Fix a pty-freeing error which caused a segfault if you attempted to
[u/mdw/putty] / unix / uxpty.c
1 /*
2 * Pseudo-tty backend for pterm.
3 */
4
5 #define _GNU_SOURCE
6
7 #include <stdio.h>
8 #include <stdlib.h>
9 #include <string.h>
10 #include <unistd.h>
11 #include <signal.h>
12 #include <assert.h>
13 #include <fcntl.h>
14 #include <termios.h>
15 #include <grp.h>
16 #include <utmp.h>
17 #include <pwd.h>
18 #include <time.h>
19 #include <sys/types.h>
20 #include <sys/stat.h>
21 #include <sys/wait.h>
22 #include <sys/ioctl.h>
23 #include <errno.h>
24
25 #include "putty.h"
26 #include "tree234.h"
27
28 #ifndef OMIT_UTMP
29 #include <utmpx.h>
30 #endif
31
32 #ifndef FALSE
33 #define FALSE 0
34 #endif
35 #ifndef TRUE
36 #define TRUE 1
37 #endif
38
39 /* updwtmpx() needs the name of the wtmp file. Try to find it. */
40 #ifndef WTMPX_FILE
41 #ifdef _PATH_WTMPX
42 #define WTMPX_FILE _PATH_WTMPX
43 #else
44 #define WTMPX_FILE "/var/log/wtmpx"
45 #endif
46 #endif
47
48 #ifndef LASTLOG_FILE
49 #ifdef _PATH_LASTLOG
50 #define LASTLOG_FILE _PATH_LASTLOG
51 #else
52 #define LASTLOG_FILE "/var/log/lastlog"
53 #endif
54 #endif
55
56 /*
57 * Set up a default for vaguely sane systems. The idea is that if
58 * OMIT_UTMP is not defined, then at least one of the symbols which
59 * enable particular forms of utmp processing should be, if only so
60 * that a link error can warn you that you should have defined
61 * OMIT_UTMP if you didn't want any. Currently HAVE_PUTUTLINE is
62 * the only such symbol.
63 */
64 #ifndef OMIT_UTMP
65 #if !defined HAVE_PUTUTLINE
66 #define HAVE_PUTUTLINE
67 #endif
68 #endif
69
70 typedef struct pty_tag *Pty;
71
72 /*
73 * The pty_signal_pipe, along with the SIGCHLD handler, must be
74 * process-global rather than session-specific.
75 */
76 static int pty_signal_pipe[2] = { -1, -1 }; /* obviously bogus initial val */
77
78 struct pty_tag {
79 Conf *conf;
80 int master_fd, slave_fd;
81 void *frontend;
82 char name[FILENAME_MAX];
83 pid_t child_pid;
84 int term_width, term_height;
85 int child_dead, finished;
86 int exit_code;
87 bufchain output_data;
88 };
89
90 /*
91 * We store our pty backends in a tree sorted by master fd, so that
92 * when we get an uxsel notification we know which backend instance
93 * is the owner of the pty that caused it.
94 */
95 static int pty_compare_by_fd(void *av, void *bv)
96 {
97 Pty a = (Pty)av;
98 Pty b = (Pty)bv;
99
100 if (a->master_fd < b->master_fd)
101 return -1;
102 else if (a->master_fd > b->master_fd)
103 return +1;
104 return 0;
105 }
106
107 static int pty_find_by_fd(void *av, void *bv)
108 {
109 int a = *(int *)av;
110 Pty b = (Pty)bv;
111
112 if (a < b->master_fd)
113 return -1;
114 else if (a > b->master_fd)
115 return +1;
116 return 0;
117 }
118
119 static tree234 *ptys_by_fd = NULL;
120
121 /*
122 * We also have a tree sorted by child pid, so that when we wait()
123 * in response to the signal we know which backend instance is the
124 * owner of the process that caused the signal.
125 */
126 static int pty_compare_by_pid(void *av, void *bv)
127 {
128 Pty a = (Pty)av;
129 Pty b = (Pty)bv;
130
131 if (a->child_pid < b->child_pid)
132 return -1;
133 else if (a->child_pid > b->child_pid)
134 return +1;
135 return 0;
136 }
137
138 static int pty_find_by_pid(void *av, void *bv)
139 {
140 pid_t a = *(pid_t *)av;
141 Pty b = (Pty)bv;
142
143 if (a < b->child_pid)
144 return -1;
145 else if (a > b->child_pid)
146 return +1;
147 return 0;
148 }
149
150 static tree234 *ptys_by_pid = NULL;
151
152 /*
153 * If we are using pty_pre_init(), it will need to have already
154 * allocated a pty structure, which we must then return from
155 * pty_init() rather than allocating a new one. Here we store that
156 * structure between allocation and use.
157 *
158 * Note that although most of this module is entirely capable of
159 * handling multiple ptys in a single process, pty_pre_init() is
160 * fundamentally _dependent_ on there being at most one pty per
161 * process, so the normal static-data constraints don't apply.
162 *
163 * Likewise, since utmp is only used via pty_pre_init, it too must
164 * be single-instance, so we can declare utmp-related variables
165 * here.
166 */
167 static Pty single_pty = NULL;
168
169 #ifndef OMIT_UTMP
170 static pid_t pty_utmp_helper_pid = -1;
171 static int pty_utmp_helper_pipe = -1;
172 static int pty_stamped_utmp;
173 static struct utmpx utmp_entry;
174 #endif
175
176 /*
177 * pty_argv is a grievous hack to allow a proper argv to be passed
178 * through from the Unix command line. Again, it doesn't really
179 * make sense outside a one-pty-per-process setup.
180 */
181 char **pty_argv;
182
183 static void pty_close(Pty pty);
184 static void pty_try_write(Pty pty);
185
186 #ifndef OMIT_UTMP
187 static void setup_utmp(char *ttyname, char *location)
188 {
189 #ifdef HAVE_LASTLOG
190 struct lastlog lastlog_entry;
191 FILE *lastlog;
192 #endif
193 struct passwd *pw;
194 struct timeval tv;
195
196 pw = getpwuid(getuid());
197 memset(&utmp_entry, 0, sizeof(utmp_entry));
198 utmp_entry.ut_type = USER_PROCESS;
199 utmp_entry.ut_pid = getpid();
200 strncpy(utmp_entry.ut_line, ttyname+5, lenof(utmp_entry.ut_line));
201 strncpy(utmp_entry.ut_id, ttyname+8, lenof(utmp_entry.ut_id));
202 strncpy(utmp_entry.ut_user, pw->pw_name, lenof(utmp_entry.ut_user));
203 strncpy(utmp_entry.ut_host, location, lenof(utmp_entry.ut_host));
204 /*
205 * Apparently there are some architectures where (struct
206 * utmpx).ut_tv is not essentially struct timeval (e.g. Linux
207 * amd64). Hence the temporary.
208 */
209 gettimeofday(&tv, NULL);
210 utmp_entry.ut_tv.tv_sec = tv.tv_sec;
211 utmp_entry.ut_tv.tv_usec = tv.tv_usec;
212
213 setutxent();
214 pututxline(&utmp_entry);
215 endutxent();
216
217 updwtmpx(WTMPX_FILE, &utmp_entry);
218
219 #ifdef HAVE_LASTLOG
220 memset(&lastlog_entry, 0, sizeof(lastlog_entry));
221 strncpy(lastlog_entry.ll_line, ttyname+5, lenof(lastlog_entry.ll_line));
222 strncpy(lastlog_entry.ll_host, location, lenof(lastlog_entry.ll_host));
223 time(&lastlog_entry.ll_time);
224 if ((lastlog = fopen(LASTLOG_FILE, "r+")) != NULL) {
225 fseek(lastlog, sizeof(lastlog_entry) * getuid(), SEEK_SET);
226 fwrite(&lastlog_entry, 1, sizeof(lastlog_entry), lastlog);
227 fclose(lastlog);
228 }
229 #endif
230
231 pty_stamped_utmp = 1;
232
233 }
234
235 static void cleanup_utmp(void)
236 {
237 struct timeval tv;
238
239 if (!pty_stamped_utmp)
240 return;
241
242 utmp_entry.ut_type = DEAD_PROCESS;
243 memset(utmp_entry.ut_user, 0, lenof(utmp_entry.ut_user));
244 gettimeofday(&tv, NULL);
245 utmp_entry.ut_tv.tv_sec = tv.tv_sec;
246 utmp_entry.ut_tv.tv_usec = tv.tv_usec;
247
248 updwtmpx(WTMPX_FILE, &utmp_entry);
249
250 memset(utmp_entry.ut_line, 0, lenof(utmp_entry.ut_line));
251 utmp_entry.ut_tv.tv_sec = 0;
252 utmp_entry.ut_tv.tv_usec = 0;
253
254 setutxent();
255 pututxline(&utmp_entry);
256 endutxent();
257
258 pty_stamped_utmp = 0; /* ensure we never double-cleanup */
259 }
260 #endif
261
262 static void sigchld_handler(int signum)
263 {
264 if (write(pty_signal_pipe[1], "x", 1) <= 0)
265 /* not much we can do about it */;
266 }
267
268 #ifndef OMIT_UTMP
269 static void fatal_sig_handler(int signum)
270 {
271 putty_signal(signum, SIG_DFL);
272 cleanup_utmp();
273 raise(signum);
274 }
275 #endif
276
277 static int pty_open_slave(Pty pty)
278 {
279 if (pty->slave_fd < 0) {
280 pty->slave_fd = open(pty->name, O_RDWR);
281 cloexec(pty->slave_fd);
282 }
283
284 return pty->slave_fd;
285 }
286
287 static void pty_open_master(Pty pty)
288 {
289 #ifdef BSD_PTYS
290 const char chars1[] = "pqrstuvwxyz";
291 const char chars2[] = "0123456789abcdef";
292 const char *p1, *p2;
293 char master_name[20];
294 struct group *gp;
295
296 for (p1 = chars1; *p1; p1++)
297 for (p2 = chars2; *p2; p2++) {
298 sprintf(master_name, "/dev/pty%c%c", *p1, *p2);
299 pty->master_fd = open(master_name, O_RDWR);
300 if (pty->master_fd >= 0) {
301 if (geteuid() == 0 ||
302 access(master_name, R_OK | W_OK) == 0) {
303 /*
304 * We must also check at this point that we are
305 * able to open the slave side of the pty. We
306 * wouldn't want to allocate the wrong master,
307 * get all the way down to forking, and _then_
308 * find we're unable to open the slave.
309 */
310 strcpy(pty->name, master_name);
311 pty->name[5] = 't'; /* /dev/ptyXX -> /dev/ttyXX */
312
313 cloexec(pty->master_fd);
314
315 if (pty_open_slave(pty) >= 0 &&
316 access(pty->name, R_OK | W_OK) == 0)
317 goto got_one;
318 if (pty->slave_fd > 0)
319 close(pty->slave_fd);
320 pty->slave_fd = -1;
321 }
322 close(pty->master_fd);
323 }
324 }
325
326 /* If we get here, we couldn't get a tty at all. */
327 fprintf(stderr, "pterm: unable to open a pseudo-terminal device\n");
328 exit(1);
329
330 got_one:
331
332 /* We need to chown/chmod the /dev/ttyXX device. */
333 gp = getgrnam("tty");
334 chown(pty->name, getuid(), gp ? gp->gr_gid : -1);
335 chmod(pty->name, 0600);
336 #else
337
338 const int flags = O_RDWR
339 #ifdef O_NOCTTY
340 | O_NOCTTY
341 #endif
342 ;
343
344 #ifdef HAVE_POSIX_OPENPT
345 pty->master_fd = posix_openpt(flags);
346
347 if (pty->master_fd < 0) {
348 perror("posix_openpt");
349 exit(1);
350 }
351 #else
352 pty->master_fd = open("/dev/ptmx", flags);
353
354 if (pty->master_fd < 0) {
355 perror("/dev/ptmx: open");
356 exit(1);
357 }
358 #endif
359
360 if (grantpt(pty->master_fd) < 0) {
361 perror("grantpt");
362 exit(1);
363 }
364
365 if (unlockpt(pty->master_fd) < 0) {
366 perror("unlockpt");
367 exit(1);
368 }
369
370 cloexec(pty->master_fd);
371
372 pty->name[FILENAME_MAX-1] = '\0';
373 strncpy(pty->name, ptsname(pty->master_fd), FILENAME_MAX-1);
374 #endif
375
376 {
377 /*
378 * Set the pty master into non-blocking mode.
379 */
380 int fl;
381 fl = fcntl(pty->master_fd, F_GETFL);
382 if (fl != -1 && !(fl & O_NONBLOCK))
383 fcntl(pty->master_fd, F_SETFL, fl | O_NONBLOCK);
384 }
385
386 if (!ptys_by_fd)
387 ptys_by_fd = newtree234(pty_compare_by_fd);
388 add234(ptys_by_fd, pty);
389 }
390
391 /*
392 * Pre-initialisation. This is here to get around the fact that GTK
393 * doesn't like being run in setuid/setgid programs (probably
394 * sensibly). So before we initialise GTK - and therefore before we
395 * even process the command line - we check to see if we're running
396 * set[ug]id. If so, we open our pty master _now_, chown it as
397 * necessary, and drop privileges. We can always close it again
398 * later. If we're potentially going to be doing utmp as well, we
399 * also fork off a utmp helper process and communicate with it by
400 * means of a pipe; the utmp helper will keep privileges in order
401 * to clean up utmp when we exit (i.e. when its end of our pipe
402 * closes).
403 */
404 void pty_pre_init(void)
405 {
406 Pty pty;
407
408 #ifndef OMIT_UTMP
409 pid_t pid;
410 int pipefd[2];
411 #endif
412
413 pty = single_pty = snew(struct pty_tag);
414 pty->conf = NULL;
415 bufchain_init(&pty->output_data);
416
417 /* set the child signal handler straight away; it needs to be set
418 * before we ever fork. */
419 putty_signal(SIGCHLD, sigchld_handler);
420 pty->master_fd = pty->slave_fd = -1;
421 #ifndef OMIT_UTMP
422 pty_stamped_utmp = FALSE;
423 #endif
424
425 if (geteuid() != getuid() || getegid() != getgid()) {
426 pty_open_master(pty);
427
428 #ifndef OMIT_UTMP
429 /*
430 * Fork off the utmp helper.
431 */
432 if (pipe(pipefd) < 0) {
433 perror("pterm: pipe");
434 exit(1);
435 }
436 cloexec(pipefd[0]);
437 cloexec(pipefd[1]);
438 pid = fork();
439 if (pid < 0) {
440 perror("pterm: fork");
441 exit(1);
442 } else if (pid == 0) {
443 char display[128], buffer[128];
444 int dlen, ret;
445
446 close(pipefd[1]);
447 /*
448 * Now sit here until we receive a display name from the
449 * other end of the pipe, and then stamp utmp. Unstamp utmp
450 * again, and exit, when the pipe closes.
451 */
452
453 dlen = 0;
454 while (1) {
455
456 ret = read(pipefd[0], buffer, lenof(buffer));
457 if (ret <= 0) {
458 cleanup_utmp();
459 _exit(0);
460 } else if (!pty_stamped_utmp) {
461 if (dlen < lenof(display))
462 memcpy(display+dlen, buffer,
463 min(ret, lenof(display)-dlen));
464 if (buffer[ret-1] == '\0') {
465 /*
466 * Now we have a display name. NUL-terminate
467 * it, and stamp utmp.
468 */
469 display[lenof(display)-1] = '\0';
470 /*
471 * Trap as many fatal signals as we can in the
472 * hope of having the best possible chance to
473 * clean up utmp before termination. We are
474 * unfortunately unprotected against SIGKILL,
475 * but that's life.
476 */
477 putty_signal(SIGHUP, fatal_sig_handler);
478 putty_signal(SIGINT, fatal_sig_handler);
479 putty_signal(SIGQUIT, fatal_sig_handler);
480 putty_signal(SIGILL, fatal_sig_handler);
481 putty_signal(SIGABRT, fatal_sig_handler);
482 putty_signal(SIGFPE, fatal_sig_handler);
483 putty_signal(SIGPIPE, fatal_sig_handler);
484 putty_signal(SIGALRM, fatal_sig_handler);
485 putty_signal(SIGTERM, fatal_sig_handler);
486 putty_signal(SIGSEGV, fatal_sig_handler);
487 putty_signal(SIGUSR1, fatal_sig_handler);
488 putty_signal(SIGUSR2, fatal_sig_handler);
489 #ifdef SIGBUS
490 putty_signal(SIGBUS, fatal_sig_handler);
491 #endif
492 #ifdef SIGPOLL
493 putty_signal(SIGPOLL, fatal_sig_handler);
494 #endif
495 #ifdef SIGPROF
496 putty_signal(SIGPROF, fatal_sig_handler);
497 #endif
498 #ifdef SIGSYS
499 putty_signal(SIGSYS, fatal_sig_handler);
500 #endif
501 #ifdef SIGTRAP
502 putty_signal(SIGTRAP, fatal_sig_handler);
503 #endif
504 #ifdef SIGVTALRM
505 putty_signal(SIGVTALRM, fatal_sig_handler);
506 #endif
507 #ifdef SIGXCPU
508 putty_signal(SIGXCPU, fatal_sig_handler);
509 #endif
510 #ifdef SIGXFSZ
511 putty_signal(SIGXFSZ, fatal_sig_handler);
512 #endif
513 #ifdef SIGIO
514 putty_signal(SIGIO, fatal_sig_handler);
515 #endif
516 setup_utmp(pty->name, display);
517 }
518 }
519 }
520 } else {
521 close(pipefd[0]);
522 pty_utmp_helper_pid = pid;
523 pty_utmp_helper_pipe = pipefd[1];
524 }
525 #endif
526 }
527
528 /* Drop privs. */
529 {
530 #ifndef HAVE_NO_SETRESUID
531 int gid = getgid(), uid = getuid();
532 int setresgid(gid_t, gid_t, gid_t);
533 int setresuid(uid_t, uid_t, uid_t);
534 if (setresgid(gid, gid, gid) < 0) {
535 perror("setresgid");
536 exit(1);
537 }
538 if (setresuid(uid, uid, uid) < 0) {
539 perror("setresuid");
540 exit(1);
541 }
542 #else
543 if (setgid(getgid()) < 0) {
544 perror("setgid");
545 exit(1);
546 }
547 if (setuid(getuid()) < 0) {
548 perror("setuid");
549 exit(1);
550 }
551 #endif
552 }
553 }
554
555 int pty_real_select_result(Pty pty, int event, int status)
556 {
557 char buf[4096];
558 int ret;
559 int finished = FALSE;
560
561 if (event < 0) {
562 /*
563 * We've been called because our child process did
564 * something. `status' tells us what.
565 */
566 if ((WIFEXITED(status) || WIFSIGNALED(status))) {
567 /*
568 * The primary child process died. We could keep
569 * the terminal open for remaining subprocesses to
570 * output to, but conventional wisdom seems to feel
571 * that that's the Wrong Thing for an xterm-alike,
572 * so we bail out now (though we don't necessarily
573 * _close_ the window, depending on the state of
574 * Close On Exit). This would be easy enough to
575 * change or make configurable if necessary.
576 */
577 pty->exit_code = status;
578 pty->child_dead = TRUE;
579 del234(ptys_by_pid, pty);
580 finished = TRUE;
581 }
582 } else {
583 if (event == 1) {
584
585 ret = read(pty->master_fd, buf, sizeof(buf));
586
587 /*
588 * Clean termination condition is that either ret == 0, or ret
589 * < 0 and errno == EIO. Not sure why the latter, but it seems
590 * to happen. Boo.
591 */
592 if (ret == 0 || (ret < 0 && errno == EIO)) {
593 /*
594 * We assume a clean exit if the pty has closed but the
595 * actual child process hasn't. The only way I can
596 * imagine this happening is if it detaches itself from
597 * the pty and goes daemonic - in which case the
598 * expected usage model would precisely _not_ be for
599 * the pterm window to hang around!
600 */
601 finished = TRUE;
602 if (!pty->child_dead)
603 pty->exit_code = 0;
604 } else if (ret < 0) {
605 perror("read pty master");
606 exit(1);
607 } else if (ret > 0) {
608 from_backend(pty->frontend, 0, buf, ret);
609 }
610 } else if (event == 2) {
611 /*
612 * Attempt to send data down the pty.
613 */
614 pty_try_write(pty);
615 }
616 }
617
618 if (finished && !pty->finished) {
619 int close_on_exit;
620
621 uxsel_del(pty->master_fd);
622 pty_close(pty);
623 pty->master_fd = -1;
624
625 pty->finished = TRUE;
626
627 /*
628 * This is a slight layering-violation sort of hack: only
629 * if we're not closing on exit (COE is set to Never, or to
630 * Only On Clean and it wasn't a clean exit) do we output a
631 * `terminated' message.
632 */
633 close_on_exit = conf_get_int(pty->conf, CONF_close_on_exit);
634 if (close_on_exit == FORCE_OFF ||
635 (close_on_exit == AUTO && pty->exit_code != 0)) {
636 char message[512];
637 message[0] = '\0';
638 if (WIFEXITED(pty->exit_code))
639 sprintf(message, "\r\n[pterm: process terminated with exit"
640 " code %d]\r\n", WEXITSTATUS(pty->exit_code));
641 else if (WIFSIGNALED(pty->exit_code))
642 #ifdef HAVE_NO_STRSIGNAL
643 sprintf(message, "\r\n[pterm: process terminated on signal"
644 " %d]\r\n", WTERMSIG(pty->exit_code));
645 #else
646 sprintf(message, "\r\n[pterm: process terminated on signal"
647 " %d (%.400s)]\r\n", WTERMSIG(pty->exit_code),
648 strsignal(WTERMSIG(pty->exit_code)));
649 #endif
650 from_backend(pty->frontend, 0, message, strlen(message));
651 }
652
653 notify_remote_exit(pty->frontend);
654 }
655
656 return !finished;
657 }
658
659 int pty_select_result(int fd, int event)
660 {
661 int ret = TRUE;
662 Pty pty;
663
664 if (fd == pty_signal_pipe[0]) {
665 pid_t pid;
666 int status;
667 char c[1];
668
669 if (read(pty_signal_pipe[0], c, 1) <= 0)
670 /* ignore error */;
671 /* ignore its value; it'll be `x' */
672
673 do {
674 pid = waitpid(-1, &status, WNOHANG);
675
676 pty = find234(ptys_by_pid, &pid, pty_find_by_pid);
677
678 if (pty)
679 ret = ret && pty_real_select_result(pty, -1, status);
680 } while (pid > 0);
681 } else {
682 pty = find234(ptys_by_fd, &fd, pty_find_by_fd);
683
684 if (pty)
685 ret = ret && pty_real_select_result(pty, event, 0);
686 }
687
688 return ret;
689 }
690
691 static void pty_uxsel_setup(Pty pty)
692 {
693 int rwx;
694
695 rwx = 1; /* always want to read from pty */
696 if (bufchain_size(&pty->output_data))
697 rwx |= 2; /* might also want to write to it */
698 uxsel_set(pty->master_fd, rwx, pty_select_result);
699
700 /*
701 * In principle this only needs calling once for all pty
702 * backend instances, but it's simplest just to call it every
703 * time; uxsel won't mind.
704 */
705 uxsel_set(pty_signal_pipe[0], 1, pty_select_result);
706 }
707
708 /*
709 * Called to set up the pty.
710 *
711 * Returns an error message, or NULL on success.
712 *
713 * Also places the canonical host name into `realhost'. It must be
714 * freed by the caller.
715 */
716 static const char *pty_init(void *frontend, void **backend_handle, Conf *conf,
717 char *host, int port, char **realhost, int nodelay,
718 int keepalive)
719 {
720 int slavefd;
721 pid_t pid, pgrp;
722 #ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */
723 long windowid;
724 #endif
725 Pty pty;
726
727 if (single_pty) {
728 pty = single_pty;
729 assert(pty->conf == NULL);
730 } else {
731 pty = snew(struct pty_tag);
732 pty->master_fd = pty->slave_fd = -1;
733 #ifndef OMIT_UTMP
734 pty_stamped_utmp = FALSE;
735 #endif
736 }
737
738 pty->frontend = frontend;
739 *backend_handle = NULL; /* we can't sensibly use this, sadly */
740
741 pty->conf = conf_copy(conf);
742 pty->term_width = conf_get_int(conf, CONF_width);
743 pty->term_height = conf_get_int(conf, CONF_height);
744
745 if (pty->master_fd < 0)
746 pty_open_master(pty);
747
748 /*
749 * Set the backspace character to be whichever of ^H and ^? is
750 * specified by bksp_is_delete.
751 */
752 {
753 struct termios attrs;
754 tcgetattr(pty->master_fd, &attrs);
755 attrs.c_cc[VERASE] = conf_get_int(conf, CONF_bksp_is_delete)
756 ? '\177' : '\010';
757 tcsetattr(pty->master_fd, TCSANOW, &attrs);
758 }
759
760 #ifndef OMIT_UTMP
761 /*
762 * Stamp utmp (that is, tell the utmp helper process to do so),
763 * or not.
764 */
765 if (pty_utmp_helper_pipe >= 0) { /* if it's < 0, we can't anyway */
766 if (!conf_get_int(conf, CONF_stamp_utmp)) {
767 close(pty_utmp_helper_pipe); /* just let the child process die */
768 pty_utmp_helper_pipe = -1;
769 } else {
770 char *location = get_x_display(pty->frontend);
771 int len = strlen(location)+1, pos = 0; /* +1 to include NUL */
772 while (pos < len) {
773 int ret = write(pty_utmp_helper_pipe, location+pos, len - pos);
774 if (ret < 0) {
775 perror("pterm: writing to utmp helper process");
776 close(pty_utmp_helper_pipe); /* arrgh, just give up */
777 pty_utmp_helper_pipe = -1;
778 break;
779 }
780 pos += ret;
781 }
782 }
783 }
784 #endif
785
786 #ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */
787 windowid = get_windowid(pty->frontend);
788 #endif
789
790 /*
791 * Fork and execute the command.
792 */
793 pid = fork();
794 if (pid < 0) {
795 perror("fork");
796 exit(1);
797 }
798
799 if (pid == 0) {
800 /*
801 * We are the child.
802 */
803
804 slavefd = pty_open_slave(pty);
805 if (slavefd < 0) {
806 perror("slave pty: open");
807 _exit(1);
808 }
809
810 close(pty->master_fd);
811 fcntl(slavefd, F_SETFD, 0); /* don't close on exec */
812 dup2(slavefd, 0);
813 dup2(slavefd, 1);
814 dup2(slavefd, 2);
815 close(slavefd);
816 setsid();
817 #ifdef TIOCSCTTY
818 ioctl(0, TIOCSCTTY, 1);
819 #endif
820 pgrp = getpid();
821 tcsetpgrp(0, pgrp);
822 setpgid(pgrp, pgrp);
823 close(open(pty->name, O_WRONLY, 0));
824 setpgid(pgrp, pgrp);
825 {
826 char *term_env_var = dupprintf("TERM=%s",
827 conf_get_str(conf, CONF_termtype));
828 putenv(term_env_var);
829 /* We mustn't free term_env_var, as putenv links it into the
830 * environment in place.
831 */
832 }
833 #ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */
834 {
835 char *windowid_env_var = dupprintf("WINDOWID=%ld", windowid);
836 putenv(windowid_env_var);
837 /* We mustn't free windowid_env_var, as putenv links it into the
838 * environment in place.
839 */
840 }
841 #endif
842 {
843 char *key, *val;
844
845 for (val = conf_get_str_strs(conf, CONF_environmt, NULL, &key);
846 val != NULL;
847 val = conf_get_str_strs(conf, CONF_environmt, key, &key)) {
848 char *varval = dupcat(key, "=", val, NULL);
849 putenv(varval);
850 /*
851 * We must not free varval, since putenv links it
852 * into the environment _in place_. Weird, but
853 * there we go. Memory usage will be rationalised
854 * as soon as we exec anyway.
855 */
856 }
857 }
858
859 /*
860 * SIGINT, SIGQUIT and SIGPIPE may have been set to ignored by
861 * our parent, particularly by things like sh -c 'pterm &' and
862 * some window or session managers. SIGCHLD, meanwhile, was
863 * blocked during pt_main() startup. Reverse all this for our
864 * child process.
865 */
866 putty_signal(SIGINT, SIG_DFL);
867 putty_signal(SIGQUIT, SIG_DFL);
868 putty_signal(SIGPIPE, SIG_DFL);
869 block_signal(SIGCHLD, 0);
870 if (pty_argv) {
871 /*
872 * Exec the exact argument list we were given.
873 */
874 execvp(pty_argv[0], pty_argv);
875 /*
876 * If that fails, and if we had exactly one argument, pass
877 * that argument to $SHELL -c.
878 *
879 * This arranges that we can _either_ follow 'pterm -e'
880 * with a list of argv elements to be fed directly to
881 * exec, _or_ with a single argument containing a command
882 * to be parsed by a shell (but, in cases of doubt, the
883 * former is more reliable).
884 *
885 * A quick survey of other terminal emulators' -e options
886 * (as of Debian squeeze) suggests that:
887 *
888 * - xterm supports both modes, more or less like this
889 * - gnome-terminal will only accept a one-string shell command
890 * - Eterm, kterm and rxvt will only accept a list of
891 * argv elements (as did older versions of pterm).
892 *
893 * It therefore seems important to support both usage
894 * modes in order to be a drop-in replacement for either
895 * xterm or gnome-terminal, and hence for anyone's
896 * plausible uses of the Debian-style alias
897 * 'x-terminal-emulator'...
898 */
899 if (pty_argv[1] == NULL) {
900 char *shell = getenv("SHELL");
901 if (shell)
902 execl(shell, shell, "-c", pty_argv[0], (void *)NULL);
903 }
904 } else {
905 char *shell = getenv("SHELL");
906 char *shellname;
907 if (conf_get_int(conf, CONF_login_shell)) {
908 char *p = strrchr(shell, '/');
909 shellname = snewn(2+strlen(shell), char);
910 p = p ? p+1 : shell;
911 sprintf(shellname, "-%s", p);
912 } else
913 shellname = shell;
914 execl(getenv("SHELL"), shellname, (void *)NULL);
915 }
916
917 /*
918 * If we're here, exec has gone badly foom.
919 */
920 perror("exec");
921 _exit(127);
922 } else {
923 pty->child_pid = pid;
924 pty->child_dead = FALSE;
925 pty->finished = FALSE;
926 if (pty->slave_fd > 0)
927 close(pty->slave_fd);
928 if (!ptys_by_pid)
929 ptys_by_pid = newtree234(pty_compare_by_pid);
930 add234(ptys_by_pid, pty);
931 }
932
933 if (pty_signal_pipe[0] < 0) {
934 if (pipe(pty_signal_pipe) < 0) {
935 perror("pipe");
936 exit(1);
937 }
938 cloexec(pty_signal_pipe[0]);
939 cloexec(pty_signal_pipe[1]);
940 }
941 pty_uxsel_setup(pty);
942
943 *backend_handle = pty;
944
945 *realhost = dupprintf("\0");
946
947 return NULL;
948 }
949
950 static void pty_reconfig(void *handle, Conf *conf)
951 {
952 Pty pty = (Pty)handle;
953 /*
954 * We don't have much need to reconfigure this backend, but
955 * unfortunately we do need to pick up the setting of Close On
956 * Exit so we know whether to give a `terminated' message.
957 */
958 conf_copy_into(pty->conf, conf);
959 }
960
961 /*
962 * Stub routine (never called in pterm).
963 */
964 static void pty_free(void *handle)
965 {
966 Pty pty = (Pty)handle;
967
968 /* Either of these may fail `not found'. That's fine with us. */
969 del234(ptys_by_pid, pty);
970 del234(ptys_by_fd, pty);
971
972 conf_free(pty->conf);
973 pty->conf = NULL;
974
975 if (pty == single_pty) {
976 /*
977 * Leave this structure around in case we need to Restart
978 * Session.
979 */
980 } else {
981 sfree(pty);
982 }
983 }
984
985 static void pty_try_write(Pty pty)
986 {
987 void *data;
988 int len, ret;
989
990 assert(pty->master_fd >= 0);
991
992 while (bufchain_size(&pty->output_data) > 0) {
993 bufchain_prefix(&pty->output_data, &data, &len);
994 ret = write(pty->master_fd, data, len);
995
996 if (ret < 0 && (errno == EWOULDBLOCK)) {
997 /*
998 * We've sent all we can for the moment.
999 */
1000 break;
1001 }
1002 if (ret < 0) {
1003 perror("write pty master");
1004 exit(1);
1005 }
1006 bufchain_consume(&pty->output_data, ret);
1007 }
1008
1009 pty_uxsel_setup(pty);
1010 }
1011
1012 /*
1013 * Called to send data down the pty.
1014 */
1015 static int pty_send(void *handle, char *buf, int len)
1016 {
1017 Pty pty = (Pty)handle;
1018
1019 if (pty->master_fd < 0)
1020 return 0; /* ignore all writes if fd closed */
1021
1022 bufchain_add(&pty->output_data, buf, len);
1023 pty_try_write(pty);
1024
1025 return bufchain_size(&pty->output_data);
1026 }
1027
1028 static void pty_close(Pty pty)
1029 {
1030 if (pty->master_fd >= 0) {
1031 close(pty->master_fd);
1032 pty->master_fd = -1;
1033 }
1034 #ifndef OMIT_UTMP
1035 if (pty_utmp_helper_pipe >= 0) {
1036 close(pty_utmp_helper_pipe); /* this causes utmp to be cleaned up */
1037 pty_utmp_helper_pipe = -1;
1038 }
1039 #endif
1040 }
1041
1042 /*
1043 * Called to query the current socket sendability status.
1044 */
1045 static int pty_sendbuffer(void *handle)
1046 {
1047 /* Pty pty = (Pty)handle; */
1048 return 0;
1049 }
1050
1051 /*
1052 * Called to set the size of the window
1053 */
1054 static void pty_size(void *handle, int width, int height)
1055 {
1056 Pty pty = (Pty)handle;
1057 struct winsize size;
1058
1059 pty->term_width = width;
1060 pty->term_height = height;
1061
1062 size.ws_row = (unsigned short)pty->term_height;
1063 size.ws_col = (unsigned short)pty->term_width;
1064 size.ws_xpixel = (unsigned short) pty->term_width *
1065 font_dimension(pty->frontend, 0);
1066 size.ws_ypixel = (unsigned short) pty->term_height *
1067 font_dimension(pty->frontend, 1);
1068 ioctl(pty->master_fd, TIOCSWINSZ, (void *)&size);
1069 return;
1070 }
1071
1072 /*
1073 * Send special codes.
1074 */
1075 static void pty_special(void *handle, Telnet_Special code)
1076 {
1077 /* Pty pty = (Pty)handle; */
1078 /* Do nothing! */
1079 return;
1080 }
1081
1082 /*
1083 * Return a list of the special codes that make sense in this
1084 * protocol.
1085 */
1086 static const struct telnet_special *pty_get_specials(void *handle)
1087 {
1088 /* Pty pty = (Pty)handle; */
1089 /*
1090 * Hmm. When I get round to having this actually usable, it
1091 * might be quite nice to have the ability to deliver a few
1092 * well chosen signals to the child process - SIGINT, SIGTERM,
1093 * SIGKILL at least.
1094 */
1095 return NULL;
1096 }
1097
1098 static int pty_connected(void *handle)
1099 {
1100 /* Pty pty = (Pty)handle; */
1101 return TRUE;
1102 }
1103
1104 static int pty_sendok(void *handle)
1105 {
1106 /* Pty pty = (Pty)handle; */
1107 return 1;
1108 }
1109
1110 static void pty_unthrottle(void *handle, int backlog)
1111 {
1112 /* Pty pty = (Pty)handle; */
1113 /* do nothing */
1114 }
1115
1116 static int pty_ldisc(void *handle, int option)
1117 {
1118 /* Pty pty = (Pty)handle; */
1119 return 0; /* neither editing nor echoing */
1120 }
1121
1122 static void pty_provide_ldisc(void *handle, void *ldisc)
1123 {
1124 /* Pty pty = (Pty)handle; */
1125 /* This is a stub. */
1126 }
1127
1128 static void pty_provide_logctx(void *handle, void *logctx)
1129 {
1130 /* Pty pty = (Pty)handle; */
1131 /* This is a stub. */
1132 }
1133
1134 static int pty_exitcode(void *handle)
1135 {
1136 Pty pty = (Pty)handle;
1137 if (!pty->finished)
1138 return -1; /* not dead yet */
1139 else
1140 return pty->exit_code;
1141 }
1142
1143 static int pty_cfg_info(void *handle)
1144 {
1145 /* Pty pty = (Pty)handle; */
1146 return 0;
1147 }
1148
1149 Backend pty_backend = {
1150 pty_init,
1151 pty_free,
1152 pty_reconfig,
1153 pty_send,
1154 pty_sendbuffer,
1155 pty_size,
1156 pty_special,
1157 pty_get_specials,
1158 pty_connected,
1159 pty_exitcode,
1160 pty_sendok,
1161 pty_ldisc,
1162 pty_provide_ldisc,
1163 pty_provide_logctx,
1164 pty_unthrottle,
1165 pty_cfg_info,
1166 "pty",
1167 -1,
1168 0
1169 };