version 1.9, 1993/05/28 16:47:05 |
version 1.41, 1996/02/09 22:40:24 |
|
|
|
/* $NetBSD$ */ |
|
|
/* |
/* |
* Copyright (c) 1990, 1992 Jan-Simon Pendry |
* Copyright (c) 1992, 1993 |
* All rights reserved. |
* The Regents of the University of California. All rights reserved. |
* |
* |
* This code is derived from software contributed to Berkeley by |
* This code is derived from software donated to Berkeley by |
* Jan-Simon Pendry. |
* Jan-Simon Pendry. |
* |
* |
* Redistribution and use in source and binary forms, with or without |
* Redistribution and use in source and binary forms, with or without |
|
|
* documentation and/or other materials provided with the distribution. |
* documentation and/or other materials provided with the distribution. |
* 3. All advertising materials mentioning features or use of this software |
* 3. All advertising materials mentioning features or use of this software |
* must display the following acknowledgement: |
* must display the following acknowledgement: |
* This product includes software developed by the University of |
* This product includes software developed by the University of |
* California, Berkeley and its contributors. |
* California, Berkeley and its contributors. |
* 4. Neither the name of the University nor the names of its contributors |
* 4. Neither the name of the University nor the names of its contributors |
* may be used to endorse or promote products derived from this software |
* may be used to endorse or promote products derived from this software |
* without specific prior written permission. |
* without specific prior written permission. |
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
* SUCH DAMAGE. |
* SUCH DAMAGE. |
* |
* |
* $Id$ |
* @(#)kernfs_vnops.c 8.9 (Berkeley) 6/15/94 |
*/ |
*/ |
|
|
/* |
/* |
* Kernel parameter filesystem |
* Kernel parameter filesystem (/kern) |
*/ |
*/ |
|
|
#include "param.h" |
#include <sys/param.h> |
#include "systm.h" |
#include <sys/systm.h> |
#include "kernel.h" |
#include <sys/kernel.h> |
#include "types.h" |
#include <sys/vmmeter.h> |
#include "time.h" |
#include <sys/types.h> |
#include "proc.h" |
#include <sys/time.h> |
#include "file.h" |
#include <sys/proc.h> |
#include "vnode.h" |
#include <sys/vnode.h> |
#include "stat.h" |
#include <sys/malloc.h> |
#include "mount.h" |
#include <sys/file.h> |
#include "namei.h" |
#include <sys/stat.h> |
#include "buf.h" |
#include <sys/mount.h> |
#include "miscfs/kernfs/kernfs.h" |
#include <sys/namei.h> |
|
#include <sys/buf.h> |
#include "../ufs/dir.h" /* For readdir() XXX */ |
#include <sys/dirent.h> |
|
#include <sys/msgbuf.h> |
struct kernfs_target kernfs_targets[] = { |
#include <miscfs/kernfs/kernfs.h> |
|
|
|
#define KSTRING 256 /* Largest I/O available via this filesystem */ |
|
#define UIO_MX 32 |
|
|
|
#define READ_MODE (S_IRUSR|S_IRGRP|S_IROTH) |
|
#define WRITE_MODE (S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH) |
|
#define DIR_MODE (S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH) |
|
|
|
struct kern_target { |
|
u_char kt_type; |
|
u_char kt_namlen; |
|
char *kt_name; |
|
void *kt_data; |
|
#define KTT_NULL 1 |
|
#define KTT_TIME 5 |
|
#define KTT_INT 17 |
|
#define KTT_STRING 31 |
|
#define KTT_HOSTNAME 47 |
|
#define KTT_AVENRUN 53 |
|
#define KTT_DEVICE 71 |
|
#define KTT_MSGBUF 89 |
|
u_char kt_tag; |
|
u_char kt_vtype; |
|
mode_t kt_mode; |
|
} kern_targets[] = { |
/* NOTE: The name must be less than UIO_MX-16 chars in length */ |
/* NOTE: The name must be less than UIO_MX-16 chars in length */ |
DIR_TARGET(".", 0, KTT_NULL, KTM_DIR_PERMS ) |
#define N(s) sizeof(s)-1, s |
DIR_TARGET("..", 0, KTT_NULL, KTM_DIR_PERMS ) |
/* name data tag type ro/rw */ |
REG_TARGET("copyright", copyright, KTT_STRING, KTM_RO_PERMS ) |
{ DT_DIR, N("."), 0, KTT_NULL, VDIR, DIR_MODE }, |
REG_TARGET("hostname", 0, KTT_HOSTNAME, KTM_RW_PERMS ) |
{ DT_DIR, N(".."), 0, KTT_NULL, VDIR, DIR_MODE }, |
REG_TARGET("hz", &hz, KTT_INT, KTM_RO_PERMS ) |
{ DT_REG, N("boottime"), &boottime.tv_sec, KTT_INT, VREG, READ_MODE }, |
REG_TARGET("loadavg", 0, KTT_AVENRUN, KTM_RO_PERMS ) |
{ DT_REG, N("copyright"), copyright, KTT_STRING, VREG, READ_MODE }, |
REG_TARGET("physmem", &physmem, KTT_INT, KTM_RO_PERMS ) |
{ DT_REG, N("hostname"), 0, KTT_HOSTNAME, VREG, WRITE_MODE }, |
DIR_TARGET("root", 0, KTT_NULL, KTM_DIR_PERMS ) |
{ DT_REG, N("hz"), &hz, KTT_INT, VREG, READ_MODE }, |
BLK_TARGET("rootdev", 0, KTT_NULL, KTM_RO_PERMS ) |
{ DT_REG, N("loadavg"), 0, KTT_AVENRUN, VREG, READ_MODE }, |
CHR_TARGET("rrootdev", 0, KTT_NULL, KTM_RO_PERMS ) |
{ DT_REG, N("msgbuf"), 0, KTT_MSGBUF, VREG, READ_MODE }, |
REG_TARGET("time", 0, KTT_TIME, KTM_RO_PERMS ) |
{ DT_REG, N("pagesize"), &cnt.v_page_size, KTT_INT, VREG, READ_MODE }, |
REG_TARGET("version", version, KTT_STRING, KTM_RO_PERMS ) |
{ DT_REG, N("physmem"), &physmem, KTT_INT, VREG, READ_MODE }, |
|
#if 0 |
|
{ DT_DIR, N("root"), 0, KTT_NULL, VDIR, DIR_MODE }, |
|
#endif |
|
{ DT_BLK, N("rootdev"), &rootdev, KTT_DEVICE, VBLK, READ_MODE }, |
|
{ DT_CHR, N("rrootdev"), &rrootdev, KTT_DEVICE, VCHR, READ_MODE }, |
|
{ DT_REG, N("time"), 0, KTT_TIME, VREG, READ_MODE }, |
|
{ DT_REG, N("version"), version, KTT_STRING, VREG, READ_MODE }, |
|
#undef N |
}; |
}; |
|
static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]); |
|
|
static int nkernfs_targets = sizeof(kernfs_targets) / sizeof(kernfs_targets[0]); |
int kernfs_enotsupp __P((void *)); |
|
int kernfs_badop __P((void *)); |
|
int kernfs_nullop __P((void *)); |
|
int kernfs_lookup __P((void *)); |
|
#define kernfs_create kernfs_enotsupp |
|
#define kernfs_mknod kernfs_enotsupp |
|
int kernfs_open __P((void *)); |
|
#define kernfs_close nullop |
|
int kernfs_access __P((void *)); |
|
int kernfs_getattr __P((void *)); |
|
int kernfs_setattr __P((void *)); |
|
int kernfs_read __P((void *)); |
|
int kernfs_write __P((void *)); |
|
#define kernfs_ioctl kernfs_enotsupp |
|
#define kernfs_select kernfs_enotsupp |
|
#define kernfs_mmap kernfs_enotsupp |
|
#define kernfs_fsync nullop |
|
#define kernfs_seek nullop |
|
#define kernfs_remove kernfs_enotsupp |
|
int kernfs_link __P((void *)); |
|
#define kernfs_rename kernfs_enotsupp |
|
#define kernfs_mkdir kernfs_enotsupp |
|
#define kernfs_rmdir kernfs_enotsupp |
|
int kernfs_symlink __P((void *)); |
|
int kernfs_readdir __P((void *)); |
|
#define kernfs_readlink kernfs_enotsupp |
|
int kernfs_abortop __P((void *)); |
|
int kernfs_inactive __P((void *)); |
|
int kernfs_reclaim __P((void *)); |
|
#define kernfs_lock nullop |
|
#define kernfs_unlock nullop |
|
#define kernfs_bmap kernfs_badop |
|
#define kernfs_strategy kernfs_badop |
|
int kernfs_print __P((void *)); |
|
#define kernfs_islocked nullop |
|
int kernfs_pathconf __P((void *)); |
|
#define kernfs_advlock kernfs_enotsupp |
|
#define kernfs_blkatoff kernfs_enotsupp |
|
#define kernfs_valloc kernfs_enotsupp |
|
int kernfs_vfree __P((void *)); |
|
#define kernfs_truncate kernfs_enotsupp |
|
#define kernfs_update kernfs_enotsupp |
|
#define kernfs_bwrite kernfs_enotsupp |
|
|
|
int kernfs_xread __P((struct kern_target *, int, char **, int)); |
|
int kernfs_xwrite __P((struct kern_target *, char *, int)); |
|
|
|
int (**kernfs_vnodeop_p) __P((void *)); |
|
struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = { |
|
{ &vop_default_desc, vn_default_error }, |
|
{ &vop_lookup_desc, kernfs_lookup }, /* lookup */ |
|
{ &vop_create_desc, kernfs_create }, /* create */ |
|
{ &vop_mknod_desc, kernfs_mknod }, /* mknod */ |
|
{ &vop_open_desc, kernfs_open }, /* open */ |
|
{ &vop_close_desc, kernfs_close }, /* close */ |
|
{ &vop_access_desc, kernfs_access }, /* access */ |
|
{ &vop_getattr_desc, kernfs_getattr }, /* getattr */ |
|
{ &vop_setattr_desc, kernfs_setattr }, /* setattr */ |
|
{ &vop_read_desc, kernfs_read }, /* read */ |
|
{ &vop_write_desc, kernfs_write }, /* write */ |
|
{ &vop_ioctl_desc, kernfs_ioctl }, /* ioctl */ |
|
{ &vop_select_desc, kernfs_select }, /* select */ |
|
{ &vop_mmap_desc, kernfs_mmap }, /* mmap */ |
|
{ &vop_fsync_desc, kernfs_fsync }, /* fsync */ |
|
{ &vop_seek_desc, kernfs_seek }, /* seek */ |
|
{ &vop_remove_desc, kernfs_remove }, /* remove */ |
|
{ &vop_link_desc, kernfs_link }, /* link */ |
|
{ &vop_rename_desc, kernfs_rename }, /* rename */ |
|
{ &vop_mkdir_desc, kernfs_mkdir }, /* mkdir */ |
|
{ &vop_rmdir_desc, kernfs_rmdir }, /* rmdir */ |
|
{ &vop_symlink_desc, kernfs_symlink }, /* symlink */ |
|
{ &vop_readdir_desc, kernfs_readdir }, /* readdir */ |
|
{ &vop_readlink_desc, kernfs_readlink },/* readlink */ |
|
{ &vop_abortop_desc, kernfs_abortop }, /* abortop */ |
|
{ &vop_inactive_desc, kernfs_inactive },/* inactive */ |
|
{ &vop_reclaim_desc, kernfs_reclaim }, /* reclaim */ |
|
{ &vop_lock_desc, kernfs_lock }, /* lock */ |
|
{ &vop_unlock_desc, kernfs_unlock }, /* unlock */ |
|
{ &vop_bmap_desc, kernfs_bmap }, /* bmap */ |
|
{ &vop_strategy_desc, kernfs_strategy },/* strategy */ |
|
{ &vop_print_desc, kernfs_print }, /* print */ |
|
{ &vop_islocked_desc, kernfs_islocked },/* islocked */ |
|
{ &vop_pathconf_desc, kernfs_pathconf },/* pathconf */ |
|
{ &vop_advlock_desc, kernfs_advlock }, /* advlock */ |
|
{ &vop_blkatoff_desc, kernfs_blkatoff },/* blkatoff */ |
|
{ &vop_valloc_desc, kernfs_valloc }, /* valloc */ |
|
{ &vop_vfree_desc, kernfs_vfree }, /* vfree */ |
|
{ &vop_truncate_desc, kernfs_truncate },/* truncate */ |
|
{ &vop_update_desc, kernfs_update }, /* update */ |
|
{ &vop_bwrite_desc, kernfs_bwrite }, /* bwrite */ |
|
{ (struct vnodeop_desc*)NULL, (int(*) __P((void *)))NULL } |
|
}; |
|
struct vnodeopv_desc kernfs_vnodeop_opv_desc = |
|
{ &kernfs_vnodeop_p, kernfs_vnodeop_entries }; |
|
|
static int |
int |
kernfs_xread(kt, buf, len, lenp) |
kernfs_xread(kt, off, bufp, len) |
struct kernfs_target *kt; |
struct kern_target *kt; |
char *buf; |
int off; |
|
char **bufp; |
int len; |
int len; |
int *lenp; |
|
{ |
{ |
int xlen; |
|
|
|
switch (kt->kt_tag) { |
switch (kt->kt_tag) { |
case KTT_TIME: { |
case KTT_TIME: { |
struct timeval tv; |
struct timeval tv; |
|
|
microtime(&tv); |
microtime(&tv); |
sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec); |
sprintf(*bufp, "%d %d\n", tv.tv_sec, tv.tv_usec); |
break; |
break; |
} |
} |
|
|
case KTT_INT: { |
case KTT_INT: { |
int *ip = kt->kt_data; |
int *ip = kt->kt_data; |
sprintf(buf, "%d\n", *ip); |
|
|
sprintf(*bufp, "%d\n", *ip); |
break; |
break; |
} |
} |
|
|
case KTT_STRING: { |
case KTT_STRING: { |
char *cp = kt->kt_data; |
char *cp = kt->kt_data; |
int xlen = strlen(cp) + 1; |
|
|
|
if (xlen >= len) |
|
return (EINVAL); |
|
|
|
bcopy(cp, buf, xlen); |
*bufp = cp; |
break; |
break; |
} |
} |
|
|
|
case KTT_MSGBUF: { |
|
extern struct msgbuf *msgbufp; |
|
long n; |
|
|
|
if (off >= MSG_BSIZE) |
|
return (0); |
|
n = msgbufp->msg_bufx + off; |
|
if (n >= MSG_BSIZE) |
|
n -= MSG_BSIZE; |
|
len = min(MSG_BSIZE - n, MSG_BSIZE - off); |
|
*bufp = msgbufp->msg_bufc + n; |
|
return (len); |
|
} |
|
|
case KTT_HOSTNAME: { |
case KTT_HOSTNAME: { |
char *cp = hostname; |
char *cp = hostname; |
int xlen = hostnamelen; |
int xlen = hostnamelen; |
|
|
if (xlen + 2 > len) /* extra space for null and newline */ |
if (xlen >= (len-2)) |
return (EINVAL); |
return (EINVAL); |
|
|
bcopy(cp, buf, xlen); /* safer than sprintf */ |
bcopy(cp, *bufp, xlen); |
buf[xlen] = '\n'; |
(*bufp)[xlen] = '\n'; |
buf[xlen+1] = '\0'; |
(*bufp)[xlen+1] = '\0'; |
break; |
break; |
} |
} |
|
|
case KTT_AVENRUN: |
case KTT_AVENRUN: |
sprintf(buf, "%d %d %d %d\n", |
averunnable.fscale = FSCALE; |
averunnable[0], |
sprintf(*bufp, "%ld %ld %ld %ld\n", |
averunnable[1], |
averunnable.ldavg[0], averunnable.ldavg[1], |
averunnable[2], |
averunnable.ldavg[2], averunnable.fscale); |
FSCALE); |
|
break; |
break; |
|
|
default: |
default: |
return (EINVAL); |
return (0); |
} |
} |
|
|
*lenp = strlen(buf); |
len = strlen(*bufp); |
return (0); |
if (len <= off) |
|
return (0); |
|
*bufp += off; |
|
return (len - off); |
} |
} |
|
|
static int |
int |
kernfs_xwrite(kt, buf, len) |
kernfs_xwrite(kt, buf, len) |
struct kernfs_target *kt; |
struct kern_target *kt; |
char *buf; |
char *buf; |
int len; |
int len; |
{ |
{ |
|
|
switch (kt->kt_tag) { |
switch (kt->kt_tag) { |
case KTT_HOSTNAME: { |
case KTT_HOSTNAME: |
if (buf[len-1] == '\n') |
if (buf[len-1] == '\n') |
--len; |
--len; |
bcopy(buf, hostname, len); |
bcopy(buf, hostname, len); |
/* kernfs_write set buf[value_passed_as_len] = \0. |
hostname[len] = '\0'; |
* therefore, buf len (hostnamelen) = len. |
|
*/ |
|
hostnamelen = len; |
hostnamelen = len; |
hostname[hostnamelen] = '\0'; /* null end of string. */ |
|
return (0); |
return (0); |
} |
|
|
|
default: |
default: |
return (EIO); |
return (EIO); |
} |
} |
} |
} |
|
|
|
|
/* |
/* |
* vp is the current namei directory |
* vp is the current namei directory |
* ndp is the name to locate in that directory... |
* ndp is the name to locate in that directory... |
*/ |
*/ |
kernfs_lookup(dvp, ndp, p) |
int |
struct vnode *dvp; |
kernfs_lookup(v) |
struct nameidata *ndp; |
void *v; |
struct proc *p; |
{ |
{ |
struct vop_lookup_args /* { |
char *pname = ndp->ni_ptr; |
struct vnode * a_dvp; |
int error = ENOENT; |
struct vnode ** a_vpp; |
int i; |
struct componentname * a_cnp; |
|
} */ *ap = v; |
|
struct componentname *cnp = ap->a_cnp; |
|
struct vnode **vpp = ap->a_vpp; |
|
struct vnode *dvp = ap->a_dvp; |
|
char *pname = cnp->cn_nameptr; |
|
struct kern_target *kt; |
struct vnode *fvp; |
struct vnode *fvp; |
|
int error, i; |
|
|
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
|
printf("kernfs_lookup(%x)\n", ap); |
|
printf("kernfs_lookup(dp = %x, vpp = %x, cnp = %x)\n", dvp, vpp, ap->a_cnp); |
printf("kernfs_lookup(%s)\n", pname); |
printf("kernfs_lookup(%s)\n", pname); |
#endif |
#endif |
if (ndp->ni_namelen == 1 && *pname == '.') { |
|
ndp->ni_dvp = dvp; |
*vpp = NULLVP; |
ndp->ni_vp = dvp; |
|
|
if (cnp->cn_nameiop == DELETE || cnp->cn_nameiop == RENAME) |
|
return (EROFS); |
|
|
|
if (cnp->cn_namelen == 1 && *pname == '.') { |
|
*vpp = dvp; |
VREF(dvp); |
VREF(dvp); |
/*VOP_LOCK(dvp);*/ |
/*VOP_LOCK(dvp);*/ |
return (0); |
return (0); |
} |
} |
|
|
if (ndp->ni_namelen == 4 && bcmp(pname, "root", 4) == 0) { |
#if 0 |
ndp->ni_dvp = dvp; |
if (cnp->cn_namelen == 4 && bcmp(pname, "root", 4) == 0) { |
ndp->ni_vp = rootdir; |
*vpp = rootdir; |
VREF(rootdir); |
VREF(rootdir); |
VOP_LOCK(rootdir); |
VOP_LOCK(rootdir); |
return (0); |
return (0); |
} |
} |
|
#endif |
/* |
|
* /kern/rootdev is the root device |
|
*/ |
|
if (ndp->ni_namelen == 7 && bcmp(pname, "rootdev", 7) == 0) { |
|
if (vfinddev(rootdev, VBLK, &fvp)) |
|
return (ENXIO); |
|
ndp->ni_dvp = dvp; |
|
ndp->ni_vp = fvp; |
|
VREF(fvp); |
|
VOP_LOCK(fvp); |
|
return (0); |
|
} |
|
|
|
/* |
for (kt = kern_targets, i = 0; i < nkern_targets; kt++, i++) { |
* /kern/rrootdev is the root device |
if (cnp->cn_namelen == kt->kt_namlen && |
*/ |
bcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) |
if (ndp->ni_namelen == 8 && bcmp(pname, "rrootdev", 7) == 0) { |
goto found; |
ndp->ni_dvp = dvp; |
|
ndp->ni_vp = rrootdevvp; |
|
VREF(rrootdevvp); |
|
VOP_LOCK(rrootdevvp); |
|
return (0); |
|
} |
|
|
|
for (i = 0; i < nkernfs_targets; i++) { |
|
struct kernfs_target *kt = &kernfs_targets[i]; |
|
if (ndp->ni_namelen == strlen(kt->kt_name) && |
|
bcmp(kt->kt_name, pname, ndp->ni_namelen) == 0) { |
|
error = 0; |
|
break; |
|
} |
|
} |
} |
|
|
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_lookup: i = %d, error = %d\n", i, error); |
printf("kernfs_lookup: i = %d, failed", i); |
#endif |
#endif |
|
|
if (error) |
return (cnp->cn_nameiop == LOOKUP ? ENOENT : EROFS); |
goto bad; |
|
|
found: |
|
if (kt->kt_tag == KTT_DEVICE) { |
|
dev_t *dp = kt->kt_data; |
|
loop: |
|
if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) |
|
return (ENOENT); |
|
*vpp = fvp; |
|
if (vget(fvp, 1)) |
|
goto loop; |
|
return (0); |
|
} |
|
|
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_lookup: allocate new vnode\n"); |
printf("kernfs_lookup: allocate new vnode\n"); |
#endif |
#endif |
error = getnewvnode(VT_UFS, dvp->v_mount, &kernfs_vnodeops, &fvp); |
error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p, &fvp); |
if (error) |
if (error) |
goto bad; |
return (error); |
VTOKERN(fvp)->kf_kt = &kernfs_targets[i]; |
|
fvp->v_type = VTOKERN(fvp)->kf_kt->kt_vtype; |
MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP, |
ndp->ni_dvp = dvp; |
M_WAITOK); |
ndp->ni_vp = fvp; |
VTOKERN(fvp)->kf_kt = kt; |
|
fvp->v_type = kt->kt_vtype; |
|
*vpp = fvp; |
|
|
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_lookup: newvp = %x\n", fvp); |
printf("kernfs_lookup: newvp = %x\n", fvp); |
#endif |
#endif |
return (0); |
return (0); |
|
|
bad:; |
|
ndp->ni_dvp = dvp; |
|
ndp->ni_vp = NULL; |
|
#ifdef KERNFS_DIAGNOSTIC |
|
printf("kernfs_lookup: error = %d\n", error); |
|
#endif |
|
return (error); |
|
} |
} |
|
|
kernfs_open(vp, mode, cred, p) |
/*ARGSUSED*/ |
struct vnode *vp; |
int |
int mode; |
kernfs_open(v) |
struct ucred *cred; |
void *v; |
struct proc *p; |
|
{ |
{ |
/* if access succeeded, this always does, too */ |
/* Only need to check access permissions. */ |
|
|
return (0); |
return (0); |
} |
} |
|
|
/* |
int |
* Check mode permission on target pointer. Mode is READ, WRITE or EXEC. |
kernfs_access(v) |
* The mode is shifted to select the owner/group/other fields. The |
void *v; |
* super user is granted all permissions. |
{ |
*/ |
struct vop_access_args /* { |
kernfs_access(vp, mode, cred, p) |
struct vnode *a_vp; |
struct vnode *vp; |
int a_mode; |
register int mode; |
struct ucred *a_cred; |
struct ucred *cred; |
struct proc *a_p; |
struct proc *p; |
} */ *ap = v; |
{ |
struct vnode *vp = ap->a_vp; |
struct kernfs_target *kt = VTOKERN(vp)->kf_kt; |
mode_t fmode = |
register gid_t *gp; |
(vp->v_flag & VROOT) ? DIR_MODE : VTOKERN(vp)->kf_kt->kt_mode; |
int i, error; |
|
|
return (vaccess(fmode, (uid_t)0, (gid_t)0, ap->a_mode, ap->a_cred)); |
#ifdef KERN_DIAGNOSTIC |
} |
if (!VOP_ISLOCKED(vp)) { |
|
vprint("kernfs_access: not locked", vp); |
int |
panic("kernfs_access: not locked"); |
kernfs_getattr(v) |
} |
void *v; |
#endif |
{ |
/* |
struct vop_getattr_args /* { |
* If you're the super-user, you always get access. |
struct vnode *a_vp; |
*/ |
struct vattr *a_vap; |
if (cred->cr_uid == 0) |
struct ucred *a_cred; |
return (0); |
struct proc *a_p; |
/* |
} */ *ap = v; |
* Access check is based on only one of owner, group, public. |
struct vnode *vp = ap->a_vp; |
* If not owner, then check group. If not a member of the |
struct vattr *vap = ap->a_vap; |
* group, then check public access. |
struct timeval tv; |
*/ |
|
if (cred->cr_uid != /* kt->kt_uid XXX */ 0) { |
|
mode >>= 3; |
|
gp = cred->cr_groups; |
|
for (i = 0; i < cred->cr_ngroups; i++, gp++) |
|
if (/* kt->kt_gid XXX */ 0 == *gp) |
|
goto found; |
|
mode >>= 3; |
|
found: |
|
; |
|
} |
|
if ((kt->kt_perms & mode) == mode) |
|
return (0); |
|
return (EACCES); |
|
} |
|
|
|
kernfs_getattr(vp, vap, cred, p) |
|
struct vnode *vp; |
|
struct vattr *vap; |
|
struct ucred *cred; |
|
struct proc *p; |
|
{ |
|
int error = 0; |
int error = 0; |
char strbuf[KSTRING]; |
char strbuf[KSTRING], *buf; |
struct kernfs_target *kt = VTOKERN(vp)->kf_kt; |
|
|
|
bzero((caddr_t) vap, sizeof(*vap)); |
bzero((caddr_t) vap, sizeof(*vap)); |
vattr_null(vap); |
vattr_null(vap); |
vap->va_uid = kt->kt_uid; |
vap->va_uid = 0; |
vap->va_gid = kt->kt_gid; |
vap->va_gid = 0; |
vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; |
vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; |
/* vap->va_qsize = 0; */ |
vap->va_size = 0; |
vap->va_blocksize = DEV_BSIZE; |
vap->va_blocksize = DEV_BSIZE; |
microtime(&vap->va_atime); |
microtime(&tv); |
|
TIMEVAL_TO_TIMESPEC(&tv, &vap->va_atime); |
vap->va_mtime = vap->va_atime; |
vap->va_mtime = vap->va_atime; |
vap->va_ctime = vap->va_ctime; |
vap->va_ctime = vap->va_ctime; |
vap->va_gen = 0; |
vap->va_gen = 0; |
vap->va_flags = 0; |
vap->va_flags = 0; |
vap->va_rdev = 0; |
vap->va_rdev = 0; |
/* vap->va_qbytes = 0; */ |
|
vap->va_bytes = 0; |
vap->va_bytes = 0; |
vap->va_type = kt->kt_vtype; |
|
vap->va_mode = kt->kt_perms; |
|
|
|
if (vp->v_flag & VROOT) { |
if (vp->v_flag & VROOT) { |
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_getattr: stat rootdir\n"); |
printf("kernfs_getattr: stat rootdir\n"); |
#endif |
#endif |
|
vap->va_type = VDIR; |
|
vap->va_mode = DIR_MODE; |
vap->va_nlink = 2; |
vap->va_nlink = 2; |
vap->va_fileid = 2; |
vap->va_fileid = 2; |
vap->va_size = DEV_BSIZE; |
vap->va_size = DEV_BSIZE; |
} else { |
} else { |
|
struct kern_target *kt = VTOKERN(vp)->kf_kt; |
|
int nbytes, total; |
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_getattr: stat target %s\n", kt->kt_name); |
printf("kernfs_getattr: stat target %s\n", kt->kt_name); |
#endif |
#endif |
|
vap->va_type = kt->kt_vtype; |
|
vap->va_mode = kt->kt_mode; |
vap->va_nlink = 1; |
vap->va_nlink = 1; |
vap->va_fileid = 3 + (kt - kernfs_targets) / sizeof(*kt); |
vap->va_fileid = 3 + (kt - kern_targets); |
error = kernfs_xread(kt, strbuf, sizeof(strbuf), &vap->va_size); |
total = 0; |
|
while (buf = strbuf, |
|
nbytes = kernfs_xread(kt, total, &buf, sizeof(strbuf))) |
|
total += nbytes; |
|
vap->va_size = total; |
} |
} |
|
|
vp->v_type = vap->va_type; |
|
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_getattr: return error %d\n", error); |
printf("kernfs_getattr: return error %d\n", error); |
#endif |
#endif |
return (error); |
return (error); |
} |
} |
|
|
|
/*ARGSUSED*/ |
/* |
int |
* Change the mode on a file. |
kernfs_setattr(v) |
*/ |
void *v; |
kernfs_chmod1(vp, mode, p) |
|
register struct vnode *vp; |
|
register int mode; |
|
struct proc *p; |
|
{ |
{ |
register struct ucred *cred = p->p_ucred; |
|
register struct kernfs_target *kt = VTOKERN(vp)->kf_kt; |
|
int error; |
|
|
|
if ((mode & kt->kt_maxperms) != mode) /* can't set ro var to rw */ |
|
return (EPERM); |
|
|
|
if (cred->cr_uid != kt->kt_uid && |
|
(error = suser(cred, &p->p_acflag))) |
|
return (error); |
|
if (cred->cr_uid) { |
|
if (vp->v_type != VDIR && (mode & S_ISVTX)) |
|
return (EFTYPE); |
|
if (!groupmember(kt->kt_gid, cred) && (mode & S_ISGID)) |
|
return (EPERM); |
|
} |
|
kt->kt_perms &= ~07777; |
|
kt->kt_perms |= mode & 07777; |
|
/* ip->i_flag |= ICHG;*/ |
|
return (0); |
|
} |
|
|
|
/* |
|
* Perform chown operation on kernfs_target kt |
|
*/ |
|
kernfs_chown1(vp, uid, gid, p) |
|
register struct vnode *vp; |
|
uid_t uid; |
|
gid_t gid; |
|
struct proc *p; |
|
{ |
|
register struct kernfs_target *kt = VTOKERN(vp)->kf_kt; |
|
register struct ucred *cred = p->p_ucred; |
|
uid_t ouid; |
|
gid_t ogid; |
|
int error = 0; |
|
|
|
if (uid == (u_short)VNOVAL) |
|
uid = kt->kt_uid; |
|
if (gid == (u_short)VNOVAL) |
|
gid = kt->kt_gid; |
|
/* |
/* |
* If we don't own the file, are trying to change the owner |
* Silently ignore attribute changes. |
* of the file, or are not a member of the target group, |
* This allows for open with truncate to have no |
* the caller must be superuser or the call fails. |
* effect until some data is written. I want to |
|
* do it this way because all writes are atomic. |
*/ |
*/ |
if ((cred->cr_uid != kt->kt_uid || uid != kt->kt_uid || |
|
!groupmember((gid_t)gid, cred)) && |
|
(error = suser(cred, &p->p_acflag))) |
|
return (error); |
|
ouid = kt->kt_uid; |
|
ogid = kt->kt_gid; |
|
|
|
kt->kt_uid = uid; |
|
kt->kt_gid = gid; |
|
|
|
/* if (ouid != uid || ogid != gid) |
|
ip->i_flag |= ICHG;*/ |
|
if (ouid != uid && cred->cr_uid != 0) |
|
kt->kt_perms &= ~S_ISUID; |
|
if (ogid != gid && cred->cr_uid != 0) |
|
kt->kt_perms &= ~S_ISGID; |
|
return (0); |
return (0); |
} |
} |
|
|
/* |
int |
* Set attribute vnode op. called from several syscalls |
kernfs_read(v) |
*/ |
void *v; |
kernfs_setattr(vp, vap, cred, p) |
{ |
struct vnode *vp; |
struct vop_read_args /* { |
struct vattr *vap; |
struct vnode *a_vp; |
struct ucred *cred; |
struct uio *a_uio; |
struct proc *p; |
int a_ioflag; |
{ |
struct ucred *a_cred; |
int error = 0; |
} */ *ap = v; |
|
struct vnode *vp = ap->a_vp; |
|
struct uio *uio = ap->a_uio; |
|
struct kern_target *kt; |
|
char strbuf[KSTRING], *buf; |
|
int off, len; |
|
int error; |
|
|
/* |
if (vp->v_type == VDIR) |
* Check for unsetable attributes. |
return (EOPNOTSUPP); |
*/ |
|
if ((vap->va_type != VNON) || (vap->va_nlink != VNOVAL) || |
kt = VTOKERN(vp)->kf_kt; |
(vap->va_fsid != VNOVAL) || (vap->va_fileid != VNOVAL) || |
|
(vap->va_blocksize != VNOVAL) || (vap->va_rdev != VNOVAL) || |
|
((int)vap->va_bytes != VNOVAL) || (vap->va_gen != VNOVAL)) { |
|
return (EINVAL); |
|
} |
|
/* |
|
* Go through the fields and update iff not VNOVAL. |
|
*/ |
|
if (vap->va_uid != (u_short)VNOVAL || vap->va_gid != (u_short)VNOVAL) |
|
if (error = kernfs_chown1(vp, vap->va_uid, vap->va_gid, p)) |
|
return (error); |
|
if (vap->va_size != VNOVAL) { |
|
if (vp->v_type == VDIR) |
|
return (EISDIR); |
|
/* else just nod and smile... */ |
|
} |
|
if (vap->va_atime.tv_sec != VNOVAL || vap->va_mtime.tv_sec != VNOVAL) { |
|
/* if (cred->cr_uid != ip->i_uid && |
|
(error = suser(cred, &p->p_acflag))) |
|
return (error); |
|
if (vap->va_atime.tv_sec != VNOVAL) |
|
ip->i_flag |= IACC; |
|
if (vap->va_mtime.tv_sec != VNOVAL) |
|
ip->i_flag |= IUPD; |
|
ip->i_flag |= ICHG; |
|
if (error = iupdat(ip, &vap->va_atime, &vap->va_mtime, 1)) |
|
return (error); |
|
*/ |
|
} |
|
if (vap->va_mode != (u_short)VNOVAL) |
|
error = kernfs_chmod1(vp, (int)vap->va_mode, p); |
|
if (vap->va_flags != VNOVAL) { |
|
/* if (cred->cr_uid != ip->i_uid && |
|
(error = suser(cred, &p->p_acflag))) |
|
return (error); |
|
if (cred->cr_uid == 0) { |
|
ip->i_flags = vap->va_flags; |
|
} else { |
|
ip->i_flags &= 0xffff0000; |
|
ip->i_flags |= (vap->va_flags & 0xffff); |
|
} |
|
ip->i_flag |= ICHG; |
|
*/ |
|
} |
|
return (error); |
|
} |
|
|
|
static int |
|
kernfs_read(vp, uio, ioflag, cred) |
|
struct vnode *vp; |
|
struct uio *uio; |
|
int ioflag; |
|
struct ucred *cred; |
|
{ |
|
struct kernfs_target *kt = VTOKERN(vp)->kf_kt; |
|
char strbuf[KSTRING]; |
|
int off = uio->uio_offset; |
|
int len = 0; |
|
char *cp = strbuf; |
|
int error; |
|
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kern_read %s\n", kt->kt_name); |
printf("kern_read %s\n", kt->kt_name); |
#endif |
#endif |
|
|
error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len); |
off = uio->uio_offset; |
if (error) |
#if 0 |
return (error); |
while (buf = strbuf, |
cp = strbuf + off; |
#else |
len -= off; |
if (buf = strbuf, |
return (uiomove(cp, len, uio)); |
#endif |
|
len = kernfs_xread(kt, off, &buf, sizeof(strbuf))) { |
|
if ((error = uiomove(buf, len, uio)) != 0) |
|
return (error); |
|
off += len; |
|
} |
|
return (0); |
} |
} |
|
|
static int |
int |
kernfs_write(vp, uio, ioflag, cred) |
kernfs_write(v) |
struct vnode *vp; |
void *v; |
struct uio *uio; |
{ |
int ioflag; |
struct vop_write_args /* { |
struct ucred *cred; |
struct vnode *a_vp; |
{ |
struct uio *a_uio; |
struct kernfs_target *kt = VTOKERN(vp)->kf_kt; |
int a_ioflag; |
|
struct ucred *a_cred; |
|
} */ *ap = v; |
|
struct vnode *vp = ap->a_vp; |
|
struct uio *uio = ap->a_uio; |
|
struct kern_target *kt; |
|
int error, xlen; |
char strbuf[KSTRING]; |
char strbuf[KSTRING]; |
int len = uio->uio_resid; |
|
char *cp = strbuf; |
if (vp->v_type == VDIR) |
int xlen; |
return (EOPNOTSUPP); |
int error; |
|
|
kt = VTOKERN(vp)->kf_kt; |
|
|
if (uio->uio_offset != 0) |
if (uio->uio_offset != 0) |
return (EINVAL); |
return (EINVAL); |
|
|
xlen = min(uio->uio_resid, KSTRING-1); |
xlen = min(uio->uio_resid, KSTRING-1); |
error = uiomove(strbuf, xlen, uio); |
if ((error = uiomove(strbuf, xlen, uio)) != 0) |
if (error) |
|
return (error); |
return (error); |
|
|
if (uio->uio_resid != 0) |
if (uio->uio_resid != 0) |
return (EIO); |
return (EIO); |
|
|
strbuf[xlen] = '\0'; |
strbuf[xlen] = '\0'; |
|
xlen = strlen(strbuf); |
return (kernfs_xwrite(kt, strbuf, xlen)); |
return (kernfs_xwrite(kt, strbuf, xlen)); |
} |
} |
|
|
kernfs_readdir(vp, uio, cred, eofflagp) |
int |
struct vnode *vp; |
kernfs_readdir(v) |
struct uio *uio; |
void *v; |
struct ucred *cred; |
{ |
int *eofflagp; |
struct vop_readdir_args /* { |
{ |
struct vnode *a_vp; |
struct filedesc *fdp; |
struct uio *a_uio; |
|
struct ucred *a_cred; |
|
int *a_eofflag; |
|
u_long *a_cookies; |
|
int a_ncookies; |
|
} */ *ap = v; |
|
struct uio *uio = ap->a_uio; |
|
struct dirent d; |
|
struct kern_target *kt; |
int i; |
int i; |
int error; |
int error; |
|
u_long *cookies = ap->a_cookies; |
|
int ncookies = ap->a_ncookies; |
|
|
|
if (ap->a_vp->v_type != VDIR) |
|
return (ENOTDIR); |
|
|
|
if (uio->uio_resid < UIO_MX) |
|
return (EINVAL); |
|
if (uio->uio_offset < 0) |
|
return (EINVAL); |
|
|
i = uio->uio_offset / UIO_MX; |
|
error = 0; |
error = 0; |
while (uio->uio_resid > 0) { |
i = uio->uio_offset; |
|
bzero((caddr_t)&d, UIO_MX); |
|
d.d_reclen = UIO_MX; |
|
|
|
for (kt = &kern_targets[i]; |
|
uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) { |
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_readdir: i = %d\n", i); |
printf("kernfs_readdir: i = %d\n", i); |
#endif |
#endif |
if (i >= nkernfs_targets) { |
|
*eofflagp = 1; |
if (kt->kt_tag == KTT_DEVICE) { |
break; |
dev_t *dp = kt->kt_data; |
} |
struct vnode *fvp; |
{ |
|
struct direct d; |
if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) |
struct direct *dp = &d; |
continue; |
struct kernfs_target *kt = &kernfs_targets[i]; |
|
|
|
bzero((caddr_t) dp, UIO_MX); |
|
|
|
dp->d_namlen = strlen(kt->kt_name); |
|
bcopy(kt->kt_name, dp->d_name, dp->d_namlen+1); |
|
|
|
#ifdef KERNFS_DIAGNOSTIC |
|
printf("kernfs_readdir: name = %s, len = %d\n", |
|
dp->d_name, dp->d_namlen); |
|
#endif |
|
/* |
|
* Fill in the remaining fields |
|
*/ |
|
dp->d_reclen = UIO_MX; |
|
dp->d_ino = i + 3; |
|
/* |
|
* And ship to userland |
|
*/ |
|
error = uiomove((caddr_t) dp, UIO_MX, uio); |
|
if (error) |
|
break; |
|
} |
} |
i++; |
|
} |
|
|
|
uio->uio_offset = i * UIO_MX; |
d.d_fileno = i + 3; |
|
d.d_namlen = kt->kt_namlen; |
|
bcopy(kt->kt_name, d.d_name, kt->kt_namlen + 1); |
|
d.d_type = kt->kt_type; |
|
|
|
if ((error = uiomove((caddr_t)&d, UIO_MX, uio)) != 0) |
|
break; |
|
if (ncookies-- > 0) |
|
*cookies++ = i + 1; |
|
} |
|
|
|
uio->uio_offset = i; |
return (error); |
return (error); |
} |
} |
|
|
kernfs_inactive(vp, p) |
int |
struct vnode *vp; |
kernfs_inactive(v) |
struct proc *p; |
void *v; |
{ |
{ |
|
struct vop_inactive_args /* { |
|
struct vnode *a_vp; |
|
} */ *ap = v; |
|
struct vnode *vp = ap->a_vp; |
|
|
|
#ifdef KERNFS_DIAGNOSTIC |
|
printf("kernfs_inactive(%x)\n", vp); |
|
#endif |
/* |
/* |
* Clear out the v_type field to avoid |
* Clear out the v_type field to avoid |
* nasty things happening in vgone(). |
* nasty things happening in vgone(). |
*/ |
*/ |
vp->v_type = VNON; |
vp->v_type = VNON; |
|
return (0); |
|
} |
|
|
|
int |
|
kernfs_reclaim(v) |
|
void *v; |
|
{ |
|
struct vop_reclaim_args /* { |
|
struct vnode *a_vp; |
|
} */ *ap = v; |
|
struct vnode *vp = ap->a_vp; |
|
|
#ifdef KERNFS_DIAGNOSTIC |
#ifdef KERNFS_DIAGNOSTIC |
printf("kernfs_inactive(%x)\n", vp); |
printf("kernfs_reclaim(%x)\n", vp); |
#endif |
#endif |
|
if (vp->v_data) { |
|
FREE(vp->v_data, M_TEMP); |
|
vp->v_data = 0; |
|
} |
return (0); |
return (0); |
} |
} |
|
|
/* |
/* |
* Print out the contents of a kernfs vnode. |
* Return POSIX pathconf information applicable to special devices. |
|
*/ |
|
int |
|
kernfs_pathconf(v) |
|
void *v; |
|
{ |
|
struct vop_pathconf_args /* { |
|
struct vnode *a_vp; |
|
int a_name; |
|
register_t *a_retval; |
|
} */ *ap = v; |
|
|
|
switch (ap->a_name) { |
|
case _PC_LINK_MAX: |
|
*ap->a_retval = LINK_MAX; |
|
return (0); |
|
case _PC_MAX_CANON: |
|
*ap->a_retval = MAX_CANON; |
|
return (0); |
|
case _PC_MAX_INPUT: |
|
*ap->a_retval = MAX_INPUT; |
|
return (0); |
|
case _PC_PIPE_BUF: |
|
*ap->a_retval = PIPE_BUF; |
|
return (0); |
|
case _PC_CHOWN_RESTRICTED: |
|
*ap->a_retval = 1; |
|
return (0); |
|
case _PC_VDISABLE: |
|
*ap->a_retval = _POSIX_VDISABLE; |
|
return (0); |
|
default: |
|
return (EINVAL); |
|
} |
|
/* NOTREACHED */ |
|
} |
|
|
|
/* |
|
* Print out the contents of a /dev/fd vnode. |
*/ |
*/ |
/* ARGSUSED */ |
/* ARGSUSED */ |
kernfs_print(vp) |
int |
struct vnode *vp; |
kernfs_print(v) |
|
void *v; |
{ |
{ |
printf("tag VT_NON, kernfs vnode\n"); |
|
|
printf("tag VT_KERNFS, kernfs vnode\n"); |
|
return (0); |
|
} |
|
|
|
/*ARGSUSED*/ |
|
int |
|
kernfs_vfree(v) |
|
void *v; |
|
{ |
|
|
|
return (0); |
|
} |
|
|
|
int |
|
kernfs_link(v) |
|
void *v; |
|
{ |
|
struct vop_link_args /* { |
|
struct vnode *a_dvp; |
|
struct vnode *a_vp; |
|
struct componentname *a_cnp; |
|
} */ *ap = v; |
|
|
|
VOP_ABORTOP(ap->a_dvp, ap->a_cnp); |
|
vput(ap->a_dvp); |
|
return (EROFS); |
|
} |
|
|
|
int |
|
kernfs_symlink(v) |
|
void *v; |
|
{ |
|
struct vop_symlink_args /* { |
|
struct vnode *a_dvp; |
|
struct vnode **a_vpp; |
|
struct componentname *a_cnp; |
|
struct vattr *a_vap; |
|
char *a_target; |
|
} */ *ap = v; |
|
|
|
VOP_ABORTOP(ap->a_dvp, ap->a_cnp); |
|
vput(ap->a_dvp); |
|
return (EROFS); |
|
} |
|
|
|
int |
|
kernfs_abortop(v) |
|
void *v; |
|
{ |
|
struct vop_abortop_args /* { |
|
struct vnode *a_dvp; |
|
struct componentname *a_cnp; |
|
} */ *ap = v; |
|
|
|
if ((ap->a_cnp->cn_flags & (HASBUF | SAVESTART)) == HASBUF) |
|
FREE(ap->a_cnp->cn_pnbuf, M_NAMEI); |
|
return (0); |
} |
} |
|
|
/* |
/* |
* kernfs vnode unsupported operation |
* /dev/fd vnode unsupported operation |
*/ |
*/ |
kernfs_enotsupp() |
/*ARGSUSED*/ |
|
int |
|
kernfs_enotsupp(v) |
|
void *v; |
{ |
{ |
|
|
return (EOPNOTSUPP); |
return (EOPNOTSUPP); |
} |
} |
|
|
/* |
/* |
* kernfs "should never get here" operation |
* /dev/fd "should never get here" operation |
*/ |
*/ |
kernfs_badop() |
/*ARGSUSED*/ |
|
int |
|
kernfs_badop(v) |
|
void *v; |
{ |
{ |
|
|
panic("kernfs: bad op"); |
panic("kernfs: bad op"); |
/* NOTREACHED */ |
return 0; |
} |
} |
|
|
/* |
/* |
* kernfs vnode null operation |
* kernfs vnode null operation |
*/ |
*/ |
kernfs_nullop() |
/*ARGSUSED*/ |
|
int |
|
kernfs_nullop(v) |
|
void *v; |
{ |
{ |
return (0); |
|
} |
|
|
|
#define kernfs_create ((int (*) __P(( \ |
|
struct nameidata *ndp, \ |
|
struct vattr *vap, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_mknod ((int (*) __P(( \ |
|
struct nameidata *ndp, \ |
|
struct vattr *vap, \ |
|
struct ucred *cred, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_close ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
int fflag, \ |
|
struct ucred *cred, \ |
|
struct proc *p))) nullop) |
|
#define kernfs_ioctl ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
int command, \ |
|
caddr_t data, \ |
|
int fflag, \ |
|
struct ucred *cred, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_select ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
int which, \ |
|
int fflags, \ |
|
struct ucred *cred, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_mmap ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
int fflags, \ |
|
struct ucred *cred, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_fsync ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
int fflags, \ |
|
struct ucred *cred, \ |
|
int waitfor, \ |
|
struct proc *p))) nullop) |
|
#define kernfs_seek ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
off_t oldoff, \ |
|
off_t newoff, \ |
|
struct ucred *cred))) nullop) |
|
#define kernfs_remove ((int (*) __P(( \ |
|
struct nameidata *ndp, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_link ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
struct nameidata *ndp, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_rename ((int (*) __P(( \ |
|
struct nameidata *fndp, \ |
|
struct nameidata *tdnp, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_mkdir ((int (*) __P(( \ |
|
struct nameidata *ndp, \ |
|
struct vattr *vap, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_rmdir ((int (*) __P(( \ |
|
struct nameidata *ndp, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_symlink ((int (*) __P(( \ |
|
struct nameidata *ndp, \ |
|
struct vattr *vap, \ |
|
char *target, \ |
|
struct proc *p))) kernfs_enotsupp) |
|
#define kernfs_readlink ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
struct uio *uio, \ |
|
struct ucred *cred))) kernfs_enotsupp) |
|
#define kernfs_abortop ((int (*) __P(( \ |
|
struct nameidata *ndp))) nullop) |
|
#ifdef KERNFS_DIAGNOSTIC |
|
int kernfs_reclaim(vp) |
|
struct vnode *vp; |
|
{ |
|
printf("kernfs_reclaim(%x)\n", vp); |
|
return (0); |
return (0); |
} |
} |
#else |
|
#define kernfs_reclaim ((int (*) __P(( \ |
|
struct vnode *vp))) nullop) |
|
#endif |
|
#define kernfs_lock ((int (*) __P(( \ |
|
struct vnode *vp))) nullop) |
|
#define kernfs_unlock ((int (*) __P(( \ |
|
struct vnode *vp))) nullop) |
|
#define kernfs_bmap ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
daddr_t bn, \ |
|
struct vnode **vpp, \ |
|
daddr_t *bnp))) kernfs_badop) |
|
#define kernfs_strategy ((int (*) __P(( \ |
|
struct buf *bp))) kernfs_badop) |
|
#define kernfs_islocked ((int (*) __P(( \ |
|
struct vnode *vp))) nullop) |
|
#define kernfs_advlock ((int (*) __P(( \ |
|
struct vnode *vp, \ |
|
caddr_t id, \ |
|
int op, \ |
|
struct flock *fl, \ |
|
int flags))) kernfs_enotsupp) |
|
|
|
struct vnodeops kernfs_vnodeops = { |
|
kernfs_lookup, /* lookup */ |
|
kernfs_create, /* create */ |
|
kernfs_mknod, /* mknod */ |
|
kernfs_open, /* open */ |
|
kernfs_close, /* close */ |
|
kernfs_access, /* access */ |
|
kernfs_getattr, /* getattr */ |
|
kernfs_setattr, /* setattr */ |
|
kernfs_read, /* read */ |
|
kernfs_write, /* write */ |
|
kernfs_ioctl, /* ioctl */ |
|
kernfs_select, /* select */ |
|
kernfs_mmap, /* mmap */ |
|
kernfs_fsync, /* fsync */ |
|
kernfs_seek, /* seek */ |
|
kernfs_remove, /* remove */ |
|
kernfs_link, /* link */ |
|
kernfs_rename, /* rename */ |
|
kernfs_mkdir, /* mkdir */ |
|
kernfs_rmdir, /* rmdir */ |
|
kernfs_symlink, /* symlink */ |
|
kernfs_readdir, /* readdir */ |
|
kernfs_readlink, /* readlink */ |
|
kernfs_abortop, /* abortop */ |
|
kernfs_inactive, /* inactive */ |
|
kernfs_reclaim, /* reclaim */ |
|
kernfs_lock, /* lock */ |
|
kernfs_unlock, /* unlock */ |
|
kernfs_bmap, /* bmap */ |
|
kernfs_strategy, /* strategy */ |
|
kernfs_print, /* print */ |
|
kernfs_islocked, /* islocked */ |
|
kernfs_advlock, /* advlock */ |
|
}; |
|