Home | History | Annotate | Line # | Download | only in tmpfs
tmpfs_subr.c revision 1.34.4.8
      1 /*	$NetBSD: tmpfs_subr.c,v 1.34.4.8 2007/10/08 20:19:29 ad Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 2005, 2006, 2007 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
      9  * 2005 program.
     10  *
     11  * Redistribution and use in source and binary forms, with or without
     12  * modification, are permitted provided that the following conditions
     13  * are met:
     14  * 1. Redistributions of source code must retain the above copyright
     15  *    notice, this list of conditions and the following disclaimer.
     16  * 2. Redistributions in binary form must reproduce the above copyright
     17  *    notice, this list of conditions and the following disclaimer in the
     18  *    documentation and/or other materials provided with the distribution.
     19  * 3. All advertising materials mentioning features or use of this software
     20  *    must display the following acknowledgement:
     21  *        This product includes software developed by the NetBSD
     22  *        Foundation, Inc. and its contributors.
     23  * 4. Neither the name of The NetBSD Foundation nor the names of its
     24  *    contributors may be used to endorse or promote products derived
     25  *    from this software without specific prior written permission.
     26  *
     27  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     28  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     29  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     30  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     31  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     32  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     33  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     34  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     35  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     36  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     37  * POSSIBILITY OF SUCH DAMAGE.
     38  */
     39 
     40 /*
     41  * Efficient memory file system supporting functions.
     42  */
     43 
     44 #include <sys/cdefs.h>
     45 __KERNEL_RCSID(0, "$NetBSD: tmpfs_subr.c,v 1.34.4.8 2007/10/08 20:19:29 ad Exp $");
     46 
     47 #include <sys/param.h>
     48 #include <sys/dirent.h>
     49 #include <sys/event.h>
     50 #include <sys/malloc.h>
     51 #include <sys/mount.h>
     52 #include <sys/namei.h>
     53 #include <sys/time.h>
     54 #include <sys/stat.h>
     55 #include <sys/systm.h>
     56 #include <sys/swap.h>
     57 #include <sys/vnode.h>
     58 #include <sys/kauth.h>
     59 #include <sys/proc.h>
     60 
     61 #include <uvm/uvm.h>
     62 
     63 #include <miscfs/specfs/specdev.h>
     64 #include <fs/tmpfs/tmpfs.h>
     65 #include <fs/tmpfs/tmpfs_fifoops.h>
     66 #include <fs/tmpfs/tmpfs_specops.h>
     67 #include <fs/tmpfs/tmpfs_vnops.h>
     68 
     69 /* --------------------------------------------------------------------- */
     70 
     71 /*
     72  * Allocates a new node of type 'type' inside the 'tmp' mount point, with
     73  * its owner set to 'uid', its group to 'gid' and its mode set to 'mode',
     74  * using the credentials of the process 'p'.
     75  *
     76  * If the node type is set to 'VDIR', then the parent parameter must point
     77  * to the parent directory of the node being created.  It may only be NULL
     78  * while allocating the root node.
     79  *
     80  * If the node type is set to 'VBLK' or 'VCHR', then the rdev parameter
     81  * specifies the device the node represents.
     82  *
     83  * If the node type is set to 'VLNK', then the parameter target specifies
     84  * the file name of the target file for the symbolic link that is being
     85  * created.
     86  *
     87  * Note that new nodes are retrieved from the available list if it has
     88  * items or, if it is empty, from the node pool as long as there is enough
     89  * space to create them.
     90  *
     91  * Returns zero on success or an appropriate error code on failure.
     92  */
     93 int
     94 tmpfs_alloc_node(struct tmpfs_mount *tmp, enum vtype type,
     95     uid_t uid, gid_t gid, mode_t mode, struct tmpfs_node *parent,
     96     char *target, dev_t rdev, struct proc *p, struct tmpfs_node **node)
     97 {
     98 	struct tmpfs_node *nnode;
     99 
    100 	/* If the root directory of the 'tmp' file system is not yet
    101 	 * allocated, this must be the request to do it. */
    102 	KASSERT(IMPLIES(tmp->tm_root == NULL, parent == NULL && type == VDIR));
    103 
    104 	KASSERT(IFF(type == VLNK, target != NULL));
    105 	KASSERT(IFF(type == VBLK || type == VCHR, rdev != VNOVAL));
    106 
    107 	KASSERT(uid != VNOVAL && gid != VNOVAL && mode != VNOVAL);
    108 
    109 	nnode = NULL;
    110 	mutex_enter(&tmp->tm_lock);
    111 	if (tmp->tm_nodes_cnt >= tmp->tm_nodes_max) {
    112 		mutex_exit(&tmp->tm_lock);
    113 		return ENOSPC;
    114 	}
    115 	tmp->tm_nodes_cnt++;
    116 	mutex_exit(&tmp->tm_lock);
    117 
    118 	nnode = (struct tmpfs_node *)TMPFS_POOL_GET(&tmp->tm_node_pool, 0);
    119 	if (nnode == NULL) {
    120 		mutex_enter(&tmp->tm_lock);
    121 		tmp->tm_nodes_cnt--;
    122 		mutex_exit(&tmp->tm_lock);
    123 		return ENOSPC;
    124 	}
    125 
    126 	/*
    127 	 * XXX Where the pool is backed by a map larger than (4GB *
    128 	 * sizeof(*nnode)), this may produce duplicate inode numbers
    129 	 * for applications that do not understand 64-bit ino_t.
    130 	 */
    131 	nnode->tn_id = (ino_t)((uintptr_t)nnode / sizeof(*nnode));
    132 	nnode->tn_gen = arc4random();
    133 
    134 	/* Generic initialization. */
    135 	nnode->tn_type = type;
    136 	nnode->tn_size = 0;
    137 	nnode->tn_status = 0;
    138 	nnode->tn_flags = 0;
    139 	nnode->tn_links = 0;
    140 	getnanotime(&nnode->tn_atime);
    141 	nnode->tn_birthtime = nnode->tn_ctime = nnode->tn_mtime =
    142 	    nnode->tn_atime;
    143 	nnode->tn_uid = uid;
    144 	nnode->tn_gid = gid;
    145 	nnode->tn_mode = mode;
    146 	nnode->tn_lockf = NULL;
    147 	nnode->tn_vnode = NULL;
    148 
    149 	/* Type-specific initialization. */
    150 	switch (nnode->tn_type) {
    151 	case VBLK:
    152 	case VCHR:
    153 		nnode->tn_spec.tn_dev.tn_rdev = rdev;
    154 		break;
    155 
    156 	case VDIR:
    157 		TAILQ_INIT(&nnode->tn_spec.tn_dir.tn_dir);
    158 		nnode->tn_spec.tn_dir.tn_parent =
    159 		    (parent == NULL) ? nnode : parent;
    160 		nnode->tn_spec.tn_dir.tn_readdir_lastn = 0;
    161 		nnode->tn_spec.tn_dir.tn_readdir_lastp = NULL;
    162 		nnode->tn_links++;
    163 		nnode->tn_spec.tn_dir.tn_parent->tn_links++;
    164 		if (parent != NULL) {
    165 			KASSERT(parent->tn_vnode != NULL);
    166 			VN_KNOTE(parent->tn_vnode, NOTE_LINK);
    167 		}
    168 		break;
    169 
    170 	case VFIFO:
    171 		/* FALLTHROUGH */
    172 	case VSOCK:
    173 		break;
    174 
    175 	case VLNK:
    176 		KASSERT(strlen(target) < MAXPATHLEN);
    177 		nnode->tn_size = strlen(target);
    178 		nnode->tn_spec.tn_lnk.tn_link =
    179 		    tmpfs_str_pool_get(&tmp->tm_str_pool, nnode->tn_size, 0);
    180 		if (nnode->tn_spec.tn_lnk.tn_link == NULL) {
    181 			mutex_enter(&tmp->tm_lock);
    182 			tmp->tm_nodes_cnt--;
    183 			mutex_exit(&tmp->tm_lock);
    184 			TMPFS_POOL_PUT(&tmp->tm_node_pool, nnode);
    185 			return ENOSPC;
    186 		}
    187 		memcpy(nnode->tn_spec.tn_lnk.tn_link, target, nnode->tn_size);
    188 		break;
    189 
    190 	case VREG:
    191 		nnode->tn_spec.tn_reg.tn_aobj =
    192 		    uao_create(INT32_MAX - PAGE_SIZE, 0);
    193 		nnode->tn_spec.tn_reg.tn_aobj_pages = 0;
    194 		break;
    195 
    196 	default:
    197 		KASSERT(0);
    198 	}
    199 
    200 	mutex_init(&nnode->tn_vlock, MUTEX_DEFAULT, IPL_NONE);
    201 
    202 	mutex_enter(&tmp->tm_lock);
    203 	LIST_INSERT_HEAD(&tmp->tm_nodes, nnode, tn_entries);
    204 	mutex_exit(&tmp->tm_lock);
    205 
    206 	*node = nnode;
    207 	return 0;
    208 }
    209 
    210 /* --------------------------------------------------------------------- */
    211 
    212 /*
    213  * Destroys the node pointed to by node from the file system 'tmp'.
    214  * If the node does not belong to the given mount point, the results are
    215  * unpredicted.
    216  *
    217  * If the node references a directory; no entries are allowed because
    218  * their removal could need a recursive algorithm, something forbidden in
    219  * kernel space.  Furthermore, there is not need to provide such
    220  * functionality (recursive removal) because the only primitives offered
    221  * to the user are the removal of empty directories and the deletion of
    222  * individual files.
    223  *
    224  * Note that nodes are not really deleted; in fact, when a node has been
    225  * allocated, it cannot be deleted during the whole life of the file
    226  * system.  Instead, they are moved to the available list and remain there
    227  * until reused.
    228  */
    229 void
    230 tmpfs_free_node(struct tmpfs_mount *tmp, struct tmpfs_node *node)
    231 {
    232 	size_t pages;
    233 
    234 	if (node->tn_type == VREG)
    235 		pages = node->tn_spec.tn_reg.tn_aobj_pages;
    236 	else
    237 		pages = 0;
    238 
    239 	mutex_enter(&tmp->tm_lock);
    240 	tmp->tm_pages_used -= pages;
    241 	tmp->tm_nodes_cnt--;
    242 	LIST_REMOVE(node, tn_entries);
    243 	mutex_exit(&tmp->tm_lock);
    244 
    245 	switch (node->tn_type) {
    246 	case VLNK:
    247 		tmpfs_str_pool_put(&tmp->tm_str_pool,
    248 		    node->tn_spec.tn_lnk.tn_link, node->tn_size);
    249 		break;
    250 
    251 	case VREG:
    252 		if (node->tn_spec.tn_reg.tn_aobj != NULL)
    253 			uao_detach(node->tn_spec.tn_reg.tn_aobj);
    254 		break;
    255 
    256 	default:
    257 		break;
    258 	}
    259 
    260 	mutex_destroy(&node->tn_vlock);
    261 	TMPFS_POOL_PUT(&tmp->tm_node_pool, node);
    262 }
    263 
    264 /* --------------------------------------------------------------------- */
    265 
    266 /*
    267  * Allocates a new directory entry for the node node with a name of name.
    268  * The new directory entry is returned in *de.
    269  *
    270  * The link count of node is increased by one to reflect the new object
    271  * referencing it.  This takes care of notifying kqueue listeners about
    272  * this change.
    273  *
    274  * Returns zero on success or an appropriate error code on failure.
    275  */
    276 int
    277 tmpfs_alloc_dirent(struct tmpfs_mount *tmp, struct tmpfs_node *node,
    278     const char *name, uint16_t len, struct tmpfs_dirent **de)
    279 {
    280 	struct tmpfs_dirent *nde;
    281 
    282 	nde = (struct tmpfs_dirent *)TMPFS_POOL_GET(&tmp->tm_dirent_pool, 0);
    283 	if (nde == NULL)
    284 		return ENOSPC;
    285 
    286 	nde->td_name = tmpfs_str_pool_get(&tmp->tm_str_pool, len, 0);
    287 	if (nde->td_name == NULL) {
    288 		TMPFS_POOL_PUT(&tmp->tm_dirent_pool, nde);
    289 		return ENOSPC;
    290 	}
    291 	nde->td_namelen = len;
    292 	memcpy(nde->td_name, name, len);
    293 	nde->td_node = node;
    294 
    295 	node->tn_links++;
    296 	if (node->tn_links > 1 && node->tn_vnode != NULL)
    297 		VN_KNOTE(node->tn_vnode, NOTE_LINK);
    298 	*de = nde;
    299 
    300 	return 0;
    301 }
    302 
    303 /* --------------------------------------------------------------------- */
    304 
    305 /*
    306  * Frees a directory entry.  It is the caller's responsibility to destroy
    307  * the node referenced by it if needed.
    308  *
    309  * The link count of node is decreased by one to reflect the removal of an
    310  * object that referenced it.  This only happens if 'node_exists' is true;
    311  * otherwise the function will not access the node referred to by the
    312  * directory entry, as it may already have been released from the outside.
    313  *
    314  * Interested parties (kqueue) are notified of the link count change; note
    315  * that this can include both the node pointed to by the directory entry
    316  * as well as its parent.
    317  */
    318 void
    319 tmpfs_free_dirent(struct tmpfs_mount *tmp, struct tmpfs_dirent *de,
    320     bool node_exists)
    321 {
    322 	if (node_exists) {
    323 		struct tmpfs_node *node;
    324 
    325 		node = de->td_node;
    326 
    327 		KASSERT(node->tn_links > 0);
    328 		node->tn_links--;
    329 		if (node->tn_vnode != NULL)
    330 			VN_KNOTE(node->tn_vnode, node->tn_links == 0 ?
    331 			    NOTE_DELETE : NOTE_LINK);
    332 		if (node->tn_type == VDIR)
    333 			VN_KNOTE(node->tn_spec.tn_dir.tn_parent->tn_vnode,
    334 			    NOTE_LINK);
    335 	}
    336 
    337 	tmpfs_str_pool_put(&tmp->tm_str_pool, de->td_name, de->td_namelen);
    338 	TMPFS_POOL_PUT(&tmp->tm_dirent_pool, de);
    339 }
    340 
    341 /* --------------------------------------------------------------------- */
    342 
    343 /*
    344  * Allocates a new vnode for the node node or returns a new reference to
    345  * an existing one if the node had already a vnode referencing it.  The
    346  * resulting locked vnode is returned in *vpp.
    347  *
    348  * Returns zero on success or an appropriate error code on failure.
    349  */
    350 int
    351 tmpfs_alloc_vp(struct mount *mp, struct tmpfs_node *node, struct vnode **vpp)
    352 {
    353 	int error;
    354 	struct vnode *nvp;
    355 	struct vnode *vp;
    356 
    357 	/* If there is already a vnode, then lock it. */
    358 	for (;;) {
    359 		mutex_enter(&node->tn_vlock);
    360 		if ((vp = node->tn_vnode) != NULL) {
    361 			mutex_enter(&vp->v_interlock);
    362 			mutex_exit(&node->tn_vlock);
    363 			error = vget(vp, LK_EXCLUSIVE | LK_RETRY | LK_INTERLOCK);
    364 			if (error == ENOENT) {
    365 				/* vnode was reclaimed. */
    366 				continue;
    367 			}
    368 			*vpp = vp;
    369 			return error;
    370 		}
    371 		break;
    372 	}
    373 
    374 	/* Get a new vnode and associate it with our node. */
    375 	error = getnewvnode(VT_TMPFS, mp, tmpfs_vnodeop_p, &vp);
    376 	if (error != 0) {
    377 		mutex_exit(&node->tn_vlock);
    378 		return error;
    379 	}
    380 
    381 	error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    382 	if (error != 0) {
    383 		mutex_exit(&node->tn_vlock);
    384 		ungetnewvnode(vp);
    385 		return error;
    386 	}
    387 
    388 	vp->v_type = node->tn_type;
    389 
    390 	/* Type-specific initialization. */
    391 	switch (node->tn_type) {
    392 	case VBLK:
    393 		/* FALLTHROUGH */
    394 	case VCHR:
    395 		vp->v_op = tmpfs_specop_p;
    396 		nvp = checkalias(vp, node->tn_spec.tn_dev.tn_rdev, mp);
    397 		if (nvp != NULL) {
    398 			/* Discard unneeded vnode, but save its inode. */
    399 			nvp->v_data = node;
    400 
    401 			/* XXX spec_vnodeops has no locking, so we have to
    402 			 * do it explicitly. */
    403 			VOP_UNLOCK(vp, 0);
    404 			vp->v_op = spec_vnodeop_p;
    405 			mutex_enter(&vp->v_interlock);
    406 			vp->v_iflag &= ~VI_LOCKSWORK;
    407 			mutex_exit(&vp->v_interlock);
    408 			vgone(vp);
    409 
    410 			/* Reinitialize aliased node. */
    411 			vp = nvp;
    412 			error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    413 			if (error != 0) {
    414 				mutex_exit(&node->tn_vlock);
    415 				return error;
    416 			}
    417 		}
    418 		break;
    419 
    420 	case VDIR:
    421 		vp->v_vflag |= (node->tn_spec.tn_dir.tn_parent == node ? VV_ROOT : 0);
    422 		break;
    423 
    424 	case VFIFO:
    425 		vp->v_op = tmpfs_fifoop_p;
    426 		break;
    427 
    428 	case VLNK:
    429 		/* FALLTHROUGH */
    430 	case VREG:
    431 		/* FALLTHROUGH */
    432 	case VSOCK:
    433 		break;
    434 
    435 	default:
    436 		KASSERT(0);
    437 	}
    438 
    439 	uvm_vnp_setsize(vp, node->tn_size);
    440 	vp->v_data = node;
    441 	node->tn_vnode = vp;
    442 	mutex_exit(&node->tn_vlock);
    443 	*vpp = vp;
    444 
    445 	KASSERT(IFF(error == 0, *vpp != NULL && VOP_ISLOCKED(*vpp)));
    446 
    447 	return error;
    448 }
    449 
    450 /* --------------------------------------------------------------------- */
    451 
    452 /*
    453  * Destroys the association between the vnode vp and the node it
    454  * references.
    455  */
    456 void
    457 tmpfs_free_vp(struct vnode *vp)
    458 {
    459 	struct tmpfs_node *node;
    460 
    461 	node = VP_TO_TMPFS_NODE(vp);
    462 
    463 	mutex_enter(&node->tn_vlock);
    464 	node->tn_vnode = NULL;
    465 	mutex_exit(&node->tn_vlock);
    466 	vp->v_data = NULL;
    467 }
    468 
    469 /* --------------------------------------------------------------------- */
    470 
    471 /*
    472  * Allocates a new file of type 'type' and adds it to the parent directory
    473  * 'dvp'; this addition is done using the component name given in 'cnp'.
    474  * The ownership of the new file is automatically assigned based on the
    475  * credentials of the caller (through 'cnp'), the group is set based on
    476  * the parent directory and the mode is determined from the 'vap' argument.
    477  * If successful, *vpp holds a vnode to the newly created file and zero
    478  * is returned.  Otherwise *vpp is NULL and the function returns an
    479  * appropriate error code.
    480  */
    481 int
    482 tmpfs_alloc_file(struct vnode *dvp, struct vnode **vpp, struct vattr *vap,
    483     struct componentname *cnp, char *target)
    484 {
    485 	int error;
    486 	struct tmpfs_dirent *de;
    487 	struct tmpfs_mount *tmp;
    488 	struct tmpfs_node *dnode;
    489 	struct tmpfs_node *node;
    490 	struct tmpfs_node *parent;
    491 
    492 	KASSERT(VOP_ISLOCKED(dvp));
    493 	KASSERT(cnp->cn_flags & HASBUF);
    494 
    495 	tmp = VFS_TO_TMPFS(dvp->v_mount);
    496 	dnode = VP_TO_TMPFS_DIR(dvp);
    497 	*vpp = NULL;
    498 
    499 	/* If the entry we are creating is a directory, we cannot overflow
    500 	 * the number of links of its parent, because it will get a new
    501 	 * link. */
    502 	if (vap->va_type == VDIR) {
    503 		/* Ensure that we do not overflow the maximum number of links
    504 		 * imposed by the system. */
    505 		KASSERT(dnode->tn_links <= LINK_MAX);
    506 		if (dnode->tn_links == LINK_MAX) {
    507 			error = EMLINK;
    508 			goto out;
    509 		}
    510 
    511 		parent = dnode;
    512 	} else
    513 		parent = NULL;
    514 
    515 	/* Allocate a node that represents the new file. */
    516 	error = tmpfs_alloc_node(tmp, vap->va_type, kauth_cred_geteuid(cnp->cn_cred),
    517 	    dnode->tn_gid, vap->va_mode, parent, target, vap->va_rdev,
    518 	    cnp->cn_lwp->l_proc, &node);
    519 	if (error != 0)
    520 		goto out;
    521 
    522 	/* Allocate a directory entry that points to the new file. */
    523 	error = tmpfs_alloc_dirent(tmp, node, cnp->cn_nameptr, cnp->cn_namelen,
    524 	    &de);
    525 	if (error != 0) {
    526 		tmpfs_free_node(tmp, node);
    527 		goto out;
    528 	}
    529 
    530 	/* Allocate a vnode for the new file. */
    531 	error = tmpfs_alloc_vp(dvp->v_mount, node, vpp);
    532 	if (error != 0) {
    533 		tmpfs_free_dirent(tmp, de, true);
    534 		tmpfs_free_node(tmp, node);
    535 		goto out;
    536 	}
    537 
    538 	/* Now that all required items are allocated, we can proceed to
    539 	 * insert the new node into the directory, an operation that
    540 	 * cannot fail. */
    541 	tmpfs_dir_attach(dvp, de);
    542 
    543 out:
    544 	if (error != 0 || !(cnp->cn_flags & SAVESTART))
    545 		PNBUF_PUT(cnp->cn_pnbuf);
    546 	vput(dvp);
    547 
    548 	KASSERT(IFF(error == 0, *vpp != NULL));
    549 
    550 	return error;
    551 }
    552 
    553 /* --------------------------------------------------------------------- */
    554 
    555 /*
    556  * Attaches the directory entry de to the directory represented by vp.
    557  * Note that this does not change the link count of the node pointed by
    558  * the directory entry, as this is done by tmpfs_alloc_dirent.
    559  *
    560  * As the "parent" directory changes, interested parties are notified of
    561  * a write to it.
    562  */
    563 void
    564 tmpfs_dir_attach(struct vnode *vp, struct tmpfs_dirent *de)
    565 {
    566 	struct tmpfs_node *dnode;
    567 
    568 	dnode = VP_TO_TMPFS_DIR(vp);
    569 
    570 	TAILQ_INSERT_TAIL(&dnode->tn_spec.tn_dir.tn_dir, de, td_entries);
    571 	dnode->tn_size += sizeof(struct tmpfs_dirent);
    572 	dnode->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
    573 	    TMPFS_NODE_MODIFIED;
    574 	uvm_vnp_setsize(vp, dnode->tn_size);
    575 
    576 	VN_KNOTE(vp, NOTE_WRITE);
    577 }
    578 
    579 /* --------------------------------------------------------------------- */
    580 
    581 /*
    582  * Detaches the directory entry de from the directory represented by vp.
    583  * Note that this does not change the link count of the node pointed by
    584  * the directory entry, as this is done by tmpfs_free_dirent.
    585  *
    586  * As the "parent" directory changes, interested parties are notified of
    587  * a write to it.
    588  */
    589 void
    590 tmpfs_dir_detach(struct vnode *vp, struct tmpfs_dirent *de)
    591 {
    592 	struct tmpfs_node *dnode;
    593 
    594 	KASSERT(VOP_ISLOCKED(vp));
    595 
    596 	dnode = VP_TO_TMPFS_DIR(vp);
    597 
    598 	if (dnode->tn_spec.tn_dir.tn_readdir_lastp == de) {
    599 		dnode->tn_spec.tn_dir.tn_readdir_lastn = 0;
    600 		dnode->tn_spec.tn_dir.tn_readdir_lastp = NULL;
    601 	}
    602 
    603 	TAILQ_REMOVE(&dnode->tn_spec.tn_dir.tn_dir, de, td_entries);
    604 	dnode->tn_size -= sizeof(struct tmpfs_dirent);
    605 	dnode->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
    606 	    TMPFS_NODE_MODIFIED;
    607 	uvm_vnp_setsize(vp, dnode->tn_size);
    608 
    609 	VN_KNOTE(vp, NOTE_WRITE);
    610 }
    611 
    612 /* --------------------------------------------------------------------- */
    613 
    614 /*
    615  * Looks for a directory entry in the directory represented by node.
    616  * 'cnp' describes the name of the entry to look for.  Note that the .
    617  * and .. components are not allowed as they do not physically exist
    618  * within directories.
    619  *
    620  * Returns a pointer to the entry when found, otherwise NULL.
    621  */
    622 struct tmpfs_dirent *
    623 tmpfs_dir_lookup(struct tmpfs_node *node, struct componentname *cnp)
    624 {
    625 	struct tmpfs_dirent *de;
    626 
    627 	KASSERT(IMPLIES(cnp->cn_namelen == 1, cnp->cn_nameptr[0] != '.'));
    628 	KASSERT(IMPLIES(cnp->cn_namelen == 2, !(cnp->cn_nameptr[0] == '.' &&
    629 	    cnp->cn_nameptr[1] == '.')));
    630 	TMPFS_VALIDATE_DIR(node);
    631 
    632 	node->tn_status |= TMPFS_NODE_ACCESSED;
    633 
    634 	TAILQ_FOREACH(de, &node->tn_spec.tn_dir.tn_dir, td_entries) {
    635 		KASSERT(cnp->cn_namelen < 0xffff);
    636 		if (de->td_namelen == (uint16_t)cnp->cn_namelen &&
    637 		    memcmp(de->td_name, cnp->cn_nameptr, de->td_namelen) == 0)
    638 			break;
    639 	}
    640 
    641 	return de;
    642 }
    643 
    644 /* --------------------------------------------------------------------- */
    645 
    646 /*
    647  * Helper function for tmpfs_readdir.  Creates a '.' entry for the given
    648  * directory and returns it in the uio space.  The function returns 0
    649  * on success, -1 if there was not enough space in the uio structure to
    650  * hold the directory entry or an appropriate error code if another
    651  * error happens.
    652  */
    653 int
    654 tmpfs_dir_getdotdent(struct tmpfs_node *node, struct uio *uio)
    655 {
    656 	int error;
    657 	struct dirent dent;
    658 
    659 	TMPFS_VALIDATE_DIR(node);
    660 	KASSERT(uio->uio_offset == TMPFS_DIRCOOKIE_DOT);
    661 
    662 	dent.d_fileno = node->tn_id;
    663 	dent.d_type = DT_DIR;
    664 	dent.d_namlen = 1;
    665 	dent.d_name[0] = '.';
    666 	dent.d_name[1] = '\0';
    667 	dent.d_reclen = _DIRENT_SIZE(&dent);
    668 
    669 	if (dent.d_reclen > uio->uio_resid)
    670 		error = -1;
    671 	else {
    672 		error = uiomove(&dent, dent.d_reclen, uio);
    673 		if (error == 0)
    674 			uio->uio_offset = TMPFS_DIRCOOKIE_DOTDOT;
    675 	}
    676 
    677 	node->tn_status |= TMPFS_NODE_ACCESSED;
    678 
    679 	return error;
    680 }
    681 
    682 /* --------------------------------------------------------------------- */
    683 
    684 /*
    685  * Helper function for tmpfs_readdir.  Creates a '..' entry for the given
    686  * directory and returns it in the uio space.  The function returns 0
    687  * on success, -1 if there was not enough space in the uio structure to
    688  * hold the directory entry or an appropriate error code if another
    689  * error happens.
    690  */
    691 int
    692 tmpfs_dir_getdotdotdent(struct tmpfs_node *node, struct uio *uio)
    693 {
    694 	int error;
    695 	struct dirent dent;
    696 
    697 	TMPFS_VALIDATE_DIR(node);
    698 	KASSERT(uio->uio_offset == TMPFS_DIRCOOKIE_DOTDOT);
    699 
    700 	dent.d_fileno = node->tn_spec.tn_dir.tn_parent->tn_id;
    701 	dent.d_type = DT_DIR;
    702 	dent.d_namlen = 2;
    703 	dent.d_name[0] = '.';
    704 	dent.d_name[1] = '.';
    705 	dent.d_name[2] = '\0';
    706 	dent.d_reclen = _DIRENT_SIZE(&dent);
    707 
    708 	if (dent.d_reclen > uio->uio_resid)
    709 		error = -1;
    710 	else {
    711 		error = uiomove(&dent, dent.d_reclen, uio);
    712 		if (error == 0) {
    713 			struct tmpfs_dirent *de;
    714 
    715 			de = TAILQ_FIRST(&node->tn_spec.tn_dir.tn_dir);
    716 			if (de == NULL)
    717 				uio->uio_offset = TMPFS_DIRCOOKIE_EOF;
    718 			else
    719 				uio->uio_offset = tmpfs_dircookie(de);
    720 		}
    721 	}
    722 
    723 	node->tn_status |= TMPFS_NODE_ACCESSED;
    724 
    725 	return error;
    726 }
    727 
    728 /* --------------------------------------------------------------------- */
    729 
    730 /*
    731  * Lookup a directory entry by its associated cookie.
    732  */
    733 struct tmpfs_dirent *
    734 tmpfs_dir_lookupbycookie(struct tmpfs_node *node, off_t cookie)
    735 {
    736 	struct tmpfs_dirent *de;
    737 
    738 	if (cookie == node->tn_spec.tn_dir.tn_readdir_lastn &&
    739 	    node->tn_spec.tn_dir.tn_readdir_lastp != NULL) {
    740 		return node->tn_spec.tn_dir.tn_readdir_lastp;
    741 	}
    742 
    743 	TAILQ_FOREACH(de, &node->tn_spec.tn_dir.tn_dir, td_entries) {
    744 		if (tmpfs_dircookie(de) == cookie) {
    745 			break;
    746 		}
    747 	}
    748 
    749 	return de;
    750 }
    751 
    752 /* --------------------------------------------------------------------- */
    753 
    754 /*
    755  * Helper function for tmpfs_readdir.  Returns as much directory entries
    756  * as can fit in the uio space.  The read starts at uio->uio_offset.
    757  * The function returns 0 on success, -1 if there was not enough space
    758  * in the uio structure to hold the directory entry or an appropriate
    759  * error code if another error happens.
    760  */
    761 int
    762 tmpfs_dir_getdents(struct tmpfs_node *node, struct uio *uio, off_t *cntp)
    763 {
    764 	int error;
    765 	off_t startcookie;
    766 	struct tmpfs_dirent *de;
    767 
    768 	TMPFS_VALIDATE_DIR(node);
    769 
    770 	/* Locate the first directory entry we have to return.  We have cached
    771 	 * the last readdir in the node, so use those values if appropriate.
    772 	 * Otherwise do a linear scan to find the requested entry. */
    773 	startcookie = uio->uio_offset;
    774 	KASSERT(startcookie != TMPFS_DIRCOOKIE_DOT);
    775 	KASSERT(startcookie != TMPFS_DIRCOOKIE_DOTDOT);
    776 	if (startcookie == TMPFS_DIRCOOKIE_EOF) {
    777 		return 0;
    778 	} else {
    779 		de = tmpfs_dir_lookupbycookie(node, startcookie);
    780 	}
    781 	if (de == NULL) {
    782 		return EINVAL;
    783 	}
    784 
    785 	/* Read as much entries as possible; i.e., until we reach the end of
    786 	 * the directory or we exhaust uio space. */
    787 	do {
    788 		struct dirent d;
    789 
    790 		/* Create a dirent structure representing the current
    791 		 * tmpfs_node and fill it. */
    792 		d.d_fileno = de->td_node->tn_id;
    793 		switch (de->td_node->tn_type) {
    794 		case VBLK:
    795 			d.d_type = DT_BLK;
    796 			break;
    797 
    798 		case VCHR:
    799 			d.d_type = DT_CHR;
    800 			break;
    801 
    802 		case VDIR:
    803 			d.d_type = DT_DIR;
    804 			break;
    805 
    806 		case VFIFO:
    807 			d.d_type = DT_FIFO;
    808 			break;
    809 
    810 		case VLNK:
    811 			d.d_type = DT_LNK;
    812 			break;
    813 
    814 		case VREG:
    815 			d.d_type = DT_REG;
    816 			break;
    817 
    818 		case VSOCK:
    819 			d.d_type = DT_SOCK;
    820 			break;
    821 
    822 		default:
    823 			KASSERT(0);
    824 		}
    825 		d.d_namlen = de->td_namelen;
    826 		KASSERT(de->td_namelen < sizeof(d.d_name));
    827 		(void)memcpy(d.d_name, de->td_name, de->td_namelen);
    828 		d.d_name[de->td_namelen] = '\0';
    829 		d.d_reclen = _DIRENT_SIZE(&d);
    830 
    831 		/* Stop reading if the directory entry we are treating is
    832 		 * bigger than the amount of data that can be returned. */
    833 		if (d.d_reclen > uio->uio_resid) {
    834 			error = -1;
    835 			break;
    836 		}
    837 
    838 		/* Copy the new dirent structure into the output buffer and
    839 		 * advance pointers. */
    840 		error = uiomove(&d, d.d_reclen, uio);
    841 
    842 		(*cntp)++;
    843 		de = TAILQ_NEXT(de, td_entries);
    844 	} while (error == 0 && uio->uio_resid > 0 && de != NULL);
    845 
    846 	/* Update the offset and cache. */
    847 	if (de == NULL) {
    848 		uio->uio_offset = TMPFS_DIRCOOKIE_EOF;
    849 		node->tn_spec.tn_dir.tn_readdir_lastn = 0;
    850 		node->tn_spec.tn_dir.tn_readdir_lastp = NULL;
    851 	} else {
    852 		node->tn_spec.tn_dir.tn_readdir_lastn = uio->uio_offset =
    853 		    tmpfs_dircookie(de);
    854 		node->tn_spec.tn_dir.tn_readdir_lastp = de;
    855 	}
    856 
    857 	node->tn_status |= TMPFS_NODE_ACCESSED;
    858 
    859 	return error;
    860 }
    861 
    862 /* --------------------------------------------------------------------- */
    863 
    864 /*
    865  * Resizes the aobj associated to the regular file pointed to by vp to
    866  * the size newsize.  'vp' must point to a vnode that represents a regular
    867  * file.  'newsize' must be positive.
    868  *
    869  * If the file is extended, the appropriate kevent is raised.  This does
    870  * not rise a write event though because resizing is not the same as
    871  * writing.
    872  *
    873  * Returns zero on success or an appropriate error code on failure.
    874  */
    875 int
    876 tmpfs_reg_resize(struct vnode *vp, off_t newsize)
    877 {
    878 	int error;
    879 	size_t newpages, oldpages;
    880 	struct tmpfs_mount *tmp;
    881 	struct tmpfs_node *node;
    882 	off_t oldsize;
    883 
    884 	KASSERT(vp->v_type == VREG);
    885 	KASSERT(newsize >= 0);
    886 
    887 	node = VP_TO_TMPFS_NODE(vp);
    888 	tmp = VFS_TO_TMPFS(vp->v_mount);
    889 
    890 	/* Convert the old and new sizes to the number of pages needed to
    891 	 * store them.  It may happen that we do not need to do anything
    892 	 * because the last allocated page can accommodate the change on
    893 	 * its own. */
    894 	oldsize = node->tn_size;
    895 	oldpages = round_page(oldsize) / PAGE_SIZE;
    896 	KASSERT(oldpages == node->tn_spec.tn_reg.tn_aobj_pages);
    897 	newpages = round_page(newsize) / PAGE_SIZE;
    898 
    899 	mutex_enter(&tmp->tm_lock);
    900 	if (newpages > oldpages &&
    901 	    newpages - oldpages > TMPFS_PAGES_AVAIL(tmp)) {
    902 		error = ENOSPC;
    903 		mutex_exit(&tmp->tm_lock);
    904 		goto out;
    905 	}
    906 	tmp->tm_pages_used += (newpages - oldpages);
    907 	mutex_exit(&tmp->tm_lock);
    908 
    909 	if (newsize < oldsize) {
    910 		int zerolen = MIN(round_page(newsize), node->tn_size) - newsize;
    911 
    912 		/*
    913 		 * free "backing store"
    914 		 */
    915 
    916 		if (newpages < oldpages) {
    917 			struct uvm_object *uobj;
    918 
    919 			uobj = node->tn_spec.tn_reg.tn_aobj;
    920 
    921 			mutex_enter(&uobj->vmobjlock);
    922 			uao_dropswap_range(uobj, newpages, oldpages);
    923 			mutex_exit(&uobj->vmobjlock);
    924 		}
    925 
    926 		/*
    927 		 * zero out the truncated part of the last page.
    928 		 */
    929 
    930 		uvm_vnp_zerorange(vp, newsize, zerolen);
    931 	}
    932 
    933 	node->tn_spec.tn_reg.tn_aobj_pages = newpages;
    934 	node->tn_size = newsize;
    935 	uvm_vnp_setsize(vp, newsize);
    936 
    937 	error = 0;
    938 
    939 	if (newsize > oldsize)
    940 		VN_KNOTE(vp, NOTE_EXTEND);
    941 
    942 out:
    943 	return error;
    944 }
    945 
    946 /* --------------------------------------------------------------------- */
    947 
    948 /*
    949  * Returns information about the number of available memory pages,
    950  * including physical and virtual ones.
    951  *
    952  * If 'total' is true, the value returned is the total amount of memory
    953  * pages configured for the system (either in use or free).
    954  * If it is FALSE, the value returned is the amount of free memory pages.
    955  *
    956  * Remember to remove TMPFS_PAGES_RESERVED from the returned value to avoid
    957  * excessive memory usage.
    958  *
    959  */
    960 size_t
    961 tmpfs_mem_info(bool total)
    962 {
    963 	size_t size;
    964 
    965 	size = 0;
    966 	size += uvmexp.swpgavail;
    967 	if (!total) {
    968 		size -= uvmexp.swpgonly;
    969 	}
    970 	size += uvmexp.free;
    971 	size += uvmexp.filepages;
    972 	if (size > uvmexp.wired) {
    973 		size -= uvmexp.wired;
    974 	} else {
    975 		size = 0;
    976 	}
    977 
    978 	return size;
    979 }
    980 
    981 /* --------------------------------------------------------------------- */
    982 
    983 /*
    984  * Change flags of the given vnode.
    985  * Caller should execute tmpfs_update on vp after a successful execution.
    986  * The vnode must be locked on entry and remain locked on exit.
    987  */
    988 int
    989 tmpfs_chflags(struct vnode *vp, int flags, kauth_cred_t cred, struct lwp *l)
    990 {
    991 	int error;
    992 	struct tmpfs_node *node;
    993 
    994 	KASSERT(VOP_ISLOCKED(vp));
    995 
    996 	node = VP_TO_TMPFS_NODE(vp);
    997 
    998 	/* Disallow this operation if the file system is mounted read-only. */
    999 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1000 		return EROFS;
   1001 
   1002 	/* XXX: The following comes from UFS code, and can be found in
   1003 	 * several other file systems.  Shouldn't this be centralized
   1004 	 * somewhere? */
   1005 	if (kauth_cred_geteuid(cred) != node->tn_uid &&
   1006 	    (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
   1007 	    NULL)))
   1008 		return error;
   1009 	if (kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL) == 0) {
   1010 		/* The super-user is only allowed to change flags if the file
   1011 		 * wasn't protected before and the securelevel is zero. */
   1012 		if ((node->tn_flags & (SF_IMMUTABLE | SF_APPEND)) &&
   1013 		    kauth_authorize_system(l->l_cred, KAUTH_SYSTEM_CHSYSFLAGS,
   1014 		     0, NULL, NULL, NULL))
   1015 			return EPERM;
   1016 		node->tn_flags = flags;
   1017 	} else {
   1018 		/* Regular users can change flags provided they only want to
   1019 		 * change user-specific ones, not those reserved for the
   1020 		 * super-user. */
   1021 		if ((node->tn_flags & (SF_IMMUTABLE | SF_APPEND)) ||
   1022 		    (flags & UF_SETTABLE) != flags)
   1023 			return EPERM;
   1024 		if ((node->tn_flags & SF_SETTABLE) != (flags & SF_SETTABLE))
   1025 			return EPERM;
   1026 		node->tn_flags &= SF_SETTABLE;
   1027 		node->tn_flags |= (flags & UF_SETTABLE);
   1028 	}
   1029 
   1030 	node->tn_status |= TMPFS_NODE_CHANGED;
   1031 	VN_KNOTE(vp, NOTE_ATTRIB);
   1032 
   1033 	KASSERT(VOP_ISLOCKED(vp));
   1034 
   1035 	return 0;
   1036 }
   1037 
   1038 /* --------------------------------------------------------------------- */
   1039 
   1040 /*
   1041  * Change access mode on the given vnode.
   1042  * Caller should execute tmpfs_update on vp after a successful execution.
   1043  * The vnode must be locked on entry and remain locked on exit.
   1044  */
   1045 int
   1046 tmpfs_chmod(struct vnode *vp, mode_t mode, kauth_cred_t cred, struct lwp *l)
   1047 {
   1048 	int error, ismember = 0;
   1049 	struct tmpfs_node *node;
   1050 
   1051 	KASSERT(VOP_ISLOCKED(vp));
   1052 
   1053 	node = VP_TO_TMPFS_NODE(vp);
   1054 
   1055 	/* Disallow this operation if the file system is mounted read-only. */
   1056 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1057 		return EROFS;
   1058 
   1059 	/* Immutable or append-only files cannot be modified, either. */
   1060 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1061 		return EPERM;
   1062 
   1063 	/* XXX: The following comes from UFS code, and can be found in
   1064 	 * several other file systems.  Shouldn't this be centralized
   1065 	 * somewhere? */
   1066 	if (kauth_cred_geteuid(cred) != node->tn_uid &&
   1067 	    (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
   1068 	    NULL)))
   1069 		return error;
   1070 	if (kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER, NULL) != 0) {
   1071 		if (vp->v_type != VDIR && (mode & S_ISTXT))
   1072 			return EFTYPE;
   1073 
   1074 		if ((kauth_cred_ismember_gid(cred, node->tn_gid,
   1075 		    &ismember) != 0 || !ismember) && (mode & S_ISGID))
   1076 			return EPERM;
   1077 	}
   1078 
   1079 	node->tn_mode = (mode & ALLPERMS);
   1080 
   1081 	node->tn_status |= TMPFS_NODE_CHANGED;
   1082 	VN_KNOTE(vp, NOTE_ATTRIB);
   1083 
   1084 	KASSERT(VOP_ISLOCKED(vp));
   1085 
   1086 	return 0;
   1087 }
   1088 
   1089 /* --------------------------------------------------------------------- */
   1090 
   1091 /*
   1092  * Change ownership of the given vnode.  At least one of uid or gid must
   1093  * be different than VNOVAL.  If one is set to that value, the attribute
   1094  * is unchanged.
   1095  * Caller should execute tmpfs_update on vp after a successful execution.
   1096  * The vnode must be locked on entry and remain locked on exit.
   1097  */
   1098 int
   1099 tmpfs_chown(struct vnode *vp, uid_t uid, gid_t gid, kauth_cred_t cred,
   1100     struct lwp *l)
   1101 {
   1102 	int error, ismember = 0;
   1103 	struct tmpfs_node *node;
   1104 
   1105 	KASSERT(VOP_ISLOCKED(vp));
   1106 
   1107 	node = VP_TO_TMPFS_NODE(vp);
   1108 
   1109 	/* Assign default values if they are unknown. */
   1110 	KASSERT(uid != VNOVAL || gid != VNOVAL);
   1111 	if (uid == VNOVAL)
   1112 		uid = node->tn_uid;
   1113 	if (gid == VNOVAL)
   1114 		gid = node->tn_gid;
   1115 	KASSERT(uid != VNOVAL && gid != VNOVAL);
   1116 
   1117 	/* Disallow this operation if the file system is mounted read-only. */
   1118 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1119 		return EROFS;
   1120 
   1121 	/* Immutable or append-only files cannot be modified, either. */
   1122 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1123 		return EPERM;
   1124 
   1125 	/* XXX: The following comes from UFS code, and can be found in
   1126 	 * several other file systems.  Shouldn't this be centralized
   1127 	 * somewhere? */
   1128 	if ((kauth_cred_geteuid(cred) != node->tn_uid || uid != node->tn_uid ||
   1129 	    (gid != node->tn_gid && !(kauth_cred_getegid(cred) == node->tn_gid ||
   1130 	    (kauth_cred_ismember_gid(cred, gid, &ismember) == 0 && ismember)))) &&
   1131 	    ((error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
   1132 	    NULL)) != 0))
   1133 		return error;
   1134 
   1135 	node->tn_uid = uid;
   1136 	node->tn_gid = gid;
   1137 
   1138 	node->tn_status |= TMPFS_NODE_CHANGED;
   1139 	VN_KNOTE(vp, NOTE_ATTRIB);
   1140 
   1141 	KASSERT(VOP_ISLOCKED(vp));
   1142 
   1143 	return 0;
   1144 }
   1145 
   1146 /* --------------------------------------------------------------------- */
   1147 
   1148 /*
   1149  * Change size of the given vnode.
   1150  * Caller should execute tmpfs_update on vp after a successful execution.
   1151  * The vnode must be locked on entry and remain locked on exit.
   1152  */
   1153 int
   1154 tmpfs_chsize(struct vnode *vp, u_quad_t size, kauth_cred_t cred,
   1155     struct lwp *l)
   1156 {
   1157 	int error;
   1158 	struct tmpfs_node *node;
   1159 
   1160 	KASSERT(VOP_ISLOCKED(vp));
   1161 
   1162 	node = VP_TO_TMPFS_NODE(vp);
   1163 
   1164 	/* Decide whether this is a valid operation based on the file type. */
   1165 	error = 0;
   1166 	switch (vp->v_type) {
   1167 	case VDIR:
   1168 		return EISDIR;
   1169 
   1170 	case VREG:
   1171 		if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1172 			return EROFS;
   1173 		break;
   1174 
   1175 	case VBLK:
   1176 		/* FALLTHROUGH */
   1177 	case VCHR:
   1178 		/* FALLTHROUGH */
   1179 	case VFIFO:
   1180 		/* Allow modifications of special files even if in the file
   1181 		 * system is mounted read-only (we are not modifying the
   1182 		 * files themselves, but the objects they represent). */
   1183 		return 0;
   1184 
   1185 	default:
   1186 		/* Anything else is unsupported. */
   1187 		return EOPNOTSUPP;
   1188 	}
   1189 
   1190 	/* Immutable or append-only files cannot be modified, either. */
   1191 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1192 		return EPERM;
   1193 
   1194 	error = tmpfs_truncate(vp, size);
   1195 	/* tmpfs_truncate will raise the NOTE_EXTEND and NOTE_ATTRIB kevents
   1196 	 * for us, as will update tn_status; no need to do that here. */
   1197 
   1198 	KASSERT(VOP_ISLOCKED(vp));
   1199 
   1200 	return error;
   1201 }
   1202 
   1203 /* --------------------------------------------------------------------- */
   1204 
   1205 /*
   1206  * Change access and modification times of the given vnode.
   1207  * Caller should execute tmpfs_update on vp after a successful execution.
   1208  * The vnode must be locked on entry and remain locked on exit.
   1209  */
   1210 int
   1211 tmpfs_chtimes(struct vnode *vp, struct timespec *atime, struct timespec *mtime,
   1212     int vaflags, kauth_cred_t cred, struct lwp *l)
   1213 {
   1214 	int error;
   1215 	struct tmpfs_node *node;
   1216 
   1217 	KASSERT(VOP_ISLOCKED(vp));
   1218 
   1219 	node = VP_TO_TMPFS_NODE(vp);
   1220 
   1221 	/* Disallow this operation if the file system is mounted read-only. */
   1222 	if (vp->v_mount->mnt_flag & MNT_RDONLY)
   1223 		return EROFS;
   1224 
   1225 	/* Immutable or append-only files cannot be modified, either. */
   1226 	if (node->tn_flags & (IMMUTABLE | APPEND))
   1227 		return EPERM;
   1228 
   1229 	/* XXX: The following comes from UFS code, and can be found in
   1230 	 * several other file systems.  Shouldn't this be centralized
   1231 	 * somewhere? */
   1232 	if (kauth_cred_geteuid(cred) != node->tn_uid &&
   1233 	    (error = kauth_authorize_generic(cred, KAUTH_GENERIC_ISSUSER,
   1234 	    NULL)) && ((vaflags & VA_UTIMES_NULL) == 0 ||
   1235 	    (error = VOP_ACCESS(vp, VWRITE, cred, l))))
   1236 		return error;
   1237 
   1238 	if (atime->tv_sec != VNOVAL && atime->tv_nsec != VNOVAL)
   1239 		node->tn_status |= TMPFS_NODE_ACCESSED;
   1240 
   1241 	if (mtime->tv_sec != VNOVAL && mtime->tv_nsec != VNOVAL)
   1242 		node->tn_status |= TMPFS_NODE_MODIFIED;
   1243 
   1244 	tmpfs_update(vp, atime, mtime, 0);
   1245 	VN_KNOTE(vp, NOTE_ATTRIB);
   1246 
   1247 	KASSERT(VOP_ISLOCKED(vp));
   1248 
   1249 	return 0;
   1250 }
   1251 
   1252 /* --------------------------------------------------------------------- */
   1253 
   1254 /* Sync timestamps */
   1255 void
   1256 tmpfs_itimes(struct vnode *vp, const struct timespec *acc,
   1257     const struct timespec *mod)
   1258 {
   1259 	struct timespec now;
   1260 	struct tmpfs_node *node;
   1261 
   1262 	node = VP_TO_TMPFS_NODE(vp);
   1263 
   1264 	if ((node->tn_status & (TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED |
   1265 	    TMPFS_NODE_CHANGED)) == 0)
   1266 		return;
   1267 
   1268 	getnanotime(&now);
   1269 	if (node->tn_status & TMPFS_NODE_ACCESSED) {
   1270 		if (acc == NULL)
   1271 			acc = &now;
   1272 		node->tn_atime = *acc;
   1273 	}
   1274 	if (node->tn_status & TMPFS_NODE_MODIFIED) {
   1275 		if (mod == NULL)
   1276 			mod = &now;
   1277 		node->tn_mtime = *mod;
   1278 	}
   1279 	if (node->tn_status & TMPFS_NODE_CHANGED)
   1280 		node->tn_ctime = now;
   1281 
   1282 	node->tn_status &=
   1283 	    ~(TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED | TMPFS_NODE_CHANGED);
   1284 }
   1285 
   1286 /* --------------------------------------------------------------------- */
   1287 
   1288 void
   1289 tmpfs_update(struct vnode *vp, const struct timespec *acc,
   1290     const struct timespec *mod, int flags)
   1291 {
   1292 
   1293 	struct tmpfs_node *node;
   1294 
   1295 	KASSERT(VOP_ISLOCKED(vp));
   1296 
   1297 	node = VP_TO_TMPFS_NODE(vp);
   1298 
   1299 #if 0
   1300 	if (flags & UPDATE_CLOSE)
   1301 		; /* XXX Need to do anything special? */
   1302 #endif
   1303 
   1304 	tmpfs_itimes(vp, acc, mod);
   1305 
   1306 	KASSERT(VOP_ISLOCKED(vp));
   1307 }
   1308 
   1309 /* --------------------------------------------------------------------- */
   1310 
   1311 int
   1312 tmpfs_truncate(struct vnode *vp, off_t length)
   1313 {
   1314 	bool extended;
   1315 	int error;
   1316 	struct tmpfs_node *node;
   1317 
   1318 	node = VP_TO_TMPFS_NODE(vp);
   1319 	extended = length > node->tn_size;
   1320 
   1321 	if (length < 0) {
   1322 		error = EINVAL;
   1323 		goto out;
   1324 	}
   1325 
   1326 	if (node->tn_size == length) {
   1327 		error = 0;
   1328 		goto out;
   1329 	}
   1330 
   1331 	error = tmpfs_reg_resize(vp, length);
   1332 	if (error == 0)
   1333 		node->tn_status |= TMPFS_NODE_CHANGED | TMPFS_NODE_MODIFIED;
   1334 
   1335 out:
   1336 	tmpfs_update(vp, NULL, NULL, 0);
   1337 
   1338 	return error;
   1339 }
   1340