Remove use of non-standard sigaction_t
This commit is contained in:
@@ -627,9 +627,6 @@
|
||||
/* Define to 1 if you have the `sig2str' function. */
|
||||
#undef HAVE_SIG2STR
|
||||
|
||||
/* Define to 1 if the system has the type `sigaction_t'. */
|
||||
#undef HAVE_SIGACTION_T
|
||||
|
||||
/* Define to 1 if you use S/Key. */
|
||||
#undef HAVE_SKEY
|
||||
|
||||
|
12
configure
vendored
12
configure
vendored
@@ -18120,18 +18120,6 @@ if test "x$ac_cv_type_sig_atomic_t" = xyes; then :
|
||||
else
|
||||
$as_echo "#define sig_atomic_t int" >>confdefs.h
|
||||
|
||||
fi
|
||||
|
||||
ac_fn_c_check_type "$LINENO" "sigaction_t" "ac_cv_type_sigaction_t" "#include <sys/types.h>
|
||||
#include <signal.h>
|
||||
"
|
||||
if test "x$ac_cv_type_sigaction_t" = xyes; then :
|
||||
|
||||
cat >>confdefs.h <<_ACEOF
|
||||
#define HAVE_SIGACTION_T 1
|
||||
_ACEOF
|
||||
|
||||
|
||||
fi
|
||||
|
||||
ac_fn_c_check_type "$LINENO" "struct in6_addr" "ac_cv_type_struct_in6_addr" "#include <sys/types.h>
|
||||
|
@@ -2355,8 +2355,6 @@ AC_CHECK_TYPE([clockid_t], [], [AC_DEFINE(clockid_t, int)], [#include <sys/types
|
||||
#include <time.h>])
|
||||
AC_CHECK_TYPE([sig_atomic_t], [], [AC_DEFINE(sig_atomic_t, int)], [#include <sys/types.h>
|
||||
#include <signal.h>])
|
||||
AC_CHECK_TYPES([sigaction_t], [], [], [#include <sys/types.h>
|
||||
#include <signal.h>])
|
||||
AC_CHECK_TYPES([struct in6_addr], [], [], [#include <sys/types.h>
|
||||
#include <netinet/in.h>])
|
||||
AC_TYPE_LONG_LONG_INT
|
||||
|
@@ -248,13 +248,6 @@ __dso_public int isblank(int);
|
||||
# define HAVE_INNETGR 1
|
||||
#endif /* HAVE__INNETGR */
|
||||
|
||||
/*
|
||||
* Add IRIX-like sigaction_t for those without it.
|
||||
*/
|
||||
#ifndef HAVE_SIGACTION_T
|
||||
typedef struct sigaction sigaction_t;
|
||||
#endif
|
||||
|
||||
/*
|
||||
* The nitems macro may be defined in sys/param.h
|
||||
*/
|
||||
|
@@ -81,7 +81,7 @@ sigttou(int signo)
|
||||
static int
|
||||
tcsetattr_nobg(int fd, int flags, struct termios *tp)
|
||||
{
|
||||
sigaction_t sa, osa;
|
||||
struct sigaction sa, osa;
|
||||
int rc;
|
||||
|
||||
/*
|
||||
|
@@ -104,7 +104,7 @@ bsdauth_verify(struct passwd *pw, char *prompt, sudo_auth *auth, struct sudo_con
|
||||
char *s;
|
||||
size_t len;
|
||||
int authok = 0;
|
||||
sigaction_t sa, osa;
|
||||
struct sigaction sa, osa;
|
||||
auth_session_t *as = ((struct bsdauth_state *) auth->data)->as;
|
||||
debug_decl(bsdauth_verify, SUDOERS_DEBUG_AUTH)
|
||||
|
||||
|
@@ -216,7 +216,7 @@ verify_user(struct passwd *pw, char *prompt, int validated,
|
||||
int ret, status, success = AUTH_FAILURE;
|
||||
sudo_auth *auth;
|
||||
sigset_t mask, omask;
|
||||
sigaction_t sa, saved_sigtstp;
|
||||
struct sigaction sa, saved_sigtstp;
|
||||
debug_decl(verify_user, SUDOERS_DEBUG_AUTH)
|
||||
|
||||
/* Make sure we have at least one auth method. */
|
||||
|
@@ -381,7 +381,7 @@ replay_session(const double max_wait, const char *decimal)
|
||||
bool interactive;
|
||||
struct write_closure wc;
|
||||
char buf[LINE_MAX];
|
||||
sigaction_t sa;
|
||||
struct sigaction sa;
|
||||
int idx;
|
||||
debug_decl(replay_session, SUDO_DEBUG_UTIL)
|
||||
|
||||
|
@@ -862,7 +862,7 @@ whatnow(void)
|
||||
static void
|
||||
setup_signals(void)
|
||||
{
|
||||
sigaction_t sa;
|
||||
struct sigaction sa;
|
||||
debug_decl(setup_signals, SUDOERS_DEBUG_UTIL)
|
||||
|
||||
/*
|
||||
|
@@ -495,7 +495,7 @@ exec_monitor(struct command_details *details, sigset_t *oset,
|
||||
{
|
||||
struct monitor_closure mc = { 0 };
|
||||
struct command_status cstat;
|
||||
sigaction_t sa;
|
||||
struct sigaction sa;
|
||||
int errpipe[2];
|
||||
debug_decl(exec_monitor, SUDO_DEBUG_EXEC);
|
||||
|
||||
|
@@ -469,7 +469,7 @@ handle_sigchld_nopty(struct exec_closure_nopty *ec)
|
||||
* resume, potentially stopping sudo with SIGTTOU while the command
|
||||
* continues to run.
|
||||
*/
|
||||
sigaction_t sa, osa;
|
||||
struct sigaction sa, osa;
|
||||
pid_t saved_pgrp = -1;
|
||||
int fd, signo = WSTOPSIG(status);
|
||||
|
||||
|
@@ -392,7 +392,7 @@ static int
|
||||
suspend_sudo(int signo, pid_t ppgrp)
|
||||
{
|
||||
char signame[SIG2STR_MAX];
|
||||
sigaction_t sa, osa;
|
||||
struct sigaction sa, osa;
|
||||
int ret = 0;
|
||||
debug_decl(suspend_sudo, SUDO_DEBUG_EXEC);
|
||||
|
||||
@@ -1111,7 +1111,7 @@ exec_pty(struct command_details *details, struct command_status *cstat)
|
||||
struct exec_closure_pty ec = { 0 };
|
||||
struct plugin_container *plugin;
|
||||
sigset_t set, oset;
|
||||
sigaction_t sa;
|
||||
struct sigaction sa;
|
||||
pid_t ppgrp;
|
||||
int sv[2];
|
||||
debug_decl(exec_pty, SUDO_DEBUG_EXEC)
|
||||
|
@@ -36,7 +36,7 @@
|
||||
static struct signal_state {
|
||||
int signo;
|
||||
int restore;
|
||||
sigaction_t sa;
|
||||
struct sigaction sa;
|
||||
} saved_signals[] = {
|
||||
{ SIGALRM }, /* SAVED_SIGALRM */
|
||||
{ SIGCHLD }, /* SAVED_SIGCHLD */
|
||||
|
@@ -318,7 +318,7 @@ main(int argc, char *argv[], char *envp[])
|
||||
* signal. However, we want to avoid having sudo dump core itself.
|
||||
*/
|
||||
if (WIFSIGNALED(status)) {
|
||||
sigaction_t sa;
|
||||
struct sigaction sa;
|
||||
|
||||
if (WCOREDUMP(status))
|
||||
disable_coredump(false);
|
||||
|
@@ -50,7 +50,7 @@ sigttou(int signo)
|
||||
int
|
||||
tcsetpgrp_nobg(int fd, pid_t pgrp_id)
|
||||
{
|
||||
sigaction_t sa, osa;
|
||||
struct sigaction sa, osa;
|
||||
int rc;
|
||||
|
||||
/*
|
||||
|
@@ -84,8 +84,8 @@ char *
|
||||
tgetpass(const char *prompt, int timeout, int flags,
|
||||
struct sudo_conv_callback *callback)
|
||||
{
|
||||
sigaction_t sa, savealrm, saveint, savehup, savequit, saveterm;
|
||||
sigaction_t savetstp, savettin, savettou;
|
||||
struct sigaction sa, savealrm, saveint, savehup, savequit, saveterm;
|
||||
struct sigaction savetstp, savettin, savettou;
|
||||
char *pass;
|
||||
static const char *askpass;
|
||||
static char buf[SUDO_CONV_REPL_MAX + 1];
|
||||
|
Reference in New Issue
Block a user