4 * Copyright (c) 2007 Nicholas Marriott <nicm@users.sourceforge.net>
6 * Permission to use, copy, modify, and distribute this software for any
7 * purpose with or without fee is hereby granted, provided that the above
8 * copyright notice and this permission notice appear in all copies.
10 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14 * WHATSOEVER RESULTING FROM LOSS OF MIND, USE, DATA OR PROFITS, WHETHER
15 * IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
16 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 #include <sys/types.h>
20 #include <sys/ioctl.h>
21 #include <sys/socket.h>
42 * Main server functions.
46 struct clients clients
;
47 struct clients dead_clients
;
51 struct event server_ev_accept
;
52 struct event server_ev_sigterm
;
53 struct event server_ev_sigusr1
;
54 struct event server_ev_sigchld
;
55 struct event server_ev_second
;
57 int server_create_socket(void);
58 void server_loop(void);
59 int server_should_shutdown(void);
60 void server_send_shutdown(void);
61 void server_clean_dead(void);
62 void server_accept_callback(int, short, void *);
63 void server_signal_callback(int, short, void *);
64 void server_child_signal(void);
65 void server_child_exited(pid_t
, int);
66 void server_child_stopped(pid_t
, int);
67 void server_second_callback(int, short, void *);
68 void server_lock_server(void);
69 void server_lock_sessions(void);
71 /* Create server socket. */
73 server_create_socket(void)
75 struct sockaddr_un sa
;
80 memset(&sa
, 0, sizeof sa
);
81 sa
.sun_family
= AF_UNIX
;
82 size
= strlcpy(sa
.sun_path
, socket_path
, sizeof sa
.sun_path
);
83 if (size
>= sizeof sa
.sun_path
) {
85 fatal("socket failed");
89 if ((fd
= socket(AF_UNIX
, SOCK_STREAM
, 0)) == -1)
90 fatal("socket failed");
92 mask
= umask(S_IXUSR
|S_IRWXG
|S_IRWXO
);
93 if (bind(fd
, (struct sockaddr
*) &sa
, SUN_LEN(&sa
)) == -1)
97 if (listen(fd
, 16) == -1)
98 fatal("listen failed");
100 if ((mode
= fcntl(fd
, F_GETFL
)) == -1)
101 fatal("fcntl failed");
102 if (fcntl(fd
, F_SETFL
, mode
|O_NONBLOCK
) == -1)
103 fatal("fcntl failed");
104 if (fcntl(fd
, F_SETFD
, FD_CLOEXEC
) == -1)
105 fatal("fcntl failed");
107 server_update_socket();
112 /* Fork new server. */
114 server_start(char *path
)
116 struct window_pane
*wp
;
118 char rpathbuf
[MAXPATHLEN
], *cause
;
122 /* The first client is special and gets a socketpair; create it. */
123 if (socketpair(AF_UNIX
, SOCK_STREAM
, PF_UNSPEC
, pair
) != 0)
124 fatal("socketpair failed");
128 fatal("fork failed");
138 * Must daemonise before loading configuration as the PID changes so
139 * $TMUX would be wrong for sessions created in the config file.
141 if (daemon(1, 0) != 0)
142 fatal("daemon failed");
145 log_debug("server started, pid %ld", (long) getpid());
147 ARRAY_INIT(&windows
);
148 ARRAY_INIT(&clients
);
149 ARRAY_INIT(&dead_clients
);
150 ARRAY_INIT(&sessions
);
151 ARRAY_INIT(&dead_sessions
);
152 TAILQ_INIT(&session_groups
);
153 mode_key_init_trees();
157 start_time
= time(NULL
);
160 if (realpath(socket_path
, rpathbuf
) == NULL
)
161 strlcpy(rpathbuf
, socket_path
, sizeof rpathbuf
);
162 log_debug("socket path %s", socket_path
);
163 setproctitle("server (%s)", rpathbuf
);
167 server_fd
= server_create_socket();
168 server_client_create(pair
[1]);
170 if (access(SYSTEM_CFG
, R_OK
) == 0)
171 load_cfg(SYSTEM_CFG
, NULL
, &cfg_causes
);
172 else if (errno
!= ENOENT
) {
174 &cfg_causes
, "%s: %s", strerror(errno
), SYSTEM_CFG
);
176 if (cfg_file
!= NULL
)
177 load_cfg(cfg_file
, NULL
, &cfg_causes
);
180 * If there is a session already, put the current window and pane into
183 if (!ARRAY_EMPTY(&sessions
) && !ARRAY_EMPTY(&cfg_causes
)) {
184 wp
= ARRAY_FIRST(&sessions
)->curw
->window
->active
;
185 window_pane_set_mode(wp
, &window_copy_mode
);
186 window_copy_init_for_output(wp
);
187 for (i
= 0; i
< ARRAY_LENGTH(&cfg_causes
); i
++) {
188 cause
= ARRAY_ITEM(&cfg_causes
, i
);
189 window_copy_add(wp
, "%s", cause
);
192 ARRAY_FREE(&cfg_causes
);
196 event_set(&server_ev_accept
,
197 server_fd
, EV_READ
|EV_PERSIST
, server_accept_callback
, NULL
);
198 event_add(&server_ev_accept
, NULL
);
200 memset(&tv
, 0, sizeof tv
);
202 evtimer_set(&server_ev_second
, server_second_callback
, NULL
);
203 evtimer_add(&server_ev_second
, &tv
);
210 /* Main server loop. */
214 while (!server_should_shutdown()) {
215 event_loop(EVLOOP_ONCE
);
217 server_window_loop();
218 server_client_loop();
220 key_bindings_clean();
225 /* Check if the server should be shutting down (no more clients or windows). */
227 server_should_shutdown(void)
231 for (i
= 0; i
< ARRAY_LENGTH(&sessions
); i
++) {
232 if (ARRAY_ITEM(&sessions
, i
) != NULL
)
235 for (i
= 0; i
< ARRAY_LENGTH(&clients
); i
++) {
236 if (ARRAY_ITEM(&clients
, i
) != NULL
)
242 /* Shutdown the server by killing all clients and windows. */
244 server_send_shutdown(void)
250 for (i
= 0; i
< ARRAY_LENGTH(&clients
); i
++) {
251 c
= ARRAY_ITEM(&clients
, i
);
253 if (c
->flags
& (CLIENT_BAD
|CLIENT_SUSPENDED
))
254 server_client_lost(c
);
256 server_write_client(c
, MSG_SHUTDOWN
, NULL
, 0);
261 for (i
= 0; i
< ARRAY_LENGTH(&sessions
); i
++) {
262 if ((s
= ARRAY_ITEM(&sessions
, i
)) != NULL
)
267 /* Free dead, unreferenced clients and sessions. */
269 server_clean_dead(void)
275 for (i
= 0; i
< ARRAY_LENGTH(&dead_sessions
); i
++) {
276 s
= ARRAY_ITEM(&dead_sessions
, i
);
277 if (s
== NULL
|| s
->references
!= 0)
279 ARRAY_SET(&dead_sessions
, i
, NULL
);
283 for (i
= 0; i
< ARRAY_LENGTH(&dead_clients
); i
++) {
284 c
= ARRAY_ITEM(&dead_clients
, i
);
285 if (c
== NULL
|| c
->references
!= 0)
287 ARRAY_SET(&dead_clients
, i
, NULL
);
292 /* Update socket execute permissions based on whether sessions are attached. */
294 server_update_socket(void)
298 static int last
= -1;
302 for (i
= 0; i
< ARRAY_LENGTH(&sessions
); i
++) {
303 s
= ARRAY_ITEM(&sessions
, i
);
304 if (s
!= NULL
&& !(s
->flags
& SESSION_UNATTACHED
)) {
313 chmod(socket_path
, S_IRWXU
);
315 chmod(socket_path
, S_IRUSR
|S_IWUSR
);
319 /* Callback for server socket. */
322 server_accept_callback(int fd
, short events
, unused
void *data
)
324 struct sockaddr_storage sa
;
325 socklen_t slen
= sizeof sa
;
328 if (!(events
& EV_READ
))
331 newfd
= accept(fd
, (struct sockaddr
*) &sa
, &slen
);
333 if (errno
== EAGAIN
|| errno
== EINTR
|| errno
== ECONNABORTED
)
335 fatal("accept failed");
337 if (server_shutdown
) {
341 server_client_create(newfd
);
344 /* Set up server signal handling. */
346 server_signal_set(void)
348 struct sigaction sigact
;
350 memset(&sigact
, 0, sizeof sigact
);
351 sigemptyset(&sigact
.sa_mask
);
352 sigact
.sa_flags
= SA_RESTART
;
353 sigact
.sa_handler
= SIG_IGN
;
354 if (sigaction(SIGINT
, &sigact
, NULL
) != 0)
355 fatal("sigaction failed");
356 if (sigaction(SIGPIPE
, &sigact
, NULL
) != 0)
357 fatal("sigaction failed");
358 if (sigaction(SIGUSR2
, &sigact
, NULL
) != 0)
359 fatal("sigaction failed");
360 if (sigaction(SIGTSTP
, &sigact
, NULL
) != 0)
361 fatal("sigaction failed");
362 if (sigaction(SIGHUP
, &sigact
, NULL
) != 0)
363 fatal("sigaction failed");
365 signal_set(&server_ev_sigchld
, SIGCHLD
, server_signal_callback
, NULL
);
366 signal_add(&server_ev_sigchld
, NULL
);
367 signal_set(&server_ev_sigterm
, SIGTERM
, server_signal_callback
, NULL
);
368 signal_add(&server_ev_sigterm
, NULL
);
369 signal_set(&server_ev_sigusr1
, SIGUSR1
, server_signal_callback
, NULL
);
370 signal_add(&server_ev_sigusr1
, NULL
);
373 /* Destroy server signal events. */
375 server_signal_clear(void)
377 struct sigaction sigact
;
379 memset(&sigact
, 0, sizeof sigact
);
380 sigemptyset(&sigact
.sa_mask
);
381 sigact
.sa_flags
= SA_RESTART
;
382 sigact
.sa_handler
= SIG_DFL
;
383 if (sigaction(SIGINT
, &sigact
, NULL
) != 0)
384 fatal("sigaction failed");
385 if (sigaction(SIGPIPE
, &sigact
, NULL
) != 0)
386 fatal("sigaction failed");
387 if (sigaction(SIGUSR2
, &sigact
, NULL
) != 0)
388 fatal("sigaction failed");
389 if (sigaction(SIGTSTP
, &sigact
, NULL
) != 0)
390 fatal("sigaction failed");
391 if (sigaction(SIGHUP
, &sigact
, NULL
) != 0)
392 fatal("sigaction failed");
394 signal_del(&server_ev_sigchld
);
395 signal_del(&server_ev_sigterm
);
396 signal_del(&server_ev_sigusr1
);
399 /* Signal handler. */
402 server_signal_callback(int sig
, unused
short events
, unused
void *data
)
407 server_send_shutdown();
410 server_child_signal();
413 event_del(&server_ev_accept
);
415 server_fd
= server_create_socket();
416 event_set(&server_ev_accept
, server_fd
,
417 EV_READ
|EV_PERSIST
, server_accept_callback
, NULL
);
418 event_add(&server_ev_accept
, NULL
);
423 /* Handle SIGCHLD. */
425 server_child_signal(void)
431 switch (pid
= waitpid(WAIT_ANY
, &status
, WNOHANG
|WUNTRACED
)) {
435 fatal("waitpid failed");
439 if (WIFSTOPPED(status
))
440 server_child_stopped(pid
, status
);
441 else if (WIFEXITED(status
) || WIFSIGNALED(status
))
442 server_child_exited(pid
, status
);
446 /* Handle exited children. */
448 server_child_exited(pid_t pid
, int status
)
451 struct window_pane
*wp
;
455 for (i
= 0; i
< ARRAY_LENGTH(&windows
); i
++) {
456 if ((w
= ARRAY_ITEM(&windows
, i
)) == NULL
)
458 TAILQ_FOREACH(wp
, &w
->panes
, entry
) {
459 if (wp
->pid
== pid
) {
460 server_destroy_pane(wp
);
466 SLIST_FOREACH(job
, &all_jobs
, lentry
) {
467 if (pid
== job
->pid
) {
468 job_died(job
, status
); /* might free job */
474 /* Handle stopped children. */
476 server_child_stopped(pid_t pid
, int status
)
479 struct window_pane
*wp
;
482 if (WSTOPSIG(status
) == SIGTTIN
|| WSTOPSIG(status
) == SIGTTOU
)
485 for (i
= 0; i
< ARRAY_LENGTH(&windows
); i
++) {
486 if ((w
= ARRAY_ITEM(&windows
, i
)) == NULL
)
488 TAILQ_FOREACH(wp
, &w
->panes
, entry
) {
489 if (wp
->pid
== pid
) {
490 if (killpg(pid
, SIGCONT
) != 0)
497 /* Handle once-per-second timer events. */
500 server_second_callback(unused
int fd
, unused
short events
, unused
void *arg
)
503 struct window_pane
*wp
;
507 if (options_get_number(&global_s_options
, "lock-server"))
508 server_lock_server();
510 server_lock_sessions();
512 for (i
= 0; i
< ARRAY_LENGTH(&windows
); i
++) {
513 w
= ARRAY_ITEM(&windows
, i
);
517 TAILQ_FOREACH(wp
, &w
->panes
, entry
) {
518 if (wp
->mode
!= NULL
&& wp
->mode
->timer
!= NULL
)
523 server_client_status_timer();
525 evtimer_del(&server_ev_second
);
526 memset(&tv
, 0, sizeof tv
);
528 evtimer_add(&server_ev_second
, &tv
);
531 /* Lock the server if ALL sessions have hit the time limit. */
533 server_lock_server(void)
541 for (i
= 0; i
< ARRAY_LENGTH(&sessions
); i
++) {
542 if ((s
= ARRAY_ITEM(&sessions
, i
)) == NULL
)
545 if (s
->flags
& SESSION_UNATTACHED
) {
546 if (gettimeofday(&s
->activity_time
, NULL
) != 0)
547 fatal("gettimeofday failed");
551 timeout
= options_get_number(&s
->options
, "lock-after-time");
552 if (timeout
<= 0 || t
<= s
->activity_time
.tv_sec
+ timeout
)
553 return; /* not timed out */
560 /* Lock any sessions which have timed out. */
562 server_lock_sessions(void)
570 for (i
= 0; i
< ARRAY_LENGTH(&sessions
); i
++) {
571 if ((s
= ARRAY_ITEM(&sessions
, i
)) == NULL
)
574 if (s
->flags
& SESSION_UNATTACHED
) {
575 if (gettimeofday(&s
->activity_time
, NULL
) != 0)
576 fatal("gettimeofday failed");
580 timeout
= options_get_number(&s
->options
, "lock-after-time");
581 if (timeout
> 0 && t
> s
->activity_time
.tv_sec
+ timeout
) {
582 server_lock_session(s
);