xref: /dflybsd-src/sys/vfs/smbfs/smbfs_io.c (revision 53e987cee557d989dbf172d8a3c2ade9ea6fc46f)
1 /*
2  * Copyright (c) 2000-2001, Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *    This product includes software developed by Boris Popov.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  *
32  * $FreeBSD: src/sys/fs/smbfs/smbfs_io.c,v 1.3.2.3 2003/01/17 08:20:26 tjr Exp $
33  * $DragonFly: src/sys/vfs/smbfs/smbfs_io.c,v 1.16 2005/04/15 19:08:26 dillon Exp $
34  *
35  */
36 #include <sys/param.h>
37 #include <sys/systm.h>
38 #include <sys/resourcevar.h>	/* defines plimit structure in proc struct */
39 #include <sys/kernel.h>
40 #include <sys/proc.h>
41 #include <sys/fcntl.h>
42 #include <sys/mount.h>
43 #include <sys/namei.h>
44 #include <sys/vnode.h>
45 #include <sys/dirent.h>
46 #include <sys/signalvar.h>
47 #include <sys/sysctl.h>
48 
49 #include <vm/vm.h>
50 #include <vm/vm_page.h>
51 #include <vm/vm_extern.h>
52 #include <vm/vm_object.h>
53 #include <vm/vm_pager.h>
54 #include <vm/vnode_pager.h>
55 /*
56 #include <sys/ioccom.h>
57 */
58 #include <netproto/smb/smb.h>
59 #include <netproto/smb/smb_conn.h>
60 #include <netproto/smb/smb_subr.h>
61 
62 #include "smbfs.h"
63 #include "smbfs_node.h"
64 #include "smbfs_subr.h"
65 
66 #include <sys/buf.h>
67 
68 /*#define SMBFS_RWGENERIC*/
69 
70 extern int smbfs_pbuf_freecnt;
71 
72 static int smbfs_fastlookup = 1;
73 
74 SYSCTL_DECL(_vfs_smbfs);
75 SYSCTL_INT(_vfs_smbfs, OID_AUTO, fastlookup, CTLFLAG_RW, &smbfs_fastlookup, 0, "");
76 
77 
78 #define DE_SIZE	(sizeof(struct dirent))
79 
80 static int
81 smbfs_readvdir(struct vnode *vp, struct uio *uio, struct ucred *cred)
82 {
83 	struct dirent de;
84 	struct smb_cred scred;
85 	struct smbfs_fctx *ctx;
86 	struct vnode *newvp;
87 	struct smbnode *np = VTOSMB(vp);
88 	int error/*, *eofflag = ap->a_eofflag*/;
89 	long offset, limit;
90 
91 	np = VTOSMB(vp);
92 	SMBVDEBUG("dirname='%s'\n", np->n_name);
93 	smb_makescred(&scred, uio->uio_td, cred);
94 	offset = uio->uio_offset / DE_SIZE; 	/* offset in the directory */
95 	limit = uio->uio_resid / DE_SIZE;
96 	if (uio->uio_resid < DE_SIZE || uio->uio_offset < 0)
97 		return EINVAL;
98 	while (limit && offset < 2) {
99 		limit--;
100 		bzero((caddr_t)&de, DE_SIZE);
101 		de.d_reclen = DE_SIZE;
102 		de.d_fileno = (offset == 0) ? np->n_ino :
103 		    (np->n_parent ? VTOSMB(np->n_parent)->n_ino : 2);
104 		if (de.d_fileno == 0)
105 			de.d_fileno = 0x7ffffffd + offset;
106 		de.d_namlen = offset + 1;
107 		de.d_name[0] = '.';
108 		de.d_name[1] = '.';
109 		de.d_name[offset + 1] = '\0';
110 		de.d_type = DT_DIR;
111 		error = uiomove((caddr_t)&de, DE_SIZE, uio);
112 		if (error)
113 			return error;
114 		offset++;
115 		uio->uio_offset += DE_SIZE;
116 	}
117 	if (limit == 0)
118 		return 0;
119 	if (offset != np->n_dirofs || np->n_dirseq == NULL) {
120 		SMBVDEBUG("Reopening search %ld:%ld\n", offset, np->n_dirofs);
121 		if (np->n_dirseq) {
122 			smbfs_findclose(np->n_dirseq, &scred);
123 			np->n_dirseq = NULL;
124 		}
125 		np->n_dirofs = 2;
126 		error = smbfs_findopen(np, "*", 1,
127 		    SMB_FA_SYSTEM | SMB_FA_HIDDEN | SMB_FA_DIR,
128 		    &scred, &ctx);
129 		if (error) {
130 			SMBVDEBUG("can not open search, error = %d", error);
131 			return error;
132 		}
133 		np->n_dirseq = ctx;
134 	} else
135 		ctx = np->n_dirseq;
136 	while (np->n_dirofs < offset) {
137 		error = smbfs_findnext(ctx, offset - np->n_dirofs++, &scred);
138 		if (error) {
139 			smbfs_findclose(np->n_dirseq, &scred);
140 			np->n_dirseq = NULL;
141 			return error == ENOENT ? 0 : error;
142 		}
143 	}
144 	error = 0;
145 	for (; limit; limit--, offset++) {
146 		error = smbfs_findnext(ctx, limit, &scred);
147 		if (error)
148 			break;
149 		np->n_dirofs++;
150 		bzero((caddr_t)&de, DE_SIZE);
151 		de.d_reclen = DE_SIZE;
152 		de.d_fileno = ctx->f_attr.fa_ino;
153 		de.d_type = (ctx->f_attr.fa_attr & SMB_FA_DIR) ? DT_DIR : DT_REG;
154 		de.d_namlen = ctx->f_nmlen;
155 		bcopy(ctx->f_name, de.d_name, de.d_namlen);
156 		de.d_name[de.d_namlen] = '\0';
157 		if (smbfs_fastlookup) {
158 			error = smbfs_nget(vp->v_mount, vp, ctx->f_name,
159 			    ctx->f_nmlen, &ctx->f_attr, &newvp);
160 			if (!error)
161 				vput(newvp);
162 		}
163 		error = uiomove((caddr_t)&de, DE_SIZE, uio);
164 		if (error)
165 			break;
166 	}
167 	if (error == ENOENT)
168 		error = 0;
169 	uio->uio_offset = offset * DE_SIZE;
170 	return error;
171 }
172 
173 int
174 smbfs_readvnode(struct vnode *vp, struct uio *uiop, struct ucred *cred)
175 {
176 	struct thread *td;
177 	struct smbmount *smp = VFSTOSMBFS(vp->v_mount);
178 	struct smbnode *np = VTOSMB(vp);
179 	struct vattr vattr;
180 	struct smb_cred scred;
181 	int error, lks;
182 
183 	/*
184 	 * Protect against method which is not supported for now
185 	 */
186 	if (uiop->uio_segflg == UIO_NOCOPY)
187 		return EOPNOTSUPP;
188 
189 	if (vp->v_type != VREG && vp->v_type != VDIR) {
190 		SMBFSERR("vn types other than VREG or VDIR are unsupported !\n");
191 		return EIO;
192 	}
193 	if (uiop->uio_resid == 0)
194 		return 0;
195 	if (uiop->uio_offset < 0)
196 		return EINVAL;
197 /*	if (uiop->uio_offset + uiop->uio_resid > smp->nm_maxfilesize)
198 		return EFBIG;*/
199 	td = uiop->uio_td;
200 	if (vp->v_type == VDIR) {
201 		lks = LK_EXCLUSIVE;/*lockstatus(&vp->v_lock, td);*/
202 		if (lks == LK_SHARED)
203 			vn_lock(vp, LK_UPGRADE | LK_RETRY, td);
204 		error = smbfs_readvdir(vp, uiop, cred);
205 		if (lks == LK_SHARED)
206 			vn_lock(vp, LK_DOWNGRADE | LK_RETRY, td);
207 		return error;
208 	}
209 
210 /*	biosize = SSTOCN(smp->sm_share)->sc_txmax;*/
211 	if (np->n_flag & NMODIFIED) {
212 		smbfs_attr_cacheremove(vp);
213 		error = VOP_GETATTR(vp, &vattr, td);
214 		if (error)
215 			return error;
216 		np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
217 	} else {
218 		error = VOP_GETATTR(vp, &vattr, td);
219 		if (error)
220 			return error;
221 		if (np->n_mtime.tv_sec != vattr.va_mtime.tv_sec) {
222 			error = smbfs_vinvalbuf(vp, V_SAVE, td, 1);
223 			if (error)
224 				return error;
225 			np->n_mtime.tv_sec = vattr.va_mtime.tv_sec;
226 		}
227 	}
228 	smb_makescred(&scred, td, cred);
229 	return smb_read(smp->sm_share, np->n_fid, uiop, &scred);
230 }
231 
232 int
233 smbfs_writevnode(struct vnode *vp, struct uio *uiop,
234 		 struct ucred *cred, int ioflag)
235 {
236 	struct thread *td;
237 	struct smbmount *smp = VTOSMBFS(vp);
238 	struct smbnode *np = VTOSMB(vp);
239 	struct smb_cred scred;
240 	int error = 0;
241 
242 	if (vp->v_type != VREG) {
243 		SMBERROR("vn types other than VREG unsupported !\n");
244 		return EIO;
245 	}
246 	SMBVDEBUG("ofs=%d,resid=%d\n",(int)uiop->uio_offset, uiop->uio_resid);
247 	if (uiop->uio_offset < 0)
248 		return EINVAL;
249 /*	if (uiop->uio_offset + uiop->uio_resid > smp->nm_maxfilesize)
250 		return (EFBIG);*/
251 	td = uiop->uio_td;
252 	if (ioflag & (IO_APPEND | IO_SYNC)) {
253 		if (np->n_flag & NMODIFIED) {
254 			smbfs_attr_cacheremove(vp);
255 			error = smbfs_vinvalbuf(vp, V_SAVE, td, 1);
256 			if (error)
257 				return error;
258 		}
259 		if (ioflag & IO_APPEND) {
260 #if notyet
261 			/*
262 			 * File size can be changed by another client
263 			 */
264 			smbfs_attr_cacheremove(vp);
265 			error = VOP_GETATTR(vp, &vattr, td);
266 			if (error) return (error);
267 #endif
268 			uiop->uio_offset = np->n_size;
269 		}
270 	}
271 	if (uiop->uio_resid == 0)
272 		return 0;
273 	if (td->td_proc &&
274 	    uiop->uio_offset + uiop->uio_resid >
275 	    td->td_proc->p_rlimit[RLIMIT_FSIZE].rlim_cur) {
276 		psignal(td->td_proc, SIGXFSZ);
277 		return EFBIG;
278 	}
279 	smb_makescred(&scred, td, cred);
280 	error = smb_write(smp->sm_share, np->n_fid, uiop, &scred);
281 	SMBVDEBUG("after: ofs=%d,resid=%d\n",(int)uiop->uio_offset, uiop->uio_resid);
282 	if (!error) {
283 		if (uiop->uio_offset > np->n_size) {
284 			np->n_size = uiop->uio_offset;
285 			vnode_pager_setsize(vp, np->n_size);
286 		}
287 	}
288 	return error;
289 }
290 
291 /*
292  * Do an I/O operation to/from a cache block.
293  */
294 int
295 smbfs_doio(struct buf *bp, struct ucred *cr, struct thread *td)
296 {
297 	struct vnode *vp = bp->b_vp;
298 	struct smbmount *smp = VFSTOSMBFS(vp->v_mount);
299 	struct smbnode *np = VTOSMB(vp);
300 	struct uio uio, *uiop = &uio;
301 	struct iovec io;
302 	struct smb_cred scred;
303 	int error = 0;
304 
305 	uiop->uio_iov = &io;
306 	uiop->uio_iovcnt = 1;
307 	uiop->uio_segflg = UIO_SYSSPACE;
308 	uiop->uio_td = td;
309 
310 	smb_makescred(&scred, td, cr);
311 
312 	if (bp->b_flags & B_READ) {
313 	    io.iov_len = uiop->uio_resid = bp->b_bcount;
314 	    io.iov_base = bp->b_data;
315 	    uiop->uio_rw = UIO_READ;
316 	    switch (vp->v_type) {
317 	      case VREG:
318 		uiop->uio_offset = ((off_t)bp->b_blkno) * DEV_BSIZE;
319 		error = smb_read(smp->sm_share, np->n_fid, uiop, &scred);
320 		if (error)
321 			break;
322 		if (uiop->uio_resid) {
323 			int left = uiop->uio_resid;
324 			int nread = bp->b_bcount - left;
325 			if (left > 0)
326 			    bzero((char *)bp->b_data + nread, left);
327 		}
328 		break;
329 	    default:
330 		printf("smbfs_doio:  type %x unexpected\n",vp->v_type);
331 		break;
332 	    };
333 	    if (error) {
334 		bp->b_error = error;
335 		bp->b_flags |= B_ERROR;
336 	    }
337 	} else { /* write */
338 	    if (((bp->b_blkno * DEV_BSIZE) + bp->b_dirtyend) > np->n_size)
339 		bp->b_dirtyend = np->n_size - (bp->b_blkno * DEV_BSIZE);
340 
341 	    if (bp->b_dirtyend > bp->b_dirtyoff) {
342 		io.iov_len = uiop->uio_resid = bp->b_dirtyend - bp->b_dirtyoff;
343 		uiop->uio_offset = ((off_t)bp->b_blkno) * DEV_BSIZE + bp->b_dirtyoff;
344 		io.iov_base = (char *)bp->b_data + bp->b_dirtyoff;
345 		uiop->uio_rw = UIO_WRITE;
346 		error = smb_write(smp->sm_share, np->n_fid, uiop, &scred);
347 
348 		/*
349 		 * For an interrupted write, the buffer is still valid
350 		 * and the write hasn't been pushed to the server yet,
351 		 * so we can't set BIO_ERROR and report the interruption
352 		 * by setting B_EINTR. For the B_ASYNC case, B_EINTR
353 		 * is not relevant, so the rpc attempt is essentially
354 		 * a noop.  For the case of a V3 write rpc not being
355 		 * committed to stable storage, the block is still
356 		 * dirty and requires either a commit rpc or another
357 		 * write rpc with iomode == NFSV3WRITE_FILESYNC before
358 		 * the block is reused. This is indicated by setting
359 		 * the B_DELWRI and B_NEEDCOMMIT flags.
360 		 */
361     		if (error == EINTR
362 		    || (!error && (bp->b_flags & B_NEEDCOMMIT))) {
363 			int s;
364 
365 			s = splbio();
366 			bp->b_flags &= ~(B_INVAL|B_NOCACHE);
367 			if ((bp->b_flags & B_ASYNC) == 0)
368 			    bp->b_flags |= B_EINTR;
369 			if ((bp->b_flags & B_PAGING) == 0) {
370 			    bdirty(bp);
371 			    bp->b_flags &= ~B_DONE;
372 			}
373 			if ((bp->b_flags & B_ASYNC) == 0)
374 			    bp->b_flags |= B_EINTR;
375 			splx(s);
376 	    	} else {
377 			if (error) {
378 				bp->b_flags |= B_ERROR;
379 				bp->b_error = error;
380 			}
381 			bp->b_dirtyoff = bp->b_dirtyend = 0;
382 		}
383 	    } else {
384 		bp->b_resid = 0;
385 		biodone(bp);
386 		return 0;
387 	    }
388 	}
389 	bp->b_resid = uiop->uio_resid;
390 	biodone(bp);
391 	return error;
392 }
393 
394 /*
395  * Vnode op for VM getpages.
396  * Wish wish .... get rid from multiple IO routines
397  *
398  * smbfs_getpages(struct vnode *a_vp, vm_page_t *a_m, int a_count,
399  *		  int a_reqpage, vm_ooffset_t a_offset)
400  */
401 int
402 smbfs_getpages(struct vop_getpages_args *ap)
403 {
404 #ifdef SMBFS_RWGENERIC
405 	return vnode_pager_generic_getpages(ap->a_vp, ap->a_m, ap->a_count,
406 		ap->a_reqpage);
407 #else
408 	int i, error, nextoff, size, toff, npages, count;
409 	int doclose;
410 	struct uio uio;
411 	struct iovec iov;
412 	vm_offset_t kva;
413 	struct buf *bp;
414 	struct vnode *vp;
415 	struct thread *td = curthread;	/* XXX */
416 	struct ucred *cred;
417 	struct smbmount *smp;
418 	struct smbnode *np;
419 	struct smb_cred scred;
420 	vm_page_t *pages;
421 
422 	KKASSERT(td->td_proc);
423 
424 	vp = ap->a_vp;
425 	cred = td->td_proc->p_ucred;
426 	np = VTOSMB(vp);
427 	smp = VFSTOSMBFS(vp->v_mount);
428 	pages = ap->a_m;
429 	count = ap->a_count;
430 
431 	if (vp->v_object == NULL) {
432 		printf("smbfs_getpages: called with non-merged cache vnode??\n");
433 		return VM_PAGER_ERROR;
434 	}
435 	smb_makescred(&scred, td, cred);
436 
437 	bp = getpbuf(&smbfs_pbuf_freecnt);
438 	npages = btoc(count);
439 	kva = (vm_offset_t) bp->b_data;
440 	pmap_qenter(kva, pages, npages);
441 
442 	iov.iov_base = (caddr_t) kva;
443 	iov.iov_len = count;
444 	uio.uio_iov = &iov;
445 	uio.uio_iovcnt = 1;
446 	uio.uio_offset = IDX_TO_OFF(pages[0]->pindex);
447 	uio.uio_resid = count;
448 	uio.uio_segflg = UIO_SYSSPACE;
449 	uio.uio_rw = UIO_READ;
450 	uio.uio_td = td;
451 
452 	/*
453 	 * This is kinda nasty.  Since smbfs is physically closing the
454 	 * fid on close(), we have to reopen it if necessary.  There are
455 	 * other races here too, such as if another process opens the same
456 	 * file while we are blocked in read. XXX
457 	 */
458 	error = 0;
459 	doclose = 0;
460 	if (np->n_opencount == 0) {
461 		error = smbfs_smb_open(np, SMB_AM_OPENREAD, &scred);
462 		if (error == 0)
463 			doclose = 1;
464 	}
465 	if (error == 0)
466 		error = smb_read(smp->sm_share, np->n_fid, &uio, &scred);
467 	if (doclose)
468 		smbfs_smb_close(smp->sm_share, np->n_fid, NULL, &scred);
469 	pmap_qremove(kva, npages);
470 
471 	relpbuf(bp, &smbfs_pbuf_freecnt);
472 
473 	if (error && (uio.uio_resid == count)) {
474 		printf("smbfs_getpages: error %d\n",error);
475 		for (i = 0; i < npages; i++) {
476 			if (ap->a_reqpage != i)
477 				vnode_pager_freepage(pages[i]);
478 		}
479 		return VM_PAGER_ERROR;
480 	}
481 
482 	size = count - uio.uio_resid;
483 
484 	for (i = 0, toff = 0; i < npages; i++, toff = nextoff) {
485 		vm_page_t m;
486 		nextoff = toff + PAGE_SIZE;
487 		m = pages[i];
488 
489 		m->flags &= ~PG_ZERO;
490 
491 		if (nextoff <= size) {
492 			m->valid = VM_PAGE_BITS_ALL;
493 			m->dirty = 0;
494 		} else {
495 			int nvalid = ((size + DEV_BSIZE - 1) - toff) & ~(DEV_BSIZE - 1);
496 			vm_page_set_validclean(m, 0, nvalid);
497 		}
498 
499 		if (i != ap->a_reqpage) {
500 			/*
501 			 * Whether or not to leave the page activated is up in
502 			 * the air, but we should put the page on a page queue
503 			 * somewhere (it already is in the object).  Result:
504 			 * It appears that emperical results show that
505 			 * deactivating pages is best.
506 			 */
507 
508 			/*
509 			 * Just in case someone was asking for this page we
510 			 * now tell them that it is ok to use.
511 			 */
512 			if (!error) {
513 				if (m->flags & PG_WANTED)
514 					vm_page_activate(m);
515 				else
516 					vm_page_deactivate(m);
517 				vm_page_wakeup(m);
518 			} else {
519 				vnode_pager_freepage(m);
520 			}
521 		}
522 	}
523 	return 0;
524 #endif /* SMBFS_RWGENERIC */
525 }
526 
527 /*
528  * Vnode op for VM putpages.
529  * possible bug: all IO done in sync mode
530  * Note that vop_close always invalidate pages before close, so it's
531  * not necessary to open vnode.
532  *
533  * smbfs_putpages(struct vnode *a_vp, vm_page_t *a_m, int a_count, int a_sync,
534  *		  int *a_rtvals, vm_ooffset_t a_offset)
535  */
536 int
537 smbfs_putpages(struct vop_putpages_args *ap)
538 {
539 	int error;
540 	struct vnode *vp = ap->a_vp;
541 	struct thread *td = curthread;	/* XXX */
542 	struct ucred *cred;
543 
544 #ifdef SMBFS_RWGENERIC
545 	KKASSERT(td->td_proc);
546 	cred = td->td_proc->p_ucred;
547 	VOP_OPEN(vp, FWRITE, cred, NULL, td);
548 	error = vnode_pager_generic_putpages(ap->a_vp, ap->a_m, ap->a_count,
549 		ap->a_sync, ap->a_rtvals);
550 	VOP_CLOSE(vp, FWRITE, cred, td);
551 	return error;
552 #else
553 	struct uio uio;
554 	struct iovec iov;
555 	vm_offset_t kva;
556 	struct buf *bp;
557 	int i, npages, count;
558 	int doclose;
559 	int *rtvals;
560 	struct smbmount *smp;
561 	struct smbnode *np;
562 	struct smb_cred scred;
563 	vm_page_t *pages;
564 
565 	KKASSERT(td->td_proc);
566 	cred = td->td_proc->p_ucred;
567 /*	VOP_OPEN(vp, FWRITE, cred, td);*/
568 	np = VTOSMB(vp);
569 	smp = VFSTOSMBFS(vp->v_mount);
570 	pages = ap->a_m;
571 	count = ap->a_count;
572 	rtvals = ap->a_rtvals;
573 	npages = btoc(count);
574 
575 	for (i = 0; i < npages; i++) {
576 		rtvals[i] = VM_PAGER_AGAIN;
577 	}
578 
579 	bp = getpbuf(&smbfs_pbuf_freecnt);
580 	kva = (vm_offset_t) bp->b_data;
581 	pmap_qenter(kva, pages, npages);
582 
583 	iov.iov_base = (caddr_t) kva;
584 	iov.iov_len = count;
585 	uio.uio_iov = &iov;
586 	uio.uio_iovcnt = 1;
587 	uio.uio_offset = IDX_TO_OFF(pages[0]->pindex);
588 	uio.uio_resid = count;
589 	uio.uio_segflg = UIO_SYSSPACE;
590 	uio.uio_rw = UIO_WRITE;
591 	uio.uio_td = td;
592 	SMBVDEBUG("ofs=%d,resid=%d\n",(int)uio.uio_offset, uio.uio_resid);
593 
594 	smb_makescred(&scred, td, cred);
595 
596 	/*
597 	 * This is kinda nasty.  Since smbfs is physically closing the
598 	 * fid on close(), we have to reopen it if necessary.  There are
599 	 * other races here too, such as if another process opens the same
600 	 * file while we are blocked in read, or the file is open read-only
601 	 * XXX
602 	 */
603 	error = 0;
604 	doclose = 0;
605 	if (np->n_opencount == 0) {
606 		error = smbfs_smb_open(np, SMB_AM_OPENRW, &scred);
607 		if (error == 0)
608 			doclose = 1;
609 	}
610 	if (error == 0)
611 		error = smb_write(smp->sm_share, np->n_fid, &uio, &scred);
612 	if (doclose)
613 		smbfs_smb_close(smp->sm_share, np->n_fid, NULL, &scred);
614 /*	VOP_CLOSE(vp, FWRITE, cred, td);*/
615 	SMBVDEBUG("paged write done: %d\n", error);
616 
617 	pmap_qremove(kva, npages);
618 	relpbuf(bp, &smbfs_pbuf_freecnt);
619 
620 	if (!error) {
621 		int nwritten = round_page(count - uio.uio_resid) / PAGE_SIZE;
622 		for (i = 0; i < nwritten; i++) {
623 			rtvals[i] = VM_PAGER_OK;
624 			pages[i]->dirty = 0;
625 		}
626 	}
627 	return rtvals[0];
628 #endif /* SMBFS_RWGENERIC */
629 }
630 
631 /*
632  * Flush and invalidate all dirty buffers. If another process is already
633  * doing the flush, just wait for completion.
634  */
635 int
636 smbfs_vinvalbuf(struct vnode *vp, int flags, struct thread *td, int intrflg)
637 {
638 	struct smbnode *np = VTOSMB(vp);
639 	int error = 0, slpflag, slptimeo;
640 
641 	if (vp->v_flag & VRECLAIMED)
642 		return 0;
643 	if (intrflg) {
644 		slpflag = PCATCH;
645 		slptimeo = 2 * hz;
646 	} else {
647 		slpflag = 0;
648 		slptimeo = 0;
649 	}
650 	while (np->n_flag & NFLUSHINPROG) {
651 		np->n_flag |= NFLUSHWANT;
652 		error = tsleep((caddr_t)&np->n_flag, 0, "smfsvinv", slptimeo);
653 		error = smb_proc_intr(td);
654 		if (error == EINTR && intrflg)
655 			return EINTR;
656 	}
657 	np->n_flag |= NFLUSHINPROG;
658 	error = vinvalbuf(vp, flags, td, slpflag, 0);
659 	while (error) {
660 		if (intrflg && (error == ERESTART || error == EINTR)) {
661 			np->n_flag &= ~NFLUSHINPROG;
662 			if (np->n_flag & NFLUSHWANT) {
663 				np->n_flag &= ~NFLUSHWANT;
664 				wakeup((caddr_t)&np->n_flag);
665 			}
666 			return EINTR;
667 		}
668 		error = vinvalbuf(vp, flags, td, slpflag, 0);
669 	}
670 	np->n_flag &= ~(NMODIFIED | NFLUSHINPROG);
671 	if (np->n_flag & NFLUSHWANT) {
672 		np->n_flag &= ~NFLUSHWANT;
673 		wakeup((caddr_t)&np->n_flag);
674 	}
675 	return (error);
676 }
677