Home | History | Annotate | Line # | Download | only in tmpfs
tmpfs_vnops.c revision 1.17.2.2
      1  1.17.2.2  skrll /*	$NetBSD: tmpfs_vnops.c,v 1.17.2.2 2005/11/10 14:09:44 skrll Exp $	*/
      2  1.17.2.2  skrll 
      3  1.17.2.2  skrll /*
      4  1.17.2.2  skrll  * Copyright (c) 2005 The NetBSD Foundation, Inc.
      5  1.17.2.2  skrll  * All rights reserved.
      6  1.17.2.2  skrll  *
      7  1.17.2.2  skrll  * This code is derived from software contributed to The NetBSD Foundation
      8  1.17.2.2  skrll  * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
      9  1.17.2.2  skrll  * 2005 program.
     10  1.17.2.2  skrll  *
     11  1.17.2.2  skrll  * Redistribution and use in source and binary forms, with or without
     12  1.17.2.2  skrll  * modification, are permitted provided that the following conditions
     13  1.17.2.2  skrll  * are met:
     14  1.17.2.2  skrll  * 1. Redistributions of source code must retain the above copyright
     15  1.17.2.2  skrll  *    notice, this list of conditions and the following disclaimer.
     16  1.17.2.2  skrll  * 2. Redistributions in binary form must reproduce the above copyright
     17  1.17.2.2  skrll  *    notice, this list of conditions and the following disclaimer in the
     18  1.17.2.2  skrll  *    documentation and/or other materials provided with the distribution.
     19  1.17.2.2  skrll  * 3. All advertising materials mentioning features or use of this software
     20  1.17.2.2  skrll  *    must display the following acknowledgement:
     21  1.17.2.2  skrll  *        This product includes software developed by the NetBSD
     22  1.17.2.2  skrll  *        Foundation, Inc. and its contributors.
     23  1.17.2.2  skrll  * 4. Neither the name of The NetBSD Foundation nor the names of its
     24  1.17.2.2  skrll  *    contributors may be used to endorse or promote products derived
     25  1.17.2.2  skrll  *    from this software without specific prior written permission.
     26  1.17.2.2  skrll  *
     27  1.17.2.2  skrll  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     28  1.17.2.2  skrll  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     29  1.17.2.2  skrll  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     30  1.17.2.2  skrll  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     31  1.17.2.2  skrll  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     32  1.17.2.2  skrll  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     33  1.17.2.2  skrll  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     34  1.17.2.2  skrll  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     35  1.17.2.2  skrll  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     36  1.17.2.2  skrll  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     37  1.17.2.2  skrll  * POSSIBILITY OF SUCH DAMAGE.
     38  1.17.2.2  skrll  */
     39  1.17.2.2  skrll 
     40  1.17.2.2  skrll /*
     41  1.17.2.2  skrll  * tmpfs vnode interface.
     42  1.17.2.2  skrll  */
     43  1.17.2.2  skrll 
     44  1.17.2.2  skrll #include <sys/cdefs.h>
     45  1.17.2.2  skrll __KERNEL_RCSID(0, "$NetBSD: tmpfs_vnops.c,v 1.17.2.2 2005/11/10 14:09:44 skrll Exp $");
     46  1.17.2.2  skrll 
     47  1.17.2.2  skrll #include <sys/param.h>
     48  1.17.2.2  skrll #include <sys/dirent.h>
     49  1.17.2.2  skrll #include <sys/fcntl.h>
     50  1.17.2.2  skrll #include <sys/event.h>
     51  1.17.2.2  skrll #include <sys/malloc.h>
     52  1.17.2.2  skrll #include <sys/namei.h>
     53  1.17.2.2  skrll #include <sys/proc.h>
     54  1.17.2.2  skrll #include <sys/stat.h>
     55  1.17.2.2  skrll #include <sys/uio.h>
     56  1.17.2.2  skrll #include <sys/unistd.h>
     57  1.17.2.2  skrll #include <sys/vnode.h>
     58  1.17.2.2  skrll #include <sys/lockf.h>
     59  1.17.2.2  skrll 
     60  1.17.2.2  skrll #include <uvm/uvm.h>
     61  1.17.2.2  skrll 
     62  1.17.2.2  skrll #include <miscfs/fifofs/fifo.h>
     63  1.17.2.2  skrll #include <fs/tmpfs/tmpfs_vnops.h>
     64  1.17.2.2  skrll #include <fs/tmpfs/tmpfs.h>
     65  1.17.2.2  skrll 
     66  1.17.2.2  skrll /* --------------------------------------------------------------------- */
     67  1.17.2.2  skrll 
     68  1.17.2.2  skrll /*
     69  1.17.2.2  skrll  * vnode operations vector used for files stored in a tmpfs file system.
     70  1.17.2.2  skrll  */
     71  1.17.2.2  skrll int (**tmpfs_vnodeop_p)(void *);
     72  1.17.2.2  skrll const struct vnodeopv_entry_desc tmpfs_vnodeop_entries[] = {
     73  1.17.2.2  skrll 	{ &vop_default_desc,		vn_default_error },
     74  1.17.2.2  skrll 	{ &vop_lookup_desc,		tmpfs_lookup },
     75  1.17.2.2  skrll 	{ &vop_create_desc,		tmpfs_create },
     76  1.17.2.2  skrll 	{ &vop_mknod_desc,		tmpfs_mknod },
     77  1.17.2.2  skrll 	{ &vop_open_desc,		tmpfs_open },
     78  1.17.2.2  skrll 	{ &vop_close_desc,		tmpfs_close },
     79  1.17.2.2  skrll 	{ &vop_access_desc,		tmpfs_access },
     80  1.17.2.2  skrll 	{ &vop_getattr_desc,		tmpfs_getattr },
     81  1.17.2.2  skrll 	{ &vop_setattr_desc,		tmpfs_setattr },
     82  1.17.2.2  skrll 	{ &vop_read_desc,		tmpfs_read },
     83  1.17.2.2  skrll 	{ &vop_write_desc,		tmpfs_write },
     84  1.17.2.2  skrll 	{ &vop_ioctl_desc,		tmpfs_ioctl },
     85  1.17.2.2  skrll 	{ &vop_fcntl_desc,		tmpfs_fcntl },
     86  1.17.2.2  skrll 	{ &vop_poll_desc,		tmpfs_poll },
     87  1.17.2.2  skrll 	{ &vop_kqfilter_desc,		tmpfs_kqfilter },
     88  1.17.2.2  skrll 	{ &vop_revoke_desc,		tmpfs_revoke },
     89  1.17.2.2  skrll 	{ &vop_mmap_desc,		tmpfs_mmap },
     90  1.17.2.2  skrll 	{ &vop_fsync_desc,		tmpfs_fsync },
     91  1.17.2.2  skrll 	{ &vop_seek_desc,		tmpfs_seek },
     92  1.17.2.2  skrll 	{ &vop_remove_desc,		tmpfs_remove },
     93  1.17.2.2  skrll 	{ &vop_link_desc,		tmpfs_link },
     94  1.17.2.2  skrll 	{ &vop_rename_desc,		tmpfs_rename },
     95  1.17.2.2  skrll 	{ &vop_mkdir_desc,		tmpfs_mkdir },
     96  1.17.2.2  skrll 	{ &vop_rmdir_desc,		tmpfs_rmdir },
     97  1.17.2.2  skrll 	{ &vop_symlink_desc,		tmpfs_symlink },
     98  1.17.2.2  skrll 	{ &vop_readdir_desc,		tmpfs_readdir },
     99  1.17.2.2  skrll 	{ &vop_readlink_desc,		tmpfs_readlink },
    100  1.17.2.2  skrll 	{ &vop_abortop_desc,		tmpfs_abortop },
    101  1.17.2.2  skrll 	{ &vop_inactive_desc,		tmpfs_inactive },
    102  1.17.2.2  skrll 	{ &vop_reclaim_desc,		tmpfs_reclaim },
    103  1.17.2.2  skrll 	{ &vop_lock_desc,		tmpfs_lock },
    104  1.17.2.2  skrll 	{ &vop_unlock_desc,		tmpfs_unlock },
    105  1.17.2.2  skrll 	{ &vop_bmap_desc,		tmpfs_bmap },
    106  1.17.2.2  skrll 	{ &vop_strategy_desc,		tmpfs_strategy },
    107  1.17.2.2  skrll 	{ &vop_print_desc,		tmpfs_print },
    108  1.17.2.2  skrll 	{ &vop_pathconf_desc,		tmpfs_pathconf },
    109  1.17.2.2  skrll 	{ &vop_islocked_desc,		tmpfs_islocked },
    110  1.17.2.2  skrll 	{ &vop_advlock_desc,		tmpfs_advlock },
    111  1.17.2.2  skrll 	{ &vop_lease_desc,		tmpfs_lease },
    112  1.17.2.2  skrll 	{ &vop_bwrite_desc,		tmpfs_bwrite },
    113  1.17.2.2  skrll 	{ &vop_getpages_desc,		tmpfs_getpages },
    114  1.17.2.2  skrll 	{ &vop_putpages_desc,		tmpfs_putpages },
    115  1.17.2.2  skrll 	{ NULL, NULL }
    116  1.17.2.2  skrll };
    117  1.17.2.2  skrll const struct vnodeopv_desc tmpfs_vnodeop_opv_desc =
    118  1.17.2.2  skrll 	{ &tmpfs_vnodeop_p, tmpfs_vnodeop_entries };
    119  1.17.2.2  skrll 
    120  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    121  1.17.2.2  skrll 
    122  1.17.2.2  skrll int
    123  1.17.2.2  skrll tmpfs_lookup(void *v)
    124  1.17.2.2  skrll {
    125  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_lookup_args *)v)->a_dvp;
    126  1.17.2.2  skrll 	struct vnode **vpp = ((struct vop_lookup_args *)v)->a_vpp;
    127  1.17.2.2  skrll 	struct componentname *cnp = ((struct vop_lookup_args *)v)->a_cnp;
    128  1.17.2.2  skrll 
    129  1.17.2.2  skrll 	int error;
    130  1.17.2.2  skrll 	struct tmpfs_dirent *de;
    131  1.17.2.2  skrll 	struct tmpfs_node *dnode;
    132  1.17.2.2  skrll 
    133  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(dvp));
    134  1.17.2.2  skrll 
    135  1.17.2.2  skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
    136  1.17.2.2  skrll 	*vpp = NULL;
    137  1.17.2.2  skrll 
    138  1.17.2.2  skrll 	/* Check accessibility of requested node as a first step. */
    139  1.17.2.2  skrll 	error = VOP_ACCESS(dvp, VEXEC, cnp->cn_cred, cnp->cn_proc);
    140  1.17.2.2  skrll 	if (error != 0)
    141  1.17.2.2  skrll 		goto out;
    142  1.17.2.2  skrll 
    143  1.17.2.2  skrll 	/* If requesting the last path component on a read-only file system
    144  1.17.2.2  skrll 	 * with a write operation, deny it. */
    145  1.17.2.2  skrll 	if ((cnp->cn_flags & ISLASTCN) &&
    146  1.17.2.2  skrll 	    (dvp->v_mount->mnt_flag & MNT_RDONLY) &&
    147  1.17.2.2  skrll 	    (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) {
    148  1.17.2.2  skrll 		error = EROFS;
    149  1.17.2.2  skrll 		goto out;
    150  1.17.2.2  skrll 	}
    151  1.17.2.2  skrll 
    152  1.17.2.2  skrll 	/* Avoid doing a linear scan of the directory if the requested
    153  1.17.2.2  skrll 	 * directory/name couple is already in the cache. */
    154  1.17.2.2  skrll 	error = cache_lookup(dvp, vpp, cnp);
    155  1.17.2.2  skrll 	if (error >= 0)
    156  1.17.2.2  skrll 		goto out;
    157  1.17.2.2  skrll 
    158  1.17.2.2  skrll 	/* We cannot be requesting the parent directory of the root node. */
    159  1.17.2.2  skrll 	KASSERT(IMPLIES(dnode->tn_type == VDIR &&
    160  1.17.2.2  skrll 	    dnode->tn_parent == dnode, !(cnp->cn_flags & ISDOTDOT)));
    161  1.17.2.2  skrll 
    162  1.17.2.2  skrll 	if (cnp->cn_flags & ISDOTDOT) {
    163  1.17.2.2  skrll 		VOP_UNLOCK(dvp, 0);
    164  1.17.2.2  skrll 
    165  1.17.2.2  skrll 		/* Allocate a new vnode on the matching entry. */
    166  1.17.2.2  skrll 		error = tmpfs_alloc_vp(dvp->v_mount, dnode->tn_parent, vpp);
    167  1.17.2.2  skrll 
    168  1.17.2.2  skrll 		if (cnp->cn_flags & LOCKPARENT &&
    169  1.17.2.2  skrll 		    cnp->cn_flags & ISLASTCN) {
    170  1.17.2.2  skrll 			if (vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY) != 0)
    171  1.17.2.2  skrll 				cnp->cn_flags |= PDIRUNLOCK;
    172  1.17.2.2  skrll 		}
    173  1.17.2.2  skrll 		dnode->tn_parent->tn_lookup_dirent = NULL;
    174  1.17.2.2  skrll 	} else if (cnp->cn_namelen == 1 && cnp->cn_nameptr[0] == '.') {
    175  1.17.2.2  skrll 		VREF(dvp);
    176  1.17.2.2  skrll 		*vpp = dvp;
    177  1.17.2.2  skrll 		dnode->tn_lookup_dirent = NULL;
    178  1.17.2.2  skrll 		error = 0;
    179  1.17.2.2  skrll 	} else {
    180  1.17.2.2  skrll 		de = tmpfs_dir_lookup(dnode, cnp);
    181  1.17.2.2  skrll 		if (de == NULL) {
    182  1.17.2.2  skrll 			/* The entry was not found in the directory.
    183  1.17.2.2  skrll 			 * This is OK iff we are creating or renaming an
    184  1.17.2.2  skrll 			 * entry and are working on the last component of
    185  1.17.2.2  skrll 			 * the path name. */
    186  1.17.2.2  skrll 			if ((cnp->cn_flags & ISLASTCN) &&
    187  1.17.2.2  skrll 			    (cnp->cn_nameiop == CREATE || \
    188  1.17.2.2  skrll 			    cnp->cn_nameiop == RENAME)) {
    189  1.17.2.2  skrll 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    190  1.17.2.2  skrll 				    cnp->cn_proc);
    191  1.17.2.2  skrll 				if (error != 0)
    192  1.17.2.2  skrll 					goto out;
    193  1.17.2.2  skrll 
    194  1.17.2.2  skrll 				/* Keep the component name in the buffer for
    195  1.17.2.2  skrll 				 * future uses. */
    196  1.17.2.2  skrll 				cnp->cn_flags |= SAVENAME;
    197  1.17.2.2  skrll 
    198  1.17.2.2  skrll 				error = EJUSTRETURN;
    199  1.17.2.2  skrll 			} else
    200  1.17.2.2  skrll 				error = ENOENT;
    201  1.17.2.2  skrll 		} else {
    202  1.17.2.2  skrll 			struct tmpfs_node *tnode;
    203  1.17.2.2  skrll 
    204  1.17.2.2  skrll 			/* The entry was found, so get its associated
    205  1.17.2.2  skrll 			 * tmpfs_node. */
    206  1.17.2.2  skrll 			tnode = de->td_node;
    207  1.17.2.2  skrll 
    208  1.17.2.2  skrll 			/* If we are not at the last path component and
    209  1.17.2.2  skrll 			 * found a non-directory or non-link entry (which
    210  1.17.2.2  skrll 			 * may itself be pointing to a directory), raise
    211  1.17.2.2  skrll 			 * an error. */
    212  1.17.2.2  skrll 			if ((tnode->tn_type != VDIR &&
    213  1.17.2.2  skrll 			    tnode->tn_type != VLNK) &&
    214  1.17.2.2  skrll 			    !(cnp->cn_flags & ISLASTCN)) {
    215  1.17.2.2  skrll 				error = ENOTDIR;
    216  1.17.2.2  skrll 				goto out;
    217  1.17.2.2  skrll 			}
    218  1.17.2.2  skrll 
    219  1.17.2.2  skrll 			/* If we are deleting or renaming the entry, keep
    220  1.17.2.2  skrll 			 * track of its tmpfs_dirent so that it can be
    221  1.17.2.2  skrll 			 * easily deleted later. */
    222  1.17.2.2  skrll 			if ((cnp->cn_flags & ISLASTCN) &&
    223  1.17.2.2  skrll 			    (cnp->cn_nameiop == DELETE ||
    224  1.17.2.2  skrll 			    cnp->cn_nameiop == RENAME)) {
    225  1.17.2.2  skrll 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    226  1.17.2.2  skrll 				    cnp->cn_proc);
    227  1.17.2.2  skrll 				if (error != 0)
    228  1.17.2.2  skrll 					goto out;
    229  1.17.2.2  skrll 				/* TODO: Check sticky bit. */
    230  1.17.2.2  skrll 				tnode->tn_lookup_dirent = de;
    231  1.17.2.2  skrll 			}
    232  1.17.2.2  skrll 
    233  1.17.2.2  skrll 			/* Allocate a new vnode on the matching entry. */
    234  1.17.2.2  skrll 			error = tmpfs_alloc_vp(dvp->v_mount, tnode, vpp);
    235  1.17.2.2  skrll 
    236  1.17.2.2  skrll 			if (error == 0 && (!(cnp->cn_flags & LOCKPARENT) ||
    237  1.17.2.2  skrll 			    !(cnp->cn_flags & ISLASTCN)))
    238  1.17.2.2  skrll 				VOP_UNLOCK(dvp, 0);
    239  1.17.2.2  skrll 		}
    240  1.17.2.2  skrll 	}
    241  1.17.2.2  skrll 
    242  1.17.2.2  skrll 	/* Store the result of this lookup in the cache.  Avoid this if the
    243  1.17.2.2  skrll 	 * request was for creation, as it does not improve timings on
    244  1.17.2.2  skrll 	 * emprical tests. */
    245  1.17.2.2  skrll 	if ((cnp->cn_flags & MAKEENTRY) && cnp->cn_nameiop != CREATE)
    246  1.17.2.2  skrll 		cache_enter(dvp, *vpp, cnp);
    247  1.17.2.2  skrll 
    248  1.17.2.2  skrll out:
    249  1.17.2.2  skrll 	/* If there were no errors, *vpp cannot be null and it must be
    250  1.17.2.2  skrll 	 * locked. */
    251  1.17.2.2  skrll 	KASSERT(IFF(error == 0, *vpp != NULL && VOP_ISLOCKED(*vpp)));
    252  1.17.2.2  skrll 
    253  1.17.2.2  skrll 	/* dvp has to be locked if:
    254  1.17.2.2  skrll 	 * - There were errors and relocking of dvp did not fail.
    255  1.17.2.2  skrll 	 * - We are doing a '..' lookup, relocking of dvp did not fail
    256  1.17.2.2  skrll 	 *   (PDIRUNLOCK is unset) and LOCKPARENT or ISLASTCN are not set.
    257  1.17.2.2  skrll 	 * - LOCKPARENT and ISLASTCN are set. */
    258  1.17.2.2  skrll 	KASSERT(IMPLIES(
    259  1.17.2.2  skrll 	    (error != 0 && !(cnp->cn_flags & PDIRUNLOCK)) ||
    260  1.17.2.2  skrll 	    (cnp->cn_flags & ISDOTDOT && !(cnp->cn_flags & PDIRUNLOCK) &&
    261  1.17.2.2  skrll 	     ((cnp->cn_flags & LOCKPARENT) && (cnp->cn_flags & ISLASTCN))) ||
    262  1.17.2.2  skrll 	    (cnp->cn_flags & LOCKPARENT && cnp->cn_flags & ISLASTCN)
    263  1.17.2.2  skrll 	    ,
    264  1.17.2.2  skrll 	    VOP_ISLOCKED(dvp)));
    265  1.17.2.2  skrll 
    266  1.17.2.2  skrll 	return error;
    267  1.17.2.2  skrll }
    268  1.17.2.2  skrll 
    269  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    270  1.17.2.2  skrll 
    271  1.17.2.2  skrll int
    272  1.17.2.2  skrll tmpfs_create(void *v)
    273  1.17.2.2  skrll {
    274  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_create_args *)v)->a_dvp;
    275  1.17.2.2  skrll 	struct vnode **vpp = ((struct vop_create_args *)v)->a_vpp;
    276  1.17.2.2  skrll 	struct componentname *cnp = ((struct vop_create_args *)v)->a_cnp;
    277  1.17.2.2  skrll 	struct vattr *vap = ((struct vop_create_args *)v)->a_vap;
    278  1.17.2.2  skrll 
    279  1.17.2.2  skrll 	KASSERT(vap->va_type == VREG || vap->va_type == VSOCK);
    280  1.17.2.2  skrll 
    281  1.17.2.2  skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    282  1.17.2.2  skrll }
    283  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    284  1.17.2.2  skrll 
    285  1.17.2.2  skrll int
    286  1.17.2.2  skrll tmpfs_mknod(void *v)
    287  1.17.2.2  skrll {
    288  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_mknod_args *)v)->a_dvp;
    289  1.17.2.2  skrll 	struct vnode **vpp = ((struct vop_mknod_args *)v)->a_vpp;
    290  1.17.2.2  skrll 	struct componentname *cnp = ((struct vop_mknod_args *)v)->a_cnp;
    291  1.17.2.2  skrll 	struct vattr *vap = ((struct vop_mknod_args *)v)->a_vap;
    292  1.17.2.2  skrll 
    293  1.17.2.2  skrll 	if (vap->va_type != VBLK && vap->va_type != VCHR &&
    294  1.17.2.2  skrll 	    vap->va_type != VFIFO)
    295  1.17.2.2  skrll 		return EINVAL;
    296  1.17.2.2  skrll 
    297  1.17.2.2  skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    298  1.17.2.2  skrll }
    299  1.17.2.2  skrll 
    300  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    301  1.17.2.2  skrll 
    302  1.17.2.2  skrll int
    303  1.17.2.2  skrll tmpfs_open(void *v)
    304  1.17.2.2  skrll {
    305  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_open_args *)v)->a_vp;
    306  1.17.2.2  skrll 	int mode = ((struct vop_open_args *)v)->a_mode;
    307  1.17.2.2  skrll 
    308  1.17.2.2  skrll 	int error;
    309  1.17.2.2  skrll 	struct tmpfs_node *node;
    310  1.17.2.2  skrll 
    311  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    312  1.17.2.2  skrll 
    313  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    314  1.17.2.2  skrll 	KASSERT(node->tn_links > 0);
    315  1.17.2.2  skrll 
    316  1.17.2.2  skrll 	/* If the file is marked append-only, deny write requests. */
    317  1.17.2.2  skrll 	if (node->tn_flags & APPEND && (mode & (FWRITE | O_APPEND)) == FWRITE)
    318  1.17.2.2  skrll 		error = EPERM;
    319  1.17.2.2  skrll 	else
    320  1.17.2.2  skrll 		error = 0;
    321  1.17.2.2  skrll 
    322  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    323  1.17.2.2  skrll 
    324  1.17.2.2  skrll 	return error;
    325  1.17.2.2  skrll }
    326  1.17.2.2  skrll 
    327  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    328  1.17.2.2  skrll 
    329  1.17.2.2  skrll int
    330  1.17.2.2  skrll tmpfs_close(void *v)
    331  1.17.2.2  skrll {
    332  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_close_args *)v)->a_vp;
    333  1.17.2.2  skrll 
    334  1.17.2.2  skrll 	struct tmpfs_node *node;
    335  1.17.2.2  skrll 
    336  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    337  1.17.2.2  skrll 
    338  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    339  1.17.2.2  skrll 
    340  1.17.2.2  skrll 	if (node->tn_links > 0) {
    341  1.17.2.2  skrll 		/* Update node times.  No need to do it if the node has
    342  1.17.2.2  skrll 		 * been deleted, because it will vanish after we return. */
    343  1.17.2.2  skrll 		tmpfs_update(vp, NULL, NULL, UPDATE_CLOSE);
    344  1.17.2.2  skrll 	}
    345  1.17.2.2  skrll 
    346  1.17.2.2  skrll 	return 0;
    347  1.17.2.2  skrll }
    348  1.17.2.2  skrll 
    349  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    350  1.17.2.2  skrll 
    351  1.17.2.2  skrll int
    352  1.17.2.2  skrll tmpfs_access(void *v)
    353  1.17.2.2  skrll {
    354  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_access_args *)v)->a_vp;
    355  1.17.2.2  skrll 	int mode = ((struct vop_access_args *)v)->a_mode;
    356  1.17.2.2  skrll 	struct ucred *cred = ((struct vop_access_args *)v)->a_cred;
    357  1.17.2.2  skrll 
    358  1.17.2.2  skrll 	int error;
    359  1.17.2.2  skrll 	struct tmpfs_node *node;
    360  1.17.2.2  skrll 
    361  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    362  1.17.2.2  skrll 
    363  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    364  1.17.2.2  skrll 
    365  1.17.2.2  skrll 	switch (vp->v_type) {
    366  1.17.2.2  skrll 	case VDIR:
    367  1.17.2.2  skrll 		/* FALLTHROUGH */
    368  1.17.2.2  skrll 	case VLNK:
    369  1.17.2.2  skrll 		/* FALLTHROUGH */
    370  1.17.2.2  skrll 	case VREG:
    371  1.17.2.2  skrll 		if (mode & VWRITE && vp->v_mount->mnt_flag & MNT_RDONLY) {
    372  1.17.2.2  skrll 			error = EROFS;
    373  1.17.2.2  skrll 			goto out;
    374  1.17.2.2  skrll 		}
    375  1.17.2.2  skrll 		break;
    376  1.17.2.2  skrll 
    377  1.17.2.2  skrll 	case VBLK:
    378  1.17.2.2  skrll 		/* FALLTHROUGH */
    379  1.17.2.2  skrll 	case VCHR:
    380  1.17.2.2  skrll 		/* FALLTHROUGH */
    381  1.17.2.2  skrll 	case VSOCK:
    382  1.17.2.2  skrll 		/* FALLTHROUGH */
    383  1.17.2.2  skrll 	case VFIFO:
    384  1.17.2.2  skrll 		break;
    385  1.17.2.2  skrll 
    386  1.17.2.2  skrll 	default:
    387  1.17.2.2  skrll 		error = EINVAL;
    388  1.17.2.2  skrll 		goto out;
    389  1.17.2.2  skrll 	}
    390  1.17.2.2  skrll 
    391  1.17.2.2  skrll 	if (mode & VWRITE && node->tn_flags & IMMUTABLE) {
    392  1.17.2.2  skrll 		error = EPERM;
    393  1.17.2.2  skrll 		goto out;
    394  1.17.2.2  skrll 	}
    395  1.17.2.2  skrll 
    396  1.17.2.2  skrll 	error = vaccess(vp->v_type, node->tn_mode, node->tn_uid,
    397  1.17.2.2  skrll 	    node->tn_gid, mode, cred);
    398  1.17.2.2  skrll 
    399  1.17.2.2  skrll out:
    400  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    401  1.17.2.2  skrll 
    402  1.17.2.2  skrll 	return error;
    403  1.17.2.2  skrll }
    404  1.17.2.2  skrll 
    405  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    406  1.17.2.2  skrll 
    407  1.17.2.2  skrll int
    408  1.17.2.2  skrll tmpfs_getattr(void *v)
    409  1.17.2.2  skrll {
    410  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_getattr_args *)v)->a_vp;
    411  1.17.2.2  skrll 	struct vattr *vap = ((struct vop_getattr_args *)v)->a_vap;
    412  1.17.2.2  skrll 
    413  1.17.2.2  skrll 	struct tmpfs_node *node;
    414  1.17.2.2  skrll 
    415  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    416  1.17.2.2  skrll 
    417  1.17.2.2  skrll 	VATTR_NULL(vap);
    418  1.17.2.2  skrll 
    419  1.17.2.2  skrll 	tmpfs_itimes(vp, NULL, NULL);
    420  1.17.2.2  skrll 
    421  1.17.2.2  skrll 	vap->va_type = vp->v_type;
    422  1.17.2.2  skrll 	vap->va_mode = node->tn_mode;
    423  1.17.2.2  skrll 	vap->va_nlink = node->tn_links;
    424  1.17.2.2  skrll 	vap->va_uid = node->tn_uid;
    425  1.17.2.2  skrll 	vap->va_gid = node->tn_gid;
    426  1.17.2.2  skrll 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
    427  1.17.2.2  skrll 	vap->va_fileid = node->tn_id;
    428  1.17.2.2  skrll 	vap->va_size = node->tn_size;
    429  1.17.2.2  skrll 	vap->va_blocksize = PAGE_SIZE;
    430  1.17.2.2  skrll 	vap->va_atime = node->tn_atime;
    431  1.17.2.2  skrll 	vap->va_mtime = node->tn_mtime;
    432  1.17.2.2  skrll 	vap->va_ctime = node->tn_ctime;
    433  1.17.2.2  skrll 	vap->va_birthtime = node->tn_birthtime;
    434  1.17.2.2  skrll 	vap->va_gen = node->tn_gen;
    435  1.17.2.2  skrll 	vap->va_flags = node->tn_flags;
    436  1.17.2.2  skrll 	vap->va_rdev = (vp->v_type == VBLK || vp->v_type == VCHR) ?
    437  1.17.2.2  skrll 		node->tn_rdev : VNOVAL;
    438  1.17.2.2  skrll 	vap->va_bytes = round_page(node->tn_size);
    439  1.17.2.2  skrll 	vap->va_filerev = VNOVAL;
    440  1.17.2.2  skrll 	vap->va_vaflags = 0;
    441  1.17.2.2  skrll 	vap->va_spare = VNOVAL; /* XXX */
    442  1.17.2.2  skrll 
    443  1.17.2.2  skrll 	return 0;
    444  1.17.2.2  skrll }
    445  1.17.2.2  skrll 
    446  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    447  1.17.2.2  skrll 
    448  1.17.2.2  skrll /* XXX Should this operation be atomic?  I think it should, but code in
    449  1.17.2.2  skrll  * XXX other places (e.g., ufs) doesn't seem to be... */
    450  1.17.2.2  skrll int
    451  1.17.2.2  skrll tmpfs_setattr(void *v)
    452  1.17.2.2  skrll {
    453  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_setattr_args *)v)->a_vp;
    454  1.17.2.2  skrll 	struct vattr *vap = ((struct vop_setattr_args *)v)->a_vap;
    455  1.17.2.2  skrll 	struct ucred *cred = ((struct vop_setattr_args *)v)->a_cred;
    456  1.17.2.2  skrll 	struct proc *p = ((struct vop_setattr_args *)v)->a_p;
    457  1.17.2.2  skrll 
    458  1.17.2.2  skrll 	int error;
    459  1.17.2.2  skrll 
    460  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    461  1.17.2.2  skrll 
    462  1.17.2.2  skrll 	error = 0;
    463  1.17.2.2  skrll 
    464  1.17.2.2  skrll 	/* Abort if any unsettable attribute is given. */
    465  1.17.2.2  skrll 	if (vap->va_type != VNON ||
    466  1.17.2.2  skrll 	    vap->va_nlink != VNOVAL ||
    467  1.17.2.2  skrll 	    vap->va_fsid != VNOVAL ||
    468  1.17.2.2  skrll 	    vap->va_fileid != VNOVAL ||
    469  1.17.2.2  skrll 	    vap->va_blocksize != VNOVAL ||
    470  1.17.2.2  skrll 	    vap->va_ctime.tv_sec != VNOVAL ||
    471  1.17.2.2  skrll 	    vap->va_ctime.tv_nsec != VNOVAL ||
    472  1.17.2.2  skrll 	    vap->va_birthtime.tv_sec != VNOVAL ||
    473  1.17.2.2  skrll 	    vap->va_birthtime.tv_nsec != VNOVAL ||
    474  1.17.2.2  skrll 	    vap->va_gen != VNOVAL ||
    475  1.17.2.2  skrll 	    vap->va_rdev != VNOVAL ||
    476  1.17.2.2  skrll 	    vap->va_bytes != VNOVAL)
    477  1.17.2.2  skrll 		error = EINVAL;
    478  1.17.2.2  skrll 
    479  1.17.2.2  skrll 	if (error == 0 && (vap->va_flags != VNOVAL))
    480  1.17.2.2  skrll 		error = tmpfs_chflags(vp, vap->va_flags, cred, p);
    481  1.17.2.2  skrll 
    482  1.17.2.2  skrll 	if (error == 0 && (vap->va_size != VNOVAL))
    483  1.17.2.2  skrll 		error = tmpfs_chsize(vp, vap->va_size, cred, p);
    484  1.17.2.2  skrll 
    485  1.17.2.2  skrll 	if (error == 0 && (vap->va_uid != VNOVAL || vap->va_gid != VNOVAL))
    486  1.17.2.2  skrll 		error = tmpfs_chown(vp, vap->va_uid, vap->va_gid, cred, p);
    487  1.17.2.2  skrll 
    488  1.17.2.2  skrll 	if (error == 0 && (vap->va_mode != VNOVAL))
    489  1.17.2.2  skrll 		error = tmpfs_chmod(vp, vap->va_mode, cred, p);
    490  1.17.2.2  skrll 
    491  1.17.2.2  skrll 	if (error == 0 && ((vap->va_atime.tv_sec != VNOVAL &&
    492  1.17.2.2  skrll 	    vap->va_atime.tv_nsec != VNOVAL) ||
    493  1.17.2.2  skrll 	    (vap->va_mtime.tv_sec != VNOVAL &&
    494  1.17.2.2  skrll 	    vap->va_mtime.tv_nsec != VNOVAL)))
    495  1.17.2.2  skrll 		error = tmpfs_chtimes(vp, &vap->va_atime, &vap->va_mtime,
    496  1.17.2.2  skrll 		    vap->va_vaflags, cred, p);
    497  1.17.2.2  skrll 
    498  1.17.2.2  skrll 	/* Update the node times.  We give preference to the error codes
    499  1.17.2.2  skrll 	 * generated by this function rather than the ones that may arise
    500  1.17.2.2  skrll 	 * from tmpfs_update. */
    501  1.17.2.2  skrll 	tmpfs_update(vp, NULL, NULL, 0);
    502  1.17.2.2  skrll 
    503  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    504  1.17.2.2  skrll 
    505  1.17.2.2  skrll 	return error;
    506  1.17.2.2  skrll }
    507  1.17.2.2  skrll 
    508  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    509  1.17.2.2  skrll 
    510  1.17.2.2  skrll int
    511  1.17.2.2  skrll tmpfs_read(void *v)
    512  1.17.2.2  skrll {
    513  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_read_args *)v)->a_vp;
    514  1.17.2.2  skrll 	struct uio *uio = ((struct vop_read_args *)v)->a_uio;
    515  1.17.2.2  skrll 
    516  1.17.2.2  skrll 	int error;
    517  1.17.2.2  skrll 	int flags;
    518  1.17.2.2  skrll 	struct tmpfs_node *node;
    519  1.17.2.2  skrll 	struct uvm_object *uobj;
    520  1.17.2.2  skrll 
    521  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    522  1.17.2.2  skrll 
    523  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    524  1.17.2.2  skrll 
    525  1.17.2.2  skrll 	if (vp->v_type != VREG) {
    526  1.17.2.2  skrll 		error = EISDIR;
    527  1.17.2.2  skrll 		goto out;
    528  1.17.2.2  skrll 	}
    529  1.17.2.2  skrll 
    530  1.17.2.2  skrll 	if (uio->uio_offset < 0) {
    531  1.17.2.2  skrll 		error = EINVAL;
    532  1.17.2.2  skrll 		goto out;
    533  1.17.2.2  skrll 	}
    534  1.17.2.2  skrll 
    535  1.17.2.2  skrll 	node->tn_status |= TMPFS_NODE_ACCESSED;
    536  1.17.2.2  skrll 
    537  1.17.2.2  skrll 	uobj = node->tn_aobj;
    538  1.17.2.2  skrll 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    539  1.17.2.2  skrll 	error = 0;
    540  1.17.2.2  skrll 	while (error == 0 && uio->uio_resid > 0) {
    541  1.17.2.2  skrll 		vsize_t len;
    542  1.17.2.2  skrll 		void *win;
    543  1.17.2.2  skrll 
    544  1.17.2.2  skrll 		if (node->tn_size <= uio->uio_offset)
    545  1.17.2.2  skrll 			break;
    546  1.17.2.2  skrll 
    547  1.17.2.2  skrll 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    548  1.17.2.2  skrll 		if (len == 0)
    549  1.17.2.2  skrll 			break;
    550  1.17.2.2  skrll 
    551  1.17.2.2  skrll 		win = ubc_alloc(uobj, uio->uio_offset, &len, UBC_READ);
    552  1.17.2.2  skrll 		error = uiomove(win, len, uio);
    553  1.17.2.2  skrll 		ubc_release(win, flags);
    554  1.17.2.2  skrll 	}
    555  1.17.2.2  skrll 
    556  1.17.2.2  skrll out:
    557  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    558  1.17.2.2  skrll 
    559  1.17.2.2  skrll 	return error;
    560  1.17.2.2  skrll }
    561  1.17.2.2  skrll 
    562  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    563  1.17.2.2  skrll 
    564  1.17.2.2  skrll int
    565  1.17.2.2  skrll tmpfs_write(void *v)
    566  1.17.2.2  skrll {
    567  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_write_args *)v)->a_vp;
    568  1.17.2.2  skrll 	struct uio *uio = ((struct vop_write_args *)v)->a_uio;
    569  1.17.2.2  skrll 	int ioflag = ((struct vop_write_args *)v)->a_ioflag;
    570  1.17.2.2  skrll 
    571  1.17.2.2  skrll 	boolean_t extended;
    572  1.17.2.2  skrll 	int error;
    573  1.17.2.2  skrll 	int flags;
    574  1.17.2.2  skrll 	off_t oldsize;
    575  1.17.2.2  skrll 	struct tmpfs_node *node;
    576  1.17.2.2  skrll 	struct uvm_object *uobj;
    577  1.17.2.2  skrll 
    578  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    579  1.17.2.2  skrll 
    580  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    581  1.17.2.2  skrll 	oldsize = node->tn_size;
    582  1.17.2.2  skrll 
    583  1.17.2.2  skrll 	if (uio->uio_offset < 0 || vp->v_type != VREG) {
    584  1.17.2.2  skrll 		error = EINVAL;
    585  1.17.2.2  skrll 		goto out;
    586  1.17.2.2  skrll 	}
    587  1.17.2.2  skrll 
    588  1.17.2.2  skrll 	if (uio->uio_resid == 0) {
    589  1.17.2.2  skrll 		error = 0;
    590  1.17.2.2  skrll 		goto out;
    591  1.17.2.2  skrll 	}
    592  1.17.2.2  skrll 
    593  1.17.2.2  skrll 	if (ioflag & IO_APPEND)
    594  1.17.2.2  skrll 		uio->uio_offset = node->tn_size;
    595  1.17.2.2  skrll 
    596  1.17.2.2  skrll 	extended = uio->uio_offset + uio->uio_resid > node->tn_size;
    597  1.17.2.2  skrll 	if (extended) {
    598  1.17.2.2  skrll 		error = tmpfs_reg_resize(vp, uio->uio_offset + uio->uio_resid);
    599  1.17.2.2  skrll 		if (error != 0)
    600  1.17.2.2  skrll 			goto out;
    601  1.17.2.2  skrll 	}
    602  1.17.2.2  skrll 
    603  1.17.2.2  skrll 	uobj = node->tn_aobj;
    604  1.17.2.2  skrll 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    605  1.17.2.2  skrll 	error = 0;
    606  1.17.2.2  skrll 	while (error == 0 && uio->uio_resid > 0) {
    607  1.17.2.2  skrll 		vsize_t len;
    608  1.17.2.2  skrll 		void *win;
    609  1.17.2.2  skrll 
    610  1.17.2.2  skrll 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    611  1.17.2.2  skrll 		if (len == 0)
    612  1.17.2.2  skrll 			break;
    613  1.17.2.2  skrll 
    614  1.17.2.2  skrll 		win = ubc_alloc(uobj, uio->uio_offset, &len, UBC_WRITE);
    615  1.17.2.2  skrll 		error = uiomove(win, len, uio);
    616  1.17.2.2  skrll 		ubc_release(win, flags);
    617  1.17.2.2  skrll 	}
    618  1.17.2.2  skrll 
    619  1.17.2.2  skrll 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED |
    620  1.17.2.2  skrll 	    (extended ? TMPFS_NODE_CHANGED : 0);
    621  1.17.2.2  skrll 
    622  1.17.2.2  skrll 	if (error != 0)
    623  1.17.2.2  skrll 		(void)tmpfs_reg_resize(vp, oldsize);
    624  1.17.2.2  skrll 
    625  1.17.2.2  skrll out:
    626  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    627  1.17.2.2  skrll 	KASSERT(IMPLIES(error == 0, uio->uio_resid == 0));
    628  1.17.2.2  skrll 	KASSERT(IMPLIES(error != 0, oldsize == node->tn_size));
    629  1.17.2.2  skrll 
    630  1.17.2.2  skrll 	return error;
    631  1.17.2.2  skrll }
    632  1.17.2.2  skrll 
    633  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    634  1.17.2.2  skrll 
    635  1.17.2.2  skrll int
    636  1.17.2.2  skrll tmpfs_fsync(void *v)
    637  1.17.2.2  skrll {
    638  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_fsync_args *)v)->a_vp;
    639  1.17.2.2  skrll 
    640  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    641  1.17.2.2  skrll 
    642  1.17.2.2  skrll 	tmpfs_update(vp, NULL, NULL, 0);
    643  1.17.2.2  skrll 
    644  1.17.2.2  skrll 	return 0;
    645  1.17.2.2  skrll }
    646  1.17.2.2  skrll 
    647  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    648  1.17.2.2  skrll 
    649  1.17.2.2  skrll int
    650  1.17.2.2  skrll tmpfs_remove(void *v)
    651  1.17.2.2  skrll {
    652  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_remove_args *)v)->a_dvp;
    653  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_remove_args *)v)->a_vp;
    654  1.17.2.2  skrll 
    655  1.17.2.2  skrll 	int error;
    656  1.17.2.2  skrll 	struct tmpfs_dirent *de;
    657  1.17.2.2  skrll 	struct tmpfs_mount *tmp;
    658  1.17.2.2  skrll 	struct tmpfs_node *dnode;
    659  1.17.2.2  skrll 	struct tmpfs_node *node;
    660  1.17.2.2  skrll 
    661  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(dvp));
    662  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
    663  1.17.2.2  skrll 
    664  1.17.2.2  skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
    665  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    666  1.17.2.2  skrll 	tmp = VFS_TO_TMPFS(vp->v_mount);
    667  1.17.2.2  skrll 	de = node->tn_lookup_dirent;
    668  1.17.2.2  skrll 	KASSERT(de != NULL);
    669  1.17.2.2  skrll 
    670  1.17.2.2  skrll 	/* XXX: Why isn't this done by the caller? */
    671  1.17.2.2  skrll 	if (vp->v_type == VDIR) {
    672  1.17.2.2  skrll 		error = EISDIR;
    673  1.17.2.2  skrll 		goto out;
    674  1.17.2.2  skrll 	}
    675  1.17.2.2  skrll 
    676  1.17.2.2  skrll 	/* Files marked as immutable or append-only cannot be deleted. */
    677  1.17.2.2  skrll 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    678  1.17.2.2  skrll 		error = EPERM;
    679  1.17.2.2  skrll 		goto out;
    680  1.17.2.2  skrll 	}
    681  1.17.2.2  skrll 
    682  1.17.2.2  skrll 	/* Remove the entry from the directory; as it is a file, we do not
    683  1.17.2.2  skrll 	 * have to change the number of hard links of the directory. */
    684  1.17.2.2  skrll 	tmpfs_dir_detach(dvp, de);
    685  1.17.2.2  skrll 
    686  1.17.2.2  skrll 	/* Notify interested parties about the modification of dvp.
    687  1.17.2.2  skrll 	 * The removal of vp is notified when it is reclaimed. */
    688  1.17.2.2  skrll 	VN_KNOTE(dvp, NOTE_WRITE);
    689  1.17.2.2  skrll 
    690  1.17.2.2  skrll 	/* Free the directory entry we just deleted.  Note that the node
    691  1.17.2.2  skrll 	 * referred by it will not be removed until the vnode is really
    692  1.17.2.2  skrll 	 * reclaimed. */
    693  1.17.2.2  skrll 	tmpfs_free_dirent(tmp, de, TRUE);
    694  1.17.2.2  skrll 
    695  1.17.2.2  skrll 	error = 0;
    696  1.17.2.2  skrll 
    697  1.17.2.2  skrll out:
    698  1.17.2.2  skrll 	vput(dvp);
    699  1.17.2.2  skrll 	vput(vp);
    700  1.17.2.2  skrll 
    701  1.17.2.2  skrll 	KASSERT(!VOP_ISLOCKED(dvp));
    702  1.17.2.2  skrll 
    703  1.17.2.2  skrll 	return error;
    704  1.17.2.2  skrll }
    705  1.17.2.2  skrll 
    706  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    707  1.17.2.2  skrll 
    708  1.17.2.2  skrll int
    709  1.17.2.2  skrll tmpfs_link(void *v)
    710  1.17.2.2  skrll {
    711  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_link_args *)v)->a_dvp;
    712  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_link_args *)v)->a_vp;
    713  1.17.2.2  skrll 	struct componentname *cnp = ((struct vop_link_args *)v)->a_cnp;
    714  1.17.2.2  skrll 
    715  1.17.2.2  skrll 	int error;
    716  1.17.2.2  skrll 	struct tmpfs_dirent *de;
    717  1.17.2.2  skrll 	struct tmpfs_node *dnode;
    718  1.17.2.2  skrll 	struct tmpfs_node *node;
    719  1.17.2.2  skrll 
    720  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(dvp));
    721  1.17.2.2  skrll 	KASSERT(!VOP_ISLOCKED(vp));
    722  1.17.2.2  skrll 	KASSERT(cnp->cn_flags & HASBUF);
    723  1.17.2.2  skrll 	KASSERT(dvp != vp); /* XXX When can this be false? */
    724  1.17.2.2  skrll 
    725  1.17.2.2  skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
    726  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
    727  1.17.2.2  skrll 
    728  1.17.2.2  skrll 	/* Lock vp because we will need to run tmpfs_update over it, which
    729  1.17.2.2  skrll 	 * needs the vnode to be locked. */
    730  1.17.2.2  skrll 	error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    731  1.17.2.2  skrll 	if (error != 0)
    732  1.17.2.2  skrll 		goto out;
    733  1.17.2.2  skrll 
    734  1.17.2.2  skrll 	/* XXX: Why aren't the following two tests done by the caller? */
    735  1.17.2.2  skrll 
    736  1.17.2.2  skrll 	/* Hard links of directories are forbidden. */
    737  1.17.2.2  skrll 	if (vp->v_type == VDIR) {
    738  1.17.2.2  skrll 		error = EPERM;
    739  1.17.2.2  skrll 		goto out;
    740  1.17.2.2  skrll 	}
    741  1.17.2.2  skrll 
    742  1.17.2.2  skrll 	/* Cannot create cross-device links. */
    743  1.17.2.2  skrll 	if (dvp->v_mount != vp->v_mount) {
    744  1.17.2.2  skrll 		error = EXDEV;
    745  1.17.2.2  skrll 		goto out;
    746  1.17.2.2  skrll 	}
    747  1.17.2.2  skrll 
    748  1.17.2.2  skrll 	/* Ensure that we do not overflow the maximum number of links imposed
    749  1.17.2.2  skrll 	 * by the system. */
    750  1.17.2.2  skrll 	KASSERT(node->tn_links <= LINK_MAX);
    751  1.17.2.2  skrll 	if (node->tn_links == LINK_MAX) {
    752  1.17.2.2  skrll 		error = EMLINK;
    753  1.17.2.2  skrll 		goto out;
    754  1.17.2.2  skrll 	}
    755  1.17.2.2  skrll 
    756  1.17.2.2  skrll 	/* We cannot create links of files marked immutable or append-only. */
    757  1.17.2.2  skrll 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    758  1.17.2.2  skrll 		error = EPERM;
    759  1.17.2.2  skrll 		goto out;
    760  1.17.2.2  skrll 	}
    761  1.17.2.2  skrll 
    762  1.17.2.2  skrll 	/* Allocate a new directory entry to represent the node. */
    763  1.17.2.2  skrll 	error = tmpfs_alloc_dirent(VFS_TO_TMPFS(vp->v_mount), node,
    764  1.17.2.2  skrll 	    cnp->cn_nameptr, cnp->cn_namelen, &de);
    765  1.17.2.2  skrll 	if (error != 0)
    766  1.17.2.2  skrll 		goto out;
    767  1.17.2.2  skrll 
    768  1.17.2.2  skrll 	/* Insert the new directory entry into the appropriate directory. */
    769  1.17.2.2  skrll 	tmpfs_dir_attach(dvp, de);
    770  1.17.2.2  skrll 	VN_KNOTE(dvp, NOTE_WRITE);
    771  1.17.2.2  skrll 
    772  1.17.2.2  skrll 	/* vp link count has changed, so update node times. */
    773  1.17.2.2  skrll 	node->tn_status |= TMPFS_NODE_CHANGED;
    774  1.17.2.2  skrll 	tmpfs_update(vp, NULL, NULL, 0);
    775  1.17.2.2  skrll 
    776  1.17.2.2  skrll 	error = 0;
    777  1.17.2.2  skrll 
    778  1.17.2.2  skrll out:
    779  1.17.2.2  skrll 	if (VOP_ISLOCKED(vp))
    780  1.17.2.2  skrll 		VOP_UNLOCK(vp, 0);
    781  1.17.2.2  skrll 
    782  1.17.2.2  skrll 	PNBUF_PUT(cnp->cn_pnbuf);
    783  1.17.2.2  skrll 
    784  1.17.2.2  skrll 	vput(dvp);
    785  1.17.2.2  skrll 
    786  1.17.2.2  skrll 	/* XXX Locking status of dvp does not match manual page. */
    787  1.17.2.2  skrll 	KASSERT(!VOP_ISLOCKED(dvp));
    788  1.17.2.2  skrll 	KASSERT(!VOP_ISLOCKED(vp));
    789  1.17.2.2  skrll 
    790  1.17.2.2  skrll 	return error;
    791  1.17.2.2  skrll }
    792  1.17.2.2  skrll 
    793  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    794  1.17.2.2  skrll 
    795  1.17.2.2  skrll int
    796  1.17.2.2  skrll tmpfs_rename(void *v)
    797  1.17.2.2  skrll {
    798  1.17.2.2  skrll 	struct vnode *fdvp = ((struct vop_rename_args *)v)->a_fdvp;
    799  1.17.2.2  skrll 	struct vnode *fvp = ((struct vop_rename_args *)v)->a_fvp;
    800  1.17.2.2  skrll 	struct componentname *fcnp = ((struct vop_rename_args *)v)->a_fcnp;
    801  1.17.2.2  skrll 	struct vnode *tdvp = ((struct vop_rename_args *)v)->a_tdvp;
    802  1.17.2.2  skrll 	struct vnode *tvp = ((struct vop_rename_args *)v)->a_tvp;
    803  1.17.2.2  skrll 	struct componentname *tcnp = ((struct vop_rename_args *)v)->a_tcnp;
    804  1.17.2.2  skrll 
    805  1.17.2.2  skrll 	char *newname;
    806  1.17.2.2  skrll 	int error;
    807  1.17.2.2  skrll 	struct tmpfs_dirent *de;
    808  1.17.2.2  skrll 	struct tmpfs_mount *tmp;
    809  1.17.2.2  skrll 	struct tmpfs_node *fdnode;
    810  1.17.2.2  skrll 	struct tmpfs_node *fnode;
    811  1.17.2.2  skrll 	struct tmpfs_node *tdnode;
    812  1.17.2.2  skrll 
    813  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(tdvp));
    814  1.17.2.2  skrll 	KASSERT(IMPLIES(tvp != NULL, VOP_ISLOCKED(tvp)));
    815  1.17.2.2  skrll 	KASSERT(fcnp->cn_flags & HASBUF);
    816  1.17.2.2  skrll 	KASSERT(tcnp->cn_flags & HASBUF);
    817  1.17.2.2  skrll 
    818  1.17.2.2  skrll 	fdnode = VP_TO_TMPFS_DIR(fdvp);
    819  1.17.2.2  skrll 	fnode = VP_TO_TMPFS_NODE(fvp);
    820  1.17.2.2  skrll 	de = fnode->tn_lookup_dirent;
    821  1.17.2.2  skrll 
    822  1.17.2.2  skrll 	/* Disallow cross-device renames.
    823  1.17.2.2  skrll 	 * XXX Why isn't this done by the caller? */
    824  1.17.2.2  skrll 	if (fvp->v_mount != tdvp->v_mount ||
    825  1.17.2.2  skrll 	    (tvp != NULL && fvp->v_mount != tvp->v_mount)) {
    826  1.17.2.2  skrll 		error = EXDEV;
    827  1.17.2.2  skrll 		goto out;
    828  1.17.2.2  skrll 	}
    829  1.17.2.2  skrll 
    830  1.17.2.2  skrll 	tmp = VFS_TO_TMPFS(tdvp->v_mount);
    831  1.17.2.2  skrll 	tdnode = VP_TO_TMPFS_DIR(tdvp);
    832  1.17.2.2  skrll 
    833  1.17.2.2  skrll 	/* If source and target are the same file, there is nothing to do. */
    834  1.17.2.2  skrll 	if (fvp == tvp) {
    835  1.17.2.2  skrll 		error = 0;
    836  1.17.2.2  skrll 		goto out;
    837  1.17.2.2  skrll 	}
    838  1.17.2.2  skrll 
    839  1.17.2.2  skrll 	/* Avoid manipulating '.' and '..' entries. */
    840  1.17.2.2  skrll 	if (de == NULL) {
    841  1.17.2.2  skrll 		KASSERT(fvp->v_type == VDIR);
    842  1.17.2.2  skrll 		error = EINVAL;
    843  1.17.2.2  skrll 		goto out;
    844  1.17.2.2  skrll 	}
    845  1.17.2.2  skrll 	KASSERT(de->td_node == fnode);
    846  1.17.2.2  skrll 
    847  1.17.2.2  skrll 	/* If we need to move the directory between entries, lock the
    848  1.17.2.2  skrll 	 * source so that we can safely operate on it. */
    849  1.17.2.2  skrll 	if (fdnode != tdnode) {
    850  1.17.2.2  skrll 		error = vn_lock(fdvp, LK_EXCLUSIVE | LK_RETRY);
    851  1.17.2.2  skrll 		if (error != 0)
    852  1.17.2.2  skrll 			goto out;
    853  1.17.2.2  skrll 	}
    854  1.17.2.2  skrll 
    855  1.17.2.2  skrll 	/* Ensure that we have enough memory to hold the new name, if it
    856  1.17.2.2  skrll 	 * has to be changed. */
    857  1.17.2.2  skrll 	if (fcnp->cn_namelen != tcnp->cn_namelen ||
    858  1.17.2.2  skrll 	    memcmp(fcnp->cn_nameptr, tcnp->cn_nameptr, fcnp->cn_namelen) != 0) {
    859  1.17.2.2  skrll 		newname = tmpfs_str_pool_get(&tmp->tm_str_pool,
    860  1.17.2.2  skrll 		    tcnp->cn_namelen, 0);
    861  1.17.2.2  skrll 		if (newname == NULL) {
    862  1.17.2.2  skrll 			error = ENOSPC;
    863  1.17.2.2  skrll 			goto out_locked;
    864  1.17.2.2  skrll 		}
    865  1.17.2.2  skrll 	} else
    866  1.17.2.2  skrll 		newname = NULL;
    867  1.17.2.2  skrll 
    868  1.17.2.2  skrll 	/* If the node is being moved to another directory, we have to do
    869  1.17.2.2  skrll 	 * the move. */
    870  1.17.2.2  skrll 	if (fdnode != tdnode) {
    871  1.17.2.2  skrll 		/* In case we are moving a directory, we have to adjust its
    872  1.17.2.2  skrll 		 * parent to point to the new parent. */
    873  1.17.2.2  skrll 		if (de->td_node->tn_type == VDIR) {
    874  1.17.2.2  skrll 			struct tmpfs_node *n;
    875  1.17.2.2  skrll 
    876  1.17.2.2  skrll 			/* Ensure the target directory is not a child of the
    877  1.17.2.2  skrll 			 * directory being moved.  Otherwise, we'd end up
    878  1.17.2.2  skrll 			 * with stale nodes. */
    879  1.17.2.2  skrll 			n = tdnode;
    880  1.17.2.2  skrll 			while (n != n->tn_parent) {
    881  1.17.2.2  skrll 				if (n == fnode) {
    882  1.17.2.2  skrll 					error = EINVAL;
    883  1.17.2.2  skrll 					goto out_locked;
    884  1.17.2.2  skrll 				}
    885  1.17.2.2  skrll 				n = n->tn_parent;
    886  1.17.2.2  skrll 			}
    887  1.17.2.2  skrll 
    888  1.17.2.2  skrll 			/* Adjust the parent pointer. */
    889  1.17.2.2  skrll 			TMPFS_VALIDATE_DIR(fnode);
    890  1.17.2.2  skrll 			de->td_node->tn_parent = tdnode;
    891  1.17.2.2  skrll 
    892  1.17.2.2  skrll 			/* As a result of changing the target of the '..'
    893  1.17.2.2  skrll 			 * entry, the link count of the source and target
    894  1.17.2.2  skrll 			 * directories has to be adjusted. */
    895  1.17.2.2  skrll 			fdnode->tn_links--;
    896  1.17.2.2  skrll 			tdnode->tn_links++;
    897  1.17.2.2  skrll 		}
    898  1.17.2.2  skrll 
    899  1.17.2.2  skrll 		/* Do the move: just remove the entry from the source directory
    900  1.17.2.2  skrll 		 * and insert it into the target one. */
    901  1.17.2.2  skrll 		tmpfs_dir_detach(fdvp, de);
    902  1.17.2.2  skrll 		tmpfs_dir_attach(tdvp, de);
    903  1.17.2.2  skrll 
    904  1.17.2.2  skrll 		/* Notify listeners of fdvp about the change in the directory.
    905  1.17.2.2  skrll 		 * We can do it at this point because we aren't touching fdvp
    906  1.17.2.2  skrll 		 * any more below. */
    907  1.17.2.2  skrll 		VN_KNOTE(fdvp, NOTE_WRITE);
    908  1.17.2.2  skrll 	}
    909  1.17.2.2  skrll 
    910  1.17.2.2  skrll 	/* If the name has changed, we need to make it effective by changing
    911  1.17.2.2  skrll 	 * it in the directory entry. */
    912  1.17.2.2  skrll 	if (newname != NULL) {
    913  1.17.2.2  skrll 		KASSERT(tcnp->cn_namelen < MAXNAMLEN);
    914  1.17.2.2  skrll 		KASSERT(tcnp->cn_namelen < 0xffff);
    915  1.17.2.2  skrll 
    916  1.17.2.2  skrll 		tmpfs_str_pool_put(&tmp->tm_str_pool, de->td_name,
    917  1.17.2.2  skrll 		    de->td_namelen);
    918  1.17.2.2  skrll 		de->td_namelen = (uint16_t)tcnp->cn_namelen;
    919  1.17.2.2  skrll 		memcpy(newname, tcnp->cn_nameptr, tcnp->cn_namelen);
    920  1.17.2.2  skrll 		de->td_name = newname;
    921  1.17.2.2  skrll 
    922  1.17.2.2  skrll 		fnode->tn_status |= TMPFS_NODE_MODIFIED;
    923  1.17.2.2  skrll 	}
    924  1.17.2.2  skrll 
    925  1.17.2.2  skrll 	/* If we are overwriting an entry, we have to remove the old one
    926  1.17.2.2  skrll 	 * from the target directory. */
    927  1.17.2.2  skrll 	if (tvp != NULL) {
    928  1.17.2.2  skrll 		struct tmpfs_node *tnode;
    929  1.17.2.2  skrll 
    930  1.17.2.2  skrll 		tnode = VP_TO_TMPFS_NODE(tvp);
    931  1.17.2.2  skrll 
    932  1.17.2.2  skrll 		/* The source node cannot be a directory in this case. */
    933  1.17.2.2  skrll 		KASSERT(fnode->tn_type != VDIR);
    934  1.17.2.2  skrll 
    935  1.17.2.2  skrll 		/* Remove the old entry from the target directory. */
    936  1.17.2.2  skrll 		de = tnode->tn_lookup_dirent;
    937  1.17.2.2  skrll 		tmpfs_dir_detach(tdvp, de);
    938  1.17.2.2  skrll 
    939  1.17.2.2  skrll 		/* Free the directory entry we just deleted.  Note that the
    940  1.17.2.2  skrll 		 * node referred by it will not be removed until the vnode is
    941  1.17.2.2  skrll 		 * really reclaimed. */
    942  1.17.2.2  skrll 		tmpfs_free_dirent(VFS_TO_TMPFS(tvp->v_mount), de, TRUE);
    943  1.17.2.2  skrll 	}
    944  1.17.2.2  skrll 
    945  1.17.2.2  skrll 	/* Notify listeners of tdvp about the change in the directory (either
    946  1.17.2.2  skrll 	 * because a new entry was added or because one was removed). */
    947  1.17.2.2  skrll 	VN_KNOTE(tdvp, NOTE_WRITE);
    948  1.17.2.2  skrll 
    949  1.17.2.2  skrll 	error = 0;
    950  1.17.2.2  skrll 
    951  1.17.2.2  skrll out_locked:
    952  1.17.2.2  skrll 	if (fdnode != tdnode)
    953  1.17.2.2  skrll 		VOP_UNLOCK(fdvp, 0);
    954  1.17.2.2  skrll 
    955  1.17.2.2  skrll out:
    956  1.17.2.2  skrll 	/* Release target nodes. */
    957  1.17.2.2  skrll 	/* XXX: I don't understand when tdvp can be the same as tvp, but
    958  1.17.2.2  skrll 	 * other code takes care of this... */
    959  1.17.2.2  skrll 	if (tdvp == tvp)
    960  1.17.2.2  skrll 		vrele(tdvp);
    961  1.17.2.2  skrll 	else
    962  1.17.2.2  skrll 		vput(tdvp);
    963  1.17.2.2  skrll 	if (tvp != NULL)
    964  1.17.2.2  skrll 		vput(tvp);
    965  1.17.2.2  skrll 
    966  1.17.2.2  skrll 	/* Release source nodes. */
    967  1.17.2.2  skrll 	vrele(fdvp);
    968  1.17.2.2  skrll 	vrele(fvp);
    969  1.17.2.2  skrll 
    970  1.17.2.2  skrll 	return error;
    971  1.17.2.2  skrll }
    972  1.17.2.2  skrll 
    973  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    974  1.17.2.2  skrll 
    975  1.17.2.2  skrll int
    976  1.17.2.2  skrll tmpfs_mkdir(void *v)
    977  1.17.2.2  skrll {
    978  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_mkdir_args *)v)->a_dvp;
    979  1.17.2.2  skrll 	struct vnode **vpp = ((struct vop_mkdir_args *)v)->a_vpp;
    980  1.17.2.2  skrll 	struct componentname *cnp = ((struct vop_mkdir_args *)v)->a_cnp;
    981  1.17.2.2  skrll 	struct vattr *vap = ((struct vop_mkdir_args *)v)->a_vap;
    982  1.17.2.2  skrll 
    983  1.17.2.2  skrll 	KASSERT(vap->va_type == VDIR);
    984  1.17.2.2  skrll 
    985  1.17.2.2  skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    986  1.17.2.2  skrll }
    987  1.17.2.2  skrll 
    988  1.17.2.2  skrll /* --------------------------------------------------------------------- */
    989  1.17.2.2  skrll 
    990  1.17.2.2  skrll int
    991  1.17.2.2  skrll tmpfs_rmdir(void *v)
    992  1.17.2.2  skrll {
    993  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_rmdir_args *)v)->a_dvp;
    994  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_rmdir_args *)v)->a_vp;
    995  1.17.2.2  skrll 
    996  1.17.2.2  skrll 	int error;
    997  1.17.2.2  skrll 	struct tmpfs_dirent *de;
    998  1.17.2.2  skrll 	struct tmpfs_mount *tmp;
    999  1.17.2.2  skrll 	struct tmpfs_node *dnode;
   1000  1.17.2.2  skrll 	struct tmpfs_node *node;
   1001  1.17.2.2  skrll 
   1002  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(dvp));
   1003  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
   1004  1.17.2.2  skrll 
   1005  1.17.2.2  skrll 	tmp = VFS_TO_TMPFS(dvp->v_mount);
   1006  1.17.2.2  skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
   1007  1.17.2.2  skrll 	node = VP_TO_TMPFS_DIR(vp);
   1008  1.17.2.2  skrll 	KASSERT(node->tn_parent == dnode);
   1009  1.17.2.2  skrll 
   1010  1.17.2.2  skrll 	/* Get the directory entry associated with node (vp).  This was
   1011  1.17.2.2  skrll 	 * filled by tmpfs_lookup while looking up the entry. */
   1012  1.17.2.2  skrll 	de = node->tn_lookup_dirent;
   1013  1.17.2.2  skrll 	KASSERT(TMPFS_DIRENT_MATCHES(de,
   1014  1.17.2.2  skrll 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_nameptr,
   1015  1.17.2.2  skrll 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_namelen));
   1016  1.17.2.2  skrll 
   1017  1.17.2.2  skrll 	/* Directories with more than two entries ('.' and '..') cannot be
   1018  1.17.2.2  skrll 	 * removed. */
   1019  1.17.2.2  skrll 	if (node->tn_size > 0) {
   1020  1.17.2.2  skrll 		error = ENOTEMPTY;
   1021  1.17.2.2  skrll 		goto out;
   1022  1.17.2.2  skrll 	}
   1023  1.17.2.2  skrll 
   1024  1.17.2.2  skrll 	/* Check flags to see if we are allowed to remove the directory. */
   1025  1.17.2.2  skrll 	if (dnode->tn_flags & APPEND || node->tn_flags & (IMMUTABLE | APPEND)) {
   1026  1.17.2.2  skrll 		error = EPERM;
   1027  1.17.2.2  skrll 		goto out;
   1028  1.17.2.2  skrll 	}
   1029  1.17.2.2  skrll 
   1030  1.17.2.2  skrll 	/* Detach the directory entry from the directory (dnode). */
   1031  1.17.2.2  skrll 	tmpfs_dir_detach(dvp, de);
   1032  1.17.2.2  skrll 
   1033  1.17.2.2  skrll 	node->tn_links--;
   1034  1.17.2.2  skrll 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
   1035  1.17.2.2  skrll 	    TMPFS_NODE_MODIFIED;
   1036  1.17.2.2  skrll 	node->tn_parent->tn_links--;
   1037  1.17.2.2  skrll 	node->tn_parent->tn_status |= TMPFS_NODE_ACCESSED | \
   1038  1.17.2.2  skrll 	    TMPFS_NODE_CHANGED | TMPFS_NODE_MODIFIED;
   1039  1.17.2.2  skrll 
   1040  1.17.2.2  skrll 	/* Notify modification of parent directory and release it. */
   1041  1.17.2.2  skrll 	VN_KNOTE(dvp, NOTE_WRITE | NOTE_LINK);
   1042  1.17.2.2  skrll 	cache_purge(dvp); /* XXX Is this needed? */
   1043  1.17.2.2  skrll 	vput(dvp);
   1044  1.17.2.2  skrll 
   1045  1.17.2.2  skrll 	/* Free the directory entry we just deleted.  Note that the node
   1046  1.17.2.2  skrll 	 * referred by it will not be removed until the vnode is really
   1047  1.17.2.2  skrll 	 * reclaimed. */
   1048  1.17.2.2  skrll 	tmpfs_free_dirent(tmp, de, TRUE);
   1049  1.17.2.2  skrll 
   1050  1.17.2.2  skrll 	/* Release the deleted vnode (will destroy the node, notify
   1051  1.17.2.2  skrll 	 * interested parties and clean it from the cache). */
   1052  1.17.2.2  skrll 	vput(vp);
   1053  1.17.2.2  skrll 
   1054  1.17.2.2  skrll 	error = 0;
   1055  1.17.2.2  skrll 
   1056  1.17.2.2  skrll out:
   1057  1.17.2.2  skrll 	if (error != 0) {
   1058  1.17.2.2  skrll 		vput(dvp);
   1059  1.17.2.2  skrll 		vput(vp);
   1060  1.17.2.2  skrll 	}
   1061  1.17.2.2  skrll 
   1062  1.17.2.2  skrll 	return error;
   1063  1.17.2.2  skrll }
   1064  1.17.2.2  skrll 
   1065  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1066  1.17.2.2  skrll 
   1067  1.17.2.2  skrll int
   1068  1.17.2.2  skrll tmpfs_symlink(void *v)
   1069  1.17.2.2  skrll {
   1070  1.17.2.2  skrll 	struct vnode *dvp = ((struct vop_symlink_args *)v)->a_dvp;
   1071  1.17.2.2  skrll 	struct vnode **vpp = ((struct vop_symlink_args *)v)->a_vpp;
   1072  1.17.2.2  skrll 	struct componentname *cnp = ((struct vop_symlink_args *)v)->a_cnp;
   1073  1.17.2.2  skrll 	struct vattr *vap = ((struct vop_symlink_args *)v)->a_vap;
   1074  1.17.2.2  skrll 	char *target = ((struct vop_symlink_args *)v)->a_target;
   1075  1.17.2.2  skrll 
   1076  1.17.2.2  skrll 	KASSERT(vap->va_type == VLNK);
   1077  1.17.2.2  skrll 
   1078  1.17.2.2  skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, target);
   1079  1.17.2.2  skrll }
   1080  1.17.2.2  skrll 
   1081  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1082  1.17.2.2  skrll 
   1083  1.17.2.2  skrll int
   1084  1.17.2.2  skrll tmpfs_readdir(void *v)
   1085  1.17.2.2  skrll {
   1086  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_readdir_args *)v)->a_vp;
   1087  1.17.2.2  skrll 	struct uio *uio = ((struct vop_readdir_args *)v)->a_uio;
   1088  1.17.2.2  skrll 	int *eofflag = ((struct vop_readdir_args *)v)->a_eofflag;
   1089  1.17.2.2  skrll 	off_t **cookies = ((struct vop_readdir_args *)v)->a_cookies;
   1090  1.17.2.2  skrll 	int *ncookies = ((struct vop_readdir_args *)v)->a_ncookies;
   1091  1.17.2.2  skrll 
   1092  1.17.2.2  skrll 	int error;
   1093  1.17.2.2  skrll 	off_t startoff;
   1094  1.17.2.2  skrll 	off_t cnt;
   1095  1.17.2.2  skrll 	struct tmpfs_node *node;
   1096  1.17.2.2  skrll 
   1097  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
   1098  1.17.2.2  skrll 
   1099  1.17.2.2  skrll 	/* This operation only makes sense on directory nodes. */
   1100  1.17.2.2  skrll 	if (vp->v_type != VDIR) {
   1101  1.17.2.2  skrll 		error = ENOTDIR;
   1102  1.17.2.2  skrll 		goto out;
   1103  1.17.2.2  skrll 	}
   1104  1.17.2.2  skrll 
   1105  1.17.2.2  skrll 	node = VP_TO_TMPFS_DIR(vp);
   1106  1.17.2.2  skrll 
   1107  1.17.2.2  skrll 	startoff = uio->uio_offset;
   1108  1.17.2.2  skrll 
   1109  1.17.2.2  skrll 	cnt = 0;
   1110  1.17.2.2  skrll 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOT) {
   1111  1.17.2.2  skrll 		error = tmpfs_dir_getdotdent(node, uio);
   1112  1.17.2.2  skrll 		if (error == -1) {
   1113  1.17.2.2  skrll 			error = 0;
   1114  1.17.2.2  skrll 			goto outok;
   1115  1.17.2.2  skrll 		} else if (error != 0)
   1116  1.17.2.2  skrll 			goto outok;
   1117  1.17.2.2  skrll 		cnt++;
   1118  1.17.2.2  skrll 	}
   1119  1.17.2.2  skrll 
   1120  1.17.2.2  skrll 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOTDOT) {
   1121  1.17.2.2  skrll 		error = tmpfs_dir_getdotdotdent(node, uio);
   1122  1.17.2.2  skrll 		if (error == -1) {
   1123  1.17.2.2  skrll 			error = 0;
   1124  1.17.2.2  skrll 			goto outok;
   1125  1.17.2.2  skrll 		} else if (error != 0)
   1126  1.17.2.2  skrll 			goto outok;
   1127  1.17.2.2  skrll 		cnt++;
   1128  1.17.2.2  skrll 	}
   1129  1.17.2.2  skrll 
   1130  1.17.2.2  skrll 	error = tmpfs_dir_getdents(node, uio, &cnt);
   1131  1.17.2.2  skrll 	if (error == -1)
   1132  1.17.2.2  skrll 		error = 0;
   1133  1.17.2.2  skrll 	KASSERT(error >= 0);
   1134  1.17.2.2  skrll 
   1135  1.17.2.2  skrll outok:
   1136  1.17.2.2  skrll 	/* This label assumes that startoff has been
   1137  1.17.2.2  skrll 	 * initialized.  If the compiler didn't spit out warnings, we'd
   1138  1.17.2.2  skrll 	 * simply make this one be 'out' and drop 'outok'. */
   1139  1.17.2.2  skrll 
   1140  1.17.2.2  skrll 	if (eofflag != NULL)
   1141  1.17.2.2  skrll 		*eofflag =
   1142  1.17.2.2  skrll 		    (error == 0 && uio->uio_offset == TMPFS_DIRCOOKIE_EOF);
   1143  1.17.2.2  skrll 
   1144  1.17.2.2  skrll 	/* Update NFS-related variables. */
   1145  1.17.2.2  skrll 	if (error == 0 && cookies != NULL && ncookies != NULL) {
   1146  1.17.2.2  skrll 		off_t i;
   1147  1.17.2.2  skrll 		off_t off = startoff;
   1148  1.17.2.2  skrll 		struct tmpfs_dirent *de = NULL;
   1149  1.17.2.2  skrll 
   1150  1.17.2.2  skrll 		*ncookies = cnt;
   1151  1.17.2.2  skrll 		*cookies = malloc(cnt * sizeof(off_t), M_TEMP, M_WAITOK);
   1152  1.17.2.2  skrll 
   1153  1.17.2.2  skrll 		for (i = 0; i < cnt; i++) {
   1154  1.17.2.2  skrll 			KASSERT(off != TMPFS_DIRCOOKIE_EOF);
   1155  1.17.2.2  skrll 			if (off == TMPFS_DIRCOOKIE_DOT) {
   1156  1.17.2.2  skrll 				off = TMPFS_DIRCOOKIE_DOTDOT;
   1157  1.17.2.2  skrll 			} else {
   1158  1.17.2.2  skrll 				if (off == TMPFS_DIRCOOKIE_DOTDOT) {
   1159  1.17.2.2  skrll 					de = TAILQ_FIRST(&node->tn_dir);
   1160  1.17.2.2  skrll 				} else if (de != NULL) {
   1161  1.17.2.2  skrll 					de = TAILQ_NEXT(de, td_entries);
   1162  1.17.2.2  skrll 				} else {
   1163  1.17.2.2  skrll 					de = tmpfs_dir_lookupbycookie(node,
   1164  1.17.2.2  skrll 					    off);
   1165  1.17.2.2  skrll 					KASSERT(de != NULL);
   1166  1.17.2.2  skrll 					de = TAILQ_NEXT(de, td_entries);
   1167  1.17.2.2  skrll 				}
   1168  1.17.2.2  skrll 				if (de == NULL) {
   1169  1.17.2.2  skrll 					off = TMPFS_DIRCOOKIE_EOF;
   1170  1.17.2.2  skrll 				} else {
   1171  1.17.2.2  skrll 					off = TMPFS_DIRCOOKIE(de);
   1172  1.17.2.2  skrll 				}
   1173  1.17.2.2  skrll 			}
   1174  1.17.2.2  skrll 
   1175  1.17.2.2  skrll 			(*cookies)[i] = off;
   1176  1.17.2.2  skrll 		}
   1177  1.17.2.2  skrll 		KASSERT(uio->uio_offset == off);
   1178  1.17.2.2  skrll 	}
   1179  1.17.2.2  skrll 
   1180  1.17.2.2  skrll out:
   1181  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
   1182  1.17.2.2  skrll 
   1183  1.17.2.2  skrll 	return error;
   1184  1.17.2.2  skrll }
   1185  1.17.2.2  skrll 
   1186  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1187  1.17.2.2  skrll 
   1188  1.17.2.2  skrll int
   1189  1.17.2.2  skrll tmpfs_readlink(void *v)
   1190  1.17.2.2  skrll {
   1191  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_readlink_args *)v)->a_vp;
   1192  1.17.2.2  skrll 	struct uio *uio = ((struct vop_readlink_args *)v)->a_uio;
   1193  1.17.2.2  skrll 
   1194  1.17.2.2  skrll 	int error;
   1195  1.17.2.2  skrll 	struct tmpfs_node *node;
   1196  1.17.2.2  skrll 
   1197  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
   1198  1.17.2.2  skrll 	KASSERT(uio->uio_offset == 0);
   1199  1.17.2.2  skrll 	KASSERT(vp->v_type == VLNK);
   1200  1.17.2.2  skrll 
   1201  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
   1202  1.17.2.2  skrll 
   1203  1.17.2.2  skrll 	error = uiomove(node->tn_link, MIN(node->tn_size, uio->uio_resid),
   1204  1.17.2.2  skrll 	    uio);
   1205  1.17.2.2  skrll 	node->tn_status |= TMPFS_NODE_ACCESSED;
   1206  1.17.2.2  skrll 
   1207  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
   1208  1.17.2.2  skrll 
   1209  1.17.2.2  skrll 	return error;
   1210  1.17.2.2  skrll }
   1211  1.17.2.2  skrll 
   1212  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1213  1.17.2.2  skrll 
   1214  1.17.2.2  skrll int
   1215  1.17.2.2  skrll tmpfs_inactive(void *v)
   1216  1.17.2.2  skrll {
   1217  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_inactive_args *)v)->a_vp;
   1218  1.17.2.2  skrll 	struct proc *p = ((struct vop_inactive_args *)v)->a_p;
   1219  1.17.2.2  skrll 
   1220  1.17.2.2  skrll 	struct tmpfs_node *node;
   1221  1.17.2.2  skrll 
   1222  1.17.2.2  skrll 	KASSERT(VOP_ISLOCKED(vp));
   1223  1.17.2.2  skrll 
   1224  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
   1225  1.17.2.2  skrll 
   1226  1.17.2.2  skrll 	VOP_UNLOCK(vp, 0);
   1227  1.17.2.2  skrll 
   1228  1.17.2.2  skrll 	if (node->tn_links == 0)
   1229  1.17.2.2  skrll 		vrecycle(vp, NULL, p);
   1230  1.17.2.2  skrll 
   1231  1.17.2.2  skrll 	return 0;
   1232  1.17.2.2  skrll }
   1233  1.17.2.2  skrll 
   1234  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1235  1.17.2.2  skrll 
   1236  1.17.2.2  skrll int
   1237  1.17.2.2  skrll tmpfs_reclaim(void *v)
   1238  1.17.2.2  skrll {
   1239  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_reclaim_args *)v)->a_vp;
   1240  1.17.2.2  skrll 
   1241  1.17.2.2  skrll 	struct tmpfs_mount *tmp;
   1242  1.17.2.2  skrll 	struct tmpfs_node *node;
   1243  1.17.2.2  skrll 
   1244  1.17.2.2  skrll 	KASSERT(!VOP_ISLOCKED(vp));
   1245  1.17.2.2  skrll 
   1246  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
   1247  1.17.2.2  skrll 	tmp = VFS_TO_TMPFS(vp->v_mount);
   1248  1.17.2.2  skrll 
   1249  1.17.2.2  skrll 	if (node->tn_links == 0)
   1250  1.17.2.2  skrll 		VN_KNOTE(vp, NOTE_DELETE);
   1251  1.17.2.2  skrll 
   1252  1.17.2.2  skrll 	cache_purge(vp);
   1253  1.17.2.2  skrll 	tmpfs_free_vp(vp);
   1254  1.17.2.2  skrll 
   1255  1.17.2.2  skrll 	/* If the node referenced by this vnode was deleted by the user,
   1256  1.17.2.2  skrll 	 * we must free its associated data structures (now that the vnode
   1257  1.17.2.2  skrll 	 * is being reclaimed). */
   1258  1.17.2.2  skrll 	if (node->tn_links == 0)
   1259  1.17.2.2  skrll 		tmpfs_free_node(tmp, node);
   1260  1.17.2.2  skrll 
   1261  1.17.2.2  skrll 	KASSERT(!VOP_ISLOCKED(vp));
   1262  1.17.2.2  skrll 	KASSERT(vp->v_data == NULL);
   1263  1.17.2.2  skrll 
   1264  1.17.2.2  skrll 	return 0;
   1265  1.17.2.2  skrll }
   1266  1.17.2.2  skrll 
   1267  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1268  1.17.2.2  skrll 
   1269  1.17.2.2  skrll int
   1270  1.17.2.2  skrll tmpfs_print(void *v)
   1271  1.17.2.2  skrll {
   1272  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_print_args *)v)->a_vp;
   1273  1.17.2.2  skrll 
   1274  1.17.2.2  skrll 	struct tmpfs_node *node;
   1275  1.17.2.2  skrll 
   1276  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
   1277  1.17.2.2  skrll 
   1278  1.17.2.2  skrll 	printf("tag VT_TMPFS, tmpfs_node %p, flags 0x%x, links %d\n",
   1279  1.17.2.2  skrll 	    node, node->tn_flags, node->tn_links);
   1280  1.17.2.2  skrll 	printf("\tmode 0%o, owner %d, group %d, size %" PRIdMAX
   1281  1.17.2.2  skrll 	    ", status 0x%x\n",
   1282  1.17.2.2  skrll 	    node->tn_mode, node->tn_uid, node->tn_gid,
   1283  1.17.2.2  skrll 	    (uintmax_t)node->tn_size, node->tn_status);
   1284  1.17.2.2  skrll 
   1285  1.17.2.2  skrll 	if (vp->v_type == VFIFO)
   1286  1.17.2.2  skrll 		fifo_printinfo(vp);
   1287  1.17.2.2  skrll 	lockmgr_printinfo(&vp->v_lock);
   1288  1.17.2.2  skrll 
   1289  1.17.2.2  skrll 	printf("\n");
   1290  1.17.2.2  skrll 
   1291  1.17.2.2  skrll 	return 0;
   1292  1.17.2.2  skrll }
   1293  1.17.2.2  skrll 
   1294  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1295  1.17.2.2  skrll 
   1296  1.17.2.2  skrll int
   1297  1.17.2.2  skrll tmpfs_pathconf(void *v)
   1298  1.17.2.2  skrll {
   1299  1.17.2.2  skrll 	int name = ((struct vop_pathconf_args *)v)->a_name;
   1300  1.17.2.2  skrll 	register_t *retval = ((struct vop_pathconf_args *)v)->a_retval;
   1301  1.17.2.2  skrll 
   1302  1.17.2.2  skrll 	int error;
   1303  1.17.2.2  skrll 
   1304  1.17.2.2  skrll 	error = 0;
   1305  1.17.2.2  skrll 
   1306  1.17.2.2  skrll 	switch (name) {
   1307  1.17.2.2  skrll 	case _PC_LINK_MAX:
   1308  1.17.2.2  skrll 		*retval = LINK_MAX;
   1309  1.17.2.2  skrll 		break;
   1310  1.17.2.2  skrll 
   1311  1.17.2.2  skrll 	case _PC_NAME_MAX:
   1312  1.17.2.2  skrll 		*retval = NAME_MAX;
   1313  1.17.2.2  skrll 		break;
   1314  1.17.2.2  skrll 
   1315  1.17.2.2  skrll 	case _PC_PATH_MAX:
   1316  1.17.2.2  skrll 		*retval = PATH_MAX;
   1317  1.17.2.2  skrll 		break;
   1318  1.17.2.2  skrll 
   1319  1.17.2.2  skrll 	case _PC_PIPE_BUF:
   1320  1.17.2.2  skrll 		*retval = PIPE_BUF;
   1321  1.17.2.2  skrll 		break;
   1322  1.17.2.2  skrll 
   1323  1.17.2.2  skrll 	case _PC_CHOWN_RESTRICTED:
   1324  1.17.2.2  skrll 		*retval = 1;
   1325  1.17.2.2  skrll 		break;
   1326  1.17.2.2  skrll 
   1327  1.17.2.2  skrll 	case _PC_NO_TRUNC:
   1328  1.17.2.2  skrll 		*retval = 1;
   1329  1.17.2.2  skrll 		break;
   1330  1.17.2.2  skrll 
   1331  1.17.2.2  skrll 	case _PC_SYNC_IO:
   1332  1.17.2.2  skrll 		*retval = 1;
   1333  1.17.2.2  skrll 		break;
   1334  1.17.2.2  skrll 
   1335  1.17.2.2  skrll 	case _PC_FILESIZEBITS:
   1336  1.17.2.2  skrll 		*retval = 0; /* XXX Don't know which value should I return. */
   1337  1.17.2.2  skrll 		break;
   1338  1.17.2.2  skrll 
   1339  1.17.2.2  skrll 	default:
   1340  1.17.2.2  skrll 		error = EINVAL;
   1341  1.17.2.2  skrll 	}
   1342  1.17.2.2  skrll 
   1343  1.17.2.2  skrll 	return error;
   1344  1.17.2.2  skrll }
   1345  1.17.2.2  skrll 
   1346  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1347  1.17.2.2  skrll 
   1348  1.17.2.2  skrll int
   1349  1.17.2.2  skrll tmpfs_advlock(void *v)
   1350  1.17.2.2  skrll {
   1351  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_advlock_args *)v)->a_vp;
   1352  1.17.2.2  skrll 
   1353  1.17.2.2  skrll 	struct tmpfs_node *node;
   1354  1.17.2.2  skrll 
   1355  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
   1356  1.17.2.2  skrll 
   1357  1.17.2.2  skrll 	return lf_advlock(v, &node->tn_lockf, node->tn_size);
   1358  1.17.2.2  skrll }
   1359  1.17.2.2  skrll 
   1360  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1361  1.17.2.2  skrll 
   1362  1.17.2.2  skrll int
   1363  1.17.2.2  skrll tmpfs_getpages(void *v)
   1364  1.17.2.2  skrll {
   1365  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_getpages_args *)v)->a_vp;
   1366  1.17.2.2  skrll 	voff_t offset = ((struct vop_getpages_args *)v)->a_offset;
   1367  1.17.2.2  skrll 	struct vm_page **m = ((struct vop_getpages_args *)v)->a_m;
   1368  1.17.2.2  skrll 	int *count = ((struct vop_getpages_args *)v)->a_count;
   1369  1.17.2.2  skrll 	int centeridx = ((struct vop_getpages_args *)v)->a_centeridx;
   1370  1.17.2.2  skrll 	vm_prot_t access_type = ((struct vop_getpages_args *)v)->a_access_type;
   1371  1.17.2.2  skrll 	int advice = ((struct vop_getpages_args *)v)->a_advice;
   1372  1.17.2.2  skrll 	int flags = ((struct vop_getpages_args *)v)->a_flags;
   1373  1.17.2.2  skrll 
   1374  1.17.2.2  skrll 	int error;
   1375  1.17.2.2  skrll 	struct tmpfs_node *node;
   1376  1.17.2.2  skrll 	struct uvm_object *uobj;
   1377  1.17.2.2  skrll 	int npages = *count;
   1378  1.17.2.2  skrll 
   1379  1.17.2.2  skrll 	KASSERT(vp->v_type == VREG);
   1380  1.17.2.2  skrll 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1381  1.17.2.2  skrll 
   1382  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
   1383  1.17.2.2  skrll 	uobj = node->tn_aobj;
   1384  1.17.2.2  skrll 
   1385  1.17.2.2  skrll 	/* We currently don't rely on PGO_PASTEOF. */
   1386  1.17.2.2  skrll 
   1387  1.17.2.2  skrll 	if (vp->v_size <= offset + (centeridx << PAGE_SHIFT)) {
   1388  1.17.2.2  skrll 		if ((flags & PGO_LOCKED) == 0)
   1389  1.17.2.2  skrll 			simple_unlock(&vp->v_interlock);
   1390  1.17.2.2  skrll 		return EINVAL;
   1391  1.17.2.2  skrll 	}
   1392  1.17.2.2  skrll 
   1393  1.17.2.2  skrll 	if (vp->v_size < offset + (npages << PAGE_SHIFT)) {
   1394  1.17.2.2  skrll 		npages = (round_page(vp->v_size) - offset) >> PAGE_SHIFT;
   1395  1.17.2.2  skrll 	}
   1396  1.17.2.2  skrll 
   1397  1.17.2.2  skrll 	if ((flags & PGO_LOCKED) != 0)
   1398  1.17.2.2  skrll 		return EBUSY;
   1399  1.17.2.2  skrll 
   1400  1.17.2.2  skrll 	if ((flags & PGO_NOTIMESTAMP) == 0) {
   1401  1.17.2.2  skrll 		if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
   1402  1.17.2.2  skrll 			node->tn_status |= TMPFS_NODE_ACCESSED;
   1403  1.17.2.2  skrll 
   1404  1.17.2.2  skrll 		if ((access_type & VM_PROT_WRITE) != 0)
   1405  1.17.2.2  skrll 			node->tn_status |= TMPFS_NODE_MODIFIED;
   1406  1.17.2.2  skrll 	}
   1407  1.17.2.2  skrll 
   1408  1.17.2.2  skrll 	simple_unlock(&vp->v_interlock);
   1409  1.17.2.2  skrll 
   1410  1.17.2.2  skrll 	simple_lock(&uobj->vmobjlock);
   1411  1.17.2.2  skrll 	error = (*uobj->pgops->pgo_get)(uobj, offset, m, &npages, centeridx,
   1412  1.17.2.2  skrll 	    access_type, advice, flags);
   1413  1.17.2.2  skrll 
   1414  1.17.2.2  skrll 	return error;
   1415  1.17.2.2  skrll }
   1416  1.17.2.2  skrll 
   1417  1.17.2.2  skrll /* --------------------------------------------------------------------- */
   1418  1.17.2.2  skrll 
   1419  1.17.2.2  skrll int
   1420  1.17.2.2  skrll tmpfs_putpages(void *v)
   1421  1.17.2.2  skrll {
   1422  1.17.2.2  skrll 	struct vnode *vp = ((struct vop_putpages_args *)v)->a_vp;
   1423  1.17.2.2  skrll 	voff_t offlo = ((struct vop_putpages_args *)v)->a_offlo;
   1424  1.17.2.2  skrll 	voff_t offhi = ((struct vop_putpages_args *)v)->a_offhi;
   1425  1.17.2.2  skrll 	int flags = ((struct vop_putpages_args *)v)->a_flags;
   1426  1.17.2.2  skrll 
   1427  1.17.2.2  skrll 	int error;
   1428  1.17.2.2  skrll 	struct tmpfs_node *node;
   1429  1.17.2.2  skrll 	struct uvm_object *uobj;
   1430  1.17.2.2  skrll 
   1431  1.17.2.2  skrll 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1432  1.17.2.2  skrll 
   1433  1.17.2.2  skrll 	node = VP_TO_TMPFS_NODE(vp);
   1434  1.17.2.2  skrll 
   1435  1.17.2.2  skrll 	if (vp->v_type != VREG) {
   1436  1.17.2.2  skrll 		simple_unlock(&vp->v_interlock);
   1437  1.17.2.2  skrll 		return 0;
   1438  1.17.2.2  skrll 	}
   1439  1.17.2.2  skrll 
   1440  1.17.2.2  skrll 	uobj = node->tn_aobj;
   1441  1.17.2.2  skrll 	simple_unlock(&vp->v_interlock);
   1442  1.17.2.2  skrll 
   1443  1.17.2.2  skrll 	simple_lock(&uobj->vmobjlock);
   1444  1.17.2.2  skrll 	error = (*uobj->pgops->pgo_put)(uobj, offlo, offhi, flags);
   1445  1.17.2.2  skrll 
   1446  1.17.2.2  skrll 	/* XXX mtime */
   1447  1.17.2.2  skrll 
   1448  1.17.2.2  skrll 	return error;
   1449  1.17.2.2  skrll }
   1450