[Spread-cvs] cvs commit: spread/daemon alarm.h spread.c Readme.txt

jonathan at spread.org jonathan at spread.org
Fri Feb 13 11:14:27 EST 2004


jonathan    04/02/13 11:14:26

  Modified:    daemon   alarm.h spread.c Readme.txt
  Log:
  Change alarm tag from SEC to SECURITY to avoid name conflict with sys/time.h
  header. Problem reported by Mikhail Terekhov.
  
  Revision  Changes    Path
  1.4       +1 -1      spread/daemon/alarm.h
  
  Index: alarm.h
  ===================================================================
  RCS file: /storage/cvsroot/spread/daemon/alarm.h,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- alarm.h	12 Nov 2003 22:11:03 -0000	1.3
  +++ alarm.h	13 Feb 2004 16:14:26 -0000	1.4
  @@ -66,7 +66,7 @@
   #define         SKIPLIST        0x00200000
   #define         ACM             0x00400000
   
  -#define         SEC             0x00800000
  +#define         SECURITY        0x00800000
   
   #define		ALL		0xffffffff
   #define		NONE		0x00000000
  
  
  
  1.18      +4 -4      spread/daemon/spread.c
  
  Index: spread.c
  ===================================================================
  RCS file: /storage/cvsroot/spread/daemon/spread.c,v
  retrieving revision 1.17
  retrieving revision 1.18
  diff -u -r1.17 -r1.18
  --- spread.c	9 Feb 2004 19:38:21 -0000	1.17
  +++ spread.c	13 Feb 2004 16:14:26 -0000	1.18
  @@ -169,7 +169,7 @@
   	/* Yupp, we're paranoid */
    
   	if (geteuid() != (uid_t) 0) {
  -            Alarmp( SPLOG_WARNING, SEC, "Spread: not running as root, won't chroot\n" );
  +            Alarmp( SPLOG_WARNING, SECURITY, "Spread: not running as root, won't chroot\n" );
   	}
   	else if ( (grp = getgrnam(Conf_get_group())) == NULL
                     || (pwd = getpwnam(Conf_get_user())) == NULL ) {
  @@ -177,7 +177,7 @@
   	}
   	else if (chdir(Conf_get_runtime_dir()) < 0
                     || chroot(Conf_get_runtime_dir()) < 0 ) {
  -            Alarmp( SPLOG_FATAL, SEC, "Spread: FAILED chroot to '%s'\n",
  +            Alarmp( SPLOG_FATAL, SECURITY, "Spread: FAILED chroot to '%s'\n",
                      Conf_get_runtime_dir() );
   	}
   	else if ( setgroups(1, &grp->gr_gid) < 0
  @@ -185,7 +185,7 @@
                     || setuid(pwd->pw_uid) < 0) {
               Invalid_privilege_decrease(Conf_get_user(), Conf_get_group());
   	} else {
  -            Alarmp( SPLOG_INFO, SEC, "Spread: setugid and chroot successeful\n" );
  +            Alarmp( SPLOG_INFO, SECURITY, "Spread: setugid and chroot successeful\n" );
   	}
   
   #endif	/* ARCH_PC_WIN95 */
  @@ -206,7 +206,7 @@
   
   static	void	Invalid_privilege_decrease(char *user, char *group)
   {
  -    Alarmp( SPLOG_FATAL, SEC, "Spread: FAILED privilege drop to user/group "
  +    Alarmp( SPLOG_FATAL, SECURITY, "Spread: FAILED privilege drop to user/group "
              "'%s/%s' (defined in spread.conf or spread_params.h)\n",
              user, group );
   }
  
  
  
  1.50      +2 -0      spread/daemon/Readme.txt
  
  Index: Readme.txt
  ===================================================================
  RCS file: /storage/cvsroot/spread/daemon/Readme.txt,v
  retrieving revision 1.49
  retrieving revision 1.50
  diff -u -r1.49 -r1.50
  --- Readme.txt	13 Feb 2004 16:12:14 -0000	1.49
  +++ Readme.txt	13 Feb 2004 16:14:26 -0000	1.50
  @@ -77,6 +77,8 @@
   14) Fix small endianness error in sp.c where the mess_type field may not be
       correctly converted for different endian platforms when the SP_*_recv calls
       return a BUFFER_TOO_SHORT or GROUPS_TOO_SHORT error.
  +15) Change alarm tag for security prints from SEC to SECURITY because of conflict
  +    with sys/time.h header.
   
   SOURCE INSTALL:
   ---------------
  
  
  




More information about the Spread-cvs mailing list