Skip to content

Commit 9c7c6e1

Browse files
tweksteenjwcart2
authored andcommitted
libsepol: Add policy capability netlink_xperm
This capability can be enabled to change the kernel's behaviour and use the extended permissions for netlink messages. Signed-off-by: Thiébaud Weksteen <[email protected]> Acked-by: Stephen Smalley <[email protected]>
1 parent ba7945a commit 9c7c6e1

File tree

2 files changed

+2
-0
lines changed

2 files changed

+2
-0
lines changed

libsepol/include/sepol/policydb/polcaps.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ enum {
1616
POLICYDB_CAP_GENFS_SECLABEL_SYMLINKS,
1717
POLICYDB_CAP_IOCTL_SKIP_CLOEXEC,
1818
POLICYDB_CAP_USERSPACE_INITIAL_CONTEXT,
19+
POLICYDB_CAP_NETLINK_XPERM,
1920
__POLICYDB_CAP_MAX
2021
};
2122
#define POLICYDB_CAP_MAX (__POLICYDB_CAP_MAX - 1)

libsepol/src/polcaps.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ static const char * const polcap_names[POLICYDB_CAP_MAX + 1] = {
1515
[POLICYDB_CAP_GENFS_SECLABEL_SYMLINKS] = "genfs_seclabel_symlinks",
1616
[POLICYDB_CAP_IOCTL_SKIP_CLOEXEC] = "ioctl_skip_cloexec",
1717
[POLICYDB_CAP_USERSPACE_INITIAL_CONTEXT] = "userspace_initial_context",
18+
[POLICYDB_CAP_NETLINK_XPERM] = "netlink_xperm",
1819
};
1920

2021
int sepol_polcap_getnum(const char *name)

0 commit comments

Comments
 (0)