summaryrefslogtreecommitdiffstats
path: root/cpukit/telnetd/telnetd.c
blob: 5d1604e7d9707c8fcb5908e2db354ec96e1f804f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
/**
 * @file
 * 
 * @brief The telnet DAEMON
 *
 * After start the net you can start this daemon.
 * It uses the previously inited pseudo-terminales (pty.c)
 * getting a new terminal with getpty(). This function
 * gives a terminal name passing a opened socket like parameter.
 *
 * With register_telnetd() you add a new command in the shell to start
 * this daemon interactively. (Login in /dev/console of course)
 *
 * Sorry but OOB is not still implemented. (This is the first version)
 */

/*
 * Copyright (c) 2001 Fernando Ruiz Casas <fruizcasas@gmail.com>
 *
 * Till Straumann <strauman@slac.stanford.edu>
 *  - made the 'shell' interface more generic, i.e. it is now
 *    possible to have 'telnetd' run an arbitrary 'shell'
 *    program.
 *
 * Copyright (C) 2009, 2018 embedded brains GmbH & Co. KG
 *
 * The license and distribution terms for this file may be
 * found in the file LICENSE in this distribution or at
 * http://www.rtems.org/license/LICENSE.
 */

#ifdef HAVE_CONFIG_H
#include "config.h"
#endif

#include <sys/queue.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <inttypes.h>
#include <unistd.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <syslog.h>

#include <rtems.h>
#include <rtems/pty.h>
#include <rtems/shell.h>
#include <rtems/telnetd.h>
#include <rtems/thread.h>
#include <rtems/userenv.h>

#define TELNETD_EVENT_SUCCESS RTEMS_EVENT_0

#define TELNETD_EVENT_ERROR RTEMS_EVENT_1

typedef struct telnetd_context telnetd_context;

typedef struct telnetd_session {
  rtems_pty_context            pty;
  char                         peername[16];
  telnetd_context             *ctx;
  rtems_id                     task_id;
  LIST_ENTRY(telnetd_session)  link;
} telnetd_session;

struct telnetd_context {
  rtems_telnetd_config_table   config;
  int                          server_socket;
  rtems_id                     task_id;
  rtems_mutex                  mtx;
  LIST_HEAD(, telnetd_session) free_sessions;
  telnetd_session              sessions[RTEMS_ZERO_LENGTH_ARRAY];
};

typedef union {
  struct sockaddr_in sin;
  struct sockaddr    sa;
} telnetd_address;

RTEMS_NO_RETURN static void telnetd_session_fatal_error(
  const telnetd_context *ctx
)
{
  (void)rtems_event_send(ctx->task_id, TELNETD_EVENT_ERROR);
  rtems_task_exit();
}

static bool telnetd_login(telnetd_context *ctx, telnetd_session *session)
{
  bool success;

  if (ctx->config.login_check == NULL) {
    return true;
  }

  success = rtems_shell_login_prompt(
    stdin,
    stderr,
    session->pty.name,
    ctx->config.login_check
  );

  if (!success) {
    syslog(
      LOG_AUTHPRIV | LOG_WARNING,
      "telnetd: too many wrong passwords entered from %s",
      session->peername
    );
  }

  return success;
}

static void telnetd_session_task(rtems_task_argument arg)
{
  rtems_status_code sc;
  telnetd_session *session;
  telnetd_context *ctx;
  const char *path;

  session = (telnetd_session *) arg;
  ctx = session->ctx;

  sc = rtems_libio_set_private_env();
  if (sc != RTEMS_SUCCESSFUL) {
    telnetd_session_fatal_error(ctx);
  }

  path = rtems_pty_get_path(&session->pty);

  stdin = fopen(path, "r+");
  if (stdin == NULL) {
    telnetd_session_fatal_error(ctx);
  }

  stdout = fopen(path, "r+");
  if (stdout == NULL) {
    telnetd_session_fatal_error(ctx);
  }

  stderr = fopen(path, "r+");
  if (stderr == NULL) {
    telnetd_session_fatal_error(ctx);
  }

  (void)rtems_event_send(ctx->task_id, TELNETD_EVENT_SUCCESS);

  while (true) {
    rtems_event_set events;

    (void)rtems_event_system_receive(
      RTEMS_EVENT_SYSTEM_SERVER,
      RTEMS_WAIT | RTEMS_EVENT_ALL,
      RTEMS_NO_TIMEOUT,
      &events
    );

    syslog(
      LOG_DAEMON | LOG_INFO,
      "telnetd: accepted connection from %s on %s",
      session->peername,
      path
    );

    if (telnetd_login(ctx, session)) {
      (*ctx->config.command)(session->pty.name, ctx->config.arg);
    }

    syslog(
      LOG_DAEMON | LOG_INFO,
      "telnetd: releasing connection from %s on %s",
      session->peername,
      path
    );

    rtems_pty_close_socket(&session->pty);

    rtems_mutex_lock(&ctx->mtx);
    LIST_INSERT_HEAD(&ctx->free_sessions, session, link);
    rtems_mutex_unlock(&ctx->mtx);
  }
}

static void telnetd_sleep_after_error(void)
{
      /* If something went wrong, sleep for some time */
      rtems_task_wake_after(10 * rtems_clock_get_ticks_per_second());
}

static void telnetd_server_task(rtems_task_argument arg)
{
  telnetd_context *ctx;

  ctx = (telnetd_context *) arg;

  while (true) {
    telnetd_address peer;
    socklen_t address_len;
    int session_socket;
    telnetd_session *session;

    address_len = sizeof(peer.sin);
    session_socket = accept(ctx->server_socket, &peer.sa, &address_len);
    if (session_socket < 0) {
      syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot accept session");
      telnetd_sleep_after_error();
      continue;
    };

    rtems_mutex_lock(&ctx->mtx);
    session = LIST_FIRST(&ctx->free_sessions);

    if (session == NULL) {
      rtems_mutex_unlock(&ctx->mtx);

      (void)close(session_socket);
      syslog(LOG_DAEMON | LOG_ERR, "telnetd: no free session available");
      telnetd_sleep_after_error();
      continue;
    }

    LIST_REMOVE(session, link);
    rtems_mutex_unlock(&ctx->mtx);

    rtems_pty_set_socket(&session->pty, session_socket);

    if (
      inet_ntop(
        AF_INET,
        &peer.sin.sin_addr,
        session->peername,
        sizeof(session->peername)
      ) == NULL
    ) {
      strlcpy(session->peername, "<UNKNOWN>", sizeof(session->peername));
    }

    (void)rtems_event_system_send(session->task_id, RTEMS_EVENT_SYSTEM_SERVER);
  }
}

static void telnetd_destroy_context(telnetd_context *ctx)
{
  telnetd_session *session;

  LIST_FOREACH(session, &ctx->free_sessions, link) {
    if (session->task_id != 0) {
      (void)rtems_task_delete(session->task_id);
    }

    (void)unlink(rtems_pty_get_path(&session->pty));
  }

  if (ctx->server_socket >= 0) {
    (void)close(ctx->server_socket);
  }

  rtems_mutex_destroy(&ctx->mtx);
  free(ctx);
}

static rtems_status_code telnetd_create_server_socket(telnetd_context *ctx)
{
  telnetd_address srv;
  socklen_t address_len;
  int enable;

  ctx->server_socket = socket(PF_INET, SOCK_STREAM, 0);
  if (ctx->server_socket < 0) {
    syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot create server socket");
    return RTEMS_UNSATISFIED;
  }

  enable = 1;
  (void)setsockopt(
    ctx->server_socket,
    SOL_SOCKET,
    SO_KEEPALIVE,
    &enable,
    sizeof(enable)
  );

  memset(&srv, 0, sizeof(srv));
  srv.sin.sin_family = AF_INET;
  srv.sin.sin_port = htons(ctx->config.port);
  address_len = sizeof(srv.sin);

  if (bind(ctx->server_socket, &srv.sa, address_len) != 0) {
    syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot bind server socket");
    return RTEMS_RESOURCE_IN_USE;
  };

  if (listen(ctx->server_socket, ctx->config.client_maximum) != 0) {
    syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot listen on server socket");
    return RTEMS_UNSATISFIED;
  };

  return RTEMS_SUCCESSFUL;
}

static rtems_status_code telnetd_create_session_tasks(telnetd_context *ctx)
{
  uint16_t i;

  ctx->task_id = rtems_task_self();

  for (i = 0; i < ctx->config.client_maximum; ++i) {
    telnetd_session *session;
    rtems_status_code sc;
    const char *path;
    rtems_event_set events;

    session = &ctx->sessions[i];
    session->ctx = ctx;
    rtems_mutex_init(&ctx->mtx, "Telnet");
    LIST_INSERT_HEAD(&ctx->free_sessions, session, link);

    sc = rtems_task_create(
      rtems_build_name('T', 'N', 'T', 'a' + i % 26),
      ctx->config.priority,
      ctx->config.stack_size,
      RTEMS_DEFAULT_MODES,
      RTEMS_FLOATING_POINT,
      &session->task_id
    );
    if (sc != RTEMS_SUCCESSFUL) {
      syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot create session task");
      return RTEMS_UNSATISFIED;
    }

    path = rtems_pty_initialize(&session->pty, i);
    if (path == NULL) {
      syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot create session PTY");
      return RTEMS_UNSATISFIED;
    }

    (void)rtems_task_start(
      session->task_id,
      telnetd_session_task,
      (rtems_task_argument) session
    );

    (void)rtems_event_receive(
      TELNETD_EVENT_SUCCESS | TELNETD_EVENT_ERROR,
      RTEMS_WAIT | RTEMS_EVENT_ANY,
      RTEMS_NO_TIMEOUT,
      &events
    );

    if ((events & TELNETD_EVENT_ERROR) != 0) {
      syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot initialize session task");
      return RTEMS_UNSATISFIED;
    }
  }

  return RTEMS_SUCCESSFUL;
}

rtems_status_code rtems_telnetd_start(const rtems_telnetd_config_table* config)
{
  telnetd_context *ctx;
  rtems_status_code sc;
  uint16_t client_maximum;

  if (config->command == NULL) {
    syslog(LOG_DAEMON | LOG_ERR, "telnetd: configuration with invalid command");
    return RTEMS_INVALID_ADDRESS;
  }

  if (config->client_maximum == 0) {
    client_maximum = 5;
  } else {
    client_maximum = config->client_maximum;
  }

  ctx = calloc(
    1,
    sizeof(*ctx) + client_maximum * sizeof(ctx->sessions[0])
  );
  if (ctx == NULL) {
    syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot allocate server context");
    return RTEMS_UNSATISFIED;
  }

  ctx->config = *config;
  ctx->config.client_maximum = client_maximum;
  ctx->server_socket = -1;
  LIST_INIT(&ctx->free_sessions);

  /* Set priority */
  if (ctx->config.priority == 0) {
    ctx->config.priority = 100;
  }

  /* Check stack size */
  if (ctx->config.stack_size == 0) {
    ctx->config.stack_size = (size_t)32 * 1024;
  }

  if (ctx->config.port == 0) {
    ctx->config.port = 23;
  }

  sc = telnetd_create_server_socket(ctx);
  if (sc != RTEMS_SUCCESSFUL) {
    telnetd_destroy_context(ctx);
    return sc;
  }

  sc = telnetd_create_session_tasks(ctx);
  if (sc != RTEMS_SUCCESSFUL) {
    telnetd_destroy_context(ctx);
    return sc;
  }

  sc = rtems_task_create(
    rtems_build_name('T', 'N', 'T', 'D'),
    ctx->config.priority,
    RTEMS_MINIMUM_STACK_SIZE,
    RTEMS_DEFAULT_MODES,
    RTEMS_FLOATING_POINT,
    &ctx->task_id
  );
  if (sc != RTEMS_SUCCESSFUL) {
    syslog(LOG_DAEMON | LOG_ERR, "telnetd: cannot create server task");
    telnetd_destroy_context(ctx);
    return RTEMS_UNSATISFIED;
  }

  (void)rtems_task_start(
    ctx->task_id,
    telnetd_server_task,
    (rtems_task_argument) ctx
  );

  syslog(
    LOG_DAEMON | LOG_INFO,
    "telnetd: started successfully on port %" PRIu16, ctx->config.port
  );
  return RTEMS_SUCCESSFUL;
}