chiark / gitweb /
build-sys: s/HAVE_SMACK/ENABLE_SMACK/
authorZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
Tue, 3 Oct 2017 10:22:40 +0000 (12:22 +0200)
committerSven Eden <yamakuzure@gmx.net>
Fri, 8 Dec 2017 06:27:19 +0000 (07:27 +0100)
Same justification as for HAVE_UTMP.

src/basic/build.h
src/basic/smack-util.c
src/core/mount-setup.c

index 0448a76f59b8d7ec7a4f73ce6674cd7f9f33a9e5..a454c9465239100e1762667a020ecfad8ab5e0ea 100644 (file)
@@ -51,7 +51,7 @@
 #endif
 #endif // 0
 
-#if HAVE_SMACK
+#if ENABLE_SMACK
 #define _SMACK_FEATURE_ "+SMACK"
 #else
 #define _SMACK_FEATURE_ "-SMACK"
index 46ec68975b035a853a2609950b27ff1dffec6e3d..691c0670e3216d087c8204c85801ebdc928f1786 100644 (file)
@@ -35,7 +35,7 @@
 #include "string-table.h"
 #include "xattr-util.h"
 
-#if HAVE_SMACK
+#if ENABLE_SMACK
 bool mac_smack_use(void) {
         static int cached_use = -1;
 
index 4a5a22f9bc3d19b47688894078fe1c4f21f67b1b..f9e476a012c086c09d5447ab34ec1bfd6af0423c 100644 (file)
@@ -67,7 +67,7 @@ typedef struct MountPoint {
  * fourth (securityfs) is needed by IMA to load a custom policy. The
  * other ones we can delay until SELinux and IMA are loaded. When
  * SMACK is enabled we need smackfs, too, so it's a fifth one. */
-#if HAVE_SMACK
+#if ENABLE_SMACK
 #define N_EARLY_MOUNT 5
 #else
 #define N_EARLY_MOUNT 4
@@ -83,7 +83,7 @@ static const MountPoint mount_table[] = {
           NULL,          MNT_FATAL|MNT_IN_CONTAINER },
         { "securityfs",  "/sys/kernel/security",      "securityfs", NULL,                      MS_NOSUID|MS_NOEXEC|MS_NODEV,
           NULL,          MNT_NONE                   },
-#if HAVE_SMACK
+#if ENABLE_SMACK
         { "smackfs",     "/sys/fs/smackfs",           "smackfs",    "smackfsdef=*",            MS_NOSUID|MS_NOEXEC|MS_NODEV,
           mac_smack_use, MNT_FATAL                  },
         { "tmpfs",       "/dev/shm",                  "tmpfs",      "mode=1777,smackfsroot=*", MS_NOSUID|MS_NODEV|MS_STRICTATIME,
@@ -93,7 +93,7 @@ static const MountPoint mount_table[] = {
           NULL,          MNT_FATAL|MNT_IN_CONTAINER },
         { "devpts",      "/dev/pts",                  "devpts",     "mode=620,gid=" STRINGIFY(TTY_GID), MS_NOSUID|MS_NOEXEC,
           NULL,          MNT_IN_CONTAINER           },
-#if HAVE_SMACK
+#if ENABLE_SMACK
         { "tmpfs",       "/run",                      "tmpfs",      "mode=755,smackfsroot=*",  MS_NOSUID|MS_NODEV|MS_STRICTATIME,
           mac_smack_use, MNT_FATAL                  },
 #endif
@@ -351,7 +351,7 @@ int mount_cgroup_controllers(char ***join_controllers) {
         return 0;
 }
 
-#if HAVE_SELINUX || HAVE_SMACK
+#if HAVE_SELINUX || ENABLE_SMACK
 static int nftw_cb(
                 const char *fpath,
                 const struct stat *sb,
@@ -384,7 +384,7 @@ int mount_setup(bool loaded_policy) {
                 return r;
 
 #if 0 /// elogind does not control /, /dev, /run and /run/systemd/* are setup elsewhere.
-#if HAVE_SELINUX || HAVE_SMACK
+#if HAVE_SELINUX || ENABLE_SMACK
         /* Nodes in devtmpfs and /run need to be manually updated for
          * the appropriate labels, after mounting. The other virtual
          * API file systems like /sys and /proc do not need that, they