28d00fe4 |
1 | /* |
2 | * Pseudo-tty backend for pterm. |
28d00fe4 |
3 | */ |
4 | |
74aca06d |
5 | #define _GNU_SOURCE |
054d8535 |
6 | |
1709795f |
7 | #include <stdio.h> |
8 | #include <stdlib.h> |
054d8535 |
9 | #include <string.h> |
10 | #include <unistd.h> |
a0e16eb1 |
11 | #include <signal.h> |
2916fa14 |
12 | #include <assert.h> |
054d8535 |
13 | #include <fcntl.h> |
88e6b9ca |
14 | #include <termios.h> |
be4f86de |
15 | #include <grp.h> |
755a6d84 |
16 | #include <utmp.h> |
17 | #include <pwd.h> |
18 | #include <time.h> |
a0e16eb1 |
19 | #include <sys/types.h> |
d4e1d591 |
20 | #include <sys/stat.h> |
a0e16eb1 |
21 | #include <sys/wait.h> |
88e6b9ca |
22 | #include <sys/ioctl.h> |
0f33f9d1 |
23 | #include <errno.h> |
1709795f |
24 | |
25 | #include "putty.h" |
d6fa1947 |
26 | #include "tree234.h" |
1709795f |
27 | |
0b1df797 |
28 | #ifndef OMIT_UTMP |
bea25c48 |
29 | #include <utmpx.h> |
30 | #endif |
31 | |
1709795f |
32 | #ifndef FALSE |
33 | #define FALSE 0 |
34 | #endif |
35 | #ifndef TRUE |
36 | #define TRUE 1 |
37 | #endif |
38 | |
bea25c48 |
39 | /* updwtmpx() needs the name of the wtmp file. Try to find it. */ |
40 | #ifndef WTMPX_FILE |
41 | #ifdef _PATH_WTMPX |
42 | #define WTMPX_FILE _PATH_WTMPX |
43 | #else |
44 | #define WTMPX_FILE "/var/log/wtmpx" |
755a6d84 |
45 | #endif |
755a6d84 |
46 | #endif |
bea25c48 |
47 | |
755a6d84 |
48 | #ifndef LASTLOG_FILE |
49 | #ifdef _PATH_LASTLOG |
50 | #define LASTLOG_FILE _PATH_LASTLOG |
51 | #else |
52 | #define LASTLOG_FILE "/var/log/lastlog" |
53 | #endif |
54 | #endif |
55 | |
f51dc031 |
56 | /* |
57 | * Set up a default for vaguely sane systems. The idea is that if |
58 | * OMIT_UTMP is not defined, then at least one of the symbols which |
59 | * enable particular forms of utmp processing should be, if only so |
60 | * that a link error can warn you that you should have defined |
61 | * OMIT_UTMP if you didn't want any. Currently HAVE_PUTUTLINE is |
62 | * the only such symbol. |
63 | */ |
64 | #ifndef OMIT_UTMP |
65 | #if !defined HAVE_PUTUTLINE |
66 | #define HAVE_PUTUTLINE |
67 | #endif |
68 | #endif |
69 | |
d6fa1947 |
70 | typedef struct pty_tag *Pty; |
71 | |
72 | /* |
73 | * The pty_signal_pipe, along with the SIGCHLD handler, must be |
74 | * process-global rather than session-specific. |
75 | */ |
76 | static int pty_signal_pipe[2] = { -1, -1 }; /* obviously bogus initial val */ |
77 | |
78 | struct pty_tag { |
4a693cfc |
79 | Conf *conf; |
d6fa1947 |
80 | int master_fd, slave_fd; |
81 | void *frontend; |
82 | char name[FILENAME_MAX]; |
115393d8 |
83 | pid_t child_pid; |
d6fa1947 |
84 | int term_width, term_height; |
85 | int child_dead, finished; |
86 | int exit_code; |
2916fa14 |
87 | bufchain output_data; |
d6fa1947 |
88 | }; |
89 | |
90 | /* |
91 | * We store our pty backends in a tree sorted by master fd, so that |
92 | * when we get an uxsel notification we know which backend instance |
93 | * is the owner of the pty that caused it. |
94 | */ |
95 | static int pty_compare_by_fd(void *av, void *bv) |
96 | { |
97 | Pty a = (Pty)av; |
98 | Pty b = (Pty)bv; |
99 | |
100 | if (a->master_fd < b->master_fd) |
101 | return -1; |
102 | else if (a->master_fd > b->master_fd) |
103 | return +1; |
104 | return 0; |
105 | } |
106 | |
107 | static int pty_find_by_fd(void *av, void *bv) |
108 | { |
109 | int a = *(int *)av; |
110 | Pty b = (Pty)bv; |
111 | |
112 | if (a < b->master_fd) |
113 | return -1; |
114 | else if (a > b->master_fd) |
115 | return +1; |
116 | return 0; |
117 | } |
054d8535 |
118 | |
d6fa1947 |
119 | static tree234 *ptys_by_fd = NULL; |
120 | |
121 | /* |
122 | * We also have a tree sorted by child pid, so that when we wait() |
123 | * in response to the signal we know which backend instance is the |
124 | * owner of the process that caused the signal. |
125 | */ |
126 | static int pty_compare_by_pid(void *av, void *bv) |
127 | { |
128 | Pty a = (Pty)av; |
129 | Pty b = (Pty)bv; |
130 | |
131 | if (a->child_pid < b->child_pid) |
132 | return -1; |
133 | else if (a->child_pid > b->child_pid) |
134 | return +1; |
135 | return 0; |
136 | } |
137 | |
138 | static int pty_find_by_pid(void *av, void *bv) |
139 | { |
115393d8 |
140 | pid_t a = *(pid_t *)av; |
d6fa1947 |
141 | Pty b = (Pty)bv; |
142 | |
143 | if (a < b->child_pid) |
144 | return -1; |
145 | else if (a > b->child_pid) |
146 | return +1; |
147 | return 0; |
148 | } |
149 | |
150 | static tree234 *ptys_by_pid = NULL; |
151 | |
152 | /* |
153 | * If we are using pty_pre_init(), it will need to have already |
154 | * allocated a pty structure, which we must then return from |
155 | * pty_init() rather than allocating a new one. Here we store that |
156 | * structure between allocation and use. |
157 | * |
158 | * Note that although most of this module is entirely capable of |
159 | * handling multiple ptys in a single process, pty_pre_init() is |
160 | * fundamentally _dependent_ on there being at most one pty per |
161 | * process, so the normal static-data constraints don't apply. |
162 | * |
163 | * Likewise, since utmp is only used via pty_pre_init, it too must |
164 | * be single-instance, so we can declare utmp-related variables |
165 | * here. |
166 | */ |
167 | static Pty single_pty = NULL; |
74aca06d |
168 | |
d4e1d591 |
169 | #ifndef OMIT_UTMP |
dd5517cb |
170 | static pid_t pty_utmp_helper_pid = -1; |
171 | static int pty_utmp_helper_pipe = -1; |
d6fa1947 |
172 | static int pty_stamped_utmp; |
bea25c48 |
173 | static struct utmpx utmp_entry; |
d6fa1947 |
174 | #endif |
175 | |
176 | /* |
177 | * pty_argv is a grievous hack to allow a proper argv to be passed |
178 | * through from the Unix command line. Again, it doesn't really |
179 | * make sense outside a one-pty-per-process setup. |
180 | */ |
181 | char **pty_argv; |
d6fa1947 |
182 | |
183 | static void pty_close(Pty pty); |
2916fa14 |
184 | static void pty_try_write(Pty pty); |
d4e1d591 |
185 | |
d6fa1947 |
186 | #ifndef OMIT_UTMP |
95c47834 |
187 | static void setup_utmp(char *ttyname, char *location) |
755a6d84 |
188 | { |
755a6d84 |
189 | #ifdef HAVE_LASTLOG |
190 | struct lastlog lastlog_entry; |
191 | FILE *lastlog; |
192 | #endif |
193 | struct passwd *pw; |
bea25c48 |
194 | struct timeval tv; |
755a6d84 |
195 | |
196 | pw = getpwuid(getuid()); |
197 | memset(&utmp_entry, 0, sizeof(utmp_entry)); |
198 | utmp_entry.ut_type = USER_PROCESS; |
199 | utmp_entry.ut_pid = getpid(); |
200 | strncpy(utmp_entry.ut_line, ttyname+5, lenof(utmp_entry.ut_line)); |
201 | strncpy(utmp_entry.ut_id, ttyname+8, lenof(utmp_entry.ut_id)); |
202 | strncpy(utmp_entry.ut_user, pw->pw_name, lenof(utmp_entry.ut_user)); |
203 | strncpy(utmp_entry.ut_host, location, lenof(utmp_entry.ut_host)); |
bea25c48 |
204 | /* |
205 | * Apparently there are some architectures where (struct |
206 | * utmpx).ut_tv is not essentially struct timeval (e.g. Linux |
207 | * amd64). Hence the temporary. |
208 | */ |
209 | gettimeofday(&tv, NULL); |
210 | utmp_entry.ut_tv.tv_sec = tv.tv_sec; |
211 | utmp_entry.ut_tv.tv_usec = tv.tv_usec; |
755a6d84 |
212 | |
bea25c48 |
213 | setutxent(); |
214 | pututxline(&utmp_entry); |
215 | endutxent(); |
216 | |
217 | updwtmpx(WTMPX_FILE, &utmp_entry); |
755a6d84 |
218 | |
219 | #ifdef HAVE_LASTLOG |
220 | memset(&lastlog_entry, 0, sizeof(lastlog_entry)); |
221 | strncpy(lastlog_entry.ll_line, ttyname+5, lenof(lastlog_entry.ll_line)); |
222 | strncpy(lastlog_entry.ll_host, location, lenof(lastlog_entry.ll_host)); |
223 | time(&lastlog_entry.ll_time); |
224 | if ((lastlog = fopen(LASTLOG_FILE, "r+")) != NULL) { |
225 | fseek(lastlog, sizeof(lastlog_entry) * getuid(), SEEK_SET); |
226 | fwrite(&lastlog_entry, 1, sizeof(lastlog_entry), lastlog); |
227 | fclose(lastlog); |
228 | } |
229 | #endif |
230 | |
f51dc031 |
231 | pty_stamped_utmp = 1; |
232 | |
755a6d84 |
233 | } |
234 | |
235 | static void cleanup_utmp(void) |
236 | { |
bea25c48 |
237 | struct timeval tv; |
755a6d84 |
238 | |
95c47834 |
239 | if (!pty_stamped_utmp) |
f51dc031 |
240 | return; |
241 | |
755a6d84 |
242 | utmp_entry.ut_type = DEAD_PROCESS; |
243 | memset(utmp_entry.ut_user, 0, lenof(utmp_entry.ut_user)); |
bea25c48 |
244 | gettimeofday(&tv, NULL); |
245 | utmp_entry.ut_tv.tv_sec = tv.tv_sec; |
246 | utmp_entry.ut_tv.tv_usec = tv.tv_usec; |
755a6d84 |
247 | |
bea25c48 |
248 | updwtmpx(WTMPX_FILE, &utmp_entry); |
755a6d84 |
249 | |
250 | memset(utmp_entry.ut_line, 0, lenof(utmp_entry.ut_line)); |
bea25c48 |
251 | utmp_entry.ut_tv.tv_sec = 0; |
252 | utmp_entry.ut_tv.tv_usec = 0; |
755a6d84 |
253 | |
bea25c48 |
254 | setutxent(); |
255 | pututxline(&utmp_entry); |
256 | endutxent(); |
755a6d84 |
257 | |
f51dc031 |
258 | pty_stamped_utmp = 0; /* ensure we never double-cleanup */ |
755a6d84 |
259 | } |
d4e1d591 |
260 | #endif |
755a6d84 |
261 | |
a0e16eb1 |
262 | static void sigchld_handler(int signum) |
263 | { |
ecb25722 |
264 | if (write(pty_signal_pipe[1], "x", 1) <= 0) |
265 | /* not much we can do about it */; |
a0e16eb1 |
266 | } |
267 | |
d4e1d591 |
268 | #ifndef OMIT_UTMP |
755a6d84 |
269 | static void fatal_sig_handler(int signum) |
270 | { |
0f33f9d1 |
271 | putty_signal(signum, SIG_DFL); |
755a6d84 |
272 | cleanup_utmp(); |
755a6d84 |
273 | raise(signum); |
274 | } |
d4e1d591 |
275 | #endif |
755a6d84 |
276 | |
d6fa1947 |
277 | static int pty_open_slave(Pty pty) |
270d2e8d |
278 | { |
89e97516 |
279 | if (pty->slave_fd < 0) { |
d6fa1947 |
280 | pty->slave_fd = open(pty->name, O_RDWR); |
db9b7dce |
281 | cloexec(pty->slave_fd); |
89e97516 |
282 | } |
270d2e8d |
283 | |
d6fa1947 |
284 | return pty->slave_fd; |
270d2e8d |
285 | } |
286 | |
d6fa1947 |
287 | static void pty_open_master(Pty pty) |
1709795f |
288 | { |
be4f86de |
289 | #ifdef BSD_PTYS |
95c47834 |
290 | const char chars1[] = "pqrstuvwxyz"; |
291 | const char chars2[] = "0123456789abcdef"; |
292 | const char *p1, *p2; |
293 | char master_name[20]; |
294 | struct group *gp; |
295 | |
296 | for (p1 = chars1; *p1; p1++) |
297 | for (p2 = chars2; *p2; p2++) { |
298 | sprintf(master_name, "/dev/pty%c%c", *p1, *p2); |
d6fa1947 |
299 | pty->master_fd = open(master_name, O_RDWR); |
300 | if (pty->master_fd >= 0) { |
95c47834 |
301 | if (geteuid() == 0 || |
270d2e8d |
302 | access(master_name, R_OK | W_OK) == 0) { |
303 | /* |
304 | * We must also check at this point that we are |
305 | * able to open the slave side of the pty. We |
306 | * wouldn't want to allocate the wrong master, |
307 | * get all the way down to forking, and _then_ |
308 | * find we're unable to open the slave. |
309 | */ |
d6fa1947 |
310 | strcpy(pty->name, master_name); |
311 | pty->name[5] = 't'; /* /dev/ptyXX -> /dev/ttyXX */ |
270d2e8d |
312 | |
db9b7dce |
313 | cloexec(pty->master_fd); |
89e97516 |
314 | |
d6fa1947 |
315 | if (pty_open_slave(pty) >= 0 && |
316 | access(pty->name, R_OK | W_OK) == 0) |
270d2e8d |
317 | goto got_one; |
d6fa1947 |
318 | if (pty->slave_fd > 0) |
319 | close(pty->slave_fd); |
320 | pty->slave_fd = -1; |
270d2e8d |
321 | } |
d6fa1947 |
322 | close(pty->master_fd); |
be4f86de |
323 | } |
95c47834 |
324 | } |
be4f86de |
325 | |
95c47834 |
326 | /* If we get here, we couldn't get a tty at all. */ |
327 | fprintf(stderr, "pterm: unable to open a pseudo-terminal device\n"); |
328 | exit(1); |
be4f86de |
329 | |
95c47834 |
330 | got_one: |
95c47834 |
331 | |
332 | /* We need to chown/chmod the /dev/ttyXX device. */ |
333 | gp = getgrnam("tty"); |
d6fa1947 |
334 | chown(pty->name, getuid(), gp ? gp->gr_gid : -1); |
335 | chmod(pty->name, 0600); |
be4f86de |
336 | #else |
193c8d4a |
337 | |
338 | const int flags = O_RDWR |
339 | #ifdef O_NOCTTY |
340 | | O_NOCTTY |
341 | #endif |
342 | ; |
343 | |
32f8db2c |
344 | #ifdef HAVE_POSIX_OPENPT |
345 | pty->master_fd = posix_openpt(flags); |
346 | |
347 | if (pty->master_fd < 0) { |
348 | perror("posix_openpt"); |
349 | exit(1); |
350 | } |
351 | #else |
193c8d4a |
352 | pty->master_fd = open("/dev/ptmx", flags); |
054d8535 |
353 | |
d6fa1947 |
354 | if (pty->master_fd < 0) { |
054d8535 |
355 | perror("/dev/ptmx: open"); |
356 | exit(1); |
357 | } |
32f8db2c |
358 | #endif |
054d8535 |
359 | |
d6fa1947 |
360 | if (grantpt(pty->master_fd) < 0) { |
054d8535 |
361 | perror("grantpt"); |
362 | exit(1); |
363 | } |
364 | |
d6fa1947 |
365 | if (unlockpt(pty->master_fd) < 0) { |
054d8535 |
366 | perror("unlockpt"); |
367 | exit(1); |
368 | } |
369 | |
db9b7dce |
370 | cloexec(pty->master_fd); |
89e97516 |
371 | |
d6fa1947 |
372 | pty->name[FILENAME_MAX-1] = '\0'; |
373 | strncpy(pty->name, ptsname(pty->master_fd), FILENAME_MAX-1); |
be4f86de |
374 | #endif |
d6fa1947 |
375 | |
2916fa14 |
376 | { |
377 | /* |
378 | * Set the pty master into non-blocking mode. |
379 | */ |
f98b8260 |
380 | int fl; |
381 | fl = fcntl(pty->master_fd, F_GETFL); |
382 | if (fl != -1 && !(fl & O_NONBLOCK)) |
383 | fcntl(pty->master_fd, F_SETFL, fl | O_NONBLOCK); |
2916fa14 |
384 | } |
385 | |
d6fa1947 |
386 | if (!ptys_by_fd) |
387 | ptys_by_fd = newtree234(pty_compare_by_fd); |
388 | add234(ptys_by_fd, pty); |
95c47834 |
389 | } |
054d8535 |
390 | |
95c47834 |
391 | /* |
392 | * Pre-initialisation. This is here to get around the fact that GTK |
393 | * doesn't like being run in setuid/setgid programs (probably |
394 | * sensibly). So before we initialise GTK - and therefore before we |
395 | * even process the command line - we check to see if we're running |
396 | * set[ug]id. If so, we open our pty master _now_, chown it as |
397 | * necessary, and drop privileges. We can always close it again |
398 | * later. If we're potentially going to be doing utmp as well, we |
399 | * also fork off a utmp helper process and communicate with it by |
400 | * means of a pipe; the utmp helper will keep privileges in order |
401 | * to clean up utmp when we exit (i.e. when its end of our pipe |
402 | * closes). |
403 | */ |
404 | void pty_pre_init(void) |
405 | { |
d6fa1947 |
406 | Pty pty; |
407 | |
d4e1d591 |
408 | #ifndef OMIT_UTMP |
95c47834 |
409 | pid_t pid; |
410 | int pipefd[2]; |
d4e1d591 |
411 | #endif |
95c47834 |
412 | |
d6fa1947 |
413 | pty = single_pty = snew(struct pty_tag); |
6db084b8 |
414 | pty->conf = NULL; |
2916fa14 |
415 | bufchain_init(&pty->output_data); |
d6fa1947 |
416 | |
0f33f9d1 |
417 | /* set the child signal handler straight away; it needs to be set |
418 | * before we ever fork. */ |
419 | putty_signal(SIGCHLD, sigchld_handler); |
d6fa1947 |
420 | pty->master_fd = pty->slave_fd = -1; |
421 | #ifndef OMIT_UTMP |
422 | pty_stamped_utmp = FALSE; |
423 | #endif |
95c47834 |
424 | |
425 | if (geteuid() != getuid() || getegid() != getgid()) { |
d6fa1947 |
426 | pty_open_master(pty); |
39baeaa4 |
427 | |
95c47834 |
428 | #ifndef OMIT_UTMP |
dd5517cb |
429 | /* |
430 | * Fork off the utmp helper. |
431 | */ |
432 | if (pipe(pipefd) < 0) { |
433 | perror("pterm: pipe"); |
434 | exit(1); |
435 | } |
436 | cloexec(pipefd[0]); |
437 | cloexec(pipefd[1]); |
438 | pid = fork(); |
439 | if (pid < 0) { |
440 | perror("pterm: fork"); |
441 | exit(1); |
442 | } else if (pid == 0) { |
443 | char display[128], buffer[128]; |
444 | int dlen, ret; |
445 | |
446 | close(pipefd[1]); |
447 | /* |
448 | * Now sit here until we receive a display name from the |
449 | * other end of the pipe, and then stamp utmp. Unstamp utmp |
450 | * again, and exit, when the pipe closes. |
451 | */ |
95c47834 |
452 | |
dd5517cb |
453 | dlen = 0; |
454 | while (1) { |
95c47834 |
455 | |
dd5517cb |
456 | ret = read(pipefd[0], buffer, lenof(buffer)); |
457 | if (ret <= 0) { |
458 | cleanup_utmp(); |
459 | _exit(0); |
460 | } else if (!pty_stamped_utmp) { |
461 | if (dlen < lenof(display)) |
462 | memcpy(display+dlen, buffer, |
463 | min(ret, lenof(display)-dlen)); |
464 | if (buffer[ret-1] == '\0') { |
465 | /* |
466 | * Now we have a display name. NUL-terminate |
467 | * it, and stamp utmp. |
468 | */ |
469 | display[lenof(display)-1] = '\0'; |
470 | /* |
471 | * Trap as many fatal signals as we can in the |
472 | * hope of having the best possible chance to |
473 | * clean up utmp before termination. We are |
474 | * unfortunately unprotected against SIGKILL, |
475 | * but that's life. |
476 | */ |
477 | putty_signal(SIGHUP, fatal_sig_handler); |
478 | putty_signal(SIGINT, fatal_sig_handler); |
479 | putty_signal(SIGQUIT, fatal_sig_handler); |
480 | putty_signal(SIGILL, fatal_sig_handler); |
481 | putty_signal(SIGABRT, fatal_sig_handler); |
482 | putty_signal(SIGFPE, fatal_sig_handler); |
483 | putty_signal(SIGPIPE, fatal_sig_handler); |
484 | putty_signal(SIGALRM, fatal_sig_handler); |
485 | putty_signal(SIGTERM, fatal_sig_handler); |
486 | putty_signal(SIGSEGV, fatal_sig_handler); |
487 | putty_signal(SIGUSR1, fatal_sig_handler); |
488 | putty_signal(SIGUSR2, fatal_sig_handler); |
755a6d84 |
489 | #ifdef SIGBUS |
dd5517cb |
490 | putty_signal(SIGBUS, fatal_sig_handler); |
755a6d84 |
491 | #endif |
492 | #ifdef SIGPOLL |
dd5517cb |
493 | putty_signal(SIGPOLL, fatal_sig_handler); |
755a6d84 |
494 | #endif |
495 | #ifdef SIGPROF |
dd5517cb |
496 | putty_signal(SIGPROF, fatal_sig_handler); |
755a6d84 |
497 | #endif |
498 | #ifdef SIGSYS |
dd5517cb |
499 | putty_signal(SIGSYS, fatal_sig_handler); |
755a6d84 |
500 | #endif |
501 | #ifdef SIGTRAP |
dd5517cb |
502 | putty_signal(SIGTRAP, fatal_sig_handler); |
755a6d84 |
503 | #endif |
504 | #ifdef SIGVTALRM |
dd5517cb |
505 | putty_signal(SIGVTALRM, fatal_sig_handler); |
755a6d84 |
506 | #endif |
507 | #ifdef SIGXCPU |
dd5517cb |
508 | putty_signal(SIGXCPU, fatal_sig_handler); |
755a6d84 |
509 | #endif |
510 | #ifdef SIGXFSZ |
dd5517cb |
511 | putty_signal(SIGXFSZ, fatal_sig_handler); |
755a6d84 |
512 | #endif |
513 | #ifdef SIGIO |
dd5517cb |
514 | putty_signal(SIGIO, fatal_sig_handler); |
515 | #endif |
516 | setup_utmp(pty->name, display); |
517 | } |
518 | } |
519 | } |
520 | } else { |
521 | close(pipefd[0]); |
522 | pty_utmp_helper_pid = pid; |
523 | pty_utmp_helper_pipe = pipefd[1]; |
524 | } |
95c47834 |
525 | #endif |
95c47834 |
526 | } |
95c47834 |
527 | |
528 | /* Drop privs. */ |
529 | { |
95c47834 |
530 | #ifndef HAVE_NO_SETRESUID |
d4e1d591 |
531 | int gid = getgid(), uid = getuid(); |
95c47834 |
532 | int setresgid(gid_t, gid_t, gid_t); |
533 | int setresuid(uid_t, uid_t, uid_t); |
04b4cc61 |
534 | if (setresgid(gid, gid, gid) < 0) { |
535 | perror("setresgid"); |
536 | exit(1); |
537 | } |
538 | if (setresuid(uid, uid, uid) < 0) { |
539 | perror("setresuid"); |
540 | exit(1); |
541 | } |
95c47834 |
542 | #else |
04b4cc61 |
543 | if (setgid(getgid()) < 0) { |
544 | perror("setgid"); |
545 | exit(1); |
546 | } |
547 | if (setuid(getuid()) < 0) { |
548 | perror("setuid"); |
549 | exit(1); |
550 | } |
95c47834 |
551 | #endif |
552 | } |
553 | } |
554 | |
d6fa1947 |
555 | int pty_real_select_result(Pty pty, int event, int status) |
74aca06d |
556 | { |
557 | char buf[4096]; |
558 | int ret; |
559 | int finished = FALSE; |
560 | |
d6fa1947 |
561 | if (event < 0) { |
74aca06d |
562 | /* |
d6fa1947 |
563 | * We've been called because our child process did |
564 | * something. `status' tells us what. |
74aca06d |
565 | */ |
d6fa1947 |
566 | if ((WIFEXITED(status) || WIFSIGNALED(status))) { |
74aca06d |
567 | /* |
d6fa1947 |
568 | * The primary child process died. We could keep |
569 | * the terminal open for remaining subprocesses to |
570 | * output to, but conventional wisdom seems to feel |
571 | * that that's the Wrong Thing for an xterm-alike, |
572 | * so we bail out now (though we don't necessarily |
573 | * _close_ the window, depending on the state of |
574 | * Close On Exit). This would be easy enough to |
575 | * change or make configurable if necessary. |
74aca06d |
576 | */ |
d6fa1947 |
577 | pty->exit_code = status; |
578 | pty->child_dead = TRUE; |
579 | del234(ptys_by_pid, pty); |
74aca06d |
580 | finished = TRUE; |
74aca06d |
581 | } |
d6fa1947 |
582 | } else { |
583 | if (event == 1) { |
74aca06d |
584 | |
d6fa1947 |
585 | ret = read(pty->master_fd, buf, sizeof(buf)); |
74aca06d |
586 | |
d6fa1947 |
587 | /* |
588 | * Clean termination condition is that either ret == 0, or ret |
589 | * < 0 and errno == EIO. Not sure why the latter, but it seems |
590 | * to happen. Boo. |
591 | */ |
592 | if (ret == 0 || (ret < 0 && errno == EIO)) { |
74aca06d |
593 | /* |
d6fa1947 |
594 | * We assume a clean exit if the pty has closed but the |
595 | * actual child process hasn't. The only way I can |
596 | * imagine this happening is if it detaches itself from |
597 | * the pty and goes daemonic - in which case the |
598 | * expected usage model would precisely _not_ be for |
599 | * the pterm window to hang around! |
74aca06d |
600 | */ |
74aca06d |
601 | finished = TRUE; |
d6fa1947 |
602 | if (!pty->child_dead) |
603 | pty->exit_code = 0; |
604 | } else if (ret < 0) { |
605 | perror("read pty master"); |
606 | exit(1); |
607 | } else if (ret > 0) { |
608 | from_backend(pty->frontend, 0, buf, ret); |
74aca06d |
609 | } |
2916fa14 |
610 | } else if (event == 2) { |
611 | /* |
612 | * Attempt to send data down the pty. |
613 | */ |
614 | pty_try_write(pty); |
615 | } |
74aca06d |
616 | } |
617 | |
d6fa1947 |
618 | if (finished && !pty->finished) { |
4a693cfc |
619 | int close_on_exit; |
620 | |
d6fa1947 |
621 | uxsel_del(pty->master_fd); |
622 | pty_close(pty); |
623 | pty->master_fd = -1; |
74aca06d |
624 | |
d6fa1947 |
625 | pty->finished = TRUE; |
74aca06d |
626 | |
627 | /* |
628 | * This is a slight layering-violation sort of hack: only |
629 | * if we're not closing on exit (COE is set to Never, or to |
630 | * Only On Clean and it wasn't a clean exit) do we output a |
631 | * `terminated' message. |
632 | */ |
4a693cfc |
633 | close_on_exit = conf_get_int(pty->conf, CONF_close_on_exit); |
634 | if (close_on_exit == FORCE_OFF || |
635 | (close_on_exit == AUTO && pty->exit_code != 0)) { |
74aca06d |
636 | char message[512]; |
8a9ec857 |
637 | message[0] = '\0'; |
d6fa1947 |
638 | if (WIFEXITED(pty->exit_code)) |
74aca06d |
639 | sprintf(message, "\r\n[pterm: process terminated with exit" |
d6fa1947 |
640 | " code %d]\r\n", WEXITSTATUS(pty->exit_code)); |
641 | else if (WIFSIGNALED(pty->exit_code)) |
74aca06d |
642 | #ifdef HAVE_NO_STRSIGNAL |
643 | sprintf(message, "\r\n[pterm: process terminated on signal" |
d6fa1947 |
644 | " %d]\r\n", WTERMSIG(pty->exit_code)); |
74aca06d |
645 | #else |
646 | sprintf(message, "\r\n[pterm: process terminated on signal" |
d6fa1947 |
647 | " %d (%.400s)]\r\n", WTERMSIG(pty->exit_code), |
648 | strsignal(WTERMSIG(pty->exit_code))); |
74aca06d |
649 | #endif |
d6fa1947 |
650 | from_backend(pty->frontend, 0, message, strlen(message)); |
74aca06d |
651 | } |
39934deb |
652 | |
d6fa1947 |
653 | notify_remote_exit(pty->frontend); |
74aca06d |
654 | } |
d6fa1947 |
655 | |
74aca06d |
656 | return !finished; |
657 | } |
658 | |
d6fa1947 |
659 | int pty_select_result(int fd, int event) |
74aca06d |
660 | { |
d6fa1947 |
661 | int ret = TRUE; |
662 | Pty pty; |
663 | |
664 | if (fd == pty_signal_pipe[0]) { |
665 | pid_t pid; |
d6fa1947 |
666 | int status; |
667 | char c[1]; |
668 | |
ecb25722 |
669 | if (read(pty_signal_pipe[0], c, 1) <= 0) |
670 | /* ignore error */; |
671 | /* ignore its value; it'll be `x' */ |
d6fa1947 |
672 | |
673 | do { |
674 | pid = waitpid(-1, &status, WNOHANG); |
675 | |
d6fa1947 |
676 | pty = find234(ptys_by_pid, &pid, pty_find_by_pid); |
677 | |
678 | if (pty) |
679 | ret = ret && pty_real_select_result(pty, -1, status); |
680 | } while (pid > 0); |
681 | } else { |
682 | pty = find234(ptys_by_fd, &fd, pty_find_by_fd); |
683 | |
684 | if (pty) |
685 | ret = ret && pty_real_select_result(pty, event, 0); |
686 | } |
687 | |
688 | return ret; |
689 | } |
690 | |
691 | static void pty_uxsel_setup(Pty pty) |
692 | { |
2916fa14 |
693 | int rwx; |
694 | |
695 | rwx = 1; /* always want to read from pty */ |
696 | if (bufchain_size(&pty->output_data)) |
697 | rwx |= 2; /* might also want to write to it */ |
698 | uxsel_set(pty->master_fd, rwx, pty_select_result); |
d6fa1947 |
699 | |
700 | /* |
701 | * In principle this only needs calling once for all pty |
702 | * backend instances, but it's simplest just to call it every |
703 | * time; uxsel won't mind. |
704 | */ |
74aca06d |
705 | uxsel_set(pty_signal_pipe[0], 1, pty_select_result); |
706 | } |
707 | |
95c47834 |
708 | /* |
709 | * Called to set up the pty. |
710 | * |
711 | * Returns an error message, or NULL on success. |
712 | * |
713 | * Also places the canonical host name into `realhost'. It must be |
714 | * freed by the caller. |
715 | */ |
4a693cfc |
716 | static const char *pty_init(void *frontend, void **backend_handle, Conf *conf, |
79bf227b |
717 | char *host, int port, char **realhost, int nodelay, |
718 | int keepalive) |
95c47834 |
719 | { |
720 | int slavefd; |
721 | pid_t pid, pgrp; |
c13772b1 |
722 | #ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */ |
7af753e6 |
723 | long windowid; |
c13772b1 |
724 | #endif |
d6fa1947 |
725 | Pty pty; |
95c47834 |
726 | |
d6fa1947 |
727 | if (single_pty) { |
728 | pty = single_pty; |
6db084b8 |
729 | assert(pty->conf == NULL); |
d6fa1947 |
730 | } else { |
731 | pty = snew(struct pty_tag); |
732 | pty->master_fd = pty->slave_fd = -1; |
733 | #ifndef OMIT_UTMP |
734 | pty_stamped_utmp = FALSE; |
735 | #endif |
736 | } |
737 | |
738 | pty->frontend = frontend; |
28d00fe4 |
739 | *backend_handle = NULL; /* we can't sensibly use this, sadly */ |
740 | |
4a693cfc |
741 | pty->conf = conf_copy(conf); |
742 | pty->term_width = conf_get_int(conf, CONF_width); |
743 | pty->term_height = conf_get_int(conf, CONF_height); |
f278d6f8 |
744 | |
d6fa1947 |
745 | if (pty->master_fd < 0) |
746 | pty_open_master(pty); |
95c47834 |
747 | |
748 | /* |
749 | * Set the backspace character to be whichever of ^H and ^? is |
750 | * specified by bksp_is_delete. |
751 | */ |
752 | { |
753 | struct termios attrs; |
d6fa1947 |
754 | tcgetattr(pty->master_fd, &attrs); |
4a693cfc |
755 | attrs.c_cc[VERASE] = conf_get_int(conf, CONF_bksp_is_delete) |
756 | ? '\177' : '\010'; |
d6fa1947 |
757 | tcsetattr(pty->master_fd, TCSANOW, &attrs); |
95c47834 |
758 | } |
759 | |
d4e1d591 |
760 | #ifndef OMIT_UTMP |
95c47834 |
761 | /* |
762 | * Stamp utmp (that is, tell the utmp helper process to do so), |
763 | * or not. |
764 | */ |
4c5b873c |
765 | if (pty_utmp_helper_pipe >= 0) { /* if it's < 0, we can't anyway */ |
766 | if (!conf_get_int(conf, CONF_stamp_utmp)) { |
767 | close(pty_utmp_helper_pipe); /* just let the child process die */ |
768 | pty_utmp_helper_pipe = -1; |
769 | } else { |
770 | char *location = get_x_display(pty->frontend); |
771 | int len = strlen(location)+1, pos = 0; /* +1 to include NUL */ |
772 | while (pos < len) { |
773 | int ret = write(pty_utmp_helper_pipe, location+pos, len - pos); |
774 | if (ret < 0) { |
775 | perror("pterm: writing to utmp helper process"); |
776 | close(pty_utmp_helper_pipe); /* arrgh, just give up */ |
777 | pty_utmp_helper_pipe = -1; |
778 | break; |
779 | } |
780 | pos += ret; |
781 | } |
95c47834 |
782 | } |
783 | } |
d4e1d591 |
784 | #endif |
755a6d84 |
785 | |
c13772b1 |
786 | #ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */ |
d6fa1947 |
787 | windowid = get_windowid(pty->frontend); |
c13772b1 |
788 | #endif |
7af753e6 |
789 | |
755a6d84 |
790 | /* |
054d8535 |
791 | * Fork and execute the command. |
792 | */ |
793 | pid = fork(); |
794 | if (pid < 0) { |
795 | perror("fork"); |
88e6b9ca |
796 | exit(1); |
054d8535 |
797 | } |
798 | |
799 | if (pid == 0) { |
054d8535 |
800 | /* |
801 | * We are the child. |
802 | */ |
d37c2d81 |
803 | |
d6fa1947 |
804 | slavefd = pty_open_slave(pty); |
d37c2d81 |
805 | if (slavefd < 0) { |
806 | perror("slave pty: open"); |
0f33f9d1 |
807 | _exit(1); |
d37c2d81 |
808 | } |
809 | |
d6fa1947 |
810 | close(pty->master_fd); |
054d8535 |
811 | fcntl(slavefd, F_SETFD, 0); /* don't close on exec */ |
812 | dup2(slavefd, 0); |
813 | dup2(slavefd, 1); |
814 | dup2(slavefd, 2); |
90f2ed42 |
815 | close(slavefd); |
054d8535 |
816 | setsid(); |
bbaa7993 |
817 | #ifdef TIOCSCTTY |
211b4228 |
818 | ioctl(0, TIOCSCTTY, 1); |
bbaa7993 |
819 | #endif |
d37c2d81 |
820 | pgrp = getpid(); |
3a7c6b9e |
821 | tcsetpgrp(0, pgrp); |
ea0716c6 |
822 | setpgid(pgrp, pgrp); |
d6fa1947 |
823 | close(open(pty->name, O_WRONLY, 0)); |
ea0716c6 |
824 | setpgid(pgrp, pgrp); |
fe9548aa |
825 | { |
4a693cfc |
826 | char *term_env_var = dupprintf("TERM=%s", |
827 | conf_get_str(conf, CONF_termtype)); |
fe9548aa |
828 | putenv(term_env_var); |
30d1257c |
829 | /* We mustn't free term_env_var, as putenv links it into the |
830 | * environment in place. |
831 | */ |
fe9548aa |
832 | } |
c13772b1 |
833 | #ifndef NOT_X_WINDOWS /* for Mac OS X native compilation */ |
7af753e6 |
834 | { |
30d1257c |
835 | char *windowid_env_var = dupprintf("WINDOWID=%ld", windowid); |
7af753e6 |
836 | putenv(windowid_env_var); |
30d1257c |
837 | /* We mustn't free windowid_env_var, as putenv links it into the |
838 | * environment in place. |
839 | */ |
7af753e6 |
840 | } |
c13772b1 |
841 | #endif |
73feed4f |
842 | { |
4a693cfc |
843 | char *key, *val; |
844 | |
845 | for (val = conf_get_str_strs(conf, CONF_environmt, NULL, &key); |
846 | val != NULL; |
847 | val = conf_get_str_strs(conf, CONF_environmt, key, &key)) { |
848 | char *varval = dupcat(key, "=", val, NULL); |
73feed4f |
849 | putenv(varval); |
850 | /* |
851 | * We must not free varval, since putenv links it |
852 | * into the environment _in place_. Weird, but |
853 | * there we go. Memory usage will be rationalised |
854 | * as soon as we exec anyway. |
855 | */ |
856 | } |
857 | } |
858 | |
8bf5c419 |
859 | /* |
203abf9e |
860 | * SIGINT, SIGQUIT and SIGPIPE may have been set to ignored by |
861 | * our parent, particularly by things like sh -c 'pterm &' and |
862 | * some window or session managers. SIGCHLD, meanwhile, was |
863 | * blocked during pt_main() startup. Reverse all this for our |
864 | * child process. |
8bf5c419 |
865 | */ |
0f33f9d1 |
866 | putty_signal(SIGINT, SIG_DFL); |
867 | putty_signal(SIGQUIT, SIG_DFL); |
203abf9e |
868 | putty_signal(SIGPIPE, SIG_DFL); |
15b5d988 |
869 | block_signal(SIGCHLD, 0); |
34826e4a |
870 | if (pty_argv) { |
871 | /* |
872 | * Exec the exact argument list we were given. |
873 | */ |
6169c758 |
874 | execvp(pty_argv[0], pty_argv); |
34826e4a |
875 | /* |
876 | * If that fails, and if we had exactly one argument, pass |
877 | * that argument to $SHELL -c. |
878 | * |
879 | * This arranges that we can _either_ follow 'pterm -e' |
880 | * with a list of argv elements to be fed directly to |
881 | * exec, _or_ with a single argument containing a command |
882 | * to be parsed by a shell (but, in cases of doubt, the |
883 | * former is more reliable). |
884 | * |
885 | * A quick survey of other terminal emulators' -e options |
886 | * (as of Debian squeeze) suggests that: |
887 | * |
888 | * - xterm supports both modes, more or less like this |
889 | * - gnome-terminal will only accept a one-string shell command |
890 | * - Eterm, kterm and rxvt will only accept a list of |
891 | * argv elements (as did older versions of pterm). |
892 | * |
893 | * It therefore seems important to support both usage |
894 | * modes in order to be a drop-in replacement for either |
895 | * xterm or gnome-terminal, and hence for anyone's |
896 | * plausible uses of the Debian-style alias |
897 | * 'x-terminal-emulator'... |
898 | */ |
899 | if (pty_argv[1] == NULL) { |
900 | char *shell = getenv("SHELL"); |
901 | if (shell) |
902 | execl(shell, shell, "-c", pty_argv[0], (void *)NULL); |
903 | } |
904 | } else { |
c8ee61b9 |
905 | char *shell = getenv("SHELL"); |
906 | char *shellname; |
4a693cfc |
907 | if (conf_get_int(conf, CONF_login_shell)) { |
c8ee61b9 |
908 | char *p = strrchr(shell, '/'); |
3d88e64d |
909 | shellname = snewn(2+strlen(shell), char); |
c8ee61b9 |
910 | p = p ? p+1 : shell; |
911 | sprintf(shellname, "-%s", p); |
912 | } else |
913 | shellname = shell; |
30264db9 |
914 | execl(getenv("SHELL"), shellname, (void *)NULL); |
c8ee61b9 |
915 | } |
916 | |
054d8535 |
917 | /* |
918 | * If we're here, exec has gone badly foom. |
919 | */ |
920 | perror("exec"); |
0f33f9d1 |
921 | _exit(127); |
054d8535 |
922 | } else { |
d6fa1947 |
923 | pty->child_pid = pid; |
924 | pty->child_dead = FALSE; |
925 | pty->finished = FALSE; |
926 | if (pty->slave_fd > 0) |
927 | close(pty->slave_fd); |
928 | if (!ptys_by_pid) |
929 | ptys_by_pid = newtree234(pty_compare_by_pid); |
930 | add234(ptys_by_pid, pty); |
270d2e8d |
931 | } |
054d8535 |
932 | |
90f2ed42 |
933 | if (pty_signal_pipe[0] < 0) { |
934 | if (pipe(pty_signal_pipe) < 0) { |
935 | perror("pipe"); |
936 | exit(1); |
937 | } |
938 | cloexec(pty_signal_pipe[0]); |
939 | cloexec(pty_signal_pipe[1]); |
74aca06d |
940 | } |
d6fa1947 |
941 | pty_uxsel_setup(pty); |
942 | |
943 | *backend_handle = pty; |
74aca06d |
944 | |
5617c1e6 |
945 | *realhost = dupprintf("\0"); |
946 | |
1709795f |
947 | return NULL; |
948 | } |
949 | |
4a693cfc |
950 | static void pty_reconfig(void *handle, Conf *conf) |
86916870 |
951 | { |
d6fa1947 |
952 | Pty pty = (Pty)handle; |
6b0eeb4e |
953 | /* |
954 | * We don't have much need to reconfigure this backend, but |
955 | * unfortunately we do need to pick up the setting of Close On |
956 | * Exit so we know whether to give a `terminated' message. |
957 | */ |
4a693cfc |
958 | conf_copy_into(pty->conf, conf); |
86916870 |
959 | } |
960 | |
961 | /* |
6b0eeb4e |
962 | * Stub routine (never called in pterm). |
cb60dcb3 |
963 | */ |
964 | static void pty_free(void *handle) |
965 | { |
d6fa1947 |
966 | Pty pty = (Pty)handle; |
967 | |
968 | /* Either of these may fail `not found'. That's fine with us. */ |
969 | del234(ptys_by_pid, pty); |
970 | del234(ptys_by_fd, pty); |
971 | |
6db084b8 |
972 | conf_free(pty->conf); |
973 | pty->conf = NULL; |
974 | |
975 | if (pty == single_pty) { |
976 | /* |
977 | * Leave this structure around in case we need to Restart |
978 | * Session. |
979 | */ |
980 | } else { |
981 | sfree(pty); |
982 | } |
cb60dcb3 |
983 | } |
984 | |
2916fa14 |
985 | static void pty_try_write(Pty pty) |
986 | { |
987 | void *data; |
988 | int len, ret; |
989 | |
990 | assert(pty->master_fd >= 0); |
991 | |
992 | while (bufchain_size(&pty->output_data) > 0) { |
993 | bufchain_prefix(&pty->output_data, &data, &len); |
994 | ret = write(pty->master_fd, data, len); |
995 | |
996 | if (ret < 0 && (errno == EWOULDBLOCK)) { |
997 | /* |
998 | * We've sent all we can for the moment. |
999 | */ |
1000 | break; |
1001 | } |
1002 | if (ret < 0) { |
1003 | perror("write pty master"); |
1004 | exit(1); |
1005 | } |
1006 | bufchain_consume(&pty->output_data, ret); |
1007 | } |
1008 | |
1009 | pty_uxsel_setup(pty); |
1010 | } |
1011 | |
cb60dcb3 |
1012 | /* |
1709795f |
1013 | * Called to send data down the pty. |
1014 | */ |
28d00fe4 |
1015 | static int pty_send(void *handle, char *buf, int len) |
1709795f |
1016 | { |
d6fa1947 |
1017 | Pty pty = (Pty)handle; |
1018 | |
1019 | if (pty->master_fd < 0) |
2916fa14 |
1020 | return 0; /* ignore all writes if fd closed */ |
90cfd8f4 |
1021 | |
2916fa14 |
1022 | bufchain_add(&pty->output_data, buf, len); |
1023 | pty_try_write(pty); |
1024 | |
1025 | return bufchain_size(&pty->output_data); |
1709795f |
1026 | } |
1027 | |
d6fa1947 |
1028 | static void pty_close(Pty pty) |
90cfd8f4 |
1029 | { |
d6fa1947 |
1030 | if (pty->master_fd >= 0) { |
1031 | close(pty->master_fd); |
1032 | pty->master_fd = -1; |
90cfd8f4 |
1033 | } |
d4e1d591 |
1034 | #ifndef OMIT_UTMP |
58dcb876 |
1035 | if (pty_utmp_helper_pipe >= 0) { |
1036 | close(pty_utmp_helper_pipe); /* this causes utmp to be cleaned up */ |
1037 | pty_utmp_helper_pipe = -1; |
1038 | } |
d4e1d591 |
1039 | #endif |
90cfd8f4 |
1040 | } |
1041 | |
1709795f |
1042 | /* |
1043 | * Called to query the current socket sendability status. |
1044 | */ |
28d00fe4 |
1045 | static int pty_sendbuffer(void *handle) |
1709795f |
1046 | { |
d6fa1947 |
1047 | /* Pty pty = (Pty)handle; */ |
1709795f |
1048 | return 0; |
1049 | } |
1050 | |
1051 | /* |
1052 | * Called to set the size of the window |
1053 | */ |
28d00fe4 |
1054 | static void pty_size(void *handle, int width, int height) |
1709795f |
1055 | { |
d6fa1947 |
1056 | Pty pty = (Pty)handle; |
88e6b9ca |
1057 | struct winsize size; |
1058 | |
d6fa1947 |
1059 | pty->term_width = width; |
1060 | pty->term_height = height; |
f278d6f8 |
1061 | |
d6fa1947 |
1062 | size.ws_row = (unsigned short)pty->term_height; |
1063 | size.ws_col = (unsigned short)pty->term_width; |
1064 | size.ws_xpixel = (unsigned short) pty->term_width * |
1065 | font_dimension(pty->frontend, 0); |
1066 | size.ws_ypixel = (unsigned short) pty->term_height * |
1067 | font_dimension(pty->frontend, 1); |
1068 | ioctl(pty->master_fd, TIOCSWINSZ, (void *)&size); |
1709795f |
1069 | return; |
1070 | } |
1071 | |
1072 | /* |
1073 | * Send special codes. |
1074 | */ |
28d00fe4 |
1075 | static void pty_special(void *handle, Telnet_Special code) |
1709795f |
1076 | { |
d6fa1947 |
1077 | /* Pty pty = (Pty)handle; */ |
1709795f |
1078 | /* Do nothing! */ |
1079 | return; |
1080 | } |
1081 | |
125105d1 |
1082 | /* |
1083 | * Return a list of the special codes that make sense in this |
1084 | * protocol. |
1085 | */ |
1086 | static const struct telnet_special *pty_get_specials(void *handle) |
1087 | { |
d6fa1947 |
1088 | /* Pty pty = (Pty)handle; */ |
125105d1 |
1089 | /* |
1090 | * Hmm. When I get round to having this actually usable, it |
1091 | * might be quite nice to have the ability to deliver a few |
1092 | * well chosen signals to the child process - SIGINT, SIGTERM, |
1093 | * SIGKILL at least. |
1094 | */ |
1095 | return NULL; |
1096 | } |
1097 | |
6226c939 |
1098 | static int pty_connected(void *handle) |
1709795f |
1099 | { |
d6fa1947 |
1100 | /* Pty pty = (Pty)handle; */ |
6226c939 |
1101 | return TRUE; |
1709795f |
1102 | } |
1103 | |
28d00fe4 |
1104 | static int pty_sendok(void *handle) |
1709795f |
1105 | { |
d6fa1947 |
1106 | /* Pty pty = (Pty)handle; */ |
1709795f |
1107 | return 1; |
1108 | } |
1109 | |
28d00fe4 |
1110 | static void pty_unthrottle(void *handle, int backlog) |
1709795f |
1111 | { |
d6fa1947 |
1112 | /* Pty pty = (Pty)handle; */ |
1709795f |
1113 | /* do nothing */ |
1114 | } |
1115 | |
28d00fe4 |
1116 | static int pty_ldisc(void *handle, int option) |
1709795f |
1117 | { |
d6fa1947 |
1118 | /* Pty pty = (Pty)handle; */ |
1709795f |
1119 | return 0; /* neither editing nor echoing */ |
1120 | } |
1121 | |
b9d7bcad |
1122 | static void pty_provide_ldisc(void *handle, void *ldisc) |
1123 | { |
d6fa1947 |
1124 | /* Pty pty = (Pty)handle; */ |
b9d7bcad |
1125 | /* This is a stub. */ |
1126 | } |
1127 | |
a8327734 |
1128 | static void pty_provide_logctx(void *handle, void *logctx) |
1129 | { |
d6fa1947 |
1130 | /* Pty pty = (Pty)handle; */ |
a8327734 |
1131 | /* This is a stub. */ |
1132 | } |
1133 | |
28d00fe4 |
1134 | static int pty_exitcode(void *handle) |
1709795f |
1135 | { |
d6fa1947 |
1136 | Pty pty = (Pty)handle; |
1137 | if (!pty->finished) |
90cfd8f4 |
1138 | return -1; /* not dead yet */ |
1139 | else |
d6fa1947 |
1140 | return pty->exit_code; |
1709795f |
1141 | } |
1142 | |
f89c3294 |
1143 | static int pty_cfg_info(void *handle) |
1144 | { |
d6fa1947 |
1145 | /* Pty pty = (Pty)handle; */ |
f89c3294 |
1146 | return 0; |
1147 | } |
1148 | |
1709795f |
1149 | Backend pty_backend = { |
1150 | pty_init, |
cb60dcb3 |
1151 | pty_free, |
86916870 |
1152 | pty_reconfig, |
1709795f |
1153 | pty_send, |
1154 | pty_sendbuffer, |
1155 | pty_size, |
1156 | pty_special, |
125105d1 |
1157 | pty_get_specials, |
6226c939 |
1158 | pty_connected, |
1709795f |
1159 | pty_exitcode, |
1160 | pty_sendok, |
1161 | pty_ldisc, |
b9d7bcad |
1162 | pty_provide_ldisc, |
a8327734 |
1163 | pty_provide_logctx, |
1709795f |
1164 | pty_unthrottle, |
f89c3294 |
1165 | pty_cfg_info, |
9e164d82 |
1166 | "pty", |
1167 | -1, |
a4451dd1 |
1168 | 0 |
1709795f |
1169 | }; |