diff options
author | Joel Galenson <jgalenson@google.com> | 2021-04-19 09:46:07 -0700 |
---|---|---|
committer | Joel Galenson <jgalenson@google.com> | 2021-04-19 09:46:07 -0700 |
commit | f30e6ff37683d72b65c160a808f87fe356c71c0b (patch) | |
tree | fabf0a1be187441b8022708fe6f4400741f29fa5 | |
parent | d24eb86be44c31510e1f05b1b7ba54d5504e4c52 (diff) | |
download | selinux-f30e6ff37683d72b65c160a808f87fe356c71c0b.tar.gz |
Use the new more inclusive command-line options.
Test: Compile
Change-Id: Ie54fb0dafda0a6167e95b32d0a6b4f762162ae1d
-rw-r--r-- | libselinux/Android.bp | 102 |
1 files changed, 51 insertions, 51 deletions
diff --git a/libselinux/Android.bp b/libselinux/Android.bp index aa3e2d50..fee11fee 100644 --- a/libselinux/Android.bp +++ b/libselinux/Android.bp @@ -276,59 +276,59 @@ rust_bindgen { // This makes the generated bindings much more concise and improves compilation // time. bindgen_flags: [ - "--whitelist-function=fgetfilecon", - "--whitelist-function=fgetfilecon_raw", - "--whitelist-function=freecon", - "--whitelist-function=fsetfilecon", - "--whitelist-function=getcon", - "--whitelist-function=getfilecon", - "--whitelist-function=getpeercon", - "--whitelist-function=getpidcon", - "--whitelist-function=is_selinux_enabled", - "--whitelist-function=lgetfilecon", - "--whitelist-function=lsetfilecon", - "--whitelist-function=security_compute_create", - "--whitelist-function=security_get_initial_context", - "--whitelist-function=security_getenforce", - "--whitelist-function=security_load_policy", - "--whitelist-function=security_policyvers", - "--whitelist-function=security_setenforce", - "--whitelist-function=selabel_close", - "--whitelist-function=selabel_lookup", - "--whitelist-function=selabel_lookup_best_match", - "--whitelist-function=selabel_open", - "--whitelist-function=selinux_android_file_context_handle", - "--whitelist-function=selinux_android_hw_service_context_handle", - "--whitelist-function=selinux_android_load_policy", - "--whitelist-function=selinux_android_load_policy_from_fd", - "--whitelist-function=selinux_android_restorecon", - "--whitelist-function=selinux_android_restorecon_pkgdir", - "--whitelist-function=selinux_android_seapp_context_init", - "--whitelist-function=selinux_android_service_context_handle", - "--whitelist-function=selinux_android_set_sehandle", - "--whitelist-function=selinux_android_setcon", - "--whitelist-function=selinux_android_setcontext", - "--whitelist-function=selinux_android_vendor_service_context_handle", - "--whitelist-function=selinux_check_access", - "--whitelist-function=selinux_log_callback", - "--whitelist-function=selinux_set_callback", - "--whitelist-function=selinux_status_open", - "--whitelist-function=selinux_status_updated", - "--whitelist-function=selinux_vendor_log_callback", - "--whitelist-function=set_selinuxmnt", - "--whitelist-function=setcon", - "--whitelist-function=setexeccon", - "--whitelist-function=setfilecon", - "--whitelist-function=setfscreatecon", - "--whitelist-function=setsockcreatecon", - "--whitelist-function=setsockcreatecon_raw", - "--whitelist-function=string_to_security_class", - "--whitelist-function=selinux_android_context_with_level", - "--whitelist-function=selinux_android_keystore2_key_context_handle", + "--allowlist-function=fgetfilecon", + "--allowlist-function=fgetfilecon_raw", + "--allowlist-function=freecon", + "--allowlist-function=fsetfilecon", + "--allowlist-function=getcon", + "--allowlist-function=getfilecon", + "--allowlist-function=getpeercon", + "--allowlist-function=getpidcon", + "--allowlist-function=is_selinux_enabled", + "--allowlist-function=lgetfilecon", + "--allowlist-function=lsetfilecon", + "--allowlist-function=security_compute_create", + "--allowlist-function=security_get_initial_context", + "--allowlist-function=security_getenforce", + "--allowlist-function=security_load_policy", + "--allowlist-function=security_policyvers", + "--allowlist-function=security_setenforce", + "--allowlist-function=selabel_close", + "--allowlist-function=selabel_lookup", + "--allowlist-function=selabel_lookup_best_match", + "--allowlist-function=selabel_open", + "--allowlist-function=selinux_android_file_context_handle", + "--allowlist-function=selinux_android_hw_service_context_handle", + "--allowlist-function=selinux_android_load_policy", + "--allowlist-function=selinux_android_load_policy_from_fd", + "--allowlist-function=selinux_android_restorecon", + "--allowlist-function=selinux_android_restorecon_pkgdir", + "--allowlist-function=selinux_android_seapp_context_init", + "--allowlist-function=selinux_android_service_context_handle", + "--allowlist-function=selinux_android_set_sehandle", + "--allowlist-function=selinux_android_setcon", + "--allowlist-function=selinux_android_setcontext", + "--allowlist-function=selinux_android_vendor_service_context_handle", + "--allowlist-function=selinux_check_access", + "--allowlist-function=selinux_log_callback", + "--allowlist-function=selinux_set_callback", + "--allowlist-function=selinux_status_open", + "--allowlist-function=selinux_status_updated", + "--allowlist-function=selinux_vendor_log_callback", + "--allowlist-function=set_selinuxmnt", + "--allowlist-function=setcon", + "--allowlist-function=setexeccon", + "--allowlist-function=setfilecon", + "--allowlist-function=setfscreatecon", + "--allowlist-function=setsockcreatecon", + "--allowlist-function=setsockcreatecon_raw", + "--allowlist-function=string_to_security_class", + "--allowlist-function=selinux_android_context_with_level", + "--allowlist-function=selinux_android_keystore2_key_context_handle", // We also need some constants in addition to the functions. - "--whitelist-var=SELABEL_.*", - "--whitelist-var=SELINUX_.*", + "--allowlist-var=SELABEL_.*", + "--allowlist-var=SELINUX_.*", ], // This is mainly to run layout tests for generated bindings on the host. |