2017-11-20 19:43:44 +00:00
|
|
|
/*-
|
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
2012-10-13 23:54:26 +00:00
|
|
|
* Copyright (c) 2007-2009 Google Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are
|
|
|
|
* met:
|
|
|
|
*
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above
|
|
|
|
* copyright notice, this list of conditions and the following disclaimer
|
|
|
|
* in the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
* * Neither the name of Google Inc. nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived from
|
|
|
|
* this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2005 Csaba Henk.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
2019-06-28 04:18:10 +00:00
|
|
|
* Copyright (c) 2019 The FreeBSD Foundation
|
|
|
|
*
|
|
|
|
* Portions of this software were developed by BFF Storage Systems, LLC under
|
|
|
|
* sponsorship from the FreeBSD Foundation.
|
|
|
|
*
|
2012-10-13 23:54:26 +00:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/module.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/conf.h>
|
|
|
|
#include <sys/uio.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/queue.h>
|
|
|
|
#include <sys/lock.h>
|
|
|
|
#include <sys/sx.h>
|
|
|
|
#include <sys/mutex.h>
|
2013-03-09 02:32:23 +00:00
|
|
|
#include <sys/rwlock.h>
|
2019-05-06 16:17:55 +00:00
|
|
|
#include <sys/priv.h>
|
2012-10-13 23:54:26 +00:00
|
|
|
#include <sys/proc.h>
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/vnode.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/unistd.h>
|
|
|
|
#include <sys/filedesc.h>
|
|
|
|
#include <sys/file.h>
|
|
|
|
#include <sys/fcntl.h>
|
|
|
|
#include <sys/bio.h>
|
|
|
|
#include <sys/buf.h>
|
|
|
|
#include <sys/sysctl.h>
|
2019-06-11 16:32:33 +00:00
|
|
|
#include <sys/vmmeter.h>
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
#include <vm/vm.h>
|
|
|
|
#include <vm/vm_extern.h>
|
|
|
|
#include <vm/pmap.h>
|
|
|
|
#include <vm/vm_map.h>
|
|
|
|
#include <vm/vm_page.h>
|
|
|
|
#include <vm/vm_object.h>
|
|
|
|
|
|
|
|
#include "fuse.h"
|
|
|
|
#include "fuse_file.h"
|
|
|
|
#include "fuse_node.h"
|
|
|
|
#include "fuse_internal.h"
|
|
|
|
#include "fuse_ipc.h"
|
|
|
|
#include "fuse_io.h"
|
|
|
|
|
2019-06-25 17:24:43 +00:00
|
|
|
/*
|
|
|
|
* Set in a struct buf to indicate that the write came from the buffer cache
|
|
|
|
* and the originating cred and pid are no longer known.
|
|
|
|
*/
|
|
|
|
#define B_FUSEFS_WRITE_CACHE B_FS_FLAG1
|
|
|
|
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROVIDER_DECLARE(fusefs);
|
2019-02-28 19:27:54 +00:00
|
|
|
/*
|
|
|
|
* Fuse trace probe:
|
|
|
|
* arg0: verbosity. Higher numbers give more verbose messages
|
|
|
|
* arg1: Textual message
|
|
|
|
*/
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE_DEFINE2(fusefs, , io, trace, "int", "char*");
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-07-28 15:17:32 +00:00
|
|
|
static int
|
|
|
|
fuse_inval_buf_range(struct vnode *vp, off_t filesize, off_t start, off_t end);
|
2019-05-06 16:17:55 +00:00
|
|
|
static void
|
|
|
|
fuse_io_clear_suid_on_write(struct vnode *vp, struct ucred *cred,
|
2019-07-28 15:17:32 +00:00
|
|
|
struct thread *td);
|
2012-10-13 23:54:26 +00:00
|
|
|
static int
|
|
|
|
fuse_read_directbackend(struct vnode *vp, struct uio *uio,
|
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh);
|
|
|
|
static int
|
2019-04-23 22:34:32 +00:00
|
|
|
fuse_read_biobackend(struct vnode *vp, struct uio *uio, int ioflag,
|
2019-04-01 20:42:15 +00:00
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh, pid_t pid);
|
2012-10-13 23:54:26 +00:00
|
|
|
static int
|
|
|
|
fuse_write_directbackend(struct vnode *vp, struct uio *uio,
|
2019-05-15 00:38:52 +00:00
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh, off_t filesize,
|
2019-05-27 21:36:28 +00:00
|
|
|
int ioflag, bool pages);
|
2012-10-13 23:54:26 +00:00
|
|
|
static int
|
|
|
|
fuse_write_biobackend(struct vnode *vp, struct uio *uio,
|
2019-04-01 20:42:15 +00:00
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh, int ioflag, pid_t pid);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-07-28 15:17:32 +00:00
|
|
|
/* Invalidate a range of cached data, whether dirty of not */
|
|
|
|
static int
|
|
|
|
fuse_inval_buf_range(struct vnode *vp, off_t filesize, off_t start, off_t end)
|
|
|
|
{
|
|
|
|
struct buf *bp;
|
|
|
|
daddr_t left_lbn, end_lbn, right_lbn;
|
|
|
|
off_t new_filesize;
|
|
|
|
int iosize, left_on, right_on, right_blksize;
|
|
|
|
|
|
|
|
iosize = fuse_iosize(vp);
|
|
|
|
left_lbn = start / iosize;
|
|
|
|
end_lbn = howmany(end, iosize);
|
|
|
|
left_on = start & (iosize - 1);
|
|
|
|
if (left_on != 0) {
|
|
|
|
bp = getblk(vp, left_lbn, iosize, PCATCH, 0, 0);
|
|
|
|
if ((bp->b_flags & B_CACHE) != 0 && bp->b_dirtyend >= left_on) {
|
|
|
|
/*
|
|
|
|
* Flush the dirty buffer, because we don't have a
|
|
|
|
* byte-granular way to record which parts of the
|
|
|
|
* buffer are valid.
|
|
|
|
*/
|
|
|
|
bwrite(bp);
|
|
|
|
if (bp->b_error)
|
|
|
|
return (bp->b_error);
|
|
|
|
} else {
|
|
|
|
brelse(bp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
right_on = end & (iosize - 1);
|
|
|
|
if (right_on != 0) {
|
|
|
|
right_lbn = end / iosize;
|
|
|
|
new_filesize = MAX(filesize, end);
|
|
|
|
right_blksize = MIN(iosize, new_filesize - iosize * right_lbn);
|
|
|
|
bp = getblk(vp, right_lbn, right_blksize, PCATCH, 0, 0);
|
|
|
|
if ((bp->b_flags & B_CACHE) != 0 && bp->b_dirtyoff < right_on) {
|
|
|
|
/*
|
|
|
|
* Flush the dirty buffer, because we don't have a
|
|
|
|
* byte-granular way to record which parts of the
|
|
|
|
* buffer are valid.
|
|
|
|
*/
|
|
|
|
bwrite(bp);
|
|
|
|
if (bp->b_error)
|
|
|
|
return (bp->b_error);
|
|
|
|
} else {
|
|
|
|
brelse(bp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
v_inval_buf_range(vp, left_lbn, end_lbn, iosize);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2019-05-06 16:17:55 +00:00
|
|
|
/*
|
|
|
|
* FreeBSD clears the SUID and SGID bits on any write by a non-root user.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
fuse_io_clear_suid_on_write(struct vnode *vp, struct ucred *cred,
|
|
|
|
struct thread *td)
|
|
|
|
{
|
|
|
|
struct fuse_data *data;
|
|
|
|
struct mount *mp;
|
|
|
|
struct vattr va;
|
|
|
|
int dataflags;
|
|
|
|
|
|
|
|
mp = vnode_mount(vp);
|
|
|
|
data = fuse_get_mpdata(mp);
|
|
|
|
dataflags = data->dataflags;
|
|
|
|
|
|
|
|
if (dataflags & FSESS_DEFAULT_PERMISSIONS) {
|
|
|
|
if (priv_check_cred(cred, PRIV_VFS_RETAINSUGID)) {
|
|
|
|
fuse_internal_getattr(vp, &va, cred, td);
|
|
|
|
if (va.va_mode & (S_ISUID | S_ISGID)) {
|
|
|
|
mode_t mode = va.va_mode & ~(S_ISUID | S_ISGID);
|
|
|
|
/* Clear all vattr fields except mode */
|
|
|
|
vattr_null(&va);
|
|
|
|
va.va_mode = mode;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ignore fuse_internal_setattr's return value,
|
|
|
|
* because at this point the write operation has
|
|
|
|
* already succeeded and we don't want to return
|
|
|
|
* failing status for that.
|
|
|
|
*/
|
|
|
|
(void)fuse_internal_setattr(vp, &va, td, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE_DEFINE5(fusefs, , io, io_dispatch, "struct vnode*", "struct uio*",
|
2019-02-28 19:27:54 +00:00
|
|
|
"int", "struct ucred*", "struct fuse_filehandle*");
|
2019-06-25 17:24:43 +00:00
|
|
|
SDT_PROBE_DEFINE4(fusefs, , io, io_dispatch_filehandles_closed, "struct vnode*",
|
|
|
|
"struct uio*", "int", "struct ucred*");
|
2012-10-13 23:54:26 +00:00
|
|
|
int
|
2019-06-25 17:24:43 +00:00
|
|
|
fuse_io_dispatch(struct vnode *vp, struct uio *uio, int ioflag,
|
2019-04-01 20:42:15 +00:00
|
|
|
struct ucred *cred, pid_t pid)
|
2012-10-13 23:54:26 +00:00
|
|
|
{
|
|
|
|
struct fuse_filehandle *fufh;
|
|
|
|
int err, directio;
|
2019-04-03 19:59:45 +00:00
|
|
|
int fflag;
|
2019-05-23 23:06:26 +00:00
|
|
|
bool closefufh = false;
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2012-11-05 15:23:54 +00:00
|
|
|
MPASS(vp->v_type == VREG || vp->v_type == VDIR);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-04-03 19:59:45 +00:00
|
|
|
fflag = (uio->uio_rw == UIO_READ) ? FREAD : FWRITE;
|
|
|
|
err = fuse_filehandle_getrw(vp, fflag, &fufh, cred, pid);
|
2019-05-23 23:06:26 +00:00
|
|
|
if (err == EBADF && vnode_mount(vp)->mnt_flag & MNT_EXPORTED) {
|
|
|
|
/*
|
|
|
|
* nfsd will do I/O without first doing VOP_OPEN. We
|
|
|
|
* must implicitly open the file here
|
|
|
|
*/
|
|
|
|
err = fuse_filehandle_open(vp, fflag, &fufh, curthread, cred);
|
|
|
|
closefufh = true;
|
|
|
|
}
|
|
|
|
else if (err) {
|
2019-06-25 17:24:43 +00:00
|
|
|
SDT_PROBE4(fusefs, , io, io_dispatch_filehandles_closed,
|
|
|
|
vp, uio, ioflag, cred);
|
2012-10-13 23:54:26 +00:00
|
|
|
printf("FUSE: io dispatch: filehandles are closed\n");
|
|
|
|
return err;
|
|
|
|
}
|
2019-05-23 23:06:26 +00:00
|
|
|
if (err)
|
|
|
|
goto out;
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE5(fusefs, , io, io_dispatch, vp, uio, ioflag, cred, fufh);
|
2019-02-28 19:27:54 +00:00
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
/*
|
|
|
|
* Ideally, when the daemon asks for direct io at open time, the
|
|
|
|
* standard file flag should be set according to this, so that would
|
|
|
|
* just change the default mode, which later on could be changed via
|
|
|
|
* fcntl(2).
|
|
|
|
* But this doesn't work, the O_DIRECT flag gets cleared at some point
|
|
|
|
* (don't know where). So to make any use of the Fuse direct_io option,
|
|
|
|
* we hardwire it into the file's private data (similarly to Linux,
|
|
|
|
* btw.).
|
|
|
|
*/
|
|
|
|
directio = (ioflag & IO_DIRECT) || !fsess_opt_datacache(vnode_mount(vp));
|
|
|
|
|
|
|
|
switch (uio->uio_rw) {
|
|
|
|
case UIO_READ:
|
|
|
|
if (directio) {
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, trace, 1,
|
2019-02-28 19:27:54 +00:00
|
|
|
"direct read of vnode");
|
2012-10-13 23:54:26 +00:00
|
|
|
err = fuse_read_directbackend(vp, uio, cred, fufh);
|
|
|
|
} else {
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, trace, 1,
|
2019-02-28 19:27:54 +00:00
|
|
|
"buffered read of vnode");
|
2019-04-23 22:34:32 +00:00
|
|
|
err = fuse_read_biobackend(vp, uio, ioflag, cred, fufh,
|
|
|
|
pid);
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case UIO_WRITE:
|
2019-06-25 23:40:18 +00:00
|
|
|
fuse_vnode_update(vp, FN_MTIMECHANGE | FN_CTIMECHANGE);
|
2019-06-14 19:47:48 +00:00
|
|
|
if (directio) {
|
2019-05-15 00:38:52 +00:00
|
|
|
off_t start, end, filesize;
|
2019-04-12 19:05:06 +00:00
|
|
|
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, trace, 1,
|
2019-02-28 19:27:54 +00:00
|
|
|
"direct write of vnode");
|
2019-05-15 00:38:52 +00:00
|
|
|
|
|
|
|
err = fuse_vnode_size(vp, &filesize, cred, curthread);
|
|
|
|
if (err)
|
2019-05-23 23:06:26 +00:00
|
|
|
goto out;
|
2019-05-15 00:38:52 +00:00
|
|
|
|
2019-04-12 19:05:06 +00:00
|
|
|
start = uio->uio_offset;
|
|
|
|
end = start + uio->uio_resid;
|
2019-06-25 17:24:43 +00:00
|
|
|
KASSERT((ioflag & (IO_VMIO | IO_DIRECT)) !=
|
|
|
|
(IO_VMIO | IO_DIRECT),
|
|
|
|
("IO_DIRECT used for a cache flush?"));
|
|
|
|
/* Invalidate the write cache when writing directly */
|
2019-07-28 15:17:32 +00:00
|
|
|
err = fuse_inval_buf_range(vp, filesize, start, end);
|
|
|
|
if (err)
|
|
|
|
return (err);
|
2019-04-01 20:42:15 +00:00
|
|
|
err = fuse_write_directbackend(vp, uio, cred, fufh,
|
2019-06-25 17:24:43 +00:00
|
|
|
filesize, ioflag, false);
|
2012-10-13 23:54:26 +00:00
|
|
|
} else {
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, trace, 1,
|
2019-02-28 19:27:54 +00:00
|
|
|
"buffered write of vnode");
|
2019-06-26 17:32:31 +00:00
|
|
|
if (!fsess_opt_writeback(vnode_mount(vp)))
|
2019-06-14 19:47:48 +00:00
|
|
|
ioflag |= IO_SYNC;
|
2019-04-01 20:42:15 +00:00
|
|
|
err = fuse_write_biobackend(vp, uio, cred, fufh, ioflag,
|
|
|
|
pid);
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
2019-05-06 16:17:55 +00:00
|
|
|
fuse_io_clear_suid_on_write(vp, cred, uio->uio_td);
|
2012-10-13 23:54:26 +00:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
panic("uninterpreted mode passed to fuse_io_dispatch");
|
|
|
|
}
|
|
|
|
|
2019-05-23 23:06:26 +00:00
|
|
|
out:
|
|
|
|
if (closefufh)
|
|
|
|
fuse_filehandle_close(vp, fufh, curthread, cred);
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
return (err);
|
|
|
|
}
|
|
|
|
|
2019-06-11 16:32:33 +00:00
|
|
|
SDT_PROBE_DEFINE4(fusefs, , io, read_bio_backend_start, "int", "int", "int", "int");
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE_DEFINE2(fusefs, , io, read_bio_backend_feed, "int", "struct buf*");
|
2019-06-11 16:32:33 +00:00
|
|
|
SDT_PROBE_DEFINE4(fusefs, , io, read_bio_backend_end, "int", "ssize_t", "int",
|
|
|
|
"struct buf*");
|
2012-10-13 23:54:26 +00:00
|
|
|
static int
|
2019-04-23 22:34:32 +00:00
|
|
|
fuse_read_biobackend(struct vnode *vp, struct uio *uio, int ioflag,
|
2019-04-01 20:42:15 +00:00
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh, pid_t pid)
|
2012-10-13 23:54:26 +00:00
|
|
|
{
|
|
|
|
struct buf *bp;
|
2019-06-17 16:56:51 +00:00
|
|
|
struct mount *mp;
|
|
|
|
struct fuse_data *data;
|
|
|
|
daddr_t lbn, nextlbn;
|
|
|
|
int bcount, nextsize;
|
|
|
|
int err, n = 0, on = 0, seqcount;
|
2012-10-13 23:54:26 +00:00
|
|
|
off_t filesize;
|
|
|
|
|
|
|
|
const int biosize = fuse_iosize(vp);
|
2019-06-17 16:56:51 +00:00
|
|
|
mp = vnode_mount(vp);
|
|
|
|
data = fuse_get_mpdata(mp);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
if (uio->uio_offset < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
|
2019-06-17 16:56:51 +00:00
|
|
|
seqcount = ioflag >> IO_SEQSHIFT;
|
|
|
|
|
2019-05-15 00:38:52 +00:00
|
|
|
err = fuse_vnode_size(vp, &filesize, cred, curthread);
|
|
|
|
if (err)
|
|
|
|
return err;
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-04-23 22:34:32 +00:00
|
|
|
for (err = 0, bp = NULL; uio->uio_resid > 0; bp = NULL) {
|
2012-10-13 23:54:26 +00:00
|
|
|
if (fuse_isdeadfs(vp)) {
|
|
|
|
err = ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
2019-04-23 22:34:32 +00:00
|
|
|
if (filesize - uio->uio_offset <= 0)
|
|
|
|
break;
|
2012-10-13 23:54:26 +00:00
|
|
|
lbn = uio->uio_offset / biosize;
|
|
|
|
on = uio->uio_offset & (biosize - 1);
|
|
|
|
|
|
|
|
if ((off_t)lbn * biosize >= filesize) {
|
|
|
|
bcount = 0;
|
|
|
|
} else if ((off_t)(lbn + 1) * biosize > filesize) {
|
|
|
|
bcount = filesize - (off_t)lbn *biosize;
|
2019-04-23 22:34:32 +00:00
|
|
|
} else {
|
|
|
|
bcount = biosize;
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
2019-06-17 16:56:51 +00:00
|
|
|
nextlbn = lbn + 1;
|
|
|
|
nextsize = MIN(biosize, filesize - nextlbn * biosize);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-06-11 16:32:33 +00:00
|
|
|
SDT_PROBE4(fusefs, , io, read_bio_backend_start,
|
|
|
|
biosize, (int)lbn, on, bcount);
|
|
|
|
|
2019-06-17 16:56:51 +00:00
|
|
|
if (bcount < biosize) {
|
|
|
|
/* If near EOF, don't do readahead */
|
|
|
|
err = bread(vp, lbn, bcount, NOCRED, &bp);
|
2019-06-17 22:01:23 +00:00
|
|
|
} else if ((vp->v_mount->mnt_flag & MNT_NOCLUSTERR) == 0) {
|
|
|
|
/* Try clustered read */
|
|
|
|
long totread = uio->uio_resid + on;
|
|
|
|
seqcount = MIN(seqcount,
|
2019-06-20 17:08:21 +00:00
|
|
|
data->max_readahead_blocks + 1);
|
2019-06-17 22:01:23 +00:00
|
|
|
err = cluster_read(vp, filesize, lbn, bcount, NOCRED,
|
|
|
|
totread, seqcount, 0, &bp);
|
2019-06-20 17:08:21 +00:00
|
|
|
} else if (seqcount > 1 && data->max_readahead_blocks >= 1) {
|
2019-06-17 16:56:51 +00:00
|
|
|
/* Try non-clustered readahead */
|
|
|
|
err = breadn(vp, lbn, bcount, &nextlbn, &nextsize, 1,
|
|
|
|
NOCRED, &bp);
|
|
|
|
} else {
|
|
|
|
/* Just read what was requested */
|
|
|
|
err = bread(vp, lbn, bcount, NOCRED, &bp);
|
|
|
|
}
|
|
|
|
|
2019-04-23 22:34:32 +00:00
|
|
|
if (err) {
|
|
|
|
brelse(bp);
|
|
|
|
bp = NULL;
|
|
|
|
break;
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
2019-04-23 22:34:32 +00:00
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
/*
|
|
|
|
* on is the offset into the current bp. Figure out how many
|
|
|
|
* bytes we can copy out of the bp. Note that bcount is
|
|
|
|
* NOT DEV_BSIZE aligned.
|
|
|
|
*
|
|
|
|
* Then figure out how many bytes we can copy into the uio.
|
|
|
|
*/
|
|
|
|
|
|
|
|
n = 0;
|
2019-06-25 17:24:43 +00:00
|
|
|
if (on < bcount - bp->b_resid)
|
|
|
|
n = MIN((unsigned)(bcount - bp->b_resid - on),
|
2019-06-21 21:44:31 +00:00
|
|
|
uio->uio_resid);
|
2012-10-13 23:54:26 +00:00
|
|
|
if (n > 0) {
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, read_bio_backend_feed, n, bp);
|
2012-10-13 23:54:26 +00:00
|
|
|
err = uiomove(bp->b_data + on, n, uio);
|
|
|
|
}
|
2019-04-23 22:34:32 +00:00
|
|
|
vfs_bio_brelse(bp, ioflag);
|
2019-06-11 16:32:33 +00:00
|
|
|
SDT_PROBE4(fusefs, , io, read_bio_backend_end, err,
|
|
|
|
uio->uio_resid, n, bp);
|
2019-06-25 17:24:43 +00:00
|
|
|
if (bp->b_resid > 0) {
|
2019-06-21 21:44:31 +00:00
|
|
|
/* Short read indicates EOF */
|
|
|
|
break;
|
|
|
|
}
|
2019-04-23 22:34:32 +00:00
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
return (err);
|
|
|
|
}
|
|
|
|
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE_DEFINE1(fusefs, , io, read_directbackend_start,
|
|
|
|
"struct fuse_read_in*");
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE_DEFINE3(fusefs, , io, read_directbackend_complete,
|
|
|
|
"struct fuse_dispatcher*", "struct fuse_read_in*", "struct uio*");
|
2019-02-28 19:27:54 +00:00
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
static int
|
|
|
|
fuse_read_directbackend(struct vnode *vp, struct uio *uio,
|
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh)
|
|
|
|
{
|
2019-05-16 17:24:11 +00:00
|
|
|
struct fuse_data *data;
|
2012-10-13 23:54:26 +00:00
|
|
|
struct fuse_dispatcher fdi;
|
|
|
|
struct fuse_read_in *fri;
|
|
|
|
int err = 0;
|
|
|
|
|
2019-05-16 17:24:11 +00:00
|
|
|
data = fuse_get_mpdata(vp->v_mount);
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
if (uio->uio_resid == 0)
|
|
|
|
return (0);
|
|
|
|
|
|
|
|
fdisp_init(&fdi, 0);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX In "normal" case we use an intermediate kernel buffer for
|
|
|
|
* transmitting data from daemon's context to ours. Eventually, we should
|
|
|
|
* get rid of this. Anyway, if the target uio lives in sysspace (we are
|
|
|
|
* called from pageops), and the input data doesn't need kernel-side
|
|
|
|
* processing (we are not called from readdir) we can already invoke
|
|
|
|
* an optimized, "peer-to-peer" I/O routine.
|
|
|
|
*/
|
|
|
|
while (uio->uio_resid > 0) {
|
|
|
|
fdi.iosize = sizeof(*fri);
|
|
|
|
fdisp_make_vp(&fdi, FUSE_READ, vp, uio->uio_td, cred);
|
|
|
|
fri = fdi.indata;
|
|
|
|
fri->fh = fufh->fh_id;
|
|
|
|
fri->offset = uio->uio_offset;
|
|
|
|
fri->size = MIN(uio->uio_resid,
|
|
|
|
fuse_get_mpdata(vp->v_mount)->max_read);
|
2019-05-16 17:24:11 +00:00
|
|
|
if (fuse_libabi_geq(data, 7, 9)) {
|
|
|
|
/* See comment regarding FUSE_WRITE_LOCKOWNER */
|
|
|
|
fri->read_flags = 0;
|
2019-05-28 01:09:19 +00:00
|
|
|
fri->flags = fufh_type_2_fflags(fufh->fufh_type);
|
2019-05-16 17:24:11 +00:00
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE1(fusefs, , io, read_directbackend_start, fri);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
if ((err = fdisp_wait_answ(&fdi)))
|
|
|
|
goto out;
|
|
|
|
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE3(fusefs, , io, read_directbackend_complete,
|
|
|
|
&fdi, fri, uio);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
if ((err = uiomove(fdi.answ, MIN(fri->size, fdi.iosize), uio)))
|
|
|
|
break;
|
2019-06-21 21:44:31 +00:00
|
|
|
if (fdi.iosize < fri->size) {
|
|
|
|
/*
|
|
|
|
* Short read. Should only happen at EOF or with
|
|
|
|
* direct io.
|
|
|
|
*/
|
2012-10-13 23:54:26 +00:00
|
|
|
break;
|
2019-06-21 21:44:31 +00:00
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
fdisp_destroy(&fdi);
|
|
|
|
return (err);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
fuse_write_directbackend(struct vnode *vp, struct uio *uio,
|
2019-05-15 00:38:52 +00:00
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh, off_t filesize,
|
2019-05-27 21:36:28 +00:00
|
|
|
int ioflag, bool pages)
|
2012-10-13 23:54:26 +00:00
|
|
|
{
|
|
|
|
struct fuse_vnode_data *fvdat = VTOFUD(vp);
|
2019-05-16 17:24:11 +00:00
|
|
|
struct fuse_data *data;
|
2012-10-13 23:54:26 +00:00
|
|
|
struct fuse_write_in *fwi;
|
2019-04-04 16:51:34 +00:00
|
|
|
struct fuse_write_out *fwo;
|
2012-10-13 23:54:26 +00:00
|
|
|
struct fuse_dispatcher fdi;
|
|
|
|
size_t chunksize;
|
2019-04-04 16:51:34 +00:00
|
|
|
void *fwi_data;
|
|
|
|
off_t as_written_offset;
|
2012-10-13 23:54:26 +00:00
|
|
|
int diff;
|
|
|
|
int err = 0;
|
2019-04-04 16:51:34 +00:00
|
|
|
bool direct_io = fufh->fuse_open_flags & FOPEN_DIRECT_IO;
|
2019-06-25 23:40:18 +00:00
|
|
|
bool wrote_anything = false;
|
2019-05-27 21:36:28 +00:00
|
|
|
uint32_t write_flags;
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-05-16 17:24:11 +00:00
|
|
|
data = fuse_get_mpdata(vp->v_mount);
|
|
|
|
|
2019-05-27 21:36:28 +00:00
|
|
|
/*
|
|
|
|
* Don't set FUSE_WRITE_LOCKOWNER in write_flags. It can't be set
|
|
|
|
* accurately when using POSIX AIO, libfuse doesn't use it, and I'm not
|
|
|
|
* aware of any file systems that do. It was an attempt to add
|
|
|
|
* Linux-style mandatory locking to the FUSE protocol, but mandatory
|
|
|
|
* locking is deprecated even on Linux. See Linux commit
|
|
|
|
* f33321141b273d60cbb3a8f56a5489baad82ba5e .
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* Set FUSE_WRITE_CACHE whenever we don't know the uid, gid, and/or pid
|
|
|
|
* that originated a write. For example when writing from the
|
|
|
|
* writeback cache. I don't know of a single file system that cares,
|
|
|
|
* but the protocol says we're supposed to do this.
|
|
|
|
*/
|
|
|
|
write_flags = !pages && (
|
|
|
|
(ioflag & IO_DIRECT) ||
|
|
|
|
!fsess_opt_datacache(vnode_mount(vp)) ||
|
2019-06-26 17:32:31 +00:00
|
|
|
!fsess_opt_writeback(vnode_mount(vp))) ? 0 : FUSE_WRITE_CACHE;
|
2019-05-27 21:36:28 +00:00
|
|
|
|
2017-06-28 13:56:15 +00:00
|
|
|
if (uio->uio_resid == 0)
|
2012-10-13 23:54:26 +00:00
|
|
|
return (0);
|
2019-05-15 00:38:52 +00:00
|
|
|
|
2017-06-28 13:56:15 +00:00
|
|
|
if (ioflag & IO_APPEND)
|
2019-05-15 00:38:52 +00:00
|
|
|
uio_setoffset(uio, filesize);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-06-03 23:24:07 +00:00
|
|
|
if (vn_rlimit_fsize(vp, uio, uio->uio_td))
|
|
|
|
return (EFBIG);
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
fdisp_init(&fdi, 0);
|
|
|
|
|
|
|
|
while (uio->uio_resid > 0) {
|
2019-09-11 19:29:40 +00:00
|
|
|
size_t sizeof_fwi;
|
|
|
|
|
|
|
|
if (fuse_libabi_geq(data, 7, 9)) {
|
|
|
|
sizeof_fwi = sizeof(*fwi);
|
|
|
|
} else {
|
|
|
|
sizeof_fwi = FUSE_COMPAT_WRITE_IN_SIZE;
|
|
|
|
}
|
|
|
|
|
2019-05-16 17:24:11 +00:00
|
|
|
chunksize = MIN(uio->uio_resid, data->max_write);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-09-11 19:29:40 +00:00
|
|
|
fdi.iosize = sizeof_fwi + chunksize;
|
2012-10-13 23:54:26 +00:00
|
|
|
fdisp_make_vp(&fdi, FUSE_WRITE, vp, uio->uio_td, cred);
|
|
|
|
|
|
|
|
fwi = fdi.indata;
|
|
|
|
fwi->fh = fufh->fh_id;
|
|
|
|
fwi->offset = uio->uio_offset;
|
|
|
|
fwi->size = chunksize;
|
2019-05-27 21:36:28 +00:00
|
|
|
fwi->write_flags = write_flags;
|
2019-05-16 17:24:11 +00:00
|
|
|
if (fuse_libabi_geq(data, 7, 9)) {
|
2019-05-28 01:09:19 +00:00
|
|
|
fwi->flags = fufh_type_2_fflags(fufh->fufh_type);
|
2019-05-16 17:24:11 +00:00
|
|
|
}
|
2019-09-11 19:29:40 +00:00
|
|
|
fwi_data = (char *)fdi.indata + sizeof_fwi;
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-04-04 16:51:34 +00:00
|
|
|
if ((err = uiomove(fwi_data, chunksize, uio)))
|
2012-10-13 23:54:26 +00:00
|
|
|
break;
|
|
|
|
|
2019-04-04 16:51:34 +00:00
|
|
|
retry:
|
2019-04-17 23:32:38 +00:00
|
|
|
err = fdisp_wait_answ(&fdi);
|
|
|
|
if (err == ERESTART || err == EINTR || err == EWOULDBLOCK) {
|
|
|
|
/*
|
|
|
|
* Rewind the uio so dofilewrite will know it's
|
|
|
|
* incomplete
|
|
|
|
*/
|
|
|
|
uio->uio_resid += fwi->size;
|
|
|
|
uio->uio_offset -= fwi->size;
|
|
|
|
/*
|
|
|
|
* Change ERESTART into EINTR because we can't rewind
|
|
|
|
* uio->uio_iov. Basically, once uiomove(9) has been
|
|
|
|
* called, it's impossible to restart a syscall.
|
|
|
|
*/
|
|
|
|
if (err == ERESTART)
|
|
|
|
err = EINTR;
|
|
|
|
break;
|
|
|
|
} else if (err) {
|
2012-10-13 23:54:26 +00:00
|
|
|
break;
|
2019-06-25 23:40:18 +00:00
|
|
|
} else {
|
|
|
|
wrote_anything = true;
|
2019-04-17 23:32:38 +00:00
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-04-04 16:51:34 +00:00
|
|
|
fwo = ((struct fuse_write_out *)fdi.answ);
|
|
|
|
|
2019-03-08 02:00:49 +00:00
|
|
|
/* Adjust the uio in the case of short writes */
|
2019-04-04 16:51:34 +00:00
|
|
|
diff = fwi->size - fwo->size;
|
|
|
|
as_written_offset = uio->uio_offset - diff;
|
2019-03-08 02:00:49 +00:00
|
|
|
|
2019-06-25 18:36:11 +00:00
|
|
|
if (as_written_offset - diff > filesize)
|
2019-06-06 16:20:50 +00:00
|
|
|
fuse_vnode_setsize(vp, as_written_offset);
|
2019-05-23 00:22:03 +00:00
|
|
|
if (as_written_offset - diff >= filesize)
|
2019-02-15 22:51:09 +00:00
|
|
|
fvdat->flag &= ~FN_SIZECHANGE;
|
2019-04-04 16:51:34 +00:00
|
|
|
|
|
|
|
if (diff < 0) {
|
|
|
|
printf("WARNING: misbehaving FUSE filesystem "
|
|
|
|
"wrote more data than we provided it\n");
|
|
|
|
err = EINVAL;
|
|
|
|
break;
|
|
|
|
} else if (diff > 0) {
|
|
|
|
/* Short write */
|
|
|
|
if (!direct_io) {
|
|
|
|
printf("WARNING: misbehaving FUSE filesystem: "
|
|
|
|
"short writes are only allowed with "
|
|
|
|
"direct_io\n");
|
|
|
|
}
|
|
|
|
if (ioflag & IO_DIRECT) {
|
|
|
|
/* Return early */
|
|
|
|
uio->uio_resid += diff;
|
|
|
|
uio->uio_offset -= diff;
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
/* Resend the unwritten portion of data */
|
2019-09-11 19:29:40 +00:00
|
|
|
fdi.iosize = sizeof_fwi + diff;
|
2019-04-04 16:51:34 +00:00
|
|
|
/* Refresh fdi without clearing data buffer */
|
|
|
|
fdisp_refresh_vp(&fdi, FUSE_WRITE, vp,
|
|
|
|
uio->uio_td, cred);
|
|
|
|
fwi = fdi.indata;
|
|
|
|
MPASS2(fwi == fdi.indata, "FUSE dispatcher "
|
|
|
|
"reallocated despite no increase in "
|
|
|
|
"size?");
|
|
|
|
void *src = (char*)fwi_data + fwo->size;
|
|
|
|
memmove(fwi_data, src, diff);
|
|
|
|
fwi->fh = fufh->fh_id;
|
|
|
|
fwi->offset = as_written_offset;
|
|
|
|
fwi->size = diff;
|
2019-05-27 21:36:28 +00:00
|
|
|
fwi->write_flags = write_flags;
|
2019-04-04 16:51:34 +00:00
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fdisp_destroy(&fdi);
|
|
|
|
|
2019-06-25 23:40:18 +00:00
|
|
|
if (wrote_anything)
|
|
|
|
fuse_vnode_undirty_cached_timestamps(vp);
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
return (err);
|
|
|
|
}
|
|
|
|
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE_DEFINE6(fusefs, , io, write_biobackend_start, "int64_t", "int", "int",
|
2019-02-28 19:27:54 +00:00
|
|
|
"struct uio*", "int", "bool");
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE_DEFINE2(fusefs, , io, write_biobackend_append_race, "long", "int");
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE_DEFINE2(fusefs, , io, write_biobackend_issue, "int", "struct buf*");
|
2019-02-28 19:27:54 +00:00
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
static int
|
|
|
|
fuse_write_biobackend(struct vnode *vp, struct uio *uio,
|
2019-04-01 20:42:15 +00:00
|
|
|
struct ucred *cred, struct fuse_filehandle *fufh, int ioflag, pid_t pid)
|
2012-10-13 23:54:26 +00:00
|
|
|
{
|
2019-05-23 00:22:03 +00:00
|
|
|
struct fuse_vnode_data *fvdat = VTOFUD(vp);
|
2012-10-13 23:54:26 +00:00
|
|
|
struct buf *bp;
|
|
|
|
daddr_t lbn;
|
2019-05-15 00:38:52 +00:00
|
|
|
off_t filesize;
|
2012-10-13 23:54:26 +00:00
|
|
|
int bcount;
|
2019-06-14 18:14:51 +00:00
|
|
|
int n, on, seqcount, err = 0;
|
2019-06-11 16:32:33 +00:00
|
|
|
bool last_page;
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
const int biosize = fuse_iosize(vp);
|
|
|
|
|
2019-06-14 18:14:51 +00:00
|
|
|
seqcount = ioflag >> IO_SEQSHIFT;
|
|
|
|
|
2019-06-06 20:35:41 +00:00
|
|
|
KASSERT(uio->uio_rw == UIO_WRITE, ("fuse_write_biobackend mode"));
|
2012-10-13 23:54:26 +00:00
|
|
|
if (vp->v_type != VREG)
|
|
|
|
return (EIO);
|
|
|
|
if (uio->uio_offset < 0)
|
|
|
|
return (EINVAL);
|
|
|
|
if (uio->uio_resid == 0)
|
|
|
|
return (0);
|
2019-05-15 00:38:52 +00:00
|
|
|
|
|
|
|
err = fuse_vnode_size(vp, &filesize, cred, curthread);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2013-01-08 12:21:50 +00:00
|
|
|
if (ioflag & IO_APPEND)
|
2019-05-15 00:38:52 +00:00
|
|
|
uio_setoffset(uio, filesize);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-06-03 23:24:07 +00:00
|
|
|
if (vn_rlimit_fsize(vp, uio, uio->uio_td))
|
|
|
|
return (EFBIG);
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
do {
|
2019-06-05 20:18:56 +00:00
|
|
|
bool direct_append, extending;
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
if (fuse_isdeadfs(vp)) {
|
|
|
|
err = ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
lbn = uio->uio_offset / biosize;
|
|
|
|
on = uio->uio_offset & (biosize - 1);
|
|
|
|
n = MIN((unsigned)(biosize - on), uio->uio_resid);
|
|
|
|
|
|
|
|
again:
|
2019-06-05 20:18:56 +00:00
|
|
|
/* Get or create a buffer for the write */
|
|
|
|
direct_append = uio->uio_offset == filesize && n;
|
2019-06-13 19:07:03 +00:00
|
|
|
if (uio->uio_offset + n < filesize) {
|
2019-06-05 20:18:56 +00:00
|
|
|
extending = false;
|
|
|
|
if ((off_t)(lbn + 1) * biosize < filesize) {
|
|
|
|
/* Not the file's last block */
|
|
|
|
bcount = biosize;
|
|
|
|
} else {
|
|
|
|
/* The file's last block */
|
2019-06-13 19:07:03 +00:00
|
|
|
bcount = filesize - (off_t)lbn * biosize;
|
2019-06-05 20:18:56 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
extending = true;
|
|
|
|
bcount = on + n;
|
|
|
|
}
|
2019-06-11 16:32:33 +00:00
|
|
|
if (howmany(((off_t)lbn * biosize + on + n - 1), PAGE_SIZE) >=
|
|
|
|
howmany(filesize, PAGE_SIZE))
|
|
|
|
last_page = true;
|
|
|
|
else
|
|
|
|
last_page = false;
|
2019-06-05 20:18:56 +00:00
|
|
|
if (direct_append) {
|
|
|
|
/*
|
|
|
|
* Take care to preserve the buffer's B_CACHE state so
|
|
|
|
* as not to cause an unnecessary read.
|
|
|
|
*/
|
|
|
|
bp = getblk(vp, lbn, on, PCATCH, 0, 0);
|
2012-10-13 23:54:26 +00:00
|
|
|
if (bp != NULL) {
|
2019-06-05 20:18:56 +00:00
|
|
|
uint32_t save = bp->b_flags & B_CACHE;
|
2012-10-13 23:54:26 +00:00
|
|
|
allocbuf(bp, bcount);
|
|
|
|
bp->b_flags |= save;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
bp = getblk(vp, lbn, bcount, PCATCH, 0, 0);
|
|
|
|
}
|
|
|
|
if (!bp) {
|
|
|
|
err = EINTR;
|
|
|
|
break;
|
|
|
|
}
|
2019-06-05 20:18:56 +00:00
|
|
|
if (extending) {
|
|
|
|
/*
|
|
|
|
* Extend file _after_ locking buffer so we won't race
|
|
|
|
* with other readers
|
|
|
|
*/
|
2019-06-06 16:20:50 +00:00
|
|
|
err = fuse_vnode_setsize(vp, uio->uio_offset + n);
|
2019-06-14 18:14:51 +00:00
|
|
|
filesize = uio->uio_offset + n;
|
2019-06-05 20:18:56 +00:00
|
|
|
fvdat->flag |= FN_SIZECHANGE;
|
|
|
|
if (err) {
|
|
|
|
brelse(bp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
SDT_PROBE6(fusefs, , io, write_biobackend_start,
|
|
|
|
lbn, on, n, uio, bcount, direct_append);
|
2012-10-13 23:54:26 +00:00
|
|
|
/*
|
|
|
|
* Issue a READ if B_CACHE is not set. In special-append
|
|
|
|
* mode, B_CACHE is based on the buffer prior to the write
|
|
|
|
* op and is typically set, avoiding the read. If a read
|
|
|
|
* is required in special append mode, the server will
|
|
|
|
* probably send us a short-read since we extended the file
|
|
|
|
* on our end, resulting in b_resid == 0 and, thusly,
|
|
|
|
* B_CACHE getting set.
|
|
|
|
*
|
|
|
|
* We can also avoid issuing the read if the write covers
|
|
|
|
* the entire buffer. We have to make sure the buffer state
|
|
|
|
* is reasonable in this case since we will not be initiating
|
|
|
|
* I/O. See the comments in kern/vfs_bio.c's getblk() for
|
|
|
|
* more information.
|
|
|
|
*
|
|
|
|
* B_CACHE may also be set due to the buffer being cached
|
|
|
|
* normally.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (on == 0 && n == bcount) {
|
|
|
|
bp->b_flags |= B_CACHE;
|
|
|
|
bp->b_flags &= ~B_INVAL;
|
|
|
|
bp->b_ioflags &= ~BIO_ERROR;
|
|
|
|
}
|
|
|
|
if ((bp->b_flags & B_CACHE) == 0) {
|
|
|
|
bp->b_iocmd = BIO_READ;
|
|
|
|
vfs_busy_pages(bp, 0);
|
|
|
|
fuse_io_strategy(vp, bp);
|
|
|
|
if ((err = bp->b_error)) {
|
|
|
|
brelse(bp);
|
|
|
|
break;
|
|
|
|
}
|
2019-06-25 17:24:43 +00:00
|
|
|
if (bp->b_resid > 0) {
|
|
|
|
/*
|
|
|
|
* Short read indicates EOF. Update file size
|
|
|
|
* from the server and try again.
|
|
|
|
*/
|
|
|
|
SDT_PROBE2(fusefs, , io, trace, 1,
|
|
|
|
"Short read during a RMW");
|
|
|
|
brelse(bp);
|
|
|
|
err = fuse_vnode_size(vp, &filesize, cred,
|
|
|
|
curthread);
|
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
goto again;
|
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
if (bp->b_wcred == NOCRED)
|
|
|
|
bp->b_wcred = crhold(cred);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If dirtyend exceeds file size, chop it down. This should
|
|
|
|
* not normally occur but there is an append race where it
|
|
|
|
* might occur XXX, so we log it.
|
|
|
|
*
|
|
|
|
* If the chopping creates a reverse-indexed or degenerate
|
|
|
|
* situation with dirtyoff/end, we 0 both of them.
|
|
|
|
*/
|
|
|
|
if (bp->b_dirtyend > bcount) {
|
2019-04-20 00:04:31 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_append_race,
|
2012-10-13 23:54:26 +00:00
|
|
|
(long)bp->b_blkno * biosize,
|
|
|
|
bp->b_dirtyend - bcount);
|
|
|
|
bp->b_dirtyend = bcount;
|
|
|
|
}
|
|
|
|
if (bp->b_dirtyoff >= bp->b_dirtyend)
|
|
|
|
bp->b_dirtyoff = bp->b_dirtyend = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the new write will leave a contiguous dirty
|
|
|
|
* area, just update the b_dirtyoff and b_dirtyend,
|
|
|
|
* otherwise force a write rpc of the old dirty area.
|
|
|
|
*
|
|
|
|
* While it is possible to merge discontiguous writes due to
|
|
|
|
* our having a B_CACHE buffer ( and thus valid read data
|
|
|
|
* for the hole), we don't because it could lead to
|
|
|
|
* significant cache coherency problems with multiple clients,
|
|
|
|
* especially if locking is implemented later on.
|
|
|
|
*
|
|
|
|
* as an optimization we could theoretically maintain
|
|
|
|
* a linked list of discontinuous areas, but we would still
|
|
|
|
* have to commit them separately so there isn't much
|
|
|
|
* advantage to it except perhaps a bit of asynchronization.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (bp->b_dirtyend > 0 &&
|
|
|
|
(on > bp->b_dirtyend || (on + n) < bp->b_dirtyoff)) {
|
|
|
|
/*
|
|
|
|
* Yes, we mean it. Write out everything to "storage"
|
2016-04-29 20:51:24 +00:00
|
|
|
* immediately, without hesitation. (Apart from other
|
2012-10-13 23:54:26 +00:00
|
|
|
* reasons: the only way to know if a write is valid
|
|
|
|
* if its actually written out.)
|
|
|
|
*/
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_issue, 0, bp);
|
2012-10-13 23:54:26 +00:00
|
|
|
bwrite(bp);
|
|
|
|
if (bp->b_error == EINTR) {
|
|
|
|
err = EINTR;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
goto again;
|
|
|
|
}
|
|
|
|
err = uiomove((char *)bp->b_data + on, n, uio);
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
bp->b_ioflags |= BIO_ERROR;
|
|
|
|
bp->b_error = err;
|
|
|
|
brelse(bp);
|
|
|
|
break;
|
2019-06-11 16:32:33 +00:00
|
|
|
/* TODO: vfs_bio_clrbuf like ffs_write does? */
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Only update dirtyoff/dirtyend if not a degenerate
|
|
|
|
* condition.
|
|
|
|
*/
|
|
|
|
if (n) {
|
|
|
|
if (bp->b_dirtyend > 0) {
|
|
|
|
bp->b_dirtyoff = MIN(on, bp->b_dirtyoff);
|
|
|
|
bp->b_dirtyend = MAX((on + n), bp->b_dirtyend);
|
|
|
|
} else {
|
|
|
|
bp->b_dirtyoff = on;
|
|
|
|
bp->b_dirtyend = on + n;
|
|
|
|
}
|
|
|
|
vfs_bio_set_valid(bp, on, n);
|
|
|
|
}
|
2019-06-11 16:32:33 +00:00
|
|
|
|
|
|
|
vfs_bio_set_flags(bp, ioflag);
|
|
|
|
|
2019-06-25 17:24:43 +00:00
|
|
|
bp->b_flags |= B_FUSEFS_WRITE_CACHE;
|
2019-06-17 23:34:11 +00:00
|
|
|
if (ioflag & IO_SYNC) {
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_issue, 2, bp);
|
2019-06-25 17:24:43 +00:00
|
|
|
if (!(ioflag & IO_VMIO))
|
|
|
|
bp->b_flags &= ~B_FUSEFS_WRITE_CACHE;
|
2019-06-11 16:32:33 +00:00
|
|
|
err = bwrite(bp);
|
|
|
|
} else if (vm_page_count_severe() ||
|
|
|
|
buf_dirty_count_severe() ||
|
|
|
|
(ioflag & IO_ASYNC)) {
|
2019-06-14 18:14:51 +00:00
|
|
|
bp->b_flags |= B_CLUSTEROK;
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_issue, 3, bp);
|
2019-06-11 16:32:33 +00:00
|
|
|
bawrite(bp);
|
|
|
|
} else if (on == 0 && n == bcount) {
|
2019-06-13 19:07:03 +00:00
|
|
|
if ((vp->v_mount->mnt_flag & MNT_NOCLUSTERW) == 0) {
|
2019-06-14 18:14:51 +00:00
|
|
|
bp->b_flags |= B_CLUSTEROK;
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_issue,
|
|
|
|
4, bp);
|
2019-06-14 18:14:51 +00:00
|
|
|
cluster_write(vp, bp, filesize, seqcount, 0);
|
2019-06-13 19:07:03 +00:00
|
|
|
} else {
|
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_issue,
|
|
|
|
5, bp);
|
2019-06-11 16:32:33 +00:00
|
|
|
bawrite(bp);
|
2019-06-13 19:07:03 +00:00
|
|
|
}
|
2019-06-11 16:32:33 +00:00
|
|
|
} else if (ioflag & IO_DIRECT) {
|
2019-06-14 18:14:51 +00:00
|
|
|
bp->b_flags |= B_CLUSTEROK;
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_issue, 6, bp);
|
2019-06-11 16:32:33 +00:00
|
|
|
bawrite(bp);
|
|
|
|
} else {
|
|
|
|
bp->b_flags &= ~B_CLUSTEROK;
|
2019-06-13 19:07:03 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, write_biobackend_issue, 7, bp);
|
2019-06-11 16:32:33 +00:00
|
|
|
bdwrite(bp);
|
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
} while (uio->uio_resid > 0 && n > 0);
|
|
|
|
|
|
|
|
return (err);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fuse_io_strategy(struct vnode *vp, struct buf *bp)
|
|
|
|
{
|
2019-06-21 21:44:31 +00:00
|
|
|
struct fuse_vnode_data *fvdat = VTOFUD(vp);
|
2012-10-13 23:54:26 +00:00
|
|
|
struct fuse_filehandle *fufh;
|
|
|
|
struct ucred *cred;
|
|
|
|
struct uio *uiop;
|
|
|
|
struct uio uio;
|
|
|
|
struct iovec io;
|
2019-05-15 00:38:52 +00:00
|
|
|
off_t filesize;
|
2012-10-13 23:54:26 +00:00
|
|
|
int error = 0;
|
2019-04-03 19:59:45 +00:00
|
|
|
int fflag;
|
2019-04-01 20:42:15 +00:00
|
|
|
/* We don't know the true pid when we're dealing with the cache */
|
|
|
|
pid_t pid = 0;
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
const int biosize = fuse_iosize(vp);
|
|
|
|
|
2012-11-05 15:23:54 +00:00
|
|
|
MPASS(vp->v_type == VREG || vp->v_type == VDIR);
|
2012-10-13 23:54:26 +00:00
|
|
|
MPASS(bp->b_iocmd == BIO_READ || bp->b_iocmd == BIO_WRITE);
|
|
|
|
|
2019-04-03 19:59:45 +00:00
|
|
|
fflag = bp->b_iocmd == BIO_READ ? FREAD : FWRITE;
|
2019-04-01 20:42:15 +00:00
|
|
|
cred = bp->b_iocmd == BIO_READ ? bp->b_rcred : bp->b_wcred;
|
2019-04-03 19:59:45 +00:00
|
|
|
error = fuse_filehandle_getrw(vp, fflag, &fufh, cred, pid);
|
2019-03-30 00:57:07 +00:00
|
|
|
if (bp->b_iocmd == BIO_READ && error == EBADF) {
|
|
|
|
/*
|
|
|
|
* This may be a read-modify-write operation on a cached file
|
|
|
|
* opened O_WRONLY. The FUSE protocol allows this.
|
|
|
|
*/
|
2019-04-03 19:59:45 +00:00
|
|
|
error = fuse_filehandle_get(vp, FWRITE, &fufh, cred, pid);
|
2019-03-30 00:57:07 +00:00
|
|
|
}
|
2012-10-13 23:54:26 +00:00
|
|
|
if (error) {
|
|
|
|
printf("FUSE: strategy: filehandles are closed\n");
|
|
|
|
bp->b_ioflags |= BIO_ERROR;
|
|
|
|
bp->b_error = error;
|
2019-03-28 21:57:42 +00:00
|
|
|
bufdone(bp);
|
2012-10-13 23:54:26 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
uiop = &uio;
|
|
|
|
uiop->uio_iov = &io;
|
|
|
|
uiop->uio_iovcnt = 1;
|
|
|
|
uiop->uio_segflg = UIO_SYSSPACE;
|
|
|
|
uiop->uio_td = curthread;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* clear BIO_ERROR and B_INVAL state prior to initiating the I/O. We
|
|
|
|
* do this here so we do not have to do it in all the code that
|
|
|
|
* calls us.
|
|
|
|
*/
|
|
|
|
bp->b_flags &= ~B_INVAL;
|
|
|
|
bp->b_ioflags &= ~BIO_ERROR;
|
|
|
|
|
|
|
|
KASSERT(!(bp->b_flags & B_DONE),
|
|
|
|
("fuse_io_strategy: bp %p already marked done", bp));
|
|
|
|
if (bp->b_iocmd == BIO_READ) {
|
2019-06-24 17:05:31 +00:00
|
|
|
ssize_t left;
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
io.iov_len = uiop->uio_resid = bp->b_bcount;
|
|
|
|
io.iov_base = bp->b_data;
|
|
|
|
uiop->uio_rw = UIO_READ;
|
|
|
|
|
2019-06-11 16:32:33 +00:00
|
|
|
uiop->uio_offset = ((off_t)bp->b_lblkno) * biosize;
|
2012-10-13 23:54:26 +00:00
|
|
|
error = fuse_read_directbackend(vp, uiop, cred, fufh);
|
2019-06-24 17:05:31 +00:00
|
|
|
/*
|
|
|
|
* Store the amount we failed to read in the buffer's private
|
|
|
|
* field, so callers can truncate the file if necessary'
|
|
|
|
*/
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-05-13 19:31:09 +00:00
|
|
|
if (!error && uiop->uio_resid) {
|
2019-06-21 23:29:29 +00:00
|
|
|
int nread = bp->b_bcount - uiop->uio_resid;
|
2019-06-25 17:24:43 +00:00
|
|
|
left = uiop->uio_resid;
|
2019-06-21 23:29:29 +00:00
|
|
|
bzero((char *)bp->b_data + nread, left);
|
|
|
|
|
2019-06-25 17:24:43 +00:00
|
|
|
if ((fvdat->flag & FN_SIZECHANGE) == 0) {
|
2019-06-21 23:29:29 +00:00
|
|
|
/*
|
|
|
|
* A short read with no error, when not using
|
|
|
|
* direct io, and when no writes are cached,
|
2019-06-25 17:24:43 +00:00
|
|
|
* indicates EOF caused by a server-side
|
|
|
|
* truncation. Clear the attr cache so we'll
|
|
|
|
* pick up the new file size and timestamps.
|
|
|
|
*
|
|
|
|
* We must still bzero the remaining buffer so
|
|
|
|
* uninitialized data doesn't get exposed by a
|
|
|
|
* future truncate that extends the file.
|
2019-06-21 23:29:29 +00:00
|
|
|
*
|
2019-06-24 17:05:31 +00:00
|
|
|
* To prevent lock order problems, we must
|
2019-06-25 17:24:43 +00:00
|
|
|
* truncate the file upstack, not here.
|
2019-06-21 21:44:31 +00:00
|
|
|
*/
|
2019-06-21 23:29:29 +00:00
|
|
|
SDT_PROBE2(fusefs, , io, trace, 1,
|
|
|
|
"Short read of a clean file");
|
2019-06-25 17:24:43 +00:00
|
|
|
fuse_vnode_clear_attr_cache(vp);
|
2019-06-21 21:44:31 +00:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* If dirty writes _are_ cached beyond EOF,
|
|
|
|
* that indicates a newly created hole that the
|
2019-06-25 17:24:43 +00:00
|
|
|
* server doesn't know about. Those don't pose
|
|
|
|
* any problem.
|
2019-06-21 21:44:31 +00:00
|
|
|
* XXX: we don't currently track whether dirty
|
|
|
|
* writes are cached beyond EOF, before EOF, or
|
|
|
|
* both.
|
|
|
|
*/
|
|
|
|
SDT_PROBE2(fusefs, , io, trace, 1,
|
|
|
|
"Short read of a dirty file");
|
|
|
|
uiop->uio_resid = 0;
|
|
|
|
}
|
|
|
|
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
if (error) {
|
|
|
|
bp->b_ioflags |= BIO_ERROR;
|
|
|
|
bp->b_error = error;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Setup for actual write
|
|
|
|
*/
|
2019-05-15 00:38:52 +00:00
|
|
|
error = fuse_vnode_size(vp, &filesize, cred, curthread);
|
|
|
|
if (error) {
|
|
|
|
bp->b_ioflags |= BIO_ERROR;
|
|
|
|
bp->b_error = error;
|
|
|
|
bufdone(bp);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2019-06-11 16:32:33 +00:00
|
|
|
if ((off_t)bp->b_lblkno * biosize + bp->b_dirtyend > filesize)
|
2019-05-15 00:38:52 +00:00
|
|
|
bp->b_dirtyend = filesize -
|
2019-06-11 16:32:33 +00:00
|
|
|
(off_t)bp->b_lblkno * biosize;
|
2012-10-13 23:54:26 +00:00
|
|
|
|
|
|
|
if (bp->b_dirtyend > bp->b_dirtyoff) {
|
|
|
|
io.iov_len = uiop->uio_resid = bp->b_dirtyend
|
|
|
|
- bp->b_dirtyoff;
|
2019-06-11 16:32:33 +00:00
|
|
|
uiop->uio_offset = (off_t)bp->b_lblkno * biosize
|
2012-10-13 23:54:26 +00:00
|
|
|
+ bp->b_dirtyoff;
|
|
|
|
io.iov_base = (char *)bp->b_data + bp->b_dirtyoff;
|
|
|
|
uiop->uio_rw = UIO_WRITE;
|
|
|
|
|
2019-06-25 17:24:43 +00:00
|
|
|
bool pages = bp->b_flags & B_FUSEFS_WRITE_CACHE;
|
2019-05-15 00:38:52 +00:00
|
|
|
error = fuse_write_directbackend(vp, uiop, cred, fufh,
|
2019-06-25 17:24:43 +00:00
|
|
|
filesize, 0, pages);
|
2012-10-13 23:54:26 +00:00
|
|
|
|
2019-06-06 20:35:41 +00:00
|
|
|
if (error == EINTR || error == ETIMEDOUT) {
|
2012-10-13 23:54:26 +00:00
|
|
|
bp->b_flags &= ~(B_INVAL | B_NOCACHE);
|
|
|
|
if ((bp->b_flags & B_PAGING) == 0) {
|
|
|
|
bdirty(bp);
|
|
|
|
bp->b_flags &= ~B_DONE;
|
|
|
|
}
|
|
|
|
if ((error == EINTR || error == ETIMEDOUT) &&
|
|
|
|
(bp->b_flags & B_ASYNC) == 0)
|
|
|
|
bp->b_flags |= B_EINTR;
|
|
|
|
} else {
|
|
|
|
if (error) {
|
|
|
|
bp->b_ioflags |= BIO_ERROR;
|
|
|
|
bp->b_flags |= B_INVAL;
|
|
|
|
bp->b_error = error;
|
|
|
|
}
|
|
|
|
bp->b_dirtyoff = bp->b_dirtyend = 0;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
bp->b_resid = 0;
|
|
|
|
bufdone(bp);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
bp->b_resid = uiop->uio_resid;
|
|
|
|
bufdone(bp);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
fuse_io_flushbuf(struct vnode *vp, int waitfor, struct thread *td)
|
|
|
|
{
|
|
|
|
|
2019-04-09 20:20:04 +00:00
|
|
|
return (vn_fsync_buf(vp, waitfor));
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Flush and invalidate all dirty buffers. If another process is already
|
|
|
|
* doing the flush, just wait for completion.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
fuse_io_invalbuf(struct vnode *vp, struct thread *td)
|
|
|
|
{
|
|
|
|
struct fuse_vnode_data *fvdat = VTOFUD(vp);
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
if (vp->v_iflag & VI_DOOMED)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ASSERT_VOP_ELOCKED(vp, "fuse_io_invalbuf");
|
|
|
|
|
|
|
|
while (fvdat->flag & FN_FLUSHINPROG) {
|
|
|
|
struct proc *p = td->td_proc;
|
|
|
|
|
|
|
|
if (vp->v_mount->mnt_kern_flag & MNTK_UNMOUNTF)
|
|
|
|
return EIO;
|
|
|
|
fvdat->flag |= FN_FLUSHWANT;
|
|
|
|
tsleep(&fvdat->flag, PRIBIO + 2, "fusevinv", 2 * hz);
|
|
|
|
error = 0;
|
|
|
|
if (p != NULL) {
|
|
|
|
PROC_LOCK(p);
|
|
|
|
if (SIGNOTEMPTY(p->p_siglist) ||
|
|
|
|
SIGNOTEMPTY(td->td_siglist))
|
|
|
|
error = EINTR;
|
|
|
|
PROC_UNLOCK(p);
|
|
|
|
}
|
|
|
|
if (error == EINTR)
|
|
|
|
return EINTR;
|
|
|
|
}
|
|
|
|
fvdat->flag |= FN_FLUSHINPROG;
|
|
|
|
|
|
|
|
if (vp->v_bufobj.bo_object != NULL) {
|
2013-03-09 02:32:23 +00:00
|
|
|
VM_OBJECT_WLOCK(vp->v_bufobj.bo_object);
|
2012-10-13 23:54:26 +00:00
|
|
|
vm_object_page_clean(vp->v_bufobj.bo_object, 0, 0, OBJPC_SYNC);
|
2013-03-09 02:32:23 +00:00
|
|
|
VM_OBJECT_WUNLOCK(vp->v_bufobj.bo_object);
|
2012-10-13 23:54:26 +00:00
|
|
|
}
|
|
|
|
error = vinvalbuf(vp, V_SAVE, PCATCH, 0);
|
|
|
|
while (error) {
|
|
|
|
if (error == ERESTART || error == EINTR) {
|
|
|
|
fvdat->flag &= ~FN_FLUSHINPROG;
|
|
|
|
if (fvdat->flag & FN_FLUSHWANT) {
|
|
|
|
fvdat->flag &= ~FN_FLUSHWANT;
|
|
|
|
wakeup(&fvdat->flag);
|
|
|
|
}
|
|
|
|
return EINTR;
|
|
|
|
}
|
|
|
|
error = vinvalbuf(vp, V_SAVE, PCATCH, 0);
|
|
|
|
}
|
|
|
|
fvdat->flag &= ~FN_FLUSHINPROG;
|
|
|
|
if (fvdat->flag & FN_FLUSHWANT) {
|
|
|
|
fvdat->flag &= ~FN_FLUSHWANT;
|
|
|
|
wakeup(&fvdat->flag);
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|