summaryrefslogtreecommitdiff
path: root/0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-10-16 08:21:17 +0000
committerCoprDistGit <infra@openeuler.org>2023-10-16 08:21:17 +0000
commit5a30c52fd5f03e11a1e7a998731c59a31477eba9 (patch)
tree6e73a07585bfafeae4404d2247436ed13d337457 /0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch
parentbe5fbac390ac42956df062b5585d96b3ae5db1df (diff)
automatic import of iSuladopeneuler23.09
Diffstat (limited to '0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch')
-rw-r--r--0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch1575
1 files changed, 1575 insertions, 0 deletions
diff --git a/0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch b/0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch
new file mode 100644
index 0000000..59f63d7
--- /dev/null
+++ b/0018-make-sure-the-input-parameter-is-not-empty-and-optim.patch
@@ -0,0 +1,1575 @@
+From c6442b5805d39d8749a1016e2932543a130f16dc Mon Sep 17 00:00:00 2001
+From: zhongtao <zhongtao17@huawei.com>
+Date: Fri, 25 Aug 2023 17:34:12 +0800
+Subject: [PATCH 18/33] make sure the input parameter is not empty and optimize
+ the code
+
+Signed-off-by: zhongtao <zhongtao17@huawei.com>
+---
+ src/daemon/modules/api/image_api.h | 2 +-
+ src/daemon/modules/image/external/ext_image.c | 8 ++-
+ src/daemon/modules/image/image.c | 47 +++++++++++-----
+ src/daemon/modules/image/image_spec_merge.c | 2 +-
+ .../modules/image/oci/oci_common_operators.c | 9 ++-
+ src/daemon/modules/image/oci/oci_image.c | 8 +--
+ src/daemon/modules/image/oci/oci_image.h | 2 +-
+ src/daemon/modules/image/oci/oci_image_type.h | 42 --------------
+ src/daemon/modules/image/oci/oci_import.c | 1 +
+ src/daemon/modules/image/oci/oci_load.c | 10 +---
+ src/daemon/modules/image/oci/oci_load.h | 2 +-
+ src/daemon/modules/image/oci/oci_login.c | 2 +-
+ src/daemon/modules/image/oci/oci_logout.c | 2 +-
+ src/daemon/modules/image/oci/oci_pull.c | 4 +-
+ .../image/oci/registry/registry_apiv2.c | 2 +-
+ .../oci/storage/image_store/image_store.c | 45 ++++++++++++---
+ .../oci/storage/image_store/image_store.h | 4 +-
+ .../graphdriver/devmapper/deviceset.c | 10 ++--
+ .../graphdriver/devmapper/driver_devmapper.c | 4 +-
+ .../graphdriver/devmapper/wrapper_devmapper.c | 14 +++--
+ .../graphdriver/devmapper/wrapper_devmapper.h | 8 +--
+ .../graphdriver/overlay2/driver_overlay2.c | 17 +++---
+ .../graphdriver/overlay2/driver_overlay2.h | 2 -
+ .../image/oci/storage/layer_store/layer.c | 2 +-
+ .../image/oci/storage/layer_store/layer.h | 2 +-
+ .../oci/storage/layer_store/layer_store.c | 55 ++++++++-----------
+ .../oci/storage/layer_store/layer_store.h | 8 +--
+ .../remote_layer_support/image_remote_impl.c | 12 +++-
+ .../remote_layer_support/layer_remote_impl.c | 10 ++++
+ .../overlay_remote_impl.c | 10 ++++
+ .../remote_layer_support/remote_support.c | 5 ++
+ .../ro_symlink_maintain.c | 11 +++-
+ .../oci/storage/rootfs_store/rootfs_store.c | 8 +--
+ .../oci/storage/rootfs_store/rootfs_store.h | 6 +-
+ .../modules/image/oci/storage/storage.c | 35 ++++++++++--
+ .../modules/image/oci/storage/storage.h | 6 +-
+ src/daemon/modules/image/oci/utils_images.c | 7 ++-
+ src/daemon/modules/image/oci/utils_images.h | 2 +-
+ src/utils/http/http.h | 2 +
+ .../oci/storage/layers/storage_driver_ut.cc | 10 +---
+ .../oci/storage/layers/storage_layers_ut.cc | 34 ------------
+ test/mocks/driver_overlay2_mock.cc | 8 ---
+ test/mocks/driver_overlay2_mock.h | 1 -
+ 43 files changed, 251 insertions(+), 230 deletions(-)
+ delete mode 100644 src/daemon/modules/image/oci/oci_image_type.h
+
+diff --git a/src/daemon/modules/api/image_api.h b/src/daemon/modules/api/image_api.h
+index 4bb8d1a9..2f2c00a2 100644
+--- a/src/daemon/modules/api/image_api.h
++++ b/src/daemon/modules/api/image_api.h
+@@ -239,7 +239,7 @@ typedef struct {
+
+ int image_module_init(const isulad_daemon_configs *args);
+
+-void image_module_exit();
++void image_module_exit(void);
+
+ int im_get_container_filesystem_usage(const char *image_type, const char *id, imagetool_fs_info **fs_usage);
+
+diff --git a/src/daemon/modules/image/external/ext_image.c b/src/daemon/modules/image/external/ext_image.c
+index e1706469..5b6b7298 100644
+--- a/src/daemon/modules/image/external/ext_image.c
++++ b/src/daemon/modules/image/external/ext_image.c
+@@ -138,13 +138,17 @@ int ext_list_images(const im_list_request *request, imagetool_images_list **list
+ {
+ int ret = 0;
+
++ if (request == NULL || list == NULL) {
++ ERROR("Empty request or list");
++ return -1;
++ }
++
+ *list = util_common_calloc_s(sizeof(imagetool_images_list));
+ if (*list == NULL) {
+ ERROR("Memory out");
+ ret = -1;
+- goto out;
+ }
+-out:
++
+ return ret;
+ }
+
+diff --git a/src/daemon/modules/image/image.c b/src/daemon/modules/image/image.c
+index 322ab67c..408ceea2 100644
+--- a/src/daemon/modules/image/image.c
++++ b/src/daemon/modules/image/image.c
+@@ -374,8 +374,8 @@ int im_resolv_image_name(const char *image_type, const char *image_name, char **
+ int ret = -1;
+ const struct bim_type *q = NULL;
+
+- if (image_type == NULL) {
+- ERROR("Image type is required");
++ if (image_type == NULL || image_name == NULL || resolved_name == NULL) {
++ ERROR("Image type image_name and resolved_name is required");
+ goto out;
+ }
+ q = get_bim_by_type(image_type);
+@@ -402,8 +402,8 @@ int im_get_filesystem_info(const char *image_type, im_fs_info_response **respons
+ int ret = -1;
+ const struct bim_type *q = NULL;
+
+- if (image_type == NULL) {
+- ERROR("Image type is required");
++ if (image_type == NULL || response == NULL) {
++ ERROR("Image type and response is required");
+ goto out;
+ }
+
+@@ -419,7 +419,7 @@ int im_get_filesystem_info(const char *image_type, im_fs_info_response **respons
+ INFO("Event: {Object: get image filesystem info, Type: inspecting}");
+ ret = q->ops->get_filesystem_info(response);
+ if (ret != 0) {
+- if (response != NULL && *response != NULL) {
++ if (*response != NULL && (*response)->errmsg != NULL) {
+ ERROR("Get filesystem info failed: %s", (*response)->errmsg);
+ } else {
+ ERROR("Get filesystem info failed");
+@@ -439,7 +439,7 @@ int im_get_container_filesystem_usage(const char *image_type, const char *id, im
+ const struct bim_type *q = NULL;
+ im_container_fs_usage_request *request = NULL;
+
+- if (image_type == NULL || id == NULL) {
++ if (image_type == NULL || id == NULL || fs_usage == NULL) {
+ ERROR("Invalid input arguments");
+ ret = -1;
+ goto out;
+@@ -763,6 +763,12 @@ bool im_config_image_exist(const char *image_name)
+ {
+ const struct bim_type *bim_type = NULL;
+
++ if (image_name == NULL) {
++ ERROR("Invalid input arguments");
++ isulad_set_error_message("Invalid input arguments");
++ return false;
++ }
++
+ bim_type = bim_query(image_name);
+ if (bim_type == NULL) {
+ ERROR("Config image %s not exist", image_name);
+@@ -778,7 +784,7 @@ int im_merge_image_config(const char *image_type, const char *image_name, contai
+ int ret = 0;
+ struct bim *bim = NULL;
+
+- if (container_spec == NULL || image_type == NULL) {
++ if (container_spec == NULL || image_name == NULL || image_type == NULL) {
+ ERROR("Invalid input arguments");
+ ret = -1;
+ goto out;
+@@ -905,7 +911,7 @@ int im_list_images(const im_list_request *ctx, im_list_response **response)
+ size_t i;
+ imagetool_images_list *images_tmp = NULL;
+
+- if (response == NULL) {
++ if (ctx == NULL || response == NULL) {
+ ERROR("Empty arguments");
+ return -1;
+ }
+@@ -982,6 +988,12 @@ static bool check_im_pull_args(const im_pull_request *req, im_pull_response * co
+ isulad_set_error_message("Empty image required");
+ return false;
+ }
++
++ if (req->type == NULL) {
++ ERROR("Empty type required");
++ isulad_set_error_message("Empty type required");
++ return false;
++ }
+ return true;
+ }
+
+@@ -1079,7 +1091,7 @@ int im_import_image(const im_import_request *request, char **id)
+ return -1;
+ }
+
+- if (request->file == NULL) {
++ if (request->file == NULL || request->tag == NULL) {
+ ERROR("Import image requires image tarball file path");
+ isulad_set_error_message("Import image requires image tarball file path");
+ goto pack_response;
+@@ -1185,7 +1197,8 @@ int im_load_image(const im_load_request *request, im_load_response **response)
+
+ ret = bim->ops->load_image(request);
+ if (ret != 0) {
+- ERROR("Failed to load image from %s with tag %s and type %s", request->file, request->tag, request->type);
++ // request->tag may be empty
++ ERROR("Failed to load image from %s with type %s", request->file, request->type);
+ ret = -1;
+ goto pack_response;
+ }
+@@ -1368,11 +1381,16 @@ int im_logout(const im_logout_request *request, im_logout_response **response)
+ int ret = -1;
+ struct bim *bim = NULL;
+
+- if (response == NULL) {
++ if (request == NULL || response == NULL) {
+ ERROR("Empty response");
+ return -1;
+ }
+
++ if (request->type == NULL || request->server == NULL) {
++ ERROR("Empty type or server");
++ return -1;
++ }
++
+ *response = util_common_calloc_s(sizeof(im_logout_response));
+ if (*response == NULL) {
+ ERROR("Out of memory");
+@@ -1842,13 +1860,12 @@ char *im_get_rootfs_dir(const im_get_rf_dir_request *request)
+ char *dir = NULL;
+ struct bim *bim = NULL;
+
+- if (request->type == NULL) {
++ if (request == NULL || request->type == NULL) {
+ ERROR("Missing image type");
+ return NULL;
+ }
+
+ bim = bim_get(request->type, NULL, NULL, NULL);
+-
+ if (bim == NULL) {
+ ERROR("Failed to init bim, image type:%s", request->type);
+ return NULL;
+@@ -1916,7 +1933,7 @@ int image_module_init(const isulad_daemon_configs *args)
+ return bims_init(args);
+ }
+
+-void image_module_exit()
++void image_module_exit(void)
+ {
+ size_t i;
+
+@@ -2085,7 +2102,7 @@ int im_prepare_container_rootfs(const im_prepare_request *request, char **real_r
+ int nret = 0;
+ struct bim *bim = NULL;
+
+- if (request == NULL) {
++ if (request == NULL || real_rootfs == NULL) {
+ ERROR("Invalid input arguments");
+ return -1;
+ }
+diff --git a/src/daemon/modules/image/image_spec_merge.c b/src/daemon/modules/image/image_spec_merge.c
+index e8cdae28..1e857bb7 100644
+--- a/src/daemon/modules/image/image_spec_merge.c
++++ b/src/daemon/modules/image/image_spec_merge.c
+@@ -29,7 +29,7 @@ int image_spec_merge_env(const char **env, size_t env_len, container_config *con
+ char **im_kv = NULL;
+ char **custom_kv = NULL;
+
+- if (env == NULL || env_len == 0) {
++ if (env == NULL || env_len == 0 || container_spec == NULL) {
+ return 0;
+ }
+
+diff --git a/src/daemon/modules/image/oci/oci_common_operators.c b/src/daemon/modules/image/oci/oci_common_operators.c
+index 83cccbe6..e15423e6 100644
+--- a/src/daemon/modules/image/oci/oci_common_operators.c
++++ b/src/daemon/modules/image/oci/oci_common_operators.c
+@@ -57,7 +57,7 @@ char *oci_resolve_image_name(const char *name)
+
+ int oci_get_user_conf(const char *basefs, host_config *hc, const char *userstr, defs_process_user *puser)
+ {
+- if (basefs == NULL || puser == NULL) {
++ if (basefs == NULL || puser == NULL || hc == NULL) {
+ ERROR("Empty basefs or puser");
+ return -1;
+ }
+@@ -371,6 +371,11 @@ int oci_list_images(const im_list_request *request, imagetool_images_list **imag
+ int ret = 0;
+ struct filters_args *image_filters = NULL;
+
++ if (request == NULL || images == NULL) {
++ ERROR("Empty request or images");
++ return -1;
++ }
++
+ if (request != NULL && request->image_filters != NULL) {
+ image_filters = request->image_filters;
+ }
+@@ -408,7 +413,7 @@ int oci_summary_image(im_summary_request *request, im_summary_response *response
+ char *image_ref = NULL;
+ char *resolved_name = NULL;
+
+- if (response == NULL) {
++ if (request == NULL || response == NULL) {
+ ERROR("Invalid arguments");
+ return -1;
+ }
+diff --git a/src/daemon/modules/image/oci/oci_image.c b/src/daemon/modules/image/oci/oci_image.c
+index 4a48016b..f712a446 100644
+--- a/src/daemon/modules/image/oci/oci_image.c
++++ b/src/daemon/modules/image/oci/oci_image.c
+@@ -353,7 +353,7 @@ out:
+ return ret;
+ }
+
+-void oci_exit()
++void oci_exit(void)
+ {
+ storage_module_exit();
+ free_oci_image_data();
+@@ -396,7 +396,7 @@ int oci_prepare_rf(const im_prepare_request *request, char **real_rootfs)
+ {
+ int ret = 0;
+
+- if (request == NULL) {
++ if (request == NULL || request->container_id == NULL) {
+ ERROR("Bim is NULL");
+ return -1;
+ }
+@@ -457,7 +457,7 @@ int oci_mount_rf(const im_mount_request *request)
+ {
+ char *mount_point = NULL;
+
+- if (request == NULL) {
++ if (request == NULL || request->name_id == NULL) {
+ ERROR("Invalid arguments");
+ return -1;
+ }
+@@ -796,7 +796,7 @@ int oci_export_rf(const im_export_request *request)
+ {
+ int ret = 0;
+
+- if (request == NULL) {
++ if (request == NULL || request->name_id == NULL) {
+ ERROR("Invalid input arguments");
+ return -1;
+ }
+diff --git a/src/daemon/modules/image/oci/oci_image.h b/src/daemon/modules/image/oci/oci_image.h
+index c52c8a7b..07f10c8d 100644
+--- a/src/daemon/modules/image/oci/oci_image.h
++++ b/src/daemon/modules/image/oci/oci_image.h
+@@ -41,7 +41,7 @@ struct oci_image_module_data {
+ struct oci_image_module_data *get_oci_image_data(void);
+
+ int oci_init(const isulad_daemon_configs *args);
+-void oci_exit();
++void oci_exit(void);
+
+ int oci_pull_rf(const im_pull_request *request, im_pull_response *response);
+ int oci_rmi(const im_rmi_request *request);
+diff --git a/src/daemon/modules/image/oci/oci_image_type.h b/src/daemon/modules/image/oci/oci_image_type.h
+deleted file mode 100644
+index f436a453..00000000
+--- a/src/daemon/modules/image/oci/oci_image_type.h
++++ /dev/null
+@@ -1,42 +0,0 @@
+-/******************************************************************************
+- * Copyright (c) Huawei Technologies Co., Ltd. 2018-2019. All rights reserved.
+- * iSulad licensed under the Mulan PSL v2.
+- * You can use this software according to the terms and conditions of the Mulan PSL v2.
+- * You may obtain a copy of Mulan PSL v2 at:
+- * http://license.coscl.org.cn/MulanPSL2
+- * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR
+- * IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, MERCHANTABILITY OR FIT FOR A PARTICULAR
+- * PURPOSE.
+- * See the Mulan PSL v2 for more details.
+- * Author: lifeng
+- * Create: 2018-11-08
+- * Description: provide image type definition
+- ******************************************************************************/
+-
+-#ifndef DAEMON_MODULES_IMAGE_OCI_OCI_IMAGE_TYPE_H
+-#define DAEMON_MODULES_IMAGE_OCI_OCI_IMAGE_TYPE_H
+-
+-#ifdef __cplusplus
+-extern "C" {
+-#endif
+-
+-/* AuthConfig contains authorization information for connecting to a registry */
+-typedef struct {
+- char *username;
+- char *password;
+- char *auth;
+- char *server_address;
+-
+- // IdentityToken is used to authenticate the user and get
+- // an access token for the registry.
+- char *identity_token;
+-
+- // RegistryToken is a bearer token to be sent to a registry
+- char *registry_token;
+-} auth_config;
+-
+-#ifdef __cplusplus
+-}
+-#endif
+-
+-#endif
+diff --git a/src/daemon/modules/image/oci/oci_import.c b/src/daemon/modules/image/oci/oci_import.c
+index 93179504..1e14a916 100644
+--- a/src/daemon/modules/image/oci/oci_import.c
++++ b/src/daemon/modules/image/oci/oci_import.c
+@@ -268,6 +268,7 @@ static int create_manifest(import_desc *desc)
+ manifest->layers[0]->size = desc->compressed_size;
+ manifest->layers[0]->digest = util_strdup_s(desc->compressed_digest);
+
++ // the image manifest schema version is v2
+ manifest->schema_version = 2;
+ manifest->media_type = util_strdup_s(DOCKER_MANIFEST_SCHEMA2_JSON);
+
+diff --git a/src/daemon/modules/image/oci/oci_load.c b/src/daemon/modules/image/oci/oci_load.c
+index 5e062d44..569c5346 100644
+--- a/src/daemon/modules/image/oci/oci_load.c
++++ b/src/daemon/modules/image/oci/oci_load.c
+@@ -851,20 +851,17 @@ static int64_t get_layer_size_from_storage(char *chain_id_pre)
+ id = oci_load_without_sha256_prefix(chain_id_pre);
+ if (id == NULL) {
+ ERROR("Get chain id failed from value:%s", chain_id_pre);
+- size = -1;
+- goto out;
++ return -1;
+ }
+
+ l = storage_layer_get(id);
+ if (l == NULL) {
+ ERROR("Layer with chain id:%s is not exist in store", id);
+- size = -1;
+- goto out;
++ return -1;
+ }
+
+ size = l->compress_size;
+
+-out:
+ free_layer(l);
+ return size;
+ }
+@@ -883,8 +880,7 @@ static int oci_load_set_manifest_info(load_image_t *im)
+ im->manifest = util_common_calloc_s(sizeof(oci_image_manifest));
+ if (im->manifest == NULL) {
+ ERROR("Out of memory");
+- ret = -1;
+- goto out;
++ return -1;
+ }
+
+ im->manifest->schema_version = OCI_SCHEMA_VERSION;
+diff --git a/src/daemon/modules/image/oci/oci_load.h b/src/daemon/modules/image/oci/oci_load.h
+index e1e09067..53ca87d2 100644
+--- a/src/daemon/modules/image/oci/oci_load.h
++++ b/src/daemon/modules/image/oci/oci_load.h
+@@ -1,5 +1,5 @@
+ /******************************************************************************
+-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
++* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
+ * iSulad licensed under the Mulan PSL v2.
+ * You can use this software according to the terms and conditions of the Mulan PSL v2.
+ * You may obtain a copy of Mulan PSL v2 at:
+diff --git a/src/daemon/modules/image/oci/oci_login.c b/src/daemon/modules/image/oci/oci_login.c
+index 22de9593..e9eec378 100644
+--- a/src/daemon/modules/image/oci/oci_login.c
++++ b/src/daemon/modules/image/oci/oci_login.c
+@@ -1,5 +1,5 @@
+ /******************************************************************************
+-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
++* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
+ * iSulad licensed under the Mulan PSL v2.
+ * You can use this software according to the terms and conditions of the Mulan PSL v2.
+ * You may obtain a copy of Mulan PSL v2 at:
+diff --git a/src/daemon/modules/image/oci/oci_logout.c b/src/daemon/modules/image/oci/oci_logout.c
+index 02fdb126..f8a63220 100644
+--- a/src/daemon/modules/image/oci/oci_logout.c
++++ b/src/daemon/modules/image/oci/oci_logout.c
+@@ -1,5 +1,5 @@
+ /******************************************************************************
+-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
++* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
+ * iSulad licensed under the Mulan PSL v2.
+ * You can use this software according to the terms and conditions of the Mulan PSL v2.
+ * You may obtain a copy of Mulan PSL v2 at:
+diff --git a/src/daemon/modules/image/oci/oci_pull.c b/src/daemon/modules/image/oci/oci_pull.c
+index 5b35ca2b..e7ff77df 100644
+--- a/src/daemon/modules/image/oci/oci_pull.c
++++ b/src/daemon/modules/image/oci/oci_pull.c
+@@ -1,5 +1,5 @@
+ /******************************************************************************
+-* Copyright (c) Huawei Technologies Co., Ltd. 2019. All rights reserved.
++* Copyright (c) Huawei Technologies Co., Ltd. 2020. All rights reserved.
+ * iSulad licensed under the Mulan PSL v2.
+ * You can use this software according to the terms and conditions of the Mulan PSL v2.
+ * You may obtain a copy of Mulan PSL v2 at:
+@@ -70,7 +70,7 @@ out:
+ return ret;
+ }
+
+-static void update_option_insecure_registry(registry_pull_options *options, char **insecure_registries, char *host)
++static void update_option_insecure_registry(registry_pull_options *options, char **insecure_registries, const char *host)
+ {
+ char **registry = NULL;
+
+diff --git a/src/daemon/modules/image/oci/registry/registry_apiv2.c b/src/daemon/modules/image/oci/registry/registry_apiv2.c
+index 048fac94..db4d311e 100644
+--- a/src/daemon/modules/image/oci/registry/registry_apiv2.c
++++ b/src/daemon/modules/image/oci/registry/registry_apiv2.c
+@@ -632,7 +632,7 @@ static int split_head_body(char *file, char **http_head)
+ }
+ body += strlen(deli);
+
+- ret = util_write_file(file, body, strlen(body), 0600);
++ ret = util_write_file(file, body, strlen(body), BODY_FILE_MODE);
+ if (ret != 0) {
+ ERROR("rewrite body to file failed");
+ ret = -1;
+diff --git a/src/daemon/modules/image/oci/storage/image_store/image_store.c b/src/daemon/modules/image/oci/storage/image_store/image_store.c
+index 55e3bb97..b7e0f0cc 100644
+--- a/src/daemon/modules/image/oci/storage/image_store/image_store.c
++++ b/src/daemon/modules/image/oci/storage/image_store/image_store.c
+@@ -146,7 +146,7 @@ static void free_image_store(image_store_t *store)
+ free(store);
+ }
+
+-void image_store_free()
++void image_store_free(void)
+ {
+ free_image_store(g_image_store);
+ g_image_store = NULL;
+@@ -1185,6 +1185,11 @@ int image_store_set_big_data(const char *id, const char *key, const char *data)
+ return -1;
+ }
+
++ if (id == NULL || data == NULL) {
++ ERROR("Empty id or data");
++ return -1;
++ }
++
+ if (g_image_store == NULL) {
+ ERROR("Image store is not ready");
+ return -1;
+@@ -1287,7 +1292,7 @@ int image_store_add_name(const char *id, const char *name)
+ size_t i;
+
+ if (id == NULL || name == NULL) {
+- ERROR("Invalid input paratemer: id(%s), name(%s)", id, name);
++ ERROR("Invalid input paratemer");
+ return -1;
+ }
+
+@@ -1515,7 +1520,7 @@ int image_store_set_metadata(const char *id, const char *metadata)
+ image_t *img = NULL;
+
+ if (id == NULL || metadata == NULL) {
+- ERROR("Invalid paratemer: id(%s), metadata(%s)", id, metadata);
++ ERROR("Invalid paratemer");
+ return -1;
+ }
+
+@@ -1664,7 +1669,6 @@ char *image_store_big_data(const char *id, const char *key)
+ }
+
+ ret = get_data_path(img->simage->id, key, filename, sizeof(filename));
+-
+ if (ret != 0) {
+ ERROR("Failed to get big data file path: %s.", key);
+ goto out;
+@@ -1809,7 +1813,7 @@ char *image_store_big_data_digest(const char *id, const char *key)
+ image_t *img = NULL;
+ char *digest = NULL;
+
+- if (key == NULL || strlen(key) == 0) {
++ if (key == NULL || strlen(key) == 0 || id == NULL) {
+ ERROR("Not a valid name for a big data item, can't retrieve image big data value for empty name");
+ return NULL;
+ }
+@@ -1854,8 +1858,8 @@ int image_store_big_data_names(const char *id, char ***names, size_t *names_len)
+ int ret = 0;
+ image_t *img = NULL;
+
+- if (id == NULL) {
+- ERROR("Invalid parameter, id is NULL");
++ if (id == NULL || names == NULL || names_len == NULL) {
++ ERROR("Invalid parameter");
+ return -1;
+ }
+
+@@ -2724,7 +2728,7 @@ unlock:
+ return ret;
+ }
+
+-size_t image_store_get_images_number()
++size_t image_store_get_images_number(void)
+ {
+ size_t number = 0;
+
+@@ -3140,6 +3144,11 @@ int image_store_validate_manifest_schema_version_1(const char *path, bool *valid
+ char manifest_path[PATH_MAX] = { 0x00 };
+ bool valid_v2_config = false;
+
++ if (path == NULL || valid == NULL) {
++ ERROR("Empty path or valid");
++ return -1;
++ }
++
+ *valid = false;
+ nret = snprintf(manifest_path, sizeof(manifest_path), "%s/%s", path, IMAGE_DIGEST_BIG_DATA_KEY);
+ if (nret < 0 || (size_t)nret >= sizeof(manifest_path)) {
+@@ -3698,6 +3707,11 @@ int remote_append_image_by_directory_with_lock(const char *id)
+ return -1;
+ }
+
++ if (g_image_store == NULL) {
++ ERROR("Image store is not ready");
++ return -1;
++ }
++
+ if (!image_store_lock(EXCLUSIVE)) {
+ ERROR("Failed to lock remote image store when handle: %s", id);
+ return -1;
+@@ -3732,6 +3746,11 @@ int remote_remove_image_from_memory_with_lock(const char *id)
+ return -1;
+ }
+
++ if (g_image_store == NULL) {
++ ERROR("Image store is not ready");
++ return -1;
++ }
++
+ if (!image_store_lock(EXCLUSIVE)) {
+ ERROR("Failed to lock remote image store when handle: %s", id);
+ return -1;
+@@ -3758,6 +3777,16 @@ char *remote_image_get_top_layer_from_json(const char *img_id)
+ storage_image *im = NULL;
+ parser_error err = NULL;
+
++ if (img_id == NULL) {
++ ERROR("Empty img id");
++ return NULL;
++ }
++
++ if (g_image_store == NULL) {
++ ERROR("Image store is not ready");
++ return NULL;
++ }
++
+ nret = snprintf(image_path, sizeof(image_path), "%s/%s/%s", g_image_store->dir, img_id, IMAGE_JSON);
+ if (nret < 0 || (size_t)nret >= sizeof(image_path)) {
+ ERROR("Failed to get image path");
+diff --git a/src/daemon/modules/image/oci/storage/image_store/image_store.h b/src/daemon/modules/image/oci/storage/image_store/image_store.h
+index 5164cc73..019a2881 100644
+--- a/src/daemon/modules/image/oci/storage/image_store/image_store.h
++++ b/src/daemon/modules/image/oci/storage/image_store/image_store.h
+@@ -98,13 +98,13 @@ int image_store_set_image_size(const char *id, uint64_t size);
+ int image_store_get_all_images(imagetool_images_list *images_list);
+
+ // On success, the number of the known images is returned. On failure, (size_t)-1 is returned
+-size_t image_store_get_images_number();
++size_t image_store_get_images_number(void);
+
+ // Retrieves image file system info
+ int image_store_get_fs_info(imagetool_fs_info *fs_info);
+
+ // Free memory of image store, but will not delete the persisted files
+-void image_store_free();
++void image_store_free(void);
+
+ imagetool_image_summary *image_store_get_image_summary(const char *id);
+
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c
+index 4f19c26d..79541e54 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c
++++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/deviceset.c
+@@ -499,14 +499,14 @@ bool has_metadata(const char *hash, struct device_set *devset)
+ bool ret = true;
+ int nret = 0;
+
+- if (hash == NULL) {
++ if (hash == NULL || devset == NULL) {
+ return true;
+ }
+
+ metadata_path = metadata_dir(devset);
+ if (metadata_path == NULL) {
+ ERROR("Failed to get meta data directory");
+- goto out;
++ return false;
+ }
+
+ nret = snprintf(metadata_file, sizeof(metadata_file), "%s/%s", metadata_path, util_valid_str(hash) ? hash : "base");
+@@ -541,7 +541,7 @@ static image_devmapper_device_info *load_metadata(const struct device_set *devse
+ metadata_path = metadata_dir(devset);
+ if (metadata_path == NULL) {
+ ERROR("Failed to get meta data directory");
+- goto out;
++ return NULL;
+ }
+
+ nret = snprintf(metadata_file, sizeof(metadata_file), "%s/%s", metadata_path, util_valid_str(hash) ? hash : "base");
+@@ -3076,7 +3076,7 @@ int mount_device(const char *hash, const char *path, const struct driver_mount_o
+ char *dev_fname = NULL;
+ char *options = NULL;
+
+- if (hash == NULL || path == NULL) {
++ if (hash == NULL || path == NULL || devset == NULL) {
+ ERROR("devmapper: invalid input params to mount device");
+ return -1;
+ }
+@@ -3236,7 +3236,7 @@ int export_device_metadata(struct device_metadata *dev_metadata, const char *has
+ char *dm_name = NULL;
+ devmapper_device_info_t *device_info = NULL;
+
+- if (hash == NULL || dev_metadata == NULL) {
++ if (hash == NULL || dev_metadata == NULL || devset == NULL) {
+ ERROR("Invalid input params");
+ return -1;
+ }
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c
+index ecb62f79..d62d3133 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c
++++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/driver_devmapper.c
+@@ -198,7 +198,7 @@ int devmapper_rm_layer(const char *id, const struct graphdriver *driver)
+ }
+
+ if (delete_device(id, false, driver->devset) != 0) {
+- ERROR("failed to remove device %s", id);
++ ERROR("Failed to remove device %s", id);
+ return -1;
+ }
+
+@@ -624,7 +624,7 @@ int devmapper_clean_up(struct graphdriver *driver)
+ {
+ int ret = 0;
+
+- if (driver == NULL) {
++ if (driver == NULL || driver->devset == NULL || driver->home == NULL) {
+ ERROR("Invalid input param to cleanup devicemapper");
+ return -1;
+ }
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c
+index e91ddd1e..e22311f1 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c
++++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.c
+@@ -192,7 +192,7 @@ cleanup:
+ return NULL;
+ }
+
+-char *dev_get_driver_version()
++char *dev_get_driver_version(void)
+ {
+ struct dm_task *dmt = NULL;
+ char *version = NULL;
+@@ -234,7 +234,7 @@ cleanup:
+ }
+
+ // dev_get_library_version return the device mapper library version
+-char *dev_get_library_version()
++char *dev_get_library_version(void)
+ {
+ char version[128] = { 0 };
+
+@@ -679,7 +679,7 @@ cleanup:
+ return ret;
+ }
+
+-bool udev_sync_supported()
++bool udev_sync_supported(void)
+ {
+ return dm_udev_get_sync_support() != 0;
+ }
+@@ -705,7 +705,8 @@ int dev_create_device(const char *pool_fname, int device_id)
+ int ret = 0;
+ int nret = 0;
+ uint64_t sector = 0;
+- char message[PATH_MAX] = { 0 }; // 临时字符缓冲区上限
++ // temporary character buffer limit
++ char message[PATH_MAX] = { 0 };
+ struct dm_task *dmt = NULL;
+
+ if (pool_fname == NULL) {
+@@ -1066,7 +1067,7 @@ static void log_cb(int level, const char *file, int line, int dm_errno_or_class,
+ free(buffer);
+ }
+
+-void log_with_errno_init()
++void log_with_errno_init(void)
+ {
+ dm_log_with_errno_init(log_cb);
+ }
+@@ -1136,7 +1137,8 @@ int dev_set_transaction_id(const char *pool_name, uint64_t old_id, uint64_t new_
+ int ret = 0;
+ int nret = 0;
+ uint64_t sector = 0;
+- char message[PATH_MAX] = { 0 }; // 临时字符缓冲区上限
++ // temporary character buffer limit
++ char message[PATH_MAX] = { 0 };
+ struct dm_task *dmt = NULL;
+
+ if (pool_name == NULL) {
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h
+index e8acebc0..01771a3b 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h
++++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/devmapper/wrapper_devmapper.h
+@@ -96,11 +96,11 @@ int set_dev_dir(const char *dir);
+
+ struct dm_task* task_create_named(int type, const char *name);
+
+-void log_with_errno_init();
++void log_with_errno_init(void);
+
+-char *dev_get_driver_version();
++char *dev_get_driver_version(void);
+
+-char *dev_get_library_version();
++char *dev_get_library_version(void);
+
+ int dev_get_status(uint64_t *start, uint64_t *length, char **target_type, char **params, const char *name);
+
+@@ -112,7 +112,7 @@ int dev_remove_device_deferred(const char *name);
+
+ int dev_get_device_list(char ***list, size_t *length);
+
+-bool udev_sync_supported();
++bool udev_sync_supported(void);
+
+ bool udev_set_sync_support(bool enable);
+
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c
+index 3b27076c..ced30b96 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c
++++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.c
+@@ -405,12 +405,6 @@ out:
+ return ret;
+ }
+
+-bool overlay2_is_quota_options(struct graphdriver *driver, const char *option)
+-{
+- return strncmp(option, QUOTA_SIZE_OPTION, strlen(QUOTA_SIZE_OPTION)) == 0 ||
+- strncmp(option, QUOTA_BASESIZE_OPTIONS, strlen(QUOTA_BASESIZE_OPTIONS)) == 0;
+-}
+-
+ static int check_parent_valid(const char *parent, const struct graphdriver *driver)
+ {
+ int ret = 0;
+@@ -1158,7 +1152,7 @@ int overlay2_rm_layer(const char *id, const struct graphdriver *driver)
+ struct stat stat_buf;
+ #endif
+
+- if (id == NULL || driver == NULL) {
++ if (id == NULL || driver == NULL || driver->home == NULL) {
+ ERROR("Invalid input arguments");
+ return -1;
+ }
+@@ -1844,6 +1838,11 @@ bool overlay2_layer_exists(const char *id, const struct graphdriver *driver)
+ char *layer_dir = NULL;
+ char *link_id = NULL;
+
++ if (id == NULL || driver == NULL || driver->home == NULL) {
++ ERROR("Failed to verify overlay2 layer exists for empty id or driver");
++ return false;
++ }
++
+ layer_dir = util_path_join(driver->home, id);
+ if (layer_dir == NULL) {
+ ERROR("Failed to join layer dir:%s", id);
+@@ -2075,7 +2074,7 @@ int overlay2_get_driver_status(const struct graphdriver *driver, struct graphdri
+ int nret = 0;
+ char tmp[MAX_INFO_LENGTH] = { 0 };
+
+- if (driver == NULL || status == NULL) {
++ if (driver == NULL || status == NULL || driver->backing_fs == NULL) {
+ ERROR("Invalid input arguments");
+ return -1;
+ }
+@@ -2117,7 +2116,7 @@ int overlay2_clean_up(struct graphdriver *driver)
+ {
+ int ret = 0;
+
+- if (driver == NULL) {
++ if (driver == NULL || driver->home == NULL) {
+ ERROR("Invalid input arguments");
+ ret = -1;
+ goto out;
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h
+index e14271b1..438c508e 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h
++++ b/src/daemon/modules/image/oci/storage/layer_store/graphdriver/overlay2/driver_overlay2.h
+@@ -35,8 +35,6 @@ extern "C" {
+
+ int overlay2_init(struct graphdriver *driver, const char *driver_home, const char **options, size_t len);
+
+-bool overlay2_is_quota_options(struct graphdriver *driver, const char *option);
+-
+ int overlay2_create_rw(const char *id, const char *parent, const struct graphdriver *driver,
+ struct driver_create_opts *create_opts);
+
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer.c b/src/daemon/modules/image/oci/storage/layer_store/layer.c
+index 4baeb7c2..4beb3d10 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/layer.c
++++ b/src/daemon/modules/image/oci/storage/layer_store/layer.c
+@@ -46,7 +46,7 @@ void free_layer_t(layer_t *ptr)
+ free(ptr);
+ }
+
+-layer_t *create_empty_layer()
++layer_t *create_empty_layer(void)
+ {
+ layer_t *result = NULL;
+ int nret = 0;
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer.h b/src/daemon/modules/image/oci/storage/layer_store/layer.h
+index f2dad648..9387efe0 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/layer.h
++++ b/src/daemon/modules/image/oci/storage/layer_store/layer.h
+@@ -43,7 +43,7 @@ typedef struct _layer_t_ {
+ uint64_t refcnt;
+ } layer_t;
+
+-layer_t *create_empty_layer();
++layer_t *create_empty_layer(void);
+
+ void free_layer_t(layer_t *ptr);
+ void layer_ref_inc(layer_t *layer);
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer_store.c b/src/daemon/modules/image/oci/storage/layer_store/layer_store.c
+index 6ea3c48b..3ffe0ca7 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/layer_store.c
++++ b/src/daemon/modules/image/oci/storage/layer_store/layer_store.c
+@@ -117,7 +117,7 @@ static inline void layer_store_unlock()
+ }
+ }
+
+-void layer_store_cleanup()
++void layer_store_cleanup(void)
+ {
+ struct linked_list *item = NULL;
+ struct linked_list *next = NULL;
+@@ -230,7 +230,7 @@ static inline void delete_g_layer_list_item(struct linked_list *item, bool rm_va
+ g_metadata.layers_list_len -= 1;
+ }
+
+-void remove_layer_list_tail()
++void remove_layer_list_tail(void)
+ {
+ struct linked_list *item = NULL;
+
+@@ -1231,18 +1231,6 @@ int layer_store_delete(const char *id)
+ return ret;
+ }
+
+-bool layer_store_exists(const char *id)
+-{
+- layer_t *l = lookup_with_lock(id);
+-
+- if (l == NULL) {
+- return false;
+- }
+-
+- layer_ref_dec(l);
+- return true;
+-}
+-
+ static void copy_json_to_layer(const layer_t *jl, struct layer *l)
+ {
+ if (jl->slayer == NULL) {
+@@ -1354,7 +1342,7 @@ int layer_store_by_compress_digest(const char *digest, struct layer_list *resp)
+ {
+ int ret = 0;
+
+- if (resp == NULL) {
++ if (digest == NULL || resp == NULL) {
+ return -1;
+ }
+
+@@ -1367,22 +1355,6 @@ int layer_store_by_compress_digest(const char *digest, struct layer_list *resp)
+ return ret;
+ }
+
+-int layer_store_by_uncompress_digest(const char *digest, struct layer_list *resp)
+-{
+- int ret = 0;
+-
+- if (resp == NULL) {
+- return -1;
+- }
+- if (!layer_store_lock(false)) {
+- return -1;
+- }
+-
+- ret = layers_by_digest_map(g_metadata.by_uncompress_digest, digest, resp);
+- layer_store_unlock();
+- return ret;
+-}
+-
+ struct layer *layer_store_lookup(const char *name)
+ {
+ struct layer *ret = NULL;
+@@ -1492,6 +1464,10 @@ int layer_store_try_repair_lowers(const char *id)
+ layer_t *l = NULL;
+ int ret = 0;
+
++ if (id == NULL) {
++ return -1;
++ }
++
+ l = lookup_with_lock(id);
+ if (l == NULL) {
+ return -1;
+@@ -1807,7 +1783,7 @@ free_out:
+ return -1;
+ }
+
+-void layer_store_exit()
++void layer_store_exit(void)
+ {
+ graphdriver_cleanup();
+ }
+@@ -2116,6 +2092,11 @@ int layer_store_check(const char *id)
+ int ret = 0;
+ char *rootfs = NULL;
+
++ if (id == NULL) {
++ ERROR("Failed to do layer store check for Empty id");
++ return -1;
++ }
++
+ layer_t *l = lookup_with_lock(id);
+ if (l == NULL || l->slayer == NULL) {
+ ERROR("layer %s not found when checking integration", id);
+@@ -2157,6 +2138,11 @@ int remote_layer_remove_memory_stores_with_lock(const char *id)
+ {
+ int ret = 0;
+
++ if (id == NULL) {
++ ERROR("Failed to lock layer store for empty id");
++ return -1;
++ }
++
+ if (!layer_store_lock(true)) {
+ ERROR("Failed to lock layer store when handle: %s", id);
+ return -1;
+@@ -2237,6 +2223,11 @@ int remote_load_one_layer(const char *id)
+ layer_t *tl = NULL;
+ size_t i = 0;
+
++ if (id == NULL) {
++ ERROR("Failed to do remote load one layer for empty id");
++ return -1;
++ }
++
+ if (!layer_store_lock(true)) {
+ return -1;
+ }
+diff --git a/src/daemon/modules/image/oci/storage/layer_store/layer_store.h b/src/daemon/modules/image/oci/storage/layer_store/layer_store.h
+index be8c52dc..20287119 100644
+--- a/src/daemon/modules/image/oci/storage/layer_store/layer_store.h
++++ b/src/daemon/modules/image/oci/storage/layer_store/layer_store.h
+@@ -51,20 +51,18 @@ struct layer_opts {
+ };
+
+ int layer_store_init(const struct storage_module_init_options *conf);
+-void layer_store_exit();
+-void layer_store_cleanup();
++void layer_store_exit(void);
++void layer_store_cleanup(void);
+
+-void remove_layer_list_tail();
++void remove_layer_list_tail(void);
+ int layer_store_create(const char *id, const struct layer_opts *opts, const struct io_read_wrapper *content,
+ char **new_id);
+ int layer_inc_hold_refs(const char *layer_id);
+ int layer_dec_hold_refs(const char *layer_id);
+ int layer_get_hold_refs(const char *layer_id, int *ref_num);
+ int layer_store_delete(const char *id);
+-bool layer_store_exists(const char *id);
+ int layer_store_list(struct layer_list *resp);
+ int layer_store_by_compress_digest(const char *digest, struct layer_list *resp);
+-int layer_store_by_uncompress_digest(const char *digest, struct layer_list *resp);
+ struct layer *layer_store_lookup(const char *name);
+ char *layer_store_mount(const char *id);
+ int layer_store_umount(const char *id, bool force);
+diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c b/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c
+index b4a53ec1..07c4a5cc 100644
+--- a/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c
++++ b/src/daemon/modules/image/oci/storage/remote_layer_support/image_remote_impl.c
+@@ -1,5 +1,5 @@
+ /******************************************************************************
+- * Copyright (c) Huawei Technologies Co., Ltd. 2020-2023. All rights reserved.
++ * Copyright (c) Huawei Technologies Co., Ltd. 2023. All rights reserved.
+ * iSulad licensed under the Mulan PSL v2.
+ * You can use this software according to the terms and conditions of the Mulan PSL v2.
+ * You may obtain a copy of Mulan PSL v2 at:
+@@ -31,6 +31,11 @@ static map_t *image_byid_new = NULL;
+
+ struct remote_image_data *remote_image_create(const char *remote_home, const char *remote_ro)
+ {
++ if (remote_home == NULL) {
++ ERROR("Empty remote home");
++ return NULL;
++ }
++
+ struct remote_image_data *data = util_common_calloc_s(sizeof(struct remote_image_data));
+ if (data == NULL) {
+ ERROR("Out of memory");
+@@ -204,6 +209,11 @@ static int remote_image_add(void *data)
+
+ void remote_image_refresh(struct remote_image_data *data)
+ {
++ if (data == NULL) {
++ ERROR("Skip refresh remote image for empty data");
++ return;
++ }
++
+ if (remote_dir_scan(data) != 0) {
+ ERROR("remote overlay failed to scan dir, skip refresh");
+ return;
+diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c b/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c
+index b1a1e944..7527f1e4 100644
+--- a/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c
++++ b/src/daemon/modules/image/oci/storage/remote_layer_support/layer_remote_impl.c
+@@ -31,6 +31,11 @@ static map_t *layer_byid_new = NULL;
+
+ struct remote_layer_data *remote_layer_create(const char *layer_home, const char *layer_ro)
+ {
++ if (layer_home == NULL || layer_ro == NULL) {
++ ERROR("Empty layer home or layer ro");
++ return NULL;
++ }
++
+ struct remote_layer_data *data = util_common_calloc_s(sizeof(struct remote_layer_data));
+ if (data == NULL) {
+ ERROR("Out of memory");
+@@ -232,6 +237,11 @@ static int remote_layer_add(struct remote_layer_data *data)
+
+ void remote_layer_refresh(struct remote_layer_data *data)
+ {
++ if (data == NULL) {
++ ERROR("Skip refresh remote layer for empty data");
++ return;
++ }
++
+ if (remote_dir_scan(data) != 0) {
+ ERROR("remote layer failed to scan dir, skip refresh");
+ return;
+diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c b/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c
+index e44c64ef..38d9b0ce 100644
+--- a/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c
++++ b/src/daemon/modules/image/oci/storage/remote_layer_support/overlay_remote_impl.c
+@@ -37,6 +37,11 @@ static map_t *overlay_id_link = NULL;
+
+ struct remote_overlay_data *remote_overlay_create(const char *remote_home, const char *remote_ro)
+ {
++ if (remote_home == NULL || remote_ro == NULL) {
++ ERROR("Empty remote home or remote ro");
++ return NULL;
++ }
++
+ struct remote_overlay_data *data = util_common_calloc_s(sizeof(struct remote_overlay_data));
+ if (data == NULL) {
+ ERROR("Out of memory");
+@@ -341,6 +346,11 @@ static int remote_overlay_add(struct remote_overlay_data *data)
+
+ void remote_overlay_refresh(struct remote_overlay_data *data)
+ {
++ if (data == NULL) {
++ ERROR("Skip refresh remote overlay for empty data");
++ return;
++ }
++
+ if (remote_dir_scan(data) != 0) {
+ ERROR("remote overlay failed to scan dir, skip refresh");
+ return;
+diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c b/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c
+index 1bac8dd5..5bf9869b 100644
+--- a/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c
++++ b/src/daemon/modules/image/oci/storage/remote_layer_support/remote_support.c
+@@ -87,6 +87,11 @@ int remote_start_refresh_thread(pthread_rwlock_t *remote_lock)
+ pthread_t a_thread;
+ maintain_context ctx = get_maintain_context();
+
++ if (remote_lock == NULL) {
++ ERROR("Invalid remote lock");
++ return -1;
++ }
++
+ supporters.image_data = remote_image_create(ctx.image_home, NULL);
+ if (supporters.image_data == NULL) {
+ goto free_out;
+diff --git a/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c b/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c
+index 4d234aab..ea40ae45 100644
+--- a/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c
++++ b/src/daemon/modules/image/oci/storage/remote_layer_support/ro_symlink_maintain.c
+@@ -37,6 +37,8 @@ static char *layer_home;
+ static char *overlay_ro_dir;
+ static char *overlay_home;
+
++#define LAYER_RO_DIR_MODE 0700
++
+ int remote_image_init(const char *root_dir)
+ {
+ if (root_dir == NULL) {
+@@ -67,7 +69,7 @@ int remote_layer_init(const char *root_dir)
+ ERROR("Failed join path when init remote layer maintainer");
+ goto out;
+ }
+- if (!util_file_exists(layer_ro_dir) && util_mkdir_p(layer_ro_dir, 0700) != 0) {
++ if (!util_file_exists(layer_ro_dir) && util_mkdir_p(layer_ro_dir, LAYER_RO_DIR_MODE) != 0) {
+ ERROR("Failed to create RO dir under overlay");
+ goto out;
+ }
+@@ -127,6 +129,11 @@ static int do_build_ro_dir(const char *home, const char *id)
+ int nret = 0;
+ int ret = 0;
+
++ if (home == NULL || id == NULL) {
++ ERROR("Empty home or id");
++ return -1;
++ }
++
+ nret = asprintf(&ro_symlink, "%s/%s", home, id);
+ if (nret < 0 || nret > PATH_MAX) {
+ SYSERROR("Failed create ro layer dir sym link path");
+@@ -183,7 +190,7 @@ int do_remove_ro_dir(const char *home, const char *id)
+ int ret = 0;
+ int nret = 0;
+
+- if (id == NULL) {
++ if (home == NULL || id == NULL) {
+ return 0;
+ }
+
+diff --git a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c
+index ee1e15d0..7ed07029 100644
+--- a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c
++++ b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.c
+@@ -121,7 +121,7 @@ static void free_rootfs_store(rootfs_store_t *store)
+ free(store);
+ }
+
+-void rootfs_store_free()
++void rootfs_store_free(void)
+ {
+ free_rootfs_store(g_rootfs_store);
+ g_rootfs_store = NULL;
+@@ -1085,7 +1085,7 @@ out:
+ return ret;
+ }
+
+-int rootfs_store_wipe()
++int rootfs_store_wipe(void)
+ {
+ int ret = 0;
+ char *id = NULL;
+@@ -1125,7 +1125,7 @@ int rootfs_store_set_metadata(const char *id, const char *metadata)
+ cntrootfs_t *cntr = NULL;
+
+ if (id == NULL || metadata == NULL) {
+- ERROR("Invalid paratemer: id(%s), metadata(%s)", id, metadata);
++ ERROR("Invalid paratemer");
+ return -1;
+ }
+
+@@ -1331,7 +1331,7 @@ out:
+ return ret;
+ }
+
+-char *rootfs_store_get_data_dir()
++char *rootfs_store_get_data_dir(void)
+ {
+ return util_strdup_s(g_rootfs_store->dir);
+ }
+\ No newline at end of file
+diff --git a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h
+index c23af091..63f3294b 100644
+--- a/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h
++++ b/src/daemon/modules/image/oci/storage/rootfs_store/rootfs_store.h
+@@ -48,7 +48,7 @@ char *rootfs_store_lookup(const char *id);
+ int rootfs_store_delete(const char *id);
+
+ // Remove records of all containers
+-int rootfs_store_wipe();
++int rootfs_store_wipe(void);
+
+ // Updates the metadata associated with the item with the specified ID.
+ int rootfs_store_set_metadata(const char *id, const char *metadata);
+@@ -66,10 +66,10 @@ storage_rootfs *rootfs_store_get_rootfs(const char *id);
+ int rootfs_store_get_all_rootfs(struct rootfs_list *all_rootfs);
+
+ // Return rootfs store data dir
+-char *rootfs_store_get_data_dir();
++char *rootfs_store_get_data_dir(void);
+
+ // Free memory of container store, but will not delete the persisted files
+-void rootfs_store_free();
++void rootfs_store_free(void);
+
+ #ifdef __cplusplus
+ }
+diff --git a/src/daemon/modules/image/oci/storage/storage.c b/src/daemon/modules/image/oci/storage/storage.c
+index 13f8bb53..255ec89c 100644
+--- a/src/daemon/modules/image/oci/storage/storage.c
++++ b/src/daemon/modules/image/oci/storage/storage.c
+@@ -194,6 +194,11 @@ int storage_inc_hold_refs(const char *layer_id)
+ {
+ int ret = 0;
+
++ if (layer_id == NULL) {
++ ERROR("Empty layer id");
++ return -1;
++ }
++
+ if (!storage_lock(&g_storage_rwlock, true)) {
+ ERROR("Failed to lock image store when increase hold refs number for layer %s", layer_id);
+ return -1;
+@@ -209,6 +214,11 @@ int storage_inc_hold_refs(const char *layer_id)
+ int storage_dec_hold_refs(const char *layer_id)
+ {
+ int ret = 0;
++
++ if (layer_id == NULL) {
++ ERROR("Empty layer id");
++ return -1;
++ }
+
+ if (!storage_lock(&g_storage_rwlock, true)) {
+ ERROR("Failed to lock image store when decrease hold refs number for layer %s", layer_id);
+@@ -284,6 +294,11 @@ struct layer_list *storage_layers_get_by_compress_digest(const char *digest)
+ int ret = 0;
+ struct layer_list *layers = NULL;
+
++ if (digest == NULL) {
++ ERROR("Empty digest");
++ return NULL;
++ }
++
+ layers = util_common_calloc_s(sizeof(struct layer_list));
+ if (layers == NULL) {
+ ERROR("Out of memory");
+@@ -539,7 +554,7 @@ char *storage_img_get_image_id(const char *img_name)
+ return image_store_lookup(img_name);
+ }
+
+-bool is_top_layer_of_other_image(const char *img_id, const imagetool_images_list *all_images, const char *layer_id)
++static bool is_top_layer_of_other_image(const char *img_id, const imagetool_images_list *all_images, const char *layer_id)
+ {
+ size_t i = 0;
+
+@@ -913,6 +928,11 @@ int storage_img_set_image_size(const char *image_id)
+ int ret = 0;
+ int64_t image_size = 0;
+
++ if (image_id == NULL) {
++ ERROR("Empty image id");
++ return -1;
++ }
++
+ image_size = storage_img_cal_image_size(image_id);
+ if (image_size < 0) {
+ ERROR("Failed to get image %s size", image_id);
+@@ -961,7 +981,7 @@ bool storage_image_exist(const char *image_or_id)
+ return image_store_exists(image_or_id);
+ }
+
+-size_t storage_get_img_count()
++size_t storage_get_img_count(void)
+ {
+ return image_store_get_images_number();
+ }
+@@ -1250,8 +1270,8 @@ int storage_rootfs_fs_usgae(const char *container_id, imagetool_fs_info *fs_info
+ }
+
+ rootfs_info = rootfs_store_get_rootfs(container_id);
+- if (rootfs_info == NULL) {
+- ERROR("Failed to get rootfs %s info", container_id);
++ if (rootfs_info == NULL || rootfs_info->layer == NULL) {
++ ERROR("Failed to get valid rootfs %s info", container_id);
+ ret = -1;
+ goto out;
+ }
+@@ -1278,7 +1298,7 @@ char *storage_rootfs_mount(const char *container_id)
+ }
+
+ rootfs_info = rootfs_store_get_rootfs(container_id);
+- if (rootfs_info == NULL) {
++ if (rootfs_info == NULL || rootfs_info->layer == NULL) {
+ ERROR("Failed to get rootfs %s info", container_id);
+ goto out;
+ }
+@@ -1726,6 +1746,11 @@ container_inspect_graph_driver *storage_get_metadata_by_container_id(const char
+ storage_rootfs *rootfs_info = NULL;
+ container_inspect_graph_driver *container_metadata = NULL;
+
++ if (id == NULL) {
++ ERROR("Empty id");
++ return NULL;
++ }
++
+ rootfs_info = rootfs_store_get_rootfs(id);
+ if (rootfs_info == NULL) {
+ ERROR("Failed to get rootfs %s info", id);
+diff --git a/src/daemon/modules/image/oci/storage/storage.h b/src/daemon/modules/image/oci/storage/storage.h
+index a761938c..718f7eff 100644
+--- a/src/daemon/modules/image/oci/storage/storage.h
++++ b/src/daemon/modules/image/oci/storage/storage.h
+@@ -119,7 +119,7 @@ typedef struct storage_layer_create_opts {
+
+ int storage_module_init(struct storage_module_init_options *opts);
+
+-void storage_module_exit();
++void storage_module_exit(void);
+
+ void free_storage_module_init_options(struct storage_module_init_options *opts);
+
+@@ -153,7 +153,7 @@ int storage_img_set_image_size(const char *image_id);
+
+ char *storage_get_img_top_layer(const char *id);
+
+-size_t storage_get_img_count();
++size_t storage_get_img_count(void);
+
+ char *storage_img_get_image_id(const char *img_name);
+
+@@ -191,7 +191,7 @@ char *storage_rootfs_mount(const char *container_id);
+
+ int storage_rootfs_umount(const char *container_id, bool force);
+
+-char *storage_rootfs_get_dir();
++char *storage_rootfs_get_dir(void);
+
+ container_inspect_graph_driver *storage_get_metadata_by_container_id(const char *id);
+
+diff --git a/src/daemon/modules/image/oci/utils_images.c b/src/daemon/modules/image/oci/utils_images.c
+index 2c5656c6..f8fd1e73 100644
+--- a/src/daemon/modules/image/oci/utils_images.c
++++ b/src/daemon/modules/image/oci/utils_images.c
+@@ -247,7 +247,7 @@ int oci_split_image_name(const char *image_name, char **host, char **name, char
+ return 0;
+ }
+
+-char *get_hostname_to_strip()
++char *get_hostname_to_strip(void)
+ {
+ char *name = NULL;
+
+@@ -320,6 +320,11 @@ char *make_big_data_base_name(const char *key)
+ char *base_name = NULL;
+ size_t name_size;
+
++ if (key == NULL) {
++ ERROR("Empty key");
++ return NULL;
++ }
++
+ if (should_use_origin_name(key)) {
+ return util_strdup_s(key);
+ }
+diff --git a/src/daemon/modules/image/oci/utils_images.h b/src/daemon/modules/image/oci/utils_images.h
+index 97879e41..2238bb91 100644
+--- a/src/daemon/modules/image/oci/utils_images.h
++++ b/src/daemon/modules/image/oci/utils_images.h
+@@ -57,7 +57,7 @@ int oci_split_search_name(const char *search_name, char **host, char **name);
+
+ char *oci_get_isulad_tmpdir(const char *root_dir);
+ int makesure_isulad_tmpdir_perm_right(const char *root_dir);
+-char *get_hostname_to_strip();
++char *get_hostname_to_strip(void);
+
+ char *oci_image_digest_pos(const char *name);
+
+diff --git a/src/utils/http/http.h b/src/utils/http/http.h
+index cdd6d64f..02d56ba8 100644
+--- a/src/utils/http/http.h
++++ b/src/utils/http/http.h
+@@ -107,6 +107,8 @@ struct http_get_options {
+ #define AUTHZ_UNIX_SOCK "/run/isulad/plugins/authz-broker.sock"
+ #define AUTHZ_REQUEST_URL "http://localhost/isulad.auth"
+
++#define BODY_FILE_MODE 0600
++
+ /* http response code */
+ enum http_response_code {
+ StatusContinue = 100, // RFC 7231, 6.2.1
+diff --git a/test/image/oci/storage/layers/storage_driver_ut.cc b/test/image/oci/storage/layers/storage_driver_ut.cc
+index ae9f4df1..943fa073 100644
+--- a/test/image/oci/storage/layers/storage_driver_ut.cc
++++ b/test/image/oci/storage/layers/storage_driver_ut.cc
+@@ -269,12 +269,4 @@ TEST_F(StorageDriverUnitTest, test_graphdriver_try_repair_lowers)
+
+ std::string id { "1be74353c3d0fd55fb5638a52953e6f1bc441e5b1710921db9ec2aa202725569" };
+ ASSERT_EQ(graphdriver_try_repair_lowers(id.c_str(), nullptr), 0);
+-}
+-
+-TEST(StorageOverlay2QuotaOptionsTest, test_overlay2_is_quota_options)
+-{
+- std::vector<std::string> options { "overlay2.size", "overlay2.basesize" };
+- for (auto option : options) {
+- ASSERT_TRUE(overlay2_is_quota_options(nullptr, option.c_str()));
+- }
+-}
++}
+\ No newline at end of file
+diff --git a/test/image/oci/storage/layers/storage_layers_ut.cc b/test/image/oci/storage/layers/storage_layers_ut.cc
+index fca37e83..73611fdc 100644
+--- a/test/image/oci/storage/layers/storage_layers_ut.cc
++++ b/test/image/oci/storage/layers/storage_layers_ut.cc
+@@ -278,19 +278,6 @@ TEST_F(StorageLayersUnitTest, test_layers_load)
+ free_layer_list(layer_list);
+ }
+
+-TEST_F(StorageLayersUnitTest, test_layer_store_exists)
+-{
+- if (!support_overlay) {
+- return;
+- }
+-
+- std::string id { "7db8f44a0a8e12ea4283e3180e98880007efbd5de2e7c98b67de9cdd4dfffb0b" };
+- std::string incorrectId { "50551ff67da98ab8540d7132" };
+-
+- ASSERT_TRUE(layer_store_exists(id.c_str()));
+- ASSERT_FALSE(layer_store_exists(incorrectId.c_str()));
+-}
+-
+ TEST_F(StorageLayersUnitTest, test_layer_store_create)
+ {
+ if (!support_overlay) {
+@@ -337,24 +324,3 @@ TEST_F(StorageLayersUnitTest, test_layer_store_by_compress_digest)
+
+ free_layer_list(layer_list);
+ }
+-
+-TEST_F(StorageLayersUnitTest, test_layer_store_by_uncompress_digest)
+-{
+- if (!support_overlay) {
+- return;
+- }
+-
+- std::string uncompress { "sha256:9c27e219663c25e0f28493790cc0b88bc973ba3b1686355f221c38a36978ac63" };
+- std::string id { "9c27e219663c25e0f28493790cc0b88bc973ba3b1686355f221c38a36978ac63" };
+- struct layer_list *layer_list = (struct layer_list *)util_common_calloc_s(sizeof(struct layer_list));
+-
+- ASSERT_EQ(layer_store_by_uncompress_digest(uncompress.c_str(), layer_list), 0);
+- ASSERT_EQ(layer_list->layers_len, 1);
+-
+- struct layer **layers = layer_list->layers;
+- ASSERT_STREQ(layers[0]->id, id.c_str());
+- ASSERT_STREQ(layers[0]->uncompressed_digest, uncompress.c_str());
+- ASSERT_EQ(layers[0]->uncompress_size, 1672256);
+-
+- free_layer_list(layer_list);
+-}
+diff --git a/test/mocks/driver_overlay2_mock.cc b/test/mocks/driver_overlay2_mock.cc
+index 6f24dbcf..6892539d 100644
+--- a/test/mocks/driver_overlay2_mock.cc
++++ b/test/mocks/driver_overlay2_mock.cc
+@@ -39,11 +39,3 @@ int overlay2_parse_options(struct graphdriver *driver, const char **options, siz
+ }
+ return -1;
+ }
+-
+-bool overlay2_is_quota_options(struct graphdriver *driver, const char *option)
+-{
+- if (g_driver_overlay2_mock != nullptr) {
+- return g_driver_overlay2_mock->Overlay2IsQuotaOptions(driver, option);
+- }
+- return false;
+-}
+diff --git a/test/mocks/driver_overlay2_mock.h b/test/mocks/driver_overlay2_mock.h
+index 071e6287..f09b715a 100644
+--- a/test/mocks/driver_overlay2_mock.h
++++ b/test/mocks/driver_overlay2_mock.h
+@@ -24,7 +24,6 @@ public:
+ virtual ~MockDriverOverlay2() = default;
+ MOCK_METHOD1(Overlay2Init, int(struct graphdriver *));
+ MOCK_METHOD3(Overlay2ParseOptions, int(struct graphdriver *, const char **, size_t));
+- MOCK_METHOD2(Overlay2IsQuotaOptions, bool(struct graphdriver *, const char *));
+ };
+
+ void MockDriverOverlay2_SetMock(MockDriverOverlay2* mock);
+--
+2.40.1
+