kernfs_vnops.c revision 1.31 1 /* $NetBSD: kernfs_vnops.c,v 1.31 1994/12/01 10:16:53 mycroft Exp $ */
2
3 /*
4 * Copyright (c) 1992, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * This code is derived from software donated to Berkeley by
8 * Jan-Simon Pendry.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the University of
21 * California, Berkeley and its contributors.
22 * 4. Neither the name of the University nor the names of its contributors
23 * may be used to endorse or promote products derived from this software
24 * without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * SUCH DAMAGE.
37 *
38 * @(#)kernfs_vnops.c 8.9 (Berkeley) 6/15/94
39 */
40
41 /*
42 * Kernel parameter filesystem (/kern)
43 */
44
45 #include <sys/param.h>
46 #include <sys/systm.h>
47 #include <sys/kernel.h>
48 #include <sys/vmmeter.h>
49 #include <sys/types.h>
50 #include <sys/time.h>
51 #include <sys/proc.h>
52 #include <sys/vnode.h>
53 #include <sys/malloc.h>
54 #include <sys/file.h>
55 #include <sys/stat.h>
56 #include <sys/mount.h>
57 #include <sys/namei.h>
58 #include <sys/buf.h>
59 #include <sys/dirent.h>
60 #include <sys/msgbuf.h>
61 #include <miscfs/kernfs/kernfs.h>
62
63 #define KSTRING 256 /* Largest I/O available via this filesystem */
64 #define UIO_MX 32
65
66 #define READ_MODE (S_IRUSR|S_IRGRP|S_IROTH)
67 #define WRITE_MODE (S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH)
68 #define DIR_MODE (S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH)
69
70 struct kern_target {
71 u_char kt_type;
72 u_char kt_namlen;
73 char *kt_name;
74 void *kt_data;
75 #define KTT_NULL 1
76 #define KTT_TIME 5
77 #define KTT_INT 17
78 #define KTT_STRING 31
79 #define KTT_HOSTNAME 47
80 #define KTT_AVENRUN 53
81 #define KTT_DEVICE 71
82 #define KTT_MSGBUF 89
83 u_char kt_tag;
84 u_char kt_vtype;
85 mode_t kt_mode;
86 } kern_targets[] = {
87 /* NOTE: The name must be less than UIO_MX-16 chars in length */
88 #define N(s) sizeof(s)-1, s
89 /* name data tag type ro/rw */
90 { DT_DIR, N("."), 0, KTT_NULL, VDIR, DIR_MODE },
91 { DT_DIR, N(".."), 0, KTT_NULL, VDIR, DIR_MODE },
92 { DT_REG, N("boottime"), &boottime.tv_sec, KTT_INT, VREG, READ_MODE },
93 { DT_REG, N("copyright"), copyright, KTT_STRING, VREG, READ_MODE },
94 { DT_REG, N("hostname"), 0, KTT_HOSTNAME, VREG, WRITE_MODE },
95 { DT_REG, N("hz"), &hz, KTT_INT, VREG, READ_MODE },
96 { DT_REG, N("loadavg"), 0, KTT_AVENRUN, VREG, READ_MODE },
97 { DT_REG, N("msgbuf"), 0, KTT_MSGBUF, VREG, READ_MODE },
98 { DT_REG, N("pagesize"), &cnt.v_page_size, KTT_INT, VREG, READ_MODE },
99 { DT_REG, N("physmem"), &physmem, KTT_INT, VREG, READ_MODE },
100 #if 0
101 { DT_DIR, N("root"), 0, KTT_NULL, VDIR, DIR_MODE },
102 #endif
103 { DT_BLK, N("rootdev"), &rootdev, KTT_DEVICE, VBLK, READ_MODE },
104 { DT_CHR, N("rrootdev"), &rrootdev, KTT_DEVICE, VCHR, READ_MODE },
105 { DT_REG, N("time"), 0, KTT_TIME, VREG, READ_MODE },
106 { DT_REG, N("version"), version, KTT_STRING, VREG, READ_MODE },
107 #undef N
108 };
109 static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]);
110
111 int
112 kernfs_xread(kt, off, bufp, len)
113 struct kern_target *kt;
114 int off;
115 char **bufp;
116 int len;
117 {
118
119 switch (kt->kt_tag) {
120 case KTT_TIME: {
121 struct timeval tv;
122
123 microtime(&tv);
124 sprintf(*bufp, "%d %d\n", tv.tv_sec, tv.tv_usec);
125 break;
126 }
127
128 case KTT_INT: {
129 int *ip = kt->kt_data;
130
131 sprintf(*bufp, "%d\n", *ip);
132 break;
133 }
134
135 case KTT_STRING: {
136 char *cp = kt->kt_data;
137
138 *bufp = cp;
139 break;
140 }
141
142 case KTT_MSGBUF: {
143 extern struct msgbuf *msgbufp;
144 long n;
145
146 if (off >= MSG_BSIZE)
147 return (0);
148 n = msgbufp->msg_bufx + off;
149 if (n >= MSG_BSIZE)
150 n -= MSG_BSIZE;
151 len = min(MSG_BSIZE - n, MSG_BSIZE - off);
152 *bufp = msgbufp->msg_bufc + n;
153 return (len);
154 }
155
156 case KTT_HOSTNAME: {
157 char *cp = hostname;
158 int xlen = hostnamelen;
159
160 if (xlen >= (len-2))
161 return (EINVAL);
162
163 bcopy(cp, *bufp, xlen);
164 (*bufp)[xlen] = '\n';
165 (*bufp)[xlen+1] = '\0';
166 break;
167 }
168
169 case KTT_AVENRUN:
170 averunnable.fscale = FSCALE;
171 sprintf(*bufp, "%ld %ld %ld %ld\n",
172 averunnable.ldavg[0], averunnable.ldavg[1],
173 averunnable.ldavg[2], averunnable.fscale);
174 break;
175
176 default:
177 return (0);
178 }
179
180 len = strlen(*bufp);
181 if (len <= off)
182 return (0);
183 *bufp += off;
184 return (len - off);
185 }
186
187 int
188 kernfs_xwrite(kt, buf, len)
189 struct kern_target *kt;
190 char *buf;
191 int len;
192 {
193
194 switch (kt->kt_tag) {
195 case KTT_HOSTNAME:
196 if (buf[len-1] == '\n')
197 --len;
198 bcopy(buf, hostname, len);
199 hostname[len] = '\0';
200 hostnamelen = len;
201 return (0);
202
203 default:
204 return (EIO);
205 }
206 }
207
208
209 /*
210 * vp is the current namei directory
211 * ndp is the name to locate in that directory...
212 */
213 kernfs_lookup(ap)
214 struct vop_lookup_args /* {
215 struct vnode * a_dvp;
216 struct vnode ** a_vpp;
217 struct componentname * a_cnp;
218 } */ *ap;
219 {
220 struct componentname *cnp = ap->a_cnp;
221 struct vnode **vpp = ap->a_vpp;
222 struct vnode *dvp = ap->a_dvp;
223 char *pname = cnp->cn_nameptr;
224 struct kern_target *kt;
225 struct vnode *fvp;
226 int error, i;
227
228 #ifdef KERNFS_DIAGNOSTIC
229 printf("kernfs_lookup(%x)\n", ap);
230 printf("kernfs_lookup(dp = %x, vpp = %x, cnp = %x)\n", dvp, vpp, ap->a_cnp);
231 printf("kernfs_lookup(%s)\n", pname);
232 #endif
233
234 if (cnp->cn_namelen == 1 && *pname == '.') {
235 *vpp = dvp;
236 VREF(dvp);
237 /*VOP_LOCK(dvp);*/
238 return (0);
239 }
240
241 #if 0
242 if (cnp->cn_namelen == 4 && bcmp(pname, "root", 4) == 0) {
243 *vpp = rootdir;
244 VREF(rootdir);
245 VOP_LOCK(rootdir);
246 return (0);
247 }
248 #endif
249
250 *vpp = NULLVP;
251
252 for (error = ENOENT, kt = kern_targets, i = 0; i < nkern_targets;
253 kt++, i++) {
254 if (cnp->cn_namelen == kt->kt_namlen &&
255 bcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) {
256 error = 0;
257 break;
258 }
259 }
260
261 #ifdef KERNFS_DIAGNOSTIC
262 printf("kernfs_lookup: i = %d, error = %d\n", i, error);
263 #endif
264
265 if (error)
266 return (error);
267
268 if (kt->kt_tag == KTT_DEVICE) {
269 dev_t *dp = kt->kt_data;
270 loop:
271 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp))
272 return (ENOENT);
273 *vpp = fvp;
274 if (vget(fvp, 1))
275 goto loop;
276 return (0);
277 }
278
279 #ifdef KERNFS_DIAGNOSTIC
280 printf("kernfs_lookup: allocate new vnode\n");
281 #endif
282 if (error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p,
283 &fvp))
284 return (error);
285
286 MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP,
287 M_WAITOK);
288 VTOKERN(fvp)->kf_kt = kt;
289 fvp->v_type = kt->kt_vtype;
290 *vpp = fvp;
291
292 #ifdef KERNFS_DIAGNOSTIC
293 printf("kernfs_lookup: newvp = %x\n", fvp);
294 #endif
295 return (0);
296 }
297
298 kernfs_open(ap)
299 struct vop_open_args /* {
300 struct vnode *a_vp;
301 int a_mode;
302 struct ucred *a_cred;
303 struct proc *a_p;
304 struct file *a_fp;
305 } */ *ap;
306 {
307
308 /* Only need to check access permissions. */
309 return (0);
310 }
311
312 int
313 kernfs_access(ap)
314 struct vop_access_args /* {
315 struct vnode *a_vp;
316 int a_mode;
317 struct ucred *a_cred;
318 struct proc *a_p;
319 } */ *ap;
320 {
321 struct vnode *vp = ap->a_vp;
322 struct ucred *cred = ap->a_cred;
323 mode_t amode = ap->a_mode;
324 mode_t fmode =
325 (vp->v_flag & VROOT) ? DIR_MODE : VTOKERN(vp)->kf_kt->kt_mode;
326 mode_t mask = 0;
327 gid_t *gp;
328 int i;
329
330 /* Some files are simply not modifiable. */
331 if ((amode & VWRITE) && (fmode & (S_IWUSR|S_IWGRP|S_IWOTH)) == 0)
332 return (EPERM);
333
334 /* Root can do anything else. */
335 if (cred->cr_uid == 0)
336 return (0);
337
338 /* Check for group 0 (wheel) permissions. */
339 for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++)
340 if (*gp == 0) {
341 if (amode & VEXEC)
342 mask |= S_IXGRP;
343 if (amode & VREAD)
344 mask |= S_IRGRP;
345 if (amode & VWRITE)
346 mask |= S_IWGRP;
347 return ((fmode & mask) == mask ? 0 : EACCES);
348 }
349
350 /* Otherwise, check everyone else. */
351 if (amode & VEXEC)
352 mask |= S_IXOTH;
353 if (amode & VREAD)
354 mask |= S_IROTH;
355 if (amode & VWRITE)
356 mask |= S_IWOTH;
357 return ((fmode & mask) == mask ? 0 : EACCES);
358 }
359
360 kernfs_getattr(ap)
361 struct vop_getattr_args /* {
362 struct vnode *a_vp;
363 struct vattr *a_vap;
364 struct ucred *a_cred;
365 struct proc *a_p;
366 } */ *ap;
367 {
368 struct vnode *vp = ap->a_vp;
369 struct vattr *vap = ap->a_vap;
370 int error = 0;
371 char strbuf[KSTRING], *buf;
372
373 bzero((caddr_t) vap, sizeof(*vap));
374 vattr_null(vap);
375 vap->va_uid = 0;
376 vap->va_gid = 0;
377 vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
378 vap->va_size = 0;
379 vap->va_blocksize = DEV_BSIZE;
380 microtime(&vap->va_atime);
381 vap->va_mtime = vap->va_atime;
382 vap->va_ctime = vap->va_ctime;
383 vap->va_gen = 0;
384 vap->va_flags = 0;
385 vap->va_rdev = 0;
386 vap->va_bytes = 0;
387
388 if (vp->v_flag & VROOT) {
389 #ifdef KERNFS_DIAGNOSTIC
390 printf("kernfs_getattr: stat rootdir\n");
391 #endif
392 vap->va_type = VDIR;
393 vap->va_mode = DIR_MODE;
394 vap->va_nlink = 2;
395 vap->va_fileid = 2;
396 vap->va_size = DEV_BSIZE;
397 } else {
398 struct kern_target *kt = VTOKERN(vp)->kf_kt;
399 int nbytes, total;
400 #ifdef KERNFS_DIAGNOSTIC
401 printf("kernfs_getattr: stat target %s\n", kt->kt_name);
402 #endif
403 vap->va_type = kt->kt_vtype;
404 vap->va_mode = kt->kt_mode;
405 vap->va_nlink = 1;
406 vap->va_fileid = 1 + (kt - kern_targets) / sizeof(*kt);
407 total = 0;
408 while (buf = strbuf,
409 nbytes = kernfs_xread(kt, total, &buf, sizeof(strbuf)))
410 total += nbytes;
411 vap->va_size = total;
412 }
413
414 #ifdef KERNFS_DIAGNOSTIC
415 printf("kernfs_getattr: return error %d\n", error);
416 #endif
417 return (error);
418 }
419
420 kernfs_setattr(ap)
421 struct vop_setattr_args /* {
422 struct vnode *a_vp;
423 struct vattr *a_vap;
424 struct ucred *a_cred;
425 struct proc *a_p;
426 } */ *ap;
427 {
428
429 /*
430 * Silently ignore attribute changes.
431 * This allows for open with truncate to have no
432 * effect until some data is written. I want to
433 * do it this way because all writes are atomic.
434 */
435 return (0);
436 }
437
438 int
439 kernfs_read(ap)
440 struct vop_read_args /* {
441 struct vnode *a_vp;
442 struct uio *a_uio;
443 int a_ioflag;
444 struct ucred *a_cred;
445 } */ *ap;
446 {
447 struct vnode *vp = ap->a_vp;
448 struct uio *uio = ap->a_uio;
449 struct kern_target *kt;
450 char strbuf[KSTRING], *buf;
451 int off, len;
452 int error;
453
454 if (vp->v_type == VDIR)
455 return (EOPNOTSUPP);
456
457 kt = VTOKERN(vp)->kf_kt;
458
459 #ifdef KERNFS_DIAGNOSTIC
460 printf("kern_read %s\n", kt->kt_name);
461 #endif
462
463 off = uio->uio_offset;
464 #if 0
465 while (buf = strbuf,
466 #else
467 if (buf = strbuf,
468 #endif
469 len = kernfs_xread(kt, off, &buf, sizeof(strbuf))) {
470 if (error = uiomove(buf, len, uio))
471 return (error);
472 off += len;
473 }
474 return (0);
475 }
476
477 int
478 kernfs_write(ap)
479 struct vop_write_args /* {
480 struct vnode *a_vp;
481 struct uio *a_uio;
482 int a_ioflag;
483 struct ucred *a_cred;
484 } */ *ap;
485 {
486 struct vnode *vp = ap->a_vp;
487 struct uio *uio = ap->a_uio;
488 struct kern_target *kt;
489 int error, xlen;
490 char strbuf[KSTRING];
491
492 if (vp->v_type == VDIR)
493 return (EOPNOTSUPP);
494
495 kt = VTOKERN(vp)->kf_kt;
496
497 if (uio->uio_offset != 0)
498 return (EINVAL);
499
500 xlen = min(uio->uio_resid, KSTRING-1);
501 if (error = uiomove(strbuf, xlen, uio))
502 return (error);
503
504 if (uio->uio_resid != 0)
505 return (EIO);
506
507 strbuf[xlen] = '\0';
508 xlen = strlen(strbuf);
509 return (kernfs_xwrite(kt, strbuf, xlen));
510 }
511
512 kernfs_readdir(ap)
513 struct vop_readdir_args /* {
514 struct vnode *a_vp;
515 struct uio *a_uio;
516 struct ucred *a_cred;
517 int *a_eofflag;
518 u_long *a_cookies;
519 int a_ncookies;
520 } */ *ap;
521 {
522 struct uio *uio = ap->a_uio;
523 struct kern_target *kt;
524 struct dirent d;
525 int i;
526 int error;
527
528 if (ap->a_vp->v_type != VDIR)
529 return (ENOTDIR);
530
531 /*
532 * We don't allow exporting kernfs mounts, and currently local
533 * requests do not need cookies.
534 */
535 if (ap->a_ncookies != NULL)
536 panic("kernfs_readdir: not hungry");
537
538 i = uio->uio_offset / UIO_MX;
539 error = 0;
540 for (kt = &kern_targets[i];
541 uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) {
542 struct dirent *dp = &d;
543 #ifdef KERNFS_DIAGNOSTIC
544 printf("kernfs_readdir: i = %d\n", i);
545 #endif
546
547 if (kt->kt_tag == KTT_DEVICE) {
548 dev_t *dp = kt->kt_data;
549 struct vnode *fvp;
550
551 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp))
552 continue;
553 }
554
555 bzero((caddr_t)dp, UIO_MX);
556 dp->d_namlen = kt->kt_namlen;
557 bcopy(kt->kt_name, dp->d_name, kt->kt_namlen+1);
558
559 #ifdef KERNFS_DIAGNOSTIC
560 printf("kernfs_readdir: name = %s, len = %d\n",
561 dp->d_name, dp->d_namlen);
562 #endif
563 /*
564 * Fill in the remaining fields
565 */
566 dp->d_reclen = UIO_MX;
567 dp->d_fileno = i + 3;
568 dp->d_type = kt->kt_type;
569 /*
570 * And ship to userland
571 */
572 if (error = uiomove((caddr_t)dp, UIO_MX, uio))
573 break;
574 }
575
576 uio->uio_offset = i * UIO_MX;
577
578 return (error);
579 }
580
581 kernfs_inactive(ap)
582 struct vop_inactive_args /* {
583 struct vnode *a_vp;
584 } */ *ap;
585 {
586 struct vnode *vp = ap->a_vp;
587
588 #ifdef KERNFS_DIAGNOSTIC
589 printf("kernfs_inactive(%x)\n", vp);
590 #endif
591 /*
592 * Clear out the v_type field to avoid
593 * nasty things happening in vgone().
594 */
595 vp->v_type = VNON;
596 return (0);
597 }
598
599 kernfs_reclaim(ap)
600 struct vop_reclaim_args /* {
601 struct vnode *a_vp;
602 } */ *ap;
603 {
604 struct vnode *vp = ap->a_vp;
605
606 #ifdef KERNFS_DIAGNOSTIC
607 printf("kernfs_reclaim(%x)\n", vp);
608 #endif
609 if (vp->v_data) {
610 FREE(vp->v_data, M_TEMP);
611 vp->v_data = 0;
612 }
613 return (0);
614 }
615
616 /*
617 * Return POSIX pathconf information applicable to special devices.
618 */
619 kernfs_pathconf(ap)
620 struct vop_pathconf_args /* {
621 struct vnode *a_vp;
622 int a_name;
623 register_t *a_retval;
624 } */ *ap;
625 {
626
627 switch (ap->a_name) {
628 case _PC_LINK_MAX:
629 *ap->a_retval = LINK_MAX;
630 return (0);
631 case _PC_MAX_CANON:
632 *ap->a_retval = MAX_CANON;
633 return (0);
634 case _PC_MAX_INPUT:
635 *ap->a_retval = MAX_INPUT;
636 return (0);
637 case _PC_PIPE_BUF:
638 *ap->a_retval = PIPE_BUF;
639 return (0);
640 case _PC_CHOWN_RESTRICTED:
641 *ap->a_retval = 1;
642 return (0);
643 case _PC_VDISABLE:
644 *ap->a_retval = _POSIX_VDISABLE;
645 return (0);
646 default:
647 return (EINVAL);
648 }
649 /* NOTREACHED */
650 }
651
652 /*
653 * Print out the contents of a /dev/fd vnode.
654 */
655 /* ARGSUSED */
656 kernfs_print(ap)
657 struct vop_print_args /* {
658 struct vnode *a_vp;
659 } */ *ap;
660 {
661
662 printf("tag VT_KERNFS, kernfs vnode\n");
663 return (0);
664 }
665
666 /*void*/
667 kernfs_vfree(ap)
668 struct vop_vfree_args /* {
669 struct vnode *a_pvp;
670 ino_t a_ino;
671 int a_mode;
672 } */ *ap;
673 {
674
675 return (0);
676 }
677
678 /*
679 * /dev/fd vnode unsupported operation
680 */
681 kernfs_enotsupp()
682 {
683
684 return (EOPNOTSUPP);
685 }
686
687 /*
688 * /dev/fd "should never get here" operation
689 */
690 kernfs_badop()
691 {
692
693 panic("kernfs: bad op");
694 /* NOTREACHED */
695 }
696
697 /*
698 * kernfs vnode null operation
699 */
700 kernfs_nullop()
701 {
702
703 return (0);
704 }
705
706 #define kernfs_create ((int (*) __P((struct vop_create_args *)))kernfs_enotsupp)
707 #define kernfs_mknod ((int (*) __P((struct vop_mknod_args *)))kernfs_enotsupp)
708 #define kernfs_close ((int (*) __P((struct vop_close_args *)))nullop)
709 #define kernfs_ioctl ((int (*) __P((struct vop_ioctl_args *)))kernfs_enotsupp)
710 #define kernfs_select ((int (*) __P((struct vop_select_args *)))kernfs_enotsupp)
711 #define kernfs_mmap ((int (*) __P((struct vop_mmap_args *)))kernfs_enotsupp)
712 #define kernfs_fsync ((int (*) __P((struct vop_fsync_args *)))nullop)
713 #define kernfs_seek ((int (*) __P((struct vop_seek_args *)))nullop)
714 #define kernfs_remove ((int (*) __P((struct vop_remove_args *)))kernfs_enotsupp)
715 #define kernfs_link ((int (*) __P((struct vop_link_args *)))kernfs_enotsupp)
716 #define kernfs_rename ((int (*) __P((struct vop_rename_args *)))kernfs_enotsupp)
717 #define kernfs_mkdir ((int (*) __P((struct vop_mkdir_args *)))kernfs_enotsupp)
718 #define kernfs_rmdir ((int (*) __P((struct vop_rmdir_args *)))kernfs_enotsupp)
719 #define kernfs_symlink ((int (*) __P((struct vop_symlink_args *)))kernfs_enotsupp)
720 #define kernfs_readlink \
721 ((int (*) __P((struct vop_readlink_args *)))kernfs_enotsupp)
722 #define kernfs_abortop ((int (*) __P((struct vop_abortop_args *)))nullop)
723 #define kernfs_lock ((int (*) __P((struct vop_lock_args *)))nullop)
724 #define kernfs_unlock ((int (*) __P((struct vop_unlock_args *)))nullop)
725 #define kernfs_bmap ((int (*) __P((struct vop_bmap_args *)))kernfs_badop)
726 #define kernfs_strategy ((int (*) __P((struct vop_strategy_args *)))kernfs_badop)
727 #define kernfs_islocked ((int (*) __P((struct vop_islocked_args *)))nullop)
728 #define kernfs_advlock ((int (*) __P((struct vop_advlock_args *)))kernfs_enotsupp)
729 #define kernfs_blkatoff \
730 ((int (*) __P((struct vop_blkatoff_args *)))kernfs_enotsupp)
731 #define kernfs_valloc ((int(*) __P(( \
732 struct vnode *pvp, \
733 int mode, \
734 struct ucred *cred, \
735 struct vnode **vpp))) kernfs_enotsupp)
736 #define kernfs_truncate \
737 ((int (*) __P((struct vop_truncate_args *)))kernfs_enotsupp)
738 #define kernfs_update ((int (*) __P((struct vop_update_args *)))kernfs_enotsupp)
739 #define kernfs_bwrite ((int (*) __P((struct vop_bwrite_args *)))kernfs_enotsupp)
740
741 int (**kernfs_vnodeop_p)();
742 struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = {
743 { &vop_default_desc, vn_default_error },
744 { &vop_lookup_desc, kernfs_lookup }, /* lookup */
745 { &vop_create_desc, kernfs_create }, /* create */
746 { &vop_mknod_desc, kernfs_mknod }, /* mknod */
747 { &vop_open_desc, kernfs_open }, /* open */
748 { &vop_close_desc, kernfs_close }, /* close */
749 { &vop_access_desc, kernfs_access }, /* access */
750 { &vop_getattr_desc, kernfs_getattr }, /* getattr */
751 { &vop_setattr_desc, kernfs_setattr }, /* setattr */
752 { &vop_read_desc, kernfs_read }, /* read */
753 { &vop_write_desc, kernfs_write }, /* write */
754 { &vop_ioctl_desc, kernfs_ioctl }, /* ioctl */
755 { &vop_select_desc, kernfs_select }, /* select */
756 { &vop_mmap_desc, kernfs_mmap }, /* mmap */
757 { &vop_fsync_desc, kernfs_fsync }, /* fsync */
758 { &vop_seek_desc, kernfs_seek }, /* seek */
759 { &vop_remove_desc, kernfs_remove }, /* remove */
760 { &vop_link_desc, kernfs_link }, /* link */
761 { &vop_rename_desc, kernfs_rename }, /* rename */
762 { &vop_mkdir_desc, kernfs_mkdir }, /* mkdir */
763 { &vop_rmdir_desc, kernfs_rmdir }, /* rmdir */
764 { &vop_symlink_desc, kernfs_symlink }, /* symlink */
765 { &vop_readdir_desc, kernfs_readdir }, /* readdir */
766 { &vop_readlink_desc, kernfs_readlink },/* readlink */
767 { &vop_abortop_desc, kernfs_abortop }, /* abortop */
768 { &vop_inactive_desc, kernfs_inactive },/* inactive */
769 { &vop_reclaim_desc, kernfs_reclaim }, /* reclaim */
770 { &vop_lock_desc, kernfs_lock }, /* lock */
771 { &vop_unlock_desc, kernfs_unlock }, /* unlock */
772 { &vop_bmap_desc, kernfs_bmap }, /* bmap */
773 { &vop_strategy_desc, kernfs_strategy },/* strategy */
774 { &vop_print_desc, kernfs_print }, /* print */
775 { &vop_islocked_desc, kernfs_islocked },/* islocked */
776 { &vop_pathconf_desc, kernfs_pathconf },/* pathconf */
777 { &vop_advlock_desc, kernfs_advlock }, /* advlock */
778 { &vop_blkatoff_desc, kernfs_blkatoff },/* blkatoff */
779 { &vop_valloc_desc, kernfs_valloc }, /* valloc */
780 { &vop_vfree_desc, kernfs_vfree }, /* vfree */
781 { &vop_truncate_desc, kernfs_truncate },/* truncate */
782 { &vop_update_desc, kernfs_update }, /* update */
783 { &vop_bwrite_desc, kernfs_bwrite }, /* bwrite */
784 { (struct vnodeop_desc*)NULL, (int(*)())NULL }
785 };
786 struct vnodeopv_desc kernfs_vnodeop_opv_desc =
787 { &kernfs_vnodeop_p, kernfs_vnodeop_entries };
788