aboutsummaryrefslogtreecommitdiff
path: root/selinux
diff options
context:
space:
mode:
Diffstat (limited to 'selinux')
-rw-r--r--selinux/chcon.c4
-rw-r--r--selinux/getenforce.c4
-rw-r--r--selinux/getsebool.c2
-rw-r--r--selinux/load_policy.c2
-rw-r--r--selinux/runcon.c6
-rw-r--r--selinux/sestatus.c2
-rw-r--r--selinux/setenforce.c2
-rw-r--r--selinux/setfiles.c2
-rw-r--r--selinux/setsebool.c2
9 files changed, 13 insertions, 13 deletions
diff --git a/selinux/chcon.c b/selinux/chcon.c
index 5bf91710c..afe7f713d 100644
--- a/selinux/chcon.c
+++ b/selinux/chcon.c
@@ -107,7 +107,7 @@ static int FAST_FUNC change_filedir_context(
107 107
108 context_string = context_str(context); 108 context_string = context_str(context);
109 if (!context_string) { 109 if (!context_string) {
110 bb_error_msg("can't obtain security context in text expression"); 110 bb_simple_error_msg("can't obtain security context in text expression");
111 goto skip; 111 goto skip;
112 } 112 }
113 113
@@ -194,7 +194,7 @@ int chcon_main(int argc UNUSED_PARAM, char **argv)
194 /* specified_context is never NULL - 194 /* specified_context is never NULL -
195 * "-1" in opt_complementary prevents this. */ 195 * "-1" in opt_complementary prevents this. */
196 if (!argv[0]) 196 if (!argv[0])
197 bb_error_msg_and_die("too few arguments"); 197 bb_simple_error_msg_and_die("too few arguments");
198 } 198 }
199 199
200 for (i = 0; (fname = argv[i]) != NULL; i++) { 200 for (i = 0; (fname = argv[i]) != NULL; i++) {
diff --git a/selinux/getenforce.c b/selinux/getenforce.c
index 0286dd0be..f082ba614 100644
--- a/selinux/getenforce.c
+++ b/selinux/getenforce.c
@@ -29,12 +29,12 @@ int getenforce_main(int argc UNUSED_PARAM, char **argv UNUSED_PARAM)
29 29
30 rc = is_selinux_enabled(); 30 rc = is_selinux_enabled();
31 if (rc < 0) 31 if (rc < 0)
32 bb_error_msg_and_die("is_selinux_enabled() failed"); 32 bb_simple_error_msg_and_die("is_selinux_enabled() failed");
33 33
34 if (rc == 1) { 34 if (rc == 1) {
35 rc = security_getenforce(); 35 rc = security_getenforce();
36 if (rc < 0) 36 if (rc < 0)
37 bb_error_msg_and_die("getenforce() failed"); 37 bb_simple_error_msg_and_die("getenforce() failed");
38 38
39 if (rc) 39 if (rc)
40 puts("Enforcing"); 40 puts("Enforcing");
diff --git a/selinux/getsebool.c b/selinux/getsebool.c
index 6d7805c8d..36ddd45b9 100644
--- a/selinux/getsebool.c
+++ b/selinux/getsebool.c
@@ -40,7 +40,7 @@ int getsebool_main(int argc, char **argv)
40 40
41 rc = security_get_boolean_names(&names, &len); 41 rc = security_get_boolean_names(&names, &len);
42 if (rc) 42 if (rc)
43 bb_perror_msg_and_die("can't get boolean names"); 43 bb_simple_perror_msg_and_die("can't get boolean names");
44 44
45 if (!len) { 45 if (!len) {
46 puts("No booleans"); 46 puts("No booleans");
diff --git a/selinux/load_policy.c b/selinux/load_policy.c
index b7930839c..eac6ba6c1 100644
--- a/selinux/load_policy.c
+++ b/selinux/load_policy.c
@@ -31,7 +31,7 @@ int load_policy_main(int argc UNUSED_PARAM, char **argv UNUSED_PARAM)
31 31
32 rc = selinux_mkload_policy(1); 32 rc = selinux_mkload_policy(1);
33 if (rc < 0) { 33 if (rc < 0) {
34 bb_perror_msg_and_die("can't load policy"); 34 bb_simple_perror_msg_and_die("can't load policy");
35 } 35 }
36 36
37 return 0; 37 return 0;
diff --git a/selinux/runcon.c b/selinux/runcon.c
index a5a394427..bc4fa23e0 100644
--- a/selinux/runcon.c
+++ b/selinux/runcon.c
@@ -65,7 +65,7 @@ static context_t runcon_compute_new_context(char *user, char *role, char *type,
65 security_context_t cur_context; 65 security_context_t cur_context;
66 66
67 if (getcon(&cur_context)) 67 if (getcon(&cur_context))
68 bb_error_msg_and_die("can't get current context"); 68 bb_simple_error_msg_and_die("can't get current context");
69 69
70 if (compute_trans) { 70 if (compute_trans) {
71 security_context_t file_context, new_context; 71 security_context_t file_context, new_context;
@@ -75,7 +75,7 @@ static context_t runcon_compute_new_context(char *user, char *role, char *type,
75 command); 75 command);
76 if (security_compute_create(cur_context, file_context, 76 if (security_compute_create(cur_context, file_context,
77 SECCLASS_PROCESS, &new_context)) 77 SECCLASS_PROCESS, &new_context))
78 bb_error_msg_and_die("unable to compute a new context"); 78 bb_simple_error_msg_and_die("unable to compute a new context");
79 cur_context = new_context; 79 cur_context = new_context;
80 } 80 }
81 81
@@ -137,7 +137,7 @@ int runcon_main(int argc UNUSED_PARAM, char **argv)
137 if (!(opts & OPTS_CONTEXT_COMPONENT)) { 137 if (!(opts & OPTS_CONTEXT_COMPONENT)) {
138 context = *argv++; 138 context = *argv++;
139 if (!argv[0]) 139 if (!argv[0])
140 bb_error_msg_and_die("no command given"); 140 bb_simple_error_msg_and_die("no command given");
141 } 141 }
142 142
143 if (context) { 143 if (context) {
diff --git a/selinux/sestatus.c b/selinux/sestatus.c
index 6954aca70..098a4d189 100644
--- a/selinux/sestatus.c
+++ b/selinux/sestatus.c
@@ -216,5 +216,5 @@ int sestatus_main(int argc UNUSED_PARAM, char **argv)
216 return 0; 216 return 0;
217 217
218 error: 218 error:
219 bb_perror_msg_and_die("libselinux returns unknown state"); 219 bb_simple_perror_msg_and_die("libselinux returns unknown state");
220} 220}
diff --git a/selinux/setenforce.c b/selinux/setenforce.c
index c28de6ec5..996034f8e 100644
--- a/selinux/setenforce.c
+++ b/selinux/setenforce.c
@@ -49,7 +49,7 @@ int setenforce_main(int argc UNUSED_PARAM, char **argv)
49 continue; 49 continue;
50 rc = security_setenforce(i & 1); 50 rc = security_setenforce(i & 1);
51 if (rc < 0) 51 if (rc < 0)
52 bb_perror_msg_and_die("setenforce() failed"); 52 bb_simple_perror_msg_and_die("setenforce() failed");
53 return 0; 53 return 0;
54 } 54 }
55 55
diff --git a/selinux/setfiles.c b/selinux/setfiles.c
index 740eaf8fb..55bfb4d02 100644
--- a/selinux/setfiles.c
+++ b/selinux/setfiles.c
@@ -182,7 +182,7 @@ static void inc_err(void)
182{ 182{
183 nerr++; 183 nerr++;
184 if (nerr > 9 && !FLAG_d_debug) { 184 if (nerr > 9 && !FLAG_d_debug) {
185 bb_error_msg_and_die("exiting after 10 errors"); 185 bb_simple_error_msg_and_die("exiting after 10 errors");
186 } 186 }
187} 187}
188 188
diff --git a/selinux/setsebool.c b/selinux/setsebool.c
index 579118172..2af23acd7 100644
--- a/selinux/setsebool.c
+++ b/selinux/setsebool.c
@@ -46,7 +46,7 @@ int setsebool_main(int argc, char **argv)
46 } 46 }
47 47
48 if (security_set_boolean(argv[1], value) < 0) 48 if (security_set_boolean(argv[1], value) < 0)
49 bb_error_msg_and_die("can't set boolean"); 49 bb_simple_error_msg_and_die("can't set boolean");
50 50
51 return 0; 51 return 0;
52} 52}