Skip to content

Commit 180cf25

Browse files
committed
apparmor: advertise availability of exended perms
Userspace won't load policy using extended perms unless it knows the kernel can handle them. Advertise that extended perms are supported in the feature set. Signed-off-by: John Johansen <john.johansen@canonical.com> Reviewed-by: Jon Tourville <jontourville@me.com>
1 parent 8de4a7d commit 180cf25

1 file changed

Lines changed: 3 additions & 0 deletions

File tree

security/apparmor/apparmorfs.c

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2348,11 +2348,14 @@ static struct aa_sfs_entry aa_sfs_entry_versions[] = {
23482348
{ }
23492349
};
23502350

2351+
#define PERMS32STR "allow deny subtree cond kill complain prompt audit quiet hide xindex tag label"
23512352
static struct aa_sfs_entry aa_sfs_entry_policy[] = {
23522353
AA_SFS_DIR("versions", aa_sfs_entry_versions),
23532354
AA_SFS_FILE_BOOLEAN("set_load", 1),
23542355
/* number of out of band transitions supported */
23552356
AA_SFS_FILE_U64("outofband", MAX_OOB_SUPPORTED),
2357+
AA_SFS_FILE_U64("permstable32_version", 1),
2358+
AA_SFS_FILE_STRING("permstable32", PERMS32STR),
23562359
{ }
23572360
};
23582361

0 commit comments

Comments
 (0)