[2893] in Kerberos-V5-bugs
pending/561: PATCH: util/pty/update_utmp.c
daemon@ATHENA.MIT.EDU (Larry Schwimmer)
Tue Mar 17 18:52:04 1998
Resent-From: gnats@rt-11.MIT.EDU (GNATS Management)
Resent-To: gnats-admin@rt-11.MIT.EDU
Resent-Reply-To: krb5-bugs@MIT.EDU,
Larry Schwimmer <schwim@whatmore.Stanford.EDU>
Date: Tue, 17 Mar 1998 15:51:16 -0800 (PST)
From: Larry Schwimmer <schwim@whatmore.Stanford.EDU>
To: krb5-bugs@MIT.EDU
Cc: schwim@leland.Stanford.EDU
>Number: 561
>Category: pending
>Synopsis: PATCH: util/pty/update_utmp.c
>Confidential: yes
>Severity: serious
>Priority: medium
>Responsible: gnats-admin
>State: open
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Tue Mar 17 18:52:00 EST 1998
>Last-Modified:
>Originator:
>Organization:
>Release:
>Environment:
>Description:
>How-To-Repeat:
>Fix:
>Audit-Trail:
>Unformatted:
Submitter-Id: net
Originator: Larry Schwimmer
Confidential: no
Synopsis: Solaris
Severity: non-critical
Priority: medium
Category: krb5-libs
Class: sw-bug
Release: 1.0.5
Environment: Solaris 2.6
Description:
util/pty/update_utmp.c enters the incorrect entry on console,
which causes ttymon to fail to respawn a new session until it times
out (after a minute).
How-To-Repeat:
Use login.krb5 or a login linked against libpty.a on
the console of a Solaris 2.6 machine.
Fix:
This comes from Ken Hornstein. I was surprised it was not
in the 1.0.5 release, so I wanted to send it in case it wasn't
reported.
--- util/pty/update_utmp.c.orig Fri Feb 6 19:46:43 1998
+++ util/pty/update_utmp.c Mon Mar 16 17:39:08 1998
@@ -81,7 +81,11 @@
#ifndef NO_UT_PID
if (!strcmp (line, "/dev/console"))
+#if (defined(sun) && defined(__SVR4))
+ strncpy (ent.ut_id, "co", 4);
+#else
strncpy (ent.ut_id, "cons", 4);
+#endif
else {
tmpx = line + strlen(line)-1;
if (*(tmpx-1) != '/') tmpx--; /* last two characters, unless it's a / */
yours,
Larry Schwimmer
schwim@leland.stanford.edu
Leland Systems Group