sway-patched-tray-menu/sway/main.c

472 lines
11 KiB
C
Raw Normal View History

#define _XOPEN_SOURCE 700
2017-03-11 05:41:24 +01:00
#define _POSIX_C_SOURCE 200112L
2017-11-18 17:22:02 +01:00
#include <getopt.h>
#include <signal.h>
#include <stdbool.h>
2017-11-18 17:22:02 +01:00
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <sys/stat.h>
2017-11-18 17:22:02 +01:00
#include <sys/types.h>
#include <sys/wait.h>
#include <sys/un.h>
#include <unistd.h>
2017-01-12 03:25:03 +01:00
#ifdef __linux__
#include <sys/capability.h>
2017-01-12 03:25:03 +01:00
#include <sys/prctl.h>
#endif
#include "sway/server.h"
2017-11-19 23:04:28 +01:00
#include "sway/layout.h"
#include "ipc-client.h"
2017-11-19 23:04:28 +01:00
#include "log.h"
2016-09-01 14:18:37 +02:00
#include "readline.h"
#include "stringop.h"
#include "util.h"
2015-08-20 15:12:34 +02:00
static bool terminate_request = false;
static int exit_value = 0;
struct sway_server server;
2015-08-20 15:12:34 +02:00
void sway_terminate(int exit_code) {
2015-08-20 15:12:34 +02:00
terminate_request = true;
exit_value = exit_code;
wl_display_terminate(server.wl_display);
2015-08-20 15:12:34 +02:00
}
2015-08-05 03:02:46 +02:00
void sig_handler(int signal) {
2017-11-18 17:22:02 +01:00
//close_views(&root_container);
sway_terminate(EXIT_SUCCESS);
}
2017-08-14 19:38:43 +02:00
void detect_raspi() {
bool raspi = false;
FILE *f = fopen("/sys/firmware/devicetree/base/model", "r");
if (!f) {
return;
}
char *line;
while(!feof(f)) {
if (!(line = read_line(f))) {
break;
}
if (strstr(line, "Raspberry Pi")) {
raspi = true;
}
free(line);
}
fclose(f);
FILE *g = fopen("/proc/modules", "r");
if (!g) {
return;
}
bool vc4 = false;
while (!feof(g)) {
if (!(line = read_line(g))) {
break;
}
if (strstr(line, "vc4")) {
vc4 = true;
}
free(line);
}
fclose(g);
if (!vc4 && raspi) {
fprintf(stderr, "\x1B[1;31mWarning: You have a "
"Raspberry Pi, but the vc4 Module is "
"not loaded! Set 'dtoverlay=vc4-kms-v3d'"
"in /boot/config.txt and reboot.\x1B[0m\n");
}
}
2015-12-14 17:13:44 +01:00
void detect_proprietary() {
FILE *f = fopen("/proc/modules", "r");
if (!f) {
return;
}
bool nvidia = false, nvidia_modeset = false, nvidia_uvm = false, nvidia_drm = false;
while (!feof(f)) {
2016-12-15 23:08:56 +01:00
char *line;
if (!(line = read_line(f))) {
break;
}
if (strstr(line, "nvidia")) {
nvidia = true;
}
if (strstr(line, "nvidia_modeset")) {
nvidia_modeset = true;
}
if (strstr(line, "nvidia_uvm")) {
nvidia_uvm = true;
}
if (strstr(line, "nvidia_drm")) {
nvidia_drm = true;
}
2015-12-14 17:13:44 +01:00
if (strstr(line, "fglrx")) {
fprintf(stderr, "\x1B[1;31mWarning: Proprietary AMD drivers do "
"NOT support Wayland. Use radeon.\x1B[0m\n");
2015-12-14 17:13:44 +01:00
free(line);
break;
}
free(line);
}
fclose(f);
if (nvidia) {
fprintf(stderr, "\x1B[1;31mWarning: Proprietary nvidia driver support "
"is considered experimental. Nouveau is strongly recommended."
"\x1B[0m\n");
if (!nvidia_modeset || !nvidia_uvm || !nvidia_drm) {
fprintf(stderr, "\x1B[1;31mWarning: You do not have all of the "
"necessary kernel modules loaded for nvidia support. "
"You need nvidia, nvidia_modeset, nvidia_uvm, and nvidia_drm."
"\x1B[0m\n");
}
#ifdef __linux__
f = fopen("/sys/module/nvidia_drm/parameters/modeset", "r");
if (f) {
char *line = read_line(f);
if (line && strstr(line, "Y")) {
// nvidia-drm.modeset is set to 0
fprintf(stderr, "\x1B[1;31mWarning: You must load "
"nvidia-drm with the modeset option on to use "
"the proprietary driver. Consider adding "
"nvidia-drm.modeset=1 to your kernel command line "
"parameters.\x1B[0m\n");
}
fclose(f);
free(line);
} else {
// nvidia-drm.modeset is not set
fprintf(stderr, "\x1B[1;31mWarning: You must load "
"nvidia-drm with the modeset option on to use "
"the proprietary driver. Consider adding "
"nvidia-drm.modeset=1 to your kernel command line "
"parameters.\x1B[0m\n");
}
#else
f = fopen("/proc/cmdline", "r");
if (f) {
char *line = read_line(f);
if (line && !strstr(line, "nvidia-drm.modeset=1")) {
fprintf(stderr, "\x1B[1;31mWarning: You must add "
"nvidia-drm.modeset=1 to your kernel command line to use "
"the proprietary driver.\x1B[0m\n");
}
fclose(f);
free(line);
}
#endif
}
}
void run_as_ipc_client(char *command, char *socket_path) {
int socketfd = ipc_open_socket(socket_path);
uint32_t len = strlen(command);
char *resp = ipc_single_command(socketfd, IPC_COMMAND, command, &len);
printf("%s\n", resp);
close(socketfd);
}
2016-10-27 16:37:16 +02:00
static void log_env() {
const char *log_vars[] = {
"PATH",
"LD_LOAD_PATH",
"LD_PRELOAD_PATH",
2016-10-27 17:05:04 +02:00
"LD_LIBRARY_PATH",
2016-10-27 16:37:16 +02:00
"SWAY_CURSOR_THEME",
"SWAY_CURSOR_SIZE",
"SWAYSOCK"
2016-10-27 16:37:16 +02:00
};
for (size_t i = 0; i < sizeof(log_vars) / sizeof(char *); ++i) {
sway_log(L_INFO, "%s=%s", log_vars[i], getenv(log_vars[i]));
}
}
2016-10-27 16:48:46 +02:00
static void log_distro() {
const char *paths[] = {
"/etc/lsb-release",
"/etc/os-release",
"/etc/debian_version",
"/etc/redhat-release",
"/etc/gentoo-release",
};
for (size_t i = 0; i < sizeof(paths) / sizeof(char *); ++i) {
FILE *f = fopen(paths[i], "r");
if (f) {
sway_log(L_INFO, "Contents of %s:", paths[i]);
while (!feof(f)) {
2016-12-15 23:08:56 +01:00
char *line;
if (!(line = read_line(f))) {
break;
}
2016-10-27 16:48:46 +02:00
if (*line) {
sway_log(L_INFO, "%s", line);
}
free(line);
}
fclose(f);
}
}
}
2016-10-27 16:50:22 +02:00
static void log_kernel() {
FILE *f = popen("uname -a", "r");
if (!f) {
sway_log(L_INFO, "Unable to determine kernel version");
return;
}
while (!feof(f)) {
2016-12-15 23:08:56 +01:00
char *line;
if (!(line = read_line(f))) {
break;
}
2016-10-27 16:50:22 +02:00
if (*line) {
sway_log(L_INFO, "%s", line);
}
free(line);
}
fclose(f);
}
static void security_sanity_check() {
// TODO: Notify users visually if this has issues
2016-12-02 03:58:38 +01:00
struct stat s;
if (stat("/proc", &s)) {
sway_log(L_ERROR,
"!! DANGER !! /proc is not available - sway CANNOT enforce security rules!");
}
#ifdef __linux__
2016-12-03 00:37:01 +01:00
cap_flag_value_t v;
cap_t cap = cap_get_proc();
if (!cap || cap_get_flag(cap, CAP_SYS_PTRACE, CAP_PERMITTED, &v) != 0 || v != CAP_SET) {
sway_log(L_ERROR,
"!! DANGER !! Sway does not have CAP_SYS_PTRACE and cannot enforce security rules for processes running as other users.");
}
if (cap) {
cap_free(cap);
}
#endif
}
static void executable_sanity_check() {
#ifdef __linux__
struct stat sb;
char *exe = realpath("/proc/self/exe", NULL);
stat(exe, &sb);
// We assume that cap_get_file returning NULL implies ENODATA
if (sb.st_mode & (S_ISUID|S_ISGID) && cap_get_file(exe)) {
sway_log(L_ERROR,
"sway executable has both the s(g)uid bit AND file caps set.");
sway_log(L_ERROR,
"This is strongly discouraged (and completely broken).");
sway_log(L_ERROR,
"Please clear one of them (either the suid bit, or the file caps).");
sway_log(L_ERROR,
"If unsure, strip the file caps.");
exit(EXIT_FAILURE);
}
free(exe);
#endif
}
static void drop_permissions(bool keep_caps) {
if (getuid() != geteuid() || getgid() != getegid()) {
if (setgid(getgid()) != 0) {
sway_log(L_ERROR, "Unable to drop root");
exit(EXIT_FAILURE);
}
if (setuid(getuid()) != 0) {
sway_log(L_ERROR, "Unable to drop root");
exit(EXIT_FAILURE);
}
}
if (setuid(0) != -1) {
sway_log(L_ERROR, "Root privileges can be restored.");
exit(EXIT_FAILURE);
}
#ifdef __linux__
if (keep_caps) {
// Drop every cap except CAP_SYS_PTRACE
cap_t caps = cap_init();
cap_value_t keep = CAP_SYS_PTRACE;
sway_log(L_INFO, "Dropping extra capabilities");
if (cap_set_flag(caps, CAP_PERMITTED, 1, &keep, CAP_SET) ||
cap_set_flag(caps, CAP_EFFECTIVE, 1, &keep, CAP_SET) ||
cap_set_proc(caps)) {
sway_log(L_ERROR, "Failed to drop extra capabilities");
exit(EXIT_FAILURE);
}
}
#endif
}
int main(int argc, char **argv) {
2015-08-20 14:37:09 +02:00
static int verbose = 0, debug = 0, validate = 0;
static struct option long_options[] = {
{"help", no_argument, NULL, 'h'},
2015-08-20 14:37:09 +02:00
{"config", required_argument, NULL, 'c'},
{"validate", no_argument, NULL, 'C'},
{"debug", no_argument, NULL, 'd'},
2015-08-20 14:37:09 +02:00
{"version", no_argument, NULL, 'v'},
{"verbose", no_argument, NULL, 'V'},
2015-08-20 14:37:09 +02:00
{"get-socketpath", no_argument, NULL, 'p'},
2015-08-26 20:01:26 +02:00
{0, 0, 0, 0}
2015-08-20 14:37:09 +02:00
};
char *config_path = NULL;
const char* usage =
"Usage: sway [options] [command]\n"
"\n"
" -h, --help Show help message and quit.\n"
" -c, --config <config> Specify a config file.\n"
" -C, --validate Check the validity of the config file, then exit.\n"
" -d, --debug Enables full logging, including debug information.\n"
" -v, --version Show the version number and quit.\n"
" -V, --verbose Enables more verbose logging.\n"
" --get-socketpath Gets the IPC socket path and prints it, then exits.\n"
"\n";
2016-12-02 16:23:30 +01:00
// Security:
unsetenv("LD_PRELOAD");
#ifdef _LD_LIBRARY_PATH
2016-12-02 16:23:30 +01:00
setenv("LD_LIBRARY_PATH", _LD_LIBRARY_PATH, 1);
#else
unsetenv("LD_LIBRARY_PATH");
#endif
2015-08-20 14:37:09 +02:00
int c;
while (1) {
int option_index = 0;
c = getopt_long(argc, argv, "hCdvVc:", long_options, &option_index);
2015-08-20 14:37:09 +02:00
if (c == -1) {
break;
}
switch (c) {
case 'h': // help
fprintf(stdout, "%s", usage);
exit(EXIT_SUCCESS);
break;
2015-08-20 14:37:09 +02:00
case 'c': // config
config_path = strdup(optarg);
break;
case 'C': // validate
validate = 1;
break;
case 'd': // debug
debug = 1;
break;
case 'v': // version
fprintf(stdout, "sway version " SWAY_VERSION "\n");
2015-11-28 14:47:44 +01:00
exit(EXIT_SUCCESS);
2015-08-20 14:37:09 +02:00
break;
case 'V': // verbose
verbose = 1;
break;
case 'p': ; // --get-socketpath
if (getenv("SWAYSOCK")) {
fprintf(stdout, "%s\n", getenv("SWAYSOCK"));
2015-11-28 14:47:44 +01:00
exit(EXIT_SUCCESS);
} else {
fprintf(stderr, "sway socket not detected.\n");
2015-11-28 14:47:44 +01:00
exit(EXIT_FAILURE);
}
2015-08-20 14:37:09 +02:00
break;
default:
fprintf(stderr, "%s", usage);
exit(EXIT_FAILURE);
2015-08-20 14:37:09 +02:00
}
}
// TODO: switch logging over to wlroots?
2017-05-11 18:29:10 +02:00
if (debug) {
init_log(L_DEBUG);
} else if (verbose || validate) {
init_log(L_INFO);
} else {
init_log(L_ERROR);
}
if (optind < argc) { // Behave as IPC client
if(optind != 1) {
sway_log(L_ERROR, "Don't use options with the IPC client");
exit(EXIT_FAILURE);
}
drop_permissions(false);
char *socket_path = getenv("SWAYSOCK");
if (!socket_path) {
sway_log(L_ERROR, "Unable to retrieve socket path");
exit(EXIT_FAILURE);
}
char *command = join_args(argv + optind, argc - optind);
run_as_ipc_client(command, socket_path);
return 0;
}
executable_sanity_check();
2017-01-12 03:25:03 +01:00
bool suid = false;
#ifdef __linux__
2017-01-12 03:25:03 +01:00
if (getuid() != geteuid() || getgid() != getegid()) {
// Retain capabilities after setuid()
if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0)) {
sway_log(L_ERROR, "Cannot keep caps after setuid()");
exit(EXIT_FAILURE);
}
suid = true;
}
#endif
log_kernel();
log_distro();
log_env();
2015-12-14 17:13:44 +01:00
detect_proprietary();
2017-08-14 19:38:43 +02:00
detect_raspi();
2017-01-12 03:25:03 +01:00
#ifdef __linux__
drop_permissions(suid);
2017-01-12 03:25:03 +01:00
#endif
// handle SIGTERM signals
signal(SIGTERM, sig_handler);
2016-01-22 02:29:18 +01:00
// prevent ipc from crashing sway
signal(SIGPIPE, SIG_IGN);
sway_log(L_INFO, "Starting sway version " SWAY_VERSION "\n");
2015-09-02 15:42:27 +02:00
if (!server_init(&server)) {
return 1;
}
2017-11-19 23:04:28 +01:00
init_layout();
2017-11-18 17:22:02 +01:00
//ipc_init();
2017-11-18 17:22:02 +01:00
//if (validate) {
// bool valid = load_main_config(config_path, false);
// return valid ? 0 : 1;
//}
2015-08-20 14:37:09 +02:00
2017-11-18 17:22:02 +01:00
//if (!load_main_config(config_path, false)) {
// sway_terminate(EXIT_FAILURE);
//}
2015-08-20 14:37:09 +02:00
if (config_path) {
free(config_path);
}
2016-12-02 14:42:26 +01:00
security_sanity_check();
2015-08-20 15:12:34 +02:00
if (!terminate_request) {
server_run(&server);
2015-08-20 15:12:34 +02:00
}
server_fini(&server);
2016-01-17 11:53:37 +01:00
2017-11-18 17:22:02 +01:00
//ipc_terminate();
2017-11-18 17:22:02 +01:00
//if (config) {
// free_config(config);
//}
return exit_value;
2015-08-05 03:02:46 +02:00
}