c05564c4d8
Android 13
883 lines
22 KiB
C
Executable file
883 lines
22 KiB
C
Executable file
/*
|
|
* fs/sdcardfs/packagelist.c
|
|
*
|
|
* Copyright (c) 2013 Samsung Electronics Co. Ltd
|
|
* Authors: Daeho Jeong, Woojoong Lee, Seunghwan Hyun,
|
|
* Sunghwan Yun, Sungjong Seo
|
|
*
|
|
* This program has been developed as a stackable file system based on
|
|
* the WrapFS which written by
|
|
*
|
|
* Copyright (c) 1998-2011 Erez Zadok
|
|
* Copyright (c) 2009 Shrikar Archak
|
|
* Copyright (c) 2003-2011 Stony Brook University
|
|
* Copyright (c) 2003-2011 The Research Foundation of SUNY
|
|
*
|
|
* This file is dual licensed. It may be redistributed and/or modified
|
|
* under the terms of the Apache 2.0 License OR version 2 of the GNU
|
|
* General Public License.
|
|
*/
|
|
|
|
#include "sdcardfs.h"
|
|
#include <linux/hashtable.h>
|
|
#include <linux/ctype.h>
|
|
#include <linux/delay.h>
|
|
#include <linux/radix-tree.h>
|
|
#include <linux/dcache.h>
|
|
|
|
#include <linux/init.h>
|
|
#include <linux/module.h>
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/configfs.h>
|
|
|
|
struct hashtable_entry {
|
|
struct hlist_node hlist;
|
|
struct hlist_node dlist; /* for deletion cleanup */
|
|
struct qstr key;
|
|
atomic_t value;
|
|
};
|
|
|
|
static DEFINE_HASHTABLE(package_to_appid, 8);
|
|
static DEFINE_HASHTABLE(package_to_userid, 8);
|
|
static DEFINE_HASHTABLE(ext_to_groupid, 8);
|
|
|
|
|
|
static struct kmem_cache *hashtable_entry_cachep;
|
|
|
|
static unsigned int full_name_case_hash(const void *salt, const unsigned char *name, unsigned int len)
|
|
{
|
|
unsigned long hash = init_name_hash(salt);
|
|
|
|
while (len--)
|
|
hash = partial_name_hash(tolower(*name++), hash);
|
|
return end_name_hash(hash);
|
|
}
|
|
|
|
static inline void qstr_init(struct qstr *q, const char *name)
|
|
{
|
|
q->name = name;
|
|
q->len = strlen(q->name);
|
|
q->hash = full_name_case_hash(0, q->name, q->len);
|
|
}
|
|
|
|
static inline int qstr_copy(const struct qstr *src, struct qstr *dest)
|
|
{
|
|
dest->name = kstrdup(src->name, GFP_KERNEL);
|
|
dest->hash_len = src->hash_len;
|
|
return !!dest->name;
|
|
}
|
|
|
|
|
|
static appid_t __get_appid(const struct qstr *key)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
unsigned int hash = key->hash;
|
|
appid_t ret_id;
|
|
|
|
rcu_read_lock();
|
|
hash_for_each_possible_rcu(package_to_appid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key)) {
|
|
ret_id = atomic_read(&hash_cur->value);
|
|
rcu_read_unlock();
|
|
return ret_id;
|
|
}
|
|
}
|
|
rcu_read_unlock();
|
|
return 0;
|
|
}
|
|
|
|
appid_t get_appid(const char *key)
|
|
{
|
|
struct qstr q;
|
|
|
|
qstr_init(&q, key);
|
|
return __get_appid(&q);
|
|
}
|
|
|
|
static appid_t __get_ext_gid(const struct qstr *key)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
unsigned int hash = key->hash;
|
|
appid_t ret_id;
|
|
|
|
rcu_read_lock();
|
|
hash_for_each_possible_rcu(ext_to_groupid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key)) {
|
|
ret_id = atomic_read(&hash_cur->value);
|
|
rcu_read_unlock();
|
|
return ret_id;
|
|
}
|
|
}
|
|
rcu_read_unlock();
|
|
return 0;
|
|
}
|
|
|
|
appid_t get_ext_gid(const char *key)
|
|
{
|
|
struct qstr q;
|
|
|
|
qstr_init(&q, key);
|
|
return __get_ext_gid(&q);
|
|
}
|
|
|
|
static appid_t __is_excluded(const struct qstr *app_name, userid_t user)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
unsigned int hash = app_name->hash;
|
|
|
|
rcu_read_lock();
|
|
hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) {
|
|
if (atomic_read(&hash_cur->value) == user &&
|
|
qstr_case_eq(app_name, &hash_cur->key)) {
|
|
rcu_read_unlock();
|
|
return 1;
|
|
}
|
|
}
|
|
rcu_read_unlock();
|
|
return 0;
|
|
}
|
|
|
|
appid_t is_excluded(const char *key, userid_t user)
|
|
{
|
|
struct qstr q;
|
|
qstr_init(&q, key);
|
|
return __is_excluded(&q, user);
|
|
}
|
|
|
|
/* Kernel has already enforced everything we returned through
|
|
* derive_permissions_locked(), so this is used to lock down access
|
|
* even further, such as enforcing that apps hold sdcard_rw.
|
|
*/
|
|
int check_caller_access_to_name(struct inode *parent_node, const struct qstr *name)
|
|
{
|
|
struct qstr q_autorun = QSTR_LITERAL("autorun.inf");
|
|
struct qstr q__android_secure = QSTR_LITERAL(".android_secure");
|
|
struct qstr q_android_secure = QSTR_LITERAL("android_secure");
|
|
|
|
/* Always block security-sensitive files at root */
|
|
if (parent_node && SDCARDFS_I(parent_node)->data->perm == PERM_ROOT) {
|
|
if (qstr_case_eq(name, &q_autorun)
|
|
|| qstr_case_eq(name, &q__android_secure)
|
|
|| qstr_case_eq(name, &q_android_secure)) {
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/* Root always has access; access for any other UIDs should always
|
|
* be controlled through packages.list.
|
|
*/
|
|
if (from_kuid(&init_user_ns, current_fsuid()) == 0)
|
|
return 1;
|
|
|
|
/* No extra permissions to enforce */
|
|
return 1;
|
|
}
|
|
|
|
static struct hashtable_entry *alloc_hashtable_entry(const struct qstr *key,
|
|
appid_t value)
|
|
{
|
|
struct hashtable_entry *ret = kmem_cache_alloc(hashtable_entry_cachep,
|
|
GFP_KERNEL);
|
|
if (!ret)
|
|
return NULL;
|
|
INIT_HLIST_NODE(&ret->dlist);
|
|
INIT_HLIST_NODE(&ret->hlist);
|
|
|
|
if (!qstr_copy(key, &ret->key)) {
|
|
kmem_cache_free(hashtable_entry_cachep, ret);
|
|
return NULL;
|
|
}
|
|
|
|
atomic_set(&ret->value, value);
|
|
return ret;
|
|
}
|
|
|
|
static int insert_packagelist_appid_entry_locked(const struct qstr *key, appid_t value)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
struct hashtable_entry *new_entry;
|
|
unsigned int hash = key->hash;
|
|
|
|
hash_for_each_possible_rcu(package_to_appid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key)) {
|
|
atomic_set(&hash_cur->value, value);
|
|
return 0;
|
|
}
|
|
}
|
|
new_entry = alloc_hashtable_entry(key, value);
|
|
if (!new_entry)
|
|
return -ENOMEM;
|
|
hash_add_rcu(package_to_appid, &new_entry->hlist, hash);
|
|
return 0;
|
|
}
|
|
|
|
static int insert_ext_gid_entry_locked(const struct qstr *key, appid_t value)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
struct hashtable_entry *new_entry;
|
|
unsigned int hash = key->hash;
|
|
|
|
/* An extension can only belong to one gid */
|
|
hash_for_each_possible_rcu(ext_to_groupid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key))
|
|
return -EINVAL;
|
|
}
|
|
new_entry = alloc_hashtable_entry(key, value);
|
|
if (!new_entry)
|
|
return -ENOMEM;
|
|
hash_add_rcu(ext_to_groupid, &new_entry->hlist, hash);
|
|
return 0;
|
|
}
|
|
|
|
static int insert_userid_exclude_entry_locked(const struct qstr *key, userid_t value)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
struct hashtable_entry *new_entry;
|
|
unsigned int hash = key->hash;
|
|
|
|
/* Only insert if not already present */
|
|
hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) {
|
|
if (atomic_read(&hash_cur->value) == value &&
|
|
qstr_case_eq(key, &hash_cur->key))
|
|
return 0;
|
|
}
|
|
new_entry = alloc_hashtable_entry(key, value);
|
|
if (!new_entry)
|
|
return -ENOMEM;
|
|
hash_add_rcu(package_to_userid, &new_entry->hlist, hash);
|
|
return 0;
|
|
}
|
|
|
|
static void fixup_all_perms_name(const struct qstr *key)
|
|
{
|
|
struct sdcardfs_sb_info *sbinfo;
|
|
struct limit_search limit = {
|
|
.flags = BY_NAME,
|
|
.name = QSTR_INIT(key->name, key->len),
|
|
};
|
|
list_for_each_entry(sbinfo, &sdcardfs_super_list, list) {
|
|
if (sbinfo_has_sdcard_magic(sbinfo))
|
|
fixup_perms_recursive(sbinfo->sb->s_root, &limit);
|
|
}
|
|
}
|
|
|
|
static void fixup_all_perms_name_userid(const struct qstr *key, userid_t userid)
|
|
{
|
|
struct sdcardfs_sb_info *sbinfo;
|
|
struct limit_search limit = {
|
|
.flags = BY_NAME | BY_USERID,
|
|
.name = QSTR_INIT(key->name, key->len),
|
|
.userid = userid,
|
|
};
|
|
list_for_each_entry(sbinfo, &sdcardfs_super_list, list) {
|
|
if (sbinfo_has_sdcard_magic(sbinfo))
|
|
fixup_perms_recursive(sbinfo->sb->s_root, &limit);
|
|
}
|
|
}
|
|
|
|
static void fixup_all_perms_userid(userid_t userid)
|
|
{
|
|
struct sdcardfs_sb_info *sbinfo;
|
|
struct limit_search limit = {
|
|
.flags = BY_USERID,
|
|
.userid = userid,
|
|
};
|
|
list_for_each_entry(sbinfo, &sdcardfs_super_list, list) {
|
|
if (sbinfo_has_sdcard_magic(sbinfo))
|
|
fixup_perms_recursive(sbinfo->sb->s_root, &limit);
|
|
}
|
|
}
|
|
|
|
static int insert_packagelist_entry(const struct qstr *key, appid_t value)
|
|
{
|
|
int err;
|
|
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
err = insert_packagelist_appid_entry_locked(key, value);
|
|
if (!err)
|
|
fixup_all_perms_name(key);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int insert_ext_gid_entry(const struct qstr *key, appid_t value)
|
|
{
|
|
int err;
|
|
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
err = insert_ext_gid_entry_locked(key, value);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int insert_userid_exclude_entry(const struct qstr *key, userid_t value)
|
|
{
|
|
int err;
|
|
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
err = insert_userid_exclude_entry_locked(key, value);
|
|
if (!err)
|
|
fixup_all_perms_name_userid(key, value);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
|
|
return err;
|
|
}
|
|
|
|
static void free_hashtable_entry(struct hashtable_entry *entry)
|
|
{
|
|
kfree(entry->key.name);
|
|
kmem_cache_free(hashtable_entry_cachep, entry);
|
|
}
|
|
|
|
static void remove_packagelist_entry_locked(const struct qstr *key)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
unsigned int hash = key->hash;
|
|
struct hlist_node *h_t;
|
|
HLIST_HEAD(free_list);
|
|
|
|
hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key)) {
|
|
hash_del_rcu(&hash_cur->hlist);
|
|
hlist_add_head(&hash_cur->dlist, &free_list);
|
|
}
|
|
}
|
|
hash_for_each_possible_rcu(package_to_appid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key)) {
|
|
hash_del_rcu(&hash_cur->hlist);
|
|
hlist_add_head(&hash_cur->dlist, &free_list);
|
|
break;
|
|
}
|
|
}
|
|
synchronize_rcu();
|
|
hlist_for_each_entry_safe(hash_cur, h_t, &free_list, dlist)
|
|
free_hashtable_entry(hash_cur);
|
|
}
|
|
|
|
static void remove_packagelist_entry(const struct qstr *key)
|
|
{
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
remove_packagelist_entry_locked(key);
|
|
fixup_all_perms_name(key);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
}
|
|
|
|
static void remove_ext_gid_entry_locked(const struct qstr *key, gid_t group)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
unsigned int hash = key->hash;
|
|
|
|
hash_for_each_possible_rcu(ext_to_groupid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key) && atomic_read(&hash_cur->value) == group) {
|
|
hash_del_rcu(&hash_cur->hlist);
|
|
synchronize_rcu();
|
|
free_hashtable_entry(hash_cur);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
static void remove_ext_gid_entry(const struct qstr *key, gid_t group)
|
|
{
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
remove_ext_gid_entry_locked(key, group);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
}
|
|
|
|
static void remove_userid_all_entry_locked(userid_t userid)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
struct hlist_node *h_t;
|
|
HLIST_HEAD(free_list);
|
|
int i;
|
|
|
|
hash_for_each_rcu(package_to_userid, i, hash_cur, hlist) {
|
|
if (atomic_read(&hash_cur->value) == userid) {
|
|
hash_del_rcu(&hash_cur->hlist);
|
|
hlist_add_head(&hash_cur->dlist, &free_list);
|
|
}
|
|
}
|
|
synchronize_rcu();
|
|
hlist_for_each_entry_safe(hash_cur, h_t, &free_list, dlist) {
|
|
free_hashtable_entry(hash_cur);
|
|
}
|
|
}
|
|
|
|
static void remove_userid_all_entry(userid_t userid)
|
|
{
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
remove_userid_all_entry_locked(userid);
|
|
fixup_all_perms_userid(userid);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
}
|
|
|
|
static void remove_userid_exclude_entry_locked(const struct qstr *key, userid_t userid)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
unsigned int hash = key->hash;
|
|
|
|
hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(key, &hash_cur->key) &&
|
|
atomic_read(&hash_cur->value) == userid) {
|
|
hash_del_rcu(&hash_cur->hlist);
|
|
synchronize_rcu();
|
|
free_hashtable_entry(hash_cur);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
static void remove_userid_exclude_entry(const struct qstr *key, userid_t userid)
|
|
{
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
remove_userid_exclude_entry_locked(key, userid);
|
|
fixup_all_perms_name_userid(key, userid);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
}
|
|
|
|
static void packagelist_destroy(void)
|
|
{
|
|
struct hashtable_entry *hash_cur;
|
|
struct hlist_node *h_t;
|
|
HLIST_HEAD(free_list);
|
|
int i;
|
|
|
|
mutex_lock(&sdcardfs_super_list_lock);
|
|
hash_for_each_rcu(package_to_appid, i, hash_cur, hlist) {
|
|
hash_del_rcu(&hash_cur->hlist);
|
|
hlist_add_head(&hash_cur->dlist, &free_list);
|
|
}
|
|
hash_for_each_rcu(package_to_userid, i, hash_cur, hlist) {
|
|
hash_del_rcu(&hash_cur->hlist);
|
|
hlist_add_head(&hash_cur->dlist, &free_list);
|
|
}
|
|
synchronize_rcu();
|
|
hlist_for_each_entry_safe(hash_cur, h_t, &free_list, dlist)
|
|
free_hashtable_entry(hash_cur);
|
|
mutex_unlock(&sdcardfs_super_list_lock);
|
|
pr_info("sdcardfs: destroyed packagelist pkgld\n");
|
|
}
|
|
|
|
#define SDCARDFS_CONFIGFS_ATTR(_pfx, _name) \
|
|
static struct configfs_attribute _pfx##attr_##_name = { \
|
|
.ca_name = __stringify(_name), \
|
|
.ca_mode = S_IRUGO | S_IWUGO, \
|
|
.ca_owner = THIS_MODULE, \
|
|
.show = _pfx##_name##_show, \
|
|
.store = _pfx##_name##_store, \
|
|
}
|
|
|
|
#define SDCARDFS_CONFIGFS_ATTR_RO(_pfx, _name) \
|
|
static struct configfs_attribute _pfx##attr_##_name = { \
|
|
.ca_name = __stringify(_name), \
|
|
.ca_mode = S_IRUGO, \
|
|
.ca_owner = THIS_MODULE, \
|
|
.show = _pfx##_name##_show, \
|
|
}
|
|
|
|
#define SDCARDFS_CONFIGFS_ATTR_WO(_pfx, _name) \
|
|
static struct configfs_attribute _pfx##attr_##_name = { \
|
|
.ca_name = __stringify(_name), \
|
|
.ca_mode = S_IWUGO, \
|
|
.ca_owner = THIS_MODULE, \
|
|
.store = _pfx##_name##_store, \
|
|
}
|
|
|
|
struct package_details {
|
|
struct config_item item;
|
|
struct qstr name;
|
|
};
|
|
|
|
static inline struct package_details *to_package_details(struct config_item *item)
|
|
{
|
|
return item ? container_of(item, struct package_details, item) : NULL;
|
|
}
|
|
|
|
static ssize_t package_details_appid_show(struct config_item *item, char *page)
|
|
{
|
|
return scnprintf(page, PAGE_SIZE, "%u\n", __get_appid(&to_package_details(item)->name));
|
|
}
|
|
|
|
static ssize_t package_details_appid_store(struct config_item *item,
|
|
const char *page, size_t count)
|
|
{
|
|
unsigned int tmp;
|
|
int ret;
|
|
|
|
ret = kstrtouint(page, 10, &tmp);
|
|
if (ret)
|
|
return ret;
|
|
|
|
ret = insert_packagelist_entry(&to_package_details(item)->name, tmp);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
return count;
|
|
}
|
|
|
|
static ssize_t package_details_excluded_userids_show(struct config_item *item,
|
|
char *page)
|
|
{
|
|
struct package_details *package_details = to_package_details(item);
|
|
struct hashtable_entry *hash_cur;
|
|
unsigned int hash = package_details->name.hash;
|
|
int count = 0;
|
|
|
|
rcu_read_lock();
|
|
hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) {
|
|
if (qstr_case_eq(&package_details->name, &hash_cur->key))
|
|
count += scnprintf(page + count, PAGE_SIZE - count,
|
|
"%d ", atomic_read(&hash_cur->value));
|
|
}
|
|
rcu_read_unlock();
|
|
if (count)
|
|
count--;
|
|
count += scnprintf(page + count, PAGE_SIZE - count, "\n");
|
|
return count;
|
|
}
|
|
|
|
static ssize_t package_details_excluded_userids_store(struct config_item *item,
|
|
const char *page, size_t count)
|
|
{
|
|
unsigned int tmp;
|
|
int ret;
|
|
|
|
ret = kstrtouint(page, 10, &tmp);
|
|
if (ret)
|
|
return ret;
|
|
|
|
ret = insert_userid_exclude_entry(&to_package_details(item)->name, tmp);
|
|
|
|
if (ret)
|
|
return ret;
|
|
|
|
return count;
|
|
}
|
|
|
|
static ssize_t package_details_clear_userid_store(struct config_item *item,
|
|
const char *page, size_t count)
|
|
{
|
|
unsigned int tmp;
|
|
int ret;
|
|
|
|
ret = kstrtouint(page, 10, &tmp);
|
|
if (ret)
|
|
return ret;
|
|
remove_userid_exclude_entry(&to_package_details(item)->name, tmp);
|
|
return count;
|
|
}
|
|
|
|
static void package_details_release(struct config_item *item)
|
|
{
|
|
struct package_details *package_details = to_package_details(item);
|
|
|
|
pr_info("sdcardfs: removing %s\n", package_details->name.name);
|
|
remove_packagelist_entry(&package_details->name);
|
|
kfree(package_details->name.name);
|
|
kfree(package_details);
|
|
}
|
|
|
|
SDCARDFS_CONFIGFS_ATTR(package_details_, appid);
|
|
SDCARDFS_CONFIGFS_ATTR(package_details_, excluded_userids);
|
|
SDCARDFS_CONFIGFS_ATTR_WO(package_details_, clear_userid);
|
|
|
|
static struct configfs_attribute *package_details_attrs[] = {
|
|
&package_details_attr_appid,
|
|
&package_details_attr_excluded_userids,
|
|
&package_details_attr_clear_userid,
|
|
NULL,
|
|
};
|
|
|
|
static struct configfs_item_operations package_details_item_ops = {
|
|
.release = package_details_release,
|
|
};
|
|
|
|
static struct config_item_type package_appid_type = {
|
|
.ct_item_ops = &package_details_item_ops,
|
|
.ct_attrs = package_details_attrs,
|
|
.ct_owner = THIS_MODULE,
|
|
};
|
|
|
|
struct extensions_value {
|
|
struct config_group group;
|
|
unsigned int num;
|
|
};
|
|
|
|
struct extension_details {
|
|
struct config_item item;
|
|
struct qstr name;
|
|
unsigned int num;
|
|
};
|
|
|
|
static inline struct extensions_value *to_extensions_value(struct config_item *item)
|
|
{
|
|
return item ? container_of(to_config_group(item), struct extensions_value, group) : NULL;
|
|
}
|
|
|
|
static inline struct extension_details *to_extension_details(struct config_item *item)
|
|
{
|
|
return item ? container_of(item, struct extension_details, item) : NULL;
|
|
}
|
|
|
|
static void extension_details_release(struct config_item *item)
|
|
{
|
|
struct extension_details *extension_details = to_extension_details(item);
|
|
|
|
pr_info("sdcardfs: No longer mapping %s files to gid %d\n",
|
|
extension_details->name.name, extension_details->num);
|
|
remove_ext_gid_entry(&extension_details->name, extension_details->num);
|
|
kfree(extension_details->name.name);
|
|
kfree(extension_details);
|
|
}
|
|
|
|
static struct configfs_item_operations extension_details_item_ops = {
|
|
.release = extension_details_release,
|
|
};
|
|
|
|
static struct config_item_type extension_details_type = {
|
|
.ct_item_ops = &extension_details_item_ops,
|
|
.ct_owner = THIS_MODULE,
|
|
};
|
|
|
|
static struct config_item *extension_details_make_item(struct config_group *group, const char *name)
|
|
{
|
|
struct extensions_value *extensions_value = to_extensions_value(&group->cg_item);
|
|
struct extension_details *extension_details = kzalloc(sizeof(struct extension_details), GFP_KERNEL);
|
|
const char *tmp;
|
|
int ret;
|
|
|
|
if (!extension_details)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
tmp = kstrdup(name, GFP_KERNEL);
|
|
if (!tmp) {
|
|
kfree(extension_details);
|
|
return ERR_PTR(-ENOMEM);
|
|
}
|
|
qstr_init(&extension_details->name, tmp);
|
|
extension_details->num = extensions_value->num;
|
|
ret = insert_ext_gid_entry(&extension_details->name, extensions_value->num);
|
|
|
|
if (ret) {
|
|
kfree(extension_details->name.name);
|
|
kfree(extension_details);
|
|
return ERR_PTR(ret);
|
|
}
|
|
config_item_init_type_name(&extension_details->item, name, &extension_details_type);
|
|
|
|
return &extension_details->item;
|
|
}
|
|
|
|
static struct configfs_group_operations extensions_value_group_ops = {
|
|
.make_item = extension_details_make_item,
|
|
};
|
|
|
|
static struct config_item_type extensions_name_type = {
|
|
.ct_group_ops = &extensions_value_group_ops,
|
|
.ct_owner = THIS_MODULE,
|
|
};
|
|
|
|
static struct config_group *extensions_make_group(struct config_group *group, const char *name)
|
|
{
|
|
struct extensions_value *extensions_value;
|
|
unsigned int tmp;
|
|
int ret;
|
|
|
|
extensions_value = kzalloc(sizeof(struct extensions_value), GFP_KERNEL);
|
|
if (!extensions_value)
|
|
return ERR_PTR(-ENOMEM);
|
|
ret = kstrtouint(name, 10, &tmp);
|
|
if (ret) {
|
|
kfree(extensions_value);
|
|
return ERR_PTR(ret);
|
|
}
|
|
|
|
extensions_value->num = tmp;
|
|
config_group_init_type_name(&extensions_value->group, name,
|
|
&extensions_name_type);
|
|
return &extensions_value->group;
|
|
}
|
|
|
|
static void extensions_drop_group(struct config_group *group, struct config_item *item)
|
|
{
|
|
struct extensions_value *value = to_extensions_value(item);
|
|
|
|
pr_info("sdcardfs: No longer mapping any files to gid %d\n", value->num);
|
|
kfree(value);
|
|
}
|
|
|
|
static struct configfs_group_operations extensions_group_ops = {
|
|
.make_group = extensions_make_group,
|
|
.drop_item = extensions_drop_group,
|
|
};
|
|
|
|
static struct config_item_type extensions_type = {
|
|
.ct_group_ops = &extensions_group_ops,
|
|
.ct_owner = THIS_MODULE,
|
|
};
|
|
|
|
struct config_group extension_group = {
|
|
.cg_item = {
|
|
.ci_namebuf = "extensions",
|
|
.ci_type = &extensions_type,
|
|
},
|
|
};
|
|
|
|
static struct config_item *packages_make_item(struct config_group *group, const char *name)
|
|
{
|
|
struct package_details *package_details;
|
|
const char *tmp;
|
|
|
|
package_details = kzalloc(sizeof(struct package_details), GFP_KERNEL);
|
|
if (!package_details)
|
|
return ERR_PTR(-ENOMEM);
|
|
tmp = kstrdup(name, GFP_KERNEL);
|
|
if (!tmp) {
|
|
kfree(package_details);
|
|
return ERR_PTR(-ENOMEM);
|
|
}
|
|
qstr_init(&package_details->name, tmp);
|
|
config_item_init_type_name(&package_details->item, name,
|
|
&package_appid_type);
|
|
|
|
return &package_details->item;
|
|
}
|
|
|
|
static ssize_t packages_list_show(struct config_item *item, char *page)
|
|
{
|
|
struct hashtable_entry *hash_cur_app;
|
|
struct hashtable_entry *hash_cur_user;
|
|
int i;
|
|
int count = 0, written = 0;
|
|
const char errormsg[] = "<truncated>\n";
|
|
unsigned int hash;
|
|
|
|
rcu_read_lock();
|
|
hash_for_each_rcu(package_to_appid, i, hash_cur_app, hlist) {
|
|
written = scnprintf(page + count, PAGE_SIZE - sizeof(errormsg) - count, "%s %d\n",
|
|
hash_cur_app->key.name, atomic_read(&hash_cur_app->value));
|
|
hash = hash_cur_app->key.hash;
|
|
hash_for_each_possible_rcu(package_to_userid, hash_cur_user, hlist, hash) {
|
|
if (qstr_case_eq(&hash_cur_app->key, &hash_cur_user->key)) {
|
|
written += scnprintf(page + count + written - 1,
|
|
PAGE_SIZE - sizeof(errormsg) - count - written + 1,
|
|
" %d\n", atomic_read(&hash_cur_user->value)) - 1;
|
|
}
|
|
}
|
|
if (count + written == PAGE_SIZE - sizeof(errormsg) - 1) {
|
|
count += scnprintf(page + count, PAGE_SIZE - count, errormsg);
|
|
break;
|
|
}
|
|
count += written;
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
return count;
|
|
}
|
|
|
|
static ssize_t packages_remove_userid_store(struct config_item *item,
|
|
const char *page, size_t count)
|
|
{
|
|
unsigned int tmp;
|
|
int ret;
|
|
|
|
ret = kstrtouint(page, 10, &tmp);
|
|
if (ret)
|
|
return ret;
|
|
remove_userid_all_entry(tmp);
|
|
return count;
|
|
}
|
|
|
|
static struct configfs_attribute packages_attr_packages_gid_list = {
|
|
.ca_name = "packages_gid.list",
|
|
.ca_mode = S_IRUGO,
|
|
.ca_owner = THIS_MODULE,
|
|
.show = packages_list_show,
|
|
};
|
|
|
|
SDCARDFS_CONFIGFS_ATTR_WO(packages_, remove_userid);
|
|
|
|
static struct configfs_attribute *packages_attrs[] = {
|
|
&packages_attr_packages_gid_list,
|
|
&packages_attr_remove_userid,
|
|
NULL,
|
|
};
|
|
|
|
/*
|
|
* Note that, since no extra work is required on ->drop_item(),
|
|
* no ->drop_item() is provided.
|
|
*/
|
|
static struct configfs_group_operations packages_group_ops = {
|
|
.make_item = packages_make_item,
|
|
};
|
|
|
|
static struct config_item_type packages_type = {
|
|
.ct_group_ops = &packages_group_ops,
|
|
.ct_attrs = packages_attrs,
|
|
.ct_owner = THIS_MODULE,
|
|
};
|
|
|
|
struct config_group *sd_default_groups[] = {
|
|
&extension_group,
|
|
NULL,
|
|
};
|
|
|
|
static struct configfs_subsystem sdcardfs_packages = {
|
|
.su_group = {
|
|
.cg_item = {
|
|
.ci_namebuf = "sdcardfs",
|
|
.ci_type = &packages_type,
|
|
},
|
|
},
|
|
};
|
|
|
|
static int configfs_sdcardfs_init(void)
|
|
{
|
|
int ret, i;
|
|
struct configfs_subsystem *subsys = &sdcardfs_packages;
|
|
|
|
config_group_init(&subsys->su_group);
|
|
for (i = 0; sd_default_groups[i]; i++) {
|
|
config_group_init(sd_default_groups[i]);
|
|
configfs_add_default_group(sd_default_groups[i], &subsys->su_group);
|
|
}
|
|
mutex_init(&subsys->su_mutex);
|
|
ret = configfs_register_subsystem(subsys);
|
|
if (ret) {
|
|
pr_err("Error %d while registering subsystem %s\n",
|
|
ret,
|
|
subsys->su_group.cg_item.ci_namebuf);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static void configfs_sdcardfs_exit(void)
|
|
{
|
|
configfs_unregister_subsystem(&sdcardfs_packages);
|
|
}
|
|
|
|
int packagelist_init(void)
|
|
{
|
|
hashtable_entry_cachep =
|
|
kmem_cache_create("packagelist_hashtable_entry",
|
|
sizeof(struct hashtable_entry), 0, 0, NULL);
|
|
if (!hashtable_entry_cachep) {
|
|
pr_err("sdcardfs: failed creating pkgl_hashtable entry slab cache\n");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
configfs_sdcardfs_init();
|
|
return 0;
|
|
}
|
|
|
|
void packagelist_exit(void)
|
|
{
|
|
configfs_sdcardfs_exit();
|
|
packagelist_destroy();
|
|
kmem_cache_destroy(hashtable_entry_cachep);
|
|
}
|