svn commit: r260471 - head/sbin/casperd

Pawel Jakub Dawidek pjd at FreeBSD.org
Thu Jan 9 09:19:59 UTC 2014


Author: pjd
Date: Thu Jan  9 09:19:59 2014
New Revision: 260471
URL: http://svnweb.freebsd.org/changeset/base/260471

Log:
  Always create /var/run/casper with correct permissions and don't depend on the
  calling process' umask.
  
  Submitted by:	Mikhail <mp at lenta.ru>

Modified:
  head/sbin/casperd/casperd.c

Modified: head/sbin/casperd/casperd.c
==============================================================================
--- head/sbin/casperd/casperd.c	Thu Jan  9 09:16:35 2014	(r260470)
+++ head/sbin/casperd/casperd.c	Thu Jan  9 09:19:59 2014	(r260471)
@@ -541,6 +541,7 @@ main_loop(const char *sockpath, struct p
 	struct casper_service *casserv;
 	struct service_connection *sconn, *sconntmp;
 	int lsock, sock, maxfd, ret;
+	mode_t oldumask;
 
 	lsock = socket(AF_UNIX, SOCK_STREAM, 0);
 	if (lsock == -1)
@@ -554,8 +555,10 @@ main_loop(const char *sockpath, struct p
 	    sizeof(sun.sun_path));
 	sun.sun_len = SUN_LEN(&sun);
 
+	oldumask = umask(S_IXUSR | S_IXGRP | S_IXOTH);
 	if (bind(lsock, (struct sockaddr *)&sun, sizeof(sun)) == -1)
 		pjdlog_exit(1, "Unable to bind to %s", sockpath);
+	(void)umask(oldumask);
 	if (listen(lsock, 8) == -1)
 		pjdlog_exit(1, "Unable to listen on %s", sockpath);
 


More information about the svn-src-all mailing list