kernel -- tmpfs: Mark tmpfs_write MPSAFE.
[dragonfly.git] / sys / vfs / tmpfs / tmpfs_vnops.c
CommitLineData
7a2de9a4
MD
1/*-
2 * Copyright (c) 2005, 2006 The NetBSD Foundation, Inc.
3 * All rights reserved.
4 *
5 * This code is derived from software contributed to The NetBSD Foundation
6 * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
7 * 2005 program.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
19 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
20 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
21 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
22 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
80ae59d7
MD
29 *
30 * $NetBSD: tmpfs_vnops.c,v 1.39 2007/07/23 15:41:01 jmmv Exp $
7a2de9a4
MD
31 */
32
33/*
34 * tmpfs vnode interface.
35 */
7a2de9a4
MD
36
37#include <sys/kernel.h>
38#include <sys/kern_syscall.h>
39#include <sys/param.h>
40#include <sys/fcntl.h>
41#include <sys/lockf.h>
42#include <sys/priv.h>
43#include <sys/proc.h>
44#include <sys/resourcevar.h>
45#include <sys/sched.h>
7a2de9a4
MD
46#include <sys/stat.h>
47#include <sys/systm.h>
48#include <sys/unistd.h>
49#include <sys/vfsops.h>
50#include <sys/vnode.h>
51
52#include <sys/mplock2.h>
53
54#include <vm/vm.h>
55#include <vm/vm_object.h>
56#include <vm/vm_page.h>
57#include <vm/vm_pager.h>
b7545cb3 58#include <vm/swap_pager.h>
7a2de9a4
MD
59
60#include <vfs/fifofs/fifo.h>
61#include <vfs/tmpfs/tmpfs_vnops.h>
62#include <vfs/tmpfs/tmpfs.h>
63
64MALLOC_DECLARE(M_TMPFS);
65
80ae59d7
MD
66static __inline
67void
68tmpfs_knote(struct vnode *vp, int flags)
69{
70 if (flags)
71 KNOTE(&vp->v_pollinfo.vpi_kqinfo.ki_note, flags);
72}
73
74
7a2de9a4
MD
75/* --------------------------------------------------------------------- */
76
77static int
78tmpfs_nresolve(struct vop_nresolve_args *v)
79{
80 struct vnode *dvp = v->a_dvp;
81 struct vnode *vp = NULL;
82 struct namecache *ncp = v->a_nch->ncp;
d89ce96a 83 struct tmpfs_node *tnode;
7a2de9a4
MD
84
85 int error;
86 struct tmpfs_dirent *de;
87 struct tmpfs_node *dnode;
88
89 dnode = VP_TO_TMPFS_DIR(dvp);
90
7a2de9a4
MD
91 de = tmpfs_dir_lookup(dnode, NULL, ncp);
92 if (de == NULL) {
d89ce96a 93 error = ENOENT;
7a2de9a4 94 } else {
d89ce96a
MD
95 /*
96 * Allocate a vnode for the node we found.
97 */
7a2de9a4 98 tnode = de->td_node;
7a2de9a4 99 error = tmpfs_alloc_vp(dvp->v_mount, tnode,
d89ce96a
MD
100 LK_EXCLUSIVE | LK_RETRY, &vp);
101 if (error)
7a2de9a4 102 goto out;
d89ce96a 103 KKASSERT(vp);
7a2de9a4
MD
104 }
105
7a2de9a4 106out:
d89ce96a
MD
107 /*
108 * Store the result of this lookup in the cache. Avoid this if the
7a2de9a4 109 * request was for creation, as it does not improve timings on
d89ce96a
MD
110 * emprical tests.
111 */
7a2de9a4
MD
112 if (vp) {
113 vn_unlock(vp);
114 cache_setvp(v->a_nch, vp);
115 vrele(vp);
d89ce96a 116 } else if (error == ENOENT) {
7a2de9a4
MD
117 cache_setvp(v->a_nch, NULL);
118 }
119 return error;
120}
121
122static int
123tmpfs_nlookupdotdot(struct vop_nlookupdotdot_args *v)
124{
125 struct vnode *dvp = v->a_dvp;
126 struct vnode **vpp = v->a_vpp;
127 struct tmpfs_node *dnode = VP_TO_TMPFS_NODE(dvp);
128 struct ucred *cred = v->a_cred;
129 int error;
130
131 *vpp = NULL;
132 /* Check accessibility of requested node as a first step. */
133 error = VOP_ACCESS(dvp, VEXEC, cred);
134 if (error != 0)
135 return error;
136
137 if (dnode->tn_dir.tn_parent != NULL) {
138 /* Allocate a new vnode on the matching entry. */
139 error = tmpfs_alloc_vp(dvp->v_mount, dnode->tn_dir.tn_parent,
140 LK_EXCLUSIVE | LK_RETRY, vpp);
141
142 if (*vpp)
143 vn_unlock(*vpp);
144 }
145
146 return (*vpp == NULL) ? ENOENT : 0;
147}
148
149/* --------------------------------------------------------------------- */
150
151static int
152tmpfs_ncreate(struct vop_ncreate_args *v)
153{
154 struct vnode *dvp = v->a_dvp;
155 struct vnode **vpp = v->a_vpp;
156 struct namecache *ncp = v->a_nch->ncp;
157 struct vattr *vap = v->a_vap;
158 struct ucred *cred = v->a_cred;
159 int error;
160
161 KKASSERT(vap->va_type == VREG || vap->va_type == VSOCK);
162
7a2de9a4
MD
163 error = tmpfs_alloc_file(dvp, vpp, vap, ncp, cred, NULL);
164 if (error == 0) {
165 cache_setunresolved(v->a_nch);
166 cache_setvp(v->a_nch, *vpp);
80ae59d7 167 tmpfs_knote(dvp, NOTE_WRITE);
7a2de9a4 168 }
7a2de9a4
MD
169
170 return error;
171}
172/* --------------------------------------------------------------------- */
173
174static int
175tmpfs_nmknod(struct vop_nmknod_args *v)
176{
177 struct vnode *dvp = v->a_dvp;
178 struct vnode **vpp = v->a_vpp;
179 struct namecache *ncp = v->a_nch->ncp;
180 struct vattr *vap = v->a_vap;
181 struct ucred *cred = v->a_cred;
182 int error;
183
184 if (vap->va_type != VBLK && vap->va_type != VCHR &&
185 vap->va_type != VFIFO)
186 return EINVAL;
187
7a2de9a4
MD
188 error = tmpfs_alloc_file(dvp, vpp, vap, ncp, cred, NULL);
189 if (error == 0) {
190 cache_setunresolved(v->a_nch);
191 cache_setvp(v->a_nch, *vpp);
80ae59d7 192 tmpfs_knote(dvp, NOTE_WRITE);
7a2de9a4 193 }
7a2de9a4
MD
194
195 return error;
196}
197
198/* --------------------------------------------------------------------- */
199
200static int
201tmpfs_open(struct vop_open_args *v)
202{
203 struct vnode *vp = v->a_vp;
204 int mode = v->a_mode;
205
206 int error;
207 struct tmpfs_node *node;
208
7a2de9a4
MD
209 node = VP_TO_TMPFS_NODE(vp);
210
211 /* The file is still active but all its names have been removed
212 * (e.g. by a "rmdir $(pwd)"). It cannot be opened any more as
213 * it is about to die. */
214 if (node->tn_links < 1)
215 return (ENOENT);
216
217 /* If the file is marked append-only, deny write requests. */
630e3a33
MD
218 if ((node->tn_flags & APPEND) &&
219 (mode & (FWRITE | O_APPEND)) == FWRITE) {
7a2de9a4 220 error = EPERM;
630e3a33 221 } else {
7a2de9a4
MD
222 return (vop_stdopen(v));
223 }
7a2de9a4
MD
224 return error;
225}
226
227/* --------------------------------------------------------------------- */
228
229static int
230tmpfs_close(struct vop_close_args *v)
231{
232 struct vnode *vp = v->a_vp;
233 struct tmpfs_node *node;
234
235 node = VP_TO_TMPFS_NODE(vp);
236
237 if (node->tn_links > 0) {
238 /* Update node times. No need to do it if the node has
239 * been deleted, because it will vanish after we return. */
240 tmpfs_update(vp);
241 }
242
243 return vop_stdclose(v);
244}
245
246/* --------------------------------------------------------------------- */
247
248int
249tmpfs_access(struct vop_access_args *v)
250{
251 struct vnode *vp = v->a_vp;
252 int error;
253 struct tmpfs_node *node;
254
7a2de9a4
MD
255 node = VP_TO_TMPFS_NODE(vp);
256
257 switch (vp->v_type) {
258 case VDIR:
259 /* FALLTHROUGH */
260 case VLNK:
261 /* FALLTHROUGH */
262 case VREG:
5a9e9ac7 263 if ((v->a_mode & VWRITE) && (vp->v_mount->mnt_flag & MNT_RDONLY)) {
7a2de9a4
MD
264 error = EROFS;
265 goto out;
266 }
267 break;
268
269 case VBLK:
270 /* FALLTHROUGH */
271 case VCHR:
272 /* FALLTHROUGH */
273 case VSOCK:
274 /* FALLTHROUGH */
275 case VFIFO:
276 break;
277
278 default:
279 error = EINVAL;
280 goto out;
281 }
282
5a9e9ac7 283 if ((v->a_mode & VWRITE) && (node->tn_flags & IMMUTABLE)) {
7a2de9a4
MD
284 error = EPERM;
285 goto out;
286 }
287
288 error = vop_helper_access(v, node->tn_uid, node->tn_gid, node->tn_mode, 0);
289
290out:
291
292 return error;
293}
294
295/* --------------------------------------------------------------------- */
296
297int
298tmpfs_getattr(struct vop_getattr_args *v)
299{
300 struct vnode *vp = v->a_vp;
301 struct vattr *vap = v->a_vap;
7a2de9a4 302 struct tmpfs_node *node;
7a2de9a4
MD
303
304 node = VP_TO_TMPFS_NODE(vp);
305
e575e508 306 lwkt_gettoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
307 tmpfs_update(vp);
308
309 vap->va_type = vp->v_type;
310 vap->va_mode = node->tn_mode;
311 vap->va_nlink = node->tn_links;
312 vap->va_uid = node->tn_uid;
313 vap->va_gid = node->tn_gid;
314 vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
315 vap->va_fileid = node->tn_id;
316 vap->va_size = node->tn_size;
317 vap->va_blocksize = PAGE_SIZE;
318 vap->va_atime.tv_sec = node->tn_atime;
319 vap->va_atime.tv_nsec = node->tn_atimensec;
320 vap->va_mtime.tv_sec = node->tn_mtime;
321 vap->va_mtime.tv_nsec = node->tn_mtimensec;
322 vap->va_ctime.tv_sec = node->tn_ctime;
323 vap->va_ctime.tv_nsec = node->tn_ctimensec;
324 vap->va_gen = node->tn_gen;
325 vap->va_flags = node->tn_flags;
326 if (vp->v_type == VBLK || vp->v_type == VCHR)
327 {
328 vap->va_rmajor = umajor(node->tn_rdev);
329 vap->va_rminor = uminor(node->tn_rdev);
330 }
331 vap->va_bytes = round_page(node->tn_size);
332 vap->va_filerev = 0;
333
e575e508
VS
334 lwkt_reltoken(&vp->v_mount->mnt_token);
335
7a2de9a4
MD
336 return 0;
337}
338
339/* --------------------------------------------------------------------- */
340
341int
342tmpfs_setattr(struct vop_setattr_args *v)
343{
344 struct vnode *vp = v->a_vp;
345 struct vattr *vap = v->a_vap;
346 struct ucred *cred = v->a_cred;
80ae59d7 347 struct tmpfs_node *node = VP_TO_TMPFS_NODE(vp);
7a2de9a4 348 int error = 0;
80ae59d7 349 int kflags = 0;
7a2de9a4 350
80ae59d7 351 if (error == 0 && (vap->va_flags != VNOVAL)) {
7a2de9a4 352 error = tmpfs_chflags(vp, vap->va_flags, cred);
80ae59d7
MD
353 kflags |= NOTE_ATTRIB;
354 }
7a2de9a4 355
80ae59d7
MD
356 if (error == 0 && (vap->va_size != VNOVAL)) {
357 if (vap->va_size > node->tn_size)
358 kflags |= NOTE_WRITE | NOTE_EXTEND;
359 else
360 kflags |= NOTE_WRITE;
7a2de9a4 361 error = tmpfs_chsize(vp, vap->va_size, cred);
80ae59d7 362 }
7a2de9a4 363
d89ce96a
MD
364 if (error == 0 && (vap->va_uid != (uid_t)VNOVAL ||
365 vap->va_gid != (gid_t)VNOVAL)) {
7a2de9a4 366 error = tmpfs_chown(vp, vap->va_uid, vap->va_gid, cred);
80ae59d7 367 kflags |= NOTE_ATTRIB;
d89ce96a 368 }
7a2de9a4 369
80ae59d7 370 if (error == 0 && (vap->va_mode != (mode_t)VNOVAL)) {
7a2de9a4 371 error = tmpfs_chmod(vp, vap->va_mode, cred);
80ae59d7
MD
372 kflags |= NOTE_ATTRIB;
373 }
7a2de9a4
MD
374
375 if (error == 0 && ((vap->va_atime.tv_sec != VNOVAL &&
376 vap->va_atime.tv_nsec != VNOVAL) ||
377 (vap->va_mtime.tv_sec != VNOVAL &&
d89ce96a 378 vap->va_mtime.tv_nsec != VNOVAL) )) {
7a2de9a4 379 error = tmpfs_chtimes(vp, &vap->va_atime, &vap->va_mtime,
d89ce96a 380 vap->va_vaflags, cred);
80ae59d7 381 kflags |= NOTE_ATTRIB;
d89ce96a 382 }
7a2de9a4
MD
383
384 /* Update the node times. We give preference to the error codes
385 * generated by this function rather than the ones that may arise
386 * from tmpfs_update. */
387 tmpfs_update(vp);
80ae59d7 388 tmpfs_knote(vp, kflags);
7a2de9a4 389
7a2de9a4
MD
390 return error;
391}
392
393/* --------------------------------------------------------------------- */
394
9fc94b5f 395/*
630e3a33
MD
396 * fsync is usually a NOP, but we must take action when unmounting or
397 * when recycling.
9fc94b5f 398 */
7a2de9a4
MD
399static int
400tmpfs_fsync(struct vop_fsync_args *v)
401{
9fc94b5f 402 struct tmpfs_mount *tmp;
630e3a33 403 struct tmpfs_node *node;
7a2de9a4
MD
404 struct vnode *vp = v->a_vp;
405
9fc94b5f 406 tmp = VFS_TO_TMPFS(vp->v_mount);
630e3a33
MD
407 node = VP_TO_TMPFS_NODE(vp);
408
409 tmpfs_update(vp);
410 if (vp->v_type == VREG) {
d4623db3 411 if (vp->v_flag & VRECLAIMED) {
630e3a33
MD
412 if (node->tn_links == 0)
413 tmpfs_truncate(vp, 0);
414 else
415 vfsync(v->a_vp, v->a_waitfor, 1, NULL, NULL);
416 }
9fc94b5f 417 }
7a2de9a4
MD
418 return 0;
419}
420
421/* --------------------------------------------------------------------- */
422
423static int
424tmpfs_read (struct vop_read_args *ap)
425{
426 struct buf *bp;
427 struct vnode *vp = ap->a_vp;
428 struct uio *uio = ap->a_uio;
429 struct tmpfs_node *node;
7a2de9a4 430 off_t base_offset;
9fc94b5f 431 size_t offset;
7a2de9a4 432 size_t len;
9fc94b5f 433 int error;
7a2de9a4
MD
434
435 error = 0;
436 if (uio->uio_resid == 0) {
437 return error;
438 }
439
440 node = VP_TO_TMPFS_NODE(vp);
441
442 if (uio->uio_offset < 0)
443 return (EINVAL);
444 if (vp->v_type != VREG)
445 return (EINVAL);
446
7a2de9a4
MD
447 while (uio->uio_resid > 0 && uio->uio_offset < node->tn_size) {
448 /*
449 * Use buffer cache I/O (via tmpfs_strategy)
450 */
9fc94b5f 451 offset = (size_t)uio->uio_offset & BMASK;
7a2de9a4 452 base_offset = (off_t)uio->uio_offset - offset;
72d6a027 453 bp = getcacheblk(vp, base_offset, BSIZE);
7a2de9a4
MD
454 if (bp == NULL)
455 {
b403e861 456 lwkt_gettoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
457 error = bread(vp, base_offset, BSIZE, &bp);
458 if (error) {
459 brelse(bp);
b403e861 460 lwkt_reltoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
461 kprintf("tmpfs_read bread error %d\n", error);
462 break;
463 }
b403e861 464 lwkt_reltoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
465 }
466
7a2de9a4
MD
467 /*
468 * Figure out how many bytes we can actually copy this loop.
469 */
470 len = BSIZE - offset;
471 if (len > uio->uio_resid)
472 len = uio->uio_resid;
473 if (len > node->tn_size - uio->uio_offset)
474 len = (size_t)(node->tn_size - uio->uio_offset);
475
476 error = uiomove((char *)bp->b_data + offset, len, uio);
477 bqrelse(bp);
478 if (error) {
479 kprintf("tmpfs_read uiomove error %d\n", error);
480 break;
481 }
482 }
483
7a2de9a4
MD
484 TMPFS_NODE_LOCK(node);
485 node->tn_status |= TMPFS_NODE_ACCESSED;
486 TMPFS_NODE_UNLOCK(node);
487
7a2de9a4
MD
488 return(error);
489}
490
491static int
492tmpfs_write (struct vop_write_args *ap)
493{
494 struct buf *bp;
495 struct vnode *vp = ap->a_vp;
496 struct uio *uio = ap->a_uio;
497 struct thread *td = uio->uio_td;
498 struct tmpfs_node *node;
499 boolean_t extended;
500 off_t oldsize;
501 int error;
7a2de9a4 502 off_t base_offset;
9fc94b5f 503 size_t offset;
7a2de9a4
MD
504 size_t len;
505 struct rlimit limit;
7a2de9a4 506 int trivial = 0;
80ae59d7 507 int kflags = 0;
7a2de9a4
MD
508
509 error = 0;
510 if (uio->uio_resid == 0) {
511 return error;
512 }
513
514 node = VP_TO_TMPFS_NODE(vp);
515
516 if (vp->v_type != VREG)
517 return (EINVAL);
518
1be4932c
VS
519 lwkt_gettoken(&vp->v_mount->mnt_token);
520
7a2de9a4
MD
521 oldsize = node->tn_size;
522 if (ap->a_ioflag & IO_APPEND)
523 uio->uio_offset = node->tn_size;
524
525 /*
526 * Check for illegal write offsets.
527 */
528 if (uio->uio_offset + uio->uio_resid >
1be4932c
VS
529 VFS_TO_TMPFS(vp->v_mount)->tm_maxfilesize) {
530 lwkt_reltoken(&vp->v_mount->mnt_token);
7a2de9a4 531 return (EFBIG);
1be4932c 532 }
7a2de9a4
MD
533
534 if (vp->v_type == VREG && td != NULL) {
535 error = kern_getrlimit(RLIMIT_FSIZE, &limit);
1be4932c
VS
536 if (error != 0) {
537 lwkt_reltoken(&vp->v_mount->mnt_token);
7a2de9a4 538 return error;
1be4932c 539 }
7a2de9a4
MD
540 if (uio->uio_offset + uio->uio_resid > limit.rlim_cur) {
541 ksignal(td->td_proc, SIGXFSZ);
1be4932c 542 lwkt_reltoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
543 return (EFBIG);
544 }
545 }
546
547
548 /*
549 * Extend the file's size if necessary
550 */
9fc94b5f 551 extended = ((uio->uio_offset + uio->uio_resid) > node->tn_size);
7a2de9a4 552
b5d16701
MD
553 get_mplock();
554
7a2de9a4
MD
555 while (uio->uio_resid > 0) {
556 /*
557 * Use buffer cache I/O (via tmpfs_strategy)
558 */
9fc94b5f 559 offset = (size_t)uio->uio_offset & BMASK;
7a2de9a4
MD
560 base_offset = (off_t)uio->uio_offset - offset;
561 len = BSIZE - offset;
562 if (len > uio->uio_resid)
563 len = uio->uio_resid;
564
565 if ((uio->uio_offset + len) > node->tn_size) {
9fc94b5f 566 trivial = (uio->uio_offset <= node->tn_size);
7a2de9a4
MD
567 error = tmpfs_reg_resize(vp, uio->uio_offset + len, trivial);
568 if (error)
569 break;
570 }
571
9fc94b5f
MD
572 /*
573 * Read to fill in any gaps. Theoretically we could
574 * optimize this if the write covers the entire buffer
575 * and is not a UIO_NOCOPY write, however this can lead
576 * to a security violation exposing random kernel memory
577 * (whatever junk was in the backing VM pages before).
578 *
579 * So just use bread() to do the right thing.
580 */
581 error = bread(vp, base_offset, BSIZE, &bp);
7a2de9a4
MD
582 error = uiomove((char *)bp->b_data + offset, len, uio);
583 if (error) {
584 kprintf("tmpfs_write uiomove error %d\n", error);
585 brelse(bp);
586 break;
587 }
588
80ae59d7 589 if (uio->uio_offset > node->tn_size) {
7a2de9a4 590 node->tn_size = uio->uio_offset;
80ae59d7
MD
591 kflags |= NOTE_EXTEND;
592 }
593 kflags |= NOTE_WRITE;
7a2de9a4
MD
594
595 /*
9fc94b5f 596 * The data has been loaded into the buffer, write it out.
7a2de9a4 597 *
9fc94b5f
MD
598 * We want tmpfs to be able to use all available ram, not
599 * just the buffer cache, so if not explicitly paging we
600 * use buwrite() to leave the buffer clean but mark all the
601 * VM pages valid+dirty.
7a2de9a4 602 *
d89ce96a
MD
603 * When the kernel is paging, either via normal pageout
604 * operation or when cleaning the object during a recycle,
605 * the underlying VM pages are going to get thrown away
606 * so we MUST write them to swap.
607 *
608 * XXX unfortunately this catches msync() system calls too
609 * for the moment.
7a2de9a4 610 */
b7545cb3
AH
611 if (vm_swap_size == 0) {
612 /*
613 * if swap isn't configured yet, force a buwrite() to
614 * avoid problems further down the line, due to flushing
615 * to swap.
616 */
9fc94b5f 617 buwrite(bp);
b7545cb3
AH
618 } else {
619 if (ap->a_ioflag & IO_SYNC) {
620 bwrite(bp);
621 } else if ((ap->a_ioflag & IO_ASYNC) ||
622 (uio->uio_segflg == UIO_NOCOPY)) {
623 bawrite(bp);
624 } else {
625 buwrite(bp);
626 }
d89ce96a 627 }
9fc94b5f 628
7a2de9a4 629 if (bp->b_error) {
2cd8c774 630 kprintf("tmpfs_write bwrite error %d\n", bp->b_error);
7a2de9a4
MD
631 break;
632 }
633 }
7a2de9a4 634
b5d16701 635 rel_mplock();
7a2de9a4
MD
636
637 if (error) {
80ae59d7 638 if (extended) {
7a2de9a4 639 (void)tmpfs_reg_resize(vp, oldsize, trivial);
80ae59d7
MD
640 kflags &= ~NOTE_EXTEND;
641 }
642 goto done;
7a2de9a4
MD
643 }
644
645 TMPFS_NODE_LOCK(node);
646 node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_MODIFIED |
647 (extended? TMPFS_NODE_CHANGED : 0);
648
649 if (node->tn_mode & (S_ISUID | S_ISGID)) {
650 if (priv_check_cred(ap->a_cred, PRIV_VFS_RETAINSUGID, 0))
651 node->tn_mode &= ~(S_ISUID | S_ISGID);
652 }
653 TMPFS_NODE_UNLOCK(node);
80ae59d7 654done:
7a2de9a4 655
80ae59d7 656 tmpfs_knote(vp, kflags);
1be4932c
VS
657
658
659 lwkt_reltoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
660 return(error);
661}
662
663static int
664tmpfs_advlock (struct vop_advlock_args *ap)
665{
666 struct tmpfs_node *node;
667 struct vnode *vp = ap->a_vp;
668
669 node = VP_TO_TMPFS_NODE(vp);
670
671 return (lf_advlock(ap, &node->tn_advlock, node->tn_size));
672}
673
7a2de9a4
MD
674static int
675tmpfs_strategy(struct vop_strategy_args *ap)
676{
677 struct bio *bio = ap->a_bio;
9fc94b5f 678 struct buf *bp = bio->bio_buf;
7a2de9a4
MD
679 struct vnode *vp = ap->a_vp;
680 struct tmpfs_node *node;
681 vm_object_t uobj;
682
9fc94b5f
MD
683 if (vp->v_type != VREG) {
684 bp->b_resid = bp->b_bcount;
685 bp->b_flags |= B_ERROR | B_INVAL;
686 bp->b_error = EINVAL;
687 biodone(bio);
688 return(0);
689 }
7a2de9a4 690
d1f61aa2 691 lwkt_gettoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
692 node = VP_TO_TMPFS_NODE(vp);
693
694 uobj = node->tn_reg.tn_aobj;
9fc94b5f 695
7a2de9a4 696 /*
9fc94b5f
MD
697 * Call swap_pager_strategy to read or write between the VM
698 * object and the buffer cache.
7a2de9a4
MD
699 */
700 swap_pager_strategy(uobj, bio);
701
d1f61aa2 702 lwkt_reltoken(&vp->v_mount->mnt_token);
7a2de9a4
MD
703 return 0;
704}
705
706static int
707tmpfs_bmap(struct vop_bmap_args *ap)
708{
709 if (ap->a_doffsetp != NULL)
710 *ap->a_doffsetp = ap->a_loffset;
711 if (ap->a_runp != NULL)
712 *ap->a_runp = 0;
713 if (ap->a_runb != NULL)
714 *ap->a_runb = 0;
715
716 return 0;
717}
9fc94b5f 718
7a2de9a4
MD
719/* --------------------------------------------------------------------- */
720
721static int
722tmpfs_nremove(struct vop_nremove_args *v)
723{
724 struct vnode *dvp = v->a_dvp;
725 struct namecache *ncp = v->a_nch->ncp;
9fc94b5f 726 struct vnode *vp;
7a2de9a4
MD
727 int error;
728 struct tmpfs_dirent *de;
729 struct tmpfs_mount *tmp;
730 struct tmpfs_node *dnode;
731 struct tmpfs_node *node;
732
9fc94b5f
MD
733 /*
734 * We have to acquire the vp from v->a_nch because
735 * we will likely unresolve the namecache entry, and
736 * a vrele is needed to trigger the tmpfs_inactive/tmpfs_reclaim
737 * sequence to recover space from the file.
738 */
739 error = cache_vref(v->a_nch, v->a_cred, &vp);
740 KKASSERT(error == 0);
7a2de9a4
MD
741
742 if (vp->v_type == VDIR) {
743 error = EISDIR;
744 goto out;
745 }
746
747 dnode = VP_TO_TMPFS_DIR(dvp);
748 node = VP_TO_TMPFS_NODE(vp);
749 tmp = VFS_TO_TMPFS(vp->v_mount);
750 de = tmpfs_dir_lookup(dnode, node, ncp);
751 if (de == NULL) {
752 error = ENOENT;
753 goto out;
754 }
755
756 /* Files marked as immutable or append-only cannot be deleted. */
757 if ((node->tn_flags & (IMMUTABLE | APPEND | NOUNLINK)) ||
758 (dnode->tn_flags & APPEND)) {
759 error = EPERM;
760 goto out;
761 }
762
763 /* Remove the entry from the directory; as it is a file, we do not
764 * have to change the number of hard links of the directory. */
22d3b394 765 tmpfs_dir_detach(dnode, de);
7a2de9a4
MD
766
767 /* Free the directory entry we just deleted. Note that the node
768 * referred by it will not be removed until the vnode is really
769 * reclaimed. */
0786baf1 770 tmpfs_free_dirent(tmp, de);
7a2de9a4
MD
771
772 if (node->tn_links > 0) {
773 TMPFS_NODE_LOCK(node);
774 node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
775 TMPFS_NODE_MODIFIED;
776 TMPFS_NODE_UNLOCK(node);
777 }
778
779 cache_setunresolved(v->a_nch);
780 cache_setvp(v->a_nch, NULL);
80ae59d7 781 tmpfs_knote(vp, NOTE_DELETE);
9fc94b5f 782 /*cache_inval_vp(vp, CINV_DESTROY);*/
80ae59d7 783 tmpfs_knote(dvp, NOTE_WRITE);
7a2de9a4
MD
784 error = 0;
785
7a2de9a4 786out:
9fc94b5f 787 vrele(vp);
7a2de9a4
MD
788
789 return error;
790}
791
792/* --------------------------------------------------------------------- */
793
794static int
795tmpfs_nlink(struct vop_nlink_args *v)
796{
797 struct vnode *dvp = v->a_dvp;
798 struct vnode *vp = v->a_vp;
799 struct namecache *ncp = v->a_nch->ncp;
7a2de9a4
MD
800 struct tmpfs_dirent *de;
801 struct tmpfs_node *node;
22d3b394
MD
802 struct tmpfs_node *dnode;
803 int error;
7a2de9a4 804
7a2de9a4
MD
805 KKASSERT(dvp != vp); /* XXX When can this be false? */
806
807 node = VP_TO_TMPFS_NODE(vp);
22d3b394 808 dnode = VP_TO_TMPFS_NODE(dvp);
7a2de9a4
MD
809
810 /* XXX: Why aren't the following two tests done by the caller? */
811
812 /* Hard links of directories are forbidden. */
813 if (vp->v_type == VDIR) {
814 error = EPERM;
815 goto out;
816 }
817
818 /* Cannot create cross-device links. */
819 if (dvp->v_mount != vp->v_mount) {
820 error = EXDEV;
821 goto out;
822 }
823
824 /* Ensure that we do not overflow the maximum number of links imposed
825 * by the system. */
826 KKASSERT(node->tn_links <= LINK_MAX);
827 if (node->tn_links == LINK_MAX) {
828 error = EMLINK;
829 goto out;
830 }
831
832 /* We cannot create links of files marked immutable or append-only. */
833 if (node->tn_flags & (IMMUTABLE | APPEND)) {
834 error = EPERM;
835 goto out;
836 }
837
838 /* Allocate a new directory entry to represent the node. */
839 error = tmpfs_alloc_dirent(VFS_TO_TMPFS(vp->v_mount), node,
840 ncp->nc_name, ncp->nc_nlen, &de);
841 if (error != 0)
842 goto out;
843
844 /* Insert the new directory entry into the appropriate directory. */
22d3b394 845 tmpfs_dir_attach(dnode, de);
7a2de9a4
MD
846
847 /* vp link count has changed, so update node times. */
848
849 TMPFS_NODE_LOCK(node);
850 node->tn_status |= TMPFS_NODE_CHANGED;
851 TMPFS_NODE_UNLOCK(node);
852 tmpfs_update(vp);
853
80ae59d7 854 tmpfs_knote(vp, NOTE_LINK);
7a2de9a4
MD
855 cache_setunresolved(v->a_nch);
856 cache_setvp(v->a_nch, vp);
80ae59d7 857 tmpfs_knote(dvp, NOTE_WRITE);
7a2de9a4
MD
858 error = 0;
859
860out:
7a2de9a4
MD
861 return error;
862}
863
864/* --------------------------------------------------------------------- */
865
866static int
867tmpfs_nrename(struct vop_nrename_args *v)
868{
869 struct vnode *fdvp = v->a_fdvp;
870 struct namecache *fncp = v->a_fnch->ncp;
871 struct vnode *fvp = fncp->nc_vp;
872 struct vnode *tdvp = v->a_tdvp;
873 struct namecache *tncp = v->a_tnch->ncp;
874 struct vnode *tvp = tncp->nc_vp;
7a2de9a4
MD
875 struct tmpfs_dirent *de;
876 struct tmpfs_mount *tmp;
877 struct tmpfs_node *fdnode;
878 struct tmpfs_node *fnode;
879 struct tmpfs_node *tnode;
880 struct tmpfs_node *tdnode;
22d3b394 881 char *newname;
dca262fb 882 char *oldname;
22d3b394 883 int error;
7a2de9a4 884
7a2de9a4
MD
885 tnode = (tvp == NULL) ? NULL : VP_TO_TMPFS_NODE(tvp);
886
887 /* Disallow cross-device renames.
888 * XXX Why isn't this done by the caller? */
889 if (fvp->v_mount != tdvp->v_mount ||
890 (tvp != NULL && fvp->v_mount != tvp->v_mount)) {
891 error = EXDEV;
892 goto out;
893 }
894
895 tmp = VFS_TO_TMPFS(tdvp->v_mount);
896 tdnode = VP_TO_TMPFS_DIR(tdvp);
897
898 /* If source and target are the same file, there is nothing to do. */
899 if (fvp == tvp) {
900 error = 0;
901 goto out;
902 }
903
7a2de9a4
MD
904 fdnode = VP_TO_TMPFS_DIR(fdvp);
905 fnode = VP_TO_TMPFS_NODE(fvp);
906 de = tmpfs_dir_lookup(fdnode, fnode, fncp);
907
908 /* Avoid manipulating '.' and '..' entries. */
909 if (de == NULL) {
910 error = ENOENT;
911 goto out_locked;
912 }
913 KKASSERT(de->td_node == fnode);
914
dca262fb
MD
915 /*
916 * If replacing an entry in the target directory and that entry
917 * is a directory, it must be empty.
918 *
7a2de9a4 919 * Kern_rename gurantees the destination to be a directory
dca262fb
MD
920 * if the source is one (it does?).
921 */
7a2de9a4
MD
922 if (tvp != NULL) {
923 KKASSERT(tnode != NULL);
924
925 if ((tnode->tn_flags & (NOUNLINK | IMMUTABLE | APPEND)) ||
926 (tdnode->tn_flags & (APPEND | IMMUTABLE))) {
927 error = EPERM;
928 goto out_locked;
929 }
930
931 if (fnode->tn_type == VDIR && tnode->tn_type == VDIR) {
932 if (tnode->tn_size > 0) {
933 error = ENOTEMPTY;
934 goto out_locked;
935 }
936 } else if (fnode->tn_type == VDIR && tnode->tn_type != VDIR) {
937 error = ENOTDIR;
938 goto out_locked;
939 } else if (fnode->tn_type != VDIR && tnode->tn_type == VDIR) {
940 error = EISDIR;
941 goto out_locked;
942 } else {
943 KKASSERT(fnode->tn_type != VDIR &&
944 tnode->tn_type != VDIR);
945 }
946 }
947
dca262fb
MD
948 if ((fnode->tn_flags & (NOUNLINK | IMMUTABLE | APPEND)) ||
949 (fdnode->tn_flags & (APPEND | IMMUTABLE))) {
7a2de9a4
MD
950 error = EPERM;
951 goto out_locked;
952 }
953
dca262fb
MD
954 /*
955 * Ensure that we have enough memory to hold the new name, if it
956 * has to be changed.
957 */
7a2de9a4
MD
958 if (fncp->nc_nlen != tncp->nc_nlen ||
959 bcmp(fncp->nc_name, tncp->nc_name, fncp->nc_nlen) != 0) {
d00cd01c 960 newname = kmalloc(tncp->nc_nlen + 1, tmp->tm_name_zone,
42f6f6b1
VS
961 M_WAITOK | M_NULLOK);
962 if (newname == NULL) {
963 error = ENOSPC;
964 goto out_locked;
965 }
dca262fb
MD
966 bcopy(tncp->nc_name, newname, tncp->nc_nlen);
967 newname[tncp->nc_nlen] = '\0';
968 } else {
7a2de9a4 969 newname = NULL;
dca262fb 970 }
7a2de9a4 971
dca262fb
MD
972 /*
973 * Unlink entry from source directory. Note that the kernel has
974 * already checked for illegal recursion cases (renaming a directory
975 * into a subdirectory of itself).
976 */
977 if (fdnode != tdnode)
978 tmpfs_dir_detach(fdnode, de);
979
980 /*
981 * Handle any name change. Swap with newname, we will
982 * deallocate it at the end.
983 */
984 if (newname != NULL) {
985#if 0
986 TMPFS_NODE_LOCK(fnode);
987 fnode->tn_status |= TMPFS_NODE_CHANGED;
988 TMPFS_NODE_UNLOCK(fnode);
989#endif
990 oldname = de->td_name;
991 de->td_name = newname;
992 de->td_namelen = (uint16_t)tncp->nc_nlen;
993 newname = oldname;
994 }
995
996 /*
997 * Link entry to target directory. If the entry
998 * represents a directory move the parent linkage
999 * as well.
1000 */
7a2de9a4 1001 if (fdnode != tdnode) {
7a2de9a4 1002 if (de->td_node->tn_type == VDIR) {
7a2de9a4 1003 TMPFS_VALIDATE_DIR(fnode);
7a2de9a4 1004
7a2de9a4 1005 TMPFS_NODE_LOCK(tdnode);
7a2de9a4 1006 tdnode->tn_links++;
dca262fb
MD
1007 tdnode->tn_status |= TMPFS_NODE_MODIFIED;
1008 TMPFS_NODE_UNLOCK(tdnode);
7a2de9a4 1009
dca262fb
MD
1010 TMPFS_NODE_LOCK(fnode);
1011 fnode->tn_dir.tn_parent = tdnode;
1012 fnode->tn_status |= TMPFS_NODE_CHANGED;
1013 TMPFS_NODE_UNLOCK(fnode);
1014
1015 TMPFS_NODE_LOCK(fdnode);
1016 fdnode->tn_links--;
1017 fdnode->tn_status |= TMPFS_NODE_MODIFIED;
7a2de9a4 1018 TMPFS_NODE_UNLOCK(fdnode);
7a2de9a4 1019 }
22d3b394 1020 tmpfs_dir_attach(tdnode, de);
dca262fb 1021 } else {
7a2de9a4 1022 TMPFS_NODE_LOCK(tdnode);
7a2de9a4 1023 tdnode->tn_status |= TMPFS_NODE_MODIFIED;
7a2de9a4
MD
1024 TMPFS_NODE_UNLOCK(tdnode);
1025 }
1026
dca262fb
MD
1027 /*
1028 * If we are overwriting an entry, we have to remove the old one
1029 * from the target directory.
1030 */
7a2de9a4
MD
1031 if (tvp != NULL) {
1032 /* Remove the old entry from the target directory. */
1033 de = tmpfs_dir_lookup(tdnode, tnode, tncp);
22d3b394 1034 tmpfs_dir_detach(tdnode, de);
80ae59d7 1035 tmpfs_knote(tdnode->tn_vnode, NOTE_DELETE);
7a2de9a4 1036
dca262fb
MD
1037 /*
1038 * Free the directory entry we just deleted. Note that the
7a2de9a4 1039 * node referred by it will not be removed until the vnode is
dca262fb
MD
1040 * really reclaimed.
1041 */
0786baf1 1042 tmpfs_free_dirent(VFS_TO_TMPFS(tvp->v_mount), de);
9fc94b5f 1043 /*cache_inval_vp(tvp, CINV_DESTROY);*/
7a2de9a4
MD
1044 }
1045
dca262fb
MD
1046 /*
1047 * Finish up
1048 */
1049 if (newname) {
d00cd01c 1050 kfree(newname, tmp->tm_name_zone);
dca262fb
MD
1051 newname = NULL;
1052 }
7a2de9a4 1053 cache_rename(v->a_fnch, v->a_tnch);
80ae59d7
MD
1054 tmpfs_knote(v->a_fdvp, NOTE_WRITE);
1055 tmpfs_knote(v->a_tdvp, NOTE_WRITE);
1056 if (fnode->tn_vnode)
1057 tmpfs_knote(fnode->tn_vnode, NOTE_RENAME);
7a2de9a4
MD
1058 error = 0;
1059
1060out_locked:
630e3a33 1061 ;
7a2de9a4
MD
1062
1063out:
1064 /* Release target nodes. */
1065 /* XXX: I don't understand when tdvp can be the same as tvp, but
1066 * other code takes care of this... */
1067 if (tdvp == tvp)
1068 vrele(tdvp);
7a2de9a4
MD
1069
1070 return error;
1071}
1072
1073/* --------------------------------------------------------------------- */
1074
1075static int
1076tmpfs_nmkdir(struct vop_nmkdir_args *v)
1077{
1078 struct vnode *dvp = v->a_dvp;
1079 struct vnode **vpp = v->a_vpp;
1080 struct namecache *ncp = v->a_nch->ncp;
1081 struct vattr *vap = v->a_vap;
1082 struct ucred *cred = v->a_cred;
1083 int error;
1084
1085 KKASSERT(vap->va_type == VDIR);
1086
7a2de9a4
MD
1087 error = tmpfs_alloc_file(dvp, vpp, vap, ncp, cred, NULL);
1088 if (error == 0) {
1089 cache_setunresolved(v->a_nch);
1090 cache_setvp(v->a_nch, *vpp);
80ae59d7 1091 tmpfs_knote(dvp, NOTE_WRITE | NOTE_LINK);
7a2de9a4 1092 }
7a2de9a4
MD
1093
1094 return error;
1095}
1096
1097/* --------------------------------------------------------------------- */
1098
1099static int
1100tmpfs_nrmdir(struct vop_nrmdir_args *v)
1101{
1102 struct vnode *dvp = v->a_dvp;
1103 struct namecache *ncp = v->a_nch->ncp;
9fc94b5f 1104 struct vnode *vp;
7a2de9a4
MD
1105 struct tmpfs_dirent *de;
1106 struct tmpfs_mount *tmp;
1107 struct tmpfs_node *dnode;
1108 struct tmpfs_node *node;
38e5e604
MD
1109 int error;
1110
9fc94b5f
MD
1111 /*
1112 * We have to acquire the vp from v->a_nch because
1113 * we will likely unresolve the namecache entry, and
1114 * a vrele is needed to trigger the tmpfs_inactive/tmpfs_reclaim
1115 * sequence.
1116 */
1117 error = cache_vref(v->a_nch, v->a_cred, &vp);
1118 KKASSERT(error == 0);
7a2de9a4 1119
e527fb6b
MD
1120 /*
1121 * Prevalidate so we don't hit an assertion later
1122 */
1123 if (vp->v_type != VDIR) {
1124 error = ENOTDIR;
1125 goto out;
1126 }
1127
7a2de9a4
MD
1128 tmp = VFS_TO_TMPFS(dvp->v_mount);
1129 dnode = VP_TO_TMPFS_DIR(dvp);
1130 node = VP_TO_TMPFS_DIR(vp);
1131
1132 /* Directories with more than two entries ('.' and '..') cannot be
1133 * removed. */
1134 if (node->tn_size > 0) {
1135 error = ENOTEMPTY;
1136 goto out;
1137 }
1138
1139 if ((dnode->tn_flags & APPEND)
1140 || (node->tn_flags & (NOUNLINK | IMMUTABLE | APPEND))) {
1141 error = EPERM;
1142 goto out;
1143 }
1144
1145 /* This invariant holds only if we are not trying to remove "..".
1146 * We checked for that above so this is safe now. */
1147 KKASSERT(node->tn_dir.tn_parent == dnode);
1148
1149 /* Get the directory entry associated with node (vp). This was
1150 * filled by tmpfs_lookup while looking up the entry. */
1151 de = tmpfs_dir_lookup(dnode, node, ncp);
1152 KKASSERT(TMPFS_DIRENT_MATCHES(de,
1153 ncp->nc_name,
1154 ncp->nc_nlen));
1155
1156 /* Check flags to see if we are allowed to remove the directory. */
b7fe63af
MD
1157 if ((dnode->tn_flags & APPEND) ||
1158 node->tn_flags & (NOUNLINK | IMMUTABLE | APPEND)) {
7a2de9a4
MD
1159 error = EPERM;
1160 goto out;
1161 }
1162
1163
1164 /* Detach the directory entry from the directory (dnode). */
22d3b394 1165 tmpfs_dir_detach(dnode, de);
7a2de9a4
MD
1166
1167 /* No vnode should be allocated for this entry from this point */
1168 TMPFS_NODE_LOCK(node);
1169 TMPFS_ASSERT_ELOCKED(node);
1170 TMPFS_NODE_LOCK(dnode);
1171 TMPFS_ASSERT_ELOCKED(dnode);
1172
0786baf1
MD
1173#if 0
1174 /* handled by tmpfs_free_node */
1175 KKASSERT(node->tn_links > 0);
7a2de9a4
MD
1176 node->tn_links--;
1177 node->tn_dir.tn_parent = NULL;
0786baf1 1178#endif
7a2de9a4
MD
1179 node->tn_status |= TMPFS_NODE_ACCESSED | TMPFS_NODE_CHANGED | \
1180 TMPFS_NODE_MODIFIED;
1181
0786baf1
MD
1182#if 0
1183 /* handled by tmpfs_free_node */
1184 KKASSERT(dnode->tn_links > 0);
7a2de9a4 1185 dnode->tn_links--;
0786baf1 1186#endif
7a2de9a4
MD
1187 dnode->tn_status |= TMPFS_NODE_ACCESSED | \
1188 TMPFS_NODE_CHANGED | TMPFS_NODE_MODIFIED;
1189
1190 TMPFS_NODE_UNLOCK(dnode);
1191 TMPFS_NODE_UNLOCK(node);
1192
1193 /* Free the directory entry we just deleted. Note that the node
1194 * referred by it will not be removed until the vnode is really
1195 * reclaimed. */
0786baf1 1196 tmpfs_free_dirent(tmp, de);
7a2de9a4
MD
1197
1198 /* Release the deleted vnode (will destroy the node, notify
1199 * interested parties and clean it from the cache). */
1200
1201 TMPFS_NODE_LOCK(dnode);
1202 dnode->tn_status |= TMPFS_NODE_CHANGED;
1203 TMPFS_NODE_UNLOCK(dnode);
1204 tmpfs_update(dvp);
1205
1206 cache_setunresolved(v->a_nch);
1207 cache_setvp(v->a_nch, NULL);
9fc94b5f 1208 /*cache_inval_vp(vp, CINV_DESTROY);*/
80ae59d7 1209 tmpfs_knote(dvp, NOTE_WRITE | NOTE_LINK);
7a2de9a4
MD
1210 error = 0;
1211
1212out:
9fc94b5f 1213 vrele(vp);
7a2de9a4
MD
1214
1215 return error;
1216}
1217
1218/* --------------------------------------------------------------------- */
1219
1220static int
1221tmpfs_nsymlink(struct vop_nsymlink_args *v)
1222{
1223 struct vnode *dvp = v->a_dvp;
1224 struct vnode **vpp = v->a_vpp;
1225 struct namecache *ncp = v->a_nch->ncp;
1226 struct vattr *vap = v->a_vap;
1227 struct ucred *cred = v->a_cred;
1228 char *target = v->a_target;
1229 int error;
1230
7a2de9a4
MD
1231 vap->va_type = VLNK;
1232 error = tmpfs_alloc_file(dvp, vpp, vap, ncp, cred, target);
1233 if (error == 0) {
80ae59d7 1234 tmpfs_knote(*vpp, NOTE_WRITE);
7a2de9a4
MD
1235 cache_setunresolved(v->a_nch);
1236 cache_setvp(v->a_nch, *vpp);
1237 }
7a2de9a4
MD
1238
1239 return error;
1240}
1241
1242/* --------------------------------------------------------------------- */
1243
1244static int
1245tmpfs_readdir(struct vop_readdir_args *v)
1246{
1247 struct vnode *vp = v->a_vp;
1248 struct uio *uio = v->a_uio;
1249 int *eofflag = v->a_eofflag;
1250 off_t **cookies = v->a_cookies;
1251 int *ncookies = v->a_ncookies;
22d3b394 1252 struct tmpfs_mount *tmp;
7a2de9a4
MD
1253 int error;
1254 off_t startoff;
1255 off_t cnt = 0;
1256 struct tmpfs_node *node;
1257
1258 /* This operation only makes sense on directory nodes. */
1259 if (vp->v_type != VDIR)
1260 return ENOTDIR;
1261
22d3b394 1262 tmp = VFS_TO_TMPFS(vp->v_mount);
7a2de9a4
MD
1263 node = VP_TO_TMPFS_DIR(vp);
1264 startoff = uio->uio_offset;
1265
1266 if (uio->uio_offset == TMPFS_DIRCOOKIE_DOT) {
1267 error = tmpfs_dir_getdotdent(node, uio);
1268 if (error != 0)
1269 goto outok;
1270 cnt++;
1271 }
1272
1273 if (uio->uio_offset == TMPFS_DIRCOOKIE_DOTDOT) {
22d3b394 1274 error = tmpfs_dir_getdotdotdent(tmp, node, uio);
7a2de9a4
MD
1275 if (error != 0)
1276 goto outok;
1277 cnt++;
1278 }
1279
1280 error = tmpfs_dir_getdents(node, uio, &cnt);
1281
1282outok:
1283 KKASSERT(error >= -1);
1284
1285 if (error == -1)
1286 error = 0;
1287
1288 if (eofflag != NULL)
1289 *eofflag =
1290 (error == 0 && uio->uio_offset == TMPFS_DIRCOOKIE_EOF);
1291
1292 /* Update NFS-related variables. */
1293 if (error == 0 && cookies != NULL && ncookies != NULL) {
1294 off_t i;
1295 off_t off = startoff;
1296 struct tmpfs_dirent *de = NULL;
1297
1298 *ncookies = cnt;
1299 *cookies = kmalloc(cnt * sizeof(off_t), M_TEMP, M_WAITOK);
1300
1301 for (i = 0; i < cnt; i++) {
1302 KKASSERT(off != TMPFS_DIRCOOKIE_EOF);
1303 if (off == TMPFS_DIRCOOKIE_DOT) {
1304 off = TMPFS_DIRCOOKIE_DOTDOT;
1305 } else {
1306 if (off == TMPFS_DIRCOOKIE_DOTDOT) {
1307 de = TAILQ_FIRST(&node->tn_dir.tn_dirhead);
1308 } else if (de != NULL) {
1309 de = TAILQ_NEXT(de, td_entries);
1310 } else {
1311 de = tmpfs_dir_lookupbycookie(node,
1312 off);
1313 KKASSERT(de != NULL);
1314 de = TAILQ_NEXT(de, td_entries);
1315 }
1316 if (de == NULL)
1317 off = TMPFS_DIRCOOKIE_EOF;
1318 else
1319 off = tmpfs_dircookie(de);
1320 }
1321
1322 (*cookies)[i] = off;
1323 }
1324 KKASSERT(uio->uio_offset == off);
1325 }
7a2de9a4
MD
1326
1327 return error;
1328}
1329
1330/* --------------------------------------------------------------------- */
1331
1332static int
1333tmpfs_readlink(struct vop_readlink_args *v)
1334{
1335 struct vnode *vp = v->a_vp;
1336 struct uio *uio = v->a_uio;
1337
1338 int error;
1339 struct tmpfs_node *node;
1340
1341 KKASSERT(uio->uio_offset == 0);
1342 KKASSERT(vp->v_type == VLNK);
1343
1344 node = VP_TO_TMPFS_NODE(vp);
1345
1346 error = uiomove(node->tn_link, MIN(node->tn_size, uio->uio_resid),
1347 uio);
1348 TMPFS_NODE_LOCK(node);
1349 node->tn_status |= TMPFS_NODE_ACCESSED;
1350 TMPFS_NODE_UNLOCK(node);
1351
1352 return error;
1353}
1354
1355/* --------------------------------------------------------------------- */
1356
1357static int
1358tmpfs_inactive(struct vop_inactive_args *v)
1359{
1360 struct vnode *vp = v->a_vp;
1361
1362 struct tmpfs_node *node;
1363
7a2de9a4
MD
1364 node = VP_TO_TMPFS_NODE(vp);
1365
9fc94b5f
MD
1366 /*
1367 * Get rid of unreferenced deleted vnodes sooner rather than
1368 * later so the data memory can be recovered immediately.
f96f2f39
MD
1369 *
1370 * We must truncate the vnode to prevent the normal reclamation
1371 * path from flushing the data for the removed file to disk.
9fc94b5f 1372 */
7a2de9a4 1373 TMPFS_NODE_LOCK(node);
b7fe63af
MD
1374 if ((node->tn_vpstate & TMPFS_VNODE_ALLOCATING) == 0 &&
1375 (node->tn_links == 0 ||
1376 (node->tn_links == 1 && node->tn_type == VDIR &&
1377 node->tn_dir.tn_parent)))
1378 {
9fc94b5f 1379 node->tn_vpstate = TMPFS_VNODE_DOOMED;
7a2de9a4 1380 TMPFS_NODE_UNLOCK(node);
f96f2f39
MD
1381 if (node->tn_type == VREG)
1382 tmpfs_truncate(vp, 0);
7a2de9a4 1383 vrecycle(vp);
9fc94b5f 1384 } else {
7a2de9a4 1385 TMPFS_NODE_UNLOCK(node);
9fc94b5f 1386 }
7a2de9a4
MD
1387
1388 return 0;
1389}
1390
1391/* --------------------------------------------------------------------- */
1392
1393int
1394tmpfs_reclaim(struct vop_reclaim_args *v)
1395{
1396 struct vnode *vp = v->a_vp;
7a2de9a4
MD
1397 struct tmpfs_mount *tmp;
1398 struct tmpfs_node *node;
1399
1400 node = VP_TO_TMPFS_NODE(vp);
1401 tmp = VFS_TO_TMPFS(vp->v_mount);
1402
7a2de9a4
MD
1403 tmpfs_free_vp(vp);
1404
b7fe63af
MD
1405 /*
1406 * If the node referenced by this vnode was deleted by the
1407 * user, we must free its associated data structures now that
1408 * the vnode is being reclaimed.
1409 *
1410 * Directories have an extra link ref.
1411 */
7a2de9a4 1412 TMPFS_NODE_LOCK(node);
b7fe63af
MD
1413 if ((node->tn_vpstate & TMPFS_VNODE_ALLOCATING) == 0 &&
1414 (node->tn_links == 0 ||
1415 (node->tn_links == 1 && node->tn_type == VDIR &&
1416 node->tn_dir.tn_parent)))
1417 {
7a2de9a4 1418 node->tn_vpstate = TMPFS_VNODE_DOOMED;
7a2de9a4 1419 tmpfs_free_node(tmp, node);
0786baf1 1420 /* eats the lock */
9fc94b5f 1421 } else {
7a2de9a4 1422 TMPFS_NODE_UNLOCK(node);
9fc94b5f 1423 }
7a2de9a4
MD
1424
1425 KKASSERT(vp->v_data == NULL);
1426 return 0;
1427}
1428
1429/* --------------------------------------------------------------------- */
1430
1431static int
1432tmpfs_print(struct vop_print_args *v)
1433{
1434 struct vnode *vp = v->a_vp;
1435
1436 struct tmpfs_node *node;
1437
1438 node = VP_TO_TMPFS_NODE(vp);
1439
1440 kprintf("tag VT_TMPFS, tmpfs_node %p, flags 0x%x, links %d\n",
1441 node, node->tn_flags, node->tn_links);
1442 kprintf("\tmode 0%o, owner %d, group %d, size %ju, status 0x%x\n",
1443 node->tn_mode, node->tn_uid, node->tn_gid,
1444 (uintmax_t)node->tn_size, node->tn_status);
1445
1446 if (vp->v_type == VFIFO)
1447 fifo_printinfo(vp);
1448
1449 kprintf("\n");
1450
1451 return 0;
1452}
1453
1454/* --------------------------------------------------------------------- */
1455
1456static int
1457tmpfs_pathconf(struct vop_pathconf_args *v)
1458{
1459 int name = v->a_name;
1460 register_t *retval = v->a_retval;
1461
1462 int error;
1463
1464 error = 0;
1465
1466 switch (name) {
1467 case _PC_LINK_MAX:
1468 *retval = LINK_MAX;
1469 break;
1470
1471 case _PC_NAME_MAX:
1472 *retval = NAME_MAX;
1473 break;
1474
1475 case _PC_PATH_MAX:
1476 *retval = PATH_MAX;
1477 break;
1478
1479 case _PC_PIPE_BUF:
1480 *retval = PIPE_BUF;
1481 break;
1482
1483 case _PC_CHOWN_RESTRICTED:
1484 *retval = 1;
1485 break;
1486
1487 case _PC_NO_TRUNC:
1488 *retval = 1;
1489 break;
1490
1491 case _PC_SYNC_IO:
1492 *retval = 1;
1493 break;
1494
1495 case _PC_FILESIZEBITS:
1496 *retval = 0; /* XXX Don't know which value should I return. */
1497 break;
1498
1499 default:
1500 error = EINVAL;
1501 }
1502
1503 return error;
1504}
1505
80ae59d7
MD
1506/************************************************************************
1507 * KQFILTER OPS *
1508 ************************************************************************/
1509
1510static void filt_tmpfsdetach(struct knote *kn);
1511static int filt_tmpfsread(struct knote *kn, long hint);
1512static int filt_tmpfswrite(struct knote *kn, long hint);
1513static int filt_tmpfsvnode(struct knote *kn, long hint);
1514
1515static struct filterops tmpfsread_filtops =
1516 { FILTEROP_ISFD, NULL, filt_tmpfsdetach, filt_tmpfsread };
1517static struct filterops tmpfswrite_filtops =
1518 { FILTEROP_ISFD, NULL, filt_tmpfsdetach, filt_tmpfswrite };
1519static struct filterops tmpfsvnode_filtops =
1520 { FILTEROP_ISFD, NULL, filt_tmpfsdetach, filt_tmpfsvnode };
1521
1522static int
1523tmpfs_kqfilter (struct vop_kqfilter_args *ap)
1524{
1525 struct vnode *vp = ap->a_vp;
1526 struct knote *kn = ap->a_kn;
1527
1528 switch (kn->kn_filter) {
1529 case EVFILT_READ:
1530 kn->kn_fop = &tmpfsread_filtops;
1531 break;
1532 case EVFILT_WRITE:
1533 kn->kn_fop = &tmpfswrite_filtops;
1534 break;
1535 case EVFILT_VNODE:
1536 kn->kn_fop = &tmpfsvnode_filtops;
1537 break;
1538 default:
1539 return (EOPNOTSUPP);
1540 }
1541
1542 kn->kn_hook = (caddr_t)vp;
1543
1544 knote_insert(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn);
1545
1546 return(0);
1547}
1548
1549static void
1550filt_tmpfsdetach(struct knote *kn)
1551{
1552 struct vnode *vp = (void *)kn->kn_hook;
1553
1554 knote_remove(&vp->v_pollinfo.vpi_kqinfo.ki_note, kn);
1555}
1556
1557static int
1558filt_tmpfsread(struct knote *kn, long hint)
1559{
1560 struct vnode *vp = (void *)kn->kn_hook;
1561 struct tmpfs_node *node = VP_TO_TMPFS_NODE(vp);
1562 off_t off;
1563
1564 if (hint == NOTE_REVOKE) {
1565 kn->kn_flags |= (EV_EOF | EV_ONESHOT);
1566 return(1);
1567 }
1568 off = node->tn_size - kn->kn_fp->f_offset;
1569 kn->kn_data = (off < INTPTR_MAX) ? off : INTPTR_MAX;
1570 if (kn->kn_sfflags & NOTE_OLDAPI)
1571 return(1);
1572
1573 /*
1574 * Handle possible MP race interlock on filter check/write
1575 */
1576 if (kn->kn_data == 0) {
1577 get_mplock();
1578 kn->kn_data = (off < INTPTR_MAX) ? off : INTPTR_MAX;
1579 rel_mplock();
1580 }
1581 return (kn->kn_data != 0);
1582}
1583
1584static int
1585filt_tmpfswrite(struct knote *kn, long hint)
1586{
1587 if (hint == NOTE_REVOKE)
1588 kn->kn_flags |= (EV_EOF | EV_ONESHOT);
1589 kn->kn_data = 0;
1590 return (1);
1591}
1592
1593static int
1594filt_tmpfsvnode(struct knote *kn, long hint)
1595{
1596 if (kn->kn_sfflags & hint)
1597 kn->kn_fflags |= hint;
1598 if (hint == NOTE_REVOKE) {
1599 kn->kn_flags |= EV_EOF;
1600 return (1);
1601 }
1602 return (kn->kn_fflags != 0);
1603}
1604
1605
7a2de9a4
MD
1606/* --------------------------------------------------------------------- */
1607
1608/*
1609 * vnode operations vector used for files stored in a tmpfs file system.
1610 */
1611struct vop_ops tmpfs_vnode_vops = {
1612 .vop_default = vop_defaultop,
1613 .vop_getpages = vop_stdgetpages,
1614 .vop_putpages = vop_stdputpages,
1615 .vop_ncreate = tmpfs_ncreate,
1616 .vop_nresolve = tmpfs_nresolve,
1617 .vop_nlookupdotdot = tmpfs_nlookupdotdot,
1618 .vop_nmknod = tmpfs_nmknod,
1619 .vop_open = tmpfs_open,
1620 .vop_close = tmpfs_close,
1621 .vop_access = tmpfs_access,
1622 .vop_getattr = tmpfs_getattr,
1623 .vop_setattr = tmpfs_setattr,
1624 .vop_read = tmpfs_read,
1625 .vop_write = tmpfs_write,
1626 .vop_fsync = tmpfs_fsync,
1627 .vop_nremove = tmpfs_nremove,
1628 .vop_nlink = tmpfs_nlink,
1629 .vop_nrename = tmpfs_nrename,
1630 .vop_nmkdir = tmpfs_nmkdir,
1631 .vop_nrmdir = tmpfs_nrmdir,
1632 .vop_nsymlink = tmpfs_nsymlink,
1633 .vop_readdir = tmpfs_readdir,
1634 .vop_readlink = tmpfs_readlink,
1635 .vop_inactive = tmpfs_inactive,
1636 .vop_reclaim = tmpfs_reclaim,
1637 .vop_print = tmpfs_print,
1638 .vop_pathconf = tmpfs_pathconf,
9fc94b5f 1639 .vop_bmap = tmpfs_bmap,
7a2de9a4
MD
1640 .vop_strategy = tmpfs_strategy,
1641 .vop_advlock = tmpfs_advlock,
80ae59d7 1642 .vop_kqfilter = tmpfs_kqfilter
7a2de9a4 1643};