From patchwork Wed Dec 18 06:00:48 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ravi Kumar Siddojigari X-Patchwork-Id: 11299583 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 74C9E13A4 for ; Wed, 18 Dec 2019 06:00:59 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 52655218AC for ; Wed, 18 Dec 2019 06:00:59 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="key not found in DNS" (0-bit key) header.d=mg.codeaurora.org header.i=@mg.codeaurora.org header.b="uskxCmW6" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726671AbfLRGA6 (ORCPT ); Wed, 18 Dec 2019 01:00:58 -0500 Received: from mail25.static.mailgun.info ([104.130.122.25]:35412 "EHLO mail25.static.mailgun.info" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725799AbfLRGA6 (ORCPT ); Wed, 18 Dec 2019 01:00:58 -0500 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1576648857; h=Content-Transfer-Encoding: Content-Type: MIME-Version: Message-ID: Date: Subject: Cc: To: From: Sender; bh=/+FeHk5RtNQKHSxAkBajh1cylQbDF12vEnpLi6a2D3A=; b=uskxCmW6FbeDyfe8no99Kl5XR9vDMYNSvemAdPbdAHnR/dGfzm7rfvi4aazlyd/J7Ji6RipF ytWor2wBLo962APUjgbC4A7iwrpvLj+JNPCH9/6bf0VnWcdlX3fwnknz6Ub8LoCtsFEQJjNB w6QJQGPQ80UDLxzxSJ7uT4cGvnI= X-Mailgun-Sending-Ip: 104.130.122.25 X-Mailgun-Sid: WyIxZmM3MiIsICJzZWxpbnV4QHZnZXIua2VybmVsLm9yZyIsICJiZTllNGEiXQ== Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by mxa.mailgun.org with ESMTP id 5df9c096.7fd16f029228-smtp-out-n02; Wed, 18 Dec 2019 06:00:54 -0000 (UTC) Received: by smtp.codeaurora.org (Postfix, from userid 1001) id AC01EC447A2; Wed, 18 Dec 2019 06:00:53 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=2.0 tests=ALL_TRUSTED,SPF_NONE autolearn=ham autolearn_force=no version=3.4.0 Received: from rsiddoji1 (blr-c-bdr-fw-01_globalnat_allzones-outside.qualcomm.com [103.229.19.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: rsiddoji) by smtp.codeaurora.org (Postfix) with ESMTPSA id C9DEDC433A2; Wed, 18 Dec 2019 06:00:51 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org C9DEDC433A2 Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=none smtp.mailfrom=rsiddoji@codeaurora.org From: "Ravi Kumar Siddojigari" To: Cc: "'Paul Moore'" , "'Stephen Smalley'" Subject: [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND. Date: Wed, 18 Dec 2019 11:30:48 +0530 Organization: The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum,\na Linux Foundation Collaborative Project Message-ID: <002301d5b568$8149c7a0$83dd56e0$@codeaurora.org> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 16.0 Content-Language: en-us Thread-Index: AdW1aGygcwYIRuq4TrWX8t0SPdWcEQ== Sender: selinux-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: selinux@vger.kernel.org Updated the subject to reflect the change . -----Original Message----- From: selinux-owner@vger.kernel.org On Behalf Of Ravi Kumar Siddojigari Sent: Tuesday, December 17, 2019 8:42 PM To: 'Paul Moore' Cc: selinux@vger.kernel.org Subject: RE: [PATCH] selinux: move pkey sid cache based retrieval under defconfig Yes Paul, it should be under CONFIG_SECURITY_INFINIBAND thanks for correcting this . Hope we can taken it fwd as all the targets with disabled InfiniBand can be gained . Please find the updated path for review . From 6a8c60eacd0b6e5189722bb1823864b6728c2e34 Mon Sep 17 00:00:00 2001 From: Ravi Kumar Siddojigari Date: Wed, 11 Dec 2019 19:57:24 +0530 Subject: [PATCH] selinux: move ibpkeys code under CONFIG_SECURITY_INFINIBAND. Move cache based pkey sid retrieval code which was added with Commit 409dcf31. under CONFIG_SECURITY_INFINIBAND. As its going to alloc a new cache which may impact low ram devices which was enabled by default. Change-Id: I80a13fb7bce8723c8c880cb77cbaee42db413a7a Signed-off-by: Ravi Kumar Siddojigari Signed-off-by: Ravi Kumar Siddojigari --- security/selinux/Makefile | 4 +++- security/selinux/hooks.c | 6 ++++++ security/selinux/include/objsec.h | 2 ++ 3 files changed, 11 insertions(+), 1 deletion(-) -- 1.9.1 Regards, Ravi -----Original Message----- From: selinux-owner@vger.kernel.org On Behalf Of Paul Moore Sent: Monday, December 16, 2019 7:56 PM To: Ravi Kumar Siddojigari Cc: selinux@vger.kernel.org Subject: Re: [PATCH] selinux: move pkey sid cache based retrieval under defconfig On Mon, Dec 16, 2019 at 5:13 AM Ravi Kumar Siddojigari wrote: > Hi Team, > We see an increase in the memory consumption from 4.9 ->4.19 kernel > which is impacting the low_ram device . > So thought of enabling only that are really needed for the such > device where performance might not be of priority list . > One such patch is on the pkey sid cache which was added with commit :" > 409dcf31" > which can be moved under defconfig where enabled by default and only > disabled for low_ram targets. > Which is going to save ram/reduce slub usage . Why not just reuse CONFIG_SECURITY_INFINIBAND? I'm guessing these systems are using the SELinux/IB controls at all, so why not remove them completely? -- paul moore www.paul-moore.com diff --git a/security/selinux/Makefile b/security/selinux/Makefile index c7161f8..bf67fc8 100644 --- a/security/selinux/Makefile +++ b/security/selinux/Makefile @@ -6,12 +6,14 @@ obj-$(CONFIG_SECURITY_SELINUX) := selinux.o selinux-y := avc.o hooks.o selinuxfs.o netlink.o nlmsgtab.o netif.o \ - netnode.o netport.o ibpkey.o exports.o \ + netnode.o netport.o exports.o \ ss/ebitmap.o ss/hashtab.o ss/symtab.o ss/sidtab.o ss/avtab.o \ ss/policydb.o ss/services.o ss/conditional.o ss/mls.o ss/status.o selinux-$(CONFIG_SECURITY_NETWORK_XFRM) += xfrm.o +selinux-$(CONFIG_SECURITY_INFINIBAND) += ibpkey.o + selinux-$(CONFIG_NETLABEL) += netlabel.o ccflags-y := -I$(srctree)/security/selinux -I$(srctree)/security/selinux/include diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index b1a9ac9..157faaf 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -94,7 +94,11 @@ #include "netif.h" #include "netnode.h" #include "netport.h" + +#ifdef CONFIG_SECURITY_INFINIBAND #include "ibpkey.h" +#endif + #include "xfrm.h" #include "netlabel.h" #include "audit.h" @@ -198,7 +202,9 @@ static int selinux_netcache_avc_callback(u32 event) static int selinux_lsm_notifier_avc_callback(u32 event) { if (event == AVC_CALLBACK_RESET) { +#ifdef CONFIG_SECURITY_INFINIBAND sel_ib_pkey_flush(); +#endif call_lsm_notifier(LSM_POLICY_CHANGE, NULL); } diff --git a/security/selinux/include/objsec.h b/security/selinux/include/objsec.h index 4b0da5f..94e6322 100644 --- a/security/selinux/include/objsec.h +++ b/security/selinux/include/objsec.h @@ -149,11 +149,13 @@ struct ib_security_struct { u32 sid; /* SID of the queue pair or MAD agent */ }; +#ifdef CONFIG_SECURITY_INFINIBAND struct pkey_security_struct { u64 subnet_prefix; /* Port subnet prefix */ u16 pkey; /* PKey number */ u32 sid; /* SID of pkey */ }; +#endif struct bpf_security_struct { u32 sid; /*SID of bpf obj creater*/