2012-09-20 07:51:34 +04:00
|
|
|
/**
|
|
|
|
* xrdp: A Remote Desktop Protocol server.
|
|
|
|
*
|
2015-12-12 07:41:17 +03:00
|
|
|
* Copyright (C) Jay Sorg 2004-2015
|
2012-09-20 07:51:34 +04:00
|
|
|
*
|
2015-06-16 09:10:30 +03:00
|
|
|
* BSD process grouping by:
|
|
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland.
|
|
|
|
* Copyright (c) 2000-2001 Markus Friedl.
|
|
|
|
* Copyright (c) 2011-2015 Koichiro Iwao, Kyushu Institute of Technology.
|
|
|
|
*
|
2012-09-20 07:51:34 +04:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
2005-10-06 23:27:38 +04:00
|
|
|
|
2006-05-26 00:34:32 +04:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* @file session.c
|
|
|
|
* @brief Session management code
|
|
|
|
* @author Jay Sorg, Simone Fedele
|
2007-04-07 20:20:08 +04:00
|
|
|
*
|
2006-05-26 00:34:32 +04:00
|
|
|
*/
|
|
|
|
|
2016-11-29 11:42:48 +03:00
|
|
|
#if defined(HAVE_CONFIG_H)
|
|
|
|
#include "config_ac.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_SYS_PRCTL_H
|
|
|
|
#include <sys/prctl.h>
|
|
|
|
#endif
|
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
#include <errno.h>
|
|
|
|
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "arch.h"
|
|
|
|
#include "session.h"
|
|
|
|
|
2023-03-20 18:08:04 +03:00
|
|
|
#include "sesman_auth.h"
|
|
|
|
#include "sesman_config.h"
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "env.h"
|
2023-03-09 18:40:56 +03:00
|
|
|
#include "guid.h"
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "list.h"
|
|
|
|
#include "log.h"
|
|
|
|
#include "os_calls.h"
|
2005-10-06 23:27:38 +04:00
|
|
|
#include "sesman.h"
|
2022-09-08 17:05:51 +03:00
|
|
|
#include "string_calls.h"
|
2016-12-15 20:06:35 +03:00
|
|
|
#include "xauth.h"
|
2022-11-20 05:43:00 +03:00
|
|
|
#include "xwait.h"
|
2017-03-18 20:15:50 +03:00
|
|
|
#include "xrdp_sockets.h"
|
2005-10-06 23:27:38 +04:00
|
|
|
|
2016-11-29 11:42:48 +03:00
|
|
|
#ifndef PR_SET_NO_NEW_PRIVS
|
|
|
|
#define PR_SET_NO_NEW_PRIVS 38
|
|
|
|
#endif
|
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
|
|
|
|
#define USE_EXTRA_SESSION_FORK
|
|
|
|
#define USE_BSD_SETLOGIN
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Module globals */
|
|
|
|
|
|
|
|
/* Currently, these duplicate module names in sesman.c. This is fine, and
|
|
|
|
* will be fully resolved when sesman is split into two separate excutables */
|
|
|
|
static tintptr g_term_event = 0;
|
|
|
|
static tintptr g_sigchld_event = 0;
|
|
|
|
static int g_pid = 0; // PID of sesexec process (sesman sub-process)
|
|
|
|
|
2012-05-27 19:17:39 +04:00
|
|
|
/**
|
|
|
|
* Creates a string consisting of all parameters that is hosted in the param list
|
|
|
|
* @param self
|
|
|
|
* @param outstr, allocate this buffer before you use this function
|
|
|
|
* @param len the allocated len for outstr
|
2012-06-11 10:47:08 +04:00
|
|
|
* @return
|
|
|
|
*/
|
2017-03-12 19:35:00 +03:00
|
|
|
char *
|
2012-09-20 07:51:34 +04:00
|
|
|
dumpItemsToString(struct list *self, char *outstr, int len)
|
2012-05-27 19:17:39 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
int index;
|
|
|
|
int totalLen = 0;
|
|
|
|
|
2013-10-01 21:42:00 +04:00
|
|
|
g_memset(outstr, 0, len);
|
2012-09-20 07:51:34 +04:00
|
|
|
if (self->count == 0)
|
|
|
|
{
|
2020-11-30 03:36:20 +03:00
|
|
|
LOG_DEVEL(LOG_LEVEL_TRACE, "List is empty");
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
for (index = 0; index < self->count; index++)
|
|
|
|
{
|
|
|
|
/* +1 = one space*/
|
|
|
|
totalLen = totalLen + g_strlen((char *)list_get_item(self, index)) + 1;
|
|
|
|
|
|
|
|
if (len > totalLen)
|
|
|
|
{
|
|
|
|
g_strcat(outstr, (char *)list_get_item(self, index));
|
|
|
|
g_strcat(outstr, " ");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return outstr ;
|
2012-05-27 19:17:39 +04:00
|
|
|
}
|
|
|
|
|
2005-10-06 23:27:38 +04:00
|
|
|
/******************************************************************************/
|
2023-03-17 15:08:22 +03:00
|
|
|
static void
|
|
|
|
set_term_event(int sig)
|
2005-10-06 23:27:38 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Don't try to use a wait obj in a child process */
|
|
|
|
if (g_getpid() == g_pid)
|
|
|
|
{
|
|
|
|
g_set_wait_obj(g_term_event);
|
|
|
|
}
|
|
|
|
}
|
2022-05-02 14:54:40 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
static void
|
|
|
|
set_sigchld_event(int sig)
|
|
|
|
{
|
|
|
|
/* Don't try to use a wait obj in a child process */
|
|
|
|
if (g_getpid() == g_pid)
|
2006-01-13 18:51:23 +03:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
g_set_wait_obj(g_sigchld_event);
|
|
|
|
}
|
|
|
|
}
|
2021-08-27 14:54:47 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
static void
|
|
|
|
start_chansrv(struct auth_info *auth_info,
|
|
|
|
const struct session_parameters *s)
|
|
|
|
{
|
|
|
|
struct list *chansrv_params = list_create();
|
|
|
|
const char *exe_path = XRDP_SBIN_PATH "/xrdp-chansrv";
|
2022-05-02 14:54:40 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (chansrv_params != NULL)
|
|
|
|
{
|
|
|
|
chansrv_params->auto_free = 1;
|
|
|
|
if (!list_add_strdup(chansrv_params, exe_path))
|
|
|
|
{
|
|
|
|
list_delete(chansrv_params);
|
|
|
|
chansrv_params = NULL;
|
|
|
|
}
|
|
|
|
}
|
2022-05-02 14:54:40 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (chansrv_params == NULL)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Out of memory starting chansrv");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
env_set_user(s->uid, 0, s->display,
|
2023-03-09 18:40:56 +03:00
|
|
|
g_cfg->env_names,
|
|
|
|
g_cfg->env_values);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-04-24 13:36:33 +03:00
|
|
|
LOG_DEVEL_LEAKING_FDS("chansrv", 3, -1);
|
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
/* executing chansrv */
|
|
|
|
g_execvp_list(exe_path, chansrv_params);
|
2022-02-14 12:16:42 +03:00
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
/* should not get here */
|
|
|
|
list_delete(chansrv_params);
|
2006-01-13 18:51:23 +03:00
|
|
|
}
|
2005-10-06 23:27:38 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
2017-03-12 19:35:00 +03:00
|
|
|
static int
|
2023-03-09 18:40:56 +03:00
|
|
|
cleanup_sockets(int display)
|
2005-10-06 23:27:38 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "cleanup_sockets:");
|
|
|
|
char file[256];
|
|
|
|
int error;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
error = 0;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
g_snprintf(file, 255, CHANSRV_PORT_OUT_STR, display);
|
|
|
|
if (g_file_exist(file))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
|
|
|
if (g_file_delete(file) == 0)
|
2014-07-27 00:33:23 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"cleanup_sockets: failed to delete %s (%s)",
|
|
|
|
file, g_get_strerror());
|
|
|
|
error++;
|
2014-07-27 00:33:23 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
g_snprintf(file, 255, CHANSRV_PORT_IN_STR, display);
|
|
|
|
if (g_file_exist(file))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
|
|
|
if (g_file_delete(file) == 0)
|
2014-07-27 00:33:23 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"cleanup_sockets: failed to delete %s (%s)",
|
|
|
|
file, g_get_strerror());
|
|
|
|
error++;
|
2014-07-27 00:33:23 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
g_snprintf(file, 255, XRDP_CHANSRV_STR, display);
|
|
|
|
if (g_file_exist(file))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
|
|
|
if (g_file_delete(file) == 0)
|
2014-07-27 00:33:23 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"cleanup_sockets: failed to delete %s (%s)",
|
|
|
|
file, g_get_strerror());
|
|
|
|
error++;
|
2014-07-27 00:33:23 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
g_snprintf(file, 255, CHANSRV_API_STR, display);
|
|
|
|
if (g_file_exist(file))
|
2020-07-30 06:10:23 +03:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
|
|
|
if (g_file_delete(file) == 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"cleanup_sockets: failed to delete %s (%s)",
|
|
|
|
file, g_get_strerror());
|
|
|
|
error++;
|
|
|
|
}
|
2020-07-30 06:10:23 +03:00
|
|
|
}
|
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
/* the following files should be deleted by xorgxrdp
|
|
|
|
* but just in case the deletion failed */
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
g_snprintf(file, 255, XRDP_X11RDP_STR, display);
|
|
|
|
if (g_file_exist(file))
|
2009-08-06 10:13:52 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
|
|
|
if (g_file_delete(file) == 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"cleanup_sockets: failed to delete %s (%s)",
|
|
|
|
file, g_get_strerror());
|
|
|
|
error++;
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2009-08-06 10:13:52 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
g_snprintf(file, 255, XRDP_DISCONNECT_STR, display);
|
|
|
|
if (g_file_exist(file))
|
2009-08-06 10:13:52 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
|
|
|
|
if (g_file_delete(file) == 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"cleanup_sockets: failed to delete %s (%s)",
|
|
|
|
file, g_get_strerror());
|
|
|
|
error++;
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
return error;
|
2021-05-08 19:58:11 +03:00
|
|
|
|
2017-03-19 00:45:58 +03:00
|
|
|
}
|
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
static void
|
|
|
|
start_window_manager(struct auth_info *auth_info,
|
|
|
|
const struct session_parameters *s)
|
|
|
|
{
|
|
|
|
char text[256];
|
|
|
|
|
|
|
|
env_set_user(s->uid,
|
|
|
|
0,
|
|
|
|
s->display,
|
|
|
|
g_cfg->env_names,
|
|
|
|
g_cfg->env_values);
|
|
|
|
|
|
|
|
auth_set_env(auth_info);
|
2023-04-24 13:36:33 +03:00
|
|
|
LOG_DEVEL_LEAKING_FDS("window manager", 3, -1);
|
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (s->directory[0] != '\0')
|
|
|
|
{
|
2023-04-14 21:22:42 +03:00
|
|
|
if (g_cfg->sec.allow_alternate_shell)
|
|
|
|
{
|
|
|
|
g_set_current_dir(s->directory);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"Directory change to %s requested, but not "
|
|
|
|
"allowed by AllowAlternateShell config value.",
|
|
|
|
s->directory);
|
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (s->shell[0] != '\0')
|
|
|
|
{
|
2023-04-14 21:22:42 +03:00
|
|
|
if (g_cfg->sec.allow_alternate_shell)
|
2023-03-17 15:08:22 +03:00
|
|
|
{
|
2023-04-14 21:22:42 +03:00
|
|
|
if (g_strchr(s->shell, ' ') != 0 || g_strchr(s->shell, '\t') != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Using user requested window manager on "
|
|
|
|
"display %u with embedded arguments using a shell: %s",
|
|
|
|
s->display, s->shell);
|
|
|
|
const char *argv[] = {"sh", "-c", s->shell, NULL};
|
|
|
|
g_execvp("/bin/sh", (char **)argv);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Using user requested window manager on "
|
|
|
|
"display %d: %s", s->display, s->shell);
|
|
|
|
g_execlp3(s->shell, s->shell, 0);
|
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-04-14 21:22:42 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"Shell %s requested by user, but not allowed by "
|
|
|
|
"AllowAlternateShell config value.",
|
|
|
|
s->shell);
|
2023-03-17 15:08:22 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_DEBUG, "The user session on display %u did "
|
|
|
|
"not request a specific window manager", s->display);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* try to execute user window manager if enabled */
|
|
|
|
if (g_cfg->enable_user_wm)
|
|
|
|
{
|
|
|
|
g_snprintf(text, sizeof(text), "%s/%s",
|
|
|
|
g_getenv("HOME"), g_cfg->user_wm);
|
|
|
|
if (g_file_exist(text))
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Using window manager on display %u"
|
|
|
|
" from user home directory: %s", s->display, text);
|
|
|
|
g_execlp3(text, g_cfg->user_wm, 0);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_DEBUG,
|
|
|
|
"The user home directory window manager configuration "
|
|
|
|
"is enabled but window manager program does not exist: %s",
|
|
|
|
text);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Using the default window manager on display %u: %s",
|
|
|
|
s->display, g_cfg->default_wm);
|
|
|
|
g_execlp3(g_cfg->default_wm, g_cfg->default_wm, 0);
|
|
|
|
|
|
|
|
/* still a problem starting window manager just start xterm */
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"No window manager on display %u started, "
|
|
|
|
"so falling back to starting xterm for user debugging",
|
|
|
|
s->display);
|
|
|
|
g_execlp3("xterm", "xterm", 0);
|
|
|
|
|
|
|
|
/* should not get here */
|
|
|
|
LOG(LOG_LEVEL_ERROR, "A fatal error has occurred attempting to start "
|
|
|
|
"the window manager on display %u, aborting connection",
|
|
|
|
s->display);
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
static struct list *
|
|
|
|
prepare_xorg_xserver_params(const struct session_parameters *s,
|
|
|
|
const char *authfile)
|
|
|
|
{
|
|
|
|
|
|
|
|
char screen[32]; /* display number */
|
|
|
|
char text[128];
|
|
|
|
const char *xserver;
|
|
|
|
|
|
|
|
struct list *params = list_create();
|
|
|
|
if (params != NULL)
|
|
|
|
{
|
|
|
|
params->auto_free = 1;
|
|
|
|
|
|
|
|
#ifdef HAVE_SYS_PRCTL_H
|
|
|
|
/*
|
|
|
|
* Make sure Xorg doesn't run setuid root. Root access is not
|
|
|
|
* needed. Xorg can fail when run as root and the user has no
|
|
|
|
* console permissions.
|
|
|
|
* PR_SET_NO_NEW_PRIVS requires Linux kernel 3.5 and newer.
|
|
|
|
*/
|
|
|
|
if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) < 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"[session start] (display %u): Failed to disable "
|
|
|
|
"setuid on X server: %s",
|
|
|
|
s->display, g_get_strerror());
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
g_snprintf(screen, sizeof(screen), ":%u", s->display);
|
|
|
|
|
|
|
|
/* some args are passed via env vars */
|
|
|
|
g_snprintf(text, sizeof(text), "%d", s->width);
|
|
|
|
g_setenv("XRDP_START_WIDTH", text, 1);
|
|
|
|
|
|
|
|
g_snprintf(text, sizeof(text), "%d", s->height);
|
|
|
|
g_setenv("XRDP_START_HEIGHT", text, 1);
|
|
|
|
|
|
|
|
g_snprintf(text, sizeof(text), "%d", g_cfg->sess.max_idle_time);
|
|
|
|
g_setenv("XRDP_SESMAN_MAX_IDLE_TIME", text, 1);
|
|
|
|
|
|
|
|
g_snprintf(text, sizeof(text), "%d", g_cfg->sess.max_disc_time);
|
|
|
|
g_setenv("XRDP_SESMAN_MAX_DISC_TIME", text, 1);
|
|
|
|
|
|
|
|
g_snprintf(text, sizeof(text), "%d", g_cfg->sess.kill_disconnected);
|
|
|
|
g_setenv("XRDP_SESMAN_KILL_DISCONNECTED", text, 1);
|
|
|
|
|
|
|
|
g_setenv("XRDP_SOCKET_PATH", XRDP_SOCKET_PATH, 1);
|
|
|
|
|
|
|
|
/* get path of Xorg from config */
|
|
|
|
xserver = (const char *)list_get_item(g_cfg->xorg_params, 0);
|
|
|
|
|
|
|
|
/* these are the must have parameters */
|
|
|
|
list_add_strdup_multi(params,
|
|
|
|
xserver, screen,
|
|
|
|
"-auth", authfile,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
/* additional parameters from sesman.ini file */
|
|
|
|
list_append_list_strdup(g_cfg->xorg_params, params, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
return params;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
static struct list *
|
|
|
|
prepare_xvnc_xserver_params(const struct session_parameters *s,
|
|
|
|
const char *authfile,
|
|
|
|
const char *passwd_file)
|
|
|
|
{
|
|
|
|
char screen[32] = {0}; /* display number */
|
|
|
|
char geometry[32] = {0};
|
|
|
|
char depth[32] = {0};
|
|
|
|
char guid_str[GUID_STR_SIZE];
|
|
|
|
const char *xserver;
|
|
|
|
|
|
|
|
struct list *params = list_create();
|
|
|
|
if (params != NULL)
|
|
|
|
{
|
|
|
|
params->auto_free = 1;
|
|
|
|
|
|
|
|
g_snprintf(screen, sizeof(screen), ":%u", s->display);
|
|
|
|
g_snprintf(geometry, sizeof(geometry), "%dx%d", s->width, s->height);
|
|
|
|
g_snprintf(depth, sizeof(depth), "%d", s->bpp);
|
|
|
|
|
|
|
|
guid_to_str(&s->guid, guid_str);
|
|
|
|
env_check_password_file(passwd_file, guid_str);
|
|
|
|
|
|
|
|
/* get path of Xvnc from config */
|
|
|
|
xserver = (const char *)list_get_item(g_cfg->vnc_params, 0);
|
|
|
|
|
|
|
|
/* these are the must have parameters */
|
|
|
|
list_add_strdup_multi(params,
|
|
|
|
xserver, screen,
|
|
|
|
"-auth", authfile,
|
|
|
|
"-geometry", geometry,
|
|
|
|
"-depth", depth,
|
|
|
|
"-rfbauth", passwd_file,
|
|
|
|
NULL);
|
|
|
|
|
|
|
|
/* additional parameters from sesman.ini file */
|
|
|
|
//config_read_xserver_params(SCP_SESSION_TYPE_XVNC,
|
|
|
|
// xserver_params);
|
|
|
|
list_append_list_strdup(g_cfg->vnc_params, params, 1);
|
|
|
|
}
|
|
|
|
return params;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
/* Either execs the X server, or returns */
|
|
|
|
static void
|
|
|
|
start_x_server(struct auth_info *auth_info,
|
|
|
|
const struct session_parameters *s)
|
|
|
|
{
|
|
|
|
char authfile[256]; /* The filename for storing xauth information */
|
|
|
|
char execvpparams[2048];
|
|
|
|
char *passwd_file = NULL;
|
|
|
|
struct list *xserver_params = NULL;
|
|
|
|
int unknown_session_type = 0;
|
|
|
|
|
|
|
|
if (s->type == SCP_SESSION_TYPE_XVNC)
|
|
|
|
{
|
|
|
|
env_set_user(s->uid,
|
|
|
|
&passwd_file,
|
|
|
|
s->display,
|
|
|
|
g_cfg->env_names,
|
|
|
|
g_cfg->env_values);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
env_set_user(s->uid,
|
|
|
|
0,
|
|
|
|
s->display,
|
|
|
|
g_cfg->env_names,
|
|
|
|
g_cfg->env_values);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* prepare the Xauthority stuff */
|
|
|
|
if (g_getenv("XAUTHORITY") != NULL)
|
|
|
|
{
|
|
|
|
g_snprintf(authfile, sizeof(authfile), "%s",
|
|
|
|
g_getenv("XAUTHORITY"));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
g_snprintf(authfile, sizeof(authfile), "%s", ".Xauthority");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add the entry in XAUTHORITY file or exit if error */
|
|
|
|
if (add_xauth_cookie(s->display, authfile) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"Error setting the xauth cookie for display %u in file %s",
|
|
|
|
s->display, authfile);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
switch (s->type)
|
|
|
|
{
|
|
|
|
case SCP_SESSION_TYPE_XORG:
|
|
|
|
xserver_params = prepare_xorg_xserver_params(s, authfile);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case SCP_SESSION_TYPE_XVNC:
|
|
|
|
xserver_params = prepare_xvnc_xserver_params(s, authfile,
|
|
|
|
passwd_file);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
unknown_session_type = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
g_free(passwd_file);
|
|
|
|
passwd_file = NULL;
|
|
|
|
|
|
|
|
if (xserver_params == NULL)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Out of memory allocating X server params");
|
|
|
|
}
|
|
|
|
else if (unknown_session_type)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Unknown session type: %d",
|
|
|
|
s->type);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* fire up X server */
|
|
|
|
LOG(LOG_LEVEL_INFO, "Starting X server on display %u: %s",
|
|
|
|
s->display,
|
|
|
|
dumpItemsToString(xserver_params, execvpparams, 2048));
|
2023-04-24 13:36:33 +03:00
|
|
|
LOG_DEVEL_LEAKING_FDS("X server", 3, -1);
|
2023-03-17 15:08:22 +03:00
|
|
|
g_execvp_list((const char *)xserver_params->items[0],
|
|
|
|
xserver_params);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* should not get here */
|
|
|
|
list_delete(xserver_params);
|
|
|
|
LOG(LOG_LEVEL_ERROR, "A fatal error has occurred attempting "
|
|
|
|
"to start the X server on display %u, aborting connection",
|
|
|
|
s->display);
|
|
|
|
}
|
|
|
|
|
2005-10-06 23:27:38 +04:00
|
|
|
/******************************************************************************/
|
2022-12-14 12:36:07 +03:00
|
|
|
/**
|
|
|
|
* Convert a UID to a username
|
|
|
|
*
|
|
|
|
* @param uid UID
|
|
|
|
* @param uname pointer to output buffer
|
|
|
|
* @param uname_len Length of output buffer
|
|
|
|
* @return 0 for success.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
username_from_uid(int uid, char *uname, int uname_len)
|
|
|
|
{
|
|
|
|
char *ustr;
|
|
|
|
int rv = g_getuser_info_by_uid(uid, &ustr, NULL, NULL, NULL, NULL);
|
2022-02-14 12:16:42 +03:00
|
|
|
|
2022-12-14 12:36:07 +03:00
|
|
|
if (rv == 0)
|
|
|
|
{
|
|
|
|
g_snprintf(uname, uname_len, "%s", ustr);
|
|
|
|
g_free(ustr);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
g_snprintf(uname, uname_len, "<unknown>");
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2023-03-10 18:52:07 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
static void
|
|
|
|
exit_status_to_str(const struct exit_status *e, char buff[], int bufflen)
|
|
|
|
{
|
|
|
|
switch (e->reason)
|
|
|
|
{
|
|
|
|
case E_XR_STATUS_CODE:
|
|
|
|
if (e->val == 0)
|
|
|
|
{
|
|
|
|
g_snprintf(buff, bufflen, "exit code zero");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
g_snprintf(buff, bufflen, "non-zero exit code %d", e->val);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case E_XR_SIGNAL:
|
|
|
|
g_snprintf(buff, bufflen, "signal %d", e->val);
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
g_snprintf(buff, bufflen, "an unexpected error");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-09 18:40:56 +03:00
|
|
|
/******************************************************************************/
|
2023-03-17 15:08:22 +03:00
|
|
|
static void
|
|
|
|
run_xrdp_session(const struct session_parameters *s,
|
|
|
|
struct auth_info *auth_info,
|
|
|
|
int window_manager_pid,
|
|
|
|
int display_pid,
|
|
|
|
int chansrv_pid)
|
2005-10-06 23:27:38 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
int wm_wait_time;
|
|
|
|
struct exit_status wm_exit_status = {.reason = E_XR_UNEXPECTED, .val = 0};
|
|
|
|
int wm_running = 1;
|
|
|
|
|
|
|
|
/* Monitor the amount of time we wait for the
|
|
|
|
* window manager. This is approximately how long the window
|
|
|
|
* manager was running for */
|
|
|
|
LOG(LOG_LEVEL_INFO, "Session in progress on display :%d. Waiting "
|
|
|
|
"until the window manager (pid %d) exits to end the session",
|
|
|
|
s->display, window_manager_pid);
|
|
|
|
wm_wait_time = g_time1();
|
|
|
|
|
|
|
|
/* Wait for the window manager to terminate
|
|
|
|
*
|
|
|
|
* We can't use g_waitpid() variants for this, as these aren't
|
|
|
|
* interruptible by a SIGTERM */
|
|
|
|
while (wm_running)
|
|
|
|
{
|
|
|
|
int robjs_count;
|
|
|
|
intptr_t robjs[32];
|
|
|
|
int pid;
|
|
|
|
struct exit_status e;
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
robjs_count = 0;
|
|
|
|
robjs[robjs_count++] = g_term_event;
|
|
|
|
robjs[robjs_count++] = g_sigchld_event;
|
2016-07-22 11:48:37 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (g_obj_wait(robjs, robjs_count, NULL, 0, 0) != 0)
|
|
|
|
{
|
|
|
|
/* should not get here */
|
|
|
|
LOG(LOG_LEVEL_WARNING, "run_xrdp_session: "
|
|
|
|
"Unexpected error from g_obj_wait()");
|
|
|
|
g_sleep(100);
|
|
|
|
continue;
|
|
|
|
}
|
2022-12-14 12:36:07 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (g_is_wait_obj_set(g_term_event))
|
|
|
|
{
|
|
|
|
g_reset_wait_obj(g_term_event);
|
|
|
|
LOG(LOG_LEVEL_INFO, "Received SIGTERM");
|
|
|
|
// Pass it on to the window manager
|
|
|
|
g_sigterm(window_manager_pid);
|
|
|
|
}
|
2023-03-09 18:40:56 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
// Check for any finished children
|
|
|
|
g_reset_wait_obj(g_sigchld_event);
|
|
|
|
while ((pid = g_waitchild(&e)) > 0)
|
|
|
|
{
|
|
|
|
if (pid == window_manager_pid)
|
|
|
|
{
|
|
|
|
wm_running = 0;
|
|
|
|
wm_exit_status = e;
|
|
|
|
}
|
|
|
|
else if (pid == display_pid)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_INFO, "X server pid %d on display :%d finished",
|
|
|
|
display_pid, s->display);
|
|
|
|
display_pid = -1;
|
|
|
|
// No other action - window manager should be going soon
|
|
|
|
}
|
|
|
|
else if (pid == chansrv_pid)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"xrdp channel server pid %d on display :%d finished",
|
|
|
|
chansrv_pid, s->display);
|
|
|
|
chansrv_pid = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
wm_wait_time = g_time1() - wm_wait_time;
|
|
|
|
|
|
|
|
if (wm_exit_status.reason == E_XR_STATUS_CODE && wm_exit_status.val == 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Window manager (pid %d, display %d) finished normally in %d secs",
|
|
|
|
window_manager_pid, s->display, wm_wait_time);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
else
|
|
|
|
{
|
|
|
|
char reason[128];
|
|
|
|
exit_status_to_str(&wm_exit_status, reason, sizeof(reason));
|
2006-02-05 08:46:48 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_WARNING, "Window manager (pid %d, display %d) "
|
|
|
|
"exited with %s. This "
|
|
|
|
"could indicate a window manager config problem",
|
|
|
|
window_manager_pid, s->display, reason);
|
|
|
|
}
|
|
|
|
if (wm_wait_time < 10)
|
|
|
|
{
|
|
|
|
/* This could be a config issue. Log a significant error */
|
|
|
|
LOG(LOG_LEVEL_WARNING, "Window manager (pid %d, display %d) "
|
|
|
|
"exited quickly (%d secs). This could indicate a window "
|
|
|
|
"manager config problem",
|
|
|
|
window_manager_pid, s->display, wm_wait_time);
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (display_pid > 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "Terminating X server (pid %d) on display :%d",
|
|
|
|
display_pid, s->display);
|
|
|
|
g_sigterm(display_pid);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
|
|
|
|
if (chansrv_pid > 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "Terminating the xrdp channel server (pid %d) "
|
|
|
|
"on display :%d", chansrv_pid, s->display);
|
|
|
|
g_sigterm(chansrv_pid);
|
|
|
|
}
|
2023-03-09 18:40:56 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/* make sure all children are gone before socket cleanup happens */
|
|
|
|
if (display_pid > 0)
|
|
|
|
{
|
|
|
|
g_waitpid(display_pid);
|
|
|
|
LOG(LOG_LEVEL_INFO, "X server pid %d on display :%d finished",
|
|
|
|
display_pid, s->display);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (chansrv_pid > 0)
|
|
|
|
{
|
|
|
|
g_waitpid(chansrv_pid);
|
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"xrdp channel server pid %d on display :%d finished",
|
|
|
|
chansrv_pid, s->display);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
cleanup_sockets(s->display);
|
|
|
|
g_deinit();
|
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
/*
|
|
|
|
* Simple helper process to fork a child and log errors */
|
|
|
|
static int
|
|
|
|
fork_child(
|
|
|
|
void (*runproc)(struct auth_info *, const struct session_parameters *),
|
|
|
|
struct auth_info *auth_info,
|
|
|
|
const struct session_parameters *s)
|
|
|
|
{
|
|
|
|
int pid = g_fork();
|
|
|
|
if (pid == 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Child process */
|
|
|
|
runproc(auth_info, s);
|
2023-03-09 18:40:56 +03:00
|
|
|
g_exit(0);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
|
|
|
|
if (pid < 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "Fork failed [%s]", g_get_strerror());
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2018-02-05 11:38:20 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
return pid;
|
|
|
|
}
|
2018-02-05 11:38:20 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
/**
|
|
|
|
* Sub-process to start a session
|
|
|
|
*
|
|
|
|
* @param auth_info Authentication info
|
|
|
|
* @param s Session parameters
|
|
|
|
* @param success_fd File descriptor to write to on success
|
|
|
|
*
|
|
|
|
* @return status
|
|
|
|
*
|
|
|
|
* This routine returns a status on failure. On success, a character is
|
|
|
|
* written to the file descriptor to indicate a success, and then the
|
|
|
|
* routine runs for the lifetime of the session.
|
|
|
|
*/
|
|
|
|
enum scp_screate_status
|
|
|
|
session_start_subprocess(struct auth_info *auth_info,
|
|
|
|
const struct session_parameters *s,
|
|
|
|
int success_fd)
|
|
|
|
{
|
|
|
|
char username[256];
|
|
|
|
int chansrv_pid;
|
|
|
|
int display_pid;
|
|
|
|
int window_manager_pid;
|
|
|
|
enum scp_screate_status status = E_SCP_SCREATE_GENERAL_ERROR;
|
|
|
|
char text[64];
|
|
|
|
|
|
|
|
/* Set up wait objects so we can detect signals */
|
|
|
|
g_pid = g_getpid();
|
|
|
|
g_snprintf(text, sizeof(text), "xrdp_sesexec_%8.8x_main_term",
|
|
|
|
g_pid);
|
|
|
|
g_term_event = g_create_wait_obj(text);
|
|
|
|
g_signal_terminate(set_term_event);
|
|
|
|
g_snprintf(text, sizeof(text), "xrdp_sesexec_%8.8x_sigchld",
|
|
|
|
g_pid);
|
|
|
|
g_sigchld_event = g_create_wait_obj(text);
|
|
|
|
g_signal_child_stop(set_sigchld_event);
|
2023-03-09 18:40:56 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Get the username for display purposes */
|
|
|
|
username_from_uid(s->uid, username, sizeof(username));
|
2017-03-19 00:45:58 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
#ifdef USE_BSD_SETLOGIN
|
|
|
|
/**
|
|
|
|
* Create a new session and process group since the 4.4BSD
|
|
|
|
* setlogin() affects the entire process group
|
|
|
|
*/
|
|
|
|
if (g_setsid() < 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"[session start] (display %d): setsid failed - pid %d",
|
|
|
|
s->display, g_getpid());
|
|
|
|
}
|
2023-03-09 18:40:56 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (g_setlogin(username) < 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"[session start] (display %d): setlogin failed for user %s - pid %d",
|
|
|
|
s->display, username, g_getpid());
|
|
|
|
}
|
|
|
|
#endif
|
2023-03-09 18:40:56 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Set the secondary groups before starting the session to prevent
|
|
|
|
* problems on PAM-based systems (see Linux pam_setcred(3)).
|
|
|
|
* If we have *BSD setusercontext() this is not done here */
|
|
|
|
#ifndef HAVE_SETUSERCONTEXT
|
|
|
|
if (g_initgroups(username) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"Failed to initialise secondary groups for %s: %s",
|
|
|
|
username, g_get_strerror());
|
|
|
|
return E_SCP_SCREATE_GENERAL_ERROR;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
display_pid = fork_child(start_x_server, auth_info, s);
|
|
|
|
if (display_pid > 0)
|
|
|
|
{
|
|
|
|
enum xwait_status xws;
|
|
|
|
xws = wait_for_xserver(s->uid,
|
|
|
|
g_cfg->env_names,
|
|
|
|
g_cfg->env_values,
|
|
|
|
s->display);
|
|
|
|
|
|
|
|
if (xws != XW_STATUS_OK)
|
2006-02-09 21:01:41 +03:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
switch (xws)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-09 18:40:56 +03:00
|
|
|
case XW_STATUS_TIMED_OUT:
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Timed out waiting for X server");
|
|
|
|
break;
|
|
|
|
case XW_STATUS_FAILED_TO_START:
|
|
|
|
LOG(LOG_LEVEL_ERROR, "X server failed to start");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"An error occurred waiting for the X server");
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
status = E_SCP_SCREATE_X_SERVER_FAIL;
|
|
|
|
/* Kill it anyway in case it did start and we just failed to
|
|
|
|
* pick up on it */
|
|
|
|
g_sigterm(display_pid);
|
|
|
|
g_waitpid(display_pid);
|
2023-03-09 18:40:56 +03:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
else
|
2023-03-09 18:40:56 +03:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_INFO, "X server :%d is working", s->display);
|
|
|
|
LOG(LOG_LEVEL_INFO, "Starting window manager for display :%d",
|
|
|
|
s->display);
|
|
|
|
window_manager_pid = fork_child(start_window_manager,
|
|
|
|
auth_info, s);
|
|
|
|
if (window_manager_pid < 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
g_sigterm(display_pid);
|
|
|
|
g_waitpid(display_pid);
|
2023-03-09 18:40:56 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Starting the xrdp channel server for display :%d",
|
|
|
|
s->display);
|
2016-07-22 11:48:37 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
chansrv_pid = fork_child(start_chansrv, auth_info, s);
|
2016-12-14 02:29:22 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
// Tell the caller we've started
|
|
|
|
char zero = 0;
|
|
|
|
g_file_write(success_fd, &zero, 1);
|
|
|
|
status = E_SCP_SCREATE_OK;
|
2021-05-08 19:58:11 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/* This call does not return until the session is done */
|
|
|
|
run_xrdp_session(s, auth_info, window_manager_pid,
|
|
|
|
display_pid, chansrv_pid);
|
2023-03-09 18:40:56 +03:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
}
|
|
|
|
}
|
2016-12-13 15:24:15 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef USE_EXTRA_SESSION_FORK
|
|
|
|
/*
|
|
|
|
* FreeBSD bug
|
|
|
|
* ports/157282: effective login name is not set by xrdp-sesman
|
|
|
|
* http://www.freebsd.org/cgi/query-pr.cgi?pr=157282
|
|
|
|
*
|
|
|
|
* from:
|
|
|
|
* $OpenBSD: session.c,v 1.252 2010/03/07 11:57:13 dtucker Exp $
|
|
|
|
* with some ideas about BSD process grouping to xrdp
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
run_extra_fork(void)
|
|
|
|
{
|
|
|
|
char text[64];
|
|
|
|
struct exit_status e;
|
|
|
|
int stat;
|
|
|
|
|
|
|
|
pid_t bsdsespid = g_fork();
|
|
|
|
|
|
|
|
if (bsdsespid <= 0)
|
|
|
|
{
|
|
|
|
/* Error, or child */
|
|
|
|
return bsdsespid;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* intermediate sesman should return the status of its own child, and
|
|
|
|
* kill the child if we get a sigterm
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Set up wait objects so we can detect signals */
|
|
|
|
g_pid = g_getpid();
|
|
|
|
g_snprintf(text, sizeof(text), "xrdp_intermediate_%8.8x_main_term",
|
|
|
|
g_pid);
|
|
|
|
g_term_event = g_create_wait_obj(text);
|
|
|
|
g_signal_terminate(set_term_event);
|
|
|
|
g_snprintf(text, sizeof(text), "xrdp_intermediate_%8.8x_sigchld",
|
|
|
|
g_pid);
|
|
|
|
g_sigchld_event = g_create_wait_obj(text);
|
|
|
|
g_signal_child_stop(set_sigchld_event);
|
|
|
|
|
|
|
|
// Wait for a SIGCHLD event. We've only got one child so we know where
|
|
|
|
// it's come from!
|
|
|
|
while (!g_is_wait_obj_set(g_sigchld_event))
|
|
|
|
{
|
|
|
|
int robjs_count;
|
|
|
|
intptr_t robjs[4];
|
|
|
|
|
|
|
|
robjs_count = 0;
|
|
|
|
robjs[robjs_count++] = g_term_event;
|
|
|
|
robjs[robjs_count++] = g_sigchld_event;
|
|
|
|
|
|
|
|
if (g_obj_wait(robjs, robjs_count, NULL, 0, 0) != 0)
|
|
|
|
{
|
|
|
|
/* should not get here */
|
|
|
|
LOG(LOG_LEVEL_WARNING, "run_extra_fork: "
|
|
|
|
"Unexpected error from g_obj_wait()");
|
|
|
|
g_sleep(100);
|
|
|
|
}
|
|
|
|
else if (g_is_wait_obj_set(g_term_event))
|
|
|
|
{
|
|
|
|
g_reset_wait_obj(g_term_event);
|
|
|
|
LOG(LOG_LEVEL_INFO, "Received SIGTERM");
|
|
|
|
// Pass it on to the BSD session leader
|
|
|
|
g_sigterm(bsdsespid);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
e = g_waitpid_status(bsdsespid);
|
|
|
|
stat = (e.reason == E_XR_STATUS_CODE) ? e.val : E_SCP_SCREATE_GENERAL_ERROR;
|
|
|
|
g_exit(stat);
|
|
|
|
return -1;
|
|
|
|
}
|
2016-11-29 11:42:48 +03:00
|
|
|
#endif
|
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/******************************************************************************/
|
|
|
|
enum scp_screate_status
|
|
|
|
session_start(struct auth_info *auth_info,
|
|
|
|
const struct session_parameters *s,
|
|
|
|
int *pid)
|
|
|
|
{
|
|
|
|
int fd[2];
|
|
|
|
enum scp_screate_status status = E_SCP_SCREATE_GENERAL_ERROR;
|
2014-03-09 04:41:37 +04:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
if (g_pipe(fd) != 0)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Cant create a pipe [%s]", g_get_strerror());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*pid = g_fork();
|
|
|
|
if (*pid == 0)
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* We're now forked from the main sesman process, so we
|
2023-01-17 13:55:19 +03:00
|
|
|
* can close file descriptors that we no longer need
|
|
|
|
*
|
|
|
|
* Set FD_CLOEXEC on the FD used to send our status back to
|
|
|
|
* sesman, as our sub-processes shouldn't be able to see it */
|
2023-03-17 15:08:22 +03:00
|
|
|
g_file_close(fd[0]);
|
2023-01-17 13:55:19 +03:00
|
|
|
g_file_set_cloexec(fd[1], 1);
|
2014-04-20 11:42:19 +04:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
sesman_close_all(0);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Wait objects created in a parent are not valid in a child */
|
|
|
|
sesman_delete_wait_objects();
|
2021-05-08 19:58:11 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"calling auth_start_session for uid=%d from pid %d",
|
|
|
|
s->uid, g_getpid());
|
|
|
|
auth_start_session(auth_info, s->display);
|
|
|
|
|
|
|
|
/* Run the child */
|
|
|
|
#ifdef USE_EXTRA_SESSION_FORK
|
|
|
|
if (run_extra_fork() < 0)
|
2023-03-09 18:40:56 +03:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
return E_SCP_SCREATE_GENERAL_ERROR;
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
#endif
|
|
|
|
status = session_start_subprocess(auth_info, s, fd[1]);
|
2023-03-09 18:40:56 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Calling auth_stop_session from pid %d",
|
|
|
|
g_getpid());
|
|
|
|
auth_stop_session(auth_info);
|
|
|
|
g_exit(status);
|
|
|
|
}
|
2023-03-09 18:40:56 +03:00
|
|
|
|
2023-03-17 15:08:22 +03:00
|
|
|
g_file_close(fd[1]);
|
|
|
|
if (*pid == -1)
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Cant fork [%s]", g_get_strerror());
|
2023-03-09 18:40:56 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Wait for the child to signal success, or return an error */
|
|
|
|
int err;
|
|
|
|
char buff;
|
|
|
|
do
|
2023-03-09 18:40:56 +03:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
err = g_file_read(fd[0], &buff, 1);
|
2023-03-09 18:40:56 +03:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
while (err == -1 && g_get_errno() == EINTR);
|
|
|
|
if (err < 0)
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Read problem */
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Can't read pipe [%s]", g_get_strerror());
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
else if (err > 0)
|
2023-03-09 18:40:56 +03:00
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Session is up and running */
|
|
|
|
status = E_SCP_SCREATE_OK;
|
2023-03-09 18:40:56 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2023-03-17 15:08:22 +03:00
|
|
|
/* Process has failed. Get the exit status of the child */
|
|
|
|
struct exit_status e;
|
|
|
|
e = g_waitpid_status(*pid);
|
|
|
|
if (e.reason == E_XR_STATUS_CODE)
|
|
|
|
{
|
|
|
|
status = (enum scp_screate_status)e.val;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
char reason[128];
|
|
|
|
exit_status_to_str(&e, reason, sizeof(reason));
|
|
|
|
LOG(LOG_LEVEL_ERROR, "Child exited with %s", reason);
|
|
|
|
}
|
2023-03-09 18:40:56 +03:00
|
|
|
}
|
2006-02-09 21:01:41 +03:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
g_file_close(fd[0]);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
2023-03-17 15:08:22 +03:00
|
|
|
|
|
|
|
return status;
|
2009-01-12 09:43:58 +03:00
|
|
|
}
|
|
|
|
|
2012-07-17 00:20:26 +04:00
|
|
|
/******************************************************************************/
|
2022-02-14 12:16:42 +03:00
|
|
|
int
|
2022-12-14 12:36:07 +03:00
|
|
|
session_reconnect(int display, int uid,
|
2022-09-11 15:18:53 +03:00
|
|
|
struct auth_info *auth_info)
|
2012-07-17 00:20:26 +04:00
|
|
|
{
|
2012-09-20 07:51:34 +04:00
|
|
|
int pid;
|
|
|
|
|
|
|
|
pid = g_fork();
|
|
|
|
|
|
|
|
if (pid == -1)
|
2012-07-17 00:20:26 +04:00
|
|
|
{
|
2020-07-30 06:10:23 +03:00
|
|
|
LOG(LOG_LEVEL_ERROR, "Failed to fork for session reconnection script");
|
2012-07-17 00:20:26 +04:00
|
|
|
}
|
2012-09-20 07:51:34 +04:00
|
|
|
else if (pid == 0)
|
|
|
|
{
|
2022-12-14 12:36:07 +03:00
|
|
|
env_set_user(uid,
|
2016-07-22 11:48:37 +03:00
|
|
|
0,
|
|
|
|
display,
|
2017-12-15 11:56:45 +03:00
|
|
|
g_cfg->env_names,
|
|
|
|
g_cfg->env_values);
|
2022-09-11 15:18:53 +03:00
|
|
|
auth_set_env(auth_info);
|
2012-09-20 07:51:34 +04:00
|
|
|
|
2018-06-14 09:31:12 +03:00
|
|
|
if (g_file_exist(g_cfg->reconnect_sh))
|
2012-09-20 07:51:34 +04:00
|
|
|
{
|
2023-04-24 13:36:33 +03:00
|
|
|
LOG_DEVEL_LEAKING_FDS("reconnect script", 3, -1);
|
|
|
|
|
2020-07-30 06:10:23 +03:00
|
|
|
LOG(LOG_LEVEL_INFO,
|
|
|
|
"Starting session reconnection script on display %d: %s",
|
|
|
|
display, g_cfg->reconnect_sh);
|
2018-06-14 09:31:12 +03:00
|
|
|
g_execlp3(g_cfg->reconnect_sh, g_cfg->reconnect_sh, 0);
|
2020-07-30 06:10:23 +03:00
|
|
|
|
|
|
|
/* should not get here */
|
|
|
|
LOG(LOG_LEVEL_ERROR,
|
|
|
|
"Error starting session reconnection script on display %d: %s",
|
2021-05-08 19:58:11 +03:00
|
|
|
display, g_cfg->reconnect_sh);
|
2020-07-30 06:10:23 +03:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
LOG(LOG_LEVEL_WARNING,
|
|
|
|
"Session reconnection script file does not exist: %s",
|
|
|
|
g_cfg->reconnect_sh);
|
2012-09-20 07:51:34 +04:00
|
|
|
}
|
|
|
|
|
2020-07-30 06:10:23 +03:00
|
|
|
/* TODO: why is this existing with a success error code when the
|
|
|
|
reconnect script failed to be executed? */
|
2012-09-20 07:51:34 +04:00
|
|
|
g_exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
return display;
|
2012-07-17 00:20:26 +04:00
|
|
|
}
|