1 /* $NetBSD: tmpfs_vfsops.c,v 1.10 2005/12/11 12:24:29 christos Exp $ */
2
3 /*-
4 * SPDX-License-Identifier: BSD-2-Clause-NetBSD
5 *
6 * Copyright (c) 2005 The NetBSD Foundation, Inc.
7 * All rights reserved.
8 *
9 * This code is derived from software contributed to The NetBSD Foundation
10 * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
11 * 2005 program.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
24 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
25 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
26 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
32 * POSSIBILITY OF SUCH DAMAGE.
33 */
34
35 /*
36 * Efficient memory file system.
37 *
38 * tmpfs is a file system that uses FreeBSD's virtual memory
39 * sub-system to store file data and metadata in an efficient way.
40 * This means that it does not follow the structure of an on-disk file
41 * system because it simply does not need to. Instead, it uses
42 * memory-specific data structures and algorithms to automatically
43 * allocate and release resources.
44 */
45
46 #include "opt_tmpfs.h"
47
48 #include <sys/cdefs.h>
49 __FBSDID("$FreeBSD$");
50
51 #include <sys/param.h>
52 #include <sys/systm.h>
53 #include <sys/dirent.h>
54 #include <sys/file.h>
55 #include <sys/limits.h>
56 #include <sys/lock.h>
57 #include <sys/mount.h>
58 #include <sys/mutex.h>
59 #include <sys/proc.h>
60 #include <sys/jail.h>
61 #include <sys/kernel.h>
62 #include <sys/rwlock.h>
63 #include <sys/stat.h>
64 #include <sys/sx.h>
65 #include <sys/sysctl.h>
66 #include <sys/vnode.h>
67
68 #include <vm/vm.h>
69 #include <vm/vm_param.h>
70 #include <vm/pmap.h>
71 #include <vm/vm_extern.h>
72 #include <vm/vm_map.h>
73 #include <vm/vm_object.h>
74 #include <vm/vm_param.h>
75
76 #include <fs/tmpfs/tmpfs.h>
77
78 /*
79 * Default permission for root node
80 */
81 #define TMPFS_DEFAULT_ROOT_MODE (S_IRWXU|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH)
82
83 static MALLOC_DEFINE(M_TMPFSMNT, "tmpfs mount", "tmpfs mount structures");
84 MALLOC_DEFINE(M_TMPFSNAME, "tmpfs name", "tmpfs file names");
85
86 static int tmpfs_mount(struct mount *);
87 static int tmpfs_unmount(struct mount *, int);
88 static int tmpfs_root(struct mount *, int flags, struct vnode **);
89 static int tmpfs_fhtovp(struct mount *, struct fid *, int,
90 struct vnode **);
91 static int tmpfs_statfs(struct mount *, struct statfs *);
92
93 static const char *tmpfs_opts[] = {
94 "from", "size", "maxfilesize", "inodes", "uid", "gid", "mode", "export",
95 "union", "nonc", "nomtime", NULL
96 };
97
98 static const char *tmpfs_updateopts[] = {
99 "from", "export", "nomtime", "size", NULL
100 };
101
102 static int
103 tmpfs_update_mtime_lazy_filter(struct vnode *vp, void *arg)
104 {
105 struct vm_object *obj;
106
107 if (vp->v_type != VREG)
108 return (0);
109
110 obj = atomic_load_ptr(&vp->v_object);
111 if (obj == NULL)
112 return (0);
113
114 return (vm_object_mightbedirty_(obj));
115 }
116
117 static void
118 tmpfs_update_mtime_lazy(struct mount *mp)
119 {
120 struct vnode *vp, *mvp;
121
122 MNT_VNODE_FOREACH_LAZY(vp, mp, mvp, tmpfs_update_mtime_lazy_filter, NULL) {
123 if (vget(vp, LK_EXCLUSIVE | LK_INTERLOCK) != 0)
124 continue;
125 tmpfs_check_mtime(vp);
126 vput(vp);
127 }
128 }
129
130 static void
131 tmpfs_update_mtime_all(struct mount *mp)
132 {
133 struct vnode *vp, *mvp;
134
135 if (VFS_TO_TMPFS(mp)->tm_nomtime)
136 return;
137 MNT_VNODE_FOREACH_ALL(vp, mp, mvp) {
138 if (vp->v_type != VREG) {
139 VI_UNLOCK(vp);
140 continue;
141 }
142 if (vget(vp, LK_EXCLUSIVE | LK_INTERLOCK) != 0)
143 continue;
144 tmpfs_check_mtime(vp);
145 tmpfs_update(vp);
146 vput(vp);
147 }
148 }
149
150 struct tmpfs_check_rw_maps_arg {
151 bool found;
152 };
153
154 static bool
155 tmpfs_check_rw_maps_cb(struct mount *mp __unused, vm_map_t map __unused,
156 vm_map_entry_t entry __unused, void *arg)
157 {
158 struct tmpfs_check_rw_maps_arg *a;
159
160 a = arg;
161 a->found = true;
162 return (true);
163 }
164
165 /*
166 * Revoke write permissions from all mappings of regular files
167 * belonging to the specified tmpfs mount.
168 */
169 static bool
170 tmpfs_revoke_rw_maps_cb(struct mount *mp __unused, vm_map_t map,
171 vm_map_entry_t entry, void *arg __unused)
172 {
173
174 /*
175 * XXXKIB: might be invalidate the mapping
176 * instead ? The process is not going to be
177 * happy in any case.
178 */
179 entry->max_protection &= ~VM_PROT_WRITE;
180 if ((entry->protection & VM_PROT_WRITE) != 0) {
181 entry->protection &= ~VM_PROT_WRITE;
182 pmap_protect(map->pmap, entry->start, entry->end,
183 entry->protection);
184 }
185 return (false);
186 }
187
188 static void
189 tmpfs_all_rw_maps(struct mount *mp, bool (*cb)(struct mount *mp, vm_map_t,
190 vm_map_entry_t, void *), void *cb_arg)
191 {
192 struct proc *p;
193 struct vmspace *vm;
194 vm_map_t map;
195 vm_map_entry_t entry;
196 vm_object_t object;
197 struct vnode *vp;
198 int gen;
199 bool terminate;
200
201 terminate = false;
202 sx_slock(&allproc_lock);
203 again:
204 gen = allproc_gen;
205 FOREACH_PROC_IN_SYSTEM(p) {
206 PROC_LOCK(p);
207 if (p->p_state != PRS_NORMAL || (p->p_flag & (P_INEXEC |
208 P_SYSTEM | P_WEXIT)) != 0) {
209 PROC_UNLOCK(p);
210 continue;
211 }
212 vm = vmspace_acquire_ref(p);
213 _PHOLD_LITE(p);
214 PROC_UNLOCK(p);
215 if (vm == NULL) {
216 PRELE(p);
217 continue;
218 }
219 sx_sunlock(&allproc_lock);
220 map = &vm->vm_map;
221
222 vm_map_lock(map);
223 if (map->busy)
224 vm_map_wait_busy(map);
225 VM_MAP_ENTRY_FOREACH(entry, map) {
226 if ((entry->eflags & (MAP_ENTRY_GUARD |
227 MAP_ENTRY_IS_SUB_MAP | MAP_ENTRY_COW)) != 0 ||
228 (entry->max_protection & VM_PROT_WRITE) == 0)
229 continue;
230 object = entry->object.vm_object;
231 if (object == NULL || object->type != tmpfs_pager_type)
232 continue;
233 /*
234 * No need to dig into shadow chain, mapping
235 * of the object not at top is readonly.
236 */
237
238 VM_OBJECT_RLOCK(object);
239 if (object->type == OBJT_DEAD) {
240 VM_OBJECT_RUNLOCK(object);
241 continue;
242 }
243 MPASS(object->ref_count > 1);
244 if ((object->flags & OBJ_TMPFS) == 0) {
245 VM_OBJECT_RUNLOCK(object);
246 continue;
247 }
248 vp = object->un_pager.swp.swp_tmpfs;
249 if (vp->v_mount != mp) {
250 VM_OBJECT_RUNLOCK(object);
251 continue;
252 }
253
254 terminate = cb(mp, map, entry, cb_arg);
255 VM_OBJECT_RUNLOCK(object);
256 if (terminate)
257 break;
258 }
259 vm_map_unlock(map);
260
261 vmspace_free(vm);
262 sx_slock(&allproc_lock);
263 PRELE(p);
264 if (terminate)
265 break;
266 }
267 if (!terminate && gen != allproc_gen)
268 goto again;
269 sx_sunlock(&allproc_lock);
270 }
271
272 static bool
273 tmpfs_check_rw_maps(struct mount *mp)
274 {
275 struct tmpfs_check_rw_maps_arg ca;
276
277 ca.found = false;
278 tmpfs_all_rw_maps(mp, tmpfs_check_rw_maps_cb, &ca);
279 return (ca.found);
280 }
281
282 static int
283 tmpfs_rw_to_ro(struct mount *mp)
284 {
285 int error, flags;
286 bool forced;
287
288 forced = (mp->mnt_flag & MNT_FORCE) != 0;
289 flags = WRITECLOSE | (forced ? FORCECLOSE : 0);
290
291 if ((error = vn_start_write(NULL, &mp, V_WAIT)) != 0)
292 return (error);
293 error = vfs_write_suspend_umnt(mp);
294 if (error != 0)
295 return (error);
296 if (!forced && tmpfs_check_rw_maps(mp)) {
297 error = EBUSY;
298 goto out;
299 }
300 VFS_TO_TMPFS(mp)->tm_ronly = 1;
301 MNT_ILOCK(mp);
302 mp->mnt_flag |= MNT_RDONLY;
303 MNT_IUNLOCK(mp);
304 for (;;) {
305 tmpfs_all_rw_maps(mp, tmpfs_revoke_rw_maps_cb, NULL);
306 tmpfs_update_mtime_all(mp);
307 error = vflush(mp, 0, flags, curthread);
308 if (error != 0) {
309 VFS_TO_TMPFS(mp)->tm_ronly = 0;
310 MNT_ILOCK(mp);
311 mp->mnt_flag &= ~MNT_RDONLY;
312 MNT_IUNLOCK(mp);
313 goto out;
314 }
315 if (!tmpfs_check_rw_maps(mp))
316 break;
317 }
318 out:
319 vfs_write_resume(mp, 0);
320 return (error);
321 }
322
323 static int
324 tmpfs_mount(struct mount *mp)
325 {
326 const size_t nodes_per_page = howmany(PAGE_SIZE,
327 sizeof(struct tmpfs_dirent) + sizeof(struct tmpfs_node));
328 struct tmpfs_mount *tmp;
329 struct tmpfs_node *root;
330 int error;
331 bool nomtime, nonc;
332 /* Size counters. */
333 u_quad_t pages;
334 off_t nodes_max, size_max, maxfilesize;
335
336 /* Root node attributes. */
337 uid_t root_uid;
338 gid_t root_gid;
339 mode_t root_mode;
340
341 struct vattr va;
342
343 if (vfs_filteropt(mp->mnt_optnew, tmpfs_opts))
344 return (EINVAL);
345
346 if (mp->mnt_flag & MNT_UPDATE) {
347 /* Only support update mounts for certain options. */
348 if (vfs_filteropt(mp->mnt_optnew, tmpfs_updateopts) != 0)
349 return (EOPNOTSUPP);
350 tmp = VFS_TO_TMPFS(mp);
351 if (vfs_getopt_size(mp->mnt_optnew, "size", &size_max) == 0) {
352 /*
353 * On-the-fly resizing is not supported (yet). We still
354 * need to have "size" listed as "supported", otherwise
355 * trying to update fs that is listed in fstab with size
356 * parameter, say trying to change rw to ro or vice
357 * versa, would cause vfs_filteropt() to bail.
358 */
359 if (size_max != tmp->tm_size_max)
360 return (EOPNOTSUPP);
361 }
362 if (vfs_flagopt(mp->mnt_optnew, "ro", NULL, 0) &&
363 !tmp->tm_ronly) {
364 /* RW -> RO */
365 return (tmpfs_rw_to_ro(mp));
366 } else if (!vfs_flagopt(mp->mnt_optnew, "ro", NULL, 0) &&
367 tmp->tm_ronly) {
368 /* RO -> RW */
369 tmp->tm_ronly = 0;
370 MNT_ILOCK(mp);
371 mp->mnt_flag &= ~MNT_RDONLY;
372 MNT_IUNLOCK(mp);
373 }
374 tmp->tm_nomtime = vfs_getopt(mp->mnt_optnew, "nomtime", NULL,
375 0) == 0;
376 MNT_ILOCK(mp);
377 if ((mp->mnt_flag & MNT_UNION) == 0) {
378 mp->mnt_kern_flag |= MNTK_FPLOOKUP;
379 } else {
380 mp->mnt_kern_flag &= ~MNTK_FPLOOKUP;
381 }
382 MNT_IUNLOCK(mp);
383 return (0);
384 }
385
386 vn_lock(mp->mnt_vnodecovered, LK_SHARED | LK_RETRY);
387 error = VOP_GETATTR(mp->mnt_vnodecovered, &va, mp->mnt_cred);
388 VOP_UNLOCK(mp->mnt_vnodecovered);
389 if (error)
390 return (error);
391
392 if (mp->mnt_cred->cr_ruid != 0 ||
393 vfs_scanopt(mp->mnt_optnew, "gid", "%d", &root_gid) != 1)
394 root_gid = va.va_gid;
395 if (mp->mnt_cred->cr_ruid != 0 ||
396 vfs_scanopt(mp->mnt_optnew, "uid", "%d", &root_uid) != 1)
397 root_uid = va.va_uid;
398 if (mp->mnt_cred->cr_ruid != 0 ||
399 vfs_scanopt(mp->mnt_optnew, "mode", "%ho", &root_mode) != 1)
400 root_mode = va.va_mode;
401 if (vfs_getopt_size(mp->mnt_optnew, "inodes", &nodes_max) != 0)
402 nodes_max = 0;
403 if (vfs_getopt_size(mp->mnt_optnew, "size", &size_max) != 0)
404 size_max = 0;
405 if (vfs_getopt_size(mp->mnt_optnew, "maxfilesize", &maxfilesize) != 0)
406 maxfilesize = 0;
407 nonc = vfs_getopt(mp->mnt_optnew, "nonc", NULL, NULL) == 0;
408 nomtime = vfs_getopt(mp->mnt_optnew, "nomtime", NULL, NULL) == 0;
409
410 /* Do not allow mounts if we do not have enough memory to preserve
411 * the minimum reserved pages. */
412 if (tmpfs_mem_avail() < TMPFS_PAGES_MINRESERVED)
413 return (ENOSPC);
414
415 /* Get the maximum number of memory pages this file system is
416 * allowed to use, based on the maximum size the user passed in
417 * the mount structure. A value of zero is treated as if the
418 * maximum available space was requested. */
419 if (size_max == 0 || size_max > OFF_MAX - PAGE_SIZE ||
420 (SIZE_MAX < OFF_MAX && size_max / PAGE_SIZE >= SIZE_MAX))
421 pages = SIZE_MAX;
422 else {
423 size_max = roundup(size_max, PAGE_SIZE);
424 pages = howmany(size_max, PAGE_SIZE);
425 }
426 MPASS(pages > 0);
427
428 if (nodes_max <= 3) {
429 if (pages < INT_MAX / nodes_per_page)
430 nodes_max = pages * nodes_per_page;
431 else
432 nodes_max = INT_MAX;
433 }
434 if (nodes_max > INT_MAX)
435 nodes_max = INT_MAX;
436 MPASS(nodes_max >= 3);
437
438 /* Allocate the tmpfs mount structure and fill it. */
439 tmp = (struct tmpfs_mount *)malloc(sizeof(struct tmpfs_mount),
440 M_TMPFSMNT, M_WAITOK | M_ZERO);
441
442 mtx_init(&tmp->tm_allnode_lock, "tmpfs allnode lock", NULL, MTX_DEF);
443 tmp->tm_nodes_max = nodes_max;
444 tmp->tm_nodes_inuse = 0;
445 tmp->tm_refcount = 1;
446 tmp->tm_maxfilesize = maxfilesize > 0 ? maxfilesize : OFF_MAX;
447 LIST_INIT(&tmp->tm_nodes_used);
448
449 tmp->tm_size_max = size_max;
450 tmp->tm_pages_max = pages;
451 tmp->tm_pages_used = 0;
452 new_unrhdr64(&tmp->tm_ino_unr, 2);
453 tmp->tm_ronly = (mp->mnt_flag & MNT_RDONLY) != 0;
454 tmp->tm_nonc = nonc;
455 tmp->tm_nomtime = nomtime;
456
457 /* Allocate the root node. */
458 error = tmpfs_alloc_node(mp, tmp, VDIR, root_uid, root_gid,
459 root_mode & ALLPERMS, NULL, NULL, VNOVAL, &root);
460
461 if (error != 0 || root == NULL) {
462 free(tmp, M_TMPFSMNT);
463 return (error);
464 }
465 KASSERT(root->tn_id == 2,
466 ("tmpfs root with invalid ino: %ju", (uintmax_t)root->tn_id));
467 tmp->tm_root = root;
468
469 MNT_ILOCK(mp);
470 mp->mnt_flag |= MNT_LOCAL;
471 mp->mnt_kern_flag |= MNTK_LOOKUP_SHARED | MNTK_EXTENDED_SHARED |
472 MNTK_TEXT_REFS | MNTK_NOMSYNC;
473 if (!nonc && (mp->mnt_flag & MNT_UNION) == 0)
474 mp->mnt_kern_flag |= MNTK_FPLOOKUP;
475 MNT_IUNLOCK(mp);
476
477 mp->mnt_data = tmp;
478 mp->mnt_stat.f_namemax = MAXNAMLEN;
479 vfs_getnewfsid(mp);
480 vfs_mountedfrom(mp, "tmpfs");
481
482 return (0);
483 }
484
485 /* ARGSUSED2 */
486 static int
487 tmpfs_unmount(struct mount *mp, int mntflags)
488 {
489 struct tmpfs_mount *tmp;
490 struct tmpfs_node *node;
491 int error, flags;
492
493 flags = (mntflags & MNT_FORCE) != 0 ? FORCECLOSE : 0;
494 tmp = VFS_TO_TMPFS(mp);
495
496 /* Stop writers */
497 error = vfs_write_suspend_umnt(mp);
498 if (error != 0)
499 return (error);
500 /*
501 * At this point, nodes cannot be destroyed by any other
502 * thread because write suspension is started.
503 */
504
505 for (;;) {
506 error = vflush(mp, 0, flags, curthread);
507 if (error != 0) {
508 vfs_write_resume(mp, VR_START_WRITE);
509 return (error);
510 }
511 MNT_ILOCK(mp);
512 if (mp->mnt_nvnodelistsize == 0) {
513 MNT_IUNLOCK(mp);
514 break;
515 }
516 MNT_IUNLOCK(mp);
517 if ((mntflags & MNT_FORCE) == 0) {
518 vfs_write_resume(mp, VR_START_WRITE);
519 return (EBUSY);
520 }
521 }
522
523 TMPFS_LOCK(tmp);
524 while ((node = LIST_FIRST(&tmp->tm_nodes_used)) != NULL) {
525 TMPFS_NODE_LOCK(node);
526 if (node->tn_type == VDIR)
527 tmpfs_dir_destroy(tmp, node);
528 if (tmpfs_free_node_locked(tmp, node, true))
529 TMPFS_LOCK(tmp);
530 else
531 TMPFS_NODE_UNLOCK(node);
532 }
533
534 mp->mnt_data = NULL;
535 tmpfs_free_tmp(tmp);
536 vfs_write_resume(mp, VR_START_WRITE);
537
538 MNT_ILOCK(mp);
539 mp->mnt_flag &= ~MNT_LOCAL;
540 MNT_IUNLOCK(mp);
541
542 return (0);
543 }
544
545 void
546 tmpfs_free_tmp(struct tmpfs_mount *tmp)
547 {
548 TMPFS_MP_ASSERT_LOCKED(tmp);
549 MPASS(tmp->tm_refcount > 0);
550
551 tmp->tm_refcount--;
552 if (tmp->tm_refcount > 0) {
553 TMPFS_UNLOCK(tmp);
554 return;
555 }
556 TMPFS_UNLOCK(tmp);
557
558 mtx_destroy(&tmp->tm_allnode_lock);
559 MPASS(tmp->tm_pages_used == 0);
560 MPASS(tmp->tm_nodes_inuse == 0);
561
562 free(tmp, M_TMPFSMNT);
563 }
564
565 static int
566 tmpfs_root(struct mount *mp, int flags, struct vnode **vpp)
567 {
568 int error;
569
570 error = tmpfs_alloc_vp(mp, VFS_TO_TMPFS(mp)->tm_root, flags, vpp);
571 if (error == 0)
572 (*vpp)->v_vflag |= VV_ROOT;
573 return (error);
574 }
575
576 static int
577 tmpfs_fhtovp(struct mount *mp, struct fid *fhp, int flags,
578 struct vnode **vpp)
579 {
580 struct tmpfs_fid_data tfd;
581 struct tmpfs_mount *tmp;
582 struct tmpfs_node *node;
583 int error;
584
585 if (fhp->fid_len != sizeof(tfd))
586 return (EINVAL);
587
588 /*
589 * Copy from fid_data onto the stack to avoid unaligned pointer use.
590 * See the comment in sys/mount.h on struct fid for details.
591 */
592 memcpy(&tfd, fhp->fid_data, fhp->fid_len);
593
594 tmp = VFS_TO_TMPFS(mp);
595
596 if (tfd.tfd_id >= tmp->tm_nodes_max)
597 return (EINVAL);
598
599 TMPFS_LOCK(tmp);
600 LIST_FOREACH(node, &tmp->tm_nodes_used, tn_entries) {
601 if (node->tn_id == tfd.tfd_id &&
602 node->tn_gen == tfd.tfd_gen) {
603 tmpfs_ref_node(node);
604 break;
605 }
606 }
607 TMPFS_UNLOCK(tmp);
608
609 if (node != NULL) {
610 error = tmpfs_alloc_vp(mp, node, LK_EXCLUSIVE, vpp);
611 tmpfs_free_node(tmp, node);
612 } else
613 error = EINVAL;
614 return (error);
615 }
616
617 /* ARGSUSED2 */
618 static int
619 tmpfs_statfs(struct mount *mp, struct statfs *sbp)
620 {
621 struct tmpfs_mount *tmp;
622 size_t used;
623
624 tmp = VFS_TO_TMPFS(mp);
625
626 sbp->f_iosize = PAGE_SIZE;
627 sbp->f_bsize = PAGE_SIZE;
628
629 used = tmpfs_pages_used(tmp);
630 if (tmp->tm_pages_max != ULONG_MAX)
631 sbp->f_blocks = tmp->tm_pages_max;
632 else
633 sbp->f_blocks = used + tmpfs_mem_avail();
634 if (sbp->f_blocks <= used)
635 sbp->f_bavail = 0;
636 else
637 sbp->f_bavail = sbp->f_blocks - used;
638 sbp->f_bfree = sbp->f_bavail;
639 used = tmp->tm_nodes_inuse;
640 sbp->f_files = tmp->tm_nodes_max;
641 if (sbp->f_files <= used)
642 sbp->f_ffree = 0;
643 else
644 sbp->f_ffree = sbp->f_files - used;
645 /* sbp->f_owner = tmp->tn_uid; */
646
647 return (0);
648 }
649
650 static int
651 tmpfs_sync(struct mount *mp, int waitfor)
652 {
653
654 if (waitfor == MNT_SUSPEND) {
655 MNT_ILOCK(mp);
656 mp->mnt_kern_flag |= MNTK_SUSPEND2 | MNTK_SUSPENDED;
657 MNT_IUNLOCK(mp);
658 } else if (waitfor == MNT_LAZY) {
659 tmpfs_update_mtime_lazy(mp);
660 }
661 return (0);
662 }
663
664 static int
665 tmpfs_init(struct vfsconf *conf)
666 {
667 int res;
668
669 res = tmpfs_subr_init();
670 if (res != 0)
671 return (res);
672 memcpy(&tmpfs_fnops, &vnops, sizeof(struct fileops));
673 tmpfs_fnops.fo_close = tmpfs_fo_close;
674 return (0);
675 }
676
677 static int
678 tmpfs_uninit(struct vfsconf *conf)
679 {
680 tmpfs_subr_uninit();
681 return (0);
682 }
683
684 /*
685 * tmpfs vfs operations.
686 */
687 struct vfsops tmpfs_vfsops = {
688 .vfs_mount = tmpfs_mount,
689 .vfs_unmount = tmpfs_unmount,
690 .vfs_root = vfs_cache_root,
691 .vfs_cachedroot = tmpfs_root,
692 .vfs_statfs = tmpfs_statfs,
693 .vfs_fhtovp = tmpfs_fhtovp,
694 .vfs_sync = tmpfs_sync,
695 .vfs_init = tmpfs_init,
696 .vfs_uninit = tmpfs_uninit,
697 };
698 VFS_SET(tmpfs_vfsops, tmpfs, VFCF_JAIL);
Cache object: 80f98cd85d24db9ad3d74c9e5050e5e5
|