Unverified Commit d25dcf18 by Christian Brauner Committed by GitHub

Merge pull request #2723 from 2xsec/bugfix

pam_cgfs: remove dependency & redundancy functions
parents 72da60a6 2f32e37e
......@@ -424,9 +424,7 @@ if HAVE_PAM
pam_LTLIBRARIES = pam_cgfs.la
pam_cgfs_la_SOURCES = pam/pam_cgfs.c \
caps.c caps.h \
file_utils.c file_utils.h \
log.c log.h \
macro.h \
string_utils.c string_utils.h
......
......@@ -84,12 +84,6 @@ static void free_string_list(char **clist)
free(clist);
}
/* Allocate a pointer, do not fail. */
static void *must_alloc(size_t sz)
{
return must_realloc(NULL, sz);
}
/* Given a pointer to a null-terminated array of pointers, realloc to add one
* entry, and point the new entry to NULL. Do not fail. Return the index to the
* second-to-last entry - that is, the one which is now available for use
......@@ -134,7 +128,7 @@ static char *cg_legacy_must_prefix_named(char *entry)
char *prefixed;
len = strlen(entry);
prefixed = must_alloc(len + 6);
prefixed = must_realloc(NULL, len + 6);
memcpy(prefixed, "name=", STRLITERALLEN("name="));
memcpy(prefixed + STRLITERALLEN("name="), entry, len);
......@@ -541,7 +535,7 @@ static bool copy_parent_file(char *path, char *file)
if (len <= 0)
goto on_error;
value = must_alloc(len + 1);
value = must_realloc(NULL, len + 1);
ret = lxc_read_from_file(fpath, value, len);
if (ret != len)
goto on_error;
......@@ -824,7 +818,7 @@ static struct hierarchy *add_hierarchy(struct hierarchy ***h, char **clist, char
struct hierarchy *new;
int newentry;
new = must_alloc(sizeof(*new));
new = must_realloc(NULL, sizeof(*new));
new->controllers = clist;
new->mountpoint = mountpoint;
new->container_base_path = container_base_path;
......@@ -863,7 +857,7 @@ static char *cg_hybrid_get_mountpoint(char *line)
*p2 = '\0';
len = strlen(p);
sret = must_alloc(len + 1);
sret = must_realloc(NULL, len + 1);
memcpy(sret, p, len);
sret[len] = '\0';
return sret;
......@@ -879,7 +873,7 @@ static char *copy_to_eol(char *p)
return NULL;
len = p2 - p;
sret = must_alloc(len + 1);
sret = must_realloc(NULL, len + 1);
memcpy(sret, p, len);
sret[len] = '\0';
return sret;
......@@ -1466,7 +1460,7 @@ __cgfsng_ops static inline bool cgfsng_payload_create(struct cgroup_ops *ops,
}
len = strlen(tmp) + 5; /* leave room for -NNN\0 */
container_cgroup = must_alloc(len);
container_cgroup = must_realloc(NULL, len);
(void)strlcpy(container_cgroup, tmp, len);
free(tmp);
offset = container_cgroup + len - 5;
......@@ -2110,7 +2104,7 @@ static int __cg_unified_attach(const struct hierarchy *h, const char *name,
len = strlen(base_path) + STRLITERALLEN("/lxc-1000") +
STRLITERALLEN("/cgroup-procs");
full_path = must_alloc(len + 1);
full_path = must_realloc(NULL, len + 1);
do {
if (idx)
ret = snprintf(full_path, len + 1, "%s/lxc-%d",
......
......@@ -30,12 +30,9 @@
#include "config.h"
#include "file_utils.h"
#include "log.h"
#include "macro.h"
#include "string.h"
lxc_log_define(file_utils, lxc);
int lxc_write_to_file(const char *filename, const void *buf, size_t count,
bool add_newline, mode_t mode)
{
......
......@@ -321,7 +321,7 @@ int setproctitle(char *title)
if (ret == 0)
(void)strlcpy((char*)arg_start, title, len);
else
SYSINFO("setting cmdline failed");
SYSWARN("Failed to set cmdline");
return ret;
}
......@@ -57,8 +57,9 @@
#include <unistd.h>
#include "config.h"
#include "file_utils.h"
#include "macro.h"
#include "utils.h"
#include "string_utils.h"
#define PAM_SM_SESSION
#include <security/_pam_macros.h>
......@@ -119,14 +120,12 @@ static inline bool is_set(unsigned bit, uint32_t *bitarr)
static bool is_lxcfs(const char *line);
static bool is_cgv1(char *line);
static bool is_cgv2(char *line);
static void *must_alloc(size_t sz);
static void must_add_to_list(char ***clist, char *entry);
static void must_append_controller(char **klist, char **nlist, char ***clist,
char *entry);
static void must_append_string(char ***list, char *entry);
static void mysyslog(int err, const char *format, ...) __attribute__((sentinel));
static char *read_file(char *fnam);
static int read_from_file(const char *filename, void* buf, size_t count);
static int recursive_rmdir(char *dirname);
static inline void set_bit(unsigned bit, uint32_t *bitarr)
{
......@@ -136,9 +135,6 @@ static bool string_in_list(char **list, const char *entry);
static char *string_join(const char *sep, const char **parts, bool use_as_prefix);
static void trim(char *s);
static bool write_int(char *path, int v);
static ssize_t write_nointr(int fd, const void* buf, size_t count);
static int write_to_file(const char *filename, const void *buf, size_t count,
bool add_newline);
/* cgroupfs prototypes. */
static bool cg_belongs_to_uid_gid(const char *path, uid_t uid, gid_t gid);
......@@ -392,12 +388,6 @@ static void trim(char *s)
s[--len] = '\0';
}
/* Allocate pointer; do not fail. */
static void *must_alloc(size_t sz)
{
return must_realloc(NULL, sz);
}
/* Make allocated copy of string. End of string is taken to be '\n'. */
static char *copy_to_eol(char *s)
{
......@@ -409,7 +399,7 @@ static char *copy_to_eol(char *s)
return NULL;
len = newline - s;
sret = must_alloc(len + 1);
sret = must_realloc(NULL, len + 1);
memcpy(sret, s, len);
sret[len] = '\0';
......@@ -607,7 +597,7 @@ static char *get_mountpoint(char *line)
*p2 = '\0';
len = strlen(p);
sret = must_alloc(len + 1);
sret = must_realloc(NULL, len + 1);
memcpy(sret, p, len);
sret[len] = '\0';
......@@ -779,7 +769,7 @@ static char *cgv1_must_prefix_named(char *entry)
size_t len;
len = strlen(entry);
s = must_alloc(len + 6);
s = must_realloc(NULL, len + 6);
ret = snprintf(s, len + 6, "name=%s", entry);
if (ret < 0 || (size_t)ret >= (len + 6)) {
......@@ -941,7 +931,7 @@ static void cgv1_add_controller(char **clist, char *mountpoint, char *base_cgrou
struct cgv1_hierarchy *new;
int newentry;
new = must_alloc(sizeof(*new));
new = must_realloc(NULL, sizeof(*new));
new->controllers = clist;
new->mountpoint = mountpoint;
......@@ -968,7 +958,7 @@ static void cgv2_add_controller(char **clist, char *mountpoint, char *base_cgrou
struct cgv2_hierarchy *new;
int newentry;
new = must_alloc(sizeof(*new));
new = must_realloc(NULL, sizeof(*new));
new->controllers = clist;
new->mountpoint = mountpoint;
......@@ -1738,49 +1728,6 @@ static ssize_t cg_get_max_cpus(char *cpulist)
return cpus;
}
static ssize_t write_nointr(int fd, const void* buf, size_t count)
{
ssize_t ret;
again:
ret = write(fd, buf, count);
if (ret < 0 && errno == EINTR)
goto again;
return ret;
}
static int write_to_file(const char *filename, const void* buf, size_t count, bool add_newline)
{
int fd, saved_errno;
ssize_t ret;
fd = open(filename, O_WRONLY | O_TRUNC | O_CREAT | O_CLOEXEC, 0666);
if (fd < 0)
return -1;
ret = write_nointr(fd, buf, count);
if (ret < 0)
goto out_error;
if ((size_t)ret != count)
goto out_error;
if (add_newline) {
ret = write_nointr(fd, "\n", 1);
if (ret != 1)
goto out_error;
}
close(fd);
return 0;
out_error:
saved_errno = errno;
close(fd);
errno = saved_errno;
return -1;
}
#define __ISOL_CPUS "/sys/devices/system/cpu/isolated"
static bool cg_filter_and_set_cpus(char *path, bool am_initialized)
{
......@@ -1905,7 +1852,7 @@ copy_parent:
free(fpath);
fpath = must_make_path(path, "cpuset.cpus", NULL);
ret = write_to_file(fpath, cpulist, strlen(cpulist), false);
ret = lxc_write_to_file(fpath, cpulist, strlen(cpulist), false, 0660);
if (ret < 0) {
pam_cgfs_debug("Could not write cpu list to: %s\n", fpath);
goto on_error;
......@@ -1929,37 +1876,6 @@ on_error:
return bret;
}
int read_from_file(const char *filename, void* buf, size_t count)
{
int fd = -1, saved_errno;
ssize_t ret;
fd = open(filename, O_RDONLY | O_CLOEXEC);
if (fd < 0)
return -1;
if (!buf || !count) {
char buf2[100];
size_t count2 = 0;
while ((ret = read(fd, buf2, 100)) > 0)
count2 += ret;
if (ret >= 0)
ret = count2;
} else {
memset(buf, 0, count);
ret = read(fd, buf, count);
}
if (ret < 0)
pam_cgfs_debug("read %s: %s", filename, strerror(errno));
saved_errno = errno;
close(fd);
errno = saved_errno;
return ret;
}
/* Copy contents of parent(@path)/@file to @path/@file */
static bool cg_copy_parent_file(char *path, char *file)
{
......@@ -1977,19 +1893,23 @@ static bool cg_copy_parent_file(char *path, char *file)
*lastslash = '\0';
fpath = must_make_path(path, file, NULL);
len = read_from_file(fpath, NULL, 0);
if (len <= 0)
len = lxc_read_from_file(fpath, NULL, 0);
if (len <= 0) {
pam_cgfs_debug("Failed to read %s: %s", fpath, strerror(errno));
goto bad;
}
value = must_alloc(len + 1);
if (read_from_file(fpath, value, len) != len)
value = must_realloc(NULL, len + 1);
if (lxc_read_from_file(fpath, value, len) != len) {
pam_cgfs_debug("Failed to read %s: %s", fpath, strerror(errno));
goto bad;
}
free(fpath);
*lastslash = oldv;
fpath = must_make_path(path, file, NULL);
ret = write_to_file(fpath, value, len, false);
ret = lxc_write_to_file(fpath, value, len, false, 0660);
if (ret < 0)
pam_cgfs_debug("Unable to write %s to %s", value, fpath);
......@@ -2018,8 +1938,8 @@ static bool cgv1_handle_root_cpuset_hierarchy(struct cgv1_hierarchy *h)
clonechildrenpath = must_make_path(h->mountpoint, "cgroup.clone_children", NULL);
if (read_from_file(clonechildrenpath, &v, 1) < 0) {
pam_cgfs_debug("Failed to read '%s'", clonechildrenpath);
if (lxc_read_from_file(clonechildrenpath, &v, 1) < 0) {
pam_cgfs_debug("Failed to read %s: %s", clonechildrenpath, strerror(errno));
free(clonechildrenpath);
return false;
}
......@@ -2029,7 +1949,7 @@ static bool cgv1_handle_root_cpuset_hierarchy(struct cgv1_hierarchy *h)
return true;
}
if (write_to_file(clonechildrenpath, "1", 1, false) < 0) {
if (lxc_write_to_file(clonechildrenpath, "1", 1, false, 0660) < 0) {
/* Set clone_children so children inherit our settings */
pam_cgfs_debug("Failed to write 1 to %s", clonechildrenpath);
free(clonechildrenpath);
......@@ -2077,8 +1997,8 @@ static bool cgv1_handle_cpuset_hierarchy(struct cgv1_hierarchy *h,
return true;
}
if (read_from_file(clonechildrenpath, &v, 1) < 0) {
pam_cgfs_debug("Failed to read '%s'", clonechildrenpath);
if (lxc_read_from_file(clonechildrenpath, &v, 1) < 0) {
pam_cgfs_debug("Failed to read %s: %s", clonechildrenpath, strerror(errno));
free(clonechildrenpath);
free(cgpath);
return false;
......@@ -2108,7 +2028,7 @@ static bool cgv1_handle_cpuset_hierarchy(struct cgv1_hierarchy *h,
}
free(cgpath);
if (write_to_file(clonechildrenpath, "1", 1, false) < 0) {
if (lxc_write_to_file(clonechildrenpath, "1", 1, false, 0660) < 0) {
/* Set clone_children so children inherit our settings */
pam_cgfs_debug("Failed to write 1 to %s", clonechildrenpath);
free(clonechildrenpath);
......
......@@ -29,6 +29,7 @@
#include <inttypes.h>
#include <libgen.h>
#include <pthread.h>
#include <stdarg.h>
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
......@@ -43,7 +44,6 @@
#include <unistd.h>
#include "config.h"
#include "log.h"
#include "lxclock.h"
#include "macro.h"
#include "namespace.h"
......@@ -58,8 +58,6 @@
#include "include/strlcat.h"
#endif
lxc_log_define(string_utils, lxc);
char **lxc_va_arg_list_to_argv(va_list ap, size_t skip, int do_strdup)
{
va_list ap2;
......
......@@ -83,13 +83,13 @@ static int _recursive_rmdir(const char *dirname, dev_t pdev,
{
struct dirent *direntp;
DIR *dir;
int ret, failed=0;
int ret, failed = 0;
char pathname[PATH_MAX];
bool hadexclude = false;
dir = opendir(dirname);
if (!dir) {
ERROR("failed to open %s", dirname);
ERROR("Failed to open \"%s\"", dirname);
return -1;
}
......@@ -103,7 +103,7 @@ static int _recursive_rmdir(const char *dirname, dev_t pdev,
rc = snprintf(pathname, PATH_MAX, "%s/%s", dirname, direntp->d_name);
if (rc < 0 || rc >= PATH_MAX) {
ERROR("pathname too long");
ERROR("The name of path is too long");
failed=1;
continue;
}
......@@ -113,26 +113,27 @@ static int _recursive_rmdir(const char *dirname, dev_t pdev,
if (ret < 0) {
switch(errno) {
case ENOTEMPTY:
INFO("Not deleting snapshot %s", pathname);
INFO("Not deleting snapshot \"%s\"", pathname);
hadexclude = true;
break;
case ENOTDIR:
ret = unlink(pathname);
if (ret)
INFO("Failed to remove %s", pathname);
INFO("Failed to remove \"%s\"", pathname);
break;
default:
SYSERROR("Failed to rmdir %s", pathname);
SYSERROR("Failed to rmdir \"%s\"", pathname);
failed = 1;
break;
}
}
continue;
}
ret = lstat(pathname, &mystat);
if (ret) {
ERROR("Failed to stat %s", pathname);
SYSERROR("Failed to stat \"%s\"", pathname);
failed = 1;
continue;
}
......@@ -141,7 +142,7 @@ static int _recursive_rmdir(const char *dirname, dev_t pdev,
/* TODO should we be checking /proc/self/mountinfo for
* pathname and not doing this if found? */
if (btrfs_try_remove_subvol(pathname))
INFO("Removed btrfs subvolume at %s\n", pathname);
INFO("Removed btrfs subvolume at \"%s\"", pathname);
continue;
}
......@@ -150,20 +151,20 @@ static int _recursive_rmdir(const char *dirname, dev_t pdev,
failed=1;
} else {
if (unlink(pathname) < 0) {
SYSERROR("Failed to delete %s", pathname);
SYSERROR("Failed to delete \"%s\"", pathname);
failed=1;
}
}
}
if (rmdir(dirname) < 0 && !btrfs_try_remove_subvol(dirname) && !hadexclude) {
ERROR("Failed to delete %s", dirname);
SYSERROR("Failed to delete \"%s\"", dirname);
failed=1;
}
ret = closedir(dir);
if (ret) {
ERROR("Failed to close directory %s", dirname);
SYSERROR("Failed to close directory \"%s\"", dirname);
failed=1;
}
......@@ -195,7 +196,7 @@ extern int lxc_rmdir_onedev(const char *path, const char *exclude)
if (errno == ENOENT)
return 0;
ERROR("Failed to stat %s", path);
SYSERROR("Failed to stat \"%s\"", path);
return -1;
}
......@@ -225,6 +226,7 @@ int mkdir_p(const char *dir, mode_t mode)
{
const char *tmp = dir;
const char *orig = dir;
do {
int ret;
char *makeme;
......@@ -243,8 +245,8 @@ int mkdir_p(const char *dir, mode_t mode)
free(makeme);
return -1;
}
free(makeme);
free(makeme);
} while (tmp != dir);
return 0;
......@@ -270,10 +272,10 @@ char *get_rundir()
return rundir;
}
INFO("XDG_RUNTIME_DIR isn't set in the environment.");
INFO("XDG_RUNTIME_DIR isn't set in the environment");
homedir = getenv("HOME");
if (!homedir) {
ERROR("HOME isn't set in the environment.");
ERROR("HOME isn't set in the environment");
return NULL;
}
......@@ -349,24 +351,24 @@ int sha1sum_file(char *fnam, unsigned char *digest)
f = fopen_cloexec(fnam, "r");
if (!f) {
SYSERROR("Error opening template");
SYSERROR("Failed to open template \"%s\"", fnam);
return -1;
}
if (fseek(f, 0, SEEK_END) < 0) {
SYSERROR("Error seeking to end of template");
SYSERROR("Failed to seek to end of template");
fclose(f);
return -1;
}
if ((flen = ftell(f)) < 0) {
SYSERROR("Error telling size of template");
SYSERROR("Failed to tell size of template");
fclose(f);
return -1;
}
if (fseek(f, 0, SEEK_SET) < 0) {
SYSERROR("Error seeking to start of template");
SYSERROR("Failed to seek to start of template");
fclose(f);
return -1;
}
......@@ -378,14 +380,14 @@ int sha1sum_file(char *fnam, unsigned char *digest)
}
if (fread(buf, 1, flen, f) != flen) {
SYSERROR("Failure reading template");
SYSERROR("Failed to read template");
free(buf);
fclose(f);
return -1;
}
if (fclose(f) < 0) {
SYSERROR("Failre closing template");
SYSERROR("Failed to close template");
free(buf);
return -1;
}
......@@ -513,17 +515,17 @@ int lxc_pclose(struct lxc_popen_FILE *fp)
int randseed(bool srand_it)
{
FILE *f;
/*
srand pre-seed function based on /dev/urandom
*/
* srand pre-seed function based on /dev/urandom
*/
unsigned int seed = time(NULL) + getpid();
FILE *f;
f = fopen("/dev/urandom", "r");
if (f) {
int ret = fread(&seed, sizeof(seed), 1, f);
if (ret != 1)
SYSDEBUG("unable to fread /dev/urandom, fallback to time+pid rand seed");
SYSDEBUG("Unable to fread /dev/urandom, fallback to time+pid rand seed");
fclose(f);
}
......@@ -539,9 +541,13 @@ uid_t get_ns_uid(uid_t orig)
char *line = NULL;
size_t sz = 0;
uid_t nsid, hostid, range;
FILE *f = fopen("/proc/self/uid_map", "r");
if (!f)
FILE *f;
f = fopen("/proc/self/uid_map", "r");
if (!f) {
SYSERROR("Failed to open uid_map");
return 0;
}
while (getline(&line, &sz, f) != -1) {
if (sscanf(line, "%u %u %u", &nsid, &hostid, &range) != 3)
......@@ -566,9 +572,13 @@ gid_t get_ns_gid(gid_t orig)
char *line = NULL;
size_t sz = 0;
gid_t nsid, hostid, range;
FILE *f = fopen("/proc/self/gid_map", "r");
if (!f)
FILE *f;
f = fopen("/proc/self/gid_map", "r");
if (!f) {
SYSERROR("Failed to open gid_map");
return 0;
}
while (getline(&line, &sz, f) != -1) {
if (sscanf(line, "%u %u %u", &nsid, &hostid, &range) != 3)
......@@ -610,8 +620,7 @@ uint64_t fnv_64a_buf(void *buf, size_t len, uint64_t hval)
{
unsigned char *bp;
for(bp = buf; bp < (unsigned char *)buf + len; bp++)
{
for(bp = buf; bp < (unsigned char *)buf + len; bp++) {
/* xor the bottom with the current octet */
hval ^= (uint64_t)*bp;
......@@ -672,6 +681,7 @@ int detect_shared_rootfs(void)
{
if (is_shared_mountpoint("/"))
return 1;
return 0;
}
......@@ -687,13 +697,13 @@ bool switch_to_ns(pid_t pid, const char *ns)
fd = open(nspath, O_RDONLY);
if (fd < 0) {
SYSERROR("Failed to open %s", nspath);
SYSERROR("Failed to open \"%s\"", nspath);
return false;
}
ret = setns(fd, 0);
if (ret) {
SYSERROR("Failed to set process %d to %s of %d.", pid, ns, fd);
SYSERROR("Failed to set process %d to \"%s\" of %d.", pid, ns, fd);
close(fd);
return false;
}
......@@ -718,8 +728,10 @@ bool detect_ramfs_rootfs(void)
int i;
f = fopen("/proc/self/mountinfo", "r");
if (!f)
if (!f) {
SYSERROR("Failed to open mountinfo");
return false;
}
while (getline(&line, &len, f) != -1) {
for (p = line, i = 0; p && i < 4; i++)
......@@ -806,10 +818,9 @@ char *choose_init(const char *rootfs)
retv = on_path("init.lxc", rootfs);
if (env_set) {
if (env_set)
if (unsetenv("PATH"))
SYSERROR("Failed to unsetenv");
}
if (retv)
return retv;
......@@ -825,7 +836,7 @@ char *choose_init(const char *rootfs)
ret = snprintf(retv, PATH_MAX, "%s/%s/%s", tmp, SBINDIR, "/init.lxc");
if (ret < 0 || ret >= PATH_MAX) {
ERROR("pathname too long");
ERROR("The name of path is too long");
goto out1;
}
......@@ -834,7 +845,7 @@ char *choose_init(const char *rootfs)
ret = snprintf(retv, PATH_MAX, "%s/%s/%s", tmp, LXCINITDIR, "/lxc/lxc-init");
if (ret < 0 || ret >= PATH_MAX) {
ERROR("pathname too long");
ERROR("The name of path is too long");
goto out1;
}
......@@ -843,7 +854,7 @@ char *choose_init(const char *rootfs)
ret = snprintf(retv, PATH_MAX, "%s/usr/lib/lxc/lxc-init", tmp);
if (ret < 0 || ret >= PATH_MAX) {
ERROR("pathname too long");
ERROR("The name of path is too long");
goto out1;
}
......@@ -852,7 +863,7 @@ char *choose_init(const char *rootfs)
ret = snprintf(retv, PATH_MAX, "%s/sbin/lxc-init", tmp);
if (ret < 0 || ret >= PATH_MAX) {
ERROR("pathname too long");
ERROR("The name of path is too long");
goto out1;
}
......@@ -941,6 +952,7 @@ static char *get_nextpath(char *path, int *offsetp, int fulllen)
offset++;
*offsetp = offset;
return (offset < fulllen) ? &path[offset] : NULL;
}
......@@ -1038,7 +1050,7 @@ static int open_if_safe(int dirfd, const char *nextpath)
static int open_without_symlink(const char *target, const char *prefix_skip)
{
int curlen = 0, dirfd, fulllen, i;
char *dup = NULL;
char *dup;
fulllen = strlen(target);
......@@ -1046,8 +1058,8 @@ static int open_without_symlink(const char *target, const char *prefix_skip)
if (prefix_skip && strlen(prefix_skip) > 0) {
curlen = strlen(prefix_skip);
if (!is_subdir(target, prefix_skip, curlen)) {
ERROR("WHOA there - target '%s' didn't start with prefix '%s'",
target, prefix_skip);
ERROR("WHOA there - target \"%s\" didn't start with prefix \"%s\"",
target, prefix_skip);
return -EINVAL;
}
......@@ -1065,7 +1077,7 @@ static int open_without_symlink(const char *target, const char *prefix_skip)
/* Make a copy of target which we can hack up, and tokenize it */
if ((dup = strdup(target)) == NULL) {
SYSERROR("Out of memory checking for symbolic link");
ERROR("Out of memory checking for symbolic link");
return -ENOMEM;
}
......@@ -1075,8 +1087,10 @@ static int open_without_symlink(const char *target, const char *prefix_skip)
}
dirfd = open(prefix_skip, O_RDONLY);
if (dirfd < 0)
if (dirfd < 0) {
SYSERROR("Failed to open path \"%s\"", prefix_skip);
goto out;
}
while (1) {
int newfd, saved_errno;
......@@ -1126,7 +1140,7 @@ int safe_mount(const char *src, const char *dest, const char *fstype,
/* todo - allow symlinks for relative paths if 'allowsymlinks' option is passed */
if (flags & MS_BIND && src && src[0] != '/') {
INFO("this is a relative bind mount");
INFO("This is a relative bind mount");
srcfd = open_without_symlink(src, NULL);
if (srcfd < 0)
......@@ -1170,7 +1184,7 @@ int safe_mount(const char *src, const char *dest, const char *fstype,
close(destfd);
if (ret < 0) {
errno = saved_errno;
SYSERROR("Failed to mount %s onto %s", src ? src : "(null)", dest);
SYSERROR("Failed to mount \"%s\" onto \"%s\"", src ? src : "(null)", dest);
return ret;
}
......@@ -1191,13 +1205,13 @@ int safe_mount(const char *src, const char *dest, const char *fstype,
*/
int lxc_mount_proc_if_needed(const char *rootfs)
{
char path[PATH_MAX];
char path[PATH_MAX] = {0};
int link_to_pid, linklen, mypid, ret;
char link[INTTYPE_TO_STRLEN(pid_t)] = {0};
ret = snprintf(path, PATH_MAX, "%s/proc/self", rootfs);
if (ret < 0 || ret >= PATH_MAX) {
SYSERROR("proc path name too long");
SYSERROR("The name of proc path is too long");
return -1;
}
......@@ -1205,7 +1219,7 @@ int lxc_mount_proc_if_needed(const char *rootfs)
ret = snprintf(path, PATH_MAX, "%s/proc", rootfs);
if (ret < 0 || ret >= PATH_MAX) {
SYSERROR("proc path name too long");
SYSERROR("The name of proc path is too long");
return -1;
}
......@@ -1217,7 +1231,7 @@ int lxc_mount_proc_if_needed(const char *rootfs)
goto domount;
} else if (linklen >= sizeof(link)) {
link[linklen - 1] = '\0';
ERROR("readlink returned truncated content: \"%s\"", link);
ERROR("Readlink returned truncated content: \"%s\"", link);
return -1;
}
......@@ -1233,7 +1247,7 @@ int lxc_mount_proc_if_needed(const char *rootfs)
ret = umount2(path, MNT_DETACH);
if (ret < 0)
WARN("failed to umount \"%s\" with MNT_DETACH", path);
SYSWARN("Failed to umount \"%s\" with MNT_DETACH", path);
domount:
/* rootfs is NULL */
......@@ -1244,14 +1258,13 @@ domount:
if (ret < 0)
return -1;
INFO("mounted /proc in container for security transition");
INFO("Mounted /proc in container for security transition");
return 1;
}
int open_devnull(void)
{
int fd = open("/dev/null", O_RDWR);
if (fd < 0)
SYSERROR("Can't open /dev/null");
......@@ -1300,7 +1313,7 @@ int null_stdfds(void)
bool task_blocks_signal(pid_t pid, int signal)
{
int ret;
char status[__PROC_STATUS_LEN];
char status[__PROC_STATUS_LEN] = {0};
FILE *f;
uint64_t sigblk = 0, one = 1;
size_t n = 0;
......@@ -1405,8 +1418,10 @@ static int lxc_get_unused_loop_dev_legacy(char *loop_name)
int dfd = -1, fd = -1, ret = -1;
dir = opendir("/dev");
if (!dir)
if (!dir) {
SYSERROR("Failed to open \"/dev\"");
return -1;
}
while ((dp = readdir(dir))) {
if (strncmp(dp->d_name, "loop", 4) != 0)
......@@ -1454,12 +1469,16 @@ static int lxc_get_unused_loop_dev(char *name_loop)
int fd_ctl = -1, fd_tmp = -1;
fd_ctl = open("/dev/loop-control", O_RDWR | O_CLOEXEC);
if (fd_ctl < 0)
if (fd_ctl < 0) {
SYSERROR("Failed to open loop control");
return -ENODEV;
}
loop_nr = ioctl(fd_ctl, LOOP_CTL_GET_FREE);
if (loop_nr < 0)
if (loop_nr < 0) {
SYSERROR("Failed to get loop control");
goto on_error;
}
ret = snprintf(name_loop, LO_NAME_SIZE, "/dev/loop%d", loop_nr);
if (ret < 0 || ret >= LO_NAME_SIZE)
......@@ -1467,7 +1486,7 @@ static int lxc_get_unused_loop_dev(char *name_loop)
fd_tmp = open(name_loop, O_RDWR | O_CLOEXEC);
if (fd_tmp < 0)
goto on_error;
SYSERROR("Failed to open loop \"%s\"", name_loop);
on_error:
close(fd_ctl);
......@@ -1482,26 +1501,34 @@ int lxc_prepare_loop_dev(const char *source, char *loop_dev, int flags)
fd_loop = lxc_get_unused_loop_dev(loop_dev);
if (fd_loop < 0) {
if (fd_loop == -ENODEV)
fd_loop = lxc_get_unused_loop_dev_legacy(loop_dev);
else
if (fd_loop != -ENODEV)
goto on_error;
fd_loop = lxc_get_unused_loop_dev_legacy(loop_dev);
if (fd_loop < 0)
goto on_error;
}
fd_img = open(source, O_RDWR | O_CLOEXEC);
if (fd_img < 0)
if (fd_img < 0) {
SYSERROR("Failed to open source \"%s\"", source);
goto on_error;
}
ret = ioctl(fd_loop, LOOP_SET_FD, fd_img);
if (ret < 0)
if (ret < 0) {
SYSERROR("Failed to set loop fd");
goto on_error;
}
memset(&lo64, 0, sizeof(lo64));
lo64.lo_flags = flags;
ret = ioctl(fd_loop, LOOP_SET_STATUS64, &lo64);
if (ret < 0)
if (ret < 0) {
SYSERROR("Failed to set loop status64");
goto on_error;
}
fret = 0;
......@@ -1560,7 +1587,7 @@ int run_command(char *buf, size_t buf_size, int (*child_fn)(void *), void *args)
buf[0] = '\0';
if (pipe(pipefd) < 0) {
SYSERROR("failed to create pipe");
SYSERROR("Failed to create pipe");
return -1;
}
......@@ -1568,7 +1595,7 @@ int run_command(char *buf, size_t buf_size, int (*child_fn)(void *), void *args)
if (child < 0) {
close(pipefd[0]);
close(pipefd[1]);
SYSERROR("failed to create new process");
SYSERROR("Failed to create new process");
return -1;
}
......@@ -1587,13 +1614,13 @@ int run_command(char *buf, size_t buf_size, int (*child_fn)(void *), void *args)
close(pipefd[1]);
if (ret < 0) {
SYSERROR("failed to duplicate std{err,out} file descriptor");
SYSERROR("Failed to duplicate std{err,out} file descriptor");
_exit(EXIT_FAILURE);
}
/* Does not return. */
child_fn(args);
ERROR("failed to exec command");
ERROR("Failed to exec command");
_exit(EXIT_FAILURE);
}
......@@ -1668,10 +1695,8 @@ int lxc_set_death_signal(int signal, pid_t parent)
return -1;
}
if (ret < 0) {
SYSERROR("Failed to set PR_SET_PDEATHSIG to %d", signal);
if (ret < 0)
return -1;
}
return 0;
}
......@@ -1706,8 +1731,10 @@ int recursive_destroy(char *dirname)
int r = 0;
dir = opendir(dirname);
if (!dir)
if (!dir) {
SYSERROR("Failed to open dir \"%s\"", dirname);
return -1;
}
while ((direntp = readdir(dir))) {
char *pathname;
......@@ -1722,7 +1749,7 @@ int recursive_destroy(char *dirname)
ret = lstat(pathname, &mystat);
if (ret < 0) {
if (!r)
WARN("Failed to stat \"%s\"", pathname);
SYSWARN("Failed to stat \"%s\"", pathname);
r = -1;
goto next;
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment