blob: fda52563677f8712f2ea104ee551977b7fb1625f [file] [log] [blame]
Kay Sievers2b2af542009-04-30 15:23:42 +02001/*
2 * devtmpfs - kernel-maintained tmpfs-based /dev
3 *
4 * Copyright (C) 2009, Kay Sievers <kay.sievers@vrfy.org>
5 *
6 * During bootup, before any driver core device is registered,
7 * devtmpfs, a tmpfs-based filesystem is created. Every driver-core
8 * device which requests a device node, will add a node in this
Kay Sieverse454cea2009-09-18 23:01:12 +02009 * filesystem.
Peter Korsgaard02fbe5e2012-04-17 12:13:18 +020010 * By default, all devices are named after the name of the device,
11 * owned by root and have a default mode of 0600. Subsystems can
12 * overwrite the default setting if needed.
Kay Sievers2b2af542009-04-30 15:23:42 +020013 */
14
15#include <linux/kernel.h>
16#include <linux/syscalls.h>
17#include <linux/mount.h>
18#include <linux/device.h>
19#include <linux/genhd.h>
20#include <linux/namei.h>
21#include <linux/fs.h>
22#include <linux/shmem_fs.h>
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010023#include <linux/ramfs.h>
Kay Sieverse454cea2009-09-18 23:01:12 +020024#include <linux/sched.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090025#include <linux/slab.h>
Al Viro2780f1f2011-06-27 16:25:29 -040026#include <linux/kthread.h>
Kay Sievers2b2af542009-04-30 15:23:42 +020027
Al Viro2780f1f2011-06-27 16:25:29 -040028static struct task_struct *thread;
Kay Sievers2b2af542009-04-30 15:23:42 +020029
30#if defined CONFIG_DEVTMPFS_MOUNT
Al Virofc14f2f2010-07-25 01:48:30 +040031static int mount_dev = 1;
Kay Sievers2b2af542009-04-30 15:23:42 +020032#else
Al Virofc14f2f2010-07-25 01:48:30 +040033static int mount_dev;
Kay Sievers2b2af542009-04-30 15:23:42 +020034#endif
35
Al Viro2780f1f2011-06-27 16:25:29 -040036static DEFINE_SPINLOCK(req_lock);
37
38static struct req {
39 struct req *next;
40 struct completion done;
41 int err;
42 const char *name;
Al Viro2c9ede52011-07-23 20:24:48 -040043 umode_t mode; /* 0 => delete */
Kay Sievers3c2670e2013-04-06 09:56:00 -070044 uid_t uid;
45 gid_t gid;
Al Viro2780f1f2011-06-27 16:25:29 -040046 struct device *dev;
47} *requests;
Kay Sieversed413ae2009-10-28 19:51:06 +010048
Kay Sievers2b2af542009-04-30 15:23:42 +020049static int __init mount_param(char *str)
50{
Al Virofc14f2f2010-07-25 01:48:30 +040051 mount_dev = simple_strtoul(str, NULL, 0);
Kay Sievers2b2af542009-04-30 15:23:42 +020052 return 1;
53}
54__setup("devtmpfs.mount=", mount_param);
55
Al Virofc14f2f2010-07-25 01:48:30 +040056static struct dentry *dev_mount(struct file_system_type *fs_type, int flags,
57 const char *dev_name, void *data)
Kay Sievers2b2af542009-04-30 15:23:42 +020058{
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010059#ifdef CONFIG_TMPFS
Al Virofc14f2f2010-07-25 01:48:30 +040060 return mount_single(fs_type, flags, data, shmem_fill_super);
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010061#else
Al Virofc14f2f2010-07-25 01:48:30 +040062 return mount_single(fs_type, flags, data, ramfs_fill_super);
Peter Korsgaardda5e4ef2010-03-16 21:55:21 +010063#endif
Kay Sievers2b2af542009-04-30 15:23:42 +020064}
65
66static struct file_system_type dev_fs_type = {
67 .name = "devtmpfs",
Al Virofc14f2f2010-07-25 01:48:30 +040068 .mount = dev_mount,
Kay Sievers2b2af542009-04-30 15:23:42 +020069 .kill_sb = kill_litter_super,
70};
71
72#ifdef CONFIG_BLOCK
73static inline int is_blockdev(struct device *dev)
74{
75 return dev->class == &block_class;
76}
77#else
78static inline int is_blockdev(struct device *dev) { return 0; }
79#endif
80
Al Viro2780f1f2011-06-27 16:25:29 -040081int devtmpfs_create_node(struct device *dev)
82{
83 const char *tmp = NULL;
84 struct req req;
85
86 if (!thread)
87 return 0;
88
89 req.mode = 0;
Kay Sievers3c2670e2013-04-06 09:56:00 -070090 req.uid = 0;
91 req.gid = 0;
92 req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp);
Al Viro2780f1f2011-06-27 16:25:29 -040093 if (!req.name)
94 return -ENOMEM;
95
96 if (req.mode == 0)
97 req.mode = 0600;
98 if (is_blockdev(dev))
99 req.mode |= S_IFBLK;
100 else
101 req.mode |= S_IFCHR;
102
103 req.dev = dev;
104
105 init_completion(&req.done);
106
107 spin_lock(&req_lock);
108 req.next = requests;
109 requests = &req;
110 spin_unlock(&req_lock);
111
112 wake_up_process(thread);
113 wait_for_completion(&req.done);
114
115 kfree(tmp);
116
117 return req.err;
118}
119
120int devtmpfs_delete_node(struct device *dev)
121{
122 const char *tmp = NULL;
123 struct req req;
124
125 if (!thread)
126 return 0;
127
Kay Sievers3c2670e2013-04-06 09:56:00 -0700128 req.name = device_get_devnode(dev, NULL, NULL, NULL, &tmp);
Al Viro2780f1f2011-06-27 16:25:29 -0400129 if (!req.name)
130 return -ENOMEM;
131
132 req.mode = 0;
133 req.dev = dev;
134
135 init_completion(&req.done);
136
137 spin_lock(&req_lock);
138 req.next = requests;
139 requests = &req;
140 spin_unlock(&req_lock);
141
142 wake_up_process(thread);
143 wait_for_completion(&req.done);
144
145 kfree(tmp);
146 return req.err;
147}
148
Al Virofbd48a62011-07-24 10:47:56 -0400149static int dev_mkdir(const char *name, umode_t mode)
Kay Sievers2b2af542009-04-30 15:23:42 +0200150{
Kay Sievers2b2af542009-04-30 15:23:42 +0200151 struct dentry *dentry;
Al Viro69753a02011-06-27 16:35:45 -0400152 struct path path;
Kay Sievers2b2af542009-04-30 15:23:42 +0200153 int err;
154
Jeff Layton1ac12b42012-12-11 12:10:06 -0500155 dentry = kern_path_create(AT_FDCWD, name, &path, LOOKUP_DIRECTORY);
Al Viro69753a02011-06-27 16:35:45 -0400156 if (IS_ERR(dentry))
157 return PTR_ERR(dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200158
Al Viro69753a02011-06-27 16:35:45 -0400159 err = vfs_mkdir(path.dentry->d_inode, dentry, mode);
160 if (!err)
161 /* mark as kernel-created inode */
162 dentry->d_inode->i_private = &thread;
Al Viro921a1652012-07-20 01:15:31 +0400163 done_path_create(&path, dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200164 return err;
165}
166
167static int create_path(const char *nodepath)
168{
Al Viro5da4e682011-06-27 16:37:12 -0400169 char *path;
170 char *s;
Al Viro9d108d22011-07-27 22:27:33 -0400171 int err = 0;
Kay Sievers2b2af542009-04-30 15:23:42 +0200172
Al Viro5da4e682011-06-27 16:37:12 -0400173 /* parent directories do not exist, create them */
174 path = kstrdup(nodepath, GFP_KERNEL);
175 if (!path)
176 return -ENOMEM;
Kay Sievers2b2af542009-04-30 15:23:42 +0200177
Al Viro5da4e682011-06-27 16:37:12 -0400178 s = path;
179 for (;;) {
180 s = strchr(s, '/');
181 if (!s)
182 break;
183 s[0] = '\0';
184 err = dev_mkdir(path, 0755);
185 if (err && err != -EEXIST)
186 break;
187 s[0] = '/';
188 s++;
Kay Sievers2b2af542009-04-30 15:23:42 +0200189 }
Al Viro5da4e682011-06-27 16:37:12 -0400190 kfree(path);
Kay Sievers2b2af542009-04-30 15:23:42 +0200191 return err;
192}
193
Kay Sievers3c2670e2013-04-06 09:56:00 -0700194static int handle_create(const char *nodename, umode_t mode, uid_t uid,
195 gid_t gid, struct device *dev)
Kay Sievers2b2af542009-04-30 15:23:42 +0200196{
Kay Sievers2b2af542009-04-30 15:23:42 +0200197 struct dentry *dentry;
Al Viro69753a02011-06-27 16:35:45 -0400198 struct path path;
Kay Sievers2b2af542009-04-30 15:23:42 +0200199 int err;
200
Al Viro69753a02011-06-27 16:35:45 -0400201 dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
202 if (dentry == ERR_PTR(-ENOENT)) {
Kay Sievers2b2af542009-04-30 15:23:42 +0200203 create_path(nodename);
Al Viro69753a02011-06-27 16:35:45 -0400204 dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
Kay Sievers2b2af542009-04-30 15:23:42 +0200205 }
Al Viro69753a02011-06-27 16:35:45 -0400206 if (IS_ERR(dentry))
207 return PTR_ERR(dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200208
Kay Sievers3c2670e2013-04-06 09:56:00 -0700209 err = vfs_mknod(path.dentry->d_inode, dentry, mode, dev->devt);
Al Viro69753a02011-06-27 16:35:45 -0400210 if (!err) {
211 struct iattr newattrs;
Kay Sievers00926992009-10-28 19:50:57 +0100212
Al Viro69753a02011-06-27 16:35:45 -0400213 newattrs.ia_mode = mode;
Kay Sievers3c2670e2013-04-06 09:56:00 -0700214 newattrs.ia_uid = uid;
215 newattrs.ia_gid = gid;
216 newattrs.ia_valid = ATTR_MODE|ATTR_UID|ATTR_GID;
Al Viro69753a02011-06-27 16:35:45 -0400217 mutex_lock(&dentry->d_inode->i_mutex);
218 notify_change(dentry, &newattrs);
219 mutex_unlock(&dentry->d_inode->i_mutex);
Kay Sievers00926992009-10-28 19:50:57 +0100220
Al Viro69753a02011-06-27 16:35:45 -0400221 /* mark as kernel-created inode */
222 dentry->d_inode->i_private = &thread;
Kay Sievers2b2af542009-04-30 15:23:42 +0200223 }
Al Viro921a1652012-07-20 01:15:31 +0400224 done_path_create(&path, dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200225 return err;
226}
227
228static int dev_rmdir(const char *name)
229{
Al Viro79714f72012-06-15 03:01:42 +0400230 struct path parent;
Kay Sievers2b2af542009-04-30 15:23:42 +0200231 struct dentry *dentry;
232 int err;
233
Al Viro79714f72012-06-15 03:01:42 +0400234 dentry = kern_path_locked(name, &parent);
235 if (IS_ERR(dentry))
236 return PTR_ERR(dentry);
237 if (dentry->d_inode) {
238 if (dentry->d_inode->i_private == &thread)
239 err = vfs_rmdir(parent.dentry->d_inode, dentry);
240 else
241 err = -EPERM;
Kay Sievers2b2af542009-04-30 15:23:42 +0200242 } else {
Al Viro79714f72012-06-15 03:01:42 +0400243 err = -ENOENT;
Kay Sievers2b2af542009-04-30 15:23:42 +0200244 }
Al Viro79714f72012-06-15 03:01:42 +0400245 dput(dentry);
246 mutex_unlock(&parent.dentry->d_inode->i_mutex);
247 path_put(&parent);
Kay Sievers2b2af542009-04-30 15:23:42 +0200248 return err;
249}
250
251static int delete_path(const char *nodepath)
252{
253 const char *path;
254 int err = 0;
255
256 path = kstrdup(nodepath, GFP_KERNEL);
257 if (!path)
258 return -ENOMEM;
259
Kay Sieversed413ae2009-10-28 19:51:06 +0100260 for (;;) {
Kay Sievers2b2af542009-04-30 15:23:42 +0200261 char *base;
262
263 base = strrchr(path, '/');
264 if (!base)
265 break;
266 base[0] = '\0';
267 err = dev_rmdir(path);
268 if (err)
269 break;
270 }
271
272 kfree(path);
273 return err;
274}
275
276static int dev_mynode(struct device *dev, struct inode *inode, struct kstat *stat)
277{
278 /* did we create it */
Al Viro2780f1f2011-06-27 16:25:29 -0400279 if (inode->i_private != &thread)
Kay Sievers2b2af542009-04-30 15:23:42 +0200280 return 0;
281
282 /* does the dev_t match */
283 if (is_blockdev(dev)) {
284 if (!S_ISBLK(stat->mode))
285 return 0;
286 } else {
287 if (!S_ISCHR(stat->mode))
288 return 0;
289 }
290 if (stat->rdev != dev->devt)
291 return 0;
292
293 /* ours */
294 return 1;
295}
296
Al Viro2780f1f2011-06-27 16:25:29 -0400297static int handle_remove(const char *nodename, struct device *dev)
Kay Sievers2b2af542009-04-30 15:23:42 +0200298{
Al Viro79714f72012-06-15 03:01:42 +0400299 struct path parent;
Kay Sievers2b2af542009-04-30 15:23:42 +0200300 struct dentry *dentry;
Kay Sievers2b2af542009-04-30 15:23:42 +0200301 int deleted = 1;
302 int err;
303
Al Viro79714f72012-06-15 03:01:42 +0400304 dentry = kern_path_locked(nodename, &parent);
305 if (IS_ERR(dentry))
306 return PTR_ERR(dentry);
Kay Sievers2b2af542009-04-30 15:23:42 +0200307
Al Viro79714f72012-06-15 03:01:42 +0400308 if (dentry->d_inode) {
309 struct kstat stat;
Al Viro3dadecc2013-01-24 02:18:08 -0500310 struct path p = {.mnt = parent.mnt, .dentry = dentry};
311 err = vfs_getattr(&p, &stat);
Al Viro79714f72012-06-15 03:01:42 +0400312 if (!err && dev_mynode(dev, dentry->d_inode, &stat)) {
313 struct iattr newattrs;
314 /*
315 * before unlinking this node, reset permissions
316 * of possible references like hardlinks
317 */
Eric W. Biederman91fa2cc2012-04-25 04:25:35 -0700318 newattrs.ia_uid = GLOBAL_ROOT_UID;
319 newattrs.ia_gid = GLOBAL_ROOT_GID;
Al Viro79714f72012-06-15 03:01:42 +0400320 newattrs.ia_mode = stat.mode & ~0777;
321 newattrs.ia_valid =
322 ATTR_UID|ATTR_GID|ATTR_MODE;
323 mutex_lock(&dentry->d_inode->i_mutex);
324 notify_change(dentry, &newattrs);
325 mutex_unlock(&dentry->d_inode->i_mutex);
326 err = vfs_unlink(parent.dentry->d_inode, dentry);
327 if (!err || err == -ENOENT)
328 deleted = 1;
Kay Sievers2b2af542009-04-30 15:23:42 +0200329 }
Kay Sievers2b2af542009-04-30 15:23:42 +0200330 } else {
Al Viro79714f72012-06-15 03:01:42 +0400331 err = -ENOENT;
Kay Sievers2b2af542009-04-30 15:23:42 +0200332 }
Al Viro79714f72012-06-15 03:01:42 +0400333 dput(dentry);
334 mutex_unlock(&parent.dentry->d_inode->i_mutex);
Kay Sievers2b2af542009-04-30 15:23:42 +0200335
Al Viro79714f72012-06-15 03:01:42 +0400336 path_put(&parent);
Kay Sievers2b2af542009-04-30 15:23:42 +0200337 if (deleted && strchr(nodename, '/'))
338 delete_path(nodename);
Kay Sievers2b2af542009-04-30 15:23:42 +0200339 return err;
340}
341
342/*
343 * If configured, or requested by the commandline, devtmpfs will be
344 * auto-mounted after the kernel mounted the root filesystem.
345 */
Kay Sievers073120c2009-10-28 19:51:17 +0100346int devtmpfs_mount(const char *mntdir)
Kay Sievers2b2af542009-04-30 15:23:42 +0200347{
Kay Sievers2b2af542009-04-30 15:23:42 +0200348 int err;
349
Al Virofc14f2f2010-07-25 01:48:30 +0400350 if (!mount_dev)
Kay Sievers2b2af542009-04-30 15:23:42 +0200351 return 0;
352
Al Viro2780f1f2011-06-27 16:25:29 -0400353 if (!thread)
Kay Sievers2b2af542009-04-30 15:23:42 +0200354 return 0;
355
Kay Sievers073120c2009-10-28 19:51:17 +0100356 err = sys_mount("devtmpfs", (char *)mntdir, "devtmpfs", MS_SILENT, NULL);
Kay Sievers2b2af542009-04-30 15:23:42 +0200357 if (err)
358 printk(KERN_INFO "devtmpfs: error mounting %i\n", err);
359 else
360 printk(KERN_INFO "devtmpfs: mounted\n");
Kay Sievers2b2af542009-04-30 15:23:42 +0200361 return err;
362}
363
Arnaud Lacombef9e0b152011-07-21 13:16:19 -0400364static DECLARE_COMPLETION(setup_done);
Al Viro2780f1f2011-06-27 16:25:29 -0400365
Kay Sievers3c2670e2013-04-06 09:56:00 -0700366static int handle(const char *name, umode_t mode, uid_t uid, gid_t gid,
367 struct device *dev)
Al Viro2780f1f2011-06-27 16:25:29 -0400368{
369 if (mode)
Kay Sievers3c2670e2013-04-06 09:56:00 -0700370 return handle_create(name, mode, uid, gid, dev);
Al Viro2780f1f2011-06-27 16:25:29 -0400371 else
372 return handle_remove(name, dev);
373}
374
375static int devtmpfsd(void *p)
376{
377 char options[] = "mode=0755";
378 int *err = p;
379 *err = sys_unshare(CLONE_NEWNS);
380 if (*err)
381 goto out;
382 *err = sys_mount("devtmpfs", "/", "devtmpfs", MS_SILENT, options);
383 if (*err)
384 goto out;
385 sys_chdir("/.."); /* will traverse into overmounted root */
386 sys_chroot(".");
387 complete(&setup_done);
388 while (1) {
389 spin_lock(&req_lock);
390 while (requests) {
391 struct req *req = requests;
392 requests = NULL;
393 spin_unlock(&req_lock);
394 while (req) {
Al Viroe13889b2011-07-25 14:15:50 -0400395 struct req *next = req->next;
Kay Sievers3c2670e2013-04-06 09:56:00 -0700396 req->err = handle(req->name, req->mode,
397 req->uid, req->gid, req->dev);
Al Viro2780f1f2011-06-27 16:25:29 -0400398 complete(&req->done);
Al Viroe13889b2011-07-25 14:15:50 -0400399 req = next;
Al Viro2780f1f2011-06-27 16:25:29 -0400400 }
401 spin_lock(&req_lock);
402 }
Kautuk Consul65e67572011-11-15 14:52:34 -0800403 __set_current_state(TASK_INTERRUPTIBLE);
Al Viro2780f1f2011-06-27 16:25:29 -0400404 spin_unlock(&req_lock);
405 schedule();
Al Viro2780f1f2011-06-27 16:25:29 -0400406 }
407 return 0;
408out:
409 complete(&setup_done);
410 return *err;
411}
412
Kay Sievers2b2af542009-04-30 15:23:42 +0200413/*
414 * Create devtmpfs instance, driver-core devices will add their device
415 * nodes here.
416 */
417int __init devtmpfs_init(void)
418{
Al Viro2780f1f2011-06-27 16:25:29 -0400419 int err = register_filesystem(&dev_fs_type);
Kay Sievers2b2af542009-04-30 15:23:42 +0200420 if (err) {
421 printk(KERN_ERR "devtmpfs: unable to register devtmpfs "
422 "type %i\n", err);
423 return err;
424 }
425
Al Viro2780f1f2011-06-27 16:25:29 -0400426 thread = kthread_run(devtmpfsd, &err, "kdevtmpfs");
427 if (!IS_ERR(thread)) {
428 wait_for_completion(&setup_done);
429 } else {
430 err = PTR_ERR(thread);
431 thread = NULL;
432 }
433
434 if (err) {
Kay Sievers2b2af542009-04-30 15:23:42 +0200435 printk(KERN_ERR "devtmpfs: unable to create devtmpfs %i\n", err);
436 unregister_filesystem(&dev_fs_type);
437 return err;
438 }
Kay Sievers2b2af542009-04-30 15:23:42 +0200439
440 printk(KERN_INFO "devtmpfs: initialized\n");
441 return 0;
442}