nsjconf->iface_vs_gw = "0.0.0.0";
nsjconf->orig_uid = getuid();
nsjconf->num_cpus = sysconf(_SC_NPROCESSORS_ONLN);
- nsjconf->seccomp_fprog.filter = NULL;
- nsjconf->seccomp_fprog.len = 0;
+ nsjconf->seccomp_fprog.filter = NULL;
+ nsjconf->seccomp_fprog.len = 0;
nsjconf->openfds.push_back(STDIN_FILENO);
nsjconf->openfds.push_back(STDOUT_FILENO);
nsjconf->gids.push_back(gid);
}
- for (size_t i = optind; optind < argc; i++) {
- nsjconf->argv[i] = argv[optind];
+ for (int i = optind; i < argc; i++) {
+ nsjconf->argv.push_back(argv[i]);
}
if (nsjconf->argv.empty()) {
cmdlineUsage(argv[0]);
LOG_F("Couldn't prepare sandboxing policy");
}
- int ret = 0;
+ int ret = 0;
if (nsjconf->mode == MODE_LISTEN_TCP) {
nsjailListenMode(nsjconf.get());
} else {
ret = nsjailStandaloneMode(nsjconf.get());
}
- sandbox::closePolicy(nsjconf.get());
+ sandbox::closePolicy(nsjconf.get());
return ret;
}
}
void closePolicy(nsjconf_t* nsjconf) {
- if (!nsjconf->seccomp_fprog.filter) {
- return;
- }
- free(nsjconf->seccomp_fprog.filter);
- nsjconf->seccomp_fprog.filter = nullptr;
- nsjconf->seccomp_fprog.len = 0;
+ if (!nsjconf->seccomp_fprog.filter) {
+ return;
+ }
+ free(nsjconf->seccomp_fprog.filter);
+ nsjconf->seccomp_fprog.filter = nullptr;
+ nsjconf->seccomp_fprog.len = 0;
}
} // namespace sandbox