diff options
Diffstat (limited to 'selinux')
-rw-r--r-- | selinux/chcon.c | 4 | ||||
-rw-r--r-- | selinux/getenforce.c | 4 | ||||
-rw-r--r-- | selinux/getsebool.c | 2 | ||||
-rw-r--r-- | selinux/load_policy.c | 2 | ||||
-rw-r--r-- | selinux/runcon.c | 6 | ||||
-rw-r--r-- | selinux/sestatus.c | 2 | ||||
-rw-r--r-- | selinux/setenforce.c | 2 | ||||
-rw-r--r-- | selinux/setfiles.c | 2 | ||||
-rw-r--r-- | selinux/setsebool.c | 2 |
9 files changed, 13 insertions, 13 deletions
diff --git a/selinux/chcon.c b/selinux/chcon.c index 5bf91710c..afe7f713d 100644 --- a/selinux/chcon.c +++ b/selinux/chcon.c | |||
@@ -107,7 +107,7 @@ static int FAST_FUNC change_filedir_context( | |||
107 | 107 | ||
108 | context_string = context_str(context); | 108 | context_string = context_str(context); |
109 | if (!context_string) { | 109 | if (!context_string) { |
110 | bb_error_msg("can't obtain security context in text expression"); | 110 | bb_simple_error_msg("can't obtain security context in text expression"); |
111 | goto skip; | 111 | goto skip; |
112 | } | 112 | } |
113 | 113 | ||
@@ -194,7 +194,7 @@ int chcon_main(int argc UNUSED_PARAM, char **argv) | |||
194 | /* specified_context is never NULL - | 194 | /* specified_context is never NULL - |
195 | * "-1" in opt_complementary prevents this. */ | 195 | * "-1" in opt_complementary prevents this. */ |
196 | if (!argv[0]) | 196 | if (!argv[0]) |
197 | bb_error_msg_and_die("too few arguments"); | 197 | bb_simple_error_msg_and_die("too few arguments"); |
198 | } | 198 | } |
199 | 199 | ||
200 | for (i = 0; (fname = argv[i]) != NULL; i++) { | 200 | for (i = 0; (fname = argv[i]) != NULL; i++) { |
diff --git a/selinux/getenforce.c b/selinux/getenforce.c index 0286dd0be..f082ba614 100644 --- a/selinux/getenforce.c +++ b/selinux/getenforce.c | |||
@@ -29,12 +29,12 @@ int getenforce_main(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) | |||
29 | 29 | ||
30 | rc = is_selinux_enabled(); | 30 | rc = is_selinux_enabled(); |
31 | if (rc < 0) | 31 | if (rc < 0) |
32 | bb_error_msg_and_die("is_selinux_enabled() failed"); | 32 | bb_simple_error_msg_and_die("is_selinux_enabled() failed"); |
33 | 33 | ||
34 | if (rc == 1) { | 34 | if (rc == 1) { |
35 | rc = security_getenforce(); | 35 | rc = security_getenforce(); |
36 | if (rc < 0) | 36 | if (rc < 0) |
37 | bb_error_msg_and_die("getenforce() failed"); | 37 | bb_simple_error_msg_and_die("getenforce() failed"); |
38 | 38 | ||
39 | if (rc) | 39 | if (rc) |
40 | puts("Enforcing"); | 40 | puts("Enforcing"); |
diff --git a/selinux/getsebool.c b/selinux/getsebool.c index 6d7805c8d..36ddd45b9 100644 --- a/selinux/getsebool.c +++ b/selinux/getsebool.c | |||
@@ -40,7 +40,7 @@ int getsebool_main(int argc, char **argv) | |||
40 | 40 | ||
41 | rc = security_get_boolean_names(&names, &len); | 41 | rc = security_get_boolean_names(&names, &len); |
42 | if (rc) | 42 | if (rc) |
43 | bb_perror_msg_and_die("can't get boolean names"); | 43 | bb_simple_perror_msg_and_die("can't get boolean names"); |
44 | 44 | ||
45 | if (!len) { | 45 | if (!len) { |
46 | puts("No booleans"); | 46 | puts("No booleans"); |
diff --git a/selinux/load_policy.c b/selinux/load_policy.c index b7930839c..eac6ba6c1 100644 --- a/selinux/load_policy.c +++ b/selinux/load_policy.c | |||
@@ -31,7 +31,7 @@ int load_policy_main(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) | |||
31 | 31 | ||
32 | rc = selinux_mkload_policy(1); | 32 | rc = selinux_mkload_policy(1); |
33 | if (rc < 0) { | 33 | if (rc < 0) { |
34 | bb_perror_msg_and_die("can't load policy"); | 34 | bb_simple_perror_msg_and_die("can't load policy"); |
35 | } | 35 | } |
36 | 36 | ||
37 | return 0; | 37 | return 0; |
diff --git a/selinux/runcon.c b/selinux/runcon.c index a5a394427..bc4fa23e0 100644 --- a/selinux/runcon.c +++ b/selinux/runcon.c | |||
@@ -65,7 +65,7 @@ static context_t runcon_compute_new_context(char *user, char *role, char *type, | |||
65 | security_context_t cur_context; | 65 | security_context_t cur_context; |
66 | 66 | ||
67 | if (getcon(&cur_context)) | 67 | if (getcon(&cur_context)) |
68 | bb_error_msg_and_die("can't get current context"); | 68 | bb_simple_error_msg_and_die("can't get current context"); |
69 | 69 | ||
70 | if (compute_trans) { | 70 | if (compute_trans) { |
71 | security_context_t file_context, new_context; | 71 | security_context_t file_context, new_context; |
@@ -75,7 +75,7 @@ static context_t runcon_compute_new_context(char *user, char *role, char *type, | |||
75 | command); | 75 | command); |
76 | if (security_compute_create(cur_context, file_context, | 76 | if (security_compute_create(cur_context, file_context, |
77 | SECCLASS_PROCESS, &new_context)) | 77 | SECCLASS_PROCESS, &new_context)) |
78 | bb_error_msg_and_die("unable to compute a new context"); | 78 | bb_simple_error_msg_and_die("unable to compute a new context"); |
79 | cur_context = new_context; | 79 | cur_context = new_context; |
80 | } | 80 | } |
81 | 81 | ||
@@ -137,7 +137,7 @@ int runcon_main(int argc UNUSED_PARAM, char **argv) | |||
137 | if (!(opts & OPTS_CONTEXT_COMPONENT)) { | 137 | if (!(opts & OPTS_CONTEXT_COMPONENT)) { |
138 | context = *argv++; | 138 | context = *argv++; |
139 | if (!argv[0]) | 139 | if (!argv[0]) |
140 | bb_error_msg_and_die("no command given"); | 140 | bb_simple_error_msg_and_die("no command given"); |
141 | } | 141 | } |
142 | 142 | ||
143 | if (context) { | 143 | if (context) { |
diff --git a/selinux/sestatus.c b/selinux/sestatus.c index 6954aca70..098a4d189 100644 --- a/selinux/sestatus.c +++ b/selinux/sestatus.c | |||
@@ -216,5 +216,5 @@ int sestatus_main(int argc UNUSED_PARAM, char **argv) | |||
216 | return 0; | 216 | return 0; |
217 | 217 | ||
218 | error: | 218 | error: |
219 | bb_perror_msg_and_die("libselinux returns unknown state"); | 219 | bb_simple_perror_msg_and_die("libselinux returns unknown state"); |
220 | } | 220 | } |
diff --git a/selinux/setenforce.c b/selinux/setenforce.c index c28de6ec5..996034f8e 100644 --- a/selinux/setenforce.c +++ b/selinux/setenforce.c | |||
@@ -49,7 +49,7 @@ int setenforce_main(int argc UNUSED_PARAM, char **argv) | |||
49 | continue; | 49 | continue; |
50 | rc = security_setenforce(i & 1); | 50 | rc = security_setenforce(i & 1); |
51 | if (rc < 0) | 51 | if (rc < 0) |
52 | bb_perror_msg_and_die("setenforce() failed"); | 52 | bb_simple_perror_msg_and_die("setenforce() failed"); |
53 | return 0; | 53 | return 0; |
54 | } | 54 | } |
55 | 55 | ||
diff --git a/selinux/setfiles.c b/selinux/setfiles.c index 740eaf8fb..55bfb4d02 100644 --- a/selinux/setfiles.c +++ b/selinux/setfiles.c | |||
@@ -182,7 +182,7 @@ static void inc_err(void) | |||
182 | { | 182 | { |
183 | nerr++; | 183 | nerr++; |
184 | if (nerr > 9 && !FLAG_d_debug) { | 184 | if (nerr > 9 && !FLAG_d_debug) { |
185 | bb_error_msg_and_die("exiting after 10 errors"); | 185 | bb_simple_error_msg_and_die("exiting after 10 errors"); |
186 | } | 186 | } |
187 | } | 187 | } |
188 | 188 | ||
diff --git a/selinux/setsebool.c b/selinux/setsebool.c index 579118172..2af23acd7 100644 --- a/selinux/setsebool.c +++ b/selinux/setsebool.c | |||
@@ -46,7 +46,7 @@ int setsebool_main(int argc, char **argv) | |||
46 | } | 46 | } |
47 | 47 | ||
48 | if (security_set_boolean(argv[1], value) < 0) | 48 | if (security_set_boolean(argv[1], value) < 0) |
49 | bb_error_msg_and_die("can't set boolean"); | 49 | bb_simple_error_msg_and_die("can't set boolean"); |
50 | 50 | ||
51 | return 0; | 51 | return 0; |
52 | } | 52 | } |