1 /*- 2 * SPDX-License-Identifier: BSD-3-Clause 3 * 4 * Copyright (c) 2007-2009 Google Inc. and Amit Singh 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions are 9 * met: 10 * 11 * * Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * * Redistributions in binary form must reproduce the above 14 * copyright notice, this list of conditions and the following disclaimer 15 * in the documentation and/or other materials provided with the 16 * distribution. 17 * * Neither the name of Google Inc. nor the names of its 18 * contributors may be used to endorse or promote products derived from 19 * this software without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 22 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 23 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 24 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 25 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 26 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 27 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 28 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 29 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 30 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 32 * 33 * Copyright (C) 2005 Csaba Henk. 34 * All rights reserved. 35 * 36 * Copyright (c) 2019 The FreeBSD Foundation 37 * 38 * Portions of this software were developed by BFF Storage Systems, LLC under 39 * sponsorship from the FreeBSD Foundation. 40 * 41 * Redistribution and use in source and binary forms, with or without 42 * modification, are permitted provided that the following conditions 43 * are met: 44 * 1. Redistributions of source code must retain the above copyright 45 * notice, this list of conditions and the following disclaimer. 46 * 2. Redistributions in binary form must reproduce the above copyright 47 * notice, this list of conditions and the following disclaimer in the 48 * documentation and/or other materials provided with the distribution. 49 * 50 * THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND 51 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 52 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 53 * ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE 54 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 55 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 56 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 57 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 58 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 59 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 60 * SUCH DAMAGE. 61 */ 62 63 #include <sys/types.h> 64 #include <sys/systm.h> 65 #include <sys/counter.h> 66 #include <sys/module.h> 67 #include <sys/errno.h> 68 #include <sys/param.h> 69 #include <sys/kernel.h> 70 #include <sys/conf.h> 71 #include <sys/uio.h> 72 #include <sys/malloc.h> 73 #include <sys/queue.h> 74 #include <sys/lock.h> 75 #include <sys/sx.h> 76 #include <sys/mutex.h> 77 #include <sys/proc.h> 78 #include <sys/vnode.h> 79 #include <sys/namei.h> 80 #include <sys/mount.h> 81 #include <sys/sysctl.h> 82 #include <sys/fcntl.h> 83 #include <sys/priv.h> 84 #include <sys/buf.h> 85 #include <security/mac/mac_framework.h> 86 #include <vm/vm.h> 87 #include <vm/vm_extern.h> 88 89 #include "fuse.h" 90 #include "fuse_node.h" 91 #include "fuse_internal.h" 92 #include "fuse_io.h" 93 #include "fuse_ipc.h" 94 95 SDT_PROVIDER_DECLARE(fusefs); 96 /* 97 * Fuse trace probe: 98 * arg0: verbosity. Higher numbers give more verbose messages 99 * arg1: Textual message 100 */ 101 SDT_PROBE_DEFINE2(fusefs, , node, trace, "int", "char*"); 102 103 MALLOC_DEFINE(M_FUSEVN, "fuse_vnode", "fuse vnode private data"); 104 105 static int sysctl_fuse_cache_mode(SYSCTL_HANDLER_ARGS); 106 107 static counter_u64_t fuse_node_count; 108 109 SYSCTL_COUNTER_U64(_vfs_fusefs_stats, OID_AUTO, node_count, CTLFLAG_RD, 110 &fuse_node_count, "Count of FUSE vnodes"); 111 112 int fuse_data_cache_mode = FUSE_CACHE_WT; 113 114 /* 115 * OBSOLETE 116 * This sysctl is no longer needed as of fuse protocol 7.23. Now, individual 117 * servers can select the cache behavior they need for each mountpoint: 118 * - writethrough: the default 119 * - writeback: set FUSE_WRITEBACK_CACHE in fuse_init_out.flags 120 * - uncached: set FOPEN_DIRECT_IO for every file 121 * The sysctl is retained primarily due to the enduring popularity of libfuse2, 122 * which is frozen at protocol version 7.19. As of 4-April-2024, 90% of 123 * FreeBSD ports that use libfuse still bind to libfuse2. 124 */ 125 SYSCTL_PROC(_vfs_fusefs, OID_AUTO, data_cache_mode, 126 CTLTYPE_INT | CTLFLAG_MPSAFE | CTLFLAG_RW, 127 &fuse_data_cache_mode, 0, sysctl_fuse_cache_mode, "I", 128 "Zero: disable caching of FUSE file data; One: write-through caching " 129 "(default); Two: write-back caching (generally unsafe)"); 130 131 static int 132 sysctl_fuse_cache_mode(SYSCTL_HANDLER_ARGS) 133 { 134 int val, error; 135 136 val = *(int *)arg1; 137 error = sysctl_handle_int(oidp, &val, 0, req); 138 if (error || !req->newptr) 139 return (error); 140 141 switch (val) { 142 case FUSE_CACHE_UC: 143 case FUSE_CACHE_WT: 144 case FUSE_CACHE_WB: 145 *(int *)arg1 = val; 146 break; 147 default: 148 return (EDOM); 149 } 150 return (0); 151 } 152 153 static void 154 fuse_vnode_init(struct vnode *vp, struct fuse_vnode_data *fvdat, 155 uint64_t nodeid, __enum_uint8(vtype) vtyp) 156 { 157 fvdat->nid = nodeid; 158 LIST_INIT(&fvdat->handles); 159 160 mtx_init(&fvdat->cached_attr_mtx, "fuse attr cache mutex", NULL, 161 MTX_DEF); 162 vattr_null(&fvdat->cached_attrs); 163 fvdat->cached_attrs.va_birthtime.tv_sec = -1; 164 fvdat->cached_attrs.va_birthtime.tv_nsec = 0; 165 fvdat->cached_attrs.va_fsid = VNOVAL; 166 fvdat->cached_attrs.va_gen = 0; 167 fvdat->cached_attrs.va_rdev = NODEV; 168 169 if (nodeid == FUSE_ROOT_ID) { 170 vp->v_vflag |= VV_ROOT; 171 } 172 vp->v_type = vtyp; 173 vp->v_data = fvdat; 174 cluster_init_vn(&fvdat->clusterw); 175 timespecclear(&fvdat->last_local_modify); 176 177 counter_u64_add(fuse_node_count, 1); 178 } 179 180 void 181 fuse_vnode_destroy(struct vnode *vp) 182 { 183 struct fuse_vnode_data *fvdat = vp->v_data; 184 185 vp->v_data = NULL; 186 mtx_destroy(&fvdat->cached_attr_mtx); 187 KASSERT(LIST_EMPTY(&fvdat->handles), 188 ("Destroying fuse vnode with open files!")); 189 free(fvdat, M_FUSEVN); 190 191 counter_u64_add(fuse_node_count, -1); 192 } 193 194 int 195 fuse_vnode_cmp(struct vnode *vp, void *nidp) 196 { 197 return (VTOI(vp) != *((uint64_t *)nidp)); 198 } 199 200 SDT_PROBE_DEFINE3(fusefs, , node, stale_vnode, "struct vnode*", "uint8_t", 201 "uint64_t"); 202 static int 203 fuse_vnode_alloc(struct mount *mp, 204 struct thread *td, 205 uint64_t nodeid, 206 __enum_uint8(vtype) vtyp, 207 struct vnode **vpp) 208 { 209 struct fuse_data *data; 210 struct fuse_vnode_data *fvdat; 211 struct vnode *vp2; 212 int err = 0; 213 214 data = fuse_get_mpdata(mp); 215 if (vtyp == VNON) { 216 return EINVAL; 217 } 218 *vpp = NULL; 219 err = vfs_hash_get(mp, fuse_vnode_hash(nodeid), LK_EXCLUSIVE, td, vpp, 220 fuse_vnode_cmp, &nodeid); 221 if (err) 222 return (err); 223 224 if (*vpp) { 225 if ((*vpp)->v_type == vtyp) { 226 /* Reuse a vnode that hasn't yet been reclaimed */ 227 MPASS((*vpp)->v_data != NULL); 228 MPASS(VTOFUD(*vpp)->nid == nodeid); 229 SDT_PROBE2(fusefs, , node, trace, 1, 230 "vnode taken from hash"); 231 return (0); 232 } else { 233 /* 234 * The inode changed types! If we get here, we can't 235 * tell whether the inode's entry cache had expired 236 * yet. So this could be the result of a buggy server, 237 * but more likely the server just reused an inode 238 * number following an entry cache expiration. 239 */ 240 SDT_PROBE3(fusefs, , node, stale_vnode, *vpp, vtyp, 241 nodeid); 242 fuse_internal_vnode_disappear(*vpp); 243 vgone(*vpp); 244 lockmgr((*vpp)->v_vnlock, LK_RELEASE, NULL); 245 } 246 } 247 fvdat = malloc(sizeof(*fvdat), M_FUSEVN, M_WAITOK | M_ZERO); 248 switch (vtyp) { 249 case VFIFO: 250 err = getnewvnode("fuse", mp, &fuse_fifoops, vpp); 251 break; 252 default: 253 err = getnewvnode("fuse", mp, &fuse_vnops, vpp); 254 break; 255 } 256 if (err) { 257 free(fvdat, M_FUSEVN); 258 return (err); 259 } 260 lockmgr((*vpp)->v_vnlock, LK_EXCLUSIVE, NULL); 261 fuse_vnode_init(*vpp, fvdat, nodeid, vtyp); 262 err = insmntque(*vpp, mp); 263 ASSERT_VOP_ELOCKED(*vpp, "fuse_vnode_alloc"); 264 if (err) { 265 lockmgr((*vpp)->v_vnlock, LK_RELEASE, NULL); 266 free(fvdat, M_FUSEVN); 267 *vpp = NULL; 268 return (err); 269 } 270 /* Disallow async reads for fifos because UFS does. I don't know why */ 271 if (data->dataflags & FSESS_ASYNC_READ && vtyp != VFIFO) 272 VN_LOCK_ASHARE(*vpp); 273 274 vn_set_state(*vpp, VSTATE_CONSTRUCTED); 275 err = vfs_hash_insert(*vpp, fuse_vnode_hash(nodeid), LK_EXCLUSIVE, 276 td, &vp2, fuse_vnode_cmp, &nodeid); 277 if (err) { 278 lockmgr((*vpp)->v_vnlock, LK_RELEASE, NULL); 279 free(fvdat, M_FUSEVN); 280 *vpp = NULL; 281 return (err); 282 } 283 if (vp2 != NULL) { 284 *vpp = vp2; 285 return (0); 286 } 287 288 ASSERT_VOP_ELOCKED(*vpp, "fuse_vnode_alloc"); 289 290 return (0); 291 } 292 293 int 294 fuse_vnode_get(struct mount *mp, 295 struct fuse_entry_out *feo, 296 uint64_t nodeid, 297 struct vnode *dvp, 298 struct vnode **vpp, 299 struct componentname *cnp, 300 __enum_uint8(vtype) vtyp) 301 { 302 struct thread *td = curthread; 303 bool exportable = fuse_get_mpdata(mp)->dataflags & FSESS_EXPORT_SUPPORT; 304 305 /* 306 * feo should only be NULL for the root directory, which (when libfuse 307 * is used) always has generation 0 308 */ 309 uint64_t generation = feo ? feo->generation : 0; 310 int err = 0; 311 312 if (dvp != NULL && VTOFUD(dvp)->nid == nodeid) { 313 fuse_warn(fuse_get_mpdata(mp), FSESS_WARN_ILLEGAL_INODE, 314 "Assigned same inode to both parent and child."); 315 return EIO; 316 } 317 if (feo && feo->nodeid != feo->attr.ino && exportable) { 318 /* 319 * NFS servers (both kernelspace and userspace) rely on 320 * VFS_VGET to lookup inodes. But that's only possible if the 321 * file's inode number matches its nodeid, which isn't 322 * necessarily the case for FUSE. If they don't match, then we 323 * can complete the current operation, but future VFS_VGET 324 * operations will almost certainly return spurious results. 325 * Warn the operator. 326 * 327 * But only warn the operator if the file system reports 328 * NFS-compatibility, because that's the only time that this 329 * matters, and dumb fuse servers abound. 330 */ 331 fuse_warn(fuse_get_mpdata(mp), FSESS_WARN_INODE_MISMATCH, 332 "file has different inode number and nodeid."); 333 } 334 335 err = fuse_vnode_alloc(mp, td, nodeid, vtyp, vpp); 336 if (err) { 337 return err; 338 } 339 if (dvp != NULL) { 340 MPASS(cnp && (cnp->cn_flags & ISDOTDOT) == 0); 341 MPASS(cnp && 342 !(cnp->cn_namelen == 1 && cnp->cn_nameptr[0] == '.')); 343 fuse_vnode_setparent(*vpp, dvp); 344 } 345 if (dvp != NULL && cnp != NULL && (cnp->cn_flags & MAKEENTRY) != 0 && 346 feo != NULL && 347 (feo->entry_valid != 0 || feo->entry_valid_nsec != 0)) { 348 struct timespec timeout; 349 350 ASSERT_VOP_LOCKED(*vpp, "fuse_vnode_get"); 351 ASSERT_VOP_LOCKED(dvp, "fuse_vnode_get"); 352 353 fuse_validity_2_timespec(feo, &timeout); 354 cache_enter_time(dvp, *vpp, cnp, &timeout, NULL); 355 } 356 357 VTOFUD(*vpp)->generation = generation; 358 /* 359 * In userland, libfuse uses cached lookups for dot and dotdot entries, 360 * thus it does not really bump the nlookup counter for forget. 361 * Follow the same semantic and avoid the bump in order to keep 362 * nlookup counters consistent. 363 */ 364 if (cnp == NULL || ((cnp->cn_flags & ISDOTDOT) == 0 && 365 (cnp->cn_namelen != 1 || cnp->cn_nameptr[0] != '.'))) 366 VTOFUD(*vpp)->nlookup++; 367 368 return 0; 369 } 370 371 /* 372 * Called for every fusefs vnode open to initialize the vnode (not 373 * fuse_filehandle) for use 374 */ 375 void 376 fuse_vnode_open(struct vnode *vp, int32_t fuse_open_flags, struct thread *td) 377 { 378 if (vnode_vtype(vp) == VREG) 379 vnode_create_vobject(vp, VNODE_NO_SIZE, td); 380 } 381 382 int 383 fuse_vnode_savesize(struct vnode *vp, struct ucred *cred, pid_t pid) 384 { 385 struct fuse_vnode_data *fvdat = VTOFUD(vp); 386 struct thread *td = curthread; 387 struct fuse_filehandle *fufh = NULL; 388 struct fuse_dispatcher fdi; 389 struct fuse_setattr_in *fsai; 390 int err = 0; 391 392 ASSERT_VOP_ELOCKED(vp, __func__); /* For flag and last_local_modify */ 393 ASSERT_CACHED_ATTRS_LOCKED(vp); 394 395 if (fuse_isdeadfs(vp)) { 396 return EBADF; 397 } 398 if (vnode_vtype(vp) == VDIR) { 399 return EISDIR; 400 } 401 if (vfs_isrdonly(vnode_mount(vp))) { 402 return EROFS; 403 } 404 if (cred == NULL) { 405 cred = td->td_ucred; 406 } 407 fdisp_init(&fdi, sizeof(*fsai)); 408 fdisp_make_vp(&fdi, FUSE_SETATTR, vp, td, cred); 409 fsai = fdi.indata; 410 fsai->valid = 0; 411 412 /* Truncate to a new value. */ 413 MPASS((fvdat->flag & FN_SIZECHANGE) != 0); 414 fsai->size = fvdat->cached_attrs.va_size; 415 fsai->valid |= FATTR_SIZE; 416 417 fuse_filehandle_getrw(vp, FWRITE, &fufh, cred, pid); 418 if (fufh) { 419 fsai->fh = fufh->fh_id; 420 fsai->valid |= FATTR_FH; 421 } 422 err = fdisp_wait_answ(&fdi); 423 fdisp_destroy(&fdi); 424 if (err == 0) { 425 getnanouptime(&fvdat->last_local_modify); 426 fvdat->flag &= ~FN_SIZECHANGE; 427 } 428 429 return err; 430 } 431 432 /* 433 * Adjust the vnode's size to a new value. 434 * 435 * If the new value came from the server, such as from a FUSE_GETATTR 436 * operation, set `from_server` true. But if it came from a local operation, 437 * such as write(2) or truncate(2), set `from_server` false. 438 */ 439 int 440 fuse_vnode_setsize(struct vnode *vp, off_t newsize, bool from_server) 441 { 442 struct fuse_vnode_data *fvdat = VTOFUD(vp); 443 struct vattr *attrs; 444 off_t oldsize; 445 size_t iosize; 446 int err = 0; 447 448 ASSERT_VOP_LOCKED(vp, __func__); 449 ASSERT_CACHED_ATTRS_LOCKED(vp); 450 451 iosize = fuse_iosize(vp); 452 oldsize = fvdat->cached_attrs.va_size; 453 fvdat->cached_attrs.va_size = newsize; 454 if ((attrs = VTOVA(vp)) != NULL) 455 attrs->va_size = newsize; 456 457 if (from_server && newsize > oldsize && oldsize != VNOVAL) { 458 /* 459 * The FUSE server changed the file size behind our back. We 460 * should invalidate the entire cache. 461 */ 462 daddr_t end_lbn; 463 464 end_lbn = howmany(newsize, iosize); 465 v_inval_buf_range(vp, 0, end_lbn, iosize); 466 } 467 468 if (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) { 469 err = fuse_vnode_setsize_immediate(vp, newsize < oldsize); 470 } else { 471 /* Without an exclusive vnode lock, we must defer the operation */ 472 fvdat->flag |= FN_DELAYED_TRUNCATE; 473 vn_delayed_setsize(vp); 474 } 475 476 return err; 477 } 478 479 /* Immediately set the vnode's size in the pager */ 480 int 481 fuse_vnode_setsize_immediate(struct vnode *vp, bool shrink) 482 { 483 struct fuse_vnode_data *fvdat = VTOFUD(vp); 484 struct buf *bp = NULL; 485 size_t iosize; 486 off_t newsize; 487 int err = 0; 488 489 MPASS(fvdat); 490 ASSERT_VOP_ELOCKED(vp, __func__); 491 492 iosize = fuse_iosize(vp); 493 newsize = fvdat->cached_attrs.va_size; 494 495 if (shrink) { 496 daddr_t lbn; 497 498 err = vtruncbuf(vp, newsize, fuse_iosize(vp)); 499 if (err) 500 goto out; 501 if (newsize % iosize == 0) 502 goto out; 503 /* 504 * Zero the contents of the last partial block. 505 * Sure seems like vtruncbuf should do this for us. 506 */ 507 508 lbn = newsize / iosize; 509 bp = getblk(vp, lbn, iosize, PCATCH, 0, 0); 510 if (!bp) { 511 err = EINTR; 512 goto out; 513 } 514 if (!(bp->b_flags & B_CACHE)) 515 goto out; /* Nothing to do */ 516 MPASS(bp->b_flags & B_VMIO); 517 vfs_bio_clrbuf(bp); 518 bp->b_dirtyend = MIN(bp->b_dirtyend, newsize - lbn * iosize); 519 } 520 out: 521 if (bp) 522 brelse(bp); 523 vnode_pager_setsize(vp, newsize); 524 525 return (err); 526 } 527 528 /* Get the current, possibly dirty, size of the file */ 529 int 530 fuse_vnode_size(struct vnode *vp, off_t *filesize, struct ucred *cred, 531 struct thread *td) 532 { 533 struct fuse_vnode_data *fvdat = VTOFUD(vp); 534 struct vattr va; 535 int error = 0; 536 537 ASSERT_VOP_LOCKED(vp, __func__); 538 539 CACHED_ATTR_LOCK(vp); 540 if (!(fvdat->flag & FN_SIZECHANGE) && 541 (!fuse_vnode_attr_cache_valid(vp) || 542 fvdat->cached_attrs.va_size == VNOVAL)) { 543 CACHED_ATTR_UNLOCK(vp); 544 /* 545 * It incurs a large struct copy, but we supply &va so we don't 546 * have to acquire the lock a second time after 547 * fuse_internal_do_getattr returns. 548 */ 549 error = fuse_internal_do_getattr(vp, &va, cred, td); 550 if (!error) 551 *filesize = va.va_size; 552 } else { 553 *filesize = fvdat->cached_attrs.va_size; 554 CACHED_ATTR_UNLOCK(vp); 555 } 556 557 return error; 558 } 559 560 void 561 fuse_vnode_undirty_cached_timestamps(struct vnode *vp, bool atime) 562 { 563 struct fuse_vnode_data *fvdat = VTOFUD(vp); 564 565 ASSERT_CACHED_ATTRS_LOCKED(vp); 566 567 fvdat->flag &= ~(FN_MTIMECHANGE | FN_CTIMECHANGE); 568 if (atime) 569 fvdat->flag &= ~FN_ATIMECHANGE; 570 } 571 572 /* Update a fuse file's cached timestamps */ 573 void 574 fuse_vnode_update(struct vnode *vp, int flags) 575 { 576 struct fuse_vnode_data *fvdat = VTOFUD(vp); 577 struct mount *mp = vnode_mount(vp); 578 struct fuse_data *data = fuse_get_mpdata(mp); 579 struct timespec ts; 580 581 vfs_timestamp(&ts); 582 583 if (data->time_gran > 1) 584 ts.tv_nsec = rounddown(ts.tv_nsec, data->time_gran); 585 586 if (mp->mnt_flag & MNT_NOATIME) 587 flags &= ~FN_ATIMECHANGE; 588 589 CACHED_ATTR_LOCK(vp); 590 591 if (flags & FN_ATIMECHANGE) 592 fvdat->cached_attrs.va_atime = ts; 593 if (flags & FN_MTIMECHANGE) 594 fvdat->cached_attrs.va_mtime = ts; 595 if (flags & FN_CTIMECHANGE) 596 fvdat->cached_attrs.va_ctime = ts; 597 598 fvdat->flag |= flags; 599 600 CACHED_ATTR_UNLOCK(vp); 601 } 602 603 void 604 fuse_node_init(void) 605 { 606 fuse_node_count = counter_u64_alloc(M_WAITOK); 607 } 608 609 void 610 fuse_node_destroy(void) 611 { 612 counter_u64_free(fuse_node_count); 613 } 614