From 44656f538f69e8f8709ddb6ab285db29f65f62dd Mon Sep 17 00:00:00 2001 From: David Zeuthen Date: Wed, 13 Apr 2005 14:27:11 +0000 Subject: 2005-04-13 David Zeuthen * bus/selinux.c: Add c-file-style to top of file (log_audit_callback): Don't free the data here anymore (bus_selinux_check): Don't take spid and tpid since appending that to auxdata may OOM. (bus_selinux_allows_acquire_service): Handle OOM and signal back to the caller if we are OOM by taking an error object. (bus_selinux_allows_send): -do- * bus/selinux.h: Fix prototypes for bus_selinux_allows_acquire_service and bus_selinux_allows_send * bus/bus.c (bus_context_check_security_policy): Pass error and pass on OOM thrown by bus_selinux_allows_send() * bus/services.c (bus_registry_acquire_service): Pass error and pass on OOM thrown by bus_selinux_allows_acquire_service() --- bus/selinux.h | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) (limited to 'bus/selinux.h') diff --git a/bus/selinux.h b/bus/selinux.h index 3627126c..4424fa82 100644 --- a/bus/selinux.h +++ b/bus/selinux.h @@ -48,14 +48,17 @@ const char* bus_selinux_get_policy_root (void); dbus_bool_t bus_selinux_allows_acquire_service (DBusConnection *connection, BusSELinuxID *service_sid, - const char *service_name); + const char *service_name, + DBusError *error); + dbus_bool_t bus_selinux_allows_send (DBusConnection *sender, DBusConnection *proposed_recipient, const char *msgtype, /* Supplementary audit data */ const char *interface, const char *member, const char *error_name, - const char *destination); + const char *destination, + DBusError *error); BusSELinuxID* bus_selinux_init_connection_id (DBusConnection *connection, DBusError *error); -- cgit