2006-11-26 11:13:41 -07:00
|
|
|
/***********************************************************
|
|
|
|
|
|
|
|
Copyright 1987, 1989, 1998 The Open Group
|
|
|
|
|
|
|
|
Permission to use, copy, modify, distribute, and sell this software and its
|
|
|
|
documentation for any purpose is hereby granted without fee, provided that
|
|
|
|
the above copyright notice appear in all copies and that both that
|
|
|
|
copyright notice and this permission notice appear in supporting
|
|
|
|
documentation.
|
|
|
|
|
|
|
|
The above copyright notice and this permission notice shall be included in
|
|
|
|
all copies or substantial portions of the Software.
|
|
|
|
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN
|
|
|
|
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
|
|
|
|
Except as contained in this notice, the name of The Open Group shall not be
|
|
|
|
used in advertising or otherwise to promote the sale, use or other dealings
|
|
|
|
in this Software without prior written authorization from The Open Group.
|
|
|
|
|
|
|
|
Copyright 1987, 1989 by Digital Equipment Corporation, Maynard, Massachusetts.
|
|
|
|
|
|
|
|
All Rights Reserved
|
|
|
|
|
2015-09-16 13:10:19 -06:00
|
|
|
Permission to use, copy, modify, and distribute this software and its
|
|
|
|
documentation for any purpose and without fee is hereby granted,
|
2006-11-26 11:13:41 -07:00
|
|
|
provided that the above copyright notice appear in all copies and that
|
2015-09-16 13:10:19 -06:00
|
|
|
both that copyright notice and this permission notice appear in
|
2006-11-26 11:13:41 -07:00
|
|
|
supporting documentation, and that the name of Digital not be
|
|
|
|
used in advertising or publicity pertaining to distribution of the
|
2015-09-16 13:10:19 -06:00
|
|
|
software without specific, written prior permission.
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
DIGITAL DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING
|
|
|
|
ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
|
|
|
|
DIGITAL BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
|
|
|
|
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
|
|
|
|
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
|
|
|
|
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
|
|
|
|
SOFTWARE.
|
|
|
|
|
|
|
|
******************************************************************/
|
|
|
|
/*****************************************************************
|
|
|
|
* Stuff to create connections --- OS dependent
|
|
|
|
*
|
|
|
|
* EstablishNewConnections, CreateWellKnownSockets, ResetWellKnownSockets,
|
2017-12-08 08:01:59 -07:00
|
|
|
* CloseDownConnection,
|
|
|
|
* OnlyListToOneClient,
|
2006-11-26 11:13:41 -07:00
|
|
|
* ListenToAllClients,
|
|
|
|
*
|
|
|
|
* (WaitForSomething is in its own file)
|
|
|
|
*
|
|
|
|
* In this implementation, a client socket table is not kept.
|
|
|
|
* Instead, what would be the index into the table is just the
|
|
|
|
* file descriptor of the socket. This won't work for if the
|
|
|
|
* socket ids aren't small nums (0 - 2^8)
|
|
|
|
*
|
|
|
|
*****************************************************************/
|
|
|
|
|
|
|
|
#ifdef HAVE_DIX_CONFIG_H
|
|
|
|
#include <dix-config.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef WIN32
|
|
|
|
#include <X11/Xwinsock.h>
|
|
|
|
#endif
|
|
|
|
#include <X11/X.h>
|
|
|
|
#include <X11/Xproto.h>
|
|
|
|
#define XSERV_t
|
|
|
|
#define TRANS_SERVER
|
|
|
|
#define TRANS_REOPEN
|
|
|
|
#include <X11/Xtrans/Xtrans.h>
|
2008-11-02 08:26:08 -07:00
|
|
|
#include <X11/Xtrans/Xtransint.h>
|
2006-11-26 11:13:41 -07:00
|
|
|
#include <errno.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
|
|
|
#ifndef WIN32
|
|
|
|
#include <sys/socket.h>
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
#if defined(TCPCONN)
|
2012-06-10 07:21:05 -06:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#ifdef apollo
|
|
|
|
#ifndef NO_TCP_H
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#endif
|
|
|
|
#else
|
|
|
|
#ifdef CSRG_BASED
|
|
|
|
#include <sys/param.h>
|
|
|
|
#endif
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
#endif
|
|
|
|
#include <arpa/inet.h>
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <sys/uio.h>
|
2009-09-06 13:44:18 -06:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif /* WIN32 */
|
|
|
|
#include "misc.h" /* for typedef of pointer */
|
2006-11-26 11:13:41 -07:00
|
|
|
#include "osdep.h"
|
|
|
|
#include "opaque.h"
|
|
|
|
#include "dixstruct.h"
|
|
|
|
#include "xace.h"
|
|
|
|
|
|
|
|
#define Pid_t pid_t
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
#ifdef HAVE_GETPEERUCRED
|
|
|
|
#include <ucred.h>
|
|
|
|
#include <zone.h>
|
2015-11-07 09:48:51 -07:00
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
#define zoneid_t int
|
|
|
|
#endif
|
2015-11-07 09:48:51 -07:00
|
|
|
|
|
|
|
#include "probes.h"
|
2007-11-24 12:04:00 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
struct ospoll *server_poll;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
int MaxClients = 0;
|
2012-06-10 07:21:05 -06:00
|
|
|
Bool NewOutputPending; /* not yet attempted to write some new output */
|
2014-09-27 11:52:59 -06:00
|
|
|
Bool NoListenAll; /* Don't establish any listening sockets */
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
static Bool RunFromSmartParent; /* send SIGUSR1 to parent process */
|
|
|
|
Bool RunFromSigStopParent; /* send SIGSTOP to our own process; Upstart (or
|
|
|
|
equivalent) will send SIGCONT back. */
|
2013-06-07 11:28:45 -06:00
|
|
|
static char dynamic_display[7]; /* display name */
|
2012-06-10 07:21:05 -06:00
|
|
|
Bool PartialNetwork; /* continue even if unable to bind all addrs */
|
2006-11-26 11:13:41 -07:00
|
|
|
static Pid_t ParentProcess;
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
int GrabInProgress = 0;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
static void
|
|
|
|
QueueNewConnections(int curconn, int ready, void *data);
|
|
|
|
|
|
|
|
static void
|
|
|
|
set_poll_client(ClientPtr client);
|
|
|
|
|
|
|
|
static void
|
|
|
|
set_poll_clients(void);
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
static XtransConnInfo *ListenTransConns = NULL;
|
|
|
|
static int *ListenTransFds = NULL;
|
|
|
|
static int ListenTransCount;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
static void ErrorConnMax(XtransConnInfo /* trans_conn */ );
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
static XtransConnInfo
|
2012-06-10 07:21:05 -06:00
|
|
|
lookup_trans_conn(int fd)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
if (ListenTransFds) {
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < ListenTransCount; i++)
|
|
|
|
if (ListenTransFds[i] == fd)
|
|
|
|
return ListenTransConns[i];
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2019-07-27 01:57:06 -06:00
|
|
|
/* Set MaxClients */
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
void
|
|
|
|
InitConnectionLimits(void)
|
|
|
|
{
|
2017-12-08 08:01:59 -07:00
|
|
|
MaxClients = MAXCLIENTS;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
ErrorF("InitConnectionLimits: MaxClients = %d\n", MaxClients);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
/*
|
|
|
|
* If SIGUSR1 was set to SIG_IGN when the server started, assume that either
|
|
|
|
*
|
|
|
|
* a- The parent process is ignoring SIGUSR1
|
|
|
|
*
|
|
|
|
* or
|
|
|
|
*
|
|
|
|
* b- The parent process is expecting a SIGUSR1
|
|
|
|
* when the server is ready to accept connections
|
|
|
|
*
|
|
|
|
* In the first case, the signal will be harmless, in the second case,
|
|
|
|
* the signal will be quite useful.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
InitParentProcess(void)
|
|
|
|
{
|
|
|
|
#if !defined(WIN32)
|
|
|
|
OsSigHandlerPtr handler;
|
2012-06-10 07:21:05 -06:00
|
|
|
|
|
|
|
handler = OsSignal(SIGUSR1, SIG_IGN);
|
|
|
|
if (handler == SIG_IGN)
|
|
|
|
RunFromSmartParent = TRUE;
|
2008-11-02 08:26:08 -07:00
|
|
|
OsSignal(SIGUSR1, handler);
|
2012-06-10 07:21:05 -06:00
|
|
|
ParentProcess = getppid();
|
2012-08-07 14:15:23 -06:00
|
|
|
#ifdef X_PRIVSEP
|
|
|
|
priv_init_parent_process(ParentProcess);
|
|
|
|
#endif
|
2008-11-02 08:26:08 -07:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
NotifyParentProcess(void)
|
|
|
|
{
|
|
|
|
#if !defined(WIN32)
|
2014-09-27 11:52:59 -06:00
|
|
|
if (displayfd >= 0) {
|
|
|
|
if (write(displayfd, display, strlen(display)) != strlen(display))
|
|
|
|
FatalError("Cannot write display number to fd %d\n", displayfd);
|
|
|
|
if (write(displayfd, "\n", 1) != 1)
|
|
|
|
FatalError("Cannot write display number to fd %d\n", displayfd);
|
2013-06-07 11:28:45 -06:00
|
|
|
close(displayfd);
|
2014-09-27 11:52:59 -06:00
|
|
|
displayfd = -1;
|
2013-06-07 11:28:45 -06:00
|
|
|
}
|
2008-11-02 08:26:08 -07:00
|
|
|
if (RunFromSmartParent) {
|
2013-06-07 11:28:45 -06:00
|
|
|
if (ParentProcess > 1) {
|
2008-11-02 08:26:08 -07:00
|
|
|
#ifdef X_PRIVSEP
|
2012-06-10 07:21:05 -06:00
|
|
|
priv_signal_parent();
|
2008-11-02 08:26:08 -07:00
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
kill (ParentProcess, SIGUSR1);
|
2008-11-02 08:26:08 -07:00
|
|
|
#endif
|
2013-06-07 11:28:45 -06:00
|
|
|
}
|
2008-11-02 08:26:08 -07:00
|
|
|
}
|
2011-11-05 07:32:40 -06:00
|
|
|
if (RunFromSigStopParent)
|
2012-06-10 07:21:05 -06:00
|
|
|
raise(SIGSTOP);
|
2008-11-02 08:26:08 -07:00
|
|
|
#endif
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2013-06-07 11:28:45 -06:00
|
|
|
static Bool
|
|
|
|
TryCreateSocket(int num, int *partial)
|
|
|
|
{
|
|
|
|
char port[20];
|
|
|
|
|
|
|
|
snprintf(port, sizeof(port), "%d", num);
|
|
|
|
|
|
|
|
return (_XSERVTransMakeAllCOTSServerListeners(port, partial,
|
|
|
|
&ListenTransCount,
|
|
|
|
&ListenTransConns) >= 0);
|
|
|
|
}
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
/*****************
|
|
|
|
* CreateWellKnownSockets
|
|
|
|
* At initialization, create the sockets to listen on for new clients.
|
|
|
|
*****************/
|
|
|
|
|
|
|
|
void
|
|
|
|
CreateWellKnownSockets(void)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
int i;
|
|
|
|
int partial;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2013-06-07 11:28:45 -06:00
|
|
|
/* display is initialized to "0" by main(). It is then set to the display
|
2014-09-27 11:52:59 -06:00
|
|
|
* number if specified on the command line. */
|
|
|
|
|
|
|
|
if (NoListenAll) {
|
|
|
|
ListenTransCount = 0;
|
|
|
|
}
|
|
|
|
else if ((displayfd < 0) || explicit_display) {
|
2013-06-07 11:28:45 -06:00
|
|
|
if (TryCreateSocket(atoi(display), &partial) &&
|
|
|
|
ListenTransCount >= 1)
|
|
|
|
if (!PartialNetwork && partial)
|
|
|
|
FatalError ("Failed to establish all listening sockets");
|
|
|
|
}
|
2014-09-27 11:52:59 -06:00
|
|
|
else { /* -displayfd and no explicit display number */
|
2013-06-07 11:28:45 -06:00
|
|
|
Bool found = 0;
|
2015-09-16 13:10:19 -06:00
|
|
|
for (i = 0; i < 65536 - X_TCP_PORT; i++) {
|
2013-06-07 11:28:45 -06:00
|
|
|
if (TryCreateSocket(i, &partial) && !partial) {
|
|
|
|
found = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
CloseWellKnownConnections();
|
2012-06-10 07:21:05 -06:00
|
|
|
}
|
2013-06-07 11:28:45 -06:00
|
|
|
if (!found)
|
|
|
|
FatalError("Failed to find a socket to listen on");
|
|
|
|
snprintf(dynamic_display, sizeof(dynamic_display), "%d", i);
|
|
|
|
display = dynamic_display;
|
2016-05-29 06:02:34 -06:00
|
|
|
LogSetDisplay();
|
2013-06-07 11:28:45 -06:00
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2016-05-29 06:02:34 -06:00
|
|
|
ListenTransFds = xallocarray(ListenTransCount, sizeof (int));
|
|
|
|
if (ListenTransFds == NULL)
|
|
|
|
FatalError ("Failed to create listening socket array");
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2013-06-07 11:28:45 -06:00
|
|
|
for (i = 0; i < ListenTransCount; i++) {
|
|
|
|
int fd = _XSERVTransGetConnectionNumber(ListenTransConns[i]);
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2013-06-07 11:28:45 -06:00
|
|
|
ListenTransFds[i] = fd;
|
2017-12-08 08:01:59 -07:00
|
|
|
SetNotifyFd(fd, QueueNewConnections, X_NOTIFY_READ, NULL);
|
2013-06-07 11:28:45 -06:00
|
|
|
|
|
|
|
if (!_XSERVTransIsLocal(ListenTransConns[i]))
|
|
|
|
DefineSelf (fd);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
if (ListenTransCount == 0 && !NoListenAll)
|
2012-06-10 07:21:05 -06:00
|
|
|
FatalError
|
|
|
|
("Cannot establish any listening sockets - Make sure an X server isn't already running");
|
2014-09-27 11:52:59 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#if !defined(WIN32)
|
2012-06-10 07:21:05 -06:00
|
|
|
OsSignal(SIGPIPE, SIG_IGN);
|
|
|
|
OsSignal(SIGHUP, AutoResetServer);
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
OsSignal(SIGINT, GiveUp);
|
|
|
|
OsSignal(SIGTERM, GiveUp);
|
2006-11-26 11:13:41 -07:00
|
|
|
ResetHosts(display);
|
2008-11-02 08:26:08 -07:00
|
|
|
|
|
|
|
InitParentProcess();
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XDMCP
|
2012-06-10 07:21:05 -06:00
|
|
|
XdmcpInit();
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
ResetWellKnownSockets(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
ResetOsBuffers();
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
for (i = 0; i < ListenTransCount; i++) {
|
|
|
|
int status = _XSERVTransResetListener(ListenTransConns[i]);
|
|
|
|
|
|
|
|
if (status != TRANS_RESET_NOOP) {
|
|
|
|
if (status == TRANS_RESET_FAILURE) {
|
|
|
|
/*
|
|
|
|
* ListenTransConns[i] freed by xtrans.
|
|
|
|
* Remove it from out list.
|
|
|
|
*/
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
RemoveNotifyFd(ListenTransFds[i]);
|
2012-06-10 07:21:05 -06:00
|
|
|
ListenTransFds[i] = ListenTransFds[ListenTransCount - 1];
|
|
|
|
ListenTransConns[i] = ListenTransConns[ListenTransCount - 1];
|
|
|
|
ListenTransCount -= 1;
|
|
|
|
i -= 1;
|
|
|
|
}
|
|
|
|
else if (status == TRANS_RESET_NEW_FD) {
|
|
|
|
/*
|
|
|
|
* A new file descriptor was allocated (the old one was closed)
|
|
|
|
*/
|
|
|
|
|
|
|
|
int newfd = _XSERVTransGetConnectionNumber(ListenTransConns[i]);
|
|
|
|
|
|
|
|
ListenTransFds[i] = newfd;
|
|
|
|
}
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2017-12-08 08:01:59 -07:00
|
|
|
for (i = 0; i < ListenTransCount; i++)
|
|
|
|
SetNotifyFd(ListenTransFds[i], QueueNewConnections, X_NOTIFY_READ, NULL);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
ResetAuthorization();
|
2006-11-26 11:13:41 -07:00
|
|
|
ResetHosts(display);
|
|
|
|
/*
|
|
|
|
* restart XDMCP
|
|
|
|
*/
|
|
|
|
#ifdef XDMCP
|
2012-06-10 07:21:05 -06:00
|
|
|
XdmcpReset();
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
CloseWellKnownConnections(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2015-09-16 13:10:19 -06:00
|
|
|
for (i = 0; i < ListenTransCount; i++) {
|
|
|
|
if (ListenTransConns[i] != NULL) {
|
|
|
|
_XSERVTransClose(ListenTransConns[i]);
|
|
|
|
ListenTransConns[i] = NULL;
|
2017-12-08 08:01:59 -07:00
|
|
|
if (ListenTransFds != NULL)
|
|
|
|
RemoveNotifyFd(ListenTransFds[i]);
|
2015-09-16 13:10:19 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
ListenTransCount = 0;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2012-06-10 07:21:05 -06:00
|
|
|
AuthAudit(ClientPtr client, Bool letin,
|
|
|
|
struct sockaddr *saddr, int len,
|
|
|
|
unsigned int proto_n, char *auth_proto, int auth_id)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
char addr[128];
|
|
|
|
char client_uid_string[64];
|
2008-11-02 08:26:08 -07:00
|
|
|
LocalClientCredRec *lcc;
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
#ifdef XSERVER_DTRACE
|
2006-11-26 11:13:41 -07:00
|
|
|
pid_t client_pid = -1;
|
|
|
|
zoneid_t client_zid = -1;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (!len)
|
2012-06-10 07:21:05 -06:00
|
|
|
strlcpy(addr, "local host", sizeof(addr));
|
2006-11-26 11:13:41 -07:00
|
|
|
else
|
2012-06-10 07:21:05 -06:00
|
|
|
switch (saddr->sa_family) {
|
|
|
|
case AF_UNSPEC:
|
2007-11-24 12:04:00 -07:00
|
|
|
#if defined(UNIXCONN) || defined(LOCALCONN)
|
2012-06-10 07:21:05 -06:00
|
|
|
case AF_UNIX:
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
strlcpy(addr, "local host", sizeof(addr));
|
|
|
|
break;
|
2017-12-08 08:01:59 -07:00
|
|
|
#if defined(TCPCONN)
|
2012-06-10 07:21:05 -06:00
|
|
|
case AF_INET:
|
|
|
|
snprintf(addr, sizeof(addr), "IP %s",
|
|
|
|
inet_ntoa(((struct sockaddr_in *) saddr)->sin_addr));
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
#if defined(IPv6) && defined(AF_INET6)
|
2012-06-10 07:21:05 -06:00
|
|
|
case AF_INET6:{
|
|
|
|
char ipaddr[INET6_ADDRSTRLEN];
|
|
|
|
|
|
|
|
inet_ntop(AF_INET6, &((struct sockaddr_in6 *) saddr)->sin6_addr,
|
|
|
|
ipaddr, sizeof(ipaddr));
|
|
|
|
snprintf(addr, sizeof(addr), "IP %s", ipaddr);
|
|
|
|
}
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
default:
|
|
|
|
strlcpy(addr, "unknown address", sizeof(addr));
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
if (GetLocalClientCreds(client, &lcc) != -1) {
|
2012-06-10 07:21:05 -06:00
|
|
|
int slen; /* length written to client_uid_string */
|
|
|
|
|
|
|
|
strcpy(client_uid_string, " ( ");
|
|
|
|
slen = 3;
|
|
|
|
|
|
|
|
if (lcc->fieldsSet & LCC_UID_SET) {
|
|
|
|
snprintf(client_uid_string + slen,
|
|
|
|
sizeof(client_uid_string) - slen,
|
|
|
|
"uid=%ld ", (long) lcc->euid);
|
|
|
|
slen = strlen(client_uid_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (lcc->fieldsSet & LCC_GID_SET) {
|
|
|
|
snprintf(client_uid_string + slen,
|
|
|
|
sizeof(client_uid_string) - slen,
|
|
|
|
"gid=%ld ", (long) lcc->egid);
|
|
|
|
slen = strlen(client_uid_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (lcc->fieldsSet & LCC_PID_SET) {
|
|
|
|
#ifdef XSERVER_DTRACE
|
|
|
|
client_pid = lcc->pid;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
snprintf(client_uid_string + slen,
|
|
|
|
sizeof(client_uid_string) - slen,
|
|
|
|
"pid=%ld ", (long) lcc->pid);
|
|
|
|
slen = strlen(client_uid_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (lcc->fieldsSet & LCC_ZID_SET) {
|
2008-11-02 08:26:08 -07:00
|
|
|
#ifdef XSERVER_DTRACE
|
2012-06-10 07:21:05 -06:00
|
|
|
client_zid = lcc->zoneid;
|
|
|
|
#endif
|
|
|
|
snprintf(client_uid_string + slen,
|
|
|
|
sizeof(client_uid_string) - slen,
|
|
|
|
"zoneid=%ld ", (long) lcc->zoneid);
|
|
|
|
slen = strlen(client_uid_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
snprintf(client_uid_string + slen, sizeof(client_uid_string) - slen,
|
|
|
|
")");
|
|
|
|
FreeLocalClientCreds(lcc);
|
2008-11-02 08:26:08 -07:00
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
else {
|
2012-06-10 07:21:05 -06:00
|
|
|
client_uid_string[0] = '\0';
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2007-11-24 12:04:00 -07:00
|
|
|
#ifdef XSERVER_DTRACE
|
|
|
|
XSERVER_CLIENT_AUTH(client->index, addr, client_pid, client_zid);
|
|
|
|
#endif
|
2009-09-06 13:44:18 -06:00
|
|
|
if (auditTrailLevel > 1) {
|
2012-06-10 07:21:05 -06:00
|
|
|
if (proto_n)
|
|
|
|
AuditF("client %d %s from %s%s\n Auth name: %.*s ID: %d\n",
|
|
|
|
client->index, letin ? "connected" : "rejected", addr,
|
|
|
|
client_uid_string, (int) proto_n, auth_proto, auth_id);
|
|
|
|
else
|
|
|
|
AuditF("client %d %s from %s%s\n",
|
|
|
|
client->index, letin ? "connected" : "rejected", addr,
|
|
|
|
client_uid_string);
|
2007-11-24 12:04:00 -07:00
|
|
|
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
XID
|
|
|
|
AuthorizationIDOfClient(ClientPtr client)
|
|
|
|
{
|
|
|
|
if (client->osPrivate)
|
2012-06-10 07:21:05 -06:00
|
|
|
return ((OsCommPtr) client->osPrivate)->auth_id;
|
2006-11-26 11:13:41 -07:00
|
|
|
else
|
2012-06-10 07:21:05 -06:00
|
|
|
return None;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
* ClientAuthorized
|
|
|
|
*
|
|
|
|
* Sent by the client at connection setup:
|
|
|
|
* typedef struct _xConnClientPrefix {
|
|
|
|
* CARD8 byteOrder;
|
|
|
|
* BYTE pad;
|
|
|
|
* CARD16 majorVersion, minorVersion;
|
2015-09-16 13:10:19 -06:00
|
|
|
* CARD16 nbytesAuthProto;
|
|
|
|
* CARD16 nbytesAuthString;
|
2006-11-26 11:13:41 -07:00
|
|
|
* } xConnClientPrefix;
|
|
|
|
*
|
|
|
|
* It is hoped that eventually one protocol will be agreed upon. In the
|
|
|
|
* mean time, a server that implements a different protocol than the
|
|
|
|
* client expects, or a server that only implements the host-based
|
|
|
|
* mechanism, will simply ignore this information.
|
|
|
|
*
|
|
|
|
*****************************************************************/
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
const char *
|
|
|
|
ClientAuthorized(ClientPtr client,
|
|
|
|
unsigned int proto_n, char *auth_proto,
|
|
|
|
unsigned int string_n, char *auth_string)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
OsCommPtr priv;
|
|
|
|
Xtransaddr *from = NULL;
|
|
|
|
int family;
|
|
|
|
int fromlen;
|
|
|
|
XID auth_id;
|
|
|
|
const char *reason = NULL;
|
|
|
|
XtransConnInfo trans_conn;
|
|
|
|
|
|
|
|
priv = (OsCommPtr) client->osPrivate;
|
2006-11-26 11:13:41 -07:00
|
|
|
trans_conn = priv->trans_conn;
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
/* Allow any client to connect without authorization on a launchd socket,
|
|
|
|
because it is securely created -- this prevents a race condition on launch */
|
2012-06-10 07:21:05 -06:00
|
|
|
if (trans_conn->flags & TRANS_NOXAUTH) {
|
2009-09-06 13:44:18 -06:00
|
|
|
auth_id = (XID) 0L;
|
2012-06-10 07:21:05 -06:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
auth_id =
|
|
|
|
CheckAuthorization(proto_n, auth_proto, string_n, auth_string,
|
|
|
|
client, &reason);
|
2009-09-06 13:44:18 -06:00
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (auth_id == (XID) ~0L) {
|
|
|
|
if (_XSERVTransGetPeerAddr(trans_conn, &family, &fromlen, &from) != -1) {
|
|
|
|
if (InvalidHost((struct sockaddr *) from, fromlen, client))
|
|
|
|
AuthAudit(client, FALSE, (struct sockaddr *) from,
|
|
|
|
fromlen, proto_n, auth_proto, auth_id);
|
|
|
|
else {
|
|
|
|
auth_id = (XID) 0;
|
2007-11-24 12:04:00 -07:00
|
|
|
#ifdef XSERVER_DTRACE
|
2012-06-10 07:21:05 -06:00
|
|
|
if ((auditTrailLevel > 1) || XSERVER_CLIENT_AUTH_ENABLED())
|
2007-11-24 12:04:00 -07:00
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
if (auditTrailLevel > 1)
|
2007-11-24 12:04:00 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
AuthAudit(client, TRUE,
|
|
|
|
(struct sockaddr *) from, fromlen,
|
|
|
|
proto_n, auth_proto, auth_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(from);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (auth_id == (XID) ~0L) {
|
|
|
|
if (reason)
|
|
|
|
return reason;
|
|
|
|
else
|
|
|
|
return "Client is not authorized to connect to Server";
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2007-11-24 12:04:00 -07:00
|
|
|
#ifdef XSERVER_DTRACE
|
|
|
|
else if ((auditTrailLevel > 1) || XSERVER_CLIENT_AUTH_ENABLED())
|
|
|
|
#else
|
2006-11-26 11:13:41 -07:00
|
|
|
else if (auditTrailLevel > 1)
|
2007-11-24 12:04:00 -07:00
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
if (_XSERVTransGetPeerAddr(trans_conn, &family, &fromlen, &from) != -1) {
|
|
|
|
AuthAudit(client, TRUE, (struct sockaddr *) from, fromlen,
|
|
|
|
proto_n, auth_proto, auth_id);
|
|
|
|
|
|
|
|
free(from);
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
priv->auth_id = auth_id;
|
|
|
|
priv->conn_time = 0;
|
|
|
|
|
|
|
|
#ifdef XDMCP
|
|
|
|
/* indicate to Xdmcp protocol that we've opened new client */
|
|
|
|
XdmcpOpenDisplay(priv->fd);
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif /* XDMCP */
|
2007-11-24 12:04:00 -07:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
XaceHook(XACE_AUTH_AVAIL, client, auth_id);
|
2007-11-24 12:04:00 -07:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
/* At this point, if the client is authorized to change the access control
|
|
|
|
* list, we should getpeername() information, and add the client to
|
|
|
|
* the selfhosts list. It's not really the host machine, but the
|
|
|
|
* true purpose of the selfhosts list is to see who may change the
|
|
|
|
* access control list.
|
|
|
|
*/
|
2012-06-10 07:21:05 -06:00
|
|
|
return ((char *) NULL);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
static void
|
|
|
|
ClientReady(int fd, int xevents, void *data)
|
|
|
|
{
|
|
|
|
ClientPtr client = data;
|
|
|
|
|
|
|
|
if (xevents & X_NOTIFY_ERROR) {
|
|
|
|
CloseDownClient(client);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (xevents & X_NOTIFY_READ)
|
|
|
|
mark_client_ready(client);
|
|
|
|
if (xevents & X_NOTIFY_WRITE) {
|
|
|
|
ospoll_mute(server_poll, fd, X_NOTIFY_WRITE);
|
|
|
|
NewOutputPending = TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
static ClientPtr
|
2012-06-10 07:21:05 -06:00
|
|
|
AllocNewConnection(XtransConnInfo trans_conn, int fd, CARD32 conn_time)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
OsCommPtr oc;
|
|
|
|
ClientPtr client;
|
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
oc = malloc(sizeof(OsCommRec));
|
2006-11-26 11:13:41 -07:00
|
|
|
if (!oc)
|
2012-06-10 07:21:05 -06:00
|
|
|
return NullClient;
|
2006-11-26 11:13:41 -07:00
|
|
|
oc->trans_conn = trans_conn;
|
|
|
|
oc->fd = fd;
|
2012-06-10 07:21:05 -06:00
|
|
|
oc->input = (ConnectionInputPtr) NULL;
|
|
|
|
oc->output = (ConnectionOutputPtr) NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
oc->auth_id = None;
|
|
|
|
oc->conn_time = conn_time;
|
2017-12-08 08:01:59 -07:00
|
|
|
oc->flags = 0;
|
2014-09-27 11:52:59 -06:00
|
|
|
if (!(client = NextAvailableClient((void *) oc))) {
|
2012-06-10 07:21:05 -06:00
|
|
|
free(oc);
|
|
|
|
return NullClient;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2013-06-07 11:28:45 -06:00
|
|
|
client->local = ComputeLocalClient(client);
|
2017-12-08 08:01:59 -07:00
|
|
|
ospoll_add(server_poll, fd,
|
|
|
|
ospoll_trigger_edge,
|
|
|
|
ClientReady,
|
|
|
|
client);
|
|
|
|
set_poll_client(client);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
ErrorF("AllocNewConnection: client index = %d, socket fd = %d\n",
|
2012-06-10 07:21:05 -06:00
|
|
|
client->index, fd);
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2007-11-24 12:04:00 -07:00
|
|
|
#ifdef XSERVER_DTRACE
|
|
|
|
XSERVER_CLIENT_CONNECT(client->index, fd);
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
return client;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*****************
|
|
|
|
* EstablishNewConnections
|
|
|
|
* If anyone is waiting on listened sockets, accept them.
|
|
|
|
* Returns a mask with indices of new clients. Updates AllClients
|
|
|
|
* and AllSockets.
|
|
|
|
*****************/
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
static Bool
|
2014-09-27 11:52:59 -06:00
|
|
|
EstablishNewConnections(ClientPtr clientUnused, void *closure)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2017-12-08 08:01:59 -07:00
|
|
|
int curconn = (int) (intptr_t) closure;
|
|
|
|
int newconn; /* fd of new client */
|
2006-11-26 11:13:41 -07:00
|
|
|
CARD32 connect_time;
|
2017-12-08 08:01:59 -07:00
|
|
|
int i;
|
|
|
|
ClientPtr client;
|
|
|
|
OsCommPtr oc;
|
|
|
|
XtransConnInfo trans_conn, new_trans_conn;
|
|
|
|
int status;
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
connect_time = GetTimeInMillis();
|
|
|
|
/* kill off stragglers */
|
2012-06-10 07:21:05 -06:00
|
|
|
for (i = 1; i < currentMaxClients; i++) {
|
|
|
|
if ((client = clients[i])) {
|
|
|
|
oc = (OsCommPtr) (client->osPrivate);
|
|
|
|
if ((oc && (oc->conn_time != 0) &&
|
|
|
|
(connect_time - oc->conn_time) >= TimeOutValue) ||
|
|
|
|
(client->noClientException != Success && !client->clientGone))
|
|
|
|
CloseDownClient(client);
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
if ((trans_conn = lookup_trans_conn(curconn)) == NULL)
|
|
|
|
return TRUE;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
if ((new_trans_conn = _XSERVTransAccept(trans_conn, &status)) == NULL)
|
|
|
|
return TRUE;
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
newconn = _XSERVTransGetConnectionNumber(new_trans_conn);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
_XSERVTransSetOption(new_trans_conn, TRANS_NONBLOCKING, 1);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
if (trans_conn->flags & TRANS_NOXAUTH)
|
|
|
|
new_trans_conn->flags = new_trans_conn->flags | TRANS_NOXAUTH;
|
2011-11-05 07:32:40 -06:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
if (!AllocNewConnection(new_trans_conn, newconn, connect_time)) {
|
|
|
|
ErrorConnMax(new_trans_conn);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2017-12-08 08:01:59 -07:00
|
|
|
return TRUE;
|
2012-06-10 07:21:05 -06:00
|
|
|
}
|
2017-12-08 08:01:59 -07:00
|
|
|
|
|
|
|
static void
|
|
|
|
QueueNewConnections(int fd, int ready, void *data)
|
|
|
|
{
|
|
|
|
QueueWorkProc(EstablishNewConnections, NULL, (void *) (intptr_t) fd);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
#define NOROOM "Maximum number of clients reached"
|
|
|
|
|
|
|
|
/************
|
|
|
|
* ErrorConnMax
|
|
|
|
* Fail a connection due to lack of client or file descriptor space
|
|
|
|
************/
|
|
|
|
|
|
|
|
static void
|
2017-12-08 08:01:59 -07:00
|
|
|
ConnMaxNotify(int fd, int events, void *data)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2017-12-08 08:01:59 -07:00
|
|
|
XtransConnInfo trans_conn = data;
|
2013-06-07 11:28:45 -06:00
|
|
|
char order = 0;
|
2017-12-08 08:01:59 -07:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
/* try to read the byte-order of the connection */
|
2013-06-07 11:28:45 -06:00
|
|
|
(void) _XSERVTransRead(trans_conn, &order, 1);
|
|
|
|
if (order == 'l' || order == 'B' || order == 'r' || order == 'R') {
|
2017-12-08 08:01:59 -07:00
|
|
|
xConnSetupPrefix csp;
|
|
|
|
char pad[3] = { 0, 0, 0 };
|
|
|
|
int whichbyte = 1;
|
|
|
|
struct iovec iov[3];
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
csp.success = xFalse;
|
|
|
|
csp.lengthReason = sizeof(NOROOM) - 1;
|
|
|
|
csp.length = (sizeof(NOROOM) + 2) >> 2;
|
|
|
|
csp.majorVersion = X_PROTOCOL;
|
|
|
|
csp.minorVersion = X_PROTOCOL_REVISION;
|
2017-12-08 08:01:59 -07:00
|
|
|
if (((*(char *) &whichbyte) && (order == 'B' || order == 'R')) ||
|
|
|
|
(!(*(char *) &whichbyte) && (order == 'l' || order == 'r'))) {
|
2012-06-10 07:21:05 -06:00
|
|
|
swaps(&csp.majorVersion);
|
|
|
|
swaps(&csp.minorVersion);
|
|
|
|
swaps(&csp.length);
|
|
|
|
}
|
|
|
|
iov[0].iov_len = sz_xConnSetupPrefix;
|
|
|
|
iov[0].iov_base = (char *) &csp;
|
|
|
|
iov[1].iov_len = csp.lengthReason;
|
2014-05-02 13:27:46 -06:00
|
|
|
iov[1].iov_base = (void *) NOROOM;
|
2012-06-10 07:21:05 -06:00
|
|
|
iov[2].iov_len = (4 - (csp.lengthReason & 3)) & 3;
|
|
|
|
iov[2].iov_base = pad;
|
|
|
|
(void) _XSERVTransWritev(trans_conn, iov, 3);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2017-12-08 08:01:59 -07:00
|
|
|
RemoveNotifyFd(trans_conn->fd);
|
|
|
|
_XSERVTransClose(trans_conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ErrorConnMax(XtransConnInfo trans_conn)
|
|
|
|
{
|
|
|
|
if (!SetNotifyFd(trans_conn->fd, ConnMaxNotify, X_NOTIFY_READ, trans_conn))
|
|
|
|
_XSERVTransClose(trans_conn);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/************
|
|
|
|
* CloseDownFileDescriptor:
|
2019-07-27 01:57:06 -06:00
|
|
|
* Remove this file descriptor
|
2006-11-26 11:13:41 -07:00
|
|
|
************/
|
|
|
|
|
2019-07-27 01:57:06 -06:00
|
|
|
void
|
2006-11-26 11:13:41 -07:00
|
|
|
CloseDownFileDescriptor(OsCommPtr oc)
|
|
|
|
{
|
|
|
|
if (oc->trans_conn) {
|
2019-07-27 01:57:06 -06:00
|
|
|
int connection = oc->fd;
|
|
|
|
#ifdef XDMCP
|
|
|
|
XdmcpCloseDisplay(connection);
|
|
|
|
#endif
|
|
|
|
ospoll_remove(server_poll, connection);
|
2012-06-10 07:21:05 -06:00
|
|
|
_XSERVTransDisconnect(oc->trans_conn);
|
|
|
|
_XSERVTransClose(oc->trans_conn);
|
2019-07-27 01:57:06 -06:00
|
|
|
oc->trans_conn = NULL;
|
|
|
|
oc->fd = -1;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*****************
|
|
|
|
* CloseDownConnection
|
2015-09-16 13:10:19 -06:00
|
|
|
* Delete client from AllClients and free resources
|
2006-11-26 11:13:41 -07:00
|
|
|
*****************/
|
|
|
|
|
|
|
|
void
|
|
|
|
CloseDownConnection(ClientPtr client)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
OsCommPtr oc = (OsCommPtr) client->osPrivate;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
if (FlushCallback)
|
2017-12-08 08:01:59 -07:00
|
|
|
CallCallbacks(&FlushCallback, client);
|
2010-12-05 08:36:02 -07:00
|
|
|
|
2013-06-07 11:28:45 -06:00
|
|
|
if (oc->output)
|
|
|
|
FlushClient(client, oc, (char *) NULL, 0);
|
2006-11-26 11:13:41 -07:00
|
|
|
CloseDownFileDescriptor(oc);
|
2007-04-18 16:21:17 -06:00
|
|
|
FreeOsBuffers(oc);
|
2010-12-05 08:36:02 -07:00
|
|
|
free(client->osPrivate);
|
2014-09-27 11:52:59 -06:00
|
|
|
client->osPrivate = (void *) NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
if (auditTrailLevel > 1)
|
2012-06-10 07:21:05 -06:00
|
|
|
AuditF("client %d disconnected\n", client->index);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
struct notify_fd {
|
|
|
|
int mask;
|
|
|
|
NotifyFdProcPtr notify;
|
|
|
|
void *data;
|
|
|
|
};
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
/*****************
|
|
|
|
* HandleNotifyFd
|
|
|
|
* A poll callback to be called when the registered
|
|
|
|
* file descriptor is ready.
|
|
|
|
*****************/
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
static void
|
|
|
|
HandleNotifyFd(int fd, int xevents, void *data)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2017-12-08 08:01:59 -07:00
|
|
|
struct notify_fd *n = data;
|
|
|
|
n->notify(fd, xevents, n->data);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
/*****************
|
|
|
|
* SetNotifyFd
|
|
|
|
* Registers a callback to be invoked when the specified
|
|
|
|
* file descriptor becomes readable.
|
|
|
|
*****************/
|
|
|
|
|
|
|
|
Bool
|
|
|
|
SetNotifyFd(int fd, NotifyFdProcPtr notify, int mask, void *data)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2017-12-08 08:01:59 -07:00
|
|
|
struct notify_fd *n;
|
|
|
|
|
|
|
|
n = ospoll_data(server_poll, fd);
|
|
|
|
if (!n) {
|
|
|
|
if (mask == 0)
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
n = calloc(1, sizeof (struct notify_fd));
|
|
|
|
if (!n)
|
|
|
|
return FALSE;
|
|
|
|
ospoll_add(server_poll, fd,
|
|
|
|
ospoll_trigger_level,
|
|
|
|
HandleNotifyFd,
|
|
|
|
n);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mask == 0) {
|
|
|
|
ospoll_remove(server_poll, fd);
|
|
|
|
free(n);
|
|
|
|
} else {
|
|
|
|
int listen = mask & ~n->mask;
|
|
|
|
int mute = n->mask & ~mask;
|
|
|
|
|
|
|
|
if (listen)
|
|
|
|
ospoll_listen(server_poll, fd, listen);
|
|
|
|
if (mute)
|
|
|
|
ospoll_mute(server_poll, fd, mute);
|
|
|
|
n->mask = mask;
|
|
|
|
n->data = data;
|
|
|
|
n->notify = notify;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*****************
|
|
|
|
* OnlyListenToOneClient:
|
|
|
|
* Only accept requests from one client. Continue to handle new
|
|
|
|
* connections, but don't take any protocol requests from the new
|
|
|
|
* ones. Note that if GrabInProgress is set, EstablishNewConnections
|
|
|
|
* needs to put new clients into SavedAllSockets and SavedAllClients.
|
|
|
|
* Note also that there is no timeout for this in the protocol.
|
|
|
|
* This routine is "undone" by ListenToAllClients()
|
|
|
|
*****************/
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
int
|
2006-11-26 11:13:41 -07:00
|
|
|
OnlyListenToOneClient(ClientPtr client)
|
|
|
|
{
|
2017-12-08 08:01:59 -07:00
|
|
|
int rc;
|
2008-11-02 08:26:08 -07:00
|
|
|
|
|
|
|
rc = XaceHook(XACE_SERVER_ACCESS, client, DixGrabAccess);
|
|
|
|
if (rc != Success)
|
2012-06-10 07:21:05 -06:00
|
|
|
return rc;
|
|
|
|
|
|
|
|
if (!GrabInProgress) {
|
|
|
|
GrabInProgress = client->index;
|
2017-12-08 08:01:59 -07:00
|
|
|
set_poll_clients();
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2017-12-08 08:01:59 -07:00
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
return rc;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* ListenToAllClients:
|
|
|
|
* Undoes OnlyListentToOneClient()
|
|
|
|
****************/
|
|
|
|
|
|
|
|
void
|
|
|
|
ListenToAllClients(void)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
if (GrabInProgress) {
|
|
|
|
GrabInProgress = 0;
|
2017-12-08 08:01:59 -07:00
|
|
|
set_poll_clients();
|
2012-06-10 07:21:05 -06:00
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* IgnoreClient
|
|
|
|
* Removes one client from input masks.
|
|
|
|
* Must have cooresponding call to AttendClient.
|
|
|
|
****************/
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
IgnoreClient(ClientPtr client)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
OsCommPtr oc = (OsCommPtr) client->osPrivate;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
client->ignoreCount++;
|
|
|
|
if (client->ignoreCount > 1)
|
2012-06-10 07:21:05 -06:00
|
|
|
return;
|
2010-12-05 08:36:02 -07:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
isItTimeToYield = TRUE;
|
2017-12-08 08:01:59 -07:00
|
|
|
mark_client_not_ready(client);
|
|
|
|
|
|
|
|
oc->flags |= OS_COMM_IGNORED;
|
|
|
|
set_poll_client(client);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************
|
|
|
|
* AttendClient
|
|
|
|
* Adds one client back into the input masks.
|
|
|
|
****************/
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
AttendClient(ClientPtr client)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
OsCommPtr oc = (OsCommPtr) client->osPrivate;
|
2010-12-05 08:36:02 -07:00
|
|
|
|
|
|
|
client->ignoreCount--;
|
|
|
|
if (client->ignoreCount)
|
2012-06-10 07:21:05 -06:00
|
|
|
return;
|
2010-12-05 08:36:02 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
oc->flags &= ~OS_COMM_IGNORED;
|
|
|
|
set_poll_client(client);
|
|
|
|
if (listen_to_client(client))
|
|
|
|
mark_client_ready(client);
|
2012-06-10 07:21:05 -06:00
|
|
|
else {
|
2017-12-08 08:01:59 -07:00
|
|
|
/* grab active, mark ready when grab goes away */
|
|
|
|
mark_client_saved_ready(client);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make client impervious to grabs; assume only executing client calls this */
|
|
|
|
|
2009-09-06 13:44:18 -06:00
|
|
|
void
|
2006-11-26 11:13:41 -07:00
|
|
|
MakeClientGrabImpervious(ClientPtr client)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
OsCommPtr oc = (OsCommPtr) client->osPrivate;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
oc->flags |= OS_COMM_GRAB_IMPERVIOUS;
|
|
|
|
set_poll_client(client);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (ServerGrabCallback) {
|
|
|
|
ServerGrabInfoRec grabinfo;
|
|
|
|
|
|
|
|
grabinfo.client = client;
|
|
|
|
grabinfo.grabstate = CLIENT_IMPERVIOUS;
|
|
|
|
CallCallbacks(&ServerGrabCallback, &grabinfo);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make client pervious to grabs; assume only executing client calls this */
|
|
|
|
|
2009-09-06 13:44:18 -06:00
|
|
|
void
|
2006-11-26 11:13:41 -07:00
|
|
|
MakeClientGrabPervious(ClientPtr client)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
OsCommPtr oc = (OsCommPtr) client->osPrivate;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
oc->flags &= ~OS_COMM_GRAB_IMPERVIOUS;
|
|
|
|
set_poll_client(client);
|
|
|
|
isItTimeToYield = TRUE;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (ServerGrabCallback) {
|
|
|
|
ServerGrabInfoRec grabinfo;
|
|
|
|
|
|
|
|
grabinfo.client = client;
|
|
|
|
grabinfo.grabstate = CLIENT_PERVIOUS;
|
|
|
|
CallCallbacks(&ServerGrabCallback, &grabinfo);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-27 11:52:59 -06:00
|
|
|
/* Add a fd (from launchd or similar) to our listeners */
|
2012-06-10 07:21:05 -06:00
|
|
|
void
|
|
|
|
ListenOnOpenFD(int fd, int noxauth)
|
|
|
|
{
|
2009-09-06 13:44:18 -06:00
|
|
|
char port[256];
|
|
|
|
XtransConnInfo ciptr;
|
2010-07-27 13:02:24 -06:00
|
|
|
const char *display_env = getenv("DISPLAY");
|
2009-09-06 13:44:18 -06:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (display_env && (strncmp(display_env, "/tmp/launch", 11) == 0)) {
|
2009-09-06 13:44:18 -06:00
|
|
|
/* Make the path the launchd socket if our DISPLAY is set right */
|
2010-07-27 13:02:24 -06:00
|
|
|
strcpy(port, display_env);
|
2012-06-10 07:21:05 -06:00
|
|
|
}
|
|
|
|
else {
|
2009-09-06 13:44:18 -06:00
|
|
|
/* Just some default so things don't break and die. */
|
2012-06-10 07:21:05 -06:00
|
|
|
snprintf(port, sizeof(port), ":%d", atoi(display));
|
2009-09-06 13:44:18 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Make our XtransConnInfo
|
|
|
|
* TRANS_SOCKET_LOCAL_INDEX = 5 from Xtrans.c
|
|
|
|
*/
|
|
|
|
ciptr = _XSERVTransReopenCOTSServer(5, fd, port);
|
2012-06-10 07:21:05 -06:00
|
|
|
if (ciptr == NULL) {
|
2014-09-27 11:52:59 -06:00
|
|
|
ErrorF("Got NULL while trying to Reopen listen port.\n");
|
2009-09-06 13:44:18 -06:00
|
|
|
return;
|
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
|
|
|
|
if (noxauth)
|
2009-09-06 13:44:18 -06:00
|
|
|
ciptr->flags = ciptr->flags | TRANS_NOXAUTH;
|
|
|
|
|
|
|
|
/* Allocate space to store it */
|
2012-06-10 07:21:05 -06:00
|
|
|
ListenTransFds =
|
2016-05-29 06:02:34 -06:00
|
|
|
xnfreallocarray(ListenTransFds, ListenTransCount + 1, sizeof(int));
|
2012-06-10 07:21:05 -06:00
|
|
|
ListenTransConns =
|
2016-05-29 06:02:34 -06:00
|
|
|
xnfreallocarray(ListenTransConns, ListenTransCount + 1,
|
|
|
|
sizeof(XtransConnInfo));
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2009-09-06 13:44:18 -06:00
|
|
|
/* Store it */
|
|
|
|
ListenTransConns[ListenTransCount] = ciptr;
|
|
|
|
ListenTransFds[ListenTransCount] = fd;
|
|
|
|
|
2017-12-08 08:01:59 -07:00
|
|
|
SetNotifyFd(fd, QueueNewConnections, X_NOTIFY_READ, NULL);
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2009-09-06 13:44:18 -06:00
|
|
|
/* Increment the count */
|
|
|
|
ListenTransCount++;
|
|
|
|
}
|
|
|
|
|
2014-09-27 11:52:59 -06:00
|
|
|
/* based on TRANS(SocketUNIXAccept) (XtransConnInfo ciptr, int *status) */
|
|
|
|
Bool
|
|
|
|
AddClientOnOpenFD(int fd)
|
|
|
|
{
|
|
|
|
XtransConnInfo ciptr;
|
|
|
|
CARD32 connect_time;
|
|
|
|
char port[20];
|
|
|
|
|
|
|
|
snprintf(port, sizeof(port), ":%d", atoi(display));
|
|
|
|
ciptr = _XSERVTransReopenCOTSServer(5, fd, port);
|
|
|
|
if (ciptr == NULL)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
_XSERVTransSetOption(ciptr, TRANS_NONBLOCKING, 1);
|
|
|
|
ciptr->flags |= TRANS_NOXAUTH;
|
|
|
|
|
|
|
|
connect_time = GetTimeInMillis();
|
|
|
|
|
|
|
|
if (!AllocNewConnection(ciptr, fd, connect_time)) {
|
|
|
|
ErrorConnMax(ciptr);
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|
2017-12-08 08:01:59 -07:00
|
|
|
|
|
|
|
Bool
|
|
|
|
listen_to_client(ClientPtr client)
|
|
|
|
{
|
|
|
|
OsCommPtr oc = (OsCommPtr) client->osPrivate;
|
|
|
|
|
|
|
|
if (oc->flags & OS_COMM_IGNORED)
|
|
|
|
return FALSE;
|
|
|
|
|
|
|
|
if (!GrabInProgress)
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
if (client->index == GrabInProgress)
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
if (oc->flags & OS_COMM_GRAB_IMPERVIOUS)
|
|
|
|
return TRUE;
|
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
set_poll_client(ClientPtr client)
|
|
|
|
{
|
|
|
|
OsCommPtr oc = (OsCommPtr) client->osPrivate;
|
|
|
|
|
2019-07-27 01:57:06 -06:00
|
|
|
if (oc->trans_conn) {
|
|
|
|
if (listen_to_client(client))
|
|
|
|
ospoll_listen(server_poll, oc->trans_conn->fd, X_NOTIFY_READ);
|
|
|
|
else
|
|
|
|
ospoll_mute(server_poll, oc->trans_conn->fd, X_NOTIFY_READ);
|
|
|
|
}
|
2017-12-08 08:01:59 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
set_poll_clients(void)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 1; i < currentMaxClients; i++) {
|
|
|
|
ClientPtr client = clients[i];
|
|
|
|
if (client && !client->clientGone)
|
|
|
|
set_poll_client(client);
|
|
|
|
}
|
|
|
|
}
|