chiark
/
gitweb
/
~ianmdlvl
/
elogind.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
treewide: convert some left-over (usec_t) -1 to USEC_INFINITY
[elogind.git]
/
src
/
core
/
smack-setup.c
diff --git
a/src/core/smack-setup.c
b/src/core/smack-setup.c
index 73eeb041908d99915453d3452d20e2f9ed513b17..59f6832bc21feae660a365f8fd9c0907d56683dd 100644
(file)
--- a/
src/core/smack-setup.c
+++ b/
src/core/smack-setup.c
@@
-36,11
+36,14
@@
#include "macro.h"
#include "smack-setup.h"
#include "util.h"
#include "macro.h"
#include "smack-setup.h"
#include "util.h"
+#include "fileio.h"
#include "log.h"
#include "label.h"
#define SMACK_CONFIG "/etc/smack/accesses.d/"
#include "log.h"
#include "label.h"
#define SMACK_CONFIG "/etc/smack/accesses.d/"
-#define CIPSO_CONFIG "/etc/smack/cipso/"
+#define CIPSO_CONFIG "/etc/smack/cipso.d/"
+
+#ifdef HAVE_SMACK
static int write_rules(const char* dstpath, const char* srcdir) {
_cleanup_fclose_ FILE *dst = NULL;
static int write_rules(const char* dstpath, const char* srcdir) {
_cleanup_fclose_ FILE *dst = NULL;
@@
-53,7
+56,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
dst = fopen(dstpath, "we");
if (!dst) {
if (errno != ENOENT)
dst = fopen(dstpath, "we");
if (!dst) {
if (errno != ENOENT)
- log_warning
(
"Failed to open %s: %m", dstpath);
+ log_warning
_errno(errno,
"Failed to open %s: %m", dstpath);
return -errno; /* negative error */
}
return -errno; /* negative error */
}
@@
-61,7
+64,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
dir = opendir(srcdir);
if (!dir) {
if (errno != ENOENT)
dir = opendir(srcdir);
if (!dir) {
if (errno != ENOENT)
- log_warning
(
"Failed to opendir %s: %m", srcdir);
+ log_warning
_errno(errno,
"Failed to opendir %s: %m", srcdir);
return errno; /* positive on purpose */
}
return errno; /* positive on purpose */
}
@@
-76,7
+79,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
if (fd < 0) {
if (r == 0)
r = -errno;
if (fd < 0) {
if (r == 0)
r = -errno;
- log_warning
(
"Failed to open %s: %m", entry->d_name);
+ log_warning
_errno(errno,
"Failed to open %s: %m", entry->d_name);
continue;
}
continue;
}
@@
-84,14
+87,14
@@
static int write_rules(const char* dstpath, const char* srcdir) {
if (!policy) {
if (r == 0)
r = -errno;
if (!policy) {
if (r == 0)
r = -errno;
-
close_nointr_nofail
(fd);
- log_error
(
"Failed to open %s: %m", entry->d_name);
+
safe_close
(fd);
+ log_error
_errno(errno,
"Failed to open %s: %m", entry->d_name);
continue;
}
/* load2 write rules in the kernel require a line buffered stream */
FOREACH_LINE(buf, policy,
continue;
}
/* load2 write rules in the kernel require a line buffered stream */
FOREACH_LINE(buf, policy,
- log_error
(
"Failed to read line from %s: %m",
+ log_error
_errno(errno,
"Failed to read line from %s: %m",
entry->d_name)) {
if (!fputs(buf, dst)) {
if (r == 0)
entry->d_name)) {
if (!fputs(buf, dst)) {
if (r == 0)
@@
-102,7
+105,7
@@
static int write_rules(const char* dstpath, const char* srcdir) {
if (fflush(dst)) {
if (r == 0)
r = -errno;
if (fflush(dst)) {
if (r == 0)
r = -errno;
- log_error
(
"Failed to flush writes to %s: %m", dstpath);
+ log_error
_errno(errno,
"Failed to flush writes to %s: %m", dstpath);
break;
}
}
break;
}
}
@@
-111,10
+114,16
@@
static int write_rules(const char* dstpath, const char* srcdir) {
return r;
}
return r;
}
+#endif
+
+int mac_smack_setup(bool *loaded_policy) {
+
+#ifdef HAVE_SMACK
-int smack_setup(void) {
int r;
int r;
+ assert(loaded_policy);
+
r = write_rules("/sys/fs/smackfs/load2", SMACK_CONFIG);
switch(r) {
case -ENOENT:
r = write_rules("/sys/fs/smackfs/load2", SMACK_CONFIG);
switch(r) {
case -ENOENT:
@@
-132,6
+141,13
@@
int smack_setup(void) {
return 0;
}
return 0;
}
+#ifdef SMACK_RUN_LABEL
+ r = write_string_file("/proc/self/attr/current", SMACK_RUN_LABEL);
+ if (r)
+ log_warning("Failed to set SMACK label \"%s\" on self: %s",
+ SMACK_RUN_LABEL, strerror(-r));
+#endif
+
r = write_rules("/sys/fs/smackfs/cipso2", CIPSO_CONFIG);
switch(r) {
case -ENOENT:
r = write_rules("/sys/fs/smackfs/cipso2", CIPSO_CONFIG);
switch(r) {
case -ENOENT:
@@
-142,10
+158,16
@@
int smack_setup(void) {
return 0;
case 0:
log_info("Successfully loaded Smack/CIPSO policies.");
return 0;
case 0:
log_info("Successfully loaded Smack/CIPSO policies.");
-
return 0
;
+
break
;
default:
log_warning("Failed to load Smack/CIPSO access rules: %s, ignoring.",
strerror(abs(r)));
return 0;
}
default:
log_warning("Failed to load Smack/CIPSO access rules: %s, ignoring.",
strerror(abs(r)));
return 0;
}
+
+ *loaded_policy = true;
+
+#endif
+
+ return 0;
}
}