xref: /illumos-gate/usr/src/uts/common/fs/tmpfs/tmp_vnops.c (revision 600d77457b335b6f448f13d5f33bf7e70dfbb39d)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #include <sys/types.h>
29 #include <sys/param.h>
30 #include <sys/t_lock.h>
31 #include <sys/systm.h>
32 #include <sys/sysmacros.h>
33 #include <sys/user.h>
34 #include <sys/time.h>
35 #include <sys/vfs.h>
36 #include <sys/vfs_opreg.h>
37 #include <sys/vnode.h>
38 #include <sys/file.h>
39 #include <sys/fcntl.h>
40 #include <sys/flock.h>
41 #include <sys/kmem.h>
42 #include <sys/uio.h>
43 #include <sys/errno.h>
44 #include <sys/stat.h>
45 #include <sys/cred.h>
46 #include <sys/dirent.h>
47 #include <sys/pathname.h>
48 #include <sys/vmsystm.h>
49 #include <sys/fs/tmp.h>
50 #include <sys/fs/tmpnode.h>
51 #include <sys/mman.h>
52 #include <vm/hat.h>
53 #include <vm/seg_vn.h>
54 #include <vm/seg_map.h>
55 #include <vm/seg.h>
56 #include <vm/anon.h>
57 #include <vm/as.h>
58 #include <vm/page.h>
59 #include <vm/pvn.h>
60 #include <sys/cmn_err.h>
61 #include <sys/debug.h>
62 #include <sys/swap.h>
63 #include <sys/buf.h>
64 #include <sys/vm.h>
65 #include <sys/vtrace.h>
66 #include <sys/policy.h>
67 #include <fs/fs_subr.h>
68 
69 static int	tmp_getapage(struct vnode *, u_offset_t, size_t, uint_t *,
70 	page_t **, size_t, struct seg *, caddr_t, enum seg_rw, struct cred *);
71 static int 	tmp_putapage(struct vnode *, page_t *, u_offset_t *, size_t *,
72 	int, struct cred *);
73 
74 /* ARGSUSED1 */
75 static int
76 tmp_open(struct vnode **vpp, int flag, struct cred *cred)
77 {
78 	/*
79 	 * swapon to a tmpfs file is not supported so access
80 	 * is denied on open if VISSWAP is set.
81 	 */
82 	if ((*vpp)->v_flag & VISSWAP)
83 		return (EINVAL);
84 	return (0);
85 }
86 
87 /* ARGSUSED1 */
88 static int
89 tmp_close(struct vnode *vp, int flag, int count,
90     offset_t offset, struct cred *cred)
91 {
92 	cleanlocks(vp, ttoproc(curthread)->p_pid, 0);
93 	cleanshares(vp, ttoproc(curthread)->p_pid);
94 	return (0);
95 }
96 
97 /*
98  * wrtmp does the real work of write requests for tmpfs.
99  */
100 static int
101 wrtmp(
102 	struct tmount *tm,
103 	struct tmpnode *tp,
104 	struct uio *uio,
105 	struct cred *cr,
106 	struct caller_context *ct)
107 {
108 	pgcnt_t pageoffset;	/* offset in pages */
109 	ulong_t segmap_offset;	/* pagesize byte offset into segmap */
110 	caddr_t base;		/* base of segmap */
111 	ssize_t bytes;		/* bytes to uiomove */
112 	pfn_t pagenumber;	/* offset in pages into tmp file */
113 	struct vnode *vp;
114 	int error = 0;
115 	int	pagecreate;	/* == 1 if we allocated a page */
116 	int	newpage;
117 	rlim64_t limit = uio->uio_llimit;
118 	long oresid = uio->uio_resid;
119 	timestruc_t now;
120 
121 	/*
122 	 * tp->tn_size is incremented before the uiomove
123 	 * is done on a write.  If the move fails (bad user
124 	 * address) reset tp->tn_size.
125 	 * The better way would be to increment tp->tn_size
126 	 * only if the uiomove succeeds.
127 	 */
128 	long tn_size_changed = 0;
129 	long old_tn_size;
130 
131 	vp = TNTOV(tp);
132 	ASSERT(vp->v_type == VREG);
133 
134 	TRACE_1(TR_FAC_TMPFS, TR_TMPFS_RWTMP_START,
135 		"tmp_wrtmp_start:vp %p", vp);
136 
137 	ASSERT(RW_WRITE_HELD(&tp->tn_contents));
138 	ASSERT(RW_WRITE_HELD(&tp->tn_rwlock));
139 
140 	if (MANDLOCK(vp, tp->tn_mode)) {
141 		rw_exit(&tp->tn_contents);
142 		/*
143 		 * tmp_getattr ends up being called by chklock
144 		 */
145 		error = chklock(vp, FWRITE,
146 			uio->uio_loffset, uio->uio_resid, uio->uio_fmode, ct);
147 		rw_enter(&tp->tn_contents, RW_WRITER);
148 		if (error != 0) {
149 			TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
150 				"tmp_wrtmp_end:vp %p error %d", vp, error);
151 			return (error);
152 		}
153 	}
154 
155 	if (uio->uio_loffset < 0)
156 		return (EINVAL);
157 
158 	if (limit == RLIM64_INFINITY || limit > MAXOFFSET_T)
159 		limit = MAXOFFSET_T;
160 
161 	if (uio->uio_loffset >= limit) {
162 		proc_t *p = ttoproc(curthread);
163 
164 		mutex_enter(&p->p_lock);
165 		(void) rctl_action(rctlproc_legacy[RLIMIT_FSIZE], p->p_rctls,
166 		    p, RCA_UNSAFE_SIGINFO);
167 		mutex_exit(&p->p_lock);
168 		return (EFBIG);
169 	}
170 
171 	if (uio->uio_loffset >= MAXOFF_T) {
172 		TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
173 			"tmp_wrtmp_end:vp %p error %d", vp, EINVAL);
174 		return (EFBIG);
175 	}
176 
177 	if (uio->uio_resid == 0) {
178 		TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
179 			"tmp_wrtmp_end:vp %p error %d", vp, 0);
180 		return (0);
181 	}
182 
183 	if (limit > MAXOFF_T)
184 		limit = MAXOFF_T;
185 
186 	do {
187 		long	offset;
188 		long	delta;
189 
190 		offset = (long)uio->uio_offset;
191 		pageoffset = offset & PAGEOFFSET;
192 		/*
193 		 * A maximum of PAGESIZE bytes of data is transferred
194 		 * each pass through this loop
195 		 */
196 		bytes = MIN(PAGESIZE - pageoffset, uio->uio_resid);
197 
198 		if (offset + bytes >= limit) {
199 			if (offset >= limit) {
200 				error = EFBIG;
201 				goto out;
202 			}
203 			bytes = limit - offset;
204 		}
205 		pagenumber = btop(offset);
206 
207 		/*
208 		 * delta is the amount of anonymous memory
209 		 * to reserve for the file.
210 		 * We always reserve in pagesize increments so
211 		 * unless we're extending the file into a new page,
212 		 * we don't need to call tmp_resv.
213 		 */
214 		delta = offset + bytes -
215 		    P2ROUNDUP_TYPED(tp->tn_size, PAGESIZE, u_offset_t);
216 		if (delta > 0) {
217 			pagecreate = 1;
218 			if (tmp_resv(tm, tp, delta, pagecreate)) {
219 				/*
220 				 * Log file system full in the zone that owns
221 				 * the tmpfs mount, as well as in the global
222 				 * zone if necessary.
223 				 */
224 				zcmn_err(tm->tm_vfsp->vfs_zone->zone_id,
225 				    CE_WARN, "%s: File system full, "
226 				    "swap space limit exceeded",
227 				    tm->tm_mntpath);
228 
229 				if (tm->tm_vfsp->vfs_zone->zone_id !=
230 				    GLOBAL_ZONEID) {
231 
232 					vfs_t *vfs = tm->tm_vfsp;
233 
234 					zcmn_err(GLOBAL_ZONEID,
235 					    CE_WARN, "%s: File system full, "
236 					    "swap space limit exceeded",
237 					    vfs->vfs_vnodecovered->v_path);
238 				}
239 				error = ENOSPC;
240 				break;
241 			}
242 			tmpnode_growmap(tp, (ulong_t)offset + bytes);
243 		}
244 		/* grow the file to the new length */
245 		if (offset + bytes > tp->tn_size) {
246 			tn_size_changed = 1;
247 			old_tn_size = tp->tn_size;
248 			tp->tn_size = offset + bytes;
249 		}
250 		if (bytes == PAGESIZE) {
251 			/*
252 			 * Writing whole page so reading from disk
253 			 * is a waste
254 			 */
255 			pagecreate = 1;
256 		} else {
257 			pagecreate = 0;
258 		}
259 		/*
260 		 * If writing past EOF or filling in a hole
261 		 * we need to allocate an anon slot.
262 		 */
263 		if (anon_get_ptr(tp->tn_anon, pagenumber) == NULL) {
264 			(void) anon_set_ptr(tp->tn_anon, pagenumber,
265 				anon_alloc(vp, ptob(pagenumber)), ANON_SLEEP);
266 			pagecreate = 1;
267 			tp->tn_nblocks++;
268 		}
269 
270 		/*
271 		 * We have to drop the contents lock to prevent the VM
272 		 * system from trying to reaquire it in tmp_getpage()
273 		 * should the uiomove cause a pagefault. If we're doing
274 		 * a pagecreate segmap creates the page without calling
275 		 * the filesystem so we need to hold onto the lock until
276 		 * the page is created.
277 		 */
278 		if (!pagecreate)
279 			rw_exit(&tp->tn_contents);
280 
281 		newpage = 0;
282 		if (vpm_enable) {
283 			/*
284 			 * XXX Why do we need to hold the contents lock?
285 			 * The kpm mappings will not cause a fault.
286 			 *
287 			 * Copy data. If new pages are created, part of
288 			 * the page that is not written will be initizliazed
289 			 * with zeros.
290 			 */
291 			error = vpm_data_copy(vp, offset, bytes, uio,
292 				!pagecreate, &newpage, 1, S_WRITE);
293 
294 			if (pagecreate) {
295 				rw_exit(&tp->tn_contents);
296 			}
297 		} else {
298 			/* Get offset within the segmap mapping */
299 			segmap_offset = (offset & PAGEMASK) & MAXBOFFSET;
300 			base = segmap_getmapflt(segkmap, vp,
301 						(offset &  MAXBMASK),
302 			    PAGESIZE, !pagecreate, S_WRITE);
303 		}
304 
305 
306 		if (!vpm_enable && pagecreate) {
307 			rw_downgrade(&tp->tn_contents);
308 
309 			/*
310 			 * segmap_pagecreate() returns 1 if it calls
311 			 * page_create_va() to allocate any pages.
312 			 */
313 			newpage = segmap_pagecreate(segkmap,
314 			    base + segmap_offset, (size_t)PAGESIZE, 0);
315 			rw_exit(&tp->tn_contents);
316 			/*
317 			 * Clear from the beginning of the page to the starting
318 			 * offset of the data.
319 			 */
320 			if (pageoffset != 0)
321 				(void) kzero(base + segmap_offset,
322 				    (size_t)pageoffset);
323 		}
324 
325 		if (!vpm_enable) {
326 			error = uiomove(base + segmap_offset + pageoffset,
327 			(long)bytes, UIO_WRITE, uio);
328 		}
329 
330 		if (!vpm_enable && pagecreate &&
331 		    uio->uio_offset < P2ROUNDUP(offset + bytes, PAGESIZE)) {
332 			long	zoffset; /* zero from offset into page */
333 			/*
334 			 * We created pages w/o initializing them completely,
335 			 * thus we need to zero the part that wasn't set up.
336 			 * This happens on most EOF write cases and if
337 			 * we had some sort of error during the uiomove.
338 			 */
339 			long nmoved;
340 
341 			nmoved = uio->uio_offset - offset;
342 			ASSERT((nmoved + pageoffset) <= PAGESIZE);
343 
344 			/*
345 			 * Zero from the end of data in the page to the
346 			 * end of the page.
347 			 */
348 			if ((zoffset = pageoffset + nmoved) < PAGESIZE)
349 				(void) kzero(base + segmap_offset + zoffset,
350 					(size_t)PAGESIZE - zoffset);
351 		}
352 
353 		/*
354 		 * Unlock the pages which have been allocated by
355 		 * page_create_va() in segmap_pagecreate()
356 		 */
357 		if (!vpm_enable && newpage) {
358 			segmap_pageunlock(segkmap, base + segmap_offset,
359 			    (size_t)PAGESIZE, S_WRITE);
360 		}
361 
362 		if (error) {
363 			/*
364 			 * If we failed on a write, we must
365 			 * be sure to invalidate any pages that may have
366 			 * been allocated.
367 			 */
368 			if (vpm_enable) {
369 				(void) vpm_sync_pages(vp, offset,
370 						PAGESIZE, SM_INVAL);
371 			} else {
372 				(void) segmap_release(segkmap, base, SM_INVAL);
373 			}
374 		} else {
375 			if (vpm_enable) {
376 				error = vpm_sync_pages(vp, offset,
377 						PAGESIZE, 0);
378 			} else {
379 				error = segmap_release(segkmap, base, 0);
380 			}
381 		}
382 
383 		/*
384 		 * Re-acquire contents lock.
385 		 */
386 		rw_enter(&tp->tn_contents, RW_WRITER);
387 		/*
388 		 * If the uiomove failed, fix up tn_size.
389 		 */
390 		if (error) {
391 			if (tn_size_changed) {
392 				/*
393 				 * The uiomove failed, and we
394 				 * allocated blocks,so get rid
395 				 * of them.
396 				 */
397 				(void) tmpnode_trunc(tm, tp,
398 				    (ulong_t)old_tn_size);
399 			}
400 		} else {
401 			/*
402 			 * XXX - Can this be out of the loop?
403 			 */
404 			if ((tp->tn_mode & (S_IXUSR | S_IXGRP | S_IXOTH)) &&
405 			    (tp->tn_mode & (S_ISUID | S_ISGID)) &&
406 			    secpolicy_vnode_setid_retain(cr,
407 			    (tp->tn_mode & S_ISUID) != 0 && tp->tn_uid == 0)) {
408 				/*
409 				 * Clear Set-UID & Set-GID bits on
410 				 * successful write if not privileged
411 				 * and at least one of the execute bits
412 				 * is set.  If we always clear Set-GID,
413 				 * mandatory file and record locking is
414 				 * unuseable.
415 				 */
416 				tp->tn_mode &= ~(S_ISUID | S_ISGID);
417 			}
418 			gethrestime(&now);
419 			tp->tn_mtime = now;
420 			tp->tn_ctime = now;
421 		}
422 	} while (error == 0 && uio->uio_resid > 0 && bytes != 0);
423 
424 out:
425 	/*
426 	 * If we've already done a partial-write, terminate
427 	 * the write but return no error.
428 	 */
429 	if (oresid != uio->uio_resid)
430 		error = 0;
431 	TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
432 		"tmp_wrtmp_end:vp %p error %d", vp, error);
433 	return (error);
434 }
435 
436 /*
437  * rdtmp does the real work of read requests for tmpfs.
438  */
439 static int
440 rdtmp(
441 	struct tmount *tm,
442 	struct tmpnode *tp,
443 	struct uio *uio,
444 	struct caller_context *ct)
445 {
446 	ulong_t pageoffset;	/* offset in tmpfs file (uio_offset) */
447 	ulong_t segmap_offset;	/* pagesize byte offset into segmap */
448 	caddr_t base;		/* base of segmap */
449 	ssize_t bytes;		/* bytes to uiomove */
450 	struct vnode *vp;
451 	int error;
452 	long oresid = uio->uio_resid;
453 
454 #if defined(lint)
455 	tm = tm;
456 #endif
457 	vp = TNTOV(tp);
458 
459 	TRACE_1(TR_FAC_TMPFS, TR_TMPFS_RWTMP_START,
460 		"tmp_rdtmp_start:vp %p", vp);
461 
462 	ASSERT(RW_LOCK_HELD(&tp->tn_contents));
463 
464 	if (MANDLOCK(vp, tp->tn_mode)) {
465 		rw_exit(&tp->tn_contents);
466 		/*
467 		 * tmp_getattr ends up being called by chklock
468 		 */
469 		error = chklock(vp, FREAD,
470 			uio->uio_loffset, uio->uio_resid, uio->uio_fmode, ct);
471 		rw_enter(&tp->tn_contents, RW_READER);
472 		if (error != 0) {
473 			TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
474 				"tmp_rdtmp_end:vp %p error %d", vp, error);
475 			return (error);
476 		}
477 	}
478 	ASSERT(tp->tn_type == VREG);
479 
480 	if (uio->uio_loffset >= MAXOFF_T) {
481 		TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
482 			"tmp_rdtmp_end:vp %p error %d", vp, EINVAL);
483 		return (0);
484 	}
485 	if (uio->uio_loffset < 0)
486 		return (EINVAL);
487 	if (uio->uio_resid == 0) {
488 		TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
489 			"tmp_rdtmp_end:vp %p error %d", vp, 0);
490 		return (0);
491 	}
492 
493 	vp = TNTOV(tp);
494 
495 	do {
496 		long diff;
497 		long offset;
498 
499 		offset = uio->uio_offset;
500 		pageoffset = offset & PAGEOFFSET;
501 		bytes = MIN(PAGESIZE - pageoffset, uio->uio_resid);
502 
503 		diff = tp->tn_size - offset;
504 
505 		if (diff <= 0) {
506 			error = 0;
507 			goto out;
508 		}
509 		if (diff < bytes)
510 			bytes = diff;
511 
512 		/*
513 		 * We have to drop the contents lock to prevent the VM
514 		 * system from trying to reaquire it in tmp_getpage()
515 		 * should the uiomove cause a pagefault.
516 		 */
517 		rw_exit(&tp->tn_contents);
518 
519 		if (vpm_enable) {
520 			/*
521 			 * Copy data.
522 			 */
523 			error = vpm_data_copy(vp, offset, bytes, uio,
524 				1, NULL, 0, S_READ);
525 		} else {
526 			segmap_offset = (offset & PAGEMASK) & MAXBOFFSET;
527 			base = segmap_getmapflt(segkmap, vp, offset & MAXBMASK,
528 			    bytes, 1, S_READ);
529 
530 			error = uiomove(base + segmap_offset + pageoffset,
531 			    (long)bytes, UIO_READ, uio);
532 		}
533 
534 		if (error) {
535 			if (vpm_enable) {
536 				(void) vpm_sync_pages(vp, offset,
537 						PAGESIZE, 0);
538 			} else {
539 				(void) segmap_release(segkmap, base, 0);
540 			}
541 		} else {
542 			if (vpm_enable) {
543 				error = vpm_sync_pages(vp, offset,
544 						PAGESIZE, 0);
545 			} else {
546 				error = segmap_release(segkmap, base, 0);
547 			}
548 		}
549 
550 		/*
551 		 * Re-acquire contents lock.
552 		 */
553 		rw_enter(&tp->tn_contents, RW_READER);
554 
555 	} while (error == 0 && uio->uio_resid > 0);
556 
557 out:
558 	gethrestime(&tp->tn_atime);
559 
560 	/*
561 	 * If we've already done a partial read, terminate
562 	 * the read but return no error.
563 	 */
564 	if (oresid != uio->uio_resid)
565 		error = 0;
566 
567 	TRACE_2(TR_FAC_TMPFS, TR_TMPFS_RWTMP_END,
568 		"tmp_rdtmp_end:vp %x error %d", vp, error);
569 	return (error);
570 }
571 
572 /* ARGSUSED2 */
573 static int
574 tmp_read(struct vnode *vp, struct uio *uiop, int ioflag, cred_t *cred,
575 	struct caller_context *ct)
576 {
577 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
578 	struct tmount *tm = (struct tmount *)VTOTM(vp);
579 	int error;
580 
581 	/*
582 	 * We don't currently support reading non-regular files
583 	 */
584 	if (vp->v_type == VDIR)
585 		return (EISDIR);
586 	if (vp->v_type != VREG)
587 		return (EINVAL);
588 	/*
589 	 * tmp_rwlock should have already been called from layers above
590 	 */
591 	ASSERT(RW_READ_HELD(&tp->tn_rwlock));
592 
593 	rw_enter(&tp->tn_contents, RW_READER);
594 
595 	error = rdtmp(tm, tp, uiop, ct);
596 
597 	rw_exit(&tp->tn_contents);
598 
599 	return (error);
600 }
601 
602 static int
603 tmp_write(struct vnode *vp, struct uio *uiop, int ioflag, struct cred *cred,
604 	struct caller_context *ct)
605 {
606 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
607 	struct tmount *tm = (struct tmount *)VTOTM(vp);
608 	int error;
609 
610 	/*
611 	 * We don't currently support writing to non-regular files
612 	 */
613 	if (vp->v_type != VREG)
614 		return (EINVAL);	/* XXX EISDIR? */
615 
616 	/*
617 	 * tmp_rwlock should have already been called from layers above
618 	 */
619 	ASSERT(RW_WRITE_HELD(&tp->tn_rwlock));
620 
621 	rw_enter(&tp->tn_contents, RW_WRITER);
622 
623 	if (ioflag & FAPPEND) {
624 		/*
625 		 * In append mode start at end of file.
626 		 */
627 		uiop->uio_loffset = tp->tn_size;
628 	}
629 
630 	error = wrtmp(tm, tp, uiop, cred, ct);
631 
632 	rw_exit(&tp->tn_contents);
633 
634 	return (error);
635 }
636 
637 /* ARGSUSED */
638 static int
639 tmp_ioctl(struct vnode *vp, int com, intptr_t data, int flag,
640     struct cred *cred, int *rvalp)
641 {
642 	return (ENOTTY);
643 }
644 
645 /* ARGSUSED2 */
646 static int
647 tmp_getattr(struct vnode *vp, struct vattr *vap, int flags, struct cred *cred)
648 {
649 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
650 	struct vnode *mvp;
651 	struct vattr va;
652 	int attrs = 1;
653 
654 	/*
655 	 * A special case to handle the root tnode on a diskless nfs
656 	 * client who may have had its uid and gid inherited
657 	 * from an nfs vnode with nobody ownership.  Likely the
658 	 * root filesystem. After nfs is fully functional the uid/gid
659 	 * may be mapable so ask again.
660 	 * vfsp can't get unmounted because we hold vp.
661 	 */
662 	if (vp->v_flag & VROOT &&
663 	    (mvp = vp->v_vfsp->vfs_vnodecovered) != NULL) {
664 		mutex_enter(&tp->tn_tlock);
665 		if (tp->tn_uid == UID_NOBODY || tp->tn_gid == GID_NOBODY) {
666 			mutex_exit(&tp->tn_tlock);
667 			bzero(&va, sizeof (struct vattr));
668 			va.va_mask = AT_UID|AT_GID;
669 			attrs = VOP_GETATTR(mvp, &va, 0, cred);
670 		} else {
671 			mutex_exit(&tp->tn_tlock);
672 		}
673 	}
674 	mutex_enter(&tp->tn_tlock);
675 	if (attrs == 0) {
676 		tp->tn_uid = va.va_uid;
677 		tp->tn_gid = va.va_gid;
678 	}
679 	vap->va_type = vp->v_type;
680 	vap->va_mode = tp->tn_mode & MODEMASK;
681 	vap->va_uid = tp->tn_uid;
682 	vap->va_gid = tp->tn_gid;
683 	vap->va_fsid = tp->tn_fsid;
684 	vap->va_nodeid = (ino64_t)tp->tn_nodeid;
685 	vap->va_nlink = tp->tn_nlink;
686 	vap->va_size = (u_offset_t)tp->tn_size;
687 	vap->va_atime = tp->tn_atime;
688 	vap->va_mtime = tp->tn_mtime;
689 	vap->va_ctime = tp->tn_ctime;
690 	vap->va_blksize = PAGESIZE;
691 	vap->va_rdev = tp->tn_rdev;
692 	vap->va_seq = tp->tn_seq;
693 
694 	/*
695 	 * XXX Holes are not taken into account.  We could take the time to
696 	 * run through the anon array looking for allocated slots...
697 	 */
698 	vap->va_nblocks = (fsblkcnt64_t)btodb(ptob(btopr(vap->va_size)));
699 	mutex_exit(&tp->tn_tlock);
700 	return (0);
701 }
702 
703 /*ARGSUSED4*/
704 static int
705 tmp_setattr(
706 	struct vnode *vp,
707 	struct vattr *vap,
708 	int flags,
709 	struct cred *cred,
710 	caller_context_t *ct)
711 {
712 	struct tmount *tm = (struct tmount *)VTOTM(vp);
713 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
714 	int error = 0;
715 	struct vattr *get;
716 	long mask;
717 
718 	/*
719 	 * Cannot set these attributes
720 	 */
721 	if (vap->va_mask & AT_NOSET)
722 		return (EINVAL);
723 
724 	mutex_enter(&tp->tn_tlock);
725 
726 	get = &tp->tn_attr;
727 	/*
728 	 * Change file access modes. Must be owner or have sufficient
729 	 * privileges.
730 	 */
731 	error = secpolicy_vnode_setattr(cred, vp, vap, get, flags,
732 			    tmp_taccess, tp);
733 
734 	if (error)
735 		goto out;
736 
737 	mask = vap->va_mask;
738 
739 	if (mask & AT_MODE) {
740 		get->va_mode &= S_IFMT;
741 		get->va_mode |= vap->va_mode & ~S_IFMT;
742 	}
743 
744 	if (mask & AT_UID)
745 		get->va_uid = vap->va_uid;
746 	if (mask & AT_GID)
747 		get->va_gid = vap->va_gid;
748 	if (mask & AT_ATIME)
749 		get->va_atime = vap->va_atime;
750 	if (mask & AT_MTIME)
751 		get->va_mtime = vap->va_mtime;
752 
753 	if (mask & (AT_UID | AT_GID | AT_MODE | AT_MTIME))
754 		gethrestime(&tp->tn_ctime);
755 
756 	if (mask & AT_SIZE) {
757 		ASSERT(vp->v_type != VDIR);
758 
759 		/* Don't support large files. */
760 		if (vap->va_size > MAXOFF_T) {
761 			error = EFBIG;
762 			goto out;
763 		}
764 		mutex_exit(&tp->tn_tlock);
765 
766 		rw_enter(&tp->tn_rwlock, RW_WRITER);
767 		rw_enter(&tp->tn_contents, RW_WRITER);
768 		error = tmpnode_trunc(tm, tp, (ulong_t)vap->va_size);
769 		rw_exit(&tp->tn_contents);
770 		rw_exit(&tp->tn_rwlock);
771 		goto out1;
772 	}
773 out:
774 	mutex_exit(&tp->tn_tlock);
775 out1:
776 	return (error);
777 }
778 
779 /* ARGSUSED2 */
780 static int
781 tmp_access(struct vnode *vp, int mode, int flags, struct cred *cred)
782 {
783 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
784 	int error;
785 
786 	mutex_enter(&tp->tn_tlock);
787 	error = tmp_taccess(tp, mode, cred);
788 	mutex_exit(&tp->tn_tlock);
789 	return (error);
790 }
791 
792 /* ARGSUSED3 */
793 static int
794 tmp_lookup(
795 	struct vnode *dvp,
796 	char *nm,
797 	struct vnode **vpp,
798 	struct pathname *pnp,
799 	int flags,
800 	struct vnode *rdir,
801 	struct cred *cred)
802 {
803 	struct tmpnode *tp = (struct tmpnode *)VTOTN(dvp);
804 	struct tmpnode *ntp = NULL;
805 	int error;
806 
807 
808 	/* allow cd into @ dir */
809 	if (flags & LOOKUP_XATTR) {
810 		struct tmpnode *xdp;
811 		struct tmount *tm;
812 
813 		if (tp->tn_flags & ISXATTR)
814 			/* No attributes on attributes */
815 			return (EINVAL);
816 
817 		rw_enter(&tp->tn_rwlock, RW_WRITER);
818 		if (tp->tn_xattrdp == NULL) {
819 			if (!(flags & CREATE_XATTR_DIR)) {
820 				rw_exit(&tp->tn_rwlock);
821 				return (ENOENT);
822 			}
823 
824 			/*
825 			 * No attribute directory exists for this
826 			 * node - create the attr dir as a side effect
827 			 * of this lookup.
828 			 */
829 
830 			/*
831 			 * Make sure we have adequate permission...
832 			 */
833 
834 			if ((error = tmp_taccess(tp, VWRITE, cred)) != 0) {
835 				rw_exit(&tp->tn_rwlock);
836 				return (error);
837 			}
838 
839 			xdp = tmp_memalloc(sizeof (struct tmpnode),
840 				TMP_MUSTHAVE);
841 			tm = VTOTM(dvp);
842 			tmpnode_init(tm, xdp, &tp->tn_attr, NULL);
843 			/*
844 			 * Fix-up fields unique to attribute directories.
845 			 */
846 			xdp->tn_flags = ISXATTR;
847 			xdp->tn_type = VDIR;
848 			if (tp->tn_type == VDIR) {
849 				xdp->tn_mode = tp->tn_attr.va_mode;
850 			} else {
851 				xdp->tn_mode = 0700;
852 				if (tp->tn_attr.va_mode & 0040)
853 					xdp->tn_mode |= 0750;
854 				if (tp->tn_attr.va_mode & 0004)
855 					xdp->tn_mode |= 0705;
856 			}
857 			xdp->tn_vnode->v_type = VDIR;
858 			xdp->tn_vnode->v_flag |= V_XATTRDIR;
859 			tdirinit(tp, xdp);
860 			tp->tn_xattrdp = xdp;
861 		} else {
862 			VN_HOLD(tp->tn_xattrdp->tn_vnode);
863 		}
864 		*vpp = TNTOV(tp->tn_xattrdp);
865 		rw_exit(&tp->tn_rwlock);
866 		return (0);
867 	}
868 
869 	/*
870 	 * Null component name is a synonym for directory being searched.
871 	 */
872 	if (*nm == '\0') {
873 		VN_HOLD(dvp);
874 		*vpp = dvp;
875 		return (0);
876 	}
877 	ASSERT(tp);
878 
879 	error = tdirlookup(tp, nm, &ntp, cred);
880 
881 	if (error == 0) {
882 		ASSERT(ntp);
883 		*vpp = TNTOV(ntp);
884 		/*
885 		 * If vnode is a device return special vnode instead
886 		 */
887 		if (IS_DEVVP(*vpp)) {
888 			struct vnode *newvp;
889 
890 			newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
891 			    cred);
892 			VN_RELE(*vpp);
893 			*vpp = newvp;
894 		}
895 	}
896 	TRACE_4(TR_FAC_TMPFS, TR_TMPFS_LOOKUP,
897 	    "tmpfs lookup:vp %p name %s vpp %p error %d",
898 	    dvp, nm, vpp, error);
899 	return (error);
900 }
901 
902 /*ARGSUSED7*/
903 static int
904 tmp_create(
905 	struct vnode *dvp,
906 	char *nm,
907 	struct vattr *vap,
908 	enum vcexcl exclusive,
909 	int mode,
910 	struct vnode **vpp,
911 	struct cred *cred,
912 	int flag)
913 {
914 	struct tmpnode *parent;
915 	struct tmount *tm;
916 	struct tmpnode *self;
917 	int error;
918 	struct tmpnode *oldtp;
919 
920 again:
921 	parent = (struct tmpnode *)VTOTN(dvp);
922 	tm = (struct tmount *)VTOTM(dvp);
923 	self = NULL;
924 	error = 0;
925 	oldtp = NULL;
926 
927 	/* device files not allowed in ext. attr dirs */
928 	if ((parent->tn_flags & ISXATTR) &&
929 		(vap->va_type == VBLK || vap->va_type == VCHR ||
930 		vap->va_type == VFIFO || vap->va_type == VDOOR ||
931 		vap->va_type == VSOCK || vap->va_type == VPORT))
932 			return (EINVAL);
933 
934 	if (vap->va_type == VREG && (vap->va_mode & VSVTX)) {
935 		/* Must be privileged to set sticky bit */
936 		if (secpolicy_vnode_stky_modify(cred))
937 			vap->va_mode &= ~VSVTX;
938 	} else if (vap->va_type == VNON) {
939 		return (EINVAL);
940 	}
941 
942 	/*
943 	 * Null component name is a synonym for directory being searched.
944 	 */
945 	if (*nm == '\0') {
946 		VN_HOLD(dvp);
947 		oldtp = parent;
948 	} else {
949 		error = tdirlookup(parent, nm, &oldtp, cred);
950 	}
951 
952 	if (error == 0) {	/* name found */
953 		ASSERT(oldtp);
954 
955 		rw_enter(&oldtp->tn_rwlock, RW_WRITER);
956 
957 		/*
958 		 * if create/read-only an existing
959 		 * directory, allow it
960 		 */
961 		if (exclusive == EXCL)
962 			error = EEXIST;
963 		else if ((oldtp->tn_type == VDIR) && (mode & VWRITE))
964 			error = EISDIR;
965 		else {
966 			error = tmp_taccess(oldtp, mode, cred);
967 		}
968 
969 		if (error) {
970 			rw_exit(&oldtp->tn_rwlock);
971 			tmpnode_rele(oldtp);
972 			return (error);
973 		}
974 		*vpp = TNTOV(oldtp);
975 		if ((*vpp)->v_type == VREG && (vap->va_mask & AT_SIZE) &&
976 		    vap->va_size == 0) {
977 			rw_enter(&oldtp->tn_contents, RW_WRITER);
978 			(void) tmpnode_trunc(tm, oldtp, 0);
979 			rw_exit(&oldtp->tn_contents);
980 		}
981 		rw_exit(&oldtp->tn_rwlock);
982 		if (IS_DEVVP(*vpp)) {
983 			struct vnode *newvp;
984 
985 			newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type,
986 			    cred);
987 			VN_RELE(*vpp);
988 			if (newvp == NULL) {
989 				return (ENOSYS);
990 			}
991 			*vpp = newvp;
992 		}
993 		return (0);
994 	}
995 
996 	if (error != ENOENT)
997 		return (error);
998 
999 	rw_enter(&parent->tn_rwlock, RW_WRITER);
1000 	error = tdirenter(tm, parent, nm, DE_CREATE,
1001 	    (struct tmpnode *)NULL, (struct tmpnode *)NULL,
1002 	    vap, &self, cred);
1003 	rw_exit(&parent->tn_rwlock);
1004 
1005 	if (error) {
1006 		if (self)
1007 			tmpnode_rele(self);
1008 
1009 		if (error == EEXIST) {
1010 			/*
1011 			 * This means that the file was created sometime
1012 			 * after we checked and did not find it and when
1013 			 * we went to create it.
1014 			 * Since creat() is supposed to truncate a file
1015 			 * that already exits go back to the begining
1016 			 * of the function. This time we will find it
1017 			 * and go down the tmp_trunc() path
1018 			 */
1019 			goto again;
1020 		}
1021 		return (error);
1022 	}
1023 
1024 	*vpp = TNTOV(self);
1025 
1026 	if (!error && IS_DEVVP(*vpp)) {
1027 		struct vnode *newvp;
1028 
1029 		newvp = specvp(*vpp, (*vpp)->v_rdev, (*vpp)->v_type, cred);
1030 		VN_RELE(*vpp);
1031 		if (newvp == NULL)
1032 			return (ENOSYS);
1033 		*vpp = newvp;
1034 	}
1035 	TRACE_3(TR_FAC_TMPFS, TR_TMPFS_CREATE,
1036 		"tmpfs create:dvp %p nm %s vpp %p", dvp, nm, vpp);
1037 	return (0);
1038 }
1039 
1040 static int
1041 tmp_remove(struct vnode *dvp, char *nm, struct cred *cred)
1042 {
1043 	struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1044 	int error;
1045 	struct tmpnode *tp = NULL;
1046 
1047 	error = tdirlookup(parent, nm, &tp, cred);
1048 	if (error)
1049 		return (error);
1050 
1051 	ASSERT(tp);
1052 	rw_enter(&parent->tn_rwlock, RW_WRITER);
1053 	rw_enter(&tp->tn_rwlock, RW_WRITER);
1054 
1055 	if (tp->tn_type != VDIR ||
1056 	    (error = secpolicy_fs_linkdir(cred, dvp->v_vfsp)) == 0)
1057 		error = tdirdelete(parent, tp, nm, DR_REMOVE, cred);
1058 
1059 	rw_exit(&tp->tn_rwlock);
1060 	rw_exit(&parent->tn_rwlock);
1061 	vnevent_remove(TNTOV(tp));
1062 	tmpnode_rele(tp);
1063 
1064 	TRACE_3(TR_FAC_TMPFS, TR_TMPFS_REMOVE,
1065 		"tmpfs remove:dvp %p nm %s error %d", dvp, nm, error);
1066 	return (error);
1067 }
1068 
1069 static int
1070 tmp_link(struct vnode *dvp, struct vnode *srcvp, char *tnm, struct cred *cred)
1071 {
1072 	struct tmpnode *parent;
1073 	struct tmpnode *from;
1074 	struct tmount *tm = (struct tmount *)VTOTM(dvp);
1075 	int error;
1076 	struct tmpnode *found = NULL;
1077 	struct vnode *realvp;
1078 
1079 	if (VOP_REALVP(srcvp, &realvp) == 0)
1080 		srcvp = realvp;
1081 
1082 	parent = (struct tmpnode *)VTOTN(dvp);
1083 	from = (struct tmpnode *)VTOTN(srcvp);
1084 
1085 	if ((srcvp->v_type == VDIR &&
1086 	    secpolicy_fs_linkdir(cred, dvp->v_vfsp)) ||
1087 	    (from->tn_uid != crgetuid(cred) && secpolicy_basic_link(cred)))
1088 		return (EPERM);
1089 
1090 	/*
1091 	 * Make sure link for extended attributes is valid
1092 	 * We only support hard linking of xattr's in xattrdir to an xattrdir
1093 	 */
1094 	if ((from->tn_flags & ISXATTR) != (parent->tn_flags & ISXATTR))
1095 		return (EINVAL);
1096 
1097 	error = tdirlookup(parent, tnm, &found, cred);
1098 	if (error == 0) {
1099 		ASSERT(found);
1100 		tmpnode_rele(found);
1101 		return (EEXIST);
1102 	}
1103 
1104 	if (error != ENOENT)
1105 		return (error);
1106 
1107 	rw_enter(&parent->tn_rwlock, RW_WRITER);
1108 	error = tdirenter(tm, parent, tnm, DE_LINK, (struct tmpnode *)NULL,
1109 		from, NULL, (struct tmpnode **)NULL, cred);
1110 	rw_exit(&parent->tn_rwlock);
1111 	return (error);
1112 }
1113 
1114 static int
1115 tmp_rename(
1116 	struct vnode *odvp,	/* source parent vnode */
1117 	char *onm,		/* source name */
1118 	struct vnode *ndvp,	/* destination parent vnode */
1119 	char *nnm,		/* destination name */
1120 	struct cred *cred)
1121 {
1122 	struct tmpnode *fromparent;
1123 	struct tmpnode *toparent;
1124 	struct tmpnode *fromtp = NULL;	/* source tmpnode */
1125 	struct tmount *tm = (struct tmount *)VTOTM(odvp);
1126 	int error;
1127 	int samedir = 0;	/* set if odvp == ndvp */
1128 	struct vnode *realvp;
1129 
1130 	if (VOP_REALVP(ndvp, &realvp) == 0)
1131 		ndvp = realvp;
1132 
1133 	fromparent = (struct tmpnode *)VTOTN(odvp);
1134 	toparent = (struct tmpnode *)VTOTN(ndvp);
1135 
1136 	if ((fromparent->tn_flags & ISXATTR) != (toparent->tn_flags & ISXATTR))
1137 		return (EINVAL);
1138 
1139 	mutex_enter(&tm->tm_renamelck);
1140 
1141 	/*
1142 	 * Look up tmpnode of file we're supposed to rename.
1143 	 */
1144 	error = tdirlookup(fromparent, onm, &fromtp, cred);
1145 	if (error) {
1146 		mutex_exit(&tm->tm_renamelck);
1147 		return (error);
1148 	}
1149 
1150 	/*
1151 	 * Make sure we can delete the old (source) entry.  This
1152 	 * requires write permission on the containing directory.  If
1153 	 * that directory is "sticky" it requires further checks.
1154 	 */
1155 	if (((error = tmp_taccess(fromparent, VWRITE, cred)) != 0) ||
1156 	    (error = tmp_sticky_remove_access(fromparent, fromtp, cred)) != 0)
1157 		goto done;
1158 
1159 	/*
1160 	 * Check for renaming to or from '.' or '..' or that
1161 	 * fromtp == fromparent
1162 	 */
1163 	if ((onm[0] == '.' &&
1164 	    (onm[1] == '\0' || (onm[1] == '.' && onm[2] == '\0'))) ||
1165 	    (nnm[0] == '.' &&
1166 	    (nnm[1] == '\0' || (nnm[1] == '.' && nnm[2] == '\0'))) ||
1167 	    (fromparent == fromtp)) {
1168 		error = EINVAL;
1169 		goto done;
1170 	}
1171 
1172 	samedir = (fromparent == toparent);
1173 	/*
1174 	 * Make sure we can search and rename into the new
1175 	 * (destination) directory.
1176 	 */
1177 	if (!samedir) {
1178 		error = tmp_taccess(toparent, VEXEC|VWRITE, cred);
1179 		if (error)
1180 			goto done;
1181 	}
1182 
1183 	/*
1184 	 * Link source to new target
1185 	 */
1186 	rw_enter(&toparent->tn_rwlock, RW_WRITER);
1187 	error = tdirenter(tm, toparent, nnm, DE_RENAME,
1188 	    fromparent, fromtp, (struct vattr *)NULL,
1189 	    (struct tmpnode **)NULL, cred);
1190 	rw_exit(&toparent->tn_rwlock);
1191 
1192 	if (error) {
1193 		/*
1194 		 * ESAME isn't really an error; it indicates that the
1195 		 * operation should not be done because the source and target
1196 		 * are the same file, but that no error should be reported.
1197 		 */
1198 		if (error == ESAME)
1199 			error = 0;
1200 		goto done;
1201 	}
1202 
1203 	/*
1204 	 * Unlink from source.
1205 	 */
1206 	rw_enter(&fromparent->tn_rwlock, RW_WRITER);
1207 	rw_enter(&fromtp->tn_rwlock, RW_WRITER);
1208 
1209 	error = tdirdelete(fromparent, fromtp, onm, DR_RENAME, cred);
1210 
1211 	/*
1212 	 * The following handles the case where our source tmpnode was
1213 	 * removed before we got to it.
1214 	 *
1215 	 * XXX We should also cleanup properly in the case where tdirdelete
1216 	 * fails for some other reason.  Currently this case shouldn't happen.
1217 	 * (see 1184991).
1218 	 */
1219 	if (error == ENOENT)
1220 		error = 0;
1221 
1222 	rw_exit(&fromtp->tn_rwlock);
1223 	rw_exit(&fromparent->tn_rwlock);
1224 done:
1225 	tmpnode_rele(fromtp);
1226 	mutex_exit(&tm->tm_renamelck);
1227 
1228 	TRACE_5(TR_FAC_TMPFS, TR_TMPFS_RENAME,
1229 		"tmpfs rename:ovp %p onm %s nvp %p nnm %s error %d",
1230 		odvp, onm, ndvp, nnm, error);
1231 	return (error);
1232 }
1233 
1234 static int
1235 tmp_mkdir(
1236 	struct vnode *dvp,
1237 	char *nm,
1238 	struct vattr *va,
1239 	struct vnode **vpp,
1240 	struct cred *cred)
1241 {
1242 	struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1243 	struct tmpnode *self = NULL;
1244 	struct tmount *tm = (struct tmount *)VTOTM(dvp);
1245 	int error;
1246 
1247 	/* no new dirs allowed in xattr dirs */
1248 	if (parent->tn_flags & ISXATTR)
1249 		return (EINVAL);
1250 
1251 	/*
1252 	 * Might be dangling directory.  Catch it here,
1253 	 * because a ENOENT return from tdirlookup() is
1254 	 * an "o.k. return".
1255 	 */
1256 	if (parent->tn_nlink == 0)
1257 		return (ENOENT);
1258 
1259 	error = tdirlookup(parent, nm, &self, cred);
1260 	if (error == 0) {
1261 		ASSERT(self);
1262 		tmpnode_rele(self);
1263 		return (EEXIST);
1264 	}
1265 	if (error != ENOENT)
1266 		return (error);
1267 
1268 	rw_enter(&parent->tn_rwlock, RW_WRITER);
1269 	error = tdirenter(tm, parent, nm, DE_MKDIR,
1270 		(struct tmpnode *)NULL, (struct tmpnode *)NULL, va,
1271 		&self, cred);
1272 	if (error) {
1273 		rw_exit(&parent->tn_rwlock);
1274 		if (self)
1275 			tmpnode_rele(self);
1276 		return (error);
1277 	}
1278 	rw_exit(&parent->tn_rwlock);
1279 	*vpp = TNTOV(self);
1280 	return (0);
1281 }
1282 
1283 static int
1284 tmp_rmdir(
1285 	struct vnode *dvp,
1286 	char *nm,
1287 	struct vnode *cdir,
1288 	struct cred *cred)
1289 {
1290 	struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1291 	struct tmpnode *self = NULL;
1292 	struct vnode *vp;
1293 	int error = 0;
1294 
1295 	/*
1296 	 * Return error when removing . and ..
1297 	 */
1298 	if (strcmp(nm, ".") == 0)
1299 		return (EINVAL);
1300 	if (strcmp(nm, "..") == 0)
1301 		return (EEXIST); /* Should be ENOTEMPTY */
1302 	error = tdirlookup(parent, nm, &self, cred);
1303 	if (error)
1304 		return (error);
1305 
1306 	rw_enter(&parent->tn_rwlock, RW_WRITER);
1307 	rw_enter(&self->tn_rwlock, RW_WRITER);
1308 
1309 	vp = TNTOV(self);
1310 	if (vp == dvp || vp == cdir) {
1311 		error = EINVAL;
1312 		goto done1;
1313 	}
1314 	if (self->tn_type != VDIR) {
1315 		error = ENOTDIR;
1316 		goto done1;
1317 	}
1318 
1319 	mutex_enter(&self->tn_tlock);
1320 	if (self->tn_nlink > 2) {
1321 		mutex_exit(&self->tn_tlock);
1322 		error = EEXIST;
1323 		goto done1;
1324 	}
1325 	mutex_exit(&self->tn_tlock);
1326 
1327 	if (vn_vfswlock(vp)) {
1328 		error = EBUSY;
1329 		goto done1;
1330 	}
1331 	if (vn_mountedvfs(vp) != NULL) {
1332 		error = EBUSY;
1333 		goto done;
1334 	}
1335 
1336 	/*
1337 	 * Check for an empty directory
1338 	 * i.e. only includes entries for "." and ".."
1339 	 */
1340 	if (self->tn_dirents > 2) {
1341 		error = EEXIST;		/* SIGH should be ENOTEMPTY */
1342 		/*
1343 		 * Update atime because checking tn_dirents is logically
1344 		 * equivalent to reading the directory
1345 		 */
1346 		gethrestime(&self->tn_atime);
1347 		goto done;
1348 	}
1349 
1350 	error = tdirdelete(parent, self, nm, DR_RMDIR, cred);
1351 done:
1352 	vn_vfsunlock(vp);
1353 done1:
1354 	rw_exit(&self->tn_rwlock);
1355 	rw_exit(&parent->tn_rwlock);
1356 	vnevent_rmdir(TNTOV(self));
1357 	tmpnode_rele(self);
1358 
1359 	return (error);
1360 }
1361 
1362 /* ARGSUSED2 */
1363 
1364 static int
1365 tmp_readdir(struct vnode *vp, struct uio *uiop, struct cred *cred, int *eofp)
1366 {
1367 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1368 	struct tdirent *tdp;
1369 	int error = 0;
1370 	size_t namelen;
1371 	struct dirent64 *dp;
1372 	ulong_t offset;
1373 	ulong_t total_bytes_wanted;
1374 	long outcount = 0;
1375 	long bufsize;
1376 	int reclen;
1377 	caddr_t outbuf;
1378 
1379 	if (uiop->uio_loffset >= MAXOFF_T) {
1380 		if (eofp)
1381 			*eofp = 1;
1382 		return (0);
1383 	}
1384 	/*
1385 	 * assuming system call has already called tmp_rwlock
1386 	 */
1387 	ASSERT(RW_READ_HELD(&tp->tn_rwlock));
1388 
1389 	if (uiop->uio_iovcnt != 1)
1390 		return (EINVAL);
1391 
1392 	if (vp->v_type != VDIR)
1393 		return (ENOTDIR);
1394 
1395 	/*
1396 	 * There's a window here where someone could have removed
1397 	 * all the entries in the directory after we put a hold on the
1398 	 * vnode but before we grabbed the rwlock.  Just return.
1399 	 */
1400 	if (tp->tn_dir == NULL) {
1401 		if (tp->tn_nlink) {
1402 			panic("empty directory 0x%p", (void *)tp);
1403 			/*NOTREACHED*/
1404 		}
1405 		return (0);
1406 	}
1407 
1408 	/*
1409 	 * Get space for multiple directory entries
1410 	 */
1411 	total_bytes_wanted = uiop->uio_iov->iov_len;
1412 	bufsize = total_bytes_wanted + sizeof (struct dirent64);
1413 	outbuf = kmem_alloc(bufsize, KM_SLEEP);
1414 
1415 	dp = (struct dirent64 *)outbuf;
1416 
1417 
1418 	offset = 0;
1419 	tdp = tp->tn_dir;
1420 	while (tdp) {
1421 		namelen = strlen(tdp->td_name);	/* no +1 needed */
1422 		offset = tdp->td_offset;
1423 		if (offset >= uiop->uio_offset) {
1424 			reclen = (int)DIRENT64_RECLEN(namelen);
1425 			if (outcount + reclen > total_bytes_wanted) {
1426 				if (!outcount)
1427 					/*
1428 					 * Buffer too small for any entries.
1429 					 */
1430 					error = EINVAL;
1431 				break;
1432 			}
1433 			ASSERT(tdp->td_tmpnode != NULL);
1434 
1435 			/* use strncpy(9f) to zero out uninitialized bytes */
1436 
1437 			(void) strncpy(dp->d_name, tdp->td_name,
1438 			    DIRENT64_NAMELEN(reclen));
1439 			dp->d_reclen = (ushort_t)reclen;
1440 			dp->d_ino = (ino64_t)tdp->td_tmpnode->tn_nodeid;
1441 			dp->d_off = (offset_t)tdp->td_offset + 1;
1442 			dp = (struct dirent64 *)
1443 			    ((uintptr_t)dp + dp->d_reclen);
1444 			outcount += reclen;
1445 			ASSERT(outcount <= bufsize);
1446 		}
1447 		tdp = tdp->td_next;
1448 	}
1449 
1450 	if (!error)
1451 		error = uiomove(outbuf, outcount, UIO_READ, uiop);
1452 
1453 	if (!error) {
1454 		/* If we reached the end of the list our offset */
1455 		/* should now be just past the end. */
1456 		if (!tdp) {
1457 			offset += 1;
1458 			if (eofp)
1459 				*eofp = 1;
1460 		} else if (eofp)
1461 			*eofp = 0;
1462 		uiop->uio_offset = offset;
1463 	}
1464 	gethrestime(&tp->tn_atime);
1465 	kmem_free(outbuf, bufsize);
1466 	return (error);
1467 }
1468 
1469 static int
1470 tmp_symlink(
1471 	struct vnode *dvp,
1472 	char *lnm,
1473 	struct vattr *tva,
1474 	char *tnm,
1475 	struct cred *cred)
1476 {
1477 	struct tmpnode *parent = (struct tmpnode *)VTOTN(dvp);
1478 	struct tmpnode *self = (struct tmpnode *)NULL;
1479 	struct tmount *tm = (struct tmount *)VTOTM(dvp);
1480 	char *cp = NULL;
1481 	int error;
1482 	size_t len;
1483 
1484 	/* no symlinks allowed to files in xattr dirs */
1485 	if (parent->tn_flags & ISXATTR)
1486 		return (EINVAL);
1487 
1488 	error = tdirlookup(parent, lnm, &self, cred);
1489 	if (error == 0) {
1490 		/*
1491 		 * The entry already exists
1492 		 */
1493 		tmpnode_rele(self);
1494 		return (EEXIST);	/* was 0 */
1495 	}
1496 
1497 	if (error != ENOENT) {
1498 		if (self != NULL)
1499 			tmpnode_rele(self);
1500 		return (error);
1501 	}
1502 
1503 	rw_enter(&parent->tn_rwlock, RW_WRITER);
1504 	error = tdirenter(tm, parent, lnm, DE_CREATE, (struct tmpnode *)NULL,
1505 	    (struct tmpnode *)NULL, tva, &self, cred);
1506 	rw_exit(&parent->tn_rwlock);
1507 
1508 	if (error) {
1509 		if (self)
1510 			tmpnode_rele(self);
1511 		return (error);
1512 	}
1513 	len = strlen(tnm) + 1;
1514 	cp = tmp_memalloc(len, 0);
1515 	if (cp == NULL) {
1516 		tmpnode_rele(self);
1517 		return (ENOSPC);
1518 	}
1519 	(void) strcpy(cp, tnm);
1520 
1521 	self->tn_symlink = cp;
1522 	self->tn_size = len - 1;
1523 	tmpnode_rele(self);
1524 	return (error);
1525 }
1526 
1527 /* ARGSUSED2 */
1528 static int
1529 tmp_readlink(struct vnode *vp, struct uio *uiop, struct cred *cred)
1530 {
1531 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1532 	int error = 0;
1533 
1534 	if (vp->v_type != VLNK)
1535 		return (EINVAL);
1536 
1537 	rw_enter(&tp->tn_rwlock, RW_READER);
1538 	rw_enter(&tp->tn_contents, RW_READER);
1539 	error = uiomove(tp->tn_symlink, tp->tn_size, UIO_READ, uiop);
1540 	gethrestime(&tp->tn_atime);
1541 	rw_exit(&tp->tn_contents);
1542 	rw_exit(&tp->tn_rwlock);
1543 	return (error);
1544 }
1545 
1546 /* ARGSUSED */
1547 static int
1548 tmp_fsync(struct vnode *vp, int syncflag, struct cred *cred)
1549 {
1550 	return (0);
1551 }
1552 
1553 /* ARGSUSED */
1554 static void
1555 tmp_inactive(struct vnode *vp, struct cred *cred)
1556 {
1557 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1558 	struct tmount *tm = (struct tmount *)VFSTOTM(vp->v_vfsp);
1559 
1560 	rw_enter(&tp->tn_rwlock, RW_WRITER);
1561 top:
1562 	mutex_enter(&tp->tn_tlock);
1563 	mutex_enter(&vp->v_lock);
1564 	ASSERT(vp->v_count >= 1);
1565 
1566 	/*
1567 	 * If we don't have the last hold or the link count is non-zero,
1568 	 * there's little to do -- just drop our hold.
1569 	 */
1570 	if (vp->v_count > 1 || tp->tn_nlink != 0) {
1571 		vp->v_count--;
1572 		mutex_exit(&vp->v_lock);
1573 		mutex_exit(&tp->tn_tlock);
1574 		rw_exit(&tp->tn_rwlock);
1575 		return;
1576 	}
1577 
1578 	/*
1579 	 * We have the last hold *and* the link count is zero, so this
1580 	 * tmpnode is dead from the filesystem's viewpoint.  However,
1581 	 * if the tmpnode has any pages associated with it (i.e. if it's
1582 	 * a normal file with non-zero size), the tmpnode can still be
1583 	 * discovered by pageout or fsflush via the page vnode pointers.
1584 	 * In this case we must drop all our locks, truncate the tmpnode,
1585 	 * and try the whole dance again.
1586 	 */
1587 	if (tp->tn_size != 0) {
1588 		if (tp->tn_type == VREG) {
1589 			mutex_exit(&vp->v_lock);
1590 			mutex_exit(&tp->tn_tlock);
1591 			rw_enter(&tp->tn_contents, RW_WRITER);
1592 			(void) tmpnode_trunc(tm, tp, 0);
1593 			rw_exit(&tp->tn_contents);
1594 			ASSERT(tp->tn_size == 0);
1595 			ASSERT(tp->tn_nblocks == 0);
1596 			goto top;
1597 		}
1598 		if (tp->tn_type == VLNK)
1599 			tmp_memfree(tp->tn_symlink, tp->tn_size + 1);
1600 	}
1601 
1602 	/*
1603 	 * Remove normal file/dir's xattr dir and xattrs.
1604 	 */
1605 	if (tp->tn_xattrdp) {
1606 		struct tmpnode *xtp = tp->tn_xattrdp;
1607 
1608 		ASSERT(xtp->tn_flags & ISXATTR);
1609 		tmpnode_hold(xtp);
1610 		rw_enter(&xtp->tn_rwlock, RW_WRITER);
1611 		tdirtrunc(xtp);
1612 		DECR_COUNT(&xtp->tn_nlink, &xtp->tn_tlock);
1613 		tp->tn_xattrdp = NULL;
1614 		rw_exit(&xtp->tn_rwlock);
1615 		tmpnode_rele(xtp);
1616 	}
1617 
1618 	mutex_exit(&vp->v_lock);
1619 	mutex_exit(&tp->tn_tlock);
1620 	/* Here's our chance to send invalid event while we're between locks */
1621 	vn_invalid(TNTOV(tp));
1622 	mutex_enter(&tm->tm_contents);
1623 	if (tp->tn_forw == NULL)
1624 		tm->tm_rootnode->tn_back = tp->tn_back;
1625 	else
1626 		tp->tn_forw->tn_back = tp->tn_back;
1627 	tp->tn_back->tn_forw = tp->tn_forw;
1628 	mutex_exit(&tm->tm_contents);
1629 	rw_exit(&tp->tn_rwlock);
1630 	rw_destroy(&tp->tn_rwlock);
1631 	mutex_destroy(&tp->tn_tlock);
1632 	vn_free(TNTOV(tp));
1633 	tmp_memfree(tp, sizeof (struct tmpnode));
1634 }
1635 
1636 static int
1637 tmp_fid(struct vnode *vp, struct fid *fidp)
1638 {
1639 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
1640 	struct tfid *tfid;
1641 
1642 	if (fidp->fid_len < (sizeof (struct tfid) - sizeof (ushort_t))) {
1643 		fidp->fid_len = sizeof (struct tfid) - sizeof (ushort_t);
1644 		return (ENOSPC);
1645 	}
1646 
1647 	tfid = (struct tfid *)fidp;
1648 	bzero(tfid, sizeof (struct tfid));
1649 	tfid->tfid_len = (int)sizeof (struct tfid) - sizeof (ushort_t);
1650 
1651 	tfid->tfid_ino = tp->tn_nodeid;
1652 	tfid->tfid_gen = tp->tn_gen;
1653 
1654 	return (0);
1655 }
1656 
1657 
1658 /*
1659  * Return all the pages from [off..off+len] in given file
1660  */
1661 static int
1662 tmp_getpage(
1663 	struct vnode *vp,
1664 	offset_t off,
1665 	size_t len,
1666 	uint_t *protp,
1667 	page_t *pl[],
1668 	size_t plsz,
1669 	struct seg *seg,
1670 	caddr_t addr,
1671 	enum seg_rw rw,
1672 	struct cred *cr)
1673 {
1674 	int err = 0;
1675 	struct tmpnode *tp = VTOTN(vp);
1676 	anoff_t toff = (anoff_t)off;
1677 	size_t tlen = len;
1678 	u_offset_t tmpoff;
1679 	timestruc_t now;
1680 
1681 	rw_enter(&tp->tn_contents, RW_READER);
1682 
1683 	if (off + len  > tp->tn_size + PAGEOFFSET) {
1684 		err = EFAULT;
1685 		goto out;
1686 	}
1687 	/*
1688 	 * Look for holes (no anon slot) in faulting range. If there are
1689 	 * holes we have to switch to a write lock and fill them in. Swap
1690 	 * space for holes was already reserved when the file was grown.
1691 	 */
1692 	tmpoff = toff;
1693 	if (non_anon(tp->tn_anon, btop(off), &tmpoff, &tlen)) {
1694 		if (!rw_tryupgrade(&tp->tn_contents)) {
1695 			rw_exit(&tp->tn_contents);
1696 			rw_enter(&tp->tn_contents, RW_WRITER);
1697 			/* Size may have changed when lock was dropped */
1698 			if (off + len  > tp->tn_size + PAGEOFFSET) {
1699 				err = EFAULT;
1700 				goto out;
1701 			}
1702 		}
1703 		for (toff = (anoff_t)off; toff < (anoff_t)off + len;
1704 		    toff += PAGESIZE) {
1705 			if (anon_get_ptr(tp->tn_anon, btop(toff)) == NULL) {
1706 				/* XXX - may allocate mem w. write lock held */
1707 				(void) anon_set_ptr(tp->tn_anon, btop(toff),
1708 						anon_alloc(vp, toff),
1709 						ANON_SLEEP);
1710 				tp->tn_nblocks++;
1711 			}
1712 		}
1713 		rw_downgrade(&tp->tn_contents);
1714 	}
1715 
1716 
1717 	if (len <= PAGESIZE)
1718 		err = tmp_getapage(vp, (u_offset_t)off, len, protp, pl, plsz,
1719 		    seg, addr, rw, cr);
1720 	else
1721 		err = pvn_getpages(tmp_getapage, vp, (u_offset_t)off, len,
1722 		    protp, pl, plsz, seg, addr, rw, cr);
1723 
1724 	gethrestime(&now);
1725 	tp->tn_atime = now;
1726 	if (rw == S_WRITE)
1727 		tp->tn_mtime = now;
1728 
1729 out:
1730 	rw_exit(&tp->tn_contents);
1731 	return (err);
1732 }
1733 
1734 /*
1735  * Called from pvn_getpages or swap_getpage to get a particular page.
1736  */
1737 /*ARGSUSED*/
1738 static int
1739 tmp_getapage(
1740 	struct vnode *vp,
1741 	u_offset_t off,
1742 	size_t len,
1743 	uint_t *protp,
1744 	page_t *pl[],
1745 	size_t plsz,
1746 	struct seg *seg,
1747 	caddr_t addr,
1748 	enum seg_rw rw,
1749 	struct cred *cr)
1750 {
1751 	struct page *pp;
1752 	int flags;
1753 	int err = 0;
1754 	struct vnode *pvp;
1755 	u_offset_t poff;
1756 
1757 	if (protp != NULL)
1758 		*protp = PROT_ALL;
1759 again:
1760 	if (pp = page_lookup(vp, off, rw == S_CREATE ? SE_EXCL : SE_SHARED)) {
1761 		if (pl) {
1762 			pl[0] = pp;
1763 			pl[1] = NULL;
1764 		} else {
1765 			page_unlock(pp);
1766 		}
1767 	} else {
1768 		pp = page_create_va(vp, off, PAGESIZE,
1769 		    PG_WAIT | PG_EXCL, seg, addr);
1770 		/*
1771 		 * Someone raced in and created the page after we did the
1772 		 * lookup but before we did the create, so go back and
1773 		 * try to look it up again.
1774 		 */
1775 		if (pp == NULL)
1776 			goto again;
1777 		/*
1778 		 * Fill page from backing store, if any. If none, then
1779 		 * either this is a newly filled hole or page must have
1780 		 * been unmodified and freed so just zero it out.
1781 		 */
1782 		err = swap_getphysname(vp, off, &pvp, &poff);
1783 		if (err) {
1784 			panic("tmp_getapage: no anon slot vp %p "
1785 			    "off %llx pp %p\n", (void *)vp, off, (void *)pp);
1786 		}
1787 		if (pvp) {
1788 			flags = (pl == NULL ? B_ASYNC|B_READ : B_READ);
1789 			err = VOP_PAGEIO(pvp, pp, (u_offset_t)poff, PAGESIZE,
1790 			    flags, cr);
1791 			if (flags & B_ASYNC)
1792 				pp = NULL;
1793 		} else if (rw != S_CREATE) {
1794 			pagezero(pp, 0, PAGESIZE);
1795 		}
1796 		if (err && pp)
1797 			pvn_read_done(pp, B_ERROR);
1798 		if (err == 0) {
1799 			if (pl)
1800 				pvn_plist_init(pp, pl, plsz, off, PAGESIZE, rw);
1801 			else
1802 				pvn_io_done(pp);
1803 		}
1804 	}
1805 	return (err);
1806 }
1807 
1808 
1809 /*
1810  * Flags are composed of {B_INVAL, B_DIRTY B_FREE, B_DONTNEED}.
1811  * If len == 0, do from off to EOF.
1812  */
1813 static int tmp_nopage = 0;	/* Don't do tmp_putpage's if set */
1814 
1815 /* ARGSUSED */
1816 int
1817 tmp_putpage(
1818 	register struct vnode *vp,
1819 	offset_t off,
1820 	size_t len,
1821 	int flags,
1822 	struct cred *cr)
1823 {
1824 	register page_t *pp;
1825 	u_offset_t io_off;
1826 	size_t io_len = 0;
1827 	int err = 0;
1828 	struct tmpnode *tp = VTOTN(vp);
1829 	int dolock;
1830 
1831 	if (tmp_nopage)
1832 		return (0);
1833 
1834 	ASSERT(vp->v_count != 0);
1835 
1836 	if (vp->v_flag & VNOMAP)
1837 		return (ENOSYS);
1838 
1839 	/*
1840 	 * This being tmpfs, we don't ever do i/o unless we really
1841 	 * have to (when we're low on memory and pageout calls us
1842 	 * with B_ASYNC | B_FREE or the user explicitly asks for it with
1843 	 * B_DONTNEED).
1844 	 * XXX to approximately track the mod time like ufs we should
1845 	 * update the times here. The problem is, once someone does a
1846 	 * store we never clear the mod bit and do i/o, thus fsflush
1847 	 * will keep calling us every 30 seconds to do the i/o and we'll
1848 	 * continually update the mod time. At least we update the mod
1849 	 * time on the first store because this results in a call to getpage.
1850 	 */
1851 	if (flags != (B_ASYNC | B_FREE) && (flags & B_INVAL) == 0 &&
1852 		(flags & B_DONTNEED) == 0)
1853 		return (0);
1854 	/*
1855 	 * If this thread owns the lock, i.e., this thread grabbed it
1856 	 * as writer somewhere above, then we don't need to grab the
1857 	 * lock as reader in this routine.
1858 	 */
1859 	dolock = (rw_owner(&tp->tn_contents) != curthread);
1860 
1861 	/*
1862 	 * If this is pageout don't block on the lock as you could deadlock
1863 	 * when freemem == 0 (another thread has the read lock and is blocked
1864 	 * creating a page, and a third thread is waiting to get the writers
1865 	 * lock - waiting writers priority blocks us from getting the read
1866 	 * lock). Of course, if the only freeable pages are on this tmpnode
1867 	 * we're hosed anyways. A better solution might be a new lock type.
1868 	 * Note: ufs has the same problem.
1869 	 */
1870 	if (curproc == proc_pageout) {
1871 		if (!rw_tryenter(&tp->tn_contents, RW_READER))
1872 			return (ENOMEM);
1873 	} else if (dolock)
1874 		rw_enter(&tp->tn_contents, RW_READER);
1875 
1876 	if (!vn_has_cached_data(vp))
1877 		goto out;
1878 
1879 	if (len == 0) {
1880 		if (curproc == proc_pageout) {
1881 			panic("tmp: pageout can't block");
1882 			/*NOTREACHED*/
1883 		}
1884 
1885 		/* Search the entire vp list for pages >= off. */
1886 		err = pvn_vplist_dirty(vp, (u_offset_t)off, tmp_putapage,
1887 		    flags, cr);
1888 	} else {
1889 		u_offset_t eoff;
1890 
1891 		/*
1892 		 * Loop over all offsets in the range [off...off + len]
1893 		 * looking for pages to deal with.
1894 		 */
1895 		eoff = MIN(off + len, tp->tn_size);
1896 		for (io_off = off; io_off < eoff; io_off += io_len) {
1897 			/*
1898 			 * If we are not invalidating, synchronously
1899 			 * freeing or writing pages use the routine
1900 			 * page_lookup_nowait() to prevent reclaiming
1901 			 * them from the free list.
1902 			 */
1903 			if ((flags & B_INVAL) || ((flags & B_ASYNC) == 0)) {
1904 				pp = page_lookup(vp, io_off,
1905 				    (flags & (B_INVAL | B_FREE)) ?
1906 				    SE_EXCL : SE_SHARED);
1907 			} else {
1908 				pp = page_lookup_nowait(vp, io_off,
1909 				    (flags & B_FREE) ? SE_EXCL : SE_SHARED);
1910 			}
1911 
1912 			if (pp == NULL || pvn_getdirty(pp, flags) == 0)
1913 				io_len = PAGESIZE;
1914 			else {
1915 				err = tmp_putapage(vp, pp, &io_off, &io_len,
1916 				    flags, cr);
1917 				if (err != 0)
1918 					break;
1919 			}
1920 		}
1921 	}
1922 	/* If invalidating, verify all pages on vnode list are gone. */
1923 	if (err == 0 && off == 0 && len == 0 &&
1924 	    (flags & B_INVAL) && vn_has_cached_data(vp)) {
1925 		panic("tmp_putpage: B_INVAL, pages not gone");
1926 		/*NOTREACHED*/
1927 	}
1928 out:
1929 	if ((curproc == proc_pageout) || dolock)
1930 		rw_exit(&tp->tn_contents);
1931 	/*
1932 	 * Only reason putapage is going to give us SE_NOSWAP as error
1933 	 * is when we ask a page to be written to physical backing store
1934 	 * and there is none. Ignore this because we might be dealing
1935 	 * with a swap page which does not have any backing store
1936 	 * on disk. In any other case we won't get this error over here.
1937 	 */
1938 	if (err == SE_NOSWAP)
1939 		err = 0;
1940 	return (err);
1941 }
1942 
1943 long tmp_putpagecnt, tmp_pagespushed;
1944 
1945 /*
1946  * Write out a single page.
1947  * For tmpfs this means choose a physical swap slot and write the page
1948  * out using VOP_PAGEIO. For performance, we attempt to kluster; i.e.,
1949  * we try to find a bunch of other dirty pages adjacent in the file
1950  * and a bunch of contiguous swap slots, and then write all the pages
1951  * out in a single i/o.
1952  */
1953 /*ARGSUSED*/
1954 static int
1955 tmp_putapage(
1956 	struct vnode *vp,
1957 	page_t *pp,
1958 	u_offset_t *offp,
1959 	size_t *lenp,
1960 	int flags,
1961 	struct cred *cr)
1962 {
1963 	int err;
1964 	ulong_t klstart, kllen;
1965 	page_t *pplist, *npplist;
1966 	extern int klustsize;
1967 	long tmp_klustsize;
1968 	struct tmpnode *tp;
1969 	size_t pp_off, pp_len;
1970 	u_offset_t io_off;
1971 	size_t io_len;
1972 	struct vnode *pvp;
1973 	u_offset_t pstart;
1974 	u_offset_t offset;
1975 	u_offset_t tmpoff;
1976 
1977 	ASSERT(PAGE_LOCKED(pp));
1978 
1979 	/* Kluster in tmp_klustsize chunks */
1980 	tp = VTOTN(vp);
1981 	tmp_klustsize = klustsize;
1982 	offset = pp->p_offset;
1983 	klstart = (offset / tmp_klustsize) * tmp_klustsize;
1984 	kllen = MIN(tmp_klustsize, tp->tn_size - klstart);
1985 
1986 	/* Get a kluster of pages */
1987 	pplist =
1988 	    pvn_write_kluster(vp, pp, &tmpoff, &pp_len, klstart, kllen, flags);
1989 
1990 	pp_off = (size_t)tmpoff;
1991 
1992 	/*
1993 	 * Get a cluster of physical offsets for the pages; the amount we
1994 	 * get may be some subrange of what we ask for (io_off, io_len).
1995 	 */
1996 	io_off = pp_off;
1997 	io_len = pp_len;
1998 	err = swap_newphysname(vp, offset, &io_off, &io_len, &pvp, &pstart);
1999 	ASSERT(err != SE_NOANON); /* anon slot must have been filled */
2000 	if (err) {
2001 		pvn_write_done(pplist, B_ERROR | B_WRITE | flags);
2002 		/*
2003 		 * If this routine is called as a result of segvn_sync
2004 		 * operation and we have no physical swap then we can get an
2005 		 * error here. In such case we would return SE_NOSWAP as error.
2006 		 * At this point, we expect only SE_NOSWAP.
2007 		 */
2008 		ASSERT(err == SE_NOSWAP);
2009 		if (flags & B_INVAL)
2010 			err = ENOMEM;
2011 		goto out;
2012 	}
2013 	ASSERT(pp_off <= io_off && io_off + io_len <= pp_off + pp_len);
2014 	ASSERT(io_off <= offset && offset < io_off + io_len);
2015 
2016 	/* Toss pages at front/rear that we couldn't get physical backing for */
2017 	if (io_off != pp_off) {
2018 		npplist = NULL;
2019 		page_list_break(&pplist, &npplist, btop(io_off - pp_off));
2020 		ASSERT(pplist->p_offset == pp_off);
2021 		ASSERT(pplist->p_prev->p_offset == io_off - PAGESIZE);
2022 		pvn_write_done(pplist, B_ERROR | B_WRITE | flags);
2023 		pplist = npplist;
2024 	}
2025 	if (io_off + io_len < pp_off + pp_len) {
2026 		npplist = NULL;
2027 		page_list_break(&pplist, &npplist, btop(io_len));
2028 		ASSERT(npplist->p_offset == io_off + io_len);
2029 		ASSERT(npplist->p_prev->p_offset == pp_off + pp_len - PAGESIZE);
2030 		pvn_write_done(npplist, B_ERROR | B_WRITE | flags);
2031 	}
2032 
2033 	ASSERT(pplist->p_offset == io_off);
2034 	ASSERT(pplist->p_prev->p_offset == io_off + io_len - PAGESIZE);
2035 	ASSERT(btopr(io_len) <= btopr(kllen));
2036 
2037 	/* Do i/o on the remaining kluster */
2038 	err = VOP_PAGEIO(pvp, pplist, (u_offset_t)pstart, io_len,
2039 	    B_WRITE | flags, cr);
2040 
2041 	if ((flags & B_ASYNC) == 0) {
2042 		pvn_write_done(pplist, ((err) ? B_ERROR : 0) | B_WRITE | flags);
2043 	}
2044 out:
2045 	if (!err) {
2046 		if (offp)
2047 			*offp = io_off;
2048 		if (lenp)
2049 			*lenp = io_len;
2050 		tmp_putpagecnt++;
2051 		tmp_pagespushed += btop(io_len);
2052 	}
2053 	if (err && err != ENOMEM && err != SE_NOSWAP)
2054 		cmn_err(CE_WARN, "tmp_putapage: err %d\n", err);
2055 	return (err);
2056 }
2057 
2058 static int
2059 tmp_map(
2060 	struct vnode *vp,
2061 	offset_t off,
2062 	struct as *as,
2063 	caddr_t *addrp,
2064 	size_t len,
2065 	uchar_t prot,
2066 	uchar_t maxprot,
2067 	uint_t flags,
2068 	struct cred *cred)
2069 {
2070 	struct segvn_crargs vn_a;
2071 	struct tmpnode *tp = (struct tmpnode *)VTOTN(vp);
2072 	int error;
2073 
2074 #ifdef _ILP32
2075 	if (len > MAXOFF_T)
2076 		return (ENOMEM);
2077 #endif
2078 
2079 	if (vp->v_flag & VNOMAP)
2080 		return (ENOSYS);
2081 
2082 	if (off < 0 || (offset_t)(off + len) < 0 ||
2083 	    off > MAXOFF_T || (off + len) > MAXOFF_T)
2084 		return (ENXIO);
2085 
2086 	if (vp->v_type != VREG)
2087 		return (ENODEV);
2088 
2089 	/*
2090 	 * Don't allow mapping to locked file
2091 	 */
2092 	if (vn_has_mandatory_locks(vp, tp->tn_mode)) {
2093 		return (EAGAIN);
2094 	}
2095 
2096 	as_rangelock(as);
2097 	if ((flags & MAP_FIXED) == 0) {
2098 		map_addr(addrp, len, (offset_t)off, 1, flags);
2099 		if (*addrp == NULL) {
2100 			as_rangeunlock(as);
2101 			return (ENOMEM);
2102 		}
2103 	} else {
2104 		/*
2105 		 * User specified address - blow away any previous mappings
2106 		 */
2107 		(void) as_unmap(as, *addrp, len);
2108 	}
2109 
2110 	vn_a.vp = vp;
2111 	vn_a.offset = (u_offset_t)off;
2112 	vn_a.type = flags & MAP_TYPE;
2113 	vn_a.prot = prot;
2114 	vn_a.maxprot = maxprot;
2115 	vn_a.flags = flags & ~MAP_TYPE;
2116 	vn_a.cred = cred;
2117 	vn_a.amp = NULL;
2118 	vn_a.szc = 0;
2119 	vn_a.lgrp_mem_policy_flags = 0;
2120 
2121 	error = as_map(as, *addrp, len, segvn_create, &vn_a);
2122 	as_rangeunlock(as);
2123 	return (error);
2124 }
2125 
2126 /*
2127  * tmp_addmap and tmp_delmap can't be called since the vp
2128  * maintained in the segvn mapping is NULL.
2129  */
2130 /* ARGSUSED */
2131 static int
2132 tmp_addmap(
2133 	struct vnode *vp,
2134 	offset_t off,
2135 	struct as *as,
2136 	caddr_t addr,
2137 	size_t len,
2138 	uchar_t prot,
2139 	uchar_t maxprot,
2140 	uint_t flags,
2141 	struct cred *cred)
2142 {
2143 	return (0);
2144 }
2145 
2146 /* ARGSUSED */
2147 static int
2148 tmp_delmap(
2149 	struct vnode *vp,
2150 	offset_t off,
2151 	struct as *as,
2152 	caddr_t addr,
2153 	size_t len,
2154 	uint_t prot,
2155 	uint_t maxprot,
2156 	uint_t flags,
2157 	struct cred *cred)
2158 {
2159 	return (0);
2160 }
2161 
2162 static int
2163 tmp_freesp(struct vnode *vp, struct flock64 *lp, int flag)
2164 {
2165 	register int i;
2166 	register struct tmpnode *tp = VTOTN(vp);
2167 	int error;
2168 
2169 	ASSERT(vp->v_type == VREG);
2170 	ASSERT(lp->l_start >= 0);
2171 
2172 	if (lp->l_len != 0)
2173 		return (EINVAL);
2174 
2175 	rw_enter(&tp->tn_rwlock, RW_WRITER);
2176 	if (tp->tn_size == lp->l_start) {
2177 		rw_exit(&tp->tn_rwlock);
2178 		return (0);
2179 	}
2180 
2181 	/*
2182 	 * Check for any mandatory locks on the range
2183 	 */
2184 	if (MANDLOCK(vp, tp->tn_mode)) {
2185 		long save_start;
2186 
2187 		save_start = lp->l_start;
2188 
2189 		if (tp->tn_size < lp->l_start) {
2190 			/*
2191 			 * "Truncate up" case: need to make sure there
2192 			 * is no lock beyond current end-of-file. To
2193 			 * do so, we need to set l_start to the size
2194 			 * of the file temporarily.
2195 			 */
2196 			lp->l_start = tp->tn_size;
2197 		}
2198 		lp->l_type = F_WRLCK;
2199 		lp->l_sysid = 0;
2200 		lp->l_pid = ttoproc(curthread)->p_pid;
2201 		i = (flag & (FNDELAY|FNONBLOCK)) ? 0 : SLPFLCK;
2202 		if ((i = reclock(vp, lp, i, 0, lp->l_start, NULL)) != 0 ||
2203 		    lp->l_type != F_UNLCK) {
2204 			rw_exit(&tp->tn_rwlock);
2205 			return (i ? i : EAGAIN);
2206 		}
2207 
2208 		lp->l_start = save_start;
2209 	}
2210 	VFSTOTM(vp->v_vfsp);
2211 
2212 	rw_enter(&tp->tn_contents, RW_WRITER);
2213 	error = tmpnode_trunc((struct tmount *)VFSTOTM(vp->v_vfsp),
2214 	    tp, (ulong_t)lp->l_start);
2215 	rw_exit(&tp->tn_contents);
2216 	rw_exit(&tp->tn_rwlock);
2217 	return (error);
2218 }
2219 
2220 /* ARGSUSED */
2221 static int
2222 tmp_space(
2223 	struct vnode *vp,
2224 	int cmd,
2225 	struct flock64 *bfp,
2226 	int flag,
2227 	offset_t offset,
2228 	cred_t *cred,
2229 	caller_context_t *ct)
2230 {
2231 	int error;
2232 
2233 	if (cmd != F_FREESP)
2234 		return (EINVAL);
2235 	if ((error = convoff(vp, bfp, 0, (offset_t)offset)) == 0) {
2236 		if ((bfp->l_start > MAXOFF_T) || (bfp->l_len > MAXOFF_T))
2237 			return (EFBIG);
2238 		error = tmp_freesp(vp, bfp, flag);
2239 	}
2240 	return (error);
2241 }
2242 
2243 /* ARGSUSED */
2244 static int
2245 tmp_seek(struct vnode *vp, offset_t ooff, offset_t *noffp)
2246 {
2247 	return ((*noffp < 0 || *noffp > MAXOFFSET_T) ? EINVAL : 0);
2248 }
2249 
2250 /* ARGSUSED2 */
2251 static int
2252 tmp_rwlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
2253 {
2254 	struct tmpnode *tp = VTOTN(vp);
2255 
2256 	if (write_lock) {
2257 		rw_enter(&tp->tn_rwlock, RW_WRITER);
2258 	} else {
2259 		rw_enter(&tp->tn_rwlock, RW_READER);
2260 	}
2261 	return (write_lock);
2262 }
2263 
2264 /* ARGSUSED1 */
2265 static void
2266 tmp_rwunlock(struct vnode *vp, int write_lock, caller_context_t *ctp)
2267 {
2268 	struct tmpnode *tp = VTOTN(vp);
2269 
2270 	rw_exit(&tp->tn_rwlock);
2271 }
2272 
2273 static int
2274 tmp_pathconf(struct vnode *vp, int cmd, ulong_t *valp, cred_t *cr)
2275 {
2276 	struct tmpnode *tp = NULL;
2277 	int error;
2278 
2279 	switch (cmd) {
2280 	case _PC_XATTR_EXISTS:
2281 		if (vp->v_vfsp->vfs_flag & VFS_XATTR) {
2282 			*valp = 0;	/* assume no attributes */
2283 			error = 0;	/* okay to ask */
2284 			tp = VTOTN(vp);
2285 			rw_enter(&tp->tn_rwlock, RW_READER);
2286 			if (tp->tn_xattrdp) {
2287 				rw_enter(&tp->tn_xattrdp->tn_rwlock, RW_READER);
2288 				/* do not count "." and ".." */
2289 				if (tp->tn_xattrdp->tn_dirents > 2)
2290 					*valp = 1;
2291 				rw_exit(&tp->tn_xattrdp->tn_rwlock);
2292 			}
2293 			rw_exit(&tp->tn_rwlock);
2294 		} else {
2295 			error = EINVAL;
2296 		}
2297 		break;
2298 	default:
2299 		error = fs_pathconf(vp, cmd, valp, cr);
2300 	}
2301 	return (error);
2302 }
2303 
2304 
2305 struct vnodeops *tmp_vnodeops;
2306 
2307 const fs_operation_def_t tmp_vnodeops_template[] = {
2308 	VOPNAME_OPEN,		{ .vop_open = tmp_open },
2309 	VOPNAME_CLOSE,		{ .vop_close = tmp_close },
2310 	VOPNAME_READ,		{ .vop_read = tmp_read },
2311 	VOPNAME_WRITE,		{ .vop_write = tmp_write },
2312 	VOPNAME_IOCTL,		{ .vop_ioctl = tmp_ioctl },
2313 	VOPNAME_GETATTR,	{ .vop_getattr = tmp_getattr },
2314 	VOPNAME_SETATTR,	{ .vop_setattr = tmp_setattr },
2315 	VOPNAME_ACCESS,		{ .vop_access = tmp_access },
2316 	VOPNAME_LOOKUP,		{ .vop_lookup = tmp_lookup },
2317 	VOPNAME_CREATE,		{ .vop_create = tmp_create },
2318 	VOPNAME_REMOVE,		{ .vop_remove = tmp_remove },
2319 	VOPNAME_LINK,		{ .vop_link = tmp_link },
2320 	VOPNAME_RENAME,		{ .vop_rename = tmp_rename },
2321 	VOPNAME_MKDIR,		{ .vop_mkdir = tmp_mkdir },
2322 	VOPNAME_RMDIR,		{ .vop_rmdir = tmp_rmdir },
2323 	VOPNAME_READDIR,	{ .vop_readdir = tmp_readdir },
2324 	VOPNAME_SYMLINK,	{ .vop_symlink = tmp_symlink },
2325 	VOPNAME_READLINK,	{ .vop_readlink = tmp_readlink },
2326 	VOPNAME_FSYNC,		{ .vop_fsync = tmp_fsync },
2327 	VOPNAME_INACTIVE,	{ .vop_inactive = tmp_inactive },
2328 	VOPNAME_FID,		{ .vop_fid = tmp_fid },
2329 	VOPNAME_RWLOCK,		{ .vop_rwlock = tmp_rwlock },
2330 	VOPNAME_RWUNLOCK,	{ .vop_rwunlock = tmp_rwunlock },
2331 	VOPNAME_SEEK,		{ .vop_seek = tmp_seek },
2332 	VOPNAME_SPACE,		{ .vop_space = tmp_space },
2333 	VOPNAME_GETPAGE,	{ .vop_getpage = tmp_getpage },
2334 	VOPNAME_PUTPAGE,	{ .vop_putpage = tmp_putpage },
2335 	VOPNAME_MAP,		{ .vop_map = tmp_map },
2336 	VOPNAME_ADDMAP,		{ .vop_addmap = tmp_addmap },
2337 	VOPNAME_DELMAP,		{ .vop_delmap = tmp_delmap },
2338 	VOPNAME_PATHCONF,	{ .vop_pathconf = tmp_pathconf },
2339 	VOPNAME_VNEVENT,	{ .vop_vnevent = fs_vnevent_support },
2340 	NULL,			NULL
2341 };
2342