char **adminSockfile)
{
if (privileged) {
- if (VIR_STRDUP(*sockfile, RUNSTATEDIR "/libvirt/virtlockd-sock") < 0 ||
- VIR_STRDUP(*adminSockfile, RUNSTATEDIR "/libvirt/virtlockd-admin-sock") < 0)
- goto error;
+ *sockfile = g_strdup(RUNSTATEDIR "/libvirt/virtlockd-sock");
+ *adminSockfile = g_strdup(RUNSTATEDIR "/libvirt/virtlockd-admin-sock");
} else {
char *rundir = NULL;
mode_t old_umask;
_("Missing ownerName data in JSON document"));
goto error;
}
- if (VIR_STRDUP(priv->ownerName, ownerName) < 0)
- goto error;
+ priv->ownerName = g_strdup(ownerName);
if (!(ownerUUID = virJSONValueObjectGetString(object, "ownerUUID"))) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("Missing ownerUUID data in JSON document"));
char **state_file)
{
if (privileged) {
- if (VIR_STRDUP(*state_file, RUNSTATEDIR "/virtlockd-restart-exec.json") < 0)
- goto error;
+ *state_file = g_strdup(RUNSTATEDIR "/virtlockd-restart-exec.json");
} else {
char *rundir = NULL;
mode_t old_umask;
case 'p':
VIR_FREE(pid_file);
- if (VIR_STRDUP_QUIET(pid_file, optarg) < 0)
- goto no_memory;
+ pid_file = g_strdup(optarg);
break;
case 'f':
VIR_FREE(remote_config_file);
- if (VIR_STRDUP_QUIET(remote_config_file, optarg) < 0)
- goto no_memory;
+ remote_config_file = g_strdup(optarg);
break;
case 'V':
/* Ensure the rundir exists (on tmpfs on some systems) */
if (privileged) {
- if (VIR_STRDUP_QUIET(run_dir, RUNSTATEDIR "/libvirt") < 0)
- goto no_memory;
+ run_dir = g_strdup(RUNSTATEDIR "/libvirt");
} else {
if (!(run_dir = virGetUserRuntimeDirectory())) {
VIR_ERROR(_("Can't determine user directory"));
VIR_FREE(run_dir);
virLockDaemonConfigFree(config);
return ret;
-
- no_memory:
- VIR_ERROR(_("Can't allocate memory"));
- exit(EXIT_FAILURE);
}
virLockDaemonConfigFilePath(bool privileged, char **configfile)
{
if (privileged) {
- if (VIR_STRDUP(*configfile, SYSCONFDIR "/libvirt/virtlockd.conf") < 0)
- goto error;
+ *configfile = g_strdup(SYSCONFDIR "/libvirt/virtlockd.conf");
} else {
char *configdir = NULL;
goto cleanup;
}
- if (VIR_STRDUP(priv->ownerName, args->owner.name) < 0)
- goto cleanup;
+ priv->ownerName = g_strdup(args->owner.name);
memcpy(priv->ownerUUID, args->owner.uuid, VIR_UUID_BUFLEN);
priv->ownerId = args->owner.id;
priv->ownerPid = args->owner.pid;
{
char *path;
if (privileged) {
- if (VIR_STRDUP(path, RUNSTATEDIR "/libvirt/virtlockd-sock") < 0)
- return NULL;
+ path = g_strdup(RUNSTATEDIR "/libvirt/virtlockd-sock");
} else {
char *rundir = NULL;
if (STREQ(params[i].key, "uuid")) {
memcpy(priv->uuid, params[i].value.uuid, VIR_UUID_BUFLEN);
} else if (STREQ(params[i].key, "name")) {
- if (VIR_STRDUP(priv->name, params[i].value.str) < 0)
- goto cleanup;
+ priv->name = g_strdup(params[i].value.str);
} else if (STREQ(params[i].key, "id")) {
priv->id = params[i].value.iv;
} else if (STREQ(params[i].key, "pid")) {
if (newName) {
VIR_DEBUG("Got an LVM UUID %s for %s", newName, name);
- if (VIR_STRDUP(newLockspace, driver->lvmLockSpaceDir) < 0)
- goto cleanup;
+ newLockspace = g_strdup(driver->lvmLockSpaceDir);
autoCreate = true;
break;
}
if (newName) {
VIR_DEBUG("Got an SCSI ID %s for %s", newName, name);
- if (VIR_STRDUP(newLockspace, driver->scsiLockSpaceDir) < 0)
- goto cleanup;
+ newLockspace = g_strdup(driver->scsiLockSpaceDir);
autoCreate = true;
break;
}
}
if (driver->fileLockSpaceDir) {
- if (VIR_STRDUP(newLockspace, driver->fileLockSpaceDir) < 0)
- goto cleanup;
+ newLockspace = g_strdup(driver->fileLockSpaceDir);
if (virCryptoHashString(VIR_CRYPTO_HASH_SHA256, name, &newName) < 0)
goto cleanup;
autoCreate = true;
VIR_DEBUG("Using indirect lease %s for %s", newName, name);
} else {
- if (VIR_STRDUP(newLockspace, "") < 0)
- goto cleanup;
- if (VIR_STRDUP(newName, name) < 0)
- goto cleanup;
+ newLockspace = g_strdup("");
+ newName = g_strdup(name);
VIR_DEBUG("Using direct lease for %s", name);
}
if (virAsprintf(&newLockspace, "%s/%s",
path, lockspace) < 0)
goto cleanup;
- if (VIR_STRDUP(newName, name) < 0)
- goto cleanup;
+ newName = g_strdup(name);
} break;
default:
driver->io_timeout = 0;
driver->user = (uid_t) -1;
driver->group = (gid_t) -1;
- if (VIR_STRDUP(driver->autoDiskLeasePath, LOCALSTATEDIR "/lib/libvirt/sanlock") < 0) {
- VIR_FREE(driver);
- goto error;
- }
+ driver->autoDiskLeasePath = g_strdup(LOCALSTATEDIR "/lib/libvirt/sanlock");
if (virLockManagerSanlockLoadConfig(driver, configFile) < 0)
goto error;
if (STREQ(param->key, "uuid")) {
memcpy(priv->vm_uuid, param->value.uuid, 16);
} else if (STREQ(param->key, "name")) {
- if (VIR_STRDUP(priv->vm_name, param->value.str) < 0)
- goto error;
+ priv->vm_name = g_strdup(param->value.str);
} else if (STREQ(param->key, "pid")) {
priv->vm_pid = param->value.iv;
} else if (STREQ(param->key, "id")) {
lock->privateData = priv;
return 0;
-
- error:
- VIR_FREE(priv);
- return -1;
}
static void virLockManagerSanlockFree(virLockManagerPtr lock)
plugin->driver = driver;
plugin->handle = handle;
plugin->refs = 1;
- if (VIR_STRDUP(plugin->name, name) < 0)
- goto cleanup;
+ plugin->name = g_strdup(name);
VIR_FREE(configFile);
VIR_FREE(modfile);