[PATCH v3 11/34] lsm: get rid of the lsm_names list and do some cleanup

Roberto Sassu roberto.sassu at huaweicloud.com
Thu Sep 4 08:12:51 UTC 2025


On Tue, 2025-09-02 at 10:20 -0700, John Johansen wrote:
> On 8/14/25 15:50, Paul Moore wrote:
> > The LSM currently has a lot of code to maintain a list of the currently
> > active LSMs in a human readable string, with the only user being the
> > "/sys/kernel/security/lsm" code.  Let's drop all of that code and
> > generate the string on first use and then cache it for subsequent use.
> > 
> > Signed-off-by: Paul Moore <paul at paul-moore.com>
> > ---
> >   include/linux/lsm_hooks.h |  1 -
> >   security/inode.c          | 59 +++++++++++++++++++++++++++++++++++++--
> >   security/lsm_init.c       | 49 --------------------------------
> >   3 files changed, 57 insertions(+), 52 deletions(-)
> > 
> > diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h
> > index 7343dd60b1d5..65a8227bece7 100644
> > --- a/include/linux/lsm_hooks.h
> > +++ b/include/linux/lsm_hooks.h
> > @@ -172,7 +172,6 @@ struct lsm_info {
> >   
> >   
> >   /* DO NOT tamper with these variables outside of the LSM framework */
> > -extern char *lsm_names;
> >   extern struct lsm_static_calls_table static_calls_table __ro_after_init;
> >   
> >   /**
> > diff --git a/security/inode.c b/security/inode.c
> > index 43382ef8896e..a5e7a073e672 100644
> > --- a/security/inode.c
> > +++ b/security/inode.c
> > @@ -22,6 +22,8 @@
> >   #include <linux/lsm_hooks.h>
> >   #include <linux/magic.h>
> >   
> > +#include "lsm.h"
> > +
> >   static struct vfsmount *mount;
> >   static int mount_count;
> >   
> > @@ -315,12 +317,65 @@ void securityfs_remove(struct dentry *dentry)
> >   EXPORT_SYMBOL_GPL(securityfs_remove);
> >   
> >   #ifdef CONFIG_SECURITY
> > +#include <linux/spinlock.h>
> > +
> >   static struct dentry *lsm_dentry;
> > +
> > +/* NOTE: we never free the string below once it is set. */
> > +static DEFINE_SPINLOCK(lsm_read_lock);
> 
> nit, this is only used on the write side, so not the best name
> 
> > +static char *lsm_read_str = NULL;
> > +static ssize_t lsm_read_len = 0;
> > +
> >   static ssize_t lsm_read(struct file *filp, char __user *buf, size_t count,
> >   			loff_t *ppos)
> >   {
> > -	return simple_read_from_buffer(buf, count, ppos, lsm_names,
> > -		strlen(lsm_names));
> > +	int i;
> > +	char *str;
> > +	ssize_t len;
> > +
> > +restart:
> > +
> > +	rcu_read_lock();

Uhm, it seems we cannot use plain RCU here, simple_read_from_buffer()
can sleep.

Roberto

> > +	if (!lsm_read_str) {
> should probably be
> if (!rcu_access_pointer(lsm_read_str)) {
> 
> > +		/* we need to generate the string and try again */
> > +		rcu_read_unlock();
> > +		goto generate_string;
> > +	}
> > +	len = simple_read_from_buffer(buf, count, ppos,
> > +				      rcu_dereference(lsm_read_str),
> > +				      lsm_read_len);
> > +	rcu_read_unlock();
> > +	return len;
> > +
> > +generate_string:
> > +
> > +	for (i = 0; i < lsm_active_cnt; i++)
> > +		/* the '+ 1' accounts for either a comma or a NUL */
> > +		len += strlen(lsm_idlist[i]->name) + 1;
> > +
> > +	str = kmalloc(len, GFP_KERNEL);
> > +	if (!str)
> > +		return -ENOMEM;
> > +	str[0] = '\0';
> > +
> > +	for (i = 0; i < lsm_active_cnt; i++) {
> > +		if (i > 0)
> > +			strcat(str, ",");
> > +		strcat(str, lsm_idlist[i]->name);
> > +	}
> > +
> > +	spin_lock(&lsm_read_lock);
> > +	if (lsm_read_str) {
> > +		/* we raced and lost */
> > +		spin_unlock(&lsm_read_lock);
> > +		kfree(str);
> > +		goto restart;
> > +	}
> > +	lsm_read_str = str;
> > +	lsm_read_len = len - 1;
> > +	spin_unlock(&lsm_read_lock);
> > +
> > +	goto restart;
> >   }
> >   
> >   static const struct file_operations lsm_ops = {
> > diff --git a/security/lsm_init.c b/security/lsm_init.c
> > index 9e495a36a332..87e2147016b3 100644
> > --- a/security/lsm_init.c
> > +++ b/security/lsm_init.c
> > @@ -10,8 +10,6 @@
> >   
> >   #include "lsm.h"
> >   
> > -char *lsm_names;
> > -
> >   /* Pointers to LSM sections defined in include/asm-generic/vmlinux.lds.h */
> >   extern struct lsm_info __start_lsm_info[], __end_lsm_info[];
> >   extern struct lsm_info __start_early_lsm_info[], __end_early_lsm_info[];
> > @@ -371,42 +369,6 @@ static void __init lsm_init_ordered(void)
> >   	}
> >   }
> >   
> > -static bool match_last_lsm(const char *list, const char *lsm)
> > -{
> > -	const char *last;
> > -
> > -	if (WARN_ON(!list || !lsm))
> > -		return false;
> > -	last = strrchr(list, ',');
> > -	if (last)
> > -		/* Pass the comma, strcmp() will check for '\0' */
> > -		last++;
> > -	else
> > -		last = list;
> > -	return !strcmp(last, lsm);
> > -}
> > -
> > -static int lsm_append(const char *new, char **result)
> > -{
> > -	char *cp;
> > -
> > -	if (*result == NULL) {
> > -		*result = kstrdup(new, GFP_KERNEL);
> > -		if (*result == NULL)
> > -			return -ENOMEM;
> > -	} else {
> > -		/* Check if it is the last registered name */
> > -		if (match_last_lsm(*result, new))
> > -			return 0;
> > -		cp = kasprintf(GFP_KERNEL, "%s,%s", *result, new);
> > -		if (cp == NULL)
> > -			return -ENOMEM;
> > -		kfree(*result);
> > -		*result = cp;
> > -	}
> > -	return 0;
> > -}
> > -
> >   static void __init lsm_static_call_init(struct security_hook_list *hl)
> >   {
> >   	struct lsm_static_call *scall = hl->scalls;
> > @@ -443,15 +405,6 @@ void __init security_add_hooks(struct security_hook_list *hooks, int count,
> >   		hooks[i].lsmid = lsmid;
> >   		lsm_static_call_init(&hooks[i]);
> >   	}
> > -
> > -	/*
> > -	 * Don't try to append during early_security_init(), we'll come back
> > -	 * and fix this up afterwards.
> > -	 */
> > -	if (slab_is_available()) {
> > -		if (lsm_append(lsmid->name, &lsm_names) < 0)
> > -			panic("%s - Cannot get early memory.\n", __func__);
> > -	}
> >   }
> >   
> >   int __init early_security_init(void)
> > @@ -488,8 +441,6 @@ int __init security_init(void)
> >   	lsm_early_for_each_raw(lsm) {
> >   		init_debug("  early started: %s (%s)\n", lsm->id->name,
> >   			   is_enabled(lsm) ? "enabled" : "disabled");
> > -		if (lsm->enabled)
> > -			lsm_append(lsm->id->name, &lsm_names);
> >   	}
> >   
> >   	/* Load LSMs in specified order. */
> 




More information about the Linux-security-module-archive mailing list