xref: /netbsd-src/lib/libperfuse/perfuse.c (revision 7f3436c3c948221442df9fcddd6a269c407e31d8)
1*7f3436c3Sandvar /*  $NetBSD: perfuse.c,v 1.45 2024/03/30 22:05:07 andvar Exp $ */
27b1d1ee6Smanu 
37b1d1ee6Smanu /*-
4c3c545a5Smanu  *  Copyright (c) 2010-2011 Emmanuel Dreyfus. All rights reserved.
57b1d1ee6Smanu  *
67b1d1ee6Smanu  *  Redistribution and use in source and binary forms, with or without
77b1d1ee6Smanu  *  modification, are permitted provided that the following conditions
87b1d1ee6Smanu  *  are met:
97b1d1ee6Smanu  *  1. Redistributions of source code must retain the above copyright
107b1d1ee6Smanu  *     notice, this list of conditions and the following disclaimer.
117b1d1ee6Smanu  *  2. Redistributions in binary form must reproduce the above copyright
127b1d1ee6Smanu  *     notice, this list of conditions and the following disclaimer in the
137b1d1ee6Smanu  *     documentation and/or other materials provided with the distribution.
147b1d1ee6Smanu  *
157b1d1ee6Smanu  *  THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
167b1d1ee6Smanu  *  ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
177b1d1ee6Smanu  *  TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
187b1d1ee6Smanu  *  PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
197b1d1ee6Smanu  *  BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
207b1d1ee6Smanu  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
217b1d1ee6Smanu  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
227b1d1ee6Smanu  *  INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
237b1d1ee6Smanu  *  CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
247b1d1ee6Smanu  *  ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
257b1d1ee6Smanu  *  POSSIBILITY OF SUCH DAMAGE.
267b1d1ee6Smanu  */
277b1d1ee6Smanu 
287b1d1ee6Smanu #include <stdio.h>
297b1d1ee6Smanu #include <unistd.h>
307b1d1ee6Smanu #include <stdlib.h>
317b1d1ee6Smanu #include <fcntl.h>
327b1d1ee6Smanu #include <string.h>
337b1d1ee6Smanu #include <errno.h>
347b1d1ee6Smanu #include <puffs.h>
35476dcf2bSchristos #include <inttypes.h>
367b1d1ee6Smanu #include <sys/types.h>
37f19a344aSmanu #include <sys/mman.h>
38aec8bd31Smanu #include <sys/resource.h>
397b1d1ee6Smanu #include <sys/socket.h>
408ae0a67dSmanu #include <sys/extattr.h>
41075ba0e5Smanu #include <sys/hash.h>
427b1d1ee6Smanu #include <sys/un.h>
43e9a8a6acSmanu #include <machine/vmparam.h>
447b1d1ee6Smanu 
457b1d1ee6Smanu #define LIBPERFUSE
467b1d1ee6Smanu #include "perfuse.h"
477b1d1ee6Smanu #include "perfuse_if.h"
487b1d1ee6Smanu #include "perfuse_priv.h"
497b1d1ee6Smanu 
507b1d1ee6Smanu int perfuse_diagflags = 0; /* global used only in DPRINTF/DERR/DWARN */
51c3c545a5Smanu extern char **environ;
527b1d1ee6Smanu 
537b1d1ee6Smanu static struct perfuse_state *init_state(void);
547b1d1ee6Smanu static int get_fd(const char *);
55c3c545a5Smanu 
567b1d1ee6Smanu static struct perfuse_state *
init_state(void)577b1d1ee6Smanu init_state(void)
587b1d1ee6Smanu {
597b1d1ee6Smanu 	struct perfuse_state *ps;
60075ba0e5Smanu 	size_t len;
61c3c545a5Smanu 	char opts[1024];
62075ba0e5Smanu 	int i;
637b1d1ee6Smanu 
647b1d1ee6Smanu 	if ((ps = malloc(sizeof(*ps))) == NULL)
65075ba0e5Smanu 		DERR(EX_OSERR, "%s:%d malloc failed", __func__, __LINE__);
667b1d1ee6Smanu 
677b1d1ee6Smanu 	(void)memset(ps, 0, sizeof(*ps));
687b1d1ee6Smanu 	ps->ps_max_write = UINT_MAX;
697b1d1ee6Smanu 	ps->ps_max_readahead = UINT_MAX;
704fba06adSmanu 	TAILQ_INIT(&ps->ps_trace);
717b1d1ee6Smanu 
72075ba0e5Smanu 	ps->ps_nnidhash = PUFFS_PNODEBUCKETS;
73075ba0e5Smanu 	len = sizeof(*ps->ps_nidhash) * ps->ps_nnidhash;
74075ba0e5Smanu 	if ((ps->ps_nidhash = malloc(len)) == NULL)
75075ba0e5Smanu 		DERR(EX_OSERR, "%s:%d malloc failed", __func__, __LINE__);
76075ba0e5Smanu 	for (i = 0; i < ps->ps_nnidhash; i++)
77075ba0e5Smanu 		LIST_INIT(&ps->ps_nidhash[i]);
78075ba0e5Smanu 
79c3c545a5Smanu 	/*
80c3c545a5Smanu 	 * Most of the time, access() is broken because the filesystem
81c3c545a5Smanu 	 * performs the check with root privileges. glusterfs will do that
82c3c545a5Smanu 	 * if the Linux-specific setfsuid() is missing, for instance.
83c3c545a5Smanu 	 */
84c3c545a5Smanu 	ps->ps_flags |= PS_NO_ACCESS;
85c3c545a5Smanu 
86c3c545a5Smanu 	/*
87c3c545a5Smanu 	 * This is a temporary way to toggle access and creat usage.
88c3c545a5Smanu 	 * It would be nice if that could be provided as mount options,
89c3c545a5Smanu 	 * but that will not be obvious to do.
90c3c545a5Smanu  	 */
91c3c545a5Smanu 	if (getenv_r("PERFUSE_OPTIONS", opts, sizeof(opts)) != -1) {
92c3c545a5Smanu 		char *optname;
93c3c545a5Smanu 		char *last;
94c3c545a5Smanu 
95c3c545a5Smanu 		 for ((optname = strtok_r(opts, ",", &last));
96c3c545a5Smanu 		      optname != NULL;
97c3c545a5Smanu 		      (optname = strtok_r(NULL, ",", &last))) {
98c3c545a5Smanu 			if (strcmp(optname, "enable_access") == 0)
99c3c545a5Smanu 				ps->ps_flags &= ~PS_NO_ACCESS;
100c3c545a5Smanu 
101c3c545a5Smanu 			if (strcmp(optname, "disable_access") == 0)
102c3c545a5Smanu 				ps->ps_flags |= PS_NO_ACCESS;
103c3c545a5Smanu 
104c3c545a5Smanu 			if (strcmp(optname, "enable_creat") == 0)
105c3c545a5Smanu 				ps->ps_flags &= ~PS_NO_CREAT;
106c3c545a5Smanu 
107c3c545a5Smanu 			if (strcmp(optname, "disable_creat") == 0)
108c3c545a5Smanu 				ps->ps_flags |= PS_NO_CREAT;
109c3c545a5Smanu 		}
110c3c545a5Smanu 	}
111c3c545a5Smanu 
112c3c545a5Smanu 
1137b1d1ee6Smanu 	return ps;
1147b1d1ee6Smanu }
1157b1d1ee6Smanu 
1167b1d1ee6Smanu 
1177b1d1ee6Smanu static int
get_fd(const char * data)118e1a2f47fSmatt get_fd(const char *data)
1197b1d1ee6Smanu {
1207b1d1ee6Smanu 	char *string;
1217b1d1ee6Smanu 	const char fdopt[] = "fd=";
1227b1d1ee6Smanu 	char *lastp;
1237b1d1ee6Smanu 	char *opt;
1247b1d1ee6Smanu 	int fd = -1;
1257b1d1ee6Smanu 
1267b1d1ee6Smanu 	if ((string = strdup(data)) == NULL)
1277b1d1ee6Smanu 		return -1;
1287b1d1ee6Smanu 
1297b1d1ee6Smanu 	for (opt = strtok_r(string, ",", &lastp);
1307b1d1ee6Smanu 	     opt != NULL;
1317b1d1ee6Smanu 	     opt = strtok_r(NULL, ",", &lastp)) {
1327b1d1ee6Smanu 		if (strncmp(opt, fdopt, strlen(fdopt)) == 0) {
1337b1d1ee6Smanu 			fd =  atoi(opt + strlen(fdopt));
1347b1d1ee6Smanu 			break;
1357b1d1ee6Smanu 		}
1367b1d1ee6Smanu 	}
1377b1d1ee6Smanu 
1387b1d1ee6Smanu 	/*
1397b1d1ee6Smanu 	 * No file descriptor found
1407b1d1ee6Smanu 	 */
1417b1d1ee6Smanu 	if (fd == -1)
1427b1d1ee6Smanu 		errno = EINVAL;
1437b1d1ee6Smanu 
1447b1d1ee6Smanu 	free(string);
1457b1d1ee6Smanu 	return fd;
1467b1d1ee6Smanu 
1477b1d1ee6Smanu }
1487b1d1ee6Smanu 
14995c12ccdSchristos uint32_t
perfuse_bufvar_from_env(const char * name,uint32_t defval)15095c12ccdSchristos perfuse_bufvar_from_env(const char *name, uint32_t defval)
151edb96218Smanu {
152edb96218Smanu 	char valstr[1024];
153476dcf2bSchristos 	int e;
154476dcf2bSchristos 	uint32_t retval;
155edb96218Smanu 
156476dcf2bSchristos 	if (getenv_r(name, valstr, sizeof(valstr)) == -1)
157476dcf2bSchristos 		return defval;
158edb96218Smanu 
159476dcf2bSchristos 	retval = (uint32_t)strtoi(valstr, NULL, 0, 0, UINT32_MAX, &e);
160476dcf2bSchristos 	if (!e)
161edb96218Smanu 		return retval;
162476dcf2bSchristos 
163476dcf2bSchristos 	DWARNC(e, "conversion from `%s' to uint32_t failed, using %u",
164476dcf2bSchristos 	    valstr, defval);
165476dcf2bSchristos 	return defval;
166edb96218Smanu }
167edb96218Smanu 
1687b1d1ee6Smanu int
perfuse_open(const char * path,int flags,mode_t mode)169e1a2f47fSmatt perfuse_open(const char *path, int flags, mode_t mode)
1707b1d1ee6Smanu {
17113260297Smanu 	int sv[2];
1727b1d1ee6Smanu 	struct sockaddr_un sun;
1737b1d1ee6Smanu 	struct sockaddr *sa;
17413260297Smanu 	char progname[] = _PATH_PERFUSED;
17513260297Smanu 	char minus_i[] = "-i";
17613260297Smanu 	char fdstr[16];
17713260297Smanu 	char *const argv[] = { progname, minus_i, fdstr, NULL};
178e9a8a6acSmanu 	uint32_t opt;
179c3c545a5Smanu 	uint32_t optlen;
18026381d51Smanu 	int sock_type = SOCK_SEQPACKET;
1817b1d1ee6Smanu 
1827b1d1ee6Smanu 	if (strcmp(path, _PATH_FUSE) != 0)
1837b1d1ee6Smanu 		return open(path, flags, mode);
1847b1d1ee6Smanu 
18526381d51Smanu 	/*
18626381d51Smanu 	 * Try SOCK_SEQPACKET then SOCK_DGRAM if unavailable
18726381d51Smanu 	 */
18826381d51Smanu 	if ((sv[0] = socket(PF_LOCAL, SOCK_SEQPACKET, 0)) == -1) {
18926381d51Smanu 		sock_type = SOCK_DGRAM;
19026381d51Smanu                 DWARNX("SEQPACKET local sockets unavailable, using less "
19126381d51Smanu 		       "reliable DGRAM sockets. Expect file operation hangs.");
19226381d51Smanu 
193f4f951a0Smanu 		if ((sv[0] = socket(PF_LOCAL, SOCK_DGRAM, 0)) == -1) {
1947b1d1ee6Smanu #ifdef PERFUSE_DEBUG
195dda15b03Schristos 			DWARN("%s: %d socket failed", __func__, __LINE__);
1967b1d1ee6Smanu #endif
1977b1d1ee6Smanu 			return -1;
1987b1d1ee6Smanu 		}
19926381d51Smanu 	}
2007b1d1ee6Smanu 
201e9a8a6acSmanu 	/*
202bac778e8Smaya 	 * Set a buffer length large enough so that enough FUSE packets
203e9a8a6acSmanu 	 * will fit.
204e9a8a6acSmanu 	 */
20595c12ccdSchristos 	opt = perfuse_bufvar_from_env("PERFUSE_BUFSIZE",
20695c12ccdSchristos 	    (uint32_t)(16 * FUSE_BUFSIZE));
207c3c545a5Smanu 	optlen = sizeof(opt);
208c3c545a5Smanu 	if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
209e9a8a6acSmanu 		DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
210e9a8a6acSmanu 
211c3c545a5Smanu 	if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
212e9a8a6acSmanu 		DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
213e9a8a6acSmanu 
2147b1d1ee6Smanu 	sa = (struct sockaddr *)(void *)&sun;
2157b1d1ee6Smanu 	sun.sun_len = sizeof(sun);
2167b1d1ee6Smanu 	sun.sun_family = AF_LOCAL;
2177b1d1ee6Smanu 	(void)strcpy(sun.sun_path, path);
2187b1d1ee6Smanu 
21913260297Smanu 	if (connect(sv[0], sa, (socklen_t)sun.sun_len) == 0)
22013260297Smanu 		return sv[0];
22113260297Smanu 
22213260297Smanu 	/*
22313260297Smanu 	 * Attempt to run perfused on our own
22413260297Smanu 	 * if it does not run yet; In that case
22513260297Smanu 	 * we will talk using a socketpair
22613260297Smanu 	 * instead of /dev/fuse.
22713260297Smanu 	 */
22826381d51Smanu 	if (socketpair(PF_LOCAL, sock_type, 0, sv) != 0) {
2291e672db8Smanu 		DWARN("%s:%d: socketpair failed", __func__, __LINE__);
2307b1d1ee6Smanu 		return -1;
2317b1d1ee6Smanu 	}
2327b1d1ee6Smanu 
233e9a8a6acSmanu 	/*
234bac778e8Smaya 	 * Set a buffer length large enough so that enough FUSE packets
235e9a8a6acSmanu 	 * will fit.
236e9a8a6acSmanu 	 */
23795c12ccdSchristos 	opt = perfuse_bufvar_from_env("PERFUSE_BUFSIZE",
23895c12ccdSchristos 	    (uint32_t)(16 * FUSE_BUFSIZE));
239c3c545a5Smanu 	optlen = sizeof(opt);
240c3c545a5Smanu 	if (setsockopt(sv[0], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
241e9a8a6acSmanu 		DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
242e9a8a6acSmanu 
243c3c545a5Smanu 	if (setsockopt(sv[0], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
244e9a8a6acSmanu 		DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
245e9a8a6acSmanu 
246c3c545a5Smanu 	if (setsockopt(sv[1], SOL_SOCKET, SO_SNDBUF, &opt, optlen) != 0)
247e9a8a6acSmanu 		DWARN("%s: setsockopt SO_SNDBUF to %d failed", __func__, opt);
248e9a8a6acSmanu 
249c3c545a5Smanu 	if (setsockopt(sv[1], SOL_SOCKET, SO_RCVBUF, &opt, optlen) != 0)
250e9a8a6acSmanu 		DWARN("%s: setsockopt SO_RCVBUF to %d failed", __func__, opt);
251e9a8a6acSmanu 
252e9a8a6acSmanu 	/*
253e9a8a6acSmanu 	 * Request peer credentials. This musr be done before first
254e9a8a6acSmanu 	 * frame is sent.
255e9a8a6acSmanu 	 */
256e9a8a6acSmanu 	opt = 1;
257c3c545a5Smanu 	optlen = sizeof(opt);
258213aa76dSnia 	if (setsockopt(sv[1], SOL_LOCAL, LOCAL_CREDS, &opt, optlen) != 0)
259e9a8a6acSmanu 		DWARN("%s: setsockopt LOCAL_CREDS failed", __func__);
260e9a8a6acSmanu 
26113260297Smanu 	(void)sprintf(fdstr, "%d", sv[1]);
26213260297Smanu 
26313260297Smanu 	switch(fork()) {
26413260297Smanu 	case -1:
26513260297Smanu #ifdef PERFUSE_DEBUG
2661e672db8Smanu 		DWARN("%s:%d: fork failed", __func__, __LINE__);
26713260297Smanu #endif
26813260297Smanu 		return -1;
26913260297Smanu 		/* NOTREACHED */
27013260297Smanu 		break;
27113260297Smanu 	case 0:
2729724ab82Smanu 		(void)close(sv[0]);
273c3c545a5Smanu 		(void)execve(argv[0], argv, environ);
27413260297Smanu #ifdef PERFUSE_DEBUG
2751e672db8Smanu 		DWARN("%s:%d: execve failed", __func__, __LINE__);
27613260297Smanu #endif
27713260297Smanu 		return -1;
27813260297Smanu 		/* NOTREACHED */
27913260297Smanu 		break;
28013260297Smanu 	default:
28113260297Smanu 		break;
28213260297Smanu 	}
28313260297Smanu 
2849724ab82Smanu 	(void)close(sv[1]);
28513260297Smanu 	return sv[0];
2867b1d1ee6Smanu }
2877b1d1ee6Smanu 
2887b1d1ee6Smanu int
perfuse_mount(const char * source,const char * target,const char * filesystemtype,long mountflags,const void * data)289e1a2f47fSmatt perfuse_mount(const char *source, const char *target,
290e1a2f47fSmatt 	const char *filesystemtype, long mountflags, const void *data)
2917b1d1ee6Smanu {
2927b1d1ee6Smanu 	int s;
2937b1d1ee6Smanu 	size_t len;
294e9a8a6acSmanu 	struct perfuse_mount_out *pmo;
295e9a8a6acSmanu 	struct sockaddr_storage ss;
2963d6861b5Smanu 	struct sockaddr_un *sun;
297e9a8a6acSmanu 	struct sockaddr *sa;
298e9a8a6acSmanu 	socklen_t sa_len;
299e9a8a6acSmanu 	size_t sock_len;
300e9a8a6acSmanu 	char *frame;
301e9a8a6acSmanu 	char *cp;
3027b1d1ee6Smanu 
3037b1d1ee6Smanu #ifdef PERFUSE_DEBUG
3041e672db8Smanu 	if (perfuse_diagflags & PDF_MISC)
3051e672db8Smanu 		DPRINTF("%s(\"%s\", \"%s\", \"%s\", 0x%lx, \"%s\")\n",
3061e672db8Smanu 			__func__, source, target, filesystemtype,
3071e672db8Smanu 			mountflags, (const char *)data);
3087b1d1ee6Smanu #endif
3097b1d1ee6Smanu 
3107b1d1ee6Smanu 	if ((s = get_fd(data)) == -1)
3117b1d1ee6Smanu 		return -1;
3127b1d1ee6Smanu 
313e9a8a6acSmanu 	/*
314e9a8a6acSmanu 	 * If we are connected to /dev/fuse, we need a second
315e9a8a6acSmanu 	 * socket to get replies from perfused.
316e9a8a6acSmanu 	 * XXX This socket is not removed at exit time yet
317e9a8a6acSmanu 	 */
318e9a8a6acSmanu 	sock_len = 0;
319e9a8a6acSmanu 	sa = (struct sockaddr *)(void *)&ss;
3203d6861b5Smanu 	sun = (struct sockaddr_un *)(void *)&ss;
321e9a8a6acSmanu 	sa_len = sizeof(ss);
322e9a8a6acSmanu 	if ((getpeername(s, sa, &sa_len) == 0) &&
323e9a8a6acSmanu 	    (sa->sa_family = AF_LOCAL) &&
3243d6861b5Smanu 	    (strcmp(sun->sun_path, _PATH_FUSE) == 0)) {
3257b1d1ee6Smanu 
3263d6861b5Smanu 		sun->sun_len = sizeof(*sun);
3273d6861b5Smanu 		sun->sun_family = AF_LOCAL;
3283d6861b5Smanu 		(void)sprintf(sun->sun_path, "%s/%s-%d",
329e9a8a6acSmanu 			      _PATH_TMP, getprogname(), getpid());
3307b1d1ee6Smanu 
3313d6861b5Smanu 		if (bind(s, sa, (socklen_t)sa->sa_len) != 0)
332e9a8a6acSmanu 			DERR(EX_OSERR, "%s:%d bind to \"%s\" failed",
3333d6861b5Smanu 			     __func__, __LINE__, sun->sun_path);
3347b1d1ee6Smanu 
3353d6861b5Smanu 		sock_len = strlen(sun->sun_path) + 1;
336e9a8a6acSmanu 	}
337e9a8a6acSmanu 
338e9a8a6acSmanu 	len = sizeof(*pmo);
339e9a8a6acSmanu 	len += source ? (uint32_t)strlen(source) + 1 : 0;
340e9a8a6acSmanu 	len += target ? (uint32_t)strlen(target) + 1 : 0;
341e9a8a6acSmanu 	len += filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
342e9a8a6acSmanu 	len += data ? (uint32_t)strlen(data) + 1 : 0;
343e9a8a6acSmanu 	len += sock_len;
344e9a8a6acSmanu 
345e9a8a6acSmanu 	if ((frame = malloc(len)) == NULL) {
3467b1d1ee6Smanu #ifdef PERFUSE_DEBUG
3471e672db8Smanu 		if (perfuse_diagflags & PDF_MISC)
348e9a8a6acSmanu 			DWARN("%s:%d malloc failed", __func__, __LINE__);
3497b1d1ee6Smanu #endif
3507b1d1ee6Smanu 		return -1;
3517b1d1ee6Smanu 	}
3527b1d1ee6Smanu 
353e9a8a6acSmanu 	pmo = (struct perfuse_mount_out *)(void *)frame;
354c3c545a5Smanu 	pmo->pmo_len = (uint32_t)len;
355e9a8a6acSmanu 	pmo->pmo_error = 0;
356e9a8a6acSmanu 	pmo->pmo_unique = (uint64_t)-1;
357e9a8a6acSmanu 	(void)strcpy(pmo->pmo_magic, PERFUSE_MOUNT_MAGIC);
358e9a8a6acSmanu 
359e9a8a6acSmanu 	pmo->pmo_source_len = source ? (uint32_t)strlen(source) + 1 : 0;
360e9a8a6acSmanu 	pmo->pmo_target_len = target ? (uint32_t)strlen(target) + 1: 0;
361e9a8a6acSmanu 	pmo->pmo_filesystemtype_len =
362e9a8a6acSmanu 	    filesystemtype ? (uint32_t)strlen(filesystemtype) + 1 : 0;
363e9a8a6acSmanu 	pmo->pmo_mountflags = (uint32_t)mountflags;
364e9a8a6acSmanu 	pmo->pmo_data_len = data ? (uint32_t)strlen(data) + 1 : 0;
365c3c545a5Smanu 	pmo->pmo_sock_len = (uint32_t)sock_len;
366e9a8a6acSmanu 
367e9a8a6acSmanu 	cp = (char *)(void *)(pmo + 1);
368e9a8a6acSmanu 
3697b1d1ee6Smanu 	if (source) {
370e9a8a6acSmanu 		(void)strcpy(cp, source);
371e9a8a6acSmanu 		cp += pmo->pmo_source_len;
3727b1d1ee6Smanu 	}
3737b1d1ee6Smanu 
3747b1d1ee6Smanu 	if (target) {
375e9a8a6acSmanu 		(void)strcpy(cp, target);
376e9a8a6acSmanu 		cp += pmo->pmo_target_len;
3777b1d1ee6Smanu 	}
3787b1d1ee6Smanu 
3797b1d1ee6Smanu 	if (filesystemtype) {
380e9a8a6acSmanu 		(void)strcpy(cp, filesystemtype);
381e9a8a6acSmanu 		cp += pmo->pmo_filesystemtype_len;
3827b1d1ee6Smanu 	}
3837b1d1ee6Smanu 
3847b1d1ee6Smanu 	if (data) {
385e9a8a6acSmanu 		(void)strcpy(cp, data);
386e9a8a6acSmanu 		cp += pmo->pmo_data_len;
387e9a8a6acSmanu 	}
388e9a8a6acSmanu 
389e9a8a6acSmanu 	if (sock_len != 0) {
3903d6861b5Smanu 		(void)strcpy(cp, sun->sun_path);
391e9a8a6acSmanu 		cp += pmo->pmo_sock_len;
392e9a8a6acSmanu 	}
393e9a8a6acSmanu 
394c3c545a5Smanu 	if (send(s, frame, len, MSG_NOSIGNAL) != (ssize_t)len) {
3957b1d1ee6Smanu #ifdef PERFUSE_DEBUG
396e9a8a6acSmanu 		DWARN("%s:%d sendto failed", __func__, __LINE__);
3977b1d1ee6Smanu #endif
3987b1d1ee6Smanu 		return -1;
3997b1d1ee6Smanu 	}
4007b1d1ee6Smanu 
4017b1d1ee6Smanu 	return 0;
4027b1d1ee6Smanu }
4037b1d1ee6Smanu 
4047b1d1ee6Smanu 
4057b1d1ee6Smanu uint64_t
perfuse_next_unique(struct puffs_usermount * pu)406e1a2f47fSmatt perfuse_next_unique(struct puffs_usermount *pu)
4077b1d1ee6Smanu {
4087b1d1ee6Smanu 	struct perfuse_state *ps;
4097b1d1ee6Smanu 
4107b1d1ee6Smanu 	ps = puffs_getspecific(pu);
4117b1d1ee6Smanu 
4127b1d1ee6Smanu 	return ps->ps_unique++;
4137b1d1ee6Smanu }
4147b1d1ee6Smanu 
415a73bc7adSchristos static void
updatelimit(const char * func,int lim,const char * name)416a73bc7adSchristos updatelimit(const char *func, int lim, const char *name)
417a73bc7adSchristos {
418a73bc7adSchristos 	struct rlimit rl;
419a73bc7adSchristos 
420a73bc7adSchristos 	/* Try infinity but that will fail unless we are root */
421a73bc7adSchristos 	rl.rlim_cur = RLIM_INFINITY;
422a73bc7adSchristos 	rl.rlim_max = RLIM_INFINITY;
423a73bc7adSchristos 	if (setrlimit(lim, &rl) != -1)
424a73bc7adSchristos 		return;
425a73bc7adSchristos 
426a73bc7adSchristos 	/* Get and set to the maximum allowed */
427a73bc7adSchristos 	if (getrlimit(lim, &rl) == -1)
428a73bc7adSchristos 		DERR(EX_OSERR, "%s: getrlimit %s failed", func, name);
429a73bc7adSchristos 
430a73bc7adSchristos 	rl.rlim_cur = rl.rlim_max;
431a73bc7adSchristos 	if (setrlimit(lim, &rl) == -1)
432a73bc7adSchristos 		DERR(EX_OSERR, "%s: setrlimit %s to %ju failed", func,
433a73bc7adSchristos 		    name, (uintmax_t)rl.rlim_cur);
434a73bc7adSchristos }
435a73bc7adSchristos 
4367b1d1ee6Smanu struct puffs_usermount *
perfuse_init(struct perfuse_callbacks * pc,struct perfuse_mount_info * pmi)437e1a2f47fSmatt perfuse_init(struct perfuse_callbacks *pc, struct perfuse_mount_info *pmi)
4387b1d1ee6Smanu {
4397b1d1ee6Smanu 	struct perfuse_state *ps;
4407b1d1ee6Smanu 	struct puffs_usermount *pu;
4417b1d1ee6Smanu 	struct puffs_ops *pops;
4426b36a335Smanu 	const char *source = _PATH_PUFFS;
4436b36a335Smanu 	char *fstype;
4447b1d1ee6Smanu 	unsigned int puffs_flags;
4457b1d1ee6Smanu 	struct puffs_node *pn_root;
4467b1d1ee6Smanu 	struct puffs_pathobj *po_root;
447aec8bd31Smanu 
448aec8bd31Smanu 	/*
449aec8bd31Smanu 	 * perfused can grow quite large, let assume there's enough ram ...
450aec8bd31Smanu 	 */
451a73bc7adSchristos 	updatelimit(__func__, RLIMIT_DATA, "RLIMIT_DATA");
452a73bc7adSchristos 	updatelimit(__func__, RLIMIT_AS, "RLIMIT_AS");
4537b1d1ee6Smanu 
4547b1d1ee6Smanu 	ps = init_state();
45513260297Smanu 	ps->ps_owner_uid = pmi->pmi_uid;
4567b1d1ee6Smanu 
4576b36a335Smanu 	if (pmi->pmi_source) {
4586b36a335Smanu 		if ((ps->ps_source = strdup(pmi->pmi_source)) == NULL)
459dda15b03Schristos 			DERR(EX_OSERR, "%s: strdup failed", __func__);
4606b36a335Smanu 
4616b36a335Smanu 		source = ps->ps_source;
4626b36a335Smanu 	}
4636b36a335Smanu 
4646b36a335Smanu 	if (pmi->pmi_filesystemtype) {
4656b36a335Smanu 		size_t len;
4666b36a335Smanu 
4677b1d1ee6Smanu 		ps->ps_filesystemtype = strdup(pmi->pmi_filesystemtype);
4686b36a335Smanu 		if (ps->ps_filesystemtype == NULL)
469dda15b03Schristos 			DERR(EX_OSERR, "%s: strdup failed", __func__);
4706b36a335Smanu 
4716b36a335Smanu 		len = sizeof("perfuse|") + strlen(ps->ps_filesystemtype) + 1;
4726b36a335Smanu 		if ((fstype = malloc(len)) == NULL)
473dda15b03Schristos 			DERR(EX_OSERR, "%s: malloc failed", __func__);
4746b36a335Smanu 
4756b36a335Smanu 		(void)sprintf(fstype, "perfuse|%s", ps->ps_filesystemtype);
4766b36a335Smanu 	} else {
4776b36a335Smanu 		if ((fstype = strdup("perfuse")) == NULL)
478dda15b03Schristos 			DERR(EX_OSERR, "%s: strdup failed", __func__);
4796b36a335Smanu 	}
4806b36a335Smanu 
4816b36a335Smanu 	if ((ps->ps_target = strdup(pmi->pmi_target)) == NULL)
482dda15b03Schristos 		DERR(EX_OSERR, "%s: strdup failed", __func__);
4836b36a335Smanu 
4847b1d1ee6Smanu 	ps->ps_mountflags = pmi->pmi_mountflags;
4857b1d1ee6Smanu 
4867b1d1ee6Smanu 	/*
4877b1d1ee6Smanu 	 * Some options are forbidden for non root users
4887b1d1ee6Smanu 	 */
48913260297Smanu 	if (ps->ps_owner_uid != 0)
4907b1d1ee6Smanu 	    ps->ps_mountflags |= MNT_NOSUID|MNT_NODEV;
4917b1d1ee6Smanu 
4927b1d1ee6Smanu 	PUFFSOP_INIT(pops);
4937b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, fs, unmount);
4947b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, fs, statvfs);
4957b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, fs, sync);
4967b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, lookup);
4977b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, create);
4987b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, mknod);
4997b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, open);
5007b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, close);
5017b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, access);
5027b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, getattr);
5037b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, setattr);
5047b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, poll);
5057b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, fsync);
5067b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, remove);
5077b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, link);
5087b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, rename);
5097b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, mkdir);
5107b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, rmdir);
5117b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, symlink);
5127b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, readdir);
5137b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, readlink);
5147b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, reclaim);
515b553c427Smanu 	PUFFSOP_SET(pops, perfuse, node, reclaim2);
5167b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, inactive);
5177b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, print);
518bcfebaffSmanu 	PUFFSOP_SET(pops, perfuse, node, pathconf);
5197b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, advlock);
5207b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, read);
5217b1d1ee6Smanu 	PUFFSOP_SET(pops, perfuse, node, write);
5228ae0a67dSmanu #ifdef PUFFS_EXTNAMELEN
5238ae0a67dSmanu 	PUFFSOP_SET(pops, perfuse, node, getextattr);
5248ae0a67dSmanu 	PUFFSOP_SET(pops, perfuse, node, setextattr);
5258ae0a67dSmanu 	PUFFSOP_SET(pops, perfuse, node, listextattr);
5268ae0a67dSmanu 	PUFFSOP_SET(pops, perfuse, node, deleteextattr);
5278ae0a67dSmanu #endif /* PUFFS_EXTNAMELEN */
52870d81924Smanu #ifdef PUFFS_KFLAG_CACHE_FS_TTL
52970d81924Smanu 	PUFFSOP_SET(pops, perfuse, node, getattr_ttl);
53070d81924Smanu 	PUFFSOP_SET(pops, perfuse, node, setattr_ttl);
53170d81924Smanu #endif /* PUFFS_KFLAG_CACHE_FS_TTL */
532075ba0e5Smanu #ifdef PUFFS_SETATTR_FAF
533075ba0e5Smanu 	PUFFSOP_SET(pops, perfuse, node, write2);
534075ba0e5Smanu #endif /* PUFFS_SETATTR_FAF */
535781f78b8Smanu #ifdef PUFFS_OPEN_IO_DIRECT
536781f78b8Smanu 	PUFFSOP_SET(pops, perfuse, node, open2);
537781f78b8Smanu #endif /* PUFFS_OPEN_IO_DIRECT */
5386645d525Smanu #ifdef PUFFS_HAVE_FALLOCATE
5396645d525Smanu 	PUFFSOP_SET(pops, perfuse, node, fallocate);
5406645d525Smanu #endif /* PUFFS_HAVE_FALLOCATE */
5417b1d1ee6Smanu 
54240e8be3fSmanu 	/*
5432bc8acd8Smanu 	 * PUFFS_KFLAG_NOCACHE_NAME is required so that we can see changes
5446bceb418Smanu 	 * done by other machines in networked filesystems. In later
5456bceb418Smanu 	 * NetBSD releases we use the alternative PUFFS_KFLAG_CACHE_FS_TTL,
5466bceb418Smanu 	 * which implement name cache with a filesystem-provided TTL.
54740e8be3fSmanu 	 */
5486bceb418Smanu #ifdef PUFFS_KFLAG_CACHE_FS_TTL
5496bceb418Smanu 	puffs_flags = PUFFS_KFLAG_CACHE_FS_TTL;
5506bceb418Smanu #else
5512bc8acd8Smanu 	puffs_flags = PUFFS_KFLAG_NOCACHE_NAME;
5526bceb418Smanu #endif
5536bceb418Smanu 
5546bceb418Smanu 	/*
5552a9a80bbSmanu 	 * Do not lookuo ..
5562a9a80bbSmanu 	 * That means we keep all parent vnode active
5572a9a80bbSmanu 	 */
5582a9a80bbSmanu #ifdef PUFFS_KFLAG_CACHE_DOTDOT
5592a9a80bbSmanu 	puffs_flags |= PUFFS_KFLAG_CACHE_DOTDOT;
5602a9a80bbSmanu #endif
5612a9a80bbSmanu 
5622a9a80bbSmanu 	/*
5636bceb418Smanu 	 * It would be nice to avoid useless inactive, and only
5646bceb418Smanu 	 * get them on file open for writing (PUFFS does
5656bceb418Smanu 	 * CLOSE/WRITE/INACTIVE, therefore actual close must be
566*7f3436c3Sandvar 	 * done at INACTIVE time). Unfortunately, puffs_setback
5676bceb418Smanu 	 * crashes when called on OPEN, therefore leave it for
5686bceb418Smanu 	 * another day.
5696bceb418Smanu 	 */
5706bceb418Smanu #ifdef notyet
5716bceb418Smanu 	puffs_flags |= PUFFS_FLAG_IAONDEMAND;
5726bceb418Smanu #endif
573f7174423Smanu 
5748abab6b7Smanu 	/*
5758abab6b7Smanu 	 * FUSE filesystem do not expect [amc]time and size
5768abab6b7Smanu 	 * updates to be sent by the kernel, they do the
5778abab6b7Smanu 	 * updates on their own after other operations.
5788abab6b7Smanu 	 */
5798abab6b7Smanu #ifdef PUFFS_KFLAG_NOFLUSH_META
5808abab6b7Smanu 	puffs_flags |= PUFFS_KFLAG_NOFLUSH_META;
5818abab6b7Smanu #endif
5828abab6b7Smanu 
5837b1d1ee6Smanu 	if (perfuse_diagflags & PDF_PUFFS)
5847b1d1ee6Smanu 		puffs_flags |= PUFFS_FLAG_OPDUMP;
5857b1d1ee6Smanu 
5866b36a335Smanu 	if ((pu = puffs_init(pops, source, fstype, ps, puffs_flags)) == NULL)
587dda15b03Schristos 		DERR(EX_OSERR, "%s: puffs_init failed", __func__);
5887b1d1ee6Smanu 
589075ba0e5Smanu 	puffs_setncookiehash(pu, PUFFS_PNODEBUCKETS);
590075ba0e5Smanu 
5917b1d1ee6Smanu 	ps->ps_pu = pu;
5927b1d1ee6Smanu 
5937b1d1ee6Smanu 	/*
5947b1d1ee6Smanu 	 * Setup filesystem root
5957b1d1ee6Smanu 	 */
5962ff0ea03Smanu 	pn_root = perfuse_new_pn(pu, "", NULL);
5972bc8acd8Smanu 	PERFUSE_NODE_DATA(pn_root)->pnd_nodeid = FUSE_ROOT_ID;
598075ba0e5Smanu 	PERFUSE_NODE_DATA(pn_root)->pnd_parent_nodeid = FUSE_ROOT_ID;
599075ba0e5Smanu 	perfuse_node_cache(ps, pn_root);
6007b1d1ee6Smanu 	puffs_setroot(pu, pn_root);
6017b1d1ee6Smanu 	ps->ps_fsid = pn_root->pn_va.va_fsid;
6027b1d1ee6Smanu 
6037b1d1ee6Smanu 	po_root = puffs_getrootpathobj(pu);
6047b1d1ee6Smanu 	if ((po_root->po_path = strdup("/")) == NULL)
6057b1d1ee6Smanu 		DERRX(EX_OSERR, "perfuse_mount_start() failed");
6067b1d1ee6Smanu 
6077b1d1ee6Smanu 	po_root->po_len = 1;
6087b1d1ee6Smanu 	puffs_path_buildhash(pu, po_root);
6097b1d1ee6Smanu 
6107b1d1ee6Smanu 	puffs_vattr_null(&pn_root->pn_va);
6117b1d1ee6Smanu 	pn_root->pn_va.va_type = VDIR;
6127b1d1ee6Smanu 	pn_root->pn_va.va_mode = 0755;
6132bc8acd8Smanu 	pn_root->pn_va.va_fileid = FUSE_ROOT_ID;
6147b1d1ee6Smanu 
6157b1d1ee6Smanu 	ps->ps_root = pn_root;
6167b1d1ee6Smanu 
6177b1d1ee6Smanu 	/*
6187b1d1ee6Smanu 	 *  Callbacks
6197b1d1ee6Smanu 	 */
6207b1d1ee6Smanu 	ps->ps_new_msg = pc->pc_new_msg;
6217b1d1ee6Smanu 	ps->ps_xchg_msg = pc->pc_xchg_msg;
6227b1d1ee6Smanu 	ps->ps_destroy_msg = pc->pc_destroy_msg;
6237b1d1ee6Smanu 	ps->ps_get_inhdr = pc->pc_get_inhdr;
6247b1d1ee6Smanu 	ps->ps_get_inpayload = pc->pc_get_inpayload;
6257b1d1ee6Smanu 	ps->ps_get_outhdr = pc->pc_get_outhdr;
6267b1d1ee6Smanu 	ps->ps_get_outpayload = pc->pc_get_outpayload;
62726381d51Smanu 	ps->ps_umount = pc->pc_umount;
6287b1d1ee6Smanu 
629075ba0e5Smanu 	pc->pc_fsreq = *perfuse_fsreq;
630075ba0e5Smanu 
6317b1d1ee6Smanu 	return pu;
6327b1d1ee6Smanu }
6337b1d1ee6Smanu 
6347b1d1ee6Smanu void
perfuse_setspecific(struct puffs_usermount * pu,void * priv)635e1a2f47fSmatt perfuse_setspecific(struct puffs_usermount *pu, void *priv)
6367b1d1ee6Smanu {
6377b1d1ee6Smanu 	struct perfuse_state *ps;
6387b1d1ee6Smanu 
6397b1d1ee6Smanu 	ps = puffs_getspecific(pu);
6407b1d1ee6Smanu 	ps->ps_private = priv;
6417b1d1ee6Smanu 
6427b1d1ee6Smanu 	return;
6437b1d1ee6Smanu }
6447b1d1ee6Smanu 
6457b1d1ee6Smanu void *
perfuse_getspecific(struct puffs_usermount * pu)646e1a2f47fSmatt perfuse_getspecific(struct puffs_usermount *pu)
6477b1d1ee6Smanu {
6487b1d1ee6Smanu 	struct perfuse_state *ps;
6497b1d1ee6Smanu 
6507b1d1ee6Smanu 	ps = puffs_getspecific(pu);
6517b1d1ee6Smanu 
6527b1d1ee6Smanu 	return ps->ps_private;
6537b1d1ee6Smanu }
6547b1d1ee6Smanu 
6557b1d1ee6Smanu int
perfuse_inloop(struct puffs_usermount * pu)656e1a2f47fSmatt perfuse_inloop(struct puffs_usermount *pu)
6577b1d1ee6Smanu {
6587b1d1ee6Smanu 	struct perfuse_state *ps;
6597b1d1ee6Smanu 
6607b1d1ee6Smanu 	ps = puffs_getspecific(pu);
6617b1d1ee6Smanu 
6627b1d1ee6Smanu 	return ps->ps_flags & PS_INLOOP;
6637b1d1ee6Smanu }
6647b1d1ee6Smanu 
6657b1d1ee6Smanu int
perfuse_mainloop(struct puffs_usermount * pu)666e1a2f47fSmatt perfuse_mainloop(struct puffs_usermount *pu)
6677b1d1ee6Smanu {
6687b1d1ee6Smanu 	struct perfuse_state *ps;
6697b1d1ee6Smanu 
6707b1d1ee6Smanu 	ps = puffs_getspecific(pu);
6717b1d1ee6Smanu 
6727b1d1ee6Smanu 	ps->ps_flags |= PS_INLOOP;
67326381d51Smanu 	if (puffs_mainloop(ps->ps_pu) != 0) {
674dda15b03Schristos 		DERR(EX_OSERR, "%s: failed", __func__);
6757b1d1ee6Smanu 		return -1;
6767b1d1ee6Smanu 	}
6777b1d1ee6Smanu 
67826381d51Smanu 	/*
67926381d51Smanu 	 * Normal exit after unmount
68026381d51Smanu 	 */
68126381d51Smanu 	return 0;
68226381d51Smanu }
68326381d51Smanu 
6847b1d1ee6Smanu /* ARGSUSED0 */
6857b1d1ee6Smanu uint64_t
perfuse_get_nodeid(struct puffs_usermount * pu,puffs_cookie_t opc)686e1a2f47fSmatt perfuse_get_nodeid(struct puffs_usermount *pu, puffs_cookie_t opc)
6877b1d1ee6Smanu {
6882bc8acd8Smanu 	return PERFUSE_NODE_DATA(opc)->pnd_nodeid;
6897b1d1ee6Smanu }
69013260297Smanu 
69113260297Smanu int
perfuse_unmount(struct puffs_usermount * pu)692e1a2f47fSmatt perfuse_unmount(struct puffs_usermount *pu)
69313260297Smanu {
69413260297Smanu 	struct perfuse_state *ps;
69513260297Smanu 
69613260297Smanu 	ps = puffs_getspecific(pu);
69713260297Smanu 
69813260297Smanu 	return unmount(ps->ps_target, MNT_FORCE);
69913260297Smanu }
700075ba0e5Smanu 
701075ba0e5Smanu void
perfuse_fsreq(struct puffs_usermount * pu,perfuse_msg_t * pm)702075ba0e5Smanu perfuse_fsreq(struct puffs_usermount *pu, perfuse_msg_t *pm)
703075ba0e5Smanu {
704075ba0e5Smanu 	struct perfuse_state *ps;
705075ba0e5Smanu 	struct fuse_out_header *foh;
706075ba0e5Smanu 
707075ba0e5Smanu 	ps = puffs_getspecific(pu);
708075ba0e5Smanu 	foh = GET_OUTHDR(ps, pm);
709075ba0e5Smanu 
710075ba0e5Smanu 	/*
7111daa1a7bSandvar 	 * There are some operations we may use in a  Fire and Forget way,
712075ba0e5Smanu 	 * because the kernel does not await a reply, but FUSE still
713075ba0e5Smanu 	 * sends a reply. This happens for fsyc, setattr (for metadata
714075ba0e5Smanu 	 * associated with a fsync) and write (for VOP_PUTPAGES). Ignore
715075ba0e5Smanu 	 * if it was fine, warn or abort otherwise.
716075ba0e5Smanu 	 */
717075ba0e5Smanu 	switch (foh->error) {
718075ba0e5Smanu 	case 0:
719075ba0e5Smanu 		break;
720075ba0e5Smanu 	case -ENOENT:
7211daa1a7bSandvar 		/* File disappeared during a FAF operation */
722075ba0e5Smanu 		break;
723075ba0e5Smanu 	case -ENOTCONN: /* FALLTHROUGH */
724075ba0e5Smanu 	case -EAGAIN: /* FALLTHROUGH */
725075ba0e5Smanu 	case -EMSGSIZE:
726075ba0e5Smanu 		DWARN("operation unique = %"PRId64" failed", foh->unique);
727075ba0e5Smanu 		break;
728075ba0e5Smanu 	default:
7293cd0e66cSmanu 		DWARNX("Unexpected frame: unique = %"PRId64", error = %d",
730075ba0e5Smanu 		        foh->unique, foh->error);
731075ba0e5Smanu 		/* NOTREACHED */
732075ba0e5Smanu 		break;
733075ba0e5Smanu 	}
734075ba0e5Smanu 
735075ba0e5Smanu 	ps->ps_destroy_msg(pm);
736075ba0e5Smanu 
737075ba0e5Smanu 	return;
738075ba0e5Smanu }
739