xrdp/sesman/sesexec/sesexec.c
matt335672 7cf9101407 Fix compile errors detected by the older gcc 4.8.5 compiler:-
sesexec.c: In function ‘main’:
sesexec.c:521:1: error: control reaches end of non-void function [-Werror=return-type]

sound.c: In function ‘process_pcm_message’:
sound.c:1123:21: error: ‘for’ loop initial declarations are only allowed in C99 mode
                     for (int i = 0; i < send_silence_times; i++)
                     ^
sound.c:1123:21: note: use option -std=c99 or -std=gnu99 to compile your code

These fixes are in line with our coding standard and have no functional change.
2023-06-07 20:21:54 +01:00

522 lines
13 KiB
C

/**
* xrdp: A Remote Desktop Protocol server.
*
* Copyright (C) Matt Burt 2023
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/**
*
* @file sesexec.c
* @brief Main program file for session executive process
* @author Matt Burt
*
*/
#if defined(HAVE_CONFIG_H)
#include <config_ac.h>
#endif
#include <ctype.h>
#include <stdarg.h>
#include "arch.h"
#include "eicp.h"
#include "eicp_server.h"
#include "ercp.h"
#include "ercp_server.h"
#include "login_info.h"
#include "sesexec.h"
#include "sesman_config.h"
#include "log.h"
#include "os_calls.h"
#include "session.h"
#include "string_calls.h"
#include "trans.h"
#include "xrdp_sockets.h"
struct startup_params
{
const char *sesman_ini;
};
/*
* Program-scope globals
*/
struct config_sesman *g_cfg;
unsigned char g_fixedkey[8] = { 23, 82, 107, 6, 35, 78, 88, 7 };
struct login_info *g_login_info;
struct session_data *g_session_data;
tintptr g_term_event = 0;
tintptr g_sigchld_event = 0;
pid_t g_pid;
/*
* Module-scope globals
*/
static struct trans *g_ecp_trans;
static int g_terminate_loop = 0;
static int g_terminate_status = 0;
/*****************************************************************************/
/**
* Command line argument parser
* @param[in] argc number of command line arguments
* @param[in] argv pointer array of commandline arguments
* @param[out] startup_params Returned startup parameters
* @return 0 on success
*/
static int
process_params(int argc, char **argv,
struct startup_params *startup_params)
{
int index;
const char *option;
const char *value;
startup_params->sesman_ini = DEFAULT_SESMAN_INI;
index = 1;
while (index < argc)
{
option = argv[index];
if (index + 1 < argc)
{
value = argv[index + 1];
}
else
{
value = "";
}
if (g_strcmp(option, "-c") == 0)
{
index++;
startup_params->sesman_ini = value;
}
else /* unknown option */
{
return index;
}
index++;
}
return 0;
}
/******************************************************************************/
#if 0
static int
sesexec_scp_data_in(struct trans *self)
{
int rv;
int available;
rv = scp_msg_in_check_available(self, &available);
if (rv == 0 && available)
{
struct sesman_con *sc = (struct sesman_con *)self->callback_data;
//if ((rv = scp_process(sc)) != 0)
{
LOG(LOG_LEVEL_ERROR, "%s: scp_process failed", __func__);
}
scp_msg_in_reset(self);
}
return rv;
}
#endif
/******************************************************************************/
static int
sesexec_eicp_data_in(struct trans *self)
{
int rv;
int available;
rv = eicp_msg_in_check_available(self, &available);
if (rv == 0 && available)
{
if ((rv = eicp_server(self)) != 0)
{
LOG(LOG_LEVEL_ERROR, "%s: eicp_server failed", __func__);
}
eicp_msg_in_reset(self);
}
return rv;
}
/******************************************************************************/
int
sesexec_ercp_data_in(struct trans *self)
{
int rv;
int available;
rv = ercp_msg_in_check_available(self, &available);
if (rv == 0 && available)
{
if ((rv = ercp_server(self)) != 0)
{
LOG(LOG_LEVEL_ERROR, "%s: ercp_server failed", __func__);
}
ercp_msg_in_reset(self);
}
return rv;
}
/******************************************************************************/
/**
* Informs the main loop a termination signal has been received
*/
static void
set_term_event(int sig)
{
/* Don't try to use a wait obj in a child process */
if (g_getpid() == g_pid)
{
g_set_wait_obj(g_term_event);
}
}
/*****************************************************************************/
/* No-op signal handler.
*/
static void
sig_no_op(int sig)
{
/* no-op */
}
/******************************************************************************/
/**
* Informs the main loop a child exiting signal has been received
*/
static void
set_sigchld_event(int sig)
{
/* Don't try to use a wait obj in a child process */
if (g_getpid() == g_pid)
{
g_set_wait_obj(g_sigchld_event);
}
}
/******************************************************************************/
int
sesexec_is_term(void)
{
return g_terminate_loop || g_is_wait_obj_set(g_term_event);
}
/******************************************************************************/
void
sesexec_terminate_main_loop(int status)
{
g_terminate_loop = 1;
g_terminate_status = status;
}
/******************************************************************************/
static void
process_sigchld_event(void)
{
struct exit_status e;
int pid;
// Check for any finished children
while ((pid = g_waitchild(&e)) > 0)
{
session_process_child_exit(g_session_data, pid, &e);
}
}
/******************************************************************************/
/**
*
* @brief Starts sesexec main loop
*
*/
static int
sesexec_main_loop(void)
{
int error = 0;
int robjs_count;
intptr_t robjs[32];
g_terminate_loop = 0;
g_terminate_status = 0;
g_login_info = NULL;
while (!g_terminate_loop)
{
robjs_count = 0;
robjs[robjs_count++] = g_term_event;
robjs[robjs_count++] = g_sigchld_event;
error = trans_get_wait_objs(g_ecp_trans, robjs, &robjs_count);
if (error != 0)
{
LOG(LOG_LEVEL_ERROR, "sesexec_main_loop: "
"trans_get_wait_objs(ECP) failed");
sesexec_terminate_main_loop(error);
continue;
}
if (g_obj_wait(robjs, robjs_count, NULL, 0, 0) != 0)
{
/* should not get here */
LOG(LOG_LEVEL_WARNING, "sesexec_main_loop: "
"Unexpected error from g_obj_wait()");
g_sleep(100);
continue;
}
if (g_is_wait_obj_set(g_term_event)) /* term */
{
g_reset_wait_obj(g_term_event);
if (session_active(g_session_data))
{
// Ask the active session to terminate
LOG(LOG_LEVEL_INFO, "sesexec_main_loop: "
"sesexec asked to terminate. "
"Terminating active session");
session_send_term(g_session_data);
}
else
{
// Terminate immediately
LOG(LOG_LEVEL_INFO, "sesexec_main_loop: "
"sesexec asked to terminate. "
"No session is active");
sesexec_terminate_main_loop(0);
continue;
}
}
if (g_is_wait_obj_set(g_sigchld_event)) /* SIGCHLD */
{
g_reset_wait_obj(g_sigchld_event);
// See whether the session goes from active to inactive
// after processing SIGCHLD
int session_was_active = session_active(g_session_data);
process_sigchld_event();
if (session_was_active && !session_active(g_session_data))
{
// We've finished the session. Tell sesman and
// finish up.
(void)ercp_send_session_finished_event(g_ecp_trans);
session_data_free(g_session_data);
g_session_data = NULL;
sesexec_terminate_main_loop(0);
continue;
}
}
error = trans_check_wait_objs(g_ecp_trans);
if (error != 0)
{
LOG(LOG_LEVEL_ERROR, "sesexec_main_loop: "
"trans_check_wait_objs failed for ECP transport");
sesexec_terminate_main_loop(error);
continue;
}
}
login_info_free(g_login_info);
return g_terminate_status;
}
/******************************************************************************/
static int start_logging(const char *sesman_ini)
{
char text[256];
int rv = 1;
if (!g_file_exist(sesman_ini))
{
g_printf("Config file %s does not exist\n", sesman_ini);
}
else
{
enum logReturns log_error;
log_error = log_start(sesman_ini, "xrdp-sesexec", 0);
if (log_error != LOG_STARTUP_OK)
{
switch (log_error)
{
case LOG_ERROR_MALLOC:
g_writeln("error on malloc. cannot start logging. quitting.");
break;
case LOG_ERROR_FILE_OPEN:
g_writeln("error opening log file [%s]. quitting.",
getLogFile(text, sizeof(text) - 1));
break;
default:
// Assume sufficient messages have already been generated
break;
}
}
else
{
rv = 0;
}
}
return rv;
}
/******************************************************************************/
static int
get_eicp_fd(char errstr[], unsigned int errstr_size)
{
const char *s = g_getenv("EICP_FD");
const char *p;
int fd;
errstr[0] = '\0';
if (s == NULL || s[0] == '\0')
{
g_snprintf(errstr, errstr_size,
"Can't read EICP_FD environment variable");
return -1;
}
for (p = s ; isdigit(*p) ; ++p)
{
;
}
if (*p != '\0')
{
g_snprintf(errstr, errstr_size, "EICP_FD has non-digit char '%c'", *p);
return -1;
}
if ((p - s) > 4)
{
g_snprintf(errstr, errstr_size, "EICP_FD has too many digits");
return -1;
}
fd = g_atoi(s);
if (!g_file_is_open(fd))
{
g_snprintf(errstr, errstr_size, "EICP_FD %d is not open", fd);
return -1;
}
return fd;
}
/******************************************************************************/
int
main(int argc, char **argv)
{
int error = 1;
struct startup_params startup_params = {0};
int errored_argc;
int eicp_fd;
char eicp_errstr[128];
/*
* Check the EICP transport file descriptor is provided and open
* before opening any log files, config files, etc. We then open
* log files, and log errors at that point */
eicp_fd = get_eicp_fd(eicp_errstr, sizeof(eicp_errstr));
g_init("xrdp-sesexec");
//g_sleep(15 * 1000);
errored_argc = process_params(argc, argv, &startup_params);
if (errored_argc > 0)
{
g_writeln("Unknown option: %s", argv[errored_argc]);
}
/* starting logging subsystem
*
* For historic reasons, we share a log file with sesman */
else if (start_logging(startup_params.sesman_ini) == 0)
{
/* reading config
*
* For historic reasons, we share a config with sesman */
if ((g_cfg = config_read(startup_params.sesman_ini)) == NULL)
{
LOG(LOG_LEVEL_ALWAYS, "error reading config %s: %s",
startup_params.sesman_ini, g_get_strerror());
}
else if (eicp_fd < 0)
{
LOG(LOG_LEVEL_ERROR, "%s", eicp_errstr);
}
else
{
char text[128];
g_pid = g_getpid();
/* signal handling */
g_snprintf(text, sizeof(text), "xrdp_sesexec_%8.8x_main_term",
g_pid);
g_term_event = g_create_wait_obj(text);
g_snprintf(text, sizeof(text), "xrdp_sesexec_%8.8x_sigchld",
g_pid);
g_sigchld_event = g_create_wait_obj(text);
// No need to terminate on SIGINT for sesexec. This can
// also make it hard to debug sessions.
//g_signal_user_interrupt(set_term_event);
g_signal_terminate(set_term_event); /* SIGTERM */
g_signal_pipe(sig_no_op); /* SIGPIPE */
g_signal_child_stop(set_sigchld_event);
/* Set up an EICP process handler
* Errors are logged by this call if necessary */
g_ecp_trans = eicp_init_trans_from_fd(eicp_fd,
TRANS_TYPE_SERVER,
sesexec_is_term);
if (g_ecp_trans != NULL)
{
g_ecp_trans->trans_data_in = sesexec_eicp_data_in;
g_ecp_trans->callback_data = NULL;
/* start program main loop */
LOG(LOG_LEVEL_INFO, "starting xrdp-sesexec with pid %d", g_pid);
error = sesexec_main_loop();
trans_delete(g_ecp_trans);
}
g_delete_wait_obj(g_term_event);
}
config_free(g_cfg);
log_end();
}
g_deinit();
return error;
}