2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
15 #include <afsconfig.h>
16 #include "afs/param.h"
21 #if !defined(AFS_HPUX_ENV) && !defined(AFS_SGI_ENV) && !defined(AFS_LINUX20_ENV) && !defined(AFS_DARWIN80_ENV)
23 #include "afs/sysincludes.h" /* Standard vendor system headers */
24 #include "afsincludes.h" /* Afs-based standard headers */
25 #include "afs/afs_stats.h" /* statistics */
26 #include "afs/afs_cbqueue.h"
27 #include "afs/nfsclient.h"
28 #include "afs/afs_osidnlc.h"
32 #if defined(AFS_SUN5_ENV) || defined(AFS_OSF_ENV) || defined(AFS_DARWIN_ENV) || defined(AFS_XBSD_ENV)
33 int afs_ustrategy(register struct buf *abp, struct AFS_UCRED *credp)
35 int afs_ustrategy(register struct buf *abp)
38 register afs_int32 code;
40 struct uio *tuiop = &tuio;
41 struct iovec tiovec[1];
42 register struct vcache *tvc = VTOAFS(abp->b_vp);
43 register afs_int32 len = abp->b_bcount;
44 #if !defined(AFS_SUN5_ENV) && !defined(AFS_OSF_ENV) && !defined(AFS_DARWIN_ENV) && !defined(AFS_XBSD_ENV)
48 struct AFS_UCRED *credp = u.u_cred;
52 AFS_STATCNT(afs_ustrategy);
55 * So that it won't change while reading it
57 ObtainReadLock(&tvc->lock);
64 ReleaseReadLock(&tvc->lock);
68 if (abp->b_iocmd == BIO_READ) {
70 if ((abp->b_flags & B_READ) == B_READ) {
72 /* read b_bcount bytes into kernel address b_un.b_addr starting
73 * at byte DEV_BSIZE * b_blkno. Bzero anything we can't read,
74 * and finally call iodone(abp). File is in abp->b_vp. Credentials
77 tuio.afsio_iov = tiovec;
78 tuio.afsio_iovcnt = 1;
79 #if defined(AFS_OSF_ENV) || defined(AFS_SUN5_ENV) || defined(AFS_XBSD_ENV)
80 #ifdef AFS_64BIT_CLIENT
82 tuio.afsio_offset = (afs_offs_t) ldbtob(abp->b_lblkno);
84 tuio.afsio_offset = (afs_offs_t) dbtob(abp->b_blkno);
86 #else /* AFS_64BIT_CLIENT */
87 tuio.afsio_offset = (u_int) dbtob(abp->b_blkno);
88 #endif /* AFS_64BIT_CLIENT */
90 tuio.afsio_offset = DEV_BSIZE * abp->b_blkno;
92 tuio.afsio_seg = AFS_UIOSYS;
96 tuio.afsio_resid = abp->b_bcount;
97 #if defined(AFS_XBSD_ENV)
98 tiovec[0].iov_base = abp->b_saveaddr;
100 tiovec[0].iov_base = abp->b_un.b_addr;
101 #endif /* AFS_XBSD_ENV */
102 tiovec[0].iov_len = abp->b_bcount;
103 /* are user's credentials valid here? probably, but this
104 * sure seems like the wrong things to do. */
105 #if defined(AFS_SUN5_ENV)
106 code = afs_nlrdwr(VTOAFS(abp->b_vp), &tuio, UIO_READ, 0, credp);
108 code = afs_rdwr(VTOAFS(abp->b_vp), &tuio, UIO_READ, 0, credp);
111 if (tuio.afsio_resid > 0)
112 #if defined(AFS_XBSD_ENV)
113 memset(abp->b_saveaddr + abp->b_bcount - tuio.afsio_resid, 0,
116 memset(abp->b_un.b_addr + abp->b_bcount - tuio.afsio_resid, 0,
118 #endif /* AFS_XBSD_ENV */
121 * If we read a block that is past EOF and the user was not storing
122 * to it, go ahead and write protect the page. This way we will detect
123 * storing beyond EOF in the future
125 if (dbtob(abp->b_blkno) + abp->b_bcount > tvc->f.m.Length) {
126 if ((abp->b_flags & B_PFSTORE) == 0) {
128 vm_protectp(tvc->segid, dbtob(abp->b_blkno) / PAGESIZE,
129 abp->b_bcount / PAGESIZE, RDONLY);
136 tuio.afsio_iov = tiovec;
137 tuio.afsio_iovcnt = 1;
138 #if defined(AFS_OSF_ENV) || defined(AFS_SUN5_ENV)
139 #ifdef AFS_64BIT_CLIENT
141 tuio.afsio_offset = (afs_offs_t) ldbtob(abp->b_lblkno);
143 tuio.afsio_offset = (afs_offs_t) dbtob(abp->b_blkno);
145 #else /* AFS_64BIT_CLIENT */
146 tuio.afsio_offset = (u_int) dbtob(abp->b_blkno);
147 #endif /* AFS_64BIT_CLIENT */
150 tuio.uio_limit = curproc->p_fsz_ctl.rlim_cur;
152 tuio.uio_limit = u.u_rlimit[RLIMIT_FSIZE].rlim_cur;
156 tuio.afsio_offset = DEV_BSIZE * abp->b_blkno;
158 tuio.afsio_seg = AFS_UIOSYS;
160 tuio.afsio_fmode = 0;
164 * XXX It this really right? Ideally we should always write block size multiple
165 * and not any arbitrary size, right? XXX
167 len = MIN(len, tvc->f.m.Length - dbtob(abp->b_blkno));
172 (VTOAFS(abp->b_vp))->f.m.Length - dbtob(abp->b_blkno));
173 #endif /* AFS_OSF_ENV */
174 tuio.afsio_resid = len;
175 #if defined(AFS_XBSD_ENV)
176 tiovec[0].iov_base = abp->b_saveaddr;
178 tiovec[0].iov_base = abp->b_un.b_addr;
179 #endif /* AFS_XBSD_ENV */
180 tiovec[0].iov_len = len;
181 /* are user's credentials valid here? probably, but this
182 * sure seems like the wrong things to do. */
183 #if defined(AFS_SUN5_ENV)
184 code = afs_nlrdwr(VTOAFS(abp->b_vp), &tuio, UIO_WRITE, 0, credp);
186 code = afs_rdwr(VTOAFS(abp->b_vp), &tuio, UIO_WRITE, 0, credp);
190 #if defined(AFS_DUX40_ENV) || defined (AFS_XBSD_ENV)
193 #if !defined(AFS_FBSD50_ENV)
194 abp->b_flags |= B_ERROR;
199 #if defined(AFS_AIX32_ENV)
201 #elif defined(AFS_DUX40_ENV)
203 if (code && !(abp->b_flags & B_READ)) {
204 /* prevent ubc from retrying writes */
206 ubc_invalidate(AFSTOV(tvc)->v_object,
207 (vm_offset_t) dbtob(abp->b_blkno), PAGE_SIZE, B_INVAL);
210 #elif defined(AFS_FBSD60_ENV)
211 (*abp->b_iodone)(abp);
212 #elif defined(AFS_FBSD50_ENV)
214 #elif defined(AFS_XBSD_ENV)
216 #elif !defined(AFS_SUN5_ENV)
220 afs_Trace3(afs_iclSetp, CM_TRACE_STRATEGYDONE, ICL_TYPE_POINTER, tvc,
221 ICL_TYPE_INT32, code, ICL_TYPE_LONG, tuio.afsio_resid);
225 #endif /* !AFS_HPUX_ENV && !AFS_SGI_ENV && !AFS_LINUX20_ENV */