]> git.proxmox.com Git - mirror_spl-debian.git/blame - modules/spl/spl-vnode.c
Add missing policy includes, add missing sun ddi bits
[mirror_spl-debian.git] / modules / spl / spl-vnode.c
CommitLineData
715f6251 1/*
2 * This file is part of the SPL: Solaris Porting Layer.
3 *
4 * Copyright (c) 2008 Lawrence Livermore National Security, LLC.
5 * Produced at Lawrence Livermore National Laboratory
6 * Written by:
7 * Brian Behlendorf <behlendorf1@llnl.gov>,
8 * Herb Wartens <wartens2@llnl.gov>,
9 * Jim Garlick <garlick@llnl.gov>
10 * UCRL-CODE-235197
11 *
12 * This is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
16 *
17 * This is distributed in the hope that it will be useful, but WITHOUT
18 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
19 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
20 * for more details.
21 *
22 * You should have received a copy of the GNU General Public License along
23 * with this program; if not, write to the Free Software Foundation, Inc.,
24 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
25 */
26
0b3cf046 27#include <sys/sysmacros.h>
4b171585 28#include <sys/vnode.h>
0b3cf046 29
937879f1 30
31#ifdef DEBUG_SUBSYSTEM
32#undef DEBUG_SUBSYSTEM
33#endif
34
35#define DEBUG_SUBSYSTEM S_VNODE
36
4b171585 37void *rootdir = NULL;
38EXPORT_SYMBOL(rootdir);
39
7afde631 40static spl_kmem_cache_t *vn_cache;
41static spl_kmem_cache_t *vn_file_cache;
e4f1d29f 42
43static spinlock_t vn_file_lock = SPIN_LOCK_UNLOCKED;
44static LIST_HEAD(vn_file_list);
af828292 45
4b171585 46static vtype_t
47vn_get_sol_type(umode_t mode)
48{
49 if (S_ISREG(mode))
50 return VREG;
51
52 if (S_ISDIR(mode))
53 return VDIR;
54
55 if (S_ISCHR(mode))
56 return VCHR;
57
58 if (S_ISBLK(mode))
59 return VBLK;
60
61 if (S_ISFIFO(mode))
62 return VFIFO;
63
64 if (S_ISLNK(mode))
65 return VLNK;
66
67 if (S_ISSOCK(mode))
68 return VSOCK;
69
70 if (S_ISCHR(mode))
71 return VCHR;
72
73 return VNON;
74} /* vn_get_sol_type() */
75
af828292 76vnode_t *
77vn_alloc(int flag)
78{
79 vnode_t *vp;
937879f1 80 ENTRY;
af828292 81
82 vp = kmem_cache_alloc(vn_cache, flag);
af828292 83 if (vp != NULL) {
e4f1d29f 84 vp->v_file = NULL;
af828292 85 vp->v_type = 0;
86 }
87
937879f1 88 RETURN(vp);
af828292 89} /* vn_alloc() */
90EXPORT_SYMBOL(vn_alloc);
91
92void
93vn_free(vnode_t *vp)
94{
937879f1 95 ENTRY;
af828292 96 kmem_cache_free(vn_cache, vp);
937879f1 97 EXIT;
af828292 98} /* vn_free() */
99EXPORT_SYMBOL(vn_free);
100
0b3cf046 101int
af828292 102vn_open(const char *path, uio_seg_t seg, int flags, int mode,
4b171585 103 vnode_t **vpp, int x1, void *x2)
0b3cf046 104{
4b171585 105 struct file *fp;
106 struct kstat stat;
57d86234 107 int rc, saved_umask = 0;
0b3cf046 108 vnode_t *vp;
937879f1 109 ENTRY;
0b3cf046 110
937879f1 111 ASSERT(flags & (FWRITE | FREAD));
112 ASSERT(seg == UIO_SYSSPACE);
113 ASSERT(vpp);
4b171585 114 *vpp = NULL;
115
116 if (!(flags & FCREAT) && (flags & FWRITE))
117 flags |= FEXCL;
118
728b9dd8 119 /* Note for filp_open() the two low bits must be remapped to mean:
120 * 01 - read-only -> 00 read-only
121 * 10 - write-only -> 01 write-only
122 * 11 - read-write -> 10 read-write
123 */
124 flags--;
0b3cf046 125
126 if (flags & FCREAT)
4b171585 127 saved_umask = xchg(&current->fs->umask, 0);
0b3cf046 128
4b171585 129 fp = filp_open(path, flags, mode);
0b3cf046 130
131 if (flags & FCREAT)
4b171585 132 (void)xchg(&current->fs->umask, saved_umask);
0b3cf046 133
4b171585 134 if (IS_ERR(fp))
937879f1 135 RETURN(-PTR_ERR(fp));
0b3cf046 136
4b171585 137 rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat);
138 if (rc) {
139 filp_close(fp, 0);
937879f1 140 RETURN(-rc);
0b3cf046 141 }
142
af828292 143 vp = vn_alloc(KM_SLEEP);
4b171585 144 if (!vp) {
145 filp_close(fp, 0);
937879f1 146 RETURN(ENOMEM);
4b171585 147 }
0b3cf046 148
e4f1d29f 149 mutex_enter(&vp->v_lock);
4b171585 150 vp->v_type = vn_get_sol_type(stat.mode);
e4f1d29f 151 vp->v_file = fp;
4b171585 152 *vpp = vp;
e4f1d29f 153 mutex_exit(&vp->v_lock);
0b3cf046 154
937879f1 155 RETURN(0);
4b171585 156} /* vn_open() */
157EXPORT_SYMBOL(vn_open);
0b3cf046 158
0b3cf046 159int
af828292 160vn_openat(const char *path, uio_seg_t seg, int flags, int mode,
4b171585 161 vnode_t **vpp, int x1, void *x2, vnode_t *vp, int fd)
0b3cf046 162{
4b171585 163 char *realpath;
12018327 164 int len, rc;
937879f1 165 ENTRY;
0b3cf046 166
937879f1 167 ASSERT(vp == rootdir);
0b3cf046 168
12018327 169 len = strlen(path) + 2;
170 realpath = kmalloc(len, GFP_KERNEL);
4b171585 171 if (!realpath)
937879f1 172 RETURN(ENOMEM);
0b3cf046 173
12018327 174 (void)snprintf(realpath, len, "/%s", path);
4b171585 175 rc = vn_open(realpath, seg, flags, mode, vpp, x1, x2);
4b171585 176 kfree(realpath);
177
937879f1 178 RETURN(rc);
4b171585 179} /* vn_openat() */
180EXPORT_SYMBOL(vn_openat);
0b3cf046 181
0b3cf046 182int
4b171585 183vn_rdwr(uio_rw_t uio, vnode_t *vp, void *addr, ssize_t len, offset_t off,
af828292 184 uio_seg_t seg, int x1, rlim64_t x2, void *x3, ssize_t *residp)
0b3cf046 185{
4b171585 186 loff_t offset;
187 mm_segment_t saved_fs;
188 struct file *fp;
189 int rc;
937879f1 190 ENTRY;
4b171585 191
937879f1 192 ASSERT(uio == UIO_WRITE || uio == UIO_READ);
193 ASSERT(vp);
194 ASSERT(vp->v_file);
195 ASSERT(seg == UIO_SYSSPACE);
196 ASSERT(x1 == 0);
197 ASSERT(x2 == RLIM64_INFINITY);
4b171585 198
199 offset = off;
e4f1d29f 200 fp = vp->v_file;
4b171585 201
202 /* Writable user data segment must be briefly increased for this
203 * process so we can use the user space read call paths to write
204 * in to memory allocated by the kernel. */
205 saved_fs = get_fs();
206 set_fs(get_ds());
207
208 if (uio & UIO_WRITE)
209 rc = vfs_write(fp, addr, len, &offset);
210 else
211 rc = vfs_read(fp, addr, len, &offset);
212
213 set_fs(saved_fs);
214
215 if (rc < 0)
937879f1 216 RETURN(-rc);
0b3cf046 217
4b171585 218 if (residp) {
219 *residp = len - rc;
0b3cf046 220 } else {
4b171585 221 if (rc != len)
937879f1 222 RETURN(EIO);
0b3cf046 223 }
224
937879f1 225 RETURN(0);
4b171585 226} /* vn_rdwr() */
227EXPORT_SYMBOL(vn_rdwr);
228
229int
2f5d55aa 230vn_close(vnode_t *vp, int flags, int x1, int x2, void *x3, void *x4)
4b171585 231{
232 int rc;
937879f1 233 ENTRY;
4b171585 234
937879f1 235 ASSERT(vp);
236 ASSERT(vp->v_file);
4b171585 237
e4f1d29f 238 rc = filp_close(vp->v_file, 0);
af828292 239 vn_free(vp);
4b171585 240
937879f1 241 RETURN(-rc);
4b171585 242} /* vn_close() */
243EXPORT_SYMBOL(vn_close);
244
57d86234 245static struct dentry *vn_lookup_hash(struct nameidata *nd)
4b171585 246{
57d86234 247 return lookup_one_len(nd->last.name, nd->nd_dentry, nd->last.len);
4b171585 248} /* lookup_hash() */
249
57d86234 250static void vn_path_release(struct nameidata *nd)
251{
252 dput(nd->nd_dentry);
253 mntput(nd->nd_mnt);
254}
255
4b171585 256/* Modified do_unlinkat() from linux/fs/namei.c, only uses exported symbols */
257int
af828292 258vn_remove(const char *path, uio_seg_t seg, int flags)
4b171585 259{
260 struct dentry *dentry;
261 struct nameidata nd;
262 struct inode *inode = NULL;
263 int rc = 0;
3d061e9d 264 ENTRY;
4b171585 265
3d061e9d 266 ASSERT(seg == UIO_SYSSPACE);
267 ASSERT(flags == RMFILE);
2f5d55aa 268
4b171585 269 rc = path_lookup(path, LOOKUP_PARENT, &nd);
270 if (rc)
937879f1 271 GOTO(exit, rc);
4b171585 272
273 rc = -EISDIR;
274 if (nd.last_type != LAST_NORM)
937879f1 275 GOTO(exit1, rc);
4b171585 276
3d061e9d 277#ifdef HAVE_INODE_I_MUTEX
57d86234 278 mutex_lock_nested(&nd.nd_dentry->d_inode->i_mutex, I_MUTEX_PARENT);
3d061e9d 279#else
280 down(&nd.nd_dentry->d_inode->i_sem);
281#endif
57d86234 282 dentry = vn_lookup_hash(&nd);
4b171585 283 rc = PTR_ERR(dentry);
284 if (!IS_ERR(dentry)) {
285 /* Why not before? Because we want correct rc value */
286 if (nd.last.name[nd.last.len])
937879f1 287 GOTO(slashes, rc);
288
4b171585 289 inode = dentry->d_inode;
290 if (inode)
291 atomic_inc(&inode->i_count);
57d86234 292 rc = vfs_unlink(nd.nd_dentry->d_inode, dentry);
4b171585 293exit2:
294 dput(dentry);
295 }
3d061e9d 296#ifdef HAVE_INODE_I_MUTEX
57d86234 297 mutex_unlock(&nd.nd_dentry->d_inode->i_mutex);
3d061e9d 298#else
299 up(&nd.nd_dentry->d_inode->i_sem);
300#endif
4b171585 301 if (inode)
302 iput(inode); /* truncate the inode here */
303exit1:
57d86234 304 vn_path_release(&nd);
4b171585 305exit:
937879f1 306 RETURN(-rc);
4b171585 307
308slashes:
309 rc = !dentry->d_inode ? -ENOENT :
310 S_ISDIR(dentry->d_inode->i_mode) ? -EISDIR : -ENOTDIR;
937879f1 311 GOTO(exit2, rc);
4b171585 312} /* vn_remove() */
313EXPORT_SYMBOL(vn_remove);
314
315/* Modified do_rename() from linux/fs/namei.c, only uses exported symbols */
316int
317vn_rename(const char *oldname, const char *newname, int x1)
318{
319 struct dentry * old_dir, * new_dir;
320 struct dentry * old_dentry, *new_dentry;
321 struct dentry * trap;
322 struct nameidata oldnd, newnd;
323 int rc = 0;
937879f1 324 ENTRY;
4b171585 325
326 rc = path_lookup(oldname, LOOKUP_PARENT, &oldnd);
327 if (rc)
937879f1 328 GOTO(exit, rc);
4b171585 329
330 rc = path_lookup(newname, LOOKUP_PARENT, &newnd);
331 if (rc)
937879f1 332 GOTO(exit1, rc);
4b171585 333
334 rc = -EXDEV;
57d86234 335 if (oldnd.nd_mnt != newnd.nd_mnt)
937879f1 336 GOTO(exit2, rc);
4b171585 337
57d86234 338 old_dir = oldnd.nd_dentry;
4b171585 339 rc = -EBUSY;
340 if (oldnd.last_type != LAST_NORM)
937879f1 341 GOTO(exit2, rc);
4b171585 342
57d86234 343 new_dir = newnd.nd_dentry;
4b171585 344 if (newnd.last_type != LAST_NORM)
937879f1 345 GOTO(exit2, rc);
4b171585 346
347 trap = lock_rename(new_dir, old_dir);
348
57d86234 349 old_dentry = vn_lookup_hash(&oldnd);
4b171585 350
351 rc = PTR_ERR(old_dentry);
352 if (IS_ERR(old_dentry))
937879f1 353 GOTO(exit3, rc);
4b171585 354
355 /* source must exist */
356 rc = -ENOENT;
357 if (!old_dentry->d_inode)
937879f1 358 GOTO(exit4, rc);
4b171585 359
360 /* unless the source is a directory trailing slashes give -ENOTDIR */
361 if (!S_ISDIR(old_dentry->d_inode->i_mode)) {
362 rc = -ENOTDIR;
363 if (oldnd.last.name[oldnd.last.len])
937879f1 364 GOTO(exit4, rc);
4b171585 365 if (newnd.last.name[newnd.last.len])
937879f1 366 GOTO(exit4, rc);
4b171585 367 }
368
369 /* source should not be ancestor of target */
370 rc = -EINVAL;
371 if (old_dentry == trap)
937879f1 372 GOTO(exit4, rc);
4b171585 373
57d86234 374 new_dentry = vn_lookup_hash(&newnd);
4b171585 375 rc = PTR_ERR(new_dentry);
376 if (IS_ERR(new_dentry))
937879f1 377 GOTO(exit4, rc);
4b171585 378
379 /* target should not be an ancestor of source */
380 rc = -ENOTEMPTY;
381 if (new_dentry == trap)
937879f1 382 GOTO(exit5, rc);
4b171585 383
384 rc = vfs_rename(old_dir->d_inode, old_dentry,
385 new_dir->d_inode, new_dentry);
386exit5:
387 dput(new_dentry);
388exit4:
389 dput(old_dentry);
390exit3:
391 unlock_rename(new_dir, old_dir);
392exit2:
57d86234 393 vn_path_release(&newnd);
4b171585 394exit1:
57d86234 395 vn_path_release(&oldnd);
4b171585 396exit:
937879f1 397 RETURN(-rc);
0b3cf046 398}
4b171585 399EXPORT_SYMBOL(vn_rename);
0b3cf046 400
4b171585 401int
36e6f861 402vn_getattr(vnode_t *vp, vattr_t *vap, int flags, void *x3, void *x4)
0b3cf046 403{
4b171585 404 struct file *fp;
405 struct kstat stat;
406 int rc;
937879f1 407 ENTRY;
4b171585 408
937879f1 409 ASSERT(vp);
410 ASSERT(vp->v_file);
411 ASSERT(vap);
4b171585 412
e4f1d29f 413 fp = vp->v_file;
4b171585 414
415 rc = vfs_getattr(fp->f_vfsmnt, fp->f_dentry, &stat);
416 if (rc)
937879f1 417 RETURN(-rc);
4b171585 418
419 vap->va_type = vn_get_sol_type(stat.mode);
420 vap->va_mode = stat.mode;
421 vap->va_uid = stat.uid;
422 vap->va_gid = stat.gid;
423 vap->va_fsid = 0;
424 vap->va_nodeid = stat.ino;
425 vap->va_nlink = stat.nlink;
426 vap->va_size = stat.size;
427 vap->va_blocksize = stat.blksize;
428 vap->va_atime.tv_sec = stat.atime.tv_sec;
429 vap->va_atime.tv_usec = stat.atime.tv_nsec / NSEC_PER_USEC;
430 vap->va_mtime.tv_sec = stat.mtime.tv_sec;
431 vap->va_mtime.tv_usec = stat.mtime.tv_nsec / NSEC_PER_USEC;
432 vap->va_ctime.tv_sec = stat.ctime.tv_sec;
433 vap->va_ctime.tv_usec = stat.ctime.tv_nsec / NSEC_PER_USEC;
434 vap->va_rdev = stat.rdev;
435 vap->va_blocks = stat.blocks;
436
937879f1 437 RETURN(0);
0b3cf046 438}
4b171585 439EXPORT_SYMBOL(vn_getattr);
440
2f5d55aa 441int vn_fsync(vnode_t *vp, int flags, void *x3, void *x4)
4b171585 442{
36e6f861 443 int datasync = 0;
937879f1 444 ENTRY;
36e6f861 445
937879f1 446 ASSERT(vp);
447 ASSERT(vp->v_file);
4b171585 448
36e6f861 449 if (flags & FDSYNC)
450 datasync = 1;
451
937879f1 452 RETURN(-file_fsync(vp->v_file, vp->v_file->f_dentry, datasync));
4b171585 453} /* vn_fsync() */
454EXPORT_SYMBOL(vn_fsync);
af828292 455
e4f1d29f 456/* Function must be called while holding the vn_file_lock */
457static file_t *
458file_find(int fd)
459{
460 file_t *fp;
461
937879f1 462 ASSERT(spin_is_locked(&vn_file_lock));
e4f1d29f 463
464 list_for_each_entry(fp, &vn_file_list, f_list) {
465 if (fd == fp->f_fd) {
937879f1 466 ASSERT(atomic_read(&fp->f_ref) != 0);
e4f1d29f 467 return fp;
468 }
469 }
470
471 return NULL;
472} /* file_find() */
473
474file_t *
475vn_getf(int fd)
476{
477 struct kstat stat;
478 struct file *lfp;
479 file_t *fp;
480 vnode_t *vp;
937879f1 481 int rc = 0;
482 ENTRY;
e4f1d29f 483
484 /* Already open just take an extra reference */
485 spin_lock(&vn_file_lock);
486
487 fp = file_find(fd);
488 if (fp) {
489 atomic_inc(&fp->f_ref);
490 spin_unlock(&vn_file_lock);
937879f1 491 RETURN(fp);
e4f1d29f 492 }
493
494 spin_unlock(&vn_file_lock);
495
496 /* File was not yet opened create the object and setup */
4afaaefa 497 fp = kmem_cache_alloc(vn_file_cache, KM_SLEEP);
e4f1d29f 498 if (fp == NULL)
937879f1 499 GOTO(out, rc);
e4f1d29f 500
501 mutex_enter(&fp->f_lock);
502
503 fp->f_fd = fd;
504 fp->f_offset = 0;
505 atomic_inc(&fp->f_ref);
506
507 lfp = fget(fd);
508 if (lfp == NULL)
937879f1 509 GOTO(out_mutex, rc);
e4f1d29f 510
511 vp = vn_alloc(KM_SLEEP);
512 if (vp == NULL)
937879f1 513 GOTO(out_fget, rc);
e4f1d29f 514
515 if (vfs_getattr(lfp->f_vfsmnt, lfp->f_dentry, &stat))
937879f1 516 GOTO(out_vnode, rc);
e4f1d29f 517
518 mutex_enter(&vp->v_lock);
519 vp->v_type = vn_get_sol_type(stat.mode);
520 vp->v_file = lfp;
521 mutex_exit(&vp->v_lock);
522
523 fp->f_vnode = vp;
524 fp->f_file = lfp;
525
526 /* Put it on the tracking list */
527 spin_lock(&vn_file_lock);
528 list_add(&fp->f_list, &vn_file_list);
529 spin_unlock(&vn_file_lock);
530
531 mutex_exit(&fp->f_lock);
937879f1 532 RETURN(fp);
e4f1d29f 533
534out_vnode:
e4f1d29f 535 vn_free(vp);
536out_fget:
e4f1d29f 537 fput(lfp);
538out_mutex:
e4f1d29f 539 mutex_exit(&fp->f_lock);
540 kmem_cache_free(vn_file_cache, fp);
541out:
937879f1 542 RETURN(NULL);
e4f1d29f 543} /* getf() */
544EXPORT_SYMBOL(getf);
545
546static void releasef_locked(file_t *fp)
547{
937879f1 548 ASSERT(fp->f_file);
549 ASSERT(fp->f_vnode);
e4f1d29f 550
551 /* Unlinked from list, no refs, safe to free outside mutex */
552 fput(fp->f_file);
553 vn_free(fp->f_vnode);
554
555 kmem_cache_free(vn_file_cache, fp);
556}
557
558void
559vn_releasef(int fd)
560{
561 file_t *fp;
937879f1 562 ENTRY;
e4f1d29f 563
564 spin_lock(&vn_file_lock);
565 fp = file_find(fd);
566 if (fp) {
567 atomic_dec(&fp->f_ref);
568 if (atomic_read(&fp->f_ref) > 0) {
569 spin_unlock(&vn_file_lock);
937879f1 570 EXIT;
e4f1d29f 571 return;
572 }
573
574 list_del(&fp->f_list);
575 releasef_locked(fp);
576 }
577 spin_unlock(&vn_file_lock);
578
937879f1 579 EXIT;
e4f1d29f 580 return;
581} /* releasef() */
582EXPORT_SYMBOL(releasef);
583
af828292 584static int
585vn_cache_constructor(void *buf, void *cdrarg, int kmflags)
586{
587 struct vnode *vp = buf;
588
589 mutex_init(&vp->v_lock, NULL, MUTEX_DEFAULT, NULL);
590
591 return (0);
592} /* vn_cache_constructor() */
593
594static void
595vn_cache_destructor(void *buf, void *cdrarg)
596{
597 struct vnode *vp = buf;
598
599 mutex_destroy(&vp->v_lock);
600} /* vn_cache_destructor() */
601
e4f1d29f 602static int
603vn_file_cache_constructor(void *buf, void *cdrarg, int kmflags)
604{
605 file_t *fp = buf;
606
607 atomic_set(&fp->f_ref, 0);
608 mutex_init(&fp->f_lock, NULL, MUTEX_DEFAULT, NULL);
4e62fd41 609 INIT_LIST_HEAD(&fp->f_list);
e4f1d29f 610
611 return (0);
612} /* file_cache_constructor() */
613
614static void
615vn_file_cache_destructor(void *buf, void *cdrarg)
616{
617 file_t *fp = buf;
618
619 mutex_destroy(&fp->f_lock);
620} /* vn_file_cache_destructor() */
621
af828292 622int
623vn_init(void)
624{
937879f1 625 ENTRY;
57d86234 626 vn_cache = kmem_cache_create("spl_vn_cache",
627 sizeof(struct vnode), 64,
5d86345d 628 vn_cache_constructor,
629 vn_cache_destructor,
af828292 630 NULL, NULL, NULL, 0);
e4f1d29f 631
632 vn_file_cache = kmem_cache_create("spl_vn_file_cache",
633 sizeof(file_t), 64,
634 vn_file_cache_constructor,
635 vn_file_cache_destructor,
636 NULL, NULL, NULL, 0);
937879f1 637 RETURN(0);
af828292 638} /* vn_init() */
639
640void
641vn_fini(void)
642{
e4f1d29f 643 file_t *fp, *next_fp;
2fb9b26a 644 int leaked = 0;
937879f1 645 ENTRY;
e4f1d29f 646
647 spin_lock(&vn_file_lock);
648
649 list_for_each_entry_safe(fp, next_fp, &vn_file_list, f_list) {
650 list_del(&fp->f_list);
651 releasef_locked(fp);
652 leaked++;
653 }
654
2fb9b26a 655 kmem_cache_destroy(vn_file_cache);
e4f1d29f 656 vn_file_cache = NULL;
657 spin_unlock(&vn_file_lock);
658
659 if (leaked > 0)
937879f1 660 CWARN("Warning %d files leaked\n", leaked);
e4f1d29f 661
2fb9b26a 662 kmem_cache_destroy(vn_cache);
e4f1d29f 663
937879f1 664 EXIT;
e4f1d29f 665 return;
af828292 666} /* vn_fini() */