devfs_devs.c revision 212826
1139776Simp/*- 2130678Sphk * Copyright (c) 2000,2004 364880Sphk * Poul-Henning Kamp. All rights reserved. 464880Sphk * 564880Sphk * Redistribution and use in source and binary forms, with or without 664880Sphk * modification, are permitted provided that the following conditions 764880Sphk * are met: 864880Sphk * 1. Redistributions of source code must retain the above copyright 964880Sphk * notice, this list of conditions and the following disclaimer. 1064880Sphk * 2. Neither the name of the University nor the names of its contributors 1164880Sphk * may be used to endorse or promote products derived from this software 1264880Sphk * without specific prior written permission. 1364880Sphk * 1464880Sphk * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 1564880Sphk * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 1664880Sphk * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 1764880Sphk * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 1864880Sphk * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 1964880Sphk * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2064880Sphk * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2164880Sphk * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2264880Sphk * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 2364880Sphk * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 2464880Sphk * SUCH DAMAGE. 2564880Sphk * 2664880Sphk * From: FreeBSD: src/sys/miscfs/kernfs/kernfs_vfsops.c 1.36 2764880Sphk * 2864880Sphk * $FreeBSD: head/sys/fs/devfs/devfs_devs.c 212826 2010-09-18 18:37:41Z jh $ 2964880Sphk */ 3064880Sphk 3164880Sphk#include <sys/param.h> 3264880Sphk#include <sys/systm.h> 3376166Smarkm#include <sys/conf.h> 3464880Sphk#include <sys/dirent.h> 3576166Smarkm#include <sys/kernel.h> 36150342Sphk#include <sys/limits.h> 3776166Smarkm#include <sys/lock.h> 3864880Sphk#include <sys/malloc.h> 3976166Smarkm#include <sys/proc.h> 40150342Sphk#include <sys/sx.h> 4165515Sphk#include <sys/sysctl.h> 4276166Smarkm#include <sys/vnode.h> 4364880Sphk 44150342Sphk#include <sys/kdb.h> 4565515Sphk 4664880Sphk#include <fs/devfs/devfs.h> 47149144Sphk#include <fs/devfs/devfs_int.h> 4864880Sphk 49163606Srwatson#include <security/mac/mac_framework.h> 50163606Srwatson 51150342Sphk/* 52150342Sphk * The one true (but secret) list of active devices in the system. 53150342Sphk * Locked by dev_lock()/devmtx 54150342Sphk */ 55163481Skibstruct cdev_priv_list cdevp_list = TAILQ_HEAD_INITIALIZER(cdevp_list); 5665515Sphk 57150342Sphkstruct unrhdr *devfs_inos; 5869767Sphk 59150342Sphk 60150342Sphkstatic MALLOC_DEFINE(M_DEVFS2, "DEVFS2", "DEVFS data 2"); 61150342Sphkstatic MALLOC_DEFINE(M_DEVFS3, "DEVFS3", "DEVFS data 3"); 62150342Sphkstatic MALLOC_DEFINE(M_CDEVP, "DEVFS1", "DEVFS cdev_priv storage"); 63150342Sphk 64141633Sphkstatic SYSCTL_NODE(_vfs, OID_AUTO, devfs, CTLFLAG_RW, 0, "DEVFS filesystem"); 65150342Sphk 66150342Sphkstatic unsigned devfs_generation; 6765515SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, generation, CTLFLAG_RD, 6865515Sphk &devfs_generation, 0, "DEVFS generation number"); 6965515Sphk 70150147Sphkunsigned devfs_rule_depth = 1; 71150147SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, rule_depth, CTLFLAG_RW, 72150342Sphk &devfs_rule_depth, 0, "Max depth of ruleset include"); 73150147Sphk 74149146Sphk/* 75203292Sed * Helper sysctl for devname(3). We're given a dev_t and return the 76203292Sed * name, if any, registered by the device driver. 77149146Sphk */ 78149146Sphkstatic int 79149146Sphksysctl_devname(SYSCTL_HANDLER_ARGS) 80149146Sphk{ 81149146Sphk int error; 82149146Sphk dev_t ud; 83150342Sphk struct cdev_priv *cdp; 84203292Sed struct cdev *dev; 85149146Sphk 86149146Sphk error = SYSCTL_IN(req, &ud, sizeof (ud)); 87149146Sphk if (error) 88149146Sphk return (error); 89149146Sphk if (ud == NODEV) 90203292Sed return (EINVAL); 91203292Sed dev = NULL; 92150342Sphk dev_lock(); 93150342Sphk TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) 94203292Sed if (cdp->cdp_inode == ud) { 95203292Sed dev = &cdp->cdp_c; 96203292Sed dev_refl(dev); 97150342Sphk break; 98203292Sed } 99150342Sphk dev_unlock(); 100203292Sed if (dev == NULL) 101203292Sed return (ENOENT); 102203292Sed error = SYSCTL_OUT(req, dev->si_name, strlen(dev->si_name) + 1); 103203292Sed dev_rel(dev); 104149146Sphk return (error); 105149146Sphk} 106149146Sphk 107187864SedSYSCTL_PROC(_kern, OID_AUTO, devname, 108187864Sed CTLTYPE_OPAQUE|CTLFLAG_RW|CTLFLAG_ANYBODY|CTLFLAG_MPSAFE, 109187864Sed NULL, 0, sysctl_devname, "", "devname(3) handler"); 110149146Sphk 111149146SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev, CTLFLAG_RD, 112149146Sphk 0, sizeof(struct cdev), "sizeof(struct cdev)"); 113149146Sphk 114150342SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev_priv, CTLFLAG_RD, 115150342Sphk 0, sizeof(struct cdev_priv), "sizeof(struct cdev_priv)"); 11665515Sphk 117150342Sphkstruct cdev * 118207729Skibdevfs_alloc(int flags) 11965515Sphk{ 120150342Sphk struct cdev_priv *cdp; 121150342Sphk struct cdev *cdev; 122183230Sed struct timespec ts; 12365515Sphk 124207729Skib cdp = malloc(sizeof *cdp, M_CDEVP, M_USE_RESERVE | M_ZERO | 125207729Skib ((flags & MAKEDEV_NOWAIT) ? M_NOWAIT : M_WAITOK)); 126207729Skib if (cdp == NULL) 127207729Skib return (NULL); 12865515Sphk 129150342Sphk cdp->cdp_dirents = &cdp->cdp_dirent0; 130150342Sphk cdp->cdp_dirent0 = NULL; 131150342Sphk cdp->cdp_maxdirent = 0; 132207729Skib cdp->cdp_inode = 0; 13365515Sphk 134150342Sphk cdev = &cdp->cdp_c; 13565515Sphk 136150342Sphk cdev->si_name = cdev->__si_namebuf; 137150342Sphk LIST_INIT(&cdev->si_children); 138183230Sed vfs_timestamp(&ts); 139183230Sed cdev->si_atime = cdev->si_mtime = cdev->si_ctime = ts; 140207729Skib cdev->si_cred = NULL; 141183230Sed 142150342Sphk return (cdev); 14365515Sphk} 14465515Sphk 145150342Sphkvoid 146150342Sphkdevfs_free(struct cdev *cdev) 14765515Sphk{ 148150342Sphk struct cdev_priv *cdp; 14965515Sphk 150179828Skib cdp = cdev2priv(cdev); 151150342Sphk if (cdev->si_cred != NULL) 152150342Sphk crfree(cdev->si_cred); 153150342Sphk if (cdp->cdp_inode > 0) 154150342Sphk free_unr(devfs_inos, cdp->cdp_inode); 155150342Sphk if (cdp->cdp_maxdirent > 0) 156150342Sphk free(cdp->cdp_dirents, M_DEVFS2); 157150342Sphk free(cdp, M_CDEVP); 15865515Sphk} 15965515Sphk 160150342Sphkstruct devfs_dirent * 161211226Sjhdevfs_find(struct devfs_dirent *dd, const char *name, int namelen, int type) 16265132Sphk{ 16365132Sphk struct devfs_dirent *de; 16465132Sphk 16565132Sphk TAILQ_FOREACH(de, &dd->de_dlist, de_list) { 16665132Sphk if (namelen != de->de_dirent->d_namlen) 16765132Sphk continue; 168211226Sjh if (type != 0 && type != de->de_dirent->d_type) 169211226Sjh continue; 17065132Sphk if (bcmp(name, de->de_dirent->d_name, namelen) != 0) 17165132Sphk continue; 17265132Sphk break; 17365132Sphk } 174212826Sjh KASSERT(de == NULL || (de->de_flags & DE_DOOMED) == 0, 175212826Sjh ("devfs_find: returning a doomed entry")); 17665132Sphk return (de); 17765132Sphk} 17865132Sphk 17965132Sphkstruct devfs_dirent * 18064880Sphkdevfs_newdirent(char *name, int namelen) 18164880Sphk{ 18264880Sphk int i; 18364880Sphk struct devfs_dirent *de; 18464880Sphk struct dirent d; 18564880Sphk 18664880Sphk d.d_namlen = namelen; 187150342Sphk i = sizeof (*de) + GENERIC_DIRSIZ(&d); 188150342Sphk de = malloc(i, M_DEVFS3, M_WAITOK | M_ZERO); 18964880Sphk de->de_dirent = (struct dirent *)(de + 1); 19064880Sphk de->de_dirent->d_namlen = namelen; 19164880Sphk de->de_dirent->d_reclen = GENERIC_DIRSIZ(&d); 19271822Sphk bcopy(name, de->de_dirent->d_name, namelen); 19371822Sphk de->de_dirent->d_name[namelen] = '\0'; 19485979Sphk vfs_timestamp(&de->de_ctime); 19565051Sphk de->de_mtime = de->de_atime = de->de_ctime; 19665051Sphk de->de_links = 1; 197162398Skib de->de_holdcnt = 1; 198101069Srwatson#ifdef MAC 199172930Srwatson mac_devfs_init(de); 200101069Srwatson#endif 20164880Sphk return (de); 20264880Sphk} 20364880Sphk 20465051Sphkstruct devfs_dirent * 205208951Sjhdevfs_parent_dirent(struct devfs_dirent *de) 206208951Sjh{ 207208951Sjh 208208951Sjh if (de->de_dirent->d_type != DT_DIR) 209208951Sjh return (de->de_dir); 210208951Sjh 211208951Sjh if (de->de_flags & (DE_DOT | DE_DOTDOT)) 212208951Sjh return (NULL); 213208951Sjh 214208951Sjh de = TAILQ_FIRST(&de->de_dlist); /* "." */ 215208951Sjh if (de == NULL) 216208951Sjh return (NULL); 217208951Sjh de = TAILQ_NEXT(de, de_list); /* ".." */ 218208951Sjh if (de == NULL) 219208951Sjh return (NULL); 220208951Sjh 221208951Sjh return (de->de_dir); 222208951Sjh} 223208951Sjh 224208951Sjhstruct devfs_dirent * 225150342Sphkdevfs_vmkdir(struct devfs_mount *dmp, char *name, int namelen, struct devfs_dirent *dotdot, u_int inode) 22664880Sphk{ 22765051Sphk struct devfs_dirent *dd; 22864880Sphk struct devfs_dirent *de; 22964880Sphk 230150342Sphk /* Create the new directory */ 23165051Sphk dd = devfs_newdirent(name, namelen); 23265051Sphk TAILQ_INIT(&dd->de_dlist); 23365051Sphk dd->de_dirent->d_type = DT_DIR; 23485979Sphk dd->de_mode = 0555; 23565051Sphk dd->de_links = 2; 23665051Sphk dd->de_dir = dd; 237150342Sphk if (inode != 0) 238150342Sphk dd->de_inode = inode; 239150342Sphk else 240150342Sphk dd->de_inode = alloc_unr(devfs_inos); 24165051Sphk 242211226Sjh /* 243211226Sjh * "." and ".." are always the two first entries in the 244211226Sjh * de_dlist list. 245211226Sjh * 246211226Sjh * Create the "." entry in the new directory. 247211226Sjh */ 24864880Sphk de = devfs_newdirent(".", 1); 24964880Sphk de->de_dirent->d_type = DT_DIR; 25065051Sphk de->de_flags |= DE_DOT; 25165051Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 252150342Sphk de->de_dir = dd; 25365051Sphk 254211226Sjh /* Create the ".." entry in the new directory. */ 25565051Sphk de = devfs_newdirent("..", 2); 25665051Sphk de->de_dirent->d_type = DT_DIR; 257150342Sphk de->de_flags |= DE_DOTDOT; 258150342Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 259150342Sphk if (dotdot == NULL) { 26065051Sphk de->de_dir = dd; 261150342Sphk } else { 26265051Sphk de->de_dir = dotdot; 263150342Sphk TAILQ_INSERT_TAIL(&dotdot->de_dlist, dd, de_list); 264150342Sphk dotdot->de_links++; 265150342Sphk } 26665051Sphk 267150342Sphk#ifdef MAC 268172930Srwatson mac_devfs_create_directory(dmp->dm_mount, name, namelen, dd); 269150342Sphk#endif 27064880Sphk return (dd); 27164880Sphk} 27264880Sphk 273150342Sphkvoid 274162398Skibdevfs_dirent_free(struct devfs_dirent *de) 275162398Skib{ 276162398Skib free(de, M_DEVFS3); 277162398Skib} 278162398Skib 279163481Skib/* 280212660Sjh * Removes a directory if it is empty. Also empty parent directories are 281212660Sjh * removed recursively. 282212660Sjh */ 283212660Sjhstatic void 284212660Sjhdevfs_rmdir_empty(struct devfs_mount *dm, struct devfs_dirent *de) 285212660Sjh{ 286212660Sjh struct devfs_dirent *dd, *de_dot, *de_dotdot; 287212660Sjh 288212660Sjh sx_assert(&dm->dm_lock, SX_XLOCKED); 289212660Sjh 290212660Sjh for (;;) { 291212660Sjh KASSERT(de->de_dirent->d_type == DT_DIR, 292212660Sjh ("devfs_rmdir_empty: de is not a directory")); 293212660Sjh 294212660Sjh if ((de->de_flags & DE_DOOMED) != 0 || de == dm->dm_rootdir) 295212660Sjh return; 296212660Sjh 297212660Sjh de_dot = TAILQ_FIRST(&de->de_dlist); 298212660Sjh KASSERT(de_dot != NULL, ("devfs_rmdir_empty: . missing")); 299212660Sjh de_dotdot = TAILQ_NEXT(de_dot, de_list); 300212660Sjh KASSERT(de_dotdot != NULL, ("devfs_rmdir_empty: .. missing")); 301212660Sjh /* Return if the directory is not empty. */ 302212660Sjh if (TAILQ_NEXT(de_dotdot, de_list) != NULL) 303212660Sjh return; 304212660Sjh 305212660Sjh dd = devfs_parent_dirent(de); 306212660Sjh KASSERT(dd != NULL, ("devfs_rmdir_empty: NULL dd")); 307212826Sjh TAILQ_REMOVE(&de->de_dlist, de_dot, de_list); 308212826Sjh TAILQ_REMOVE(&de->de_dlist, de_dotdot, de_list); 309212660Sjh TAILQ_REMOVE(&dd->de_dlist, de, de_list); 310212660Sjh DEVFS_DE_HOLD(dd); 311212660Sjh devfs_delete(dm, de, DEVFS_DEL_NORECURSE); 312212660Sjh devfs_delete(dm, de_dot, DEVFS_DEL_NORECURSE); 313212660Sjh devfs_delete(dm, de_dotdot, DEVFS_DEL_NORECURSE); 314212660Sjh if (DEVFS_DE_DROP(dd)) { 315212660Sjh devfs_dirent_free(dd); 316212660Sjh return; 317212660Sjh } 318212660Sjh 319212660Sjh de = dd; 320212660Sjh } 321212660Sjh} 322212660Sjh 323212660Sjh/* 324163481Skib * The caller needs to hold the dm for the duration of the call since 325163481Skib * dm->dm_lock may be temporary dropped. 326163481Skib */ 327162398Skibvoid 328212660Sjhdevfs_delete(struct devfs_mount *dm, struct devfs_dirent *de, int flags) 32964880Sphk{ 330212660Sjh struct devfs_dirent *dd; 331163481Skib struct vnode *vp; 33264880Sphk 333162398Skib KASSERT((de->de_flags & DE_DOOMED) == 0, 334162398Skib ("devfs_delete doomed dirent")); 335162398Skib de->de_flags |= DE_DOOMED; 336212660Sjh 337212660Sjh if ((flags & DEVFS_DEL_NORECURSE) == 0) { 338212660Sjh dd = devfs_parent_dirent(de); 339212660Sjh if (dd != NULL) 340212660Sjh DEVFS_DE_HOLD(dd); 341212660Sjh } else 342212660Sjh dd = NULL; 343212660Sjh 344163481Skib mtx_lock(&devfs_de_interlock); 345163481Skib vp = de->de_vnode; 346163481Skib if (vp != NULL) { 347163481Skib VI_LOCK(vp); 348163481Skib mtx_unlock(&devfs_de_interlock); 349163481Skib vholdl(vp); 350163481Skib sx_unlock(&dm->dm_lock); 351212660Sjh if ((flags & DEVFS_DEL_VNLOCKED) == 0) 352175202Sattilio vn_lock(vp, LK_EXCLUSIVE | LK_INTERLOCK | LK_RETRY); 353163481Skib else 354163481Skib VI_UNLOCK(vp); 355163481Skib vgone(vp); 356212660Sjh if ((flags & DEVFS_DEL_VNLOCKED) == 0) 357175294Sattilio VOP_UNLOCK(vp, 0); 358163481Skib vdrop(vp); 359163481Skib sx_xlock(&dm->dm_lock); 360163481Skib } else 361163481Skib mtx_unlock(&devfs_de_interlock); 36264880Sphk if (de->de_symlink) { 363150151Sphk free(de->de_symlink, M_DEVFS); 36464880Sphk de->de_symlink = NULL; 36564880Sphk } 366101069Srwatson#ifdef MAC 367172930Srwatson mac_devfs_destroy(de); 368101069Srwatson#endif 369150342Sphk if (de->de_inode > DEVFS_ROOTINO) { 370150342Sphk free_unr(devfs_inos, de->de_inode); 371150342Sphk de->de_inode = 0; 372150342Sphk } 373162398Skib if (DEVFS_DE_DROP(de)) 374162398Skib devfs_dirent_free(de); 375212660Sjh 376212660Sjh if (dd != NULL) { 377212660Sjh if (DEVFS_DE_DROP(dd)) 378212660Sjh devfs_dirent_free(dd); 379212660Sjh else 380212660Sjh devfs_rmdir_empty(dm, dd); 381212660Sjh } 38264880Sphk} 38364880Sphk 384150342Sphk/* 385150342Sphk * Called on unmount. 386163481Skib * Recursively removes the entire tree. 387163481Skib * The caller needs to hold the dm for the duration of the call. 388150342Sphk */ 389150342Sphk 390150342Sphkstatic void 391150342Sphkdevfs_purge(struct devfs_mount *dm, struct devfs_dirent *dd) 39264880Sphk{ 39364880Sphk struct devfs_dirent *de; 39464880Sphk 395150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 396212660Sjh 397212660Sjh DEVFS_DE_HOLD(dd); 39864880Sphk for (;;) { 39965051Sphk de = TAILQ_FIRST(&dd->de_dlist); 40064880Sphk if (de == NULL) 40164880Sphk break; 402150342Sphk TAILQ_REMOVE(&dd->de_dlist, de, de_list); 403212660Sjh if (de->de_flags & (DE_DOT | DE_DOTDOT)) 404212660Sjh devfs_delete(dm, de, DEVFS_DEL_NORECURSE); 405150342Sphk else if (de->de_dirent->d_type == DT_DIR) 406150342Sphk devfs_purge(dm, de); 407212660Sjh else 408212660Sjh devfs_delete(dm, de, DEVFS_DEL_NORECURSE); 40964880Sphk } 410212660Sjh if (DEVFS_DE_DROP(dd)) 411212660Sjh devfs_dirent_free(dd); 412212660Sjh else if ((dd->de_flags & DE_DOOMED) == 0) 413212660Sjh devfs_delete(dm, dd, DEVFS_DEL_NORECURSE); 41464880Sphk} 41564880Sphk 416150342Sphk/* 417150342Sphk * Each cdev_priv has an array of pointers to devfs_dirent which is indexed 418150342Sphk * by the mount points dm_idx. 419150342Sphk * This function extends the array when necessary, taking into account that 420150342Sphk * the default array is 1 element and not malloc'ed. 421150342Sphk */ 422150342Sphkstatic void 423150342Sphkdevfs_metoo(struct cdev_priv *cdp, struct devfs_mount *dm) 424150342Sphk{ 425150342Sphk struct devfs_dirent **dep; 426150342Sphk int siz; 42764880Sphk 428150342Sphk siz = (dm->dm_idx + 1) * sizeof *dep; 429150342Sphk dep = malloc(siz, M_DEVFS2, M_WAITOK | M_ZERO); 430150342Sphk dev_lock(); 431150342Sphk if (dm->dm_idx <= cdp->cdp_maxdirent) { 432150342Sphk /* We got raced */ 433150342Sphk dev_unlock(); 434150342Sphk free(dep, M_DEVFS2); 435150342Sphk return; 436150342Sphk } 437150342Sphk memcpy(dep, cdp->cdp_dirents, (cdp->cdp_maxdirent + 1) * sizeof *dep); 438150342Sphk if (cdp->cdp_maxdirent > 0) 439150342Sphk free(cdp->cdp_dirents, M_DEVFS2); 440150342Sphk cdp->cdp_dirents = dep; 441150342Sphk /* 442150342Sphk * XXX: if malloc told us how much we actually got this could 443150342Sphk * XXX: be optimized. 444150342Sphk */ 445150342Sphk cdp->cdp_maxdirent = dm->dm_idx; 446150342Sphk dev_unlock(); 447150342Sphk} 448150342Sphk 449163481Skib/* 450163481Skib * The caller needs to hold the dm for the duration of the call. 451163481Skib */ 452150342Sphkstatic int 453150342Sphkdevfs_populate_loop(struct devfs_mount *dm, int cleanup) 45464880Sphk{ 455150342Sphk struct cdev_priv *cdp; 456150342Sphk struct devfs_dirent *de; 45765051Sphk struct devfs_dirent *dd; 458150342Sphk struct cdev *pdev; 459211226Sjh int de_flags, j; 46064880Sphk char *q, *s; 46164880Sphk 462150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 463150342Sphk dev_lock(); 464150342Sphk TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) { 465150342Sphk 466150342Sphk KASSERT(cdp->cdp_dirents != NULL, ("NULL cdp_dirents")); 467150342Sphk 468150342Sphk /* 469150342Sphk * If we are unmounting, or the device has been destroyed, 470150342Sphk * clean up our dirent. 471150342Sphk */ 472150342Sphk if ((cleanup || !(cdp->cdp_flags & CDP_ACTIVE)) && 473150342Sphk dm->dm_idx <= cdp->cdp_maxdirent && 474150342Sphk cdp->cdp_dirents[dm->dm_idx] != NULL) { 475150342Sphk de = cdp->cdp_dirents[dm->dm_idx]; 476150342Sphk cdp->cdp_dirents[dm->dm_idx] = NULL; 477150342Sphk KASSERT(cdp == de->de_cdp, 478150342Sphk ("%s %d %s %p %p", __func__, __LINE__, 479150342Sphk cdp->cdp_c.si_name, cdp, de->de_cdp)); 480150342Sphk KASSERT(de->de_dir != NULL, ("Null de->de_dir")); 481150342Sphk dev_unlock(); 482150342Sphk 483150342Sphk TAILQ_REMOVE(&de->de_dir->de_dlist, de, de_list); 484150342Sphk de->de_cdp = NULL; 485150342Sphk de->de_inode = 0; 486163481Skib devfs_delete(dm, de, 0); 487163481Skib dev_lock(); 488163481Skib cdp->cdp_inuse--; 489163481Skib dev_unlock(); 490150342Sphk return (1); 491150342Sphk } 492150342Sphk /* 493150342Sphk * GC any lingering devices 494150342Sphk */ 495150342Sphk if (!(cdp->cdp_flags & CDP_ACTIVE)) { 496150342Sphk if (cdp->cdp_inuse > 0) 49765051Sphk continue; 498150342Sphk TAILQ_REMOVE(&cdevp_list, cdp, cdp_list); 499150342Sphk dev_unlock(); 500150342Sphk dev_rel(&cdp->cdp_c); 501150342Sphk return (1); 502150342Sphk } 503150342Sphk /* 504150342Sphk * Don't create any new dirents if we are unmounting 505150342Sphk */ 506150342Sphk if (cleanup) 507150342Sphk continue; 508150342Sphk KASSERT((cdp->cdp_flags & CDP_ACTIVE), ("Bogons, I tell ya'!")); 509150342Sphk 510150342Sphk if (dm->dm_idx <= cdp->cdp_maxdirent && 511150342Sphk cdp->cdp_dirents[dm->dm_idx] != NULL) { 512150342Sphk de = cdp->cdp_dirents[dm->dm_idx]; 513150342Sphk KASSERT(cdp == de->de_cdp, ("inconsistent cdp")); 514150342Sphk continue; 515150342Sphk } 516150342Sphk 517150342Sphk 518150342Sphk cdp->cdp_inuse++; 519150342Sphk dev_unlock(); 520150342Sphk 521150342Sphk if (dm->dm_idx > cdp->cdp_maxdirent) 522150342Sphk devfs_metoo(cdp, dm); 523150342Sphk 524150342Sphk dd = dm->dm_rootdir; 525150342Sphk s = cdp->cdp_c.si_name; 526150342Sphk for (;;) { 527150342Sphk for (q = s; *q != '/' && *q != '\0'; q++) 52864880Sphk continue; 529150342Sphk if (*q != '/') 530150342Sphk break; 531211226Sjh de = devfs_find(dd, s, q - s, 0); 532150342Sphk if (de == NULL) 533150342Sphk de = devfs_vmkdir(dm, s, q - s, dd, 0); 534211226Sjh else if (de->de_dirent->d_type == DT_LNK) { 535211226Sjh de = devfs_find(dd, s, q - s, DT_DIR); 536211226Sjh if (de == NULL) 537211226Sjh de = devfs_vmkdir(dm, s, q - s, dd, 0); 538211226Sjh de->de_flags |= DE_COVERED; 539211226Sjh } 540150342Sphk s = q + 1; 541150342Sphk dd = de; 542211226Sjh KASSERT(dd->de_dirent->d_type == DT_DIR && 543211226Sjh (dd->de_flags & (DE_DOT | DE_DOTDOT)) == 0, 544211226Sjh ("%s: invalid directory (si_name=%s)", 545211226Sjh __func__, cdp->cdp_c.si_name)); 546211226Sjh 547150342Sphk } 548211226Sjh de_flags = 0; 549211226Sjh de = devfs_find(dd, s, q - s, DT_LNK); 550211226Sjh if (de != NULL) 551211226Sjh de_flags |= DE_COVERED; 552150342Sphk 553150342Sphk de = devfs_newdirent(s, q - s); 554150342Sphk if (cdp->cdp_c.si_flags & SI_ALIAS) { 555150342Sphk de->de_uid = 0; 556150342Sphk de->de_gid = 0; 557150342Sphk de->de_mode = 0755; 558150342Sphk de->de_dirent->d_type = DT_LNK; 559150342Sphk pdev = cdp->cdp_c.si_parent; 560150342Sphk j = strlen(pdev->si_name) + 1; 561150342Sphk de->de_symlink = malloc(j, M_DEVFS, M_WAITOK); 562150342Sphk bcopy(pdev->si_name, de->de_symlink, j); 563150342Sphk } else { 564150342Sphk de->de_uid = cdp->cdp_c.si_uid; 565150342Sphk de->de_gid = cdp->cdp_c.si_gid; 566150342Sphk de->de_mode = cdp->cdp_c.si_mode; 567150342Sphk de->de_dirent->d_type = DT_CHR; 568150342Sphk } 569211226Sjh de->de_flags |= de_flags; 570150342Sphk de->de_inode = cdp->cdp_inode; 571150342Sphk de->de_cdp = cdp; 572101069Srwatson#ifdef MAC 573172930Srwatson mac_devfs_create_device(cdp->cdp_c.si_cred, dm->dm_mount, 574150342Sphk &cdp->cdp_c, de); 575101069Srwatson#endif 576150342Sphk de->de_dir = dd; 577150342Sphk TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list); 578150342Sphk devfs_rules_apply(dm, de); 579150342Sphk dev_lock(); 580150342Sphk /* XXX: could check that cdp is still active here */ 581150342Sphk KASSERT(cdp->cdp_dirents[dm->dm_idx] == NULL, 582150342Sphk ("%s %d\n", __func__, __LINE__)); 583150342Sphk cdp->cdp_dirents[dm->dm_idx] = de; 584150342Sphk KASSERT(de->de_cdp != (void *)0xdeadc0de, 585150342Sphk ("%s %d\n", __func__, __LINE__)); 586150342Sphk dev_unlock(); 587150342Sphk return (1); 58864880Sphk } 589150342Sphk dev_unlock(); 590150342Sphk return (0); 59164880Sphk} 59264880Sphk 593163481Skib/* 594163481Skib * The caller needs to hold the dm for the duration of the call. 595163481Skib */ 596150342Sphkvoid 597150342Sphkdevfs_populate(struct devfs_mount *dm) 598150342Sphk{ 599150342Sphk 600150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 601150342Sphk if (dm->dm_generation == devfs_generation) 602150342Sphk return; 603150342Sphk while (devfs_populate_loop(dm, 0)) 604150342Sphk continue; 605150342Sphk dm->dm_generation = devfs_generation; 606150342Sphk} 607150342Sphk 608163481Skib/* 609163481Skib * The caller needs to hold the dm for the duration of the call. 610163481Skib */ 611150342Sphkvoid 612150342Sphkdevfs_cleanup(struct devfs_mount *dm) 613150342Sphk{ 614150342Sphk 615150342Sphk sx_assert(&dm->dm_lock, SX_XLOCKED); 616150342Sphk while (devfs_populate_loop(dm, 1)) 617150342Sphk continue; 618150342Sphk devfs_purge(dm, dm->dm_rootdir); 619150342Sphk} 620150342Sphk 621130678Sphk/* 622130678Sphk * devfs_create() and devfs_destroy() are called from kern_conf.c and 623130678Sphk * in both cases the devlock() mutex is held, so no further locking 624130678Sphk * is necesary and no sleeping allowed. 625130678Sphk */ 626130678Sphk 627111730Sphkvoid 628130585Sphkdevfs_create(struct cdev *dev) 62964880Sphk{ 630150342Sphk struct cdev_priv *cdp; 63165515Sphk 632150342Sphk mtx_assert(&devmtx, MA_OWNED); 633179828Skib cdp = cdev2priv(dev); 634150342Sphk cdp->cdp_flags |= CDP_ACTIVE; 635150342Sphk cdp->cdp_inode = alloc_unrl(devfs_inos); 636150342Sphk dev_refl(dev); 637150342Sphk TAILQ_INSERT_TAIL(&cdevp_list, cdp, cdp_list); 638130678Sphk devfs_generation++; 63964880Sphk} 64064880Sphk 641111730Sphkvoid 642130585Sphkdevfs_destroy(struct cdev *dev) 64364880Sphk{ 644150342Sphk struct cdev_priv *cdp; 64565515Sphk 646150342Sphk mtx_assert(&devmtx, MA_OWNED); 647179828Skib cdp = cdev2priv(dev); 648150342Sphk cdp->cdp_flags &= ~CDP_ACTIVE; 649130678Sphk devfs_generation++; 65064880Sphk} 651150342Sphk 652150342Sphkstatic void 653150342Sphkdevfs_devs_init(void *junk __unused) 654150342Sphk{ 655150342Sphk 656150342Sphk devfs_inos = new_unrhdr(DEVFS_ROOTINO + 1, INT_MAX, &devmtx); 657150342Sphk} 658150342Sphk 659150342SphkSYSINIT(devfs_devs, SI_SUB_DEVFS, SI_ORDER_FIRST, devfs_devs_init, NULL); 660