mailing list of musl libc
 help / color / mirror / code / Atom feed
From: Rich Felker <dalias@libc.org>
To: musl@lists.openwall.com
Subject: Re: Add login_tty
Date: Fri, 31 Oct 2014 12:19:07 -0400	[thread overview]
Message-ID: <20141031161907.GD22465@brightrain.aerifal.cx> (raw)
In-Reply-To: <20140826165627.GA1208@euler>

On Tue, Aug 26, 2014 at 06:56:28PM +0200, Felix Janda wrote:
> Rich Felker wrote:
> [..]
> > I don't have any fundamental objection to this. It might be nice to
> > review the forkpty code for errors it should be checking and make
> > these improvements at the same time, though.
> 
> Ok, attached a proposed patch.

Sorry I never reviewed this properly before. There's been a request
for it again so I'm taking a more detailed look.

> >From f1d88438a6d00defcf96562ef536a4af71827ee7 Mon Sep 17 00:00:00 2001
> From: Felix Janda <felix.janda@posteo.de>
> Date: Tue, 26 Aug 2014 18:36:23 +0200
> Subject: [PATCH] split off login_tty() from forkpty() and clean up the latter
> 
> since after calling openpty() no new fds are needed, an fd limit
> causes no problems.

I assume this remark is about the other code removals in forkpty. Even
if these were correct, they should not be part of an unrelated patch.
But in this case they're not correct:

>  int forkpty(int *m, char *name, const struct termios *tio, const struct winsize *ws)
>  {
> -	int s, t, i, istmp[3]={0};
> +	int s;
>  	pid_t pid;
>  
>  	if (openpty(m, &s, name, tio, ws) < 0) return -1;
>  
> -	/* Ensure before forking that we don't exceed fd limit */
> -	for (i=0; i<3; i++) {
> -		if (fcntl(i, F_GETFL) < 0) {
> -			t = fcntl(s, F_DUPFD, i);
> -			if (t<0) break;
> -			else if (t!=i) close(t);
> -			else istmp[i] = 1;
> -		}
> -	}

This loop is checking whether fd 0/1/2 are already open in the parent,
and if not, temporarily allocating them prior to fork to detect an
error before fork, since we can't handle errors after fork. The idea
is that dup2 might fail when dup'ing onto an unallocated fd, but
should never fail when atomically replacing an existing one. I'm not
100% sure this is correct -- the kernel might deallocate some resource
then reallocate, rather than using in-place, in which case there would
be a resource exhaustion leak -- but that's at least the intent of the
code.

> diff --git a/src/misc/login_tty.c b/src/misc/login_tty.c
> new file mode 100644
> index 0000000..f0be0a0
> --- /dev/null
> +++ b/src/misc/login_tty.c
> @@ -0,0 +1,14 @@
> +#include <utmp.h>
> +#include <sys/ioctl.h>
> +#include <unistd.h>
> +
> +int login_tty(int fd)
> +{
> +	setsid();
> +	if (ioctl(fd, TIOCSCTTY, (char *)0)) return -1;
> +	dup2(fd, 0);
> +	dup2(fd, 1);
> +	dup2(fd, 2);
> +	if (fd>2) close(fd);
> +	return 0;
> +}

Is login_tty supposed to close the fd passed to it?

Rich


  parent reply	other threads:[~2014-10-31 16:19 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-08-25 18:57 Felix Janda
2014-08-25 22:43 ` Rich Felker
2014-08-26 16:56   ` Felix Janda
2014-08-29 18:44     ` Felix Janda
2014-09-04 21:22     ` Szabolcs Nagy
2014-09-04 21:33       ` Rich Felker
2014-09-04 22:31         ` Justin Cormack
2014-09-05 17:23       ` Felix Janda
2014-09-05 17:29         ` Rich Felker
2014-09-05 18:52           ` Felix Janda
2014-10-31 16:19     ` Rich Felker [this message]
2014-11-01 21:15       ` Felix Janda
2014-11-01 21:45         ` Rich Felker
2014-11-01 22:07           ` Szabolcs Nagy
2014-11-01 22:27           ` Felix Janda
2014-11-01 22:43             ` Rich Felker
2014-11-01 22:56               ` Felix Janda
2014-11-02  0:09                 ` Rich Felker
2014-11-02 14:19                   ` Felix Janda
2014-11-02 16:28                     ` Rich Felker
2014-11-02 18:56                       ` Felix Janda
2014-11-02 22:28                         ` Rich Felker
2014-11-03 18:29                           ` Felix Janda
2014-12-21  0:58                             ` Rich Felker
2014-12-21  1:15                               ` Rich Felker
2014-12-21  1:38                               ` Rich Felker
2014-12-21  2:59                                 ` Rich Felker

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20141031161907.GD22465@brightrain.aerifal.cx \
    --to=dalias@libc.org \
    --cc=musl@lists.openwall.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/musl/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).