Home | History | Annotate | Line # | Download | only in tmpfs
tmpfs_vnops.c revision 1.24.6.3
      1  1.24.6.3  yamt /*	$NetBSD: tmpfs_vnops.c,v 1.24.6.3 2006/12/30 20:50:01 yamt Exp $	*/
      2  1.24.6.2  yamt 
      3  1.24.6.2  yamt /*
      4  1.24.6.2  yamt  * Copyright (c) 2005, 2006 The NetBSD Foundation, Inc.
      5  1.24.6.2  yamt  * All rights reserved.
      6  1.24.6.2  yamt  *
      7  1.24.6.2  yamt  * This code is derived from software contributed to The NetBSD Foundation
      8  1.24.6.2  yamt  * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
      9  1.24.6.2  yamt  * 2005 program.
     10  1.24.6.2  yamt  *
     11  1.24.6.2  yamt  * Redistribution and use in source and binary forms, with or without
     12  1.24.6.2  yamt  * modification, are permitted provided that the following conditions
     13  1.24.6.2  yamt  * are met:
     14  1.24.6.2  yamt  * 1. Redistributions of source code must retain the above copyright
     15  1.24.6.2  yamt  *    notice, this list of conditions and the following disclaimer.
     16  1.24.6.2  yamt  * 2. Redistributions in binary form must reproduce the above copyright
     17  1.24.6.2  yamt  *    notice, this list of conditions and the following disclaimer in the
     18  1.24.6.2  yamt  *    documentation and/or other materials provided with the distribution.
     19  1.24.6.2  yamt  * 3. All advertising materials mentioning features or use of this software
     20  1.24.6.2  yamt  *    must display the following acknowledgement:
     21  1.24.6.2  yamt  *        This product includes software developed by the NetBSD
     22  1.24.6.2  yamt  *        Foundation, Inc. and its contributors.
     23  1.24.6.2  yamt  * 4. Neither the name of The NetBSD Foundation nor the names of its
     24  1.24.6.2  yamt  *    contributors may be used to endorse or promote products derived
     25  1.24.6.2  yamt  *    from this software without specific prior written permission.
     26  1.24.6.2  yamt  *
     27  1.24.6.2  yamt  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     28  1.24.6.2  yamt  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     29  1.24.6.2  yamt  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     30  1.24.6.2  yamt  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     31  1.24.6.2  yamt  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     32  1.24.6.2  yamt  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     33  1.24.6.2  yamt  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     34  1.24.6.2  yamt  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     35  1.24.6.2  yamt  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     36  1.24.6.2  yamt  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     37  1.24.6.2  yamt  * POSSIBILITY OF SUCH DAMAGE.
     38  1.24.6.2  yamt  */
     39  1.24.6.2  yamt 
     40  1.24.6.2  yamt /*
     41  1.24.6.2  yamt  * tmpfs vnode interface.
     42  1.24.6.2  yamt  */
     43  1.24.6.2  yamt 
     44  1.24.6.2  yamt #include <sys/cdefs.h>
     45  1.24.6.3  yamt __KERNEL_RCSID(0, "$NetBSD: tmpfs_vnops.c,v 1.24.6.3 2006/12/30 20:50:01 yamt Exp $");
     46  1.24.6.2  yamt 
     47  1.24.6.2  yamt #include <sys/param.h>
     48  1.24.6.2  yamt #include <sys/dirent.h>
     49  1.24.6.2  yamt #include <sys/fcntl.h>
     50  1.24.6.2  yamt #include <sys/event.h>
     51  1.24.6.2  yamt #include <sys/malloc.h>
     52  1.24.6.2  yamt #include <sys/namei.h>
     53  1.24.6.2  yamt #include <sys/proc.h>
     54  1.24.6.2  yamt #include <sys/stat.h>
     55  1.24.6.2  yamt #include <sys/uio.h>
     56  1.24.6.2  yamt #include <sys/unistd.h>
     57  1.24.6.2  yamt #include <sys/vnode.h>
     58  1.24.6.2  yamt #include <sys/lockf.h>
     59  1.24.6.2  yamt #include <sys/kauth.h>
     60  1.24.6.2  yamt 
     61  1.24.6.2  yamt #include <uvm/uvm.h>
     62  1.24.6.2  yamt 
     63  1.24.6.2  yamt #include <miscfs/fifofs/fifo.h>
     64  1.24.6.2  yamt #include <fs/tmpfs/tmpfs_vnops.h>
     65  1.24.6.2  yamt #include <fs/tmpfs/tmpfs.h>
     66  1.24.6.2  yamt 
     67  1.24.6.2  yamt /* --------------------------------------------------------------------- */
     68  1.24.6.2  yamt 
     69  1.24.6.2  yamt /*
     70  1.24.6.2  yamt  * vnode operations vector used for files stored in a tmpfs file system.
     71  1.24.6.2  yamt  */
     72  1.24.6.2  yamt int (**tmpfs_vnodeop_p)(void *);
     73  1.24.6.2  yamt const struct vnodeopv_entry_desc tmpfs_vnodeop_entries[] = {
     74  1.24.6.2  yamt 	{ &vop_default_desc,		vn_default_error },
     75  1.24.6.2  yamt 	{ &vop_lookup_desc,		tmpfs_lookup },
     76  1.24.6.2  yamt 	{ &vop_create_desc,		tmpfs_create },
     77  1.24.6.2  yamt 	{ &vop_mknod_desc,		tmpfs_mknod },
     78  1.24.6.2  yamt 	{ &vop_open_desc,		tmpfs_open },
     79  1.24.6.2  yamt 	{ &vop_close_desc,		tmpfs_close },
     80  1.24.6.2  yamt 	{ &vop_access_desc,		tmpfs_access },
     81  1.24.6.2  yamt 	{ &vop_getattr_desc,		tmpfs_getattr },
     82  1.24.6.2  yamt 	{ &vop_setattr_desc,		tmpfs_setattr },
     83  1.24.6.2  yamt 	{ &vop_read_desc,		tmpfs_read },
     84  1.24.6.2  yamt 	{ &vop_write_desc,		tmpfs_write },
     85  1.24.6.2  yamt 	{ &vop_ioctl_desc,		tmpfs_ioctl },
     86  1.24.6.2  yamt 	{ &vop_fcntl_desc,		tmpfs_fcntl },
     87  1.24.6.2  yamt 	{ &vop_poll_desc,		tmpfs_poll },
     88  1.24.6.2  yamt 	{ &vop_kqfilter_desc,		tmpfs_kqfilter },
     89  1.24.6.2  yamt 	{ &vop_revoke_desc,		tmpfs_revoke },
     90  1.24.6.2  yamt 	{ &vop_mmap_desc,		tmpfs_mmap },
     91  1.24.6.2  yamt 	{ &vop_fsync_desc,		tmpfs_fsync },
     92  1.24.6.2  yamt 	{ &vop_seek_desc,		tmpfs_seek },
     93  1.24.6.2  yamt 	{ &vop_remove_desc,		tmpfs_remove },
     94  1.24.6.2  yamt 	{ &vop_link_desc,		tmpfs_link },
     95  1.24.6.2  yamt 	{ &vop_rename_desc,		tmpfs_rename },
     96  1.24.6.2  yamt 	{ &vop_mkdir_desc,		tmpfs_mkdir },
     97  1.24.6.2  yamt 	{ &vop_rmdir_desc,		tmpfs_rmdir },
     98  1.24.6.2  yamt 	{ &vop_symlink_desc,		tmpfs_symlink },
     99  1.24.6.2  yamt 	{ &vop_readdir_desc,		tmpfs_readdir },
    100  1.24.6.2  yamt 	{ &vop_readlink_desc,		tmpfs_readlink },
    101  1.24.6.2  yamt 	{ &vop_abortop_desc,		tmpfs_abortop },
    102  1.24.6.2  yamt 	{ &vop_inactive_desc,		tmpfs_inactive },
    103  1.24.6.2  yamt 	{ &vop_reclaim_desc,		tmpfs_reclaim },
    104  1.24.6.2  yamt 	{ &vop_lock_desc,		tmpfs_lock },
    105  1.24.6.2  yamt 	{ &vop_unlock_desc,		tmpfs_unlock },
    106  1.24.6.2  yamt 	{ &vop_bmap_desc,		tmpfs_bmap },
    107  1.24.6.2  yamt 	{ &vop_strategy_desc,		tmpfs_strategy },
    108  1.24.6.2  yamt 	{ &vop_print_desc,		tmpfs_print },
    109  1.24.6.2  yamt 	{ &vop_pathconf_desc,		tmpfs_pathconf },
    110  1.24.6.2  yamt 	{ &vop_islocked_desc,		tmpfs_islocked },
    111  1.24.6.2  yamt 	{ &vop_advlock_desc,		tmpfs_advlock },
    112  1.24.6.2  yamt 	{ &vop_lease_desc,		tmpfs_lease },
    113  1.24.6.2  yamt 	{ &vop_bwrite_desc,		tmpfs_bwrite },
    114  1.24.6.2  yamt 	{ &vop_getpages_desc,		tmpfs_getpages },
    115  1.24.6.2  yamt 	{ &vop_putpages_desc,		tmpfs_putpages },
    116  1.24.6.2  yamt 	{ NULL, NULL }
    117  1.24.6.2  yamt };
    118  1.24.6.2  yamt const struct vnodeopv_desc tmpfs_vnodeop_opv_desc =
    119  1.24.6.2  yamt 	{ &tmpfs_vnodeop_p, tmpfs_vnodeop_entries };
    120  1.24.6.2  yamt 
    121  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    122  1.24.6.2  yamt 
    123  1.24.6.2  yamt int
    124  1.24.6.2  yamt tmpfs_lookup(void *v)
    125  1.24.6.2  yamt {
    126  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_lookup_args *)v)->a_dvp;
    127  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_lookup_args *)v)->a_vpp;
    128  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_lookup_args *)v)->a_cnp;
    129  1.24.6.2  yamt 
    130  1.24.6.2  yamt 	int error;
    131  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    132  1.24.6.2  yamt 	struct tmpfs_node *dnode;
    133  1.24.6.2  yamt 
    134  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
    135  1.24.6.2  yamt 
    136  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
    137  1.24.6.2  yamt 	*vpp = NULL;
    138  1.24.6.2  yamt 
    139  1.24.6.2  yamt 	/* Check accessibility of requested node as a first step. */
    140  1.24.6.2  yamt 	error = VOP_ACCESS(dvp, VEXEC, cnp->cn_cred, cnp->cn_lwp);
    141  1.24.6.2  yamt 	if (error != 0)
    142  1.24.6.2  yamt 		goto out;
    143  1.24.6.2  yamt 
    144  1.24.6.2  yamt 	/* If requesting the last path component on a read-only file system
    145  1.24.6.2  yamt 	 * with a write operation, deny it. */
    146  1.24.6.2  yamt 	if ((cnp->cn_flags & ISLASTCN) &&
    147  1.24.6.2  yamt 	    (dvp->v_mount->mnt_flag & MNT_RDONLY) &&
    148  1.24.6.2  yamt 	    (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME)) {
    149  1.24.6.2  yamt 		error = EROFS;
    150  1.24.6.2  yamt 		goto out;
    151  1.24.6.2  yamt 	}
    152  1.24.6.2  yamt 
    153  1.24.6.2  yamt 	/* Avoid doing a linear scan of the directory if the requested
    154  1.24.6.2  yamt 	 * directory/name couple is already in the cache. */
    155  1.24.6.2  yamt 	error = cache_lookup(dvp, vpp, cnp);
    156  1.24.6.2  yamt 	if (error >= 0)
    157  1.24.6.2  yamt 		goto out;
    158  1.24.6.2  yamt 
    159  1.24.6.2  yamt 	/* We cannot be requesting the parent directory of the root node. */
    160  1.24.6.2  yamt 	KASSERT(IMPLIES(dnode->tn_type == VDIR &&
    161  1.24.6.2  yamt 	    dnode->tn_spec.tn_dir.tn_parent == dnode,
    162  1.24.6.2  yamt 	    !(cnp->cn_flags & ISDOTDOT)));
    163  1.24.6.2  yamt 
    164  1.24.6.2  yamt 	if (cnp->cn_flags & ISDOTDOT) {
    165  1.24.6.2  yamt 		VOP_UNLOCK(dvp, 0);
    166  1.24.6.2  yamt 
    167  1.24.6.2  yamt 		/* Allocate a new vnode on the matching entry. */
    168  1.24.6.2  yamt 		error = tmpfs_alloc_vp(dvp->v_mount,
    169  1.24.6.2  yamt 		    dnode->tn_spec.tn_dir.tn_parent, vpp);
    170  1.24.6.2  yamt 
    171  1.24.6.3  yamt 		vn_lock(dvp, LK_EXCLUSIVE | LK_RETRY);
    172  1.24.6.2  yamt 		dnode->tn_spec.tn_dir.tn_parent->tn_lookup_dirent = NULL;
    173  1.24.6.2  yamt 	} else if (cnp->cn_namelen == 1 && cnp->cn_nameptr[0] == '.') {
    174  1.24.6.2  yamt 		VREF(dvp);
    175  1.24.6.2  yamt 		*vpp = dvp;
    176  1.24.6.2  yamt 		dnode->tn_lookup_dirent = NULL;
    177  1.24.6.2  yamt 		error = 0;
    178  1.24.6.2  yamt 	} else {
    179  1.24.6.2  yamt 		de = tmpfs_dir_lookup(dnode, cnp);
    180  1.24.6.2  yamt 		if (de == NULL) {
    181  1.24.6.2  yamt 			/* The entry was not found in the directory.
    182  1.24.6.2  yamt 			 * This is OK iff we are creating or renaming an
    183  1.24.6.2  yamt 			 * entry and are working on the last component of
    184  1.24.6.2  yamt 			 * the path name. */
    185  1.24.6.2  yamt 			if ((cnp->cn_flags & ISLASTCN) &&
    186  1.24.6.2  yamt 			    (cnp->cn_nameiop == CREATE || \
    187  1.24.6.2  yamt 			    cnp->cn_nameiop == RENAME)) {
    188  1.24.6.2  yamt 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    189  1.24.6.2  yamt 				    cnp->cn_lwp);
    190  1.24.6.2  yamt 				if (error != 0)
    191  1.24.6.2  yamt 					goto out;
    192  1.24.6.2  yamt 
    193  1.24.6.2  yamt 				/* Keep the component name in the buffer for
    194  1.24.6.2  yamt 				 * future uses. */
    195  1.24.6.2  yamt 				cnp->cn_flags |= SAVENAME;
    196  1.24.6.2  yamt 
    197  1.24.6.2  yamt 				error = EJUSTRETURN;
    198  1.24.6.2  yamt 			} else
    199  1.24.6.2  yamt 				error = ENOENT;
    200  1.24.6.2  yamt 		} else {
    201  1.24.6.2  yamt 			struct tmpfs_node *tnode;
    202  1.24.6.2  yamt 
    203  1.24.6.2  yamt 			/* The entry was found, so get its associated
    204  1.24.6.2  yamt 			 * tmpfs_node. */
    205  1.24.6.2  yamt 			tnode = de->td_node;
    206  1.24.6.2  yamt 
    207  1.24.6.2  yamt 			/* If we are not at the last path component and
    208  1.24.6.2  yamt 			 * found a non-directory or non-link entry (which
    209  1.24.6.2  yamt 			 * may itself be pointing to a directory), raise
    210  1.24.6.2  yamt 			 * an error. */
    211  1.24.6.2  yamt 			if ((tnode->tn_type != VDIR &&
    212  1.24.6.2  yamt 			    tnode->tn_type != VLNK) &&
    213  1.24.6.2  yamt 			    !(cnp->cn_flags & ISLASTCN)) {
    214  1.24.6.2  yamt 				error = ENOTDIR;
    215  1.24.6.2  yamt 				goto out;
    216  1.24.6.2  yamt 			}
    217  1.24.6.2  yamt 
    218  1.24.6.2  yamt 			/* If we are deleting or renaming the entry, keep
    219  1.24.6.2  yamt 			 * track of its tmpfs_dirent so that it can be
    220  1.24.6.2  yamt 			 * easily deleted later. */
    221  1.24.6.2  yamt 			if ((cnp->cn_flags & ISLASTCN) &&
    222  1.24.6.2  yamt 			    (cnp->cn_nameiop == DELETE ||
    223  1.24.6.2  yamt 			    cnp->cn_nameiop == RENAME)) {
    224  1.24.6.2  yamt 				if ((dnode->tn_mode & S_ISTXT) != 0 &&
    225  1.24.6.2  yamt 				    kauth_cred_geteuid(cnp->cn_cred) != 0 &&
    226  1.24.6.2  yamt 				    kauth_cred_geteuid(cnp->cn_cred) != dnode->tn_uid &&
    227  1.24.6.2  yamt 				    kauth_cred_geteuid(cnp->cn_cred) != tnode->tn_uid)
    228  1.24.6.2  yamt 					return EPERM;
    229  1.24.6.2  yamt 				error = VOP_ACCESS(dvp, VWRITE, cnp->cn_cred,
    230  1.24.6.2  yamt 				    cnp->cn_lwp);
    231  1.24.6.2  yamt 				if (error != 0)
    232  1.24.6.2  yamt 					goto out;
    233  1.24.6.2  yamt 				tnode->tn_lookup_dirent = de;
    234  1.24.6.2  yamt 			}
    235  1.24.6.2  yamt 
    236  1.24.6.2  yamt 			/* Allocate a new vnode on the matching entry. */
    237  1.24.6.2  yamt 			error = tmpfs_alloc_vp(dvp->v_mount, tnode, vpp);
    238  1.24.6.2  yamt 		}
    239  1.24.6.2  yamt 	}
    240  1.24.6.2  yamt 
    241  1.24.6.2  yamt 	/* Store the result of this lookup in the cache.  Avoid this if the
    242  1.24.6.2  yamt 	 * request was for creation, as it does not improve timings on
    243  1.24.6.2  yamt 	 * emprical tests. */
    244  1.24.6.2  yamt 	if ((cnp->cn_flags & MAKEENTRY) && cnp->cn_nameiop != CREATE)
    245  1.24.6.2  yamt 		cache_enter(dvp, *vpp, cnp);
    246  1.24.6.2  yamt 
    247  1.24.6.2  yamt out:
    248  1.24.6.2  yamt 	/* If there were no errors, *vpp cannot be null and it must be
    249  1.24.6.2  yamt 	 * locked. */
    250  1.24.6.2  yamt 	KASSERT(IFF(error == 0, *vpp != NULL && VOP_ISLOCKED(*vpp)));
    251  1.24.6.2  yamt 
    252  1.24.6.3  yamt 	/* dvp must always be locked. */
    253  1.24.6.3  yamt 	KASSERT(VOP_ISLOCKED(dvp));
    254  1.24.6.2  yamt 
    255  1.24.6.2  yamt 	return error;
    256  1.24.6.2  yamt }
    257  1.24.6.2  yamt 
    258  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    259  1.24.6.2  yamt 
    260  1.24.6.2  yamt int
    261  1.24.6.2  yamt tmpfs_create(void *v)
    262  1.24.6.2  yamt {
    263  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_create_args *)v)->a_dvp;
    264  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_create_args *)v)->a_vpp;
    265  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_create_args *)v)->a_cnp;
    266  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_create_args *)v)->a_vap;
    267  1.24.6.2  yamt 
    268  1.24.6.2  yamt 	KASSERT(vap->va_type == VREG || vap->va_type == VSOCK);
    269  1.24.6.2  yamt 
    270  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    271  1.24.6.2  yamt }
    272  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    273  1.24.6.2  yamt 
    274  1.24.6.2  yamt int
    275  1.24.6.2  yamt tmpfs_mknod(void *v)
    276  1.24.6.2  yamt {
    277  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_mknod_args *)v)->a_dvp;
    278  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_mknod_args *)v)->a_vpp;
    279  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_mknod_args *)v)->a_cnp;
    280  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_mknod_args *)v)->a_vap;
    281  1.24.6.2  yamt 
    282  1.24.6.2  yamt 	if (vap->va_type != VBLK && vap->va_type != VCHR &&
    283  1.24.6.2  yamt 	    vap->va_type != VFIFO)
    284  1.24.6.2  yamt 		return EINVAL;
    285  1.24.6.2  yamt 
    286  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    287  1.24.6.2  yamt }
    288  1.24.6.2  yamt 
    289  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    290  1.24.6.2  yamt 
    291  1.24.6.2  yamt int
    292  1.24.6.2  yamt tmpfs_open(void *v)
    293  1.24.6.2  yamt {
    294  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_open_args *)v)->a_vp;
    295  1.24.6.2  yamt 	int mode = ((struct vop_open_args *)v)->a_mode;
    296  1.24.6.2  yamt 
    297  1.24.6.2  yamt 	int error;
    298  1.24.6.2  yamt 	struct tmpfs_node *node;
    299  1.24.6.2  yamt 
    300  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    301  1.24.6.2  yamt 
    302  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    303  1.24.6.3  yamt 
    304  1.24.6.3  yamt 	/* The file is still active but all its names have been removed
    305  1.24.6.3  yamt 	 * (e.g. by a "rmdir $(pwd)").  It cannot be opened any more as
    306  1.24.6.3  yamt 	 * it is about to die. */
    307  1.24.6.3  yamt 	if (node->tn_links < 1) {
    308  1.24.6.3  yamt 		error = ENOENT;
    309  1.24.6.3  yamt 		goto out;
    310  1.24.6.3  yamt 	}
    311  1.24.6.2  yamt 
    312  1.24.6.2  yamt 	/* If the file is marked append-only, deny write requests. */
    313  1.24.6.2  yamt 	if (node->tn_flags & APPEND && (mode & (FWRITE | O_APPEND)) == FWRITE)
    314  1.24.6.2  yamt 		error = EPERM;
    315  1.24.6.2  yamt 	else
    316  1.24.6.2  yamt 		error = 0;
    317  1.24.6.2  yamt 
    318  1.24.6.3  yamt out:
    319  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    320  1.24.6.2  yamt 
    321  1.24.6.2  yamt 	return error;
    322  1.24.6.2  yamt }
    323  1.24.6.2  yamt 
    324  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    325  1.24.6.2  yamt 
    326  1.24.6.2  yamt int
    327  1.24.6.2  yamt tmpfs_close(void *v)
    328  1.24.6.2  yamt {
    329  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_close_args *)v)->a_vp;
    330  1.24.6.2  yamt 
    331  1.24.6.2  yamt 	struct tmpfs_node *node;
    332  1.24.6.2  yamt 
    333  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    334  1.24.6.2  yamt 
    335  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    336  1.24.6.2  yamt 
    337  1.24.6.2  yamt 	if (node->tn_links > 0) {
    338  1.24.6.2  yamt 		/* Update node times.  No need to do it if the node has
    339  1.24.6.2  yamt 		 * been deleted, because it will vanish after we return. */
    340  1.24.6.2  yamt 		tmpfs_update(vp, NULL, NULL, UPDATE_CLOSE);
    341  1.24.6.2  yamt 	}
    342  1.24.6.2  yamt 
    343  1.24.6.2  yamt 	return 0;
    344  1.24.6.2  yamt }
    345  1.24.6.2  yamt 
    346  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    347  1.24.6.2  yamt 
    348  1.24.6.2  yamt int
    349  1.24.6.2  yamt tmpfs_access(void *v)
    350  1.24.6.2  yamt {
    351  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_access_args *)v)->a_vp;
    352  1.24.6.2  yamt 	int mode = ((struct vop_access_args *)v)->a_mode;
    353  1.24.6.2  yamt 	kauth_cred_t cred = ((struct vop_access_args *)v)->a_cred;
    354  1.24.6.2  yamt 
    355  1.24.6.2  yamt 	int error;
    356  1.24.6.2  yamt 	struct tmpfs_node *node;
    357  1.24.6.2  yamt 
    358  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    359  1.24.6.2  yamt 
    360  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    361  1.24.6.2  yamt 
    362  1.24.6.2  yamt 	switch (vp->v_type) {
    363  1.24.6.2  yamt 	case VDIR:
    364  1.24.6.2  yamt 		/* FALLTHROUGH */
    365  1.24.6.2  yamt 	case VLNK:
    366  1.24.6.2  yamt 		/* FALLTHROUGH */
    367  1.24.6.2  yamt 	case VREG:
    368  1.24.6.2  yamt 		if (mode & VWRITE && vp->v_mount->mnt_flag & MNT_RDONLY) {
    369  1.24.6.2  yamt 			error = EROFS;
    370  1.24.6.2  yamt 			goto out;
    371  1.24.6.2  yamt 		}
    372  1.24.6.2  yamt 		break;
    373  1.24.6.2  yamt 
    374  1.24.6.2  yamt 	case VBLK:
    375  1.24.6.2  yamt 		/* FALLTHROUGH */
    376  1.24.6.2  yamt 	case VCHR:
    377  1.24.6.2  yamt 		/* FALLTHROUGH */
    378  1.24.6.2  yamt 	case VSOCK:
    379  1.24.6.2  yamt 		/* FALLTHROUGH */
    380  1.24.6.2  yamt 	case VFIFO:
    381  1.24.6.2  yamt 		break;
    382  1.24.6.2  yamt 
    383  1.24.6.2  yamt 	default:
    384  1.24.6.2  yamt 		error = EINVAL;
    385  1.24.6.2  yamt 		goto out;
    386  1.24.6.2  yamt 	}
    387  1.24.6.2  yamt 
    388  1.24.6.2  yamt 	if (mode & VWRITE && node->tn_flags & IMMUTABLE) {
    389  1.24.6.2  yamt 		error = EPERM;
    390  1.24.6.2  yamt 		goto out;
    391  1.24.6.2  yamt 	}
    392  1.24.6.2  yamt 
    393  1.24.6.2  yamt 	error = vaccess(vp->v_type, node->tn_mode, node->tn_uid,
    394  1.24.6.2  yamt 	    node->tn_gid, mode, cred);
    395  1.24.6.2  yamt 
    396  1.24.6.2  yamt out:
    397  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    398  1.24.6.2  yamt 
    399  1.24.6.2  yamt 	return error;
    400  1.24.6.2  yamt }
    401  1.24.6.2  yamt 
    402  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    403  1.24.6.2  yamt 
    404  1.24.6.2  yamt int
    405  1.24.6.2  yamt tmpfs_getattr(void *v)
    406  1.24.6.2  yamt {
    407  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_getattr_args *)v)->a_vp;
    408  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_getattr_args *)v)->a_vap;
    409  1.24.6.2  yamt 
    410  1.24.6.2  yamt 	struct tmpfs_node *node;
    411  1.24.6.2  yamt 
    412  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    413  1.24.6.2  yamt 
    414  1.24.6.2  yamt 	VATTR_NULL(vap);
    415  1.24.6.2  yamt 
    416  1.24.6.2  yamt 	tmpfs_itimes(vp, NULL, NULL);
    417  1.24.6.2  yamt 
    418  1.24.6.2  yamt 	vap->va_type = vp->v_type;
    419  1.24.6.2  yamt 	vap->va_mode = node->tn_mode;
    420  1.24.6.2  yamt 	vap->va_nlink = node->tn_links;
    421  1.24.6.2  yamt 	vap->va_uid = node->tn_uid;
    422  1.24.6.2  yamt 	vap->va_gid = node->tn_gid;
    423  1.24.6.2  yamt 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsidx.__fsid_val[0];
    424  1.24.6.2  yamt 	vap->va_fileid = node->tn_id;
    425  1.24.6.2  yamt 	vap->va_size = node->tn_size;
    426  1.24.6.2  yamt 	vap->va_blocksize = PAGE_SIZE;
    427  1.24.6.2  yamt 	vap->va_atime = node->tn_atime;
    428  1.24.6.2  yamt 	vap->va_mtime = node->tn_mtime;
    429  1.24.6.2  yamt 	vap->va_ctime = node->tn_ctime;
    430  1.24.6.2  yamt 	vap->va_birthtime = node->tn_birthtime;
    431  1.24.6.2  yamt 	vap->va_gen = node->tn_gen;
    432  1.24.6.2  yamt 	vap->va_flags = node->tn_flags;
    433  1.24.6.2  yamt 	vap->va_rdev = (vp->v_type == VBLK || vp->v_type == VCHR) ?
    434  1.24.6.2  yamt 		node->tn_spec.tn_dev.tn_rdev : VNOVAL;
    435  1.24.6.2  yamt 	vap->va_bytes = round_page(node->tn_size);
    436  1.24.6.2  yamt 	vap->va_filerev = VNOVAL;
    437  1.24.6.2  yamt 	vap->va_vaflags = 0;
    438  1.24.6.2  yamt 	vap->va_spare = VNOVAL; /* XXX */
    439  1.24.6.2  yamt 
    440  1.24.6.2  yamt 	return 0;
    441  1.24.6.2  yamt }
    442  1.24.6.2  yamt 
    443  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    444  1.24.6.2  yamt 
    445  1.24.6.2  yamt /* XXX Should this operation be atomic?  I think it should, but code in
    446  1.24.6.2  yamt  * XXX other places (e.g., ufs) doesn't seem to be... */
    447  1.24.6.2  yamt int
    448  1.24.6.2  yamt tmpfs_setattr(void *v)
    449  1.24.6.2  yamt {
    450  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_setattr_args *)v)->a_vp;
    451  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_setattr_args *)v)->a_vap;
    452  1.24.6.2  yamt 	kauth_cred_t cred = ((struct vop_setattr_args *)v)->a_cred;
    453  1.24.6.2  yamt 	struct lwp *l = ((struct vop_setattr_args *)v)->a_l;
    454  1.24.6.2  yamt 
    455  1.24.6.2  yamt 	int error;
    456  1.24.6.2  yamt 
    457  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    458  1.24.6.2  yamt 
    459  1.24.6.2  yamt 	error = 0;
    460  1.24.6.2  yamt 
    461  1.24.6.2  yamt 	/* Abort if any unsettable attribute is given. */
    462  1.24.6.2  yamt 	if (vap->va_type != VNON ||
    463  1.24.6.2  yamt 	    vap->va_nlink != VNOVAL ||
    464  1.24.6.2  yamt 	    vap->va_fsid != VNOVAL ||
    465  1.24.6.2  yamt 	    vap->va_fileid != VNOVAL ||
    466  1.24.6.2  yamt 	    vap->va_blocksize != VNOVAL ||
    467  1.24.6.2  yamt 	    vap->va_ctime.tv_sec != VNOVAL ||
    468  1.24.6.2  yamt 	    vap->va_ctime.tv_nsec != VNOVAL ||
    469  1.24.6.2  yamt 	    vap->va_birthtime.tv_sec != VNOVAL ||
    470  1.24.6.2  yamt 	    vap->va_birthtime.tv_nsec != VNOVAL ||
    471  1.24.6.2  yamt 	    vap->va_gen != VNOVAL ||
    472  1.24.6.2  yamt 	    vap->va_rdev != VNOVAL ||
    473  1.24.6.2  yamt 	    vap->va_bytes != VNOVAL)
    474  1.24.6.2  yamt 		error = EINVAL;
    475  1.24.6.2  yamt 
    476  1.24.6.2  yamt 	if (error == 0 && (vap->va_flags != VNOVAL))
    477  1.24.6.3  yamt 		error = tmpfs_chflags(vp, vap->va_flags, cred, l);
    478  1.24.6.2  yamt 
    479  1.24.6.2  yamt 	if (error == 0 && (vap->va_size != VNOVAL))
    480  1.24.6.3  yamt 		error = tmpfs_chsize(vp, vap->va_size, cred, l);
    481  1.24.6.2  yamt 
    482  1.24.6.2  yamt 	if (error == 0 && (vap->va_uid != VNOVAL || vap->va_gid != VNOVAL))
    483  1.24.6.3  yamt 		error = tmpfs_chown(vp, vap->va_uid, vap->va_gid, cred, l);
    484  1.24.6.2  yamt 
    485  1.24.6.2  yamt 	if (error == 0 && (vap->va_mode != VNOVAL))
    486  1.24.6.3  yamt 		error = tmpfs_chmod(vp, vap->va_mode, cred, l);
    487  1.24.6.2  yamt 
    488  1.24.6.2  yamt 	if (error == 0 && ((vap->va_atime.tv_sec != VNOVAL &&
    489  1.24.6.2  yamt 	    vap->va_atime.tv_nsec != VNOVAL) ||
    490  1.24.6.2  yamt 	    (vap->va_mtime.tv_sec != VNOVAL &&
    491  1.24.6.2  yamt 	    vap->va_mtime.tv_nsec != VNOVAL)))
    492  1.24.6.2  yamt 		error = tmpfs_chtimes(vp, &vap->va_atime, &vap->va_mtime,
    493  1.24.6.2  yamt 		    vap->va_vaflags, cred, l);
    494  1.24.6.2  yamt 
    495  1.24.6.2  yamt 	/* Update the node times.  We give preference to the error codes
    496  1.24.6.2  yamt 	 * generated by this function rather than the ones that may arise
    497  1.24.6.2  yamt 	 * from tmpfs_update. */
    498  1.24.6.2  yamt 	tmpfs_update(vp, NULL, NULL, 0);
    499  1.24.6.2  yamt 
    500  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    501  1.24.6.2  yamt 
    502  1.24.6.2  yamt 	return error;
    503  1.24.6.2  yamt }
    504  1.24.6.2  yamt 
    505  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    506  1.24.6.2  yamt 
    507  1.24.6.2  yamt int
    508  1.24.6.2  yamt tmpfs_read(void *v)
    509  1.24.6.2  yamt {
    510  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_read_args *)v)->a_vp;
    511  1.24.6.2  yamt 	struct uio *uio = ((struct vop_read_args *)v)->a_uio;
    512  1.24.6.2  yamt 
    513  1.24.6.2  yamt 	int error;
    514  1.24.6.2  yamt 	int flags;
    515  1.24.6.2  yamt 	struct tmpfs_node *node;
    516  1.24.6.2  yamt 	struct uvm_object *uobj;
    517  1.24.6.2  yamt 
    518  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    519  1.24.6.2  yamt 
    520  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    521  1.24.6.2  yamt 
    522  1.24.6.2  yamt 	if (vp->v_type != VREG) {
    523  1.24.6.2  yamt 		error = EISDIR;
    524  1.24.6.2  yamt 		goto out;
    525  1.24.6.2  yamt 	}
    526  1.24.6.2  yamt 
    527  1.24.6.2  yamt 	if (uio->uio_offset < 0) {
    528  1.24.6.2  yamt 		error = EINVAL;
    529  1.24.6.2  yamt 		goto out;
    530  1.24.6.2  yamt 	}
    531  1.24.6.2  yamt 
    532  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED;
    533  1.24.6.2  yamt 
    534  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
    535  1.24.6.2  yamt 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    536  1.24.6.2  yamt 	error = 0;
    537  1.24.6.2  yamt 	while (error == 0 && uio->uio_resid > 0) {
    538  1.24.6.2  yamt 		vsize_t len;
    539  1.24.6.2  yamt 		void *win;
    540  1.24.6.2  yamt 
    541  1.24.6.2  yamt 		if (node->tn_size <= uio->uio_offset)
    542  1.24.6.2  yamt 			break;
    543  1.24.6.2  yamt 
    544  1.24.6.2  yamt 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    545  1.24.6.2  yamt 		if (len == 0)
    546  1.24.6.2  yamt 			break;
    547  1.24.6.2  yamt 
    548  1.24.6.2  yamt 		win = ubc_alloc(uobj, uio->uio_offset, &len, UVM_ADV_NORMAL,
    549  1.24.6.2  yamt 		    UBC_READ);
    550  1.24.6.2  yamt 		error = uiomove(win, len, uio);
    551  1.24.6.2  yamt 		ubc_release(win, flags);
    552  1.24.6.2  yamt 	}
    553  1.24.6.2  yamt 
    554  1.24.6.2  yamt out:
    555  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    556  1.24.6.2  yamt 
    557  1.24.6.2  yamt 	return error;
    558  1.24.6.2  yamt }
    559  1.24.6.2  yamt 
    560  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    561  1.24.6.2  yamt 
    562  1.24.6.2  yamt int
    563  1.24.6.2  yamt tmpfs_write(void *v)
    564  1.24.6.2  yamt {
    565  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_write_args *)v)->a_vp;
    566  1.24.6.2  yamt 	struct uio *uio = ((struct vop_write_args *)v)->a_uio;
    567  1.24.6.2  yamt 	int ioflag = ((struct vop_write_args *)v)->a_ioflag;
    568  1.24.6.2  yamt 
    569  1.24.6.2  yamt 	boolean_t extended;
    570  1.24.6.2  yamt 	int error;
    571  1.24.6.2  yamt 	int flags;
    572  1.24.6.2  yamt 	off_t oldsize;
    573  1.24.6.2  yamt 	struct tmpfs_node *node;
    574  1.24.6.2  yamt 	struct uvm_object *uobj;
    575  1.24.6.2  yamt 
    576  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    577  1.24.6.2  yamt 
    578  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    579  1.24.6.2  yamt 	oldsize = node->tn_size;
    580  1.24.6.2  yamt 
    581  1.24.6.2  yamt 	if (uio->uio_offset < 0 || vp->v_type != VREG) {
    582  1.24.6.2  yamt 		error = EINVAL;
    583  1.24.6.2  yamt 		goto out;
    584  1.24.6.2  yamt 	}
    585  1.24.6.2  yamt 
    586  1.24.6.2  yamt 	if (uio->uio_resid == 0) {
    587  1.24.6.2  yamt 		error = 0;
    588  1.24.6.2  yamt 		goto out;
    589  1.24.6.2  yamt 	}
    590  1.24.6.2  yamt 
    591  1.24.6.2  yamt 	if (ioflag & IO_APPEND)
    592  1.24.6.2  yamt 		uio->uio_offset = node->tn_size;
    593  1.24.6.2  yamt 
    594  1.24.6.2  yamt 	extended = uio->uio_offset + uio->uio_resid > node->tn_size;
    595  1.24.6.2  yamt 	if (extended) {
    596  1.24.6.2  yamt 		error = tmpfs_reg_resize(vp, uio->uio_offset + uio->uio_resid);
    597  1.24.6.2  yamt 		if (error != 0)
    598  1.24.6.2  yamt 			goto out;
    599  1.24.6.2  yamt 	}
    600  1.24.6.2  yamt 
    601  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
    602  1.24.6.2  yamt 	flags = UBC_WANT_UNMAP(vp) ? UBC_UNMAP : 0;
    603  1.24.6.2  yamt 	error = 0;
    604  1.24.6.2  yamt 	while (error == 0 && uio->uio_resid > 0) {
    605  1.24.6.2  yamt 		vsize_t len;
    606  1.24.6.2  yamt 		void *win;
    607  1.24.6.2  yamt 
    608  1.24.6.2  yamt 		len = MIN(node->tn_size - uio->uio_offset, uio->uio_resid);
    609  1.24.6.2  yamt 		if (len == 0)
    610  1.24.6.2  yamt 			break;
    611  1.24.6.2  yamt 
    612  1.24.6.2  yamt 		win = ubc_alloc(uobj, uio->uio_offset, &len, UVM_ADV_NORMAL,
    613  1.24.6.2  yamt 		    UBC_WRITE);
    614  1.24.6.2  yamt 		error = uiomove(win, len, uio);
    615  1.24.6.2  yamt 		ubc_release(win, flags);
    616  1.24.6.2  yamt 	}
    617  1.24.6.2  yamt 
    618  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED |
    619  1.24.6.2  yamt 	    (extended ? TMPFS_NODE_CHANGED : 0);
    620  1.24.6.2  yamt 
    621  1.24.6.2  yamt 	if (error != 0)
    622  1.24.6.2  yamt 		(void)tmpfs_reg_resize(vp, oldsize);
    623  1.24.6.2  yamt 
    624  1.24.6.3  yamt 	VN_KNOTE(vp, NOTE_WRITE);
    625  1.24.6.3  yamt 
    626  1.24.6.2  yamt out:
    627  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    628  1.24.6.2  yamt 	KASSERT(IMPLIES(error == 0, uio->uio_resid == 0));
    629  1.24.6.2  yamt 	KASSERT(IMPLIES(error != 0, oldsize == node->tn_size));
    630  1.24.6.2  yamt 
    631  1.24.6.2  yamt 	return error;
    632  1.24.6.2  yamt }
    633  1.24.6.2  yamt 
    634  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    635  1.24.6.2  yamt 
    636  1.24.6.2  yamt int
    637  1.24.6.2  yamt tmpfs_fsync(void *v)
    638  1.24.6.2  yamt {
    639  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_fsync_args *)v)->a_vp;
    640  1.24.6.2  yamt 
    641  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    642  1.24.6.2  yamt 
    643  1.24.6.2  yamt 	tmpfs_update(vp, NULL, NULL, 0);
    644  1.24.6.2  yamt 
    645  1.24.6.2  yamt 	return 0;
    646  1.24.6.2  yamt }
    647  1.24.6.2  yamt 
    648  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    649  1.24.6.2  yamt 
    650  1.24.6.2  yamt int
    651  1.24.6.2  yamt tmpfs_remove(void *v)
    652  1.24.6.2  yamt {
    653  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_remove_args *)v)->a_dvp;
    654  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_remove_args *)v)->a_vp;
    655  1.24.6.2  yamt 
    656  1.24.6.2  yamt 	int error;
    657  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    658  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
    659  1.24.6.2  yamt 	struct tmpfs_node *dnode;
    660  1.24.6.2  yamt 	struct tmpfs_node *node;
    661  1.24.6.2  yamt 
    662  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
    663  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
    664  1.24.6.2  yamt 
    665  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
    666  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    667  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(vp->v_mount);
    668  1.24.6.2  yamt 	de = node->tn_lookup_dirent;
    669  1.24.6.2  yamt 	KASSERT(de != NULL);
    670  1.24.6.2  yamt 
    671  1.24.6.2  yamt 	/* XXX: Why isn't this done by the caller? */
    672  1.24.6.2  yamt 	if (vp->v_type == VDIR) {
    673  1.24.6.2  yamt 		error = EISDIR;
    674  1.24.6.2  yamt 		goto out;
    675  1.24.6.2  yamt 	}
    676  1.24.6.2  yamt 
    677  1.24.6.2  yamt 	/* Files marked as immutable or append-only cannot be deleted. */
    678  1.24.6.2  yamt 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    679  1.24.6.2  yamt 		error = EPERM;
    680  1.24.6.2  yamt 		goto out;
    681  1.24.6.2  yamt 	}
    682  1.24.6.2  yamt 
    683  1.24.6.2  yamt 	/* Remove the entry from the directory; as it is a file, we do not
    684  1.24.6.2  yamt 	 * have to change the number of hard links of the directory. */
    685  1.24.6.2  yamt 	tmpfs_dir_detach(dvp, de);
    686  1.24.6.2  yamt 
    687  1.24.6.2  yamt 	/* Free the directory entry we just deleted.  Note that the node
    688  1.24.6.2  yamt 	 * referred by it will not be removed until the vnode is really
    689  1.24.6.2  yamt 	 * reclaimed. */
    690  1.24.6.2  yamt 	tmpfs_free_dirent(tmp, de, TRUE);
    691  1.24.6.2  yamt 
    692  1.24.6.2  yamt 	error = 0;
    693  1.24.6.2  yamt 
    694  1.24.6.2  yamt out:
    695  1.24.6.2  yamt 	vput(dvp);
    696  1.24.6.2  yamt 	vput(vp);
    697  1.24.6.2  yamt 
    698  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(dvp));
    699  1.24.6.2  yamt 
    700  1.24.6.2  yamt 	return error;
    701  1.24.6.2  yamt }
    702  1.24.6.2  yamt 
    703  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    704  1.24.6.2  yamt 
    705  1.24.6.2  yamt int
    706  1.24.6.2  yamt tmpfs_link(void *v)
    707  1.24.6.2  yamt {
    708  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_link_args *)v)->a_dvp;
    709  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_link_args *)v)->a_vp;
    710  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_link_args *)v)->a_cnp;
    711  1.24.6.2  yamt 
    712  1.24.6.2  yamt 	int error;
    713  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    714  1.24.6.2  yamt 	struct tmpfs_node *dnode;
    715  1.24.6.2  yamt 	struct tmpfs_node *node;
    716  1.24.6.2  yamt 
    717  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
    718  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
    719  1.24.6.2  yamt 	KASSERT(cnp->cn_flags & HASBUF);
    720  1.24.6.2  yamt 	KASSERT(dvp != vp); /* XXX When can this be false? */
    721  1.24.6.2  yamt 
    722  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
    723  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
    724  1.24.6.2  yamt 
    725  1.24.6.2  yamt 	/* Lock vp because we will need to run tmpfs_update over it, which
    726  1.24.6.2  yamt 	 * needs the vnode to be locked. */
    727  1.24.6.2  yamt 	error = vn_lock(vp, LK_EXCLUSIVE | LK_RETRY);
    728  1.24.6.2  yamt 	if (error != 0)
    729  1.24.6.2  yamt 		goto out;
    730  1.24.6.2  yamt 
    731  1.24.6.2  yamt 	/* XXX: Why aren't the following two tests done by the caller? */
    732  1.24.6.2  yamt 
    733  1.24.6.2  yamt 	/* Hard links of directories are forbidden. */
    734  1.24.6.2  yamt 	if (vp->v_type == VDIR) {
    735  1.24.6.2  yamt 		error = EPERM;
    736  1.24.6.2  yamt 		goto out;
    737  1.24.6.2  yamt 	}
    738  1.24.6.2  yamt 
    739  1.24.6.2  yamt 	/* Cannot create cross-device links. */
    740  1.24.6.2  yamt 	if (dvp->v_mount != vp->v_mount) {
    741  1.24.6.2  yamt 		error = EXDEV;
    742  1.24.6.2  yamt 		goto out;
    743  1.24.6.2  yamt 	}
    744  1.24.6.2  yamt 
    745  1.24.6.2  yamt 	/* Ensure that we do not overflow the maximum number of links imposed
    746  1.24.6.2  yamt 	 * by the system. */
    747  1.24.6.2  yamt 	KASSERT(node->tn_links <= LINK_MAX);
    748  1.24.6.2  yamt 	if (node->tn_links == LINK_MAX) {
    749  1.24.6.2  yamt 		error = EMLINK;
    750  1.24.6.2  yamt 		goto out;
    751  1.24.6.2  yamt 	}
    752  1.24.6.2  yamt 
    753  1.24.6.2  yamt 	/* We cannot create links of files marked immutable or append-only. */
    754  1.24.6.2  yamt 	if (node->tn_flags & (IMMUTABLE | APPEND)) {
    755  1.24.6.2  yamt 		error = EPERM;
    756  1.24.6.2  yamt 		goto out;
    757  1.24.6.2  yamt 	}
    758  1.24.6.2  yamt 
    759  1.24.6.2  yamt 	/* Allocate a new directory entry to represent the node. */
    760  1.24.6.2  yamt 	error = tmpfs_alloc_dirent(VFS_TO_TMPFS(vp->v_mount), node,
    761  1.24.6.2  yamt 	    cnp->cn_nameptr, cnp->cn_namelen, &de);
    762  1.24.6.2  yamt 	if (error != 0)
    763  1.24.6.2  yamt 		goto out;
    764  1.24.6.2  yamt 
    765  1.24.6.2  yamt 	/* Insert the new directory entry into the appropriate directory. */
    766  1.24.6.2  yamt 	tmpfs_dir_attach(dvp, de);
    767  1.24.6.2  yamt 
    768  1.24.6.2  yamt 	/* vp link count has changed, so update node times. */
    769  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_CHANGED;
    770  1.24.6.2  yamt 	tmpfs_update(vp, NULL, NULL, 0);
    771  1.24.6.2  yamt 
    772  1.24.6.2  yamt 	error = 0;
    773  1.24.6.2  yamt 
    774  1.24.6.2  yamt out:
    775  1.24.6.2  yamt 	if (VOP_ISLOCKED(vp))
    776  1.24.6.2  yamt 		VOP_UNLOCK(vp, 0);
    777  1.24.6.2  yamt 
    778  1.24.6.2  yamt 	PNBUF_PUT(cnp->cn_pnbuf);
    779  1.24.6.2  yamt 
    780  1.24.6.2  yamt 	vput(dvp);
    781  1.24.6.2  yamt 
    782  1.24.6.2  yamt 	/* XXX Locking status of dvp does not match manual page. */
    783  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(dvp));
    784  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
    785  1.24.6.2  yamt 
    786  1.24.6.2  yamt 	return error;
    787  1.24.6.2  yamt }
    788  1.24.6.2  yamt 
    789  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    790  1.24.6.2  yamt 
    791  1.24.6.2  yamt int
    792  1.24.6.2  yamt tmpfs_rename(void *v)
    793  1.24.6.2  yamt {
    794  1.24.6.2  yamt 	struct vnode *fdvp = ((struct vop_rename_args *)v)->a_fdvp;
    795  1.24.6.2  yamt 	struct vnode *fvp = ((struct vop_rename_args *)v)->a_fvp;
    796  1.24.6.2  yamt 	struct componentname *fcnp = ((struct vop_rename_args *)v)->a_fcnp;
    797  1.24.6.2  yamt 	struct vnode *tdvp = ((struct vop_rename_args *)v)->a_tdvp;
    798  1.24.6.2  yamt 	struct vnode *tvp = ((struct vop_rename_args *)v)->a_tvp;
    799  1.24.6.2  yamt 	struct componentname *tcnp = ((struct vop_rename_args *)v)->a_tcnp;
    800  1.24.6.2  yamt 
    801  1.24.6.2  yamt 	char *newname;
    802  1.24.6.2  yamt 	int error;
    803  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    804  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
    805  1.24.6.2  yamt 	struct tmpfs_node *fdnode;
    806  1.24.6.2  yamt 	struct tmpfs_node *fnode;
    807  1.24.6.2  yamt 	struct tmpfs_node *tdnode;
    808  1.24.6.2  yamt 
    809  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(tdvp));
    810  1.24.6.2  yamt 	KASSERT(IMPLIES(tvp != NULL, VOP_ISLOCKED(tvp)));
    811  1.24.6.2  yamt 	KASSERT(fcnp->cn_flags & HASBUF);
    812  1.24.6.2  yamt 	KASSERT(tcnp->cn_flags & HASBUF);
    813  1.24.6.2  yamt 
    814  1.24.6.2  yamt 	fdnode = VP_TO_TMPFS_DIR(fdvp);
    815  1.24.6.2  yamt 	fnode = VP_TO_TMPFS_NODE(fvp);
    816  1.24.6.2  yamt 	de = fnode->tn_lookup_dirent;
    817  1.24.6.2  yamt 
    818  1.24.6.2  yamt 	/* Disallow cross-device renames.
    819  1.24.6.2  yamt 	 * XXX Why isn't this done by the caller? */
    820  1.24.6.2  yamt 	if (fvp->v_mount != tdvp->v_mount ||
    821  1.24.6.2  yamt 	    (tvp != NULL && fvp->v_mount != tvp->v_mount)) {
    822  1.24.6.2  yamt 		error = EXDEV;
    823  1.24.6.2  yamt 		goto out;
    824  1.24.6.2  yamt 	}
    825  1.24.6.2  yamt 
    826  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(tdvp->v_mount);
    827  1.24.6.2  yamt 	tdnode = VP_TO_TMPFS_DIR(tdvp);
    828  1.24.6.2  yamt 
    829  1.24.6.2  yamt 	/* If source and target are the same file, there is nothing to do. */
    830  1.24.6.2  yamt 	if (fvp == tvp) {
    831  1.24.6.2  yamt 		error = 0;
    832  1.24.6.2  yamt 		goto out;
    833  1.24.6.2  yamt 	}
    834  1.24.6.2  yamt 
    835  1.24.6.2  yamt 	/* Avoid manipulating '.' and '..' entries. */
    836  1.24.6.2  yamt 	if (de == NULL) {
    837  1.24.6.2  yamt 		KASSERT(fvp->v_type == VDIR);
    838  1.24.6.2  yamt 		error = EINVAL;
    839  1.24.6.2  yamt 		goto out;
    840  1.24.6.2  yamt 	}
    841  1.24.6.2  yamt 	KASSERT(de->td_node == fnode);
    842  1.24.6.2  yamt 
    843  1.24.6.2  yamt 	/* If we need to move the directory between entries, lock the
    844  1.24.6.2  yamt 	 * source so that we can safely operate on it. */
    845  1.24.6.2  yamt 	if (fdnode != tdnode) {
    846  1.24.6.2  yamt 		error = vn_lock(fdvp, LK_EXCLUSIVE | LK_RETRY);
    847  1.24.6.2  yamt 		if (error != 0)
    848  1.24.6.2  yamt 			goto out;
    849  1.24.6.2  yamt 	}
    850  1.24.6.2  yamt 
    851  1.24.6.2  yamt 	/* Ensure that we have enough memory to hold the new name, if it
    852  1.24.6.2  yamt 	 * has to be changed. */
    853  1.24.6.2  yamt 	if (fcnp->cn_namelen != tcnp->cn_namelen ||
    854  1.24.6.2  yamt 	    memcmp(fcnp->cn_nameptr, tcnp->cn_nameptr, fcnp->cn_namelen) != 0) {
    855  1.24.6.2  yamt 		newname = tmpfs_str_pool_get(&tmp->tm_str_pool,
    856  1.24.6.2  yamt 		    tcnp->cn_namelen, 0);
    857  1.24.6.2  yamt 		if (newname == NULL) {
    858  1.24.6.2  yamt 			error = ENOSPC;
    859  1.24.6.2  yamt 			goto out_locked;
    860  1.24.6.2  yamt 		}
    861  1.24.6.2  yamt 	} else
    862  1.24.6.2  yamt 		newname = NULL;
    863  1.24.6.2  yamt 
    864  1.24.6.2  yamt 	/* If the node is being moved to another directory, we have to do
    865  1.24.6.2  yamt 	 * the move. */
    866  1.24.6.2  yamt 	if (fdnode != tdnode) {
    867  1.24.6.2  yamt 		/* In case we are moving a directory, we have to adjust its
    868  1.24.6.2  yamt 		 * parent to point to the new parent. */
    869  1.24.6.2  yamt 		if (de->td_node->tn_type == VDIR) {
    870  1.24.6.2  yamt 			struct tmpfs_node *n;
    871  1.24.6.2  yamt 
    872  1.24.6.2  yamt 			/* Ensure the target directory is not a child of the
    873  1.24.6.2  yamt 			 * directory being moved.  Otherwise, we'd end up
    874  1.24.6.2  yamt 			 * with stale nodes. */
    875  1.24.6.2  yamt 			n = tdnode;
    876  1.24.6.2  yamt 			while (n != n->tn_spec.tn_dir.tn_parent) {
    877  1.24.6.2  yamt 				if (n == fnode) {
    878  1.24.6.2  yamt 					error = EINVAL;
    879  1.24.6.2  yamt 					goto out_locked;
    880  1.24.6.2  yamt 				}
    881  1.24.6.2  yamt 				n = n->tn_spec.tn_dir.tn_parent;
    882  1.24.6.2  yamt 			}
    883  1.24.6.2  yamt 
    884  1.24.6.2  yamt 			/* Adjust the parent pointer. */
    885  1.24.6.2  yamt 			TMPFS_VALIDATE_DIR(fnode);
    886  1.24.6.2  yamt 			de->td_node->tn_spec.tn_dir.tn_parent = tdnode;
    887  1.24.6.2  yamt 
    888  1.24.6.2  yamt 			/* As a result of changing the target of the '..'
    889  1.24.6.2  yamt 			 * entry, the link count of the source and target
    890  1.24.6.2  yamt 			 * directories has to be adjusted. */
    891  1.24.6.2  yamt 			fdnode->tn_links--;
    892  1.24.6.2  yamt 			tdnode->tn_links++;
    893  1.24.6.2  yamt 		}
    894  1.24.6.2  yamt 
    895  1.24.6.2  yamt 		/* Do the move: just remove the entry from the source directory
    896  1.24.6.2  yamt 		 * and insert it into the target one. */
    897  1.24.6.2  yamt 		tmpfs_dir_detach(fdvp, de);
    898  1.24.6.2  yamt 		tmpfs_dir_attach(tdvp, de);
    899  1.24.6.2  yamt 
    900  1.24.6.2  yamt 		/* Notify listeners of fdvp about the change in the directory.
    901  1.24.6.2  yamt 		 * We can do it at this point because we aren't touching fdvp
    902  1.24.6.2  yamt 		 * any more below. */
    903  1.24.6.2  yamt 		VN_KNOTE(fdvp, NOTE_WRITE);
    904  1.24.6.2  yamt 	}
    905  1.24.6.2  yamt 
    906  1.24.6.2  yamt 	/* If the name has changed, we need to make it effective by changing
    907  1.24.6.2  yamt 	 * it in the directory entry. */
    908  1.24.6.2  yamt 	if (newname != NULL) {
    909  1.24.6.2  yamt 		KASSERT(tcnp->cn_namelen < MAXNAMLEN);
    910  1.24.6.2  yamt 		KASSERT(tcnp->cn_namelen < 0xffff);
    911  1.24.6.2  yamt 
    912  1.24.6.2  yamt 		tmpfs_str_pool_put(&tmp->tm_str_pool, de->td_name,
    913  1.24.6.2  yamt 		    de->td_namelen);
    914  1.24.6.2  yamt 		de->td_namelen = (uint16_t)tcnp->cn_namelen;
    915  1.24.6.2  yamt 		memcpy(newname, tcnp->cn_nameptr, tcnp->cn_namelen);
    916  1.24.6.2  yamt 		de->td_name = newname;
    917  1.24.6.2  yamt 
    918  1.24.6.3  yamt 		fnode->tn_status |= TMPFS_NODE_CHANGED;
    919  1.24.6.3  yamt 		tdnode->tn_status |= TMPFS_NODE_MODIFIED;
    920  1.24.6.2  yamt 	}
    921  1.24.6.2  yamt 
    922  1.24.6.2  yamt 	/* If we are overwriting an entry, we have to remove the old one
    923  1.24.6.2  yamt 	 * from the target directory. */
    924  1.24.6.2  yamt 	if (tvp != NULL) {
    925  1.24.6.2  yamt 		struct tmpfs_node *tnode;
    926  1.24.6.2  yamt 
    927  1.24.6.2  yamt 		tnode = VP_TO_TMPFS_NODE(tvp);
    928  1.24.6.2  yamt 
    929  1.24.6.2  yamt 		/* The source node cannot be a directory in this case. */
    930  1.24.6.2  yamt 		KASSERT(fnode->tn_type != VDIR);
    931  1.24.6.2  yamt 
    932  1.24.6.2  yamt 		/* Remove the old entry from the target directory. */
    933  1.24.6.2  yamt 		de = tnode->tn_lookup_dirent;
    934  1.24.6.2  yamt 		tmpfs_dir_detach(tdvp, de);
    935  1.24.6.2  yamt 
    936  1.24.6.2  yamt 		/* Free the directory entry we just deleted.  Note that the
    937  1.24.6.2  yamt 		 * node referred by it will not be removed until the vnode is
    938  1.24.6.2  yamt 		 * really reclaimed. */
    939  1.24.6.2  yamt 		tmpfs_free_dirent(VFS_TO_TMPFS(tvp->v_mount), de, TRUE);
    940  1.24.6.2  yamt 	}
    941  1.24.6.2  yamt 
    942  1.24.6.2  yamt 	/* Notify listeners of tdvp about the change in the directory (either
    943  1.24.6.3  yamt 	 * because a new entry was added or because one was removed) and
    944  1.24.6.3  yamt 	 * listeners of fvp about the rename. */
    945  1.24.6.2  yamt 	VN_KNOTE(tdvp, NOTE_WRITE);
    946  1.24.6.3  yamt 	VN_KNOTE(fvp, NOTE_RENAME);
    947  1.24.6.2  yamt 
    948  1.24.6.2  yamt 	error = 0;
    949  1.24.6.2  yamt 
    950  1.24.6.2  yamt out_locked:
    951  1.24.6.2  yamt 	if (fdnode != tdnode)
    952  1.24.6.2  yamt 		VOP_UNLOCK(fdvp, 0);
    953  1.24.6.2  yamt 
    954  1.24.6.2  yamt out:
    955  1.24.6.2  yamt 	/* Release target nodes. */
    956  1.24.6.2  yamt 	/* XXX: I don't understand when tdvp can be the same as tvp, but
    957  1.24.6.2  yamt 	 * other code takes care of this... */
    958  1.24.6.2  yamt 	if (tdvp == tvp)
    959  1.24.6.2  yamt 		vrele(tdvp);
    960  1.24.6.2  yamt 	else
    961  1.24.6.2  yamt 		vput(tdvp);
    962  1.24.6.2  yamt 	if (tvp != NULL)
    963  1.24.6.2  yamt 		vput(tvp);
    964  1.24.6.2  yamt 
    965  1.24.6.2  yamt 	/* Release source nodes. */
    966  1.24.6.2  yamt 	vrele(fdvp);
    967  1.24.6.2  yamt 	vrele(fvp);
    968  1.24.6.2  yamt 
    969  1.24.6.2  yamt 	return error;
    970  1.24.6.2  yamt }
    971  1.24.6.2  yamt 
    972  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    973  1.24.6.2  yamt 
    974  1.24.6.2  yamt int
    975  1.24.6.2  yamt tmpfs_mkdir(void *v)
    976  1.24.6.2  yamt {
    977  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_mkdir_args *)v)->a_dvp;
    978  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_mkdir_args *)v)->a_vpp;
    979  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_mkdir_args *)v)->a_cnp;
    980  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_mkdir_args *)v)->a_vap;
    981  1.24.6.2  yamt 
    982  1.24.6.2  yamt 	KASSERT(vap->va_type == VDIR);
    983  1.24.6.2  yamt 
    984  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, NULL);
    985  1.24.6.2  yamt }
    986  1.24.6.2  yamt 
    987  1.24.6.2  yamt /* --------------------------------------------------------------------- */
    988  1.24.6.2  yamt 
    989  1.24.6.2  yamt int
    990  1.24.6.2  yamt tmpfs_rmdir(void *v)
    991  1.24.6.2  yamt {
    992  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_rmdir_args *)v)->a_dvp;
    993  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_rmdir_args *)v)->a_vp;
    994  1.24.6.2  yamt 
    995  1.24.6.2  yamt 	int error;
    996  1.24.6.2  yamt 	struct tmpfs_dirent *de;
    997  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
    998  1.24.6.2  yamt 	struct tmpfs_node *dnode;
    999  1.24.6.2  yamt 	struct tmpfs_node *node;
   1000  1.24.6.2  yamt 
   1001  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(dvp));
   1002  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1003  1.24.6.2  yamt 
   1004  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(dvp->v_mount);
   1005  1.24.6.2  yamt 	dnode = VP_TO_TMPFS_DIR(dvp);
   1006  1.24.6.2  yamt 	node = VP_TO_TMPFS_DIR(vp);
   1007  1.24.6.2  yamt 	KASSERT(node->tn_spec.tn_dir.tn_parent == dnode);
   1008  1.24.6.2  yamt 
   1009  1.24.6.2  yamt 	/* Get the directory entry associated with node (vp).  This was
   1010  1.24.6.2  yamt 	 * filled by tmpfs_lookup while looking up the entry. */
   1011  1.24.6.2  yamt 	de = node->tn_lookup_dirent;
   1012  1.24.6.2  yamt 	KASSERT(TMPFS_DIRENT_MATCHES(de,
   1013  1.24.6.2  yamt 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_nameptr,
   1014  1.24.6.2  yamt 	    ((struct vop_rmdir_args *)v)->a_cnp->cn_namelen));
   1015  1.24.6.2  yamt 
   1016  1.24.6.2  yamt 	/* Directories with more than two entries ('.' and '..') cannot be
   1017  1.24.6.2  yamt 	 * removed. */
   1018  1.24.6.2  yamt 	if (node->tn_size > 0) {
   1019  1.24.6.2  yamt 		error = ENOTEMPTY;
   1020  1.24.6.2  yamt 		goto out;
   1021  1.24.6.2  yamt 	}
   1022  1.24.6.2  yamt 
   1023  1.24.6.2  yamt 	/* Check flags to see if we are allowed to remove the directory. */
   1024  1.24.6.2  yamt 	if (dnode->tn_flags & APPEND || node->tn_flags & (IMMUTABLE | APPEND)) {
   1025  1.24.6.2  yamt 		error = EPERM;
   1026  1.24.6.2  yamt 		goto out;
   1027  1.24.6.2  yamt 	}
   1028  1.24.6.2  yamt 
   1029  1.24.6.2  yamt 	/* Detach the directory entry from the directory (dnode). */
   1030  1.24.6.2  yamt 	tmpfs_dir_detach(dvp, de);
   1031  1.24.6.2  yamt 
   1032  1.24.6.2  yamt 	node->tn_links--;
   1033  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
   1034  1.24.6.2  yamt 	    TMPFS_NODE_MODIFIED;
   1035  1.24.6.2  yamt 	node->tn_spec.tn_dir.tn_parent->tn_links--;
   1036  1.24.6.2  yamt 	node->tn_spec.tn_dir.tn_parent->tn_status |= TMPFS_NODE_ACCESSED | \
   1037  1.24.6.2  yamt 	    TMPFS_NODE_CHANGED | TMPFS_NODE_MODIFIED;
   1038  1.24.6.2  yamt 
   1039  1.24.6.3  yamt 	/* Release the parent. */
   1040  1.24.6.2  yamt 	cache_purge(dvp); /* XXX Is this needed? */
   1041  1.24.6.2  yamt 	vput(dvp);
   1042  1.24.6.2  yamt 
   1043  1.24.6.2  yamt 	/* Free the directory entry we just deleted.  Note that the node
   1044  1.24.6.2  yamt 	 * referred by it will not be removed until the vnode is really
   1045  1.24.6.2  yamt 	 * reclaimed. */
   1046  1.24.6.2  yamt 	tmpfs_free_dirent(tmp, de, TRUE);
   1047  1.24.6.2  yamt 
   1048  1.24.6.2  yamt 	/* Release the deleted vnode (will destroy the node, notify
   1049  1.24.6.2  yamt 	 * interested parties and clean it from the cache). */
   1050  1.24.6.2  yamt 	vput(vp);
   1051  1.24.6.2  yamt 
   1052  1.24.6.2  yamt 	error = 0;
   1053  1.24.6.2  yamt 
   1054  1.24.6.2  yamt out:
   1055  1.24.6.2  yamt 	if (error != 0) {
   1056  1.24.6.2  yamt 		vput(dvp);
   1057  1.24.6.2  yamt 		vput(vp);
   1058  1.24.6.2  yamt 	}
   1059  1.24.6.2  yamt 
   1060  1.24.6.2  yamt 	return error;
   1061  1.24.6.2  yamt }
   1062  1.24.6.2  yamt 
   1063  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1064  1.24.6.2  yamt 
   1065  1.24.6.2  yamt int
   1066  1.24.6.2  yamt tmpfs_symlink(void *v)
   1067  1.24.6.2  yamt {
   1068  1.24.6.2  yamt 	struct vnode *dvp = ((struct vop_symlink_args *)v)->a_dvp;
   1069  1.24.6.2  yamt 	struct vnode **vpp = ((struct vop_symlink_args *)v)->a_vpp;
   1070  1.24.6.2  yamt 	struct componentname *cnp = ((struct vop_symlink_args *)v)->a_cnp;
   1071  1.24.6.2  yamt 	struct vattr *vap = ((struct vop_symlink_args *)v)->a_vap;
   1072  1.24.6.2  yamt 	char *target = ((struct vop_symlink_args *)v)->a_target;
   1073  1.24.6.2  yamt 
   1074  1.24.6.2  yamt 	KASSERT(vap->va_type == VLNK);
   1075  1.24.6.2  yamt 
   1076  1.24.6.2  yamt 	return tmpfs_alloc_file(dvp, vpp, vap, cnp, target);
   1077  1.24.6.2  yamt }
   1078  1.24.6.2  yamt 
   1079  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1080  1.24.6.2  yamt 
   1081  1.24.6.2  yamt int
   1082  1.24.6.2  yamt tmpfs_readdir(void *v)
   1083  1.24.6.2  yamt {
   1084  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_readdir_args *)v)->a_vp;
   1085  1.24.6.2  yamt 	struct uio *uio = ((struct vop_readdir_args *)v)->a_uio;
   1086  1.24.6.2  yamt 	int *eofflag = ((struct vop_readdir_args *)v)->a_eofflag;
   1087  1.24.6.2  yamt 	off_t **cookies = ((struct vop_readdir_args *)v)->a_cookies;
   1088  1.24.6.2  yamt 	int *ncookies = ((struct vop_readdir_args *)v)->a_ncookies;
   1089  1.24.6.2  yamt 
   1090  1.24.6.2  yamt 	int error;
   1091  1.24.6.2  yamt 	off_t startoff;
   1092  1.24.6.2  yamt 	off_t cnt;
   1093  1.24.6.2  yamt 	struct tmpfs_node *node;
   1094  1.24.6.2  yamt 
   1095  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1096  1.24.6.2  yamt 
   1097  1.24.6.2  yamt 	/* This operation only makes sense on directory nodes. */
   1098  1.24.6.2  yamt 	if (vp->v_type != VDIR) {
   1099  1.24.6.2  yamt 		error = ENOTDIR;
   1100  1.24.6.2  yamt 		goto out;
   1101  1.24.6.2  yamt 	}
   1102  1.24.6.2  yamt 
   1103  1.24.6.2  yamt 	node = VP_TO_TMPFS_DIR(vp);
   1104  1.24.6.2  yamt 
   1105  1.24.6.2  yamt 	startoff = uio->uio_offset;
   1106  1.24.6.2  yamt 
   1107  1.24.6.2  yamt 	cnt = 0;
   1108  1.24.6.2  yamt 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOT) {
   1109  1.24.6.2  yamt 		error = tmpfs_dir_getdotdent(node, uio);
   1110  1.24.6.2  yamt 		if (error == -1) {
   1111  1.24.6.2  yamt 			error = 0;
   1112  1.24.6.2  yamt 			goto outok;
   1113  1.24.6.2  yamt 		} else if (error != 0)
   1114  1.24.6.2  yamt 			goto outok;
   1115  1.24.6.2  yamt 		cnt++;
   1116  1.24.6.2  yamt 	}
   1117  1.24.6.2  yamt 
   1118  1.24.6.2  yamt 	if (uio->uio_offset == TMPFS_DIRCOOKIE_DOTDOT) {
   1119  1.24.6.2  yamt 		error = tmpfs_dir_getdotdotdent(node, uio);
   1120  1.24.6.2  yamt 		if (error == -1) {
   1121  1.24.6.2  yamt 			error = 0;
   1122  1.24.6.2  yamt 			goto outok;
   1123  1.24.6.2  yamt 		} else if (error != 0)
   1124  1.24.6.2  yamt 			goto outok;
   1125  1.24.6.2  yamt 		cnt++;
   1126  1.24.6.2  yamt 	}
   1127  1.24.6.2  yamt 
   1128  1.24.6.2  yamt 	error = tmpfs_dir_getdents(node, uio, &cnt);
   1129  1.24.6.2  yamt 	if (error == -1)
   1130  1.24.6.2  yamt 		error = 0;
   1131  1.24.6.2  yamt 	KASSERT(error >= 0);
   1132  1.24.6.2  yamt 
   1133  1.24.6.2  yamt outok:
   1134  1.24.6.2  yamt 	/* This label assumes that startoff has been
   1135  1.24.6.2  yamt 	 * initialized.  If the compiler didn't spit out warnings, we'd
   1136  1.24.6.2  yamt 	 * simply make this one be 'out' and drop 'outok'. */
   1137  1.24.6.2  yamt 
   1138  1.24.6.2  yamt 	if (eofflag != NULL)
   1139  1.24.6.2  yamt 		*eofflag =
   1140  1.24.6.2  yamt 		    (error == 0 && uio->uio_offset == TMPFS_DIRCOOKIE_EOF);
   1141  1.24.6.2  yamt 
   1142  1.24.6.2  yamt 	/* Update NFS-related variables. */
   1143  1.24.6.2  yamt 	if (error == 0 && cookies != NULL && ncookies != NULL) {
   1144  1.24.6.2  yamt 		off_t i;
   1145  1.24.6.2  yamt 		off_t off = startoff;
   1146  1.24.6.2  yamt 		struct tmpfs_dirent *de = NULL;
   1147  1.24.6.2  yamt 
   1148  1.24.6.2  yamt 		*ncookies = cnt;
   1149  1.24.6.2  yamt 		*cookies = malloc(cnt * sizeof(off_t), M_TEMP, M_WAITOK);
   1150  1.24.6.2  yamt 
   1151  1.24.6.2  yamt 		for (i = 0; i < cnt; i++) {
   1152  1.24.6.2  yamt 			KASSERT(off != TMPFS_DIRCOOKIE_EOF);
   1153  1.24.6.2  yamt 			if (off == TMPFS_DIRCOOKIE_DOT) {
   1154  1.24.6.2  yamt 				off = TMPFS_DIRCOOKIE_DOTDOT;
   1155  1.24.6.2  yamt 			} else {
   1156  1.24.6.2  yamt 				if (off == TMPFS_DIRCOOKIE_DOTDOT) {
   1157  1.24.6.2  yamt 					de = TAILQ_FIRST(&node->tn_spec.
   1158  1.24.6.2  yamt 					    tn_dir.tn_dir);
   1159  1.24.6.2  yamt 				} else if (de != NULL) {
   1160  1.24.6.2  yamt 					de = TAILQ_NEXT(de, td_entries);
   1161  1.24.6.2  yamt 				} else {
   1162  1.24.6.2  yamt 					de = tmpfs_dir_lookupbycookie(node,
   1163  1.24.6.2  yamt 					    off);
   1164  1.24.6.2  yamt 					KASSERT(de != NULL);
   1165  1.24.6.2  yamt 					de = TAILQ_NEXT(de, td_entries);
   1166  1.24.6.2  yamt 				}
   1167  1.24.6.2  yamt 				if (de == NULL) {
   1168  1.24.6.2  yamt 					off = TMPFS_DIRCOOKIE_EOF;
   1169  1.24.6.2  yamt 				} else {
   1170  1.24.6.3  yamt 					off = tmpfs_dircookie(de);
   1171  1.24.6.2  yamt 				}
   1172  1.24.6.2  yamt 			}
   1173  1.24.6.2  yamt 
   1174  1.24.6.2  yamt 			(*cookies)[i] = off;
   1175  1.24.6.2  yamt 		}
   1176  1.24.6.2  yamt 		KASSERT(uio->uio_offset == off);
   1177  1.24.6.2  yamt 	}
   1178  1.24.6.2  yamt 
   1179  1.24.6.2  yamt out:
   1180  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1181  1.24.6.2  yamt 
   1182  1.24.6.2  yamt 	return error;
   1183  1.24.6.2  yamt }
   1184  1.24.6.2  yamt 
   1185  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1186  1.24.6.2  yamt 
   1187  1.24.6.2  yamt int
   1188  1.24.6.2  yamt tmpfs_readlink(void *v)
   1189  1.24.6.2  yamt {
   1190  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_readlink_args *)v)->a_vp;
   1191  1.24.6.2  yamt 	struct uio *uio = ((struct vop_readlink_args *)v)->a_uio;
   1192  1.24.6.2  yamt 
   1193  1.24.6.2  yamt 	int error;
   1194  1.24.6.2  yamt 	struct tmpfs_node *node;
   1195  1.24.6.2  yamt 
   1196  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1197  1.24.6.2  yamt 	KASSERT(uio->uio_offset == 0);
   1198  1.24.6.2  yamt 	KASSERT(vp->v_type == VLNK);
   1199  1.24.6.2  yamt 
   1200  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1201  1.24.6.2  yamt 
   1202  1.24.6.2  yamt 	error = uiomove(node->tn_spec.tn_lnk.tn_link,
   1203  1.24.6.2  yamt 	    MIN(node->tn_size, uio->uio_resid), uio);
   1204  1.24.6.2  yamt 	node->tn_status |= TMPFS_NODE_ACCESSED;
   1205  1.24.6.2  yamt 
   1206  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1207  1.24.6.2  yamt 
   1208  1.24.6.2  yamt 	return error;
   1209  1.24.6.2  yamt }
   1210  1.24.6.2  yamt 
   1211  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1212  1.24.6.2  yamt 
   1213  1.24.6.2  yamt int
   1214  1.24.6.2  yamt tmpfs_inactive(void *v)
   1215  1.24.6.2  yamt {
   1216  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_inactive_args *)v)->a_vp;
   1217  1.24.6.2  yamt 	struct lwp *l = ((struct vop_inactive_args *)v)->a_l;
   1218  1.24.6.2  yamt 
   1219  1.24.6.2  yamt 	struct tmpfs_node *node;
   1220  1.24.6.2  yamt 
   1221  1.24.6.2  yamt 	KASSERT(VOP_ISLOCKED(vp));
   1222  1.24.6.2  yamt 
   1223  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1224  1.24.6.2  yamt 
   1225  1.24.6.2  yamt 	VOP_UNLOCK(vp, 0);
   1226  1.24.6.2  yamt 
   1227  1.24.6.2  yamt 	if (node->tn_links == 0)
   1228  1.24.6.2  yamt 		vrecycle(vp, NULL, l);
   1229  1.24.6.2  yamt 
   1230  1.24.6.2  yamt 	return 0;
   1231  1.24.6.2  yamt }
   1232  1.24.6.2  yamt 
   1233  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1234  1.24.6.2  yamt 
   1235  1.24.6.2  yamt int
   1236  1.24.6.2  yamt tmpfs_reclaim(void *v)
   1237  1.24.6.2  yamt {
   1238  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_reclaim_args *)v)->a_vp;
   1239  1.24.6.2  yamt 
   1240  1.24.6.2  yamt 	struct tmpfs_mount *tmp;
   1241  1.24.6.2  yamt 	struct tmpfs_node *node;
   1242  1.24.6.2  yamt 
   1243  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
   1244  1.24.6.2  yamt 
   1245  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1246  1.24.6.2  yamt 	tmp = VFS_TO_TMPFS(vp->v_mount);
   1247  1.24.6.2  yamt 
   1248  1.24.6.2  yamt 	cache_purge(vp);
   1249  1.24.6.2  yamt 	tmpfs_free_vp(vp);
   1250  1.24.6.2  yamt 
   1251  1.24.6.2  yamt 	/* If the node referenced by this vnode was deleted by the user,
   1252  1.24.6.2  yamt 	 * we must free its associated data structures (now that the vnode
   1253  1.24.6.2  yamt 	 * is being reclaimed). */
   1254  1.24.6.2  yamt 	if (node->tn_links == 0)
   1255  1.24.6.2  yamt 		tmpfs_free_node(tmp, node);
   1256  1.24.6.2  yamt 
   1257  1.24.6.2  yamt 	KASSERT(!VOP_ISLOCKED(vp));
   1258  1.24.6.2  yamt 	KASSERT(vp->v_data == NULL);
   1259  1.24.6.2  yamt 
   1260  1.24.6.2  yamt 	return 0;
   1261  1.24.6.2  yamt }
   1262  1.24.6.2  yamt 
   1263  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1264  1.24.6.2  yamt 
   1265  1.24.6.2  yamt int
   1266  1.24.6.2  yamt tmpfs_print(void *v)
   1267  1.24.6.2  yamt {
   1268  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_print_args *)v)->a_vp;
   1269  1.24.6.2  yamt 
   1270  1.24.6.2  yamt 	struct tmpfs_node *node;
   1271  1.24.6.2  yamt 
   1272  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1273  1.24.6.2  yamt 
   1274  1.24.6.2  yamt 	printf("tag VT_TMPFS, tmpfs_node %p, flags 0x%x, links %d\n",
   1275  1.24.6.2  yamt 	    node, node->tn_flags, node->tn_links);
   1276  1.24.6.2  yamt 	printf("\tmode 0%o, owner %d, group %d, size %" PRIdMAX
   1277  1.24.6.2  yamt 	    ", status 0x%x\n",
   1278  1.24.6.2  yamt 	    node->tn_mode, node->tn_uid, node->tn_gid,
   1279  1.24.6.2  yamt 	    (uintmax_t)node->tn_size, node->tn_status);
   1280  1.24.6.2  yamt 
   1281  1.24.6.2  yamt 	if (vp->v_type == VFIFO)
   1282  1.24.6.2  yamt 		fifo_printinfo(vp);
   1283  1.24.6.2  yamt 	lockmgr_printinfo(&vp->v_lock);
   1284  1.24.6.2  yamt 
   1285  1.24.6.2  yamt 	printf("\n");
   1286  1.24.6.2  yamt 
   1287  1.24.6.2  yamt 	return 0;
   1288  1.24.6.2  yamt }
   1289  1.24.6.2  yamt 
   1290  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1291  1.24.6.2  yamt 
   1292  1.24.6.2  yamt int
   1293  1.24.6.2  yamt tmpfs_pathconf(void *v)
   1294  1.24.6.2  yamt {
   1295  1.24.6.2  yamt 	int name = ((struct vop_pathconf_args *)v)->a_name;
   1296  1.24.6.2  yamt 	register_t *retval = ((struct vop_pathconf_args *)v)->a_retval;
   1297  1.24.6.2  yamt 
   1298  1.24.6.2  yamt 	int error;
   1299  1.24.6.2  yamt 
   1300  1.24.6.2  yamt 	error = 0;
   1301  1.24.6.2  yamt 
   1302  1.24.6.2  yamt 	switch (name) {
   1303  1.24.6.2  yamt 	case _PC_LINK_MAX:
   1304  1.24.6.2  yamt 		*retval = LINK_MAX;
   1305  1.24.6.2  yamt 		break;
   1306  1.24.6.2  yamt 
   1307  1.24.6.2  yamt 	case _PC_NAME_MAX:
   1308  1.24.6.2  yamt 		*retval = NAME_MAX;
   1309  1.24.6.2  yamt 		break;
   1310  1.24.6.2  yamt 
   1311  1.24.6.2  yamt 	case _PC_PATH_MAX:
   1312  1.24.6.2  yamt 		*retval = PATH_MAX;
   1313  1.24.6.2  yamt 		break;
   1314  1.24.6.2  yamt 
   1315  1.24.6.2  yamt 	case _PC_PIPE_BUF:
   1316  1.24.6.2  yamt 		*retval = PIPE_BUF;
   1317  1.24.6.2  yamt 		break;
   1318  1.24.6.2  yamt 
   1319  1.24.6.2  yamt 	case _PC_CHOWN_RESTRICTED:
   1320  1.24.6.2  yamt 		*retval = 1;
   1321  1.24.6.2  yamt 		break;
   1322  1.24.6.2  yamt 
   1323  1.24.6.2  yamt 	case _PC_NO_TRUNC:
   1324  1.24.6.2  yamt 		*retval = 1;
   1325  1.24.6.2  yamt 		break;
   1326  1.24.6.2  yamt 
   1327  1.24.6.2  yamt 	case _PC_SYNC_IO:
   1328  1.24.6.2  yamt 		*retval = 1;
   1329  1.24.6.2  yamt 		break;
   1330  1.24.6.2  yamt 
   1331  1.24.6.2  yamt 	case _PC_FILESIZEBITS:
   1332  1.24.6.2  yamt 		*retval = 0; /* XXX Don't know which value should I return. */
   1333  1.24.6.2  yamt 		break;
   1334  1.24.6.2  yamt 
   1335  1.24.6.2  yamt 	default:
   1336  1.24.6.2  yamt 		error = EINVAL;
   1337  1.24.6.2  yamt 	}
   1338  1.24.6.2  yamt 
   1339  1.24.6.2  yamt 	return error;
   1340  1.24.6.2  yamt }
   1341  1.24.6.2  yamt 
   1342  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1343  1.24.6.2  yamt 
   1344  1.24.6.2  yamt int
   1345  1.24.6.2  yamt tmpfs_advlock(void *v)
   1346  1.24.6.2  yamt {
   1347  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_advlock_args *)v)->a_vp;
   1348  1.24.6.2  yamt 
   1349  1.24.6.2  yamt 	struct tmpfs_node *node;
   1350  1.24.6.2  yamt 
   1351  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1352  1.24.6.2  yamt 
   1353  1.24.6.2  yamt 	return lf_advlock(v, &node->tn_lockf, node->tn_size);
   1354  1.24.6.2  yamt }
   1355  1.24.6.2  yamt 
   1356  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1357  1.24.6.2  yamt 
   1358  1.24.6.2  yamt int
   1359  1.24.6.2  yamt tmpfs_getpages(void *v)
   1360  1.24.6.2  yamt {
   1361  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_getpages_args *)v)->a_vp;
   1362  1.24.6.2  yamt 	voff_t offset = ((struct vop_getpages_args *)v)->a_offset;
   1363  1.24.6.2  yamt 	struct vm_page **m = ((struct vop_getpages_args *)v)->a_m;
   1364  1.24.6.2  yamt 	int *count = ((struct vop_getpages_args *)v)->a_count;
   1365  1.24.6.2  yamt 	int centeridx = ((struct vop_getpages_args *)v)->a_centeridx;
   1366  1.24.6.2  yamt 	vm_prot_t access_type = ((struct vop_getpages_args *)v)->a_access_type;
   1367  1.24.6.2  yamt 	int advice = ((struct vop_getpages_args *)v)->a_advice;
   1368  1.24.6.2  yamt 	int flags = ((struct vop_getpages_args *)v)->a_flags;
   1369  1.24.6.2  yamt 
   1370  1.24.6.2  yamt 	int error;
   1371  1.24.6.3  yamt 	int i;
   1372  1.24.6.2  yamt 	struct tmpfs_node *node;
   1373  1.24.6.2  yamt 	struct uvm_object *uobj;
   1374  1.24.6.2  yamt 	int npages = *count;
   1375  1.24.6.2  yamt 
   1376  1.24.6.2  yamt 	KASSERT(vp->v_type == VREG);
   1377  1.24.6.2  yamt 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1378  1.24.6.2  yamt 
   1379  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1380  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
   1381  1.24.6.2  yamt 
   1382  1.24.6.2  yamt 	/* We currently don't rely on PGO_PASTEOF. */
   1383  1.24.6.2  yamt 
   1384  1.24.6.2  yamt 	if (vp->v_size <= offset + (centeridx << PAGE_SHIFT)) {
   1385  1.24.6.2  yamt 		if ((flags & PGO_LOCKED) == 0)
   1386  1.24.6.2  yamt 			simple_unlock(&vp->v_interlock);
   1387  1.24.6.2  yamt 		return EINVAL;
   1388  1.24.6.2  yamt 	}
   1389  1.24.6.2  yamt 
   1390  1.24.6.2  yamt 	if (vp->v_size < offset + (npages << PAGE_SHIFT)) {
   1391  1.24.6.2  yamt 		npages = (round_page(vp->v_size) - offset) >> PAGE_SHIFT;
   1392  1.24.6.2  yamt 	}
   1393  1.24.6.2  yamt 
   1394  1.24.6.2  yamt 	if ((flags & PGO_LOCKED) != 0)
   1395  1.24.6.2  yamt 		return EBUSY;
   1396  1.24.6.2  yamt 
   1397  1.24.6.2  yamt 	if ((flags & PGO_NOTIMESTAMP) == 0) {
   1398  1.24.6.2  yamt 		if ((vp->v_mount->mnt_flag & MNT_NOATIME) == 0)
   1399  1.24.6.2  yamt 			node->tn_status |= TMPFS_NODE_ACCESSED;
   1400  1.24.6.2  yamt 
   1401  1.24.6.2  yamt 		if ((access_type & VM_PROT_WRITE) != 0)
   1402  1.24.6.2  yamt 			node->tn_status |= TMPFS_NODE_MODIFIED;
   1403  1.24.6.2  yamt 	}
   1404  1.24.6.2  yamt 
   1405  1.24.6.2  yamt 	simple_unlock(&vp->v_interlock);
   1406  1.24.6.2  yamt 
   1407  1.24.6.3  yamt 	/*
   1408  1.24.6.3  yamt 	 * Make sure that the array on which we will store the
   1409  1.24.6.3  yamt 	 * gotten pages is clean.  Otherwise uao_get (pointed to by
   1410  1.24.6.3  yamt 	 * the pgo_get below) gets confused and does not return the
   1411  1.24.6.3  yamt 	 * appropriate pages.
   1412  1.24.6.3  yamt 	 *
   1413  1.24.6.3  yamt 	 * XXX This shall be revisited when kern/32166 is addressed
   1414  1.24.6.3  yamt 	 * because the loop to clean m[i] will most likely be redundant
   1415  1.24.6.3  yamt 	 * as well as the PGO_ALLPAGES flag.
   1416  1.24.6.3  yamt 	 */
   1417  1.24.6.3  yamt 	if (m != NULL)
   1418  1.24.6.3  yamt 		for (i = 0; i < npages; i++)
   1419  1.24.6.3  yamt 			m[i] = NULL;
   1420  1.24.6.2  yamt 	simple_lock(&uobj->vmobjlock);
   1421  1.24.6.2  yamt 	error = (*uobj->pgops->pgo_get)(uobj, offset, m, &npages, centeridx,
   1422  1.24.6.3  yamt 	    access_type, advice, flags | PGO_ALLPAGES);
   1423  1.24.6.3  yamt #if defined(DEBUG)
   1424  1.24.6.3  yamt 	{
   1425  1.24.6.3  yamt 		/* Make sure that all the pages we return are valid. */
   1426  1.24.6.3  yamt 		int dbgi;
   1427  1.24.6.3  yamt 		if (error == 0 && m != NULL)
   1428  1.24.6.3  yamt 			for (dbgi = 0; dbgi < npages; dbgi++)
   1429  1.24.6.3  yamt 				KASSERT(m[dbgi] != NULL);
   1430  1.24.6.3  yamt 	}
   1431  1.24.6.3  yamt #endif
   1432  1.24.6.2  yamt 
   1433  1.24.6.2  yamt 	return error;
   1434  1.24.6.2  yamt }
   1435  1.24.6.2  yamt 
   1436  1.24.6.2  yamt /* --------------------------------------------------------------------- */
   1437  1.24.6.2  yamt 
   1438  1.24.6.2  yamt int
   1439  1.24.6.2  yamt tmpfs_putpages(void *v)
   1440  1.24.6.2  yamt {
   1441  1.24.6.2  yamt 	struct vnode *vp = ((struct vop_putpages_args *)v)->a_vp;
   1442  1.24.6.2  yamt 	voff_t offlo = ((struct vop_putpages_args *)v)->a_offlo;
   1443  1.24.6.2  yamt 	voff_t offhi = ((struct vop_putpages_args *)v)->a_offhi;
   1444  1.24.6.2  yamt 	int flags = ((struct vop_putpages_args *)v)->a_flags;
   1445  1.24.6.2  yamt 
   1446  1.24.6.2  yamt 	int error;
   1447  1.24.6.2  yamt 	struct tmpfs_node *node;
   1448  1.24.6.2  yamt 	struct uvm_object *uobj;
   1449  1.24.6.2  yamt 
   1450  1.24.6.2  yamt 	LOCK_ASSERT(simple_lock_held(&vp->v_interlock));
   1451  1.24.6.2  yamt 
   1452  1.24.6.2  yamt 	node = VP_TO_TMPFS_NODE(vp);
   1453  1.24.6.2  yamt 
   1454  1.24.6.2  yamt 	if (vp->v_type != VREG) {
   1455  1.24.6.2  yamt 		simple_unlock(&vp->v_interlock);
   1456  1.24.6.2  yamt 		return 0;
   1457  1.24.6.2  yamt 	}
   1458  1.24.6.2  yamt 
   1459  1.24.6.2  yamt 	uobj = node->tn_spec.tn_reg.tn_aobj;
   1460  1.24.6.2  yamt 	simple_unlock(&vp->v_interlock);
   1461  1.24.6.2  yamt 
   1462  1.24.6.2  yamt 	simple_lock(&uobj->vmobjlock);
   1463  1.24.6.2  yamt 	error = (*uobj->pgops->pgo_put)(uobj, offlo, offhi, flags);
   1464  1.24.6.2  yamt 
   1465  1.24.6.2  yamt 	/* XXX mtime */
   1466  1.24.6.2  yamt 
   1467  1.24.6.2  yamt 	return error;
   1468  1.24.6.2  yamt }
   1469