chiark
/
gitweb
/
~ianmdlvl
/
elogind.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
core: make RuntimeDirectory honor SELinux labels
[elogind.git]
/
src
/
core
/
smack-setup.c
diff --git
a/src/core/smack-setup.c
b/src/core/smack-setup.c
index a68605c27216407a49e45a8d007bda77af5c9372..59f6832bc21feae660a365f8fd9c0907d56683dd 100644
(file)
--- a/
src/core/smack-setup.c
+++ b/
src/core/smack-setup.c
@@
-56,7
+56,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
dst = fopen(dstpath, "we");
if (!dst) {
if (errno != ENOENT)
dst = fopen(dstpath, "we");
if (!dst) {
if (errno != ENOENT)
- log_warning
(
"Failed to open %s: %m", dstpath);
+ log_warning
_errno(errno,
"Failed to open %s: %m", dstpath);
return -errno; /* negative error */
}
return -errno; /* negative error */
}
@@
-64,7
+64,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
dir = opendir(srcdir);
if (!dir) {
if (errno != ENOENT)
dir = opendir(srcdir);
if (!dir) {
if (errno != ENOENT)
- log_warning
(
"Failed to opendir %s: %m", srcdir);
+ log_warning
_errno(errno,
"Failed to opendir %s: %m", srcdir);
return errno; /* positive on purpose */
}
return errno; /* positive on purpose */
}
@@
-79,7
+79,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
if (fd < 0) {
if (r == 0)
r = -errno;
if (fd < 0) {
if (r == 0)
r = -errno;
- log_warning
(
"Failed to open %s: %m", entry->d_name);
+ log_warning
_errno(errno,
"Failed to open %s: %m", entry->d_name);
continue;
}
continue;
}
@@
-87,14
+87,14
@@
static int write_rules(const char* dstpath, const char* srcdir) {
if (!policy) {
if (r == 0)
r = -errno;
if (!policy) {
if (r == 0)
r = -errno;
-
close_nointr_nofail
(fd);
- log_error
(
"Failed to open %s: %m", entry->d_name);
+
safe_close
(fd);
+ log_error
_errno(errno,
"Failed to open %s: %m", entry->d_name);
continue;
}
/* load2 write rules in the kernel require a line buffered stream */
FOREACH_LINE(buf, policy,
continue;
}
/* load2 write rules in the kernel require a line buffered stream */
FOREACH_LINE(buf, policy,
- log_error
(
"Failed to read line from %s: %m",
+ log_error
_errno(errno,
"Failed to read line from %s: %m",
entry->d_name)) {
if (!fputs(buf, dst)) {
if (r == 0)
entry->d_name)) {
if (!fputs(buf, dst)) {
if (r == 0)
@@
-105,7
+105,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
if (fflush(dst)) {
if (r == 0)
r = -errno;
if (fflush(dst)) {
if (r == 0)
r = -errno;
- log_error
(
"Failed to flush writes to %s: %m", dstpath);
+ log_error
_errno(errno,
"Failed to flush writes to %s: %m", dstpath);
break;
}
}
break;
}
}
@@
-116,7
+116,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
#endif
#endif
-int smack_setup(bool *loaded_policy) {
+int
mac_
smack_setup(bool *loaded_policy) {
#ifdef HAVE_SMACK
#ifdef HAVE_SMACK
@@
-158,7
+158,7
@@
int smack_setup(bool *loaded_policy) {
return 0;
case 0:
log_info("Successfully loaded Smack/CIPSO policies.");
return 0;
case 0:
log_info("Successfully loaded Smack/CIPSO policies.");
-
return 0
;
+
break
;
default:
log_warning("Failed to load Smack/CIPSO access rules: %s, ignoring.",
strerror(abs(r)));
default:
log_warning("Failed to load Smack/CIPSO access rules: %s, ignoring.",
strerror(abs(r)));