summaryrefslogtreecommitdiff
path: root/security/selinux/netlink.c
diff options
context:
space:
mode:
authorPaul Moore <paul@paul-moore.com>2025-02-18 17:50:39 -0500
committerPaul Moore <paul@paul-moore.com>2025-10-22 19:24:28 -0400
commit3156bc814f21a976b25c1b4981dcb0f558302b27 (patch)
treec5f0ee537e1835757c1dbab8c879cac9c8dd9b40 /security/selinux/netlink.c
parent82fe7932e84f618c6ec217203606f0c27ebef94b (diff)
selinux: move initcalls to the LSM framework
SELinux currently has a number of initcalls so we've created a new function, selinux_initcall(), which wraps all of these initcalls so that we have a single initcall function that can be registered with the LSM framework. Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security/selinux/netlink.c')
-rw-r--r--security/selinux/netlink.c5
1 files changed, 2 insertions, 3 deletions
diff --git a/security/selinux/netlink.c b/security/selinux/netlink.c
index 1760aee712fd..eb40e4603475 100644
--- a/security/selinux/netlink.c
+++ b/security/selinux/netlink.c
@@ -17,6 +17,7 @@
#include <net/net_namespace.h>
#include <net/netlink.h>
+#include "initcalls.h"
#include "security.h"
static struct sock *selnl __ro_after_init;
@@ -105,7 +106,7 @@ void selnl_notify_policyload(u32 seqno)
selnl_notify(SELNL_MSG_POLICYLOAD, &seqno);
}
-static int __init selnl_init(void)
+int __init sel_netlink_init(void)
{
struct netlink_kernel_cfg cfg = {
.groups = SELNLGRP_MAX,
@@ -117,5 +118,3 @@ static int __init selnl_init(void)
panic("SELinux: Cannot create netlink socket.");
return 0;
}
-
-__initcall(selnl_init);