Skip to content

Commit c079512

Browse files
committed
Merge tag 'loadpin-v5.3-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux
Pull security/loadpin updates from Kees Cook: - Allow exclusion of specific file types (Ke Wu) * tag 'loadpin-v5.3-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux: security/loadpin: Allow to exclude specific file types
2 parents 6b44fcc + 0ff9848 commit c079512

2 files changed

Lines changed: 58 additions & 0 deletions

File tree

Documentation/admin-guide/LSM/LoadPin.rst

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,3 +19,13 @@ block device backing the filesystem is not read-only, a sysctl is
1919
created to toggle pinning: ``/proc/sys/kernel/loadpin/enabled``. (Having
2020
a mutable filesystem means pinning is mutable too, but having the
2121
sysctl allows for easy testing on systems with a mutable filesystem.)
22+
23+
It's also possible to exclude specific file types from LoadPin using kernel
24+
command line option "``loadpin.exclude``". By default, all files are
25+
included, but they can be excluded using kernel command line option such
26+
as "``loadpin.exclude=kernel-module,kexec-image``". This allows to use
27+
different mechanisms such as ``CONFIG_MODULE_SIG`` and
28+
``CONFIG_KEXEC_VERIFY_SIG`` to verify kernel module and kernel image while
29+
still use LoadPin to protect the integrity of other files kernel loads. The
30+
full list of valid file types can be found in ``kernel_read_file_str``
31+
defined in ``include/linux/fs.h``.

security/loadpin/loadpin.c

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ static void report_load(const char *origin, struct file *file, char *operation)
3737
}
3838

3939
static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE);
40+
static char *exclude_read_files[READING_MAX_ID];
41+
static int ignore_read_file_id[READING_MAX_ID] __ro_after_init;
4042
static struct super_block *pinned_root;
4143
static DEFINE_SPINLOCK(pinned_root_spinlock);
4244

@@ -121,6 +123,13 @@ static int loadpin_read_file(struct file *file, enum kernel_read_file_id id)
121123
struct super_block *load_root;
122124
const char *origin = kernel_read_file_id_str(id);
123125

126+
/* If the file id is excluded, ignore the pinning. */
127+
if ((unsigned int)id < ARRAY_SIZE(ignore_read_file_id) &&
128+
ignore_read_file_id[id]) {
129+
report_load(origin, file, "pinning-excluded");
130+
return 0;
131+
}
132+
124133
/* This handles the older init_module API that has a NULL file. */
125134
if (!file) {
126135
if (!enforce) {
@@ -179,10 +188,47 @@ static struct security_hook_list loadpin_hooks[] __lsm_ro_after_init = {
179188
LSM_HOOK_INIT(kernel_load_data, loadpin_load_data),
180189
};
181190

191+
static void __init parse_exclude(void)
192+
{
193+
int i, j;
194+
char *cur;
195+
196+
/*
197+
* Make sure all the arrays stay within expected sizes. This
198+
* is slightly weird because kernel_read_file_str[] includes
199+
* READING_MAX_ID, which isn't actually meaningful here.
200+
*/
201+
BUILD_BUG_ON(ARRAY_SIZE(exclude_read_files) !=
202+
ARRAY_SIZE(ignore_read_file_id));
203+
BUILD_BUG_ON(ARRAY_SIZE(kernel_read_file_str) <
204+
ARRAY_SIZE(ignore_read_file_id));
205+
206+
for (i = 0; i < ARRAY_SIZE(exclude_read_files); i++) {
207+
cur = exclude_read_files[i];
208+
if (!cur)
209+
break;
210+
if (*cur == '\0')
211+
continue;
212+
213+
for (j = 0; j < ARRAY_SIZE(ignore_read_file_id); j++) {
214+
if (strcmp(cur, kernel_read_file_str[j]) == 0) {
215+
pr_info("excluding: %s\n",
216+
kernel_read_file_str[j]);
217+
ignore_read_file_id[j] = 1;
218+
/*
219+
* Can not break, because one read_file_str
220+
* may map to more than on read_file_id.
221+
*/
222+
}
223+
}
224+
}
225+
}
226+
182227
static int __init loadpin_init(void)
183228
{
184229
pr_info("ready to pin (currently %senforcing)\n",
185230
enforce ? "" : "not ");
231+
parse_exclude();
186232
security_add_hooks(loadpin_hooks, ARRAY_SIZE(loadpin_hooks), "loadpin");
187233
return 0;
188234
}
@@ -195,3 +241,5 @@ DEFINE_LSM(loadpin) = {
195241
/* Should not be mutable after boot, so not listed in sysfs (perm == 0). */
196242
module_param(enforce, int, 0);
197243
MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
244+
module_param_array_named(exclude, exclude_read_files, charp, NULL, 0);
245+
MODULE_PARM_DESC(exclude, "Exclude pinning specific read file types");

0 commit comments

Comments
 (0)