/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License, Version 1.0 only * (the "License"). You may not use this file except in compliance * with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 2005 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ #pragma ident "%Z%%M% %I% %E% SMI" /* * * stats_create.c * * Routines for the `clean interface' to cachefs statistics. */ #include #include #include #include #include #include #include #include "stats.h" void *malloc(), *calloc(); /* forward declarations of statics */ static stats_cookie_t *stats_create(char *); static stats_cookie_t * stats_create(char *progname) { stats_cookie_t *rc; if ((rc = (stats_cookie_t *)calloc(1, sizeof (*rc))) == NULL) goto out; rc->st_magic = STATS_MAGIC; if (rc->st_progname = strrchr(progname, '/')) rc->st_progname++; else rc->st_progname = progname; if ((rc->st_kstat_cookie = kstat_open()) == NULL) { stats_perror(rc, SE_KERNEL, gettext("Cannot initialize kstats")); goto out; } out: return (rc); } stats_cookie_t * stats_create_unbound(char *progname) { stats_cookie_t *st; if ((st = stats_create(progname)) == NULL) goto out; st->st_flags |= ST_VALID; out: return (st); } stats_cookie_t * stats_create_mountpath(char *mountpath, char *progname) { stats_cookie_t *st; kstat_t *key; cachefs_kstat_key_t *k; dev_t dev; ino64_t ino; struct stat64 s; int i, n; if ((st = stats_create(progname)) == NULL) goto out; if ((key = kstat_lookup(st->st_kstat_cookie, "cachefs", 0, "key")) == NULL) { stats_perror(st, SE_KERNEL, gettext("Cannot lookup cachefs key kstat")); goto out; } if (kstat_read(st->st_kstat_cookie, key, NULL) < 0) { stats_perror(st, SE_KERNEL, gettext("Cannot read cachefs key kstat")); goto out; } k = (cachefs_kstat_key_t *)key->ks_data; n = key->ks_ndata; if (stat64(mountpath, &s) != 0) { stats_perror(st, SE_FILE, gettext("Cannot stat %s"), mountpath); goto out; } ino = s.st_ino; dev = s.st_dev; for (i = 0; i < n; i++) { k[i].ks_mountpoint += (uintptr_t)k; k[i].ks_backfs += (uintptr_t)k; k[i].ks_cachedir += (uintptr_t)k; k[i].ks_cacheid += (uintptr_t)k; if (! k[i].ks_mounted) continue; if ((stat64((char *)(uintptr_t)k[i].ks_mountpoint, &s) == 0) && (s.st_dev == dev) && (s.st_ino == ino)) break; } if (i >= n) { stats_perror(st, SE_FILE, gettext("%s: not a cachefs mountpoint"), mountpath); goto out; } st->st_fsid = k[i].ks_id; st->st_flags |= ST_VALID | ST_BOUND; out: return (st); } /* * stats_next - bind the cookie to the next valid cachefs mount. * * returns cachefs_kstat_key_t *, which gives all the info you need. * returns NULL if we're out of mounts, or if an error occured. * returns malloc()ed data, which the client has to free() itself. */ cachefs_kstat_key_t * stats_next(stats_cookie_t *st) { kstat_t *key; cachefs_kstat_key_t *k, *prc = NULL, *rc = NULL; int i, n; assert(stats_good(st)); if (((key = kstat_lookup(st->st_kstat_cookie, "cachefs", 0, "key")) == NULL) || (kstat_read(st->st_kstat_cookie, key, NULL) < 0)) { stats_perror(st, SE_KERNEL, gettext("Cannot get cachefs key kstat")); goto out; } k = (cachefs_kstat_key_t *)key->ks_data; n = key->ks_ndata; if (st->st_flags & ST_BOUND) { for (i = 0; i < n; i++) if (st->st_fsid == k[i].ks_id) break; ++i; if (i < n) { prc = k + i; st->st_fsid = k[i].ks_id; } else st->st_flags &= ~ST_BOUND; } else if (n > 0) { st->st_fsid = k[0].ks_id; st->st_flags |= ST_BOUND; prc = k; } out: if (prc != NULL) { char *s; int size; prc->ks_mountpoint += (uintptr_t)k; prc->ks_backfs += (uintptr_t)k; prc->ks_cachedir += (uintptr_t)k; prc->ks_cacheid += (uintptr_t)k; size = sizeof (*rc); size += strlen((char *)(uintptr_t)prc->ks_mountpoint) + 1; size += strlen((char *)(uintptr_t)prc->ks_backfs) + 1; size += strlen((char *)(uintptr_t)prc->ks_cachedir) + 1; size += strlen((char *)(uintptr_t)prc->ks_cacheid) + 1; if ((rc = (cachefs_kstat_key_t *) malloc(size)) == NULL) { stats_perror(st, SE_NOMEM, gettext("Cannot malloc return code")); } else { memcpy(rc, prc, sizeof (*rc)); s = (char *)((uintptr_t)rc + sizeof (*rc)); (void) strcpy(s, (char *)(uintptr_t)prc->ks_mountpoint); rc->ks_mountpoint = (uintptr_t)s; s += strlen(s) + 1; (void) strcpy(s, (char *)(uintptr_t)prc->ks_backfs); rc->ks_backfs = (uintptr_t)s; s += strlen(s) + 1; (void) strcpy(s, (char *)(uintptr_t)prc->ks_cachedir); rc->ks_cachedir = (uintptr_t)s; s += strlen(s) + 1; (void) strcpy(s, (char *)(uintptr_t)prc->ks_cacheid); rc->ks_cacheid = (uintptr_t)s; } } return (rc); } cachefs_kstat_key_t * stats_getkey(stats_cookie_t *st) { kstat_t *ksp; cachefs_kstat_key_t *k, *key, *rc = NULL; int size; char *s; assert(stats_good(st)); assert(st->st_flags & ST_BOUND); if (((ksp = kstat_lookup(st->st_kstat_cookie, "cachefs", 0, "key")) == NULL) || (kstat_read(st->st_kstat_cookie, ksp, NULL) < 0)) { stats_perror(st, SE_KERNEL, gettext("Cannot get cachefs key kstat")); goto out; } key = (cachefs_kstat_key_t *)ksp->ks_data; k = key + st->st_fsid - 1; k->ks_mountpoint += (uintptr_t)key; k->ks_backfs += (uintptr_t)key; k->ks_cachedir += (uintptr_t)key; k->ks_cacheid += (uintptr_t)key; size = sizeof (*rc); size += strlen((char *)(uintptr_t)k->ks_mountpoint) + 1; size += strlen((char *)(uintptr_t)k->ks_backfs) + 1; size += strlen((char *)(uintptr_t)k->ks_cachedir) + 1; size += strlen((char *)(uintptr_t)k->ks_cacheid) + 1; if ((rc = (cachefs_kstat_key_t *)malloc(size)) == NULL) stats_perror(st, SE_NOMEM, gettext("Cannot malloc return code")); else { memcpy(rc, k, sizeof (*rc)); s = (char *)((uintptr_t)rc + sizeof (*rc)); (void) strcpy(s, (char *)(uintptr_t)k->ks_mountpoint); rc->ks_mountpoint = (uintptr_t)s; s += strlen(s) + 1; (void) strcpy(s, (char *)(uintptr_t)k->ks_backfs); rc->ks_backfs = (uintptr_t)s; s += strlen(s) + 1; (void) strcpy(s, (char *)(uintptr_t)k->ks_cachedir); rc->ks_cachedir = (uintptr_t)s; s += strlen(s) + 1; (void) strcpy(s, (char *)(uintptr_t)k->ks_cacheid); rc->ks_cacheid = (uintptr_t)s; s += strlen(s) + 1; } assert(rc->ks_id == st->st_fsid); out: return (rc); } void stats_destroy(stats_cookie_t *st) { void free(); if (st == NULL) return; if (st->st_kstat_cookie != NULL) kstat_close(st->st_kstat_cookie); if (st->st_logxdr.x_ops != NULL) xdr_destroy(&st->st_logxdr); if ((st->st_logstream != NULL) && (st->st_flags & ST_LFOPEN)) (void) fclose(st->st_logstream); /* * we don't want to depend on dbm (or stats_dbm), so we don't * do a stats_dbm_close. we do try to require the client to * have done it, via an assert(), however. */ assert(! (st->st_flags & ST_DBMOPEN)); st->st_magic++; free(st); } int stats_good(stats_cookie_t *st) { if (st == NULL) return (0); if (st->st_magic != STATS_MAGIC) return (0); if (! (st->st_flags & ST_VALID)) return (0); return (1); } void /*PRINTFLIKE3*/ stats_perror(stats_cookie_t *st, int Errno, char *fmt, ...) { va_list ap; assert(st != NULL); assert(st->st_magic == STATS_MAGIC); va_start(ap, fmt); (void) vsnprintf(st->st_errorstr, sizeof (st->st_errorstr), fmt, ap); va_end(ap); st->st_errno = Errno; st->st_flags |= ST_ERROR; } char * stats_errorstr(stats_cookie_t *st) { assert(st != NULL); assert(st->st_magic == STATS_MAGIC); return (st->st_errorstr); } int stats_errno(stats_cookie_t *st) { assert(st != NULL); assert(st->st_magic == STATS_MAGIC); return (st->st_errno); } int stats_inerror(stats_cookie_t *st) { assert(st != NULL); assert(st->st_magic == STATS_MAGIC); return (st->st_flags & ST_ERROR); }