int r = 0;
#ifdef HAVE_SELINUX
- security_context_t mycon = NULL, fcon = NULL;
+ _cleanup_security_context_free_ security_context_t mycon = NULL, fcon = NULL;
security_class_t sclass;
if (!mac_selinux_use()) {
fail:
if (r < 0 && security_getenforce() == 1)
r = -errno;
-
- freecon(mycon);
- freecon(fcon);
#endif
return r;
int r = 0;
#ifdef HAVE_SELINUX
- security_context_t filecon = NULL;
+ _cleanup_security_context_free_ security_context_t filecon = NULL;
if (!mac_selinux_use() || !label_hnd)
return 0;
log_error("Failed to set SELinux file context on %s: %m", path);
r = -errno;
}
-
- freecon(filecon);
}
if (r < 0 && security_getenforce() == 0)
#ifdef HAVE_SELINUX
/* Creates a directory and labels it according to the SELinux policy */
- security_context_t fcon = NULL;
+ _cleanup_security_context_free_ security_context_t fcon = NULL;
if (!label_hnd)
return 0;
finish:
setfscreatecon(NULL);
- freecon(fcon);
#endif
return r;
/* Binds a socket and label its file system object according to the SELinux policy */
#ifdef HAVE_SELINUX
- security_context_t fcon = NULL;
+ _cleanup_security_context_free_ security_context_t fcon = NULL;
const struct sockaddr_un *un;
char *path;
int r;
finish:
setfscreatecon(NULL);
- freecon(fcon);
-
return r;
skipped: