TOMOYO: Merge path_group and number_group.
[deliverable/linux.git] / security / tomoyo / gc.c
CommitLineData
847b173e
TH
1/*
2 * security/tomoyo/gc.c
3 *
4 * Implementation of the Domain-Based Mandatory Access Control.
5 *
6 * Copyright (C) 2005-2010 NTT DATA CORPORATION
7 *
8 */
9
10#include "common.h"
11#include <linux/kthread.h>
5a0e3ad6 12#include <linux/slab.h>
847b173e 13
847b173e
TH
14struct tomoyo_gc_entry {
15 struct list_head list;
16 int type;
e79acf0e 17 struct list_head *element;
847b173e
TH
18};
19static LIST_HEAD(tomoyo_gc_queue);
20static DEFINE_MUTEX(tomoyo_gc_mutex);
21
22/* Caller holds tomoyo_policy_lock mutex. */
e79acf0e 23static bool tomoyo_add_to_gc(const int type, struct list_head *element)
847b173e
TH
24{
25 struct tomoyo_gc_entry *entry = kzalloc(sizeof(*entry), GFP_ATOMIC);
26 if (!entry)
27 return false;
28 entry->type = type;
29 entry->element = element;
30 list_add(&entry->list, &tomoyo_gc_queue);
e79acf0e 31 list_del_rcu(element);
847b173e
TH
32 return true;
33}
34
e79acf0e 35static void tomoyo_del_allow_read(struct list_head *element)
847b173e 36{
e79acf0e
TH
37 struct tomoyo_globally_readable_file_entry *ptr =
38 container_of(element, typeof(*ptr), head.list);
847b173e
TH
39 tomoyo_put_name(ptr->filename);
40}
41
e79acf0e 42static void tomoyo_del_file_pattern(struct list_head *element)
847b173e 43{
e79acf0e
TH
44 struct tomoyo_pattern_entry *ptr =
45 container_of(element, typeof(*ptr), head.list);
847b173e
TH
46 tomoyo_put_name(ptr->pattern);
47}
48
e79acf0e 49static void tomoyo_del_no_rewrite(struct list_head *element)
847b173e 50{
e79acf0e
TH
51 struct tomoyo_no_rewrite_entry *ptr =
52 container_of(element, typeof(*ptr), head.list);
847b173e
TH
53 tomoyo_put_name(ptr->pattern);
54}
55
e79acf0e 56static void tomoyo_del_domain_initializer(struct list_head *element)
847b173e 57{
e79acf0e
TH
58 struct tomoyo_domain_initializer_entry *ptr =
59 container_of(element, typeof(*ptr), head.list);
847b173e
TH
60 tomoyo_put_name(ptr->domainname);
61 tomoyo_put_name(ptr->program);
62}
63
e79acf0e 64static void tomoyo_del_domain_keeper(struct list_head *element)
847b173e 65{
e79acf0e
TH
66 struct tomoyo_domain_keeper_entry *ptr =
67 container_of(element, typeof(*ptr), head.list);
847b173e
TH
68 tomoyo_put_name(ptr->domainname);
69 tomoyo_put_name(ptr->program);
70}
71
e79acf0e 72static void tomoyo_del_aggregator(struct list_head *element)
1084307c 73{
e79acf0e
TH
74 struct tomoyo_aggregator_entry *ptr =
75 container_of(element, typeof(*ptr), head.list);
1084307c
TH
76 tomoyo_put_name(ptr->original_name);
77 tomoyo_put_name(ptr->aggregated_name);
78}
79
e79acf0e 80static void tomoyo_del_alias(struct list_head *element)
847b173e 81{
e79acf0e
TH
82 struct tomoyo_alias_entry *ptr =
83 container_of(element, typeof(*ptr), head.list);
847b173e
TH
84 tomoyo_put_name(ptr->original_name);
85 tomoyo_put_name(ptr->aliased_name);
86}
87
e79acf0e 88static void tomoyo_del_manager(struct list_head *element)
847b173e 89{
e79acf0e
TH
90 struct tomoyo_policy_manager_entry *ptr =
91 container_of(element, typeof(*ptr), head.list);
847b173e
TH
92 tomoyo_put_name(ptr->manager);
93}
94
e79acf0e 95static void tomoyo_del_acl(struct list_head *element)
847b173e 96{
e79acf0e
TH
97 struct tomoyo_acl_info *acl =
98 container_of(element, typeof(*acl), list);
847b173e 99 switch (acl->type) {
7ef61233 100 case TOMOYO_TYPE_PATH_ACL:
847b173e 101 {
7ef61233 102 struct tomoyo_path_acl *entry
847b173e 103 = container_of(acl, typeof(*entry), head);
7762fbff 104 tomoyo_put_name_union(&entry->name);
847b173e
TH
105 }
106 break;
7ef61233 107 case TOMOYO_TYPE_PATH2_ACL:
847b173e 108 {
7ef61233 109 struct tomoyo_path2_acl *entry
847b173e 110 = container_of(acl, typeof(*entry), head);
7762fbff
TH
111 tomoyo_put_name_union(&entry->name1);
112 tomoyo_put_name_union(&entry->name2);
847b173e
TH
113 }
114 break;
a1f9bb6a
TH
115 case TOMOYO_TYPE_PATH_NUMBER_ACL:
116 {
117 struct tomoyo_path_number_acl *entry
118 = container_of(acl, typeof(*entry), head);
119 tomoyo_put_name_union(&entry->name);
120 tomoyo_put_number_union(&entry->number);
121 }
122 break;
75093152 123 case TOMOYO_TYPE_MKDEV_ACL:
a1f9bb6a 124 {
75093152 125 struct tomoyo_mkdev_acl *entry
a1f9bb6a
TH
126 = container_of(acl, typeof(*entry), head);
127 tomoyo_put_name_union(&entry->name);
128 tomoyo_put_number_union(&entry->mode);
129 tomoyo_put_number_union(&entry->major);
130 tomoyo_put_number_union(&entry->minor);
131 }
132 break;
2106ccd9
TH
133 case TOMOYO_TYPE_MOUNT_ACL:
134 {
135 struct tomoyo_mount_acl *entry
136 = container_of(acl, typeof(*entry), head);
137 tomoyo_put_name_union(&entry->dev_name);
138 tomoyo_put_name_union(&entry->dir_name);
139 tomoyo_put_name_union(&entry->fs_type);
140 tomoyo_put_number_union(&entry->flags);
141 }
142 break;
847b173e
TH
143 }
144}
145
e79acf0e 146static bool tomoyo_del_domain(struct list_head *element)
847b173e 147{
e79acf0e
TH
148 struct tomoyo_domain_info *domain =
149 container_of(element, typeof(*domain), list);
847b173e
TH
150 struct tomoyo_acl_info *acl;
151 struct tomoyo_acl_info *tmp;
152 /*
153 * Since we don't protect whole execve() operation using SRCU,
154 * we need to recheck domain->users at this point.
155 *
156 * (1) Reader starts SRCU section upon execve().
157 * (2) Reader traverses tomoyo_domain_list and finds this domain.
158 * (3) Writer marks this domain as deleted.
159 * (4) Garbage collector removes this domain from tomoyo_domain_list
160 * because this domain is marked as deleted and used by nobody.
161 * (5) Reader saves reference to this domain into
162 * "struct linux_binprm"->cred->security .
163 * (6) Reader finishes SRCU section, although execve() operation has
164 * not finished yet.
165 * (7) Garbage collector waits for SRCU synchronization.
166 * (8) Garbage collector kfree() this domain because this domain is
167 * used by nobody.
168 * (9) Reader finishes execve() operation and restores this domain from
169 * "struct linux_binprm"->cred->security.
170 *
171 * By updating domain->users at (5), we can solve this race problem
172 * by rechecking domain->users at (8).
173 */
174 if (atomic_read(&domain->users))
175 return false;
176 list_for_each_entry_safe(acl, tmp, &domain->acl_info_list, list) {
e79acf0e 177 tomoyo_del_acl(&acl->list);
847b173e
TH
178 tomoyo_memory_free(acl);
179 }
180 tomoyo_put_name(domain->domainname);
181 return true;
182}
183
184
e79acf0e 185static void tomoyo_del_name(struct list_head *element)
847b173e 186{
e79acf0e
TH
187 const struct tomoyo_name_entry *ptr =
188 container_of(element, typeof(*ptr), list);
847b173e
TH
189}
190
a98aa4de 191static void tomoyo_del_path_group(struct list_head *element)
7762fbff 192{
a98aa4de 193 struct tomoyo_path_group *member =
e79acf0e 194 container_of(element, typeof(*member), head.list);
7762fbff
TH
195 tomoyo_put_name(member->member_name);
196}
197
a98aa4de 198static void tomoyo_del_group(struct list_head *element)
7762fbff 199{
a98aa4de 200 struct tomoyo_group *group =
e79acf0e 201 container_of(element, typeof(*group), list);
7762fbff
TH
202 tomoyo_put_name(group->group_name);
203}
204
e79acf0e 205static void tomoyo_del_number_group(struct list_head *element)
4c3e9e2d 206{
a98aa4de
TH
207 struct tomoyo_number_group *member =
208 container_of(element, typeof(*member), head.list);
4c3e9e2d
TH
209}
210
d2f8b234
TH
211static bool tomoyo_collect_member(struct list_head *member_list, int id)
212{
213 struct tomoyo_acl_head *member;
214 list_for_each_entry(member, member_list, list) {
215 if (!member->is_deleted)
216 continue;
217 if (!tomoyo_add_to_gc(id, &member->list))
218 return false;
d2f8b234
TH
219 }
220 return true;
221}
222
223static bool tomoyo_collect_acl(struct tomoyo_domain_info *domain)
224{
225 struct tomoyo_acl_info *acl;
226 list_for_each_entry(acl, &domain->acl_info_list, list) {
227 if (!acl->is_deleted)
228 continue;
229 if (!tomoyo_add_to_gc(TOMOYO_ID_ACL, &acl->list))
230 return false;
d2f8b234
TH
231 }
232 return true;
233}
234
847b173e
TH
235static void tomoyo_collect_entry(void)
236{
d2f8b234 237 int i;
29282381
TH
238 if (mutex_lock_interruptible(&tomoyo_policy_lock))
239 return;
d2f8b234 240 for (i = 0; i < TOMOYO_MAX_POLICY; i++) {
a230f9e7
TH
241 if (!tomoyo_collect_member(&tomoyo_policy_list[i], i))
242 goto unlock;
847b173e
TH
243 }
244 {
245 struct tomoyo_domain_info *domain;
246 list_for_each_entry_rcu(domain, &tomoyo_domain_list, list) {
d2f8b234
TH
247 if (!tomoyo_collect_acl(domain))
248 goto unlock;
847b173e
TH
249 if (!domain->is_deleted || atomic_read(&domain->users))
250 continue;
251 /*
252 * Nobody is referring this domain. But somebody may
253 * refer this domain after successful execve().
254 * We recheck domain->users after SRCU synchronization.
255 */
e79acf0e 256 if (!tomoyo_add_to_gc(TOMOYO_ID_DOMAIN, &domain->list))
d2f8b234 257 goto unlock;
847b173e
TH
258 }
259 }
d2f8b234
TH
260 for (i = 0; i < TOMOYO_MAX_HASH; i++) {
261 struct tomoyo_name_entry *ptr;
262 list_for_each_entry_rcu(ptr, &tomoyo_name_list[i], list) {
263 if (atomic_read(&ptr->users))
264 continue;
e79acf0e 265 if (!tomoyo_add_to_gc(TOMOYO_ID_NAME, &ptr->list))
d2f8b234 266 goto unlock;
847b173e
TH
267 }
268 }
7c2ea22e
TH
269 for (i = 0; i < TOMOYO_MAX_GROUP; i++) {
270 struct list_head *list = &tomoyo_group_list[i];
271 int id;
a98aa4de 272 struct tomoyo_group *group;
7c2ea22e
TH
273 switch (i) {
274 case 0:
275 id = TOMOYO_ID_PATH_GROUP;
276 break;
277 default:
278 id = TOMOYO_ID_NUMBER_GROUP;
279 break;
7762fbff 280 }
7c2ea22e
TH
281 list_for_each_entry(group, list, list) {
282 if (!tomoyo_collect_member(&group->member_list, id))
283 goto unlock;
4c3e9e2d
TH
284 if (!list_empty(&group->member_list) ||
285 atomic_read(&group->users))
286 continue;
7c2ea22e 287 if (!tomoyo_add_to_gc(TOMOYO_ID_GROUP, &group->list))
d2f8b234 288 goto unlock;
4c3e9e2d
TH
289 }
290 }
d2f8b234 291 unlock:
29282381 292 mutex_unlock(&tomoyo_policy_lock);
847b173e
TH
293}
294
295static void tomoyo_kfree_entry(void)
296{
297 struct tomoyo_gc_entry *p;
298 struct tomoyo_gc_entry *tmp;
299
300 list_for_each_entry_safe(p, tmp, &tomoyo_gc_queue, list) {
e79acf0e 301 struct list_head *element = p->element;
847b173e
TH
302 switch (p->type) {
303 case TOMOYO_ID_DOMAIN_INITIALIZER:
e79acf0e 304 tomoyo_del_domain_initializer(element);
847b173e
TH
305 break;
306 case TOMOYO_ID_DOMAIN_KEEPER:
e79acf0e 307 tomoyo_del_domain_keeper(element);
847b173e 308 break;
1084307c 309 case TOMOYO_ID_AGGREGATOR:
e79acf0e 310 tomoyo_del_aggregator(element);
1084307c 311 break;
847b173e 312 case TOMOYO_ID_ALIAS:
e79acf0e 313 tomoyo_del_alias(element);
847b173e
TH
314 break;
315 case TOMOYO_ID_GLOBALLY_READABLE:
e79acf0e 316 tomoyo_del_allow_read(element);
847b173e
TH
317 break;
318 case TOMOYO_ID_PATTERN:
e79acf0e 319 tomoyo_del_file_pattern(element);
847b173e
TH
320 break;
321 case TOMOYO_ID_NO_REWRITE:
e79acf0e 322 tomoyo_del_no_rewrite(element);
847b173e
TH
323 break;
324 case TOMOYO_ID_MANAGER:
e79acf0e 325 tomoyo_del_manager(element);
847b173e
TH
326 break;
327 case TOMOYO_ID_NAME:
e79acf0e 328 tomoyo_del_name(element);
847b173e
TH
329 break;
330 case TOMOYO_ID_ACL:
e79acf0e 331 tomoyo_del_acl(element);
847b173e
TH
332 break;
333 case TOMOYO_ID_DOMAIN:
e79acf0e 334 if (!tomoyo_del_domain(element))
847b173e
TH
335 continue;
336 break;
7762fbff 337 case TOMOYO_ID_PATH_GROUP:
e79acf0e 338 tomoyo_del_path_group(element);
7762fbff 339 break;
a98aa4de
TH
340 case TOMOYO_ID_GROUP:
341 tomoyo_del_group(element);
4c3e9e2d
TH
342 break;
343 case TOMOYO_ID_NUMBER_GROUP:
e79acf0e 344 tomoyo_del_number_group(element);
847b173e
TH
345 break;
346 }
e79acf0e 347 tomoyo_memory_free(element);
847b173e
TH
348 list_del(&p->list);
349 kfree(p);
350 }
351}
352
353static int tomoyo_gc_thread(void *unused)
354{
355 daemonize("GC for TOMOYO");
356 if (mutex_trylock(&tomoyo_gc_mutex)) {
357 int i;
358 for (i = 0; i < 10; i++) {
359 tomoyo_collect_entry();
360 if (list_empty(&tomoyo_gc_queue))
361 break;
362 synchronize_srcu(&tomoyo_ss);
363 tomoyo_kfree_entry();
364 }
365 mutex_unlock(&tomoyo_gc_mutex);
366 }
367 do_exit(0);
368}
369
370void tomoyo_run_gc(void)
371{
372 struct task_struct *task = kthread_create(tomoyo_gc_thread, NULL,
373 "GC for TOMOYO");
374 if (!IS_ERR(task))
375 wake_up_process(task);
376}
This page took 0.081084 seconds and 5 git commands to generate.