From db3f267c99411b10144998c6c1f1a6288d0191bc Mon Sep 17 00:00:00 2001 From: Elliott Hughes Date: Fri, 20 Mar 2015 09:45:18 -0700 Subject: Clean up property setting code. In particular, ensure that all property_set failures are reported. Change-Id: Iab94a28bcba2346868c0f39bcfe26e55a2c55562 --- init/builtins.cpp | 67 ++++++++++++++++++------------------------------------- 1 file changed, 22 insertions(+), 45 deletions(-) (limited to 'init/builtins.cpp') diff --git a/init/builtins.cpp b/init/builtins.cpp index 01217c1..e659cfa 100644 --- a/init/builtins.cpp +++ b/init/builtins.cpp @@ -14,31 +14,31 @@ * limitations under the License. */ -#include -#include +#include #include -#include -#include +#include #include -#include -#include -#include -#include -#include -#include #include +#include +#include #include #include #include +#include +#include #include +#include #include -#include -#include -#include #include #include +#include +#include +#include +#include +#include + #include "init.h" #include "keywords.h" #include "property_service.h" @@ -47,8 +47,6 @@ #include "util.h" #include "log.h" -#include - #define chmod DO_NOT_USE_CHMOD_USE_FCHMODAT_SYMLINK_NOFOLLOW int add_environment(const char *name, const char *value); @@ -674,41 +672,20 @@ int do_sysclktz(int nargs, char **args) } int do_verity_load_state(int nargs, char **args) { - if (nargs == 1) { - int mode = -1; - int rc = fs_mgr_load_verity_state(&mode); - - if (rc == 0 && mode == VERITY_MODE_LOGGING) { - action_for_each_trigger("verity-logging", action_add_queue_tail); - } - - return rc; + int mode = -1; + int rc = fs_mgr_load_verity_state(&mode); + if (rc == 0 && mode == VERITY_MODE_LOGGING) { + action_for_each_trigger("verity-logging", action_add_queue_tail); } - return -1; + return rc; } -static void verity_update_property(struct fstab_rec *fstab, - const char *mount_point, int status) { - char key[PROP_NAME_MAX]; - int ret; - - ret = snprintf(key, PROP_NAME_MAX, "partition.%s.verified", mount_point); - if (ret >= PROP_NAME_MAX) { - ERROR("Error setting verified property for %s: name too long\n", - mount_point); - return; - } - - ret = property_set(key, "1"); - if (ret < 0) - ERROR("Error setting verified property %s: %d\n", key, ret); +static void verity_update_property(fstab_rec *fstab, const char *mount_point, int status) { + property_set(android::base::StringPrintf("partition.%s.verified", mount_point).c_str(), "1"); } -int do_verity_update_state(int nargs, char **args) { - if (nargs == 1) { - return fs_mgr_update_verity_state(verity_update_property); - } - return -1; +int do_verity_update_state(int nargs, char** args) { + return fs_mgr_update_verity_state(verity_update_property); } int do_write(int nargs, char **args) -- cgit v1.1