regen: assert that vnode creating operations set the size

This commit is contained in:
pooka 2007-07-22 21:27:49 +00:00
parent f5ba107ccd
commit 4aa4a0d0ae
2 changed files with 224 additions and 55 deletions

View File

@ -1,13 +1,13 @@
/* $NetBSD: vnode_if.c,v 1.68 2007/04/09 15:00:42 gdt Exp $ */
/* $NetBSD: vnode_if.c,v 1.69 2007/07/22 21:27:49 pooka Exp $ */
/*
* Warning: DO NOT EDIT! This file is automatically generated!
* (Modifications made here may easily be lost!)
*
* Created from the file:
* NetBSD: vnode_if.src,v 1.52 2007/04/09 14:58:28 gdt Exp
* NetBSD: vnode_if.src,v 1.53 2007/07/22 21:26:53 pooka Exp
* by the script:
* NetBSD: vnode_if.sh,v 1.43 2006/11/30 21:06:29 pooka Exp
* NetBSD: vnode_if.sh,v 1.44 2007/07/22 21:26:53 pooka Exp
*/
/*
@ -40,7 +40,7 @@
*/
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: vnode_if.c,v 1.68 2007/04/09 15:00:42 gdt Exp $");
__KERNEL_RCSID(0, "$NetBSD: vnode_if.c,v 1.69 2007/07/22 21:27:49 pooka Exp $");
/*
@ -87,11 +87,14 @@ int
VOP_BWRITE(struct buf *bp)
{
struct vop_bwrite_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_bwrite);
a.a_bp = bp;
return (VCALL(bp->b_vp, VOFFSET(vop_bwrite), &a));
rv = VCALL(bp->b_vp, VOFFSET(vop_bwrite), &a);
return (rv);
}
/* End of special cases */
@ -117,13 +120,21 @@ VOP_LOOKUP(struct vnode *dvp,
struct componentname *cnp)
{
struct vop_lookup_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_lookup);
a.a_dvp = dvp;
a.a_vpp = vpp;
a.a_cnp = cnp;
return (VCALL(dvp, VOFFSET(vop_lookup), &a));
rv = VCALL(dvp, VOFFSET(vop_lookup), &a);
#ifdef DIAGNOSTIC
if (rv == 0)
KASSERT((*vpp)->v_size != VSIZENOTSET
&& (*vpp)->v_writesize != VSIZENOTSET);
#endif /* DIAGNOSTIC */
return (rv);
}
const int vop_create_vp_offsets[] = {
@ -148,6 +159,7 @@ VOP_CREATE(struct vnode *dvp,
struct vattr *vap)
{
struct vop_create_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
#endif
@ -161,7 +173,14 @@ VOP_CREATE(struct vnode *dvp,
a.a_vpp = vpp;
a.a_cnp = cnp;
a.a_vap = vap;
return (VCALL(dvp, VOFFSET(vop_create), &a));
rv = VCALL(dvp, VOFFSET(vop_create), &a);
#ifdef DIAGNOSTIC
if (rv == 0)
KASSERT((*vpp)->v_size != VSIZENOTSET
&& (*vpp)->v_writesize != VSIZENOTSET);
#endif /* DIAGNOSTIC */
return (rv);
}
const int vop_mknod_vp_offsets[] = {
@ -186,6 +205,7 @@ VOP_MKNOD(struct vnode *dvp,
struct vattr *vap)
{
struct vop_mknod_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
#endif
@ -199,7 +219,14 @@ VOP_MKNOD(struct vnode *dvp,
a.a_vpp = vpp;
a.a_cnp = cnp;
a.a_vap = vap;
return (VCALL(dvp, VOFFSET(vop_mknod), &a));
rv = VCALL(dvp, VOFFSET(vop_mknod), &a);
#ifdef DIAGNOSTIC
if (rv == 0)
KASSERT((*vpp)->v_size != VSIZENOTSET
&& (*vpp)->v_writesize != VSIZENOTSET);
#endif /* DIAGNOSTIC */
return (rv);
}
const int vop_open_vp_offsets[] = {
@ -224,6 +251,7 @@ VOP_OPEN(struct vnode *vp,
struct lwp *l)
{
struct vop_open_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -237,7 +265,9 @@ VOP_OPEN(struct vnode *vp,
a.a_mode = mode;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_open), &a));
rv = VCALL(vp, VOFFSET(vop_open), &a);
return (rv);
}
const int vop_close_vp_offsets[] = {
@ -262,6 +292,7 @@ VOP_CLOSE(struct vnode *vp,
struct lwp *l)
{
struct vop_close_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -275,7 +306,9 @@ VOP_CLOSE(struct vnode *vp,
a.a_fflag = fflag;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_close), &a));
rv = VCALL(vp, VOFFSET(vop_close), &a);
return (rv);
}
const int vop_access_vp_offsets[] = {
@ -300,6 +333,7 @@ VOP_ACCESS(struct vnode *vp,
struct lwp *l)
{
struct vop_access_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -313,7 +347,9 @@ VOP_ACCESS(struct vnode *vp,
a.a_mode = mode;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_access), &a));
rv = VCALL(vp, VOFFSET(vop_access), &a);
return (rv);
}
const int vop_getattr_vp_offsets[] = {
@ -338,6 +374,7 @@ VOP_GETATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_getattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_getattr);
@ -345,7 +382,9 @@ VOP_GETATTR(struct vnode *vp,
a.a_vap = vap;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_getattr), &a));
rv = VCALL(vp, VOFFSET(vop_getattr), &a);
return (rv);
}
const int vop_setattr_vp_offsets[] = {
@ -370,6 +409,7 @@ VOP_SETATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_setattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -383,7 +423,9 @@ VOP_SETATTR(struct vnode *vp,
a.a_vap = vap;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_setattr), &a));
rv = VCALL(vp, VOFFSET(vop_setattr), &a);
return (rv);
}
const int vop_read_vp_offsets[] = {
@ -408,6 +450,7 @@ VOP_READ(struct vnode *vp,
kauth_cred_t cred)
{
struct vop_read_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -421,7 +464,9 @@ VOP_READ(struct vnode *vp,
a.a_uio = uio;
a.a_ioflag = ioflag;
a.a_cred = cred;
return (VCALL(vp, VOFFSET(vop_read), &a));
rv = VCALL(vp, VOFFSET(vop_read), &a);
return (rv);
}
const int vop_write_vp_offsets[] = {
@ -446,6 +491,7 @@ VOP_WRITE(struct vnode *vp,
kauth_cred_t cred)
{
struct vop_write_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -459,7 +505,9 @@ VOP_WRITE(struct vnode *vp,
a.a_uio = uio;
a.a_ioflag = ioflag;
a.a_cred = cred;
return (VCALL(vp, VOFFSET(vop_write), &a));
rv = VCALL(vp, VOFFSET(vop_write), &a);
return (rv);
}
const int vop_ioctl_vp_offsets[] = {
@ -486,6 +534,7 @@ VOP_IOCTL(struct vnode *vp,
struct lwp *l)
{
struct vop_ioctl_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -501,7 +550,9 @@ VOP_IOCTL(struct vnode *vp,
a.a_fflag = fflag;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_ioctl), &a));
rv = VCALL(vp, VOFFSET(vop_ioctl), &a);
return (rv);
}
const int vop_fcntl_vp_offsets[] = {
@ -528,6 +579,7 @@ VOP_FCNTL(struct vnode *vp,
struct lwp *l)
{
struct vop_fcntl_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -543,7 +595,9 @@ VOP_FCNTL(struct vnode *vp,
a.a_fflag = fflag;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_fcntl), &a));
rv = VCALL(vp, VOFFSET(vop_fcntl), &a);
return (rv);
}
const int vop_poll_vp_offsets[] = {
@ -567,6 +621,7 @@ VOP_POLL(struct vnode *vp,
struct lwp *l)
{
struct vop_poll_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -579,7 +634,9 @@ VOP_POLL(struct vnode *vp,
#endif
a.a_events = events;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_poll), &a));
rv = VCALL(vp, VOFFSET(vop_poll), &a);
return (rv);
}
const int vop_kqfilter_vp_offsets[] = {
@ -602,6 +659,7 @@ VOP_KQFILTER(struct vnode *vp,
struct knote *kn)
{
struct vop_kqfilter_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -613,7 +671,9 @@ VOP_KQFILTER(struct vnode *vp,
panic("vop_kqfilter: vp: locked %d, expected %d", islocked_vp, 0);
#endif
a.a_kn = kn;
return (VCALL(vp, VOFFSET(vop_kqfilter), &a));
rv = VCALL(vp, VOFFSET(vop_kqfilter), &a);
return (rv);
}
const int vop_revoke_vp_offsets[] = {
@ -636,6 +696,7 @@ VOP_REVOKE(struct vnode *vp,
int flags)
{
struct vop_revoke_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -647,7 +708,9 @@ VOP_REVOKE(struct vnode *vp,
panic("vop_revoke: vp: locked %d, expected %d", islocked_vp, 0);
#endif
a.a_flags = flags;
return (VCALL(vp, VOFFSET(vop_revoke), &a));
rv = VCALL(vp, VOFFSET(vop_revoke), &a);
return (rv);
}
const int vop_mmap_vp_offsets[] = {
@ -672,6 +735,7 @@ VOP_MMAP(struct vnode *vp,
struct lwp *l)
{
struct vop_mmap_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_mmap);
@ -679,7 +743,9 @@ VOP_MMAP(struct vnode *vp,
a.a_fflags = fflags;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_mmap), &a));
rv = VCALL(vp, VOFFSET(vop_mmap), &a);
return (rv);
}
const int vop_fsync_vp_offsets[] = {
@ -706,6 +772,7 @@ VOP_FSYNC(struct vnode *vp,
struct lwp *l)
{
struct vop_fsync_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -721,7 +788,9 @@ VOP_FSYNC(struct vnode *vp,
a.a_offlo = offlo;
a.a_offhi = offhi;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_fsync), &a));
rv = VCALL(vp, VOFFSET(vop_fsync), &a);
return (rv);
}
const int vop_seek_vp_offsets[] = {
@ -746,6 +815,7 @@ VOP_SEEK(struct vnode *vp,
kauth_cred_t cred)
{
struct vop_seek_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_seek);
@ -753,7 +823,9 @@ VOP_SEEK(struct vnode *vp,
a.a_oldoff = oldoff;
a.a_newoff = newoff;
a.a_cred = cred;
return (VCALL(vp, VOFFSET(vop_seek), &a));
rv = VCALL(vp, VOFFSET(vop_seek), &a);
return (rv);
}
const int vop_remove_vp_offsets[] = {
@ -778,6 +850,7 @@ VOP_REMOVE(struct vnode *dvp,
struct componentname *cnp)
{
struct vop_remove_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
int islocked_vp;
@ -796,7 +869,9 @@ VOP_REMOVE(struct vnode *dvp,
panic("vop_remove: vp: locked %d, expected %d", islocked_vp, 1);
#endif
a.a_cnp = cnp;
return (VCALL(dvp, VOFFSET(vop_remove), &a));
rv = VCALL(dvp, VOFFSET(vop_remove), &a);
return (rv);
}
const int vop_link_vp_offsets[] = {
@ -821,6 +896,7 @@ VOP_LINK(struct vnode *dvp,
struct componentname *cnp)
{
struct vop_link_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
int islocked_vp;
@ -839,7 +915,9 @@ VOP_LINK(struct vnode *dvp,
panic("vop_link: vp: locked %d, expected %d", islocked_vp, 0);
#endif
a.a_cnp = cnp;
return (VCALL(dvp, VOFFSET(vop_link), &a));
rv = VCALL(dvp, VOFFSET(vop_link), &a);
return (rv);
}
const int vop_rename_vp_offsets[] = {
@ -869,6 +947,7 @@ VOP_RENAME(struct vnode *fdvp,
struct componentname *tcnp)
{
struct vop_rename_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_fdvp;
int islocked_fvp;
@ -896,7 +975,9 @@ VOP_RENAME(struct vnode *fdvp,
#endif
a.a_tvp = tvp;
a.a_tcnp = tcnp;
return (VCALL(fdvp, VOFFSET(vop_rename), &a));
rv = VCALL(fdvp, VOFFSET(vop_rename), &a);
return (rv);
}
const int vop_mkdir_vp_offsets[] = {
@ -921,6 +1002,7 @@ VOP_MKDIR(struct vnode *dvp,
struct vattr *vap)
{
struct vop_mkdir_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
#endif
@ -934,7 +1016,14 @@ VOP_MKDIR(struct vnode *dvp,
a.a_vpp = vpp;
a.a_cnp = cnp;
a.a_vap = vap;
return (VCALL(dvp, VOFFSET(vop_mkdir), &a));
rv = VCALL(dvp, VOFFSET(vop_mkdir), &a);
#ifdef DIAGNOSTIC
if (rv == 0)
KASSERT((*vpp)->v_size != VSIZENOTSET
&& (*vpp)->v_writesize != VSIZENOTSET);
#endif /* DIAGNOSTIC */
return (rv);
}
const int vop_rmdir_vp_offsets[] = {
@ -959,6 +1048,7 @@ VOP_RMDIR(struct vnode *dvp,
struct componentname *cnp)
{
struct vop_rmdir_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
int islocked_vp;
@ -977,7 +1067,9 @@ VOP_RMDIR(struct vnode *dvp,
panic("vop_rmdir: vp: locked %d, expected %d", islocked_vp, 1);
#endif
a.a_cnp = cnp;
return (VCALL(dvp, VOFFSET(vop_rmdir), &a));
rv = VCALL(dvp, VOFFSET(vop_rmdir), &a);
return (rv);
}
const int vop_symlink_vp_offsets[] = {
@ -1003,6 +1095,7 @@ VOP_SYMLINK(struct vnode *dvp,
char *target)
{
struct vop_symlink_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
#endif
@ -1017,7 +1110,14 @@ VOP_SYMLINK(struct vnode *dvp,
a.a_cnp = cnp;
a.a_vap = vap;
a.a_target = target;
return (VCALL(dvp, VOFFSET(vop_symlink), &a));
rv = VCALL(dvp, VOFFSET(vop_symlink), &a);
#ifdef DIAGNOSTIC
if (rv == 0)
KASSERT((*vpp)->v_size != VSIZENOTSET
&& (*vpp)->v_writesize != VSIZENOTSET);
#endif /* DIAGNOSTIC */
return (rv);
}
const int vop_readdir_vp_offsets[] = {
@ -1044,6 +1144,7 @@ VOP_READDIR(struct vnode *vp,
int *ncookies)
{
struct vop_readdir_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1059,7 +1160,9 @@ VOP_READDIR(struct vnode *vp,
a.a_eofflag = eofflag;
a.a_cookies = cookies;
a.a_ncookies = ncookies;
return (VCALL(vp, VOFFSET(vop_readdir), &a));
rv = VCALL(vp, VOFFSET(vop_readdir), &a);
return (rv);
}
const int vop_readlink_vp_offsets[] = {
@ -1083,6 +1186,7 @@ VOP_READLINK(struct vnode *vp,
kauth_cred_t cred)
{
struct vop_readlink_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1095,7 +1199,9 @@ VOP_READLINK(struct vnode *vp,
#endif
a.a_uio = uio;
a.a_cred = cred;
return (VCALL(vp, VOFFSET(vop_readlink), &a));
rv = VCALL(vp, VOFFSET(vop_readlink), &a);
return (rv);
}
const int vop_abortop_vp_offsets[] = {
@ -1118,12 +1224,15 @@ VOP_ABORTOP(struct vnode *dvp,
struct componentname *cnp)
{
struct vop_abortop_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_abortop);
a.a_dvp = dvp;
a.a_cnp = cnp;
return (VCALL(dvp, VOFFSET(vop_abortop), &a));
rv = VCALL(dvp, VOFFSET(vop_abortop), &a);
return (rv);
}
const int vop_inactive_vp_offsets[] = {
@ -1146,6 +1255,7 @@ VOP_INACTIVE(struct vnode *vp,
struct lwp *l)
{
struct vop_inactive_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1157,7 +1267,9 @@ VOP_INACTIVE(struct vnode *vp,
panic("vop_inactive: vp: locked %d, expected %d", islocked_vp, 1);
#endif
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_inactive), &a));
rv = VCALL(vp, VOFFSET(vop_inactive), &a);
return (rv);
}
const int vop_reclaim_vp_offsets[] = {
@ -1180,6 +1292,7 @@ VOP_RECLAIM(struct vnode *vp,
struct lwp *l)
{
struct vop_reclaim_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1191,7 +1304,9 @@ VOP_RECLAIM(struct vnode *vp,
panic("vop_reclaim: vp: locked %d, expected %d", islocked_vp, 0);
#endif
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_reclaim), &a));
rv = VCALL(vp, VOFFSET(vop_reclaim), &a);
return (rv);
}
const int vop_lock_vp_offsets[] = {
@ -1214,6 +1329,7 @@ VOP_LOCK(struct vnode *vp,
int flags)
{
struct vop_lock_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1225,7 +1341,9 @@ VOP_LOCK(struct vnode *vp,
panic("vop_lock: vp: locked %d, expected %d", islocked_vp, 0);
#endif
a.a_flags = flags;
return (VCALL(vp, VOFFSET(vop_lock), &a));
rv = VCALL(vp, VOFFSET(vop_lock), &a);
return (rv);
}
const int vop_unlock_vp_offsets[] = {
@ -1248,6 +1366,7 @@ VOP_UNLOCK(struct vnode *vp,
int flags)
{
struct vop_unlock_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1259,7 +1378,9 @@ VOP_UNLOCK(struct vnode *vp,
panic("vop_unlock: vp: locked %d, expected %d", islocked_vp, 1);
#endif
a.a_flags = flags;
return (VCALL(vp, VOFFSET(vop_unlock), &a));
rv = VCALL(vp, VOFFSET(vop_unlock), &a);
return (rv);
}
const int vop_bmap_vp_offsets[] = {
@ -1285,6 +1406,7 @@ VOP_BMAP(struct vnode *vp,
int *runp)
{
struct vop_bmap_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_bmap);
@ -1293,7 +1415,9 @@ VOP_BMAP(struct vnode *vp,
a.a_vpp = vpp;
a.a_bnp = bnp;
a.a_runp = runp;
return (VCALL(vp, VOFFSET(vop_bmap), &a));
rv = VCALL(vp, VOFFSET(vop_bmap), &a);
return (rv);
}
const int vop_strategy_vp_offsets[] = {
@ -1316,12 +1440,15 @@ VOP_STRATEGY(struct vnode *vp,
struct buf *bp)
{
struct vop_strategy_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_strategy);
a.a_vp = vp;
a.a_bp = bp;
return (VCALL(vp, VOFFSET(vop_strategy), &a));
rv = VCALL(vp, VOFFSET(vop_strategy), &a);
return (rv);
}
const int vop_print_vp_offsets[] = {
@ -1343,11 +1470,14 @@ int
VOP_PRINT(struct vnode *vp)
{
struct vop_print_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_print);
a.a_vp = vp;
return (VCALL(vp, VOFFSET(vop_print), &a));
rv = VCALL(vp, VOFFSET(vop_print), &a);
return (rv);
}
const int vop_islocked_vp_offsets[] = {
@ -1369,11 +1499,14 @@ int
VOP_ISLOCKED(struct vnode *vp)
{
struct vop_islocked_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_islocked);
a.a_vp = vp;
return (VCALL(vp, VOFFSET(vop_islocked), &a));
rv = VCALL(vp, VOFFSET(vop_islocked), &a);
return (rv);
}
const int vop_pathconf_vp_offsets[] = {
@ -1397,6 +1530,7 @@ VOP_PATHCONF(struct vnode *vp,
register_t *retval)
{
struct vop_pathconf_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1409,7 +1543,9 @@ VOP_PATHCONF(struct vnode *vp,
#endif
a.a_name = name;
a.a_retval = retval;
return (VCALL(vp, VOFFSET(vop_pathconf), &a));
rv = VCALL(vp, VOFFSET(vop_pathconf), &a);
return (rv);
}
const int vop_advlock_vp_offsets[] = {
@ -1435,6 +1571,7 @@ VOP_ADVLOCK(struct vnode *vp,
int flags)
{
struct vop_advlock_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1449,7 +1586,9 @@ VOP_ADVLOCK(struct vnode *vp,
a.a_op = op;
a.a_fl = fl;
a.a_flags = flags;
return (VCALL(vp, VOFFSET(vop_advlock), &a));
rv = VCALL(vp, VOFFSET(vop_advlock), &a);
return (rv);
}
const int vop_lease_vp_offsets[] = {
@ -1474,6 +1613,7 @@ VOP_LEASE(struct vnode *vp,
int flag)
{
struct vop_lease_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_lease);
@ -1481,7 +1621,9 @@ VOP_LEASE(struct vnode *vp,
a.a_l = l;
a.a_cred = cred;
a.a_flag = flag;
return (VCALL(vp, VOFFSET(vop_lease), &a));
rv = VCALL(vp, VOFFSET(vop_lease), &a);
return (rv);
}
const int vop_whiteout_vp_offsets[] = {
@ -1505,6 +1647,7 @@ VOP_WHITEOUT(struct vnode *dvp,
int flags)
{
struct vop_whiteout_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_dvp;
#endif
@ -1517,7 +1660,9 @@ VOP_WHITEOUT(struct vnode *dvp,
#endif
a.a_cnp = cnp;
a.a_flags = flags;
return (VCALL(dvp, VOFFSET(vop_whiteout), &a));
rv = VCALL(dvp, VOFFSET(vop_whiteout), &a);
return (rv);
}
const int vop_getpages_vp_offsets[] = {
@ -1546,6 +1691,7 @@ VOP_GETPAGES(struct vnode *vp,
int flags)
{
struct vop_getpages_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_getpages);
@ -1557,7 +1703,9 @@ VOP_GETPAGES(struct vnode *vp,
a.a_access_type = access_type;
a.a_advice = advice;
a.a_flags = flags;
return (VCALL(vp, VOFFSET(vop_getpages), &a));
rv = VCALL(vp, VOFFSET(vop_getpages), &a);
return (rv);
}
const int vop_putpages_vp_offsets[] = {
@ -1582,6 +1730,7 @@ VOP_PUTPAGES(struct vnode *vp,
int flags)
{
struct vop_putpages_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
#endif
a.a_desc = VDESC(vop_putpages);
@ -1589,7 +1738,9 @@ VOP_PUTPAGES(struct vnode *vp,
a.a_offlo = offlo;
a.a_offhi = offhi;
a.a_flags = flags;
return (VCALL(vp, VOFFSET(vop_putpages), &a));
rv = VCALL(vp, VOFFSET(vop_putpages), &a);
return (rv);
}
const int vop_closeextattr_vp_offsets[] = {
@ -1614,6 +1765,7 @@ VOP_CLOSEEXTATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_closeextattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1627,7 +1779,9 @@ VOP_CLOSEEXTATTR(struct vnode *vp,
a.a_commit = commit;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_closeextattr), &a));
rv = VCALL(vp, VOFFSET(vop_closeextattr), &a);
return (rv);
}
const int vop_getextattr_vp_offsets[] = {
@ -1655,6 +1809,7 @@ VOP_GETEXTATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_getextattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1671,7 +1826,9 @@ VOP_GETEXTATTR(struct vnode *vp,
a.a_size = size;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_getextattr), &a));
rv = VCALL(vp, VOFFSET(vop_getextattr), &a);
return (rv);
}
const int vop_listextattr_vp_offsets[] = {
@ -1698,6 +1855,7 @@ VOP_LISTEXTATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_listextattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1713,7 +1871,9 @@ VOP_LISTEXTATTR(struct vnode *vp,
a.a_size = size;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_listextattr), &a));
rv = VCALL(vp, VOFFSET(vop_listextattr), &a);
return (rv);
}
const int vop_openextattr_vp_offsets[] = {
@ -1737,6 +1897,7 @@ VOP_OPENEXTATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_openextattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1749,7 +1910,9 @@ VOP_OPENEXTATTR(struct vnode *vp,
#endif
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_openextattr), &a));
rv = VCALL(vp, VOFFSET(vop_openextattr), &a);
return (rv);
}
const int vop_deleteextattr_vp_offsets[] = {
@ -1775,6 +1938,7 @@ VOP_DELETEEXTATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_deleteextattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1789,7 +1953,9 @@ VOP_DELETEEXTATTR(struct vnode *vp,
a.a_name = name;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_deleteextattr), &a));
rv = VCALL(vp, VOFFSET(vop_deleteextattr), &a);
return (rv);
}
const int vop_setextattr_vp_offsets[] = {
@ -1816,6 +1982,7 @@ VOP_SETEXTATTR(struct vnode *vp,
struct lwp *l)
{
struct vop_setextattr_args a;
int rv;
#ifdef VNODE_LOCKDEBUG
int islocked_vp;
#endif
@ -1831,7 +1998,9 @@ VOP_SETEXTATTR(struct vnode *vp,
a.a_uio = uio;
a.a_cred = cred;
a.a_l = l;
return (VCALL(vp, VOFFSET(vop_setextattr), &a));
rv = VCALL(vp, VOFFSET(vop_setextattr), &a);
return (rv);
}
/* End of special cases. */

View File

@ -1,13 +1,13 @@
/* $NetBSD: vnode_if.h,v 1.64 2007/04/09 15:00:43 gdt Exp $ */
/* $NetBSD: vnode_if.h,v 1.65 2007/07/22 21:27:49 pooka Exp $ */
/*
* Warning: DO NOT EDIT! This file is automatically generated!
* (Modifications made here may easily be lost!)
*
* Created from the file:
* NetBSD: vnode_if.src,v 1.52 2007/04/09 14:58:28 gdt Exp
* NetBSD: vnode_if.src,v 1.53 2007/07/22 21:26:53 pooka Exp
* by the script:
* NetBSD: vnode_if.sh,v 1.43 2006/11/30 21:06:29 pooka Exp
* NetBSD: vnode_if.sh,v 1.44 2007/07/22 21:26:53 pooka Exp
*/
/*