Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp719013imm; Mon, 1 Oct 2018 17:56:26 -0700 (PDT) X-Google-Smtp-Source: ACcGV635oFXTIqAqkW+8+rrsmtMHNUmTdqAW7raHD3zHfn66/E9PDMnK0kr1Lm06VGPDMW7wwugT X-Received: by 2002:a17:902:788e:: with SMTP id q14-v6mr14487833pll.49.1538441786396; Mon, 01 Oct 2018 17:56:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538441786; cv=none; d=google.com; s=arc-20160816; b=Zc9ecGeSt0KV5sEHg++y5Yj6Yglj2JObj3tAMiGN9Xaai/uhOfXRQgwsnZyR+kJx6a vDJTfdzamGHNvL3yeQXrfBroAm/rqy9jufoeCrfxUbVhce72rlXn55pwfwNLkfo9gJIp CqvihrKEOE9OMMnXZ2SwrkManXSohvmVxpxsK3STYm/8JQSqYufeWq5w7/i9CAvSUr/l EE3mo0PthDw740SJ6ocY4gjaQ01MzTEvKj+N8hWqNKdKQrGMSWsYPxcRPN4O3dTn+YGI JLdD4JRw/j/P2unJ+KdJoFNAUmUb2qhGQHUwNk0TitGbTALaN6b4U4YJ9ncVQ16nClnA VwVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=GuIJ8XJ4isc39j9FCpw3e0aw5+nW65wvPHXUlrmcc7Y=; b=ZnFCoXVsJ/gaJp+6oyTh8Oj+G1T0tDZ9ZJkqopDXZ0EkfoyXzgsNYXEOIeM8h+vqv0 cY3j9FIL6/1gFVfPpWJnRO9TH0APwalptvdpD1LWSCMX9rKmYASHGasnlcSXn986OrJq gUKNeE55uSeeZ/+7ID81+ZZce8C/S4KUDNqvJsO+9xKPvOWbd5dUee9S/jp1U2tTNt1X 7lWn+7Dr3/SCqAJ/vYpbCBFkvuO/3rYZkW2vNwmo92SNZQst6iT3GRnHGbWDf1IbWFwM 0tO373VBvHHj5Mj7yGb2ElTpXqH1VW/XLvMZcvCdVJN6KkKypxp4pdA3va870lcgRcnE Oolw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=CuxSHfsD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f10-v6si13377998pgl.148.2018.10.01.17.56.11; Mon, 01 Oct 2018 17:56:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=CuxSHfsD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727260AbeJBHfy (ORCPT + 99 others); Tue, 2 Oct 2018 03:35:54 -0400 Received: from mail-it1-f194.google.com ([209.85.166.194]:38017 "EHLO mail-it1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727096AbeJBHfx (ORCPT ); Tue, 2 Oct 2018 03:35:53 -0400 Received: by mail-it1-f194.google.com with SMTP id i76-v6so1072100ita.3 for ; Mon, 01 Oct 2018 17:55:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=GuIJ8XJ4isc39j9FCpw3e0aw5+nW65wvPHXUlrmcc7Y=; b=CuxSHfsD1cK63yfLs77GsspgNj1Sjqx+pqe1wm82ZI4DW+MB+RvKdmazurfvixfZjD usFNIZJ+i3hD1VgwaEpzWSXfBMgSbLuexR2i7RAR/Wm7hy945lR2SgzWrtWLJKpcFfGG 63/PDDWthnmD8+q2ebNMqF7yTSbz6UYababf4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=GuIJ8XJ4isc39j9FCpw3e0aw5+nW65wvPHXUlrmcc7Y=; b=TsqT6Zq2tiN5wGK8L6dSsZYQX+X+ULNniqxeIAdeYK13PxJPbS6Oqv5S66EV3L6CtF gwJ5qrDK6DE6Xfev65vyROlAsjTtUr/nlM8HfxRjPqNAWC3q44XkBYDVQW/3JsVeNkN7 cJhdIcXmDna2upAYQkdihYPFlSsB0VKdfclJJzzbbprbZ+htWWDvFxZ/Li4wUPA8Zuze zzCcDTdeYJb7M4GzJicVBdzhVDnU47PgOvUnSaS6wmS/hZ6lV6qZwUyXZCxi6b3QGRO5 Ugmk3aP2UxJZneu3PmI0xihKRTS2yn9kmZJSaSRsbIza7oLbQmPLuNCc01+TrGadEkeI tHcA== X-Gm-Message-State: ABuFfoj7McsFbeMP57taQXdfkoSJz9qgKfJ5v6Ob4mRvjDff/dWPek31 mdcP8oMG6sr7pGXsnb17vAjDPw== X-Received: by 2002:a65:48cc:: with SMTP id o12-v6mr12066432pgs.22.1538441724471; Mon, 01 Oct 2018 17:55:24 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id 70-v6sm22142717pfz.27.2018.10.01.17.55.13 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 01 Oct 2018 17:55:19 -0700 (PDT) From: Kees Cook To: James Morris Cc: Kees Cook , Casey Schaufler , John Johansen , Tetsuo Handa , Paul Moore , Stephen Smalley , "Schaufler, Casey" , LSM , Jonathan Corbet , linux-doc@vger.kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH security-next v4 14/32] LSM: Plumb visibility into optional "enabled" state Date: Mon, 1 Oct 2018 17:54:47 -0700 Message-Id: <20181002005505.6112-15-keescook@chromium.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181002005505.6112-1-keescook@chromium.org> References: <20181002005505.6112-1-keescook@chromium.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for lifting the "is this LSM enabled?" logic out of the individual LSMs, pass in any special enabled state tracking (as needed for SELinux, AppArmor, and LoadPin). This should be an "int" to include handling any future cases where "enabled" is exposed via sysctl which has no "bool" type. Signed-off-by: Kees Cook Reviewed-by: Casey Schaufler Reviewed-by: John Johansen --- include/linux/lsm_hooks.h | 1 + security/apparmor/lsm.c | 5 +++-- security/selinux/hooks.c | 1 + 3 files changed, 5 insertions(+), 2 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 531e219a49b9..6ec5a0266f21 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -2044,6 +2044,7 @@ extern void security_add_hooks(struct security_hook_list *hooks, int count, struct lsm_info { const char *name; /* Required. */ unsigned long flags; /* Optional: flags describing LSM */ + int *enabled; /* Optional: NULL means enabled. */ int (*init)(void); /* Required. */ }; diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index 768cb539fb6c..6ace45704cb6 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c @@ -1303,8 +1303,8 @@ bool aa_g_paranoid_load = true; module_param_named(paranoid_load, aa_g_paranoid_load, aabool, S_IRUGO); /* Boot time disable flag */ -static bool apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; -module_param_named(enabled, apparmor_enabled, bool, S_IRUGO); +static int apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; +module_param_named(enabled, apparmor_enabled, int, 0444); static int __init apparmor_enabled_setup(char *str) { @@ -1609,5 +1609,6 @@ static int __init apparmor_init(void) DEFINE_LSM(apparmor) = { .name = "apparmor", .flags = LSM_FLAG_LEGACY_MAJOR, + .enabled = &apparmor_enabled, .init = apparmor_init, }; diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 020886895819..e8da99550b67 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -7205,6 +7205,7 @@ void selinux_complete_init(void) DEFINE_LSM(selinux) = { .name = "selinux", .flags = LSM_FLAG_LEGACY_MAJOR, + .enabled = &selinux_enabled, .init = selinux_init, }; -- 2.17.1