[Info-vax] disabling a CTRL/Y ast
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Thu Jan 7 14:37:39 EST 2016
In article <878f843d-0a3e-4717-a02c-a0bf4f448be1 at googlegroups.com>, Tom Adams <tadamsmar at gmail.com> writes:
>On Thursday, January 7, 2016 at 1:37:55 PM UTC-5, VAXman- wrote:
>> In article <fd6d6c6a-1c7d-432d-ac2b-1244dfa0fbb6 at googlegroups.com>, Tom Adams <tadamsmar at gmail.com> writes:
>> >On Thursday, January 7, 2016 at 11:21:27 AM UTC-5, VAXman- wrote:
>> >> In article <3a583568-e33e-446e-9805-6ea94f9ebf71 at googlegroups.com>, Tom Adams <tadamsmar at gmail.com> writes:
>> >> >On Wednesday, January 6, 2016 at 12:22:06 PM UTC-5, Stephen Hoffman wrote:
>> >> >> On 2016-01-06 16:46:32 +0000, Tom Adams said:
>> >> >>
>> >> >> > I want to turn ctrl/y into a noop in certain regions of code and turn
>> >> >> > ctrl/y into an exit in other regions of code.
>> >> >>
>> >> >> Some background: I've posted more than a few replies here in the
>> >> >> comp.os.vms newsgroup, specifically discussing the particular
>> >> >> application in question and its general design, and an unfortunate
>> >> >> aggregation of the UI and the more critical code paths, and your
>> >> >> understandable preference to avoid restructuring the application code
>> >> >> through reworking the existing design to block ^Y from arriving within
>> >> >> the most critical sections of the code.
>> >> >>
>> >> >> > I do find that it is necessary to run lib$disable_ctrl at the beginning
>> >> >> > of the program and lib$enable_ctrl at the end of the program to restore
>> >> >> > the previous CLI state, but I need to run asts to do the rest.
>> >> >>
>> >> >> If you want ASTs in some parts of the code and not in others, then
>> >> >> you're going to have to wrap those sections appropriately. That's if
>> >> >> you don't decide to migrate those critical code sections into another
>> >> >> process context, or related steps. Because beyond the potential for ^Y
>> >> >> in these sections and the associated issues you're having with the
>> >> >> image rundown processing in the absence of an EXIT command, other sorts
>> >> >> of generic application failures ("bugs") or any arriving $forcex calls
>> >> >> or such activities can potentially still leave the application in an
>> >> >> indeterminate state.
>> >> >>
>> >> >>
>> >> >>
>> >> >> --
>> >> >> Pure Personal Opinion | HoffmanLabs LLC
>> >> >
>> >> >Here's an example of what I am trying to do that seems to work OK.
>> >> >I guess a forced exit from a bug could leave the CTRL\Y in
>> >> >the disabled state at the CLI instead of the original state.
>> >> >
>> >> >Also, it's possible that someone could define TT to be some terminal
>> >> >other than the login terminal. VMS leaves all the built-in process
>> >> >logicals that refer to the login terminal vulnerable to redefinition.
>> >> >It may be possible to roll your own safe (executive, no_alias) logical
>> >> >name via a call in syslogin.
>> >> >
>> >> >Also, I still need to cover the cases where this code runs in a context
>> >> >where TT is not defined.
>> >>
>> >> PROGRAM MY_TERMINAL
>> >> IMPLICIT NONE
>> >>
>> >> INCLUDE '($DSCDEF)'
>> >> INCLUDE '($JPIDEF)'
>> >> INCLUDE '(LIB$ROUTINES)'
>> >>
>> >> INTEGER*4 STATUS
>> >>
>> >> RECORD /DSCDEF1/ TERMINAL
>> >>
>> >> TERMINAL.DSC$W_MAXSTRLEN = 0
>> >> TERMINAL.DSC$B_DTYPE = DSC$K_DTYPE_T
>> >> TERMINAL.DSC$B_CLASS = DSC$K_CLASS_D
>> >> TERMINAL.DSC$A_POINTER = 0
>> >>
>> >> STATUS = LIB$GETJPI(JPI$_TERMINAL,,,,TERMINAL,)
>> >> IF (STATUS.AND.1) THEN
>> >> STATUS = LIB$PUT_OUTPUT(TERMINAL)
>> >> ENDIF
>> >>
>> >> CALL SYS$EXIT(%VAL(STATUS))
>> >> END
>> >>
>> >> --
>> >> VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
>> >>
>> >> I speak to machines with the voice of humanity.
>> >
>> >That's better than TT.
>> >
>> >But that is also vulnerable to a non-priv user. For instance
>> >if the login terminal is RTA1: the a non-priv user can define RTA1
>> >thusly:
>> >
>> >DEFINE RTA1 LTA180:
>> >
>> >Where lta180: is a valid device name. Calls like SYS$ASSIGN will dutifully
>> >translate RTA1: to LTA180: assign it a channel, and return a
>> >normal status.
>> >
>> >Admittedly, it's not very likely that a non-priv user would do that.
>>
>> Unless your nonprivied user as discovered a way to write PCB[PCB$T_TERMINAL],
>> I doubt you'll have much to worry about. ;)
>>
>Not sure what you mean?
>
>Do you mean that a non-priv user probably does not have alternative valid name
>to use. You are right about that.
I mean that your nonprivied user will not be able to alter the system memory
where the terminal name is obtained by the SYS$GETJPI request. I've used the
LIB$ wrapper around SYS$GETJPI because I can pass a dynamic string descriptor
to it and VMS will allocate some process memory into which it will write the
terminal name.
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list