diff options
author | Darren Tucker <dtucker@zip.com.au> | 2016-06-15 11:22:38 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2016-06-15 11:29:24 +1000 |
commit | 57b4ee04cad0d3e0fec1194753b0c4d31e39a1cd (patch) | |
tree | c16b86f69bb8273ebaedf7bef263fe5f7c184f11 | |
parent | 78dc8e3724e30ee3e1983ce013e80277dc6ca070 (diff) |
Move platform_disable_tracing into its own file.
Prevents link errors resolving the extern "options" when platform.o
gets linked into ssh-agent when building --with-pam.
-rw-r--r-- | Makefile.in | 4 | ||||
-rw-r--r-- | platform-tracing.c | 43 | ||||
-rw-r--r-- | platform.c | 23 |
3 files changed, 45 insertions, 25 deletions
diff --git a/Makefile.in b/Makefile.in index 1a2e743a6..141608bdb 100644 --- a/Makefile.in +++ b/Makefile.in | |||
@@ -92,13 +92,13 @@ LIBSSH_OBJS=${LIBOPENSSH_OBJS} \ | |||
92 | kex.o kexdh.o kexgex.o kexecdh.o kexc25519.o \ | 92 | kex.o kexdh.o kexgex.o kexecdh.o kexc25519.o \ |
93 | kexdhc.o kexgexc.o kexecdhc.o kexc25519c.o \ | 93 | kexdhc.o kexgexc.o kexecdhc.o kexc25519c.o \ |
94 | kexdhs.o kexgexs.o kexecdhs.o kexc25519s.o \ | 94 | kexdhs.o kexgexs.o kexecdhs.o kexc25519s.o \ |
95 | platform.o platform-pledge.o | 95 | platform-pledge.o platform-tracing.o |
96 | 96 | ||
97 | SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \ | 97 | SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \ |
98 | sshconnect.o sshconnect1.o sshconnect2.o mux.o | 98 | sshconnect.o sshconnect1.o sshconnect2.o mux.o |
99 | 99 | ||
100 | SSHDOBJS=sshd.o auth-rhosts.o auth-passwd.o auth-rsa.o auth-rh-rsa.o \ | 100 | SSHDOBJS=sshd.o auth-rhosts.o auth-passwd.o auth-rsa.o auth-rh-rsa.o \ |
101 | audit.o audit-bsm.o audit-linux.o \ | 101 | audit.o audit-bsm.o audit-linux.o platform.o \ |
102 | sshpty.o sshlogin.o servconf.o serverloop.o \ | 102 | sshpty.o sshlogin.o servconf.o serverloop.o \ |
103 | auth.o auth1.o auth2.o auth-options.o session.o \ | 103 | auth.o auth1.o auth2.o auth-options.o session.o \ |
104 | auth-chall.o auth2-chall.o groupaccess.o \ | 104 | auth-chall.o auth2-chall.o groupaccess.o \ |
diff --git a/platform-tracing.c b/platform-tracing.c new file mode 100644 index 000000000..81020e7f7 --- /dev/null +++ b/platform-tracing.c | |||
@@ -0,0 +1,43 @@ | |||
1 | /* | ||
2 | * Copyright (c) 2016 Darren Tucker. All rights reserved. | ||
3 | * | ||
4 | * Permission to use, copy, modify, and distribute this software for any | ||
5 | * purpose with or without fee is hereby granted, provided that the above | ||
6 | * copyright notice and this permission notice appear in all copies. | ||
7 | * | ||
8 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
9 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
10 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
11 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
13 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
14 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
15 | */ | ||
16 | |||
17 | #include "includes.h" | ||
18 | |||
19 | #include <sys/types.h> | ||
20 | #if defined(HAVE_SYS_PRCTL_H) | ||
21 | #include <sys/prctl.h> /* For prctl() and PR_SET_DUMPABLE */ | ||
22 | #endif | ||
23 | #ifdef HAVE_PRIV_H | ||
24 | #include <priv.h> /* For setpflags() and __PROC_PROTECT */ | ||
25 | #endif | ||
26 | #include <stdarg.h> | ||
27 | |||
28 | #include "log.h" | ||
29 | |||
30 | void | ||
31 | platform_disable_tracing(int strict) | ||
32 | { | ||
33 | #if defined(HAVE_PRCTL) && defined(PR_SET_DUMPABLE) | ||
34 | /* Disable ptrace on Linux without sgid bit */ | ||
35 | if (prctl(PR_SET_DUMPABLE, 0) != 0 && strict) | ||
36 | fatal("unable to make the process undumpable"); | ||
37 | #endif | ||
38 | #if defined(HAVE_SETPFLAGS) && defined(__PROC_PROTECT) | ||
39 | /* On Solaris, we should make this process untraceable */ | ||
40 | if (setpflags(__PROC_PROTECT, 1) != 0 && strict) | ||
41 | fatal("unable to make the process untraceable"); | ||
42 | #endif | ||
43 | } | ||
diff --git a/platform.c b/platform.c index c68bb09c1..acf8554cd 100644 --- a/platform.c +++ b/platform.c | |||
@@ -18,14 +18,6 @@ | |||
18 | 18 | ||
19 | #include "includes.h" | 19 | #include "includes.h" |
20 | 20 | ||
21 | #include <sys/types.h> | ||
22 | #if defined(HAVE_SYS_PRCTL_H) | ||
23 | #include <sys/prctl.h> /* For prctl() and PR_SET_DUMPABLE */ | ||
24 | #endif | ||
25 | #ifdef HAVE_PRIV_H | ||
26 | #include <priv.h> /* For setpflags() and __PROC_PROTECT */ | ||
27 | #endif | ||
28 | |||
29 | #include <stdarg.h> | 21 | #include <stdarg.h> |
30 | #include <unistd.h> | 22 | #include <unistd.h> |
31 | 23 | ||
@@ -223,18 +215,3 @@ platform_sys_dir_uid(uid_t uid) | |||
223 | #endif | 215 | #endif |
224 | return 0; | 216 | return 0; |
225 | } | 217 | } |
226 | |||
227 | void | ||
228 | platform_disable_tracing(int strict) | ||
229 | { | ||
230 | #if defined(HAVE_PRCTL) && defined(PR_SET_DUMPABLE) | ||
231 | /* Disable ptrace on Linux without sgid bit */ | ||
232 | if (prctl(PR_SET_DUMPABLE, 0) != 0 && strict) | ||
233 | fatal("unable to make the process undumpable"); | ||
234 | #endif | ||
235 | #if defined(HAVE_SETPFLAGS) && defined(__PROC_PROTECT) | ||
236 | /* On Solaris, we should make this process untraceable */ | ||
237 | if (setpflags(__PROC_PROTECT, 1) != 0 && strict) | ||
238 | fatal("unable to make the process untraceable"); | ||
239 | #endif | ||
240 | } | ||