History log of /external/libselinux/include/selinux/label.h
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
8b40b9cc6488082a14e985691337d1fcfaac9577 05-Aug-2015 Stephen Smalley <sds@tycho.nsa.gov> libselinux: add selabel_cmp interface and label_file backend

Add a selabel_cmp() interface for comparing two label configurations,
and implement it for the file backend (i.e. for file_contexts). This
allows comparing two file_contexts configurations to see if the first
is a subset of, equal/identical to, a superset of, or incomparable to
the second. The motivating use case is to allow comparing two
file_contexts.bin files in Android CTS to confirm that a device
file_contexts.bin file contains all of the entries in the AOSP
general file_contexts.

Change-Id: I0fe63e0c7f11ae067b5aac2f468f7842e5d76986
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/libselinux/include/selinux/label.h
be7f5e8814c4954aca51d3f95455c5d9d527658c 12-Jun-2014 Stephen Smalley <sds@tycho.nsa.gov> Extend label file backend to support label-by-symlink for ueventd.

When ueventd creates a device node, it may also create one or more
symlinks to the device node. These symlinks may be the only stable
name for the device, e.g. if the partition is dynamically assigned.
Extend the label file backend to support looking up the "best match"
for a device node based on its real path (key) and any links to it
(aliases). The order of precedence for best match is:
1) An exact match for the real path (key), or
2) An exact match for any of the links (aliases), or
3) The longest fixed prefix match.

Change-Id: Id6c2597eee2b6723a5089dcf7c450f8d0a4128f4
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/libselinux/include/selinux/label.h
0e7340fb99b931540e2baf4778abeb53d40084e7 01-May-2014 Stephen Smalley <sds@tycho.nsa.gov> Optimize restorecon_recursive tree walk.

restorecon_recursive can prune the tree walk whenever it
encounters a directory for which there is no possible match
for any of its descendants in the file_contexts configuration.
This will only presently benefit the restorecon_recursive("/sys") call
by init since other restorecon_recursive calls always have
top-level entries that will match anything underneath and this
is required to fully label those partitions on upgrade. However,
those other cases are already optimized to only run once per
file_contexts change (upgrade) and thus do not need this optimization.

Change-Id: I854bf1ccff6ded56e9da2c4184435f67d7069bc1
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/libselinux/include/selinux/label.h
ab40ea9bfd71b50138f1482c4764a65ac17d8caf 19-Feb-2014 Stephen Smalley <sds@tycho.nsa.gov> Get rid of security_context_t and fix const declarations.

The const security_context_t declarations were incorrect;
const char * was intended, not char * const. Easiest fix is to
replace them all with const char *. And while we are at it, just
get rid of all usage of security_context_t itself as it adds no value.
typedef left to permit building legacy users until such a time as all are
updated.

Change-Id: I2f9df7bb9f575f76024c3e5f5b660345da2931a7
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/external/libselinux/include/selinux/label.h
a2e47cd90d84d48cde19575d044577a3fc7a4000 11-Jun-2012 Stephen Smalley <sds@tycho.nsa.gov> Change selabel_open and label backends to take a const struct selinux_opt argument.
/external/libselinux/include/selinux/label.h
35b01083fe5e34cbd318a78ef9b1a13432ae24d9 04-Apr-2012 Stephen Smalley <sds@tycho.nsa.gov> Define and implement Android property selabel backend.
/external/libselinux/include/selinux/label.h
f074036424618c130dacb3464465a8b40bffef58 04-Jan-2012 Stephen Smalley <sds@tycho.nsa.gov> Port of libselinux to Android.
/external/libselinux/include/selinux/label.h