Home | History | Annotate | Line # | Download | only in tmpfs
tmpfs_subr.c revision 1.62
      1  1.62     pooka /*	$NetBSD: tmpfs_subr.c,v 1.62 2011/01/13 13:35:12 pooka Exp $	*/
      2   1.1      jmmv 
      3   1.1      jmmv /*
      4  1.43        ad  * Copyright (c) 2005, 2006, 2007 The NetBSD Foundation, Inc.
      5   1.1      jmmv  * All rights reserved.
      6   1.1      jmmv  *
      7   1.1      jmmv  * This code is derived from software contributed to The NetBSD Foundation
      8   1.8      jmmv  * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
      9   1.8      jmmv  * 2005 program.
     10   1.1      jmmv  *
     11   1.1      jmmv  * Redistribution and use in source and binary forms, with or without
     12   1.1      jmmv  * modification, are permitted provided that the following conditions
     13   1.1      jmmv  * are met:
     14   1.1      jmmv  * 1. Redistributions of source code must retain the above copyright
     15   1.1      jmmv  *    notice, this list of conditions and the following disclaimer.
     16   1.1      jmmv  * 2. Redistributions in binary form must reproduce the above copyright
     17   1.1      jmmv  *    notice, this list of conditions and the following disclaimer in the
     18   1.1      jmmv  *    documentation and/or other materials provided with the distribution.
     19   1.1      jmmv  *
     20   1.1      jmmv  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     21   1.1      jmmv  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22   1.1      jmmv  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23   1.1      jmmv  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     24   1.1      jmmv  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     25   1.1      jmmv  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     26   1.1      jmmv  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     27   1.1      jmmv  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     28   1.1      jmmv  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29   1.1      jmmv  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30   1.1      jmmv  * POSSIBILITY OF SUCH DAMAGE.
     31   1.1      jmmv  */
     32   1.1      jmmv 
     33   1.1      jmmv /*
     34   1.2      jmmv  * Efficient memory file system supporting functions.
     35   1.1      jmmv  */
     36   1.1      jmmv 
     37   1.1      jmmv #include <sys/cdefs.h>
     38  1.62     pooka __KERNEL_RCSID(0, "$NetBSD: tmpfs_subr.c,v 1.62 2011/01/13 13:35:12 pooka Exp $");
     39   1.1      jmmv 
     40   1.1      jmmv #include <sys/param.h>
     41   1.1      jmmv #include <sys/dirent.h>
     42   1.1      jmmv #include <sys/event.h>
     43  1.43        ad #include <sys/kmem.h>
     44   1.1      jmmv #include <sys/mount.h>
     45   1.1      jmmv #include <sys/namei.h>
     46   1.1      jmmv #include <sys/time.h>
     47   1.1      jmmv #include <sys/stat.h>
     48   1.1      jmmv #include <sys/systm.h>
     49   1.1      jmmv #include <sys/swap.h>
     50   1.1      jmmv #include <sys/vnode.h>
     51  1.20  christos #include <sys/kauth.h>
     52  1.35        ad #include <sys/proc.h>
     53  1.43        ad #include <sys/atomic.h>
     54   1.1      jmmv 
     55   1.1      jmmv #include <uvm/uvm.h>
     56   1.1      jmmv 
     57   1.1      jmmv #include <miscfs/specfs/specdev.h>
     58  1.53      elad #include <miscfs/genfs/genfs.h>
     59   1.1      jmmv #include <fs/tmpfs/tmpfs.h>
     60   1.1      jmmv #include <fs/tmpfs/tmpfs_fifoops.h>
     61   1.1      jmmv #include <fs/tmpfs/tmpfs_specops.h>
     62   1.1      jmmv #include <fs/tmpfs/tmpfs_vnops.h>
     63   1.1      jmmv 
     64   1.1      jmmv /* --------------------------------------------------------------------- */
     65   1.1      jmmv 
     66   1.8      jmmv /*
     67   1.8      jmmv  * Allocates a new node of type 'type' inside the 'tmp' mount point, with
     68   1.8      jmmv  * its owner set to 'uid', its group to 'gid' and its mode set to 'mode',
     69   1.8      jmmv  * using the credentials of the process 'p'.
     70   1.8      jmmv  *
     71   1.8      jmmv  * If the node type is set to 'VDIR', then the parent parameter must point
     72   1.8      jmmv  * to the parent directory of the node being created.  It may only be NULL
     73   1.8      jmmv  * while allocating the root node.
     74   1.8      jmmv  *
     75   1.8      jmmv  * If the node type is set to 'VBLK' or 'VCHR', then the rdev parameter
     76   1.8      jmmv  * specifies the device the node represents.
     77   1.8      jmmv  *
     78   1.8      jmmv  * If the node type is set to 'VLNK', then the parameter target specifies
     79   1.8      jmmv  * the file name of the target file for the symbolic link that is being
     80   1.8      jmmv  * created.
     81   1.8      jmmv  *
     82   1.8      jmmv  * Note that new nodes are retrieved from the available list if it has
     83   1.8      jmmv  * items or, if it is empty, from the node pool as long as there is enough
     84   1.8      jmmv  * space to create them.
     85   1.8      jmmv  *
     86   1.8      jmmv  * Returns zero on success or an appropriate error code on failure.
     87   1.8      jmmv  */
     88   1.1      jmmv int
     89   1.1      jmmv tmpfs_alloc_node(struct tmpfs_mount *tmp, enum vtype type,
     90   1.1      jmmv     uid_t uid, gid_t gid, mode_t mode, struct tmpfs_node *parent,
     91  1.42     pooka     char *target, dev_t rdev, struct tmpfs_node **node)
     92   1.1      jmmv {
     93   1.1      jmmv 	struct tmpfs_node *nnode;
     94   1.1      jmmv 
     95   1.2      jmmv 	/* If the root directory of the 'tmp' file system is not yet
     96   1.1      jmmv 	 * allocated, this must be the request to do it. */
     97   1.1      jmmv 	KASSERT(IMPLIES(tmp->tm_root == NULL, parent == NULL && type == VDIR));
     98   1.1      jmmv 
     99   1.1      jmmv 	KASSERT(IFF(type == VLNK, target != NULL));
    100   1.1      jmmv 	KASSERT(IFF(type == VBLK || type == VCHR, rdev != VNOVAL));
    101   1.1      jmmv 
    102   1.1      jmmv 	KASSERT(uid != VNOVAL && gid != VNOVAL && mode != VNOVAL);
    103   1.1      jmmv 
    104   1.1      jmmv 	nnode = NULL;
    105  1.43        ad 	if (atomic_inc_uint_nv(&tmp->tm_nodes_cnt) >= tmp->tm_nodes_max) {
    106  1.43        ad 		atomic_dec_uint(&tmp->tm_nodes_cnt);
    107  1.43        ad 		return ENOSPC;
    108  1.43        ad 	}
    109   1.1      jmmv 
    110  1.57     rmind 	nnode = tmpfs_node_get(tmp);
    111  1.43        ad 	if (nnode == NULL) {
    112  1.43        ad 		atomic_dec_uint(&tmp->tm_nodes_cnt);
    113  1.43        ad 		return ENOSPC;
    114   1.1      jmmv 	}
    115  1.43        ad 
    116  1.43        ad 	/*
    117  1.43        ad 	 * XXX Where the pool is backed by a map larger than (4GB *
    118  1.43        ad 	 * sizeof(*nnode)), this may produce duplicate inode numbers
    119  1.43        ad 	 * for applications that do not understand 64-bit ino_t.
    120  1.43        ad 	 */
    121  1.43        ad 	nnode->tn_id = (ino_t)((uintptr_t)nnode / sizeof(*nnode));
    122  1.43        ad 	nnode->tn_gen = arc4random();
    123   1.1      jmmv 
    124   1.1      jmmv 	/* Generic initialization. */
    125   1.1      jmmv 	nnode->tn_type = type;
    126   1.1      jmmv 	nnode->tn_size = 0;
    127   1.1      jmmv 	nnode->tn_status = 0;
    128   1.1      jmmv 	nnode->tn_flags = 0;
    129   1.1      jmmv 	nnode->tn_links = 0;
    130  1.56     rmind 
    131  1.56     rmind 	vfs_timestamp(&nnode->tn_atime);
    132  1.56     rmind 	nnode->tn_birthtime = nnode->tn_atime;
    133  1.56     rmind 	nnode->tn_ctime = nnode->tn_atime;
    134  1.56     rmind 	nnode->tn_mtime = nnode->tn_atime;
    135  1.56     rmind 
    136   1.1      jmmv 	nnode->tn_uid = uid;
    137   1.1      jmmv 	nnode->tn_gid = gid;
    138   1.1      jmmv 	nnode->tn_mode = mode;
    139  1.11      jmmv 	nnode->tn_lockf = NULL;
    140   1.1      jmmv 	nnode->tn_vnode = NULL;
    141   1.1      jmmv 
    142   1.1      jmmv 	/* Type-specific initialization. */
    143   1.1      jmmv 	switch (nnode->tn_type) {
    144   1.1      jmmv 	case VBLK:
    145   1.1      jmmv 	case VCHR:
    146  1.18      jmmv 		nnode->tn_spec.tn_dev.tn_rdev = rdev;
    147   1.1      jmmv 		break;
    148   1.1      jmmv 
    149   1.1      jmmv 	case VDIR:
    150  1.18      jmmv 		TAILQ_INIT(&nnode->tn_spec.tn_dir.tn_dir);
    151  1.18      jmmv 		nnode->tn_spec.tn_dir.tn_parent =
    152  1.18      jmmv 		    (parent == NULL) ? nnode : parent;
    153  1.18      jmmv 		nnode->tn_spec.tn_dir.tn_readdir_lastn = 0;
    154  1.18      jmmv 		nnode->tn_spec.tn_dir.tn_readdir_lastp = NULL;
    155   1.1      jmmv 		nnode->tn_links++;
    156   1.1      jmmv 		break;
    157   1.1      jmmv 
    158   1.1      jmmv 	case VFIFO:
    159   1.1      jmmv 		/* FALLTHROUGH */
    160   1.1      jmmv 	case VSOCK:
    161   1.1      jmmv 		break;
    162   1.1      jmmv 
    163   1.1      jmmv 	case VLNK:
    164   1.1      jmmv 		KASSERT(strlen(target) < MAXPATHLEN);
    165   1.7      yamt 		nnode->tn_size = strlen(target);
    166  1.18      jmmv 		nnode->tn_spec.tn_lnk.tn_link =
    167  1.57     rmind 		    tmpfs_strname_alloc(tmp, nnode->tn_size);
    168  1.18      jmmv 		if (nnode->tn_spec.tn_lnk.tn_link == NULL) {
    169  1.43        ad 			atomic_dec_uint(&tmp->tm_nodes_cnt);
    170  1.57     rmind 			tmpfs_node_put(tmp, nnode);
    171   1.1      jmmv 			return ENOSPC;
    172   1.1      jmmv 		}
    173  1.18      jmmv 		memcpy(nnode->tn_spec.tn_lnk.tn_link, target, nnode->tn_size);
    174   1.1      jmmv 		break;
    175   1.1      jmmv 
    176   1.1      jmmv 	case VREG:
    177  1.18      jmmv 		nnode->tn_spec.tn_reg.tn_aobj =
    178  1.18      jmmv 		    uao_create(INT32_MAX - PAGE_SIZE, 0);
    179  1.18      jmmv 		nnode->tn_spec.tn_reg.tn_aobj_pages = 0;
    180   1.1      jmmv 		break;
    181   1.1      jmmv 
    182   1.1      jmmv 	default:
    183   1.1      jmmv 		KASSERT(0);
    184   1.1      jmmv 	}
    185   1.1      jmmv 
    186  1.43        ad 	mutex_init(&nnode->tn_vlock, MUTEX_DEFAULT, IPL_NONE);
    187  1.43        ad 
    188  1.43        ad 	mutex_enter(&tmp->tm_lock);
    189  1.43        ad 	LIST_INSERT_HEAD(&tmp->tm_nodes, nnode, tn_entries);
    190  1.43        ad 	mutex_exit(&tmp->tm_lock);
    191  1.43        ad 
    192   1.1      jmmv 	*node = nnode;
    193   1.1      jmmv 	return 0;
    194   1.1      jmmv }
    195   1.1      jmmv 
    196   1.1      jmmv /* --------------------------------------------------------------------- */
    197   1.1      jmmv 
    198   1.8      jmmv /*
    199   1.8      jmmv  * Destroys the node pointed to by node from the file system 'tmp'.
    200   1.8      jmmv  * If the node does not belong to the given mount point, the results are
    201   1.8      jmmv  * unpredicted.
    202   1.8      jmmv  *
    203   1.8      jmmv  * If the node references a directory; no entries are allowed because
    204   1.8      jmmv  * their removal could need a recursive algorithm, something forbidden in
    205   1.8      jmmv  * kernel space.  Furthermore, there is not need to provide such
    206   1.8      jmmv  * functionality (recursive removal) because the only primitives offered
    207   1.8      jmmv  * to the user are the removal of empty directories and the deletion of
    208   1.8      jmmv  * individual files.
    209   1.8      jmmv  *
    210   1.8      jmmv  * Note that nodes are not really deleted; in fact, when a node has been
    211   1.8      jmmv  * allocated, it cannot be deleted during the whole life of the file
    212   1.8      jmmv  * system.  Instead, they are moved to the available list and remain there
    213   1.8      jmmv  * until reused.
    214   1.8      jmmv  */
    215   1.1      jmmv void
    216   1.1      jmmv tmpfs_free_node(struct tmpfs_mount *tmp, struct tmpfs_node *node)
    217   1.1      jmmv {
    218  1.57     rmind 	size_t objsz;
    219  1.43        ad 
    220  1.43        ad 	mutex_enter(&tmp->tm_lock);
    221  1.43        ad 	LIST_REMOVE(node, tn_entries);
    222  1.43        ad 	mutex_exit(&tmp->tm_lock);
    223  1.57     rmind 	atomic_dec_uint(&tmp->tm_nodes_cnt);
    224   1.1      jmmv 
    225  1.40        ad 	switch (node->tn_type) {
    226   1.1      jmmv 	case VLNK:
    227  1.57     rmind 		tmpfs_strname_free(tmp, node->tn_spec.tn_lnk.tn_link,
    228  1.57     rmind 		    node->tn_size);
    229   1.1      jmmv 		break;
    230   1.1      jmmv 	case VREG:
    231  1.57     rmind 		/*
    232  1.57     rmind 		 * Calculate the size of node data, decrease the used-memory
    233  1.57     rmind 		 * counter, and destroy the memory object (if any).
    234  1.57     rmind 		 */
    235  1.57     rmind 		objsz = PAGE_SIZE * node->tn_spec.tn_reg.tn_aobj_pages;
    236  1.57     rmind 		if (objsz != 0) {
    237  1.57     rmind 			tmpfs_mem_decr(tmp, objsz);
    238  1.57     rmind 		}
    239  1.57     rmind 		if (node->tn_spec.tn_reg.tn_aobj != NULL) {
    240  1.18      jmmv 			uao_detach(node->tn_spec.tn_reg.tn_aobj);
    241  1.57     rmind 		}
    242   1.1      jmmv 		break;
    243   1.1      jmmv 	default:
    244   1.1      jmmv 		break;
    245   1.1      jmmv 	}
    246   1.1      jmmv 
    247  1.43        ad 	mutex_destroy(&node->tn_vlock);
    248  1.57     rmind 	tmpfs_node_put(tmp, node);
    249   1.1      jmmv }
    250   1.1      jmmv 
    251   1.1      jmmv /* --------------------------------------------------------------------- */
    252   1.1      jmmv 
    253   1.8      jmmv /*
    254   1.8      jmmv  * Allocates a new directory entry for the node node with a name of name.
    255   1.8      jmmv  * The new directory entry is returned in *de.
    256   1.8      jmmv  *
    257   1.8      jmmv  * The link count of node is increased by one to reflect the new object
    258  1.29      jmmv  * referencing it.  This takes care of notifying kqueue listeners about
    259  1.29      jmmv  * this change.
    260   1.8      jmmv  *
    261   1.8      jmmv  * Returns zero on success or an appropriate error code on failure.
    262   1.8      jmmv  */
    263   1.1      jmmv int
    264   1.1      jmmv tmpfs_alloc_dirent(struct tmpfs_mount *tmp, struct tmpfs_node *node,
    265   1.1      jmmv     const char *name, uint16_t len, struct tmpfs_dirent **de)
    266   1.1      jmmv {
    267   1.1      jmmv 	struct tmpfs_dirent *nde;
    268   1.1      jmmv 
    269  1.57     rmind 	nde = tmpfs_dirent_get(tmp);
    270   1.1      jmmv 	if (nde == NULL)
    271   1.1      jmmv 		return ENOSPC;
    272   1.1      jmmv 
    273  1.57     rmind 	nde->td_name = tmpfs_strname_alloc(tmp, len);
    274   1.1      jmmv 	if (nde->td_name == NULL) {
    275  1.57     rmind 		tmpfs_dirent_put(tmp, nde);
    276   1.1      jmmv 		return ENOSPC;
    277   1.1      jmmv 	}
    278   1.1      jmmv 	nde->td_namelen = len;
    279   1.1      jmmv 	memcpy(nde->td_name, name, len);
    280   1.1      jmmv 	nde->td_node = node;
    281   1.1      jmmv 
    282  1.62     pooka 	if (node != TMPFS_NODE_WHITEOUT) {
    283  1.62     pooka 		node->tn_links++;
    284  1.62     pooka 		if (node->tn_links > 1 && node->tn_vnode != NULL)
    285  1.62     pooka 			VN_KNOTE(node->tn_vnode, NOTE_LINK);
    286  1.62     pooka 	}
    287   1.1      jmmv 	*de = nde;
    288   1.1      jmmv 
    289   1.1      jmmv 	return 0;
    290   1.1      jmmv }
    291   1.1      jmmv 
    292   1.1      jmmv /* --------------------------------------------------------------------- */
    293   1.1      jmmv 
    294   1.8      jmmv /*
    295   1.8      jmmv  * Frees a directory entry.  It is the caller's responsibility to destroy
    296   1.8      jmmv  * the node referenced by it if needed.
    297   1.8      jmmv  *
    298   1.8      jmmv  * The link count of node is decreased by one to reflect the removal of an
    299   1.8      jmmv  * object that referenced it.  This only happens if 'node_exists' is true;
    300   1.8      jmmv  * otherwise the function will not access the node referred to by the
    301   1.8      jmmv  * directory entry, as it may already have been released from the outside.
    302  1.29      jmmv  *
    303  1.29      jmmv  * Interested parties (kqueue) are notified of the link count change; note
    304  1.29      jmmv  * that this can include both the node pointed to by the directory entry
    305  1.29      jmmv  * as well as its parent.
    306   1.8      jmmv  */
    307   1.1      jmmv void
    308   1.1      jmmv tmpfs_free_dirent(struct tmpfs_mount *tmp, struct tmpfs_dirent *de,
    309  1.33   thorpej     bool node_exists)
    310   1.1      jmmv {
    311  1.62     pooka 	if (node_exists && de->td_node != TMPFS_NODE_WHITEOUT) {
    312   1.1      jmmv 		struct tmpfs_node *node;
    313   1.1      jmmv 
    314   1.1      jmmv 		node = de->td_node;
    315   1.1      jmmv 
    316   1.1      jmmv 		KASSERT(node->tn_links > 0);
    317   1.1      jmmv 		node->tn_links--;
    318  1.29      jmmv 		if (node->tn_vnode != NULL)
    319  1.29      jmmv 			VN_KNOTE(node->tn_vnode, node->tn_links == 0 ?
    320  1.29      jmmv 			    NOTE_DELETE : NOTE_LINK);
    321  1.29      jmmv 		if (node->tn_type == VDIR)
    322  1.29      jmmv 			VN_KNOTE(node->tn_spec.tn_dir.tn_parent->tn_vnode,
    323  1.29      jmmv 			    NOTE_LINK);
    324   1.1      jmmv 	}
    325   1.1      jmmv 
    326  1.57     rmind 	tmpfs_strname_free(tmp, de->td_name, de->td_namelen);
    327  1.57     rmind 	tmpfs_dirent_put(tmp, de);
    328   1.1      jmmv }
    329   1.1      jmmv 
    330   1.1      jmmv /* --------------------------------------------------------------------- */
    331   1.1      jmmv 
    332   1.8      jmmv /*
    333   1.8      jmmv  * Allocates a new vnode for the node node or returns a new reference to
    334   1.8      jmmv  * an existing one if the node had already a vnode referencing it.  The
    335   1.8      jmmv  * resulting locked vnode is returned in *vpp.
    336   1.8      jmmv  *
    337   1.8      jmmv  * Returns zero on success or an appropriate error code on failure.
    338   1.8      jmmv  */
    339   1.1      jmmv int
    340   1.1      jmmv tmpfs_alloc_vp(struct mount *mp, struct tmpfs_node *node, struct vnode **vpp)
    341   1.1      jmmv {
    342   1.1      jmmv 	int error;
    343   1.1      jmmv 	struct vnode *vp;
    344   1.1      jmmv 
    345  1.43        ad 	/* If there is already a vnode, then lock it. */
    346  1.43        ad 	for (;;) {
    347  1.43        ad 		mutex_enter(&node->tn_vlock);
    348  1.43        ad 		if ((vp = node->tn_vnode) != NULL) {
    349  1.43        ad 			mutex_enter(&vp->v_interlock);
    350  1.43        ad 			mutex_exit(&node->tn_vlock);
    351  1.59   hannken 			error = vget(vp, LK_EXCLUSIVE);
    352  1.43        ad 			if (error == ENOENT) {
    353  1.43        ad 				/* vnode was reclaimed. */
    354  1.43        ad 				continue;
    355  1.43        ad 			}
    356  1.43        ad 			*vpp = vp;
    357  1.43        ad 			return error;
    358  1.43        ad 		}
    359  1.43        ad 		break;
    360   1.1      jmmv 	}
    361   1.1      jmmv 
    362   1.1      jmmv 	/* Get a new vnode and associate it with our node. */
    363   1.1      jmmv 	error = getnewvnode(VT_TMPFS, mp, tmpfs_vnodeop_p, &vp);
    364  1.43        ad 	if (error != 0) {
    365  1.43        ad 		mutex_exit(&node->tn_vlock);
    366  1.43        ad 		return error;
    367  1.43        ad 	}
    368   1.1      jmmv 
    369   1.1      jmmv 	error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    370   1.1      jmmv 	if (error != 0) {
    371  1.43        ad 		mutex_exit(&node->tn_vlock);
    372   1.1      jmmv 		ungetnewvnode(vp);
    373  1.43        ad 		return error;
    374   1.1      jmmv 	}
    375   1.1      jmmv 
    376   1.1      jmmv 	vp->v_type = node->tn_type;
    377   1.1      jmmv 
    378   1.1      jmmv 	/* Type-specific initialization. */
    379   1.1      jmmv 	switch (node->tn_type) {
    380   1.1      jmmv 	case VBLK:
    381   1.1      jmmv 		/* FALLTHROUGH */
    382   1.1      jmmv 	case VCHR:
    383   1.1      jmmv 		vp->v_op = tmpfs_specop_p;
    384  1.44        ad 		spec_node_init(vp, node->tn_spec.tn_dev.tn_rdev);
    385   1.1      jmmv 		break;
    386   1.1      jmmv 
    387   1.1      jmmv 	case VDIR:
    388  1.40        ad 		vp->v_vflag |= node->tn_spec.tn_dir.tn_parent == node ?
    389  1.40        ad 		    VV_ROOT : 0;
    390   1.1      jmmv 		break;
    391   1.1      jmmv 
    392   1.1      jmmv 	case VFIFO:
    393   1.1      jmmv 		vp->v_op = tmpfs_fifoop_p;
    394   1.1      jmmv 		break;
    395   1.1      jmmv 
    396   1.1      jmmv 	case VLNK:
    397   1.1      jmmv 		/* FALLTHROUGH */
    398   1.1      jmmv 	case VREG:
    399   1.1      jmmv 		/* FALLTHROUGH */
    400   1.1      jmmv 	case VSOCK:
    401   1.1      jmmv 		break;
    402   1.1      jmmv 
    403   1.1      jmmv 	default:
    404   1.1      jmmv 		KASSERT(0);
    405   1.1      jmmv 	}
    406   1.1      jmmv 
    407   1.1      jmmv 	uvm_vnp_setsize(vp, node->tn_size);
    408  1.43        ad 	vp->v_data = node;
    409  1.43        ad 	node->tn_vnode = vp;
    410  1.43        ad 	mutex_exit(&node->tn_vlock);
    411  1.43        ad 	*vpp = vp;
    412   1.1      jmmv 
    413   1.1      jmmv 	KASSERT(IFF(error == 0, *vpp != NULL && VOP_ISLOCKED(*vpp)));
    414  1.40        ad 	KASSERT(*vpp == node->tn_vnode);
    415   1.1      jmmv 
    416   1.1      jmmv 	return error;
    417   1.1      jmmv }
    418   1.1      jmmv 
    419   1.1      jmmv /* --------------------------------------------------------------------- */
    420   1.1      jmmv 
    421   1.8      jmmv /*
    422   1.8      jmmv  * Destroys the association between the vnode vp and the node it
    423   1.8      jmmv  * references.
    424   1.8      jmmv  */
    425   1.1      jmmv void
    426   1.1      jmmv tmpfs_free_vp(struct vnode *vp)
    427   1.1      jmmv {
    428   1.1      jmmv 	struct tmpfs_node *node;
    429   1.1      jmmv 
    430   1.1      jmmv 	node = VP_TO_TMPFS_NODE(vp);
    431   1.1      jmmv 
    432  1.43        ad 	mutex_enter(&node->tn_vlock);
    433   1.1      jmmv 	node->tn_vnode = NULL;
    434  1.43        ad 	mutex_exit(&node->tn_vlock);
    435   1.1      jmmv 	vp->v_data = NULL;
    436   1.1      jmmv }
    437   1.1      jmmv 
    438   1.1      jmmv /* --------------------------------------------------------------------- */
    439   1.1      jmmv 
    440   1.9      jmmv /*
    441   1.9      jmmv  * Allocates a new file of type 'type' and adds it to the parent directory
    442   1.1      jmmv  * 'dvp'; this addition is done using the component name given in 'cnp'.
    443   1.1      jmmv  * The ownership of the new file is automatically assigned based on the
    444   1.1      jmmv  * credentials of the caller (through 'cnp'), the group is set based on
    445   1.1      jmmv  * the parent directory and the mode is determined from the 'vap' argument.
    446   1.1      jmmv  * If successful, *vpp holds a vnode to the newly created file and zero
    447   1.1      jmmv  * is returned.  Otherwise *vpp is NULL and the function returns an
    448   1.9      jmmv  * appropriate error code.
    449   1.9      jmmv  */
    450   1.1      jmmv int
    451   1.1      jmmv tmpfs_alloc_file(struct vnode *dvp, struct vnode **vpp, struct vattr *vap,
    452   1.1      jmmv     struct componentname *cnp, char *target)
    453   1.1      jmmv {
    454   1.1      jmmv 	int error;
    455   1.1      jmmv 	struct tmpfs_dirent *de;
    456   1.1      jmmv 	struct tmpfs_mount *tmp;
    457   1.1      jmmv 	struct tmpfs_node *dnode;
    458   1.1      jmmv 	struct tmpfs_node *node;
    459   1.1      jmmv 	struct tmpfs_node *parent;
    460   1.1      jmmv 
    461   1.1      jmmv 	KASSERT(VOP_ISLOCKED(dvp));
    462   1.1      jmmv 
    463   1.1      jmmv 	tmp = VFS_TO_TMPFS(dvp->v_mount);
    464   1.1      jmmv 	dnode = VP_TO_TMPFS_DIR(dvp);
    465   1.1      jmmv 	*vpp = NULL;
    466   1.1      jmmv 
    467   1.1      jmmv 	/* If the entry we are creating is a directory, we cannot overflow
    468   1.1      jmmv 	 * the number of links of its parent, because it will get a new
    469   1.1      jmmv 	 * link. */
    470   1.1      jmmv 	if (vap->va_type == VDIR) {
    471   1.1      jmmv 		/* Ensure that we do not overflow the maximum number of links
    472   1.1      jmmv 		 * imposed by the system. */
    473   1.1      jmmv 		KASSERT(dnode->tn_links <= LINK_MAX);
    474   1.1      jmmv 		if (dnode->tn_links == LINK_MAX) {
    475   1.1      jmmv 			error = EMLINK;
    476   1.1      jmmv 			goto out;
    477   1.1      jmmv 		}
    478   1.1      jmmv 
    479   1.1      jmmv 		parent = dnode;
    480   1.1      jmmv 	} else
    481   1.1      jmmv 		parent = NULL;
    482   1.1      jmmv 
    483   1.1      jmmv 	/* Allocate a node that represents the new file. */
    484  1.19      elad 	error = tmpfs_alloc_node(tmp, vap->va_type, kauth_cred_geteuid(cnp->cn_cred),
    485  1.42     pooka 	    dnode->tn_gid, vap->va_mode, parent, target, vap->va_rdev, &node);
    486   1.1      jmmv 	if (error != 0)
    487   1.1      jmmv 		goto out;
    488   1.1      jmmv 
    489   1.1      jmmv 	/* Allocate a directory entry that points to the new file. */
    490   1.1      jmmv 	error = tmpfs_alloc_dirent(tmp, node, cnp->cn_nameptr, cnp->cn_namelen,
    491   1.1      jmmv 	    &de);
    492   1.1      jmmv 	if (error != 0) {
    493   1.1      jmmv 		tmpfs_free_node(tmp, node);
    494   1.1      jmmv 		goto out;
    495   1.1      jmmv 	}
    496   1.1      jmmv 
    497   1.1      jmmv 	/* Allocate a vnode for the new file. */
    498   1.1      jmmv 	error = tmpfs_alloc_vp(dvp->v_mount, node, vpp);
    499   1.1      jmmv 	if (error != 0) {
    500  1.34   thorpej 		tmpfs_free_dirent(tmp, de, true);
    501   1.1      jmmv 		tmpfs_free_node(tmp, node);
    502   1.1      jmmv 		goto out;
    503   1.1      jmmv 	}
    504   1.1      jmmv 
    505   1.1      jmmv 	/* Now that all required items are allocated, we can proceed to
    506   1.1      jmmv 	 * insert the new node into the directory, an operation that
    507   1.1      jmmv 	 * cannot fail. */
    508   1.1      jmmv 	tmpfs_dir_attach(dvp, de);
    509  1.43        ad 	if (vap->va_type == VDIR) {
    510  1.43        ad 		VN_KNOTE(dvp, NOTE_LINK);
    511  1.43        ad 		dnode->tn_links++;
    512  1.43        ad 		KASSERT(dnode->tn_links <= LINK_MAX);
    513  1.43        ad 	}
    514   1.1      jmmv 
    515   1.1      jmmv out:
    516   1.1      jmmv 	vput(dvp);
    517   1.1      jmmv 
    518   1.1      jmmv 	KASSERT(IFF(error == 0, *vpp != NULL));
    519   1.1      jmmv 
    520   1.1      jmmv 	return error;
    521   1.1      jmmv }
    522   1.1      jmmv 
    523   1.1      jmmv /* --------------------------------------------------------------------- */
    524   1.1      jmmv 
    525   1.8      jmmv /*
    526   1.8      jmmv  * Attaches the directory entry de to the directory represented by vp.
    527   1.8      jmmv  * Note that this does not change the link count of the node pointed by
    528   1.8      jmmv  * the directory entry, as this is done by tmpfs_alloc_dirent.
    529  1.29      jmmv  *
    530  1.29      jmmv  * As the "parent" directory changes, interested parties are notified of
    531  1.29      jmmv  * a write to it.
    532   1.8      jmmv  */
    533   1.1      jmmv void
    534   1.1      jmmv tmpfs_dir_attach(struct vnode *vp, struct tmpfs_dirent *de)
    535   1.1      jmmv {
    536   1.1      jmmv 	struct tmpfs_node *dnode;
    537   1.1      jmmv 
    538  1.58     rmind 	KASSERT(VOP_ISLOCKED(vp));
    539   1.1      jmmv 	dnode = VP_TO_TMPFS_DIR(vp);
    540   1.1      jmmv 
    541  1.18      jmmv 	TAILQ_INSERT_TAIL(&dnode->tn_spec.tn_dir.tn_dir, de, td_entries);
    542   1.1      jmmv 	dnode->tn_size += sizeof(struct tmpfs_dirent);
    543   1.1      jmmv 	dnode->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
    544   1.1      jmmv 	    TMPFS_NODE_MODIFIED;
    545   1.1      jmmv 	uvm_vnp_setsize(vp, dnode->tn_size);
    546  1.29      jmmv 
    547  1.29      jmmv 	VN_KNOTE(vp, NOTE_WRITE);
    548   1.1      jmmv }
    549   1.1      jmmv 
    550   1.1      jmmv /* --------------------------------------------------------------------- */
    551   1.1      jmmv 
    552   1.8      jmmv /*
    553   1.8      jmmv  * Detaches the directory entry de from the directory represented by vp.
    554   1.8      jmmv  * Note that this does not change the link count of the node pointed by
    555   1.8      jmmv  * the directory entry, as this is done by tmpfs_free_dirent.
    556  1.29      jmmv  *
    557  1.29      jmmv  * As the "parent" directory changes, interested parties are notified of
    558  1.29      jmmv  * a write to it.
    559   1.8      jmmv  */
    560   1.1      jmmv void
    561   1.1      jmmv tmpfs_dir_detach(struct vnode *vp, struct tmpfs_dirent *de)
    562   1.1      jmmv {
    563   1.1      jmmv 	struct tmpfs_node *dnode;
    564   1.1      jmmv 
    565   1.5      yamt 	KASSERT(VOP_ISLOCKED(vp));
    566   1.1      jmmv 	dnode = VP_TO_TMPFS_DIR(vp);
    567   1.1      jmmv 
    568  1.18      jmmv 	if (dnode->tn_spec.tn_dir.tn_readdir_lastp == de) {
    569  1.18      jmmv 		dnode->tn_spec.tn_dir.tn_readdir_lastn = 0;
    570  1.18      jmmv 		dnode->tn_spec.tn_dir.tn_readdir_lastp = NULL;
    571   1.5      yamt 	}
    572   1.5      yamt 
    573  1.18      jmmv 	TAILQ_REMOVE(&dnode->tn_spec.tn_dir.tn_dir, de, td_entries);
    574   1.1      jmmv 	dnode->tn_size -= sizeof(struct tmpfs_dirent);
    575   1.1      jmmv 	dnode->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
    576   1.1      jmmv 	    TMPFS_NODE_MODIFIED;
    577   1.1      jmmv 	uvm_vnp_setsize(vp, dnode->tn_size);
    578  1.29      jmmv 
    579  1.29      jmmv 	VN_KNOTE(vp, NOTE_WRITE);
    580   1.1      jmmv }
    581   1.1      jmmv 
    582   1.1      jmmv /* --------------------------------------------------------------------- */
    583   1.1      jmmv 
    584   1.8      jmmv /*
    585   1.8      jmmv  * Looks for a directory entry in the directory represented by node.
    586   1.8      jmmv  * 'cnp' describes the name of the entry to look for.  Note that the .
    587   1.8      jmmv  * and .. components are not allowed as they do not physically exist
    588   1.8      jmmv  * within directories.
    589   1.8      jmmv  *
    590   1.8      jmmv  * Returns a pointer to the entry when found, otherwise NULL.
    591   1.8      jmmv  */
    592   1.1      jmmv struct tmpfs_dirent *
    593   1.1      jmmv tmpfs_dir_lookup(struct tmpfs_node *node, struct componentname *cnp)
    594   1.1      jmmv {
    595   1.1      jmmv 	struct tmpfs_dirent *de;
    596   1.1      jmmv 
    597  1.49      yamt 	KASSERT(VOP_ISLOCKED(node->tn_vnode));
    598   1.1      jmmv 	KASSERT(IMPLIES(cnp->cn_namelen == 1, cnp->cn_nameptr[0] != '.'));
    599   1.1      jmmv 	KASSERT(IMPLIES(cnp->cn_namelen == 2, !(cnp->cn_nameptr[0] == '.' &&
    600   1.1      jmmv 	    cnp->cn_nameptr[1] == '.')));
    601   1.1      jmmv 	TMPFS_VALIDATE_DIR(node);
    602   1.1      jmmv 
    603   1.1      jmmv 	node->tn_status |= TMPFS_NODE_ACCESSED;
    604   1.1      jmmv 
    605  1.18      jmmv 	TAILQ_FOREACH(de, &node->tn_spec.tn_dir.tn_dir, td_entries) {
    606   1.1      jmmv 		KASSERT(cnp->cn_namelen < 0xffff);
    607   1.1      jmmv 		if (de->td_namelen == (uint16_t)cnp->cn_namelen &&
    608  1.40        ad 		    memcmp(de->td_name, cnp->cn_nameptr, de->td_namelen) == 0) {
    609   1.1      jmmv 			break;
    610  1.40        ad 		}
    611   1.1      jmmv 	}
    612   1.1      jmmv 
    613  1.49      yamt 	return de;
    614   1.1      jmmv }
    615   1.1      jmmv 
    616   1.1      jmmv /* --------------------------------------------------------------------- */
    617   1.1      jmmv 
    618   1.9      jmmv /*
    619   1.9      jmmv  * Helper function for tmpfs_readdir.  Creates a '.' entry for the given
    620   1.1      jmmv  * directory and returns it in the uio space.  The function returns 0
    621   1.1      jmmv  * on success, -1 if there was not enough space in the uio structure to
    622   1.1      jmmv  * hold the directory entry or an appropriate error code if another
    623   1.9      jmmv  * error happens.
    624   1.9      jmmv  */
    625   1.1      jmmv int
    626   1.1      jmmv tmpfs_dir_getdotdent(struct tmpfs_node *node, struct uio *uio)
    627   1.1      jmmv {
    628   1.1      jmmv 	int error;
    629  1.37    rumble 	struct dirent *dentp;
    630   1.1      jmmv 
    631   1.1      jmmv 	TMPFS_VALIDATE_DIR(node);
    632   1.5      yamt 	KASSERT(uio->uio_offset == TMPFS_DIRCOOKIE_DOT);
    633   1.1      jmmv 
    634  1.56     rmind 	dentp = kmem_alloc(sizeof(struct dirent), KM_SLEEP);
    635  1.37    rumble 
    636  1.37    rumble 	dentp->d_fileno = node->tn_id;
    637  1.37    rumble 	dentp->d_type = DT_DIR;
    638  1.37    rumble 	dentp->d_namlen = 1;
    639  1.37    rumble 	dentp->d_name[0] = '.';
    640  1.37    rumble 	dentp->d_name[1] = '\0';
    641  1.37    rumble 	dentp->d_reclen = _DIRENT_SIZE(dentp);
    642   1.1      jmmv 
    643  1.37    rumble 	if (dentp->d_reclen > uio->uio_resid)
    644   1.1      jmmv 		error = -1;
    645   1.1      jmmv 	else {
    646  1.37    rumble 		error = uiomove(dentp, dentp->d_reclen, uio);
    647   1.1      jmmv 		if (error == 0)
    648   1.5      yamt 			uio->uio_offset = TMPFS_DIRCOOKIE_DOTDOT;
    649   1.1      jmmv 	}
    650   1.1      jmmv 
    651   1.1      jmmv 	node->tn_status |= TMPFS_NODE_ACCESSED;
    652   1.1      jmmv 
    653  1.43        ad 	kmem_free(dentp, sizeof(struct dirent));
    654   1.1      jmmv 	return error;
    655   1.1      jmmv }
    656   1.1      jmmv 
    657   1.1      jmmv /* --------------------------------------------------------------------- */
    658   1.1      jmmv 
    659   1.9      jmmv /*
    660   1.9      jmmv  * Helper function for tmpfs_readdir.  Creates a '..' entry for the given
    661   1.1      jmmv  * directory and returns it in the uio space.  The function returns 0
    662   1.1      jmmv  * on success, -1 if there was not enough space in the uio structure to
    663   1.1      jmmv  * hold the directory entry or an appropriate error code if another
    664   1.9      jmmv  * error happens.
    665   1.9      jmmv  */
    666   1.1      jmmv int
    667   1.1      jmmv tmpfs_dir_getdotdotdent(struct tmpfs_node *node, struct uio *uio)
    668   1.1      jmmv {
    669   1.1      jmmv 	int error;
    670  1.37    rumble 	struct dirent *dentp;
    671   1.1      jmmv 
    672   1.1      jmmv 	TMPFS_VALIDATE_DIR(node);
    673   1.5      yamt 	KASSERT(uio->uio_offset == TMPFS_DIRCOOKIE_DOTDOT);
    674   1.1      jmmv 
    675  1.56     rmind 	dentp = kmem_alloc(sizeof(struct dirent), KM_SLEEP);
    676  1.37    rumble 
    677  1.37    rumble 	dentp->d_fileno = node->tn_spec.tn_dir.tn_parent->tn_id;
    678  1.37    rumble 	dentp->d_type = DT_DIR;
    679  1.37    rumble 	dentp->d_namlen = 2;
    680  1.37    rumble 	dentp->d_name[0] = '.';
    681  1.37    rumble 	dentp->d_name[1] = '.';
    682  1.37    rumble 	dentp->d_name[2] = '\0';
    683  1.37    rumble 	dentp->d_reclen = _DIRENT_SIZE(dentp);
    684   1.1      jmmv 
    685  1.37    rumble 	if (dentp->d_reclen > uio->uio_resid)
    686   1.1      jmmv 		error = -1;
    687   1.1      jmmv 	else {
    688  1.37    rumble 		error = uiomove(dentp, dentp->d_reclen, uio);
    689   1.5      yamt 		if (error == 0) {
    690   1.5      yamt 			struct tmpfs_dirent *de;
    691   1.5      yamt 
    692  1.18      jmmv 			de = TAILQ_FIRST(&node->tn_spec.tn_dir.tn_dir);
    693   1.5      yamt 			if (de == NULL)
    694   1.5      yamt 				uio->uio_offset = TMPFS_DIRCOOKIE_EOF;
    695   1.5      yamt 			else
    696  1.27      jmmv 				uio->uio_offset = tmpfs_dircookie(de);
    697   1.5      yamt 		}
    698   1.1      jmmv 	}
    699   1.1      jmmv 
    700   1.1      jmmv 	node->tn_status |= TMPFS_NODE_ACCESSED;
    701   1.1      jmmv 
    702  1.43        ad 	kmem_free(dentp, sizeof(struct dirent));
    703   1.1      jmmv 	return error;
    704   1.1      jmmv }
    705   1.1      jmmv 
    706   1.1      jmmv /* --------------------------------------------------------------------- */
    707   1.1      jmmv 
    708   1.9      jmmv /*
    709   1.9      jmmv  * Lookup a directory entry by its associated cookie.
    710   1.9      jmmv  */
    711   1.5      yamt struct tmpfs_dirent *
    712   1.5      yamt tmpfs_dir_lookupbycookie(struct tmpfs_node *node, off_t cookie)
    713   1.5      yamt {
    714   1.5      yamt 	struct tmpfs_dirent *de;
    715   1.5      yamt 
    716  1.49      yamt 	KASSERT(VOP_ISLOCKED(node->tn_vnode));
    717  1.49      yamt 
    718  1.18      jmmv 	if (cookie == node->tn_spec.tn_dir.tn_readdir_lastn &&
    719  1.18      jmmv 	    node->tn_spec.tn_dir.tn_readdir_lastp != NULL) {
    720  1.18      jmmv 		return node->tn_spec.tn_dir.tn_readdir_lastp;
    721   1.5      yamt 	}
    722   1.5      yamt 
    723  1.18      jmmv 	TAILQ_FOREACH(de, &node->tn_spec.tn_dir.tn_dir, td_entries) {
    724  1.27      jmmv 		if (tmpfs_dircookie(de) == cookie) {
    725   1.5      yamt 			break;
    726   1.5      yamt 		}
    727   1.5      yamt 	}
    728   1.5      yamt 
    729   1.5      yamt 	return de;
    730   1.5      yamt }
    731   1.5      yamt 
    732   1.5      yamt /* --------------------------------------------------------------------- */
    733   1.5      yamt 
    734   1.9      jmmv /*
    735   1.9      jmmv  * Helper function for tmpfs_readdir.  Returns as much directory entries
    736   1.1      jmmv  * as can fit in the uio space.  The read starts at uio->uio_offset.
    737   1.1      jmmv  * The function returns 0 on success, -1 if there was not enough space
    738   1.1      jmmv  * in the uio structure to hold the directory entry or an appropriate
    739   1.9      jmmv  * error code if another error happens.
    740   1.9      jmmv  */
    741   1.1      jmmv int
    742   1.5      yamt tmpfs_dir_getdents(struct tmpfs_node *node, struct uio *uio, off_t *cntp)
    743   1.1      jmmv {
    744   1.1      jmmv 	int error;
    745   1.5      yamt 	off_t startcookie;
    746  1.37    rumble 	struct dirent *dentp;
    747   1.1      jmmv 	struct tmpfs_dirent *de;
    748   1.1      jmmv 
    749  1.49      yamt 	KASSERT(VOP_ISLOCKED(node->tn_vnode));
    750   1.1      jmmv 	TMPFS_VALIDATE_DIR(node);
    751   1.1      jmmv 
    752   1.1      jmmv 	/* Locate the first directory entry we have to return.  We have cached
    753   1.1      jmmv 	 * the last readdir in the node, so use those values if appropriate.
    754   1.1      jmmv 	 * Otherwise do a linear scan to find the requested entry. */
    755   1.5      yamt 	startcookie = uio->uio_offset;
    756   1.5      yamt 	KASSERT(startcookie != TMPFS_DIRCOOKIE_DOT);
    757   1.5      yamt 	KASSERT(startcookie != TMPFS_DIRCOOKIE_DOTDOT);
    758   1.5      yamt 	if (startcookie == TMPFS_DIRCOOKIE_EOF) {
    759   1.5      yamt 		return 0;
    760   1.1      jmmv 	} else {
    761   1.5      yamt 		de = tmpfs_dir_lookupbycookie(node, startcookie);
    762   1.5      yamt 	}
    763   1.5      yamt 	if (de == NULL) {
    764   1.5      yamt 		return EINVAL;
    765   1.1      jmmv 	}
    766   1.1      jmmv 
    767  1.56     rmind 	dentp = kmem_alloc(sizeof(struct dirent), KM_SLEEP);
    768  1.37    rumble 
    769   1.1      jmmv 	/* Read as much entries as possible; i.e., until we reach the end of
    770   1.1      jmmv 	 * the directory or we exhaust uio space. */
    771   1.1      jmmv 	do {
    772   1.1      jmmv 		/* Create a dirent structure representing the current
    773   1.1      jmmv 		 * tmpfs_node and fill it. */
    774  1.62     pooka 		if (de->td_node == TMPFS_NODE_WHITEOUT) {
    775  1.62     pooka 			dentp->d_fileno = 1;
    776  1.62     pooka 			dentp->d_type = DT_WHT;
    777  1.62     pooka 		} else {
    778  1.62     pooka 			dentp->d_fileno = de->td_node->tn_id;
    779  1.62     pooka 			switch (de->td_node->tn_type) {
    780  1.62     pooka 			case VBLK:
    781  1.62     pooka 				dentp->d_type = DT_BLK;
    782   1.1      jmmv 			break;
    783   1.1      jmmv 
    784  1.62     pooka 			case VCHR:
    785  1.62     pooka 				dentp->d_type = DT_CHR;
    786  1.62     pooka 				break;
    787  1.62     pooka 
    788  1.62     pooka 			case VDIR:
    789  1.62     pooka 				dentp->d_type = DT_DIR;
    790  1.62     pooka 				break;
    791  1.62     pooka 
    792  1.62     pooka 			case VFIFO:
    793  1.62     pooka 				dentp->d_type = DT_FIFO;
    794  1.62     pooka 				break;
    795  1.62     pooka 
    796  1.62     pooka 			case VLNK:
    797  1.62     pooka 				dentp->d_type = DT_LNK;
    798  1.62     pooka 				break;
    799  1.62     pooka 
    800  1.62     pooka 			case VREG:
    801  1.62     pooka 				dentp->d_type = DT_REG;
    802  1.62     pooka 				break;
    803   1.1      jmmv 
    804  1.62     pooka 			case VSOCK:
    805  1.62     pooka 				dentp->d_type = DT_SOCK;
    806   1.1      jmmv 			break;
    807   1.1      jmmv 
    808  1.62     pooka 			default:
    809  1.62     pooka 				KASSERT(0);
    810  1.62     pooka 			}
    811   1.1      jmmv 		}
    812  1.37    rumble 		dentp->d_namlen = de->td_namelen;
    813  1.37    rumble 		KASSERT(de->td_namelen < sizeof(dentp->d_name));
    814  1.37    rumble 		(void)memcpy(dentp->d_name, de->td_name, de->td_namelen);
    815  1.37    rumble 		dentp->d_name[de->td_namelen] = '\0';
    816  1.37    rumble 		dentp->d_reclen = _DIRENT_SIZE(dentp);
    817   1.1      jmmv 
    818   1.1      jmmv 		/* Stop reading if the directory entry we are treating is
    819   1.1      jmmv 		 * bigger than the amount of data that can be returned. */
    820  1.37    rumble 		if (dentp->d_reclen > uio->uio_resid) {
    821   1.1      jmmv 			error = -1;
    822   1.1      jmmv 			break;
    823   1.1      jmmv 		}
    824   1.1      jmmv 
    825   1.1      jmmv 		/* Copy the new dirent structure into the output buffer and
    826   1.1      jmmv 		 * advance pointers. */
    827  1.37    rumble 		error = uiomove(dentp, dentp->d_reclen, uio);
    828   1.1      jmmv 
    829   1.5      yamt 		(*cntp)++;
    830   1.1      jmmv 		de = TAILQ_NEXT(de, td_entries);
    831   1.1      jmmv 	} while (error == 0 && uio->uio_resid > 0 && de != NULL);
    832   1.1      jmmv 
    833   1.5      yamt 	/* Update the offset and cache. */
    834   1.1      jmmv 	if (de == NULL) {
    835   1.5      yamt 		uio->uio_offset = TMPFS_DIRCOOKIE_EOF;
    836  1.18      jmmv 		node->tn_spec.tn_dir.tn_readdir_lastn = 0;
    837  1.18      jmmv 		node->tn_spec.tn_dir.tn_readdir_lastp = NULL;
    838   1.1      jmmv 	} else {
    839  1.18      jmmv 		node->tn_spec.tn_dir.tn_readdir_lastn = uio->uio_offset =
    840  1.27      jmmv 		    tmpfs_dircookie(de);
    841  1.18      jmmv 		node->tn_spec.tn_dir.tn_readdir_lastp = de;
    842   1.1      jmmv 	}
    843   1.1      jmmv 
    844   1.1      jmmv 	node->tn_status |= TMPFS_NODE_ACCESSED;
    845   1.1      jmmv 
    846  1.43        ad 	kmem_free(dentp, sizeof(struct dirent));
    847   1.1      jmmv 	return error;
    848   1.1      jmmv }
    849   1.1      jmmv 
    850   1.1      jmmv /* --------------------------------------------------------------------- */
    851   1.1      jmmv 
    852   1.8      jmmv /*
    853   1.8      jmmv  * Resizes the aobj associated to the regular file pointed to by vp to
    854   1.8      jmmv  * the size newsize.  'vp' must point to a vnode that represents a regular
    855   1.8      jmmv  * file.  'newsize' must be positive.
    856   1.8      jmmv  *
    857  1.29      jmmv  * If the file is extended, the appropriate kevent is raised.  This does
    858  1.29      jmmv  * not rise a write event though because resizing is not the same as
    859  1.29      jmmv  * writing.
    860  1.29      jmmv  *
    861   1.8      jmmv  * Returns zero on success or an appropriate error code on failure.
    862   1.8      jmmv  */
    863   1.1      jmmv int
    864   1.1      jmmv tmpfs_reg_resize(struct vnode *vp, off_t newsize)
    865   1.1      jmmv {
    866  1.57     rmind 	size_t newpages, oldpages;
    867   1.1      jmmv 	struct tmpfs_mount *tmp;
    868   1.1      jmmv 	struct tmpfs_node *node;
    869  1.13      yamt 	off_t oldsize;
    870   1.1      jmmv 
    871   1.1      jmmv 	KASSERT(vp->v_type == VREG);
    872   1.1      jmmv 	KASSERT(newsize >= 0);
    873   1.1      jmmv 
    874   1.1      jmmv 	node = VP_TO_TMPFS_NODE(vp);
    875   1.1      jmmv 	tmp = VFS_TO_TMPFS(vp->v_mount);
    876   1.1      jmmv 
    877  1.13      yamt 	oldsize = node->tn_size;
    878  1.57     rmind 	oldpages = round_page(oldsize) >> PAGE_SHIFT;
    879  1.57     rmind 	newpages = round_page(newsize) >> PAGE_SHIFT;
    880  1.18      jmmv 	KASSERT(oldpages == node->tn_spec.tn_reg.tn_aobj_pages);
    881   1.1      jmmv 
    882  1.57     rmind 	if (newpages > oldpages) {
    883  1.57     rmind 		/* Increase the used-memory counter if getting extra pages. */
    884  1.57     rmind 		if (!tmpfs_mem_incr(tmp, (newpages - oldpages) << PAGE_SHIFT)) {
    885  1.57     rmind 			return ENOSPC;
    886  1.57     rmind 		}
    887  1.57     rmind 	} else if (newsize < oldsize) {
    888  1.13      yamt 		int zerolen = MIN(round_page(newsize), node->tn_size) - newsize;
    889  1.13      yamt 
    890  1.57     rmind 		/* Zero out the truncated part of the last page. */
    891  1.13      yamt 		uvm_vnp_zerorange(vp, newsize, zerolen);
    892  1.13      yamt 	}
    893   1.1      jmmv 
    894  1.36     pooka 	node->tn_spec.tn_reg.tn_aobj_pages = newpages;
    895  1.36     pooka 	node->tn_size = newsize;
    896  1.36     pooka 	uvm_vnp_setsize(vp, newsize);
    897  1.36     pooka 
    898  1.43        ad 	/*
    899  1.57     rmind 	 * Free "backing store".
    900  1.43        ad 	 */
    901  1.43        ad 	if (newpages < oldpages) {
    902  1.43        ad 		struct uvm_object *uobj;
    903  1.43        ad 
    904  1.43        ad 		uobj = node->tn_spec.tn_reg.tn_aobj;
    905  1.43        ad 
    906  1.43        ad 		mutex_enter(&uobj->vmobjlock);
    907  1.43        ad 		uao_dropswap_range(uobj, newpages, oldpages);
    908  1.43        ad 		mutex_exit(&uobj->vmobjlock);
    909  1.57     rmind 
    910  1.57     rmind 		/* Decrease the used-memory counter. */
    911  1.57     rmind 		tmpfs_mem_decr(tmp, (oldpages - newpages) << PAGE_SHIFT);
    912  1.43        ad 	}
    913  1.40        ad 
    914  1.29      jmmv 	if (newsize > oldsize)
    915  1.29      jmmv 		VN_KNOTE(vp, NOTE_EXTEND);
    916  1.29      jmmv 
    917  1.57     rmind 	return 0;
    918   1.1      jmmv }
    919   1.1      jmmv 
    920   1.9      jmmv /*
    921   1.9      jmmv  * Change flags of the given vnode.
    922  1.12      yamt  * Caller should execute tmpfs_update on vp after a successful execution.
    923   1.9      jmmv  * The vnode must be locked on entry and remain locked on exit.
    924   1.9      jmmv  */
    925   1.1      jmmv int
    926  1.22        ad tmpfs_chflags(struct vnode *vp, int flags, kauth_cred_t cred, struct lwp *l)
    927   1.1      jmmv {
    928   1.1      jmmv 	int error;
    929   1.1      jmmv 	struct tmpfs_node *node;
    930  1.55     pooka 	kauth_action_t action = KAUTH_VNODE_WRITE_FLAGS;
    931  1.54      elad 	int fs_decision = 0;
    932   1.1      jmmv 
    933   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
    934   1.1      jmmv 
    935   1.1      jmmv 	node = VP_TO_TMPFS_NODE(vp);
    936   1.1      jmmv 
    937   1.1      jmmv 	/* Disallow this operation if the file system is mounted read-only. */
    938   1.1      jmmv 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
    939   1.1      jmmv 		return EROFS;
    940   1.1      jmmv 
    941  1.54      elad 	if (kauth_cred_geteuid(cred) != node->tn_uid)
    942  1.54      elad 		fs_decision = EACCES;
    943  1.54      elad 
    944  1.54      elad 	/*
    945  1.54      elad 	 * If the new flags have non-user flags that are different than
    946  1.54      elad 	 * those on the node, we need special permission to change them.
    947  1.54      elad 	 */
    948  1.54      elad 	if ((flags & SF_SETTABLE) != (node->tn_flags & SF_SETTABLE)) {
    949  1.54      elad 		action |= KAUTH_VNODE_WRITE_SYSFLAGS;
    950  1.54      elad 		if (!fs_decision)
    951  1.54      elad 			fs_decision = EPERM;
    952  1.54      elad 	}
    953  1.54      elad 
    954  1.54      elad 	/*
    955  1.54      elad 	 * Indicate that this node's flags have system attributes in them if
    956  1.54      elad 	 * that's the case.
    957  1.54      elad 	 */
    958  1.54      elad 	if (node->tn_flags & (SF_IMMUTABLE | SF_APPEND)) {
    959  1.54      elad 		action |= KAUTH_VNODE_HAS_SYSFLAGS;
    960  1.54      elad 	}
    961  1.54      elad 
    962  1.54      elad 	error = kauth_authorize_vnode(cred, action, vp, NULL, fs_decision);
    963  1.54      elad 	if (error)
    964   1.1      jmmv 		return error;
    965  1.54      elad 
    966  1.54      elad 	/*
    967  1.54      elad 	 * Set the flags. If we're not setting non-user flags, be careful not
    968  1.54      elad 	 * to overwrite them.
    969  1.54      elad 	 *
    970  1.54      elad 	 * XXX: Can't we always assign here? if the system flags are different,
    971  1.54      elad 	 *      the code above should catch attempts to change them without
    972  1.54      elad 	 *      proper permissions, and if we're here it means it's okay to
    973  1.54      elad 	 *      change them...
    974  1.54      elad 	 */
    975  1.54      elad 	if (action & KAUTH_VNODE_WRITE_SYSFLAGS) {
    976   1.1      jmmv 		node->tn_flags = flags;
    977   1.1      jmmv 	} else {
    978  1.54      elad 		/* Clear all user-settable flags and re-set them. */
    979   1.1      jmmv 		node->tn_flags &= SF_SETTABLE;
    980   1.1      jmmv 		node->tn_flags |= (flags & UF_SETTABLE);
    981   1.1      jmmv 	}
    982   1.1      jmmv 
    983   1.1      jmmv 	node->tn_status |= TMPFS_NODE_CHANGED;
    984   1.1      jmmv 	VN_KNOTE(vp, NOTE_ATTRIB);
    985   1.1      jmmv 
    986   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
    987   1.1      jmmv 
    988   1.1      jmmv 	return 0;
    989   1.1      jmmv }
    990   1.1      jmmv 
    991   1.1      jmmv /* --------------------------------------------------------------------- */
    992   1.1      jmmv 
    993   1.9      jmmv /*
    994   1.9      jmmv  * Change access mode on the given vnode.
    995  1.12      yamt  * Caller should execute tmpfs_update on vp after a successful execution.
    996   1.9      jmmv  * The vnode must be locked on entry and remain locked on exit.
    997   1.9      jmmv  */
    998   1.1      jmmv int
    999  1.22        ad tmpfs_chmod(struct vnode *vp, mode_t mode, kauth_cred_t cred, struct lwp *l)
   1000   1.1      jmmv {
   1001  1.51      elad 	int error;
   1002   1.1      jmmv 	struct tmpfs_node *node;
   1003   1.1      jmmv 
   1004   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1005   1.1      jmmv 
   1006   1.1      jmmv 	node = VP_TO_TMPFS_NODE(vp);
   1007   1.1      jmmv 
   1008   1.1      jmmv 	/* Disallow this operation if the file system is mounted read-only. */
   1009   1.1      jmmv 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1010   1.1      jmmv 		return EROFS;
   1011   1.1      jmmv 
   1012   1.1      jmmv 	/* Immutable or append-only files cannot be modified, either. */
   1013   1.1      jmmv 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1014   1.1      jmmv 		return EPERM;
   1015   1.1      jmmv 
   1016  1.52      elad 	error = genfs_can_chmod(vp, cred, node->tn_uid, node->tn_gid,
   1017  1.51      elad 	    mode);
   1018  1.54      elad 
   1019  1.54      elad 	error = kauth_authorize_vnode(cred, KAUTH_VNODE_WRITE_SECURITY, vp,
   1020  1.54      elad 	    NULL, error);
   1021  1.51      elad 	if (error)
   1022  1.51      elad 		return (error);
   1023   1.1      jmmv 
   1024   1.1      jmmv 	node->tn_mode = (mode & ALLPERMS);
   1025   1.1      jmmv 
   1026   1.1      jmmv 	node->tn_status |= TMPFS_NODE_CHANGED;
   1027   1.1      jmmv 	VN_KNOTE(vp, NOTE_ATTRIB);
   1028   1.1      jmmv 
   1029   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1030   1.1      jmmv 
   1031   1.1      jmmv 	return 0;
   1032   1.1      jmmv }
   1033   1.1      jmmv 
   1034   1.1      jmmv /* --------------------------------------------------------------------- */
   1035   1.1      jmmv 
   1036   1.9      jmmv /*
   1037   1.9      jmmv  * Change ownership of the given vnode.  At least one of uid or gid must
   1038   1.1      jmmv  * be different than VNOVAL.  If one is set to that value, the attribute
   1039   1.1      jmmv  * is unchanged.
   1040  1.12      yamt  * Caller should execute tmpfs_update on vp after a successful execution.
   1041   1.9      jmmv  * The vnode must be locked on entry and remain locked on exit.
   1042   1.9      jmmv  */
   1043   1.1      jmmv int
   1044  1.19      elad tmpfs_chown(struct vnode *vp, uid_t uid, gid_t gid, kauth_cred_t cred,
   1045  1.22        ad     struct lwp *l)
   1046   1.1      jmmv {
   1047  1.51      elad 	int error;
   1048   1.1      jmmv 	struct tmpfs_node *node;
   1049   1.1      jmmv 
   1050   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1051   1.1      jmmv 
   1052   1.1      jmmv 	node = VP_TO_TMPFS_NODE(vp);
   1053   1.1      jmmv 
   1054   1.1      jmmv 	/* Assign default values if they are unknown. */
   1055   1.1      jmmv 	KASSERT(uid != VNOVAL || gid != VNOVAL);
   1056   1.1      jmmv 	if (uid == VNOVAL)
   1057   1.1      jmmv 		uid = node->tn_uid;
   1058   1.1      jmmv 	if (gid == VNOVAL)
   1059   1.1      jmmv 		gid = node->tn_gid;
   1060   1.1      jmmv 	KASSERT(uid != VNOVAL && gid != VNOVAL);
   1061   1.1      jmmv 
   1062   1.1      jmmv 	/* Disallow this operation if the file system is mounted read-only. */
   1063   1.1      jmmv 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1064   1.1      jmmv 		return EROFS;
   1065   1.1      jmmv 
   1066   1.1      jmmv 	/* Immutable or append-only files cannot be modified, either. */
   1067   1.1      jmmv 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1068   1.1      jmmv 		return EPERM;
   1069   1.1      jmmv 
   1070  1.52      elad 	error = genfs_can_chown(vp, cred, node->tn_uid, node->tn_gid, uid,
   1071  1.51      elad 	    gid);
   1072  1.54      elad 
   1073  1.54      elad 	error = kauth_authorize_vnode(cred, KAUTH_VNODE_CHANGE_OWNERSHIP, vp,
   1074  1.54      elad 	    NULL, error);
   1075  1.51      elad 	if (error)
   1076  1.51      elad 		return (error);
   1077   1.1      jmmv 
   1078   1.1      jmmv 	node->tn_uid = uid;
   1079   1.1      jmmv 	node->tn_gid = gid;
   1080   1.1      jmmv 
   1081   1.1      jmmv 	node->tn_status |= TMPFS_NODE_CHANGED;
   1082   1.1      jmmv 	VN_KNOTE(vp, NOTE_ATTRIB);
   1083   1.1      jmmv 
   1084   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1085   1.1      jmmv 
   1086   1.1      jmmv 	return 0;
   1087   1.1      jmmv }
   1088   1.1      jmmv 
   1089   1.1      jmmv /* --------------------------------------------------------------------- */
   1090   1.1      jmmv 
   1091   1.9      jmmv /*
   1092   1.9      jmmv  * Change size of the given vnode.
   1093  1.12      yamt  * Caller should execute tmpfs_update on vp after a successful execution.
   1094   1.9      jmmv  * The vnode must be locked on entry and remain locked on exit.
   1095   1.9      jmmv  */
   1096   1.1      jmmv int
   1097  1.30  christos tmpfs_chsize(struct vnode *vp, u_quad_t size, kauth_cred_t cred,
   1098  1.30  christos     struct lwp *l)
   1099   1.1      jmmv {
   1100   1.1      jmmv 	int error;
   1101   1.1      jmmv 	struct tmpfs_node *node;
   1102   1.1      jmmv 
   1103   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1104   1.1      jmmv 
   1105   1.1      jmmv 	node = VP_TO_TMPFS_NODE(vp);
   1106   1.1      jmmv 
   1107   1.1      jmmv 	/* Decide whether this is a valid operation based on the file type. */
   1108   1.1      jmmv 	error = 0;
   1109   1.1      jmmv 	switch (vp->v_type) {
   1110   1.1      jmmv 	case VDIR:
   1111   1.1      jmmv 		return EISDIR;
   1112   1.1      jmmv 
   1113   1.1      jmmv 	case VREG:
   1114   1.1      jmmv 		if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1115   1.1      jmmv 			return EROFS;
   1116   1.1      jmmv 		break;
   1117   1.1      jmmv 
   1118   1.1      jmmv 	case VBLK:
   1119   1.1      jmmv 		/* FALLTHROUGH */
   1120   1.1      jmmv 	case VCHR:
   1121   1.1      jmmv 		/* FALLTHROUGH */
   1122   1.1      jmmv 	case VFIFO:
   1123   1.1      jmmv 		/* Allow modifications of special files even if in the file
   1124   1.1      jmmv 		 * system is mounted read-only (we are not modifying the
   1125   1.1      jmmv 		 * files themselves, but the objects they represent). */
   1126  1.14      yamt 		return 0;
   1127   1.1      jmmv 
   1128   1.1      jmmv 	default:
   1129   1.1      jmmv 		/* Anything else is unsupported. */
   1130  1.14      yamt 		return EOPNOTSUPP;
   1131   1.1      jmmv 	}
   1132   1.1      jmmv 
   1133   1.1      jmmv 	/* Immutable or append-only files cannot be modified, either. */
   1134   1.1      jmmv 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1135   1.1      jmmv 		return EPERM;
   1136   1.1      jmmv 
   1137  1.12      yamt 	error = tmpfs_truncate(vp, size);
   1138   1.1      jmmv 	/* tmpfs_truncate will raise the NOTE_EXTEND and NOTE_ATTRIB kevents
   1139   1.1      jmmv 	 * for us, as will update tn_status; no need to do that here. */
   1140   1.1      jmmv 
   1141   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1142   1.1      jmmv 
   1143   1.1      jmmv 	return error;
   1144   1.1      jmmv }
   1145   1.1      jmmv 
   1146   1.1      jmmv /* --------------------------------------------------------------------- */
   1147   1.1      jmmv 
   1148   1.9      jmmv /*
   1149   1.9      jmmv  * Change access and modification times of the given vnode.
   1150  1.12      yamt  * Caller should execute tmpfs_update on vp after a successful execution.
   1151   1.9      jmmv  * The vnode must be locked on entry and remain locked on exit.
   1152   1.9      jmmv  */
   1153   1.1      jmmv int
   1154  1.48  christos tmpfs_chtimes(struct vnode *vp, const struct timespec *atime,
   1155  1.48  christos     const struct timespec *mtime, const struct timespec *btime,
   1156  1.19      elad     int vaflags, kauth_cred_t cred, struct lwp *l)
   1157   1.1      jmmv {
   1158   1.1      jmmv 	int error;
   1159   1.1      jmmv 	struct tmpfs_node *node;
   1160   1.1      jmmv 
   1161   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1162   1.1      jmmv 
   1163   1.1      jmmv 	node = VP_TO_TMPFS_NODE(vp);
   1164   1.1      jmmv 
   1165   1.1      jmmv 	/* Disallow this operation if the file system is mounted read-only. */
   1166   1.1      jmmv 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1167   1.1      jmmv 		return EROFS;
   1168   1.1      jmmv 
   1169   1.1      jmmv 	/* Immutable or append-only files cannot be modified, either. */
   1170   1.1      jmmv 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1171   1.1      jmmv 		return EPERM;
   1172   1.1      jmmv 
   1173  1.53      elad 	error = genfs_can_chtimes(vp, vaflags, node->tn_uid, cred);
   1174  1.54      elad 
   1175  1.54      elad 	error = kauth_authorize_vnode(cred, KAUTH_VNODE_WRITE_TIMES, vp, NULL,
   1176  1.54      elad 	    error);
   1177  1.53      elad 	if (error)
   1178  1.53      elad 		return (error);
   1179   1.1      jmmv 
   1180   1.1      jmmv 	if (atime->tv_sec != VNOVAL && atime->tv_nsec != VNOVAL)
   1181   1.1      jmmv 		node->tn_status |= TMPFS_NODE_ACCESSED;
   1182   1.1      jmmv 
   1183   1.1      jmmv 	if (mtime->tv_sec != VNOVAL && mtime->tv_nsec != VNOVAL)
   1184   1.1      jmmv 		node->tn_status |= TMPFS_NODE_MODIFIED;
   1185   1.1      jmmv 
   1186  1.48  christos 	if (btime->tv_sec == VNOVAL && btime->tv_nsec == VNOVAL)
   1187  1.48  christos 		btime = NULL;
   1188  1.48  christos 
   1189  1.48  christos 	tmpfs_update(vp, atime, mtime, btime, 0);
   1190  1.29      jmmv 	VN_KNOTE(vp, NOTE_ATTRIB);
   1191   1.1      jmmv 
   1192   1.1      jmmv 	KASSERT(VOP_ISLOCKED(vp));
   1193   1.1      jmmv 
   1194  1.12      yamt 	return 0;
   1195   1.1      jmmv }
   1196  1.10      yamt 
   1197  1.10      yamt /* --------------------------------------------------------------------- */
   1198  1.10      yamt 
   1199  1.10      yamt /* Sync timestamps */
   1200  1.10      yamt void
   1201  1.10      yamt tmpfs_itimes(struct vnode *vp, const struct timespec *acc,
   1202  1.48  christos     const struct timespec *mod, const struct timespec *birth)
   1203  1.10      yamt {
   1204  1.10      yamt 	struct tmpfs_node *node;
   1205  1.56     rmind 	struct timespec nowtm;
   1206  1.10      yamt 
   1207  1.10      yamt 	node = VP_TO_TMPFS_NODE(vp);
   1208  1.10      yamt 
   1209  1.10      yamt 	if ((node->tn_status & (TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED |
   1210  1.10      yamt 	    TMPFS_NODE_CHANGED)) == 0)
   1211  1.10      yamt 		return;
   1212  1.26      jmmv 
   1213  1.56     rmind 	if (birth != NULL) {
   1214  1.48  christos 		node->tn_birthtime = *birth;
   1215  1.56     rmind 	}
   1216  1.56     rmind 	vfs_timestamp(&nowtm);
   1217  1.48  christos 
   1218  1.10      yamt 	if (node->tn_status & TMPFS_NODE_ACCESSED) {
   1219  1.56     rmind 		node->tn_atime = acc ? *acc : nowtm;
   1220  1.10      yamt 	}
   1221  1.10      yamt 	if (node->tn_status & TMPFS_NODE_MODIFIED) {
   1222  1.56     rmind 		node->tn_mtime = mod ? *mod : nowtm;
   1223  1.10      yamt 	}
   1224  1.48  christos 	if (node->tn_status & TMPFS_NODE_CHANGED) {
   1225  1.56     rmind 		node->tn_ctime = nowtm;
   1226  1.48  christos 	}
   1227  1.21    kardel 
   1228  1.10      yamt 	node->tn_status &=
   1229  1.10      yamt 	    ~(TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED | TMPFS_NODE_CHANGED);
   1230  1.10      yamt }
   1231  1.12      yamt 
   1232  1.12      yamt /* --------------------------------------------------------------------- */
   1233  1.12      yamt 
   1234  1.12      yamt void
   1235  1.12      yamt tmpfs_update(struct vnode *vp, const struct timespec *acc,
   1236  1.48  christos     const struct timespec *mod, const struct timespec *birth, int flags)
   1237  1.12      yamt {
   1238  1.12      yamt 
   1239  1.12      yamt 	struct tmpfs_node *node;
   1240  1.12      yamt 
   1241  1.12      yamt 	KASSERT(VOP_ISLOCKED(vp));
   1242  1.12      yamt 
   1243  1.12      yamt 	node = VP_TO_TMPFS_NODE(vp);
   1244  1.12      yamt 
   1245  1.23  christos #if 0
   1246  1.12      yamt 	if (flags & UPDATE_CLOSE)
   1247  1.12      yamt 		; /* XXX Need to do anything special? */
   1248  1.23  christos #endif
   1249  1.12      yamt 
   1250  1.48  christos 	tmpfs_itimes(vp, acc, mod, birth);
   1251  1.12      yamt 
   1252  1.12      yamt 	KASSERT(VOP_ISLOCKED(vp));
   1253  1.12      yamt }
   1254  1.12      yamt 
   1255  1.12      yamt /* --------------------------------------------------------------------- */
   1256  1.12      yamt 
   1257  1.12      yamt int
   1258  1.12      yamt tmpfs_truncate(struct vnode *vp, off_t length)
   1259  1.12      yamt {
   1260  1.33   thorpej 	bool extended;
   1261  1.12      yamt 	int error;
   1262  1.12      yamt 	struct tmpfs_node *node;
   1263  1.12      yamt 
   1264  1.12      yamt 	node = VP_TO_TMPFS_NODE(vp);
   1265  1.12      yamt 	extended = length > node->tn_size;
   1266  1.12      yamt 
   1267  1.12      yamt 	if (length < 0) {
   1268  1.12      yamt 		error = EINVAL;
   1269  1.12      yamt 		goto out;
   1270  1.12      yamt 	}
   1271  1.12      yamt 
   1272  1.12      yamt 	if (node->tn_size == length) {
   1273  1.12      yamt 		error = 0;
   1274  1.12      yamt 		goto out;
   1275  1.12      yamt 	}
   1276  1.12      yamt 
   1277  1.12      yamt 	error = tmpfs_reg_resize(vp, length);
   1278  1.29      jmmv 	if (error == 0)
   1279  1.12      yamt 		node->tn_status |= TMPFS_NODE_CHANGED | TMPFS_NODE_MODIFIED;
   1280  1.12      yamt 
   1281  1.12      yamt out:
   1282  1.48  christos 	tmpfs_update(vp, NULL, NULL, NULL, 0);
   1283  1.12      yamt 
   1284  1.12      yamt 	return error;
   1285  1.12      yamt }
   1286