sd_event_set_watchdog(m->event, true);
- sd_event_add_signal(m->event, &m->sigterm, SIGTERM, NULL, NULL);
- sd_event_add_signal(m->event, &m->sigint, SIGINT, NULL, NULL);
+ sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
+ sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
r = sd_resolve_default(&m->resolve);
if (r < 0)
manager_disconnect(m);
manager_flush_names(m);
- sd_event_source_unref(m->sigint);
- sd_event_source_unref(m->sigterm);
-
sd_event_source_unref(m->event_retry);
sd_event_source_unref(m->network_event_source);
int r;
r = sd_network_get_operational_state(&state);
- if (r >= 0 && streq("carrier", state))
+ if (r >= 0 && (streq("routable", state) || streq("degraded", state)))
return true;
else
return false;
return 0;
}
-static int drop_priviliges(void) {
+static int drop_privileges(void) {
static const cap_value_t bits[] = {
CAP_SYS_TIME,
};
gid_t gid;
int r;
- /* Unfortunately we cannot leave privilige dropping to PID 1
+ /* Unfortunately we cannot leave privilege dropping to PID 1
* here, since we want to run as user but want to keep te
* CAP_SYS_TIME capability. Since file capabilities have been
* introduced this cannot be done across exec() anymore,
umask(0022);
- r = drop_priviliges();
+ r = drop_privileges();
if (r < 0)
goto out;