xref: /freebsd/sys/kern/vfs_extattr.c (revision c4f6a2a9e1b1879b618c436ab4f56ff75c73a0f5)
1 /*
2  * Copyright (c) 1989, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  * (c) UNIX System Laboratories, Inc.
5  * All or some portions of this file are derived from material licensed
6  * to the University of California by American Telephone and Telegraph
7  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
8  * the permission of UNIX System Laboratories, Inc.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. All advertising materials mentioning features or use of this software
19  *    must display the following acknowledgement:
20  *	This product includes software developed by the University of
21  *	California, Berkeley and its contributors.
22  * 4. Neither the name of the University nor the names of its contributors
23  *    may be used to endorse or promote products derived from this software
24  *    without specific prior written permission.
25  *
26  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36  * SUCH DAMAGE.
37  *
38  *	@(#)vfs_syscalls.c	8.13 (Berkeley) 4/15/94
39  * $FreeBSD$
40  */
41 
42 /* For 4.3 integer FS ID compatibility */
43 #include "opt_compat.h"
44 #include "opt_mac.h"
45 
46 #include <sys/param.h>
47 #include <sys/systm.h>
48 #include <sys/bio.h>
49 #include <sys/buf.h>
50 #include <sys/sysent.h>
51 #include <sys/mac.h>
52 #include <sys/malloc.h>
53 #include <sys/mount.h>
54 #include <sys/mutex.h>
55 #include <sys/sysproto.h>
56 #include <sys/namei.h>
57 #include <sys/filedesc.h>
58 #include <sys/kernel.h>
59 #include <sys/fcntl.h>
60 #include <sys/file.h>
61 #include <sys/linker.h>
62 #include <sys/stat.h>
63 #include <sys/sx.h>
64 #include <sys/unistd.h>
65 #include <sys/vnode.h>
66 #include <sys/proc.h>
67 #include <sys/dirent.h>
68 #include <sys/extattr.h>
69 #include <sys/jail.h>
70 #include <sys/sysctl.h>
71 
72 #include <machine/limits.h>
73 #include <machine/stdarg.h>
74 
75 #include <vm/vm.h>
76 #include <vm/vm_object.h>
77 #include <vm/vm_page.h>
78 #include <vm/uma.h>
79 
80 static int change_dir(struct nameidata *ndp, struct thread *td);
81 static int chroot_refuse_vdir_fds(struct filedesc *fdp);
82 static int getutimes(const struct timeval *, struct timespec *);
83 static int setfown(struct thread *td, struct vnode *, uid_t, gid_t);
84 static int setfmode(struct thread *td, struct vnode *, int);
85 static int setfflags(struct thread *td, struct vnode *, int);
86 static int setutimes(struct thread *td, struct vnode *,
87     const struct timespec *, int, int);
88 static int vn_access(struct vnode *vp, int user_flags, struct ucred *cred,
89     struct thread *td);
90 
91 int (*union_dircheckp)(struct thread *td, struct vnode **, struct file *);
92 int (*softdep_fsync_hook)(struct vnode *);
93 
94 /*
95  * Sync each mounted filesystem.
96  */
97 #ifndef _SYS_SYSPROTO_H_
98 struct sync_args {
99         int     dummy;
100 };
101 #endif
102 
103 #ifdef DEBUG
104 static int syncprt = 0;
105 SYSCTL_INT(_debug, OID_AUTO, syncprt, CTLFLAG_RW, &syncprt, 0, "");
106 #endif
107 
108 /* ARGSUSED */
109 int
110 sync(td, uap)
111 	struct thread *td;
112 	struct sync_args *uap;
113 {
114 	struct mount *mp, *nmp;
115 	int asyncflag;
116 
117 	mtx_lock(&mountlist_mtx);
118 	for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) {
119 		if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) {
120 			nmp = TAILQ_NEXT(mp, mnt_list);
121 			continue;
122 		}
123 		if ((mp->mnt_flag & MNT_RDONLY) == 0 &&
124 		    vn_start_write(NULL, &mp, V_NOWAIT) == 0) {
125 			asyncflag = mp->mnt_flag & MNT_ASYNC;
126 			mp->mnt_flag &= ~MNT_ASYNC;
127 			vfs_msync(mp, MNT_NOWAIT);
128 			VFS_SYNC(mp, MNT_NOWAIT,
129 			    ((td != NULL) ? td->td_ucred : NOCRED), td);
130 			mp->mnt_flag |= asyncflag;
131 			vn_finished_write(mp);
132 		}
133 		mtx_lock(&mountlist_mtx);
134 		nmp = TAILQ_NEXT(mp, mnt_list);
135 		vfs_unbusy(mp, td);
136 	}
137 	mtx_unlock(&mountlist_mtx);
138 #if 0
139 /*
140  * XXX don't call vfs_bufstats() yet because that routine
141  * was not imported in the Lite2 merge.
142  */
143 #ifdef DIAGNOSTIC
144 	if (syncprt)
145 		vfs_bufstats();
146 #endif /* DIAGNOSTIC */
147 #endif
148 	return (0);
149 }
150 
151 /* XXX PRISON: could be per prison flag */
152 static int prison_quotas;
153 #if 0
154 SYSCTL_INT(_kern_prison, OID_AUTO, quotas, CTLFLAG_RW, &prison_quotas, 0, "");
155 #endif
156 
157 /*
158  * Change filesystem quotas.
159  */
160 #ifndef _SYS_SYSPROTO_H_
161 struct quotactl_args {
162 	char *path;
163 	int cmd;
164 	int uid;
165 	caddr_t arg;
166 };
167 #endif
168 /* ARGSUSED */
169 int
170 quotactl(td, uap)
171 	struct thread *td;
172 	register struct quotactl_args /* {
173 		syscallarg(char *) path;
174 		syscallarg(int) cmd;
175 		syscallarg(int) uid;
176 		syscallarg(caddr_t) arg;
177 	} */ *uap;
178 {
179 	struct mount *mp;
180 	int error;
181 	struct nameidata nd;
182 
183 	if (jailed(td->td_ucred) && !prison_quotas)
184 		return (EPERM);
185 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
186 	if ((error = namei(&nd)) != 0)
187 		return (error);
188 	NDFREE(&nd, NDF_ONLY_PNBUF);
189 	error = vn_start_write(nd.ni_vp, &mp, V_WAIT | PCATCH);
190 	vrele(nd.ni_vp);
191 	if (error)
192 		return (error);
193 	error = VFS_QUOTACTL(mp, SCARG(uap, cmd), SCARG(uap, uid),
194 	    SCARG(uap, arg), td);
195 	vn_finished_write(mp);
196 	return (error);
197 }
198 
199 /*
200  * Get filesystem statistics.
201  */
202 #ifndef _SYS_SYSPROTO_H_
203 struct statfs_args {
204 	char *path;
205 	struct statfs *buf;
206 };
207 #endif
208 /* ARGSUSED */
209 int
210 statfs(td, uap)
211 	struct thread *td;
212 	register struct statfs_args /* {
213 		syscallarg(char *) path;
214 		syscallarg(struct statfs *) buf;
215 	} */ *uap;
216 {
217 	register struct mount *mp;
218 	register struct statfs *sp;
219 	int error;
220 	struct nameidata nd;
221 	struct statfs sb;
222 
223 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
224 	if ((error = namei(&nd)) != 0)
225 		return (error);
226 	mp = nd.ni_vp->v_mount;
227 	sp = &mp->mnt_stat;
228 	NDFREE(&nd, NDF_ONLY_PNBUF);
229 	vrele(nd.ni_vp);
230 #ifdef MAC
231 	error = mac_check_mount_stat(td->td_ucred, mp);
232 	if (error)
233 		return (error);
234 #endif
235 	error = VFS_STATFS(mp, sp, td);
236 	if (error)
237 		return (error);
238 	sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
239 	if (suser(td)) {
240 		bcopy(sp, &sb, sizeof(sb));
241 		sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0;
242 		sp = &sb;
243 	}
244 	return (copyout(sp, SCARG(uap, buf), sizeof(*sp)));
245 }
246 
247 /*
248  * Get filesystem statistics.
249  */
250 #ifndef _SYS_SYSPROTO_H_
251 struct fstatfs_args {
252 	int fd;
253 	struct statfs *buf;
254 };
255 #endif
256 /* ARGSUSED */
257 int
258 fstatfs(td, uap)
259 	struct thread *td;
260 	register struct fstatfs_args /* {
261 		syscallarg(int) fd;
262 		syscallarg(struct statfs *) buf;
263 	} */ *uap;
264 {
265 	struct file *fp;
266 	struct mount *mp;
267 	register struct statfs *sp;
268 	int error;
269 	struct statfs sb;
270 
271 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
272 		return (error);
273 	mp = ((struct vnode *)fp->f_data)->v_mount;
274 	fdrop(fp, td);
275 	if (mp == NULL)
276 		return (EBADF);
277 #ifdef MAC
278 	error = mac_check_mount_stat(td->td_ucred, mp);
279 	if (error)
280 		return (error);
281 #endif
282 	sp = &mp->mnt_stat;
283 	error = VFS_STATFS(mp, sp, td);
284 	if (error)
285 		return (error);
286 	sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
287 	if (suser(td)) {
288 		bcopy(sp, &sb, sizeof(sb));
289 		sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0;
290 		sp = &sb;
291 	}
292 	return (copyout(sp, SCARG(uap, buf), sizeof(*sp)));
293 }
294 
295 /*
296  * Get statistics on all filesystems.
297  */
298 #ifndef _SYS_SYSPROTO_H_
299 struct getfsstat_args {
300 	struct statfs *buf;
301 	long bufsize;
302 	int flags;
303 };
304 #endif
305 int
306 getfsstat(td, uap)
307 	struct thread *td;
308 	register struct getfsstat_args /* {
309 		syscallarg(struct statfs *) buf;
310 		syscallarg(long) bufsize;
311 		syscallarg(int) flags;
312 	} */ *uap;
313 {
314 	register struct mount *mp, *nmp;
315 	register struct statfs *sp;
316 	caddr_t sfsp;
317 	long count, maxcount, error;
318 
319 	maxcount = SCARG(uap, bufsize) / sizeof(struct statfs);
320 	sfsp = (caddr_t)SCARG(uap, buf);
321 	count = 0;
322 	mtx_lock(&mountlist_mtx);
323 	for (mp = TAILQ_FIRST(&mountlist); mp != NULL; mp = nmp) {
324 #ifdef MAC
325 		if (mac_check_mount_stat(td->td_ucred, mp) != 0) {
326 			nmp = TAILQ_NEXT(mp, mnt_list);
327 			continue;
328 		}
329 #endif
330 		if (vfs_busy(mp, LK_NOWAIT, &mountlist_mtx, td)) {
331 			nmp = TAILQ_NEXT(mp, mnt_list);
332 			continue;
333 		}
334 		if (sfsp && count < maxcount) {
335 			sp = &mp->mnt_stat;
336 			/*
337 			 * If MNT_NOWAIT or MNT_LAZY is specified, do not
338 			 * refresh the fsstat cache. MNT_NOWAIT or MNT_LAZY
339 			 * overrides MNT_WAIT.
340 			 */
341 			if (((SCARG(uap, flags) & (MNT_LAZY|MNT_NOWAIT)) == 0 ||
342 			    (SCARG(uap, flags) & MNT_WAIT)) &&
343 			    (error = VFS_STATFS(mp, sp, td))) {
344 				mtx_lock(&mountlist_mtx);
345 				nmp = TAILQ_NEXT(mp, mnt_list);
346 				vfs_unbusy(mp, td);
347 				continue;
348 			}
349 			sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
350 			error = copyout(sp, sfsp, sizeof(*sp));
351 			if (error) {
352 				vfs_unbusy(mp, td);
353 				return (error);
354 			}
355 			sfsp += sizeof(*sp);
356 		}
357 		count++;
358 		mtx_lock(&mountlist_mtx);
359 		nmp = TAILQ_NEXT(mp, mnt_list);
360 		vfs_unbusy(mp, td);
361 	}
362 	mtx_unlock(&mountlist_mtx);
363 	if (sfsp && count > maxcount)
364 		td->td_retval[0] = maxcount;
365 	else
366 		td->td_retval[0] = count;
367 	return (0);
368 }
369 
370 /*
371  * Change current working directory to a given file descriptor.
372  */
373 #ifndef _SYS_SYSPROTO_H_
374 struct fchdir_args {
375 	int	fd;
376 };
377 #endif
378 /* ARGSUSED */
379 int
380 fchdir(td, uap)
381 	struct thread *td;
382 	struct fchdir_args /* {
383 		syscallarg(int) fd;
384 	} */ *uap;
385 {
386 	register struct filedesc *fdp = td->td_proc->p_fd;
387 	struct vnode *vp, *tdp, *vpold;
388 	struct mount *mp;
389 	struct file *fp;
390 	int error;
391 
392 	if ((error = getvnode(fdp, SCARG(uap, fd), &fp)) != 0)
393 		return (error);
394 	vp = (struct vnode *)fp->f_data;
395 	VREF(vp);
396 	fdrop(fp, td);
397 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
398 	if (vp->v_type != VDIR)
399 		error = ENOTDIR;
400 #ifdef MAC
401 	else if ((error = mac_check_vnode_chdir(td->td_ucred, vp)) != 0) {
402 	}
403 #endif
404 	else
405 		error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td);
406 	while (!error && (mp = vp->v_mountedhere) != NULL) {
407 		if (vfs_busy(mp, 0, 0, td))
408 			continue;
409 		error = VFS_ROOT(mp, &tdp);
410 		vfs_unbusy(mp, td);
411 		if (error)
412 			break;
413 		vput(vp);
414 		vp = tdp;
415 	}
416 	if (error) {
417 		vput(vp);
418 		return (error);
419 	}
420 	VOP_UNLOCK(vp, 0, td);
421 	FILEDESC_LOCK(fdp);
422 	vpold = fdp->fd_cdir;
423 	fdp->fd_cdir = vp;
424 	FILEDESC_UNLOCK(fdp);
425 	vrele(vpold);
426 	return (0);
427 }
428 
429 /*
430  * Change current working directory (``.'').
431  */
432 #ifndef _SYS_SYSPROTO_H_
433 struct chdir_args {
434 	char	*path;
435 };
436 #endif
437 /* ARGSUSED */
438 int
439 chdir(td, uap)
440 	struct thread *td;
441 	struct chdir_args /* {
442 		syscallarg(char *) path;
443 	} */ *uap;
444 {
445 	register struct filedesc *fdp = td->td_proc->p_fd;
446 	int error;
447 	struct nameidata nd;
448 	struct vnode *vp;
449 
450 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE,
451 	    SCARG(uap, path), td);
452 	if ((error = change_dir(&nd, td)) != 0)
453 		return (error);
454 	NDFREE(&nd, NDF_ONLY_PNBUF);
455 	FILEDESC_LOCK(fdp);
456 	vp = fdp->fd_cdir;
457 	fdp->fd_cdir = nd.ni_vp;
458 	FILEDESC_UNLOCK(fdp);
459 	vrele(vp);
460 	return (0);
461 }
462 
463 /*
464  * Helper function for raised chroot(2) security function:  Refuse if
465  * any filedescriptors are open directories.
466  */
467 static int
468 chroot_refuse_vdir_fds(fdp)
469 	struct filedesc *fdp;
470 {
471 	struct vnode *vp;
472 	struct file *fp;
473 	int fd;
474 
475 	FILEDESC_LOCK_ASSERT(fdp, MA_OWNED);
476 	for (fd = 0; fd < fdp->fd_nfiles ; fd++) {
477 		fp = fget_locked(fdp, fd);
478 		if (fp == NULL)
479 			continue;
480 		if (fp->f_type == DTYPE_VNODE) {
481 			vp = (struct vnode *)fp->f_data;
482 			if (vp->v_type == VDIR)
483 				return (EPERM);
484 		}
485 	}
486 	return (0);
487 }
488 
489 /*
490  * This sysctl determines if we will allow a process to chroot(2) if it
491  * has a directory open:
492  *	0: disallowed for all processes.
493  *	1: allowed for processes that were not already chroot(2)'ed.
494  *	2: allowed for all processes.
495  */
496 
497 static int chroot_allow_open_directories = 1;
498 
499 SYSCTL_INT(_kern, OID_AUTO, chroot_allow_open_directories, CTLFLAG_RW,
500      &chroot_allow_open_directories, 0, "");
501 
502 /*
503  * Change notion of root (``/'') directory.
504  */
505 #ifndef _SYS_SYSPROTO_H_
506 struct chroot_args {
507 	char	*path;
508 };
509 #endif
510 /* ARGSUSED */
511 int
512 chroot(td, uap)
513 	struct thread *td;
514 	struct chroot_args /* {
515 		syscallarg(char *) path;
516 	} */ *uap;
517 {
518 	register struct filedesc *fdp = td->td_proc->p_fd;
519 	int error;
520 	struct nameidata nd;
521 	struct vnode *vp;
522 
523 	error = suser_cred(td->td_ucred, PRISON_ROOT);
524 	if (error)
525 		return (error);
526 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE,
527 	    SCARG(uap, path), td);
528 	mtx_lock(&Giant);
529 	if ((error = change_dir(&nd, td)) != 0)
530 		goto error;
531 #ifdef MAC
532 	if ((error = mac_check_vnode_chroot(td->td_ucred, nd.ni_vp)))
533 		goto error;
534 #endif
535 	FILEDESC_LOCK(fdp);
536 	if (chroot_allow_open_directories == 0 ||
537 	    (chroot_allow_open_directories == 1 && fdp->fd_rdir != rootvnode)) {
538 		error = chroot_refuse_vdir_fds(fdp);
539 		if (error)
540 			goto error_unlock;
541 	}
542 	vp = fdp->fd_rdir;
543 	fdp->fd_rdir = nd.ni_vp;
544 	if (!fdp->fd_jdir) {
545 		fdp->fd_jdir = nd.ni_vp;
546                 VREF(fdp->fd_jdir);
547 	}
548 	FILEDESC_UNLOCK(fdp);
549 	NDFREE(&nd, NDF_ONLY_PNBUF);
550 	vrele(vp);
551 	mtx_unlock(&Giant);
552 	return (0);
553 error_unlock:
554 	FILEDESC_UNLOCK(fdp);
555 error:
556 	mtx_unlock(&Giant);
557 	NDFREE(&nd, 0);
558 	return (error);
559 }
560 
561 /*
562  * Common routine for chroot and chdir.
563  */
564 static int
565 change_dir(ndp, td)
566 	register struct nameidata *ndp;
567 	struct thread *td;
568 {
569 	struct vnode *vp;
570 	int error;
571 
572 	error = namei(ndp);
573 	if (error)
574 		return (error);
575 	vp = ndp->ni_vp;
576 	if (vp->v_type != VDIR)
577 		error = ENOTDIR;
578 #ifdef MAC
579 	else if ((error = mac_check_vnode_chdir(td->td_ucred, vp)) != 0) {
580 	}
581 #endif
582 	else
583 		error = VOP_ACCESS(vp, VEXEC, td->td_ucred, td);
584 	if (error)
585 		vput(vp);
586 	else
587 		VOP_UNLOCK(vp, 0, td);
588 	return (error);
589 }
590 
591 /*
592  * Check permissions, allocate an open file structure,
593  * and call the device open routine if any.
594  */
595 #ifndef _SYS_SYSPROTO_H_
596 struct open_args {
597 	char	*path;
598 	int	flags;
599 	int	mode;
600 };
601 #endif
602 int
603 open(td, uap)
604 	struct thread *td;
605 	register struct open_args /* {
606 		syscallarg(char *) path;
607 		syscallarg(int) flags;
608 		syscallarg(int) mode;
609 	} */ *uap;
610 {
611 	struct proc *p = td->td_proc;
612 	struct filedesc *fdp = p->p_fd;
613 	struct file *fp;
614 	struct vnode *vp;
615 	struct vattr vat;
616 	struct mount *mp;
617 	int cmode, flags, oflags;
618 	struct file *nfp;
619 	int type, indx, error;
620 	struct flock lf;
621 	struct nameidata nd;
622 
623 	oflags = SCARG(uap, flags);
624 	if ((oflags & O_ACCMODE) == O_ACCMODE)
625 		return (EINVAL);
626 	flags = FFLAGS(oflags);
627 	error = falloc(td, &nfp, &indx);
628 	if (error)
629 		return (error);
630 	fp = nfp;
631 	FILEDESC_LOCK(fdp);
632 	cmode = ((SCARG(uap, mode) &~ fdp->fd_cmask) & ALLPERMS) &~ S_ISTXT;
633 	FILEDESC_UNLOCK(fdp);
634 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
635 	td->td_dupfd = -indx - 1;		/* XXX check for fdopen */
636 	/*
637 	 * Bump the ref count to prevent another process from closing
638 	 * the descriptor while we are blocked in vn_open()
639 	 */
640 	fhold(fp);
641 	error = vn_open(&nd, &flags, cmode);
642 	if (error) {
643 		/*
644 		 * release our own reference
645 		 */
646 		fdrop(fp, td);
647 
648 		/*
649 		 * handle special fdopen() case.  bleh.  dupfdopen() is
650 		 * responsible for dropping the old contents of ofiles[indx]
651 		 * if it succeeds.
652 		 */
653 		if ((error == ENODEV || error == ENXIO) &&
654 		    td->td_dupfd >= 0 &&		/* XXX from fdopen */
655 		    (error =
656 			dupfdopen(td, fdp, indx, td->td_dupfd, flags, error)) == 0) {
657 			td->td_retval[0] = indx;
658 			return (0);
659 		}
660 		/*
661 		 * Clean up the descriptor, but only if another thread hadn't
662 		 * replaced or closed it.
663 		 */
664 		FILEDESC_LOCK(fdp);
665 		if (fdp->fd_ofiles[indx] == fp) {
666 			fdp->fd_ofiles[indx] = NULL;
667 			FILEDESC_UNLOCK(fdp);
668 			fdrop(fp, td);
669 		} else
670 			FILEDESC_UNLOCK(fdp);
671 
672 		if (error == ERESTART)
673 			error = EINTR;
674 		return (error);
675 	}
676 	td->td_dupfd = 0;
677 	NDFREE(&nd, NDF_ONLY_PNBUF);
678 	vp = nd.ni_vp;
679 
680 	/*
681 	 * There should be 2 references on the file, one from the descriptor
682 	 * table, and one for us.
683 	 *
684 	 * Handle the case where someone closed the file (via its file
685 	 * descriptor) while we were blocked.  The end result should look
686 	 * like opening the file succeeded but it was immediately closed.
687 	 */
688 	FILEDESC_LOCK(fdp);
689 	FILE_LOCK(fp);
690 	if (fp->f_count == 1) {
691 		KASSERT(fdp->fd_ofiles[indx] != fp,
692 		    ("Open file descriptor lost all refs"));
693 		FILEDESC_UNLOCK(fdp);
694 		FILE_UNLOCK(fp);
695 		VOP_UNLOCK(vp, 0, td);
696 		vn_close(vp, flags & FMASK, fp->f_cred, td);
697 		fdrop(fp, td);
698 		td->td_retval[0] = indx;
699 		return 0;
700 	}
701 
702 	/* assert that vn_open created a backing object if one is needed */
703 	KASSERT(!vn_canvmio(vp) || VOP_GETVOBJECT(vp, NULL) == 0,
704 		("open: vmio vnode has no backing object after vn_open"));
705 
706 	fp->f_data = vp;
707 	fp->f_flag = flags & FMASK;
708 	fp->f_ops = &vnops;
709 	fp->f_type = (vp->v_type == VFIFO ? DTYPE_FIFO : DTYPE_VNODE);
710 	FILEDESC_UNLOCK(fdp);
711 	FILE_UNLOCK(fp);
712 	VOP_UNLOCK(vp, 0, td);
713 	if (flags & (O_EXLOCK | O_SHLOCK)) {
714 		lf.l_whence = SEEK_SET;
715 		lf.l_start = 0;
716 		lf.l_len = 0;
717 		if (flags & O_EXLOCK)
718 			lf.l_type = F_WRLCK;
719 		else
720 			lf.l_type = F_RDLCK;
721 		type = F_FLOCK;
722 		if ((flags & FNONBLOCK) == 0)
723 			type |= F_WAIT;
724 		if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf,
725 			    type)) != 0)
726 			goto bad;
727 		fp->f_flag |= FHASLOCK;
728 	}
729 	if (flags & O_TRUNC) {
730 		if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
731 			goto bad;
732 		VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
733 		VATTR_NULL(&vat);
734 		vat.va_size = 0;
735 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
736 #ifdef MAC
737 		error = mac_check_vnode_write(td->td_ucred, fp->f_cred, vp);
738 		if (error == 0)
739 #endif
740 			error = VOP_SETATTR(vp, &vat, td->td_ucred, td);
741 		VOP_UNLOCK(vp, 0, td);
742 		vn_finished_write(mp);
743 		if (error)
744 			goto bad;
745 	}
746 	/*
747 	 * Release our private reference, leaving the one associated with
748 	 * the descriptor table intact.
749 	 */
750 	fdrop(fp, td);
751 	td->td_retval[0] = indx;
752 	return (0);
753 bad:
754 	FILEDESC_LOCK(fdp);
755 	if (fdp->fd_ofiles[indx] == fp) {
756 		fdp->fd_ofiles[indx] = NULL;
757 		FILEDESC_UNLOCK(fdp);
758 		fdrop(fp, td);
759 	} else
760 		FILEDESC_UNLOCK(fdp);
761 	return (error);
762 }
763 
764 #ifdef COMPAT_43
765 /*
766  * Create a file.
767  */
768 #ifndef _SYS_SYSPROTO_H_
769 struct ocreat_args {
770 	char	*path;
771 	int	mode;
772 };
773 #endif
774 int
775 ocreat(td, uap)
776 	struct thread *td;
777 	register struct ocreat_args /* {
778 		syscallarg(char *) path;
779 		syscallarg(int) mode;
780 	} */ *uap;
781 {
782 	struct open_args /* {
783 		syscallarg(char *) path;
784 		syscallarg(int) flags;
785 		syscallarg(int) mode;
786 	} */ nuap;
787 
788 	SCARG(&nuap, path) = SCARG(uap, path);
789 	SCARG(&nuap, mode) = SCARG(uap, mode);
790 	SCARG(&nuap, flags) = O_WRONLY | O_CREAT | O_TRUNC;
791 	return (open(td, &nuap));
792 }
793 #endif /* COMPAT_43 */
794 
795 /*
796  * Create a special file.
797  */
798 #ifndef _SYS_SYSPROTO_H_
799 struct mknod_args {
800 	char	*path;
801 	int	mode;
802 	int	dev;
803 };
804 #endif
805 /* ARGSUSED */
806 int
807 mknod(td, uap)
808 	struct thread *td;
809 	register struct mknod_args /* {
810 		syscallarg(char *) path;
811 		syscallarg(int) mode;
812 		syscallarg(int) dev;
813 	} */ *uap;
814 {
815 	struct vnode *vp;
816 	struct mount *mp;
817 	struct vattr vattr;
818 	int error;
819 	int whiteout = 0;
820 	struct nameidata nd;
821 
822 	switch (SCARG(uap, mode) & S_IFMT) {
823 	case S_IFCHR:
824 	case S_IFBLK:
825 		error = suser(td);
826 		break;
827 	default:
828 		error = suser_cred(td->td_ucred, PRISON_ROOT);
829 		break;
830 	}
831 	if (error)
832 		return (error);
833 restart:
834 	bwillwrite();
835 	NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, UIO_USERSPACE,
836 	    SCARG(uap, path), td);
837 	if ((error = namei(&nd)) != 0)
838 		return (error);
839 	vp = nd.ni_vp;
840 	if (vp != NULL) {
841 		vrele(vp);
842 		error = EEXIST;
843 	} else {
844 		VATTR_NULL(&vattr);
845 		FILEDESC_LOCK(td->td_proc->p_fd);
846 		vattr.va_mode = (SCARG(uap, mode) & ALLPERMS) &~ td->td_proc->p_fd->fd_cmask;
847 		FILEDESC_UNLOCK(td->td_proc->p_fd);
848 		vattr.va_rdev = SCARG(uap, dev);
849 		whiteout = 0;
850 
851 		switch (SCARG(uap, mode) & S_IFMT) {
852 		case S_IFMT:	/* used by badsect to flag bad sectors */
853 			vattr.va_type = VBAD;
854 			break;
855 		case S_IFCHR:
856 			vattr.va_type = VCHR;
857 			break;
858 		case S_IFBLK:
859 			vattr.va_type = VBLK;
860 			break;
861 		case S_IFWHT:
862 			whiteout = 1;
863 			break;
864 		default:
865 			error = EINVAL;
866 			break;
867 		}
868 	}
869 	if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) {
870 		NDFREE(&nd, NDF_ONLY_PNBUF);
871 		vput(nd.ni_dvp);
872 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
873 			return (error);
874 		goto restart;
875 	}
876 	if (!error) {
877 		VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
878 		if (whiteout)
879 			error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, CREATE);
880 		else {
881 			error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp,
882 						&nd.ni_cnd, &vattr);
883 			if (error == 0)
884 				vput(nd.ni_vp);
885 		}
886 	}
887 	NDFREE(&nd, NDF_ONLY_PNBUF);
888 	vput(nd.ni_dvp);
889 	vn_finished_write(mp);
890 	ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mknod");
891 	ASSERT_VOP_UNLOCKED(nd.ni_vp, "mknod");
892 	return (error);
893 }
894 
895 /*
896  * Create a named pipe.
897  */
898 #ifndef _SYS_SYSPROTO_H_
899 struct mkfifo_args {
900 	char	*path;
901 	int	mode;
902 };
903 #endif
904 /* ARGSUSED */
905 int
906 mkfifo(td, uap)
907 	struct thread *td;
908 	register struct mkfifo_args /* {
909 		syscallarg(char *) path;
910 		syscallarg(int) mode;
911 	} */ *uap;
912 {
913 	struct mount *mp;
914 	struct vattr vattr;
915 	int error;
916 	struct nameidata nd;
917 
918 restart:
919 	bwillwrite();
920 	NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, UIO_USERSPACE,
921 	    SCARG(uap, path), td);
922 	if ((error = namei(&nd)) != 0)
923 		return (error);
924 	if (nd.ni_vp != NULL) {
925 		NDFREE(&nd, NDF_ONLY_PNBUF);
926 		vrele(nd.ni_vp);
927 		vput(nd.ni_dvp);
928 		return (EEXIST);
929 	}
930 	if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) {
931 		NDFREE(&nd, NDF_ONLY_PNBUF);
932 		vput(nd.ni_dvp);
933 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
934 			return (error);
935 		goto restart;
936 	}
937 	VATTR_NULL(&vattr);
938 	vattr.va_type = VFIFO;
939 	FILEDESC_LOCK(td->td_proc->p_fd);
940 	vattr.va_mode = (SCARG(uap, mode) & ALLPERMS) &~ td->td_proc->p_fd->fd_cmask;
941 	FILEDESC_UNLOCK(td->td_proc->p_fd);
942 	VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
943 	error = VOP_MKNOD(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr);
944 	if (error == 0)
945 		vput(nd.ni_vp);
946 	NDFREE(&nd, NDF_ONLY_PNBUF);
947 	vput(nd.ni_dvp);
948 	vn_finished_write(mp);
949 	return (error);
950 }
951 
952 /*
953  * Make a hard file link.
954  */
955 #ifndef _SYS_SYSPROTO_H_
956 struct link_args {
957 	char	*path;
958 	char	*link;
959 };
960 #endif
961 /* ARGSUSED */
962 int
963 link(td, uap)
964 	struct thread *td;
965 	register struct link_args /* {
966 		syscallarg(char *) path;
967 		syscallarg(char *) link;
968 	} */ *uap;
969 {
970 	struct vnode *vp;
971 	struct mount *mp;
972 	struct nameidata nd;
973 	int error;
974 
975 	bwillwrite();
976 	NDINIT(&nd, LOOKUP, FOLLOW|NOOBJ, UIO_USERSPACE, SCARG(uap, path), td);
977 	if ((error = namei(&nd)) != 0)
978 		return (error);
979 	NDFREE(&nd, NDF_ONLY_PNBUF);
980 	vp = nd.ni_vp;
981 	if (vp->v_type == VDIR) {
982 		vrele(vp);
983 		return (EPERM);		/* POSIX */
984 	}
985 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) {
986 		vrele(vp);
987 		return (error);
988 	}
989 	NDINIT(&nd, CREATE, LOCKPARENT | NOOBJ | SAVENAME, UIO_USERSPACE,
990 	    SCARG(uap, link), td);
991 	if ((error = namei(&nd)) == 0) {
992 		if (nd.ni_vp != NULL) {
993 			vrele(nd.ni_vp);
994 			error = EEXIST;
995 		} else {
996 			VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
997 			VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
998 			error = VOP_LINK(nd.ni_dvp, vp, &nd.ni_cnd);
999 		}
1000 		NDFREE(&nd, NDF_ONLY_PNBUF);
1001 		vput(nd.ni_dvp);
1002 	}
1003 	vrele(vp);
1004 	vn_finished_write(mp);
1005 	ASSERT_VOP_UNLOCKED(nd.ni_dvp, "link");
1006 	ASSERT_VOP_UNLOCKED(nd.ni_vp, "link");
1007 	return (error);
1008 }
1009 
1010 /*
1011  * Make a symbolic link.
1012  */
1013 #ifndef _SYS_SYSPROTO_H_
1014 struct symlink_args {
1015 	char	*path;
1016 	char	*link;
1017 };
1018 #endif
1019 /* ARGSUSED */
1020 int
1021 symlink(td, uap)
1022 	struct thread *td;
1023 	register struct symlink_args /* {
1024 		syscallarg(char *) path;
1025 		syscallarg(char *) link;
1026 	} */ *uap;
1027 {
1028 	struct mount *mp;
1029 	struct vattr vattr;
1030 	char *path;
1031 	int error;
1032 	struct nameidata nd;
1033 
1034 	path = uma_zalloc(namei_zone, M_WAITOK);
1035 	if ((error = copyinstr(SCARG(uap, path), path, MAXPATHLEN, NULL)) != 0)
1036 		goto out;
1037 restart:
1038 	bwillwrite();
1039 	NDINIT(&nd, CREATE, LOCKPARENT | NOOBJ | SAVENAME, UIO_USERSPACE,
1040 	    SCARG(uap, link), td);
1041 	if ((error = namei(&nd)) != 0)
1042 		goto out;
1043 	if (nd.ni_vp) {
1044 		NDFREE(&nd, NDF_ONLY_PNBUF);
1045 		vrele(nd.ni_vp);
1046 		vput(nd.ni_dvp);
1047 		error = EEXIST;
1048 		goto out;
1049 	}
1050 	if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) {
1051 		NDFREE(&nd, NDF_ONLY_PNBUF);
1052 		vput(nd.ni_dvp);
1053 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
1054 			return (error);
1055 		goto restart;
1056 	}
1057 	VATTR_NULL(&vattr);
1058 	FILEDESC_LOCK(td->td_proc->p_fd);
1059 	vattr.va_mode = ACCESSPERMS &~ td->td_proc->p_fd->fd_cmask;
1060 	FILEDESC_UNLOCK(td->td_proc->p_fd);
1061 	VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
1062 	error = VOP_SYMLINK(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr, path);
1063 	NDFREE(&nd, NDF_ONLY_PNBUF);
1064 	if (error == 0)
1065 		vput(nd.ni_vp);
1066 	vput(nd.ni_dvp);
1067 	vn_finished_write(mp);
1068 	ASSERT_VOP_UNLOCKED(nd.ni_dvp, "symlink");
1069 	ASSERT_VOP_UNLOCKED(nd.ni_vp, "symlink");
1070 out:
1071 	uma_zfree(namei_zone, path);
1072 	return (error);
1073 }
1074 
1075 /*
1076  * Delete a whiteout from the filesystem.
1077  */
1078 /* ARGSUSED */
1079 int
1080 undelete(td, uap)
1081 	struct thread *td;
1082 	register struct undelete_args /* {
1083 		syscallarg(char *) path;
1084 	} */ *uap;
1085 {
1086 	int error;
1087 	struct mount *mp;
1088 	struct nameidata nd;
1089 
1090 restart:
1091 	bwillwrite();
1092 	NDINIT(&nd, DELETE, LOCKPARENT|DOWHITEOUT, UIO_USERSPACE,
1093 	    SCARG(uap, path), td);
1094 	error = namei(&nd);
1095 	if (error)
1096 		return (error);
1097 
1098 	if (nd.ni_vp != NULLVP || !(nd.ni_cnd.cn_flags & ISWHITEOUT)) {
1099 		NDFREE(&nd, NDF_ONLY_PNBUF);
1100 		if (nd.ni_vp)
1101 			vrele(nd.ni_vp);
1102 		vput(nd.ni_dvp);
1103 		return (EEXIST);
1104 	}
1105 	if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) {
1106 		NDFREE(&nd, NDF_ONLY_PNBUF);
1107 		vput(nd.ni_dvp);
1108 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
1109 			return (error);
1110 		goto restart;
1111 	}
1112 	VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
1113 	error = VOP_WHITEOUT(nd.ni_dvp, &nd.ni_cnd, DELETE);
1114 	NDFREE(&nd, NDF_ONLY_PNBUF);
1115 	vput(nd.ni_dvp);
1116 	vn_finished_write(mp);
1117 	ASSERT_VOP_UNLOCKED(nd.ni_dvp, "undelete");
1118 	ASSERT_VOP_UNLOCKED(nd.ni_vp, "undelete");
1119 	return (error);
1120 }
1121 
1122 /*
1123  * Delete a name from the filesystem.
1124  */
1125 #ifndef _SYS_SYSPROTO_H_
1126 struct unlink_args {
1127 	char	*path;
1128 };
1129 #endif
1130 /* ARGSUSED */
1131 int
1132 unlink(td, uap)
1133 	struct thread *td;
1134 	struct unlink_args /* {
1135 		syscallarg(char *) path;
1136 	} */ *uap;
1137 {
1138 	struct mount *mp;
1139 	struct vnode *vp;
1140 	int error;
1141 	struct nameidata nd;
1142 
1143 restart:
1144 	bwillwrite();
1145 	NDINIT(&nd, DELETE, LOCKPARENT|LOCKLEAF, UIO_USERSPACE,
1146 	    SCARG(uap, path), td);
1147 	if ((error = namei(&nd)) != 0)
1148 		return (error);
1149 	vp = nd.ni_vp;
1150 	if (vp->v_type == VDIR)
1151 		error = EPERM;		/* POSIX */
1152 	else {
1153 		/*
1154 		 * The root of a mounted filesystem cannot be deleted.
1155 		 *
1156 		 * XXX: can this only be a VDIR case?
1157 		 */
1158 		if (vp->v_vflag & VV_ROOT)
1159 			error = EBUSY;
1160 	}
1161 	if (error == 0) {
1162 		if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) {
1163 			NDFREE(&nd, NDF_ONLY_PNBUF);
1164 			if (vp == nd.ni_dvp)
1165 				vrele(vp);
1166 			else
1167 				vput(vp);
1168 			vput(nd.ni_dvp);
1169 			if ((error = vn_start_write(NULL, &mp,
1170 			    V_XSLEEP | PCATCH)) != 0)
1171 				return (error);
1172 			goto restart;
1173 		}
1174 		VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
1175 		error = VOP_REMOVE(nd.ni_dvp, vp, &nd.ni_cnd);
1176 		vn_finished_write(mp);
1177 	}
1178 	NDFREE(&nd, NDF_ONLY_PNBUF);
1179 	if (vp == nd.ni_dvp)
1180 		vrele(vp);
1181 	else
1182 		vput(vp);
1183 	vput(nd.ni_dvp);
1184 	ASSERT_VOP_UNLOCKED(nd.ni_dvp, "unlink");
1185 	ASSERT_VOP_UNLOCKED(nd.ni_vp, "unlink");
1186 	return (error);
1187 }
1188 
1189 /*
1190  * Reposition read/write file offset.
1191  */
1192 #ifndef _SYS_SYSPROTO_H_
1193 struct lseek_args {
1194 	int	fd;
1195 	int	pad;
1196 	off_t	offset;
1197 	int	whence;
1198 };
1199 #endif
1200 int
1201 lseek(td, uap)
1202 	struct thread *td;
1203 	register struct lseek_args /* {
1204 		syscallarg(int) fd;
1205 		syscallarg(int) pad;
1206 		syscallarg(off_t) offset;
1207 		syscallarg(int) whence;
1208 	} */ *uap;
1209 {
1210 	struct ucred *cred = td->td_ucred;
1211 	struct file *fp;
1212 	struct vnode *vp;
1213 	struct vattr vattr;
1214 	off_t offset;
1215 	int error, noneg;
1216 
1217 	if ((error = fget(td, uap->fd, &fp)) != 0)
1218 		return (error);
1219 	if (fp->f_type != DTYPE_VNODE) {
1220 		fdrop(fp, td);
1221 		return (ESPIPE);
1222 	}
1223 	vp = (struct vnode *)fp->f_data;
1224 	noneg = (vp->v_type != VCHR);
1225 	offset = SCARG(uap, offset);
1226 	switch (SCARG(uap, whence)) {
1227 	case L_INCR:
1228 		if (noneg &&
1229 		    (fp->f_offset < 0 ||
1230 		     (offset > 0 && fp->f_offset > OFF_MAX - offset)))
1231 			return (EOVERFLOW);
1232 		offset += fp->f_offset;
1233 		break;
1234 	case L_XTND:
1235 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
1236 		error = VOP_GETATTR(vp, &vattr, cred, td);
1237 		VOP_UNLOCK(vp, 0, td);
1238 		if (error)
1239 			return (error);
1240 		if (noneg &&
1241 		    (vattr.va_size > OFF_MAX ||
1242 		     (offset > 0 && vattr.va_size > OFF_MAX - offset)))
1243 			return (EOVERFLOW);
1244 		offset += vattr.va_size;
1245 		break;
1246 	case L_SET:
1247 		break;
1248 	default:
1249 		fdrop(fp, td);
1250 		return (EINVAL);
1251 	}
1252 	if (noneg && offset < 0)
1253 		return (EINVAL);
1254 	fp->f_offset = offset;
1255 	*(off_t *)(td->td_retval) = fp->f_offset;
1256 	fdrop(fp, td);
1257 	return (0);
1258 }
1259 
1260 #if defined(COMPAT_43) || defined(COMPAT_SUNOS)
1261 /*
1262  * Reposition read/write file offset.
1263  */
1264 #ifndef _SYS_SYSPROTO_H_
1265 struct olseek_args {
1266 	int	fd;
1267 	long	offset;
1268 	int	whence;
1269 };
1270 #endif
1271 int
1272 olseek(td, uap)
1273 	struct thread *td;
1274 	register struct olseek_args /* {
1275 		syscallarg(int) fd;
1276 		syscallarg(long) offset;
1277 		syscallarg(int) whence;
1278 	} */ *uap;
1279 {
1280 	struct lseek_args /* {
1281 		syscallarg(int) fd;
1282 		syscallarg(int) pad;
1283 		syscallarg(off_t) offset;
1284 		syscallarg(int) whence;
1285 	} */ nuap;
1286 	int error;
1287 
1288 	SCARG(&nuap, fd) = SCARG(uap, fd);
1289 	SCARG(&nuap, offset) = SCARG(uap, offset);
1290 	SCARG(&nuap, whence) = SCARG(uap, whence);
1291 	error = lseek(td, &nuap);
1292 	return (error);
1293 }
1294 #endif /* COMPAT_43 */
1295 
1296 /*
1297  * Check access permissions using passed credentials.
1298  */
1299 static int
1300 vn_access(vp, user_flags, cred, td)
1301 	struct vnode	*vp;
1302 	int		user_flags;
1303 	struct ucred	*cred;
1304 	struct thread	*td;
1305 {
1306 	int error, flags;
1307 
1308 	/* Flags == 0 means only check for existence. */
1309 	error = 0;
1310 	if (user_flags) {
1311 		flags = 0;
1312 		if (user_flags & R_OK)
1313 			flags |= VREAD;
1314 		if (user_flags & W_OK)
1315 			flags |= VWRITE;
1316 		if (user_flags & X_OK)
1317 			flags |= VEXEC;
1318 #ifdef MAC
1319 		error = mac_check_vnode_access(cred, vp, flags);
1320 		if (error)
1321 			return (error);
1322 #endif
1323 		if ((flags & VWRITE) == 0 || (error = vn_writechk(vp)) == 0)
1324 			error = VOP_ACCESS(vp, flags, cred, td);
1325 	}
1326 	return (error);
1327 }
1328 
1329 /*
1330  * Check access permissions using "real" credentials.
1331  */
1332 #ifndef _SYS_SYSPROTO_H_
1333 struct access_args {
1334 	char	*path;
1335 	int	flags;
1336 };
1337 #endif
1338 int
1339 access(td, uap)
1340 	struct thread *td;
1341 	register struct access_args /* {
1342 		syscallarg(char *) path;
1343 		syscallarg(int) flags;
1344 	} */ *uap;
1345 {
1346 	struct ucred *cred, *tmpcred;
1347 	register struct vnode *vp;
1348 	int error;
1349 	struct nameidata nd;
1350 
1351 	/*
1352 	 * Create and modify a temporary credential instead of one that
1353 	 * is potentially shared.  This could also mess up socket
1354 	 * buffer accounting which can run in an interrupt context.
1355 	 *
1356 	 * XXX - Depending on how "threads" are finally implemented, it
1357 	 * may be better to explicitly pass the credential to namei()
1358 	 * rather than to modify the potentially shared process structure.
1359 	 */
1360 	cred = td->td_ucred;
1361 	tmpcred = crdup(cred);
1362 	tmpcred->cr_uid = cred->cr_ruid;
1363 	tmpcred->cr_groups[0] = cred->cr_rgid;
1364 	td->td_ucred = tmpcred;
1365 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1366 	    SCARG(uap, path), td);
1367 	if ((error = namei(&nd)) != 0)
1368 		goto out1;
1369 	vp = nd.ni_vp;
1370 
1371 	error = vn_access(vp, SCARG(uap, flags), tmpcred, td);
1372 	NDFREE(&nd, NDF_ONLY_PNBUF);
1373 	vput(vp);
1374 out1:
1375 	td->td_ucred = cred;
1376 	crfree(tmpcred);
1377 	return (error);
1378 }
1379 
1380 /*
1381  * Check access permissions using "effective" credentials.
1382  */
1383 #ifndef _SYS_SYSPROTO_H_
1384 struct eaccess_args {
1385 	char	*path;
1386 	int	flags;
1387 };
1388 #endif
1389 int
1390 eaccess(td, uap)
1391 	struct thread *td;
1392 	register struct eaccess_args /* {
1393 		syscallarg(char *) path;
1394 		syscallarg(int) flags;
1395 	} */ *uap;
1396 {
1397 	struct nameidata nd;
1398 	struct vnode *vp;
1399 	int error;
1400 
1401 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1402 	    SCARG(uap, path), td);
1403 	if ((error = namei(&nd)) != 0)
1404 		return (error);
1405 	vp = nd.ni_vp;
1406 
1407 	error = vn_access(vp, SCARG(uap, flags), td->td_ucred, td);
1408 	NDFREE(&nd, NDF_ONLY_PNBUF);
1409 	vput(vp);
1410 	return (error);
1411 }
1412 
1413 #if defined(COMPAT_43) || defined(COMPAT_SUNOS)
1414 /*
1415  * Get file status; this version follows links.
1416  */
1417 #ifndef _SYS_SYSPROTO_H_
1418 struct ostat_args {
1419 	char	*path;
1420 	struct ostat *ub;
1421 };
1422 #endif
1423 /* ARGSUSED */
1424 int
1425 ostat(td, uap)
1426 	struct thread *td;
1427 	register struct ostat_args /* {
1428 		syscallarg(char *) path;
1429 		syscallarg(struct ostat *) ub;
1430 	} */ *uap;
1431 {
1432 	struct stat sb;
1433 	struct ostat osb;
1434 	int error;
1435 	struct nameidata nd;
1436 
1437 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1438 	    SCARG(uap, path), td);
1439 	if ((error = namei(&nd)) != 0)
1440 		return (error);
1441 	NDFREE(&nd, NDF_ONLY_PNBUF);
1442 	error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td);
1443 	vput(nd.ni_vp);
1444 	if (error)
1445 		return (error);
1446 	cvtstat(&sb, &osb);
1447 	error = copyout(&osb, SCARG(uap, ub), sizeof (osb));
1448 	return (error);
1449 }
1450 
1451 /*
1452  * Get file status; this version does not follow links.
1453  */
1454 #ifndef _SYS_SYSPROTO_H_
1455 struct olstat_args {
1456 	char	*path;
1457 	struct ostat *ub;
1458 };
1459 #endif
1460 /* ARGSUSED */
1461 int
1462 olstat(td, uap)
1463 	struct thread *td;
1464 	register struct olstat_args /* {
1465 		syscallarg(char *) path;
1466 		syscallarg(struct ostat *) ub;
1467 	} */ *uap;
1468 {
1469 	struct vnode *vp;
1470 	struct stat sb;
1471 	struct ostat osb;
1472 	int error;
1473 	struct nameidata nd;
1474 
1475 	NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1476 	    SCARG(uap, path), td);
1477 	if ((error = namei(&nd)) != 0)
1478 		return (error);
1479 	vp = nd.ni_vp;
1480 	error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td);
1481 	NDFREE(&nd, NDF_ONLY_PNBUF);
1482 	vput(vp);
1483 	if (error)
1484 		return (error);
1485 	cvtstat(&sb, &osb);
1486 	error = copyout(&osb, SCARG(uap, ub), sizeof (osb));
1487 	return (error);
1488 }
1489 
1490 /*
1491  * Convert from an old to a new stat structure.
1492  */
1493 void
1494 cvtstat(st, ost)
1495 	struct stat *st;
1496 	struct ostat *ost;
1497 {
1498 
1499 	ost->st_dev = st->st_dev;
1500 	ost->st_ino = st->st_ino;
1501 	ost->st_mode = st->st_mode;
1502 	ost->st_nlink = st->st_nlink;
1503 	ost->st_uid = st->st_uid;
1504 	ost->st_gid = st->st_gid;
1505 	ost->st_rdev = st->st_rdev;
1506 	if (st->st_size < (quad_t)1 << 32)
1507 		ost->st_size = st->st_size;
1508 	else
1509 		ost->st_size = -2;
1510 	ost->st_atime = st->st_atime;
1511 	ost->st_mtime = st->st_mtime;
1512 	ost->st_ctime = st->st_ctime;
1513 	ost->st_blksize = st->st_blksize;
1514 	ost->st_blocks = st->st_blocks;
1515 	ost->st_flags = st->st_flags;
1516 	ost->st_gen = st->st_gen;
1517 }
1518 #endif /* COMPAT_43 || COMPAT_SUNOS */
1519 
1520 /*
1521  * Get file status; this version follows links.
1522  */
1523 #ifndef _SYS_SYSPROTO_H_
1524 struct stat_args {
1525 	char	*path;
1526 	struct stat *ub;
1527 };
1528 #endif
1529 /* ARGSUSED */
1530 int
1531 stat(td, uap)
1532 	struct thread *td;
1533 	register struct stat_args /* {
1534 		syscallarg(char *) path;
1535 		syscallarg(struct stat *) ub;
1536 	} */ *uap;
1537 {
1538 	struct stat sb;
1539 	int error;
1540 	struct nameidata nd;
1541 
1542 #ifdef LOOKUP_SHARED
1543 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKSHARED | LOCKLEAF | NOOBJ,
1544 	    UIO_USERSPACE, SCARG(uap, path), td);
1545 #else
1546 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1547 	    SCARG(uap, path), td);
1548 #endif
1549 	if ((error = namei(&nd)) != 0)
1550 		return (error);
1551 	error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td);
1552 	NDFREE(&nd, NDF_ONLY_PNBUF);
1553 	vput(nd.ni_vp);
1554 	if (error)
1555 		return (error);
1556 	error = copyout(&sb, SCARG(uap, ub), sizeof (sb));
1557 	return (error);
1558 }
1559 
1560 /*
1561  * Get file status; this version does not follow links.
1562  */
1563 #ifndef _SYS_SYSPROTO_H_
1564 struct lstat_args {
1565 	char	*path;
1566 	struct stat *ub;
1567 };
1568 #endif
1569 /* ARGSUSED */
1570 int
1571 lstat(td, uap)
1572 	struct thread *td;
1573 	register struct lstat_args /* {
1574 		syscallarg(char *) path;
1575 		syscallarg(struct stat *) ub;
1576 	} */ *uap;
1577 {
1578 	int error;
1579 	struct vnode *vp;
1580 	struct stat sb;
1581 	struct nameidata nd;
1582 
1583 	NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1584 	    SCARG(uap, path), td);
1585 	if ((error = namei(&nd)) != 0)
1586 		return (error);
1587 	vp = nd.ni_vp;
1588 	error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td);
1589 	NDFREE(&nd, NDF_ONLY_PNBUF);
1590 	vput(vp);
1591 	if (error)
1592 		return (error);
1593 	error = copyout(&sb, SCARG(uap, ub), sizeof (sb));
1594 	return (error);
1595 }
1596 
1597 /*
1598  * Implementation of the NetBSD stat() function.
1599  * XXX This should probably be collapsed with the FreeBSD version,
1600  * as the differences are only due to vn_stat() clearing spares at
1601  * the end of the structures.  vn_stat could be split to avoid this,
1602  * and thus collapse the following to close to zero code.
1603  */
1604 void
1605 cvtnstat(sb, nsb)
1606 	struct stat *sb;
1607 	struct nstat *nsb;
1608 {
1609 	bzero(nsb, sizeof *nsb);
1610 	nsb->st_dev = sb->st_dev;
1611 	nsb->st_ino = sb->st_ino;
1612 	nsb->st_mode = sb->st_mode;
1613 	nsb->st_nlink = sb->st_nlink;
1614 	nsb->st_uid = sb->st_uid;
1615 	nsb->st_gid = sb->st_gid;
1616 	nsb->st_rdev = sb->st_rdev;
1617 	nsb->st_atimespec = sb->st_atimespec;
1618 	nsb->st_mtimespec = sb->st_mtimespec;
1619 	nsb->st_ctimespec = sb->st_ctimespec;
1620 	nsb->st_size = sb->st_size;
1621 	nsb->st_blocks = sb->st_blocks;
1622 	nsb->st_blksize = sb->st_blksize;
1623 	nsb->st_flags = sb->st_flags;
1624 	nsb->st_gen = sb->st_gen;
1625 	nsb->st_birthtimespec = sb->st_birthtimespec;
1626 }
1627 
1628 #ifndef _SYS_SYSPROTO_H_
1629 struct nstat_args {
1630 	char	*path;
1631 	struct nstat *ub;
1632 };
1633 #endif
1634 /* ARGSUSED */
1635 int
1636 nstat(td, uap)
1637 	struct thread *td;
1638 	register struct nstat_args /* {
1639 		syscallarg(char *) path;
1640 		syscallarg(struct nstat *) ub;
1641 	} */ *uap;
1642 {
1643 	struct stat sb;
1644 	struct nstat nsb;
1645 	int error;
1646 	struct nameidata nd;
1647 
1648 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1649 	    SCARG(uap, path), td);
1650 	if ((error = namei(&nd)) != 0)
1651 		return (error);
1652 	NDFREE(&nd, NDF_ONLY_PNBUF);
1653 	error = vn_stat(nd.ni_vp, &sb, td->td_ucred, NOCRED, td);
1654 	vput(nd.ni_vp);
1655 	if (error)
1656 		return (error);
1657 	cvtnstat(&sb, &nsb);
1658 	error = copyout(&nsb, SCARG(uap, ub), sizeof (nsb));
1659 	return (error);
1660 }
1661 
1662 /*
1663  * NetBSD lstat.  Get file status; this version does not follow links.
1664  */
1665 #ifndef _SYS_SYSPROTO_H_
1666 struct lstat_args {
1667 	char	*path;
1668 	struct stat *ub;
1669 };
1670 #endif
1671 /* ARGSUSED */
1672 int
1673 nlstat(td, uap)
1674 	struct thread *td;
1675 	register struct nlstat_args /* {
1676 		syscallarg(char *) path;
1677 		syscallarg(struct nstat *) ub;
1678 	} */ *uap;
1679 {
1680 	int error;
1681 	struct vnode *vp;
1682 	struct stat sb;
1683 	struct nstat nsb;
1684 	struct nameidata nd;
1685 
1686 	NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1687 	    SCARG(uap, path), td);
1688 	if ((error = namei(&nd)) != 0)
1689 		return (error);
1690 	vp = nd.ni_vp;
1691 	NDFREE(&nd, NDF_ONLY_PNBUF);
1692 	error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td);
1693 	vput(vp);
1694 	if (error)
1695 		return (error);
1696 	cvtnstat(&sb, &nsb);
1697 	error = copyout(&nsb, SCARG(uap, ub), sizeof (nsb));
1698 	return (error);
1699 }
1700 
1701 /*
1702  * Get configurable pathname variables.
1703  */
1704 #ifndef _SYS_SYSPROTO_H_
1705 struct pathconf_args {
1706 	char	*path;
1707 	int	name;
1708 };
1709 #endif
1710 /* ARGSUSED */
1711 int
1712 pathconf(td, uap)
1713 	struct thread *td;
1714 	register struct pathconf_args /* {
1715 		syscallarg(char *) path;
1716 		syscallarg(int) name;
1717 	} */ *uap;
1718 {
1719 	int error;
1720 	struct nameidata nd;
1721 
1722 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1723 	    SCARG(uap, path), td);
1724 	if ((error = namei(&nd)) != 0)
1725 		return (error);
1726 	NDFREE(&nd, NDF_ONLY_PNBUF);
1727 	error = VOP_PATHCONF(nd.ni_vp, SCARG(uap, name), td->td_retval);
1728 	vput(nd.ni_vp);
1729 	return (error);
1730 }
1731 
1732 /*
1733  * Return target name of a symbolic link.
1734  */
1735 #ifndef _SYS_SYSPROTO_H_
1736 struct readlink_args {
1737 	char	*path;
1738 	char	*buf;
1739 	int	count;
1740 };
1741 #endif
1742 /* ARGSUSED */
1743 int
1744 readlink(td, uap)
1745 	struct thread *td;
1746 	register struct readlink_args /* {
1747 		syscallarg(char *) path;
1748 		syscallarg(char *) buf;
1749 		syscallarg(int) count;
1750 	} */ *uap;
1751 {
1752 	register struct vnode *vp;
1753 	struct iovec aiov;
1754 	struct uio auio;
1755 	int error;
1756 	struct nameidata nd;
1757 
1758 	NDINIT(&nd, LOOKUP, NOFOLLOW | LOCKLEAF | NOOBJ, UIO_USERSPACE,
1759 	    SCARG(uap, path), td);
1760 	if ((error = namei(&nd)) != 0)
1761 		return (error);
1762 	NDFREE(&nd, NDF_ONLY_PNBUF);
1763 	vp = nd.ni_vp;
1764 #ifdef MAC
1765 	error = mac_check_vnode_readlink(td->td_ucred, vp);
1766 	if (error) {
1767 		vput(vp);
1768 		return (error);
1769 	}
1770 #endif
1771 	if (vp->v_type != VLNK)
1772 		error = EINVAL;
1773 	else {
1774 		aiov.iov_base = SCARG(uap, buf);
1775 		aiov.iov_len = SCARG(uap, count);
1776 		auio.uio_iov = &aiov;
1777 		auio.uio_iovcnt = 1;
1778 		auio.uio_offset = 0;
1779 		auio.uio_rw = UIO_READ;
1780 		auio.uio_segflg = UIO_USERSPACE;
1781 		auio.uio_td = td;
1782 		auio.uio_resid = SCARG(uap, count);
1783 		error = VOP_READLINK(vp, &auio, td->td_ucred);
1784 	}
1785 	vput(vp);
1786 	td->td_retval[0] = SCARG(uap, count) - auio.uio_resid;
1787 	return (error);
1788 }
1789 
1790 /*
1791  * Common implementation code for chflags() and fchflags().
1792  */
1793 static int
1794 setfflags(td, vp, flags)
1795 	struct thread *td;
1796 	struct vnode *vp;
1797 	int flags;
1798 {
1799 	int error;
1800 	struct mount *mp;
1801 	struct vattr vattr;
1802 
1803 	/*
1804 	 * Prevent non-root users from setting flags on devices.  When
1805 	 * a device is reused, users can retain ownership of the device
1806 	 * if they are allowed to set flags and programs assume that
1807 	 * chown can't fail when done as root.
1808 	 */
1809 	if (vp->v_type == VCHR || vp->v_type == VBLK) {
1810 		error = suser_cred(td->td_ucred, PRISON_ROOT);
1811 		if (error)
1812 			return (error);
1813 	}
1814 
1815 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
1816 		return (error);
1817 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
1818 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
1819 #ifdef MAC
1820 	error = mac_check_vnode_setflags(td->td_ucred, vp, vattr.va_flags);
1821 	if (error == 0) {
1822 #endif
1823 		VATTR_NULL(&vattr);
1824 		vattr.va_flags = flags;
1825 		error = VOP_SETATTR(vp, &vattr, td->td_ucred, td);
1826 #ifdef MAC
1827 	}
1828 #endif
1829 	VOP_UNLOCK(vp, 0, td);
1830 	vn_finished_write(mp);
1831 	return (error);
1832 }
1833 
1834 /*
1835  * Change flags of a file given a path name.
1836  */
1837 #ifndef _SYS_SYSPROTO_H_
1838 struct chflags_args {
1839 	char	*path;
1840 	int	flags;
1841 };
1842 #endif
1843 /* ARGSUSED */
1844 int
1845 chflags(td, uap)
1846 	struct thread *td;
1847 	register struct chflags_args /* {
1848 		syscallarg(char *) path;
1849 		syscallarg(int) flags;
1850 	} */ *uap;
1851 {
1852 	int error;
1853 	struct nameidata nd;
1854 
1855 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
1856 	if ((error = namei(&nd)) != 0)
1857 		return (error);
1858 	NDFREE(&nd, NDF_ONLY_PNBUF);
1859 	error = setfflags(td, nd.ni_vp, SCARG(uap, flags));
1860 	vrele(nd.ni_vp);
1861 	return error;
1862 }
1863 
1864 /*
1865  * Same as chflags() but doesn't follow symlinks.
1866  */
1867 int
1868 lchflags(td, uap)
1869 	struct thread *td;
1870 	register struct lchflags_args /* {
1871 		syscallarg(char *) path;
1872 		syscallarg(int) flags;
1873 	} */ *uap;
1874 {
1875 	int error;
1876 	struct nameidata nd;
1877 
1878 	NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
1879 	if ((error = namei(&nd)) != 0)
1880 		return (error);
1881 	NDFREE(&nd, NDF_ONLY_PNBUF);
1882 	error = setfflags(td, nd.ni_vp, SCARG(uap, flags));
1883 	vrele(nd.ni_vp);
1884 	return error;
1885 }
1886 
1887 /*
1888  * Change flags of a file given a file descriptor.
1889  */
1890 #ifndef _SYS_SYSPROTO_H_
1891 struct fchflags_args {
1892 	int	fd;
1893 	int	flags;
1894 };
1895 #endif
1896 /* ARGSUSED */
1897 int
1898 fchflags(td, uap)
1899 	struct thread *td;
1900 	register struct fchflags_args /* {
1901 		syscallarg(int) fd;
1902 		syscallarg(int) flags;
1903 	} */ *uap;
1904 {
1905 	struct file *fp;
1906 	int error;
1907 
1908 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
1909 		return (error);
1910 	error = setfflags(td, (struct vnode *) fp->f_data, SCARG(uap, flags));
1911 	fdrop(fp, td);
1912 	return (error);
1913 }
1914 
1915 /*
1916  * Common implementation code for chmod(), lchmod() and fchmod().
1917  */
1918 static int
1919 setfmode(td, vp, mode)
1920 	struct thread *td;
1921 	struct vnode *vp;
1922 	int mode;
1923 {
1924 	int error;
1925 	struct mount *mp;
1926 	struct vattr vattr;
1927 
1928 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
1929 		return (error);
1930 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
1931 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
1932 	VATTR_NULL(&vattr);
1933 	vattr.va_mode = mode & ALLPERMS;
1934 #ifdef MAC
1935 	error = mac_check_vnode_setmode(td->td_ucred, vp, vattr.va_mode);
1936 	if (error == 0)
1937 #endif
1938 		error = VOP_SETATTR(vp, &vattr, td->td_ucred, td);
1939 	VOP_UNLOCK(vp, 0, td);
1940 	vn_finished_write(mp);
1941 	return error;
1942 }
1943 
1944 /*
1945  * Change mode of a file given path name.
1946  */
1947 #ifndef _SYS_SYSPROTO_H_
1948 struct chmod_args {
1949 	char	*path;
1950 	int	mode;
1951 };
1952 #endif
1953 /* ARGSUSED */
1954 int
1955 chmod(td, uap)
1956 	struct thread *td;
1957 	register struct chmod_args /* {
1958 		syscallarg(char *) path;
1959 		syscallarg(int) mode;
1960 	} */ *uap;
1961 {
1962 	int error;
1963 	struct nameidata nd;
1964 
1965 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
1966 	if ((error = namei(&nd)) != 0)
1967 		return (error);
1968 	NDFREE(&nd, NDF_ONLY_PNBUF);
1969 	error = setfmode(td, nd.ni_vp, SCARG(uap, mode));
1970 	vrele(nd.ni_vp);
1971 	return error;
1972 }
1973 
1974 /*
1975  * Change mode of a file given path name (don't follow links.)
1976  */
1977 #ifndef _SYS_SYSPROTO_H_
1978 struct lchmod_args {
1979 	char	*path;
1980 	int	mode;
1981 };
1982 #endif
1983 /* ARGSUSED */
1984 int
1985 lchmod(td, uap)
1986 	struct thread *td;
1987 	register struct lchmod_args /* {
1988 		syscallarg(char *) path;
1989 		syscallarg(int) mode;
1990 	} */ *uap;
1991 {
1992 	int error;
1993 	struct nameidata nd;
1994 
1995 	NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
1996 	if ((error = namei(&nd)) != 0)
1997 		return (error);
1998 	NDFREE(&nd, NDF_ONLY_PNBUF);
1999 	error = setfmode(td, nd.ni_vp, SCARG(uap, mode));
2000 	vrele(nd.ni_vp);
2001 	return error;
2002 }
2003 
2004 /*
2005  * Change mode of a file given a file descriptor.
2006  */
2007 #ifndef _SYS_SYSPROTO_H_
2008 struct fchmod_args {
2009 	int	fd;
2010 	int	mode;
2011 };
2012 #endif
2013 /* ARGSUSED */
2014 int
2015 fchmod(td, uap)
2016 	struct thread *td;
2017 	register struct fchmod_args /* {
2018 		syscallarg(int) fd;
2019 		syscallarg(int) mode;
2020 	} */ *uap;
2021 {
2022 	struct file *fp;
2023 	struct vnode *vp;
2024 	int error;
2025 
2026 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
2027 		return (error);
2028 	vp = (struct vnode *)fp->f_data;
2029 	error = setfmode(td, (struct vnode *)fp->f_data, SCARG(uap, mode));
2030 	fdrop(fp, td);
2031 	return (error);
2032 }
2033 
2034 /*
2035  * Common implementation for chown(), lchown(), and fchown()
2036  */
2037 static int
2038 setfown(td, vp, uid, gid)
2039 	struct thread *td;
2040 	struct vnode *vp;
2041 	uid_t uid;
2042 	gid_t gid;
2043 {
2044 	int error;
2045 	struct mount *mp;
2046 	struct vattr vattr;
2047 
2048 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
2049 		return (error);
2050 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
2051 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
2052 	VATTR_NULL(&vattr);
2053 	vattr.va_uid = uid;
2054 	vattr.va_gid = gid;
2055 #ifdef MAC
2056 	error = mac_check_vnode_setowner(td->td_ucred, vp, vattr.va_uid,
2057 	    vattr.va_gid);
2058 	if (error == 0)
2059 #endif
2060 		error = VOP_SETATTR(vp, &vattr, td->td_ucred, td);
2061 	VOP_UNLOCK(vp, 0, td);
2062 	vn_finished_write(mp);
2063 	return error;
2064 }
2065 
2066 /*
2067  * Set ownership given a path name.
2068  */
2069 #ifndef _SYS_SYSPROTO_H_
2070 struct chown_args {
2071 	char	*path;
2072 	int	uid;
2073 	int	gid;
2074 };
2075 #endif
2076 /* ARGSUSED */
2077 int
2078 chown(td, uap)
2079 	struct thread *td;
2080 	register struct chown_args /* {
2081 		syscallarg(char *) path;
2082 		syscallarg(int) uid;
2083 		syscallarg(int) gid;
2084 	} */ *uap;
2085 {
2086 	int error;
2087 	struct nameidata nd;
2088 
2089 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
2090 	if ((error = namei(&nd)) != 0)
2091 		return (error);
2092 	NDFREE(&nd, NDF_ONLY_PNBUF);
2093 	error = setfown(td, nd.ni_vp, SCARG(uap, uid), SCARG(uap, gid));
2094 	vrele(nd.ni_vp);
2095 	return (error);
2096 }
2097 
2098 /*
2099  * Set ownership given a path name, do not cross symlinks.
2100  */
2101 #ifndef _SYS_SYSPROTO_H_
2102 struct lchown_args {
2103 	char	*path;
2104 	int	uid;
2105 	int	gid;
2106 };
2107 #endif
2108 /* ARGSUSED */
2109 int
2110 lchown(td, uap)
2111 	struct thread *td;
2112 	register struct lchown_args /* {
2113 		syscallarg(char *) path;
2114 		syscallarg(int) uid;
2115 		syscallarg(int) gid;
2116 	} */ *uap;
2117 {
2118 	int error;
2119 	struct nameidata nd;
2120 
2121 	NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
2122 	if ((error = namei(&nd)) != 0)
2123 		return (error);
2124 	NDFREE(&nd, NDF_ONLY_PNBUF);
2125 	error = setfown(td, nd.ni_vp, SCARG(uap, uid), SCARG(uap, gid));
2126 	vrele(nd.ni_vp);
2127 	return (error);
2128 }
2129 
2130 /*
2131  * Set ownership given a file descriptor.
2132  */
2133 #ifndef _SYS_SYSPROTO_H_
2134 struct fchown_args {
2135 	int	fd;
2136 	int	uid;
2137 	int	gid;
2138 };
2139 #endif
2140 /* ARGSUSED */
2141 int
2142 fchown(td, uap)
2143 	struct thread *td;
2144 	register struct fchown_args /* {
2145 		syscallarg(int) fd;
2146 		syscallarg(int) uid;
2147 		syscallarg(int) gid;
2148 	} */ *uap;
2149 {
2150 	struct file *fp;
2151 	struct vnode *vp;
2152 	int error;
2153 
2154 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
2155 		return (error);
2156 	vp = (struct vnode *)fp->f_data;
2157 	error = setfown(td, (struct vnode *)fp->f_data,
2158 		SCARG(uap, uid), SCARG(uap, gid));
2159 	fdrop(fp, td);
2160 	return (error);
2161 }
2162 
2163 /*
2164  * Common implementation code for utimes(), lutimes(), and futimes().
2165  */
2166 static int
2167 getutimes(usrtvp, tsp)
2168 	const struct timeval *usrtvp;
2169 	struct timespec *tsp;
2170 {
2171 	struct timeval tv[2];
2172 	int error;
2173 
2174 	if (usrtvp == NULL) {
2175 		microtime(&tv[0]);
2176 		TIMEVAL_TO_TIMESPEC(&tv[0], &tsp[0]);
2177 		tsp[1] = tsp[0];
2178 	} else {
2179 		if ((error = copyin(usrtvp, tv, sizeof (tv))) != 0)
2180 			return (error);
2181 		TIMEVAL_TO_TIMESPEC(&tv[0], &tsp[0]);
2182 		TIMEVAL_TO_TIMESPEC(&tv[1], &tsp[1]);
2183 	}
2184 	return 0;
2185 }
2186 
2187 /*
2188  * Common implementation code for utimes(), lutimes(), and futimes().
2189  */
2190 static int
2191 setutimes(td, vp, ts, numtimes, nullflag)
2192 	struct thread *td;
2193 	struct vnode *vp;
2194 	const struct timespec *ts;
2195 	int numtimes;
2196 	int nullflag;
2197 {
2198 	int error, setbirthtime;
2199 	struct mount *mp;
2200 	struct vattr vattr;
2201 
2202 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
2203 		return (error);
2204 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
2205 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
2206 	setbirthtime = 0;
2207 	if (numtimes < 3 && VOP_GETATTR(vp, &vattr, td->td_ucred, td) == 0 &&
2208 	    timespeccmp(&ts[1], &vattr.va_birthtime, < ))
2209 		setbirthtime = 1;
2210 	VATTR_NULL(&vattr);
2211 	vattr.va_atime = ts[0];
2212 	vattr.va_mtime = ts[1];
2213 	if (setbirthtime)
2214 		vattr.va_birthtime = ts[1];
2215 	if (numtimes > 2)
2216 		vattr.va_birthtime = ts[2];
2217 	if (nullflag)
2218 		vattr.va_vaflags |= VA_UTIMES_NULL;
2219 #ifdef MAC
2220 	error = mac_check_vnode_setutimes(td->td_ucred, vp, vattr.va_atime,
2221 	    vattr.va_mtime);
2222 	if (error == 0)
2223 #endif
2224 		error = VOP_SETATTR(vp, &vattr, td->td_ucred, td);
2225 	VOP_UNLOCK(vp, 0, td);
2226 	vn_finished_write(mp);
2227 	return error;
2228 }
2229 
2230 /*
2231  * Set the access and modification times of a file.
2232  */
2233 #ifndef _SYS_SYSPROTO_H_
2234 struct utimes_args {
2235 	char	*path;
2236 	struct	timeval *tptr;
2237 };
2238 #endif
2239 /* ARGSUSED */
2240 int
2241 utimes(td, uap)
2242 	struct thread *td;
2243 	register struct utimes_args /* {
2244 		syscallarg(char *) path;
2245 		syscallarg(struct timeval *) tptr;
2246 	} */ *uap;
2247 {
2248 	struct timespec ts[2];
2249 	struct timeval *usrtvp;
2250 	int error;
2251 	struct nameidata nd;
2252 
2253 	usrtvp = SCARG(uap, tptr);
2254 	if ((error = getutimes(usrtvp, ts)) != 0)
2255 		return (error);
2256 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
2257 	if ((error = namei(&nd)) != 0)
2258 		return (error);
2259 	NDFREE(&nd, NDF_ONLY_PNBUF);
2260 	error = setutimes(td, nd.ni_vp, ts, 2, usrtvp == NULL);
2261 	vrele(nd.ni_vp);
2262 	return (error);
2263 }
2264 
2265 /*
2266  * Set the access and modification times of a file.
2267  */
2268 #ifndef _SYS_SYSPROTO_H_
2269 struct lutimes_args {
2270 	char	*path;
2271 	struct	timeval *tptr;
2272 };
2273 #endif
2274 /* ARGSUSED */
2275 int
2276 lutimes(td, uap)
2277 	struct thread *td;
2278 	register struct lutimes_args /* {
2279 		syscallarg(char *) path;
2280 		syscallarg(struct timeval *) tptr;
2281 	} */ *uap;
2282 {
2283 	struct timespec ts[2];
2284 	struct timeval *usrtvp;
2285 	int error;
2286 	struct nameidata nd;
2287 
2288 	usrtvp = SCARG(uap, tptr);
2289 	if ((error = getutimes(usrtvp, ts)) != 0)
2290 		return (error);
2291 	NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
2292 	if ((error = namei(&nd)) != 0)
2293 		return (error);
2294 	NDFREE(&nd, NDF_ONLY_PNBUF);
2295 	error = setutimes(td, nd.ni_vp, ts, 2, usrtvp == NULL);
2296 	vrele(nd.ni_vp);
2297 	return (error);
2298 }
2299 
2300 /*
2301  * Set the access and modification times of a file.
2302  */
2303 #ifndef _SYS_SYSPROTO_H_
2304 struct futimes_args {
2305 	int	fd;
2306 	struct	timeval *tptr;
2307 };
2308 #endif
2309 /* ARGSUSED */
2310 int
2311 futimes(td, uap)
2312 	struct thread *td;
2313 	register struct futimes_args /* {
2314 		syscallarg(int ) fd;
2315 		syscallarg(struct timeval *) tptr;
2316 	} */ *uap;
2317 {
2318 	struct timespec ts[2];
2319 	struct file *fp;
2320 	struct timeval *usrtvp;
2321 	int error;
2322 
2323 	usrtvp = SCARG(uap, tptr);
2324 	if ((error = getutimes(usrtvp, ts)) != 0)
2325 		return (error);
2326 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
2327 		return (error);
2328 	error = setutimes(td, (struct vnode *)fp->f_data, ts, 2, usrtvp==NULL);
2329 	fdrop(fp, td);
2330 	return (error);
2331 }
2332 
2333 /*
2334  * Truncate a file given its path name.
2335  */
2336 #ifndef _SYS_SYSPROTO_H_
2337 struct truncate_args {
2338 	char	*path;
2339 	int	pad;
2340 	off_t	length;
2341 };
2342 #endif
2343 /* ARGSUSED */
2344 int
2345 truncate(td, uap)
2346 	struct thread *td;
2347 	register struct truncate_args /* {
2348 		syscallarg(char *) path;
2349 		syscallarg(int) pad;
2350 		syscallarg(off_t) length;
2351 	} */ *uap;
2352 {
2353 	struct mount *mp;
2354 	struct vnode *vp;
2355 	struct vattr vattr;
2356 	int error;
2357 	struct nameidata nd;
2358 
2359 	if (uap->length < 0)
2360 		return(EINVAL);
2361 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, SCARG(uap, path), td);
2362 	if ((error = namei(&nd)) != 0)
2363 		return (error);
2364 	vp = nd.ni_vp;
2365 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) {
2366 		vrele(vp);
2367 		return (error);
2368 	}
2369 	NDFREE(&nd, NDF_ONLY_PNBUF);
2370 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
2371 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
2372 	if (vp->v_type == VDIR)
2373 		error = EISDIR;
2374 #ifdef MAC
2375 	else if ((error = mac_check_vnode_write(td->td_ucred, NOCRED, vp))) {
2376 	}
2377 #endif
2378 	else if ((error = vn_writechk(vp)) == 0 &&
2379 	    (error = VOP_ACCESS(vp, VWRITE, td->td_ucred, td)) == 0) {
2380 		VATTR_NULL(&vattr);
2381 		vattr.va_size = SCARG(uap, length);
2382 		error = VOP_SETATTR(vp, &vattr, td->td_ucred, td);
2383 	}
2384 	vput(vp);
2385 	vn_finished_write(mp);
2386 	return (error);
2387 }
2388 
2389 /*
2390  * Truncate a file given a file descriptor.
2391  */
2392 #ifndef _SYS_SYSPROTO_H_
2393 struct ftruncate_args {
2394 	int	fd;
2395 	int	pad;
2396 	off_t	length;
2397 };
2398 #endif
2399 /* ARGSUSED */
2400 int
2401 ftruncate(td, uap)
2402 	struct thread *td;
2403 	register struct ftruncate_args /* {
2404 		syscallarg(int) fd;
2405 		syscallarg(int) pad;
2406 		syscallarg(off_t) length;
2407 	} */ *uap;
2408 {
2409 	struct mount *mp;
2410 	struct vattr vattr;
2411 	struct vnode *vp;
2412 	struct file *fp;
2413 	int error;
2414 
2415 	if (uap->length < 0)
2416 		return(EINVAL);
2417 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
2418 		return (error);
2419 	if ((fp->f_flag & FWRITE) == 0) {
2420 		fdrop(fp, td);
2421 		return (EINVAL);
2422 	}
2423 	vp = (struct vnode *)fp->f_data;
2424 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) {
2425 		fdrop(fp, td);
2426 		return (error);
2427 	}
2428 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
2429 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
2430 	if (vp->v_type == VDIR)
2431 		error = EISDIR;
2432 #ifdef MAC
2433 	else if ((error = mac_check_vnode_write(td->td_ucred, fp->f_cred,
2434 	    vp))) {
2435 	}
2436 #endif
2437 	else if ((error = vn_writechk(vp)) == 0) {
2438 		VATTR_NULL(&vattr);
2439 		vattr.va_size = SCARG(uap, length);
2440 		error = VOP_SETATTR(vp, &vattr, fp->f_cred, td);
2441 	}
2442 	VOP_UNLOCK(vp, 0, td);
2443 	vn_finished_write(mp);
2444 	fdrop(fp, td);
2445 	return (error);
2446 }
2447 
2448 #if defined(COMPAT_43) || defined(COMPAT_SUNOS)
2449 /*
2450  * Truncate a file given its path name.
2451  */
2452 #ifndef _SYS_SYSPROTO_H_
2453 struct otruncate_args {
2454 	char	*path;
2455 	long	length;
2456 };
2457 #endif
2458 /* ARGSUSED */
2459 int
2460 otruncate(td, uap)
2461 	struct thread *td;
2462 	register struct otruncate_args /* {
2463 		syscallarg(char *) path;
2464 		syscallarg(long) length;
2465 	} */ *uap;
2466 {
2467 	struct truncate_args /* {
2468 		syscallarg(char *) path;
2469 		syscallarg(int) pad;
2470 		syscallarg(off_t) length;
2471 	} */ nuap;
2472 
2473 	SCARG(&nuap, path) = SCARG(uap, path);
2474 	SCARG(&nuap, length) = SCARG(uap, length);
2475 	return (truncate(td, &nuap));
2476 }
2477 
2478 /*
2479  * Truncate a file given a file descriptor.
2480  */
2481 #ifndef _SYS_SYSPROTO_H_
2482 struct oftruncate_args {
2483 	int	fd;
2484 	long	length;
2485 };
2486 #endif
2487 /* ARGSUSED */
2488 int
2489 oftruncate(td, uap)
2490 	struct thread *td;
2491 	register struct oftruncate_args /* {
2492 		syscallarg(int) fd;
2493 		syscallarg(long) length;
2494 	} */ *uap;
2495 {
2496 	struct ftruncate_args /* {
2497 		syscallarg(int) fd;
2498 		syscallarg(int) pad;
2499 		syscallarg(off_t) length;
2500 	} */ nuap;
2501 
2502 	SCARG(&nuap, fd) = SCARG(uap, fd);
2503 	SCARG(&nuap, length) = SCARG(uap, length);
2504 	return (ftruncate(td, &nuap));
2505 }
2506 #endif /* COMPAT_43 || COMPAT_SUNOS */
2507 
2508 /*
2509  * Sync an open file.
2510  */
2511 #ifndef _SYS_SYSPROTO_H_
2512 struct fsync_args {
2513 	int	fd;
2514 };
2515 #endif
2516 /* ARGSUSED */
2517 int
2518 fsync(td, uap)
2519 	struct thread *td;
2520 	struct fsync_args /* {
2521 		syscallarg(int) fd;
2522 	} */ *uap;
2523 {
2524 	struct vnode *vp;
2525 	struct mount *mp;
2526 	struct file *fp;
2527 	vm_object_t obj;
2528 	int error;
2529 
2530 	GIANT_REQUIRED;
2531 
2532 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
2533 		return (error);
2534 	vp = (struct vnode *)fp->f_data;
2535 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0) {
2536 		fdrop(fp, td);
2537 		return (error);
2538 	}
2539 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
2540 	if (VOP_GETVOBJECT(vp, &obj) == 0) {
2541 		vm_object_page_clean(obj, 0, 0, 0);
2542 	}
2543 	error = VOP_FSYNC(vp, fp->f_cred, MNT_WAIT, td);
2544 	if (error == 0 && vp->v_mount && (vp->v_mount->mnt_flag & MNT_SOFTDEP)
2545 	    && softdep_fsync_hook != NULL)
2546 		error = (*softdep_fsync_hook)(vp);
2547 
2548 	VOP_UNLOCK(vp, 0, td);
2549 	vn_finished_write(mp);
2550 	fdrop(fp, td);
2551 	return (error);
2552 }
2553 
2554 /*
2555  * Rename files.  Source and destination must either both be directories,
2556  * or both not be directories.  If target is a directory, it must be empty.
2557  */
2558 #ifndef _SYS_SYSPROTO_H_
2559 struct rename_args {
2560 	char	*from;
2561 	char	*to;
2562 };
2563 #endif
2564 /* ARGSUSED */
2565 int
2566 rename(td, uap)
2567 	struct thread *td;
2568 	register struct rename_args /* {
2569 		syscallarg(char *) from;
2570 		syscallarg(char *) to;
2571 	} */ *uap;
2572 {
2573 	struct mount *mp;
2574 	struct vnode *tvp, *fvp, *tdvp;
2575 	struct nameidata fromnd, tond;
2576 	int error;
2577 
2578 	bwillwrite();
2579 	NDINIT(&fromnd, DELETE, WANTPARENT | SAVESTART, UIO_USERSPACE,
2580 	    SCARG(uap, from), td);
2581 	if ((error = namei(&fromnd)) != 0)
2582 		return (error);
2583 	fvp = fromnd.ni_vp;
2584 	if ((error = vn_start_write(fvp, &mp, V_WAIT | PCATCH)) != 0) {
2585 		NDFREE(&fromnd, NDF_ONLY_PNBUF);
2586 		vrele(fromnd.ni_dvp);
2587 		vrele(fvp);
2588 		goto out1;
2589 	}
2590 	NDINIT(&tond, RENAME, LOCKPARENT | LOCKLEAF | NOCACHE | SAVESTART | NOOBJ,
2591 	    UIO_USERSPACE, SCARG(uap, to), td);
2592 	if (fromnd.ni_vp->v_type == VDIR)
2593 		tond.ni_cnd.cn_flags |= WILLBEDIR;
2594 	if ((error = namei(&tond)) != 0) {
2595 		/* Translate error code for rename("dir1", "dir2/."). */
2596 		if (error == EISDIR && fvp->v_type == VDIR)
2597 			error = EINVAL;
2598 		NDFREE(&fromnd, NDF_ONLY_PNBUF);
2599 		vrele(fromnd.ni_dvp);
2600 		vrele(fvp);
2601 		goto out1;
2602 	}
2603 	tdvp = tond.ni_dvp;
2604 	tvp = tond.ni_vp;
2605 	if (tvp != NULL) {
2606 		if (fvp->v_type == VDIR && tvp->v_type != VDIR) {
2607 			error = ENOTDIR;
2608 			goto out;
2609 		} else if (fvp->v_type != VDIR && tvp->v_type == VDIR) {
2610 			error = EISDIR;
2611 			goto out;
2612 		}
2613 	}
2614 	if (fvp == tdvp)
2615 		error = EINVAL;
2616 	/*
2617 	 * If source is the same as the destination (that is the
2618 	 * same inode number with the same name in the same directory),
2619 	 * then there is nothing to do.
2620 	 */
2621 	if (fvp == tvp && fromnd.ni_dvp == tdvp &&
2622 	    fromnd.ni_cnd.cn_namelen == tond.ni_cnd.cn_namelen &&
2623 	    !bcmp(fromnd.ni_cnd.cn_nameptr, tond.ni_cnd.cn_nameptr,
2624 	      fromnd.ni_cnd.cn_namelen))
2625 		error = -1;
2626 out:
2627 	if (!error) {
2628 		VOP_LEASE(tdvp, td, td->td_ucred, LEASE_WRITE);
2629 		if (fromnd.ni_dvp != tdvp) {
2630 			VOP_LEASE(fromnd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
2631 		}
2632 		if (tvp) {
2633 			VOP_LEASE(tvp, td, td->td_ucred, LEASE_WRITE);
2634 		}
2635 		error = VOP_RENAME(fromnd.ni_dvp, fromnd.ni_vp, &fromnd.ni_cnd,
2636 				   tond.ni_dvp, tond.ni_vp, &tond.ni_cnd);
2637 		NDFREE(&fromnd, NDF_ONLY_PNBUF);
2638 		NDFREE(&tond, NDF_ONLY_PNBUF);
2639 	} else {
2640 		NDFREE(&fromnd, NDF_ONLY_PNBUF);
2641 		NDFREE(&tond, NDF_ONLY_PNBUF);
2642 		if (tdvp == tvp)
2643 			vrele(tdvp);
2644 		else
2645 			vput(tdvp);
2646 		if (tvp)
2647 			vput(tvp);
2648 		vrele(fromnd.ni_dvp);
2649 		vrele(fvp);
2650 	}
2651 	vrele(tond.ni_startdir);
2652 	vn_finished_write(mp);
2653 	ASSERT_VOP_UNLOCKED(fromnd.ni_dvp, "rename");
2654 	ASSERT_VOP_UNLOCKED(fromnd.ni_vp, "rename");
2655 	ASSERT_VOP_UNLOCKED(tond.ni_dvp, "rename");
2656 	ASSERT_VOP_UNLOCKED(tond.ni_vp, "rename");
2657 out1:
2658 	if (fromnd.ni_startdir)
2659 		vrele(fromnd.ni_startdir);
2660 	if (error == -1)
2661 		return (0);
2662 	return (error);
2663 }
2664 
2665 /*
2666  * Make a directory file.
2667  */
2668 #ifndef _SYS_SYSPROTO_H_
2669 struct mkdir_args {
2670 	char	*path;
2671 	int	mode;
2672 };
2673 #endif
2674 /* ARGSUSED */
2675 int
2676 mkdir(td, uap)
2677 	struct thread *td;
2678 	register struct mkdir_args /* {
2679 		syscallarg(char *) path;
2680 		syscallarg(int) mode;
2681 	} */ *uap;
2682 {
2683 
2684 	return vn_mkdir(uap->path, uap->mode, UIO_USERSPACE, td);
2685 }
2686 
2687 int
2688 vn_mkdir(path, mode, segflg, td)
2689 	char *path;
2690 	int mode;
2691 	enum uio_seg segflg;
2692 	struct thread *td;
2693 {
2694 	struct mount *mp;
2695 	struct vnode *vp;
2696 	struct vattr vattr;
2697 	int error;
2698 	struct nameidata nd;
2699 
2700 restart:
2701 	bwillwrite();
2702 	NDINIT(&nd, CREATE, LOCKPARENT | SAVENAME, segflg, path, td);
2703 	nd.ni_cnd.cn_flags |= WILLBEDIR;
2704 	if ((error = namei(&nd)) != 0)
2705 		return (error);
2706 	vp = nd.ni_vp;
2707 	if (vp != NULL) {
2708 		NDFREE(&nd, NDF_ONLY_PNBUF);
2709 		vrele(vp);
2710 		/*
2711 		 * XXX namei called with LOCKPARENT but not LOCKLEAF has
2712 		 * the strange behaviour of leaving the vnode unlocked
2713 		 * if the target is the same vnode as the parent.
2714 		 */
2715 		if (vp == nd.ni_dvp)
2716 			vrele(nd.ni_dvp);
2717 		else
2718 			vput(nd.ni_dvp);
2719 		return (EEXIST);
2720 	}
2721 	if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) {
2722 		NDFREE(&nd, NDF_ONLY_PNBUF);
2723 		vput(nd.ni_dvp);
2724 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
2725 			return (error);
2726 		goto restart;
2727 	}
2728 	VATTR_NULL(&vattr);
2729 	vattr.va_type = VDIR;
2730 	FILEDESC_LOCK(td->td_proc->p_fd);
2731 	vattr.va_mode = (mode & ACCESSPERMS) &~ td->td_proc->p_fd->fd_cmask;
2732 	FILEDESC_UNLOCK(td->td_proc->p_fd);
2733 	VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
2734 	error = VOP_MKDIR(nd.ni_dvp, &nd.ni_vp, &nd.ni_cnd, &vattr);
2735 	NDFREE(&nd, NDF_ONLY_PNBUF);
2736 	vput(nd.ni_dvp);
2737 	if (!error)
2738 		vput(nd.ni_vp);
2739 	vn_finished_write(mp);
2740 	ASSERT_VOP_UNLOCKED(nd.ni_dvp, "mkdir");
2741 	ASSERT_VOP_UNLOCKED(nd.ni_vp, "mkdir");
2742 	return (error);
2743 }
2744 
2745 /*
2746  * Remove a directory file.
2747  */
2748 #ifndef _SYS_SYSPROTO_H_
2749 struct rmdir_args {
2750 	char	*path;
2751 };
2752 #endif
2753 /* ARGSUSED */
2754 int
2755 rmdir(td, uap)
2756 	struct thread *td;
2757 	struct rmdir_args /* {
2758 		syscallarg(char *) path;
2759 	} */ *uap;
2760 {
2761 	struct mount *mp;
2762 	struct vnode *vp;
2763 	int error;
2764 	struct nameidata nd;
2765 
2766 restart:
2767 	bwillwrite();
2768 	NDINIT(&nd, DELETE, LOCKPARENT | LOCKLEAF, UIO_USERSPACE,
2769 	    SCARG(uap, path), td);
2770 	if ((error = namei(&nd)) != 0)
2771 		return (error);
2772 	vp = nd.ni_vp;
2773 	if (vp->v_type != VDIR) {
2774 		error = ENOTDIR;
2775 		goto out;
2776 	}
2777 	/*
2778 	 * No rmdir "." please.
2779 	 */
2780 	if (nd.ni_dvp == vp) {
2781 		error = EINVAL;
2782 		goto out;
2783 	}
2784 	/*
2785 	 * The root of a mounted filesystem cannot be deleted.
2786 	 */
2787 	if (vp->v_vflag & VV_ROOT) {
2788 		error = EBUSY;
2789 		goto out;
2790 	}
2791 	if (vn_start_write(nd.ni_dvp, &mp, V_NOWAIT) != 0) {
2792 		NDFREE(&nd, NDF_ONLY_PNBUF);
2793 		if (nd.ni_dvp == vp)
2794 			vrele(nd.ni_dvp);
2795 		else
2796 			vput(nd.ni_dvp);
2797 		vput(vp);
2798 		if ((error = vn_start_write(NULL, &mp, V_XSLEEP | PCATCH)) != 0)
2799 			return (error);
2800 		goto restart;
2801 	}
2802 	VOP_LEASE(nd.ni_dvp, td, td->td_ucred, LEASE_WRITE);
2803 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
2804 	error = VOP_RMDIR(nd.ni_dvp, nd.ni_vp, &nd.ni_cnd);
2805 	vn_finished_write(mp);
2806 out:
2807 	NDFREE(&nd, NDF_ONLY_PNBUF);
2808 	if (nd.ni_dvp == vp)
2809 		vrele(nd.ni_dvp);
2810 	else
2811 		vput(nd.ni_dvp);
2812 	vput(vp);
2813 	ASSERT_VOP_UNLOCKED(nd.ni_dvp, "rmdir");
2814 	ASSERT_VOP_UNLOCKED(nd.ni_vp, "rmdir");
2815 	return (error);
2816 }
2817 
2818 #ifdef COMPAT_43
2819 /*
2820  * Read a block of directory entries in a filesystem independent format.
2821  */
2822 #ifndef _SYS_SYSPROTO_H_
2823 struct ogetdirentries_args {
2824 	int	fd;
2825 	char	*buf;
2826 	u_int	count;
2827 	long	*basep;
2828 };
2829 #endif
2830 int
2831 ogetdirentries(td, uap)
2832 	struct thread *td;
2833 	register struct ogetdirentries_args /* {
2834 		syscallarg(int) fd;
2835 		syscallarg(char *) buf;
2836 		syscallarg(u_int) count;
2837 		syscallarg(long *) basep;
2838 	} */ *uap;
2839 {
2840 	struct vnode *vp;
2841 	struct file *fp;
2842 	struct uio auio, kuio;
2843 	struct iovec aiov, kiov;
2844 	struct dirent *dp, *edp;
2845 	caddr_t dirbuf;
2846 	int error, eofflag, readcnt;
2847 	long loff;
2848 
2849 	/* XXX arbitrary sanity limit on `count'. */
2850 	if (SCARG(uap, count) > 64 * 1024)
2851 		return (EINVAL);
2852 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
2853 		return (error);
2854 	if ((fp->f_flag & FREAD) == 0) {
2855 		fdrop(fp, td);
2856 		return (EBADF);
2857 	}
2858 	vp = (struct vnode *)fp->f_data;
2859 unionread:
2860 	if (vp->v_type != VDIR) {
2861 		fdrop(fp, td);
2862 		return (EINVAL);
2863 	}
2864 	aiov.iov_base = SCARG(uap, buf);
2865 	aiov.iov_len = SCARG(uap, count);
2866 	auio.uio_iov = &aiov;
2867 	auio.uio_iovcnt = 1;
2868 	auio.uio_rw = UIO_READ;
2869 	auio.uio_segflg = UIO_USERSPACE;
2870 	auio.uio_td = td;
2871 	auio.uio_resid = SCARG(uap, count);
2872 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
2873 	loff = auio.uio_offset = fp->f_offset;
2874 #ifdef MAC
2875 	error = mac_check_vnode_readdir(td->td_ucred, vp);
2876 	if (error) {
2877 		VOP_UNLOCK(vp, 0, td);
2878 		fdrop(fp, td);
2879 		return (error);
2880 	}
2881 #endif
2882 #	if (BYTE_ORDER != LITTLE_ENDIAN)
2883 		if (vp->v_mount->mnt_maxsymlinklen <= 0) {
2884 			error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag,
2885 			    NULL, NULL);
2886 			fp->f_offset = auio.uio_offset;
2887 		} else
2888 #	endif
2889 	{
2890 		kuio = auio;
2891 		kuio.uio_iov = &kiov;
2892 		kuio.uio_segflg = UIO_SYSSPACE;
2893 		kiov.iov_len = SCARG(uap, count);
2894 		MALLOC(dirbuf, caddr_t, SCARG(uap, count), M_TEMP, M_WAITOK);
2895 		kiov.iov_base = dirbuf;
2896 		error = VOP_READDIR(vp, &kuio, fp->f_cred, &eofflag,
2897 			    NULL, NULL);
2898 		fp->f_offset = kuio.uio_offset;
2899 		if (error == 0) {
2900 			readcnt = SCARG(uap, count) - kuio.uio_resid;
2901 			edp = (struct dirent *)&dirbuf[readcnt];
2902 			for (dp = (struct dirent *)dirbuf; dp < edp; ) {
2903 #				if (BYTE_ORDER == LITTLE_ENDIAN)
2904 					/*
2905 					 * The expected low byte of
2906 					 * dp->d_namlen is our dp->d_type.
2907 					 * The high MBZ byte of dp->d_namlen
2908 					 * is our dp->d_namlen.
2909 					 */
2910 					dp->d_type = dp->d_namlen;
2911 					dp->d_namlen = 0;
2912 #				else
2913 					/*
2914 					 * The dp->d_type is the high byte
2915 					 * of the expected dp->d_namlen,
2916 					 * so must be zero'ed.
2917 					 */
2918 					dp->d_type = 0;
2919 #				endif
2920 				if (dp->d_reclen > 0) {
2921 					dp = (struct dirent *)
2922 					    ((char *)dp + dp->d_reclen);
2923 				} else {
2924 					error = EIO;
2925 					break;
2926 				}
2927 			}
2928 			if (dp >= edp)
2929 				error = uiomove(dirbuf, readcnt, &auio);
2930 		}
2931 		FREE(dirbuf, M_TEMP);
2932 	}
2933 	VOP_UNLOCK(vp, 0, td);
2934 	if (error) {
2935 		fdrop(fp, td);
2936 		return (error);
2937 	}
2938 	if (SCARG(uap, count) == auio.uio_resid) {
2939 		if (union_dircheckp) {
2940 			error = union_dircheckp(td, &vp, fp);
2941 			if (error == -1)
2942 				goto unionread;
2943 			if (error) {
2944 				fdrop(fp, td);
2945 				return (error);
2946 			}
2947 		}
2948 		mp_fixme("Accessing vflags w/o vn lock.");
2949 		if ((vp->v_vflag & VV_ROOT) &&
2950 		    (vp->v_mount->mnt_flag & MNT_UNION)) {
2951 			struct vnode *tvp = vp;
2952 			vp = vp->v_mount->mnt_vnodecovered;
2953 			VREF(vp);
2954 			fp->f_data = vp;
2955 			fp->f_offset = 0;
2956 			vrele(tvp);
2957 			goto unionread;
2958 		}
2959 	}
2960 	error = copyout(&loff, SCARG(uap, basep), sizeof(long));
2961 	fdrop(fp, td);
2962 	td->td_retval[0] = SCARG(uap, count) - auio.uio_resid;
2963 	return (error);
2964 }
2965 #endif /* COMPAT_43 */
2966 
2967 /*
2968  * Read a block of directory entries in a filesystem independent format.
2969  */
2970 #ifndef _SYS_SYSPROTO_H_
2971 struct getdirentries_args {
2972 	int	fd;
2973 	char	*buf;
2974 	u_int	count;
2975 	long	*basep;
2976 };
2977 #endif
2978 int
2979 getdirentries(td, uap)
2980 	struct thread *td;
2981 	register struct getdirentries_args /* {
2982 		syscallarg(int) fd;
2983 		syscallarg(char *) buf;
2984 		syscallarg(u_int) count;
2985 		syscallarg(long *) basep;
2986 	} */ *uap;
2987 {
2988 	struct vnode *vp;
2989 	struct file *fp;
2990 	struct uio auio;
2991 	struct iovec aiov;
2992 	long loff;
2993 	int error, eofflag;
2994 
2995 	if ((error = getvnode(td->td_proc->p_fd, SCARG(uap, fd), &fp)) != 0)
2996 		return (error);
2997 	if ((fp->f_flag & FREAD) == 0) {
2998 		fdrop(fp, td);
2999 		return (EBADF);
3000 	}
3001 	vp = (struct vnode *)fp->f_data;
3002 unionread:
3003 	if (vp->v_type != VDIR) {
3004 		fdrop(fp, td);
3005 		return (EINVAL);
3006 	}
3007 	aiov.iov_base = SCARG(uap, buf);
3008 	aiov.iov_len = SCARG(uap, count);
3009 	auio.uio_iov = &aiov;
3010 	auio.uio_iovcnt = 1;
3011 	auio.uio_rw = UIO_READ;
3012 	auio.uio_segflg = UIO_USERSPACE;
3013 	auio.uio_td = td;
3014 	auio.uio_resid = SCARG(uap, count);
3015 	/* vn_lock(vp, LK_SHARED | LK_RETRY, td); */
3016 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
3017 	loff = auio.uio_offset = fp->f_offset;
3018 #ifdef MAC
3019 	error = mac_check_vnode_readdir(td->td_ucred, vp);
3020 	if (error == 0)
3021 #endif
3022 		error = VOP_READDIR(vp, &auio, fp->f_cred, &eofflag, NULL,
3023 		    NULL);
3024 	fp->f_offset = auio.uio_offset;
3025 	VOP_UNLOCK(vp, 0, td);
3026 	if (error) {
3027 		fdrop(fp, td);
3028 		return (error);
3029 	}
3030 	if (SCARG(uap, count) == auio.uio_resid) {
3031 		if (union_dircheckp) {
3032 			error = union_dircheckp(td, &vp, fp);
3033 			if (error == -1)
3034 				goto unionread;
3035 			if (error) {
3036 				fdrop(fp, td);
3037 				return (error);
3038 			}
3039 		}
3040 		mp_fixme("Accessing vflag without vn lock.");
3041 		if ((vp->v_vflag & VV_ROOT) &&
3042 		    (vp->v_mount->mnt_flag & MNT_UNION)) {
3043 			struct vnode *tvp = vp;
3044 			vp = vp->v_mount->mnt_vnodecovered;
3045 			VREF(vp);
3046 			fp->f_data = vp;
3047 			fp->f_offset = 0;
3048 			vrele(tvp);
3049 			goto unionread;
3050 		}
3051 	}
3052 	if (SCARG(uap, basep) != NULL) {
3053 		error = copyout(&loff, SCARG(uap, basep), sizeof(long));
3054 	}
3055 	td->td_retval[0] = SCARG(uap, count) - auio.uio_resid;
3056 	fdrop(fp, td);
3057 	return (error);
3058 }
3059 #ifndef _SYS_SYSPROTO_H_
3060 struct getdents_args {
3061 	int fd;
3062 	char *buf;
3063 	size_t count;
3064 };
3065 #endif
3066 int
3067 getdents(td, uap)
3068 	struct thread *td;
3069 	register struct getdents_args /* {
3070 		syscallarg(int) fd;
3071 		syscallarg(char *) buf;
3072 		syscallarg(u_int) count;
3073 	} */ *uap;
3074 {
3075 	struct getdirentries_args ap;
3076 	ap.fd = uap->fd;
3077 	ap.buf = uap->buf;
3078 	ap.count = uap->count;
3079 	ap.basep = NULL;
3080 	return getdirentries(td, &ap);
3081 }
3082 
3083 /*
3084  * Set the mode mask for creation of filesystem nodes.
3085  *
3086  * MP SAFE
3087  */
3088 #ifndef _SYS_SYSPROTO_H_
3089 struct umask_args {
3090 	int	newmask;
3091 };
3092 #endif
3093 int
3094 umask(td, uap)
3095 	struct thread *td;
3096 	struct umask_args /* {
3097 		syscallarg(int) newmask;
3098 	} */ *uap;
3099 {
3100 	register struct filedesc *fdp;
3101 
3102 	FILEDESC_LOCK(td->td_proc->p_fd);
3103 	fdp = td->td_proc->p_fd;
3104 	td->td_retval[0] = fdp->fd_cmask;
3105 	fdp->fd_cmask = SCARG(uap, newmask) & ALLPERMS;
3106 	FILEDESC_UNLOCK(td->td_proc->p_fd);
3107 	return (0);
3108 }
3109 
3110 /*
3111  * Void all references to file by ripping underlying filesystem
3112  * away from vnode.
3113  */
3114 #ifndef _SYS_SYSPROTO_H_
3115 struct revoke_args {
3116 	char	*path;
3117 };
3118 #endif
3119 /* ARGSUSED */
3120 int
3121 revoke(td, uap)
3122 	struct thread *td;
3123 	register struct revoke_args /* {
3124 		syscallarg(char *) path;
3125 	} */ *uap;
3126 {
3127 	struct mount *mp;
3128 	struct vnode *vp;
3129 	struct vattr vattr;
3130 	int error;
3131 	struct nameidata nd;
3132 
3133 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, SCARG(uap, path),
3134 	    td);
3135 	if ((error = namei(&nd)) != 0)
3136 		return (error);
3137 	vp = nd.ni_vp;
3138 	NDFREE(&nd, NDF_ONLY_PNBUF);
3139 	if (vp->v_type != VCHR) {
3140 		vput(vp);
3141 		return (EINVAL);
3142 	}
3143 #ifdef MAC
3144 	error = mac_check_vnode_revoke(td->td_ucred, vp);
3145 	if (error) {
3146 		vput(vp);
3147 		return (error);
3148 	}
3149 #endif
3150 	error = VOP_GETATTR(vp, &vattr, td->td_ucred, td);
3151 	if (error) {
3152 		vput(vp);
3153 		return (error);
3154 	}
3155 	VOP_UNLOCK(vp, 0, td);
3156 	if (td->td_ucred->cr_uid != vattr.va_uid) {
3157 		error = suser_cred(td->td_ucred, PRISON_ROOT);
3158 		if (error)
3159 			goto out;
3160 	}
3161 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
3162 		goto out;
3163 	if (vcount(vp) > 1)
3164 		VOP_REVOKE(vp, REVOKEALL);
3165 	vn_finished_write(mp);
3166 out:
3167 	vrele(vp);
3168 	return (error);
3169 }
3170 
3171 /*
3172  * Convert a user file descriptor to a kernel file entry.
3173  * The file entry is locked upon returning.
3174  */
3175 int
3176 getvnode(fdp, fd, fpp)
3177 	struct filedesc *fdp;
3178 	int fd;
3179 	struct file **fpp;
3180 {
3181 	int error;
3182 	struct file *fp;
3183 
3184 	fp = NULL;
3185 	if (fdp == NULL)
3186 		error = EBADF;
3187 	else {
3188 		FILEDESC_LOCK(fdp);
3189 		if ((u_int)fd >= fdp->fd_nfiles ||
3190 		    (fp = fdp->fd_ofiles[fd]) == NULL)
3191 			error = EBADF;
3192 		else if (fp->f_type != DTYPE_VNODE && fp->f_type != DTYPE_FIFO) {
3193 			fp = NULL;
3194 			error = EINVAL;
3195 		} else {
3196 			fhold(fp);
3197 			error = 0;
3198 		}
3199 		FILEDESC_UNLOCK(fdp);
3200 	}
3201 	*fpp = fp;
3202 	return (error);
3203 }
3204 /*
3205  * Get (NFS) file handle
3206  */
3207 #ifndef _SYS_SYSPROTO_H_
3208 struct getfh_args {
3209 	char	*fname;
3210 	fhandle_t *fhp;
3211 };
3212 #endif
3213 int
3214 getfh(td, uap)
3215 	struct thread *td;
3216 	register struct getfh_args *uap;
3217 {
3218 	struct nameidata nd;
3219 	fhandle_t fh;
3220 	register struct vnode *vp;
3221 	int error;
3222 
3223 	/*
3224 	 * Must be super user
3225 	 */
3226 	error = suser(td);
3227 	if (error)
3228 		return (error);
3229 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, uap->fname, td);
3230 	error = namei(&nd);
3231 	if (error)
3232 		return (error);
3233 	NDFREE(&nd, NDF_ONLY_PNBUF);
3234 	vp = nd.ni_vp;
3235 	bzero(&fh, sizeof(fh));
3236 	fh.fh_fsid = vp->v_mount->mnt_stat.f_fsid;
3237 	error = VFS_VPTOFH(vp, &fh.fh_fid);
3238 	vput(vp);
3239 	if (error)
3240 		return (error);
3241 	error = copyout(&fh, uap->fhp, sizeof (fh));
3242 	return (error);
3243 }
3244 
3245 /*
3246  * syscall for the rpc.lockd to use to translate a NFS file handle into
3247  * an open descriptor.
3248  *
3249  * warning: do not remove the suser() call or this becomes one giant
3250  * security hole.
3251  */
3252 #ifndef _SYS_SYSPROTO_H_
3253 struct fhopen_args {
3254 	const struct fhandle *u_fhp;
3255 	int flags;
3256 };
3257 #endif
3258 int
3259 fhopen(td, uap)
3260 	struct thread *td;
3261 	struct fhopen_args /* {
3262 		syscallarg(const struct fhandle *) u_fhp;
3263 		syscallarg(int) flags;
3264 	} */ *uap;
3265 {
3266 	struct proc *p = td->td_proc;
3267 	struct mount *mp;
3268 	struct vnode *vp;
3269 	struct fhandle fhp;
3270 	struct vattr vat;
3271 	struct vattr *vap = &vat;
3272 	struct flock lf;
3273 	struct file *fp;
3274 	register struct filedesc *fdp = p->p_fd;
3275 	int fmode, mode, error, type;
3276 	struct file *nfp;
3277 	int indx;
3278 
3279 	/*
3280 	 * Must be super user
3281 	 */
3282 	error = suser(td);
3283 	if (error)
3284 		return (error);
3285 
3286 	fmode = FFLAGS(SCARG(uap, flags));
3287 	/* why not allow a non-read/write open for our lockd? */
3288 	if (((fmode & (FREAD | FWRITE)) == 0) || (fmode & O_CREAT))
3289 		return (EINVAL);
3290 	error = copyin(SCARG(uap,u_fhp), &fhp, sizeof(fhp));
3291 	if (error)
3292 		return(error);
3293 	/* find the mount point */
3294 	mp = vfs_getvfs(&fhp.fh_fsid);
3295 	if (mp == NULL)
3296 		return (ESTALE);
3297 	/* now give me my vnode, it gets returned to me locked */
3298 	error = VFS_FHTOVP(mp, &fhp.fh_fid, &vp);
3299 	if (error)
3300 		return (error);
3301  	/*
3302 	 * from now on we have to make sure not
3303 	 * to forget about the vnode
3304 	 * any error that causes an abort must vput(vp)
3305 	 * just set error = err and 'goto bad;'.
3306 	 */
3307 
3308 	/*
3309 	 * from vn_open
3310 	 */
3311 	if (vp->v_type == VLNK) {
3312 		error = EMLINK;
3313 		goto bad;
3314 	}
3315 	if (vp->v_type == VSOCK) {
3316 		error = EOPNOTSUPP;
3317 		goto bad;
3318 	}
3319 	mode = 0;
3320 	if (fmode & (FWRITE | O_TRUNC)) {
3321 		if (vp->v_type == VDIR) {
3322 			error = EISDIR;
3323 			goto bad;
3324 		}
3325 		error = vn_writechk(vp);
3326 		if (error)
3327 			goto bad;
3328 		mode |= VWRITE;
3329 	}
3330 	if (fmode & FREAD)
3331 		mode |= VREAD;
3332 	if (fmode & O_APPEND)
3333 		mode |= VAPPEND;
3334 #ifdef MAC
3335 	error = mac_check_vnode_open(td->td_ucred, vp, mode);
3336 	if (error)
3337 		goto bad;
3338 #endif
3339 	if (mode) {
3340 		error = VOP_ACCESS(vp, mode, td->td_ucred, td);
3341 		if (error)
3342 			goto bad;
3343 	}
3344 	if (fmode & O_TRUNC) {
3345 		VOP_UNLOCK(vp, 0, td);				/* XXX */
3346 		if ((error = vn_start_write(NULL, &mp, V_WAIT | PCATCH)) != 0) {
3347 			vrele(vp);
3348 			return (error);
3349 		}
3350 		VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
3351 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);	/* XXX */
3352 #ifdef MAC
3353 		/*
3354 		 * We don't yet have fp->f_cred, so use td->td_ucred, which
3355 		 * should be right.
3356 		 */
3357 		error = mac_check_vnode_write(td->td_ucred, td->td_ucred, vp);
3358 		if (error == 0) {
3359 #endif
3360 			VATTR_NULL(vap);
3361 			vap->va_size = 0;
3362 			error = VOP_SETATTR(vp, vap, td->td_ucred, td);
3363 #ifdef MAC
3364 		}
3365 #endif
3366 		vn_finished_write(mp);
3367 		if (error)
3368 			goto bad;
3369 	}
3370 	error = VOP_OPEN(vp, fmode, td->td_ucred, td);
3371 	if (error)
3372 		goto bad;
3373 	/*
3374 	 * Make sure that a VM object is created for VMIO support.
3375 	 */
3376 	if (vn_canvmio(vp) == TRUE) {
3377 		if ((error = vfs_object_create(vp, td, td->td_ucred)) != 0)
3378 			goto bad;
3379 	}
3380 	if (fmode & FWRITE)
3381 		vp->v_writecount++;
3382 
3383 	/*
3384 	 * end of vn_open code
3385 	 */
3386 
3387 	if ((error = falloc(td, &nfp, &indx)) != 0) {
3388 		if (fmode & FWRITE)
3389 			vp->v_writecount--;
3390 		goto bad;
3391 	}
3392 	fp = nfp;
3393 
3394 	/*
3395 	 * Hold an extra reference to avoid having fp ripped out
3396 	 * from under us while we block in the lock op
3397 	 */
3398 	fhold(fp);
3399 	nfp->f_data = vp;
3400 	nfp->f_flag = fmode & FMASK;
3401 	nfp->f_ops = &vnops;
3402 	nfp->f_type = DTYPE_VNODE;
3403 	if (fmode & (O_EXLOCK | O_SHLOCK)) {
3404 		lf.l_whence = SEEK_SET;
3405 		lf.l_start = 0;
3406 		lf.l_len = 0;
3407 		if (fmode & O_EXLOCK)
3408 			lf.l_type = F_WRLCK;
3409 		else
3410 			lf.l_type = F_RDLCK;
3411 		type = F_FLOCK;
3412 		if ((fmode & FNONBLOCK) == 0)
3413 			type |= F_WAIT;
3414 		VOP_UNLOCK(vp, 0, td);
3415 		if ((error = VOP_ADVLOCK(vp, (caddr_t)fp, F_SETLK, &lf,
3416 			    type)) != 0) {
3417 			/*
3418 			 * The lock request failed.  Normally close the
3419 			 * descriptor but handle the case where someone might
3420 			 * have dup()d or close()d it when we weren't looking.
3421 			 */
3422 			FILEDESC_LOCK(fdp);
3423 			if (fdp->fd_ofiles[indx] == fp) {
3424 				fdp->fd_ofiles[indx] = NULL;
3425 				FILEDESC_UNLOCK(fdp);
3426 				fdrop(fp, td);
3427 			} else
3428 				FILEDESC_UNLOCK(fdp);
3429 			/*
3430 			 * release our private reference
3431 			 */
3432 			fdrop(fp, td);
3433 			return(error);
3434 		}
3435 		vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
3436 		fp->f_flag |= FHASLOCK;
3437 	}
3438 	if ((vp->v_type == VREG) && (VOP_GETVOBJECT(vp, NULL) != 0))
3439 		vfs_object_create(vp, td, td->td_ucred);
3440 
3441 	VOP_UNLOCK(vp, 0, td);
3442 	fdrop(fp, td);
3443 	td->td_retval[0] = indx;
3444 	return (0);
3445 
3446 bad:
3447 	vput(vp);
3448 	return (error);
3449 }
3450 
3451 /*
3452  * Stat an (NFS) file handle.
3453  */
3454 #ifndef _SYS_SYSPROTO_H_
3455 struct fhstat_args {
3456 	struct fhandle *u_fhp;
3457 	struct stat *sb;
3458 };
3459 #endif
3460 int
3461 fhstat(td, uap)
3462 	struct thread *td;
3463 	register struct fhstat_args /* {
3464 		syscallarg(struct fhandle *) u_fhp;
3465 		syscallarg(struct stat *) sb;
3466 	} */ *uap;
3467 {
3468 	struct stat sb;
3469 	fhandle_t fh;
3470 	struct mount *mp;
3471 	struct vnode *vp;
3472 	int error;
3473 
3474 	/*
3475 	 * Must be super user
3476 	 */
3477 	error = suser(td);
3478 	if (error)
3479 		return (error);
3480 
3481 	error = copyin(SCARG(uap, u_fhp), &fh, sizeof(fhandle_t));
3482 	if (error)
3483 		return (error);
3484 
3485 	if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL)
3486 		return (ESTALE);
3487 	if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp)))
3488 		return (error);
3489 	error = vn_stat(vp, &sb, td->td_ucred, NOCRED, td);
3490 	vput(vp);
3491 	if (error)
3492 		return (error);
3493 	error = copyout(&sb, SCARG(uap, sb), sizeof(sb));
3494 	return (error);
3495 }
3496 
3497 /*
3498  * Implement fstatfs() for (NFS) file handles.
3499  */
3500 #ifndef _SYS_SYSPROTO_H_
3501 struct fhstatfs_args {
3502 	struct fhandle *u_fhp;
3503 	struct statfs *buf;
3504 };
3505 #endif
3506 int
3507 fhstatfs(td, uap)
3508 	struct thread *td;
3509 	struct fhstatfs_args /* {
3510 		syscallarg(struct fhandle) *u_fhp;
3511 		syscallarg(struct statfs) *buf;
3512 	} */ *uap;
3513 {
3514 	struct statfs *sp;
3515 	struct mount *mp;
3516 	struct vnode *vp;
3517 	struct statfs sb;
3518 	fhandle_t fh;
3519 	int error;
3520 
3521 	/*
3522 	 * Must be super user
3523 	 */
3524 	error = suser(td);
3525 	if (error)
3526 		return (error);
3527 
3528 	if ((error = copyin(SCARG(uap, u_fhp), &fh, sizeof(fhandle_t))) != 0)
3529 		return (error);
3530 
3531 	if ((mp = vfs_getvfs(&fh.fh_fsid)) == NULL)
3532 		return (ESTALE);
3533 	if ((error = VFS_FHTOVP(mp, &fh.fh_fid, &vp)))
3534 		return (error);
3535 	mp = vp->v_mount;
3536 	sp = &mp->mnt_stat;
3537 	vput(vp);
3538 #ifdef MAC
3539 	error = mac_check_mount_stat(td->td_ucred, mp);
3540 	if (error)
3541 		return (error);
3542 #endif
3543 	if ((error = VFS_STATFS(mp, sp, td)) != 0)
3544 		return (error);
3545 	sp->f_flags = mp->mnt_flag & MNT_VISFLAGMASK;
3546 	if (suser(td)) {
3547 		bcopy(sp, &sb, sizeof(sb));
3548 		sb.f_fsid.val[0] = sb.f_fsid.val[1] = 0;
3549 		sp = &sb;
3550 	}
3551 	return (copyout(sp, SCARG(uap, buf), sizeof(*sp)));
3552 }
3553 
3554 /*
3555  * Syscall to push extended attribute configuration information into the
3556  * VFS.  Accepts a path, which it converts to a mountpoint, as well as
3557  * a command (int cmd), and attribute name and misc data.  For now, the
3558  * attribute name is left in userspace for consumption by the VFS_op.
3559  * It will probably be changed to be copied into sysspace by the
3560  * syscall in the future, once issues with various consumers of the
3561  * attribute code have raised their hands.
3562  *
3563  * Currently this is used only by UFS Extended Attributes.
3564  */
3565 int
3566 extattrctl(td, uap)
3567 	struct thread *td;
3568 	struct extattrctl_args /* {
3569 		syscallarg(const char *) path;
3570 		syscallarg(int) cmd;
3571 		syscallarg(const char *) filename;
3572 		syscallarg(int) attrnamespace;
3573 		syscallarg(const char *) attrname;
3574 	} */ *uap;
3575 {
3576 	struct vnode *filename_vp;
3577 	struct nameidata nd;
3578 	struct mount *mp, *mp_writable;
3579 	char attrname[EXTATTR_MAXNAMELEN];
3580 	int error;
3581 
3582 	/*
3583 	 * uap->attrname is not always defined.  We check again later when we
3584 	 * invoke the VFS call so as to pass in NULL there if needed.
3585 	 */
3586 	if (uap->attrname != NULL) {
3587 		error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN,
3588 		    NULL);
3589 		if (error)
3590 			return (error);
3591 	}
3592 
3593 	/*
3594 	 * uap->filename is not always defined.  If it is, grab a vnode lock,
3595 	 * which VFS_EXTATTRCTL() will later release.
3596 	 */
3597 	filename_vp = NULL;
3598 	if (uap->filename != NULL) {
3599 		NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE,
3600 		    uap->filename, td);
3601 		if ((error = namei(&nd)) != 0)
3602 			return (error);
3603 		filename_vp = nd.ni_vp;
3604 		NDFREE(&nd, NDF_NO_VP_RELE | NDF_NO_VP_UNLOCK);
3605 	}
3606 
3607 	/* uap->path is always defined. */
3608 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td);
3609 	if ((error = namei(&nd)) != 0) {
3610 		if (filename_vp != NULL)
3611 			vput(filename_vp);
3612 		return (error);
3613 	}
3614 	mp = nd.ni_vp->v_mount;
3615 	error = vn_start_write(nd.ni_vp, &mp_writable, V_WAIT | PCATCH);
3616 	NDFREE(&nd, 0);
3617 	if (error) {
3618 		if (filename_vp != NULL)
3619 			vput(filename_vp);
3620 		return (error);
3621 	}
3622 
3623 	error = VFS_EXTATTRCTL(mp, uap->cmd, filename_vp, uap->attrnamespace,
3624 	    uap->attrname != NULL ? attrname : NULL, td);
3625 
3626 	vn_finished_write(mp_writable);
3627 	/*
3628 	 * VFS_EXTATTRCTL will have unlocked, but not de-ref'd,
3629 	 * filename_vp, so vrele it if it is defined.
3630 	 */
3631 	if (filename_vp != NULL)
3632 		vrele(filename_vp);
3633 
3634 	return (error);
3635 }
3636 
3637 /*-
3638  * Set a named extended attribute on a file or directory
3639  *
3640  * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace",
3641  *            kernelspace string pointer "attrname", userspace buffer
3642  *            pointer "data", buffer length "nbytes", thread "td".
3643  * Returns: 0 on success, an error number otherwise
3644  * Locks: none
3645  * References: vp must be a valid reference for the duration of the call
3646  */
3647 static int
3648 extattr_set_vp(struct vnode *vp, int attrnamespace, const char *attrname,
3649     void *data, size_t nbytes, struct thread *td)
3650 {
3651 	struct mount *mp;
3652 	struct uio auio;
3653 	struct iovec aiov;
3654 	ssize_t cnt;
3655 	int error;
3656 
3657 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
3658 		return (error);
3659 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
3660 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
3661 
3662 	aiov.iov_base = data;
3663 	aiov.iov_len = nbytes;
3664 	auio.uio_iov = &aiov;
3665 	auio.uio_iovcnt = 1;
3666 	auio.uio_offset = 0;
3667 	if (nbytes > INT_MAX) {
3668 		error = EINVAL;
3669 		goto done;
3670 	}
3671 	auio.uio_resid = nbytes;
3672 	auio.uio_rw = UIO_WRITE;
3673 	auio.uio_segflg = UIO_USERSPACE;
3674 	auio.uio_td = td;
3675 	cnt = nbytes;
3676 
3677 #ifdef MAC
3678 	error = mac_check_vnode_setextattr(td->td_ucred, vp, attrnamespace,
3679 	    attrname, &auio);
3680 	if (error)
3681 		goto done;
3682 #endif
3683 
3684 	error = VOP_SETEXTATTR(vp, attrnamespace, attrname, &auio,
3685 	    td->td_ucred, td);
3686 	cnt -= auio.uio_resid;
3687 	td->td_retval[0] = cnt;
3688 
3689 done:
3690 	VOP_UNLOCK(vp, 0, td);
3691 	vn_finished_write(mp);
3692 	return (error);
3693 }
3694 
3695 int
3696 extattr_set_file(td, uap)
3697 	struct thread *td;
3698 	struct extattr_set_file_args /* {
3699 		syscallarg(const char *) path;
3700 		syscallarg(int) attrnamespace;
3701 		syscallarg(const char *) attrname;
3702 		syscallarg(void *) data;
3703 		syscallarg(size_t) nbytes;
3704 	} */ *uap;
3705 {
3706 	struct nameidata nd;
3707 	char attrname[EXTATTR_MAXNAMELEN];
3708 	int error;
3709 
3710 	error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL);
3711 	if (error)
3712 		return (error);
3713 
3714 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td);
3715 	if ((error = namei(&nd)) != 0)
3716 		return (error);
3717 	NDFREE(&nd, NDF_ONLY_PNBUF);
3718 
3719 	error = extattr_set_vp(nd.ni_vp, uap->attrnamespace, attrname,
3720 	    uap->data, uap->nbytes, td);
3721 
3722 	vrele(nd.ni_vp);
3723 	return (error);
3724 }
3725 
3726 int
3727 extattr_set_fd(td, uap)
3728 	struct thread *td;
3729 	struct extattr_set_fd_args /* {
3730 		syscallarg(int) fd;
3731 		syscallarg(int) attrnamespace;
3732 		syscallarg(const char *) attrname;
3733 		syscallarg(void *) data;
3734 		syscallarg(size_t) nbytes;
3735 	} */ *uap;
3736 {
3737 	struct file *fp;
3738 	char attrname[EXTATTR_MAXNAMELEN];
3739 	int error;
3740 
3741 	error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL);
3742 	if (error)
3743 		return (error);
3744 
3745 	if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0)
3746 		return (error);
3747 
3748 	error = extattr_set_vp((struct vnode *)fp->f_data, uap->attrnamespace,
3749 	    attrname, uap->data, uap->nbytes, td);
3750 	fdrop(fp, td);
3751 
3752 	return (error);
3753 }
3754 
3755 /*-
3756  * Get a named extended attribute on a file or directory
3757  *
3758  * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace",
3759  *            kernelspace string pointer "attrname", userspace buffer
3760  *            pointer "data", buffer length "nbytes", thread "td".
3761  * Returns: 0 on success, an error number otherwise
3762  * Locks: none
3763  * References: vp must be a valid reference for the duration of the call
3764  */
3765 static int
3766 extattr_get_vp(struct vnode *vp, int attrnamespace, const char *attrname,
3767     void *data, size_t nbytes, struct thread *td)
3768 {
3769 	struct uio auio, *auiop;
3770 	struct iovec aiov;
3771 	ssize_t cnt;
3772 	size_t size, *sizep;
3773 	int error;
3774 
3775 	VOP_LEASE(vp, td, td->td_ucred, LEASE_READ);
3776 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
3777 
3778 	/*
3779 	 * Slightly unusual semantics: if the user provides a NULL data
3780 	 * pointer, they don't want to receive the data, just the
3781 	 * maximum read length.
3782 	 */
3783 	auiop = NULL;
3784 	sizep = NULL;
3785 	cnt = 0;
3786 	if (data != NULL) {
3787 		aiov.iov_base = data;
3788 		aiov.iov_len = nbytes;
3789 		auio.uio_iov = &aiov;
3790 		auio.uio_offset = 0;
3791 		if (nbytes > INT_MAX) {
3792 			error = EINVAL;
3793 			goto done;
3794 		}
3795 		auio.uio_resid = nbytes;
3796 		auio.uio_rw = UIO_READ;
3797 		auio.uio_segflg = UIO_USERSPACE;
3798 		auio.uio_td = td;
3799 		auiop = &auio;
3800 		cnt = nbytes;
3801 	} else
3802 		sizep = &size;
3803 
3804 #ifdef MAC
3805 	error = mac_check_vnode_getextattr(td->td_ucred, vp, attrnamespace,
3806 	    attrname, &auio);
3807 	if (error)
3808 		goto done;
3809 #endif
3810 
3811 	error = VOP_GETEXTATTR(vp, attrnamespace, attrname, auiop, sizep,
3812 	    td->td_ucred, td);
3813 
3814 	if (auiop != NULL) {
3815 		cnt -= auio.uio_resid;
3816 		td->td_retval[0] = cnt;
3817 	} else
3818 		td->td_retval[0] = size;
3819 
3820 done:
3821 	VOP_UNLOCK(vp, 0, td);
3822 	return (error);
3823 }
3824 
3825 int
3826 extattr_get_file(td, uap)
3827 	struct thread *td;
3828 	struct extattr_get_file_args /* {
3829 		syscallarg(const char *) path;
3830 		syscallarg(int) attrnamespace;
3831 		syscallarg(const char *) attrname;
3832 		syscallarg(void *) data;
3833 		syscallarg(size_t) nbytes;
3834 	} */ *uap;
3835 {
3836 	struct nameidata nd;
3837 	char attrname[EXTATTR_MAXNAMELEN];
3838 	int error;
3839 
3840 	error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL);
3841 	if (error)
3842 		return (error);
3843 
3844 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td);
3845 	if ((error = namei(&nd)) != 0)
3846 		return (error);
3847 	NDFREE(&nd, NDF_ONLY_PNBUF);
3848 
3849 	error = extattr_get_vp(nd.ni_vp, uap->attrnamespace, attrname,
3850 	    uap->data, uap->nbytes, td);
3851 
3852 	vrele(nd.ni_vp);
3853 	return (error);
3854 }
3855 
3856 int
3857 extattr_get_fd(td, uap)
3858 	struct thread *td;
3859 	struct extattr_get_fd_args /* {
3860 		syscallarg(int) fd;
3861 		syscallarg(int) attrnamespace;
3862 		syscallarg(const char *) attrname;
3863 		syscallarg(void *) data;
3864 		syscallarg(size_t) nbytes;
3865 	} */ *uap;
3866 {
3867 	struct file *fp;
3868 	char attrname[EXTATTR_MAXNAMELEN];
3869 	int error;
3870 
3871 	error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL);
3872 	if (error)
3873 		return (error);
3874 
3875 	if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0)
3876 		return (error);
3877 
3878 	error = extattr_get_vp((struct vnode *)fp->f_data, uap->attrnamespace,
3879 	    attrname, uap->data, uap->nbytes, td);
3880 
3881 	fdrop(fp, td);
3882 	return (error);
3883 }
3884 
3885 /*
3886  * extattr_delete_vp(): Delete a named extended attribute on a file or
3887  *                      directory
3888  *
3889  * Arguments: unlocked vnode "vp", attribute namespace "attrnamespace",
3890  *            kernelspace string pointer "attrname", proc "p"
3891  * Returns: 0 on success, an error number otherwise
3892  * Locks: none
3893  * References: vp must be a valid reference for the duration of the call
3894  */
3895 static int
3896 extattr_delete_vp(struct vnode *vp, int attrnamespace, const char *attrname,
3897     struct thread *td)
3898 {
3899 	struct mount *mp;
3900 	int error;
3901 
3902 	if ((error = vn_start_write(vp, &mp, V_WAIT | PCATCH)) != 0)
3903 		return (error);
3904 	VOP_LEASE(vp, td, td->td_ucred, LEASE_WRITE);
3905 	vn_lock(vp, LK_EXCLUSIVE | LK_RETRY, td);
3906 
3907 #ifdef MAC
3908 	error = mac_check_vnode_setextattr(td->td_ucred, vp, attrnamespace,
3909 	    attrname, NULL);
3910 #endif
3911 
3912 	error = VOP_SETEXTATTR(vp, attrnamespace, attrname, NULL, td->td_ucred,
3913 	    td);
3914 
3915 	VOP_UNLOCK(vp, 0, td);
3916 	vn_finished_write(mp);
3917 	return (error);
3918 }
3919 
3920 int
3921 extattr_delete_file(td, uap)
3922 	struct thread *td;
3923 	struct extattr_delete_file_args /* {
3924 		syscallarg(const char *) path;
3925 		syscallarg(int) attrnamespace;
3926 		syscallarg(const char *) attrname;
3927 	} */ *uap;
3928 {
3929 	struct nameidata nd;
3930 	char attrname[EXTATTR_MAXNAMELEN];
3931 	int error;
3932 
3933 	error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL);
3934 	if (error)
3935 		return(error);
3936 
3937 	NDINIT(&nd, LOOKUP, FOLLOW, UIO_USERSPACE, uap->path, td);
3938 	if ((error = namei(&nd)) != 0)
3939 		return(error);
3940 	NDFREE(&nd, NDF_ONLY_PNBUF);
3941 
3942 	error = extattr_delete_vp(nd.ni_vp, uap->attrnamespace, attrname, td);
3943 
3944 	vrele(nd.ni_vp);
3945 	return(error);
3946 }
3947 
3948 int
3949 extattr_delete_fd(td, uap)
3950 	struct thread *td;
3951 	struct extattr_delete_fd_args /* {
3952 		syscallarg(int) fd;
3953 		syscallarg(int) attrnamespace;
3954 		syscallarg(const char *) attrname;
3955 	} */ *uap;
3956 {
3957 	struct file *fp;
3958 	struct vnode *vp;
3959 	char attrname[EXTATTR_MAXNAMELEN];
3960 	int error;
3961 
3962 	error = copyinstr(uap->attrname, attrname, EXTATTR_MAXNAMELEN, NULL);
3963 	if (error)
3964 		return (error);
3965 
3966 	if ((error = getvnode(td->td_proc->p_fd, uap->fd, &fp)) != 0)
3967 		return (error);
3968 	vp = (struct vnode *)fp->f_data;
3969 
3970 	error = extattr_delete_vp(vp, uap->attrnamespace, attrname, td);
3971 
3972 	fdrop(fp, td);
3973 	return (error);
3974 }
3975