devfs_devs.c revision 187864
1139776Simp/*- 2130678Sphk * Copyright (c) 2000,2004 364880Sphk * Poul-Henning Kamp. All rights reserved. 464880Sphk * 564880Sphk * Redistribution and use in source and binary forms, with or without 664880Sphk * modification, are permitted provided that the following conditions 764880Sphk * are met: 864880Sphk * 1. Redistributions of source code must retain the above copyright 964880Sphk * notice, this list of conditions and the following disclaimer. 1064880Sphk * 2. Neither the name of the University nor the names of its contributors 1164880Sphk * may be used to endorse or promote products derived from this software 1264880Sphk * without specific prior written permission. 1364880Sphk * 1464880Sphk * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 1564880Sphk * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1664880Sphk * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 1764880Sphk * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 1864880Sphk * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 1964880Sphk * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2064880Sphk * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2164880Sphk * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2264880Sphk * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2364880Sphk * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 2464880Sphk * SUCH DAMAGE. 2564880Sphk * 2664880Sphk * From: FreeBSD: src/sys/miscfs/kernfs/kernfs_vfsops.c 1.36 2764880Sphk * 2864880Sphk * $FreeBSD: head/sys/fs/devfs/devfs_devs.c 187864 2009-01-28 19:58:05Z ed $ 2964880Sphk */ 3064880Sphk 31101069Srwatson#include "opt_mac.h" 3265515Sphk 3364880Sphk#include <sys/param.h> 3464880Sphk#include <sys/systm.h> 3576166Smarkm#include <sys/conf.h> 3664880Sphk#include <sys/dirent.h> 3776166Smarkm#include <sys/kernel.h> 38150342Sphk#include <sys/limits.h> 3976166Smarkm#include <sys/lock.h> 4064880Sphk#include <sys/malloc.h> 4176166Smarkm#include <sys/proc.h> 42150342Sphk#include <sys/sx.h> 4365515Sphk#include <sys/sysctl.h> 4476166Smarkm#include <sys/vnode.h> 4564880Sphk 46150342Sphk#include <sys/kdb.h> 4765515Sphk 4864880Sphk#include <fs/devfs/devfs.h> 49149144Sphk#include <fs/devfs/devfs_int.h> 5064880Sphk 51163606Srwatson#include <security/mac/mac_framework.h> 52163606Srwatson 53150342Sphk/* 54150342Sphk * The one true (but secret) list of active devices in the system. 55150342Sphk * Locked by dev_lock()/devmtx 56150342Sphk */ 57163481Skibstruct cdev_priv_list cdevp_list = TAILQ_HEAD_INITIALIZER(cdevp_list); 5865515Sphk 59150342Sphkstruct unrhdr *devfs_inos; 6069767Sphk 61150342Sphk 62150342Sphkstatic MALLOC_DEFINE(M_DEVFS2, "DEVFS2", "DEVFS data 2"); 63150342Sphkstatic MALLOC_DEFINE(M_DEVFS3, "DEVFS3", "DEVFS data 3"); 64150342Sphkstatic MALLOC_DEFINE(M_CDEVP, "DEVFS1", "DEVFS cdev_priv storage"); 65150342Sphk 66141633Sphkstatic SYSCTL_NODE(_vfs, OID_AUTO, devfs, CTLFLAG_RW, 0, "DEVFS filesystem"); 67150342Sphk 68150342Sphkstatic unsigned devfs_generation; 6965515SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, generation, CTLFLAG_RD, 7065515Sphk &devfs_generation, 0, "DEVFS generation number"); 7165515Sphk 72150147Sphkunsigned devfs_rule_depth = 1; 73150147SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, rule_depth, CTLFLAG_RW, 74150342Sphk &devfs_rule_depth, 0, "Max depth of ruleset include"); 75150147Sphk 76149146Sphk/* 77149146Sphk * Helper sysctl for devname(3). We're given a struct cdev * and return 78149146Sphk * the name, if any, registered by the device driver. 79149146Sphk */ 80149146Sphkstatic int 81149146Sphksysctl_devname(SYSCTL_HANDLER_ARGS) 82149146Sphk{ 83149146Sphk int error; 84149146Sphk dev_t ud; 85150342Sphk struct cdev_priv *cdp; 86149146Sphk 87149146Sphk error = SYSCTL_IN(req, &ud, sizeof (ud)); 88149146Sphk if (error) 89149146Sphk return (error); 90149146Sphk if (ud == NODEV) 91149146Sphk return(EINVAL); 92150342Sphk/* 93150342Sphk ud ^ devfs_random(); 94150342Sphk*/ 95150342Sphk dev_lock(); 96150342Sphk TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) 97150342Sphk if (cdp->cdp_inode == ud) 98150342Sphk break; 99150342Sphk dev_unlock(); 100150342Sphk if (cdp == NULL) 101149146Sphk return(ENOENT); 102150342Sphk return(SYSCTL_OUT(req, cdp->cdp_c.si_name, strlen(cdp->cdp_c.si_name) + 1)); 103149146Sphk return (error); 104149146Sphk} 105149146Sphk 106187864SedSYSCTL_PROC(_kern, OID_AUTO, devname, 107187864Sed CTLTYPE_OPAQUE|CTLFLAG_RW|CTLFLAG_ANYBODY|CTLFLAG_MPSAFE, 108187864Sed NULL, 0, sysctl_devname, "", "devname(3) handler"); 109149146Sphk 110149146SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev, CTLFLAG_RD, 111149146Sphk 0, sizeof(struct cdev), "sizeof(struct cdev)"); 112149146Sphk 113150342SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev_priv, CTLFLAG_RD, 114150342Sphk 0, sizeof(struct cdev_priv), "sizeof(struct cdev_priv)"); 11565515Sphk 116150342Sphkstruct cdev * 117150342Sphkdevfs_alloc(void) 11865515Sphk{ 119150342Sphk struct cdev_priv *cdp; 120150342Sphk struct cdev *cdev; 121183230Sed struct timespec ts; 12265515Sphk 123150342Sphk cdp = malloc(sizeof *cdp, M_CDEVP, M_USE_RESERVE | M_ZERO | M_WAITOK); 12465515Sphk 125150342Sphk cdp->cdp_dirents = &cdp->cdp_dirent0; 126150342Sphk cdp->cdp_dirent0 = NULL; 127150342Sphk cdp->cdp_maxdirent = 0; 12865515Sphk 129150342Sphk cdev = &cdp->cdp_c; 13065515Sphk 131150342Sphk cdev->si_name = cdev->__si_namebuf; 132150342Sphk LIST_INIT(&cdev->si_children); 133183230Sed vfs_timestamp(&ts); 134183230Sed cdev->si_atime = cdev->si_mtime = cdev->si_ctime = ts; 135183230Sed 136150342Sphk return (cdev); 13765515Sphk} 13865515Sphk 139150342Sphkvoid 140150342Sphkdevfs_free(struct cdev *cdev) 14165515Sphk{ 142150342Sphk struct cdev_priv *cdp; 14365515Sphk 144179828Skib cdp = cdev2priv(cdev); 145150342Sphk if (cdev->si_cred != NULL) 146150342Sphk crfree(cdev->si_cred); 147150342Sphk if (cdp->cdp_inode > 0) 148150342Sphk free_unr(devfs_inos, cdp->cdp_inode); 149150342Sphk if (cdp->cdp_maxdirent > 0) 150150342Sphk free(cdp->cdp_dirents, M_DEVFS2); 151150342Sphk free(cdp, M_CDEVP); 15265515Sphk} 15365515Sphk 154150342Sphkstruct devfs_dirent * 15565132Sphkdevfs_find(struct devfs_dirent *dd, const char *name, int namelen) 15665132Sphk{ 15765132Sphk struct devfs_dirent *de; 15865132Sphk 15965132Sphk TAILQ_FOREACH(de, &dd->de_dlist, de_list) { 16065132Sphk if (namelen != de->de_dirent->d_namlen) 16165132Sphk continue; 16265132Sphk if (bcmp(name, de->de_dirent->d_name, namelen) != 0) 16365132Sphk continue; 16465132Sphk break; 16565132Sphk } 16665132Sphk return (de); 16765132Sphk} 16865132Sphk 16965132Sphkstruct devfs_dirent * 17064880Sphkdevfs_newdirent(char *name, int namelen) 17164880Sphk{ 17264880Sphk int i; 17364880Sphk struct devfs_dirent *de; 17464880Sphk struct dirent d; 17564880Sphk 17664880Sphk d.d_namlen = namelen; 177150342Sphk i = sizeof (*de) + GENERIC_DIRSIZ(&d); 178150342Sphk de = malloc(i, M_DEVFS3, M_WAITOK | M_ZERO); 17964880Sphk de->de_dirent = (struct dirent *)(de + 1); 18064880Sphk de->de_dirent->d_namlen = namelen; 18164880Sphk de->de_dirent->d_reclen = GENERIC_DIRSIZ(&d); 18271822Sphk bcopy(name, de->de_dirent->d_name, namelen); 18371822Sphk de->de_dirent->d_name[namelen] = '\0'; 18485979Sphk vfs_timestamp(&de->de_ctime); 18565051Sphk de->de_mtime = de->de_atime = de->de_ctime; 18665051Sphk de->de_links = 1; 187162398Skib de->de_holdcnt = 1; 188101069Srwatson#ifdef MAC 189172930Srwatson mac_devfs_init(de); 190101069Srwatson#endif 19164880Sphk return (de); 19264880Sphk} 19364880Sphk 19465051Sphkstruct devfs_dirent * 195150342Sphkdevfs_vmkdir(struct devfs_mount *dmp, char *name, int namelen, struct devfs_dirent *dotdot, u_int inode) 19664880Sphk{ 19765051Sphk struct devfs_dirent *dd; 19864880Sphk struct devfs_dirent *de; 19964880Sphk 200150342Sphk /* Create the new directory */ 20165051Sphk dd = devfs_newdirent(name, namelen); 20265051Sphk TAILQ_INIT(&dd->de_dlist); 20365051Sphk dd->de_dirent->d_type = DT_DIR; 20485979Sphk dd->de_mode = 0555; 20565051Sphk dd->de_links = 2; 20665051Sphk dd->de_dir = dd; 207150342Sphk if (inode != 0) 208150342Sphk dd->de_inode = inode; 209150342Sphk else 210150342Sphk dd->de_inode = alloc_unr(devfs_inos); 21165051Sphk 212150342Sphk /* Create the "." entry in the new directory */ 21364880Sphk de = devfs_newdirent(".", 1); 21464880Sphk de->de_dirent->d_type = DT_DIR; 21565051Sphk de->de_flags |= DE_DOT; 21665051Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 217150342Sphk de->de_dir = dd; 21865051Sphk 219150342Sphk /* Create the ".." entry in the new directory */ 22065051Sphk de = devfs_newdirent("..", 2); 22165051Sphk de->de_dirent->d_type = DT_DIR; 222150342Sphk de->de_flags |= DE_DOTDOT; 223150342Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 224150342Sphk if (dotdot == NULL) { 22565051Sphk de->de_dir = dd; 226150342Sphk } else { 22765051Sphk de->de_dir = dotdot; 228150342Sphk TAILQ_INSERT_TAIL(&dotdot->de_dlist, dd, de_list); 229150342Sphk dotdot->de_links++; 230150342Sphk } 23165051Sphk 232150342Sphk#ifdef MAC 233172930Srwatson mac_devfs_create_directory(dmp->dm_mount, name, namelen, dd); 234150342Sphk#endif 23564880Sphk return (dd); 23664880Sphk} 23764880Sphk 238150342Sphkvoid 239162398Skibdevfs_dirent_free(struct devfs_dirent *de) 240162398Skib{ 241162398Skib free(de, M_DEVFS3); 242162398Skib} 243162398Skib 244163481Skib/* 245163481Skib * The caller needs to hold the dm for the duration of the call since 246163481Skib * dm->dm_lock may be temporary dropped. 247163481Skib */ 248162398Skibvoid 249163481Skibdevfs_delete(struct devfs_mount *dm, struct devfs_dirent *de, int vp_locked) 25064880Sphk{ 251163481Skib struct vnode *vp; 25264880Sphk 253162398Skib KASSERT((de->de_flags & DE_DOOMED) == 0, 254162398Skib ("devfs_delete doomed dirent")); 255162398Skib de->de_flags |= DE_DOOMED; 256163481Skib mtx_lock(&devfs_de_interlock); 257163481Skib vp = de->de_vnode; 258163481Skib if (vp != NULL) { 259163481Skib VI_LOCK(vp); 260163481Skib mtx_unlock(&devfs_de_interlock); 261163481Skib vholdl(vp); 262163481Skib sx_unlock(&dm->dm_lock); 263163481Skib if (!vp_locked) 264175202Sattilio vn_lock(vp, LK_EXCLUSIVE | LK_INTERLOCK | LK_RETRY); 265163481Skib else 266163481Skib VI_UNLOCK(vp); 267163481Skib vgone(vp); 268163481Skib if (!vp_locked) 269175294Sattilio VOP_UNLOCK(vp, 0); 270163481Skib vdrop(vp); 271163481Skib sx_xlock(&dm->dm_lock); 272163481Skib } else 273163481Skib mtx_unlock(&devfs_de_interlock); 27464880Sphk if (de->de_symlink) { 275150151Sphk free(de->de_symlink, M_DEVFS); 27664880Sphk de->de_symlink = NULL; 27764880Sphk } 278101069Srwatson#ifdef MAC 279172930Srwatson mac_devfs_destroy(de); 280101069Srwatson#endif 281150342Sphk if (de->de_inode > DEVFS_ROOTINO) { 282150342Sphk free_unr(devfs_inos, de->de_inode); 283150342Sphk de->de_inode = 0; 284150342Sphk } 285162398Skib if (DEVFS_DE_DROP(de)) 286162398Skib devfs_dirent_free(de); 28764880Sphk} 28864880Sphk 289150342Sphk/* 290150342Sphk * Called on unmount. 291163481Skib * Recursively removes the entire tree. 292163481Skib * The caller needs to hold the dm for the duration of the call. 293150342Sphk */ 294150342Sphk 295150342Sphkstatic void 296150342Sphkdevfs_purge(struct devfs_mount *dm, struct devfs_dirent *dd) 29764880Sphk{ 29864880Sphk struct devfs_dirent *de; 29964880Sphk 300150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 30164880Sphk for (;;) { 30265051Sphk de = TAILQ_FIRST(&dd->de_dlist); 30364880Sphk if (de == NULL) 30464880Sphk break; 305150342Sphk TAILQ_REMOVE(&dd->de_dlist, de, de_list); 306150342Sphk if (de->de_flags & (DE_DOT|DE_DOTDOT)) 307163481Skib devfs_delete(dm, de, 0); 308150342Sphk else if (de->de_dirent->d_type == DT_DIR) 309150342Sphk devfs_purge(dm, de); 310150342Sphk else 311163481Skib devfs_delete(dm, de, 0); 31264880Sphk } 313163481Skib devfs_delete(dm, dd, 0); 31464880Sphk} 31564880Sphk 316150342Sphk/* 317150342Sphk * Each cdev_priv has an array of pointers to devfs_dirent which is indexed 318150342Sphk * by the mount points dm_idx. 319150342Sphk * This function extends the array when necessary, taking into account that 320150342Sphk * the default array is 1 element and not malloc'ed. 321150342Sphk */ 322150342Sphkstatic void 323150342Sphkdevfs_metoo(struct cdev_priv *cdp, struct devfs_mount *dm) 324150342Sphk{ 325150342Sphk struct devfs_dirent **dep; 326150342Sphk int siz; 32764880Sphk 328150342Sphk siz = (dm->dm_idx + 1) * sizeof *dep; 329150342Sphk dep = malloc(siz, M_DEVFS2, M_WAITOK | M_ZERO); 330150342Sphk dev_lock(); 331150342Sphk if (dm->dm_idx <= cdp->cdp_maxdirent) { 332150342Sphk /* We got raced */ 333150342Sphk dev_unlock(); 334150342Sphk free(dep, M_DEVFS2); 335150342Sphk return; 336150342Sphk } 337150342Sphk memcpy(dep, cdp->cdp_dirents, (cdp->cdp_maxdirent + 1) * sizeof *dep); 338150342Sphk if (cdp->cdp_maxdirent > 0) 339150342Sphk free(cdp->cdp_dirents, M_DEVFS2); 340150342Sphk cdp->cdp_dirents = dep; 341150342Sphk /* 342150342Sphk * XXX: if malloc told us how much we actually got this could 343150342Sphk * XXX: be optimized. 344150342Sphk */ 345150342Sphk cdp->cdp_maxdirent = dm->dm_idx; 346150342Sphk dev_unlock(); 347150342Sphk} 348150342Sphk 349163481Skib/* 350163481Skib * The caller needs to hold the dm for the duration of the call. 351163481Skib */ 352150342Sphkstatic int 353150342Sphkdevfs_populate_loop(struct devfs_mount *dm, int cleanup) 35464880Sphk{ 355150342Sphk struct cdev_priv *cdp; 356150342Sphk struct devfs_dirent *de; 35765051Sphk struct devfs_dirent *dd; 358150342Sphk struct cdev *pdev; 359150342Sphk int j; 36064880Sphk char *q, *s; 36164880Sphk 362150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 363150342Sphk dev_lock(); 364150342Sphk TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) { 365150342Sphk 366150342Sphk KASSERT(cdp->cdp_dirents != NULL, ("NULL cdp_dirents")); 367150342Sphk 368150342Sphk /* 369150342Sphk * If we are unmounting, or the device has been destroyed, 370150342Sphk * clean up our dirent. 371150342Sphk */ 372150342Sphk if ((cleanup || !(cdp->cdp_flags & CDP_ACTIVE)) && 373150342Sphk dm->dm_idx <= cdp->cdp_maxdirent && 374150342Sphk cdp->cdp_dirents[dm->dm_idx] != NULL) { 375150342Sphk de = cdp->cdp_dirents[dm->dm_idx]; 376150342Sphk cdp->cdp_dirents[dm->dm_idx] = NULL; 377150342Sphk KASSERT(cdp == de->de_cdp, 378150342Sphk ("%s %d %s %p %p", __func__, __LINE__, 379150342Sphk cdp->cdp_c.si_name, cdp, de->de_cdp)); 380150342Sphk KASSERT(de->de_dir != NULL, ("Null de->de_dir")); 381150342Sphk dev_unlock(); 382150342Sphk 383150342Sphk TAILQ_REMOVE(&de->de_dir->de_dlist, de, de_list); 384150342Sphk de->de_cdp = NULL; 385150342Sphk de->de_inode = 0; 386163481Skib devfs_delete(dm, de, 0); 387163481Skib dev_lock(); 388163481Skib cdp->cdp_inuse--; 389163481Skib dev_unlock(); 390150342Sphk return (1); 391150342Sphk } 392150342Sphk /* 393150342Sphk * GC any lingering devices 394150342Sphk */ 395150342Sphk if (!(cdp->cdp_flags & CDP_ACTIVE)) { 396150342Sphk if (cdp->cdp_inuse > 0) 39765051Sphk continue; 398150342Sphk TAILQ_REMOVE(&cdevp_list, cdp, cdp_list); 399150342Sphk dev_unlock(); 400150342Sphk dev_rel(&cdp->cdp_c); 401150342Sphk return (1); 402150342Sphk } 403150342Sphk /* 404150342Sphk * Don't create any new dirents if we are unmounting 405150342Sphk */ 406150342Sphk if (cleanup) 407150342Sphk continue; 408150342Sphk KASSERT((cdp->cdp_flags & CDP_ACTIVE), ("Bogons, I tell ya'!")); 409150342Sphk 410150342Sphk if (dm->dm_idx <= cdp->cdp_maxdirent && 411150342Sphk cdp->cdp_dirents[dm->dm_idx] != NULL) { 412150342Sphk de = cdp->cdp_dirents[dm->dm_idx]; 413150342Sphk KASSERT(cdp == de->de_cdp, ("inconsistent cdp")); 414150342Sphk continue; 415150342Sphk } 416150342Sphk 417150342Sphk 418150342Sphk cdp->cdp_inuse++; 419150342Sphk dev_unlock(); 420150342Sphk 421150342Sphk if (dm->dm_idx > cdp->cdp_maxdirent) 422150342Sphk devfs_metoo(cdp, dm); 423150342Sphk 424150342Sphk dd = dm->dm_rootdir; 425150342Sphk s = cdp->cdp_c.si_name; 426150342Sphk for (;;) { 427150342Sphk for (q = s; *q != '/' && *q != '\0'; q++) 42864880Sphk continue; 429150342Sphk if (*q != '/') 430150342Sphk break; 431150342Sphk de = devfs_find(dd, s, q - s); 432150342Sphk if (de == NULL) 433150342Sphk de = devfs_vmkdir(dm, s, q - s, dd, 0); 434150342Sphk s = q + 1; 435150342Sphk dd = de; 436150342Sphk } 437150342Sphk 438150342Sphk de = devfs_newdirent(s, q - s); 439150342Sphk if (cdp->cdp_c.si_flags & SI_ALIAS) { 440150342Sphk de->de_uid = 0; 441150342Sphk de->de_gid = 0; 442150342Sphk de->de_mode = 0755; 443150342Sphk de->de_dirent->d_type = DT_LNK; 444150342Sphk pdev = cdp->cdp_c.si_parent; 445150342Sphk j = strlen(pdev->si_name) + 1; 446150342Sphk de->de_symlink = malloc(j, M_DEVFS, M_WAITOK); 447150342Sphk bcopy(pdev->si_name, de->de_symlink, j); 448150342Sphk } else { 449150342Sphk de->de_uid = cdp->cdp_c.si_uid; 450150342Sphk de->de_gid = cdp->cdp_c.si_gid; 451150342Sphk de->de_mode = cdp->cdp_c.si_mode; 452150342Sphk de->de_dirent->d_type = DT_CHR; 453150342Sphk } 454150342Sphk de->de_inode = cdp->cdp_inode; 455150342Sphk de->de_cdp = cdp; 456101069Srwatson#ifdef MAC 457172930Srwatson mac_devfs_create_device(cdp->cdp_c.si_cred, dm->dm_mount, 458150342Sphk &cdp->cdp_c, de); 459101069Srwatson#endif 460150342Sphk de->de_dir = dd; 461150342Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 462150342Sphk devfs_rules_apply(dm, de); 463150342Sphk dev_lock(); 464150342Sphk /* XXX: could check that cdp is still active here */ 465150342Sphk KASSERT(cdp->cdp_dirents[dm->dm_idx] == NULL, 466150342Sphk ("%s %d\n", __func__, __LINE__)); 467150342Sphk cdp->cdp_dirents[dm->dm_idx] = de; 468150342Sphk KASSERT(de->de_cdp != (void *)0xdeadc0de, 469150342Sphk ("%s %d\n", __func__, __LINE__)); 470150342Sphk dev_unlock(); 471150342Sphk return (1); 47264880Sphk } 473150342Sphk dev_unlock(); 474150342Sphk return (0); 47564880Sphk} 47664880Sphk 477163481Skib/* 478163481Skib * The caller needs to hold the dm for the duration of the call. 479163481Skib */ 480150342Sphkvoid 481150342Sphkdevfs_populate(struct devfs_mount *dm) 482150342Sphk{ 483150342Sphk 484150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 485150342Sphk if (dm->dm_generation == devfs_generation) 486150342Sphk return; 487150342Sphk while (devfs_populate_loop(dm, 0)) 488150342Sphk continue; 489150342Sphk dm->dm_generation = devfs_generation; 490150342Sphk} 491150342Sphk 492163481Skib/* 493163481Skib * The caller needs to hold the dm for the duration of the call. 494163481Skib */ 495150342Sphkvoid 496150342Sphkdevfs_cleanup(struct devfs_mount *dm) 497150342Sphk{ 498150342Sphk 499150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 500150342Sphk while (devfs_populate_loop(dm, 1)) 501150342Sphk continue; 502150342Sphk devfs_purge(dm, dm->dm_rootdir); 503150342Sphk} 504150342Sphk 505130678Sphk/* 506130678Sphk * devfs_create() and devfs_destroy() are called from kern_conf.c and 507130678Sphk * in both cases the devlock() mutex is held, so no further locking 508130678Sphk * is necesary and no sleeping allowed. 509130678Sphk */ 510130678Sphk 511111730Sphkvoid 512130585Sphkdevfs_create(struct cdev *dev) 51364880Sphk{ 514150342Sphk struct cdev_priv *cdp; 51565515Sphk 516150342Sphk mtx_assert(&devmtx, MA_OWNED); 517179828Skib cdp = cdev2priv(dev); 518150342Sphk cdp->cdp_flags |= CDP_ACTIVE; 519150342Sphk cdp->cdp_inode = alloc_unrl(devfs_inos); 520150342Sphk dev_refl(dev); 521150342Sphk TAILQ_INSERT_TAIL(&cdevp_list, cdp, cdp_list); 522130678Sphk devfs_generation++; 52364880Sphk} 52464880Sphk 525111730Sphkvoid 526130585Sphkdevfs_destroy(struct cdev *dev) 52764880Sphk{ 528150342Sphk struct cdev_priv *cdp; 52965515Sphk 530150342Sphk mtx_assert(&devmtx, MA_OWNED); 531179828Skib cdp = cdev2priv(dev); 532150342Sphk cdp->cdp_flags &= ~CDP_ACTIVE; 533130678Sphk devfs_generation++; 53464880Sphk} 535150342Sphk 536150342Sphkstatic void 537150342Sphkdevfs_devs_init(void *junk __unused) 538150342Sphk{ 539150342Sphk 540150342Sphk devfs_inos = new_unrhdr(DEVFS_ROOTINO + 1, INT_MAX, &devmtx); 541150342Sphk} 542150342Sphk 543150342SphkSYSINIT(devfs_devs, SI_SUB_DEVFS, SI_ORDER_FIRST, devfs_devs_init, NULL); 544