1 /* 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This code is derived from software donated to Berkeley by 6 * Jan-Simon Pendry. 7 * 8 * %sccs.include.redist.c% 9 * 10 * @(#)kernfs_vnops.c 8.8 (Berkeley) 06/15/94 11 */ 12 13 /* 14 * Kernel parameter filesystem (/kern) 15 */ 16 17 #include <sys/param.h> 18 #include <sys/systm.h> 19 #include <sys/kernel.h> 20 #include <sys/vmmeter.h> 21 #include <sys/types.h> 22 #include <sys/time.h> 23 #include <sys/proc.h> 24 #include <sys/vnode.h> 25 #include <sys/malloc.h> 26 #include <sys/file.h> 27 #include <sys/stat.h> 28 #include <sys/mount.h> 29 #include <sys/namei.h> 30 #include <sys/buf.h> 31 #include <sys/dirent.h> 32 #include <miscfs/kernfs/kernfs.h> 33 34 #define KSTRING 256 /* Largest I/O available via this filesystem */ 35 #define UIO_MX 32 36 37 #define READ_MODE (S_IRUSR|S_IRGRP|S_IROTH) 38 #define WRITE_MODE (S_IWUSR|S_IRUSR|S_IRGRP|S_IROTH) 39 #define DIR_MODE (S_IRUSR|S_IXUSR|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH) 40 41 struct kern_target { 42 u_char kt_type; 43 u_char kt_namlen; 44 char *kt_name; 45 void *kt_data; 46 #define KTT_NULL 1 47 #define KTT_TIME 5 48 #define KTT_INT 17 49 #define KTT_STRING 31 50 #define KTT_HOSTNAME 47 51 #define KTT_AVENRUN 53 52 #define KTT_DEVICE 71 53 u_char kt_tag; 54 u_char kt_vtype; 55 mode_t kt_mode; 56 } kern_targets[] = { 57 /* NOTE: The name must be less than UIO_MX-16 chars in length */ 58 #define N(s) sizeof(s)-1, s 59 /* name data tag type ro/rw */ 60 { DT_DIR, N("."), 0, KTT_NULL, VDIR, DIR_MODE }, 61 { DT_DIR, N(".."), 0, KTT_NULL, VDIR, DIR_MODE }, 62 { DT_REG, N("boottime"), &boottime.tv_sec, KTT_INT, VREG, READ_MODE }, 63 { DT_REG, N("copyright"), copyright, KTT_STRING, VREG, READ_MODE }, 64 { DT_REG, N("hostname"), 0, KTT_HOSTNAME, VREG, WRITE_MODE }, 65 { DT_REG, N("hz"), &hz, KTT_INT, VREG, READ_MODE }, 66 { DT_REG, N("loadavg"), 0, KTT_AVENRUN, VREG, READ_MODE }, 67 { DT_REG, N("pagesize"), &cnt.v_page_size, KTT_INT, VREG, READ_MODE }, 68 { DT_REG, N("physmem"), &physmem, KTT_INT, VREG, READ_MODE }, 69 #if 0 70 { DT_DIR, N("root"), 0, KTT_NULL, VDIR, DIR_MODE }, 71 #endif 72 { DT_BLK, N("rootdev"), &rootdev, KTT_DEVICE, VBLK, READ_MODE }, 73 { DT_CHR, N("rrootdev"), &rrootdev, KTT_DEVICE, VCHR, READ_MODE }, 74 { DT_REG, N("time"), 0, KTT_TIME, VREG, READ_MODE }, 75 { DT_REG, N("version"), version, KTT_STRING, VREG, READ_MODE }, 76 #undef N 77 }; 78 static int nkern_targets = sizeof(kern_targets) / sizeof(kern_targets[0]); 79 80 static int 81 kernfs_xread(kt, buf, len, lenp) 82 struct kern_target *kt; 83 char *buf; 84 int len; 85 int *lenp; 86 { 87 88 switch (kt->kt_tag) { 89 case KTT_TIME: { 90 struct timeval tv; 91 microtime(&tv); 92 sprintf(buf, "%d %d\n", tv.tv_sec, tv.tv_usec); 93 break; 94 } 95 96 case KTT_INT: { 97 int *ip = kt->kt_data; 98 sprintf(buf, "%d\n", *ip); 99 break; 100 } 101 102 case KTT_STRING: { 103 char *cp = kt->kt_data; 104 int xlen = strlen(cp) + 1; 105 106 if (xlen >= len) 107 return (EINVAL); 108 109 bcopy(cp, buf, xlen); 110 break; 111 } 112 113 case KTT_HOSTNAME: { 114 char *cp = hostname; 115 int xlen = hostnamelen; 116 117 if (xlen >= (len-2)) 118 return (EINVAL); 119 120 bcopy(cp, buf, xlen); 121 buf[xlen] = '\n'; 122 buf[xlen+1] = '\0'; 123 break; 124 } 125 126 case KTT_AVENRUN: 127 sprintf(buf, "%ld %ld %ld %ld\n", 128 averunnable.ldavg[0], averunnable.ldavg[1], 129 averunnable.ldavg[2], averunnable.fscale); 130 break; 131 132 default: 133 return (EIO); 134 } 135 136 *lenp = strlen(buf); 137 return (0); 138 } 139 140 static int 141 kernfs_xwrite(kt, buf, len) 142 struct kern_target *kt; 143 char *buf; 144 int len; 145 { 146 147 switch (kt->kt_tag) { 148 case KTT_HOSTNAME: 149 if (buf[len-1] == '\n') 150 --len; 151 bcopy(buf, hostname, len); 152 hostname[len] = '\0'; 153 hostnamelen = len; 154 return (0); 155 156 default: 157 return (EIO); 158 } 159 } 160 161 162 /* 163 * vp is the current namei directory 164 * ndp is the name to locate in that directory... 165 */ 166 kernfs_lookup(ap) 167 struct vop_lookup_args /* { 168 struct vnode * a_dvp; 169 struct vnode ** a_vpp; 170 struct componentname * a_cnp; 171 } */ *ap; 172 { 173 struct componentname *cnp = ap->a_cnp; 174 struct vnode **vpp = ap->a_vpp; 175 struct vnode *dvp = ap->a_dvp; 176 char *pname = cnp->cn_nameptr; 177 struct kern_target *kt; 178 struct vnode *fvp; 179 int error, i; 180 181 #ifdef KERNFS_DIAGNOSTIC 182 printf("kernfs_lookup(%x)\n", ap); 183 printf("kernfs_lookup(dp = %x, vpp = %x, cnp = %x)\n", dvp, vpp, ap->a_cnp); 184 printf("kernfs_lookup(%s)\n", pname); 185 #endif 186 187 if (cnp->cn_namelen == 1 && *pname == '.') { 188 *vpp = dvp; 189 VREF(dvp); 190 /*VOP_LOCK(dvp);*/ 191 return (0); 192 } 193 194 #if 0 195 if (cnp->cn_namelen == 4 && bcmp(pname, "root", 4) == 0) { 196 *vpp = rootdir; 197 VREF(rootdir); 198 VOP_LOCK(rootdir); 199 return (0); 200 } 201 #endif 202 203 for (error = ENOENT, kt = kern_targets, i = 0; i < nkern_targets; 204 kt++, i++) { 205 if (cnp->cn_namelen == kt->kt_namlen && 206 bcmp(kt->kt_name, pname, cnp->cn_namelen) == 0) { 207 error = 0; 208 break; 209 } 210 } 211 212 #ifdef KERNFS_DIAGNOSTIC 213 printf("kernfs_lookup: i = %d, error = %d\n", i, error); 214 #endif 215 216 if (error) 217 return (error); 218 219 if (kt->kt_tag == KTT_DEVICE) { 220 dev_t *dp = kt->kt_data; 221 loop: 222 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) 223 return (ENOENT); 224 *vpp = fvp; 225 if (vget(fvp, 1)) 226 goto loop; 227 return (0); 228 } 229 230 #ifdef KERNFS_DIAGNOSTIC 231 printf("kernfs_lookup: allocate new vnode\n"); 232 #endif 233 if (error = getnewvnode(VT_KERNFS, dvp->v_mount, kernfs_vnodeop_p, 234 &fvp)) 235 return (error); 236 237 MALLOC(fvp->v_data, void *, sizeof(struct kernfs_node), M_TEMP, 238 M_WAITOK); 239 VTOKERN(fvp)->kf_kt = kt; 240 fvp->v_type = kt->kt_vtype; 241 *vpp = fvp; 242 243 #ifdef KERNFS_DIAGNOSTIC 244 printf("kernfs_lookup: newvp = %x\n", fvp); 245 #endif 246 return (0); 247 } 248 249 kernfs_open(ap) 250 struct vop_open_args /* { 251 struct vnode *a_vp; 252 int a_mode; 253 struct ucred *a_cred; 254 struct proc *a_p; 255 } */ *ap; 256 { 257 258 /* Only need to check access permissions. */ 259 return (0); 260 } 261 262 static int 263 kernfs_access(ap) 264 struct vop_access_args /* { 265 struct vnode *a_vp; 266 int a_mode; 267 struct ucred *a_cred; 268 struct proc *a_p; 269 } */ *ap; 270 { 271 register struct vnode *vp = ap->a_vp; 272 register struct ucred *cred = ap->a_cred; 273 mode_t amode = ap->a_mode; 274 mode_t fmode = 275 (vp->v_flag & VROOT) ? DIR_MODE : VTOKERN(vp)->kf_kt->kt_mode; 276 mode_t mask = 0; 277 register gid_t *gp; 278 int i; 279 280 /* Some files are simply not modifiable. */ 281 if ((amode & VWRITE) && (fmode & (S_IWUSR|S_IWGRP|S_IWOTH)) == 0) 282 return (EPERM); 283 284 /* Root can do anything else. */ 285 if (cred->cr_uid == 0) 286 return (0); 287 288 /* Check for group 0 (wheel) permissions. */ 289 for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++) 290 if (*gp == 0) { 291 if (amode & VEXEC) 292 mask |= S_IXGRP; 293 if (amode & VREAD) 294 mask |= S_IRGRP; 295 if (amode & VWRITE) 296 mask |= S_IWGRP; 297 return ((fmode & mask) == mask ? 0 : EACCES); 298 } 299 300 /* Otherwise, check everyone else. */ 301 if (amode & VEXEC) 302 mask |= S_IXOTH; 303 if (amode & VREAD) 304 mask |= S_IROTH; 305 if (amode & VWRITE) 306 mask |= S_IWOTH; 307 return ((fmode & mask) == mask ? 0 : EACCES); 308 } 309 310 kernfs_getattr(ap) 311 struct vop_getattr_args /* { 312 struct vnode *a_vp; 313 struct vattr *a_vap; 314 struct ucred *a_cred; 315 struct proc *a_p; 316 } */ *ap; 317 { 318 struct vnode *vp = ap->a_vp; 319 struct vattr *vap = ap->a_vap; 320 int error = 0; 321 char strbuf[KSTRING]; 322 323 bzero((caddr_t) vap, sizeof(*vap)); 324 vattr_null(vap); 325 vap->va_uid = 0; 326 vap->va_gid = 0; 327 vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; 328 vap->va_size = 0; 329 vap->va_blocksize = DEV_BSIZE; 330 microtime(&vap->va_atime); 331 vap->va_mtime = vap->va_atime; 332 vap->va_ctime = vap->va_ctime; 333 vap->va_gen = 0; 334 vap->va_flags = 0; 335 vap->va_rdev = 0; 336 vap->va_bytes = 0; 337 338 if (vp->v_flag & VROOT) { 339 #ifdef KERNFS_DIAGNOSTIC 340 printf("kernfs_getattr: stat rootdir\n"); 341 #endif 342 vap->va_type = VDIR; 343 vap->va_mode = DIR_MODE; 344 vap->va_nlink = 2; 345 vap->va_fileid = 2; 346 vap->va_size = DEV_BSIZE; 347 } else { 348 struct kern_target *kt = VTOKERN(vp)->kf_kt; 349 int nbytes; 350 #ifdef KERNFS_DIAGNOSTIC 351 printf("kernfs_getattr: stat target %s\n", kt->kt_name); 352 #endif 353 vap->va_type = kt->kt_vtype; 354 vap->va_mode = kt->kt_mode; 355 vap->va_nlink = 1; 356 vap->va_fileid = 1 + (kt - kern_targets) / sizeof(*kt); 357 error = kernfs_xread(kt, strbuf, sizeof(strbuf), &nbytes); 358 vap->va_size = nbytes; 359 } 360 361 #ifdef KERNFS_DIAGNOSTIC 362 printf("kernfs_getattr: return error %d\n", error); 363 #endif 364 return (error); 365 } 366 367 kernfs_setattr(ap) 368 struct vop_setattr_args /* { 369 struct vnode *a_vp; 370 struct vattr *a_vap; 371 struct ucred *a_cred; 372 struct proc *a_p; 373 } */ *ap; 374 { 375 376 /* 377 * Silently ignore attribute changes. 378 * This allows for open with truncate to have no 379 * effect until some data is written. I want to 380 * do it this way because all writes are atomic. 381 */ 382 return (0); 383 } 384 385 static int 386 kernfs_read(ap) 387 struct vop_read_args /* { 388 struct vnode *a_vp; 389 struct uio *a_uio; 390 int a_ioflag; 391 struct ucred *a_cred; 392 } */ *ap; 393 { 394 struct vnode *vp = ap->a_vp; 395 struct uio *uio = ap->a_uio; 396 struct kern_target *kt; 397 char strbuf[KSTRING]; 398 int off = uio->uio_offset; 399 int error, len; 400 char *cp; 401 402 if (vp->v_type == VDIR) 403 return (EOPNOTSUPP); 404 405 kt = VTOKERN(vp)->kf_kt; 406 407 #ifdef KERNFS_DIAGNOSTIC 408 printf("kern_read %s\n", kt->kt_name); 409 #endif 410 411 len = 0; 412 if (error = kernfs_xread(kt, strbuf, sizeof(strbuf), &len)) 413 return (error); 414 if (len <= off) 415 return (0); 416 return (uiomove(&strbuf[off], len - off, uio)); 417 } 418 419 static int 420 kernfs_write(ap) 421 struct vop_write_args /* { 422 struct vnode *a_vp; 423 struct uio *a_uio; 424 int a_ioflag; 425 struct ucred *a_cred; 426 } */ *ap; 427 { 428 struct vnode *vp = ap->a_vp; 429 struct uio *uio = ap->a_uio; 430 struct kern_target *kt; 431 int error, xlen; 432 char strbuf[KSTRING]; 433 434 if (vp->v_type == VDIR) 435 return (EOPNOTSUPP); 436 437 kt = VTOKERN(vp)->kf_kt; 438 439 if (uio->uio_offset != 0) 440 return (EINVAL); 441 442 xlen = min(uio->uio_resid, KSTRING-1); 443 if (error = uiomove(strbuf, xlen, uio)) 444 return (error); 445 446 if (uio->uio_resid != 0) 447 return (EIO); 448 449 strbuf[xlen] = '\0'; 450 xlen = strlen(strbuf); 451 return (kernfs_xwrite(kt, strbuf, xlen)); 452 } 453 454 kernfs_readdir(ap) 455 struct vop_readdir_args /* { 456 struct vnode *a_vp; 457 struct uio *a_uio; 458 struct ucred *a_cred; 459 int *a_eofflag; 460 u_long *a_cookies; 461 int a_ncookies; 462 } */ *ap; 463 { 464 int error, i; 465 struct uio *uio = ap->a_uio; 466 struct kern_target *kt; 467 struct dirent d; 468 469 if (ap->a_vp->v_type != VDIR) 470 return (ENOTDIR); 471 472 /* 473 * We don't allow exporting kernfs mounts, and currently local 474 * requests do not need cookies. 475 */ 476 if (ap->a_ncookies != NULL) 477 panic("kernfs_readdir: not hungry"); 478 479 i = uio->uio_offset / UIO_MX; 480 error = 0; 481 for (kt = &kern_targets[i]; 482 uio->uio_resid >= UIO_MX && i < nkern_targets; kt++, i++) { 483 struct dirent *dp = &d; 484 #ifdef KERNFS_DIAGNOSTIC 485 printf("kernfs_readdir: i = %d\n", i); 486 #endif 487 488 if (kt->kt_tag == KTT_DEVICE) { 489 dev_t *dp = kt->kt_data; 490 struct vnode *fvp; 491 492 if (*dp == NODEV || !vfinddev(*dp, kt->kt_vtype, &fvp)) 493 continue; 494 } 495 496 bzero((caddr_t)dp, UIO_MX); 497 dp->d_namlen = kt->kt_namlen; 498 bcopy(kt->kt_name, dp->d_name, kt->kt_namlen+1); 499 500 #ifdef KERNFS_DIAGNOSTIC 501 printf("kernfs_readdir: name = %s, len = %d\n", 502 dp->d_name, dp->d_namlen); 503 #endif 504 /* 505 * Fill in the remaining fields 506 */ 507 dp->d_reclen = UIO_MX; 508 dp->d_fileno = i + 3; 509 dp->d_type = kt->kt_type; 510 /* 511 * And ship to userland 512 */ 513 if (error = uiomove((caddr_t)dp, UIO_MX, uio)) 514 break; 515 } 516 517 uio->uio_offset = i * UIO_MX; 518 519 return (error); 520 } 521 522 kernfs_inactive(ap) 523 struct vop_inactive_args /* { 524 struct vnode *a_vp; 525 } */ *ap; 526 { 527 struct vnode *vp = ap->a_vp; 528 529 #ifdef KERNFS_DIAGNOSTIC 530 printf("kernfs_inactive(%x)\n", vp); 531 #endif 532 /* 533 * Clear out the v_type field to avoid 534 * nasty things happening in vgone(). 535 */ 536 vp->v_type = VNON; 537 return (0); 538 } 539 540 kernfs_reclaim(ap) 541 struct vop_reclaim_args /* { 542 struct vnode *a_vp; 543 } */ *ap; 544 { 545 struct vnode *vp = ap->a_vp; 546 547 #ifdef KERNFS_DIAGNOSTIC 548 printf("kernfs_reclaim(%x)\n", vp); 549 #endif 550 if (vp->v_data) { 551 FREE(vp->v_data, M_TEMP); 552 vp->v_data = 0; 553 } 554 return (0); 555 } 556 557 /* 558 * Return POSIX pathconf information applicable to special devices. 559 */ 560 kernfs_pathconf(ap) 561 struct vop_pathconf_args /* { 562 struct vnode *a_vp; 563 int a_name; 564 int *a_retval; 565 } */ *ap; 566 { 567 568 switch (ap->a_name) { 569 case _PC_LINK_MAX: 570 *ap->a_retval = LINK_MAX; 571 return (0); 572 case _PC_MAX_CANON: 573 *ap->a_retval = MAX_CANON; 574 return (0); 575 case _PC_MAX_INPUT: 576 *ap->a_retval = MAX_INPUT; 577 return (0); 578 case _PC_PIPE_BUF: 579 *ap->a_retval = PIPE_BUF; 580 return (0); 581 case _PC_CHOWN_RESTRICTED: 582 *ap->a_retval = 1; 583 return (0); 584 case _PC_VDISABLE: 585 *ap->a_retval = _POSIX_VDISABLE; 586 return (0); 587 default: 588 return (EINVAL); 589 } 590 /* NOTREACHED */ 591 } 592 593 /* 594 * Print out the contents of a /dev/fd vnode. 595 */ 596 /* ARGSUSED */ 597 kernfs_print(ap) 598 struct vop_print_args /* { 599 struct vnode *a_vp; 600 } */ *ap; 601 { 602 603 printf("tag VT_KERNFS, kernfs vnode\n"); 604 return (0); 605 } 606 607 /*void*/ 608 kernfs_vfree(ap) 609 struct vop_vfree_args /* { 610 struct vnode *a_pvp; 611 ino_t a_ino; 612 int a_mode; 613 } */ *ap; 614 { 615 616 return (0); 617 } 618 619 /* 620 * /dev/fd vnode unsupported operation 621 */ 622 kernfs_enotsupp() 623 { 624 625 return (EOPNOTSUPP); 626 } 627 628 /* 629 * /dev/fd "should never get here" operation 630 */ 631 kernfs_badop() 632 { 633 634 panic("kernfs: bad op"); 635 /* NOTREACHED */ 636 } 637 638 /* 639 * kernfs vnode null operation 640 */ 641 kernfs_nullop() 642 { 643 644 return (0); 645 } 646 647 #define kernfs_create ((int (*) __P((struct vop_create_args *)))kernfs_enotsupp) 648 #define kernfs_mknod ((int (*) __P((struct vop_mknod_args *)))kernfs_enotsupp) 649 #define kernfs_close ((int (*) __P((struct vop_close_args *)))nullop) 650 #define kernfs_ioctl ((int (*) __P((struct vop_ioctl_args *)))kernfs_enotsupp) 651 #define kernfs_select ((int (*) __P((struct vop_select_args *)))kernfs_enotsupp) 652 #define kernfs_mmap ((int (*) __P((struct vop_mmap_args *)))kernfs_enotsupp) 653 #define kernfs_fsync ((int (*) __P((struct vop_fsync_args *)))nullop) 654 #define kernfs_seek ((int (*) __P((struct vop_seek_args *)))nullop) 655 #define kernfs_remove ((int (*) __P((struct vop_remove_args *)))kernfs_enotsupp) 656 #define kernfs_link ((int (*) __P((struct vop_link_args *)))kernfs_enotsupp) 657 #define kernfs_rename ((int (*) __P((struct vop_rename_args *)))kernfs_enotsupp) 658 #define kernfs_mkdir ((int (*) __P((struct vop_mkdir_args *)))kernfs_enotsupp) 659 #define kernfs_rmdir ((int (*) __P((struct vop_rmdir_args *)))kernfs_enotsupp) 660 #define kernfs_symlink ((int (*) __P((struct vop_symlink_args *)))kernfs_enotsupp) 661 #define kernfs_readlink \ 662 ((int (*) __P((struct vop_readlink_args *)))kernfs_enotsupp) 663 #define kernfs_abortop ((int (*) __P((struct vop_abortop_args *)))nullop) 664 #define kernfs_lock ((int (*) __P((struct vop_lock_args *)))nullop) 665 #define kernfs_unlock ((int (*) __P((struct vop_unlock_args *)))nullop) 666 #define kernfs_bmap ((int (*) __P((struct vop_bmap_args *)))kernfs_badop) 667 #define kernfs_strategy ((int (*) __P((struct vop_strategy_args *)))kernfs_badop) 668 #define kernfs_islocked ((int (*) __P((struct vop_islocked_args *)))nullop) 669 #define kernfs_advlock ((int (*) __P((struct vop_advlock_args *)))kernfs_enotsupp) 670 #define kernfs_blkatoff \ 671 ((int (*) __P((struct vop_blkatoff_args *)))kernfs_enotsupp) 672 #define kernfs_valloc ((int(*) __P(( \ 673 struct vnode *pvp, \ 674 int mode, \ 675 struct ucred *cred, \ 676 struct vnode **vpp))) kernfs_enotsupp) 677 #define kernfs_truncate \ 678 ((int (*) __P((struct vop_truncate_args *)))kernfs_enotsupp) 679 #define kernfs_update ((int (*) __P((struct vop_update_args *)))kernfs_enotsupp) 680 #define kernfs_bwrite ((int (*) __P((struct vop_bwrite_args *)))kernfs_enotsupp) 681 682 int (**kernfs_vnodeop_p)(); 683 struct vnodeopv_entry_desc kernfs_vnodeop_entries[] = { 684 { &vop_default_desc, vn_default_error }, 685 { &vop_lookup_desc, kernfs_lookup }, /* lookup */ 686 { &vop_create_desc, kernfs_create }, /* create */ 687 { &vop_mknod_desc, kernfs_mknod }, /* mknod */ 688 { &vop_open_desc, kernfs_open }, /* open */ 689 { &vop_close_desc, kernfs_close }, /* close */ 690 { &vop_access_desc, kernfs_access }, /* access */ 691 { &vop_getattr_desc, kernfs_getattr }, /* getattr */ 692 { &vop_setattr_desc, kernfs_setattr }, /* setattr */ 693 { &vop_read_desc, kernfs_read }, /* read */ 694 { &vop_write_desc, kernfs_write }, /* write */ 695 { &vop_ioctl_desc, kernfs_ioctl }, /* ioctl */ 696 { &vop_select_desc, kernfs_select }, /* select */ 697 { &vop_mmap_desc, kernfs_mmap }, /* mmap */ 698 { &vop_fsync_desc, kernfs_fsync }, /* fsync */ 699 { &vop_seek_desc, kernfs_seek }, /* seek */ 700 { &vop_remove_desc, kernfs_remove }, /* remove */ 701 { &vop_link_desc, kernfs_link }, /* link */ 702 { &vop_rename_desc, kernfs_rename }, /* rename */ 703 { &vop_mkdir_desc, kernfs_mkdir }, /* mkdir */ 704 { &vop_rmdir_desc, kernfs_rmdir }, /* rmdir */ 705 { &vop_symlink_desc, kernfs_symlink }, /* symlink */ 706 { &vop_readdir_desc, kernfs_readdir }, /* readdir */ 707 { &vop_readlink_desc, kernfs_readlink },/* readlink */ 708 { &vop_abortop_desc, kernfs_abortop }, /* abortop */ 709 { &vop_inactive_desc, kernfs_inactive },/* inactive */ 710 { &vop_reclaim_desc, kernfs_reclaim }, /* reclaim */ 711 { &vop_lock_desc, kernfs_lock }, /* lock */ 712 { &vop_unlock_desc, kernfs_unlock }, /* unlock */ 713 { &vop_bmap_desc, kernfs_bmap }, /* bmap */ 714 { &vop_strategy_desc, kernfs_strategy },/* strategy */ 715 { &vop_print_desc, kernfs_print }, /* print */ 716 { &vop_islocked_desc, kernfs_islocked },/* islocked */ 717 { &vop_pathconf_desc, kernfs_pathconf },/* pathconf */ 718 { &vop_advlock_desc, kernfs_advlock }, /* advlock */ 719 { &vop_blkatoff_desc, kernfs_blkatoff },/* blkatoff */ 720 { &vop_valloc_desc, kernfs_valloc }, /* valloc */ 721 { &vop_vfree_desc, kernfs_vfree }, /* vfree */ 722 { &vop_truncate_desc, kernfs_truncate },/* truncate */ 723 { &vop_update_desc, kernfs_update }, /* update */ 724 { &vop_bwrite_desc, kernfs_bwrite }, /* bwrite */ 725 { (struct vnodeop_desc*)NULL, (int(*)())NULL } 726 }; 727 struct vnodeopv_desc kernfs_vnodeop_opv_desc = 728 { &kernfs_vnodeop_p, kernfs_vnodeop_entries }; 729