1139776Simp/*-
2130678Sphk * Copyright (c) 2000,2004
364880Sphk *	Poul-Henning Kamp.  All rights reserved.
464880Sphk *
564880Sphk * Redistribution and use in source and binary forms, with or without
664880Sphk * modification, are permitted provided that the following conditions
764880Sphk * are met:
864880Sphk * 1. Redistributions of source code must retain the above copyright
964880Sphk *    notice, this list of conditions and the following disclaimer.
1064880Sphk * 2. Neither the name of the University nor the names of its contributors
1164880Sphk *    may be used to endorse or promote products derived from this software
1264880Sphk *    without specific prior written permission.
1364880Sphk *
1464880Sphk * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
1564880Sphk * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1664880Sphk * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
1764880Sphk * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
1864880Sphk * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
1964880Sphk * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2064880Sphk * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2164880Sphk * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2264880Sphk * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2364880Sphk * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2464880Sphk * SUCH DAMAGE.
2564880Sphk *
2664880Sphk * From: FreeBSD: src/sys/miscfs/kernfs/kernfs_vfsops.c 1.36
2764880Sphk *
2864880Sphk * $FreeBSD$
2964880Sphk */
3064880Sphk
3164880Sphk#include <sys/param.h>
3264880Sphk#include <sys/systm.h>
3376166Smarkm#include <sys/conf.h>
3464880Sphk#include <sys/dirent.h>
3576166Smarkm#include <sys/kernel.h>
36150342Sphk#include <sys/limits.h>
3776166Smarkm#include <sys/lock.h>
3864880Sphk#include <sys/malloc.h>
3976166Smarkm#include <sys/proc.h>
40150342Sphk#include <sys/sx.h>
4165515Sphk#include <sys/sysctl.h>
4276166Smarkm#include <sys/vnode.h>
4364880Sphk
44150342Sphk#include <sys/kdb.h>
4565515Sphk
4664880Sphk#include <fs/devfs/devfs.h>
47149144Sphk#include <fs/devfs/devfs_int.h>
4864880Sphk
49163606Srwatson#include <security/mac/mac_framework.h>
50163606Srwatson
51150342Sphk/*
52150342Sphk * The one true (but secret) list of active devices in the system.
53150342Sphk * Locked by dev_lock()/devmtx
54150342Sphk */
55163481Skibstruct cdev_priv_list cdevp_list = TAILQ_HEAD_INITIALIZER(cdevp_list);
5665515Sphk
57150342Sphkstruct unrhdr *devfs_inos;
5869767Sphk
59150342Sphk
60150342Sphkstatic MALLOC_DEFINE(M_DEVFS2, "DEVFS2", "DEVFS data 2");
61150342Sphkstatic MALLOC_DEFINE(M_DEVFS3, "DEVFS3", "DEVFS data 3");
62150342Sphkstatic MALLOC_DEFINE(M_CDEVP, "DEVFS1", "DEVFS cdev_priv storage");
63150342Sphk
64141633Sphkstatic SYSCTL_NODE(_vfs, OID_AUTO, devfs, CTLFLAG_RW, 0, "DEVFS filesystem");
65150342Sphk
66150342Sphkstatic unsigned devfs_generation;
6765515SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, generation, CTLFLAG_RD,
6865515Sphk	&devfs_generation, 0, "DEVFS generation number");
6965515Sphk
70150147Sphkunsigned devfs_rule_depth = 1;
71150147SphkSYSCTL_UINT(_vfs_devfs, OID_AUTO, rule_depth, CTLFLAG_RW,
72150342Sphk	&devfs_rule_depth, 0, "Max depth of ruleset include");
73150147Sphk
74149146Sphk/*
75203292Sed * Helper sysctl for devname(3).  We're given a dev_t and return the
76203292Sed * name, if any, registered by the device driver.
77149146Sphk */
78149146Sphkstatic int
79149146Sphksysctl_devname(SYSCTL_HANDLER_ARGS)
80149146Sphk{
81149146Sphk	int error;
82149146Sphk	dev_t ud;
83150342Sphk	struct cdev_priv *cdp;
84203292Sed	struct cdev *dev;
85149146Sphk
86149146Sphk	error = SYSCTL_IN(req, &ud, sizeof (ud));
87149146Sphk	if (error)
88149146Sphk		return (error);
89149146Sphk	if (ud == NODEV)
90203292Sed		return (EINVAL);
91203292Sed	dev = NULL;
92150342Sphk	dev_lock();
93150342Sphk	TAILQ_FOREACH(cdp, &cdevp_list, cdp_list)
94203292Sed		if (cdp->cdp_inode == ud) {
95203292Sed			dev = &cdp->cdp_c;
96203292Sed			dev_refl(dev);
97150342Sphk			break;
98203292Sed		}
99150342Sphk	dev_unlock();
100203292Sed	if (dev == NULL)
101203292Sed		return (ENOENT);
102203292Sed	error = SYSCTL_OUT(req, dev->si_name, strlen(dev->si_name) + 1);
103203292Sed	dev_rel(dev);
104149146Sphk	return (error);
105149146Sphk}
106149146Sphk
107187864SedSYSCTL_PROC(_kern, OID_AUTO, devname,
108187864Sed    CTLTYPE_OPAQUE|CTLFLAG_RW|CTLFLAG_ANYBODY|CTLFLAG_MPSAFE,
109187864Sed    NULL, 0, sysctl_devname, "", "devname(3) handler");
110149146Sphk
111149146SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev, CTLFLAG_RD,
112149146Sphk    0, sizeof(struct cdev), "sizeof(struct cdev)");
113149146Sphk
114150342SphkSYSCTL_INT(_debug_sizeof, OID_AUTO, cdev_priv, CTLFLAG_RD,
115150342Sphk    0, sizeof(struct cdev_priv), "sizeof(struct cdev_priv)");
11665515Sphk
117150342Sphkstruct cdev *
118207729Skibdevfs_alloc(int flags)
11965515Sphk{
120150342Sphk	struct cdev_priv *cdp;
121150342Sphk	struct cdev *cdev;
122183230Sed	struct timespec ts;
12365515Sphk
124243039Skib	cdp = malloc(sizeof *cdp, M_CDEVP, M_ZERO |
125207729Skib	    ((flags & MAKEDEV_NOWAIT) ? M_NOWAIT : M_WAITOK));
126207729Skib	if (cdp == NULL)
127207729Skib		return (NULL);
12865515Sphk
129150342Sphk	cdp->cdp_dirents = &cdp->cdp_dirent0;
130150342Sphk	cdp->cdp_dirent0 = NULL;
131150342Sphk	cdp->cdp_maxdirent = 0;
132207729Skib	cdp->cdp_inode = 0;
13365515Sphk
134150342Sphk	cdev = &cdp->cdp_c;
13565515Sphk
136150342Sphk	LIST_INIT(&cdev->si_children);
137183230Sed	vfs_timestamp(&ts);
138183230Sed	cdev->si_atime = cdev->si_mtime = cdev->si_ctime = ts;
139207729Skib	cdev->si_cred = NULL;
140183230Sed
141150342Sphk	return (cdev);
14265515Sphk}
14365515Sphk
144213221Sjhint
145213221Sjhdevfs_dev_exists(const char *name)
146213221Sjh{
147213221Sjh	struct cdev_priv *cdp;
148213221Sjh
149213221Sjh	mtx_assert(&devmtx, MA_OWNED);
150213221Sjh
151213221Sjh	TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) {
152213221Sjh		if ((cdp->cdp_flags & CDP_ACTIVE) == 0)
153213221Sjh			continue;
154213221Sjh		if (devfs_pathpath(cdp->cdp_c.si_name, name) != 0)
155213221Sjh			return (1);
156213221Sjh		if (devfs_pathpath(name, cdp->cdp_c.si_name) != 0)
157213221Sjh			return (1);
158213221Sjh	}
159213221Sjh	if (devfs_dir_find(name) != 0)
160213221Sjh		return (1);
161213221Sjh
162213221Sjh	return (0);
163213221Sjh}
164213221Sjh
165150342Sphkvoid
166150342Sphkdevfs_free(struct cdev *cdev)
16765515Sphk{
168150342Sphk	struct cdev_priv *cdp;
16965515Sphk
170179828Skib	cdp = cdev2priv(cdev);
171150342Sphk	if (cdev->si_cred != NULL)
172150342Sphk		crfree(cdev->si_cred);
173226041Skib	devfs_free_cdp_inode(cdp->cdp_inode);
174150342Sphk	if (cdp->cdp_maxdirent > 0)
175150342Sphk		free(cdp->cdp_dirents, M_DEVFS2);
176150342Sphk	free(cdp, M_CDEVP);
17765515Sphk}
17865515Sphk
179150342Sphkstruct devfs_dirent *
180211226Sjhdevfs_find(struct devfs_dirent *dd, const char *name, int namelen, int type)
18165132Sphk{
18265132Sphk	struct devfs_dirent *de;
18365132Sphk
18465132Sphk	TAILQ_FOREACH(de, &dd->de_dlist, de_list) {
18565132Sphk		if (namelen != de->de_dirent->d_namlen)
18665132Sphk			continue;
187211226Sjh		if (type != 0 && type != de->de_dirent->d_type)
188211226Sjh			continue;
18965132Sphk		if (bcmp(name, de->de_dirent->d_name, namelen) != 0)
19065132Sphk			continue;
19165132Sphk		break;
19265132Sphk	}
193212826Sjh	KASSERT(de == NULL || (de->de_flags & DE_DOOMED) == 0,
194212826Sjh	    ("devfs_find: returning a doomed entry"));
19565132Sphk	return (de);
19665132Sphk}
19765132Sphk
19865132Sphkstruct devfs_dirent *
19964880Sphkdevfs_newdirent(char *name, int namelen)
20064880Sphk{
20164880Sphk	int i;
20264880Sphk	struct devfs_dirent *de;
20364880Sphk	struct dirent d;
20464880Sphk
20564880Sphk	d.d_namlen = namelen;
206150342Sphk	i = sizeof (*de) + GENERIC_DIRSIZ(&d);
207150342Sphk	de = malloc(i, M_DEVFS3, M_WAITOK | M_ZERO);
20864880Sphk	de->de_dirent = (struct dirent *)(de + 1);
20964880Sphk	de->de_dirent->d_namlen = namelen;
21064880Sphk	de->de_dirent->d_reclen = GENERIC_DIRSIZ(&d);
21171822Sphk	bcopy(name, de->de_dirent->d_name, namelen);
21271822Sphk	de->de_dirent->d_name[namelen] = '\0';
21385979Sphk	vfs_timestamp(&de->de_ctime);
21465051Sphk	de->de_mtime = de->de_atime = de->de_ctime;
21565051Sphk	de->de_links = 1;
216162398Skib	de->de_holdcnt = 1;
217101069Srwatson#ifdef MAC
218172930Srwatson	mac_devfs_init(de);
219101069Srwatson#endif
22064880Sphk	return (de);
22164880Sphk}
22264880Sphk
22365051Sphkstruct devfs_dirent *
224208951Sjhdevfs_parent_dirent(struct devfs_dirent *de)
225208951Sjh{
226208951Sjh
227208951Sjh	if (de->de_dirent->d_type != DT_DIR)
228208951Sjh		return (de->de_dir);
229208951Sjh
230208951Sjh	if (de->de_flags & (DE_DOT | DE_DOTDOT))
231208951Sjh		return (NULL);
232208951Sjh
233208951Sjh	de = TAILQ_FIRST(&de->de_dlist);	/* "." */
234208951Sjh	if (de == NULL)
235208951Sjh		return (NULL);
236208951Sjh	de = TAILQ_NEXT(de, de_list);		/* ".." */
237208951Sjh	if (de == NULL)
238208951Sjh		return (NULL);
239208951Sjh
240208951Sjh	return (de->de_dir);
241208951Sjh}
242208951Sjh
243208951Sjhstruct devfs_dirent *
244150342Sphkdevfs_vmkdir(struct devfs_mount *dmp, char *name, int namelen, struct devfs_dirent *dotdot, u_int inode)
24564880Sphk{
24665051Sphk	struct devfs_dirent *dd;
24764880Sphk	struct devfs_dirent *de;
24864880Sphk
249150342Sphk	/* Create the new directory */
25065051Sphk	dd = devfs_newdirent(name, namelen);
25165051Sphk	TAILQ_INIT(&dd->de_dlist);
25265051Sphk	dd->de_dirent->d_type = DT_DIR;
25385979Sphk	dd->de_mode = 0555;
25465051Sphk	dd->de_links = 2;
25565051Sphk	dd->de_dir = dd;
256150342Sphk	if (inode != 0)
257150342Sphk		dd->de_inode = inode;
258150342Sphk	else
259150342Sphk		dd->de_inode = alloc_unr(devfs_inos);
26065051Sphk
261211226Sjh	/*
262211226Sjh	 * "." and ".." are always the two first entries in the
263211226Sjh	 * de_dlist list.
264211226Sjh	 *
265211226Sjh	 * Create the "." entry in the new directory.
266211226Sjh	 */
26764880Sphk	de = devfs_newdirent(".", 1);
26864880Sphk	de->de_dirent->d_type = DT_DIR;
26965051Sphk	de->de_flags |= DE_DOT;
27065051Sphk	TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list);
271150342Sphk	de->de_dir = dd;
27265051Sphk
273211226Sjh	/* Create the ".." entry in the new directory. */
27465051Sphk	de = devfs_newdirent("..", 2);
27565051Sphk	de->de_dirent->d_type = DT_DIR;
276150342Sphk	de->de_flags |= DE_DOTDOT;
277150342Sphk	TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list);
278150342Sphk	if (dotdot == NULL) {
27965051Sphk		de->de_dir = dd;
280150342Sphk	} else {
28165051Sphk		de->de_dir = dotdot;
282216461Sjh		sx_assert(&dmp->dm_lock, SX_XLOCKED);
283150342Sphk		TAILQ_INSERT_TAIL(&dotdot->de_dlist, dd, de_list);
284150342Sphk		dotdot->de_links++;
285216461Sjh		devfs_rules_apply(dmp, dd);
286150342Sphk	}
28765051Sphk
288150342Sphk#ifdef MAC
289172930Srwatson	mac_devfs_create_directory(dmp->dm_mount, name, namelen, dd);
290150342Sphk#endif
29164880Sphk	return (dd);
29264880Sphk}
29364880Sphk
294150342Sphkvoid
295162398Skibdevfs_dirent_free(struct devfs_dirent *de)
296162398Skib{
297162398Skib	free(de, M_DEVFS3);
298162398Skib}
299162398Skib
300163481Skib/*
301212660Sjh * Removes a directory if it is empty. Also empty parent directories are
302212660Sjh * removed recursively.
303212660Sjh */
304212660Sjhstatic void
305212660Sjhdevfs_rmdir_empty(struct devfs_mount *dm, struct devfs_dirent *de)
306212660Sjh{
307212660Sjh	struct devfs_dirent *dd, *de_dot, *de_dotdot;
308212660Sjh
309212660Sjh	sx_assert(&dm->dm_lock, SX_XLOCKED);
310212660Sjh
311212660Sjh	for (;;) {
312212660Sjh		KASSERT(de->de_dirent->d_type == DT_DIR,
313212660Sjh		    ("devfs_rmdir_empty: de is not a directory"));
314212660Sjh
315212660Sjh		if ((de->de_flags & DE_DOOMED) != 0 || de == dm->dm_rootdir)
316212660Sjh			return;
317212660Sjh
318212660Sjh		de_dot = TAILQ_FIRST(&de->de_dlist);
319212660Sjh		KASSERT(de_dot != NULL, ("devfs_rmdir_empty: . missing"));
320212660Sjh		de_dotdot = TAILQ_NEXT(de_dot, de_list);
321212660Sjh		KASSERT(de_dotdot != NULL, ("devfs_rmdir_empty: .. missing"));
322212660Sjh		/* Return if the directory is not empty. */
323212660Sjh		if (TAILQ_NEXT(de_dotdot, de_list) != NULL)
324212660Sjh			return;
325212660Sjh
326212660Sjh		dd = devfs_parent_dirent(de);
327212660Sjh		KASSERT(dd != NULL, ("devfs_rmdir_empty: NULL dd"));
328212826Sjh		TAILQ_REMOVE(&de->de_dlist, de_dot, de_list);
329212826Sjh		TAILQ_REMOVE(&de->de_dlist, de_dotdot, de_list);
330212660Sjh		TAILQ_REMOVE(&dd->de_dlist, de, de_list);
331212660Sjh		DEVFS_DE_HOLD(dd);
332212660Sjh		devfs_delete(dm, de, DEVFS_DEL_NORECURSE);
333212660Sjh		devfs_delete(dm, de_dot, DEVFS_DEL_NORECURSE);
334212660Sjh		devfs_delete(dm, de_dotdot, DEVFS_DEL_NORECURSE);
335212660Sjh		if (DEVFS_DE_DROP(dd)) {
336212660Sjh			devfs_dirent_free(dd);
337212660Sjh			return;
338212660Sjh		}
339212660Sjh
340212660Sjh		de = dd;
341212660Sjh	}
342212660Sjh}
343212660Sjh
344212660Sjh/*
345163481Skib * The caller needs to hold the dm for the duration of the call since
346163481Skib * dm->dm_lock may be temporary dropped.
347163481Skib */
348162398Skibvoid
349212660Sjhdevfs_delete(struct devfs_mount *dm, struct devfs_dirent *de, int flags)
35064880Sphk{
351212660Sjh	struct devfs_dirent *dd;
352163481Skib	struct vnode *vp;
35364880Sphk
354162398Skib	KASSERT((de->de_flags & DE_DOOMED) == 0,
355162398Skib		("devfs_delete doomed dirent"));
356162398Skib	de->de_flags |= DE_DOOMED;
357212660Sjh
358212660Sjh	if ((flags & DEVFS_DEL_NORECURSE) == 0) {
359212660Sjh		dd = devfs_parent_dirent(de);
360212660Sjh		if (dd != NULL)
361212660Sjh			DEVFS_DE_HOLD(dd);
362213215Sjh		if (de->de_flags & DE_USER) {
363213215Sjh			KASSERT(dd != NULL, ("devfs_delete: NULL dd"));
364213215Sjh			devfs_dir_unref_de(dm, dd);
365213215Sjh		}
366212660Sjh	} else
367212660Sjh		dd = NULL;
368212660Sjh
369163481Skib	mtx_lock(&devfs_de_interlock);
370163481Skib	vp = de->de_vnode;
371163481Skib	if (vp != NULL) {
372163481Skib		VI_LOCK(vp);
373163481Skib		mtx_unlock(&devfs_de_interlock);
374163481Skib		vholdl(vp);
375163481Skib		sx_unlock(&dm->dm_lock);
376212660Sjh		if ((flags & DEVFS_DEL_VNLOCKED) == 0)
377175202Sattilio			vn_lock(vp, LK_EXCLUSIVE | LK_INTERLOCK | LK_RETRY);
378163481Skib		else
379163481Skib			VI_UNLOCK(vp);
380163481Skib		vgone(vp);
381212660Sjh		if ((flags & DEVFS_DEL_VNLOCKED) == 0)
382175294Sattilio			VOP_UNLOCK(vp, 0);
383163481Skib		vdrop(vp);
384163481Skib		sx_xlock(&dm->dm_lock);
385163481Skib	} else
386163481Skib		mtx_unlock(&devfs_de_interlock);
38764880Sphk	if (de->de_symlink) {
388150151Sphk		free(de->de_symlink, M_DEVFS);
38964880Sphk		de->de_symlink = NULL;
39064880Sphk	}
391101069Srwatson#ifdef MAC
392172930Srwatson	mac_devfs_destroy(de);
393101069Srwatson#endif
394150342Sphk	if (de->de_inode > DEVFS_ROOTINO) {
395226041Skib		devfs_free_cdp_inode(de->de_inode);
396150342Sphk		de->de_inode = 0;
397150342Sphk	}
398162398Skib	if (DEVFS_DE_DROP(de))
399162398Skib		devfs_dirent_free(de);
400212660Sjh
401212660Sjh	if (dd != NULL) {
402212660Sjh		if (DEVFS_DE_DROP(dd))
403212660Sjh			devfs_dirent_free(dd);
404212660Sjh		else
405212660Sjh			devfs_rmdir_empty(dm, dd);
406212660Sjh	}
40764880Sphk}
40864880Sphk
409150342Sphk/*
410150342Sphk * Called on unmount.
411163481Skib * Recursively removes the entire tree.
412163481Skib * The caller needs to hold the dm for the duration of the call.
413150342Sphk */
414150342Sphk
415150342Sphkstatic void
416150342Sphkdevfs_purge(struct devfs_mount *dm, struct devfs_dirent *dd)
41764880Sphk{
41864880Sphk	struct devfs_dirent *de;
41964880Sphk
420150342Sphk	sx_assert(&dm->dm_lock, SX_XLOCKED);
421212660Sjh
422212660Sjh	DEVFS_DE_HOLD(dd);
42364880Sphk	for (;;) {
424213215Sjh		/*
425213215Sjh		 * Use TAILQ_LAST() to remove "." and ".." last.
426213215Sjh		 * We might need ".." to resolve a path in
427213215Sjh		 * devfs_dir_unref_de().
428213215Sjh		 */
429213215Sjh		de = TAILQ_LAST(&dd->de_dlist, devfs_dlist_head);
43064880Sphk		if (de == NULL)
43164880Sphk			break;
432150342Sphk		TAILQ_REMOVE(&dd->de_dlist, de, de_list);
433213215Sjh		if (de->de_flags & DE_USER)
434213215Sjh			devfs_dir_unref_de(dm, dd);
435212660Sjh		if (de->de_flags & (DE_DOT | DE_DOTDOT))
436212660Sjh			devfs_delete(dm, de, DEVFS_DEL_NORECURSE);
437150342Sphk		else if (de->de_dirent->d_type == DT_DIR)
438150342Sphk			devfs_purge(dm, de);
439212660Sjh		else
440212660Sjh			devfs_delete(dm, de, DEVFS_DEL_NORECURSE);
44164880Sphk	}
442212660Sjh	if (DEVFS_DE_DROP(dd))
443212660Sjh		devfs_dirent_free(dd);
444212660Sjh	else if ((dd->de_flags & DE_DOOMED) == 0)
445212660Sjh		devfs_delete(dm, dd, DEVFS_DEL_NORECURSE);
44664880Sphk}
44764880Sphk
448150342Sphk/*
449150342Sphk * Each cdev_priv has an array of pointers to devfs_dirent which is indexed
450150342Sphk * by the mount points dm_idx.
451150342Sphk * This function extends the array when necessary, taking into account that
452150342Sphk * the default array is 1 element and not malloc'ed.
453150342Sphk */
454150342Sphkstatic void
455150342Sphkdevfs_metoo(struct cdev_priv *cdp, struct devfs_mount *dm)
456150342Sphk{
457150342Sphk	struct devfs_dirent **dep;
458150342Sphk	int siz;
45964880Sphk
460150342Sphk	siz = (dm->dm_idx + 1) * sizeof *dep;
461150342Sphk	dep = malloc(siz, M_DEVFS2, M_WAITOK | M_ZERO);
462150342Sphk	dev_lock();
463150342Sphk	if (dm->dm_idx <= cdp->cdp_maxdirent) {
464150342Sphk		/* We got raced */
465150342Sphk		dev_unlock();
466150342Sphk		free(dep, M_DEVFS2);
467150342Sphk		return;
468150342Sphk	}
469150342Sphk	memcpy(dep, cdp->cdp_dirents, (cdp->cdp_maxdirent + 1) * sizeof *dep);
470150342Sphk	if (cdp->cdp_maxdirent > 0)
471150342Sphk		free(cdp->cdp_dirents, M_DEVFS2);
472150342Sphk	cdp->cdp_dirents = dep;
473150342Sphk	/*
474150342Sphk	 * XXX: if malloc told us how much we actually got this could
475150342Sphk	 * XXX: be optimized.
476150342Sphk	 */
477150342Sphk	cdp->cdp_maxdirent = dm->dm_idx;
478150342Sphk	dev_unlock();
479150342Sphk}
480150342Sphk
481163481Skib/*
482163481Skib * The caller needs to hold the dm for the duration of the call.
483163481Skib */
484150342Sphkstatic int
485150342Sphkdevfs_populate_loop(struct devfs_mount *dm, int cleanup)
48664880Sphk{
487150342Sphk	struct cdev_priv *cdp;
488150342Sphk	struct devfs_dirent *de;
48965051Sphk	struct devfs_dirent *dd;
490150342Sphk	struct cdev *pdev;
491211226Sjh	int de_flags, j;
49264880Sphk	char *q, *s;
49364880Sphk
494150342Sphk	sx_assert(&dm->dm_lock, SX_XLOCKED);
495150342Sphk	dev_lock();
496150342Sphk	TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) {
497150342Sphk
498150342Sphk		KASSERT(cdp->cdp_dirents != NULL, ("NULL cdp_dirents"));
499150342Sphk
500150342Sphk		/*
501150342Sphk		 * If we are unmounting, or the device has been destroyed,
502150342Sphk		 * clean up our dirent.
503150342Sphk		 */
504150342Sphk		if ((cleanup || !(cdp->cdp_flags & CDP_ACTIVE)) &&
505150342Sphk		    dm->dm_idx <= cdp->cdp_maxdirent &&
506150342Sphk		    cdp->cdp_dirents[dm->dm_idx] != NULL) {
507150342Sphk			de = cdp->cdp_dirents[dm->dm_idx];
508150342Sphk			cdp->cdp_dirents[dm->dm_idx] = NULL;
509150342Sphk			KASSERT(cdp == de->de_cdp,
510150342Sphk			    ("%s %d %s %p %p", __func__, __LINE__,
511150342Sphk			    cdp->cdp_c.si_name, cdp, de->de_cdp));
512150342Sphk			KASSERT(de->de_dir != NULL, ("Null de->de_dir"));
513150342Sphk			dev_unlock();
514150342Sphk
515150342Sphk			TAILQ_REMOVE(&de->de_dir->de_dlist, de, de_list);
516150342Sphk			de->de_cdp = NULL;
517150342Sphk			de->de_inode = 0;
518163481Skib			devfs_delete(dm, de, 0);
519163481Skib			dev_lock();
520163481Skib			cdp->cdp_inuse--;
521163481Skib			dev_unlock();
522150342Sphk			return (1);
523150342Sphk		}
524150342Sphk		/*
525150342Sphk	 	 * GC any lingering devices
526150342Sphk		 */
527150342Sphk		if (!(cdp->cdp_flags & CDP_ACTIVE)) {
528150342Sphk			if (cdp->cdp_inuse > 0)
52965051Sphk				continue;
530150342Sphk			TAILQ_REMOVE(&cdevp_list, cdp, cdp_list);
531150342Sphk			dev_unlock();
532150342Sphk			dev_rel(&cdp->cdp_c);
533150342Sphk			return (1);
534150342Sphk		}
535150342Sphk		/*
536150342Sphk		 * Don't create any new dirents if we are unmounting
537150342Sphk		 */
538150342Sphk		if (cleanup)
539150342Sphk			continue;
540150342Sphk		KASSERT((cdp->cdp_flags & CDP_ACTIVE), ("Bogons, I tell ya'!"));
541150342Sphk
542150342Sphk		if (dm->dm_idx <= cdp->cdp_maxdirent &&
543150342Sphk		    cdp->cdp_dirents[dm->dm_idx] != NULL) {
544150342Sphk			de = cdp->cdp_dirents[dm->dm_idx];
545150342Sphk			KASSERT(cdp == de->de_cdp, ("inconsistent cdp"));
546150342Sphk			continue;
547150342Sphk		}
548150342Sphk
549150342Sphk
550150342Sphk		cdp->cdp_inuse++;
551150342Sphk		dev_unlock();
552150342Sphk
553150342Sphk		if (dm->dm_idx > cdp->cdp_maxdirent)
554150342Sphk		        devfs_metoo(cdp, dm);
555150342Sphk
556150342Sphk		dd = dm->dm_rootdir;
557150342Sphk		s = cdp->cdp_c.si_name;
558150342Sphk		for (;;) {
559150342Sphk			for (q = s; *q != '/' && *q != '\0'; q++)
56064880Sphk				continue;
561150342Sphk			if (*q != '/')
562150342Sphk				break;
563211226Sjh			de = devfs_find(dd, s, q - s, 0);
564150342Sphk			if (de == NULL)
565150342Sphk				de = devfs_vmkdir(dm, s, q - s, dd, 0);
566211226Sjh			else if (de->de_dirent->d_type == DT_LNK) {
567211226Sjh				de = devfs_find(dd, s, q - s, DT_DIR);
568211226Sjh				if (de == NULL)
569211226Sjh					de = devfs_vmkdir(dm, s, q - s, dd, 0);
570211226Sjh				de->de_flags |= DE_COVERED;
571211226Sjh			}
572150342Sphk			s = q + 1;
573150342Sphk			dd = de;
574211226Sjh			KASSERT(dd->de_dirent->d_type == DT_DIR &&
575211226Sjh			    (dd->de_flags & (DE_DOT | DE_DOTDOT)) == 0,
576211226Sjh			    ("%s: invalid directory (si_name=%s)",
577211226Sjh			    __func__, cdp->cdp_c.si_name));
578211226Sjh
579150342Sphk		}
580211226Sjh		de_flags = 0;
581211226Sjh		de = devfs_find(dd, s, q - s, DT_LNK);
582211226Sjh		if (de != NULL)
583211226Sjh			de_flags |= DE_COVERED;
584150342Sphk
585150342Sphk		de = devfs_newdirent(s, q - s);
586150342Sphk		if (cdp->cdp_c.si_flags & SI_ALIAS) {
587150342Sphk			de->de_uid = 0;
588150342Sphk			de->de_gid = 0;
589150342Sphk			de->de_mode = 0755;
590150342Sphk			de->de_dirent->d_type = DT_LNK;
591150342Sphk			pdev = cdp->cdp_c.si_parent;
592150342Sphk			j = strlen(pdev->si_name) + 1;
593150342Sphk			de->de_symlink = malloc(j, M_DEVFS, M_WAITOK);
594150342Sphk			bcopy(pdev->si_name, de->de_symlink, j);
595150342Sphk		} else {
596150342Sphk			de->de_uid = cdp->cdp_c.si_uid;
597150342Sphk			de->de_gid = cdp->cdp_c.si_gid;
598150342Sphk			de->de_mode = cdp->cdp_c.si_mode;
599150342Sphk			de->de_dirent->d_type = DT_CHR;
600150342Sphk		}
601211226Sjh		de->de_flags |= de_flags;
602150342Sphk		de->de_inode = cdp->cdp_inode;
603150342Sphk		de->de_cdp = cdp;
604101069Srwatson#ifdef MAC
605172930Srwatson		mac_devfs_create_device(cdp->cdp_c.si_cred, dm->dm_mount,
606150342Sphk		    &cdp->cdp_c, de);
607101069Srwatson#endif
608150342Sphk		de->de_dir = dd;
609150342Sphk		TAILQ_INSERT_TAIL(&dd->de_dlist, de, de_list);
610150342Sphk		devfs_rules_apply(dm, de);
611150342Sphk		dev_lock();
612150342Sphk		/* XXX: could check that cdp is still active here */
613150342Sphk		KASSERT(cdp->cdp_dirents[dm->dm_idx] == NULL,
614150342Sphk		    ("%s %d\n", __func__, __LINE__));
615150342Sphk		cdp->cdp_dirents[dm->dm_idx] = de;
616150342Sphk		KASSERT(de->de_cdp != (void *)0xdeadc0de,
617150342Sphk		    ("%s %d\n", __func__, __LINE__));
618150342Sphk		dev_unlock();
619150342Sphk		return (1);
62064880Sphk	}
621150342Sphk	dev_unlock();
622150342Sphk	return (0);
62364880Sphk}
62464880Sphk
625163481Skib/*
626163481Skib * The caller needs to hold the dm for the duration of the call.
627163481Skib */
628150342Sphkvoid
629150342Sphkdevfs_populate(struct devfs_mount *dm)
630150342Sphk{
631224743Skib	unsigned gen;
632150342Sphk
633150342Sphk	sx_assert(&dm->dm_lock, SX_XLOCKED);
634224743Skib	gen = devfs_generation;
635224743Skib	if (dm->dm_generation == gen)
636150342Sphk		return;
637150342Sphk	while (devfs_populate_loop(dm, 0))
638150342Sphk		continue;
639224743Skib	dm->dm_generation = gen;
640150342Sphk}
641150342Sphk
642163481Skib/*
643163481Skib * The caller needs to hold the dm for the duration of the call.
644163481Skib */
645150342Sphkvoid
646150342Sphkdevfs_cleanup(struct devfs_mount *dm)
647150342Sphk{
648150342Sphk
649150342Sphk	sx_assert(&dm->dm_lock, SX_XLOCKED);
650150342Sphk	while (devfs_populate_loop(dm, 1))
651150342Sphk		continue;
652150342Sphk	devfs_purge(dm, dm->dm_rootdir);
653150342Sphk}
654150342Sphk
655130678Sphk/*
656130678Sphk * devfs_create() and devfs_destroy() are called from kern_conf.c and
657130678Sphk * in both cases the devlock() mutex is held, so no further locking
658249583Sgabor * is necessary and no sleeping allowed.
659130678Sphk */
660130678Sphk
661111730Sphkvoid
662130585Sphkdevfs_create(struct cdev *dev)
66364880Sphk{
664150342Sphk	struct cdev_priv *cdp;
66565515Sphk
666150342Sphk	mtx_assert(&devmtx, MA_OWNED);
667179828Skib	cdp = cdev2priv(dev);
668150342Sphk	cdp->cdp_flags |= CDP_ACTIVE;
669150342Sphk	cdp->cdp_inode = alloc_unrl(devfs_inos);
670150342Sphk	dev_refl(dev);
671150342Sphk	TAILQ_INSERT_TAIL(&cdevp_list, cdp, cdp_list);
672130678Sphk	devfs_generation++;
67364880Sphk}
67464880Sphk
675111730Sphkvoid
676130585Sphkdevfs_destroy(struct cdev *dev)
67764880Sphk{
678150342Sphk	struct cdev_priv *cdp;
67965515Sphk
680150342Sphk	mtx_assert(&devmtx, MA_OWNED);
681179828Skib	cdp = cdev2priv(dev);
682150342Sphk	cdp->cdp_flags &= ~CDP_ACTIVE;
683130678Sphk	devfs_generation++;
68464880Sphk}
685150342Sphk
686226041Skibino_t
687226041Skibdevfs_alloc_cdp_inode(void)
688226041Skib{
689226041Skib
690226041Skib	return (alloc_unr(devfs_inos));
691226041Skib}
692226041Skib
693226041Skibvoid
694226041Skibdevfs_free_cdp_inode(ino_t ino)
695226041Skib{
696226041Skib
697226041Skib	if (ino > 0)
698226041Skib		free_unr(devfs_inos, ino);
699226041Skib}
700226041Skib
701150342Sphkstatic void
702150342Sphkdevfs_devs_init(void *junk __unused)
703150342Sphk{
704150342Sphk
705150342Sphk	devfs_inos = new_unrhdr(DEVFS_ROOTINO + 1, INT_MAX, &devmtx);
706150342Sphk}
707150342Sphk
708150342SphkSYSINIT(devfs_devs, SI_SUB_DEVFS, SI_ORDER_FIRST, devfs_devs_init, NULL);
709