Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1559022imm; Wed, 10 Oct 2018 17:20:33 -0700 (PDT) X-Google-Smtp-Source: ACcGV60oQOG/7oWQ89yeh3dR8TTURsbgjh/BlegDMRZ7ptGmhoTwHLGhwQv3UnLRB3kA2kX8XBC3 X-Received: by 2002:a17:902:e5:: with SMTP id a92-v6mr34700793pla.273.1539217233548; Wed, 10 Oct 2018 17:20:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539217233; cv=none; d=google.com; s=arc-20160816; b=tTFnCkaT/yyggFbGqUC2UjvBxZHjPrV6yDNC7ct5IwV2DLeOrsT1y8D2EsNSp65wtY H0t+D8SA4z9fUuKPjXyRVlP/zUPnpDnxrGWHqKrFReA8I9bagQ1/+4Eb6xxCOtdXRtaQ opqkiRTQHMhPTEzKXIeY/Q4Rofybzf0Pqzb531YArzGvzSv/BlFzMRLYOYioPLlxL7AZ iFE342hYUIrKg9IqO7hsp0INyoar/BR7pFNvuJUGCj6uh1W75uQVKQ7lShP39HI0X1Z6 dC17RccVzsVqsAEUYxXgawo+DTsd/U+UnaVyXdoFmlQozUMzQdibNxQSUFdk3p2yW0DK Jdhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=GuIJ8XJ4isc39j9FCpw3e0aw5+nW65wvPHXUlrmcc7Y=; b=TYiXKXfy0m2kZqBUeOvzE4scnxRXg6Nc6prJ9718UkUA+pLq88uSwmAbrFeAbEOGKp B6CY2pc8gTVczk5tmmXJ47sVPGm5O/60OtXMBQ1JHXalqmgCv/MN95OJ11El3zYJUPTm P9+K6ilECWu3XP+vjtHPCoN9GYl3Uc8KbPk8Ot8EGltmG2XJmnYMZMcWs1PKq88o/8ti wo47B+PnafNebPQfktU4cUTz+Sta+/K2czeQkxJNUUAVdWPvm6/SrP9D1/4z6iIIsMl1 OxnDOc7tjwjigM6mPeIeY90WQN9dE5ccEwbJXM+0vSejeoJWdf8QUa7O3Cfx3VHdcYdF K3PA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=mhtBdzE+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11-v6si24517221pgb.135.2018.10.10.17.20.18; Wed, 10 Oct 2018 17:20:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=mhtBdzE+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727474AbeJKHoR (ORCPT + 99 others); Thu, 11 Oct 2018 03:44:17 -0400 Received: from mail-pg1-f193.google.com ([209.85.215.193]:41253 "EHLO mail-pg1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727268AbeJKHnm (ORCPT ); Thu, 11 Oct 2018 03:43:42 -0400 Received: by mail-pg1-f193.google.com with SMTP id 23-v6so3269323pgc.8 for ; Wed, 10 Oct 2018 17:19:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=GuIJ8XJ4isc39j9FCpw3e0aw5+nW65wvPHXUlrmcc7Y=; b=mhtBdzE+++HD8ZlJoh9Sh0lv152Wzv0XGlfdoeoVj/D32O41aK7MS3Rnda2A+qODA4 Qrtnl5zHcJjkVY0W3YVUHVY6xRjOu9KcQX0A9xYhnJ/gGZTbh0I5BYOJHFqBeSSiV/fs A2G5p2YQxlN9jUuRqSEWvuI/VAQoq+e1ylRS8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=GuIJ8XJ4isc39j9FCpw3e0aw5+nW65wvPHXUlrmcc7Y=; b=Dn9aJ3ZiNV037Sy2zjsVUfNuWFBI/ZOfAd6VfuYBF8yC/VN35ZTW8wiyhdSWoL1o/H KDf7avp2LKNPf5lMK8U8soFRSzs62RQQe6AMkmayV4zG457H4Imm7NoDGNal1W31Oa31 kt9AtCxvomdY1Gc7tWbZqR3F9SYwGDscdn6wrifCg6uyYcBD9QapCpo9aHeynH3QSjzJ nQ+4rpj9gzADOTd4RrX8LwGnaCGdDa07ZPJesyGa4OnaiEN5v3a0GF3pmWZF8Q7SacTu 9aXWgJLbRTatB3URKNm5BI8S5fo6fRU8pPoZ9BrCq6y8zj5J6gMOBcF51ODWvma8No/H iWMA== X-Gm-Message-State: ABuFfogVJLoLs2qz/2P1sZDdiXgmD7POCxRzEscIg3OfYlnXk+mS+d0N 7PeSBqqaixs47Llx82Z65BfHRA== X-Received: by 2002:a62:c80d:: with SMTP id z13-v6mr36366057pff.176.1539217147856; Wed, 10 Oct 2018 17:19:07 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id y185-v6sm26488288pgd.8.2018.10.10.17.18.58 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 10 Oct 2018 17:19:06 -0700 (PDT) From: Kees Cook To: James Morris Cc: Kees Cook , Casey Schaufler , John Johansen , Stephen Smalley , Paul Moore , Tetsuo Handa , Mimi Zohar , Randy Dunlap , Jordan Glover , LSM , linux-doc@vger.kernel.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH security-next v5 14/30] LSM: Plumb visibility into optional "enabled" state Date: Wed, 10 Oct 2018 17:18:30 -0700 Message-Id: <20181011001846.30964-15-keescook@chromium.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181011001846.30964-1-keescook@chromium.org> References: <20181011001846.30964-1-keescook@chromium.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for lifting the "is this LSM enabled?" logic out of the individual LSMs, pass in any special enabled state tracking (as needed for SELinux, AppArmor, and LoadPin). This should be an "int" to include handling any future cases where "enabled" is exposed via sysctl which has no "bool" type. Signed-off-by: Kees Cook Reviewed-by: Casey Schaufler Reviewed-by: John Johansen --- include/linux/lsm_hooks.h | 1 + security/apparmor/lsm.c | 5 +++-- security/selinux/hooks.c | 1 + 3 files changed, 5 insertions(+), 2 deletions(-) diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 531e219a49b9..6ec5a0266f21 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -2044,6 +2044,7 @@ extern void security_add_hooks(struct security_hook_list *hooks, int count, struct lsm_info { const char *name; /* Required. */ unsigned long flags; /* Optional: flags describing LSM */ + int *enabled; /* Optional: NULL means enabled. */ int (*init)(void); /* Required. */ }; diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c index 768cb539fb6c..6ace45704cb6 100644 --- a/security/apparmor/lsm.c +++ b/security/apparmor/lsm.c @@ -1303,8 +1303,8 @@ bool aa_g_paranoid_load = true; module_param_named(paranoid_load, aa_g_paranoid_load, aabool, S_IRUGO); /* Boot time disable flag */ -static bool apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; -module_param_named(enabled, apparmor_enabled, bool, S_IRUGO); +static int apparmor_enabled = CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE; +module_param_named(enabled, apparmor_enabled, int, 0444); static int __init apparmor_enabled_setup(char *str) { @@ -1609,5 +1609,6 @@ static int __init apparmor_init(void) DEFINE_LSM(apparmor) = { .name = "apparmor", .flags = LSM_FLAG_LEGACY_MAJOR, + .enabled = &apparmor_enabled, .init = apparmor_init, }; diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 020886895819..e8da99550b67 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -7205,6 +7205,7 @@ void selinux_complete_init(void) DEFINE_LSM(selinux) = { .name = "selinux", .flags = LSM_FLAG_LEGACY_MAJOR, + .enabled = &selinux_enabled, .init = selinux_init, }; -- 2.17.1