1 /* 2 * Copyright (c) 2000-2001, Boris Popov 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by Boris Popov. 16 * 4. Neither the name of the author nor the names of any co-contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $FreeBSD: src/sys/fs/smbfs/smbfs_io.c,v 1.3.2.3 2003/01/17 08:20:26 tjr Exp $ 33 */ 34 35 #include <sys/param.h> 36 #include <sys/systm.h> 37 #include <sys/uio.h> 38 #include <sys/resourcevar.h> /* defines plimit structure in proc struct */ 39 #include <sys/kernel.h> 40 #include <sys/proc.h> 41 #include <sys/fcntl.h> 42 #include <sys/mount.h> 43 #include <sys/namei.h> 44 #include <sys/vnode.h> 45 #include <sys/dirent.h> 46 #include <sys/signalvar.h> 47 #include <sys/sysctl.h> 48 49 #include <machine/limits.h> 50 51 #include <vm/vm.h> 52 #include <vm/vm_page2.h> 53 #include <vm/vm_extern.h> 54 #include <vm/vm_object.h> 55 #include <vm/vm_pager.h> 56 #include <vm/vnode_pager.h> 57 58 #include <netproto/smb/smb.h> 59 #include <netproto/smb/smb_conn.h> 60 #include <netproto/smb/smb_subr.h> 61 62 #include "smbfs.h" 63 #include "smbfs_node.h" 64 #include "smbfs_subr.h" 65 66 #include <sys/buf.h> 67 68 #include <sys/thread2.h> 69 70 /*#define SMBFS_RWGENERIC*/ 71 72 extern int smbfs_pbuf_freecnt; 73 74 static int smbfs_fastlookup = 1; 75 76 SYSCTL_DECL(_vfs_smbfs); 77 SYSCTL_INT(_vfs_smbfs, OID_AUTO, fastlookup, CTLFLAG_RW, &smbfs_fastlookup, 0, ""); 78 79 static int 80 smbfs_readvdir(struct vnode *vp, struct uio *uio, struct ucred *cred) 81 { 82 struct smb_cred scred; 83 struct smbfs_fctx *ctx; 84 struct vnode *newvp; 85 struct smbnode *np; 86 int error, offset, retval; 87 88 np = VTOSMB(vp); 89 SMBVDEBUG("dirname='%s'\n", np->n_name); 90 smb_makescred(&scred, uio->uio_td, cred); 91 92 if (uio->uio_offset < 0 || uio->uio_offset > INT_MAX) 93 return(EINVAL); 94 95 error = 0; 96 offset = uio->uio_offset; 97 98 if (uio->uio_resid > 0 && offset < 1) { 99 if (vop_write_dirent(&error, uio, np->n_ino, DT_DIR, 1, ".")) 100 goto done; 101 if (error) 102 goto done; 103 ++offset; 104 } 105 106 if (uio->uio_resid > 0 && offset < 2) { 107 if (vop_write_dirent(&error, uio, 108 np->n_parent ? VTOSMB(np->n_parent)->n_ino : 2, 109 DT_DIR, 2, "..")) 110 goto done; 111 if (error) 112 goto done; 113 ++offset; 114 } 115 116 if (uio->uio_resid == 0) 117 goto done; 118 119 if (offset != np->n_dirofs || np->n_dirseq == NULL) { 120 SMBVDEBUG("Reopening search %ld:%ld\n", offset, np->n_dirofs); 121 if (np->n_dirseq) { 122 smbfs_findclose(np->n_dirseq, &scred); 123 np->n_dirseq = NULL; 124 } 125 np->n_dirofs = 2; 126 error = smbfs_findopen(np, "*", 1, 127 SMB_FA_SYSTEM | SMB_FA_HIDDEN | SMB_FA_DIR, 128 &scred, &ctx); 129 if (error) { 130 SMBVDEBUG("can not open search, error = %d", error); 131 return error; 132 } 133 np->n_dirseq = ctx; 134 } else { 135 ctx = np->n_dirseq; 136 } 137 while (np->n_dirofs < offset) { 138 error = smbfs_findnext(ctx, offset - np->n_dirofs, &scred); 139 ++np->n_dirofs; 140 if (error) { 141 smbfs_findclose(np->n_dirseq, &scred); 142 np->n_dirseq = NULL; 143 return error == ENOENT ? 0 : error; 144 } 145 } 146 error = 0; 147 while (uio->uio_resid > 0 && !error) { 148 /* 149 * Overestimate the size of a record a bit, doesn't really 150 * hurt to be wrong here. 151 */ 152 error = smbfs_findnext(ctx, uio->uio_resid / _DIRENT_RECLEN(255) + 1, &scred); 153 if (error) 154 break; 155 np->n_dirofs++; 156 ++offset; 157 158 retval = vop_write_dirent(&error, uio, ctx->f_attr.fa_ino, 159 (ctx->f_attr.fa_attr & SMB_FA_DIR) ? DT_DIR : DT_REG, 160 ctx->f_nmlen, ctx->f_name); 161 if (retval) 162 break; 163 if (smbfs_fastlookup && !error) { 164 error = smbfs_nget(vp->v_mount, vp, ctx->f_name, 165 ctx->f_nmlen, &ctx->f_attr, &newvp); 166 if (!error) 167 vput(newvp); 168 } 169 } 170 if (error == ENOENT) 171 error = 0; 172 done: 173 uio->uio_offset = offset; 174 return error; 175 } 176 177 int 178 smbfs_readvnode(struct vnode *vp, struct uio *uiop, struct ucred *cred) 179 { 180 struct thread *td; 181 struct smbmount *smp = VFSTOSMBFS(vp->v_mount); 182 struct smbnode *np = VTOSMB(vp); 183 struct vattr vattr; 184 struct smb_cred scred; 185 int error, lks; 186 187 /* 188 * Protect against method which is not supported for now 189 */ 190 if (uiop->uio_segflg == UIO_NOCOPY) 191 return EOPNOTSUPP; 192 193 if (vp->v_type != VREG && vp->v_type != VDIR) { 194 SMBFSERR("vn types other than VREG or VDIR are unsupported !\n"); 195 return EIO; 196 } 197 if (uiop->uio_resid == 0) 198 return 0; 199 if (uiop->uio_offset < 0) 200 return EINVAL; 201 td = uiop->uio_td; 202 if (vp->v_type == VDIR) { 203 lks = LK_EXCLUSIVE;/*lockstatus(&vp->v_lock, td);*/ 204 if (lks == LK_SHARED) 205 vn_lock(vp, LK_UPGRADE | LK_RETRY); 206 error = smbfs_readvdir(vp, uiop, cred); 207 if (lks == LK_SHARED) 208 vn_lock(vp, LK_DOWNGRADE | LK_RETRY); 209 return error; 210 } 211 212 /* biosize = SSTOCN(smp->sm_share)->sc_txmax;*/ 213 if (np->n_flag & NMODIFIED) { 214 smbfs_attr_cacheremove(vp); 215 error = VOP_GETATTR(vp, &vattr); 216 if (error) 217 return error; 218 np->n_mtime.tv_sec = vattr.va_mtime.tv_sec; 219 } else { 220 error = VOP_GETATTR(vp, &vattr); 221 if (error) 222 return error; 223 if (np->n_mtime.tv_sec != vattr.va_mtime.tv_sec) { 224 error = smbfs_vinvalbuf(vp, V_SAVE, 1); 225 if (error) 226 return error; 227 np->n_mtime.tv_sec = vattr.va_mtime.tv_sec; 228 } 229 } 230 smb_makescred(&scred, td, cred); 231 return smb_read(smp->sm_share, np->n_fid, uiop, &scred); 232 } 233 234 int 235 smbfs_writevnode(struct vnode *vp, struct uio *uiop, 236 struct ucred *cred, int ioflag) 237 { 238 struct thread *td; 239 struct smbmount *smp = VTOSMBFS(vp); 240 struct smbnode *np = VTOSMB(vp); 241 struct smb_cred scred; 242 int error = 0; 243 244 if (vp->v_type != VREG) { 245 SMBERROR("vn types other than VREG unsupported !\n"); 246 return EIO; 247 } 248 SMBVDEBUG("ofs=%d,resid=%d\n",(int)uiop->uio_offset, uiop->uio_resid); 249 if (uiop->uio_offset < 0) 250 return EINVAL; 251 td = uiop->uio_td; 252 if (ioflag & (IO_APPEND | IO_SYNC)) { 253 if (np->n_flag & NMODIFIED) { 254 smbfs_attr_cacheremove(vp); 255 error = smbfs_vinvalbuf(vp, V_SAVE, 1); 256 if (error) 257 return error; 258 } 259 if (ioflag & IO_APPEND) { 260 #if 0 /* notyet */ 261 /* 262 * File size can be changed by another client 263 */ 264 smbfs_attr_cacheremove(vp); 265 error = VOP_GETATTR(vp, &vattr); 266 if (error) return (error); 267 #endif 268 uiop->uio_offset = np->n_size; 269 } 270 } 271 if (uiop->uio_resid == 0) 272 return 0; 273 if (td->td_proc && 274 uiop->uio_offset + uiop->uio_resid > 275 td->td_proc->p_rlimit[RLIMIT_FSIZE].rlim_cur) { 276 lwpsignal(td->td_proc, td->td_lwp, SIGXFSZ); 277 return EFBIG; 278 } 279 smb_makescred(&scred, td, cred); 280 error = smb_write(smp->sm_share, np->n_fid, uiop, &scred); 281 SMBVDEBUG("after: ofs=%d,resid=%d\n",(int)uiop->uio_offset, uiop->uio_resid); 282 if (!error) { 283 if (uiop->uio_offset > np->n_size) { 284 np->n_size = uiop->uio_offset; 285 vnode_pager_setsize(vp, np->n_size); 286 } 287 } 288 return error; 289 } 290 291 /* 292 * Do an I/O operation to/from a cache block. 293 */ 294 int 295 smbfs_doio(struct vnode *vp, struct bio *bio, struct ucred *cr, struct thread *td) 296 { 297 struct buf *bp = bio->bio_buf; 298 struct smbmount *smp = VFSTOSMBFS(vp->v_mount); 299 struct smbnode *np = VTOSMB(vp); 300 struct uio uio, *uiop = &uio; 301 struct iovec io; 302 struct smb_cred scred; 303 int error = 0; 304 305 uiop->uio_iov = &io; 306 uiop->uio_iovcnt = 1; 307 uiop->uio_segflg = UIO_SYSSPACE; 308 uiop->uio_td = td; 309 310 smb_makescred(&scred, td, cr); 311 312 if (bp->b_cmd == BUF_CMD_READ) { 313 io.iov_len = uiop->uio_resid = (size_t)bp->b_bcount; 314 io.iov_base = bp->b_data; 315 uiop->uio_rw = UIO_READ; 316 switch (vp->v_type) { 317 case VREG: 318 uiop->uio_offset = bio->bio_offset; 319 error = smb_read(smp->sm_share, np->n_fid, uiop, &scred); 320 if (error) 321 break; 322 if (uiop->uio_resid) { 323 size_t left = uiop->uio_resid; 324 size_t nread = (size_t)bp->b_bcount - left; 325 if (left > 0) 326 bzero((char *)bp->b_data + nread, left); 327 } 328 break; 329 default: 330 kprintf("smbfs_doio: type %x unexpected\n",vp->v_type); 331 break; 332 } 333 if (error) { 334 bp->b_error = error; 335 bp->b_flags |= B_ERROR; 336 } 337 } else { /* write */ 338 KKASSERT(bp->b_cmd == BUF_CMD_WRITE); 339 if (bio->bio_offset + bp->b_dirtyend > np->n_size) 340 bp->b_dirtyend = np->n_size - bio->bio_offset; 341 342 if (bp->b_dirtyend > bp->b_dirtyoff) { 343 io.iov_len = uiop->uio_resid = 344 (size_t)(bp->b_dirtyend - bp->b_dirtyoff); 345 uiop->uio_offset = bio->bio_offset + bp->b_dirtyoff; 346 io.iov_base = (char *)bp->b_data + bp->b_dirtyoff; 347 uiop->uio_rw = UIO_WRITE; 348 error = smb_write(smp->sm_share, np->n_fid, uiop, &scred); 349 350 /* 351 * For an interrupted write, the buffer is still valid 352 * and the write hasn't been pushed to the server yet, 353 * so we can't set BIO_ERROR and report the interruption 354 * by setting B_EINTR. For the async case, B_EINTR 355 * is not relevant, so the rpc attempt is essentially 356 * a noop. For the case of a V3 write rpc not being 357 * committed to stable storage, the block is still 358 * dirty and requires either a commit rpc or another 359 * write rpc with iomode == NFSV3WRITE_FILESYNC before 360 * the block is reused. This is indicated by setting 361 * the B_DELWRI and B_NEEDCOMMIT flags. 362 */ 363 if (error == EINTR 364 || (!error && (bp->b_flags & B_NEEDCOMMIT))) { 365 366 crit_enter(); 367 bp->b_flags &= ~(B_INVAL|B_NOCACHE); 368 if ((bp->b_flags & B_PAGING) == 0) 369 bdirty(bp); 370 bp->b_flags |= B_EINTR; 371 crit_exit(); 372 } else { 373 if (error) { 374 bp->b_flags |= B_ERROR; 375 bp->b_error = error; 376 } 377 bp->b_dirtyoff = bp->b_dirtyend = 0; 378 } 379 } else { 380 bp->b_resid = 0; 381 biodone(bio); 382 return 0; 383 } 384 } 385 bp->b_resid = uiop->uio_resid; 386 biodone(bio); 387 return error; 388 } 389 390 /* 391 * Vnode op for VM getpages. 392 * Wish wish .... get rid from multiple IO routines 393 * 394 * smbfs_getpages(struct vnode *a_vp, vm_page_t *a_m, int a_count, 395 * int a_reqpage, vm_ooffset_t a_offset) 396 */ 397 int 398 smbfs_getpages(struct vop_getpages_args *ap) 399 { 400 #ifdef SMBFS_RWGENERIC 401 return vop_stdgetpages(ap); 402 #else 403 int i, error, npages; 404 int doclose; 405 size_t size, toff, nextoff, count; 406 struct uio uio; 407 struct iovec iov; 408 vm_offset_t kva; 409 struct buf *bp; 410 struct vnode *vp; 411 struct thread *td = curthread; /* XXX */ 412 struct ucred *cred; 413 struct smbmount *smp; 414 struct smbnode *np; 415 struct smb_cred scred; 416 vm_page_t *pages; 417 418 KKASSERT(td->td_proc); 419 420 vp = ap->a_vp; 421 cred = td->td_proc->p_ucred; 422 np = VTOSMB(vp); 423 smp = VFSTOSMBFS(vp->v_mount); 424 pages = ap->a_m; 425 count = (size_t)ap->a_count; 426 427 if (vp->v_object == NULL) { 428 kprintf("smbfs_getpages: called with non-merged cache vnode??\n"); 429 return VM_PAGER_ERROR; 430 } 431 smb_makescred(&scred, td, cred); 432 433 bp = getpbuf_kva(&smbfs_pbuf_freecnt); 434 npages = btoc(count); 435 kva = (vm_offset_t) bp->b_data; 436 pmap_qenter(kva, pages, npages); 437 438 iov.iov_base = (caddr_t) kva; 439 iov.iov_len = count; 440 uio.uio_iov = &iov; 441 uio.uio_iovcnt = 1; 442 uio.uio_offset = IDX_TO_OFF(pages[0]->pindex); 443 uio.uio_resid = count; 444 uio.uio_segflg = UIO_SYSSPACE; 445 uio.uio_rw = UIO_READ; 446 uio.uio_td = td; 447 448 /* 449 * This is kinda nasty. Since smbfs is physically closing the 450 * fid on close(), we have to reopen it if necessary. There are 451 * other races here too, such as if another process opens the same 452 * file while we are blocked in read. XXX 453 */ 454 error = 0; 455 doclose = 0; 456 if (np->n_opencount == 0) { 457 error = smbfs_smb_open(np, SMB_AM_OPENREAD, &scred); 458 if (error == 0) 459 doclose = 1; 460 } 461 if (error == 0) 462 error = smb_read(smp->sm_share, np->n_fid, &uio, &scred); 463 if (doclose) 464 smbfs_smb_close(smp->sm_share, np->n_fid, NULL, &scred); 465 pmap_qremove(kva, npages); 466 467 relpbuf(bp, &smbfs_pbuf_freecnt); 468 469 if (error && (uio.uio_resid == count)) { 470 kprintf("smbfs_getpages: error %d\n",error); 471 for (i = 0; i < npages; i++) { 472 if (ap->a_reqpage != i) 473 vnode_pager_freepage(pages[i]); 474 } 475 return VM_PAGER_ERROR; 476 } 477 478 size = count - uio.uio_resid; 479 480 for (i = 0, toff = 0; i < npages; i++, toff = nextoff) { 481 vm_page_t m; 482 nextoff = toff + PAGE_SIZE; 483 m = pages[i]; 484 485 /* 486 * NOTE: pmap dirty bit should have already been cleared. 487 * We do not clear it here. 488 */ 489 if (nextoff <= size) { 490 m->valid = VM_PAGE_BITS_ALL; 491 m->dirty = 0; 492 } else { 493 int nvalid = rounddown2((size + DEV_BSIZE - 1) - toff, 494 DEV_BSIZE); 495 vm_page_set_validclean(m, 0, nvalid); 496 } 497 498 if (i != ap->a_reqpage) { 499 /* 500 * Whether or not to leave the page activated is up in 501 * the air, but we should put the page on a page queue 502 * somewhere (it already is in the object). Result: 503 * It appears that emperical results show that 504 * deactivating pages is best. 505 */ 506 507 /* 508 * Just in case someone was asking for this page we 509 * now tell them that it is ok to use. 510 */ 511 if (!error) { 512 if (m->flags & PG_REFERENCED) 513 vm_page_activate(m); 514 else 515 vm_page_deactivate(m); 516 vm_page_wakeup(m); 517 } else { 518 vnode_pager_freepage(m); 519 } 520 } 521 } 522 return 0; 523 #endif /* SMBFS_RWGENERIC */ 524 } 525 526 /* 527 * Vnode op for VM putpages. 528 * possible bug: all IO done in sync mode 529 * Note that vop_close always invalidate pages before close, so it's 530 * not necessary to open vnode. 531 * 532 * smbfs_putpages(struct vnode *a_vp, vm_page_t *a_m, int a_count, int a_sync, 533 * int *a_rtvals, vm_ooffset_t a_offset) 534 */ 535 int 536 smbfs_putpages(struct vop_putpages_args *ap) 537 { 538 int error; 539 struct vnode *vp = ap->a_vp; 540 struct thread *td = curthread; /* XXX */ 541 struct ucred *cred; 542 543 #ifdef SMBFS_RWGENERIC 544 KKASSERT(td->td_proc); 545 cred = td->td_proc->p_ucred; 546 VOP_OPEN(vp, FWRITE, cred, NULL); 547 error = vop_stdputpages(ap); 548 VOP_CLOSE(vp, FWRITE, cred, NULL); 549 return error; 550 #else 551 struct uio uio; 552 struct iovec iov; 553 vm_offset_t kva; 554 struct buf *bp; 555 int i, npages, count; 556 int doclose; 557 int *rtvals; 558 struct smbmount *smp; 559 struct smbnode *np; 560 struct smb_cred scred; 561 vm_page_t *pages; 562 563 KKASSERT(td->td_proc); 564 cred = td->td_proc->p_ucred; 565 /* VOP_OPEN(vp, FWRITE, cred, NULL);*/ 566 np = VTOSMB(vp); 567 smp = VFSTOSMBFS(vp->v_mount); 568 pages = ap->a_m; 569 count = ap->a_count; 570 rtvals = ap->a_rtvals; 571 npages = btoc(count); 572 573 for (i = 0; i < npages; i++) { 574 rtvals[i] = VM_PAGER_AGAIN; 575 } 576 577 bp = getpbuf_kva(&smbfs_pbuf_freecnt); 578 kva = (vm_offset_t) bp->b_data; 579 pmap_qenter(kva, pages, npages); 580 581 iov.iov_base = (caddr_t) kva; 582 iov.iov_len = count; 583 uio.uio_iov = &iov; 584 uio.uio_iovcnt = 1; 585 uio.uio_offset = IDX_TO_OFF(pages[0]->pindex); 586 uio.uio_resid = count; 587 uio.uio_segflg = UIO_SYSSPACE; 588 uio.uio_rw = UIO_WRITE; 589 uio.uio_td = td; 590 SMBVDEBUG("ofs=%d,resid=%d\n",(int)uio.uio_offset, uio.uio_resid); 591 592 smb_makescred(&scred, td, cred); 593 594 /* 595 * This is kinda nasty. Since smbfs is physically closing the 596 * fid on close(), we have to reopen it if necessary. There are 597 * other races here too, such as if another process opens the same 598 * file while we are blocked in read, or the file is open read-only 599 * XXX 600 */ 601 error = 0; 602 doclose = 0; 603 if (np->n_opencount == 0) { 604 error = smbfs_smb_open(np, SMB_AM_OPENRW, &scred); 605 if (error == 0) 606 doclose = 1; 607 } 608 if (error == 0) 609 error = smb_write(smp->sm_share, np->n_fid, &uio, &scred); 610 if (doclose) 611 smbfs_smb_close(smp->sm_share, np->n_fid, NULL, &scred); 612 /* VOP_CLOSE(vp, FWRITE, cred);*/ 613 SMBVDEBUG("paged write done: %d\n", error); 614 615 pmap_qremove(kva, npages); 616 relpbuf(bp, &smbfs_pbuf_freecnt); 617 618 if (!error) { 619 int nwritten = round_page(count - uio.uio_resid) / PAGE_SIZE; 620 for (i = 0; i < nwritten; i++) { 621 rtvals[i] = VM_PAGER_OK; 622 vm_page_undirty(pages[i]); 623 } 624 } 625 return rtvals[0]; 626 #endif /* SMBFS_RWGENERIC */ 627 } 628 629 /* 630 * Flush and invalidate all dirty buffers. If another process is already 631 * doing the flush, just wait for completion. 632 */ 633 int 634 smbfs_vinvalbuf(struct vnode *vp, int flags, int intrflg) 635 { 636 struct smbnode *np = VTOSMB(vp); 637 int error = 0, slpflag, slptimeo; 638 639 if (vp->v_flag & VRECLAIMED) 640 return 0; 641 if (intrflg) { 642 slpflag = PCATCH; 643 slptimeo = 2 * hz; 644 } else { 645 slpflag = 0; 646 slptimeo = 0; 647 } 648 while (np->n_flag & NFLUSHINPROG) { 649 np->n_flag |= NFLUSHWANT; 650 error = tsleep((caddr_t)&np->n_flag, 0, "smfsvinv", slptimeo); 651 error = smb_proc_intr(curthread); 652 if (error == EINTR && intrflg) 653 return EINTR; 654 } 655 np->n_flag |= NFLUSHINPROG; 656 error = vinvalbuf(vp, flags, slpflag, 0); 657 while (error) { 658 if (intrflg && (error == ERESTART || error == EINTR)) { 659 np->n_flag &= ~NFLUSHINPROG; 660 if (np->n_flag & NFLUSHWANT) { 661 np->n_flag &= ~NFLUSHWANT; 662 wakeup((caddr_t)&np->n_flag); 663 } 664 return EINTR; 665 } 666 error = vinvalbuf(vp, flags, slpflag, 0); 667 } 668 np->n_flag &= ~(NMODIFIED | NFLUSHINPROG); 669 if (np->n_flag & NFLUSHWANT) { 670 np->n_flag &= ~NFLUSHWANT; 671 wakeup((caddr_t)&np->n_flag); 672 } 673 return (error); 674 } 675