Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 03 Sep 2019 14:06:13 -0000
From:      Alan Somers <asomers@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-projects@freebsd.org
Subject:   svn commit: r345892 - in projects/fuse2: sys/fs/fuse tests/sys/fs/fusefs
Message-ID:  <201904042030.x34KUFSw030138@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: asomers
Date: Thu Apr  4 20:30:14 2019
New Revision: 345892
URL: https://svnweb.freebsd.org/changeset/base/345892

Log:
  fusefs: properly handle FOPEN_KEEP_CACHE
  
  If a fuse file system returne FOPEN_KEEP_CACHE in the open or create
  response, then the client is supposed to _not_ clear its caches for that
  file.  I don't know why clearing the caches would be the default given that
  there's a separate flag to bypass the cache altogether, but that's the way
  it is.  fusefs(5) will now honor this flag.
  
  Our behavior is slightly different than Linux's because we reuse file
  handles.  That means that open(2) wont't clear the cache if there's a
  reusable file handle, even if the file server wouldn't have sent
  FOPEN_KEEP_CACHE had we opened a new file handle like Linux does.
  
  PR:		236560
  Sponsored by:	The FreeBSD Foundation

Modified:
  projects/fuse2/sys/fs/fuse/fuse_file.c
  projects/fuse2/sys/fs/fuse/fuse_file.h
  projects/fuse2/sys/fs/fuse/fuse_node.c
  projects/fuse2/sys/fs/fuse/fuse_vnops.c
  projects/fuse2/tests/sys/fs/fusefs/read.cc

Modified: projects/fuse2/sys/fs/fuse/fuse_file.c
==============================================================================
--- projects/fuse2/sys/fs/fuse/fuse_file.c	Thu Apr  4 20:27:13 2019	(r345891)
+++ projects/fuse2/sys/fs/fuse/fuse_file.c	Thu Apr  4 20:30:14 2019	(r345892)
@@ -79,6 +79,7 @@ __FBSDID("$FreeBSD$");
 #include "fuse.h"
 #include "fuse_file.h"
 #include "fuse_internal.h"
+#include "fuse_io.h"
 #include "fuse_ipc.h"
 #include "fuse_node.h"
 
@@ -188,9 +189,7 @@ fuse_filehandle_open(struct vnode *vp, int a_mode,
 	}
 	foo = fdi.answ;
 
-	fuse_filehandle_init(vp, fufh_type, fufhp, td->td_proc->p_pid, cred,
-		foo);
-
+	fuse_filehandle_init(vp, fufh_type, fufhp, td, cred, foo);
 	fuse_vnode_open(vp, foo->open_flags, td);
 
 out:
@@ -322,7 +321,7 @@ fuse_filehandle_getrw(struct vnode *vp, int fflag,
 
 void
 fuse_filehandle_init(struct vnode *vp, fufh_type_t fufh_type,
-    struct fuse_filehandle **fufhp, pid_t pid, struct ucred *cred,
+    struct fuse_filehandle **fufhp, struct thread *td, struct ucred *cred,
     struct fuse_open_out *foo)
 {
 	struct fuse_vnode_data *fvdat = VTOFUD(vp);
@@ -335,7 +334,7 @@ fuse_filehandle_init(struct vnode *vp, fufh_type_t fuf
 	fufh->fufh_type = fufh_type;
 	fufh->gid = cred->cr_rgid;
 	fufh->uid = cred->cr_uid;
-	fufh->pid = pid;
+	fufh->pid = td->td_proc->p_pid;
 	fufh->fuse_open_flags = foo->open_flags;
 	if (!FUFH_IS_VALID(fufh)) {
 		panic("FUSE: init: invalid filehandle id (type=%d)", fufh_type);
@@ -345,4 +344,15 @@ fuse_filehandle_init(struct vnode *vp, fufh_type_t fuf
 		*fufhp = fufh;
 
 	atomic_add_acq_int(&fuse_fh_count, 1);
+
+	if (foo->open_flags & FOPEN_DIRECT_IO) {
+		ASSERT_VOP_ELOCKED(vp, __func__);
+		VTOFUD(vp)->flag |= FN_DIRECTIO;
+		fuse_io_invalbuf(vp, td);
+	} else {
+		if ((foo->open_flags & FOPEN_KEEP_CACHE) == 0)
+			fuse_io_invalbuf(vp, td);
+	        VTOFUD(vp)->flag &= ~FN_DIRECTIO;
+	}
+
 }

Modified: projects/fuse2/sys/fs/fuse/fuse_file.h
==============================================================================
--- projects/fuse2/sys/fs/fuse/fuse_file.h	Thu Apr  4 20:27:13 2019	(r345891)
+++ projects/fuse2/sys/fs/fuse/fuse_file.h	Thu Apr  4 20:30:14 2019	(r345892)
@@ -158,7 +158,7 @@ int fuse_filehandle_getrw(struct vnode *vp, int fflag,
 			  pid_t pid);
 
 void fuse_filehandle_init(struct vnode *vp, fufh_type_t fufh_type,
-		          struct fuse_filehandle **fufhp, pid_t pid,
+		          struct fuse_filehandle **fufhp, struct thread *td,
 			  struct ucred *cred, struct fuse_open_out *foo);
 int fuse_filehandle_open(struct vnode *vp, int mode,
                          struct fuse_filehandle **fufhp, struct thread *td,

Modified: projects/fuse2/sys/fs/fuse/fuse_node.c
==============================================================================
--- projects/fuse2/sys/fs/fuse/fuse_node.c	Thu Apr  4 20:27:13 2019	(r345891)
+++ projects/fuse2/sys/fs/fuse/fuse_node.c	Thu Apr  4 20:30:14 2019	(r345892)
@@ -329,16 +329,6 @@ fuse_vnode_open(struct vnode *vp, int32_t fuse_open_fl
 	 *
 	 * XXXIP: Handle fd based DIRECT_IO
 	 */
-	if (fuse_open_flags & FOPEN_DIRECT_IO) {
-		ASSERT_VOP_ELOCKED(vp, __func__);
-		VTOFUD(vp)->flag |= FN_DIRECTIO;
-		fuse_io_invalbuf(vp, td);
-	} else {
-		if ((fuse_open_flags & FOPEN_KEEP_CACHE) == 0)
-			fuse_io_invalbuf(vp, td);
-	        VTOFUD(vp)->flag &= ~FN_DIRECTIO;
-	}
-
 	if (vnode_vtype(vp) == VREG) {
 		/* XXXIP prevent getattr, by using cached node size */
 		vnode_create_vobject(vp, 0, td);

Modified: projects/fuse2/sys/fs/fuse/fuse_vnops.c
==============================================================================
--- projects/fuse2/sys/fs/fuse/fuse_vnops.c	Thu Apr  4 20:27:13 2019	(r345891)
+++ projects/fuse2/sys/fs/fuse/fuse_vnops.c	Thu Apr  4 20:30:14 2019	(r345892)
@@ -479,8 +479,7 @@ fuse_vnop_create(struct vop_create_args *ap)
 	}
 	ASSERT_VOP_ELOCKED(*vpp, "fuse_vnop_create");
 
-	fuse_filehandle_init(*vpp, FUFH_RDWR, NULL, td->td_proc->p_pid, cred,
-		foo);
+	fuse_filehandle_init(*vpp, FUFH_RDWR, NULL, td, cred, foo);
 	fuse_vnode_open(*vpp, foo->open_flags, td);
 	cache_purge_negative(dvp);
 

Modified: projects/fuse2/tests/sys/fs/fusefs/read.cc
==============================================================================
--- projects/fuse2/tests/sys/fs/fusefs/read.cc	Thu Apr  4 20:27:13 2019	(r345891)
+++ projects/fuse2/tests/sys/fs/fusefs/read.cc	Thu Apr  4 20:30:14 2019	(r345892)
@@ -398,8 +398,7 @@ TEST_F(Read, eio)
  * With the keep_cache option, the kernel may keep its read cache across
  * multiple open(2)s.
  */
-/* https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=236560 */
-TEST_F(Read, DISABLED_keep_cache)
+TEST_F(Read, keep_cache)
 {
 	const char FULLPATH[] = "mountpoint/some_file.txt";
 	const char RELPATH[] = "some_file.txt";
@@ -410,7 +409,7 @@ TEST_F(Read, DISABLED_keep_cache)
 	char buf[bufsize];
 
 	FuseTest::expect_lookup(RELPATH, ino, S_IFREG | 0644, bufsize, 2);
-	expect_open(ino, FOPEN_KEEP_CACHE, 1);
+	expect_open(ino, FOPEN_KEEP_CACHE, 2);
 	expect_getattr(ino, bufsize);
 	expect_read(ino, 0, bufsize, bufsize, CONTENTS);
 
@@ -418,7 +417,7 @@ TEST_F(Read, DISABLED_keep_cache)
 	ASSERT_LE(0, fd0) << strerror(errno);
 	ASSERT_EQ(bufsize, read(fd0, buf, bufsize)) << strerror(errno);
 
-	fd1 = open(FULLPATH, O_RDONLY);
+	fd1 = open(FULLPATH, O_RDWR);
 	ASSERT_LE(0, fd1) << strerror(errno);
 
 	/*
@@ -445,7 +444,7 @@ TEST_F(Read, keep_cache_disabled)
 	char buf[bufsize];
 
 	FuseTest::expect_lookup(RELPATH, ino, S_IFREG | 0644, bufsize, 2);
-	expect_open(ino, FOPEN_KEEP_CACHE, 1);
+	expect_open(ino, 0, 2);
 	expect_getattr(ino, bufsize);
 	expect_read(ino, 0, bufsize, bufsize, CONTENTS);
 
@@ -453,7 +452,7 @@ TEST_F(Read, keep_cache_disabled)
 	ASSERT_LE(0, fd0) << strerror(errno);
 	ASSERT_EQ(bufsize, read(fd0, buf, bufsize)) << strerror(errno);
 
-	fd1 = open(FULLPATH, O_RDONLY);
+	fd1 = open(FULLPATH, O_RDWR);
 	ASSERT_LE(0, fd1) << strerror(errno);
 
 	/*





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201904042030.x34KUFSw030138>