aboutsummaryrefslogtreecommitdiff
path: root/src/pterm.c
blob: 050e9b2598b729af681e6b808d43ad5300eaeec8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
#include <unistd.h>
#include <sys/types.h>
#include <sys/ioctl.h>
#include <sys/stat.h>
#include <signal.h>
#include <errno.h>
#include <fcntl.h>
#include <grp.h>
#include <pwd.h>
#include <stdarg.h>
#include <string.h>
#include <termios.h>
#include <pty.h>

#include "pterm.h"
#include "log.h"

#ifndef _PATH_TTY
#define _PATH_TTY "/dev/tty"
#endif
#ifndef O_NOCTTY
#define O_NOCTTY 0
#endif


int
pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, size_t namebuflen)
{
    /* openpty(3) exists in OSF/1 and some other os'es */
    char *name;
    int i;

    i = openpty(ptyfd, ttyfd, NULL, NULL, NULL);
    if (i < 0) {
        E_STRERR("%s", "Allocate pseudo terminal");
        return 1;
    }
    name = ttyname(*ttyfd);
    if (!name) {
        E_STRERR("%s", "Invalid ttyname for pseudo terminal");
        abort();
    }

    strncpy(namebuf, name, namebuflen);	/* possible truncation */
    return 0;
}

void
pty_release(const char *tty)
{
    if (chown(tty, (uid_t) 0, (gid_t) 0) < 0) {
        E_STRERR("Change tty owner for '%s'", tty);
    }
    if (chmod(tty, (mode_t) 0666) < 0) {
        E_STRERR("Change tty mode for '%s'", tty);
    }
}

void
pty_make_controlling_tty(int *ttyfd, const char *tty)
{
    int fd;

    /* First disconnect from the old controlling tty. */
    fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
    if (fd >= 0) {
        (void) ioctl(fd, TIOCNOTTY, NULL);
        close(fd);
    }
    if (setsid() < 0)
        E_STRERR("%s", "New session");

    /*
     * Verify that we are successfully disconnected from the controlling
     * tty.
     */
    fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
    if (fd >= 0) {
        E2("%s", "Failed to disconnect from controlling tty.");
        close(fd);
    }
    /* Make it our controlling tty. */
    D("%s", "Setting controlling tty using TIOCSCTTY.");
    if (ioctl(*ttyfd, TIOCSCTTY, NULL) < 0)
        E_STRERR("%s", "ioctl(TIOCSCTTY)");
    if (setpgrp() < 0)
        E_STRERR("%s", "Set new process group");
    fd = open(tty, O_RDWR);
    if (fd < 0)
        E_STRERR("Open tty '%s'", tty);
    else
        close(fd);

    /* Verify that we now have a controlling tty. */
    fd = open(_PATH_TTY, O_WRONLY);
    if (fd < 0)
        E_STRERR("Could not set controlling tty - Open '%s'", tty);
    else
        close(fd);
}

/* Changes the window size associated with the pty. */

void
pty_change_window_size(int ptyfd, unsigned int row,
                       unsigned int col,
                       unsigned int xpixel,
                       unsigned int ypixel)
{
    struct winsize w;

    /* may truncate unsigned int -> unsigned short */
    w.ws_row = row;
    w.ws_col = col;
    w.ws_xpixel = xpixel;
    w.ws_ypixel = ypixel;
    (void) ioctl(ptyfd, TIOCSWINSZ, &w);
}

void
pty_setowner(struct passwd *pw, const char *tty)
{
    struct group *grp;
    gid_t gid;
    mode_t mode;
    struct stat st;

    /* Determine the group to make the owner of the tty. */
    grp = getgrnam("tty");
    gid = (grp != NULL) ? grp->gr_gid : pw->pw_gid;
    mode = (grp != NULL) ? 0620 : 0600;

    /*
     * Change owner and mode of the tty as required.
     * Warn but continue if filesystem is read-only and the uids match/
     * tty is owned by root.
     */
    if (stat(tty, &st))
        FATAL("Change owner of %s", tty);

#ifdef WITH_SELINUX
    ssh_selinux_setup_pty(pw->pw_name, tty);
#endif

    if (st.st_uid != pw->pw_uid || st.st_gid != gid) {
        if (chown(tty, pw->pw_uid, gid) < 0) {
            if (errno == EROFS &&
                (st.st_uid == pw->pw_uid || st.st_uid == 0))
            {
                D("Change owner of '%s' to %u:%u",
                    tty, (unsigned) pw->pw_uid,
                    (unsigned) gid);
            } else {
                FATAL("Change owner of '%s' to %u:%u",
                    tty, (unsigned) pw->pw_uid,
                    (unsigned) gid);
            }
        }
    }

    if ((st.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO)) != mode) {
        if (chmod(tty, mode) < 0) {
            if (errno == EROFS &&
                (st.st_mode & (S_IRGRP | S_IROTH)) == 0)
            {
                D("Change mode of '%s' to 0%o",
                    tty, (unsigned) mode);
            } else {
                FATAL("Change mode of '%s' to 0%o",
                    tty, (unsigned) mode);
            }
        }
    }
}

/* Disconnect from the controlling tty. */
void
disconnect_controlling_tty(void)
{
    int fd;

    if ((fd = open(_PATH_TTY, O_RDWR | O_NOCTTY)) >= 0) {
        (void) ioctl(fd, TIOCNOTTY, NULL);
        close(fd);
    }
}