- (dtucker) [configure.ac] Detect platforms that can't use select(2) with
setrlimit(RLIMIT_NOFILE, rl_zero) and disable the rlimit sandbox on those.
This commit is contained in:
parent
6ea5dc6bb8
commit
60395f91c6
|
@ -1,3 +1,7 @@
|
||||||
|
20120703
|
||||||
|
- (dtucker) [configure.ac] Detect platforms that can't use select(2) with
|
||||||
|
setrlimit(RLIMIT_NOFILE, rl_zero) and disable the rlimit sandbox on those.
|
||||||
|
|
||||||
20120702
|
20120702
|
||||||
- (dtucker) OpenBSD CVS Sync
|
- (dtucker) OpenBSD CVS Sync
|
||||||
- naddy@cvs.openbsd.org 2012/06/29 13:57:25
|
- naddy@cvs.openbsd.org 2012/06/29 13:57:25
|
||||||
|
|
51
configure.ac
51
configure.ac
|
@ -1,4 +1,4 @@
|
||||||
# $Id: configure.ac,v 1.492 2012/05/19 05:24:37 dtucker Exp $
|
# $Id: configure.ac,v 1.493 2012/07/03 04:31:18 dtucker Exp $
|
||||||
#
|
#
|
||||||
# Copyright (c) 1999-2004 Damien Miller
|
# Copyright (c) 1999-2004 Damien Miller
|
||||||
#
|
#
|
||||||
|
@ -15,7 +15,7 @@
|
||||||
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||||
|
|
||||||
AC_INIT([OpenSSH], [Portable], [openssh-unix-dev@mindrot.org])
|
AC_INIT([OpenSSH], [Portable], [openssh-unix-dev@mindrot.org])
|
||||||
AC_REVISION($Revision: 1.492 $)
|
AC_REVISION($Revision: 1.493 $)
|
||||||
AC_CONFIG_SRCDIR([ssh.c])
|
AC_CONFIG_SRCDIR([ssh.c])
|
||||||
AC_LANG([C])
|
AC_LANG([C])
|
||||||
|
|
||||||
|
@ -686,7 +686,8 @@ main() { if (NSVersionOfRunTimeLibrary("System") >= (60 << 16))
|
||||||
AC_DEFINE([SSH_TUN_PREPEND_AF], [1],
|
AC_DEFINE([SSH_TUN_PREPEND_AF], [1],
|
||||||
[Prepend the address family to IP tunnel traffic])
|
[Prepend the address family to IP tunnel traffic])
|
||||||
fi
|
fi
|
||||||
AC_CHECK_HEADERS([linux/seccomp.h linux/filter.h linux/audit.h])
|
AC_CHECK_HEADERS([linux/seccomp.h linux/filter.h linux/audit.h], [],
|
||||||
|
[], [#include <linux/types.h>])
|
||||||
AC_CHECK_FUNCS([prctl])
|
AC_CHECK_FUNCS([prctl])
|
||||||
have_seccomp_audit_arch=1
|
have_seccomp_audit_arch=1
|
||||||
case "$host" in
|
case "$host" in
|
||||||
|
@ -2575,6 +2576,45 @@ AC_ARG_WITH([sandbox],
|
||||||
fi
|
fi
|
||||||
]
|
]
|
||||||
)
|
)
|
||||||
|
|
||||||
|
# Some platforms (seems to be the ones that have a kernel poll(2)-type
|
||||||
|
# function with which they implement select(2)) use an extra file descriptor
|
||||||
|
# when calling select(2), which means we can't use the rlimit sandbox.
|
||||||
|
AC_MSG_CHECKING([if select works with descriptor rlimit])
|
||||||
|
AC_RUN_IFELSE(
|
||||||
|
[AC_LANG_PROGRAM([[
|
||||||
|
#include <sys/types.h>
|
||||||
|
#ifdef HAVE_SYS_TIME_H
|
||||||
|
# include <sys/time.h>
|
||||||
|
#endif
|
||||||
|
#include <sys/resource.h>
|
||||||
|
#ifdef HAVE_SYS_SELECT_H
|
||||||
|
# include <sys/select.h>
|
||||||
|
#endif
|
||||||
|
#include <errno.h>
|
||||||
|
#include <fcntl.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
]],[[
|
||||||
|
struct rlimit rl_zero;
|
||||||
|
int fd, r;
|
||||||
|
fd_set fds;
|
||||||
|
|
||||||
|
fd = open("/dev/null", O_RDONLY);
|
||||||
|
FD_ZERO(&fds);
|
||||||
|
FD_SET(fd, &fds);
|
||||||
|
rl_zero.rlim_cur = rl_zero.rlim_max = 0;
|
||||||
|
setrlimit(RLIMIT_FSIZE, &rl_zero);
|
||||||
|
setrlimit(RLIMIT_NOFILE, &rl_zero);
|
||||||
|
r = select(fd+1, &fds, NULL, NULL, NULL);
|
||||||
|
exit (r == -1 ? 1 : 0);
|
||||||
|
]])],
|
||||||
|
[AC_MSG_RESULT([yes])
|
||||||
|
select_works_with_rlimit=yes],
|
||||||
|
[AC_MSG_RESULT([no])
|
||||||
|
select_works_with_rlimit=no],
|
||||||
|
[AC_MSG_WARN([cross compiling: assuming yes])]
|
||||||
|
)
|
||||||
|
|
||||||
if test "x$sandbox_arg" = "xsystrace" || \
|
if test "x$sandbox_arg" = "xsystrace" || \
|
||||||
( test -z "$sandbox_arg" && test "x$have_systr_policy_kill" = "x1" ) ; then
|
( test -z "$sandbox_arg" && test "x$have_systr_policy_kill" = "x1" ) ; then
|
||||||
test "x$have_systr_policy_kill" != "x1" && \
|
test "x$have_systr_policy_kill" != "x1" && \
|
||||||
|
@ -2607,9 +2647,12 @@ elif test "x$sandbox_arg" = "xseccomp_filter" || \
|
||||||
SANDBOX_STYLE="seccomp_filter"
|
SANDBOX_STYLE="seccomp_filter"
|
||||||
AC_DEFINE([SANDBOX_SECCOMP_FILTER], [1], [Sandbox using seccomp filter])
|
AC_DEFINE([SANDBOX_SECCOMP_FILTER], [1], [Sandbox using seccomp filter])
|
||||||
elif test "x$sandbox_arg" = "xrlimit" || \
|
elif test "x$sandbox_arg" = "xrlimit" || \
|
||||||
( test -z "$sandbox_arg" && test "x$ac_cv_func_setrlimit" = "xyes" ) ; then
|
( test -z "$sandbox_arg" && test "x$ac_cv_func_setrlimit" = "xyes" && \
|
||||||
|
test "x$select_works_with_rlimit" == "xyes" ) ; then
|
||||||
test "x$ac_cv_func_setrlimit" != "xyes" && \
|
test "x$ac_cv_func_setrlimit" != "xyes" && \
|
||||||
AC_MSG_ERROR([rlimit sandbox requires setrlimit function])
|
AC_MSG_ERROR([rlimit sandbox requires setrlimit function])
|
||||||
|
test "x$select_works_with_rlimit" != "xyes" && \
|
||||||
|
AC_MSG_ERROR([rlimit sandbox requires select to work with rlimit])
|
||||||
SANDBOX_STYLE="rlimit"
|
SANDBOX_STYLE="rlimit"
|
||||||
AC_DEFINE([SANDBOX_RLIMIT], [1], [Sandbox using setrlimit(2)])
|
AC_DEFINE([SANDBOX_RLIMIT], [1], [Sandbox using setrlimit(2)])
|
||||||
elif test -z "$sandbox_arg" || test "x$sandbox_arg" = "xno" || \
|
elif test -z "$sandbox_arg" || test "x$sandbox_arg" = "xno" || \
|
||||||
|
|
Loading…
Reference in New Issue