null_vnops.c (105211) | null_vnops.c (108470) |
---|---|
1/* 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This code is derived from software contributed to Berkeley by 6 * John Heidemann of the UCLA Ficus project. 7 * 8 * Redistribution and use in source and binary forms, with or without --- 26 unchanged lines hidden (view full) --- 35 * 36 * @(#)null_vnops.c 8.6 (Berkeley) 5/27/95 37 * 38 * Ancestors: 39 * @(#)lofs_vnops.c 1.2 (Berkeley) 6/18/92 40 * ...and... 41 * @(#)null_vnodeops.c 1.20 92/07/07 UCLA Ficus project 42 * | 1/* 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This code is derived from software contributed to Berkeley by 6 * John Heidemann of the UCLA Ficus project. 7 * 8 * Redistribution and use in source and binary forms, with or without --- 26 unchanged lines hidden (view full) --- 35 * 36 * @(#)null_vnops.c 8.6 (Berkeley) 5/27/95 37 * 38 * Ancestors: 39 * @(#)lofs_vnops.c 1.2 (Berkeley) 6/18/92 40 * ...and... 41 * @(#)null_vnodeops.c 1.20 92/07/07 UCLA Ficus project 42 * |
43 * $FreeBSD: head/sys/fs/nullfs/null_vnops.c 105211 2002-10-16 08:00:32Z phk $ | 43 * $FreeBSD: head/sys/fs/nullfs/null_vnops.c 108470 2002-12-30 21:18:15Z schweikh $ |
44 */ 45 46/* 47 * Null Layer 48 * 49 * (See mount_nullfs(8) for more information.) 50 * 51 * The null layer duplicates a portion of the filesystem --- 100 unchanged lines hidden (view full) --- 152 * 153 * INVOKING OPERATIONS ON LOWER LAYERS 154 * 155 * There are two techniques to invoke operations on a lower layer 156 * when the operation cannot be completely bypassed. Each method 157 * is appropriate in different situations. In both cases, 158 * it is the responsibility of the aliasing layer to make 159 * the operation arguments "correct" for the lower layer | 44 */ 45 46/* 47 * Null Layer 48 * 49 * (See mount_nullfs(8) for more information.) 50 * 51 * The null layer duplicates a portion of the filesystem --- 100 unchanged lines hidden (view full) --- 152 * 153 * INVOKING OPERATIONS ON LOWER LAYERS 154 * 155 * There are two techniques to invoke operations on a lower layer 156 * when the operation cannot be completely bypassed. Each method 157 * is appropriate in different situations. In both cases, 158 * it is the responsibility of the aliasing layer to make 159 * the operation arguments "correct" for the lower layer |
160 * by mapping an vnode arguments to the lower layer. | 160 * by mapping a vnode arguments to the lower layer. |
161 * 162 * The first approach is to call the aliasing layer's bypass routine. 163 * This method is most suitable when you wish to invoke the operation 164 * currently being handled on the lower layer. It has the advantage 165 * that the bypass routine already must do argument mapping. 166 * An example of this is null_getattrs in the null layer. 167 * 168 * A second approach is to directly invoke vnode operations on --- 694 unchanged lines hidden --- | 161 * 162 * The first approach is to call the aliasing layer's bypass routine. 163 * This method is most suitable when you wish to invoke the operation 164 * currently being handled on the lower layer. It has the advantage 165 * that the bypass routine already must do argument mapping. 166 * An example of this is null_getattrs in the null layer. 167 * 168 * A second approach is to directly invoke vnode operations on --- 694 unchanged lines hidden --- |