xref: /dragonfly/sys/vfs/smbfs/smbfs_io.c (revision cae2835b)
1 /*
2  * Copyright (c) 2000-2001, Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *    This product includes software developed by Boris Popov.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  *
32  * $FreeBSD: src/sys/fs/smbfs/smbfs_io.c,v 1.3.2.3 2003/01/17 08:20:26 tjr Exp $
33  */
34 
35 #include <sys/param.h>
36 #include <sys/systm.h>
37 #include <sys/resourcevar.h>	/* defines plimit structure in proc struct */
38 #include <sys/kernel.h>
39 #include <sys/proc.h>
40 #include <sys/fcntl.h>
41 #include <sys/mount.h>
42 #include <sys/namei.h>
43 #include <sys/vnode.h>
44 #include <sys/dirent.h>
45 #include <sys/signalvar.h>
46 #include <sys/sysctl.h>
47 
48 #include  <machine/limits.h>
49 
50 #include <vm/vm.h>
51 #include <vm/vm_page2.h>
52 #include <vm/vm_extern.h>
53 #include <vm/vm_object.h>
54 #include <vm/vm_pager.h>
55 #include <vm/vnode_pager.h>
56 
57 #include <netproto/smb/smb.h>
58 #include <netproto/smb/smb_conn.h>
59 #include <netproto/smb/smb_subr.h>
60 
61 #include "smbfs.h"
62 #include "smbfs_node.h"
63 #include "smbfs_subr.h"
64 
65 #include <sys/buf.h>
66 
67 #include <sys/thread2.h>
68 
69 /*#define SMBFS_RWGENERIC*/
70 
71 extern int smbfs_pbuf_freecnt;
72 
73 static int smbfs_fastlookup = 1;
74 
75 SYSCTL_DECL(_vfs_smbfs);
76 SYSCTL_INT(_vfs_smbfs, OID_AUTO, fastlookup, CTLFLAG_RW, &smbfs_fastlookup, 0, "");
77 
78 static int
79 smbfs_readvdir(struct vnode *vp, struct uio *uio, struct ucred *cred)
80 {
81 	struct smb_cred scred;
82 	struct smbfs_fctx *ctx;
83 	struct vnode *newvp;
84 	struct smbnode *np;
85 	int error, offset, retval;
86 
87 	np = VTOSMB(vp);
88 	SMBVDEBUG("dirname='%s'\n", np->n_name);
89 	smb_makescred(&scred, uio->uio_td, cred);
90 
91 	if (uio->uio_offset < 0 || uio->uio_offset > INT_MAX)
92 		return(EINVAL);
93 
94 	error = 0;
95 	offset = uio->uio_offset;
96 
97 	if (uio->uio_resid > 0 && offset < 1) {
98 		if (vop_write_dirent(&error, uio, np->n_ino, DT_DIR, 1, "."))
99 			goto done;
100 		if (error)
101 			goto done;
102 		++offset;
103 	}
104 
105 	if (uio->uio_resid > 0 && offset < 2) {
106 		if (vop_write_dirent(&error, uio,
107 		    np->n_parent ? VTOSMB(np->n_parent)->n_ino : 2,
108 		    DT_DIR, 2, ".."))
109 			goto done;
110 		if (error)
111 			goto done;
112 		++offset;
113 	}
114 
115 	if (uio->uio_resid == 0)
116 		goto done;
117 
118 	if (offset != np->n_dirofs || np->n_dirseq == NULL) {
119 		SMBVDEBUG("Reopening search %ld:%ld\n", offset, np->n_dirofs);
120 		if (np->n_dirseq) {
121 			smbfs_findclose(np->n_dirseq, &scred);
122 			np->n_dirseq = NULL;
123 		}
124 		np->n_dirofs = 2;
125 		error = smbfs_findopen(np, "*", 1,
126 		    SMB_FA_SYSTEM | SMB_FA_HIDDEN | SMB_FA_DIR,
127 		    &scred, &ctx);
128 		if (error) {
129 			SMBVDEBUG("can not open search, error = %d", error);
130 			return error;
131 		}
132 		np->n_dirseq = ctx;
133 	} else {
134 		ctx = np->n_dirseq;
135 	}
136 	while (np->n_dirofs < offset) {
137 		error = smbfs_findnext(ctx, offset - np->n_dirofs, &scred);
138 		++np->n_dirofs;
139 		if (error) {
140 			smbfs_findclose(np->n_dirseq, &scred);
141 			np->n_dirseq = NULL;
142 			return error == ENOENT ? 0 : error;
143 		}
144 	}
145 	error = 0;
146 	while (uio->uio_resid > 0 && !error) {
147 		/*
148 		 * Overestimate the size of a record a bit, doesn't really
149 		 * hurt to be wrong here.
150 		 */
151 		error = smbfs_findnext(ctx, uio->uio_resid / _DIRENT_RECLEN(255) + 1, &scred);
152 		if (error)
153 			break;
154 		np->n_dirofs++;
155 		++offset;
156 
157 		retval = vop_write_dirent(&error, uio, ctx->f_attr.fa_ino,
158 		    (ctx->f_attr.fa_attr & SMB_FA_DIR) ? DT_DIR : DT_REG,
159 		    ctx->f_nmlen, ctx->f_name);
160 		if (retval)
161 			break;
162 		if (smbfs_fastlookup && !error) {
163 			error = smbfs_nget(vp->v_mount, vp, ctx->f_name,
164 			    ctx->f_nmlen, &ctx->f_attr, &newvp);
165 			if (!error)
166 				vput(newvp);
167 		}
168 	}
169 	if (error == ENOENT)
170 		error = 0;
171 done:
172 	uio->uio_offset = offset;
173 	return error;
174 }
175 
176 int
177 smbfs_readvnode(struct vnode *vp, struct uio *uiop, struct ucred *cred)
178 {
179 	struct thread *td;
180 	struct smbmount *smp = VFSTOSMBFS(vp->v_mount);
181 	struct smbnode *np = VTOSMB(vp);
182 	struct vattr vattr;
183 	struct smb_cred scred;
184 	int error, lks;
185 
186 	/*
187 	 * Protect against method which is not supported for now
188 	 */
189 	if (uiop->uio_segflg == UIO_NOCOPY)
190 		return EOPNOTSUPP;
191 
192 	if (vp->v_type != VREG && vp->v_type != VDIR) {
193 		SMBFSERR("vn types other than VREG or VDIR are unsupported !\n");
194 		return EIO;
195 	}
196 	if (uiop->uio_resid == 0)
197 		return 0;
198 	if (uiop->uio_offset < 0)
199 		return EINVAL;
200 	td = uiop->uio_td;
201 	if (vp->v_type == VDIR) {
202 		lks = LK_EXCLUSIVE;/*lockstatus(&vp->v_lock, td);*/
203 		if (lks == LK_SHARED)
204 			vn_lock(vp, LK_UPGRADE | LK_RETRY);
205 		error = smbfs_readvdir(vp, uiop, cred);
206 		if (lks == LK_SHARED)
207 			vn_lock(vp, LK_DOWNGRADE | LK_RETRY);
208 		return error;
209 	}
210 
211 /*	biosize = SSTOCN(smp->sm_share)->sc_txmax;*/
212 	if (np->n_flag & NMODIFIED) {
213 		smbfs_attr_cacheremove(vp);
214 		error = VOP_GETATTR(vp, &vattr);
215 		if (error)
216 			return error;
217 		np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
218 	} else {
219 		error = VOP_GETATTR(vp, &vattr);
220 		if (error)
221 			return error;
222 		if (np->n_mtime.tv_sec != vattr.va_mtime.tv_sec) {
223 			error = smbfs_vinvalbuf(vp, V_SAVE, 1);
224 			if (error)
225 				return error;
226 			np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
227 		}
228 	}
229 	smb_makescred(&scred, td, cred);
230 	return smb_read(smp->sm_share, np->n_fid, uiop, &scred);
231 }
232 
233 int
234 smbfs_writevnode(struct vnode *vp, struct uio *uiop,
235 		 struct ucred *cred, int ioflag)
236 {
237 	struct thread *td;
238 	struct smbmount *smp = VTOSMBFS(vp);
239 	struct smbnode *np = VTOSMB(vp);
240 	struct smb_cred scred;
241 	int error = 0;
242 
243 	if (vp->v_type != VREG) {
244 		SMBERROR("vn types other than VREG unsupported !\n");
245 		return EIO;
246 	}
247 	SMBVDEBUG("ofs=%d,resid=%d\n",(int)uiop->uio_offset, uiop->uio_resid);
248 	if (uiop->uio_offset < 0)
249 		return EINVAL;
250 	td = uiop->uio_td;
251 	if (ioflag & (IO_APPEND | IO_SYNC)) {
252 		if (np->n_flag & NMODIFIED) {
253 			smbfs_attr_cacheremove(vp);
254 			error = smbfs_vinvalbuf(vp, V_SAVE, 1);
255 			if (error)
256 				return error;
257 		}
258 		if (ioflag & IO_APPEND) {
259 #if 0 /* notyet */
260 			/*
261 			 * File size can be changed by another client
262 			 */
263 			smbfs_attr_cacheremove(vp);
264 			error = VOP_GETATTR(vp, &vattr);
265 			if (error) return (error);
266 #endif
267 			uiop->uio_offset = np->n_size;
268 		}
269 	}
270 	if (uiop->uio_resid == 0)
271 		return 0;
272 	if (td->td_proc &&
273 	    uiop->uio_offset + uiop->uio_resid >
274 	    td->td_proc->p_rlimit[RLIMIT_FSIZE].rlim_cur) {
275 		lwpsignal(td->td_proc, td->td_lwp, SIGXFSZ);
276 		return EFBIG;
277 	}
278 	smb_makescred(&scred, td, cred);
279 	error = smb_write(smp->sm_share, np->n_fid, uiop, &scred);
280 	SMBVDEBUG("after: ofs=%d,resid=%d\n",(int)uiop->uio_offset, uiop->uio_resid);
281 	if (!error) {
282 		if (uiop->uio_offset > np->n_size) {
283 			np->n_size = uiop->uio_offset;
284 			vnode_pager_setsize(vp, np->n_size);
285 		}
286 	}
287 	return error;
288 }
289 
290 /*
291  * Do an I/O operation to/from a cache block.
292  */
293 int
294 smbfs_doio(struct vnode *vp, struct bio *bio, struct ucred *cr, struct thread *td)
295 {
296 	struct buf *bp = bio->bio_buf;
297 	struct smbmount *smp = VFSTOSMBFS(vp->v_mount);
298 	struct smbnode *np = VTOSMB(vp);
299 	struct uio uio, *uiop = &uio;
300 	struct iovec io;
301 	struct smb_cred scred;
302 	int error = 0;
303 
304 	uiop->uio_iov = &io;
305 	uiop->uio_iovcnt = 1;
306 	uiop->uio_segflg = UIO_SYSSPACE;
307 	uiop->uio_td = td;
308 
309 	smb_makescred(&scred, td, cr);
310 
311 	if (bp->b_cmd == BUF_CMD_READ) {
312 	    io.iov_len = uiop->uio_resid = (size_t)bp->b_bcount;
313 	    io.iov_base = bp->b_data;
314 	    uiop->uio_rw = UIO_READ;
315 	    switch (vp->v_type) {
316 	      case VREG:
317 		uiop->uio_offset = bio->bio_offset;
318 		error = smb_read(smp->sm_share, np->n_fid, uiop, &scred);
319 		if (error)
320 			break;
321 		if (uiop->uio_resid) {
322 			size_t left = uiop->uio_resid;
323 			size_t nread = (size_t)bp->b_bcount - left;
324 			if (left > 0)
325 				bzero((char *)bp->b_data + nread, left);
326 		}
327 		break;
328 	    default:
329 		kprintf("smbfs_doio:  type %x unexpected\n",vp->v_type);
330 		break;
331 	    }
332 	    if (error) {
333 		bp->b_error = error;
334 		bp->b_flags |= B_ERROR;
335 	    }
336 	} else { /* write */
337 	    KKASSERT(bp->b_cmd == BUF_CMD_WRITE);
338 	    if (bio->bio_offset + bp->b_dirtyend > np->n_size)
339 		bp->b_dirtyend = np->n_size - bio->bio_offset;
340 
341 	    if (bp->b_dirtyend > bp->b_dirtyoff) {
342 		io.iov_len = uiop->uio_resid =
343 			(size_t)(bp->b_dirtyend - bp->b_dirtyoff);
344 		uiop->uio_offset = bio->bio_offset + bp->b_dirtyoff;
345 		io.iov_base = (char *)bp->b_data + bp->b_dirtyoff;
346 		uiop->uio_rw = UIO_WRITE;
347 		error = smb_write(smp->sm_share, np->n_fid, uiop, &scred);
348 
349 		/*
350 		 * For an interrupted write, the buffer is still valid
351 		 * and the write hasn't been pushed to the server yet,
352 		 * so we can't set BIO_ERROR and report the interruption
353 		 * by setting B_EINTR. For the async case, B_EINTR
354 		 * is not relevant, so the rpc attempt is essentially
355 		 * a noop.  For the case of a V3 write rpc not being
356 		 * committed to stable storage, the block is still
357 		 * dirty and requires either a commit rpc or another
358 		 * write rpc with iomode == NFSV3WRITE_FILESYNC before
359 		 * the block is reused. This is indicated by setting
360 		 * the B_DELWRI and B_NEEDCOMMIT flags.
361 		 */
362     		if (error == EINTR
363 		    || (!error && (bp->b_flags & B_NEEDCOMMIT))) {
364 
365 			crit_enter();
366 			bp->b_flags &= ~(B_INVAL|B_NOCACHE);
367 			if ((bp->b_flags & B_PAGING) == 0)
368 			    bdirty(bp);
369 			bp->b_flags |= B_EINTR;
370 			crit_exit();
371 	    	} else {
372 			if (error) {
373 				bp->b_flags |= B_ERROR;
374 				bp->b_error = error;
375 			}
376 			bp->b_dirtyoff = bp->b_dirtyend = 0;
377 		}
378 	    } else {
379 		bp->b_resid = 0;
380 		biodone(bio);
381 		return 0;
382 	    }
383 	}
384 	bp->b_resid = uiop->uio_resid;
385 	biodone(bio);
386 	return error;
387 }
388 
389 /*
390  * Vnode op for VM getpages.
391  * Wish wish .... get rid from multiple IO routines
392  *
393  * smbfs_getpages(struct vnode *a_vp, vm_page_t *a_m, int a_count,
394  *		  int a_reqpage, vm_ooffset_t a_offset)
395  */
396 int
397 smbfs_getpages(struct vop_getpages_args *ap)
398 {
399 #ifdef SMBFS_RWGENERIC
400 	return vop_stdgetpages(ap);
401 #else
402 	int i, error, npages;
403 	int doclose;
404 	size_t size, toff, nextoff, count;
405 	struct uio uio;
406 	struct iovec iov;
407 	vm_offset_t kva;
408 	struct buf *bp;
409 	struct vnode *vp;
410 	struct thread *td = curthread;	/* XXX */
411 	struct ucred *cred;
412 	struct smbmount *smp;
413 	struct smbnode *np;
414 	struct smb_cred scred;
415 	vm_page_t *pages;
416 
417 	KKASSERT(td->td_proc);
418 
419 	vp = ap->a_vp;
420 	cred = td->td_proc->p_ucred;
421 	np = VTOSMB(vp);
422 	smp = VFSTOSMBFS(vp->v_mount);
423 	pages = ap->a_m;
424 	count = (size_t)ap->a_count;
425 
426 	if (vp->v_object == NULL) {
427 		kprintf("smbfs_getpages: called with non-merged cache vnode??\n");
428 		return VM_PAGER_ERROR;
429 	}
430 	smb_makescred(&scred, td, cred);
431 
432 	bp = getpbuf_kva(&smbfs_pbuf_freecnt);
433 	npages = btoc(count);
434 	kva = (vm_offset_t) bp->b_data;
435 	pmap_qenter(kva, pages, npages);
436 
437 	iov.iov_base = (caddr_t) kva;
438 	iov.iov_len = count;
439 	uio.uio_iov = &iov;
440 	uio.uio_iovcnt = 1;
441 	uio.uio_offset = IDX_TO_OFF(pages[0]->pindex);
442 	uio.uio_resid = count;
443 	uio.uio_segflg = UIO_SYSSPACE;
444 	uio.uio_rw = UIO_READ;
445 	uio.uio_td = td;
446 
447 	/*
448 	 * This is kinda nasty.  Since smbfs is physically closing the
449 	 * fid on close(), we have to reopen it if necessary.  There are
450 	 * other races here too, such as if another process opens the same
451 	 * file while we are blocked in read. XXX
452 	 */
453 	error = 0;
454 	doclose = 0;
455 	if (np->n_opencount == 0) {
456 		error = smbfs_smb_open(np, SMB_AM_OPENREAD, &scred);
457 		if (error == 0)
458 			doclose = 1;
459 	}
460 	if (error == 0)
461 		error = smb_read(smp->sm_share, np->n_fid, &uio, &scred);
462 	if (doclose)
463 		smbfs_smb_close(smp->sm_share, np->n_fid, NULL, &scred);
464 	pmap_qremove(kva, npages);
465 
466 	relpbuf(bp, &smbfs_pbuf_freecnt);
467 
468 	if (error && (uio.uio_resid == count)) {
469 		kprintf("smbfs_getpages: error %d\n",error);
470 		for (i = 0; i < npages; i++) {
471 			if (ap->a_reqpage != i)
472 				vnode_pager_freepage(pages[i]);
473 		}
474 		return VM_PAGER_ERROR;
475 	}
476 
477 	size = count - uio.uio_resid;
478 
479 	for (i = 0, toff = 0; i < npages; i++, toff = nextoff) {
480 		vm_page_t m;
481 		nextoff = toff + PAGE_SIZE;
482 		m = pages[i];
483 
484 		/*
485 		 * NOTE: pmap dirty bit should have already been cleared.
486 		 *	 We do not clear it here.
487 		 */
488 		if (nextoff <= size) {
489 			m->valid = VM_PAGE_BITS_ALL;
490 			m->dirty = 0;
491 		} else {
492 			int nvalid = ((size + DEV_BSIZE - 1) - toff) &
493 				      ~(DEV_BSIZE - 1);
494 			vm_page_set_validclean(m, 0, nvalid);
495 		}
496 
497 		if (i != ap->a_reqpage) {
498 			/*
499 			 * Whether or not to leave the page activated is up in
500 			 * the air, but we should put the page on a page queue
501 			 * somewhere (it already is in the object).  Result:
502 			 * It appears that emperical results show that
503 			 * deactivating pages is best.
504 			 */
505 
506 			/*
507 			 * Just in case someone was asking for this page we
508 			 * now tell them that it is ok to use.
509 			 */
510 			if (!error) {
511 				if (m->flags & PG_REFERENCED)
512 					vm_page_activate(m);
513 				else
514 					vm_page_deactivate(m);
515 				vm_page_wakeup(m);
516 			} else {
517 				vnode_pager_freepage(m);
518 			}
519 		}
520 	}
521 	return 0;
522 #endif /* SMBFS_RWGENERIC */
523 }
524 
525 /*
526  * Vnode op for VM putpages.
527  * possible bug: all IO done in sync mode
528  * Note that vop_close always invalidate pages before close, so it's
529  * not necessary to open vnode.
530  *
531  * smbfs_putpages(struct vnode *a_vp, vm_page_t *a_m, int a_count, int a_sync,
532  *		  int *a_rtvals, vm_ooffset_t a_offset)
533  */
534 int
535 smbfs_putpages(struct vop_putpages_args *ap)
536 {
537 	int error;
538 	struct vnode *vp = ap->a_vp;
539 	struct thread *td = curthread;	/* XXX */
540 	struct ucred *cred;
541 
542 #ifdef SMBFS_RWGENERIC
543 	KKASSERT(td->td_proc);
544 	cred = td->td_proc->p_ucred;
545 	VOP_OPEN(vp, FWRITE, cred, NULL);
546 	error = vop_stdputpages(ap);
547 	VOP_CLOSE(vp, FWRITE, cred, NULL);
548 	return error;
549 #else
550 	struct uio uio;
551 	struct iovec iov;
552 	vm_offset_t kva;
553 	struct buf *bp;
554 	int i, npages, count;
555 	int doclose;
556 	int *rtvals;
557 	struct smbmount *smp;
558 	struct smbnode *np;
559 	struct smb_cred scred;
560 	vm_page_t *pages;
561 
562 	KKASSERT(td->td_proc);
563 	cred = td->td_proc->p_ucred;
564 /*	VOP_OPEN(vp, FWRITE, cred, NULL);*/
565 	np = VTOSMB(vp);
566 	smp = VFSTOSMBFS(vp->v_mount);
567 	pages = ap->a_m;
568 	count = ap->a_count;
569 	rtvals = ap->a_rtvals;
570 	npages = btoc(count);
571 
572 	for (i = 0; i < npages; i++) {
573 		rtvals[i] = VM_PAGER_AGAIN;
574 	}
575 
576 	bp = getpbuf_kva(&smbfs_pbuf_freecnt);
577 	kva = (vm_offset_t) bp->b_data;
578 	pmap_qenter(kva, pages, npages);
579 
580 	iov.iov_base = (caddr_t) kva;
581 	iov.iov_len = count;
582 	uio.uio_iov = &iov;
583 	uio.uio_iovcnt = 1;
584 	uio.uio_offset = IDX_TO_OFF(pages[0]->pindex);
585 	uio.uio_resid = count;
586 	uio.uio_segflg = UIO_SYSSPACE;
587 	uio.uio_rw = UIO_WRITE;
588 	uio.uio_td = td;
589 	SMBVDEBUG("ofs=%d,resid=%d\n",(int)uio.uio_offset, uio.uio_resid);
590 
591 	smb_makescred(&scred, td, cred);
592 
593 	/*
594 	 * This is kinda nasty.  Since smbfs is physically closing the
595 	 * fid on close(), we have to reopen it if necessary.  There are
596 	 * other races here too, such as if another process opens the same
597 	 * file while we are blocked in read, or the file is open read-only
598 	 * XXX
599 	 */
600 	error = 0;
601 	doclose = 0;
602 	if (np->n_opencount == 0) {
603 		error = smbfs_smb_open(np, SMB_AM_OPENRW, &scred);
604 		if (error == 0)
605 			doclose = 1;
606 	}
607 	if (error == 0)
608 		error = smb_write(smp->sm_share, np->n_fid, &uio, &scred);
609 	if (doclose)
610 		smbfs_smb_close(smp->sm_share, np->n_fid, NULL, &scred);
611 /*	VOP_CLOSE(vp, FWRITE, cred);*/
612 	SMBVDEBUG("paged write done: %d\n", error);
613 
614 	pmap_qremove(kva, npages);
615 	relpbuf(bp, &smbfs_pbuf_freecnt);
616 
617 	if (!error) {
618 		int nwritten = round_page(count - uio.uio_resid) / PAGE_SIZE;
619 		for (i = 0; i < nwritten; i++) {
620 			rtvals[i] = VM_PAGER_OK;
621 			vm_page_undirty(pages[i]);
622 		}
623 	}
624 	return rtvals[0];
625 #endif /* SMBFS_RWGENERIC */
626 }
627 
628 /*
629  * Flush and invalidate all dirty buffers. If another process is already
630  * doing the flush, just wait for completion.
631  */
632 int
633 smbfs_vinvalbuf(struct vnode *vp, int flags, int intrflg)
634 {
635 	struct smbnode *np = VTOSMB(vp);
636 	int error = 0, slpflag, slptimeo;
637 
638 	if (vp->v_flag & VRECLAIMED)
639 		return 0;
640 	if (intrflg) {
641 		slpflag = PCATCH;
642 		slptimeo = 2 * hz;
643 	} else {
644 		slpflag = 0;
645 		slptimeo = 0;
646 	}
647 	while (np->n_flag & NFLUSHINPROG) {
648 		np->n_flag |= NFLUSHWANT;
649 		error = tsleep((caddr_t)&np->n_flag, 0, "smfsvinv", slptimeo);
650 		error = smb_proc_intr(curthread);
651 		if (error == EINTR && intrflg)
652 			return EINTR;
653 	}
654 	np->n_flag |= NFLUSHINPROG;
655 	error = vinvalbuf(vp, flags, slpflag, 0);
656 	while (error) {
657 		if (intrflg && (error == ERESTART || error == EINTR)) {
658 			np->n_flag &= ~NFLUSHINPROG;
659 			if (np->n_flag & NFLUSHWANT) {
660 				np->n_flag &= ~NFLUSHWANT;
661 				wakeup((caddr_t)&np->n_flag);
662 			}
663 			return EINTR;
664 		}
665 		error = vinvalbuf(vp, flags, slpflag, 0);
666 	}
667 	np->n_flag &= ~(NMODIFIED | NFLUSHINPROG);
668 	if (np->n_flag & NFLUSHWANT) {
669 		np->n_flag &= ~NFLUSHWANT;
670 		wakeup((caddr_t)&np->n_flag);
671 	}
672 	return (error);
673 }
674