Blame view
init/initramfs.c
13 KB
c67e5382f
|
1 2 3 4 5 6 7 8 9 |
/* * Many of the syscalls used in this file expect some of the arguments * to be __user pointers not __kernel pointers. To limit the sparse * noise, turn off sparse checking for this file. */ #ifdef __CHECKER__ #undef __CHECKER__ #warning "Sparse checking disabled for this file" #endif |
1da177e4c
|
10 11 12 13 14 15 16 |
#include <linux/init.h> #include <linux/fs.h> #include <linux/slab.h> #include <linux/types.h> #include <linux/fcntl.h> #include <linux/delay.h> #include <linux/string.h> |
df52092f3
|
17 |
#include <linux/dirent.h> |
1da177e4c
|
18 |
#include <linux/syscalls.h> |
889d51a10
|
19 |
#include <linux/utime.h> |
1da177e4c
|
20 21 22 23 24 25 26 |
static __initdata char *message; static void __init error(char *x) { if (!message) message = x; } |
1da177e4c
|
27 |
/* link hash */ |
6a050da45
|
28 |
#define N_ALIGN(len) ((((len) + 1) & ~3) + 2) |
1da177e4c
|
29 30 |
static __initdata struct hash { int ino, minor, major; |
685dd2d5b
|
31 |
umode_t mode; |
1da177e4c
|
32 |
struct hash *next; |
6a050da45
|
33 |
char name[N_ALIGN(PATH_MAX)]; |
1da177e4c
|
34 35 36 37 38 39 40 41 |
} *head[32]; static inline int hash(int major, int minor, int ino) { unsigned long tmp = ino + minor + (major << 3); tmp += tmp >> 5; return tmp & 31; } |
2139a7fbf
|
42 |
static char __init *find_link(int major, int minor, int ino, |
685dd2d5b
|
43 |
umode_t mode, char *name) |
1da177e4c
|
44 45 46 47 48 49 50 51 52 |
{ struct hash **p, *q; for (p = head + hash(major, minor, ino); *p; p = &(*p)->next) { if ((*p)->ino != ino) continue; if ((*p)->minor != minor) continue; if ((*p)->major != major) continue; |
2139a7fbf
|
53 54 |
if (((*p)->mode ^ mode) & S_IFMT) continue; |
1da177e4c
|
55 56 |
return (*p)->name; } |
3265e66b1
|
57 |
q = kmalloc(sizeof(struct hash), GFP_KERNEL); |
1da177e4c
|
58 59 |
if (!q) panic("can't allocate link hash entry"); |
1da177e4c
|
60 |
q->major = major; |
2139a7fbf
|
61 62 63 |
q->minor = minor; q->ino = ino; q->mode = mode; |
6a050da45
|
64 |
strcpy(q->name, name); |
1da177e4c
|
65 66 67 68 69 70 71 72 73 74 75 76 |
q->next = NULL; *p = q; return NULL; } static void __init free_hash(void) { struct hash **p, *q; for (p = head; p < head + 32; p++) { while (*p) { q = *p; *p = q->next; |
3265e66b1
|
77 |
kfree(q); |
1da177e4c
|
78 79 80 |
} } } |
c67e5382f
|
81 |
static long __init do_utime(char *filename, time_t mtime) |
889d51a10
|
82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 |
{ struct timespec t[2]; t[0].tv_sec = mtime; t[0].tv_nsec = 0; t[1].tv_sec = mtime; t[1].tv_nsec = 0; return do_utimes(AT_FDCWD, filename, t, AT_SYMLINK_NOFOLLOW); } static __initdata LIST_HEAD(dir_list); struct dir_entry { struct list_head list; char *name; time_t mtime; }; static void __init dir_add(const char *name, time_t mtime) { struct dir_entry *de = kmalloc(sizeof(struct dir_entry), GFP_KERNEL); if (!de) panic("can't allocate dir_entry buffer"); INIT_LIST_HEAD(&de->list); de->name = kstrdup(name, GFP_KERNEL); de->mtime = mtime; list_add(&de->list, &dir_list); } static void __init dir_utime(void) { struct dir_entry *de, *tmp; list_for_each_entry_safe(de, tmp, &dir_list, list) { list_del(&de->list); do_utime(de->name, de->mtime); kfree(de->name); kfree(de); } } static __initdata time_t mtime; |
1da177e4c
|
123 124 125 |
/* cpio header parsing */ static __initdata unsigned long ino, major, minor, nlink; |
685dd2d5b
|
126 |
static __initdata umode_t mode; |
1da177e4c
|
127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 |
static __initdata unsigned long body_len, name_len; static __initdata uid_t uid; static __initdata gid_t gid; static __initdata unsigned rdev; static void __init parse_header(char *s) { unsigned long parsed[12]; char buf[9]; int i; buf[8] = '\0'; for (i = 0, s += 6; i < 12; i++, s += 8) { memcpy(buf, s, 8); parsed[i] = simple_strtoul(buf, NULL, 16); } ino = parsed[0]; mode = parsed[1]; uid = parsed[2]; gid = parsed[3]; nlink = parsed[4]; |
889d51a10
|
148 |
mtime = parsed[5]; |
1da177e4c
|
149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 |
body_len = parsed[6]; major = parsed[7]; minor = parsed[8]; rdev = new_encode_dev(MKDEV(parsed[9], parsed[10])); name_len = parsed[11]; } /* FSM */ static __initdata enum state { Start, Collect, GotHeader, SkipIt, GotName, CopyFile, GotSymlink, Reset } state, next_state; static __initdata char *victim; static __initdata unsigned count; static __initdata loff_t this_header, next_header; |
b0a5ab931
|
172 |
static inline void __init eat(unsigned n) |
1da177e4c
|
173 174 175 176 177 |
{ victim += n; this_header += n; count -= n; } |
889d51a10
|
178 |
static __initdata char *vcollected; |
1da177e4c
|
179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 |
static __initdata char *collected; static __initdata int remains; static __initdata char *collect; static void __init read_into(char *buf, unsigned size, enum state next) { if (count >= size) { collected = victim; eat(size); state = next; } else { collect = collected = buf; remains = size; next_state = next; state = Collect; } } static __initdata char *header_buf, *symlink_buf, *name_buf; static int __init do_start(void) { read_into(header_buf, 110, GotHeader); return 0; } static int __init do_collect(void) { unsigned n = remains; if (count < n) n = count; memcpy(collect, victim, n); eat(n); collect += n; if ((remains -= n) != 0) return 1; state = next_state; return 0; } static int __init do_header(void) { |
2e591bbc0
|
221 222 223 224 |
if (memcmp(collected, "070707", 6)==0) { error("incorrect cpio method used: use -H newc option"); return 1; } |
1da177e4c
|
225 226 227 228 229 230 231 |
if (memcmp(collected, "070701", 6)) { error("no cpio magic"); return 1; } parse_header(collected); next_header = this_header + N_ALIGN(name_len) + body_len; next_header = (next_header + 3) & ~3; |
1da177e4c
|
232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 |
state = SkipIt; if (name_len <= 0 || name_len > PATH_MAX) return 0; if (S_ISLNK(mode)) { if (body_len > PATH_MAX) return 0; collect = collected = symlink_buf; remains = N_ALIGN(name_len) + body_len; next_state = GotSymlink; state = Collect; return 0; } if (S_ISREG(mode) || !body_len) read_into(name_buf, N_ALIGN(name_len), GotName); return 0; } static int __init do_skip(void) { if (this_header + count < next_header) { eat(count); return 1; } else { eat(next_header - this_header); state = next_state; return 0; } } static int __init do_reset(void) { while(count && *victim == '\0') eat(1); if (count && (this_header & 3)) error("broken padding"); return 1; } static int __init maybe_link(void) { if (nlink >= 2) { |
2139a7fbf
|
273 |
char *old = find_link(major, minor, ino, mode, collected); |
1da177e4c
|
274 275 276 277 278 |
if (old) return (sys_link(old, collected) < 0) ? -1 : 1; } return 0; } |
685dd2d5b
|
279 |
static void __init clean_path(char *path, umode_t mode) |
2139a7fbf
|
280 281 282 283 284 285 286 287 288 289 |
{ struct stat st; if (!sys_newlstat(path, &st) && (st.st_mode^mode) & S_IFMT) { if (S_ISDIR(st.st_mode)) sys_rmdir(path); else sys_unlink(path); } } |
1da177e4c
|
290 291 292 293 294 295 296 297 298 299 |
static __initdata int wfd; static int __init do_name(void) { state = SkipIt; next_state = Reset; if (strcmp(collected, "TRAILER!!!") == 0) { free_hash(); return 0; } |
2139a7fbf
|
300 |
clean_path(collected, mode); |
1da177e4c
|
301 |
if (S_ISREG(mode)) { |
2139a7fbf
|
302 303 304 305 306 307 |
int ml = maybe_link(); if (ml >= 0) { int openflags = O_WRONLY|O_CREAT; if (ml != 1) openflags |= O_TRUNC; wfd = sys_open(collected, openflags, mode); |
1da177e4c
|
308 309 310 |
if (wfd >= 0) { sys_fchown(wfd, uid, gid); sys_fchmod(wfd, mode); |
d20d5a745
|
311 312 |
if (body_len) sys_ftruncate(wfd, body_len); |
889d51a10
|
313 |
vcollected = kstrdup(collected, GFP_KERNEL); |
1da177e4c
|
314 315 316 317 318 319 320 |
state = CopyFile; } } } else if (S_ISDIR(mode)) { sys_mkdir(collected, mode); sys_chown(collected, uid, gid); sys_chmod(collected, mode); |
889d51a10
|
321 |
dir_add(collected, mtime); |
1da177e4c
|
322 323 324 325 326 327 |
} else if (S_ISBLK(mode) || S_ISCHR(mode) || S_ISFIFO(mode) || S_ISSOCK(mode)) { if (maybe_link() == 0) { sys_mknod(collected, mode, rdev); sys_chown(collected, uid, gid); sys_chmod(collected, mode); |
889d51a10
|
328 |
do_utime(collected, mtime); |
1da177e4c
|
329 330 331 332 333 334 335 336 337 338 |
} } return 0; } static int __init do_copy(void) { if (count >= body_len) { sys_write(wfd, victim, body_len); sys_close(wfd); |
889d51a10
|
339 340 |
do_utime(vcollected, mtime); kfree(vcollected); |
1da177e4c
|
341 342 343 344 345 346 347 348 349 350 351 352 353 354 |
eat(body_len); state = SkipIt; return 0; } else { sys_write(wfd, victim, count); body_len -= count; eat(count); return 1; } } static int __init do_symlink(void) { collected[N_ALIGN(name_len) + body_len] = '\0'; |
2139a7fbf
|
355 |
clean_path(collected, 0); |
1da177e4c
|
356 357 |
sys_symlink(collected + N_ALIGN(name_len), collected); sys_lchown(collected, uid, gid); |
889d51a10
|
358 |
do_utime(collected, mtime); |
1da177e4c
|
359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 |
state = SkipIt; next_state = Reset; return 0; } static __initdata int (*actions[])(void) = { [Start] = do_start, [Collect] = do_collect, [GotHeader] = do_header, [SkipIt] = do_skip, [GotName] = do_name, [CopyFile] = do_copy, [GotSymlink] = do_symlink, [Reset] = do_reset, }; static int __init write_buffer(char *buf, unsigned len) { count = len; victim = buf; while (!actions[state]()) ; return len - count; } |
30d65dbfe
|
384 |
static int __init flush_buffer(void *bufv, unsigned len) |
1da177e4c
|
385 |
{ |
30d65dbfe
|
386 |
char *buf = (char *) bufv; |
1da177e4c
|
387 |
int written; |
30d65dbfe
|
388 |
int origLen = len; |
1da177e4c
|
389 |
if (message) |
30d65dbfe
|
390 |
return -1; |
1da177e4c
|
391 392 393 394 395 396 397 398 399 400 401 402 403 |
while ((written = write_buffer(buf, len)) < len && !message) { char c = buf[written]; if (c == '0') { buf += written; len -= written; state = Start; } else if (c == 0) { buf += written; len -= written; state = Reset; } else error("junk in compressed archive"); } |
30d65dbfe
|
404 |
return origLen; |
1da177e4c
|
405 |
} |
30d65dbfe
|
406 |
static unsigned my_inptr; /* index of next byte to be processed in inbuf */ |
1da177e4c
|
407 |
|
889c92d21
|
408 |
#include <linux/decompress/generic.h> |
1da177e4c
|
409 |
|
df52092f3
|
410 |
static char * __init unpack_to_rootfs(char *buf, unsigned len) |
1da177e4c
|
411 |
{ |
54291362d
|
412 |
int written, res; |
889c92d21
|
413 |
decompress_fn decompress; |
23a22d57a
|
414 415 |
const char *compress_name; static __initdata char msg_buf[64]; |
889c92d21
|
416 |
|
3265e66b1
|
417 418 419 |
header_buf = kmalloc(110, GFP_KERNEL); symlink_buf = kmalloc(PATH_MAX + N_ALIGN(PATH_MAX) + 1, GFP_KERNEL); name_buf = kmalloc(N_ALIGN(PATH_MAX), GFP_KERNEL); |
30d65dbfe
|
420 421 |
if (!header_buf || !symlink_buf || !name_buf) |
1da177e4c
|
422 |
panic("can't allocate buffers"); |
30d65dbfe
|
423 |
|
1da177e4c
|
424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 |
state = Start; this_header = 0; message = NULL; while (!message && len) { loff_t saved_offset = this_header; if (*buf == '0' && !(this_header & 3)) { state = Start; written = write_buffer(buf, len); buf += written; len -= written; continue; } if (!*buf) { buf++; len--; this_header++; continue; } this_header = 0; |
23a22d57a
|
443 |
decompress = decompress_method(buf, len, &compress_name); |
54291362d
|
444 445 |
if (decompress) { res = decompress(buf, len, NULL, flush_buffer, NULL, |
889c92d21
|
446 |
&my_inptr, error); |
54291362d
|
447 448 449 |
if (res) error("decompressor failed"); } else if (compress_name) { |
23a22d57a
|
450 451 452 453 454 455 |
if (!message) { snprintf(msg_buf, sizeof msg_buf, "compression method %s not configured", compress_name); message = msg_buf; } |
df37bd156
|
456 457 |
} else error("junk in compressed archive"); |
1da177e4c
|
458 |
if (state != Reset) |
30d65dbfe
|
459 460 461 462 |
error("junk in compressed archive"); this_header = saved_offset + my_inptr; buf += my_inptr; len -= my_inptr; |
1da177e4c
|
463 |
} |
889d51a10
|
464 |
dir_utime(); |
3265e66b1
|
465 466 467 |
kfree(name_buf); kfree(symlink_buf); kfree(header_buf); |
1da177e4c
|
468 469 |
return message; } |
0a7b35cb1
|
470 471 472 473 474 475 476 477 478 479 |
static int __initdata do_retain_initrd; static int __init retain_initrd_param(char *str) { if (*str) return 0; do_retain_initrd = 1; return 1; } __setup("retain_initrd", retain_initrd_param); |
ffe8018c3
|
480 481 |
extern char __initramfs_start[]; extern unsigned long __initramfs_size; |
1da177e4c
|
482 |
#include <linux/initrd.h> |
9c15e852a
|
483 |
#include <linux/kexec.h> |
0f3d2bd54
|
484 485 486 |
static void __init free_initrd(void) { |
9c15e852a
|
487 488 489 |
#ifdef CONFIG_KEXEC unsigned long crashk_start = (unsigned long)__va(crashk_res.start); unsigned long crashk_end = (unsigned long)__va(crashk_res.end); |
0a7b35cb1
|
490 491 492 |
#endif if (do_retain_initrd) goto skip; |
9c15e852a
|
493 |
|
0a7b35cb1
|
494 |
#ifdef CONFIG_KEXEC |
9c15e852a
|
495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 |
/* * If the initrd region is overlapped with crashkernel reserved region, * free only memory that is not part of crashkernel region. */ if (initrd_start < crashk_end && initrd_end > crashk_start) { /* * Initialize initrd memory region since the kexec boot does * not do. */ memset((void *)initrd_start, 0, initrd_end - initrd_start); if (initrd_start < crashk_start) free_initrd_mem(initrd_start, crashk_start); if (initrd_end > crashk_end) free_initrd_mem(crashk_end, initrd_end); } else #endif free_initrd_mem(initrd_start, initrd_end); |
0a7b35cb1
|
512 |
skip: |
0f3d2bd54
|
513 514 515 |
initrd_start = 0; initrd_end = 0; } |
b52bb3712
|
516 |
#ifdef CONFIG_BLK_DEV_RAM |
df52092f3
|
517 518 519 520 521 522 |
#define BUF_SIZE 1024 static void __init clean_rootfs(void) { int fd; void *buf; struct linux_dirent64 *dirp; |
8aaed5bec
|
523 |
int num; |
df52092f3
|
524 |
|
c67e5382f
|
525 |
fd = sys_open("/", O_RDONLY, 0); |
df52092f3
|
526 527 528 529 530 531 532 533 534 535 536 |
WARN_ON(fd < 0); if (fd < 0) return; buf = kzalloc(BUF_SIZE, GFP_KERNEL); WARN_ON(!buf); if (!buf) { sys_close(fd); return; } dirp = buf; |
8aaed5bec
|
537 538 539 |
num = sys_getdents64(fd, dirp, BUF_SIZE); while (num > 0) { while (num > 0) { |
df52092f3
|
540 541 542 543 544 545 546 547 548 549 550 |
struct stat st; int ret; ret = sys_newlstat(dirp->d_name, &st); WARN_ON_ONCE(ret); if (!ret) { if (S_ISDIR(st.st_mode)) sys_rmdir(dirp->d_name); else sys_unlink(dirp->d_name); } |
8aaed5bec
|
551 |
num -= dirp->d_reclen; |
df52092f3
|
552 553 554 555 |
dirp = (void *)dirp + dirp->d_reclen; } dirp = buf; memset(buf, 0, BUF_SIZE); |
8aaed5bec
|
556 |
num = sys_getdents64(fd, dirp, BUF_SIZE); |
df52092f3
|
557 558 559 560 561 |
} sys_close(fd); kfree(buf); } |
b52bb3712
|
562 |
#endif |
df52092f3
|
563 |
|
9a9e0d685
|
564 |
static int __init populate_rootfs(void) |
1da177e4c
|
565 |
{ |
ffe8018c3
|
566 |
char *err = unpack_to_rootfs(__initramfs_start, __initramfs_size); |
1da177e4c
|
567 |
if (err) |
73310a169
|
568 |
panic(err); /* Failed to decompress INTERNAL initramfs */ |
1da177e4c
|
569 |
if (initrd_start) { |
340e48e66
|
570 |
#ifdef CONFIG_BLK_DEV_RAM |
1da177e4c
|
571 |
int fd; |
a1e6b6c1a
|
572 573 |
printk(KERN_INFO "Trying to unpack rootfs image as initramfs... "); |
1da177e4c
|
574 |
err = unpack_to_rootfs((char *)initrd_start, |
df52092f3
|
575 |
initrd_end - initrd_start); |
1da177e4c
|
576 |
if (!err) { |
0f3d2bd54
|
577 |
free_initrd(); |
bb813f4c9
|
578 |
goto done; |
df52092f3
|
579 580 |
} else { clean_rootfs(); |
ffe8018c3
|
581 |
unpack_to_rootfs(__initramfs_start, __initramfs_size); |
1da177e4c
|
582 |
} |
c1c490e01
|
583 584 585 |
printk(KERN_INFO "rootfs image is not initramfs (%s)" "; looks like an initrd ", err); |
c67e5382f
|
586 |
fd = sys_open("/initrd.image", |
562f5e638
|
587 |
O_WRONLY|O_CREAT, 0700); |
1da177e4c
|
588 589 590 591 |
if (fd >= 0) { sys_write(fd, (char *)initrd_start, initrd_end - initrd_start); sys_close(fd); |
0f3d2bd54
|
592 |
free_initrd(); |
1da177e4c
|
593 |
} |
bb813f4c9
|
594 |
done: |
340e48e66
|
595 |
#else |
a1e6b6c1a
|
596 597 |
printk(KERN_INFO "Unpacking initramfs... "); |
340e48e66
|
598 |
err = unpack_to_rootfs((char *)initrd_start, |
df52092f3
|
599 |
initrd_end - initrd_start); |
a1e6b6c1a
|
600 601 602 |
if (err) printk(KERN_EMERG "Initramfs unpacking failed: %s ", err); |
340e48e66
|
603 604 |
free_initrd(); #endif |
bb813f4c9
|
605 606 607 608 609 |
/* * Try loading default modules from initramfs. This gives * us a chance to load before device_initcalls. */ load_default_modules(); |
1da177e4c
|
610 |
} |
8d610dd52
|
611 |
return 0; |
1da177e4c
|
612 |
} |
8d610dd52
|
613 |
rootfs_initcall(populate_rootfs); |