Home | History | Annotate | Line # | Download | only in tmpfs
tmpfs_vnops.c revision 1.17.2.4
      1  1.17.2.4  christos /*	$NetBSD: tmpfs_vnops.c,v 1.17.2.4 2005/12/11 10:29:11 christos Exp $	*/
      2  1.17.2.2     skrll 
      3  1.17.2.2     skrll /*
      4  1.17.2.2     skrll  * Copyright (c) 2005 The NetBSD Foundation, Inc.
      5  1.17.2.2     skrll  * All rights reserved.
      6  1.17.2.2     skrll  *
      7  1.17.2.2     skrll  * This code is derived from software contributed to The NetBSD Foundation
      8  1.17.2.2     skrll  * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
      9  1.17.2.2     skrll  * 2005 program.
     10  1.17.2.2     skrll  *
     11  1.17.2.2     skrll  * Redistribution and use in source and binary forms, with or without
     12  1.17.2.2     skrll  * modification, are permitted provided that the following conditions
     13  1.17.2.2     skrll  * are met:
     14  1.17.2.2     skrll  * 1. Redistributions of source code must retain the above copyright
     15  1.17.2.2     skrll  *    notice, this list of conditions and the following disclaimer.
     16  1.17.2.2     skrll  * 2. Redistributions in binary form must reproduce the above copyright
     17  1.17.2.2     skrll  *    notice, this list of conditions and the following disclaimer in the
     18  1.17.2.2     skrll  *    documentation and/or other materials provided with the distribution.
     19  1.17.2.2     skrll  * 3. All advertising materials mentioning features or use of this software
     20  1.17.2.2     skrll  *    must display the following acknowledgement:
     21  1.17.2.2     skrll  *        This product includes software developed by the NetBSD
     22  1.17.2.2     skrll  *        Foundation, Inc. and its contributors.
     23  1.17.2.2     skrll  * 4. Neither the name of The NetBSD Foundation nor the names of its
     24  1.17.2.2     skrll  *    contributors may be used to endorse or promote products derived
     25  1.17.2.2     skrll  *    from this software without specific prior written permission.
     26  1.17.2.2     skrll  *
     27  1.17.2.2     skrll  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     28  1.17.2.2     skrll  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     29  1.17.2.2     skrll  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     30  1.17.2.2     skrll  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     31  1.17.2.2     skrll  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     32  1.17.2.2     skrll  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     33  1.17.2.2     skrll  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     34  1.17.2.2     skrll  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     35  1.17.2.2     skrll  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     36  1.17.2.2     skrll  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     37  1.17.2.2     skrll  * POSSIBILITY OF SUCH DAMAGE.
     38  1.17.2.2     skrll  */
     39  1.17.2.2     skrll 
     40  1.17.2.2     skrll /*
     41  1.17.2.2     skrll  * tmpfs vnode interface.
     42  1.17.2.2     skrll  */
     43  1.17.2.2     skrll 
     44  1.17.2.2     skrll #include <sys/cdefs.h>
     45  1.17.2.4  christos __KERNEL_RCSID(0, "$NetBSD: tmpfs_vnops.c,v 1.17.2.4 2005/12/11 10:29:11 christos Exp $");
     46  1.17.2.2     skrll 
     47  1.17.2.2     skrll #include <sys/param.h>
     48  1.17.2.2     skrll #include <sys/dirent.h>
     49  1.17.2.2     skrll #include <sys/fcntl.h>
     50  1.17.2.2     skrll #include <sys/event.h>
     51  1.17.2.2     skrll #include <sys/malloc.h>
     52  1.17.2.2     skrll #include <sys/namei.h>
     53  1.17.2.2     skrll #include <sys/proc.h>
     54  1.17.2.2     skrll #include <sys/stat.h>
     55  1.17.2.2     skrll #include <sys/uio.h>
     56  1.17.2.2     skrll #include <sys/unistd.h>
     57  1.17.2.2     skrll #include <sys/vnode.h>
     58  1.17.2.2     skrll #include <sys/lockf.h>
     59  1.17.2.2     skrll 
     60  1.17.2.2     skrll #include <uvm/uvm.h>
     61  1.17.2.2     skrll 
     62  1.17.2.2     skrll #include <miscfs/fifofs/fifo.h>
     63  1.17.2.2     skrll #include <fs/tmpfs/tmpfs_vnops.h>
     64  1.17.2.2     skrll #include <fs/tmpfs/tmpfs.h>
     65  1.17.2.2     skrll 
     66  1.17.2.2     skrll /* --------------------------------------------------------------------- */
     67  1.17.2.2     skrll 
     68  1.17.2.2     skrll /*
     69  1.17.2.2     skrll  * vnode operations vector used for files stored in a tmpfs file system.
     70  1.17.2.2     skrll  */
     71  1.17.2.2     skrll int (**tmpfs_vnodeop_p)(void *);
     72  1.17.2.2     skrll const struct vnodeopv_entry_desc tmpfs_vnodeop_entries[] = {
     73  1.17.2.2     skrll 	{ &vop_default_desc,		vn_default_error },
     74  1.17.2.2     skrll 	{ &vop_lookup_desc,		tmpfs_lookup },
     75  1.17.2.2     skrll 	{ &vop_create_desc,		tmpfs_create },
     76  1.17.2.2     skrll 	{ &vop_mknod_desc,		tmpfs_mknod },
     77  1.17.2.2     skrll 	{ &vop_open_desc,		tmpfs_open },
     78  1.17.2.2     skrll 	{ &vop_close_desc,		tmpfs_close },
     79  1.17.2.2     skrll 	{ &vop_access_desc,		tmpfs_access },
     80  1.17.2.2     skrll 	{ &vop_getattr_desc,		tmpfs_getattr },
     81  1.17.2.2     skrll 	{ &vop_setattr_desc,		tmpfs_setattr },
     82  1.17.2.2     skrll 	{ &vop_read_desc,		tmpfs_read },
     83  1.17.2.2     skrll 	{ &vop_write_desc,		tmpfs_write },
     84  1.17.2.2     skrll 	{ &vop_ioctl_desc,		tmpfs_ioctl },
     85  1.17.2.2     skrll 	{ &vop_fcntl_desc,		tmpfs_fcntl },
     86  1.17.2.2     skrll 	{ &vop_poll_desc,		tmpfs_poll },
     87  1.17.2.2     skrll 	{ &vop_kqfilter_desc,		tmpfs_kqfilter },
     88  1.17.2.2     skrll 	{ &vop_revoke_desc,		tmpfs_revoke },
     89  1.17.2.2     skrll 	{ &vop_mmap_desc,		tmpfs_mmap },
     90  1.17.2.2     skrll 	{ &vop_fsync_desc,		tmpfs_fsync },
     91  1.17.2.2     skrll 	{ &vop_seek_desc,		tmpfs_seek },
     92  1.17.2.2     skrll 	{ &vop_remove_desc,		tmpfs_remove },
     93  1.17.2.2     skrll 	{ &vop_link_desc,		tmpfs_link },
     94  1.17.2.2     skrll 	{ &vop_rename_desc,		tmpfs_rename },
     95  1.17.2.2     skrll 	{ &vop_mkdir_desc,		tmpfs_mkdir },
     96  1.17.2.2     skrll 	{ &vop_rmdir_desc,		tmpfs_rmdir },
     97  1.17.2.2     skrll 	{ &vop_symlink_desc,		tmpfs_symlink },
     98  1.17.2.2     skrll 	{ &vop_readdir_desc,		tmpfs_readdir },
     99  1.17.2.2     skrll 	{ &vop_readlink_desc,		tmpfs_readlink },
    100  1.17.2.2     skrll 	{ &vop_abortop_desc,		tmpfs_abortop },
    101  1.17.2.2     skrll 	{ &vop_inactive_desc,		tmpfs_inactive },
    102  1.17.2.2     skrll 	{ &vop_reclaim_desc,		tmpfs_reclaim },
    103  1.17.2.2     skrll 	{ &vop_lock_desc,		tmpfs_lock },
    104  1.17.2.2     skrll 	{ &vop_unlock_desc,		tmpfs_unlock },
    105  1.17.2.2     skrll 	{ &vop_bmap_desc,		tmpfs_bmap },
    106  1.17.2.2     skrll 	{ &vop_strategy_desc,		tmpfs_strategy },
    107  1.17.2.2     skrll 	{ &vop_print_desc,		tmpfs_print },
    108  1.17.2.2     skrll 	{ &vop_pathconf_desc,		tmpfs_pathconf },
    109  1.17.2.2     skrll 	{ &vop_islocked_desc,		tmpfs_islocked },
    110  1.17.2.2     skrll 	{ &vop_advlock_desc,		tmpfs_advlock },
    111  1.17.2.2     skrll 	{ &vop_lease_desc,		tmpfs_lease },
    112  1.17.2.2     skrll 	{ &vop_bwrite_desc,		tmpfs_bwrite },
    113  1.17.2.2     skrll 	{ &vop_getpages_desc,		tmpfs_getpages },
    114  1.17.2.2     skrll 	{ &vop_putpages_desc,		tmpfs_putpages },
    115  1.17.2.2     skrll 	{ NULL, NULL }
    116  1.17.2.2     skrll };
    117  1.17.2.2     skrll const struct vnodeopv_desc tmpfs_vnodeop_opv_desc =
    118  1.17.2.2     skrll 	{ &tmpfs_vnodeop_p, tmpfs_vnodeop_entries };
    119  1.17.2.2     skrll 
    120  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    121  1.17.2.2     skrll 
    122  1.17.2.2     skrll int
    123  1.17.2.2     skrll tmpfs_lookup(void *v)
    124  1.17.2.2     skrll {
    125  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_lookup_args *)v)->a_dvp;
    126  1.17.2.2     skrll 	struct vnode **vpp = ((struct vop_lookup_args *)v)->a_vpp;
    127  1.17.2.2     skrll 	struct componentname *cnp = ((struct vop_lookup_args *)v)->a_cnp;
    128  1.17.2.2     skrll 
    129  1.17.2.2     skrll 	int error;
    130  1.17.2.2     skrll 	struct tmpfs_dirent *de;
    131  1.17.2.2     skrll 	struct tmpfs_node *dnode;
    132  1.17.2.2     skrll 
    133  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(dvp));
    134  1.17.2.2     skrll 
    135  1.17.2.2     skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
    136  1.17.2.2     skrll 	*vpp = NULL;
    137  1.17.2.2     skrll 
    138  1.17.2.2     skrll 	/* Check accessibility of requested node as a first step. */
    139  1.17.2.3     skrll 	error = VOP_ACCESS(dvp, VEXEC, cnp->cn_cred, cnp->cn_lwp);
    140  1.17.2.2     skrll 	if (error != 0)
    141  1.17.2.2     skrll 		goto out;
    142  1.17.2.2     skrll 
    143  1.17.2.2     skrll 	/* If requesting the last path component on a read-only file system
    144  1.17.2.2     skrll 	 * with a write operation, deny it. */
    145  1.17.2.2     skrll 	if ((cnp->cn_flags & ISLASTCN) &&
    146  1.17.2.2     skrll 	    (dvp->v_mount->mnt_flag & MNT_RDONLY) &&
    147  1.17.2.2     skrll 	    (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) {
    148  1.17.2.2     skrll 		error = EROFS;
    149  1.17.2.2     skrll 		goto out;
    150  1.17.2.2     skrll 	}
    151  1.17.2.2     skrll 
    152  1.17.2.2     skrll 	/* Avoid doing a linear scan of the directory if the requested
    153  1.17.2.2     skrll 	 * directory/name couple is already in the cache. */
    154  1.17.2.2     skrll 	error = cache_lookup(dvp, vpp, cnp);
    155  1.17.2.2     skrll 	if (error >= 0)
    156  1.17.2.2     skrll 		goto out;
    157  1.17.2.2     skrll 
    158  1.17.2.2     skrll 	/* We cannot be requesting the parent directory of the root node. */
    159  1.17.2.2     skrll 	KASSERT(IMPLIES(dnode->tn_type == VDIR &&
    160  1.17.2.2     skrll 	    dnode->tn_parent == dnode, !(cnp->cn_flags & ISDOTDOT)));
    161  1.17.2.2     skrll 
    162  1.17.2.2     skrll 	if (cnp->cn_flags & ISDOTDOT) {
    163  1.17.2.2     skrll 		VOP_UNLOCK(dvp, 0);
    164  1.17.2.2     skrll 
    165  1.17.2.2     skrll 		/* Allocate a new vnode on the matching entry. */
    166  1.17.2.2     skrll 		error = tmpfs_alloc_vp(dvp->v_mount, dnode->tn_parent, vpp);
    167  1.17.2.2     skrll 
    168  1.17.2.2     skrll 		if (cnp->cn_flags & LOCKPARENT &&
    169  1.17.2.2     skrll 		    cnp->cn_flags & ISLASTCN) {
    170  1.17.2.2     skrll 			if (vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY) != 0)
    171  1.17.2.2     skrll 				cnp->cn_flags |= PDIRUNLOCK;
    172  1.17.2.2     skrll 		}
    173  1.17.2.2     skrll 		dnode->tn_parent->tn_lookup_dirent = NULL;
    174  1.17.2.2     skrll 	} else if (cnp->cn_namelen == 1 && cnp->cn_nameptr[0] == '.') {
    175  1.17.2.2     skrll 		VREF(dvp);
    176  1.17.2.2     skrll 		*vpp = dvp;
    177  1.17.2.2     skrll 		dnode->tn_lookup_dirent = NULL;
    178  1.17.2.2     skrll 		error = 0;
    179  1.17.2.2     skrll 	} else {
    180  1.17.2.2     skrll 		de = tmpfs_dir_lookup(dnode, cnp);
    181  1.17.2.2     skrll 		if (de == NULL) {
    182  1.17.2.2     skrll 			/* The entry was not found in the directory.
    183  1.17.2.2     skrll 			 * This is OK iff we are creating or renaming an
    184  1.17.2.2     skrll 			 * entry and are working on the last component of
    185  1.17.2.2     skrll 			 * the path name. */
    186  1.17.2.2     skrll 			if ((cnp->cn_flags & ISLASTCN) &&
    187  1.17.2.2     skrll 			    (cnp->cn_nameiop == CREATE || \
    188  1.17.2.2     skrll 			    cnp->cn_nameiop == RENAME)) {
    189  1.17.2.2     skrll 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    190  1.17.2.3     skrll 				    cnp->cn_lwp);
    191  1.17.2.2     skrll 				if (error != 0)
    192  1.17.2.2     skrll 					goto out;
    193  1.17.2.2     skrll 
    194  1.17.2.2     skrll 				/* Keep the component name in the buffer for
    195  1.17.2.2     skrll 				 * future uses. */
    196  1.17.2.2     skrll 				cnp->cn_flags |= SAVENAME;
    197  1.17.2.2     skrll 
    198  1.17.2.2     skrll 				error = EJUSTRETURN;
    199  1.17.2.2     skrll 			} else
    200  1.17.2.2     skrll 				error = ENOENT;
    201  1.17.2.2     skrll 		} else {
    202  1.17.2.2     skrll 			struct tmpfs_node *tnode;
    203  1.17.2.2     skrll 
    204  1.17.2.2     skrll 			/* The entry was found, so get its associated
    205  1.17.2.2     skrll 			 * tmpfs_node. */
    206  1.17.2.2     skrll 			tnode = de->td_node;
    207  1.17.2.2     skrll 
    208  1.17.2.2     skrll 			/* If we are not at the last path component and
    209  1.17.2.2     skrll 			 * found a non-directory or non-link entry (which
    210  1.17.2.2     skrll 			 * may itself be pointing to a directory), raise
    211  1.17.2.2     skrll 			 * an error. */
    212  1.17.2.2     skrll 			if ((tnode->tn_type != VDIR &&
    213  1.17.2.2     skrll 			    tnode->tn_type != VLNK) &&
    214  1.17.2.2     skrll 			    !(cnp->cn_flags & ISLASTCN)) {
    215  1.17.2.2     skrll 				error = ENOTDIR;
    216  1.17.2.2     skrll 				goto out;
    217  1.17.2.2     skrll 			}
    218  1.17.2.2     skrll 
    219  1.17.2.2     skrll 			/* If we are deleting or renaming the entry, keep
    220  1.17.2.2     skrll 			 * track of its tmpfs_dirent so that it can be
    221  1.17.2.2     skrll 			 * easily deleted later. */
    222  1.17.2.2     skrll 			if ((cnp->cn_flags & ISLASTCN) &&
    223  1.17.2.2     skrll 			    (cnp->cn_nameiop == DELETE ||
    224  1.17.2.2     skrll 			    cnp->cn_nameiop == RENAME)) {
    225  1.17.2.2     skrll 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    226  1.17.2.3     skrll 				    cnp->cn_lwp);
    227  1.17.2.2     skrll 				if (error != 0)
    228  1.17.2.2     skrll 					goto out;
    229  1.17.2.2     skrll 				/* TODO: Check sticky bit. */
    230  1.17.2.2     skrll 				tnode->tn_lookup_dirent = de;
    231  1.17.2.2     skrll 			}
    232  1.17.2.2     skrll 
    233  1.17.2.2     skrll 			/* Allocate a new vnode on the matching entry. */
    234  1.17.2.2     skrll 			error = tmpfs_alloc_vp(dvp->v_mount, tnode, vpp);
    235  1.17.2.2     skrll 
    236  1.17.2.2     skrll 			if (error == 0 && (!(cnp->cn_flags & LOCKPARENT) ||
    237  1.17.2.2     skrll 			    !(cnp->cn_flags & ISLASTCN)))
    238  1.17.2.2     skrll 				VOP_UNLOCK(dvp, 0);
    239  1.17.2.2     skrll 		}
    240  1.17.2.2     skrll 	}
    241  1.17.2.2     skrll 
    242  1.17.2.2     skrll 	/* Store the result of this lookup in the cache.  Avoid this if the
    243  1.17.2.2     skrll 	 * request was for creation, as it does not improve timings on
    244  1.17.2.2     skrll 	 * emprical tests. */
    245  1.17.2.2     skrll 	if ((cnp->cn_flags & MAKEENTRY) && cnp->cn_nameiop != CREATE)
    246  1.17.2.2     skrll 		cache_enter(dvp, *vpp, cnp);
    247  1.17.2.2     skrll 
    248  1.17.2.2     skrll out:
    249  1.17.2.2     skrll 	/* If there were no errors, *vpp cannot be null and it must be
    250  1.17.2.2     skrll 	 * locked. */
    251  1.17.2.2     skrll 	KASSERT(IFF(error == 0, *vpp != NULL && VOP_ISLOCKED(*vpp)));
    252  1.17.2.2     skrll 
    253  1.17.2.2     skrll 	/* dvp has to be locked if:
    254  1.17.2.2     skrll 	 * - There were errors and relocking of dvp did not fail.
    255  1.17.2.2     skrll 	 * - We are doing a '..' lookup, relocking of dvp did not fail
    256  1.17.2.2     skrll 	 *   (PDIRUNLOCK is unset) and LOCKPARENT or ISLASTCN are not set.
    257  1.17.2.2     skrll 	 * - LOCKPARENT and ISLASTCN are set. */
    258  1.17.2.2     skrll 	KASSERT(IMPLIES(
    259  1.17.2.2     skrll 	    (error != 0 && !(cnp->cn_flags & PDIRUNLOCK)) ||
    260  1.17.2.2     skrll 	    (cnp->cn_flags & ISDOTDOT && !(cnp->cn_flags & PDIRUNLOCK) &&
    261  1.17.2.2     skrll 	     ((cnp->cn_flags & LOCKPARENT) && (cnp->cn_flags & ISLASTCN))) ||
    262  1.17.2.2     skrll 	    (cnp->cn_flags & LOCKPARENT && cnp->cn_flags & ISLASTCN)
    263  1.17.2.2     skrll 	    ,
    264  1.17.2.2     skrll 	    VOP_ISLOCKED(dvp)));
    265  1.17.2.2     skrll 
    266  1.17.2.2     skrll 	return error;
    267  1.17.2.2     skrll }
    268  1.17.2.2     skrll 
    269  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    270  1.17.2.2     skrll 
    271  1.17.2.2     skrll int
    272  1.17.2.2     skrll tmpfs_create(void *v)
    273  1.17.2.2     skrll {
    274  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_create_args *)v)->a_dvp;
    275  1.17.2.2     skrll 	struct vnode **vpp = ((struct vop_create_args *)v)->a_vpp;
    276  1.17.2.2     skrll 	struct componentname *cnp = ((struct vop_create_args *)v)->a_cnp;
    277  1.17.2.2     skrll 	struct vattr *vap = ((struct vop_create_args *)v)->a_vap;
    278  1.17.2.2     skrll 
    279  1.17.2.2     skrll 	KASSERT(vap->va_type == VREG || vap->va_type == VSOCK);
    280  1.17.2.2     skrll 
    281  1.17.2.2     skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    282  1.17.2.2     skrll }
    283  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    284  1.17.2.2     skrll 
    285  1.17.2.2     skrll int
    286  1.17.2.2     skrll tmpfs_mknod(void *v)
    287  1.17.2.2     skrll {
    288  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_mknod_args *)v)->a_dvp;
    289  1.17.2.2     skrll 	struct vnode **vpp = ((struct vop_mknod_args *)v)->a_vpp;
    290  1.17.2.2     skrll 	struct componentname *cnp = ((struct vop_mknod_args *)v)->a_cnp;
    291  1.17.2.2     skrll 	struct vattr *vap = ((struct vop_mknod_args *)v)->a_vap;
    292  1.17.2.2     skrll 
    293  1.17.2.2     skrll 	if (vap->va_type != VBLK && vap->va_type != VCHR &&
    294  1.17.2.2     skrll 	    vap->va_type != VFIFO)
    295  1.17.2.2     skrll 		return EINVAL;
    296  1.17.2.2     skrll 
    297  1.17.2.2     skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    298  1.17.2.2     skrll }
    299  1.17.2.2     skrll 
    300  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    301  1.17.2.2     skrll 
    302  1.17.2.2     skrll int
    303  1.17.2.2     skrll tmpfs_open(void *v)
    304  1.17.2.2     skrll {
    305  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_open_args *)v)->a_vp;
    306  1.17.2.2     skrll 	int mode = ((struct vop_open_args *)v)->a_mode;
    307  1.17.2.2     skrll 
    308  1.17.2.2     skrll 	int error;
    309  1.17.2.2     skrll 	struct tmpfs_node *node;
    310  1.17.2.2     skrll 
    311  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    312  1.17.2.2     skrll 
    313  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    314  1.17.2.2     skrll 	KASSERT(node->tn_links > 0);
    315  1.17.2.2     skrll 
    316  1.17.2.2     skrll 	/* If the file is marked append-only, deny write requests. */
    317  1.17.2.2     skrll 	if (node->tn_flags & APPEND && (mode & (FWRITE | O_APPEND)) == FWRITE)
    318  1.17.2.2     skrll 		error = EPERM;
    319  1.17.2.2     skrll 	else
    320  1.17.2.2     skrll 		error = 0;
    321  1.17.2.2     skrll 
    322  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    323  1.17.2.2     skrll 
    324  1.17.2.2     skrll 	return error;
    325  1.17.2.2     skrll }
    326  1.17.2.2     skrll 
    327  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    328  1.17.2.2     skrll 
    329  1.17.2.2     skrll int
    330  1.17.2.2     skrll tmpfs_close(void *v)
    331  1.17.2.2     skrll {
    332  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_close_args *)v)->a_vp;
    333  1.17.2.2     skrll 
    334  1.17.2.2     skrll 	struct tmpfs_node *node;
    335  1.17.2.2     skrll 
    336  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    337  1.17.2.2     skrll 
    338  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    339  1.17.2.2     skrll 
    340  1.17.2.2     skrll 	if (node->tn_links > 0) {
    341  1.17.2.2     skrll 		/* Update node times.  No need to do it if the node has
    342  1.17.2.2     skrll 		 * been deleted, because it will vanish after we return. */
    343  1.17.2.2     skrll 		tmpfs_update(vp, NULL, NULL, UPDATE_CLOSE);
    344  1.17.2.2     skrll 	}
    345  1.17.2.2     skrll 
    346  1.17.2.2     skrll 	return 0;
    347  1.17.2.2     skrll }
    348  1.17.2.2     skrll 
    349  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    350  1.17.2.2     skrll 
    351  1.17.2.2     skrll int
    352  1.17.2.2     skrll tmpfs_access(void *v)
    353  1.17.2.2     skrll {
    354  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_access_args *)v)->a_vp;
    355  1.17.2.2     skrll 	int mode = ((struct vop_access_args *)v)->a_mode;
    356  1.17.2.2     skrll 	struct ucred *cred = ((struct vop_access_args *)v)->a_cred;
    357  1.17.2.2     skrll 
    358  1.17.2.2     skrll 	int error;
    359  1.17.2.2     skrll 	struct tmpfs_node *node;
    360  1.17.2.2     skrll 
    361  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    362  1.17.2.2     skrll 
    363  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    364  1.17.2.2     skrll 
    365  1.17.2.2     skrll 	switch (vp->v_type) {
    366  1.17.2.2     skrll 	case VDIR:
    367  1.17.2.2     skrll 		/* FALLTHROUGH */
    368  1.17.2.2     skrll 	case VLNK:
    369  1.17.2.2     skrll 		/* FALLTHROUGH */
    370  1.17.2.2     skrll 	case VREG:
    371  1.17.2.2     skrll 		if (mode & VWRITE && vp->v_mount->mnt_flag & MNT_RDONLY) {
    372  1.17.2.2     skrll 			error = EROFS;
    373  1.17.2.2     skrll 			goto out;
    374  1.17.2.2     skrll 		}
    375  1.17.2.2     skrll 		break;
    376  1.17.2.2     skrll 
    377  1.17.2.2     skrll 	case VBLK:
    378  1.17.2.2     skrll 		/* FALLTHROUGH */
    379  1.17.2.2     skrll 	case VCHR:
    380  1.17.2.2     skrll 		/* FALLTHROUGH */
    381  1.17.2.2     skrll 	case VSOCK:
    382  1.17.2.2     skrll 		/* FALLTHROUGH */
    383  1.17.2.2     skrll 	case VFIFO:
    384  1.17.2.2     skrll 		break;
    385  1.17.2.2     skrll 
    386  1.17.2.2     skrll 	default:
    387  1.17.2.2     skrll 		error = EINVAL;
    388  1.17.2.2     skrll 		goto out;
    389  1.17.2.2     skrll 	}
    390  1.17.2.2     skrll 
    391  1.17.2.2     skrll 	if (mode & VWRITE && node->tn_flags & IMMUTABLE) {
    392  1.17.2.2     skrll 		error = EPERM;
    393  1.17.2.2     skrll 		goto out;
    394  1.17.2.2     skrll 	}
    395  1.17.2.2     skrll 
    396  1.17.2.2     skrll 	error = vaccess(vp->v_type, node->tn_mode, node->tn_uid,
    397  1.17.2.2     skrll 	    node->tn_gid, mode, cred);
    398  1.17.2.2     skrll 
    399  1.17.2.2     skrll out:
    400  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    401  1.17.2.2     skrll 
    402  1.17.2.2     skrll 	return error;
    403  1.17.2.2     skrll }
    404  1.17.2.2     skrll 
    405  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    406  1.17.2.2     skrll 
    407  1.17.2.2     skrll int
    408  1.17.2.2     skrll tmpfs_getattr(void *v)
    409  1.17.2.2     skrll {
    410  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_getattr_args *)v)->a_vp;
    411  1.17.2.2     skrll 	struct vattr *vap = ((struct vop_getattr_args *)v)->a_vap;
    412  1.17.2.2     skrll 
    413  1.17.2.2     skrll 	struct tmpfs_node *node;
    414  1.17.2.2     skrll 
    415  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    416  1.17.2.2     skrll 
    417  1.17.2.2     skrll 	VATTR_NULL(vap);
    418  1.17.2.2     skrll 
    419  1.17.2.2     skrll 	tmpfs_itimes(vp, NULL, NULL);
    420  1.17.2.2     skrll 
    421  1.17.2.2     skrll 	vap->va_type = vp->v_type;
    422  1.17.2.2     skrll 	vap->va_mode = node->tn_mode;
    423  1.17.2.2     skrll 	vap->va_nlink = node->tn_links;
    424  1.17.2.2     skrll 	vap->va_uid = node->tn_uid;
    425  1.17.2.2     skrll 	vap->va_gid = node->tn_gid;
    426  1.17.2.2     skrll 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
    427  1.17.2.2     skrll 	vap->va_fileid = node->tn_id;
    428  1.17.2.2     skrll 	vap->va_size = node->tn_size;
    429  1.17.2.2     skrll 	vap->va_blocksize = PAGE_SIZE;
    430  1.17.2.2     skrll 	vap->va_atime = node->tn_atime;
    431  1.17.2.2     skrll 	vap->va_mtime = node->tn_mtime;
    432  1.17.2.2     skrll 	vap->va_ctime = node->tn_ctime;
    433  1.17.2.2     skrll 	vap->va_birthtime = node->tn_birthtime;
    434  1.17.2.2     skrll 	vap->va_gen = node->tn_gen;
    435  1.17.2.2     skrll 	vap->va_flags = node->tn_flags;
    436  1.17.2.2     skrll 	vap->va_rdev = (vp->v_type == VBLK || vp->v_type == VCHR) ?
    437  1.17.2.2     skrll 		node->tn_rdev : VNOVAL;
    438  1.17.2.2     skrll 	vap->va_bytes = round_page(node->tn_size);
    439  1.17.2.2     skrll 	vap->va_filerev = VNOVAL;
    440  1.17.2.2     skrll 	vap->va_vaflags = 0;
    441  1.17.2.2     skrll 	vap->va_spare = VNOVAL; /* XXX */
    442  1.17.2.2     skrll 
    443  1.17.2.2     skrll 	return 0;
    444  1.17.2.2     skrll }
    445  1.17.2.2     skrll 
    446  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    447  1.17.2.2     skrll 
    448  1.17.2.2     skrll /* XXX Should this operation be atomic?  I think it should, but code in
    449  1.17.2.2     skrll  * XXX other places (e.g., ufs) doesn't seem to be... */
    450  1.17.2.2     skrll int
    451  1.17.2.2     skrll tmpfs_setattr(void *v)
    452  1.17.2.2     skrll {
    453  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_setattr_args *)v)->a_vp;
    454  1.17.2.2     skrll 	struct vattr *vap = ((struct vop_setattr_args *)v)->a_vap;
    455  1.17.2.2     skrll 	struct ucred *cred = ((struct vop_setattr_args *)v)->a_cred;
    456  1.17.2.3     skrll 	struct lwp *l = ((struct vop_setattr_args *)v)->a_l;
    457  1.17.2.2     skrll 
    458  1.17.2.2     skrll 	int error;
    459  1.17.2.2     skrll 
    460  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    461  1.17.2.2     skrll 
    462  1.17.2.2     skrll 	error = 0;
    463  1.17.2.2     skrll 
    464  1.17.2.2     skrll 	/* Abort if any unsettable attribute is given. */
    465  1.17.2.2     skrll 	if (vap->va_type != VNON ||
    466  1.17.2.2     skrll 	    vap->va_nlink != VNOVAL ||
    467  1.17.2.2     skrll 	    vap->va_fsid != VNOVAL ||
    468  1.17.2.2     skrll 	    vap->va_fileid != VNOVAL ||
    469  1.17.2.2     skrll 	    vap->va_blocksize != VNOVAL ||
    470  1.17.2.2     skrll 	    vap->va_ctime.tv_sec != VNOVAL ||
    471  1.17.2.2     skrll 	    vap->va_ctime.tv_nsec != VNOVAL ||
    472  1.17.2.2     skrll 	    vap->va_birthtime.tv_sec != VNOVAL ||
    473  1.17.2.2     skrll 	    vap->va_birthtime.tv_nsec != VNOVAL ||
    474  1.17.2.2     skrll 	    vap->va_gen != VNOVAL ||
    475  1.17.2.2     skrll 	    vap->va_rdev != VNOVAL ||
    476  1.17.2.2     skrll 	    vap->va_bytes != VNOVAL)
    477  1.17.2.2     skrll 		error = EINVAL;
    478  1.17.2.2     skrll 
    479  1.17.2.2     skrll 	if (error == 0 && (vap->va_flags != VNOVAL))
    480  1.17.2.3     skrll 		error = tmpfs_chflags(vp, vap->va_flags, cred, l->l_proc);
    481  1.17.2.2     skrll 
    482  1.17.2.2     skrll 	if (error == 0 && (vap->va_size != VNOVAL))
    483  1.17.2.3     skrll 		error = tmpfs_chsize(vp, vap->va_size, cred, l->l_proc);
    484  1.17.2.2     skrll 
    485  1.17.2.2     skrll 	if (error == 0 && (vap->va_uid != VNOVAL || vap->va_gid != VNOVAL))
    486  1.17.2.3     skrll 		error = tmpfs_chown(vp, vap->va_uid, vap->va_gid, cred, l->l_proc);
    487  1.17.2.2     skrll 
    488  1.17.2.2     skrll 	if (error == 0 && (vap->va_mode != VNOVAL))
    489  1.17.2.3     skrll 		error = tmpfs_chmod(vp, vap->va_mode, cred, l->l_proc);
    490  1.17.2.2     skrll 
    491  1.17.2.2     skrll 	if (error == 0 && ((vap->va_atime.tv_sec != VNOVAL &&
    492  1.17.2.2     skrll 	    vap->va_atime.tv_nsec != VNOVAL) ||
    493  1.17.2.2     skrll 	    (vap->va_mtime.tv_sec != VNOVAL &&
    494  1.17.2.2     skrll 	    vap->va_mtime.tv_nsec != VNOVAL)))
    495  1.17.2.2     skrll 		error = tmpfs_chtimes(vp, &vap->va_atime, &vap->va_mtime,
    496  1.17.2.3     skrll 		    vap->va_vaflags, cred, l);
    497  1.17.2.2     skrll 
    498  1.17.2.2     skrll 	/* Update the node times.  We give preference to the error codes
    499  1.17.2.2     skrll 	 * generated by this function rather than the ones that may arise
    500  1.17.2.2     skrll 	 * from tmpfs_update. */
    501  1.17.2.2     skrll 	tmpfs_update(vp, NULL, NULL, 0);
    502  1.17.2.2     skrll 
    503  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    504  1.17.2.2     skrll 
    505  1.17.2.2     skrll 	return error;
    506  1.17.2.2     skrll }
    507  1.17.2.2     skrll 
    508  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    509  1.17.2.2     skrll 
    510  1.17.2.2     skrll int
    511  1.17.2.2     skrll tmpfs_read(void *v)
    512  1.17.2.2     skrll {
    513  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_read_args *)v)->a_vp;
    514  1.17.2.2     skrll 	struct uio *uio = ((struct vop_read_args *)v)->a_uio;
    515  1.17.2.2     skrll 
    516  1.17.2.2     skrll 	int error;
    517  1.17.2.2     skrll 	int flags;
    518  1.17.2.2     skrll 	struct tmpfs_node *node;
    519  1.17.2.2     skrll 	struct uvm_object *uobj;
    520  1.17.2.2     skrll 
    521  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    522  1.17.2.2     skrll 
    523  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    524  1.17.2.2     skrll 
    525  1.17.2.2     skrll 	if (vp->v_type != VREG) {
    526  1.17.2.2     skrll 		error = EISDIR;
    527  1.17.2.2     skrll 		goto out;
    528  1.17.2.2     skrll 	}
    529  1.17.2.2     skrll 
    530  1.17.2.2     skrll 	if (uio->uio_offset < 0) {
    531  1.17.2.2     skrll 		error = EINVAL;
    532  1.17.2.2     skrll 		goto out;
    533  1.17.2.2     skrll 	}
    534  1.17.2.2     skrll 
    535  1.17.2.2     skrll 	node->tn_status |= TMPFS_NODE_ACCESSED;
    536  1.17.2.2     skrll 
    537  1.17.2.2     skrll 	uobj = node->tn_aobj;
    538  1.17.2.2     skrll 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    539  1.17.2.2     skrll 	error = 0;
    540  1.17.2.2     skrll 	while (error == 0 && uio->uio_resid > 0) {
    541  1.17.2.2     skrll 		vsize_t len;
    542  1.17.2.2     skrll 		void *win;
    543  1.17.2.2     skrll 
    544  1.17.2.2     skrll 		if (node->tn_size <= uio->uio_offset)
    545  1.17.2.2     skrll 			break;
    546  1.17.2.2     skrll 
    547  1.17.2.2     skrll 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    548  1.17.2.2     skrll 		if (len == 0)
    549  1.17.2.2     skrll 			break;
    550  1.17.2.2     skrll 
    551  1.17.2.4  christos 		win = ubc_alloc(uobj, uio->uio_offset, &len, UVM_ADV_NORMAL,
    552  1.17.2.4  christos 		    UBC_READ);
    553  1.17.2.2     skrll 		error = uiomove(win, len, uio);
    554  1.17.2.2     skrll 		ubc_release(win, flags);
    555  1.17.2.2     skrll 	}
    556  1.17.2.2     skrll 
    557  1.17.2.2     skrll out:
    558  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    559  1.17.2.2     skrll 
    560  1.17.2.2     skrll 	return error;
    561  1.17.2.2     skrll }
    562  1.17.2.2     skrll 
    563  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    564  1.17.2.2     skrll 
    565  1.17.2.2     skrll int
    566  1.17.2.2     skrll tmpfs_write(void *v)
    567  1.17.2.2     skrll {
    568  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_write_args *)v)->a_vp;
    569  1.17.2.2     skrll 	struct uio *uio = ((struct vop_write_args *)v)->a_uio;
    570  1.17.2.2     skrll 	int ioflag = ((struct vop_write_args *)v)->a_ioflag;
    571  1.17.2.2     skrll 
    572  1.17.2.2     skrll 	boolean_t extended;
    573  1.17.2.2     skrll 	int error;
    574  1.17.2.2     skrll 	int flags;
    575  1.17.2.2     skrll 	off_t oldsize;
    576  1.17.2.2     skrll 	struct tmpfs_node *node;
    577  1.17.2.2     skrll 	struct uvm_object *uobj;
    578  1.17.2.2     skrll 
    579  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    580  1.17.2.2     skrll 
    581  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    582  1.17.2.2     skrll 	oldsize = node->tn_size;
    583  1.17.2.2     skrll 
    584  1.17.2.2     skrll 	if (uio->uio_offset < 0 || vp->v_type != VREG) {
    585  1.17.2.2     skrll 		error = EINVAL;
    586  1.17.2.2     skrll 		goto out;
    587  1.17.2.2     skrll 	}
    588  1.17.2.2     skrll 
    589  1.17.2.2     skrll 	if (uio->uio_resid == 0) {
    590  1.17.2.2     skrll 		error = 0;
    591  1.17.2.2     skrll 		goto out;
    592  1.17.2.2     skrll 	}
    593  1.17.2.2     skrll 
    594  1.17.2.2     skrll 	if (ioflag & IO_APPEND)
    595  1.17.2.2     skrll 		uio->uio_offset = node->tn_size;
    596  1.17.2.2     skrll 
    597  1.17.2.2     skrll 	extended = uio->uio_offset + uio->uio_resid > node->tn_size;
    598  1.17.2.2     skrll 	if (extended) {
    599  1.17.2.2     skrll 		error = tmpfs_reg_resize(vp, uio->uio_offset + uio->uio_resid);
    600  1.17.2.2     skrll 		if (error != 0)
    601  1.17.2.2     skrll 			goto out;
    602  1.17.2.2     skrll 	}
    603  1.17.2.2     skrll 
    604  1.17.2.2     skrll 	uobj = node->tn_aobj;
    605  1.17.2.2     skrll 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    606  1.17.2.2     skrll 	error = 0;
    607  1.17.2.2     skrll 	while (error == 0 && uio->uio_resid > 0) {
    608  1.17.2.2     skrll 		vsize_t len;
    609  1.17.2.2     skrll 		void *win;
    610  1.17.2.2     skrll 
    611  1.17.2.2     skrll 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    612  1.17.2.2     skrll 		if (len == 0)
    613  1.17.2.2     skrll 			break;
    614  1.17.2.2     skrll 
    615  1.17.2.4  christos 		win = ubc_alloc(uobj, uio->uio_offset, &len, UVM_ADV_NORMAL,
    616  1.17.2.4  christos 		    UBC_WRITE);
    617  1.17.2.2     skrll 		error = uiomove(win, len, uio);
    618  1.17.2.2     skrll 		ubc_release(win, flags);
    619  1.17.2.2     skrll 	}
    620  1.17.2.2     skrll 
    621  1.17.2.2     skrll 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED |
    622  1.17.2.2     skrll 	    (extended ? TMPFS_NODE_CHANGED : 0);
    623  1.17.2.2     skrll 
    624  1.17.2.2     skrll 	if (error != 0)
    625  1.17.2.2     skrll 		(void)tmpfs_reg_resize(vp, oldsize);
    626  1.17.2.2     skrll 
    627  1.17.2.2     skrll out:
    628  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    629  1.17.2.2     skrll 	KASSERT(IMPLIES(error == 0, uio->uio_resid == 0));
    630  1.17.2.2     skrll 	KASSERT(IMPLIES(error != 0, oldsize == node->tn_size));
    631  1.17.2.2     skrll 
    632  1.17.2.2     skrll 	return error;
    633  1.17.2.2     skrll }
    634  1.17.2.2     skrll 
    635  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    636  1.17.2.2     skrll 
    637  1.17.2.2     skrll int
    638  1.17.2.2     skrll tmpfs_fsync(void *v)
    639  1.17.2.2     skrll {
    640  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_fsync_args *)v)->a_vp;
    641  1.17.2.2     skrll 
    642  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    643  1.17.2.2     skrll 
    644  1.17.2.2     skrll 	tmpfs_update(vp, NULL, NULL, 0);
    645  1.17.2.2     skrll 
    646  1.17.2.2     skrll 	return 0;
    647  1.17.2.2     skrll }
    648  1.17.2.2     skrll 
    649  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    650  1.17.2.2     skrll 
    651  1.17.2.2     skrll int
    652  1.17.2.2     skrll tmpfs_remove(void *v)
    653  1.17.2.2     skrll {
    654  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_remove_args *)v)->a_dvp;
    655  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_remove_args *)v)->a_vp;
    656  1.17.2.2     skrll 
    657  1.17.2.2     skrll 	int error;
    658  1.17.2.2     skrll 	struct tmpfs_dirent *de;
    659  1.17.2.2     skrll 	struct tmpfs_mount *tmp;
    660  1.17.2.2     skrll 	struct tmpfs_node *dnode;
    661  1.17.2.2     skrll 	struct tmpfs_node *node;
    662  1.17.2.2     skrll 
    663  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(dvp));
    664  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
    665  1.17.2.2     skrll 
    666  1.17.2.2     skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
    667  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    668  1.17.2.2     skrll 	tmp = VFS_TO_TMPFS(vp->v_mount);
    669  1.17.2.2     skrll 	de = node->tn_lookup_dirent;
    670  1.17.2.2     skrll 	KASSERT(de != NULL);
    671  1.17.2.2     skrll 
    672  1.17.2.2     skrll 	/* XXX: Why isn't this done by the caller? */
    673  1.17.2.2     skrll 	if (vp->v_type == VDIR) {
    674  1.17.2.2     skrll 		error = EISDIR;
    675  1.17.2.2     skrll 		goto out;
    676  1.17.2.2     skrll 	}
    677  1.17.2.2     skrll 
    678  1.17.2.2     skrll 	/* Files marked as immutable or append-only cannot be deleted. */
    679  1.17.2.2     skrll 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    680  1.17.2.2     skrll 		error = EPERM;
    681  1.17.2.2     skrll 		goto out;
    682  1.17.2.2     skrll 	}
    683  1.17.2.2     skrll 
    684  1.17.2.2     skrll 	/* Remove the entry from the directory; as it is a file, we do not
    685  1.17.2.2     skrll 	 * have to change the number of hard links of the directory. */
    686  1.17.2.2     skrll 	tmpfs_dir_detach(dvp, de);
    687  1.17.2.2     skrll 
    688  1.17.2.2     skrll 	/* Notify interested parties about the modification of dvp.
    689  1.17.2.2     skrll 	 * The removal of vp is notified when it is reclaimed. */
    690  1.17.2.2     skrll 	VN_KNOTE(dvp, NOTE_WRITE);
    691  1.17.2.2     skrll 
    692  1.17.2.2     skrll 	/* Free the directory entry we just deleted.  Note that the node
    693  1.17.2.2     skrll 	 * referred by it will not be removed until the vnode is really
    694  1.17.2.2     skrll 	 * reclaimed. */
    695  1.17.2.2     skrll 	tmpfs_free_dirent(tmp, de, TRUE);
    696  1.17.2.2     skrll 
    697  1.17.2.2     skrll 	error = 0;
    698  1.17.2.2     skrll 
    699  1.17.2.2     skrll out:
    700  1.17.2.2     skrll 	vput(dvp);
    701  1.17.2.2     skrll 	vput(vp);
    702  1.17.2.2     skrll 
    703  1.17.2.2     skrll 	KASSERT(!VOP_ISLOCKED(dvp));
    704  1.17.2.2     skrll 
    705  1.17.2.2     skrll 	return error;
    706  1.17.2.2     skrll }
    707  1.17.2.2     skrll 
    708  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    709  1.17.2.2     skrll 
    710  1.17.2.2     skrll int
    711  1.17.2.2     skrll tmpfs_link(void *v)
    712  1.17.2.2     skrll {
    713  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_link_args *)v)->a_dvp;
    714  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_link_args *)v)->a_vp;
    715  1.17.2.2     skrll 	struct componentname *cnp = ((struct vop_link_args *)v)->a_cnp;
    716  1.17.2.2     skrll 
    717  1.17.2.2     skrll 	int error;
    718  1.17.2.2     skrll 	struct tmpfs_dirent *de;
    719  1.17.2.2     skrll 	struct tmpfs_node *dnode;
    720  1.17.2.2     skrll 	struct tmpfs_node *node;
    721  1.17.2.2     skrll 
    722  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(dvp));
    723  1.17.2.2     skrll 	KASSERT(!VOP_ISLOCKED(vp));
    724  1.17.2.2     skrll 	KASSERT(cnp->cn_flags & HASBUF);
    725  1.17.2.2     skrll 	KASSERT(dvp != vp); /* XXX When can this be false? */
    726  1.17.2.2     skrll 
    727  1.17.2.2     skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
    728  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
    729  1.17.2.2     skrll 
    730  1.17.2.2     skrll 	/* Lock vp because we will need to run tmpfs_update over it, which
    731  1.17.2.2     skrll 	 * needs the vnode to be locked. */
    732  1.17.2.2     skrll 	error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    733  1.17.2.2     skrll 	if (error != 0)
    734  1.17.2.2     skrll 		goto out;
    735  1.17.2.2     skrll 
    736  1.17.2.2     skrll 	/* XXX: Why aren't the following two tests done by the caller? */
    737  1.17.2.2     skrll 
    738  1.17.2.2     skrll 	/* Hard links of directories are forbidden. */
    739  1.17.2.2     skrll 	if (vp->v_type == VDIR) {
    740  1.17.2.2     skrll 		error = EPERM;
    741  1.17.2.2     skrll 		goto out;
    742  1.17.2.2     skrll 	}
    743  1.17.2.2     skrll 
    744  1.17.2.2     skrll 	/* Cannot create cross-device links. */
    745  1.17.2.2     skrll 	if (dvp->v_mount != vp->v_mount) {
    746  1.17.2.2     skrll 		error = EXDEV;
    747  1.17.2.2     skrll 		goto out;
    748  1.17.2.2     skrll 	}
    749  1.17.2.2     skrll 
    750  1.17.2.2     skrll 	/* Ensure that we do not overflow the maximum number of links imposed
    751  1.17.2.2     skrll 	 * by the system. */
    752  1.17.2.2     skrll 	KASSERT(node->tn_links <= LINK_MAX);
    753  1.17.2.2     skrll 	if (node->tn_links == LINK_MAX) {
    754  1.17.2.2     skrll 		error = EMLINK;
    755  1.17.2.2     skrll 		goto out;
    756  1.17.2.2     skrll 	}
    757  1.17.2.2     skrll 
    758  1.17.2.2     skrll 	/* We cannot create links of files marked immutable or append-only. */
    759  1.17.2.2     skrll 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    760  1.17.2.2     skrll 		error = EPERM;
    761  1.17.2.2     skrll 		goto out;
    762  1.17.2.2     skrll 	}
    763  1.17.2.2     skrll 
    764  1.17.2.2     skrll 	/* Allocate a new directory entry to represent the node. */
    765  1.17.2.2     skrll 	error = tmpfs_alloc_dirent(VFS_TO_TMPFS(vp->v_mount), node,
    766  1.17.2.2     skrll 	    cnp->cn_nameptr, cnp->cn_namelen, &de);
    767  1.17.2.2     skrll 	if (error != 0)
    768  1.17.2.2     skrll 		goto out;
    769  1.17.2.2     skrll 
    770  1.17.2.2     skrll 	/* Insert the new directory entry into the appropriate directory. */
    771  1.17.2.2     skrll 	tmpfs_dir_attach(dvp, de);
    772  1.17.2.2     skrll 	VN_KNOTE(dvp, NOTE_WRITE);
    773  1.17.2.2     skrll 
    774  1.17.2.2     skrll 	/* vp link count has changed, so update node times. */
    775  1.17.2.2     skrll 	node->tn_status |= TMPFS_NODE_CHANGED;
    776  1.17.2.2     skrll 	tmpfs_update(vp, NULL, NULL, 0);
    777  1.17.2.2     skrll 
    778  1.17.2.2     skrll 	error = 0;
    779  1.17.2.2     skrll 
    780  1.17.2.2     skrll out:
    781  1.17.2.2     skrll 	if (VOP_ISLOCKED(vp))
    782  1.17.2.2     skrll 		VOP_UNLOCK(vp, 0);
    783  1.17.2.2     skrll 
    784  1.17.2.2     skrll 	PNBUF_PUT(cnp->cn_pnbuf);
    785  1.17.2.2     skrll 
    786  1.17.2.2     skrll 	vput(dvp);
    787  1.17.2.2     skrll 
    788  1.17.2.2     skrll 	/* XXX Locking status of dvp does not match manual page. */
    789  1.17.2.2     skrll 	KASSERT(!VOP_ISLOCKED(dvp));
    790  1.17.2.2     skrll 	KASSERT(!VOP_ISLOCKED(vp));
    791  1.17.2.2     skrll 
    792  1.17.2.2     skrll 	return error;
    793  1.17.2.2     skrll }
    794  1.17.2.2     skrll 
    795  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    796  1.17.2.2     skrll 
    797  1.17.2.2     skrll int
    798  1.17.2.2     skrll tmpfs_rename(void *v)
    799  1.17.2.2     skrll {
    800  1.17.2.2     skrll 	struct vnode *fdvp = ((struct vop_rename_args *)v)->a_fdvp;
    801  1.17.2.2     skrll 	struct vnode *fvp = ((struct vop_rename_args *)v)->a_fvp;
    802  1.17.2.2     skrll 	struct componentname *fcnp = ((struct vop_rename_args *)v)->a_fcnp;
    803  1.17.2.2     skrll 	struct vnode *tdvp = ((struct vop_rename_args *)v)->a_tdvp;
    804  1.17.2.2     skrll 	struct vnode *tvp = ((struct vop_rename_args *)v)->a_tvp;
    805  1.17.2.2     skrll 	struct componentname *tcnp = ((struct vop_rename_args *)v)->a_tcnp;
    806  1.17.2.2     skrll 
    807  1.17.2.2     skrll 	char *newname;
    808  1.17.2.2     skrll 	int error;
    809  1.17.2.2     skrll 	struct tmpfs_dirent *de;
    810  1.17.2.2     skrll 	struct tmpfs_mount *tmp;
    811  1.17.2.2     skrll 	struct tmpfs_node *fdnode;
    812  1.17.2.2     skrll 	struct tmpfs_node *fnode;
    813  1.17.2.2     skrll 	struct tmpfs_node *tdnode;
    814  1.17.2.2     skrll 
    815  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(tdvp));
    816  1.17.2.2     skrll 	KASSERT(IMPLIES(tvp != NULL, VOP_ISLOCKED(tvp)));
    817  1.17.2.2     skrll 	KASSERT(fcnp->cn_flags & HASBUF);
    818  1.17.2.2     skrll 	KASSERT(tcnp->cn_flags & HASBUF);
    819  1.17.2.2     skrll 
    820  1.17.2.2     skrll 	fdnode = VP_TO_TMPFS_DIR(fdvp);
    821  1.17.2.2     skrll 	fnode = VP_TO_TMPFS_NODE(fvp);
    822  1.17.2.2     skrll 	de = fnode->tn_lookup_dirent;
    823  1.17.2.2     skrll 
    824  1.17.2.2     skrll 	/* Disallow cross-device renames.
    825  1.17.2.2     skrll 	 * XXX Why isn't this done by the caller? */
    826  1.17.2.2     skrll 	if (fvp->v_mount != tdvp->v_mount ||
    827  1.17.2.2     skrll 	    (tvp != NULL && fvp->v_mount != tvp->v_mount)) {
    828  1.17.2.2     skrll 		error = EXDEV;
    829  1.17.2.2     skrll 		goto out;
    830  1.17.2.2     skrll 	}
    831  1.17.2.2     skrll 
    832  1.17.2.2     skrll 	tmp = VFS_TO_TMPFS(tdvp->v_mount);
    833  1.17.2.2     skrll 	tdnode = VP_TO_TMPFS_DIR(tdvp);
    834  1.17.2.2     skrll 
    835  1.17.2.2     skrll 	/* If source and target are the same file, there is nothing to do. */
    836  1.17.2.2     skrll 	if (fvp == tvp) {
    837  1.17.2.2     skrll 		error = 0;
    838  1.17.2.2     skrll 		goto out;
    839  1.17.2.2     skrll 	}
    840  1.17.2.2     skrll 
    841  1.17.2.2     skrll 	/* Avoid manipulating '.' and '..' entries. */
    842  1.17.2.2     skrll 	if (de == NULL) {
    843  1.17.2.2     skrll 		KASSERT(fvp->v_type == VDIR);
    844  1.17.2.2     skrll 		error = EINVAL;
    845  1.17.2.2     skrll 		goto out;
    846  1.17.2.2     skrll 	}
    847  1.17.2.2     skrll 	KASSERT(de->td_node == fnode);
    848  1.17.2.2     skrll 
    849  1.17.2.2     skrll 	/* If we need to move the directory between entries, lock the
    850  1.17.2.2     skrll 	 * source so that we can safely operate on it. */
    851  1.17.2.2     skrll 	if (fdnode != tdnode) {
    852  1.17.2.2     skrll 		error = vn_lock(fdvp, LK_EXCLUSIVE | LK_RETRY);
    853  1.17.2.2     skrll 		if (error != 0)
    854  1.17.2.2     skrll 			goto out;
    855  1.17.2.2     skrll 	}
    856  1.17.2.2     skrll 
    857  1.17.2.2     skrll 	/* Ensure that we have enough memory to hold the new name, if it
    858  1.17.2.2     skrll 	 * has to be changed. */
    859  1.17.2.2     skrll 	if (fcnp->cn_namelen != tcnp->cn_namelen ||
    860  1.17.2.2     skrll 	    memcmp(fcnp->cn_nameptr, tcnp->cn_nameptr, fcnp->cn_namelen) != 0) {
    861  1.17.2.2     skrll 		newname = tmpfs_str_pool_get(&tmp->tm_str_pool,
    862  1.17.2.2     skrll 		    tcnp->cn_namelen, 0);
    863  1.17.2.2     skrll 		if (newname == NULL) {
    864  1.17.2.2     skrll 			error = ENOSPC;
    865  1.17.2.2     skrll 			goto out_locked;
    866  1.17.2.2     skrll 		}
    867  1.17.2.2     skrll 	} else
    868  1.17.2.2     skrll 		newname = NULL;
    869  1.17.2.2     skrll 
    870  1.17.2.2     skrll 	/* If the node is being moved to another directory, we have to do
    871  1.17.2.2     skrll 	 * the move. */
    872  1.17.2.2     skrll 	if (fdnode != tdnode) {
    873  1.17.2.2     skrll 		/* In case we are moving a directory, we have to adjust its
    874  1.17.2.2     skrll 		 * parent to point to the new parent. */
    875  1.17.2.2     skrll 		if (de->td_node->tn_type == VDIR) {
    876  1.17.2.2     skrll 			struct tmpfs_node *n;
    877  1.17.2.2     skrll 
    878  1.17.2.2     skrll 			/* Ensure the target directory is not a child of the
    879  1.17.2.2     skrll 			 * directory being moved.  Otherwise, we'd end up
    880  1.17.2.2     skrll 			 * with stale nodes. */
    881  1.17.2.2     skrll 			n = tdnode;
    882  1.17.2.2     skrll 			while (n != n->tn_parent) {
    883  1.17.2.2     skrll 				if (n == fnode) {
    884  1.17.2.2     skrll 					error = EINVAL;
    885  1.17.2.2     skrll 					goto out_locked;
    886  1.17.2.2     skrll 				}
    887  1.17.2.2     skrll 				n = n->tn_parent;
    888  1.17.2.2     skrll 			}
    889  1.17.2.2     skrll 
    890  1.17.2.2     skrll 			/* Adjust the parent pointer. */
    891  1.17.2.2     skrll 			TMPFS_VALIDATE_DIR(fnode);
    892  1.17.2.2     skrll 			de->td_node->tn_parent = tdnode;
    893  1.17.2.2     skrll 
    894  1.17.2.2     skrll 			/* As a result of changing the target of the '..'
    895  1.17.2.2     skrll 			 * entry, the link count of the source and target
    896  1.17.2.2     skrll 			 * directories has to be adjusted. */
    897  1.17.2.2     skrll 			fdnode->tn_links--;
    898  1.17.2.2     skrll 			tdnode->tn_links++;
    899  1.17.2.2     skrll 		}
    900  1.17.2.2     skrll 
    901  1.17.2.2     skrll 		/* Do the move: just remove the entry from the source directory
    902  1.17.2.2     skrll 		 * and insert it into the target one. */
    903  1.17.2.2     skrll 		tmpfs_dir_detach(fdvp, de);
    904  1.17.2.2     skrll 		tmpfs_dir_attach(tdvp, de);
    905  1.17.2.2     skrll 
    906  1.17.2.2     skrll 		/* Notify listeners of fdvp about the change in the directory.
    907  1.17.2.2     skrll 		 * We can do it at this point because we aren't touching fdvp
    908  1.17.2.2     skrll 		 * any more below. */
    909  1.17.2.2     skrll 		VN_KNOTE(fdvp, NOTE_WRITE);
    910  1.17.2.2     skrll 	}
    911  1.17.2.2     skrll 
    912  1.17.2.2     skrll 	/* If the name has changed, we need to make it effective by changing
    913  1.17.2.2     skrll 	 * it in the directory entry. */
    914  1.17.2.2     skrll 	if (newname != NULL) {
    915  1.17.2.2     skrll 		KASSERT(tcnp->cn_namelen < MAXNAMLEN);
    916  1.17.2.2     skrll 		KASSERT(tcnp->cn_namelen < 0xffff);
    917  1.17.2.2     skrll 
    918  1.17.2.2     skrll 		tmpfs_str_pool_put(&tmp->tm_str_pool, de->td_name,
    919  1.17.2.2     skrll 		    de->td_namelen);
    920  1.17.2.2     skrll 		de->td_namelen = (uint16_t)tcnp->cn_namelen;
    921  1.17.2.2     skrll 		memcpy(newname, tcnp->cn_nameptr, tcnp->cn_namelen);
    922  1.17.2.2     skrll 		de->td_name = newname;
    923  1.17.2.2     skrll 
    924  1.17.2.2     skrll 		fnode->tn_status |= TMPFS_NODE_MODIFIED;
    925  1.17.2.2     skrll 	}
    926  1.17.2.2     skrll 
    927  1.17.2.2     skrll 	/* If we are overwriting an entry, we have to remove the old one
    928  1.17.2.2     skrll 	 * from the target directory. */
    929  1.17.2.2     skrll 	if (tvp != NULL) {
    930  1.17.2.2     skrll 		struct tmpfs_node *tnode;
    931  1.17.2.2     skrll 
    932  1.17.2.2     skrll 		tnode = VP_TO_TMPFS_NODE(tvp);
    933  1.17.2.2     skrll 
    934  1.17.2.2     skrll 		/* The source node cannot be a directory in this case. */
    935  1.17.2.2     skrll 		KASSERT(fnode->tn_type != VDIR);
    936  1.17.2.2     skrll 
    937  1.17.2.2     skrll 		/* Remove the old entry from the target directory. */
    938  1.17.2.2     skrll 		de = tnode->tn_lookup_dirent;
    939  1.17.2.2     skrll 		tmpfs_dir_detach(tdvp, de);
    940  1.17.2.2     skrll 
    941  1.17.2.2     skrll 		/* Free the directory entry we just deleted.  Note that the
    942  1.17.2.2     skrll 		 * node referred by it will not be removed until the vnode is
    943  1.17.2.2     skrll 		 * really reclaimed. */
    944  1.17.2.2     skrll 		tmpfs_free_dirent(VFS_TO_TMPFS(tvp->v_mount), de, TRUE);
    945  1.17.2.2     skrll 	}
    946  1.17.2.2     skrll 
    947  1.17.2.2     skrll 	/* Notify listeners of tdvp about the change in the directory (either
    948  1.17.2.2     skrll 	 * because a new entry was added or because one was removed). */
    949  1.17.2.2     skrll 	VN_KNOTE(tdvp, NOTE_WRITE);
    950  1.17.2.2     skrll 
    951  1.17.2.2     skrll 	error = 0;
    952  1.17.2.2     skrll 
    953  1.17.2.2     skrll out_locked:
    954  1.17.2.2     skrll 	if (fdnode != tdnode)
    955  1.17.2.2     skrll 		VOP_UNLOCK(fdvp, 0);
    956  1.17.2.2     skrll 
    957  1.17.2.2     skrll out:
    958  1.17.2.2     skrll 	/* Release target nodes. */
    959  1.17.2.2     skrll 	/* XXX: I don't understand when tdvp can be the same as tvp, but
    960  1.17.2.2     skrll 	 * other code takes care of this... */
    961  1.17.2.2     skrll 	if (tdvp == tvp)
    962  1.17.2.2     skrll 		vrele(tdvp);
    963  1.17.2.2     skrll 	else
    964  1.17.2.2     skrll 		vput(tdvp);
    965  1.17.2.2     skrll 	if (tvp != NULL)
    966  1.17.2.2     skrll 		vput(tvp);
    967  1.17.2.2     skrll 
    968  1.17.2.2     skrll 	/* Release source nodes. */
    969  1.17.2.2     skrll 	vrele(fdvp);
    970  1.17.2.2     skrll 	vrele(fvp);
    971  1.17.2.2     skrll 
    972  1.17.2.2     skrll 	return error;
    973  1.17.2.2     skrll }
    974  1.17.2.2     skrll 
    975  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    976  1.17.2.2     skrll 
    977  1.17.2.2     skrll int
    978  1.17.2.2     skrll tmpfs_mkdir(void *v)
    979  1.17.2.2     skrll {
    980  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_mkdir_args *)v)->a_dvp;
    981  1.17.2.2     skrll 	struct vnode **vpp = ((struct vop_mkdir_args *)v)->a_vpp;
    982  1.17.2.2     skrll 	struct componentname *cnp = ((struct vop_mkdir_args *)v)->a_cnp;
    983  1.17.2.2     skrll 	struct vattr *vap = ((struct vop_mkdir_args *)v)->a_vap;
    984  1.17.2.2     skrll 
    985  1.17.2.2     skrll 	KASSERT(vap->va_type == VDIR);
    986  1.17.2.2     skrll 
    987  1.17.2.2     skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    988  1.17.2.2     skrll }
    989  1.17.2.2     skrll 
    990  1.17.2.2     skrll /* --------------------------------------------------------------------- */
    991  1.17.2.2     skrll 
    992  1.17.2.2     skrll int
    993  1.17.2.2     skrll tmpfs_rmdir(void *v)
    994  1.17.2.2     skrll {
    995  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_rmdir_args *)v)->a_dvp;
    996  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_rmdir_args *)v)->a_vp;
    997  1.17.2.2     skrll 
    998  1.17.2.2     skrll 	int error;
    999  1.17.2.2     skrll 	struct tmpfs_dirent *de;
   1000  1.17.2.2     skrll 	struct tmpfs_mount *tmp;
   1001  1.17.2.2     skrll 	struct tmpfs_node *dnode;
   1002  1.17.2.2     skrll 	struct tmpfs_node *node;
   1003  1.17.2.2     skrll 
   1004  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(dvp));
   1005  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
   1006  1.17.2.2     skrll 
   1007  1.17.2.2     skrll 	tmp = VFS_TO_TMPFS(dvp->v_mount);
   1008  1.17.2.2     skrll 	dnode = VP_TO_TMPFS_DIR(dvp);
   1009  1.17.2.2     skrll 	node = VP_TO_TMPFS_DIR(vp);
   1010  1.17.2.2     skrll 	KASSERT(node->tn_parent == dnode);
   1011  1.17.2.2     skrll 
   1012  1.17.2.2     skrll 	/* Get the directory entry associated with node (vp).  This was
   1013  1.17.2.2     skrll 	 * filled by tmpfs_lookup while looking up the entry. */
   1014  1.17.2.2     skrll 	de = node->tn_lookup_dirent;
   1015  1.17.2.2     skrll 	KASSERT(TMPFS_DIRENT_MATCHES(de,
   1016  1.17.2.2     skrll 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_nameptr,
   1017  1.17.2.2     skrll 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_namelen));
   1018  1.17.2.2     skrll 
   1019  1.17.2.2     skrll 	/* Directories with more than two entries ('.' and '..') cannot be
   1020  1.17.2.2     skrll 	 * removed. */
   1021  1.17.2.2     skrll 	if (node->tn_size > 0) {
   1022  1.17.2.2     skrll 		error = ENOTEMPTY;
   1023  1.17.2.2     skrll 		goto out;
   1024  1.17.2.2     skrll 	}
   1025  1.17.2.2     skrll 
   1026  1.17.2.2     skrll 	/* Check flags to see if we are allowed to remove the directory. */
   1027  1.17.2.2     skrll 	if (dnode->tn_flags & APPEND || node->tn_flags & (IMMUTABLE | APPEND)) {
   1028  1.17.2.2     skrll 		error = EPERM;
   1029  1.17.2.2     skrll 		goto out;
   1030  1.17.2.2     skrll 	}
   1031  1.17.2.2     skrll 
   1032  1.17.2.2     skrll 	/* Detach the directory entry from the directory (dnode). */
   1033  1.17.2.2     skrll 	tmpfs_dir_detach(dvp, de);
   1034  1.17.2.2     skrll 
   1035  1.17.2.2     skrll 	node->tn_links--;
   1036  1.17.2.2     skrll 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
   1037  1.17.2.2     skrll 	    TMPFS_NODE_MODIFIED;
   1038  1.17.2.2     skrll 	node->tn_parent->tn_links--;
   1039  1.17.2.2     skrll 	node->tn_parent->tn_status |= TMPFS_NODE_ACCESSED | \
   1040  1.17.2.2     skrll 	    TMPFS_NODE_CHANGED | TMPFS_NODE_MODIFIED;
   1041  1.17.2.2     skrll 
   1042  1.17.2.2     skrll 	/* Notify modification of parent directory and release it. */
   1043  1.17.2.2     skrll 	VN_KNOTE(dvp, NOTE_WRITE | NOTE_LINK);
   1044  1.17.2.2     skrll 	cache_purge(dvp); /* XXX Is this needed? */
   1045  1.17.2.2     skrll 	vput(dvp);
   1046  1.17.2.2     skrll 
   1047  1.17.2.2     skrll 	/* Free the directory entry we just deleted.  Note that the node
   1048  1.17.2.2     skrll 	 * referred by it will not be removed until the vnode is really
   1049  1.17.2.2     skrll 	 * reclaimed. */
   1050  1.17.2.2     skrll 	tmpfs_free_dirent(tmp, de, TRUE);
   1051  1.17.2.2     skrll 
   1052  1.17.2.2     skrll 	/* Release the deleted vnode (will destroy the node, notify
   1053  1.17.2.2     skrll 	 * interested parties and clean it from the cache). */
   1054  1.17.2.2     skrll 	vput(vp);
   1055  1.17.2.2     skrll 
   1056  1.17.2.2     skrll 	error = 0;
   1057  1.17.2.2     skrll 
   1058  1.17.2.2     skrll out:
   1059  1.17.2.2     skrll 	if (error != 0) {
   1060  1.17.2.2     skrll 		vput(dvp);
   1061  1.17.2.2     skrll 		vput(vp);
   1062  1.17.2.2     skrll 	}
   1063  1.17.2.2     skrll 
   1064  1.17.2.2     skrll 	return error;
   1065  1.17.2.2     skrll }
   1066  1.17.2.2     skrll 
   1067  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1068  1.17.2.2     skrll 
   1069  1.17.2.2     skrll int
   1070  1.17.2.2     skrll tmpfs_symlink(void *v)
   1071  1.17.2.2     skrll {
   1072  1.17.2.2     skrll 	struct vnode *dvp = ((struct vop_symlink_args *)v)->a_dvp;
   1073  1.17.2.2     skrll 	struct vnode **vpp = ((struct vop_symlink_args *)v)->a_vpp;
   1074  1.17.2.2     skrll 	struct componentname *cnp = ((struct vop_symlink_args *)v)->a_cnp;
   1075  1.17.2.2     skrll 	struct vattr *vap = ((struct vop_symlink_args *)v)->a_vap;
   1076  1.17.2.2     skrll 	char *target = ((struct vop_symlink_args *)v)->a_target;
   1077  1.17.2.2     skrll 
   1078  1.17.2.2     skrll 	KASSERT(vap->va_type == VLNK);
   1079  1.17.2.2     skrll 
   1080  1.17.2.2     skrll 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, target);
   1081  1.17.2.2     skrll }
   1082  1.17.2.2     skrll 
   1083  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1084  1.17.2.2     skrll 
   1085  1.17.2.2     skrll int
   1086  1.17.2.2     skrll tmpfs_readdir(void *v)
   1087  1.17.2.2     skrll {
   1088  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_readdir_args *)v)->a_vp;
   1089  1.17.2.2     skrll 	struct uio *uio = ((struct vop_readdir_args *)v)->a_uio;
   1090  1.17.2.2     skrll 	int *eofflag = ((struct vop_readdir_args *)v)->a_eofflag;
   1091  1.17.2.2     skrll 	off_t **cookies = ((struct vop_readdir_args *)v)->a_cookies;
   1092  1.17.2.2     skrll 	int *ncookies = ((struct vop_readdir_args *)v)->a_ncookies;
   1093  1.17.2.2     skrll 
   1094  1.17.2.2     skrll 	int error;
   1095  1.17.2.2     skrll 	off_t startoff;
   1096  1.17.2.2     skrll 	off_t cnt;
   1097  1.17.2.2     skrll 	struct tmpfs_node *node;
   1098  1.17.2.2     skrll 
   1099  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
   1100  1.17.2.2     skrll 
   1101  1.17.2.2     skrll 	/* This operation only makes sense on directory nodes. */
   1102  1.17.2.2     skrll 	if (vp->v_type != VDIR) {
   1103  1.17.2.2     skrll 		error = ENOTDIR;
   1104  1.17.2.2     skrll 		goto out;
   1105  1.17.2.2     skrll 	}
   1106  1.17.2.2     skrll 
   1107  1.17.2.2     skrll 	node = VP_TO_TMPFS_DIR(vp);
   1108  1.17.2.2     skrll 
   1109  1.17.2.2     skrll 	startoff = uio->uio_offset;
   1110  1.17.2.2     skrll 
   1111  1.17.2.2     skrll 	cnt = 0;
   1112  1.17.2.2     skrll 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOT) {
   1113  1.17.2.2     skrll 		error = tmpfs_dir_getdotdent(node, uio);
   1114  1.17.2.2     skrll 		if (error == -1) {
   1115  1.17.2.2     skrll 			error = 0;
   1116  1.17.2.2     skrll 			goto outok;
   1117  1.17.2.2     skrll 		} else if (error != 0)
   1118  1.17.2.2     skrll 			goto outok;
   1119  1.17.2.2     skrll 		cnt++;
   1120  1.17.2.2     skrll 	}
   1121  1.17.2.2     skrll 
   1122  1.17.2.2     skrll 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOTDOT) {
   1123  1.17.2.2     skrll 		error = tmpfs_dir_getdotdotdent(node, uio);
   1124  1.17.2.2     skrll 		if (error == -1) {
   1125  1.17.2.2     skrll 			error = 0;
   1126  1.17.2.2     skrll 			goto outok;
   1127  1.17.2.2     skrll 		} else if (error != 0)
   1128  1.17.2.2     skrll 			goto outok;
   1129  1.17.2.2     skrll 		cnt++;
   1130  1.17.2.2     skrll 	}
   1131  1.17.2.2     skrll 
   1132  1.17.2.2     skrll 	error = tmpfs_dir_getdents(node, uio, &cnt);
   1133  1.17.2.2     skrll 	if (error == -1)
   1134  1.17.2.2     skrll 		error = 0;
   1135  1.17.2.2     skrll 	KASSERT(error >= 0);
   1136  1.17.2.2     skrll 
   1137  1.17.2.2     skrll outok:
   1138  1.17.2.2     skrll 	/* This label assumes that startoff has been
   1139  1.17.2.2     skrll 	 * initialized.  If the compiler didn't spit out warnings, we'd
   1140  1.17.2.2     skrll 	 * simply make this one be 'out' and drop 'outok'. */
   1141  1.17.2.2     skrll 
   1142  1.17.2.2     skrll 	if (eofflag != NULL)
   1143  1.17.2.2     skrll 		*eofflag =
   1144  1.17.2.2     skrll 		    (error == 0 && uio->uio_offset == TMPFS_DIRCOOKIE_EOF);
   1145  1.17.2.2     skrll 
   1146  1.17.2.2     skrll 	/* Update NFS-related variables. */
   1147  1.17.2.2     skrll 	if (error == 0 && cookies != NULL && ncookies != NULL) {
   1148  1.17.2.2     skrll 		off_t i;
   1149  1.17.2.2     skrll 		off_t off = startoff;
   1150  1.17.2.2     skrll 		struct tmpfs_dirent *de = NULL;
   1151  1.17.2.2     skrll 
   1152  1.17.2.2     skrll 		*ncookies = cnt;
   1153  1.17.2.2     skrll 		*cookies = malloc(cnt * sizeof(off_t), M_TEMP, M_WAITOK);
   1154  1.17.2.2     skrll 
   1155  1.17.2.2     skrll 		for (i = 0; i < cnt; i++) {
   1156  1.17.2.2     skrll 			KASSERT(off != TMPFS_DIRCOOKIE_EOF);
   1157  1.17.2.2     skrll 			if (off == TMPFS_DIRCOOKIE_DOT) {
   1158  1.17.2.2     skrll 				off = TMPFS_DIRCOOKIE_DOTDOT;
   1159  1.17.2.2     skrll 			} else {
   1160  1.17.2.2     skrll 				if (off == TMPFS_DIRCOOKIE_DOTDOT) {
   1161  1.17.2.2     skrll 					de = TAILQ_FIRST(&node->tn_dir);
   1162  1.17.2.2     skrll 				} else if (de != NULL) {
   1163  1.17.2.2     skrll 					de = TAILQ_NEXT(de, td_entries);
   1164  1.17.2.2     skrll 				} else {
   1165  1.17.2.2     skrll 					de = tmpfs_dir_lookupbycookie(node,
   1166  1.17.2.2     skrll 					    off);
   1167  1.17.2.2     skrll 					KASSERT(de != NULL);
   1168  1.17.2.2     skrll 					de = TAILQ_NEXT(de, td_entries);
   1169  1.17.2.2     skrll 				}
   1170  1.17.2.2     skrll 				if (de == NULL) {
   1171  1.17.2.2     skrll 					off = TMPFS_DIRCOOKIE_EOF;
   1172  1.17.2.2     skrll 				} else {
   1173  1.17.2.2     skrll 					off = TMPFS_DIRCOOKIE(de);
   1174  1.17.2.2     skrll 				}
   1175  1.17.2.2     skrll 			}
   1176  1.17.2.2     skrll 
   1177  1.17.2.2     skrll 			(*cookies)[i] = off;
   1178  1.17.2.2     skrll 		}
   1179  1.17.2.2     skrll 		KASSERT(uio->uio_offset == off);
   1180  1.17.2.2     skrll 	}
   1181  1.17.2.2     skrll 
   1182  1.17.2.2     skrll out:
   1183  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
   1184  1.17.2.2     skrll 
   1185  1.17.2.2     skrll 	return error;
   1186  1.17.2.2     skrll }
   1187  1.17.2.2     skrll 
   1188  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1189  1.17.2.2     skrll 
   1190  1.17.2.2     skrll int
   1191  1.17.2.2     skrll tmpfs_readlink(void *v)
   1192  1.17.2.2     skrll {
   1193  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_readlink_args *)v)->a_vp;
   1194  1.17.2.2     skrll 	struct uio *uio = ((struct vop_readlink_args *)v)->a_uio;
   1195  1.17.2.2     skrll 
   1196  1.17.2.2     skrll 	int error;
   1197  1.17.2.2     skrll 	struct tmpfs_node *node;
   1198  1.17.2.2     skrll 
   1199  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
   1200  1.17.2.2     skrll 	KASSERT(uio->uio_offset == 0);
   1201  1.17.2.2     skrll 	KASSERT(vp->v_type == VLNK);
   1202  1.17.2.2     skrll 
   1203  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
   1204  1.17.2.2     skrll 
   1205  1.17.2.2     skrll 	error = uiomove(node->tn_link, MIN(node->tn_size, uio->uio_resid),
   1206  1.17.2.2     skrll 	    uio);
   1207  1.17.2.2     skrll 	node->tn_status |= TMPFS_NODE_ACCESSED;
   1208  1.17.2.2     skrll 
   1209  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
   1210  1.17.2.2     skrll 
   1211  1.17.2.2     skrll 	return error;
   1212  1.17.2.2     skrll }
   1213  1.17.2.2     skrll 
   1214  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1215  1.17.2.2     skrll 
   1216  1.17.2.2     skrll int
   1217  1.17.2.2     skrll tmpfs_inactive(void *v)
   1218  1.17.2.2     skrll {
   1219  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_inactive_args *)v)->a_vp;
   1220  1.17.2.3     skrll 	struct lwp *l = ((struct vop_inactive_args *)v)->a_l;
   1221  1.17.2.2     skrll 
   1222  1.17.2.2     skrll 	struct tmpfs_node *node;
   1223  1.17.2.2     skrll 
   1224  1.17.2.2     skrll 	KASSERT(VOP_ISLOCKED(vp));
   1225  1.17.2.2     skrll 
   1226  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
   1227  1.17.2.2     skrll 
   1228  1.17.2.2     skrll 	VOP_UNLOCK(vp, 0);
   1229  1.17.2.2     skrll 
   1230  1.17.2.2     skrll 	if (node->tn_links == 0)
   1231  1.17.2.3     skrll 		vrecycle(vp, NULL, l);
   1232  1.17.2.2     skrll 
   1233  1.17.2.2     skrll 	return 0;
   1234  1.17.2.2     skrll }
   1235  1.17.2.2     skrll 
   1236  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1237  1.17.2.2     skrll 
   1238  1.17.2.2     skrll int
   1239  1.17.2.2     skrll tmpfs_reclaim(void *v)
   1240  1.17.2.2     skrll {
   1241  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_reclaim_args *)v)->a_vp;
   1242  1.17.2.2     skrll 
   1243  1.17.2.2     skrll 	struct tmpfs_mount *tmp;
   1244  1.17.2.2     skrll 	struct tmpfs_node *node;
   1245  1.17.2.2     skrll 
   1246  1.17.2.2     skrll 	KASSERT(!VOP_ISLOCKED(vp));
   1247  1.17.2.2     skrll 
   1248  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
   1249  1.17.2.2     skrll 	tmp = VFS_TO_TMPFS(vp->v_mount);
   1250  1.17.2.2     skrll 
   1251  1.17.2.2     skrll 	if (node->tn_links == 0)
   1252  1.17.2.2     skrll 		VN_KNOTE(vp, NOTE_DELETE);
   1253  1.17.2.2     skrll 
   1254  1.17.2.2     skrll 	cache_purge(vp);
   1255  1.17.2.2     skrll 	tmpfs_free_vp(vp);
   1256  1.17.2.2     skrll 
   1257  1.17.2.2     skrll 	/* If the node referenced by this vnode was deleted by the user,
   1258  1.17.2.2     skrll 	 * we must free its associated data structures (now that the vnode
   1259  1.17.2.2     skrll 	 * is being reclaimed). */
   1260  1.17.2.2     skrll 	if (node->tn_links == 0)
   1261  1.17.2.2     skrll 		tmpfs_free_node(tmp, node);
   1262  1.17.2.2     skrll 
   1263  1.17.2.2     skrll 	KASSERT(!VOP_ISLOCKED(vp));
   1264  1.17.2.2     skrll 	KASSERT(vp->v_data == NULL);
   1265  1.17.2.2     skrll 
   1266  1.17.2.2     skrll 	return 0;
   1267  1.17.2.2     skrll }
   1268  1.17.2.2     skrll 
   1269  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1270  1.17.2.2     skrll 
   1271  1.17.2.2     skrll int
   1272  1.17.2.2     skrll tmpfs_print(void *v)
   1273  1.17.2.2     skrll {
   1274  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_print_args *)v)->a_vp;
   1275  1.17.2.2     skrll 
   1276  1.17.2.2     skrll 	struct tmpfs_node *node;
   1277  1.17.2.2     skrll 
   1278  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
   1279  1.17.2.2     skrll 
   1280  1.17.2.2     skrll 	printf("tag VT_TMPFS, tmpfs_node %p, flags 0x%x, links %d\n",
   1281  1.17.2.2     skrll 	    node, node->tn_flags, node->tn_links);
   1282  1.17.2.2     skrll 	printf("\tmode 0%o, owner %d, group %d, size %" PRIdMAX
   1283  1.17.2.2     skrll 	    ", status 0x%x\n",
   1284  1.17.2.2     skrll 	    node->tn_mode, node->tn_uid, node->tn_gid,
   1285  1.17.2.2     skrll 	    (uintmax_t)node->tn_size, node->tn_status);
   1286  1.17.2.2     skrll 
   1287  1.17.2.2     skrll 	if (vp->v_type == VFIFO)
   1288  1.17.2.2     skrll 		fifo_printinfo(vp);
   1289  1.17.2.2     skrll 	lockmgr_printinfo(&vp->v_lock);
   1290  1.17.2.2     skrll 
   1291  1.17.2.2     skrll 	printf("\n");
   1292  1.17.2.2     skrll 
   1293  1.17.2.2     skrll 	return 0;
   1294  1.17.2.2     skrll }
   1295  1.17.2.2     skrll 
   1296  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1297  1.17.2.2     skrll 
   1298  1.17.2.2     skrll int
   1299  1.17.2.2     skrll tmpfs_pathconf(void *v)
   1300  1.17.2.2     skrll {
   1301  1.17.2.2     skrll 	int name = ((struct vop_pathconf_args *)v)->a_name;
   1302  1.17.2.2     skrll 	register_t *retval = ((struct vop_pathconf_args *)v)->a_retval;
   1303  1.17.2.2     skrll 
   1304  1.17.2.2     skrll 	int error;
   1305  1.17.2.2     skrll 
   1306  1.17.2.2     skrll 	error = 0;
   1307  1.17.2.2     skrll 
   1308  1.17.2.2     skrll 	switch (name) {
   1309  1.17.2.2     skrll 	case _PC_LINK_MAX:
   1310  1.17.2.2     skrll 		*retval = LINK_MAX;
   1311  1.17.2.2     skrll 		break;
   1312  1.17.2.2     skrll 
   1313  1.17.2.2     skrll 	case _PC_NAME_MAX:
   1314  1.17.2.2     skrll 		*retval = NAME_MAX;
   1315  1.17.2.2     skrll 		break;
   1316  1.17.2.2     skrll 
   1317  1.17.2.2     skrll 	case _PC_PATH_MAX:
   1318  1.17.2.2     skrll 		*retval = PATH_MAX;
   1319  1.17.2.2     skrll 		break;
   1320  1.17.2.2     skrll 
   1321  1.17.2.2     skrll 	case _PC_PIPE_BUF:
   1322  1.17.2.2     skrll 		*retval = PIPE_BUF;
   1323  1.17.2.2     skrll 		break;
   1324  1.17.2.2     skrll 
   1325  1.17.2.2     skrll 	case _PC_CHOWN_RESTRICTED:
   1326  1.17.2.2     skrll 		*retval = 1;
   1327  1.17.2.2     skrll 		break;
   1328  1.17.2.2     skrll 
   1329  1.17.2.2     skrll 	case _PC_NO_TRUNC:
   1330  1.17.2.2     skrll 		*retval = 1;
   1331  1.17.2.2     skrll 		break;
   1332  1.17.2.2     skrll 
   1333  1.17.2.2     skrll 	case _PC_SYNC_IO:
   1334  1.17.2.2     skrll 		*retval = 1;
   1335  1.17.2.2     skrll 		break;
   1336  1.17.2.2     skrll 
   1337  1.17.2.2     skrll 	case _PC_FILESIZEBITS:
   1338  1.17.2.2     skrll 		*retval = 0; /* XXX Don't know which value should I return. */
   1339  1.17.2.2     skrll 		break;
   1340  1.17.2.2     skrll 
   1341  1.17.2.2     skrll 	default:
   1342  1.17.2.2     skrll 		error = EINVAL;
   1343  1.17.2.2     skrll 	}
   1344  1.17.2.2     skrll 
   1345  1.17.2.2     skrll 	return error;
   1346  1.17.2.2     skrll }
   1347  1.17.2.2     skrll 
   1348  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1349  1.17.2.2     skrll 
   1350  1.17.2.2     skrll int
   1351  1.17.2.2     skrll tmpfs_advlock(void *v)
   1352  1.17.2.2     skrll {
   1353  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_advlock_args *)v)->a_vp;
   1354  1.17.2.2     skrll 
   1355  1.17.2.2     skrll 	struct tmpfs_node *node;
   1356  1.17.2.2     skrll 
   1357  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
   1358  1.17.2.2     skrll 
   1359  1.17.2.2     skrll 	return lf_advlock(v, &node->tn_lockf, node->tn_size);
   1360  1.17.2.2     skrll }
   1361  1.17.2.2     skrll 
   1362  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1363  1.17.2.2     skrll 
   1364  1.17.2.2     skrll int
   1365  1.17.2.2     skrll tmpfs_getpages(void *v)
   1366  1.17.2.2     skrll {
   1367  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_getpages_args *)v)->a_vp;
   1368  1.17.2.2     skrll 	voff_t offset = ((struct vop_getpages_args *)v)->a_offset;
   1369  1.17.2.2     skrll 	struct vm_page **m = ((struct vop_getpages_args *)v)->a_m;
   1370  1.17.2.2     skrll 	int *count = ((struct vop_getpages_args *)v)->a_count;
   1371  1.17.2.2     skrll 	int centeridx = ((struct vop_getpages_args *)v)->a_centeridx;
   1372  1.17.2.2     skrll 	vm_prot_t access_type = ((struct vop_getpages_args *)v)->a_access_type;
   1373  1.17.2.2     skrll 	int advice = ((struct vop_getpages_args *)v)->a_advice;
   1374  1.17.2.2     skrll 	int flags = ((struct vop_getpages_args *)v)->a_flags;
   1375  1.17.2.2     skrll 
   1376  1.17.2.2     skrll 	int error;
   1377  1.17.2.2     skrll 	struct tmpfs_node *node;
   1378  1.17.2.2     skrll 	struct uvm_object *uobj;
   1379  1.17.2.2     skrll 	int npages = *count;
   1380  1.17.2.2     skrll 
   1381  1.17.2.2     skrll 	KASSERT(vp->v_type == VREG);
   1382  1.17.2.2     skrll 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1383  1.17.2.2     skrll 
   1384  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
   1385  1.17.2.2     skrll 	uobj = node->tn_aobj;
   1386  1.17.2.2     skrll 
   1387  1.17.2.2     skrll 	/* We currently don't rely on PGO_PASTEOF. */
   1388  1.17.2.2     skrll 
   1389  1.17.2.2     skrll 	if (vp->v_size <= offset + (centeridx << PAGE_SHIFT)) {
   1390  1.17.2.2     skrll 		if ((flags & PGO_LOCKED) == 0)
   1391  1.17.2.2     skrll 			simple_unlock(&vp->v_interlock);
   1392  1.17.2.2     skrll 		return EINVAL;
   1393  1.17.2.2     skrll 	}
   1394  1.17.2.2     skrll 
   1395  1.17.2.2     skrll 	if (vp->v_size < offset + (npages << PAGE_SHIFT)) {
   1396  1.17.2.2     skrll 		npages = (round_page(vp->v_size) - offset) >> PAGE_SHIFT;
   1397  1.17.2.2     skrll 	}
   1398  1.17.2.2     skrll 
   1399  1.17.2.2     skrll 	if ((flags & PGO_LOCKED) != 0)
   1400  1.17.2.2     skrll 		return EBUSY;
   1401  1.17.2.2     skrll 
   1402  1.17.2.2     skrll 	if ((flags & PGO_NOTIMESTAMP) == 0) {
   1403  1.17.2.2     skrll 		if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
   1404  1.17.2.2     skrll 			node->tn_status |= TMPFS_NODE_ACCESSED;
   1405  1.17.2.2     skrll 
   1406  1.17.2.2     skrll 		if ((access_type & VM_PROT_WRITE) != 0)
   1407  1.17.2.2     skrll 			node->tn_status |= TMPFS_NODE_MODIFIED;
   1408  1.17.2.2     skrll 	}
   1409  1.17.2.2     skrll 
   1410  1.17.2.2     skrll 	simple_unlock(&vp->v_interlock);
   1411  1.17.2.2     skrll 
   1412  1.17.2.2     skrll 	simple_lock(&uobj->vmobjlock);
   1413  1.17.2.2     skrll 	error = (*uobj->pgops->pgo_get)(uobj, offset, m, &npages, centeridx,
   1414  1.17.2.2     skrll 	    access_type, advice, flags);
   1415  1.17.2.2     skrll 
   1416  1.17.2.2     skrll 	return error;
   1417  1.17.2.2     skrll }
   1418  1.17.2.2     skrll 
   1419  1.17.2.2     skrll /* --------------------------------------------------------------------- */
   1420  1.17.2.2     skrll 
   1421  1.17.2.2     skrll int
   1422  1.17.2.2     skrll tmpfs_putpages(void *v)
   1423  1.17.2.2     skrll {
   1424  1.17.2.2     skrll 	struct vnode *vp = ((struct vop_putpages_args *)v)->a_vp;
   1425  1.17.2.2     skrll 	voff_t offlo = ((struct vop_putpages_args *)v)->a_offlo;
   1426  1.17.2.2     skrll 	voff_t offhi = ((struct vop_putpages_args *)v)->a_offhi;
   1427  1.17.2.2     skrll 	int flags = ((struct vop_putpages_args *)v)->a_flags;
   1428  1.17.2.2     skrll 
   1429  1.17.2.2     skrll 	int error;
   1430  1.17.2.2     skrll 	struct tmpfs_node *node;
   1431  1.17.2.2     skrll 	struct uvm_object *uobj;
   1432  1.17.2.2     skrll 
   1433  1.17.2.2     skrll 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1434  1.17.2.2     skrll 
   1435  1.17.2.2     skrll 	node = VP_TO_TMPFS_NODE(vp);
   1436  1.17.2.2     skrll 
   1437  1.17.2.2     skrll 	if (vp->v_type != VREG) {
   1438  1.17.2.2     skrll 		simple_unlock(&vp->v_interlock);
   1439  1.17.2.2     skrll 		return 0;
   1440  1.17.2.2     skrll 	}
   1441  1.17.2.2     skrll 
   1442  1.17.2.2     skrll 	uobj = node->tn_aobj;
   1443  1.17.2.2     skrll 	simple_unlock(&vp->v_interlock);
   1444  1.17.2.2     skrll 
   1445  1.17.2.2     skrll 	simple_lock(&uobj->vmobjlock);
   1446  1.17.2.2     skrll 	error = (*uobj->pgops->pgo_put)(uobj, offlo, offhi, flags);
   1447  1.17.2.2     skrll 
   1448  1.17.2.2     skrll 	/* XXX mtime */
   1449  1.17.2.2     skrll 
   1450  1.17.2.2     skrll 	return error;
   1451  1.17.2.2     skrll }
   1452