xtrn.cpp 68.2 KB
Newer Older
1
/* xtrn.cpp */
rswindell's avatar
rswindell committed
2
// vi: tabstop=4
3
4
5
6
7
8
9
10
11

/* Synchronet external program support routines */

/* $Id$ */

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
rswindell's avatar
rswindell committed
12
 * Copyright Rob Swindell - http://www.synchro.net/copyright.html			*
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
 *																			*
 * This program is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU General Public License				*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU General Public License for more details: gpl.txt or			*
 * http://www.fsf.org/copyleft/gpl.html										*
 *																			*
 * Anonymous FTP access to the most recent released source is available at	*
 * ftp://vert.synchro.net, ftp://cvs.synchro.net and ftp://ftp.synchro.net	*
 *																			*
 * Anonymous CVS access to the development source and modification history	*
 * is available at cvs.synchro.net:/cvsroot/sbbs, example:					*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs login			*
 *     (just hit return, no password is necessary)							*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs checkout src		*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * You are encouraged to submit any modifications (preferably in Unix diff	*
 * format) via e-mail to mods@synchro.net									*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/
#include "sbbs.h"
#include "cmdshell.h"
#include "telnet.h"

42
43
#include <signal.h>			// kill()

44
45
46
#ifdef __unix__
	#include <sys/wait.h>	// WEXITSTATUS

deuce's avatar
deuce committed
47
48
	#define TTYDEFCHARS		// needed for ttydefchars definition
	#include <sys/ttydefaults.h>	// Linux - it's motherfucked.
rswindell's avatar
rswindell committed
49
#if defined(__FreeBSD__)
50
	#include <libutil.h>	// forkpty()
deuce's avatar
deuce committed
51
#elif defined(__OpenBSD__) || defined(__NetBSD__) || defined(__DARWIN__)
rswindell's avatar
rswindell committed
52
53
	#include <util.h>
#elif defined(__linux__)
54
	#include <pty.h>
55
#elif defined(__QNX__)
56
#if 0
57
	#include <unix.h>
58
59
60
#else
	#define NEEDS_FORKPTY
#endif
61
#endif
62
63
64
65
66

	#ifdef NEEDS_FORKPTY
	#include <grp.h>
	#endif

67
	#include <termios.h>
68

deuce's avatar
deuce committed
69
70
71
72
/*
 * Control Character Defaults
 */
#ifndef CTRL
73
	#define CTRL(x)	(x&037)
deuce's avatar
deuce committed
74
75
#endif
#ifndef CEOF
76
	#define	CEOF		CTRL('d')
deuce's avatar
deuce committed
77
78
#endif
#ifndef CEOL
79
	#define	CEOL		0xff		/* XXX avoid _POSIX_VDISABLE */
deuce's avatar
deuce committed
80
81
#endif
#ifndef CERASE
82
	#define	CERASE		0177
deuce's avatar
deuce committed
83
84
#endif
#ifndef CERASE2
85
	#define	CERASE2		CTRL('h')
deuce's avatar
deuce committed
86
87
#endif
#ifndef CINTR
88
	#define	CINTR		CTRL('c')
deuce's avatar
deuce committed
89
90
#endif
#ifndef CSTATUS
91
	#define	CSTATUS		CTRL('t')
deuce's avatar
deuce committed
92
93
#endif
#ifndef CKILL
94
	#define	CKILL		CTRL('u')
deuce's avatar
deuce committed
95
96
#endif
#ifndef CMIN
97
	#define	CMIN		1
deuce's avatar
deuce committed
98
99
#endif
#ifndef CQUIT
100
	#define	CQUIT		034		/* FS, ^\ */
deuce's avatar
deuce committed
101
102
#endif
#ifndef CSUSP
103
	#define	CSUSP		CTRL('z')
deuce's avatar
deuce committed
104
105
#endif
#ifndef CTIME
106
	#define	CTIME		0
deuce's avatar
deuce committed
107
108
#endif
#ifndef CDSUSP
109
	#define	CDSUSP		CTRL('y')
deuce's avatar
deuce committed
110
111
#endif
#ifndef CSTART
112
	#define	CSTART		CTRL('q')
deuce's avatar
deuce committed
113
114
#endif
#ifndef CSTOP
115
	#define	CSTOP		CTRL('s')
deuce's avatar
deuce committed
116
117
#endif
#ifndef CLNEXT
118
	#define	CLNEXT		CTRL('v')
deuce's avatar
deuce committed
119
120
#endif
#ifndef CDISCARD
121
	#define	CDISCARD 	CTRL('o')
deuce's avatar
deuce committed
122
123
#endif
#ifndef CWERASE
124
	#define	CWERASE 	CTRL('w')
deuce's avatar
deuce committed
125
126
#endif
#ifndef CREPRINT
127
	#define	CREPRINT 	CTRL('r')
deuce's avatar
deuce committed
128
129
#endif
#ifndef CEOT
130
	#define	CEOT		CEOF
deuce's avatar
deuce committed
131
132
133
#endif
/* compat */
#ifndef CBRK
134
	#define	CBRK		CEOL
deuce's avatar
deuce committed
135
136
#endif
#ifndef CRPRNT
137
	#define CRPRNT		CREPRINT
deuce's avatar
deuce committed
138
139
#endif
#ifndef CFLUSH
140
141
142
	#define	CFLUSH		CDISCARD
#endif

deuce's avatar
deuce committed
143
#ifndef TTYDEF_IFLAG
144
	#define TTYDEF_IFLAG    (BRKINT | ICRNL | IMAXBEL | IXON | IXANY)
deuce's avatar
deuce committed
145
146
#endif
#ifndef TTYDEF_OFLAG
147
	#define TTYDEF_OFLAG    (OPOST | ONLCR)
deuce's avatar
deuce committed
148
149
#endif
#ifndef TTYDEF_LFLAG
150
	#define TTYDEF_LFLAG    (ECHO | ICANON | ISIG | IEXTEN | ECHOE|ECHOKE|ECHOCTL)
deuce's avatar
deuce committed
151
152
#endif
#ifndef TTYDEF_CFLAG
153
	#define TTYDEF_CFLAG    (CREAD | CS8 | HUPCL)
deuce's avatar
deuce committed
154
#endif
deuce's avatar
deuce committed
155
#if defined(__QNX__) || defined(__solaris__) || defined(__NetBSD__)
156
157
158
	static cc_t     ttydefchars[NCCS] = {
        CEOF,   CEOL,   CEOL,   CERASE, CWERASE, CKILL, CREPRINT,
        CERASE2, CINTR, CQUIT,  CSUSP,  CDSUSP, CSTART, CSTOP,  CLNEXT,
deuce's avatar
deuce committed
159
160
161
162
        CDISCARD, CMIN, CTIME,  CSTATUS
#ifndef __solaris__
	, _POSIX_VDISABLE
#endif
163
	};
164
165
#endif

166
167
#endif	/* __unix__ */

168
#define XTRN_IO_BUF_LEN 10000	/* 50% of IO_THREAD_BUF_SIZE */
169

170
171
172
173
174
175
176
177
178
179
/*****************************************************************************/
/* Interrupt routine to expand WWIV Ctrl-C# codes into ANSI escape sequences */
/*****************************************************************************/
BYTE* wwiv_expand(BYTE* buf, ulong buflen, BYTE* outbuf, ulong& newlen
	,ulong user_misc, bool& ctrl_c)
{
    char	ansi_seq[32];
	ulong 	i,j,k;

    for(i=j=0;i<buflen;i++) {
180
        if(buf[i]==CTRL_C) {	/* WWIV color escape char */
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
            ctrl_c=true;
            continue;
        }
        if(!ctrl_c) {
            outbuf[j++]=buf[i];
            continue;
        }
        ctrl_c=false;
        if(user_misc&ANSI) {
            switch(buf[i]) {
                default:
                    strcpy(ansi_seq,"\x1b[0m");          /* low grey */
                    break;
                case '1':
                    strcpy(ansi_seq,"\x1b[0;1;36m");     /* high cyan */
                    break;
                case '2':
                    strcpy(ansi_seq,"\x1b[0;1;33m");     /* high yellow */
                    break;
                case '3':
                    strcpy(ansi_seq,"\x1b[0;35m");       /* low magenta */
                    break;
                case '4':
                    strcpy(ansi_seq,"\x1b[0;1;44m");     /* white on blue */
                    break;
                case '5':
                    strcpy(ansi_seq,"\x1b[0;32m");       /* low green */
                    break;
                case '6':
                    strcpy(ansi_seq,"\x1b[0;1;5;31m");   /* high blinking red */
                    break;
                case '7':
                    strcpy(ansi_seq,"\x1b[0;1;34m");     /* high blue */
                    break;
                case '8':
                    strcpy(ansi_seq,"\x1b[0;34m");       /* low blue */
                    break;
                case '9':
                    strcpy(ansi_seq,"\x1b[0;36m");       /* low cyan */
                    break;
            }
            for(k=0;ansi_seq[k];k++)
                outbuf[j++]=ansi_seq[k];
        }
    }
    newlen=j;
    return(outbuf);
}
229
230

/*****************************************************************************/
231
// Escapes Telnet IAC (255) by doubling the IAC char
232
/*****************************************************************************/
233
BYTE* telnet_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
234
235
236
237
238
239
{
	BYTE*   first_iac;
	ulong	i,outlen;

    first_iac=(BYTE*)memchr(inbuf, TELNET_IAC, inlen);

240
	if(first_iac==NULL) {	/* Nothing to expand */
241
242
243
244
		newlen=inlen;
		return(inbuf);
	}

245
246
	outlen=first_iac-inbuf;
	memcpy(outbuf, inbuf, outlen);
247
248
249

    for(i=outlen;i<inlen;i++) {
		if(inbuf[i]==TELNET_IAC)
250
			outbuf[outlen++]=TELNET_IAC;
251
252
253
254
255
		outbuf[outlen++]=inbuf[i];
	}
    newlen=outlen;
    return(outbuf);
}
256

257
258
259
260
261
262
263
static void petscii_convert(BYTE* buf, ulong len)
{
    for(ulong i=0; i<len; i++) {
		buf[i] = cp437_to_petscii(buf[i]);
	}
}

264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
static bool native_executable(scfg_t* cfg, const char* cmdline, long mode)
{
	char*	p;
	char	str[MAX_PATH+1];
	char	name[64];
	char	base[64];
	unsigned i;

	if(mode&EX_NATIVE)
		return(TRUE);

    SAFECOPY(str,cmdline);				/* Set str to program name only */
	truncstr(str," ");
    SAFECOPY(name,getfname(str));
	SAFECOPY(base,name);
	if((p=getfext(base))!=NULL)
		*p=0;

    for(i=0;i<cfg->total_natvpgms;i++)
        if(stricmp(name,cfg->natvpgm[i]->name)==0
		|| stricmp(base,cfg->natvpgm[i]->name)==0)
            break;
    return(i<cfg->total_natvpgms);
}

289
#define XTRN_LOADABLE_MODULE(cmdline,startup_dir)			\
290
	if(cmdline[0]=='*')		/* Baja module or JavaScript */	\
rswindell's avatar
rswindell committed
291
		return(exec_bin(cmdline+1,&main_csi,startup_dir))
292
#ifdef JAVASCRIPT
293
	#define XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir)	\
294
	if(cmdline[0]=='?') 	/* JavaScript */				\
rswindell's avatar
rswindell committed
295
		return(js_execfile(cmdline+1,startup_dir))
296
297
298
#else
	#define XTRN_LOADABLE_JS_MODULE
#endif
299
300
301
302
303
304
305

#ifdef _WIN32

#include "execvxd.h"	/* Win9X FOSSIL VxD API */

extern SOCKET node_socket[];

306
307
308
// -------------------------------------------------------------------------
// GetAddressOfOpenVxDHandle
//
rswindell's avatar
rswindell committed
309
// This function returns the address of OpenVxDHandle. OpenVxDHandle is a
310
311
312
313
// KERNEL32 function that returns a ring 0 event handle that corresponds to a
// given ring 3 event handle. The ring 0 handle can be used by VxDs to
// synchronize with the Win32 app.
//
314
315
316
typedef HANDLE (WINAPI *OPENVXDHANDLE)(HANDLE);

OPENVXDHANDLE GetAddressOfOpenVxDHandle(void)
317
{
318
	return((OPENVXDHANDLE)GetProcAddress(hK32, "OpenVxDHandle"));
319
320
}

321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
/*****************************************************************************/
// Expands Single CR to CRLF
/*****************************************************************************/
BYTE* cr_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		outbuf[j++]=inbuf[i];
		if(inbuf[i]=='\r')
			outbuf[j++]='\n';
	}
	newlen=j;
    return(outbuf);
}

337
338
339
340
341
342
343
344
static void add_env_var(str_list_t* list, const char* var, const char* val)
{
	char	str[MAX_PATH*2];
	SetEnvironmentVariable(var,NULL);	/* Delete in current process env */
	SAFEPRINTF2(str,"%s=%s",var,val);
	strListPush(list,str);
}

345
346
347
348
349
350
351
352
/* Clean-up resources while preserving current LastError value */
#define XTRN_CLEANUP												\
	last_error=GetLastError();										\
    if(vxd!=INVALID_HANDLE_VALUE)		CloseHandle(vxd);			\
	if(rdslot!=INVALID_HANDLE_VALUE)	CloseHandle(rdslot);		\
	if(wrslot!=INVALID_HANDLE_VALUE)	CloseHandle(wrslot);		\
	if(start_event!=NULL)				CloseHandle(start_event);	\
	if(hungup_event!=NULL)				CloseHandle(hungup_event);	\
353
	if(hangup_event!=NULL)				CloseHandle(hangup_event);	\
354
355
356
	ReleaseMutex(exec_mutex);										\
	SetLastError(last_error)

357
358
359
/****************************************************************************/
/* Runs an external program 												*/
/****************************************************************************/
360
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
361
{
362
363
364
	char	str[MAX_PATH+1];
	char*	env_block=NULL;
	char*	env_strings;
365
	const char* p_startup_dir;
366
	char	path[MAX_PATH+1];
367
368
369
370
    char	fullcmdline[MAX_PATH+1];
	char	realcmdline[MAX_PATH+1];
	char	comspec_str[MAX_PATH+1];
	char	title[MAX_PATH+1];
371
372
	BYTE	buf[XTRN_IO_BUF_LEN],*bp;
    BYTE 	telnet_buf[XTRN_IO_BUF_LEN*2];
373
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
374
375
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
376
    bool	native=false;			// DOS program by default
rswindell's avatar
rswindell committed
377
	bool	nt=false;				// WinNT/2K?
378
    bool	was_online=true;
379
	bool	rio_abortable_save=rio_abortable;
380
	bool	use_pipes=false;	// NT-compatible console redirection
381
	BOOL	success;
382
	BOOL	processTerminated=false;
383
	uint	i;
384
385
386
387
    time_t	hungup=0;
	HANDLE	vxd=INVALID_HANDLE_VALUE;
	HANDLE	rdslot=INVALID_HANDLE_VALUE;
	HANDLE	wrslot=INVALID_HANDLE_VALUE;
388
	HANDLE  start_event=NULL;
389
	HANDLE	hungup_event=NULL;
390
	HANDLE	hangup_event=NULL;
391
392
	HANDLE	rdoutpipe;
	HANDLE	wrinpipe;
393
394
    PROCESS_INFORMATION process_info;
	DWORD	hVM;
deuce's avatar
deuce committed
395
	unsigned long	rd;
396
    unsigned long	wr;
deuce's avatar
deuce committed
397
    unsigned long	len;
398
    DWORD	avail;
deuce's avatar
deuce committed
399
400
401
	unsigned long	dummy;
	unsigned long	msglen;
	unsigned long	retval;
402
403
	DWORD	last_error;
	DWORD	loop_since_io=0;
404
	struct	tm tm;
405
	str_list_t	env_list;
406
	sbbsexec_start_t start;
407
	OPENVXDHANDLE OpenVxDHandle;
408

409
	xtrn_mode = mode;
410
	lprintf(LOG_DEBUG,"Executing external: %s",cmdline);
411

412
413
414
415
416
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

417
418
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
	XTRN_LOADABLE_JS_MODULE(cmdline,startup_dir);
419

420
	attr(cfg.color[clr_external]);		/* setup default attributes */
421

422
	native = native_executable(&cfg, cmdline, mode);
423

424
	if(!native && (startup->options&BBS_OPT_NO_DOS)) {
425
		lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
426
427
428
429
		bprintf("Sorry, DOS programs are not supported on this node.\r\n");
		return -1;
	}

rswindell's avatar
rswindell committed
430
	if(mode&EX_SH || strcspn(cmdline,"<>|")!=strlen(cmdline))
431
432
433
434
435
436
		sprintf(comspec_str,"%s /C ", comspec);
	else
		comspec_str[0]=0;

    if(startup_dir && cmdline[1]!=':' && cmdline[0]!='/'
    	&& cmdline[0]!='\\' && cmdline[0]!='.')
437
       	SAFEPRINTF3(fullcmdline, "%s%s%s", comspec_str, startup_dir, cmdline);
438
    else
439
    	SAFEPRINTF2(fullcmdline, "%s%s", comspec_str, cmdline);
440

441
	SAFECOPY(realcmdline, fullcmdline);	// for errormsg if failed to execute
442
443

	now=time(NULL);
444
445
	if(localtime_r(&now,&tm)==NULL)
		memset(&tm,0,sizeof(tm));
446

447
448
	OpenVxDHandle=GetAddressOfOpenVxDHandle();

rswindell's avatar
rswindell committed
449
	if(OpenVxDHandle==NULL)
450
451
		nt=true;	// Windows NT/2000

452
453
454
455
456
457
	if(!nt && !native && !(cfg.xtrn_misc&XTRN_NO_MUTEX)
		&& (retval=WaitForSingleObject(exec_mutex,5000))!=WAIT_OBJECT_0) {
		errormsg(WHERE, ERR_TIMEOUT, "exec_mutex", retval);
		return(GetLastError());
	}

458
	if(native && mode&EX_STDOUT && !(mode&EX_OFFLINE))
459
460
		use_pipes=true;

461
 	if(native) { // Native (32-bit) external
462

463
464
465
466
467
468
		if((env_list=strListInit())==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_list", 0);
            return(errno);
		}

469
		// Current environment passed to child process
rswindell's avatar
rswindell committed
470
		sprintf(str,"%sprotocol.log",cfg.node_dir);
471
472
473
474
475
476
477
		add_env_var(&env_list,"DSZLOG",str);
		add_env_var(&env_list,"SBBSNODE",cfg.node_dir);
		add_env_var(&env_list,"SBBSCTRL",cfg.ctrl_dir);
		add_env_var(&env_list,"SBBSDATA",cfg.data_dir);
		add_env_var(&env_list,"SBBSEXEC",cfg.exec_dir);
		sprintf(str,"%d",cfg.node_num);
		add_env_var(&env_list,"SBBSNNUM",str);
478
		/* date/time env vars */
rswindell's avatar
rswindell committed
479
		sprintf(str,"%02u",tm.tm_mday);
480
481
482
483
484
485
486
		add_env_var(&env_list,"DAY",str);
		add_env_var(&env_list,"WEEKDAY",wday[tm.tm_wday]);
		add_env_var(&env_list,"MONTHNAME",mon[tm.tm_mon]);
		sprintf(str,"%02u",tm.tm_mon+1);
		add_env_var(&env_list,"MONTH",str);
		sprintf(str,"%u",1900+tm.tm_year);
		add_env_var(&env_list,"YEAR",str);
487
488
489
490
491
492
493
494
495
496
497
498

		env_strings=GetEnvironmentStrings();
		env_block=strListCopyBlock(env_strings);
		if(env_strings!=NULL)
			FreeEnvironmentStrings(env_strings);
		env_block=strListAppendBlock(env_block,env_list);
		strListFree(&env_list);
		if(env_block==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_block", 0);
            return(errno);
		}
499
500
501

    } else { // DOS external

502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
		// DOS-compatible (short) paths
		char node_dir[MAX_PATH+1];
		char ctrl_dir[MAX_PATH+1];
		char data_dir[MAX_PATH+1];
		char exec_dir[MAX_PATH+1];

		// in case GetShortPathName fails
		SAFECOPY(node_dir,cfg.node_dir);
		SAFECOPY(ctrl_dir,cfg.ctrl_dir);
		SAFECOPY(data_dir,cfg.data_dir);
		SAFECOPY(exec_dir,cfg.exec_dir);

		GetShortPathName(cfg.node_dir,node_dir,sizeof(node_dir));
		GetShortPathName(cfg.ctrl_dir,ctrl_dir,sizeof(node_dir));
		GetShortPathName(cfg.data_dir,data_dir,sizeof(data_dir));
		GetShortPathName(cfg.exec_dir,exec_dir,sizeof(exec_dir));

519
520
		sprintf(path,"%sDOSXTRN.RET", cfg.node_dir);
		remove(path);
521
522

    	// Create temporary environment file
523
    	sprintf(path,"%sDOSXTRN.ENV", node_dir);
524
        FILE* fp=fopen(path,"w");
525
        if(fp==NULL) {
526
			XTRN_CLEANUP;
527
        	errormsg(WHERE, ERR_CREATE, path, 0);
528
            return(errno);
529
530
        }
        fprintf(fp, "%s\n", fullcmdline);
531
532
533
534
535
		fprintf(fp, "DSZLOG=%sPROTOCOL.LOG\n", node_dir);
        fprintf(fp, "SBBSNODE=%s\n", node_dir);
        fprintf(fp, "SBBSCTRL=%s\n", ctrl_dir);
		fprintf(fp, "SBBSDATA=%s\n", data_dir);
		fprintf(fp, "SBBSEXEC=%s\n", exec_dir);
536
        fprintf(fp, "SBBSNNUM=%d\n", cfg.node_num);
537
		fprintf(fp, "PCBNODE=%d\n", cfg.node_num);
538
539
540
541
542
543
		/* date/time env vars */
		fprintf(fp, "DAY=%02u\n", tm.tm_mday);
		fprintf(fp, "WEEKDAY=%s\n",wday[tm.tm_wday]);
		fprintf(fp, "MONTHNAME=%s\n",mon[tm.tm_mon]);
		fprintf(fp, "MONTH=%02u\n",tm.tm_mon+1);
		fprintf(fp, "YEAR=%u\n",1900+tm.tm_year);
544
545
        fclose(fp);

546
        SAFEPRINTF2(fullcmdline, "%sDOSXTRN.EXE %s", cfg.exec_dir, path);
547

548
		if(!(mode&EX_OFFLINE) && nt) {	// Windows NT/2000
549
			i=SBBSEXEC_MODE_FOSSIL;
550
			if(mode&EX_STDIN)
551
           		i|=SBBSEXEC_MODE_DOS_IN;
552
			if(mode&EX_STDOUT)
553
        		i|=SBBSEXEC_MODE_DOS_OUT;
554
555
			sprintf(str," NT %u %u"
				,cfg.node_num,i);
556
557
558
559
560
561
562
563
564
			strcat(fullcmdline,str);

			sprintf(str,"sbbsexec_hungup%d",cfg.node_num);
			if((hungup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
565
				XTRN_CLEANUP;
566
				errormsg(WHERE, ERR_CREATE, str, 0);
567
568
569
				return(GetLastError());
			}

570
571
572
573
574
575
576
577
578
579
580
581
			sprintf(str,"sbbsexec_hangup%d",cfg.node_num);
			if((hangup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
				XTRN_CLEANUP;
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}

582
583
584
			sprintf(str,"\\\\.\\mailslot\\sbbsexec\\rd%d"
				,cfg.node_num);
			rdslot=CreateMailslot(str
585
				,sizeof(buf)/2			// Maximum message size (0=unlimited)
586
587
588
				,0						// Read time-out
				,NULL);                 // Security
			if(rdslot==INVALID_HANDLE_VALUE) {
589
				XTRN_CLEANUP;
590
591
592
593
594
595
596
597
598
599
600
601
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}
		}
		else if(!(mode&EX_OFFLINE)) {

   			// Load vxd to intercept interrupts

			sprintf(str,"\\\\.\\%s%s",cfg.exec_dir, SBBSEXEC_VXD);
			if((vxd=CreateFile(str,0,0,0
				,CREATE_NEW, FILE_FLAG_DELETE_ON_CLOSE,0))
				 ==INVALID_HANDLE_VALUE) {
602
				XTRN_CLEANUP;
603
604
605
606
607
608
609
610
611
612
				errormsg(WHERE, ERR_OPEN, str, 0);
				return(GetLastError());
			}

			if((start_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,NULL	// pointer to event-object name
				))==NULL) {
613
				XTRN_CLEANUP;
614
615
616
617
618
619
620
621
622
623
				errormsg(WHERE, ERR_CREATE, "exec start event", 0);
				return(GetLastError());
			}

			if(OpenVxDHandle!=NULL)
				start.event=OpenVxDHandle(start_event);
			else
				start.event=start_event;

			start.mode=SBBSEXEC_MODE_FOSSIL;
624
			if(mode&EX_STDIN)
625
           		start.mode|=SBBSEXEC_MODE_DOS_IN;
626
			if(mode&EX_STDOUT)
627
628
        		start.mode|=SBBSEXEC_MODE_DOS_OUT;

629
630
			sprintf(str," 95 %u %u"
				,cfg.node_num,start.mode);
631
632
			strcat(fullcmdline,str);

633
634
635
636
637
638
639
640
641
642
			if(!DeviceIoControl(
				vxd,					// handle to device of interest
				SBBSEXEC_IOCTL_START,	// control code of operation to perform
				&start,					// pointer to buffer to supply input data
				sizeof(start),			// size of input buffer
				NULL,					// pointer to buffer to receive output data
				0,						// size of output buffer
				&rd,					// pointer to variable to receive output byte count
				NULL 					// Overlapped I/O
				)) {
643
				XTRN_CLEANUP;
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
				errormsg(WHERE, ERR_IOCTL, SBBSEXEC_VXD, SBBSEXEC_IOCTL_START);
				return(GetLastError());
			}
		}
    }

	if(startup_dir!=NULL && startup_dir[0])
		p_startup_dir=startup_dir;
	else
		p_startup_dir=NULL;
    STARTUPINFO startup_info={0};
    startup_info.cb=sizeof(startup_info);
	if(mode&EX_OFFLINE)
		startup_info.lpTitle=NULL;
	else {
659
		SAFEPRINTF3(title,"%s running %s on node %d"
660
661
662
663
664
			,useron.number ? useron.alias : "Event"
			,realcmdline
			,cfg.node_num);
		startup_info.lpTitle=title;
	}
665
    if(startup->options&BBS_OPT_XTRN_MINIMIZED) {
666
667
668
    	startup_info.wShowWindow=SW_SHOWMINNOACTIVE;
        startup_info.dwFlags|=STARTF_USESHOWWINDOW;
    }
669
670
671
672
673
674
675
676
	if(use_pipes) {
		// Set up the security attributes struct.
		SECURITY_ATTRIBUTES sa;
		memset(&sa,0,sizeof(sa));
		sa.nLength= sizeof(SECURITY_ATTRIBUTES);
		sa.lpSecurityDescriptor = NULL;
		sa.bInheritHandle = TRUE;

677
678
		// Create the child output pipe (override default 4K buffer size)
		if(!CreatePipe(&rdoutpipe,&startup_info.hStdOutput,&sa,sizeof(buf))) {
679
680
681
682
683
684
			errormsg(WHERE,ERR_CREATE,"stdout pipe",0);
			return(GetLastError());
		}
		startup_info.hStdError=startup_info.hStdOutput;

		// Create the child input pipe.
685
		if(!CreatePipe(&startup_info.hStdInput,&wrinpipe,&sa,sizeof(buf))) {
686
687
688
			errormsg(WHERE,ERR_CREATE,"stdin pipe",0);
			return(GetLastError());
		}
689

690
691
692
693
694
695
696
697
698
699
700
701
702
703
		DuplicateHandle(
			GetCurrentProcess(), rdoutpipe,
			GetCurrentProcess(), &rdslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		DuplicateHandle(
			GetCurrentProcess(), wrinpipe,
			GetCurrentProcess(), &wrslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		CloseHandle(rdoutpipe);
		CloseHandle(wrinpipe);

		startup_info.dwFlags|=STARTF_USESTDHANDLES|STARTF_USESHOWWINDOW;
    	startup_info.wShowWindow=SW_HIDE;
	}
704
	if(native && !(mode&EX_OFFLINE)) {
705

706
707
		if(!(mode&EX_STDIN)) {
			passthru_socket_active = true;
708
		}
709
710
	}

711
    success=CreateProcess(
712
713
714
715
		NULL,			// pointer to name of executable module
		fullcmdline,  	// pointer to command line string
		NULL,  			// process security attributes
		NULL,   		// thread security attributes
716
		native && !(mode&EX_OFFLINE),	 			// handle inheritance flag
717
		CREATE_NEW_CONSOLE/*|CREATE_SEPARATE_WOW_VDM*/, // creation flags
718
        env_block, 		// pointer to new environment block
719
720
721
		p_startup_dir,	// pointer to current directory name
		&startup_info,  // pointer to STARTUPINFO
		&process_info  	// pointer to PROCESS_INFORMATION
722
723
724
725
726
		);

	strListFreeBlock(env_block);

	if(!success) {
727
		XTRN_CLEANUP;
728
		passthru_socket_active = false;
729
		SetLastError(last_error);	/* Restore LastError */
730
        errormsg(WHERE, ERR_EXEC, realcmdline, mode);
731
		SetLastError(last_error);	/* Restore LastError */
732
733
734
        return(GetLastError());
    }

735
736
737
738
#if 0
	char dbgstr[256];
	sprintf(dbgstr,"Node %d created: hProcess %X hThread %X processID %X threadID %X\n"
		,cfg.node_num
rswindell's avatar
rswindell committed
739
740
741
742
		,process_info.hProcess
		,process_info.hThread
		,process_info.dwProcessId
		,process_info.dwThreadId);
743
744
745
	OutputDebugString(dbgstr);
#endif

746
747
	CloseHandle(process_info.hThread);

748
749
750
751
752
	if(!native) {

		if(!(mode&EX_OFFLINE) && !nt) {
    		// Wait for notification from VXD that new VM has started
			if((retval=WaitForSingleObject(start_event, 5000))!=WAIT_OBJECT_0) {
753
				XTRN_CLEANUP;
754
                TerminateProcess(process_info.hProcess, __LINE__);
755
				CloseHandle(process_info.hProcess);
756
757
758
759
760
				errormsg(WHERE, ERR_TIMEOUT, "start_event", retval);
				return(GetLastError());
			}

			CloseHandle(start_event);
761
			start_event=NULL;	/* Mark as closed */
762
763
764
765
766
767
768
769
770
771
772

			if(!DeviceIoControl(
				vxd,					// handle to device of interest
				SBBSEXEC_IOCTL_COMPLETE,	// control code of operation to perform
				NULL,					// pointer to buffer to supply input data
				0,						// size of input buffer
				&hVM,					// pointer to buffer to receive output data
				sizeof(hVM),			// size of output buffer
				&rd,					// pointer to variable to receive output byte count
				NULL					// Overlapped I/O
				)) {
773
				XTRN_CLEANUP;
774
                TerminateProcess(process_info.hProcess, __LINE__);
775
				CloseHandle(process_info.hProcess);
776
777
778
779
780
				errormsg(WHERE, ERR_IOCTL, SBBSEXEC_VXD, SBBSEXEC_IOCTL_COMPLETE);
				return(GetLastError());
			}
		}
	}
781
    ReleaseMutex(exec_mutex);
782

783
	/* Disable Ctrl-C checking */
784
	if(!(mode&EX_OFFLINE))
785
		rio_abortable=false;
786

787
    // Executing app in foreground?, monitor
788
    retval=STILL_ACTIVE;
789
    while(!(mode&EX_BG)) {
790
791
		if(mode&EX_CHKTIME)
			gettimeleft();
792
793
        if(!online && !(mode&EX_OFFLINE)) { // Tell VXD/VDD and external that user hung-up
        	if(was_online) {
794
				logline(LOG_NOTICE,"X!","hung-up in external program");
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
            	hungup=time(NULL);
				if(!native) {
					if(nt)
						SetEvent(hungup_event);
					else if(!DeviceIoControl(
						vxd,		// handle to device of interest
						SBBSEXEC_IOCTL_DISCONNECT,	// operation to perform
						&hVM,		// pointer to buffer to supply input data
						sizeof(hVM),// size of input buffer
						NULL,		// pointer to buffer to receive output data
						0,			// size of output buffer
						&rd,		// pointer to variable to receive output byte count
						NULL		// Overlapped I/O
						)) {
						errormsg(WHERE, ERR_IOCTL, SBBSEXEC_VXD, SBBSEXEC_IOCTL_DISCONNECT);
						break;
					}
				}
	            was_online=false;
            }
815
            if(hungup && time(NULL)-hungup>5 && !processTerminated) {
816
				lprintf(LOG_INFO,"Terminating process from line %d", __LINE__);
817
818
				processTerminated=TerminateProcess(process_info.hProcess, 2112);
			}
819
        }
rswindell's avatar
rswindell committed
820
		if((native && !use_pipes) || mode&EX_OFFLINE) {
821
			/* Monitor for process termination only */
822
823
			if(WaitForSingleObject(process_info.hProcess,1000)==WAIT_OBJECT_0)
				break;
824
825
		} else {

826
			if(nt || use_pipes) {	// Windows NT/2000
827
828
829
830
831

				/* Write to VDD */

				wr=RingBufPeek(&inbuf,buf,sizeof(buf));
				if(wr) {
832
					if(!use_pipes && wrslot==INVALID_HANDLE_VALUE) {
833
834
835
836
837
838
839
840
841
						sprintf(str,"\\\\.\\mailslot\\sbbsexec\\wr%d"
							,cfg.node_num);
						wrslot=CreateFile(str
							,GENERIC_WRITE
							,FILE_SHARE_READ
							,NULL
							,OPEN_EXISTING
							,FILE_ATTRIBUTE_NORMAL
							,(HANDLE) NULL);
842
						if(wrslot==INVALID_HANDLE_VALUE)
rswindell's avatar
rswindell committed
843
							lprintf(LOG_DEBUG,"!ERROR %u (%s) opening %s", GetLastError(), strerror(errno), str);
844
						else
845
							lprintf(LOG_DEBUG,"CreateFile(%s)=0x%x", str, wrslot);
846
					}
rswindell's avatar
rswindell committed
847

848
					/* CR expansion */
rswindell's avatar
rswindell committed
849
					if(use_pipes)
850
851
852
						bp=cr_expand(buf,wr,output_buf,wr);
					else
						bp=buf;
853

854
855
					len=0;
					if(wrslot==INVALID_HANDLE_VALUE)
856
						lprintf(LOG_WARNING,"VDD Open failed (not loaded yet?)");
857
					else if(!WriteFile(wrslot,bp,wr,&len,NULL)) {
858
						lprintf(LOG_ERR,"!VDD WriteFile(0x%x, %u) FAILURE (Error=%u)", wrslot, wr, GetLastError());
859
						if(GetMailslotInfo(wrslot,&wr,NULL,NULL,NULL))
860
							lprintf(LOG_DEBUG,"!VDD MailSlot max_msg_size=%u", wr);
861
						else
862
							lprintf(LOG_DEBUG,"!GetMailslotInfo(0x%x)=%u", wrslot, GetLastError());
863
864
					} else {
						if(len!=wr)
865
							lprintf(LOG_WARNING,"VDD short write (%u instead of %u)", len,wr);
866
						RingBufRead(&inbuf, NULL, len);
867
						if(use_pipes && !(mode&EX_NOECHO)) {
868
							/* echo */
869
							RingBufWrite(&outbuf, bp, len);
870
						}
871
872
					}
					wr=len;
873
874
875
876
				}

				/* Read from VDD */

877
				rd=0;
878
				len=sizeof(buf);
879
				avail=RingBufFree(&outbuf)/2;	// leave room for wwiv/telnet expansion
880
#if 0
881
				if(avail==0)
882
					lprintf("Node %d !output buffer full (%u bytes)"
883
						,cfg.node_num,RingBufFull(&outbuf));
884
#endif
885
886
				if(len>avail)
            		len=avail;
887

888
				while(rd<len) {
deuce's avatar
deuce committed
889
					unsigned long waiting=0;
890
891
892
893
894
895
896
897
898
899
900
901

					if(use_pipes)
						PeekNamedPipe(
							rdslot,             // handle to pipe to copy from
							NULL,               // pointer to data buffer
							0,					// size, in bytes, of data buffer
							NULL,				// pointer to number of bytes read
							&waiting,			// pointer to total number of bytes available
							NULL				// pointer to unread bytes in this message
							);
					else
						GetMailslotInfo(
rswindell's avatar
rswindell committed
902
903
904
905
906
							rdslot,				// mailslot handle
 							NULL,				// address of maximum message size
							NULL,				// address of size of next message
							&waiting,			// address of number of messages
 							NULL				// address of read time-out
907
908
909
910
911
912
913
914
915
							);
					if(!waiting)
						break;
					if(ReadFile(rdslot,buf+rd,len-rd,&msglen,NULL)==FALSE || msglen<1)
						break;
					rd+=msglen;
				}

				if(rd) {
916
917
918
					if(mode&EX_WWIV) {
                		bp=wwiv_expand(buf, rd, wwiv_buf, rd, useron.misc, wwiv_flag);
						if(rd>sizeof(wwiv_buf))
919
							lprintf(LOG_ERR,"WWIV_BUF OVERRUN");
920
921
					} else if(telnet_mode&TELNET_MODE_OFF) {
						bp=buf;
922
					} else {
923
                		bp=telnet_expand(buf, rd, telnet_buf, rd);
924
						if(rd>sizeof(telnet_buf))
925
							lprintf(LOG_ERR,"TELNET_BUF OVERRUN");
926
					}
927
					if(rd>RingBufFree(&outbuf)) {
928
						lprintf(LOG_ERR,"output buffer overflow");
929
						rd=RingBufFree(&outbuf);
930
					}
931
932
933
934
					if(mode&EX_BIN)
						RingBufWrite(&outbuf, bp, rd);
					else
						rputs((char*)bp, rd);
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
				}
			} else {	// Windows 9x

				/* Write to VXD */

				wr=RingBufPeek(&inbuf, buf+sizeof(hVM),sizeof(buf)-sizeof(hVM));
				if(wr) {
					*(DWORD*)buf=hVM;
					wr+=sizeof(hVM);
					if(!DeviceIoControl(
						vxd,					// handle to device of interest
						SBBSEXEC_IOCTL_WRITE,	// control code of operation to perform
						buf,					// pointer to buffer to supply input data
						wr,						// size of input buffer
						&rd,					// pointer to buffer to receive output data
						sizeof(rd),				// size of output buffer
						&dummy,	 				// pointer to variable to receive output byte count
						NULL					// Overlapped I/O
						)) {
						errormsg(WHERE, ERR_IOCTL, SBBSEXEC_VXD, SBBSEXEC_IOCTL_READ);
						break;
					}
					RingBufRead(&inbuf, NULL, rd);
					wr=rd;
				}
        		/* Read from VXD */
				rd=0;
				len=sizeof(buf);
963
964
				avail=RingBufFree(&outbuf)/2;	// leave room for wwiv/telnet expansion
#if 0
rswindell's avatar
rswindell committed
965
				if(avail==0)
966
					lprintf("Node %d !output buffer full (%u bytes)"
967
						,cfg.node_num,RingBufFull(&outbuf));
968
#endif
969

970
971
				if(len>avail)
            		len=avail;
972
				if(len) {
973
974
975
976
977
978
979
980
981
982
983
984
985
					if(!DeviceIoControl(
						vxd,					// handle to device of interest
						SBBSEXEC_IOCTL_READ,	// control code of operation to perform
						&hVM,					// pointer to buffer to supply input data
						sizeof(hVM),			// size of input buffer
						buf,					// pointer to buffer to receive output data
						len,					// size of output buffer
						&rd,					// pointer to variable to receive output byte count
						NULL					// Overlapped I/O
						)) {
						errormsg(WHERE, ERR_IOCTL, SBBSEXEC_VXD, SBBSEXEC_IOCTL_READ);
						break;
					}
986
					if(mode&EX_WWIV) {
987
                		bp=wwiv_expand(buf, rd, wwiv_buf, rd, useron.misc, wwiv_flag);
988
						if(rd>sizeof(wwiv_buf))
989
							lprintf(LOG_ERR,"WWIV_BUF OVERRUN");
990
991
					} else if(telnet_mode&TELNET_MODE_OFF) {
						bp=buf;
992
					} else {
993
                		bp=telnet_expand(buf, rd, telnet_buf, rd);
994
						if(rd>sizeof(telnet_buf))
995
							lprintf(LOG_ERR,"TELNET_BUF OVERRUN");
996
997
					}
					if(rd>RingBufFree(&outbuf)) {
998
						lprintf(LOG_ERR,"output buffer overflow");
999
1000
						rd=RingBufFree(&outbuf);
					}
1001
1002
					if(!(mode&EX_BIN) && term_supports(PETSCII))
						petscii_convert(bp, rd);
1003
1004
1005
					RingBufWrite(&outbuf, bp, rd);
				}
			}
1006
#if defined(_DEBUG) && 0
1007
1008
1009
1010
1011
1012
			if(rd>1) {
				sprintf(str,"Node %d read %5d bytes from xtrn", cfg.node_num, rd);
				OutputDebugString(str);
			}
#endif
            if((!rd && !wr) || hungup) {
1013
1014
1015
1016
1017

				loop_since_io++;	/* number of loop iterations with no I/O */

				/* only check process termination after 300 milliseconds of no I/O */
				/* to allow for last minute reception of output from DOS programs */
1018
1019
				if(loop_since_io>=3) {

1020
					if(online && hangup_event!=NULL
1021
1022
1023
1024
1025
1026
1027
1028
1029
						&& WaitForSingleObject(hangup_event,0)==WAIT_OBJECT_0) {
						lprintf(LOG_NOTICE,"Node %d External program requested hangup (dropped DTR)"
							,cfg.node_num);
						hangup();
					}

					if(WaitForSingleObject(process_info.hProcess,0)==WAIT_OBJECT_0)
						break;	/* Process Terminated */
				}
1030
1031

				/* only check node for interrupt flag every 3 seconds of no I/O */
rswindell's avatar
rswindell committed
1032
				if((loop_since_io%30)==0) {
1033
1034
1035
1036
1037
1038
1039
					// Check if the node has been interrupted
					getnodedat(cfg.node_num,&thisnode,0);
					if(thisnode.misc&NODE_INTR)
						break;
				}

				/* only send telnet GA every 30 seconds of no I/O */
1040
				if((loop_since_io%300)==0) {
1041
#if defined(_DEBUG)
1042
1043
1044
1045
1046
1047
1048
					sprintf(str,"Node %d xtrn idle\n",cfg.node_num);
					OutputDebugString(str);
#endif
					// Let's make sure the socket is up
					// Sending will trigger a socket d/c detection
					if(!(startup->options&BBS_OPT_NO_TELNET_GA))
						send_telnet_cmd(TELNET_GA,0);
1049
				}
1050
				sem_trywait_block(&inbuf.sem,100);
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
            } else
				loop_since_io=0;
        }
	}

	if(!native && !(mode&EX_OFFLINE) && !nt) {
		if(!DeviceIoControl(
			vxd,					// handle to device of interest
			SBBSEXEC_IOCTL_STOP,	// control code of operation to perform
			&hVM,					// pointer to buffer to supply input data
			sizeof(hVM),			// size of input buffer
			NULL,					// pointer to buffer to receive output data
			0,						// size of output buffer
			&rd,					// pointer to variable to receive output byte count
			NULL					// Overlapped I/O
			)) {
			errormsg(WHERE, ERR_IOCTL, SBBSEXEC_VXD, SBBSEXEC_IOCTL_STOP);
		}
	}

1071
    if(!(mode&EX_BG)) {			/* !background execution */
1072

1073
1074
1075
        if(GetExitCodeProcess(process_info.hProcess, &retval)==FALSE)
            errormsg(WHERE, ERR_CHK, "ExitCodeProcess",(DWORD)process_info.hProcess);

1076
		if(retval==STILL_ACTIVE) {
1077
			lprintf(LOG_INFO,"Node %d Terminating process from line %d",cfg.node_num,__LINE__);
1078
			TerminateProcess(process_info.hProcess, GetLastError());
rswindell's avatar
rswindell committed
1079
		}
1080

1081
	 	// Get return value
1082
1083
1084
1085
1086
1087
1088
		if(!native) {
    		sprintf(str,"%sDOSXTRN.RET", cfg.node_dir);
			FILE* fp=fopen(str,"r");
			if(fp!=NULL) {
				fscanf(fp,"%d",&retval);
				fclose(fp);
			}
1089
1090
1091
		}
	}

1092
	XTRN_CLEANUP;
1093
	CloseHandle(process_info.hProcess);
rswindell's avatar