Linux 2.6.36-rc3
[linux/fpc-iii.git] / security / keys / gc.c
bloba46e825cbf0265311288115453ee25227baa28e4
1 /* Key garbage collector
3 * Copyright (C) 2009 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public Licence
8 * as published by the Free Software Foundation; either version
9 * 2 of the Licence, or (at your option) any later version.
12 #include <linux/module.h>
13 #include <keys/keyring-type.h>
14 #include "internal.h"
17 * Delay between key revocation/expiry in seconds
19 unsigned key_gc_delay = 5 * 60;
22 * Reaper
24 static void key_gc_timer_func(unsigned long);
25 static void key_garbage_collector(struct work_struct *);
26 static DEFINE_TIMER(key_gc_timer, key_gc_timer_func, 0, 0);
27 static DECLARE_WORK(key_gc_work, key_garbage_collector);
28 static key_serial_t key_gc_cursor; /* the last key the gc considered */
29 static bool key_gc_again;
30 static unsigned long key_gc_executing;
31 static time_t key_gc_next_run = LONG_MAX;
32 static time_t key_gc_new_timer;
35 * Schedule a garbage collection run
36 * - precision isn't particularly important
38 void key_schedule_gc(time_t gc_at)
40 unsigned long expires;
41 time_t now = current_kernel_time().tv_sec;
43 kenter("%ld", gc_at - now);
45 if (gc_at <= now) {
46 schedule_work(&key_gc_work);
47 } else if (gc_at < key_gc_next_run) {
48 expires = jiffies + (gc_at - now) * HZ;
49 mod_timer(&key_gc_timer, expires);
54 * The garbage collector timer kicked off
56 static void key_gc_timer_func(unsigned long data)
58 kenter("");
59 key_gc_next_run = LONG_MAX;
60 schedule_work(&key_gc_work);
64 * Garbage collect pointers from a keyring
65 * - return true if we altered the keyring
67 static bool key_gc_keyring(struct key *keyring, time_t limit)
68 __releases(key_serial_lock)
70 struct keyring_list *klist;
71 struct key *key;
72 int loop;
74 kenter("%x", key_serial(keyring));
76 if (test_bit(KEY_FLAG_REVOKED, &keyring->flags))
77 goto dont_gc;
79 /* scan the keyring looking for dead keys */
80 rcu_read_lock();
81 klist = rcu_dereference(keyring->payload.subscriptions);
82 if (!klist)
83 goto unlock_dont_gc;
85 for (loop = klist->nkeys - 1; loop >= 0; loop--) {
86 key = klist->keys[loop];
87 if (test_bit(KEY_FLAG_DEAD, &key->flags) ||
88 (key->expiry > 0 && key->expiry <= limit))
89 goto do_gc;
92 unlock_dont_gc:
93 rcu_read_unlock();
94 dont_gc:
95 kleave(" = false");
96 return false;
98 do_gc:
99 rcu_read_unlock();
100 key_gc_cursor = keyring->serial;
101 key_get(keyring);
102 spin_unlock(&key_serial_lock);
103 keyring_gc(keyring, limit);
104 key_put(keyring);
105 kleave(" = true");
106 return true;
110 * Garbage collector for keys
111 * - this involves scanning the keyrings for dead, expired and revoked keys
112 * that have overstayed their welcome
114 static void key_garbage_collector(struct work_struct *work)
116 struct rb_node *rb;
117 key_serial_t cursor;
118 struct key *key, *xkey;
119 time_t new_timer = LONG_MAX, limit, now;
121 now = current_kernel_time().tv_sec;
122 kenter("[%x,%ld]", key_gc_cursor, key_gc_new_timer - now);
124 if (test_and_set_bit(0, &key_gc_executing)) {
125 key_schedule_gc(current_kernel_time().tv_sec + 1);
126 kleave(" [busy; deferring]");
127 return;
130 limit = now;
131 if (limit > key_gc_delay)
132 limit -= key_gc_delay;
133 else
134 limit = key_gc_delay;
136 spin_lock(&key_serial_lock);
138 if (unlikely(RB_EMPTY_ROOT(&key_serial_tree))) {
139 spin_unlock(&key_serial_lock);
140 clear_bit(0, &key_gc_executing);
141 return;
144 cursor = key_gc_cursor;
145 if (cursor < 0)
146 cursor = 0;
147 if (cursor > 0)
148 new_timer = key_gc_new_timer;
149 else
150 key_gc_again = false;
152 /* find the first key above the cursor */
153 key = NULL;
154 rb = key_serial_tree.rb_node;
155 while (rb) {
156 xkey = rb_entry(rb, struct key, serial_node);
157 if (cursor < xkey->serial) {
158 key = xkey;
159 rb = rb->rb_left;
160 } else if (cursor > xkey->serial) {
161 rb = rb->rb_right;
162 } else {
163 rb = rb_next(rb);
164 if (!rb)
165 goto reached_the_end;
166 key = rb_entry(rb, struct key, serial_node);
167 break;
171 if (!key)
172 goto reached_the_end;
174 /* trawl through the keys looking for keyrings */
175 for (;;) {
176 if (key->expiry > limit && key->expiry < new_timer) {
177 kdebug("will expire %x in %ld",
178 key_serial(key), key->expiry - limit);
179 new_timer = key->expiry;
182 if (key->type == &key_type_keyring &&
183 key_gc_keyring(key, limit))
184 /* the gc had to release our lock so that the keyring
185 * could be modified, so we have to get it again */
186 goto gc_released_our_lock;
188 rb = rb_next(&key->serial_node);
189 if (!rb)
190 goto reached_the_end;
191 key = rb_entry(rb, struct key, serial_node);
194 gc_released_our_lock:
195 kdebug("gc_released_our_lock");
196 key_gc_new_timer = new_timer;
197 key_gc_again = true;
198 clear_bit(0, &key_gc_executing);
199 schedule_work(&key_gc_work);
200 kleave(" [continue]");
201 return;
203 /* when we reach the end of the run, we set the timer for the next one */
204 reached_the_end:
205 kdebug("reached_the_end");
206 spin_unlock(&key_serial_lock);
207 key_gc_new_timer = new_timer;
208 key_gc_cursor = 0;
209 clear_bit(0, &key_gc_executing);
211 if (key_gc_again) {
212 /* there may have been a key that expired whilst we were
213 * scanning, so if we discarded any links we should do another
214 * scan */
215 new_timer = now + 1;
216 key_schedule_gc(new_timer);
217 } else if (new_timer < LONG_MAX) {
218 new_timer += key_gc_delay;
219 key_schedule_gc(new_timer);
221 kleave(" [end]");