History log of /external/libselinux/src/label.c
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
be7f5e8814c4954aca51d3f95455c5d9d527658c 12-Jun-2014 Stephen Smalley <sds@tycho.nsa.gov> Extend label file backend to support label-by-symlink for ueventd.

When ueventd creates a device node, it may also create one or more
symlinks to the device node. These symlinks may be the only stable
name for the device, e.g. if the partition is dynamically assigned.
Extend the label file backend to support looking up the "best match"
for a device node based on its real path (key) and any links to it
(aliases). The order of precedence for best match is:
1) An exact match for the real path (key), or
2) An exact match for any of the links (aliases), or
3) The longest fixed prefix match.

Change-Id: Id6c2597eee2b6723a5089dcf7c450f8d0a4128f4
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/libselinux/src/label.c
0e7340fb99b931540e2baf4778abeb53d40084e7 01-May-2014 Stephen Smalley <sds@tycho.nsa.gov> Optimize restorecon_recursive tree walk.

restorecon_recursive can prune the tree walk whenever it
encounters a directory for which there is no possible match
for any of its descendants in the file_contexts configuration.
This will only presently benefit the restorecon_recursive("/sys") call
by init since other restorecon_recursive calls always have
top-level entries that will match anything underneath and this
is required to fully label those partitions on upgrade. However,
those other cases are already optimized to only run once per
file_contexts change (upgrade) and thus do not need this optimization.

Change-Id: I854bf1ccff6ded56e9da2c4184435f67d7069bc1
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/libselinux/src/label.c
ab40ea9bfd71b50138f1482c4764a65ac17d8caf 19-Feb-2014 Stephen Smalley <sds@tycho.nsa.gov> Get rid of security_context_t and fix const declarations.

The const security_context_t declarations were incorrect;
const char * was intended, not char * const. Easiest fix is to
replace them all with const char *. And while we are at it, just
get rid of all usage of security_context_t itself as it adds no value.
typedef left to permit building legacy users until such a time as all are
updated.

Change-Id: I2f9df7bb9f575f76024c3e5f5b660345da2931a7
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/libselinux/src/label.c
b1ae15abf1d3a47b0e993d1a4daa228f73d12bb9 12-Jul-2013 Nick Kralevich <nnk@google.com> Clean up code

Clean up the code, so it compiles with -Wall -Wextra -Werror

Change-Id: I78ad5941a45208e1a82181cedb5853753f58ff0d
/external/libselinux/src/label.c
a2e47cd90d84d48cde19575d044577a3fc7a4000 11-Jun-2012 Stephen Smalley <sds@tycho.nsa.gov> Change selabel_open and label backends to take a const struct selinux_opt argument.
/external/libselinux/src/label.c
35b01083fe5e34cbd318a78ef9b1a13432ae24d9 04-Apr-2012 Stephen Smalley <sds@tycho.nsa.gov> Define and implement Android property selabel backend.
/external/libselinux/src/label.c
f074036424618c130dacb3464465a8b40bffef58 04-Jan-2012 Stephen Smalley <sds@tycho.nsa.gov> Port of libselinux to Android.
/external/libselinux/src/label.c