diff options
author | Jakob Unterwurzacher | 2016-07-03 19:14:12 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2016-07-03 19:18:34 +0200 |
commit | 9b725c15cf50cfb85ec6ec88c47843092775dedc (patch) | |
tree | 3fd5f651428e48cdd8485389c81de467d9e5d9a0 /internal/syscallcompat | |
parent | c9a472c12ff08a6481c086c791f3005e81dbbcf1 (diff) |
syscallcompat: OSX: add Fallocate and Openat wrappers
...and convert all calls to syscall.{Fallocate,Openat}
to syscallcompat .
Both syscalls are not available on OSX. We emulate Openat and just
return EOPNOTSUPP for Fallocate.
Diffstat (limited to 'internal/syscallcompat')
-rw-r--r-- | internal/syscallcompat/sys_darwin.go | 33 | ||||
-rw-r--r-- | internal/syscallcompat/sys_linux.go | 19 |
2 files changed, 47 insertions, 5 deletions
diff --git a/internal/syscallcompat/sys_darwin.go b/internal/syscallcompat/sys_darwin.go index d437170..81e1b15 100644 --- a/internal/syscallcompat/sys_darwin.go +++ b/internal/syscallcompat/sys_darwin.go @@ -1,5 +1,11 @@ package syscallcompat +import ( + "os" + "sync" + "syscall" +) + // prealloc - preallocate space without changing the file size. This prevents // us from running out of space in the middle of an operation. func Prealloc(fd int, off int64, len int64) (err error) { @@ -10,3 +16,30 @@ func Prealloc(fd int, off int64, len int64) (err error) { // See https://github.com/rfjakob/gocryptfs/issues/18 if you want to help. return nil } + +var openatLock sync.Mutex + +// Poor man's Openat: +// 1) fchdir to the dirfd +// 2) open the file +// 3) chdir back. +func Openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) { + openatLock.Lock() + defer openatLock.Unlock() + + oldWd, err := os.Getwd() + if err != nil { + return -1, err + } + err = syscall.Fchdir(dirfd) + if err != nil { + return -1, err + } + defer os.Chdir(oldWd) + + return syscall.Open(path, flags, mode) +} + +func Fallocate(fd int, mode uint32, off int64, len int64) (err error) { + return syscall.EOPNOTSUPP +} diff --git a/internal/syscallcompat/sys_linux.go b/internal/syscallcompat/sys_linux.go index 9fe9da5..ca6df95 100644 --- a/internal/syscallcompat/sys_linux.go +++ b/internal/syscallcompat/sys_linux.go @@ -11,9 +11,10 @@ const FALLOC_FL_KEEP_SIZE = 0x01 var preallocWarn sync.Once -// prealloc - preallocate space without changing the file size. This prevents -// us from running out of space in the middle of an operation. -func Prealloc(fd int, off int64, len int64) (err error) { +// EnospcPrealloc preallocates ciphertext space without changing the file +// size. This guarantees that we don't run out of space while writing a +// ciphertext block (that would corrupt the block). +func EnospcPrealloc(fd int, off int64, len int64) (err error) { for { err = syscall.Fallocate(fd, FALLOC_FL_KEEP_SIZE, off, len) if err == syscall.EINTR { @@ -23,8 +24,8 @@ func Prealloc(fd int, off int64, len int64) (err error) { continue } if err == syscall.EOPNOTSUPP { - // ZFS does not support fallocate which caused gocryptfs to abort - // every write operation: https://github.com/rfjakob/gocryptfs/issues/22 + // ZFS and ext3 do not support fallocate. Warn but continue anyway. + // https://github.com/rfjakob/gocryptfs/issues/22 preallocWarn.Do(func() { tlog.Warn.Printf("Warning: The underlying filesystem " + "does not support fallocate(2). gocryptfs will continue working " + @@ -35,3 +36,11 @@ func Prealloc(fd int, off int64, len int64) (err error) { return err } } + +func Openat(dirfd int, path string, flags int, mode uint32) (fd int, err error) { + return syscall.Openat(dirfd, path, flags, mode) +} + +func Fallocate(fd int, mode uint32, off int64, len int64) (err error) { + return syscall.Fallocate(fd, mode, off, len) +} |