]> git.ipfire.org Git - thirdparty/util-linux.git/blobdiff - login-utils/sulogin.c
Merge branch 'mps_losetup_has_device_inline' of https://github.com/marcosps/util...
[thirdparty/util-linux.git] / login-utils / sulogin.c
index 32ae9a20d1b101f125036feca2a15ef0471e5d73..5f09bd48e4ab9ddc8b7ab7deb703f25d24a3bd89 100644 (file)
 # include <selinux/get_context_list.h>
 #endif
 
+#ifdef __linux__
+# include <sys/kd.h>
+# include <sys/param.h>
+#endif
+
 #include "c.h"
 #include "closestream.h"
+#include "env.h"
 #include "nls.h"
 #include "pathnames.h"
+#ifdef USE_PLYMOUTH_SUPPORT
+# include "plymouth-ctrl.h"
+#endif
 #include "strutils.h"
 #include "ttyutils.h"
 #include "sulogin-consoles.h"
 static unsigned int timeout;
 static int profile;
 static volatile uint32_t openfd;               /* Remember higher file descriptors */
-static volatile uint32_t *usemask;
 
-struct sigaction saved_sigint;
-struct sigaction saved_sigtstp;
-struct sigaction saved_sigquit;
-struct sigaction saved_sighup;
-struct sigaction saved_sigchld;
+static struct sigaction saved_sigint;
+static struct sigaction saved_sigtstp;
+static struct sigaction saved_sigquit;
+static struct sigaction saved_sighup;
+static struct sigaction saved_sigchld;
 
 static volatile sig_atomic_t alarm_rised;
 static volatile sig_atomic_t sigchild;
@@ -76,15 +84,46 @@ static volatile sig_atomic_t sigchild;
 # define IUCLC         0
 #endif
 
+#ifndef WEXITED
+# warning "WEXITED is missing, sulogin may not work as expected"
+# define WEXITED 0
+#endif
+
+static int locked_account_password(const char * const passwd)
+{
+       if (passwd && (*passwd == '*' || *passwd == '!'))
+               return 1;
+       return 0;
+}
+
 /*
  * Fix the tty modes and set reasonable defaults.
  */
 static void tcinit(struct console *con)
 {
-       int mode = 0, flags = 0;
+       int flags = 0, mode = 0;
        struct termios *tio = &con->tio;
-       int fd = con->fd;
-
+       const int fd = con->fd;
+#ifdef USE_PLYMOUTH_SUPPORT
+       struct termios lock;
+       int i = (plymouth_command(MAGIC_PING)) ? PLYMOUTH_TERMIOS_FLAGS_DELAY : 0;
+       if (i)
+               plymouth_command(MAGIC_QUIT);
+       while (i-- > 0) {
+               /*
+                * With plymouth the termios flags become changed after this
+                * function had changed the termios.
+                */
+               memset(&lock, 0, sizeof(struct termios));
+               if (ioctl(fd, TIOCGLCKTRMIOS, &lock) < 0)
+                       break;
+               if (!lock.c_iflag && !lock.c_oflag && !lock.c_cflag && !lock.c_lflag)
+                       break;
+               sleep(1);
+       }
+       memset(&lock, 0, sizeof(struct termios));
+       ioctl(fd, TIOCSLCKTRMIOS, &lock);
+#endif
        errno = 0;
 
        if (tcgetattr(fd, tio) < 0) {
@@ -93,10 +132,14 @@ static void tcinit(struct console *con)
                return;
        }
 
-       /* Handle serial lines here */
-       if (ioctl(fd, TIOCMGET, (char *) &mode) == 0) {
+       /* Handle lines other than virtual consoles here */
+#if defined(KDGKBMODE)
+       if (ioctl(fd, KDGKBMODE, &mode) < 0)
+#endif
+       {
                speed_t ispeed, ospeed;
                struct winsize ws;
+               errno = 0;
 
                /* this is a modem line */
                con->flags |= CON_SERIAL;
@@ -142,9 +185,7 @@ static void tcinit(struct console *con)
                goto setattr;
        }
 #if defined(IUTF8) && defined(KDGKBMODE)
-       /* Detect mode of current keyboard setup, e.g. for UTF-8 */
-       if (ioctl(fd, KDGKBMODE, &mode) < 0)
-               mode = K_RAW;
+       /* Handle mode of current keyboard setup, e.g. for UTF-8 */
        switch(mode) {
        case K_UNICODE:
                setlocale(LC_CTYPE, "C.UTF-8");
@@ -175,20 +216,23 @@ setattr:
  */
 static void tcfinal(struct console *con)
 {
-       struct termios *tio;
-       int fd;
+       struct termios *tio = &con->tio;
+       const int fd = con->fd;
 
        if ((con->flags & CON_SERIAL) == 0) {
-               setenv("TERM", "linux", 1);
+               xsetenv("TERM", "linux", 1);
                return;
        }
-       if (con->flags & CON_NOTTY)
+       if (con->flags & CON_NOTTY) {
+               xsetenv("TERM", "dumb", 1);
                return;
+       }
 
-       setenv("TERM", "vt102", 1);
-       tio = &con->tio;
-       fd = con->fd;
-
+#if defined (__s390__) || defined (__s390x__)
+       xsetenv("TERM", "dumb", 1);
+#else
+       xsetenv("TERM", "vt102", 1);
+#endif
        tio->c_iflag |= (IXON | IXOFF);
        tio->c_lflag |= (ICANON | ISIG | ECHO|ECHOE|ECHOK|ECHOKE);
        tio->c_oflag |= OPOST;
@@ -223,11 +267,11 @@ static void tcfinal(struct console *con)
                break;
        case 1:                         /* odd parity */
                tio->c_cflag |= PARODD;
-               /* fall through */
+               /* fallthrough */
        case 2:                         /* even parity */
                tio->c_cflag |= PARENB;
                tio->c_iflag |= (INPCK | ISTRIP);
-               /* fall through */
+               /* fallthrough */
        case (1 | 2):                   /* no parity bit */
                tio->c_cflag &= ~CSIZE;
                tio->c_cflag |= CS7;
@@ -366,8 +410,8 @@ static struct passwd *getrootpwent(int try_manually)
        struct passwd *pw;
        struct spwd *spw;
        FILE *fp;
-       static char line[256];
-       static char sline[256];
+       static char line[2 * BUFSIZ];
+       static char sline[2 * BUFSIZ];
        char *p;
 
        /*
@@ -403,7 +447,7 @@ static struct passwd *getrootpwent(int try_manually)
        /*
         * Find root in the password file.
         */
-       while ((p = fgets(line, 256, fp)) != NULL) {
+       while ((p = fgets(line, sizeof(line), fp)) != NULL) {
                if (strncmp(line, "root:", 5) != 0)
                        continue;
                p += 5;
@@ -416,7 +460,6 @@ static struct passwd *getrootpwent(int try_manually)
                p = line;
                break;
        }
-
        fclose(fp);
 
        /*
@@ -432,12 +475,12 @@ static struct passwd *getrootpwent(int try_manually)
        /*
         * The password is invalid. If there is a shadow password, try it.
         */
-       strcpy(pwd.pw_passwd, "");
+       *pwd.pw_passwd = '\0';
        if ((fp = fopen(_PATH_SHADOW_PASSWD, "r")) == NULL) {
                warn(_("cannot open %s"), _PATH_PASSWD);
                return &pwd;
        }
-       while ((p = fgets(sline, 256, fp)) != NULL) {
+       while ((p = fgets(sline, sizeof(sline), fp)) != NULL) {
                if (strncmp(sline, "root:", 5) != 0)
                        continue;
                p += 5;
@@ -451,11 +494,12 @@ static struct passwd *getrootpwent(int try_manually)
         */
        if (p == NULL) {
                warnx(_("%s: no entry for root"), _PATH_SHADOW_PASSWD);
-               strcpy(pwd.pw_passwd, "");
+               *pwd.pw_passwd = '\0';
        }
-       if (!valid(pwd.pw_passwd)) {
+       /* locked account passwords are valid too */
+       if (!locked_account_password(pwd.pw_passwd) && !valid(pwd.pw_passwd)) {
                warnx(_("%s: root password garbled"), _PATH_SHADOW_PASSWD);
-               strcpy(pwd.pw_passwd, "");
+               *pwd.pw_passwd = '\0';
        }
        return &pwd;
 }
@@ -463,7 +507,7 @@ static struct passwd *getrootpwent(int try_manually)
 /*
  * Ask by prompt for the password.
  */
-static void doprompt(const char *crypted, struct console *con)
+static void doprompt(const char *crypted, struct console *con, int deny)
 {
        struct termios tty;
 
@@ -476,22 +520,30 @@ static void doprompt(const char *crypted, struct console *con)
                tty.c_oflag |= (ONLCR | OPOST);
                tcsetattr(con->fd, TCSADRAIN, &tty);
        }
-       if (con->file == (FILE*)0) {
-               if  ((con->file = fdopen(con->fd, "r+")) == (FILE*)0)
+       if (!con->file) {
+               con->file = fdopen(con->fd, "r+");
+               if (!con->file)
                        goto err;
        }
+
+       if (deny)
+               fprintf(con->file, _("\nCannot open access to console, the root account is locked.\n"
+                                    "See sulogin(8) man page for more details.\n\n"
+                                    "Press Enter to continue.\n"));
+       else {
 #if defined(USE_ONELINE)
-       if (crypted[0])
-               fprintf(con->file, _("Give root password for login: "));
-       else
-               fprintf(con->file, _("Press enter for login: "));
+               if (crypted[0] && !locked_account_password(crypted))
+                       fprintf(con->file, _("Give root password for login: "));
+               else
+                       fprintf(con->file, _("Press Enter for login: "));
 #else
-       if (crypted[0])
-               fprintf(con->file, _("Give root password for maintenance\n"));
-       else
-               fprintf(con->file, _("Press enter for maintenance"));
-       fprintf(con->file, _("(or type Control-D to continue): "));
+               if (crypted[0] && !locked_account_password(crypted))
+                       fprintf(con->file, _("Give root password for maintenance\n"));
+               else
+                       fprintf(con->file, _("Press Enter for maintenance\n"));
+               fprintf(con->file, _("(or press Control-D to continue): "));
 #endif
+       }
        fflush(con->file);
 err:
        if (con->flags & CON_SERIAL)
@@ -503,22 +555,17 @@ err:
  */
 static void setup(struct console *con)
 {
-       pid_t pid, pgrp, ppgrp, ttypgrp;
-       int fd;
+       int fd = con->fd;
+       const pid_t pid = getpid(), pgrp = getpgid(0), ppgrp =
+           getpgid(getppid()), ttypgrp = tcgetpgrp(fd);
 
        if (con->flags & CON_NOTTY)
                return;
-       fd = con->fd;
 
        /*
         * Only go through this trouble if the new
         * tty doesn't fall in this process group.
         */
-       pid = getpid();
-       pgrp = getpgid(0);
-       ppgrp = getpgid(getppid());
-       ttypgrp = tcgetpgrp(fd);
-
        if (pgrp != ttypgrp && ppgrp != ttypgrp) {
                if (pid != getsid(0)) {
                        if (pid == getpgid(0))
@@ -554,21 +601,20 @@ static void setup(struct console *con)
  * Ask for the password. Note that there is no default timeout as we normally
  * skip this during boot.
  */
-static char *getpasswd(struct console *con)
+static const char *getpasswd(struct console *con)
 {
        struct sigaction sa;
        struct termios tty;
        static char pass[128], *ptr;
        struct chardata *cp;
-       char *ret = pass;
+       const char *ret = pass;
        unsigned char tc;
        char c, ascval;
        int eightbit;
-       int fd;
+       const int fd = con->fd;
 
        if (con->flags & CON_NOTTY)
                goto out;
-       fd = con->fd;
        cp = &con->cp;
        tty = con->tio;
 
@@ -576,6 +622,7 @@ static char *getpasswd(struct console *con)
        tty.c_lflag &= ~(ECHO|ECHOE|ECHOK|ECHONL|TOSTOP|ISIG);
        tc = (tcsetattr(fd, TCSAFLUSH, &tty) == 0);
 
+       sigemptyset(&sa.sa_mask);
        sa.sa_handler = alrm_handler;
        sa.sa_flags = 0;
        sigaction(SIGALRM, &sa, NULL);
@@ -590,10 +637,14 @@ static char *getpasswd(struct console *con)
        while (cp->eol == '\0') {
                if (read(fd, &c, 1) < 1) {
                        if (errno == EINTR || errno == EAGAIN) {
-                               usleep(1000);
+                               if (alarm_rised) {
+                                       ret = NULL;
+                                       goto quit;
+                               }
+                               xusleep(250000);
                                continue;
                        }
-                       ret = (char*)0;
+                       ret = NULL;
                        switch (errno) {
                        case 0:
                        case EIO:
@@ -602,7 +653,7 @@ static char *getpasswd(struct console *con)
                        case ENOENT:
                                break;
                        default:
-                               warn(_("%s: read failed"), con->tty);
+                               warn(_("cannot read %s"), con->tty);
                                break;
                        }
                        goto quit;
@@ -640,11 +691,12 @@ static char *getpasswd(struct console *con)
                                ptr--;
                        break;
                case CEOF:
+                       ret = NULL;
                        goto quit;
                default:
                        if ((size_t)(ptr - &pass[0]) >= (sizeof(pass) -1 )) {
                                 fprintf(stderr, "sulogin: input overrun at %s\n\r", con->tty);
-                                ret = (char*)0;
+                                ret = NULL;
                                 goto quit;
                        }
                        *ptr++ = ascval;
@@ -655,8 +707,7 @@ quit:
        alarm(0);
        if (tc)
                tcsetattr(fd, TCSAFLUSH, &con->tio);
-       if (ret && *ret != '\0')
-               tcfinal(con);
+       tcfinal(con);
        printf("\r\n");
 out:
        return ret;
@@ -669,8 +720,8 @@ static void sushell(struct passwd *pwd)
 {
        char shell[PATH_MAX];
        char home[PATH_MAX];
-       char *p;
-       char *su_shell;
+       char const *p;
+       char const *su_shell;
 
        /*
         * Set directory and shell.
@@ -706,16 +757,16 @@ static void sushell(struct passwd *pwd)
        if (getcwd(home, sizeof(home)) == NULL)
                strcpy(home, "/");
 
-       setenv("HOME", home, 1);
-       setenv("LOGNAME", "root", 1);
-       setenv("USER", "root", 1);
+       xsetenv("HOME", home, 1);
+       xsetenv("LOGNAME", "root", 1);
+       xsetenv("USER", "root", 1);
        if (!profile)
-               setenv("SHLVL","0",1);
+               xsetenv("SHLVL","0",1);
 
        /*
         * Try to execute a shell.
         */
-       setenv("SHELL", su_shell, 1);
+       xsetenv("SHELL", su_shell, 1);
        unmask_signal(SIGINT, &saved_sigint);
        unmask_signal(SIGTSTP, &saved_sigtstp);
        unmask_signal(SIGQUIT, &saved_sigquit);
@@ -740,17 +791,21 @@ static void sushell(struct passwd *pwd)
        execl(su_shell, shell, NULL);
        warn(_("failed to execute %s"), su_shell);
 
-       setenv("SHELL", "/bin/sh", 1);
+       xsetenv("SHELL", "/bin/sh", 1);
        execl("/bin/sh", profile ? "-sh" : "sh", NULL);
        warn(_("failed to execute %s"), "/bin/sh");
 }
 
-static void usage(FILE *out)
+static void usage(void)
 {
+       FILE *out = stdout;
        fputs(USAGE_HEADER, out);
        fprintf(out, _(
                " %s [options] [tty device]\n"), program_invocation_short_name);
 
+       fputs(USAGE_SEPARATOR, out);
+       fputs(_("Single-user login.\n"), out);
+
        fputs(USAGE_OPTIONS, out);
        fputs(_(" -p, --login-shell        start a login shell\n"
                " -t, --timeout <seconds>  max time to wait for a password (default: no limit)\n"
@@ -758,32 +813,35 @@ static void usage(FILE *out)
                out);
 
        fputs(USAGE_SEPARATOR, out);
-       fputs(USAGE_HELP, out);
-       fputs(USAGE_VERSION, out);
-       fprintf(out, USAGE_MAN_TAIL("sulogin(8)"));
+       printf(USAGE_HELP_OPTIONS(26));
+       printf(USAGE_MAN_TAIL("sulogin(8)"));
 }
 
 int main(int argc, char **argv)
 {
-       LIST_HEAD(consoles);
-       struct list_head *ptr;
+       struct list_head *ptr, consoles;
        struct console *con;
        char *tty = NULL;
        struct passwd *pwd;
-       int c, status = 0;
-       int reconnect = 0;
+       const struct timespec sigwait = { .tv_sec = 0, .tv_nsec = 50000000 };
+       siginfo_t status = { 0 };
+       sigset_t set;
+       int c, reconnect = 0;
        int opt_e = 0;
+       int wait = 0;
        pid_t pid;
 
        static const struct option longopts[] = {
-               { "login-shell",  0, 0, 'p' },
-               { "timeout",      1, 0, 't' },
-               { "force",        0, 0, 'e' },
-               { "help",         0, 0, 'h' },
-               { "version",      0, 0, 'V' },
-               { NULL,           0, 0, 0 }
+               { "login-shell",  no_argument,       NULL, 'p' },
+               { "timeout",      required_argument, NULL, 't' },
+               { "force",        no_argument,       NULL, 'e' },
+               { "help",         no_argument,       NULL, 'h' },
+               { "version",      no_argument,       NULL, 'V' },
+               { NULL, 0, NULL, 0 }
        };
 
+       INIT_LIST_HEAD(&consoles);
+
        /*
         * If we are init we need to set up a own session.
         */
@@ -815,17 +873,16 @@ int main(int argc, char **argv)
                        printf(UTIL_LINUX_VERSION);
                        return EXIT_SUCCESS;
                case 'h':
-                       usage(stdout);
+                       usage();
                        return EXIT_SUCCESS;
                default:
-                       usage(stderr);
-                       /* Do not exit! */
+                       /* Do not exit! getopt prints a warning. */
                        break;
                }
        }
 
        if (geteuid() != 0)
-               errx(EXIT_FAILURE, _("only root can run this program."));
+               errx(EXIT_FAILURE, _("only superuser can run this program"));
 
        mask_signal(SIGQUIT, SIG_IGN, &saved_sigquit);
        mask_signal(SIGTSTP, SIG_IGN, &saved_sigtstp);
@@ -852,7 +909,7 @@ int main(int argc, char **argv)
        reconnect = detect_consoles(tty, STDIN_FILENO, &consoles);
 
        /*
-        * If previous stdin was not the speified tty and therefore reconnected
+        * If previous stdin was not the specified tty and therefore reconnected
         * to the specified tty also reconnect stdout and stderr.
         */
        if (reconnect) {
@@ -875,7 +932,7 @@ int main(int argc, char **argv)
         * Get the root password.
         */
        if ((pwd = getrootpwent(opt_e)) == NULL) {
-               warnx(_("cannot open password database."));
+               warnx(_("cannot open password database"));
                sleep(2);
                return EXIT_FAILURE;
        }
@@ -898,15 +955,13 @@ int main(int argc, char **argv)
                tcinit(con);
        }
        ptr = (&consoles)->next;
-       usemask = (uint32_t*) mmap(NULL, sizeof(uint32_t),
-                                       PROT_READ|PROT_WRITE,
-                                       MAP_ANONYMOUS|MAP_SHARED, -1, 0);
 
        if (ptr->next == &consoles) {
                con = list_entry(ptr, struct console, entry);
                goto nofork;
        }
 
+
        mask_signal(SIGCHLD, chld_handler, &saved_sigchld);
        do {
                con = list_entry(ptr, struct console, entry);
@@ -916,19 +971,23 @@ int main(int argc, char **argv)
                switch ((con->pid = fork())) {
                case 0:
                        mask_signal(SIGCHLD, SIG_DFL, NULL);
-                       /* fall through */
                nofork:
                        setup(con);
                        while (1) {
                                const char *passwd = pwd->pw_passwd;
                                const char *answer;
-                               int failed = 0, doshell = 0;
+                               int doshell = 0;
+                               int deny = !opt_e && locked_account_password(pwd->pw_passwd);
+
+                               doprompt(passwd, con, deny);
 
-                               doprompt(passwd, con);
                                if ((answer = getpasswd(con)) == NULL)
                                        break;
+                               if (deny)
+                                       exit(EXIT_FAILURE);
 
-                               if (passwd[0] == '\0')
+                               /* no password or locked account */
+                               if (!passwd[0] || locked_account_password(passwd))
                                        doshell++;
                                else {
                                        const char *cryptbuf;
@@ -940,18 +999,14 @@ int main(int argc, char **argv)
                                }
 
                                if (doshell) {
-                                       *usemask |= (1<<con->id);
+                                       /* sushell() unmask signals */
                                        sushell(pwd);
-                                       *usemask &= ~(1<<con->id);
-                                       failed++;
-                               }
 
-                               mask_signal(SIGQUIT, SIG_IGN, &saved_sigquit);
-                               mask_signal(SIGTSTP, SIG_IGN, &saved_sigtstp);
-                               mask_signal(SIGINT,  SIG_IGN, &saved_sigint);
+                                       mask_signal(SIGQUIT, SIG_IGN, &saved_sigquit);
+                                       mask_signal(SIGTSTP, SIG_IGN, &saved_sigtstp);
+                                       mask_signal(SIGINT,  SIG_IGN, &saved_sigint);
 
-                               if (failed) {
-                                       fprintf(stderr, _("Can not execute su shell\n\n"));
+                                       fprintf(stderr, _("cannot execute su shell\n\n"));
                                        break;
                                }
                                fprintf(stderr, _("Login incorrect\n\n"));
@@ -966,7 +1021,7 @@ int main(int argc, char **argv)
                        exit(0);
                case -1:
                        warn(_("fork failed"));
-                       /* fall through */
+                       /* fallthrough */
                default:
                        break;
                }
@@ -975,28 +1030,80 @@ int main(int argc, char **argv)
 
        } while (ptr != &consoles);
 
-       while ((pid = wait(&status))) {
-               if (errno == ECHILD)
+       do {
+               int ret;
+
+               status.si_pid = 0;
+               ret = waitid(P_ALL, 0, &status, WEXITED);
+
+               if (ret == 0)
                        break;
-               if (pid < 0)
-                       continue;
-               list_for_each(ptr, &consoles) {
-                       con = list_entry(ptr, struct console, entry);
-                       if (con->pid == pid) {
-                               *usemask &= ~(1<<con->id);
+               if (ret < 0) {
+                       if (errno == ECHILD)
+                               break;
+                       if (errno == EINTR)
                                continue;
-                       }
-                       if (kill(con->pid, 0) < 0) {
-                               *usemask &= ~(1<<con->id);
+               }
+
+               errx(EXIT_FAILURE, _("cannot wait on su shell\n\n"));
+
+       } while (1);
+
+       list_for_each(ptr, &consoles) {
+               con = list_entry(ptr, struct console, entry);
+
+               if (con->fd < 0)
+                       continue;
+               if (con->pid < 0)
+                       continue;
+               if (con->pid == status.si_pid)
+                       con->pid = -1;
+               else {
+                       kill(con->pid, SIGTERM);
+                       wait++;
+               }
+       }
+
+       sigemptyset(&set);
+       sigaddset(&set, SIGCHLD);
+
+       do {
+               int signum, ret;
+
+               if (!wait)
+                       break;
+
+               status.si_pid = 0;
+               ret = waitid(P_ALL, 0, &status, WEXITED|WNOHANG);
+
+               if (ret < 0) {
+                       if (errno == ECHILD)
+                               break;
+                       if (errno == EINTR)
                                continue;
+               }
+
+               if (!ret && status.si_pid > 0) {
+                       list_for_each(ptr, &consoles) {
+                               con = list_entry(ptr, struct console, entry);
+
+                               if (con->fd < 0)
+                                       continue;
+                               if (con->pid < 0)
+                                       continue;
+                               if (con->pid == status.si_pid) {
+                                       con->pid = -1;
+                                       wait--;
+                               }
                        }
-                       if (*usemask & (1<<con->id))
-                               continue;
-                       kill(con->pid, SIGHUP);
-                       usleep(5000);
-                       kill(con->pid, SIGKILL);
+                       continue;
                }
-       }
+
+               signum = sigtimedwait(&set, NULL, &sigwait);
+               if (signum != SIGCHLD && signum < 0 && errno == EAGAIN)
+                       break;
+
+       } while (1);
 
        mask_signal(SIGCHLD, SIG_DFL, NULL);
        return EXIT_SUCCESS;