/* * fs/sdcardfs/packagelist.c * * Copyright (c) 2013 Samsung Electronics Co. Ltd * Authors: Daeho Jeong, Woojoong Lee, Seunghwan Hyun, * Sunghwan Yun, Sungjong Seo * * This program has been developed as a stackable file system based on * the WrapFS which written by * * Copyright (c) 1998-2011 Erez Zadok * Copyright (c) 2009 Shrikar Archak * Copyright (c) 2003-2011 Stony Brook University * Copyright (c) 2003-2011 The Research Foundation of SUNY * * This file is dual licensed. It may be redistributed and/or modified * under the terms of the Apache 2.0 License OR version 2 of the GNU * General Public License. */ #include "sdcardfs.h" #include #include #include #include #include #include #include #include #include struct hashtable_entry { struct hlist_node hlist; struct hlist_node dlist; /* for deletion cleanup */ struct qstr key; atomic_t value; }; static DEFINE_HASHTABLE(package_to_appid, 8); static DEFINE_HASHTABLE(package_to_userid, 8); static DEFINE_HASHTABLE(ext_to_groupid, 8); static struct kmem_cache *hashtable_entry_cachep; static unsigned int full_name_case_hash(const void *salt, const unsigned char *name, unsigned int len) { unsigned long hash = init_name_hash(salt); while (len--) hash = partial_name_hash(tolower(*name++), hash); return end_name_hash(hash); } static inline void qstr_init(struct qstr *q, const char *name) { q->name = name; q->len = strlen(q->name); q->hash = full_name_case_hash(0, q->name, q->len); } static inline int qstr_copy(const struct qstr *src, struct qstr *dest) { dest->name = kstrdup(src->name, GFP_KERNEL); dest->hash_len = src->hash_len; return !!dest->name; } static appid_t __get_appid(const struct qstr *key) { struct hashtable_entry *hash_cur; unsigned int hash = key->hash; appid_t ret_id; rcu_read_lock(); hash_for_each_possible_rcu(package_to_appid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key)) { ret_id = atomic_read(&hash_cur->value); rcu_read_unlock(); return ret_id; } } rcu_read_unlock(); return 0; } appid_t get_appid(const char *key) { struct qstr q; qstr_init(&q, key); return __get_appid(&q); } EXPORT_SYMBOL(get_appid); static appid_t __get_ext_gid(const struct qstr *key) { struct hashtable_entry *hash_cur; unsigned int hash = key->hash; appid_t ret_id; rcu_read_lock(); hash_for_each_possible_rcu(ext_to_groupid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key)) { ret_id = atomic_read(&hash_cur->value); rcu_read_unlock(); return ret_id; } } rcu_read_unlock(); return 0; } appid_t get_ext_gid(const char *key) { struct qstr q; qstr_init(&q, key); return __get_ext_gid(&q); } static appid_t __is_excluded(const struct qstr *app_name, userid_t user) { struct hashtable_entry *hash_cur; unsigned int hash = app_name->hash; rcu_read_lock(); hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) { if (atomic_read(&hash_cur->value) == user && qstr_case_eq(app_name, &hash_cur->key)) { rcu_read_unlock(); return 1; } } rcu_read_unlock(); return 0; } appid_t is_excluded(const char *key, userid_t user) { struct qstr q; qstr_init(&q, key); return __is_excluded(&q, user); } /* Kernel has already enforced everything we returned through * derive_permissions_locked(), so this is used to lock down access * even further, such as enforcing that apps hold sdcard_rw. */ int check_caller_access_to_name(struct inode *parent_node, const struct qstr *name) { struct qstr q_autorun = QSTR_LITERAL("autorun.inf"); struct qstr q__android_secure = QSTR_LITERAL(".android_secure"); struct qstr q_android_secure = QSTR_LITERAL("android_secure"); /* Always block security-sensitive files at root */ if (parent_node && SDCARDFS_I(parent_node)->data->perm == PERM_ROOT) { if (qstr_case_eq(name, &q_autorun) || qstr_case_eq(name, &q__android_secure) || qstr_case_eq(name, &q_android_secure)) { return 0; } } /* Root always has access; access for any other UIDs should always * be controlled through packages.list. */ if (from_kuid(&init_user_ns, current_fsuid()) == 0) return 1; /* No extra permissions to enforce */ return 1; } static struct hashtable_entry *alloc_hashtable_entry(const struct qstr *key, appid_t value) { struct hashtable_entry *ret = kmem_cache_alloc(hashtable_entry_cachep, GFP_KERNEL); if (!ret) return NULL; INIT_HLIST_NODE(&ret->dlist); INIT_HLIST_NODE(&ret->hlist); if (!qstr_copy(key, &ret->key)) { kmem_cache_free(hashtable_entry_cachep, ret); return NULL; } atomic_set(&ret->value, value); return ret; } static int insert_packagelist_appid_entry_locked(const struct qstr *key, appid_t value) { struct hashtable_entry *hash_cur; struct hashtable_entry *new_entry; unsigned int hash = key->hash; hash_for_each_possible_rcu(package_to_appid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key)) { atomic_set(&hash_cur->value, value); return 0; } } new_entry = alloc_hashtable_entry(key, value); if (!new_entry) return -ENOMEM; hash_add_rcu(package_to_appid, &new_entry->hlist, hash); return 0; } static int insert_ext_gid_entry_locked(const struct qstr *key, appid_t value) { struct hashtable_entry *hash_cur; struct hashtable_entry *new_entry; unsigned int hash = key->hash; /* An extension can only belong to one gid */ hash_for_each_possible_rcu(ext_to_groupid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key)) return -EINVAL; } new_entry = alloc_hashtable_entry(key, value); if (!new_entry) return -ENOMEM; hash_add_rcu(ext_to_groupid, &new_entry->hlist, hash); return 0; } static int insert_userid_exclude_entry_locked(const struct qstr *key, userid_t value) { struct hashtable_entry *hash_cur; struct hashtable_entry *new_entry; unsigned int hash = key->hash; /* Only insert if not already present */ hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) { if (atomic_read(&hash_cur->value) == value && qstr_case_eq(key, &hash_cur->key)) return 0; } new_entry = alloc_hashtable_entry(key, value); if (!new_entry) return -ENOMEM; hash_add_rcu(package_to_userid, &new_entry->hlist, hash); return 0; } static void fixup_all_perms_name(const struct qstr *key) { struct sdcardfs_sb_info *sbinfo; struct limit_search limit = { .flags = BY_NAME, .name = QSTR_INIT(key->name, key->len), }; list_for_each_entry(sbinfo, &sdcardfs_super_list, list) { if (sbinfo_has_sdcard_magic(sbinfo)) fixup_perms_recursive(sbinfo->sb->s_root, &limit); } } static void fixup_all_perms_name_userid(const struct qstr *key, userid_t userid) { struct sdcardfs_sb_info *sbinfo; struct limit_search limit = { .flags = BY_NAME | BY_USERID, .name = QSTR_INIT(key->name, key->len), .userid = userid, }; list_for_each_entry(sbinfo, &sdcardfs_super_list, list) { if (sbinfo_has_sdcard_magic(sbinfo)) fixup_perms_recursive(sbinfo->sb->s_root, &limit); } } static void fixup_all_perms_userid(userid_t userid) { struct sdcardfs_sb_info *sbinfo; struct limit_search limit = { .flags = BY_USERID, .userid = userid, }; list_for_each_entry(sbinfo, &sdcardfs_super_list, list) { if (sbinfo_has_sdcard_magic(sbinfo)) fixup_perms_recursive(sbinfo->sb->s_root, &limit); } } static int insert_packagelist_entry(const struct qstr *key, appid_t value) { int err; mutex_lock(&sdcardfs_super_list_lock); err = insert_packagelist_appid_entry_locked(key, value); if (!err) fixup_all_perms_name(key); mutex_unlock(&sdcardfs_super_list_lock); return err; } static int insert_ext_gid_entry(const struct qstr *key, appid_t value) { int err; mutex_lock(&sdcardfs_super_list_lock); err = insert_ext_gid_entry_locked(key, value); mutex_unlock(&sdcardfs_super_list_lock); return err; } static int insert_userid_exclude_entry(const struct qstr *key, userid_t value) { int err; mutex_lock(&sdcardfs_super_list_lock); err = insert_userid_exclude_entry_locked(key, value); if (!err) fixup_all_perms_name_userid(key, value); mutex_unlock(&sdcardfs_super_list_lock); return err; } static void free_hashtable_entry(struct hashtable_entry *entry) { kfree(entry->key.name); kmem_cache_free(hashtable_entry_cachep, entry); } static void remove_packagelist_entry_locked(const struct qstr *key) { struct hashtable_entry *hash_cur; unsigned int hash = key->hash; struct hlist_node *h_t; HLIST_HEAD(free_list); hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key)) { hash_del_rcu(&hash_cur->hlist); hlist_add_head(&hash_cur->dlist, &free_list); } } hash_for_each_possible_rcu(package_to_appid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key)) { hash_del_rcu(&hash_cur->hlist); hlist_add_head(&hash_cur->dlist, &free_list); break; } } synchronize_rcu(); hlist_for_each_entry_safe(hash_cur, h_t, &free_list, dlist) free_hashtable_entry(hash_cur); } static void remove_packagelist_entry(const struct qstr *key) { mutex_lock(&sdcardfs_super_list_lock); remove_packagelist_entry_locked(key); fixup_all_perms_name(key); mutex_unlock(&sdcardfs_super_list_lock); } static void remove_ext_gid_entry_locked(const struct qstr *key, gid_t group) { struct hashtable_entry *hash_cur; unsigned int hash = key->hash; hash_for_each_possible_rcu(ext_to_groupid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key) && atomic_read(&hash_cur->value) == group) { hash_del_rcu(&hash_cur->hlist); synchronize_rcu(); free_hashtable_entry(hash_cur); break; } } } static void remove_ext_gid_entry(const struct qstr *key, gid_t group) { mutex_lock(&sdcardfs_super_list_lock); remove_ext_gid_entry_locked(key, group); mutex_unlock(&sdcardfs_super_list_lock); } static void remove_userid_all_entry_locked(userid_t userid) { struct hashtable_entry *hash_cur; struct hlist_node *h_t; HLIST_HEAD(free_list); int i; hash_for_each_rcu(package_to_userid, i, hash_cur, hlist) { if (atomic_read(&hash_cur->value) == userid) { hash_del_rcu(&hash_cur->hlist); hlist_add_head(&hash_cur->dlist, &free_list); } } synchronize_rcu(); hlist_for_each_entry_safe(hash_cur, h_t, &free_list, dlist) { free_hashtable_entry(hash_cur); } } static void remove_userid_all_entry(userid_t userid) { mutex_lock(&sdcardfs_super_list_lock); remove_userid_all_entry_locked(userid); fixup_all_perms_userid(userid); mutex_unlock(&sdcardfs_super_list_lock); } static void remove_userid_exclude_entry_locked(const struct qstr *key, userid_t userid) { struct hashtable_entry *hash_cur; unsigned int hash = key->hash; hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) { if (qstr_case_eq(key, &hash_cur->key) && atomic_read(&hash_cur->value) == userid) { hash_del_rcu(&hash_cur->hlist); synchronize_rcu(); free_hashtable_entry(hash_cur); break; } } } static void remove_userid_exclude_entry(const struct qstr *key, userid_t userid) { mutex_lock(&sdcardfs_super_list_lock); remove_userid_exclude_entry_locked(key, userid); fixup_all_perms_name_userid(key, userid); mutex_unlock(&sdcardfs_super_list_lock); } static void packagelist_destroy(void) { struct hashtable_entry *hash_cur; struct hlist_node *h_t; HLIST_HEAD(free_list); int i; mutex_lock(&sdcardfs_super_list_lock); hash_for_each_rcu(package_to_appid, i, hash_cur, hlist) { hash_del_rcu(&hash_cur->hlist); hlist_add_head(&hash_cur->dlist, &free_list); } hash_for_each_rcu(package_to_userid, i, hash_cur, hlist) { hash_del_rcu(&hash_cur->hlist); hlist_add_head(&hash_cur->dlist, &free_list); } synchronize_rcu(); hlist_for_each_entry_safe(hash_cur, h_t, &free_list, dlist) free_hashtable_entry(hash_cur); mutex_unlock(&sdcardfs_super_list_lock); pr_info("sdcardfs: destroyed packagelist pkgld\n"); } #define SDCARDFS_CONFIGFS_ATTR(_pfx, _name) \ static struct configfs_attribute _pfx##attr_##_name = { \ .ca_name = __stringify(_name), \ .ca_mode = S_IRUGO | S_IWUGO, \ .ca_owner = THIS_MODULE, \ .show = _pfx##_name##_show, \ .store = _pfx##_name##_store, \ } #define SDCARDFS_CONFIGFS_ATTR_RO(_pfx, _name) \ static struct configfs_attribute _pfx##attr_##_name = { \ .ca_name = __stringify(_name), \ .ca_mode = S_IRUGO, \ .ca_owner = THIS_MODULE, \ .show = _pfx##_name##_show, \ } #define SDCARDFS_CONFIGFS_ATTR_WO(_pfx, _name) \ static struct configfs_attribute _pfx##attr_##_name = { \ .ca_name = __stringify(_name), \ .ca_mode = S_IWUGO, \ .ca_owner = THIS_MODULE, \ .store = _pfx##_name##_store, \ } struct package_details { struct config_item item; struct qstr name; }; static inline struct package_details *to_package_details(struct config_item *item) { return item ? container_of(item, struct package_details, item) : NULL; } static ssize_t package_details_appid_show(struct config_item *item, char *page) { return scnprintf(page, PAGE_SIZE, "%u\n", __get_appid(&to_package_details(item)->name)); } static ssize_t package_details_appid_store(struct config_item *item, const char *page, size_t count) { unsigned int tmp; int ret; ret = kstrtouint(page, 10, &tmp); if (ret) return ret; ret = insert_packagelist_entry(&to_package_details(item)->name, tmp); if (ret) return ret; return count; } static ssize_t package_details_excluded_userids_show(struct config_item *item, char *page) { struct package_details *package_details = to_package_details(item); struct hashtable_entry *hash_cur; unsigned int hash = package_details->name.hash; int count = 0; rcu_read_lock(); hash_for_each_possible_rcu(package_to_userid, hash_cur, hlist, hash) { if (qstr_case_eq(&package_details->name, &hash_cur->key)) count += scnprintf(page + count, PAGE_SIZE - count, "%d ", atomic_read(&hash_cur->value)); } rcu_read_unlock(); if (count) count--; count += scnprintf(page + count, PAGE_SIZE - count, "\n"); return count; } static ssize_t package_details_excluded_userids_store(struct config_item *item, const char *page, size_t count) { unsigned int tmp; int ret; ret = kstrtouint(page, 10, &tmp); if (ret) return ret; ret = insert_userid_exclude_entry(&to_package_details(item)->name, tmp); if (ret) return ret; return count; } static ssize_t package_details_clear_userid_store(struct config_item *item, const char *page, size_t count) { unsigned int tmp; int ret; ret = kstrtouint(page, 10, &tmp); if (ret) return ret; remove_userid_exclude_entry(&to_package_details(item)->name, tmp); return count; } static void package_details_release(struct config_item *item) { struct package_details *package_details = to_package_details(item); pr_info("sdcardfs: removing %s\n", package_details->name.name); remove_packagelist_entry(&package_details->name); kfree(package_details->name.name); kfree(package_details); } SDCARDFS_CONFIGFS_ATTR(package_details_, appid); SDCARDFS_CONFIGFS_ATTR(package_details_, excluded_userids); SDCARDFS_CONFIGFS_ATTR_WO(package_details_, clear_userid); static struct configfs_attribute *package_details_attrs[] = { &package_details_attr_appid, &package_details_attr_excluded_userids, &package_details_attr_clear_userid, NULL, }; static struct configfs_item_operations package_details_item_ops = { .release = package_details_release, }; static struct config_item_type package_appid_type = { .ct_item_ops = &package_details_item_ops, .ct_attrs = package_details_attrs, .ct_owner = THIS_MODULE, }; struct extensions_value { struct config_group group; unsigned int num; }; struct extension_details { struct config_item item; struct qstr name; unsigned int num; }; static inline struct extensions_value *to_extensions_value(struct config_item *item) { return item ? container_of(to_config_group(item), struct extensions_value, group) : NULL; } static inline struct extension_details *to_extension_details(struct config_item *item) { return item ? container_of(item, struct extension_details, item) : NULL; } static void extension_details_release(struct config_item *item) { struct extension_details *extension_details = to_extension_details(item); pr_info("sdcardfs: No longer mapping %s files to gid %d\n", extension_details->name.name, extension_details->num); remove_ext_gid_entry(&extension_details->name, extension_details->num); kfree(extension_details->name.name); kfree(extension_details); } static struct configfs_item_operations extension_details_item_ops = { .release = extension_details_release, }; static struct config_item_type extension_details_type = { .ct_item_ops = &extension_details_item_ops, .ct_owner = THIS_MODULE, }; static struct config_item *extension_details_make_item(struct config_group *group, const char *name) { struct extensions_value *extensions_value = to_extensions_value(&group->cg_item); struct extension_details *extension_details = kzalloc(sizeof(struct extension_details), GFP_KERNEL); const char *tmp; int ret; if (!extension_details) return ERR_PTR(-ENOMEM); tmp = kstrdup(name, GFP_KERNEL); if (!tmp) { kfree(extension_details); return ERR_PTR(-ENOMEM); } qstr_init(&extension_details->name, tmp); extension_details->num = extensions_value->num; ret = insert_ext_gid_entry(&extension_details->name, extensions_value->num); if (ret) { kfree(extension_details->name.name); kfree(extension_details); return ERR_PTR(ret); } config_item_init_type_name(&extension_details->item, name, &extension_details_type); return &extension_details->item; } static struct configfs_group_operations extensions_value_group_ops = { .make_item = extension_details_make_item, }; static struct config_item_type extensions_name_type = { .ct_group_ops = &extensions_value_group_ops, .ct_owner = THIS_MODULE, }; static struct config_group *extensions_make_group(struct config_group *group, const char *name) { struct extensions_value *extensions_value; unsigned int tmp; int ret; extensions_value = kzalloc(sizeof(struct extensions_value), GFP_KERNEL); if (!extensions_value) return ERR_PTR(-ENOMEM); ret = kstrtouint(name, 10, &tmp); if (ret) { kfree(extensions_value); return ERR_PTR(ret); } extensions_value->num = tmp; config_group_init_type_name(&extensions_value->group, name, &extensions_name_type); return &extensions_value->group; } static void extensions_drop_group(struct config_group *group, struct config_item *item) { struct extensions_value *value = to_extensions_value(item); pr_info("sdcardfs: No longer mapping any files to gid %d\n", value->num); kfree(value); } static struct configfs_group_operations extensions_group_ops = { .make_group = extensions_make_group, .drop_item = extensions_drop_group, }; static struct config_item_type extensions_type = { .ct_group_ops = &extensions_group_ops, .ct_owner = THIS_MODULE, }; struct config_group extension_group = { .cg_item = { .ci_namebuf = "extensions", .ci_type = &extensions_type, }, }; static struct config_item *packages_make_item(struct config_group *group, const char *name) { struct package_details *package_details; const char *tmp; package_details = kzalloc(sizeof(struct package_details), GFP_KERNEL); if (!package_details) return ERR_PTR(-ENOMEM); tmp = kstrdup(name, GFP_KERNEL); if (!tmp) { kfree(package_details); return ERR_PTR(-ENOMEM); } qstr_init(&package_details->name, tmp); config_item_init_type_name(&package_details->item, name, &package_appid_type); return &package_details->item; } static ssize_t packages_list_show(struct config_item *item, char *page) { struct hashtable_entry *hash_cur_app; struct hashtable_entry *hash_cur_user; int i; int count = 0, written = 0; const char errormsg[] = "\n"; unsigned int hash; rcu_read_lock(); hash_for_each_rcu(package_to_appid, i, hash_cur_app, hlist) { written = scnprintf(page + count, PAGE_SIZE - sizeof(errormsg) - count, "%s %d\n", hash_cur_app->key.name, atomic_read(&hash_cur_app->value)); hash = hash_cur_app->key.hash; hash_for_each_possible_rcu(package_to_userid, hash_cur_user, hlist, hash) { if (qstr_case_eq(&hash_cur_app->key, &hash_cur_user->key)) { written += scnprintf(page + count + written - 1, PAGE_SIZE - sizeof(errormsg) - count - written + 1, " %d\n", atomic_read(&hash_cur_user->value)) - 1; } } if (count + written == PAGE_SIZE - sizeof(errormsg) - 1) { count += scnprintf(page + count, PAGE_SIZE - count, errormsg); break; } count += written; } rcu_read_unlock(); return count; } void uid_to_packagename(u32 uid, char* output, int buf_size) { struct hashtable_entry *hash_cur_app; int i; int offs; rcu_read_lock(); hash_for_each_rcu(package_to_appid, i, hash_cur_app, hlist) { if (uid == atomic_read(&hash_cur_app->value)) { offs = strlen(hash_cur_app->key.name) - (buf_size-1); if (unlikely(offs < 0)) offs = 0; strcpy(output, hash_cur_app->key.name + offs); goto out; } } snprintf(output, buf_size, "", uid); out: rcu_read_unlock(); return; } EXPORT_SYMBOL(uid_to_packagename); static ssize_t packages_remove_userid_store(struct config_item *item, const char *page, size_t count) { unsigned int tmp; int ret; ret = kstrtouint(page, 10, &tmp); if (ret) return ret; remove_userid_all_entry(tmp); return count; } static struct configfs_attribute packages_attr_packages_gid_list = { .ca_name = "packages_gid.list", .ca_mode = S_IRUGO, .ca_owner = THIS_MODULE, .show = packages_list_show, }; SDCARDFS_CONFIGFS_ATTR_WO(packages_, remove_userid); static struct configfs_attribute *packages_attrs[] = { &packages_attr_packages_gid_list, &packages_attr_remove_userid, NULL, }; /* * Note that, since no extra work is required on ->drop_item(), * no ->drop_item() is provided. */ static struct configfs_group_operations packages_group_ops = { .make_item = packages_make_item, }; static struct config_item_type packages_type = { .ct_group_ops = &packages_group_ops, .ct_attrs = packages_attrs, .ct_owner = THIS_MODULE, }; struct config_group *sd_default_groups[] = { &extension_group, NULL, }; static struct configfs_subsystem sdcardfs_packages = { .su_group = { .cg_item = { .ci_namebuf = "sdcardfs", .ci_type = &packages_type, }, }, }; static int configfs_sdcardfs_init(void) { int ret, i; struct configfs_subsystem *subsys = &sdcardfs_packages; config_group_init(&subsys->su_group); for (i = 0; sd_default_groups[i]; i++) { config_group_init(sd_default_groups[i]); configfs_add_default_group(sd_default_groups[i], &subsys->su_group); } mutex_init(&subsys->su_mutex); ret = configfs_register_subsystem(subsys); if (ret) { pr_err("Error %d while registering subsystem %s\n", ret, subsys->su_group.cg_item.ci_namebuf); } return ret; } static void configfs_sdcardfs_exit(void) { configfs_unregister_subsystem(&sdcardfs_packages); } int packagelist_init(void) { hashtable_entry_cachep = kmem_cache_create("packagelist_hashtable_entry", sizeof(struct hashtable_entry), 0, 0, NULL); if (!hashtable_entry_cachep) { pr_err("sdcardfs: failed creating pkgl_hashtable entry slab cache\n"); return -ENOMEM; } configfs_sdcardfs_init(); return 0; } void packagelist_exit(void) { configfs_sdcardfs_exit(); packagelist_destroy(); kmem_cache_destroy(hashtable_entry_cachep); }