Fix a couple of signedness compiler warnings, presumably due to me
[u/mdw/putty] / unix / uxpty.c
CommitLineData
28d00fe4 1/*
2 * Pseudo-tty backend for pterm.
28d00fe4 3 */
4
74aca06d 5#define _GNU_SOURCE
054d8535 6
1709795f 7#include <stdio.h>
8#include <stdlib.h>
054d8535 9#include <string.h>
10#include <unistd.h>
a0e16eb1 11#include <signal.h>
2916fa14 12#include <assert.h>
054d8535 13#include <fcntl.h>
88e6b9ca 14#include <termios.h>
be4f86de 15#include <grp.h>
755a6d84 16#include <utmp.h>
17#include <pwd.h>
18#include <time.h>
a0e16eb1 19#include <sys/types.h>
d4e1d591 20#include <sys/stat.h>
a0e16eb1 21#include <sys/wait.h>
88e6b9ca 22#include <sys/ioctl.h>
0f33f9d1 23#include <errno.h>
1709795f 24
25#include "putty.h"
d6fa1947 26#include "tree234.h"
1709795f 27
0b1df797 28#ifndef OMIT_UTMP
bea25c48 29#include <utmpx.h>
30#endif
31
1709795f 32#ifndef FALSE
33#define FALSE 0
34#endif
35#ifndef TRUE
36#define TRUE 1
37#endif
38
bea25c48 39/* updwtmpx() needs the name of the wtmp file. Try to find it. */
40#ifndef WTMPX_FILE
41#ifdef _PATH_WTMPX
42#define WTMPX_FILE _PATH_WTMPX
43#else
44#define WTMPX_FILE "/var/log/wtmpx"
755a6d84 45#endif
755a6d84 46#endif
bea25c48 47
755a6d84 48#ifndef LASTLOG_FILE
49#ifdef _PATH_LASTLOG
50#define LASTLOG_FILE _PATH_LASTLOG
51#else
52#define LASTLOG_FILE "/var/log/lastlog"
53#endif
54#endif
55
f51dc031 56/*
57 * Set up a default for vaguely sane systems. The idea is that if
58 * OMIT_UTMP is not defined, then at least one of the symbols which
59 * enable particular forms of utmp processing should be, if only so
60 * that a link error can warn you that you should have defined
61 * OMIT_UTMP if you didn't want any. Currently HAVE_PUTUTLINE is
62 * the only such symbol.
63 */
64#ifndef OMIT_UTMP
65#if !defined HAVE_PUTUTLINE
66#define HAVE_PUTUTLINE
67#endif
68#endif
69
d6fa1947 70typedef struct pty_tag *Pty;
71
72/*
73 * The pty_signal_pipe, along with the SIGCHLD handler, must be
74 * process-global rather than session-specific.
75 */
76static int pty_signal_pipe[2] = { -1, -1 }; /* obviously bogus initial val */
77
78struct pty_tag {
79 Config cfg;
80 int master_fd, slave_fd;
81 void *frontend;
82 char name[FILENAME_MAX];
83 int child_pid;
84 int term_width, term_height;
85 int child_dead, finished;
86 int exit_code;
2916fa14 87 bufchain output_data;
d6fa1947 88};
89
90/*
91 * We store our pty backends in a tree sorted by master fd, so that
92 * when we get an uxsel notification we know which backend instance
93 * is the owner of the pty that caused it.
94 */
95static int pty_compare_by_fd(void *av, void *bv)
96{
97 Pty a = (Pty)av;
98 Pty b = (Pty)bv;
99
100 if (a->master_fd < b->master_fd)
101 return -1;
102 else if (a->master_fd > b->master_fd)
103 return +1;
104 return 0;
105}
106
107static int pty_find_by_fd(void *av, void *bv)
108{
109 int a = *(int *)av;
110 Pty b = (Pty)bv;
111
112 if (a < b->master_fd)
113 return -1;
114 else if (a > b->master_fd)
115 return +1;
116 return 0;
117}
054d8535 118
d6fa1947 119static tree234 *ptys_by_fd = NULL;
120
121/*
122 * We also have a tree sorted by child pid, so that when we wait()
123 * in response to the signal we know which backend instance is the
124 * owner of the process that caused the signal.
125 */
126static int pty_compare_by_pid(void *av, void *bv)
127{
128 Pty a = (Pty)av;
129 Pty b = (Pty)bv;
130
131 if (a->child_pid < b->child_pid)
132 return -1;
133 else if (a->child_pid > b->child_pid)
134 return +1;
135 return 0;
136}
137
138static int pty_find_by_pid(void *av, void *bv)
139{
140 int a = *(int *)av;
141 Pty b = (Pty)bv;
142
143 if (a < b->child_pid)
144 return -1;
145 else if (a > b->child_pid)
146 return +1;
147 return 0;
148}
149
150static tree234 *ptys_by_pid = NULL;
151
152/*
153 * If we are using pty_pre_init(), it will need to have already
154 * allocated a pty structure, which we must then return from
155 * pty_init() rather than allocating a new one. Here we store that
156 * structure between allocation and use.
157 *
158 * Note that although most of this module is entirely capable of
159 * handling multiple ptys in a single process, pty_pre_init() is
160 * fundamentally _dependent_ on there being at most one pty per
161 * process, so the normal static-data constraints don't apply.
162 *
163 * Likewise, since utmp is only used via pty_pre_init, it too must
164 * be single-instance, so we can declare utmp-related variables
165 * here.
166 */
167static Pty single_pty = NULL;
74aca06d 168
d4e1d591 169#ifndef OMIT_UTMP
170static int pty_utmp_helper_pid, pty_utmp_helper_pipe;
d6fa1947 171static int pty_stamped_utmp;
bea25c48 172static struct utmpx utmp_entry;
d6fa1947 173#endif
174
175/*
176 * pty_argv is a grievous hack to allow a proper argv to be passed
177 * through from the Unix command line. Again, it doesn't really
178 * make sense outside a one-pty-per-process setup.
179 */
180char **pty_argv;
d6fa1947 181
182static void pty_close(Pty pty);
2916fa14 183static void pty_try_write(Pty pty);
d4e1d591 184
d6fa1947 185#ifndef OMIT_UTMP
95c47834 186static void setup_utmp(char *ttyname, char *location)
755a6d84 187{
755a6d84 188#ifdef HAVE_LASTLOG
189 struct lastlog lastlog_entry;
190 FILE *lastlog;
191#endif
192 struct passwd *pw;
bea25c48 193 struct timeval tv;
755a6d84 194
195 pw = getpwuid(getuid());
196 memset(&utmp_entry, 0, sizeof(utmp_entry));
197 utmp_entry.ut_type = USER_PROCESS;
198 utmp_entry.ut_pid = getpid();
199 strncpy(utmp_entry.ut_line, ttyname+5, lenof(utmp_entry.ut_line));
200 strncpy(utmp_entry.ut_id, ttyname+8, lenof(utmp_entry.ut_id));
201 strncpy(utmp_entry.ut_user, pw->pw_name, lenof(utmp_entry.ut_user));
202 strncpy(utmp_entry.ut_host, location, lenof(utmp_entry.ut_host));
bea25c48 203 /*
204 * Apparently there are some architectures where (struct
205 * utmpx).ut_tv is not essentially struct timeval (e.g. Linux
206 * amd64). Hence the temporary.
207 */
208 gettimeofday(&tv, NULL);
209 utmp_entry.ut_tv.tv_sec = tv.tv_sec;
210 utmp_entry.ut_tv.tv_usec = tv.tv_usec;
755a6d84 211
bea25c48 212 setutxent();
213 pututxline(&utmp_entry);
214 endutxent();
215
216 updwtmpx(WTMPX_FILE, &utmp_entry);
755a6d84 217
218#ifdef HAVE_LASTLOG
219 memset(&lastlog_entry, 0, sizeof(lastlog_entry));
220 strncpy(lastlog_entry.ll_line, ttyname+5, lenof(lastlog_entry.ll_line));
221 strncpy(lastlog_entry.ll_host, location, lenof(lastlog_entry.ll_host));
222 time(&lastlog_entry.ll_time);
223 if ((lastlog = fopen(LASTLOG_FILE, "r+")) != NULL) {
224 fseek(lastlog, sizeof(lastlog_entry) * getuid(), SEEK_SET);
225 fwrite(&lastlog_entry, 1, sizeof(lastlog_entry), lastlog);
226 fclose(lastlog);
227 }
228#endif
229
f51dc031 230 pty_stamped_utmp = 1;
231
755a6d84 232}
233
234static void cleanup_utmp(void)
235{
bea25c48 236 struct timeval tv;
755a6d84 237
95c47834 238 if (!pty_stamped_utmp)
f51dc031 239 return;
240
755a6d84 241 utmp_entry.ut_type = DEAD_PROCESS;
242 memset(utmp_entry.ut_user, 0, lenof(utmp_entry.ut_user));
bea25c48 243 gettimeofday(&tv, NULL);
244 utmp_entry.ut_tv.tv_sec = tv.tv_sec;
245 utmp_entry.ut_tv.tv_usec = tv.tv_usec;
755a6d84 246
bea25c48 247 updwtmpx(WTMPX_FILE, &utmp_entry);
755a6d84 248
249 memset(utmp_entry.ut_line, 0, lenof(utmp_entry.ut_line));
bea25c48 250 utmp_entry.ut_tv.tv_sec = 0;
251 utmp_entry.ut_tv.tv_usec = 0;
755a6d84 252
bea25c48 253 setutxent();
254 pututxline(&utmp_entry);
255 endutxent();
755a6d84 256
f51dc031 257 pty_stamped_utmp = 0; /* ensure we never double-cleanup */
755a6d84 258}
d4e1d591 259#endif
755a6d84 260
a0e16eb1 261static void sigchld_handler(int signum)
262{
74aca06d 263 write(pty_signal_pipe[1], "x", 1);
a0e16eb1 264}
265
d4e1d591 266#ifndef OMIT_UTMP
755a6d84 267static void fatal_sig_handler(int signum)
268{
0f33f9d1 269 putty_signal(signum, SIG_DFL);
755a6d84 270 cleanup_utmp();
271 setuid(getuid());
272 raise(signum);
273}
d4e1d591 274#endif
755a6d84 275
d6fa1947 276static int pty_open_slave(Pty pty)
270d2e8d 277{
89e97516 278 if (pty->slave_fd < 0) {
d6fa1947 279 pty->slave_fd = open(pty->name, O_RDWR);
db9b7dce 280 cloexec(pty->slave_fd);
89e97516 281 }
270d2e8d 282
d6fa1947 283 return pty->slave_fd;
270d2e8d 284}
285
d6fa1947 286static void pty_open_master(Pty pty)
1709795f 287{
be4f86de 288#ifdef BSD_PTYS
95c47834 289 const char chars1[] = "pqrstuvwxyz";
290 const char chars2[] = "0123456789abcdef";
291 const char *p1, *p2;
292 char master_name[20];
293 struct group *gp;
294
295 for (p1 = chars1; *p1; p1++)
296 for (p2 = chars2; *p2; p2++) {
297 sprintf(master_name, "/dev/pty%c%c", *p1, *p2);
d6fa1947 298 pty->master_fd = open(master_name, O_RDWR);
299 if (pty->master_fd >= 0) {
95c47834 300 if (geteuid() == 0 ||
270d2e8d 301 access(master_name, R_OK | W_OK) == 0) {
302 /*
303 * We must also check at this point that we are
304 * able to open the slave side of the pty. We
305 * wouldn't want to allocate the wrong master,
306 * get all the way down to forking, and _then_
307 * find we're unable to open the slave.
308 */
d6fa1947 309 strcpy(pty->name, master_name);
310 pty->name[5] = 't'; /* /dev/ptyXX -> /dev/ttyXX */
270d2e8d 311
db9b7dce 312 cloexec(pty->master_fd);
89e97516 313
d6fa1947 314 if (pty_open_slave(pty) >= 0 &&
315 access(pty->name, R_OK | W_OK) == 0)
270d2e8d 316 goto got_one;
d6fa1947 317 if (pty->slave_fd > 0)
318 close(pty->slave_fd);
319 pty->slave_fd = -1;
270d2e8d 320 }
d6fa1947 321 close(pty->master_fd);
be4f86de 322 }
95c47834 323 }
be4f86de 324
95c47834 325 /* If we get here, we couldn't get a tty at all. */
326 fprintf(stderr, "pterm: unable to open a pseudo-terminal device\n");
327 exit(1);
be4f86de 328
95c47834 329 got_one:
95c47834 330
331 /* We need to chown/chmod the /dev/ttyXX device. */
332 gp = getgrnam("tty");
d6fa1947 333 chown(pty->name, getuid(), gp ? gp->gr_gid : -1);
334 chmod(pty->name, 0600);
be4f86de 335#else
d6fa1947 336 pty->master_fd = open("/dev/ptmx", O_RDWR);
054d8535 337
d6fa1947 338 if (pty->master_fd < 0) {
054d8535 339 perror("/dev/ptmx: open");
340 exit(1);
341 }
342
d6fa1947 343 if (grantpt(pty->master_fd) < 0) {
054d8535 344 perror("grantpt");
345 exit(1);
346 }
347
d6fa1947 348 if (unlockpt(pty->master_fd) < 0) {
054d8535 349 perror("unlockpt");
350 exit(1);
351 }
352
db9b7dce 353 cloexec(pty->master_fd);
89e97516 354
d6fa1947 355 pty->name[FILENAME_MAX-1] = '\0';
356 strncpy(pty->name, ptsname(pty->master_fd), FILENAME_MAX-1);
be4f86de 357#endif
d6fa1947 358
2916fa14 359 {
360 /*
361 * Set the pty master into non-blocking mode.
362 */
363 int i = 1;
364 ioctl(pty->master_fd, FIONBIO, &i);
365 }
366
d6fa1947 367 if (!ptys_by_fd)
368 ptys_by_fd = newtree234(pty_compare_by_fd);
369 add234(ptys_by_fd, pty);
95c47834 370}
054d8535 371
95c47834 372/*
373 * Pre-initialisation. This is here to get around the fact that GTK
374 * doesn't like being run in setuid/setgid programs (probably
375 * sensibly). So before we initialise GTK - and therefore before we
376 * even process the command line - we check to see if we're running
377 * set[ug]id. If so, we open our pty master _now_, chown it as
378 * necessary, and drop privileges. We can always close it again
379 * later. If we're potentially going to be doing utmp as well, we
380 * also fork off a utmp helper process and communicate with it by
381 * means of a pipe; the utmp helper will keep privileges in order
382 * to clean up utmp when we exit (i.e. when its end of our pipe
383 * closes).
384 */
385void pty_pre_init(void)
386{
d6fa1947 387 Pty pty;
388
d4e1d591 389#ifndef OMIT_UTMP
95c47834 390 pid_t pid;
391 int pipefd[2];
d4e1d591 392#endif
95c47834 393
d6fa1947 394 pty = single_pty = snew(struct pty_tag);
2916fa14 395 bufchain_init(&pty->output_data);
d6fa1947 396
0f33f9d1 397 /* set the child signal handler straight away; it needs to be set
398 * before we ever fork. */
399 putty_signal(SIGCHLD, sigchld_handler);
d6fa1947 400 pty->master_fd = pty->slave_fd = -1;
401#ifndef OMIT_UTMP
402 pty_stamped_utmp = FALSE;
403#endif
95c47834 404
405 if (geteuid() != getuid() || getegid() != getgid()) {
d6fa1947 406 pty_open_master(pty);
39baeaa4 407 }
408
95c47834 409#ifndef OMIT_UTMP
39baeaa4 410 /*
95c47834 411 * Fork off the utmp helper.
755a6d84 412 */
95c47834 413 if (pipe(pipefd) < 0) {
414 perror("pterm: pipe");
415 exit(1);
416 }
90f2ed42 417 cloexec(pipefd[0]);
418 cloexec(pipefd[1]);
95c47834 419 pid = fork();
420 if (pid < 0) {
421 perror("pterm: fork");
422 exit(1);
423 } else if (pid == 0) {
424 char display[128], buffer[128];
425 int dlen, ret;
426
427 close(pipefd[1]);
428 /*
429 * Now sit here until we receive a display name from the
430 * other end of the pipe, and then stamp utmp. Unstamp utmp
431 * again, and exit, when the pipe closes.
432 */
433
434 dlen = 0;
435 while (1) {
436
437 ret = read(pipefd[0], buffer, lenof(buffer));
438 if (ret <= 0) {
439 cleanup_utmp();
0f33f9d1 440 _exit(0);
95c47834 441 } else if (!pty_stamped_utmp) {
442 if (dlen < lenof(display))
443 memcpy(display+dlen, buffer,
444 min(ret, lenof(display)-dlen));
445 if (buffer[ret-1] == '\0') {
446 /*
447 * Now we have a display name. NUL-terminate
448 * it, and stamp utmp.
449 */
450 display[lenof(display)-1] = '\0';
451 /*
452 * Trap as many fatal signals as we can in the
453 * hope of having the best possible chance to
454 * clean up utmp before termination. We are
455 * unfortunately unprotected against SIGKILL,
456 * but that's life.
457 */
0f33f9d1 458 putty_signal(SIGHUP, fatal_sig_handler);
459 putty_signal(SIGINT, fatal_sig_handler);
460 putty_signal(SIGQUIT, fatal_sig_handler);
461 putty_signal(SIGILL, fatal_sig_handler);
462 putty_signal(SIGABRT, fatal_sig_handler);
463 putty_signal(SIGFPE, fatal_sig_handler);
464 putty_signal(SIGPIPE, fatal_sig_handler);
465 putty_signal(SIGALRM, fatal_sig_handler);
466 putty_signal(SIGTERM, fatal_sig_handler);
467 putty_signal(SIGSEGV, fatal_sig_handler);
468 putty_signal(SIGUSR1, fatal_sig_handler);
469 putty_signal(SIGUSR2, fatal_sig_handler);
755a6d84 470#ifdef SIGBUS
0f33f9d1 471 putty_signal(SIGBUS, fatal_sig_handler);
755a6d84 472#endif
473#ifdef SIGPOLL
0f33f9d1 474 putty_signal(SIGPOLL, fatal_sig_handler);
755a6d84 475#endif
476#ifdef SIGPROF
0f33f9d1 477 putty_signal(SIGPROF, fatal_sig_handler);
755a6d84 478#endif
479#ifdef SIGSYS
0f33f9d1 480 putty_signal(SIGSYS, fatal_sig_handler);
755a6d84 481#endif
482#ifdef SIGTRAP
0f33f9d1 483 putty_signal(SIGTRAP, fatal_sig_handler);
755a6d84 484#endif
485#ifdef SIGVTALRM
0f33f9d1 486 putty_signal(SIGVTALRM, fatal_sig_handler);
755a6d84 487#endif
488#ifdef SIGXCPU
0f33f9d1 489 putty_signal(SIGXCPU, fatal_sig_handler);
755a6d84 490#endif
491#ifdef SIGXFSZ
0f33f9d1 492 putty_signal(SIGXFSZ, fatal_sig_handler);
755a6d84 493#endif
494#ifdef SIGIO
0f33f9d1 495 putty_signal(SIGIO, fatal_sig_handler);
95c47834 496#endif
d6fa1947 497 setup_utmp(pty->name, display);
95c47834 498 }
499 }
500 }
501 } else {
502 close(pipefd[0]);
503 pty_utmp_helper_pid = pid;
504 pty_utmp_helper_pipe = pipefd[1];
505 }
755a6d84 506#endif
95c47834 507
508 /* Drop privs. */
509 {
95c47834 510#ifndef HAVE_NO_SETRESUID
d4e1d591 511 int gid = getgid(), uid = getuid();
95c47834 512 int setresgid(gid_t, gid_t, gid_t);
513 int setresuid(uid_t, uid_t, uid_t);
514 setresgid(gid, gid, gid);
515 setresuid(uid, uid, uid);
516#else
517 setgid(getgid());
518 setuid(getuid());
519#endif
520 }
521}
522
d6fa1947 523int pty_real_select_result(Pty pty, int event, int status)
74aca06d 524{
525 char buf[4096];
526 int ret;
527 int finished = FALSE;
528
d6fa1947 529 if (event < 0) {
74aca06d 530 /*
d6fa1947 531 * We've been called because our child process did
532 * something. `status' tells us what.
74aca06d 533 */
d6fa1947 534 if ((WIFEXITED(status) || WIFSIGNALED(status))) {
74aca06d 535 /*
d6fa1947 536 * The primary child process died. We could keep
537 * the terminal open for remaining subprocesses to
538 * output to, but conventional wisdom seems to feel
539 * that that's the Wrong Thing for an xterm-alike,
540 * so we bail out now (though we don't necessarily
541 * _close_ the window, depending on the state of
542 * Close On Exit). This would be easy enough to
543 * change or make configurable if necessary.
74aca06d 544 */
d6fa1947 545 pty->exit_code = status;
546 pty->child_dead = TRUE;
547 del234(ptys_by_pid, pty);
74aca06d 548 finished = TRUE;
74aca06d 549 }
d6fa1947 550 } else {
551 if (event == 1) {
74aca06d 552
d6fa1947 553 ret = read(pty->master_fd, buf, sizeof(buf));
74aca06d 554
d6fa1947 555 /*
556 * Clean termination condition is that either ret == 0, or ret
557 * < 0 and errno == EIO. Not sure why the latter, but it seems
558 * to happen. Boo.
559 */
560 if (ret == 0 || (ret < 0 && errno == EIO)) {
74aca06d 561 /*
d6fa1947 562 * We assume a clean exit if the pty has closed but the
563 * actual child process hasn't. The only way I can
564 * imagine this happening is if it detaches itself from
565 * the pty and goes daemonic - in which case the
566 * expected usage model would precisely _not_ be for
567 * the pterm window to hang around!
74aca06d 568 */
74aca06d 569 finished = TRUE;
d6fa1947 570 if (!pty->child_dead)
571 pty->exit_code = 0;
572 } else if (ret < 0) {
573 perror("read pty master");
574 exit(1);
575 } else if (ret > 0) {
576 from_backend(pty->frontend, 0, buf, ret);
74aca06d 577 }
2916fa14 578 } else if (event == 2) {
579 /*
580 * Attempt to send data down the pty.
581 */
582 pty_try_write(pty);
583 }
74aca06d 584 }
585
d6fa1947 586 if (finished && !pty->finished) {
587 uxsel_del(pty->master_fd);
588 pty_close(pty);
589 pty->master_fd = -1;
74aca06d 590
d6fa1947 591 pty->finished = TRUE;
74aca06d 592
593 /*
594 * This is a slight layering-violation sort of hack: only
595 * if we're not closing on exit (COE is set to Never, or to
596 * Only On Clean and it wasn't a clean exit) do we output a
597 * `terminated' message.
598 */
d6fa1947 599 if (pty->cfg.close_on_exit == FORCE_OFF ||
600 (pty->cfg.close_on_exit == AUTO && pty->exit_code != 0)) {
74aca06d 601 char message[512];
d6fa1947 602 if (WIFEXITED(pty->exit_code))
74aca06d 603 sprintf(message, "\r\n[pterm: process terminated with exit"
d6fa1947 604 " code %d]\r\n", WEXITSTATUS(pty->exit_code));
605 else if (WIFSIGNALED(pty->exit_code))
74aca06d 606#ifdef HAVE_NO_STRSIGNAL
607 sprintf(message, "\r\n[pterm: process terminated on signal"
d6fa1947 608 " %d]\r\n", WTERMSIG(pty->exit_code));
74aca06d 609#else
610 sprintf(message, "\r\n[pterm: process terminated on signal"
d6fa1947 611 " %d (%.400s)]\r\n", WTERMSIG(pty->exit_code),
612 strsignal(WTERMSIG(pty->exit_code)));
74aca06d 613#endif
d6fa1947 614 from_backend(pty->frontend, 0, message, strlen(message));
74aca06d 615 }
39934deb 616
d6fa1947 617 notify_remote_exit(pty->frontend);
74aca06d 618 }
d6fa1947 619
74aca06d 620 return !finished;
621}
622
d6fa1947 623int pty_select_result(int fd, int event)
74aca06d 624{
d6fa1947 625 int ret = TRUE;
626 Pty pty;
627
628 if (fd == pty_signal_pipe[0]) {
629 pid_t pid;
630 int ipid;
631 int status;
632 char c[1];
633
634 read(pty_signal_pipe[0], c, 1); /* ignore its value; it'll be `x' */
635
636 do {
637 pid = waitpid(-1, &status, WNOHANG);
638
639 ipid = pid;
640 pty = find234(ptys_by_pid, &pid, pty_find_by_pid);
641
642 if (pty)
643 ret = ret && pty_real_select_result(pty, -1, status);
644 } while (pid > 0);
645 } else {
646 pty = find234(ptys_by_fd, &fd, pty_find_by_fd);
647
648 if (pty)
649 ret = ret && pty_real_select_result(pty, event, 0);
650 }
651
652 return ret;
653}
654
655static void pty_uxsel_setup(Pty pty)
656{
2916fa14 657 int rwx;
658
659 rwx = 1; /* always want to read from pty */
660 if (bufchain_size(&pty->output_data))
661 rwx |= 2; /* might also want to write to it */
662 uxsel_set(pty->master_fd, rwx, pty_select_result);
d6fa1947 663
664 /*
665 * In principle this only needs calling once for all pty
666 * backend instances, but it's simplest just to call it every
667 * time; uxsel won't mind.
668 */
74aca06d 669 uxsel_set(pty_signal_pipe[0], 1, pty_select_result);
670}
671
95c47834 672/*
673 * Called to set up the pty.
674 *
675 * Returns an error message, or NULL on success.
676 *
677 * Also places the canonical host name into `realhost'. It must be
678 * freed by the caller.
679 */
cbe2d68f 680static const char *pty_init(void *frontend, void **backend_handle, Config *cfg,
79bf227b 681 char *host, int port, char **realhost, int nodelay,
682 int keepalive)
95c47834 683{
684 int slavefd;
685 pid_t pid, pgrp;
c13772b1 686#ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */
7af753e6 687 long windowid;
c13772b1 688#endif
d6fa1947 689 Pty pty;
95c47834 690
d6fa1947 691 if (single_pty) {
692 pty = single_pty;
693 } else {
694 pty = snew(struct pty_tag);
695 pty->master_fd = pty->slave_fd = -1;
696#ifndef OMIT_UTMP
697 pty_stamped_utmp = FALSE;
698#endif
699 }
700
701 pty->frontend = frontend;
28d00fe4 702 *backend_handle = NULL; /* we can't sensibly use this, sadly */
703
d6fa1947 704 pty->cfg = *cfg; /* structure copy */
705 pty->term_width = cfg->width;
706 pty->term_height = cfg->height;
f278d6f8 707
d6fa1947 708 if (pty->master_fd < 0)
709 pty_open_master(pty);
95c47834 710
711 /*
712 * Set the backspace character to be whichever of ^H and ^? is
713 * specified by bksp_is_delete.
714 */
715 {
716 struct termios attrs;
d6fa1947 717 tcgetattr(pty->master_fd, &attrs);
86916870 718 attrs.c_cc[VERASE] = cfg->bksp_is_delete ? '\177' : '\010';
d6fa1947 719 tcsetattr(pty->master_fd, TCSANOW, &attrs);
95c47834 720 }
721
d4e1d591 722#ifndef OMIT_UTMP
95c47834 723 /*
724 * Stamp utmp (that is, tell the utmp helper process to do so),
725 * or not.
726 */
58dcb876 727 if (!cfg->stamp_utmp) {
95c47834 728 close(pty_utmp_helper_pipe); /* just let the child process die */
58dcb876 729 pty_utmp_helper_pipe = -1;
730 } else {
d6fa1947 731 char *location = get_x_display(pty->frontend);
95c47834 732 int len = strlen(location)+1, pos = 0; /* +1 to include NUL */
733 while (pos < len) {
734 int ret = write(pty_utmp_helper_pipe, location+pos, len - pos);
735 if (ret < 0) {
736 perror("pterm: writing to utmp helper process");
737 close(pty_utmp_helper_pipe); /* arrgh, just give up */
58dcb876 738 pty_utmp_helper_pipe = -1;
95c47834 739 break;
740 }
741 pos += ret;
742 }
743 }
d4e1d591 744#endif
755a6d84 745
c13772b1 746#ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */
d6fa1947 747 windowid = get_windowid(pty->frontend);
c13772b1 748#endif
7af753e6 749
755a6d84 750 /*
054d8535 751 * Fork and execute the command.
752 */
753 pid = fork();
754 if (pid < 0) {
755 perror("fork");
88e6b9ca 756 exit(1);
054d8535 757 }
758
759 if (pid == 0) {
054d8535 760 /*
761 * We are the child.
762 */
d37c2d81 763
d6fa1947 764 slavefd = pty_open_slave(pty);
d37c2d81 765 if (slavefd < 0) {
766 perror("slave pty: open");
0f33f9d1 767 _exit(1);
d37c2d81 768 }
769
d6fa1947 770 close(pty->master_fd);
054d8535 771 fcntl(slavefd, F_SETFD, 0); /* don't close on exec */
772 dup2(slavefd, 0);
773 dup2(slavefd, 1);
774 dup2(slavefd, 2);
90f2ed42 775 close(slavefd);
054d8535 776 setsid();
bbaa7993 777#ifdef TIOCSCTTY
211b4228 778 ioctl(0, TIOCSCTTY, 1);
bbaa7993 779#endif
d37c2d81 780 pgrp = getpid();
3a7c6b9e 781 tcsetpgrp(0, pgrp);
ea0716c6 782 setpgid(pgrp, pgrp);
d6fa1947 783 close(open(pty->name, O_WRONLY, 0));
ea0716c6 784 setpgid(pgrp, pgrp);
fe9548aa 785 {
30d1257c 786 char *term_env_var = dupprintf("TERM=%s", cfg->termtype);
fe9548aa 787 putenv(term_env_var);
30d1257c 788 /* We mustn't free term_env_var, as putenv links it into the
789 * environment in place.
790 */
fe9548aa 791 }
c13772b1 792#ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */
7af753e6 793 {
30d1257c 794 char *windowid_env_var = dupprintf("WINDOWID=%ld", windowid);
7af753e6 795 putenv(windowid_env_var);
30d1257c 796 /* We mustn't free windowid_env_var, as putenv links it into the
797 * environment in place.
798 */
7af753e6 799 }
c13772b1 800#endif
73feed4f 801 {
802 char *e = cfg->environmt;
803 char *var, *varend, *val, *varval;
804 while (*e) {
805 var = e;
806 while (*e && *e != '\t') e++;
807 varend = e;
808 if (*e == '\t') e++;
809 val = e;
810 while (*e) e++;
811 e++;
812
813 varval = dupprintf("%.*s=%s", varend-var, var, val);
814 putenv(varval);
815 /*
816 * We must not free varval, since putenv links it
817 * into the environment _in place_. Weird, but
818 * there we go. Memory usage will be rationalised
819 * as soon as we exec anyway.
820 */
821 }
822 }
823
8bf5c419 824 /*
825 * SIGINT and SIGQUIT may have been set to ignored by our
826 * parent, particularly by things like sh -c 'pterm &' and
15b5d988 827 * some window managers. SIGCHLD, meanwhile, was blocked
828 * during pt_main() startup. Reverse all this for our child
829 * process.
8bf5c419 830 */
0f33f9d1 831 putty_signal(SIGINT, SIG_DFL);
832 putty_signal(SIGQUIT, SIG_DFL);
15b5d988 833 block_signal(SIGCHLD, 0);
6169c758 834 if (pty_argv)
835 execvp(pty_argv[0], pty_argv);
c8ee61b9 836 else {
837 char *shell = getenv("SHELL");
838 char *shellname;
86916870 839 if (cfg->login_shell) {
c8ee61b9 840 char *p = strrchr(shell, '/');
3d88e64d 841 shellname = snewn(2+strlen(shell), char);
c8ee61b9 842 p = p ? p+1 : shell;
843 sprintf(shellname, "-%s", p);
844 } else
845 shellname = shell;
30264db9 846 execl(getenv("SHELL"), shellname, (void *)NULL);
c8ee61b9 847 }
848
054d8535 849 /*
850 * If we're here, exec has gone badly foom.
851 */
852 perror("exec");
0f33f9d1 853 _exit(127);
054d8535 854 } else {
d6fa1947 855 pty->child_pid = pid;
856 pty->child_dead = FALSE;
857 pty->finished = FALSE;
858 if (pty->slave_fd > 0)
859 close(pty->slave_fd);
860 if (!ptys_by_pid)
861 ptys_by_pid = newtree234(pty_compare_by_pid);
862 add234(ptys_by_pid, pty);
270d2e8d 863 }
054d8535 864
90f2ed42 865 if (pty_signal_pipe[0] < 0) {
866 if (pipe(pty_signal_pipe) < 0) {
867 perror("pipe");
868 exit(1);
869 }
870 cloexec(pty_signal_pipe[0]);
871 cloexec(pty_signal_pipe[1]);
74aca06d 872 }
d6fa1947 873 pty_uxsel_setup(pty);
874
875 *backend_handle = pty;
74aca06d 876
5617c1e6 877 *realhost = dupprintf("\0");
878
1709795f 879 return NULL;
880}
881
86916870 882static void pty_reconfig(void *handle, Config *cfg)
883{
d6fa1947 884 Pty pty = (Pty)handle;
6b0eeb4e 885 /*
886 * We don't have much need to reconfigure this backend, but
887 * unfortunately we do need to pick up the setting of Close On
888 * Exit so we know whether to give a `terminated' message.
889 */
d6fa1947 890 pty->cfg = *cfg; /* structure copy */
86916870 891}
892
893/*
6b0eeb4e 894 * Stub routine (never called in pterm).
cb60dcb3 895 */
896static void pty_free(void *handle)
897{
d6fa1947 898 Pty pty = (Pty)handle;
899
900 /* Either of these may fail `not found'. That's fine with us. */
901 del234(ptys_by_pid, pty);
902 del234(ptys_by_fd, pty);
903
904 sfree(pty);
cb60dcb3 905}
906
2916fa14 907static void pty_try_write(Pty pty)
908{
909 void *data;
910 int len, ret;
911
912 assert(pty->master_fd >= 0);
913
914 while (bufchain_size(&pty->output_data) > 0) {
915 bufchain_prefix(&pty->output_data, &data, &len);
916 ret = write(pty->master_fd, data, len);
917
918 if (ret < 0 && (errno == EWOULDBLOCK)) {
919 /*
920 * We've sent all we can for the moment.
921 */
922 break;
923 }
924 if (ret < 0) {
925 perror("write pty master");
926 exit(1);
927 }
928 bufchain_consume(&pty->output_data, ret);
929 }
930
931 pty_uxsel_setup(pty);
932}
933
cb60dcb3 934/*
1709795f 935 * Called to send data down the pty.
936 */
28d00fe4 937static int pty_send(void *handle, char *buf, int len)
1709795f 938{
d6fa1947 939 Pty pty = (Pty)handle;
940
941 if (pty->master_fd < 0)
2916fa14 942 return 0; /* ignore all writes if fd closed */
90cfd8f4 943
2916fa14 944 bufchain_add(&pty->output_data, buf, len);
945 pty_try_write(pty);
946
947 return bufchain_size(&pty->output_data);
1709795f 948}
949
d6fa1947 950static void pty_close(Pty pty)
90cfd8f4 951{
d6fa1947 952 if (pty->master_fd >= 0) {
953 close(pty->master_fd);
954 pty->master_fd = -1;
90cfd8f4 955 }
d4e1d591 956#ifndef OMIT_UTMP
58dcb876 957 if (pty_utmp_helper_pipe >= 0) {
958 close(pty_utmp_helper_pipe); /* this causes utmp to be cleaned up */
959 pty_utmp_helper_pipe = -1;
960 }
d4e1d591 961#endif
90cfd8f4 962}
963
1709795f 964/*
965 * Called to query the current socket sendability status.
966 */
28d00fe4 967static int pty_sendbuffer(void *handle)
1709795f 968{
d6fa1947 969 /* Pty pty = (Pty)handle; */
1709795f 970 return 0;
971}
972
973/*
974 * Called to set the size of the window
975 */
28d00fe4 976static void pty_size(void *handle, int width, int height)
1709795f 977{
d6fa1947 978 Pty pty = (Pty)handle;
88e6b9ca 979 struct winsize size;
980
d6fa1947 981 pty->term_width = width;
982 pty->term_height = height;
f278d6f8 983
d6fa1947 984 size.ws_row = (unsigned short)pty->term_height;
985 size.ws_col = (unsigned short)pty->term_width;
986 size.ws_xpixel = (unsigned short) pty->term_width *
987 font_dimension(pty->frontend, 0);
988 size.ws_ypixel = (unsigned short) pty->term_height *
989 font_dimension(pty->frontend, 1);
990 ioctl(pty->master_fd, TIOCSWINSZ, (void *)&size);
1709795f 991 return;
992}
993
994/*
995 * Send special codes.
996 */
28d00fe4 997static void pty_special(void *handle, Telnet_Special code)
1709795f 998{
d6fa1947 999 /* Pty pty = (Pty)handle; */
1709795f 1000 /* Do nothing! */
1001 return;
1002}
1003
125105d1 1004/*
1005 * Return a list of the special codes that make sense in this
1006 * protocol.
1007 */
1008static const struct telnet_special *pty_get_specials(void *handle)
1009{
d6fa1947 1010 /* Pty pty = (Pty)handle; */
125105d1 1011 /*
1012 * Hmm. When I get round to having this actually usable, it
1013 * might be quite nice to have the ability to deliver a few
1014 * well chosen signals to the child process - SIGINT, SIGTERM,
1015 * SIGKILL at least.
1016 */
1017 return NULL;
1018}
1019
6226c939 1020static int pty_connected(void *handle)
1709795f 1021{
d6fa1947 1022 /* Pty pty = (Pty)handle; */
6226c939 1023 return TRUE;
1709795f 1024}
1025
28d00fe4 1026static int pty_sendok(void *handle)
1709795f 1027{
d6fa1947 1028 /* Pty pty = (Pty)handle; */
1709795f 1029 return 1;
1030}
1031
28d00fe4 1032static void pty_unthrottle(void *handle, int backlog)
1709795f 1033{
d6fa1947 1034 /* Pty pty = (Pty)handle; */
1709795f 1035 /* do nothing */
1036}
1037
28d00fe4 1038static int pty_ldisc(void *handle, int option)
1709795f 1039{
d6fa1947 1040 /* Pty pty = (Pty)handle; */
1709795f 1041 return 0; /* neither editing nor echoing */
1042}
1043
b9d7bcad 1044static void pty_provide_ldisc(void *handle, void *ldisc)
1045{
d6fa1947 1046 /* Pty pty = (Pty)handle; */
b9d7bcad 1047 /* This is a stub. */
1048}
1049
a8327734 1050static void pty_provide_logctx(void *handle, void *logctx)
1051{
d6fa1947 1052 /* Pty pty = (Pty)handle; */
a8327734 1053 /* This is a stub. */
1054}
1055
28d00fe4 1056static int pty_exitcode(void *handle)
1709795f 1057{
d6fa1947 1058 Pty pty = (Pty)handle;
1059 if (!pty->finished)
90cfd8f4 1060 return -1; /* not dead yet */
1061 else
d6fa1947 1062 return pty->exit_code;
1709795f 1063}
1064
f89c3294 1065static int pty_cfg_info(void *handle)
1066{
d6fa1947 1067 /* Pty pty = (Pty)handle; */
f89c3294 1068 return 0;
1069}
1070
1709795f 1071Backend pty_backend = {
1072 pty_init,
cb60dcb3 1073 pty_free,
86916870 1074 pty_reconfig,
1709795f 1075 pty_send,
1076 pty_sendbuffer,
1077 pty_size,
1078 pty_special,
125105d1 1079 pty_get_specials,
6226c939 1080 pty_connected,
1709795f 1081 pty_exitcode,
1082 pty_sendok,
1083 pty_ldisc,
b9d7bcad 1084 pty_provide_ldisc,
a8327734 1085 pty_provide_logctx,
1709795f 1086 pty_unthrottle,
f89c3294 1087 pty_cfg_info,
1709795f 1088 1
1089};