1 /* 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This code is derived from software donated to Berkeley by 6 * Jan-Simon Pendry. 7 * 8 * %sccs.include.redist.c% 9 * 10 * @(#)kernfs_vnops.c 8.9 (Berkeley) 06/15/94 11 */ 12 13 /* 14 * Kernel parameter filesystem (/kern) 15 */ 16 17 #include <sys/param.h> 18 #include <sys/systm.h> 19 #include <sys/kernel.h> 20 #include <sys/vmmeter.h> 21 #include <sys/types.h> 22 #include <sys/time.h> 23 #include <sys/proc.h> 24 #include <sys/vnode.h> 25 #include <sys/malloc.h> 26 #include <sys/file.h> 27 #include <sys/stat.h> 28 #include <sys/mount.h> 29 #include <sys/namei.h> 30 #include <sys/buf.h> 31 #include <sys/dirent.h> 32 #include <miscfs/kernfs/kernfs.h> 33 34 #define KSTRING 256 /* Largest I/O available via this filesystem */ 35 #define UIO_MX 32 36 37 #define READ_MODE (S_IRUSR|S_IRGRP|S_IROTH) 38 #define WRITE_MODE (S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH) 39 #define DIR_MODE (S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH) 40 41 struct kern_target { 42 u_char kt_type; 43 u_char kt_namlen; 44 char *kt_name; 45 void *kt_data; 46 #define KTT_NULL 1 47 #define KTT_TIME 5 48 #define KTT_INT 17 49 #define KTT_STRING 31 50 #define KTT_HOSTNAME 47 51 #define KTT_AVENRUN 53 52 #define KTT_DEVICE 71 53 u_char kt_tag; 54 u_char kt_vtype; 55 mode_t kt_mode; 56 } kern_targets[] = { 57 /* NOTE: The name must be less than UIO_MX-16 chars in length */ 58 #define N(s) sizeof(s)-1, s 59 /* name data tag type ro/rw */ 60 { DT_DIR, N("."), 0, KTT_NULL, VDIR, DIR_MODE }, 61 { DT_DIR, N(".."), 0, KTT_NULL, VDIR, DIR_MODE }, 62 { DT_REG, N("boottime"), &boottime.tv_sec, KTT_INT, VREG, READ_MODE }, 63 { DT_REG, N("copyright"), copyright, KTT_STRING, VREG, READ_MODE }, 64 { DT_REG, N("hostname"), 0, KTT_HOSTNAME, VREG, WRITE_MODE }, 65 { DT_REG, N("hz"), &hz, KTT_INT, VREG, READ_MODE }, 66 { DT_REG, N("loadavg"), 0, KTT_AVENRUN, VREG, READ_MODE }, 67 { DT_REG, N("pagesize"), &cnt.v_page_size, KTT_INT, VREG, READ_MODE }, 68 { DT_REG, N("physmem"), &physmem, KTT_INT, VREG, READ_MODE }, 69 #if 0 70 { DT_DIR, N("root"), 0, KTT_NULL, VDIR, DIR_MODE }, 71 #endif 72 { DT_BLK, N("rootdev"), &rootdev, KTT_DEVICE, VBLK, READ_MODE }, 73 { DT_CHR, N("rrootdev"), &rrootdev, KTT_DEVICE, VCHR, READ_MODE }, 74 { DT_REG, N("time"), 0, KTT_TIME, VREG, READ_MODE }, 75 { DT_REG, N("version"), version, KTT_STRING, VREG, READ_MODE }, 76 #undef N 77 }; 78 static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]); 79 80 static int 81 kernfs_xread(kt, buf, len, lenp) 82 struct kern_target *kt; 83 char *buf; 84 int len; 85 int *lenp; 86 { 87 88 switch (kt->kt_tag) { 89 case KTT_TIME: { 90 struct timeval tv; 91 microtime(&tv); 92 sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec); 93 break; 94 } 95 96 case KTT_INT: { 97 int *ip = kt->kt_data; 98 sprintf(buf, "%d\n", *ip); 99 break; 100 } 101 102 case KTT_STRING: { 103 char *cp = kt->kt_data; 104 int xlen = strlen(cp) + 1; 105 106 if (xlen >= len) 107 return (EINVAL); 108 109 bcopy(cp, buf, xlen); 110 break; 111 } 112 113 case KTT_HOSTNAME: { 114 char *cp = hostname; 115 int xlen = hostnamelen; 116 117 if (xlen >= (len-2)) 118 return (EINVAL); 119 120 bcopy(cp, buf, xlen); 121 buf[xlen] = '\n'; 122 buf[xlen+1] = '\0'; 123 break; 124 } 125 126 case KTT_AVENRUN: 127 sprintf(buf, "%ld %ld %ld %ld\n", 128 averunnable.ldavg[0], averunnable.ldavg[1], 129 averunnable.ldavg[2], averunnable.fscale); 130 break; 131 132 default: 133 return (EIO); 134 } 135 136 *lenp = strlen(buf); 137 return (0); 138 } 139 140 static int 141 kernfs_xwrite(kt, buf, len) 142 struct kern_target *kt; 143 char *buf; 144 int len; 145 { 146 147 switch (kt->kt_tag) { 148 case KTT_HOSTNAME: 149 if (buf[len-1] == '\n') 150 --len; 151 bcopy(buf, hostname, len); 152 hostname[len] = '\0'; 153 hostnamelen = len; 154 return (0); 155 156 default: 157 return (EIO); 158 } 159 } 160 161 162 /* 163 * vp is the current namei directory 164 * ndp is the name to locate in that directory... 165 */ 166 kernfs_lookup(ap) 167 struct vop_lookup_args /* { 168 struct vnode * a_dvp; 169 struct vnode ** a_vpp; 170 struct componentname * a_cnp; 171 } */ *ap; 172 { 173 struct componentname *cnp = ap->a_cnp; 174 struct vnode **vpp = ap->a_vpp; 175 struct vnode *dvp = ap->a_dvp; 176 char *pname = cnp->cn_nameptr; 177 struct kern_target *kt; 178 struct vnode *fvp; 179 int error, i; 180 181 #ifdef KERNFS_DIAGNOSTIC 182 printf("kernfs_lookup(%x)\n", ap); 183 printf("kernfs_lookup(dp = %x, vpp = %x, cnp = %x)\n", dvp, vpp, ap->a_cnp); 184 printf("kernfs_lookup(%s)\n", pname); 185 #endif 186 187 if (cnp->cn_namelen == 1 && *pname == '.') { 188 *vpp = dvp; 189 VREF(dvp); 190 /*VOP_LOCK(dvp);*/ 191 return (0); 192 } 193 194 #if 0 195 if (cnp->cn_namelen == 4 && bcmp(pname, "root", 4) == 0) { 196 *vpp = rootdir; 197 VREF(rootdir); 198 VOP_LOCK(rootdir); 199 return (0); 200 } 201 #endif 202 203 *vpp = NULLVP; 204 205 for (error = ENOENT, kt = kern_targets, i = 0; i < nkern_targets; 206 kt++, i++) { 207 if (cnp->cn_namelen == kt->kt_namlen && 208 bcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) { 209 error = 0; 210 break; 211 } 212 } 213 214 #ifdef KERNFS_DIAGNOSTIC 215 printf("kernfs_lookup: i = %d, error = %d\n", i, error); 216 #endif 217 218 if (error) 219 return (error); 220 221 if (kt->kt_tag == KTT_DEVICE) { 222 dev_t *dp = kt->kt_data; 223 loop: 224 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) 225 return (ENOENT); 226 *vpp = fvp; 227 if (vget(fvp, 1)) 228 goto loop; 229 return (0); 230 } 231 232 #ifdef KERNFS_DIAGNOSTIC 233 printf("kernfs_lookup: allocate new vnode\n"); 234 #endif 235 if (error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p, 236 &fvp)) 237 return (error); 238 239 MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP, 240 M_WAITOK); 241 VTOKERN(fvp)->kf_kt = kt; 242 fvp->v_type = kt->kt_vtype; 243 *vpp = fvp; 244 245 #ifdef KERNFS_DIAGNOSTIC 246 printf("kernfs_lookup: newvp = %x\n", fvp); 247 #endif 248 return (0); 249 } 250 251 kernfs_open(ap) 252 struct vop_open_args /* { 253 struct vnode *a_vp; 254 int a_mode; 255 struct ucred *a_cred; 256 struct proc *a_p; 257 } */ *ap; 258 { 259 260 /* Only need to check access permissions. */ 261 return (0); 262 } 263 264 static int 265 kernfs_access(ap) 266 struct vop_access_args /* { 267 struct vnode *a_vp; 268 int a_mode; 269 struct ucred *a_cred; 270 struct proc *a_p; 271 } */ *ap; 272 { 273 register struct vnode *vp = ap->a_vp; 274 register struct ucred *cred = ap->a_cred; 275 mode_t amode = ap->a_mode; 276 mode_t fmode = 277 (vp->v_flag & VROOT) ? DIR_MODE : VTOKERN(vp)->kf_kt->kt_mode; 278 mode_t mask = 0; 279 register gid_t *gp; 280 int i; 281 282 /* Some files are simply not modifiable. */ 283 if ((amode & VWRITE) && (fmode & (S_IWUSR|S_IWGRP|S_IWOTH)) == 0) 284 return (EPERM); 285 286 /* Root can do anything else. */ 287 if (cred->cr_uid == 0) 288 return (0); 289 290 /* Check for group 0 (wheel) permissions. */ 291 for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++) 292 if (*gp == 0) { 293 if (amode & VEXEC) 294 mask |= S_IXGRP; 295 if (amode & VREAD) 296 mask |= S_IRGRP; 297 if (amode & VWRITE) 298 mask |= S_IWGRP; 299 return ((fmode & mask) == mask ? 0 : EACCES); 300 } 301 302 /* Otherwise, check everyone else. */ 303 if (amode & VEXEC) 304 mask |= S_IXOTH; 305 if (amode & VREAD) 306 mask |= S_IROTH; 307 if (amode & VWRITE) 308 mask |= S_IWOTH; 309 return ((fmode & mask) == mask ? 0 : EACCES); 310 } 311 312 kernfs_getattr(ap) 313 struct vop_getattr_args /* { 314 struct vnode *a_vp; 315 struct vattr *a_vap; 316 struct ucred *a_cred; 317 struct proc *a_p; 318 } */ *ap; 319 { 320 struct vnode *vp = ap->a_vp; 321 struct vattr *vap = ap->a_vap; 322 int error = 0; 323 char strbuf[KSTRING]; 324 325 bzero((caddr_t) vap, sizeof(*vap)); 326 vattr_null(vap); 327 vap->va_uid = 0; 328 vap->va_gid = 0; 329 vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; 330 vap->va_size = 0; 331 vap->va_blocksize = DEV_BSIZE; 332 microtime(&vap->va_atime); 333 vap->va_mtime = vap->va_atime; 334 vap->va_ctime = vap->va_ctime; 335 vap->va_gen = 0; 336 vap->va_flags = 0; 337 vap->va_rdev = 0; 338 vap->va_bytes = 0; 339 340 if (vp->v_flag & VROOT) { 341 #ifdef KERNFS_DIAGNOSTIC 342 printf("kernfs_getattr: stat rootdir\n"); 343 #endif 344 vap->va_type = VDIR; 345 vap->va_mode = DIR_MODE; 346 vap->va_nlink = 2; 347 vap->va_fileid = 2; 348 vap->va_size = DEV_BSIZE; 349 } else { 350 struct kern_target *kt = VTOKERN(vp)->kf_kt; 351 int nbytes; 352 #ifdef KERNFS_DIAGNOSTIC 353 printf("kernfs_getattr: stat target %s\n", kt->kt_name); 354 #endif 355 vap->va_type = kt->kt_vtype; 356 vap->va_mode = kt->kt_mode; 357 vap->va_nlink = 1; 358 vap->va_fileid = 1 + (kt - kern_targets) / sizeof(*kt); 359 error = kernfs_xread(kt, strbuf, sizeof(strbuf), &nbytes); 360 vap->va_size = nbytes; 361 } 362 363 #ifdef KERNFS_DIAGNOSTIC 364 printf("kernfs_getattr: return error %d\n", error); 365 #endif 366 return (error); 367 } 368 369 kernfs_setattr(ap) 370 struct vop_setattr_args /* { 371 struct vnode *a_vp; 372 struct vattr *a_vap; 373 struct ucred *a_cred; 374 struct proc *a_p; 375 } */ *ap; 376 { 377 378 /* 379 * Silently ignore attribute changes. 380 * This allows for open with truncate to have no 381 * effect until some data is written. I want to 382 * do it this way because all writes are atomic. 383 */ 384 return (0); 385 } 386 387 static int 388 kernfs_read(ap) 389 struct vop_read_args /* { 390 struct vnode *a_vp; 391 struct uio *a_uio; 392 int a_ioflag; 393 struct ucred *a_cred; 394 } */ *ap; 395 { 396 struct vnode *vp = ap->a_vp; 397 struct uio *uio = ap->a_uio; 398 struct kern_target *kt; 399 char strbuf[KSTRING]; 400 int off = uio->uio_offset; 401 int error, len; 402 char *cp; 403 404 if (vp->v_type == VDIR) 405 return (EOPNOTSUPP); 406 407 kt = VTOKERN(vp)->kf_kt; 408 409 #ifdef KERNFS_DIAGNOSTIC 410 printf("kern_read %s\n", kt->kt_name); 411 #endif 412 413 len = 0; 414 if (error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len)) 415 return (error); 416 if (len <= off) 417 return (0); 418 return (uiomove(&strbuf[off], len - off, uio)); 419 } 420 421 static int 422 kernfs_write(ap) 423 struct vop_write_args /* { 424 struct vnode *a_vp; 425 struct uio *a_uio; 426 int a_ioflag; 427 struct ucred *a_cred; 428 } */ *ap; 429 { 430 struct vnode *vp = ap->a_vp; 431 struct uio *uio = ap->a_uio; 432 struct kern_target *kt; 433 int error, xlen; 434 char strbuf[KSTRING]; 435 436 if (vp->v_type == VDIR) 437 return (EOPNOTSUPP); 438 439 kt = VTOKERN(vp)->kf_kt; 440 441 if (uio->uio_offset != 0) 442 return (EINVAL); 443 444 xlen = min(uio->uio_resid, KSTRING-1); 445 if (error = uiomove(strbuf, xlen, uio)) 446 return (error); 447 448 if (uio->uio_resid != 0) 449 return (EIO); 450 451 strbuf[xlen] = '\0'; 452 xlen = strlen(strbuf); 453 return (kernfs_xwrite(kt, strbuf, xlen)); 454 } 455 456 kernfs_readdir(ap) 457 struct vop_readdir_args /* { 458 struct vnode *a_vp; 459 struct uio *a_uio; 460 struct ucred *a_cred; 461 int *a_eofflag; 462 u_long *a_cookies; 463 int a_ncookies; 464 } */ *ap; 465 { 466 int error, i; 467 struct uio *uio = ap->a_uio; 468 struct kern_target *kt; 469 struct dirent d; 470 471 if (ap->a_vp->v_type != VDIR) 472 return (ENOTDIR); 473 474 /* 475 * We don't allow exporting kernfs mounts, and currently local 476 * requests do not need cookies. 477 */ 478 if (ap->a_ncookies != NULL) 479 panic("kernfs_readdir: not hungry"); 480 481 i = uio->uio_offset / UIO_MX; 482 error = 0; 483 for (kt = &kern_targets[i]; 484 uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) { 485 struct dirent *dp = &d; 486 #ifdef KERNFS_DIAGNOSTIC 487 printf("kernfs_readdir: i = %d\n", i); 488 #endif 489 490 if (kt->kt_tag == KTT_DEVICE) { 491 dev_t *dp = kt->kt_data; 492 struct vnode *fvp; 493 494 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) 495 continue; 496 } 497 498 bzero((caddr_t)dp, UIO_MX); 499 dp->d_namlen = kt->kt_namlen; 500 bcopy(kt->kt_name, dp->d_name, kt->kt_namlen+1); 501 502 #ifdef KERNFS_DIAGNOSTIC 503 printf("kernfs_readdir: name = %s, len = %d\n", 504 dp->d_name, dp->d_namlen); 505 #endif 506 /* 507 * Fill in the remaining fields 508 */ 509 dp->d_reclen = UIO_MX; 510 dp->d_fileno = i + 3; 511 dp->d_type = kt->kt_type; 512 /* 513 * And ship to userland 514 */ 515 if (error = uiomove((caddr_t)dp, UIO_MX, uio)) 516 break; 517 } 518 519 uio->uio_offset = i * UIO_MX; 520 521 return (error); 522 } 523 524 kernfs_inactive(ap) 525 struct vop_inactive_args /* { 526 struct vnode *a_vp; 527 } */ *ap; 528 { 529 struct vnode *vp = ap->a_vp; 530 531 #ifdef KERNFS_DIAGNOSTIC 532 printf("kernfs_inactive(%x)\n", vp); 533 #endif 534 /* 535 * Clear out the v_type field to avoid 536 * nasty things happening in vgone(). 537 */ 538 vp->v_type = VNON; 539 return (0); 540 } 541 542 kernfs_reclaim(ap) 543 struct vop_reclaim_args /* { 544 struct vnode *a_vp; 545 } */ *ap; 546 { 547 struct vnode *vp = ap->a_vp; 548 549 #ifdef KERNFS_DIAGNOSTIC 550 printf("kernfs_reclaim(%x)\n", vp); 551 #endif 552 if (vp->v_data) { 553 FREE(vp->v_data, M_TEMP); 554 vp->v_data = 0; 555 } 556 return (0); 557 } 558 559 /* 560 * Return POSIX pathconf information applicable to special devices. 561 */ 562 kernfs_pathconf(ap) 563 struct vop_pathconf_args /* { 564 struct vnode *a_vp; 565 int a_name; 566 int *a_retval; 567 } */ *ap; 568 { 569 570 switch (ap->a_name) { 571 case _PC_LINK_MAX: 572 *ap->a_retval = LINK_MAX; 573 return (0); 574 case _PC_MAX_CANON: 575 *ap->a_retval = MAX_CANON; 576 return (0); 577 case _PC_MAX_INPUT: 578 *ap->a_retval = MAX_INPUT; 579 return (0); 580 case _PC_PIPE_BUF: 581 *ap->a_retval = PIPE_BUF; 582 return (0); 583 case _PC_CHOWN_RESTRICTED: 584 *ap->a_retval = 1; 585 return (0); 586 case _PC_VDISABLE: 587 *ap->a_retval = _POSIX_VDISABLE; 588 return (0); 589 default: 590 return (EINVAL); 591 } 592 /* NOTREACHED */ 593 } 594 595 /* 596 * Print out the contents of a /dev/fd vnode. 597 */ 598 /* ARGSUSED */ 599 kernfs_print(ap) 600 struct vop_print_args /* { 601 struct vnode *a_vp; 602 } */ *ap; 603 { 604 605 printf("tag VT_KERNFS, kernfs vnode\n"); 606 return (0); 607 } 608 609 /*void*/ 610 kernfs_vfree(ap) 611 struct vop_vfree_args /* { 612 struct vnode *a_pvp; 613 ino_t a_ino; 614 int a_mode; 615 } */ *ap; 616 { 617 618 return (0); 619 } 620 621 /* 622 * /dev/fd vnode unsupported operation 623 */ 624 kernfs_enotsupp() 625 { 626 627 return (EOPNOTSUPP); 628 } 629 630 /* 631 * /dev/fd "should never get here" operation 632 */ 633 kernfs_badop() 634 { 635 636 panic("kernfs: bad op"); 637 /* NOTREACHED */ 638 } 639 640 /* 641 * kernfs vnode null operation 642 */ 643 kernfs_nullop() 644 { 645 646 return (0); 647 } 648 649 #define kernfs_create ((int (*) __P((struct vop_create_args *)))kernfs_enotsupp) 650 #define kernfs_mknod ((int (*) __P((struct vop_mknod_args *)))kernfs_enotsupp) 651 #define kernfs_close ((int (*) __P((struct vop_close_args *)))nullop) 652 #define kernfs_ioctl ((int (*) __P((struct vop_ioctl_args *)))kernfs_enotsupp) 653 #define kernfs_select ((int (*) __P((struct vop_select_args *)))kernfs_enotsupp) 654 #define kernfs_mmap ((int (*) __P((struct vop_mmap_args *)))kernfs_enotsupp) 655 #define kernfs_fsync ((int (*) __P((struct vop_fsync_args *)))nullop) 656 #define kernfs_seek ((int (*) __P((struct vop_seek_args *)))nullop) 657 #define kernfs_remove ((int (*) __P((struct vop_remove_args *)))kernfs_enotsupp) 658 #define kernfs_link ((int (*) __P((struct vop_link_args *)))kernfs_enotsupp) 659 #define kernfs_rename ((int (*) __P((struct vop_rename_args *)))kernfs_enotsupp) 660 #define kernfs_mkdir ((int (*) __P((struct vop_mkdir_args *)))kernfs_enotsupp) 661 #define kernfs_rmdir ((int (*) __P((struct vop_rmdir_args *)))kernfs_enotsupp) 662 #define kernfs_symlink ((int (*) __P((struct vop_symlink_args *)))kernfs_enotsupp) 663 #define kernfs_readlink \ 664 ((int (*) __P((struct vop_readlink_args *)))kernfs_enotsupp) 665 #define kernfs_abortop ((int (*) __P((struct vop_abortop_args *)))nullop) 666 #define kernfs_lock ((int (*) __P((struct vop_lock_args *)))nullop) 667 #define kernfs_unlock ((int (*) __P((struct vop_unlock_args *)))nullop) 668 #define kernfs_bmap ((int (*) __P((struct vop_bmap_args *)))kernfs_badop) 669 #define kernfs_strategy ((int (*) __P((struct vop_strategy_args *)))kernfs_badop) 670 #define kernfs_islocked ((int (*) __P((struct vop_islocked_args *)))nullop) 671 #define kernfs_advlock ((int (*) __P((struct vop_advlock_args *)))kernfs_enotsupp) 672 #define kernfs_blkatoff \ 673 ((int (*) __P((struct vop_blkatoff_args *)))kernfs_enotsupp) 674 #define kernfs_valloc ((int(*) __P(( \ 675 struct vnode *pvp, \ 676 int mode, \ 677 struct ucred *cred, \ 678 struct vnode **vpp))) kernfs_enotsupp) 679 #define kernfs_truncate \ 680 ((int (*) __P((struct vop_truncate_args *)))kernfs_enotsupp) 681 #define kernfs_update ((int (*) __P((struct vop_update_args *)))kernfs_enotsupp) 682 #define kernfs_bwrite ((int (*) __P((struct vop_bwrite_args *)))kernfs_enotsupp) 683 684 int (**kernfs_vnodeop_p)(); 685 struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = { 686 { &vop_default_desc, vn_default_error }, 687 { &vop_lookup_desc, kernfs_lookup }, /* lookup */ 688 { &vop_create_desc, kernfs_create }, /* create */ 689 { &vop_mknod_desc, kernfs_mknod }, /* mknod */ 690 { &vop_open_desc, kernfs_open }, /* open */ 691 { &vop_close_desc, kernfs_close }, /* close */ 692 { &vop_access_desc, kernfs_access }, /* access */ 693 { &vop_getattr_desc, kernfs_getattr }, /* getattr */ 694 { &vop_setattr_desc, kernfs_setattr }, /* setattr */ 695 { &vop_read_desc, kernfs_read }, /* read */ 696 { &vop_write_desc, kernfs_write }, /* write */ 697 { &vop_ioctl_desc, kernfs_ioctl }, /* ioctl */ 698 { &vop_select_desc, kernfs_select }, /* select */ 699 { &vop_mmap_desc, kernfs_mmap }, /* mmap */ 700 { &vop_fsync_desc, kernfs_fsync }, /* fsync */ 701 { &vop_seek_desc, kernfs_seek }, /* seek */ 702 { &vop_remove_desc, kernfs_remove }, /* remove */ 703 { &vop_link_desc, kernfs_link }, /* link */ 704 { &vop_rename_desc, kernfs_rename }, /* rename */ 705 { &vop_mkdir_desc, kernfs_mkdir }, /* mkdir */ 706 { &vop_rmdir_desc, kernfs_rmdir }, /* rmdir */ 707 { &vop_symlink_desc, kernfs_symlink }, /* symlink */ 708 { &vop_readdir_desc, kernfs_readdir }, /* readdir */ 709 { &vop_readlink_desc, kernfs_readlink },/* readlink */ 710 { &vop_abortop_desc, kernfs_abortop }, /* abortop */ 711 { &vop_inactive_desc, kernfs_inactive },/* inactive */ 712 { &vop_reclaim_desc, kernfs_reclaim }, /* reclaim */ 713 { &vop_lock_desc, kernfs_lock }, /* lock */ 714 { &vop_unlock_desc, kernfs_unlock }, /* unlock */ 715 { &vop_bmap_desc, kernfs_bmap }, /* bmap */ 716 { &vop_strategy_desc, kernfs_strategy },/* strategy */ 717 { &vop_print_desc, kernfs_print }, /* print */ 718 { &vop_islocked_desc, kernfs_islocked },/* islocked */ 719 { &vop_pathconf_desc, kernfs_pathconf },/* pathconf */ 720 { &vop_advlock_desc, kernfs_advlock }, /* advlock */ 721 { &vop_blkatoff_desc, kernfs_blkatoff },/* blkatoff */ 722 { &vop_valloc_desc, kernfs_valloc }, /* valloc */ 723 { &vop_vfree_desc, kernfs_vfree }, /* vfree */ 724 { &vop_truncate_desc, kernfs_truncate },/* truncate */ 725 { &vop_update_desc, kernfs_update }, /* update */ 726 { &vop_bwrite_desc, kernfs_bwrite }, /* bwrite */ 727 { (struct vnodeop_desc*)NULL, (int(*)())NULL } 728 }; 729 struct vnodeopv_desc kernfs_vnodeop_opv_desc = 730 { &kernfs_vnodeop_p, kernfs_vnodeop_entries }; 731