Lines 424-433
Link Here
|
424 |
} |
424 |
} |
425 |
} |
425 |
} |
426 |
|
426 |
|
427 |
if (setexeccon(ucontext) < 0 || setkeycreatecon(ucontext) < 0) { |
427 |
if (setexeccon(ucontext) < 0) { |
428 |
if (security_getenforce() > 0) { |
428 |
if (security_getenforce() > 0) { |
429 |
if (asprintf |
429 |
if (asprintf |
430 |
(&msg, "Could not set exec or keycreate context to %s for user", |
430 |
(&msg, "Could not set exec context to %s for user", |
431 |
(char *) ucontext) >= 0) { |
431 |
(char *) ucontext) >= 0) { |
432 |
log_it(u->name, getpid(), "ERROR", msg, 0); |
432 |
log_it(u->name, getpid(), "ERROR", msg, 0); |
433 |
free(msg); |
433 |
free(msg); |
Lines 437-443
Link Here
|
437 |
else { |
437 |
else { |
438 |
if (asprintf |
438 |
if (asprintf |
439 |
(&msg, |
439 |
(&msg, |
440 |
"Could not set exec or keycreate context to %s for user," |
440 |
"Could not set exec context to %s for user," |
441 |
" but SELinux in permissive mode, continuing", |
441 |
" but SELinux in permissive mode, continuing", |
442 |
(char *) ucontext) >= 0) { |
442 |
(char *) ucontext) >= 0) { |
443 |
log_it(u->name, getpid(), "WARNING", msg, 0); |
443 |
log_it(u->name, getpid(), "WARNING", msg, 0); |