162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Pkey table
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * SELinux must keep a mapping of Infinband PKEYs to labels/SIDs.  This
662306a36Sopenharmony_ci * mapping is maintained as part of the normal policy but a fast cache is
762306a36Sopenharmony_ci * needed to reduce the lookup overhead.
862306a36Sopenharmony_ci *
962306a36Sopenharmony_ci * This code is heavily based on the "netif" and "netport" concept originally
1062306a36Sopenharmony_ci * developed by
1162306a36Sopenharmony_ci * James Morris <jmorris@redhat.com> and
1262306a36Sopenharmony_ci * Paul Moore <paul@paul-moore.com>
1362306a36Sopenharmony_ci *   (see security/selinux/netif.c and security/selinux/netport.c for more
1462306a36Sopenharmony_ci *   information)
1562306a36Sopenharmony_ci */
1662306a36Sopenharmony_ci
1762306a36Sopenharmony_ci/*
1862306a36Sopenharmony_ci * (c) Mellanox Technologies, 2016
1962306a36Sopenharmony_ci */
2062306a36Sopenharmony_ci
2162306a36Sopenharmony_ci#include <linux/types.h>
2262306a36Sopenharmony_ci#include <linux/rcupdate.h>
2362306a36Sopenharmony_ci#include <linux/list.h>
2462306a36Sopenharmony_ci#include <linux/spinlock.h>
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_ci#include "ibpkey.h"
2762306a36Sopenharmony_ci#include "objsec.h"
2862306a36Sopenharmony_ci
2962306a36Sopenharmony_ci#define SEL_PKEY_HASH_SIZE       256
3062306a36Sopenharmony_ci#define SEL_PKEY_HASH_BKT_LIMIT   16
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_cistruct sel_ib_pkey_bkt {
3362306a36Sopenharmony_ci	int size;
3462306a36Sopenharmony_ci	struct list_head list;
3562306a36Sopenharmony_ci};
3662306a36Sopenharmony_ci
3762306a36Sopenharmony_cistruct sel_ib_pkey {
3862306a36Sopenharmony_ci	struct pkey_security_struct psec;
3962306a36Sopenharmony_ci	struct list_head list;
4062306a36Sopenharmony_ci	struct rcu_head rcu;
4162306a36Sopenharmony_ci};
4262306a36Sopenharmony_ci
4362306a36Sopenharmony_cistatic DEFINE_SPINLOCK(sel_ib_pkey_lock);
4462306a36Sopenharmony_cistatic struct sel_ib_pkey_bkt sel_ib_pkey_hash[SEL_PKEY_HASH_SIZE];
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci/**
4762306a36Sopenharmony_ci * sel_ib_pkey_hashfn - Hashing function for the pkey table
4862306a36Sopenharmony_ci * @pkey: pkey number
4962306a36Sopenharmony_ci *
5062306a36Sopenharmony_ci * Description:
5162306a36Sopenharmony_ci * This is the hashing function for the pkey table, it returns the bucket
5262306a36Sopenharmony_ci * number for the given pkey.
5362306a36Sopenharmony_ci *
5462306a36Sopenharmony_ci */
5562306a36Sopenharmony_cistatic unsigned int sel_ib_pkey_hashfn(u16 pkey)
5662306a36Sopenharmony_ci{
5762306a36Sopenharmony_ci	return (pkey & (SEL_PKEY_HASH_SIZE - 1));
5862306a36Sopenharmony_ci}
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_ci/**
6162306a36Sopenharmony_ci * sel_ib_pkey_find - Search for a pkey record
6262306a36Sopenharmony_ci * @subnet_prefix: subnet_prefix
6362306a36Sopenharmony_ci * @pkey_num: pkey_num
6462306a36Sopenharmony_ci *
6562306a36Sopenharmony_ci * Description:
6662306a36Sopenharmony_ci * Search the pkey table and return the matching record.  If an entry
6762306a36Sopenharmony_ci * can not be found in the table return NULL.
6862306a36Sopenharmony_ci *
6962306a36Sopenharmony_ci */
7062306a36Sopenharmony_cistatic struct sel_ib_pkey *sel_ib_pkey_find(u64 subnet_prefix, u16 pkey_num)
7162306a36Sopenharmony_ci{
7262306a36Sopenharmony_ci	unsigned int idx;
7362306a36Sopenharmony_ci	struct sel_ib_pkey *pkey;
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	idx = sel_ib_pkey_hashfn(pkey_num);
7662306a36Sopenharmony_ci	list_for_each_entry_rcu(pkey, &sel_ib_pkey_hash[idx].list, list) {
7762306a36Sopenharmony_ci		if (pkey->psec.pkey == pkey_num &&
7862306a36Sopenharmony_ci		    pkey->psec.subnet_prefix == subnet_prefix)
7962306a36Sopenharmony_ci			return pkey;
8062306a36Sopenharmony_ci	}
8162306a36Sopenharmony_ci
8262306a36Sopenharmony_ci	return NULL;
8362306a36Sopenharmony_ci}
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_ci/**
8662306a36Sopenharmony_ci * sel_ib_pkey_insert - Insert a new pkey into the table
8762306a36Sopenharmony_ci * @pkey: the new pkey record
8862306a36Sopenharmony_ci *
8962306a36Sopenharmony_ci * Description:
9062306a36Sopenharmony_ci * Add a new pkey record to the hash table.
9162306a36Sopenharmony_ci *
9262306a36Sopenharmony_ci */
9362306a36Sopenharmony_cistatic void sel_ib_pkey_insert(struct sel_ib_pkey *pkey)
9462306a36Sopenharmony_ci{
9562306a36Sopenharmony_ci	unsigned int idx;
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_ci	/* we need to impose a limit on the growth of the hash table so check
9862306a36Sopenharmony_ci	 * this bucket to make sure it is within the specified bounds
9962306a36Sopenharmony_ci	 */
10062306a36Sopenharmony_ci	idx = sel_ib_pkey_hashfn(pkey->psec.pkey);
10162306a36Sopenharmony_ci	list_add_rcu(&pkey->list, &sel_ib_pkey_hash[idx].list);
10262306a36Sopenharmony_ci	if (sel_ib_pkey_hash[idx].size == SEL_PKEY_HASH_BKT_LIMIT) {
10362306a36Sopenharmony_ci		struct sel_ib_pkey *tail;
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci		tail = list_entry(
10662306a36Sopenharmony_ci			rcu_dereference_protected(
10762306a36Sopenharmony_ci				list_tail_rcu(&sel_ib_pkey_hash[idx].list),
10862306a36Sopenharmony_ci				lockdep_is_held(&sel_ib_pkey_lock)),
10962306a36Sopenharmony_ci			struct sel_ib_pkey, list);
11062306a36Sopenharmony_ci		list_del_rcu(&tail->list);
11162306a36Sopenharmony_ci		kfree_rcu(tail, rcu);
11262306a36Sopenharmony_ci	} else {
11362306a36Sopenharmony_ci		sel_ib_pkey_hash[idx].size++;
11462306a36Sopenharmony_ci	}
11562306a36Sopenharmony_ci}
11662306a36Sopenharmony_ci
11762306a36Sopenharmony_ci/**
11862306a36Sopenharmony_ci * sel_ib_pkey_sid_slow - Lookup the SID of a pkey using the policy
11962306a36Sopenharmony_ci * @subnet_prefix: subnet prefix
12062306a36Sopenharmony_ci * @pkey_num: pkey number
12162306a36Sopenharmony_ci * @sid: pkey SID
12262306a36Sopenharmony_ci *
12362306a36Sopenharmony_ci * Description:
12462306a36Sopenharmony_ci * This function determines the SID of a pkey by querying the security
12562306a36Sopenharmony_ci * policy.  The result is added to the pkey table to speedup future
12662306a36Sopenharmony_ci * queries.  Returns zero on success, negative values on failure.
12762306a36Sopenharmony_ci *
12862306a36Sopenharmony_ci */
12962306a36Sopenharmony_cistatic int sel_ib_pkey_sid_slow(u64 subnet_prefix, u16 pkey_num, u32 *sid)
13062306a36Sopenharmony_ci{
13162306a36Sopenharmony_ci	int ret;
13262306a36Sopenharmony_ci	struct sel_ib_pkey *pkey;
13362306a36Sopenharmony_ci	struct sel_ib_pkey *new = NULL;
13462306a36Sopenharmony_ci	unsigned long flags;
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci	spin_lock_irqsave(&sel_ib_pkey_lock, flags);
13762306a36Sopenharmony_ci	pkey = sel_ib_pkey_find(subnet_prefix, pkey_num);
13862306a36Sopenharmony_ci	if (pkey) {
13962306a36Sopenharmony_ci		*sid = pkey->psec.sid;
14062306a36Sopenharmony_ci		spin_unlock_irqrestore(&sel_ib_pkey_lock, flags);
14162306a36Sopenharmony_ci		return 0;
14262306a36Sopenharmony_ci	}
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci	ret = security_ib_pkey_sid(subnet_prefix, pkey_num,
14562306a36Sopenharmony_ci				   sid);
14662306a36Sopenharmony_ci	if (ret)
14762306a36Sopenharmony_ci		goto out;
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_ci	/* If this memory allocation fails still return 0. The SID
15062306a36Sopenharmony_ci	 * is valid, it just won't be added to the cache.
15162306a36Sopenharmony_ci	 */
15262306a36Sopenharmony_ci	new = kzalloc(sizeof(*new), GFP_ATOMIC);
15362306a36Sopenharmony_ci	if (!new) {
15462306a36Sopenharmony_ci		ret = -ENOMEM;
15562306a36Sopenharmony_ci		goto out;
15662306a36Sopenharmony_ci	}
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci	new->psec.subnet_prefix = subnet_prefix;
15962306a36Sopenharmony_ci	new->psec.pkey = pkey_num;
16062306a36Sopenharmony_ci	new->psec.sid = *sid;
16162306a36Sopenharmony_ci	sel_ib_pkey_insert(new);
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_ciout:
16462306a36Sopenharmony_ci	spin_unlock_irqrestore(&sel_ib_pkey_lock, flags);
16562306a36Sopenharmony_ci	return ret;
16662306a36Sopenharmony_ci}
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_ci/**
16962306a36Sopenharmony_ci * sel_ib_pkey_sid - Lookup the SID of a PKEY
17062306a36Sopenharmony_ci * @subnet_prefix: subnet_prefix
17162306a36Sopenharmony_ci * @pkey_num: pkey number
17262306a36Sopenharmony_ci * @sid: pkey SID
17362306a36Sopenharmony_ci *
17462306a36Sopenharmony_ci * Description:
17562306a36Sopenharmony_ci * This function determines the SID of a PKEY using the fastest method
17662306a36Sopenharmony_ci * possible.  First the pkey table is queried, but if an entry can't be found
17762306a36Sopenharmony_ci * then the policy is queried and the result is added to the table to speedup
17862306a36Sopenharmony_ci * future queries.  Returns zero on success, negative values on failure.
17962306a36Sopenharmony_ci *
18062306a36Sopenharmony_ci */
18162306a36Sopenharmony_ciint sel_ib_pkey_sid(u64 subnet_prefix, u16 pkey_num, u32 *sid)
18262306a36Sopenharmony_ci{
18362306a36Sopenharmony_ci	struct sel_ib_pkey *pkey;
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	rcu_read_lock();
18662306a36Sopenharmony_ci	pkey = sel_ib_pkey_find(subnet_prefix, pkey_num);
18762306a36Sopenharmony_ci	if (pkey) {
18862306a36Sopenharmony_ci		*sid = pkey->psec.sid;
18962306a36Sopenharmony_ci		rcu_read_unlock();
19062306a36Sopenharmony_ci		return 0;
19162306a36Sopenharmony_ci	}
19262306a36Sopenharmony_ci	rcu_read_unlock();
19362306a36Sopenharmony_ci
19462306a36Sopenharmony_ci	return sel_ib_pkey_sid_slow(subnet_prefix, pkey_num, sid);
19562306a36Sopenharmony_ci}
19662306a36Sopenharmony_ci
19762306a36Sopenharmony_ci/**
19862306a36Sopenharmony_ci * sel_ib_pkey_flush - Flush the entire pkey table
19962306a36Sopenharmony_ci *
20062306a36Sopenharmony_ci * Description:
20162306a36Sopenharmony_ci * Remove all entries from the pkey table
20262306a36Sopenharmony_ci *
20362306a36Sopenharmony_ci */
20462306a36Sopenharmony_civoid sel_ib_pkey_flush(void)
20562306a36Sopenharmony_ci{
20662306a36Sopenharmony_ci	unsigned int idx;
20762306a36Sopenharmony_ci	struct sel_ib_pkey *pkey, *pkey_tmp;
20862306a36Sopenharmony_ci	unsigned long flags;
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci	spin_lock_irqsave(&sel_ib_pkey_lock, flags);
21162306a36Sopenharmony_ci	for (idx = 0; idx < SEL_PKEY_HASH_SIZE; idx++) {
21262306a36Sopenharmony_ci		list_for_each_entry_safe(pkey, pkey_tmp,
21362306a36Sopenharmony_ci					 &sel_ib_pkey_hash[idx].list, list) {
21462306a36Sopenharmony_ci			list_del_rcu(&pkey->list);
21562306a36Sopenharmony_ci			kfree_rcu(pkey, rcu);
21662306a36Sopenharmony_ci		}
21762306a36Sopenharmony_ci		sel_ib_pkey_hash[idx].size = 0;
21862306a36Sopenharmony_ci	}
21962306a36Sopenharmony_ci	spin_unlock_irqrestore(&sel_ib_pkey_lock, flags);
22062306a36Sopenharmony_ci}
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_cistatic __init int sel_ib_pkey_init(void)
22362306a36Sopenharmony_ci{
22462306a36Sopenharmony_ci	int iter;
22562306a36Sopenharmony_ci
22662306a36Sopenharmony_ci	if (!selinux_enabled_boot)
22762306a36Sopenharmony_ci		return 0;
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_ci	for (iter = 0; iter < SEL_PKEY_HASH_SIZE; iter++) {
23062306a36Sopenharmony_ci		INIT_LIST_HEAD(&sel_ib_pkey_hash[iter].list);
23162306a36Sopenharmony_ci		sel_ib_pkey_hash[iter].size = 0;
23262306a36Sopenharmony_ci	}
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_ci	return 0;
23562306a36Sopenharmony_ci}
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_cisubsys_initcall(sel_ib_pkey_init);
238