1 /* SPDX-License-Identifier: GPL-2.0 */
3 #include <linux/compiler_types.h>
4 #include <linux/errno.h>
6 #include <linux/fsnotify.h>
9 #include <linux/init.h>
10 #include <linux/ipc_namespace.h>
11 #include <linux/kdev_t.h>
12 #include <linux/kernel.h>
13 #include <linux/list.h>
14 #include <linux/namei.h>
15 #include <linux/magic.h>
16 #include <linux/major.h>
17 #include <linux/miscdevice.h>
18 #include <linux/module.h>
19 #include <linux/mutex.h>
20 #include <linux/mount.h>
21 #include <linux/parser.h>
22 #include <linux/radix-tree.h>
23 #include <linux/sched.h>
24 #include <linux/seq_file.h>
25 #include <linux/slab.h>
26 #include <linux/spinlock_types.h>
27 #include <linux/stddef.h>
28 #include <linux/string.h>
29 #include <linux/types.h>
30 #include <linux/uaccess.h>
31 #include <linux/user_namespace.h>
32 #include <linux/xarray.h>
33 #include <uapi/asm-generic/errno-base.h>
34 #include <uapi/linux/android/binder.h>
35 #include <uapi/linux/android/binderfs.h>
37 #include "binder_internal.h"
40 #define SECOND_INODE 2
41 #define INODE_OFFSET 3
43 #define BINDERFS_MAX_MINOR (1U << MINORBITS)
44 /* Ensure that the initial ipc namespace always has devices available. */
45 #define BINDERFS_MAX_MINOR_CAPPED (BINDERFS_MAX_MINOR - 4)
47 static dev_t binderfs_dev
;
48 static DEFINE_MUTEX(binderfs_minors_mutex
);
49 static DEFINE_IDA(binderfs_minors
);
57 enum binderfs_stats_mode
{
62 static const match_table_t tokens
= {
63 { Opt_max
, "max=%d" },
64 { Opt_stats_mode
, "stats=%s" },
68 static inline struct binderfs_info
*BINDERFS_I(const struct inode
*inode
)
70 return inode
->i_sb
->s_fs_info
;
73 bool is_binderfs_device(const struct inode
*inode
)
75 if (inode
->i_sb
->s_magic
== BINDERFS_SUPER_MAGIC
)
82 * binderfs_binder_device_create - allocate inode from super block of a
84 * @ref_inode: inode from wich the super block will be taken
85 * @userp: buffer to copy information about new device for userspace to
86 * @req: struct binderfs_device as copied from userspace
88 * This function allocates a new binder_device and reserves a new minor
90 * Minor numbers are limited and tracked globally in binderfs_minors. The
91 * function will stash a struct binder_device for the specific binder
92 * device in i_private of the inode.
93 * It will go on to allocate a new inode from the super block of the
94 * filesystem mount, stash a struct binder_device in its i_private field
95 * and attach a dentry to that inode.
97 * Return: 0 on success, negative errno on failure
99 static int binderfs_binder_device_create(struct inode
*ref_inode
,
100 struct binderfs_device __user
*userp
,
101 struct binderfs_device
*req
)
104 struct dentry
*dentry
, *root
;
105 struct binder_device
*device
;
108 struct inode
*inode
= NULL
;
109 struct super_block
*sb
= ref_inode
->i_sb
;
110 struct binderfs_info
*info
= sb
->s_fs_info
;
111 #if defined(CONFIG_IPC_NS)
112 bool use_reserve
= (info
->ipc_ns
== &init_ipc_ns
);
114 bool use_reserve
= true;
117 /* Reserve new minor number for the new device. */
118 mutex_lock(&binderfs_minors_mutex
);
119 if (++info
->device_count
<= info
->mount_opts
.max
)
120 minor
= ida_alloc_max(&binderfs_minors
,
121 use_reserve
? BINDERFS_MAX_MINOR
:
122 BINDERFS_MAX_MINOR_CAPPED
,
127 --info
->device_count
;
128 mutex_unlock(&binderfs_minors_mutex
);
131 mutex_unlock(&binderfs_minors_mutex
);
134 device
= kzalloc(sizeof(*device
), GFP_KERNEL
);
138 inode
= new_inode(sb
);
142 inode
->i_ino
= minor
+ INODE_OFFSET
;
143 inode
->i_mtime
= inode
->i_atime
= inode
->i_ctime
= current_time(inode
);
144 init_special_inode(inode
, S_IFCHR
| 0600,
145 MKDEV(MAJOR(binderfs_dev
), minor
));
146 inode
->i_fop
= &binder_fops
;
147 inode
->i_uid
= info
->root_uid
;
148 inode
->i_gid
= info
->root_gid
;
150 req
->name
[BINDERFS_MAX_NAME
] = '\0'; /* NUL-terminate */
151 name_len
= strlen(req
->name
);
152 /* Make sure to include terminating NUL byte */
153 name
= kmemdup(req
->name
, name_len
+ 1, GFP_KERNEL
);
157 device
->binderfs_inode
= inode
;
158 device
->context
.binder_context_mgr_uid
= INVALID_UID
;
159 device
->context
.name
= name
;
160 device
->miscdev
.name
= name
;
161 device
->miscdev
.minor
= minor
;
162 mutex_init(&device
->context
.context_mgr_node_lock
);
164 req
->major
= MAJOR(binderfs_dev
);
167 if (userp
&& copy_to_user(userp
, req
, sizeof(*req
))) {
173 inode_lock(d_inode(root
));
176 dentry
= lookup_one_len(name
, root
, name_len
);
177 if (IS_ERR(dentry
)) {
178 inode_unlock(d_inode(root
));
179 ret
= PTR_ERR(dentry
);
183 if (d_really_is_positive(dentry
)) {
186 inode_unlock(d_inode(root
));
191 inode
->i_private
= device
;
192 d_instantiate(dentry
, inode
);
193 fsnotify_create(root
->d_inode
, dentry
);
194 inode_unlock(d_inode(root
));
201 mutex_lock(&binderfs_minors_mutex
);
202 --info
->device_count
;
203 ida_free(&binderfs_minors
, minor
);
204 mutex_unlock(&binderfs_minors_mutex
);
211 * binderfs_ctl_ioctl - handle binder device node allocation requests
213 * The request handler for the binder-control device. All requests operate on
214 * the binderfs mount the binder-control device resides in:
216 * Allocate a new binder device.
218 * Return: 0 on success, negative errno on failure
220 static long binder_ctl_ioctl(struct file
*file
, unsigned int cmd
,
224 struct inode
*inode
= file_inode(file
);
225 struct binderfs_device __user
*device
= (struct binderfs_device __user
*)arg
;
226 struct binderfs_device device_req
;
230 ret
= copy_from_user(&device_req
, device
, sizeof(device_req
));
236 ret
= binderfs_binder_device_create(inode
, device
, &device_req
);
245 static void binderfs_evict_inode(struct inode
*inode
)
247 struct binder_device
*device
= inode
->i_private
;
248 struct binderfs_info
*info
= BINDERFS_I(inode
);
252 if (!S_ISCHR(inode
->i_mode
) || !device
)
255 mutex_lock(&binderfs_minors_mutex
);
256 --info
->device_count
;
257 ida_free(&binderfs_minors
, device
->miscdev
.minor
);
258 mutex_unlock(&binderfs_minors_mutex
);
260 kfree(device
->context
.name
);
265 * binderfs_parse_mount_opts - parse binderfs mount options
266 * @data: options to set (can be NULL in which case defaults are used)
268 static int binderfs_parse_mount_opts(char *data
,
269 struct binderfs_mount_opts
*opts
)
272 opts
->max
= BINDERFS_MAX_MINOR
;
273 opts
->stats_mode
= STATS_NONE
;
275 while ((p
= strsep(&data
, ",")) != NULL
) {
276 substring_t args
[MAX_OPT_ARGS
];
283 token
= match_token(p
, tokens
, args
);
286 if (match_int(&args
[0], &max_devices
) ||
288 (max_devices
> BINDERFS_MAX_MINOR
)))
291 opts
->max
= max_devices
;
294 if (!capable(CAP_SYS_ADMIN
))
297 stats
= match_strdup(&args
[0]);
301 if (strcmp(stats
, "global") != 0) {
306 opts
->stats_mode
= STATS_GLOBAL
;
310 pr_err("Invalid mount options\n");
318 static int binderfs_remount(struct super_block
*sb
, int *flags
, char *data
)
320 int prev_stats_mode
, ret
;
321 struct binderfs_info
*info
= sb
->s_fs_info
;
323 prev_stats_mode
= info
->mount_opts
.stats_mode
;
324 ret
= binderfs_parse_mount_opts(data
, &info
->mount_opts
);
328 if (prev_stats_mode
!= info
->mount_opts
.stats_mode
) {
329 pr_err("Binderfs stats mode cannot be changed during a remount\n");
330 info
->mount_opts
.stats_mode
= prev_stats_mode
;
337 static int binderfs_show_mount_opts(struct seq_file
*seq
, struct dentry
*root
)
339 struct binderfs_info
*info
;
341 info
= root
->d_sb
->s_fs_info
;
342 if (info
->mount_opts
.max
<= BINDERFS_MAX_MINOR
)
343 seq_printf(seq
, ",max=%d", info
->mount_opts
.max
);
344 if (info
->mount_opts
.stats_mode
== STATS_GLOBAL
)
345 seq_printf(seq
, ",stats=global");
350 static const struct super_operations binderfs_super_ops
= {
351 .evict_inode
= binderfs_evict_inode
,
352 .remount_fs
= binderfs_remount
,
353 .show_options
= binderfs_show_mount_opts
,
354 .statfs
= simple_statfs
,
357 static inline bool is_binderfs_control_device(const struct dentry
*dentry
)
359 struct binderfs_info
*info
= dentry
->d_sb
->s_fs_info
;
360 return info
->control_dentry
== dentry
;
363 static int binderfs_rename(struct inode
*old_dir
, struct dentry
*old_dentry
,
364 struct inode
*new_dir
, struct dentry
*new_dentry
,
367 if (is_binderfs_control_device(old_dentry
) ||
368 is_binderfs_control_device(new_dentry
))
371 return simple_rename(old_dir
, old_dentry
, new_dir
, new_dentry
, flags
);
374 static int binderfs_unlink(struct inode
*dir
, struct dentry
*dentry
)
376 if (is_binderfs_control_device(dentry
))
379 return simple_unlink(dir
, dentry
);
382 static const struct file_operations binder_ctl_fops
= {
383 .owner
= THIS_MODULE
,
384 .open
= nonseekable_open
,
385 .unlocked_ioctl
= binder_ctl_ioctl
,
386 .compat_ioctl
= binder_ctl_ioctl
,
387 .llseek
= noop_llseek
,
391 * binderfs_binder_ctl_create - create a new binder-control device
392 * @sb: super block of the binderfs mount
394 * This function creates a new binder-control device node in the binderfs mount
395 * referred to by @sb.
397 * Return: 0 on success, negative errno on failure
399 static int binderfs_binder_ctl_create(struct super_block
*sb
)
402 struct dentry
*dentry
;
403 struct binder_device
*device
;
404 struct inode
*inode
= NULL
;
405 struct dentry
*root
= sb
->s_root
;
406 struct binderfs_info
*info
= sb
->s_fs_info
;
407 #if defined(CONFIG_IPC_NS)
408 bool use_reserve
= (info
->ipc_ns
== &init_ipc_ns
);
410 bool use_reserve
= true;
413 device
= kzalloc(sizeof(*device
), GFP_KERNEL
);
417 /* If we have already created a binder-control node, return. */
418 if (info
->control_dentry
) {
424 inode
= new_inode(sb
);
428 /* Reserve a new minor number for the new device. */
429 mutex_lock(&binderfs_minors_mutex
);
430 minor
= ida_alloc_max(&binderfs_minors
,
431 use_reserve
? BINDERFS_MAX_MINOR
:
432 BINDERFS_MAX_MINOR_CAPPED
,
434 mutex_unlock(&binderfs_minors_mutex
);
440 inode
->i_ino
= SECOND_INODE
;
441 inode
->i_mtime
= inode
->i_atime
= inode
->i_ctime
= current_time(inode
);
442 init_special_inode(inode
, S_IFCHR
| 0600,
443 MKDEV(MAJOR(binderfs_dev
), minor
));
444 inode
->i_fop
= &binder_ctl_fops
;
445 inode
->i_uid
= info
->root_uid
;
446 inode
->i_gid
= info
->root_gid
;
448 device
->binderfs_inode
= inode
;
449 device
->miscdev
.minor
= minor
;
451 dentry
= d_alloc_name(root
, "binder-control");
455 inode
->i_private
= device
;
456 info
->control_dentry
= dentry
;
457 d_add(dentry
, inode
);
468 static const struct inode_operations binderfs_dir_inode_operations
= {
469 .lookup
= simple_lookup
,
470 .rename
= binderfs_rename
,
471 .unlink
= binderfs_unlink
,
474 static struct inode
*binderfs_make_inode(struct super_block
*sb
, int mode
)
480 ret
->i_ino
= iunique(sb
, BINDERFS_MAX_MINOR
+ INODE_OFFSET
);
482 ret
->i_atime
= ret
->i_mtime
= ret
->i_ctime
= current_time(ret
);
487 static struct dentry
*binderfs_create_dentry(struct dentry
*parent
,
490 struct dentry
*dentry
;
492 dentry
= lookup_one_len(name
, parent
, strlen(name
));
496 /* Return error if the file/dir already exists. */
497 if (d_really_is_positive(dentry
)) {
499 return ERR_PTR(-EEXIST
);
505 void binderfs_remove_file(struct dentry
*dentry
)
507 struct inode
*parent_inode
;
509 parent_inode
= d_inode(dentry
->d_parent
);
510 inode_lock(parent_inode
);
511 if (simple_positive(dentry
)) {
513 simple_unlink(parent_inode
, dentry
);
517 inode_unlock(parent_inode
);
520 struct dentry
*binderfs_create_file(struct dentry
*parent
, const char *name
,
521 const struct file_operations
*fops
,
524 struct dentry
*dentry
;
525 struct inode
*new_inode
, *parent_inode
;
526 struct super_block
*sb
;
528 parent_inode
= d_inode(parent
);
529 inode_lock(parent_inode
);
531 dentry
= binderfs_create_dentry(parent
, name
);
535 sb
= parent_inode
->i_sb
;
536 new_inode
= binderfs_make_inode(sb
, S_IFREG
| 0444);
539 dentry
= ERR_PTR(-ENOMEM
);
543 new_inode
->i_fop
= fops
;
544 new_inode
->i_private
= data
;
545 d_instantiate(dentry
, new_inode
);
546 fsnotify_create(parent_inode
, dentry
);
549 inode_unlock(parent_inode
);
553 static struct dentry
*binderfs_create_dir(struct dentry
*parent
,
556 struct dentry
*dentry
;
557 struct inode
*new_inode
, *parent_inode
;
558 struct super_block
*sb
;
560 parent_inode
= d_inode(parent
);
561 inode_lock(parent_inode
);
563 dentry
= binderfs_create_dentry(parent
, name
);
567 sb
= parent_inode
->i_sb
;
568 new_inode
= binderfs_make_inode(sb
, S_IFDIR
| 0755);
571 dentry
= ERR_PTR(-ENOMEM
);
575 new_inode
->i_fop
= &simple_dir_operations
;
576 new_inode
->i_op
= &simple_dir_inode_operations
;
578 set_nlink(new_inode
, 2);
579 d_instantiate(dentry
, new_inode
);
580 inc_nlink(parent_inode
);
581 fsnotify_mkdir(parent_inode
, dentry
);
584 inode_unlock(parent_inode
);
588 static int init_binder_logs(struct super_block
*sb
)
590 struct dentry
*binder_logs_root_dir
, *dentry
, *proc_log_dir
;
591 struct binderfs_info
*info
;
594 binder_logs_root_dir
= binderfs_create_dir(sb
->s_root
,
596 if (IS_ERR(binder_logs_root_dir
)) {
597 ret
= PTR_ERR(binder_logs_root_dir
);
601 dentry
= binderfs_create_file(binder_logs_root_dir
, "stats",
602 &binder_stats_fops
, NULL
);
603 if (IS_ERR(dentry
)) {
604 ret
= PTR_ERR(dentry
);
608 dentry
= binderfs_create_file(binder_logs_root_dir
, "state",
609 &binder_state_fops
, NULL
);
610 if (IS_ERR(dentry
)) {
611 ret
= PTR_ERR(dentry
);
615 dentry
= binderfs_create_file(binder_logs_root_dir
, "transactions",
616 &binder_transactions_fops
, NULL
);
617 if (IS_ERR(dentry
)) {
618 ret
= PTR_ERR(dentry
);
622 dentry
= binderfs_create_file(binder_logs_root_dir
,
624 &binder_transaction_log_fops
,
625 &binder_transaction_log
);
626 if (IS_ERR(dentry
)) {
627 ret
= PTR_ERR(dentry
);
631 dentry
= binderfs_create_file(binder_logs_root_dir
,
632 "failed_transaction_log",
633 &binder_transaction_log_fops
,
634 &binder_transaction_log_failed
);
635 if (IS_ERR(dentry
)) {
636 ret
= PTR_ERR(dentry
);
640 proc_log_dir
= binderfs_create_dir(binder_logs_root_dir
, "proc");
641 if (IS_ERR(proc_log_dir
)) {
642 ret
= PTR_ERR(proc_log_dir
);
645 info
= sb
->s_fs_info
;
646 info
->proc_log_dir
= proc_log_dir
;
652 static int binderfs_fill_super(struct super_block
*sb
, void *data
, int silent
)
655 struct binderfs_info
*info
;
656 struct inode
*inode
= NULL
;
657 struct binderfs_device device_info
= { 0 };
661 sb
->s_blocksize
= PAGE_SIZE
;
662 sb
->s_blocksize_bits
= PAGE_SHIFT
;
665 * The binderfs filesystem can be mounted by userns root in a
666 * non-initial userns. By default such mounts have the SB_I_NODEV flag
667 * set in s_iflags to prevent security issues where userns root can
668 * just create random device nodes via mknod() since it owns the
669 * filesystem mount. But binderfs does not allow to create any files
670 * including devices nodes. The only way to create binder devices nodes
671 * is through the binder-control device which userns root is explicitly
672 * allowed to do. So removing the SB_I_NODEV flag from s_iflags is both
673 * necessary and safe.
675 sb
->s_iflags
&= ~SB_I_NODEV
;
676 sb
->s_iflags
|= SB_I_NOEXEC
;
677 sb
->s_magic
= BINDERFS_SUPER_MAGIC
;
678 sb
->s_op
= &binderfs_super_ops
;
681 sb
->s_fs_info
= kzalloc(sizeof(struct binderfs_info
), GFP_KERNEL
);
684 info
= sb
->s_fs_info
;
686 info
->ipc_ns
= get_ipc_ns(current
->nsproxy
->ipc_ns
);
688 ret
= binderfs_parse_mount_opts(data
, &info
->mount_opts
);
692 info
->root_gid
= make_kgid(sb
->s_user_ns
, 0);
693 if (!gid_valid(info
->root_gid
))
694 info
->root_gid
= GLOBAL_ROOT_GID
;
695 info
->root_uid
= make_kuid(sb
->s_user_ns
, 0);
696 if (!uid_valid(info
->root_uid
))
697 info
->root_uid
= GLOBAL_ROOT_UID
;
699 inode
= new_inode(sb
);
703 inode
->i_ino
= FIRST_INODE
;
704 inode
->i_fop
= &simple_dir_operations
;
705 inode
->i_mode
= S_IFDIR
| 0755;
706 inode
->i_mtime
= inode
->i_atime
= inode
->i_ctime
= current_time(inode
);
707 inode
->i_op
= &binderfs_dir_inode_operations
;
710 sb
->s_root
= d_make_root(inode
);
714 ret
= binderfs_binder_ctl_create(sb
);
718 name
= binder_devices_param
;
719 for (len
= strcspn(name
, ","); len
> 0; len
= strcspn(name
, ",")) {
720 strscpy(device_info
.name
, name
, len
+ 1);
721 ret
= binderfs_binder_device_create(inode
, NULL
, &device_info
);
729 if (info
->mount_opts
.stats_mode
== STATS_GLOBAL
)
730 return init_binder_logs(sb
);
735 static struct dentry
*binderfs_mount(struct file_system_type
*fs_type
,
736 int flags
, const char *dev_name
,
739 return mount_nodev(fs_type
, flags
, data
, binderfs_fill_super
);
742 static void binderfs_kill_super(struct super_block
*sb
)
744 struct binderfs_info
*info
= sb
->s_fs_info
;
746 kill_litter_super(sb
);
748 if (info
&& info
->ipc_ns
)
749 put_ipc_ns(info
->ipc_ns
);
754 static struct file_system_type binder_fs_type
= {
756 .mount
= binderfs_mount
,
757 .kill_sb
= binderfs_kill_super
,
758 .fs_flags
= FS_USERNS_MOUNT
,
761 int __init
init_binderfs(void)
767 /* Verify that the default binderfs device names are valid. */
768 name
= binder_devices_param
;
769 for (len
= strcspn(name
, ","); len
> 0; len
= strcspn(name
, ",")) {
770 if (len
> BINDERFS_MAX_NAME
)
777 /* Allocate new major number for binderfs. */
778 ret
= alloc_chrdev_region(&binderfs_dev
, 0, BINDERFS_MAX_MINOR
,
783 ret
= register_filesystem(&binder_fs_type
);
785 unregister_chrdev_region(binderfs_dev
, BINDERFS_MAX_MINOR
);