blob: 32070762d24c44f0efc47a7bb1e99e2cf9d18291 [file] [log] [blame]
Kees Cook30da4f72017-05-13 04:51:48 -07001=======
2LoadPin
3=======
4
Kees Cook9b091552016-04-20 15:46:28 -07005LoadPin is a Linux Security Module that ensures all kernel-loaded files
6(modules, firmware, etc) all originate from the same filesystem, with
7the expectation that such a filesystem is backed by a read-only device
8such as dm-verity or CDROM. This allows systems that have a verified
9and/or unchangeable filesystem to enforce module and firmware loading
10restrictions without needing to sign the files individually.
11
Kees Cook30da4f72017-05-13 04:51:48 -070012The LSM is selectable at build-time with ``CONFIG_SECURITY_LOADPIN``, and
Kees Cook9b091552016-04-20 15:46:28 -070013can be controlled at boot-time with the kernel command line option
Kees Cook30da4f72017-05-13 04:51:48 -070014"``loadpin.enabled``". By default, it is enabled, but can be disabled at
15boot ("``loadpin.enabled=0``").
Kees Cook9b091552016-04-20 15:46:28 -070016
17LoadPin starts pinning when it sees the first file loaded. If the
18block device backing the filesystem is not read-only, a sysctl is
Kees Cook30da4f72017-05-13 04:51:48 -070019created to toggle pinning: ``/proc/sys/kernel/loadpin/enabled``. (Having
Kees Cook9b091552016-04-20 15:46:28 -070020a mutable filesystem means pinning is mutable too, but having the
21sysctl allows for easy testing on systems with a mutable filesystem.)