r = reset_signal_mask();
if (r < 0) {
*exit_status = EXIT_SIGNAL_MASK;
- *error_message = strdup("Failed to reset signal mask");
+ *error_message = strdup("Failed to set process signal mask");
/* If strdup fails, here and below, we will just print the generic error message. */
return r;
}
r = close_remaining_fds(params, runtime, dcreds, user_lookup_fd, socket_fd, fds, n_fds);
if (r < 0) {
*exit_status = EXIT_FDS;
- *error_message = strdup("Failed to close remaining fds");
+ *error_message = strdup("Failed to close unwanted file descriptors");
return r;
}
if (!context->same_pgrp)
if (setsid() < 0) {
*exit_status = EXIT_SETSID;
+ *error_message = strdup("Failed to create new process session");
return -errno;
}
cmdline = exec_command_line(argv);
if (!cmdline) {
- *exit_status = EXIT_CONFIRM;
+ *exit_status = EXIT_MEMORY;
return -ENOMEM;
}
return 0;
}
*exit_status = EXIT_CONFIRM;
- *error_message = strdup("Execution cancelled");
+ *error_message = strdup("Execution cancelled by the user");
return -ECANCELED;
}
}
r = setup_input(context, params, socket_fd, named_iofds);
if (r < 0) {
*exit_status = EXIT_STDIN;
- *error_message = strdup("Failed to set up stdin");
+ *error_message = strdup("Failed to set up standard input");
return r;
}
r = setup_output(unit, context, params, STDOUT_FILENO, socket_fd, named_iofds, basename(command->path), uid, gid, &journal_stream_dev, &journal_stream_ino);
if (r < 0) {
*exit_status = EXIT_STDOUT;
- *error_message = strdup("Failed to set up stdout");
+ *error_message = strdup("Failed to set up standard output");
return r;
}
r = setup_output(unit, context, params, STDERR_FILENO, socket_fd, named_iofds, basename(command->path), uid, gid, &journal_stream_dev, &journal_stream_ino);
if (r < 0) {
*exit_status = EXIT_STDERR;
- *error_message = strdup("Failed to set up stderr");
+ *error_message = strdup("Failed to set up standard error output");
return r;
}
log_close();
} else if (r < 0) {
*exit_status = EXIT_OOM_ADJUST;
- *error_message = strdup("Failed to write /proc/self/oom_score_adj");
+ *error_message = strdup("Failed to adjust OOM setting");
return -errno;
}
}
if (context->nice_set)
if (setpriority(PRIO_PROCESS, 0, context->nice) < 0) {
*exit_status = EXIT_NICE;
+ *error_message = strdup("Failed to set up process scheduling priority (nice level");
return -errno;
}
¶m);
if (r < 0) {
*exit_status = EXIT_SETSCHEDULER;
+ *error_message = strdup("Failed to set up CPU scheduling");
return -errno;
}
}
if (context->cpuset)
if (sched_setaffinity(0, CPU_ALLOC_SIZE(context->cpuset_ncpus), context->cpuset) < 0) {
*exit_status = EXIT_CPUAFFINITY;
+ *error_message = strdup("Failed to set up CPU affinity");
return -errno;
}
if (context->ioprio_set)
if (ioprio_set(IOPRIO_WHO_PROCESS, 0, context->ioprio) < 0) {
*exit_status = EXIT_IOPRIO;
+ *error_message = strdup("Failed to set up IO scheduling priority");
return -errno;
}
if (context->timer_slack_nsec != NSEC_INFINITY)
if (prctl(PR_SET_TIMERSLACK, context->timer_slack_nsec) < 0) {
*exit_status = EXIT_TIMERSLACK;
+ *error_message = strdup("Failed to set up timer slack");
return -errno;
}
r = safe_personality(context->personality);
if (r < 0) {
*exit_status = EXIT_PERSONALITY;
+ *error_message = strdup("Failed to set up execution domain (personality)");
return r;
}
}
r = chown_terminal(STDIN_FILENO, uid);
if (r < 0) {
*exit_status = EXIT_STDIN;
+ *error_message = strdup("Failed to change ownership of terminal");
return r;
}
}
r = cg_set_task_access(SYSTEMD_CGROUP_CONTROLLER, params->cgroup_path, 0644, uid, gid);
if (r < 0) {
*exit_status = EXIT_CGROUP;
+ *error_message = strdup("Failed to adjust control group access");
return r;
}
r = cg_set_group_access(SYSTEMD_CGROUP_CONTROLLER, params->cgroup_path, 0755, uid, gid);
if (r < 0) {
*exit_status = EXIT_CGROUP;
+ *error_message = strdup("Failed to adjust control group access");
return r;
}
}
for (dt = 0; dt < _EXEC_DIRECTORY_MAX; dt++) {
r = setup_exec_directory(context, params, uid, gid, dt, exit_status);
- if (r < 0)
+ if (r < 0) {
+ *error_message = strdup("Failed to set up special execution directory");
return r;
+ }
}
r = build_environment(
r = setup_keyring(unit, params, uid, gid);
if (r < 0) {
*exit_status = EXIT_KEYRING;
+ *error_message = strdup("Failed to set up kernel keyring");
return r;
}
r = setup_pam(context->pam_name, username, uid, gid, context->tty_path, &accum_env, fds, n_fds);
if (r < 0) {
*exit_status = EXIT_PAM;
+ *error_message = strdup("Failed to set up PAM session");
return r;
}
}
r = setup_netns(runtime->netns_storage_socket);
if (r < 0) {
*exit_status = EXIT_NETWORK;
+ *error_message = strdup("Failed to set up network namespacing");
return r;
}
}
r = apply_mount_namespace(unit, command, context, params, runtime);
if (r < 0) {
*exit_status = EXIT_NAMESPACE;
+ *error_message = strdup("Failed to set up mount namespacing");
return r;
}
}
/* Apply just after mount namespace setup */
r = apply_working_directory(context, params, home, needs_mount_namespace, exit_status);
- if (r < 0)
+ if (r < 0) {
+ *error_message = strdup("Changing to the requested working directory failed");
return r;
+ }
/* Drop groups as early as possbile */
if (needs_setuid) {
r = enforce_groups(context, gid, supplementary_gids, ngids);
if (r < 0) {
+ *error_message = strdup("Changing group credentials failed");
*exit_status = EXIT_GROUP;
return r;
}
if (use_selinux && params->selinux_context_net && socket_fd >= 0) {
r = mac_selinux_get_child_mls_label(socket_fd, command->path, context->selinux_context, &mac_selinux_context_net);
if (r < 0) {
+ *error_message = strdup("Failed to determine SELinux context");
*exit_status = EXIT_SELINUX_CONTEXT;
return r;
}
if (context->private_users) {
r = setup_private_users(uid, gid);
if (r < 0) {
+ *error_message = strdup("Failed to set up user namespacing");
*exit_status = EXIT_USER;
return r;
}
if (r >= 0)
r = flags_fds(fds, n_storage_fds, n_socket_fds, context->non_blocking);
if (r < 0) {
+ *error_message = strdup("Failed to adjust passed file descriptors");
*exit_status = EXIT_FDS;
return r;
}
r = setrlimit_closest(i, context->rlimit[i]);
if (r < 0) {
+ *error_message = strdup("Failed to adjust resource limits");
*exit_status = EXIT_LIMITS;
return r;
}
/* Set the RTPRIO resource limit to 0, but only if nothing else was explicitly requested. */
if (context->restrict_realtime && !context->rlimit[RLIMIT_RTPRIO]) {
if (setrlimit(RLIMIT_RTPRIO, &RLIMIT_MAKE_CONST(0)) < 0) {
+ *error_message = strdup("Failed to adjust RLIMIT_RTPRIO resource limit");
*exit_status = EXIT_LIMITS;
return -errno;
}
r = setexeccon(exec_context);
if (r < 0) {
*exit_status = EXIT_SELINUX_CONTEXT;
- (void) asprintf(error_message, "Failed to set SELinux context to %s", exec_context);
+ (void) asprintf(error_message, "Failed to change SELinux context to %s", exec_context);
return r;
}
}
if (prctl(PR_GET_SECUREBITS) != secure_bits)
if (prctl(PR_SET_SECUREBITS, secure_bits) < 0) {
*exit_status = EXIT_SECUREBITS;
- *error_message = strdup("Failed to set secure bits");
+ *error_message = strdup("Failed to set process secure bits");
return -errno;
}
r = apply_syscall_filter(unit, context, needs_ambient_hack);
if (r < 0) {
*exit_status = EXIT_SECCOMP;
- *error_message = strdup("Failed to apply syscall filters");
+ *error_message = strdup("Failed to apply system call filters");
return r;
}
#endif