Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2430005imm; Sat, 15 Sep 2018 17:32:41 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZAp52rgMFBPPM0XlTzI65X0pWXFDGIIaJlp7tV+sCIeMKCzK/DEeoExgMHAFXlqOvhicyR X-Received: by 2002:a62:e11:: with SMTP id w17-v6mr19502680pfi.242.1537057961110; Sat, 15 Sep 2018 17:32:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537057961; cv=none; d=google.com; s=arc-20160816; b=fdj3MIsCynLzhSNMApRgL9gD49/MmDrauRKaFYKQqICTb2V2lf/Ch15XLQqxe23gI9 3BDPZtiJj03d/4tdvskYmwP5AVzHTlKJKmnRxJiG/idt4MYax6qEDot1JiGmdZZiqEXZ gAj/N1Axvwer5bK7cbmco4+4U6J0tWcn3WvyBF6zR2T+uZXM1Hjux8UXDCfIUr2lqgk2 ZC2V8X4QjF9uVtp6kgZnBwmuLhXtrXE/X/Oi0dddW4KqExmkezncngaetuqe6aTloTrX Y893VqXFAA0koAxyuohd6Qt07d7KDsywAmnp5h2yobG4oefE3+7jOJNHQGkB7+Yv8ukR Qoiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=wkRtHeHTFBnAc/sv4IK8rqFQ9+Szak4hW2PMgxRCo6c=; b=tqP1e2wakbS10UgZU03PsUZpZ8qHmuy8d44a/wWCMgw5PqbCT95/OX1qO6Wc8qEPul AXVYuv7STXqK3N7yB3mELCX59U+UZiGgNJVZV8laOiYGKHqF3HT5E5HiBkUvNCVGcYVr xekbaHg/o8DZyBsLt+qVarYaWcEGCkXLdhXsceIKp+gjH4vbsgCitNdh6yZdOdGsHTT2 8gJxjVMlFO1qZmafZKwwdklAZR+D2PxMjuV3hvwrWsXh9BYiUIz/t4fHnbRFPLD5K1+1 6WOoTxQpJvT0bJOcQIDEq5ywZB/OwXgTxJYzWrFsPntINFRir+lPN3LLRug7b3nFByHy hhvA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MCZYnAHZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j135-v6si10834849pfd.207.2018.09.15.17.32.26; Sat, 15 Sep 2018 17:32:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=MCZYnAHZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728390AbeIPFww (ORCPT + 99 others); Sun, 16 Sep 2018 01:52:52 -0400 Received: from mail-pf1-f195.google.com ([209.85.210.195]:39218 "EHLO mail-pf1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728237AbeIPFwJ (ORCPT ); Sun, 16 Sep 2018 01:52:09 -0400 Received: by mail-pf1-f195.google.com with SMTP id j8-v6so5927560pff.6 for ; Sat, 15 Sep 2018 17:31:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=wkRtHeHTFBnAc/sv4IK8rqFQ9+Szak4hW2PMgxRCo6c=; b=MCZYnAHZCfAfy2e+wYykDRQND5+7AhMr94F3SmaLMhlWbPXth2yNb1FpiFGzs3LyLt YtDqU4a1dYHCwtz78vDOeg4rd8fCh9W8E31aAqmUFItuxx09UsfZIm49KKyqxwNFWVoD DoPuItoMWmNL0FwMkQnAFx8CF3fCx/CLDbzOo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=wkRtHeHTFBnAc/sv4IK8rqFQ9+Szak4hW2PMgxRCo6c=; b=hwnrUv7Pw9fCW/9g0V6xbas8m885uUWCJfFs61kdVv2vitSxDryhmiF0QUN3TEXMTG p7eBzJhHA4TLrPQ6mdpnkgaj0LcFcyz9QH/bplbHS4lDXoIoYCoWRKKPjJVR1DYbe1As zvuTEoPBwvqRNmYdQwSsXDwH4PZM/QOU4k6PDZVCXOhe/qirQlFj6PKNJrr8uSgdBPMt O/evzbaUzpuafohWYcQAmNVwpyE0j4WH49Rp18BtPbnwIOuzZUgFWfNkvA80hOiDsT8z dKoVuxk/Yl4/8xnY1ySB0vjmWwnO3mCgz5InOu1BWG3DqIHJGVbC4xE2bRKC+C3G0sHQ iEzQ== X-Gm-Message-State: APzg51BzIdxpOQRVFZhFYSnkCU3lEj52NCuPLqE7YCKnRQ1c2Fn3w1Uc L403A5E70fFKD/ky4NWSwu7Oew== X-Received: by 2002:a62:aa02:: with SMTP id e2-v6mr19128516pff.211.1537057873828; Sat, 15 Sep 2018 17:31:13 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id f4-v6sm20045424pfj.46.2018.09.15.17.31.06 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Sat, 15 Sep 2018 17:31:08 -0700 (PDT) From: Kees Cook To: James Morris Cc: Kees Cook , Casey Schaufler , John Johansen , Tetsuo Handa , Paul Moore , Stephen Smalley , "Schaufler, Casey" , LSM , LKLM Subject: [PATCH 10/18] LSM: Plumb visibility into optional "enabled" state Date: Sat, 15 Sep 2018 17:30:51 -0700 Message-Id: <20180916003059.1046-11-keescook@chromium.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180916003059.1046-1-keescook@chromium.org> References: <20180916003059.1046-1-keescook@chromium.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for lifting the "is this LSM enabled?" logic out of the individual LSMs, pass in any special enabled state tracking (as needed for SELinux, AppArmor, and LoadPin). This must be an "int" to include handling cases where "enabled" is exposed via sysctl which has no "bool" type (i.e. LoadPin's use). LoadPin's "enabled" tracking will be added later when it is marked as LSM_TYPE_MINOR. Signed-off-by: Kees Cook --- include/linux/lsm_hooks.h | 1 + security/apparmor/lsm.c | 5 +++-- security/selinux/hooks.c | 1 + 3 files changed, 5 insertions(+), 2 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index a7833193e9e9..8a3a6cd26f03 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -2046,6 +2046,7 @@ enum lsm_type { struct lsm_info { const char *name; /* Populated automatically. */ + int *enabled; /* Optional: NULL means enabled. */ enum lsm_type type; /* Optional: default is LSM_TYPE_EXCLUSIVE */ int (*init)(void); }; diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index 7fa7b4464cf4..6cd630b34c3b 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c @@ -1303,8 +1303,8 @@ bool aa_g_paranoid_load = true; module_param_named(paranoid_load, aa_g_paranoid_load, aabool, S_IRUGO); /* Boot time disable flag */ -static bool apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; -module_param_named(enabled, apparmor_enabled, bool, S_IRUGO); +static int apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; +module_param_named(enabled, apparmor_enabled, int, 0444); static int __init apparmor_enabled_setup(char *str) { @@ -1607,5 +1607,6 @@ static int __init apparmor_init(void) } DEFINE_LSM(apparmor) + .enabled = &apparmor_enabled, .init = apparmor_init, END_LSM; diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 469a90806bc6..78b5afc188f3 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -7203,6 +7203,7 @@ void selinux_complete_init(void) /* SELinux requires early initialization in order to label all processes and objects when they are created. */ DEFINE_LSM(selinux) + .enabled = &selinux_enabled, .init = selinux_init, END_LSM; -- 2.17.1