4795b82c13
would allocate two 'struct pipe's from the pipe zone, and malloc a mutex. - Create a new "struct pipepair" object holding the two 'struct pipe' instances, struct mutex, and struct label reference. Pipe structures now have a back-pointer to the pipe pair, and a 'pipe_present' flag to indicate whether the half has been closed. - Perform mutex init/destroy in zone init/destroy, avoiding reallocating the mutex for each pipe. Perform most pipe structure setup in zone constructor. - VM memory mappings for pageable buffers are still done outside of the UMA zone. - Change MAC API to speak 'struct pipepair' instead of 'struct pipe', update many policies. MAC labels are also handled outside of the UMA zone for now. Label-only policy modules don't have to be recompiled, but if a module is recompiled, its pipe entry points will need to be updated. If a module actually reached into the pipe structures (unlikely), that would also need to be modified. These changes substantially simplify failure handling in the pipe code as there are many fewer possible failure modes. On half-close, pipes no longer free the 'struct pipe' for the closed half until a full-close takes place. However, VM mapped buffers are still released on half-close. Some code refactoring is now possible to clean up some of the back references, etc; this patch attempts not to change the structure of most of the pipe implementation, only allocation/free code paths, so as to avoid introducing bugs (hopefully). This cuts about 8%-9% off the cost of sequential pipe allocation and free in system call tests on UP and SMP in my micro-benchmarks. May or may not make a difference in macro-benchmarks, but doing less work is good. Reviewed by: juli, tjr Testing help: dwhite, fenestro, scottl, et al
250 lines
5.4 KiB
C
250 lines
5.4 KiB
C
/*-
|
|
* Copyright (c) 2002, 2003 Networks Associates Technology, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This software was developed for the FreeBSD Project in part by Network
|
|
* Associates Laboratories, the Security Research Division of Network
|
|
* Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"),
|
|
* as part of the DARPA CHATS research program.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#include "opt_mac.h"
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/lock.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/mutex.h>
|
|
#include <sys/mac.h>
|
|
#include <sys/sbuf.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/vnode.h>
|
|
#include <sys/pipe.h>
|
|
#include <sys/sysctl.h>
|
|
|
|
#include <sys/mac_policy.h>
|
|
|
|
#include <security/mac/mac_internal.h>
|
|
|
|
static int mac_enforce_pipe = 1;
|
|
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
|
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
|
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
|
|
|
#ifdef MAC_DEBUG
|
|
static unsigned int nmacpipes;
|
|
SYSCTL_UINT(_security_mac_debug_counters, OID_AUTO, pipes, CTLFLAG_RD,
|
|
&nmacpipes, 0, "number of pipes in use");
|
|
#endif
|
|
|
|
struct label *
|
|
mac_pipe_label_alloc(void)
|
|
{
|
|
struct label *label;
|
|
|
|
label = mac_labelzone_alloc(M_WAITOK);
|
|
MAC_PERFORM(init_pipe_label, label);
|
|
MAC_DEBUG_COUNTER_INC(&nmacpipes);
|
|
return (label);
|
|
}
|
|
|
|
void
|
|
mac_init_pipe(struct pipepair *pp)
|
|
{
|
|
|
|
pp->pp_label = mac_pipe_label_alloc();
|
|
}
|
|
|
|
void
|
|
mac_pipe_label_free(struct label *label)
|
|
{
|
|
|
|
MAC_PERFORM(destroy_pipe_label, label);
|
|
mac_labelzone_free(label);
|
|
MAC_DEBUG_COUNTER_DEC(&nmacpipes);
|
|
}
|
|
|
|
void
|
|
mac_destroy_pipe(struct pipepair *pp)
|
|
{
|
|
|
|
mac_pipe_label_free(pp->pp_label);
|
|
pp->pp_label = NULL;
|
|
}
|
|
|
|
void
|
|
mac_copy_pipe_label(struct label *src, struct label *dest)
|
|
{
|
|
|
|
MAC_PERFORM(copy_pipe_label, src, dest);
|
|
}
|
|
|
|
int
|
|
mac_externalize_pipe_label(struct label *label, char *elements,
|
|
char *outbuf, size_t outbuflen)
|
|
{
|
|
int error;
|
|
|
|
MAC_EXTERNALIZE(pipe, label, elements, outbuf, outbuflen);
|
|
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
mac_internalize_pipe_label(struct label *label, char *string)
|
|
{
|
|
int error;
|
|
|
|
MAC_INTERNALIZE(pipe, label, string);
|
|
|
|
return (error);
|
|
}
|
|
|
|
void
|
|
mac_create_pipe(struct ucred *cred, struct pipepair *pp)
|
|
{
|
|
|
|
MAC_PERFORM(create_pipe, cred, pp, pp->pp_label);
|
|
}
|
|
|
|
static void
|
|
mac_relabel_pipe(struct ucred *cred, struct pipepair *pp,
|
|
struct label *newlabel)
|
|
{
|
|
|
|
MAC_PERFORM(relabel_pipe, cred, pp, pp->pp_label, newlabel);
|
|
}
|
|
|
|
int
|
|
mac_check_pipe_ioctl(struct ucred *cred, struct pipepair *pp,
|
|
unsigned long cmd, void *data)
|
|
{
|
|
int error;
|
|
|
|
mtx_assert(&pp->pp_mtx, MA_OWNED);
|
|
|
|
if (!mac_enforce_pipe)
|
|
return (0);
|
|
|
|
MAC_CHECK(check_pipe_ioctl, cred, pp, pp->pp_label, cmd, data);
|
|
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
mac_check_pipe_poll(struct ucred *cred, struct pipepair *pp)
|
|
{
|
|
int error;
|
|
|
|
mtx_assert(&pp->pp_mtx, MA_OWNED);
|
|
|
|
if (!mac_enforce_pipe)
|
|
return (0);
|
|
|
|
MAC_CHECK(check_pipe_poll, cred, pp, pp->pp_label);
|
|
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
mac_check_pipe_read(struct ucred *cred, struct pipepair *pp)
|
|
{
|
|
int error;
|
|
|
|
mtx_assert(&pp->pp_mtx, MA_OWNED);
|
|
|
|
if (!mac_enforce_pipe)
|
|
return (0);
|
|
|
|
MAC_CHECK(check_pipe_read, cred, pp, pp->pp_label);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
mac_check_pipe_relabel(struct ucred *cred, struct pipepair *pp,
|
|
struct label *newlabel)
|
|
{
|
|
int error;
|
|
|
|
mtx_assert(&pp->pp_mtx, MA_OWNED);
|
|
|
|
if (!mac_enforce_pipe)
|
|
return (0);
|
|
|
|
MAC_CHECK(check_pipe_relabel, cred, pp, pp->pp_label, newlabel);
|
|
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
mac_check_pipe_stat(struct ucred *cred, struct pipepair *pp)
|
|
{
|
|
int error;
|
|
|
|
mtx_assert(&pp->pp_mtx, MA_OWNED);
|
|
|
|
if (!mac_enforce_pipe)
|
|
return (0);
|
|
|
|
MAC_CHECK(check_pipe_stat, cred, pp, pp->pp_label);
|
|
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
mac_check_pipe_write(struct ucred *cred, struct pipepair *pp)
|
|
{
|
|
int error;
|
|
|
|
mtx_assert(&pp->pp_mtx, MA_OWNED);
|
|
|
|
if (!mac_enforce_pipe)
|
|
return (0);
|
|
|
|
MAC_CHECK(check_pipe_write, cred, pp, pp->pp_label);
|
|
|
|
return (error);
|
|
}
|
|
|
|
int
|
|
mac_pipe_label_set(struct ucred *cred, struct pipepair *pp,
|
|
struct label *label)
|
|
{
|
|
int error;
|
|
|
|
mtx_assert(&pp->pp_mtx, MA_OWNED);
|
|
|
|
error = mac_check_pipe_relabel(cred, pp, label);
|
|
if (error)
|
|
return (error);
|
|
|
|
mac_relabel_pipe(cred, pp, label);
|
|
|
|
return (0);
|
|
}
|