summaryrefslogtreecommitdiff
path: root/src/shared/bootspec.c
diff options
context:
space:
mode:
authorJan Janssen <medhefgo@web.de>2022-06-19 15:35:47 +0200
committerYu Watanabe <watanabe.yu+github@gmail.com>2022-06-23 01:34:28 +0900
commit35148e8ff9228e5cb27a33e57042ed82f613fcbb (patch)
tree132982158455d61bf3a54510838fa230335f0b50 /src/shared/bootspec.c
parent46355675f7e0bfc6890d0401180d73eb4621896d (diff)
downloadsystemd-35148e8ff9228e5cb27a33e57042ed82f613fcbb.tar.gz
bootspec: Add PE file name to log messages
Fixes: #23783
Diffstat (limited to 'src/shared/bootspec.c')
-rw-r--r--src/shared/bootspec.c37
1 files changed, 19 insertions, 18 deletions
diff --git a/src/shared/bootspec.c b/src/shared/bootspec.c
index 123db59575..2c0ec6c272 100644
--- a/src/shared/bootspec.c
+++ b/src/shared/bootspec.c
@@ -547,6 +547,7 @@ static int boot_entry_load_unified(
static int find_sections(
int fd,
+ const char *path,
char **ret_osrelease,
char **ret_cmdline) {
@@ -557,28 +558,28 @@ static int find_sections(
struct DosFileHeader dos;
n = pread(fd, &dos, sizeof(dos), 0);
if (n < 0)
- return log_error_errno(errno, "Failed read DOS header: %m");
+ return log_warning_errno(errno, "%s: Failed to read DOS header, ignoring: %m", path);
if (n != sizeof(dos))
- return log_error_errno(SYNTHETIC_ERRNO(EIO), "Short read while reading DOS header, refusing.");
+ return log_warning_errno(SYNTHETIC_ERRNO(EIO), "%s: Short read while reading DOS header, ignoring.", path);
if (dos.Magic[0] != 'M' || dos.Magic[1] != 'Z')
- return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "DOS executable magic missing, refusing.");
+ return log_warning_errno(SYNTHETIC_ERRNO(EBADMSG), "%s: DOS executable magic missing, ignoring.", path);
uint64_t start = unaligned_read_le32(&dos.ExeHeader);
struct PeHeader pe;
n = pread(fd, &pe, sizeof(pe), start);
if (n < 0)
- return log_error_errno(errno, "Failed to read PE header: %m");
+ return log_warning_errno(errno, "%s: Failed to read PE header, ignoring: %m", path);
if (n != sizeof(pe))
- return log_error_errno(SYNTHETIC_ERRNO(EIO), "Short read while reading PE header, refusing.");
+ return log_warning_errno(SYNTHETIC_ERRNO(EIO), "%s: Short read while reading PE header, ignoring.", path);
if (pe.Magic[0] != 'P' || pe.Magic[1] != 'E' || pe.Magic[2] != 0 || pe.Magic[3] != 0)
- return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "PE executable magic missing, refusing.");
+ return log_warning_errno(SYNTHETIC_ERRNO(EBADMSG), "%s: PE executable magic missing, ignoring.", path);
size_t n_sections = unaligned_read_le16(&pe.FileHeader.NumberOfSections);
if (n_sections > 96)
- return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "PE header has too many sections, refusing.");
+ return log_warning_errno(SYNTHETIC_ERRNO(EBADMSG), "%s: PE header has too many sections, ignoring.", path);
sections = new(struct PeSectionHeader, n_sections);
if (!sections)
@@ -588,9 +589,9 @@ static int find_sections(
n_sections * sizeof(struct PeSectionHeader),
start + sizeof(pe) + unaligned_read_le16(&pe.FileHeader.SizeOfOptionalHeader));
if (n < 0)
- return log_error_errno(errno, "Failed to read section data: %m");
+ return log_warning_errno(errno, "%s: Failed to read section data, ignoring: %m", path);
if ((size_t) n != n_sections * sizeof(struct PeSectionHeader))
- return log_error_errno(SYNTHETIC_ERRNO(EIO), "Short read while reading sections, refusing.");
+ return log_warning_errno(SYNTHETIC_ERRNO(EIO), "%s: Short read while reading sections, ignoring.", path);
for (size_t i = 0; i < n_sections; i++) {
_cleanup_free_ char *k = NULL;
@@ -605,13 +606,13 @@ static int find_sections(
continue;
if (*b)
- return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Duplicate section %s, refusing.", sections[i].Name);
+ return log_warning_errno(SYNTHETIC_ERRNO(EBADMSG), "%s: Duplicate section %s, ignoring.", path, sections[i].Name);
offset = unaligned_read_le32(&sections[i].PointerToRawData);
size = unaligned_read_le32(&sections[i].VirtualSize);
if (size > PE_SECTION_SIZE_MAX)
- return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Section %s too large, refusing.", sections[i].Name);
+ return log_warning_errno(SYNTHETIC_ERRNO(EBADMSG), "%s: Section %s too large, ignoring.", path, sections[i].Name);
k = new(char, size+1);
if (!k)
@@ -619,20 +620,20 @@ static int find_sections(
n = pread(fd, k, size, offset);
if (n < 0)
- return log_error_errno(errno, "Failed to read section payload: %m");
+ return log_warning_errno(errno, "%s: Failed to read section payload, ignoring: %m", path);
if ((size_t) n != size)
- return log_error_errno(SYNTHETIC_ERRNO(EIO), "Short read while reading section payload, refusing:");
+ return log_warning_errno(SYNTHETIC_ERRNO(EIO), "%s: Short read while reading section payload, ignoring:", path);
/* Allow one trailing NUL byte, but nothing more. */
if (size > 0 && memchr(k, 0, size - 1))
- return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Section contains embedded NUL byte: %m");
+ return log_warning_errno(SYNTHETIC_ERRNO(EBADMSG), "%s: Section contains embedded NUL byte, ignoring.", path);
k[size] = 0;
*b = TAKE_PTR(k);
}
if (!osrelease)
- return log_error_errno(SYNTHETIC_ERRNO(EBADMSG), "Image lacks .osrel section, refusing.");
+ return log_warning_errno(SYNTHETIC_ERRNO(EBADMSG), "%s: Image lacks .osrel section, ignoring.", path);
if (ret_osrelease)
*ret_osrelease = TAKE_PTR(osrelease);
@@ -686,13 +687,13 @@ static int boot_entries_find_unified(
if (r == 0) /* inode already seen or otherwise not relevant */
continue;
- if (find_sections(fd, &osrelease, &cmdline) < 0)
- continue;
-
j = path_join(dir, de->d_name);
if (!j)
return log_oom();
+ if (find_sections(fd, j, &osrelease, &cmdline) < 0)
+ continue;
+
r = boot_entry_load_unified(root, j, osrelease, cmdline, config->entries + config->n_entries);
if (r < 0)
continue;