blob: 3f7ee954fd2cda533de4f8d0a2f8becdda464a0b [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001// SPDX-License-Identifier: GPL-2.0
Kay Sievers2b2af542009-04-30 15:23:42 +02002/*
3 * devtmpfs - kernel-maintained tmpfs-based /dev
4 *
5 * Copyright (C) 2009, Kay Sievers <kay.sievers@vrfy.org>
6 *
7 * During bootup, before any driver core device is registered,
8 * devtmpfs, a tmpfs-based filesystem is created. Every driver-core
9 * device which requests a device node, will add a node in this
Kay Sieverse454cea2009-09-18 23:01:12 +020010 * filesystem.
Peter Korsgaard02fbe5e2012-04-17 12:13:18 +020011 * By default, all devices are named after the name of the device,
12 * owned by root and have a default mode of 0600. Subsystems can
13 * overwrite the default setting if needed.
Kay Sievers2b2af542009-04-30 15:23:42 +020014 */
15
16#include <linux/kernel.h>
17#include <linux/syscalls.h>
18#include <linux/mount.h>
19#include <linux/device.h>
20#include <linux/genhd.h>
21#include <linux/namei.h>
22#include <linux/fs.h>
23#include <linux/shmem_fs.h>
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010024#include <linux/ramfs.h>
Kay Sieverse454cea2009-09-18 23:01:12 +020025#include <linux/sched.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090026#include <linux/slab.h>
Al Viro2780f1f2011-06-27 16:25:29 -040027#include <linux/kthread.h>
Greg Kroah-Hartmanc3a30422013-04-10 09:00:15 -070028#include "base.h"
Kay Sievers2b2af542009-04-30 15:23:42 +020029
Al Viro2780f1f2011-06-27 16:25:29 -040030static struct task_struct *thread;
Kay Sievers2b2af542009-04-30 15:23:42 +020031
32#if defined CONFIG_DEVTMPFS_MOUNT
Al Virofc14f2f2010-07-25 01:48:30 +040033static int mount_dev = 1;
Kay Sievers2b2af542009-04-30 15:23:42 +020034#else
Al Virofc14f2f2010-07-25 01:48:30 +040035static int mount_dev;
Kay Sievers2b2af542009-04-30 15:23:42 +020036#endif
37
Al Viro2780f1f2011-06-27 16:25:29 -040038static DEFINE_SPINLOCK(req_lock);
39
40static struct req {
41 struct req *next;
42 struct completion done;
43 int err;
44 const char *name;
Al Viro2c9ede52011-07-23 20:24:48 -040045 umode_t mode; /* 0 => delete */
Greg Kroah-Hartman4e4098a2013-04-11 11:43:29 -070046 kuid_t uid;
47 kgid_t gid;
Al Viro2780f1f2011-06-27 16:25:29 -040048 struct device *dev;
49} *requests;
Kay Sieversed413ae2009-10-28 19:51:06 +010050
Kay Sievers2b2af542009-04-30 15:23:42 +020051static int __init mount_param(char *str)
52{
Al Virofc14f2f2010-07-25 01:48:30 +040053 mount_dev = simple_strtoul(str, NULL, 0);
Kay Sievers2b2af542009-04-30 15:23:42 +020054 return 1;
55}
56__setup("devtmpfs.mount=", mount_param);
57
Al Virofc14f2f2010-07-25 01:48:30 +040058static struct dentry *dev_mount(struct file_system_type *fs_type, int flags,
59 const char *dev_name, void *data)
Kay Sievers2b2af542009-04-30 15:23:42 +020060{
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010061#ifdef CONFIG_TMPFS
Al Virofc14f2f2010-07-25 01:48:30 +040062 return mount_single(fs_type, flags, data, shmem_fill_super);
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010063#else
Al Virofc14f2f2010-07-25 01:48:30 +040064 return mount_single(fs_type, flags, data, ramfs_fill_super);
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010065#endif
Kay Sievers2b2af542009-04-30 15:23:42 +020066}
67
68static struct file_system_type dev_fs_type = {
69 .name = "devtmpfs",
Al Virofc14f2f2010-07-25 01:48:30 +040070 .mount = dev_mount,
Kay Sievers2b2af542009-04-30 15:23:42 +020071 .kill_sb = kill_litter_super,
72};
73
74#ifdef CONFIG_BLOCK
75static inline int is_blockdev(struct device *dev)
76{
77 return dev->class == &block_class;
78}
79#else
80static inline int is_blockdev(struct device *dev) { return 0; }
81#endif
82
Al Viro2780f1f2011-06-27 16:25:29 -040083int devtmpfs_create_node(struct device *dev)
84{
85 const char *tmp = NULL;
86 struct req req;
87
88 if (!thread)
89 return 0;
90
91 req.mode = 0;
Greg Kroah-Hartman4e4098a2013-04-11 11:43:29 -070092 req.uid = GLOBAL_ROOT_UID;
93 req.gid = GLOBAL_ROOT_GID;
Kay Sievers3c2670e2013-04-06 09:56:00 -070094 req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp);
Al Viro2780f1f2011-06-27 16:25:29 -040095 if (!req.name)
96 return -ENOMEM;
97
98 if (req.mode == 0)
99 req.mode = 0600;
100 if (is_blockdev(dev))
101 req.mode |= S_IFBLK;
102 else
103 req.mode |= S_IFCHR;
104
105 req.dev = dev;
106
107 init_completion(&req.done);
108
109 spin_lock(&req_lock);
110 req.next = requests;
111 requests = &req;
112 spin_unlock(&req_lock);
113
114 wake_up_process(thread);
115 wait_for_completion(&req.done);
116
117 kfree(tmp);
118
119 return req.err;
120}
121
122int devtmpfs_delete_node(struct device *dev)
123{
124 const char *tmp = NULL;
125 struct req req;
126
127 if (!thread)
128 return 0;
129
Kay Sievers3c2670e2013-04-06 09:56:00 -0700130 req.name = device_get_devnode(dev, NULL, NULL, NULL, &tmp);
Al Viro2780f1f2011-06-27 16:25:29 -0400131 if (!req.name)
132 return -ENOMEM;
133
134 req.mode = 0;
135 req.dev = dev;
136
137 init_completion(&req.done);
138
139 spin_lock(&req_lock);
140 req.next = requests;
141 requests = &req;
142 spin_unlock(&req_lock);
143
144 wake_up_process(thread);
145 wait_for_completion(&req.done);
146
147 kfree(tmp);
148 return req.err;
149}
150
Al Virofbd48a62011-07-24 10:47:56 -0400151static int dev_mkdir(const char *name, umode_t mode)
Kay Sievers2b2af542009-04-30 15:23:42 +0200152{
Kay Sievers2b2af542009-04-30 15:23:42 +0200153 struct dentry *dentry;
Al Viro69753a02011-06-27 16:35:45 -0400154 struct path path;
Kay Sievers2b2af542009-04-30 15:23:42 +0200155 int err;
156
Jeff Layton1ac12b42012-12-11 12:10:06 -0500157 dentry = kern_path_create(AT_FDCWD, name, &path, LOOKUP_DIRECTORY);
Al Viro69753a02011-06-27 16:35:45 -0400158 if (IS_ERR(dentry))
159 return PTR_ERR(dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200160
David Howells75c3cfa2015-03-17 22:26:12 +0000161 err = vfs_mkdir(d_inode(path.dentry), dentry, mode);
Al Viro69753a02011-06-27 16:35:45 -0400162 if (!err)
163 /* mark as kernel-created inode */
David Howells75c3cfa2015-03-17 22:26:12 +0000164 d_inode(dentry)->i_private = &thread;
Al Viro921a1652012-07-20 01:15:31 +0400165 done_path_create(&path, dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200166 return err;
167}
168
169static int create_path(const char *nodepath)
170{
Al Viro5da4e682011-06-27 16:37:12 -0400171 char *path;
172 char *s;
Al Viro9d108d22011-07-27 22:27:33 -0400173 int err = 0;
Kay Sievers2b2af542009-04-30 15:23:42 +0200174
Al Viro5da4e682011-06-27 16:37:12 -0400175 /* parent directories do not exist, create them */
176 path = kstrdup(nodepath, GFP_KERNEL);
177 if (!path)
178 return -ENOMEM;
Kay Sievers2b2af542009-04-30 15:23:42 +0200179
Al Viro5da4e682011-06-27 16:37:12 -0400180 s = path;
181 for (;;) {
182 s = strchr(s, '/');
183 if (!s)
184 break;
185 s[0] = '\0';
186 err = dev_mkdir(path, 0755);
187 if (err && err != -EEXIST)
188 break;
189 s[0] = '/';
190 s++;
Kay Sievers2b2af542009-04-30 15:23:42 +0200191 }
Al Viro5da4e682011-06-27 16:37:12 -0400192 kfree(path);
Kay Sievers2b2af542009-04-30 15:23:42 +0200193 return err;
194}
195
Greg Kroah-Hartman4e4098a2013-04-11 11:43:29 -0700196static int handle_create(const char *nodename, umode_t mode, kuid_t uid,
197 kgid_t gid, struct device *dev)
Kay Sievers2b2af542009-04-30 15:23:42 +0200198{
Kay Sievers2b2af542009-04-30 15:23:42 +0200199 struct dentry *dentry;
Al Viro69753a02011-06-27 16:35:45 -0400200 struct path path;
Kay Sievers2b2af542009-04-30 15:23:42 +0200201 int err;
202
Al Viro69753a02011-06-27 16:35:45 -0400203 dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
204 if (dentry == ERR_PTR(-ENOENT)) {
Kay Sievers2b2af542009-04-30 15:23:42 +0200205 create_path(nodename);
Al Viro69753a02011-06-27 16:35:45 -0400206 dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
Kay Sievers2b2af542009-04-30 15:23:42 +0200207 }
Al Viro69753a02011-06-27 16:35:45 -0400208 if (IS_ERR(dentry))
209 return PTR_ERR(dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200210
David Howells75c3cfa2015-03-17 22:26:12 +0000211 err = vfs_mknod(d_inode(path.dentry), dentry, mode, dev->devt);
Al Viro69753a02011-06-27 16:35:45 -0400212 if (!err) {
213 struct iattr newattrs;
Kay Sievers00926992009-10-28 19:50:57 +0100214
Al Viro69753a02011-06-27 16:35:45 -0400215 newattrs.ia_mode = mode;
Greg Kroah-Hartman4e4098a2013-04-11 11:43:29 -0700216 newattrs.ia_uid = uid;
217 newattrs.ia_gid = gid;
Kay Sievers3c2670e2013-04-06 09:56:00 -0700218 newattrs.ia_valid = ATTR_MODE|ATTR_UID|ATTR_GID;
Al Viro59551022016-01-22 15:40:57 -0500219 inode_lock(d_inode(dentry));
J. Bruce Fields27ac0ff2011-09-20 17:19:26 -0400220 notify_change(dentry, &newattrs, NULL);
Al Viro59551022016-01-22 15:40:57 -0500221 inode_unlock(d_inode(dentry));
Kay Sievers00926992009-10-28 19:50:57 +0100222
Al Viro69753a02011-06-27 16:35:45 -0400223 /* mark as kernel-created inode */
David Howells75c3cfa2015-03-17 22:26:12 +0000224 d_inode(dentry)->i_private = &thread;
Kay Sievers2b2af542009-04-30 15:23:42 +0200225 }
Al Viro921a1652012-07-20 01:15:31 +0400226 done_path_create(&path, dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200227 return err;
228}
229
230static int dev_rmdir(const char *name)
231{
Al Viro79714f72012-06-15 03:01:42 +0400232 struct path parent;
Kay Sievers2b2af542009-04-30 15:23:42 +0200233 struct dentry *dentry;
234 int err;
235
Al Viro79714f72012-06-15 03:01:42 +0400236 dentry = kern_path_locked(name, &parent);
237 if (IS_ERR(dentry))
238 return PTR_ERR(dentry);
David Howells75c3cfa2015-03-17 22:26:12 +0000239 if (d_really_is_positive(dentry)) {
240 if (d_inode(dentry)->i_private == &thread)
241 err = vfs_rmdir(d_inode(parent.dentry), dentry);
Al Viro79714f72012-06-15 03:01:42 +0400242 else
243 err = -EPERM;
Kay Sievers2b2af542009-04-30 15:23:42 +0200244 } else {
Al Viro79714f72012-06-15 03:01:42 +0400245 err = -ENOENT;
Kay Sievers2b2af542009-04-30 15:23:42 +0200246 }
Al Viro79714f72012-06-15 03:01:42 +0400247 dput(dentry);
Al Viro59551022016-01-22 15:40:57 -0500248 inode_unlock(d_inode(parent.dentry));
Al Viro79714f72012-06-15 03:01:42 +0400249 path_put(&parent);
Kay Sievers2b2af542009-04-30 15:23:42 +0200250 return err;
251}
252
253static int delete_path(const char *nodepath)
254{
255 const char *path;
256 int err = 0;
257
258 path = kstrdup(nodepath, GFP_KERNEL);
259 if (!path)
260 return -ENOMEM;
261
Kay Sieversed413ae2009-10-28 19:51:06 +0100262 for (;;) {
Kay Sievers2b2af542009-04-30 15:23:42 +0200263 char *base;
264
265 base = strrchr(path, '/');
266 if (!base)
267 break;
268 base[0] = '\0';
269 err = dev_rmdir(path);
270 if (err)
271 break;
272 }
273
274 kfree(path);
275 return err;
276}
277
278static int dev_mynode(struct device *dev, struct inode *inode, struct kstat *stat)
279{
280 /* did we create it */
Al Viro2780f1f2011-06-27 16:25:29 -0400281 if (inode->i_private != &thread)
Kay Sievers2b2af542009-04-30 15:23:42 +0200282 return 0;
283
284 /* does the dev_t match */
285 if (is_blockdev(dev)) {
286 if (!S_ISBLK(stat->mode))
287 return 0;
288 } else {
289 if (!S_ISCHR(stat->mode))
290 return 0;
291 }
292 if (stat->rdev != dev->devt)
293 return 0;
294
295 /* ours */
296 return 1;
297}
298
Al Viro2780f1f2011-06-27 16:25:29 -0400299static int handle_remove(const char *nodename, struct device *dev)
Kay Sievers2b2af542009-04-30 15:23:42 +0200300{
Al Viro79714f72012-06-15 03:01:42 +0400301 struct path parent;
Kay Sievers2b2af542009-04-30 15:23:42 +0200302 struct dentry *dentry;
Axel Linfbde7c62013-11-16 16:15:23 +0800303 int deleted = 0;
Kay Sievers2b2af542009-04-30 15:23:42 +0200304 int err;
305
Al Viro79714f72012-06-15 03:01:42 +0400306 dentry = kern_path_locked(nodename, &parent);
307 if (IS_ERR(dentry))
308 return PTR_ERR(dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200309
David Howells75c3cfa2015-03-17 22:26:12 +0000310 if (d_really_is_positive(dentry)) {
Al Viro79714f72012-06-15 03:01:42 +0400311 struct kstat stat;
Al Viro3dadecc2013-01-24 02:18:08 -0500312 struct path p = {.mnt = parent.mnt, .dentry = dentry};
David Howellsa528d352017-01-31 16:46:22 +0000313 err = vfs_getattr(&p, &stat, STATX_TYPE | STATX_MODE,
314 AT_STATX_SYNC_AS_STAT);
David Howells75c3cfa2015-03-17 22:26:12 +0000315 if (!err && dev_mynode(dev, d_inode(dentry), &stat)) {
Al Viro79714f72012-06-15 03:01:42 +0400316 struct iattr newattrs;
317 /*
318 * before unlinking this node, reset permissions
319 * of possible references like hardlinks
320 */
Eric W. Biederman91fa2cc2012-04-25 04:25:35 -0700321 newattrs.ia_uid = GLOBAL_ROOT_UID;
322 newattrs.ia_gid = GLOBAL_ROOT_GID;
Al Viro79714f72012-06-15 03:01:42 +0400323 newattrs.ia_mode = stat.mode & ~0777;
324 newattrs.ia_valid =
325 ATTR_UID|ATTR_GID|ATTR_MODE;
Al Viro59551022016-01-22 15:40:57 -0500326 inode_lock(d_inode(dentry));
J. Bruce Fields27ac0ff2011-09-20 17:19:26 -0400327 notify_change(dentry, &newattrs, NULL);
Al Viro59551022016-01-22 15:40:57 -0500328 inode_unlock(d_inode(dentry));
David Howells75c3cfa2015-03-17 22:26:12 +0000329 err = vfs_unlink(d_inode(parent.dentry), dentry, NULL);
Al Viro79714f72012-06-15 03:01:42 +0400330 if (!err || err == -ENOENT)
331 deleted = 1;
Kay Sievers2b2af542009-04-30 15:23:42 +0200332 }
Kay Sievers2b2af542009-04-30 15:23:42 +0200333 } else {
Al Viro79714f72012-06-15 03:01:42 +0400334 err = -ENOENT;
Kay Sievers2b2af542009-04-30 15:23:42 +0200335 }
Al Viro79714f72012-06-15 03:01:42 +0400336 dput(dentry);
Al Viro59551022016-01-22 15:40:57 -0500337 inode_unlock(d_inode(parent.dentry));
Kay Sievers2b2af542009-04-30 15:23:42 +0200338
Al Viro79714f72012-06-15 03:01:42 +0400339 path_put(&parent);
Kay Sievers2b2af542009-04-30 15:23:42 +0200340 if (deleted && strchr(nodename, '/'))
341 delete_path(nodename);
Kay Sievers2b2af542009-04-30 15:23:42 +0200342 return err;
343}
344
345/*
346 * If configured, or requested by the commandline, devtmpfs will be
347 * auto-mounted after the kernel mounted the root filesystem.
348 */
Kay Sievers073120c2009-10-28 19:51:17 +0100349int devtmpfs_mount(const char *mntdir)
Kay Sievers2b2af542009-04-30 15:23:42 +0200350{
Kay Sievers2b2af542009-04-30 15:23:42 +0200351 int err;
352
Al Virofc14f2f2010-07-25 01:48:30 +0400353 if (!mount_dev)
Kay Sievers2b2af542009-04-30 15:23:42 +0200354 return 0;
355
Al Viro2780f1f2011-06-27 16:25:29 -0400356 if (!thread)
Kay Sievers2b2af542009-04-30 15:23:42 +0200357 return 0;
358
Dominik Brodowski312db1a2018-03-11 11:34:39 +0100359 err = ksys_mount("devtmpfs", (char *)mntdir, "devtmpfs", MS_SILENT,
360 NULL);
Kay Sievers2b2af542009-04-30 15:23:42 +0200361 if (err)
362 printk(KERN_INFO "devtmpfs: error mounting %i\n", err);
363 else
364 printk(KERN_INFO "devtmpfs: mounted\n");
Kay Sievers2b2af542009-04-30 15:23:42 +0200365 return err;
366}
367
Arnaud Lacombef9e0b152011-07-21 13:16:19 -0400368static DECLARE_COMPLETION(setup_done);
Al Viro2780f1f2011-06-27 16:25:29 -0400369
Greg Kroah-Hartman4e4098a2013-04-11 11:43:29 -0700370static int handle(const char *name, umode_t mode, kuid_t uid, kgid_t gid,
Kay Sievers3c2670e2013-04-06 09:56:00 -0700371 struct device *dev)
Al Viro2780f1f2011-06-27 16:25:29 -0400372{
373 if (mode)
Kay Sievers3c2670e2013-04-06 09:56:00 -0700374 return handle_create(name, mode, uid, gid, dev);
Al Viro2780f1f2011-06-27 16:25:29 -0400375 else
376 return handle_remove(name, dev);
377}
378
379static int devtmpfsd(void *p)
380{
381 char options[] = "mode=0755";
382 int *err = p;
383 *err = sys_unshare(CLONE_NEWNS);
384 if (*err)
385 goto out;
Dominik Brodowski312db1a2018-03-11 11:34:39 +0100386 *err = ksys_mount("devtmpfs", "/", "devtmpfs", MS_SILENT, options);
Al Viro2780f1f2011-06-27 16:25:29 -0400387 if (*err)
388 goto out;
Dominik Brodowski447016e2018-03-11 11:34:46 +0100389 ksys_chdir("/.."); /* will traverse into overmounted root */
Dominik Brodowskia16fe332018-03-11 11:34:41 +0100390 ksys_chroot(".");
Al Viro2780f1f2011-06-27 16:25:29 -0400391 complete(&setup_done);
392 while (1) {
393 spin_lock(&req_lock);
394 while (requests) {
395 struct req *req = requests;
396 requests = NULL;
397 spin_unlock(&req_lock);
398 while (req) {
Al Viroe13889b2011-07-25 14:15:50 -0400399 struct req *next = req->next;
Kay Sievers3c2670e2013-04-06 09:56:00 -0700400 req->err = handle(req->name, req->mode,
401 req->uid, req->gid, req->dev);
Al Viro2780f1f2011-06-27 16:25:29 -0400402 complete(&req->done);
Al Viroe13889b2011-07-25 14:15:50 -0400403 req = next;
Al Viro2780f1f2011-06-27 16:25:29 -0400404 }
405 spin_lock(&req_lock);
406 }
Kautuk Consul65e67572011-11-15 14:52:34 -0800407 __set_current_state(TASK_INTERRUPTIBLE);
Al Viro2780f1f2011-06-27 16:25:29 -0400408 spin_unlock(&req_lock);
409 schedule();
Al Viro2780f1f2011-06-27 16:25:29 -0400410 }
411 return 0;
412out:
413 complete(&setup_done);
414 return *err;
415}
416
Kay Sievers2b2af542009-04-30 15:23:42 +0200417/*
418 * Create devtmpfs instance, driver-core devices will add their device
419 * nodes here.
420 */
421int __init devtmpfs_init(void)
422{
Al Viro2780f1f2011-06-27 16:25:29 -0400423 int err = register_filesystem(&dev_fs_type);
Kay Sievers2b2af542009-04-30 15:23:42 +0200424 if (err) {
425 printk(KERN_ERR "devtmpfs: unable to register devtmpfs "
426 "type %i\n", err);
427 return err;
428 }
429
Al Viro2780f1f2011-06-27 16:25:29 -0400430 thread = kthread_run(devtmpfsd, &err, "kdevtmpfs");
431 if (!IS_ERR(thread)) {
432 wait_for_completion(&setup_done);
433 } else {
434 err = PTR_ERR(thread);
435 thread = NULL;
436 }
437
438 if (err) {
Kay Sievers2b2af542009-04-30 15:23:42 +0200439 printk(KERN_ERR "devtmpfs: unable to create devtmpfs %i\n", err);
440 unregister_filesystem(&dev_fs_type);
441 return err;
442 }
Kay Sievers2b2af542009-04-30 15:23:42 +0200443
444 printk(KERN_INFO "devtmpfs: initialized\n");
445 return 0;
446}