Xinqi Bao's Git

068227985bfa9bb5efd768a7af98dffe4ad26153
[slock.git] / slock.c
1 /* See LICENSE file for license details. */
2 #define _XOPEN_SOURCE 500
3 #if HAVE_SHADOW_H
4 #include <shadow.h>
5 #endif
6
7 #include <ctype.h>
8 #include <errno.h>
9 #include <pwd.h>
10 #include <stdarg.h>
11 #include <stdlib.h>
12 #include <stdio.h>
13 #include <string.h>
14 #include <unistd.h>
15 #include <sys/types.h>
16 #include <X11/extensions/Xrandr.h>
17 #include <X11/keysym.h>
18 #include <X11/Xlib.h>
19 #include <X11/Xutil.h>
20
21 #if HAVE_BSD_AUTH
22 #include <login_cap.h>
23 #include <bsd_auth.h>
24 #endif
25
26 #include "arg.h"
27 #include "util.h"
28
29 char *argv0;
30
31 enum {
32 INIT,
33 INPUT,
34 FAILED,
35 NUMCOLS
36 };
37
38 #include "config.h"
39
40 typedef struct {
41 int screen;
42 Window root, win;
43 Pixmap pmap;
44 unsigned long colors[NUMCOLS];
45 } Lock;
46
47 static Lock **locks;
48 static int nscreens;
49 static Bool running = True;
50 static Bool failure = False;
51 static Bool rr;
52 static int rrevbase;
53 static int rrerrbase;
54
55 static void
56 die(const char *errstr, ...)
57 {
58 va_list ap;
59
60 va_start(ap, errstr);
61 vfprintf(stderr, errstr, ap);
62 va_end(ap);
63 exit(1);
64 }
65
66 #ifdef __linux__
67 #include <fcntl.h>
68 #include <linux/oom.h>
69
70 static void
71 dontkillme(void)
72 {
73 FILE *f;
74 const char oomfile[] = "/proc/self/oom_score_adj";
75
76 if (!(f = fopen(oomfile, "w"))) {
77 if (errno == ENOENT)
78 return;
79 die("slock: fopen %s: %s\n", oomfile, strerror(errno));
80 }
81 fprintf(f, "%d", OOM_SCORE_ADJ_MIN);
82 if (fclose(f)) {
83 if (errno == EACCES)
84 die("slock: unable to disable OOM killer. "
85 "suid or sgid set?\n");
86 else
87 die("slock: fclose %s: %s\n", oomfile,
88 strerror(errno));
89 }
90 }
91 #endif
92
93 #ifndef HAVE_BSD_AUTH
94 /* only run as root */
95 static const char *
96 getpw(void)
97 {
98 const char *rval;
99 struct passwd *pw;
100
101 errno = 0;
102 if (!(pw = getpwuid(getuid()))) {
103 if (errno)
104 die("getpwuid: %s\n", strerror(errno));
105 else
106 die("cannot retrieve password entry\n");
107 }
108 rval = pw->pw_passwd;
109
110 #if HAVE_SHADOW_H
111 if (rval[0] == 'x' && rval[1] == '\0') {
112 struct spwd *sp;
113 if (!(sp = getspnam(getenv("USER"))))
114 die("cannot retrieve shadow entry (make sure to suid or sgid slock)\n");
115 rval = sp->sp_pwdp;
116 }
117 #endif
118
119 /* drop privileges */
120 if (geteuid() == 0 &&
121 ((getegid() != pw->pw_gid && setgid(pw->pw_gid) < 0) || setuid(pw->pw_uid) < 0))
122 die("cannot drop privileges\n");
123 return rval;
124 }
125 #endif
126
127 static void
128 #ifdef HAVE_BSD_AUTH
129 readpw(Display *dpy)
130 #else
131 readpw(Display *dpy, const char *pws)
132 #endif
133 {
134 char buf[32], passwd[256], *encrypted;
135 int num, screen;
136 unsigned int len, color;
137 KeySym ksym;
138 XEvent ev;
139 static int oldc = INIT;
140
141 len = 0;
142 running = True;
143
144 /* As "slock" stands for "Simple X display locker", the DPMS settings
145 * had been removed and you can set it with "xset" or some other
146 * utility. This way the user can easily set a customized DPMS
147 * timeout. */
148 while (running && !XNextEvent(dpy, &ev)) {
149 if (ev.type == KeyPress) {
150 explicit_bzero(&buf, sizeof(buf));
151 num = XLookupString(&ev.xkey, buf, sizeof(buf), &ksym, 0);
152 if (IsKeypadKey(ksym)) {
153 if (ksym == XK_KP_Enter)
154 ksym = XK_Return;
155 else if (ksym >= XK_KP_0 && ksym <= XK_KP_9)
156 ksym = (ksym - XK_KP_0) + XK_0;
157 }
158 if (IsFunctionKey(ksym) ||
159 IsKeypadKey(ksym) ||
160 IsMiscFunctionKey(ksym) ||
161 IsPFKey(ksym) ||
162 IsPrivateKeypadKey(ksym))
163 continue;
164 switch (ksym) {
165 case XK_Return:
166 passwd[len] = 0;
167 #ifdef HAVE_BSD_AUTH
168 running = !auth_userokay(getlogin(), NULL, "auth-slock", passwd);
169 #else
170 errno = 0;
171 if (!(encrypted = crypt(passwd, pws)))
172 fprintf(stderr, "slock: crypt: %s\n", strerror(errno));
173 else
174 running = !!strcmp(encrypted, pws);
175 #endif
176 if (running) {
177 XBell(dpy, 100);
178 failure = True;
179 }
180 explicit_bzero(&passwd, sizeof(passwd));
181 len = 0;
182 break;
183 case XK_Escape:
184 explicit_bzero(&passwd, sizeof(passwd));
185 len = 0;
186 break;
187 case XK_BackSpace:
188 if (len)
189 passwd[len--] = 0;
190 break;
191 default:
192 if (num && !iscntrl((int)buf[0]) && (len + num < sizeof(passwd))) {
193 memcpy(passwd + len, buf, num);
194 len += num;
195 }
196 break;
197 }
198 color = len ? INPUT : (failure || failonclear ? FAILED : INIT);
199 if (running && oldc != color) {
200 for (screen = 0; screen < nscreens; screen++) {
201 XSetWindowBackground(dpy, locks[screen]->win, locks[screen]->colors[color]);
202 XClearWindow(dpy, locks[screen]->win);
203 }
204 oldc = color;
205 }
206 } else if (rr && ev.type == rrevbase + RRScreenChangeNotify) {
207 XRRScreenChangeNotifyEvent *rre = (XRRScreenChangeNotifyEvent*)&ev;
208 for (screen = 0; screen < nscreens; screen++) {
209 if (locks[screen]->win == rre->window) {
210 XResizeWindow(dpy, locks[screen]->win, rre->width, rre->height);
211 XClearWindow(dpy, locks[screen]->win);
212 }
213 }
214 } else for (screen = 0; screen < nscreens; screen++)
215 XRaiseWindow(dpy, locks[screen]->win);
216 }
217 }
218
219 static void
220 unlockscreen(Display *dpy, Lock *lock)
221 {
222 if(dpy == NULL || lock == NULL)
223 return;
224
225 XUngrabPointer(dpy, CurrentTime);
226 XUngrabKeyboard(dpy, CurrentTime);
227 XFreeColors(dpy, DefaultColormap(dpy, lock->screen), lock->colors, NUMCOLS, 0);
228 XFreePixmap(dpy, lock->pmap);
229 XDestroyWindow(dpy, lock->win);
230
231 free(lock);
232 }
233
234 static void
235 cleanup(Display *dpy)
236 {
237 int s;
238
239 for (s = 0; s < nscreens; ++s)
240 unlockscreen(dpy, locks[s]);
241
242 free(locks);
243 XCloseDisplay(dpy);
244 }
245
246 static Lock *
247 lockscreen(Display *dpy, int screen)
248 {
249 char curs[] = {0, 0, 0, 0, 0, 0, 0, 0};
250 int i, ptgrab, kbgrab;
251 Lock *lock;
252 XColor color, dummy;
253 XSetWindowAttributes wa;
254 Cursor invisible;
255
256 if (!running || dpy == NULL || screen < 0 || !(lock = malloc(sizeof(Lock))))
257 return NULL;
258
259 lock->screen = screen;
260 lock->root = RootWindow(dpy, lock->screen);
261
262 for (i = 0; i < NUMCOLS; i++) {
263 XAllocNamedColor(dpy, DefaultColormap(dpy, lock->screen), colorname[i], &color, &dummy);
264 lock->colors[i] = color.pixel;
265 }
266
267 /* init */
268 wa.override_redirect = 1;
269 wa.background_pixel = lock->colors[INIT];
270 lock->win = XCreateWindow(dpy, lock->root, 0, 0, DisplayWidth(dpy, lock->screen), DisplayHeight(dpy, lock->screen),
271 0, DefaultDepth(dpy, lock->screen), CopyFromParent,
272 DefaultVisual(dpy, lock->screen), CWOverrideRedirect | CWBackPixel, &wa);
273 lock->pmap = XCreateBitmapFromData(dpy, lock->win, curs, 8, 8);
274 invisible = XCreatePixmapCursor(dpy, lock->pmap, lock->pmap, &color, &color, 0, 0);
275 XDefineCursor(dpy, lock->win, invisible);
276
277 /* Try to grab mouse pointer *and* keyboard for 600ms, else fail the lock */
278 for (i = 6, ptgrab = kbgrab = -1; i; --i) {
279 if (ptgrab != GrabSuccess) {
280 ptgrab = XGrabPointer(dpy, lock->root, False,
281 ButtonPressMask | ButtonReleaseMask |
282 PointerMotionMask, GrabModeAsync,
283 GrabModeAsync, None, invisible, CurrentTime);
284 }
285 if (kbgrab != GrabSuccess) {
286 kbgrab = XGrabKeyboard(dpy, lock->root, True,
287 GrabModeAsync, GrabModeAsync, CurrentTime);
288 }
289
290 /* input is grabbed: we can lock the screen */
291 if (ptgrab == GrabSuccess && kbgrab == GrabSuccess) {
292 XMapRaised(dpy, lock->win);
293 if (rr)
294 XRRSelectInput(dpy, lock->win, RRScreenChangeNotifyMask);
295
296 XSelectInput(dpy, lock->root, SubstructureNotifyMask);
297 return lock;
298 }
299
300 /* retry on AlreadyGrabbed but fail on other errors */
301 if ((ptgrab != AlreadyGrabbed && ptgrab != GrabSuccess) ||
302 (kbgrab != AlreadyGrabbed && kbgrab != GrabSuccess))
303 break;
304
305 usleep(100000);
306 }
307
308 /* we couldn't grab all input: fail out */
309 if (ptgrab != GrabSuccess)
310 fprintf(stderr, "slock: unable to grab mouse pointer for screen %d\n", screen);
311 if (kbgrab != GrabSuccess)
312 fprintf(stderr, "slock: unable to grab keyboard for screen %d\n", screen);
313 return NULL;
314 }
315
316 static void
317 usage(void)
318 {
319 die("usage: slock [-v] [cmd [arg ...]]\n");
320 }
321
322 int
323 main(int argc, char **argv) {
324 #ifndef HAVE_BSD_AUTH
325 const char *pws;
326 #endif
327 Display *dpy;
328 int s, nlocks;
329
330 ARGBEGIN {
331 case 'v':
332 fprintf(stderr, "slock-"VERSION"\n");
333 return 0;
334 default:
335 usage();
336 } ARGEND
337
338 #ifdef __linux__
339 dontkillme();
340 #endif
341
342 /* Check if the current user has a password entry */
343 errno = 0;
344 if (!getpwuid(getuid())) {
345 if (errno == 0)
346 die("slock: no password entry for current user\n");
347 else
348 die("slock: getpwuid: %s\n", strerror(errno));
349 }
350
351 #ifndef HAVE_BSD_AUTH
352 pws = getpw();
353 if (strlen(pws) < 2)
354 die("slock: failed to get user password hash.\n");
355 #endif
356
357 if (!(dpy = XOpenDisplay(NULL)))
358 die("slock: cannot open display\n");
359
360 /* check for Xrandr support */
361 rr = XRRQueryExtension(dpy, &rrevbase, &rrerrbase);
362
363 /* get number of screens in display "dpy" and blank them */
364 nscreens = ScreenCount(dpy);
365 if (!(locks = calloc(nscreens, sizeof(Lock *)))) {
366 XCloseDisplay(dpy);
367 die("slock: out of memory\n");
368 }
369 for (nlocks = 0, s = 0; s < nscreens; s++) {
370 if ((locks[s] = lockscreen(dpy, s)) != NULL)
371 nlocks++;
372 else
373 break;
374 }
375 XSync(dpy, 0);
376
377 /* did we manage to lock everything? */
378 if (nlocks != nscreens) {
379 running = 0;
380 cleanup(dpy);
381 return 1;
382 }
383
384 /* run post-lock command */
385 if (argc > 0) {
386 switch (fork()) {
387 case -1:
388 cleanup(dpy);
389 die("slock: fork failed: %s\n", strerror(errno));
390 case 0:
391 if (close(ConnectionNumber(dpy)) < 0)
392 die("slock: close: %s\n", strerror(errno));
393 execvp(argv[0], argv);
394 fprintf(stderr, "slock: execvp %s: %s\n", argv[0],
395 strerror(errno));
396 _exit(1);
397 }
398 }
399
400 /* everything is now blank. Wait for the correct password */
401 #ifdef HAVE_BSD_AUTH
402 readpw(dpy);
403 #else
404 readpw(dpy, pws);
405 #endif
406
407 /* password ok, unlock everything and quit */
408 cleanup(dpy);
409
410 return 0;
411 }