xref: /freebsd/sys/fs/tmpfs/tmpfs_vfsops.c (revision de4e1aeb21b6424b075af9db7d42368e0847e121)
1d1fa59e9SXin LI /*	$NetBSD: tmpfs_vfsops.c,v 1.10 2005/12/11 12:24:29 christos Exp $	*/
2d1fa59e9SXin LI 
3e08d5567SXin LI /*-
4d63027b6SPedro F. Giffuni  * SPDX-License-Identifier: BSD-2-Clause-NetBSD
5d63027b6SPedro F. Giffuni  *
6d1fa59e9SXin LI  * Copyright (c) 2005 The NetBSD Foundation, Inc.
7d1fa59e9SXin LI  * All rights reserved.
8d1fa59e9SXin LI  *
9d1fa59e9SXin LI  * This code is derived from software contributed to The NetBSD Foundation
10d1fa59e9SXin LI  * by Julio M. Merino Vidal, developed as part of Google's Summer of Code
11d1fa59e9SXin LI  * 2005 program.
12d1fa59e9SXin LI  *
13d1fa59e9SXin LI  * Redistribution and use in source and binary forms, with or without
14d1fa59e9SXin LI  * modification, are permitted provided that the following conditions
15d1fa59e9SXin LI  * are met:
16d1fa59e9SXin LI  * 1. Redistributions of source code must retain the above copyright
17d1fa59e9SXin LI  *    notice, this list of conditions and the following disclaimer.
18d1fa59e9SXin LI  * 2. Redistributions in binary form must reproduce the above copyright
19d1fa59e9SXin LI  *    notice, this list of conditions and the following disclaimer in the
20d1fa59e9SXin LI  *    documentation and/or other materials provided with the distribution.
21d1fa59e9SXin LI  *
22d1fa59e9SXin LI  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
23d1fa59e9SXin LI  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
24d1fa59e9SXin LI  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
25d1fa59e9SXin LI  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
26d1fa59e9SXin LI  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27d1fa59e9SXin LI  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28d1fa59e9SXin LI  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29d1fa59e9SXin LI  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30d1fa59e9SXin LI  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31d1fa59e9SXin LI  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
32d1fa59e9SXin LI  * POSSIBILITY OF SUCH DAMAGE.
33d1fa59e9SXin LI  */
34d1fa59e9SXin LI 
35d1fa59e9SXin LI /*
36d1fa59e9SXin LI  * Efficient memory file system.
37d1fa59e9SXin LI  *
383544b0f6SKonstantin Belousov  * tmpfs is a file system that uses FreeBSD's virtual memory
393544b0f6SKonstantin Belousov  * sub-system to store file data and metadata in an efficient way.
403544b0f6SKonstantin Belousov  * This means that it does not follow the structure of an on-disk file
413544b0f6SKonstantin Belousov  * system because it simply does not need to.  Instead, it uses
42d1fa59e9SXin LI  * memory-specific data structures and algorithms to automatically
43d1fa59e9SXin LI  * allocate and release resources.
44d1fa59e9SXin LI  */
45b4b3e349SAllan Jude 
46b4b3e349SAllan Jude #include "opt_tmpfs.h"
47b4b3e349SAllan Jude 
48d1fa59e9SXin LI #include <sys/cdefs.h>
49d1fa59e9SXin LI __FBSDID("$FreeBSD$");
50d1fa59e9SXin LI 
51d1fa59e9SXin LI #include <sys/param.h>
526d2e2df7SMark Johnston #include <sys/systm.h>
53135beaf6SGleb Smirnoff #include <sys/dirent.h>
541df86a32SXin LI #include <sys/limits.h>
55d1fa59e9SXin LI #include <sys/lock.h>
56135beaf6SGleb Smirnoff #include <sys/mount.h>
57d1fa59e9SXin LI #include <sys/mutex.h>
582454886eSXin LI #include <sys/proc.h>
592454886eSXin LI #include <sys/jail.h>
60d1fa59e9SXin LI #include <sys/kernel.h>
61f40cb1c6SKonstantin Belousov #include <sys/rwlock.h>
62d1fa59e9SXin LI #include <sys/stat.h>
635c4ce6faSKonstantin Belousov #include <sys/sx.h>
64d1fa59e9SXin LI #include <sys/sysctl.h>
65135beaf6SGleb Smirnoff #include <sys/vnode.h>
66d1fa59e9SXin LI 
67d1fa59e9SXin LI #include <vm/vm.h>
685c4ce6faSKonstantin Belousov #include <vm/vm_param.h>
695c4ce6faSKonstantin Belousov #include <vm/pmap.h>
705c4ce6faSKonstantin Belousov #include <vm/vm_extern.h>
715c4ce6faSKonstantin Belousov #include <vm/vm_map.h>
72d1fa59e9SXin LI #include <vm/vm_object.h>
73d1fa59e9SXin LI #include <vm/vm_param.h>
74d1fa59e9SXin LI 
75d1fa59e9SXin LI #include <fs/tmpfs/tmpfs.h>
76d1fa59e9SXin LI 
77d1fa59e9SXin LI /*
78d1fa59e9SXin LI  * Default permission for root node
79d1fa59e9SXin LI  */
80d1fa59e9SXin LI #define TMPFS_DEFAULT_ROOT_MODE	(S_IRWXU|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH)
81d1fa59e9SXin LI 
82d1fa59e9SXin LI MALLOC_DEFINE(M_TMPFSMNT, "tmpfs mount", "tmpfs mount structures");
839b258fcaSXin LI MALLOC_DEFINE(M_TMPFSNAME, "tmpfs name", "tmpfs file names");
84d1fa59e9SXin LI 
85dfd233edSAttilio Rao static int	tmpfs_mount(struct mount *);
86dfd233edSAttilio Rao static int	tmpfs_unmount(struct mount *, int);
87dfd233edSAttilio Rao static int	tmpfs_root(struct mount *, int flags, struct vnode **);
88694a586aSRick Macklem static int	tmpfs_fhtovp(struct mount *, struct fid *, int,
89694a586aSRick Macklem 		    struct vnode **);
90dfd233edSAttilio Rao static int	tmpfs_statfs(struct mount *, struct statfs *);
915f34e93cSMark Johnston static void	tmpfs_susp_clean(struct mount *);
92d1fa59e9SXin LI 
93d1fa59e9SXin LI static const char *tmpfs_opts[] = {
94dec3772eSJaakko Heinonen 	"from", "size", "maxfilesize", "inodes", "uid", "gid", "mode", "export",
9500ac6a98SKonstantin Belousov 	"union", "nonc", NULL
96d1fa59e9SXin LI };
97d1fa59e9SXin LI 
98c5ab5ce3SJaakko Heinonen static const char *tmpfs_updateopts[] = {
99ac1a10efSMaxim Sobolev 	"from", "export", "size", NULL
100c5ab5ce3SJaakko Heinonen };
101c5ab5ce3SJaakko Heinonen 
1027adb1776SXin LI static int
1037adb1776SXin LI tmpfs_node_ctor(void *mem, int size, void *arg, int flags)
1047adb1776SXin LI {
1057adb1776SXin LI 	struct tmpfs_node *node = (struct tmpfs_node *)mem;
1067adb1776SXin LI 
1077adb1776SXin LI 	node->tn_gen++;
1087adb1776SXin LI 	node->tn_size = 0;
1097adb1776SXin LI 	node->tn_status = 0;
1107adb1776SXin LI 	node->tn_flags = 0;
1117adb1776SXin LI 	node->tn_links = 0;
1127adb1776SXin LI 	node->tn_vnode = NULL;
1137adb1776SXin LI 	node->tn_vpstate = 0;
1147adb1776SXin LI 
1157adb1776SXin LI 	return (0);
1167adb1776SXin LI }
1177adb1776SXin LI 
1187adb1776SXin LI static void
1197adb1776SXin LI tmpfs_node_dtor(void *mem, int size, void *arg)
1207adb1776SXin LI {
1217adb1776SXin LI 	struct tmpfs_node *node = (struct tmpfs_node *)mem;
1227adb1776SXin LI 	node->tn_type = VNON;
1237adb1776SXin LI }
1247adb1776SXin LI 
1257adb1776SXin LI static int
1267adb1776SXin LI tmpfs_node_init(void *mem, int size, int flags)
1277adb1776SXin LI {
1287adb1776SXin LI 	struct tmpfs_node *node = (struct tmpfs_node *)mem;
1297adb1776SXin LI 	node->tn_id = 0;
1307adb1776SXin LI 
1317adb1776SXin LI 	mtx_init(&node->tn_interlock, "tmpfs node interlock", NULL, MTX_DEF);
1328d9a89a3SXin LI 	node->tn_gen = arc4random();
1337adb1776SXin LI 
1347adb1776SXin LI 	return (0);
1357adb1776SXin LI }
1367adb1776SXin LI 
1377adb1776SXin LI static void
1387adb1776SXin LI tmpfs_node_fini(void *mem, int size)
1397adb1776SXin LI {
1407adb1776SXin LI 	struct tmpfs_node *node = (struct tmpfs_node *)mem;
1417adb1776SXin LI 
1427adb1776SXin LI 	mtx_destroy(&node->tn_interlock);
1437adb1776SXin LI }
144d1fa59e9SXin LI 
1455c4ce6faSKonstantin Belousov /*
1465c4ce6faSKonstantin Belousov  * Handle updates of time from writes to mmaped regions.  Use
1475c4ce6faSKonstantin Belousov  * MNT_VNODE_FOREACH_ALL instead of MNT_VNODE_FOREACH_ACTIVE, since
1485c4ce6faSKonstantin Belousov  * unmap of the tmpfs-backed vnode does not call vinactive(), due to
1495c4ce6faSKonstantin Belousov  * vm object type is OBJT_SWAP.
1505c4ce6faSKonstantin Belousov  * If lazy, only handle delayed update of mtime due to the writes to
1515c4ce6faSKonstantin Belousov  * mapped files.
1525c4ce6faSKonstantin Belousov  */
1535c4ce6faSKonstantin Belousov static void
1545c4ce6faSKonstantin Belousov tmpfs_update_mtime(struct mount *mp, bool lazy)
1555c4ce6faSKonstantin Belousov {
1565c4ce6faSKonstantin Belousov 	struct vnode *vp, *mvp;
1575c4ce6faSKonstantin Belousov 	struct vm_object *obj;
1585c4ce6faSKonstantin Belousov 
1595c4ce6faSKonstantin Belousov 	MNT_VNODE_FOREACH_ALL(vp, mp, mvp) {
1605c4ce6faSKonstantin Belousov 		if (vp->v_type != VREG) {
1615c4ce6faSKonstantin Belousov 			VI_UNLOCK(vp);
1625c4ce6faSKonstantin Belousov 			continue;
1635c4ce6faSKonstantin Belousov 		}
1645c4ce6faSKonstantin Belousov 		obj = vp->v_object;
1655c4ce6faSKonstantin Belousov 		KASSERT((obj->flags & (OBJ_TMPFS_NODE | OBJ_TMPFS)) ==
1665c4ce6faSKonstantin Belousov 		    (OBJ_TMPFS_NODE | OBJ_TMPFS), ("non-tmpfs obj"));
1675c4ce6faSKonstantin Belousov 
1685c4ce6faSKonstantin Belousov 		/*
1695c4ce6faSKonstantin Belousov 		 * In lazy case, do unlocked read, avoid taking vnode
1705c4ce6faSKonstantin Belousov 		 * lock if not needed.  Lost update will be handled on
1715c4ce6faSKonstantin Belousov 		 * the next call.
1725c4ce6faSKonstantin Belousov 		 * For non-lazy case, we must flush all pending
1735c4ce6faSKonstantin Belousov 		 * metadata changes now.
1745c4ce6faSKonstantin Belousov 		 */
1755c4ce6faSKonstantin Belousov 		if (!lazy || (obj->flags & OBJ_TMPFS_DIRTY) != 0) {
17628ce2bc1SKonstantin Belousov 			if (vget(vp, LK_EXCLUSIVE | LK_INTERLOCK,
1775c4ce6faSKonstantin Belousov 			    curthread) != 0)
1785c4ce6faSKonstantin Belousov 				continue;
1795c4ce6faSKonstantin Belousov 			tmpfs_check_mtime(vp);
1805c4ce6faSKonstantin Belousov 			if (!lazy)
1815c4ce6faSKonstantin Belousov 				tmpfs_update(vp);
1825c4ce6faSKonstantin Belousov 			vput(vp);
1835c4ce6faSKonstantin Belousov 		} else {
1845c4ce6faSKonstantin Belousov 			VI_UNLOCK(vp);
1855c4ce6faSKonstantin Belousov 			continue;
1865c4ce6faSKonstantin Belousov 		}
1875c4ce6faSKonstantin Belousov 	}
1885c4ce6faSKonstantin Belousov }
1895c4ce6faSKonstantin Belousov 
1905c4ce6faSKonstantin Belousov struct tmpfs_check_rw_maps_arg {
1915c4ce6faSKonstantin Belousov 	bool found;
1925c4ce6faSKonstantin Belousov };
1935c4ce6faSKonstantin Belousov 
1945c4ce6faSKonstantin Belousov static bool
1955c4ce6faSKonstantin Belousov tmpfs_check_rw_maps_cb(struct mount *mp __unused, vm_map_t map __unused,
1965c4ce6faSKonstantin Belousov     vm_map_entry_t entry __unused, void *arg)
1975c4ce6faSKonstantin Belousov {
1985c4ce6faSKonstantin Belousov 	struct tmpfs_check_rw_maps_arg *a;
1995c4ce6faSKonstantin Belousov 
2005c4ce6faSKonstantin Belousov 	a = arg;
2015c4ce6faSKonstantin Belousov 	a->found = true;
2025c4ce6faSKonstantin Belousov 	return (true);
2035c4ce6faSKonstantin Belousov }
2045c4ce6faSKonstantin Belousov 
2055c4ce6faSKonstantin Belousov /*
2065c4ce6faSKonstantin Belousov  * Revoke write permissions from all mappings of regular files
2075c4ce6faSKonstantin Belousov  * belonging to the specified tmpfs mount.
2085c4ce6faSKonstantin Belousov  */
2095c4ce6faSKonstantin Belousov static bool
2105c4ce6faSKonstantin Belousov tmpfs_revoke_rw_maps_cb(struct mount *mp __unused, vm_map_t map,
2115c4ce6faSKonstantin Belousov     vm_map_entry_t entry, void *arg __unused)
2125c4ce6faSKonstantin Belousov {
2135c4ce6faSKonstantin Belousov 
2145c4ce6faSKonstantin Belousov 	/*
2155c4ce6faSKonstantin Belousov 	 * XXXKIB: might be invalidate the mapping
2165c4ce6faSKonstantin Belousov 	 * instead ?  The process is not going to be
2175c4ce6faSKonstantin Belousov 	 * happy in any case.
2185c4ce6faSKonstantin Belousov 	 */
2195c4ce6faSKonstantin Belousov 	entry->max_protection &= ~VM_PROT_WRITE;
2205c4ce6faSKonstantin Belousov 	if ((entry->protection & VM_PROT_WRITE) != 0) {
2215c4ce6faSKonstantin Belousov 		entry->protection &= ~VM_PROT_WRITE;
2225c4ce6faSKonstantin Belousov 		pmap_protect(map->pmap, entry->start, entry->end,
2235c4ce6faSKonstantin Belousov 		    entry->protection);
2245c4ce6faSKonstantin Belousov 	}
2255c4ce6faSKonstantin Belousov 	return (false);
2265c4ce6faSKonstantin Belousov }
2275c4ce6faSKonstantin Belousov 
2285c4ce6faSKonstantin Belousov static void
2295c4ce6faSKonstantin Belousov tmpfs_all_rw_maps(struct mount *mp, bool (*cb)(struct mount *mp, vm_map_t,
2305c4ce6faSKonstantin Belousov     vm_map_entry_t, void *), void *cb_arg)
2315c4ce6faSKonstantin Belousov {
2325c4ce6faSKonstantin Belousov 	struct proc *p;
2335c4ce6faSKonstantin Belousov 	struct vmspace *vm;
2345c4ce6faSKonstantin Belousov 	vm_map_t map;
2355c4ce6faSKonstantin Belousov 	vm_map_entry_t entry;
2365c4ce6faSKonstantin Belousov 	vm_object_t object;
2375c4ce6faSKonstantin Belousov 	struct vnode *vp;
2385c4ce6faSKonstantin Belousov 	int gen;
2395c4ce6faSKonstantin Belousov 	bool terminate;
2405c4ce6faSKonstantin Belousov 
2415c4ce6faSKonstantin Belousov 	terminate = false;
2425c4ce6faSKonstantin Belousov 	sx_slock(&allproc_lock);
2435c4ce6faSKonstantin Belousov again:
2445c4ce6faSKonstantin Belousov 	gen = allproc_gen;
2455c4ce6faSKonstantin Belousov 	FOREACH_PROC_IN_SYSTEM(p) {
2465c4ce6faSKonstantin Belousov 		PROC_LOCK(p);
2475c4ce6faSKonstantin Belousov 		if (p->p_state != PRS_NORMAL || (p->p_flag & (P_INEXEC |
2485c4ce6faSKonstantin Belousov 		    P_SYSTEM | P_WEXIT)) != 0) {
2495c4ce6faSKonstantin Belousov 			PROC_UNLOCK(p);
2505c4ce6faSKonstantin Belousov 			continue;
2515c4ce6faSKonstantin Belousov 		}
2525c4ce6faSKonstantin Belousov 		vm = vmspace_acquire_ref(p);
2535c4ce6faSKonstantin Belousov 		_PHOLD_LITE(p);
2545c4ce6faSKonstantin Belousov 		PROC_UNLOCK(p);
2555c4ce6faSKonstantin Belousov 		if (vm == NULL) {
2565c4ce6faSKonstantin Belousov 			PRELE(p);
2575c4ce6faSKonstantin Belousov 			continue;
2585c4ce6faSKonstantin Belousov 		}
2595c4ce6faSKonstantin Belousov 		sx_sunlock(&allproc_lock);
2605c4ce6faSKonstantin Belousov 		map = &vm->vm_map;
2615c4ce6faSKonstantin Belousov 
2625c4ce6faSKonstantin Belousov 		vm_map_lock(map);
2635c4ce6faSKonstantin Belousov 		if (map->busy)
2645c4ce6faSKonstantin Belousov 			vm_map_wait_busy(map);
2655c4ce6faSKonstantin Belousov 		for (entry = map->header.next; entry != &map->header;
2665c4ce6faSKonstantin Belousov 		    entry = entry->next) {
2675c4ce6faSKonstantin Belousov 			if ((entry->eflags & (MAP_ENTRY_GUARD |
2685c4ce6faSKonstantin Belousov 			    MAP_ENTRY_IS_SUB_MAP | MAP_ENTRY_COW)) != 0 ||
2695c4ce6faSKonstantin Belousov 			    (entry->max_protection & VM_PROT_WRITE) == 0)
2705c4ce6faSKonstantin Belousov 				continue;
2715c4ce6faSKonstantin Belousov 			object = entry->object.vm_object;
2725c4ce6faSKonstantin Belousov 			if (object == NULL || object->type != OBJT_SWAP ||
2735c4ce6faSKonstantin Belousov 			    (object->flags & OBJ_TMPFS_NODE) == 0)
2745c4ce6faSKonstantin Belousov 				continue;
2755c4ce6faSKonstantin Belousov 			/*
2765c4ce6faSKonstantin Belousov 			 * No need to dig into shadow chain, mapping
2775c4ce6faSKonstantin Belousov 			 * of the object not at top is readonly.
2785c4ce6faSKonstantin Belousov 			 */
2795c4ce6faSKonstantin Belousov 
2805c4ce6faSKonstantin Belousov 			VM_OBJECT_RLOCK(object);
2815c4ce6faSKonstantin Belousov 			if (object->type == OBJT_DEAD) {
2825c4ce6faSKonstantin Belousov 				VM_OBJECT_RUNLOCK(object);
2835c4ce6faSKonstantin Belousov 				continue;
2845c4ce6faSKonstantin Belousov 			}
2855c4ce6faSKonstantin Belousov 			MPASS(object->ref_count > 1);
2865c4ce6faSKonstantin Belousov 			if ((object->flags & (OBJ_TMPFS_NODE | OBJ_TMPFS)) !=
2875c4ce6faSKonstantin Belousov 			    (OBJ_TMPFS_NODE | OBJ_TMPFS)) {
2885c4ce6faSKonstantin Belousov 				VM_OBJECT_RUNLOCK(object);
2895c4ce6faSKonstantin Belousov 				continue;
2905c4ce6faSKonstantin Belousov 			}
2915c4ce6faSKonstantin Belousov 			vp = object->un_pager.swp.swp_tmpfs;
2925c4ce6faSKonstantin Belousov 			if (vp->v_mount != mp) {
2935c4ce6faSKonstantin Belousov 				VM_OBJECT_RUNLOCK(object);
2945c4ce6faSKonstantin Belousov 				continue;
2955c4ce6faSKonstantin Belousov 			}
2965c4ce6faSKonstantin Belousov 
2975c4ce6faSKonstantin Belousov 			terminate = cb(mp, map, entry, cb_arg);
2985c4ce6faSKonstantin Belousov 			VM_OBJECT_RUNLOCK(object);
2995c4ce6faSKonstantin Belousov 			if (terminate)
3005c4ce6faSKonstantin Belousov 				break;
3015c4ce6faSKonstantin Belousov 		}
3025c4ce6faSKonstantin Belousov 		vm_map_unlock(map);
3035c4ce6faSKonstantin Belousov 
3045c4ce6faSKonstantin Belousov 		vmspace_free(vm);
3055c4ce6faSKonstantin Belousov 		sx_slock(&allproc_lock);
3065c4ce6faSKonstantin Belousov 		PRELE(p);
3075c4ce6faSKonstantin Belousov 		if (terminate)
3085c4ce6faSKonstantin Belousov 			break;
3095c4ce6faSKonstantin Belousov 	}
3105c4ce6faSKonstantin Belousov 	if (!terminate && gen != allproc_gen)
3115c4ce6faSKonstantin Belousov 		goto again;
3125c4ce6faSKonstantin Belousov 	sx_sunlock(&allproc_lock);
3135c4ce6faSKonstantin Belousov }
3145c4ce6faSKonstantin Belousov 
3155c4ce6faSKonstantin Belousov static bool
3165c4ce6faSKonstantin Belousov tmpfs_check_rw_maps(struct mount *mp)
3175c4ce6faSKonstantin Belousov {
3185c4ce6faSKonstantin Belousov 	struct tmpfs_check_rw_maps_arg ca;
3195c4ce6faSKonstantin Belousov 
3205c4ce6faSKonstantin Belousov 	ca.found = false;
3215c4ce6faSKonstantin Belousov 	tmpfs_all_rw_maps(mp, tmpfs_check_rw_maps_cb, &ca);
3225c4ce6faSKonstantin Belousov 	return (ca.found);
3235c4ce6faSKonstantin Belousov }
3245c4ce6faSKonstantin Belousov 
3255c4ce6faSKonstantin Belousov static int
3265c4ce6faSKonstantin Belousov tmpfs_rw_to_ro(struct mount *mp)
3275c4ce6faSKonstantin Belousov {
3285c4ce6faSKonstantin Belousov 	int error, flags;
3295c4ce6faSKonstantin Belousov 	bool forced;
3305c4ce6faSKonstantin Belousov 
3315c4ce6faSKonstantin Belousov 	forced = (mp->mnt_flag & MNT_FORCE) != 0;
3325c4ce6faSKonstantin Belousov 	flags = WRITECLOSE | (forced ? FORCECLOSE : 0);
3335c4ce6faSKonstantin Belousov 
3345c4ce6faSKonstantin Belousov 	if ((error = vn_start_write(NULL, &mp, V_WAIT)) != 0)
3355c4ce6faSKonstantin Belousov 		return (error);
3365c4ce6faSKonstantin Belousov 	error = vfs_write_suspend_umnt(mp);
3375c4ce6faSKonstantin Belousov 	if (error != 0)
3385c4ce6faSKonstantin Belousov 		return (error);
3395c4ce6faSKonstantin Belousov 	if (!forced && tmpfs_check_rw_maps(mp)) {
3405c4ce6faSKonstantin Belousov 		error = EBUSY;
3415c4ce6faSKonstantin Belousov 		goto out;
3425c4ce6faSKonstantin Belousov 	}
3435c4ce6faSKonstantin Belousov 	VFS_TO_TMPFS(mp)->tm_ronly = 1;
3445c4ce6faSKonstantin Belousov 	MNT_ILOCK(mp);
3455c4ce6faSKonstantin Belousov 	mp->mnt_flag |= MNT_RDONLY;
3465c4ce6faSKonstantin Belousov 	MNT_IUNLOCK(mp);
3475c4ce6faSKonstantin Belousov 	for (;;) {
3485c4ce6faSKonstantin Belousov 		tmpfs_all_rw_maps(mp, tmpfs_revoke_rw_maps_cb, NULL);
3495c4ce6faSKonstantin Belousov 		tmpfs_update_mtime(mp, false);
3505c4ce6faSKonstantin Belousov 		error = vflush(mp, 0, flags, curthread);
3515c4ce6faSKonstantin Belousov 		if (error != 0) {
3525c4ce6faSKonstantin Belousov 			VFS_TO_TMPFS(mp)->tm_ronly = 0;
3535c4ce6faSKonstantin Belousov 			MNT_ILOCK(mp);
3545c4ce6faSKonstantin Belousov 			mp->mnt_flag &= ~MNT_RDONLY;
3555c4ce6faSKonstantin Belousov 			MNT_IUNLOCK(mp);
3565c4ce6faSKonstantin Belousov 			goto out;
3575c4ce6faSKonstantin Belousov 		}
3585c4ce6faSKonstantin Belousov 		if (!tmpfs_check_rw_maps(mp))
3595c4ce6faSKonstantin Belousov 			break;
3605c4ce6faSKonstantin Belousov 	}
3615c4ce6faSKonstantin Belousov out:
3625c4ce6faSKonstantin Belousov 	vfs_write_resume(mp, 0);
3635c4ce6faSKonstantin Belousov 	return (error);
3645c4ce6faSKonstantin Belousov }
3655c4ce6faSKonstantin Belousov 
366d1fa59e9SXin LI static int
367dfd233edSAttilio Rao tmpfs_mount(struct mount *mp)
368d1fa59e9SXin LI {
3699295c628SGleb Kurtsou 	const size_t nodes_per_page = howmany(PAGE_SIZE,
3709295c628SGleb Kurtsou 	    sizeof(struct tmpfs_dirent) + sizeof(struct tmpfs_node));
371d1fa59e9SXin LI 	struct tmpfs_mount *tmp;
372d1fa59e9SXin LI 	struct tmpfs_node *root;
3735c4ce6faSKonstantin Belousov 	int error;
37400ac6a98SKonstantin Belousov 	bool nonc;
3751df86a32SXin LI 	/* Size counters. */
3760ff93c48SGleb Kurtsou 	u_quad_t pages;
3770ff93c48SGleb Kurtsou 	off_t nodes_max, size_max, maxfilesize;
3781df86a32SXin LI 
3791df86a32SXin LI 	/* Root node attributes. */
3801df86a32SXin LI 	uid_t root_uid;
3811df86a32SXin LI 	gid_t root_gid;
3821df86a32SXin LI 	mode_t root_mode;
3831df86a32SXin LI 
3841df86a32SXin LI 	struct vattr va;
385d1fa59e9SXin LI 
386d1fa59e9SXin LI 	if (vfs_filteropt(mp->mnt_optnew, tmpfs_opts))
387d1fa59e9SXin LI 		return (EINVAL);
388d1fa59e9SXin LI 
389d1fa59e9SXin LI 	if (mp->mnt_flag & MNT_UPDATE) {
390c5ab5ce3SJaakko Heinonen 		/* Only support update mounts for certain options. */
391c5ab5ce3SJaakko Heinonen 		if (vfs_filteropt(mp->mnt_optnew, tmpfs_updateopts) != 0)
392e0d3195bSKevin Lo 			return (EOPNOTSUPP);
393ac1a10efSMaxim Sobolev 		if (vfs_getopt_size(mp->mnt_optnew, "size", &size_max) == 0) {
394ac1a10efSMaxim Sobolev 			/*
395ac1a10efSMaxim Sobolev 			 * On-the-fly resizing is not supported (yet). We still
396ac1a10efSMaxim Sobolev 			 * need to have "size" listed as "supported", otherwise
397ac1a10efSMaxim Sobolev 			 * trying to update fs that is listed in fstab with size
398ac1a10efSMaxim Sobolev 			 * parameter, say trying to change rw to ro or vice
399ac1a10efSMaxim Sobolev 			 * versa, would cause vfs_filteropt() to bail.
400ac1a10efSMaxim Sobolev 			 */
4014f207061SMaxim Sobolev 			if (size_max != VFS_TO_TMPFS(mp)->tm_size_max)
402c5ab5ce3SJaakko Heinonen 				return (EOPNOTSUPP);
403ac1a10efSMaxim Sobolev 		}
404ac1a10efSMaxim Sobolev 		if (vfs_flagopt(mp->mnt_optnew, "ro", NULL, 0) &&
4054f207061SMaxim Sobolev 		    !(VFS_TO_TMPFS(mp)->tm_ronly)) {
406ac1a10efSMaxim Sobolev 			/* RW -> RO */
4075c4ce6faSKonstantin Belousov 			return (tmpfs_rw_to_ro(mp));
408ac1a10efSMaxim Sobolev 		} else if (!vfs_flagopt(mp->mnt_optnew, "ro", NULL, 0) &&
4094f207061SMaxim Sobolev 		    VFS_TO_TMPFS(mp)->tm_ronly) {
410ac1a10efSMaxim Sobolev 			/* RO -> RW */
4114f207061SMaxim Sobolev 			VFS_TO_TMPFS(mp)->tm_ronly = 0;
412ac1a10efSMaxim Sobolev 			MNT_ILOCK(mp);
413ac1a10efSMaxim Sobolev 			mp->mnt_flag &= ~MNT_RDONLY;
414ac1a10efSMaxim Sobolev 			MNT_IUNLOCK(mp);
415ac1a10efSMaxim Sobolev 		}
416c5ab5ce3SJaakko Heinonen 		return (0);
417d1fa59e9SXin LI 	}
418d1fa59e9SXin LI 
419cb05b60aSAttilio Rao 	vn_lock(mp->mnt_vnodecovered, LK_SHARED | LK_RETRY);
4200359a12eSAttilio Rao 	error = VOP_GETATTR(mp->mnt_vnodecovered, &va, mp->mnt_cred);
42122db15c0SAttilio Rao 	VOP_UNLOCK(mp->mnt_vnodecovered, 0);
4221df86a32SXin LI 	if (error)
4231df86a32SXin LI 		return (error);
4241df86a32SXin LI 
4251df86a32SXin LI 	if (mp->mnt_cred->cr_ruid != 0 ||
4261df86a32SXin LI 	    vfs_scanopt(mp->mnt_optnew, "gid", "%d", &root_gid) != 1)
4271df86a32SXin LI 		root_gid = va.va_gid;
4281df86a32SXin LI 	if (mp->mnt_cred->cr_ruid != 0 ||
4291df86a32SXin LI 	    vfs_scanopt(mp->mnt_optnew, "uid", "%d", &root_uid) != 1)
4301df86a32SXin LI 		root_uid = va.va_uid;
4311df86a32SXin LI 	if (mp->mnt_cred->cr_ruid != 0 ||
432eed4ee29SXin LI 	    vfs_scanopt(mp->mnt_optnew, "mode", "%ho", &root_mode) != 1)
4331df86a32SXin LI 		root_mode = va.va_mode;
4340ff93c48SGleb Kurtsou 	if (vfs_getopt_size(mp->mnt_optnew, "inodes", &nodes_max) != 0)
4351df86a32SXin LI 		nodes_max = 0;
4360ff93c48SGleb Kurtsou 	if (vfs_getopt_size(mp->mnt_optnew, "size", &size_max) != 0)
4371df86a32SXin LI 		size_max = 0;
4380ff93c48SGleb Kurtsou 	if (vfs_getopt_size(mp->mnt_optnew, "maxfilesize", &maxfilesize) != 0)
439dec3772eSJaakko Heinonen 		maxfilesize = 0;
44000ac6a98SKonstantin Belousov 	nonc = vfs_getopt(mp->mnt_optnew, "nonc", NULL, NULL) == 0;
441d1fa59e9SXin LI 
442d1fa59e9SXin LI 	/* Do not allow mounts if we do not have enough memory to preserve
443d1fa59e9SXin LI 	 * the minimum reserved pages. */
444da7aa277SGleb Kurtsou 	if (tmpfs_mem_avail() < TMPFS_PAGES_MINRESERVED)
445bba7ed20SKonstantin Belousov 		return (ENOSPC);
446d1fa59e9SXin LI 
447d1fa59e9SXin LI 	/* Get the maximum number of memory pages this file system is
448d1fa59e9SXin LI 	 * allowed to use, based on the maximum size the user passed in
449d1fa59e9SXin LI 	 * the mount structure.  A value of zero is treated as if the
450d1fa59e9SXin LI 	 * maximum available space was requested. */
4510742ebc9SBryan Drewery 	if (size_max == 0 || size_max > OFF_MAX - PAGE_SIZE ||
4520ff93c48SGleb Kurtsou 	    (SIZE_MAX < OFF_MAX && size_max / PAGE_SIZE >= SIZE_MAX))
453d1fa59e9SXin LI 		pages = SIZE_MAX;
4540742ebc9SBryan Drewery 	else {
4550742ebc9SBryan Drewery 		size_max = roundup(size_max, PAGE_SIZE);
4561df86a32SXin LI 		pages = howmany(size_max, PAGE_SIZE);
4570742ebc9SBryan Drewery 	}
458d1fa59e9SXin LI 	MPASS(pages > 0);
459d1fa59e9SXin LI 
460189ee6beSJaakko Heinonen 	if (nodes_max <= 3) {
4619295c628SGleb Kurtsou 		if (pages < INT_MAX / nodes_per_page)
4629295c628SGleb Kurtsou 			nodes_max = pages * nodes_per_page;
463d1fa59e9SXin LI 		else
4649295c628SGleb Kurtsou 			nodes_max = INT_MAX;
4650ff93c48SGleb Kurtsou 	}
4669295c628SGleb Kurtsou 	if (nodes_max > INT_MAX)
4679295c628SGleb Kurtsou 		nodes_max = INT_MAX;
4680ff93c48SGleb Kurtsou 	MPASS(nodes_max >= 3);
469d1fa59e9SXin LI 
470d1fa59e9SXin LI 	/* Allocate the tmpfs mount structure and fill it. */
471d1fa59e9SXin LI 	tmp = (struct tmpfs_mount *)malloc(sizeof(struct tmpfs_mount),
472d1fa59e9SXin LI 	    M_TMPFSMNT, M_WAITOK | M_ZERO);
473d1fa59e9SXin LI 
474280ffa5eSKonstantin Belousov 	mtx_init(&tmp->tm_allnode_lock, "tmpfs allnode lock", NULL, MTX_DEF);
4750ff93c48SGleb Kurtsou 	tmp->tm_nodes_max = nodes_max;
476d1fa59e9SXin LI 	tmp->tm_nodes_inuse = 0;
47764c25043SKonstantin Belousov 	tmp->tm_refcount = 1;
4780ff93c48SGleb Kurtsou 	tmp->tm_maxfilesize = maxfilesize > 0 ? maxfilesize : OFF_MAX;
479d1fa59e9SXin LI 	LIST_INIT(&tmp->tm_nodes_used);
480d1fa59e9SXin LI 
481ac1a10efSMaxim Sobolev 	tmp->tm_size_max = size_max;
482d1fa59e9SXin LI 	tmp->tm_pages_max = pages;
483d1fa59e9SXin LI 	tmp->tm_pages_used = 0;
48430e0cf49SMateusz Guzik 	new_unrhdr64(&tmp->tm_ino_unr, 2);
485e0f51ae7SXin LI 	tmp->tm_dirent_pool = uma_zcreate("TMPFS dirent",
486bba7ed20SKonstantin Belousov 	    sizeof(struct tmpfs_dirent), NULL, NULL, NULL, NULL,
487e0f51ae7SXin LI 	    UMA_ALIGN_PTR, 0);
488e0f51ae7SXin LI 	tmp->tm_node_pool = uma_zcreate("TMPFS node",
489bba7ed20SKonstantin Belousov 	    sizeof(struct tmpfs_node), tmpfs_node_ctor, tmpfs_node_dtor,
490bba7ed20SKonstantin Belousov 	    tmpfs_node_init, tmpfs_node_fini, UMA_ALIGN_PTR, 0);
491c5ab5ce3SJaakko Heinonen 	tmp->tm_ronly = (mp->mnt_flag & MNT_RDONLY) != 0;
49200ac6a98SKonstantin Belousov 	tmp->tm_nonc = nonc;
493d1fa59e9SXin LI 
494d1fa59e9SXin LI 	/* Allocate the root node. */
495bba7ed20SKonstantin Belousov 	error = tmpfs_alloc_node(mp, tmp, VDIR, root_uid, root_gid,
496bba7ed20SKonstantin Belousov 	    root_mode & ALLPERMS, NULL, NULL, VNOVAL, &root);
497d1fa59e9SXin LI 
498d1fa59e9SXin LI 	if (error != 0 || root == NULL) {
4997adb1776SXin LI 		uma_zdestroy(tmp->tm_node_pool);
5007adb1776SXin LI 		uma_zdestroy(tmp->tm_dirent_pool);
501d1fa59e9SXin LI 		free(tmp, M_TMPFSMNT);
502bba7ed20SKonstantin Belousov 		return (error);
503d1fa59e9SXin LI 	}
504fc8fdae0SMatthew D Fleming 	KASSERT(root->tn_id == 2,
505fc8fdae0SMatthew D Fleming 	    ("tmpfs root with invalid ino: %ju", (uintmax_t)root->tn_id));
506d1fa59e9SXin LI 	tmp->tm_root = root;
507d1fa59e9SXin LI 
508d1fa59e9SXin LI 	MNT_ILOCK(mp);
509d1fa59e9SXin LI 	mp->mnt_flag |= MNT_LOCAL;
510*de4e1aebSKonstantin Belousov 	mp->mnt_kern_flag |= MNTK_LOOKUP_SHARED | MNTK_EXTENDED_SHARED |
511*de4e1aebSKonstantin Belousov 	    MNTK_TEXT_REFS;
512d1fa59e9SXin LI 	MNT_IUNLOCK(mp);
513d1fa59e9SXin LI 
514d1fa59e9SXin LI 	mp->mnt_data = tmp;
515d1fa59e9SXin LI 	mp->mnt_stat.f_namemax = MAXNAMLEN;
516d1fa59e9SXin LI 	vfs_getnewfsid(mp);
517d1fa59e9SXin LI 	vfs_mountedfrom(mp, "tmpfs");
518d1fa59e9SXin LI 
519d1fa59e9SXin LI 	return 0;
520d1fa59e9SXin LI }
521d1fa59e9SXin LI 
522d1fa59e9SXin LI /* ARGSUSED2 */
523d1fa59e9SXin LI static int
524dfd233edSAttilio Rao tmpfs_unmount(struct mount *mp, int mntflags)
525d1fa59e9SXin LI {
526d1fa59e9SXin LI 	struct tmpfs_mount *tmp;
527d1fa59e9SXin LI 	struct tmpfs_node *node;
5284cda7f7eSKonstantin Belousov 	int error, flags;
529d1fa59e9SXin LI 
5304cda7f7eSKonstantin Belousov 	flags = (mntflags & MNT_FORCE) != 0 ? FORCECLOSE : 0;
531d1fa59e9SXin LI 	tmp = VFS_TO_TMPFS(mp);
532d1fa59e9SXin LI 
5334cda7f7eSKonstantin Belousov 	/* Stop writers */
5344cda7f7eSKonstantin Belousov 	error = vfs_write_suspend_umnt(mp);
5354cda7f7eSKonstantin Belousov 	if (error != 0)
5364cda7f7eSKonstantin Belousov 		return (error);
5374cda7f7eSKonstantin Belousov 	/*
5384cda7f7eSKonstantin Belousov 	 * At this point, nodes cannot be destroyed by any other
5394cda7f7eSKonstantin Belousov 	 * thread because write suspension is started.
5404cda7f7eSKonstantin Belousov 	 */
541d1fa59e9SXin LI 
5424cda7f7eSKonstantin Belousov 	for (;;) {
5434cda7f7eSKonstantin Belousov 		error = vflush(mp, 0, flags, curthread);
5444cda7f7eSKonstantin Belousov 		if (error != 0) {
5454cda7f7eSKonstantin Belousov 			vfs_write_resume(mp, VR_START_WRITE);
5464cda7f7eSKonstantin Belousov 			return (error);
5474cda7f7eSKonstantin Belousov 		}
5484cda7f7eSKonstantin Belousov 		MNT_ILOCK(mp);
5494cda7f7eSKonstantin Belousov 		if (mp->mnt_nvnodelistsize == 0) {
5504cda7f7eSKonstantin Belousov 			MNT_IUNLOCK(mp);
5514cda7f7eSKonstantin Belousov 			break;
5524cda7f7eSKonstantin Belousov 		}
5534cda7f7eSKonstantin Belousov 		MNT_IUNLOCK(mp);
5544cda7f7eSKonstantin Belousov 		if ((mntflags & MNT_FORCE) == 0) {
5554cda7f7eSKonstantin Belousov 			vfs_write_resume(mp, VR_START_WRITE);
5564cda7f7eSKonstantin Belousov 			return (EBUSY);
5574cda7f7eSKonstantin Belousov 		}
5584cda7f7eSKonstantin Belousov 	}
5594cda7f7eSKonstantin Belousov 
5604cda7f7eSKonstantin Belousov 	TMPFS_LOCK(tmp);
5614cda7f7eSKonstantin Belousov 	while ((node = LIST_FIRST(&tmp->tm_nodes_used)) != NULL) {
56264c25043SKonstantin Belousov 		TMPFS_NODE_LOCK(node);
5634fd5efe7SGleb Kurtsou 		if (node->tn_type == VDIR)
5644fd5efe7SGleb Kurtsou 			tmpfs_dir_destroy(tmp, node);
56564c25043SKonstantin Belousov 		if (tmpfs_free_node_locked(tmp, node, true))
5664cda7f7eSKonstantin Belousov 			TMPFS_LOCK(tmp);
56764c25043SKonstantin Belousov 		else
56864c25043SKonstantin Belousov 			TMPFS_NODE_UNLOCK(node);
56964c25043SKonstantin Belousov 	}
57064c25043SKonstantin Belousov 
57164c25043SKonstantin Belousov 	mp->mnt_data = NULL;
57264c25043SKonstantin Belousov 	tmpfs_free_tmp(tmp);
57364c25043SKonstantin Belousov 	vfs_write_resume(mp, VR_START_WRITE);
57464c25043SKonstantin Belousov 
57564c25043SKonstantin Belousov 	MNT_ILOCK(mp);
57664c25043SKonstantin Belousov 	mp->mnt_flag &= ~MNT_LOCAL;
57764c25043SKonstantin Belousov 	MNT_IUNLOCK(mp);
57864c25043SKonstantin Belousov 
57964c25043SKonstantin Belousov 	return (0);
58064c25043SKonstantin Belousov }
58164c25043SKonstantin Belousov 
58264c25043SKonstantin Belousov void
58364c25043SKonstantin Belousov tmpfs_free_tmp(struct tmpfs_mount *tmp)
58464c25043SKonstantin Belousov {
58564c25043SKonstantin Belousov 
58664c25043SKonstantin Belousov 	MPASS(tmp->tm_refcount > 0);
58764c25043SKonstantin Belousov 	tmp->tm_refcount--;
58864c25043SKonstantin Belousov 	if (tmp->tm_refcount > 0) {
58964c25043SKonstantin Belousov 		TMPFS_UNLOCK(tmp);
59064c25043SKonstantin Belousov 		return;
591d1fa59e9SXin LI 	}
5924cda7f7eSKonstantin Belousov 	TMPFS_UNLOCK(tmp);
593d1fa59e9SXin LI 
5947adb1776SXin LI 	uma_zdestroy(tmp->tm_dirent_pool);
5957adb1776SXin LI 	uma_zdestroy(tmp->tm_node_pool);
596d1fa59e9SXin LI 
597280ffa5eSKonstantin Belousov 	mtx_destroy(&tmp->tm_allnode_lock);
598d1fa59e9SXin LI 	MPASS(tmp->tm_pages_used == 0);
5991df86a32SXin LI 	MPASS(tmp->tm_nodes_inuse == 0);
600d1fa59e9SXin LI 
60164c25043SKonstantin Belousov 	free(tmp, M_TMPFSMNT);
602d1fa59e9SXin LI }
603d1fa59e9SXin LI 
604d1fa59e9SXin LI static int
605dfd233edSAttilio Rao tmpfs_root(struct mount *mp, int flags, struct vnode **vpp)
606d1fa59e9SXin LI {
607d1fa59e9SXin LI 	int error;
608bba7ed20SKonstantin Belousov 
609dfd233edSAttilio Rao 	error = tmpfs_alloc_vp(mp, VFS_TO_TMPFS(mp)->tm_root, flags, vpp);
610bba7ed20SKonstantin Belousov 	if (error == 0)
6117adb1776SXin LI 		(*vpp)->v_vflag |= VV_ROOT;
612bba7ed20SKonstantin Belousov 	return (error);
613d1fa59e9SXin LI }
614d1fa59e9SXin LI 
615d1fa59e9SXin LI static int
616694a586aSRick Macklem tmpfs_fhtovp(struct mount *mp, struct fid *fhp, int flags,
617694a586aSRick Macklem     struct vnode **vpp)
618d1fa59e9SXin LI {
619d1fa59e9SXin LI 	struct tmpfs_fid *tfhp;
620d1fa59e9SXin LI 	struct tmpfs_mount *tmp;
621d1fa59e9SXin LI 	struct tmpfs_node *node;
62264c25043SKonstantin Belousov 	int error;
623d1fa59e9SXin LI 
624d1fa59e9SXin LI 	tmp = VFS_TO_TMPFS(mp);
625d1fa59e9SXin LI 
626d1fa59e9SXin LI 	tfhp = (struct tmpfs_fid *)fhp;
627d1fa59e9SXin LI 	if (tfhp->tf_len != sizeof(struct tmpfs_fid))
62864c25043SKonstantin Belousov 		return (EINVAL);
629d1fa59e9SXin LI 
630d1fa59e9SXin LI 	if (tfhp->tf_id >= tmp->tm_nodes_max)
63164c25043SKonstantin Belousov 		return (EINVAL);
632d1fa59e9SXin LI 
633d1fa59e9SXin LI 	TMPFS_LOCK(tmp);
634d1fa59e9SXin LI 	LIST_FOREACH(node, &tmp->tm_nodes_used, tn_entries) {
635d1fa59e9SXin LI 		if (node->tn_id == tfhp->tf_id &&
636d1fa59e9SXin LI 		    node->tn_gen == tfhp->tf_gen) {
63764c25043SKonstantin Belousov 			tmpfs_ref_node(node);
638d1fa59e9SXin LI 			break;
639d1fa59e9SXin LI 		}
640d1fa59e9SXin LI 	}
641d1fa59e9SXin LI 	TMPFS_UNLOCK(tmp);
642d1fa59e9SXin LI 
64364c25043SKonstantin Belousov 	if (node != NULL) {
64464c25043SKonstantin Belousov 		error = tmpfs_alloc_vp(mp, node, LK_EXCLUSIVE, vpp);
64564c25043SKonstantin Belousov 		tmpfs_free_node(tmp, node);
64664c25043SKonstantin Belousov 	} else
64764c25043SKonstantin Belousov 		error = EINVAL;
64864c25043SKonstantin Belousov 	return (error);
649d1fa59e9SXin LI }
650d1fa59e9SXin LI 
651d1fa59e9SXin LI /* ARGSUSED2 */
652d1fa59e9SXin LI static int
653dfd233edSAttilio Rao tmpfs_statfs(struct mount *mp, struct statfs *sbp)
654d1fa59e9SXin LI {
655d1fa59e9SXin LI 	struct tmpfs_mount *tmp;
656da7aa277SGleb Kurtsou 	size_t used;
657d1fa59e9SXin LI 
658d1fa59e9SXin LI 	tmp = VFS_TO_TMPFS(mp);
659d1fa59e9SXin LI 
660d1fa59e9SXin LI 	sbp->f_iosize = PAGE_SIZE;
661d1fa59e9SXin LI 	sbp->f_bsize = PAGE_SIZE;
662d1fa59e9SXin LI 
663da7aa277SGleb Kurtsou 	used = tmpfs_pages_used(tmp);
664ed2159c9SMateusz Guzik 	if (tmp->tm_pages_max != ULONG_MAX)
665da7aa277SGleb Kurtsou 		 sbp->f_blocks = tmp->tm_pages_max;
666da7aa277SGleb Kurtsou 	else
667da7aa277SGleb Kurtsou 		 sbp->f_blocks = used + tmpfs_mem_avail();
668da7aa277SGleb Kurtsou 	if (sbp->f_blocks <= used)
669da7aa277SGleb Kurtsou 		sbp->f_bavail = 0;
670da7aa277SGleb Kurtsou 	else
671da7aa277SGleb Kurtsou 		sbp->f_bavail = sbp->f_blocks - used;
672da7aa277SGleb Kurtsou 	sbp->f_bfree = sbp->f_bavail;
673da7aa277SGleb Kurtsou 	used = tmp->tm_nodes_inuse;
674da7aa277SGleb Kurtsou 	sbp->f_files = tmp->tm_nodes_max;
675da7aa277SGleb Kurtsou 	if (sbp->f_files <= used)
676da7aa277SGleb Kurtsou 		sbp->f_ffree = 0;
677da7aa277SGleb Kurtsou 	else
678da7aa277SGleb Kurtsou 		sbp->f_ffree = sbp->f_files - used;
679d1fa59e9SXin LI 	/* sbp->f_owner = tmp->tn_uid; */
680d1fa59e9SXin LI 
681d1fa59e9SXin LI 	return 0;
682d1fa59e9SXin LI }
683d1fa59e9SXin LI 
6844cda7f7eSKonstantin Belousov static int
6854cda7f7eSKonstantin Belousov tmpfs_sync(struct mount *mp, int waitfor)
6864cda7f7eSKonstantin Belousov {
6874cda7f7eSKonstantin Belousov 
6884cda7f7eSKonstantin Belousov 	if (waitfor == MNT_SUSPEND) {
6894cda7f7eSKonstantin Belousov 		MNT_ILOCK(mp);
6904cda7f7eSKonstantin Belousov 		mp->mnt_kern_flag |= MNTK_SUSPEND2 | MNTK_SUSPENDED;
6914cda7f7eSKonstantin Belousov 		MNT_IUNLOCK(mp);
692f40cb1c6SKonstantin Belousov 	} else if (waitfor == MNT_LAZY) {
6935c4ce6faSKonstantin Belousov 		tmpfs_update_mtime(mp, true);
6944cda7f7eSKonstantin Belousov 	}
6954cda7f7eSKonstantin Belousov 	return (0);
6964cda7f7eSKonstantin Belousov }
6974cda7f7eSKonstantin Belousov 
698d1fa59e9SXin LI /*
6995f34e93cSMark Johnston  * The presence of a susp_clean method tells the VFS to track writes.
7005f34e93cSMark Johnston  */
7015f34e93cSMark Johnston static void
7025f34e93cSMark Johnston tmpfs_susp_clean(struct mount *mp __unused)
7035f34e93cSMark Johnston {
7045f34e93cSMark Johnston }
7055f34e93cSMark Johnston 
7065f34e93cSMark Johnston /*
707d1fa59e9SXin LI  * tmpfs vfs operations.
708d1fa59e9SXin LI  */
709d1fa59e9SXin LI 
710d1fa59e9SXin LI struct vfsops tmpfs_vfsops = {
711d1fa59e9SXin LI 	.vfs_mount =			tmpfs_mount,
712d1fa59e9SXin LI 	.vfs_unmount =			tmpfs_unmount,
713d1fa59e9SXin LI 	.vfs_root =			tmpfs_root,
714d1fa59e9SXin LI 	.vfs_statfs =			tmpfs_statfs,
715d1fa59e9SXin LI 	.vfs_fhtovp =			tmpfs_fhtovp,
7164cda7f7eSKonstantin Belousov 	.vfs_sync =			tmpfs_sync,
7175f34e93cSMark Johnston 	.vfs_susp_clean =		tmpfs_susp_clean,
718d1fa59e9SXin LI };
7192454886eSXin LI VFS_SET(tmpfs_vfsops, tmpfs, VFCF_JAIL);
720