ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/rxvt-unicode/src/ptytty.C
(Generate patch)

Comparing rxvt-unicode/src/ptytty.C (file contents):
Revision 1.27 by root, Tue Jan 3 16:32:33 2006 UTC vs.
Revision 1.56 by root, Sun Jan 22 04:01:52 2006 UTC

1// This file is part of libptytty. Do not make local modifications.
2// http://software.schmorp.de/pkg/libptytty
3
1/*--------------------------------*-C-*---------------------------------* 4/*----------------------------------------------------------------------*
2 * File: ptytty.C 5 * File: ptytty.C
3 *----------------------------------------------------------------------* 6 *----------------------------------------------------------------------*
4 * 7 *
5 * All portions of code are copyright by their respective author/s. 8 * All portions of code are copyright by their respective author/s.
6 * Copyright (c) 1999-2001 Geoff Wing <gcw@pobox.com> 9 * Copyright (c) 1999-2001 Geoff Wing <gcw@pobox.com>
7 * Copyright (c) 2004 Marc Lehmann <pcg@goof.com> 10 * Copyright (c) 2004-2006 Marc Lehmann <pcg@goof.com>
8 * 11 *
9 * This program is free software; you can redistribute it and/or modify 12 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by 13 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or 14 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version. 15 * (at your option) any later version.
19 * You should have received a copy of the GNU General Public License 22 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software 23 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 24 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 *---------------------------------------------------------------------*/ 25 *---------------------------------------------------------------------*/
23 26
24#include "../config.h" /* NECESSARY */ 27#include "../config.h"
28
25#include "rxvt.h" 29#include "ptytty.h"
26 30
27#ifdef HAVE_STDLIB_H
28# include <cstdlib> 31#include <cstdlib>
29#endif 32#include <cstring>
30#ifdef HAVE_SYS_TYPES_H 33
31# include <sys/types.h> 34#include <sys/types.h>
32#endif 35#include <sys/socket.h>
33#ifdef HAVE_UNISTD_H
34# include <unistd.h> 36#include <unistd.h>
35#endif
36#if defined(HAVE_STRING_H)
37# include <cstring>
38#endif
39#ifdef HAVE_FCNTL_H
40# include <fcntl.h> 37#include <fcntl.h>
41#endif 38
42#ifdef HAVE_SYS_IOCTL_H 39#ifdef HAVE_SYS_IOCTL_H
43# include <sys/ioctl.h> 40# include <sys/ioctl.h>
44#endif 41#endif
45#if defined(PTYS_ARE_PTMX) && defined(HAVE_SYS_STROPTS_H) 42#if defined(HAVE_DEV_PTMX) && defined(HAVE_SYS_STROPTS_H)
46# include <sys/stropts.h> /* for I_PUSH */ 43# include <sys/stropts.h> /* for I_PUSH */
47#endif 44#endif
48#ifdef HAVE_ISASTREAM 45#ifdef HAVE_ISASTREAM
49# include <stropts.h> 46# include <stropts.h>
50#endif 47#endif
51#ifdef HAVE_PTY_H 48#if defined(HAVE_PTY_H)
52# include <pty.h> 49# include <pty.h>
53#endif 50#elif defined(HAVE_LIBUTIL_H)
54
55// better do this via configure, but....
56#if defined(__FreeBSD__)
57# include <libutil.h> 51# include <libutil.h>
58#elif defined(__DARWIN__) || (defined (__MACH__) && defined (__APPLE__)) 52#elif defined(HAVE_UTIL_H)
59# include <util.h> 53# include <util.h>
60#endif 54#endif
55#ifdef TTY_GID_SUPPORT
56#include <grp.h>
57#endif
61 58
62#include <cstdio> 59#include <cstdio>
63#include <grp.h> 60
61/////////////////////////////////////////////////////////////////////////////
64 62
65/* ------------------------------------------------------------------------- * 63/* ------------------------------------------------------------------------- *
66 * GET PSEUDO TELETYPE - MASTER AND SLAVE * 64 * GET PSEUDO TELETYPE - MASTER AND SLAVE *
67 * ------------------------------------------------------------------------- */ 65 * ------------------------------------------------------------------------- */
68/* 66/*
69 * Returns pty file descriptor, or -1 on failure 67 * Returns pty file descriptor, or -1 on failure
70 * If successful, ttydev is set to the name of the slave device. 68 * If successful, ttydev is set to the name of the slave device.
71 * fd_tty _may_ also be set to an open fd to the slave device 69 * fd_tty _may_ also be set to an open fd to the slave device
72 */ 70 */
71#if defined(UNIX98_PTY)
73static int 72static int
74get_pty (int *fd_tty, char **ttydev) 73get_pty (int *fd_tty, char **ttydev)
75{ 74{
76 int pfd; 75 int pfd;
77 76
78#ifdef PTYS_ARE_OPENPTY 77# if defined(HAVE_GETPT)
79 char tty_name[sizeof "/dev/pts/????\0"]; 78 pfd = getpt();
79# elif defined(HAVE_POSIX_OPENPT)
80 pfd = posix_openpt (O_RDWR);
81# else
82 pfd = open (CLONE_DEVICE, O_RDWR | O_NOCTTY, 0);
83# endif
84 if (pfd >= 0)
85 {
86 if (grantpt (pfd) == 0 /* change slave permissions */
87 && unlockpt (pfd) == 0)
88 { /* slave now unlocked */
89 *ttydev = strdup (ptsname (pfd)); /* get slave's name */
90 return pfd;
91 }
80 92
81 rxvt_privileges(RESTORE); 93 close (pfd);
94 }
95
96 return -1;
97}
98#elif defined(HAVE_OPENPTY)
99static int
100get_pty (int *fd_tty, char **ttydev)
101{
102 int pfd;
103 int res;
104 char tty_name[32];
105
82 int res = openpty (&pfd, fd_tty, tty_name, NULL, NULL); 106 res = openpty (&pfd, fd_tty, tty_name, NULL, NULL);
83 rxvt_privileges(IGNORE);
84
85 if (res != -1) 107 if (res != -1)
86 { 108 {
87 *ttydev = strdup (tty_name); 109 *ttydev = strdup (tty_name);
88 return pfd; 110 return pfd;
89 } 111 }
90#endif
91 112
92#ifdef PTYS_ARE__GETPTY 113 return -1;
114}
115#elif defined(HAVE__GETPTY)
116static int
117get_pty (int *fd_tty, char **ttydev)
118{
119 int pfd;
120
93 *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0); 121 *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0);
94 if (*ttydev != NULL) 122 if (*ttydev != NULL)
95 return pfd; 123 return pfd;
96#endif
97 124
98#ifdef PTYS_ARE_GETPTY 125 return -1;
99 char *ptydev; 126}
127#elif defined(HAVE_DEV_PTC)
128static int
129get_pty (int *fd_tty, char **ttydev)
130{
131 int pfd;
100 132
101 while ((ptydev = getpty ()) != NULL)
102 if ((pfd = open (ptydev, O_RDWR | O_NOCTTY, 0)) >= 0)
103 {
104 *ttydev = ptydev;
105 return pfd;
106 }
107#endif
108
109#if defined(HAVE_GRANTPT) && defined(HAVE_UNLOCKPT)
110# if defined(PTYS_ARE_GETPT) || defined(PTYS_ARE_PTMX)
111
112 {
113# ifdef PTYS_ARE_GETPT
114 pfd = getpt ();
115# else
116 pfd = open ("/dev/ptmx", O_RDWR | O_NOCTTY, 0);
117# endif
118
119 if (pfd >= 0)
120 {
121 if (grantpt (pfd) == 0 /* change slave permissions */
122 && unlockpt (pfd) == 0)
123 { /* slave now unlocked */
124 *ttydev = strdup (ptsname (pfd)); /* get slave's name */
125 return pfd;
126 }
127 close (pfd);
128 }
129 }
130# endif
131#endif
132
133#ifdef PTYS_ARE_PTC
134 if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0) 133 if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0)
135 { 134 {
136 *ttydev = strdup (ttyname (pfd)); 135 *ttydev = strdup (ttyname (pfd));
137 return pfd; 136 return pfd;
138 } 137 }
139#endif
140 138
141#ifdef PTYS_ARE_CLONE 139 return -1;
140}
141#elif defined(HAVE_DEV_CLONE)
142static int
143get_pty (int *fd_tty, char **ttydev)
144{
145 int pfd;
146
142 if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0) 147 if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0)
143 { 148 {
144 *ttydev = strdup (ptsname (pfd)); 149 *ttydev = strdup (ptsname (pfd));
145 return pfd; 150 return pfd;
146 } 151 }
147#endif
148
149#ifdef PTYS_ARE_NUMERIC
150 {
151 int idx;
152 char *c1, *c2;
153 char pty_name[] = "/dev/ptyp???";
154 char tty_name[] = "/dev/ttyp???";
155
156 c1 = &(pty_name[sizeof (pty_name) - 4]);
157 c2 = &(tty_name[sizeof (tty_name) - 4]);
158 for (idx = 0; idx < 256; idx++)
159 {
160 sprintf (c1, "%d", idx);
161 sprintf (c2, "%d", idx);
162 if (access (tty_name, F_OK) < 0)
163 {
164 idx = 256;
165 break;
166 }
167
168 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) >= 0)
169 {
170 if (access (tty_name, R_OK | W_OK) == 0)
171 {
172 *ttydev = strdup (tty_name);
173 return pfd;
174 }
175
176 close (pfd);
177 }
178 }
179 }
180#endif
181
182#ifdef PTYS_ARE_SEARCHED
183 {
184 const char *c1, *c2;
185 char pty_name[] = "/dev/pty??";
186 char tty_name[] = "/dev/tty??";
187
188# ifndef PTYCHAR1
189# define PTYCHAR1 "pqrstuvwxyz"
190# endif
191# ifndef PTYCHAR2
192# define PTYCHAR2 "0123456789abcdef"
193# endif
194
195 for (c1 = PTYCHAR1; *c1; c1++)
196 {
197 pty_name[ (sizeof (pty_name) - 3)] =
198 tty_name[ (sizeof (pty_name) - 3)] = *c1;
199 for (c2 = PTYCHAR2; *c2; c2++)
200 {
201 pty_name[ (sizeof (pty_name) - 2)] =
202 tty_name[ (sizeof (pty_name) - 2)] = *c2;
203 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) >= 0)
204 {
205 if (access (tty_name, R_OK | W_OK) == 0)
206 {
207 *ttydev = strdup (tty_name);
208 return pfd;
209 }
210
211 close (pfd);
212 }
213 }
214 }
215 }
216#endif
217 152
218 return -1; 153 return -1;
219} 154}
155#else
156/* Based on the code in openssh/openbsd-compat/bsd-openpty.c */
157static int
158get_pty (int *fd_tty, char **ttydev)
159{
160 int pfd;
161 int i;
162 char pty_name[32];
163 char tty_name[32];
164 const char *majors = "pqrstuvwxyzabcde";
165 const char *minors = "0123456789abcdef";
166 for (i = 0; i < 256; i++)
167 {
168 snprintf(pty_name, 32, "/dev/pty%c%c", majors[i / 16], minors[i % 16]);
169 snprintf(tty_name, 32, "/dev/tty%c%c", majors[i / 16], minors[i % 16]);
170 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1)
171 {
172 snprintf(pty_name, 32, "/dev/ptyp%d", i);
173 snprintf(tty_name, 32, "/dev/ttyp%d", i);
174 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1)
175 continue;
176 }
177 if (access (tty_name, R_OK | W_OK) == 0)
178 {
179 *ttydev = strdup (tty_name);
180 return pfd;
181 }
182
183 close (pfd);
184 }
185}
186#endif
220 187
221/*----------------------------------------------------------------------*/ 188/*----------------------------------------------------------------------*/
222/* 189/*
223 * Returns tty file descriptor, or -1 on failure 190 * Returns tty file descriptor, or -1 on failure
224 */ 191 */
231/*----------------------------------------------------------------------*/ 198/*----------------------------------------------------------------------*/
232/* 199/*
233 * Make our tty a controlling tty so that /dev/tty points to us 200 * Make our tty a controlling tty so that /dev/tty points to us
234 */ 201 */
235static int 202static int
236control_tty (int fd_tty, const char *ttydev) 203control_tty (int fd_tty)
237{ 204{
238#ifndef __QNX__
239 int fd;
240
241 /* ---------------------------------------- */
242# ifdef HAVE_SETSID
243 setsid (); 205 setsid ();
244# endif
245# if defined(HAVE_SETPGID)
246 setpgid (0, 0);
247# elif defined(HAVE_SETPGRP)
248 setpgrp (0, 0);
249# endif
250 206
251 /* ---------------------------------------- */
252# ifdef TIOCNOTTY
253 fd = open ("/dev/tty", O_RDWR | O_NOCTTY);
254 if (fd >= 0)
255 {
256 ioctl (fd, TIOCNOTTY, NULL); /* void tty associations */
257 close (fd);
258 }
259# endif
260
261 /* ---------------------------------------- */
262 fd = open ("/dev/tty", O_RDWR | O_NOCTTY);
263 if (fd >= 0)
264 close (fd); /* ouch: still have controlling tty */
265
266 /* ---------------------------------------- */
267#if defined(PTYS_ARE_PTMX) && defined(I_PUSH) 207#if defined(HAVE_DEV_PTMX) && defined(I_PUSH)
268 /* 208 /*
269 * Push STREAMS modules: 209 * Push STREAMS modules:
270 * ptem: pseudo-terminal hardware emulation module. 210 * ptem: pseudo-terminal hardware emulation module.
271 * ldterm: standard terminal line discipline. 211 * ldterm: standard terminal line discipline.
272 * ttcompat: V7, 4BSD and XENIX STREAMS compatibility module. 212 * ttcompat: V7, 4BSD and XENIX STREAMS compatibility module.
289 ioctl (fd_tty, I_PUSH, "ptem"); 229 ioctl (fd_tty, I_PUSH, "ptem");
290 ioctl (fd_tty, I_PUSH, "ldterm"); 230 ioctl (fd_tty, I_PUSH, "ldterm");
291 ioctl (fd_tty, I_PUSH, "ttcompat"); 231 ioctl (fd_tty, I_PUSH, "ttcompat");
292 } 232 }
293#endif 233#endif
294 /* ---------------------------------------- */ 234
295# if defined(TIOCSCTTY)
296 fd = ioctl (fd_tty, TIOCSCTTY, NULL); 235 ioctl (fd_tty, TIOCSCTTY, NULL);
297# elif defined(TIOCSETCTTY) 236
298 fd = ioctl (fd_tty, TIOCSETCTTY, NULL);
299# else
300 fd = open (ttydev, O_RDWR);
301 if (fd >= 0)
302 close (fd);
303# endif
304 /* ---------------------------------------- */
305 fd = open ("/dev/tty", O_WRONLY); 237 int fd = open ("/dev/tty", O_WRONLY);
306 if (fd < 0) 238 if (fd < 0)
307 return -1; /* fatal */ 239 return -1; /* fatal */
240
308 close (fd); 241 close (fd);
309 /* ---------------------------------------- */
310#endif /* ! __QNX__ */
311 242
312 return 0; 243 return 0;
313} 244}
314 245
315#ifndef NO_SETOWNER_TTYDEV 246void
247ptytty::close_tty ()
248{
249 if (tty < 0)
250 return;
251
252 close (tty);
253 tty = -1;
254}
255
256bool
257ptytty::make_controlling_tty ()
258{
259 return control_tty (tty) >= 0;
260}
261
262void
263ptytty::set_utf8_mode (bool on)
264{
265#ifdef IUTF8
266 if (pty < 0)
267 return;
268
269 struct termios tio;
270
271 if (tcgetattr (pty, &tio) != -1)
272 {
273 tcflag_t new_cflag = tio.c_iflag;
274
275 if (on)
276 new_cflag |= IUTF8;
277 else
278 new_cflag &= ~IUTF8;
279
280 if (new_cflag != tio.c_iflag)
281 {
282 tio.c_iflag = new_cflag;
283 tcsetattr (pty, TCSANOW, &tio);
284 }
285 }
286#endif
287}
288
316static struct ttyconf { 289static struct ttyconf {
317 gid_t gid; 290 gid_t gid;
318 mode_t mode; 291 mode_t mode;
319 292
320 ttyconf () 293 ttyconf ()
329 } 302 }
330 else 303 else
331#endif /* TTY_GID_SUPPORT */ 304#endif /* TTY_GID_SUPPORT */
332 { 305 {
333 mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH; 306 mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH;
334 gid = getgid (); 307 gid = 0;
335 } 308 }
336 } 309 }
337} ttyconf; 310} ttyconf;
338 311
312ptytty_unix::ptytty_unix ()
313{
314 name = 0;
315#if UTMP_SUPPORT
316 cmd_pid = 0;
317#endif
318}
319
320ptytty_unix::~ptytty_unix ()
321{
322#if UTMP_SUPPORT
323 logout ();
324#endif
325 put ();
326}
327
339void 328void
340rxvt_ptytty::privileges (rxvt_privaction action) 329ptytty_unix::put ()
341{ 330{
342 if (!name || !*name) 331 chmod (name, RESTORE_TTY_MODE);
343 return; 332 chown (name, 0, ttyconf.gid);
344 333
345 rxvt_privileges (RESTORE); 334 close_tty ();
346 335
347 if (action == SAVE) 336 if (pty >= 0)
348 { 337 close (pty);
349# ifndef RESET_TTY_TO_COMMON_DEFAULTS
350 /* store original tty status for restoration rxvt_clean_exit () -- rgg 04/12/95 */
351 if (lstat (name, &savestat) < 0) /* you lose out */
352 ;
353 else
354# endif
355 {
356 saved = true;
357 chown (name, getuid (), ttyconf.gid); /* fail silently */
358 chmod (name, ttyconf.mode);
359# ifdef HAVE_REVOKE
360 revoke (name);
361# endif
362 }
363 }
364 else
365 { /* action == RESTORE */
366# ifndef RESET_TTY_TO_COMMON_DEFAULTS
367 if (saved)
368 {
369 chmod (name, savestat.st_mode);
370 chown (name, savestat.st_uid, savestat.st_gid);
371 }
372# else
373 chmod (name, (S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH));
374 chown (name, 0, 0);
375# endif
376 338
377 } 339 free (name);
378 340
379 rxvt_privileges (IGNORE);
380}
381#endif
382
383rxvt_ptytty::rxvt_ptytty ()
384{
385 pty = tty = -1; 341 pty = tty = -1;
386 name = 0; 342 name = 0;
387#ifndef NO_SETOWNER_TTYDEV
388 saved = false;
389#endif
390}
391
392rxvt_ptytty::~rxvt_ptytty ()
393{
394 put ();
395}
396
397void
398
399rxvt_ptytty::close_tty ()
400{
401 if (tty >= 0) close (tty);
402 tty = -1;
403}
404
405void
406rxvt_ptytty::put ()
407{
408#ifndef NO_SETOWNER_TTYDEV
409 if (tty >= 0)
410 privileges (RESTORE);
411#endif
412
413 if (pty >= 0) close (pty);
414 close_tty ();
415 free (name);
416
417 pty = tty = -1;
418 name = 0;
419} 343}
420 344
421bool 345bool
422rxvt_ptytty::make_controlling_tty () 346ptytty_unix::get ()
423{
424 return control_tty (tty, name) >= 0;
425}
426
427bool
428rxvt_ptytty::get ()
429{ 347{
430 /* get master (pty) */ 348 /* get master (pty) */
431 if ((pty = get_pty (&tty, &name)) < 0) 349 if ((pty = get_pty (&tty, &name)) < 0)
432 return false; 350 return false;
433 351
435 353
436 /* get slave (tty) */ 354 /* get slave (tty) */
437 if (tty < 0) 355 if (tty < 0)
438 { 356 {
439#ifndef NO_SETOWNER_TTYDEV 357#ifndef NO_SETOWNER_TTYDEV
440 privileges (SAVE); 358 chown (name, getuid (), ttyconf.gid); /* fail silently */
359 chmod (name, ttyconf.mode);
360# ifdef HAVE_REVOKE
361 revoke (name);
362# endif
441#endif 363#endif
442 364
443 if ((tty = get_tty (name)) < 0) 365 if ((tty = get_tty (name)) < 0)
444 { 366 {
445 put (); 367 put ();
448 } 370 }
449 371
450 return true; 372 return true;
451} 373}
452 374
375#if PTYTTY_HELPER
376
377static int sock_fd = -1;
378static int helper_pid, owner_pid;
379
380struct command
381{
382 enum { get, login, destroy } type;
383
384 ptytty *id;
385
386 bool login_shell;
387 int cmd_pid;
388 char hostname[512]; // arbitrary, but should be plenty
389};
390
391struct ptytty_proxy : ptytty
392{
393 ptytty *id;
394
395 ptytty_proxy ()
396 : id(0)
397 {
398 }
399
400 ~ptytty_proxy ();
401
402 bool get ();
403 void login (int cmd_pid, bool login_shell, const char *hostname);
404};
405
406bool
407ptytty_proxy::get ()
408{
409 command cmd;
410
411 cmd.type = command::get;
412
413 write (sock_fd, &cmd, sizeof (cmd));
414
415 if (read (sock_fd, &id, sizeof (id)) != sizeof (id))
416 ptytty_fatal ("protocol error while creating pty using helper process, aborting.\n");
417
418 if (!id)
419 return false;
420
421 if ((pty = recv_fd (sock_fd)) < 0
422 || (tty = recv_fd (sock_fd)) < 0)
423 ptytty_fatal ("protocol error while reading pty/tty fds from helper process, aborting.\n");
424
425 return true;
426}
427
453void 428void
454rxvt_ptytty::set_utf8_mode (bool on) 429ptytty_proxy::login (int cmd_pid, bool login_shell, const char *hostname)
455{ 430{
456#ifdef IUTF8 431 command cmd;
457 if (pty != -1) 432
433 cmd.type = command::login;
434 cmd.id = id;
435 cmd.cmd_pid = cmd_pid;
436 cmd.login_shell = login_shell;
437 strncpy (cmd.hostname, hostname, sizeof (cmd.hostname));
438
439 write (sock_fd, &cmd, sizeof (cmd));
440}
441
442ptytty_proxy::~ptytty_proxy ()
443{
444 if (id)
445 {
446 command cmd;
447
448 cmd.type = command::destroy;
449 cmd.id = id;
450
451 write (sock_fd, &cmd, sizeof (cmd));
458 { 452 }
459 struct termios tio; 453}
460 454
461 if (tcgetattr (pty, &tio) != -1) 455static
456void serve ()
457{
458 command cmd;
459 vector<ptytty *> ptys;
460
461 while (read (sock_fd, &cmd, sizeof (command)) == sizeof (command))
462 {
463 if (cmd.type == command::get)
464 {
465 // -> id ptyfd ttyfd
466 cmd.id = new ptytty_unix;
467
468 if (cmd.id->get ())
462 { 469 {
463 tcflag_t new_cflag = tio.c_iflag; 470 write (sock_fd, &cmd.id, sizeof (cmd.id));
471 ptys.push_back (cmd.id);
464 472
465 if (on) 473 ptytty::send_fd (sock_fd, cmd.id->pty);
466 new_cflag |= IUTF8; 474 ptytty::send_fd (sock_fd, cmd.id->tty);
475 }
467 else 476 else
468 new_cflag &= ~IUTF8;
469
470 if (new_cflag != tio.c_iflag)
471 { 477 {
472 tio.c_iflag = new_cflag; 478 delete cmd.id;
473 tcsetattr (pty, TCSANOW, &tio); 479 cmd.id = 0;
480 write (sock_fd, &cmd.id, sizeof (cmd.id));
474 } 481 }
475 } 482 }
483 else if (cmd.type == command::login)
484 {
485#if UTMP_SUPPORT
486 if (find (ptys.begin (), ptys.end (), cmd.id))
487 {
488 cmd.hostname[sizeof (cmd.hostname) - 1] = 0;
489 cmd.id->login (cmd.cmd_pid, cmd.login_shell, cmd.hostname);
490 }
491#endif
492 }
493 else if (cmd.type == command::destroy)
494 {
495 vector<ptytty *>::iterator pty = find (ptys.begin (), ptys.end (), cmd.id);
496
497 if (pty != ptys.end ())
498 {
499 delete *pty;
500 ptys.erase (pty);
501 }
502 }
503 else
504 break;
505 }
506
507 // destroy all ptys
508 for (vector<ptytty *>::iterator i = ptys.end (); i-- > ptys.begin (); )
509 delete *i;
510}
511
512void
513ptytty::use_helper ()
514{
515 int pid = getpid ();
516
517 if (sock_fd >= 0 && pid == owner_pid)
518 return;
519
520 owner_pid = pid;
521
522 int sv[2];
523
524 if (socketpair (AF_UNIX, SOCK_STREAM, 0, sv))
525 ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n");
526
527 helper_pid = fork ();
528
529 if (helper_pid < 0)
530 ptytty_fatal ("could not create pty/sessiondb helper process, aborting.\n");
531
532 if (helper_pid)
476 } 533 {
477#endif 534 // client, process
478} 535 sock_fd = sv[0];
536 close (sv[1]);
537 fcntl (sock_fd, F_SETFD, FD_CLOEXEC);
538 }
539 else
540 {
541 // server, pty-helper
542 sock_fd = sv[1];
479 543
480/*----------------------- end-of-file (C source) -----------------------*/ 544 chdir ("/");
481 545
546 for (int fd = 0; fd < 1023; fd++)
547 if (fd != sock_fd)
548 close (fd);
549
550 serve ();
551 _exit (EXIT_SUCCESS);
552 }
553}
554
555#endif
556
557ptytty *
558ptytty::create ()
559{
560#if PTYTTY_HELPER
561 if (helper_pid && getpid () == owner_pid)
562 // use helper process
563 return new ptytty_proxy;
564 else
565#endif
566 return new ptytty_unix;
567}
568
569void
570ptytty::init ()
571{
572 uid_t uid = getuid ();
573 gid_t gid = getgid ();
574
575 // before doing anything else, check for setuid/setgid operation,
576 // start the helper process and drop privileges
577 if (uid != geteuid ()
578 || gid != getegid ())
579 {
580#if PTYTTY_HELPER
581 use_helper ();
582#else
583 ptytty_warn ("running setuid/setgid without pty helper compiled in, continuing unprivileged.\n");
584#endif
585
586 drop_privileges ();
587 }
588}
589
590void
591ptytty::drop_privileges ()
592{
593 uid_t uid = getuid ();
594 gid_t gid = getgid ();
595
596 // drop privileges
597#if HAVE_SETRESUID
598 setresgid (gid, gid, gid);
599 setresuid (uid, uid, uid);
600#elif HAVE_SETREUID
601 setregid (gid, gid);
602 setreuid (uid, uid);
603#elif HAVE_SETUID
604 setgid (gid);
605 setuid (uid);
606#endif
607
608 if (uid != geteuid ()
609 || gid != getegid ())
610 ptytty_fatal ("unable to drop privileges, aborting.\n");
611}
612

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines