blob: 0b81dea19416ebf997c706d5933992d1caf2a6e7 [file] [log] [blame]
#include <stdio.h>
#include <stdarg.h>
#include <unistd.h>
#include <getopt.h>
#include <dirent.h>
#include <pwd.h>
#include <errno.h>
#include <sys/ioctl.h>
#include <sys/stat.h>
#include <sys/vt.h>
#include <sys/wait.h>
#include <sys/file.h>
#include "version.h"
#include "xmalloc.h"
#include "getfd.h"
#ifndef NAME_MAX
#define NAME_MAX 255
#endif
// There must be a universal way to find these!
#define TRUE (1)
#define FALSE (0)
#ifdef ESIX_5_3_2_D
#define VTBASE "/dev/vt%02d"
#endif
// Where your VTs are hidden
#ifdef __linux__
#define VTNAME "/dev/tty%d"
#define VTNAME2 "/dev/vc/%d"
#endif
#ifndef VTNAME
#error vt device name must be defined in openvt.h
#endif
static void
__attribute__ ((noreturn))
print_help(int ret)
{
printf(_("Usage: %s [OPTIONS] -- command\n"
"\n"
"This utility help you to start a program on a new virtual terminal (VT).\n"
"\n"
"Options:\n"
" -c, --console=NUM use the given VT number;\n"
" -e, --exec execute the command, without forking;\n"
" -f, --force force opening a VT without checking;\n"
" -l, --login make the command a login shell;\n"
" -u, --user figure out the owner of the current VT;\n"
" -s, --switch switch to the new VT;\n"
" -w, --wait wait for command to complete;\n"
" -v, --verbose print a message for each action;\n"
" -V, --version print program version and exit;\n"
" -h, --help output a brief help message.\n"
"\n"), progname);
exit(ret);
}
static void
__attribute__ ((format (printf, 1, 2)))
openvt_message(const char *fmt, ...) {
va_list ap;
va_start(ap, fmt);
fprintf(stderr, "%s: ", progname);
vfprintf(stderr, fmt, ap);
fprintf(stderr, "\n");
va_end(ap);
fflush(stderr);
}
static void
__attribute__ ((noreturn))
__attribute__ ((format (printf, 3, 4)))
openvt_fatal(const int exitnum, const int errnum, const char *fmt, ...) {
va_list ap;
va_start(ap, fmt);
fprintf(stderr, "%s: ", progname);
vfprintf(stderr, fmt, ap);
va_end(ap);
if (errnum > 0)
fprintf(stderr, ": %s", strerror(errnum));
fprintf(stderr, "\n");
fflush(stderr);
exit(exitnum);
}
/*
* Support for Spawn_Console: openvt running from init
* added by Joshua Spoerri, Thu Jul 18 21:13:16 EDT 1996
*
* -u Figure out the owner of the current VT, and run
* login as that user. Suitable to be called by init.
* Shouldn't be used with -c or -l.
* Sample inittab line:
* kb::kbrequest:/usr/bin/openvt -us
*
* It is the job of authenticate_user() to find out who
* produced this keyboard signal. It is called only as root.
*
* Note that there is a race condition: curvt may not be the vt
* from which the keyboard signal was produced.
* (Possibly the signal was not produced at the keyboard at all,
* but by a "kill -SIG 1". However, only root can do this.)
*
* Conclusion: do not use this in high security environments.
* Or fix the code below to be more suspicious.
*
* Maybe it is better to just start a login at the new vt,
* instead of pre-authenticating the user with "login -f".
*/
static char *
authenticate_user(int curvt)
{
DIR *dp;
struct dirent *dentp;
struct stat buf;
dev_t console_dev;
ino_t console_ino;
uid_t console_uid;
char filename[NAME_MAX + 12];
struct passwd *pwnam;
if (!(dp = opendir("/proc")))
openvt_fatal(1, errno, "opendir(/proc)");
/* get the current tty */
/* try /dev/ttyN, then /dev/vc/N */
sprintf(filename, VTNAME, curvt);
if (stat(filename, &buf)) {
int errsv = errno;
sprintf(filename, VTNAME2, curvt);
if (stat(filename, &buf)) {
/* give error message for first attempt */
sprintf(filename, VTNAME, curvt);
openvt_fatal(1, errsv, "%s", filename);
}
}
console_dev = buf.st_dev;
console_ino = buf.st_ino;
console_uid = buf.st_uid;
/* get the owner of current tty */
if (!(pwnam = getpwuid(console_uid)))
openvt_fatal(1, errno, "getpwuid");
/* check to make sure that user has a process on that tty */
/* this will fail for example when X is running on the tty */
while ((dentp = readdir(dp))) {
sprintf(filename, "/proc/%s/fd/0", dentp->d_name);
if (stat(filename, &buf))
continue;
if (buf.st_dev == console_dev && buf.st_ino == console_ino && buf.st_uid == console_uid)
goto got_a_process;
}
openvt_fatal(1, 0, _("Couldn't find owner of current tty!"));
got_a_process:
return pwnam->pw_name;
}
static int
open_vt(char *vtname, int force)
{
int fd;
if ((fd = open(vtname, O_RDWR)) == -1)
return -1;
if (ioctl(fd, TIOCSCTTY, force) == -1) {
close(fd);
return -1;
}
return fd;
}
int
main(int argc, char *argv[])
{
int opt, pid, i;
struct vt_stat vtstat;
int vtno = -1;
int fd = -1;
int consfd = -1;
int force = 0;
char optc = FALSE;
char show = FALSE;
char login = FALSE;
char verbose = FALSE;
char direct_exec = FALSE;
char do_wait = FALSE;
char as_user = FALSE;
char vtname[sizeof(VTNAME) + 2]; /* allow 999 possible VTs */
char *cmd = NULL, *def_cmd = NULL, *username = NULL;
struct option long_options[] = {
{ "help", no_argument, 0, 'h' },
{ "version", no_argument, 0, 'V' },
{ "verbose", no_argument, 0, 'v' },
{ "exec", no_argument, 0, 'e' },
{ "force", no_argument, 0, 'f' },
{ "login", no_argument, 0, 'l' },
{ "user", no_argument, 0, 'u' },
{ "switch", no_argument, 0, 's' },
{ "wait", no_argument, 0, 'w' },
{ "console", required_argument, 0, 'c' },
{ 0, 0, 0, 0 }
};
set_progname(argv[0]);
setlocale(LC_ALL, "");
bindtextdomain(PACKAGE_NAME, LOCALEDIR);
textdomain(PACKAGE_NAME);
while ((opt = getopt_long(argc, argv, "c:lsfuewhvV", long_options, NULL)) != -1) {
switch (opt) {
case 'c':
optc = 1; /* vtno was specified by the user */
vtno = (int)atol(optarg);
if (vtno <= 0 || vtno > 63)
openvt_fatal(5, 0, _("%s: Illegal vt number"), optarg);
/* close security holes - until we can do this safely */
(void)setuid(getuid());
break;
case 'l':
login = TRUE;
break;
case 's':
show = TRUE;
break;
case 'v':
verbose = TRUE;
break;
case 'f':
force = 1;
break;
case 'e':
direct_exec = TRUE;
break;
case 'w':
do_wait = TRUE;
break;
case 'u':
/* we'll let 'em get away with the meaningless -ul combo */
if (getuid())
openvt_fatal(EXIT_FAILURE, 0, _("Only root can use the -u flag."));
as_user = TRUE;
break;
case 'V':
print_version_and_exit();
break;
default:
case 'h':
print_help(EXIT_SUCCESS);
break;
}
}
for (i = 0; i < 3; i++) {
struct stat st;
if (fstat(i, &st) == -1 && open("/dev/null", O_RDWR) == -1)
openvt_fatal(EXIT_FAILURE, errno, "open(/dev/null)");
}
if ((consfd = getfd(NULL)) < 0)
openvt_fatal(2, 0, _("Couldn't get a file descriptor referring to the console"));
if (ioctl(consfd, VT_GETSTATE, &vtstat) < 0)
openvt_fatal(4, errno, "ioctl(VT_GETSTATE)");
if (vtno == -1) {
if (ioctl(consfd, VT_OPENQRY, &vtno) < 0 || vtno == -1)
openvt_fatal(3, errno, _("Cannot find a free vt"));
} else if (!force) {
if (vtno >= 16)
openvt_fatal(7, 0, _("Cannot check whether vt %d is free; use `%s -f' to force."),
vtno, progname);
if (vtstat.v_state & (1 << vtno))
openvt_fatal(7, 0, _("vt %d is in use; command aborted; use `%s -f' to force."),
vtno, progname);
}
if (as_user)
username = authenticate_user(vtstat.v_active);
else {
if (!(argc > optind)) {
def_cmd = getenv("SHELL");
if (def_cmd == NULL)
openvt_fatal(7, 0, _("Unable to find command."));
cmd = xmalloc(strlen(def_cmd) + 2);
} else {
cmd = xmalloc(strlen(argv[optind]) + 2);
}
if (login)
strcpy(cmd, "-");
else
cmd[0] = '\0';
if (def_cmd)
strcat(cmd, def_cmd);
else
strcat(cmd, argv[optind]);
if (login)
argv[optind] = cmd++;
}
if (direct_exec || ((pid = fork()) == 0)) {
/* leave current vt */
if (!direct_exec) {
#ifdef ESIX_5_3_2_D
#ifdef HAVE_SETPGRP
if (setpgrp() < 0)
#else
if (1)
#endif /* HAVE_SETPGRP */
#else
if (setsid() < 0)
#endif /* ESIX_5_3_2_D */
openvt_fatal(5, errno, _("Unable to set new session"));
}
sprintf(vtname, VTNAME, vtno);
/* Can we open the vt we want? */
if ((fd = open_vt(vtname, force)) == -1) {
int errsv = errno;
if (!optc) {
/* We found vtno ourselves - it is free according
to the kernel, but we cannot open it. Maybe X
used it and did a chown. Try a few vt's more
before giving up. Note: the 16 is a kernel limitation. */
for (i = vtno + 1; i < 16; i++) {
if ((vtstat.v_state & (1 << i)) == 0) {
sprintf(vtname, VTNAME, i);
if ((fd = open_vt(vtname, force)) >= 0) {
vtno = i;
goto got_vtno;
}
}
}
sprintf(vtname, VTNAME, vtno);
}
openvt_fatal(5, errsv, _("Unable to open %s"), vtname);
}
got_vtno:
if (verbose)
openvt_message(_("Using VT %s"), vtname);
/* Maybe we are suid root, and the -c option was given.
Check that the real user can access this VT.
We assume getty has made any in use VT non accessable */
if (access(vtname, R_OK | W_OK) < 0)
openvt_fatal(5, errno, _("Cannot open %s read/write"), vtname);
if (!as_user && !geteuid()) {
uid_t uid = getuid();
if (chown(vtname, uid, getgid()) == -1)
openvt_fatal(5, errno, "chown");
setuid(uid);
}
if (show) {
if (ioctl(fd, VT_ACTIVATE, vtno))
openvt_fatal(1, errno, _("Couldn't activate vt %d"), vtno);
if (ioctl(fd, VT_WAITACTIVE, vtno))
openvt_fatal(1, errno, _("Activation interrupted?"));
}
close(0);
close(1);
close(2);
close(consfd);
if ((dup2(fd, 0) == -1) || (dup2(fd, 1) == -1) || (dup2(fd, 2) == -1))
openvt_fatal(1, errno, "dup");
/* slight problem: after "openvt -su" has finished, the
utmp entry is not removed */
if (as_user)
execlp("login", "login", "-f", username, NULL);
else if (def_cmd)
execlp(cmd, def_cmd, NULL);
else
execvp(cmd, &argv[optind]);
openvt_fatal(127, errno, "exec");
}
if (pid < 0)
openvt_fatal(6, errno, "fork");
if (do_wait) {
int retval = 0; /* actual value returned form process */
wait(NULL);
waitpid(pid, &retval, 0);
if (show) { /* Switch back... */
if (ioctl(consfd, VT_ACTIVATE, vtstat.v_active))
openvt_fatal(8, errno, "ioctl(VT_ACTIVATE)");
/* wait to be really sure we have switched */
if (ioctl(consfd, VT_WAITACTIVE, vtstat.v_active))
openvt_fatal(8, errno, "ioctl(VT_WAITACTIVE)");
if (ioctl(consfd, VT_DISALLOCATE, vtno))
openvt_fatal(8, 0, _("Couldn't deallocate console %d"), vtno);
}
/* if all our stuff went right, we want to return the exit code of the command we ran
super vital for scripting loops etc */
return(retval);
}
return EXIT_SUCCESS;
}