Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. =================================================================== RCS file: /ftp/cvs/cvsroot/src/sys/miscfs/kernfs/kernfs_vnops.c,v rcsdiff: /ftp/cvs/cvsroot/src/sys/miscfs/kernfs/kernfs_vnops.c,v: warning: Unknown phrases like `commitid ...;' are present. retrieving revision 1.18 retrieving revision 1.73 diff -u -p -r1.18 -r1.73 --- src/sys/miscfs/kernfs/kernfs_vnops.c 1994/02/09 06:32:17 1.18 +++ src/sys/miscfs/kernfs/kernfs_vnops.c 2001/01/27 12:28:35 1.73 @@ -1,7 +1,8 @@ +/* $NetBSD: kernfs_vnops.c,v 1.73 2001/01/27 12:28:35 jdolecek Exp $ */ + /* - * Copyright (c) 1992 The Regents of the University of California - * Copyright (c) 1990, 1992 Jan-Simon Pendry - * All rights reserved. + * Copyright (c) 1992, 1993 + * The Regents of the University of California. All rights reserved. * * This code is derived from software donated to Berkeley by * Jan-Simon Pendry. @@ -34,111 +35,229 @@ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * - * From: - * Id: kernfs_vnops.c,v 4.1 1994/01/02 14:41:30 jsp Exp - * - * $Id: kernfs_vnops.c,v 1.18 1994/02/09 06:32:17 cgd Exp $ + * @(#)kernfs_vnops.c 8.15 (Berkeley) 5/21/95 */ /* - * Kernel parameter filesystem + * Kernel parameter filesystem (/kern) */ #include #include #include +#include #include #include #include -#include #include +#include +#include #include #include #include #include +#include +#include + +#include #include -#include /* For readdir() XXX */ +#include #define KSTRING 256 /* Largest I/O available via this filesystem */ #define UIO_MX 32 -struct kern_target { - char *kt_name; - void *kt_data; -#define KTT_NULL 1 -#define KTT_TIME 5 -#define KTT_INT 17 -#define KTT_STRING 31 -#define KTT_HOSTNAME 47 -#define KTT_AVENRUN 53 - int kt_tag; -#define KTM_RO 0 -#define KTM_RO_MODE \ - ((VREAD) | (VREAD >> 3) | (VREAD >> 6)) -#define KTM_RW 43 -#define KTM_RW_MODE \ - ((VWRITE) | KTM_RO_MODE) -#define KTM_DIR_MODE \ - ((VREAD|VEXEC) | ((VREAD|VEXEC) >> 3) | ((VREAD|VEXEC) >> 6)) - int kt_rw; - enum vtype kt_vtype; -} kern_targets[] = { +#define READ_MODE (S_IRUSR|S_IRGRP|S_IROTH) +#define WRITE_MODE (S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH) +#define DIR_MODE (S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH) + +struct kern_target kern_targets[] = { /* NOTE: The name must be less than UIO_MX-16 chars in length */ - /* name data tag ro/rw */ - { ".", 0, KTT_NULL, KTM_RO, VDIR }, - { "copyright", copyright, KTT_STRING, KTM_RO, VREG }, - { "hostname", 0, KTT_HOSTNAME, KTM_RW, VREG }, - { "hz", &hz, KTT_INT, KTM_RO, VREG }, - { "loadavg", 0, KTT_AVENRUN, KTM_RO, VREG }, - { "physmem", &physmem, KTT_INT, KTM_RO, VREG }, +#define N(s) sizeof(s)-1, s + /* name data tag type ro/rw */ + { DT_DIR, N("."), 0, KTT_NULL, VDIR, DIR_MODE }, + { DT_DIR, N(".."), 0, KTT_NULL, VDIR, DIR_MODE }, + { DT_REG, N("boottime"), &boottime.tv_sec, KTT_INT, VREG, READ_MODE }, + /* XXX cast away const */ + { DT_REG, N("copyright"), (void *)copyright, + KTT_STRING, VREG, READ_MODE }, + { DT_REG, N("hostname"), 0, KTT_HOSTNAME, VREG, WRITE_MODE }, + { DT_REG, N("hz"), &hz, KTT_INT, VREG, READ_MODE }, + { DT_REG, N("loadavg"), 0, KTT_AVENRUN, VREG, READ_MODE }, + { DT_REG, N("msgbuf"), 0, KTT_MSGBUF, VREG, READ_MODE }, + { DT_REG, N("pagesize"), &uvmexp.pagesize, KTT_INT, VREG, READ_MODE }, + { DT_REG, N("physmem"), &physmem, KTT_INT, VREG, READ_MODE }, #if 0 - { "root", 0, KTT_NULL, KTM_RO, VDIR }, + { DT_DIR, N("root"), 0, KTT_NULL, VDIR, DIR_MODE }, #endif - { "rootdev", 0, KTT_NULL, KTM_RO, VBLK }, -#ifdef notdef - { "rrootdev", 0, KTT_NULL, KTM_RO, VCHR }, -#endif - { "time", 0, KTT_TIME, KTM_RO, VREG }, - { "version", version, KTT_STRING, KTM_RO, VREG }, + { DT_BLK, N("rootdev"), &rootdev, KTT_DEVICE, VBLK, READ_MODE }, + { DT_CHR, N("rrootdev"), &rrootdev, KTT_DEVICE, VCHR, READ_MODE }, + { DT_REG, N("time"), 0, KTT_TIME, VREG, READ_MODE }, + /* XXX cast away const */ + { DT_REG, N("version"), (void *)version, + KTT_STRING, VREG, READ_MODE }, +#undef N }; - static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]); -static int -kernfs_xread(kt, buf, len, lenp) +int kernfs_lookup __P((void *)); +#define kernfs_create genfs_eopnotsupp_rele +#define kernfs_mknod genfs_eopnotsupp_rele +#define kernfs_open genfs_nullop +#define kernfs_close genfs_nullop +int kernfs_access __P((void *)); +int kernfs_getattr __P((void *)); +int kernfs_setattr __P((void *)); +int kernfs_read __P((void *)); +int kernfs_write __P((void *)); +#define kernfs_fcntl genfs_fcntl +#define kernfs_ioctl genfs_enoioctl +#define kernfs_poll genfs_poll +#define kernfs_revoke genfs_revoke +#define kernfs_mmap genfs_eopnotsupp +#define kernfs_fsync genfs_nullop +#define kernfs_seek genfs_nullop +#define kernfs_remove genfs_eopnotsupp_rele +int kernfs_link __P((void *)); +#define kernfs_rename genfs_eopnotsupp_rele +#define kernfs_mkdir genfs_eopnotsupp_rele +#define kernfs_rmdir genfs_eopnotsupp_rele +int kernfs_symlink __P((void *)); +int kernfs_readdir __P((void *)); +#define kernfs_readlink genfs_eopnotsupp +#define kernfs_abortop genfs_abortop +int kernfs_inactive __P((void *)); +int kernfs_reclaim __P((void *)); +#define kernfs_lock genfs_lock +#define kernfs_unlock genfs_unlock +#define kernfs_bmap genfs_badop +#define kernfs_strategy genfs_badop +int kernfs_print __P((void *)); +#define kernfs_islocked genfs_islocked +int kernfs_pathconf __P((void *)); +#define kernfs_advlock genfs_einval +#define kernfs_blkatoff genfs_eopnotsupp +#define kernfs_valloc genfs_eopnotsupp +#define kernfs_vfree genfs_nullop +#define kernfs_truncate genfs_eopnotsupp +#define kernfs_update genfs_nullop +#define kernfs_bwrite genfs_eopnotsupp + +int kernfs_xread __P((struct kern_target *, int, char **, int)); +int kernfs_xwrite __P((struct kern_target *, char *, int)); + +int (**kernfs_vnodeop_p) __P((void *)); +const struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = { + { &vop_default_desc, vn_default_error }, + { &vop_lookup_desc, kernfs_lookup }, /* lookup */ + { &vop_create_desc, kernfs_create }, /* create */ + { &vop_mknod_desc, kernfs_mknod }, /* mknod */ + { &vop_open_desc, kernfs_open }, /* open */ + { &vop_close_desc, kernfs_close }, /* close */ + { &vop_access_desc, kernfs_access }, /* access */ + { &vop_getattr_desc, kernfs_getattr }, /* getattr */ + { &vop_setattr_desc, kernfs_setattr }, /* setattr */ + { &vop_read_desc, kernfs_read }, /* read */ + { &vop_write_desc, kernfs_write }, /* write */ + { &vop_fcntl_desc, kernfs_fcntl }, /* fcntl */ + { &vop_ioctl_desc, kernfs_ioctl }, /* ioctl */ + { &vop_poll_desc, kernfs_poll }, /* poll */ + { &vop_revoke_desc, kernfs_revoke }, /* revoke */ + { &vop_mmap_desc, kernfs_mmap }, /* mmap */ + { &vop_fsync_desc, kernfs_fsync }, /* fsync */ + { &vop_seek_desc, kernfs_seek }, /* seek */ + { &vop_remove_desc, kernfs_remove }, /* remove */ + { &vop_link_desc, kernfs_link }, /* link */ + { &vop_rename_desc, kernfs_rename }, /* rename */ + { &vop_mkdir_desc, kernfs_mkdir }, /* mkdir */ + { &vop_rmdir_desc, kernfs_rmdir }, /* rmdir */ + { &vop_symlink_desc, kernfs_symlink }, /* symlink */ + { &vop_readdir_desc, kernfs_readdir }, /* readdir */ + { &vop_readlink_desc, kernfs_readlink }, /* readlink */ + { &vop_abortop_desc, kernfs_abortop }, /* abortop */ + { &vop_inactive_desc, kernfs_inactive }, /* inactive */ + { &vop_reclaim_desc, kernfs_reclaim }, /* reclaim */ + { &vop_lock_desc, kernfs_lock }, /* lock */ + { &vop_unlock_desc, kernfs_unlock }, /* unlock */ + { &vop_bmap_desc, kernfs_bmap }, /* bmap */ + { &vop_strategy_desc, kernfs_strategy }, /* strategy */ + { &vop_print_desc, kernfs_print }, /* print */ + { &vop_islocked_desc, kernfs_islocked }, /* islocked */ + { &vop_pathconf_desc, kernfs_pathconf }, /* pathconf */ + { &vop_advlock_desc, kernfs_advlock }, /* advlock */ + { &vop_blkatoff_desc, kernfs_blkatoff }, /* blkatoff */ + { &vop_valloc_desc, kernfs_valloc }, /* valloc */ + { &vop_vfree_desc, kernfs_vfree }, /* vfree */ + { &vop_truncate_desc, kernfs_truncate }, /* truncate */ + { &vop_update_desc, kernfs_update }, /* update */ + { &vop_bwrite_desc, kernfs_bwrite }, /* bwrite */ + { (struct vnodeop_desc*)NULL, (int(*) __P((void *)))NULL } +}; +const struct vnodeopv_desc kernfs_vnodeop_opv_desc = + { &kernfs_vnodeop_p, kernfs_vnodeop_entries }; + +int +kernfs_xread(kt, off, bufp, len) struct kern_target *kt; - char *buf; + int off; + char **bufp; int len; - int *lenp; { - int xlen; switch (kt->kt_tag) { case KTT_TIME: { struct timeval tv; + microtime(&tv); - sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec); + sprintf(*bufp, "%ld %ld\n", tv.tv_sec, tv.tv_usec); break; } case KTT_INT: { int *ip = kt->kt_data; - sprintf(buf, "%d\n", *ip); + + sprintf(*bufp, "%d\n", *ip); break; } case KTT_STRING: { char *cp = kt->kt_data; - int xlen = strlen(cp) + 1; - - if (xlen >= len) - return (EINVAL); - bcopy(cp, buf, xlen); + *bufp = cp; break; } + case KTT_MSGBUF: { + long n; + + /* + * deal with cases where the message buffer has + * become corrupted. + */ + if (!msgbufenabled || msgbufp->msg_magic != MSG_MAGIC) { + msgbufenabled = 0; + return (ENXIO); + } + + /* + * Note that reads of /kern/msgbuf won't necessarily yield + * consistent results, if the message buffer is modified + * while the read is in progress. The worst that can happen + * is that incorrect data will be read. There's no way + * that this can crash the system unless the values in the + * message buffer header are corrupted, but that'll cause + * the system to die anyway. + */ + if (off >= msgbufp->msg_bufs) + return (0); + n = msgbufp->msg_bufx + off; + if (n >= msgbufp->msg_bufs) + n -= msgbufp->msg_bufs; + len = min(msgbufp->msg_bufs - n, msgbufp->msg_bufs - off); + *bufp = msgbufp->msg_bufc + n; + return (len); + } + case KTT_HOSTNAME: { char *cp = hostname; int xlen = hostnamelen; @@ -146,253 +265,215 @@ kernfs_xread(kt, buf, len, lenp) if (xlen >= (len-2)) return (EINVAL); - bcopy(cp, buf, xlen); - buf[xlen] = '\n'; - buf[xlen+1] = '\0'; + memcpy(*bufp, cp, xlen); + (*bufp)[xlen] = '\n'; + (*bufp)[xlen+1] = '\0'; break; } case KTT_AVENRUN: - sprintf(buf, "%d %d %d %d\n", - averunnable.ldavg[0], - averunnable.ldavg[1], - averunnable.ldavg[2], - averunnable.fscale); + averunnable.fscale = FSCALE; + sprintf(*bufp, "%d %d %d %ld\n", + averunnable.ldavg[0], averunnable.ldavg[1], + averunnable.ldavg[2], averunnable.fscale); break; default: - return (EINVAL); + return (0); } - *lenp = strlen(buf); - return (0); + len = strlen(*bufp); + if (len <= off) + return (0); + *bufp += off; + return (len - off); } -static int +int kernfs_xwrite(kt, buf, len) struct kern_target *kt; char *buf; int len; { + switch (kt->kt_tag) { - case KTT_HOSTNAME: { + case KTT_HOSTNAME: if (buf[len-1] == '\n') --len; - bcopy(buf, hostname, len); + memcpy(hostname, buf, len); hostname[len] = '\0'; hostnamelen = len; return (0); - } default: return (EIO); } } -/* - * implement access checking. - * - * something very similar to this code is duplicated - * throughout the 4bsd kernel and should be moved - * into kern/vfs_subr.c sometime. - * - * actually, the check for super-user is slightly - * broken since it will allow read access to write-only - * objects. this doesn't cause any particular trouble - * but does mean that the i/o entry points need to check - * that the operation really does make sense. - */ -kernfs_access(vp, mode, cred, p) - struct vnode *vp; - int mode; - struct ucred *cred; - struct proc *p; -{ - struct vattr *vap; - struct vattr vattr; - int error; - - /* - * If you're the super-user, - * you always get access. - */ - if (cred->cr_uid == (uid_t) 0) - return (0); - vap = &vattr; - if (error = VOP_GETATTR(vp, vap, cred, p)) - return (error); - - /* - * Access check is based on only one of owner, group, public. - * If not owner, then check group. If not a member of the - * group, then check public access. - */ - if (cred->cr_uid != vap->va_uid) { - gid_t *gp; - int i; - - mode >>= 3; - gp = cred->cr_groups; - for (i = 0; i < cred->cr_ngroups; i++, gp++) - if (vap->va_gid == *gp) - goto found; - mode >>= 3; -found: - ; - } - - if ((vap->va_mode & mode) == mode) - return (0); - - return (EACCES); -} /* * vp is the current namei directory * ndp is the name to locate in that directory... */ -kernfs_lookup(dvp, ndp, p) - struct vnode *dvp; - struct nameidata *ndp; - struct proc *p; -{ - char *pname = ndp->ni_ptr; - int error = ENOENT; - int i; +int +kernfs_lookup(v) + void *v; +{ + struct vop_lookup_args /* { + struct vnode * a_dvp; + struct vnode ** a_vpp; + struct componentname * a_cnp; + } */ *ap = v; + struct componentname *cnp = ap->a_cnp; + struct vnode **vpp = ap->a_vpp; + struct vnode *dvp = ap->a_dvp; + const char *pname = cnp->cn_nameptr; + struct kern_target *kt; struct vnode *fvp; + int error, i, wantpunlock; #ifdef KERNFS_DIAGNOSTIC + printf("kernfs_lookup(%p)\n", ap); + printf("kernfs_lookup(dp = %p, vpp = %p, cnp = %p)\n", dvp, vpp, ap->a_cnp); printf("kernfs_lookup(%s)\n", pname); #endif - if (ndp->ni_namelen == 1 && *pname == '.') { - ndp->ni_dvp = dvp; - ndp->ni_vp = dvp; + + *vpp = NULLVP; + cnp->cn_flags &= ~PDIRUNLOCK; + + if (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME) + return (EROFS); + + if (cnp->cn_namelen == 1 && *pname == '.') { + *vpp = dvp; VREF(dvp); - /*VOP_LOCK(dvp);*/ return (0); } + /* + * This code only supports a flat directory, so we don't + * need to worry about .. + */ + #if 0 - if (ndp->ni_namelen == 4 && bcmp(pname, "root", 4) == 0) { - ndp->ni_dvp = rootdir; - ndp->ni_vp = rootdir; - VREF(rootdir); + if (cnp->cn_namelen == 4 && memcmp(pname, "root", 4) == 0) { + *vpp = rootdir; VREF(rootdir); - VOP_LOCK(rootdir); + vn_lock(rootdir, LK_SHARED | LK_RETRY); return (0); } #endif - - /* - * /kern/rootdev is the root device - */ - if (ndp->ni_namelen == 7 && bcmp(pname, "rootdev", 7) == 0) { - if (vfinddev(rootdev, VBLK, &fvp)) - return (ENXIO); - ndp->ni_dvp = dvp; - ndp->ni_vp = fvp; - VREF(fvp); - VOP_LOCK(fvp); - return (0); - } - for (i = 0; i < nkern_targets; i++) { - struct kern_target *kt = &kern_targets[i]; - if (ndp->ni_namelen == strlen(kt->kt_name) && - bcmp(kt->kt_name, pname, ndp->ni_namelen) == 0) { - error = 0; - break; - } + wantpunlock = (~cnp->cn_flags & (LOCKPARENT | ISLASTCN)); + + for (kt = kern_targets, i = 0; i < nkern_targets; kt++, i++) { + if (cnp->cn_namelen == kt->kt_namlen && + memcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) + goto found; } #ifdef KERNFS_DIAGNOSTIC - printf("kernfs_lookup: i = %d, error = %d\n", i, error); + printf("kernfs_lookup: i = %d, failed", i); #endif - if (error) - goto bad; + return (cnp->cn_nameiop == LOOKUP ? ENOENT : EROFS); -#ifdef KERNFS_DIAGNOSTIC - printf("kernfs_lookup: allocate new vnode\n"); -#endif - error = getnewvnode(VT_KERNFS, dvp->v_mount, &kernfs_vnodeops, &fvp); - if (error) - goto bad; - VTOKERN(fvp)->kf_kt = &kern_targets[i]; - fvp->v_type = VTOKERN(fvp)->kf_kt->kt_vtype; - ndp->ni_dvp = dvp; - ndp->ni_vp = fvp; -#ifdef KERNFS_DIAGNOSTIC - printf("kernfs_lookup: newvp = %x\n", fvp); -#endif - return (0); +found: + if (kt->kt_tag == KTT_DEVICE) { + dev_t *dp = kt->kt_data; + loop: + if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) { + return (ENOENT); + } + *vpp = fvp; + if (vget(fvp, LK_EXCLUSIVE)) + goto loop; + if (wantpunlock) { + VOP_UNLOCK(dvp, 0); + cnp->cn_flags |= PDIRUNLOCK; + } + return (0); + } -bad:; - ndp->ni_dvp = dvp; - ndp->ni_vp = NULL; #ifdef KERNFS_DIAGNOSTIC - printf("kernfs_lookup: error = %d\n", error); + printf("kernfs_lookup: allocate new vnode\n"); #endif - return (error); -} + error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p, &fvp); + if (error) { + return (error); + } -kernfs_open(vp, mode, cred, p) - struct vnode *vp; - int mode; - struct ucred *cred; - struct proc *p; -{ - int error; - struct filedesc *fdp; - struct file *fp; - int dfd; - int fd; + MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP, + M_WAITOK); + VTOKERN(fvp)->kf_kt = kt; + fvp->v_type = kt->kt_vtype; + vn_lock(fvp, LK_EXCLUSIVE | LK_RETRY); + *vpp = fvp; #ifdef KERNFS_DIAGNOSTIC - printf("kernfs_open\n"); -#endif - - /* - * Can always open the root (modulo perms) - */ - if (vp->v_flag & VROOT) - return (0); + printf("kernfs_lookup: newvp = %p\n", fvp); +#endif + if (wantpunlock) { + VOP_UNLOCK(dvp, 0); + cnp->cn_flags |= PDIRUNLOCK; + } + return (0); +} -#ifdef KERNFS_DIAGNOSTIC - printf("kernfs_open, mode = %x, file = %s\n", - mode, VTOKERN(vp)->kf_kt->kt_name); -#endif +int +kernfs_access(v) + void *v; +{ + struct vop_access_args /* { + struct vnode *a_vp; + int a_mode; + struct ucred *a_cred; + struct proc *a_p; + } */ *ap = v; + struct vnode *vp = ap->a_vp; + mode_t mode; - if ((mode & FWRITE) && VTOKERN(vp)->kf_kt->kt_rw != KTM_RW) - return (EACCES); + if (vp->v_flag & VROOT) { + mode = DIR_MODE; + } else { + struct kern_target *kt = VTOKERN(vp)->kf_kt; + mode = kt->kt_mode; + } - return (0); + return (vaccess(vp->v_type, mode, (uid_t)0, (gid_t)0, ap->a_mode, + ap->a_cred)); } -kernfs_getattr(vp, vap, cred, p) - struct vnode *vp; - struct vattr *vap; - struct ucred *cred; - struct proc *p; -{ +int +kernfs_getattr(v) + void *v; +{ + struct vop_getattr_args /* { + struct vnode *a_vp; + struct vattr *a_vap; + struct ucred *a_cred; + struct proc *a_p; + } */ *ap = v; + struct vnode *vp = ap->a_vp; + struct vattr *vap = ap->a_vap; + struct timeval tv; int error = 0; - char strbuf[KSTRING]; - struct kern_target *kt = VTOKERN(vp)->kf_kt; + char strbuf[KSTRING], *buf; - bzero((caddr_t) vap, sizeof(*vap)); + memset((caddr_t) vap, 0, sizeof(*vap)); vattr_null(vap); vap->va_uid = 0; vap->va_gid = 0; vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; - /* vap->va_qsize = 0; */ + vap->va_size = 0; vap->va_blocksize = DEV_BSIZE; - microtime(&vap->va_atime); + microtime(&tv); + TIMEVAL_TO_TIMESPEC(&tv, &vap->va_atime); vap->va_mtime = vap->va_atime; vap->va_ctime = vap->va_ctime; vap->va_gen = 0; vap->va_flags = 0; vap->va_rdev = 0; - /* vap->va_qbytes = 0; */ vap->va_bytes = 0; if (vp->v_flag & VROOT) { @@ -400,35 +481,38 @@ kernfs_getattr(vp, vap, cred, p) printf("kernfs_getattr: stat rootdir\n"); #endif vap->va_type = VDIR; - vap->va_mode = KTM_DIR_MODE; + vap->va_mode = DIR_MODE; vap->va_nlink = 2; vap->va_fileid = 2; vap->va_size = DEV_BSIZE; } else { + struct kern_target *kt = VTOKERN(vp)->kf_kt; + int nbytes, total; #ifdef KERNFS_DIAGNOSTIC printf("kernfs_getattr: stat target %s\n", kt->kt_name); #endif vap->va_type = kt->kt_vtype; - vap->va_mode = (kt->kt_rw ? KTM_RW_MODE : KTM_RO_MODE); + vap->va_mode = kt->kt_mode; vap->va_nlink = 1; - vap->va_fileid = 3 + (kt - kern_targets) / sizeof(*kt); - error = kernfs_xread(kt, strbuf, sizeof(strbuf), &vap->va_size); + vap->va_fileid = 1 + (kt - kern_targets); + total = 0; + while (buf = strbuf, + nbytes = kernfs_xread(kt, total, &buf, sizeof(strbuf))) + total += nbytes; + vap->va_size = total; } - vp->v_type = vap->va_type; #ifdef KERNFS_DIAGNOSTIC printf("kernfs_getattr: return error %d\n", error); #endif return (error); } -kernfs_setattr(vp, vap, cred, p) - struct vnode *vp; - struct vattr *vap; - struct ucred *cred; - struct proc *p; +/*ARGSUSED*/ +int +kernfs_setattr(v) + void *v; { - /* * Silently ignore attribute changes. * This allows for open with truncate to have no @@ -438,54 +522,72 @@ kernfs_setattr(vp, vap, cred, p) return (0); } -static int -kernfs_read(vp, uio, ioflag, cred) - struct vnode *vp; - struct uio *uio; - int ioflag; - struct ucred *cred; -{ - struct kern_target *kt = VTOKERN(vp)->kf_kt; - char strbuf[KSTRING]; - int off = uio->uio_offset; - int len = 0; - char *cp = strbuf; +int +kernfs_read(v) + void *v; +{ + struct vop_read_args /* { + struct vnode *a_vp; + struct uio *a_uio; + int a_ioflag; + struct ucred *a_cred; + } */ *ap = v; + struct vnode *vp = ap->a_vp; + struct uio *uio = ap->a_uio; + struct kern_target *kt; + char strbuf[KSTRING], *buf; + int off, len; int error; + + if (vp->v_type == VDIR) + return (EOPNOTSUPP); + + kt = VTOKERN(vp)->kf_kt; + #ifdef KERNFS_DIAGNOSTIC printf("kern_read %s\n", kt->kt_name); #endif - if (vp->v_flag & VROOT) - return (0); - - error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len); - if (error) - return (error); - cp = strbuf + off; - len -= off; - return (uiomove(cp, len, uio)); + off = uio->uio_offset; +#if 0 + while (buf = strbuf, +#else + if (buf = strbuf, +#endif + len = kernfs_xread(kt, off, &buf, sizeof(strbuf))) { + if ((error = uiomove(buf, len, uio)) != 0) + return (error); + off += len; + } + return (0); } -static int -kernfs_write(vp, uio, ioflag, cred) - struct vnode *vp; - struct uio *uio; - int ioflag; - struct ucred *cred; -{ - struct kern_target *kt = VTOKERN(vp)->kf_kt; +int +kernfs_write(v) + void *v; +{ + struct vop_write_args /* { + struct vnode *a_vp; + struct uio *a_uio; + int a_ioflag; + struct ucred *a_cred; + } */ *ap = v; + struct vnode *vp = ap->a_vp; + struct uio *uio = ap->a_uio; + struct kern_target *kt; + int error, xlen; char strbuf[KSTRING]; - int len = uio->uio_resid; - char *cp = strbuf; - int xlen; - int error; + + if (vp->v_type == VDIR) + return (EOPNOTSUPP); + + kt = VTOKERN(vp)->kf_kt; if (uio->uio_offset != 0) return (EINVAL); xlen = min(uio->uio_resid, KSTRING-1); - error = uiomove(strbuf, xlen, uio); - if (error) + if ((error = uiomove(strbuf, xlen, uio)) != 0) return (error); if (uio->uio_resid != 0) @@ -496,245 +598,213 @@ kernfs_write(vp, uio, ioflag, cred) return (kernfs_xwrite(kt, strbuf, xlen)); } -kernfs_readdir(vp, uio, cred, eofflagp) - struct vnode *vp; - struct uio *uio; - struct ucred *cred; - int *eofflagp; -{ - struct filedesc *fdp; - int i; +int +kernfs_readdir(v) + void *v; +{ + struct vop_readdir_args /* { + struct vnode *a_vp; + struct uio *a_uio; + struct ucred *a_cred; + int *a_eofflag; + off_t **a_cookies; + int a_*ncookies; + } */ *ap = v; + struct uio *uio = ap->a_uio; + struct dirent d; + struct kern_target *kt; + off_t i; int error; + off_t *cookies = NULL; + int ncookies = 0, nc = 0; + + if (ap->a_vp->v_type != VDIR) + return (ENOTDIR); + + if (uio->uio_resid < UIO_MX) + return (EINVAL); + if (uio->uio_offset < 0) + return (EINVAL); - i = uio->uio_offset / UIO_MX; error = 0; - while (uio->uio_resid > 0) { + i = uio->uio_offset; + + if (i >= nkern_targets) + return 0; + + memset((caddr_t)&d, 0, UIO_MX); + d.d_reclen = UIO_MX; + + if (ap->a_ncookies) { + nc = uio->uio_resid / UIO_MX; + nc = min(nc, (nkern_targets - i)); + cookies = malloc(nc * sizeof(off_t), M_TEMP, M_WAITOK); + *ap->a_cookies = cookies; + } + + for (kt = &kern_targets[i]; + uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) { #ifdef KERNFS_DIAGNOSTIC printf("kernfs_readdir: i = %d\n", i); #endif - if (i >= nkern_targets) { - *eofflagp = 1; - break; + + if (kt->kt_tag == KTT_DEVICE) { + dev_t *dp = kt->kt_data; + struct vnode *fvp; + + if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) + continue; } - { - struct direct d; - struct direct *dp = &d; - struct kern_target *kt = &kern_targets[i]; - - bzero((caddr_t) dp, UIO_MX); - - dp->d_namlen = strlen(kt->kt_name); - bcopy(kt->kt_name, dp->d_name, dp->d_namlen+1); - -#ifdef KERNFS_DIAGNOSTIC - printf("kernfs_readdir: name = %s, len = %d\n", - dp->d_name, dp->d_namlen); -#endif - /* - * Fill in the remaining fields - */ - dp->d_reclen = UIO_MX; - dp->d_ino = i + 3; - /* - * And ship to userland - */ - error = uiomove((caddr_t) dp, UIO_MX, uio); - if (error) - break; + + d.d_fileno = i + 3; + d.d_namlen = kt->kt_namlen; + memcpy(d.d_name, kt->kt_name, kt->kt_namlen + 1); + d.d_type = kt->kt_type; + + if ((error = uiomove((caddr_t)&d, UIO_MX, uio)) != 0) + break; + if (cookies) { + *cookies++ = i + 1; + ncookies++; } - i++; } - uio->uio_offset = i * UIO_MX; + if (ap->a_ncookies) { + if (error) { + free(*ap->a_cookies, M_TEMP); + *ap->a_ncookies = 0; + *ap->a_cookies = NULL; + } else + *ap->a_ncookies = ncookies; + } + uio->uio_offset = i; return (error); } -kernfs_inactive(vp, p) - struct vnode *vp; - struct proc *p; -{ +int +kernfs_inactive(v) + void *v; +{ + struct vop_inactive_args /* { + struct vnode *a_vp; + struct proc *a_p; + } */ *ap = v; + struct vnode *vp = ap->a_vp; + +#ifdef KERNFS_DIAGNOSTIC + printf("kernfs_inactive(%p)\n", vp); +#endif /* * Clear out the v_type field to avoid * nasty things happening in vgone(). */ + VOP_UNLOCK(vp, 0); vp->v_type = VNON; -#ifdef KERNFS_DIAGNOSTIC - printf("kernfs_inactive(%x)\n", vp); -#endif return (0); } -/* - * Print out the contents of a kernfs vnode. - */ -/* ARGSUSED */ -kernfs_print(vp) - struct vnode *vp; +int +kernfs_reclaim(v) + void *v; { - printf("tag VT_NON, kernfs vnode\n"); -} + struct vop_reclaim_args /* { + struct vnode *a_vp; + } */ *ap = v; + struct vnode *vp = ap->a_vp; -/* - * kernfs vnode unsupported operation - */ -kernfs_enotsupp() -{ - return (EOPNOTSUPP); +#ifdef KERNFS_DIAGNOSTIC + printf("kernfs_reclaim(%p)\n", vp); +#endif + if (vp->v_data) { + FREE(vp->v_data, M_TEMP); + vp->v_data = 0; + } + return (0); } /* - * kernfs "should never get here" operation + * Return POSIX pathconf information applicable to special devices. */ -kernfs_badop() -{ - panic("kernfs: bad op"); +int +kernfs_pathconf(v) + void *v; +{ + struct vop_pathconf_args /* { + struct vnode *a_vp; + int a_name; + register_t *a_retval; + } */ *ap = v; + + switch (ap->a_name) { + case _PC_LINK_MAX: + *ap->a_retval = LINK_MAX; + return (0); + case _PC_MAX_CANON: + *ap->a_retval = MAX_CANON; + return (0); + case _PC_MAX_INPUT: + *ap->a_retval = MAX_INPUT; + return (0); + case _PC_PIPE_BUF: + *ap->a_retval = PIPE_BUF; + return (0); + case _PC_CHOWN_RESTRICTED: + *ap->a_retval = 1; + return (0); + case _PC_VDISABLE: + *ap->a_retval = _POSIX_VDISABLE; + return (0); + case _PC_SYNC_IO: + *ap->a_retval = 1; + return (0); + default: + return (EINVAL); + } /* NOTREACHED */ } /* - * kernfs vnode null operation + * Print out the contents of a /dev/fd vnode. */ -kernfs_nullop() +/* ARGSUSED */ +int +kernfs_print(v) + void *v; { + + printf("tag VT_KERNFS, kernfs vnode\n"); return (0); } -#define kernfs_create ((int (*) __P(( \ - struct nameidata *ndp, \ - struct vattr *vap, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_mknod ((int (*) __P(( \ - struct nameidata *ndp, \ - struct vattr *vap, \ - struct ucred *cred, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_close ((int (*) __P(( \ - struct vnode *vp, \ - int fflag, \ - struct ucred *cred, \ - struct proc *p))) nullop) -#define kernfs_ioctl ((int (*) __P(( \ - struct vnode *vp, \ - int command, \ - caddr_t data, \ - int fflag, \ - struct ucred *cred, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_select ((int (*) __P(( \ - struct vnode *vp, \ - int which, \ - int fflags, \ - struct ucred *cred, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_mmap ((int (*) __P(( \ - struct vnode *vp, \ - int fflags, \ - struct ucred *cred, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_fsync ((int (*) __P(( \ - struct vnode *vp, \ - int fflags, \ - struct ucred *cred, \ - int waitfor, \ - struct proc *p))) nullop) -#define kernfs_seek ((int (*) __P(( \ - struct vnode *vp, \ - off_t oldoff, \ - off_t newoff, \ - struct ucred *cred))) nullop) -#define kernfs_remove ((int (*) __P(( \ - struct nameidata *ndp, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_link ((int (*) __P(( \ - struct vnode *vp, \ - struct nameidata *ndp, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_rename ((int (*) __P(( \ - struct nameidata *fndp, \ - struct nameidata *tdnp, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_mkdir ((int (*) __P(( \ - struct nameidata *ndp, \ - struct vattr *vap, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_rmdir ((int (*) __P(( \ - struct nameidata *ndp, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_symlink ((int (*) __P(( \ - struct nameidata *ndp, \ - struct vattr *vap, \ - char *target, \ - struct proc *p))) kernfs_enotsupp) -#define kernfs_readlink ((int (*) __P(( \ - struct vnode *vp, \ - struct uio *uio, \ - struct ucred *cred))) kernfs_enotsupp) -#define kernfs_abortop ((int (*) __P(( \ - struct nameidata *ndp))) nullop) -#ifdef KERNFS_DIAGNOSTIC -int kernfs_reclaim(vp) -struct vnode *vp; -{ - printf("kernfs_reclaim(%x)\n", vp); - return (0); +int +kernfs_link(v) + void *v; +{ + struct vop_link_args /* { + struct vnode *a_dvp; + struct vnode *a_vp; + struct componentname *a_cnp; + } */ *ap = v; + + VOP_ABORTOP(ap->a_dvp, ap->a_cnp); + vput(ap->a_dvp); + return (EROFS); +} + +int +kernfs_symlink(v) + void *v; +{ + struct vop_symlink_args /* { + struct vnode *a_dvp; + struct vnode **a_vpp; + struct componentname *a_cnp; + struct vattr *a_vap; + char *a_target; + } */ *ap = v; + + VOP_ABORTOP(ap->a_dvp, ap->a_cnp); + vput(ap->a_dvp); + return (EROFS); } -#else -#define kernfs_reclaim ((int (*) __P(( \ - struct vnode *vp))) nullop) -#endif -#define kernfs_lock ((int (*) __P(( \ - struct vnode *vp))) nullop) -#define kernfs_unlock ((int (*) __P(( \ - struct vnode *vp))) nullop) -#define kernfs_bmap ((int (*) __P(( \ - struct vnode *vp, \ - daddr_t bn, \ - struct vnode **vpp, \ - daddr_t *bnp))) kernfs_badop) -#define kernfs_strategy ((int (*) __P(( \ - struct buf *bp))) kernfs_badop) -#define kernfs_islocked ((int (*) __P(( \ - struct vnode *vp))) nullop) -#define kernfs_advlock ((int (*) __P(( \ - struct vnode *vp, \ - caddr_t id, \ - int op, \ - struct flock *fl, \ - int flags))) kernfs_enotsupp) - -struct vnodeops kernfs_vnodeops = { - kernfs_lookup, /* lookup */ - kernfs_create, /* create */ - kernfs_mknod, /* mknod */ - kernfs_open, /* open */ - kernfs_close, /* close */ - kernfs_access, /* access */ - kernfs_getattr, /* getattr */ - kernfs_setattr, /* setattr */ - kernfs_read, /* read */ - kernfs_write, /* write */ - kernfs_ioctl, /* ioctl */ - kernfs_select, /* select */ - kernfs_mmap, /* mmap */ - kernfs_fsync, /* fsync */ - kernfs_seek, /* seek */ - kernfs_remove, /* remove */ - kernfs_link, /* link */ - kernfs_rename, /* rename */ - kernfs_mkdir, /* mkdir */ - kernfs_rmdir, /* rmdir */ - kernfs_symlink, /* symlink */ - kernfs_readdir, /* readdir */ - kernfs_readlink, /* readlink */ - kernfs_abortop, /* abortop */ - kernfs_inactive, /* inactive */ - kernfs_reclaim, /* reclaim */ - kernfs_lock, /* lock */ - kernfs_unlock, /* unlock */ - kernfs_bmap, /* bmap */ - kernfs_strategy, /* strategy */ - kernfs_print, /* print */ - kernfs_islocked, /* islocked */ - kernfs_advlock, /* advlock */ -};