[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20241218064328.2676938-1-song@kernel.org>
Date: Tue, 17 Dec 2024 22:43:28 -0800
From: Song Liu <song@...nel.org>
To: linux-fsdevel@...r.kernel.org,
linux-integrity@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org
Cc: roberto.sassu@...wei.com,
dmitry.kasatkin@...il.com,
eric.snowberg@...cle.com,
paul@...l-moore.com,
jmorris@...ei.org,
serge@...lyn.com,
kernel-team@...a.com,
brauner@...nel.org,
jack@...e.cz,
viro@...iv.linux.org.uk,
casey@...aufler-ca.com,
Song Liu <song@...nel.org>
Subject: [PATCH] lsm: integrity: Allow enable/disable ima and evm with lsm= cmdline
Let lsm= cmdline option enable and disable ima and evm.
Before the change:
(ima and evm are not enabled in cmdline)
[root@(none) /]# grep -o "lsm.*" /proc/cmdline
lsm=
(but they are actually enabled)
[root@(none) /]# ls /sys/kernel/security/
evm ima integrity lsm
[root@(none) /]# cat /sys/kernel/security/lsm
capability,ima,evm
After the change:
(ima and evm are not enabled in cmdline)
[root@(none) /]# grep -o "lsm=.*" /proc/cmdline
lsm=
(ima and evm are not enabled, as expected)
[root@(none) /]# ls /sys/kernel/security/
integrity lsm
[root@(none) /]# cat /sys/kernel/security/lsm
capability
(ima and evm are enabled in cmdline)
[root@(none) /]# grep -o "lsm.*" /proc/cmdline
lsm=ima,evm
(ima and evm are enabled, expected)
[root@(none) /]# ls /sys/kernel/security/
evm ima integrity lsm
[root@(none) /]# cat /sys/kernel/security/lsm
capability,ima,evm
Signed-off-by: Song Liu <song@...nel.org>
---
This was discussed in this RFC [1].
[1] https://lore.kernel.org/linux-integrity/20241217202525.1802109-1-song@kernel.org/
---
security/integrity/evm/evm.h | 2 ++
security/integrity/evm/evm_main.c | 8 ++++++++
security/integrity/evm/evm_secfs.c | 3 ++-
security/integrity/ima/ima_main.c | 10 ++++++++++
security/security.c | 14 ++++++++++++--
5 files changed, 34 insertions(+), 3 deletions(-)
diff --git a/security/integrity/evm/evm.h b/security/integrity/evm/evm.h
index 51aba5a54275..4b6dd02df7aa 100644
--- a/security/integrity/evm/evm.h
+++ b/security/integrity/evm/evm.h
@@ -85,4 +85,6 @@ int evm_init_hmac(struct inode *inode, const struct xattr *xattrs,
char *hmac_val);
int evm_init_secfs(void);
+bool evm_enabled(void);
+
#endif
diff --git a/security/integrity/evm/evm_main.c b/security/integrity/evm/evm_main.c
index 377e57e9084f..e7e4a053cbfa 100644
--- a/security/integrity/evm/evm_main.c
+++ b/security/integrity/evm/evm_main.c
@@ -1117,6 +1117,9 @@ static int __init init_evm(void)
int error;
struct list_head *pos, *q;
+ if (!evm_enabled())
+ return 0;
+
evm_init_config();
error = integrity_init_keyring(INTEGRITY_KEYRING_EVM);
@@ -1181,4 +1184,9 @@ DEFINE_LSM(evm) = {
.blobs = &evm_blob_sizes,
};
+bool evm_enabled(void)
+{
+ return *__lsm_evm.enabled != 0;
+}
+
late_initcall(init_evm);
diff --git a/security/integrity/evm/evm_secfs.c b/security/integrity/evm/evm_secfs.c
index 9b907c2fee60..9d15be44837d 100644
--- a/security/integrity/evm/evm_secfs.c
+++ b/security/integrity/evm/evm_secfs.c
@@ -69,7 +69,8 @@ static ssize_t evm_write_key(struct file *file, const char __user *buf,
unsigned int i;
int ret;
- if (!capable(CAP_SYS_ADMIN) || (evm_initialized & EVM_SETUP_COMPLETE))
+ if (!capable(CAP_SYS_ADMIN) || (evm_initialized & EVM_SETUP_COMPLETE) ||
+ !evm_enabled())
return -EPERM;
ret = kstrtouint_from_user(buf, count, 0, &i);
diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c
index 9b87556b03a7..77ef83707fa8 100644
--- a/security/integrity/ima/ima_main.c
+++ b/security/integrity/ima/ima_main.c
@@ -1141,10 +1141,15 @@ static int ima_kernel_module_request(char *kmod_name)
#endif /* CONFIG_INTEGRITY_ASYMMETRIC_KEYS */
+static bool ima_enabled(void);
+
static int __init init_ima(void)
{
int error;
+ if (!ima_enabled())
+ return 0;
+
ima_appraise_parse_cmdline();
ima_init_template_list();
hash_setup(CONFIG_IMA_DEFAULT_HASH);
@@ -1217,4 +1222,9 @@ DEFINE_LSM(ima) = {
.blobs = &ima_blob_sizes,
};
+static bool ima_enabled(void)
+{
+ return *__lsm_ima.enabled != 0;
+}
+
late_initcall(init_ima); /* Start IMA after the TPM is available */
diff --git a/security/security.c b/security/security.c
index 7523d14f31fb..3036a1e5bffc 100644
--- a/security/security.c
+++ b/security/security.c
@@ -363,8 +363,17 @@ static void __init ordered_lsm_parse(const char *order, const char *origin)
for (lsm = __start_lsm_info; lsm < __end_lsm_info; lsm++) {
if (strcmp(lsm->name, name) == 0) {
- if (lsm->order == LSM_ORDER_MUTABLE)
+ if (lsm->order == LSM_ORDER_MUTABLE) {
append_ordered_lsm(lsm, origin);
+ } else if (lsm->order == LSM_ORDER_LAST) {
+ /*
+ * We cannot append "LAST" LSM yet.
+ * Set a flag to append it later.
+ * Use lsm->enabled as the flag.
+ */
+ set_enabled(lsm, true);
+ }
+
found = true;
}
}
@@ -386,7 +395,8 @@ static void __init ordered_lsm_parse(const char *order, const char *origin)
/* LSM_ORDER_LAST is always last. */
for (lsm = __start_lsm_info; lsm < __end_lsm_info; lsm++) {
- if (lsm->order == LSM_ORDER_LAST)
+ /* If the "LAST" LSM is enabled above, append it now. */
+ if (lsm->order == LSM_ORDER_LAST && is_enabled(lsm))
append_ordered_lsm(lsm, " last");
}
--
2.43.5
Powered by blists - more mailing lists