Home | History | Annotate | Line # | Download | only in tmpfs
tmpfs_vnops.c revision 1.24.6.2
      1  1.24.6.2  yamt /*	$NetBSD: tmpfs_vnops.c,v 1.24.6.2 2006/06/21 15:09:36 yamt Exp $	*/
      2  1.24.6.2  yamt 
      3  1.24.6.2  yamt /*
      4  1.24.6.2  yamt  * Copyright (c) 2005, 2006 The NetBSD Foundation, Inc.
      5  1.24.6.2  yamt  * All rights reserved.
      6  1.24.6.2  yamt  *
      7  1.24.6.2  yamt  * This code is derived from software contributed to The NetBSD Foundation
      8  1.24.6.2  yamt  * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
      9  1.24.6.2  yamt  * 2005 program.
     10  1.24.6.2  yamt  *
     11  1.24.6.2  yamt  * Redistribution and use in source and binary forms, with or without
     12  1.24.6.2  yamt  * modification, are permitted provided that the following conditions
     13  1.24.6.2  yamt  * are met:
     14  1.24.6.2  yamt  * 1. Redistributions of source code must retain the above copyright
     15  1.24.6.2  yamt  *    notice, this list of conditions and the following disclaimer.
     16  1.24.6.2  yamt  * 2. Redistributions in binary form must reproduce the above copyright
     17  1.24.6.2  yamt  *    notice, this list of conditions and the following disclaimer in the
     18  1.24.6.2  yamt  *    documentation and/or other materials provided with the distribution.
     19  1.24.6.2  yamt  * 3. All advertising materials mentioning features or use of this software
     20  1.24.6.2  yamt  *    must display the following acknowledgement:
     21  1.24.6.2  yamt  *        This product includes software developed by the NetBSD
     22  1.24.6.2  yamt  *        Foundation, Inc. and its contributors.
     23  1.24.6.2  yamt  * 4. Neither the name of The NetBSD Foundation nor the names of its
     24  1.24.6.2  yamt  *    contributors may be used to endorse or promote products derived
     25  1.24.6.2  yamt  *    from this software without specific prior written permission.
     26  1.24.6.2  yamt  *
     27  1.24.6.2  yamt  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     28  1.24.6.2  yamt  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     29  1.24.6.2  yamt  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     30  1.24.6.2  yamt  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     31  1.24.6.2  yamt  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     32  1.24.6.2  yamt  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     33  1.24.6.2  yamt  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     34  1.24.6.2  yamt  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     35  1.24.6.2  yamt  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     36  1.24.6.2  yamt  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     37  1.24.6.2  yamt  * POSSIBILITY OF SUCH DAMAGE.
     38  1.24.6.2  yamt  */
     39  1.24.6.2  yamt 
     40  1.24.6.2  yamt /*
     41  1.24.6.2  yamt  * tmpfs vnode interface.
     42  1.24.6.2  yamt  */
     43  1.24.6.2  yamt 
     44  1.24.6.2  yamt #include <sys/cdefs.h>
     45  1.24.6.2  yamt __KERNEL_RCSID(0, "$NetBSD: tmpfs_vnops.c,v 1.24.6.2 2006/06/21 15:09:36 yamt Exp $");
     46  1.24.6.2  yamt 
     47  1.24.6.2  yamt #include <sys/param.h>
     48  1.24.6.2  yamt #include <sys/dirent.h>
     49  1.24.6.2  yamt #include <sys/fcntl.h>
     50  1.24.6.2  yamt #include <sys/event.h>
     51  1.24.6.2  yamt #include <sys/malloc.h>
     52  1.24.6.2  yamt #include <sys/namei.h>
     53  1.24.6.2  yamt #include <sys/proc.h>
     54  1.24.6.2  yamt #include <sys/stat.h>
     55  1.24.6.2  yamt #include <sys/uio.h>
     56  1.24.6.2  yamt #include <sys/unistd.h>
     57  1.24.6.2  yamt #include <sys/vnode.h>
     58  1.24.6.2  yamt #include <sys/lockf.h>
     59  1.24.6.2  yamt #include <sys/kauth.h>
     60  1.24.6.2  yamt 
     61  1.24.6.2  yamt #include <uvm/uvm.h>
     62  1.24.6.2  yamt 
     63  1.24.6.2  yamt #include <miscfs/fifofs/fifo.h>
     64  1.24.6.2  yamt #include <fs/tmpfs/tmpfs_vnops.h>
     65  1.24.6.2  yamt #include <fs/tmpfs/tmpfs.h>
     66  1.24.6.2  yamt 
     67  1.24.6.2  yamt /* --------------------------------------------------------------------- */
     68  1.24.6.2  yamt 
     69  1.24.6.2  yamt /*
     70  1.24.6.2  yamt  * vnode operations vector used for files stored in a tmpfs file system.
     71  1.24.6.2  yamt  */
     72  1.24.6.2  yamt int (**tmpfs_vnodeop_p)(void *);
     73  1.24.6.2  yamt const struct vnodeopv_entry_desc tmpfs_vnodeop_entries[] = {
     74  1.24.6.2  yamt 	{ &vop_default_desc,		vn_default_error },
     75  1.24.6.2  yamt 	{ &vop_lookup_desc,		tmpfs_lookup },
     76  1.24.6.2  yamt 	{ &vop_create_desc,		tmpfs_create },
     77  1.24.6.2  yamt 	{ &vop_mknod_desc,		tmpfs_mknod },
     78  1.24.6.2  yamt 	{ &vop_open_desc,		tmpfs_open },
     79  1.24.6.2  yamt 	{ &vop_close_desc,		tmpfs_close },
     80  1.24.6.2  yamt 	{ &vop_access_desc,		tmpfs_access },
     81  1.24.6.2  yamt 	{ &vop_getattr_desc,		tmpfs_getattr },
     82  1.24.6.2  yamt 	{ &vop_setattr_desc,		tmpfs_setattr },
     83  1.24.6.2  yamt 	{ &vop_read_desc,		tmpfs_read },
     84  1.24.6.2  yamt 	{ &vop_write_desc,		tmpfs_write },
     85  1.24.6.2  yamt 	{ &vop_ioctl_desc,		tmpfs_ioctl },
     86  1.24.6.2  yamt 	{ &vop_fcntl_desc,		tmpfs_fcntl },
     87  1.24.6.2  yamt 	{ &vop_poll_desc,		tmpfs_poll },
     88  1.24.6.2  yamt 	{ &vop_kqfilter_desc,		tmpfs_kqfilter },
     89  1.24.6.2  yamt 	{ &vop_revoke_desc,		tmpfs_revoke },
     90  1.24.6.2  yamt 	{ &vop_mmap_desc,		tmpfs_mmap },
     91  1.24.6.2  yamt 	{ &vop_fsync_desc,		tmpfs_fsync },
     92  1.24.6.2  yamt 	{ &vop_seek_desc,		tmpfs_seek },
     93  1.24.6.2  yamt 	{ &vop_remove_desc,		tmpfs_remove },
     94  1.24.6.2  yamt 	{ &vop_link_desc,		tmpfs_link },
     95  1.24.6.2  yamt 	{ &vop_rename_desc,		tmpfs_rename },
     96  1.24.6.2  yamt 	{ &vop_mkdir_desc,		tmpfs_mkdir },
     97  1.24.6.2  yamt 	{ &vop_rmdir_desc,		tmpfs_rmdir },
     98  1.24.6.2  yamt 	{ &vop_symlink_desc,		tmpfs_symlink },
     99  1.24.6.2  yamt 	{ &vop_readdir_desc,		tmpfs_readdir },
    100  1.24.6.2  yamt 	{ &vop_readlink_desc,		tmpfs_readlink },
    101  1.24.6.2  yamt 	{ &vop_abortop_desc,		tmpfs_abortop },
    102  1.24.6.2  yamt 	{ &vop_inactive_desc,		tmpfs_inactive },
    103  1.24.6.2  yamt 	{ &vop_reclaim_desc,		tmpfs_reclaim },
    104  1.24.6.2  yamt 	{ &vop_lock_desc,		tmpfs_lock },
    105  1.24.6.2  yamt 	{ &vop_unlock_desc,		tmpfs_unlock },
    106  1.24.6.2  yamt 	{ &vop_bmap_desc,		tmpfs_bmap },
    107  1.24.6.2  yamt 	{ &vop_strategy_desc,		tmpfs_strategy },
    108  1.24.6.2  yamt 	{ &vop_print_desc,		tmpfs_print },
    109  1.24.6.2  yamt 	{ &vop_pathconf_desc,		tmpfs_pathconf },
    110  1.24.6.2  yamt 	{ &vop_islocked_desc,		tmpfs_islocked },
    111  1.24.6.2  yamt 	{ &vop_advlock_desc,		tmpfs_advlock },
    112  1.24.6.2  yamt 	{ &vop_lease_desc,		tmpfs_lease },
    113  1.24.6.2  yamt 	{ &vop_bwrite_desc,		tmpfs_bwrite },
    114  1.24.6.2  yamt 	{ &vop_getpages_desc,		tmpfs_getpages },
    115  1.24.6.2  yamt 	{ &vop_putpages_desc,		tmpfs_putpages },
    116  1.24.6.2  yamt 	{ NULL, NULL }
    117  1.24.6.2  yamt };
    118  1.24.6.2  yamt const struct vnodeopv_desc tmpfs_vnodeop_opv_desc =
    119  1.24.6.2  yamt 	{ &tmpfs_vnodeop_p, tmpfs_vnodeop_entries };
    120  1.24.6.2  yamt 
    121  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    122  1.24.6.2  yamt 
    123  1.24.6.2  yamt int
    124  1.24.6.2  yamt tmpfs_lookup(void *v)
    125  1.24.6.2  yamt {
    126  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_lookup_args *)v)->a_dvp;
    127  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_lookup_args *)v)->a_vpp;
    128  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_lookup_args *)v)->a_cnp;
    129  1.24.6.2  yamt 
    130  1.24.6.2  yamt 	int error;
    131  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    132  1.24.6.2  yamt 	struct tmpfs_node *dnode;
    133  1.24.6.2  yamt 
    134  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
    135  1.24.6.2  yamt 
    136  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
    137  1.24.6.2  yamt 	*vpp = NULL;
    138  1.24.6.2  yamt 
    139  1.24.6.2  yamt 	/* Check accessibility of requested node as a first step. */
    140  1.24.6.2  yamt 	error = VOP_ACCESS(dvp, VEXEC, cnp->cn_cred, cnp->cn_lwp);
    141  1.24.6.2  yamt 	if (error != 0)
    142  1.24.6.2  yamt 		goto out;
    143  1.24.6.2  yamt 
    144  1.24.6.2  yamt 	/* If requesting the last path component on a read-only file system
    145  1.24.6.2  yamt 	 * with a write operation, deny it. */
    146  1.24.6.2  yamt 	if ((cnp->cn_flags & ISLASTCN) &&
    147  1.24.6.2  yamt 	    (dvp->v_mount->mnt_flag & MNT_RDONLY) &&
    148  1.24.6.2  yamt 	    (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) {
    149  1.24.6.2  yamt 		error = EROFS;
    150  1.24.6.2  yamt 		goto out;
    151  1.24.6.2  yamt 	}
    152  1.24.6.2  yamt 
    153  1.24.6.2  yamt 	/* Avoid doing a linear scan of the directory if the requested
    154  1.24.6.2  yamt 	 * directory/name couple is already in the cache. */
    155  1.24.6.2  yamt 	error = cache_lookup(dvp, vpp, cnp);
    156  1.24.6.2  yamt 	if (error >= 0)
    157  1.24.6.2  yamt 		goto out;
    158  1.24.6.2  yamt 
    159  1.24.6.2  yamt 	/* We cannot be requesting the parent directory of the root node. */
    160  1.24.6.2  yamt 	KASSERT(IMPLIES(dnode->tn_type == VDIR &&
    161  1.24.6.2  yamt 	    dnode->tn_spec.tn_dir.tn_parent == dnode,
    162  1.24.6.2  yamt 	    !(cnp->cn_flags & ISDOTDOT)));
    163  1.24.6.2  yamt 
    164  1.24.6.2  yamt 	if (cnp->cn_flags & ISDOTDOT) {
    165  1.24.6.2  yamt 		VOP_UNLOCK(dvp, 0);
    166  1.24.6.2  yamt 
    167  1.24.6.2  yamt 		/* Allocate a new vnode on the matching entry. */
    168  1.24.6.2  yamt 		error = tmpfs_alloc_vp(dvp->v_mount,
    169  1.24.6.2  yamt 		    dnode->tn_spec.tn_dir.tn_parent, vpp);
    170  1.24.6.2  yamt 
    171  1.24.6.2  yamt 		if (cnp->cn_flags & LOCKPARENT &&
    172  1.24.6.2  yamt 		    cnp->cn_flags & ISLASTCN) {
    173  1.24.6.2  yamt 			if (vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY) != 0)
    174  1.24.6.2  yamt 				cnp->cn_flags |= PDIRUNLOCK;
    175  1.24.6.2  yamt 		}
    176  1.24.6.2  yamt 		dnode->tn_spec.tn_dir.tn_parent->tn_lookup_dirent = NULL;
    177  1.24.6.2  yamt 	} else if (cnp->cn_namelen == 1 && cnp->cn_nameptr[0] == '.') {
    178  1.24.6.2  yamt 		VREF(dvp);
    179  1.24.6.2  yamt 		*vpp = dvp;
    180  1.24.6.2  yamt 		dnode->tn_lookup_dirent = NULL;
    181  1.24.6.2  yamt 		error = 0;
    182  1.24.6.2  yamt 	} else {
    183  1.24.6.2  yamt 		de = tmpfs_dir_lookup(dnode, cnp);
    184  1.24.6.2  yamt 		if (de == NULL) {
    185  1.24.6.2  yamt 			/* The entry was not found in the directory.
    186  1.24.6.2  yamt 			 * This is OK iff we are creating or renaming an
    187  1.24.6.2  yamt 			 * entry and are working on the last component of
    188  1.24.6.2  yamt 			 * the path name. */
    189  1.24.6.2  yamt 			if ((cnp->cn_flags & ISLASTCN) &&
    190  1.24.6.2  yamt 			    (cnp->cn_nameiop == CREATE || \
    191  1.24.6.2  yamt 			    cnp->cn_nameiop == RENAME)) {
    192  1.24.6.2  yamt 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    193  1.24.6.2  yamt 				    cnp->cn_lwp);
    194  1.24.6.2  yamt 				if (error != 0)
    195  1.24.6.2  yamt 					goto out;
    196  1.24.6.2  yamt 
    197  1.24.6.2  yamt 				/* Keep the component name in the buffer for
    198  1.24.6.2  yamt 				 * future uses. */
    199  1.24.6.2  yamt 				cnp->cn_flags |= SAVENAME;
    200  1.24.6.2  yamt 
    201  1.24.6.2  yamt 				error = EJUSTRETURN;
    202  1.24.6.2  yamt 			} else
    203  1.24.6.2  yamt 				error = ENOENT;
    204  1.24.6.2  yamt 		} else {
    205  1.24.6.2  yamt 			struct tmpfs_node *tnode;
    206  1.24.6.2  yamt 
    207  1.24.6.2  yamt 			/* The entry was found, so get its associated
    208  1.24.6.2  yamt 			 * tmpfs_node. */
    209  1.24.6.2  yamt 			tnode = de->td_node;
    210  1.24.6.2  yamt 
    211  1.24.6.2  yamt 			/* If we are not at the last path component and
    212  1.24.6.2  yamt 			 * found a non-directory or non-link entry (which
    213  1.24.6.2  yamt 			 * may itself be pointing to a directory), raise
    214  1.24.6.2  yamt 			 * an error. */
    215  1.24.6.2  yamt 			if ((tnode->tn_type != VDIR &&
    216  1.24.6.2  yamt 			    tnode->tn_type != VLNK) &&
    217  1.24.6.2  yamt 			    !(cnp->cn_flags & ISLASTCN)) {
    218  1.24.6.2  yamt 				error = ENOTDIR;
    219  1.24.6.2  yamt 				goto out;
    220  1.24.6.2  yamt 			}
    221  1.24.6.2  yamt 
    222  1.24.6.2  yamt 			/* If we are deleting or renaming the entry, keep
    223  1.24.6.2  yamt 			 * track of its tmpfs_dirent so that it can be
    224  1.24.6.2  yamt 			 * easily deleted later. */
    225  1.24.6.2  yamt 			if ((cnp->cn_flags & ISLASTCN) &&
    226  1.24.6.2  yamt 			    (cnp->cn_nameiop == DELETE ||
    227  1.24.6.2  yamt 			    cnp->cn_nameiop == RENAME)) {
    228  1.24.6.2  yamt 				if ((dnode->tn_mode & S_ISTXT) != 0 &&
    229  1.24.6.2  yamt 				    kauth_cred_geteuid(cnp->cn_cred) != 0 &&
    230  1.24.6.2  yamt 				    kauth_cred_geteuid(cnp->cn_cred) != dnode->tn_uid &&
    231  1.24.6.2  yamt 				    kauth_cred_geteuid(cnp->cn_cred) != tnode->tn_uid)
    232  1.24.6.2  yamt 					return EPERM;
    233  1.24.6.2  yamt 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    234  1.24.6.2  yamt 				    cnp->cn_lwp);
    235  1.24.6.2  yamt 				if (error != 0)
    236  1.24.6.2  yamt 					goto out;
    237  1.24.6.2  yamt 				tnode->tn_lookup_dirent = de;
    238  1.24.6.2  yamt 			}
    239  1.24.6.2  yamt 
    240  1.24.6.2  yamt 			/* Allocate a new vnode on the matching entry. */
    241  1.24.6.2  yamt 			error = tmpfs_alloc_vp(dvp->v_mount, tnode, vpp);
    242  1.24.6.2  yamt 
    243  1.24.6.2  yamt 			if (error == 0 && (!(cnp->cn_flags & LOCKPARENT) ||
    244  1.24.6.2  yamt 			    !(cnp->cn_flags & ISLASTCN)))
    245  1.24.6.2  yamt 				VOP_UNLOCK(dvp, 0);
    246  1.24.6.2  yamt 		}
    247  1.24.6.2  yamt 	}
    248  1.24.6.2  yamt 
    249  1.24.6.2  yamt 	/* Store the result of this lookup in the cache.  Avoid this if the
    250  1.24.6.2  yamt 	 * request was for creation, as it does not improve timings on
    251  1.24.6.2  yamt 	 * emprical tests. */
    252  1.24.6.2  yamt 	if ((cnp->cn_flags & MAKEENTRY) && cnp->cn_nameiop != CREATE)
    253  1.24.6.2  yamt 		cache_enter(dvp, *vpp, cnp);
    254  1.24.6.2  yamt 
    255  1.24.6.2  yamt out:
    256  1.24.6.2  yamt 	/* If there were no errors, *vpp cannot be null and it must be
    257  1.24.6.2  yamt 	 * locked. */
    258  1.24.6.2  yamt 	KASSERT(IFF(error == 0, *vpp != NULL && VOP_ISLOCKED(*vpp)));
    259  1.24.6.2  yamt 
    260  1.24.6.2  yamt 	/* dvp has to be locked if:
    261  1.24.6.2  yamt 	 * - There were errors and relocking of dvp did not fail.
    262  1.24.6.2  yamt 	 * - We are doing a '..' lookup, relocking of dvp did not fail
    263  1.24.6.2  yamt 	 *   (PDIRUNLOCK is unset) and LOCKPARENT or ISLASTCN are not set.
    264  1.24.6.2  yamt 	 * - LOCKPARENT and ISLASTCN are set. */
    265  1.24.6.2  yamt 	KASSERT(IMPLIES(
    266  1.24.6.2  yamt 	    (error != 0 && !(cnp->cn_flags & PDIRUNLOCK)) ||
    267  1.24.6.2  yamt 	    (cnp->cn_flags & ISDOTDOT && !(cnp->cn_flags & PDIRUNLOCK) &&
    268  1.24.6.2  yamt 	     ((cnp->cn_flags & LOCKPARENT) && (cnp->cn_flags & ISLASTCN))) ||
    269  1.24.6.2  yamt 	    (cnp->cn_flags & LOCKPARENT && cnp->cn_flags & ISLASTCN)
    270  1.24.6.2  yamt 	    ,
    271  1.24.6.2  yamt 	    VOP_ISLOCKED(dvp)));
    272  1.24.6.2  yamt 
    273  1.24.6.2  yamt 	return error;
    274  1.24.6.2  yamt }
    275  1.24.6.2  yamt 
    276  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    277  1.24.6.2  yamt 
    278  1.24.6.2  yamt int
    279  1.24.6.2  yamt tmpfs_create(void *v)
    280  1.24.6.2  yamt {
    281  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_create_args *)v)->a_dvp;
    282  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_create_args *)v)->a_vpp;
    283  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_create_args *)v)->a_cnp;
    284  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_create_args *)v)->a_vap;
    285  1.24.6.2  yamt 
    286  1.24.6.2  yamt 	KASSERT(vap->va_type == VREG || vap->va_type == VSOCK);
    287  1.24.6.2  yamt 
    288  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    289  1.24.6.2  yamt }
    290  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    291  1.24.6.2  yamt 
    292  1.24.6.2  yamt int
    293  1.24.6.2  yamt tmpfs_mknod(void *v)
    294  1.24.6.2  yamt {
    295  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_mknod_args *)v)->a_dvp;
    296  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_mknod_args *)v)->a_vpp;
    297  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_mknod_args *)v)->a_cnp;
    298  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_mknod_args *)v)->a_vap;
    299  1.24.6.2  yamt 
    300  1.24.6.2  yamt 	if (vap->va_type != VBLK && vap->va_type != VCHR &&
    301  1.24.6.2  yamt 	    vap->va_type != VFIFO)
    302  1.24.6.2  yamt 		return EINVAL;
    303  1.24.6.2  yamt 
    304  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    305  1.24.6.2  yamt }
    306  1.24.6.2  yamt 
    307  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    308  1.24.6.2  yamt 
    309  1.24.6.2  yamt int
    310  1.24.6.2  yamt tmpfs_open(void *v)
    311  1.24.6.2  yamt {
    312  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_open_args *)v)->a_vp;
    313  1.24.6.2  yamt 	int mode = ((struct vop_open_args *)v)->a_mode;
    314  1.24.6.2  yamt 
    315  1.24.6.2  yamt 	int error;
    316  1.24.6.2  yamt 	struct tmpfs_node *node;
    317  1.24.6.2  yamt 
    318  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    319  1.24.6.2  yamt 
    320  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    321  1.24.6.2  yamt 	KASSERT(node->tn_links > 0);
    322  1.24.6.2  yamt 
    323  1.24.6.2  yamt 	/* If the file is marked append-only, deny write requests. */
    324  1.24.6.2  yamt 	if (node->tn_flags & APPEND && (mode & (FWRITE | O_APPEND)) == FWRITE)
    325  1.24.6.2  yamt 		error = EPERM;
    326  1.24.6.2  yamt 	else
    327  1.24.6.2  yamt 		error = 0;
    328  1.24.6.2  yamt 
    329  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    330  1.24.6.2  yamt 
    331  1.24.6.2  yamt 	return error;
    332  1.24.6.2  yamt }
    333  1.24.6.2  yamt 
    334  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    335  1.24.6.2  yamt 
    336  1.24.6.2  yamt int
    337  1.24.6.2  yamt tmpfs_close(void *v)
    338  1.24.6.2  yamt {
    339  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_close_args *)v)->a_vp;
    340  1.24.6.2  yamt 
    341  1.24.6.2  yamt 	struct tmpfs_node *node;
    342  1.24.6.2  yamt 
    343  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    344  1.24.6.2  yamt 
    345  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    346  1.24.6.2  yamt 
    347  1.24.6.2  yamt 	if (node->tn_links > 0) {
    348  1.24.6.2  yamt 		/* Update node times.  No need to do it if the node has
    349  1.24.6.2  yamt 		 * been deleted, because it will vanish after we return. */
    350  1.24.6.2  yamt 		tmpfs_update(vp, NULL, NULL, UPDATE_CLOSE);
    351  1.24.6.2  yamt 	}
    352  1.24.6.2  yamt 
    353  1.24.6.2  yamt 	return 0;
    354  1.24.6.2  yamt }
    355  1.24.6.2  yamt 
    356  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    357  1.24.6.2  yamt 
    358  1.24.6.2  yamt int
    359  1.24.6.2  yamt tmpfs_access(void *v)
    360  1.24.6.2  yamt {
    361  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_access_args *)v)->a_vp;
    362  1.24.6.2  yamt 	int mode = ((struct vop_access_args *)v)->a_mode;
    363  1.24.6.2  yamt 	kauth_cred_t cred = ((struct vop_access_args *)v)->a_cred;
    364  1.24.6.2  yamt 
    365  1.24.6.2  yamt 	int error;
    366  1.24.6.2  yamt 	struct tmpfs_node *node;
    367  1.24.6.2  yamt 
    368  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    369  1.24.6.2  yamt 
    370  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    371  1.24.6.2  yamt 
    372  1.24.6.2  yamt 	switch (vp->v_type) {
    373  1.24.6.2  yamt 	case VDIR:
    374  1.24.6.2  yamt 		/* FALLTHROUGH */
    375  1.24.6.2  yamt 	case VLNK:
    376  1.24.6.2  yamt 		/* FALLTHROUGH */
    377  1.24.6.2  yamt 	case VREG:
    378  1.24.6.2  yamt 		if (mode & VWRITE && vp->v_mount->mnt_flag & MNT_RDONLY) {
    379  1.24.6.2  yamt 			error = EROFS;
    380  1.24.6.2  yamt 			goto out;
    381  1.24.6.2  yamt 		}
    382  1.24.6.2  yamt 		break;
    383  1.24.6.2  yamt 
    384  1.24.6.2  yamt 	case VBLK:
    385  1.24.6.2  yamt 		/* FALLTHROUGH */
    386  1.24.6.2  yamt 	case VCHR:
    387  1.24.6.2  yamt 		/* FALLTHROUGH */
    388  1.24.6.2  yamt 	case VSOCK:
    389  1.24.6.2  yamt 		/* FALLTHROUGH */
    390  1.24.6.2  yamt 	case VFIFO:
    391  1.24.6.2  yamt 		break;
    392  1.24.6.2  yamt 
    393  1.24.6.2  yamt 	default:
    394  1.24.6.2  yamt 		error = EINVAL;
    395  1.24.6.2  yamt 		goto out;
    396  1.24.6.2  yamt 	}
    397  1.24.6.2  yamt 
    398  1.24.6.2  yamt 	if (mode & VWRITE && node->tn_flags & IMMUTABLE) {
    399  1.24.6.2  yamt 		error = EPERM;
    400  1.24.6.2  yamt 		goto out;
    401  1.24.6.2  yamt 	}
    402  1.24.6.2  yamt 
    403  1.24.6.2  yamt 	error = vaccess(vp->v_type, node->tn_mode, node->tn_uid,
    404  1.24.6.2  yamt 	    node->tn_gid, mode, cred);
    405  1.24.6.2  yamt 
    406  1.24.6.2  yamt out:
    407  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    408  1.24.6.2  yamt 
    409  1.24.6.2  yamt 	return error;
    410  1.24.6.2  yamt }
    411  1.24.6.2  yamt 
    412  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    413  1.24.6.2  yamt 
    414  1.24.6.2  yamt int
    415  1.24.6.2  yamt tmpfs_getattr(void *v)
    416  1.24.6.2  yamt {
    417  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_getattr_args *)v)->a_vp;
    418  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_getattr_args *)v)->a_vap;
    419  1.24.6.2  yamt 
    420  1.24.6.2  yamt 	struct tmpfs_node *node;
    421  1.24.6.2  yamt 
    422  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    423  1.24.6.2  yamt 
    424  1.24.6.2  yamt 	VATTR_NULL(vap);
    425  1.24.6.2  yamt 
    426  1.24.6.2  yamt 	tmpfs_itimes(vp, NULL, NULL);
    427  1.24.6.2  yamt 
    428  1.24.6.2  yamt 	vap->va_type = vp->v_type;
    429  1.24.6.2  yamt 	vap->va_mode = node->tn_mode;
    430  1.24.6.2  yamt 	vap->va_nlink = node->tn_links;
    431  1.24.6.2  yamt 	vap->va_uid = node->tn_uid;
    432  1.24.6.2  yamt 	vap->va_gid = node->tn_gid;
    433  1.24.6.2  yamt 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
    434  1.24.6.2  yamt 	vap->va_fileid = node->tn_id;
    435  1.24.6.2  yamt 	vap->va_size = node->tn_size;
    436  1.24.6.2  yamt 	vap->va_blocksize = PAGE_SIZE;
    437  1.24.6.2  yamt 	vap->va_atime = node->tn_atime;
    438  1.24.6.2  yamt 	vap->va_mtime = node->tn_mtime;
    439  1.24.6.2  yamt 	vap->va_ctime = node->tn_ctime;
    440  1.24.6.2  yamt 	vap->va_birthtime = node->tn_birthtime;
    441  1.24.6.2  yamt 	vap->va_gen = node->tn_gen;
    442  1.24.6.2  yamt 	vap->va_flags = node->tn_flags;
    443  1.24.6.2  yamt 	vap->va_rdev = (vp->v_type == VBLK || vp->v_type == VCHR) ?
    444  1.24.6.2  yamt 		node->tn_spec.tn_dev.tn_rdev : VNOVAL;
    445  1.24.6.2  yamt 	vap->va_bytes = round_page(node->tn_size);
    446  1.24.6.2  yamt 	vap->va_filerev = VNOVAL;
    447  1.24.6.2  yamt 	vap->va_vaflags = 0;
    448  1.24.6.2  yamt 	vap->va_spare = VNOVAL; /* XXX */
    449  1.24.6.2  yamt 
    450  1.24.6.2  yamt 	return 0;
    451  1.24.6.2  yamt }
    452  1.24.6.2  yamt 
    453  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    454  1.24.6.2  yamt 
    455  1.24.6.2  yamt /* XXX Should this operation be atomic?  I think it should, but code in
    456  1.24.6.2  yamt  * XXX other places (e.g., ufs) doesn't seem to be... */
    457  1.24.6.2  yamt int
    458  1.24.6.2  yamt tmpfs_setattr(void *v)
    459  1.24.6.2  yamt {
    460  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_setattr_args *)v)->a_vp;
    461  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_setattr_args *)v)->a_vap;
    462  1.24.6.2  yamt 	kauth_cred_t cred = ((struct vop_setattr_args *)v)->a_cred;
    463  1.24.6.2  yamt 	struct lwp *l = ((struct vop_setattr_args *)v)->a_l;
    464  1.24.6.2  yamt 
    465  1.24.6.2  yamt 	int error;
    466  1.24.6.2  yamt 
    467  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    468  1.24.6.2  yamt 
    469  1.24.6.2  yamt 	error = 0;
    470  1.24.6.2  yamt 
    471  1.24.6.2  yamt 	/* Abort if any unsettable attribute is given. */
    472  1.24.6.2  yamt 	if (vap->va_type != VNON ||
    473  1.24.6.2  yamt 	    vap->va_nlink != VNOVAL ||
    474  1.24.6.2  yamt 	    vap->va_fsid != VNOVAL ||
    475  1.24.6.2  yamt 	    vap->va_fileid != VNOVAL ||
    476  1.24.6.2  yamt 	    vap->va_blocksize != VNOVAL ||
    477  1.24.6.2  yamt 	    vap->va_ctime.tv_sec != VNOVAL ||
    478  1.24.6.2  yamt 	    vap->va_ctime.tv_nsec != VNOVAL ||
    479  1.24.6.2  yamt 	    vap->va_birthtime.tv_sec != VNOVAL ||
    480  1.24.6.2  yamt 	    vap->va_birthtime.tv_nsec != VNOVAL ||
    481  1.24.6.2  yamt 	    vap->va_gen != VNOVAL ||
    482  1.24.6.2  yamt 	    vap->va_rdev != VNOVAL ||
    483  1.24.6.2  yamt 	    vap->va_bytes != VNOVAL)
    484  1.24.6.2  yamt 		error = EINVAL;
    485  1.24.6.2  yamt 
    486  1.24.6.2  yamt 	if (error == 0 && (vap->va_flags != VNOVAL))
    487  1.24.6.2  yamt 		error = tmpfs_chflags(vp, vap->va_flags, cred, l->l_proc);
    488  1.24.6.2  yamt 
    489  1.24.6.2  yamt 	if (error == 0 && (vap->va_size != VNOVAL))
    490  1.24.6.2  yamt 		error = tmpfs_chsize(vp, vap->va_size, cred, l->l_proc);
    491  1.24.6.2  yamt 
    492  1.24.6.2  yamt 	if (error == 0 && (vap->va_uid != VNOVAL || vap->va_gid != VNOVAL))
    493  1.24.6.2  yamt 		error = tmpfs_chown(vp, vap->va_uid, vap->va_gid, cred,
    494  1.24.6.2  yamt 		    l->l_proc);
    495  1.24.6.2  yamt 
    496  1.24.6.2  yamt 	if (error == 0 && (vap->va_mode != VNOVAL))
    497  1.24.6.2  yamt 		error = tmpfs_chmod(vp, vap->va_mode, cred, l->l_proc);
    498  1.24.6.2  yamt 
    499  1.24.6.2  yamt 	if (error == 0 && ((vap->va_atime.tv_sec != VNOVAL &&
    500  1.24.6.2  yamt 	    vap->va_atime.tv_nsec != VNOVAL) ||
    501  1.24.6.2  yamt 	    (vap->va_mtime.tv_sec != VNOVAL &&
    502  1.24.6.2  yamt 	    vap->va_mtime.tv_nsec != VNOVAL)))
    503  1.24.6.2  yamt 		error = tmpfs_chtimes(vp, &vap->va_atime, &vap->va_mtime,
    504  1.24.6.2  yamt 		    vap->va_vaflags, cred, l);
    505  1.24.6.2  yamt 
    506  1.24.6.2  yamt 	/* Update the node times.  We give preference to the error codes
    507  1.24.6.2  yamt 	 * generated by this function rather than the ones that may arise
    508  1.24.6.2  yamt 	 * from tmpfs_update. */
    509  1.24.6.2  yamt 	tmpfs_update(vp, NULL, NULL, 0);
    510  1.24.6.2  yamt 
    511  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    512  1.24.6.2  yamt 
    513  1.24.6.2  yamt 	return error;
    514  1.24.6.2  yamt }
    515  1.24.6.2  yamt 
    516  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    517  1.24.6.2  yamt 
    518  1.24.6.2  yamt int
    519  1.24.6.2  yamt tmpfs_read(void *v)
    520  1.24.6.2  yamt {
    521  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_read_args *)v)->a_vp;
    522  1.24.6.2  yamt 	struct uio *uio = ((struct vop_read_args *)v)->a_uio;
    523  1.24.6.2  yamt 
    524  1.24.6.2  yamt 	int error;
    525  1.24.6.2  yamt 	int flags;
    526  1.24.6.2  yamt 	struct tmpfs_node *node;
    527  1.24.6.2  yamt 	struct uvm_object *uobj;
    528  1.24.6.2  yamt 
    529  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    530  1.24.6.2  yamt 
    531  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    532  1.24.6.2  yamt 
    533  1.24.6.2  yamt 	if (vp->v_type != VREG) {
    534  1.24.6.2  yamt 		error = EISDIR;
    535  1.24.6.2  yamt 		goto out;
    536  1.24.6.2  yamt 	}
    537  1.24.6.2  yamt 
    538  1.24.6.2  yamt 	if (uio->uio_offset < 0) {
    539  1.24.6.2  yamt 		error = EINVAL;
    540  1.24.6.2  yamt 		goto out;
    541  1.24.6.2  yamt 	}
    542  1.24.6.2  yamt 
    543  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED;
    544  1.24.6.2  yamt 
    545  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
    546  1.24.6.2  yamt 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    547  1.24.6.2  yamt 	error = 0;
    548  1.24.6.2  yamt 	while (error == 0 && uio->uio_resid > 0) {
    549  1.24.6.2  yamt 		vsize_t len;
    550  1.24.6.2  yamt 		void *win;
    551  1.24.6.2  yamt 
    552  1.24.6.2  yamt 		if (node->tn_size <= uio->uio_offset)
    553  1.24.6.2  yamt 			break;
    554  1.24.6.2  yamt 
    555  1.24.6.2  yamt 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    556  1.24.6.2  yamt 		if (len == 0)
    557  1.24.6.2  yamt 			break;
    558  1.24.6.2  yamt 
    559  1.24.6.2  yamt 		win = ubc_alloc(uobj, uio->uio_offset, &len, UVM_ADV_NORMAL,
    560  1.24.6.2  yamt 		    UBC_READ);
    561  1.24.6.2  yamt 		error = uiomove(win, len, uio);
    562  1.24.6.2  yamt 		ubc_release(win, flags);
    563  1.24.6.2  yamt 	}
    564  1.24.6.2  yamt 
    565  1.24.6.2  yamt out:
    566  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    567  1.24.6.2  yamt 
    568  1.24.6.2  yamt 	return error;
    569  1.24.6.2  yamt }
    570  1.24.6.2  yamt 
    571  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    572  1.24.6.2  yamt 
    573  1.24.6.2  yamt int
    574  1.24.6.2  yamt tmpfs_write(void *v)
    575  1.24.6.2  yamt {
    576  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_write_args *)v)->a_vp;
    577  1.24.6.2  yamt 	struct uio *uio = ((struct vop_write_args *)v)->a_uio;
    578  1.24.6.2  yamt 	int ioflag = ((struct vop_write_args *)v)->a_ioflag;
    579  1.24.6.2  yamt 
    580  1.24.6.2  yamt 	boolean_t extended;
    581  1.24.6.2  yamt 	int error;
    582  1.24.6.2  yamt 	int flags;
    583  1.24.6.2  yamt 	off_t oldsize;
    584  1.24.6.2  yamt 	struct tmpfs_node *node;
    585  1.24.6.2  yamt 	struct uvm_object *uobj;
    586  1.24.6.2  yamt 
    587  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    588  1.24.6.2  yamt 
    589  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    590  1.24.6.2  yamt 	oldsize = node->tn_size;
    591  1.24.6.2  yamt 
    592  1.24.6.2  yamt 	if (uio->uio_offset < 0 || vp->v_type != VREG) {
    593  1.24.6.2  yamt 		error = EINVAL;
    594  1.24.6.2  yamt 		goto out;
    595  1.24.6.2  yamt 	}
    596  1.24.6.2  yamt 
    597  1.24.6.2  yamt 	if (uio->uio_resid == 0) {
    598  1.24.6.2  yamt 		error = 0;
    599  1.24.6.2  yamt 		goto out;
    600  1.24.6.2  yamt 	}
    601  1.24.6.2  yamt 
    602  1.24.6.2  yamt 	if (ioflag & IO_APPEND)
    603  1.24.6.2  yamt 		uio->uio_offset = node->tn_size;
    604  1.24.6.2  yamt 
    605  1.24.6.2  yamt 	extended = uio->uio_offset + uio->uio_resid > node->tn_size;
    606  1.24.6.2  yamt 	if (extended) {
    607  1.24.6.2  yamt 		error = tmpfs_reg_resize(vp, uio->uio_offset + uio->uio_resid);
    608  1.24.6.2  yamt 		if (error != 0)
    609  1.24.6.2  yamt 			goto out;
    610  1.24.6.2  yamt 	}
    611  1.24.6.2  yamt 
    612  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
    613  1.24.6.2  yamt 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    614  1.24.6.2  yamt 	error = 0;
    615  1.24.6.2  yamt 	while (error == 0 && uio->uio_resid > 0) {
    616  1.24.6.2  yamt 		vsize_t len;
    617  1.24.6.2  yamt 		void *win;
    618  1.24.6.2  yamt 
    619  1.24.6.2  yamt 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    620  1.24.6.2  yamt 		if (len == 0)
    621  1.24.6.2  yamt 			break;
    622  1.24.6.2  yamt 
    623  1.24.6.2  yamt 		win = ubc_alloc(uobj, uio->uio_offset, &len, UVM_ADV_NORMAL,
    624  1.24.6.2  yamt 		    UBC_WRITE);
    625  1.24.6.2  yamt 		error = uiomove(win, len, uio);
    626  1.24.6.2  yamt 		ubc_release(win, flags);
    627  1.24.6.2  yamt 	}
    628  1.24.6.2  yamt 
    629  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED |
    630  1.24.6.2  yamt 	    (extended ? TMPFS_NODE_CHANGED : 0);
    631  1.24.6.2  yamt 
    632  1.24.6.2  yamt 	if (error != 0)
    633  1.24.6.2  yamt 		(void)tmpfs_reg_resize(vp, oldsize);
    634  1.24.6.2  yamt 
    635  1.24.6.2  yamt out:
    636  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    637  1.24.6.2  yamt 	KASSERT(IMPLIES(error == 0, uio->uio_resid == 0));
    638  1.24.6.2  yamt 	KASSERT(IMPLIES(error != 0, oldsize == node->tn_size));
    639  1.24.6.2  yamt 
    640  1.24.6.2  yamt 	return error;
    641  1.24.6.2  yamt }
    642  1.24.6.2  yamt 
    643  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    644  1.24.6.2  yamt 
    645  1.24.6.2  yamt int
    646  1.24.6.2  yamt tmpfs_fsync(void *v)
    647  1.24.6.2  yamt {
    648  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_fsync_args *)v)->a_vp;
    649  1.24.6.2  yamt 
    650  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    651  1.24.6.2  yamt 
    652  1.24.6.2  yamt 	tmpfs_update(vp, NULL, NULL, 0);
    653  1.24.6.2  yamt 
    654  1.24.6.2  yamt 	return 0;
    655  1.24.6.2  yamt }
    656  1.24.6.2  yamt 
    657  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    658  1.24.6.2  yamt 
    659  1.24.6.2  yamt int
    660  1.24.6.2  yamt tmpfs_remove(void *v)
    661  1.24.6.2  yamt {
    662  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_remove_args *)v)->a_dvp;
    663  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_remove_args *)v)->a_vp;
    664  1.24.6.2  yamt 
    665  1.24.6.2  yamt 	int error;
    666  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    667  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
    668  1.24.6.2  yamt 	struct tmpfs_node *dnode;
    669  1.24.6.2  yamt 	struct tmpfs_node *node;
    670  1.24.6.2  yamt 
    671  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
    672  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    673  1.24.6.2  yamt 
    674  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
    675  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    676  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(vp->v_mount);
    677  1.24.6.2  yamt 	de = node->tn_lookup_dirent;
    678  1.24.6.2  yamt 	KASSERT(de != NULL);
    679  1.24.6.2  yamt 
    680  1.24.6.2  yamt 	/* XXX: Why isn't this done by the caller? */
    681  1.24.6.2  yamt 	if (vp->v_type == VDIR) {
    682  1.24.6.2  yamt 		error = EISDIR;
    683  1.24.6.2  yamt 		goto out;
    684  1.24.6.2  yamt 	}
    685  1.24.6.2  yamt 
    686  1.24.6.2  yamt 	/* Files marked as immutable or append-only cannot be deleted. */
    687  1.24.6.2  yamt 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    688  1.24.6.2  yamt 		error = EPERM;
    689  1.24.6.2  yamt 		goto out;
    690  1.24.6.2  yamt 	}
    691  1.24.6.2  yamt 
    692  1.24.6.2  yamt 	/* Remove the entry from the directory; as it is a file, we do not
    693  1.24.6.2  yamt 	 * have to change the number of hard links of the directory. */
    694  1.24.6.2  yamt 	tmpfs_dir_detach(dvp, de);
    695  1.24.6.2  yamt 
    696  1.24.6.2  yamt 	/* Notify interested parties about the modification of dvp.
    697  1.24.6.2  yamt 	 * The removal of vp is notified when it is reclaimed. */
    698  1.24.6.2  yamt 	VN_KNOTE(dvp, NOTE_WRITE);
    699  1.24.6.2  yamt 
    700  1.24.6.2  yamt 	/* Free the directory entry we just deleted.  Note that the node
    701  1.24.6.2  yamt 	 * referred by it will not be removed until the vnode is really
    702  1.24.6.2  yamt 	 * reclaimed. */
    703  1.24.6.2  yamt 	tmpfs_free_dirent(tmp, de, TRUE);
    704  1.24.6.2  yamt 
    705  1.24.6.2  yamt 	error = 0;
    706  1.24.6.2  yamt 
    707  1.24.6.2  yamt out:
    708  1.24.6.2  yamt 	vput(dvp);
    709  1.24.6.2  yamt 	vput(vp);
    710  1.24.6.2  yamt 
    711  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(dvp));
    712  1.24.6.2  yamt 
    713  1.24.6.2  yamt 	return error;
    714  1.24.6.2  yamt }
    715  1.24.6.2  yamt 
    716  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    717  1.24.6.2  yamt 
    718  1.24.6.2  yamt int
    719  1.24.6.2  yamt tmpfs_link(void *v)
    720  1.24.6.2  yamt {
    721  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_link_args *)v)->a_dvp;
    722  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_link_args *)v)->a_vp;
    723  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_link_args *)v)->a_cnp;
    724  1.24.6.2  yamt 
    725  1.24.6.2  yamt 	int error;
    726  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    727  1.24.6.2  yamt 	struct tmpfs_node *dnode;
    728  1.24.6.2  yamt 	struct tmpfs_node *node;
    729  1.24.6.2  yamt 
    730  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
    731  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
    732  1.24.6.2  yamt 	KASSERT(cnp->cn_flags & HASBUF);
    733  1.24.6.2  yamt 	KASSERT(dvp != vp); /* XXX When can this be false? */
    734  1.24.6.2  yamt 
    735  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
    736  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    737  1.24.6.2  yamt 
    738  1.24.6.2  yamt 	/* Lock vp because we will need to run tmpfs_update over it, which
    739  1.24.6.2  yamt 	 * needs the vnode to be locked. */
    740  1.24.6.2  yamt 	error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    741  1.24.6.2  yamt 	if (error != 0)
    742  1.24.6.2  yamt 		goto out;
    743  1.24.6.2  yamt 
    744  1.24.6.2  yamt 	/* XXX: Why aren't the following two tests done by the caller? */
    745  1.24.6.2  yamt 
    746  1.24.6.2  yamt 	/* Hard links of directories are forbidden. */
    747  1.24.6.2  yamt 	if (vp->v_type == VDIR) {
    748  1.24.6.2  yamt 		error = EPERM;
    749  1.24.6.2  yamt 		goto out;
    750  1.24.6.2  yamt 	}
    751  1.24.6.2  yamt 
    752  1.24.6.2  yamt 	/* Cannot create cross-device links. */
    753  1.24.6.2  yamt 	if (dvp->v_mount != vp->v_mount) {
    754  1.24.6.2  yamt 		error = EXDEV;
    755  1.24.6.2  yamt 		goto out;
    756  1.24.6.2  yamt 	}
    757  1.24.6.2  yamt 
    758  1.24.6.2  yamt 	/* Ensure that we do not overflow the maximum number of links imposed
    759  1.24.6.2  yamt 	 * by the system. */
    760  1.24.6.2  yamt 	KASSERT(node->tn_links <= LINK_MAX);
    761  1.24.6.2  yamt 	if (node->tn_links == LINK_MAX) {
    762  1.24.6.2  yamt 		error = EMLINK;
    763  1.24.6.2  yamt 		goto out;
    764  1.24.6.2  yamt 	}
    765  1.24.6.2  yamt 
    766  1.24.6.2  yamt 	/* We cannot create links of files marked immutable or append-only. */
    767  1.24.6.2  yamt 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    768  1.24.6.2  yamt 		error = EPERM;
    769  1.24.6.2  yamt 		goto out;
    770  1.24.6.2  yamt 	}
    771  1.24.6.2  yamt 
    772  1.24.6.2  yamt 	/* Allocate a new directory entry to represent the node. */
    773  1.24.6.2  yamt 	error = tmpfs_alloc_dirent(VFS_TO_TMPFS(vp->v_mount), node,
    774  1.24.6.2  yamt 	    cnp->cn_nameptr, cnp->cn_namelen, &de);
    775  1.24.6.2  yamt 	if (error != 0)
    776  1.24.6.2  yamt 		goto out;
    777  1.24.6.2  yamt 
    778  1.24.6.2  yamt 	/* Insert the new directory entry into the appropriate directory. */
    779  1.24.6.2  yamt 	tmpfs_dir_attach(dvp, de);
    780  1.24.6.2  yamt 	VN_KNOTE(dvp, NOTE_WRITE);
    781  1.24.6.2  yamt 
    782  1.24.6.2  yamt 	/* vp link count has changed, so update node times. */
    783  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_CHANGED;
    784  1.24.6.2  yamt 	tmpfs_update(vp, NULL, NULL, 0);
    785  1.24.6.2  yamt 
    786  1.24.6.2  yamt 	error = 0;
    787  1.24.6.2  yamt 
    788  1.24.6.2  yamt out:
    789  1.24.6.2  yamt 	if (VOP_ISLOCKED(vp))
    790  1.24.6.2  yamt 		VOP_UNLOCK(vp, 0);
    791  1.24.6.2  yamt 
    792  1.24.6.2  yamt 	PNBUF_PUT(cnp->cn_pnbuf);
    793  1.24.6.2  yamt 
    794  1.24.6.2  yamt 	vput(dvp);
    795  1.24.6.2  yamt 
    796  1.24.6.2  yamt 	/* XXX Locking status of dvp does not match manual page. */
    797  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(dvp));
    798  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
    799  1.24.6.2  yamt 
    800  1.24.6.2  yamt 	return error;
    801  1.24.6.2  yamt }
    802  1.24.6.2  yamt 
    803  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    804  1.24.6.2  yamt 
    805  1.24.6.2  yamt int
    806  1.24.6.2  yamt tmpfs_rename(void *v)
    807  1.24.6.2  yamt {
    808  1.24.6.2  yamt 	struct vnode *fdvp = ((struct vop_rename_args *)v)->a_fdvp;
    809  1.24.6.2  yamt 	struct vnode *fvp = ((struct vop_rename_args *)v)->a_fvp;
    810  1.24.6.2  yamt 	struct componentname *fcnp = ((struct vop_rename_args *)v)->a_fcnp;
    811  1.24.6.2  yamt 	struct vnode *tdvp = ((struct vop_rename_args *)v)->a_tdvp;
    812  1.24.6.2  yamt 	struct vnode *tvp = ((struct vop_rename_args *)v)->a_tvp;
    813  1.24.6.2  yamt 	struct componentname *tcnp = ((struct vop_rename_args *)v)->a_tcnp;
    814  1.24.6.2  yamt 
    815  1.24.6.2  yamt 	char *newname;
    816  1.24.6.2  yamt 	int error;
    817  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    818  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
    819  1.24.6.2  yamt 	struct tmpfs_node *fdnode;
    820  1.24.6.2  yamt 	struct tmpfs_node *fnode;
    821  1.24.6.2  yamt 	struct tmpfs_node *tdnode;
    822  1.24.6.2  yamt 
    823  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(tdvp));
    824  1.24.6.2  yamt 	KASSERT(IMPLIES(tvp != NULL, VOP_ISLOCKED(tvp)));
    825  1.24.6.2  yamt 	KASSERT(fcnp->cn_flags & HASBUF);
    826  1.24.6.2  yamt 	KASSERT(tcnp->cn_flags & HASBUF);
    827  1.24.6.2  yamt 
    828  1.24.6.2  yamt 	fdnode = VP_TO_TMPFS_DIR(fdvp);
    829  1.24.6.2  yamt 	fnode = VP_TO_TMPFS_NODE(fvp);
    830  1.24.6.2  yamt 	de = fnode->tn_lookup_dirent;
    831  1.24.6.2  yamt 
    832  1.24.6.2  yamt 	/* Disallow cross-device renames.
    833  1.24.6.2  yamt 	 * XXX Why isn't this done by the caller? */
    834  1.24.6.2  yamt 	if (fvp->v_mount != tdvp->v_mount ||
    835  1.24.6.2  yamt 	    (tvp != NULL && fvp->v_mount != tvp->v_mount)) {
    836  1.24.6.2  yamt 		error = EXDEV;
    837  1.24.6.2  yamt 		goto out;
    838  1.24.6.2  yamt 	}
    839  1.24.6.2  yamt 
    840  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(tdvp->v_mount);
    841  1.24.6.2  yamt 	tdnode = VP_TO_TMPFS_DIR(tdvp);
    842  1.24.6.2  yamt 
    843  1.24.6.2  yamt 	/* If source and target are the same file, there is nothing to do. */
    844  1.24.6.2  yamt 	if (fvp == tvp) {
    845  1.24.6.2  yamt 		error = 0;
    846  1.24.6.2  yamt 		goto out;
    847  1.24.6.2  yamt 	}
    848  1.24.6.2  yamt 
    849  1.24.6.2  yamt 	/* Avoid manipulating '.' and '..' entries. */
    850  1.24.6.2  yamt 	if (de == NULL) {
    851  1.24.6.2  yamt 		KASSERT(fvp->v_type == VDIR);
    852  1.24.6.2  yamt 		error = EINVAL;
    853  1.24.6.2  yamt 		goto out;
    854  1.24.6.2  yamt 	}
    855  1.24.6.2  yamt 	KASSERT(de->td_node == fnode);
    856  1.24.6.2  yamt 
    857  1.24.6.2  yamt 	/* If we need to move the directory between entries, lock the
    858  1.24.6.2  yamt 	 * source so that we can safely operate on it. */
    859  1.24.6.2  yamt 	if (fdnode != tdnode) {
    860  1.24.6.2  yamt 		error = vn_lock(fdvp, LK_EXCLUSIVE | LK_RETRY);
    861  1.24.6.2  yamt 		if (error != 0)
    862  1.24.6.2  yamt 			goto out;
    863  1.24.6.2  yamt 	}
    864  1.24.6.2  yamt 
    865  1.24.6.2  yamt 	/* Ensure that we have enough memory to hold the new name, if it
    866  1.24.6.2  yamt 	 * has to be changed. */
    867  1.24.6.2  yamt 	if (fcnp->cn_namelen != tcnp->cn_namelen ||
    868  1.24.6.2  yamt 	    memcmp(fcnp->cn_nameptr, tcnp->cn_nameptr, fcnp->cn_namelen) != 0) {
    869  1.24.6.2  yamt 		newname = tmpfs_str_pool_get(&tmp->tm_str_pool,
    870  1.24.6.2  yamt 		    tcnp->cn_namelen, 0);
    871  1.24.6.2  yamt 		if (newname == NULL) {
    872  1.24.6.2  yamt 			error = ENOSPC;
    873  1.24.6.2  yamt 			goto out_locked;
    874  1.24.6.2  yamt 		}
    875  1.24.6.2  yamt 	} else
    876  1.24.6.2  yamt 		newname = NULL;
    877  1.24.6.2  yamt 
    878  1.24.6.2  yamt 	/* If the node is being moved to another directory, we have to do
    879  1.24.6.2  yamt 	 * the move. */
    880  1.24.6.2  yamt 	if (fdnode != tdnode) {
    881  1.24.6.2  yamt 		/* In case we are moving a directory, we have to adjust its
    882  1.24.6.2  yamt 		 * parent to point to the new parent. */
    883  1.24.6.2  yamt 		if (de->td_node->tn_type == VDIR) {
    884  1.24.6.2  yamt 			struct tmpfs_node *n;
    885  1.24.6.2  yamt 
    886  1.24.6.2  yamt 			/* Ensure the target directory is not a child of the
    887  1.24.6.2  yamt 			 * directory being moved.  Otherwise, we'd end up
    888  1.24.6.2  yamt 			 * with stale nodes. */
    889  1.24.6.2  yamt 			n = tdnode;
    890  1.24.6.2  yamt 			while (n != n->tn_spec.tn_dir.tn_parent) {
    891  1.24.6.2  yamt 				if (n == fnode) {
    892  1.24.6.2  yamt 					error = EINVAL;
    893  1.24.6.2  yamt 					goto out_locked;
    894  1.24.6.2  yamt 				}
    895  1.24.6.2  yamt 				n = n->tn_spec.tn_dir.tn_parent;
    896  1.24.6.2  yamt 			}
    897  1.24.6.2  yamt 
    898  1.24.6.2  yamt 			/* Adjust the parent pointer. */
    899  1.24.6.2  yamt 			TMPFS_VALIDATE_DIR(fnode);
    900  1.24.6.2  yamt 			de->td_node->tn_spec.tn_dir.tn_parent = tdnode;
    901  1.24.6.2  yamt 
    902  1.24.6.2  yamt 			/* As a result of changing the target of the '..'
    903  1.24.6.2  yamt 			 * entry, the link count of the source and target
    904  1.24.6.2  yamt 			 * directories has to be adjusted. */
    905  1.24.6.2  yamt 			fdnode->tn_links--;
    906  1.24.6.2  yamt 			tdnode->tn_links++;
    907  1.24.6.2  yamt 		}
    908  1.24.6.2  yamt 
    909  1.24.6.2  yamt 		/* Do the move: just remove the entry from the source directory
    910  1.24.6.2  yamt 		 * and insert it into the target one. */
    911  1.24.6.2  yamt 		tmpfs_dir_detach(fdvp, de);
    912  1.24.6.2  yamt 		tmpfs_dir_attach(tdvp, de);
    913  1.24.6.2  yamt 
    914  1.24.6.2  yamt 		/* Notify listeners of fdvp about the change in the directory.
    915  1.24.6.2  yamt 		 * We can do it at this point because we aren't touching fdvp
    916  1.24.6.2  yamt 		 * any more below. */
    917  1.24.6.2  yamt 		VN_KNOTE(fdvp, NOTE_WRITE);
    918  1.24.6.2  yamt 	}
    919  1.24.6.2  yamt 
    920  1.24.6.2  yamt 	/* If the name has changed, we need to make it effective by changing
    921  1.24.6.2  yamt 	 * it in the directory entry. */
    922  1.24.6.2  yamt 	if (newname != NULL) {
    923  1.24.6.2  yamt 		KASSERT(tcnp->cn_namelen < MAXNAMLEN);
    924  1.24.6.2  yamt 		KASSERT(tcnp->cn_namelen < 0xffff);
    925  1.24.6.2  yamt 
    926  1.24.6.2  yamt 		tmpfs_str_pool_put(&tmp->tm_str_pool, de->td_name,
    927  1.24.6.2  yamt 		    de->td_namelen);
    928  1.24.6.2  yamt 		de->td_namelen = (uint16_t)tcnp->cn_namelen;
    929  1.24.6.2  yamt 		memcpy(newname, tcnp->cn_nameptr, tcnp->cn_namelen);
    930  1.24.6.2  yamt 		de->td_name = newname;
    931  1.24.6.2  yamt 
    932  1.24.6.2  yamt 		fnode->tn_status |= TMPFS_NODE_MODIFIED;
    933  1.24.6.2  yamt 	}
    934  1.24.6.2  yamt 
    935  1.24.6.2  yamt 	/* If we are overwriting an entry, we have to remove the old one
    936  1.24.6.2  yamt 	 * from the target directory. */
    937  1.24.6.2  yamt 	if (tvp != NULL) {
    938  1.24.6.2  yamt 		struct tmpfs_node *tnode;
    939  1.24.6.2  yamt 
    940  1.24.6.2  yamt 		tnode = VP_TO_TMPFS_NODE(tvp);
    941  1.24.6.2  yamt 
    942  1.24.6.2  yamt 		/* The source node cannot be a directory in this case. */
    943  1.24.6.2  yamt 		KASSERT(fnode->tn_type != VDIR);
    944  1.24.6.2  yamt 
    945  1.24.6.2  yamt 		/* Remove the old entry from the target directory. */
    946  1.24.6.2  yamt 		de = tnode->tn_lookup_dirent;
    947  1.24.6.2  yamt 		tmpfs_dir_detach(tdvp, de);
    948  1.24.6.2  yamt 
    949  1.24.6.2  yamt 		/* Free the directory entry we just deleted.  Note that the
    950  1.24.6.2  yamt 		 * node referred by it will not be removed until the vnode is
    951  1.24.6.2  yamt 		 * really reclaimed. */
    952  1.24.6.2  yamt 		tmpfs_free_dirent(VFS_TO_TMPFS(tvp->v_mount), de, TRUE);
    953  1.24.6.2  yamt 	}
    954  1.24.6.2  yamt 
    955  1.24.6.2  yamt 	/* Notify listeners of tdvp about the change in the directory (either
    956  1.24.6.2  yamt 	 * because a new entry was added or because one was removed). */
    957  1.24.6.2  yamt 	VN_KNOTE(tdvp, NOTE_WRITE);
    958  1.24.6.2  yamt 
    959  1.24.6.2  yamt 	error = 0;
    960  1.24.6.2  yamt 
    961  1.24.6.2  yamt out_locked:
    962  1.24.6.2  yamt 	if (fdnode != tdnode)
    963  1.24.6.2  yamt 		VOP_UNLOCK(fdvp, 0);
    964  1.24.6.2  yamt 
    965  1.24.6.2  yamt out:
    966  1.24.6.2  yamt 	/* Release target nodes. */
    967  1.24.6.2  yamt 	/* XXX: I don't understand when tdvp can be the same as tvp, but
    968  1.24.6.2  yamt 	 * other code takes care of this... */
    969  1.24.6.2  yamt 	if (tdvp == tvp)
    970  1.24.6.2  yamt 		vrele(tdvp);
    971  1.24.6.2  yamt 	else
    972  1.24.6.2  yamt 		vput(tdvp);
    973  1.24.6.2  yamt 	if (tvp != NULL)
    974  1.24.6.2  yamt 		vput(tvp);
    975  1.24.6.2  yamt 
    976  1.24.6.2  yamt 	/* Release source nodes. */
    977  1.24.6.2  yamt 	vrele(fdvp);
    978  1.24.6.2  yamt 	vrele(fvp);
    979  1.24.6.2  yamt 
    980  1.24.6.2  yamt 	return error;
    981  1.24.6.2  yamt }
    982  1.24.6.2  yamt 
    983  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    984  1.24.6.2  yamt 
    985  1.24.6.2  yamt int
    986  1.24.6.2  yamt tmpfs_mkdir(void *v)
    987  1.24.6.2  yamt {
    988  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_mkdir_args *)v)->a_dvp;
    989  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_mkdir_args *)v)->a_vpp;
    990  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_mkdir_args *)v)->a_cnp;
    991  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_mkdir_args *)v)->a_vap;
    992  1.24.6.2  yamt 
    993  1.24.6.2  yamt 	KASSERT(vap->va_type == VDIR);
    994  1.24.6.2  yamt 
    995  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    996  1.24.6.2  yamt }
    997  1.24.6.2  yamt 
    998  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    999  1.24.6.2  yamt 
   1000  1.24.6.2  yamt int
   1001  1.24.6.2  yamt tmpfs_rmdir(void *v)
   1002  1.24.6.2  yamt {
   1003  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_rmdir_args *)v)->a_dvp;
   1004  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_rmdir_args *)v)->a_vp;
   1005  1.24.6.2  yamt 
   1006  1.24.6.2  yamt 	int error;
   1007  1.24.6.2  yamt 	struct tmpfs_dirent *de;
   1008  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
   1009  1.24.6.2  yamt 	struct tmpfs_node *dnode;
   1010  1.24.6.2  yamt 	struct tmpfs_node *node;
   1011  1.24.6.2  yamt 
   1012  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
   1013  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1014  1.24.6.2  yamt 
   1015  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(dvp->v_mount);
   1016  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
   1017  1.24.6.2  yamt 	node = VP_TO_TMPFS_DIR(vp);
   1018  1.24.6.2  yamt 	KASSERT(node->tn_spec.tn_dir.tn_parent == dnode);
   1019  1.24.6.2  yamt 
   1020  1.24.6.2  yamt 	/* Get the directory entry associated with node (vp).  This was
   1021  1.24.6.2  yamt 	 * filled by tmpfs_lookup while looking up the entry. */
   1022  1.24.6.2  yamt 	de = node->tn_lookup_dirent;
   1023  1.24.6.2  yamt 	KASSERT(TMPFS_DIRENT_MATCHES(de,
   1024  1.24.6.2  yamt 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_nameptr,
   1025  1.24.6.2  yamt 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_namelen));
   1026  1.24.6.2  yamt 
   1027  1.24.6.2  yamt 	/* Directories with more than two entries ('.' and '..') cannot be
   1028  1.24.6.2  yamt 	 * removed. */
   1029  1.24.6.2  yamt 	if (node->tn_size > 0) {
   1030  1.24.6.2  yamt 		error = ENOTEMPTY;
   1031  1.24.6.2  yamt 		goto out;
   1032  1.24.6.2  yamt 	}
   1033  1.24.6.2  yamt 
   1034  1.24.6.2  yamt 	/* Check flags to see if we are allowed to remove the directory. */
   1035  1.24.6.2  yamt 	if (dnode->tn_flags & APPEND || node->tn_flags & (IMMUTABLE | APPEND)) {
   1036  1.24.6.2  yamt 		error = EPERM;
   1037  1.24.6.2  yamt 		goto out;
   1038  1.24.6.2  yamt 	}
   1039  1.24.6.2  yamt 
   1040  1.24.6.2  yamt 	/* Detach the directory entry from the directory (dnode). */
   1041  1.24.6.2  yamt 	tmpfs_dir_detach(dvp, de);
   1042  1.24.6.2  yamt 
   1043  1.24.6.2  yamt 	node->tn_links--;
   1044  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
   1045  1.24.6.2  yamt 	    TMPFS_NODE_MODIFIED;
   1046  1.24.6.2  yamt 	node->tn_spec.tn_dir.tn_parent->tn_links--;
   1047  1.24.6.2  yamt 	node->tn_spec.tn_dir.tn_parent->tn_status |= TMPFS_NODE_ACCESSED | \
   1048  1.24.6.2  yamt 	    TMPFS_NODE_CHANGED | TMPFS_NODE_MODIFIED;
   1049  1.24.6.2  yamt 
   1050  1.24.6.2  yamt 	/* Notify modification of parent directory and release it. */
   1051  1.24.6.2  yamt 	VN_KNOTE(dvp, NOTE_WRITE | NOTE_LINK);
   1052  1.24.6.2  yamt 	cache_purge(dvp); /* XXX Is this needed? */
   1053  1.24.6.2  yamt 	vput(dvp);
   1054  1.24.6.2  yamt 
   1055  1.24.6.2  yamt 	/* Free the directory entry we just deleted.  Note that the node
   1056  1.24.6.2  yamt 	 * referred by it will not be removed until the vnode is really
   1057  1.24.6.2  yamt 	 * reclaimed. */
   1058  1.24.6.2  yamt 	tmpfs_free_dirent(tmp, de, TRUE);
   1059  1.24.6.2  yamt 
   1060  1.24.6.2  yamt 	/* Release the deleted vnode (will destroy the node, notify
   1061  1.24.6.2  yamt 	 * interested parties and clean it from the cache). */
   1062  1.24.6.2  yamt 	vput(vp);
   1063  1.24.6.2  yamt 
   1064  1.24.6.2  yamt 	error = 0;
   1065  1.24.6.2  yamt 
   1066  1.24.6.2  yamt out:
   1067  1.24.6.2  yamt 	if (error != 0) {
   1068  1.24.6.2  yamt 		vput(dvp);
   1069  1.24.6.2  yamt 		vput(vp);
   1070  1.24.6.2  yamt 	}
   1071  1.24.6.2  yamt 
   1072  1.24.6.2  yamt 	return error;
   1073  1.24.6.2  yamt }
   1074  1.24.6.2  yamt 
   1075  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1076  1.24.6.2  yamt 
   1077  1.24.6.2  yamt int
   1078  1.24.6.2  yamt tmpfs_symlink(void *v)
   1079  1.24.6.2  yamt {
   1080  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_symlink_args *)v)->a_dvp;
   1081  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_symlink_args *)v)->a_vpp;
   1082  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_symlink_args *)v)->a_cnp;
   1083  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_symlink_args *)v)->a_vap;
   1084  1.24.6.2  yamt 	char *target = ((struct vop_symlink_args *)v)->a_target;
   1085  1.24.6.2  yamt 
   1086  1.24.6.2  yamt 	KASSERT(vap->va_type == VLNK);
   1087  1.24.6.2  yamt 
   1088  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, target);
   1089  1.24.6.2  yamt }
   1090  1.24.6.2  yamt 
   1091  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1092  1.24.6.2  yamt 
   1093  1.24.6.2  yamt int
   1094  1.24.6.2  yamt tmpfs_readdir(void *v)
   1095  1.24.6.2  yamt {
   1096  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_readdir_args *)v)->a_vp;
   1097  1.24.6.2  yamt 	struct uio *uio = ((struct vop_readdir_args *)v)->a_uio;
   1098  1.24.6.2  yamt 	int *eofflag = ((struct vop_readdir_args *)v)->a_eofflag;
   1099  1.24.6.2  yamt 	off_t **cookies = ((struct vop_readdir_args *)v)->a_cookies;
   1100  1.24.6.2  yamt 	int *ncookies = ((struct vop_readdir_args *)v)->a_ncookies;
   1101  1.24.6.2  yamt 
   1102  1.24.6.2  yamt 	int error;
   1103  1.24.6.2  yamt 	off_t startoff;
   1104  1.24.6.2  yamt 	off_t cnt;
   1105  1.24.6.2  yamt 	struct tmpfs_node *node;
   1106  1.24.6.2  yamt 
   1107  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1108  1.24.6.2  yamt 
   1109  1.24.6.2  yamt 	/* This operation only makes sense on directory nodes. */
   1110  1.24.6.2  yamt 	if (vp->v_type != VDIR) {
   1111  1.24.6.2  yamt 		error = ENOTDIR;
   1112  1.24.6.2  yamt 		goto out;
   1113  1.24.6.2  yamt 	}
   1114  1.24.6.2  yamt 
   1115  1.24.6.2  yamt 	node = VP_TO_TMPFS_DIR(vp);
   1116  1.24.6.2  yamt 
   1117  1.24.6.2  yamt 	startoff = uio->uio_offset;
   1118  1.24.6.2  yamt 
   1119  1.24.6.2  yamt 	cnt = 0;
   1120  1.24.6.2  yamt 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOT) {
   1121  1.24.6.2  yamt 		error = tmpfs_dir_getdotdent(node, uio);
   1122  1.24.6.2  yamt 		if (error == -1) {
   1123  1.24.6.2  yamt 			error = 0;
   1124  1.24.6.2  yamt 			goto outok;
   1125  1.24.6.2  yamt 		} else if (error != 0)
   1126  1.24.6.2  yamt 			goto outok;
   1127  1.24.6.2  yamt 		cnt++;
   1128  1.24.6.2  yamt 	}
   1129  1.24.6.2  yamt 
   1130  1.24.6.2  yamt 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOTDOT) {
   1131  1.24.6.2  yamt 		error = tmpfs_dir_getdotdotdent(node, uio);
   1132  1.24.6.2  yamt 		if (error == -1) {
   1133  1.24.6.2  yamt 			error = 0;
   1134  1.24.6.2  yamt 			goto outok;
   1135  1.24.6.2  yamt 		} else if (error != 0)
   1136  1.24.6.2  yamt 			goto outok;
   1137  1.24.6.2  yamt 		cnt++;
   1138  1.24.6.2  yamt 	}
   1139  1.24.6.2  yamt 
   1140  1.24.6.2  yamt 	error = tmpfs_dir_getdents(node, uio, &cnt);
   1141  1.24.6.2  yamt 	if (error == -1)
   1142  1.24.6.2  yamt 		error = 0;
   1143  1.24.6.2  yamt 	KASSERT(error >= 0);
   1144  1.24.6.2  yamt 
   1145  1.24.6.2  yamt outok:
   1146  1.24.6.2  yamt 	/* This label assumes that startoff has been
   1147  1.24.6.2  yamt 	 * initialized.  If the compiler didn't spit out warnings, we'd
   1148  1.24.6.2  yamt 	 * simply make this one be 'out' and drop 'outok'. */
   1149  1.24.6.2  yamt 
   1150  1.24.6.2  yamt 	if (eofflag != NULL)
   1151  1.24.6.2  yamt 		*eofflag =
   1152  1.24.6.2  yamt 		    (error == 0 && uio->uio_offset == TMPFS_DIRCOOKIE_EOF);
   1153  1.24.6.2  yamt 
   1154  1.24.6.2  yamt 	/* Update NFS-related variables. */
   1155  1.24.6.2  yamt 	if (error == 0 && cookies != NULL && ncookies != NULL) {
   1156  1.24.6.2  yamt 		off_t i;
   1157  1.24.6.2  yamt 		off_t off = startoff;
   1158  1.24.6.2  yamt 		struct tmpfs_dirent *de = NULL;
   1159  1.24.6.2  yamt 
   1160  1.24.6.2  yamt 		*ncookies = cnt;
   1161  1.24.6.2  yamt 		*cookies = malloc(cnt * sizeof(off_t), M_TEMP, M_WAITOK);
   1162  1.24.6.2  yamt 
   1163  1.24.6.2  yamt 		for (i = 0; i < cnt; i++) {
   1164  1.24.6.2  yamt 			KASSERT(off != TMPFS_DIRCOOKIE_EOF);
   1165  1.24.6.2  yamt 			if (off == TMPFS_DIRCOOKIE_DOT) {
   1166  1.24.6.2  yamt 				off = TMPFS_DIRCOOKIE_DOTDOT;
   1167  1.24.6.2  yamt 			} else {
   1168  1.24.6.2  yamt 				if (off == TMPFS_DIRCOOKIE_DOTDOT) {
   1169  1.24.6.2  yamt 					de = TAILQ_FIRST(&node->tn_spec.
   1170  1.24.6.2  yamt 					    tn_dir.tn_dir);
   1171  1.24.6.2  yamt 				} else if (de != NULL) {
   1172  1.24.6.2  yamt 					de = TAILQ_NEXT(de, td_entries);
   1173  1.24.6.2  yamt 				} else {
   1174  1.24.6.2  yamt 					de = tmpfs_dir_lookupbycookie(node,
   1175  1.24.6.2  yamt 					    off);
   1176  1.24.6.2  yamt 					KASSERT(de != NULL);
   1177  1.24.6.2  yamt 					de = TAILQ_NEXT(de, td_entries);
   1178  1.24.6.2  yamt 				}
   1179  1.24.6.2  yamt 				if (de == NULL) {
   1180  1.24.6.2  yamt 					off = TMPFS_DIRCOOKIE_EOF;
   1181  1.24.6.2  yamt 				} else {
   1182  1.24.6.2  yamt 					off = TMPFS_DIRCOOKIE(de);
   1183  1.24.6.2  yamt 				}
   1184  1.24.6.2  yamt 			}
   1185  1.24.6.2  yamt 
   1186  1.24.6.2  yamt 			(*cookies)[i] = off;
   1187  1.24.6.2  yamt 		}
   1188  1.24.6.2  yamt 		KASSERT(uio->uio_offset == off);
   1189  1.24.6.2  yamt 	}
   1190  1.24.6.2  yamt 
   1191  1.24.6.2  yamt out:
   1192  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1193  1.24.6.2  yamt 
   1194  1.24.6.2  yamt 	return error;
   1195  1.24.6.2  yamt }
   1196  1.24.6.2  yamt 
   1197  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1198  1.24.6.2  yamt 
   1199  1.24.6.2  yamt int
   1200  1.24.6.2  yamt tmpfs_readlink(void *v)
   1201  1.24.6.2  yamt {
   1202  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_readlink_args *)v)->a_vp;
   1203  1.24.6.2  yamt 	struct uio *uio = ((struct vop_readlink_args *)v)->a_uio;
   1204  1.24.6.2  yamt 
   1205  1.24.6.2  yamt 	int error;
   1206  1.24.6.2  yamt 	struct tmpfs_node *node;
   1207  1.24.6.2  yamt 
   1208  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1209  1.24.6.2  yamt 	KASSERT(uio->uio_offset == 0);
   1210  1.24.6.2  yamt 	KASSERT(vp->v_type == VLNK);
   1211  1.24.6.2  yamt 
   1212  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1213  1.24.6.2  yamt 
   1214  1.24.6.2  yamt 	error = uiomove(node->tn_spec.tn_lnk.tn_link,
   1215  1.24.6.2  yamt 	    MIN(node->tn_size, uio->uio_resid), uio);
   1216  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED;
   1217  1.24.6.2  yamt 
   1218  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1219  1.24.6.2  yamt 
   1220  1.24.6.2  yamt 	return error;
   1221  1.24.6.2  yamt }
   1222  1.24.6.2  yamt 
   1223  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1224  1.24.6.2  yamt 
   1225  1.24.6.2  yamt int
   1226  1.24.6.2  yamt tmpfs_inactive(void *v)
   1227  1.24.6.2  yamt {
   1228  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_inactive_args *)v)->a_vp;
   1229  1.24.6.2  yamt 	struct lwp *l = ((struct vop_inactive_args *)v)->a_l;
   1230  1.24.6.2  yamt 
   1231  1.24.6.2  yamt 	struct tmpfs_node *node;
   1232  1.24.6.2  yamt 
   1233  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1234  1.24.6.2  yamt 
   1235  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1236  1.24.6.2  yamt 
   1237  1.24.6.2  yamt 	VOP_UNLOCK(vp, 0);
   1238  1.24.6.2  yamt 
   1239  1.24.6.2  yamt 	if (node->tn_links == 0)
   1240  1.24.6.2  yamt 		vrecycle(vp, NULL, l);
   1241  1.24.6.2  yamt 
   1242  1.24.6.2  yamt 	return 0;
   1243  1.24.6.2  yamt }
   1244  1.24.6.2  yamt 
   1245  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1246  1.24.6.2  yamt 
   1247  1.24.6.2  yamt int
   1248  1.24.6.2  yamt tmpfs_reclaim(void *v)
   1249  1.24.6.2  yamt {
   1250  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_reclaim_args *)v)->a_vp;
   1251  1.24.6.2  yamt 
   1252  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
   1253  1.24.6.2  yamt 	struct tmpfs_node *node;
   1254  1.24.6.2  yamt 
   1255  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
   1256  1.24.6.2  yamt 
   1257  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1258  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(vp->v_mount);
   1259  1.24.6.2  yamt 
   1260  1.24.6.2  yamt 	if (node->tn_links == 0)
   1261  1.24.6.2  yamt 		VN_KNOTE(vp, NOTE_DELETE);
   1262  1.24.6.2  yamt 
   1263  1.24.6.2  yamt 	cache_purge(vp);
   1264  1.24.6.2  yamt 	tmpfs_free_vp(vp);
   1265  1.24.6.2  yamt 
   1266  1.24.6.2  yamt 	/* If the node referenced by this vnode was deleted by the user,
   1267  1.24.6.2  yamt 	 * we must free its associated data structures (now that the vnode
   1268  1.24.6.2  yamt 	 * is being reclaimed). */
   1269  1.24.6.2  yamt 	if (node->tn_links == 0)
   1270  1.24.6.2  yamt 		tmpfs_free_node(tmp, node);
   1271  1.24.6.2  yamt 
   1272  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
   1273  1.24.6.2  yamt 	KASSERT(vp->v_data == NULL);
   1274  1.24.6.2  yamt 
   1275  1.24.6.2  yamt 	return 0;
   1276  1.24.6.2  yamt }
   1277  1.24.6.2  yamt 
   1278  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1279  1.24.6.2  yamt 
   1280  1.24.6.2  yamt int
   1281  1.24.6.2  yamt tmpfs_print(void *v)
   1282  1.24.6.2  yamt {
   1283  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_print_args *)v)->a_vp;
   1284  1.24.6.2  yamt 
   1285  1.24.6.2  yamt 	struct tmpfs_node *node;
   1286  1.24.6.2  yamt 
   1287  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1288  1.24.6.2  yamt 
   1289  1.24.6.2  yamt 	printf("tag VT_TMPFS, tmpfs_node %p, flags 0x%x, links %d\n",
   1290  1.24.6.2  yamt 	    node, node->tn_flags, node->tn_links);
   1291  1.24.6.2  yamt 	printf("\tmode 0%o, owner %d, group %d, size %" PRIdMAX
   1292  1.24.6.2  yamt 	    ", status 0x%x\n",
   1293  1.24.6.2  yamt 	    node->tn_mode, node->tn_uid, node->tn_gid,
   1294  1.24.6.2  yamt 	    (uintmax_t)node->tn_size, node->tn_status);
   1295  1.24.6.2  yamt 
   1296  1.24.6.2  yamt 	if (vp->v_type == VFIFO)
   1297  1.24.6.2  yamt 		fifo_printinfo(vp);
   1298  1.24.6.2  yamt 	lockmgr_printinfo(&vp->v_lock);
   1299  1.24.6.2  yamt 
   1300  1.24.6.2  yamt 	printf("\n");
   1301  1.24.6.2  yamt 
   1302  1.24.6.2  yamt 	return 0;
   1303  1.24.6.2  yamt }
   1304  1.24.6.2  yamt 
   1305  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1306  1.24.6.2  yamt 
   1307  1.24.6.2  yamt int
   1308  1.24.6.2  yamt tmpfs_pathconf(void *v)
   1309  1.24.6.2  yamt {
   1310  1.24.6.2  yamt 	int name = ((struct vop_pathconf_args *)v)->a_name;
   1311  1.24.6.2  yamt 	register_t *retval = ((struct vop_pathconf_args *)v)->a_retval;
   1312  1.24.6.2  yamt 
   1313  1.24.6.2  yamt 	int error;
   1314  1.24.6.2  yamt 
   1315  1.24.6.2  yamt 	error = 0;
   1316  1.24.6.2  yamt 
   1317  1.24.6.2  yamt 	switch (name) {
   1318  1.24.6.2  yamt 	case _PC_LINK_MAX:
   1319  1.24.6.2  yamt 		*retval = LINK_MAX;
   1320  1.24.6.2  yamt 		break;
   1321  1.24.6.2  yamt 
   1322  1.24.6.2  yamt 	case _PC_NAME_MAX:
   1323  1.24.6.2  yamt 		*retval = NAME_MAX;
   1324  1.24.6.2  yamt 		break;
   1325  1.24.6.2  yamt 
   1326  1.24.6.2  yamt 	case _PC_PATH_MAX:
   1327  1.24.6.2  yamt 		*retval = PATH_MAX;
   1328  1.24.6.2  yamt 		break;
   1329  1.24.6.2  yamt 
   1330  1.24.6.2  yamt 	case _PC_PIPE_BUF:
   1331  1.24.6.2  yamt 		*retval = PIPE_BUF;
   1332  1.24.6.2  yamt 		break;
   1333  1.24.6.2  yamt 
   1334  1.24.6.2  yamt 	case _PC_CHOWN_RESTRICTED:
   1335  1.24.6.2  yamt 		*retval = 1;
   1336  1.24.6.2  yamt 		break;
   1337  1.24.6.2  yamt 
   1338  1.24.6.2  yamt 	case _PC_NO_TRUNC:
   1339  1.24.6.2  yamt 		*retval = 1;
   1340  1.24.6.2  yamt 		break;
   1341  1.24.6.2  yamt 
   1342  1.24.6.2  yamt 	case _PC_SYNC_IO:
   1343  1.24.6.2  yamt 		*retval = 1;
   1344  1.24.6.2  yamt 		break;
   1345  1.24.6.2  yamt 
   1346  1.24.6.2  yamt 	case _PC_FILESIZEBITS:
   1347  1.24.6.2  yamt 		*retval = 0; /* XXX Don't know which value should I return. */
   1348  1.24.6.2  yamt 		break;
   1349  1.24.6.2  yamt 
   1350  1.24.6.2  yamt 	default:
   1351  1.24.6.2  yamt 		error = EINVAL;
   1352  1.24.6.2  yamt 	}
   1353  1.24.6.2  yamt 
   1354  1.24.6.2  yamt 	return error;
   1355  1.24.6.2  yamt }
   1356  1.24.6.2  yamt 
   1357  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1358  1.24.6.2  yamt 
   1359  1.24.6.2  yamt int
   1360  1.24.6.2  yamt tmpfs_advlock(void *v)
   1361  1.24.6.2  yamt {
   1362  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_advlock_args *)v)->a_vp;
   1363  1.24.6.2  yamt 
   1364  1.24.6.2  yamt 	struct tmpfs_node *node;
   1365  1.24.6.2  yamt 
   1366  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1367  1.24.6.2  yamt 
   1368  1.24.6.2  yamt 	return lf_advlock(v, &node->tn_lockf, node->tn_size);
   1369  1.24.6.2  yamt }
   1370  1.24.6.2  yamt 
   1371  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1372  1.24.6.2  yamt 
   1373  1.24.6.2  yamt int
   1374  1.24.6.2  yamt tmpfs_getpages(void *v)
   1375  1.24.6.2  yamt {
   1376  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_getpages_args *)v)->a_vp;
   1377  1.24.6.2  yamt 	voff_t offset = ((struct vop_getpages_args *)v)->a_offset;
   1378  1.24.6.2  yamt 	struct vm_page **m = ((struct vop_getpages_args *)v)->a_m;
   1379  1.24.6.2  yamt 	int *count = ((struct vop_getpages_args *)v)->a_count;
   1380  1.24.6.2  yamt 	int centeridx = ((struct vop_getpages_args *)v)->a_centeridx;
   1381  1.24.6.2  yamt 	vm_prot_t access_type = ((struct vop_getpages_args *)v)->a_access_type;
   1382  1.24.6.2  yamt 	int advice = ((struct vop_getpages_args *)v)->a_advice;
   1383  1.24.6.2  yamt 	int flags = ((struct vop_getpages_args *)v)->a_flags;
   1384  1.24.6.2  yamt 
   1385  1.24.6.2  yamt 	int error;
   1386  1.24.6.2  yamt 	struct tmpfs_node *node;
   1387  1.24.6.2  yamt 	struct uvm_object *uobj;
   1388  1.24.6.2  yamt 	int npages = *count;
   1389  1.24.6.2  yamt 
   1390  1.24.6.2  yamt 	KASSERT(vp->v_type == VREG);
   1391  1.24.6.2  yamt 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1392  1.24.6.2  yamt 
   1393  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1394  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
   1395  1.24.6.2  yamt 
   1396  1.24.6.2  yamt 	/* We currently don't rely on PGO_PASTEOF. */
   1397  1.24.6.2  yamt 
   1398  1.24.6.2  yamt 	if (vp->v_size <= offset + (centeridx << PAGE_SHIFT)) {
   1399  1.24.6.2  yamt 		if ((flags & PGO_LOCKED) == 0)
   1400  1.24.6.2  yamt 			simple_unlock(&vp->v_interlock);
   1401  1.24.6.2  yamt 		return EINVAL;
   1402  1.24.6.2  yamt 	}
   1403  1.24.6.2  yamt 
   1404  1.24.6.2  yamt 	if (vp->v_size < offset + (npages << PAGE_SHIFT)) {
   1405  1.24.6.2  yamt 		npages = (round_page(vp->v_size) - offset) >> PAGE_SHIFT;
   1406  1.24.6.2  yamt 	}
   1407  1.24.6.2  yamt 
   1408  1.24.6.2  yamt 	if ((flags & PGO_LOCKED) != 0)
   1409  1.24.6.2  yamt 		return EBUSY;
   1410  1.24.6.2  yamt 
   1411  1.24.6.2  yamt 	if ((flags & PGO_NOTIMESTAMP) == 0) {
   1412  1.24.6.2  yamt 		if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
   1413  1.24.6.2  yamt 			node->tn_status |= TMPFS_NODE_ACCESSED;
   1414  1.24.6.2  yamt 
   1415  1.24.6.2  yamt 		if ((access_type & VM_PROT_WRITE) != 0)
   1416  1.24.6.2  yamt 			node->tn_status |= TMPFS_NODE_MODIFIED;
   1417  1.24.6.2  yamt 	}
   1418  1.24.6.2  yamt 
   1419  1.24.6.2  yamt 	simple_unlock(&vp->v_interlock);
   1420  1.24.6.2  yamt 
   1421  1.24.6.2  yamt 	simple_lock(&uobj->vmobjlock);
   1422  1.24.6.2  yamt 	error = (*uobj->pgops->pgo_get)(uobj, offset, m, &npages, centeridx,
   1423  1.24.6.2  yamt 	    access_type, advice, flags);
   1424  1.24.6.2  yamt 
   1425  1.24.6.2  yamt 	return error;
   1426  1.24.6.2  yamt }
   1427  1.24.6.2  yamt 
   1428  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1429  1.24.6.2  yamt 
   1430  1.24.6.2  yamt int
   1431  1.24.6.2  yamt tmpfs_putpages(void *v)
   1432  1.24.6.2  yamt {
   1433  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_putpages_args *)v)->a_vp;
   1434  1.24.6.2  yamt 	voff_t offlo = ((struct vop_putpages_args *)v)->a_offlo;
   1435  1.24.6.2  yamt 	voff_t offhi = ((struct vop_putpages_args *)v)->a_offhi;
   1436  1.24.6.2  yamt 	int flags = ((struct vop_putpages_args *)v)->a_flags;
   1437  1.24.6.2  yamt 
   1438  1.24.6.2  yamt 	int error;
   1439  1.24.6.2  yamt 	struct tmpfs_node *node;
   1440  1.24.6.2  yamt 	struct uvm_object *uobj;
   1441  1.24.6.2  yamt 
   1442  1.24.6.2  yamt 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1443  1.24.6.2  yamt 
   1444  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1445  1.24.6.2  yamt 
   1446  1.24.6.2  yamt 	if (vp->v_type != VREG) {
   1447  1.24.6.2  yamt 		simple_unlock(&vp->v_interlock);
   1448  1.24.6.2  yamt 		return 0;
   1449  1.24.6.2  yamt 	}
   1450  1.24.6.2  yamt 
   1451  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
   1452  1.24.6.2  yamt 	simple_unlock(&vp->v_interlock);
   1453  1.24.6.2  yamt 
   1454  1.24.6.2  yamt 	simple_lock(&uobj->vmobjlock);
   1455  1.24.6.2  yamt 	error = (*uobj->pgops->pgo_put)(uobj, offlo, offhi, flags);
   1456  1.24.6.2  yamt 
   1457  1.24.6.2  yamt 	/* XXX mtime */
   1458  1.24.6.2  yamt 
   1459  1.24.6.2  yamt 	return error;
   1460  1.24.6.2  yamt }
   1461