vnode_if.c revision 1.53.4.8 1 1.53.4.8 yamt /* $NetBSD: vnode_if.c,v 1.53.4.8 2008/02/04 09:24:25 yamt Exp $ */
2 1.9 thorpej
3 1.1 cgd /*
4 1.52 perry * Warning: DO NOT EDIT! This file is automatically generated!
5 1.1 cgd * (Modifications made here may easily be lost!)
6 1.1 cgd *
7 1.1 cgd * Created from the file:
8 1.53.4.8 yamt * NetBSD: vnode_if.src,v 1.57 2008/01/25 14:32:15 ad Exp
9 1.1 cgd * by the script:
10 1.53.4.7 yamt * NetBSD: vnode_if.sh,v 1.48 2008/01/02 11:48:57 ad Exp
11 1.1 cgd */
12 1.1 cgd
13 1.1 cgd /*
14 1.10 fvdl * Copyright (c) 1992, 1993, 1994, 1995
15 1.1 cgd * The Regents of the University of California. All rights reserved.
16 1.1 cgd *
17 1.1 cgd * Redistribution and use in source and binary forms, with or without
18 1.1 cgd * modification, are permitted provided that the following conditions
19 1.1 cgd * are met:
20 1.1 cgd * 1. Redistributions of source code must retain the above copyright
21 1.1 cgd * notice, this list of conditions and the following disclaimer.
22 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
23 1.1 cgd * notice, this list of conditions and the following disclaimer in the
24 1.1 cgd * documentation and/or other materials provided with the distribution.
25 1.45 agc * 3. Neither the name of the University nor the names of its contributors
26 1.1 cgd * may be used to endorse or promote products derived from this software
27 1.1 cgd * without specific prior written permission.
28 1.1 cgd *
29 1.14 christos * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
30 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
33 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 1.1 cgd * SUCH DAMAGE.
40 1.1 cgd */
41 1.39 lukem
42 1.39 lukem #include <sys/cdefs.h>
43 1.53.4.8 yamt __KERNEL_RCSID(0, "$NetBSD: vnode_if.c,v 1.53.4.8 2008/02/04 09:24:25 yamt Exp $");
44 1.39 lukem
45 1.24 thorpej
46 1.50 thorpej #include "opt_vnode_lockdebug.h"
47 1.53.4.5 yamt #include "opt_multiprocessor.h"
48 1.1 cgd
49 1.1 cgd #include <sys/param.h>
50 1.1 cgd #include <sys/mount.h>
51 1.23 thorpej #include <sys/buf.h>
52 1.1 cgd #include <sys/vnode.h>
53 1.53.4.5 yamt #include <sys/lock.h>
54 1.1 cgd
55 1.34 lukem const struct vnodeop_desc vop_default_desc = {
56 1.1 cgd 0,
57 1.1 cgd "default",
58 1.1 cgd 0,
59 1.1 cgd NULL,
60 1.1 cgd VDESC_NO_OFFSET,
61 1.1 cgd VDESC_NO_OFFSET,
62 1.1 cgd VDESC_NO_OFFSET,
63 1.1 cgd NULL,
64 1.1 cgd };
65 1.1 cgd
66 1.1 cgd
67 1.33 jdolecek /* Special cases: */
68 1.33 jdolecek
69 1.33 jdolecek const int vop_bwrite_vp_offsets[] = {
70 1.33 jdolecek VDESC_NO_OFFSET
71 1.33 jdolecek };
72 1.33 jdolecek const struct vnodeop_desc vop_bwrite_desc = {
73 1.53.4.2 yamt VOP_BWRITE_DESCOFFSET,
74 1.33 jdolecek "vop_bwrite",
75 1.33 jdolecek 0,
76 1.33 jdolecek vop_bwrite_vp_offsets,
77 1.33 jdolecek VDESC_NO_OFFSET,
78 1.33 jdolecek VDESC_NO_OFFSET,
79 1.33 jdolecek VDESC_NO_OFFSET,
80 1.33 jdolecek NULL,
81 1.33 jdolecek };
82 1.33 jdolecek int
83 1.53.4.1 yamt VOP_BWRITE(struct buf *bp)
84 1.33 jdolecek {
85 1.53.4.5 yamt int error;
86 1.53.4.5 yamt bool mpsafe;
87 1.33 jdolecek struct vop_bwrite_args a;
88 1.50 thorpej #ifdef VNODE_LOCKDEBUG
89 1.50 thorpej #endif
90 1.33 jdolecek a.a_desc = VDESC(vop_bwrite);
91 1.33 jdolecek a.a_bp = bp;
92 1.53.4.5 yamt mpsafe = (bp->b_vp->v_vflag & VV_MPSAFE);
93 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
94 1.53.4.5 yamt error = (VCALL(bp->b_vp, VOFFSET(vop_bwrite), &a));
95 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
96 1.53.4.5 yamt return error;
97 1.33 jdolecek }
98 1.33 jdolecek
99 1.33 jdolecek /* End of special cases */
100 1.33 jdolecek
101 1.31 jdolecek const int vop_lookup_vp_offsets[] = {
102 1.1 cgd VOPARG_OFFSETOF(struct vop_lookup_args,a_dvp),
103 1.1 cgd VDESC_NO_OFFSET
104 1.1 cgd };
105 1.33 jdolecek const struct vnodeop_desc vop_lookup_desc = {
106 1.53.4.2 yamt VOP_LOOKUP_DESCOFFSET,
107 1.1 cgd "vop_lookup",
108 1.1 cgd 0,
109 1.1 cgd vop_lookup_vp_offsets,
110 1.1 cgd VOPARG_OFFSETOF(struct vop_lookup_args, a_vpp),
111 1.1 cgd VDESC_NO_OFFSET,
112 1.1 cgd VOPARG_OFFSETOF(struct vop_lookup_args, a_cnp),
113 1.1 cgd NULL,
114 1.1 cgd };
115 1.23 thorpej int
116 1.53.4.1 yamt VOP_LOOKUP(struct vnode *dvp,
117 1.53.4.1 yamt struct vnode **vpp,
118 1.53.4.1 yamt struct componentname *cnp)
119 1.23 thorpej {
120 1.53.4.5 yamt int error;
121 1.53.4.5 yamt bool mpsafe;
122 1.23 thorpej struct vop_lookup_args a;
123 1.50 thorpej #ifdef VNODE_LOCKDEBUG
124 1.50 thorpej #endif
125 1.23 thorpej a.a_desc = VDESC(vop_lookup);
126 1.23 thorpej a.a_dvp = dvp;
127 1.23 thorpej a.a_vpp = vpp;
128 1.23 thorpej a.a_cnp = cnp;
129 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
130 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
131 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_lookup), &a));
132 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
133 1.53.4.3 yamt #ifdef DIAGNOSTIC
134 1.53.4.5 yamt if (error == 0)
135 1.53.4.3 yamt KASSERT((*vpp)->v_size != VSIZENOTSET
136 1.53.4.3 yamt && (*vpp)->v_writesize != VSIZENOTSET);
137 1.53.4.3 yamt #endif /* DIAGNOSTIC */
138 1.53.4.5 yamt return error;
139 1.23 thorpej }
140 1.1 cgd
141 1.31 jdolecek const int vop_create_vp_offsets[] = {
142 1.1 cgd VOPARG_OFFSETOF(struct vop_create_args,a_dvp),
143 1.1 cgd VDESC_NO_OFFSET
144 1.1 cgd };
145 1.33 jdolecek const struct vnodeop_desc vop_create_desc = {
146 1.53.4.2 yamt VOP_CREATE_DESCOFFSET,
147 1.1 cgd "vop_create",
148 1.17 wrstuden 0 | VDESC_VP0_WILLPUT,
149 1.1 cgd vop_create_vp_offsets,
150 1.1 cgd VOPARG_OFFSETOF(struct vop_create_args, a_vpp),
151 1.1 cgd VDESC_NO_OFFSET,
152 1.1 cgd VOPARG_OFFSETOF(struct vop_create_args, a_cnp),
153 1.1 cgd NULL,
154 1.1 cgd };
155 1.23 thorpej int
156 1.53.4.1 yamt VOP_CREATE(struct vnode *dvp,
157 1.53.4.1 yamt struct vnode **vpp,
158 1.53.4.1 yamt struct componentname *cnp,
159 1.53.4.1 yamt struct vattr *vap)
160 1.23 thorpej {
161 1.53.4.5 yamt int error;
162 1.53.4.5 yamt bool mpsafe;
163 1.23 thorpej struct vop_create_args a;
164 1.50 thorpej #ifdef VNODE_LOCKDEBUG
165 1.50 thorpej int islocked_dvp;
166 1.50 thorpej #endif
167 1.23 thorpej a.a_desc = VDESC(vop_create);
168 1.23 thorpej a.a_dvp = dvp;
169 1.50 thorpej #ifdef VNODE_LOCKDEBUG
170 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
171 1.50 thorpej if (islocked_dvp != 1)
172 1.50 thorpej panic("vop_create: dvp: locked %d, expected %d", islocked_dvp, 1);
173 1.50 thorpej #endif
174 1.23 thorpej a.a_vpp = vpp;
175 1.23 thorpej a.a_cnp = cnp;
176 1.23 thorpej a.a_vap = vap;
177 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
178 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
179 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_create), &a));
180 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
181 1.53.4.3 yamt #ifdef DIAGNOSTIC
182 1.53.4.5 yamt if (error == 0)
183 1.53.4.3 yamt KASSERT((*vpp)->v_size != VSIZENOTSET
184 1.53.4.3 yamt && (*vpp)->v_writesize != VSIZENOTSET);
185 1.53.4.3 yamt #endif /* DIAGNOSTIC */
186 1.53.4.5 yamt return error;
187 1.23 thorpej }
188 1.1 cgd
189 1.31 jdolecek const int vop_mknod_vp_offsets[] = {
190 1.1 cgd VOPARG_OFFSETOF(struct vop_mknod_args,a_dvp),
191 1.1 cgd VDESC_NO_OFFSET
192 1.1 cgd };
193 1.33 jdolecek const struct vnodeop_desc vop_mknod_desc = {
194 1.53.4.2 yamt VOP_MKNOD_DESCOFFSET,
195 1.1 cgd "vop_mknod",
196 1.37 assar 0 | VDESC_VP0_WILLPUT,
197 1.1 cgd vop_mknod_vp_offsets,
198 1.1 cgd VOPARG_OFFSETOF(struct vop_mknod_args, a_vpp),
199 1.1 cgd VDESC_NO_OFFSET,
200 1.1 cgd VOPARG_OFFSETOF(struct vop_mknod_args, a_cnp),
201 1.1 cgd NULL,
202 1.1 cgd };
203 1.23 thorpej int
204 1.53.4.1 yamt VOP_MKNOD(struct vnode *dvp,
205 1.53.4.1 yamt struct vnode **vpp,
206 1.53.4.1 yamt struct componentname *cnp,
207 1.53.4.1 yamt struct vattr *vap)
208 1.23 thorpej {
209 1.53.4.5 yamt int error;
210 1.53.4.5 yamt bool mpsafe;
211 1.23 thorpej struct vop_mknod_args a;
212 1.50 thorpej #ifdef VNODE_LOCKDEBUG
213 1.50 thorpej int islocked_dvp;
214 1.50 thorpej #endif
215 1.23 thorpej a.a_desc = VDESC(vop_mknod);
216 1.23 thorpej a.a_dvp = dvp;
217 1.50 thorpej #ifdef VNODE_LOCKDEBUG
218 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
219 1.50 thorpej if (islocked_dvp != 1)
220 1.50 thorpej panic("vop_mknod: dvp: locked %d, expected %d", islocked_dvp, 1);
221 1.50 thorpej #endif
222 1.23 thorpej a.a_vpp = vpp;
223 1.23 thorpej a.a_cnp = cnp;
224 1.23 thorpej a.a_vap = vap;
225 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
226 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
227 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_mknod), &a));
228 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
229 1.53.4.3 yamt #ifdef DIAGNOSTIC
230 1.53.4.5 yamt if (error == 0)
231 1.53.4.3 yamt KASSERT((*vpp)->v_size != VSIZENOTSET
232 1.53.4.3 yamt && (*vpp)->v_writesize != VSIZENOTSET);
233 1.53.4.3 yamt #endif /* DIAGNOSTIC */
234 1.53.4.5 yamt return error;
235 1.23 thorpej }
236 1.1 cgd
237 1.31 jdolecek const int vop_open_vp_offsets[] = {
238 1.1 cgd VOPARG_OFFSETOF(struct vop_open_args,a_vp),
239 1.1 cgd VDESC_NO_OFFSET
240 1.1 cgd };
241 1.33 jdolecek const struct vnodeop_desc vop_open_desc = {
242 1.53.4.2 yamt VOP_OPEN_DESCOFFSET,
243 1.1 cgd "vop_open",
244 1.1 cgd 0,
245 1.1 cgd vop_open_vp_offsets,
246 1.1 cgd VDESC_NO_OFFSET,
247 1.1 cgd VOPARG_OFFSETOF(struct vop_open_args, a_cred),
248 1.1 cgd VDESC_NO_OFFSET,
249 1.1 cgd NULL,
250 1.1 cgd };
251 1.23 thorpej int
252 1.53.4.1 yamt VOP_OPEN(struct vnode *vp,
253 1.53.4.1 yamt int mode,
254 1.53.4.6 yamt kauth_cred_t cred)
255 1.23 thorpej {
256 1.53.4.5 yamt int error;
257 1.53.4.5 yamt bool mpsafe;
258 1.23 thorpej struct vop_open_args a;
259 1.50 thorpej #ifdef VNODE_LOCKDEBUG
260 1.50 thorpej int islocked_vp;
261 1.50 thorpej #endif
262 1.23 thorpej a.a_desc = VDESC(vop_open);
263 1.23 thorpej a.a_vp = vp;
264 1.50 thorpej #ifdef VNODE_LOCKDEBUG
265 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
266 1.50 thorpej if (islocked_vp != 1)
267 1.50 thorpej panic("vop_open: vp: locked %d, expected %d", islocked_vp, 1);
268 1.50 thorpej #endif
269 1.23 thorpej a.a_mode = mode;
270 1.23 thorpej a.a_cred = cred;
271 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
272 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
273 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_open), &a));
274 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
275 1.53.4.5 yamt return error;
276 1.23 thorpej }
277 1.1 cgd
278 1.31 jdolecek const int vop_close_vp_offsets[] = {
279 1.1 cgd VOPARG_OFFSETOF(struct vop_close_args,a_vp),
280 1.1 cgd VDESC_NO_OFFSET
281 1.1 cgd };
282 1.33 jdolecek const struct vnodeop_desc vop_close_desc = {
283 1.53.4.2 yamt VOP_CLOSE_DESCOFFSET,
284 1.1 cgd "vop_close",
285 1.1 cgd 0,
286 1.1 cgd vop_close_vp_offsets,
287 1.1 cgd VDESC_NO_OFFSET,
288 1.1 cgd VOPARG_OFFSETOF(struct vop_close_args, a_cred),
289 1.1 cgd VDESC_NO_OFFSET,
290 1.1 cgd NULL,
291 1.1 cgd };
292 1.23 thorpej int
293 1.53.4.1 yamt VOP_CLOSE(struct vnode *vp,
294 1.53.4.1 yamt int fflag,
295 1.53.4.6 yamt kauth_cred_t cred)
296 1.23 thorpej {
297 1.53.4.5 yamt int error;
298 1.53.4.5 yamt bool mpsafe;
299 1.23 thorpej struct vop_close_args a;
300 1.50 thorpej #ifdef VNODE_LOCKDEBUG
301 1.50 thorpej int islocked_vp;
302 1.50 thorpej #endif
303 1.23 thorpej a.a_desc = VDESC(vop_close);
304 1.23 thorpej a.a_vp = vp;
305 1.50 thorpej #ifdef VNODE_LOCKDEBUG
306 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
307 1.50 thorpej if (islocked_vp != 1)
308 1.50 thorpej panic("vop_close: vp: locked %d, expected %d", islocked_vp, 1);
309 1.50 thorpej #endif
310 1.23 thorpej a.a_fflag = fflag;
311 1.23 thorpej a.a_cred = cred;
312 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
313 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
314 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_close), &a));
315 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
316 1.53.4.5 yamt return error;
317 1.23 thorpej }
318 1.1 cgd
319 1.31 jdolecek const int vop_access_vp_offsets[] = {
320 1.1 cgd VOPARG_OFFSETOF(struct vop_access_args,a_vp),
321 1.1 cgd VDESC_NO_OFFSET
322 1.1 cgd };
323 1.33 jdolecek const struct vnodeop_desc vop_access_desc = {
324 1.53.4.2 yamt VOP_ACCESS_DESCOFFSET,
325 1.1 cgd "vop_access",
326 1.1 cgd 0,
327 1.1 cgd vop_access_vp_offsets,
328 1.1 cgd VDESC_NO_OFFSET,
329 1.1 cgd VOPARG_OFFSETOF(struct vop_access_args, a_cred),
330 1.1 cgd VDESC_NO_OFFSET,
331 1.1 cgd NULL,
332 1.1 cgd };
333 1.23 thorpej int
334 1.53.4.1 yamt VOP_ACCESS(struct vnode *vp,
335 1.53.4.1 yamt int mode,
336 1.53.4.6 yamt kauth_cred_t cred)
337 1.23 thorpej {
338 1.53.4.5 yamt int error;
339 1.53.4.5 yamt bool mpsafe;
340 1.23 thorpej struct vop_access_args a;
341 1.50 thorpej #ifdef VNODE_LOCKDEBUG
342 1.50 thorpej int islocked_vp;
343 1.50 thorpej #endif
344 1.23 thorpej a.a_desc = VDESC(vop_access);
345 1.23 thorpej a.a_vp = vp;
346 1.50 thorpej #ifdef VNODE_LOCKDEBUG
347 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
348 1.50 thorpej if (islocked_vp != 1)
349 1.50 thorpej panic("vop_access: vp: locked %d, expected %d", islocked_vp, 1);
350 1.50 thorpej #endif
351 1.23 thorpej a.a_mode = mode;
352 1.23 thorpej a.a_cred = cred;
353 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
354 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
355 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_access), &a));
356 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
357 1.53.4.5 yamt return error;
358 1.23 thorpej }
359 1.1 cgd
360 1.31 jdolecek const int vop_getattr_vp_offsets[] = {
361 1.1 cgd VOPARG_OFFSETOF(struct vop_getattr_args,a_vp),
362 1.1 cgd VDESC_NO_OFFSET
363 1.1 cgd };
364 1.33 jdolecek const struct vnodeop_desc vop_getattr_desc = {
365 1.53.4.2 yamt VOP_GETATTR_DESCOFFSET,
366 1.1 cgd "vop_getattr",
367 1.1 cgd 0,
368 1.1 cgd vop_getattr_vp_offsets,
369 1.1 cgd VDESC_NO_OFFSET,
370 1.1 cgd VOPARG_OFFSETOF(struct vop_getattr_args, a_cred),
371 1.1 cgd VDESC_NO_OFFSET,
372 1.1 cgd NULL,
373 1.1 cgd };
374 1.23 thorpej int
375 1.53.4.1 yamt VOP_GETATTR(struct vnode *vp,
376 1.53.4.1 yamt struct vattr *vap,
377 1.53.4.6 yamt kauth_cred_t cred)
378 1.23 thorpej {
379 1.53.4.5 yamt int error;
380 1.53.4.5 yamt bool mpsafe;
381 1.23 thorpej struct vop_getattr_args a;
382 1.50 thorpej #ifdef VNODE_LOCKDEBUG
383 1.50 thorpej #endif
384 1.23 thorpej a.a_desc = VDESC(vop_getattr);
385 1.23 thorpej a.a_vp = vp;
386 1.23 thorpej a.a_vap = vap;
387 1.23 thorpej a.a_cred = cred;
388 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
389 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
390 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_getattr), &a));
391 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
392 1.53.4.5 yamt return error;
393 1.23 thorpej }
394 1.1 cgd
395 1.31 jdolecek const int vop_setattr_vp_offsets[] = {
396 1.1 cgd VOPARG_OFFSETOF(struct vop_setattr_args,a_vp),
397 1.1 cgd VDESC_NO_OFFSET
398 1.1 cgd };
399 1.33 jdolecek const struct vnodeop_desc vop_setattr_desc = {
400 1.53.4.2 yamt VOP_SETATTR_DESCOFFSET,
401 1.1 cgd "vop_setattr",
402 1.1 cgd 0,
403 1.1 cgd vop_setattr_vp_offsets,
404 1.1 cgd VDESC_NO_OFFSET,
405 1.1 cgd VOPARG_OFFSETOF(struct vop_setattr_args, a_cred),
406 1.1 cgd VDESC_NO_OFFSET,
407 1.1 cgd NULL,
408 1.1 cgd };
409 1.23 thorpej int
410 1.53.4.1 yamt VOP_SETATTR(struct vnode *vp,
411 1.53.4.1 yamt struct vattr *vap,
412 1.53.4.6 yamt kauth_cred_t cred)
413 1.23 thorpej {
414 1.53.4.5 yamt int error;
415 1.53.4.5 yamt bool mpsafe;
416 1.23 thorpej struct vop_setattr_args a;
417 1.50 thorpej #ifdef VNODE_LOCKDEBUG
418 1.50 thorpej int islocked_vp;
419 1.50 thorpej #endif
420 1.23 thorpej a.a_desc = VDESC(vop_setattr);
421 1.23 thorpej a.a_vp = vp;
422 1.50 thorpej #ifdef VNODE_LOCKDEBUG
423 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
424 1.50 thorpej if (islocked_vp != 1)
425 1.50 thorpej panic("vop_setattr: vp: locked %d, expected %d", islocked_vp, 1);
426 1.50 thorpej #endif
427 1.23 thorpej a.a_vap = vap;
428 1.23 thorpej a.a_cred = cred;
429 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
430 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
431 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_setattr), &a));
432 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
433 1.53.4.5 yamt return error;
434 1.23 thorpej }
435 1.1 cgd
436 1.31 jdolecek const int vop_read_vp_offsets[] = {
437 1.1 cgd VOPARG_OFFSETOF(struct vop_read_args,a_vp),
438 1.1 cgd VDESC_NO_OFFSET
439 1.1 cgd };
440 1.33 jdolecek const struct vnodeop_desc vop_read_desc = {
441 1.53.4.2 yamt VOP_READ_DESCOFFSET,
442 1.1 cgd "vop_read",
443 1.1 cgd 0,
444 1.1 cgd vop_read_vp_offsets,
445 1.1 cgd VDESC_NO_OFFSET,
446 1.1 cgd VOPARG_OFFSETOF(struct vop_read_args, a_cred),
447 1.1 cgd VDESC_NO_OFFSET,
448 1.1 cgd NULL,
449 1.1 cgd };
450 1.23 thorpej int
451 1.53.4.1 yamt VOP_READ(struct vnode *vp,
452 1.53.4.1 yamt struct uio *uio,
453 1.53.4.1 yamt int ioflag,
454 1.53.4.1 yamt kauth_cred_t cred)
455 1.23 thorpej {
456 1.53.4.5 yamt int error;
457 1.53.4.5 yamt bool mpsafe;
458 1.23 thorpej struct vop_read_args a;
459 1.50 thorpej #ifdef VNODE_LOCKDEBUG
460 1.50 thorpej int islocked_vp;
461 1.50 thorpej #endif
462 1.23 thorpej a.a_desc = VDESC(vop_read);
463 1.23 thorpej a.a_vp = vp;
464 1.50 thorpej #ifdef VNODE_LOCKDEBUG
465 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
466 1.50 thorpej if (islocked_vp != 1)
467 1.50 thorpej panic("vop_read: vp: locked %d, expected %d", islocked_vp, 1);
468 1.50 thorpej #endif
469 1.23 thorpej a.a_uio = uio;
470 1.23 thorpej a.a_ioflag = ioflag;
471 1.23 thorpej a.a_cred = cred;
472 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
473 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
474 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_read), &a));
475 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
476 1.53.4.5 yamt return error;
477 1.23 thorpej }
478 1.1 cgd
479 1.31 jdolecek const int vop_write_vp_offsets[] = {
480 1.1 cgd VOPARG_OFFSETOF(struct vop_write_args,a_vp),
481 1.1 cgd VDESC_NO_OFFSET
482 1.1 cgd };
483 1.33 jdolecek const struct vnodeop_desc vop_write_desc = {
484 1.53.4.2 yamt VOP_WRITE_DESCOFFSET,
485 1.1 cgd "vop_write",
486 1.1 cgd 0,
487 1.1 cgd vop_write_vp_offsets,
488 1.1 cgd VDESC_NO_OFFSET,
489 1.1 cgd VOPARG_OFFSETOF(struct vop_write_args, a_cred),
490 1.1 cgd VDESC_NO_OFFSET,
491 1.1 cgd NULL,
492 1.1 cgd };
493 1.23 thorpej int
494 1.53.4.1 yamt VOP_WRITE(struct vnode *vp,
495 1.53.4.1 yamt struct uio *uio,
496 1.53.4.1 yamt int ioflag,
497 1.53.4.1 yamt kauth_cred_t cred)
498 1.23 thorpej {
499 1.53.4.5 yamt int error;
500 1.53.4.5 yamt bool mpsafe;
501 1.23 thorpej struct vop_write_args a;
502 1.50 thorpej #ifdef VNODE_LOCKDEBUG
503 1.50 thorpej int islocked_vp;
504 1.50 thorpej #endif
505 1.23 thorpej a.a_desc = VDESC(vop_write);
506 1.23 thorpej a.a_vp = vp;
507 1.50 thorpej #ifdef VNODE_LOCKDEBUG
508 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
509 1.50 thorpej if (islocked_vp != 1)
510 1.50 thorpej panic("vop_write: vp: locked %d, expected %d", islocked_vp, 1);
511 1.50 thorpej #endif
512 1.23 thorpej a.a_uio = uio;
513 1.23 thorpej a.a_ioflag = ioflag;
514 1.23 thorpej a.a_cred = cred;
515 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
516 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
517 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_write), &a));
518 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
519 1.53.4.5 yamt return error;
520 1.23 thorpej }
521 1.1 cgd
522 1.31 jdolecek const int vop_ioctl_vp_offsets[] = {
523 1.1 cgd VOPARG_OFFSETOF(struct vop_ioctl_args,a_vp),
524 1.1 cgd VDESC_NO_OFFSET
525 1.1 cgd };
526 1.33 jdolecek const struct vnodeop_desc vop_ioctl_desc = {
527 1.53.4.2 yamt VOP_IOCTL_DESCOFFSET,
528 1.1 cgd "vop_ioctl",
529 1.1 cgd 0,
530 1.1 cgd vop_ioctl_vp_offsets,
531 1.1 cgd VDESC_NO_OFFSET,
532 1.1 cgd VOPARG_OFFSETOF(struct vop_ioctl_args, a_cred),
533 1.1 cgd VDESC_NO_OFFSET,
534 1.1 cgd NULL,
535 1.1 cgd };
536 1.23 thorpej int
537 1.53.4.1 yamt VOP_IOCTL(struct vnode *vp,
538 1.53.4.1 yamt u_long command,
539 1.53.4.1 yamt void *data,
540 1.53.4.1 yamt int fflag,
541 1.53.4.6 yamt kauth_cred_t cred)
542 1.23 thorpej {
543 1.53.4.5 yamt int error;
544 1.53.4.5 yamt bool mpsafe;
545 1.23 thorpej struct vop_ioctl_args a;
546 1.50 thorpej #ifdef VNODE_LOCKDEBUG
547 1.50 thorpej int islocked_vp;
548 1.50 thorpej #endif
549 1.23 thorpej a.a_desc = VDESC(vop_ioctl);
550 1.23 thorpej a.a_vp = vp;
551 1.50 thorpej #ifdef VNODE_LOCKDEBUG
552 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
553 1.50 thorpej if (islocked_vp != 0)
554 1.50 thorpej panic("vop_ioctl: vp: locked %d, expected %d", islocked_vp, 0);
555 1.50 thorpej #endif
556 1.23 thorpej a.a_command = command;
557 1.23 thorpej a.a_data = data;
558 1.23 thorpej a.a_fflag = fflag;
559 1.23 thorpej a.a_cred = cred;
560 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
561 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
562 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_ioctl), &a));
563 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
564 1.53.4.5 yamt return error;
565 1.23 thorpej }
566 1.1 cgd
567 1.31 jdolecek const int vop_fcntl_vp_offsets[] = {
568 1.18 wrstuden VOPARG_OFFSETOF(struct vop_fcntl_args,a_vp),
569 1.18 wrstuden VDESC_NO_OFFSET
570 1.18 wrstuden };
571 1.33 jdolecek const struct vnodeop_desc vop_fcntl_desc = {
572 1.53.4.2 yamt VOP_FCNTL_DESCOFFSET,
573 1.18 wrstuden "vop_fcntl",
574 1.18 wrstuden 0,
575 1.18 wrstuden vop_fcntl_vp_offsets,
576 1.18 wrstuden VDESC_NO_OFFSET,
577 1.18 wrstuden VOPARG_OFFSETOF(struct vop_fcntl_args, a_cred),
578 1.18 wrstuden VDESC_NO_OFFSET,
579 1.18 wrstuden NULL,
580 1.18 wrstuden };
581 1.23 thorpej int
582 1.53.4.1 yamt VOP_FCNTL(struct vnode *vp,
583 1.53.4.1 yamt u_int command,
584 1.53.4.1 yamt void *data,
585 1.53.4.1 yamt int fflag,
586 1.53.4.6 yamt kauth_cred_t cred)
587 1.23 thorpej {
588 1.53.4.5 yamt int error;
589 1.53.4.5 yamt bool mpsafe;
590 1.23 thorpej struct vop_fcntl_args a;
591 1.50 thorpej #ifdef VNODE_LOCKDEBUG
592 1.50 thorpej int islocked_vp;
593 1.50 thorpej #endif
594 1.23 thorpej a.a_desc = VDESC(vop_fcntl);
595 1.23 thorpej a.a_vp = vp;
596 1.50 thorpej #ifdef VNODE_LOCKDEBUG
597 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
598 1.53.4.1 yamt if (islocked_vp != 0)
599 1.53.4.1 yamt panic("vop_fcntl: vp: locked %d, expected %d", islocked_vp, 0);
600 1.50 thorpej #endif
601 1.23 thorpej a.a_command = command;
602 1.23 thorpej a.a_data = data;
603 1.23 thorpej a.a_fflag = fflag;
604 1.23 thorpej a.a_cred = cred;
605 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
606 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
607 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_fcntl), &a));
608 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
609 1.53.4.5 yamt return error;
610 1.23 thorpej }
611 1.18 wrstuden
612 1.31 jdolecek const int vop_poll_vp_offsets[] = {
613 1.3 mycroft VOPARG_OFFSETOF(struct vop_poll_args,a_vp),
614 1.1 cgd VDESC_NO_OFFSET
615 1.1 cgd };
616 1.33 jdolecek const struct vnodeop_desc vop_poll_desc = {
617 1.53.4.2 yamt VOP_POLL_DESCOFFSET,
618 1.3 mycroft "vop_poll",
619 1.1 cgd 0,
620 1.3 mycroft vop_poll_vp_offsets,
621 1.1 cgd VDESC_NO_OFFSET,
622 1.3 mycroft VDESC_NO_OFFSET,
623 1.1 cgd VDESC_NO_OFFSET,
624 1.1 cgd NULL,
625 1.1 cgd };
626 1.23 thorpej int
627 1.53.4.1 yamt VOP_POLL(struct vnode *vp,
628 1.53.4.6 yamt int events)
629 1.23 thorpej {
630 1.53.4.5 yamt int error;
631 1.53.4.5 yamt bool mpsafe;
632 1.23 thorpej struct vop_poll_args a;
633 1.50 thorpej #ifdef VNODE_LOCKDEBUG
634 1.50 thorpej int islocked_vp;
635 1.50 thorpej #endif
636 1.23 thorpej a.a_desc = VDESC(vop_poll);
637 1.23 thorpej a.a_vp = vp;
638 1.50 thorpej #ifdef VNODE_LOCKDEBUG
639 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
640 1.50 thorpej if (islocked_vp != 0)
641 1.50 thorpej panic("vop_poll: vp: locked %d, expected %d", islocked_vp, 0);
642 1.50 thorpej #endif
643 1.23 thorpej a.a_events = events;
644 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
645 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
646 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_poll), &a));
647 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
648 1.53.4.5 yamt return error;
649 1.23 thorpej }
650 1.1 cgd
651 1.40 jdolecek const int vop_kqfilter_vp_offsets[] = {
652 1.40 jdolecek VOPARG_OFFSETOF(struct vop_kqfilter_args,a_vp),
653 1.40 jdolecek VDESC_NO_OFFSET
654 1.40 jdolecek };
655 1.40 jdolecek const struct vnodeop_desc vop_kqfilter_desc = {
656 1.53.4.2 yamt VOP_KQFILTER_DESCOFFSET,
657 1.40 jdolecek "vop_kqfilter",
658 1.40 jdolecek 0,
659 1.40 jdolecek vop_kqfilter_vp_offsets,
660 1.40 jdolecek VDESC_NO_OFFSET,
661 1.40 jdolecek VDESC_NO_OFFSET,
662 1.40 jdolecek VDESC_NO_OFFSET,
663 1.40 jdolecek NULL,
664 1.40 jdolecek };
665 1.40 jdolecek int
666 1.53.4.1 yamt VOP_KQFILTER(struct vnode *vp,
667 1.53.4.1 yamt struct knote *kn)
668 1.40 jdolecek {
669 1.53.4.5 yamt int error;
670 1.53.4.5 yamt bool mpsafe;
671 1.40 jdolecek struct vop_kqfilter_args a;
672 1.50 thorpej #ifdef VNODE_LOCKDEBUG
673 1.50 thorpej int islocked_vp;
674 1.50 thorpej #endif
675 1.40 jdolecek a.a_desc = VDESC(vop_kqfilter);
676 1.40 jdolecek a.a_vp = vp;
677 1.50 thorpej #ifdef VNODE_LOCKDEBUG
678 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
679 1.50 thorpej if (islocked_vp != 0)
680 1.50 thorpej panic("vop_kqfilter: vp: locked %d, expected %d", islocked_vp, 0);
681 1.50 thorpej #endif
682 1.40 jdolecek a.a_kn = kn;
683 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
684 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
685 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_kqfilter), &a));
686 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
687 1.53.4.5 yamt return error;
688 1.40 jdolecek }
689 1.40 jdolecek
690 1.31 jdolecek const int vop_revoke_vp_offsets[] = {
691 1.10 fvdl VOPARG_OFFSETOF(struct vop_revoke_args,a_vp),
692 1.10 fvdl VDESC_NO_OFFSET
693 1.10 fvdl };
694 1.33 jdolecek const struct vnodeop_desc vop_revoke_desc = {
695 1.53.4.2 yamt VOP_REVOKE_DESCOFFSET,
696 1.10 fvdl "vop_revoke",
697 1.10 fvdl 0,
698 1.10 fvdl vop_revoke_vp_offsets,
699 1.10 fvdl VDESC_NO_OFFSET,
700 1.10 fvdl VDESC_NO_OFFSET,
701 1.10 fvdl VDESC_NO_OFFSET,
702 1.10 fvdl NULL,
703 1.10 fvdl };
704 1.23 thorpej int
705 1.53.4.1 yamt VOP_REVOKE(struct vnode *vp,
706 1.53.4.1 yamt int flags)
707 1.23 thorpej {
708 1.53.4.5 yamt int error;
709 1.53.4.5 yamt bool mpsafe;
710 1.23 thorpej struct vop_revoke_args a;
711 1.50 thorpej #ifdef VNODE_LOCKDEBUG
712 1.50 thorpej int islocked_vp;
713 1.50 thorpej #endif
714 1.23 thorpej a.a_desc = VDESC(vop_revoke);
715 1.23 thorpej a.a_vp = vp;
716 1.50 thorpej #ifdef VNODE_LOCKDEBUG
717 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
718 1.50 thorpej if (islocked_vp != 0)
719 1.50 thorpej panic("vop_revoke: vp: locked %d, expected %d", islocked_vp, 0);
720 1.50 thorpej #endif
721 1.23 thorpej a.a_flags = flags;
722 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
723 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
724 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_revoke), &a));
725 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
726 1.53.4.5 yamt return error;
727 1.23 thorpej }
728 1.10 fvdl
729 1.31 jdolecek const int vop_mmap_vp_offsets[] = {
730 1.1 cgd VOPARG_OFFSETOF(struct vop_mmap_args,a_vp),
731 1.1 cgd VDESC_NO_OFFSET
732 1.1 cgd };
733 1.33 jdolecek const struct vnodeop_desc vop_mmap_desc = {
734 1.53.4.2 yamt VOP_MMAP_DESCOFFSET,
735 1.1 cgd "vop_mmap",
736 1.1 cgd 0,
737 1.1 cgd vop_mmap_vp_offsets,
738 1.1 cgd VDESC_NO_OFFSET,
739 1.1 cgd VOPARG_OFFSETOF(struct vop_mmap_args, a_cred),
740 1.1 cgd VDESC_NO_OFFSET,
741 1.1 cgd NULL,
742 1.1 cgd };
743 1.23 thorpej int
744 1.53.4.1 yamt VOP_MMAP(struct vnode *vp,
745 1.53.4.3 yamt vm_prot_t prot,
746 1.53.4.6 yamt kauth_cred_t cred)
747 1.23 thorpej {
748 1.53.4.5 yamt int error;
749 1.53.4.5 yamt bool mpsafe;
750 1.23 thorpej struct vop_mmap_args a;
751 1.50 thorpej #ifdef VNODE_LOCKDEBUG
752 1.50 thorpej #endif
753 1.23 thorpej a.a_desc = VDESC(vop_mmap);
754 1.23 thorpej a.a_vp = vp;
755 1.53.4.3 yamt a.a_prot = prot;
756 1.23 thorpej a.a_cred = cred;
757 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
758 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
759 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_mmap), &a));
760 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
761 1.53.4.5 yamt return error;
762 1.23 thorpej }
763 1.1 cgd
764 1.31 jdolecek const int vop_fsync_vp_offsets[] = {
765 1.1 cgd VOPARG_OFFSETOF(struct vop_fsync_args,a_vp),
766 1.1 cgd VDESC_NO_OFFSET
767 1.1 cgd };
768 1.33 jdolecek const struct vnodeop_desc vop_fsync_desc = {
769 1.53.4.2 yamt VOP_FSYNC_DESCOFFSET,
770 1.1 cgd "vop_fsync",
771 1.1 cgd 0,
772 1.1 cgd vop_fsync_vp_offsets,
773 1.1 cgd VDESC_NO_OFFSET,
774 1.1 cgd VOPARG_OFFSETOF(struct vop_fsync_args, a_cred),
775 1.1 cgd VDESC_NO_OFFSET,
776 1.1 cgd NULL,
777 1.1 cgd };
778 1.23 thorpej int
779 1.53.4.1 yamt VOP_FSYNC(struct vnode *vp,
780 1.53.4.1 yamt kauth_cred_t cred,
781 1.53.4.1 yamt int flags,
782 1.53.4.1 yamt off_t offlo,
783 1.53.4.6 yamt off_t offhi)
784 1.23 thorpej {
785 1.53.4.5 yamt int error;
786 1.53.4.5 yamt bool mpsafe;
787 1.23 thorpej struct vop_fsync_args a;
788 1.50 thorpej #ifdef VNODE_LOCKDEBUG
789 1.50 thorpej int islocked_vp;
790 1.50 thorpej #endif
791 1.23 thorpej a.a_desc = VDESC(vop_fsync);
792 1.23 thorpej a.a_vp = vp;
793 1.50 thorpej #ifdef VNODE_LOCKDEBUG
794 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
795 1.50 thorpej if (islocked_vp != 1)
796 1.50 thorpej panic("vop_fsync: vp: locked %d, expected %d", islocked_vp, 1);
797 1.50 thorpej #endif
798 1.23 thorpej a.a_cred = cred;
799 1.23 thorpej a.a_flags = flags;
800 1.25 fvdl a.a_offlo = offlo;
801 1.25 fvdl a.a_offhi = offhi;
802 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
803 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
804 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_fsync), &a));
805 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
806 1.53.4.5 yamt return error;
807 1.23 thorpej }
808 1.1 cgd
809 1.31 jdolecek const int vop_seek_vp_offsets[] = {
810 1.1 cgd VOPARG_OFFSETOF(struct vop_seek_args,a_vp),
811 1.1 cgd VDESC_NO_OFFSET
812 1.1 cgd };
813 1.33 jdolecek const struct vnodeop_desc vop_seek_desc = {
814 1.53.4.2 yamt VOP_SEEK_DESCOFFSET,
815 1.1 cgd "vop_seek",
816 1.1 cgd 0,
817 1.1 cgd vop_seek_vp_offsets,
818 1.1 cgd VDESC_NO_OFFSET,
819 1.1 cgd VOPARG_OFFSETOF(struct vop_seek_args, a_cred),
820 1.1 cgd VDESC_NO_OFFSET,
821 1.1 cgd NULL,
822 1.1 cgd };
823 1.23 thorpej int
824 1.53.4.1 yamt VOP_SEEK(struct vnode *vp,
825 1.53.4.1 yamt off_t oldoff,
826 1.53.4.1 yamt off_t newoff,
827 1.53.4.1 yamt kauth_cred_t cred)
828 1.23 thorpej {
829 1.53.4.5 yamt int error;
830 1.53.4.5 yamt bool mpsafe;
831 1.23 thorpej struct vop_seek_args a;
832 1.50 thorpej #ifdef VNODE_LOCKDEBUG
833 1.50 thorpej #endif
834 1.23 thorpej a.a_desc = VDESC(vop_seek);
835 1.23 thorpej a.a_vp = vp;
836 1.23 thorpej a.a_oldoff = oldoff;
837 1.23 thorpej a.a_newoff = newoff;
838 1.23 thorpej a.a_cred = cred;
839 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
840 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
841 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_seek), &a));
842 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
843 1.53.4.5 yamt return error;
844 1.23 thorpej }
845 1.1 cgd
846 1.31 jdolecek const int vop_remove_vp_offsets[] = {
847 1.1 cgd VOPARG_OFFSETOF(struct vop_remove_args,a_dvp),
848 1.1 cgd VOPARG_OFFSETOF(struct vop_remove_args,a_vp),
849 1.1 cgd VDESC_NO_OFFSET
850 1.1 cgd };
851 1.33 jdolecek const struct vnodeop_desc vop_remove_desc = {
852 1.53.4.2 yamt VOP_REMOVE_DESCOFFSET,
853 1.1 cgd "vop_remove",
854 1.17 wrstuden 0 | VDESC_VP0_WILLPUT | VDESC_VP1_WILLPUT,
855 1.1 cgd vop_remove_vp_offsets,
856 1.1 cgd VDESC_NO_OFFSET,
857 1.1 cgd VDESC_NO_OFFSET,
858 1.1 cgd VOPARG_OFFSETOF(struct vop_remove_args, a_cnp),
859 1.1 cgd NULL,
860 1.1 cgd };
861 1.23 thorpej int
862 1.53.4.1 yamt VOP_REMOVE(struct vnode *dvp,
863 1.53.4.1 yamt struct vnode *vp,
864 1.53.4.1 yamt struct componentname *cnp)
865 1.23 thorpej {
866 1.53.4.5 yamt int error;
867 1.53.4.5 yamt bool mpsafe;
868 1.23 thorpej struct vop_remove_args a;
869 1.50 thorpej #ifdef VNODE_LOCKDEBUG
870 1.50 thorpej int islocked_dvp;
871 1.50 thorpej int islocked_vp;
872 1.50 thorpej #endif
873 1.23 thorpej a.a_desc = VDESC(vop_remove);
874 1.23 thorpej a.a_dvp = dvp;
875 1.50 thorpej #ifdef VNODE_LOCKDEBUG
876 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
877 1.50 thorpej if (islocked_dvp != 1)
878 1.50 thorpej panic("vop_remove: dvp: locked %d, expected %d", islocked_dvp, 1);
879 1.50 thorpej #endif
880 1.23 thorpej a.a_vp = vp;
881 1.50 thorpej #ifdef VNODE_LOCKDEBUG
882 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
883 1.50 thorpej if (islocked_vp != 1)
884 1.50 thorpej panic("vop_remove: vp: locked %d, expected %d", islocked_vp, 1);
885 1.50 thorpej #endif
886 1.23 thorpej a.a_cnp = cnp;
887 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
888 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
889 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_remove), &a));
890 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
891 1.53.4.5 yamt return error;
892 1.23 thorpej }
893 1.1 cgd
894 1.31 jdolecek const int vop_link_vp_offsets[] = {
895 1.1 cgd VOPARG_OFFSETOF(struct vop_link_args,a_dvp),
896 1.1 cgd VOPARG_OFFSETOF(struct vop_link_args,a_vp),
897 1.1 cgd VDESC_NO_OFFSET
898 1.1 cgd };
899 1.33 jdolecek const struct vnodeop_desc vop_link_desc = {
900 1.53.4.2 yamt VOP_LINK_DESCOFFSET,
901 1.1 cgd "vop_link",
902 1.17 wrstuden 0 | VDESC_VP0_WILLPUT,
903 1.1 cgd vop_link_vp_offsets,
904 1.1 cgd VDESC_NO_OFFSET,
905 1.1 cgd VDESC_NO_OFFSET,
906 1.1 cgd VOPARG_OFFSETOF(struct vop_link_args, a_cnp),
907 1.1 cgd NULL,
908 1.1 cgd };
909 1.23 thorpej int
910 1.53.4.1 yamt VOP_LINK(struct vnode *dvp,
911 1.53.4.1 yamt struct vnode *vp,
912 1.53.4.1 yamt struct componentname *cnp)
913 1.23 thorpej {
914 1.53.4.5 yamt int error;
915 1.53.4.5 yamt bool mpsafe;
916 1.23 thorpej struct vop_link_args a;
917 1.50 thorpej #ifdef VNODE_LOCKDEBUG
918 1.50 thorpej int islocked_dvp;
919 1.50 thorpej int islocked_vp;
920 1.50 thorpej #endif
921 1.23 thorpej a.a_desc = VDESC(vop_link);
922 1.23 thorpej a.a_dvp = dvp;
923 1.50 thorpej #ifdef VNODE_LOCKDEBUG
924 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
925 1.50 thorpej if (islocked_dvp != 1)
926 1.50 thorpej panic("vop_link: dvp: locked %d, expected %d", islocked_dvp, 1);
927 1.50 thorpej #endif
928 1.23 thorpej a.a_vp = vp;
929 1.50 thorpej #ifdef VNODE_LOCKDEBUG
930 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
931 1.50 thorpej if (islocked_vp != 0)
932 1.50 thorpej panic("vop_link: vp: locked %d, expected %d", islocked_vp, 0);
933 1.50 thorpej #endif
934 1.23 thorpej a.a_cnp = cnp;
935 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
936 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
937 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_link), &a));
938 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
939 1.53.4.5 yamt return error;
940 1.23 thorpej }
941 1.1 cgd
942 1.31 jdolecek const int vop_rename_vp_offsets[] = {
943 1.1 cgd VOPARG_OFFSETOF(struct vop_rename_args,a_fdvp),
944 1.1 cgd VOPARG_OFFSETOF(struct vop_rename_args,a_fvp),
945 1.1 cgd VOPARG_OFFSETOF(struct vop_rename_args,a_tdvp),
946 1.1 cgd VOPARG_OFFSETOF(struct vop_rename_args,a_tvp),
947 1.1 cgd VDESC_NO_OFFSET
948 1.1 cgd };
949 1.33 jdolecek const struct vnodeop_desc vop_rename_desc = {
950 1.53.4.2 yamt VOP_RENAME_DESCOFFSET,
951 1.1 cgd "vop_rename",
952 1.42 jdolecek 0 | VDESC_VP0_WILLRELE | VDESC_VP1_WILLRELE | VDESC_VP2_WILLPUT | VDESC_VP3_WILLPUT,
953 1.1 cgd vop_rename_vp_offsets,
954 1.1 cgd VDESC_NO_OFFSET,
955 1.1 cgd VDESC_NO_OFFSET,
956 1.1 cgd VOPARG_OFFSETOF(struct vop_rename_args, a_fcnp),
957 1.1 cgd NULL,
958 1.1 cgd };
959 1.23 thorpej int
960 1.53.4.1 yamt VOP_RENAME(struct vnode *fdvp,
961 1.53.4.1 yamt struct vnode *fvp,
962 1.53.4.1 yamt struct componentname *fcnp,
963 1.53.4.1 yamt struct vnode *tdvp,
964 1.53.4.1 yamt struct vnode *tvp,
965 1.53.4.1 yamt struct componentname *tcnp)
966 1.23 thorpej {
967 1.53.4.5 yamt int error;
968 1.53.4.5 yamt bool mpsafe;
969 1.23 thorpej struct vop_rename_args a;
970 1.50 thorpej #ifdef VNODE_LOCKDEBUG
971 1.50 thorpej int islocked_fdvp;
972 1.50 thorpej int islocked_fvp;
973 1.50 thorpej int islocked_tdvp;
974 1.50 thorpej #endif
975 1.23 thorpej a.a_desc = VDESC(vop_rename);
976 1.23 thorpej a.a_fdvp = fdvp;
977 1.50 thorpej #ifdef VNODE_LOCKDEBUG
978 1.53.4.4 yamt islocked_fdvp = (fdvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(fdvp) == LK_EXCLUSIVE) : 0;
979 1.50 thorpej if (islocked_fdvp != 0)
980 1.50 thorpej panic("vop_rename: fdvp: locked %d, expected %d", islocked_fdvp, 0);
981 1.50 thorpej #endif
982 1.23 thorpej a.a_fvp = fvp;
983 1.50 thorpej #ifdef VNODE_LOCKDEBUG
984 1.53.4.4 yamt islocked_fvp = (fvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(fvp) == LK_EXCLUSIVE) : 0;
985 1.50 thorpej if (islocked_fvp != 0)
986 1.50 thorpej panic("vop_rename: fvp: locked %d, expected %d", islocked_fvp, 0);
987 1.50 thorpej #endif
988 1.23 thorpej a.a_fcnp = fcnp;
989 1.23 thorpej a.a_tdvp = tdvp;
990 1.50 thorpej #ifdef VNODE_LOCKDEBUG
991 1.53.4.4 yamt islocked_tdvp = (tdvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(tdvp) == LK_EXCLUSIVE) : 1;
992 1.50 thorpej if (islocked_tdvp != 1)
993 1.50 thorpej panic("vop_rename: tdvp: locked %d, expected %d", islocked_tdvp, 1);
994 1.50 thorpej #endif
995 1.23 thorpej a.a_tvp = tvp;
996 1.23 thorpej a.a_tcnp = tcnp;
997 1.53.4.5 yamt mpsafe = (fdvp->v_vflag & VV_MPSAFE);
998 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
999 1.53.4.5 yamt error = (VCALL(fdvp, VOFFSET(vop_rename), &a));
1000 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1001 1.53.4.5 yamt return error;
1002 1.23 thorpej }
1003 1.1 cgd
1004 1.31 jdolecek const int vop_mkdir_vp_offsets[] = {
1005 1.1 cgd VOPARG_OFFSETOF(struct vop_mkdir_args,a_dvp),
1006 1.1 cgd VDESC_NO_OFFSET
1007 1.1 cgd };
1008 1.33 jdolecek const struct vnodeop_desc vop_mkdir_desc = {
1009 1.53.4.2 yamt VOP_MKDIR_DESCOFFSET,
1010 1.1 cgd "vop_mkdir",
1011 1.17 wrstuden 0 | VDESC_VP0_WILLPUT,
1012 1.1 cgd vop_mkdir_vp_offsets,
1013 1.1 cgd VOPARG_OFFSETOF(struct vop_mkdir_args, a_vpp),
1014 1.1 cgd VDESC_NO_OFFSET,
1015 1.1 cgd VOPARG_OFFSETOF(struct vop_mkdir_args, a_cnp),
1016 1.1 cgd NULL,
1017 1.1 cgd };
1018 1.23 thorpej int
1019 1.53.4.1 yamt VOP_MKDIR(struct vnode *dvp,
1020 1.53.4.1 yamt struct vnode **vpp,
1021 1.53.4.1 yamt struct componentname *cnp,
1022 1.53.4.1 yamt struct vattr *vap)
1023 1.23 thorpej {
1024 1.53.4.5 yamt int error;
1025 1.53.4.5 yamt bool mpsafe;
1026 1.23 thorpej struct vop_mkdir_args a;
1027 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1028 1.50 thorpej int islocked_dvp;
1029 1.50 thorpej #endif
1030 1.23 thorpej a.a_desc = VDESC(vop_mkdir);
1031 1.23 thorpej a.a_dvp = dvp;
1032 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1033 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
1034 1.50 thorpej if (islocked_dvp != 1)
1035 1.50 thorpej panic("vop_mkdir: dvp: locked %d, expected %d", islocked_dvp, 1);
1036 1.50 thorpej #endif
1037 1.23 thorpej a.a_vpp = vpp;
1038 1.23 thorpej a.a_cnp = cnp;
1039 1.23 thorpej a.a_vap = vap;
1040 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
1041 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1042 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_mkdir), &a));
1043 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1044 1.53.4.3 yamt #ifdef DIAGNOSTIC
1045 1.53.4.5 yamt if (error == 0)
1046 1.53.4.3 yamt KASSERT((*vpp)->v_size != VSIZENOTSET
1047 1.53.4.3 yamt && (*vpp)->v_writesize != VSIZENOTSET);
1048 1.53.4.3 yamt #endif /* DIAGNOSTIC */
1049 1.53.4.5 yamt return error;
1050 1.23 thorpej }
1051 1.1 cgd
1052 1.31 jdolecek const int vop_rmdir_vp_offsets[] = {
1053 1.1 cgd VOPARG_OFFSETOF(struct vop_rmdir_args,a_dvp),
1054 1.1 cgd VOPARG_OFFSETOF(struct vop_rmdir_args,a_vp),
1055 1.1 cgd VDESC_NO_OFFSET
1056 1.1 cgd };
1057 1.33 jdolecek const struct vnodeop_desc vop_rmdir_desc = {
1058 1.53.4.2 yamt VOP_RMDIR_DESCOFFSET,
1059 1.1 cgd "vop_rmdir",
1060 1.17 wrstuden 0 | VDESC_VP0_WILLPUT | VDESC_VP1_WILLPUT,
1061 1.1 cgd vop_rmdir_vp_offsets,
1062 1.1 cgd VDESC_NO_OFFSET,
1063 1.1 cgd VDESC_NO_OFFSET,
1064 1.1 cgd VOPARG_OFFSETOF(struct vop_rmdir_args, a_cnp),
1065 1.1 cgd NULL,
1066 1.1 cgd };
1067 1.23 thorpej int
1068 1.53.4.1 yamt VOP_RMDIR(struct vnode *dvp,
1069 1.53.4.1 yamt struct vnode *vp,
1070 1.53.4.1 yamt struct componentname *cnp)
1071 1.23 thorpej {
1072 1.53.4.5 yamt int error;
1073 1.53.4.5 yamt bool mpsafe;
1074 1.23 thorpej struct vop_rmdir_args a;
1075 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1076 1.50 thorpej int islocked_dvp;
1077 1.50 thorpej int islocked_vp;
1078 1.50 thorpej #endif
1079 1.23 thorpej a.a_desc = VDESC(vop_rmdir);
1080 1.23 thorpej a.a_dvp = dvp;
1081 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1082 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
1083 1.50 thorpej if (islocked_dvp != 1)
1084 1.50 thorpej panic("vop_rmdir: dvp: locked %d, expected %d", islocked_dvp, 1);
1085 1.50 thorpej #endif
1086 1.23 thorpej a.a_vp = vp;
1087 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1088 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1089 1.50 thorpej if (islocked_vp != 1)
1090 1.50 thorpej panic("vop_rmdir: vp: locked %d, expected %d", islocked_vp, 1);
1091 1.50 thorpej #endif
1092 1.23 thorpej a.a_cnp = cnp;
1093 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
1094 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1095 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_rmdir), &a));
1096 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1097 1.53.4.5 yamt return error;
1098 1.23 thorpej }
1099 1.1 cgd
1100 1.31 jdolecek const int vop_symlink_vp_offsets[] = {
1101 1.1 cgd VOPARG_OFFSETOF(struct vop_symlink_args,a_dvp),
1102 1.1 cgd VDESC_NO_OFFSET
1103 1.1 cgd };
1104 1.33 jdolecek const struct vnodeop_desc vop_symlink_desc = {
1105 1.53.4.2 yamt VOP_SYMLINK_DESCOFFSET,
1106 1.1 cgd "vop_symlink",
1107 1.37 assar 0 | VDESC_VP0_WILLPUT,
1108 1.1 cgd vop_symlink_vp_offsets,
1109 1.1 cgd VOPARG_OFFSETOF(struct vop_symlink_args, a_vpp),
1110 1.1 cgd VDESC_NO_OFFSET,
1111 1.1 cgd VOPARG_OFFSETOF(struct vop_symlink_args, a_cnp),
1112 1.1 cgd NULL,
1113 1.1 cgd };
1114 1.23 thorpej int
1115 1.53.4.1 yamt VOP_SYMLINK(struct vnode *dvp,
1116 1.53.4.1 yamt struct vnode **vpp,
1117 1.53.4.1 yamt struct componentname *cnp,
1118 1.53.4.1 yamt struct vattr *vap,
1119 1.53.4.1 yamt char *target)
1120 1.23 thorpej {
1121 1.53.4.5 yamt int error;
1122 1.53.4.5 yamt bool mpsafe;
1123 1.23 thorpej struct vop_symlink_args a;
1124 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1125 1.50 thorpej int islocked_dvp;
1126 1.50 thorpej #endif
1127 1.23 thorpej a.a_desc = VDESC(vop_symlink);
1128 1.23 thorpej a.a_dvp = dvp;
1129 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1130 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
1131 1.50 thorpej if (islocked_dvp != 1)
1132 1.50 thorpej panic("vop_symlink: dvp: locked %d, expected %d", islocked_dvp, 1);
1133 1.50 thorpej #endif
1134 1.23 thorpej a.a_vpp = vpp;
1135 1.23 thorpej a.a_cnp = cnp;
1136 1.23 thorpej a.a_vap = vap;
1137 1.23 thorpej a.a_target = target;
1138 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
1139 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1140 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_symlink), &a));
1141 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1142 1.53.4.3 yamt #ifdef DIAGNOSTIC
1143 1.53.4.5 yamt if (error == 0)
1144 1.53.4.3 yamt KASSERT((*vpp)->v_size != VSIZENOTSET
1145 1.53.4.3 yamt && (*vpp)->v_writesize != VSIZENOTSET);
1146 1.53.4.3 yamt #endif /* DIAGNOSTIC */
1147 1.53.4.5 yamt return error;
1148 1.23 thorpej }
1149 1.1 cgd
1150 1.31 jdolecek const int vop_readdir_vp_offsets[] = {
1151 1.1 cgd VOPARG_OFFSETOF(struct vop_readdir_args,a_vp),
1152 1.1 cgd VDESC_NO_OFFSET
1153 1.1 cgd };
1154 1.33 jdolecek const struct vnodeop_desc vop_readdir_desc = {
1155 1.53.4.2 yamt VOP_READDIR_DESCOFFSET,
1156 1.1 cgd "vop_readdir",
1157 1.1 cgd 0,
1158 1.1 cgd vop_readdir_vp_offsets,
1159 1.1 cgd VDESC_NO_OFFSET,
1160 1.1 cgd VOPARG_OFFSETOF(struct vop_readdir_args, a_cred),
1161 1.1 cgd VDESC_NO_OFFSET,
1162 1.1 cgd NULL,
1163 1.1 cgd };
1164 1.23 thorpej int
1165 1.53.4.1 yamt VOP_READDIR(struct vnode *vp,
1166 1.53.4.1 yamt struct uio *uio,
1167 1.53.4.1 yamt kauth_cred_t cred,
1168 1.53.4.1 yamt int *eofflag,
1169 1.53.4.1 yamt off_t **cookies,
1170 1.53.4.1 yamt int *ncookies)
1171 1.23 thorpej {
1172 1.53.4.5 yamt int error;
1173 1.53.4.5 yamt bool mpsafe;
1174 1.23 thorpej struct vop_readdir_args a;
1175 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1176 1.50 thorpej int islocked_vp;
1177 1.50 thorpej #endif
1178 1.23 thorpej a.a_desc = VDESC(vop_readdir);
1179 1.23 thorpej a.a_vp = vp;
1180 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1181 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1182 1.50 thorpej if (islocked_vp != 1)
1183 1.50 thorpej panic("vop_readdir: vp: locked %d, expected %d", islocked_vp, 1);
1184 1.50 thorpej #endif
1185 1.23 thorpej a.a_uio = uio;
1186 1.23 thorpej a.a_cred = cred;
1187 1.23 thorpej a.a_eofflag = eofflag;
1188 1.23 thorpej a.a_cookies = cookies;
1189 1.23 thorpej a.a_ncookies = ncookies;
1190 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1191 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1192 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_readdir), &a));
1193 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1194 1.53.4.5 yamt return error;
1195 1.23 thorpej }
1196 1.1 cgd
1197 1.31 jdolecek const int vop_readlink_vp_offsets[] = {
1198 1.1 cgd VOPARG_OFFSETOF(struct vop_readlink_args,a_vp),
1199 1.1 cgd VDESC_NO_OFFSET
1200 1.1 cgd };
1201 1.33 jdolecek const struct vnodeop_desc vop_readlink_desc = {
1202 1.53.4.2 yamt VOP_READLINK_DESCOFFSET,
1203 1.1 cgd "vop_readlink",
1204 1.1 cgd 0,
1205 1.1 cgd vop_readlink_vp_offsets,
1206 1.1 cgd VDESC_NO_OFFSET,
1207 1.1 cgd VOPARG_OFFSETOF(struct vop_readlink_args, a_cred),
1208 1.1 cgd VDESC_NO_OFFSET,
1209 1.1 cgd NULL,
1210 1.1 cgd };
1211 1.23 thorpej int
1212 1.53.4.1 yamt VOP_READLINK(struct vnode *vp,
1213 1.53.4.1 yamt struct uio *uio,
1214 1.53.4.1 yamt kauth_cred_t cred)
1215 1.23 thorpej {
1216 1.53.4.5 yamt int error;
1217 1.53.4.5 yamt bool mpsafe;
1218 1.23 thorpej struct vop_readlink_args a;
1219 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1220 1.50 thorpej int islocked_vp;
1221 1.50 thorpej #endif
1222 1.23 thorpej a.a_desc = VDESC(vop_readlink);
1223 1.23 thorpej a.a_vp = vp;
1224 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1225 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1226 1.50 thorpej if (islocked_vp != 1)
1227 1.50 thorpej panic("vop_readlink: vp: locked %d, expected %d", islocked_vp, 1);
1228 1.50 thorpej #endif
1229 1.23 thorpej a.a_uio = uio;
1230 1.23 thorpej a.a_cred = cred;
1231 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1232 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1233 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_readlink), &a));
1234 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1235 1.53.4.5 yamt return error;
1236 1.23 thorpej }
1237 1.1 cgd
1238 1.31 jdolecek const int vop_abortop_vp_offsets[] = {
1239 1.1 cgd VOPARG_OFFSETOF(struct vop_abortop_args,a_dvp),
1240 1.1 cgd VDESC_NO_OFFSET
1241 1.1 cgd };
1242 1.33 jdolecek const struct vnodeop_desc vop_abortop_desc = {
1243 1.53.4.2 yamt VOP_ABORTOP_DESCOFFSET,
1244 1.1 cgd "vop_abortop",
1245 1.1 cgd 0,
1246 1.1 cgd vop_abortop_vp_offsets,
1247 1.1 cgd VDESC_NO_OFFSET,
1248 1.1 cgd VDESC_NO_OFFSET,
1249 1.1 cgd VOPARG_OFFSETOF(struct vop_abortop_args, a_cnp),
1250 1.1 cgd NULL,
1251 1.1 cgd };
1252 1.23 thorpej int
1253 1.53.4.1 yamt VOP_ABORTOP(struct vnode *dvp,
1254 1.53.4.1 yamt struct componentname *cnp)
1255 1.23 thorpej {
1256 1.53.4.5 yamt int error;
1257 1.53.4.5 yamt bool mpsafe;
1258 1.23 thorpej struct vop_abortop_args a;
1259 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1260 1.50 thorpej #endif
1261 1.23 thorpej a.a_desc = VDESC(vop_abortop);
1262 1.23 thorpej a.a_dvp = dvp;
1263 1.23 thorpej a.a_cnp = cnp;
1264 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
1265 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1266 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_abortop), &a));
1267 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1268 1.53.4.5 yamt return error;
1269 1.23 thorpej }
1270 1.1 cgd
1271 1.31 jdolecek const int vop_inactive_vp_offsets[] = {
1272 1.1 cgd VOPARG_OFFSETOF(struct vop_inactive_args,a_vp),
1273 1.1 cgd VDESC_NO_OFFSET
1274 1.1 cgd };
1275 1.33 jdolecek const struct vnodeop_desc vop_inactive_desc = {
1276 1.53.4.2 yamt VOP_INACTIVE_DESCOFFSET,
1277 1.1 cgd "vop_inactive",
1278 1.17 wrstuden 0 | VDESC_VP0_WILLUNLOCK,
1279 1.1 cgd vop_inactive_vp_offsets,
1280 1.1 cgd VDESC_NO_OFFSET,
1281 1.1 cgd VDESC_NO_OFFSET,
1282 1.1 cgd VDESC_NO_OFFSET,
1283 1.1 cgd NULL,
1284 1.1 cgd };
1285 1.23 thorpej int
1286 1.53.4.7 yamt VOP_INACTIVE(struct vnode *vp,
1287 1.53.4.7 yamt bool *recycle)
1288 1.23 thorpej {
1289 1.53.4.5 yamt int error;
1290 1.53.4.5 yamt bool mpsafe;
1291 1.23 thorpej struct vop_inactive_args a;
1292 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1293 1.50 thorpej int islocked_vp;
1294 1.50 thorpej #endif
1295 1.23 thorpej a.a_desc = VDESC(vop_inactive);
1296 1.23 thorpej a.a_vp = vp;
1297 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1298 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1299 1.50 thorpej if (islocked_vp != 1)
1300 1.50 thorpej panic("vop_inactive: vp: locked %d, expected %d", islocked_vp, 1);
1301 1.50 thorpej #endif
1302 1.53.4.7 yamt a.a_recycle = recycle;
1303 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1304 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1305 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_inactive), &a));
1306 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1307 1.53.4.5 yamt return error;
1308 1.23 thorpej }
1309 1.1 cgd
1310 1.31 jdolecek const int vop_reclaim_vp_offsets[] = {
1311 1.1 cgd VOPARG_OFFSETOF(struct vop_reclaim_args,a_vp),
1312 1.1 cgd VDESC_NO_OFFSET
1313 1.1 cgd };
1314 1.33 jdolecek const struct vnodeop_desc vop_reclaim_desc = {
1315 1.53.4.2 yamt VOP_RECLAIM_DESCOFFSET,
1316 1.1 cgd "vop_reclaim",
1317 1.1 cgd 0,
1318 1.1 cgd vop_reclaim_vp_offsets,
1319 1.1 cgd VDESC_NO_OFFSET,
1320 1.1 cgd VDESC_NO_OFFSET,
1321 1.1 cgd VDESC_NO_OFFSET,
1322 1.1 cgd NULL,
1323 1.1 cgd };
1324 1.23 thorpej int
1325 1.53.4.6 yamt VOP_RECLAIM(struct vnode *vp)
1326 1.23 thorpej {
1327 1.53.4.5 yamt int error;
1328 1.53.4.5 yamt bool mpsafe;
1329 1.23 thorpej struct vop_reclaim_args a;
1330 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1331 1.50 thorpej int islocked_vp;
1332 1.50 thorpej #endif
1333 1.23 thorpej a.a_desc = VDESC(vop_reclaim);
1334 1.23 thorpej a.a_vp = vp;
1335 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1336 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
1337 1.50 thorpej if (islocked_vp != 0)
1338 1.50 thorpej panic("vop_reclaim: vp: locked %d, expected %d", islocked_vp, 0);
1339 1.50 thorpej #endif
1340 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1341 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1342 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_reclaim), &a));
1343 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1344 1.53.4.5 yamt return error;
1345 1.23 thorpej }
1346 1.1 cgd
1347 1.31 jdolecek const int vop_lock_vp_offsets[] = {
1348 1.1 cgd VOPARG_OFFSETOF(struct vop_lock_args,a_vp),
1349 1.1 cgd VDESC_NO_OFFSET
1350 1.1 cgd };
1351 1.33 jdolecek const struct vnodeop_desc vop_lock_desc = {
1352 1.53.4.2 yamt VOP_LOCK_DESCOFFSET,
1353 1.1 cgd "vop_lock",
1354 1.1 cgd 0,
1355 1.1 cgd vop_lock_vp_offsets,
1356 1.1 cgd VDESC_NO_OFFSET,
1357 1.1 cgd VDESC_NO_OFFSET,
1358 1.1 cgd VDESC_NO_OFFSET,
1359 1.1 cgd NULL,
1360 1.1 cgd };
1361 1.23 thorpej int
1362 1.53.4.1 yamt VOP_LOCK(struct vnode *vp,
1363 1.53.4.1 yamt int flags)
1364 1.23 thorpej {
1365 1.53.4.5 yamt int error;
1366 1.53.4.5 yamt bool mpsafe;
1367 1.23 thorpej struct vop_lock_args a;
1368 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1369 1.50 thorpej int islocked_vp;
1370 1.50 thorpej #endif
1371 1.23 thorpej a.a_desc = VDESC(vop_lock);
1372 1.23 thorpej a.a_vp = vp;
1373 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1374 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
1375 1.50 thorpej if (islocked_vp != 0)
1376 1.50 thorpej panic("vop_lock: vp: locked %d, expected %d", islocked_vp, 0);
1377 1.50 thorpej #endif
1378 1.23 thorpej a.a_flags = flags;
1379 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1380 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1381 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_lock), &a));
1382 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1383 1.53.4.5 yamt return error;
1384 1.23 thorpej }
1385 1.1 cgd
1386 1.31 jdolecek const int vop_unlock_vp_offsets[] = {
1387 1.1 cgd VOPARG_OFFSETOF(struct vop_unlock_args,a_vp),
1388 1.1 cgd VDESC_NO_OFFSET
1389 1.1 cgd };
1390 1.33 jdolecek const struct vnodeop_desc vop_unlock_desc = {
1391 1.53.4.2 yamt VOP_UNLOCK_DESCOFFSET,
1392 1.1 cgd "vop_unlock",
1393 1.1 cgd 0,
1394 1.1 cgd vop_unlock_vp_offsets,
1395 1.1 cgd VDESC_NO_OFFSET,
1396 1.1 cgd VDESC_NO_OFFSET,
1397 1.1 cgd VDESC_NO_OFFSET,
1398 1.1 cgd NULL,
1399 1.1 cgd };
1400 1.23 thorpej int
1401 1.53.4.1 yamt VOP_UNLOCK(struct vnode *vp,
1402 1.53.4.1 yamt int flags)
1403 1.23 thorpej {
1404 1.53.4.5 yamt int error;
1405 1.53.4.5 yamt bool mpsafe;
1406 1.23 thorpej struct vop_unlock_args a;
1407 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1408 1.50 thorpej int islocked_vp;
1409 1.50 thorpej #endif
1410 1.23 thorpej a.a_desc = VDESC(vop_unlock);
1411 1.23 thorpej a.a_vp = vp;
1412 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1413 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1414 1.50 thorpej if (islocked_vp != 1)
1415 1.50 thorpej panic("vop_unlock: vp: locked %d, expected %d", islocked_vp, 1);
1416 1.50 thorpej #endif
1417 1.23 thorpej a.a_flags = flags;
1418 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1419 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1420 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_unlock), &a));
1421 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1422 1.53.4.5 yamt return error;
1423 1.23 thorpej }
1424 1.1 cgd
1425 1.31 jdolecek const int vop_bmap_vp_offsets[] = {
1426 1.1 cgd VOPARG_OFFSETOF(struct vop_bmap_args,a_vp),
1427 1.1 cgd VDESC_NO_OFFSET
1428 1.1 cgd };
1429 1.33 jdolecek const struct vnodeop_desc vop_bmap_desc = {
1430 1.53.4.2 yamt VOP_BMAP_DESCOFFSET,
1431 1.1 cgd "vop_bmap",
1432 1.1 cgd 0,
1433 1.1 cgd vop_bmap_vp_offsets,
1434 1.1 cgd VOPARG_OFFSETOF(struct vop_bmap_args, a_vpp),
1435 1.1 cgd VDESC_NO_OFFSET,
1436 1.1 cgd VDESC_NO_OFFSET,
1437 1.1 cgd NULL,
1438 1.1 cgd };
1439 1.23 thorpej int
1440 1.53.4.1 yamt VOP_BMAP(struct vnode *vp,
1441 1.53.4.1 yamt daddr_t bn,
1442 1.53.4.1 yamt struct vnode **vpp,
1443 1.53.4.1 yamt daddr_t *bnp,
1444 1.53.4.1 yamt int *runp)
1445 1.23 thorpej {
1446 1.53.4.5 yamt int error;
1447 1.53.4.5 yamt bool mpsafe;
1448 1.23 thorpej struct vop_bmap_args a;
1449 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1450 1.50 thorpej #endif
1451 1.23 thorpej a.a_desc = VDESC(vop_bmap);
1452 1.23 thorpej a.a_vp = vp;
1453 1.23 thorpej a.a_bn = bn;
1454 1.23 thorpej a.a_vpp = vpp;
1455 1.23 thorpej a.a_bnp = bnp;
1456 1.23 thorpej a.a_runp = runp;
1457 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1458 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1459 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_bmap), &a));
1460 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1461 1.53.4.5 yamt return error;
1462 1.23 thorpej }
1463 1.1 cgd
1464 1.46 hannken const int vop_strategy_vp_offsets[] = {
1465 1.46 hannken VOPARG_OFFSETOF(struct vop_strategy_args,a_vp),
1466 1.46 hannken VDESC_NO_OFFSET
1467 1.46 hannken };
1468 1.46 hannken const struct vnodeop_desc vop_strategy_desc = {
1469 1.53.4.2 yamt VOP_STRATEGY_DESCOFFSET,
1470 1.46 hannken "vop_strategy",
1471 1.46 hannken 0,
1472 1.46 hannken vop_strategy_vp_offsets,
1473 1.46 hannken VDESC_NO_OFFSET,
1474 1.46 hannken VDESC_NO_OFFSET,
1475 1.46 hannken VDESC_NO_OFFSET,
1476 1.46 hannken NULL,
1477 1.46 hannken };
1478 1.46 hannken int
1479 1.53.4.1 yamt VOP_STRATEGY(struct vnode *vp,
1480 1.53.4.1 yamt struct buf *bp)
1481 1.46 hannken {
1482 1.53.4.5 yamt int error;
1483 1.53.4.5 yamt bool mpsafe;
1484 1.46 hannken struct vop_strategy_args a;
1485 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1486 1.50 thorpej #endif
1487 1.46 hannken a.a_desc = VDESC(vop_strategy);
1488 1.46 hannken a.a_vp = vp;
1489 1.46 hannken a.a_bp = bp;
1490 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1491 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1492 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_strategy), &a));
1493 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1494 1.53.4.5 yamt return error;
1495 1.46 hannken }
1496 1.46 hannken
1497 1.31 jdolecek const int vop_print_vp_offsets[] = {
1498 1.1 cgd VOPARG_OFFSETOF(struct vop_print_args,a_vp),
1499 1.1 cgd VDESC_NO_OFFSET
1500 1.1 cgd };
1501 1.33 jdolecek const struct vnodeop_desc vop_print_desc = {
1502 1.53.4.2 yamt VOP_PRINT_DESCOFFSET,
1503 1.1 cgd "vop_print",
1504 1.1 cgd 0,
1505 1.1 cgd vop_print_vp_offsets,
1506 1.1 cgd VDESC_NO_OFFSET,
1507 1.1 cgd VDESC_NO_OFFSET,
1508 1.1 cgd VDESC_NO_OFFSET,
1509 1.1 cgd NULL,
1510 1.1 cgd };
1511 1.23 thorpej int
1512 1.53.4.1 yamt VOP_PRINT(struct vnode *vp)
1513 1.23 thorpej {
1514 1.53.4.5 yamt int error;
1515 1.53.4.5 yamt bool mpsafe;
1516 1.23 thorpej struct vop_print_args a;
1517 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1518 1.50 thorpej #endif
1519 1.23 thorpej a.a_desc = VDESC(vop_print);
1520 1.23 thorpej a.a_vp = vp;
1521 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1522 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1523 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_print), &a));
1524 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1525 1.53.4.5 yamt return error;
1526 1.23 thorpej }
1527 1.1 cgd
1528 1.31 jdolecek const int vop_islocked_vp_offsets[] = {
1529 1.1 cgd VOPARG_OFFSETOF(struct vop_islocked_args,a_vp),
1530 1.1 cgd VDESC_NO_OFFSET
1531 1.1 cgd };
1532 1.33 jdolecek const struct vnodeop_desc vop_islocked_desc = {
1533 1.53.4.2 yamt VOP_ISLOCKED_DESCOFFSET,
1534 1.1 cgd "vop_islocked",
1535 1.1 cgd 0,
1536 1.1 cgd vop_islocked_vp_offsets,
1537 1.1 cgd VDESC_NO_OFFSET,
1538 1.1 cgd VDESC_NO_OFFSET,
1539 1.1 cgd VDESC_NO_OFFSET,
1540 1.1 cgd NULL,
1541 1.1 cgd };
1542 1.23 thorpej int
1543 1.53.4.1 yamt VOP_ISLOCKED(struct vnode *vp)
1544 1.23 thorpej {
1545 1.53.4.5 yamt int error;
1546 1.53.4.5 yamt bool mpsafe;
1547 1.23 thorpej struct vop_islocked_args a;
1548 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1549 1.50 thorpej #endif
1550 1.23 thorpej a.a_desc = VDESC(vop_islocked);
1551 1.23 thorpej a.a_vp = vp;
1552 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1553 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1554 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_islocked), &a));
1555 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1556 1.53.4.5 yamt return error;
1557 1.23 thorpej }
1558 1.1 cgd
1559 1.31 jdolecek const int vop_pathconf_vp_offsets[] = {
1560 1.1 cgd VOPARG_OFFSETOF(struct vop_pathconf_args,a_vp),
1561 1.1 cgd VDESC_NO_OFFSET
1562 1.1 cgd };
1563 1.33 jdolecek const struct vnodeop_desc vop_pathconf_desc = {
1564 1.53.4.2 yamt VOP_PATHCONF_DESCOFFSET,
1565 1.1 cgd "vop_pathconf",
1566 1.1 cgd 0,
1567 1.1 cgd vop_pathconf_vp_offsets,
1568 1.1 cgd VDESC_NO_OFFSET,
1569 1.1 cgd VDESC_NO_OFFSET,
1570 1.1 cgd VDESC_NO_OFFSET,
1571 1.1 cgd NULL,
1572 1.1 cgd };
1573 1.23 thorpej int
1574 1.53.4.1 yamt VOP_PATHCONF(struct vnode *vp,
1575 1.53.4.1 yamt int name,
1576 1.53.4.1 yamt register_t *retval)
1577 1.23 thorpej {
1578 1.53.4.5 yamt int error;
1579 1.53.4.5 yamt bool mpsafe;
1580 1.23 thorpej struct vop_pathconf_args a;
1581 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1582 1.50 thorpej int islocked_vp;
1583 1.50 thorpej #endif
1584 1.23 thorpej a.a_desc = VDESC(vop_pathconf);
1585 1.23 thorpej a.a_vp = vp;
1586 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1587 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1588 1.50 thorpej if (islocked_vp != 1)
1589 1.50 thorpej panic("vop_pathconf: vp: locked %d, expected %d", islocked_vp, 1);
1590 1.50 thorpej #endif
1591 1.23 thorpej a.a_name = name;
1592 1.23 thorpej a.a_retval = retval;
1593 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1594 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1595 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_pathconf), &a));
1596 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1597 1.53.4.5 yamt return error;
1598 1.23 thorpej }
1599 1.1 cgd
1600 1.31 jdolecek const int vop_advlock_vp_offsets[] = {
1601 1.1 cgd VOPARG_OFFSETOF(struct vop_advlock_args,a_vp),
1602 1.1 cgd VDESC_NO_OFFSET
1603 1.1 cgd };
1604 1.33 jdolecek const struct vnodeop_desc vop_advlock_desc = {
1605 1.53.4.2 yamt VOP_ADVLOCK_DESCOFFSET,
1606 1.1 cgd "vop_advlock",
1607 1.1 cgd 0,
1608 1.1 cgd vop_advlock_vp_offsets,
1609 1.1 cgd VDESC_NO_OFFSET,
1610 1.1 cgd VDESC_NO_OFFSET,
1611 1.1 cgd VDESC_NO_OFFSET,
1612 1.1 cgd NULL,
1613 1.1 cgd };
1614 1.23 thorpej int
1615 1.53.4.1 yamt VOP_ADVLOCK(struct vnode *vp,
1616 1.53.4.1 yamt void *id,
1617 1.53.4.1 yamt int op,
1618 1.53.4.1 yamt struct flock *fl,
1619 1.53.4.1 yamt int flags)
1620 1.23 thorpej {
1621 1.53.4.5 yamt int error;
1622 1.53.4.5 yamt bool mpsafe;
1623 1.23 thorpej struct vop_advlock_args a;
1624 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1625 1.50 thorpej int islocked_vp;
1626 1.50 thorpej #endif
1627 1.23 thorpej a.a_desc = VDESC(vop_advlock);
1628 1.23 thorpej a.a_vp = vp;
1629 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1630 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 0;
1631 1.50 thorpej if (islocked_vp != 0)
1632 1.50 thorpej panic("vop_advlock: vp: locked %d, expected %d", islocked_vp, 0);
1633 1.50 thorpej #endif
1634 1.23 thorpej a.a_id = id;
1635 1.23 thorpej a.a_op = op;
1636 1.23 thorpej a.a_fl = fl;
1637 1.23 thorpej a.a_flags = flags;
1638 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1639 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1640 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_advlock), &a));
1641 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1642 1.53.4.5 yamt return error;
1643 1.23 thorpej }
1644 1.1 cgd
1645 1.31 jdolecek const int vop_whiteout_vp_offsets[] = {
1646 1.1 cgd VOPARG_OFFSETOF(struct vop_whiteout_args,a_dvp),
1647 1.1 cgd VDESC_NO_OFFSET
1648 1.1 cgd };
1649 1.33 jdolecek const struct vnodeop_desc vop_whiteout_desc = {
1650 1.53.4.2 yamt VOP_WHITEOUT_DESCOFFSET,
1651 1.1 cgd "vop_whiteout",
1652 1.1 cgd 0,
1653 1.1 cgd vop_whiteout_vp_offsets,
1654 1.1 cgd VDESC_NO_OFFSET,
1655 1.1 cgd VDESC_NO_OFFSET,
1656 1.1 cgd VOPARG_OFFSETOF(struct vop_whiteout_args, a_cnp),
1657 1.1 cgd NULL,
1658 1.1 cgd };
1659 1.23 thorpej int
1660 1.53.4.1 yamt VOP_WHITEOUT(struct vnode *dvp,
1661 1.53.4.1 yamt struct componentname *cnp,
1662 1.53.4.1 yamt int flags)
1663 1.23 thorpej {
1664 1.53.4.5 yamt int error;
1665 1.53.4.5 yamt bool mpsafe;
1666 1.23 thorpej struct vop_whiteout_args a;
1667 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1668 1.50 thorpej int islocked_dvp;
1669 1.50 thorpej #endif
1670 1.23 thorpej a.a_desc = VDESC(vop_whiteout);
1671 1.23 thorpej a.a_dvp = dvp;
1672 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1673 1.53.4.4 yamt islocked_dvp = (dvp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(dvp) == LK_EXCLUSIVE) : 1;
1674 1.50 thorpej if (islocked_dvp != 1)
1675 1.50 thorpej panic("vop_whiteout: dvp: locked %d, expected %d", islocked_dvp, 1);
1676 1.50 thorpej #endif
1677 1.23 thorpej a.a_cnp = cnp;
1678 1.23 thorpej a.a_flags = flags;
1679 1.53.4.5 yamt mpsafe = (dvp->v_vflag & VV_MPSAFE);
1680 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1681 1.53.4.5 yamt error = (VCALL(dvp, VOFFSET(vop_whiteout), &a));
1682 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1683 1.53.4.5 yamt return error;
1684 1.23 thorpej }
1685 1.1 cgd
1686 1.31 jdolecek const int vop_getpages_vp_offsets[] = {
1687 1.26 chs VOPARG_OFFSETOF(struct vop_getpages_args,a_vp),
1688 1.26 chs VDESC_NO_OFFSET
1689 1.26 chs };
1690 1.33 jdolecek const struct vnodeop_desc vop_getpages_desc = {
1691 1.53.4.2 yamt VOP_GETPAGES_DESCOFFSET,
1692 1.26 chs "vop_getpages",
1693 1.26 chs 0,
1694 1.26 chs vop_getpages_vp_offsets,
1695 1.26 chs VDESC_NO_OFFSET,
1696 1.26 chs VDESC_NO_OFFSET,
1697 1.26 chs VDESC_NO_OFFSET,
1698 1.26 chs NULL,
1699 1.26 chs };
1700 1.26 chs int
1701 1.53.4.1 yamt VOP_GETPAGES(struct vnode *vp,
1702 1.53.4.1 yamt voff_t offset,
1703 1.53.4.1 yamt struct vm_page **m,
1704 1.53.4.1 yamt int *count,
1705 1.53.4.1 yamt int centeridx,
1706 1.53.4.1 yamt vm_prot_t access_type,
1707 1.53.4.1 yamt int advice,
1708 1.53.4.1 yamt int flags)
1709 1.26 chs {
1710 1.53.4.5 yamt int error;
1711 1.53.4.5 yamt bool mpsafe;
1712 1.26 chs struct vop_getpages_args a;
1713 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1714 1.50 thorpej #endif
1715 1.26 chs a.a_desc = VDESC(vop_getpages);
1716 1.26 chs a.a_vp = vp;
1717 1.26 chs a.a_offset = offset;
1718 1.26 chs a.a_m = m;
1719 1.26 chs a.a_count = count;
1720 1.26 chs a.a_centeridx = centeridx;
1721 1.26 chs a.a_access_type = access_type;
1722 1.26 chs a.a_advice = advice;
1723 1.26 chs a.a_flags = flags;
1724 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1725 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1726 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_getpages), &a));
1727 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1728 1.53.4.5 yamt return error;
1729 1.26 chs }
1730 1.26 chs
1731 1.31 jdolecek const int vop_putpages_vp_offsets[] = {
1732 1.26 chs VOPARG_OFFSETOF(struct vop_putpages_args,a_vp),
1733 1.26 chs VDESC_NO_OFFSET
1734 1.26 chs };
1735 1.33 jdolecek const struct vnodeop_desc vop_putpages_desc = {
1736 1.53.4.2 yamt VOP_PUTPAGES_DESCOFFSET,
1737 1.26 chs "vop_putpages",
1738 1.26 chs 0,
1739 1.26 chs vop_putpages_vp_offsets,
1740 1.26 chs VDESC_NO_OFFSET,
1741 1.26 chs VDESC_NO_OFFSET,
1742 1.26 chs VDESC_NO_OFFSET,
1743 1.26 chs NULL,
1744 1.26 chs };
1745 1.26 chs int
1746 1.53.4.1 yamt VOP_PUTPAGES(struct vnode *vp,
1747 1.53.4.1 yamt voff_t offlo,
1748 1.53.4.1 yamt voff_t offhi,
1749 1.53.4.1 yamt int flags)
1750 1.26 chs {
1751 1.53.4.5 yamt int error;
1752 1.53.4.5 yamt bool mpsafe;
1753 1.26 chs struct vop_putpages_args a;
1754 1.50 thorpej #ifdef VNODE_LOCKDEBUG
1755 1.50 thorpej #endif
1756 1.26 chs a.a_desc = VDESC(vop_putpages);
1757 1.26 chs a.a_vp = vp;
1758 1.38 chs a.a_offlo = offlo;
1759 1.38 chs a.a_offhi = offhi;
1760 1.26 chs a.a_flags = flags;
1761 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1762 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1763 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_putpages), &a));
1764 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1765 1.53.4.5 yamt return error;
1766 1.26 chs }
1767 1.26 chs
1768 1.51 thorpej const int vop_closeextattr_vp_offsets[] = {
1769 1.51 thorpej VOPARG_OFFSETOF(struct vop_closeextattr_args,a_vp),
1770 1.51 thorpej VDESC_NO_OFFSET
1771 1.51 thorpej };
1772 1.51 thorpej const struct vnodeop_desc vop_closeextattr_desc = {
1773 1.53.4.2 yamt VOP_CLOSEEXTATTR_DESCOFFSET,
1774 1.51 thorpej "vop_closeextattr",
1775 1.51 thorpej 0,
1776 1.51 thorpej vop_closeextattr_vp_offsets,
1777 1.51 thorpej VDESC_NO_OFFSET,
1778 1.51 thorpej VOPARG_OFFSETOF(struct vop_closeextattr_args, a_cred),
1779 1.51 thorpej VDESC_NO_OFFSET,
1780 1.51 thorpej NULL,
1781 1.51 thorpej };
1782 1.51 thorpej int
1783 1.53.4.1 yamt VOP_CLOSEEXTATTR(struct vnode *vp,
1784 1.53.4.1 yamt int commit,
1785 1.53.4.6 yamt kauth_cred_t cred)
1786 1.51 thorpej {
1787 1.53.4.5 yamt int error;
1788 1.53.4.5 yamt bool mpsafe;
1789 1.51 thorpej struct vop_closeextattr_args a;
1790 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1791 1.51 thorpej int islocked_vp;
1792 1.51 thorpej #endif
1793 1.51 thorpej a.a_desc = VDESC(vop_closeextattr);
1794 1.51 thorpej a.a_vp = vp;
1795 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1796 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1797 1.51 thorpej if (islocked_vp != 1)
1798 1.51 thorpej panic("vop_closeextattr: vp: locked %d, expected %d", islocked_vp, 1);
1799 1.51 thorpej #endif
1800 1.51 thorpej a.a_commit = commit;
1801 1.51 thorpej a.a_cred = cred;
1802 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1803 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1804 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_closeextattr), &a));
1805 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1806 1.53.4.5 yamt return error;
1807 1.51 thorpej }
1808 1.51 thorpej
1809 1.51 thorpej const int vop_getextattr_vp_offsets[] = {
1810 1.51 thorpej VOPARG_OFFSETOF(struct vop_getextattr_args,a_vp),
1811 1.51 thorpej VDESC_NO_OFFSET
1812 1.51 thorpej };
1813 1.51 thorpej const struct vnodeop_desc vop_getextattr_desc = {
1814 1.53.4.2 yamt VOP_GETEXTATTR_DESCOFFSET,
1815 1.51 thorpej "vop_getextattr",
1816 1.51 thorpej 0,
1817 1.51 thorpej vop_getextattr_vp_offsets,
1818 1.51 thorpej VDESC_NO_OFFSET,
1819 1.51 thorpej VOPARG_OFFSETOF(struct vop_getextattr_args, a_cred),
1820 1.51 thorpej VDESC_NO_OFFSET,
1821 1.51 thorpej NULL,
1822 1.51 thorpej };
1823 1.51 thorpej int
1824 1.53.4.1 yamt VOP_GETEXTATTR(struct vnode *vp,
1825 1.53.4.1 yamt int attrnamespace,
1826 1.53.4.1 yamt const char *name,
1827 1.53.4.1 yamt struct uio *uio,
1828 1.53.4.1 yamt size_t *size,
1829 1.53.4.6 yamt kauth_cred_t cred)
1830 1.51 thorpej {
1831 1.53.4.5 yamt int error;
1832 1.53.4.5 yamt bool mpsafe;
1833 1.51 thorpej struct vop_getextattr_args a;
1834 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1835 1.51 thorpej int islocked_vp;
1836 1.51 thorpej #endif
1837 1.51 thorpej a.a_desc = VDESC(vop_getextattr);
1838 1.51 thorpej a.a_vp = vp;
1839 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1840 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1841 1.51 thorpej if (islocked_vp != 1)
1842 1.51 thorpej panic("vop_getextattr: vp: locked %d, expected %d", islocked_vp, 1);
1843 1.51 thorpej #endif
1844 1.51 thorpej a.a_attrnamespace = attrnamespace;
1845 1.51 thorpej a.a_name = name;
1846 1.51 thorpej a.a_uio = uio;
1847 1.51 thorpej a.a_size = size;
1848 1.51 thorpej a.a_cred = cred;
1849 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1850 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1851 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_getextattr), &a));
1852 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1853 1.53.4.5 yamt return error;
1854 1.51 thorpej }
1855 1.51 thorpej
1856 1.51 thorpej const int vop_listextattr_vp_offsets[] = {
1857 1.51 thorpej VOPARG_OFFSETOF(struct vop_listextattr_args,a_vp),
1858 1.51 thorpej VDESC_NO_OFFSET
1859 1.51 thorpej };
1860 1.51 thorpej const struct vnodeop_desc vop_listextattr_desc = {
1861 1.53.4.2 yamt VOP_LISTEXTATTR_DESCOFFSET,
1862 1.51 thorpej "vop_listextattr",
1863 1.51 thorpej 0,
1864 1.51 thorpej vop_listextattr_vp_offsets,
1865 1.51 thorpej VDESC_NO_OFFSET,
1866 1.51 thorpej VOPARG_OFFSETOF(struct vop_listextattr_args, a_cred),
1867 1.51 thorpej VDESC_NO_OFFSET,
1868 1.51 thorpej NULL,
1869 1.51 thorpej };
1870 1.51 thorpej int
1871 1.53.4.1 yamt VOP_LISTEXTATTR(struct vnode *vp,
1872 1.53.4.1 yamt int attrnamespace,
1873 1.53.4.1 yamt struct uio *uio,
1874 1.53.4.1 yamt size_t *size,
1875 1.53.4.6 yamt kauth_cred_t cred)
1876 1.51 thorpej {
1877 1.53.4.5 yamt int error;
1878 1.53.4.5 yamt bool mpsafe;
1879 1.51 thorpej struct vop_listextattr_args a;
1880 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1881 1.51 thorpej int islocked_vp;
1882 1.51 thorpej #endif
1883 1.51 thorpej a.a_desc = VDESC(vop_listextattr);
1884 1.51 thorpej a.a_vp = vp;
1885 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1886 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1887 1.51 thorpej if (islocked_vp != 1)
1888 1.51 thorpej panic("vop_listextattr: vp: locked %d, expected %d", islocked_vp, 1);
1889 1.51 thorpej #endif
1890 1.51 thorpej a.a_attrnamespace = attrnamespace;
1891 1.51 thorpej a.a_uio = uio;
1892 1.51 thorpej a.a_size = size;
1893 1.51 thorpej a.a_cred = cred;
1894 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1895 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1896 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_listextattr), &a));
1897 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1898 1.53.4.5 yamt return error;
1899 1.51 thorpej }
1900 1.51 thorpej
1901 1.51 thorpej const int vop_openextattr_vp_offsets[] = {
1902 1.51 thorpej VOPARG_OFFSETOF(struct vop_openextattr_args,a_vp),
1903 1.51 thorpej VDESC_NO_OFFSET
1904 1.51 thorpej };
1905 1.51 thorpej const struct vnodeop_desc vop_openextattr_desc = {
1906 1.53.4.2 yamt VOP_OPENEXTATTR_DESCOFFSET,
1907 1.51 thorpej "vop_openextattr",
1908 1.51 thorpej 0,
1909 1.51 thorpej vop_openextattr_vp_offsets,
1910 1.51 thorpej VDESC_NO_OFFSET,
1911 1.51 thorpej VOPARG_OFFSETOF(struct vop_openextattr_args, a_cred),
1912 1.51 thorpej VDESC_NO_OFFSET,
1913 1.51 thorpej NULL,
1914 1.51 thorpej };
1915 1.51 thorpej int
1916 1.53.4.1 yamt VOP_OPENEXTATTR(struct vnode *vp,
1917 1.53.4.6 yamt kauth_cred_t cred)
1918 1.51 thorpej {
1919 1.53.4.5 yamt int error;
1920 1.53.4.5 yamt bool mpsafe;
1921 1.51 thorpej struct vop_openextattr_args a;
1922 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1923 1.51 thorpej int islocked_vp;
1924 1.51 thorpej #endif
1925 1.51 thorpej a.a_desc = VDESC(vop_openextattr);
1926 1.51 thorpej a.a_vp = vp;
1927 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1928 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1929 1.51 thorpej if (islocked_vp != 1)
1930 1.51 thorpej panic("vop_openextattr: vp: locked %d, expected %d", islocked_vp, 1);
1931 1.51 thorpej #endif
1932 1.51 thorpej a.a_cred = cred;
1933 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1934 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1935 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_openextattr), &a));
1936 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1937 1.53.4.5 yamt return error;
1938 1.51 thorpej }
1939 1.51 thorpej
1940 1.51 thorpej const int vop_deleteextattr_vp_offsets[] = {
1941 1.51 thorpej VOPARG_OFFSETOF(struct vop_deleteextattr_args,a_vp),
1942 1.51 thorpej VDESC_NO_OFFSET
1943 1.51 thorpej };
1944 1.51 thorpej const struct vnodeop_desc vop_deleteextattr_desc = {
1945 1.53.4.2 yamt VOP_DELETEEXTATTR_DESCOFFSET,
1946 1.51 thorpej "vop_deleteextattr",
1947 1.51 thorpej 0,
1948 1.51 thorpej vop_deleteextattr_vp_offsets,
1949 1.51 thorpej VDESC_NO_OFFSET,
1950 1.51 thorpej VOPARG_OFFSETOF(struct vop_deleteextattr_args, a_cred),
1951 1.51 thorpej VDESC_NO_OFFSET,
1952 1.51 thorpej NULL,
1953 1.51 thorpej };
1954 1.51 thorpej int
1955 1.53.4.1 yamt VOP_DELETEEXTATTR(struct vnode *vp,
1956 1.53.4.1 yamt int attrnamespace,
1957 1.53.4.1 yamt const char *name,
1958 1.53.4.6 yamt kauth_cred_t cred)
1959 1.51 thorpej {
1960 1.53.4.5 yamt int error;
1961 1.53.4.5 yamt bool mpsafe;
1962 1.51 thorpej struct vop_deleteextattr_args a;
1963 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1964 1.51 thorpej int islocked_vp;
1965 1.51 thorpej #endif
1966 1.51 thorpej a.a_desc = VDESC(vop_deleteextattr);
1967 1.51 thorpej a.a_vp = vp;
1968 1.51 thorpej #ifdef VNODE_LOCKDEBUG
1969 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
1970 1.51 thorpej if (islocked_vp != 1)
1971 1.51 thorpej panic("vop_deleteextattr: vp: locked %d, expected %d", islocked_vp, 1);
1972 1.51 thorpej #endif
1973 1.51 thorpej a.a_attrnamespace = attrnamespace;
1974 1.51 thorpej a.a_name = name;
1975 1.51 thorpej a.a_cred = cred;
1976 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
1977 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
1978 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_deleteextattr), &a));
1979 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
1980 1.53.4.5 yamt return error;
1981 1.51 thorpej }
1982 1.51 thorpej
1983 1.51 thorpej const int vop_setextattr_vp_offsets[] = {
1984 1.51 thorpej VOPARG_OFFSETOF(struct vop_setextattr_args,a_vp),
1985 1.51 thorpej VDESC_NO_OFFSET
1986 1.51 thorpej };
1987 1.51 thorpej const struct vnodeop_desc vop_setextattr_desc = {
1988 1.53.4.2 yamt VOP_SETEXTATTR_DESCOFFSET,
1989 1.51 thorpej "vop_setextattr",
1990 1.51 thorpej 0,
1991 1.51 thorpej vop_setextattr_vp_offsets,
1992 1.51 thorpej VDESC_NO_OFFSET,
1993 1.51 thorpej VOPARG_OFFSETOF(struct vop_setextattr_args, a_cred),
1994 1.51 thorpej VDESC_NO_OFFSET,
1995 1.51 thorpej NULL,
1996 1.51 thorpej };
1997 1.51 thorpej int
1998 1.53.4.1 yamt VOP_SETEXTATTR(struct vnode *vp,
1999 1.53.4.1 yamt int attrnamespace,
2000 1.53.4.1 yamt const char *name,
2001 1.53.4.1 yamt struct uio *uio,
2002 1.53.4.6 yamt kauth_cred_t cred)
2003 1.51 thorpej {
2004 1.53.4.5 yamt int error;
2005 1.53.4.5 yamt bool mpsafe;
2006 1.51 thorpej struct vop_setextattr_args a;
2007 1.51 thorpej #ifdef VNODE_LOCKDEBUG
2008 1.51 thorpej int islocked_vp;
2009 1.51 thorpej #endif
2010 1.51 thorpej a.a_desc = VDESC(vop_setextattr);
2011 1.51 thorpej a.a_vp = vp;
2012 1.51 thorpej #ifdef VNODE_LOCKDEBUG
2013 1.53.4.4 yamt islocked_vp = (vp->v_vflag & VV_LOCKSWORK) ? (VOP_ISLOCKED(vp) == LK_EXCLUSIVE) : 1;
2014 1.51 thorpej if (islocked_vp != 1)
2015 1.51 thorpej panic("vop_setextattr: vp: locked %d, expected %d", islocked_vp, 1);
2016 1.51 thorpej #endif
2017 1.51 thorpej a.a_attrnamespace = attrnamespace;
2018 1.51 thorpej a.a_name = name;
2019 1.51 thorpej a.a_uio = uio;
2020 1.51 thorpej a.a_cred = cred;
2021 1.53.4.5 yamt mpsafe = (vp->v_vflag & VV_MPSAFE);
2022 1.53.4.5 yamt if (!mpsafe) { KERNEL_LOCK(1, curlwp); }
2023 1.53.4.5 yamt error = (VCALL(vp, VOFFSET(vop_setextattr), &a));
2024 1.53.4.5 yamt if (!mpsafe) { KERNEL_UNLOCK_ONE(curlwp); }
2025 1.53.4.5 yamt return error;
2026 1.51 thorpej }
2027 1.51 thorpej
2028 1.1 cgd /* End of special cases. */
2029 1.1 cgd
2030 1.33 jdolecek const struct vnodeop_desc * const vfs_op_descs[] = {
2031 1.1 cgd &vop_default_desc, /* MUST BE FIRST */
2032 1.1 cgd &vop_bwrite_desc, /* XXX: SPECIAL CASE */
2033 1.1 cgd
2034 1.1 cgd &vop_lookup_desc,
2035 1.1 cgd &vop_create_desc,
2036 1.1 cgd &vop_mknod_desc,
2037 1.1 cgd &vop_open_desc,
2038 1.1 cgd &vop_close_desc,
2039 1.1 cgd &vop_access_desc,
2040 1.1 cgd &vop_getattr_desc,
2041 1.1 cgd &vop_setattr_desc,
2042 1.1 cgd &vop_read_desc,
2043 1.1 cgd &vop_write_desc,
2044 1.1 cgd &vop_ioctl_desc,
2045 1.18 wrstuden &vop_fcntl_desc,
2046 1.3 mycroft &vop_poll_desc,
2047 1.40 jdolecek &vop_kqfilter_desc,
2048 1.10 fvdl &vop_revoke_desc,
2049 1.1 cgd &vop_mmap_desc,
2050 1.1 cgd &vop_fsync_desc,
2051 1.1 cgd &vop_seek_desc,
2052 1.1 cgd &vop_remove_desc,
2053 1.1 cgd &vop_link_desc,
2054 1.1 cgd &vop_rename_desc,
2055 1.1 cgd &vop_mkdir_desc,
2056 1.1 cgd &vop_rmdir_desc,
2057 1.1 cgd &vop_symlink_desc,
2058 1.1 cgd &vop_readdir_desc,
2059 1.1 cgd &vop_readlink_desc,
2060 1.1 cgd &vop_abortop_desc,
2061 1.1 cgd &vop_inactive_desc,
2062 1.1 cgd &vop_reclaim_desc,
2063 1.1 cgd &vop_lock_desc,
2064 1.1 cgd &vop_unlock_desc,
2065 1.1 cgd &vop_bmap_desc,
2066 1.46 hannken &vop_strategy_desc,
2067 1.1 cgd &vop_print_desc,
2068 1.1 cgd &vop_islocked_desc,
2069 1.1 cgd &vop_pathconf_desc,
2070 1.1 cgd &vop_advlock_desc,
2071 1.1 cgd &vop_whiteout_desc,
2072 1.26 chs &vop_getpages_desc,
2073 1.26 chs &vop_putpages_desc,
2074 1.51 thorpej &vop_closeextattr_desc,
2075 1.51 thorpej &vop_getextattr_desc,
2076 1.51 thorpej &vop_listextattr_desc,
2077 1.51 thorpej &vop_openextattr_desc,
2078 1.51 thorpej &vop_deleteextattr_desc,
2079 1.51 thorpej &vop_setextattr_desc,
2080 1.1 cgd NULL
2081 1.1 cgd };
2082 1.1 cgd
2083