Signed-off-by: zhongtao <zhongtao17@huawei.com> (cherry picked from commit 287b224ffae5e96750bd13f62b91e8ec09dfb4fa)
1691 lines
75 KiB
Diff
1691 lines
75 KiB
Diff
From e17bb2f5995d261790c453d81a453d25024450d1 Mon Sep 17 00:00:00 2001
|
|
From: zhongtao <zhongtao17@huawei.com>
|
|
Date: Mon, 13 May 2024 17:06:07 +1400
|
|
Subject: [PATCH 087/108] code improve
|
|
|
|
Signed-off-by: zhongtao <zhongtao17@huawei.com>
|
|
---
|
|
src/client/connect/protocol_type.c | 2 +-
|
|
src/cmd/isula/base/create.c | 3 +-
|
|
src/cmd/isula/inspect_format.c | 4 +-
|
|
src/cmd/isulad-shim/common.c | 2 +-
|
|
src/cmd/isulad-shim/main.c | 5 +-
|
|
src/cmd/isulad-shim/process.c | 18 +++----
|
|
src/daemon/common/cgroup/cgroup.c | 9 ++--
|
|
src/daemon/common/cgroup/cgroup.h | 9 ++--
|
|
src/daemon/common/cgroup/cgroup_common.h | 9 ++--
|
|
src/daemon/common/cgroup/cgroup_v1.c | 10 ++--
|
|
src/daemon/common/cgroup/cgroup_v2.c | 9 ++--
|
|
src/daemon/common/cri/cri_helpers.cc | 4 +-
|
|
src/daemon/common/cri/v1/v1_cri_helpers.cc | 11 ++--
|
|
src/daemon/common/sysinfo.c | 4 +-
|
|
src/daemon/config/isulad_config.c | 2 +-
|
|
.../cri/v1/cri_v1_runtime_runtime_service.cc | 5 +-
|
|
.../v1/v1_cri_container_manager_service.cc | 3 +-
|
|
.../v1/v1_cri_pod_sandbox_manager_service.cc | 8 +--
|
|
.../v1/v1_cri_pod_sandbox_manager_service.h | 6 ++-
|
|
.../cri/v1/v1_cri_runtime_service_impl.cc | 3 +-
|
|
.../cri/v1/v1_cri_runtime_service_impl.h | 3 +-
|
|
.../executor/container_cb/execution_create.c | 2 +-
|
|
src/daemon/mailbox/mailbox.c | 3 +-
|
|
src/daemon/mailbox/mailbox.h | 4 +-
|
|
src/daemon/mailbox/mailbox_message.c | 9 ++--
|
|
src/daemon/mailbox/mailbox_message.h | 4 +-
|
|
src/daemon/modules/api/container_api.h | 3 +-
|
|
src/daemon/modules/api/network_api.h | 2 +-
|
|
.../modules/container/supervisor/supervisor.c | 3 +-
|
|
.../device/cdi/behavior/cdi_container_edits.c | 46 ++++++++--------
|
|
.../modules/device/cdi/behavior/cdi_device.c | 16 +++---
|
|
.../modules/device/cdi/behavior/cdi_spec.c | 10 ++--
|
|
.../modules/device/cdi/behavior/cdi_spec.h | 2 +-
|
|
.../device/cdi/behavior/cdi_spec_dirs.c | 6 +--
|
|
.../device/cdi/behavior/cdi_spec_dirs.h | 2 +-
|
|
.../modules/device/cdi/behavior/cdi_version.c | 2 +-
|
|
.../device/cdi/behavior/parser/cdi_parser.c | 6 +--
|
|
src/daemon/modules/device/cdi/cdi_cache.c | 22 ++++----
|
|
src/daemon/modules/device/cdi/cdi_cache.h | 6 +--
|
|
src/daemon/modules/device/cdi_operate.c | 8 +--
|
|
src/daemon/modules/image/oci/oci_image.c | 3 +-
|
|
src/daemon/modules/image/oci/progress.h | 2 +-
|
|
.../modules/image/oci/registry/registry.c | 3 +-
|
|
.../cni_operator/libcni/invoke/libcni_exec.h | 2 +-
|
|
src/daemon/modules/network/cri/adaptor_cri.c | 2 +-
|
|
src/daemon/modules/network/cri/adaptor_cri.h | 4 +-
|
|
.../modules/runtime/engines/lcr/lcr_rt_ops.c | 6 ++-
|
|
.../modules/runtime/isula/isula_rt_ops.c | 9 ++--
|
|
.../modules/service/service_container.c | 5 +-
|
|
src/daemon/modules/spec/specs.c | 52 ++++++++++---------
|
|
src/daemon/modules/spec/specs_mount.c | 4 +-
|
|
src/utils/cutils/blocking_queue.c | 3 +-
|
|
src/utils/cutils/network_namespace.h | 4 +-
|
|
src/utils/cutils/utils_array.c | 12 ++---
|
|
src/utils/cutils/utils_port.h | 2 +-
|
|
src/utils/cutils/utils_verify.c | 4 +-
|
|
src/utils/progress/show.h | 8 +--
|
|
src/utils/tar/isulad_tar.c | 2 +-
|
|
test/cgroup/cpu/cgroup_cpu_ut.cc | 2 +-
|
|
59 files changed, 223 insertions(+), 191 deletions(-)
|
|
|
|
diff --git a/src/client/connect/protocol_type.c b/src/client/connect/protocol_type.c
|
|
index 4d530aea..57dcf753 100644
|
|
--- a/src/client/connect/protocol_type.c
|
|
+++ b/src/client/connect/protocol_type.c
|
|
@@ -72,7 +72,7 @@ int isula_filters_last_parse_args(size_t last_n, struct isula_filters **flt)
|
|
goto cleanup;
|
|
}
|
|
|
|
- ret = snprintf(value, VALUE_SIZE, "%ld", last_n);
|
|
+ ret = snprintf(value, VALUE_SIZE, "%lu", last_n);
|
|
if (ret < 0 || ret >= VALUE_SIZE) {
|
|
ret = -1;
|
|
ERROR("Sprintf lastest n containers args failed");
|
|
diff --git a/src/cmd/isula/base/create.c b/src/cmd/isula/base/create.c
|
|
index b8e3667e..543b8fd6 100644
|
|
--- a/src/cmd/isula/base/create.c
|
|
+++ b/src/cmd/isula/base/create.c
|
|
@@ -932,7 +932,8 @@ inline static int request_pack_host_device_cgroup_rules(const struct client_argu
|
|
|
|
inline static int request_pack_host_blockio(const struct client_arguments *args, isula_host_config_t *hostconfig)
|
|
{
|
|
- return (request_pack_host_weight_devices(args, hostconfig) != 0 || request_pack_host_device_read_bps(args, hostconfig) != 0 ||
|
|
+ return (request_pack_host_weight_devices(args, hostconfig) != 0 ||
|
|
+ request_pack_host_device_read_bps(args, hostconfig) != 0 ||
|
|
request_pack_host_device_write_bps(args, hostconfig) != 0 ||
|
|
request_pack_host_device_read_iops(args, hostconfig) != 0 ||
|
|
request_pack_host_device_write_iops(args, hostconfig) != 0);
|
|
diff --git a/src/cmd/isula/inspect_format.c b/src/cmd/isula/inspect_format.c
|
|
index 36e8a31c..1fd67924 100644
|
|
--- a/src/cmd/isula/inspect_format.c
|
|
+++ b/src/cmd/isula/inspect_format.c
|
|
@@ -26,12 +26,12 @@
|
|
|
|
#define PRINTF_TAB_LEN 4
|
|
#define TOP_LEVEL_OBJ 0x10
|
|
-#define IS_TOP_LEVEL_OBJ(value) ((value)&TOP_LEVEL_OBJ)
|
|
+#define IS_TOP_LEVEL_OBJ(value) ((value) & TOP_LEVEL_OBJ)
|
|
|
|
#define LAST_ELEMENT_BIT 0x0F
|
|
#define NOT_LAST_ELEMENT 0x00
|
|
#define LAST_ELEMENT 0x01
|
|
-#define IS_LAST_ELEMENT(value) (LAST_ELEMENT == ((value)&LAST_ELEMENT_BIT))
|
|
+#define IS_LAST_ELEMENT(value) (LAST_ELEMENT == ((value) & LAST_ELEMENT_BIT))
|
|
|
|
#define YAJL_TYPEOF(json) ((json)->type)
|
|
|
|
diff --git a/src/cmd/isulad-shim/common.c b/src/cmd/isulad-shim/common.c
|
|
index a288c170..799da3c2 100644
|
|
--- a/src/cmd/isulad-shim/common.c
|
|
+++ b/src/cmd/isulad-shim/common.c
|
|
@@ -40,7 +40,7 @@
|
|
static __thread char *g_shim_errmsg = NULL;
|
|
|
|
// currently, log_to_stderr is only modified in the main process
|
|
-// and there is no need to set a thread-local variable.
|
|
+// and there is no need to set a thread-local variable.
|
|
// if it can be modified by multiple threads in the future,
|
|
// this variable needs to be set as a thread-local variable.
|
|
static bool log_to_stderr = false;
|
|
diff --git a/src/cmd/isulad-shim/main.c b/src/cmd/isulad-shim/main.c
|
|
index 54876d44..9061e568 100644
|
|
--- a/src/cmd/isulad-shim/main.c
|
|
+++ b/src/cmd/isulad-shim/main.c
|
|
@@ -103,7 +103,7 @@ int main(int argc, char **argv)
|
|
engine_log_path = getenv(SHIIM_LOG_PATH_ENV);
|
|
if (engine_log_path == NULL) {
|
|
dprintf(STDERR_FILENO, "empty SHIIM_LOG_PATH_ENV");
|
|
- _exit(EXIT_FAILURE);
|
|
+ _exit(EXIT_FAILURE);
|
|
}
|
|
|
|
log_level = getenv(SHIIM_LOG_LEVEL_ENV);
|
|
@@ -149,7 +149,8 @@ int main(int argc, char **argv)
|
|
|
|
// If isulad-shim is a child process of the isulad process,
|
|
// print the log to stderr so that isulad can obtain the exit information of isulad-shim.
|
|
- set_log_to_stderr((p->state->exec) && (p->state->isulad_stdin != NULL || p->state->isulad_stdout != NULL || p->state->isulad_stderr != NULL));
|
|
+ set_log_to_stderr((p->state->exec) && (p->state->isulad_stdin != NULL || p->state->isulad_stdout != NULL ||
|
|
+ p->state->isulad_stderr != NULL));
|
|
|
|
/*
|
|
* Open exit pipe
|
|
diff --git a/src/cmd/isulad-shim/process.c b/src/cmd/isulad-shim/process.c
|
|
index 6b5f8f7f..18fae03f 100644
|
|
--- a/src/cmd/isulad-shim/process.c
|
|
+++ b/src/cmd/isulad-shim/process.c
|
|
@@ -199,7 +199,7 @@ static int add_attach_terminal_fifos(const char *in, const char *out, const char
|
|
struct isula_linked_list *node = NULL;
|
|
|
|
bool invalid = (in != NULL && !fifo_exists(in)) || (out != NULL && !fifo_exists(out)) || (err != NULL &&
|
|
- !fifo_exists(err));
|
|
+ !fifo_exists(err));
|
|
if (invalid) {
|
|
ERROR("File %s or %s or %s does not refer to a FIFO", in, out, err);
|
|
return -1;
|
|
@@ -371,7 +371,7 @@ static int stdout_cb(int fd, uint32_t events, void *cbdata, isula_epoll_descr_t
|
|
(void)memset(p->buf, 0, DEFAULT_IO_COPY_BUF);
|
|
|
|
r_count = isula_file_read_nointr(fd, p->buf, DEFAULT_IO_COPY_BUF);
|
|
- if (r_count <= 0 ) {
|
|
+ if (r_count <= 0) {
|
|
isula_epoll_remove_handler(descr, fd);
|
|
// fd cannot be closed here, which will cause the container process to exit abnormally
|
|
// due to terminal fd receiving the sighup signal.
|
|
@@ -417,7 +417,7 @@ static int stderr_cb(int fd, uint32_t events, void *cbdata, isula_epoll_descr_t
|
|
(void)memset(p->buf, 0, DEFAULT_IO_COPY_BUF);
|
|
|
|
r_count = isula_file_read_nointr(fd, p->buf, DEFAULT_IO_COPY_BUF);
|
|
- if (r_count <= 0 ) {
|
|
+ if (r_count <= 0) {
|
|
isula_epoll_remove_handler(descr, fd);
|
|
// fd cannot be closed here, which will cause the container process to exit abnormally
|
|
// due to terminal fd receiving the sighup signal.
|
|
@@ -563,7 +563,7 @@ static int attach_cb(int fd, uint32_t events, void *cbdata, isula_epoll_descr_t
|
|
// limit the number of attach connections to MAX_ATTACH_NUM
|
|
if (isula_linked_list_len(p->attach_fifos) >= MAX_ATTACH_NUM) {
|
|
ERROR("The number of attach connections exceeds the limit:%d, and this connection is rejected.",
|
|
- MAX_ATTACH_NUM);
|
|
+ MAX_ATTACH_NUM);
|
|
goto out;
|
|
}
|
|
|
|
@@ -934,8 +934,8 @@ static void *io_epoll_loop(void *data)
|
|
|
|
(void)sem_post(&p->sem_mainloop);
|
|
|
|
- // th frist epoll_loop will exit in the following scenarios:
|
|
- // 1. Receive sync fd event
|
|
+ // th frist epoll_loop will exit in the following scenarios:
|
|
+ // 1. Receive sync fd event
|
|
// 2. stdin fd receive EPOLLHUP event
|
|
// 3. stdin fd read failed
|
|
ret = isula_epoll_loop(&descr, -1);
|
|
@@ -945,8 +945,8 @@ static void *io_epoll_loop(void *data)
|
|
error_exit(EXIT_FAILURE);
|
|
}
|
|
|
|
- // use a timeout epoll loop to ensure complete data reception
|
|
- // th second epoll_loop will exit in the following scenarios:
|
|
+ // use a timeout epoll loop to ensure complete data reception
|
|
+ // th second epoll_loop will exit in the following scenarios:
|
|
// 1. both stdout fd and stderr fd failed to read
|
|
// 2. no event received within 100 milliseconds
|
|
ret = isula_epoll_loop(&descr, 100);
|
|
@@ -1408,7 +1408,7 @@ static void exec_runtime_process(process_t *p, int exec_fd)
|
|
// the standard streams of the child process are set to /dev/null to prevent incorrect information acquisition.
|
|
if (isula_null_stdfds() != 0) {
|
|
(void)dprintf(exec_fd, "failed to set std console to /dev/null");
|
|
- exit(EXIT_FAILURE);
|
|
+ exit(EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
diff --git a/src/daemon/common/cgroup/cgroup.c b/src/daemon/common/cgroup/cgroup.c
|
|
index 007dbb70..71bf9801 100644
|
|
--- a/src/daemon/common/cgroup/cgroup.c
|
|
+++ b/src/daemon/common/cgroup/cgroup.c
|
|
@@ -82,9 +82,9 @@ int common_get_cgroup_version(void)
|
|
}
|
|
|
|
int common_get_cgroup_info(cgroup_mem_info_t *meminfo, cgroup_cpu_info_t *cpuinfo,
|
|
- cgroup_hugetlb_info_t *hugetlbinfo, cgroup_blkio_info_t *blkioinfo,
|
|
- cgroup_cpuset_info_t *cpusetinfo, cgroup_pids_info_t *pidsinfo,
|
|
- cgroup_files_info_t *filesinfo, bool quiet)
|
|
+ cgroup_hugetlb_info_t *hugetlbinfo, cgroup_blkio_info_t *blkioinfo,
|
|
+ cgroup_cpuset_info_t *cpusetinfo, cgroup_pids_info_t *pidsinfo,
|
|
+ cgroup_files_info_t *filesinfo, bool quiet)
|
|
{
|
|
if (g_cgroup_ops.get_cgroup_info == NULL) {
|
|
ERROR("Unimplemented get_cgroup_info ops");
|
|
@@ -197,7 +197,8 @@ char *common_convert_cgroup_path(const char *cgroup_path)
|
|
return util_strdup_s(result);
|
|
}
|
|
|
|
-cgroup_oom_handler_info_t *common_get_cgroup_oom_handler(int fd, const char *name, const char *cgroup_path, const char *exit_fifo)
|
|
+cgroup_oom_handler_info_t *common_get_cgroup_oom_handler(int fd, const char *name, const char *cgroup_path,
|
|
+ const char *exit_fifo)
|
|
{
|
|
if (g_cgroup_ops.get_cgroup_oom_handler == NULL) {
|
|
ERROR("Unimplmented get_cgroup_oom_handler op");
|
|
diff --git a/src/daemon/common/cgroup/cgroup.h b/src/daemon/common/cgroup/cgroup.h
|
|
index 8c76d99d..0bbb70a0 100644
|
|
--- a/src/daemon/common/cgroup/cgroup.h
|
|
+++ b/src/daemon/common/cgroup/cgroup.h
|
|
@@ -31,9 +31,9 @@ int cgroup_ops_init(void);
|
|
|
|
int common_get_cgroup_version(void);
|
|
int common_get_cgroup_info(cgroup_mem_info_t *meminfo, cgroup_cpu_info_t *cpuinfo,
|
|
- cgroup_hugetlb_info_t *hugetlbinfo, cgroup_blkio_info_t *blkioinfo,
|
|
- cgroup_cpuset_info_t *cpusetinfo, cgroup_pids_info_t *pidsinfo,
|
|
- cgroup_files_info_t *filesinfo, bool quiet);
|
|
+ cgroup_hugetlb_info_t *hugetlbinfo, cgroup_blkio_info_t *blkioinfo,
|
|
+ cgroup_cpuset_info_t *cpusetinfo, cgroup_pids_info_t *pidsinfo,
|
|
+ cgroup_files_info_t *filesinfo, bool quiet);
|
|
int common_get_cgroup_metrics(const char *cgroup_path, cgroup_metrics_t *cgroup_metrics);
|
|
int common_get_cgroup_mnt_and_root_path(const char *subsystem, char **mountpoint, char **root);
|
|
|
|
@@ -43,7 +43,8 @@ char *common_get_own_cgroup_path(const char *subsystem);
|
|
|
|
char *common_convert_cgroup_path(const char *cgroup_path);
|
|
|
|
-cgroup_oom_handler_info_t *common_get_cgroup_oom_handler(int fd, const char *name, const char *cgroup_path, const char *exit_fifo);
|
|
+cgroup_oom_handler_info_t *common_get_cgroup_oom_handler(int fd, const char *name, const char *cgroup_path,
|
|
+ const char *exit_fifo);
|
|
void common_free_cgroup_oom_handler_info(cgroup_oom_handler_info_t *info);
|
|
|
|
#ifdef __cplusplus
|
|
diff --git a/src/daemon/common/cgroup/cgroup_common.h b/src/daemon/common/cgroup/cgroup_common.h
|
|
index e3912bf0..46a7de50 100644
|
|
--- a/src/daemon/common/cgroup/cgroup_common.h
|
|
+++ b/src/daemon/common/cgroup/cgroup_common.h
|
|
@@ -130,9 +130,9 @@ typedef struct _cgroup_oom_handler_info_t {
|
|
typedef struct {
|
|
int (*get_cgroup_version)(void);
|
|
int (*get_cgroup_info)(cgroup_mem_info_t *meminfo, cgroup_cpu_info_t *cpuinfo,
|
|
- cgroup_hugetlb_info_t *hugetlbinfo, cgroup_blkio_info_t *blkioinfo,
|
|
- cgroup_cpuset_info_t *cpusetinfo, cgroup_pids_info_t *pidsinfo,
|
|
- cgroup_files_info_t *filesinfo, bool quiet);
|
|
+ cgroup_hugetlb_info_t *hugetlbinfo, cgroup_blkio_info_t *blkioinfo,
|
|
+ cgroup_cpuset_info_t *cpusetinfo, cgroup_pids_info_t *pidsinfo,
|
|
+ cgroup_files_info_t *filesinfo, bool quiet);
|
|
int (*get_cgroup_metrics)(const char *cgroup_path, cgroup_metrics_t *cgroup_metrics);
|
|
|
|
int (*get_cgroup_mnt_and_root_path)(const char *subsystem, char **mountpoint, char **root);
|
|
@@ -140,7 +140,8 @@ typedef struct {
|
|
char *(*get_init_cgroup_path)(const char *subsystem);
|
|
char *(*get_own_cgroup_path)(const char *subsystem);
|
|
|
|
- cgroup_oom_handler_info_t *(*get_cgroup_oom_handler)(int fd, const char *name, const char *cgroup_path, const char *exit_fifo);
|
|
+ cgroup_oom_handler_info_t *(*get_cgroup_oom_handler)(int fd, const char *name, const char *cgroup_path,
|
|
+ const char *exit_fifo);
|
|
} cgroup_ops;
|
|
|
|
#ifdef __cplusplus
|
|
diff --git a/src/daemon/common/cgroup/cgroup_v1.c b/src/daemon/common/cgroup/cgroup_v1.c
|
|
index 41f3110a..45b1d096 100644
|
|
--- a/src/daemon/common/cgroup/cgroup_v1.c
|
|
+++ b/src/daemon/common/cgroup/cgroup_v1.c
|
|
@@ -772,7 +772,8 @@ static void get_cgroup_v1_blkio_info(const cgroup_layer_t *layers, const bool qu
|
|
blkioinfo->blkio_write_iops_device = check_cgroup_v1_file_exists(mountpoint, BLKIO_WRITE_IOPS, quiet);
|
|
}
|
|
|
|
-static void get_cgroup_v1_hugetlb_info(const cgroup_layer_t *layers, const bool quiet, cgroup_hugetlb_info_t *hugetlbinfo)
|
|
+static void get_cgroup_v1_hugetlb_info(const cgroup_layer_t *layers, const bool quiet,
|
|
+ cgroup_hugetlb_info_t *hugetlbinfo)
|
|
{
|
|
int nret;
|
|
char *mountpoint = NULL;
|
|
@@ -1038,8 +1039,8 @@ static char *common_get_cgroup_path(const char *path, const char *subsystem)
|
|
|
|
for (i = 0; i < util_array_len((const char **)nlist); i++) {
|
|
const char *prefix = "name=";
|
|
- bool find_sub = (strcmp(nlist[i], subsystem) == 0 || (strncmp(nlist[i], prefix, strlen(prefix)) == 0
|
|
- && strcmp(nlist[i]+strlen(prefix), subsystem) == 0));
|
|
+ bool find_sub = (strcmp(nlist[i], subsystem) == 0 || (strncmp(nlist[i], prefix, strlen(prefix)) == 0 &&
|
|
+ strcmp(nlist[i] + strlen(prefix), subsystem) == 0));
|
|
if (find_sub) {
|
|
res = util_strdup_s(plist[i]);
|
|
break;
|
|
@@ -1135,7 +1136,8 @@ static char *get_memory_cgroup_path_v1(const char *cgroup_path)
|
|
return util_path_join(fpath, converted_cgroup_path);
|
|
}
|
|
|
|
-static cgroup_oom_handler_info_t *get_cgroup_oom_handler_v1(int fd, const char *name, const char *cgroup_path, const char *exit_fifo)
|
|
+static cgroup_oom_handler_info_t *get_cgroup_oom_handler_v1(int fd, const char *name, const char *cgroup_path,
|
|
+ const char *exit_fifo)
|
|
{
|
|
__isula_auto_free char *memory_cgroup_path = NULL;
|
|
__isula_auto_free char *memory_cgroup_oom_control_path = NULL;
|
|
diff --git a/src/daemon/common/cgroup/cgroup_v2.c b/src/daemon/common/cgroup/cgroup_v2.c
|
|
index a36258f0..76754dc1 100644
|
|
--- a/src/daemon/common/cgroup/cgroup_v2.c
|
|
+++ b/src/daemon/common/cgroup/cgroup_v2.c
|
|
@@ -387,7 +387,7 @@ static int get_cgroup_info_v2(cgroup_mem_info_t *meminfo, cgroup_cpu_info_t *cpu
|
|
if (ret != 0) {
|
|
return ret;
|
|
}
|
|
-
|
|
+
|
|
get_cgroup_v2_pids_info(quiet, pidsinfo);
|
|
get_cgroup_v2_files_info(quiet, filesinfo);
|
|
|
|
@@ -433,7 +433,7 @@ static bool oom_cb_cgroup_v2(int fd, void *cbdata)
|
|
return CGROUP_OOM_HANDLE_CLOSE;
|
|
}
|
|
|
|
- if (((struct inotify_event *)events)->mask & ( IN_DELETE | IN_DELETE_SELF)) {
|
|
+ if (((struct inotify_event *)events)->mask & (IN_DELETE | IN_DELETE_SELF)) {
|
|
return CGROUP_OOM_HANDLE_CLOSE;
|
|
}
|
|
|
|
@@ -450,7 +450,7 @@ static bool oom_cb_cgroup_v2(int fd, void *cbdata)
|
|
int count;
|
|
const char *oom_str = "oom ";
|
|
const char *oom_kill_str = "oom_kill ";
|
|
- const int oom_len = strlen(oom_str), oom_kill_len = strlen(oom_kill_str);
|
|
+ const size_t oom_len = strlen(oom_str), oom_kill_len = strlen(oom_kill_str);
|
|
|
|
if (read >= oom_kill_len + 2 && memcmp(line, oom_kill_str, oom_kill_len) == 0) {
|
|
len = oom_kill_len;
|
|
@@ -492,7 +492,8 @@ static char *get_real_cgroup_path_v2(const char *cgroup_path)
|
|
return util_path_join(CGROUP_MOUNTPOINT, converted_cgroup_path);
|
|
}
|
|
|
|
-cgroup_oom_handler_info_t *get_cgroup_oom_handler_v2(int fd, const char *name, const char *cgroup_path, const char *exit_fifo)
|
|
+cgroup_oom_handler_info_t *get_cgroup_oom_handler_v2(int fd, const char *name, const char *cgroup_path,
|
|
+ const char *exit_fifo)
|
|
{
|
|
__isula_auto_free char *real_cgroup_path = NULL;
|
|
if (name == NULL || cgroup_path == NULL || exit_fifo == NULL) {
|
|
diff --git a/src/daemon/common/cri/cri_helpers.cc b/src/daemon/common/cri/cri_helpers.cc
|
|
index d7ec9f36..68d569cc 100644
|
|
--- a/src/daemon/common/cri/cri_helpers.cc
|
|
+++ b/src/daemon/common/cri/cri_helpers.cc
|
|
@@ -550,8 +550,8 @@ void CreateContainerLogSymlink(const std::string &containerID, Errors &error)
|
|
WARN("Deleted previously existing symlink file: %s", path.c_str());
|
|
}
|
|
if (symlink(realPath.c_str(), path.c_str()) != 0) {
|
|
- SYSERROR("failed to create symbolic link %s to the container log file %s for container %s", path.c_str(), realPath.c_str(),
|
|
- containerID.c_str());
|
|
+ SYSERROR("failed to create symbolic link %s to the container log file %s for container %s", path.c_str(),
|
|
+ realPath.c_str(), containerID.c_str());
|
|
error.Errorf("failed to create symbolic link %s to the container log file %s for container %s", path.c_str(),
|
|
realPath.c_str(), containerID.c_str());
|
|
}
|
|
diff --git a/src/daemon/common/cri/v1/v1_cri_helpers.cc b/src/daemon/common/cri/v1/v1_cri_helpers.cc
|
|
index 1f797ad7..478dd105 100644
|
|
--- a/src/daemon/common/cri/v1/v1_cri_helpers.cc
|
|
+++ b/src/daemon/common/cri/v1/v1_cri_helpers.cc
|
|
@@ -636,7 +636,8 @@ void ContainerStatusToGRPC(container_inspect *inspect,
|
|
ConvertResourcesToStatus(inspect, contStatus);
|
|
}
|
|
|
|
-std::unique_ptr<runtime::v1::ContainerStatus> GetContainerStatus(service_executor_t *m_cb, const std::string &containerID, Errors &error)
|
|
+std::unique_ptr<runtime::v1::ContainerStatus> GetContainerStatus(service_executor_t *m_cb,
|
|
+ const std::string &containerID, Errors &error)
|
|
{
|
|
if (m_cb == nullptr) {
|
|
error.SetError("Invalid input arguments: empty service executor");
|
|
@@ -694,7 +695,7 @@ static int InsertCDIDevices(std::unordered_set<std::string> &fromCRI, const std:
|
|
}
|
|
return 0;
|
|
}
|
|
-
|
|
+
|
|
void GenerateCDIRequestedDevices(const runtime::v1::ContainerConfig &config, host_config *hostconfig, Errors &err)
|
|
{
|
|
std::unordered_set<std::string> fromCRI;
|
|
@@ -703,13 +704,13 @@ void GenerateCDIRequestedDevices(const runtime::v1::ContainerConfig &config, hos
|
|
__isula_auto_string_array_t string_array *devices = nullptr;
|
|
json_map_string_string *annotations = nullptr;
|
|
__isula_auto_free char *error = nullptr;
|
|
-
|
|
+
|
|
if (hostconfig == nullptr) {
|
|
ERROR("Invalid input arguments");
|
|
err.Errorf("Invalid input arguments");
|
|
return;
|
|
}
|
|
-
|
|
+
|
|
if (config.cdi_devices().empty() && config.annotations().empty()) {
|
|
return;
|
|
}
|
|
@@ -746,7 +747,7 @@ void GenerateCDIRequestedDevices(const runtime::v1::ContainerConfig &config, hos
|
|
requested->items = nullptr;
|
|
hostconfig->cdi_requested_devices_len = requested->len;
|
|
requested->len = 0;
|
|
-
|
|
+
|
|
free_out:
|
|
free_json_map_string_string(annotations);
|
|
}
|
|
diff --git a/src/daemon/common/sysinfo.c b/src/daemon/common/sysinfo.c
|
|
index e369c3e3..ed1c01a3 100644
|
|
--- a/src/daemon/common/sysinfo.c
|
|
+++ b/src/daemon/common/sysinfo.c
|
|
@@ -384,8 +384,8 @@ sysinfo_t *get_sys_info(bool quiet)
|
|
sysinfo->ncpus_conf = get_nprocs_conf();
|
|
|
|
ret = common_get_cgroup_info(&sysinfo->cgmeminfo, &sysinfo->cgcpuinfo, &sysinfo->hugetlbinfo,
|
|
- &sysinfo->blkioinfo, &sysinfo->cpusetinfo, &sysinfo->pidsinfo,
|
|
- &sysinfo->filesinfo, quiet);
|
|
+ &sysinfo->blkioinfo, &sysinfo->cpusetinfo, &sysinfo->pidsinfo,
|
|
+ &sysinfo->filesinfo, quiet);
|
|
if (ret != 0) {
|
|
goto out;
|
|
}
|
|
diff --git a/src/daemon/config/isulad_config.c b/src/daemon/config/isulad_config.c
|
|
index 617db7a2..80689bce 100644
|
|
--- a/src/daemon/config/isulad_config.c
|
|
+++ b/src/daemon/config/isulad_config.c
|
|
@@ -1839,7 +1839,7 @@ int merge_json_confs_into_global(struct service_arguments *args)
|
|
args->json_confs->cdi_spec_dirs_len = tmp_json_confs->cdi_spec_dirs_len;
|
|
tmp_json_confs->cdi_spec_dirs_len = 0;
|
|
#endif /* ENABLE_CDI */
|
|
-
|
|
+
|
|
out:
|
|
free(err);
|
|
free_isulad_daemon_configs(tmp_json_confs);
|
|
diff --git a/src/daemon/entry/connect/grpc/cri/v1/cri_v1_runtime_runtime_service.cc b/src/daemon/entry/connect/grpc/cri/v1/cri_v1_runtime_runtime_service.cc
|
|
index fb5aad3c..f8df8e0a 100644
|
|
--- a/src/daemon/entry/connect/grpc/cri/v1/cri_v1_runtime_runtime_service.cc
|
|
+++ b/src/daemon/entry/connect/grpc/cri/v1/cri_v1_runtime_runtime_service.cc
|
|
@@ -90,7 +90,8 @@ void RuntimeV1RuntimeServiceImpl::Init(std::string &podSandboxImage,
|
|
m_enablePodEvents = enablePodEvents;
|
|
}
|
|
|
|
- m_rService = std::unique_ptr<CRIV1::CRIRuntimeService>(new CRIRuntimeServiceImpl(podSandboxImage, cb, networkPlugin, m_enablePodEvents));
|
|
+ m_rService = std::unique_ptr<CRIV1::CRIRuntimeService>(new CRIRuntimeServiceImpl(podSandboxImage, cb, networkPlugin,
|
|
+ m_enablePodEvents));
|
|
}
|
|
|
|
void RuntimeV1RuntimeServiceImpl::Wait()
|
|
@@ -134,7 +135,7 @@ auto RuntimeV1RuntimeServiceImpl::GenerateCRIContainerEvent(const char *containe
|
|
m_rService->PodSandboxStatus(sandboxID, statusReply, error);
|
|
if (!error.Empty()) {
|
|
WARN("Object: CRI, Type: Failed to status pod:%s due to %s", sandboxID.c_str(),
|
|
- error.GetMessage().c_str());
|
|
+ error.GetMessage().c_str());
|
|
} else {
|
|
*(response->mutable_pod_sandbox_status()) = *(statusReply->mutable_status());
|
|
for (auto &containerStatus : statusReply->containers_statuses()) {
|
|
diff --git a/src/daemon/entry/cri/v1/v1_cri_container_manager_service.cc b/src/daemon/entry/cri/v1/v1_cri_container_manager_service.cc
|
|
index 1097c32c..1cee68ec 100644
|
|
--- a/src/daemon/entry/cri/v1/v1_cri_container_manager_service.cc
|
|
+++ b/src/daemon/entry/cri/v1/v1_cri_container_manager_service.cc
|
|
@@ -1015,7 +1015,8 @@ cleanup:
|
|
return contStats;
|
|
}
|
|
|
|
-std::unique_ptr<runtime::v1::ContainerStatus> ContainerManagerService::ContainerStatus(const std::string &containerID, Errors &error)
|
|
+std::unique_ptr<runtime::v1::ContainerStatus> ContainerManagerService::ContainerStatus(const std::string &containerID,
|
|
+ Errors &error)
|
|
{
|
|
return CRIHelpersV1::GetContainerStatus(m_cb, containerID, error);
|
|
}
|
|
diff --git a/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.cc b/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.cc
|
|
index 4291d8a0..fa726e2c 100644
|
|
--- a/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.cc
|
|
+++ b/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.cc
|
|
@@ -819,7 +819,8 @@ void PodSandboxManagerService::SetSandboxStatusNetwork(std::shared_ptr<sandbox::
|
|
|
|
void PodSandboxManagerService::GetContainerStatuses(const std::string &podSandboxID,
|
|
std::vector<std::unique_ptr<runtime::v1::ContainerStatus>> &containerStatuses,
|
|
- std::vector<std::string> &errors) {
|
|
+ std::vector<std::string> &errors)
|
|
+{
|
|
auto list_response_wrapper = GetContainerListResponse(podSandboxID, errors);
|
|
if (list_response_wrapper == nullptr) {
|
|
return;
|
|
@@ -837,7 +838,8 @@ void PodSandboxManagerService::GetContainerStatuses(const std::string &podSandbo
|
|
}
|
|
}
|
|
|
|
-std::unique_ptr<runtime::v1::PodSandboxStatus> PodSandboxManagerService::GetPodSandboxStatus(const std::string &podSandboxID, Errors &error)
|
|
+std::unique_ptr<runtime::v1::PodSandboxStatus> PodSandboxManagerService::GetPodSandboxStatus(
|
|
+ const std::string &podSandboxID, Errors &error)
|
|
{
|
|
std::unique_ptr<runtime::v1::PodSandboxStatus> podStatus(new (std::nothrow) runtime::v1::PodSandboxStatus);
|
|
if (podStatus == nullptr) {
|
|
@@ -876,7 +878,7 @@ void PodSandboxManagerService::PodSandboxStatus(const std::string &podSandboxID,
|
|
return;
|
|
}
|
|
|
|
-
|
|
+
|
|
auto podStatus = GetPodSandboxStatus(podSandboxID, error);
|
|
if (error.NotEmpty()) {
|
|
ERROR("Failed to get pod sandbox status: %s", error.GetCMessage());
|
|
diff --git a/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.h b/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.h
|
|
index 3872c4c9..d5c0cf91 100644
|
|
--- a/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.h
|
|
+++ b/src/daemon/entry/cri/v1/v1_cri_pod_sandbox_manager_service.h
|
|
@@ -129,8 +129,10 @@ private:
|
|
std::vector<std::string> &podSandboxIDs, Errors &error);
|
|
void ApplySandboxLinuxOptions(const runtime::v1::LinuxPodSandboxConfig &lc, host_config *hc,
|
|
container_config *custom_config, Errors &error);
|
|
- auto GetPodSandboxStatus(const std::string &podSandboxID, Errors &error) -> std::unique_ptr<runtime::v1::PodSandboxStatus>;
|
|
- void GetContainerStatuses(const std::string &podSandboxID, std::vector<std::unique_ptr<runtime::v1::ContainerStatus>> &containerStatuses,
|
|
+ auto GetPodSandboxStatus(const std::string &podSandboxID,
|
|
+ Errors &error) -> std::unique_ptr<runtime::v1::PodSandboxStatus>;
|
|
+ void GetContainerStatuses(const std::string &podSandboxID,
|
|
+ std::vector<std::unique_ptr<runtime::v1::ContainerStatus>> &containerStatuses,
|
|
std::vector<std::string> &errors);
|
|
|
|
private:
|
|
diff --git a/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.cc b/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.cc
|
|
index 7b40e29d..56c89c1e 100644
|
|
--- a/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.cc
|
|
+++ b/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.cc
|
|
@@ -125,7 +125,8 @@ void CRIRuntimeServiceImpl::RemovePodSandbox(const std::string &podSandboxID, Er
|
|
m_podSandboxManager->RemovePodSandbox(podSandboxID, error);
|
|
}
|
|
|
|
-void CRIRuntimeServiceImpl::PodSandboxStatus(const std::string &podSandboxID, runtime::v1::PodSandboxStatusResponse *reply, Errors &error)
|
|
+void CRIRuntimeServiceImpl::PodSandboxStatus(const std::string &podSandboxID,
|
|
+ runtime::v1::PodSandboxStatusResponse *reply, Errors &error)
|
|
{
|
|
m_podSandboxManager->PodSandboxStatus(podSandboxID, reply, error);
|
|
}
|
|
diff --git a/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.h b/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.h
|
|
index 6ae59bfa..3d93c7bb 100644
|
|
--- a/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.h
|
|
+++ b/src/daemon/entry/cri/v1/v1_cri_runtime_service_impl.h
|
|
@@ -73,7 +73,8 @@ public:
|
|
|
|
void RemovePodSandbox(const std::string &podSandboxID, Errors &error) override;
|
|
|
|
- void PodSandboxStatus(const std::string &podSandboxID, runtime::v1::PodSandboxStatusResponse *reply, Errors &error) override;
|
|
+ void PodSandboxStatus(const std::string &podSandboxID, runtime::v1::PodSandboxStatusResponse *reply,
|
|
+ Errors &error) override;
|
|
|
|
void ListPodSandbox(const runtime::v1::PodSandboxFilter &filter,
|
|
std::vector<std::unique_ptr<runtime::v1::PodSandbox>> &pods, Errors &error) override;
|
|
diff --git a/src/daemon/executor/container_cb/execution_create.c b/src/daemon/executor/container_cb/execution_create.c
|
|
index 785b4e27..8e930c8a 100644
|
|
--- a/src/daemon/executor/container_cb/execution_create.c
|
|
+++ b/src/daemon/executor/container_cb/execution_create.c
|
|
@@ -551,7 +551,7 @@ static int merge_config_for_syscontainer(const container_create_request *request
|
|
goto out;
|
|
}
|
|
if (request->rootfs != NULL && (append_json_map_string_string(container_spec->annotations, "external.rootfs", "true")
|
|
- || append_json_map_string_string(oci_spec->annotations, "external.rootfs", "true"))) {
|
|
+ || append_json_map_string_string(oci_spec->annotations, "external.rootfs", "true"))) {
|
|
ERROR("Realloc annotations failed");
|
|
ret = -1;
|
|
goto out;
|
|
diff --git a/src/daemon/mailbox/mailbox.c b/src/daemon/mailbox/mailbox.c
|
|
index 732b91b9..39f003f3 100644
|
|
--- a/src/daemon/mailbox/mailbox.c
|
|
+++ b/src/daemon/mailbox/mailbox.c
|
|
@@ -23,7 +23,8 @@
|
|
|
|
mailbox_topic_handler_t mailbox_topic_handlers[MAILBOX_TOPIC_MAX] = { 0 };
|
|
|
|
-static bool mailbox_topic_valid(mailbox_topic topic) {
|
|
+static bool mailbox_topic_valid(mailbox_topic topic)
|
|
+{
|
|
return topic > MAILBOX_TOPIC_INVALID && topic < MAILBOX_TOPIC_MAX;
|
|
}
|
|
|
|
diff --git a/src/daemon/mailbox/mailbox.h b/src/daemon/mailbox/mailbox.h
|
|
index 1dc2e934..aef63514 100644
|
|
--- a/src/daemon/mailbox/mailbox.h
|
|
+++ b/src/daemon/mailbox/mailbox.h
|
|
@@ -64,7 +64,7 @@ typedef struct {
|
|
cri_container_message_type type;
|
|
} cri_container_message_t;
|
|
|
|
-int mailbox_register_topic_handler(mailbox_topic topic, message_generator_t handle, void *context,
|
|
+int mailbox_register_topic_handler(mailbox_topic topic, message_generator_t generator, void *context,
|
|
message_release_t release, bool async);
|
|
|
|
void mailbox_unregister_topic_handler(mailbox_topic topic);
|
|
@@ -73,7 +73,7 @@ void mailbox_publish(mailbox_topic topic, void *data);
|
|
|
|
message_subscriber *mailbox_subscribe(mailbox_topic topic);
|
|
|
|
-void mailbox_unsubscribe(mailbox_topic, message_subscriber *sub);
|
|
+void mailbox_unsubscribe(mailbox_topic topic, message_subscriber *sub);
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
diff --git a/src/daemon/mailbox/mailbox_message.c b/src/daemon/mailbox/mailbox_message.c
|
|
index b16a1bdd..316b7428 100644
|
|
--- a/src/daemon/mailbox/mailbox_message.c
|
|
+++ b/src/daemon/mailbox/mailbox_message.c
|
|
@@ -20,7 +20,8 @@
|
|
#include "utils.h"
|
|
|
|
// Once the create succeeds, the ownership is transferred to the mailbox_message.
|
|
-mailbox_message *mailbox_message_create(void *data, void (*destroy)(void *)) {
|
|
+mailbox_message *mailbox_message_create(void *data, void (*destroy)(void *))
|
|
+{
|
|
__isula_auto_free mailbox_message *msg = NULL;
|
|
msg = util_common_calloc_s(sizeof(mailbox_message));
|
|
if (msg == NULL) {
|
|
@@ -40,7 +41,8 @@ mailbox_message *mailbox_message_create(void *data, void (*destroy)(void *)) {
|
|
return isula_transfer_ptr(msg);
|
|
}
|
|
|
|
-int mailbox_message_ref(mailbox_message *dest) {
|
|
+int mailbox_message_ref(mailbox_message *dest)
|
|
+{
|
|
__isula_auto_pm_unlock pthread_mutex_t *lock = NULL;
|
|
if (dest == NULL) {
|
|
ERROR("Invalid mailbox_message");
|
|
@@ -63,7 +65,8 @@ int mailbox_message_ref(mailbox_message *dest) {
|
|
return 0;
|
|
}
|
|
|
|
-void mailbox_message_unref(mailbox_message *dest) {
|
|
+void mailbox_message_unref(mailbox_message *dest)
|
|
+{
|
|
__isula_auto_pm_unlock pthread_mutex_t *lock = NULL;
|
|
if (dest == NULL) {
|
|
return;
|
|
diff --git a/src/daemon/mailbox/mailbox_message.h b/src/daemon/mailbox/mailbox_message.h
|
|
index 39e40b70..af323069 100644
|
|
--- a/src/daemon/mailbox/mailbox_message.h
|
|
+++ b/src/daemon/mailbox/mailbox_message.h
|
|
@@ -34,9 +34,9 @@ typedef struct mailbox_message {
|
|
|
|
mailbox_message *mailbox_message_create(void *ptr, void (*destroy)(void *));
|
|
|
|
-int mailbox_message_ref(mailbox_message *p);
|
|
+int mailbox_message_ref(mailbox_message *dest);
|
|
|
|
-void mailbox_message_unref(mailbox_message *p);
|
|
+void mailbox_message_unref(mailbox_message *dest);
|
|
|
|
// define auto free function callback for mailbox_message
|
|
define_auto_cleanup_callback(mailbox_message_unref, mailbox_message);
|
|
diff --git a/src/daemon/modules/api/container_api.h b/src/daemon/modules/api/container_api.h
|
|
index 55c59980..a6ec8e22 100644
|
|
--- a/src/daemon/modules/api/container_api.h
|
|
+++ b/src/daemon/modules/api/container_api.h
|
|
@@ -271,7 +271,8 @@ bool container_is_valid_state_string(const char *state);
|
|
|
|
void container_update_health_monitor(const char *container_id);
|
|
|
|
-extern int container_supervisor_add_exit_monitor(int fd, const char *exit_fifo, const pid_ppid_info_t *pid_info, const container_t *cont);
|
|
+extern int container_supervisor_add_exit_monitor(int fd, const char *exit_fifo, const pid_ppid_info_t *pid_info,
|
|
+ const container_t *cont);
|
|
|
|
extern char *container_exit_fifo_create(const char *cont_state_path);
|
|
|
|
diff --git a/src/daemon/modules/api/network_api.h b/src/daemon/modules/api/network_api.h
|
|
index 4c1e3480..fd8607b3 100644
|
|
--- a/src/daemon/modules/api/network_api.h
|
|
+++ b/src/daemon/modules/api/network_api.h
|
|
@@ -77,7 +77,7 @@ void free_network_api_result_list(network_api_result_list *ptr);
|
|
|
|
void free_attach_net_conf(struct attach_net_conf *ptr);
|
|
|
|
-void free_network_api_conf(network_api_conf *ptr);
|
|
+void free_network_api_conf(network_api_conf *conf);
|
|
|
|
bool network_module_init(const char *network_plugin, const char *cache_dir, const char *conf_dir, const char* bin_path);
|
|
|
|
diff --git a/src/daemon/modules/container/supervisor/supervisor.c b/src/daemon/modules/container/supervisor/supervisor.c
|
|
index 83d46268..39d9fdb8 100644
|
|
--- a/src/daemon/modules/container/supervisor/supervisor.c
|
|
+++ b/src/daemon/modules/container/supervisor/supervisor.c
|
|
@@ -307,7 +307,8 @@ static int oom_handle_cb(int fd, uint32_t events, void *cbdata, struct epoll_des
|
|
}
|
|
|
|
/* supervisor add exit monitor */
|
|
-int container_supervisor_add_exit_monitor(int fd, const char *exit_fifo, const pid_ppid_info_t *pid_info, const container_t *cont)
|
|
+int container_supervisor_add_exit_monitor(int fd, const char *exit_fifo, const pid_ppid_info_t *pid_info,
|
|
+ const container_t *cont)
|
|
{
|
|
int ret = 0;
|
|
struct supervisor_handler_data *data = NULL;
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/cdi_container_edits.c b/src/daemon/modules/device/cdi/behavior/cdi_container_edits.c
|
|
index 816b9c2d..d146f7e1 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/cdi_container_edits.c
|
|
+++ b/src/daemon/modules/device/cdi/behavior/cdi_container_edits.c
|
|
@@ -27,8 +27,8 @@
|
|
#include "utils_array.h"
|
|
#include "specs_api.h"
|
|
|
|
-/*
|
|
- * The OCI being used by the iSulad not supportes
|
|
+/*
|
|
+ * The OCI being used by the iSulad not supportes
|
|
* createRuntime/createContainer/startContainer currently.
|
|
*/
|
|
// PRESTART_HOOK is the name of the OCI "prestart" hook.
|
|
@@ -105,8 +105,8 @@ static int fill_device_node_info(cdi_device_node *d)
|
|
dev_type = NULL;
|
|
} else {
|
|
if (strcmp(d->type, dev_type) != 0) {
|
|
- ERROR("CDI device (%s, %s), host type mismatch (%s, %s)",
|
|
- d->path, d->host_path, d->type, dev_type);
|
|
+ ERROR("CDI device (%s, %s), host type mismatch (%s, %s)",
|
|
+ d->path, d->host_path, d->type, dev_type);
|
|
return -1;
|
|
}
|
|
}
|
|
@@ -168,7 +168,7 @@ static cdi_hook *clone_cdi_hook(cdi_hook *h)
|
|
hook->env_len = h->env_len;
|
|
}
|
|
hook->timeout = h->timeout;
|
|
-
|
|
+
|
|
return hook;
|
|
|
|
error_out:
|
|
@@ -280,7 +280,7 @@ static defs_device *cdi_device_node_to_oci(cdi_device_node *d)
|
|
oci_device->file_mode = d->file_mode;
|
|
oci_device->uid = d->uid;
|
|
oci_device->gid = d->gid;
|
|
-
|
|
+
|
|
return oci_device;
|
|
}
|
|
|
|
@@ -331,7 +331,7 @@ static int apply_cdi_device_nodes(cdi_container_edits *e, oci_runtime_spec *spec
|
|
access = "rwm";
|
|
}
|
|
if (spec_add_linux_resources_device(spec, true, dev->type,
|
|
- dev->major, dev->minor, access)) {
|
|
+ dev->major, dev->minor, access)) {
|
|
dev = NULL;
|
|
goto error_out;
|
|
}
|
|
@@ -391,9 +391,9 @@ static int apply_cdi_mounts(cdi_container_edits *e, oci_runtime_spec *spec)
|
|
return -1;
|
|
}
|
|
}
|
|
-
|
|
+
|
|
qsort(spec->mounts, spec->mounts_len,
|
|
- sizeof(defs_mount *), (int (*)(const void *, const void *))defs_mount_cmp);
|
|
+ sizeof(defs_mount *), (int (*)(const void *, const void *))defs_mount_cmp);
|
|
return 0;
|
|
}
|
|
|
|
@@ -411,8 +411,8 @@ static int apply_cdi_hooks(cdi_container_edits *e, oci_runtime_spec *spec)
|
|
} else if (strcmp(e->hooks[i]->hook_name, POSTSTOP_HOOK)) {
|
|
ret = spec_add_poststop_hook(spec, oci_hook);
|
|
} else {
|
|
- /*
|
|
- * The OCI being used by the iSulad not supportes
|
|
+ /*
|
|
+ * The OCI being used by the iSulad not supportes
|
|
* createRuntime/createContainer/startContainer currently.
|
|
*/
|
|
ERROR("Unknown hook name %s", e->hooks[i]->hook_name);
|
|
@@ -503,19 +503,19 @@ int cdi_container_edits_validate(cdi_container_edits *e)
|
|
static int append_##item(cdi_container_edits *e, cdi_container_edits *o, clone_common_array_item_cb cb) \
|
|
{ \
|
|
common_array e_array = { \
|
|
- .items = (void **)e->item, \
|
|
- .len = e->item##_len, \
|
|
- .cap = e->item##_len, \
|
|
- .free_item_cb = NULL, \
|
|
- .clone_item_cb = cb \
|
|
- }; \
|
|
+ .items = (void **)e->item, \
|
|
+ .len = e->item##_len, \
|
|
+ .cap = e->item##_len, \
|
|
+ .free_item_cb = NULL, \
|
|
+ .clone_item_cb = cb \
|
|
+ }; \
|
|
common_array o_array = { \
|
|
- .items = (void **)o->item, \
|
|
- .len = o->item##_len, \
|
|
- .cap = o->item##_len, \
|
|
- .free_item_cb = NULL, \
|
|
- .clone_item_cb = cb \
|
|
- }; \
|
|
+ .items = (void **)o->item, \
|
|
+ .len = o->item##_len, \
|
|
+ .cap = o->item##_len, \
|
|
+ .free_item_cb = NULL, \
|
|
+ .clone_item_cb = cb \
|
|
+ }; \
|
|
if (util_merge_common_array(&e_array, &o_array) != 0) { \
|
|
ERROR("Out of memory"); \
|
|
return -1; \
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/cdi_device.c b/src/daemon/modules/device/cdi/behavior/cdi_device.c
|
|
index aec3d7c0..9104416c 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/cdi_device.c
|
|
+++ b/src/daemon/modules/device/cdi/behavior/cdi_device.c
|
|
@@ -28,21 +28,21 @@ void free_cdi_cache_device(struct cdi_cache_device *d)
|
|
if (d == NULL) {
|
|
return;
|
|
}
|
|
-
|
|
- /*
|
|
+
|
|
+ /*
|
|
* free_cdi_cache_device should not be recursively free raw_device.
|
|
* Otherwise, the function conflicts with the raw_spec free raw_device
|
|
- * when cdi_cache_spec free raw_spec, triggering double free.
|
|
+ * when cdi_cache_spec free raw_spec, triggering double free.
|
|
*/
|
|
d->raw_device = NULL;
|
|
-
|
|
- /*
|
|
+
|
|
+ /*
|
|
* free_cdi_cache_device should not be recursively free cache_spec.
|
|
* Otherwise, the function conflicts with the cache free specs,
|
|
- * triggering double free.
|
|
+ * triggering double free.
|
|
*/
|
|
d->cache_spec = NULL;
|
|
-
|
|
+
|
|
free(d);
|
|
}
|
|
|
|
@@ -86,7 +86,7 @@ char *cdi_device_get_qualified_name(const struct cdi_cache_device *d)
|
|
return NULL;
|
|
}
|
|
return cdi_parser_qualified_name(cdi_spec_get_vendor(d->cache_spec),
|
|
- cdi_spec_get_class(d->cache_spec), d->raw_device->name);
|
|
+ cdi_spec_get_class(d->cache_spec), d->raw_device->name);
|
|
}
|
|
|
|
cdi_container_edits *cdi_device_get_edits(const struct cdi_cache_device *d)
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/cdi_spec.c b/src/daemon/modules/device/cdi/behavior/cdi_spec.c
|
|
index 8783debc..ec563230 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/cdi_spec.c
|
|
+++ b/src/daemon/modules/device/cdi/behavior/cdi_spec.c
|
|
@@ -33,7 +33,7 @@ void free_cdi_cache_spec(struct cdi_cache_spec *s)
|
|
if (s == NULL) {
|
|
return;
|
|
}
|
|
-
|
|
+
|
|
free_cdi_spec(s->raw_spec);
|
|
s->raw_spec = NULL;
|
|
free(s->vendor);
|
|
@@ -44,7 +44,7 @@ void free_cdi_cache_spec(struct cdi_cache_spec *s)
|
|
s->path = NULL;
|
|
map_free(s->devices);
|
|
s->devices = NULL;
|
|
-
|
|
+
|
|
free(s);
|
|
}
|
|
|
|
@@ -58,7 +58,7 @@ struct cdi_cache_spec *cdi_spec_read_spec(const char *path, int priority)
|
|
ERROR("Failed to get clean path %s", path);
|
|
return NULL;
|
|
}
|
|
-
|
|
+
|
|
raw_spec = cdi_spec_parse_file(cleanpath, NULL, &err);
|
|
if (raw_spec == NULL) {
|
|
ERROR("Failed to read CDI Spec %s: %s", cleanpath, err);
|
|
@@ -106,7 +106,7 @@ struct cdi_cache_spec *cdi_spec_new_spec(cdi_spec *raw, const char *path, int pr
|
|
ERROR("Invalid CDI Spec");
|
|
goto error_out;
|
|
}
|
|
-
|
|
+
|
|
return spec;
|
|
|
|
error_out:
|
|
@@ -183,7 +183,7 @@ static int cdi_spec_init(struct cdi_cache_spec *s)
|
|
cdi_device *d = NULL;
|
|
size_t i;
|
|
bool version_result = true;
|
|
-
|
|
+
|
|
if (!cdi_is_valid_version(s->raw_spec->cdi_version)) {
|
|
ERROR("Failed to validate cdi spec version: %s", s->raw_spec->cdi_version);
|
|
return -1;
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/cdi_spec.h b/src/daemon/modules/device/cdi/behavior/cdi_spec.h
|
|
index ca7b2cfa..d20826c6 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/cdi_spec.h
|
|
+++ b/src/daemon/modules/device/cdi/behavior/cdi_spec.h
|
|
@@ -37,7 +37,7 @@ struct cdi_cache_spec {
|
|
};
|
|
|
|
#define CDI_DEFAULT_SPEC_EXT ".json"
|
|
-
|
|
+
|
|
void free_cdi_cache_spec(struct cdi_cache_spec *s);
|
|
|
|
struct cdi_cache_spec *cdi_spec_read_spec(const char *path, int priority);
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.c b/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.c
|
|
index cafb52b8..75cd7abf 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.c
|
|
+++ b/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.c
|
|
@@ -27,13 +27,13 @@
|
|
|
|
#define DEFAULT_SPEC_DIRS_LEN 2
|
|
static char *default_spec_dirs_items[DEFAULT_SPEC_DIRS_LEN] = {CDI_DEFAULT_STATIC_DIR, CDI_DEFAULT_DYNAMIC_DIR};
|
|
-
|
|
+
|
|
string_array g_default_spec_dirs = {
|
|
.items = default_spec_dirs_items,
|
|
.len = DEFAULT_SPEC_DIRS_LEN,
|
|
.cap = DEFAULT_SPEC_DIRS_LEN,
|
|
};
|
|
-
|
|
+
|
|
struct scan_spec_dir_cb_args {
|
|
struct cdi_scan_fn_maps *scan_fn_maps;
|
|
cdi_scan_spec_func scan_fn;
|
|
@@ -64,7 +64,7 @@ static bool scan_spec_dir_cb(const char *dir, const struct dirent *pdirent, void
|
|
DEBUG("Skip dir %s", file_path);
|
|
return true;
|
|
}
|
|
-
|
|
+
|
|
if (!util_has_suffix(file_path, ".json")) {
|
|
DEBUG("Skip file %s", file_path);
|
|
return true;
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.h b/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.h
|
|
index b17a0cd8..fdb0f2f9 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.h
|
|
+++ b/src/daemon/modules/device/cdi/behavior/cdi_spec_dirs.h
|
|
@@ -27,7 +27,7 @@ extern "C" {
|
|
#define CDI_DEFAULT_DYNAMIC_DIR "/var/run/cdi"
|
|
|
|
extern string_array g_default_spec_dirs;
|
|
-
|
|
+
|
|
struct cdi_scan_fn_maps {
|
|
map_t *specs;
|
|
map_t *devices;
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/cdi_version.c b/src/daemon/modules/device/cdi/behavior/cdi_version.c
|
|
index 550f3107..4cdc116a 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/cdi_version.c
|
|
+++ b/src/daemon/modules/device/cdi/behavior/cdi_version.c
|
|
@@ -177,7 +177,7 @@ const char *cdi_minimum_required_version(cdi_spec *spec)
|
|
bool cdi_is_valid_version(const char *spec_version)
|
|
{
|
|
int i;
|
|
-
|
|
+
|
|
for (i = 0; i < VALID_SPEC_VERSIONS_LEN; i++) {
|
|
if (strcmp(g_valid_spec_versions[i].version, spec_version) == 0) {
|
|
return true;
|
|
diff --git a/src/daemon/modules/device/cdi/behavior/parser/cdi_parser.c b/src/daemon/modules/device/cdi/behavior/parser/cdi_parser.c
|
|
index 8824d29c..603ce28d 100644
|
|
--- a/src/daemon/modules/device/cdi/behavior/parser/cdi_parser.c
|
|
+++ b/src/daemon/modules/device/cdi/behavior/parser/cdi_parser.c
|
|
@@ -47,7 +47,7 @@ char *cdi_parser_qualified_name(const char *vendor, const char *class, const cha
|
|
}
|
|
|
|
nret = snprintf(device_name, sizeof(device_name), "%s/%s=%s",
|
|
- vendor, class, name);
|
|
+ vendor, class, name);
|
|
if (nret < 0 || (size_t)nret >= sizeof(device_name)) {
|
|
ERROR("Device name is too long");
|
|
return NULL;
|
|
@@ -118,7 +118,7 @@ int cdi_parser_parse_device(const char *device, char **vendor, char **class, cha
|
|
{
|
|
__isula_auto_array_t char **parts = NULL;
|
|
|
|
- if (vendor == NULL || class == NULL || name == NULL ||
|
|
+ if (vendor == NULL || class == NULL || name == NULL ||
|
|
device == NULL || device[0] == '/') {
|
|
ERROR("Invalid argument");
|
|
return -1;
|
|
@@ -214,7 +214,7 @@ int cdi_parser_validate_class_name(const char *class)
|
|
int cdi_parser_validate_device_name(const char *name)
|
|
{
|
|
size_t i;
|
|
-
|
|
+
|
|
if (name == NULL) {
|
|
ERROR("Invalid (empty) device name");
|
|
return -1;
|
|
diff --git a/src/daemon/modules/device/cdi/cdi_cache.c b/src/daemon/modules/device/cdi/cdi_cache.c
|
|
index e637f7cd..e9a9b804 100644
|
|
--- a/src/daemon/modules/device/cdi/cdi_cache.c
|
|
+++ b/src/daemon/modules/device/cdi/cdi_cache.c
|
|
@@ -179,7 +179,7 @@ static int cdi_refresh(struct cdi_cache *c)
|
|
{
|
|
bool refreshed;
|
|
int ret = 0;
|
|
-
|
|
+
|
|
if (c == NULL) {
|
|
ERROR("Invalid arguments");
|
|
return -1;
|
|
@@ -206,10 +206,10 @@ static void map_cdi_cache_specs_kvfree(void *key, void *value)
|
|
static void map_cdi_cache_device_kvfree(void *key, void *value)
|
|
{
|
|
free(key);
|
|
- /*
|
|
+ /*
|
|
* map_cdi_cache_device_kvfree should not be recursively free cdi_cache_device.
|
|
* Otherwise, the function conflicts with the cdi_cache_specs free devices,
|
|
- * triggering double free.
|
|
+ * triggering double free.
|
|
*/
|
|
(void)value;
|
|
}
|
|
@@ -249,8 +249,8 @@ static bool resolve_conflict(struct cdi_scan_fn_maps *scan_fn_maps, const char *
|
|
return true;
|
|
}
|
|
|
|
-static void refresh_scan_spec_func(struct cdi_scan_fn_maps *scan_fn_maps, const char *path,
|
|
- int priority, struct cdi_cache_spec *spec)
|
|
+static void refresh_scan_spec_func(struct cdi_scan_fn_maps *scan_fn_maps, const char *path,
|
|
+ int priority, struct cdi_cache_spec *spec)
|
|
{
|
|
map_t *specs = scan_fn_maps->specs;
|
|
map_t *devices = scan_fn_maps->devices;
|
|
@@ -375,7 +375,7 @@ static int refresh(struct cdi_cache *c)
|
|
util_swap_ptr((void **)&c->devices, (void **)&devices);
|
|
|
|
ret = c->refresh_error_flag ? -1 : 0;
|
|
-
|
|
+
|
|
free_out:
|
|
map_itor_free(itor);
|
|
map_free(specs);
|
|
@@ -443,7 +443,7 @@ static int cdi_inject_devices(struct cdi_cache *c, oci_runtime_spec *oci_spec, s
|
|
|
|
(void)refresh_if_required(c, false, &ret);
|
|
|
|
- for(i = 0; i < devices->len; i++) {
|
|
+ for (i = 0; i < devices->len; i++) {
|
|
device = devices->items[i];
|
|
d = map_search(c->devices, (void *)device);
|
|
if (d == NULL) {
|
|
@@ -524,7 +524,7 @@ static int init_tracked(struct cdi_watch *w, string_array *dirs)
|
|
ERROR("Out of memory");
|
|
return -1;
|
|
}
|
|
- for(i = 0; i < dirs->len; i++) {
|
|
+ for (i = 0; i < dirs->len; i++) {
|
|
if (!map_replace(w->tracked, (void *)dirs->items[i], (void *)&tmp_value)) {
|
|
ERROR("Failed to insert tracked by dir %s", dirs->items[i]);
|
|
goto error_out;
|
|
@@ -624,7 +624,7 @@ static int process_cdi_events(int watcher_fd, struct cdi_cache *c)
|
|
}
|
|
|
|
(void)pthread_mutex_lock(&c->mutex);
|
|
-
|
|
+
|
|
while (events_index < events_length) {
|
|
cdi_event = (struct inotify_event *)(&buffer[events_index]);
|
|
ssize_t event_size = (ssize_t)(cdi_event->len) + (ssize_t)offsetof(struct inotify_event, name);
|
|
@@ -633,8 +633,8 @@ static int process_cdi_events(int watcher_fd, struct cdi_cache *c)
|
|
}
|
|
events_index += event_size;
|
|
|
|
- /*
|
|
- * file:
|
|
+ /*
|
|
+ * file:
|
|
* Rename: mask == IN_MOVED_TO | IN_MOVED_FROM
|
|
* Remove: mask == IN_MOVED_FROM || mask == IN_DELETE
|
|
* Write: mask == IN_MODIFY
|
|
diff --git a/src/daemon/modules/device/cdi/cdi_cache.h b/src/daemon/modules/device/cdi/cdi_cache.h
|
|
index 638e954e..9f6793c8 100644
|
|
--- a/src/daemon/modules/device/cdi/cdi_cache.h
|
|
+++ b/src/daemon/modules/device/cdi/cdi_cache.h
|
|
@@ -34,7 +34,7 @@ struct cdi_cache_ops {
|
|
// injecting CDI devices into an OCI Spec.
|
|
// Resolver
|
|
int (*inject_devices)(struct cdi_cache *c, oci_runtime_spec *spec, string_array *devices);
|
|
-
|
|
+
|
|
// refreshing the cache of CDI Specs and devices.
|
|
// Refresher
|
|
int (*configure)(struct cdi_cache *c, string_array *spec_dirs);
|
|
@@ -55,12 +55,12 @@ struct cdi_cache {
|
|
// This map holding the reference to cdi device, the devices will not released when the map is freed.
|
|
map_t *devices; // MAP_STR_PTR devices[cdi_device.name] = cdi_cache_device*
|
|
bool refresh_error_flag;
|
|
- bool auto_refresh;
|
|
+ bool auto_refresh;
|
|
struct cdi_watch *watch;
|
|
};
|
|
|
|
void free_cdi_cache(struct cdi_cache *c);
|
|
-
|
|
+
|
|
struct cdi_cache *cdi_new_cache(string_array *spec_dirs);
|
|
struct cdi_cache_ops *cdi_get_cache_ops(void);
|
|
|
|
diff --git a/src/daemon/modules/device/cdi_operate.c b/src/daemon/modules/device/cdi_operate.c
|
|
index f99bb7e4..2cc2a17d 100644
|
|
--- a/src/daemon/modules/device/cdi_operate.c
|
|
+++ b/src/daemon/modules/device/cdi_operate.c
|
|
@@ -29,7 +29,7 @@ int cdi_operate_registry_init(char **specs_dirs, size_t specs_dirs_len)
|
|
.len = specs_dirs_len,
|
|
.cap = specs_dirs_len,
|
|
};
|
|
-
|
|
+
|
|
return cdi_registry_init(&spec_dirs_array);
|
|
}
|
|
|
|
@@ -40,7 +40,7 @@ int cdi_operate_refresh(void)
|
|
ERROR("Failed to get registry");
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
return registry->ops->refresh(registry->cdi_cache);
|
|
}
|
|
|
|
@@ -52,13 +52,13 @@ int cdi_operate_inject_devices(oci_runtime_spec *spec, string_array *devices)
|
|
ERROR("Invalid params");
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
registry = cdi_get_registry();
|
|
if (registry == NULL || registry->ops == NULL || registry->ops->inject_devices == NULL) {
|
|
ERROR("Failed to get registry");
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
return registry->ops->inject_devices(registry->cdi_cache, spec, devices);
|
|
}
|
|
|
|
diff --git a/src/daemon/modules/image/oci/oci_image.c b/src/daemon/modules/image/oci/oci_image.c
|
|
index ce1c8a6b..e9f16024 100644
|
|
--- a/src/daemon/modules/image/oci/oci_image.c
|
|
+++ b/src/daemon/modules/image/oci/oci_image.c
|
|
@@ -295,7 +295,8 @@ static bool remove_image_tmpdir_cb(const char *path_name, const struct dirent *s
|
|
return true;
|
|
}
|
|
|
|
- if (!util_has_prefix(sub_dir->d_name, LOAD_TMPDIR_PREFIX) && !util_has_prefix(sub_dir->d_name, REGISTRY_TMPDIR_PREFIX)) {
|
|
+ if (!util_has_prefix(sub_dir->d_name, LOAD_TMPDIR_PREFIX) &&
|
|
+ !util_has_prefix(sub_dir->d_name, REGISTRY_TMPDIR_PREFIX)) {
|
|
// only remove directory that image module created
|
|
return true;
|
|
}
|
|
diff --git a/src/daemon/modules/image/oci/progress.h b/src/daemon/modules/image/oci/progress.h
|
|
index dcc8e144..673019a4 100644
|
|
--- a/src/daemon/modules/image/oci/progress.h
|
|
+++ b/src/daemon/modules/image/oci/progress.h
|
|
@@ -35,7 +35,7 @@ typedef struct progress {
|
|
|
|
bool progress_status_map_udpate(progress_status_map *progress_status_map, char *key, int64_t current, int64_t total);
|
|
|
|
-progress_status_map *progress_status_map_new();
|
|
+progress_status_map *progress_status_map_new(void);
|
|
|
|
size_t progress_status_map_size(progress_status_map *progress_status_map);
|
|
|
|
diff --git a/src/daemon/modules/image/oci/registry/registry.c b/src/daemon/modules/image/oci/registry/registry.c
|
|
index 66fa0076..2e99255a 100644
|
|
--- a/src/daemon/modules/image/oci/registry/registry.c
|
|
+++ b/src/daemon/modules/image/oci/registry/registry.c
|
|
@@ -293,7 +293,8 @@ static bool is_manifest_schemav1(char *media_type)
|
|
return false;
|
|
}
|
|
|
|
- if (strcmp(media_type, DOCKER_MANIFEST_SCHEMA1_JSON) == 0 || strcmp(media_type, DOCKER_MANIFEST_SCHEMA1_PRETTYJWS) == 0 ||
|
|
+ if (strcmp(media_type, DOCKER_MANIFEST_SCHEMA1_JSON) == 0 ||
|
|
+ strcmp(media_type, DOCKER_MANIFEST_SCHEMA1_PRETTYJWS) == 0 ||
|
|
strcmp(media_type, MEDIA_TYPE_APPLICATION_JSON) == 0) {
|
|
return true;
|
|
}
|
|
diff --git a/src/daemon/modules/network/cni_operator/libcni/invoke/libcni_exec.h b/src/daemon/modules/network/cni_operator/libcni/invoke/libcni_exec.h
|
|
index 48d8d8b6..10c14f05 100644
|
|
--- a/src/daemon/modules/network/cni_operator/libcni/invoke/libcni_exec.h
|
|
+++ b/src/daemon/modules/network/cni_operator/libcni/invoke/libcni_exec.h
|
|
@@ -36,7 +36,7 @@ struct cni_args {
|
|
void free_cni_args(struct cni_args *cargs);
|
|
|
|
int exec_plugin_with_result(const char *plugin_path, const char *cni_net_conf_json, const struct cni_args *cniargs,
|
|
- struct cni_opt_result **ret);
|
|
+ struct cni_opt_result **result);
|
|
|
|
int exec_plugin_without_result(const char *plugin_path, const char *cni_net_conf_json, const struct cni_args *cniargs);
|
|
|
|
diff --git a/src/daemon/modules/network/cri/adaptor_cri.c b/src/daemon/modules/network/cri/adaptor_cri.c
|
|
index 2d03dd98..55826d52 100644
|
|
--- a/src/daemon/modules/network/cri/adaptor_cri.c
|
|
+++ b/src/daemon/modules/network/cri/adaptor_cri.c
|
|
@@ -71,7 +71,7 @@ int adaptor_cni_update_confs()
|
|
size_t tmp_net_list_len = 0;
|
|
size_t i;
|
|
char message[MAX_BUFFER_SIZE] = { 0 };
|
|
- int pos = 0;
|
|
+ size_t pos = 0;
|
|
|
|
work = map_new(MAP_STR_INT, MAP_DEFAULT_CMP_FUNC, MAP_DEFAULT_FREE_FUNC);
|
|
if (work == NULL) {
|
|
diff --git a/src/daemon/modules/network/cri/adaptor_cri.h b/src/daemon/modules/network/cri/adaptor_cri.h
|
|
index 3d4fe82d..bc157626 100644
|
|
--- a/src/daemon/modules/network/cri/adaptor_cri.h
|
|
+++ b/src/daemon/modules/network/cri/adaptor_cri.h
|
|
@@ -23,9 +23,9 @@ extern "C" {
|
|
|
|
int adaptor_cni_init_confs(const char *conf_dir, const char **bin_paths, const size_t bin_paths_len);
|
|
|
|
-int adaptor_cni_update_confs();
|
|
+int adaptor_cni_update_confs(void);
|
|
|
|
-bool adaptor_cni_check_inited();
|
|
+bool adaptor_cni_check_inited(void);
|
|
|
|
int adaptor_cni_setup(const network_api_conf *conf, network_api_result_list *result);
|
|
|
|
diff --git a/src/daemon/modules/runtime/engines/lcr/lcr_rt_ops.c b/src/daemon/modules/runtime/engines/lcr/lcr_rt_ops.c
|
|
index a89d0375..64a8adbc 100644
|
|
--- a/src/daemon/modules/runtime/engines/lcr/lcr_rt_ops.c
|
|
+++ b/src/daemon/modules/runtime/engines/lcr/lcr_rt_ops.c
|
|
@@ -166,7 +166,8 @@ int rt_lcr_start(const char *name, const char *runtime, const rt_start_params_t
|
|
}
|
|
isulad_set_error_message("Start container error: %s",
|
|
(tmpmsg != NULL && strcmp(tmpmsg, DEF_SUCCESS_STR) != 0) ? tmpmsg : DEF_ERR_RUNTIME_STR);
|
|
- ERROR("Start container error: %s", (tmpmsg != NULL && strcmp(tmpmsg, DEF_SUCCESS_STR) != 0) ? tmpmsg : DEF_ERR_RUNTIME_STR);
|
|
+ ERROR("Start container error: %s", (tmpmsg != NULL &&
|
|
+ strcmp(tmpmsg, DEF_SUCCESS_STR) != 0) ? tmpmsg : DEF_ERR_RUNTIME_STR);
|
|
ret = -1;
|
|
goto out;
|
|
}
|
|
@@ -264,7 +265,8 @@ int rt_lcr_rm(const char *name, const char *runtime, const rt_rm_params_t *param
|
|
if (engine_ops == NULL || engine_ops->engine_delete_op == NULL) {
|
|
// if engine_ops is NULL, container root path may have been corrupted, try to remove by daemon
|
|
// If user runs container with lcr but remove lcr runtime after, there might be resources remaining
|
|
- ERROR("Failed to get engine delete operations, container %s root path may have been corrupted, try to remove by daemon", name);
|
|
+ ERROR("Failed to get engine delete operations, container %s root path may have been corrupted, try to remove by daemon",
|
|
+ name);
|
|
if (remove_container_rootpath(name, params->rootpath) == 0) {
|
|
ret = 0;
|
|
goto out;
|
|
diff --git a/src/daemon/modules/runtime/isula/isula_rt_ops.c b/src/daemon/modules/runtime/isula/isula_rt_ops.c
|
|
index 854752ea..62cff3cf 100644
|
|
--- a/src/daemon/modules/runtime/isula/isula_rt_ops.c
|
|
+++ b/src/daemon/modules/runtime/isula/isula_rt_ops.c
|
|
@@ -623,7 +623,8 @@ out:
|
|
return ret;
|
|
}
|
|
|
|
-static void transform_stats_info_from_runtime(shim_client_runtime_stats *stats, struct runtime_container_resources_stats_info *info)
|
|
+static void transform_stats_info_from_runtime(shim_client_runtime_stats *stats,
|
|
+ struct runtime_container_resources_stats_info *info)
|
|
{
|
|
size_t i;
|
|
if (stats == NULL || stats->data == NULL) {
|
|
@@ -887,7 +888,7 @@ static int shim_create(shim_create_args *args)
|
|
|
|
if (get_engine_routine_log_info(&engine_log_path, &log_level) != 0) {
|
|
ERROR("failed to get engine log path");
|
|
- return -1;
|
|
+ return -1;
|
|
}
|
|
|
|
nret = snprintf(fpid, sizeof(fpid), "%s/shim-pid", args->workdir);
|
|
@@ -938,7 +939,7 @@ static int shim_create(shim_create_args *args)
|
|
//prevent the child process from having the same standard streams as the parent process
|
|
if (isula_null_stdfds() != 0) {
|
|
(void)dprintf(exec_err_pipe[1], "failed to set std console to /dev/null");
|
|
- exit(EXIT_FAILURE);
|
|
+ exit(EXIT_FAILURE);
|
|
}
|
|
|
|
if (args->fg) {
|
|
@@ -1054,7 +1055,7 @@ out:
|
|
close(shim_stdout_pipe[0]);
|
|
if (ret != 0) {
|
|
show_shim_errlog(shim_stderr_pipe[0]);
|
|
- // Since users are more concerned about runtime error information,
|
|
+ // Since users are more concerned about runtime error information,
|
|
// the runtime log will overwrite the shim log if it exists.
|
|
show_runtime_errlog(args->workdir);
|
|
if (args->timeout != NULL) {
|
|
diff --git a/src/daemon/modules/service/service_container.c b/src/daemon/modules/service/service_container.c
|
|
index fe8ee72f..0b95cdad 100644
|
|
--- a/src/daemon/modules/service/service_container.c
|
|
+++ b/src/daemon/modules/service/service_container.c
|
|
@@ -691,7 +691,8 @@ out:
|
|
epoll_loop_close(&descr);
|
|
}
|
|
|
|
-static int do_oci_spec_update(const char *id, oci_runtime_spec *oci_spec, container_config *container_spec, host_config *hostconfig)
|
|
+static int do_oci_spec_update(const char *id, oci_runtime_spec *oci_spec, container_config *container_spec,
|
|
+ host_config *hostconfig)
|
|
{
|
|
int ret;
|
|
|
|
@@ -2013,7 +2014,7 @@ static defs_process *make_exec_process_spec(const container_config *container_sp
|
|
#ifdef ENABLE_CDI
|
|
// extend step: merge env from oci_spec which comes from injected devices
|
|
ret = defs_process_add_multiple_env(spec, (const char **)oci_spec->process->env,
|
|
- oci_spec->process->env_len);
|
|
+ oci_spec->process->env_len);
|
|
if (ret != 0) {
|
|
ERROR("Failed to dup oci env for exec process spec");
|
|
goto err_out;
|
|
diff --git a/src/daemon/modules/spec/specs.c b/src/daemon/modules/spec/specs.c
|
|
index e779c22e..122f9992 100644
|
|
--- a/src/daemon/modules/spec/specs.c
|
|
+++ b/src/daemon/modules/spec/specs.c
|
|
@@ -2483,7 +2483,8 @@ out:
|
|
return ret;
|
|
}
|
|
|
|
-int update_oci_ulimit(oci_runtime_spec *oci_spec, const host_config *hostconfig) {
|
|
+int update_oci_ulimit(oci_runtime_spec *oci_spec, const host_config *hostconfig)
|
|
+{
|
|
if (oci_spec == NULL || hostconfig == NULL) {
|
|
ERROR("Invalid arguments");
|
|
return -1;
|
|
@@ -2660,7 +2661,7 @@ int defs_process_add_multiple_env(defs_process *dp, const char **envs, size_t en
|
|
int spec_add_multiple_process_env(oci_runtime_spec *oci_spec, const char **envs, size_t env_len)
|
|
{
|
|
int ret = 0;
|
|
-
|
|
+
|
|
if (envs == NULL || env_len == 0) {
|
|
DEBUG("empty envs");
|
|
return 0;
|
|
@@ -2669,26 +2670,26 @@ int spec_add_multiple_process_env(oci_runtime_spec *oci_spec, const char **envs,
|
|
ERROR("Invalid params");
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
ret = make_sure_oci_spec_process(oci_spec);
|
|
if (ret < 0) {
|
|
ERROR("Out of memory");
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
ret = defs_process_add_multiple_env(oci_spec->process, envs, env_len);
|
|
if (ret < 0) {
|
|
ERROR("Failed to add envs");
|
|
}
|
|
-
|
|
+
|
|
return ret;
|
|
}
|
|
-
|
|
+
|
|
int spec_add_device(oci_runtime_spec *oci_spec, defs_device *device)
|
|
{
|
|
int ret = 0;
|
|
size_t i;
|
|
-
|
|
+
|
|
if (device == NULL) {
|
|
return -1;
|
|
}
|
|
@@ -2696,7 +2697,7 @@ int spec_add_device(oci_runtime_spec *oci_spec, defs_device *device)
|
|
if (ret < 0) {
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
for (i = 0; i < oci_spec->linux->devices_len; i++) {
|
|
if (strcmp(oci_spec->linux->devices[i]->path, device->path) == 0) {
|
|
free_defs_device(oci_spec->linux->devices[i]);
|
|
@@ -2712,21 +2713,21 @@ int spec_add_device(oci_runtime_spec *oci_spec, defs_device *device)
|
|
}
|
|
oci_spec->linux->devices[oci_spec->linux->devices_len] = device;
|
|
oci_spec->linux->devices_len++;
|
|
-
|
|
+
|
|
return 0;
|
|
}
|
|
-
|
|
+
|
|
int spec_add_linux_resources_device(oci_runtime_spec *oci_spec, bool allow, const char *dev_type,
|
|
int64_t major, int64_t minor, const char *access)
|
|
{
|
|
int ret = 0;
|
|
defs_device_cgroup *device = NULL;
|
|
-
|
|
+
|
|
ret = make_sure_oci_spec_linux_resources(oci_spec);
|
|
if (ret < 0) {
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
device = util_common_calloc_s(sizeof(*device));
|
|
if (device == NULL) {
|
|
ERROR("Out of memory");
|
|
@@ -2738,7 +2739,8 @@ int spec_add_linux_resources_device(oci_runtime_spec *oci_spec, bool allow, cons
|
|
device->major = major;
|
|
device->minor = minor;
|
|
|
|
- if (util_mem_realloc((void **)&oci_spec->linux->resources->devices, (oci_spec->linux->resources->devices_len + 1) * sizeof(char *),
|
|
+ if (util_mem_realloc((void **)&oci_spec->linux->resources->devices,
|
|
+ (oci_spec->linux->resources->devices_len + 1) * sizeof(char *),
|
|
(void *)oci_spec->linux->resources->devices, oci_spec->linux->resources->devices_len * sizeof(char *)) != 0) {
|
|
ERROR("Out of memory");
|
|
free_defs_device_cgroup(device);
|
|
@@ -2746,35 +2748,35 @@ int spec_add_linux_resources_device(oci_runtime_spec *oci_spec, bool allow, cons
|
|
}
|
|
oci_spec->linux->resources->devices[oci_spec->linux->resources->devices_len] = device;
|
|
oci_spec->linux->resources->devices_len++;
|
|
-
|
|
+
|
|
return 0;
|
|
}
|
|
-
|
|
+
|
|
void spec_remove_mount(oci_runtime_spec *oci_spec, const char *dest)
|
|
{
|
|
size_t i;
|
|
-
|
|
+
|
|
if (oci_spec == NULL || oci_spec->mounts == NULL || dest == NULL) {
|
|
return;
|
|
}
|
|
-
|
|
+
|
|
for (i = 0; i < oci_spec->mounts_len; i++) {
|
|
if (strcmp(oci_spec->mounts[i]->destination, dest) == 0) {
|
|
free_defs_mount(oci_spec->mounts[i]);
|
|
(void)memcpy((void **)&oci_spec->mounts[i], (void **)&oci_spec->mounts[i + 1],
|
|
- (oci_spec->mounts_len - i - 1) * sizeof(void *));
|
|
+ (oci_spec->mounts_len - i - 1) * sizeof(void *));
|
|
oci_spec->mounts_len--;
|
|
return;
|
|
}
|
|
}
|
|
}
|
|
-
|
|
+
|
|
int spec_add_mount(oci_runtime_spec *oci_spec, defs_mount *mnt)
|
|
{
|
|
if (oci_spec == NULL || mnt == NULL) {
|
|
return -1;
|
|
}
|
|
-
|
|
+
|
|
if (util_mem_realloc((void **)&oci_spec->mounts, (oci_spec->mounts_len + 1) * sizeof(char *),
|
|
(void *)oci_spec->mounts, oci_spec->mounts_len * sizeof(char *)) != 0) {
|
|
ERROR("Out of memory");
|
|
@@ -2782,10 +2784,10 @@ int spec_add_mount(oci_runtime_spec *oci_spec, defs_mount *mnt)
|
|
}
|
|
oci_spec->mounts[oci_spec->mounts_len] = mnt;
|
|
oci_spec->mounts_len++;
|
|
-
|
|
+
|
|
return 0;
|
|
}
|
|
-
|
|
+
|
|
#define SPEC_ADD_HOOKS_ITEM_DEF(hooktype) \
|
|
int spec_add_##hooktype##_hook(oci_runtime_spec *oci_spec, defs_hook *hooktype##_hook) \
|
|
{ \
|
|
@@ -2806,9 +2808,9 @@ int spec_add_mount(oci_runtime_spec *oci_spec, defs_mount *mnt)
|
|
oci_spec->hooks->hooktype##_len++; \
|
|
return 0; \
|
|
}
|
|
-
|
|
-/*
|
|
-* The OCI being used by the iSulad not supportes
|
|
+
|
|
+/*
|
|
+* The OCI being used by the iSulad not supportes
|
|
* createRuntime/createContainer/startContainer currently.
|
|
*/
|
|
SPEC_ADD_HOOKS_ITEM_DEF(prestart)
|
|
diff --git a/src/daemon/modules/spec/specs_mount.c b/src/daemon/modules/spec/specs_mount.c
|
|
index 12bd261b..2e065e3d 100644
|
|
--- a/src/daemon/modules/spec/specs_mount.c
|
|
+++ b/src/daemon/modules/spec/specs_mount.c
|
|
@@ -2871,7 +2871,7 @@ static inline int set_host_ipc_shm_path(container_config_v2_common_config *v2_sp
|
|
* 1. The user defined /dev/shm in mounts, which takes the first priority
|
|
* 2. If sharable is set in ipc mode (or by default ipc_mode is null), the container provides shm path,
|
|
* in the case of sandbox API is used, the sandbox module has already provided shm path
|
|
- * 3. Use the connected container's shm path if ipc_mode is set to container:<cid>,
|
|
+ * 3. Use the connected container's shm path if ipc_mode is set to container:<cid>,
|
|
* if connected containerd is a sandbox, use the sandbox's shm path
|
|
* 4. Use /dev/shm if ipc_mode is set to host
|
|
*/
|
|
@@ -3613,7 +3613,7 @@ int inject_CDI_devcies_for_oci_spec(oci_runtime_spec *oci_spec, host_config *hos
|
|
int ret = 0;
|
|
string_array devices_array = { 0 };
|
|
__isula_auto_free char *error = NULL;
|
|
-
|
|
+
|
|
if (oci_spec == NULL || hostconfig == NULL) {
|
|
ERROR("Invalid params");
|
|
return -1;
|
|
diff --git a/src/utils/cutils/blocking_queue.c b/src/utils/cutils/blocking_queue.c
|
|
index 9bdb2ca3..02059690 100644
|
|
--- a/src/utils/cutils/blocking_queue.c
|
|
+++ b/src/utils/cutils/blocking_queue.c
|
|
@@ -97,7 +97,8 @@ int blocking_queue_push(blocking_queue *queue, void *data)
|
|
return 0;
|
|
}
|
|
|
|
-int blocking_queue_pop(blocking_queue *queue, void **data) {
|
|
+int blocking_queue_pop(blocking_queue *queue, void **data)
|
|
+{
|
|
if (queue == NULL || data == NULL) {
|
|
ERROR("Invalid NULL arguments");
|
|
return -1;
|
|
diff --git a/src/utils/cutils/network_namespace.h b/src/utils/cutils/network_namespace.h
|
|
index 6ac7b28b..14410736 100644
|
|
--- a/src/utils/cutils/network_namespace.h
|
|
+++ b/src/utils/cutils/network_namespace.h
|
|
@@ -22,9 +22,9 @@
|
|
extern "C" {
|
|
#endif
|
|
|
|
-int prepare_network_namespace(const char *netns_path, const bool post_prepare_network, const int pid);
|
|
+int prepare_network_namespace(const char *netns_path, const bool post_setup_network, const int pid);
|
|
|
|
-int remove_network_namespace(const char *netns);
|
|
+int remove_network_namespace(const char *netns_path);
|
|
|
|
int create_network_namespace_file(const char *netns_path);
|
|
|
|
diff --git a/src/utils/cutils/utils_array.c b/src/utils/cutils/utils_array.c
|
|
index 72294005..6c7444f0 100644
|
|
--- a/src/utils/cutils/utils_array.c
|
|
+++ b/src/utils/cutils/utils_array.c
|
|
@@ -90,17 +90,17 @@ char **util_copy_array_by_len(char **array, size_t len)
|
|
{
|
|
char **new_array = NULL;
|
|
size_t i;
|
|
-
|
|
+
|
|
if (array == NULL || len == 0) {
|
|
return NULL;
|
|
}
|
|
-
|
|
+
|
|
new_array = util_smart_calloc_s(sizeof(char *), len);
|
|
if (new_array == NULL) {
|
|
ERROR("Out of memory");
|
|
return NULL;
|
|
}
|
|
-
|
|
+
|
|
for (i = 0; i < len; i++) {
|
|
new_array[i] = util_strdup_s(array[i]);
|
|
}
|
|
@@ -262,12 +262,12 @@ string_array *util_copy_string_array(string_array *sarr)
|
|
{
|
|
string_array *ptr = NULL;
|
|
size_t i;
|
|
-
|
|
+
|
|
if (sarr == NULL) {
|
|
ERROR("Invalid string array");
|
|
return NULL;
|
|
}
|
|
-
|
|
+
|
|
ptr = util_string_array_new(sarr->cap);
|
|
if (ptr == NULL) {
|
|
ERROR("Out of memory");
|
|
@@ -277,7 +277,7 @@ string_array *util_copy_string_array(string_array *sarr)
|
|
ptr->items[i] = util_strdup_s(sarr->items[i]);
|
|
ptr->len += 1;
|
|
}
|
|
-
|
|
+
|
|
return ptr;
|
|
}
|
|
|
|
diff --git a/src/utils/cutils/utils_port.h b/src/utils/cutils/utils_port.h
|
|
index dbbf2a5a..ae1676f2 100644
|
|
--- a/src/utils/cutils/utils_port.h
|
|
+++ b/src/utils/cutils/utils_port.h
|
|
@@ -66,7 +66,7 @@ void util_free_network_port(struct network_port *ptr);
|
|
|
|
bool util_valid_proto(const char *proto);
|
|
|
|
-int util_get_random_port();
|
|
+int util_get_random_port(void);
|
|
|
|
static inline bool is_valid_port(const int port)
|
|
{
|
|
diff --git a/src/utils/cutils/utils_verify.c b/src/utils/cutils/utils_verify.c
|
|
index 6f1da12c..0d7c17f4 100644
|
|
--- a/src/utils/cutils/utils_verify.c
|
|
+++ b/src/utils/cutils/utils_verify.c
|
|
@@ -540,8 +540,8 @@ bool util_valid_propagation_mode(const char *mode)
|
|
if (mode == NULL) {
|
|
return false;
|
|
}
|
|
- return strcmp(mode, "private") == 0 || strcmp(mode, "rprivate") == 0 || strcmp(mode, "slave") == 0 || strcmp(mode, "rslave") == 0 ||
|
|
- strcmp(mode, "shared") == 0 || strcmp(mode, "rshared") == 0;
|
|
+ return strcmp(mode, "private") == 0 || strcmp(mode, "rprivate") == 0 || strcmp(mode, "slave") == 0 ||
|
|
+ strcmp(mode, "rslave") == 0 || strcmp(mode, "shared") == 0 || strcmp(mode, "rshared") == 0;
|
|
}
|
|
|
|
bool util_valid_mount_mode(const char *mode)
|
|
diff --git a/src/utils/progress/show.h b/src/utils/progress/show.h
|
|
index c1f71d86..1942db8e 100644
|
|
--- a/src/utils/progress/show.h
|
|
+++ b/src/utils/progress/show.h
|
|
@@ -21,11 +21,11 @@ extern "C" {
|
|
#endif
|
|
|
|
void move_to_row(int row);
|
|
-void move_cursor_up(int lines);
|
|
+void move_cursor_up(int rows);
|
|
void clear_row(int row);
|
|
-void clear_lines_below();
|
|
-int get_current_row();
|
|
-int get_terminal_width();
|
|
+void clear_lines_below(void);
|
|
+int get_current_row(void);
|
|
+int get_terminal_width(void);
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
diff --git a/src/utils/tar/isulad_tar.c b/src/utils/tar/isulad_tar.c
|
|
index 13343922..29008420 100644
|
|
--- a/src/utils/tar/isulad_tar.c
|
|
+++ b/src/utils/tar/isulad_tar.c
|
|
@@ -445,7 +445,7 @@ static int tar_resource_rebase(const char *path, const char *rebase, const char
|
|
ERROR("Can not split path: %s", path);
|
|
goto cleanup;
|
|
}
|
|
-
|
|
+
|
|
if (realpath(srcdir, cleanpath) == NULL) {
|
|
ERROR("Failed to get real path for %s", srcdir);
|
|
goto cleanup;
|
|
diff --git a/test/cgroup/cpu/cgroup_cpu_ut.cc b/test/cgroup/cpu/cgroup_cpu_ut.cc
|
|
index 6e6e04f4..16eec69b 100644
|
|
--- a/test/cgroup/cpu/cgroup_cpu_ut.cc
|
|
+++ b/test/cgroup/cpu/cgroup_cpu_ut.cc
|
|
@@ -80,7 +80,7 @@ TEST(CgroupCpuUnitTest, test_sysinfo_cgroup_controller_cpurt_mnt_path)
|
|
{
|
|
MOCK_SET(util_common_calloc_s, nullptr);
|
|
ASSERT_EQ(get_sys_info(true), nullptr);
|
|
-
|
|
+
|
|
int ret = cgroup_ops_init();
|
|
ASSERT_EQ(ret, 0);
|
|
|
|
--
|
|
2.25.1
|
|
|