1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3 * 4 * Copyright (c) 2000-2001 Boris Popov 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26 * SUCH DAMAGE. 27 * 28 * $FreeBSD$ 29 * 30 */ 31 #include <sys/param.h> 32 #include <sys/systm.h> 33 #include <sys/kernel.h> 34 #include <sys/fcntl.h> 35 #include <sys/bio.h> 36 #include <sys/buf.h> 37 #include <sys/mount.h> 38 #include <sys/namei.h> 39 #include <sys/vnode.h> 40 #include <sys/dirent.h> 41 #include <sys/rwlock.h> 42 #include <sys/signalvar.h> 43 #include <sys/sysctl.h> 44 #include <sys/vmmeter.h> 45 46 #include <vm/vm.h> 47 #include <vm/vm_param.h> 48 #include <vm/vm_page.h> 49 #include <vm/vm_extern.h> 50 #include <vm/vm_object.h> 51 #include <vm/vm_pager.h> 52 #include <vm/vnode_pager.h> 53 /* 54 #include <sys/ioccom.h> 55 */ 56 #include <netsmb/smb.h> 57 #include <netsmb/smb_conn.h> 58 #include <netsmb/smb_subr.h> 59 60 #include <fs/smbfs/smbfs.h> 61 #include <fs/smbfs/smbfs_node.h> 62 #include <fs/smbfs/smbfs_subr.h> 63 64 /*#define SMBFS_RWGENERIC*/ 65 66 extern uma_zone_t smbfs_pbuf_zone; 67 68 static int smbfs_fastlookup = 1; 69 70 SYSCTL_DECL(_vfs_smbfs); 71 SYSCTL_INT(_vfs_smbfs, OID_AUTO, fastlookup, CTLFLAG_RW, &smbfs_fastlookup, 0, ""); 72 73 #define DE_SIZE (sizeof(struct dirent)) 74 75 static int 76 smbfs_readvdir(struct vnode *vp, struct uio *uio, struct ucred *cred) 77 { 78 struct dirent de; 79 struct componentname cn; 80 struct smb_cred *scred; 81 struct smbfs_fctx *ctx; 82 struct vnode *newvp; 83 struct smbnode *np = VTOSMB(vp); 84 int error/*, *eofflag = ap->a_eofflag*/; 85 long offset, limit; 86 87 np = VTOSMB(vp); 88 SMBVDEBUG("dirname='%s'\n", np->n_name); 89 scred = smbfs_malloc_scred(); 90 smb_makescred(scred, uio->uio_td, cred); 91 offset = uio->uio_offset / DE_SIZE; /* offset in the directory */ 92 limit = uio->uio_resid / DE_SIZE; 93 if (uio->uio_resid < DE_SIZE || uio->uio_offset < 0) { 94 error = EINVAL; 95 goto out; 96 } 97 while (limit && offset < 2) { 98 limit--; 99 bzero((caddr_t)&de, DE_SIZE); 100 de.d_reclen = DE_SIZE; 101 de.d_fileno = (offset == 0) ? np->n_ino : 102 (np->n_parent ? np->n_parentino : 2); 103 if (de.d_fileno == 0) 104 de.d_fileno = 0x7ffffffd + offset; 105 de.d_off = offset + 1; 106 de.d_namlen = offset + 1; 107 de.d_name[0] = '.'; 108 de.d_name[1] = '.'; 109 de.d_type = DT_DIR; 110 dirent_terminate(&de); 111 error = uiomove(&de, DE_SIZE, uio); 112 if (error) 113 goto out; 114 offset++; 115 uio->uio_offset += DE_SIZE; 116 } 117 if (limit == 0) { 118 error = 0; 119 goto out; 120 } 121 if (offset != np->n_dirofs || np->n_dirseq == NULL) { 122 SMBVDEBUG("Reopening search %ld:%ld\n", offset, np->n_dirofs); 123 if (np->n_dirseq) { 124 smbfs_findclose(np->n_dirseq, scred); 125 np->n_dirseq = NULL; 126 } 127 np->n_dirofs = 2; 128 error = smbfs_findopen(np, "*", 1, 129 SMB_FA_SYSTEM | SMB_FA_HIDDEN | SMB_FA_DIR, 130 scred, &ctx); 131 if (error) { 132 SMBVDEBUG("can not open search, error = %d", error); 133 goto out; 134 } 135 np->n_dirseq = ctx; 136 } else 137 ctx = np->n_dirseq; 138 while (np->n_dirofs < offset) { 139 error = smbfs_findnext(ctx, offset - np->n_dirofs++, scred); 140 if (error) { 141 smbfs_findclose(np->n_dirseq, scred); 142 np->n_dirseq = NULL; 143 error = ENOENT ? 0 : error; 144 goto out; 145 } 146 } 147 error = 0; 148 for (; limit; limit--, offset++) { 149 error = smbfs_findnext(ctx, limit, scred); 150 if (error) 151 break; 152 np->n_dirofs++; 153 bzero((caddr_t)&de, DE_SIZE); 154 de.d_reclen = DE_SIZE; 155 de.d_fileno = ctx->f_attr.fa_ino; 156 de.d_off = offset + 1; 157 de.d_type = (ctx->f_attr.fa_attr & SMB_FA_DIR) ? DT_DIR : DT_REG; 158 de.d_namlen = ctx->f_nmlen; 159 bcopy(ctx->f_name, de.d_name, de.d_namlen); 160 dirent_terminate(&de); 161 if (smbfs_fastlookup) { 162 error = smbfs_nget(vp->v_mount, vp, ctx->f_name, 163 ctx->f_nmlen, &ctx->f_attr, &newvp); 164 if (!error) { 165 cn.cn_nameptr = de.d_name; 166 cn.cn_namelen = de.d_namlen; 167 cache_enter(vp, newvp, &cn); 168 vput(newvp); 169 } 170 } 171 error = uiomove(&de, DE_SIZE, uio); 172 if (error) 173 break; 174 } 175 if (error == ENOENT) 176 error = 0; 177 uio->uio_offset = offset * DE_SIZE; 178 out: 179 smbfs_free_scred(scred); 180 return error; 181 } 182 183 int 184 smbfs_readvnode(struct vnode *vp, struct uio *uiop, struct ucred *cred) 185 { 186 struct smbmount *smp = VFSTOSMBFS(vp->v_mount); 187 struct smbnode *np = VTOSMB(vp); 188 struct thread *td; 189 struct vattr vattr; 190 struct smb_cred *scred; 191 int error, lks; 192 193 /* 194 * Protect against method which is not supported for now 195 */ 196 if (uiop->uio_segflg == UIO_NOCOPY) 197 return EOPNOTSUPP; 198 199 if (vp->v_type != VREG && vp->v_type != VDIR) { 200 SMBFSERR("vn types other than VREG or VDIR are unsupported !\n"); 201 return EIO; 202 } 203 if (uiop->uio_resid == 0) 204 return 0; 205 if (uiop->uio_offset < 0) 206 return EINVAL; 207 /* if (uiop->uio_offset + uiop->uio_resid > smp->nm_maxfilesize) 208 return EFBIG;*/ 209 td = uiop->uio_td; 210 if (vp->v_type == VDIR) { 211 lks = LK_EXCLUSIVE; /* lockstatus(vp->v_vnlock); */ 212 if (lks == LK_SHARED) 213 vn_lock(vp, LK_UPGRADE | LK_RETRY); 214 error = smbfs_readvdir(vp, uiop, cred); 215 if (lks == LK_SHARED) 216 vn_lock(vp, LK_DOWNGRADE | LK_RETRY); 217 return error; 218 } 219 220 /* biosize = SSTOCN(smp->sm_share)->sc_txmax;*/ 221 if (np->n_flag & NMODIFIED) { 222 smbfs_attr_cacheremove(vp); 223 error = VOP_GETATTR(vp, &vattr, cred); 224 if (error) 225 return error; 226 np->n_mtime.tv_sec = vattr.va_mtime.tv_sec; 227 } else { 228 error = VOP_GETATTR(vp, &vattr, cred); 229 if (error) 230 return error; 231 if (np->n_mtime.tv_sec != vattr.va_mtime.tv_sec) { 232 error = smbfs_vinvalbuf(vp, td); 233 if (error) 234 return error; 235 np->n_mtime.tv_sec = vattr.va_mtime.tv_sec; 236 } 237 } 238 scred = smbfs_malloc_scred(); 239 smb_makescred(scred, td, cred); 240 error = smb_read(smp->sm_share, np->n_fid, uiop, scred); 241 smbfs_free_scred(scred); 242 return (error); 243 } 244 245 int 246 smbfs_writevnode(struct vnode *vp, struct uio *uiop, 247 struct ucred *cred, int ioflag) 248 { 249 struct smbmount *smp = VTOSMBFS(vp); 250 struct smbnode *np = VTOSMB(vp); 251 struct smb_cred *scred; 252 struct thread *td; 253 int error = 0; 254 255 if (vp->v_type != VREG) { 256 SMBERROR("vn types other than VREG unsupported !\n"); 257 return EIO; 258 } 259 SMBVDEBUG("ofs=%jd,resid=%zd\n", (intmax_t)uiop->uio_offset, 260 uiop->uio_resid); 261 if (uiop->uio_offset < 0) 262 return EINVAL; 263 /* if (uiop->uio_offset + uiop->uio_resid > smp->nm_maxfilesize) 264 return (EFBIG);*/ 265 td = uiop->uio_td; 266 if (ioflag & (IO_APPEND | IO_SYNC)) { 267 if (np->n_flag & NMODIFIED) { 268 smbfs_attr_cacheremove(vp); 269 error = smbfs_vinvalbuf(vp, td); 270 if (error) 271 return error; 272 } 273 if (ioflag & IO_APPEND) { 274 #ifdef notyet 275 /* 276 * File size can be changed by another client 277 */ 278 smbfs_attr_cacheremove(vp); 279 error = VOP_GETATTR(vp, &vattr, cred); 280 if (error) return (error); 281 #endif 282 uiop->uio_offset = np->n_size; 283 } 284 } 285 if (uiop->uio_resid == 0) 286 return 0; 287 288 error = vn_rlimit_fsize(vp, uiop, td); 289 if (error != 0) 290 return (error); 291 292 scred = smbfs_malloc_scred(); 293 smb_makescred(scred, td, cred); 294 error = smb_write(smp->sm_share, np->n_fid, uiop, scred); 295 smbfs_free_scred(scred); 296 SMBVDEBUG("after: ofs=%jd,resid=%zd\n", (intmax_t)uiop->uio_offset, 297 uiop->uio_resid); 298 if (!error) { 299 if (uiop->uio_offset > np->n_size) { 300 np->n_size = uiop->uio_offset; 301 vnode_pager_setsize(vp, np->n_size); 302 } 303 } 304 return error; 305 } 306 307 /* 308 * Do an I/O operation to/from a cache block. 309 */ 310 int 311 smbfs_doio(struct vnode *vp, struct buf *bp, struct ucred *cr, struct thread *td) 312 { 313 struct smbmount *smp = VFSTOSMBFS(vp->v_mount); 314 struct smbnode *np = VTOSMB(vp); 315 struct uio *uiop; 316 struct iovec io; 317 struct smb_cred *scred; 318 int error = 0; 319 320 uiop = malloc(sizeof(struct uio), M_SMBFSDATA, M_WAITOK); 321 uiop->uio_iov = &io; 322 uiop->uio_iovcnt = 1; 323 uiop->uio_segflg = UIO_SYSSPACE; 324 uiop->uio_td = td; 325 326 scred = smbfs_malloc_scred(); 327 smb_makescred(scred, td, cr); 328 329 if (bp->b_iocmd == BIO_READ) { 330 io.iov_len = uiop->uio_resid = bp->b_bcount; 331 io.iov_base = bp->b_data; 332 uiop->uio_rw = UIO_READ; 333 switch (vp->v_type) { 334 case VREG: 335 uiop->uio_offset = ((off_t)bp->b_blkno) * DEV_BSIZE; 336 error = smb_read(smp->sm_share, np->n_fid, uiop, scred); 337 if (error) 338 break; 339 if (uiop->uio_resid) { 340 int left = uiop->uio_resid; 341 int nread = bp->b_bcount - left; 342 if (left > 0) 343 bzero((char *)bp->b_data + nread, left); 344 } 345 break; 346 default: 347 printf("smbfs_doio: type %x unexpected\n",vp->v_type); 348 break; 349 } 350 if (error) { 351 bp->b_error = error; 352 bp->b_ioflags |= BIO_ERROR; 353 } 354 } else { /* write */ 355 if (((bp->b_blkno * DEV_BSIZE) + bp->b_dirtyend) > np->n_size) 356 bp->b_dirtyend = np->n_size - (bp->b_blkno * DEV_BSIZE); 357 358 if (bp->b_dirtyend > bp->b_dirtyoff) { 359 io.iov_len = uiop->uio_resid = bp->b_dirtyend - bp->b_dirtyoff; 360 uiop->uio_offset = ((off_t)bp->b_blkno) * DEV_BSIZE + bp->b_dirtyoff; 361 io.iov_base = (char *)bp->b_data + bp->b_dirtyoff; 362 uiop->uio_rw = UIO_WRITE; 363 error = smb_write(smp->sm_share, np->n_fid, uiop, scred); 364 365 /* 366 * For an interrupted write, the buffer is still valid 367 * and the write hasn't been pushed to the server yet, 368 * so we can't set BIO_ERROR and report the interruption 369 * by setting B_EINTR. For the B_ASYNC case, B_EINTR 370 * is not relevant, so the rpc attempt is essentially 371 * a noop. For the case of a V3 write rpc not being 372 * committed to stable storage, the block is still 373 * dirty and requires either a commit rpc or another 374 * write rpc with iomode == NFSV3WRITE_FILESYNC before 375 * the block is reused. This is indicated by setting 376 * the B_DELWRI and B_NEEDCOMMIT flags. 377 */ 378 if (error == EINTR 379 || (!error && (bp->b_flags & B_NEEDCOMMIT))) { 380 bp->b_flags &= ~(B_INVAL|B_NOCACHE); 381 if ((bp->b_flags & B_ASYNC) == 0) 382 bp->b_flags |= B_EINTR; 383 if ((bp->b_flags & B_PAGING) == 0) { 384 bdirty(bp); 385 bp->b_flags &= ~B_DONE; 386 } 387 if ((bp->b_flags & B_ASYNC) == 0) 388 bp->b_flags |= B_EINTR; 389 } else { 390 if (error) { 391 bp->b_ioflags |= BIO_ERROR; 392 bp->b_error = error; 393 } 394 bp->b_dirtyoff = bp->b_dirtyend = 0; 395 } 396 } else { 397 bp->b_resid = 0; 398 bufdone(bp); 399 free(uiop, M_SMBFSDATA); 400 smbfs_free_scred(scred); 401 return 0; 402 } 403 } 404 bp->b_resid = uiop->uio_resid; 405 bufdone(bp); 406 free(uiop, M_SMBFSDATA); 407 smbfs_free_scred(scred); 408 return error; 409 } 410 411 /* 412 * Vnode op for VM getpages. 413 * Wish wish .... get rid from multiple IO routines 414 */ 415 int 416 smbfs_getpages(ap) 417 struct vop_getpages_args /* { 418 struct vnode *a_vp; 419 vm_page_t *a_m; 420 int a_count; 421 int a_reqpage; 422 } */ *ap; 423 { 424 #ifdef SMBFS_RWGENERIC 425 return vop_stdgetpages(ap); 426 #else 427 int i, error, nextoff, size, toff, npages, count; 428 struct uio uio; 429 struct iovec iov; 430 vm_offset_t kva; 431 struct buf *bp; 432 struct vnode *vp; 433 struct thread *td; 434 struct ucred *cred; 435 struct smbmount *smp; 436 struct smbnode *np; 437 struct smb_cred *scred; 438 vm_object_t object; 439 vm_page_t *pages; 440 441 vp = ap->a_vp; 442 if ((object = vp->v_object) == NULL) { 443 printf("smbfs_getpages: called with non-merged cache vnode??\n"); 444 return VM_PAGER_ERROR; 445 } 446 447 td = curthread; /* XXX */ 448 cred = td->td_ucred; /* XXX */ 449 np = VTOSMB(vp); 450 smp = VFSTOSMBFS(vp->v_mount); 451 pages = ap->a_m; 452 npages = ap->a_count; 453 454 /* 455 * If the requested page is partially valid, just return it and 456 * allow the pager to zero-out the blanks. Partially valid pages 457 * can only occur at the file EOF. 458 * 459 * XXXGL: is that true for SMB filesystem? 460 */ 461 VM_OBJECT_WLOCK(object); 462 if (!vm_page_none_valid(pages[npages - 1]) && --npages == 0) 463 goto out; 464 VM_OBJECT_WUNLOCK(object); 465 466 scred = smbfs_malloc_scred(); 467 smb_makescred(scred, td, cred); 468 469 bp = uma_zalloc(smbfs_pbuf_zone, M_WAITOK); 470 471 kva = (vm_offset_t) bp->b_data; 472 pmap_qenter(kva, pages, npages); 473 VM_CNT_INC(v_vnodein); 474 VM_CNT_ADD(v_vnodepgsin, npages); 475 476 count = npages << PAGE_SHIFT; 477 iov.iov_base = (caddr_t) kva; 478 iov.iov_len = count; 479 uio.uio_iov = &iov; 480 uio.uio_iovcnt = 1; 481 uio.uio_offset = IDX_TO_OFF(pages[0]->pindex); 482 uio.uio_resid = count; 483 uio.uio_segflg = UIO_SYSSPACE; 484 uio.uio_rw = UIO_READ; 485 uio.uio_td = td; 486 487 error = smb_read(smp->sm_share, np->n_fid, &uio, scred); 488 smbfs_free_scred(scred); 489 pmap_qremove(kva, npages); 490 491 uma_zfree(smbfs_pbuf_zone, bp); 492 493 if (error && (uio.uio_resid == count)) { 494 printf("smbfs_getpages: error %d\n",error); 495 return VM_PAGER_ERROR; 496 } 497 498 size = count - uio.uio_resid; 499 500 VM_OBJECT_WLOCK(object); 501 for (i = 0, toff = 0; i < npages; i++, toff = nextoff) { 502 vm_page_t m; 503 nextoff = toff + PAGE_SIZE; 504 m = pages[i]; 505 506 if (nextoff <= size) { 507 /* 508 * Read operation filled an entire page 509 */ 510 vm_page_valid(m); 511 KASSERT(m->dirty == 0, 512 ("smbfs_getpages: page %p is dirty", m)); 513 } else if (size > toff) { 514 /* 515 * Read operation filled a partial page. 516 */ 517 vm_page_invalid(m); 518 vm_page_set_valid_range(m, 0, size - toff); 519 KASSERT(m->dirty == 0, 520 ("smbfs_getpages: page %p is dirty", m)); 521 } else { 522 /* 523 * Read operation was short. If no error occurred 524 * we may have hit a zero-fill section. We simply 525 * leave valid set to 0. 526 */ 527 ; 528 } 529 } 530 out: 531 VM_OBJECT_WUNLOCK(object); 532 if (ap->a_rbehind) 533 *ap->a_rbehind = 0; 534 if (ap->a_rahead) 535 *ap->a_rahead = 0; 536 return (VM_PAGER_OK); 537 #endif /* SMBFS_RWGENERIC */ 538 } 539 540 /* 541 * Vnode op for VM putpages. 542 * possible bug: all IO done in sync mode 543 * Note that vop_close always invalidate pages before close, so it's 544 * not necessary to open vnode. 545 */ 546 int 547 smbfs_putpages(ap) 548 struct vop_putpages_args /* { 549 struct vnode *a_vp; 550 vm_page_t *a_m; 551 int a_count; 552 int a_sync; 553 int *a_rtvals; 554 } */ *ap; 555 { 556 int error; 557 struct vnode *vp = ap->a_vp; 558 struct thread *td; 559 struct ucred *cred; 560 561 #ifdef SMBFS_RWGENERIC 562 td = curthread; /* XXX */ 563 cred = td->td_ucred; /* XXX */ 564 VOP_OPEN(vp, FWRITE, cred, td, NULL); 565 error = vop_stdputpages(ap); 566 VOP_CLOSE(vp, FWRITE, cred, td); 567 return error; 568 #else 569 struct uio uio; 570 struct iovec iov; 571 vm_offset_t kva; 572 struct buf *bp; 573 int i, npages, count; 574 int *rtvals; 575 struct smbmount *smp; 576 struct smbnode *np; 577 struct smb_cred *scred; 578 vm_page_t *pages; 579 580 td = curthread; /* XXX */ 581 cred = td->td_ucred; /* XXX */ 582 /* VOP_OPEN(vp, FWRITE, cred, td, NULL);*/ 583 np = VTOSMB(vp); 584 smp = VFSTOSMBFS(vp->v_mount); 585 pages = ap->a_m; 586 count = ap->a_count; 587 rtvals = ap->a_rtvals; 588 npages = btoc(count); 589 590 for (i = 0; i < npages; i++) { 591 rtvals[i] = VM_PAGER_ERROR; 592 } 593 594 bp = uma_zalloc(smbfs_pbuf_zone, M_WAITOK); 595 596 kva = (vm_offset_t) bp->b_data; 597 pmap_qenter(kva, pages, npages); 598 VM_CNT_INC(v_vnodeout); 599 VM_CNT_ADD(v_vnodepgsout, count); 600 601 iov.iov_base = (caddr_t) kva; 602 iov.iov_len = count; 603 uio.uio_iov = &iov; 604 uio.uio_iovcnt = 1; 605 uio.uio_offset = IDX_TO_OFF(pages[0]->pindex); 606 uio.uio_resid = count; 607 uio.uio_segflg = UIO_SYSSPACE; 608 uio.uio_rw = UIO_WRITE; 609 uio.uio_td = td; 610 SMBVDEBUG("ofs=%jd,resid=%zd\n", (intmax_t)uio.uio_offset, 611 uio.uio_resid); 612 613 scred = smbfs_malloc_scred(); 614 smb_makescred(scred, td, cred); 615 error = smb_write(smp->sm_share, np->n_fid, &uio, scred); 616 smbfs_free_scred(scred); 617 /* VOP_CLOSE(vp, FWRITE, cred, td);*/ 618 SMBVDEBUG("paged write done: %d\n", error); 619 620 pmap_qremove(kva, npages); 621 622 uma_zfree(smbfs_pbuf_zone, bp); 623 624 if (error == 0) { 625 vnode_pager_undirty_pages(pages, rtvals, count - uio.uio_resid, 626 npages * PAGE_SIZE, npages * PAGE_SIZE); 627 } 628 return (rtvals[0]); 629 #endif /* SMBFS_RWGENERIC */ 630 } 631 632 /* 633 * Flush and invalidate all dirty buffers. If another process is already 634 * doing the flush, just wait for completion. 635 */ 636 int 637 smbfs_vinvalbuf(struct vnode *vp, struct thread *td) 638 { 639 struct smbnode *np = VTOSMB(vp); 640 int error = 0; 641 642 if (VN_IS_DOOMED(vp)) 643 return 0; 644 645 while (np->n_flag & NFLUSHINPROG) { 646 np->n_flag |= NFLUSHWANT; 647 error = tsleep(&np->n_flag, PRIBIO + 2, "smfsvinv", 2 * hz); 648 error = smb_td_intr(td); 649 if (error == EINTR) 650 return EINTR; 651 } 652 np->n_flag |= NFLUSHINPROG; 653 654 if (vp->v_bufobj.bo_object != NULL) { 655 VM_OBJECT_WLOCK(vp->v_bufobj.bo_object); 656 vm_object_page_clean(vp->v_bufobj.bo_object, 0, 0, OBJPC_SYNC); 657 VM_OBJECT_WUNLOCK(vp->v_bufobj.bo_object); 658 } 659 660 error = vinvalbuf(vp, V_SAVE, PCATCH, 0); 661 while (error) { 662 if (error == ERESTART || error == EINTR) { 663 np->n_flag &= ~NFLUSHINPROG; 664 if (np->n_flag & NFLUSHWANT) { 665 np->n_flag &= ~NFLUSHWANT; 666 wakeup(&np->n_flag); 667 } 668 return EINTR; 669 } 670 error = vinvalbuf(vp, V_SAVE, PCATCH, 0); 671 } 672 np->n_flag &= ~(NMODIFIED | NFLUSHINPROG); 673 if (np->n_flag & NFLUSHWANT) { 674 np->n_flag &= ~NFLUSHWANT; 675 wakeup(&np->n_flag); 676 } 677 return (error); 678 } 679