Home | History | Annotate | Line # | Download | only in genfs
genfs_vnops.c revision 1.191
      1  1.191   hannken /*	$NetBSD: genfs_vnops.c,v 1.191 2014/03/12 09:38:51 hannken Exp $	*/
      2  1.164        ad 
      3  1.164        ad /*-
      4  1.164        ad  * Copyright (c) 2008 The NetBSD Foundation, Inc.
      5  1.164        ad  * All rights reserved.
      6  1.164        ad  *
      7  1.164        ad  * Redistribution and use in source and binary forms, with or without
      8  1.164        ad  * modification, are permitted provided that the following conditions
      9  1.164        ad  * are met:
     10  1.164        ad  * 1. Redistributions of source code must retain the above copyright
     11  1.164        ad  *    notice, this list of conditions and the following disclaimer.
     12  1.164        ad  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.164        ad  *    notice, this list of conditions and the following disclaimer in the
     14  1.164        ad  *    documentation and/or other materials provided with the distribution.
     15  1.164        ad  *
     16  1.164        ad  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  1.164        ad  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  1.164        ad  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  1.164        ad  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  1.164        ad  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  1.164        ad  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  1.164        ad  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  1.164        ad  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  1.164        ad  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  1.164        ad  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  1.164        ad  * POSSIBILITY OF SUCH DAMAGE.
     27  1.164        ad  */
     28    1.6      fvdl 
     29    1.6      fvdl /*
     30    1.6      fvdl  * Copyright (c) 1982, 1986, 1989, 1993
     31    1.6      fvdl  *	The Regents of the University of California.  All rights reserved.
     32    1.6      fvdl  *
     33    1.6      fvdl  * Redistribution and use in source and binary forms, with or without
     34    1.6      fvdl  * modification, are permitted provided that the following conditions
     35    1.6      fvdl  * are met:
     36    1.6      fvdl  * 1. Redistributions of source code must retain the above copyright
     37    1.6      fvdl  *    notice, this list of conditions and the following disclaimer.
     38    1.6      fvdl  * 2. Redistributions in binary form must reproduce the above copyright
     39    1.6      fvdl  *    notice, this list of conditions and the following disclaimer in the
     40    1.6      fvdl  *    documentation and/or other materials provided with the distribution.
     41   1.81       agc  * 3. Neither the name of the University nor the names of its contributors
     42    1.6      fvdl  *    may be used to endorse or promote products derived from this software
     43    1.6      fvdl  *    without specific prior written permission.
     44    1.6      fvdl  *
     45    1.6      fvdl  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     46    1.6      fvdl  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     47    1.6      fvdl  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     48    1.6      fvdl  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     49    1.6      fvdl  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     50    1.6      fvdl  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     51    1.6      fvdl  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     52    1.6      fvdl  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     53    1.6      fvdl  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     54    1.6      fvdl  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     55    1.6      fvdl  * SUCH DAMAGE.
     56    1.6      fvdl  *
     57    1.6      fvdl  */
     58   1.40     lukem 
     59   1.40     lukem #include <sys/cdefs.h>
     60  1.191   hannken __KERNEL_RCSID(0, "$NetBSD: genfs_vnops.c,v 1.191 2014/03/12 09:38:51 hannken Exp $");
     61    1.8   thorpej 
     62    1.1   mycroft #include <sys/param.h>
     63    1.1   mycroft #include <sys/systm.h>
     64    1.6      fvdl #include <sys/proc.h>
     65    1.1   mycroft #include <sys/kernel.h>
     66    1.1   mycroft #include <sys/mount.h>
     67  1.186   hannken #include <sys/fstrans.h>
     68    1.1   mycroft #include <sys/namei.h>
     69    1.1   mycroft #include <sys/vnode.h>
     70   1.13  wrstuden #include <sys/fcntl.h>
     71  1.135      yamt #include <sys/kmem.h>
     72    1.3   mycroft #include <sys/poll.h>
     73   1.37       chs #include <sys/mman.h>
     74   1.66  jdolecek #include <sys/file.h>
     75  1.125      elad #include <sys/kauth.h>
     76  1.169      elad #include <sys/stat.h>
     77    1.1   mycroft 
     78    1.1   mycroft #include <miscfs/genfs/genfs.h>
     79   1.37       chs #include <miscfs/genfs/genfs_node.h>
     80    1.6      fvdl #include <miscfs/specfs/specdev.h>
     81    1.1   mycroft 
     82   1.21       chs #include <uvm/uvm.h>
     83   1.21       chs #include <uvm/uvm_pager.h>
     84   1.21       chs 
     85   1.70  christos static void filt_genfsdetach(struct knote *);
     86   1.70  christos static int filt_genfsread(struct knote *, long);
     87   1.70  christos static int filt_genfsvnode(struct knote *, long);
     88   1.70  christos 
     89    1.1   mycroft int
     90   1.53     enami genfs_poll(void *v)
     91    1.1   mycroft {
     92    1.3   mycroft 	struct vop_poll_args /* {
     93    1.1   mycroft 		struct vnode *a_vp;
     94    1.3   mycroft 		int a_events;
     95  1.116  christos 		struct lwp *a_l;
     96    1.1   mycroft 	} */ *ap = v;
     97    1.1   mycroft 
     98    1.3   mycroft 	return (ap->a_events & (POLLIN | POLLOUT | POLLRDNORM | POLLWRNORM));
     99    1.1   mycroft }
    100    1.1   mycroft 
    101    1.1   mycroft int
    102   1.53     enami genfs_seek(void *v)
    103    1.4    kleink {
    104    1.4    kleink 	struct vop_seek_args /* {
    105    1.4    kleink 		struct vnode *a_vp;
    106    1.4    kleink 		off_t a_oldoff;
    107    1.4    kleink 		off_t a_newoff;
    108  1.125      elad 		kauth_cred_t cred;
    109    1.4    kleink 	} */ *ap = v;
    110    1.4    kleink 
    111    1.4    kleink 	if (ap->a_newoff < 0)
    112    1.4    kleink 		return (EINVAL);
    113    1.4    kleink 
    114    1.4    kleink 	return (0);
    115    1.4    kleink }
    116    1.4    kleink 
    117    1.4    kleink int
    118   1.53     enami genfs_abortop(void *v)
    119    1.1   mycroft {
    120    1.1   mycroft 	struct vop_abortop_args /* {
    121    1.1   mycroft 		struct vnode *a_dvp;
    122    1.1   mycroft 		struct componentname *a_cnp;
    123    1.1   mycroft 	} */ *ap = v;
    124   1.53     enami 
    125  1.184  dholland 	(void)ap;
    126  1.184  dholland 
    127    1.1   mycroft 	return (0);
    128   1.13  wrstuden }
    129   1.13  wrstuden 
    130   1.13  wrstuden int
    131   1.53     enami genfs_fcntl(void *v)
    132   1.13  wrstuden {
    133   1.13  wrstuden 	struct vop_fcntl_args /* {
    134   1.13  wrstuden 		struct vnode *a_vp;
    135   1.13  wrstuden 		u_int a_command;
    136  1.150  christos 		void *a_data;
    137   1.13  wrstuden 		int a_fflag;
    138  1.125      elad 		kauth_cred_t a_cred;
    139  1.116  christos 		struct lwp *a_l;
    140   1.13  wrstuden 	} */ *ap = v;
    141   1.13  wrstuden 
    142   1.13  wrstuden 	if (ap->a_command == F_SETFL)
    143   1.13  wrstuden 		return (0);
    144   1.13  wrstuden 	else
    145   1.13  wrstuden 		return (EOPNOTSUPP);
    146    1.1   mycroft }
    147    1.1   mycroft 
    148    1.1   mycroft /*ARGSUSED*/
    149    1.1   mycroft int
    150  1.138  christos genfs_badop(void *v)
    151    1.1   mycroft {
    152    1.1   mycroft 
    153    1.1   mycroft 	panic("genfs: bad op");
    154    1.1   mycroft }
    155    1.1   mycroft 
    156    1.1   mycroft /*ARGSUSED*/
    157    1.1   mycroft int
    158  1.138  christos genfs_nullop(void *v)
    159    1.1   mycroft {
    160    1.1   mycroft 
    161    1.1   mycroft 	return (0);
    162   1.10    kleink }
    163   1.10    kleink 
    164   1.10    kleink /*ARGSUSED*/
    165   1.10    kleink int
    166  1.138  christos genfs_einval(void *v)
    167   1.10    kleink {
    168   1.10    kleink 
    169   1.10    kleink 	return (EINVAL);
    170    1.1   mycroft }
    171    1.1   mycroft 
    172   1.12  wrstuden /*
    173   1.74  jdolecek  * Called when an fs doesn't support a particular vop.
    174  1.177     pooka  * This takes care to vrele, vput, or vunlock passed in vnodes
    175  1.177     pooka  * and calls VOP_ABORTOP for a componentname (in non-rename VOP).
    176   1.12  wrstuden  */
    177   1.12  wrstuden int
    178   1.75  jdolecek genfs_eopnotsupp(void *v)
    179   1.12  wrstuden {
    180   1.12  wrstuden 	struct vop_generic_args /*
    181   1.12  wrstuden 		struct vnodeop_desc *a_desc;
    182   1.53     enami 		/ * other random data follows, presumably * /
    183   1.12  wrstuden 	} */ *ap = v;
    184   1.12  wrstuden 	struct vnodeop_desc *desc = ap->a_desc;
    185   1.74  jdolecek 	struct vnode *vp, *vp_last = NULL;
    186  1.177     pooka 	int flags, i, j, offset_cnp, offset_vp;
    187  1.177     pooka 
    188  1.177     pooka 	KASSERT(desc->vdesc_offset != VOP_LOOKUP_DESCOFFSET);
    189  1.177     pooka 	KASSERT(desc->vdesc_offset != VOP_ABORTOP_DESCOFFSET);
    190  1.177     pooka 
    191  1.177     pooka 	/*
    192  1.185  dholland 	 * Abort any componentname that lookup potentially left state in.
    193  1.177     pooka 	 *
    194  1.177     pooka 	 * As is logical, componentnames for VOP_RENAME are handled by
    195  1.177     pooka 	 * the caller of VOP_RENAME.  Yay, rename!
    196  1.177     pooka 	 */
    197  1.177     pooka 	if (desc->vdesc_offset != VOP_RENAME_DESCOFFSET &&
    198  1.177     pooka 	    (offset_vp = desc->vdesc_vp_offsets[0]) != VDESC_NO_OFFSET &&
    199  1.177     pooka 	    (offset_cnp = desc->vdesc_componentname_offset) != VDESC_NO_OFFSET){
    200  1.177     pooka 		struct componentname *cnp;
    201  1.177     pooka 		struct vnode *dvp;
    202  1.177     pooka 
    203  1.177     pooka 		dvp = *VOPARG_OFFSETTO(struct vnode **, offset_vp, ap);
    204  1.177     pooka 		cnp = *VOPARG_OFFSETTO(struct componentname **, offset_cnp, ap);
    205  1.177     pooka 
    206  1.177     pooka 		VOP_ABORTOP(dvp, cnp);
    207  1.177     pooka 	}
    208   1.12  wrstuden 
    209   1.12  wrstuden 	flags = desc->vdesc_flags;
    210   1.12  wrstuden 	for (i = 0; i < VDESC_MAX_VPS; flags >>=1, i++) {
    211  1.177     pooka 		if ((offset_vp = desc->vdesc_vp_offsets[i]) == VDESC_NO_OFFSET)
    212   1.12  wrstuden 			break;	/* stop at end of list */
    213   1.12  wrstuden 		if ((j = flags & VDESC_VP0_WILLPUT)) {
    214  1.177     pooka 			vp = *VOPARG_OFFSETTO(struct vnode **, offset_vp, ap);
    215   1.74  jdolecek 
    216   1.74  jdolecek 			/* Skip if NULL */
    217   1.74  jdolecek 			if (!vp)
    218   1.74  jdolecek 				continue;
    219   1.74  jdolecek 
    220   1.12  wrstuden 			switch (j) {
    221   1.12  wrstuden 			case VDESC_VP0_WILLPUT:
    222   1.74  jdolecek 				/* Check for dvp == vp cases */
    223   1.74  jdolecek 				if (vp == vp_last)
    224   1.74  jdolecek 					vrele(vp);
    225   1.74  jdolecek 				else {
    226   1.74  jdolecek 					vput(vp);
    227   1.74  jdolecek 					vp_last = vp;
    228   1.74  jdolecek 				}
    229   1.12  wrstuden 				break;
    230   1.12  wrstuden 			case VDESC_VP0_WILLUNLOCK:
    231  1.181   hannken 				VOP_UNLOCK(vp);
    232   1.12  wrstuden 				break;
    233   1.12  wrstuden 			case VDESC_VP0_WILLRELE:
    234   1.12  wrstuden 				vrele(vp);
    235   1.12  wrstuden 				break;
    236   1.12  wrstuden 			}
    237   1.12  wrstuden 		}
    238   1.12  wrstuden 	}
    239   1.12  wrstuden 
    240   1.12  wrstuden 	return (EOPNOTSUPP);
    241   1.12  wrstuden }
    242   1.12  wrstuden 
    243    1.1   mycroft /*ARGSUSED*/
    244    1.1   mycroft int
    245  1.138  christos genfs_ebadf(void *v)
    246    1.1   mycroft {
    247    1.1   mycroft 
    248    1.1   mycroft 	return (EBADF);
    249    1.9  matthias }
    250    1.9  matthias 
    251    1.9  matthias /* ARGSUSED */
    252    1.9  matthias int
    253  1.138  christos genfs_enoioctl(void *v)
    254    1.9  matthias {
    255    1.9  matthias 
    256   1.51    atatat 	return (EPASSTHROUGH);
    257    1.6      fvdl }
    258    1.6      fvdl 
    259    1.6      fvdl 
    260    1.6      fvdl /*
    261   1.15      fvdl  * Eliminate all activity associated with the requested vnode
    262    1.6      fvdl  * and with all vnodes aliased to the requested vnode.
    263    1.6      fvdl  */
    264    1.6      fvdl int
    265   1.53     enami genfs_revoke(void *v)
    266    1.6      fvdl {
    267    1.6      fvdl 	struct vop_revoke_args /* {
    268    1.6      fvdl 		struct vnode *a_vp;
    269    1.6      fvdl 		int a_flags;
    270    1.6      fvdl 	} */ *ap = v;
    271    1.6      fvdl 
    272    1.6      fvdl #ifdef DIAGNOSTIC
    273    1.6      fvdl 	if ((ap->a_flags & REVOKEALL) == 0)
    274    1.6      fvdl 		panic("genfs_revoke: not revokeall");
    275    1.6      fvdl #endif
    276  1.161        ad 	vrevoke(ap->a_vp);
    277    1.6      fvdl 	return (0);
    278    1.6      fvdl }
    279    1.6      fvdl 
    280    1.6      fvdl /*
    281  1.190   hannken  * Lock the node (for deadfs).
    282  1.190   hannken  */
    283  1.190   hannken int
    284  1.190   hannken genfs_deadlock(void *v)
    285  1.190   hannken {
    286  1.190   hannken 	struct vop_lock_args /* {
    287  1.190   hannken 		struct vnode *a_vp;
    288  1.190   hannken 		int a_flags;
    289  1.190   hannken 	} */ *ap = v;
    290  1.190   hannken 	struct vnode *vp = ap->a_vp;
    291  1.190   hannken 	int flags = ap->a_flags;
    292  1.190   hannken 	krw_t op;
    293  1.191   hannken 	int error;
    294  1.190   hannken 
    295  1.191   hannken 	op = (ISSET(flags, LK_EXCLUSIVE) ? RW_WRITER : RW_READER);
    296  1.191   hannken 	if (ISSET(flags, LK_NOWAIT)) {
    297  1.191   hannken 		if (! rw_tryenter(&vp->v_lock, op))
    298  1.190   hannken 			return EBUSY;
    299  1.191   hannken 		if (mutex_tryenter(vp->v_interlock)) {
    300  1.191   hannken 			if (ISSET(vp->v_iflag, VI_XLOCK))
    301  1.191   hannken 				error = EBUSY;
    302  1.191   hannken 			else {
    303  1.191   hannken 				KASSERT(ISSET(vp->v_iflag, VI_CLEAN));
    304  1.191   hannken 				error = (ISSET(flags, LK_RETRY) ? 0 : ENOENT);
    305  1.191   hannken 			}
    306  1.190   hannken 			mutex_exit(vp->v_interlock);
    307  1.191   hannken 		} else
    308  1.191   hannken 			error = EBUSY;
    309  1.191   hannken 		if (error)
    310  1.191   hannken 			rw_exit(&vp->v_lock);
    311  1.191   hannken 		return error;
    312  1.190   hannken 	}
    313  1.190   hannken 
    314  1.191   hannken 	rw_enter(&vp->v_lock, op);
    315  1.190   hannken 	mutex_enter(vp->v_interlock);
    316  1.191   hannken 	if (ISSET(vp->v_iflag, VI_XLOCK)) {
    317  1.191   hannken 		rw_exit(&vp->v_lock);
    318  1.190   hannken 		vwait(vp, VI_XLOCK);
    319  1.191   hannken 		mutex_exit(vp->v_interlock);
    320  1.191   hannken 		rw_enter(&vp->v_lock, op);
    321  1.191   hannken 		mutex_enter(vp->v_interlock);
    322  1.191   hannken 	}
    323  1.191   hannken 	KASSERT(ISSET(vp->v_iflag, VI_CLEAN));
    324  1.190   hannken 	mutex_exit(vp->v_interlock);
    325  1.191   hannken 	if (! ISSET(flags, LK_RETRY)) {
    326  1.191   hannken 		rw_exit(&vp->v_lock);
    327  1.190   hannken 		return ENOENT;
    328  1.190   hannken 	}
    329  1.190   hannken 	return 0;
    330  1.190   hannken }
    331  1.190   hannken 
    332  1.190   hannken /*
    333  1.190   hannken  * Unlock the node (for deadfs).
    334  1.190   hannken  */
    335  1.190   hannken int
    336  1.190   hannken genfs_deadunlock(void *v)
    337  1.190   hannken {
    338  1.190   hannken 	struct vop_unlock_args /* {
    339  1.190   hannken 		struct vnode *a_vp;
    340  1.190   hannken 	} */ *ap = v;
    341  1.190   hannken 	struct vnode *vp = ap->a_vp;
    342  1.190   hannken 
    343  1.190   hannken 	rw_exit(&vp->v_lock);
    344  1.190   hannken 
    345  1.190   hannken 	return 0;
    346  1.190   hannken }
    347  1.190   hannken 
    348  1.190   hannken /*
    349   1.12  wrstuden  * Lock the node.
    350    1.6      fvdl  */
    351    1.6      fvdl int
    352   1.53     enami genfs_lock(void *v)
    353    1.6      fvdl {
    354    1.6      fvdl 	struct vop_lock_args /* {
    355    1.6      fvdl 		struct vnode *a_vp;
    356    1.6      fvdl 		int a_flags;
    357    1.6      fvdl 	} */ *ap = v;
    358    1.6      fvdl 	struct vnode *vp = ap->a_vp;
    359  1.190   hannken 	struct mount *mp = vp->v_mount;
    360  1.163        ad 	int flags = ap->a_flags;
    361  1.182   hannken 	krw_t op;
    362  1.191   hannken 	int error;
    363    1.6      fvdl 
    364  1.191   hannken 	op = (ISSET(flags, LK_EXCLUSIVE) ? RW_WRITER : RW_READER);
    365  1.191   hannken 	if (ISSET(flags, LK_NOWAIT)) {
    366  1.190   hannken 		if (fstrans_start_nowait(mp, FSTRANS_SHARED))
    367  1.186   hannken 			return EBUSY;
    368  1.186   hannken 		if (! rw_tryenter(&vp->v_lock, op)) {
    369  1.190   hannken 			fstrans_done(mp);
    370  1.186   hannken 			return EBUSY;
    371  1.186   hannken 		}
    372  1.191   hannken 		if (mutex_tryenter(vp->v_interlock)) {
    373  1.191   hannken 			if (ISSET(vp->v_iflag, VI_XLOCK))
    374  1.191   hannken 				error = EBUSY;
    375  1.191   hannken 			else if (ISSET(vp->v_iflag, VI_CLEAN))
    376  1.191   hannken 				error = ENOENT;
    377  1.191   hannken 			else
    378  1.191   hannken 				error = 0;
    379  1.191   hannken 			mutex_exit(vp->v_interlock);
    380  1.191   hannken 		} else
    381  1.191   hannken 			error = EBUSY;
    382  1.191   hannken 		if (error) {
    383  1.191   hannken 			rw_exit(&vp->v_lock);
    384  1.191   hannken 			fstrans_done(mp);
    385  1.191   hannken 		}
    386  1.191   hannken 		return error;
    387  1.186   hannken 	}
    388  1.182   hannken 
    389  1.190   hannken 	fstrans_start(mp, FSTRANS_SHARED);
    390  1.182   hannken 	rw_enter(&vp->v_lock, op);
    391  1.190   hannken 	mutex_enter(vp->v_interlock);
    392  1.191   hannken 	if (ISSET(vp->v_iflag, VI_XLOCK) || ISSET(vp->v_iflag, VI_CLEAN)) {
    393  1.190   hannken 		rw_exit(&vp->v_lock);
    394  1.190   hannken 		fstrans_done(mp);
    395  1.191   hannken 		vwait(vp, VI_XLOCK);
    396  1.191   hannken 		KASSERT(ISSET(vp->v_iflag, VI_CLEAN));
    397  1.190   hannken 		mutex_exit(vp->v_interlock);
    398  1.190   hannken 		return ENOENT;
    399  1.190   hannken 	}
    400  1.190   hannken 	mutex_exit(vp->v_interlock);
    401  1.182   hannken 	return 0;
    402    1.6      fvdl }
    403    1.6      fvdl 
    404    1.6      fvdl /*
    405   1.12  wrstuden  * Unlock the node.
    406    1.6      fvdl  */
    407    1.6      fvdl int
    408   1.53     enami genfs_unlock(void *v)
    409    1.6      fvdl {
    410    1.6      fvdl 	struct vop_unlock_args /* {
    411    1.6      fvdl 		struct vnode *a_vp;
    412    1.6      fvdl 	} */ *ap = v;
    413    1.6      fvdl 	struct vnode *vp = ap->a_vp;
    414  1.191   hannken 	struct mount *mp = vp->v_mount;
    415    1.6      fvdl 
    416  1.182   hannken 	rw_exit(&vp->v_lock);
    417  1.191   hannken 	fstrans_done(mp);
    418  1.182   hannken 
    419  1.182   hannken 	return 0;
    420    1.6      fvdl }
    421    1.6      fvdl 
    422    1.6      fvdl /*
    423   1.12  wrstuden  * Return whether or not the node is locked.
    424    1.6      fvdl  */
    425    1.6      fvdl int
    426   1.53     enami genfs_islocked(void *v)
    427    1.6      fvdl {
    428    1.6      fvdl 	struct vop_islocked_args /* {
    429    1.6      fvdl 		struct vnode *a_vp;
    430    1.6      fvdl 	} */ *ap = v;
    431    1.6      fvdl 	struct vnode *vp = ap->a_vp;
    432    1.6      fvdl 
    433  1.182   hannken 	if (rw_write_held(&vp->v_lock))
    434  1.182   hannken 		return LK_EXCLUSIVE;
    435  1.182   hannken 
    436  1.182   hannken 	if (rw_read_held(&vp->v_lock))
    437  1.182   hannken 		return LK_SHARED;
    438  1.182   hannken 
    439  1.182   hannken 	return 0;
    440   1.12  wrstuden }
    441   1.12  wrstuden 
    442   1.12  wrstuden /*
    443   1.12  wrstuden  * Stubs to use when there is no locking to be done on the underlying object.
    444   1.12  wrstuden  */
    445   1.12  wrstuden int
    446   1.53     enami genfs_nolock(void *v)
    447   1.12  wrstuden {
    448   1.12  wrstuden 
    449   1.12  wrstuden 	return (0);
    450   1.12  wrstuden }
    451   1.12  wrstuden 
    452   1.12  wrstuden int
    453  1.138  christos genfs_nounlock(void *v)
    454   1.12  wrstuden {
    455   1.53     enami 
    456   1.12  wrstuden 	return (0);
    457   1.12  wrstuden }
    458   1.12  wrstuden 
    459   1.12  wrstuden int
    460  1.138  christos genfs_noislocked(void *v)
    461   1.12  wrstuden {
    462   1.53     enami 
    463   1.12  wrstuden 	return (0);
    464    1.8   thorpej }
    465    1.8   thorpej 
    466   1.34       chs int
    467  1.138  christos genfs_mmap(void *v)
    468   1.34       chs {
    469   1.53     enami 
    470   1.53     enami 	return (0);
    471   1.21       chs }
    472   1.21       chs 
    473  1.168     pooka /*
    474  1.168     pooka  * VOP_PUTPAGES() for vnodes which never have pages.
    475  1.168     pooka  */
    476  1.168     pooka 
    477  1.168     pooka int
    478  1.168     pooka genfs_null_putpages(void *v)
    479  1.168     pooka {
    480  1.168     pooka 	struct vop_putpages_args /* {
    481  1.168     pooka 		struct vnode *a_vp;
    482  1.168     pooka 		voff_t a_offlo;
    483  1.168     pooka 		voff_t a_offhi;
    484  1.168     pooka 		int a_flags;
    485  1.168     pooka 	} */ *ap = v;
    486  1.168     pooka 	struct vnode *vp = ap->a_vp;
    487  1.168     pooka 
    488  1.168     pooka 	KASSERT(vp->v_uobj.uo_npages == 0);
    489  1.187     rmind 	mutex_exit(vp->v_interlock);
    490  1.168     pooka 	return (0);
    491  1.168     pooka }
    492  1.168     pooka 
    493   1.37       chs void
    494   1.98      yamt genfs_node_init(struct vnode *vp, const struct genfs_ops *ops)
    495   1.37       chs {
    496   1.37       chs 	struct genfs_node *gp = VTOG(vp);
    497   1.37       chs 
    498  1.146        ad 	rw_init(&gp->g_glock);
    499   1.37       chs 	gp->g_op = ops;
    500   1.37       chs }
    501   1.37       chs 
    502   1.37       chs void
    503  1.147        ad genfs_node_destroy(struct vnode *vp)
    504  1.147        ad {
    505  1.147        ad 	struct genfs_node *gp = VTOG(vp);
    506  1.147        ad 
    507  1.147        ad 	rw_destroy(&gp->g_glock);
    508  1.147        ad }
    509  1.147        ad 
    510  1.147        ad void
    511  1.138  christos genfs_size(struct vnode *vp, off_t size, off_t *eobp, int flags)
    512   1.21       chs {
    513   1.21       chs 	int bsize;
    514   1.21       chs 
    515   1.37       chs 	bsize = 1 << vp->v_mount->mnt_fs_bshift;
    516   1.37       chs 	*eobp = (size + bsize - 1) & ~(bsize - 1);
    517   1.43       chs }
    518   1.43       chs 
    519   1.66  jdolecek static void
    520   1.66  jdolecek filt_genfsdetach(struct knote *kn)
    521   1.66  jdolecek {
    522   1.66  jdolecek 	struct vnode *vp = (struct vnode *)kn->kn_hook;
    523   1.66  jdolecek 
    524  1.187     rmind 	mutex_enter(vp->v_interlock);
    525   1.66  jdolecek 	SLIST_REMOVE(&vp->v_klist, kn, knote, kn_selnext);
    526  1.187     rmind 	mutex_exit(vp->v_interlock);
    527   1.66  jdolecek }
    528   1.66  jdolecek 
    529   1.66  jdolecek static int
    530   1.66  jdolecek filt_genfsread(struct knote *kn, long hint)
    531   1.66  jdolecek {
    532   1.66  jdolecek 	struct vnode *vp = (struct vnode *)kn->kn_hook;
    533  1.164        ad 	int rv;
    534   1.66  jdolecek 
    535   1.66  jdolecek 	/*
    536   1.66  jdolecek 	 * filesystem is gone, so set the EOF flag and schedule
    537   1.66  jdolecek 	 * the knote for deletion.
    538   1.66  jdolecek 	 */
    539  1.164        ad 	switch (hint) {
    540  1.164        ad 	case NOTE_REVOKE:
    541  1.187     rmind 		KASSERT(mutex_owned(vp->v_interlock));
    542   1.66  jdolecek 		kn->kn_flags |= (EV_EOF | EV_ONESHOT);
    543   1.66  jdolecek 		return (1);
    544  1.164        ad 	case 0:
    545  1.187     rmind 		mutex_enter(vp->v_interlock);
    546  1.165        ad 		kn->kn_data = vp->v_size - ((file_t *)kn->kn_obj)->f_offset;
    547  1.164        ad 		rv = (kn->kn_data != 0);
    548  1.187     rmind 		mutex_exit(vp->v_interlock);
    549  1.164        ad 		return rv;
    550  1.164        ad 	default:
    551  1.187     rmind 		KASSERT(mutex_owned(vp->v_interlock));
    552  1.165        ad 		kn->kn_data = vp->v_size - ((file_t *)kn->kn_obj)->f_offset;
    553  1.164        ad 		return (kn->kn_data != 0);
    554   1.66  jdolecek 	}
    555   1.66  jdolecek }
    556   1.66  jdolecek 
    557   1.66  jdolecek static int
    558   1.66  jdolecek filt_genfsvnode(struct knote *kn, long hint)
    559   1.66  jdolecek {
    560  1.164        ad 	struct vnode *vp = (struct vnode *)kn->kn_hook;
    561  1.164        ad 	int fflags;
    562   1.66  jdolecek 
    563  1.164        ad 	switch (hint) {
    564  1.164        ad 	case NOTE_REVOKE:
    565  1.187     rmind 		KASSERT(mutex_owned(vp->v_interlock));
    566   1.66  jdolecek 		kn->kn_flags |= EV_EOF;
    567  1.164        ad 		if ((kn->kn_sfflags & hint) != 0)
    568  1.164        ad 			kn->kn_fflags |= hint;
    569   1.66  jdolecek 		return (1);
    570  1.164        ad 	case 0:
    571  1.187     rmind 		mutex_enter(vp->v_interlock);
    572  1.164        ad 		fflags = kn->kn_fflags;
    573  1.187     rmind 		mutex_exit(vp->v_interlock);
    574  1.164        ad 		break;
    575  1.164        ad 	default:
    576  1.187     rmind 		KASSERT(mutex_owned(vp->v_interlock));
    577  1.164        ad 		if ((kn->kn_sfflags & hint) != 0)
    578  1.164        ad 			kn->kn_fflags |= hint;
    579  1.164        ad 		fflags = kn->kn_fflags;
    580  1.164        ad 		break;
    581   1.66  jdolecek 	}
    582  1.164        ad 
    583  1.165        ad 	return (fflags != 0);
    584   1.66  jdolecek }
    585   1.66  jdolecek 
    586   1.96     perry static const struct filterops genfsread_filtops =
    587   1.66  jdolecek 	{ 1, NULL, filt_genfsdetach, filt_genfsread };
    588   1.96     perry static const struct filterops genfsvnode_filtops =
    589   1.66  jdolecek 	{ 1, NULL, filt_genfsdetach, filt_genfsvnode };
    590   1.66  jdolecek 
    591   1.66  jdolecek int
    592   1.66  jdolecek genfs_kqfilter(void *v)
    593   1.66  jdolecek {
    594   1.66  jdolecek 	struct vop_kqfilter_args /* {
    595   1.66  jdolecek 		struct vnode	*a_vp;
    596   1.66  jdolecek 		struct knote	*a_kn;
    597   1.66  jdolecek 	} */ *ap = v;
    598   1.66  jdolecek 	struct vnode *vp;
    599   1.66  jdolecek 	struct knote *kn;
    600   1.66  jdolecek 
    601   1.66  jdolecek 	vp = ap->a_vp;
    602   1.66  jdolecek 	kn = ap->a_kn;
    603   1.66  jdolecek 	switch (kn->kn_filter) {
    604   1.66  jdolecek 	case EVFILT_READ:
    605   1.66  jdolecek 		kn->kn_fop = &genfsread_filtops;
    606   1.66  jdolecek 		break;
    607   1.66  jdolecek 	case EVFILT_VNODE:
    608   1.66  jdolecek 		kn->kn_fop = &genfsvnode_filtops;
    609   1.66  jdolecek 		break;
    610   1.66  jdolecek 	default:
    611  1.159     pooka 		return (EINVAL);
    612   1.66  jdolecek 	}
    613   1.66  jdolecek 
    614   1.66  jdolecek 	kn->kn_hook = vp;
    615   1.66  jdolecek 
    616  1.187     rmind 	mutex_enter(vp->v_interlock);
    617   1.66  jdolecek 	SLIST_INSERT_HEAD(&vp->v_klist, kn, kn_selnext);
    618  1.187     rmind 	mutex_exit(vp->v_interlock);
    619   1.66  jdolecek 
    620   1.66  jdolecek 	return (0);
    621    1.1   mycroft }
    622  1.136      yamt 
    623  1.136      yamt void
    624  1.136      yamt genfs_node_wrlock(struct vnode *vp)
    625  1.136      yamt {
    626  1.136      yamt 	struct genfs_node *gp = VTOG(vp);
    627  1.136      yamt 
    628  1.146        ad 	rw_enter(&gp->g_glock, RW_WRITER);
    629  1.136      yamt }
    630  1.136      yamt 
    631  1.136      yamt void
    632  1.136      yamt genfs_node_rdlock(struct vnode *vp)
    633  1.136      yamt {
    634  1.136      yamt 	struct genfs_node *gp = VTOG(vp);
    635  1.136      yamt 
    636  1.146        ad 	rw_enter(&gp->g_glock, RW_READER);
    637  1.136      yamt }
    638  1.136      yamt 
    639  1.176  uebayasi int
    640  1.175  uebayasi genfs_node_rdtrylock(struct vnode *vp)
    641  1.175  uebayasi {
    642  1.175  uebayasi 	struct genfs_node *gp = VTOG(vp);
    643  1.175  uebayasi 
    644  1.176  uebayasi 	return rw_tryenter(&gp->g_glock, RW_READER);
    645  1.175  uebayasi }
    646  1.175  uebayasi 
    647  1.175  uebayasi void
    648  1.136      yamt genfs_node_unlock(struct vnode *vp)
    649  1.136      yamt {
    650  1.136      yamt 	struct genfs_node *gp = VTOG(vp);
    651  1.136      yamt 
    652  1.146        ad 	rw_exit(&gp->g_glock);
    653  1.136      yamt }
    654  1.169      elad 
    655  1.183       chs int
    656  1.183       chs genfs_node_wrlocked(struct vnode *vp)
    657  1.183       chs {
    658  1.183       chs 	struct genfs_node *gp = VTOG(vp);
    659  1.183       chs 
    660  1.183       chs 	return rw_write_held(&gp->g_glock);
    661  1.183       chs }
    662  1.183       chs 
    663  1.169      elad /*
    664  1.172      elad  * Do the usual access checking.
    665  1.172      elad  * file_mode, uid and gid are from the vnode in question,
    666  1.172      elad  * while acc_mode and cred are from the VOP_ACCESS parameter list
    667  1.172      elad  */
    668  1.172      elad int
    669  1.172      elad genfs_can_access(enum vtype type, mode_t file_mode, uid_t uid, gid_t gid,
    670  1.172      elad     mode_t acc_mode, kauth_cred_t cred)
    671  1.172      elad {
    672  1.172      elad 	mode_t mask;
    673  1.172      elad 	int error, ismember;
    674  1.172      elad 
    675  1.172      elad 	mask = 0;
    676  1.172      elad 
    677  1.172      elad 	/* Otherwise, check the owner. */
    678  1.172      elad 	if (kauth_cred_geteuid(cred) == uid) {
    679  1.172      elad 		if (acc_mode & VEXEC)
    680  1.172      elad 			mask |= S_IXUSR;
    681  1.172      elad 		if (acc_mode & VREAD)
    682  1.172      elad 			mask |= S_IRUSR;
    683  1.172      elad 		if (acc_mode & VWRITE)
    684  1.172      elad 			mask |= S_IWUSR;
    685  1.172      elad 		return ((file_mode & mask) == mask ? 0 : EACCES);
    686  1.172      elad 	}
    687  1.172      elad 
    688  1.172      elad 	/* Otherwise, check the groups. */
    689  1.172      elad 	error = kauth_cred_ismember_gid(cred, gid, &ismember);
    690  1.172      elad 	if (error)
    691  1.172      elad 		return (error);
    692  1.172      elad 	if (kauth_cred_getegid(cred) == gid || ismember) {
    693  1.172      elad 		if (acc_mode & VEXEC)
    694  1.172      elad 			mask |= S_IXGRP;
    695  1.172      elad 		if (acc_mode & VREAD)
    696  1.172      elad 			mask |= S_IRGRP;
    697  1.172      elad 		if (acc_mode & VWRITE)
    698  1.172      elad 			mask |= S_IWGRP;
    699  1.172      elad 		return ((file_mode & mask) == mask ? 0 : EACCES);
    700  1.172      elad 	}
    701  1.172      elad 
    702  1.172      elad 	/* Otherwise, check everyone else. */
    703  1.172      elad 	if (acc_mode & VEXEC)
    704  1.172      elad 		mask |= S_IXOTH;
    705  1.172      elad 	if (acc_mode & VREAD)
    706  1.172      elad 		mask |= S_IROTH;
    707  1.172      elad 	if (acc_mode & VWRITE)
    708  1.172      elad 		mask |= S_IWOTH;
    709  1.172      elad 	return ((file_mode & mask) == mask ? 0 : EACCES);
    710  1.172      elad }
    711  1.172      elad 
    712  1.172      elad /*
    713  1.169      elad  * Common routine to check if chmod() is allowed.
    714  1.169      elad  *
    715  1.169      elad  * Policy:
    716  1.169      elad  *   - You must own the file, and
    717  1.169      elad  *     - You must not set the "sticky" bit (meaningless, see chmod(2))
    718  1.169      elad  *     - You must be a member of the group if you're trying to set the
    719  1.169      elad  *       SGIDf bit
    720  1.169      elad  *
    721  1.169      elad  * cred - credentials of the invoker
    722  1.169      elad  * vp - vnode of the file-system object
    723  1.169      elad  * cur_uid, cur_gid - current uid/gid of the file-system object
    724  1.169      elad  * new_mode - new mode for the file-system object
    725  1.169      elad  *
    726  1.169      elad  * Returns 0 if the change is allowed, or an error value otherwise.
    727  1.169      elad  */
    728  1.169      elad int
    729  1.188      elad genfs_can_chmod(enum vtype type, kauth_cred_t cred, uid_t cur_uid,
    730  1.169      elad     gid_t cur_gid, mode_t new_mode)
    731  1.169      elad {
    732  1.169      elad 	int error;
    733  1.169      elad 
    734  1.188      elad 	/* The user must own the file. */
    735  1.169      elad 	if (kauth_cred_geteuid(cred) != cur_uid)
    736  1.169      elad 		return (EPERM);
    737  1.169      elad 
    738  1.169      elad 	/*
    739  1.188      elad 	 * Unprivileged users can't set the sticky bit on files.
    740  1.169      elad 	 */
    741  1.188      elad 	if ((type != VDIR) && (new_mode & S_ISTXT))
    742  1.169      elad 		return (EFTYPE);
    743  1.169      elad 
    744  1.169      elad 	/*
    745  1.169      elad 	 * If the invoker is trying to set the SGID bit on the file,
    746  1.169      elad 	 * check group membership.
    747  1.169      elad 	 */
    748  1.169      elad 	if (new_mode & S_ISGID) {
    749  1.169      elad 		int ismember;
    750  1.169      elad 
    751  1.169      elad 		error = kauth_cred_ismember_gid(cred, cur_gid,
    752  1.169      elad 		    &ismember);
    753  1.169      elad 		if (error || !ismember)
    754  1.169      elad 			return (EPERM);
    755  1.169      elad 	}
    756  1.169      elad 
    757  1.169      elad 	return (0);
    758  1.169      elad }
    759  1.169      elad 
    760  1.169      elad /*
    761  1.169      elad  * Common routine to check if chown() is allowed.
    762  1.169      elad  *
    763  1.169      elad  * Policy:
    764  1.169      elad  *   - You must own the file, and
    765  1.169      elad  *     - You must not try to change ownership, and
    766  1.169      elad  *     - You must be member of the new group
    767  1.169      elad  *
    768  1.169      elad  * cred - credentials of the invoker
    769  1.169      elad  * cur_uid, cur_gid - current uid/gid of the file-system object
    770  1.169      elad  * new_uid, new_gid - target uid/gid of the file-system object
    771  1.169      elad  *
    772  1.169      elad  * Returns 0 if the change is allowed, or an error value otherwise.
    773  1.169      elad  */
    774  1.169      elad int
    775  1.188      elad genfs_can_chown(kauth_cred_t cred, uid_t cur_uid,
    776  1.169      elad     gid_t cur_gid, uid_t new_uid, gid_t new_gid)
    777  1.169      elad {
    778  1.169      elad 	int error, ismember;
    779  1.169      elad 
    780  1.169      elad 	/*
    781  1.169      elad 	 * You can only change ownership of a file if:
    782  1.169      elad 	 * You own the file and...
    783  1.169      elad 	 */
    784  1.169      elad 	if (kauth_cred_geteuid(cred) == cur_uid) {
    785  1.169      elad 		/*
    786  1.169      elad 		 * You don't try to change ownership, and...
    787  1.169      elad 		 */
    788  1.169      elad 		if (new_uid != cur_uid)
    789  1.169      elad 			return (EPERM);
    790  1.169      elad 
    791  1.169      elad 		/*
    792  1.169      elad 		 * You don't try to change group (no-op), or...
    793  1.169      elad 		 */
    794  1.169      elad 		if (new_gid == cur_gid)
    795  1.169      elad 			return (0);
    796  1.169      elad 
    797  1.169      elad 		/*
    798  1.169      elad 		 * Your effective gid is the new gid, or...
    799  1.169      elad 		 */
    800  1.169      elad 		if (kauth_cred_getegid(cred) == new_gid)
    801  1.169      elad 			return (0);
    802  1.169      elad 
    803  1.169      elad 		/*
    804  1.169      elad 		 * The new gid is one you're a member of.
    805  1.169      elad 		 */
    806  1.169      elad 		ismember = 0;
    807  1.169      elad 		error = kauth_cred_ismember_gid(cred, new_gid,
    808  1.169      elad 		    &ismember);
    809  1.174       roy 		if (!error && ismember)
    810  1.174       roy 			return (0);
    811  1.169      elad 	}
    812  1.169      elad 
    813  1.173     pooka 	return (EPERM);
    814  1.169      elad }
    815  1.169      elad 
    816  1.171      elad int
    817  1.171      elad genfs_can_chtimes(vnode_t *vp, u_int vaflags, uid_t owner_uid,
    818  1.171      elad     kauth_cred_t cred)
    819  1.171      elad {
    820  1.171      elad 	int error;
    821  1.171      elad 
    822  1.188      elad 	/* Must be owner, or... */
    823  1.171      elad 	if (kauth_cred_geteuid(cred) == owner_uid)
    824  1.171      elad 		return (0);
    825  1.171      elad 
    826  1.171      elad 	/* set the times to the current time, and... */
    827  1.171      elad 	if ((vaflags & VA_UTIMES_NULL) == 0)
    828  1.171      elad 		return (EPERM);
    829  1.171      elad 
    830  1.171      elad 	/* have write access. */
    831  1.171      elad 	error = VOP_ACCESS(vp, VWRITE, cred);
    832  1.171      elad 	if (error)
    833  1.171      elad 		return (error);
    834  1.171      elad 
    835  1.171      elad 	return (0);
    836  1.171      elad }
    837  1.171      elad 
    838  1.188      elad /*
    839  1.188      elad  * Common routine to check if chflags() is allowed.
    840  1.188      elad  *
    841  1.188      elad  * Policy:
    842  1.188      elad  *   - You must own the file, and
    843  1.188      elad  *   - You must not change system flags, and
    844  1.188      elad  *   - You must not change flags on character/block devices.
    845  1.188      elad  *
    846  1.188      elad  * cred - credentials of the invoker
    847  1.188      elad  * owner_uid - uid of the file-system object
    848  1.188      elad  * changing_sysflags - true if the invoker wants to change system flags
    849  1.188      elad  */
    850  1.188      elad int
    851  1.188      elad genfs_can_chflags(kauth_cred_t cred, enum vtype type, uid_t owner_uid,
    852  1.188      elad     bool changing_sysflags)
    853  1.188      elad {
    854  1.188      elad 
    855  1.188      elad 	/* The user must own the file. */
    856  1.188      elad 	if (kauth_cred_geteuid(cred) != owner_uid) {
    857  1.189     njoly 		return EPERM;
    858  1.188      elad 	}
    859  1.188      elad 
    860  1.188      elad 	if (changing_sysflags) {
    861  1.188      elad 		return EPERM;
    862  1.188      elad 	}
    863  1.188      elad 
    864  1.188      elad 	/*
    865  1.188      elad 	 * Unprivileged users cannot change the flags on devices, even if they
    866  1.188      elad 	 * own them.
    867  1.188      elad 	 */
    868  1.188      elad 	if (type == VCHR || type == VBLK) {
    869  1.188      elad 		return EPERM;
    870  1.188      elad 	}
    871  1.188      elad 
    872  1.188      elad 	return 0;
    873  1.188      elad }
    874  1.188      elad 
    875  1.188      elad /*
    876  1.188      elad  * Common "sticky" policy.
    877  1.188      elad  *
    878  1.188      elad  * When a directory is "sticky" (as determined by the caller), this
    879  1.188      elad  * function may help implementing the following policy:
    880  1.188      elad  * - Renaming a file in it is only possible if the user owns the directory
    881  1.188      elad  *   or the file being renamed.
    882  1.188      elad  * - Deleting a file from it is only possible if the user owns the
    883  1.188      elad  *   directory or the file being deleted.
    884  1.188      elad  */
    885  1.188      elad int
    886  1.188      elad genfs_can_sticky(kauth_cred_t cred, uid_t dir_uid, uid_t file_uid)
    887  1.188      elad {
    888  1.188      elad 	if (kauth_cred_geteuid(cred) != dir_uid &&
    889  1.188      elad 	    kauth_cred_geteuid(cred) != file_uid)
    890  1.188      elad 		return EPERM;
    891  1.188      elad 
    892  1.188      elad 	return 0;
    893  1.188      elad }
    894  1.188      elad 
    895  1.188      elad int
    896  1.188      elad genfs_can_extattr(kauth_cred_t cred, int access_mode, vnode_t *vp,
    897  1.188      elad     const char *attr)
    898  1.188      elad {
    899  1.188      elad 	/* We can't allow privileged namespaces. */
    900  1.188      elad 	if (strncasecmp(attr, "system", 6) == 0)
    901  1.188      elad 		return EPERM;
    902  1.188      elad 
    903  1.188      elad 	return VOP_ACCESS(vp, access_mode, cred);
    904  1.188      elad }
    905