Re: [PATCH] libselinux: update man pages for userspace policy enforcers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 1/17/20 10:26 AM, William Roberts wrote:
On Fri, Jan 17, 2020 at 8:47 AM Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:

Despite deprecating use of flask.h and av_permissions.h back in 2014,
the man pages for avc_has_perm(3) and security_compute_av(3) were not
updated to provide instructions on how to dynamically map class/permission
names nor to encourage use of selinux_check_access(3) instead of these
interfaces.  Also, while selinux_set_mapping(3) supports dynamic
class/perm mapping at initialization, it does not support changes to
the class/perm values at runtime upon a policy reload, and no
instructions were provided on how to set up a callback to support
this case.  Update the man pages accordingly.

Signed-off-by: Stephen Smalley <sds@xxxxxxxxxxxxx>

Thanks, this patch is now applied. For future reference, if you reply with a full Acked-by: name <email> line, patchwork will automatically mark that the patch has received an Ack in the A/R/T tags field which makes it easy to track. It doesn't recognize a bare Ack.

https://patchwork.kernel.org/project/selinux/list/



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux