diff options
author | Denis Vlasenko <vda.linux@googlemail.com> | 2006-09-08 17:56:52 +0000 |
---|---|---|
committer | Denis Vlasenko <vda.linux@googlemail.com> | 2006-09-08 17:56:52 +0000 |
commit | 2f50aa42c54fb92347058e83965ea7a668ab04af (patch) | |
tree | 27109df9cef9a348d98864bc52c1deeb1a7cd263 | |
parent | bd8f43dbab871d19484887556632af50749786b6 (diff) | |
download | busybox-w32-2f50aa42c54fb92347058e83965ea7a668ab04af.tar.gz busybox-w32-2f50aa42c54fb92347058e83965ea7a668ab04af.tar.bz2 busybox-w32-2f50aa42c54fb92347058e83965ea7a668ab04af.zip |
login: use some ideas from util-linux's login.
O_NONBLOCKing output on login timeout.
fchmod instead of chmod (latter is racy).
is_my_tty() is not needed anymore after race is fixed
(is_my_tty() was racy too anyway...).
-rw-r--r-- | loginutils/login.c | 40 |
1 files changed, 15 insertions, 25 deletions
diff --git a/loginutils/login.c b/loginutils/login.c index 19f865550..c0f4b72bb 100644 --- a/loginutils/login.c +++ b/loginutils/login.c | |||
@@ -51,14 +51,22 @@ static inline int check_securetty(void) { return 1; } | |||
51 | 51 | ||
52 | #endif | 52 | #endif |
53 | 53 | ||
54 | static int is_my_tty(void); | ||
55 | static void get_username_or_die(char *buf, int size_buf); | 54 | static void get_username_or_die(char *buf, int size_buf); |
56 | static void motd(void); | 55 | static void motd(void); |
57 | 56 | ||
57 | static void nonblock(int fd) | ||
58 | { | ||
59 | fcntl(fd, F_SETFL, O_NONBLOCK | fcntl(fd, F_GETFL)); | ||
60 | } | ||
58 | 61 | ||
59 | static void alarm_handler(int sig ATTRIBUTE_UNUSED) | 62 | static void alarm_handler(int sig ATTRIBUTE_UNUSED) |
60 | { | 63 | { |
61 | fprintf(stderr, "\r\nLogin timed out after %d seconds\r\n", TIMEOUT); | 64 | /* This is the escape hatch! Poor serial line users and the like |
65 | * arrive here when their connection is broken. | ||
66 | * We don't want to block here */ | ||
67 | nonblock(1); | ||
68 | nonblock(2); | ||
69 | bb_info_msg("\r\nLogin timed out after %d seconds\r", TIMEOUT); | ||
62 | exit(EXIT_SUCCESS); | 70 | exit(EXIT_SUCCESS); |
63 | } | 71 | } |
64 | 72 | ||
@@ -218,13 +226,10 @@ auth_failed: | |||
218 | } | 226 | } |
219 | } | 227 | } |
220 | #endif | 228 | #endif |
221 | if (!is_my_tty()) | 229 | /* Try these, but don't complain if they fail. |
222 | syslog(LOG_ERR, "unable to determine TTY name, got %s", full_tty); | 230 | * _f_chown is safe wrt race t=ttyname(0);...;chown(t); */ |
223 | 231 | fchown(0, pw->pw_uid, pw->pw_gid); | |
224 | /* Try these, but don't complain if they fail | 232 | fchmod(0, 0600); |
225 | * (for example when the root fs is read only) */ | ||
226 | chown(full_tty, pw->pw_uid, pw->pw_gid); | ||
227 | chmod(full_tty, 0600); | ||
228 | 233 | ||
229 | if (ENABLE_LOGIN_SCRIPTS) { | 234 | if (ENABLE_LOGIN_SCRIPTS) { |
230 | char *script = getenv("LOGIN_PRE_SUID_SCRIPT"); | 235 | char *script = getenv("LOGIN_PRE_SUID_SCRIPT"); |
@@ -257,7 +262,7 @@ auth_failed: | |||
257 | signal(SIGALRM, SIG_DFL); /* default alarm signal */ | 262 | signal(SIGALRM, SIG_DFL); /* default alarm signal */ |
258 | 263 | ||
259 | if (pw->pw_uid == 0) | 264 | if (pw->pw_uid == 0) |
260 | syslog(LOG_INFO, "root login %s", fromhost); | 265 | syslog(LOG_INFO, "root login%s", fromhost); |
261 | #ifdef CONFIG_SELINUX | 266 | #ifdef CONFIG_SELINUX |
262 | /* well, a simple setexeccon() here would do the job as well, | 267 | /* well, a simple setexeccon() here would do the job as well, |
263 | * but let's play the game for now */ | 268 | * but let's play the game for now */ |
@@ -348,21 +353,6 @@ static int check_securetty(void) | |||
348 | 353 | ||
349 | #endif | 354 | #endif |
350 | 355 | ||
351 | /* returns 1 if true */ | ||
352 | static int is_my_tty(void) | ||
353 | { | ||
354 | struct stat by_name, by_fd; | ||
355 | |||
356 | if (stat(full_tty, &by_name) || fstat(0, &by_fd)) | ||
357 | return 0; | ||
358 | |||
359 | if (by_name.st_rdev != by_fd.st_rdev) | ||
360 | return 0; | ||
361 | else | ||
362 | return 1; | ||
363 | } | ||
364 | |||
365 | |||
366 | static void motd(void) | 356 | static void motd(void) |
367 | { | 357 | { |
368 | FILE *fp; | 358 | FILE *fp; |