aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDenis Vlasenko <vda.linux@googlemail.com>2006-09-08 17:56:52 +0000
committerDenis Vlasenko <vda.linux@googlemail.com>2006-09-08 17:56:52 +0000
commit2f50aa42c54fb92347058e83965ea7a668ab04af (patch)
tree27109df9cef9a348d98864bc52c1deeb1a7cd263
parentbd8f43dbab871d19484887556632af50749786b6 (diff)
downloadbusybox-w32-2f50aa42c54fb92347058e83965ea7a668ab04af.tar.gz
busybox-w32-2f50aa42c54fb92347058e83965ea7a668ab04af.tar.bz2
busybox-w32-2f50aa42c54fb92347058e83965ea7a668ab04af.zip
login: use some ideas from util-linux's login.
O_NONBLOCKing output on login timeout. fchmod instead of chmod (latter is racy). is_my_tty() is not needed anymore after race is fixed (is_my_tty() was racy too anyway...).
-rw-r--r--loginutils/login.c40
1 files changed, 15 insertions, 25 deletions
diff --git a/loginutils/login.c b/loginutils/login.c
index 19f865550..c0f4b72bb 100644
--- a/loginutils/login.c
+++ b/loginutils/login.c
@@ -51,14 +51,22 @@ static inline int check_securetty(void) { return 1; }
51 51
52#endif 52#endif
53 53
54static int is_my_tty(void);
55static void get_username_or_die(char *buf, int size_buf); 54static void get_username_or_die(char *buf, int size_buf);
56static void motd(void); 55static void motd(void);
57 56
57static void nonblock(int fd)
58{
59 fcntl(fd, F_SETFL, O_NONBLOCK | fcntl(fd, F_GETFL));
60}
58 61
59static void alarm_handler(int sig ATTRIBUTE_UNUSED) 62static void alarm_handler(int sig ATTRIBUTE_UNUSED)
60{ 63{
61 fprintf(stderr, "\r\nLogin timed out after %d seconds\r\n", TIMEOUT); 64 /* This is the escape hatch! Poor serial line users and the like
65 * arrive here when their connection is broken.
66 * We don't want to block here */
67 nonblock(1);
68 nonblock(2);
69 bb_info_msg("\r\nLogin timed out after %d seconds\r", TIMEOUT);
62 exit(EXIT_SUCCESS); 70 exit(EXIT_SUCCESS);
63} 71}
64 72
@@ -218,13 +226,10 @@ auth_failed:
218 } 226 }
219 } 227 }
220#endif 228#endif
221 if (!is_my_tty()) 229 /* Try these, but don't complain if they fail.
222 syslog(LOG_ERR, "unable to determine TTY name, got %s", full_tty); 230 * _f_chown is safe wrt race t=ttyname(0);...;chown(t); */
223 231 fchown(0, pw->pw_uid, pw->pw_gid);
224 /* Try these, but don't complain if they fail 232 fchmod(0, 0600);
225 * (for example when the root fs is read only) */
226 chown(full_tty, pw->pw_uid, pw->pw_gid);
227 chmod(full_tty, 0600);
228 233
229 if (ENABLE_LOGIN_SCRIPTS) { 234 if (ENABLE_LOGIN_SCRIPTS) {
230 char *script = getenv("LOGIN_PRE_SUID_SCRIPT"); 235 char *script = getenv("LOGIN_PRE_SUID_SCRIPT");
@@ -257,7 +262,7 @@ auth_failed:
257 signal(SIGALRM, SIG_DFL); /* default alarm signal */ 262 signal(SIGALRM, SIG_DFL); /* default alarm signal */
258 263
259 if (pw->pw_uid == 0) 264 if (pw->pw_uid == 0)
260 syslog(LOG_INFO, "root login %s", fromhost); 265 syslog(LOG_INFO, "root login%s", fromhost);
261#ifdef CONFIG_SELINUX 266#ifdef CONFIG_SELINUX
262 /* well, a simple setexeccon() here would do the job as well, 267 /* well, a simple setexeccon() here would do the job as well,
263 * but let's play the game for now */ 268 * but let's play the game for now */
@@ -348,21 +353,6 @@ static int check_securetty(void)
348 353
349#endif 354#endif
350 355
351/* returns 1 if true */
352static int is_my_tty(void)
353{
354 struct stat by_name, by_fd;
355
356 if (stat(full_tty, &by_name) || fstat(0, &by_fd))
357 return 0;
358
359 if (by_name.st_rdev != by_fd.st_rdev)
360 return 0;
361 else
362 return 1;
363}
364
365
366static void motd(void) 356static void motd(void)
367{ 357{
368 FILE *fp; 358 FILE *fp;