<dec f='src/src/sys/coda/coda_vnops.h' l='55' type='int coda_getattr(void * )'/>
<use f='src/src/sys/coda/coda_vnops.c' l='109'/>
<use f='src/src/sys/coda/coda_vnops.c' l='109'/>
<use f='src/src/sys/coda/coda_vnops.c' l='109'/>
<use f='src/src/sys/coda/coda_vnops.c' l='109'/>
<def f='src/src/sys/coda/coda_vnops.c' l='575' ll='624' type='int coda_getattr(void * v)'/>
<doc f='src/src/sys/coda/coda_vnops.c' l='566'>/*
 * To reduce the cost of a user-level venus;we cache attributes in
 * the kernel.  Each cnode has storage allocated for an attribute. If
 * c_vattr is valid, return a reference to it. Otherwise, get the
 * attributes from venus and store them in the cnode.  There is some
 * question if this method is a security leak. But I think that in
 * order to make this call, the user must have done a lookup and
 * opened the file, and therefore should already have access.
 */</doc>
<doc f='src/src/sys/coda/coda_vnops.h' l='54'>/* 1.3 int coda_select(void *);*/</doc>
