Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 30da4f77 authored by Kees Cook's avatar Kees Cook Committed by Jonathan Corbet
Browse files

doc: ReSTify LoadPin.txt



Adjusts for ReST markup and moves under LSM admin guide.

Signed-off-by: default avatarKees Cook <keescook@chromium.org>
Signed-off-by: default avatarJonathan Corbet <corbet@lwn.net>
parent 90bb7664
Loading
Loading
Loading
Loading
+8 −4
Original line number Diff line number Diff line
=======
LoadPin
=======

LoadPin is a Linux Security Module that ensures all kernel-loaded files
(modules, firmware, etc) all originate from the same filesystem, with
the expectation that such a filesystem is backed by a read-only device
@@ -5,13 +9,13 @@ such as dm-verity or CDROM. This allows systems that have a verified
and/or unchangeable filesystem to enforce module and firmware loading
restrictions without needing to sign the files individually.

The LSM is selectable at build-time with CONFIG_SECURITY_LOADPIN, and
The LSM is selectable at build-time with ``CONFIG_SECURITY_LOADPIN``, and
can be controlled at boot-time with the kernel command line option
"loadpin.enabled". By default, it is enabled, but can be disabled at
boot ("loadpin.enabled=0").
"``loadpin.enabled``". By default, it is enabled, but can be disabled at
boot ("``loadpin.enabled=0``").

LoadPin starts pinning when it sees the first file loaded. If the
block device backing the filesystem is not read-only, a sysctl is
created to toggle pinning: /proc/sys/kernel/loadpin/enabled. (Having
created to toggle pinning: ``/proc/sys/kernel/loadpin/enabled``. (Having
a mutable filesystem means pinning is mutable too, but having the
sysctl allows for easy testing on systems with a mutable filesystem.)
+1 −0
Original line number Diff line number Diff line
@@ -34,6 +34,7 @@ the one "major" module (e.g. SELinux) if there is one configured.
   :maxdepth: 1

   apparmor
   LoadPin
   SELinux
   tomoyo
   Yama
+1 −0
Original line number Diff line number Diff line
@@ -11567,6 +11567,7 @@ M: Kees Cook <keescook@chromium.org>
T:	git git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git lsm/loadpin
S:	Supported
F:	security/loadpin/
F:	Documentation/admin-guide/LSM/LoadPin.rst

YAMA SECURITY MODULE
M:	Kees Cook <keescook@chromium.org>