]> git.proxmox.com Git - mirror_lxc.git/blame - src/lxc/terminal.c
file_utils: add fd_make_nonblocking helper
[mirror_lxc.git] / src / lxc / terminal.c
CommitLineData
cc73685d 1/* SPDX-License-Identifier: LGPL-2.1+ */
b0a33c1e 2
1160ce89
CB
3#include "config.h"
4
9395937a
CB
5#include <errno.h>
6#include <fcntl.h>
b467714b 7#include <pthread.h>
b5159817 8#include <signal.h>
b0a33c1e 9#include <stdio.h>
e0dc0de7 10#include <stdlib.h>
da41561c
CB
11#include <sys/epoll.h>
12#include <sys/types.h>
e62912bd
CB
13#include <termios.h>
14#include <unistd.h>
f2363e38 15
12ae2a33
CB
16#include "lxc.h"
17
9395937a
CB
18#include "af_unix.h"
19#include "caps.h"
20#include "commands.h"
00dbc43e 21#include "conf.h"
9395937a 22#include "log.h"
b5159817 23#include "lxclock.h"
9395937a 24#include "mainloop.h"
2530ba95 25#include "memory_utils.h"
589a930f 26#include "open_utils.h"
e62912bd 27#include "start.h"
303037d2 28#include "syscall_wrappers.h"
0ed9b1bc 29#include "terminal.h"
b5159817 30#include "utils.h"
36eb9bde 31
35eb5cdc 32#if HAVE_OPENPTY
e827ff7e
SG
33#include <pty.h>
34#else
58db1a61 35#include "openpty.h"
e827ff7e
SG
36#endif
37
de708fb7 38#define LXC_TERMINAL_BUFFER_SIZE 1024
732375f5 39
2083d59d 40lxc_log_define(terminal, lxc);
36eb9bde 41
4e9c0330 42void lxc_terminal_winsz(int srcfd, int dstfd)
b5159817 43{
0519b5cc 44 int ret;
b5159817 45 struct winsize wsz;
0519b5cc
CB
46
47 if (!isatty(srcfd))
48 return;
49
50 ret = ioctl(srcfd, TIOCGWINSZ, &wsz);
51 if (ret < 0) {
52 WARN("Failed to get window size");
53 return;
724e753c 54 }
0519b5cc
CB
55
56 ret = ioctl(dstfd, TIOCSWINSZ, &wsz);
57 if (ret < 0)
58 WARN("Failed to set window size");
59 else
60 DEBUG("Set window size to %d columns and %d rows", wsz.ws_col,
61 wsz.ws_row);
62
63 return;
b5159817 64}
724e753c 65
5b55021f 66static void lxc_terminal_winch(struct lxc_terminal_state *ts)
b5159817 67{
36a94ce8 68 lxc_terminal_winsz(ts->stdinfd, ts->ptxfd);
b5159817 69}
cd453b38 70
9bafc8cb 71int lxc_terminal_signalfd_cb(int fd, uint32_t events, void *cbdata,
3298b37d 72 struct lxc_async_descr *descr)
b5159817 73{
1349e92e 74 ssize_t ret;
b5159817 75 struct signalfd_siginfo siginfo;
5b55021f 76 struct lxc_terminal_state *ts = cbdata;
b5159817 77
72f7c19b 78 ret = lxc_read_nointr(fd, &siginfo, sizeof(siginfo));
0d4137cc 79 if (ret < 0 || (size_t)ret < sizeof(siginfo)) {
0519b5cc 80 ERROR("Failed to read signal info");
2e943b7b 81 return LXC_MAINLOOP_ERROR;
cd453b38
DL
82 }
83
1349e92e 84 if (siginfo.ssi_signo == SIGTERM) {
9bafc8cb 85 DEBUG("Received SIGTERM. Detaching from the terminal");
a529bc25 86 return LXC_MAINLOOP_CLOSE;
1349e92e
CB
87 }
88
89 if (siginfo.ssi_signo == SIGWINCH)
7a10164a 90 lxc_terminal_winch(ts);
1349e92e 91
2e943b7b 92 return LXC_MAINLOOP_CONTINUE;
b5159817
DE
93}
94
5b55021f 95struct lxc_terminal_state *lxc_terminal_signal_init(int srcfd, int dstfd)
b5159817 96{
f62cf1d4 97 __do_close int signal_fd = -EBADF;
28327a43 98 __do_free struct lxc_terminal_state *ts = NULL;
28327a43 99 int ret;
b5159817 100 sigset_t mask;
b5159817
DE
101
102 ts = malloc(sizeof(*ts));
103 if (!ts)
104 return NULL;
105
106 memset(ts, 0, sizeof(*ts));
341c2aed 107 ts->stdinfd = srcfd;
36a94ce8 108 ts->ptxfd = dstfd;
341c2aed 109 ts->sigfd = -1;
b5159817 110
b6d5de95
CB
111 ret = sigemptyset(&mask);
112 if (ret < 0) {
113 SYSERROR("Failed to initialize an empty signal set");
1ba4ae89 114 return NULL;
b6d5de95 115 }
1349e92e 116
1ba4ae89 117 if (isatty(srcfd)) {
b6d5de95
CB
118 ret = sigaddset(&mask, SIGWINCH);
119 if (ret < 0)
7874d81a 120 SYSNOTICE("Failed to add SIGWINCH to signal set");
1ba4ae89
CB
121 } else {
122 INFO("fd %d does not refer to a tty device", srcfd);
25964232
LF
123 }
124
1349e92e 125 /* Exit the mainloop cleanly on SIGTERM. */
b6d5de95
CB
126 ret = sigaddset(&mask, SIGTERM);
127 if (ret < 0) {
128 SYSERROR("Failed to add SIGWINCH to signal set");
1ba4ae89 129 return NULL;
b6d5de95 130 }
b5159817 131
b467714b 132 ret = pthread_sigmask(SIG_BLOCK, &mask, &ts->oldmask);
1349e92e
CB
133 if (ret < 0) {
134 WARN("Failed to block signals");
1ba4ae89 135 return NULL;
b5159817
DE
136 }
137
1ba4ae89
CB
138 signal_fd = signalfd(-1, &mask, SFD_CLOEXEC);
139 if (signal_fd < 0) {
1349e92e 140 WARN("Failed to create signal fd");
b467714b 141 (void)pthread_sigmask(SIG_SETMASK, &ts->oldmask, NULL);
1ba4ae89 142 return NULL;
1349e92e 143 }
1ba4ae89
CB
144 ts->sigfd = move_fd(signal_fd);
145 TRACE("Created signal fd %d", ts->sigfd);
b6d5de95 146
1ba4ae89 147 return move_ptr(ts);
cd453b38
DL
148}
149
3e3f79bd
CB
150int lxc_terminal_signal_sigmask_safe_blocked(struct lxc_terminal *terminal)
151{
152 struct lxc_terminal_state *state = terminal->tty_state;
153
154 if (!state)
155 return 0;
156
157 return pthread_sigmask(SIG_SETMASK, &state->oldmask, NULL);
158}
159
26ed61e0
CB
160/**
161 * lxc_terminal_signal_fini: uninstall signal handler
162 *
163 * @terminal: terminal instance
164 *
165 * Restore the saved signal handler that was in effect at the time
166 * lxc_terminal_signal_init() was called.
167 */
168static void lxc_terminal_signal_fini(struct lxc_terminal *terminal)
63376d7d 169{
28327a43 170 struct lxc_terminal_state *state = terminal->tty_state;
1349e92e 171
28327a43
CB
172 if (!terminal->tty_state)
173 return;
174
175 state = terminal->tty_state;
176 if (state->sigfd >= 0) {
177 close(state->sigfd);
178
179 if (pthread_sigmask(SIG_SETMASK, &state->oldmask, NULL) < 0)
a24c5678 180 SYSWARN("Failed to restore signal mask");
0e6da90b 181 }
0d4137cc 182
28327a43
CB
183 free(terminal->tty_state);
184 terminal->tty_state = NULL;
b5159817 185}
1560f6c9 186
99a04585 187static int lxc_terminal_truncate_log_file(struct lxc_terminal *terminal)
861813e5
CB
188{
189 /* be very certain things are kosher */
2083d59d 190 if (!terminal->log_path || terminal->log_fd < 0)
861813e5
CB
191 return -EBADF;
192
2083d59d 193 return lxc_unpriv(ftruncate(terminal->log_fd, 0));
861813e5
CB
194}
195
468724d3 196static int lxc_terminal_rotate_log_file(struct lxc_terminal *terminal)
861813e5 197{
2530ba95 198 __do_free char *tmp = NULL;
861813e5
CB
199 int ret;
200 size_t len;
861813e5 201
99a04585 202 if (!terminal->log_path || terminal->log_rotate == 0)
861813e5
CB
203 return -EOPNOTSUPP;
204
205 /* be very certain things are kosher */
99a04585 206 if (terminal->log_fd < 0)
861813e5
CB
207 return -EBADF;
208
99a04585 209 len = strlen(terminal->log_path) + sizeof(".1");
2530ba95 210 tmp = must_realloc(NULL, len);
861813e5 211
93d5ebf1
CB
212 ret = strnprintf(tmp, len, "%s.1", terminal->log_path);
213 if (ret < 0)
861813e5
CB
214 return -EFBIG;
215
99a04585
CB
216 close(terminal->log_fd);
217 terminal->log_fd = -1;
218 ret = lxc_unpriv(rename(terminal->log_path, tmp));
861813e5
CB
219 if (ret < 0)
220 return ret;
221
99a04585 222 return lxc_terminal_create_log_file(terminal);
861813e5
CB
223}
224
a44ae1a9 225static int lxc_terminal_write_log_file(struct lxc_terminal *terminal, char *buf,
8903fb08 226 int bytes_read)
861813e5
CB
227{
228 int ret;
861813e5 229 struct stat st;
8903fb08 230 int64_t space_left = -1;
861813e5 231
99a04585 232 if (terminal->log_fd < 0)
861813e5
CB
233 return 0;
234
235 /* A log size <= 0 means that there's no limit on the size of the log
236 * file at which point we simply ignore whether the log is supposed to
237 * be rotated or not.
238 */
99a04585
CB
239 if (terminal->log_size <= 0)
240 return lxc_write_nointr(terminal->log_fd, buf, bytes_read);
861813e5
CB
241
242 /* Get current size of the log file. */
99a04585 243 ret = fstat(terminal->log_fd, &st);
861813e5 244 if (ret < 0) {
99a04585 245 SYSERROR("Failed to stat the terminal log file descriptor");
861813e5
CB
246 return -1;
247 }
248
249 /* handle non-regular files */
250 if ((st.st_mode & S_IFMT) != S_IFREG) {
251 /* This isn't a regular file. so rotating the file seems a
252 * dangerous thing to do, size limits are also very
253 * questionable. Let's not risk anything and tell the user that
f48e8071 254 * they're requesting us to do weird stuff.
861813e5 255 */
99a04585 256 if (terminal->log_rotate > 0 || terminal->log_size > 0)
861813e5
CB
257 return -EINVAL;
258
259 /* I mean, sure log wherever you want to. */
99a04585 260 return lxc_write_nointr(terminal->log_fd, buf, bytes_read);
861813e5
CB
261 }
262
99a04585 263 space_left = terminal->log_size - st.st_size;
861813e5
CB
264
265 /* User doesn't want to rotate the log file and there's no more space
266 * left so simply truncate it.
267 */
99a04585
CB
268 if (space_left <= 0 && terminal->log_rotate <= 0) {
269 ret = lxc_terminal_truncate_log_file(terminal);
861813e5
CB
270 if (ret < 0)
271 return ret;
272
8703bf5b 273 if ((uint64_t)bytes_read <= terminal->log_size)
99a04585 274 return lxc_write_nointr(terminal->log_fd, buf, bytes_read);
861813e5
CB
275
276 /* Write as much as we can into the buffer and loose the rest. */
99a04585 277 return lxc_write_nointr(terminal->log_fd, buf, terminal->log_size);
861813e5
CB
278 }
279
280 /* There's enough space left. */
281 if (bytes_read <= space_left)
99a04585 282 return lxc_write_nointr(terminal->log_fd, buf, bytes_read);
861813e5
CB
283
284 /* There's not enough space left but at least write as much as we can
285 * into the old log file.
286 */
99a04585 287 ret = lxc_write_nointr(terminal->log_fd, buf, space_left);
861813e5
CB
288 if (ret < 0)
289 return -1;
290
291 /* Calculate how many bytes we still need to write. */
292 bytes_read -= space_left;
293
89962c6c 294 /* There'd be more to write but we aren't instructed to rotate the log
861813e5
CB
295 * file so simply return. There's no error on our side here.
296 */
99a04585 297 if (terminal->log_rotate > 0)
468724d3 298 ret = lxc_terminal_rotate_log_file(terminal);
861813e5 299 else
99a04585 300 ret = lxc_terminal_truncate_log_file(terminal);
861813e5
CB
301 if (ret < 0)
302 return ret;
303
8703bf5b 304 if (terminal->log_size < (uint64_t)bytes_read) {
861813e5
CB
305 /* Well, this is unfortunate because it means that there is more
306 * to write than the user has granted us space. There are
307 * multiple ways to handle this but let's use the simplest one:
308 * write as much as we can, tell the user that there was more
309 * stuff to write and move on.
310 * Note that this scenario shouldn't actually happen with the
99a04585 311 * standard pty-based terminal that LXC allocates since it will
861813e5
CB
312 * be switched into raw mode. In raw mode only 1 byte at a time
313 * should be read and written.
314 */
99a04585
CB
315 WARN("Size of terminal log file is smaller than the bytes to write");
316 ret = lxc_write_nointr(terminal->log_fd, buf, terminal->log_size);
861813e5
CB
317 if (ret < 0)
318 return -1;
319 bytes_read -= ret;
320 return bytes_read;
321 }
322
323 /* Yay, we made it. */
99a04585 324 ret = lxc_write_nointr(terminal->log_fd, buf, bytes_read);
861813e5
CB
325 if (ret < 0)
326 return -1;
327 bytes_read -= ret;
328 return bytes_read;
329}
330
543d2f83 331static int lxc_terminal_ptx_io(struct lxc_terminal *terminal)
b5159817 332{
de708fb7 333 char buf[LXC_TERMINAL_BUFFER_SIZE];
732375f5 334 int r, w, w_log, w_rbuf;
e0dc0de7 335
543d2f83
CB
336 w = r = lxc_read_nointr(terminal->ptx, buf, sizeof(buf));
337 if (r <= 0)
338 return -1;
c06a0555 339
543d2f83
CB
340 w_rbuf = w_log = 0;
341 /* write to peer first */
342 if (terminal->peer >= 0)
343 w = lxc_write_nointr(terminal->peer, buf, r);
63376d7d 344
543d2f83
CB
345 /* write to terminal ringbuffer */
346 if (terminal->buffer_size > 0)
347 w_rbuf = lxc_ringbuf_write(&terminal->ringbuf, buf, r);
b5159817 348
543d2f83
CB
349 /* write to terminal log */
350 if (terminal->log_fd >= 0)
351 w_log = lxc_terminal_write_log_file(terminal, buf, r);
63376d7d 352
b5159817 353 if (w != r)
de708fb7 354 WARN("Short write on terminal r:%d != w:%d", r, w);
732375f5 355
7874d81a 356 if (w_rbuf < 0) {
357 errno = -w_rbuf;
358 SYSTRACE("Failed to write %d bytes to terminal ringbuffer", r);
359 }
732375f5
CB
360
361 if (w_log < 0)
de708fb7 362 TRACE("Failed to write %d bytes to terminal log", r);
0d4137cc 363
543d2f83
CB
364 return 0;
365}
366
367static int lxc_terminal_peer_io(struct lxc_terminal *terminal)
368{
369 char buf[LXC_TERMINAL_BUFFER_SIZE];
370 int r, w;
371
372 w = r = lxc_read_nointr(terminal->peer, buf, sizeof(buf));
373 if (r <= 0)
374 return -1;
375
376 w = lxc_write_nointr(terminal->ptx, buf, r);
377 if (w != r)
378 WARN("Short write on terminal r:%d != w:%d", r, w);
379
380 return 0;
381}
382
383static int lxc_terminal_ptx_io_handler(int fd, uint32_t events, void *data,
384 struct lxc_async_descr *descr)
385{
386 struct lxc_terminal *terminal = data;
387 int ret;
388
389 ret = lxc_terminal_ptx_io(data);
390 if (ret < 0)
391 return log_info(LXC_MAINLOOP_CLOSE,
392 "Terminal client on fd %d has exited",
393 terminal->ptx);
394
395 return LXC_MAINLOOP_CONTINUE;
396}
397
398static int lxc_terminal_peer_io_handler(int fd, uint32_t events, void *data,
399 struct lxc_async_descr *descr)
400{
401 struct lxc_terminal *terminal = data;
402 int ret;
403
404 ret = lxc_terminal_peer_io(data);
405 if (ret < 0)
406 return log_info(LXC_MAINLOOP_CLOSE,
407 "Terminal client on fd %d has exited",
408 terminal->peer);
409
2b8bf299 410 return LXC_MAINLOOP_CONTINUE;
b5159817
DE
411}
412
dcad02f8 413static int lxc_terminal_mainloop_add_peer(struct lxc_terminal *terminal)
b5159817 414{
a529bc25
CB
415 int ret;
416
2083d59d
CB
417 if (terminal->peer >= 0) {
418 ret = lxc_mainloop_add_handler(terminal->descr, terminal->peer,
543d2f83
CB
419 lxc_terminal_peer_io_handler,
420 default_cleanup_handler,
421 terminal, "lxc_terminal_peer_io_handler");
a529bc25 422 if (ret < 0) {
2083d59d 423 WARN("Failed to add terminal peer handler to mainloop");
a529bc25
CB
424 return -1;
425 }
63376d7d
DL
426 }
427
2083d59d 428 if (!terminal->tty_state || terminal->tty_state->sigfd < 0)
a529bc25
CB
429 return 0;
430
543d2f83
CB
431 ret = lxc_mainloop_add_handler(terminal->descr,
432 terminal->tty_state->sigfd,
433 lxc_terminal_signalfd_cb,
434 default_cleanup_handler,
435 terminal->tty_state,
436 "lxc_terminal_signalfd_cb");
a529bc25
CB
437 if (ret < 0) {
438 WARN("Failed to add signal handler to mainloop");
439 return -1;
b5159817 440 }
a529bc25
CB
441
442 return 0;
b5159817
DE
443}
444
3298b37d 445int lxc_terminal_mainloop_add(struct lxc_async_descr *descr,
ea5b3c23 446 struct lxc_terminal *terminal)
b5159817 447{
a529bc25 448 int ret;
b5159817 449
36a94ce8 450 if (terminal->ptx < 0) {
2083d59d 451 INFO("Terminal is not initialized");
b5159817 452 return 0;
596a818d
DE
453 }
454
36a94ce8 455 ret = lxc_mainloop_add_handler(descr, terminal->ptx,
543d2f83
CB
456 lxc_terminal_ptx_io_handler,
457 default_cleanup_handler,
458 terminal, "lxc_terminal_ptx_io_handler");
30a33fbd 459 if (ret < 0) {
543d2f83 460 ERROR("Failed to add handler for terminal ptx fd %d to mainloop", terminal->ptx);
b5159817 461 return -1;
28a4b0e5
DL
462 }
463
30a33fbd 464 /* We cache the descr so that we can add an fd to it when someone
c1ee47cd 465 * does attach to it in lxc_terminal_allocate().
b5159817 466 */
2083d59d 467 terminal->descr = descr;
cd453b38 468
ea5b3c23 469 return lxc_terminal_mainloop_add_peer(terminal);
b5159817 470}
28a4b0e5 471
0d4137cc 472int lxc_setup_tios(int fd, struct termios *oldtios)
b5159817 473{
e4953e62 474 int ret;
b5159817 475 struct termios newtios;
e0dc0de7 476
b5159817 477 if (!isatty(fd)) {
8332a09c 478 ERROR("File descriptor %d does not refer to a terminal", fd);
b5159817 479 return -1;
e0dc0de7
DL
480 }
481
e4953e62
CB
482 /* Get current termios. */
483 ret = tcgetattr(fd, oldtios);
484 if (ret < 0) {
485 SYSERROR("Failed to get current terminal settings");
b5159817 486 return -1;
e0dc0de7
DL
487 }
488
4dc96430
TJ
489 /* ensure we don't end up in an endless loop:
490 * The kernel might fire SIGTTOU while an
491 * ioctl() in tcsetattr() is executed. When the ioctl()
492 * is resumed and retries, the signal handler interrupts it again.
493 */
494 signal (SIGTTIN, SIG_IGN);
495 signal (SIGTTOU, SIG_IGN);
496
b5159817 497 newtios = *oldtios;
e0dc0de7 498
a7c97a40
CB
499 /* We use the same settings that ssh does. */
500 newtios.c_iflag |= IGNPAR;
501 newtios.c_iflag &= ~(ISTRIP | INLCR | IGNCR | ICRNL | IXON | IXANY | IXOFF);
502#ifdef IUCLC
503 newtios.c_iflag &= ~IUCLC;
504#endif
4dc96430 505 newtios.c_lflag &= ~(TOSTOP | ISIG | ICANON | ECHO | ECHOE | ECHOK | ECHONL);
a7c97a40
CB
506#ifdef IEXTEN
507 newtios.c_lflag &= ~IEXTEN;
508#endif
90275474 509 newtios.c_oflag |= ONLCR;
300ec717 510 newtios.c_oflag |= OPOST;
b5159817
DE
511 newtios.c_cc[VMIN] = 1;
512 newtios.c_cc[VTIME] = 0;
e0dc0de7 513
a7c97a40 514 /* Set new attributes. */
e4953e62
CB
515 ret = tcsetattr(fd, TCSAFLUSH, &newtios);
516 if (ret < 0) {
517 ERROR("Failed to set new terminal settings");
b5159817 518 return -1;
e0dc0de7
DL
519 }
520
63376d7d 521 return 0;
b5159817 522}
e0dc0de7 523
dcad02f8 524static void lxc_terminal_peer_proxy_free(struct lxc_terminal *terminal)
b5159817 525{
28327a43 526 lxc_terminal_signal_fini(terminal);
e788f4ac 527
36a94ce8
CB
528 close(terminal->proxy.ptx);
529 terminal->proxy.ptx = -1;
e788f4ac 530
41808e20
CB
531 close(terminal->proxy.pty);
532 terminal->proxy.pty = -1;
e788f4ac 533
fb87aa6a 534 terminal->proxy.busy = -1;
e788f4ac 535
fb87aa6a 536 terminal->proxy.name[0] = '\0';
e788f4ac 537
2083d59d 538 terminal->peer = -1;
b5159817 539}
596a818d 540
60dd8ef4
CB
541static int lxc_terminal_peer_proxy_alloc(struct lxc_terminal *terminal,
542 int sockfd)
b5159817 543{
60dd8ef4 544 int ret;
b5159817 545 struct termios oldtermio;
5b55021f 546 struct lxc_terminal_state *ts;
b5159817 547
36a94ce8 548 if (terminal->ptx < 0) {
2083d59d 549 ERROR("Terminal not set up");
b5159817
DE
550 return -1;
551 }
60dd8ef4 552
fb87aa6a 553 if (terminal->proxy.busy != -1 || terminal->peer != -1) {
2083d59d 554 NOTICE("Terminal already in use");
b5159817
DE
555 return -1;
556 }
60dd8ef4 557
2083d59d 558 if (terminal->tty_state) {
60dd8ef4 559 ERROR("Terminal has already been initialized");
b5159817 560 return -1;
596a818d
DE
561 }
562
d712f9e8 563 /* This is the proxy terminal that will be given to the client, and
36a94ce8 564 * that the real terminal ptx will send to / recv from.
b5159817 565 */
41808e20 566 ret = openpty(&terminal->proxy.ptx, &terminal->proxy.pty, NULL,
3f15bdd9 567 NULL, NULL);
60dd8ef4
CB
568 if (ret < 0) {
569 SYSERROR("Failed to open proxy terminal");
b5159817
DE
570 return -1;
571 }
596a818d 572
41808e20 573 ret = ttyname_r(terminal->proxy.pty, terminal->proxy.name,
3f15bdd9
CB
574 sizeof(terminal->proxy.name));
575 if (ret < 0) {
41808e20 576 SYSERROR("Failed to retrieve name of proxy terminal pty");
3f15bdd9
CB
577 goto on_error;
578 }
579
36a94ce8 580 ret = fd_cloexec(terminal->proxy.ptx, true);
408c18a1 581 if (ret < 0) {
36a94ce8 582 SYSERROR("Failed to set FD_CLOEXEC flag on proxy terminal ptx");
408c18a1
CB
583 goto on_error;
584 }
585
41808e20 586 ret = fd_cloexec(terminal->proxy.pty, true);
408c18a1 587 if (ret < 0) {
41808e20 588 SYSERROR("Failed to set FD_CLOEXEC flag on proxy terminal pty");
408c18a1
CB
589 goto on_error;
590 }
591
41808e20 592 ret = lxc_setup_tios(terminal->proxy.pty, &oldtermio);
60dd8ef4
CB
593 if (ret < 0)
594 goto on_error;
b5159817 595
36a94ce8 596 ts = lxc_terminal_signal_init(terminal->proxy.ptx, terminal->ptx);
b5159817 597 if (!ts)
60dd8ef4 598 goto on_error;
b5159817 599
2083d59d 600 terminal->tty_state = ts;
41808e20 601 terminal->peer = terminal->proxy.pty;
fb87aa6a 602 terminal->proxy.busy = sockfd;
2083d59d 603 ret = lxc_terminal_mainloop_add_peer(terminal);
a529bc25 604 if (ret < 0)
60dd8ef4 605 goto on_error;
b5159817 606
41808e20
CB
607 NOTICE("Opened proxy terminal with ptx fd %d and pty fd %d",
608 terminal->proxy.ptx, terminal->proxy.pty);
b5159817
DE
609 return 0;
610
60dd8ef4 611on_error:
2083d59d 612 lxc_terminal_peer_proxy_free(terminal);
63376d7d
DL
613 return -1;
614}
615
c1ee47cd 616int lxc_terminal_allocate(struct lxc_conf *conf, int sockfd, int *ttyreq)
b5159817 617{
8703bf5b 618 size_t ttynum;
36a94ce8 619 int ptxfd = -1;
0e4be3cf 620 struct lxc_tty_info *ttys = &conf->ttys;
dcad02f8 621 struct lxc_terminal *terminal = &conf->console;
b5159817 622
b5159817 623 if (*ttyreq == 0) {
12c2eaaa
CB
624 int ret;
625
626 ret = lxc_terminal_peer_proxy_alloc(terminal, sockfd);
627 if (ret < 0)
b5159817 628 goto out;
12c2eaaa 629
36a94ce8 630 ptxfd = terminal->proxy.ptx;
b5159817
DE
631 goto out;
632 }
633
634 if (*ttyreq > 0) {
8703bf5b 635 if ((size_t)*ttyreq > ttys->max)
b5159817
DE
636 goto out;
637
730aaf46 638 if (ttys->tty[*ttyreq - 1].busy >= 0)
b5159817
DE
639 goto out;
640
12c2eaaa 641 /* The requested tty is available. */
b5159817
DE
642 ttynum = *ttyreq;
643 goto out_tty;
644 }
645
12c2eaaa 646 /* Search for next available tty, fixup index tty1 => [0]. */
730aaf46 647 for (ttynum = 1; ttynum <= ttys->max && ttys->tty[ttynum - 1].busy >= 0; ttynum++) {
0d4137cc 648 ;
12c2eaaa 649 }
b5159817 650
12c2eaaa 651 /* We didn't find any available slot for tty. */
885766f5 652 if (ttynum > ttys->max)
b5159817
DE
653 goto out;
654
8703bf5b 655 *ttyreq = (int)ttynum;
b5159817
DE
656
657out_tty:
0e4be3cf 658 ttys->tty[ttynum - 1].busy = sockfd;
36a94ce8 659 ptxfd = ttys->tty[ttynum - 1].ptx;
12c2eaaa 660
b5159817 661out:
36a94ce8 662 return ptxfd;
b5159817
DE
663}
664
3dfe6f8d 665void lxc_terminal_free(struct lxc_conf *conf, int fd)
63376d7d 666{
0e4be3cf 667 struct lxc_tty_info *ttys = &conf->ttys;
dcad02f8 668 struct lxc_terminal *terminal = &conf->console;
b5159817 669
8703bf5b 670 for (size_t i = 0; i < ttys->max; i++)
0e4be3cf 671 if (ttys->tty[i].busy == fd)
730aaf46 672 ttys->tty[i].busy = -1;
b5159817 673
1b5e93c4
CB
674 if (terminal->proxy.busy != fd)
675 return;
676
41808e20 677 lxc_mainloop_del_handler(terminal->descr, terminal->proxy.pty);
1b5e93c4 678 lxc_terminal_peer_proxy_free(terminal);
b5159817
DE
679}
680
dcad02f8 681static int lxc_terminal_peer_default(struct lxc_terminal *terminal)
b5159817 682{
5b55021f 683 struct lxc_terminal_state *ts;
46768cce 684 const char *path;
467c7ff3 685 int ret = 0;
b5159817 686
46768cce
CB
687 if (terminal->path)
688 path = terminal->path;
689 else
690 path = "/dev/tty";
b5159817 691
2083d59d
CB
692 terminal->peer = lxc_unpriv(open(path, O_RDWR | O_CLOEXEC));
693 if (terminal->peer < 0) {
46768cce
CB
694 if (!terminal->path) {
695 errno = ENODEV;
7874d81a 696 SYSDEBUG("The process does not have a controlling terminal");
46768cce
CB
697 goto on_succes;
698 }
699
6d1400b5 700 SYSERROR("Failed to open proxy terminal \"%s\"", path);
467c7ff3
CB
701 return -ENOTTY;
702 }
49cd0656 703 DEBUG("Using terminal \"%s\" as proxy", path);
b5159817 704
2083d59d 705 if (!isatty(terminal->peer)) {
49cd0656
CB
706 ERROR("File descriptor for \"%s\" does not refer to a terminal", path);
707 goto on_error_free_tios;
467c7ff3 708 }
b5159817 709
36a94ce8 710 ts = lxc_terminal_signal_init(terminal->peer, terminal->ptx);
2083d59d 711 terminal->tty_state = ts;
341c2aed 712 if (!ts) {
0519b5cc 713 WARN("Failed to install signal handler");
49cd0656 714 goto on_error_free_tios;
341c2aed 715 }
b5159817 716
36a94ce8 717 lxc_terminal_winsz(terminal->peer, terminal->ptx);
b5159817 718
2083d59d 719 terminal->tios = malloc(sizeof(*terminal->tios));
49cd0656
CB
720 if (!terminal->tios)
721 goto on_error_free_tios;
b5159817 722
49cd0656
CB
723 ret = lxc_setup_tios(terminal->peer, terminal->tios);
724 if (ret < 0)
725 goto on_error_close_peer;
467c7ff3 726 else
49cd0656 727 goto on_succes;
b5159817 728
49cd0656 729on_error_free_tios:
2083d59d
CB
730 free(terminal->tios);
731 terminal->tios = NULL;
467c7ff3 732
49cd0656 733on_error_close_peer:
2083d59d
CB
734 close(terminal->peer);
735 terminal->peer = -1;
467c7ff3
CB
736 ret = -ENOTTY;
737
49cd0656 738on_succes:
467c7ff3 739 return ret;
b5159817
DE
740}
741
dcad02f8 742int lxc_terminal_write_ringbuffer(struct lxc_terminal *terminal)
39c6cdb7
CB
743{
744 char *r_addr;
745 ssize_t ret;
746 uint64_t used;
2083d59d 747 struct lxc_ringbuf *buf = &terminal->ringbuf;
39c6cdb7
CB
748
749 /* There's not log file where we can dump the ringbuffer to. */
2083d59d 750 if (terminal->log_fd < 0)
39c6cdb7
CB
751 return 0;
752
39c6cdb7
CB
753 used = lxc_ringbuf_used(buf);
754 if (used == 0)
755 return 0;
756
2083d59d 757 ret = lxc_terminal_truncate_log_file(terminal);
39c6cdb7
CB
758 if (ret < 0)
759 return ret;
760
761 /* Write as much as we can without exceeding the limit. */
2083d59d
CB
762 if (terminal->log_size < used)
763 used = terminal->log_size;
39c6cdb7
CB
764
765 r_addr = lxc_ringbuf_get_read_addr(buf);
2083d59d 766 ret = lxc_write_nointr(terminal->log_fd, r_addr, used);
39c6cdb7
CB
767 if (ret < 0)
768 return -EIO;
769
770 return 0;
771}
772
dcad02f8 773void lxc_terminal_delete(struct lxc_terminal *terminal)
b5159817 774{
69629c82
CB
775 int ret;
776
2083d59d 777 ret = lxc_terminal_write_ringbuffer(terminal);
39c6cdb7 778 if (ret < 0)
2083d59d 779 WARN("Failed to write terminal log to disk");
39c6cdb7 780
2083d59d
CB
781 if (terminal->tios && terminal->peer >= 0) {
782 ret = tcsetattr(terminal->peer, TCSAFLUSH, terminal->tios);
69629c82 783 if (ret < 0)
a24c5678 784 SYSWARN("Failed to set old terminal settings");
69629c82 785 }
2083d59d
CB
786 free(terminal->tios);
787 terminal->tios = NULL;
596a818d 788
2083d59d
CB
789 if (terminal->peer >= 0)
790 close(terminal->peer);
791 terminal->peer = -1;
bc9724f7 792
36a94ce8
CB
793 if (terminal->ptx >= 0)
794 close(terminal->ptx);
795 terminal->ptx = -1;
bc9724f7 796
41808e20
CB
797 if (terminal->pty >= 0)
798 close(terminal->pty);
799 terminal->pty = -1;
bc9724f7 800
d926c261
CB
801 terminal->pty_nr = -1;
802
2083d59d
CB
803 if (terminal->log_fd >= 0)
804 close(terminal->log_fd);
805 terminal->log_fd = -1;
63376d7d
DL
806}
807
3b988b33
CB
808/**
809 * Note that this function needs to run before the mainloop starts. Since we
36a94ce8 810 * register a handler for the terminal's ptxfd when we create the mainloop
2083d59d 811 * the terminal handler needs to see an allocated ringbuffer.
3b988b33 812 */
dcad02f8 813static int lxc_terminal_create_ringbuf(struct lxc_terminal *terminal)
3b988b33
CB
814{
815 int ret;
2083d59d
CB
816 struct lxc_ringbuf *buf = &terminal->ringbuf;
817 uint64_t size = terminal->buffer_size;
3b988b33
CB
818
819 /* no ringbuffer previously allocated and no ringbuffer requested */
820 if (!buf->addr && size <= 0)
821 return 0;
822
823 /* ringbuffer allocated but no new ringbuffer requested */
824 if (buf->addr && size <= 0) {
825 lxc_ringbuf_release(buf);
826 buf->addr = NULL;
827 buf->r_off = 0;
828 buf->w_off = 0;
829 buf->size = 0;
2083d59d 830 TRACE("Deallocated terminal ringbuffer");
3b988b33
CB
831 return 0;
832 }
833
834 if (size <= 0)
835 return 0;
836
837 /* check wether the requested size for the ringbuffer has changed */
838 if (buf->addr && buf->size != size) {
2083d59d
CB
839 TRACE("Terminal ringbuffer size changed from %" PRIu64
840 " to %" PRIu64 " bytes. Deallocating terminal ringbuffer",
3b988b33
CB
841 buf->size, size);
842 lxc_ringbuf_release(buf);
843 }
844
845 ret = lxc_ringbuf_create(buf, size);
846 if (ret < 0) {
2083d59d 847 ERROR("Failed to setup %" PRIu64 " byte terminal ringbuffer", size);
3b988b33
CB
848 return -1;
849 }
850
2083d59d 851 TRACE("Allocated %" PRIu64 " byte terminal ringbuffer", size);
3b988b33
CB
852 return 0;
853}
854
a0309168 855/**
2083d59d
CB
856 * This is the terminal log file. Please note that the terminal log file is
857 * (implementation wise not content wise) independent of the terminal ringbuffer.
a0309168 858 */
dcad02f8 859int lxc_terminal_create_log_file(struct lxc_terminal *terminal)
a0309168 860{
2083d59d 861 if (!terminal->log_path)
a0309168
CB
862 return 0;
863
2083d59d
CB
864 terminal->log_fd = lxc_unpriv(open(terminal->log_path, O_CLOEXEC | O_RDWR | O_CREAT | O_APPEND, 0600));
865 if (terminal->log_fd < 0) {
866 SYSERROR("Failed to open terminal log file \"%s\"", terminal->log_path);
a0309168
CB
867 return -1;
868 }
869
2083d59d 870 DEBUG("Using \"%s\" as terminal log file", terminal->log_path);
a0309168
CB
871 return 0;
872}
873
8ea93a0f
CB
874static int lxc_terminal_map_ids(struct lxc_conf *c, struct lxc_terminal *terminal)
875{
876 int ret;
877
0589d744 878 if (list_empty(&c->id_map))
8ea93a0f
CB
879 return 0;
880
881 if (is_empty_string(terminal->name) && terminal->pty < 0)
882 return 0;
883
884 if (terminal->pty >= 0)
885 ret = userns_exec_mapped_root(NULL, terminal->pty, c);
886 else
887 ret = userns_exec_mapped_root(terminal->name, -EBADF, c);
888 if (ret < 0)
889 return log_error(-1, "Failed to chown terminal %d(%s)", terminal->pty,
890 !is_empty_string(terminal->name) ? terminal->name : "(null)");
891
892 TRACE("Chowned terminal %d(%s)", terminal->pty,
893 !is_empty_string(terminal->name) ? terminal->name : "(null)");
894
895 return 0;
896}
897
898static int lxc_terminal_create_foreign(struct lxc_conf *conf, struct lxc_terminal *terminal)
63376d7d 899{
8ded9244 900 int ret;
b5159817 901
41808e20 902 ret = openpty(&terminal->ptx, &terminal->pty, NULL, NULL, NULL);
467c7ff3 903 if (ret < 0) {
8ded9244 904 SYSERROR("Failed to open terminal");
b5159817
DE
905 return -1;
906 }
907
8ea93a0f
CB
908 ret = lxc_terminal_map_ids(conf, terminal);
909 if (ret < 0) {
910 SYSERROR("Failed to change ownership of terminal multiplexer device");
911 goto err;
912 }
913
41808e20 914 ret = ttyname_r(terminal->pty, terminal->name, sizeof(terminal->name));
3f15bdd9 915 if (ret < 0) {
41808e20 916 SYSERROR("Failed to retrieve name of terminal pty");
3f15bdd9
CB
917 goto err;
918 }
919
36a94ce8 920 ret = fd_cloexec(terminal->ptx, true);
69629c82 921 if (ret < 0) {
36a94ce8 922 SYSERROR("Failed to set FD_CLOEXEC flag on terminal ptx");
b5159817
DE
923 goto err;
924 }
925
41808e20 926 ret = fd_cloexec(terminal->pty, true);
69629c82 927 if (ret < 0) {
41808e20 928 SYSERROR("Failed to set FD_CLOEXEC flag on terminal pty");
b5159817
DE
929 goto err;
930 }
931
2083d59d 932 ret = lxc_terminal_peer_default(terminal);
467c7ff3 933 if (ret < 0) {
8ded9244 934 ERROR("Failed to allocate proxy terminal");
467c7ff3
CB
935 goto err;
936 }
b5159817 937
5777fe90
CB
938 return 0;
939
940err:
2083d59d 941 lxc_terminal_delete(terminal);
5777fe90
CB
942 return -ENODEV;
943}
944
18129d94
CB
945int lxc_devpts_terminal(int devpts_fd, int *ret_ptx, int *ret_pty,
946 int *ret_pty_nr, bool require_tiocgptpeer)
f797f05e 947{
803839b8
CB
948 __do_close int fd_devpts = -EBADF, fd_ptx = -EBADF,
949 fd_opath_pty = -EBADF, fd_pty = -EBADF;
cb01e311 950 int pty_nr = -1;
f797f05e
CB
951 int ret;
952
803839b8
CB
953 /*
954 * When we aren't told what devpts instance to allocate from we assume
955 * it is the one in the caller's mount namespace.
956 * This poses a slight complication, a lot of distros will change
957 * permissions on /dev/ptmx so it can be opened by unprivileged users
958 * but will not change permissions on /dev/pts/ptmx itself. In
959 * addition, /dev/ptmx can either be a symlink, a bind-mount, or a
960 * separate device node. So we need to allow for fairly lax lookup.
961 */
9f77617b 962 if (devpts_fd < 0)
803839b8
CB
963 fd_ptx = open_at(-EBADF, "/dev/ptmx", PROTECT_OPEN_RW & ~O_NOFOLLOW,
964 PROTECT_LOOKUP_ABSOLUTE_XDEV_SYMLINKS, 0);
965 else
966 fd_ptx = open_beneath(devpts_fd, "ptmx", O_RDWR | O_NOCTTY | O_CLOEXEC);
4655bdd1 967 if (fd_ptx < 0) {
7a316559
CB
968 if (errno == ENOSPC)
969 return systrace("Exceeded number of allocatable terminals");
970
0cf017f0 971 return syswarn("Failed to open terminal multiplexer device");
7a316559 972 }
f797f05e 973
803839b8
CB
974 if (devpts_fd < 0) {
975 fd_devpts = open_at(-EBADF, "/dev/pts", PROTECT_OPATH_DIRECTORY,
976 PROTECT_LOOKUP_ABSOLUTE_XDEV, 0);
977 if (fd_devpts < 0)
0cf017f0 978 return syswarn("Failed to open devpts instance");
803839b8
CB
979
980 if (!same_device(fd_devpts, "ptmx", fd_ptx, ""))
0cf017f0 981 return syswarn("The acquired ptmx devices don't match");
803839b8
CB
982 devpts_fd = fd_devpts;
983 }
984
4655bdd1
CB
985 ret = unlockpt(fd_ptx);
986 if (ret < 0)
987 return syswarn_set(-ENODEV, "Failed to unlock multiplexer device device");
f797f05e 988
4655bdd1
CB
989 fd_pty = ioctl(fd_ptx, TIOCGPTPEER, O_RDWR | O_NOCTTY | O_CLOEXEC);
990 if (fd_pty < 0) {
f382bcc6
CB
991 switch (errno) {
992 case ENOTTY:
993 SYSTRACE("Pure fd-based terminal allocation not possible");
994 break;
995 case ENOSPC:
7a316559 996 SYSTRACE("Exceeded number of allocatable terminals");
f382bcc6
CB
997 break;
998 default:
999 SYSWARN("Failed to allocate new pty device");
64ac925f 1000 return -errno;
f382bcc6 1001 }
f797f05e 1002
64ac925f 1003 /* The caller tells us that they trust the devpts instance. */
18129d94
CB
1004 if (require_tiocgptpeer)
1005 return ret_errno(ENODEV);
8ea93a0f 1006 }
f797f05e 1007
4655bdd1
CB
1008 ret = ioctl(fd_ptx, TIOCGPTN, &pty_nr);
1009 if (ret)
1010 return syswarn_set(-ENODEV, "Failed to retrieve name of terminal pty");
cb01e311 1011
18129d94
CB
1012 if (fd_pty < 0) {
1013 /*
1014 * If we end up it means that TIOCGPTPEER isn't supported but
1015 * the caller told us they trust the devpts instance so we use
1016 * the pty nr to open the pty side.
1017 */
1018 fd_pty = open_at(devpts_fd, fdstr(pty_nr), PROTECT_OPEN_RW,
1019 PROTECT_LOOKUP_ABSOLUTE_XDEV, 0);
1020 if (fd_pty < 0)
1021 return syswarn_set(-ENODEV, "Failed to open terminal pty fd by path %d/%d",
1022 devpts_fd, pty_nr);
1023 } else {
1024 fd_opath_pty = open_at(devpts_fd, fdstr(pty_nr), PROTECT_OPATH_FILE,
1025 PROTECT_LOOKUP_ABSOLUTE_XDEV, 0);
1026 if (fd_opath_pty < 0)
1027 return syswarn_set(-ENODEV, "Failed to open terminal pty fd by path %d/%d",
1028 devpts_fd, pty_nr);
1029
1030 if (!same_file_lax(fd_pty, fd_opath_pty))
1031 return syswarn_set(-ENODEV, "Terminal file descriptor changed");
1032 }
4655bdd1 1033
4655bdd1
CB
1034 *ret_ptx = move_fd(fd_ptx);
1035 *ret_pty = move_fd(fd_pty);
d926c261 1036 *ret_pty_nr = pty_nr;
4655bdd1
CB
1037 return 0;
1038}
1039
9f77617b
CB
1040int lxc_terminal_parent(struct lxc_conf *conf)
1041{
9f77617b
CB
1042 struct lxc_terminal *console = &conf->console;
1043 int ret;
1044
1045 if (!wants_console(&conf->console))
1046 return 0;
1047
1048 /* Allocate console from the container's devpts. */
1049 if (conf->pty_max > 1)
1050 return 0;
1051
1052 /* Allocate console for the container from the host's devpts. */
803839b8 1053 ret = lxc_devpts_terminal(-EBADF, &console->ptx, &console->pty,
18129d94 1054 &console->pty_nr, false);
9f77617b
CB
1055 if (ret < 0)
1056 return syserror("Failed to allocate console");
1057
1058 ret = strnprintf(console->name, sizeof(console->name),
1059 "/dev/pts/%d", console->pty_nr);
1060 if (ret < 0)
1061 return syserror("Failed to create console path");
1062
1063 return lxc_terminal_map_ids(conf, &conf->console);
1064}
1065
4655bdd1 1066static int lxc_terminal_create_native(const char *name, const char *lxcpath,
4655bdd1
CB
1067 struct lxc_terminal *terminal)
1068{
1069 __do_close int devpts_fd = -EBADF;
1070 int ret;
1071
1072 devpts_fd = lxc_cmd_get_devpts_fd(name, lxcpath);
1073 if (devpts_fd < 0)
23cc33cd 1074 return sysinfo("Failed to receive devpts fd");
4655bdd1 1075
4dcf0c43 1076 ret = lxc_devpts_terminal(devpts_fd, &terminal->ptx, &terminal->pty,
18129d94 1077 &terminal->pty_nr, true);
4655bdd1
CB
1078 if (ret < 0)
1079 return ret;
cb01e311 1080
d926c261
CB
1081 ret = strnprintf(terminal->name, sizeof(terminal->name),
1082 "/dev/pts/%d", terminal->pty_nr);
1083 if (ret < 0)
1084 return syserror("Failed to create path");
1085
f797f05e
CB
1086 ret = lxc_terminal_peer_default(terminal);
1087 if (ret < 0) {
4655bdd1
CB
1088 lxc_terminal_delete(terminal);
1089 return syswarn_set(-ENODEV, "Failed to allocate proxy terminal");
f797f05e
CB
1090 }
1091
1092 return 0;
f797f05e
CB
1093}
1094
550ede0a
CB
1095int lxc_terminal_create(const char *name, const char *lxcpath,
1096 struct lxc_conf *conf, struct lxc_terminal *terminal)
f797f05e 1097{
4dcf0c43 1098 if (!lxc_terminal_create_native(name, lxcpath, terminal))
f797f05e
CB
1099 return 0;
1100
8ea93a0f 1101 return lxc_terminal_create_foreign(conf, terminal);
f797f05e
CB
1102}
1103
564e31c4 1104int lxc_terminal_setup(struct lxc_conf *conf)
5777fe90
CB
1105{
1106 int ret;
dcad02f8 1107 struct lxc_terminal *terminal = &conf->console;
5777fe90 1108
5ef86378
CB
1109 if (terminal->path && strequal(terminal->path, "none"))
1110 return log_info(0, "No terminal requested");
5777fe90 1111
9f77617b 1112 ret = lxc_terminal_peer_default(terminal);
5777fe90 1113 if (ret < 0)
9f77617b 1114 goto err;
5777fe90 1115
2083d59d 1116 ret = lxc_terminal_create_log_file(terminal);
a0309168
CB
1117 if (ret < 0)
1118 goto err;
1119
2083d59d 1120 ret = lxc_terminal_create_ringbuf(terminal);
a0309168
CB
1121 if (ret < 0)
1122 goto err;
b5159817
DE
1123
1124 return 0;
1125
1126err:
2083d59d 1127 lxc_terminal_delete(terminal);
69629c82 1128 return -ENODEV;
b5159817
DE
1129}
1130
8ca7b374
CB
1131static bool __terminal_dup2(int duplicate, int original)
1132{
1133 int ret;
1134
1135 if (!isatty(original))
1136 return true;
1137
1138 ret = dup2(duplicate, original);
1139 if (ret < 0) {
1140 SYSERROR("Failed to dup2(%d, %d)", duplicate, original);
1141 return false;
1142 }
1143
1144 return true;
1145}
1146
ae6d3913 1147int lxc_terminal_set_stdfds(int fd)
0d9acb99 1148{
8ca7b374
CB
1149 int i;
1150
39a78bbe 1151 if (fd < 0)
0d9acb99 1152 return 0;
b5159817 1153
8ca7b374
CB
1154 for (i = 0; i < 3; i++)
1155 if (!__terminal_dup2(fd, (int[]){STDIN_FILENO, STDOUT_FILENO,
1156 STDERR_FILENO}[i]))
39a78bbe 1157 return -1;
39a78bbe 1158
0d9acb99
DE
1159 return 0;
1160}
b5159817 1161
52f9292f 1162int lxc_terminal_stdin_cb(int fd, uint32_t events, void *cbdata,
3298b37d 1163 struct lxc_async_descr *descr)
b5159817 1164{
15085292 1165 int ret;
b5159817 1166 char c;
15085292 1167 struct lxc_terminal_state *ts = cbdata;
b5159817 1168
97bc2422 1169 if (fd != ts->stdinfd)
a529bc25 1170 return LXC_MAINLOOP_CLOSE;
97bc2422 1171
15085292
CB
1172 ret = lxc_read_nointr(ts->stdinfd, &c, 1);
1173 if (ret <= 0)
a529bc25 1174 return LXC_MAINLOOP_CLOSE;
63376d7d 1175
525e2117 1176 if (ts->escape >= 1) {
2083d59d 1177 /* we want to exit the terminal with Ctrl+a q */
014d5e1e
CB
1178 if (c == ts->escape && !ts->saw_escape) {
1179 ts->saw_escape = 1;
15085292 1180 return LXC_MAINLOOP_CONTINUE;
014d5e1e 1181 }
5c294060 1182
014d5e1e 1183 if (c == 'q' && ts->saw_escape)
a529bc25 1184 return LXC_MAINLOOP_CLOSE;
014d5e1e
CB
1185
1186 ts->saw_escape = 0;
1187 }
63376d7d 1188
36a94ce8 1189 ret = lxc_write_nointr(ts->ptxfd, &c, 1);
15085292 1190 if (ret <= 0)
a529bc25 1191 return LXC_MAINLOOP_CLOSE;
b5159817 1192
15085292 1193 return LXC_MAINLOOP_CONTINUE;
63376d7d
DL
1194}
1195
36a94ce8 1196int lxc_terminal_ptx_cb(int fd, uint32_t events, void *cbdata,
3298b37d 1197 struct lxc_async_descr *descr)
63376d7d 1198{
0d4137cc 1199 int r, w;
5bd171bd
CB
1200 char buf[LXC_TERMINAL_BUFFER_SIZE];
1201 struct lxc_terminal_state *ts = cbdata;
63376d7d 1202
36a94ce8 1203 if (fd != ts->ptxfd)
a529bc25 1204 return LXC_MAINLOOP_CLOSE;
97bc2422 1205
e66b6c96
CB
1206 r = lxc_read_nointr(fd, buf, sizeof(buf));
1207 if (r <= 0)
a529bc25 1208 return LXC_MAINLOOP_CLOSE;
1560f6c9 1209
e66b6c96 1210 w = lxc_write_nointr(ts->stdoutfd, buf, r);
5bd171bd 1211 if (w <= 0 || w != r)
a529bc25 1212 return LXC_MAINLOOP_CLOSE;
f78a1f32 1213
5bd171bd 1214 return LXC_MAINLOOP_CONTINUE;
b5159817
DE
1215}
1216
36a94ce8 1217int lxc_terminal_getfd(struct lxc_container *c, int *ttynum, int *ptxfd)
b5159817 1218{
7e85a2c4 1219 return lxc_cmd_get_tty_fd(c->name, ttynum, ptxfd, c->config_path);
b5159817
DE
1220}
1221
1222int lxc_console(struct lxc_container *c, int ttynum,
1223 int stdinfd, int stdoutfd, int stderrfd,
1224 int escape)
1225{
36a94ce8 1226 int ptxfd, ret, ttyfd;
3298b37d 1227 struct lxc_async_descr descr;
b5159817 1228 struct termios oldtios;
5b55021f 1229 struct lxc_terminal_state *ts;
28327a43
CB
1230 struct lxc_terminal terminal = {
1231 .tty_state = NULL,
1232 };
25964232 1233 int istty = 0;
b5159817 1234
7e85a2c4 1235 ttyfd = lxc_cmd_get_tty_fd(c->name, &ttynum, &ptxfd, c->config_path);
6834f805
CB
1236 if (ttyfd < 0)
1237 return -1;
b5159817
DE
1238
1239 ret = setsid();
33b4b411
CB
1240 if (ret < 0)
1241 TRACE("Process is already group leader");
b5159817 1242
36a94ce8 1243 ts = lxc_terminal_signal_init(stdinfd, ptxfd);
b5159817
DE
1244 if (!ts) {
1245 ret = -1;
33b4b411 1246 goto close_fds;
b5159817 1247 }
28327a43 1248 terminal.tty_state = ts;
b5159817 1249 ts->escape = escape;
3b975060 1250 ts->stdoutfd = stdoutfd;
b5159817 1251
6834f805 1252 istty = isatty(stdinfd);
25964232 1253 if (istty) {
36a94ce8
CB
1254 lxc_terminal_winsz(stdinfd, ptxfd);
1255 lxc_terminal_winsz(ts->stdinfd, ts->ptxfd);
6834f805 1256 } else {
71ac3f07 1257 INFO("File descriptor %d does not refer to a terminal", stdinfd);
25964232 1258 }
b5159817
DE
1259
1260 ret = lxc_mainloop_open(&descr);
1261 if (ret) {
33b4b411
CB
1262 ERROR("Failed to create mainloop");
1263 goto sigwinch_fini;
b5159817
DE
1264 }
1265
341c2aed
CB
1266 if (ts->sigfd != -1) {
1267 ret = lxc_mainloop_add_handler(&descr, ts->sigfd,
543d2f83
CB
1268 lxc_terminal_signalfd_cb,
1269 default_cleanup_handler,
1270 ts, "lxc_terminal_signalfd_cb");
33b4b411 1271 if (ret < 0) {
0519b5cc 1272 ERROR("Failed to add signal handler to mainloop");
33b4b411 1273 goto close_mainloop;
341c2aed 1274 }
b5159817
DE
1275 }
1276
1277 ret = lxc_mainloop_add_handler(&descr, ts->stdinfd,
543d2f83
CB
1278 lxc_terminal_stdin_cb,
1279 default_cleanup_handler,
1280 ts, "lxc_terminal_stdin_cb");
33b4b411
CB
1281 if (ret < 0) {
1282 ERROR("Failed to add stdin handler");
1283 goto close_mainloop;
b5159817
DE
1284 }
1285
36a94ce8 1286 ret = lxc_mainloop_add_handler(&descr, ts->ptxfd,
543d2f83
CB
1287 lxc_terminal_ptx_cb,
1288 default_cleanup_handler,
1289 ts, "lxc_terminal_ptx_cb");
33b4b411 1290 if (ret < 0) {
36a94ce8 1291 ERROR("Failed to add ptx handler");
33b4b411 1292 goto close_mainloop;
b5159817
DE
1293 }
1294
686df166
CB
1295 if (ts->escape >= 1) {
1296 fprintf(stderr,
1297 "\n"
6834f805
CB
1298 "Connected to tty %1$d\n"
1299 "Type <Ctrl+%2$c q> to exit the console, "
1300 "<Ctrl+%2$c Ctrl+%2$c> to enter Ctrl+%2$c itself\n",
1301 ttynum, 'a' + escape - 1);
686df166 1302 }
6834f805
CB
1303
1304 if (istty) {
1305 ret = lxc_setup_tios(stdinfd, &oldtios);
1306 if (ret < 0)
1307 goto close_mainloop;
1308 }
1309
025ed0f3 1310 ret = lxc_mainloop(&descr, -1);
33b4b411
CB
1311 if (ret < 0) {
1312 ERROR("The mainloop returned an error");
6834f805 1313 goto restore_tios;
b5159817
DE
1314 }
1315
1316 ret = 0;
1317
6834f805
CB
1318restore_tios:
1319 if (istty) {
1320 istty = tcsetattr(stdinfd, TCSAFLUSH, &oldtios);
1321 if (istty < 0)
a24c5678 1322 SYSWARN("Failed to restore terminal properties");
6834f805
CB
1323 }
1324
33b4b411 1325close_mainloop:
b5159817 1326 lxc_mainloop_close(&descr);
33b4b411
CB
1327
1328sigwinch_fini:
28327a43 1329 lxc_terminal_signal_fini(&terminal);
33b4b411
CB
1330
1331close_fds:
36a94ce8 1332 close(ptxfd);
b5159817 1333 close(ttyfd);
33b4b411 1334
b5159817 1335 return ret;
63376d7d 1336}
e98affda 1337
cd0a2b2f 1338int lxc_make_controlling_terminal(int fd)
e98affda
CB
1339{
1340 int ret;
1341
1342 setsid();
1343
1344 ret = ioctl(fd, TIOCSCTTY, (char *)NULL);
1345 if (ret < 0)
1346 return -1;
1347
1348 return 0;
1349}
1350
d049f0e9 1351int lxc_terminal_prepare_login(int fd)
e98affda
CB
1352{
1353 int ret;
1354
cd0a2b2f 1355 ret = lxc_make_controlling_terminal(fd);
e98affda
CB
1356 if (ret < 0)
1357 return -1;
1358
ae6d3913 1359 ret = lxc_terminal_set_stdfds(fd);
e98affda
CB
1360 if (ret < 0)
1361 return -1;
1362
1363 if (fd > STDERR_FILENO)
1364 close(fd);
1365
1366 return 0;
1367}
1368
e9a55b51 1369void lxc_terminal_info_init(struct lxc_terminal_info *terminal)
e98affda 1370{
e9a55b51 1371 terminal->name[0] = '\0';
36a94ce8 1372 terminal->ptx = -EBADF;
41808e20 1373 terminal->pty = -EBADF;
e9a55b51 1374 terminal->busy = -1;
3b9f84fd 1375 terminal->pty_nr = -1;
e98affda
CB
1376}
1377
e9a55b51 1378void lxc_terminal_init(struct lxc_terminal *terminal)
e98affda 1379{
e9a55b51 1380 memset(terminal, 0, sizeof(*terminal));
d926c261 1381 terminal->pty_nr = -1;
41808e20 1382 terminal->pty = -EBADF;
36a94ce8 1383 terminal->ptx = -EBADF;
e9a55b51
CB
1384 terminal->peer = -EBADF;
1385 terminal->log_fd = -EBADF;
1386 lxc_terminal_info_init(&terminal->proxy);
e98affda
CB
1387}
1388
dcad02f8 1389void lxc_terminal_conf_free(struct lxc_terminal *terminal)
e98affda 1390{
2083d59d
CB
1391 free(terminal->log_path);
1392 free(terminal->path);
1393 if (terminal->buffer_size > 0 && terminal->ringbuf.addr)
1394 lxc_ringbuf_release(&terminal->ringbuf);
28327a43 1395 lxc_terminal_signal_fini(terminal);
e98affda 1396}