From: brianjjones Date: Fri, 29 Mar 2013 19:20:28 +0000 (-0700) Subject: Check if SMACK is enabled, if not skip code so cookie creation doesn't fail X-Git-Tag: accepted/2.0/20130329.204003~1 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=f3bf30f7d322b2c0634aad8018a2cf65434e090e;p=profile%2Fivi%2Fsecurity-server.git Check if SMACK is enabled, if not skip code so cookie creation doesn't fail --- diff --git a/src/security-srv/server/security-server-cookie.c b/src/security-srv/server/security-server-cookie.c index 518134b..04dafbb 100644 --- a/src/security-srv/server/security-server-cookie.c +++ b/src/security-srv/server/security-server-cookie.c @@ -487,6 +487,7 @@ out_of_while: goto error; } +#ifdef SMACK_ENABLED /* Check SMACK label */ ret = smack_new_label_from_socket(sockfd, &smack_label); if (ret != 0) @@ -496,6 +497,7 @@ out_of_while: added = NULL; goto error; } +#endif added->path_len = strlen(cmdline); added->path = calloc(1, strlen(cmdline)); @@ -504,7 +506,9 @@ out_of_while: added->permission_len = perm_num; added->pid = pid; added->permissions = permissions; +#ifdef SMACK_ENABLED added->smack_label = smack_label; +#endif added->prev = current; current->next = added; added->next = NULL;