[PATCH 2/2] LSM: Allow reservation of netlabel
Stephen Smalley
stephen.smalley.work at gmail.com
Thu Oct 9 18:53:24 UTC 2025
On Wed, Oct 1, 2025 at 5:56 PM Casey Schaufler <casey at schaufler-ca.com> wrote:
>
> Allow LSMs to request exclusive access to the netlabel facility.
> Provide mechanism for LSMs to determine if they have access to
> netlabel. Update the current users of netlabel, SELinux and Smack,
> to use and respect the exclusive use of netlabel.
>
> Signed-off-by: Casey Schaufler <casey at schaufler-ca.com>
> ---
> diff --git a/security/security.c b/security/security.c
> index e59e3d403de6..9eca10844b56 100644
> --- a/security/security.c
> +++ b/security/security.c
> @@ -289,6 +289,12 @@ static void __init lsm_set_blob_sizes(struct lsm_blob_sizes *needed)
> else
> blob_sizes.lbs_secmark = true;
> }
> + if (needed->lbs_netlabel) {
> + if (blob_sizes.lbs_netlabel)
> + needed->lbs_netlabel = false;
> + else
> + blob_sizes.lbs_netlabel = true;
> +
Same principle here - if a LSM wants to use netlabel, it may want to
guarantee that it truly has exclusive access to it no matter what the
LSM order is.
More information about the Linux-security-module-archive
mailing list