summaryrefslogtreecommitdiffstats
path: root/cpukit/telnetd/telnetd.c
blob: 24282059aae139814b9d8288b54246414ea15fc0 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
/***********************************************************/
/*
 *
 *  The telnet DAEMON
 *
 *  Author: 17,may 2001
 *
 *   WORK: fernando.ruiz@ctv.es 
 *   HOME: correo@fernando-ruiz.com
 *
 * After start the net you can start this daemon.
 * It uses the previously inited pseudo-terminales (pty.c)
 * getting a new terminal with getpty(). This function
 * gives a terminal name passing a opened socket like parameter.
 *
 * With register_telnetd() you add a new command in the shell to start
 * this daemon interactively. (Login in /dev/console of course)
 * 
 * Sorry but OOB is not still implemented. (This is the first version)
 *
 * Till Straumann <strauman@slac.stanford.edu>
 *  - made the 'shell' interface more generic, i.e. it is now
 *    possible to have 'telnetd' run an arbitrary 'shell'
 *    program.
 */

/*
                      LICENSE INFORMATION

RTEMS is free software; you can redistribute it and/or modify it under
terms of the GNU General Public License as published by the
Free Software Foundation; either version 2, or (at your option) any
later version.  RTEMS is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details. You should have received
a copy of the GNU General Public License along with RTEMS; see
file COPYING. If not, write to the Free Software Foundation, 675
Mass Ave, Cambridge, MA 02139, USA.

As a special exception, including RTEMS header files in a file,
instantiating RTEMS generics or templates, or linking other files
with RTEMS objects to produce an executable application, does not
by itself cause the resulting executable application to be covered
by the GNU General Public License. This exception does not
however invalidate any other reasons why the executable file might be
covered by the GNU Public License.
*/

#ifdef HAVE_CONFIG_H
#include "config.h"
#endif

#include <rtems.h>
#include <rtems/error.h>
#include <rtems/pty.h>
#include <rtems/shell.h>
#include <rtems/telnetd.h>
#include <rtems/bspIo.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <unistd.h>
#include <stdlib.h>
#include <stdio.h>
#include <assert.h>
#include <string.h>
#include <syslog.h>

#include <rtems/userenv.h>
#include <rtems/error.h>
#include <rtems/rtems_bsdnet.h>

#define PARANOIA

extern char *telnet_get_pty(int socket);
extern int   telnet_pty_initialize();
extern int   telnet_pty_finalize();

struct shell_args {
	char	*devname;
	void	*arg;
	char	peername[16];
	char	delete_myself;
};

typedef union uni_sa {
	struct sockaddr_in	sin;
	struct sockaddr     sa;
} uni_sa;

static int sockpeername(int sock, char *buf, int bufsz);

static int initialize_telnetd();

void * telnetd_dflt_spawn(const char *name, unsigned priority, unsigned stackSize, void (*fn)(void*), void *fnarg);

/***********************************************************/
rtems_id            telnetd_task_id      =0;
uint32_t		    telnetd_stack_size   =32000;
rtems_task_priority telnetd_task_priority=0;
int					telnetd_dont_spawn   =0;
void				(*telnetd_shell)(char *, void*)=0;
void				*telnetd_shell_arg	 =0;
void *				(*telnetd_spawn_task)(const char *, unsigned, unsigned, void (*)(void*), void *) = telnetd_dflt_spawn;

static char *grab_a_Connection(int des_socket, uni_sa *srv, char *peername, int sz)
{
char		*rval = 0;
#if 0
socklen_t	
#else
/* 4.6 doesn't have socklen_t */
uint32_t
#endif
			size_adr = sizeof(srv->sin);
int			acp_sock;

	acp_sock = accept(des_socket,&srv->sa,&size_adr);

	if (acp_sock<0) {
		perror("telnetd:accept");
		goto bailout;
	};

	if ( !(rval=telnet_get_pty(acp_sock)) ) {
		syslog( LOG_DAEMON | LOG_ERR, "telnetd: unable to obtain PTY");
		/* NOTE: failing 'do_get_pty()' closed the socket */
		goto bailout;
	}

	if (sockpeername(acp_sock, peername, sz))
		strncpy(peername, "<UNKNOWN>", sz);

#ifdef PARANOIA
	syslog(LOG_DAEMON | LOG_INFO,
			"telnetd: accepted connection from %s on %s",
			peername,
			rval);
#endif

bailout:

	return rval;
}


static void release_a_Connection(char *devname, char *peername, FILE **pstd, int n)
{

#ifdef PARANOIA
	syslog( LOG_DAEMON | LOG_INFO,
			"telnetd: releasing connection from %s on %s",
			peername,
			devname );
#endif

	while (--n>=0)
		if (pstd[n]) fclose(pstd[n]);

}

static int sockpeername(int sock, char *buf, int bufsz)
{
uni_sa	peer;
#if 0
socklen_t	
#else
/* 4.6 doesn't have socklen_t */
uint32_t
#endif
		len  = sizeof(peer.sin);

int		rval = sock < 0;

	if ( !rval)
		rval = getpeername(sock, &peer.sa, &len);

	if ( !rval )
		rval = !inet_ntop( AF_INET, &peer.sin.sin_addr, buf, bufsz );

	return rval;
}

#if 1
#define INSIDE_TELNETD
#include "check_passwd.c"
#else
#define check_passwd(arg) 0
#endif


static void
spawned_shell(void *arg);

/***********************************************************/
static void
rtems_task_telnetd(void *task_argument)
{
int					des_socket;
uni_sa				srv;
char				*devname;
char				peername[16];
int					i=1;
int					size_adr;
struct shell_args	*arg;

	if ((des_socket=socket(PF_INET,SOCK_STREAM,0))<0) {
		perror("telnetd:socket");
		telnetd_task_id=0;
		rtems_task_delete(RTEMS_SELF);
	};
	setsockopt(des_socket,SOL_SOCKET,SO_KEEPALIVE,&i,sizeof(i));

	memset(&srv,0,sizeof(srv));
	srv.sin.sin_family=AF_INET;
	srv.sin.sin_port=htons(23);
	size_adr=sizeof(srv.sin);
	if ((bind(des_socket,&srv.sa,size_adr))<0) {
		perror("telnetd:bind");
	        close(des_socket);
		telnetd_task_id=0;
		rtems_task_delete(RTEMS_SELF);
	};
	if ((listen(des_socket,5))<0) {
		perror("telnetd:listen");
	        close(des_socket);
		telnetd_task_id=0;
		rtems_task_delete(RTEMS_SELF);
	};

	/* we don't redirect stdio as this probably
	 * was started from the console anyways..
	 */
	do {
	  devname = grab_a_Connection(des_socket, &srv, peername, sizeof(peername));

	  if ( !devname ) {
		/* if something went wrong, sleep for some time */
		sleep(10);
		continue;
	  }
	  if ( telnetd_dont_spawn ) {
		if ( 0 == check_passwd(peername) )
			telnetd_shell(devname, telnetd_shell_arg);
	  } else {
		arg = malloc( sizeof(*arg) );

		arg->devname = devname;
		arg->arg = telnetd_shell_arg;
		strncpy(arg->peername, peername, sizeof(arg->peername));

		if ( !telnetd_spawn_task(&devname[5], telnetd_task_priority, telnetd_stack_size, spawned_shell, arg) ) {

			FILE *dummy;

			if ( telnetd_spawn_task != telnetd_dflt_spawn ) {
				fprintf(stderr,"Telnetd: Unable to spawn child task\n");
			}

			/* hmm - the pty driver slot can only be
			 * released by opening and subsequently
			 * closing the PTY - this also closes
			 * the underlying socket. So we mock up
			 * a stream...
			 */

			if ( !(dummy=fopen(devname,"r+")) )
				perror("Unable to dummy open the pty, losing a slot :-(");
			release_a_Connection(devname, peername, &dummy, 1);
			free(arg);
			sleep(2); /* don't accept connections too fast */
  		}
	  }
	} while(1);
	/* TODO: how to free the connection semaphore? But then - 
	 *       stopping the daemon is probably only needed during
	 *       development/debugging.
	 *       Finalizer code should collect all the connection semaphore
	 *       counts and eventually clean up...
	 */
	close(des_socket);
	telnetd_task_id=0;
}
/***********************************************************/
static int initialize_telnetd(void) {
	
	if (telnetd_task_id         ) return RTEMS_RESOURCE_IN_USE;
	if (telnetd_stack_size<=0   ) telnetd_stack_size   =32000;

	if ( !telnetd_spawn_task("TNTD", telnetd_task_priority, RTEMS_MINIMUM_STACK_SIZE, rtems_task_telnetd, 0) ) {
		return -1;	
	}
	return 0;
}

/***********************************************************/
int startTelnetd(void (*cmd)(char *, void *), void *arg, int dontSpawn, int stack, int priority)
{
	rtems_status_code	sc;

	printf("This is rtems-telnetd (modified by Till Straumann)\n");
	printf("$Id$\n");
	printf("Release $Name$\n");

	if ( !telnetd_shell && !cmd ) {
		fprintf(stderr,"startTelnetd(): setup error - NO SHELL; bailing out\n");
		return 1;
	}

	if (telnetd_task_id) {
		fprintf(stderr,"ERROR:telnetd already started\n");
		return 1;
	};

	if ( !telnet_pty_initialize() ) {
		fprintf(stderr,"PTY driver probably not properly registered\n");
		return 1;
	}

	if (cmd)
		telnetd_shell = cmd;
	telnetd_shell_arg     = arg;
	telnetd_stack_size    = stack;
	if ( !priority ) {
		priority = rtems_bsdnet_config.network_task_priority;
	}
	if ( priority < 2 )
		priority=100;
	telnetd_task_priority = priority;
	telnetd_dont_spawn    = dontSpawn;

	sc=initialize_telnetd();
        if (sc!=RTEMS_SUCCESSFUL) return sc;
	printf("rtems_telnetd() started with stacksize=%u,priority=%d\n",
                        (unsigned)telnetd_stack_size,(int)telnetd_task_priority);
	return 0;
}

/* utility wrapper */
static void
spawned_shell(void *targ)
{
rtems_status_code	sc;
FILE				*nstd[3]={0};
FILE				*ostd[3]={ stdin, stdout, stderr };
int					i=0;
struct shell_args	*arg = targ;

	sc=rtems_libio_set_private_env();

	/* newlib hack/workaround. Before we change stdin/out/err we must make
         * sure the internal data are initialized (fileno(stdout) has this sideeffect).
	 * This should probably be done from RTEMS' libc support layer...
	 * (T.S., newlibc-1.13; 2005/10)
         */

	fileno(stdout);

	if (RTEMS_SUCCESSFUL != sc) {
		rtems_error(sc,"rtems_libio_set_private_env");
		goto cleanup;
	}

	/* redirect stdio */
	for (i=0; i<3; i++) {
		if ( !(nstd[i]=fopen(arg->devname,"r+")) ) {
			perror("unable to open stdio");
			goto cleanup;
		}
	}

	stdin  = nstd[0];
	stdout = nstd[1];
	stderr = nstd[2];



#if 0
printk("STDOUT is now %x (%x) (FD %i/%i)\n",stdout,nstd[1],fileno(stdout),fileno(nstd[1]));
printf("hello\n");
write(fileno(stdout),"hellofd\n",8);
#endif

	/* call their routine */
	if ( 0 == check_passwd(arg->peername) )
		telnetd_shell(arg->devname, arg->arg);

	stdin  = ostd[0];
	stdout = ostd[1];
	stderr = ostd[2];

cleanup:
	release_a_Connection(arg->devname, arg->peername, nstd, i);
	free(arg);
}

struct wrap_delete_args {
	void (*t)(void *);
	void           *a;
};

static rtems_task
wrap_delete(rtems_task_argument arg)
{
struct wrap_delete_args     *pwa = (struct wrap_delete_args *)arg;
register void              (*t)(void *) = pwa->t;
register void               *a   = pwa->a;

	/* free argument before calling function (which may never return if
	 * they choose to delete themselves)
	 */
	free(pwa);
	t(a);
	rtems_task_delete(RTEMS_SELF);
}

void *
telnetd_dflt_spawn(const char *name, unsigned int priority, unsigned int stackSize, void (*fn)(void *), void* fnarg)
{
rtems_status_code sc;
rtems_id          task_id;
char              nm[4] = {'X','X','X','X' };
struct wrap_delete_args *pwa = malloc(sizeof(*pwa));

		strncpy(nm, name, 4);

		if ( !pwa ) {
			perror("Telnetd: no memory\n");
			return 0;
		}

		pwa->t = fn;
		pwa->a = fnarg;

		if ((sc=rtems_task_create(
				rtems_build_name(nm[0], nm[1], nm[2], nm[3]),
				(rtems_task_priority)priority,
				stackSize,
				RTEMS_DEFAULT_MODES,
				RTEMS_DEFAULT_ATTRIBUTES | RTEMS_FLOATING_POINT,
				&task_id)) ||
			(sc=rtems_task_start(
				task_id,
				wrap_delete,
				(rtems_task_argument)pwa))) {
					free(pwa);
					rtems_error(sc,"Telnetd: spawning task failed");
					return 0;
		}
	return (void*)task_id;
}

/* convenience routines for CEXP (retrieve stdio descriptors
 * from reent structure)
 *
 */
#ifdef stdin
static __inline__ FILE *
_stdin(void)  { return stdin; }
#undef stdin
FILE *stdin(void)  { return _stdin(); }
#endif
#ifdef stdout
static __inline__ FILE *
_stdout(void) { return stdout; }
#undef stdout
FILE *stdout(void) { return _stdout(); }
#endif
#ifdef stderr
static __inline__ FILE *
_stderr(void) { return stderr; }
#undef stderr
FILE *stderr(void) { return _stderr(); }
#endif

/* MUST NOT USE stdin & friends below here !!!!!!!!!!!!! */