Disable tracing on FreeBSD using procctl. (OpenSSH Portable 8.8)

Darren Tucker dtucker at dtucker.net
Mon Nov 7 07:14:34 AEDT 2022


On Sun, Nov 06, 2022 at 09:34:05AM -0500, Ed Maste wrote:
> On Sat, 5 Nov 2022 at 21:02, Darren Tucker <dtucker at dtucker.net> wrote:
> >
> > Maybe it should try the "0" version, then if that fails try the
> > getpid() version and only then fail if "strict" is set?
> 
> Ah, yes that sounds like the way to do it, and with no extra overhead
> for the usual (recent kernel) case. Something like this?

I had something similar but a bit more compact and commented.  Does this
also work?

diff --git a/platform-tracing.c b/platform-tracing.c
index c2810f2d..a8ce078b 100644
--- a/platform-tracing.c
+++ b/platform-tracing.c
@@ -32,6 +32,7 @@
 #include <stdarg.h>
 #include <stdio.h>
 #include <string.h>
+#include <unistd.h>
 
 #include "log.h"
 
@@ -39,10 +40,16 @@ void
 platform_disable_tracing(int strict)
 {
 #if defined(HAVE_PROCCTL) && defined(PROC_TRACE_CTL)
-	/* On FreeBSD, we should make this process untraceable */
+	/*
+	 * On FreeBSD, we should make this process untraceable.
+	 * pid=0 means "this process" and but some older kernels do not
+	 * understand that, so retry with our own pid before failing.
+	 */
 	int disable_trace = PROC_TRACE_CTL_DISABLE;
 
-	if (procctl(P_PID, 0, PROC_TRACE_CTL, &disable_trace) && strict)
+	if (procctl(P_PID, 0, PROC_TRACE_CTL, &disable_trace) == -1 &&
+	    procctl(P_PID, getpid(), PROC_TRACE_CTL, &disable_trace) == -1 &&
+	    strict)
 		fatal("unable to make the process untraceable: %s",
 		    strerror(errno));
 #endif

-- 
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860  37F4 9357 ECEF 11EA A6FA (new)
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.


More information about the openssh-unix-dev mailing list