@@ -21,6 +21,7 @@
#include <linux/path.h>
#include <linux/key.h>
#include <linux/skbuff.h>
+#include <rdma/ib_verbs.h>
struct lsm_network_audit {
int netif;
@@ -50,21 +51,27 @@ struct lsm_pkey_audit {
u16 pkey;
};
+struct lsm_ib_end_port_audit {
+ char dev_name[IB_DEVICE_NAME_MAX];
+ u8 port;
+};
+
/* Auxiliary data to use in generating the audit record. */
struct common_audit_data {
char type;
-#define LSM_AUDIT_DATA_PATH 1
-#define LSM_AUDIT_DATA_NET 2
-#define LSM_AUDIT_DATA_CAP 3
-#define LSM_AUDIT_DATA_IPC 4
-#define LSM_AUDIT_DATA_TASK 5
-#define LSM_AUDIT_DATA_KEY 6
-#define LSM_AUDIT_DATA_NONE 7
-#define LSM_AUDIT_DATA_KMOD 8
-#define LSM_AUDIT_DATA_INODE 9
-#define LSM_AUDIT_DATA_DENTRY 10
-#define LSM_AUDIT_DATA_IOCTL_OP 11
-#define LSM_AUDIT_DATA_PKEY 12
+#define LSM_AUDIT_DATA_PATH 1
+#define LSM_AUDIT_DATA_NET 2
+#define LSM_AUDIT_DATA_CAP 3
+#define LSM_AUDIT_DATA_IPC 4
+#define LSM_AUDIT_DATA_TASK 5
+#define LSM_AUDIT_DATA_KEY 6
+#define LSM_AUDIT_DATA_NONE 7
+#define LSM_AUDIT_DATA_KMOD 8
+#define LSM_AUDIT_DATA_INODE 9
+#define LSM_AUDIT_DATA_DENTRY 10
+#define LSM_AUDIT_DATA_IOCTL_OP 11
+#define LSM_AUDIT_DATA_PKEY 12
+#define LSM_AUDIT_DATA_IB_END_PORT 13
union {
struct path path;
struct dentry *dentry;
@@ -82,6 +89,7 @@ struct common_audit_data {
char *kmod_name;
struct lsm_ioctlop_audit *op;
struct lsm_pkey_audit *pkey;
+ struct lsm_ib_end_port_audit *ib_end_port;
} u;
/* this union contains LSM specific data */
union {
@@ -5996,6 +5996,32 @@ static int selinux_ib_mad_agent_pkey_access(u64 subnet_prefix, u16 pkey_val,
mad_agent->m_security);
}
+static int selinux_ib_end_port_smp(const char *dev_name, u8 port,
+ struct ib_mad_agent *mad_agent)
+{
+ struct common_audit_data ad;
+ int err;
+ u32 sid = 0;
+ struct ib_security_struct *sec = mad_agent->m_security;
+ struct lsm_ib_end_port_audit ib_end_port;
+
+ err = security_ib_end_port_sid(dev_name, port, &sid);
+
+ if (err)
+ goto out;
+
+ ad.type = LSM_AUDIT_DATA_IB_END_PORT;
+ strncpy(ib_end_port.dev_name, dev_name, sizeof(ib_end_port.dev_name));
+ ib_end_port.port = port;
+ ad.u.ib_end_port = &ib_end_port;
+ err = avc_has_perm(sec->sid, sid,
+ SECCLASS_INFINIBAND_END_PORT,
+ INFINIBAND_END_PORT__SMP, &ad);
+
+out:
+ return err;
+}
+
static int selinux_ib_qp_alloc_security(struct ib_qp_security *qp_sec)
{
struct ib_security_struct *sec;
@@ -6228,6 +6254,7 @@ static struct security_hook_list selinux_hooks[] = {
LSM_HOOK_INIT(ib_qp_pkey_access, selinux_ib_qp_pkey_access),
LSM_HOOK_INIT(ib_mad_agent_pkey_access,
selinux_ib_mad_agent_pkey_access),
+ LSM_HOOK_INIT(ib_end_port_smp, selinux_ib_end_port_smp),
LSM_HOOK_INIT(ib_qp_alloc_security,
selinux_ib_qp_alloc_security),
LSM_HOOK_INIT(ib_qp_free_security,
@@ -159,5 +159,7 @@ struct security_class_mapping secclass_map[] = {
NULL } },
{ "infiniband_pkey",
{ "access", NULL } },
+ { "infiniband_end_port",
+ { "smp", NULL } },
{ NULL }
};
@@ -30,5 +30,6 @@ static const char *initial_sid_to_string[] =
"scmp_packet",
"devnull",
"pkey",
+ "ib_end_port",
};
@@ -182,6 +182,8 @@ int security_port_sid(u8 protocol, u16 port, u32 *out_sid);
int security_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *out_sid);
+int security_ib_end_port_sid(const char *dev_name, u8 port, u32 *out_sid);
+
int security_netif_sid(char *name, u32 *if_sid);
int security_node_sid(u16 domain, void *addr, u32 addrlen,
@@ -53,6 +53,7 @@
#include <linux/flex_array.h>
#include <linux/vmalloc.h>
#include <net/netlabel.h>
+#include <rdma/ib_verbs.h>
#include "flask.h"
#include "avc.h"
@@ -2270,6 +2271,48 @@ out:
}
/**
+ * security_ib_end_port_sid - Obtain the SID for a subnet management interface.
+ * @dev_name: device name
+ * @port: port number
+ * @out_sid: security identifier
+ */
+int security_ib_end_port_sid(const char *dev_name, u8 port, u32 *out_sid)
+{
+ struct ocontext *c;
+ int rc = 0;
+
+ read_lock(&policy_rwlock);
+
+ c = policydb.ocontexts[OCON_IB_END_PORT];
+ while (c) {
+ if (c->u.ib_end_port.port == port &&
+ !strncmp(c->u.ib_end_port.dev_name,
+ dev_name,
+ IB_DEVICE_NAME_MAX))
+ break;
+
+ c = c->next;
+ }
+
+ if (c) {
+ if (!c->sid[0]) {
+ rc = sidtab_context_to_sid(&sidtab,
+ &c->context[0],
+ &c->sid[0]);
+ if (rc)
+ goto out;
+ }
+ *out_sid = c->sid[0];
+ } else {
+ *out_sid = SECINITSID_IB_END_PORT;
+ }
+
+out:
+ read_unlock(&policy_rwlock);
+ return rc;
+}
+
+/**
* security_netif_sid - Obtain the SID for a network interface.
* @name: interface name
* @if_sid: interface SID