xref: /illumos-gate/usr/src/cmd/sulogin/sulogin.c (revision 56f33205c9ed776c3c909e07d52e94610a675740)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 /*
27  *	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T
28  *	All rights reserved.
29  *
30  *	Copyright (c) 1987, 1988 Microsoft Corporation.
31  *	All rights reserved.
32  */
33 
34 /*
35  *	sulogin - special login program exec'd from init to let user
36  *	come up single user, or go to default init state straight away.
37  *
38  *	Explain the scoop to the user, prompt for an authorized user
39  *	name or ^D and then prompt for password or ^D.  If the password
40  *	is correct, check if the user is authorized, if so enter
41  *	single user. ^D exits sulogin, and init will go to default init state.
42  *
43  *	If /etc/passwd is missing, or there's no entry for root,
44  *	go single user, no questions asked.
45  */
46 
47 #include <sys/types.h>
48 #include <sys/stat.h>
49 #include <sys/param.h>
50 #include <sys/sysmsg_impl.h>
51 #include <sys/mkdev.h>
52 #include <sys/resource.h>
53 #include <sys/uadmin.h>
54 #include <sys/wait.h>
55 #include <sys/stermio.h>
56 #include <fcntl.h>
57 #include <termio.h>
58 #include <pwd.h>
59 #include <shadow.h>
60 #include <stdlib.h>
61 #include <stdio.h>
62 #include <signal.h>
63 #include <siginfo.h>
64 #include <utmpx.h>
65 #include <unistd.h>
66 #include <ucontext.h>
67 #include <string.h>
68 #include <strings.h>
69 #include <deflt.h>
70 #include <limits.h>
71 #include <errno.h>
72 #include <crypt.h>
73 #include <auth_attr.h>
74 #include <auth_list.h>
75 #include <nss_dbdefs.h>
76 #include <user_attr.h>
77 #include <sys/vt.h>
78 
79 /*
80  * Intervals to sleep after failed login
81  */
82 #ifndef SLEEPTIME
83 #define	SLEEPTIME	4	/* sleeptime before login incorrect msg */
84 #endif
85 
86 #define	SLEEPTIME_MAX	5	/* maximum sleeptime */
87 
88 /*
89  *	the name of the file containing the login defaults we deliberately
90  *	use the same file as login(1)
91  */
92 
93 #define	DEFAULT_LOGIN	"/etc/default/login"
94 #define	DEFAULT_SULOGIN	"/etc/default/sulogin"
95 #define	DEFAULT_CONSOLE	"/dev/console"
96 
97 static char	shell[]	= "/sbin/sh";
98 static char	su[]	= "/sbin/su.static";
99 static int	sleeptime	= SLEEPTIME;
100 static int	nchild = 0;
101 static pid_t	pidlist[10];
102 static pid_t	masterpid = 0;
103 static pid_t	originalpid = 0;
104 static struct sigaction	sa;
105 static struct termio	ttymodes;
106 
107 static char	*findttyname(int fd);
108 static char	*stripttyname(char *);
109 static char	*sulogin_getinput(char *, int);
110 static void	noop(int);
111 static void	single(const char *, char *);
112 static void	main_loop(char *, boolean_t);
113 static void	parenthandler();
114 static void	termhandler(int);
115 static void	setupsigs(void);
116 static int	pathcmp(char *, char *);
117 static void	doit(char *, char *);
118 static void	childcleanup(int);
119 
120 #define	ECHOON	0
121 #define	ECHOOFF	1
122 
123 /* ARGSUSED */
124 int
125 main(int argc, char **argv)
126 {
127 	struct spwd	*shpw;
128 	int		passreq = B_TRUE;
129 	int		flags;
130 	int		fd;
131 	char		*infop, *ptr, *p;
132 	pid_t		pid;
133 	int		bufsize;
134 	struct stat	st;
135 	char		cttyname[100];
136 	char		namedlist[500];
137 	char		scratchlist[500];
138 	dev_t		cttyd;
139 
140 	if (geteuid() != 0) {
141 		(void) fprintf(stderr, "%s: must be root\n", argv[0]);
142 		return (EXIT_FAILURE);
143 	}
144 
145 	/* Do the magic to determine the children */
146 	if ((fd = open(SYSMSG, 0)) < 0)
147 		return (EXIT_FAILURE);
148 
149 	/*
150 	 * If the console supports the CIOCTTYCONSOLE ioctl, then fetch
151 	 * its console device list.  If not, then we use the default
152 	 * console name.
153 	 */
154 	if (ioctl(fd, CIOCTTYCONSOLE, &cttyd) == 0) {
155 		if ((bufsize = ioctl(fd, CIOCGETCONSOLE, NULL)) < 0)
156 			return (EXIT_FAILURE);
157 
158 		if (bufsize > 0) {
159 			if ((infop = calloc(bufsize, sizeof (char))) == NULL)
160 				return (EXIT_FAILURE);
161 
162 			if (ioctl(fd, CIOCGETCONSOLE, infop) < 0)
163 				return (EXIT_FAILURE);
164 
165 			(void) snprintf(namedlist, sizeof (namedlist), "%s %s",
166 			    DEFAULT_CONSOLE, infop);
167 		} else
168 			(void) snprintf(namedlist, sizeof (namedlist), "%s",
169 			    DEFAULT_CONSOLE);
170 	} else {
171 		(void) snprintf(namedlist, sizeof (namedlist), "%s",
172 		    DEFAULT_CONSOLE);
173 		cttyd = NODEV;
174 	}
175 
176 	/*
177 	 * The attempt to turn the controlling terminals dev_t into a string
178 	 * may not be successful, thus leaving the variable cttyname as a
179 	 * NULL.  This occurs if during boot we find
180 	 * the root partition (or some other partition)
181 	 * requires manual fsck, thus resulting in sulogin
182 	 * getting invoked.  The ioctl for CIOCTTYCONSOLE
183 	 * called above returned NODEV for cttyd
184 	 * in these cases.  NODEV gets returned when the vnode pointer
185 	 * in our session structure is NULL.  In these cases it
186 	 * must be assumed that the default console is used.
187 	 *
188 	 * See uts/common/os/session.c:cttydev().
189 	 */
190 	(void) strcpy(cttyname, DEFAULT_CONSOLE);
191 	(void) strcpy(scratchlist, namedlist);
192 	ptr = scratchlist;
193 	while (ptr != NULL) {
194 		p = strchr(ptr, ' ');
195 		if (p == NULL) {
196 			if (stat(ptr, &st))
197 				return (EXIT_FAILURE);
198 			if (st.st_rdev == cttyd)
199 				(void) strcpy(cttyname, ptr);
200 			break;
201 		}
202 		*p++ = '\0';
203 		if (stat(ptr, &st))
204 			return (EXIT_FAILURE);
205 		if (st.st_rdev == cttyd) {
206 			(void) strcpy(cttyname, ptr);
207 			break;
208 		}
209 		ptr = p;
210 	}
211 
212 	/*
213 	 * Use the same value of SLEEPTIME that login(1) uses.  This
214 	 * is obtained by reading the file /etc/default/login using
215 	 * the def*() functions.
216 	 */
217 
218 	if (defopen(DEFAULT_LOGIN) == 0) {
219 
220 		/* ignore case */
221 
222 		flags = defcntl(DC_GETFLAGS, 0);
223 		TURNOFF(flags, DC_CASE);
224 		(void) defcntl(DC_SETFLAGS, flags);
225 
226 		if ((ptr = defread("SLEEPTIME=")) != NULL)
227 			sleeptime = atoi(ptr);
228 
229 		if (sleeptime < 0 || sleeptime > SLEEPTIME_MAX)
230 			sleeptime = SLEEPTIME;
231 
232 		(void) defopen(NULL);	/* closes DEFAULT_LOGIN */
233 	}
234 
235 	/*
236 	 * Use our own value of PASSREQ, separate from the one login(1) uses.
237 	 * This is obtained by reading the file /etc/default/sulogin using
238 	 * the def*() functions.
239 	 */
240 
241 	if (defopen(DEFAULT_SULOGIN) == 0) {
242 		if ((ptr = defread("PASSREQ=")) != NULL)
243 			if (strcmp("NO", ptr) == 0)
244 				passreq = B_FALSE;
245 
246 		(void) defopen(NULL);	/* closes DEFAULT_SULOGIN */
247 	}
248 
249 	if (passreq == B_FALSE)
250 		single(shell, NULL);
251 
252 	/*
253 	 * if no 'root' entry in /etc/shadow, give maint. mode single
254 	 * user shell prompt
255 	 */
256 	setspent();
257 	if ((shpw = getspnam("root")) == NULL) {
258 		(void) fprintf(stderr, "\n*** Unable to retrieve `root' entry "
259 		    "in shadow password file ***\n\n");
260 		single(shell, NULL);
261 	}
262 	endspent();
263 	/*
264 	 * if no 'root' entry in /etc/passwd, give maint. mode single
265 	 * user shell prompt
266 	 */
267 	setpwent();
268 	if (getpwnam("root") == NULL) {
269 		(void) fprintf(stderr, "\n*** Unable to retrieve `root' entry "
270 		    "in password file ***\n\n");
271 		single(shell, NULL);
272 	}
273 	endpwent();
274 	/* process with controlling tty treated special */
275 	if ((pid = fork()) != (pid_t)0) {
276 		if (pid == -1)
277 			return (EXIT_FAILURE);
278 		else {
279 			setupsigs();
280 			masterpid = pid;
281 			originalpid = getpid();
282 			/*
283 			 * init() was invoked from a console that was not
284 			 * the default console, nor was it an auxiliary.
285 			 */
286 			if (cttyname[0] == NULL)
287 				termhandler(0);
288 				/* Never returns */
289 
290 			main_loop(cttyname, B_TRUE);
291 			/* Never returns */
292 		}
293 	}
294 	masterpid = getpid();
295 	originalpid = getppid();
296 	pidlist[nchild++] = originalpid;
297 
298 	sa.sa_handler = childcleanup;
299 	sa.sa_flags = 0;
300 	(void) sigemptyset(&sa.sa_mask);
301 	(void) sigaction(SIGTERM, &sa, NULL);
302 	(void) sigaction(SIGHUP, &sa, NULL);
303 	sa.sa_handler = parenthandler;
304 	sa.sa_flags = SA_SIGINFO;
305 	(void) sigemptyset(&sa.sa_mask);
306 	(void) sigaction(SIGUSR1, &sa, NULL);
307 
308 	sa.sa_handler = SIG_IGN;
309 	sa.sa_flags = 0;
310 	(void) sigemptyset(&sa.sa_mask);
311 	(void) sigaction(SIGCHLD, &sa, NULL);
312 	/*
313 	 * If there isn't a password on root, then don't permit
314 	 * the fanout capability of sulogin.
315 	 */
316 	if (*shpw->sp_pwdp != '\0') {
317 		ptr = namedlist;
318 		while (ptr != NULL) {
319 			p = strchr(ptr, ' ');
320 			if (p == NULL) {
321 				doit(ptr, cttyname);
322 				break;
323 			}
324 			*p++ = '\0';
325 			doit(ptr, cttyname);
326 			ptr = p;
327 		}
328 	}
329 	if (pathcmp(cttyname, DEFAULT_CONSOLE) != 0) {
330 		if ((pid = fork()) == (pid_t)0) {
331 			setupsigs();
332 			main_loop(DEFAULT_CONSOLE, B_FALSE);
333 		} else if (pid == -1)
334 			return (EXIT_FAILURE);
335 		pidlist[nchild++] = pid;
336 	}
337 	/*
338 	 * When parent is all done, it pauses until one of its children
339 	 * signals that its time to kill the underpriviledged.
340 	 */
341 	(void) wait(NULL);
342 
343 	return (0);
344 }
345 
346 /*
347  * These flags are taken from stty's "sane" table entries in
348  * usr/src/cmd/ttymon/sttytable.c
349  */
350 #define	SET_IFLAG (BRKINT|IGNPAR|ISTRIP|ICRNL|IXON|IMAXBEL)
351 #define	RESET_IFLAG (IGNBRK|PARMRK|INPCK|INLCR|IGNCR|IUCLC|IXOFF|IXANY)
352 #define	SET_OFLAG (OPOST|ONLCR)
353 #define	RESET_OFLAG (OLCUC|OCRNL|ONOCR|ONLRET|OFILL|OFDEL| \
354 	NLDLY|CRDLY|TABDLY|BSDLY|VTDLY|FFDLY)
355 #define	SET_LFLAG (ISIG|ICANON|IEXTEN|ECHO|ECHOK|ECHOE|ECHOKE|ECHOCTL)
356 #define	RESET_LFLAG (XCASE|ECHONL|NOFLSH|STFLUSH|STWRAP|STAPPL)
357 
358 /*
359  * Do the equivalent of 'stty sane' on the terminal since we don't know
360  * what state it was in on startup.
361  */
362 static void
363 sanitize_tty(int fd)
364 {
365 	(void) ioctl(fd, TCGETA, &ttymodes);
366 	ttymodes.c_iflag &= ~RESET_IFLAG;
367 	ttymodes.c_iflag |= SET_IFLAG;
368 	ttymodes.c_oflag &= ~RESET_OFLAG;
369 	ttymodes.c_oflag |= SET_OFLAG;
370 	ttymodes.c_lflag &= ~RESET_LFLAG;
371 	ttymodes.c_lflag |= SET_LFLAG;
372 	ttymodes.c_cc[VERASE] = CERASE;
373 	ttymodes.c_cc[VKILL] = CKILL;
374 	ttymodes.c_cc[VQUIT] = CQUIT;
375 	ttymodes.c_cc[VINTR] = CINTR;
376 	ttymodes.c_cc[VEOF] = CEOF;
377 	ttymodes.c_cc[VEOL] = CNUL;
378 	(void) ioctl(fd, TCSETAF, &ttymodes);
379 }
380 
381 /*
382  * Fork a child of sulogin for each of the auxiliary consoles.
383  */
384 static void
385 doit(char *ptr, char *cttyname)
386 {
387 	pid_t	pid;
388 
389 	if (pathcmp(ptr, DEFAULT_CONSOLE) != 0 &&
390 	    pathcmp(ptr, cttyname) != 0) {
391 		if ((pid = fork()) == (pid_t)0) {
392 			setupsigs();
393 			main_loop(ptr, B_FALSE);
394 		} else if (pid == -1)
395 			exit(EXIT_FAILURE);
396 		pidlist[nchild++] = pid;
397 	}
398 }
399 
400 static int
401 pathcmp(char *adev, char *bdev)
402 {
403 	struct stat	st1;
404 	struct stat	st2;
405 
406 	if (adev == NULL || bdev == NULL)
407 		return (1);
408 
409 	if (strcmp(adev, bdev) == 0)
410 		return (0);
411 
412 	if (stat(adev, &st1) || !S_ISCHR(st1.st_mode))
413 		return (1);
414 
415 	if (stat(bdev, &st2) || !S_ISCHR(st2.st_mode))
416 		return (1);
417 
418 	if (st1.st_rdev == st2.st_rdev)
419 		return (0);
420 
421 	return (1);
422 }
423 
424 /* Handlers for the children at initialization */
425 static void
426 setupsigs()
427 {
428 	sa.sa_handler = noop;
429 	sa.sa_flags = 0;
430 	(void) sigemptyset(&sa.sa_mask);
431 	(void) sigaction(SIGINT, &sa, NULL);
432 	(void) sigaction(SIGQUIT, &sa, NULL);
433 
434 	sa.sa_handler = termhandler;
435 	sa.sa_flags = 0;
436 	(void) sigemptyset(&sa.sa_mask);
437 	(void) sigaction(SIGTERM, &sa, NULL);
438 	(void) sigaction(SIGKILL, &sa, NULL);
439 	(void) sigaction(SIGHUP, &sa, NULL);
440 }
441 
442 static void
443 main_loop(char *devname, boolean_t cttyflag)
444 {
445 	int		fd, i;
446 	char		*user = NULL;		/* authorized user */
447 	char		*pass;			/* password from user */
448 	char		*cpass;			/* crypted password */
449 	struct spwd	spwd;
450 	struct spwd	*lshpw;			/* local shadow */
451 	char		shadow[NSS_BUFLEN_SHADOW];
452 	FILE		*sysmsgfd;
453 
454 	for (i = 0; i < 3; i++)
455 		(void) close(i);
456 	if (cttyflag == B_FALSE) {
457 		if (setsid() == -1)
458 			exit(EXIT_FAILURE);
459 	}
460 	if ((fd = open(devname, O_RDWR)) < 0)
461 		exit(EXIT_FAILURE);
462 
463 	/*
464 	 * In system maintenance mode, all virtual console instances
465 	 * of the svc:/system/console-login service are not available
466 	 * any more, and only the system console is available. So here
467 	 * we always switch to the system console in case at the moment
468 	 * the active console isn't it.
469 	 */
470 	(void) ioctl(fd, VT_ACTIVATE, 1);
471 
472 	if (fd != 0)
473 		(void) dup2(fd, STDIN_FILENO);
474 	if (fd != 1)
475 		(void) dup2(fd, STDOUT_FILENO);
476 	if (fd != 2)
477 		(void) dup2(fd, STDERR_FILENO);
478 	if (fd > 2)
479 		(void) close(fd);
480 
481 	sysmsgfd = fopen("/dev/sysmsg", "w");
482 
483 	sanitize_tty(fileno(stdin));
484 
485 	for (;;) {
486 		do {
487 			(void) printf("\nEnter user name for system "
488 			    "maintenance (control-d to bypass): ");
489 			user = sulogin_getinput(devname, ECHOON);
490 			if (user == NULL) {
491 				/* signal other children to exit */
492 				(void) sigsend(P_PID, masterpid, SIGUSR1);
493 				/* ^D, so straight to default init state */
494 				exit(EXIT_FAILURE);
495 			}
496 		} while (user[0] == '\0');
497 		(void) printf("Enter %s password (control-d to bypass): ",
498 		    user);
499 
500 		if ((pass = sulogin_getinput(devname, ECHOOFF)) == NULL) {
501 			/* signal other children to exit */
502 			(void) sigsend(P_PID, masterpid, SIGUSR1);
503 			/* ^D, so straight to default init state */
504 			free(user);
505 			exit(EXIT_FAILURE);
506 		}
507 		lshpw = getspnam_r(user, &spwd, shadow, sizeof (shadow));
508 		if (lshpw == NULL) {
509 			/*
510 			 * the user entered doesn't exist, too bad.
511 			 */
512 			goto sorry;
513 		}
514 
515 		/*
516 		 * There is a special case error to catch here:
517 		 * If the password is hashed with an algorithm
518 		 * other than the old unix crypt the call to crypt(3c)
519 		 * could fail if /usr is corrupt or not available
520 		 * since by default /etc/security/crypt.conf will
521 		 * have the crypt_ modules located under /usr/lib.
522 		 * Or it could happen if /etc/security/crypt.conf
523 		 * is corrupted.
524 		 *
525 		 * If this happens crypt(3c) will return NULL and
526 		 * set errno to ELIBACC for the former condition or
527 		 * EINVAL for the latter, in this case we bypass
528 		 * authentication and just verify that the user is
529 		 * authorized.
530 		 */
531 
532 		errno = 0;
533 		cpass = crypt(pass, lshpw->sp_pwdp);
534 		if (((cpass == NULL) && (lshpw->sp_pwdp[0] == '$')) &&
535 		    ((errno == ELIBACC) || (errno == EINVAL))) {
536 			goto checkauth;
537 		} else if ((cpass == NULL) ||
538 		    (strcmp(cpass, lshpw->sp_pwdp) != 0)) {
539 			goto sorry;
540 		}
541 
542 checkauth:
543 		/*
544 		 * There is a special case error here as well.
545 		 * If /etc/user_attr is corrupt, getusernam("root")
546 		 * returns NULL.
547 		 * In this case, we just give access because this is similar
548 		 * to the case of root not existing in /etc/passwd.
549 		 */
550 
551 		if ((getusernam("root") != NULL) &&
552 		    (chkauthattr(MAINTENANCE_AUTH, user) != 1)) {
553 			goto sorry;
554 		}
555 		(void) fprintf(sysmsgfd, "\nsingle-user privilege "
556 		    "assigned to %s on %s.\n", user, devname);
557 		(void) sigsend(P_PID, masterpid, SIGUSR1);
558 		(void) wait(NULL);
559 		free(user);
560 		free(pass);
561 		single(su, devname);
562 		/* single never returns */
563 
564 sorry:
565 		(void) printf("\nLogin incorrect or user %s not authorized\n",
566 		    user);
567 		free(user);
568 		free(pass);
569 		(void) sleep(sleeptime);
570 	}
571 }
572 
573 /*
574  * single() - exec shell for single user mode
575  */
576 
577 static void
578 single(const char *cmd, char *ttyn)
579 {
580 	struct utmpx	*u;
581 	char		found = B_FALSE;
582 
583 	if (ttyn == NULL)
584 		ttyn = findttyname(STDIN_FILENO);
585 
586 	/*
587 	 * utmpx records on the console device are expected to be "console"
588 	 * by other processes, such as dtlogin.
589 	 */
590 	ttyn = stripttyname(ttyn);
591 
592 	/* update the utmpx file. */
593 	while ((u = getutxent()) != NULL) {
594 		if (strcmp(u->ut_line, ttyn) == 0) {
595 			u->ut_tv.tv_sec = time(NULL);
596 			u->ut_type = USER_PROCESS;
597 			u->ut_pid = getpid();
598 			if (strcmp(u->ut_user, "root") != 0)
599 				(void) strcpy(u->ut_user, "root");
600 			(void) pututxline(u);
601 			found = B_TRUE;
602 			break;
603 		}
604 	}
605 	if (!found) {
606 		struct utmpx entryx;
607 
608 		entryx.ut_tv.tv_sec = time(NULL);
609 		entryx.ut_type = USER_PROCESS;
610 		entryx.ut_pid = getpid();
611 		(void) strcpy(entryx.ut_user, "root");
612 		(void) strcpy(entryx.ut_line, ttyn);
613 		entryx.ut_tv.tv_usec = 0;
614 		entryx.ut_session = 0;
615 		entryx.ut_id[0] = 'c';
616 		entryx.ut_id[1] = 'o';
617 		entryx.ut_id[2] = 's';
618 		entryx.ut_id[3] = 'u';
619 		entryx.ut_syslen = 1;
620 		entryx.ut_host[0] = '\0';
621 		entryx.ut_exit.e_termination = WTERMSIG(0);
622 		entryx.ut_exit.e_exit = WEXITSTATUS(0);
623 		(void) pututxline(&entryx);
624 	}
625 	endutxent();
626 	(void) printf("Entering System Maintenance Mode\n\n");
627 
628 	if (execl(cmd, cmd, "-", (char *)0) < 0)
629 		exit(EXIT_FAILURE);
630 }
631 
632 /*
633  * sulogin_getinput() - hacked from the standard PAM tty conversation
634  *			function getpassphrase() library version
635  *			so we can distinguish newline and EOF.
636  *		        also don't need this routine to give a prompt.
637  *
638  * returns the password string, or NULL if the used typed EOF.
639  */
640 
641 static char *
642 sulogin_getinput(char *devname, int echooff)
643 {
644 	struct termio	ttyb;
645 	int		c;
646 	FILE		*fi;
647 	static char	input[PASS_MAX + 1];
648 	void		(*saved_handler)();
649 	char		*rval = input;
650 	int		i = 0;
651 
652 	if ((fi = fopen(devname, "r")) == NULL) {
653 		fi = stdin;
654 	}
655 
656 	saved_handler = signal(SIGINT, SIG_IGN);
657 
658 	if (echooff) {
659 		ttyb = ttymodes;
660 		ttyb.c_lflag &= ~(ECHO | ECHOE | ECHONL);
661 		(void) ioctl(fileno(fi), TCSETAF, &ttyb);
662 	}
663 
664 	/* get characters up to PASS_MAX, but don't overflow */
665 	while ((c = getc(fi)) != '\n' && (c != '\r')) {
666 		if (c == EOF && i == 0) {	/* ^D, no input */
667 			rval = NULL;
668 			break;
669 		}
670 		if (i < PASS_MAX) {
671 			input[i++] = (char)c;
672 		}
673 	}
674 	input[i] = '\0';
675 	(void) fputc('\n', fi);
676 	if (echooff) {
677 		(void) ioctl(fileno(fi), TCSETAW, &ttymodes);
678 	}
679 
680 	if (saved_handler != SIG_ERR)
681 		(void) signal(SIGINT, saved_handler);
682 	return (rval == NULL ? NULL : strdup(rval));
683 }
684 
685 static char *
686 findttyname(int fd)
687 {
688 	char	*ttyn = ttyname(fd);
689 
690 	if (ttyn == NULL)
691 		ttyn = "/dev/???";
692 	else {
693 		/*
694 		 * /dev/syscon and /dev/systty are usually links to
695 		 * /dev/console.  prefer /dev/console.
696 		 */
697 		if (((strcmp(ttyn, "/dev/syscon") == 0) ||
698 		    (strcmp(ttyn, "/dev/systty") == 0)) &&
699 		    access("/dev/console", F_OK))
700 			ttyn = "/dev/console";
701 	}
702 	return (ttyn);
703 }
704 
705 static char *
706 stripttyname(char *ttyn)
707 {
708 	/* saw off the /dev/ */
709 	if (strncmp(ttyn, "/dev/", sizeof ("/dev/") -1) == 0)
710 		return (ttyn + sizeof ("/dev/") - 1);
711 	else
712 		return (ttyn);
713 }
714 
715 
716 /* ARGSUSED */
717 static	void
718 noop(int sig)
719 {
720 	/*
721 	 * This signal handler does nothing except return.  We use it
722 	 * as the signal disposition in this program instead of
723 	 * SIG_IGN so that we do not have to restore the disposition
724 	 * back to SIG_DFL. Instead we allow exec(2) to set the
725 	 * dispostion to SIG_DFL to avoid a race condition.
726 	 */
727 }
728 
729 /* ARGSUSED */
730 static void
731 parenthandler(int sig, siginfo_t *si, ucontext_t *uc)
732 {
733 	int i;
734 
735 	/*
736 	 * We get here if someone has successfully entered a password
737 	 * from the auxiliary console and is getting the single-user shell.
738 	 * When this happens, the parent needs to kill the children
739 	 * that didn't get the shell.
740 	 *
741 	 */
742 	for (i = 0; i < nchild; i++) {
743 		if (pidlist[i] != si->__data.__proc.__pid)
744 			(void) sigsend(P_PID, pidlist[i], SIGTERM);
745 	}
746 	sa.sa_handler = SIG_IGN;
747 	sa.sa_flags = 0;
748 	(void) sigemptyset(&sa.sa_mask);
749 	(void) sigaction(SIGINT, &sa, NULL);
750 	(void) sigaction(SIGQUIT, &sa, NULL);
751 	(void) sigaction(SIGTERM, &sa, NULL);
752 	(void) wait(NULL);
753 }
754 
755 /*
756  * The master pid will get SIGTERM or SIGHUP from init, and then
757  * has to make sure the shell isn't still running.
758  */
759 
760 /* ARGSUSED */
761 static	void
762 childcleanup(int sig)
763 {
764 	int i;
765 
766 	/* Only need to kill the child that became the shell. */
767 	for (i = 0; i < nchild; i++) {
768 		/* Don't kill gramps before his time */
769 		if (pidlist[i] != getppid())
770 			(void) sigsend(P_PID, pidlist[i], SIGHUP);
771 	}
772 }
773 
774 /* ARGSUSED */
775 static	void
776 termhandler(int sig)
777 {
778 	FILE *fi;
779 	pid_t pid;
780 
781 	/* Processes come here when they fail to receive the password. */
782 	if ((fi = fopen("/dev/tty", "r+")) == NULL)
783 		fi = stdin;
784 	else
785 		setbuf(fi, NULL);
786 	sanitize_tty(fileno(fi));
787 	/* If you're the controlling tty, then just wait */
788 	pid = getpid();
789 	if (pid == originalpid || pid == masterpid) {
790 		sa.sa_handler = SIG_IGN;
791 		sa.sa_flags = 0;
792 		(void) sigemptyset(&sa.sa_mask);
793 		(void) sigaction(SIGINT, &sa, NULL);
794 		(void) sigaction(SIGQUIT, &sa, NULL);
795 		sa.sa_handler = SIG_DFL;
796 		sa.sa_flags = 0;
797 		(void) sigemptyset(&sa.sa_mask);
798 		(void) sigaction(SIGTERM, &sa, NULL);
799 		(void) sigaction(SIGHUP, &sa, NULL);
800 		(void) wait(NULL);
801 	}
802 	exit(0);
803 }
804