aboutsummaryrefslogtreecommitdiff
path: root/pathfs_frontend
diff options
context:
space:
mode:
Diffstat (limited to 'pathfs_frontend')
-rw-r--r--pathfs_frontend/file.go19
1 files changed, 15 insertions, 4 deletions
diff --git a/pathfs_frontend/file.go b/pathfs_frontend/file.go
index bbc211d..5c76fb1 100644
--- a/pathfs_frontend/file.go
+++ b/pathfs_frontend/file.go
@@ -194,6 +194,8 @@ func (f *file) Read(buf []byte, off int64) (resultData fuse.ReadResult, code fus
return fuse.ReadResultData(out), status
}
+const FALLOC_FL_KEEP_SIZE = 0x01
+
// doWrite - encrypt "data" and write it to plaintext offset "off"
//
// Arguments do not have to be block-aligned, read-modify-write is
@@ -238,16 +240,25 @@ func (f *file) doWrite(data []byte, off int64) (uint32, fuse.Status) {
}
// Write
- blockOffset, _ := b.CiphertextRange()
+ blockOffset, blockLen := b.CiphertextRange()
blockData = f.cfs.EncryptBlock(blockData, b.BlockNo, f.header.Id)
cryptfs.Debug.Printf("ino%d: Writing %d bytes to block #%d, md5=%s\n",
f.ino, len(blockData)-cryptfs.BLOCK_OVERHEAD, b.BlockNo, cryptfs.Debug.Md5sum(blockData))
+
+ // Prevent partially written (=corrupt) blocks by preallocating the space beforehand
f.fdLock.Lock()
- _, err := f.fd.WriteAt(blockData, int64(blockOffset))
+ err := syscall.Fallocate(int(f.fd.Fd()), FALLOC_FL_KEEP_SIZE, int64(blockOffset), int64(blockLen))
+ f.fdLock.Unlock()
+ if err != nil {
+ cryptfs.Warn.Printf("doWrite: Fallocate failed: %s\n", err.Error())
+ status = fuse.ToStatus(err)
+ break
+ }
+ f.fdLock.Lock()
+ _, err = f.fd.WriteAt(blockData, int64(blockOffset))
f.fdLock.Unlock()
-
if err != nil {
- cryptfs.Warn.Printf("Write failed: %s\n", err.Error())
+ cryptfs.Warn.Printf("doWrite: Write failed: %s\n", err.Error())
status = fuse.ToStatus(err)
break
}