155344Spendry /* 263233Sbostic * Copyright (c) 1992, 1993 363233Sbostic * The Regents of the University of California. All rights reserved. 455344Spendry * 555344Spendry * This code is derived from software donated to Berkeley by 655344Spendry * Jan-Simon Pendry. 755344Spendry * 855344Spendry * %sccs.include.redist.c% 955344Spendry * 10*67387Spendry * @(#)kernfs_vnops.c 8.8 (Berkeley) 06/15/94 1155344Spendry */ 1255344Spendry 1355344Spendry /* 1455344Spendry * Kernel parameter filesystem (/kern) 1555344Spendry */ 1655344Spendry 1755344Spendry #include <sys/param.h> 1855344Spendry #include <sys/systm.h> 1955344Spendry #include <sys/kernel.h> 2055344Spendry #include <sys/vmmeter.h> 2155344Spendry #include <sys/types.h> 2255344Spendry #include <sys/time.h> 2355344Spendry #include <sys/proc.h> 2455344Spendry #include <sys/vnode.h> 2555344Spendry #include <sys/malloc.h> 2655344Spendry #include <sys/file.h> 2755344Spendry #include <sys/stat.h> 2855344Spendry #include <sys/mount.h> 2955344Spendry #include <sys/namei.h> 3055344Spendry #include <sys/buf.h> 3155344Spendry #include <sys/dirent.h> 3255344Spendry #include <miscfs/kernfs/kernfs.h> 3355344Spendry 3455344Spendry #define KSTRING 256 /* Largest I/O available via this filesystem */ 3555344Spendry #define UIO_MX 32 3655344Spendry 3755356Spendry #define READ_MODE (S_IRUSR|S_IRGRP|S_IROTH) 3855356Spendry #define WRITE_MODE (S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH) 3955356Spendry #define DIR_MODE (S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH) 4055356Spendry 4155344Spendry struct kern_target { 42*67387Spendry u_char kt_type; 43*67387Spendry u_char kt_namlen; 4455344Spendry char *kt_name; 4555344Spendry void *kt_data; 46*67387Spendry #define KTT_NULL 1 47*67387Spendry #define KTT_TIME 5 48*67387Spendry #define KTT_INT 17 49*67387Spendry #define KTT_STRING 31 50*67387Spendry #define KTT_HOSTNAME 47 51*67387Spendry #define KTT_AVENRUN 53 52*67387Spendry #define KTT_DEVICE 71 53*67387Spendry u_char kt_tag; 54*67387Spendry u_char kt_vtype; 55*67387Spendry mode_t kt_mode; 5655344Spendry } kern_targets[] = { 5755344Spendry /* NOTE: The name must be less than UIO_MX-16 chars in length */ 58*67387Spendry #define N(s) sizeof(s)-1, s 59*67387Spendry /* name data tag type ro/rw */ 60*67387Spendry { DT_DIR, N("."), 0, KTT_NULL, VDIR, DIR_MODE }, 61*67387Spendry { DT_DIR, N(".."), 0, KTT_NULL, VDIR, DIR_MODE }, 62*67387Spendry { DT_REG, N("boottime"), &boottime.tv_sec, KTT_INT, VREG, READ_MODE }, 63*67387Spendry { DT_REG, N("copyright"), copyright, KTT_STRING, VREG, READ_MODE }, 64*67387Spendry { DT_REG, N("hostname"), 0, KTT_HOSTNAME, VREG, WRITE_MODE }, 65*67387Spendry { DT_REG, N("hz"), &hz, KTT_INT, VREG, READ_MODE }, 66*67387Spendry { DT_REG, N("loadavg"), 0, KTT_AVENRUN, VREG, READ_MODE }, 67*67387Spendry { DT_REG, N("pagesize"), &cnt.v_page_size, KTT_INT, VREG, READ_MODE }, 68*67387Spendry { DT_REG, N("physmem"), &physmem, KTT_INT, VREG, READ_MODE }, 6959556Spendry #if 0 70*67387Spendry { DT_DIR, N("root"), 0, KTT_NULL, VDIR, DIR_MODE }, 7159556Spendry #endif 72*67387Spendry { DT_BLK, N("rootdev"), &rootdev, KTT_DEVICE, VBLK, READ_MODE }, 73*67387Spendry { DT_CHR, N("rrootdev"), &rrootdev, KTT_DEVICE, VCHR, READ_MODE }, 74*67387Spendry { DT_REG, N("time"), 0, KTT_TIME, VREG, READ_MODE }, 75*67387Spendry { DT_REG, N("version"), version, KTT_STRING, VREG, READ_MODE }, 76*67387Spendry #undef N 7755344Spendry }; 7855344Spendry static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]); 7955344Spendry 8055344Spendry static int 8155344Spendry kernfs_xread(kt, buf, len, lenp) 8255344Spendry struct kern_target *kt; 8355344Spendry char *buf; 8455344Spendry int len; 8555344Spendry int *lenp; 8655344Spendry { 87*67387Spendry 8855344Spendry switch (kt->kt_tag) { 8955344Spendry case KTT_TIME: { 9055344Spendry struct timeval tv; 9155344Spendry microtime(&tv); 9255344Spendry sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec); 9355344Spendry break; 9455344Spendry } 9555344Spendry 9655344Spendry case KTT_INT: { 9755344Spendry int *ip = kt->kt_data; 9855344Spendry sprintf(buf, "%d\n", *ip); 9955344Spendry break; 10055344Spendry } 10155344Spendry 10255344Spendry case KTT_STRING: { 10355344Spendry char *cp = kt->kt_data; 10455344Spendry int xlen = strlen(cp) + 1; 10555344Spendry 10655344Spendry if (xlen >= len) 10755344Spendry return (EINVAL); 10855344Spendry 10955344Spendry bcopy(cp, buf, xlen); 11055344Spendry break; 11155344Spendry } 11255344Spendry 11355344Spendry case KTT_HOSTNAME: { 11455344Spendry char *cp = hostname; 11555344Spendry int xlen = hostnamelen; 11655344Spendry 11759556Spendry if (xlen >= (len-2)) 11855344Spendry return (EINVAL); 11955344Spendry 12059556Spendry bcopy(cp, buf, xlen); 12159556Spendry buf[xlen] = '\n'; 12259556Spendry buf[xlen+1] = '\0'; 12355344Spendry break; 12455344Spendry } 12555344Spendry 12655344Spendry case KTT_AVENRUN: 12755344Spendry sprintf(buf, "%ld %ld %ld %ld\n", 128*67387Spendry averunnable.ldavg[0], averunnable.ldavg[1], 129*67387Spendry averunnable.ldavg[2], averunnable.fscale); 13055344Spendry break; 13155344Spendry 13255344Spendry default: 133*67387Spendry return (EIO); 13455344Spendry } 13555344Spendry 13655344Spendry *lenp = strlen(buf); 13755344Spendry return (0); 13855344Spendry } 13955344Spendry 14055344Spendry static int 14155344Spendry kernfs_xwrite(kt, buf, len) 14255344Spendry struct kern_target *kt; 14355344Spendry char *buf; 14455344Spendry int len; 14555344Spendry { 146*67387Spendry 14755344Spendry switch (kt->kt_tag) { 148*67387Spendry case KTT_HOSTNAME: 14955344Spendry if (buf[len-1] == '\n') 15055344Spendry --len; 15155344Spendry bcopy(buf, hostname, len); 15259556Spendry hostname[len] = '\0'; 15359556Spendry hostnamelen = len; 15455344Spendry return (0); 15555344Spendry 15655344Spendry default: 15755344Spendry return (EIO); 15855344Spendry } 15955344Spendry } 16055344Spendry 16155344Spendry 16255344Spendry /* 16355344Spendry * vp is the current namei directory 16455344Spendry * ndp is the name to locate in that directory... 16555344Spendry */ 16655344Spendry kernfs_lookup(ap) 16755344Spendry struct vop_lookup_args /* { 16855344Spendry struct vnode * a_dvp; 16955344Spendry struct vnode ** a_vpp; 17055344Spendry struct componentname * a_cnp; 17155344Spendry } */ *ap; 17255344Spendry { 173*67387Spendry struct componentname *cnp = ap->a_cnp; 17455344Spendry struct vnode **vpp = ap->a_vpp; 17555344Spendry struct vnode *dvp = ap->a_dvp; 176*67387Spendry char *pname = cnp->cn_nameptr; 177*67387Spendry struct kern_target *kt; 17865446Sbostic struct vnode *fvp; 17965446Sbostic int error, i; 18055344Spendry 18155344Spendry #ifdef KERNFS_DIAGNOSTIC 18255344Spendry printf("kernfs_lookup(%x)\n", ap); 18355344Spendry printf("kernfs_lookup(dp = %x, vpp = %x, cnp = %x)\n", dvp, vpp, ap->a_cnp); 18455344Spendry printf("kernfs_lookup(%s)\n", pname); 18555344Spendry #endif 186*67387Spendry 18755344Spendry if (cnp->cn_namelen == 1 && *pname == '.') { 18855344Spendry *vpp = dvp; 18955350Spendry VREF(dvp); 19055344Spendry /*VOP_LOCK(dvp);*/ 19155344Spendry return (0); 19255344Spendry } 19355344Spendry 19459556Spendry #if 0 19555344Spendry if (cnp->cn_namelen == 4 && bcmp(pname, "root", 4) == 0) { 19655344Spendry *vpp = rootdir; 19755344Spendry VREF(rootdir); 19855344Spendry VOP_LOCK(rootdir); 19955344Spendry return (0); 20055344Spendry } 20159556Spendry #endif 20255350Spendry 203*67387Spendry for (error = ENOENT, kt = kern_targets, i = 0; i < nkern_targets; 204*67387Spendry kt++, i++) { 205*67387Spendry if (cnp->cn_namelen == kt->kt_namlen && 20655344Spendry bcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) { 20755344Spendry error = 0; 20855344Spendry break; 20955344Spendry } 21055344Spendry } 21155344Spendry 21255344Spendry #ifdef KERNFS_DIAGNOSTIC 21355344Spendry printf("kernfs_lookup: i = %d, error = %d\n", i, error); 21455344Spendry #endif 21555344Spendry 21655344Spendry if (error) 217*67387Spendry return (error); 21855344Spendry 219*67387Spendry if (kt->kt_tag == KTT_DEVICE) { 220*67387Spendry dev_t *dp = kt->kt_data; 221*67387Spendry loop: 222*67387Spendry if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) 223*67387Spendry return (ENOENT); 224*67387Spendry *vpp = fvp; 225*67387Spendry if (vget(fvp, 1)) 226*67387Spendry goto loop; 227*67387Spendry return (0); 228*67387Spendry } 229*67387Spendry 23055344Spendry #ifdef KERNFS_DIAGNOSTIC 23155344Spendry printf("kernfs_lookup: allocate new vnode\n"); 23255344Spendry #endif 233*67387Spendry if (error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p, 234*67387Spendry &fvp)) 235*67387Spendry return (error); 236*67387Spendry 237*67387Spendry MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP, 238*67387Spendry M_WAITOK); 239*67387Spendry VTOKERN(fvp)->kf_kt = kt; 240*67387Spendry fvp->v_type = kt->kt_vtype; 24155344Spendry *vpp = fvp; 242*67387Spendry 24355344Spendry #ifdef KERNFS_DIAGNOSTIC 24455344Spendry printf("kernfs_lookup: newvp = %x\n", fvp); 24555344Spendry #endif 24655344Spendry return (0); 24755344Spendry } 24855344Spendry 24955344Spendry kernfs_open(ap) 25055344Spendry struct vop_open_args /* { 25155344Spendry struct vnode *a_vp; 25255344Spendry int a_mode; 25355344Spendry struct ucred *a_cred; 25455344Spendry struct proc *a_p; 25555344Spendry } */ *ap; 25655344Spendry { 25755344Spendry 258*67387Spendry /* Only need to check access permissions. */ 25955344Spendry return (0); 26055344Spendry } 26155344Spendry 26255344Spendry static int 26355344Spendry kernfs_access(ap) 26455344Spendry struct vop_access_args /* { 26555344Spendry struct vnode *a_vp; 26655344Spendry int a_mode; 26755344Spendry struct ucred *a_cred; 26855344Spendry struct proc *a_p; 26955344Spendry } */ *ap; 27055344Spendry { 271*67387Spendry register struct vnode *vp = ap->a_vp; 272*67387Spendry register struct ucred *cred = ap->a_cred; 273*67387Spendry mode_t amode = ap->a_mode; 274*67387Spendry mode_t fmode = 275*67387Spendry (vp->v_flag & VROOT) ? DIR_MODE : VTOKERN(vp)->kf_kt->kt_mode; 276*67387Spendry mode_t mask = 0; 277*67387Spendry register gid_t *gp; 278*67387Spendry int i; 27955344Spendry 280*67387Spendry /* Some files are simply not modifiable. */ 281*67387Spendry if ((amode & VWRITE) && (fmode & (S_IWUSR|S_IWGRP|S_IWOTH)) == 0) 282*67387Spendry return (EPERM); 28355344Spendry 284*67387Spendry /* Root can do anything else. */ 285*67387Spendry if (cred->cr_uid == 0) 286*67387Spendry return (0); 28756497Smckusick 288*67387Spendry /* Check for group 0 (wheel) permissions. */ 289*67387Spendry for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++) 290*67387Spendry if (*gp == 0) { 291*67387Spendry if (amode & VEXEC) 292*67387Spendry mask |= S_IXGRP; 293*67387Spendry if (amode & VREAD) 294*67387Spendry mask |= S_IRGRP; 295*67387Spendry if (amode & VWRITE) 296*67387Spendry mask |= S_IWGRP; 297*67387Spendry return ((fmode & mask) == mask ? 0 : EACCES); 29856497Smckusick } 29955344Spendry 300*67387Spendry /* Otherwise, check everyone else. */ 301*67387Spendry if (amode & VEXEC) 302*67387Spendry mask |= S_IXOTH; 303*67387Spendry if (amode & VREAD) 304*67387Spendry mask |= S_IROTH; 305*67387Spendry if (amode & VWRITE) 306*67387Spendry mask |= S_IWOTH; 307*67387Spendry return ((fmode & mask) == mask ? 0 : EACCES); 30855344Spendry } 30955344Spendry 31055344Spendry kernfs_getattr(ap) 31155344Spendry struct vop_getattr_args /* { 31255344Spendry struct vnode *a_vp; 31355344Spendry struct vattr *a_vap; 31455344Spendry struct ucred *a_cred; 31555344Spendry struct proc *a_p; 31655344Spendry } */ *ap; 31755344Spendry { 31855344Spendry struct vnode *vp = ap->a_vp; 31955344Spendry struct vattr *vap = ap->a_vap; 32055344Spendry int error = 0; 32155344Spendry char strbuf[KSTRING]; 32255344Spendry 32355344Spendry bzero((caddr_t) vap, sizeof(*vap)); 32455344Spendry vattr_null(vap); 32555344Spendry vap->va_uid = 0; 32655344Spendry vap->va_gid = 0; 32755344Spendry vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; 328*67387Spendry vap->va_size = 0; 32955344Spendry vap->va_blocksize = DEV_BSIZE; 33055344Spendry microtime(&vap->va_atime); 33155344Spendry vap->va_mtime = vap->va_atime; 33255344Spendry vap->va_ctime = vap->va_ctime; 33355344Spendry vap->va_gen = 0; 33455344Spendry vap->va_flags = 0; 33555344Spendry vap->va_rdev = 0; 33655344Spendry vap->va_bytes = 0; 33755344Spendry 33855344Spendry if (vp->v_flag & VROOT) { 33955344Spendry #ifdef KERNFS_DIAGNOSTIC 34055344Spendry printf("kernfs_getattr: stat rootdir\n"); 34155344Spendry #endif 34255344Spendry vap->va_type = VDIR; 34355356Spendry vap->va_mode = DIR_MODE; 34455344Spendry vap->va_nlink = 2; 34555344Spendry vap->va_fileid = 2; 34655344Spendry vap->va_size = DEV_BSIZE; 34755344Spendry } else { 34856497Smckusick struct kern_target *kt = VTOKERN(vp)->kf_kt; 34955344Spendry int nbytes; 35055344Spendry #ifdef KERNFS_DIAGNOSTIC 35155344Spendry printf("kernfs_getattr: stat target %s\n", kt->kt_name); 35255344Spendry #endif 35355344Spendry vap->va_type = kt->kt_vtype; 354*67387Spendry vap->va_mode = kt->kt_mode; 35555344Spendry vap->va_nlink = 1; 356*67387Spendry vap->va_fileid = 1 + (kt - kern_targets) / sizeof(*kt); 35755344Spendry error = kernfs_xread(kt, strbuf, sizeof(strbuf), &nbytes); 35855344Spendry vap->va_size = nbytes; 35955344Spendry } 36055344Spendry 36155344Spendry #ifdef KERNFS_DIAGNOSTIC 36255344Spendry printf("kernfs_getattr: return error %d\n", error); 36355344Spendry #endif 36455344Spendry return (error); 36555344Spendry } 36655344Spendry 36755344Spendry kernfs_setattr(ap) 36855344Spendry struct vop_setattr_args /* { 36955344Spendry struct vnode *a_vp; 37055344Spendry struct vattr *a_vap; 37155344Spendry struct ucred *a_cred; 37255344Spendry struct proc *a_p; 37355344Spendry } */ *ap; 37455344Spendry { 37555344Spendry 37655344Spendry /* 37755344Spendry * Silently ignore attribute changes. 37855344Spendry * This allows for open with truncate to have no 37955344Spendry * effect until some data is written. I want to 38055344Spendry * do it this way because all writes are atomic. 38155344Spendry */ 38255344Spendry return (0); 38355344Spendry } 38455344Spendry 38555344Spendry static int 38655344Spendry kernfs_read(ap) 38755344Spendry struct vop_read_args /* { 38855344Spendry struct vnode *a_vp; 38955344Spendry struct uio *a_uio; 39055344Spendry int a_ioflag; 39155344Spendry struct ucred *a_cred; 39255344Spendry } */ *ap; 39355344Spendry { 39455344Spendry struct vnode *vp = ap->a_vp; 39555344Spendry struct uio *uio = ap->a_uio; 39656497Smckusick struct kern_target *kt; 39755344Spendry char strbuf[KSTRING]; 39855344Spendry int off = uio->uio_offset; 39965446Sbostic int error, len; 40065446Sbostic char *cp; 40156497Smckusick 402*67387Spendry if (vp->v_type == VDIR) 40366052Spendry return (EOPNOTSUPP); 40456497Smckusick 40556497Smckusick kt = VTOKERN(vp)->kf_kt; 40656497Smckusick 40755344Spendry #ifdef KERNFS_DIAGNOSTIC 40855344Spendry printf("kern_read %s\n", kt->kt_name); 40955344Spendry #endif 41055344Spendry 41165446Sbostic len = 0; 412*67387Spendry if (error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len)) 41355344Spendry return (error); 414*67387Spendry if (len <= off) 415*67387Spendry return (0); 416*67387Spendry return (uiomove(&strbuf[off], len - off, uio)); 41755344Spendry } 41855344Spendry 41955344Spendry static int 42055344Spendry kernfs_write(ap) 42155344Spendry struct vop_write_args /* { 42255344Spendry struct vnode *a_vp; 42355344Spendry struct uio *a_uio; 42455344Spendry int a_ioflag; 42555344Spendry struct ucred *a_cred; 42655344Spendry } */ *ap; 42755344Spendry { 42855344Spendry struct vnode *vp = ap->a_vp; 42955344Spendry struct uio *uio = ap->a_uio; 43056497Smckusick struct kern_target *kt; 43165446Sbostic int error, xlen; 43255344Spendry char strbuf[KSTRING]; 43355344Spendry 434*67387Spendry if (vp->v_type == VDIR) 435*67387Spendry return (EOPNOTSUPP); 43656497Smckusick 43756497Smckusick kt = VTOKERN(vp)->kf_kt; 43856497Smckusick 43955344Spendry if (uio->uio_offset != 0) 44055344Spendry return (EINVAL); 44155344Spendry 44255344Spendry xlen = min(uio->uio_resid, KSTRING-1); 443*67387Spendry if (error = uiomove(strbuf, xlen, uio)) 44455344Spendry return (error); 44555344Spendry 44655344Spendry if (uio->uio_resid != 0) 44755344Spendry return (EIO); 44855344Spendry 44955344Spendry strbuf[xlen] = '\0'; 45059556Spendry xlen = strlen(strbuf); 45155344Spendry return (kernfs_xwrite(kt, strbuf, xlen)); 45255344Spendry } 45355344Spendry 45455344Spendry kernfs_readdir(ap) 45555344Spendry struct vop_readdir_args /* { 45655344Spendry struct vnode *a_vp; 45755344Spendry struct uio *a_uio; 45855344Spendry struct ucred *a_cred; 45967365Smckusick int *a_eofflag; 46067365Smckusick u_long *a_cookies; 46167365Smckusick int a_ncookies; 46255344Spendry } */ *ap; 46355344Spendry { 464*67387Spendry int error, i; 46555344Spendry struct uio *uio = ap->a_uio; 466*67387Spendry struct kern_target *kt; 467*67387Spendry struct dirent d; 46855344Spendry 469*67387Spendry if (ap->a_vp->v_type != VDIR) 470*67387Spendry return (ENOTDIR); 471*67387Spendry 47267365Smckusick /* 47367365Smckusick * We don't allow exporting kernfs mounts, and currently local 47467365Smckusick * requests do not need cookies. 47567365Smckusick */ 476*67387Spendry if (ap->a_ncookies != NULL) 47767365Smckusick panic("kernfs_readdir: not hungry"); 47867365Smckusick 47955344Spendry i = uio->uio_offset / UIO_MX; 48055344Spendry error = 0; 481*67387Spendry for (kt = &kern_targets[i]; 482*67387Spendry uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) { 48355344Spendry struct dirent *dp = &d; 48455344Spendry #ifdef KERNFS_DIAGNOSTIC 48555344Spendry printf("kernfs_readdir: i = %d\n", i); 48655344Spendry #endif 48755344Spendry 488*67387Spendry if (kt->kt_tag == KTT_DEVICE) { 489*67387Spendry dev_t *dp = kt->kt_data; 490*67387Spendry struct vnode *fvp; 49155344Spendry 492*67387Spendry if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) 493*67387Spendry continue; 494*67387Spendry } 49555344Spendry 496*67387Spendry bzero((caddr_t)dp, UIO_MX); 497*67387Spendry dp->d_namlen = kt->kt_namlen; 498*67387Spendry bcopy(kt->kt_name, dp->d_name, kt->kt_namlen+1); 499*67387Spendry 50055344Spendry #ifdef KERNFS_DIAGNOSTIC 50155344Spendry printf("kernfs_readdir: name = %s, len = %d\n", 50255344Spendry dp->d_name, dp->d_namlen); 50355344Spendry #endif 50455344Spendry /* 50555344Spendry * Fill in the remaining fields 50655344Spendry */ 50755344Spendry dp->d_reclen = UIO_MX; 50855344Spendry dp->d_fileno = i + 3; 509*67387Spendry dp->d_type = kt->kt_type; 51055344Spendry /* 51155344Spendry * And ship to userland 51255344Spendry */ 513*67387Spendry if (error = uiomove((caddr_t)dp, UIO_MX, uio)) 51455344Spendry break; 51555344Spendry } 51655344Spendry 51755344Spendry uio->uio_offset = i * UIO_MX; 51855344Spendry 51955344Spendry return (error); 52055344Spendry } 52155344Spendry 52255344Spendry kernfs_inactive(ap) 52355344Spendry struct vop_inactive_args /* { 52455344Spendry struct vnode *a_vp; 52555344Spendry } */ *ap; 52655344Spendry { 52755344Spendry struct vnode *vp = ap->a_vp; 52855344Spendry 529*67387Spendry #ifdef KERNFS_DIAGNOSTIC 530*67387Spendry printf("kernfs_inactive(%x)\n", vp); 531*67387Spendry #endif 53255344Spendry /* 53355344Spendry * Clear out the v_type field to avoid 53455344Spendry * nasty things happening in vgone(). 53555344Spendry */ 53655344Spendry vp->v_type = VNON; 53755344Spendry return (0); 53855344Spendry } 53955344Spendry 54055344Spendry kernfs_reclaim(ap) 54155344Spendry struct vop_reclaim_args /* { 54255344Spendry struct vnode *a_vp; 54355344Spendry } */ *ap; 54455344Spendry { 54555344Spendry struct vnode *vp = ap->a_vp; 546*67387Spendry 54760618Smckusick #ifdef KERNFS_DIAGNOSTIC 54855344Spendry printf("kernfs_reclaim(%x)\n", vp); 54960618Smckusick #endif 55055344Spendry if (vp->v_data) { 55155344Spendry FREE(vp->v_data, M_TEMP); 55255344Spendry vp->v_data = 0; 55355344Spendry } 55455344Spendry return (0); 55555344Spendry } 55655344Spendry 55755344Spendry /* 55865742Spendry * Return POSIX pathconf information applicable to special devices. 55965742Spendry */ 56065742Spendry kernfs_pathconf(ap) 56165742Spendry struct vop_pathconf_args /* { 56265742Spendry struct vnode *a_vp; 56365742Spendry int a_name; 56465742Spendry int *a_retval; 56565742Spendry } */ *ap; 56665742Spendry { 56765742Spendry 56865742Spendry switch (ap->a_name) { 56965742Spendry case _PC_LINK_MAX: 57065742Spendry *ap->a_retval = LINK_MAX; 57165742Spendry return (0); 57265742Spendry case _PC_MAX_CANON: 57365742Spendry *ap->a_retval = MAX_CANON; 57465742Spendry return (0); 57565742Spendry case _PC_MAX_INPUT: 57665742Spendry *ap->a_retval = MAX_INPUT; 57765742Spendry return (0); 57865742Spendry case _PC_PIPE_BUF: 57965742Spendry *ap->a_retval = PIPE_BUF; 58065742Spendry return (0); 58165742Spendry case _PC_CHOWN_RESTRICTED: 58265742Spendry *ap->a_retval = 1; 58365742Spendry return (0); 58465742Spendry case _PC_VDISABLE: 58565742Spendry *ap->a_retval = _POSIX_VDISABLE; 58665742Spendry return (0); 58765742Spendry default: 58865742Spendry return (EINVAL); 58965742Spendry } 59065742Spendry /* NOTREACHED */ 59165742Spendry } 59265742Spendry 59365742Spendry /* 59455344Spendry * Print out the contents of a /dev/fd vnode. 59555344Spendry */ 59655344Spendry /* ARGSUSED */ 59755344Spendry kernfs_print(ap) 59855344Spendry struct vop_print_args /* { 59955344Spendry struct vnode *a_vp; 60055344Spendry } */ *ap; 60155344Spendry { 60255344Spendry 60365380Spendry printf("tag VT_KERNFS, kernfs vnode\n"); 60455344Spendry return (0); 60555344Spendry } 60655344Spendry 60755344Spendry /*void*/ 60855344Spendry kernfs_vfree(ap) 60955344Spendry struct vop_vfree_args /* { 61055344Spendry struct vnode *a_pvp; 61155344Spendry ino_t a_ino; 61255344Spendry int a_mode; 61355344Spendry } */ *ap; 61455344Spendry { 61555344Spendry 61655344Spendry return (0); 61755344Spendry } 61855344Spendry 61955344Spendry /* 62055344Spendry * /dev/fd vnode unsupported operation 62155344Spendry */ 62255344Spendry kernfs_enotsupp() 62355344Spendry { 62455344Spendry 62555344Spendry return (EOPNOTSUPP); 62655344Spendry } 62755344Spendry 62855344Spendry /* 62955344Spendry * /dev/fd "should never get here" operation 63055344Spendry */ 63155344Spendry kernfs_badop() 63255344Spendry { 63355344Spendry 63455344Spendry panic("kernfs: bad op"); 63555344Spendry /* NOTREACHED */ 63655344Spendry } 63755344Spendry 63855344Spendry /* 63955350Spendry * kernfs vnode null operation 64055344Spendry */ 64155344Spendry kernfs_nullop() 64255344Spendry { 64355344Spendry 64455344Spendry return (0); 64555344Spendry } 64655344Spendry 64755344Spendry #define kernfs_create ((int (*) __P((struct vop_create_args *)))kernfs_enotsupp) 64855344Spendry #define kernfs_mknod ((int (*) __P((struct vop_mknod_args *)))kernfs_enotsupp) 64955344Spendry #define kernfs_close ((int (*) __P((struct vop_close_args *)))nullop) 65055344Spendry #define kernfs_ioctl ((int (*) __P((struct vop_ioctl_args *)))kernfs_enotsupp) 65155344Spendry #define kernfs_select ((int (*) __P((struct vop_select_args *)))kernfs_enotsupp) 65255344Spendry #define kernfs_mmap ((int (*) __P((struct vop_mmap_args *)))kernfs_enotsupp) 65355344Spendry #define kernfs_fsync ((int (*) __P((struct vop_fsync_args *)))nullop) 65455344Spendry #define kernfs_seek ((int (*) __P((struct vop_seek_args *)))nullop) 65555344Spendry #define kernfs_remove ((int (*) __P((struct vop_remove_args *)))kernfs_enotsupp) 65655344Spendry #define kernfs_link ((int (*) __P((struct vop_link_args *)))kernfs_enotsupp) 65755344Spendry #define kernfs_rename ((int (*) __P((struct vop_rename_args *)))kernfs_enotsupp) 65855344Spendry #define kernfs_mkdir ((int (*) __P((struct vop_mkdir_args *)))kernfs_enotsupp) 65955344Spendry #define kernfs_rmdir ((int (*) __P((struct vop_rmdir_args *)))kernfs_enotsupp) 66055344Spendry #define kernfs_symlink ((int (*) __P((struct vop_symlink_args *)))kernfs_enotsupp) 66155344Spendry #define kernfs_readlink \ 66255344Spendry ((int (*) __P((struct vop_readlink_args *)))kernfs_enotsupp) 66355344Spendry #define kernfs_abortop ((int (*) __P((struct vop_abortop_args *)))nullop) 66455344Spendry #define kernfs_lock ((int (*) __P((struct vop_lock_args *)))nullop) 66555344Spendry #define kernfs_unlock ((int (*) __P((struct vop_unlock_args *)))nullop) 66655344Spendry #define kernfs_bmap ((int (*) __P((struct vop_bmap_args *)))kernfs_badop) 66755344Spendry #define kernfs_strategy ((int (*) __P((struct vop_strategy_args *)))kernfs_badop) 66855344Spendry #define kernfs_islocked ((int (*) __P((struct vop_islocked_args *)))nullop) 66955344Spendry #define kernfs_advlock ((int (*) __P((struct vop_advlock_args *)))kernfs_enotsupp) 67055344Spendry #define kernfs_blkatoff \ 67155344Spendry ((int (*) __P((struct vop_blkatoff_args *)))kernfs_enotsupp) 67255344Spendry #define kernfs_valloc ((int(*) __P(( \ 67355344Spendry struct vnode *pvp, \ 67455344Spendry int mode, \ 67555344Spendry struct ucred *cred, \ 67655344Spendry struct vnode **vpp))) kernfs_enotsupp) 67755344Spendry #define kernfs_truncate \ 67855344Spendry ((int (*) __P((struct vop_truncate_args *)))kernfs_enotsupp) 67955344Spendry #define kernfs_update ((int (*) __P((struct vop_update_args *)))kernfs_enotsupp) 68055344Spendry #define kernfs_bwrite ((int (*) __P((struct vop_bwrite_args *)))kernfs_enotsupp) 68155344Spendry 68255344Spendry int (**kernfs_vnodeop_p)(); 68355344Spendry struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = { 68455344Spendry { &vop_default_desc, vn_default_error }, 68555344Spendry { &vop_lookup_desc, kernfs_lookup }, /* lookup */ 68655344Spendry { &vop_create_desc, kernfs_create }, /* create */ 68755344Spendry { &vop_mknod_desc, kernfs_mknod }, /* mknod */ 68865742Spendry { &vop_open_desc, kernfs_open }, /* open */ 68955344Spendry { &vop_close_desc, kernfs_close }, /* close */ 69055344Spendry { &vop_access_desc, kernfs_access }, /* access */ 69155344Spendry { &vop_getattr_desc, kernfs_getattr }, /* getattr */ 69255344Spendry { &vop_setattr_desc, kernfs_setattr }, /* setattr */ 69365742Spendry { &vop_read_desc, kernfs_read }, /* read */ 69455344Spendry { &vop_write_desc, kernfs_write }, /* write */ 69555344Spendry { &vop_ioctl_desc, kernfs_ioctl }, /* ioctl */ 69655344Spendry { &vop_select_desc, kernfs_select }, /* select */ 69765742Spendry { &vop_mmap_desc, kernfs_mmap }, /* mmap */ 69855344Spendry { &vop_fsync_desc, kernfs_fsync }, /* fsync */ 69965742Spendry { &vop_seek_desc, kernfs_seek }, /* seek */ 70055344Spendry { &vop_remove_desc, kernfs_remove }, /* remove */ 70165742Spendry { &vop_link_desc, kernfs_link }, /* link */ 70255344Spendry { &vop_rename_desc, kernfs_rename }, /* rename */ 70355344Spendry { &vop_mkdir_desc, kernfs_mkdir }, /* mkdir */ 70455344Spendry { &vop_rmdir_desc, kernfs_rmdir }, /* rmdir */ 70555344Spendry { &vop_symlink_desc, kernfs_symlink }, /* symlink */ 70655344Spendry { &vop_readdir_desc, kernfs_readdir }, /* readdir */ 70765742Spendry { &vop_readlink_desc, kernfs_readlink },/* readlink */ 70855344Spendry { &vop_abortop_desc, kernfs_abortop }, /* abortop */ 70965742Spendry { &vop_inactive_desc, kernfs_inactive },/* inactive */ 71055344Spendry { &vop_reclaim_desc, kernfs_reclaim }, /* reclaim */ 71165742Spendry { &vop_lock_desc, kernfs_lock }, /* lock */ 71255344Spendry { &vop_unlock_desc, kernfs_unlock }, /* unlock */ 71365742Spendry { &vop_bmap_desc, kernfs_bmap }, /* bmap */ 71465742Spendry { &vop_strategy_desc, kernfs_strategy },/* strategy */ 71555344Spendry { &vop_print_desc, kernfs_print }, /* print */ 71665742Spendry { &vop_islocked_desc, kernfs_islocked },/* islocked */ 71765742Spendry { &vop_pathconf_desc, kernfs_pathconf },/* pathconf */ 71855344Spendry { &vop_advlock_desc, kernfs_advlock }, /* advlock */ 71965742Spendry { &vop_blkatoff_desc, kernfs_blkatoff },/* blkatoff */ 72055344Spendry { &vop_valloc_desc, kernfs_valloc }, /* valloc */ 72155344Spendry { &vop_vfree_desc, kernfs_vfree }, /* vfree */ 72265742Spendry { &vop_truncate_desc, kernfs_truncate },/* truncate */ 72355344Spendry { &vop_update_desc, kernfs_update }, /* update */ 72455344Spendry { &vop_bwrite_desc, kernfs_bwrite }, /* bwrite */ 72555344Spendry { (struct vnodeop_desc*)NULL, (int(*)())NULL } 72655344Spendry }; 72755344Spendry struct vnodeopv_desc kernfs_vnodeop_opv_desc = 72855344Spendry { &kernfs_vnodeop_p, kernfs_vnodeop_entries }; 729