Legend:
- Unmodified
- Added
- Removed
-
trunk/src/sh_socket.c
r177 r200 53 53 SL_RET0(_("sh_socket_server_cmd")); 54 54 } 55 if ((srvcmd[0] == 'S') || (srvcmd[1] == 'T') ||56 (srvcmd[2] == 'O') ||(srvcmd[3] == 'P'))55 if ((srvcmd[0] == 'S') && (srvcmd[1] == 'T') && 56 (srvcmd[2] == 'O') && (srvcmd[3] == 'P')) 57 57 { 58 58 TPT((0, FIL__, __LINE__, _("msg=<stop command from server>\n"))); … … 60 60 raise(SIGQUIT); 61 61 #else 62 TPT((0, FIL__, __LINE__, _("msg=<sigquit not defined>\n"))); 62 sig_terminate = 1; 63 ++sig_raised; 63 64 #endif 64 65 } 65 else if ((srvcmd[0] == 'R') || (srvcmd[1] == 'E') ||66 (srvcmd[2] == 'L') || (srvcmd[3] == 'O') ||67 (srvcmd[4] == 'A') ||(srvcmd[5] == 'D'))66 else if ((srvcmd[0] == 'R') && (srvcmd[1] == 'E') && 67 (srvcmd[2] == 'L') && (srvcmd[3] == 'O') && 68 (srvcmd[4] == 'A') && (srvcmd[5] == 'D')) 68 69 { 69 70 TPT((0, FIL__, __LINE__, _("msg=<reload command from server>\n"))); … … 71 72 raise(SIGHUP); 72 73 #else 73 TPT((0, FIL__, __LINE__, _("msg=<sighup not defined>\n"))); 74 #endif 74 sig_config_read_again = 1; 75 ++sig_raised; 76 #endif 77 } 78 else if ((srvcmd[0] == 'S') && (srvcmd[1] == 'C') && 79 (srvcmd[2] == 'A') && (srvcmd[3] == 'N')) 80 { 81 TPT((0, FIL__, __LINE__, _("msg=<scan command from server>\n"))); 82 if (sh.flag.isdaemon == ON) 83 { 84 #ifdef SIGTTOU 85 raise(SIGTTOU); 86 #else 87 sig_force_check = 1; 88 ++sig_raised; 89 #endif 90 } 91 else 92 { 93 sig_force_check = 1; 94 ++sig_raised; 95 } 75 96 } 76 97 else -
trunk/src/sh_unix.c
r199 r200 3602 3602 tmp2 = sh_util_safe_name (theFile->fullpath); 3603 3603 3604 if (fstat_return != 0) 3604 3605 if (fd >= 0 && fstat_return != 0) 3605 3606 { 3606 3607 char errbuf[SH_ERRBUF_SIZE]; … … 3613 3614 tmp2); 3614 3615 } 3615 else if ( !S_ISREG(fbuf.st_mode))3616 else if (fd >= 0 && !S_ISREG(fbuf.st_mode)) 3616 3617 { 3617 3618 sh_error_handle (level, FIL__, __LINE__, fstat_errno, -
trunk/src/slib.c
r196 r200 2665 2665 { 2666 2666 case SL_EBOGUS: 2667 return _("Bogus file. Modified during access .");2667 return _("Bogus file. Modified during access"); 2668 2668 case SL_EWRITE: 2669 return _("Write error .");2669 return _("Write error"); 2670 2670 case SL_EREAD: 2671 return _("Read error .");2671 return _("Read error"); 2672 2672 case SL_ESYNC: 2673 return _("Error in fsync() .");2673 return _("Error in fsync()"); 2674 2674 case SL_EFORWARD: 2675 return _("Error in lseek() .");2675 return _("Error in lseek()"); 2676 2676 case SL_EREWIND: 2677 return _("Error in lseek() .");2677 return _("Error in lseek()"); 2678 2678 case SL_EUNLINK: 2679 return _("Error in unlink() .");2679 return _("Error in unlink()"); 2680 2680 case SL_EMEM: 2681 return _("Out of memory .");2681 return _("Out of memory"); 2682 2682 case SL_EINTERNAL: 2683 return _("Internal error .");2683 return _("Internal error"); 2684 2684 case SL_ETICKET: 2685 return _("Bad ticket .");2685 return _("Bad ticket"); 2686 2686 case SL_EREPEAT: 2687 return _("Illegal repeated use of function .");2687 return _("Illegal repeated use of function"); 2688 2688 case SL_ERANGE: 2689 return _("Argument out of range .");2689 return _("Argument out of range"); 2690 2690 case SL_ENULL: 2691 return _("Dereferenced NULL pointer .");2691 return _("Dereferenced NULL pointer"); 2692 2692 2693 2693 case SL_EBADUID: 2694 return _("Owner not trustworthy .");2694 return _("Owner not trustworthy"); 2695 2695 case SL_EBADGID: 2696 return _("Group writeable and member not trustworthy .");2696 return _("Group writeable and member not trustworthy"); 2697 2697 case SL_EBADOTH: 2698 return _("World writeable .");2698 return _("World writeable"); 2699 2699 case SL_EISDIR: 2700 return _("Is a directory .");2700 return _("Is a directory"); 2701 2701 case SL_EBADFILE: 2702 return _("File access error .");2702 return _("File access error"); 2703 2703 case SL_EBADNAME: 2704 return _("Invalid filename (prob. too long or null) .");2704 return _("Invalid filename (prob. too long or null)"); 2705 2705 2706 2706 case SL_ETRUNC: 2707 return _("Truncation occured .");2707 return _("Truncation occured"); 2708 2708 case SL_ESTAT: 2709 return _("stat() failed .");2709 return _("stat() failed"); 2710 2710 case SL_EFSTAT: 2711 return _("fstat() failed .");2711 return _("fstat() failed"); 2712 2712 default: 2713 return _("Unknown error .");2713 return _("Unknown error"); 2714 2714 } 2715 2715 } -
trunk/src/yulectl.c
r117 r200 327 327 printf(_("Commands: RELOAD <reload configuration>\n")); 328 328 printf(_(" STOP <terminate>\n")); 329 printf(_(" SCAN <initiate file system check\n")); 329 330 printf(_(" CANCEL <cancel previous command>\n")); 330 331 printf(_(" LIST <list queued commands>\n")); … … 400 401 strcat(home, _("/.yulectl_cred")); 401 402 fp = fopen(home, "r"); 403 404 #if !defined(HAVE_GETPEEREID) && !defined(SO_PEERCRED) && !defined(HAVE_STRUCT_CMSGCRED) && !defined(HAVE_STRUCT_FCRED) && !(defined(HAVE_STRUCT_SOCKCRED) && defined(LOCAL_CREDS)) 402 405 if (fp == NULL) 403 406 { 404 if ( verbose && (errno == ENOENT))405 fprintf (std out,406 _(" #No password file (%s) exists\n"),407 if (errno == ENOENT) { 408 fprintf (stderr, 409 _("ERROR No password file (%s) exists\n"), 407 410 home); 408 else if (verbose) 409 fprintf (stdout, 410 _("# Password file (%s) not accessible for euid %ld uid %ld\n"), 411 } 412 else { 413 fprintf (stderr, 414 _("ERROR: Password file (%s) not accessible for euid %ld uid %ld\n"), 411 415 home, (long)geteuid(), (long)getuid()); 412 return; 413 } 416 } 417 exit(EXIT_FAILURE); 418 } 419 #else 420 if (fp == NULL) 421 return; 422 #endif 423 414 424 if (NULL == fgets(message2, sizeof(message2), fp)) 415 425 {
Note:
See TracChangeset
for help on using the changeset viewer.