MFp4 @229486:
Once PID is written to the pidfile, revoke all capability rights. We just want to keep the pidfile open. Reviewed by: brooks Sponsored by: The FreeBSD Foundation
This commit is contained in:
parent
fe5c716394
commit
4c7a48b7a9
@ -2363,8 +2363,13 @@ go_daemon(void)
|
||||
if (daemon(1, 0) == -1)
|
||||
error("daemon");
|
||||
|
||||
if (pidfile != NULL)
|
||||
if (pidfile != NULL) {
|
||||
pidfile_write(pidfile);
|
||||
if (cap_rights_limit(pidfile_fileno(pidfile), CAP_NONE) < 0 &&
|
||||
errno != ENOSYS) {
|
||||
error("can't limit pidfile descriptor: %m");
|
||||
}
|
||||
}
|
||||
|
||||
/* we are chrooted, daemon(3) fails to open /dev/null */
|
||||
if (nullfd != -1) {
|
||||
|
Loading…
Reference in New Issue
Block a user