summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHyejin Kim <hyejin0906.kim@samsung.com>2016-01-04 18:40:24 -0800
committerGerrit Code Review <gerrit@review.vlan103.tizen.org>2016-01-04 18:40:24 -0800
commit16d8d570a162fa40d5ed64798eb1c72e3288e3fc (patch)
tree6c9facfed32104c65e386ff01728b52d79b25723
parent754aabd8e38dc3d6d9d8bd275347c8db174c9ad0 (diff)
parent8144f777408a575b8d94a008980f918b117d713e (diff)
downloadtoybox-16d8d570a162fa40d5ed64798eb1c72e3288e3fc.tar.gz
toybox-16d8d570a162fa40d5ed64798eb1c72e3288e3fc.tar.bz2
toybox-16d8d570a162fa40d5ed64798eb1c72e3288e3fc.zip
Merge "use consistent string for security context" into tizen
-rw-r--r--toys/other/stat.c2
-rw-r--r--toys/posix/cp.c6
2 files changed, 4 insertions, 4 deletions
diff --git a/toys/other/stat.c b/toys/other/stat.c
index 27b167c..b1355a5 100644
--- a/toys/other/stat.c
+++ b/toys/other/stat.c
@@ -78,7 +78,7 @@ static char* ftype_to_string(uint64_t ftype)
case 0x517B: return "smb";
case 0x4d44: return "msdos";
case 0x4006: return "fat";
- //case 0x43415d53: return "smackfs";
+ case 0x43415d53: return "smackfs";
case 0x73717368: return "squashfs";
default: return "unknown";
}
diff --git a/toys/posix/cp.c b/toys/posix/cp.c
index 0a378b8..6a395a4 100644
--- a/toys/posix/cp.c
+++ b/toys/posix/cp.c
@@ -67,7 +67,7 @@ config CP_Z
help
usage: cp [-Z]
- set SMACK security context of destination file to default type
+ set security context of destination file to default type
config MV
bool "mv"
@@ -401,7 +401,7 @@ void cp_main(void)
TT.c.context = NULL;
if (!CFG_TOYBOX_LSM_NONE && lsm_enabled()) {
if (0>lsm_lget_context(src, &TT.c.context))
- perror_exit("unknown SMACK label for '%s'", src);
+ perror_exit("unknown security context for '%s'", src);
if (0>lsm_set_create(TT.c.context))
perror_exit("preserve context '%s' failed", TT.c.context);
free(TT.c.context);
@@ -416,7 +416,7 @@ void cp_main(void)
if (toys.optflags & FLAG_Z) TT.c.context = lsm_context();
else {
if (0>lsm_lget_context(src, &TT.c.context))
- perror_exit("unknown SMACK label for '%s'", src);
+ perror_exit("unknown security context for '%s'", src);
}
} else error_exit("%s disabled", lsm_name());
}