Commit 36f5e1ff authored by Tetsuo Handa's avatar Tetsuo Handa Committed by James Morris

TOMOYO: Use callback for updating entries.

Use common code for elements using "struct list_head" + "bool" structure.
Signed-off-by: default avatarTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: default avatarJames Morris <jmorris@namei.org>
parent 82e0f001
...@@ -469,6 +469,15 @@ static int tomoyo_read_profile(struct tomoyo_io_buffer *head) ...@@ -469,6 +469,15 @@ static int tomoyo_read_profile(struct tomoyo_io_buffer *head)
*/ */
LIST_HEAD(tomoyo_policy_manager_list); LIST_HEAD(tomoyo_policy_manager_list);
static bool tomoyo_same_manager_entry(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
return container_of(a, struct tomoyo_policy_manager_entry, head)
->manager ==
container_of(b, struct tomoyo_policy_manager_entry, head)
->manager;
}
/** /**
* tomoyo_update_manager_entry - Add a manager entry. * tomoyo_update_manager_entry - Add a manager entry.
* *
...@@ -482,9 +491,8 @@ LIST_HEAD(tomoyo_policy_manager_list); ...@@ -482,9 +491,8 @@ LIST_HEAD(tomoyo_policy_manager_list);
static int tomoyo_update_manager_entry(const char *manager, static int tomoyo_update_manager_entry(const char *manager,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_policy_manager_entry *ptr;
struct tomoyo_policy_manager_entry e = { }; struct tomoyo_policy_manager_entry e = { };
int error = is_delete ? -ENOENT : -ENOMEM; int error;
if (tomoyo_is_domain_def(manager)) { if (tomoyo_is_domain_def(manager)) {
if (!tomoyo_is_correct_domain(manager)) if (!tomoyo_is_correct_domain(manager))
...@@ -497,26 +505,9 @@ static int tomoyo_update_manager_entry(const char *manager, ...@@ -497,26 +505,9 @@ static int tomoyo_update_manager_entry(const char *manager,
e.manager = tomoyo_get_name(manager); e.manager = tomoyo_get_name(manager);
if (!e.manager) if (!e.manager)
return -ENOMEM; return -ENOMEM;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_policy_manager_list,
list_for_each_entry_rcu(ptr, &tomoyo_policy_manager_list, head.list) { tomoyo_same_manager_entry);
if (ptr->manager != e.manager)
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_policy_manager_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_policy_manager_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out:
tomoyo_put_name(e.manager); tomoyo_put_name(e.manager);
return error; return error;
} }
......
...@@ -913,6 +913,12 @@ int tomoyo_update_domain(struct tomoyo_acl_info *new_entry, const int size, ...@@ -913,6 +913,12 @@ int tomoyo_update_domain(struct tomoyo_acl_info *new_entry, const int size,
bool (*merge_duplicate) (struct tomoyo_acl_info *, bool (*merge_duplicate) (struct tomoyo_acl_info *,
struct tomoyo_acl_info *, struct tomoyo_acl_info *,
const bool)); const bool));
int tomoyo_update_policy(struct tomoyo_acl_head *new_entry, const int size,
bool is_delete, struct list_head *list,
bool (*check_duplicate) (const struct tomoyo_acl_head
*,
const struct tomoyo_acl_head
*));
/********** External variable definitions. **********/ /********** External variable definitions. **********/
...@@ -1042,39 +1048,6 @@ static inline bool tomoyo_is_same_number_union ...@@ -1042,39 +1048,6 @@ static inline bool tomoyo_is_same_number_union
p1->max_type == p2->max_type && p1->is_group == p2->is_group; p1->max_type == p2->max_type && p1->is_group == p2->is_group;
} }
static inline bool tomoyo_is_same_domain_initializer_entry
(const struct tomoyo_domain_initializer_entry *p1,
const struct tomoyo_domain_initializer_entry *p2)
{
return p1->is_not == p2->is_not && p1->is_last_name == p2->is_last_name
&& p1->domainname == p2->domainname
&& p1->program == p2->program;
}
static inline bool tomoyo_is_same_domain_keeper_entry
(const struct tomoyo_domain_keeper_entry *p1,
const struct tomoyo_domain_keeper_entry *p2)
{
return p1->is_not == p2->is_not && p1->is_last_name == p2->is_last_name
&& p1->domainname == p2->domainname
&& p1->program == p2->program;
}
static inline bool tomoyo_is_same_aggregator_entry
(const struct tomoyo_aggregator_entry *p1,
const struct tomoyo_aggregator_entry *p2)
{
return p1->original_name == p2->original_name &&
p1->aggregated_name == p2->aggregated_name;
}
static inline bool tomoyo_is_same_alias_entry
(const struct tomoyo_alias_entry *p1, const struct tomoyo_alias_entry *p2)
{
return p1->original_name == p2->original_name &&
p1->aliased_name == p2->aliased_name;
}
/** /**
* list_for_each_cookie - iterate over a list with cookie. * list_for_each_cookie - iterate over a list with cookie.
* @pos: the &struct list_head to use as a loop cursor. * @pos: the &struct list_head to use as a loop cursor.
......
...@@ -15,6 +15,49 @@ ...@@ -15,6 +15,49 @@
/* The initial domain. */ /* The initial domain. */
struct tomoyo_domain_info tomoyo_kernel_domain; struct tomoyo_domain_info tomoyo_kernel_domain;
/**
* tomoyo_update_policy - Update an entry for exception policy.
*
* @new_entry: Pointer to "struct tomoyo_acl_info".
* @size: Size of @new_entry in bytes.
* @is_delete: True if it is a delete request.
* @list: Pointer to "struct list_head".
* @check_duplicate: Callback function to find duplicated entry.
*
* Returns 0 on success, negative value otherwise.
*
* Caller holds tomoyo_read_lock().
*/
int tomoyo_update_policy(struct tomoyo_acl_head *new_entry, const int size,
bool is_delete, struct list_head *list,
bool (*check_duplicate) (const struct tomoyo_acl_head
*,
const struct tomoyo_acl_head
*))
{
int error = is_delete ? -ENOENT : -ENOMEM;
struct tomoyo_acl_head *entry;
if (mutex_lock_interruptible(&tomoyo_policy_lock))
return -ENOMEM;
list_for_each_entry_rcu(entry, list, list) {
if (!check_duplicate(entry, new_entry))
continue;
entry->is_deleted = is_delete;
error = 0;
break;
}
if (error && !is_delete) {
entry = tomoyo_commit_ok(new_entry, size);
if (entry) {
list_add_tail_rcu(&entry->list, list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
return error;
}
/** /**
* tomoyo_update_domain - Update an entry for domain policy. * tomoyo_update_domain - Update an entry for domain policy.
* *
...@@ -161,6 +204,20 @@ const char *tomoyo_get_last_name(const struct tomoyo_domain_info *domain) ...@@ -161,6 +204,20 @@ const char *tomoyo_get_last_name(const struct tomoyo_domain_info *domain)
*/ */
LIST_HEAD(tomoyo_domain_initializer_list); LIST_HEAD(tomoyo_domain_initializer_list);
static bool tomoyo_same_domain_initializer_entry(const struct tomoyo_acl_head *
a,
const struct tomoyo_acl_head *
b)
{
const struct tomoyo_domain_initializer_entry *p1 =
container_of(a, typeof(*p1), head);
const struct tomoyo_domain_initializer_entry *p2 =
container_of(b, typeof(*p2), head);
return p1->is_not == p2->is_not && p1->is_last_name == p2->is_last_name
&& p1->domainname == p2->domainname
&& p1->program == p2->program;
}
/** /**
* tomoyo_update_domain_initializer_entry - Update "struct tomoyo_domain_initializer_entry" list. * tomoyo_update_domain_initializer_entry - Update "struct tomoyo_domain_initializer_entry" list.
* *
...@@ -178,7 +235,6 @@ static int tomoyo_update_domain_initializer_entry(const char *domainname, ...@@ -178,7 +235,6 @@ static int tomoyo_update_domain_initializer_entry(const char *domainname,
const bool is_not, const bool is_not,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_domain_initializer_entry *ptr;
struct tomoyo_domain_initializer_entry e = { .is_not = is_not }; struct tomoyo_domain_initializer_entry e = { .is_not = is_not };
int error = is_delete ? -ENOENT : -ENOMEM; int error = is_delete ? -ENOENT : -ENOMEM;
...@@ -197,26 +253,9 @@ static int tomoyo_update_domain_initializer_entry(const char *domainname, ...@@ -197,26 +253,9 @@ static int tomoyo_update_domain_initializer_entry(const char *domainname,
e.program = tomoyo_get_name(program); e.program = tomoyo_get_name(program);
if (!e.program) if (!e.program)
goto out; goto out;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_domain_initializer_list,
list_for_each_entry_rcu(ptr, &tomoyo_domain_initializer_list, tomoyo_same_domain_initializer_entry);
head.list) {
if (!tomoyo_is_same_domain_initializer_entry(ptr, &e))
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_domain_initializer_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_domain_initializer_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out: out:
tomoyo_put_name(e.domainname); tomoyo_put_name(e.domainname);
tomoyo_put_name(e.program); tomoyo_put_name(e.program);
...@@ -373,6 +412,18 @@ static bool tomoyo_is_domain_initializer(const struct tomoyo_path_info * ...@@ -373,6 +412,18 @@ static bool tomoyo_is_domain_initializer(const struct tomoyo_path_info *
*/ */
LIST_HEAD(tomoyo_domain_keeper_list); LIST_HEAD(tomoyo_domain_keeper_list);
static bool tomoyo_same_domain_keeper_entry(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
const struct tomoyo_domain_keeper_entry *p1 =
container_of(a, typeof(*p1), head);
const struct tomoyo_domain_keeper_entry *p2 =
container_of(b, typeof(*p2), head);
return p1->is_not == p2->is_not && p1->is_last_name == p2->is_last_name
&& p1->domainname == p2->domainname
&& p1->program == p2->program;
}
/** /**
* tomoyo_update_domain_keeper_entry - Update "struct tomoyo_domain_keeper_entry" list. * tomoyo_update_domain_keeper_entry - Update "struct tomoyo_domain_keeper_entry" list.
* *
...@@ -390,7 +441,6 @@ static int tomoyo_update_domain_keeper_entry(const char *domainname, ...@@ -390,7 +441,6 @@ static int tomoyo_update_domain_keeper_entry(const char *domainname,
const bool is_not, const bool is_not,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_domain_keeper_entry *ptr;
struct tomoyo_domain_keeper_entry e = { .is_not = is_not }; struct tomoyo_domain_keeper_entry e = { .is_not = is_not };
int error = is_delete ? -ENOENT : -ENOMEM; int error = is_delete ? -ENOENT : -ENOMEM;
...@@ -409,25 +459,9 @@ static int tomoyo_update_domain_keeper_entry(const char *domainname, ...@@ -409,25 +459,9 @@ static int tomoyo_update_domain_keeper_entry(const char *domainname,
e.domainname = tomoyo_get_name(domainname); e.domainname = tomoyo_get_name(domainname);
if (!e.domainname) if (!e.domainname)
goto out; goto out;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_domain_keeper_list,
list_for_each_entry_rcu(ptr, &tomoyo_domain_keeper_list, head.list) { tomoyo_same_domain_keeper_entry);
if (!tomoyo_is_same_domain_keeper_entry(ptr, &e))
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_domain_keeper_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_domain_keeper_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out: out:
tomoyo_put_name(e.domainname); tomoyo_put_name(e.domainname);
tomoyo_put_name(e.program); tomoyo_put_name(e.program);
...@@ -565,6 +599,17 @@ static bool tomoyo_is_domain_keeper(const struct tomoyo_path_info *domainname, ...@@ -565,6 +599,17 @@ static bool tomoyo_is_domain_keeper(const struct tomoyo_path_info *domainname,
*/ */
LIST_HEAD(tomoyo_aggregator_list); LIST_HEAD(tomoyo_aggregator_list);
static bool tomoyo_same_aggregator_entry(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
const struct tomoyo_aggregator_entry *p1 = container_of(a, typeof(*p1),
head);
const struct tomoyo_aggregator_entry *p2 = container_of(b, typeof(*p2),
head);
return p1->original_name == p2->original_name &&
p1->aggregated_name == p2->aggregated_name;
}
/** /**
* tomoyo_update_aggregator_entry - Update "struct tomoyo_aggregator_entry" list. * tomoyo_update_aggregator_entry - Update "struct tomoyo_aggregator_entry" list.
* *
...@@ -580,7 +625,6 @@ static int tomoyo_update_aggregator_entry(const char *original_name, ...@@ -580,7 +625,6 @@ static int tomoyo_update_aggregator_entry(const char *original_name,
const char *aggregated_name, const char *aggregated_name,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_aggregator_entry *ptr;
struct tomoyo_aggregator_entry e = { }; struct tomoyo_aggregator_entry e = { };
int error = is_delete ? -ENOENT : -ENOMEM; int error = is_delete ? -ENOENT : -ENOMEM;
...@@ -592,25 +636,9 @@ static int tomoyo_update_aggregator_entry(const char *original_name, ...@@ -592,25 +636,9 @@ static int tomoyo_update_aggregator_entry(const char *original_name,
if (!e.original_name || !e.aggregated_name || if (!e.original_name || !e.aggregated_name ||
e.aggregated_name->is_patterned) /* No patterns allowed. */ e.aggregated_name->is_patterned) /* No patterns allowed. */
goto out; goto out;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_aggregator_list,
list_for_each_entry_rcu(ptr, &tomoyo_aggregator_list, head.list) { tomoyo_same_aggregator_entry);
if (!tomoyo_is_same_aggregator_entry(ptr, &e))
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_aggregator_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_aggregator_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out: out:
tomoyo_put_name(e.original_name); tomoyo_put_name(e.original_name);
tomoyo_put_name(e.aggregated_name); tomoyo_put_name(e.aggregated_name);
...@@ -699,6 +727,17 @@ int tomoyo_write_aggregator_policy(char *data, const bool is_delete) ...@@ -699,6 +727,17 @@ int tomoyo_write_aggregator_policy(char *data, const bool is_delete)
*/ */
LIST_HEAD(tomoyo_alias_list); LIST_HEAD(tomoyo_alias_list);
static bool tomoyo_same_alias_entry(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
const struct tomoyo_alias_entry *p1 = container_of(a, typeof(*p1),
head);
const struct tomoyo_alias_entry *p2 = container_of(b, typeof(*p2),
head);
return p1->original_name == p2->original_name &&
p1->aliased_name == p2->aliased_name;
}
/** /**
* tomoyo_update_alias_entry - Update "struct tomoyo_alias_entry" list. * tomoyo_update_alias_entry - Update "struct tomoyo_alias_entry" list.
* *
...@@ -714,7 +753,6 @@ static int tomoyo_update_alias_entry(const char *original_name, ...@@ -714,7 +753,6 @@ static int tomoyo_update_alias_entry(const char *original_name,
const char *aliased_name, const char *aliased_name,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_alias_entry *ptr;
struct tomoyo_alias_entry e = { }; struct tomoyo_alias_entry e = { };
int error = is_delete ? -ENOENT : -ENOMEM; int error = is_delete ? -ENOENT : -ENOMEM;
...@@ -726,25 +764,9 @@ static int tomoyo_update_alias_entry(const char *original_name, ...@@ -726,25 +764,9 @@ static int tomoyo_update_alias_entry(const char *original_name,
if (!e.original_name || !e.aliased_name || if (!e.original_name || !e.aliased_name ||
e.original_name->is_patterned || e.aliased_name->is_patterned) e.original_name->is_patterned || e.aliased_name->is_patterned)
goto out; /* No patterns allowed. */ goto out; /* No patterns allowed. */
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_alias_list,
list_for_each_entry_rcu(ptr, &tomoyo_alias_list, head.list) { tomoyo_same_alias_entry);
if (!tomoyo_is_same_alias_entry(ptr, &e))
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_alias_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_alias_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out: out:
tomoyo_put_name(e.original_name); tomoyo_put_name(e.original_name);
tomoyo_put_name(e.aliased_name); tomoyo_put_name(e.aliased_name);
......
...@@ -253,6 +253,15 @@ static int tomoyo_update_path_acl(const u8 type, const char *filename, ...@@ -253,6 +253,15 @@ static int tomoyo_update_path_acl(const u8 type, const char *filename,
*/ */
LIST_HEAD(tomoyo_globally_readable_list); LIST_HEAD(tomoyo_globally_readable_list);
static bool tomoyo_same_globally_readable(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
return container_of(a, struct tomoyo_globally_readable_file_entry,
head)->filename ==
container_of(b, struct tomoyo_globally_readable_file_entry,
head)->filename;
}
/** /**
* tomoyo_update_globally_readable_entry - Update "struct tomoyo_globally_readable_file_entry" list. * tomoyo_update_globally_readable_entry - Update "struct tomoyo_globally_readable_file_entry" list.
* *
...@@ -266,36 +275,17 @@ LIST_HEAD(tomoyo_globally_readable_list); ...@@ -266,36 +275,17 @@ LIST_HEAD(tomoyo_globally_readable_list);
static int tomoyo_update_globally_readable_entry(const char *filename, static int tomoyo_update_globally_readable_entry(const char *filename,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_globally_readable_file_entry *ptr;
struct tomoyo_globally_readable_file_entry e = { }; struct tomoyo_globally_readable_file_entry e = { };
int error = is_delete ? -ENOENT : -ENOMEM; int error;
if (!tomoyo_is_correct_word(filename)) if (!tomoyo_is_correct_word(filename))
return -EINVAL; return -EINVAL;
e.filename = tomoyo_get_name(filename); e.filename = tomoyo_get_name(filename);
if (!e.filename) if (!e.filename)
return -ENOMEM; return -ENOMEM;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_globally_readable_list,
list_for_each_entry_rcu(ptr, &tomoyo_globally_readable_list, tomoyo_same_globally_readable);
head.list) {
if (ptr->filename != e.filename)
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_globally_readable_file_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_globally_readable_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out:
tomoyo_put_name(e.filename); tomoyo_put_name(e.filename);
return error; return error;
} }
...@@ -402,6 +392,13 @@ bool tomoyo_read_globally_readable_policy(struct tomoyo_io_buffer *head) ...@@ -402,6 +392,13 @@ bool tomoyo_read_globally_readable_policy(struct tomoyo_io_buffer *head)
*/ */
LIST_HEAD(tomoyo_pattern_list); LIST_HEAD(tomoyo_pattern_list);
static bool tomoyo_same_pattern(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
return container_of(a, struct tomoyo_pattern_entry, head)->pattern ==
container_of(b, struct tomoyo_pattern_entry, head)->pattern;
}
/** /**
* tomoyo_update_file_pattern_entry - Update "struct tomoyo_pattern_entry" list. * tomoyo_update_file_pattern_entry - Update "struct tomoyo_pattern_entry" list.
* *
...@@ -415,35 +412,17 @@ LIST_HEAD(tomoyo_pattern_list); ...@@ -415,35 +412,17 @@ LIST_HEAD(tomoyo_pattern_list);
static int tomoyo_update_file_pattern_entry(const char *pattern, static int tomoyo_update_file_pattern_entry(const char *pattern,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_pattern_entry *ptr;
struct tomoyo_pattern_entry e = { }; struct tomoyo_pattern_entry e = { };
int error = is_delete ? -ENOENT : -ENOMEM; int error;
if (!tomoyo_is_correct_word(pattern)) if (!tomoyo_is_correct_word(pattern))
return -EINVAL; return -EINVAL;
e.pattern = tomoyo_get_name(pattern); e.pattern = tomoyo_get_name(pattern);
if (!e.pattern) if (!e.pattern)
return error; return -ENOMEM;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_pattern_list,
list_for_each_entry_rcu(ptr, &tomoyo_pattern_list, head.list) { tomoyo_same_pattern);
if (e.pattern != ptr->pattern)
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_pattern_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_pattern_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out:
tomoyo_put_name(e.pattern); tomoyo_put_name(e.pattern);
return error; return error;
} }
...@@ -553,6 +532,14 @@ bool tomoyo_read_file_pattern(struct tomoyo_io_buffer *head) ...@@ -553,6 +532,14 @@ bool tomoyo_read_file_pattern(struct tomoyo_io_buffer *head)
*/ */
LIST_HEAD(tomoyo_no_rewrite_list); LIST_HEAD(tomoyo_no_rewrite_list);
static bool tomoyo_same_no_rewrite(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
return container_of(a, struct tomoyo_no_rewrite_entry, head)->pattern
== container_of(b, struct tomoyo_no_rewrite_entry, head)
->pattern;
}
/** /**
* tomoyo_update_no_rewrite_entry - Update "struct tomoyo_no_rewrite_entry" list. * tomoyo_update_no_rewrite_entry - Update "struct tomoyo_no_rewrite_entry" list.
* *
...@@ -566,35 +553,17 @@ LIST_HEAD(tomoyo_no_rewrite_list); ...@@ -566,35 +553,17 @@ LIST_HEAD(tomoyo_no_rewrite_list);
static int tomoyo_update_no_rewrite_entry(const char *pattern, static int tomoyo_update_no_rewrite_entry(const char *pattern,
const bool is_delete) const bool is_delete)
{ {
struct tomoyo_no_rewrite_entry *ptr;
struct tomoyo_no_rewrite_entry e = { }; struct tomoyo_no_rewrite_entry e = { };
int error = is_delete ? -ENOENT : -ENOMEM; int error;
if (!tomoyo_is_correct_word(pattern)) if (!tomoyo_is_correct_word(pattern))
return -EINVAL; return -EINVAL;
e.pattern = tomoyo_get_name(pattern); e.pattern = tomoyo_get_name(pattern);
if (!e.pattern) if (!e.pattern)
return error; return -ENOMEM;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &tomoyo_no_rewrite_list,
list_for_each_entry_rcu(ptr, &tomoyo_no_rewrite_list, head.list) { tomoyo_same_no_rewrite);
if (ptr->pattern != e.pattern)
continue;
ptr->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_no_rewrite_entry *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&tomoyo_no_rewrite_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out:
tomoyo_put_name(e.pattern); tomoyo_put_name(e.pattern);
return error; return error;
} }
......
...@@ -56,6 +56,18 @@ struct tomoyo_number_group *tomoyo_get_number_group(const char *group_name) ...@@ -56,6 +56,18 @@ struct tomoyo_number_group *tomoyo_get_number_group(const char *group_name)
return !error ? group : NULL; return !error ? group : NULL;
} }
static bool tomoyo_same_number_group(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
return !memcmp(&container_of(a, struct tomoyo_number_group_member,
head)->number,
&container_of(b, struct tomoyo_number_group_member,
head)->number,
sizeof(container_of(a,
struct tomoyo_number_group_member,
head)->number));
}
/** /**
* tomoyo_write_number_group_policy - Write "struct tomoyo_number_group" list. * tomoyo_write_number_group_policy - Write "struct tomoyo_number_group" list.
* *
...@@ -68,40 +80,19 @@ int tomoyo_write_number_group_policy(char *data, const bool is_delete) ...@@ -68,40 +80,19 @@ int tomoyo_write_number_group_policy(char *data, const bool is_delete)
{ {
struct tomoyo_number_group *group; struct tomoyo_number_group *group;
struct tomoyo_number_group_member e = { }; struct tomoyo_number_group_member e = { };
struct tomoyo_number_group_member *member; int error;
int error = is_delete ? -ENOENT : -ENOMEM;
char *w[2]; char *w[2];
if (!tomoyo_tokenize(data, w, sizeof(w))) if (!tomoyo_tokenize(data, w, sizeof(w)))
return -EINVAL; return -EINVAL;
if (!tomoyo_parse_number_union(w[1], &e.number)) if (w[1][0] == '@' || !tomoyo_parse_number_union(w[1], &e.number) ||
e.number.values[0] > e.number.values[1])
return -EINVAL; return -EINVAL;
if (e.number.is_group || e.number.values[0] > e.number.values[1]) {
tomoyo_put_number_union(&e.number);
return -EINVAL;
}
group = tomoyo_get_number_group(w[0]); group = tomoyo_get_number_group(w[0]);
if (!group) if (!group)
return -ENOMEM; return -ENOMEM;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &group->member_list,
list_for_each_entry_rcu(member, &group->member_list, head.list) { tomoyo_same_number_group);
if (memcmp(&member->number, &e.number, sizeof(e.number)))
continue;
member->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_number_group_member *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&group->member_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out:
tomoyo_put_number_group(group); tomoyo_put_number_group(group);
return error; return error;
} }
......
...@@ -54,6 +54,15 @@ struct tomoyo_path_group *tomoyo_get_path_group(const char *group_name) ...@@ -54,6 +54,15 @@ struct tomoyo_path_group *tomoyo_get_path_group(const char *group_name)
return !error ? group : NULL; return !error ? group : NULL;
} }
static bool tomoyo_same_path_group(const struct tomoyo_acl_head *a,
const struct tomoyo_acl_head *b)
{
return container_of(a, struct tomoyo_path_group_member, head)
->member_name ==
container_of(b, struct tomoyo_path_group_member, head)
->member_name;
}
/** /**
* tomoyo_write_path_group_policy - Write "struct tomoyo_path_group" list. * tomoyo_write_path_group_policy - Write "struct tomoyo_path_group" list.
* *
...@@ -65,7 +74,6 @@ struct tomoyo_path_group *tomoyo_get_path_group(const char *group_name) ...@@ -65,7 +74,6 @@ struct tomoyo_path_group *tomoyo_get_path_group(const char *group_name)
int tomoyo_write_path_group_policy(char *data, const bool is_delete) int tomoyo_write_path_group_policy(char *data, const bool is_delete)
{ {
struct tomoyo_path_group *group; struct tomoyo_path_group *group;
struct tomoyo_path_group_member *member;
struct tomoyo_path_group_member e = { }; struct tomoyo_path_group_member e = { };
int error = is_delete ? -ENOENT : -ENOMEM; int error = is_delete ? -ENOENT : -ENOMEM;
char *w[2]; char *w[2];
...@@ -77,25 +85,9 @@ int tomoyo_write_path_group_policy(char *data, const bool is_delete) ...@@ -77,25 +85,9 @@ int tomoyo_write_path_group_policy(char *data, const bool is_delete)
e.member_name = tomoyo_get_name(w[1]); e.member_name = tomoyo_get_name(w[1]);
if (!e.member_name) if (!e.member_name)
goto out; goto out;
if (mutex_lock_interruptible(&tomoyo_policy_lock)) error = tomoyo_update_policy(&e.head, sizeof(e), is_delete,
goto out; &group->member_list,
list_for_each_entry_rcu(member, &group->member_list, head.list) { tomoyo_same_path_group);
if (member->member_name != e.member_name)
continue;
member->head.is_deleted = is_delete;
error = 0;
break;
}
if (!is_delete && error) {
struct tomoyo_path_group_member *entry =
tomoyo_commit_ok(&e, sizeof(e));
if (entry) {
list_add_tail_rcu(&entry->head.list,
&group->member_list);
error = 0;
}
}
mutex_unlock(&tomoyo_policy_lock);
out: out:
tomoyo_put_name(e.member_name); tomoyo_put_name(e.member_name);
tomoyo_put_path_group(group); tomoyo_put_path_group(group);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment