Просмотр исходного кода

Use the proper syscall in sandbox error messages

Fixes #22750.
cypherpunks 6 лет назад
Родитель
Сommit
c79e286386
2 измененных файлов с 6 добавлено и 3 удалено
  1. 3 0
      changes/ticket22750
  2. 3 3
      src/common/sandbox.c

+ 3 - 0
changes/ticket22750

@@ -0,0 +1,3 @@
+  o Minor bugfixes (logging, sandbox):
+    - Use the correct system call in sandbox error messages. Fixes bug
+      22750; bugfix on 0.2.5.1-alpha.

+ 3 - 3
src/common/sandbox.c

@@ -480,7 +480,7 @@ sb_chmod(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
       rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chmod),
             SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
       if (rc != 0) {
-        log_err(LD_BUG,"(Sandbox) failed to add open syscall, received "
+        log_err(LD_BUG,"(Sandbox) failed to add chmod syscall, received "
             "libseccomp error %d", rc);
         return rc;
       }
@@ -505,7 +505,7 @@ sb_chown(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
       rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(chown),
             SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
       if (rc != 0) {
-        log_err(LD_BUG,"(Sandbox) failed to add open syscall, received "
+        log_err(LD_BUG,"(Sandbox) failed to add chown syscall, received "
             "libseccomp error %d", rc);
         return rc;
       }
@@ -1037,7 +1037,7 @@ sb_stat64(scmp_filter_ctx ctx, sandbox_cfg_t *filter)
       rc = seccomp_rule_add_1(ctx, SCMP_ACT_ALLOW, SCMP_SYS(stat64),
           SCMP_CMP_STR(0, SCMP_CMP_EQ, param->value));
       if (rc != 0) {
-        log_err(LD_BUG,"(Sandbox) failed to add open syscall, received "
+        log_err(LD_BUG,"(Sandbox) failed to add stat64 syscall, received "
             "libseccomp  error %d", rc);
         return rc;
       }