Date: 03 Jan 1997 17:01:56 +0000 From: Paul Richards <p.richards@elsevier.co.uk> To: Peter Wemm <peter@spinner.DIALix.COM> Cc: "Jordan K. Hubbard" <jkh@time.cdrom.com>, joerg_wunsch@uriah.heep.sax.de (Joerg Wunsch), jkh@freefall.freebsd.org (Jordan K. Hubbard), CVS-committers@freefall.freebsd.org, cvs-all@freefall.freebsd.org, cvs-usrsbin@freefall.freebsd.org Subject: Re: cvs commit: src/usr.sbin/syslogd syslogd.c Message-ID: <57ybeapu9n.fsf@tees.elsevier.co.uk> In-Reply-To: Peter Wemm's message of Sat, 04 Jan 1997 00:10:17 %2B0800 References: <199701031610.AAA25840@spinner.DIALix.COM>
next in thread | previous in thread | raw e-mail | index | archive | help
Peter Wemm <peter@spinner.DIALix.COM> writes: > I've sent mail on this off list, but for what it's worth, in /etc/rc we > have: > > rm -f /var/run/log > echo ' syslogd.'; syslogd > > Apart from the possibility of bugs in the unlink() code (Bruce has > commented on it), the change Jordan made should be about the same as > moving the rm -f into syslogd itself. It shouldn't make any difference.. > (But then again, I've had a rough few weeks, I am probably missing > something obvious again) See my other mail, it is dangerous for syslogd to simply do an unlink or even an `rm -f` since LogName can be passed from the command line and could be anything. The way it was before Jordan made his changes was correct in that it was safer than the previous behaviour of doing a blind unlink and yet still cleaned things up explicitly when appropriate. > I'm also not sure why it was possible for savecore to do a send() to the > /dev/log unix domain socket before anything had bound to it and started > listening for datagrams on it. Is this a special feature of AF_UNIX > sockets? Nor me. -- Paul Richards. Originative Solutions Ltd. (Netcraft Ltd. contractor) Elsevier Science TIS online journal project. Email: p.richards@elsevier.co.uk Phone: 0370 462071 (Mobile), +44 (0)1865 843155
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?57ybeapu9n.fsf>