[PATCH v7 2/9] IB/core: Enforce PKey security on QPs
Paul Moore
paul at paul-moore.com
Fri May 19 19:13:06 UTC 2017
On Fri, May 19, 2017 at 8:48 AM, Dan Jurgens <danielj at mellanox.com> wrote:
> From: Daniel Jurgens <danielj at mellanox.com>
>
> Add new LSM hooks to allocate and free security contexts and check for
> permission to access a PKey.
...
> diff --git a/security/security.c b/security/security.c
> index 54b1e39..a142a0b 100644
> --- a/security/security.c
> +++ b/security/security.c
> @@ -4,6 +4,7 @@
> * Copyright (C) 2001 WireX Communications, Inc <chris at wirex.com>
> * Copyright (C) 2001-2002 Greg Kroah-Hartman <greg at kroah.com>
> * Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley at nai.com>
> + * Copyright (C) 2016 Mellanox Technologies
> *
> * This program is free software; you can redistribute it and/or modify
> * it under the terms of the GNU General Public License as published by
> @@ -1511,6 +1512,27 @@ EXPORT_SYMBOL(security_tun_dev_open);
>
> #endif /* CONFIG_SECURITY_NETWORK */
>
> +#ifdef CONFIG_SECURITY_INFINIBAND
> +
> +int security_ib_pkey_access(void *sec, u64 subnet_prefix, u16 pkey)
> +{
> + return call_int_hook(ib_pkey_access, 0, sec, subnet_prefix, pkey);
> +}
> +EXPORT_SYMBOL(security_ib_pkey_access);
> +
> +int security_ib_alloc_security(void **sec)
> +{
> + return call_int_hook(ib_alloc_security, 0, sec);
> +}
> +EXPORT_SYMBOL(security_ib_alloc_security);
> +
> +void security_ib_free_security(void *sec)
> +{
> + call_void_hook(ib_free_security, sec);
> +}
> +EXPORT_SYMBOL(security_ib_free_security);
> +#endif /* CONFIG_SECURITY_INFINIBAND */
> +
> #ifdef CONFIG_SECURITY_NETWORK_XFRM
>
> int security_xfrm_policy_alloc(struct xfrm_sec_ctx **ctxp,
> @@ -1658,3 +1680,366 @@ int security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule,
> actx);
> }
> #endif /* CONFIG_AUDIT */
> +
> +struct security_hook_heads security_hook_heads __lsm_ro_after_init = {
> + .binder_set_context_mgr =
> + LIST_HEAD_INIT(security_hook_heads.binder_set_context_mgr),
> + .binder_transaction =
> + LIST_HEAD_INIT(security_hook_heads.binder_transaction),
> + .binder_transfer_binder =
> + LIST_HEAD_INIT(security_hook_heads.binder_transfer_binder),
> + .binder_transfer_file =
> + LIST_HEAD_INIT(security_hook_heads.binder_transfer_file),
FYI, the security_hook_heads initialization was recently removed in
3dfc9b02864b ("LSM: Initialize security_hook_heads upon
registration."), you don't need this code in your patch anymore.
In the interest of moving things along I'm going to drop this block
from the patch (it's trivial), but please make note in case a respin
is needed.
--
paul moore
www.paul-moore.com
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list