
643 {
644 return PERFUSE_NODE_DATA(opc)->pnd_nodeid;
645 }
646
647 int
648 perfuse_unmount(struct puffs_usermount *pu)
649 {
650 struct perfuse_state *ps;
651
652 ps = puffs_getspecific(pu);
653
654 return unmount(ps->ps_target, MNT_FORCE);
655 }
656
657 void
658 perfuse_fsreq(struct puffs_usermount *pu, perfuse_msg_t *pm)
659 {
660 struct perfuse_state *ps;
661 struct fuse_out_header *foh;
662
663 ps = puffs_getspecific(pu);
664 foh = GET_OUTHDR(ps, pm);
665
666 /*
667 * There are some operations we may use in a Fire and Forget wey,
668 * because the kernel does not await a reply, but FUSE still
669 * sends a reply. This happens for fsyc, setattr (for metadata
670 * associated with a fsync) and write (for VOP_PUTPAGES). Ignore
671 * if it was fine, warn or abort otherwise.
672 */
673 switch (foh->error) {
674 case 0:
675 break;
676 case -ENOENT:
677 /* File disapeared during a FAF operation */
678 break;
679 case -ENOTCONN: /* FALLTHROUGH */
680 case -EAGAIN: /* FALLTHROUGH */
681 case -EMSGSIZE:
682 DWARN("operation unique = %"PRId64" failed", foh->unique);
683 break;
684 default:
685 DWARNX("Unexpected frame: unique = %"PRId64", error = %d",
686 foh->unique, foh->error);
687 /* NOTREACHED */
688 break;
689 }
690
691 ps->ps_destroy_msg(pm);
692
693 return;
694 }
695