security: Introduce LSM_ORDER_LAST and set it for the integrity LSM
authorRoberto Sassu <roberto.sassu@huawei.com>
Fri, 10 Mar 2023 08:53:59 +0000 (09:53 +0100)
committerPaul Moore <paul@paul-moore.com>
Fri, 10 Mar 2023 23:31:35 +0000 (18:31 -0500)
commit42994ee3cd7298b27698daa6848ed7168e72d056
treed3c8295c2b7f4d59ff0bc25cbfd0f606f5e3dc53
parentf89f8e1661e6bef87073ad4934e1eede5f69f4b7
security: Introduce LSM_ORDER_LAST and set it for the integrity LSM

Introduce LSM_ORDER_LAST, to satisfy the requirement of LSMs needing to be
last, e.g. the 'integrity' LSM, without changing the kernel command line or
configuration.

Also, set this order for the 'integrity' LSM. While not enforced, this is
the only LSM expected to use it.

Similarly to LSM_ORDER_FIRST, LSMs with LSM_ORDER_LAST are always enabled
and put at the end of the LSM list, if selected in the kernel
configuration. Setting one of these orders alone, does not cause the LSMs
to be selected and compiled built-in in the kernel.

Finally, for LSM_ORDER_MUTABLE LSMs, set the found variable to true if an
LSM is found, regardless of its order. In this way, the kernel would not
wrongly report that the LSM is not built-in in the kernel if its order is
LSM_ORDER_LAST.

Fixes: 79f7865d844c ("LSM: Introduce "lsm=" for boottime LSM selection")
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Acked-by: Mimi Zohar <zohar@linux.ibm.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
include/linux/lsm_hooks.h
security/integrity/iint.c
security/security.c