xref: /freebsd-12.1/sys/fs/devfs/devfs_devs.c (revision 65f2c0ff)
1 /*-
2  * Copyright (c) 2000,2004
3  *	Poul-Henning Kamp.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Neither the name of the University nor the names of its contributors
11  *    may be used to endorse or promote products derived from this software
12  *    without specific prior written permission.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  *
26  * From: FreeBSD: src/sys/miscfs/kernfs/kernfs_vfsops.c 1.36
27  *
28  * $FreeBSD$
29  */
30 
31 #include <sys/param.h>
32 #include <sys/systm.h>
33 #include <sys/conf.h>
34 #include <sys/dirent.h>
35 #include <sys/kernel.h>
36 #include <sys/limits.h>
37 #include <sys/lock.h>
38 #include <sys/malloc.h>
39 #include <sys/proc.h>
40 #include <sys/sx.h>
41 #include <sys/sysctl.h>
42 #include <sys/vnode.h>
43 
44 #include <sys/kdb.h>
45 
46 #include <fs/devfs/devfs.h>
47 #include <fs/devfs/devfs_int.h>
48 
49 #include <security/mac/mac_framework.h>
50 
51 /*
52  * The one true (but secret) list of active devices in the system.
53  * Locked by dev_lock()/devmtx
54  */
55 struct cdev_priv_list cdevp_list = TAILQ_HEAD_INITIALIZER(cdevp_list);
56 
57 struct unrhdr *devfs_inos;
58 
59 
60 static MALLOC_DEFINE(M_DEVFS2, "DEVFS2", "DEVFS data 2");
61 static MALLOC_DEFINE(M_DEVFS3, "DEVFS3", "DEVFS data 3");
62 static MALLOC_DEFINE(M_CDEVP, "DEVFS1", "DEVFS cdev_priv storage");
63 
64 static SYSCTL_NODE(_vfs, OID_AUTO, devfs, CTLFLAG_RW, 0, "DEVFS filesystem");
65 
66 static unsigned devfs_generation;
67 SYSCTL_UINT(_vfs_devfs, OID_AUTO, generation, CTLFLAG_RD,
68 	&devfs_generation, 0, "DEVFS generation number");
69 
70 unsigned devfs_rule_depth = 1;
71 SYSCTL_UINT(_vfs_devfs, OID_AUTO, rule_depth, CTLFLAG_RW,
72 	&devfs_rule_depth, 0, "Max depth of ruleset include");
73 
74 /*
75  * Helper sysctl for devname(3).  We're given a dev_t and return the
76  * name, if any, registered by the device driver.
77  */
78 static int
79 sysctl_devname(SYSCTL_HANDLER_ARGS)
80 {
81 	int error;
82 	dev_t ud;
83 	struct cdev_priv *cdp;
84 	struct cdev *dev;
85 
86 	error = SYSCTL_IN(req, &ud, sizeof (ud));
87 	if (error)
88 		return (error);
89 	if (ud == NODEV)
90 		return (EINVAL);
91 	dev = NULL;
92 	dev_lock();
93 	TAILQ_FOREACH(cdp, &cdevp_list, cdp_list)
94 		if (cdp->cdp_inode == ud) {
95 			dev = &cdp->cdp_c;
96 			dev_refl(dev);
97 			break;
98 		}
99 	dev_unlock();
100 	if (dev == NULL)
101 		return (ENOENT);
102 	error = SYSCTL_OUT(req, dev->si_name, strlen(dev->si_name) + 1);
103 	dev_rel(dev);
104 	return (error);
105 }
106 
107 SYSCTL_PROC(_kern, OID_AUTO, devname,
108     CTLTYPE_OPAQUE|CTLFLAG_RW|CTLFLAG_ANYBODY|CTLFLAG_MPSAFE,
109     NULL, 0, sysctl_devname, "", "devname(3) handler");
110 
111 SYSCTL_INT(_debug_sizeof, OID_AUTO, cdev, CTLFLAG_RD,
112     0, sizeof(struct cdev), "sizeof(struct cdev)");
113 
114 SYSCTL_INT(_debug_sizeof, OID_AUTO, cdev_priv, CTLFLAG_RD,
115     0, sizeof(struct cdev_priv), "sizeof(struct cdev_priv)");
116 
117 struct cdev *
118 devfs_alloc(int flags)
119 {
120 	struct cdev_priv *cdp;
121 	struct cdev *cdev;
122 	struct timespec ts;
123 
124 	cdp = malloc(sizeof *cdp, M_CDEVP, M_USE_RESERVE | M_ZERO |
125 	    ((flags & MAKEDEV_NOWAIT) ? M_NOWAIT : M_WAITOK));
126 	if (cdp == NULL)
127 		return (NULL);
128 
129 	cdp->cdp_dirents = &cdp->cdp_dirent0;
130 	cdp->cdp_dirent0 = NULL;
131 	cdp->cdp_maxdirent = 0;
132 	cdp->cdp_inode = 0;
133 
134 	cdev = &cdp->cdp_c;
135 
136 	cdev->si_name = cdev->__si_namebuf;
137 	LIST_INIT(&cdev->si_children);
138 	vfs_timestamp(&ts);
139 	cdev->si_atime = cdev->si_mtime = cdev->si_ctime = ts;
140 	cdev->si_cred = NULL;
141 
142 	return (cdev);
143 }
144 
145 void
146 devfs_free(struct cdev *cdev)
147 {
148 	struct cdev_priv *cdp;
149 
150 	cdp = cdev2priv(cdev);
151 	if (cdev->si_cred != NULL)
152 		crfree(cdev->si_cred);
153 	if (cdp->cdp_inode > 0)
154 		free_unr(devfs_inos, cdp->cdp_inode);
155 	if (cdp->cdp_maxdirent > 0)
156 		free(cdp->cdp_dirents, M_DEVFS2);
157 	free(cdp, M_CDEVP);
158 }
159 
160 struct devfs_dirent *
161 devfs_find(struct devfs_dirent *dd, const char *name, int namelen, int type)
162 {
163 	struct devfs_dirent *de;
164 
165 	TAILQ_FOREACH(de, &dd->de_dlist, de_list) {
166 		if (namelen != de->de_dirent->d_namlen)
167 			continue;
168 		if (type != 0 && type != de->de_dirent->d_type)
169 			continue;
170 		if (bcmp(name, de->de_dirent->d_name, namelen) != 0)
171 			continue;
172 		break;
173 	}
174 	return (de);
175 }
176 
177 struct devfs_dirent *
178 devfs_newdirent(char *name, int namelen)
179 {
180 	int i;
181 	struct devfs_dirent *de;
182 	struct dirent d;
183 
184 	d.d_namlen = namelen;
185 	i = sizeof (*de) + GENERIC_DIRSIZ(&d);
186 	de = malloc(i, M_DEVFS3, M_WAITOK | M_ZERO);
187 	de->de_dirent = (struct dirent *)(de + 1);
188 	de->de_dirent->d_namlen = namelen;
189 	de->de_dirent->d_reclen = GENERIC_DIRSIZ(&d);
190 	bcopy(name, de->de_dirent->d_name, namelen);
191 	de->de_dirent->d_name[namelen] = '\0';
192 	vfs_timestamp(&de->de_ctime);
193 	de->de_mtime = de->de_atime = de->de_ctime;
194 	de->de_links = 1;
195 	de->de_holdcnt = 1;
196 #ifdef MAC
197 	mac_devfs_init(de);
198 #endif
199 	return (de);
200 }
201 
202 struct devfs_dirent *
203 devfs_parent_dirent(struct devfs_dirent *de)
204 {
205 
206 	if (de->de_dirent->d_type != DT_DIR)
207 		return (de->de_dir);
208 
209 	if (de->de_flags & (DE_DOT | DE_DOTDOT))
210 		return (NULL);
211 
212 	de = TAILQ_FIRST(&de->de_dlist);	/* "." */
213 	if (de == NULL)
214 		return (NULL);
215 	de = TAILQ_NEXT(de, de_list);		/* ".." */
216 	if (de == NULL)
217 		return (NULL);
218 
219 	return (de->de_dir);
220 }
221 
222 struct devfs_dirent *
223 devfs_vmkdir(struct devfs_mount *dmp, char *name, int namelen, struct devfs_dirent *dotdot, u_int inode)
224 {
225 	struct devfs_dirent *dd;
226 	struct devfs_dirent *de;
227 
228 	/* Create the new directory */
229 	dd = devfs_newdirent(name, namelen);
230 	TAILQ_INIT(&dd->de_dlist);
231 	dd->de_dirent->d_type = DT_DIR;
232 	dd->de_mode = 0555;
233 	dd->de_links = 2;
234 	dd->de_dir = dd;
235 	if (inode != 0)
236 		dd->de_inode = inode;
237 	else
238 		dd->de_inode = alloc_unr(devfs_inos);
239 
240 	/*
241 	 * "." and ".." are always the two first entries in the
242 	 * de_dlist list.
243 	 *
244 	 * Create the "." entry in the new directory.
245 	 */
246 	de = devfs_newdirent(".", 1);
247 	de->de_dirent->d_type = DT_DIR;
248 	de->de_flags |= DE_DOT;
249 	TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list);
250 	de->de_dir = dd;
251 
252 	/* Create the ".." entry in the new directory. */
253 	de = devfs_newdirent("..", 2);
254 	de->de_dirent->d_type = DT_DIR;
255 	de->de_flags |= DE_DOTDOT;
256 	TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list);
257 	if (dotdot == NULL) {
258 		de->de_dir = dd;
259 	} else {
260 		de->de_dir = dotdot;
261 		TAILQ_INSERT_TAIL(&dotdot->de_dlist, dd, de_list);
262 		dotdot->de_links++;
263 	}
264 
265 #ifdef MAC
266 	mac_devfs_create_directory(dmp->dm_mount, name, namelen, dd);
267 #endif
268 	return (dd);
269 }
270 
271 void
272 devfs_dirent_free(struct devfs_dirent *de)
273 {
274 	free(de, M_DEVFS3);
275 }
276 
277 /*
278  * Removes a directory if it is empty. Also empty parent directories are
279  * removed recursively.
280  */
281 static void
282 devfs_rmdir_empty(struct devfs_mount *dm, struct devfs_dirent *de)
283 {
284 	struct devfs_dirent *dd, *de_dot, *de_dotdot;
285 
286 	sx_assert(&dm->dm_lock, SX_XLOCKED);
287 
288 	for (;;) {
289 		KASSERT(de->de_dirent->d_type == DT_DIR,
290 		    ("devfs_rmdir_empty: de is not a directory"));
291 
292 		if ((de->de_flags & DE_DOOMED) != 0 || de == dm->dm_rootdir)
293 			return;
294 
295 		de_dot = TAILQ_FIRST(&de->de_dlist);
296 		KASSERT(de_dot != NULL, ("devfs_rmdir_empty: . missing"));
297 		de_dotdot = TAILQ_NEXT(de_dot, de_list);
298 		KASSERT(de_dotdot != NULL, ("devfs_rmdir_empty: .. missing"));
299 		/* Return if the directory is not empty. */
300 		if (TAILQ_NEXT(de_dotdot, de_list) != NULL)
301 			return;
302 
303 		dd = devfs_parent_dirent(de);
304 		KASSERT(dd != NULL, ("devfs_rmdir_empty: NULL dd"));
305 		TAILQ_REMOVE(&dd->de_dlist, de, de_list);
306 		DEVFS_DE_HOLD(dd);
307 		devfs_delete(dm, de, DEVFS_DEL_NORECURSE);
308 		devfs_delete(dm, de_dot, DEVFS_DEL_NORECURSE);
309 		devfs_delete(dm, de_dotdot, DEVFS_DEL_NORECURSE);
310 		if (DEVFS_DE_DROP(dd)) {
311 			devfs_dirent_free(dd);
312 			return;
313 		}
314 
315 		de = dd;
316 	}
317 }
318 
319 /*
320  * The caller needs to hold the dm for the duration of the call since
321  * dm->dm_lock may be temporary dropped.
322  */
323 void
324 devfs_delete(struct devfs_mount *dm, struct devfs_dirent *de, int flags)
325 {
326 	struct devfs_dirent *dd;
327 	struct vnode *vp;
328 
329 	KASSERT((de->de_flags & DE_DOOMED) == 0,
330 		("devfs_delete doomed dirent"));
331 	de->de_flags |= DE_DOOMED;
332 
333 	if ((flags & DEVFS_DEL_NORECURSE) == 0) {
334 		dd = devfs_parent_dirent(de);
335 		if (dd != NULL)
336 			DEVFS_DE_HOLD(dd);
337 	} else
338 		dd = NULL;
339 
340 	mtx_lock(&devfs_de_interlock);
341 	vp = de->de_vnode;
342 	if (vp != NULL) {
343 		VI_LOCK(vp);
344 		mtx_unlock(&devfs_de_interlock);
345 		vholdl(vp);
346 		sx_unlock(&dm->dm_lock);
347 		if ((flags & DEVFS_DEL_VNLOCKED) == 0)
348 			vn_lock(vp, LK_EXCLUSIVE | LK_INTERLOCK | LK_RETRY);
349 		else
350 			VI_UNLOCK(vp);
351 		vgone(vp);
352 		if ((flags & DEVFS_DEL_VNLOCKED) == 0)
353 			VOP_UNLOCK(vp, 0);
354 		vdrop(vp);
355 		sx_xlock(&dm->dm_lock);
356 	} else
357 		mtx_unlock(&devfs_de_interlock);
358 	if (de->de_symlink) {
359 		free(de->de_symlink, M_DEVFS);
360 		de->de_symlink = NULL;
361 	}
362 #ifdef MAC
363 	mac_devfs_destroy(de);
364 #endif
365 	if (de->de_inode > DEVFS_ROOTINO) {
366 		free_unr(devfs_inos, de->de_inode);
367 		de->de_inode = 0;
368 	}
369 	if (DEVFS_DE_DROP(de))
370 		devfs_dirent_free(de);
371 
372 	if (dd != NULL) {
373 		if (DEVFS_DE_DROP(dd))
374 			devfs_dirent_free(dd);
375 		else
376 			devfs_rmdir_empty(dm, dd);
377 	}
378 }
379 
380 /*
381  * Called on unmount.
382  * Recursively removes the entire tree.
383  * The caller needs to hold the dm for the duration of the call.
384  */
385 
386 static void
387 devfs_purge(struct devfs_mount *dm, struct devfs_dirent *dd)
388 {
389 	struct devfs_dirent *de;
390 
391 	sx_assert(&dm->dm_lock, SX_XLOCKED);
392 
393 	DEVFS_DE_HOLD(dd);
394 	for (;;) {
395 		de = TAILQ_FIRST(&dd->de_dlist);
396 		if (de == NULL)
397 			break;
398 		TAILQ_REMOVE(&dd->de_dlist, de, de_list);
399 		if (de->de_flags & (DE_DOT | DE_DOTDOT))
400 			devfs_delete(dm, de, DEVFS_DEL_NORECURSE);
401 		else if (de->de_dirent->d_type == DT_DIR)
402 			devfs_purge(dm, de);
403 		else
404 			devfs_delete(dm, de, DEVFS_DEL_NORECURSE);
405 	}
406 	if (DEVFS_DE_DROP(dd))
407 		devfs_dirent_free(dd);
408 	else if ((dd->de_flags & DE_DOOMED) == 0)
409 		devfs_delete(dm, dd, DEVFS_DEL_NORECURSE);
410 }
411 
412 /*
413  * Each cdev_priv has an array of pointers to devfs_dirent which is indexed
414  * by the mount points dm_idx.
415  * This function extends the array when necessary, taking into account that
416  * the default array is 1 element and not malloc'ed.
417  */
418 static void
419 devfs_metoo(struct cdev_priv *cdp, struct devfs_mount *dm)
420 {
421 	struct devfs_dirent **dep;
422 	int siz;
423 
424 	siz = (dm->dm_idx + 1) * sizeof *dep;
425 	dep = malloc(siz, M_DEVFS2, M_WAITOK | M_ZERO);
426 	dev_lock();
427 	if (dm->dm_idx <= cdp->cdp_maxdirent) {
428 		/* We got raced */
429 		dev_unlock();
430 		free(dep, M_DEVFS2);
431 		return;
432 	}
433 	memcpy(dep, cdp->cdp_dirents, (cdp->cdp_maxdirent + 1) * sizeof *dep);
434 	if (cdp->cdp_maxdirent > 0)
435 		free(cdp->cdp_dirents, M_DEVFS2);
436 	cdp->cdp_dirents = dep;
437 	/*
438 	 * XXX: if malloc told us how much we actually got this could
439 	 * XXX: be optimized.
440 	 */
441 	cdp->cdp_maxdirent = dm->dm_idx;
442 	dev_unlock();
443 }
444 
445 /*
446  * The caller needs to hold the dm for the duration of the call.
447  */
448 static int
449 devfs_populate_loop(struct devfs_mount *dm, int cleanup)
450 {
451 	struct cdev_priv *cdp;
452 	struct devfs_dirent *de;
453 	struct devfs_dirent *dd;
454 	struct cdev *pdev;
455 	int de_flags, j;
456 	char *q, *s;
457 
458 	sx_assert(&dm->dm_lock, SX_XLOCKED);
459 	dev_lock();
460 	TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) {
461 
462 		KASSERT(cdp->cdp_dirents != NULL, ("NULL cdp_dirents"));
463 
464 		/*
465 		 * If we are unmounting, or the device has been destroyed,
466 		 * clean up our dirent.
467 		 */
468 		if ((cleanup || !(cdp->cdp_flags & CDP_ACTIVE)) &&
469 		    dm->dm_idx <= cdp->cdp_maxdirent &&
470 		    cdp->cdp_dirents[dm->dm_idx] != NULL) {
471 			de = cdp->cdp_dirents[dm->dm_idx];
472 			cdp->cdp_dirents[dm->dm_idx] = NULL;
473 			KASSERT(cdp == de->de_cdp,
474 			    ("%s %d %s %p %p", __func__, __LINE__,
475 			    cdp->cdp_c.si_name, cdp, de->de_cdp));
476 			KASSERT(de->de_dir != NULL, ("Null de->de_dir"));
477 			dev_unlock();
478 
479 			TAILQ_REMOVE(&de->de_dir->de_dlist, de, de_list);
480 			de->de_cdp = NULL;
481 			de->de_inode = 0;
482 			devfs_delete(dm, de, 0);
483 			dev_lock();
484 			cdp->cdp_inuse--;
485 			dev_unlock();
486 			return (1);
487 		}
488 		/*
489 	 	 * GC any lingering devices
490 		 */
491 		if (!(cdp->cdp_flags & CDP_ACTIVE)) {
492 			if (cdp->cdp_inuse > 0)
493 				continue;
494 			TAILQ_REMOVE(&cdevp_list, cdp, cdp_list);
495 			dev_unlock();
496 			dev_rel(&cdp->cdp_c);
497 			return (1);
498 		}
499 		/*
500 		 * Don't create any new dirents if we are unmounting
501 		 */
502 		if (cleanup)
503 			continue;
504 		KASSERT((cdp->cdp_flags & CDP_ACTIVE), ("Bogons, I tell ya'!"));
505 
506 		if (dm->dm_idx <= cdp->cdp_maxdirent &&
507 		    cdp->cdp_dirents[dm->dm_idx] != NULL) {
508 			de = cdp->cdp_dirents[dm->dm_idx];
509 			KASSERT(cdp == de->de_cdp, ("inconsistent cdp"));
510 			continue;
511 		}
512 
513 
514 		cdp->cdp_inuse++;
515 		dev_unlock();
516 
517 		if (dm->dm_idx > cdp->cdp_maxdirent)
518 		        devfs_metoo(cdp, dm);
519 
520 		dd = dm->dm_rootdir;
521 		s = cdp->cdp_c.si_name;
522 		for (;;) {
523 			for (q = s; *q != '/' && *q != '\0'; q++)
524 				continue;
525 			if (*q != '/')
526 				break;
527 			de = devfs_find(dd, s, q - s, 0);
528 			if (de == NULL)
529 				de = devfs_vmkdir(dm, s, q - s, dd, 0);
530 			else if (de->de_dirent->d_type == DT_LNK) {
531 				de = devfs_find(dd, s, q - s, DT_DIR);
532 				if (de == NULL)
533 					de = devfs_vmkdir(dm, s, q - s, dd, 0);
534 				de->de_flags |= DE_COVERED;
535 			}
536 			s = q + 1;
537 			dd = de;
538 			KASSERT(dd->de_dirent->d_type == DT_DIR &&
539 			    (dd->de_flags & (DE_DOT | DE_DOTDOT)) == 0,
540 			    ("%s: invalid directory (si_name=%s)",
541 			    __func__, cdp->cdp_c.si_name));
542 
543 		}
544 		de_flags = 0;
545 		de = devfs_find(dd, s, q - s, DT_LNK);
546 		if (de != NULL)
547 			de_flags |= DE_COVERED;
548 
549 		de = devfs_newdirent(s, q - s);
550 		if (cdp->cdp_c.si_flags & SI_ALIAS) {
551 			de->de_uid = 0;
552 			de->de_gid = 0;
553 			de->de_mode = 0755;
554 			de->de_dirent->d_type = DT_LNK;
555 			pdev = cdp->cdp_c.si_parent;
556 			j = strlen(pdev->si_name) + 1;
557 			de->de_symlink = malloc(j, M_DEVFS, M_WAITOK);
558 			bcopy(pdev->si_name, de->de_symlink, j);
559 		} else {
560 			de->de_uid = cdp->cdp_c.si_uid;
561 			de->de_gid = cdp->cdp_c.si_gid;
562 			de->de_mode = cdp->cdp_c.si_mode;
563 			de->de_dirent->d_type = DT_CHR;
564 		}
565 		de->de_flags |= de_flags;
566 		de->de_inode = cdp->cdp_inode;
567 		de->de_cdp = cdp;
568 #ifdef MAC
569 		mac_devfs_create_device(cdp->cdp_c.si_cred, dm->dm_mount,
570 		    &cdp->cdp_c, de);
571 #endif
572 		de->de_dir = dd;
573 		TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list);
574 		devfs_rules_apply(dm, de);
575 		dev_lock();
576 		/* XXX: could check that cdp is still active here */
577 		KASSERT(cdp->cdp_dirents[dm->dm_idx] == NULL,
578 		    ("%s %d\n", __func__, __LINE__));
579 		cdp->cdp_dirents[dm->dm_idx] = de;
580 		KASSERT(de->de_cdp != (void *)0xdeadc0de,
581 		    ("%s %d\n", __func__, __LINE__));
582 		dev_unlock();
583 		return (1);
584 	}
585 	dev_unlock();
586 	return (0);
587 }
588 
589 /*
590  * The caller needs to hold the dm for the duration of the call.
591  */
592 void
593 devfs_populate(struct devfs_mount *dm)
594 {
595 
596 	sx_assert(&dm->dm_lock, SX_XLOCKED);
597 	if (dm->dm_generation == devfs_generation)
598 		return;
599 	while (devfs_populate_loop(dm, 0))
600 		continue;
601 	dm->dm_generation = devfs_generation;
602 }
603 
604 /*
605  * The caller needs to hold the dm for the duration of the call.
606  */
607 void
608 devfs_cleanup(struct devfs_mount *dm)
609 {
610 
611 	sx_assert(&dm->dm_lock, SX_XLOCKED);
612 	while (devfs_populate_loop(dm, 1))
613 		continue;
614 	devfs_purge(dm, dm->dm_rootdir);
615 }
616 
617 /*
618  * devfs_create() and devfs_destroy() are called from kern_conf.c and
619  * in both cases the devlock() mutex is held, so no further locking
620  * is necesary and no sleeping allowed.
621  */
622 
623 void
624 devfs_create(struct cdev *dev)
625 {
626 	struct cdev_priv *cdp;
627 
628 	mtx_assert(&devmtx, MA_OWNED);
629 	cdp = cdev2priv(dev);
630 	cdp->cdp_flags |= CDP_ACTIVE;
631 	cdp->cdp_inode = alloc_unrl(devfs_inos);
632 	dev_refl(dev);
633 	TAILQ_INSERT_TAIL(&cdevp_list, cdp, cdp_list);
634 	devfs_generation++;
635 }
636 
637 void
638 devfs_destroy(struct cdev *dev)
639 {
640 	struct cdev_priv *cdp;
641 
642 	mtx_assert(&devmtx, MA_OWNED);
643 	cdp = cdev2priv(dev);
644 	cdp->cdp_flags &= ~CDP_ACTIVE;
645 	devfs_generation++;
646 }
647 
648 static void
649 devfs_devs_init(void *junk __unused)
650 {
651 
652 	devfs_inos = new_unrhdr(DEVFS_ROOTINO + 1, INT_MAX, &devmtx);
653 }
654 
655 SYSINIT(devfs_devs, SI_SUB_DEVFS, SI_ORDER_FIRST, devfs_devs_init, NULL);
656