OK. I'll put something together, but it'll be in a couple of months. On Fri, Jan 17, 2020 at 4:19 PM Paul Moore <paul@xxxxxxxxxxxxxx> wrote: > > On January 17, 2020 3:21:10 AM Jeffrey Vander Stoep <jeffv@xxxxxxxxxx> wrote: > > On Fri, Jan 17, 2020 at 1:32 AM Paul Moore <paul@xxxxxxxxxxxxxx> wrote: > >> Our current handling of netlink messages is rather crude, especially > >> when you consider the significance of the netlink messages and the > >> rather coarse granularity when compared to other SELinux object > >> classes. I believe some (most? all?) of this is due to the number of > >> netlink messages compared to the maximum number of permissions in an > >> object class. Back when xperms were added, one of the motivations for > >> making it a general solution was to potentially use them for netlink; > >> we obviously haven't made the change in the netlink controls, but I > >> think this might be the right time to do it. > > That's a very large change with some unanswered questions - like how to > > handle > > generic netlink. I will have time later this year to make that change. > > > > In the meantime, this change is small (ideal for backporting) and > > consistent with > > how we differentiate between levels of sensitivity on netlink_audit > > messages. > > Would you consider taking v3 of this change with your suggested adjustment > > to > > selinux_policycaps_init()? > > Yes, it is a big change and there are some open questions, but both of the changes we are discussing here are exposed to userspace so there is a need to make sure we get this as right as possible the first time. I am not a fan of exposing a change to userspace knowing that we will be replacing it in the future. > > If we need to update the netlink controls, and I think we do, let's do it properly and not one message at a time. > > -- > paul moore > www.paul-moore.com > > > >