1 /* $OpenBSD: server.c,v 1.180 2018/03/08 08:09:10 nicm Exp $ */ 2 3 /* 4 * Copyright (c) 2007 Nicholas Marriott <nicholas.marriott@gmail.com> 5 * 6 * Permission to use, copy, modify, and distribute this software for any 7 * purpose with or without fee is hereby granted, provided that the above 8 * copyright notice and this permission notice appear in all copies. 9 * 10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 14 * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER 15 * IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING 16 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17 */ 18 19 #include <sys/types.h> 20 #include <sys/ioctl.h> 21 #include <sys/socket.h> 22 #include <sys/stat.h> 23 #include <sys/un.h> 24 #include <sys/wait.h> 25 26 #include <errno.h> 27 #include <event.h> 28 #include <fcntl.h> 29 #include <paths.h> 30 #include <signal.h> 31 #include <stdio.h> 32 #include <stdlib.h> 33 #include <string.h> 34 #include <termios.h> 35 #include <time.h> 36 #include <unistd.h> 37 38 #include "tmux.h" 39 40 /* 41 * Main server functions. 42 */ 43 44 struct clients clients; 45 46 struct tmuxproc *server_proc; 47 static int server_fd; 48 static int server_exit; 49 static struct event server_ev_accept; 50 51 struct cmd_find_state marked_pane; 52 53 static int server_loop(void); 54 static void server_send_exit(void); 55 static void server_accept(int, short, void *); 56 static void server_signal(int); 57 static void server_child_signal(void); 58 static void server_child_exited(pid_t, int); 59 static void server_child_stopped(pid_t, int); 60 61 /* Set marked pane. */ 62 void 63 server_set_marked(struct session *s, struct winlink *wl, struct window_pane *wp) 64 { 65 cmd_find_clear_state(&marked_pane, 0); 66 marked_pane.s = s; 67 marked_pane.wl = wl; 68 marked_pane.w = wl->window; 69 marked_pane.wp = wp; 70 } 71 72 /* Clear marked pane. */ 73 void 74 server_clear_marked(void) 75 { 76 cmd_find_clear_state(&marked_pane, 0); 77 } 78 79 /* Is this the marked pane? */ 80 int 81 server_is_marked(struct session *s, struct winlink *wl, struct window_pane *wp) 82 { 83 if (s == NULL || wl == NULL || wp == NULL) 84 return (0); 85 if (marked_pane.s != s || marked_pane.wl != wl) 86 return (0); 87 if (marked_pane.wp != wp) 88 return (0); 89 return (server_check_marked()); 90 } 91 92 /* Check if the marked pane is still valid. */ 93 int 94 server_check_marked(void) 95 { 96 return (cmd_find_valid_state(&marked_pane)); 97 } 98 99 /* Create server socket. */ 100 static int 101 server_create_socket(char **cause) 102 { 103 struct sockaddr_un sa; 104 size_t size; 105 mode_t mask; 106 int fd, saved_errno; 107 108 memset(&sa, 0, sizeof sa); 109 sa.sun_family = AF_UNIX; 110 size = strlcpy(sa.sun_path, socket_path, sizeof sa.sun_path); 111 if (size >= sizeof sa.sun_path) { 112 errno = ENAMETOOLONG; 113 goto fail; 114 } 115 unlink(sa.sun_path); 116 117 if ((fd = socket(AF_UNIX, SOCK_STREAM, 0)) == -1) 118 goto fail; 119 120 mask = umask(S_IXUSR|S_IXGRP|S_IRWXO); 121 if (bind(fd, (struct sockaddr *)&sa, sizeof sa) == -1) { 122 saved_errno = errno; 123 close(fd); 124 errno = saved_errno; 125 goto fail; 126 } 127 umask(mask); 128 129 if (listen(fd, 128) == -1) { 130 saved_errno = errno; 131 close(fd); 132 errno = saved_errno; 133 goto fail; 134 } 135 setblocking(fd, 0); 136 137 return (fd); 138 139 fail: 140 if (cause != NULL) { 141 xasprintf(cause, "error creating %s (%s)", socket_path, 142 strerror(errno)); 143 } 144 return (-1); 145 } 146 147 /* Server error callback. */ 148 static enum cmd_retval 149 server_start_error(struct cmdq_item *item, void *data) 150 { 151 char *error = data; 152 153 cmdq_error(item, "%s", error); 154 free(error); 155 156 return (CMD_RETURN_NORMAL); 157 } 158 159 /* Fork new server. */ 160 int 161 server_start(struct tmuxproc *client, struct event_base *base, int lockfd, 162 char *lockfile) 163 { 164 int pair[2]; 165 struct job *job; 166 sigset_t set, oldset; 167 struct client *c; 168 char *cause = NULL; 169 170 if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, pair) != 0) 171 fatal("socketpair failed"); 172 173 sigfillset(&set); 174 sigprocmask(SIG_BLOCK, &set, &oldset); 175 switch (fork()) { 176 case -1: 177 fatal("fork failed"); 178 case 0: 179 break; 180 default: 181 sigprocmask(SIG_SETMASK, &oldset, NULL); 182 close(pair[1]); 183 return (pair[0]); 184 } 185 close(pair[0]); 186 if (daemon(1, 0) != 0) 187 fatal("daemon failed"); 188 proc_clear_signals(client, 0); 189 if (event_reinit(base) != 0) 190 fatalx("event_reinit failed"); 191 server_proc = proc_start("server"); 192 proc_set_signals(server_proc, server_signal); 193 sigprocmask(SIG_SETMASK, &oldset, NULL); 194 195 if (log_get_level() > 1) 196 tty_create_log(); 197 if (pledge("stdio rpath wpath cpath fattr unix getpw recvfd proc exec " 198 "tty ps", NULL) != 0) 199 fatal("pledge failed"); 200 201 RB_INIT(&windows); 202 RB_INIT(&all_window_panes); 203 TAILQ_INIT(&clients); 204 RB_INIT(&sessions); 205 RB_INIT(&session_groups); 206 key_bindings_init(); 207 208 gettimeofday(&start_time, NULL); 209 210 server_fd = server_create_socket(&cause); 211 if (server_fd != -1) 212 server_update_socket(); 213 c = server_client_create(pair[1]); 214 215 if (lockfd >= 0) { 216 unlink(lockfile); 217 free(lockfile); 218 close(lockfd); 219 } 220 221 if (cause != NULL) { 222 cmdq_append(c, cmdq_get_callback(server_start_error, cause)); 223 c->flags |= CLIENT_EXIT; 224 } 225 226 start_cfg(); 227 228 server_add_accept(0); 229 230 proc_loop(server_proc, server_loop); 231 232 LIST_FOREACH(job, &all_jobs, entry) { 233 if (job->pid != -1) 234 kill(job->pid, SIGTERM); 235 } 236 237 status_prompt_save_history(); 238 exit(0); 239 } 240 241 /* Server loop callback. */ 242 static int 243 server_loop(void) 244 { 245 struct client *c; 246 u_int items; 247 struct job *job; 248 249 do { 250 items = cmdq_next(NULL); 251 TAILQ_FOREACH(c, &clients, entry) { 252 if (c->flags & CLIENT_IDENTIFIED) 253 items += cmdq_next(c); 254 } 255 } while (items != 0); 256 257 server_client_loop(); 258 259 if (!options_get_number(global_options, "exit-empty") && !server_exit) 260 return (0); 261 262 if (!options_get_number(global_options, "exit-unattached")) { 263 if (!RB_EMPTY(&sessions)) 264 return (0); 265 } 266 267 TAILQ_FOREACH(c, &clients, entry) { 268 if (c->session != NULL) 269 return (0); 270 } 271 272 /* 273 * No attached clients therefore want to exit - flush any waiting 274 * clients but don't actually exit until they've gone. 275 */ 276 cmd_wait_for_flush(); 277 if (!TAILQ_EMPTY(&clients)) 278 return (0); 279 280 LIST_FOREACH(job, &all_jobs, entry) { 281 if ((~job->flags & JOB_NOWAIT) && job->state == JOB_RUNNING) 282 return (0); 283 } 284 285 return (1); 286 } 287 288 /* Exit the server by killing all clients and windows. */ 289 static void 290 server_send_exit(void) 291 { 292 struct client *c, *c1; 293 struct session *s, *s1; 294 295 cmd_wait_for_flush(); 296 297 TAILQ_FOREACH_SAFE(c, &clients, entry, c1) { 298 if (c->flags & CLIENT_SUSPENDED) 299 server_client_lost(c); 300 else { 301 if (c->flags & CLIENT_ATTACHED) 302 notify_client("client-detached", c); 303 proc_send(c->peer, MSG_SHUTDOWN, -1, NULL, 0); 304 } 305 c->session = NULL; 306 } 307 308 RB_FOREACH_SAFE(s, sessions, &sessions, s1) 309 session_destroy(s, __func__); 310 } 311 312 /* Update socket execute permissions based on whether sessions are attached. */ 313 void 314 server_update_socket(void) 315 { 316 struct session *s; 317 static int last = -1; 318 int n, mode; 319 struct stat sb; 320 321 n = 0; 322 RB_FOREACH(s, sessions, &sessions) { 323 if (!(s->flags & SESSION_UNATTACHED)) { 324 n++; 325 break; 326 } 327 } 328 329 if (n != last) { 330 last = n; 331 332 if (stat(socket_path, &sb) != 0) 333 return; 334 mode = sb.st_mode & ACCESSPERMS; 335 if (n != 0) { 336 if (mode & S_IRUSR) 337 mode |= S_IXUSR; 338 if (mode & S_IRGRP) 339 mode |= S_IXGRP; 340 if (mode & S_IROTH) 341 mode |= S_IXOTH; 342 } else 343 mode &= ~(S_IXUSR|S_IXGRP|S_IXOTH); 344 chmod(socket_path, mode); 345 } 346 } 347 348 /* Callback for server socket. */ 349 static void 350 server_accept(int fd, short events, __unused void *data) 351 { 352 struct sockaddr_storage sa; 353 socklen_t slen = sizeof sa; 354 int newfd; 355 356 server_add_accept(0); 357 if (!(events & EV_READ)) 358 return; 359 360 newfd = accept(fd, (struct sockaddr *) &sa, &slen); 361 if (newfd == -1) { 362 if (errno == EAGAIN || errno == EINTR || errno == ECONNABORTED) 363 return; 364 if (errno == ENFILE || errno == EMFILE) { 365 /* Delete and don't try again for 1 second. */ 366 server_add_accept(1); 367 return; 368 } 369 fatal("accept failed"); 370 } 371 if (server_exit) { 372 close(newfd); 373 return; 374 } 375 server_client_create(newfd); 376 } 377 378 /* 379 * Add accept event. If timeout is nonzero, add as a timeout instead of a read 380 * event - used to backoff when running out of file descriptors. 381 */ 382 void 383 server_add_accept(int timeout) 384 { 385 struct timeval tv = { timeout, 0 }; 386 387 if (event_initialized(&server_ev_accept)) 388 event_del(&server_ev_accept); 389 390 if (timeout == 0) { 391 event_set(&server_ev_accept, server_fd, EV_READ, server_accept, 392 NULL); 393 event_add(&server_ev_accept, NULL); 394 } else { 395 event_set(&server_ev_accept, server_fd, EV_TIMEOUT, 396 server_accept, NULL); 397 event_add(&server_ev_accept, &tv); 398 } 399 } 400 401 /* Signal handler. */ 402 static void 403 server_signal(int sig) 404 { 405 int fd; 406 407 log_debug("%s: %s", __func__, strsignal(sig)); 408 switch (sig) { 409 case SIGTERM: 410 server_exit = 1; 411 server_send_exit(); 412 break; 413 case SIGCHLD: 414 server_child_signal(); 415 break; 416 case SIGUSR1: 417 event_del(&server_ev_accept); 418 fd = server_create_socket(NULL); 419 if (fd != -1) { 420 close(server_fd); 421 server_fd = fd; 422 server_update_socket(); 423 } 424 server_add_accept(0); 425 break; 426 case SIGUSR2: 427 proc_toggle_log(server_proc); 428 break; 429 } 430 } 431 432 /* Handle SIGCHLD. */ 433 static void 434 server_child_signal(void) 435 { 436 int status; 437 pid_t pid; 438 439 for (;;) { 440 switch (pid = waitpid(WAIT_ANY, &status, WNOHANG|WUNTRACED)) { 441 case -1: 442 if (errno == ECHILD) 443 return; 444 fatal("waitpid failed"); 445 case 0: 446 return; 447 } 448 if (WIFSTOPPED(status)) 449 server_child_stopped(pid, status); 450 else if (WIFEXITED(status) || WIFSIGNALED(status)) 451 server_child_exited(pid, status); 452 } 453 } 454 455 /* Handle exited children. */ 456 static void 457 server_child_exited(pid_t pid, int status) 458 { 459 struct window *w, *w1; 460 struct window_pane *wp; 461 struct job *job; 462 463 RB_FOREACH_SAFE(w, windows, &windows, w1) { 464 TAILQ_FOREACH(wp, &w->panes, entry) { 465 if (wp->pid == pid) { 466 wp->status = status; 467 wp->flags |= PANE_STATUSREADY; 468 469 log_debug("%%%u exited", wp->id); 470 wp->flags |= PANE_EXITED; 471 472 if (window_pane_destroy_ready(wp)) 473 server_destroy_pane(wp, 1); 474 break; 475 } 476 } 477 } 478 479 LIST_FOREACH(job, &all_jobs, entry) { 480 if (pid == job->pid) { 481 job_died(job, status); /* might free job */ 482 break; 483 } 484 } 485 } 486 487 /* Handle stopped children. */ 488 static void 489 server_child_stopped(pid_t pid, int status) 490 { 491 struct window *w; 492 struct window_pane *wp; 493 494 if (WSTOPSIG(status) == SIGTTIN || WSTOPSIG(status) == SIGTTOU) 495 return; 496 497 RB_FOREACH(w, windows, &windows) { 498 TAILQ_FOREACH(wp, &w->panes, entry) { 499 if (wp->pid == pid) { 500 if (killpg(pid, SIGCONT) != 0) 501 kill(pid, SIGCONT); 502 } 503 } 504 } 505 } 506