162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * security/tomoyo/gc.c 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2005-2011 NTT DATA CORPORATION 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include "common.h" 962306a36Sopenharmony_ci#include <linux/kthread.h> 1062306a36Sopenharmony_ci#include <linux/slab.h> 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_ci/** 1362306a36Sopenharmony_ci * tomoyo_memory_free - Free memory for elements. 1462306a36Sopenharmony_ci * 1562306a36Sopenharmony_ci * @ptr: Pointer to allocated memory. 1662306a36Sopenharmony_ci * 1762306a36Sopenharmony_ci * Returns nothing. 1862306a36Sopenharmony_ci * 1962306a36Sopenharmony_ci * Caller holds tomoyo_policy_lock mutex. 2062306a36Sopenharmony_ci */ 2162306a36Sopenharmony_cistatic inline void tomoyo_memory_free(void *ptr) 2262306a36Sopenharmony_ci{ 2362306a36Sopenharmony_ci tomoyo_memory_used[TOMOYO_MEMORY_POLICY] -= ksize(ptr); 2462306a36Sopenharmony_ci kfree(ptr); 2562306a36Sopenharmony_ci} 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ci/* The list for "struct tomoyo_io_buffer". */ 2862306a36Sopenharmony_cistatic LIST_HEAD(tomoyo_io_buffer_list); 2962306a36Sopenharmony_ci/* Lock for protecting tomoyo_io_buffer_list. */ 3062306a36Sopenharmony_cistatic DEFINE_SPINLOCK(tomoyo_io_buffer_list_lock); 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_ci/** 3362306a36Sopenharmony_ci * tomoyo_struct_used_by_io_buffer - Check whether the list element is used by /sys/kernel/security/tomoyo/ users or not. 3462306a36Sopenharmony_ci * 3562306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 3662306a36Sopenharmony_ci * 3762306a36Sopenharmony_ci * Returns true if @element is used by /sys/kernel/security/tomoyo/ users, 3862306a36Sopenharmony_ci * false otherwise. 3962306a36Sopenharmony_ci */ 4062306a36Sopenharmony_cistatic bool tomoyo_struct_used_by_io_buffer(const struct list_head *element) 4162306a36Sopenharmony_ci{ 4262306a36Sopenharmony_ci struct tomoyo_io_buffer *head; 4362306a36Sopenharmony_ci bool in_use = false; 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci spin_lock(&tomoyo_io_buffer_list_lock); 4662306a36Sopenharmony_ci list_for_each_entry(head, &tomoyo_io_buffer_list, list) { 4762306a36Sopenharmony_ci head->users++; 4862306a36Sopenharmony_ci spin_unlock(&tomoyo_io_buffer_list_lock); 4962306a36Sopenharmony_ci mutex_lock(&head->io_sem); 5062306a36Sopenharmony_ci if (head->r.domain == element || head->r.group == element || 5162306a36Sopenharmony_ci head->r.acl == element || &head->w.domain->list == element) 5262306a36Sopenharmony_ci in_use = true; 5362306a36Sopenharmony_ci mutex_unlock(&head->io_sem); 5462306a36Sopenharmony_ci spin_lock(&tomoyo_io_buffer_list_lock); 5562306a36Sopenharmony_ci head->users--; 5662306a36Sopenharmony_ci if (in_use) 5762306a36Sopenharmony_ci break; 5862306a36Sopenharmony_ci } 5962306a36Sopenharmony_ci spin_unlock(&tomoyo_io_buffer_list_lock); 6062306a36Sopenharmony_ci return in_use; 6162306a36Sopenharmony_ci} 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci/** 6462306a36Sopenharmony_ci * tomoyo_name_used_by_io_buffer - Check whether the string is used by /sys/kernel/security/tomoyo/ users or not. 6562306a36Sopenharmony_ci * 6662306a36Sopenharmony_ci * @string: String to check. 6762306a36Sopenharmony_ci * 6862306a36Sopenharmony_ci * Returns true if @string is used by /sys/kernel/security/tomoyo/ users, 6962306a36Sopenharmony_ci * false otherwise. 7062306a36Sopenharmony_ci */ 7162306a36Sopenharmony_cistatic bool tomoyo_name_used_by_io_buffer(const char *string) 7262306a36Sopenharmony_ci{ 7362306a36Sopenharmony_ci struct tomoyo_io_buffer *head; 7462306a36Sopenharmony_ci const size_t size = strlen(string) + 1; 7562306a36Sopenharmony_ci bool in_use = false; 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci spin_lock(&tomoyo_io_buffer_list_lock); 7862306a36Sopenharmony_ci list_for_each_entry(head, &tomoyo_io_buffer_list, list) { 7962306a36Sopenharmony_ci int i; 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci head->users++; 8262306a36Sopenharmony_ci spin_unlock(&tomoyo_io_buffer_list_lock); 8362306a36Sopenharmony_ci mutex_lock(&head->io_sem); 8462306a36Sopenharmony_ci for (i = 0; i < TOMOYO_MAX_IO_READ_QUEUE; i++) { 8562306a36Sopenharmony_ci const char *w = head->r.w[i]; 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci if (w < string || w > string + size) 8862306a36Sopenharmony_ci continue; 8962306a36Sopenharmony_ci in_use = true; 9062306a36Sopenharmony_ci break; 9162306a36Sopenharmony_ci } 9262306a36Sopenharmony_ci mutex_unlock(&head->io_sem); 9362306a36Sopenharmony_ci spin_lock(&tomoyo_io_buffer_list_lock); 9462306a36Sopenharmony_ci head->users--; 9562306a36Sopenharmony_ci if (in_use) 9662306a36Sopenharmony_ci break; 9762306a36Sopenharmony_ci } 9862306a36Sopenharmony_ci spin_unlock(&tomoyo_io_buffer_list_lock); 9962306a36Sopenharmony_ci return in_use; 10062306a36Sopenharmony_ci} 10162306a36Sopenharmony_ci 10262306a36Sopenharmony_ci/** 10362306a36Sopenharmony_ci * tomoyo_del_transition_control - Delete members in "struct tomoyo_transition_control". 10462306a36Sopenharmony_ci * 10562306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 10662306a36Sopenharmony_ci * 10762306a36Sopenharmony_ci * Returns nothing. 10862306a36Sopenharmony_ci */ 10962306a36Sopenharmony_cistatic inline void tomoyo_del_transition_control(struct list_head *element) 11062306a36Sopenharmony_ci{ 11162306a36Sopenharmony_ci struct tomoyo_transition_control *ptr = 11262306a36Sopenharmony_ci container_of(element, typeof(*ptr), head.list); 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_ci tomoyo_put_name(ptr->domainname); 11562306a36Sopenharmony_ci tomoyo_put_name(ptr->program); 11662306a36Sopenharmony_ci} 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci/** 11962306a36Sopenharmony_ci * tomoyo_del_aggregator - Delete members in "struct tomoyo_aggregator". 12062306a36Sopenharmony_ci * 12162306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 12262306a36Sopenharmony_ci * 12362306a36Sopenharmony_ci * Returns nothing. 12462306a36Sopenharmony_ci */ 12562306a36Sopenharmony_cistatic inline void tomoyo_del_aggregator(struct list_head *element) 12662306a36Sopenharmony_ci{ 12762306a36Sopenharmony_ci struct tomoyo_aggregator *ptr = 12862306a36Sopenharmony_ci container_of(element, typeof(*ptr), head.list); 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci tomoyo_put_name(ptr->original_name); 13162306a36Sopenharmony_ci tomoyo_put_name(ptr->aggregated_name); 13262306a36Sopenharmony_ci} 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci/** 13562306a36Sopenharmony_ci * tomoyo_del_manager - Delete members in "struct tomoyo_manager". 13662306a36Sopenharmony_ci * 13762306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 13862306a36Sopenharmony_ci * 13962306a36Sopenharmony_ci * Returns nothing. 14062306a36Sopenharmony_ci */ 14162306a36Sopenharmony_cistatic inline void tomoyo_del_manager(struct list_head *element) 14262306a36Sopenharmony_ci{ 14362306a36Sopenharmony_ci struct tomoyo_manager *ptr = 14462306a36Sopenharmony_ci container_of(element, typeof(*ptr), head.list); 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci tomoyo_put_name(ptr->manager); 14762306a36Sopenharmony_ci} 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci/** 15062306a36Sopenharmony_ci * tomoyo_del_acl - Delete members in "struct tomoyo_acl_info". 15162306a36Sopenharmony_ci * 15262306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 15362306a36Sopenharmony_ci * 15462306a36Sopenharmony_ci * Returns nothing. 15562306a36Sopenharmony_ci */ 15662306a36Sopenharmony_cistatic void tomoyo_del_acl(struct list_head *element) 15762306a36Sopenharmony_ci{ 15862306a36Sopenharmony_ci struct tomoyo_acl_info *acl = 15962306a36Sopenharmony_ci container_of(element, typeof(*acl), list); 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci tomoyo_put_condition(acl->cond); 16262306a36Sopenharmony_ci switch (acl->type) { 16362306a36Sopenharmony_ci case TOMOYO_TYPE_PATH_ACL: 16462306a36Sopenharmony_ci { 16562306a36Sopenharmony_ci struct tomoyo_path_acl *entry 16662306a36Sopenharmony_ci = container_of(acl, typeof(*entry), head); 16762306a36Sopenharmony_ci tomoyo_put_name_union(&entry->name); 16862306a36Sopenharmony_ci } 16962306a36Sopenharmony_ci break; 17062306a36Sopenharmony_ci case TOMOYO_TYPE_PATH2_ACL: 17162306a36Sopenharmony_ci { 17262306a36Sopenharmony_ci struct tomoyo_path2_acl *entry 17362306a36Sopenharmony_ci = container_of(acl, typeof(*entry), head); 17462306a36Sopenharmony_ci tomoyo_put_name_union(&entry->name1); 17562306a36Sopenharmony_ci tomoyo_put_name_union(&entry->name2); 17662306a36Sopenharmony_ci } 17762306a36Sopenharmony_ci break; 17862306a36Sopenharmony_ci case TOMOYO_TYPE_PATH_NUMBER_ACL: 17962306a36Sopenharmony_ci { 18062306a36Sopenharmony_ci struct tomoyo_path_number_acl *entry 18162306a36Sopenharmony_ci = container_of(acl, typeof(*entry), head); 18262306a36Sopenharmony_ci tomoyo_put_name_union(&entry->name); 18362306a36Sopenharmony_ci tomoyo_put_number_union(&entry->number); 18462306a36Sopenharmony_ci } 18562306a36Sopenharmony_ci break; 18662306a36Sopenharmony_ci case TOMOYO_TYPE_MKDEV_ACL: 18762306a36Sopenharmony_ci { 18862306a36Sopenharmony_ci struct tomoyo_mkdev_acl *entry 18962306a36Sopenharmony_ci = container_of(acl, typeof(*entry), head); 19062306a36Sopenharmony_ci tomoyo_put_name_union(&entry->name); 19162306a36Sopenharmony_ci tomoyo_put_number_union(&entry->mode); 19262306a36Sopenharmony_ci tomoyo_put_number_union(&entry->major); 19362306a36Sopenharmony_ci tomoyo_put_number_union(&entry->minor); 19462306a36Sopenharmony_ci } 19562306a36Sopenharmony_ci break; 19662306a36Sopenharmony_ci case TOMOYO_TYPE_MOUNT_ACL: 19762306a36Sopenharmony_ci { 19862306a36Sopenharmony_ci struct tomoyo_mount_acl *entry 19962306a36Sopenharmony_ci = container_of(acl, typeof(*entry), head); 20062306a36Sopenharmony_ci tomoyo_put_name_union(&entry->dev_name); 20162306a36Sopenharmony_ci tomoyo_put_name_union(&entry->dir_name); 20262306a36Sopenharmony_ci tomoyo_put_name_union(&entry->fs_type); 20362306a36Sopenharmony_ci tomoyo_put_number_union(&entry->flags); 20462306a36Sopenharmony_ci } 20562306a36Sopenharmony_ci break; 20662306a36Sopenharmony_ci case TOMOYO_TYPE_ENV_ACL: 20762306a36Sopenharmony_ci { 20862306a36Sopenharmony_ci struct tomoyo_env_acl *entry = 20962306a36Sopenharmony_ci container_of(acl, typeof(*entry), head); 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci tomoyo_put_name(entry->env); 21262306a36Sopenharmony_ci } 21362306a36Sopenharmony_ci break; 21462306a36Sopenharmony_ci case TOMOYO_TYPE_INET_ACL: 21562306a36Sopenharmony_ci { 21662306a36Sopenharmony_ci struct tomoyo_inet_acl *entry = 21762306a36Sopenharmony_ci container_of(acl, typeof(*entry), head); 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci tomoyo_put_group(entry->address.group); 22062306a36Sopenharmony_ci tomoyo_put_number_union(&entry->port); 22162306a36Sopenharmony_ci } 22262306a36Sopenharmony_ci break; 22362306a36Sopenharmony_ci case TOMOYO_TYPE_UNIX_ACL: 22462306a36Sopenharmony_ci { 22562306a36Sopenharmony_ci struct tomoyo_unix_acl *entry = 22662306a36Sopenharmony_ci container_of(acl, typeof(*entry), head); 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_ci tomoyo_put_name_union(&entry->name); 22962306a36Sopenharmony_ci } 23062306a36Sopenharmony_ci break; 23162306a36Sopenharmony_ci case TOMOYO_TYPE_MANUAL_TASK_ACL: 23262306a36Sopenharmony_ci { 23362306a36Sopenharmony_ci struct tomoyo_task_acl *entry = 23462306a36Sopenharmony_ci container_of(acl, typeof(*entry), head); 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci tomoyo_put_name(entry->domainname); 23762306a36Sopenharmony_ci } 23862306a36Sopenharmony_ci break; 23962306a36Sopenharmony_ci } 24062306a36Sopenharmony_ci} 24162306a36Sopenharmony_ci 24262306a36Sopenharmony_ci/** 24362306a36Sopenharmony_ci * tomoyo_del_domain - Delete members in "struct tomoyo_domain_info". 24462306a36Sopenharmony_ci * 24562306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 24662306a36Sopenharmony_ci * 24762306a36Sopenharmony_ci * Returns nothing. 24862306a36Sopenharmony_ci * 24962306a36Sopenharmony_ci * Caller holds tomoyo_policy_lock mutex. 25062306a36Sopenharmony_ci */ 25162306a36Sopenharmony_cistatic inline void tomoyo_del_domain(struct list_head *element) 25262306a36Sopenharmony_ci{ 25362306a36Sopenharmony_ci struct tomoyo_domain_info *domain = 25462306a36Sopenharmony_ci container_of(element, typeof(*domain), list); 25562306a36Sopenharmony_ci struct tomoyo_acl_info *acl; 25662306a36Sopenharmony_ci struct tomoyo_acl_info *tmp; 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci /* 25962306a36Sopenharmony_ci * Since this domain is referenced from neither 26062306a36Sopenharmony_ci * "struct tomoyo_io_buffer" nor "struct cred"->security, we can delete 26162306a36Sopenharmony_ci * elements without checking for is_deleted flag. 26262306a36Sopenharmony_ci */ 26362306a36Sopenharmony_ci list_for_each_entry_safe(acl, tmp, &domain->acl_info_list, list) { 26462306a36Sopenharmony_ci tomoyo_del_acl(&acl->list); 26562306a36Sopenharmony_ci tomoyo_memory_free(acl); 26662306a36Sopenharmony_ci } 26762306a36Sopenharmony_ci tomoyo_put_name(domain->domainname); 26862306a36Sopenharmony_ci} 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci/** 27162306a36Sopenharmony_ci * tomoyo_del_condition - Delete members in "struct tomoyo_condition". 27262306a36Sopenharmony_ci * 27362306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 27462306a36Sopenharmony_ci * 27562306a36Sopenharmony_ci * Returns nothing. 27662306a36Sopenharmony_ci */ 27762306a36Sopenharmony_civoid tomoyo_del_condition(struct list_head *element) 27862306a36Sopenharmony_ci{ 27962306a36Sopenharmony_ci struct tomoyo_condition *cond = container_of(element, typeof(*cond), 28062306a36Sopenharmony_ci head.list); 28162306a36Sopenharmony_ci const u16 condc = cond->condc; 28262306a36Sopenharmony_ci const u16 numbers_count = cond->numbers_count; 28362306a36Sopenharmony_ci const u16 names_count = cond->names_count; 28462306a36Sopenharmony_ci const u16 argc = cond->argc; 28562306a36Sopenharmony_ci const u16 envc = cond->envc; 28662306a36Sopenharmony_ci unsigned int i; 28762306a36Sopenharmony_ci const struct tomoyo_condition_element *condp 28862306a36Sopenharmony_ci = (const struct tomoyo_condition_element *) (cond + 1); 28962306a36Sopenharmony_ci struct tomoyo_number_union *numbers_p 29062306a36Sopenharmony_ci = (struct tomoyo_number_union *) (condp + condc); 29162306a36Sopenharmony_ci struct tomoyo_name_union *names_p 29262306a36Sopenharmony_ci = (struct tomoyo_name_union *) (numbers_p + numbers_count); 29362306a36Sopenharmony_ci const struct tomoyo_argv *argv 29462306a36Sopenharmony_ci = (const struct tomoyo_argv *) (names_p + names_count); 29562306a36Sopenharmony_ci const struct tomoyo_envp *envp 29662306a36Sopenharmony_ci = (const struct tomoyo_envp *) (argv + argc); 29762306a36Sopenharmony_ci 29862306a36Sopenharmony_ci for (i = 0; i < numbers_count; i++) 29962306a36Sopenharmony_ci tomoyo_put_number_union(numbers_p++); 30062306a36Sopenharmony_ci for (i = 0; i < names_count; i++) 30162306a36Sopenharmony_ci tomoyo_put_name_union(names_p++); 30262306a36Sopenharmony_ci for (i = 0; i < argc; argv++, i++) 30362306a36Sopenharmony_ci tomoyo_put_name(argv->value); 30462306a36Sopenharmony_ci for (i = 0; i < envc; envp++, i++) { 30562306a36Sopenharmony_ci tomoyo_put_name(envp->name); 30662306a36Sopenharmony_ci tomoyo_put_name(envp->value); 30762306a36Sopenharmony_ci } 30862306a36Sopenharmony_ci} 30962306a36Sopenharmony_ci 31062306a36Sopenharmony_ci/** 31162306a36Sopenharmony_ci * tomoyo_del_name - Delete members in "struct tomoyo_name". 31262306a36Sopenharmony_ci * 31362306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 31462306a36Sopenharmony_ci * 31562306a36Sopenharmony_ci * Returns nothing. 31662306a36Sopenharmony_ci */ 31762306a36Sopenharmony_cistatic inline void tomoyo_del_name(struct list_head *element) 31862306a36Sopenharmony_ci{ 31962306a36Sopenharmony_ci /* Nothing to do. */ 32062306a36Sopenharmony_ci} 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_ci/** 32362306a36Sopenharmony_ci * tomoyo_del_path_group - Delete members in "struct tomoyo_path_group". 32462306a36Sopenharmony_ci * 32562306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 32662306a36Sopenharmony_ci * 32762306a36Sopenharmony_ci * Returns nothing. 32862306a36Sopenharmony_ci */ 32962306a36Sopenharmony_cistatic inline void tomoyo_del_path_group(struct list_head *element) 33062306a36Sopenharmony_ci{ 33162306a36Sopenharmony_ci struct tomoyo_path_group *member = 33262306a36Sopenharmony_ci container_of(element, typeof(*member), head.list); 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_ci tomoyo_put_name(member->member_name); 33562306a36Sopenharmony_ci} 33662306a36Sopenharmony_ci 33762306a36Sopenharmony_ci/** 33862306a36Sopenharmony_ci * tomoyo_del_group - Delete "struct tomoyo_group". 33962306a36Sopenharmony_ci * 34062306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 34162306a36Sopenharmony_ci * 34262306a36Sopenharmony_ci * Returns nothing. 34362306a36Sopenharmony_ci */ 34462306a36Sopenharmony_cistatic inline void tomoyo_del_group(struct list_head *element) 34562306a36Sopenharmony_ci{ 34662306a36Sopenharmony_ci struct tomoyo_group *group = 34762306a36Sopenharmony_ci container_of(element, typeof(*group), head.list); 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_ci tomoyo_put_name(group->group_name); 35062306a36Sopenharmony_ci} 35162306a36Sopenharmony_ci 35262306a36Sopenharmony_ci/** 35362306a36Sopenharmony_ci * tomoyo_del_address_group - Delete members in "struct tomoyo_address_group". 35462306a36Sopenharmony_ci * 35562306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 35662306a36Sopenharmony_ci * 35762306a36Sopenharmony_ci * Returns nothing. 35862306a36Sopenharmony_ci */ 35962306a36Sopenharmony_cistatic inline void tomoyo_del_address_group(struct list_head *element) 36062306a36Sopenharmony_ci{ 36162306a36Sopenharmony_ci /* Nothing to do. */ 36262306a36Sopenharmony_ci} 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_ci/** 36562306a36Sopenharmony_ci * tomoyo_del_number_group - Delete members in "struct tomoyo_number_group". 36662306a36Sopenharmony_ci * 36762306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 36862306a36Sopenharmony_ci * 36962306a36Sopenharmony_ci * Returns nothing. 37062306a36Sopenharmony_ci */ 37162306a36Sopenharmony_cistatic inline void tomoyo_del_number_group(struct list_head *element) 37262306a36Sopenharmony_ci{ 37362306a36Sopenharmony_ci /* Nothing to do. */ 37462306a36Sopenharmony_ci} 37562306a36Sopenharmony_ci 37662306a36Sopenharmony_ci/** 37762306a36Sopenharmony_ci * tomoyo_try_to_gc - Try to kfree() an entry. 37862306a36Sopenharmony_ci * 37962306a36Sopenharmony_ci * @type: One of values in "enum tomoyo_policy_id". 38062306a36Sopenharmony_ci * @element: Pointer to "struct list_head". 38162306a36Sopenharmony_ci * 38262306a36Sopenharmony_ci * Returns nothing. 38362306a36Sopenharmony_ci * 38462306a36Sopenharmony_ci * Caller holds tomoyo_policy_lock mutex. 38562306a36Sopenharmony_ci */ 38662306a36Sopenharmony_cistatic void tomoyo_try_to_gc(const enum tomoyo_policy_id type, 38762306a36Sopenharmony_ci struct list_head *element) 38862306a36Sopenharmony_ci{ 38962306a36Sopenharmony_ci /* 39062306a36Sopenharmony_ci * __list_del_entry() guarantees that the list element became no longer 39162306a36Sopenharmony_ci * reachable from the list which the element was originally on (e.g. 39262306a36Sopenharmony_ci * tomoyo_domain_list). Also, synchronize_srcu() guarantees that the 39362306a36Sopenharmony_ci * list element became no longer referenced by syscall users. 39462306a36Sopenharmony_ci */ 39562306a36Sopenharmony_ci __list_del_entry(element); 39662306a36Sopenharmony_ci mutex_unlock(&tomoyo_policy_lock); 39762306a36Sopenharmony_ci synchronize_srcu(&tomoyo_ss); 39862306a36Sopenharmony_ci /* 39962306a36Sopenharmony_ci * However, there are two users which may still be using the list 40062306a36Sopenharmony_ci * element. We need to defer until both users forget this element. 40162306a36Sopenharmony_ci * 40262306a36Sopenharmony_ci * Don't kfree() until "struct tomoyo_io_buffer"->r.{domain,group,acl} 40362306a36Sopenharmony_ci * and "struct tomoyo_io_buffer"->w.domain forget this element. 40462306a36Sopenharmony_ci */ 40562306a36Sopenharmony_ci if (tomoyo_struct_used_by_io_buffer(element)) 40662306a36Sopenharmony_ci goto reinject; 40762306a36Sopenharmony_ci switch (type) { 40862306a36Sopenharmony_ci case TOMOYO_ID_TRANSITION_CONTROL: 40962306a36Sopenharmony_ci tomoyo_del_transition_control(element); 41062306a36Sopenharmony_ci break; 41162306a36Sopenharmony_ci case TOMOYO_ID_MANAGER: 41262306a36Sopenharmony_ci tomoyo_del_manager(element); 41362306a36Sopenharmony_ci break; 41462306a36Sopenharmony_ci case TOMOYO_ID_AGGREGATOR: 41562306a36Sopenharmony_ci tomoyo_del_aggregator(element); 41662306a36Sopenharmony_ci break; 41762306a36Sopenharmony_ci case TOMOYO_ID_GROUP: 41862306a36Sopenharmony_ci tomoyo_del_group(element); 41962306a36Sopenharmony_ci break; 42062306a36Sopenharmony_ci case TOMOYO_ID_PATH_GROUP: 42162306a36Sopenharmony_ci tomoyo_del_path_group(element); 42262306a36Sopenharmony_ci break; 42362306a36Sopenharmony_ci case TOMOYO_ID_ADDRESS_GROUP: 42462306a36Sopenharmony_ci tomoyo_del_address_group(element); 42562306a36Sopenharmony_ci break; 42662306a36Sopenharmony_ci case TOMOYO_ID_NUMBER_GROUP: 42762306a36Sopenharmony_ci tomoyo_del_number_group(element); 42862306a36Sopenharmony_ci break; 42962306a36Sopenharmony_ci case TOMOYO_ID_CONDITION: 43062306a36Sopenharmony_ci tomoyo_del_condition(element); 43162306a36Sopenharmony_ci break; 43262306a36Sopenharmony_ci case TOMOYO_ID_NAME: 43362306a36Sopenharmony_ci /* 43462306a36Sopenharmony_ci * Don't kfree() until all "struct tomoyo_io_buffer"->r.w[] 43562306a36Sopenharmony_ci * forget this element. 43662306a36Sopenharmony_ci */ 43762306a36Sopenharmony_ci if (tomoyo_name_used_by_io_buffer 43862306a36Sopenharmony_ci (container_of(element, typeof(struct tomoyo_name), 43962306a36Sopenharmony_ci head.list)->entry.name)) 44062306a36Sopenharmony_ci goto reinject; 44162306a36Sopenharmony_ci tomoyo_del_name(element); 44262306a36Sopenharmony_ci break; 44362306a36Sopenharmony_ci case TOMOYO_ID_ACL: 44462306a36Sopenharmony_ci tomoyo_del_acl(element); 44562306a36Sopenharmony_ci break; 44662306a36Sopenharmony_ci case TOMOYO_ID_DOMAIN: 44762306a36Sopenharmony_ci /* 44862306a36Sopenharmony_ci * Don't kfree() until all "struct cred"->security forget this 44962306a36Sopenharmony_ci * element. 45062306a36Sopenharmony_ci */ 45162306a36Sopenharmony_ci if (atomic_read(&container_of 45262306a36Sopenharmony_ci (element, typeof(struct tomoyo_domain_info), 45362306a36Sopenharmony_ci list)->users)) 45462306a36Sopenharmony_ci goto reinject; 45562306a36Sopenharmony_ci break; 45662306a36Sopenharmony_ci case TOMOYO_MAX_POLICY: 45762306a36Sopenharmony_ci break; 45862306a36Sopenharmony_ci } 45962306a36Sopenharmony_ci mutex_lock(&tomoyo_policy_lock); 46062306a36Sopenharmony_ci if (type == TOMOYO_ID_DOMAIN) 46162306a36Sopenharmony_ci tomoyo_del_domain(element); 46262306a36Sopenharmony_ci tomoyo_memory_free(element); 46362306a36Sopenharmony_ci return; 46462306a36Sopenharmony_cireinject: 46562306a36Sopenharmony_ci /* 46662306a36Sopenharmony_ci * We can safely reinject this element here because 46762306a36Sopenharmony_ci * (1) Appending list elements and removing list elements are protected 46862306a36Sopenharmony_ci * by tomoyo_policy_lock mutex. 46962306a36Sopenharmony_ci * (2) Only this function removes list elements and this function is 47062306a36Sopenharmony_ci * exclusively executed by tomoyo_gc_mutex mutex. 47162306a36Sopenharmony_ci * are true. 47262306a36Sopenharmony_ci */ 47362306a36Sopenharmony_ci mutex_lock(&tomoyo_policy_lock); 47462306a36Sopenharmony_ci list_add_rcu(element, element->prev); 47562306a36Sopenharmony_ci} 47662306a36Sopenharmony_ci 47762306a36Sopenharmony_ci/** 47862306a36Sopenharmony_ci * tomoyo_collect_member - Delete elements with "struct tomoyo_acl_head". 47962306a36Sopenharmony_ci * 48062306a36Sopenharmony_ci * @id: One of values in "enum tomoyo_policy_id". 48162306a36Sopenharmony_ci * @member_list: Pointer to "struct list_head". 48262306a36Sopenharmony_ci * 48362306a36Sopenharmony_ci * Returns nothing. 48462306a36Sopenharmony_ci */ 48562306a36Sopenharmony_cistatic void tomoyo_collect_member(const enum tomoyo_policy_id id, 48662306a36Sopenharmony_ci struct list_head *member_list) 48762306a36Sopenharmony_ci{ 48862306a36Sopenharmony_ci struct tomoyo_acl_head *member; 48962306a36Sopenharmony_ci struct tomoyo_acl_head *tmp; 49062306a36Sopenharmony_ci 49162306a36Sopenharmony_ci list_for_each_entry_safe(member, tmp, member_list, list) { 49262306a36Sopenharmony_ci if (!member->is_deleted) 49362306a36Sopenharmony_ci continue; 49462306a36Sopenharmony_ci member->is_deleted = TOMOYO_GC_IN_PROGRESS; 49562306a36Sopenharmony_ci tomoyo_try_to_gc(id, &member->list); 49662306a36Sopenharmony_ci } 49762306a36Sopenharmony_ci} 49862306a36Sopenharmony_ci 49962306a36Sopenharmony_ci/** 50062306a36Sopenharmony_ci * tomoyo_collect_acl - Delete elements in "struct tomoyo_domain_info". 50162306a36Sopenharmony_ci * 50262306a36Sopenharmony_ci * @list: Pointer to "struct list_head". 50362306a36Sopenharmony_ci * 50462306a36Sopenharmony_ci * Returns nothing. 50562306a36Sopenharmony_ci */ 50662306a36Sopenharmony_cistatic void tomoyo_collect_acl(struct list_head *list) 50762306a36Sopenharmony_ci{ 50862306a36Sopenharmony_ci struct tomoyo_acl_info *acl; 50962306a36Sopenharmony_ci struct tomoyo_acl_info *tmp; 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_ci list_for_each_entry_safe(acl, tmp, list, list) { 51262306a36Sopenharmony_ci if (!acl->is_deleted) 51362306a36Sopenharmony_ci continue; 51462306a36Sopenharmony_ci acl->is_deleted = TOMOYO_GC_IN_PROGRESS; 51562306a36Sopenharmony_ci tomoyo_try_to_gc(TOMOYO_ID_ACL, &acl->list); 51662306a36Sopenharmony_ci } 51762306a36Sopenharmony_ci} 51862306a36Sopenharmony_ci 51962306a36Sopenharmony_ci/** 52062306a36Sopenharmony_ci * tomoyo_collect_entry - Try to kfree() deleted elements. 52162306a36Sopenharmony_ci * 52262306a36Sopenharmony_ci * Returns nothing. 52362306a36Sopenharmony_ci */ 52462306a36Sopenharmony_cistatic void tomoyo_collect_entry(void) 52562306a36Sopenharmony_ci{ 52662306a36Sopenharmony_ci int i; 52762306a36Sopenharmony_ci enum tomoyo_policy_id id; 52862306a36Sopenharmony_ci struct tomoyo_policy_namespace *ns; 52962306a36Sopenharmony_ci 53062306a36Sopenharmony_ci mutex_lock(&tomoyo_policy_lock); 53162306a36Sopenharmony_ci { 53262306a36Sopenharmony_ci struct tomoyo_domain_info *domain; 53362306a36Sopenharmony_ci struct tomoyo_domain_info *tmp; 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ci list_for_each_entry_safe(domain, tmp, &tomoyo_domain_list, 53662306a36Sopenharmony_ci list) { 53762306a36Sopenharmony_ci tomoyo_collect_acl(&domain->acl_info_list); 53862306a36Sopenharmony_ci if (!domain->is_deleted || atomic_read(&domain->users)) 53962306a36Sopenharmony_ci continue; 54062306a36Sopenharmony_ci tomoyo_try_to_gc(TOMOYO_ID_DOMAIN, &domain->list); 54162306a36Sopenharmony_ci } 54262306a36Sopenharmony_ci } 54362306a36Sopenharmony_ci list_for_each_entry(ns, &tomoyo_namespace_list, namespace_list) { 54462306a36Sopenharmony_ci for (id = 0; id < TOMOYO_MAX_POLICY; id++) 54562306a36Sopenharmony_ci tomoyo_collect_member(id, &ns->policy_list[id]); 54662306a36Sopenharmony_ci for (i = 0; i < TOMOYO_MAX_ACL_GROUPS; i++) 54762306a36Sopenharmony_ci tomoyo_collect_acl(&ns->acl_group[i]); 54862306a36Sopenharmony_ci } 54962306a36Sopenharmony_ci { 55062306a36Sopenharmony_ci struct tomoyo_shared_acl_head *ptr; 55162306a36Sopenharmony_ci struct tomoyo_shared_acl_head *tmp; 55262306a36Sopenharmony_ci 55362306a36Sopenharmony_ci list_for_each_entry_safe(ptr, tmp, &tomoyo_condition_list, 55462306a36Sopenharmony_ci list) { 55562306a36Sopenharmony_ci if (atomic_read(&ptr->users) > 0) 55662306a36Sopenharmony_ci continue; 55762306a36Sopenharmony_ci atomic_set(&ptr->users, TOMOYO_GC_IN_PROGRESS); 55862306a36Sopenharmony_ci tomoyo_try_to_gc(TOMOYO_ID_CONDITION, &ptr->list); 55962306a36Sopenharmony_ci } 56062306a36Sopenharmony_ci } 56162306a36Sopenharmony_ci list_for_each_entry(ns, &tomoyo_namespace_list, namespace_list) { 56262306a36Sopenharmony_ci for (i = 0; i < TOMOYO_MAX_GROUP; i++) { 56362306a36Sopenharmony_ci struct list_head *list = &ns->group_list[i]; 56462306a36Sopenharmony_ci struct tomoyo_group *group; 56562306a36Sopenharmony_ci struct tomoyo_group *tmp; 56662306a36Sopenharmony_ci 56762306a36Sopenharmony_ci switch (i) { 56862306a36Sopenharmony_ci case 0: 56962306a36Sopenharmony_ci id = TOMOYO_ID_PATH_GROUP; 57062306a36Sopenharmony_ci break; 57162306a36Sopenharmony_ci case 1: 57262306a36Sopenharmony_ci id = TOMOYO_ID_NUMBER_GROUP; 57362306a36Sopenharmony_ci break; 57462306a36Sopenharmony_ci default: 57562306a36Sopenharmony_ci id = TOMOYO_ID_ADDRESS_GROUP; 57662306a36Sopenharmony_ci break; 57762306a36Sopenharmony_ci } 57862306a36Sopenharmony_ci list_for_each_entry_safe(group, tmp, list, head.list) { 57962306a36Sopenharmony_ci tomoyo_collect_member(id, &group->member_list); 58062306a36Sopenharmony_ci if (!list_empty(&group->member_list) || 58162306a36Sopenharmony_ci atomic_read(&group->head.users) > 0) 58262306a36Sopenharmony_ci continue; 58362306a36Sopenharmony_ci atomic_set(&group->head.users, 58462306a36Sopenharmony_ci TOMOYO_GC_IN_PROGRESS); 58562306a36Sopenharmony_ci tomoyo_try_to_gc(TOMOYO_ID_GROUP, 58662306a36Sopenharmony_ci &group->head.list); 58762306a36Sopenharmony_ci } 58862306a36Sopenharmony_ci } 58962306a36Sopenharmony_ci } 59062306a36Sopenharmony_ci for (i = 0; i < TOMOYO_MAX_HASH; i++) { 59162306a36Sopenharmony_ci struct list_head *list = &tomoyo_name_list[i]; 59262306a36Sopenharmony_ci struct tomoyo_shared_acl_head *ptr; 59362306a36Sopenharmony_ci struct tomoyo_shared_acl_head *tmp; 59462306a36Sopenharmony_ci 59562306a36Sopenharmony_ci list_for_each_entry_safe(ptr, tmp, list, list) { 59662306a36Sopenharmony_ci if (atomic_read(&ptr->users) > 0) 59762306a36Sopenharmony_ci continue; 59862306a36Sopenharmony_ci atomic_set(&ptr->users, TOMOYO_GC_IN_PROGRESS); 59962306a36Sopenharmony_ci tomoyo_try_to_gc(TOMOYO_ID_NAME, &ptr->list); 60062306a36Sopenharmony_ci } 60162306a36Sopenharmony_ci } 60262306a36Sopenharmony_ci mutex_unlock(&tomoyo_policy_lock); 60362306a36Sopenharmony_ci} 60462306a36Sopenharmony_ci 60562306a36Sopenharmony_ci/** 60662306a36Sopenharmony_ci * tomoyo_gc_thread - Garbage collector thread function. 60762306a36Sopenharmony_ci * 60862306a36Sopenharmony_ci * @unused: Unused. 60962306a36Sopenharmony_ci * 61062306a36Sopenharmony_ci * Returns 0. 61162306a36Sopenharmony_ci */ 61262306a36Sopenharmony_cistatic int tomoyo_gc_thread(void *unused) 61362306a36Sopenharmony_ci{ 61462306a36Sopenharmony_ci /* Garbage collector thread is exclusive. */ 61562306a36Sopenharmony_ci static DEFINE_MUTEX(tomoyo_gc_mutex); 61662306a36Sopenharmony_ci 61762306a36Sopenharmony_ci if (!mutex_trylock(&tomoyo_gc_mutex)) 61862306a36Sopenharmony_ci goto out; 61962306a36Sopenharmony_ci tomoyo_collect_entry(); 62062306a36Sopenharmony_ci { 62162306a36Sopenharmony_ci struct tomoyo_io_buffer *head; 62262306a36Sopenharmony_ci struct tomoyo_io_buffer *tmp; 62362306a36Sopenharmony_ci 62462306a36Sopenharmony_ci spin_lock(&tomoyo_io_buffer_list_lock); 62562306a36Sopenharmony_ci list_for_each_entry_safe(head, tmp, &tomoyo_io_buffer_list, 62662306a36Sopenharmony_ci list) { 62762306a36Sopenharmony_ci if (head->users) 62862306a36Sopenharmony_ci continue; 62962306a36Sopenharmony_ci list_del(&head->list); 63062306a36Sopenharmony_ci kfree(head->read_buf); 63162306a36Sopenharmony_ci kfree(head->write_buf); 63262306a36Sopenharmony_ci kfree(head); 63362306a36Sopenharmony_ci } 63462306a36Sopenharmony_ci spin_unlock(&tomoyo_io_buffer_list_lock); 63562306a36Sopenharmony_ci } 63662306a36Sopenharmony_ci mutex_unlock(&tomoyo_gc_mutex); 63762306a36Sopenharmony_ciout: 63862306a36Sopenharmony_ci /* This acts as do_exit(0). */ 63962306a36Sopenharmony_ci return 0; 64062306a36Sopenharmony_ci} 64162306a36Sopenharmony_ci 64262306a36Sopenharmony_ci/** 64362306a36Sopenharmony_ci * tomoyo_notify_gc - Register/unregister /sys/kernel/security/tomoyo/ users. 64462306a36Sopenharmony_ci * 64562306a36Sopenharmony_ci * @head: Pointer to "struct tomoyo_io_buffer". 64662306a36Sopenharmony_ci * @is_register: True if register, false if unregister. 64762306a36Sopenharmony_ci * 64862306a36Sopenharmony_ci * Returns nothing. 64962306a36Sopenharmony_ci */ 65062306a36Sopenharmony_civoid tomoyo_notify_gc(struct tomoyo_io_buffer *head, const bool is_register) 65162306a36Sopenharmony_ci{ 65262306a36Sopenharmony_ci bool is_write = false; 65362306a36Sopenharmony_ci 65462306a36Sopenharmony_ci spin_lock(&tomoyo_io_buffer_list_lock); 65562306a36Sopenharmony_ci if (is_register) { 65662306a36Sopenharmony_ci head->users = 1; 65762306a36Sopenharmony_ci list_add(&head->list, &tomoyo_io_buffer_list); 65862306a36Sopenharmony_ci } else { 65962306a36Sopenharmony_ci is_write = head->write_buf != NULL; 66062306a36Sopenharmony_ci if (!--head->users) { 66162306a36Sopenharmony_ci list_del(&head->list); 66262306a36Sopenharmony_ci kfree(head->read_buf); 66362306a36Sopenharmony_ci kfree(head->write_buf); 66462306a36Sopenharmony_ci kfree(head); 66562306a36Sopenharmony_ci } 66662306a36Sopenharmony_ci } 66762306a36Sopenharmony_ci spin_unlock(&tomoyo_io_buffer_list_lock); 66862306a36Sopenharmony_ci if (is_write) 66962306a36Sopenharmony_ci kthread_run(tomoyo_gc_thread, NULL, "GC for TOMOYO"); 67062306a36Sopenharmony_ci} 671