2011-10-30 09:11:37 +04:00
|
|
|
/* $NetBSD: perfuse.c,v 1.23 2011/10/30 05:11:37 manu Exp $ */
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
/*-
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
* Copyright (c) 2010-2011 Emmanuel Dreyfus. All rights reserved.
|
2010-08-25 11:16:00 +04:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
|
|
|
|
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
|
|
|
|
* TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
|
|
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <puffs.h>
|
|
|
|
#include <sys/types.h>
|
2011-09-09 19:35:22 +04:00
|
|
|
#include <sys/mman.h>
|
2011-10-23 09:01:00 +04:00
|
|
|
#include <sys/resource.h>
|
2010-08-25 11:16:00 +04:00
|
|
|
#include <sys/socket.h>
|
2011-06-28 20:19:16 +04:00
|
|
|
#include <sys/extattr.h>
|
2010-08-25 11:16:00 +04:00
|
|
|
#include <sys/un.h>
|
2010-09-15 05:51:43 +04:00
|
|
|
#include <machine/vmparam.h>
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
#define LIBPERFUSE
|
|
|
|
#include "perfuse.h"
|
|
|
|
#include "perfuse_if.h"
|
|
|
|
#include "perfuse_priv.h"
|
|
|
|
|
|
|
|
int perfuse_diagflags = 0; /* global used only in DPRINTF/DERR/DWARN */
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
extern char **environ;
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
static struct perfuse_state *init_state(void);
|
|
|
|
static int get_fd(const char *);
|
|
|
|
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
static struct perfuse_state *
|
|
|
|
init_state(void)
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
char opts[1024];
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
if ((ps = malloc(sizeof(*ps))) == NULL)
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: malloc failed", __func__);
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
(void)memset(ps, 0, sizeof(*ps));
|
|
|
|
ps->ps_max_write = UINT_MAX;
|
|
|
|
ps->ps_max_readahead = UINT_MAX;
|
|
|
|
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
/*
|
|
|
|
* Most of the time, access() is broken because the filesystem
|
|
|
|
* performs the check with root privileges. glusterfs will do that
|
|
|
|
* if the Linux-specific setfsuid() is missing, for instance.
|
|
|
|
*/
|
|
|
|
ps->ps_flags |= PS_NO_ACCESS;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is a temporary way to toggle access and creat usage.
|
|
|
|
* It would be nice if that could be provided as mount options,
|
|
|
|
* but that will not be obvious to do.
|
|
|
|
*/
|
|
|
|
if (getenv_r("PERFUSE_OPTIONS", opts, sizeof(opts)) != -1) {
|
|
|
|
char *optname;
|
|
|
|
char *last;
|
|
|
|
|
|
|
|
for ((optname = strtok_r(opts, ",", &last));
|
|
|
|
optname != NULL;
|
|
|
|
(optname = strtok_r(NULL, ",", &last))) {
|
|
|
|
if (strcmp(optname, "enable_access") == 0)
|
|
|
|
ps->ps_flags &= ~PS_NO_ACCESS;
|
|
|
|
|
|
|
|
if (strcmp(optname, "disable_access") == 0)
|
|
|
|
ps->ps_flags |= PS_NO_ACCESS;
|
|
|
|
|
|
|
|
if (strcmp(optname, "enable_creat") == 0)
|
|
|
|
ps->ps_flags &= ~PS_NO_CREAT;
|
|
|
|
|
|
|
|
if (strcmp(optname, "disable_creat") == 0)
|
|
|
|
ps->ps_flags |= PS_NO_CREAT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
return ps;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
get_fd(data)
|
|
|
|
const char *data;
|
|
|
|
{
|
|
|
|
char *string;
|
|
|
|
const char fdopt[] = "fd=";
|
|
|
|
char *lastp;
|
|
|
|
char *opt;
|
|
|
|
int fd = -1;
|
|
|
|
|
|
|
|
if ((string = strdup(data)) == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
for (opt = strtok_r(string, ",", &lastp);
|
|
|
|
opt != NULL;
|
|
|
|
opt = strtok_r(NULL, ",", &lastp)) {
|
|
|
|
if (strncmp(opt, fdopt, strlen(fdopt)) == 0) {
|
|
|
|
fd = atoi(opt + strlen(fdopt));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No file descriptor found
|
|
|
|
*/
|
|
|
|
if (fd == -1)
|
|
|
|
errno = EINVAL;
|
|
|
|
|
|
|
|
free(string);
|
|
|
|
return fd;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
perfuse_open(path, flags, mode)
|
|
|
|
const char *path;
|
|
|
|
int flags;
|
|
|
|
mode_t mode;
|
|
|
|
{
|
2010-08-27 13:58:17 +04:00
|
|
|
int sv[2];
|
2010-08-25 11:16:00 +04:00
|
|
|
struct sockaddr_un sun;
|
|
|
|
struct sockaddr *sa;
|
2010-08-27 13:58:17 +04:00
|
|
|
char progname[] = _PATH_PERFUSED;
|
|
|
|
char minus_i[] = "-i";
|
|
|
|
char fdstr[16];
|
|
|
|
char *const argv[] = { progname, minus_i, fdstr, NULL};
|
2010-09-15 05:51:43 +04:00
|
|
|
uint32_t opt;
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
uint32_t optlen;
|
2011-05-30 18:50:08 +04:00
|
|
|
int sock_type = SOCK_SEQPACKET;
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
if (strcmp(path, _PATH_FUSE) != 0)
|
|
|
|
return open(path, flags, mode);
|
|
|
|
|
2011-05-30 18:50:08 +04:00
|
|
|
/*
|
|
|
|
* Try SOCK_SEQPACKET then SOCK_DGRAM if unavailable
|
|
|
|
*/
|
|
|
|
if ((sv[0] = socket(PF_LOCAL, SOCK_SEQPACKET, 0)) == -1) {
|
|
|
|
sock_type = SOCK_DGRAM;
|
|
|
|
DWARNX("SEQPACKET local sockets unavailable, using less "
|
|
|
|
"reliable DGRAM sockets. Expect file operation hangs.");
|
|
|
|
|
|
|
|
if ((sv[0] = socket(PF_LOCAL, SOCK_DGRAM, 0)) == -1) {
|
2010-08-25 11:16:00 +04:00
|
|
|
#ifdef PERFUSE_DEBUG
|
2011-08-14 03:12:15 +04:00
|
|
|
DWARN("%s: %d socket failed", __func__, __LINE__);
|
2010-08-25 11:16:00 +04:00
|
|
|
#endif
|
2011-05-30 18:50:08 +04:00
|
|
|
return -1;
|
|
|
|
}
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
|
|
|
|
2010-09-15 05:51:43 +04:00
|
|
|
/*
|
|
|
|
* Set a buffer lentgh large enough so that any FUSE packet
|
|
|
|
* will fit.
|
|
|
|
*/
|
2011-09-10 02:51:44 +04:00
|
|
|
opt = (uint32_t)FUSE_BUFSIZE;
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
optlen = sizeof(opt);
|
|
|
|
if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
|
|
|
|
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
|
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
sa = (struct sockaddr *)(void *)&sun;
|
|
|
|
sun.sun_len = sizeof(sun);
|
|
|
|
sun.sun_family = AF_LOCAL;
|
|
|
|
(void)strcpy(sun.sun_path, path);
|
|
|
|
|
2011-05-30 18:50:08 +04:00
|
|
|
if (connect(sv[0], sa, (socklen_t)sun.sun_len) == 0)
|
2010-08-27 13:58:17 +04:00
|
|
|
return sv[0];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to run perfused on our own
|
|
|
|
* if it does not run yet; In that case
|
|
|
|
* we will talk using a socketpair
|
|
|
|
* instead of /dev/fuse.
|
|
|
|
*/
|
2011-05-30 18:50:08 +04:00
|
|
|
if (socketpair(PF_LOCAL, sock_type, 0, sv) != 0) {
|
2010-09-07 06:11:04 +04:00
|
|
|
DWARN("%s:%d: socketpair failed", __func__, __LINE__);
|
2010-08-25 11:16:00 +04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-09-15 05:51:43 +04:00
|
|
|
/*
|
|
|
|
* Set a buffer lentgh large enough so that any FUSE packet
|
|
|
|
* will fit.
|
|
|
|
*/
|
2011-09-10 02:51:44 +04:00
|
|
|
opt = (uint32_t)(4 * FUSE_BUFSIZE);
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
optlen = sizeof(opt);
|
|
|
|
if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
|
|
|
|
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
|
|
|
|
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
if (setsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
|
|
|
|
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
if (setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Request peer credentials. This musr be done before first
|
|
|
|
* frame is sent.
|
|
|
|
*/
|
|
|
|
opt = 1;
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
optlen = sizeof(opt);
|
|
|
|
if (setsockopt(sv[1], 0, LOCAL_CREDS, &opt, optlen) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s: setsockopt LOCAL_CREDS failed", __func__);
|
|
|
|
|
2010-08-27 13:58:17 +04:00
|
|
|
(void)sprintf(fdstr, "%d", sv[1]);
|
|
|
|
|
|
|
|
switch(fork()) {
|
|
|
|
case -1:
|
|
|
|
#ifdef PERFUSE_DEBUG
|
2010-09-07 06:11:04 +04:00
|
|
|
DWARN("%s:%d: fork failed", __func__, __LINE__);
|
2010-08-27 13:58:17 +04:00
|
|
|
#endif
|
|
|
|
return -1;
|
|
|
|
/* NOTREACHED */
|
|
|
|
break;
|
|
|
|
case 0:
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
(void)execve(argv[0], argv, environ);
|
2010-08-27 13:58:17 +04:00
|
|
|
#ifdef PERFUSE_DEBUG
|
2010-09-07 06:11:04 +04:00
|
|
|
DWARN("%s:%d: execve failed", __func__, __LINE__);
|
2010-08-27 13:58:17 +04:00
|
|
|
#endif
|
|
|
|
return -1;
|
|
|
|
/* NOTREACHED */
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sv[0];
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
perfuse_mount(source, target, filesystemtype, mountflags, data)
|
|
|
|
const char *source;
|
|
|
|
const char *target;
|
|
|
|
const char *filesystemtype;
|
|
|
|
long mountflags;
|
|
|
|
const void *data;
|
|
|
|
{
|
|
|
|
int s;
|
|
|
|
size_t len;
|
2010-09-15 05:51:43 +04:00
|
|
|
struct perfuse_mount_out *pmo;
|
|
|
|
struct sockaddr_storage ss;
|
2010-09-20 11:00:21 +04:00
|
|
|
struct sockaddr_un *sun;
|
2010-09-15 05:51:43 +04:00
|
|
|
struct sockaddr *sa;
|
|
|
|
socklen_t sa_len;
|
|
|
|
size_t sock_len;
|
|
|
|
char *frame;
|
|
|
|
char *cp;
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
#ifdef PERFUSE_DEBUG
|
2010-09-07 06:11:04 +04:00
|
|
|
if (perfuse_diagflags & PDF_MISC)
|
|
|
|
DPRINTF("%s(\"%s\", \"%s\", \"%s\", 0x%lx, \"%s\")\n",
|
|
|
|
__func__, source, target, filesystemtype,
|
|
|
|
mountflags, (const char *)data);
|
2010-08-25 11:16:00 +04:00
|
|
|
#endif
|
|
|
|
|
|
|
|
if ((s = get_fd(data)) == -1)
|
|
|
|
return -1;
|
|
|
|
|
2010-09-15 05:51:43 +04:00
|
|
|
/*
|
|
|
|
* If we are connected to /dev/fuse, we need a second
|
|
|
|
* socket to get replies from perfused.
|
|
|
|
* XXX This socket is not removed at exit time yet
|
|
|
|
*/
|
|
|
|
sock_len = 0;
|
|
|
|
sa = (struct sockaddr *)(void *)&ss;
|
2010-09-20 11:00:21 +04:00
|
|
|
sun = (struct sockaddr_un *)(void *)&ss;
|
2010-09-15 05:51:43 +04:00
|
|
|
sa_len = sizeof(ss);
|
|
|
|
if ((getpeername(s, sa, &sa_len) == 0) &&
|
|
|
|
(sa->sa_family = AF_LOCAL) &&
|
2010-09-20 11:00:21 +04:00
|
|
|
(strcmp(sun->sun_path, _PATH_FUSE) == 0)) {
|
2010-09-15 05:51:43 +04:00
|
|
|
|
2010-09-20 11:00:21 +04:00
|
|
|
sun->sun_len = sizeof(*sun);
|
|
|
|
sun->sun_family = AF_LOCAL;
|
|
|
|
(void)sprintf(sun->sun_path, "%s/%s-%d",
|
2010-09-15 05:51:43 +04:00
|
|
|
_PATH_TMP, getprogname(), getpid());
|
|
|
|
|
2010-09-20 11:00:21 +04:00
|
|
|
if (bind(s, sa, (socklen_t)sa->sa_len) != 0)
|
2010-09-15 05:51:43 +04:00
|
|
|
DERR(EX_OSERR, "%s:%d bind to \"%s\" failed",
|
2010-09-20 11:00:21 +04:00
|
|
|
__func__, __LINE__, sun->sun_path);
|
2010-09-15 05:51:43 +04:00
|
|
|
|
2010-09-20 11:00:21 +04:00
|
|
|
sock_len = strlen(sun->sun_path) + 1;
|
2010-09-15 05:51:43 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
len = sizeof(*pmo);
|
|
|
|
len += source ? (uint32_t)strlen(source) + 1 : 0;
|
|
|
|
len += target ? (uint32_t)strlen(target) + 1 : 0;
|
|
|
|
len += filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
|
|
|
|
len += data ? (uint32_t)strlen(data) + 1 : 0;
|
|
|
|
len += sock_len;
|
|
|
|
|
|
|
|
if ((frame = malloc(len)) == NULL) {
|
2010-08-25 11:16:00 +04:00
|
|
|
#ifdef PERFUSE_DEBUG
|
2010-09-07 06:11:04 +04:00
|
|
|
if (perfuse_diagflags & PDF_MISC)
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s:%d malloc failed", __func__, __LINE__);
|
2010-08-25 11:16:00 +04:00
|
|
|
#endif
|
|
|
|
return -1;
|
|
|
|
}
|
2010-09-15 05:51:43 +04:00
|
|
|
|
|
|
|
pmo = (struct perfuse_mount_out *)(void *)frame;
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
pmo->pmo_len = (uint32_t)len;
|
2010-09-15 05:51:43 +04:00
|
|
|
pmo->pmo_error = 0;
|
|
|
|
pmo->pmo_unique = (uint64_t)-1;
|
|
|
|
(void)strcpy(pmo->pmo_magic, PERFUSE_MOUNT_MAGIC);
|
|
|
|
|
|
|
|
pmo->pmo_source_len = source ? (uint32_t)strlen(source) + 1 : 0;
|
|
|
|
pmo->pmo_target_len = target ? (uint32_t)strlen(target) + 1: 0;
|
|
|
|
pmo->pmo_filesystemtype_len =
|
|
|
|
filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
|
|
|
|
pmo->pmo_mountflags = (uint32_t)mountflags;
|
|
|
|
pmo->pmo_data_len = data ? (uint32_t)strlen(data) + 1 : 0;
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
pmo->pmo_sock_len = (uint32_t)sock_len;
|
2010-08-25 11:16:00 +04:00
|
|
|
|
2010-09-15 05:51:43 +04:00
|
|
|
cp = (char *)(void *)(pmo + 1);
|
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
if (source) {
|
2010-09-15 05:51:43 +04:00
|
|
|
(void)strcpy(cp, source);
|
|
|
|
cp += pmo->pmo_source_len;
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (target) {
|
2010-09-15 05:51:43 +04:00
|
|
|
(void)strcpy(cp, target);
|
|
|
|
cp += pmo->pmo_target_len;
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
2010-09-15 05:51:43 +04:00
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
if (filesystemtype) {
|
2010-09-15 05:51:43 +04:00
|
|
|
(void)strcpy(cp, filesystemtype);
|
|
|
|
cp += pmo->pmo_filesystemtype_len;
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (data) {
|
2010-09-15 05:51:43 +04:00
|
|
|
(void)strcpy(cp, data);
|
|
|
|
cp += pmo->pmo_data_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sock_len != 0) {
|
2010-09-20 11:00:21 +04:00
|
|
|
(void)strcpy(cp, sun->sun_path);
|
2010-09-15 05:51:43 +04:00
|
|
|
cp += pmo->pmo_sock_len;
|
|
|
|
}
|
|
|
|
|
- Implement proper unprivilegied user permission verifications
Verification is now done in the lookup method, as it is the way to
go. Of course there are corner cases, such as the sticky bit which
need special handling in the remove method.
- Set full fsidx in vftstat method
- Do not pass O_APPEND to the filesystem. FUSE always sends the
write offset, so setting O_APPEND is useless. If the filesystem
uses it in an open(2) system call, it will even cause file
corruptions, since offsets given to pwrite(2) will be ignored.
This fix allows glusterfs to host a NetBSD ./build.sh -o build
- Do not use the FUSE access method, use getattr and check for
permission on our own. The problem is that a FUSE filesystem will
typically use the Linux-specific setfsuid() to perform access
control. If that is missing, any chack is likely to occur on
behalf of the user running the filesystem (typically root), causing
access method to return wrong information.
- When possible, avoid performing a getattr method call and use
cached value in puffs_node instead. We still retreive the latest
value by calling getattr when performing append write operation,
to minimize the chances that another writer appended since the
last time we did.
- Update puffs_node cached file size in write method
- Remove unused argument to perfuse_destroy_pn()
2011-04-25 08:54:53 +04:00
|
|
|
if (send(s, frame, len, MSG_NOSIGNAL) != (ssize_t)len) {
|
2010-08-25 11:16:00 +04:00
|
|
|
#ifdef PERFUSE_DEBUG
|
2010-09-15 05:51:43 +04:00
|
|
|
DWARN("%s:%d sendto failed", __func__, __LINE__);
|
2010-08-25 11:16:00 +04:00
|
|
|
#endif
|
2010-09-15 05:51:43 +04:00
|
|
|
return -1;
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
uint64_t
|
|
|
|
perfuse_next_unique(pu)
|
|
|
|
struct puffs_usermount *pu;
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
|
|
|
|
|
|
|
ps = puffs_getspecific(pu);
|
|
|
|
|
|
|
|
return ps->ps_unique++;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct puffs_usermount *
|
|
|
|
perfuse_init(pc, pmi)
|
|
|
|
struct perfuse_callbacks *pc;
|
|
|
|
struct perfuse_mount_info *pmi;
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
|
|
|
struct puffs_usermount *pu;
|
|
|
|
struct puffs_ops *pops;
|
2011-05-12 14:32:41 +04:00
|
|
|
const char *source = _PATH_PUFFS;
|
|
|
|
char *fstype;
|
2010-08-25 11:16:00 +04:00
|
|
|
unsigned int puffs_flags;
|
|
|
|
struct puffs_node *pn_root;
|
|
|
|
struct puffs_pathobj *po_root;
|
2011-10-23 09:01:00 +04:00
|
|
|
struct rlimit rl;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* perfused can grow quite large, let assume there's enough ram ...
|
|
|
|
*/
|
|
|
|
if (getrlimit(RLIMIT_DATA, &rl) < 0) {
|
|
|
|
DERR(EX_OSERR, "%s: getrlimit failed: %s", __func__,
|
|
|
|
strerror(errno));
|
|
|
|
} else {
|
|
|
|
rl.rlim_cur = rl.rlim_max;
|
|
|
|
if (setrlimit(RLIMIT_DATA, &rl) < 0) {
|
|
|
|
DERR(EX_OSERR, "%s: setrlimit failed: %s", __func__,
|
|
|
|
strerror(errno));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
ps = init_state();
|
2010-08-27 13:58:17 +04:00
|
|
|
ps->ps_owner_uid = pmi->pmi_uid;
|
2010-08-25 11:16:00 +04:00
|
|
|
|
2011-05-12 14:32:41 +04:00
|
|
|
if (pmi->pmi_source) {
|
|
|
|
if ((ps->ps_source = strdup(pmi->pmi_source)) == NULL)
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: strdup failed", __func__);
|
2011-05-12 14:32:41 +04:00
|
|
|
|
|
|
|
source = ps->ps_source;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pmi->pmi_filesystemtype) {
|
|
|
|
size_t len;
|
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
ps->ps_filesystemtype = strdup(pmi->pmi_filesystemtype);
|
2011-05-12 14:32:41 +04:00
|
|
|
if (ps->ps_filesystemtype == NULL)
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: strdup failed", __func__);
|
2011-05-12 14:32:41 +04:00
|
|
|
|
|
|
|
len = sizeof("perfuse|") + strlen(ps->ps_filesystemtype) + 1;
|
|
|
|
if ((fstype = malloc(len)) == NULL)
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: malloc failed", __func__);
|
2011-05-12 14:32:41 +04:00
|
|
|
|
|
|
|
(void)sprintf(fstype, "perfuse|%s", ps->ps_filesystemtype);
|
|
|
|
} else {
|
|
|
|
if ((fstype = strdup("perfuse")) == NULL)
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: strdup failed", __func__);
|
2011-05-12 14:32:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if ((ps->ps_target = strdup(pmi->pmi_target)) == NULL)
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: strdup failed", __func__);
|
2011-05-12 14:32:41 +04:00
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
ps->ps_mountflags = pmi->pmi_mountflags;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some options are forbidden for non root users
|
|
|
|
*/
|
2010-08-27 13:58:17 +04:00
|
|
|
if (ps->ps_owner_uid != 0)
|
2010-08-25 11:16:00 +04:00
|
|
|
ps->ps_mountflags |= MNT_NOSUID|MNT_NODEV;
|
|
|
|
|
|
|
|
PUFFSOP_INIT(pops);
|
|
|
|
PUFFSOP_SET(pops, perfuse, fs, unmount);
|
|
|
|
PUFFSOP_SET(pops, perfuse, fs, statvfs);
|
|
|
|
PUFFSOP_SET(pops, perfuse, fs, sync);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, lookup);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, create);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, mknod);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, open);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, close);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, access);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, getattr);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, setattr);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, poll);
|
|
|
|
#if 0
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, mmap);
|
|
|
|
#endif
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, fsync);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, seek);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, remove);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, link);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, rename);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, mkdir);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, rmdir);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, symlink);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, readdir);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, readlink);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, reclaim);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, inactive);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, print);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, advlock);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, read);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, write);
|
2011-06-28 20:19:16 +04:00
|
|
|
#ifdef PUFFS_EXTNAMELEN
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, getextattr);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, setextattr);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, listextattr);
|
|
|
|
PUFFSOP_SET(pops, perfuse, node, deleteextattr);
|
|
|
|
#endif /* PUFFS_EXTNAMELEN */
|
2010-08-25 11:16:00 +04:00
|
|
|
|
2011-08-09 10:58:33 +04:00
|
|
|
/*
|
|
|
|
* We used to have PUFFS_KFLAG_WTCACHE here, which uses the
|
|
|
|
* page cache (highly desirable to get mmap(2)), but still sends
|
|
|
|
* all writes to the filesystem. In fact it does not send the
|
|
|
|
* data written, but the pages that contain it.
|
|
|
|
*
|
|
|
|
* There is a nasty bug hidden somewhere, possibly in libpuffs'
|
|
|
|
* VOP_FSYNC, which sends an asynchronous PUFFS_SETATTR that
|
|
|
|
* update file size. When writes are in progress, it will cause
|
|
|
|
* the file to be truncated and we get a zero-filled chunk at the
|
|
|
|
* beginning of a page. Removing PUFFS_KFLAG_WTCACHE fixes that
|
|
|
|
* problem.
|
|
|
|
*
|
|
|
|
* The other consequences are that changes will not be propagated
|
|
|
|
* immediatly to the filesystem, and we get a huge performance gain
|
|
|
|
* because much less requests are sent. A test case for the above
|
|
|
|
* mentioned bug got its execution time slashed by factor 50.
|
2011-10-30 09:11:37 +04:00
|
|
|
*
|
|
|
|
* PUFFS_KFLAG_NOCACHE_NAME is required so that we can see changes
|
|
|
|
* done by other machines in networked filesystems.
|
2011-08-09 10:58:33 +04:00
|
|
|
*/
|
2011-10-30 09:11:37 +04:00
|
|
|
puffs_flags = PUFFS_KFLAG_NOCACHE_NAME;
|
2010-09-29 12:01:10 +04:00
|
|
|
|
2010-08-25 11:16:00 +04:00
|
|
|
if (perfuse_diagflags & PDF_PUFFS)
|
|
|
|
puffs_flags |= PUFFS_FLAG_OPDUMP;
|
|
|
|
|
2011-05-12 14:32:41 +04:00
|
|
|
if ((pu = puffs_init(pops, source, fstype, ps, puffs_flags)) == NULL)
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: puffs_init failed", __func__);
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
ps->ps_pu = pu;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Setup filesystem root
|
|
|
|
*/
|
2010-10-03 09:46:47 +04:00
|
|
|
pn_root = perfuse_new_pn(pu, "", NULL);
|
2011-10-30 09:11:37 +04:00
|
|
|
PERFUSE_NODE_DATA(pn_root)->pnd_nodeid = FUSE_ROOT_ID;
|
2010-08-28 07:46:21 +04:00
|
|
|
PERFUSE_NODE_DATA(pn_root)->pnd_parent = pn_root;
|
2010-08-25 11:16:00 +04:00
|
|
|
puffs_setroot(pu, pn_root);
|
|
|
|
ps->ps_fsid = pn_root->pn_va.va_fsid;
|
|
|
|
|
|
|
|
po_root = puffs_getrootpathobj(pu);
|
|
|
|
if ((po_root->po_path = strdup("/")) == NULL)
|
|
|
|
DERRX(EX_OSERR, "perfuse_mount_start() failed");
|
|
|
|
|
|
|
|
po_root->po_len = 1;
|
|
|
|
puffs_path_buildhash(pu, po_root);
|
|
|
|
|
|
|
|
puffs_vattr_null(&pn_root->pn_va);
|
|
|
|
pn_root->pn_va.va_type = VDIR;
|
|
|
|
pn_root->pn_va.va_mode = 0755;
|
2011-10-30 09:11:37 +04:00
|
|
|
pn_root->pn_va.va_fileid = FUSE_ROOT_ID;
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
ps->ps_root = pn_root;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Callbacks
|
|
|
|
*/
|
|
|
|
ps->ps_new_msg = pc->pc_new_msg;
|
|
|
|
ps->ps_xchg_msg = pc->pc_xchg_msg;
|
|
|
|
ps->ps_destroy_msg = pc->pc_destroy_msg;
|
|
|
|
ps->ps_get_inhdr = pc->pc_get_inhdr;
|
|
|
|
ps->ps_get_inpayload = pc->pc_get_inpayload;
|
|
|
|
ps->ps_get_outhdr = pc->pc_get_outhdr;
|
|
|
|
ps->ps_get_outpayload = pc->pc_get_outpayload;
|
2011-05-30 18:50:08 +04:00
|
|
|
ps->ps_umount = pc->pc_umount;
|
2010-08-25 11:16:00 +04:00
|
|
|
|
|
|
|
return pu;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
perfuse_setspecific(pu, priv)
|
|
|
|
struct puffs_usermount *pu;
|
|
|
|
void *priv;
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
|
|
|
|
|
|
|
ps = puffs_getspecific(pu);
|
|
|
|
ps->ps_private = priv;
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
void *
|
|
|
|
perfuse_getspecific(pu)
|
|
|
|
struct puffs_usermount *pu;
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
|
|
|
|
|
|
|
ps = puffs_getspecific(pu);
|
|
|
|
|
|
|
|
return ps->ps_private;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
perfuse_inloop(pu)
|
|
|
|
struct puffs_usermount *pu;
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
|
|
|
|
|
|
|
ps = puffs_getspecific(pu);
|
|
|
|
|
|
|
|
return ps->ps_flags & PS_INLOOP;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
perfuse_mainloop(pu)
|
|
|
|
struct puffs_usermount *pu;
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
|
|
|
|
|
|
|
ps = puffs_getspecific(pu);
|
|
|
|
|
|
|
|
ps->ps_flags |= PS_INLOOP;
|
2011-05-30 18:50:08 +04:00
|
|
|
if (puffs_mainloop(ps->ps_pu) != 0) {
|
2011-08-14 03:12:15 +04:00
|
|
|
DERR(EX_OSERR, "%s: failed", __func__);
|
2011-05-30 18:50:08 +04:00
|
|
|
return -1;
|
|
|
|
}
|
2010-08-25 11:16:00 +04:00
|
|
|
|
2011-05-30 18:50:08 +04:00
|
|
|
/*
|
|
|
|
* Normal exit after unmount
|
|
|
|
*/
|
|
|
|
return 0;
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* ARGSUSED0 */
|
|
|
|
uint64_t
|
2011-10-30 09:11:37 +04:00
|
|
|
perfuse_get_nodeid(pu, opc)
|
2010-08-25 11:16:00 +04:00
|
|
|
struct puffs_usermount *pu;
|
|
|
|
puffs_cookie_t opc;
|
|
|
|
{
|
2011-10-30 09:11:37 +04:00
|
|
|
return PERFUSE_NODE_DATA(opc)->pnd_nodeid;
|
2010-08-25 11:16:00 +04:00
|
|
|
}
|
2010-08-27 13:58:17 +04:00
|
|
|
|
|
|
|
int
|
|
|
|
perfuse_unmount(pu)
|
|
|
|
struct puffs_usermount *pu;
|
|
|
|
{
|
|
|
|
struct perfuse_state *ps;
|
|
|
|
|
|
|
|
ps = puffs_getspecific(pu);
|
|
|
|
|
|
|
|
return unmount(ps->ps_target, MNT_FORCE);
|
|
|
|
}
|