]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
uid-range: place 'ret' param at last
authorMike Yuan <me@yhndnzj.com>
Mon, 8 Apr 2024 11:38:29 +0000 (19:38 +0800)
committerMike Yuan <me@yhndnzj.com>
Mon, 8 Apr 2024 12:14:38 +0000 (20:14 +0800)
src/basic/uid-range.c
src/basic/uid-range.h
src/core/manager.c
src/libsystemd/sd-device/device-monitor.c
src/nsresourced/nsresourcework.c
src/test/test-uid-range.c
src/userdb/userdbctl.c

index 1f2e76aaa1470e3500ede0b71a87199e35d90a97..a7658811ece4d1b8bd8696b04b0b895730ef9f27 100644 (file)
@@ -205,7 +205,7 @@ int uid_map_read_one(FILE *f, uid_t *ret_base, uid_t *ret_shift, uid_t *ret_rang
         return 0;
 }
 
-int uid_range_load_userns(UIDRange **ret, const char *path, UIDRangeUsernsMode mode) {
+int uid_range_load_userns(const char *path, UIDRangeUsernsMode mode, UIDRange **ret) {
         _cleanup_(uid_range_freep) UIDRange *range = NULL;
         _cleanup_fclose_ FILE *f = NULL;
         int r;
@@ -216,9 +216,9 @@ int uid_range_load_userns(UIDRange **ret, const char *path, UIDRangeUsernsMode m
          *
          * To simplify things this will modify the passed array in case of later failure. */
 
-        assert(ret);
         assert(mode >= 0);
         assert(mode < _UID_RANGE_USERNS_MODE_MAX);
+        assert(ret);
 
         if (!path)
                 path = IN_SET(mode, UID_RANGE_USERNS_INSIDE, UID_RANGE_USERNS_OUTSIDE) ? "/proc/self/uid_map" : "/proc/self/gid_map";
@@ -318,7 +318,7 @@ int uid_range_load_userns_by_fd(int userns_fd, UIDRangeUsernsMode mode, UIDRange
                         pid,
                         IN_SET(mode, UID_RANGE_USERNS_INSIDE, UID_RANGE_USERNS_OUTSIDE) ? "uid_map" : "gid_map");
 
-        return uid_range_load_userns(ret, p, mode);
+        return uid_range_load_userns(p, mode, ret);
 }
 
 bool uid_range_overlaps(const UIDRange *range, uid_t start, uid_t nr) {
index 48dfebbf02beefcc14e340280f232e37ac1c595a..1f687b2713e1d6cefd4ecc064be83d2eef2ce793 100644 (file)
@@ -72,7 +72,7 @@ typedef enum UIDRangeUsernsMode {
         _UID_RANGE_USERNS_MODE_INVALID = -EINVAL,
 } UIDRangeUsernsMode;
 
-int uid_range_load_userns(UIDRange **ret, const char *path, UIDRangeUsernsMode mode);
+int uid_range_load_userns(const char *path, UIDRangeUsernsMode mode, UIDRange **ret);
 int uid_range_load_userns_by_fd(int userns_fd, UIDRangeUsernsMode mode, UIDRange **ret);
 
 bool uid_range_overlaps(const UIDRange *range, uid_t start, uid_t nr);
index b333be9afd8186e9f5d97544b82a36c702e5c91a..fe7dc19672ae899ca529a75fe7637cc6b04c8fb2 100644 (file)
@@ -4805,7 +4805,7 @@ static int short_uid_range(const char *path) {
         /* Taint systemd if we the UID range assigned to this environment doesn't at least cover 0…65534,
          * i.e. from root to nobody. */
 
-        r = uid_range_load_userns(&p, path, UID_RANGE_USERNS_INSIDE);
+        r = uid_range_load_userns(path, UID_RANGE_USERNS_INSIDE, &p);
         if (ERRNO_IS_NEG_NOT_SUPPORTED(r))
                 return false;
         if (r < 0)
index 408cd1758186de071c007c5f2ad2e7161be12073..a7ef03abac262001bf16de97a3352c91ba63f1d1 100644 (file)
@@ -473,7 +473,7 @@ static bool check_sender_uid(sd_device_monitor *m, uid_t uid) {
                 return true;
 
         if (!m->mapped_userns_uid_range) {
-                r = uid_range_load_userns(&m->mapped_userns_uid_range, NULL, UID_RANGE_USERNS_INSIDE);
+                r = uid_range_load_userns(/* path = */ NULL, UID_RANGE_USERNS_INSIDE, &m->mapped_userns_uid_range);
                 if (r < 0)
                         log_monitor_errno(m, r, "Failed to load UID ranges mapped to the current user namespace, ignoring: %m");
         }
index 9e68249ea81d16e9bcb4a500d722b26b1dee9e4e..6bd2fed06f43e642d2436e22545940d8a5537728 100644 (file)
@@ -453,7 +453,7 @@ static int allocate_now(
                 assert_not_reached();
         }
 
-        r = uid_range_load_userns(&valid_range, /* path= */ NULL, UID_RANGE_USERNS_INSIDE);
+        r = uid_range_load_userns(/* path= */ NULL, UID_RANGE_USERNS_INSIDE, &valid_range);
         if (r < 0)
                 return r;
 
index c31fb30e7ee756b28486503444e4c54b6697b00f..6041d084906423d73217924dd294c2beb33fcc89 100644 (file)
@@ -123,7 +123,7 @@ TEST(load_userns) {
         _cleanup_fclose_ FILE *f = NULL;
         int r;
 
-        r = uid_range_load_userns(&p, NULL, UID_RANGE_USERNS_INSIDE);
+        r = uid_range_load_userns(NULL, UID_RANGE_USERNS_INSIDE, &p);
         if (ERRNO_IS_NEG_NOT_SUPPORTED(r))
                 return;
 
@@ -146,7 +146,7 @@ TEST(load_userns) {
 
         p = uid_range_free(p);
 
-        assert_se(uid_range_load_userns(&p, fn, UID_RANGE_USERNS_INSIDE) >= 0);
+        assert_se(uid_range_load_userns(fn, UID_RANGE_USERNS_INSIDE, &p) >= 0);
 
         assert_se(uid_range_contains(p, 0));
         assert_se(uid_range_contains(p, 19));
index c16e44d6b64248f1c3d8c95a9e4d20e2aa732194..f98acce29ec3e938ee3d3426dee7f74b7d60755a 100644 (file)
@@ -428,7 +428,7 @@ static int display_user(int argc, char *argv[], void *userdata) {
                 _cleanup_(uid_range_freep) UIDRange *uid_range = NULL;
                 int boundary_lines, uid_map_lines;
 
-                r = uid_range_load_userns(&uid_range, "/proc/self/uid_map", UID_RANGE_USERNS_INSIDE);
+                r = uid_range_load_userns(/* path = */ NULL, UID_RANGE_USERNS_INSIDE, &uid_range);
                 if (r < 0)
                         log_debug_errno(r, "Failed to load /proc/self/uid_map, ignoring: %m");
 
@@ -731,7 +731,7 @@ static int display_group(int argc, char *argv[], void *userdata) {
                 _cleanup_(uid_range_freep) UIDRange *gid_range = NULL;
                 int boundary_lines, gid_map_lines;
 
-                r = uid_range_load_userns(&gid_range, "/proc/self/gid_map", UID_RANGE_USERNS_INSIDE);
+                r = uid_range_load_userns(/* path = */ NULL, GID_RANGE_USERNS_INSIDE, &gid_range);
                 if (r < 0)
                         log_debug_errno(r, "Failed to load /proc/self/gid_map, ignoring: %m");