1 /* See LICENSE file for license details. */
2 #define _XOPEN_SOURCE 500
15 #include <sys/types.h>
16 #include <X11/extensions/Xrandr.h>
17 #include <X11/keysym.h>
19 #include <X11/Xutil.h>
22 #include <login_cap.h>
44 unsigned long colors
[NUMCOLS
];
49 static Bool running
= True
;
50 static Bool failure
= False
;
56 die(const char *errstr
, ...)
61 vfprintf(stderr
, errstr
, ap
);
68 #include <linux/oom.h>
74 const char oomfile
[] = "/proc/self/oom_score_adj";
76 if (!(f
= fopen(oomfile
, "w"))) {
79 die("slock: fopen %s: %s\n", oomfile
, strerror(errno
));
81 fprintf(f
, "%d", OOM_SCORE_ADJ_MIN
);
84 die("slock: unable to disable OOM killer. "
85 "suid or sgid set?\n");
87 die("slock: fclose %s: %s\n", oomfile
,
94 /* only run as root */
102 if (!(pw
= getpwuid(getuid()))) {
104 die("getpwuid: %s\n", strerror(errno
));
106 die("cannot retrieve password entry\n");
108 rval
= pw
->pw_passwd
;
111 if (rval
[0] == 'x' && rval
[1] == '\0') {
113 if (!(sp
= getspnam(getenv("USER"))))
114 die("cannot retrieve shadow entry (make sure to suid or sgid slock)\n");
119 /* drop privileges */
120 if (geteuid() == 0 &&
121 ((getegid() != pw
->pw_gid
&& setgid(pw
->pw_gid
) < 0) || setuid(pw
->pw_uid
) < 0))
122 die("cannot drop privileges\n");
131 readpw(Display
*dpy
, const char *pws
)
134 char buf
[32], passwd
[256], *encrypted
;
136 unsigned int len
, color
;
139 static int oldc
= INIT
;
144 /* As "slock" stands for "Simple X display locker", the DPMS settings
145 * had been removed and you can set it with "xset" or some other
146 * utility. This way the user can easily set a customized DPMS
148 while (running
&& !XNextEvent(dpy
, &ev
)) {
149 if (ev
.type
== KeyPress
) {
150 explicit_bzero(&buf
, sizeof(buf
));
151 num
= XLookupString(&ev
.xkey
, buf
, sizeof(buf
), &ksym
, 0);
152 if (IsKeypadKey(ksym
)) {
153 if (ksym
== XK_KP_Enter
)
155 else if (ksym
>= XK_KP_0
&& ksym
<= XK_KP_9
)
156 ksym
= (ksym
- XK_KP_0
) + XK_0
;
158 if (IsFunctionKey(ksym
) ||
160 IsMiscFunctionKey(ksym
) ||
162 IsPrivateKeypadKey(ksym
))
168 running
= !auth_userokay(getlogin(), NULL
, "auth-slock", passwd
);
171 if (!(encrypted
= crypt(passwd
, pws
)))
172 fprintf(stderr
, "slock: crypt: %s\n", strerror(errno
));
174 running
= !!strcmp(encrypted
, pws
);
180 explicit_bzero(&passwd
, sizeof(passwd
));
184 explicit_bzero(&passwd
, sizeof(passwd
));
192 if (num
&& !iscntrl((int)buf
[0]) && (len
+ num
< sizeof(passwd
))) {
193 memcpy(passwd
+ len
, buf
, num
);
198 color
= len
? INPUT
: (failure
|| failonclear
? FAILED
: INIT
);
199 if (running
&& oldc
!= color
) {
200 for (screen
= 0; screen
< nscreens
; screen
++) {
201 XSetWindowBackground(dpy
, locks
[screen
]->win
, locks
[screen
]->colors
[color
]);
202 XClearWindow(dpy
, locks
[screen
]->win
);
206 } else if (rr
&& ev
.type
== rrevbase
+ RRScreenChangeNotify
) {
207 XRRScreenChangeNotifyEvent
*rre
= (XRRScreenChangeNotifyEvent
*)&ev
;
208 for (screen
= 0; screen
< nscreens
; screen
++) {
209 if (locks
[screen
]->win
== rre
->window
) {
210 XResizeWindow(dpy
, locks
[screen
]->win
, rre
->width
, rre
->height
);
211 XClearWindow(dpy
, locks
[screen
]->win
);
214 } else for (screen
= 0; screen
< nscreens
; screen
++)
215 XRaiseWindow(dpy
, locks
[screen
]->win
);
220 unlockscreen(Display
*dpy
, Lock
*lock
)
222 if(dpy
== NULL
|| lock
== NULL
)
225 XUngrabPointer(dpy
, CurrentTime
);
226 XUngrabKeyboard(dpy
, CurrentTime
);
227 XFreeColors(dpy
, DefaultColormap(dpy
, lock
->screen
), lock
->colors
, NUMCOLS
, 0);
228 XFreePixmap(dpy
, lock
->pmap
);
229 XDestroyWindow(dpy
, lock
->win
);
235 cleanup(Display
*dpy
)
242 lockscreen(Display
*dpy
, int screen
)
244 char curs
[] = {0, 0, 0, 0, 0, 0, 0, 0};
245 int i
, ptgrab
, kbgrab
;
248 XSetWindowAttributes wa
;
251 if (!running
|| dpy
== NULL
|| screen
< 0 || !(lock
= malloc(sizeof(Lock
))))
254 lock
->screen
= screen
;
255 lock
->root
= RootWindow(dpy
, lock
->screen
);
257 for (i
= 0; i
< NUMCOLS
; i
++) {
258 XAllocNamedColor(dpy
, DefaultColormap(dpy
, lock
->screen
), colorname
[i
], &color
, &dummy
);
259 lock
->colors
[i
] = color
.pixel
;
263 wa
.override_redirect
= 1;
264 wa
.background_pixel
= lock
->colors
[INIT
];
265 lock
->win
= XCreateWindow(dpy
, lock
->root
, 0, 0, DisplayWidth(dpy
, lock
->screen
), DisplayHeight(dpy
, lock
->screen
),
266 0, DefaultDepth(dpy
, lock
->screen
), CopyFromParent
,
267 DefaultVisual(dpy
, lock
->screen
), CWOverrideRedirect
| CWBackPixel
, &wa
);
268 lock
->pmap
= XCreateBitmapFromData(dpy
, lock
->win
, curs
, 8, 8);
269 invisible
= XCreatePixmapCursor(dpy
, lock
->pmap
, lock
->pmap
, &color
, &color
, 0, 0);
270 XDefineCursor(dpy
, lock
->win
, invisible
);
272 /* Try to grab mouse pointer *and* keyboard for 600ms, else fail the lock */
273 for (i
= 6, ptgrab
= kbgrab
= -1; i
; --i
) {
274 if (ptgrab
!= GrabSuccess
) {
275 ptgrab
= XGrabPointer(dpy
, lock
->root
, False
,
276 ButtonPressMask
| ButtonReleaseMask
|
277 PointerMotionMask
, GrabModeAsync
,
278 GrabModeAsync
, None
, invisible
, CurrentTime
);
280 if (kbgrab
!= GrabSuccess
) {
281 kbgrab
= XGrabKeyboard(dpy
, lock
->root
, True
,
282 GrabModeAsync
, GrabModeAsync
, CurrentTime
);
285 /* input is grabbed: we can lock the screen */
286 if (ptgrab
== GrabSuccess
&& kbgrab
== GrabSuccess
) {
287 XMapRaised(dpy
, lock
->win
);
289 XRRSelectInput(dpy
, lock
->win
, RRScreenChangeNotifyMask
);
291 XSelectInput(dpy
, lock
->root
, SubstructureNotifyMask
);
295 /* retry on AlreadyGrabbed but fail on other errors */
296 if ((ptgrab
!= AlreadyGrabbed
&& ptgrab
!= GrabSuccess
) ||
297 (kbgrab
!= AlreadyGrabbed
&& kbgrab
!= GrabSuccess
))
303 /* we couldn't grab all input: fail out */
304 if (ptgrab
!= GrabSuccess
)
305 fprintf(stderr
, "slock: unable to grab mouse pointer for screen %d\n", screen
);
306 if (kbgrab
!= GrabSuccess
)
307 fprintf(stderr
, "slock: unable to grab keyboard for screen %d\n", screen
);
309 unlockscreen(dpy
, lock
);
316 die("usage: slock [-v] [cmd [arg ...]]\n");
320 main(int argc
, char **argv
) {
321 #ifndef HAVE_BSD_AUTH
329 fprintf(stderr
, "slock-"VERSION
"\n");
339 /* Check if the current user has a password entry */
341 if (!getpwuid(getuid())) {
343 die("slock: no password entry for current user\n");
345 die("slock: getpwuid: %s\n", strerror(errno
));
348 #ifndef HAVE_BSD_AUTH
351 die("slock: failed to get user password hash.\n");
354 if (!(dpy
= XOpenDisplay(NULL
)))
355 die("slock: cannot open display\n");
357 /* check for Xrandr support */
358 rr
= XRRQueryExtension(dpy
, &rrevbase
, &rrerrbase
);
360 /* get number of screens in display "dpy" and blank them */
361 nscreens
= ScreenCount(dpy
);
362 if (!(locks
= malloc(sizeof(Lock
*) * nscreens
))) {
364 die("slock: out of memory\n");
366 for (nlocks
= 0, s
= 0; s
< nscreens
; s
++) {
367 if ((locks
[s
] = lockscreen(dpy
, s
)) != NULL
)
372 /* did we actually manage to lock anything? */
374 /* nothing to protect */
379 /* run post-lock command */
384 die("slock: fork failed: %s\n", strerror(errno
));
386 if (close(ConnectionNumber(dpy
)) < 0)
387 die("slock: close: %s\n", strerror(errno
));
388 execvp(argv
[0], argv
);
389 fprintf(stderr
, "slock: execvp %s: %s\n", argv
[0],
395 /* everything is now blank. Wait for the correct password */
402 /* password ok, unlock everything and quit */
403 for (s
= 0; s
< nscreens
; s
++)
404 unlockscreen(dpy
, locks
[s
]);