420 lines
13 KiB
Diff
420 lines
13 KiB
Diff
diff -ur watchdog-5.5.orig/include/extern.h watchdog-5.5.cleanup/include/extern.h
|
|
--- watchdog-5.5.orig/include/extern.h 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/include/extern.h 2009-03-13 10:34:52.000000000 +0000
|
|
@@ -48,8 +48,12 @@
|
|
#define MAXICMPLEN 76
|
|
#define MAXPACKET (65536 - 60 - 8) /* max packet size */
|
|
|
|
+#ifndef TRUE
|
|
#define TRUE 1
|
|
+#endif
|
|
+#ifndef FALSE
|
|
#define FALSE 0
|
|
+#endif
|
|
|
|
#define TS_SIZE 12
|
|
|
|
diff -ur watchdog-5.5.orig/src/iface.c watchdog-5.5.cleanup/src/iface.c
|
|
--- watchdog-5.5.orig/src/iface.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/iface.c 2009-03-13 10:21:43.000000000 +0000
|
|
@@ -66,7 +66,7 @@
|
|
#if USE_SYSLOG
|
|
/* do verbose logging */
|
|
if (verbose && logtick && ticker == 1)
|
|
- syslog(LOG_INFO, "device %s received %u bytes", dev->name, bytes);
|
|
+ syslog(LOG_INFO, "device %s received %lu bytes", dev->name, bytes);
|
|
#endif
|
|
|
|
if (dev->parameter.iface.bytes == bytes) {
|
|
diff -ur watchdog-5.5.orig/src/keep_alive.c watchdog-5.5.cleanup/src/keep_alive.c
|
|
--- watchdog-5.5.orig/src/keep_alive.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/keep_alive.c 2009-03-13 10:40:32.000000000 +0000
|
|
@@ -20,7 +20,6 @@
|
|
struct tm *tm;
|
|
char tbuf[TS_SIZE + 1];
|
|
char tbufw[TS_SIZE + 1];
|
|
- int i;
|
|
|
|
if (hb == NULL)
|
|
return (ENOERR);
|
|
@@ -41,7 +40,8 @@
|
|
// success
|
|
if (nrts < hbstamps)
|
|
nrts++;
|
|
- lastts = ++lastts % hbstamps;
|
|
+ ++lastts;
|
|
+ lastts = lastts % hbstamps;
|
|
|
|
// write the buffer to the file
|
|
rewind(hb);
|
|
diff -ur watchdog-5.5.orig/src/lomount.c watchdog-5.5.cleanup/src/lomount.c
|
|
--- watchdog-5.5.orig/src/lomount.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/lomount.c 2009-03-13 10:24:55.000000000 +0000
|
|
@@ -195,13 +195,13 @@
|
|
break;
|
|
case LO_CRYPT_XOR:
|
|
pass = getpass ("Password: ");
|
|
- strncpy (loopinfo.lo_encrypt_key, pass, LO_KEY_SIZE);
|
|
+ strncpy ((char *) loopinfo.lo_encrypt_key, pass, LO_KEY_SIZE);
|
|
loopinfo.lo_encrypt_key[LO_KEY_SIZE - 1] = 0;
|
|
- loopinfo.lo_encrypt_key_size = strlen (loopinfo.lo_encrypt_key);
|
|
+ loopinfo.lo_encrypt_key_size = (int) strlen ((char *) loopinfo.lo_encrypt_key);
|
|
break;
|
|
case LO_CRYPT_DES:
|
|
pass = getpass ("Password: ");
|
|
- strncpy (loopinfo.lo_encrypt_key, pass, 8);
|
|
+ strncpy ((char *) loopinfo.lo_encrypt_key, pass, 8);
|
|
loopinfo.lo_encrypt_key[8] = 0;
|
|
loopinfo.lo_encrypt_key_size = 8;
|
|
pass = getpass ("Init (up to 16 hex digits): ");
|
|
diff -ur watchdog-5.5.orig/src/mntent.c watchdog-5.5.cleanup/src/mntent.c
|
|
--- watchdog-5.5.orig/src/mntent.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/mntent.c 2009-03-13 10:25:47.000000000 +0000
|
|
@@ -21,11 +21,11 @@
|
|
static char need_escaping[] = { ' ', '\t', '\n', '\\' };
|
|
|
|
static char *
|
|
-mangle(unsigned char *s) {
|
|
+mangle(const char *s) {
|
|
char *ss, *sp;
|
|
int n;
|
|
|
|
- n = strlen(s);
|
|
+ n = (int) strlen(s);
|
|
ss = sp = xmalloc(4*n+1);
|
|
while(1) {
|
|
for (n = 0; n < sizeof(need_escaping); n++) {
|
|
diff -ur watchdog-5.5.orig/src/net.c watchdog-5.5.cleanup/src/net.c
|
|
--- watchdog-5.5.orig/src/net.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/net.c 2009-03-13 10:28:09.000000000 +0000
|
|
@@ -57,7 +57,9 @@
|
|
for (i = 0; i < count; i++) {
|
|
|
|
struct sockaddr_in from;
|
|
- int fromlen, fdmask, j;
|
|
+ int fdmask, j;
|
|
+ int *fdmask_p;
|
|
+ socklen_t fromlen;
|
|
struct timeval timeout, dtimeout;
|
|
struct icmphdr *icp = (struct icmphdr *) outpack;
|
|
|
|
@@ -119,10 +121,11 @@
|
|
break;
|
|
#if USE_SYSLOG
|
|
if (verbose && logtick && ticker == 1)
|
|
- syslog(LOG_ERR, "ping select timeout = %d seconds and %d useconds\n", dtimeout.tv_sec, dtimeout.tv_usec);
|
|
+ syslog(LOG_ERR, "ping select timeout = %ld seconds and %ld useconds\n", dtimeout.tv_sec, dtimeout.tv_usec);
|
|
#endif /* USE_SYSLOG */
|
|
+ fdmask_p = &fdmask;
|
|
|
|
- if (select(sock_fp + 1, (fd_set *) & fdmask, (fd_set *) NULL,
|
|
+ if (select(sock_fp + 1, (fd_set *) fdmask_p, (fd_set *) NULL,
|
|
(fd_set *) NULL, &dtimeout) >= 1) {
|
|
|
|
/* read reply */
|
|
diff -ur watchdog-5.5.orig/src/nfsmount.c watchdog-5.5.cleanup/src/nfsmount.c
|
|
--- watchdog-5.5.orig/src/nfsmount.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/nfsmount.c 2009-03-13 10:28:33.000000000 +0000
|
|
@@ -48,6 +48,7 @@
|
|
#include <sys/stat.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
+#include <time.h>
|
|
|
|
#include "sundries.h"
|
|
#include "nfsmount.h"
|
|
diff -ur watchdog-5.5.orig/src/nfsmount_xdr.c watchdog-5.5.cleanup/src/nfsmount_xdr.c
|
|
--- watchdog-5.5.orig/src/nfsmount_xdr.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/nfsmount_xdr.c 2009-03-13 10:29:31.000000000 +0000
|
|
@@ -43,8 +43,6 @@
|
|
bool_t
|
|
xdr_fhandle (XDR *xdrs, fhandle objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_opaque (xdrs, objp, FHSIZE))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -53,8 +51,6 @@
|
|
bool_t
|
|
xdr_fhandle3 (XDR *xdrs, fhandle3 *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_bytes (xdrs, (char **)&objp->fhandle3_val, (u_int *) &objp->fhandle3_len, FHSIZE3))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -63,8 +59,6 @@
|
|
bool_t
|
|
xdr_mountstat3 (XDR *xdrs, mountstat3 *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_enum (xdrs, (enum_t *) objp))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -73,8 +67,6 @@
|
|
bool_t
|
|
xdr_fhstatus (XDR *xdrs, fhstatus *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_u_int (xdrs, &objp->fhs_status))
|
|
return FALSE;
|
|
switch (objp->fhs_status) {
|
|
@@ -91,8 +83,6 @@
|
|
bool_t
|
|
xdr_mountres3_ok (XDR *xdrs, mountres3_ok *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_fhandle3 (xdrs, &objp->fhandle))
|
|
return FALSE;
|
|
if (!xdr_array (xdrs, (char **)&objp->auth_flavours.auth_flavours_val, (u_int *) &objp->auth_flavours.auth_flavours_len, ~0,
|
|
@@ -104,8 +94,6 @@
|
|
bool_t
|
|
xdr_mountres3 (XDR *xdrs, mountres3 *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_mountstat3 (xdrs, &objp->fhs_status))
|
|
return FALSE;
|
|
switch (objp->fhs_status) {
|
|
@@ -122,8 +110,6 @@
|
|
bool_t
|
|
xdr_dirpath (XDR *xdrs, dirpath *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_string (xdrs, objp, MNTPATHLEN))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -132,8 +118,6 @@
|
|
bool_t
|
|
xdr_name (XDR *xdrs, name *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_string (xdrs, objp, MNTNAMLEN))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -142,8 +126,6 @@
|
|
bool_t
|
|
xdr_mountlist (XDR *xdrs, mountlist *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_pointer (xdrs, (char **)objp, sizeof (struct mountbody), (xdrproc_t) xdr_mountbody))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -152,8 +134,6 @@
|
|
bool_t
|
|
xdr_mountbody (XDR *xdrs, mountbody *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_name (xdrs, &objp->ml_hostname))
|
|
return FALSE;
|
|
if (!xdr_dirpath (xdrs, &objp->ml_directory))
|
|
@@ -166,8 +146,6 @@
|
|
bool_t
|
|
xdr_groups (XDR *xdrs, groups *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_pointer (xdrs, (char **)objp, sizeof (struct groupnode), (xdrproc_t) xdr_groupnode))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -176,8 +154,6 @@
|
|
bool_t
|
|
xdr_groupnode (XDR *xdrs, groupnode *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_name (xdrs, &objp->gr_name))
|
|
return FALSE;
|
|
if (!xdr_groups (xdrs, &objp->gr_next))
|
|
@@ -188,8 +164,6 @@
|
|
bool_t
|
|
xdr_exports (XDR *xdrs, exports *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_pointer (xdrs, (char **)objp, sizeof (struct exportnode), (xdrproc_t) xdr_exportnode))
|
|
return FALSE;
|
|
return TRUE;
|
|
@@ -198,8 +172,6 @@
|
|
bool_t
|
|
xdr_exportnode (XDR *xdrs, exportnode *objp)
|
|
{
|
|
- register int32_t *buf;
|
|
-
|
|
if (!xdr_dirpath (xdrs, &objp->ex_dir))
|
|
return FALSE;
|
|
if (!xdr_groups (xdrs, &objp->ex_groups))
|
|
diff -ur watchdog-5.5.orig/src/pidfile.c watchdog-5.5.cleanup/src/pidfile.c
|
|
--- watchdog-5.5.orig/src/pidfile.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/pidfile.c 2009-03-13 10:30:08.000000000 +0000
|
|
@@ -6,6 +6,10 @@
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
+#include <unistd.h>
|
|
+#include <stdlib.h>
|
|
+#include <wait.h>
|
|
+
|
|
#include "extern.h"
|
|
#include "watch_err.h"
|
|
|
|
diff -ur watchdog-5.5.orig/src/shutdown.c watchdog-5.5.cleanup/src/shutdown.c
|
|
--- watchdog-5.5.orig/src/shutdown.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/shutdown.c 2009-03-13 10:35:53.000000000 +0000
|
|
@@ -4,6 +4,9 @@
|
|
#include "config.h"
|
|
#endif
|
|
|
|
+#define _XOPEN_SOURCE 500 /* for getsid(2) */
|
|
+#define _BSD_SOURCE /* for acct(2) */
|
|
+
|
|
#include <dirent.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
@@ -18,6 +21,10 @@
|
|
#include <sys/mman.h>
|
|
#include <sys/param.h>
|
|
#include <sys/stat.h>
|
|
+#include <sys/types.h>
|
|
+#include <unistd.h>
|
|
+#include <time.h>
|
|
+#include <rpc/types.h> /* for caddr_t */
|
|
|
|
#include "watch_err.h"
|
|
#include "extern.h"
|
|
@@ -320,6 +327,7 @@
|
|
void do_shutdown(int errorcode)
|
|
{
|
|
int i = 0, fd;
|
|
+ size_t write_len;
|
|
char *seedbck = RANDOM_SEED;
|
|
|
|
/* soft-boot the system */
|
|
@@ -338,7 +346,7 @@
|
|
* We cannot let the shell check, because a non-existant or
|
|
* non-executable sendmail binary means that the pipe is closed faster
|
|
* than we can write to it. */
|
|
- if ((stat(PATH_SENDMAIL, &buf) != 0) || (buf.st_mode&S_IXUSR == 0))
|
|
+ if ((stat(PATH_SENDMAIL, &buf) != 0) || ((buf.st_mode&S_IXUSR) == 0))
|
|
#if USE_SYSLOG
|
|
syslog(LOG_ERR, "%s does not exist or is not executable (errno = %d)", PATH_SENDMAIL, errno);
|
|
#endif /* USE_SYSLOG */
|
|
@@ -438,7 +446,7 @@
|
|
wtmp.ut_pid = 0;
|
|
wtmp.ut_type = RUN_LVL;
|
|
wtmp.ut_time = t;
|
|
- write(fd, (char *) &wtmp, sizeof(wtmp));
|
|
+ write_len = write(fd, (char *) &wtmp, sizeof(wtmp));
|
|
close(fd);
|
|
}
|
|
|
|
@@ -454,7 +462,7 @@
|
|
char buf[512];
|
|
|
|
if (read(fd_seed, buf, 512) == 512)
|
|
- write(fd_bck, buf, 512);
|
|
+ write_len = write(fd_bck, buf, 512);
|
|
close(fd_bck);
|
|
}
|
|
close(fd_seed);
|
|
diff -ur watchdog-5.5.orig/src/temp.c watchdog-5.5.cleanup/src/temp.c
|
|
--- watchdog-5.5.orig/src/temp.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/temp.c 2009-03-13 10:36:04.000000000 +0000
|
|
@@ -31,7 +31,7 @@
|
|
int err = errno;
|
|
|
|
#if USE_SYSLOG
|
|
- syslog(LOG_ERR, "read %s gave errno = %d = '%m'", err, tempname);
|
|
+ syslog(LOG_ERR, "read %s gave errno = %d = '%m'", tempname, err);
|
|
#else /* USE_SYSLOG */
|
|
perror(progname);
|
|
#endif /* USE_SYSLOG */
|
|
diff -ur watchdog-5.5.orig/src/test_binary.c watchdog-5.5.cleanup/src/test_binary.c
|
|
--- watchdog-5.5.orig/src/test_binary.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/test_binary.c 2009-03-13 10:36:58.000000000 +0000
|
|
@@ -8,6 +8,8 @@
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <sys/wait.h>
|
|
+#include <time.h>
|
|
+
|
|
#include "extern.h"
|
|
#include "watch_err.h"
|
|
|
|
@@ -76,7 +78,7 @@
|
|
res = check_processes(timeout);
|
|
if (res == ETOOLONG) {
|
|
#if USE_SYSLOG
|
|
- syslog(LOG_ERR, "test-binary %s exceeded time limit %d", tbinary, timeout);
|
|
+ syslog(LOG_ERR, "test-binary %s exceeded time limit %ld", tbinary, timeout);
|
|
#endif /* USE_SYSLOG */
|
|
return res;
|
|
}
|
|
diff -ur watchdog-5.5.orig/src/watchdog.c watchdog-5.5.cleanup/src/watchdog.c
|
|
--- watchdog-5.5.orig/src/watchdog.c 2009-02-25 11:12:59.000000000 +0000
|
|
+++ watchdog-5.5.cleanup/src/watchdog.c 2009-03-13 10:42:44.000000000 +0000
|
|
@@ -23,6 +23,8 @@
|
|
#include <arpa/inet.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/wait.h>
|
|
+#include <sys/stat.h>
|
|
+#include <sys/types.h>
|
|
#define __USE_GNU
|
|
#include <string.h>
|
|
|
|
@@ -619,7 +621,7 @@
|
|
/* Log the starting message */
|
|
openlog(progname, LOG_PID, LOG_DAEMON);
|
|
syslog(LOG_INFO, "starting daemon (%d.%d):", MAJOR_VERSION, MINOR_VERSION);
|
|
- syslog(LOG_INFO, "int=%ds realtime=%s sync=%s soft=%s mla=%d mem=%ld",
|
|
+ syslog(LOG_INFO, "int=%ds realtime=%s sync=%s soft=%s mla=%d mem=%d",
|
|
tint,
|
|
realtime ? "yes" : "no",
|
|
sync_it ? "yes" : "no",
|
|
@@ -650,7 +652,7 @@
|
|
for (act = iface; act != NULL; act = act->next)
|
|
syslog(LOG_INFO, "interface: %s", act->name);
|
|
|
|
- syslog(LOG_INFO, "test=%s(%d) repair=%s alive=%s heartbeat=%s temp=%s to=%s no_act=%s",
|
|
+ syslog(LOG_INFO, "test=%s(%ld) repair=%s alive=%s heartbeat=%s temp=%s to=%s no_act=%s",
|
|
(tbinary == NULL) ? "none" : tbinary, timeout,
|
|
(rbinary == NULL) ? "none" : rbinary,
|
|
(devname == NULL) ? "none" : devname,
|
|
@@ -692,7 +694,7 @@
|
|
/* Allocate memory for keeping the timestamps in */
|
|
nrts = 0;
|
|
lastts = 0;
|
|
- timestamps = (unsigned char *) calloc(hbstamps, TS_SIZE);
|
|
+ timestamps = (char *) calloc(hbstamps, TS_SIZE);
|
|
if ( timestamps == NULL ) {
|
|
#if USE_SYSLOG
|
|
syslog(LOG_ERR, "cannot allocate memory for timestamps (errno = %d = '%m')", errno);
|
|
@@ -707,7 +709,8 @@
|
|
memcpy(timestamps + (TS_SIZE * lastts), rbuf, TS_SIZE);
|
|
if (nrts < hbstamps)
|
|
nrts++;
|
|
- lastts = ++lastts % hbstamps;
|
|
+ ++lastts;
|
|
+ lastts = lastts % hbstamps;
|
|
}
|
|
/* Write an indication that the watchdog has started to the heartbeat file */
|
|
/* copy it to the buffer */
|
|
@@ -717,7 +720,8 @@
|
|
// success
|
|
if (nrts < hbstamps)
|
|
nrts++;
|
|
- lastts = ++lastts % hbstamps;
|
|
+ ++lastts;
|
|
+ lastts = lastts % hbstamps;
|
|
|
|
}
|
|
}
|