1 /* See LICENSE file for license details. */
2 #define _XOPEN_SOURCE 500
15 #include <sys/types.h>
16 #include <X11/extensions/Xrandr.h>
17 #include <X11/keysym.h>
19 #include <X11/Xutil.h>
22 #include <login_cap.h>
44 unsigned long colors
[NUMCOLS
];
49 static Bool running
= True
;
50 static Bool failure
= False
;
56 die(const char *errstr
, ...)
61 vfprintf(stderr
, errstr
, ap
);
68 #include <linux/oom.h>
74 const char oomfile
[] = "/proc/self/oom_score_adj";
76 if (!(f
= fopen(oomfile
, "w"))) {
79 die("slock: fopen %s: %s\n", oomfile
, strerror(errno
));
81 fprintf(f
, "%d", OOM_SCORE_ADJ_MIN
);
84 die("slock: unable to disable OOM killer. "
85 "suid or sgid set?\n");
87 die("slock: fclose %s: %s\n", oomfile
,
94 /* only run as root */
102 if (!(pw
= getpwuid(getuid()))) {
104 die("getpwuid: %s\n", strerror(errno
));
106 die("cannot retrieve password entry\n");
108 rval
= pw
->pw_passwd
;
111 if (rval
[0] == 'x' && rval
[1] == '\0') {
113 if (!(sp
= getspnam(getenv("USER"))))
114 die("cannot retrieve shadow entry (make sure to suid or sgid slock)\n");
119 /* drop privileges */
120 if (geteuid() == 0 &&
121 ((getegid() != pw
->pw_gid
&& setgid(pw
->pw_gid
) < 0) || setuid(pw
->pw_uid
) < 0))
122 die("cannot drop privileges\n");
131 readpw(Display
*dpy
, const char *pws
)
134 char buf
[32], passwd
[256], *encrypted
;
136 unsigned int len
, color
;
139 static int oldc
= INIT
;
144 /* As "slock" stands for "Simple X display locker", the DPMS settings
145 * had been removed and you can set it with "xset" or some other
146 * utility. This way the user can easily set a customized DPMS
148 while (running
&& !XNextEvent(dpy
, &ev
)) {
149 if (ev
.type
== KeyPress
) {
150 explicit_bzero(&buf
, sizeof(buf
));
151 num
= XLookupString(&ev
.xkey
, buf
, sizeof(buf
), &ksym
, 0);
152 if (IsKeypadKey(ksym
)) {
153 if (ksym
== XK_KP_Enter
)
155 else if (ksym
>= XK_KP_0
&& ksym
<= XK_KP_9
)
156 ksym
= (ksym
- XK_KP_0
) + XK_0
;
158 if (IsFunctionKey(ksym
) ||
160 IsMiscFunctionKey(ksym
) ||
162 IsPrivateKeypadKey(ksym
))
168 running
= !auth_userokay(getlogin(), NULL
, "auth-slock", passwd
);
171 if (!(encrypted
= crypt(passwd
, pws
)))
172 fprintf(stderr
, "slock: crypt: %s\n", strerror(errno
));
174 running
= !!strcmp(encrypted
, pws
);
180 explicit_bzero(&passwd
, sizeof(passwd
));
184 explicit_bzero(&passwd
, sizeof(passwd
));
192 if (num
&& !iscntrl((int)buf
[0]) && (len
+ num
< sizeof(passwd
))) {
193 memcpy(passwd
+ len
, buf
, num
);
198 color
= len
? INPUT
: (failure
|| failonclear
? FAILED
: INIT
);
199 if (running
&& oldc
!= color
) {
200 for (screen
= 0; screen
< nscreens
; screen
++) {
201 XSetWindowBackground(dpy
, locks
[screen
]->win
, locks
[screen
]->colors
[color
]);
202 XClearWindow(dpy
, locks
[screen
]->win
);
206 } else if (rr
&& ev
.type
== rrevbase
+ RRScreenChangeNotify
) {
207 XRRScreenChangeNotifyEvent
*rre
= (XRRScreenChangeNotifyEvent
*)&ev
;
208 for (screen
= 0; screen
< nscreens
; screen
++) {
209 if (locks
[screen
]->win
== rre
->window
) {
210 XResizeWindow(dpy
, locks
[screen
]->win
, rre
->width
, rre
->height
);
211 XClearWindow(dpy
, locks
[screen
]->win
);
214 } else for (screen
= 0; screen
< nscreens
; screen
++)
215 XRaiseWindow(dpy
, locks
[screen
]->win
);
220 unlockscreen(Display
*dpy
, Lock
*lock
)
222 if(dpy
== NULL
|| lock
== NULL
)
225 XUngrabPointer(dpy
, CurrentTime
);
226 XFreeColors(dpy
, DefaultColormap(dpy
, lock
->screen
), lock
->colors
, NUMCOLS
, 0);
227 XFreePixmap(dpy
, lock
->pmap
);
228 XDestroyWindow(dpy
, lock
->win
);
234 cleanup(Display
*dpy
)
241 lockscreen(Display
*dpy
, int screen
)
243 char curs
[] = {0, 0, 0, 0, 0, 0, 0, 0};
247 XSetWindowAttributes wa
;
250 if (!running
|| dpy
== NULL
|| screen
< 0 || !(lock
= malloc(sizeof(Lock
))))
253 lock
->screen
= screen
;
254 lock
->root
= RootWindow(dpy
, lock
->screen
);
256 for (i
= 0; i
< NUMCOLS
; i
++) {
257 XAllocNamedColor(dpy
, DefaultColormap(dpy
, lock
->screen
), colorname
[i
], &color
, &dummy
);
258 lock
->colors
[i
] = color
.pixel
;
262 wa
.override_redirect
= 1;
263 wa
.background_pixel
= lock
->colors
[INIT
];
264 lock
->win
= XCreateWindow(dpy
, lock
->root
, 0, 0, DisplayWidth(dpy
, lock
->screen
), DisplayHeight(dpy
, lock
->screen
),
265 0, DefaultDepth(dpy
, lock
->screen
), CopyFromParent
,
266 DefaultVisual(dpy
, lock
->screen
), CWOverrideRedirect
| CWBackPixel
, &wa
);
267 lock
->pmap
= XCreateBitmapFromData(dpy
, lock
->win
, curs
, 8, 8);
268 invisible
= XCreatePixmapCursor(dpy
, lock
->pmap
, lock
->pmap
, &color
, &color
, 0, 0);
269 XDefineCursor(dpy
, lock
->win
, invisible
);
271 /* Try to grab mouse pointer *and* keyboard, else fail the lock */
272 if (XGrabPointer(dpy
, lock
->root
, False
, ButtonPressMask
|
273 ButtonReleaseMask
| PointerMotionMask
, GrabModeAsync
, GrabModeAsync
,
274 None
, invisible
, CurrentTime
) != GrabSuccess
) {
275 fprintf(stderr
, "slock: unable to grab mouse pointer for screen %d\n", screen
);
277 unlockscreen(dpy
, lock
);
281 if (XGrabKeyboard(dpy
, lock
->root
, True
, GrabModeAsync
, GrabModeAsync
,
282 CurrentTime
) != GrabSuccess
) {
283 fprintf(stderr
, "slock: unable to grab keyboard for screen %d\n", screen
);
285 unlockscreen(dpy
, lock
);
289 XMapRaised(dpy
, lock
->win
);
291 XRRSelectInput(dpy
, lock
->win
, RRScreenChangeNotifyMask
);
293 XSelectInput(dpy
, lock
->root
, SubstructureNotifyMask
);
300 die("usage: slock [-v] [cmd [arg ...]]\n");
304 main(int argc
, char **argv
) {
305 #ifndef HAVE_BSD_AUTH
313 fprintf(stderr
, "slock-"VERSION
"\n");
323 /* Check if the current user has a password entry */
325 if (!getpwuid(getuid())) {
327 die("slock: no password entry for current user\n");
329 die("slock: getpwuid: %s\n", strerror(errno
));
332 #ifndef HAVE_BSD_AUTH
335 die("slock: failed to get user password hash.\n");
338 if (!(dpy
= XOpenDisplay(NULL
)))
339 die("slock: cannot open display\n");
341 /* check for Xrandr support */
342 rr
= XRRQueryExtension(dpy
, &rrevbase
, &rrerrbase
);
344 /* get number of screens in display "dpy" and blank them */
345 nscreens
= ScreenCount(dpy
);
346 if (!(locks
= malloc(sizeof(Lock
*) * nscreens
))) {
348 die("slock: out of memory\n");
350 for (nlocks
= 0, s
= 0; s
< nscreens
; s
++) {
351 if ((locks
[s
] = lockscreen(dpy
, s
)) != NULL
)
356 /* did we actually manage to lock anything? */
358 /* nothing to protect */
363 /* run post-lock command */
368 die("slock: fork failed: %s\n", strerror(errno
));
370 if (close(ConnectionNumber(dpy
)) < 0)
371 die("slock: close: %s\n", strerror(errno
));
372 execvp(argv
[0], argv
);
373 fprintf(stderr
, "slock: execvp %s: %s\n", argv
[0],
379 /* everything is now blank. Wait for the correct password */
386 /* password ok, unlock everything and quit */
387 for (s
= 0; s
< nscreens
; s
++)
388 unlockscreen(dpy
, locks
[s
]);