|
|
d83721 |
diff -up vsftpd-3.0.2/sysutil.c.wnohang vsftpd-3.0.2/sysutil.c
|
|
|
d83721 |
--- vsftpd-3.0.2/sysutil.c.wnohang 2015-08-03 07:35:33.619620425 +0200
|
|
|
d83721 |
+++ vsftpd-3.0.2/sysutil.c 2015-08-03 07:35:33.626620480 +0200
|
|
|
d83721 |
@@ -608,13 +608,13 @@ vsf_sysutil_exit(int exit_code)
|
|
|
d83721 |
}
|
|
|
d83721 |
|
|
|
d83721 |
struct vsf_sysutil_wait_retval
|
|
|
d83721 |
-vsf_sysutil_wait(void)
|
|
|
d83721 |
+vsf_sysutil_wait(int hang)
|
|
|
d83721 |
{
|
|
|
d83721 |
struct vsf_sysutil_wait_retval retval;
|
|
|
d83721 |
vsf_sysutil_memclr(&retval, sizeof(retval));
|
|
|
d83721 |
while (1)
|
|
|
d83721 |
{
|
|
|
d83721 |
- int sys_ret = wait(&retval.exit_status);
|
|
|
d83721 |
+ int sys_ret = waitpid(-1, &retval.exit_status, hang ? 0 : WNOHANG);
|
|
|
d83721 |
if (sys_ret < 0 && errno == EINTR)
|
|
|
d83721 |
{
|
|
|
d83721 |
vsf_sysutil_check_pending_actions(kVSFSysUtilUnknown, 0, 0);
|
|
|
d83721 |
diff -up vsftpd-3.0.2/sysutil.h.wnohang vsftpd-3.0.2/sysutil.h
|
|
|
d83721 |
--- vsftpd-3.0.2/sysutil.h.wnohang 2015-08-03 07:35:33.610620354 +0200
|
|
|
d83721 |
+++ vsftpd-3.0.2/sysutil.h 2015-08-03 07:35:33.626620480 +0200
|
|
|
d83721 |
@@ -176,7 +176,7 @@ struct vsf_sysutil_wait_retval
|
|
|
d83721 |
int PRIVATE_HANDS_OFF_syscall_retval;
|
|
|
d83721 |
int PRIVATE_HANDS_OFF_exit_status;
|
|
|
d83721 |
};
|
|
|
d83721 |
-struct vsf_sysutil_wait_retval vsf_sysutil_wait(void);
|
|
|
d83721 |
+struct vsf_sysutil_wait_retval vsf_sysutil_wait(int hang);
|
|
|
d83721 |
int vsf_sysutil_wait_reap_one(void);
|
|
|
d83721 |
int vsf_sysutil_wait_get_retval(
|
|
|
d83721 |
const struct vsf_sysutil_wait_retval* p_waitret);
|
|
|
d83721 |
diff -up vsftpd-3.0.2/twoprocess.c.wnohang vsftpd-3.0.2/twoprocess.c
|
|
|
d83721 |
--- vsftpd-3.0.2/twoprocess.c.wnohang 2012-09-16 09:15:49.000000000 +0200
|
|
|
d83721 |
+++ vsftpd-3.0.2/twoprocess.c 2015-08-03 07:35:33.626620480 +0200
|
|
|
d83721 |
@@ -47,8 +47,17 @@ static void
|
|
|
d83721 |
handle_sigchld(void* duff)
|
|
|
d83721 |
{
|
|
|
d83721 |
|
|
|
d83721 |
- struct vsf_sysutil_wait_retval wait_retval = vsf_sysutil_wait();
|
|
|
d83721 |
+ struct vsf_sysutil_wait_retval wait_retval = vsf_sysutil_wait(0);
|
|
|
d83721 |
(void) duff;
|
|
|
d83721 |
+ if (!vsf_sysutil_wait_get_exitcode(&wait_retval) &&
|
|
|
d83721 |
+ !vsf_sysutil_wait_get_retval(&wait_retval))
|
|
|
d83721 |
+ /* There was nobody to wait for, possibly caused by underlying library
|
|
|
d83721 |
+ * which created a new process through fork()/vfork() and already picked
|
|
|
d83721 |
+ * it up, e.g. by pam_exec.so or integrity check routines for libraries
|
|
|
d83721 |
+ * when FIPS mode is on (nss freebl), which can lead to calling prelink
|
|
|
d83721 |
+ * if the prelink package is installed.
|
|
|
d83721 |
+ */
|
|
|
d83721 |
+ return;
|
|
|
d83721 |
/* Child died, so we'll do the same! Report it as an error unless the child
|
|
|
d83721 |
* exited normally with zero exit code
|
|
|
d83721 |
*/
|
|
|
d83721 |
@@ -390,7 +399,7 @@ common_do_login(struct vsf_session* p_se
|
|
|
d83721 |
priv_sock_send_result(p_sess->parent_fd, PRIV_SOCK_RESULT_OK);
|
|
|
d83721 |
if (!p_sess->control_use_ssl)
|
|
|
d83721 |
{
|
|
|
d83721 |
- (void) vsf_sysutil_wait();
|
|
|
d83721 |
+ (void) vsf_sysutil_wait(1);
|
|
|
d83721 |
}
|
|
|
d83721 |
else
|
|
|
d83721 |
{
|