[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250617210105.17479-1-casey@schaufler-ca.com>
Date: Tue, 17 Jun 2025 14:01:02 -0700
From: Casey Schaufler <casey@...aufler-ca.com>
To: casey@...aufler-ca.com,
paul@...l-moore.com,
eparis@...hat.com,
linux-security-module@...r.kernel.org
Cc: jmorris@...ei.org,
serge@...lyn.com,
keescook@...omium.org,
john.johansen@...onical.com,
penguin-kernel@...ove.sakura.ne.jp,
stephen.smalley.work@...il.com,
linux-kernel@...r.kernel.org,
selinux@...r.kernel.org
Subject: [PATCH 0/3] LSM: Multiple LSM mount options
Linux Security Module (LSM) that support mount options, currently SELinux
and Smack, allocate their own data for those options. This patch set
moves the handling of mount option data out of the individual LSMs and
into the LSM infrastructure. This allows for multiple LSMs to support
mount options at the same time.
https://github.com/cschaufler/lsm-stacking#mount-opts-6.16-rc1
Based on patches Paul Moore's LSM initialization patchset.
https://lore.kernel.org/all/20250409185019.238841-31-paul@paul-moore.com/v3
Casey Schaufler (3):
LSM: Add mount opts blob size tracking
LSM: allocate mnt_opts blobs instead of module specific data
LSM: Infrastructure management of the mnt_opts security blob
include/linux/lsm_hooks.h | 2 ++
security/lsm_init.c | 2 ++
security/security.c | 26 ++++++++++-----
security/selinux/hooks.c | 65 +++++++++++++++++++++++++-------------
security/smack/smack_lsm.c | 62 +++++++++++++++++++++++++-----------
5 files changed, 108 insertions(+), 49 deletions(-)
--
2.47.0
Powered by blists - more mailing lists