git: ee3b3146293c - stable/13 - vnode io: request range-locking when pgcache reads are enabled
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 16 Aug 2023 09:17:32 UTC
The branch stable/13 has been updated by kib:
URL: https://cgit.FreeBSD.org/src/commit/?id=ee3b3146293c0dd2e8a779ebb0a3ee65318e8c3b
commit ee3b3146293c0dd2e8a779ebb0a3ee65318e8c3b
Author: Konstantin Belousov <kib@FreeBSD.org>
AuthorDate: 2023-08-06 01:23:35 +0000
Commit: Konstantin Belousov <kib@FreeBSD.org>
CommitDate: 2023-08-16 09:16:09 +0000
vnode io: request range-locking when pgcache reads are enabled
PR: 272678
(cherry picked from commit 821dec4d56a876db56a82cf1dc54a84905b74f5b)
---
sys/kern/vfs_vnops.c | 20 +++++++++++++-------
1 file changed, 13 insertions(+), 7 deletions(-)
diff --git a/sys/kern/vfs_vnops.c b/sys/kern/vfs_vnops.c
index 8f618a9ad46d..d9bd52c2822e 100644
--- a/sys/kern/vfs_vnops.c
+++ b/sys/kern/vfs_vnops.c
@@ -1442,6 +1442,7 @@ vn_io_fault(struct file *fp, struct uio *uio, struct ucred *active_cred,
void *rl_cookie;
struct vn_io_fault_args args;
int error;
+ bool do_io_fault, do_rangelock;
doio = uio->uio_rw == UIO_READ ? vn_read : vn_write;
vp = fp->f_vnode;
@@ -1463,13 +1464,10 @@ vn_io_fault(struct file *fp, struct uio *uio, struct ucred *active_cred,
return (EISDIR);
}
+ do_io_fault = do_vn_io_fault(vp, uio);
+ do_rangelock = do_io_fault || (vn_irflag_read(vp) & VIRF_PGREAD) != 0;
foffset_lock_uio(fp, uio, flags);
- if (do_vn_io_fault(vp, uio)) {
- args.kind = VN_IO_FAULT_FOP;
- args.args.fop_args.fp = fp;
- args.args.fop_args.doio = doio;
- args.cred = active_cred;
- args.flags = flags | FOF_OFFSET;
+ if (do_rangelock) {
if (uio->uio_rw == UIO_READ) {
rl_cookie = vn_rangelock_rlock(vp, uio->uio_offset,
uio->uio_offset + uio->uio_resid);
@@ -1481,11 +1479,19 @@ vn_io_fault(struct file *fp, struct uio *uio, struct ucred *active_cred,
rl_cookie = vn_rangelock_wlock(vp, uio->uio_offset,
uio->uio_offset + uio->uio_resid);
}
+ }
+ if (do_io_fault) {
+ args.kind = VN_IO_FAULT_FOP;
+ args.args.fop_args.fp = fp;
+ args.args.fop_args.doio = doio;
+ args.cred = active_cred;
+ args.flags = flags | FOF_OFFSET;
error = vn_io_fault1(vp, uio, &args, td);
- vn_rangelock_unlock(vp, rl_cookie);
} else {
error = doio(fp, uio, active_cred, flags | FOF_OFFSET, td);
}
+ if (do_rangelock)
+ vn_rangelock_unlock(vp, rl_cookie);
foffset_unlock_uio(fp, uio, flags);
return (error);
}