kernfs_vnops.c revision 1.26 1 /*
2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This code is derived from software donated to Berkeley by
6 * Jan-Simon Pendry.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. All advertising materials mentioning features or use of this software
17 * must display the following acknowledgement:
18 * This product includes software developed by the University of
19 * California, Berkeley and its contributors.
20 * 4. Neither the name of the University nor the names of its contributors
21 * may be used to endorse or promote products derived from this software
22 * without specific prior written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * SUCH DAMAGE.
35 *
36 * from: @(#)kernfs_vnops.c 8.9 (Berkeley) 6/15/94
37 * $Id: kernfs_vnops.c,v 1.26 1994/06/15 22:54:43 mycroft Exp $
38 */
39
40 /*
41 * Kernel parameter filesystem (/kern)
42 */
43
44 #include <sys/param.h>
45 #include <sys/systm.h>
46 #include <sys/kernel.h>
47 #include <sys/vmmeter.h>
48 #include <sys/types.h>
49 #include <sys/time.h>
50 #include <sys/proc.h>
51 #include <sys/vnode.h>
52 #include <sys/malloc.h>
53 #include <sys/file.h>
54 #include <sys/stat.h>
55 #include <sys/mount.h>
56 #include <sys/namei.h>
57 #include <sys/buf.h>
58 #include <sys/dirent.h>
59 #include <miscfs/kernfs/kernfs.h>
60
61 #define KSTRING 256 /* Largest I/O available via this filesystem */
62 #define UIO_MX 32
63
64 #define READ_MODE (S_IRUSR|S_IRGRP|S_IROTH)
65 #define WRITE_MODE (S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH)
66 #define DIR_MODE (S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH)
67
68 struct kern_target {
69 u_char kt_type;
70 u_char kt_namlen;
71 char *kt_name;
72 void *kt_data;
73 #define KTT_NULL 1
74 #define KTT_TIME 5
75 #define KTT_INT 17
76 #define KTT_STRING 31
77 #define KTT_HOSTNAME 47
78 #define KTT_AVENRUN 53
79 #define KTT_DEVICE 71
80 u_char kt_tag;
81 u_char kt_vtype;
82 mode_t kt_mode;
83 } kern_targets[] = {
84 /* NOTE: The name must be less than UIO_MX-16 chars in length */
85 #define N(s) sizeof(s)-1, s
86 /* name data tag type ro/rw */
87 { DT_DIR, N("."), 0, KTT_NULL, VDIR, DIR_MODE },
88 { DT_DIR, N(".."), 0, KTT_NULL, VDIR, DIR_MODE },
89 { DT_REG, N("boottime"), &boottime.tv_sec, KTT_INT, VREG, READ_MODE },
90 { DT_REG, N("copyright"), copyright, KTT_STRING, VREG, READ_MODE },
91 { DT_REG, N("hostname"), 0, KTT_HOSTNAME, VREG, WRITE_MODE },
92 { DT_REG, N("hz"), &hz, KTT_INT, VREG, READ_MODE },
93 { DT_REG, N("loadavg"), 0, KTT_AVENRUN, VREG, READ_MODE },
94 { DT_REG, N("pagesize"), &cnt.v_page_size, KTT_INT, VREG, READ_MODE },
95 { DT_REG, N("physmem"), &physmem, KTT_INT, VREG, READ_MODE },
96 #if 0
97 { DT_DIR, N("root"), 0, KTT_NULL, VDIR, DIR_MODE },
98 #endif
99 { DT_BLK, N("rootdev"), &rootdev, KTT_DEVICE, VBLK, READ_MODE },
100 { DT_CHR, N("rrootdev"), &rrootdev, KTT_DEVICE, VCHR, READ_MODE },
101 { DT_REG, N("time"), 0, KTT_TIME, VREG, READ_MODE },
102 { DT_REG, N("version"), version, KTT_STRING, VREG, READ_MODE },
103 #undef N
104 };
105 static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]);
106
107 static int
108 kernfs_xread(kt, buf, len, lenp)
109 struct kern_target *kt;
110 char *buf;
111 int len;
112 int *lenp;
113 {
114
115 switch (kt->kt_tag) {
116 case KTT_TIME: {
117 struct timeval tv;
118 microtime(&tv);
119 sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec);
120 break;
121 }
122
123 case KTT_INT: {
124 int *ip = kt->kt_data;
125 sprintf(buf, "%d\n", *ip);
126 break;
127 }
128
129 case KTT_STRING: {
130 char *cp = kt->kt_data;
131 int xlen = strlen(cp) + 1;
132
133 if (xlen >= len)
134 return (EINVAL);
135
136 bcopy(cp, buf, xlen);
137 break;
138 }
139
140 case KTT_HOSTNAME: {
141 char *cp = hostname;
142 int xlen = hostnamelen;
143
144 if (xlen >= (len-2))
145 return (EINVAL);
146
147 bcopy(cp, buf, xlen);
148 buf[xlen] = '\n';
149 buf[xlen+1] = '\0';
150 break;
151 }
152
153 case KTT_AVENRUN:
154 sprintf(buf, "%ld %ld %ld %ld\n",
155 averunnable.ldavg[0], averunnable.ldavg[1],
156 averunnable.ldavg[2], averunnable.fscale);
157 break;
158
159 default:
160 return (EIO);
161 }
162
163 *lenp = strlen(buf);
164 return (0);
165 }
166
167 static int
168 kernfs_xwrite(kt, buf, len)
169 struct kern_target *kt;
170 char *buf;
171 int len;
172 {
173
174 switch (kt->kt_tag) {
175 case KTT_HOSTNAME:
176 if (buf[len-1] == '\n')
177 --len;
178 bcopy(buf, hostname, len);
179 hostname[len] = '\0';
180 hostnamelen = len;
181 return (0);
182
183 default:
184 return (EIO);
185 }
186 }
187
188
189 /*
190 * vp is the current namei directory
191 * ndp is the name to locate in that directory...
192 */
193 kernfs_lookup(ap)
194 struct vop_lookup_args /* {
195 struct vnode * a_dvp;
196 struct vnode ** a_vpp;
197 struct componentname * a_cnp;
198 } */ *ap;
199 {
200 struct componentname *cnp = ap->a_cnp;
201 struct vnode **vpp = ap->a_vpp;
202 struct vnode *dvp = ap->a_dvp;
203 char *pname = cnp->cn_nameptr;
204 struct kern_target *kt;
205 struct vnode *fvp;
206 int error, i;
207
208 #ifdef KERNFS_DIAGNOSTIC
209 printf("kernfs_lookup(%x)\n", ap);
210 printf("kernfs_lookup(dp = %x, vpp = %x, cnp = %x)\n", dvp, vpp, ap->a_cnp);
211 printf("kernfs_lookup(%s)\n", pname);
212 #endif
213
214 if (cnp->cn_namelen == 1 && *pname == '.') {
215 *vpp = dvp;
216 VREF(dvp);
217 /*VOP_LOCK(dvp);*/
218 return (0);
219 }
220
221 #if 0
222 if (cnp->cn_namelen == 4 && bcmp(pname, "root", 4) == 0) {
223 *vpp = rootdir;
224 VREF(rootdir);
225 VOP_LOCK(rootdir);
226 return (0);
227 }
228 #endif
229
230 *vpp = NULLVP;
231
232 for (error = ENOENT, kt = kern_targets, i = 0; i < nkern_targets;
233 kt++, i++) {
234 if (cnp->cn_namelen == kt->kt_namlen &&
235 bcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) {
236 error = 0;
237 break;
238 }
239 }
240
241 #ifdef KERNFS_DIAGNOSTIC
242 printf("kernfs_lookup: i = %d, error = %d\n", i, error);
243 #endif
244
245 if (error)
246 return (error);
247
248 if (kt->kt_tag == KTT_DEVICE) {
249 dev_t *dp = kt->kt_data;
250 loop:
251 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp))
252 return (ENOENT);
253 *vpp = fvp;
254 if (vget(fvp, 1))
255 goto loop;
256 return (0);
257 }
258
259 #ifdef KERNFS_DIAGNOSTIC
260 printf("kernfs_lookup: allocate new vnode\n");
261 #endif
262 if (error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p,
263 &fvp))
264 return (error);
265
266 MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP,
267 M_WAITOK);
268 VTOKERN(fvp)->kf_kt = kt;
269 fvp->v_type = kt->kt_vtype;
270 *vpp = fvp;
271
272 #ifdef KERNFS_DIAGNOSTIC
273 printf("kernfs_lookup: newvp = %x\n", fvp);
274 #endif
275 return (0);
276 }
277
278 kernfs_open(ap)
279 struct vop_open_args /* {
280 struct vnode *a_vp;
281 int a_mode;
282 struct ucred *a_cred;
283 struct proc *a_p;
284 } */ *ap;
285 {
286
287 /* Only need to check access permissions. */
288 return (0);
289 }
290
291 static int
292 kernfs_access(ap)
293 struct vop_access_args /* {
294 struct vnode *a_vp;
295 int a_mode;
296 struct ucred *a_cred;
297 struct proc *a_p;
298 } */ *ap;
299 {
300 struct vnode *vp = ap->a_vp;
301 struct ucred *cred = ap->a_cred;
302 mode_t amode = ap->a_mode;
303 mode_t fmode =
304 (vp->v_flag & VROOT) ? DIR_MODE : VTOKERN(vp)->kf_kt->kt_mode;
305 mode_t mask = 0;
306 gid_t *gp;
307 int i;
308
309 /* Some files are simply not modifiable. */
310 if ((amode & VWRITE) && (fmode & (S_IWUSR|S_IWGRP|S_IWOTH)) == 0)
311 return (EPERM);
312
313 /* Root can do anything else. */
314 if (cred->cr_uid == 0)
315 return (0);
316
317 /* Check for group 0 (wheel) permissions. */
318 for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++)
319 if (*gp == 0) {
320 if (amode & VEXEC)
321 mask |= S_IXGRP;
322 if (amode & VREAD)
323 mask |= S_IRGRP;
324 if (amode & VWRITE)
325 mask |= S_IWGRP;
326 return ((fmode & mask) == mask ? 0 : EACCES);
327 }
328
329 /* Otherwise, check everyone else. */
330 if (amode & VEXEC)
331 mask |= S_IXOTH;
332 if (amode & VREAD)
333 mask |= S_IROTH;
334 if (amode & VWRITE)
335 mask |= S_IWOTH;
336 return ((fmode & mask) == mask ? 0 : EACCES);
337 }
338
339 kernfs_getattr(ap)
340 struct vop_getattr_args /* {
341 struct vnode *a_vp;
342 struct vattr *a_vap;
343 struct ucred *a_cred;
344 struct proc *a_p;
345 } */ *ap;
346 {
347 struct vnode *vp = ap->a_vp;
348 struct vattr *vap = ap->a_vap;
349 int error = 0;
350 char strbuf[KSTRING];
351
352 bzero((caddr_t) vap, sizeof(*vap));
353 vattr_null(vap);
354 vap->va_uid = 0;
355 vap->va_gid = 0;
356 vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
357 vap->va_size = 0;
358 vap->va_blocksize = DEV_BSIZE;
359 microtime(&vap->va_atime);
360 vap->va_mtime = vap->va_atime;
361 vap->va_ctime = vap->va_ctime;
362 vap->va_gen = 0;
363 vap->va_flags = 0;
364 vap->va_rdev = 0;
365 vap->va_bytes = 0;
366
367 if (vp->v_flag & VROOT) {
368 #ifdef KERNFS_DIAGNOSTIC
369 printf("kernfs_getattr: stat rootdir\n");
370 #endif
371 vap->va_type = VDIR;
372 vap->va_mode = DIR_MODE;
373 vap->va_nlink = 2;
374 vap->va_fileid = 2;
375 vap->va_size = DEV_BSIZE;
376 } else {
377 struct kern_target *kt = VTOKERN(vp)->kf_kt;
378 int nbytes;
379 #ifdef KERNFS_DIAGNOSTIC
380 printf("kernfs_getattr: stat target %s\n", kt->kt_name);
381 #endif
382 vap->va_type = kt->kt_vtype;
383 vap->va_mode = kt->kt_mode;
384 vap->va_nlink = 1;
385 vap->va_fileid = 1 + (kt - kern_targets) / sizeof(*kt);
386 error = kernfs_xread(kt, strbuf, sizeof(strbuf), &nbytes);
387 vap->va_size = nbytes;
388 }
389
390 #ifdef KERNFS_DIAGNOSTIC
391 printf("kernfs_getattr: return error %d\n", error);
392 #endif
393 return (error);
394 }
395
396 kernfs_setattr(ap)
397 struct vop_setattr_args /* {
398 struct vnode *a_vp;
399 struct vattr *a_vap;
400 struct ucred *a_cred;
401 struct proc *a_p;
402 } */ *ap;
403 {
404
405 /*
406 * Silently ignore attribute changes.
407 * This allows for open with truncate to have no
408 * effect until some data is written. I want to
409 * do it this way because all writes are atomic.
410 */
411 return (0);
412 }
413
414 static int
415 kernfs_read(ap)
416 struct vop_read_args /* {
417 struct vnode *a_vp;
418 struct uio *a_uio;
419 int a_ioflag;
420 struct ucred *a_cred;
421 } */ *ap;
422 {
423 struct vnode *vp = ap->a_vp;
424 struct uio *uio = ap->a_uio;
425 struct kern_target *kt;
426 char strbuf[KSTRING];
427 int off = uio->uio_offset;
428 int error, len;
429 char *cp;
430
431 if (vp->v_type == VDIR)
432 return (EOPNOTSUPP);
433
434 kt = VTOKERN(vp)->kf_kt;
435
436 #ifdef KERNFS_DIAGNOSTIC
437 printf("kern_read %s\n", kt->kt_name);
438 #endif
439
440 len = 0;
441 if (error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len))
442 return (error);
443 if (len <= off)
444 return (0);
445 return (uiomove(&strbuf[off], len - off, uio));
446 }
447
448 static int
449 kernfs_write(ap)
450 struct vop_write_args /* {
451 struct vnode *a_vp;
452 struct uio *a_uio;
453 int a_ioflag;
454 struct ucred *a_cred;
455 } */ *ap;
456 {
457 struct vnode *vp = ap->a_vp;
458 struct uio *uio = ap->a_uio;
459 struct kern_target *kt;
460 int error, xlen;
461 char strbuf[KSTRING];
462
463 if (vp->v_type == VDIR)
464 return (EOPNOTSUPP);
465
466 kt = VTOKERN(vp)->kf_kt;
467
468 if (uio->uio_offset != 0)
469 return (EINVAL);
470
471 xlen = min(uio->uio_resid, KSTRING-1);
472 if (error = uiomove(strbuf, xlen, uio))
473 return (error);
474
475 if (uio->uio_resid != 0)
476 return (EIO);
477
478 strbuf[xlen] = '\0';
479 xlen = strlen(strbuf);
480 return (kernfs_xwrite(kt, strbuf, xlen));
481 }
482
483 kernfs_readdir(ap)
484 struct vop_readdir_args /* {
485 struct vnode *a_vp;
486 struct uio *a_uio;
487 struct ucred *a_cred;
488 int *a_eofflag;
489 u_long *a_cookies;
490 int a_ncookies;
491 } */ *ap;
492 {
493 struct uio *uio = ap->a_uio;
494 struct kern_target *kt;
495 struct dirent d;
496 int i;
497 int error;
498
499 if (ap->a_vp->v_type != VDIR)
500 return (ENOTDIR);
501
502 /*
503 * We don't allow exporting kernfs mounts, and currently local
504 * requests do not need cookies.
505 */
506 if (ap->a_ncookies != NULL)
507 panic("kernfs_readdir: not hungry");
508
509 i = uio->uio_offset / UIO_MX;
510 error = 0;
511 for (kt = &kern_targets[i];
512 uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) {
513 struct dirent *dp = &d;
514 #ifdef KERNFS_DIAGNOSTIC
515 printf("kernfs_readdir: i = %d\n", i);
516 #endif
517
518 if (kt->kt_tag == KTT_DEVICE) {
519 dev_t *dp = kt->kt_data;
520 struct vnode *fvp;
521
522 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp))
523 continue;
524 }
525
526 bzero((caddr_t)dp, UIO_MX);
527 dp->d_namlen = kt->kt_namlen;
528 bcopy(kt->kt_name, dp->d_name, kt->kt_namlen+1);
529
530 #ifdef KERNFS_DIAGNOSTIC
531 printf("kernfs_readdir: name = %s, len = %d\n",
532 dp->d_name, dp->d_namlen);
533 #endif
534 /*
535 * Fill in the remaining fields
536 */
537 dp->d_reclen = UIO_MX;
538 dp->d_fileno = i + 3;
539 dp->d_type = kt->kt_type;
540 /*
541 * And ship to userland
542 */
543 if (error = uiomove((caddr_t)dp, UIO_MX, uio))
544 break;
545 }
546
547 uio->uio_offset = i * UIO_MX;
548
549 return (error);
550 }
551
552 kernfs_inactive(ap)
553 struct vop_inactive_args /* {
554 struct vnode *a_vp;
555 } */ *ap;
556 {
557 struct vnode *vp = ap->a_vp;
558
559 #ifdef KERNFS_DIAGNOSTIC
560 printf("kernfs_inactive(%x)\n", vp);
561 #endif
562 /*
563 * Clear out the v_type field to avoid
564 * nasty things happening in vgone().
565 */
566 vp->v_type = VNON;
567 return (0);
568 }
569
570 kernfs_reclaim(ap)
571 struct vop_reclaim_args /* {
572 struct vnode *a_vp;
573 } */ *ap;
574 {
575 struct vnode *vp = ap->a_vp;
576
577 #ifdef KERNFS_DIAGNOSTIC
578 printf("kernfs_reclaim(%x)\n", vp);
579 #endif
580 if (vp->v_data) {
581 FREE(vp->v_data, M_TEMP);
582 vp->v_data = 0;
583 }
584 return (0);
585 }
586
587 /*
588 * Return POSIX pathconf information applicable to special devices.
589 */
590 kernfs_pathconf(ap)
591 struct vop_pathconf_args /* {
592 struct vnode *a_vp;
593 int a_name;
594 int *a_retval;
595 } */ *ap;
596 {
597
598 switch (ap->a_name) {
599 case _PC_LINK_MAX:
600 *ap->a_retval = LINK_MAX;
601 return (0);
602 case _PC_MAX_CANON:
603 *ap->a_retval = MAX_CANON;
604 return (0);
605 case _PC_MAX_INPUT:
606 *ap->a_retval = MAX_INPUT;
607 return (0);
608 case _PC_PIPE_BUF:
609 *ap->a_retval = PIPE_BUF;
610 return (0);
611 case _PC_CHOWN_RESTRICTED:
612 *ap->a_retval = 1;
613 return (0);
614 case _PC_VDISABLE:
615 *ap->a_retval = _POSIX_VDISABLE;
616 return (0);
617 default:
618 return (EINVAL);
619 }
620 /* NOTREACHED */
621 }
622
623 /*
624 * Print out the contents of a /dev/fd vnode.
625 */
626 /* ARGSUSED */
627 kernfs_print(ap)
628 struct vop_print_args /* {
629 struct vnode *a_vp;
630 } */ *ap;
631 {
632
633 printf("tag VT_KERNFS, kernfs vnode\n");
634 return (0);
635 }
636
637 /*void*/
638 kernfs_vfree(ap)
639 struct vop_vfree_args /* {
640 struct vnode *a_pvp;
641 ino_t a_ino;
642 int a_mode;
643 } */ *ap;
644 {
645
646 return (0);
647 }
648
649 /*
650 * /dev/fd vnode unsupported operation
651 */
652 kernfs_enotsupp()
653 {
654
655 return (EOPNOTSUPP);
656 }
657
658 /*
659 * /dev/fd "should never get here" operation
660 */
661 kernfs_badop()
662 {
663
664 panic("kernfs: bad op");
665 /* NOTREACHED */
666 }
667
668 /*
669 * kernfs vnode null operation
670 */
671 kernfs_nullop()
672 {
673
674 return (0);
675 }
676
677 #define kernfs_create ((int (*) __P((struct vop_create_args *)))kernfs_enotsupp)
678 #define kernfs_mknod ((int (*) __P((struct vop_mknod_args *)))kernfs_enotsupp)
679 #define kernfs_close ((int (*) __P((struct vop_close_args *)))nullop)
680 #define kernfs_ioctl ((int (*) __P((struct vop_ioctl_args *)))kernfs_enotsupp)
681 #define kernfs_select ((int (*) __P((struct vop_select_args *)))kernfs_enotsupp)
682 #define kernfs_mmap ((int (*) __P((struct vop_mmap_args *)))kernfs_enotsupp)
683 #define kernfs_fsync ((int (*) __P((struct vop_fsync_args *)))nullop)
684 #define kernfs_seek ((int (*) __P((struct vop_seek_args *)))nullop)
685 #define kernfs_remove ((int (*) __P((struct vop_remove_args *)))kernfs_enotsupp)
686 #define kernfs_link ((int (*) __P((struct vop_link_args *)))kernfs_enotsupp)
687 #define kernfs_rename ((int (*) __P((struct vop_rename_args *)))kernfs_enotsupp)
688 #define kernfs_mkdir ((int (*) __P((struct vop_mkdir_args *)))kernfs_enotsupp)
689 #define kernfs_rmdir ((int (*) __P((struct vop_rmdir_args *)))kernfs_enotsupp)
690 #define kernfs_symlink ((int (*) __P((struct vop_symlink_args *)))kernfs_enotsupp)
691 #define kernfs_readlink \
692 ((int (*) __P((struct vop_readlink_args *)))kernfs_enotsupp)
693 #define kernfs_abortop ((int (*) __P((struct vop_abortop_args *)))nullop)
694 #define kernfs_lock ((int (*) __P((struct vop_lock_args *)))nullop)
695 #define kernfs_unlock ((int (*) __P((struct vop_unlock_args *)))nullop)
696 #define kernfs_bmap ((int (*) __P((struct vop_bmap_args *)))kernfs_badop)
697 #define kernfs_strategy ((int (*) __P((struct vop_strategy_args *)))kernfs_badop)
698 #define kernfs_islocked ((int (*) __P((struct vop_islocked_args *)))nullop)
699 #define kernfs_advlock ((int (*) __P((struct vop_advlock_args *)))kernfs_enotsupp)
700 #define kernfs_blkatoff \
701 ((int (*) __P((struct vop_blkatoff_args *)))kernfs_enotsupp)
702 #define kernfs_valloc ((int(*) __P(( \
703 struct vnode *pvp, \
704 int mode, \
705 struct ucred *cred, \
706 struct vnode **vpp))) kernfs_enotsupp)
707 #define kernfs_truncate \
708 ((int (*) __P((struct vop_truncate_args *)))kernfs_enotsupp)
709 #define kernfs_update ((int (*) __P((struct vop_update_args *)))kernfs_enotsupp)
710 #define kernfs_bwrite ((int (*) __P((struct vop_bwrite_args *)))kernfs_enotsupp)
711
712 int (**kernfs_vnodeop_p)();
713 struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = {
714 { &vop_default_desc, vn_default_error },
715 { &vop_lookup_desc, kernfs_lookup }, /* lookup */
716 { &vop_create_desc, kernfs_create }, /* create */
717 { &vop_mknod_desc, kernfs_mknod }, /* mknod */
718 { &vop_open_desc, kernfs_open }, /* open */
719 { &vop_close_desc, kernfs_close }, /* close */
720 { &vop_access_desc, kernfs_access }, /* access */
721 { &vop_getattr_desc, kernfs_getattr }, /* getattr */
722 { &vop_setattr_desc, kernfs_setattr }, /* setattr */
723 { &vop_read_desc, kernfs_read }, /* read */
724 { &vop_write_desc, kernfs_write }, /* write */
725 { &vop_ioctl_desc, kernfs_ioctl }, /* ioctl */
726 { &vop_select_desc, kernfs_select }, /* select */
727 { &vop_mmap_desc, kernfs_mmap }, /* mmap */
728 { &vop_fsync_desc, kernfs_fsync }, /* fsync */
729 { &vop_seek_desc, kernfs_seek }, /* seek */
730 { &vop_remove_desc, kernfs_remove }, /* remove */
731 { &vop_link_desc, kernfs_link }, /* link */
732 { &vop_rename_desc, kernfs_rename }, /* rename */
733 { &vop_mkdir_desc, kernfs_mkdir }, /* mkdir */
734 { &vop_rmdir_desc, kernfs_rmdir }, /* rmdir */
735 { &vop_symlink_desc, kernfs_symlink }, /* symlink */
736 { &vop_readdir_desc, kernfs_readdir }, /* readdir */
737 { &vop_readlink_desc, kernfs_readlink },/* readlink */
738 { &vop_abortop_desc, kernfs_abortop }, /* abortop */
739 { &vop_inactive_desc, kernfs_inactive },/* inactive */
740 { &vop_reclaim_desc, kernfs_reclaim }, /* reclaim */
741 { &vop_lock_desc, kernfs_lock }, /* lock */
742 { &vop_unlock_desc, kernfs_unlock }, /* unlock */
743 { &vop_bmap_desc, kernfs_bmap }, /* bmap */
744 { &vop_strategy_desc, kernfs_strategy },/* strategy */
745 { &vop_print_desc, kernfs_print }, /* print */
746 { &vop_islocked_desc, kernfs_islocked },/* islocked */
747 { &vop_pathconf_desc, kernfs_pathconf },/* pathconf */
748 { &vop_advlock_desc, kernfs_advlock }, /* advlock */
749 { &vop_blkatoff_desc, kernfs_blkatoff },/* blkatoff */
750 { &vop_valloc_desc, kernfs_valloc }, /* valloc */
751 { &vop_vfree_desc, kernfs_vfree }, /* vfree */
752 { &vop_truncate_desc, kernfs_truncate },/* truncate */
753 { &vop_update_desc, kernfs_update }, /* update */
754 { &vop_bwrite_desc, kernfs_bwrite }, /* bwrite */
755 { (struct vnodeop_desc*)NULL, (int(*)())NULL }
756 };
757 struct vnodeopv_desc kernfs_vnodeop_opv_desc =
758 { &kernfs_vnodeop_p, kernfs_vnodeop_entries };
759