version 1.119, 2006/04/04 14:21:55 |
version 1.135, 2009/01/11 02:45:53 |
Line 151 int nkern_dirs = 2; |
|
Line 151 int nkern_dirs = 2; |
|
#endif |
#endif |
|
|
int kernfs_try_fileop(kfstype, kfsfileop, void *, int); |
int kernfs_try_fileop(kfstype, kfsfileop, void *, int); |
int kernfs_try_xread(kfstype, const struct kernfs_node *, char *, |
int kernfs_try_xread(kfstype, const struct kernfs_node *, char **, |
size_t, int); |
size_t, int); |
int kernfs_try_xwrite(kfstype, const struct kernfs_node *, char *, |
int kernfs_try_xwrite(kfstype, const struct kernfs_node *, char *, |
size_t, int); |
size_t, int); |
Line 166 const struct kernfs_fileop kernfs_defaul |
|
Line 166 const struct kernfs_fileop kernfs_defaul |
|
{ .kf_fileop = KERNFS_XWRITE }, |
{ .kf_fileop = KERNFS_XWRITE }, |
{ .kf_fileop = KERNFS_FILEOP_OPEN }, |
{ .kf_fileop = KERNFS_FILEOP_OPEN }, |
{ .kf_fileop = KERNFS_FILEOP_GETATTR, |
{ .kf_fileop = KERNFS_FILEOP_GETATTR, |
.kf_genop = {kernfs_default_fileop_getattr} }, |
.kf_vop = kernfs_default_fileop_getattr }, |
{ .kf_fileop = KERNFS_FILEOP_IOCTL }, |
{ .kf_fileop = KERNFS_FILEOP_IOCTL }, |
{ .kf_fileop = KERNFS_FILEOP_CLOSE }, |
{ .kf_fileop = KERNFS_FILEOP_CLOSE }, |
{ .kf_fileop = KERNFS_FILEOP_READ, .kf_genop = {kernfs_default_xread} }, |
{ .kf_fileop = KERNFS_FILEOP_READ, |
{ .kf_fileop = KERNFS_FILEOP_WRITE, .kf_genop = {kernfs_default_xwrite} }, |
.kf_vop = kernfs_default_xread }, |
|
{ .kf_fileop = KERNFS_FILEOP_WRITE, |
|
.kf_vop = kernfs_default_xwrite }, |
}; |
}; |
|
|
int kernfs_lookup(void *); |
int kernfs_lookup(void *); |
Line 301 kernfs_alloctype(int nkf, const struct k |
|
Line 303 kernfs_alloctype(int nkf, const struct k |
|
skf.kf_type = nextfreetype; |
skf.kf_type = nextfreetype; |
skf.kf_fileop = kf[i].kf_fileop; |
skf.kf_fileop = kf[i].kf_fileop; |
if ((fkf = SPLAY_FIND(kfsfileoptree, &kfsfileoptree, &skf))) |
if ((fkf = SPLAY_FIND(kfsfileoptree, &kfsfileoptree, &skf))) |
fkf->kf_genop = kf[i].kf_genop; |
fkf->kf_vop = kf[i].kf_vop; |
} |
} |
|
|
return nextfreetype++; |
return nextfreetype++; |
Line 321 kernfs_try_fileop(kfstype type, kfsfileo |
|
Line 323 kernfs_try_fileop(kfstype type, kfsfileo |
|
} |
} |
|
|
int |
int |
|
kernfs_try_xread(kfstype type, const struct kernfs_node *kfs, char **bfp, |
|
size_t len, int error) |
|
{ |
|
struct kernfs_fileop *kf, skf; |
|
|
|
skf.kf_type = type; |
|
skf.kf_fileop = KERNFS_XREAD; |
|
if ((kf = SPLAY_FIND(kfsfileoptree, &kfsfileoptree, &skf))) |
|
if (kf->kf_xread) |
|
return kf->kf_xread(kfs, bfp, len); |
|
return error; |
|
} |
|
|
|
int |
kernfs_try_xwrite(kfstype type, const struct kernfs_node *kfs, char *bf, |
kernfs_try_xwrite(kfstype type, const struct kernfs_node *kfs, char *bf, |
size_t len, int error) |
size_t len, int error) |
{ |
{ |
Line 375 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
Line 391 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
#ifdef IPSEC |
#ifdef IPSEC |
struct mbuf *m; |
struct mbuf *m; |
#endif |
#endif |
|
int err; |
|
|
kt = kfs->kfs_kt; |
kt = kfs->kfs_kt; |
|
|
Line 383 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
Line 400 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
struct timeval tv; |
struct timeval tv; |
|
|
microtime(&tv); |
microtime(&tv); |
snprintf(*bufp, len, "%ld %ld\n", tv.tv_sec, tv.tv_usec); |
snprintf(*bufp, len, "%lld %ld\n", (long long)tv.tv_sec, |
|
(long)tv.tv_usec); |
break; |
break; |
} |
} |
|
|
Line 437 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
Line 455 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
|
|
case KFShostname: { |
case KFShostname: { |
char *cp = hostname; |
char *cp = hostname; |
int xlen = hostnamelen; |
size_t xlen = hostnamelen; |
|
|
if (xlen >= (len - 2)) |
if (xlen >= (len - 2)) |
return (EINVAL); |
return (EINVAL); |
Line 458 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
Line 476 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
|
|
#ifdef IPSEC |
#ifdef IPSEC |
case KFSipsecsa: |
case KFSipsecsa: |
|
if (key_setdumpsa_spi == NULL) |
|
return 0; |
/* |
/* |
* Note that SA configuration could be changed during the |
* Note that SA configuration could be changed during the |
* read operation, resulting in garbled output. |
* read operation, resulting in garbled output. |
Line 482 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
Line 502 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
* Note that SP configuration could be changed during the |
* Note that SP configuration could be changed during the |
* read operation, resulting in garbled output. |
* read operation, resulting in garbled output. |
*/ |
*/ |
|
if (key_getspbyid == NULL) |
|
return 0; |
if (!kfs->kfs_v) { |
if (!kfs->kfs_v) { |
struct secpolicy *sp; |
struct secpolicy *sp; |
|
|
Line 509 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
Line 531 kernfs_xread(kfs, off, bufp, len, wrlen) |
|
#endif |
#endif |
|
|
default: |
default: |
*wrlen = 0; |
err = kernfs_try_xread(kfs->kfs_type, kfs, bufp, len, |
return (0); |
EOPNOTSUPP); |
|
if (err) |
|
return err; |
} |
} |
|
|
len = strlen(*bufp); |
len = strlen(*bufp); |
Line 566 kernfs_lookup(v) |
|
Line 590 kernfs_lookup(v) |
|
const struct kern_target *kt; |
const struct kern_target *kt; |
const struct dyn_kern_target *dkt; |
const struct dyn_kern_target *dkt; |
const struct kernfs_subdir *ks; |
const struct kernfs_subdir *ks; |
int error, i, wantpunlock; |
int error, i; |
#ifdef IPSEC |
#ifdef IPSEC |
char *ep; |
char *ep; |
u_int32_t id; |
u_int32_t id; |
#endif |
#endif |
|
|
*vpp = NULLVP; |
*vpp = NULLVP; |
cnp->cn_flags &= ~PDIRUNLOCK; |
|
|
|
if (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME) |
if (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME) |
return (EROFS); |
return (EROFS); |
Line 584 kernfs_lookup(v) |
|
Line 607 kernfs_lookup(v) |
|
return (0); |
return (0); |
} |
} |
|
|
wantpunlock = (~cnp->cn_flags & (LOCKPARENT | ISLASTCN)); |
|
kfs = VTOKERN(dvp); |
kfs = VTOKERN(dvp); |
switch (kfs->kfs_type) { |
switch (kfs->kfs_type) { |
case KFSkern: |
case KFSkern: |
Line 611 kernfs_lookup(v) |
|
Line 633 kernfs_lookup(v) |
|
|
|
found: |
found: |
error = kernfs_allocvp(dvp->v_mount, vpp, kt->kt_tag, kt, 0); |
error = kernfs_allocvp(dvp->v_mount, vpp, kt->kt_tag, kt, 0); |
if ((error == 0) && wantpunlock) { |
|
VOP_UNLOCK(dvp, 0); |
|
cnp->cn_flags |= PDIRUNLOCK; |
|
} |
|
return (error); |
return (error); |
|
|
case KFSsubdir: |
case KFSsubdir: |
Line 653 kernfs_lookup(v) |
|
Line 671 kernfs_lookup(v) |
|
break; |
break; |
|
|
error = kernfs_allocvp(dvp->v_mount, vpp, KFSipsecsa, &ipsecsa_kt, id); |
error = kernfs_allocvp(dvp->v_mount, vpp, KFSipsecsa, &ipsecsa_kt, id); |
if ((error == 0) && wantpunlock) { |
|
VOP_UNLOCK(dvp, 0); |
|
cnp->cn_flags |= PDIRUNLOCK; |
|
} |
|
return (error); |
return (error); |
|
|
case KFSipsecspdir: |
case KFSipsecspdir: |
Line 678 kernfs_lookup(v) |
|
Line 692 kernfs_lookup(v) |
|
break; |
break; |
|
|
error = kernfs_allocvp(dvp->v_mount, vpp, KFSipsecsp, &ipsecsp_kt, id); |
error = kernfs_allocvp(dvp->v_mount, vpp, KFSipsecsp, &ipsecsp_kt, id); |
if ((error == 0) && wantpunlock) { |
|
VOP_UNLOCK(dvp, 0); |
|
cnp->cn_flags |= PDIRUNLOCK; |
|
} |
|
return (error); |
return (error); |
#endif |
#endif |
|
|
|
|
struct vop_open_args /* { |
struct vop_open_args /* { |
struct vnode *a_vp; |
struct vnode *a_vp; |
int a_mode; |
int a_mode; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
struct lwp *a_l; |
|
} */ *ap = v; |
} */ *ap = v; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
#ifdef IPSEC |
#ifdef IPSEC |
|
|
switch (kfs->kfs_type) { |
switch (kfs->kfs_type) { |
#ifdef IPSEC |
#ifdef IPSEC |
case KFSipsecsa: |
case KFSipsecsa: |
|
if (key_setdumpsa_spi == NULL) |
|
return 0; |
m = key_setdumpsa_spi(htonl(kfs->kfs_value)); |
m = key_setdumpsa_spi(htonl(kfs->kfs_value)); |
if (m) { |
if (m) { |
m_freem(m); |
m_freem(m); |
|
|
return (ENOENT); |
return (ENOENT); |
|
|
case KFSipsecsp: |
case KFSipsecsp: |
|
if (key_getspbyid == NULL) |
|
return 0; |
sp = key_getspbyid(kfs->kfs_value); |
sp = key_getspbyid(kfs->kfs_value); |
if (sp) { |
if (sp) { |
kfs->kfs_v = sp; |
kfs->kfs_v = sp; |
|
|
struct vop_close_args /* { |
struct vop_close_args /* { |
struct vnode *a_vp; |
struct vnode *a_vp; |
int a_fflag; |
int a_fflag; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
struct lwp *a_l; |
|
} */ *ap = v; |
} */ *ap = v; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
|
|
switch (kfs->kfs_type) { |
switch (kfs->kfs_type) { |
#ifdef IPSEC |
#ifdef IPSEC |
case KFSipsecsp: |
case KFSipsecsp: |
|
if (key_freesp == NULL) |
|
return 0; |
key_freesp((struct secpolicy *)kfs->kfs_v); |
key_freesp((struct secpolicy *)kfs->kfs_v); |
break; |
break; |
#endif |
#endif |
Line 767 kernfs_access(v) |
|
Line 781 kernfs_access(v) |
|
struct vop_access_args /* { |
struct vop_access_args /* { |
struct vnode *a_vp; |
struct vnode *a_vp; |
int a_mode; |
int a_mode; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
struct lwp *a_l; |
|
} */ *ap = v; |
} */ *ap = v; |
struct vattr va; |
struct vattr va; |
int error; |
int error; |
|
|
if ((error = VOP_GETATTR(ap->a_vp, &va, ap->a_cred, ap->a_l)) != 0) |
if ((error = VOP_GETATTR(ap->a_vp, &va, ap->a_cred)) != 0) |
return (error); |
return (error); |
|
|
return (vaccess(va.va_type, va.va_mode, va.va_uid, va.va_gid, |
return (vaccess(va.va_type, va.va_mode, va.va_uid, va.va_gid, |
Line 787 kernfs_default_fileop_getattr(v) |
|
Line 800 kernfs_default_fileop_getattr(v) |
|
struct vop_getattr_args /* { |
struct vop_getattr_args /* { |
struct vnode *a_vp; |
struct vnode *a_vp; |
struct vattr *a_vap; |
struct vattr *a_vap; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
struct lwp *a_l; |
|
} */ *ap = v; |
} */ *ap = v; |
struct vattr *vap = ap->a_vap; |
struct vattr *vap = ap->a_vap; |
|
|
Line 805 kernfs_getattr(v) |
|
Line 817 kernfs_getattr(v) |
|
struct vop_getattr_args /* { |
struct vop_getattr_args /* { |
struct vnode *a_vp; |
struct vnode *a_vp; |
struct vattr *a_vap; |
struct vattr *a_vap; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
struct lwp *a_l; |
|
} */ *ap = v; |
} */ *ap = v; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_subdir *ks; |
struct kernfs_subdir *ks; |
Line 824 kernfs_getattr(v) |
|
Line 835 kernfs_getattr(v) |
|
vap->va_flags = 0; |
vap->va_flags = 0; |
vap->va_size = 0; |
vap->va_size = 0; |
vap->va_blocksize = DEV_BSIZE; |
vap->va_blocksize = DEV_BSIZE; |
/* |
/* Make all times be current TOD, except for the "boottime" node. */ |
* Make all times be current TOD, except for the "boottime" node. |
if (kfs->kfs_kt->kt_namlen == 8 && |
* Avoid microtime(9), it's slow. |
|
* We don't guard the read from time(9) with splclock(9) since we |
|
* don't actually need to be THAT sure the access is atomic. |
|
*/ |
|
if (kfs->kfs_kt && kfs->kfs_kt->kt_namlen == 8 && |
|
!memcmp(kfs->kfs_kt->kt_name, "boottime", 8)) { |
!memcmp(kfs->kfs_kt->kt_name, "boottime", 8)) { |
TIMEVAL_TO_TIMESPEC(&boottime, &vap->va_ctime); |
vap->va_ctime = boottime; |
} else { |
} else { |
TIMEVAL_TO_TIMESPEC(&time, &vap->va_ctime); |
getnanotime(&vap->va_ctime); |
} |
} |
vap->va_atime = vap->va_mtime = vap->va_ctime; |
vap->va_atime = vap->va_mtime = vap->va_ctime; |
vap->va_gen = 0; |
vap->va_gen = 0; |
Line 901 kernfs_getattr(v) |
|
Line 907 kernfs_getattr(v) |
|
|
|
/*ARGSUSED*/ |
/*ARGSUSED*/ |
int |
int |
kernfs_setattr(v) |
kernfs_setattr(void *v) |
void *v; |
|
{ |
{ |
|
|
/* |
/* |
Line 922 kernfs_default_xread(v) |
|
Line 927 kernfs_default_xread(v) |
|
struct vnode *a_vp; |
struct vnode *a_vp; |
struct uio *a_uio; |
struct uio *a_uio; |
int a_ioflag; |
int a_ioflag; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
} */ *ap = v; |
} */ *ap = v; |
struct uio *uio = ap->a_uio; |
struct uio *uio = ap->a_uio; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
|
|
} */ *ap = v; |
} */ *ap = v; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
|
|
return kernfs_try_fileop(kfs->kfs_type, KERNFS_FILEOP_READ, v, 0); |
if (kfs->kfs_type < KFSlasttype) { |
|
/* use default function */ |
|
return kernfs_default_xread(v); |
|
} |
|
return kernfs_try_fileop(kfs->kfs_type, KERNFS_FILEOP_READ, v, |
|
EOPNOTSUPP); |
} |
} |
|
|
static int |
static int |
Line 968 kernfs_default_xwrite(v) |
|
Line 978 kernfs_default_xwrite(v) |
|
struct vnode *a_vp; |
struct vnode *a_vp; |
struct uio *a_uio; |
struct uio *a_uio; |
int a_ioflag; |
int a_ioflag; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
} */ *ap = v; |
} */ *ap = v; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct uio *uio = ap->a_uio; |
struct uio *uio = ap->a_uio; |
int error, xlen; |
int error; |
|
size_t xlen; |
char strbuf[KSTRING]; |
char strbuf[KSTRING]; |
|
|
if (uio->uio_offset != 0) |
if (uio->uio_offset != 0) |
|
Line 1009 kernfs_write(v) |
|
struct vnode *a_vp; |
struct vnode *a_vp; |
struct uio *a_uio; |
struct uio *a_uio; |
int a_ioflag; |
int a_ioflag; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
} */ *ap = v; |
} */ *ap = v; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
|
|
return kernfs_try_fileop(kfs->kfs_type, KERNFS_FILEOP_WRITE, v, 0); |
if (kfs->kfs_type < KFSlasttype) { |
|
/* use default function */ |
|
return kernfs_default_xwrite(v); |
|
} |
|
return kernfs_try_fileop(kfs->kfs_type, KERNFS_FILEOP_WRITE, v, |
|
EOPNOTSUPP); |
} |
} |
|
|
int |
int |
Line 1015 kernfs_ioctl(v) |
|
Line 1031 kernfs_ioctl(v) |
|
u_long a_command; |
u_long a_command; |
void *a_data; |
void *a_data; |
int a_fflag; |
int a_fflag; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
struct lwp *a_l; |
|
} */ *ap = v; |
} */ *ap = v; |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
|
|
Line 1038 kernfs_setdirentfileno_kt(struct dirent |
|
Line 1053 kernfs_setdirentfileno_kt(struct dirent |
|
if (kt->kt_tag == KFSdevice) { |
if (kt->kt_tag == KFSdevice) { |
struct vattr va; |
struct vattr va; |
|
|
error = VOP_GETATTR(vp, &va, ap->a_cred, curlwp); |
error = VOP_GETATTR(vp, &va, ap->a_cred); |
if (error != 0) { |
if (error != 0) { |
return error; |
return error; |
} |
} |
Line 1085 kernfs_readdir(v) |
|
Line 1100 kernfs_readdir(v) |
|
struct vop_readdir_args /* { |
struct vop_readdir_args /* { |
struct vnode *a_vp; |
struct vnode *a_vp; |
struct uio *a_uio; |
struct uio *a_uio; |
struct ucred *a_cred; |
kauth_cred_t a_cred; |
int *a_eofflag; |
int *a_eofflag; |
off_t **a_cookies; |
off_t **a_cookies; |
int a_*ncookies; |
int a_*ncookies; |
Line 1250 kernfs_readdir(v) |
|
Line 1265 kernfs_readdir(v) |
|
case KFSipsecsadir: |
case KFSipsecsadir: |
/* count SA in the system */ |
/* count SA in the system */ |
n = 0; |
n = 0; |
|
if (&satailq == NULL) |
|
return 0; |
TAILQ_FOREACH(sav, &satailq, tailq) { |
TAILQ_FOREACH(sav, &satailq, tailq) { |
for (sav2 = TAILQ_FIRST(&satailq); |
for (sav2 = TAILQ_FIRST(&satailq); |
sav2 != sav; |
sav2 != sav; |
Line 1324 kernfs_readdir(v) |
|
Line 1341 kernfs_readdir(v) |
|
|
|
case KFSipsecspdir: |
case KFSipsecspdir: |
/* count SP in the system */ |
/* count SP in the system */ |
|
if (&sptailq == NULL) |
|
return 0; |
|
|
n = 0; |
n = 0; |
TAILQ_FOREACH(sp, &sptailq, tailq) |
TAILQ_FOREACH(sp, &sptailq, tailq) |
n++; |
n++; |
Line 1403 kernfs_inactive(v) |
|
Line 1423 kernfs_inactive(v) |
|
{ |
{ |
struct vop_inactive_args /* { |
struct vop_inactive_args /* { |
struct vnode *a_vp; |
struct vnode *a_vp; |
struct lwp *a_l; |
bool *a_recycle; |
} */ *ap = v; |
} */ *ap = v; |
struct vnode *vp = ap->a_vp; |
struct vnode *vp = ap->a_vp; |
const struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
const struct kernfs_node *kfs = VTOKERN(ap->a_vp); |
Line 1412 kernfs_inactive(v) |
|
Line 1432 kernfs_inactive(v) |
|
struct secpolicy *sp; |
struct secpolicy *sp; |
#endif |
#endif |
|
|
VOP_UNLOCK(vp, 0); |
*ap->a_recycle = false; |
switch (kfs->kfs_type) { |
switch (kfs->kfs_type) { |
#ifdef IPSEC |
#ifdef IPSEC |
case KFSipsecsa: |
case KFSipsecsa: |
|
if (key_setdumpsa_spi == NULL) |
|
return 0; |
m = key_setdumpsa_spi(htonl(kfs->kfs_value)); |
m = key_setdumpsa_spi(htonl(kfs->kfs_value)); |
if (m) |
if (m) |
m_freem(m); |
m_freem(m); |
else |
else |
vgone(vp); |
*ap->a_recycle = true; |
break; |
break; |
case KFSipsecsp: |
case KFSipsecsp: |
|
if (key_getspbyid == NULL) |
|
return 0; |
sp = key_getspbyid(kfs->kfs_value); |
sp = key_getspbyid(kfs->kfs_value); |
if (sp) |
if (sp) |
key_freesp(sp); |
key_freesp(sp); |
else { |
else { |
/* should never happen as we hold a refcnt */ |
*ap->a_recycle = true; |
vgone(vp); |
|
} |
} |
break; |
break; |
#endif |
#endif |
default: |
default: |
break; |
break; |
} |
} |
|
VOP_UNLOCK(vp, 0); |
return (0); |
return (0); |
} |
} |
|
|
Line 1495 kernfs_pathconf(v) |
|
Line 1519 kernfs_pathconf(v) |
|
*/ |
*/ |
/* ARGSUSED */ |
/* ARGSUSED */ |
int |
int |
kernfs_print(v) |
kernfs_print(void *v) |
void *v; |
|
{ |
{ |
|
|
printf("tag VT_KERNFS, kernfs vnode\n"); |
printf("tag VT_KERNFS, kernfs vnode\n"); |