[policycoreutils] - Report full errors on OSError on Sandbox
Daniel J Walsh
dwalsh at fedoraproject.org
Wed Feb 2 18:34:28 UTC 2011
commit 331e9ad06ddd41d58fada5dbab35476f45b827ba
Author: Dan Walsh <dwalsh at redhat.com>
Date: Wed Feb 2 13:34:22 2011 -0500
- Report full errors on OSError on Sandbox
policycoreutils-rhat.patch | 66 +++++++++++++++++++++++++++++++++++++++++--
policycoreutils.spec | 5 ++-
2 files changed, 66 insertions(+), 5 deletions(-)
---
diff --git a/policycoreutils-rhat.patch b/policycoreutils-rhat.patch
index 424cfbd..4c3c99d 100644
--- a/policycoreutils-rhat.patch
+++ b/policycoreutils-rhat.patch
@@ -1555,6 +1555,33 @@ index 0000000..c0caab2
+ if (master_wd == -1)
+ exitApp("Error watching config file.");
+}
+diff --git a/policycoreutils/run_init/open_init_pty.8 b/policycoreutils/run_init/open_init_pty.8
+index 540860a..10175dd 100644
+--- a/policycoreutils/run_init/open_init_pty.8
++++ b/policycoreutils/run_init/open_init_pty.8
+@@ -24,18 +24,18 @@
+ .\"
+ .TH OPEN_INIT_PTY "8" "January 2005" "Security Enhanced Linux" NSA
+ .SH NAME
+-open_init_pty \- run an program under a psuedo terminal
++open_init_pty \- run an program under a pseudo terminal
+ .SH SYNOPSIS
+ .B open_init_pty
+ \fISCRIPT\fR [[\fIARGS\fR]...]
+ .br
+ .SH DESCRIPTION
+ .PP
+-Run a program under a psuedo terminal. This is used by
++Run a program under a pseudo terminal. This is used by
+ .B run_init
+ to run actually run the program after setting up the proper
+-context. This program acquires a new Psuedo terminal, forks a child
+-process that binds to the psueado terminal, and then sits around and
++context. This program acquires a new Pseudo terminal, forks a child
++process that binds to the pseudo terminal, and then sits around and
+ connects the physical terminal it was invoked upon with the pseudo
+ terminal, passing keyboard input into to the child process, and passing the
+ output of the child process to the physical terminal.
diff --git a/policycoreutils/sandbox/Makefile b/policycoreutils/sandbox/Makefile
index ff0ee7c..0c8a085 100644
--- a/policycoreutils/sandbox/Makefile
@@ -1594,7 +1621,7 @@ index ff0ee7c..0c8a085 100644
test:
@python test_sandbox.py -v
diff --git a/policycoreutils/sandbox/sandbox b/policycoreutils/sandbox/sandbox
-index 48a26c2..224b9d1 100644
+index 48a26c2..d1037bd 100644
--- a/policycoreutils/sandbox/sandbox
+++ b/policycoreutils/sandbox/sandbox
@@ -1,5 +1,6 @@
@@ -1834,6 +1861,15 @@ index 48a26c2..224b9d1 100644
selinux.setexeccon(self.__execcon)
rc = subprocess.Popen(self.__cmds).wait()
+@@ -404,7 +447,7 @@ if __name__ == '__main__':
+ sandbox = Sandbox()
+ rc = sandbox.main()
+ except OSError, error:
+- error_exit(error.args[1])
++ error_exit(error)
+ except ValueError, error:
+ error_exit(error.args[0])
+ except KeyError, error:
diff --git a/policycoreutils/sandbox/sandbox.8 b/policycoreutils/sandbox/sandbox.8
index 1479364..73d33b3 100644
--- a/policycoreutils/sandbox/sandbox.8
@@ -2001,7 +2037,7 @@ index 8338203..e501b03 100644
break
diff --git a/policycoreutils/sandbox/seunshare.8 b/policycoreutils/sandbox/seunshare.8
new file mode 100644
-index 0000000..e7b8991
+index 0000000..67beca0
--- /dev/null
+++ b/policycoreutils/sandbox/seunshare.8
@@ -0,0 +1,37 @@
@@ -2023,7 +2059,7 @@ index 0000000..e7b8991
+Alternate homedir to be used by the application. Homedir must be owned by the user.
+.TP
+\fB\-t\ tmpdir
-+Use alternate tempory directory to mount on /tmp. tmpdir must be owned by the user.
++Use alternate temporary directory to mount on /tmp. tmpdir must be owned by the user.
+.TP
+\fB\-c cgroups\fR
+Use cgroups to control this copy of seunshare. Specify parameters in /etc/sysconfig/sandbox. Max memory usage and cpu usage are to be specified in percent. You can specify which CPUs to use by numbering them 0,1,2... etc.
@@ -4810,9 +4846,18 @@ index 1eb6a43..c8ea4bb 100644
.B \-v
show changes in file labels.
diff --git a/policycoreutils/setfiles/setfiles.8 b/policycoreutils/setfiles/setfiles.8
-index ac68b94..28f99d9 100644
+index ac68b94..7f700ca 100644
--- a/policycoreutils/setfiles/setfiles.8
+++ b/policycoreutils/setfiles/setfiles.8
+@@ -10,7 +10,7 @@ This manual page describes the
+ .BR setfiles
+ program.
+ .P
+-This program is primarily used to initialise the security context
++This program is primarily used to initialize the security context
+ database (extended attributes) on one or more filesystems. This
+ program is initially run as part of the SE Linux installation process.
+ .P
@@ -31,6 +31,9 @@ log changes in file labels to syslog.
.TP
.B \-n
@@ -4966,6 +5011,19 @@ index 8f4f663..b0a7e09 100644
}
}
+diff --git a/policycoreutils/setsebool/setsebool.8 b/policycoreutils/setsebool/setsebool.8
+index 4b13387..2b66bad 100644
+--- a/policycoreutils/setsebool/setsebool.8
++++ b/policycoreutils/setsebool/setsebool.8
+@@ -16,7 +16,7 @@ affected; the boot-time default settings
+ are not changed.
+
+ If the -P option is given, all pending values are written to
+-the policy file on disk. So they will be persistant across reboots.
++the policy file on disk. So they will be persistent across reboots.
+
+ .SH AUTHOR
+ This manual page was written by Dan Walsh <dwalsh at redhat.com>.
diff --git a/policycoreutils/setsebool/setsebool.c b/policycoreutils/setsebool/setsebool.c
index dc037dd..d6c041b 100644
--- a/policycoreutils/setsebool/setsebool.c
diff --git a/policycoreutils.spec b/policycoreutils.spec
index 7a99daf..72b03d0 100644
--- a/policycoreutils.spec
+++ b/policycoreutils.spec
@@ -7,7 +7,7 @@
Summary: SELinux policy core utilities
Name: policycoreutils
Version: 2.0.85
-Release: 8%{?dist}
+Release: 9%{?dist}
License: GPLv2
Group: System Environment/Base
# Based on git repository with tag 20101221
@@ -329,6 +329,9 @@ fi
exit 0
%changelog
+* Wed Feb 2 2011 Dan Walsh <dwalsh at redhat.com> 2.0.85-9
+- Report full errors on OSError on Sandbox
+
* Wed Jan 21 2011 Dan Walsh <dwalsh at redhat.com> 2.0.85-8
- Fix newrole hanlding of pcap
More information about the scm-commits
mailing list