ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/rxvt-unicode/src/ptytty.C
(Generate patch)

Comparing rxvt-unicode/src/ptytty.C (file contents):
Revision 1.18 by root, Sun Dec 12 05:54:05 2004 UTC vs.
Revision 1.59 by root, Mon Jan 23 12:05:12 2006 UTC

1// This file is part of libptytty. Do not make local modifications.
2// http://software.schmorp.de/pkg/libptytty
3
1/*--------------------------------*-C-*---------------------------------* 4/*----------------------------------------------------------------------*
2 * File: ptytty.C 5 * File: ptytty.C
3 *----------------------------------------------------------------------* 6 *----------------------------------------------------------------------*
4 * 7 *
5 * All portions of code are copyright by their respective author/s. 8 * All portions of code are copyright by their respective author/s.
6 * Copyright (c) 1999-2001 Geoff Wing <gcw@pobox.com> 9 * Copyright (c) 1999-2001 Geoff Wing <gcw@pobox.com>
7 * Copyright (c) 2004 Marc Lehmann <pcg@goof.com> 10 * Copyright (c) 2004-2006 Marc Lehmann <pcg@goof.com>
11 * Copyright (c) 2006 Emanuele Giaquinta <e.giaquinta@glauco.it>
8 * 12 *
9 * This program is free software; you can redistribute it and/or modify 13 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by 14 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or 15 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version. 16 * (at your option) any later version.
19 * You should have received a copy of the GNU General Public License 23 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software 24 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 25 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 *---------------------------------------------------------------------*/ 26 *---------------------------------------------------------------------*/
23 27
24#include "../config.h" /* NECESSARY */ 28#include "../config.h"
29
25#include "rxvt.h" 30#include "ptytty.h"
26 31
27#ifdef HAVE_STDLIB_H
28# include <cstdlib> 32#include <cstdlib>
29#endif 33#include <cstring>
30#ifdef HAVE_SYS_TYPES_H 34#include <csignal>
35
31# include <sys/types.h> 36#include <sys/types.h>
32#endif 37#include <sys/socket.h>
33#ifdef HAVE_UNISTD_H
34# include <unistd.h> 38#include <unistd.h>
35#endif
36#if defined(HAVE_STRING_H)
37# include <cstring>
38#endif
39#ifdef HAVE_FCNTL_H
40# include <fcntl.h> 39#include <fcntl.h>
41#endif 40
42#ifdef HAVE_SYS_IOCTL_H 41#ifdef HAVE_SYS_IOCTL_H
43# include <sys/ioctl.h> 42# include <sys/ioctl.h>
44#endif 43#endif
45#if defined(PTYS_ARE_PTMX) && defined(HAVE_SYS_STROPTS_H) 44#if defined(HAVE_DEV_PTMX) && defined(HAVE_SYS_STROPTS_H)
46# include <sys/stropts.h> /* for I_PUSH */ 45# include <sys/stropts.h> /* for I_PUSH */
47#endif 46#endif
48#ifdef HAVE_ISASTREAM 47#ifdef HAVE_ISASTREAM
49# include <stropts.h> 48# include <stropts.h>
50#endif 49#endif
51 50#if defined(HAVE_PTY_H)
52// better do this via configure, but.... 51# include <pty.h>
53#if defined(__FreeBSD__) 52#elif defined(HAVE_LIBUTIL_H)
54# include <libutil.h> 53# include <libutil.h>
55#elif defined(__DARWIN__) || (defined (__MACH__) && defined (__APPLE__)) 54#elif defined(HAVE_UTIL_H)
56# include <util.h> 55# include <util.h>
57#endif 56#endif
57#ifdef TTY_GID_SUPPORT
58#include <grp.h>
59#endif
58 60
59#include <cstdio> 61#include <cstdio>
60#include <grp.h> 62
63/////////////////////////////////////////////////////////////////////////////
61 64
62/* ------------------------------------------------------------------------- * 65/* ------------------------------------------------------------------------- *
63 * GET PSEUDO TELETYPE - MASTER AND SLAVE * 66 * GET PSEUDO TELETYPE - MASTER AND SLAVE *
64 * ------------------------------------------------------------------------- */ 67 * ------------------------------------------------------------------------- */
65/* 68/*
66 * Returns pty file descriptor, or -1 on failure 69 * Returns pty file descriptor, or -1 on failure
67 * If successful, ttydev is set to the name of the slave device. 70 * If successful, ttydev is set to the name of the slave device.
68 * fd_tty _may_ also be set to an open fd to the slave device 71 * fd_tty _may_ also be set to an open fd to the slave device
69 */ 72 */
73#if defined(UNIX98_PTY)
70static int 74static int
71get_pty (int *fd_tty, char **ttydev) 75get_pty (int *fd_tty, char **ttydev)
72{ 76{
73 int pfd; 77 int pfd;
74 78
75#ifdef PTYS_ARE_OPENPTY 79# if defined(HAVE_GETPT)
76 char tty_name[sizeof "/dev/pts/????\0"]; 80 pfd = getpt();
81# elif defined(HAVE_POSIX_OPENPT)
82 pfd = posix_openpt (O_RDWR);
83# else
84 pfd = open (CLONE_DEVICE, O_RDWR | O_NOCTTY, 0);
85# endif
86 if (pfd >= 0)
87 {
88 if (grantpt (pfd) == 0 /* change slave permissions */
89 && unlockpt (pfd) == 0)
90 { /* slave now unlocked */
91 *ttydev = strdup (ptsname (pfd)); /* get slave's name */
92 return pfd;
93 }
77 94
95 close (pfd);
96 }
97
98 return -1;
99}
100#elif defined(HAVE_OPENPTY)
101static int
102get_pty (int *fd_tty, char **ttydev)
103{
104 int pfd;
105 int res;
106 char tty_name[32];
107
78 if (openpty (&pfd, fd_tty, tty_name, NULL, NULL) != -1) 108 res = openpty (&pfd, fd_tty, tty_name, NULL, NULL);
109 if (res != -1)
79 { 110 {
80 *ttydev = strdup (tty_name); 111 *ttydev = strdup (tty_name);
81 return pfd; 112 return pfd;
82 } 113 }
83#endif
84 114
85#ifdef PTYS_ARE__GETPTY 115 return -1;
116}
117#elif defined(HAVE__GETPTY)
118static int
119get_pty (int *fd_tty, char **ttydev)
120{
121 int pfd;
122
86 *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0); 123 *ttydev = _getpty (&pfd, O_RDWR | O_NONBLOCK | O_NOCTTY, 0622, 0);
87 if (*ttydev != NULL) 124 if (*ttydev != NULL)
88 return pfd; 125 return pfd;
89#endif
90 126
91#ifdef PTYS_ARE_GETPTY 127 return -1;
128}
129#elif defined(HAVE_DEV_PTC)
130static int
131get_pty (int *fd_tty, char **ttydev)
132{
133 int pfd;
92 134
93 char *ptydev;
94
95 while ((ptydev = getpty ()) != NULL)
96 if ((pfd = open (ptydev, O_RDWR | O_NOCTTY, 0)) >= 0)
97 {
98 *ttydev = ptydev;
99 return pfd;
100 }
101#endif
102
103#if defined(HAVE_GRANTPT) && defined(HAVE_UNLOCKPT)
104# if defined(PTYS_ARE_GETPT) || defined(PTYS_ARE_PTMX)
105
106 {
107# ifdef PTYS_ARE_GETPT
108 pfd = getpt ();
109# else
110 pfd = open ("/dev/ptmx", O_RDWR | O_NOCTTY, 0);
111# endif
112
113 if (pfd >= 0)
114 {
115 if (grantpt (pfd) == 0 /* change slave permissions */
116 && unlockpt (pfd) == 0)
117 { /* slave now unlocked */
118 *ttydev = strdup (ptsname (pfd)); /* get slave's name */
119 return pfd;
120 }
121 close (pfd);
122 }
123 }
124# endif
125#endif
126
127#ifdef PTYS_ARE_PTC
128 if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0) 135 if ((pfd = open ("/dev/ptc", O_RDWR | O_NOCTTY, 0)) >= 0)
129 { 136 {
130 *ttydev = strdup (ttyname (pfd)); 137 *ttydev = strdup (ttyname (pfd));
131 return pfd; 138 return pfd;
132 } 139 }
133#endif
134 140
135#ifdef PTYS_ARE_CLONE 141 return -1;
142}
143#elif defined(HAVE_DEV_CLONE)
144static int
145get_pty (int *fd_tty, char **ttydev)
146{
147 int pfd;
148
136 if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0) 149 if ((pfd = open ("/dev/ptym/clone", O_RDWR | O_NOCTTY, 0)) >= 0)
137 { 150 {
138 *ttydev = strdup (ptsname (pfd)); 151 *ttydev = strdup (ptsname (pfd));
139 return pfd; 152 return pfd;
140 } 153 }
141#endif
142
143#ifdef PTYS_ARE_NUMERIC
144 {
145 int idx;
146 char *c1, *c2;
147 char pty_name[] = "/dev/ptyp???";
148 char tty_name[] = "/dev/ttyp???";
149
150 c1 = &(pty_name[sizeof (pty_name) - 4]);
151 c2 = &(tty_name[sizeof (tty_name) - 4]);
152 for (idx = 0; idx < 256; idx++)
153 {
154 sprintf (c1, "%d", idx);
155 sprintf (c2, "%d", idx);
156 if (access (tty_name, F_OK) < 0)
157 {
158 idx = 256;
159 break;
160 }
161
162 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) >= 0)
163 {
164 if (access (tty_name, R_OK | W_OK) == 0)
165 {
166 *ttydev = strdup (tty_name);
167 return pfd;
168 }
169
170 close (pfd);
171 }
172 }
173 }
174#endif
175
176#ifdef PTYS_ARE_SEARCHED
177 {
178 const char *c1, *c2;
179 char pty_name[] = "/dev/pty??";
180 char tty_name[] = "/dev/tty??";
181
182# ifndef PTYCHAR1
183# define PTYCHAR1 "pqrstuvwxyz"
184# endif
185# ifndef PTYCHAR2
186# define PTYCHAR2 "0123456789abcdef"
187# endif
188
189 for (c1 = PTYCHAR1; *c1; c1++)
190 {
191 pty_name[ (sizeof (pty_name) - 3)] =
192 tty_name[ (sizeof (pty_name) - 3)] = *c1;
193 for (c2 = PTYCHAR2; *c2; c2++)
194 {
195 pty_name[ (sizeof (pty_name) - 2)] =
196 tty_name[ (sizeof (pty_name) - 2)] = *c2;
197 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) >= 0)
198 {
199 if (access (tty_name, R_OK | W_OK) == 0)
200 {
201 *ttydev = strdup (tty_name);
202 return pfd;
203 }
204
205 close (pfd);
206 }
207 }
208 }
209 }
210#endif
211 154
212 return -1; 155 return -1;
213} 156}
157#else
158/* Based on the code in openssh/openbsd-compat/bsd-openpty.c */
159static int
160get_pty (int *fd_tty, char **ttydev)
161{
162 int pfd;
163 int i;
164 char pty_name[32];
165 char tty_name[32];
166 const char *majors = "pqrstuvwxyzabcde";
167 const char *minors = "0123456789abcdef";
168 for (i = 0; i < 256; i++)
169 {
170 snprintf(pty_name, 32, "/dev/pty%c%c", majors[i / 16], minors[i % 16]);
171 snprintf(tty_name, 32, "/dev/tty%c%c", majors[i / 16], minors[i % 16]);
172 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1)
173 {
174 snprintf(pty_name, 32, "/dev/ptyp%d", i);
175 snprintf(tty_name, 32, "/dev/ttyp%d", i);
176 if ((pfd = open (pty_name, O_RDWR | O_NOCTTY, 0)) == -1)
177 continue;
178 }
179 if (access (tty_name, R_OK | W_OK) == 0)
180 {
181 *ttydev = strdup (tty_name);
182 return pfd;
183 }
184
185 close (pfd);
186 }
187}
188#endif
214 189
215/*----------------------------------------------------------------------*/ 190/*----------------------------------------------------------------------*/
216/* 191/*
217 * Returns tty file descriptor, or -1 on failure 192 * Returns tty file descriptor, or -1 on failure
218 */ 193 */
225/*----------------------------------------------------------------------*/ 200/*----------------------------------------------------------------------*/
226/* 201/*
227 * Make our tty a controlling tty so that /dev/tty points to us 202 * Make our tty a controlling tty so that /dev/tty points to us
228 */ 203 */
229static int 204static int
230control_tty (int fd_tty, const char *ttydev) 205control_tty (int fd_tty)
231{ 206{
232#ifndef __QNX__
233 int fd;
234
235 /* ---------------------------------------- */
236# ifdef HAVE_SETSID
237 setsid (); 207 setsid ();
238# endif
239# if defined(HAVE_SETPGID)
240 setpgid (0, 0);
241# elif defined(HAVE_SETPGRP)
242 setpgrp (0, 0);
243# endif
244 208
245 /* ---------------------------------------- */
246# ifdef TIOCNOTTY
247 fd = open ("/dev/tty", O_RDWR | O_NOCTTY);
248 if (fd >= 0)
249 {
250 ioctl (fd, TIOCNOTTY, NULL); /* void tty associations */
251 close (fd);
252 }
253# endif
254
255 /* ---------------------------------------- */
256 fd = open ("/dev/tty", O_RDWR | O_NOCTTY);
257 if (fd >= 0)
258 close (fd); /* ouch: still have controlling tty */
259
260 /* ---------------------------------------- */
261#if defined(PTYS_ARE_PTMX) && defined(I_PUSH) 209#if defined(HAVE_DEV_PTMX) && defined(I_PUSH)
262 /* 210 /*
263 * Push STREAMS modules: 211 * Push STREAMS modules:
264 * ptem: pseudo-terminal hardware emulation module. 212 * ptem: pseudo-terminal hardware emulation module.
265 * ldterm: standard terminal line discipline. 213 * ldterm: standard terminal line discipline.
266 * ttcompat: V7, 4BSD and XENIX STREAMS compatibility module. 214 * ttcompat: V7, 4BSD and XENIX STREAMS compatibility module.
283 ioctl (fd_tty, I_PUSH, "ptem"); 231 ioctl (fd_tty, I_PUSH, "ptem");
284 ioctl (fd_tty, I_PUSH, "ldterm"); 232 ioctl (fd_tty, I_PUSH, "ldterm");
285 ioctl (fd_tty, I_PUSH, "ttcompat"); 233 ioctl (fd_tty, I_PUSH, "ttcompat");
286 } 234 }
287#endif 235#endif
288 /* ---------------------------------------- */ 236
289# if defined(TIOCSCTTY)
290 fd = ioctl (fd_tty, TIOCSCTTY, NULL); 237 ioctl (fd_tty, TIOCSCTTY, NULL);
291# elif defined(TIOCSETCTTY) 238
292 fd = ioctl (fd_tty, TIOCSETCTTY, NULL);
293# else
294 fd = open (ttydev, O_RDWR);
295 if (fd >= 0)
296 close (fd);
297# endif
298 /* ---------------------------------------- */
299 fd = open ("/dev/tty", O_WRONLY); 239 int fd = open ("/dev/tty", O_WRONLY);
300 if (fd < 0) 240 if (fd < 0)
301 return -1; /* fatal */ 241 return -1; /* fatal */
242
302 close (fd); 243 close (fd);
303 /* ---------------------------------------- */
304#endif /* ! __QNX__ */
305 244
306 return 0; 245 return 0;
307} 246}
308 247
309#ifndef NO_SETOWNER_TTYDEV 248void
249ptytty::close_tty ()
250{
251 if (tty < 0)
252 return;
253
254 close (tty);
255 tty = -1;
256}
257
258bool
259ptytty::make_controlling_tty ()
260{
261 return control_tty (tty) >= 0;
262}
263
264void
265ptytty::set_utf8_mode (bool on)
266{
267#ifdef IUTF8
268 if (pty < 0)
269 return;
270
271 struct termios tio;
272
273 if (tcgetattr (pty, &tio) != -1)
274 {
275 tcflag_t new_cflag = tio.c_iflag;
276
277 if (on)
278 new_cflag |= IUTF8;
279 else
280 new_cflag &= ~IUTF8;
281
282 if (new_cflag != tio.c_iflag)
283 {
284 tio.c_iflag = new_cflag;
285 tcsetattr (pty, TCSANOW, &tio);
286 }
287 }
288#endif
289}
290
310static struct ttyconf { 291static struct ttyconf {
311 gid_t gid; 292 gid_t gid;
312 mode_t mode; 293 mode_t mode;
313 294
314 ttyconf () 295 ttyconf ()
323 } 304 }
324 else 305 else
325#endif /* TTY_GID_SUPPORT */ 306#endif /* TTY_GID_SUPPORT */
326 { 307 {
327 mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH; 308 mode = S_IRUSR | S_IWUSR | S_IWGRP | S_IWOTH;
328 gid = getgid (); 309 gid = 0;
329 } 310 }
330 } 311 }
331} ttyconf; 312} ttyconf;
332 313
314ptytty_unix::ptytty_unix ()
315{
316 name = 0;
317#if UTMP_SUPPORT
318 cmd_pid = 0;
319#endif
320}
321
322ptytty_unix::~ptytty_unix ()
323{
324#if UTMP_SUPPORT
325 logout ();
326#endif
327 put ();
328}
329
333void 330void
334rxvt_ptytty::privileges (rxvt_privaction action) 331ptytty_unix::put ()
335{ 332{
336 rxvt_privileges (RESTORE); 333 chmod (name, RESTORE_TTY_MODE);
334 chown (name, 0, ttyconf.gid);
337 335
338 if (action == SAVE) 336 close_tty ();
339 {
340 //next_tty_action = RESTORE;
341# ifndef RESET_TTY_TO_COMMON_DEFAULTS
342 /* store original tty status for restoration rxvt_clean_exit () -- rgg 04/12/95 */
343 if (lstat (name, &savestat) < 0) /* you lose out */
344 ;//next_tty_action = IGNORE;
345 else
346# endif
347 337
348 { 338 if (pty >= 0)
349 chown (name, getuid (), ttyconf.gid); /* fail silently */ 339 close (pty);
350 chmod (name, ttyconf.mode);
351# ifdef HAVE_REVOKE
352 revoke (name);
353# endif
354 340
355 } 341 free (name);
356 }
357 else
358 { /* action == RESTORE */
359 //next_tty_action = IGNORE;
360# ifndef RESET_TTY_TO_COMMON_DEFAULTS
361 chmod (name, savestat.st_mode);
362 chown (name, savestat.st_uid, savestat.st_gid);
363# else
364 chmod (name, (S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH));
365 chown (name, 0, 0);
366# endif
367 342
368 }
369
370 rxvt_privileges (IGNORE);
371}
372#endif
373
374rxvt_ptytty::rxvt_ptytty ()
375{
376 pty = tty = -1; 343 pty = tty = -1;
377 name = 0; 344 name = 0;
378} 345}
379 346
380rxvt_ptytty::~rxvt_ptytty ()
381{
382 put ();
383}
384
385void
386
387rxvt_ptytty::close_tty ()
388{
389 if (tty >= 0) close (tty);
390 tty = -1;
391}
392
393void
394rxvt_ptytty::put ()
395{
396#ifndef NO_SETOWNER_TTYDEV
397 if (tty >= 0)
398 privileges (RESTORE);
399#endif
400
401 if (pty >= 0) close (pty);
402 close_tty ();
403 free (name);
404
405 pty = tty = -1;
406 name = 0;
407}
408
409bool 347bool
410rxvt_ptytty::make_controlling_tty () 348ptytty_unix::get ()
411{
412 return control_tty (tty, name) >= 0;
413}
414
415bool
416rxvt_ptytty::get ()
417{ 349{
418 /* get master (pty) */ 350 /* get master (pty) */
419 if ((pty = get_pty (&tty, &name)) < 0) 351 if ((pty = get_pty (&tty, &name)) < 0)
420 return false; 352 return false;
421 353
423 355
424 /* get slave (tty) */ 356 /* get slave (tty) */
425 if (tty < 0) 357 if (tty < 0)
426 { 358 {
427#ifndef NO_SETOWNER_TTYDEV 359#ifndef NO_SETOWNER_TTYDEV
428 privileges (SAVE); 360 chown (name, getuid (), ttyconf.gid); /* fail silently */
361 chmod (name, ttyconf.mode);
362# ifdef HAVE_REVOKE
363 revoke (name);
364# endif
429#endif 365#endif
430 366
431 if ((tty = get_tty (name)) < 0) 367 if ((tty = get_tty (name)) < 0)
432 { 368 {
433 put (); 369 put ();
436 } 372 }
437 373
438 return true; 374 return true;
439} 375}
440 376
441/*----------------------- end-of-file (C source) -----------------------*/ 377/////////////////////////////////////////////////////////////////////////////
378// helper/proxy support
442 379
380#if PTYTTY_HELPER
381
382static int sock_fd = -1, lock_fd = -1;
383static int helper_pid, owner_pid;
384
385struct command
386{
387 enum { get, login, destroy } type;
388
389 ptytty *id;
390
391 bool login_shell;
392 int cmd_pid;
393 char hostname[512]; // arbitrary, but should be plenty
394};
395
396struct ptytty_proxy : ptytty
397{
398 ptytty *id;
399
400 ptytty_proxy ()
401 : id(0)
402 {
403 }
404
405 ~ptytty_proxy ();
406
407 bool get ();
408 void login (int cmd_pid, bool login_shell, const char *hostname);
409};
410
411#if PTYTTY_REENTRANT
412# define NEED_TOKEN do { char ch; read (lock_fd, &ch, 1); } while (0)
413# define GIVE_TOKEN do { char ch; write (lock_fd, &ch, 1); } while (0)
414#else
415# define NEED_TOKEN (void)0
416# define GIVE_TOKEN (void)0
417#endif
418
419bool
420ptytty_proxy::get ()
421{
422 NEED_TOKEN;
423
424 command cmd;
425
426 cmd.type = command::get;
427
428 write (sock_fd, &cmd, sizeof (cmd));
429
430 if (read (sock_fd, &id, sizeof (id)) != sizeof (id))
431 ptytty_fatal ("protocol error while creating pty using helper process, aborting.\n");
432
433 if (!id)
434 {
435 GIVE_TOKEN;
436 return false;
437 }
438
439 if ((pty = recv_fd (sock_fd)) < 0
440 || (tty = recv_fd (sock_fd)) < 0)
441 ptytty_fatal ("protocol error while reading pty/tty fds from helper process, aborting.\n");
442
443 GIVE_TOKEN;
444 return true;
445}
446
447void
448ptytty_proxy::login (int cmd_pid, bool login_shell, const char *hostname)
449{
450 NEED_TOKEN;
451
452 command cmd;
453
454 cmd.type = command::login;
455 cmd.id = id;
456 cmd.cmd_pid = cmd_pid;
457 cmd.login_shell = login_shell;
458 strncpy (cmd.hostname, hostname, sizeof (cmd.hostname));
459
460 write (sock_fd, &cmd, sizeof (cmd));
461
462 GIVE_TOKEN;
463}
464
465ptytty_proxy::~ptytty_proxy ()
466{
467 if (id)
468 {
469 NEED_TOKEN;
470
471 command cmd;
472
473 cmd.type = command::destroy;
474 cmd.id = id;
475
476 write (sock_fd, &cmd, sizeof (cmd));
477
478 GIVE_TOKEN;
479 }
480}
481
482static
483void serve ()
484{
485 command cmd;
486 vector<ptytty *> ptys;
487
488 for (;;)
489 {
490 GIVE_TOKEN;
491
492 if (read (sock_fd, &cmd, sizeof (command)) != sizeof (command))
493 break;
494
495 if (cmd.type == command::get)
496 {
497 // -> id ptyfd ttyfd
498 cmd.id = new ptytty_unix;
499
500 if (cmd.id->get ())
501 {
502 write (sock_fd, &cmd.id, sizeof (cmd.id));
503 ptys.push_back (cmd.id);
504
505 ptytty::send_fd (sock_fd, cmd.id->pty);
506 ptytty::send_fd (sock_fd, cmd.id->tty);
507 }
508 else
509 {
510 delete cmd.id;
511 cmd.id = 0;
512 write (sock_fd, &cmd.id, sizeof (cmd.id));
513 }
514 }
515 else if (cmd.type == command::login)
516 {
517#if UTMP_SUPPORT
518 if (find (ptys.begin (), ptys.end (), cmd.id) != ptys.end ())
519 {
520 cmd.hostname[sizeof (cmd.hostname) - 1] = 0;
521 cmd.id->login (cmd.cmd_pid, cmd.login_shell, cmd.hostname);
522 }
523#endif
524 }
525 else if (cmd.type == command::destroy)
526 {
527 vector<ptytty *>::iterator pty = find (ptys.begin (), ptys.end (), cmd.id);
528
529 if (pty != ptys.end ())
530 {
531 delete *pty;
532 ptys.erase (pty);
533 }
534 }
535 else
536 break;
537
538 NEED_TOKEN;
539 }
540
541 // destroy all ptys
542 for (vector<ptytty *>::iterator i = ptys.end (); i-- > ptys.begin (); )
543 delete *i;
544}
545
546void
547ptytty::use_helper ()
548{
549#ifndef PTYTTY_NO_PID_CHECK
550 int pid = getpid ();
551#endif
552
553 if (sock_fd >= 0
554#ifndef PTYTTY_NO_PID_CHECK
555 && pid == owner_pid
556#endif
557 )
558 return;
559
560#ifndef PTYTTY_NO_PID_CHECK
561 owner_pid = pid;
562#endif
563
564 int sv[2];
565
566 if (socketpair (AF_UNIX, SOCK_STREAM, 0, sv))
567 ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n");
568
569#ifdef PTYTTY_REENTRANT
570 int lv[2];
571
572 if (socketpair (AF_UNIX, SOCK_STREAM, 0, lv))
573 ptytty_fatal ("could not create socket to communicate with pty/sessiondb helper, aborting.\n");
574#endif
575
576 helper_pid = fork ();
577
578 if (helper_pid < 0)
579 ptytty_fatal ("could not create pty/sessiondb helper process, aborting.\n");
580
581 if (helper_pid)
582 {
583 // client, process
584 sock_fd = sv[0];
585 close (sv[1]);
586 fcntl (sock_fd, F_SETFD, FD_CLOEXEC);
587#ifdef PTYTTY_REENTRANT
588 lock_fd = lv[0];
589 close (lv[1]);
590 fcntl (lock_fd, F_SETFD, FD_CLOEXEC);
591#endif
592 }
593 else
594 {
595 // server, pty-helper
596 sock_fd = sv[1];
597#ifdef PTYTTY_REENTRANT
598 lock_fd = lv[1];
599#endif
600
601 chdir ("/");
602
603 signal (SIGHUP, SIG_IGN);
604 signal (SIGTERM, SIG_IGN);
605 signal (SIGINT, SIG_IGN);
606 signal (SIGPIPE, SIG_IGN);
607
608 for (int fd = 0; fd < 1023; fd++)
609 if (fd != sock_fd && fd != lock_fd)
610 close (fd);
611
612 serve ();
613 _exit (EXIT_SUCCESS);
614 }
615}
616
617#endif
618
619ptytty *
620ptytty::create ()
621{
622#if PTYTTY_HELPER
623 if (helper_pid
624# ifndef PTYTTY_NO_PID_CHECK
625 && getpid () == owner_pid
626# endif
627 )
628 // use helper process
629 return new ptytty_proxy;
630 else
631#endif
632 return new ptytty_unix;
633}
634
635void
636ptytty::init ()
637{
638 uid_t uid = getuid ();
639 gid_t gid = getgid ();
640
641 // before doing anything else, check for setuid/setgid operation,
642 // start the helper process and drop privileges
643 if (uid != geteuid ()
644 || gid != getegid ())
645 {
646#if PTYTTY_HELPER
647 use_helper ();
648#else
649 ptytty_warn ("running setuid/setgid without pty helper compiled in, continuing unprivileged.\n");
650#endif
651
652 drop_privileges ();
653 }
654}
655
656void
657ptytty::drop_privileges ()
658{
659 uid_t uid = getuid ();
660 gid_t gid = getgid ();
661
662 // drop privileges
663#if HAVE_SETRESUID
664 setresgid (gid, gid, gid);
665 setresuid (uid, uid, uid);
666#elif HAVE_SETREUID
667 setregid (gid, gid);
668 setreuid (uid, uid);
669#elif HAVE_SETUID
670 setgid (gid);
671 setuid (uid);
672#endif
673
674 if (uid != geteuid ()
675 || gid != getegid ())
676 ptytty_fatal ("unable to drop privileges, aborting.\n");
677}
678
679/////////////////////////////////////////////////////////////////////////////
680// C API
681
682#ifndef PTYTTY_NO_C_API
683
684#define DEFINE_METHOD(retval, name, args1, args2) \
685extern "C" retval ptytty_ ## name args1 \
686{ return ((struct ptytty *)ptytty)->name args2; }
687
688DEFINE_METHOD(int,pty,(void *ptytty),)
689DEFINE_METHOD(int,tty,(void *ptytty),)
690DEFINE_METHOD(int,get,(void *ptytty),())
691DEFINE_METHOD(void,login,(void *ptytty, int cmd_pid, bool login_shell, const char *hostname),(cmd_pid,login_shell,hostname))
692
693DEFINE_METHOD(void,close_tty,(void *ptytty),())
694DEFINE_METHOD(int,make_controlling_tty,(void *ptytty),())
695DEFINE_METHOD(void,set_utf8_mode,(void *ptytty, int on),(on))
696
697#define DEFINE_STATIC(retval, name, args) \
698extern "C" retval ptytty_ ## name args \
699{ return ptytty::name args; }
700
701DEFINE_STATIC(void,drop_privileges,())
702DEFINE_STATIC(void,use_helper,())
703DEFINE_STATIC(void,init,())
704
705DEFINE_STATIC(void *,create,())
706
707void ptytty_delete (void *ptytty)
708{
709 delete (struct ptytty *)ptytty;
710}
711
712// send_fd, recv_fd not exposed
713
714#endif

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines