diff options
author | Aleksander Morgado <aleksander@aleksander.es> | 2014-12-30 13:50:16 +0100 |
---|---|---|
committer | Aleksander Morgado <aleksander@aleksander.es> | 2015-01-09 13:07:00 +0100 |
commit | 5ad9573a05abd86595e08063bad94915cf104766 (patch) | |
tree | eed494879024e73b89fd468e021d59caa3c35683 /src/mbim-proxy | |
parent | 967a815344dc05ec7c8e6ec2fb1ca2b853074a03 (diff) | |
download | libmbim-5ad9573a05abd86595e08063bad94915cf104766.tar.gz |
libmbim-glib,utils: avoid getpwnam() call if --enable-mbim-username not used
If --enable-mbim-username isn't explicitly used, we should just check for the
root user UID, without using getpwnam(). See e.g. these SELinux warnings:
SELinux is preventing /usr/bin/bash from read access on the file /etc/passwd.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that bash should be allowed read access on the passwd file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do allow this access for now by executing:
# grep mbim-proxy /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Diffstat (limited to 'src/mbim-proxy')
-rw-r--r-- | src/mbim-proxy/Makefile.am | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/mbim-proxy/Makefile.am b/src/mbim-proxy/Makefile.am index 1558fe5..33425e0 100644 --- a/src/mbim-proxy/Makefile.am +++ b/src/mbim-proxy/Makefile.am @@ -16,7 +16,7 @@ mbim_proxy_LDADD = \ $(top_builddir)/src/libmbim-glib/libmbim-glib.la #Install udev rules only if configured with --enable-mbim-username -if INSTALL_MBIM_UDEV_RULES +if MBIM_USERNAME_ENABLED udevrulesdir = $(UDEV_BASE_DIR)/rules.d udevrules_DATA = 76-mbim-proxy-device-ownership.rules endif |