xref: /openbmc/linux/drivers/base/devtmpfs.c (revision d6bdbbdf)
1b2441318SGreg Kroah-Hartman // SPDX-License-Identifier: GPL-2.0
22b2af54aSKay Sievers /*
32b2af54aSKay Sievers  * devtmpfs - kernel-maintained tmpfs-based /dev
42b2af54aSKay Sievers  *
52b2af54aSKay Sievers  * Copyright (C) 2009, Kay Sievers <kay.sievers@vrfy.org>
62b2af54aSKay Sievers  *
72b2af54aSKay Sievers  * During bootup, before any driver core device is registered,
82b2af54aSKay Sievers  * devtmpfs, a tmpfs-based filesystem is created. Every driver-core
92b2af54aSKay Sievers  * device which requests a device node, will add a node in this
10e454cea2SKay Sievers  * filesystem.
1102fbe5e6SPeter Korsgaard  * By default, all devices are named after the name of the device,
1202fbe5e6SPeter Korsgaard  * owned by root and have a default mode of 0600. Subsystems can
1302fbe5e6SPeter Korsgaard  * overwrite the default setting if needed.
142b2af54aSKay Sievers  */
152b2af54aSKay Sievers 
16*5cdc03c5SLonglong Xia #define pr_fmt(fmt) "devtmpfs: " fmt
17*5cdc03c5SLonglong Xia 
182b2af54aSKay Sievers #include <linux/kernel.h>
192b2af54aSKay Sievers #include <linux/syscalls.h>
202b2af54aSKay Sievers #include <linux/mount.h>
212b2af54aSKay Sievers #include <linux/device.h>
22322cbb50SChristoph Hellwig #include <linux/blkdev.h>
232b2af54aSKay Sievers #include <linux/namei.h>
242b2af54aSKay Sievers #include <linux/fs.h>
252b2af54aSKay Sievers #include <linux/shmem_fs.h>
26da5e4ef7SPeter Korsgaard #include <linux/ramfs.h>
27e454cea2SKay Sievers #include <linux/sched.h>
285a0e3ad6STejun Heo #include <linux/slab.h>
292780f1ffSAl Viro #include <linux/kthread.h>
30c60166f0SChristoph Hellwig #include <linux/init_syscalls.h>
31e262e32dSDavid Howells #include <uapi/linux/mount.h>
32c3a30420SGreg Kroah-Hartman #include "base.h"
332b2af54aSKay Sievers 
3428f0c335SKees Cook #ifdef CONFIG_DEVTMPFS_SAFE
3528f0c335SKees Cook #define DEVTMPFS_MFLAGS       (MS_SILENT | MS_NOEXEC | MS_NOSUID)
3628f0c335SKees Cook #else
3728f0c335SKees Cook #define DEVTMPFS_MFLAGS       (MS_SILENT)
3828f0c335SKees Cook #endif
3928f0c335SKees Cook 
402780f1ffSAl Viro static struct task_struct *thread;
412b2af54aSKay Sievers 
42fad1db8aSRasmus Villemoes static int __initdata mount_dev = IS_ENABLED(CONFIG_DEVTMPFS_MOUNT);
432b2af54aSKay Sievers 
442780f1ffSAl Viro static DEFINE_SPINLOCK(req_lock);
452780f1ffSAl Viro 
462780f1ffSAl Viro static struct req {
472780f1ffSAl Viro 	struct req *next;
482780f1ffSAl Viro 	struct completion done;
492780f1ffSAl Viro 	int err;
502780f1ffSAl Viro 	const char *name;
512c9ede55SAl Viro 	umode_t mode;	/* 0 => delete */
524e4098a3SGreg Kroah-Hartman 	kuid_t uid;
534e4098a3SGreg Kroah-Hartman 	kgid_t gid;
542780f1ffSAl Viro 	struct device *dev;
552780f1ffSAl Viro } *requests;
56ed413ae6SKay Sievers 
mount_param(char * str)572b2af54aSKay Sievers static int __init mount_param(char *str)
582b2af54aSKay Sievers {
59fc14f2feSAl Viro 	mount_dev = simple_strtoul(str, NULL, 0);
602b2af54aSKay Sievers 	return 1;
612b2af54aSKay Sievers }
622b2af54aSKay Sievers __setup("devtmpfs.mount=", mount_param);
632b2af54aSKay Sievers 
64d401727eSAl Viro static struct vfsmount *mnt;
65d401727eSAl Viro 
public_dev_mount(struct file_system_type * fs_type,int flags,const char * dev_name,void * data)66d401727eSAl Viro static struct dentry *public_dev_mount(struct file_system_type *fs_type, int flags,
67d401727eSAl Viro 		      const char *dev_name, void *data)
68d401727eSAl Viro {
69d401727eSAl Viro 	struct super_block *s = mnt->mnt_sb;
70a6097180SNeilBrown 	int err;
71a6097180SNeilBrown 
72d401727eSAl Viro 	atomic_inc(&s->s_active);
73d401727eSAl Viro 	down_write(&s->s_umount);
74a6097180SNeilBrown 	err = reconfigure_single(s, flags, data);
75a6097180SNeilBrown 	if (err < 0) {
76a6097180SNeilBrown 		deactivate_locked_super(s);
77a6097180SNeilBrown 		return ERR_PTR(err);
78a6097180SNeilBrown 	}
79d401727eSAl Viro 	return dget(s->s_root);
80d401727eSAl Viro }
81d401727eSAl Viro 
82d401727eSAl Viro static struct file_system_type internal_fs_type = {
832b2af54aSKay Sievers 	.name = "devtmpfs",
84f3235626SDavid Howells #ifdef CONFIG_TMPFS
85f3235626SDavid Howells 	.init_fs_context = shmem_init_fs_context,
86f3235626SDavid Howells #else
87f3235626SDavid Howells 	.init_fs_context = ramfs_init_fs_context,
88f3235626SDavid Howells #endif
892b2af54aSKay Sievers 	.kill_sb = kill_litter_super,
902b2af54aSKay Sievers };
912b2af54aSKay Sievers 
92d401727eSAl Viro static struct file_system_type dev_fs_type = {
93d401727eSAl Viro 	.name = "devtmpfs",
94d401727eSAl Viro 	.mount = public_dev_mount,
95d401727eSAl Viro };
96d401727eSAl Viro 
devtmpfs_submit_req(struct req * req,const char * tmp)9772a9cc95SRasmus Villemoes static int devtmpfs_submit_req(struct req *req, const char *tmp)
9872a9cc95SRasmus Villemoes {
9972a9cc95SRasmus Villemoes 	init_completion(&req->done);
10072a9cc95SRasmus Villemoes 
10172a9cc95SRasmus Villemoes 	spin_lock(&req_lock);
10272a9cc95SRasmus Villemoes 	req->next = requests;
10372a9cc95SRasmus Villemoes 	requests = req;
10472a9cc95SRasmus Villemoes 	spin_unlock(&req_lock);
10572a9cc95SRasmus Villemoes 
10672a9cc95SRasmus Villemoes 	wake_up_process(thread);
10772a9cc95SRasmus Villemoes 	wait_for_completion(&req->done);
10872a9cc95SRasmus Villemoes 
10972a9cc95SRasmus Villemoes 	kfree(tmp);
11072a9cc95SRasmus Villemoes 
11172a9cc95SRasmus Villemoes 	return req->err;
11272a9cc95SRasmus Villemoes }
11372a9cc95SRasmus Villemoes 
devtmpfs_create_node(struct device * dev)1142780f1ffSAl Viro int devtmpfs_create_node(struct device *dev)
1152780f1ffSAl Viro {
1162780f1ffSAl Viro 	const char *tmp = NULL;
1172780f1ffSAl Viro 	struct req req;
1182780f1ffSAl Viro 
1192780f1ffSAl Viro 	if (!thread)
1202780f1ffSAl Viro 		return 0;
1212780f1ffSAl Viro 
1222780f1ffSAl Viro 	req.mode = 0;
1234e4098a3SGreg Kroah-Hartman 	req.uid = GLOBAL_ROOT_UID;
1244e4098a3SGreg Kroah-Hartman 	req.gid = GLOBAL_ROOT_GID;
1253c2670e6SKay Sievers 	req.name = device_get_devnode(dev, &req.mode, &req.uid, &req.gid, &tmp);
1262780f1ffSAl Viro 	if (!req.name)
1272780f1ffSAl Viro 		return -ENOMEM;
1282780f1ffSAl Viro 
1292780f1ffSAl Viro 	if (req.mode == 0)
1302780f1ffSAl Viro 		req.mode = 0600;
1312780f1ffSAl Viro 	if (is_blockdev(dev))
1322780f1ffSAl Viro 		req.mode |= S_IFBLK;
1332780f1ffSAl Viro 	else
1342780f1ffSAl Viro 		req.mode |= S_IFCHR;
1352780f1ffSAl Viro 
1362780f1ffSAl Viro 	req.dev = dev;
1372780f1ffSAl Viro 
13872a9cc95SRasmus Villemoes 	return devtmpfs_submit_req(&req, tmp);
1392780f1ffSAl Viro }
1402780f1ffSAl Viro 
devtmpfs_delete_node(struct device * dev)1412780f1ffSAl Viro int devtmpfs_delete_node(struct device *dev)
1422780f1ffSAl Viro {
1432780f1ffSAl Viro 	const char *tmp = NULL;
1442780f1ffSAl Viro 	struct req req;
1452780f1ffSAl Viro 
1462780f1ffSAl Viro 	if (!thread)
1472780f1ffSAl Viro 		return 0;
1482780f1ffSAl Viro 
1493c2670e6SKay Sievers 	req.name = device_get_devnode(dev, NULL, NULL, NULL, &tmp);
1502780f1ffSAl Viro 	if (!req.name)
1512780f1ffSAl Viro 		return -ENOMEM;
1522780f1ffSAl Viro 
1532780f1ffSAl Viro 	req.mode = 0;
1542780f1ffSAl Viro 	req.dev = dev;
1552780f1ffSAl Viro 
15672a9cc95SRasmus Villemoes 	return devtmpfs_submit_req(&req, tmp);
1572780f1ffSAl Viro }
1582780f1ffSAl Viro 
dev_mkdir(const char * name,umode_t mode)159fbd48a69SAl Viro static int dev_mkdir(const char *name, umode_t mode)
1602b2af54aSKay Sievers {
1612b2af54aSKay Sievers 	struct dentry *dentry;
16269753a0fSAl Viro 	struct path path;
1632b2af54aSKay Sievers 	int err;
1642b2af54aSKay Sievers 
1651ac12b4bSJeff Layton 	dentry = kern_path_create(AT_FDCWD, name, &path, LOOKUP_DIRECTORY);
16669753a0fSAl Viro 	if (IS_ERR(dentry))
16769753a0fSAl Viro 		return PTR_ERR(dentry);
1682b2af54aSKay Sievers 
169abf08576SChristian Brauner 	err = vfs_mkdir(&nop_mnt_idmap, d_inode(path.dentry), dentry, mode);
170015bf43bSKay Sievers 	if (!err)
171015bf43bSKay Sievers 		/* mark as kernel-created inode */
17275c3cfa8SDavid Howells 		d_inode(dentry)->i_private = &thread;
173921a1650SAl Viro 	done_path_create(&path, dentry);
1742b2af54aSKay Sievers 	return err;
1752b2af54aSKay Sievers }
1762b2af54aSKay Sievers 
create_path(const char * nodepath)1772b2af54aSKay Sievers static int create_path(const char *nodepath)
1782b2af54aSKay Sievers {
179ed413ae6SKay Sievers 	char *path;
1802b2af54aSKay Sievers 	char *s;
1819d108d25SAl Viro 	int err = 0;
1822b2af54aSKay Sievers 
1832b2af54aSKay Sievers 	/* parent directories do not exist, create them */
184ed413ae6SKay Sievers 	path = kstrdup(nodepath, GFP_KERNEL);
1855da4e689SAl Viro 	if (!path)
1865da4e689SAl Viro 		return -ENOMEM;
1875da4e689SAl Viro 
1882b2af54aSKay Sievers 	s = path;
189ed413ae6SKay Sievers 	for (;;) {
1902b2af54aSKay Sievers 		s = strchr(s, '/');
1912b2af54aSKay Sievers 		if (!s)
1922b2af54aSKay Sievers 			break;
1932b2af54aSKay Sievers 		s[0] = '\0';
1942b2af54aSKay Sievers 		err = dev_mkdir(path, 0755);
1952b2af54aSKay Sievers 		if (err && err != -EEXIST)
1962b2af54aSKay Sievers 			break;
1972b2af54aSKay Sievers 		s[0] = '/';
1982b2af54aSKay Sievers 		s++;
1992b2af54aSKay Sievers 	}
2002b2af54aSKay Sievers 	kfree(path);
2012b2af54aSKay Sievers 	return err;
2022b2af54aSKay Sievers }
2032b2af54aSKay Sievers 
handle_create(const char * nodename,umode_t mode,kuid_t uid,kgid_t gid,struct device * dev)2044e4098a3SGreg Kroah-Hartman static int handle_create(const char *nodename, umode_t mode, kuid_t uid,
2054e4098a3SGreg Kroah-Hartman 			 kgid_t gid, struct device *dev)
2062b2af54aSKay Sievers {
2072b2af54aSKay Sievers 	struct dentry *dentry;
20869753a0fSAl Viro 	struct path path;
2092b2af54aSKay Sievers 	int err;
2102b2af54aSKay Sievers 
21169753a0fSAl Viro 	dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
21269753a0fSAl Viro 	if (dentry == ERR_PTR(-ENOENT)) {
2132b2af54aSKay Sievers 		create_path(nodename);
21469753a0fSAl Viro 		dentry = kern_path_create(AT_FDCWD, nodename, &path, 0);
21500926996SKay Sievers 	}
21669753a0fSAl Viro 	if (IS_ERR(dentry))
21769753a0fSAl Viro 		return PTR_ERR(dentry);
2182b2af54aSKay Sievers 
219abf08576SChristian Brauner 	err = vfs_mknod(&nop_mnt_idmap, d_inode(path.dentry), dentry, mode,
2206521f891SChristian Brauner 			dev->devt);
22100926996SKay Sievers 	if (!err) {
22200926996SKay Sievers 		struct iattr newattrs;
22300926996SKay Sievers 
22400926996SKay Sievers 		newattrs.ia_mode = mode;
2254e4098a3SGreg Kroah-Hartman 		newattrs.ia_uid = uid;
2264e4098a3SGreg Kroah-Hartman 		newattrs.ia_gid = gid;
2273c2670e6SKay Sievers 		newattrs.ia_valid = ATTR_MODE|ATTR_UID|ATTR_GID;
2285955102cSAl Viro 		inode_lock(d_inode(dentry));
229abf08576SChristian Brauner 		notify_change(&nop_mnt_idmap, dentry, &newattrs, NULL);
2305955102cSAl Viro 		inode_unlock(d_inode(dentry));
23100926996SKay Sievers 
23200926996SKay Sievers 		/* mark as kernel-created inode */
23375c3cfa8SDavid Howells 		d_inode(dentry)->i_private = &thread;
23400926996SKay Sievers 	}
235921a1650SAl Viro 	done_path_create(&path, dentry);
2362b2af54aSKay Sievers 	return err;
2372b2af54aSKay Sievers }
2382b2af54aSKay Sievers 
dev_rmdir(const char * name)2392b2af54aSKay Sievers static int dev_rmdir(const char *name)
2402b2af54aSKay Sievers {
24179714f72SAl Viro 	struct path parent;
2422b2af54aSKay Sievers 	struct dentry *dentry;
2432b2af54aSKay Sievers 	int err;
2442b2af54aSKay Sievers 
24579714f72SAl Viro 	dentry = kern_path_locked(name, &parent);
24679714f72SAl Viro 	if (IS_ERR(dentry))
24779714f72SAl Viro 		return PTR_ERR(dentry);
24875c3cfa8SDavid Howells 	if (d_really_is_positive(dentry)) {
24975c3cfa8SDavid Howells 		if (d_inode(dentry)->i_private == &thread)
250abf08576SChristian Brauner 			err = vfs_rmdir(&nop_mnt_idmap, d_inode(parent.dentry),
2516521f891SChristian Brauner 					dentry);
2522b2af54aSKay Sievers 		else
253015bf43bSKay Sievers 			err = -EPERM;
254015bf43bSKay Sievers 	} else {
2552b2af54aSKay Sievers 		err = -ENOENT;
256015bf43bSKay Sievers 	}
2572b2af54aSKay Sievers 	dput(dentry);
2585955102cSAl Viro 	inode_unlock(d_inode(parent.dentry));
25979714f72SAl Viro 	path_put(&parent);
2602b2af54aSKay Sievers 	return err;
2612b2af54aSKay Sievers }
2622b2af54aSKay Sievers 
delete_path(const char * nodepath)2632b2af54aSKay Sievers static int delete_path(const char *nodepath)
2642b2af54aSKay Sievers {
265be6b1dfeSRasmus Villemoes 	char *path;
2662b2af54aSKay Sievers 	int err = 0;
2672b2af54aSKay Sievers 
2682b2af54aSKay Sievers 	path = kstrdup(nodepath, GFP_KERNEL);
2692b2af54aSKay Sievers 	if (!path)
2702b2af54aSKay Sievers 		return -ENOMEM;
2712b2af54aSKay Sievers 
272ed413ae6SKay Sievers 	for (;;) {
2732b2af54aSKay Sievers 		char *base;
2742b2af54aSKay Sievers 
2752b2af54aSKay Sievers 		base = strrchr(path, '/');
2762b2af54aSKay Sievers 		if (!base)
2772b2af54aSKay Sievers 			break;
2782b2af54aSKay Sievers 		base[0] = '\0';
2792b2af54aSKay Sievers 		err = dev_rmdir(path);
2802b2af54aSKay Sievers 		if (err)
2812b2af54aSKay Sievers 			break;
2822b2af54aSKay Sievers 	}
2832b2af54aSKay Sievers 
2842b2af54aSKay Sievers 	kfree(path);
2852b2af54aSKay Sievers 	return err;
2862b2af54aSKay Sievers }
2872b2af54aSKay Sievers 
dev_mynode(struct device * dev,struct inode * inode,struct kstat * stat)2882b2af54aSKay Sievers static int dev_mynode(struct device *dev, struct inode *inode, struct kstat *stat)
2892b2af54aSKay Sievers {
2902b2af54aSKay Sievers 	/* did we create it */
2912780f1ffSAl Viro 	if (inode->i_private != &thread)
2922b2af54aSKay Sievers 		return 0;
2932b2af54aSKay Sievers 
2942b2af54aSKay Sievers 	/* does the dev_t match */
2952b2af54aSKay Sievers 	if (is_blockdev(dev)) {
2962b2af54aSKay Sievers 		if (!S_ISBLK(stat->mode))
2972b2af54aSKay Sievers 			return 0;
2982b2af54aSKay Sievers 	} else {
2992b2af54aSKay Sievers 		if (!S_ISCHR(stat->mode))
3002b2af54aSKay Sievers 			return 0;
3012b2af54aSKay Sievers 	}
3022b2af54aSKay Sievers 	if (stat->rdev != dev->devt)
3032b2af54aSKay Sievers 		return 0;
3042b2af54aSKay Sievers 
3052b2af54aSKay Sievers 	/* ours */
3062b2af54aSKay Sievers 	return 1;
3072b2af54aSKay Sievers }
3082b2af54aSKay Sievers 
handle_remove(const char * nodename,struct device * dev)3092780f1ffSAl Viro static int handle_remove(const char *nodename, struct device *dev)
3102b2af54aSKay Sievers {
31179714f72SAl Viro 	struct path parent;
3122b2af54aSKay Sievers 	struct dentry *dentry;
313fbde7c61SAxel Lin 	int deleted = 0;
3142b2af54aSKay Sievers 	int err;
3152b2af54aSKay Sievers 
31679714f72SAl Viro 	dentry = kern_path_locked(nodename, &parent);
31779714f72SAl Viro 	if (IS_ERR(dentry))
31879714f72SAl Viro 		return PTR_ERR(dentry);
3192b2af54aSKay Sievers 
32075c3cfa8SDavid Howells 	if (d_really_is_positive(dentry)) {
32179714f72SAl Viro 		struct kstat stat;
3223dadecceSAl Viro 		struct path p = {.mnt = parent.mnt, .dentry = dentry};
323a528d35eSDavid Howells 		err = vfs_getattr(&p, &stat, STATX_TYPE | STATX_MODE,
324a528d35eSDavid Howells 				  AT_STATX_SYNC_AS_STAT);
32575c3cfa8SDavid Howells 		if (!err && dev_mynode(dev, d_inode(dentry), &stat)) {
3265e31d76fSKay Sievers 			struct iattr newattrs;
3275e31d76fSKay Sievers 			/*
3285e31d76fSKay Sievers 			 * before unlinking this node, reset permissions
3295e31d76fSKay Sievers 			 * of possible references like hardlinks
3305e31d76fSKay Sievers 			 */
33191fa2ccaSEric W. Biederman 			newattrs.ia_uid = GLOBAL_ROOT_UID;
33291fa2ccaSEric W. Biederman 			newattrs.ia_gid = GLOBAL_ROOT_GID;
3335e31d76fSKay Sievers 			newattrs.ia_mode = stat.mode & ~0777;
3345e31d76fSKay Sievers 			newattrs.ia_valid =
3355e31d76fSKay Sievers 				ATTR_UID|ATTR_GID|ATTR_MODE;
3365955102cSAl Viro 			inode_lock(d_inode(dentry));
337abf08576SChristian Brauner 			notify_change(&nop_mnt_idmap, dentry, &newattrs, NULL);
3385955102cSAl Viro 			inode_unlock(d_inode(dentry));
339abf08576SChristian Brauner 			err = vfs_unlink(&nop_mnt_idmap, d_inode(parent.dentry),
3406521f891SChristian Brauner 					 dentry, NULL);
3412b2af54aSKay Sievers 			if (!err || err == -ENOENT)
3422b2af54aSKay Sievers 				deleted = 1;
3432b2af54aSKay Sievers 		}
3442b2af54aSKay Sievers 	} else {
3452b2af54aSKay Sievers 		err = -ENOENT;
3462b2af54aSKay Sievers 	}
3472b2af54aSKay Sievers 	dput(dentry);
3485955102cSAl Viro 	inode_unlock(d_inode(parent.dentry));
3492b2af54aSKay Sievers 
35079714f72SAl Viro 	path_put(&parent);
3512b2af54aSKay Sievers 	if (deleted && strchr(nodename, '/'))
3522b2af54aSKay Sievers 		delete_path(nodename);
3532b2af54aSKay Sievers 	return err;
3542b2af54aSKay Sievers }
3552b2af54aSKay Sievers 
3562b2af54aSKay Sievers /*
3572b2af54aSKay Sievers  * If configured, or requested by the commandline, devtmpfs will be
3582b2af54aSKay Sievers  * auto-mounted after the kernel mounted the root filesystem.
3592b2af54aSKay Sievers  */
devtmpfs_mount(void)360fad1db8aSRasmus Villemoes int __init devtmpfs_mount(void)
3612b2af54aSKay Sievers {
3622b2af54aSKay Sievers 	int err;
3632b2af54aSKay Sievers 
364fc14f2feSAl Viro 	if (!mount_dev)
3652b2af54aSKay Sievers 		return 0;
3662b2af54aSKay Sievers 
3672780f1ffSAl Viro 	if (!thread)
3682b2af54aSKay Sievers 		return 0;
3692b2af54aSKay Sievers 
37028f0c335SKees Cook 	err = init_mount("devtmpfs", "dev", "devtmpfs", DEVTMPFS_MFLAGS, NULL);
3712b2af54aSKay Sievers 	if (err)
372*5cdc03c5SLonglong Xia 		pr_info("error mounting %d\n", err);
3732b2af54aSKay Sievers 	else
374*5cdc03c5SLonglong Xia 		pr_info("mounted\n");
3752b2af54aSKay Sievers 	return err;
3762b2af54aSKay Sievers }
3772b2af54aSKay Sievers 
37801085e24SRasmus Villemoes static __initdata DECLARE_COMPLETION(setup_done);
3792780f1ffSAl Viro 
handle(const char * name,umode_t mode,kuid_t uid,kgid_t gid,struct device * dev)3804e4098a3SGreg Kroah-Hartman static int handle(const char *name, umode_t mode, kuid_t uid, kgid_t gid,
3813c2670e6SKay Sievers 		  struct device *dev)
3822780f1ffSAl Viro {
3832780f1ffSAl Viro 	if (mode)
3843c2670e6SKay Sievers 		return handle_create(name, mode, uid, gid, dev);
3852780f1ffSAl Viro 	else
3862780f1ffSAl Viro 		return handle_remove(name, dev);
3872780f1ffSAl Viro }
3882780f1ffSAl Viro 
devtmpfs_work_loop(void)389bcbacc49SChristoph Hellwig static void __noreturn devtmpfs_work_loop(void)
3902780f1ffSAl Viro {
3912780f1ffSAl Viro 	while (1) {
3922780f1ffSAl Viro 		spin_lock(&req_lock);
3932780f1ffSAl Viro 		while (requests) {
3942780f1ffSAl Viro 			struct req *req = requests;
3952780f1ffSAl Viro 			requests = NULL;
3962780f1ffSAl Viro 			spin_unlock(&req_lock);
3972780f1ffSAl Viro 			while (req) {
398e13889baSAl Viro 				struct req *next = req->next;
3993c2670e6SKay Sievers 				req->err = handle(req->name, req->mode,
4003c2670e6SKay Sievers 						  req->uid, req->gid, req->dev);
4012780f1ffSAl Viro 				complete(&req->done);
402e13889baSAl Viro 				req = next;
4032780f1ffSAl Viro 			}
4042780f1ffSAl Viro 			spin_lock(&req_lock);
4052780f1ffSAl Viro 		}
40665e6757bSKautuk Consul 		__set_current_state(TASK_INTERRUPTIBLE);
4072780f1ffSAl Viro 		spin_unlock(&req_lock);
4082780f1ffSAl Viro 		schedule();
4092780f1ffSAl Viro 	}
410bcbacc49SChristoph Hellwig }
411bcbacc49SChristoph Hellwig 
devtmpfs_setup(void * p)41201085e24SRasmus Villemoes static noinline int __init devtmpfs_setup(void *p)
413bcbacc49SChristoph Hellwig {
414bcbacc49SChristoph Hellwig 	int err;
415bcbacc49SChristoph Hellwig 
416bcbacc49SChristoph Hellwig 	err = ksys_unshare(CLONE_NEWNS);
417bcbacc49SChristoph Hellwig 	if (err)
418bcbacc49SChristoph Hellwig 		goto out;
41928f0c335SKees Cook 	err = init_mount("devtmpfs", "/", "devtmpfs", DEVTMPFS_MFLAGS, NULL);
420bcbacc49SChristoph Hellwig 	if (err)
421bcbacc49SChristoph Hellwig 		goto out;
422db63f1e3SChristoph Hellwig 	init_chdir("/.."); /* will traverse into overmounted root */
4234b7ca501SChristoph Hellwig 	init_chroot(".");
424bcbacc49SChristoph Hellwig out:
425bcbacc49SChristoph Hellwig 	*(int *)p = err;
426bcbacc49SChristoph Hellwig 	return err;
427bcbacc49SChristoph Hellwig }
428bcbacc49SChristoph Hellwig 
429bcbacc49SChristoph Hellwig /*
430bcbacc49SChristoph Hellwig  * The __ref is because devtmpfs_setup needs to be __init for the routines it
431bcbacc49SChristoph Hellwig  * calls.  That call is done while devtmpfs_init, which is marked __init,
432bcbacc49SChristoph Hellwig  * synchronously waits for it to complete.
433bcbacc49SChristoph Hellwig  */
devtmpfsd(void * p)434bcbacc49SChristoph Hellwig static int __ref devtmpfsd(void *p)
435bcbacc49SChristoph Hellwig {
436bcbacc49SChristoph Hellwig 	int err = devtmpfs_setup(p);
437bcbacc49SChristoph Hellwig 
43838f087deSRasmus Villemoes 	complete(&setup_done);
439bcbacc49SChristoph Hellwig 	if (err)
440bcbacc49SChristoph Hellwig 		return err;
441bcbacc49SChristoph Hellwig 	devtmpfs_work_loop();
4422780f1ffSAl Viro 	return 0;
4432780f1ffSAl Viro }
4442780f1ffSAl Viro 
4452b2af54aSKay Sievers /*
4462b2af54aSKay Sievers  * Create devtmpfs instance, driver-core devices will add their device
4472b2af54aSKay Sievers  * nodes here.
4482b2af54aSKay Sievers  */
devtmpfs_init(void)4492b2af54aSKay Sievers int __init devtmpfs_init(void)
4502b2af54aSKay Sievers {
451d401727eSAl Viro 	char opts[] = "mode=0755";
452d401727eSAl Viro 	int err;
453d401727eSAl Viro 
454d401727eSAl Viro 	mnt = vfs_kern_mount(&internal_fs_type, 0, "devtmpfs", opts);
455d401727eSAl Viro 	if (IS_ERR(mnt)) {
456*5cdc03c5SLonglong Xia 		pr_err("unable to create devtmpfs %ld\n", PTR_ERR(mnt));
457d401727eSAl Viro 		return PTR_ERR(mnt);
458d401727eSAl Viro 	}
459d401727eSAl Viro 	err = register_filesystem(&dev_fs_type);
4602b2af54aSKay Sievers 	if (err) {
461*5cdc03c5SLonglong Xia 		pr_err("unable to register devtmpfs type %d\n", err);
4622b2af54aSKay Sievers 		return err;
4632b2af54aSKay Sievers 	}
4642b2af54aSKay Sievers 
4652780f1ffSAl Viro 	thread = kthread_run(devtmpfsd, &err, "kdevtmpfs");
4662780f1ffSAl Viro 	if (!IS_ERR(thread)) {
4672780f1ffSAl Viro 		wait_for_completion(&setup_done);
4682780f1ffSAl Viro 	} else {
4692780f1ffSAl Viro 		err = PTR_ERR(thread);
4702780f1ffSAl Viro 		thread = NULL;
4712780f1ffSAl Viro 	}
4722780f1ffSAl Viro 
4732780f1ffSAl Viro 	if (err) {
474*5cdc03c5SLonglong Xia 		pr_err("unable to create devtmpfs %d\n", err);
4752b2af54aSKay Sievers 		unregister_filesystem(&dev_fs_type);
47631c779f2SYangxi Xiang 		thread = NULL;
4772b2af54aSKay Sievers 		return err;
4782b2af54aSKay Sievers 	}
4792b2af54aSKay Sievers 
480*5cdc03c5SLonglong Xia 	pr_info("initialized\n");
4812b2af54aSKay Sievers 	return 0;
4822b2af54aSKay Sievers }
483