attr: handle idmapped mounts
[linux-block.git] / drivers / base / devtmpfs.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
2b2af54a
KS
2/*
3 * devtmpfs - kernel-maintained tmpfs-based /dev
4 *
5 * Copyright (C) 2009, Kay Sievers <kay.sievers@vrfy.org>
6 *
7 * During bootup, before any driver core device is registered,
8 * devtmpfs, a tmpfs-based filesystem is created. Every driver-core
9 * device which requests a device node, will add a node in this
e454cea2 10 * filesystem.
02fbe5e6
PK
11 * By default, all devices are named after the name of the device,
12 * owned by root and have a default mode of 0600. Subsystems can
13 * overwrite the default setting if needed.
2b2af54a
KS
14 */
15
16#include <linux/kernel.h>
17#include <linux/syscalls.h>
18#include <linux/mount.h>
19#include <linux/device.h>
20#include <linux/genhd.h>
21#include <linux/namei.h>
22#include <linux/fs.h>
23#include <linux/shmem_fs.h>
da5e4ef7 24#include <linux/ramfs.h>
e454cea2 25#include <linux/sched.h>
5a0e3ad6 26#include <linux/slab.h>
2780f1ff 27#include <linux/kthread.h>
c60166f0 28#include <linux/init_syscalls.h>
e262e32d 29#include <uapi/linux/mount.h>
c3a30420 30#include "base.h"
2b2af54a 31
2780f1ff 32static struct task_struct *thread;
2b2af54a 33
fad1db8a 34static int __initdata mount_dev = IS_ENABLED(CONFIG_DEVTMPFS_MOUNT);
2b2af54a 35
2780f1ff
AV
36static DEFINE_SPINLOCK(req_lock);
37
38static struct req {
39 struct req *next;
40 struct completion done;
41 int err;
42 const char *name;
2c9ede55 43 umode_t mode; /* 0 => delete */
4e4098a3
GKH
44 kuid_t uid;
45 kgid_t gid;
2780f1ff
AV
46 struct device *dev;
47} *requests;
ed413ae6 48
2b2af54a
KS
49static int __init mount_param(char *str)
50{
fc14f2fe 51 mount_dev = simple_strtoul(str, NULL, 0);
2b2af54a
KS
52 return 1;
53}
54__setup("devtmpfs.mount=", mount_param);
55
d401727e
AV
56static struct vfsmount *mnt;
57
58static struct dentry *public_dev_mount(struct file_system_type *fs_type, int flags,
59 const char *dev_name, void *data)
60{
61 struct super_block *s = mnt->mnt_sb;
62 atomic_inc(&s->s_active);
63 down_write(&s->s_umount);
64 return dget(s->s_root);
65}
66
f3235626
DH
67static struct file_system_type internal_fs_type = {
68 .name = "devtmpfs",
da5e4ef7 69#ifdef CONFIG_TMPFS
f3235626 70 .init_fs_context = shmem_init_fs_context,
d7167b14 71 .parameters = shmem_fs_parameters,
da5e4ef7 72#else
f3235626 73 .init_fs_context = ramfs_init_fs_context,
d7167b14 74 .parameters = ramfs_fs_parameters,
da5e4ef7 75#endif
2b2af54a
KS
76 .kill_sb = kill_litter_super,
77};
78
d401727e
AV
79static struct file_system_type dev_fs_type = {
80 .name = "devtmpfs",
81 .mount = public_dev_mount,
82};
83
2b2af54a
KS
84#ifdef CONFIG_BLOCK
85static inline int is_blockdev(struct device *dev)
86{
87 return dev->class == &block_class;
88}
89#else
90static inline int is_blockdev(struct device *dev) { return 0; }
91#endif
92
72a9cc95
RV
93static int devtmpfs_submit_req(struct req *req, const char *tmp)
94{
95 init_completion(&req->done);
96
97 spin_lock(&req_lock);
98 req->next = requests;
99 requests = req;
100 spin_unlock(&req_lock);
101
102 wake_up_process(thread);
103 wait_for_completion(&req->done);
104
105 kfree(tmp);
106
107 return req->err;
108}
109
2780f1ff
AV
110int devtmpfs_create_node(struct device *dev)
111{
112 const char *tmp = NULL;
113 struct req req;
114
115 if (!thread)
116 return 0;
117
118 req.mode = 0;
4e4098a3
GKH
119 req.uid = GLOBAL_ROOT_UID;
120 req.gid = GLOBAL_ROOT_GID;
3c2670e6 121 req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp);
2780f1ff
AV
122 if (!req.name)
123 return -ENOMEM;
124
125 if (req.mode == 0)
126 req.mode = 0600;
127 if (is_blockdev(dev))
128 req.mode |= S_IFBLK;
129 else
130 req.mode |= S_IFCHR;
131
132 req.dev = dev;
133
72a9cc95 134 return devtmpfs_submit_req(&req, tmp);
2780f1ff
AV
135}
136
137int devtmpfs_delete_node(struct device *dev)
138{
139 const char *tmp = NULL;
140 struct req req;
141
142 if (!thread)
143 return 0;
144
3c2670e6 145 req.name = device_get_devnode(dev, NULL, NULL, NULL, &tmp);
2780f1ff
AV
146 if (!req.name)
147 return -ENOMEM;
148
149 req.mode = 0;
150 req.dev = dev;
151
72a9cc95 152 return devtmpfs_submit_req(&req, tmp);
2780f1ff
AV
153}
154
fbd48a69 155static int dev_mkdir(const char *name, umode_t mode)
2b2af54a 156{
2b2af54a 157 struct dentry *dentry;
69753a0f 158 struct path path;
2b2af54a
KS
159 int err;
160
1ac12b4b 161 dentry = kern_path_create(AT_FDCWD, name, &path, LOOKUP_DIRECTORY);
69753a0f
AV
162 if (IS_ERR(dentry))
163 return PTR_ERR(dentry);
164
75c3cfa8 165 err = vfs_mkdir(d_inode(path.dentry), dentry, mode);
69753a0f
AV
166 if (!err)
167 /* mark as kernel-created inode */
75c3cfa8 168 d_inode(dentry)->i_private = &thread;
921a1650 169 done_path_create(&path, dentry);
2b2af54a
KS
170 return err;
171}
172
173static int create_path(const char *nodepath)
174{
5da4e689
AV
175 char *path;
176 char *s;
9d108d25 177 int err = 0;
2b2af54a 178
5da4e689
AV
179 /* parent directories do not exist, create them */
180 path = kstrdup(nodepath, GFP_KERNEL);
181 if (!path)
182 return -ENOMEM;
183
184 s = path;
185 for (;;) {
186 s = strchr(s, '/');
187 if (!s)
188 break;
189 s[0] = '\0';
190 err = dev_mkdir(path, 0755);
191 if (err && err != -EEXIST)
192 break;
193 s[0] = '/';
194 s++;
2b2af54a 195 }
5da4e689 196 kfree(path);
2b2af54a
KS
197 return err;
198}
199
4e4098a3
GKH
200static int handle_create(const char *nodename, umode_t mode, kuid_t uid,
201 kgid_t gid, struct device *dev)
2b2af54a 202{
2b2af54a 203 struct dentry *dentry;
69753a0f 204 struct path path;
2b2af54a
KS
205 int err;
206
69753a0f
AV
207 dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
208 if (dentry == ERR_PTR(-ENOENT)) {
2b2af54a 209 create_path(nodename);
69753a0f 210 dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
2b2af54a 211 }
69753a0f
AV
212 if (IS_ERR(dentry))
213 return PTR_ERR(dentry);
214
75c3cfa8 215 err = vfs_mknod(d_inode(path.dentry), dentry, mode, dev->devt);
69753a0f
AV
216 if (!err) {
217 struct iattr newattrs;
218
69753a0f 219 newattrs.ia_mode = mode;
4e4098a3
GKH
220 newattrs.ia_uid = uid;
221 newattrs.ia_gid = gid;
3c2670e6 222 newattrs.ia_valid = ATTR_MODE|ATTR_UID|ATTR_GID;
5955102c 223 inode_lock(d_inode(dentry));
2f221d6f 224 notify_change(&init_user_ns, dentry, &newattrs, NULL);
5955102c 225 inode_unlock(d_inode(dentry));
69753a0f
AV
226
227 /* mark as kernel-created inode */
75c3cfa8 228 d_inode(dentry)->i_private = &thread;
2b2af54a 229 }
921a1650 230 done_path_create(&path, dentry);
2b2af54a
KS
231 return err;
232}
233
234static int dev_rmdir(const char *name)
235{
79714f72 236 struct path parent;
2b2af54a
KS
237 struct dentry *dentry;
238 int err;
239
79714f72
AV
240 dentry = kern_path_locked(name, &parent);
241 if (IS_ERR(dentry))
242 return PTR_ERR(dentry);
75c3cfa8
DH
243 if (d_really_is_positive(dentry)) {
244 if (d_inode(dentry)->i_private == &thread)
245 err = vfs_rmdir(d_inode(parent.dentry), dentry);
79714f72
AV
246 else
247 err = -EPERM;
2b2af54a 248 } else {
79714f72 249 err = -ENOENT;
2b2af54a 250 }
79714f72 251 dput(dentry);
5955102c 252 inode_unlock(d_inode(parent.dentry));
79714f72 253 path_put(&parent);
2b2af54a
KS
254 return err;
255}
256
257static int delete_path(const char *nodepath)
258{
be6b1dfe 259 char *path;
2b2af54a
KS
260 int err = 0;
261
262 path = kstrdup(nodepath, GFP_KERNEL);
263 if (!path)
264 return -ENOMEM;
265
ed413ae6 266 for (;;) {
2b2af54a
KS
267 char *base;
268
269 base = strrchr(path, '/');
270 if (!base)
271 break;
272 base[0] = '\0';
273 err = dev_rmdir(path);
274 if (err)
275 break;
276 }
277
278 kfree(path);
279 return err;
280}
281
282static int dev_mynode(struct device *dev, struct inode *inode, struct kstat *stat)
283{
284 /* did we create it */
2780f1ff 285 if (inode->i_private != &thread)
2b2af54a
KS
286 return 0;
287
288 /* does the dev_t match */
289 if (is_blockdev(dev)) {
290 if (!S_ISBLK(stat->mode))
291 return 0;
292 } else {
293 if (!S_ISCHR(stat->mode))
294 return 0;
295 }
296 if (stat->rdev != dev->devt)
297 return 0;
298
299 /* ours */
300 return 1;
301}
302
2780f1ff 303static int handle_remove(const char *nodename, struct device *dev)
2b2af54a 304{
79714f72 305 struct path parent;
2b2af54a 306 struct dentry *dentry;
fbde7c61 307 int deleted = 0;
2b2af54a
KS
308 int err;
309
79714f72
AV
310 dentry = kern_path_locked(nodename, &parent);
311 if (IS_ERR(dentry))
312 return PTR_ERR(dentry);
313
75c3cfa8 314 if (d_really_is_positive(dentry)) {
79714f72 315 struct kstat stat;
3dadecce 316 struct path p = {.mnt = parent.mnt, .dentry = dentry};
a528d35e
DH
317 err = vfs_getattr(&p, &stat, STATX_TYPE | STATX_MODE,
318 AT_STATX_SYNC_AS_STAT);
75c3cfa8 319 if (!err && dev_mynode(dev, d_inode(dentry), &stat)) {
79714f72
AV
320 struct iattr newattrs;
321 /*
322 * before unlinking this node, reset permissions
323 * of possible references like hardlinks
324 */
91fa2cca
EB
325 newattrs.ia_uid = GLOBAL_ROOT_UID;
326 newattrs.ia_gid = GLOBAL_ROOT_GID;
79714f72
AV
327 newattrs.ia_mode = stat.mode & ~0777;
328 newattrs.ia_valid =
329 ATTR_UID|ATTR_GID|ATTR_MODE;
5955102c 330 inode_lock(d_inode(dentry));
2f221d6f 331 notify_change(&init_user_ns, dentry, &newattrs, NULL);
5955102c 332 inode_unlock(d_inode(dentry));
75c3cfa8 333 err = vfs_unlink(d_inode(parent.dentry), dentry, NULL);
79714f72
AV
334 if (!err || err == -ENOENT)
335 deleted = 1;
2b2af54a 336 }
2b2af54a 337 } else {
79714f72 338 err = -ENOENT;
2b2af54a 339 }
79714f72 340 dput(dentry);
5955102c 341 inode_unlock(d_inode(parent.dentry));
2b2af54a 342
79714f72 343 path_put(&parent);
2b2af54a
KS
344 if (deleted && strchr(nodename, '/'))
345 delete_path(nodename);
2b2af54a
KS
346 return err;
347}
348
349/*
350 * If configured, or requested by the commandline, devtmpfs will be
351 * auto-mounted after the kernel mounted the root filesystem.
352 */
fad1db8a 353int __init devtmpfs_mount(void)
2b2af54a 354{
2b2af54a
KS
355 int err;
356
fc14f2fe 357 if (!mount_dev)
2b2af54a
KS
358 return 0;
359
2780f1ff 360 if (!thread)
2b2af54a
KS
361 return 0;
362
c60166f0 363 err = init_mount("devtmpfs", "dev", "devtmpfs", MS_SILENT, NULL);
2b2af54a
KS
364 if (err)
365 printk(KERN_INFO "devtmpfs: error mounting %i\n", err);
366 else
367 printk(KERN_INFO "devtmpfs: mounted\n");
2b2af54a
KS
368 return err;
369}
370
f9e0b159 371static DECLARE_COMPLETION(setup_done);
2780f1ff 372
4e4098a3 373static int handle(const char *name, umode_t mode, kuid_t uid, kgid_t gid,
3c2670e6 374 struct device *dev)
2780f1ff
AV
375{
376 if (mode)
3c2670e6 377 return handle_create(name, mode, uid, gid, dev);
2780f1ff
AV
378 else
379 return handle_remove(name, dev);
380}
381
bcbacc49
CH
382static void __noreturn devtmpfs_work_loop(void)
383{
384 while (1) {
385 spin_lock(&req_lock);
386 while (requests) {
387 struct req *req = requests;
388 requests = NULL;
389 spin_unlock(&req_lock);
390 while (req) {
391 struct req *next = req->next;
392 req->err = handle(req->name, req->mode,
393 req->uid, req->gid, req->dev);
394 complete(&req->done);
395 req = next;
396 }
397 spin_lock(&req_lock);
398 }
399 __set_current_state(TASK_INTERRUPTIBLE);
400 spin_unlock(&req_lock);
401 schedule();
402 }
403}
404
405static int __init devtmpfs_setup(void *p)
2780f1ff 406{
c9d6b287
RV
407 int err;
408
409 err = ksys_unshare(CLONE_NEWNS);
410 if (err)
2780f1ff 411 goto out;
c60166f0 412 err = init_mount("devtmpfs", "/", "devtmpfs", MS_SILENT, NULL);
c9d6b287 413 if (err)
2780f1ff 414 goto out;
db63f1e3 415 init_chdir("/.."); /* will traverse into overmounted root */
4b7ca501 416 init_chroot(".");
0ff0e95e
RV
417out:
418 *(int *)p = err;
2780f1ff 419 complete(&setup_done);
0ff0e95e
RV
420 return err;
421}
422
bcbacc49
CH
423/*
424 * The __ref is because devtmpfs_setup needs to be __init for the routines it
425 * calls. That call is done while devtmpfs_init, which is marked __init,
426 * synchronously waits for it to complete.
427 */
428static int __ref devtmpfsd(void *p)
0ff0e95e
RV
429{
430 int err = devtmpfs_setup(p);
431
432 if (err)
433 return err;
bcbacc49 434 devtmpfs_work_loop();
2780f1ff 435 return 0;
2780f1ff
AV
436}
437
2b2af54a
KS
438/*
439 * Create devtmpfs instance, driver-core devices will add their device
440 * nodes here.
441 */
442int __init devtmpfs_init(void)
443{
d401727e
AV
444 char opts[] = "mode=0755";
445 int err;
446
447 mnt = vfs_kern_mount(&internal_fs_type, 0, "devtmpfs", opts);
448 if (IS_ERR(mnt)) {
449 printk(KERN_ERR "devtmpfs: unable to create devtmpfs %ld\n",
450 PTR_ERR(mnt));
451 return PTR_ERR(mnt);
452 }
453 err = register_filesystem(&dev_fs_type);
2b2af54a
KS
454 if (err) {
455 printk(KERN_ERR "devtmpfs: unable to register devtmpfs "
456 "type %i\n", err);
457 return err;
458 }
459
2780f1ff
AV
460 thread = kthread_run(devtmpfsd, &err, "kdevtmpfs");
461 if (!IS_ERR(thread)) {
462 wait_for_completion(&setup_done);
463 } else {
464 err = PTR_ERR(thread);
465 thread = NULL;
466 }
467
468 if (err) {
2b2af54a
KS
469 printk(KERN_ERR "devtmpfs: unable to create devtmpfs %i\n", err);
470 unregister_filesystem(&dev_fs_type);
471 return err;
472 }
2b2af54a
KS
473
474 printk(KERN_INFO "devtmpfs: initialized\n");
475 return 0;
476}