X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=elogind.git;a=blobdiff_plain;f=src%2Fjournal%2Fjournald-server.c;h=a4600e3315ecf145733c4a3493f46f2402120107;hp=eda5dcf7e956cfd9d53fec319f65b8b06a0ac729;hb=cf677ac1b7ae1e46c593d055df27f36528be548a;hpb=fc1d70af2101e16c9e6f3c5bfd5ab315ee9e6dae diff --git a/src/journal/journald-server.c b/src/journal/journald-server.c index eda5dcf7e..a4600e331 100644 --- a/src/journal/journald-server.c +++ b/src/journal/journald-server.c @@ -205,7 +205,7 @@ void server_fix_perms(Server *s, JournalFile *f, uid_t uid) { log_warning("Failed to fix access mode on %s, ignoring: %s", f->path, strerror(-r)); #ifdef HAVE_ACL - if (uid <= 0) + if (uid <= SYSTEM_UID_MAX) return; acl = acl_get_fd(f->fd); @@ -805,12 +805,11 @@ static void dispatch_message_real( /* Split up strictly by any UID */ journal_uid = realuid; else if (s->split_mode == SPLIT_LOGIN && realuid > 0 && owner_valid && owner > 0) - /* Split up by login UIDs, this avoids creation of - * individual journals for system UIDs. We do this - * only if the realuid is not root, in order not to - * accidentally leak privileged information to the - * user that is logged by a privileged process that is - * part of an unprivileged session.*/ + /* Split up by login UIDs. We do this only if the + * realuid is not root, in order not to accidentally + * leak privileged information to the user that is + * logged by a privileged process that is part of an + * unprivileged session.*/ journal_uid = owner; else journal_uid = 0;