blob: a6d87d900ce5e42b73a2a76acb4e678886b5b666 [file] [log] [blame]
Daniel Campello35c9e242015-07-20 16:23:50 -07001/*
2 * fs/sdcardfs/derived_perm.c
3 *
4 * Copyright (c) 2013 Samsung Electronics Co. Ltd
5 * Authors: Daeho Jeong, Woojoong Lee, Seunghwan Hyun,
6 * Sunghwan Yun, Sungjong Seo
7 *
8 * This program has been developed as a stackable file system based on
9 * the WrapFS which written by
10 *
11 * Copyright (c) 1998-2011 Erez Zadok
12 * Copyright (c) 2009 Shrikar Archak
13 * Copyright (c) 2003-2011 Stony Brook University
14 * Copyright (c) 2003-2011 The Research Foundation of SUNY
15 *
16 * This file is dual licensed. It may be redistributed and/or modified
17 * under the terms of the Apache 2.0 License OR version 2 of the GNU
18 * General Public License.
19 */
20
21#include "sdcardfs.h"
22
23/* copy derived state from parent inode */
24static void inherit_derived_state(struct inode *parent, struct inode *child)
25{
26 struct sdcardfs_inode_info *pi = SDCARDFS_I(parent);
27 struct sdcardfs_inode_info *ci = SDCARDFS_I(child);
28
29 ci->perm = PERM_INHERIT;
30 ci->userid = pi->userid;
31 ci->d_uid = pi->d_uid;
Daniel Rosenberg497ac902016-02-03 21:08:21 -080032 ci->under_android = pi->under_android;
Daniel Rosenberg5080d242016-05-18 16:57:10 -070033 set_top(ci, pi->top);
Daniel Campello35c9e242015-07-20 16:23:50 -070034}
35
36/* helper function for derived state */
Daniel Rosenberg5080d242016-05-18 16:57:10 -070037void setup_derived_state(struct inode *inode, perm_t perm, userid_t userid,
38 uid_t uid, bool under_android, struct inode *top)
Daniel Campello35c9e242015-07-20 16:23:50 -070039{
40 struct sdcardfs_inode_info *info = SDCARDFS_I(inode);
41
42 info->perm = perm;
43 info->userid = userid;
44 info->d_uid = uid;
Daniel Rosenberg497ac902016-02-03 21:08:21 -080045 info->under_android = under_android;
Daniel Rosenberg5080d242016-05-18 16:57:10 -070046 set_top(info, top);
Daniel Campello35c9e242015-07-20 16:23:50 -070047}
48
Daniel Rosenberg497ac902016-02-03 21:08:21 -080049/* While renaming, there is a point where we want the path from dentry, but the name from newdentry */
50void get_derived_permission_new(struct dentry *parent, struct dentry *dentry, struct dentry *newdentry)
Daniel Campello35c9e242015-07-20 16:23:50 -070051{
Daniel Rosenberg63d20762016-12-01 14:36:29 -080052 struct sdcardfs_inode_info *info = SDCARDFS_I(d_inode(dentry));
53 struct sdcardfs_inode_info *parent_info= SDCARDFS_I(d_inode(parent));
Daniel Campello35c9e242015-07-20 16:23:50 -070054 appid_t appid;
55
56 /* By default, each inode inherits from its parent.
57 * the properties are maintained on its private fields
58 * because the inode attributes will be modified with that of
59 * its lower inode.
60 * The derived state will be updated on the last
61 * stage of each system call by fix_derived_permission(inode).
62 */
63
Daniel Rosenberg63d20762016-12-01 14:36:29 -080064 inherit_derived_state(d_inode(parent), d_inode(dentry));
Daniel Campello35c9e242015-07-20 16:23:50 -070065
Daniel Campello35c9e242015-07-20 16:23:50 -070066 /* Derive custom permissions based on parent and current node */
67 switch (parent_info->perm) {
68 case PERM_INHERIT:
69 /* Already inherited above */
70 break;
Daniel Rosenberg497ac902016-02-03 21:08:21 -080071 case PERM_PRE_ROOT:
Daniel Campello35c9e242015-07-20 16:23:50 -070072 /* Legacy internal layout places users at top level */
73 info->perm = PERM_ROOT;
Daniel Rosenberg497ac902016-02-03 21:08:21 -080074 info->userid = simple_strtoul(newdentry->d_name.name, NULL, 10);
Daniel Rosenberg5080d242016-05-18 16:57:10 -070075 set_top(info, &info->vfs_inode);
Daniel Campello35c9e242015-07-20 16:23:50 -070076 break;
77 case PERM_ROOT:
78 /* Assume masked off by default. */
Daniel Rosenberg497ac902016-02-03 21:08:21 -080079 if (!strcasecmp(newdentry->d_name.name, "Android")) {
Daniel Campello35c9e242015-07-20 16:23:50 -070080 /* App-specific directories inside; let anyone traverse */
81 info->perm = PERM_ANDROID;
Daniel Rosenberg497ac902016-02-03 21:08:21 -080082 info->under_android = true;
Daniel Rosenberg5080d242016-05-18 16:57:10 -070083 set_top(info, &info->vfs_inode);
Daniel Campello35c9e242015-07-20 16:23:50 -070084 }
85 break;
86 case PERM_ANDROID:
Daniel Rosenberg497ac902016-02-03 21:08:21 -080087 if (!strcasecmp(newdentry->d_name.name, "data")) {
Daniel Campello35c9e242015-07-20 16:23:50 -070088 /* App-specific directories inside; let anyone traverse */
89 info->perm = PERM_ANDROID_DATA;
Daniel Rosenberg5080d242016-05-18 16:57:10 -070090 set_top(info, &info->vfs_inode);
Daniel Rosenberg497ac902016-02-03 21:08:21 -080091 } else if (!strcasecmp(newdentry->d_name.name, "obb")) {
Daniel Campello35c9e242015-07-20 16:23:50 -070092 /* App-specific directories inside; let anyone traverse */
93 info->perm = PERM_ANDROID_OBB;
Daniel Rosenberg5080d242016-05-18 16:57:10 -070094 set_top(info, &info->vfs_inode);
Daniel Campello35c9e242015-07-20 16:23:50 -070095 /* Single OBB directory is always shared */
Daniel Rosenberg497ac902016-02-03 21:08:21 -080096 } else if (!strcasecmp(newdentry->d_name.name, "media")) {
97 /* App-specific directories inside; let anyone traverse */
98 info->perm = PERM_ANDROID_MEDIA;
Daniel Rosenberg5080d242016-05-18 16:57:10 -070099 set_top(info, &info->vfs_inode);
Daniel Campello35c9e242015-07-20 16:23:50 -0700100 }
101 break;
Daniel Campello35c9e242015-07-20 16:23:50 -0700102 case PERM_ANDROID_DATA:
103 case PERM_ANDROID_OBB:
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800104 case PERM_ANDROID_MEDIA:
Daniel Rosenbergfbd34b62016-05-10 13:42:43 -0700105 appid = get_appid(newdentry->d_name.name);
Daniel Rosenbergd8caaf92017-01-22 15:32:49 -0800106 if (appid != 0 && !is_excluded(newdentry->d_name.name, parent_info->userid)) {
Daniel Campello35c9e242015-07-20 16:23:50 -0700107 info->d_uid = multiuser_get_uid(parent_info->userid, appid);
108 }
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700109 set_top(info, &info->vfs_inode);
Daniel Campello35c9e242015-07-20 16:23:50 -0700110 break;
111 }
112}
113
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800114void get_derived_permission(struct dentry *parent, struct dentry *dentry)
115{
116 get_derived_permission_new(parent, dentry, dentry);
117}
118
Daniel Rosenbergd8caaf92017-01-22 15:32:49 -0800119static int descendant_may_need_fixup(struct sdcardfs_inode_info *info, struct limit_search *limit)
120{
121 if (info->perm == PERM_ROOT)
122 return (limit->flags & BY_USERID)?info->userid == limit->userid:1;
123 if (info->perm == PERM_PRE_ROOT || info->perm == PERM_ANDROID)
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700124 return 1;
125 return 0;
126}
127
128static int needs_fixup(perm_t perm) {
129 if (perm == PERM_ANDROID_DATA || perm == PERM_ANDROID_OBB
130 || perm == PERM_ANDROID_MEDIA)
131 return 1;
132 return 0;
133}
134
Daniel Rosenbergd8caaf92017-01-22 15:32:49 -0800135void fixup_perms_recursive(struct dentry *dentry, struct limit_search *limit)
136{
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700137 struct dentry *child;
138 struct sdcardfs_inode_info *info;
139 if (!dget(dentry))
140 return;
Daniel Rosenberg63d20762016-12-01 14:36:29 -0800141 if (!d_inode(dentry)) {
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700142 dput(dentry);
143 return;
144 }
145 info = SDCARDFS_I(d_inode(dentry));
146
147 if (needs_fixup(info->perm)) {
Daniel Rosenberg3adfc032016-12-27 12:36:29 -0800148 spin_lock(&dentry->d_lock);
149 list_for_each_entry(child, &dentry->d_subdirs, d_child) {
Daniel Rosenbergd8caaf92017-01-22 15:32:49 -0800150 dget(child);
151 if (!(limit->flags & BY_NAME) || !strncasecmp(child->d_name.name, limit->name, limit->length)) {
152 if (d_inode(child)) {
153 get_derived_permission(dentry, child);
154 fixup_tmp_permissions(d_inode(child));
155 dput(child);
156 break;
Daniel Rosenberg3adfc032016-12-27 12:36:29 -0800157 }
Daniel Rosenbergd8caaf92017-01-22 15:32:49 -0800158 }
159 dput(child);
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700160 }
Daniel Rosenberg3adfc032016-12-27 12:36:29 -0800161 spin_unlock(&dentry->d_lock);
Daniel Rosenbergd8caaf92017-01-22 15:32:49 -0800162 } else if (descendant_may_need_fixup(info, limit)) {
Daniel Rosenberg3adfc032016-12-27 12:36:29 -0800163 spin_lock(&dentry->d_lock);
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700164 list_for_each_entry(child, &dentry->d_subdirs, d_child) {
Daniel Rosenbergd8caaf92017-01-22 15:32:49 -0800165 fixup_perms_recursive(child, limit);
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700166 }
Daniel Rosenberg3adfc032016-12-27 12:36:29 -0800167 spin_unlock(&dentry->d_lock);
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700168 }
169 dput(dentry);
170}
171
172void fixup_top_recursive(struct dentry *parent) {
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800173 struct dentry *dentry;
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700174 struct sdcardfs_inode_info *info;
175 if (!d_inode(parent))
176 return;
177 info = SDCARDFS_I(d_inode(parent));
Daniel Rosenbergcb1b9452016-08-16 15:19:26 -0700178 spin_lock(&parent->d_lock);
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800179 list_for_each_entry(dentry, &parent->d_subdirs, d_child) {
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700180 if (d_inode(dentry)) {
181 if (SDCARDFS_I(d_inode(parent))->top != SDCARDFS_I(d_inode(dentry))->top) {
182 get_derived_permission(parent, dentry);
Daniel Rosenberg90219272016-10-26 20:27:20 -0700183 fixup_tmp_permissions(d_inode(dentry));
Daniel Rosenberg5080d242016-05-18 16:57:10 -0700184 fixup_top_recursive(dentry);
185 }
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800186 }
187 }
Daniel Rosenbergcb1b9452016-08-16 15:19:26 -0700188 spin_unlock(&parent->d_lock);
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800189}
190
Daniel Campello35c9e242015-07-20 16:23:50 -0700191/* main function for updating derived permission */
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800192inline void update_derived_permission_lock(struct dentry *dentry)
Daniel Campello35c9e242015-07-20 16:23:50 -0700193{
194 struct dentry *parent;
195
Daniel Rosenberg63d20762016-12-01 14:36:29 -0800196 if(!dentry || !d_inode(dentry)) {
Daniel Campello35c9e242015-07-20 16:23:50 -0700197 printk(KERN_ERR "sdcardfs: %s: invalid dentry\n", __func__);
198 return;
199 }
200 /* FIXME:
201 * 1. need to check whether the dentry is updated or not
202 * 2. remove the root dentry update
203 */
204 if(IS_ROOT(dentry)) {
Daniel Rosenberg63d20762016-12-01 14:36:29 -0800205 //setup_default_pre_root_state(d_inode(dentry));
Daniel Campello35c9e242015-07-20 16:23:50 -0700206 } else {
207 parent = dget_parent(dentry);
208 if(parent) {
209 get_derived_permission(parent, dentry);
210 dput(parent);
211 }
212 }
Daniel Rosenberg90219272016-10-26 20:27:20 -0700213 fixup_tmp_permissions(d_inode(dentry));
Daniel Campello35c9e242015-07-20 16:23:50 -0700214}
215
216int need_graft_path(struct dentry *dentry)
217{
218 int ret = 0;
219 struct dentry *parent = dget_parent(dentry);
Daniel Rosenberg63d20762016-12-01 14:36:29 -0800220 struct sdcardfs_inode_info *parent_info= SDCARDFS_I(d_inode(parent));
Daniel Campello35c9e242015-07-20 16:23:50 -0700221 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dentry->d_sb);
222
223 if(parent_info->perm == PERM_ANDROID &&
224 !strcasecmp(dentry->d_name.name, "obb")) {
225
226 /* /Android/obb is the base obbpath of DERIVED_UNIFIED */
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800227 if(!(sbi->options.multiuser == false
Daniel Campello35c9e242015-07-20 16:23:50 -0700228 && parent_info->userid == 0)) {
229 ret = 1;
230 }
231 }
232 dput(parent);
233 return ret;
234}
235
236int is_obbpath_invalid(struct dentry *dent)
237{
238 int ret = 0;
239 struct sdcardfs_dentry_info *di = SDCARDFS_D(dent);
240 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dent->d_sb);
241 char *path_buf, *obbpath_s;
242
243 /* check the base obbpath has been changed.
244 * this routine can check an uninitialized obb dentry as well.
245 * regarding the uninitialized obb, refer to the sdcardfs_mkdir() */
246 spin_lock(&di->lock);
247 if(di->orig_path.dentry) {
248 if(!di->lower_path.dentry) {
249 ret = 1;
250 } else {
251 path_get(&di->lower_path);
252 //lower_parent = lock_parent(lower_path->dentry);
253
254 path_buf = kmalloc(PATH_MAX, GFP_ATOMIC);
255 if(!path_buf) {
256 ret = 1;
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800257 printk(KERN_ERR "sdcardfs: fail to allocate path_buf in %s.\n", __func__);
Daniel Campello35c9e242015-07-20 16:23:50 -0700258 } else {
259 obbpath_s = d_path(&di->lower_path, path_buf, PATH_MAX);
260 if (d_unhashed(di->lower_path.dentry) ||
261 strcasecmp(sbi->obbpath_s, obbpath_s)) {
262 ret = 1;
263 }
264 kfree(path_buf);
265 }
266
267 //unlock_dir(lower_parent);
268 path_put(&di->lower_path);
269 }
270 }
271 spin_unlock(&di->lock);
272 return ret;
273}
274
275int is_base_obbpath(struct dentry *dentry)
276{
277 int ret = 0;
278 struct dentry *parent = dget_parent(dentry);
Daniel Rosenberg63d20762016-12-01 14:36:29 -0800279 struct sdcardfs_inode_info *parent_info= SDCARDFS_I(d_inode(parent));
Daniel Campello35c9e242015-07-20 16:23:50 -0700280 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dentry->d_sb);
281
282 spin_lock(&SDCARDFS_D(dentry)->lock);
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800283 if (sbi->options.multiuser) {
284 if(parent_info->perm == PERM_PRE_ROOT &&
285 !strcasecmp(dentry->d_name.name, "obb")) {
286 ret = 1;
287 }
288 } else if (parent_info->perm == PERM_ANDROID &&
Daniel Campello35c9e242015-07-20 16:23:50 -0700289 !strcasecmp(dentry->d_name.name, "obb")) {
290 ret = 1;
291 }
Daniel Campello35c9e242015-07-20 16:23:50 -0700292 spin_unlock(&SDCARDFS_D(dentry)->lock);
Daniel Campello35c9e242015-07-20 16:23:50 -0700293 return ret;
294}
295
296/* The lower_path will be stored to the dentry's orig_path
297 * and the base obbpath will be copyed to the lower_path variable.
298 * if an error returned, there's no change in the lower_path
299 * returns: -ERRNO if error (0: no error) */
300int setup_obb_dentry(struct dentry *dentry, struct path *lower_path)
301{
302 int err = 0;
303 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dentry->d_sb);
304 struct path obbpath;
305
306 /* A local obb dentry must have its own orig_path to support rmdir
307 * and mkdir of itself. Usually, we expect that the sbi->obbpath
308 * is avaiable on this stage. */
309 sdcardfs_set_orig_path(dentry, lower_path);
310
311 err = kern_path(sbi->obbpath_s,
312 LOOKUP_FOLLOW | LOOKUP_DIRECTORY, &obbpath);
313
314 if(!err) {
315 /* the obbpath base has been found */
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800316 printk(KERN_INFO "sdcardfs: the sbi->obbpath is found\n");
Daniel Campello35c9e242015-07-20 16:23:50 -0700317 pathcpy(lower_path, &obbpath);
318 } else {
319 /* if the sbi->obbpath is not available, we can optionally
320 * setup the lower_path with its orig_path.
321 * but, the current implementation just returns an error
322 * because the sdcard daemon also regards this case as
323 * a lookup fail. */
Daniel Rosenberg497ac902016-02-03 21:08:21 -0800324 printk(KERN_INFO "sdcardfs: the sbi->obbpath is not available\n");
Daniel Campello35c9e242015-07-20 16:23:50 -0700325 }
326 return err;
327}
328
329