On Feb 6, 2012, at 3:46 PM, Mikolaj Golub wrote:

> 
> On Mon, 6 Feb 2012 09:27:06 +0100 Pawel Jakub Dawidek wrote:
> 
> PJD> For the patch itself.
> 
> PJD> You don't have to have two separate cases depending on request for
> PJD> pidfile. You can specify NULL pfh to the pidfile functions.
> PJD> Even in example from the manual page when pfh is NULL there is a case
> PJD> where we warn, but continue execution and call pidfile functions.
> PJD> This should simplify the code.
> 
> PJD> If you do that (actually even if you don't), remember to either use
> PJD> warn(3) before pidfile_remove(3) and exit(3) after or preserve errno
> PJD> before calling pidfile_remove(3), as pidfile_remove(3) can modify it if
> PJD> unlink(2) is unsuccessful or pfh is NULL.
> 
> Thanks. The updated version is attached.
> 
> -- 
> Mikolaj Golub
> 
> Index: usr.sbin/daemon/daemon.c
> ===================================================================
> --- usr.sbin/daemon/daemon.c  (revision 231014)
> +++ usr.sbin/daemon/daemon.c  (working copy)
> @@ -32,6 +32,7 @@
> __FBSDID("$FreeBSD$");
> 
> #include <sys/param.h>
> +#include <sys/wait.h>
> 
> #include <err.h>
> #include <errno.h>
> @@ -43,15 +44,16 @@ __FBSDID("$FreeBSD$");
> #include <unistd.h>
> 
> static void restrict_process(const char *);
> +static void wait_child(pid_t pid);
> static void usage(void);
> 
> int
> main(int argc, char *argv[])
> {
>       struct pidfh *pfh = NULL;
> -     int ch, nochdir, noclose, errcode;
> +     int ch, nochdir, noclose;
>       const char *pidfile, *user;
> -     pid_t otherpid;
> +     pid_t otherpid, pid;
> 
>       nochdir = noclose = 1;
>       pidfile = user = NULL;
> @@ -79,9 +81,7 @@ main(int argc, char *argv[])
>       if (argc == 0)
>               usage();
> 
> -     if (user != NULL)
> -             restrict_process(user);
> -
> +     pfh = NULL;
>       /*
>        * Try to open the pidfile before calling daemon(3),
>        * to be able to report the error intelligently
> @@ -100,22 +100,36 @@ main(int argc, char *argv[])
>       if (daemon(nochdir, noclose) == -1)
>               err(1, NULL);
> 
> -     /* Now that we are the child, write out the pid */
> -     if (pidfile)
> +     pid = 0;
> +     if (pidfile) {
> +             /*
> +              * Spawn a child to exec the command, so in the parent
> +              * we could wait for it to exit and remove pidfile.
> +              */
> +             pid = fork();
> +             if (pid == -1) {
> +                     pidfile_remove(pfh);
> +                     err(1, "fork");
> +             }
> +     }
> +     if (pid == 0) {
> +             /* Now that we are the child, write out the pid. */
>               pidfile_write(pfh);
> 
> -     execvp(argv[0], argv);
> +             if (user != NULL)
> +                     restrict_process(user);
> 
> -     /*
> -      * execvp() failed -- unlink pidfile if any, and
> -      * report the error
> -      */
> -     errcode = errno; /* Preserve errcode -- unlink may reset it */
> -     if (pidfile)
> -             pidfile_remove(pfh);
> +             execvp(argv[0], argv);
> 
> -     /* The child is now running, so the exit status doesn't matter. */
> -     errc(1, errcode, "%s", argv[0]);
> +             /*
> +              * execvp() failed -- report the error. The child is
> +              * now running, so the exit status doesn't matter.
> +              */
> +             err(1, "%s", argv[0]);
> +     }
> +     wait_child(pid);
> +     pidfile_remove(pfh);
> +     exit(0); /* Exit status does not metter. */
> }
> 
> static void
> @@ -132,6 +146,19 @@ restrict_process(const char *user)
> }
> 
> static void
> +wait_child(pid_t pid)
> +{
> +     int status;
> +
> +     while (waitpid(pid, &status, 0) == -1) {
> +             if (errno != EINTR) {
> +                     warn("waitpid");
> +                     break;
> +             }
> +     }
> +}
> +
> +static void
> usage(void)
> {
>       (void)fprintf(stderr,

Generally looks good to me -- I had patches to do a similar change but yours 
looks better.  When I get a chance, I will test your change with the O_CLOEXEC 
flag added back to the open() call in pidfile_open() -- I'm not sure how soon I 
will be able to do that, though.

Guy--------
This message has been scanned by ComplianceSafe, powered by Palisade's 
PacketSure.
_______________________________________________
svn-src-head@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-head
To unsubscribe, send any mail to "svn-src-head-unsubscr...@freebsd.org"

Reply via email to