blob: 372ae7c20cb226b23b4df33f0fc9d9949981b35f [file] [log] [blame]
Daniel Campello3a703812015-07-20 16:23:50 -07001/*
2 * fs/sdcardfs/derived_perm.c
3 *
4 * Copyright (c) 2013 Samsung Electronics Co. Ltd
5 * Authors: Daeho Jeong, Woojoong Lee, Seunghwan Hyun,
6 * Sunghwan Yun, Sungjong Seo
7 *
8 * This program has been developed as a stackable file system based on
9 * the WrapFS which written by
10 *
11 * Copyright (c) 1998-2011 Erez Zadok
12 * Copyright (c) 2009 Shrikar Archak
13 * Copyright (c) 2003-2011 Stony Brook University
14 * Copyright (c) 2003-2011 The Research Foundation of SUNY
15 *
16 * This file is dual licensed. It may be redistributed and/or modified
17 * under the terms of the Apache 2.0 License OR version 2 of the GNU
18 * General Public License.
19 */
20
21#include "sdcardfs.h"
22
23/* copy derived state from parent inode */
24static void inherit_derived_state(struct inode *parent, struct inode *child)
25{
26 struct sdcardfs_inode_info *pi = SDCARDFS_I(parent);
27 struct sdcardfs_inode_info *ci = SDCARDFS_I(child);
28
Daniel Rosenberged4e2532017-05-15 14:03:15 -070029 ci->data->perm = PERM_INHERIT;
30 ci->data->userid = pi->data->userid;
31 ci->data->d_uid = pi->data->d_uid;
32 ci->data->under_android = pi->data->under_android;
33 ci->data->under_cache = pi->data->under_cache;
34 ci->data->under_obb = pi->data->under_obb;
Daniel Campello3a703812015-07-20 16:23:50 -070035}
36
37/* helper function for derived state */
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -070038void setup_derived_state(struct inode *inode, perm_t perm, userid_t userid,
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -080039 uid_t uid)
Daniel Campello3a703812015-07-20 16:23:50 -070040{
41 struct sdcardfs_inode_info *info = SDCARDFS_I(inode);
42
Daniel Rosenberged4e2532017-05-15 14:03:15 -070043 info->data->perm = perm;
44 info->data->userid = userid;
45 info->data->d_uid = uid;
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -080046 info->data->under_android = false;
Daniel Rosenberged4e2532017-05-15 14:03:15 -070047 info->data->under_cache = false;
48 info->data->under_obb = false;
Daniel Campello3a703812015-07-20 16:23:50 -070049}
50
Daniel Rosenbergbeb00302017-03-16 17:42:58 -070051/* While renaming, there is a point where we want the path from dentry,
52 * but the name from newdentry
53 */
54void get_derived_permission_new(struct dentry *parent, struct dentry *dentry,
55 const struct qstr *name)
Daniel Campello3a703812015-07-20 16:23:50 -070056{
Daniel Campello3a703812015-07-20 16:23:50 -070057 struct sdcardfs_inode_info *info = SDCARDFS_I(dentry->d_inode);
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -080058 struct sdcardfs_inode_info *parent_info = SDCARDFS_I(parent->d_inode);
59 struct sdcardfs_inode_data *parent_data = parent_info->data;
Daniel Campello3a703812015-07-20 16:23:50 -070060 appid_t appid;
Daniel Rosenbergd5169242017-03-16 19:32:59 -070061 unsigned long user_num;
62 int err;
Daniel Rosenberg2d336b62017-01-31 20:07:51 -080063 struct qstr q_Android = QSTR_LITERAL("Android");
64 struct qstr q_data = QSTR_LITERAL("data");
Daniel Rosenberg17fbb3f2018-10-25 16:22:50 -070065 struct qstr q_sandbox = QSTR_LITERAL("sandbox");
Daniel Rosenberg2d336b62017-01-31 20:07:51 -080066 struct qstr q_obb = QSTR_LITERAL("obb");
67 struct qstr q_media = QSTR_LITERAL("media");
68 struct qstr q_cache = QSTR_LITERAL("cache");
Daniel Campello3a703812015-07-20 16:23:50 -070069
70 /* By default, each inode inherits from its parent.
71 * the properties are maintained on its private fields
72 * because the inode attributes will be modified with that of
73 * its lower inode.
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -080074 * These values are used by our custom permission call instead
75 * of using the inode permissions.
Daniel Campello3a703812015-07-20 16:23:50 -070076 */
77
78 inherit_derived_state(parent->d_inode, dentry->d_inode);
79
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -080080 /* Files don't get special labels */
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -080081 if (!S_ISDIR(dentry->d_inode->i_mode)) {
82 set_top(info, parent_info);
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -080083 return;
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -080084 }
Daniel Campello3a703812015-07-20 16:23:50 -070085 /* Derive custom permissions based on parent and current node */
Daniel Rosenberged4e2532017-05-15 14:03:15 -070086 switch (parent_data->perm) {
Daniel Rosenbergbeb00302017-03-16 17:42:58 -070087 case PERM_INHERIT:
88 case PERM_ANDROID_PACKAGE_CACHE:
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -080089 set_top(info, parent_info);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -070090 break;
91 case PERM_PRE_ROOT:
92 /* Legacy internal layout places users at top level */
Daniel Rosenberged4e2532017-05-15 14:03:15 -070093 info->data->perm = PERM_ROOT;
Daniel Rosenbergd5169242017-03-16 19:32:59 -070094 err = kstrtoul(name->name, 10, &user_num);
95 if (err)
Daniel Rosenberged4e2532017-05-15 14:03:15 -070096 info->data->userid = 0;
Daniel Rosenbergd5169242017-03-16 19:32:59 -070097 else
Daniel Rosenberged4e2532017-05-15 14:03:15 -070098 info->data->userid = user_num;
Daniel Rosenbergbeb00302017-03-16 17:42:58 -070099 break;
100 case PERM_ROOT:
101 /* Assume masked off by default. */
102 if (qstr_case_eq(name, &q_Android)) {
103 /* App-specific directories inside; let anyone traverse */
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700104 info->data->perm = PERM_ANDROID;
105 info->data->under_android = true;
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -0800106 } else {
107 set_top(info, parent_info);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700108 }
109 break;
110 case PERM_ANDROID:
111 if (qstr_case_eq(name, &q_data)) {
112 /* App-specific directories inside; let anyone traverse */
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700113 info->data->perm = PERM_ANDROID_DATA;
Daniel Rosenberg17fbb3f2018-10-25 16:22:50 -0700114 } else if (qstr_case_eq(name, &q_sandbox)) {
115 /* App-specific directories inside; let anyone traverse */
116 info->data->perm = PERM_ANDROID_DATA;
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700117 } else if (qstr_case_eq(name, &q_obb)) {
118 /* App-specific directories inside; let anyone traverse */
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700119 info->data->perm = PERM_ANDROID_OBB;
120 info->data->under_obb = true;
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700121 /* Single OBB directory is always shared */
122 } else if (qstr_case_eq(name, &q_media)) {
123 /* App-specific directories inside; let anyone traverse */
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700124 info->data->perm = PERM_ANDROID_MEDIA;
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -0800125 } else {
126 set_top(info, parent_info);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700127 }
128 break;
129 case PERM_ANDROID_OBB:
130 case PERM_ANDROID_DATA:
131 case PERM_ANDROID_MEDIA:
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700132 info->data->perm = PERM_ANDROID_PACKAGE;
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700133 appid = get_appid(name->name);
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700134 if (appid != 0 && !is_excluded(name->name, parent_data->userid))
135 info->data->d_uid =
136 multiuser_get_uid(parent_data->userid, appid);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700137 break;
138 case PERM_ANDROID_PACKAGE:
139 if (qstr_case_eq(name, &q_cache)) {
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700140 info->data->perm = PERM_ANDROID_PACKAGE_CACHE;
141 info->data->under_cache = true;
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700142 }
Daniel Rosenbergdc2e3812018-02-01 16:52:22 -0800143 set_top(info, parent_info);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700144 break;
Daniel Campello3a703812015-07-20 16:23:50 -0700145 }
146}
147
Daniel Rosenberg5c09ef42016-02-03 21:08:21 -0800148void get_derived_permission(struct dentry *parent, struct dentry *dentry)
149{
Daniel Rosenberg2d336b62017-01-31 20:07:51 -0800150 get_derived_permission_new(parent, dentry, &dentry->d_name);
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800151}
152
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700153static appid_t get_type(const char *name)
154{
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800155 const char *ext = strrchr(name, '.');
156 appid_t id;
157
158 if (ext && ext[0]) {
159 ext = &ext[1];
160 id = get_ext_gid(ext);
161 return id?:AID_MEDIA_RW;
162 }
163 return AID_MEDIA_RW;
164}
165
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700166void fixup_lower_ownership(struct dentry *dentry, const char *name)
167{
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800168 struct path path;
169 struct inode *inode;
170 int error;
171 struct sdcardfs_inode_info *info;
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700172 struct sdcardfs_inode_data *info_d;
173 struct sdcardfs_inode_data *info_top;
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800174 perm_t perm;
175 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dentry->d_sb);
176 uid_t uid = sbi->options.fs_low_uid;
177 gid_t gid = sbi->options.fs_low_gid;
178 struct iattr newattrs;
179
Daniel Rosenberg36ae01f2017-07-19 17:25:07 -0700180 if (!sbi->options.gid_derivation)
181 return;
182
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800183 info = SDCARDFS_I(dentry->d_inode);
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700184 info_d = info->data;
185 perm = info_d->perm;
186 if (info_d->under_obb) {
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800187 perm = PERM_ANDROID_OBB;
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700188 } else if (info_d->under_cache) {
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800189 perm = PERM_ANDROID_PACKAGE_CACHE;
190 } else if (perm == PERM_INHERIT) {
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700191 info_top = top_data_get(info);
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800192 perm = info_top->perm;
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700193 data_put(info_top);
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800194 }
195
196 switch (perm) {
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700197 case PERM_ROOT:
198 case PERM_ANDROID:
199 case PERM_ANDROID_DATA:
200 case PERM_ANDROID_MEDIA:
201 case PERM_ANDROID_PACKAGE:
202 case PERM_ANDROID_PACKAGE_CACHE:
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700203 uid = multiuser_get_uid(info_d->userid, uid);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700204 break;
205 case PERM_ANDROID_OBB:
206 uid = AID_MEDIA_OBB;
207 break;
208 case PERM_PRE_ROOT:
209 default:
210 break;
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800211 }
212 switch (perm) {
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700213 case PERM_ROOT:
214 case PERM_ANDROID:
215 case PERM_ANDROID_DATA:
216 case PERM_ANDROID_MEDIA:
217 if (S_ISDIR(dentry->d_inode->i_mode))
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700218 gid = multiuser_get_uid(info_d->userid, AID_MEDIA_RW);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700219 else
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700220 gid = multiuser_get_uid(info_d->userid, get_type(name));
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700221 break;
222 case PERM_ANDROID_OBB:
223 gid = AID_MEDIA_OBB;
224 break;
225 case PERM_ANDROID_PACKAGE:
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700226 if (uid_is_app(info_d->d_uid))
227 gid = multiuser_get_ext_gid(info_d->d_uid);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700228 else
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700229 gid = multiuser_get_uid(info_d->userid, AID_MEDIA_RW);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700230 break;
231 case PERM_ANDROID_PACKAGE_CACHE:
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700232 if (uid_is_app(info_d->d_uid))
233 gid = multiuser_get_ext_cache_gid(info_d->d_uid);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700234 else
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700235 gid = multiuser_get_uid(info_d->userid, AID_MEDIA_RW);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700236 break;
237 case PERM_PRE_ROOT:
238 default:
239 break;
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800240 }
241
242 sdcardfs_get_lower_path(dentry, &path);
243 inode = path.dentry->d_inode;
244 if (path.dentry->d_inode->i_gid != gid || path.dentry->d_inode->i_uid != uid) {
245 newattrs.ia_valid = ATTR_GID | ATTR_UID | ATTR_FORCE;
246 newattrs.ia_uid = uid;
247 newattrs.ia_gid = gid;
248 if (!S_ISDIR(inode->i_mode))
249 newattrs.ia_valid |=
250 ATTR_KILL_SUID | ATTR_KILL_SGID | ATTR_KILL_PRIV;
251 mutex_lock(&inode->i_mutex);
252 error = security_path_chown(&path, newattrs.ia_uid, newattrs.ia_gid);
253 if (!error)
254 error = notify_change2(path.mnt, path.dentry, &newattrs);
255 mutex_unlock(&inode->i_mutex);
256 if (error)
Daniel Rosenberg19bfc6e2017-04-18 22:49:38 -0700257 pr_debug("sdcardfs: Failed to touch up lower fs gid/uid for %s\n", name);
Daniel Rosenbergb7c13d82017-01-25 13:48:45 -0800258 }
Daniel Rosenberg693a9122017-02-16 17:55:22 -0800259 sdcardfs_put_lower_path(dentry, &path);
Daniel Rosenberg5c09ef42016-02-03 21:08:21 -0800260}
261
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700262static int descendant_may_need_fixup(struct sdcardfs_inode_data *data,
263 struct limit_search *limit)
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700264{
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700265 if (data->perm == PERM_ROOT)
266 return (limit->flags & BY_USERID) ?
267 data->userid == limit->userid : 1;
268 if (data->perm == PERM_PRE_ROOT || data->perm == PERM_ANDROID)
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700269 return 1;
270 return 0;
271}
272
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700273static int needs_fixup(perm_t perm)
274{
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700275 if (perm == PERM_ANDROID_DATA || perm == PERM_ANDROID_OBB
276 || perm == PERM_ANDROID_MEDIA)
277 return 1;
278 return 0;
279}
280
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700281static void __fixup_perms_recursive(struct dentry *dentry, struct limit_search *limit, int depth)
282{
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700283 struct dentry *child;
284 struct sdcardfs_inode_info *info;
Daniel Rosenbergf0605742017-03-02 15:11:27 -0800285
286 /*
287 * All paths will terminate their recursion on hitting PERM_ANDROID_OBB,
288 * PERM_ANDROID_MEDIA, or PERM_ANDROID_DATA. This happens at a depth of
289 * at most 3.
290 */
291 WARN(depth > 3, "%s: Max expected depth exceeded!\n", __func__);
292 spin_lock_nested(&dentry->d_lock, depth);
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700293 if (!dentry->d_inode) {
Daniel Rosenbergf0605742017-03-02 15:11:27 -0800294 spin_unlock(&dentry->d_lock);
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700295 return;
296 }
297 info = SDCARDFS_I(dentry->d_inode);
298
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700299 if (needs_fixup(info->data->perm)) {
Daniel Rosenberg6d990542016-12-27 12:36:29 -0800300 list_for_each_entry(child, &dentry->d_subdirs, d_child) {
Daniel Rosenbergf0605742017-03-02 15:11:27 -0800301 spin_lock_nested(&child->d_lock, depth + 1);
Daniel Rosenberg47b534f2017-03-08 17:20:02 -0800302 if (!(limit->flags & BY_NAME) || qstr_case_eq(&child->d_name, &limit->name)) {
Daniel Rosenberg6a7ea012017-01-22 15:32:49 -0800303 if (child->d_inode) {
304 get_derived_permission(dentry, child);
305 fixup_tmp_permissions(child->d_inode);
Daniel Rosenbergf0605742017-03-02 15:11:27 -0800306 spin_unlock(&child->d_lock);
Daniel Rosenberg6a7ea012017-01-22 15:32:49 -0800307 break;
Daniel Rosenberg6d990542016-12-27 12:36:29 -0800308 }
Daniel Rosenberg6a7ea012017-01-22 15:32:49 -0800309 }
Daniel Rosenbergf0605742017-03-02 15:11:27 -0800310 spin_unlock(&child->d_lock);
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700311 }
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700312 } else if (descendant_may_need_fixup(info->data, limit)) {
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700313 list_for_each_entry(child, &dentry->d_subdirs, d_child) {
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700314 __fixup_perms_recursive(child, limit, depth + 1);
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700315 }
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700316 }
Daniel Rosenbergf0605742017-03-02 15:11:27 -0800317 spin_unlock(&dentry->d_lock);
318}
319
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700320void fixup_perms_recursive(struct dentry *dentry, struct limit_search *limit)
321{
Daniel Rosenbergf0605742017-03-02 15:11:27 -0800322 __fixup_perms_recursive(dentry, limit, 0);
Daniel Rosenberg3286c8a2016-05-18 16:57:10 -0700323}
324
Daniel Campello3a703812015-07-20 16:23:50 -0700325/* main function for updating derived permission */
Daniel Rosenberg5c09ef42016-02-03 21:08:21 -0800326inline void update_derived_permission_lock(struct dentry *dentry)
Daniel Campello3a703812015-07-20 16:23:50 -0700327{
328 struct dentry *parent;
329
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700330 if (!dentry || !dentry->d_inode) {
Daniel Rosenberg720f8572017-03-16 17:46:13 -0700331 pr_err("sdcardfs: %s: invalid dentry\n", __func__);
Daniel Campello3a703812015-07-20 16:23:50 -0700332 return;
333 }
334 /* FIXME:
335 * 1. need to check whether the dentry is updated or not
336 * 2. remove the root dentry update
337 */
Daniel Rosenberg0eacfdd2017-03-16 19:33:35 -0700338 if (!IS_ROOT(dentry)) {
Daniel Campello3a703812015-07-20 16:23:50 -0700339 parent = dget_parent(dentry);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700340 if (parent) {
Daniel Campello3a703812015-07-20 16:23:50 -0700341 get_derived_permission(parent, dentry);
342 dput(parent);
343 }
344 }
Daniel Rosenberga95870e2016-10-26 20:27:20 -0700345 fixup_tmp_permissions(dentry->d_inode);
Daniel Campello3a703812015-07-20 16:23:50 -0700346}
347
348int need_graft_path(struct dentry *dentry)
349{
350 int ret = 0;
351 struct dentry *parent = dget_parent(dentry);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700352 struct sdcardfs_inode_info *parent_info = SDCARDFS_I(parent->d_inode);
Daniel Campello3a703812015-07-20 16:23:50 -0700353 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dentry->d_sb);
Daniel Rosenberg2d336b62017-01-31 20:07:51 -0800354 struct qstr obb = QSTR_LITERAL("obb");
Daniel Campello3a703812015-07-20 16:23:50 -0700355
Daniel Rosenbergb315cf12018-10-25 16:25:15 -0700356 if (!sbi->options.unshared_obb &&
357 parent_info->data->perm == PERM_ANDROID &&
Daniel Rosenberg2d336b62017-01-31 20:07:51 -0800358 qstr_case_eq(&dentry->d_name, &obb)) {
Daniel Campello3a703812015-07-20 16:23:50 -0700359
360 /* /Android/obb is the base obbpath of DERIVED_UNIFIED */
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700361 if (!(sbi->options.multiuser == false
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700362 && parent_info->data->userid == 0)) {
Daniel Campello3a703812015-07-20 16:23:50 -0700363 ret = 1;
364 }
365 }
366 dput(parent);
367 return ret;
368}
369
370int is_obbpath_invalid(struct dentry *dent)
371{
372 int ret = 0;
373 struct sdcardfs_dentry_info *di = SDCARDFS_D(dent);
374 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dent->d_sb);
375 char *path_buf, *obbpath_s;
Daniel Rosenbergf60ac802017-03-10 13:54:30 -0800376 int need_put = 0;
377 struct path lower_path;
Daniel Campello3a703812015-07-20 16:23:50 -0700378
379 /* check the base obbpath has been changed.
380 * this routine can check an uninitialized obb dentry as well.
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700381 * regarding the uninitialized obb, refer to the sdcardfs_mkdir()
382 */
Daniel Campello3a703812015-07-20 16:23:50 -0700383 spin_lock(&di->lock);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700384 if (di->orig_path.dentry) {
385 if (!di->lower_path.dentry) {
Daniel Campello3a703812015-07-20 16:23:50 -0700386 ret = 1;
387 } else {
388 path_get(&di->lower_path);
Daniel Campello3a703812015-07-20 16:23:50 -0700389
390 path_buf = kmalloc(PATH_MAX, GFP_ATOMIC);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700391 if (!path_buf) {
Daniel Campello3a703812015-07-20 16:23:50 -0700392 ret = 1;
Daniel Rosenberg720f8572017-03-16 17:46:13 -0700393 pr_err("sdcardfs: fail to allocate path_buf in %s.\n", __func__);
Daniel Campello3a703812015-07-20 16:23:50 -0700394 } else {
395 obbpath_s = d_path(&di->lower_path, path_buf, PATH_MAX);
396 if (d_unhashed(di->lower_path.dentry) ||
Daniel Rosenberg2d336b62017-01-31 20:07:51 -0800397 !str_case_eq(sbi->obbpath_s, obbpath_s)) {
Daniel Campello3a703812015-07-20 16:23:50 -0700398 ret = 1;
399 }
400 kfree(path_buf);
401 }
402
Daniel Rosenbergf60ac802017-03-10 13:54:30 -0800403 pathcpy(&lower_path, &di->lower_path);
404 need_put = 1;
Daniel Campello3a703812015-07-20 16:23:50 -0700405 }
406 }
407 spin_unlock(&di->lock);
Daniel Rosenbergf60ac802017-03-10 13:54:30 -0800408 if (need_put)
409 path_put(&lower_path);
Daniel Campello3a703812015-07-20 16:23:50 -0700410 return ret;
411}
412
413int is_base_obbpath(struct dentry *dentry)
414{
415 int ret = 0;
416 struct dentry *parent = dget_parent(dentry);
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700417 struct sdcardfs_inode_info *parent_info = SDCARDFS_I(parent->d_inode);
Daniel Campello3a703812015-07-20 16:23:50 -0700418 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dentry->d_sb);
Daniel Rosenberg2d336b62017-01-31 20:07:51 -0800419 struct qstr q_obb = QSTR_LITERAL("obb");
Daniel Campello3a703812015-07-20 16:23:50 -0700420
421 spin_lock(&SDCARDFS_D(dentry)->lock);
Daniel Rosenberg5c09ef42016-02-03 21:08:21 -0800422 if (sbi->options.multiuser) {
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700423 if (parent_info->data->perm == PERM_PRE_ROOT &&
Daniel Rosenberg2d336b62017-01-31 20:07:51 -0800424 qstr_case_eq(&dentry->d_name, &q_obb)) {
Daniel Rosenberg5c09ef42016-02-03 21:08:21 -0800425 ret = 1;
426 }
Daniel Rosenberged4e2532017-05-15 14:03:15 -0700427 } else if (parent_info->data->perm == PERM_ANDROID &&
Daniel Rosenberg2d336b62017-01-31 20:07:51 -0800428 qstr_case_eq(&dentry->d_name, &q_obb)) {
Daniel Campello3a703812015-07-20 16:23:50 -0700429 ret = 1;
430 }
Daniel Campello3a703812015-07-20 16:23:50 -0700431 spin_unlock(&SDCARDFS_D(dentry)->lock);
Daniel Campello3a703812015-07-20 16:23:50 -0700432 return ret;
433}
434
435/* The lower_path will be stored to the dentry's orig_path
436 * and the base obbpath will be copyed to the lower_path variable.
437 * if an error returned, there's no change in the lower_path
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700438 * returns: -ERRNO if error (0: no error)
439 */
Daniel Campello3a703812015-07-20 16:23:50 -0700440int setup_obb_dentry(struct dentry *dentry, struct path *lower_path)
441{
442 int err = 0;
443 struct sdcardfs_sb_info *sbi = SDCARDFS_SB(dentry->d_sb);
444 struct path obbpath;
445
446 /* A local obb dentry must have its own orig_path to support rmdir
447 * and mkdir of itself. Usually, we expect that the sbi->obbpath
Daniel Rosenberg0eacfdd2017-03-16 19:33:35 -0700448 * is avaiable on this stage.
449 */
Daniel Campello3a703812015-07-20 16:23:50 -0700450 sdcardfs_set_orig_path(dentry, lower_path);
451
452 err = kern_path(sbi->obbpath_s,
453 LOOKUP_FOLLOW | LOOKUP_DIRECTORY, &obbpath);
454
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700455 if (!err) {
Daniel Campello3a703812015-07-20 16:23:50 -0700456 /* the obbpath base has been found */
Daniel Campello3a703812015-07-20 16:23:50 -0700457 pathcpy(lower_path, &obbpath);
458 } else {
459 /* if the sbi->obbpath is not available, we can optionally
460 * setup the lower_path with its orig_path.
461 * but, the current implementation just returns an error
462 * because the sdcard daemon also regards this case as
Daniel Rosenbergbeb00302017-03-16 17:42:58 -0700463 * a lookup fail.
464 */
Daniel Rosenberg720f8572017-03-16 17:46:13 -0700465 pr_info("sdcardfs: the sbi->obbpath is not available\n");
Daniel Campello3a703812015-07-20 16:23:50 -0700466 }
467 return err;
468}
469
470