diff options
| author | Bernhard Reutner-Fischer <rep.dot.nop@gmail.com> | 2008-05-19 09:29:47 +0000 |
|---|---|---|
| committer | Bernhard Reutner-Fischer <rep.dot.nop@gmail.com> | 2008-05-19 09:29:47 +0000 |
| commit | 636a1f85e89432601c59cdc3239fc867b4adf051 (patch) | |
| tree | d43c9ca120c29bf2d4567b1bb0674c6a8bae2b6d /init | |
| parent | cb83abd7b6b052224c1f3b998e863aac76914afd (diff) | |
| download | busybox-w32-636a1f85e89432601c59cdc3239fc867b4adf051.tar.gz busybox-w32-636a1f85e89432601c59cdc3239fc867b4adf051.tar.bz2 busybox-w32-636a1f85e89432601c59cdc3239fc867b4adf051.zip | |
- use EXIT_{SUCCESS,FAILURE}. No object-code changes
Diffstat (limited to 'init')
| -rw-r--r-- | init/init.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/init/init.c b/init/init.c index e2fde5f23..63154ce89 100644 --- a/init/init.c +++ b/init/init.c | |||
| @@ -301,7 +301,7 @@ static void open_stdio_to_tty(const char* tty_name, int exit_on_failure) | |||
| 301 | message(L_LOG | L_CONSOLE, "Can't open %s: %s", | 301 | message(L_LOG | L_CONSOLE, "Can't open %s: %s", |
| 302 | tty_name, strerror(errno)); | 302 | tty_name, strerror(errno)); |
| 303 | if (exit_on_failure) | 303 | if (exit_on_failure) |
| 304 | _exit(1); | 304 | _exit(EXIT_FAILURE); |
| 305 | if (ENABLE_DEBUG_INIT) | 305 | if (ENABLE_DEBUG_INIT) |
| 306 | _exit(2); | 306 | _exit(2); |
| 307 | /* NB: we don't reach this if we were called after vfork. | 307 | /* NB: we don't reach this if we were called after vfork. |
| @@ -415,7 +415,7 @@ static pid_t run(const struct init_action *a) | |||
| 415 | pid = fork(); | 415 | pid = fork(); |
| 416 | if (pid < 0) { | 416 | if (pid < 0) { |
| 417 | message(L_LOG | L_CONSOLE, "Can't fork"); | 417 | message(L_LOG | L_CONSOLE, "Can't fork"); |
| 418 | _exit(1); | 418 | _exit(EXIT_FAILURE); |
| 419 | } | 419 | } |
| 420 | 420 | ||
| 421 | if (pid > 0) { | 421 | if (pid > 0) { |
| @@ -430,21 +430,21 @@ static pid_t run(const struct init_action *a) | |||
| 430 | waitfor(pid); | 430 | waitfor(pid); |
| 431 | /* See if stealing the controlling tty back is necessary */ | 431 | /* See if stealing the controlling tty back is necessary */ |
| 432 | if (tcgetpgrp(0) != getpid()) | 432 | if (tcgetpgrp(0) != getpid()) |
| 433 | _exit(0); | 433 | _exit(EXIT_SUCCESS); |
| 434 | 434 | ||
| 435 | /* Use a temporary process to steal the controlling tty. */ | 435 | /* Use a temporary process to steal the controlling tty. */ |
| 436 | pid = fork(); | 436 | pid = fork(); |
| 437 | if (pid < 0) { | 437 | if (pid < 0) { |
| 438 | message(L_LOG | L_CONSOLE, "Can't fork"); | 438 | message(L_LOG | L_CONSOLE, "Can't fork"); |
| 439 | _exit(1); | 439 | _exit(EXIT_FAILURE); |
| 440 | } | 440 | } |
| 441 | if (pid == 0) { | 441 | if (pid == 0) { |
| 442 | setsid(); | 442 | setsid(); |
| 443 | ioctl(0, TIOCSCTTY, 1); | 443 | ioctl(0, TIOCSCTTY, 1); |
| 444 | _exit(0); | 444 | _exit(EXIT_SUCCESS); |
| 445 | } | 445 | } |
| 446 | waitfor(pid); | 446 | waitfor(pid); |
| 447 | _exit(0); | 447 | _exit(EXIT_SUCCESS); |
| 448 | } | 448 | } |
| 449 | 449 | ||
| 450 | /* Child - fall though to actually execute things */ | 450 | /* Child - fall though to actually execute things */ |
| @@ -531,13 +531,13 @@ static void run_actions(int action_type) | |||
| 531 | static void init_reboot(unsigned long magic) | 531 | static void init_reboot(unsigned long magic) |
| 532 | { | 532 | { |
| 533 | pid_t pid; | 533 | pid_t pid; |
| 534 | /* We have to fork here, since the kernel calls do_exit(0) in | 534 | /* We have to fork here, since the kernel calls do_exit(EXIT_SUCCESS) in |
| 535 | * linux/kernel/sys.c, which can cause the machine to panic when | 535 | * linux/kernel/sys.c, which can cause the machine to panic when |
| 536 | * the init process is killed.... */ | 536 | * the init process is killed.... */ |
| 537 | pid = vfork(); | 537 | pid = vfork(); |
| 538 | if (pid == 0) { /* child */ | 538 | if (pid == 0) { /* child */ |
| 539 | reboot(magic); | 539 | reboot(magic); |
| 540 | _exit(0); | 540 | _exit(EXIT_SUCCESS); |
| 541 | } | 541 | } |
| 542 | waitfor(pid); | 542 | waitfor(pid); |
| 543 | } | 543 | } |
| @@ -821,7 +821,7 @@ static void reload_signal(int sig ATTRIBUTE_UNUSED) | |||
| 821 | kill(pid, SIGKILL); | 821 | kill(pid, SIGKILL); |
| 822 | } | 822 | } |
| 823 | } | 823 | } |
| 824 | _exit(0); | 824 | _exit(EXIT_SUCCESS); |
| 825 | } | 825 | } |
| 826 | #endif | 826 | #endif |
| 827 | } | 827 | } |
| @@ -936,7 +936,7 @@ int init_main(int argc ATTRIBUTE_UNUSED, char **argv) | |||
| 936 | /* SELinux in enforcing mode but load_policy failed */ | 936 | /* SELinux in enforcing mode but load_policy failed */ |
| 937 | message(L_CONSOLE, "Cannot load SELinux Policy. " | 937 | message(L_CONSOLE, "Cannot load SELinux Policy. " |
| 938 | "Machine is in enforcing mode. Halting now."); | 938 | "Machine is in enforcing mode. Halting now."); |
| 939 | exit(1); | 939 | exit(EXIT_FAILURE); |
| 940 | } | 940 | } |
| 941 | } | 941 | } |
| 942 | #endif /* CONFIG_SELINUX */ | 942 | #endif /* CONFIG_SELINUX */ |
