devfs_devs.c revision 203292
1139776Simp/*- 2130678Sphk * Copyright (c) 2000,2004 364880Sphk * Poul-Henning Kamp. All rights reserved. 464880Sphk * 564880Sphk * Redistribution and use in source and binary forms, with or without 664880Sphk * modification, are permitted provided that the following conditions 764880Sphk * are met: 864880Sphk * 1. Redistributions of source code must retain the above copyright 964880Sphk * notice, this list of conditions and the following disclaimer. 1064880Sphk * 2. Neither the name of the University nor the names of its contributors 1164880Sphk * may be used to endorse or promote products derived from this software 1264880Sphk * without specific prior written permission. 1364880Sphk * 1464880Sphk * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 1564880Sphk * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1664880Sphk * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 1764880Sphk * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 1864880Sphk * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 1964880Sphk * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2064880Sphk * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2164880Sphk * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2264880Sphk * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2364880Sphk * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 2464880Sphk * SUCH DAMAGE. 2564880Sphk * 2664880Sphk * From: FreeBSD: src/sys/miscfs/kernfs/kernfs_vfsops.c 1.36 2764880Sphk * 2864880Sphk * $FreeBSD: head/sys/fs/devfs/devfs_devs.c 203292 2010-01-31 15:19:16Z ed $ 2964880Sphk */ 3064880Sphk 3164880Sphk#include <sys/param.h> 3264880Sphk#include <sys/systm.h> 3376166Smarkm#include <sys/conf.h> 3464880Sphk#include <sys/dirent.h> 3576166Smarkm#include <sys/kernel.h> 36150342Sphk#include <sys/limits.h> 3776166Smarkm#include <sys/lock.h> 3864880Sphk#include <sys/malloc.h> 3976166Smarkm#include <sys/proc.h> 40150342Sphk#include <sys/sx.h> 4165515Sphk#include <sys/sysctl.h> 4276166Smarkm#include <sys/vnode.h> 4364880Sphk 44150342Sphk#include <sys/kdb.h> 4565515Sphk 4664880Sphk#include <fs/devfs/devfs.h> 47149144Sphk#include <fs/devfs/devfs_int.h> 4864880Sphk 49163606Srwatson#include <security/mac/mac_framework.h> 50163606Srwatson 51150342Sphk/* 52150342Sphk * The one true (but secret) list of active devices in the system. 53150342Sphk * Locked by dev_lock()/devmtx 54150342Sphk */ 55163481Skibstruct cdev_priv_list cdevp_list = TAILQ_HEAD_INITIALIZER(cdevp_list); 5665515Sphk 57150342Sphkstruct unrhdr *devfs_inos; 5869767Sphk 59150342Sphk 60150342Sphkstatic MALLOC_DEFINE(M_DEVFS2, "DEVFS2", "DEVFS data 2"); 61150342Sphkstatic MALLOC_DEFINE(M_DEVFS3, "DEVFS3", "DEVFS data 3"); 62150342Sphkstatic MALLOC_DEFINE(M_CDEVP, "DEVFS1", "DEVFS cdev_priv storage"); 63150342Sphk 64141633Sphkstatic SYSCTL_NODE(_vfs, OID_AUTO, devfs, CTLFLAG_RW, 0, "DEVFS filesystem"); 65150342Sphk 66150342Sphkstatic unsigned devfs_generation; 6765515SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, generation, CTLFLAG_RD, 6865515Sphk &devfs_generation, 0, "DEVFS generation number"); 6965515Sphk 70150147Sphkunsigned devfs_rule_depth = 1; 71150147SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, rule_depth, CTLFLAG_RW, 72150342Sphk &devfs_rule_depth, 0, "Max depth of ruleset include"); 73150147Sphk 74149146Sphk/* 75203292Sed * Helper sysctl for devname(3). We're given a dev_t and return the 76203292Sed * name, if any, registered by the device driver. 77149146Sphk */ 78149146Sphkstatic int 79149146Sphksysctl_devname(SYSCTL_HANDLER_ARGS) 80149146Sphk{ 81149146Sphk int error; 82149146Sphk dev_t ud; 83150342Sphk struct cdev_priv *cdp; 84203292Sed struct cdev *dev; 85149146Sphk 86149146Sphk error = SYSCTL_IN(req, &ud, sizeof (ud)); 87149146Sphk if (error) 88149146Sphk return (error); 89149146Sphk if (ud == NODEV) 90203292Sed return (EINVAL); 91203292Sed dev = NULL; 92150342Sphk dev_lock(); 93150342Sphk TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) 94203292Sed if (cdp->cdp_inode == ud) { 95203292Sed dev = &cdp->cdp_c; 96203292Sed dev_refl(dev); 97150342Sphk break; 98203292Sed } 99150342Sphk dev_unlock(); 100203292Sed if (dev == NULL) 101203292Sed return (ENOENT); 102203292Sed error = SYSCTL_OUT(req, dev->si_name, strlen(dev->si_name) + 1); 103203292Sed dev_rel(dev); 104149146Sphk return (error); 105149146Sphk} 106149146Sphk 107187864SedSYSCTL_PROC(_kern, OID_AUTO, devname, 108187864Sed CTLTYPE_OPAQUE|CTLFLAG_RW|CTLFLAG_ANYBODY|CTLFLAG_MPSAFE, 109187864Sed NULL, 0, sysctl_devname, "", "devname(3) handler"); 110149146Sphk 111149146SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev, CTLFLAG_RD, 112149146Sphk 0, sizeof(struct cdev), "sizeof(struct cdev)"); 113149146Sphk 114150342SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev_priv, CTLFLAG_RD, 115150342Sphk 0, sizeof(struct cdev_priv), "sizeof(struct cdev_priv)"); 11665515Sphk 117150342Sphkstruct cdev * 118150342Sphkdevfs_alloc(void) 11965515Sphk{ 120150342Sphk struct cdev_priv *cdp; 121150342Sphk struct cdev *cdev; 122183230Sed struct timespec ts; 12365515Sphk 124150342Sphk cdp = malloc(sizeof *cdp, M_CDEVP, M_USE_RESERVE | M_ZERO | M_WAITOK); 12565515Sphk 126150342Sphk cdp->cdp_dirents = &cdp->cdp_dirent0; 127150342Sphk cdp->cdp_dirent0 = NULL; 128150342Sphk cdp->cdp_maxdirent = 0; 12965515Sphk 130150342Sphk cdev = &cdp->cdp_c; 13165515Sphk 132150342Sphk cdev->si_name = cdev->__si_namebuf; 133150342Sphk LIST_INIT(&cdev->si_children); 134183230Sed vfs_timestamp(&ts); 135183230Sed cdev->si_atime = cdev->si_mtime = cdev->si_ctime = ts; 136183230Sed 137150342Sphk return (cdev); 13865515Sphk} 13965515Sphk 140150342Sphkvoid 141150342Sphkdevfs_free(struct cdev *cdev) 14265515Sphk{ 143150342Sphk struct cdev_priv *cdp; 14465515Sphk 145179828Skib cdp = cdev2priv(cdev); 146150342Sphk if (cdev->si_cred != NULL) 147150342Sphk crfree(cdev->si_cred); 148150342Sphk if (cdp->cdp_inode > 0) 149150342Sphk free_unr(devfs_inos, cdp->cdp_inode); 150150342Sphk if (cdp->cdp_maxdirent > 0) 151150342Sphk free(cdp->cdp_dirents, M_DEVFS2); 152150342Sphk free(cdp, M_CDEVP); 15365515Sphk} 15465515Sphk 155150342Sphkstruct devfs_dirent * 15665132Sphkdevfs_find(struct devfs_dirent *dd, const char *name, int namelen) 15765132Sphk{ 15865132Sphk struct devfs_dirent *de; 15965132Sphk 16065132Sphk TAILQ_FOREACH(de, &dd->de_dlist, de_list) { 16165132Sphk if (namelen != de->de_dirent->d_namlen) 16265132Sphk continue; 16365132Sphk if (bcmp(name, de->de_dirent->d_name, namelen) != 0) 16465132Sphk continue; 16565132Sphk break; 16665132Sphk } 16765132Sphk return (de); 16865132Sphk} 16965132Sphk 17065132Sphkstruct devfs_dirent * 17164880Sphkdevfs_newdirent(char *name, int namelen) 17264880Sphk{ 17364880Sphk int i; 17464880Sphk struct devfs_dirent *de; 17564880Sphk struct dirent d; 17664880Sphk 17764880Sphk d.d_namlen = namelen; 178150342Sphk i = sizeof (*de) + GENERIC_DIRSIZ(&d); 179150342Sphk de = malloc(i, M_DEVFS3, M_WAITOK | M_ZERO); 18064880Sphk de->de_dirent = (struct dirent *)(de + 1); 18164880Sphk de->de_dirent->d_namlen = namelen; 18264880Sphk de->de_dirent->d_reclen = GENERIC_DIRSIZ(&d); 18371822Sphk bcopy(name, de->de_dirent->d_name, namelen); 18471822Sphk de->de_dirent->d_name[namelen] = '\0'; 18585979Sphk vfs_timestamp(&de->de_ctime); 18665051Sphk de->de_mtime = de->de_atime = de->de_ctime; 18765051Sphk de->de_links = 1; 188162398Skib de->de_holdcnt = 1; 189101069Srwatson#ifdef MAC 190172930Srwatson mac_devfs_init(de); 191101069Srwatson#endif 19264880Sphk return (de); 19364880Sphk} 19464880Sphk 19565051Sphkstruct devfs_dirent * 196150342Sphkdevfs_vmkdir(struct devfs_mount *dmp, char *name, int namelen, struct devfs_dirent *dotdot, u_int inode) 19764880Sphk{ 19865051Sphk struct devfs_dirent *dd; 19964880Sphk struct devfs_dirent *de; 20064880Sphk 201150342Sphk /* Create the new directory */ 20265051Sphk dd = devfs_newdirent(name, namelen); 20365051Sphk TAILQ_INIT(&dd->de_dlist); 20465051Sphk dd->de_dirent->d_type = DT_DIR; 20585979Sphk dd->de_mode = 0555; 20665051Sphk dd->de_links = 2; 20765051Sphk dd->de_dir = dd; 208150342Sphk if (inode != 0) 209150342Sphk dd->de_inode = inode; 210150342Sphk else 211150342Sphk dd->de_inode = alloc_unr(devfs_inos); 21265051Sphk 213150342Sphk /* Create the "." entry in the new directory */ 21464880Sphk de = devfs_newdirent(".", 1); 21564880Sphk de->de_dirent->d_type = DT_DIR; 21665051Sphk de->de_flags |= DE_DOT; 21765051Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 218150342Sphk de->de_dir = dd; 21965051Sphk 220150342Sphk /* Create the ".." entry in the new directory */ 22165051Sphk de = devfs_newdirent("..", 2); 22265051Sphk de->de_dirent->d_type = DT_DIR; 223150342Sphk de->de_flags |= DE_DOTDOT; 224150342Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 225150342Sphk if (dotdot == NULL) { 22665051Sphk de->de_dir = dd; 227150342Sphk } else { 22865051Sphk de->de_dir = dotdot; 229150342Sphk TAILQ_INSERT_TAIL(&dotdot->de_dlist, dd, de_list); 230150342Sphk dotdot->de_links++; 231150342Sphk } 23265051Sphk 233150342Sphk#ifdef MAC 234172930Srwatson mac_devfs_create_directory(dmp->dm_mount, name, namelen, dd); 235150342Sphk#endif 23664880Sphk return (dd); 23764880Sphk} 23864880Sphk 239150342Sphkvoid 240162398Skibdevfs_dirent_free(struct devfs_dirent *de) 241162398Skib{ 242162398Skib free(de, M_DEVFS3); 243162398Skib} 244162398Skib 245163481Skib/* 246163481Skib * The caller needs to hold the dm for the duration of the call since 247163481Skib * dm->dm_lock may be temporary dropped. 248163481Skib */ 249162398Skibvoid 250163481Skibdevfs_delete(struct devfs_mount *dm, struct devfs_dirent *de, int vp_locked) 25164880Sphk{ 252163481Skib struct vnode *vp; 25364880Sphk 254162398Skib KASSERT((de->de_flags & DE_DOOMED) == 0, 255162398Skib ("devfs_delete doomed dirent")); 256162398Skib de->de_flags |= DE_DOOMED; 257163481Skib mtx_lock(&devfs_de_interlock); 258163481Skib vp = de->de_vnode; 259163481Skib if (vp != NULL) { 260163481Skib VI_LOCK(vp); 261163481Skib mtx_unlock(&devfs_de_interlock); 262163481Skib vholdl(vp); 263163481Skib sx_unlock(&dm->dm_lock); 264163481Skib if (!vp_locked) 265175202Sattilio vn_lock(vp, LK_EXCLUSIVE | LK_INTERLOCK | LK_RETRY); 266163481Skib else 267163481Skib VI_UNLOCK(vp); 268163481Skib vgone(vp); 269163481Skib if (!vp_locked) 270175294Sattilio VOP_UNLOCK(vp, 0); 271163481Skib vdrop(vp); 272163481Skib sx_xlock(&dm->dm_lock); 273163481Skib } else 274163481Skib mtx_unlock(&devfs_de_interlock); 27564880Sphk if (de->de_symlink) { 276150151Sphk free(de->de_symlink, M_DEVFS); 27764880Sphk de->de_symlink = NULL; 27864880Sphk } 279101069Srwatson#ifdef MAC 280172930Srwatson mac_devfs_destroy(de); 281101069Srwatson#endif 282150342Sphk if (de->de_inode > DEVFS_ROOTINO) { 283150342Sphk free_unr(devfs_inos, de->de_inode); 284150342Sphk de->de_inode = 0; 285150342Sphk } 286162398Skib if (DEVFS_DE_DROP(de)) 287162398Skib devfs_dirent_free(de); 28864880Sphk} 28964880Sphk 290150342Sphk/* 291150342Sphk * Called on unmount. 292163481Skib * Recursively removes the entire tree. 293163481Skib * The caller needs to hold the dm for the duration of the call. 294150342Sphk */ 295150342Sphk 296150342Sphkstatic void 297150342Sphkdevfs_purge(struct devfs_mount *dm, struct devfs_dirent *dd) 29864880Sphk{ 29964880Sphk struct devfs_dirent *de; 30064880Sphk 301150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 30264880Sphk for (;;) { 30365051Sphk de = TAILQ_FIRST(&dd->de_dlist); 30464880Sphk if (de == NULL) 30564880Sphk break; 306150342Sphk TAILQ_REMOVE(&dd->de_dlist, de, de_list); 307150342Sphk if (de->de_flags & (DE_DOT|DE_DOTDOT)) 308163481Skib devfs_delete(dm, de, 0); 309150342Sphk else if (de->de_dirent->d_type == DT_DIR) 310150342Sphk devfs_purge(dm, de); 311150342Sphk else 312163481Skib devfs_delete(dm, de, 0); 31364880Sphk } 314163481Skib devfs_delete(dm, dd, 0); 31564880Sphk} 31664880Sphk 317150342Sphk/* 318150342Sphk * Each cdev_priv has an array of pointers to devfs_dirent which is indexed 319150342Sphk * by the mount points dm_idx. 320150342Sphk * This function extends the array when necessary, taking into account that 321150342Sphk * the default array is 1 element and not malloc'ed. 322150342Sphk */ 323150342Sphkstatic void 324150342Sphkdevfs_metoo(struct cdev_priv *cdp, struct devfs_mount *dm) 325150342Sphk{ 326150342Sphk struct devfs_dirent **dep; 327150342Sphk int siz; 32864880Sphk 329150342Sphk siz = (dm->dm_idx + 1) * sizeof *dep; 330150342Sphk dep = malloc(siz, M_DEVFS2, M_WAITOK | M_ZERO); 331150342Sphk dev_lock(); 332150342Sphk if (dm->dm_idx <= cdp->cdp_maxdirent) { 333150342Sphk /* We got raced */ 334150342Sphk dev_unlock(); 335150342Sphk free(dep, M_DEVFS2); 336150342Sphk return; 337150342Sphk } 338150342Sphk memcpy(dep, cdp->cdp_dirents, (cdp->cdp_maxdirent + 1) * sizeof *dep); 339150342Sphk if (cdp->cdp_maxdirent > 0) 340150342Sphk free(cdp->cdp_dirents, M_DEVFS2); 341150342Sphk cdp->cdp_dirents = dep; 342150342Sphk /* 343150342Sphk * XXX: if malloc told us how much we actually got this could 344150342Sphk * XXX: be optimized. 345150342Sphk */ 346150342Sphk cdp->cdp_maxdirent = dm->dm_idx; 347150342Sphk dev_unlock(); 348150342Sphk} 349150342Sphk 350163481Skib/* 351163481Skib * The caller needs to hold the dm for the duration of the call. 352163481Skib */ 353150342Sphkstatic int 354150342Sphkdevfs_populate_loop(struct devfs_mount *dm, int cleanup) 35564880Sphk{ 356150342Sphk struct cdev_priv *cdp; 357150342Sphk struct devfs_dirent *de; 35865051Sphk struct devfs_dirent *dd; 359150342Sphk struct cdev *pdev; 360150342Sphk int j; 36164880Sphk char *q, *s; 36264880Sphk 363150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 364150342Sphk dev_lock(); 365150342Sphk TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) { 366150342Sphk 367150342Sphk KASSERT(cdp->cdp_dirents != NULL, ("NULL cdp_dirents")); 368150342Sphk 369150342Sphk /* 370150342Sphk * If we are unmounting, or the device has been destroyed, 371150342Sphk * clean up our dirent. 372150342Sphk */ 373150342Sphk if ((cleanup || !(cdp->cdp_flags & CDP_ACTIVE)) && 374150342Sphk dm->dm_idx <= cdp->cdp_maxdirent && 375150342Sphk cdp->cdp_dirents[dm->dm_idx] != NULL) { 376150342Sphk de = cdp->cdp_dirents[dm->dm_idx]; 377150342Sphk cdp->cdp_dirents[dm->dm_idx] = NULL; 378150342Sphk KASSERT(cdp == de->de_cdp, 379150342Sphk ("%s %d %s %p %p", __func__, __LINE__, 380150342Sphk cdp->cdp_c.si_name, cdp, de->de_cdp)); 381150342Sphk KASSERT(de->de_dir != NULL, ("Null de->de_dir")); 382150342Sphk dev_unlock(); 383150342Sphk 384150342Sphk TAILQ_REMOVE(&de->de_dir->de_dlist, de, de_list); 385150342Sphk de->de_cdp = NULL; 386150342Sphk de->de_inode = 0; 387163481Skib devfs_delete(dm, de, 0); 388163481Skib dev_lock(); 389163481Skib cdp->cdp_inuse--; 390163481Skib dev_unlock(); 391150342Sphk return (1); 392150342Sphk } 393150342Sphk /* 394150342Sphk * GC any lingering devices 395150342Sphk */ 396150342Sphk if (!(cdp->cdp_flags & CDP_ACTIVE)) { 397150342Sphk if (cdp->cdp_inuse > 0) 39865051Sphk continue; 399150342Sphk TAILQ_REMOVE(&cdevp_list, cdp, cdp_list); 400150342Sphk dev_unlock(); 401150342Sphk dev_rel(&cdp->cdp_c); 402150342Sphk return (1); 403150342Sphk } 404150342Sphk /* 405150342Sphk * Don't create any new dirents if we are unmounting 406150342Sphk */ 407150342Sphk if (cleanup) 408150342Sphk continue; 409150342Sphk KASSERT((cdp->cdp_flags & CDP_ACTIVE), ("Bogons, I tell ya'!")); 410150342Sphk 411150342Sphk if (dm->dm_idx <= cdp->cdp_maxdirent && 412150342Sphk cdp->cdp_dirents[dm->dm_idx] != NULL) { 413150342Sphk de = cdp->cdp_dirents[dm->dm_idx]; 414150342Sphk KASSERT(cdp == de->de_cdp, ("inconsistent cdp")); 415150342Sphk continue; 416150342Sphk } 417150342Sphk 418150342Sphk 419150342Sphk cdp->cdp_inuse++; 420150342Sphk dev_unlock(); 421150342Sphk 422150342Sphk if (dm->dm_idx > cdp->cdp_maxdirent) 423150342Sphk devfs_metoo(cdp, dm); 424150342Sphk 425150342Sphk dd = dm->dm_rootdir; 426150342Sphk s = cdp->cdp_c.si_name; 427150342Sphk for (;;) { 428150342Sphk for (q = s; *q != '/' && *q != '\0'; q++) 42964880Sphk continue; 430150342Sphk if (*q != '/') 431150342Sphk break; 432150342Sphk de = devfs_find(dd, s, q - s); 433150342Sphk if (de == NULL) 434150342Sphk de = devfs_vmkdir(dm, s, q - s, dd, 0); 435150342Sphk s = q + 1; 436150342Sphk dd = de; 437150342Sphk } 438150342Sphk 439150342Sphk de = devfs_newdirent(s, q - s); 440150342Sphk if (cdp->cdp_c.si_flags & SI_ALIAS) { 441150342Sphk de->de_uid = 0; 442150342Sphk de->de_gid = 0; 443150342Sphk de->de_mode = 0755; 444150342Sphk de->de_dirent->d_type = DT_LNK; 445150342Sphk pdev = cdp->cdp_c.si_parent; 446150342Sphk j = strlen(pdev->si_name) + 1; 447150342Sphk de->de_symlink = malloc(j, M_DEVFS, M_WAITOK); 448150342Sphk bcopy(pdev->si_name, de->de_symlink, j); 449150342Sphk } else { 450150342Sphk de->de_uid = cdp->cdp_c.si_uid; 451150342Sphk de->de_gid = cdp->cdp_c.si_gid; 452150342Sphk de->de_mode = cdp->cdp_c.si_mode; 453150342Sphk de->de_dirent->d_type = DT_CHR; 454150342Sphk } 455150342Sphk de->de_inode = cdp->cdp_inode; 456150342Sphk de->de_cdp = cdp; 457101069Srwatson#ifdef MAC 458172930Srwatson mac_devfs_create_device(cdp->cdp_c.si_cred, dm->dm_mount, 459150342Sphk &cdp->cdp_c, de); 460101069Srwatson#endif 461150342Sphk de->de_dir = dd; 462150342Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 463150342Sphk devfs_rules_apply(dm, de); 464150342Sphk dev_lock(); 465150342Sphk /* XXX: could check that cdp is still active here */ 466150342Sphk KASSERT(cdp->cdp_dirents[dm->dm_idx] == NULL, 467150342Sphk ("%s %d\n", __func__, __LINE__)); 468150342Sphk cdp->cdp_dirents[dm->dm_idx] = de; 469150342Sphk KASSERT(de->de_cdp != (void *)0xdeadc0de, 470150342Sphk ("%s %d\n", __func__, __LINE__)); 471150342Sphk dev_unlock(); 472150342Sphk return (1); 47364880Sphk } 474150342Sphk dev_unlock(); 475150342Sphk return (0); 47664880Sphk} 47764880Sphk 478163481Skib/* 479163481Skib * The caller needs to hold the dm for the duration of the call. 480163481Skib */ 481150342Sphkvoid 482150342Sphkdevfs_populate(struct devfs_mount *dm) 483150342Sphk{ 484150342Sphk 485150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 486150342Sphk if (dm->dm_generation == devfs_generation) 487150342Sphk return; 488150342Sphk while (devfs_populate_loop(dm, 0)) 489150342Sphk continue; 490150342Sphk dm->dm_generation = devfs_generation; 491150342Sphk} 492150342Sphk 493163481Skib/* 494163481Skib * The caller needs to hold the dm for the duration of the call. 495163481Skib */ 496150342Sphkvoid 497150342Sphkdevfs_cleanup(struct devfs_mount *dm) 498150342Sphk{ 499150342Sphk 500150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 501150342Sphk while (devfs_populate_loop(dm, 1)) 502150342Sphk continue; 503150342Sphk devfs_purge(dm, dm->dm_rootdir); 504150342Sphk} 505150342Sphk 506130678Sphk/* 507130678Sphk * devfs_create() and devfs_destroy() are called from kern_conf.c and 508130678Sphk * in both cases the devlock() mutex is held, so no further locking 509130678Sphk * is necesary and no sleeping allowed. 510130678Sphk */ 511130678Sphk 512111730Sphkvoid 513130585Sphkdevfs_create(struct cdev *dev) 51464880Sphk{ 515150342Sphk struct cdev_priv *cdp; 51665515Sphk 517150342Sphk mtx_assert(&devmtx, MA_OWNED); 518179828Skib cdp = cdev2priv(dev); 519150342Sphk cdp->cdp_flags |= CDP_ACTIVE; 520150342Sphk cdp->cdp_inode = alloc_unrl(devfs_inos); 521150342Sphk dev_refl(dev); 522150342Sphk TAILQ_INSERT_TAIL(&cdevp_list, cdp, cdp_list); 523130678Sphk devfs_generation++; 52464880Sphk} 52564880Sphk 526111730Sphkvoid 527130585Sphkdevfs_destroy(struct cdev *dev) 52864880Sphk{ 529150342Sphk struct cdev_priv *cdp; 53065515Sphk 531150342Sphk mtx_assert(&devmtx, MA_OWNED); 532179828Skib cdp = cdev2priv(dev); 533150342Sphk cdp->cdp_flags &= ~CDP_ACTIVE; 534130678Sphk devfs_generation++; 53564880Sphk} 536150342Sphk 537150342Sphkstatic void 538150342Sphkdevfs_devs_init(void *junk __unused) 539150342Sphk{ 540150342Sphk 541150342Sphk devfs_inos = new_unrhdr(DEVFS_ROOTINO + 1, INT_MAX, &devmtx); 542150342Sphk} 543150342Sphk 544150342SphkSYSINIT(devfs_devs, SI_SUB_DEVFS, SI_ORDER_FIRST, devfs_devs_init, NULL); 545