/* Define to 1 if you have the `chroot' function. */
#undef HAVE_CHROOT
-/* Define to 1 if you have the `daemon' function. */
-#undef HAVE_DAEMON
-
/* Define to 1 if you have the <dlfcn.h> header file. */
#undef HAVE_DLFCN_H
-
-for ac_func in tzset sigprocmask fcntl getpwnam getrlimit setsid sbrk chroot kill sleep usleep random srandom recvmsg sendmsg writev setresuid setreuid setresgid setregid daemon
+for ac_func in tzset sigprocmask fcntl getpwnam getrlimit setsid sbrk chroot kill sleep usleep random srandom recvmsg sendmsg writev setresuid setreuid setresgid setregid
do
as_ac_var=`echo "ac_cv_func_$ac_func" | $as_tr_sh`
{ echo "$as_me:$LINENO: checking for $ac_func" >&5
if test $ac_cv_func_getaddrinfo = no; then
AC_LIBOBJ([fake-rfc2553])
fi
-AC_CHECK_FUNCS([tzset sigprocmask fcntl getpwnam getrlimit setsid sbrk chroot kill sleep usleep random srandom recvmsg sendmsg writev setresuid setreuid setresgid setregid daemon])
+AC_CHECK_FUNCS([tzset sigprocmask fcntl getpwnam getrlimit setsid sbrk chroot kill sleep usleep random srandom recvmsg sendmsg writev setresuid setreuid setresgid setregid])
# check mkdir
AC_MSG_CHECKING([whether mkdir has one arg])
static void
detach(struct config_file* cfg)
{
-#ifdef HAVE_DAEMON
- int err;
- if(daemon(1,0)!=0) {
- err=errno;
- unlink(cfg->pidfile);
- fatal_exit("daemon(3) failed: %s", strerror(err));
- }
-#else /* !HAVE_DAEMON */
#ifdef HAVE_WORKING_FORK
int fd, err;
/* Take off... */
#else
(void)cfg;
#endif /* HAVE_WORKING_FORK */
-#endif /* HAVE_DAEMON */
}
/** daemonize, drop user priviliges and chroot if needed */
+27 August 2008: Wouter
+ - daemon(3) is causing problems for people. Reverting the patch.
+ bug#200, and 199 and 203 contain sideline discussion on it.
+
26 August 2008: Wouter
- test for insecure zone when DLV is in use, also does negative cache.
- test for trustanchor when DLV is in use (the anchor works).