2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 1997 John S. Dyson. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. John S. Dyson's name may not be used to endorse or promote products
12 * derived from this software without specific prior written permission.
14 * DISCLAIMER: This code isn't warranted to do anything useful. Anything
15 * bad that happens because of using this software isn't the responsibility
16 * of the author. This software is distributed AS-IS.
20 * This file contains support for the POSIX 1003.1B AIO/LIO facility.
23 #include <sys/cdefs.h>
24 __FBSDID("$FreeBSD$");
26 #include <sys/param.h>
27 #include <sys/systm.h>
28 #include <sys/malloc.h>
31 #include <sys/capsicum.h>
32 #include <sys/eventhandler.h>
33 #include <sys/sysproto.h>
34 #include <sys/filedesc.h>
35 #include <sys/kernel.h>
36 #include <sys/module.h>
37 #include <sys/kthread.h>
38 #include <sys/fcntl.h>
40 #include <sys/limits.h>
42 #include <sys/mutex.h>
43 #include <sys/unistd.h>
44 #include <sys/posix4.h>
46 #include <sys/resourcevar.h>
47 #include <sys/signalvar.h>
48 #include <sys/syscallsubr.h>
49 #include <sys/protosw.h>
50 #include <sys/rwlock.h>
52 #include <sys/socket.h>
53 #include <sys/socketvar.h>
54 #include <sys/syscall.h>
55 #include <sys/sysent.h>
56 #include <sys/sysctl.h>
57 #include <sys/syslog.h>
59 #include <sys/taskqueue.h>
60 #include <sys/vnode.h>
62 #include <sys/event.h>
63 #include <sys/mount.h>
64 #include <geom/geom.h>
66 #include <machine/atomic.h>
69 #include <vm/vm_page.h>
70 #include <vm/vm_extern.h>
72 #include <vm/vm_map.h>
73 #include <vm/vm_object.h>
78 * Counter for allocating reference ids to new jobs. Wrapped to 1 on
79 * overflow. (XXX will be removed soon.)
81 static u_long jobrefid;
84 * Counter for aio_fsync.
86 static uint64_t jobseqno;
88 #ifndef MAX_AIO_PER_PROC
89 #define MAX_AIO_PER_PROC 32
92 #ifndef MAX_AIO_QUEUE_PER_PROC
93 #define MAX_AIO_QUEUE_PER_PROC 256
97 #define MAX_AIO_QUEUE 1024 /* Bigger than MAX_AIO_QUEUE_PER_PROC */
101 #define MAX_BUF_AIO 16
104 FEATURE(aio, "Asynchronous I/O");
105 SYSCTL_DECL(_p1003_1b);
107 static MALLOC_DEFINE(M_LIO, "lio", "listio aio control block list");
108 static MALLOC_DEFINE(M_AIOS, "aios", "aio_suspend aio control block list");
110 static SYSCTL_NODE(_vfs, OID_AUTO, aio, CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
111 "Async IO management");
113 static int enable_aio_unsafe = 0;
114 SYSCTL_INT(_vfs_aio, OID_AUTO, enable_unsafe, CTLFLAG_RW, &enable_aio_unsafe, 0,
115 "Permit asynchronous IO on all file types, not just known-safe types");
117 static unsigned int unsafe_warningcnt = 1;
118 SYSCTL_UINT(_vfs_aio, OID_AUTO, unsafe_warningcnt, CTLFLAG_RW,
119 &unsafe_warningcnt, 0,
120 "Warnings that will be triggered upon failed IO requests on unsafe files");
122 static int max_aio_procs = MAX_AIO_PROCS;
123 SYSCTL_INT(_vfs_aio, OID_AUTO, max_aio_procs, CTLFLAG_RW, &max_aio_procs, 0,
124 "Maximum number of kernel processes to use for handling async IO ");
126 static int num_aio_procs = 0;
127 SYSCTL_INT(_vfs_aio, OID_AUTO, num_aio_procs, CTLFLAG_RD, &num_aio_procs, 0,
128 "Number of presently active kernel processes for async IO");
131 * The code will adjust the actual number of AIO processes towards this
132 * number when it gets a chance.
134 static int target_aio_procs = TARGET_AIO_PROCS;
135 SYSCTL_INT(_vfs_aio, OID_AUTO, target_aio_procs, CTLFLAG_RW, &target_aio_procs,
137 "Preferred number of ready kernel processes for async IO");
139 static int max_queue_count = MAX_AIO_QUEUE;
140 SYSCTL_INT(_vfs_aio, OID_AUTO, max_aio_queue, CTLFLAG_RW, &max_queue_count, 0,
141 "Maximum number of aio requests to queue, globally");
143 static int num_queue_count = 0;
144 SYSCTL_INT(_vfs_aio, OID_AUTO, num_queue_count, CTLFLAG_RD, &num_queue_count, 0,
145 "Number of queued aio requests");
147 static int num_buf_aio = 0;
148 SYSCTL_INT(_vfs_aio, OID_AUTO, num_buf_aio, CTLFLAG_RD, &num_buf_aio, 0,
149 "Number of aio requests presently handled by the buf subsystem");
151 static int num_unmapped_aio = 0;
152 SYSCTL_INT(_vfs_aio, OID_AUTO, num_unmapped_aio, CTLFLAG_RD, &num_unmapped_aio,
154 "Number of aio requests presently handled by unmapped I/O buffers");
156 /* Number of async I/O processes in the process of being started */
157 /* XXX This should be local to aio_aqueue() */
158 static int num_aio_resv_start = 0;
160 static int aiod_lifetime;
161 SYSCTL_INT(_vfs_aio, OID_AUTO, aiod_lifetime, CTLFLAG_RW, &aiod_lifetime, 0,
162 "Maximum lifetime for idle aiod");
164 static int max_aio_per_proc = MAX_AIO_PER_PROC;
165 SYSCTL_INT(_vfs_aio, OID_AUTO, max_aio_per_proc, CTLFLAG_RW, &max_aio_per_proc,
167 "Maximum active aio requests per process");
169 static int max_aio_queue_per_proc = MAX_AIO_QUEUE_PER_PROC;
170 SYSCTL_INT(_vfs_aio, OID_AUTO, max_aio_queue_per_proc, CTLFLAG_RW,
171 &max_aio_queue_per_proc, 0,
172 "Maximum queued aio requests per process");
174 static int max_buf_aio = MAX_BUF_AIO;
175 SYSCTL_INT(_vfs_aio, OID_AUTO, max_buf_aio, CTLFLAG_RW, &max_buf_aio, 0,
176 "Maximum buf aio requests per process");
179 * Though redundant with vfs.aio.max_aio_queue_per_proc, POSIX requires
180 * sysconf(3) to support AIO_LISTIO_MAX, and we implement that with
181 * vfs.aio.aio_listio_max.
183 SYSCTL_INT(_p1003_1b, CTL_P1003_1B_AIO_LISTIO_MAX, aio_listio_max,
184 CTLFLAG_RD | CTLFLAG_CAPRD, &max_aio_queue_per_proc,
185 0, "Maximum aio requests for a single lio_listio call");
187 #ifdef COMPAT_FREEBSD6
188 typedef struct oaiocb {
189 int aio_fildes; /* File descriptor */
190 off_t aio_offset; /* File offset for I/O */
191 volatile void *aio_buf; /* I/O buffer in process space */
192 size_t aio_nbytes; /* Number of bytes for I/O */
193 struct osigevent aio_sigevent; /* Signal to deliver */
194 int aio_lio_opcode; /* LIO opcode */
195 int aio_reqprio; /* Request priority -- ignored */
196 struct __aiocb_private _aiocb_private;
201 * Below is a key of locks used to protect each member of struct kaiocb
202 * aioliojob and kaioinfo and any backends.
204 * * - need not protected
205 * a - locked by kaioinfo lock
206 * b - locked by backend lock, the backend lock can be null in some cases,
207 * for example, BIO belongs to this type, in this case, proc lock is
209 * c - locked by aio_job_mtx, the lock for the generic file I/O backend.
213 * If the routine that services an AIO request blocks while running in an
214 * AIO kernel process it can starve other I/O requests. BIO requests
215 * queued via aio_qbio() complete asynchronously and do not use AIO kernel
216 * processes at all. Socket I/O requests use a separate pool of
217 * kprocs and also force non-blocking I/O. Other file I/O requests
218 * use the generic fo_read/fo_write operations which can block. The
219 * fsync and mlock operations can also block while executing. Ideally
220 * none of these requests would block while executing.
222 * Note that the service routines cannot toggle O_NONBLOCK in the file
223 * structure directly while handling a request due to races with
228 #define KAIOCB_QUEUEING 0x01
229 #define KAIOCB_CANCELLED 0x02
230 #define KAIOCB_CANCELLING 0x04
231 #define KAIOCB_CHECKSYNC 0x08
232 #define KAIOCB_CLEARED 0x10
233 #define KAIOCB_FINISHED 0x20
238 #define AIOP_FREE 0x1 /* proc on free queue */
241 int aioprocflags; /* (c) AIO proc flags */
242 TAILQ_ENTRY(aioproc) list; /* (c) list of processes */
243 struct proc *aioproc; /* (*) the AIO proc */
247 * data-structure for lio signal management
250 int lioj_flags; /* (a) listio flags */
251 int lioj_count; /* (a) count of jobs */
252 int lioj_finished_count; /* (a) count of finished jobs */
253 struct sigevent lioj_signal; /* (a) signal on all I/O done */
254 TAILQ_ENTRY(aioliojob) lioj_list; /* (a) lio list */
255 struct knlist klist; /* (a) list of knotes */
256 ksiginfo_t lioj_ksi; /* (a) Realtime signal info */
259 #define LIOJ_SIGNAL 0x1 /* signal on all done (lio) */
260 #define LIOJ_SIGNAL_POSTED 0x2 /* signal has been posted */
261 #define LIOJ_KEVENT_POSTED 0x4 /* kevent triggered */
264 * per process aio data structure
267 struct mtx kaio_mtx; /* the lock to protect this struct */
268 int kaio_flags; /* (a) per process kaio flags */
269 int kaio_active_count; /* (c) number of currently used AIOs */
270 int kaio_count; /* (a) size of AIO queue */
271 int kaio_buffer_count; /* (a) number of bio buffers */
272 TAILQ_HEAD(,kaiocb) kaio_all; /* (a) all AIOs in a process */
273 TAILQ_HEAD(,kaiocb) kaio_done; /* (a) done queue for process */
274 TAILQ_HEAD(,aioliojob) kaio_liojoblist; /* (a) list of lio jobs */
275 TAILQ_HEAD(,kaiocb) kaio_jobqueue; /* (a) job queue for process */
276 TAILQ_HEAD(,kaiocb) kaio_syncqueue; /* (a) queue for aio_fsync */
277 TAILQ_HEAD(,kaiocb) kaio_syncready; /* (a) second q for aio_fsync */
278 struct task kaio_task; /* (*) task to kick aio processes */
279 struct task kaio_sync_task; /* (*) task to schedule fsync jobs */
282 #define AIO_LOCK(ki) mtx_lock(&(ki)->kaio_mtx)
283 #define AIO_UNLOCK(ki) mtx_unlock(&(ki)->kaio_mtx)
284 #define AIO_LOCK_ASSERT(ki, f) mtx_assert(&(ki)->kaio_mtx, (f))
285 #define AIO_MTX(ki) (&(ki)->kaio_mtx)
287 #define KAIO_RUNDOWN 0x1 /* process is being run down */
288 #define KAIO_WAKEUP 0x2 /* wakeup process when AIO completes */
291 * Operations used to interact with userland aio control blocks.
292 * Different ABIs provide their own operations.
295 int (*aio_copyin)(struct aiocb *ujob, struct kaiocb *kjob, int ty);
296 long (*fetch_status)(struct aiocb *ujob);
297 long (*fetch_error)(struct aiocb *ujob);
298 int (*store_status)(struct aiocb *ujob, long status);
299 int (*store_error)(struct aiocb *ujob, long error);
300 int (*store_kernelinfo)(struct aiocb *ujob, long jobref);
301 int (*store_aiocb)(struct aiocb **ujobp, struct aiocb *ujob);
304 static TAILQ_HEAD(,aioproc) aio_freeproc; /* (c) Idle daemons */
305 static struct sema aio_newproc_sem;
306 static struct mtx aio_job_mtx;
307 static TAILQ_HEAD(,kaiocb) aio_jobs; /* (c) Async job list */
308 static struct unrhdr *aiod_unr;
310 static void aio_biocleanup(struct bio *bp);
311 void aio_init_aioinfo(struct proc *p);
312 static int aio_onceonly(void);
313 static int aio_free_entry(struct kaiocb *job);
314 static void aio_process_rw(struct kaiocb *job);
315 static void aio_process_sync(struct kaiocb *job);
316 static void aio_process_mlock(struct kaiocb *job);
317 static void aio_schedule_fsync(void *context, int pending);
318 static int aio_newproc(int *);
319 int aio_aqueue(struct thread *td, struct aiocb *ujob,
320 struct aioliojob *lio, int type, struct aiocb_ops *ops);
321 static int aio_queue_file(struct file *fp, struct kaiocb *job);
322 static void aio_biowakeup(struct bio *bp);
323 static void aio_proc_rundown(void *arg, struct proc *p);
324 static void aio_proc_rundown_exec(void *arg, struct proc *p,
325 struct image_params *imgp);
326 static int aio_qbio(struct proc *p, struct kaiocb *job);
327 static void aio_daemon(void *param);
328 static void aio_bio_done_notify(struct proc *userp, struct kaiocb *job);
329 static bool aio_clear_cancel_function_locked(struct kaiocb *job);
330 static int aio_kick(struct proc *userp);
331 static void aio_kick_nowait(struct proc *userp);
332 static void aio_kick_helper(void *context, int pending);
333 static int filt_aioattach(struct knote *kn);
334 static void filt_aiodetach(struct knote *kn);
335 static int filt_aio(struct knote *kn, long hint);
336 static int filt_lioattach(struct knote *kn);
337 static void filt_liodetach(struct knote *kn);
338 static int filt_lio(struct knote *kn, long hint);
342 * kaio Per process async io info
343 * aiop async io process data
344 * aiocb async io jobs
345 * aiolio list io jobs
347 static uma_zone_t kaio_zone, aiop_zone, aiocb_zone, aiolio_zone;
349 /* kqueue filters for aio */
350 static struct filterops aio_filtops = {
352 .f_attach = filt_aioattach,
353 .f_detach = filt_aiodetach,
356 static struct filterops lio_filtops = {
358 .f_attach = filt_lioattach,
359 .f_detach = filt_liodetach,
363 static eventhandler_tag exit_tag, exec_tag;
365 TASKQUEUE_DEFINE_THREAD(aiod_kick);
368 * Main operations function for use as a kernel module.
371 aio_modload(struct module *module, int cmd, void *arg)
388 static moduledata_t aio_mod = {
394 DECLARE_MODULE(aio, aio_mod, SI_SUB_VFS, SI_ORDER_ANY);
395 MODULE_VERSION(aio, 1);
398 * Startup initialization
404 exit_tag = EVENTHANDLER_REGISTER(process_exit, aio_proc_rundown, NULL,
405 EVENTHANDLER_PRI_ANY);
406 exec_tag = EVENTHANDLER_REGISTER(process_exec, aio_proc_rundown_exec,
407 NULL, EVENTHANDLER_PRI_ANY);
408 kqueue_add_filteropts(EVFILT_AIO, &aio_filtops);
409 kqueue_add_filteropts(EVFILT_LIO, &lio_filtops);
410 TAILQ_INIT(&aio_freeproc);
411 sema_init(&aio_newproc_sem, 0, "aio_new_proc");
412 mtx_init(&aio_job_mtx, "aio_job", NULL, MTX_DEF);
413 TAILQ_INIT(&aio_jobs);
414 aiod_unr = new_unrhdr(1, INT_MAX, NULL);
415 kaio_zone = uma_zcreate("AIO", sizeof(struct kaioinfo), NULL, NULL,
416 NULL, NULL, UMA_ALIGN_PTR, UMA_ZONE_NOFREE);
417 aiop_zone = uma_zcreate("AIOP", sizeof(struct aioproc), NULL,
418 NULL, NULL, NULL, UMA_ALIGN_PTR, UMA_ZONE_NOFREE);
419 aiocb_zone = uma_zcreate("AIOCB", sizeof(struct kaiocb), NULL, NULL,
420 NULL, NULL, UMA_ALIGN_PTR, UMA_ZONE_NOFREE);
421 aiolio_zone = uma_zcreate("AIOLIO", sizeof(struct aioliojob), NULL,
422 NULL, NULL, NULL, UMA_ALIGN_PTR, UMA_ZONE_NOFREE);
423 aiod_lifetime = AIOD_LIFETIME_DEFAULT;
425 p31b_setcfg(CTL_P1003_1B_ASYNCHRONOUS_IO, _POSIX_ASYNCHRONOUS_IO);
426 p31b_setcfg(CTL_P1003_1B_AIO_MAX, MAX_AIO_QUEUE);
427 p31b_setcfg(CTL_P1003_1B_AIO_PRIO_DELTA_MAX, 0);
433 * Init the per-process aioinfo structure. The aioinfo limits are set
434 * per-process for user limit (resource) management.
437 aio_init_aioinfo(struct proc *p)
441 ki = uma_zalloc(kaio_zone, M_WAITOK);
442 mtx_init(&ki->kaio_mtx, "aiomtx", NULL, MTX_DEF | MTX_NEW);
444 ki->kaio_active_count = 0;
446 ki->kaio_buffer_count = 0;
447 TAILQ_INIT(&ki->kaio_all);
448 TAILQ_INIT(&ki->kaio_done);
449 TAILQ_INIT(&ki->kaio_jobqueue);
450 TAILQ_INIT(&ki->kaio_liojoblist);
451 TAILQ_INIT(&ki->kaio_syncqueue);
452 TAILQ_INIT(&ki->kaio_syncready);
453 TASK_INIT(&ki->kaio_task, 0, aio_kick_helper, p);
454 TASK_INIT(&ki->kaio_sync_task, 0, aio_schedule_fsync, ki);
456 if (p->p_aioinfo == NULL) {
461 mtx_destroy(&ki->kaio_mtx);
462 uma_zfree(kaio_zone, ki);
465 while (num_aio_procs < MIN(target_aio_procs, max_aio_procs))
470 aio_sendsig(struct proc *p, struct sigevent *sigev, ksiginfo_t *ksi, bool ext)
475 error = sigev_findtd(p, sigev, &td);
479 ksiginfo_set_sigev(ksi, sigev);
480 ksi->ksi_code = SI_ASYNCIO;
481 ksi->ksi_flags |= ext ? (KSI_EXT | KSI_INS) : 0;
482 tdsendsignal(p, td, ksi->ksi_signo, ksi);
489 * Free a job entry. Wait for completion if it is currently active, but don't
490 * delay forever. If we delay, we return a flag that says that we have to
491 * restart the queue scan.
494 aio_free_entry(struct kaiocb *job)
497 struct aioliojob *lj;
505 AIO_LOCK_ASSERT(ki, MA_OWNED);
506 MPASS(job->jobflags & KAIOCB_FINISHED);
508 atomic_subtract_int(&num_queue_count, 1);
511 MPASS(ki->kaio_count >= 0);
513 TAILQ_REMOVE(&ki->kaio_done, job, plist);
514 TAILQ_REMOVE(&ki->kaio_all, job, allist);
519 lj->lioj_finished_count--;
521 if (lj->lioj_count == 0) {
522 TAILQ_REMOVE(&ki->kaio_liojoblist, lj, lioj_list);
523 /* lio is going away, we need to destroy any knotes */
524 knlist_delete(&lj->klist, curthread, 1);
526 sigqueue_take(&lj->lioj_ksi);
528 uma_zfree(aiolio_zone, lj);
532 /* job is going away, we need to destroy any knotes */
533 knlist_delete(&job->klist, curthread, 1);
535 sigqueue_take(&job->ksi);
541 * The thread argument here is used to find the owning process
542 * and is also passed to fo_close() which may pass it to various
543 * places such as devsw close() routines. Because of that, we
544 * need a thread pointer from the process owning the job that is
545 * persistent and won't disappear out from under us or move to
548 * Currently, all the callers of this function call it to remove
549 * a kaiocb from the current process' job list either via a
550 * syscall or due to the current process calling exit() or
551 * execve(). Thus, we know that p == curproc. We also know that
552 * curthread can't exit since we are curthread.
554 * Therefore, we use curthread as the thread to pass to
555 * knlist_delete(). This does mean that it is possible for the
556 * thread pointer at close time to differ from the thread pointer
557 * at open time, but this is already true of file descriptors in
558 * a multithreaded process.
561 fdrop(job->fd_file, curthread);
563 if (job->uiop != &job->uio)
564 free(job->uiop, M_IOV);
565 uma_zfree(aiocb_zone, job);
572 aio_proc_rundown_exec(void *arg, struct proc *p,
573 struct image_params *imgp __unused)
575 aio_proc_rundown(arg, p);
579 aio_cancel_job(struct proc *p, struct kaioinfo *ki, struct kaiocb *job)
581 aio_cancel_fn_t *func;
584 AIO_LOCK_ASSERT(ki, MA_OWNED);
585 if (job->jobflags & (KAIOCB_CANCELLED | KAIOCB_FINISHED))
587 MPASS((job->jobflags & KAIOCB_CANCELLING) == 0);
588 job->jobflags |= KAIOCB_CANCELLED;
590 func = job->cancel_fn;
593 * If there is no cancel routine, just leave the job marked as
594 * cancelled. The job should be in active use by a caller who
595 * should complete it normally or when it fails to install a
602 * Set the CANCELLING flag so that aio_complete() will defer
603 * completions of this job. This prevents the job from being
604 * freed out from under the cancel callback. After the
605 * callback any deferred completion (whether from the callback
606 * or any other source) will be completed.
608 job->jobflags |= KAIOCB_CANCELLING;
612 job->jobflags &= ~KAIOCB_CANCELLING;
613 if (job->jobflags & KAIOCB_FINISHED) {
614 cancelled = job->uaiocb._aiocb_private.error == ECANCELED;
615 TAILQ_REMOVE(&ki->kaio_jobqueue, job, plist);
616 aio_bio_done_notify(p, job);
619 * The cancel callback might have scheduled an
620 * operation to cancel this request, but it is
621 * only counted as cancelled if the request is
622 * cancelled when the callback returns.
630 * Rundown the jobs for a given process.
633 aio_proc_rundown(void *arg, struct proc *p)
636 struct aioliojob *lj;
637 struct kaiocb *job, *jobn;
639 KASSERT(curthread->td_proc == p,
640 ("%s: called on non-curproc", __func__));
646 ki->kaio_flags |= KAIO_RUNDOWN;
651 * Try to cancel all pending requests. This code simulates
652 * aio_cancel on all pending I/O requests.
654 TAILQ_FOREACH_SAFE(job, &ki->kaio_jobqueue, plist, jobn) {
655 aio_cancel_job(p, ki, job);
658 /* Wait for all running I/O to be finished */
659 if (TAILQ_FIRST(&ki->kaio_jobqueue) || ki->kaio_active_count != 0) {
660 ki->kaio_flags |= KAIO_WAKEUP;
661 msleep(&p->p_aioinfo, AIO_MTX(ki), PRIBIO, "aioprn", hz);
665 /* Free all completed I/O requests. */
666 while ((job = TAILQ_FIRST(&ki->kaio_done)) != NULL)
669 while ((lj = TAILQ_FIRST(&ki->kaio_liojoblist)) != NULL) {
670 if (lj->lioj_count == 0) {
671 TAILQ_REMOVE(&ki->kaio_liojoblist, lj, lioj_list);
672 knlist_delete(&lj->klist, curthread, 1);
674 sigqueue_take(&lj->lioj_ksi);
676 uma_zfree(aiolio_zone, lj);
678 panic("LIO job not cleaned up: C:%d, FC:%d\n",
679 lj->lioj_count, lj->lioj_finished_count);
683 taskqueue_drain(taskqueue_aiod_kick, &ki->kaio_task);
684 taskqueue_drain(taskqueue_aiod_kick, &ki->kaio_sync_task);
685 mtx_destroy(&ki->kaio_mtx);
686 uma_zfree(kaio_zone, ki);
691 * Select a job to run (called by an AIO daemon).
693 static struct kaiocb *
694 aio_selectjob(struct aioproc *aiop)
700 mtx_assert(&aio_job_mtx, MA_OWNED);
702 TAILQ_FOREACH(job, &aio_jobs, list) {
703 userp = job->userproc;
704 ki = userp->p_aioinfo;
706 if (ki->kaio_active_count < max_aio_per_proc) {
707 TAILQ_REMOVE(&aio_jobs, job, list);
708 if (!aio_clear_cancel_function(job))
711 /* Account for currently active jobs. */
712 ki->kaio_active_count++;
720 * Move all data to a permanent storage device. This code
721 * simulates the fsync and fdatasync syscalls.
724 aio_fsync_vnode(struct thread *td, struct vnode *vp, int op)
731 error = vn_start_write(vp, &mp, V_WAIT | PCATCH);
734 vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
737 VM_OBJECT_WLOCK(obj);
738 vm_object_page_clean(obj, 0, 0, 0);
739 VM_OBJECT_WUNLOCK(obj);
742 error = VOP_FDATASYNC(vp, td);
744 error = VOP_FSYNC(vp, MNT_WAIT, td);
747 vn_finished_write(mp);
748 if (error != ERELOOKUP)
755 * The AIO processing activity for LIO_READ/LIO_WRITE. This is the code that
756 * does the I/O request for the non-bio version of the operations. The normal
757 * vn operations are used, and this code should work in all instances for every
758 * type of file, including pipes, sockets, fifos, and regular files.
760 * XXX I don't think it works well for socket, pipe, and fifo.
763 aio_process_rw(struct kaiocb *job)
765 struct ucred *td_savedcred;
770 long msgsnd_st, msgsnd_end;
771 long msgrcv_st, msgrcv_end;
772 long oublock_st, oublock_end;
773 long inblock_st, inblock_end;
776 KASSERT(job->uaiocb.aio_lio_opcode == LIO_READ ||
777 job->uaiocb.aio_lio_opcode == LIO_READV ||
778 job->uaiocb.aio_lio_opcode == LIO_WRITE ||
779 job->uaiocb.aio_lio_opcode == LIO_WRITEV,
780 ("%s: opcode %d", __func__, job->uaiocb.aio_lio_opcode));
782 aio_switch_vmspace(job);
784 td_savedcred = td->td_ucred;
785 td->td_ucred = job->cred;
786 job->uiop->uio_td = td;
790 opcode = job->uaiocb.aio_lio_opcode;
791 cnt = job->uiop->uio_resid;
793 msgrcv_st = td->td_ru.ru_msgrcv;
794 msgsnd_st = td->td_ru.ru_msgsnd;
795 inblock_st = td->td_ru.ru_inblock;
796 oublock_st = td->td_ru.ru_oublock;
799 * aio_aqueue() acquires a reference to the file that is
800 * released in aio_free_entry().
802 if (opcode == LIO_READ || opcode == LIO_READV) {
803 if (job->uiop->uio_resid == 0)
806 error = fo_read(fp, job->uiop, fp->f_cred, FOF_OFFSET,
809 if (fp->f_type == DTYPE_VNODE)
811 error = fo_write(fp, job->uiop, fp->f_cred, FOF_OFFSET, td);
813 msgrcv_end = td->td_ru.ru_msgrcv;
814 msgsnd_end = td->td_ru.ru_msgsnd;
815 inblock_end = td->td_ru.ru_inblock;
816 oublock_end = td->td_ru.ru_oublock;
818 job->msgrcv = msgrcv_end - msgrcv_st;
819 job->msgsnd = msgsnd_end - msgsnd_st;
820 job->inblock = inblock_end - inblock_st;
821 job->outblock = oublock_end - oublock_st;
823 if (error != 0 && job->uiop->uio_resid != cnt) {
824 if (error == ERESTART || error == EINTR || error == EWOULDBLOCK)
826 if (error == EPIPE && (opcode & LIO_WRITE)) {
827 PROC_LOCK(job->userproc);
828 kern_psignal(job->userproc, SIGPIPE);
829 PROC_UNLOCK(job->userproc);
833 cnt -= job->uiop->uio_resid;
834 td->td_ucred = td_savedcred;
836 aio_complete(job, -1, error);
838 aio_complete(job, cnt, 0);
842 aio_process_sync(struct kaiocb *job)
844 struct thread *td = curthread;
845 struct ucred *td_savedcred = td->td_ucred;
846 struct file *fp = job->fd_file;
849 KASSERT(job->uaiocb.aio_lio_opcode & LIO_SYNC,
850 ("%s: opcode %d", __func__, job->uaiocb.aio_lio_opcode));
852 td->td_ucred = job->cred;
853 if (fp->f_vnode != NULL) {
854 error = aio_fsync_vnode(td, fp->f_vnode,
855 job->uaiocb.aio_lio_opcode);
857 td->td_ucred = td_savedcred;
859 aio_complete(job, -1, error);
861 aio_complete(job, 0, 0);
865 aio_process_mlock(struct kaiocb *job)
867 struct aiocb *cb = &job->uaiocb;
870 KASSERT(job->uaiocb.aio_lio_opcode == LIO_MLOCK,
871 ("%s: opcode %d", __func__, job->uaiocb.aio_lio_opcode));
873 aio_switch_vmspace(job);
874 error = kern_mlock(job->userproc, job->cred,
875 __DEVOLATILE(uintptr_t, cb->aio_buf), cb->aio_nbytes);
876 aio_complete(job, error != 0 ? -1 : 0, error);
880 aio_bio_done_notify(struct proc *userp, struct kaiocb *job)
882 struct aioliojob *lj;
884 struct kaiocb *sjob, *sjobn;
888 ki = userp->p_aioinfo;
889 AIO_LOCK_ASSERT(ki, MA_OWNED);
893 lj->lioj_finished_count++;
894 if (lj->lioj_count == lj->lioj_finished_count)
897 TAILQ_INSERT_TAIL(&ki->kaio_done, job, plist);
898 MPASS(job->jobflags & KAIOCB_FINISHED);
900 if (ki->kaio_flags & KAIO_RUNDOWN)
901 goto notification_done;
903 if (job->uaiocb.aio_sigevent.sigev_notify == SIGEV_SIGNAL ||
904 job->uaiocb.aio_sigevent.sigev_notify == SIGEV_THREAD_ID)
905 aio_sendsig(userp, &job->uaiocb.aio_sigevent, &job->ksi, true);
907 KNOTE_LOCKED(&job->klist, 1);
910 if (lj->lioj_signal.sigev_notify == SIGEV_KEVENT) {
911 lj->lioj_flags |= LIOJ_KEVENT_POSTED;
912 KNOTE_LOCKED(&lj->klist, 1);
914 if ((lj->lioj_flags & (LIOJ_SIGNAL | LIOJ_SIGNAL_POSTED))
916 (lj->lioj_signal.sigev_notify == SIGEV_SIGNAL ||
917 lj->lioj_signal.sigev_notify == SIGEV_THREAD_ID)) {
918 aio_sendsig(userp, &lj->lioj_signal, &lj->lioj_ksi,
920 lj->lioj_flags |= LIOJ_SIGNAL_POSTED;
925 if (job->jobflags & KAIOCB_CHECKSYNC) {
926 schedule_fsync = false;
927 TAILQ_FOREACH_SAFE(sjob, &ki->kaio_syncqueue, list, sjobn) {
928 if (job->fd_file != sjob->fd_file ||
929 job->seqno >= sjob->seqno)
931 if (--sjob->pending > 0)
933 TAILQ_REMOVE(&ki->kaio_syncqueue, sjob, list);
934 if (!aio_clear_cancel_function_locked(sjob))
936 TAILQ_INSERT_TAIL(&ki->kaio_syncready, sjob, list);
937 schedule_fsync = true;
940 taskqueue_enqueue(taskqueue_aiod_kick,
941 &ki->kaio_sync_task);
943 if (ki->kaio_flags & KAIO_WAKEUP) {
944 ki->kaio_flags &= ~KAIO_WAKEUP;
945 wakeup(&userp->p_aioinfo);
950 aio_schedule_fsync(void *context, int pending)
957 while (!TAILQ_EMPTY(&ki->kaio_syncready)) {
958 job = TAILQ_FIRST(&ki->kaio_syncready);
959 TAILQ_REMOVE(&ki->kaio_syncready, job, list);
961 aio_schedule(job, aio_process_sync);
968 aio_cancel_cleared(struct kaiocb *job)
972 * The caller should hold the same queue lock held when
973 * aio_clear_cancel_function() was called and set this flag
974 * ensuring this check sees an up-to-date value. However,
975 * there is no way to assert that.
977 return ((job->jobflags & KAIOCB_CLEARED) != 0);
981 aio_clear_cancel_function_locked(struct kaiocb *job)
984 AIO_LOCK_ASSERT(job->userproc->p_aioinfo, MA_OWNED);
985 MPASS(job->cancel_fn != NULL);
986 if (job->jobflags & KAIOCB_CANCELLING) {
987 job->jobflags |= KAIOCB_CLEARED;
990 job->cancel_fn = NULL;
995 aio_clear_cancel_function(struct kaiocb *job)
1000 ki = job->userproc->p_aioinfo;
1002 ret = aio_clear_cancel_function_locked(job);
1008 aio_set_cancel_function_locked(struct kaiocb *job, aio_cancel_fn_t *func)
1011 AIO_LOCK_ASSERT(job->userproc->p_aioinfo, MA_OWNED);
1012 if (job->jobflags & KAIOCB_CANCELLED)
1014 job->cancel_fn = func;
1019 aio_set_cancel_function(struct kaiocb *job, aio_cancel_fn_t *func)
1021 struct kaioinfo *ki;
1024 ki = job->userproc->p_aioinfo;
1026 ret = aio_set_cancel_function_locked(job, func);
1032 aio_complete(struct kaiocb *job, long status, int error)
1034 struct kaioinfo *ki;
1037 job->uaiocb._aiocb_private.error = error;
1038 job->uaiocb._aiocb_private.status = status;
1040 userp = job->userproc;
1041 ki = userp->p_aioinfo;
1044 KASSERT(!(job->jobflags & KAIOCB_FINISHED),
1045 ("duplicate aio_complete"));
1046 job->jobflags |= KAIOCB_FINISHED;
1047 if ((job->jobflags & (KAIOCB_QUEUEING | KAIOCB_CANCELLING)) == 0) {
1048 TAILQ_REMOVE(&ki->kaio_jobqueue, job, plist);
1049 aio_bio_done_notify(userp, job);
1055 aio_cancel(struct kaiocb *job)
1058 aio_complete(job, -1, ECANCELED);
1062 aio_switch_vmspace(struct kaiocb *job)
1065 vmspace_switch_aio(job->userproc->p_vmspace);
1069 * The AIO daemon, most of the actual work is done in aio_process_*,
1070 * but the setup (and address space mgmt) is done in this routine.
1073 aio_daemon(void *_id)
1076 struct aioproc *aiop;
1077 struct kaioinfo *ki;
1079 struct vmspace *myvm;
1080 struct thread *td = curthread;
1081 int id = (intptr_t)_id;
1084 * Grab an extra reference on the daemon's vmspace so that it
1085 * doesn't get freed by jobs that switch to a different
1089 myvm = vmspace_acquire_ref(p);
1091 KASSERT(p->p_textvp == NULL, ("kthread has a textvp"));
1094 * Allocate and ready the aio control info. There is one aiop structure
1097 aiop = uma_zalloc(aiop_zone, M_WAITOK);
1099 aiop->aioprocflags = 0;
1102 * Wakeup parent process. (Parent sleeps to keep from blasting away
1103 * and creating too many daemons.)
1105 sema_post(&aio_newproc_sem);
1107 mtx_lock(&aio_job_mtx);
1110 * Take daemon off of free queue
1112 if (aiop->aioprocflags & AIOP_FREE) {
1113 TAILQ_REMOVE(&aio_freeproc, aiop, list);
1114 aiop->aioprocflags &= ~AIOP_FREE;
1120 while ((job = aio_selectjob(aiop)) != NULL) {
1121 mtx_unlock(&aio_job_mtx);
1123 ki = job->userproc->p_aioinfo;
1124 job->handle_fn(job);
1126 mtx_lock(&aio_job_mtx);
1127 /* Decrement the active job count. */
1128 ki->kaio_active_count--;
1132 * Disconnect from user address space.
1134 if (p->p_vmspace != myvm) {
1135 mtx_unlock(&aio_job_mtx);
1136 vmspace_switch_aio(myvm);
1137 mtx_lock(&aio_job_mtx);
1139 * We have to restart to avoid race, we only sleep if
1140 * no job can be selected.
1145 mtx_assert(&aio_job_mtx, MA_OWNED);
1147 TAILQ_INSERT_HEAD(&aio_freeproc, aiop, list);
1148 aiop->aioprocflags |= AIOP_FREE;
1151 * If daemon is inactive for a long time, allow it to exit,
1152 * thereby freeing resources.
1154 if (msleep(p, &aio_job_mtx, PRIBIO, "aiordy",
1155 aiod_lifetime) == EWOULDBLOCK && TAILQ_EMPTY(&aio_jobs) &&
1156 (aiop->aioprocflags & AIOP_FREE) &&
1157 num_aio_procs > target_aio_procs)
1160 TAILQ_REMOVE(&aio_freeproc, aiop, list);
1162 mtx_unlock(&aio_job_mtx);
1163 uma_zfree(aiop_zone, aiop);
1164 free_unr(aiod_unr, id);
1167 KASSERT(p->p_vmspace == myvm,
1168 ("AIOD: bad vmspace for exiting daemon"));
1169 KASSERT(refcount_load(&myvm->vm_refcnt) > 1,
1170 ("AIOD: bad vm refcnt for exiting daemon: %d",
1171 refcount_load(&myvm->vm_refcnt)));
1176 * Create a new AIO daemon. This is mostly a kernel-thread fork routine. The
1177 * AIO daemon modifies its environment itself.
1180 aio_newproc(int *start)
1186 id = alloc_unr(aiod_unr);
1187 error = kproc_create(aio_daemon, (void *)(intptr_t)id, &p,
1188 RFNOWAIT, 0, "aiod%d", id);
1191 * Wait until daemon is started.
1193 sema_wait(&aio_newproc_sem);
1194 mtx_lock(&aio_job_mtx);
1198 mtx_unlock(&aio_job_mtx);
1200 free_unr(aiod_unr, id);
1206 * Try the high-performance, low-overhead bio method for eligible
1207 * VCHR devices. This method doesn't use an aio helper thread, and
1208 * thus has very low overhead.
1210 * Assumes that the caller, aio_aqueue(), has incremented the file
1211 * structure's reference count, preventing its deallocation for the
1212 * duration of this call.
1215 aio_qbio(struct proc *p, struct kaiocb *job)
1223 struct kaioinfo *ki;
1224 struct bio **bios = NULL;
1226 int bio_cmd, error, i, iovcnt, opcode, poff, ref;
1232 opcode = cb->aio_lio_opcode;
1234 if (!(opcode == LIO_WRITE || opcode == LIO_WRITEV ||
1235 opcode == LIO_READ || opcode == LIO_READV))
1237 if (fp == NULL || fp->f_type != DTYPE_VNODE)
1241 if (vp->v_type != VCHR)
1243 if (vp->v_bufobj.bo_bsize == 0)
1246 bio_cmd = (opcode & LIO_WRITE) ? BIO_WRITE : BIO_READ;
1247 iovcnt = job->uiop->uio_iovcnt;
1248 if (iovcnt > max_buf_aio)
1250 for (i = 0; i < iovcnt; i++) {
1251 if (job->uiop->uio_iov[i].iov_len % vp->v_bufobj.bo_bsize != 0)
1253 if (job->uiop->uio_iov[i].iov_len > maxphys) {
1258 offset = cb->aio_offset;
1261 csw = devvn_refthread(vp, &dev, &ref);
1265 if ((csw->d_flags & D_DISK) == 0) {
1269 if (job->uiop->uio_resid > dev->si_iosize_max) {
1277 use_unmapped = (dev->si_flags & SI_UNMAPPED) && unmapped_buf_allowed;
1278 if (!use_unmapped) {
1280 if (ki->kaio_buffer_count + iovcnt > max_buf_aio) {
1285 ki->kaio_buffer_count += iovcnt;
1289 bios = malloc(sizeof(struct bio *) * iovcnt, M_TEMP, M_WAITOK);
1290 atomic_store_int(&job->nbio, iovcnt);
1291 for (i = 0; i < iovcnt; i++) {
1292 struct vm_page** pages;
1298 buf = job->uiop->uio_iov[i].iov_base;
1299 nbytes = job->uiop->uio_iov[i].iov_len;
1301 bios[i] = g_alloc_bio();
1304 poff = (vm_offset_t)buf & PAGE_MASK;
1307 pages = malloc(sizeof(vm_page_t) * (atop(round_page(
1308 nbytes)) + 1), M_TEMP, M_WAITOK | M_ZERO);
1310 pbuf = uma_zalloc(pbuf_zone, M_WAITOK);
1312 pages = pbuf->b_pages;
1315 bp->bio_length = nbytes;
1316 bp->bio_bcount = nbytes;
1317 bp->bio_done = aio_biowakeup;
1318 bp->bio_offset = offset;
1319 bp->bio_cmd = bio_cmd;
1321 bp->bio_caller1 = job;
1322 bp->bio_caller2 = pbuf;
1324 prot = VM_PROT_READ;
1325 if (opcode == LIO_READ || opcode == LIO_READV)
1326 prot |= VM_PROT_WRITE; /* Less backwards than it looks */
1327 npages = vm_fault_quick_hold_pages(&curproc->p_vmspace->vm_map,
1328 (vm_offset_t)buf, bp->bio_length, prot, pages,
1332 uma_zfree(pbuf_zone, pbuf);
1334 free(pages, M_TEMP);
1341 pmap_qenter((vm_offset_t)pbuf->b_data, pages, npages);
1342 bp->bio_data = pbuf->b_data + poff;
1343 pbuf->b_npages = npages;
1344 atomic_add_int(&num_buf_aio, 1);
1347 bp->bio_ma_n = npages;
1348 bp->bio_ma_offset = poff;
1349 bp->bio_data = unmapped_buf;
1350 bp->bio_flags |= BIO_UNMAPPED;
1351 atomic_add_int(&num_unmapped_aio, 1);
1357 /* Perform transfer. */
1358 for (i = 0; i < iovcnt; i++)
1359 csw->d_strategy(bios[i]);
1362 dev_relthread(dev, ref);
1367 aio_biocleanup(bios[i]);
1370 dev_relthread(dev, ref);
1374 #ifdef COMPAT_FREEBSD6
1376 convert_old_sigevent(struct osigevent *osig, struct sigevent *nsig)
1380 * Only SIGEV_NONE, SIGEV_SIGNAL, and SIGEV_KEVENT are
1381 * supported by AIO with the old sigevent structure.
1383 nsig->sigev_notify = osig->sigev_notify;
1384 switch (nsig->sigev_notify) {
1388 nsig->sigev_signo = osig->__sigev_u.__sigev_signo;
1391 nsig->sigev_notify_kqueue =
1392 osig->__sigev_u.__sigev_notify_kqueue;
1393 nsig->sigev_value.sival_ptr = osig->sigev_value.sival_ptr;
1402 aiocb_copyin_old_sigevent(struct aiocb *ujob, struct kaiocb *kjob,
1405 struct oaiocb *ojob;
1406 struct aiocb *kcb = &kjob->uaiocb;
1409 bzero(kcb, sizeof(struct aiocb));
1410 error = copyin(ujob, kcb, sizeof(struct oaiocb));
1413 /* No need to copyin aio_iov, because it did not exist in FreeBSD 6 */
1414 ojob = (struct oaiocb *)kcb;
1415 return (convert_old_sigevent(&ojob->aio_sigevent, &kcb->aio_sigevent));
1420 aiocb_copyin(struct aiocb *ujob, struct kaiocb *kjob, int type)
1422 struct aiocb *kcb = &kjob->uaiocb;
1425 error = copyin(ujob, kcb, sizeof(struct aiocb));
1428 if (type == LIO_NOP)
1429 type = kcb->aio_lio_opcode;
1430 if (type & LIO_VECTORED) {
1431 /* malloc a uio and copy in the iovec */
1432 error = copyinuio(__DEVOLATILE(struct iovec*, kcb->aio_iov),
1433 kcb->aio_iovcnt, &kjob->uiop);
1440 aiocb_fetch_status(struct aiocb *ujob)
1443 return (fuword(&ujob->_aiocb_private.status));
1447 aiocb_fetch_error(struct aiocb *ujob)
1450 return (fuword(&ujob->_aiocb_private.error));
1454 aiocb_store_status(struct aiocb *ujob, long status)
1457 return (suword(&ujob->_aiocb_private.status, status));
1461 aiocb_store_error(struct aiocb *ujob, long error)
1464 return (suword(&ujob->_aiocb_private.error, error));
1468 aiocb_store_kernelinfo(struct aiocb *ujob, long jobref)
1471 return (suword(&ujob->_aiocb_private.kernelinfo, jobref));
1475 aiocb_store_aiocb(struct aiocb **ujobp, struct aiocb *ujob)
1478 return (suword(ujobp, (long)ujob));
1481 static struct aiocb_ops aiocb_ops = {
1482 .aio_copyin = aiocb_copyin,
1483 .fetch_status = aiocb_fetch_status,
1484 .fetch_error = aiocb_fetch_error,
1485 .store_status = aiocb_store_status,
1486 .store_error = aiocb_store_error,
1487 .store_kernelinfo = aiocb_store_kernelinfo,
1488 .store_aiocb = aiocb_store_aiocb,
1491 #ifdef COMPAT_FREEBSD6
1492 static struct aiocb_ops aiocb_ops_osigevent = {
1493 .aio_copyin = aiocb_copyin_old_sigevent,
1494 .fetch_status = aiocb_fetch_status,
1495 .fetch_error = aiocb_fetch_error,
1496 .store_status = aiocb_store_status,
1497 .store_error = aiocb_store_error,
1498 .store_kernelinfo = aiocb_store_kernelinfo,
1499 .store_aiocb = aiocb_store_aiocb,
1504 * Queue a new AIO request. Choosing either the threaded or direct bio VCHR
1505 * technique is done in this code.
1508 aio_aqueue(struct thread *td, struct aiocb *ujob, struct aioliojob *lj,
1509 int type, struct aiocb_ops *ops)
1511 struct proc *p = td->td_proc;
1512 struct file *fp = NULL;
1514 struct kaioinfo *ki;
1522 if (p->p_aioinfo == NULL)
1523 aio_init_aioinfo(p);
1527 ops->store_status(ujob, -1);
1528 ops->store_error(ujob, 0);
1529 ops->store_kernelinfo(ujob, -1);
1531 if (num_queue_count >= max_queue_count ||
1532 ki->kaio_count >= max_aio_queue_per_proc) {
1537 job = uma_zalloc(aiocb_zone, M_WAITOK | M_ZERO);
1538 knlist_init_mtx(&job->klist, AIO_MTX(ki));
1540 error = ops->aio_copyin(ujob, job, type);
1544 if (job->uaiocb.aio_nbytes > IOSIZE_MAX) {
1549 if (job->uaiocb.aio_sigevent.sigev_notify != SIGEV_KEVENT &&
1550 job->uaiocb.aio_sigevent.sigev_notify != SIGEV_SIGNAL &&
1551 job->uaiocb.aio_sigevent.sigev_notify != SIGEV_THREAD_ID &&
1552 job->uaiocb.aio_sigevent.sigev_notify != SIGEV_NONE) {
1557 if ((job->uaiocb.aio_sigevent.sigev_notify == SIGEV_SIGNAL ||
1558 job->uaiocb.aio_sigevent.sigev_notify == SIGEV_THREAD_ID) &&
1559 !_SIG_VALID(job->uaiocb.aio_sigevent.sigev_signo)) {
1564 /* Get the opcode. */
1565 if (type == LIO_NOP) {
1566 switch (job->uaiocb.aio_lio_opcode) {
1572 opcode = job->uaiocb.aio_lio_opcode;
1579 opcode = job->uaiocb.aio_lio_opcode = type;
1581 ksiginfo_init(&job->ksi);
1583 /* Save userspace address of the job info. */
1587 * Validate the opcode and fetch the file object for the specified
1590 * XXXRW: Moved the opcode validation up here so that we don't
1591 * retrieve a file descriptor without knowing what the capabiltity
1594 fd = job->uaiocb.aio_fildes;
1598 error = fget_write(td, fd, &cap_pwrite_rights, &fp);
1602 error = fget_read(td, fd, &cap_pread_rights, &fp);
1606 error = fget(td, fd, &cap_fsync_rights, &fp);
1611 error = fget(td, fd, &cap_no_rights, &fp);
1619 if ((opcode & LIO_SYNC) && fp->f_vnode == NULL) {
1624 if ((opcode == LIO_READ || opcode == LIO_READV ||
1625 opcode == LIO_WRITE || opcode == LIO_WRITEV) &&
1626 job->uaiocb.aio_offset < 0 &&
1627 (fp->f_vnode == NULL || fp->f_vnode->v_type != VCHR)) {
1632 if (fp != NULL && fp->f_ops == &path_fileops) {
1639 mtx_lock(&aio_job_mtx);
1641 job->seqno = jobseqno++;
1642 mtx_unlock(&aio_job_mtx);
1643 error = ops->store_kernelinfo(ujob, jid);
1648 job->uaiocb._aiocb_private.kernelinfo = (void *)(intptr_t)jid;
1650 if (opcode == LIO_NOP) {
1652 MPASS(job->uiop == &job->uio || job->uiop == NULL);
1653 uma_zfree(aiocb_zone, job);
1657 if (job->uaiocb.aio_sigevent.sigev_notify != SIGEV_KEVENT)
1659 evflags = job->uaiocb.aio_sigevent.sigev_notify_kevent_flags;
1660 if ((evflags & ~(EV_CLEAR | EV_DISPATCH | EV_ONESHOT)) != 0) {
1664 kqfd = job->uaiocb.aio_sigevent.sigev_notify_kqueue;
1665 memset(&kev, 0, sizeof(kev));
1666 kev.ident = (uintptr_t)job->ujob;
1667 kev.filter = EVFILT_AIO;
1668 kev.flags = EV_ADD | EV_ENABLE | EV_FLAG1 | evflags;
1669 kev.data = (intptr_t)job;
1670 kev.udata = job->uaiocb.aio_sigevent.sigev_value.sival_ptr;
1671 error = kqfd_register(kqfd, &kev, td, M_WAITOK);
1677 ops->store_error(ujob, EINPROGRESS);
1678 job->uaiocb._aiocb_private.error = EINPROGRESS;
1680 job->cred = crhold(td->td_ucred);
1681 job->jobflags = KAIOCB_QUEUEING;
1684 if (opcode & LIO_VECTORED) {
1685 /* Use the uio copied in by aio_copyin */
1686 MPASS(job->uiop != &job->uio && job->uiop != NULL);
1688 /* Setup the inline uio */
1689 job->iov[0].iov_base = (void *)(uintptr_t)job->uaiocb.aio_buf;
1690 job->iov[0].iov_len = job->uaiocb.aio_nbytes;
1691 job->uio.uio_iov = job->iov;
1692 job->uio.uio_iovcnt = 1;
1693 job->uio.uio_resid = job->uaiocb.aio_nbytes;
1694 job->uio.uio_segflg = UIO_USERSPACE;
1695 job->uiop = &job->uio;
1697 switch (opcode & (LIO_READ | LIO_WRITE)) {
1699 job->uiop->uio_rw = UIO_READ;
1702 job->uiop->uio_rw = UIO_WRITE;
1705 job->uiop->uio_offset = job->uaiocb.aio_offset;
1706 job->uiop->uio_td = td;
1708 if (opcode == LIO_MLOCK) {
1709 aio_schedule(job, aio_process_mlock);
1711 } else if (fp->f_ops->fo_aio_queue == NULL)
1712 error = aio_queue_file(fp, job);
1714 error = fo_aio_queue(fp, job);
1719 job->jobflags &= ~KAIOCB_QUEUEING;
1720 TAILQ_INSERT_TAIL(&ki->kaio_all, job, allist);
1724 atomic_add_int(&num_queue_count, 1);
1725 if (job->jobflags & KAIOCB_FINISHED) {
1727 * The queue callback completed the request synchronously.
1728 * The bulk of the completion is deferred in that case
1731 aio_bio_done_notify(p, job);
1733 TAILQ_INSERT_TAIL(&ki->kaio_jobqueue, job, plist);
1742 knlist_delete(&job->klist, curthread, 0);
1744 if (job->uiop != &job->uio)
1745 free(job->uiop, M_IOV);
1746 uma_zfree(aiocb_zone, job);
1748 ops->store_error(ujob, error);
1753 aio_cancel_daemon_job(struct kaiocb *job)
1756 mtx_lock(&aio_job_mtx);
1757 if (!aio_cancel_cleared(job))
1758 TAILQ_REMOVE(&aio_jobs, job, list);
1759 mtx_unlock(&aio_job_mtx);
1764 aio_schedule(struct kaiocb *job, aio_handle_fn_t *func)
1767 mtx_lock(&aio_job_mtx);
1768 if (!aio_set_cancel_function(job, aio_cancel_daemon_job)) {
1769 mtx_unlock(&aio_job_mtx);
1773 job->handle_fn = func;
1774 TAILQ_INSERT_TAIL(&aio_jobs, job, list);
1775 aio_kick_nowait(job->userproc);
1776 mtx_unlock(&aio_job_mtx);
1780 aio_cancel_sync(struct kaiocb *job)
1782 struct kaioinfo *ki;
1784 ki = job->userproc->p_aioinfo;
1786 if (!aio_cancel_cleared(job))
1787 TAILQ_REMOVE(&ki->kaio_syncqueue, job, list);
1793 aio_queue_file(struct file *fp, struct kaiocb *job)
1795 struct kaioinfo *ki;
1796 struct kaiocb *job2;
1802 ki = job->userproc->p_aioinfo;
1803 error = aio_qbio(job->userproc, job);
1807 if (fp->f_type == DTYPE_VNODE) {
1809 if (vp->v_type == VREG || vp->v_type == VDIR) {
1810 mp = fp->f_vnode->v_mount;
1811 if (mp == NULL || (mp->mnt_flag & MNT_LOCAL) != 0)
1815 if (!(safe || enable_aio_unsafe)) {
1816 counted_warning(&unsafe_warningcnt,
1817 "is attempting to use unsafe AIO requests");
1818 return (EOPNOTSUPP);
1821 if (job->uaiocb.aio_lio_opcode & (LIO_WRITE | LIO_READ)) {
1822 aio_schedule(job, aio_process_rw);
1824 } else if (job->uaiocb.aio_lio_opcode & LIO_SYNC) {
1826 TAILQ_FOREACH(job2, &ki->kaio_jobqueue, plist) {
1827 if (job2->fd_file == job->fd_file &&
1828 ((job2->uaiocb.aio_lio_opcode & LIO_SYNC) == 0) &&
1829 job2->seqno < job->seqno) {
1830 job2->jobflags |= KAIOCB_CHECKSYNC;
1834 if (job->pending != 0) {
1835 if (!aio_set_cancel_function_locked(job,
1841 TAILQ_INSERT_TAIL(&ki->kaio_syncqueue, job, list);
1846 aio_schedule(job, aio_process_sync);
1855 aio_kick_nowait(struct proc *userp)
1857 struct kaioinfo *ki = userp->p_aioinfo;
1858 struct aioproc *aiop;
1860 mtx_assert(&aio_job_mtx, MA_OWNED);
1861 if ((aiop = TAILQ_FIRST(&aio_freeproc)) != NULL) {
1862 TAILQ_REMOVE(&aio_freeproc, aiop, list);
1863 aiop->aioprocflags &= ~AIOP_FREE;
1864 wakeup(aiop->aioproc);
1865 } else if (num_aio_resv_start + num_aio_procs < max_aio_procs &&
1866 ki->kaio_active_count + num_aio_resv_start < max_aio_per_proc) {
1867 taskqueue_enqueue(taskqueue_aiod_kick, &ki->kaio_task);
1872 aio_kick(struct proc *userp)
1874 struct kaioinfo *ki = userp->p_aioinfo;
1875 struct aioproc *aiop;
1878 mtx_assert(&aio_job_mtx, MA_OWNED);
1880 if ((aiop = TAILQ_FIRST(&aio_freeproc)) != NULL) {
1881 TAILQ_REMOVE(&aio_freeproc, aiop, list);
1882 aiop->aioprocflags &= ~AIOP_FREE;
1883 wakeup(aiop->aioproc);
1884 } else if (num_aio_resv_start + num_aio_procs < max_aio_procs &&
1885 ki->kaio_active_count + num_aio_resv_start < max_aio_per_proc) {
1886 num_aio_resv_start++;
1887 mtx_unlock(&aio_job_mtx);
1888 error = aio_newproc(&num_aio_resv_start);
1889 mtx_lock(&aio_job_mtx);
1891 num_aio_resv_start--;
1901 aio_kick_helper(void *context, int pending)
1903 struct proc *userp = context;
1905 mtx_lock(&aio_job_mtx);
1906 while (--pending >= 0) {
1907 if (aio_kick(userp))
1910 mtx_unlock(&aio_job_mtx);
1914 * Support the aio_return system call, as a side-effect, kernel resources are
1918 kern_aio_return(struct thread *td, struct aiocb *ujob, struct aiocb_ops *ops)
1920 struct proc *p = td->td_proc;
1922 struct kaioinfo *ki;
1929 TAILQ_FOREACH(job, &ki->kaio_done, plist) {
1930 if (job->ujob == ujob)
1934 MPASS(job->jobflags & KAIOCB_FINISHED);
1935 status = job->uaiocb._aiocb_private.status;
1936 error = job->uaiocb._aiocb_private.error;
1937 td->td_retval[0] = status;
1938 td->td_ru.ru_oublock += job->outblock;
1939 td->td_ru.ru_inblock += job->inblock;
1940 td->td_ru.ru_msgsnd += job->msgsnd;
1941 td->td_ru.ru_msgrcv += job->msgrcv;
1942 aio_free_entry(job);
1944 ops->store_error(ujob, error);
1945 ops->store_status(ujob, status);
1954 sys_aio_return(struct thread *td, struct aio_return_args *uap)
1957 return (kern_aio_return(td, uap->aiocbp, &aiocb_ops));
1961 * Allow a process to wakeup when any of the I/O requests are completed.
1964 kern_aio_suspend(struct thread *td, int njoblist, struct aiocb **ujoblist,
1965 struct timespec *ts)
1967 struct proc *p = td->td_proc;
1969 struct kaioinfo *ki;
1970 struct kaiocb *firstjob, *job;
1975 if (ts->tv_nsec < 0 || ts->tv_nsec >= 1000000000)
1978 TIMESPEC_TO_TIMEVAL(&atv, ts);
1979 if (itimerfix(&atv))
1981 timo = tvtohz(&atv);
1995 TAILQ_FOREACH(job, &ki->kaio_all, allist) {
1996 for (i = 0; i < njoblist; i++) {
1997 if (job->ujob == ujoblist[i]) {
1998 if (firstjob == NULL)
2000 if (job->jobflags & KAIOCB_FINISHED)
2005 /* All tasks were finished. */
2006 if (firstjob == NULL)
2009 ki->kaio_flags |= KAIO_WAKEUP;
2010 error = msleep(&p->p_aioinfo, AIO_MTX(ki), PRIBIO | PCATCH,
2012 if (error == ERESTART)
2023 sys_aio_suspend(struct thread *td, struct aio_suspend_args *uap)
2025 struct timespec ts, *tsp;
2026 struct aiocb **ujoblist;
2029 if (uap->nent < 0 || uap->nent > max_aio_queue_per_proc)
2033 /* Get timespec struct. */
2034 if ((error = copyin(uap->timeout, &ts, sizeof(ts))) != 0)
2040 ujoblist = malloc(uap->nent * sizeof(ujoblist[0]), M_AIOS, M_WAITOK);
2041 error = copyin(uap->aiocbp, ujoblist, uap->nent * sizeof(ujoblist[0]));
2043 error = kern_aio_suspend(td, uap->nent, ujoblist, tsp);
2044 free(ujoblist, M_AIOS);
2049 * aio_cancel cancels any non-bio aio operations not currently in progress.
2052 sys_aio_cancel(struct thread *td, struct aio_cancel_args *uap)
2054 struct proc *p = td->td_proc;
2055 struct kaioinfo *ki;
2056 struct kaiocb *job, *jobn;
2060 int notcancelled = 0;
2063 /* Lookup file object. */
2064 error = fget(td, uap->fd, &cap_no_rights, &fp);
2072 if (fp->f_type == DTYPE_VNODE) {
2074 if (vn_isdisk(vp)) {
2076 td->td_retval[0] = AIO_NOTCANCELED;
2082 TAILQ_FOREACH_SAFE(job, &ki->kaio_jobqueue, plist, jobn) {
2083 if ((uap->fd == job->uaiocb.aio_fildes) &&
2084 ((uap->aiocbp == NULL) ||
2085 (uap->aiocbp == job->ujob))) {
2086 if (aio_cancel_job(p, ki, job)) {
2091 if (uap->aiocbp != NULL)
2100 if (uap->aiocbp != NULL) {
2102 td->td_retval[0] = AIO_CANCELED;
2108 td->td_retval[0] = AIO_NOTCANCELED;
2113 td->td_retval[0] = AIO_CANCELED;
2117 td->td_retval[0] = AIO_ALLDONE;
2123 * aio_error is implemented in the kernel level for compatibility purposes
2124 * only. For a user mode async implementation, it would be best to do it in
2125 * a userland subroutine.
2128 kern_aio_error(struct thread *td, struct aiocb *ujob, struct aiocb_ops *ops)
2130 struct proc *p = td->td_proc;
2132 struct kaioinfo *ki;
2137 td->td_retval[0] = EINVAL;
2142 TAILQ_FOREACH(job, &ki->kaio_all, allist) {
2143 if (job->ujob == ujob) {
2144 if (job->jobflags & KAIOCB_FINISHED)
2146 job->uaiocb._aiocb_private.error;
2148 td->td_retval[0] = EINPROGRESS;
2156 * Hack for failure of aio_aqueue.
2158 status = ops->fetch_status(ujob);
2160 td->td_retval[0] = ops->fetch_error(ujob);
2164 td->td_retval[0] = EINVAL;
2169 sys_aio_error(struct thread *td, struct aio_error_args *uap)
2172 return (kern_aio_error(td, uap->aiocbp, &aiocb_ops));
2175 /* syscall - asynchronous read from a file (REALTIME) */
2176 #ifdef COMPAT_FREEBSD6
2178 freebsd6_aio_read(struct thread *td, struct freebsd6_aio_read_args *uap)
2181 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_READ,
2182 &aiocb_ops_osigevent));
2187 sys_aio_read(struct thread *td, struct aio_read_args *uap)
2190 return (aio_aqueue(td, uap->aiocbp, NULL, LIO_READ, &aiocb_ops));
2194 sys_aio_readv(struct thread *td, struct aio_readv_args *uap)
2197 return (aio_aqueue(td, uap->aiocbp, NULL, LIO_READV, &aiocb_ops));
2200 /* syscall - asynchronous write to a file (REALTIME) */
2201 #ifdef COMPAT_FREEBSD6
2203 freebsd6_aio_write(struct thread *td, struct freebsd6_aio_write_args *uap)
2206 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_WRITE,
2207 &aiocb_ops_osigevent));
2212 sys_aio_write(struct thread *td, struct aio_write_args *uap)
2215 return (aio_aqueue(td, uap->aiocbp, NULL, LIO_WRITE, &aiocb_ops));
2219 sys_aio_writev(struct thread *td, struct aio_writev_args *uap)
2222 return (aio_aqueue(td, uap->aiocbp, NULL, LIO_WRITEV, &aiocb_ops));
2226 sys_aio_mlock(struct thread *td, struct aio_mlock_args *uap)
2229 return (aio_aqueue(td, uap->aiocbp, NULL, LIO_MLOCK, &aiocb_ops));
2233 kern_lio_listio(struct thread *td, int mode, struct aiocb * const *uacb_list,
2234 struct aiocb **acb_list, int nent, struct sigevent *sig,
2235 struct aiocb_ops *ops)
2237 struct proc *p = td->td_proc;
2239 struct kaioinfo *ki;
2240 struct aioliojob *lj;
2246 if ((mode != LIO_NOWAIT) && (mode != LIO_WAIT))
2249 if (nent < 0 || nent > max_aio_queue_per_proc)
2252 if (p->p_aioinfo == NULL)
2253 aio_init_aioinfo(p);
2257 lj = uma_zalloc(aiolio_zone, M_WAITOK);
2260 lj->lioj_finished_count = 0;
2261 lj->lioj_signal.sigev_notify = SIGEV_NONE;
2262 knlist_init_mtx(&lj->klist, AIO_MTX(ki));
2263 ksiginfo_init(&lj->lioj_ksi);
2268 if (sig && (mode == LIO_NOWAIT)) {
2269 bcopy(sig, &lj->lioj_signal, sizeof(lj->lioj_signal));
2270 if (lj->lioj_signal.sigev_notify == SIGEV_KEVENT) {
2271 /* Assume only new style KEVENT */
2272 memset(&kev, 0, sizeof(kev));
2273 kev.filter = EVFILT_LIO;
2274 kev.flags = EV_ADD | EV_ENABLE | EV_FLAG1;
2275 kev.ident = (uintptr_t)uacb_list; /* something unique */
2276 kev.data = (intptr_t)lj;
2277 /* pass user defined sigval data */
2278 kev.udata = lj->lioj_signal.sigev_value.sival_ptr;
2279 error = kqfd_register(
2280 lj->lioj_signal.sigev_notify_kqueue, &kev, td,
2283 uma_zfree(aiolio_zone, lj);
2286 } else if (lj->lioj_signal.sigev_notify == SIGEV_NONE) {
2288 } else if (lj->lioj_signal.sigev_notify == SIGEV_SIGNAL ||
2289 lj->lioj_signal.sigev_notify == SIGEV_THREAD_ID) {
2290 if (!_SIG_VALID(lj->lioj_signal.sigev_signo)) {
2291 uma_zfree(aiolio_zone, lj);
2294 lj->lioj_flags |= LIOJ_SIGNAL;
2296 uma_zfree(aiolio_zone, lj);
2302 TAILQ_INSERT_TAIL(&ki->kaio_liojoblist, lj, lioj_list);
2304 * Add extra aiocb count to avoid the lio to be freed
2305 * by other threads doing aio_waitcomplete or aio_return,
2306 * and prevent event from being sent until we have queued
2313 * Get pointers to the list of I/O requests.
2317 for (i = 0; i < nent; i++) {
2320 error = aio_aqueue(td, job, lj, LIO_NOP, ops);
2321 if (error == EAGAIN)
2323 else if (error != 0)
2330 if (mode == LIO_WAIT) {
2331 while (lj->lioj_count - 1 != lj->lioj_finished_count) {
2332 ki->kaio_flags |= KAIO_WAKEUP;
2333 error = msleep(&p->p_aioinfo, AIO_MTX(ki),
2334 PRIBIO | PCATCH, "aiospn", 0);
2335 if (error == ERESTART)
2341 if (lj->lioj_count - 1 == lj->lioj_finished_count) {
2342 if (lj->lioj_signal.sigev_notify == SIGEV_KEVENT) {
2343 lj->lioj_flags |= LIOJ_KEVENT_POSTED;
2344 KNOTE_LOCKED(&lj->klist, 1);
2346 if ((lj->lioj_flags & (LIOJ_SIGNAL |
2347 LIOJ_SIGNAL_POSTED)) == LIOJ_SIGNAL &&
2348 (lj->lioj_signal.sigev_notify == SIGEV_SIGNAL ||
2349 lj->lioj_signal.sigev_notify == SIGEV_THREAD_ID)) {
2350 aio_sendsig(p, &lj->lioj_signal, &lj->lioj_ksi,
2351 lj->lioj_count != 1);
2352 lj->lioj_flags |= LIOJ_SIGNAL_POSTED;
2357 if (lj->lioj_count == 0) {
2358 TAILQ_REMOVE(&ki->kaio_liojoblist, lj, lioj_list);
2359 knlist_delete(&lj->klist, curthread, 1);
2361 sigqueue_take(&lj->lioj_ksi);
2364 uma_zfree(aiolio_zone, lj);
2376 /* syscall - list directed I/O (REALTIME) */
2377 #ifdef COMPAT_FREEBSD6
2379 freebsd6_lio_listio(struct thread *td, struct freebsd6_lio_listio_args *uap)
2381 struct aiocb **acb_list;
2382 struct sigevent *sigp, sig;
2383 struct osigevent osig;
2386 if ((uap->mode != LIO_NOWAIT) && (uap->mode != LIO_WAIT))
2390 if (nent < 0 || nent > max_aio_queue_per_proc)
2393 if (uap->sig && (uap->mode == LIO_NOWAIT)) {
2394 error = copyin(uap->sig, &osig, sizeof(osig));
2397 error = convert_old_sigevent(&osig, &sig);
2404 acb_list = malloc(sizeof(struct aiocb *) * nent, M_LIO, M_WAITOK);
2405 error = copyin(uap->acb_list, acb_list, nent * sizeof(acb_list[0]));
2407 error = kern_lio_listio(td, uap->mode,
2408 (struct aiocb * const *)uap->acb_list, acb_list, nent, sigp,
2409 &aiocb_ops_osigevent);
2410 free(acb_list, M_LIO);
2415 /* syscall - list directed I/O (REALTIME) */
2417 sys_lio_listio(struct thread *td, struct lio_listio_args *uap)
2419 struct aiocb **acb_list;
2420 struct sigevent *sigp, sig;
2423 if ((uap->mode != LIO_NOWAIT) && (uap->mode != LIO_WAIT))
2427 if (nent < 0 || nent > max_aio_queue_per_proc)
2430 if (uap->sig && (uap->mode == LIO_NOWAIT)) {
2431 error = copyin(uap->sig, &sig, sizeof(sig));
2438 acb_list = malloc(sizeof(struct aiocb *) * nent, M_LIO, M_WAITOK);
2439 error = copyin(uap->acb_list, acb_list, nent * sizeof(acb_list[0]));
2441 error = kern_lio_listio(td, uap->mode, uap->acb_list, acb_list,
2442 nent, sigp, &aiocb_ops);
2443 free(acb_list, M_LIO);
2448 aio_biocleanup(struct bio *bp)
2450 struct kaiocb *job = (struct kaiocb *)bp->bio_caller1;
2451 struct kaioinfo *ki;
2452 struct buf *pbuf = (struct buf *)bp->bio_caller2;
2454 /* Release mapping into kernel space. */
2456 MPASS(pbuf->b_npages <= atop(maxphys) + 1);
2457 pmap_qremove((vm_offset_t)pbuf->b_data, pbuf->b_npages);
2458 vm_page_unhold_pages(pbuf->b_pages, pbuf->b_npages);
2459 uma_zfree(pbuf_zone, pbuf);
2460 atomic_subtract_int(&num_buf_aio, 1);
2461 ki = job->userproc->p_aioinfo;
2463 ki->kaio_buffer_count--;
2466 MPASS(bp->bio_ma_n <= atop(maxphys) + 1);
2467 vm_page_unhold_pages(bp->bio_ma, bp->bio_ma_n);
2468 free(bp->bio_ma, M_TEMP);
2469 atomic_subtract_int(&num_unmapped_aio, 1);
2475 aio_biowakeup(struct bio *bp)
2477 struct kaiocb *job = (struct kaiocb *)bp->bio_caller1;
2479 long bcount = bp->bio_bcount;
2480 long resid = bp->bio_resid;
2481 int error, opcode, nblks;
2482 int bio_error = bp->bio_error;
2483 uint16_t flags = bp->bio_flags;
2485 opcode = job->uaiocb.aio_lio_opcode;
2489 nbytes =bcount - resid;
2490 atomic_add_acq_long(&job->nbytes, nbytes);
2491 nblks = btodb(nbytes);
2494 * If multiple bios experienced an error, the job will reflect the
2495 * error of whichever failed bio completed last.
2497 if (flags & BIO_ERROR)
2498 atomic_set_int(&job->error, bio_error);
2499 if (opcode & LIO_WRITE)
2500 atomic_add_int(&job->outblock, nblks);
2502 atomic_add_int(&job->inblock, nblks);
2503 atomic_subtract_int(&job->nbio, 1);
2506 if (atomic_load_int(&job->nbio) == 0) {
2507 if (atomic_load_int(&job->error))
2508 aio_complete(job, -1, job->error);
2510 aio_complete(job, atomic_load_long(&job->nbytes), 0);
2514 /* syscall - wait for the next completion of an aio request */
2516 kern_aio_waitcomplete(struct thread *td, struct aiocb **ujobp,
2517 struct timespec *ts, struct aiocb_ops *ops)
2519 struct proc *p = td->td_proc;
2521 struct kaioinfo *ki;
2527 ops->store_aiocb(ujobp, NULL);
2531 } else if (ts->tv_sec == 0 && ts->tv_nsec == 0) {
2534 if ((ts->tv_nsec < 0) || (ts->tv_nsec >= 1000000000))
2537 TIMESPEC_TO_TIMEVAL(&atv, ts);
2538 if (itimerfix(&atv))
2540 timo = tvtohz(&atv);
2543 if (p->p_aioinfo == NULL)
2544 aio_init_aioinfo(p);
2550 while ((job = TAILQ_FIRST(&ki->kaio_done)) == NULL) {
2552 error = EWOULDBLOCK;
2555 ki->kaio_flags |= KAIO_WAKEUP;
2556 error = msleep(&p->p_aioinfo, AIO_MTX(ki), PRIBIO | PCATCH,
2558 if (timo && error == ERESTART)
2565 MPASS(job->jobflags & KAIOCB_FINISHED);
2567 status = job->uaiocb._aiocb_private.status;
2568 error = job->uaiocb._aiocb_private.error;
2569 td->td_retval[0] = status;
2570 td->td_ru.ru_oublock += job->outblock;
2571 td->td_ru.ru_inblock += job->inblock;
2572 td->td_ru.ru_msgsnd += job->msgsnd;
2573 td->td_ru.ru_msgrcv += job->msgrcv;
2574 aio_free_entry(job);
2576 ops->store_aiocb(ujobp, ujob);
2577 ops->store_error(ujob, error);
2578 ops->store_status(ujob, status);
2586 sys_aio_waitcomplete(struct thread *td, struct aio_waitcomplete_args *uap)
2588 struct timespec ts, *tsp;
2592 /* Get timespec struct. */
2593 error = copyin(uap->timeout, &ts, sizeof(ts));
2600 return (kern_aio_waitcomplete(td, uap->aiocbp, tsp, &aiocb_ops));
2604 kern_aio_fsync(struct thread *td, int op, struct aiocb *ujob,
2605 struct aiocb_ops *ops)
2620 return (aio_aqueue(td, ujob, NULL, listop, ops));
2624 sys_aio_fsync(struct thread *td, struct aio_fsync_args *uap)
2627 return (kern_aio_fsync(td, uap->op, uap->aiocbp, &aiocb_ops));
2630 /* kqueue attach function */
2632 filt_aioattach(struct knote *kn)
2636 job = (struct kaiocb *)(uintptr_t)kn->kn_sdata;
2639 * The job pointer must be validated before using it, so
2640 * registration is restricted to the kernel; the user cannot
2643 if ((kn->kn_flags & EV_FLAG1) == 0)
2645 kn->kn_ptr.p_aio = job;
2646 kn->kn_flags &= ~EV_FLAG1;
2648 knlist_add(&job->klist, kn, 0);
2653 /* kqueue detach function */
2655 filt_aiodetach(struct knote *kn)
2659 knl = &kn->kn_ptr.p_aio->klist;
2660 knl->kl_lock(knl->kl_lockarg);
2661 if (!knlist_empty(knl))
2662 knlist_remove(knl, kn, 1);
2663 knl->kl_unlock(knl->kl_lockarg);
2666 /* kqueue filter function */
2669 filt_aio(struct knote *kn, long hint)
2671 struct kaiocb *job = kn->kn_ptr.p_aio;
2673 kn->kn_data = job->uaiocb._aiocb_private.error;
2674 if (!(job->jobflags & KAIOCB_FINISHED))
2676 kn->kn_flags |= EV_EOF;
2680 /* kqueue attach function */
2682 filt_lioattach(struct knote *kn)
2684 struct aioliojob *lj;
2686 lj = (struct aioliojob *)(uintptr_t)kn->kn_sdata;
2689 * The aioliojob pointer must be validated before using it, so
2690 * registration is restricted to the kernel; the user cannot
2693 if ((kn->kn_flags & EV_FLAG1) == 0)
2695 kn->kn_ptr.p_lio = lj;
2696 kn->kn_flags &= ~EV_FLAG1;
2698 knlist_add(&lj->klist, kn, 0);
2703 /* kqueue detach function */
2705 filt_liodetach(struct knote *kn)
2709 knl = &kn->kn_ptr.p_lio->klist;
2710 knl->kl_lock(knl->kl_lockarg);
2711 if (!knlist_empty(knl))
2712 knlist_remove(knl, kn, 1);
2713 knl->kl_unlock(knl->kl_lockarg);
2716 /* kqueue filter function */
2719 filt_lio(struct knote *kn, long hint)
2721 struct aioliojob * lj = kn->kn_ptr.p_lio;
2723 return (lj->lioj_flags & LIOJ_KEVENT_POSTED);
2726 #ifdef COMPAT_FREEBSD32
2727 #include <sys/mount.h>
2728 #include <sys/socket.h>
2729 #include <compat/freebsd32/freebsd32.h>
2730 #include <compat/freebsd32/freebsd32_proto.h>
2731 #include <compat/freebsd32/freebsd32_signal.h>
2732 #include <compat/freebsd32/freebsd32_syscall.h>
2733 #include <compat/freebsd32/freebsd32_util.h>
2735 struct __aiocb_private32 {
2738 uint32_t kernelinfo;
2741 #ifdef COMPAT_FREEBSD6
2742 typedef struct oaiocb32 {
2743 int aio_fildes; /* File descriptor */
2744 uint64_t aio_offset __packed; /* File offset for I/O */
2745 uint32_t aio_buf; /* I/O buffer in process space */
2746 uint32_t aio_nbytes; /* Number of bytes for I/O */
2747 struct osigevent32 aio_sigevent; /* Signal to deliver */
2748 int aio_lio_opcode; /* LIO opcode */
2749 int aio_reqprio; /* Request priority -- ignored */
2750 struct __aiocb_private32 _aiocb_private;
2754 typedef struct aiocb32 {
2755 int32_t aio_fildes; /* File descriptor */
2756 uint64_t aio_offset __packed; /* File offset for I/O */
2757 uint32_t aio_buf; /* I/O buffer in process space */
2758 uint32_t aio_nbytes; /* Number of bytes for I/O */
2760 uint32_t __spare2__;
2761 int aio_lio_opcode; /* LIO opcode */
2762 int aio_reqprio; /* Request priority -- ignored */
2763 struct __aiocb_private32 _aiocb_private;
2764 struct sigevent32 aio_sigevent; /* Signal to deliver */
2767 #ifdef COMPAT_FREEBSD6
2769 convert_old_sigevent32(struct osigevent32 *osig, struct sigevent *nsig)
2773 * Only SIGEV_NONE, SIGEV_SIGNAL, and SIGEV_KEVENT are
2774 * supported by AIO with the old sigevent structure.
2776 CP(*osig, *nsig, sigev_notify);
2777 switch (nsig->sigev_notify) {
2781 nsig->sigev_signo = osig->__sigev_u.__sigev_signo;
2784 nsig->sigev_notify_kqueue =
2785 osig->__sigev_u.__sigev_notify_kqueue;
2786 PTRIN_CP(*osig, *nsig, sigev_value.sival_ptr);
2795 aiocb32_copyin_old_sigevent(struct aiocb *ujob, struct kaiocb *kjob,
2798 struct oaiocb32 job32;
2799 struct aiocb *kcb = &kjob->uaiocb;
2802 bzero(kcb, sizeof(struct aiocb));
2803 error = copyin(ujob, &job32, sizeof(job32));
2807 /* No need to copyin aio_iov, because it did not exist in FreeBSD 6 */
2809 CP(job32, *kcb, aio_fildes);
2810 CP(job32, *kcb, aio_offset);
2811 PTRIN_CP(job32, *kcb, aio_buf);
2812 CP(job32, *kcb, aio_nbytes);
2813 CP(job32, *kcb, aio_lio_opcode);
2814 CP(job32, *kcb, aio_reqprio);
2815 CP(job32, *kcb, _aiocb_private.status);
2816 CP(job32, *kcb, _aiocb_private.error);
2817 PTRIN_CP(job32, *kcb, _aiocb_private.kernelinfo);
2818 return (convert_old_sigevent32(&job32.aio_sigevent,
2819 &kcb->aio_sigevent));
2824 aiocb32_copyin(struct aiocb *ujob, struct kaiocb *kjob, int type)
2826 struct aiocb32 job32;
2827 struct aiocb *kcb = &kjob->uaiocb;
2828 struct iovec32 *iov32;
2831 error = copyin(ujob, &job32, sizeof(job32));
2834 CP(job32, *kcb, aio_fildes);
2835 CP(job32, *kcb, aio_offset);
2836 CP(job32, *kcb, aio_lio_opcode);
2837 if (type == LIO_NOP)
2838 type = kcb->aio_lio_opcode;
2839 if (type & LIO_VECTORED) {
2840 iov32 = PTRIN(job32.aio_iov);
2841 CP(job32, *kcb, aio_iovcnt);
2842 /* malloc a uio and copy in the iovec */
2843 error = freebsd32_copyinuio(iov32,
2844 kcb->aio_iovcnt, &kjob->uiop);
2848 PTRIN_CP(job32, *kcb, aio_buf);
2849 CP(job32, *kcb, aio_nbytes);
2851 CP(job32, *kcb, aio_reqprio);
2852 CP(job32, *kcb, _aiocb_private.status);
2853 CP(job32, *kcb, _aiocb_private.error);
2854 PTRIN_CP(job32, *kcb, _aiocb_private.kernelinfo);
2855 error = convert_sigevent32(&job32.aio_sigevent, &kcb->aio_sigevent);
2861 aiocb32_fetch_status(struct aiocb *ujob)
2863 struct aiocb32 *ujob32;
2865 ujob32 = (struct aiocb32 *)ujob;
2866 return (fuword32(&ujob32->_aiocb_private.status));
2870 aiocb32_fetch_error(struct aiocb *ujob)
2872 struct aiocb32 *ujob32;
2874 ujob32 = (struct aiocb32 *)ujob;
2875 return (fuword32(&ujob32->_aiocb_private.error));
2879 aiocb32_store_status(struct aiocb *ujob, long status)
2881 struct aiocb32 *ujob32;
2883 ujob32 = (struct aiocb32 *)ujob;
2884 return (suword32(&ujob32->_aiocb_private.status, status));
2888 aiocb32_store_error(struct aiocb *ujob, long error)
2890 struct aiocb32 *ujob32;
2892 ujob32 = (struct aiocb32 *)ujob;
2893 return (suword32(&ujob32->_aiocb_private.error, error));
2897 aiocb32_store_kernelinfo(struct aiocb *ujob, long jobref)
2899 struct aiocb32 *ujob32;
2901 ujob32 = (struct aiocb32 *)ujob;
2902 return (suword32(&ujob32->_aiocb_private.kernelinfo, jobref));
2906 aiocb32_store_aiocb(struct aiocb **ujobp, struct aiocb *ujob)
2909 return (suword32(ujobp, (long)ujob));
2912 static struct aiocb_ops aiocb32_ops = {
2913 .aio_copyin = aiocb32_copyin,
2914 .fetch_status = aiocb32_fetch_status,
2915 .fetch_error = aiocb32_fetch_error,
2916 .store_status = aiocb32_store_status,
2917 .store_error = aiocb32_store_error,
2918 .store_kernelinfo = aiocb32_store_kernelinfo,
2919 .store_aiocb = aiocb32_store_aiocb,
2922 #ifdef COMPAT_FREEBSD6
2923 static struct aiocb_ops aiocb32_ops_osigevent = {
2924 .aio_copyin = aiocb32_copyin_old_sigevent,
2925 .fetch_status = aiocb32_fetch_status,
2926 .fetch_error = aiocb32_fetch_error,
2927 .store_status = aiocb32_store_status,
2928 .store_error = aiocb32_store_error,
2929 .store_kernelinfo = aiocb32_store_kernelinfo,
2930 .store_aiocb = aiocb32_store_aiocb,
2935 freebsd32_aio_return(struct thread *td, struct freebsd32_aio_return_args *uap)
2938 return (kern_aio_return(td, (struct aiocb *)uap->aiocbp, &aiocb32_ops));
2942 freebsd32_aio_suspend(struct thread *td, struct freebsd32_aio_suspend_args *uap)
2944 struct timespec32 ts32;
2945 struct timespec ts, *tsp;
2946 struct aiocb **ujoblist;
2947 uint32_t *ujoblist32;
2950 if (uap->nent < 0 || uap->nent > max_aio_queue_per_proc)
2954 /* Get timespec struct. */
2955 if ((error = copyin(uap->timeout, &ts32, sizeof(ts32))) != 0)
2957 CP(ts32, ts, tv_sec);
2958 CP(ts32, ts, tv_nsec);
2963 ujoblist = malloc(uap->nent * sizeof(ujoblist[0]), M_AIOS, M_WAITOK);
2964 ujoblist32 = (uint32_t *)ujoblist;
2965 error = copyin(uap->aiocbp, ujoblist32, uap->nent *
2966 sizeof(ujoblist32[0]));
2968 for (i = uap->nent - 1; i >= 0; i--)
2969 ujoblist[i] = PTRIN(ujoblist32[i]);
2971 error = kern_aio_suspend(td, uap->nent, ujoblist, tsp);
2973 free(ujoblist, M_AIOS);
2978 freebsd32_aio_error(struct thread *td, struct freebsd32_aio_error_args *uap)
2981 return (kern_aio_error(td, (struct aiocb *)uap->aiocbp, &aiocb32_ops));
2984 #ifdef COMPAT_FREEBSD6
2986 freebsd6_freebsd32_aio_read(struct thread *td,
2987 struct freebsd6_freebsd32_aio_read_args *uap)
2990 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_READ,
2991 &aiocb32_ops_osigevent));
2996 freebsd32_aio_read(struct thread *td, struct freebsd32_aio_read_args *uap)
2999 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_READ,
3004 freebsd32_aio_readv(struct thread *td, struct freebsd32_aio_readv_args *uap)
3007 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_READV,
3011 #ifdef COMPAT_FREEBSD6
3013 freebsd6_freebsd32_aio_write(struct thread *td,
3014 struct freebsd6_freebsd32_aio_write_args *uap)
3017 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_WRITE,
3018 &aiocb32_ops_osigevent));
3023 freebsd32_aio_write(struct thread *td, struct freebsd32_aio_write_args *uap)
3026 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_WRITE,
3031 freebsd32_aio_writev(struct thread *td, struct freebsd32_aio_writev_args *uap)
3034 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_WRITEV,
3039 freebsd32_aio_mlock(struct thread *td, struct freebsd32_aio_mlock_args *uap)
3042 return (aio_aqueue(td, (struct aiocb *)uap->aiocbp, NULL, LIO_MLOCK,
3047 freebsd32_aio_waitcomplete(struct thread *td,
3048 struct freebsd32_aio_waitcomplete_args *uap)
3050 struct timespec32 ts32;
3051 struct timespec ts, *tsp;
3055 /* Get timespec struct. */
3056 error = copyin(uap->timeout, &ts32, sizeof(ts32));
3059 CP(ts32, ts, tv_sec);
3060 CP(ts32, ts, tv_nsec);
3065 return (kern_aio_waitcomplete(td, (struct aiocb **)uap->aiocbp, tsp,
3070 freebsd32_aio_fsync(struct thread *td, struct freebsd32_aio_fsync_args *uap)
3073 return (kern_aio_fsync(td, uap->op, (struct aiocb *)uap->aiocbp,
3077 #ifdef COMPAT_FREEBSD6
3079 freebsd6_freebsd32_lio_listio(struct thread *td,
3080 struct freebsd6_freebsd32_lio_listio_args *uap)
3082 struct aiocb **acb_list;
3083 struct sigevent *sigp, sig;
3084 struct osigevent32 osig;
3085 uint32_t *acb_list32;
3088 if ((uap->mode != LIO_NOWAIT) && (uap->mode != LIO_WAIT))
3092 if (nent < 0 || nent > max_aio_queue_per_proc)
3095 if (uap->sig && (uap->mode == LIO_NOWAIT)) {
3096 error = copyin(uap->sig, &osig, sizeof(osig));
3099 error = convert_old_sigevent32(&osig, &sig);
3106 acb_list32 = malloc(sizeof(uint32_t) * nent, M_LIO, M_WAITOK);
3107 error = copyin(uap->acb_list, acb_list32, nent * sizeof(uint32_t));
3109 free(acb_list32, M_LIO);
3112 acb_list = malloc(sizeof(struct aiocb *) * nent, M_LIO, M_WAITOK);
3113 for (i = 0; i < nent; i++)
3114 acb_list[i] = PTRIN(acb_list32[i]);
3115 free(acb_list32, M_LIO);
3117 error = kern_lio_listio(td, uap->mode,
3118 (struct aiocb * const *)uap->acb_list, acb_list, nent, sigp,
3119 &aiocb32_ops_osigevent);
3120 free(acb_list, M_LIO);
3126 freebsd32_lio_listio(struct thread *td, struct freebsd32_lio_listio_args *uap)
3128 struct aiocb **acb_list;
3129 struct sigevent *sigp, sig;
3130 struct sigevent32 sig32;
3131 uint32_t *acb_list32;
3134 if ((uap->mode != LIO_NOWAIT) && (uap->mode != LIO_WAIT))
3138 if (nent < 0 || nent > max_aio_queue_per_proc)
3141 if (uap->sig && (uap->mode == LIO_NOWAIT)) {
3142 error = copyin(uap->sig, &sig32, sizeof(sig32));
3145 error = convert_sigevent32(&sig32, &sig);
3152 acb_list32 = malloc(sizeof(uint32_t) * nent, M_LIO, M_WAITOK);
3153 error = copyin(uap->acb_list, acb_list32, nent * sizeof(uint32_t));
3155 free(acb_list32, M_LIO);
3158 acb_list = malloc(sizeof(struct aiocb *) * nent, M_LIO, M_WAITOK);
3159 for (i = 0; i < nent; i++)
3160 acb_list[i] = PTRIN(acb_list32[i]);
3161 free(acb_list32, M_LIO);
3163 error = kern_lio_listio(td, uap->mode,
3164 (struct aiocb * const *)uap->acb_list, acb_list, nent, sigp,
3166 free(acb_list, M_LIO);