]> git.saurik.com Git - apple/xnu.git/blame - bsd/isofs/cd9660/cd9660_vnops.c
xnu-344.23.tar.gz
[apple/xnu.git] / bsd / isofs / cd9660 / cd9660_vnops.c
CommitLineData
1c79356b
A
1/*
2 * Copyright (c) 2000 Apple Computer, Inc. All rights reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
de355530
A
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
1c79356b 11 *
de355530
A
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
1c79356b
A
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
de355530
A
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
18 * under the License.
1c79356b
A
19 *
20 * @APPLE_LICENSE_HEADER_END@
21 */
22/* $NetBSD: cd9660_vnops.c,v 1.22 1994/12/27 19:05:12 mycroft Exp $ */
23
24/*-
25 * Copyright (c) 1994
26 * The Regents of the University of California. All rights reserved.
27 *
28 * This code is derived from software contributed to Berkeley
29 * by Pace Willisson (pace@blitz.com). The Rock Ridge Extension
30 * Support code is derived from software contributed to Berkeley
31 * by Atsushi Murai (amurai@spec.co.jp).
32 *
33 * Redistribution and use in source and binary forms, with or without
34 * modification, are permitted provided that the following conditions
35 * are met:
36 * 1. Redistributions of source code must retain the above copyright
37 * notice, this list of conditions and the following disclaimer.
38 * 2. Redistributions in binary form must reproduce the above copyright
39 * notice, this list of conditions and the following disclaimer in the
40 * documentation and/or other materials provided with the distribution.
41 * 3. All advertising materials mentioning features or use of this software
42 * must display the following acknowledgement:
43 * This product includes software developed by the University of
44 * California, Berkeley and its contributors.
45 * 4. Neither the name of the University nor the names of its contributors
46 * may be used to endorse or promote products derived from this software
47 * without specific prior written permission.
48 *
49 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
50 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
51 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
52 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
53 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
54 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
55 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
56 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
57 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
58 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
59 * SUCH DAMAGE.
60 *
61 * @(#)cd9660_vnops.c 8.15 (Berkeley) 12/5/94
62 *
63 * HISTORY
64 * 02-Feb-00 chw Add cd9660_copyfile to return error
65 * 29-Sep-98 djb Add cd9660_getattrlist VOP for VDI support.
66 * 15-sep-98 added cd9660_rmdir to do proper unlocking - chw
67 * 12-aug-98 added cd9660_remove which will do proper unlocking - chw
68 * 17-Feb-98 radar 1669467 - changed lock protocols to use the lock manager - chw
69 * 22-Jan-98 radar 1669467 - ISO 9660 CD support - jwc
70 */
71
72#include <sys/param.h>
73#include <sys/systm.h>
74#include <sys/vnode.h>
75#include <sys/mount.h>
76#include <sys/namei.h>
77#include <sys/resourcevar.h>
78#include <sys/kernel.h>
79#include <sys/file.h>
80#include <sys/stat.h>
81#include <sys/buf.h>
82#include <sys/proc.h>
83#include <sys/conf.h>
84#include <miscfs/specfs/specdev.h>
85#include <miscfs/fifofs/fifo.h>
86#include <sys/malloc.h>
87#include <sys/dir.h>
88#include <sys/attr.h>
89#include <vfs/vfs_support.h>
90#include <sys/ubc.h>
91
92#include <sys/lock.h>
93
94#include <isofs/cd9660/iso.h>
95#include <isofs/cd9660/cd9660_node.h>
96#include <isofs/cd9660/iso_rrip.h>
97
98/*
99 * Open called.
100 *
101 * Nothing to do.
102 */
103/* ARGSUSED */
104int
105cd9660_open(ap)
106 struct vop_open_args /* {
107 struct vnode *a_vp;
108 int a_mode;
109 struct ucred *a_cred;
110 struct proc *a_p;
111 } */ *ap;
112{
113 return (0);
114}
115
116/*
117 * Close called
118 *
119 * Update the times on the inode on writeable file systems.
120 */
121/* ARGSUSED */
122int
123cd9660_close(ap)
124 struct vop_close_args /* {
125 struct vnode *a_vp;
126 int a_fflag;
127 struct ucred *a_cred;
128 struct proc *a_p;
129 } */ *ap;
130{
131 return (0);
132}
133
134/*
135 * Check mode permission on inode pointer. Mode is READ, WRITE or EXEC.
136 * The mode is shifted to select the owner/group/other fields. The
137 * super user is granted all permissions.
138 */
139/* ARGSUSED */
140int
141cd9660_access(ap)
142 struct vop_access_args /* {
143 struct vnode *a_vp;
144 int a_mode;
145 struct ucred *a_cred;
146 struct proc *a_p;
147 } */ *ap;
148{
149 struct vnode *vp = ap->a_vp;
150 struct iso_node *ip = VTOI(vp);
151 struct ucred *cred = ap->a_cred;
152 mode_t mask, mode = ap->a_mode;
153 register gid_t *gp;
154 int i, error;
155
156 /*
157 * Disallow write attempts on read-only file systems;
158 * unless the file is a socket, fifo, or a block or
159 * character device resident on the file system.
160 */
161 if (mode & VWRITE) {
162 switch (vp->v_type) {
163 case VDIR:
164 case VLNK:
165 case VREG:
166 return (EROFS);
167 /* NOT REACHED */
168 default:
169 break;
170 }
171 }
172
173 /* If immutable bit set, nobody gets to write it. */
174#if 0
175 if ((mode & VWRITE) && (ip->i_flag & IMMUTABLE))
176 return (EPERM);
177#endif
178 /* Otherwise, user id 0 always gets access. */
179 if (cred->cr_uid == 0)
180 return (0);
181
182 mask = 0;
183
184 /* Otherwise, check the owner. */
185 if (cred->cr_uid == ip->inode.iso_uid) {
186 if (mode & VEXEC)
187 mask |= S_IXUSR;
188 if (mode & VREAD)
189 mask |= S_IRUSR;
190 if (mode & VWRITE)
191 mask |= S_IWUSR;
192 return ((ip->inode.iso_mode & mask) == mask ? 0 : EACCES);
193 }
194
195 /* Otherwise, check the groups. */
196 for (i = 0, gp = cred->cr_groups; i < cred->cr_ngroups; i++, gp++)
197 if (ip->inode.iso_gid == *gp) {
198 if (mode & VEXEC)
199 mask |= S_IXGRP;
200 if (mode & VREAD)
201 mask |= S_IRGRP;
202 if (mode & VWRITE)
203 mask |= S_IWGRP;
204 return ((ip->inode.iso_mode & mask) == mask ? 0 : EACCES);
205 }
206
207 /* Otherwise, check everyone else. */
208 if (mode & VEXEC)
209 mask |= S_IXOTH;
210 if (mode & VREAD)
211 mask |= S_IROTH;
212 if (mode & VWRITE)
213 mask |= S_IWOTH;
214 return ((ip->inode.iso_mode & mask) == mask ? 0 : EACCES);
215}
216
217int
218cd9660_getattr(ap)
219 struct vop_getattr_args /* {
220 struct vnode *a_vp;
221 struct vattr *a_vap;
222 struct ucred *a_cred;
223 struct proc *a_p;
224 } */ *ap;
225
226{
227 struct vnode *vp = ap->a_vp;
228 register struct vattr *vap = ap->a_vap;
229 register struct iso_node *ip = VTOI(vp);
230
231 vap->va_fsid = ip->i_dev;
232 vap->va_fileid = ip->i_number;
233
234 vap->va_mode = ip->inode.iso_mode;
235 vap->va_nlink = ip->inode.iso_links;
236 vap->va_uid = ip->inode.iso_uid;
237 vap->va_gid = ip->inode.iso_gid;
238 vap->va_atime = ip->inode.iso_atime;
239 vap->va_mtime = ip->inode.iso_mtime;
240 vap->va_ctime = ip->inode.iso_ctime;
241 vap->va_rdev = ip->inode.iso_rdev;
242
243 vap->va_size = (u_quad_t) ip->i_size;
244 if (ip->i_size == 0 && (vap->va_mode & S_IFMT) == S_IFLNK) {
245 struct vop_readlink_args rdlnk;
246 struct iovec aiov;
247 struct uio auio;
248 char *cp;
249
250 MALLOC(cp, char *, MAXPATHLEN, M_TEMP, M_WAITOK);
251 aiov.iov_base = cp;
252 aiov.iov_len = MAXPATHLEN;
253 auio.uio_iov = &aiov;
254 auio.uio_iovcnt = 1;
255 auio.uio_offset = 0;
256 auio.uio_rw = UIO_READ;
257 auio.uio_segflg = UIO_SYSSPACE;
258 auio.uio_procp = ap->a_p;
259 auio.uio_resid = MAXPATHLEN;
260 rdlnk.a_uio = &auio;
261 rdlnk.a_vp = ap->a_vp;
262 rdlnk.a_cred = ap->a_cred;
263 if (cd9660_readlink(&rdlnk) == 0)
264 vap->va_size = MAXPATHLEN - auio.uio_resid;
265 FREE(cp, M_TEMP);
266 }
267 vap->va_flags = 0;
268 vap->va_gen = 1;
269 vap->va_blocksize = ip->i_mnt->logical_block_size;
270 vap->va_bytes = (u_quad_t) (ip->i_size + ip->i_rsrcsize);
271 vap->va_type = vp->v_type;
272
273 return (0);
274}
275
276
277/*
278 * Vnode op for reading.
279 */
280int
281cd9660_read(ap)
282 struct vop_read_args /* {
283 struct vnode *a_vp;
284 struct uio *a_uio;
285 int a_ioflag;
286 struct ucred *a_cred;
287 } */ *ap;
288{
289 struct vnode *vp = ap->a_vp;
290 register struct uio *uio = ap->a_uio;
291 register struct iso_node *ip = VTOI(vp);
292 register struct iso_mnt *imp;
293 struct buf *bp;
294 daddr_t lbn, rablock;
295 off_t diff;
296 int rasize, error = 0;
297 long size, n, on;
298 int devBlockSize = 0;
299
300 if (uio->uio_resid == 0)
301 return (0);
302 if (uio->uio_offset < 0)
303 return (EINVAL);
304
305 imp = ip->i_mnt;
306 VOP_DEVBLOCKSIZE(ip->i_devvp, &devBlockSize);
307
308 if (UBCISVALID(vp))
309 error = cluster_read(vp, uio, (off_t)ip->i_size, devBlockSize, 0);
310 else {
311
312 do {
313 lbn = lblkno(imp, uio->uio_offset);
314 on = blkoff(imp, uio->uio_offset);
315 n = min((u_int)(imp->logical_block_size - on),
316 uio->uio_resid);
317 diff = (off_t)ip->i_size - uio->uio_offset;
318 if (diff <= 0)
319 return (0);
320 if (diff < n)
321 n = diff;
322 size = blksize(imp, ip, lbn);
323 rablock = lbn + 1;
324
325 if (vp->v_lastr + 1 == lbn &&
326 lblktosize(imp, rablock) < ip->i_size) {
327 rasize = blksize(imp, ip, rablock);
328 error = breadn(vp, lbn, size, &rablock,
329 &rasize, 1, NOCRED, &bp);
330 } else
331 error = bread(vp, lbn, size, NOCRED, &bp);
332
333 vp->v_lastr = lbn;
334 n = min(n, size - bp->b_resid);
335 if (error) {
336 brelse(bp);
337 return (error);
338 }
339
340 error = uiomove(bp->b_data + on, (int)n, uio);
341 if (n + on == imp->logical_block_size ||
342 uio->uio_offset == (off_t)ip->i_size)
343 bp->b_flags |= B_AGE;
344 brelse(bp);
345 } while (error == 0 && uio->uio_resid > 0 && n != 0);
346 }
347
348 return (error);
349}
350
351/* ARGSUSED */
352int
353cd9660_ioctl(ap)
354 struct vop_ioctl_args /* {
355 struct vnode *a_vp;
356 u_long a_command;
357 caddr_t a_data;
358 int a_fflag;
359 struct ucred *a_cred;
360 struct proc *a_p;
361 } */ *ap;
362{
363 printf("You did ioctl for isofs !!\n");
364 return (ENOTTY);
365}
366
367/* ARGSUSED */
368int
369cd9660_select(ap)
370 struct vop_select_args /* {
371 struct vnode *a_vp;
372 int a_which;
373 int a_fflags;
374 struct ucred *a_cred;
0b4e3aa0 375 void *a_wql;
1c79356b
A
376 struct proc *a_p;
377 } */ *ap;
378{
379 /*
380 * We should really check to see if I/O is possible.
381 */
382 return (1);
383}
384
385/*
386 * Mmap a file
387 *
388 * NB Currently unsupported.
389 */
390/* ARGSUSED */
391int
392cd9660_mmap(ap)
393 struct vop_mmap_args /* {
394 struct vnode *a_vp;
395 int a_fflags;
396 struct ucred *a_cred;
397 struct proc *a_p;
398 } */ *ap;
399{
400
401 return (EINVAL);
402}
403
404/*
405 * Seek on a file
406 *
407 * Nothing to do, so just return.
408 */
409/* ARGSUSED */
410int
411cd9660_seek(ap)
412 struct vop_seek_args /* {
413 struct vnode *a_vp;
414 off_t a_oldoff;
415 off_t a_newoff;
416 struct ucred *a_cred;
417 } */ *ap;
418{
419
420 return (0);
421}
422
423/*
424 * Structure for reading directories
425 */
426struct isoreaddir {
427 struct dirent saveent;
428 struct dirent current;
429 off_t saveoff;
430 off_t curroff;
431 struct uio *uio;
432 off_t uio_off;
433 int eofflag;
434// u_long **cookies;
435// int *ncookies;
436};
437
438static int
439iso_uiodir(idp,dp,off)
440 struct isoreaddir *idp;
441 struct dirent *dp;
442 off_t off;
443{
444 int error;
445
446 dp->d_name[dp->d_namlen] = 0;
447 dp->d_reclen = DIRSIZ(dp);
448
449 if (idp->uio->uio_resid < dp->d_reclen) {
450 idp->eofflag = 0;
451 return (-1);
452 }
453
454#if 0
455 if (idp->cookies) {
456 if (*idp->ncookies <= 0) {
457 idp->eofflag = 0;
458 return (-1);
459 }
460
461 **idp->cookies++ = off;
462 --*idp->ncookies;
463 }
464#endif
465
466 if ( (error = uiomove( (caddr_t)dp, dp->d_reclen, idp->uio )) )
467 return (error);
468 idp->uio_off = off;
469 return (0);
470}
471
472static int
473iso_shipdir(idp)
474 struct isoreaddir *idp;
475{
476 struct dirent *dp;
477 int cl, sl;
478 int error;
479 char *cname, *sname;
480
481 cl = idp->current.d_namlen;
482 cname = idp->current.d_name;
483
484 dp = &idp->saveent;
485 sname = dp->d_name;
486 sl = dp->d_namlen;
487 if (sl > 0) {
488 if (sl != cl
489 || bcmp(sname,cname,sl)) {
490 if (idp->saveent.d_namlen) {
491 if ( (error = iso_uiodir(idp,&idp->saveent,idp->saveoff)) )
492 return (error);
493 idp->saveent.d_namlen = 0;
494 }
495 }
496 }
497 idp->current.d_reclen = DIRSIZ(&idp->current);
498 idp->saveoff = idp->curroff;
499 bcopy(&idp->current,&idp->saveent,idp->current.d_reclen);
500 return (0);
501}
502
503/*
504 * Vnode op for readdir
505 */
506int
507cd9660_readdir(ap)
508 struct vop_readdir_args /* {
509 struct vnodeop_desc *a_desc;
510 struct vnode *a_vp;
511 struct uio *a_uio;
512 struct ucred *a_cred;
513 int *a_eofflag;
514 int *a_ncookies;
515 u_long **a_cookies;
516 } */ *ap;
517{
518 register struct uio *uio = ap->a_uio;
519 off_t startingOffset = uio->uio_offset;
520 size_t lost = 0;
521 struct isoreaddir *idp;
522 struct vnode *vdp = ap->a_vp;
523 struct iso_node *dp;
524 struct iso_mnt *imp;
525 struct buf *bp = NULL;
526 struct iso_directory_record *ep;
527 int entryoffsetinblock;
528 doff_t endsearch;
529 u_long bmask;
530 int error = 0;
531 int reclen;
532 u_short namelen;
533
534 dp = VTOI(vdp);
535 imp = dp->i_mnt;
536 bmask = imp->im_bmask;
537
538 MALLOC(idp, struct isoreaddir *, sizeof(*idp), M_TEMP, M_WAITOK);
539 idp->saveent.d_namlen = 0;
540 /*
541 * XXX
542 * Is it worth trying to figure out the type?
543 */
544 idp->saveent.d_type = idp->current.d_type = DT_UNKNOWN;
545 idp->uio = uio;
546 idp->eofflag = 1;
547 idp->curroff = uio->uio_offset;
548
549 if ((entryoffsetinblock = idp->curroff & bmask) &&
550 (error = VOP_BLKATOFF(vdp, (off_t)idp->curroff, NULL, &bp))) {
551 FREE(idp, M_TEMP);
552 return (error);
553 }
554 endsearch = dp->i_size;
555
556 while (idp->curroff < endsearch) {
557 /*
558 * If offset is on a block boundary,
559 * read the next directory block.
560 * Release previous if it exists.
561 */
562 if ((idp->curroff & bmask) == 0) {
563 if (bp != NULL)
564 brelse(bp);
565 if ( (error = VOP_BLKATOFF(vdp, (off_t)idp->curroff, NULL, &bp)) )
566 break;
567 entryoffsetinblock = 0;
568 }
569 /*
570 * Get pointer to next entry.
571 */
572 ep = (struct iso_directory_record *)
573 ((char *)bp->b_data + entryoffsetinblock);
574
575 reclen = isonum_711(ep->length);
576 if (reclen == 0) {
577 /* skip to next block, if any */
578 idp->curroff =
579 (idp->curroff & ~bmask) + imp->logical_block_size;
580 continue;
581 }
582
583 if (reclen < ISO_DIRECTORY_RECORD_SIZE) {
584 error = EINVAL;
585 /* illegal entry, stop */
586 break;
587 }
588
589 if (entryoffsetinblock + reclen > imp->logical_block_size) {
590 error = EINVAL;
591 /* illegal directory, so stop looking */
592 break;
593 }
594
595 idp->current.d_namlen = isonum_711(ep->name_len);
596
597 if (reclen < ISO_DIRECTORY_RECORD_SIZE + idp->current.d_namlen) {
598 error = EINVAL;
599 /* illegal entry, stop */
600 break;
601 }
602
603 /* skip over associated files (Mac OS resource fork) */
604 if (isonum_711(ep->flags) & associatedBit) {
605 idp->curroff += reclen;
606 entryoffsetinblock += reclen;
607 continue;
608 }
609
610 if ( isonum_711(ep->flags) & directoryBit )
611 idp->current.d_fileno = isodirino(ep, imp);
612 else {
613 idp->current.d_fileno = (bp->b_blkno << imp->im_bshift) + entryoffsetinblock;
614 }
615
616 idp->curroff += reclen;
617
618 switch (imp->iso_ftype) {
619 case ISO_FTYPE_RRIP:
620 cd9660_rrip_getname(ep,idp->current.d_name, &namelen,
621 &idp->current.d_fileno,imp);
622 idp->current.d_namlen = (u_char)namelen;
623 if (idp->current.d_namlen)
624 error = iso_uiodir(idp,&idp->current,idp->curroff);
625 break;
626
627 case ISO_FTYPE_JOLIET:
628 ucsfntrans((u_int16_t *)ep->name, idp->current.d_namlen,
629 idp->current.d_name, &namelen,
630 isonum_711(ep->flags) & directoryBit);
631 idp->current.d_namlen = (u_char)namelen;
632 if (idp->current.d_namlen)
633 error = iso_uiodir(idp,&idp->current,idp->curroff);
634 break;
635
636 default: /* ISO_FTYPE_DEFAULT || ISO_FTYPE_9660 */
637 strcpy(idp->current.d_name,"..");
638 switch (ep->name[0]) {
639 case 0:
640 idp->current.d_namlen = 1;
641 error = iso_uiodir(idp,&idp->current,idp->curroff);
642 break;
643 case 1:
644 idp->current.d_namlen = 2;
645 error = iso_uiodir(idp,&idp->current,idp->curroff);
646 break;
647 default:
648 isofntrans(ep->name,idp->current.d_namlen,
649 idp->current.d_name, &namelen,
650 imp->iso_ftype == ISO_FTYPE_9660);
651 idp->current.d_namlen = (u_char)namelen;
652 if (imp->iso_ftype == ISO_FTYPE_DEFAULT)
653 error = iso_shipdir(idp);
654 else
655 error = iso_uiodir(idp,&idp->current,idp->curroff);
656 break;
657 }
658 }
659 if (error)
660 break;
661
662 entryoffsetinblock += reclen;
663 }
664
665 if (!error && imp->iso_ftype == ISO_FTYPE_DEFAULT) {
666 idp->current.d_namlen = 0;
667 error = iso_shipdir(idp);
668 }
669
670 if (!error && ap->a_ncookies) {
671 struct dirent *dp, *dpstart;
672 off_t bufferOffset;
673 u_long *cookies;
674 int ncookies;
675
676 /*
677 * Only the NFS server uses cookies, and it loads the
678 * directory block into system space, so we can just look at
679 * it directly.
680 *
681 * We assume the entire transfer is done to a single contiguous buffer.
682 */
683 if (uio->uio_segflg != UIO_SYSSPACE || uio->uio_iovcnt != 1)
684 panic("ufs_readdir: lost in space");
685
686 /*
687 * Make a first pass over the buffer just generated,
688 * counting the number of entries:
689 */
690 dpstart = (struct dirent *) (uio->uio_iov->iov_base - (uio->uio_offset - startingOffset));
691 for (dp = dpstart, bufferOffset = startingOffset, ncookies = 0;
692 bufferOffset < uio->uio_offset; ) {
693 if (dp->d_reclen == 0)
694 break;
695 bufferOffset += dp->d_reclen;
696 ncookies++;
697 dp = (struct dirent *)((caddr_t)dp + dp->d_reclen);
698 }
699 lost += uio->uio_offset - bufferOffset;
700 uio->uio_offset = bufferOffset;
701
702 /*
703 * Allocate a buffer to hold the cookies requested:
704 */
705 MALLOC(cookies, u_long *, ncookies * sizeof(u_long), M_TEMP, M_WAITOK);
706 *ap->a_ncookies = ncookies;
707 *ap->a_cookies = cookies;
708
709 /*
710 * Fill in the offsets for each entry in the buffer just allocated:
711 */
712 for (bufferOffset = startingOffset, dp = dpstart; bufferOffset < uio->uio_offset; ) {
713 *(cookies++) = bufferOffset;
714 bufferOffset += dp->d_reclen;
715 dp = (struct dirent *)((caddr_t)dp + dp->d_reclen);
716 }
717 }
718
719 if (error < 0)
720 error = 0;
721
722 if (bp)
723 brelse (bp);
724
725 uio->uio_offset = idp->uio_off;
726 *ap->a_eofflag = idp->eofflag;
727
728 FREE(idp, M_TEMP);
729
730 return (error);
731}
732
733/*
734 * Return target name of a symbolic link
735 * Shouldn't we get the parent vnode and read the data from there?
736 * This could eventually result in deadlocks in cd9660_lookup.
737 * But otherwise the block read here is in the block buffer two times.
738 */
739typedef struct iso_directory_record ISODIR;
740typedef struct iso_node ISONODE;
741typedef struct iso_mnt ISOMNT;
742int
743cd9660_readlink(ap)
744 struct vop_readlink_args /* {
745 struct vnode *a_vp;
746 struct uio *a_uio;
747 struct ucred *a_cred;
748 } */ *ap;
749{
750 ISONODE *ip;
751 ISODIR *dirp;
752 ISOMNT *imp;
753 struct buf *bp;
754 struct uio *uio;
755 u_short symlen;
756 int error;
757 char *symname;
758
759 ip = VTOI(ap->a_vp);
760 imp = ip->i_mnt;
761 uio = ap->a_uio;
762
763 if (imp->iso_ftype != ISO_FTYPE_RRIP)
764 return (EINVAL);
765
766 /*
767 * Get parents directory record block that this inode included.
768 */
769 error = bread(imp->im_devvp,
770 (ip->i_number >> imp->im_bshift),
771 imp->logical_block_size, NOCRED, &bp);
772 if (error) {
773 brelse(bp);
774 return (EINVAL);
775 }
776
777 /*
778 * Setup the directory pointer for this inode
779 */
780 dirp = (ISODIR *)(bp->b_data + (ip->i_number & imp->im_bmask));
781
782 /*
783 * Just make sure, we have a right one....
784 * 1: Check not cross boundary on block
785 */
786 if ((ip->i_number & imp->im_bmask) + isonum_711(dirp->length)
787 > imp->logical_block_size) {
788 brelse(bp);
789 return (EINVAL);
790 }
791
792 /*
793 * Now get a buffer
794 * Abuse a namei buffer for now.
795 */
796 if (uio->uio_segflg == UIO_SYSSPACE)
797 symname = uio->uio_iov->iov_base;
798 else
799 MALLOC_ZONE(symname, char *, MAXPATHLEN, M_NAMEI, M_WAITOK);
800
801 /*
802 * Ok, we just gathering a symbolic name in SL record.
803 */
804 if (cd9660_rrip_getsymname(dirp, symname, &symlen, imp) == 0) {
805 if (uio->uio_segflg != UIO_SYSSPACE)
806 FREE_ZONE(symname, MAXPATHLEN, M_NAMEI);
807 brelse(bp);
808 return (EINVAL);
809 }
810 /*
811 * Don't forget before you leave from home ;-)
812 */
813 brelse(bp);
814
815 /*
816 * return with the symbolic name to caller's.
817 */
818 if (uio->uio_segflg != UIO_SYSSPACE) {
819 error = uiomove(symname, symlen, uio);
820 FREE_ZONE(symname, MAXPATHLEN, M_NAMEI);
821 return (error);
822 }
823 uio->uio_resid -= symlen;
824 uio->uio_iov->iov_base += symlen;
825 uio->uio_iov->iov_len -= symlen;
826 return (0);
827}
828
829/*
830 * Ufs abort op, called after namei() when a CREATE/DELETE isn't actually
831 * done. If a buffer has been saved in anticipation of a CREATE, delete it.
832 */
833int
834cd9660_abortop(ap)
835 struct vop_abortop_args /* {
836 struct vnode *a_dvp;
837 struct componentname *a_cnp;
838 } */ *ap;
839{
840 if ((ap->a_cnp->cn_flags & (HASBUF | SAVESTART)) == HASBUF)
841 FREE_ZONE(ap->a_cnp->cn_pnbuf, ap->a_cnp->cn_pnlen, M_NAMEI);
842 return (0);
843}
844
845/*
846 * Lock an inode.
847 */
848
849int
850cd9660_lock(ap)
851 struct vop_lock_args /* {
852 struct vnode *a_vp;
853 int a_flags;
854 struct proc *a_p;
855 } */ *ap;
856{
857 struct vnode *vp = ap->a_vp;
858
859 if (VTOI(vp) == (struct iso_node *) NULL)
860 panic ("cd9660_lock: null inode");
861 return (lockmgr(&VTOI(vp)->i_lock, ap->a_flags, &vp->v_interlock,ap->a_p));
862}
863
864/*
865 * Unlock an inode.
866 */
867
868int
869cd9660_unlock(ap)
870 struct vop_unlock_args /* {
871 struct vnode *a_vp;
872 int a_flags;
873 struct proc *a_p;
874 } */ *ap;
875{
876 struct vnode *vp = ap->a_vp;
877
878 return (lockmgr(&VTOI(vp)->i_lock, ap->a_flags | LK_RELEASE, &vp->v_interlock,ap->a_p));
879
880}
881
882/*
883 * Calculate the logical to physical mapping if not done already,
884 * then call the device strategy routine.
885 */
886int
887cd9660_strategy(ap)
888 struct vop_strategy_args /* {
889 struct buf *a_bp;
890 } */ *ap;
891{
892 register struct buf *bp = ap->a_bp;
893 register struct vnode *vp = bp->b_vp;
894 register struct iso_node *ip;
895 int error;
896
897 ip = VTOI(vp);
898 if (vp->v_type == VBLK || vp->v_type == VCHR)
899 panic("cd9660_strategy: spec");
900 if (bp->b_blkno == bp->b_lblkno) {
901 if ( (error = VOP_BMAP(vp, bp->b_lblkno, NULL, &bp->b_blkno, NULL)) ) {
902 bp->b_error = error;
903 bp->b_flags |= B_ERROR;
904 biodone(bp);
905 return (error);
906 }
907 if ((long)bp->b_blkno == -1)
908 clrbuf(bp);
909 }
910 if ((long)bp->b_blkno == -1) {
911 biodone(bp);
912 return (0);
913 }
914 vp = ip->i_devvp;
915 bp->b_dev = vp->v_rdev;
916 VOCALL (vp->v_op, VOFFSET(vop_strategy), ap);
917 return (0);
918}
919
920/*
921 * Print out the contents of an inode.
922 */
923int
924cd9660_print(ap)
925 struct vop_print_args /* {
926 struct vnode *a_vp;
927 } */ *ap;
928{
929
930 printf("tag VT_ISOFS, isofs vnode\n");
931 return (0);
932}
933
934/*
935 * Check for a locked inode.
936 */
937int
938cd9660_islocked(ap)
939 struct vop_islocked_args /* {
940 struct vnode *a_vp;
941 } */ *ap;
942{
943
944 return (lockstatus(&VTOI(ap->a_vp)->i_lock));
945}
946
947/*
948 * Return POSIX pathconf information applicable to cd9660 filesystems.
949 */
950int
951cd9660_pathconf(ap)
952 struct vop_pathconf_args /* {
953 struct vnode *a_vp;
954 int a_name;
955 register_t *a_retval;
956 } */ *ap;
957{
958
959 switch (ap->a_name) {
960 case _PC_LINK_MAX:
961 *ap->a_retval = 1;
962 return (0);
963 case _PC_NAME_MAX:
964 switch (VTOI(ap->a_vp)->i_mnt->iso_ftype) {
965 case ISO_FTYPE_RRIP:
966 *ap->a_retval = ISO_RRIP_NAMEMAX;
967 break;
968 case ISO_FTYPE_JOLIET:
969 *ap->a_retval = ISO_JOLIET_NAMEMAX;
970 break;
971 default:
972 *ap->a_retval = ISO_NAMEMAX;
973 }
974 return (0);
975 case _PC_PATH_MAX:
976 *ap->a_retval = PATH_MAX;
977 return (0);
978 case _PC_PIPE_BUF:
979 *ap->a_retval = PIPE_BUF;
980 return (0);
981 case _PC_CHOWN_RESTRICTED:
982 *ap->a_retval = 1;
983 return (0);
984 case _PC_NO_TRUNC:
985 *ap->a_retval = 1;
986 return (0);
987 default:
988 return (EINVAL);
989 }
990 /* NOTREACHED */
991}
992
993/*
994 * Unsupported operation
995 */
996int
997cd9660_enotsupp()
998{
999
1000 return (EOPNOTSUPP);
1001}
1002/* Pagein. similar to read */
1003int
1004cd9660_pagein(ap)
1005 struct vop_pagein_args /* {
1006 struct vnode *a_vp,
1007 upl_t a_pl,
1008 vm_offset_t a_pl_offset,
1009 off_t a_f_offset,
1010 size_t a_size,
1011 struct ucred *a_cred,
1012 int a_flags
1013 } */ *ap;
1014{
1015 struct vnode *vp = ap->a_vp;
1016 upl_t pl = ap->a_pl;
1017 size_t size= ap->a_size;
1018 off_t f_offset = ap->a_f_offset;
1019 vm_offset_t pl_offset = ap->a_pl_offset;
1020 int flags = ap->a_flags;
1021 register struct iso_node *ip = VTOI(vp);
1022 int devBlockSize=0, error;
1023
1024 /* check pageouts are for reg file only and ubc info is present*/
1025 if (UBCINVALID(vp))
1026 panic("cd9660_pagein: Not a VREG");
1027 UBCINFOCHECK("cd9660_pagein", vp);
1028
1029 VOP_DEVBLOCKSIZE(ip->i_devvp, &devBlockSize);
1030
1031 error = cluster_pagein(vp, pl, pl_offset, f_offset, size,
1032 (off_t)ip->i_size, devBlockSize, flags);
1033 return (error);
1034}
1035
1036/*
1037 * cd9660_remove - not possible to remove a file from iso cds
1038 *
1039 * Locking policy: a_dvp and vp locked on entry, unlocked on exit
1040 */
1041int
1042cd9660_remove(ap)
1043 struct vop_remove_args /* { struct vnode *a_dvp; struct vnode *a_vp;
1044 struct componentname *a_cnp; } */ *ap;
1045{
1046 if (ap->a_dvp == ap->a_vp)
1047 vrele(ap->a_vp);
1048 else
1049 vput(ap->a_vp);
1050 vput(ap->a_dvp);
1051
1052 return (EROFS);
1053}
1054
1055
1056/*
1057 * cd9660_rmdir - not possible to remove a directory from iso cds
1058 *
1059 * Locking policy: a_dvp and vp locked on entry, unlocked on exit
1060 */
1061int
1062cd9660_rmdir(ap)
1063 struct vop_rmdir_args /* { struct vnode *a_dvp; struct vnode *a_vp;
1064 struct componentname *a_cnp; } */ *ap;
1065{
1066 (void) nop_rmdir(ap);
1067 return (EROFS);
1068}
1069
1070/*
1071
1072#
1073#% getattrlist vp = = =
1074#
1075 vop_getattrlist {
1076 IN struct vnode *vp;
1077 IN struct attrlist *alist;
1078 INOUT struct uio *uio;
1079 IN struct ucred *cred;
1080 IN struct proc *p;
1081 };
1082
1083 */
1084int
1085cd9660_getattrlist(ap)
1086 struct vop_getattrlist_args /* {
1087 struct vnode *a_vp;
1088 struct attrlist *a_alist
1089 struct uio *a_uio;
1090 struct ucred *a_cred;
1091 struct proc *a_p;
1092 } */ *ap;
1093{
1094 struct attrlist *alist = ap->a_alist;
1095 int fixedblocksize;
1096 int attrblocksize;
1097 int attrbufsize;
1098 void *attrbufptr;
1099 void *attrptr;
1100 void *varptr;
1101 int error = 0;
1102
1103 if ((alist->bitmapcount != ATTR_BIT_MAP_COUNT) ||
1104 ((alist->commonattr & ~ATTR_CMN_VALIDMASK) != 0) ||
1105 ((alist->volattr & ~ATTR_VOL_VALIDMASK) != 0) ||
1106 ((alist->dirattr & ~ATTR_DIR_VALIDMASK) != 0) ||
1107 ((alist->fileattr & ~ATTR_FILE_VALIDMASK) != 0) ||
1108 ((alist->forkattr & ~ATTR_FORK_VALIDMASK) != 0)) {
1109 return EINVAL;
1110 };
1111
1112 /*
1113 * Requesting volume information requires setting the ATTR_VOL_INFO bit and
1114 * volume info requests are mutually exclusive with all other info requests:
1115 */
1116 if ((alist->volattr != 0) &&
1117 (((alist->volattr & ATTR_VOL_INFO) == 0) ||
1118 (alist->dirattr != 0) ||
1119 (alist->fileattr != 0) ||
1120 (alist->forkattr != 0) )) {
1121 return EINVAL;
1122 };
1123
1124 /*
1125 * Reject requests for unsupported options for now:
1126 */
1127 if (alist->volattr & ATTR_VOL_MOUNTPOINT) return EINVAL;
1128 if (alist->commonattr & (ATTR_CMN_NAMEDATTRCOUNT | ATTR_CMN_NAMEDATTRLIST)) return EINVAL;
1129 if (alist->fileattr &
1130 (ATTR_FILE_FILETYPE |
1131 ATTR_FILE_FORKCOUNT |
1132 ATTR_FILE_FORKLIST |
1133 ATTR_FILE_DATAEXTENTS |
1134 ATTR_FILE_RSRCEXTENTS)) {
1135 return EINVAL;
1136 };
1137
1138
1139 fixedblocksize = attrcalcsize(alist);
1140 attrblocksize = fixedblocksize + (sizeof(u_long)); /* u_long for length longword */
1141 if (alist->commonattr & ATTR_CMN_NAME) attrblocksize += NAME_MAX;
1142 if (alist->commonattr & ATTR_CMN_NAMEDATTRLIST) attrblocksize += 0; /* XXX PPD */
1143 if (alist->volattr & ATTR_VOL_MOUNTPOINT) attrblocksize += PATH_MAX;
1144 if (alist->volattr & ATTR_VOL_NAME) attrblocksize += NAME_MAX;
1145 if (alist->fileattr & ATTR_FILE_FORKLIST) attrblocksize += 0; /* XXX PPD */
1146
1147 attrbufsize = MIN(ap->a_uio->uio_resid, attrblocksize);
1148 MALLOC(attrbufptr, void *, attrblocksize, M_TEMP, M_WAITOK);
1149 attrptr = attrbufptr;
1150 *((u_long *)attrptr) = 0; /* Set buffer length in case of errors */
1151 ++((u_long *)attrptr); /* Reserve space for length field */
1152 varptr = ((char *)attrptr) + fixedblocksize; /* Point to variable-length storage */
1153
1154 packattrblk(alist, ap->a_vp, &attrptr, &varptr);
1155
1156 /* Store length of fixed + var block */
1157 *((u_long *)attrbufptr) = ((char*)varptr - (char*)attrbufptr);
1158 /* Don't copy out more data than was generated */
1159 attrbufsize = MIN(attrbufsize, (char*)varptr - (char*)attrbufptr);
1160
1161 error = uiomove((caddr_t)attrbufptr, attrbufsize, ap->a_uio);
1162
1163 FREE(attrbufptr, M_TEMP);
1164
1165 return error;
1166}
1167
1168/*
1169 * Global vfs data structures for isofs
1170 */
1171#define cd9660_create \
1172 ((int (*) __P((struct vop_create_args *)))err_create)
1173#define cd9660_mknod ((int (*) __P((struct vop_mknod_args *)))err_mknod)
1174#define cd9660_setattr \
1175 ((int (*) __P((struct vop_setattr_args *)))cd9660_enotsupp)
1176#define cd9660_write ((int (*) __P((struct vop_write_args *)))cd9660_enotsupp)
1177#if NFSSERVER
1178int lease_check __P((struct vop_lease_args *));
1179#define cd9660_lease_check lease_check
1180#else
1181#define cd9660_lease_check ((int (*) __P((struct vop_lease_args *)))nullop)
1182#endif
1183#define cd9660_fsync ((int (*) __P((struct vop_fsync_args *)))nullop)
1184#define cd9660_rename \
1185 ((int (*) __P((struct vop_rename_args *)))err_rename)
1186#define cd9660_copyfile \
1187 ((int (*) __P((struct vop_copyfile_args *)))err_copyfile)
1188#define cd9660_link ((int (*) __P((struct vop_link_args *)))err_link)
1189#define cd9660_mkdir ((int (*) __P((struct vop_mkdir_args *)))err_mkdir)
1190#define cd9660_symlink \
1191 ((int (*) __P((struct vop_symlink_args *)))err_symlink)
1192#define cd9660_advlock \
1193 ((int (*) __P((struct vop_advlock_args *)))cd9660_enotsupp)
1194#define cd9660_valloc ((int(*) __P(( \
1195 struct vnode *pvp, \
1196 int mode, \
1197 struct ucred *cred, \
1198 struct vnode **vpp))) cd9660_enotsupp)
1199#define cd9660_vfree ((int (*) __P((struct vop_vfree_args *)))cd9660_enotsupp)
1200#define cd9660_truncate \
1201 ((int (*) __P((struct vop_truncate_args *)))cd9660_enotsupp)
1202#define cd9660_update \
1203 ((int (*) __P((struct vop_update_args *)))cd9660_enotsupp)
1204#define cd9660_bwrite \
1205 ((int (*) __P((struct vop_bwrite_args *)))cd9660_enotsupp)
1206#define cd9660_pageout \
1207 ((int (*) __P((struct vop_pageout_args *)))cd9660_enotsupp)
1208int cd9660_blktooff(struct vop_blktooff_args *ap);
1209int cd9660_offtoblk(struct vop_offtoblk_args *ap);
1210int cd9660_cmap(struct vop_cmap_args *ap);
1211
1212#define VOPFUNC int (*)(void *)
1213/*
1214 * Global vfs data structures for cd9660
1215 */
1216int (**cd9660_vnodeop_p)(void *);
1217struct vnodeopv_entry_desc cd9660_vnodeop_entries[] = {
1218 { &vop_default_desc, (VOPFUNC)vn_default_error },
1219 { &vop_lookup_desc, (VOPFUNC)cd9660_lookup }, /* lookup */
1220 { &vop_create_desc, (VOPFUNC)cd9660_create }, /* create */
1221 { &vop_mknod_desc, (VOPFUNC)cd9660_mknod }, /* mknod */
1222 { &vop_open_desc, (VOPFUNC)cd9660_open }, /* open */
1223 { &vop_close_desc, (VOPFUNC)cd9660_close }, /* close */
1224 { &vop_access_desc, (VOPFUNC)cd9660_access }, /* access */
1225 { &vop_getattr_desc, (VOPFUNC)cd9660_getattr }, /* getattr */
1226 { &vop_setattr_desc, (VOPFUNC)cd9660_setattr }, /* setattr */
1227 { &vop_read_desc, (VOPFUNC)cd9660_read }, /* read */
1228 { &vop_write_desc, (VOPFUNC)cd9660_write }, /* write */
1229 { &vop_lease_desc, (VOPFUNC)cd9660_lease_check },/* lease */
1230 { &vop_ioctl_desc, (VOPFUNC)cd9660_ioctl }, /* ioctl */
1231 { &vop_select_desc, (VOPFUNC)cd9660_select }, /* select */
1232 { &vop_mmap_desc, (VOPFUNC)cd9660_mmap }, /* mmap */
1233 { &vop_fsync_desc, (VOPFUNC)cd9660_fsync }, /* fsync */
1234 { &vop_seek_desc, (VOPFUNC)cd9660_seek }, /* seek */
1235 { &vop_remove_desc, (VOPFUNC)cd9660_remove }, /* remove */
1236 { &vop_link_desc, (VOPFUNC)cd9660_link }, /* link */
1237 { &vop_rename_desc, (VOPFUNC)cd9660_rename }, /* rename */
1238 { &vop_copyfile_desc, (VOPFUNC)cd9660_copyfile },/* copyfile */
1239 { &vop_mkdir_desc, (VOPFUNC)cd9660_mkdir }, /* mkdir */
1240 { &vop_rmdir_desc, (VOPFUNC)cd9660_rmdir }, /* rmdir */
1241 { &vop_symlink_desc, (VOPFUNC)cd9660_symlink }, /* symlink */
1242 { &vop_readdir_desc, (VOPFUNC)cd9660_readdir }, /* readdir */
1243 { &vop_readlink_desc, (VOPFUNC)cd9660_readlink },/* readlink */
1244 { &vop_abortop_desc, (VOPFUNC)cd9660_abortop }, /* abortop */
1245 { &vop_inactive_desc, (VOPFUNC)cd9660_inactive },/* inactive */
1246 { &vop_reclaim_desc, (VOPFUNC)cd9660_reclaim }, /* reclaim */
1247 { &vop_lock_desc, (VOPFUNC)cd9660_lock }, /* lock */
1248 { &vop_unlock_desc, (VOPFUNC)cd9660_unlock }, /* unlock */
1249 { &vop_bmap_desc, (VOPFUNC)cd9660_bmap }, /* bmap */
1250 { &vop_strategy_desc, (VOPFUNC)cd9660_strategy },/* strategy */
1251 { &vop_print_desc, (VOPFUNC)cd9660_print }, /* print */
1252 { &vop_islocked_desc, (VOPFUNC)cd9660_islocked },/* islocked */
1253 { &vop_pathconf_desc, (VOPFUNC)cd9660_pathconf },/* pathconf */
1254 { &vop_advlock_desc, (VOPFUNC)cd9660_advlock }, /* advlock */
1255 { &vop_blkatoff_desc, (VOPFUNC)cd9660_blkatoff },/* blkatoff */
1256 { &vop_valloc_desc, (VOPFUNC)cd9660_valloc }, /* valloc */
1257 { &vop_vfree_desc, (VOPFUNC)cd9660_vfree }, /* vfree */
1258 { &vop_truncate_desc, (VOPFUNC)cd9660_truncate },/* truncate */
1259 { &vop_update_desc, (VOPFUNC)cd9660_update }, /* update */
1260 { &vop_bwrite_desc, (VOPFUNC)vn_bwrite },
1261 { &vop_pagein_desc, (VOPFUNC)cd9660_pagein }, /* Pagein */
1262 { &vop_pageout_desc, (VOPFUNC)cd9660_pageout }, /* Pageout */
1263 { &vop_getattrlist_desc, (VOPFUNC)cd9660_getattrlist }, /* getattrlist */
1264 { &vop_blktooff_desc, (VOPFUNC)cd9660_blktooff }, /* blktooff */
1265 { &vop_offtoblk_desc, (VOPFUNC)cd9660_offtoblk }, /* offtoblk */
1266 { &vop_cmap_desc, (VOPFUNC)cd9660_cmap }, /* cmap */
1267 { (struct vnodeop_desc*)NULL, (VOPFUNC)NULL }
1268};
1269struct vnodeopv_desc cd9660_vnodeop_opv_desc =
1270 { &cd9660_vnodeop_p, cd9660_vnodeop_entries };
1271
1272/*
1273 * Special device vnode ops
1274 */
1275int (**cd9660_specop_p)(void *);
1276struct vnodeopv_entry_desc cd9660_specop_entries[] = {
1277 { &vop_default_desc, (VOPFUNC)vn_default_error },
1278 { &vop_lookup_desc, (VOPFUNC)spec_lookup }, /* lookup */
1279 { &vop_create_desc, (VOPFUNC)spec_create }, /* create */
1280 { &vop_mknod_desc, (VOPFUNC)spec_mknod }, /* mknod */
1281 { &vop_open_desc, (VOPFUNC)spec_open }, /* open */
1282 { &vop_close_desc, (VOPFUNC)spec_close }, /* close */
1283 { &vop_access_desc, (VOPFUNC)cd9660_access }, /* access */
1284 { &vop_getattr_desc, (VOPFUNC)cd9660_getattr }, /* getattr */
1285 { &vop_setattr_desc, (VOPFUNC)cd9660_setattr }, /* setattr */
1286 { &vop_read_desc, (VOPFUNC)spec_read }, /* read */
1287 { &vop_write_desc, (VOPFUNC)spec_write }, /* write */
1288 { &vop_lease_desc, (VOPFUNC)spec_lease_check }, /* lease */
1289 { &vop_ioctl_desc, (VOPFUNC)spec_ioctl }, /* ioctl */
1290 { &vop_select_desc, (VOPFUNC)spec_select }, /* select */
1291 { &vop_mmap_desc, (VOPFUNC)spec_mmap }, /* mmap */
1292 { &vop_fsync_desc, (VOPFUNC)spec_fsync }, /* fsync */
1293 { &vop_seek_desc, (VOPFUNC)spec_seek }, /* seek */
1294 { &vop_remove_desc, (VOPFUNC)spec_remove }, /* remove */
1295 { &vop_link_desc, (VOPFUNC)spec_link }, /* link */
1296 { &vop_rename_desc, (VOPFUNC)spec_rename }, /* rename */
1297 { &vop_mkdir_desc, (VOPFUNC)spec_mkdir }, /* mkdir */
1298 { &vop_rmdir_desc, (VOPFUNC)spec_rmdir }, /* rmdir */
1299 { &vop_symlink_desc, (VOPFUNC)spec_symlink }, /* symlink */
1300 { &vop_readdir_desc, (VOPFUNC)spec_readdir }, /* readdir */
1301 { &vop_readlink_desc, (VOPFUNC)spec_readlink }, /* readlink */
1302 { &vop_abortop_desc, (VOPFUNC)spec_abortop }, /* abortop */
1303 { &vop_inactive_desc, (VOPFUNC)cd9660_inactive },/* inactive */
1304 { &vop_reclaim_desc, (VOPFUNC)cd9660_reclaim }, /* reclaim */
1305 { &vop_lock_desc, (VOPFUNC)cd9660_lock }, /* lock */
1306 { &vop_unlock_desc, (VOPFUNC)cd9660_unlock }, /* unlock */
1307 { &vop_bmap_desc, (VOPFUNC)spec_bmap }, /* bmap */
1308 { &vop_strategy_desc, (VOPFUNC)spec_strategy }, /* strategy */
1309 { &vop_print_desc, (VOPFUNC)cd9660_print }, /* print */
1310 { &vop_islocked_desc, (VOPFUNC)cd9660_islocked },/* islocked */
1311 { &vop_pathconf_desc, (VOPFUNC)spec_pathconf }, /* pathconf */
1312 { &vop_advlock_desc, (VOPFUNC)spec_advlock }, /* advlock */
1313 { &vop_blkatoff_desc, (VOPFUNC)spec_blkatoff }, /* blkatoff */
1314 { &vop_valloc_desc, (VOPFUNC)spec_valloc }, /* valloc */
1315 { &vop_vfree_desc, (VOPFUNC)spec_vfree }, /* vfree */
1316 { &vop_truncate_desc, (VOPFUNC)spec_truncate }, /* truncate */
1317 { &vop_update_desc, (VOPFUNC)cd9660_update }, /* update */
1318 { &vop_bwrite_desc, (VOPFUNC)vn_bwrite },
1319 { &vop_devblocksize_desc, (VOPFUNC)spec_devblocksize }, /* devblocksize */
1320 { &vop_pagein_desc, (VOPFUNC)cd9660_pagein }, /* Pagein */
1321 { &vop_pageout_desc, (VOPFUNC)cd9660_pageout }, /* Pageout */
1322 { &vop_blktooff_desc, (VOPFUNC)cd9660_blktooff }, /* blktooff */
1323 { &vop_offtoblk_desc, (VOPFUNC)cd9660_offtoblk }, /* offtoblk */
1324 { &vop_cmap_desc, (VOPFUNC)cd9660_cmap }, /* cmap */
1325 { (struct vnodeop_desc*)NULL, (VOPFUNC)NULL }
1326};
1327struct vnodeopv_desc cd9660_specop_opv_desc =
1328 { &cd9660_specop_p, cd9660_specop_entries };
1329
1330#if FIFO
1331int (**cd9660_fifoop_p)(void *);
1332struct vnodeopv_entry_desc cd9660_fifoop_entries[] = {
1333 { &vop_default_desc, (VOPFUNC)vn_default_error },
1334 { &vop_lookup_desc, (VOPFUNC)fifo_lookup }, /* lookup */
1335 { &vop_create_desc, (VOPFUNC)fifo_create }, /* create */
1336 { &vop_mknod_desc, (VOPFUNC)fifo_mknod }, /* mknod */
1337 { &vop_open_desc, (VOPFUNC)fifo_open }, /* open */
1338 { &vop_close_desc, (VOPFUNC)fifo_close }, /* close */
1339 { &vop_access_desc, (VOPFUNC)cd9660_access }, /* access */
1340 { &vop_getattr_desc, (VOPFUNC)cd9660_getattr }, /* getattr */
1341 { &vop_setattr_desc, (VOPFUNC)cd9660_setattr }, /* setattr */
1342 { &vop_read_desc, (VOPFUNC)fifo_read }, /* read */
1343 { &vop_write_desc, (VOPFUNC)fifo_write }, /* write */
1344 { &vop_lease_desc, (VOPFUNC)fifo_lease_check }, /* lease */
1345 { &vop_ioctl_desc, (VOPFUNC)fifo_ioctl }, /* ioctl */
1346 { &vop_select_desc, (VOPFUNC)fifo_select }, /* select */
1347 { &vop_mmap_desc, (VOPFUNC)fifo_mmap }, /* mmap */
1348 { &vop_fsync_desc, (VOPFUNC)fifo_fsync }, /* fsync */
1349 { &vop_seek_desc, (VOPFUNC)fifo_seek }, /* seek */
1350 { &vop_remove_desc, (VOPFUNC)fifo_remove }, /* remove */
1351 { &vop_link_desc, (VOPFUNC)fifo_link } , /* link */
1352 { &vop_rename_desc, (VOPFUNC)fifo_rename }, /* rename */
1353 { &vop_mkdir_desc, (VOPFUNC)fifo_mkdir }, /* mkdir */
1354 { &vop_rmdir_desc, (VOPFUNC)fifo_rmdir }, /* rmdir */
1355 { &vop_symlink_desc, (VOPFUNC)fifo_symlink }, /* symlink */
1356 { &vop_readdir_desc, (VOPFUNC)fifo_readdir }, /* readdir */
1357 { &vop_readlink_desc, (VOPFUNC)fifo_readlink }, /* readlink */
1358 { &vop_abortop_desc, (VOPFUNC)fifo_abortop }, /* abortop */
1359 { &vop_inactive_desc, (VOPFUNC)cd9660_inactive },/* inactive */
1360 { &vop_reclaim_desc, (VOPFUNC)cd9660_reclaim }, /* reclaim */
1361 { &vop_lock_desc, (VOPFUNC)cd9660_lock }, /* lock */
1362 { &vop_unlock_desc, (VOPFUNC)cd9660_unlock }, /* unlock */
1363 { &vop_bmap_desc, (VOPFUNC)fifo_bmap }, /* bmap */
1364 { &vop_strategy_desc, (VOPFUNC)fifo_strategy }, /* strategy */
1365 { &vop_print_desc, (VOPFUNC)cd9660_print }, /* print */
1366 { &vop_islocked_desc, (VOPFUNC)cd9660_islocked },/* islocked */
1367 { &vop_pathconf_desc, (VOPFUNC)fifo_pathconf }, /* pathconf */
1368 { &vop_advlock_desc, (VOPFUNC)fifo_advlock }, /* advlock */
1369 { &vop_blkatoff_desc, (VOPFUNC)fifo_blkatoff }, /* blkatoff */
1370 { &vop_valloc_desc, (VOPFUNC)fifo_valloc }, /* valloc */
1371 { &vop_vfree_desc, (VOPFUNC)fifo_vfree }, /* vfree */
1372 { &vop_truncate_desc, (VOPFUNC)fifo_truncate }, /* truncate */
1373 { &vop_update_desc, (VOPFUNC)cd9660_update }, /* update */
1374 { &vop_bwrite_desc, (VOPFUNC)vn_bwrite },
1375 { &vop_pagein_desc, (VOPFUNC)cd9660_pagein }, /* Pagein */
1376 { &vop_pageout_desc, (VOPFUNC)cd9660_pageout }, /* Pageout */
1377 { &vop_blktooff_desc, (VOPFUNC)cd9660_blktooff }, /* blktooff */
1378 { &vop_offtoblk_desc, (VOPFUNC)cd9660_offtoblk }, /* offtoblk */
1379 { (struct vnodeop_desc*)NULL, (VOPFUNC)NULL }
1380};
1381struct vnodeopv_desc cd9660_fifoop_opv_desc =
1382 { &cd9660_fifoop_p, cd9660_fifoop_entries };
1383#endif /* FIFO */