155344Spendry /*
263233Sbostic  * Copyright (c) 1992, 1993
363233Sbostic  *	The Regents of the University of California.  All rights reserved.
455344Spendry  *
555344Spendry  * This code is derived from software donated to Berkeley by
655344Spendry  * Jan-Simon Pendry.
755344Spendry  *
855344Spendry  * %sccs.include.redist.c%
955344Spendry  *
10*67387Spendry  *	@(#)kernfs_vnops.c	8.8 (Berkeley) 06/15/94
1155344Spendry  */
1255344Spendry 
1355344Spendry /*
1455344Spendry  * Kernel parameter filesystem (/kern)
1555344Spendry  */
1655344Spendry 
1755344Spendry #include <sys/param.h>
1855344Spendry #include <sys/systm.h>
1955344Spendry #include <sys/kernel.h>
2055344Spendry #include <sys/vmmeter.h>
2155344Spendry #include <sys/types.h>
2255344Spendry #include <sys/time.h>
2355344Spendry #include <sys/proc.h>
2455344Spendry #include <sys/vnode.h>
2555344Spendry #include <sys/malloc.h>
2655344Spendry #include <sys/file.h>
2755344Spendry #include <sys/stat.h>
2855344Spendry #include <sys/mount.h>
2955344Spendry #include <sys/namei.h>
3055344Spendry #include <sys/buf.h>
3155344Spendry #include <sys/dirent.h>
3255344Spendry #include <miscfs/kernfs/kernfs.h>
3355344Spendry 
3455344Spendry #define KSTRING	256		/* Largest I/O available via this filesystem */
3555344Spendry #define	UIO_MX 32
3655344Spendry 
3755356Spendry #define	READ_MODE	(S_IRUSR|S_IRGRP|S_IROTH)
3855356Spendry #define	WRITE_MODE	(S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH)
3955356Spendry #define DIR_MODE	(S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH)
4055356Spendry 
4155344Spendry struct kern_target {
42*67387Spendry 	u_char kt_type;
43*67387Spendry 	u_char kt_namlen;
4455344Spendry 	char *kt_name;
4555344Spendry 	void *kt_data;
46*67387Spendry #define	KTT_NULL	 1
47*67387Spendry #define	KTT_TIME	 5
48*67387Spendry #define KTT_INT		17
49*67387Spendry #define	KTT_STRING	31
50*67387Spendry #define KTT_HOSTNAME	47
51*67387Spendry #define KTT_AVENRUN	53
52*67387Spendry #define KTT_DEVICE	71
53*67387Spendry 	u_char kt_tag;
54*67387Spendry 	u_char kt_vtype;
55*67387Spendry 	mode_t kt_mode;
5655344Spendry } kern_targets[] = {
5755344Spendry /* NOTE: The name must be less than UIO_MX-16 chars in length */
58*67387Spendry #define N(s) sizeof(s)-1, s
59*67387Spendry      /*        name            data          tag           type  ro/rw */
60*67387Spendry      { DT_DIR, N("."),         0,            KTT_NULL,     VDIR, DIR_MODE   },
61*67387Spendry      { DT_DIR, N(".."),        0,            KTT_NULL,     VDIR, DIR_MODE   },
62*67387Spendry      { DT_REG, N("boottime"),  &boottime.tv_sec, KTT_INT,  VREG, READ_MODE  },
63*67387Spendry      { DT_REG, N("copyright"), copyright,    KTT_STRING,   VREG, READ_MODE  },
64*67387Spendry      { DT_REG, N("hostname"),  0,            KTT_HOSTNAME, VREG, WRITE_MODE },
65*67387Spendry      { DT_REG, N("hz"),        &hz,          KTT_INT,      VREG, READ_MODE  },
66*67387Spendry      { DT_REG, N("loadavg"),   0,            KTT_AVENRUN,  VREG, READ_MODE  },
67*67387Spendry      { DT_REG, N("pagesize"),  &cnt.v_page_size, KTT_INT,  VREG, READ_MODE  },
68*67387Spendry      { DT_REG, N("physmem"),   &physmem,     KTT_INT,      VREG, READ_MODE  },
6959556Spendry #if 0
70*67387Spendry      { DT_DIR, N("root"),      0,            KTT_NULL,     VDIR, DIR_MODE   },
7159556Spendry #endif
72*67387Spendry      { DT_BLK, N("rootdev"),   &rootdev,     KTT_DEVICE,   VBLK, READ_MODE  },
73*67387Spendry      { DT_CHR, N("rrootdev"),  &rrootdev,    KTT_DEVICE,   VCHR, READ_MODE  },
74*67387Spendry      { DT_REG, N("time"),      0,            KTT_TIME,     VREG, READ_MODE  },
75*67387Spendry      { DT_REG, N("version"),   version,      KTT_STRING,   VREG, READ_MODE  },
76*67387Spendry #undef N
7755344Spendry };
7855344Spendry static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]);
7955344Spendry 
8055344Spendry static int
8155344Spendry kernfs_xread(kt, buf, len, lenp)
8255344Spendry 	struct kern_target *kt;
8355344Spendry 	char *buf;
8455344Spendry 	int len;
8555344Spendry 	int *lenp;
8655344Spendry {
87*67387Spendry 
8855344Spendry 	switch (kt->kt_tag) {
8955344Spendry 	case KTT_TIME: {
9055344Spendry 		struct timeval tv;
9155344Spendry 		microtime(&tv);
9255344Spendry 		sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec);
9355344Spendry 		break;
9455344Spendry 	}
9555344Spendry 
9655344Spendry 	case KTT_INT: {
9755344Spendry 		int *ip = kt->kt_data;
9855344Spendry 		sprintf(buf, "%d\n", *ip);
9955344Spendry 		break;
10055344Spendry 	}
10155344Spendry 
10255344Spendry 	case KTT_STRING: {
10355344Spendry 		char *cp = kt->kt_data;
10455344Spendry 		int xlen = strlen(cp) + 1;
10555344Spendry 
10655344Spendry 		if (xlen >= len)
10755344Spendry 			return (EINVAL);
10855344Spendry 
10955344Spendry 		bcopy(cp, buf, xlen);
11055344Spendry 		break;
11155344Spendry 	}
11255344Spendry 
11355344Spendry 	case KTT_HOSTNAME: {
11455344Spendry 		char *cp = hostname;
11555344Spendry 		int xlen = hostnamelen;
11655344Spendry 
11759556Spendry 		if (xlen >= (len-2))
11855344Spendry 			return (EINVAL);
11955344Spendry 
12059556Spendry 		bcopy(cp, buf, xlen);
12159556Spendry 		buf[xlen] = '\n';
12259556Spendry 		buf[xlen+1] = '\0';
12355344Spendry 		break;
12455344Spendry 	}
12555344Spendry 
12655344Spendry 	case KTT_AVENRUN:
12755344Spendry 		sprintf(buf, "%ld %ld %ld %ld\n",
128*67387Spendry 		    averunnable.ldavg[0], averunnable.ldavg[1],
129*67387Spendry 		    averunnable.ldavg[2], averunnable.fscale);
13055344Spendry 		break;
13155344Spendry 
13255344Spendry 	default:
133*67387Spendry 		return (EIO);
13455344Spendry 	}
13555344Spendry 
13655344Spendry 	*lenp = strlen(buf);
13755344Spendry 	return (0);
13855344Spendry }
13955344Spendry 
14055344Spendry static int
14155344Spendry kernfs_xwrite(kt, buf, len)
14255344Spendry 	struct kern_target *kt;
14355344Spendry 	char *buf;
14455344Spendry 	int len;
14555344Spendry {
146*67387Spendry 
14755344Spendry 	switch (kt->kt_tag) {
148*67387Spendry 	case KTT_HOSTNAME:
14955344Spendry 		if (buf[len-1] == '\n')
15055344Spendry 			--len;
15155344Spendry 		bcopy(buf, hostname, len);
15259556Spendry 		hostname[len] = '\0';
15359556Spendry 		hostnamelen = len;
15455344Spendry 		return (0);
15555344Spendry 
15655344Spendry 	default:
15755344Spendry 		return (EIO);
15855344Spendry 	}
15955344Spendry }
16055344Spendry 
16155344Spendry 
16255344Spendry /*
16355344Spendry  * vp is the current namei directory
16455344Spendry  * ndp is the name to locate in that directory...
16555344Spendry  */
16655344Spendry kernfs_lookup(ap)
16755344Spendry 	struct vop_lookup_args /* {
16855344Spendry 		struct vnode * a_dvp;
16955344Spendry 		struct vnode ** a_vpp;
17055344Spendry 		struct componentname * a_cnp;
17155344Spendry 	} */ *ap;
17255344Spendry {
173*67387Spendry 	struct componentname *cnp = ap->a_cnp;
17455344Spendry 	struct vnode **vpp = ap->a_vpp;
17555344Spendry 	struct vnode *dvp = ap->a_dvp;
176*67387Spendry 	char *pname = cnp->cn_nameptr;
177*67387Spendry 	struct kern_target *kt;
17865446Sbostic 	struct vnode *fvp;
17965446Sbostic 	int error, i;
18055344Spendry 
18155344Spendry #ifdef KERNFS_DIAGNOSTIC
18255344Spendry 	printf("kernfs_lookup(%x)\n", ap);
18355344Spendry 	printf("kernfs_lookup(dp = %x, vpp = %x, cnp = %x)\n", dvp, vpp, ap->a_cnp);
18455344Spendry 	printf("kernfs_lookup(%s)\n", pname);
18555344Spendry #endif
186*67387Spendry 
18755344Spendry 	if (cnp->cn_namelen == 1 && *pname == '.') {
18855344Spendry 		*vpp = dvp;
18955350Spendry 		VREF(dvp);
19055344Spendry 		/*VOP_LOCK(dvp);*/
19155344Spendry 		return (0);
19255344Spendry 	}
19355344Spendry 
19459556Spendry #if 0
19555344Spendry 	if (cnp->cn_namelen == 4 && bcmp(pname, "root", 4) == 0) {
19655344Spendry 		*vpp = rootdir;
19755344Spendry 		VREF(rootdir);
19855344Spendry 		VOP_LOCK(rootdir);
19955344Spendry 		return (0);
20055344Spendry 	}
20159556Spendry #endif
20255350Spendry 
203*67387Spendry 	for (error = ENOENT, kt = kern_targets, i = 0; i < nkern_targets;
204*67387Spendry 	     kt++, i++) {
205*67387Spendry 		if (cnp->cn_namelen == kt->kt_namlen &&
20655344Spendry 		    bcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) {
20755344Spendry 			error = 0;
20855344Spendry 			break;
20955344Spendry 		}
21055344Spendry 	}
21155344Spendry 
21255344Spendry #ifdef KERNFS_DIAGNOSTIC
21355344Spendry 	printf("kernfs_lookup: i = %d, error = %d\n", i, error);
21455344Spendry #endif
21555344Spendry 
21655344Spendry 	if (error)
217*67387Spendry 		return (error);
21855344Spendry 
219*67387Spendry 	if (kt->kt_tag == KTT_DEVICE) {
220*67387Spendry 		dev_t *dp = kt->kt_data;
221*67387Spendry 	loop:
222*67387Spendry 		if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp))
223*67387Spendry 			return (ENOENT);
224*67387Spendry 		*vpp = fvp;
225*67387Spendry 		if (vget(fvp, 1))
226*67387Spendry 			goto loop;
227*67387Spendry 		return (0);
228*67387Spendry 	}
229*67387Spendry 
23055344Spendry #ifdef KERNFS_DIAGNOSTIC
23155344Spendry 	printf("kernfs_lookup: allocate new vnode\n");
23255344Spendry #endif
233*67387Spendry 	if (error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p,
234*67387Spendry 	    &fvp))
235*67387Spendry 		return (error);
236*67387Spendry 
237*67387Spendry 	MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP,
238*67387Spendry 	    M_WAITOK);
239*67387Spendry 	VTOKERN(fvp)->kf_kt = kt;
240*67387Spendry 	fvp->v_type = kt->kt_vtype;
24155344Spendry 	*vpp = fvp;
242*67387Spendry 
24355344Spendry #ifdef KERNFS_DIAGNOSTIC
24455344Spendry 	printf("kernfs_lookup: newvp = %x\n", fvp);
24555344Spendry #endif
24655344Spendry 	return (0);
24755344Spendry }
24855344Spendry 
24955344Spendry kernfs_open(ap)
25055344Spendry 	struct vop_open_args /* {
25155344Spendry 		struct vnode *a_vp;
25255344Spendry 		int  a_mode;
25355344Spendry 		struct ucred *a_cred;
25455344Spendry 		struct proc *a_p;
25555344Spendry 	} */ *ap;
25655344Spendry {
25755344Spendry 
258*67387Spendry 	/* Only need to check access permissions. */
25955344Spendry 	return (0);
26055344Spendry }
26155344Spendry 
26255344Spendry static int
26355344Spendry kernfs_access(ap)
26455344Spendry 	struct vop_access_args /* {
26555344Spendry 		struct vnode *a_vp;
26655344Spendry 		int  a_mode;
26755344Spendry 		struct ucred *a_cred;
26855344Spendry 		struct proc *a_p;
26955344Spendry 	} */ *ap;
27055344Spendry {
271*67387Spendry 	register struct vnode *vp = ap->a_vp;
272*67387Spendry 	register struct ucred *cred = ap->a_cred;
273*67387Spendry 	mode_t amode = ap->a_mode;
274*67387Spendry 	mode_t fmode =
275*67387Spendry 	    (vp->v_flag & VROOT) ? DIR_MODE : VTOKERN(vp)->kf_kt->kt_mode;
276*67387Spendry 	mode_t mask = 0;
277*67387Spendry 	register gid_t *gp;
278*67387Spendry 	int i;
27955344Spendry 
280*67387Spendry 	/* Some files are simply not modifiable. */
281*67387Spendry 	if ((amode & VWRITE) && (fmode & (S_IWUSR|S_IWGRP|S_IWOTH)) == 0)
282*67387Spendry 		return (EPERM);
28355344Spendry 
284*67387Spendry 	/* Root can do anything else. */
285*67387Spendry 	if (cred->cr_uid == 0)
286*67387Spendry 		return (0);
28756497Smckusick 
288*67387Spendry 	/* Check for group 0 (wheel) permissions. */
289*67387Spendry 	for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++)
290*67387Spendry 		if (*gp == 0) {
291*67387Spendry 			if (amode & VEXEC)
292*67387Spendry 				mask |= S_IXGRP;
293*67387Spendry 			if (amode & VREAD)
294*67387Spendry 				mask |= S_IRGRP;
295*67387Spendry 			if (amode & VWRITE)
296*67387Spendry 				mask |= S_IWGRP;
297*67387Spendry 			return ((fmode & mask) == mask ?  0 : EACCES);
29856497Smckusick 		}
29955344Spendry 
300*67387Spendry         /* Otherwise, check everyone else. */
301*67387Spendry 	if (amode & VEXEC)
302*67387Spendry 		mask |= S_IXOTH;
303*67387Spendry 	if (amode & VREAD)
304*67387Spendry 		mask |= S_IROTH;
305*67387Spendry 	if (amode & VWRITE)
306*67387Spendry 		mask |= S_IWOTH;
307*67387Spendry 	return ((fmode & mask) == mask ? 0 : EACCES);
30855344Spendry }
30955344Spendry 
31055344Spendry kernfs_getattr(ap)
31155344Spendry 	struct vop_getattr_args /* {
31255344Spendry 		struct vnode *a_vp;
31355344Spendry 		struct vattr *a_vap;
31455344Spendry 		struct ucred *a_cred;
31555344Spendry 		struct proc *a_p;
31655344Spendry 	} */ *ap;
31755344Spendry {
31855344Spendry 	struct vnode *vp = ap->a_vp;
31955344Spendry 	struct vattr *vap = ap->a_vap;
32055344Spendry 	int error = 0;
32155344Spendry 	char strbuf[KSTRING];
32255344Spendry 
32355344Spendry 	bzero((caddr_t) vap, sizeof(*vap));
32455344Spendry 	vattr_null(vap);
32555344Spendry 	vap->va_uid = 0;
32655344Spendry 	vap->va_gid = 0;
32755344Spendry 	vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
328*67387Spendry 	vap->va_size = 0;
32955344Spendry 	vap->va_blocksize = DEV_BSIZE;
33055344Spendry 	microtime(&vap->va_atime);
33155344Spendry 	vap->va_mtime = vap->va_atime;
33255344Spendry 	vap->va_ctime = vap->va_ctime;
33355344Spendry 	vap->va_gen = 0;
33455344Spendry 	vap->va_flags = 0;
33555344Spendry 	vap->va_rdev = 0;
33655344Spendry 	vap->va_bytes = 0;
33755344Spendry 
33855344Spendry 	if (vp->v_flag & VROOT) {
33955344Spendry #ifdef KERNFS_DIAGNOSTIC
34055344Spendry 		printf("kernfs_getattr: stat rootdir\n");
34155344Spendry #endif
34255344Spendry 		vap->va_type = VDIR;
34355356Spendry 		vap->va_mode = DIR_MODE;
34455344Spendry 		vap->va_nlink = 2;
34555344Spendry 		vap->va_fileid = 2;
34655344Spendry 		vap->va_size = DEV_BSIZE;
34755344Spendry 	} else {
34856497Smckusick 		struct kern_target *kt = VTOKERN(vp)->kf_kt;
34955344Spendry 		int nbytes;
35055344Spendry #ifdef KERNFS_DIAGNOSTIC
35155344Spendry 		printf("kernfs_getattr: stat target %s\n", kt->kt_name);
35255344Spendry #endif
35355344Spendry 		vap->va_type = kt->kt_vtype;
354*67387Spendry 		vap->va_mode = kt->kt_mode;
35555344Spendry 		vap->va_nlink = 1;
356*67387Spendry 		vap->va_fileid = 1 + (kt - kern_targets) / sizeof(*kt);
35755344Spendry 		error = kernfs_xread(kt, strbuf, sizeof(strbuf), &nbytes);
35855344Spendry 		vap->va_size = nbytes;
35955344Spendry 	}
36055344Spendry 
36155344Spendry #ifdef KERNFS_DIAGNOSTIC
36255344Spendry 	printf("kernfs_getattr: return error %d\n", error);
36355344Spendry #endif
36455344Spendry 	return (error);
36555344Spendry }
36655344Spendry 
36755344Spendry kernfs_setattr(ap)
36855344Spendry 	struct vop_setattr_args /* {
36955344Spendry 		struct vnode *a_vp;
37055344Spendry 		struct vattr *a_vap;
37155344Spendry 		struct ucred *a_cred;
37255344Spendry 		struct proc *a_p;
37355344Spendry 	} */ *ap;
37455344Spendry {
37555344Spendry 
37655344Spendry 	/*
37755344Spendry 	 * Silently ignore attribute changes.
37855344Spendry 	 * This allows for open with truncate to have no
37955344Spendry 	 * effect until some data is written.  I want to
38055344Spendry 	 * do it this way because all writes are atomic.
38155344Spendry 	 */
38255344Spendry 	return (0);
38355344Spendry }
38455344Spendry 
38555344Spendry static int
38655344Spendry kernfs_read(ap)
38755344Spendry 	struct vop_read_args /* {
38855344Spendry 		struct vnode *a_vp;
38955344Spendry 		struct uio *a_uio;
39055344Spendry 		int  a_ioflag;
39155344Spendry 		struct ucred *a_cred;
39255344Spendry 	} */ *ap;
39355344Spendry {
39455344Spendry 	struct vnode *vp = ap->a_vp;
39555344Spendry 	struct uio *uio = ap->a_uio;
39656497Smckusick 	struct kern_target *kt;
39755344Spendry 	char strbuf[KSTRING];
39855344Spendry 	int off = uio->uio_offset;
39965446Sbostic 	int error, len;
40065446Sbostic 	char *cp;
40156497Smckusick 
402*67387Spendry 	if (vp->v_type == VDIR)
40366052Spendry 		return (EOPNOTSUPP);
40456497Smckusick 
40556497Smckusick 	kt = VTOKERN(vp)->kf_kt;
40656497Smckusick 
40755344Spendry #ifdef KERNFS_DIAGNOSTIC
40855344Spendry 	printf("kern_read %s\n", kt->kt_name);
40955344Spendry #endif
41055344Spendry 
41165446Sbostic 	len = 0;
412*67387Spendry 	if (error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len))
41355344Spendry 		return (error);
414*67387Spendry 	if (len <= off)
415*67387Spendry 		return (0);
416*67387Spendry 	return (uiomove(&strbuf[off], len - off, uio));
41755344Spendry }
41855344Spendry 
41955344Spendry static int
42055344Spendry kernfs_write(ap)
42155344Spendry 	struct vop_write_args /* {
42255344Spendry 		struct vnode *a_vp;
42355344Spendry 		struct uio *a_uio;
42455344Spendry 		int  a_ioflag;
42555344Spendry 		struct ucred *a_cred;
42655344Spendry 	} */ *ap;
42755344Spendry {
42855344Spendry 	struct vnode *vp = ap->a_vp;
42955344Spendry 	struct uio *uio = ap->a_uio;
43056497Smckusick 	struct kern_target *kt;
43165446Sbostic 	int error, xlen;
43255344Spendry 	char strbuf[KSTRING];
43355344Spendry 
434*67387Spendry 	if (vp->v_type == VDIR)
435*67387Spendry 		return (EOPNOTSUPP);
43656497Smckusick 
43756497Smckusick 	kt = VTOKERN(vp)->kf_kt;
43856497Smckusick 
43955344Spendry 	if (uio->uio_offset != 0)
44055344Spendry 		return (EINVAL);
44155344Spendry 
44255344Spendry 	xlen = min(uio->uio_resid, KSTRING-1);
443*67387Spendry 	if (error = uiomove(strbuf, xlen, uio))
44455344Spendry 		return (error);
44555344Spendry 
44655344Spendry 	if (uio->uio_resid != 0)
44755344Spendry 		return (EIO);
44855344Spendry 
44955344Spendry 	strbuf[xlen] = '\0';
45059556Spendry 	xlen = strlen(strbuf);
45155344Spendry 	return (kernfs_xwrite(kt, strbuf, xlen));
45255344Spendry }
45355344Spendry 
45455344Spendry kernfs_readdir(ap)
45555344Spendry 	struct vop_readdir_args /* {
45655344Spendry 		struct vnode *a_vp;
45755344Spendry 		struct uio *a_uio;
45855344Spendry 		struct ucred *a_cred;
45967365Smckusick 		int *a_eofflag;
46067365Smckusick 		u_long *a_cookies;
46167365Smckusick 		int a_ncookies;
46255344Spendry 	} */ *ap;
46355344Spendry {
464*67387Spendry 	int error, i;
46555344Spendry 	struct uio *uio = ap->a_uio;
466*67387Spendry 	struct kern_target *kt;
467*67387Spendry 	struct dirent d;
46855344Spendry 
469*67387Spendry 	if (ap->a_vp->v_type != VDIR)
470*67387Spendry 		return (ENOTDIR);
471*67387Spendry 
47267365Smckusick 	/*
47367365Smckusick 	 * We don't allow exporting kernfs mounts, and currently local
47467365Smckusick 	 * requests do not need cookies.
47567365Smckusick 	 */
476*67387Spendry 	if (ap->a_ncookies != NULL)
47767365Smckusick 		panic("kernfs_readdir: not hungry");
47867365Smckusick 
47955344Spendry 	i = uio->uio_offset / UIO_MX;
48055344Spendry 	error = 0;
481*67387Spendry 	for (kt = &kern_targets[i];
482*67387Spendry 		uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) {
48355344Spendry 		struct dirent *dp = &d;
48455344Spendry #ifdef KERNFS_DIAGNOSTIC
48555344Spendry 		printf("kernfs_readdir: i = %d\n", i);
48655344Spendry #endif
48755344Spendry 
488*67387Spendry 		if (kt->kt_tag == KTT_DEVICE) {
489*67387Spendry 			dev_t *dp = kt->kt_data;
490*67387Spendry 			struct vnode *fvp;
49155344Spendry 
492*67387Spendry 			if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp))
493*67387Spendry 				continue;
494*67387Spendry 		}
49555344Spendry 
496*67387Spendry 		bzero((caddr_t)dp, UIO_MX);
497*67387Spendry 		dp->d_namlen = kt->kt_namlen;
498*67387Spendry 		bcopy(kt->kt_name, dp->d_name, kt->kt_namlen+1);
499*67387Spendry 
50055344Spendry #ifdef KERNFS_DIAGNOSTIC
50155344Spendry 		printf("kernfs_readdir: name = %s, len = %d\n",
50255344Spendry 				dp->d_name, dp->d_namlen);
50355344Spendry #endif
50455344Spendry 		/*
50555344Spendry 		 * Fill in the remaining fields
50655344Spendry 		 */
50755344Spendry 		dp->d_reclen = UIO_MX;
50855344Spendry 		dp->d_fileno = i + 3;
509*67387Spendry 		dp->d_type = kt->kt_type;
51055344Spendry 		/*
51155344Spendry 		 * And ship to userland
51255344Spendry 		 */
513*67387Spendry 		if (error = uiomove((caddr_t)dp, UIO_MX, uio))
51455344Spendry 			break;
51555344Spendry 	}
51655344Spendry 
51755344Spendry 	uio->uio_offset = i * UIO_MX;
51855344Spendry 
51955344Spendry 	return (error);
52055344Spendry }
52155344Spendry 
52255344Spendry kernfs_inactive(ap)
52355344Spendry 	struct vop_inactive_args /* {
52455344Spendry 		struct vnode *a_vp;
52555344Spendry 	} */ *ap;
52655344Spendry {
52755344Spendry 	struct vnode *vp = ap->a_vp;
52855344Spendry 
529*67387Spendry #ifdef KERNFS_DIAGNOSTIC
530*67387Spendry 	printf("kernfs_inactive(%x)\n", vp);
531*67387Spendry #endif
53255344Spendry 	/*
53355344Spendry 	 * Clear out the v_type field to avoid
53455344Spendry 	 * nasty things happening in vgone().
53555344Spendry 	 */
53655344Spendry 	vp->v_type = VNON;
53755344Spendry 	return (0);
53855344Spendry }
53955344Spendry 
54055344Spendry kernfs_reclaim(ap)
54155344Spendry 	struct vop_reclaim_args /* {
54255344Spendry 		struct vnode *a_vp;
54355344Spendry 	} */ *ap;
54455344Spendry {
54555344Spendry 	struct vnode *vp = ap->a_vp;
546*67387Spendry 
54760618Smckusick #ifdef KERNFS_DIAGNOSTIC
54855344Spendry 	printf("kernfs_reclaim(%x)\n", vp);
54960618Smckusick #endif
55055344Spendry 	if (vp->v_data) {
55155344Spendry 		FREE(vp->v_data, M_TEMP);
55255344Spendry 		vp->v_data = 0;
55355344Spendry 	}
55455344Spendry 	return (0);
55555344Spendry }
55655344Spendry 
55755344Spendry /*
55865742Spendry  * Return POSIX pathconf information applicable to special devices.
55965742Spendry  */
56065742Spendry kernfs_pathconf(ap)
56165742Spendry 	struct vop_pathconf_args /* {
56265742Spendry 		struct vnode *a_vp;
56365742Spendry 		int a_name;
56465742Spendry 		int *a_retval;
56565742Spendry 	} */ *ap;
56665742Spendry {
56765742Spendry 
56865742Spendry 	switch (ap->a_name) {
56965742Spendry 	case _PC_LINK_MAX:
57065742Spendry 		*ap->a_retval = LINK_MAX;
57165742Spendry 		return (0);
57265742Spendry 	case _PC_MAX_CANON:
57365742Spendry 		*ap->a_retval = MAX_CANON;
57465742Spendry 		return (0);
57565742Spendry 	case _PC_MAX_INPUT:
57665742Spendry 		*ap->a_retval = MAX_INPUT;
57765742Spendry 		return (0);
57865742Spendry 	case _PC_PIPE_BUF:
57965742Spendry 		*ap->a_retval = PIPE_BUF;
58065742Spendry 		return (0);
58165742Spendry 	case _PC_CHOWN_RESTRICTED:
58265742Spendry 		*ap->a_retval = 1;
58365742Spendry 		return (0);
58465742Spendry 	case _PC_VDISABLE:
58565742Spendry 		*ap->a_retval = _POSIX_VDISABLE;
58665742Spendry 		return (0);
58765742Spendry 	default:
58865742Spendry 		return (EINVAL);
58965742Spendry 	}
59065742Spendry 	/* NOTREACHED */
59165742Spendry }
59265742Spendry 
59365742Spendry /*
59455344Spendry  * Print out the contents of a /dev/fd vnode.
59555344Spendry  */
59655344Spendry /* ARGSUSED */
59755344Spendry kernfs_print(ap)
59855344Spendry 	struct vop_print_args /* {
59955344Spendry 		struct vnode *a_vp;
60055344Spendry 	} */ *ap;
60155344Spendry {
60255344Spendry 
60365380Spendry 	printf("tag VT_KERNFS, kernfs vnode\n");
60455344Spendry 	return (0);
60555344Spendry }
60655344Spendry 
60755344Spendry /*void*/
60855344Spendry kernfs_vfree(ap)
60955344Spendry 	struct vop_vfree_args /* {
61055344Spendry 		struct vnode *a_pvp;
61155344Spendry 		ino_t a_ino;
61255344Spendry 		int a_mode;
61355344Spendry 	} */ *ap;
61455344Spendry {
61555344Spendry 
61655344Spendry 	return (0);
61755344Spendry }
61855344Spendry 
61955344Spendry /*
62055344Spendry  * /dev/fd vnode unsupported operation
62155344Spendry  */
62255344Spendry kernfs_enotsupp()
62355344Spendry {
62455344Spendry 
62555344Spendry 	return (EOPNOTSUPP);
62655344Spendry }
62755344Spendry 
62855344Spendry /*
62955344Spendry  * /dev/fd "should never get here" operation
63055344Spendry  */
63155344Spendry kernfs_badop()
63255344Spendry {
63355344Spendry 
63455344Spendry 	panic("kernfs: bad op");
63555344Spendry 	/* NOTREACHED */
63655344Spendry }
63755344Spendry 
63855344Spendry /*
63955350Spendry  * kernfs vnode null operation
64055344Spendry  */
64155344Spendry kernfs_nullop()
64255344Spendry {
64355344Spendry 
64455344Spendry 	return (0);
64555344Spendry }
64655344Spendry 
64755344Spendry #define kernfs_create ((int (*) __P((struct  vop_create_args *)))kernfs_enotsupp)
64855344Spendry #define kernfs_mknod ((int (*) __P((struct  vop_mknod_args *)))kernfs_enotsupp)
64955344Spendry #define kernfs_close ((int (*) __P((struct  vop_close_args *)))nullop)
65055344Spendry #define kernfs_ioctl ((int (*) __P((struct  vop_ioctl_args *)))kernfs_enotsupp)
65155344Spendry #define kernfs_select ((int (*) __P((struct  vop_select_args *)))kernfs_enotsupp)
65255344Spendry #define kernfs_mmap ((int (*) __P((struct  vop_mmap_args *)))kernfs_enotsupp)
65355344Spendry #define kernfs_fsync ((int (*) __P((struct  vop_fsync_args *)))nullop)
65455344Spendry #define kernfs_seek ((int (*) __P((struct  vop_seek_args *)))nullop)
65555344Spendry #define kernfs_remove ((int (*) __P((struct  vop_remove_args *)))kernfs_enotsupp)
65655344Spendry #define kernfs_link ((int (*) __P((struct  vop_link_args *)))kernfs_enotsupp)
65755344Spendry #define kernfs_rename ((int (*) __P((struct  vop_rename_args *)))kernfs_enotsupp)
65855344Spendry #define kernfs_mkdir ((int (*) __P((struct  vop_mkdir_args *)))kernfs_enotsupp)
65955344Spendry #define kernfs_rmdir ((int (*) __P((struct  vop_rmdir_args *)))kernfs_enotsupp)
66055344Spendry #define kernfs_symlink ((int (*) __P((struct vop_symlink_args *)))kernfs_enotsupp)
66155344Spendry #define kernfs_readlink \
66255344Spendry 	((int (*) __P((struct  vop_readlink_args *)))kernfs_enotsupp)
66355344Spendry #define kernfs_abortop ((int (*) __P((struct  vop_abortop_args *)))nullop)
66455344Spendry #define kernfs_lock ((int (*) __P((struct  vop_lock_args *)))nullop)
66555344Spendry #define kernfs_unlock ((int (*) __P((struct  vop_unlock_args *)))nullop)
66655344Spendry #define kernfs_bmap ((int (*) __P((struct  vop_bmap_args *)))kernfs_badop)
66755344Spendry #define kernfs_strategy ((int (*) __P((struct  vop_strategy_args *)))kernfs_badop)
66855344Spendry #define kernfs_islocked ((int (*) __P((struct  vop_islocked_args *)))nullop)
66955344Spendry #define kernfs_advlock ((int (*) __P((struct vop_advlock_args *)))kernfs_enotsupp)
67055344Spendry #define kernfs_blkatoff \
67155344Spendry 	((int (*) __P((struct  vop_blkatoff_args *)))kernfs_enotsupp)
67255344Spendry #define kernfs_valloc ((int(*) __P(( \
67355344Spendry 		struct vnode *pvp, \
67455344Spendry 		int mode, \
67555344Spendry 		struct ucred *cred, \
67655344Spendry 		struct vnode **vpp))) kernfs_enotsupp)
67755344Spendry #define kernfs_truncate \
67855344Spendry 	((int (*) __P((struct  vop_truncate_args *)))kernfs_enotsupp)
67955344Spendry #define kernfs_update ((int (*) __P((struct  vop_update_args *)))kernfs_enotsupp)
68055344Spendry #define kernfs_bwrite ((int (*) __P((struct  vop_bwrite_args *)))kernfs_enotsupp)
68155344Spendry 
68255344Spendry int (**kernfs_vnodeop_p)();
68355344Spendry struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = {
68455344Spendry 	{ &vop_default_desc, vn_default_error },
68555344Spendry 	{ &vop_lookup_desc, kernfs_lookup },	/* lookup */
68655344Spendry 	{ &vop_create_desc, kernfs_create },	/* create */
68755344Spendry 	{ &vop_mknod_desc, kernfs_mknod },	/* mknod */
68865742Spendry 	{ &vop_open_desc, kernfs_open },	/* open */
68955344Spendry 	{ &vop_close_desc, kernfs_close },	/* close */
69055344Spendry 	{ &vop_access_desc, kernfs_access },	/* access */
69155344Spendry 	{ &vop_getattr_desc, kernfs_getattr },	/* getattr */
69255344Spendry 	{ &vop_setattr_desc, kernfs_setattr },	/* setattr */
69365742Spendry 	{ &vop_read_desc, kernfs_read },	/* read */
69455344Spendry 	{ &vop_write_desc, kernfs_write },	/* write */
69555344Spendry 	{ &vop_ioctl_desc, kernfs_ioctl },	/* ioctl */
69655344Spendry 	{ &vop_select_desc, kernfs_select },	/* select */
69765742Spendry 	{ &vop_mmap_desc, kernfs_mmap },	/* mmap */
69855344Spendry 	{ &vop_fsync_desc, kernfs_fsync },	/* fsync */
69965742Spendry 	{ &vop_seek_desc, kernfs_seek },	/* seek */
70055344Spendry 	{ &vop_remove_desc, kernfs_remove },	/* remove */
70165742Spendry 	{ &vop_link_desc, kernfs_link },	/* link */
70255344Spendry 	{ &vop_rename_desc, kernfs_rename },	/* rename */
70355344Spendry 	{ &vop_mkdir_desc, kernfs_mkdir },	/* mkdir */
70455344Spendry 	{ &vop_rmdir_desc, kernfs_rmdir },	/* rmdir */
70555344Spendry 	{ &vop_symlink_desc, kernfs_symlink },	/* symlink */
70655344Spendry 	{ &vop_readdir_desc, kernfs_readdir },	/* readdir */
70765742Spendry 	{ &vop_readlink_desc, kernfs_readlink },/* readlink */
70855344Spendry 	{ &vop_abortop_desc, kernfs_abortop },	/* abortop */
70965742Spendry 	{ &vop_inactive_desc, kernfs_inactive },/* inactive */
71055344Spendry 	{ &vop_reclaim_desc, kernfs_reclaim },	/* reclaim */
71165742Spendry 	{ &vop_lock_desc, kernfs_lock },	/* lock */
71255344Spendry 	{ &vop_unlock_desc, kernfs_unlock },	/* unlock */
71365742Spendry 	{ &vop_bmap_desc, kernfs_bmap },	/* bmap */
71465742Spendry 	{ &vop_strategy_desc, kernfs_strategy },/* strategy */
71555344Spendry 	{ &vop_print_desc, kernfs_print },	/* print */
71665742Spendry 	{ &vop_islocked_desc, kernfs_islocked },/* islocked */
71765742Spendry 	{ &vop_pathconf_desc, kernfs_pathconf },/* pathconf */
71855344Spendry 	{ &vop_advlock_desc, kernfs_advlock },	/* advlock */
71965742Spendry 	{ &vop_blkatoff_desc, kernfs_blkatoff },/* blkatoff */
72055344Spendry 	{ &vop_valloc_desc, kernfs_valloc },	/* valloc */
72155344Spendry 	{ &vop_vfree_desc, kernfs_vfree },	/* vfree */
72265742Spendry 	{ &vop_truncate_desc, kernfs_truncate },/* truncate */
72355344Spendry 	{ &vop_update_desc, kernfs_update },	/* update */
72455344Spendry 	{ &vop_bwrite_desc, kernfs_bwrite },	/* bwrite */
72555344Spendry 	{ (struct vnodeop_desc*)NULL, (int(*)())NULL }
72655344Spendry };
72755344Spendry struct vnodeopv_desc kernfs_vnodeop_opv_desc =
72855344Spendry 	{ &kernfs_vnodeop_p, kernfs_vnodeop_entries };
729