1
#define _GNU_SOURCE /* asprintf() */
2
#include <signal.h> /* sig_atomic_t, struct sigaction,
3
sigemptyset(), sigaddset(),
4
sigaction, SIGINT, SIG_IGN, SIGHUP,
5
SIGTERM, kill(), SIGKILL */
6
#include <stddef.h> /* NULL */
7
#include <stdlib.h> /* getenv() */
8
#include <stdio.h> /* asprintf(), perror() */
9
#include <stdlib.h> /* EXIT_FAILURE, EXIT_SUCCESS,
11
#include <sys/types.h> /* pid_t, DIR, struct dirent,
13
#include <dirent.h> /* opendir(), readdir(), closedir() */
14
#include <unistd.h> /* readlink(), fork(), execl(),
16
#include <string.h> /* memcmp() */
17
#include <iso646.h> /* and */
18
#include <errno.h> /* errno */
19
#include <sys/wait.h> /* waitpid(), WIFEXITED(),
22
sig_atomic_t interrupted_by_signal = 0;
24
static void termination_handler(__attribute__((unused))int signum){
25
interrupted_by_signal = 1;
28
int main(__attribute__((unused))int argc,
29
__attribute__((unused))char **argv){
32
/* Create prompt string */
35
const char *const cryptsource = getenv("cryptsource");
36
const char *const crypttarget = getenv("crypttarget");
37
const char *const prompt_start = "getpass "
38
"Enter passphrase to unlock the disk";
40
if(cryptsource == NULL){
41
if(crypttarget == NULL){
42
ret = asprintf(&prompt, "%s: ", prompt_start);
44
ret = asprintf(&prompt, "%s (%s): ", prompt_start,
48
if(crypttarget == NULL){
49
ret = asprintf(&prompt, "%s %s: ", prompt_start, cryptsource);
51
ret = asprintf(&prompt, "%s %s (%s): ", prompt_start,
52
cryptsource, crypttarget);
60
/* Find splashy process */
61
pid_t splashy_pid = 0;
63
const char splashy_name[] = "/sbin/splashy";
64
DIR *proc_dir = opendir("/proc");
70
for(struct dirent *proc_ent = readdir(proc_dir);
72
proc_ent = readdir(proc_dir)){
73
pid_t pid = (pid_t) strtoul(proc_ent->d_name, NULL, 10);
78
/* Find the executable name by doing readlink() on the
79
/proc/<pid>/exe link */
80
char exe_target[sizeof(splashy_name)];
84
ret = asprintf(&exe_link, "/proc/%s/exe", proc_ent->d_name);
91
sret = readlink(exe_link, exe_target, sizeof(exe_target));
94
if((sret == ((ssize_t)sizeof(exe_target)-1))
95
and (memcmp(splashy_name, exe_target,
96
sizeof(exe_target)-1) == 0)){
103
if(splashy_pid == 0){
108
/* Set up the signal handler */
110
struct sigaction old_action,
111
new_action = { .sa_handler = termination_handler,
113
sigemptyset(&new_action.sa_mask);
114
sigaddset(&new_action.sa_mask, SIGINT);
115
sigaddset(&new_action.sa_mask, SIGHUP);
116
sigaddset(&new_action.sa_mask, SIGTERM);
117
ret = sigaction(SIGINT, NULL, &old_action);
123
if (old_action.sa_handler != SIG_IGN){
124
ret = sigaction(SIGINT, &new_action, NULL);
131
ret = sigaction(SIGHUP, NULL, &old_action);
137
if (old_action.sa_handler != SIG_IGN){
138
ret = sigaction(SIGHUP, &new_action, NULL);
145
ret = sigaction(SIGTERM, NULL, &old_action);
151
if (old_action.sa_handler != SIG_IGN){
152
ret = sigaction(SIGTERM, &new_action, NULL);
161
/* Fork off the splashy command to prompt for password */
162
pid_t splashy_command_pid = 0;
163
if(not interrupted_by_signal){
164
splashy_command_pid = fork();
165
if(splashy_command_pid == -1){
166
if(not interrupted_by_signal){
172
if(splashy_command_pid == 0){
173
const char splashy_command[] = "/sbin/splashy_update";
174
ret = execl(splashy_command, splashy_command, prompt,
176
if(not interrupted_by_signal and errno != ENOENT){
177
/* Don't report "File not found", since splashy might not be
189
/* Wait for command to complete */
191
while(not interrupted_by_signal){
192
waitpid(splashy_command_pid, &status, 0);
193
if(not interrupted_by_signal
194
and WIFEXITED(status) and WEXITSTATUS(status)==0){
198
kill(splashy_pid, SIGTERM);
199
if(interrupted_by_signal){
200
kill(splashy_command_pid, SIGTERM);
203
pid_t new_splashy_pid = fork();
204
if(new_splashy_pid == 0){
205
/* Child; will become new splashy process */
206
while(kill(splashy_pid, 0)){
208
kill(splashy_pid, SIGKILL);
211
ret = dup2(STDERR_FILENO, STDOUT_FILENO); /* replace our stdout */
216
execl("/sbin/splashy", "/sbin/splashy", "boot", (char *)NULL);