2012-01-30 17:04:04 +04:00
|
|
|
/*
|
|
|
|
* Copyright © 2012 Benjamin Franzke
|
|
|
|
*
|
2015-06-12 01:35:43 +03:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
2012-01-30 17:04:04 +04:00
|
|
|
*
|
2015-06-12 01:35:43 +03:00
|
|
|
* The above copyright notice and this permission notice (including the
|
|
|
|
* next paragraph) shall be included in all copies or substantial
|
|
|
|
* portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
|
|
* SOFTWARE.
|
2012-01-30 17:04:04 +04:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
2014-10-03 22:13:42 +04:00
|
|
|
#include <stdbool.h>
|
2012-01-30 17:04:04 +04:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
2013-07-23 22:43:03 +04:00
|
|
|
#include <poll.h>
|
2012-01-30 17:04:04 +04:00
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
#include <error.h>
|
|
|
|
#include <getopt.h>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/signalfd.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
|
|
|
|
#include <linux/vt.h>
|
|
|
|
#include <linux/major.h>
|
2013-09-18 09:43:22 +04:00
|
|
|
#include <linux/kd.h>
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
|
|
|
#include <security/pam_appl.h>
|
|
|
|
|
|
|
|
#ifdef HAVE_SYSTEMD_LOGIN
|
|
|
|
#include <systemd/sd-login.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "weston-launch.h"
|
|
|
|
|
2013-09-18 01:03:42 +04:00
|
|
|
#define DRM_MAJOR 226
|
|
|
|
|
2013-09-19 10:00:17 +04:00
|
|
|
#ifndef KDSKBMUTE
|
|
|
|
#define KDSKBMUTE 0x4B51
|
|
|
|
#endif
|
|
|
|
|
2013-10-26 00:34:58 +04:00
|
|
|
#ifndef EVIOCREVOKE
|
|
|
|
#define EVIOCREVOKE _IOW('E', 0x91, int)
|
|
|
|
#endif
|
|
|
|
|
2013-05-17 18:20:37 +04:00
|
|
|
#define MAX_ARGV_SIZE 256
|
|
|
|
|
2013-11-25 02:37:07 +04:00
|
|
|
#ifdef HAVE_LIBDRM
|
|
|
|
|
|
|
|
#include <xf86drm.h>
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
static inline int
|
|
|
|
drmDropMaster(int drm_fd)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int
|
|
|
|
drmSetMaster(int drm_fd)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
struct weston_launch {
|
|
|
|
struct pam_conv pc;
|
|
|
|
pam_handle_t *ph;
|
|
|
|
int tty;
|
|
|
|
int ttynr;
|
|
|
|
int sock[2];
|
2013-09-18 09:15:37 +04:00
|
|
|
int drm_fd;
|
2013-10-26 00:34:58 +04:00
|
|
|
int last_input_fd;
|
2013-09-18 09:43:22 +04:00
|
|
|
int kb_mode;
|
2012-01-30 17:04:04 +04:00
|
|
|
struct passwd *pw;
|
|
|
|
|
|
|
|
int signalfd;
|
|
|
|
|
|
|
|
pid_t child;
|
|
|
|
int verbose;
|
2013-07-22 21:35:47 +04:00
|
|
|
char *new_user;
|
2012-01-30 17:04:04 +04:00
|
|
|
};
|
|
|
|
|
2012-04-10 09:26:18 +04:00
|
|
|
union cmsg_data { unsigned char b[4]; int fd; };
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
static gid_t *
|
|
|
|
read_groups(void)
|
|
|
|
{
|
|
|
|
int n;
|
|
|
|
gid_t *groups;
|
2015-06-06 16:02:22 +03:00
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
n = getgroups(0, NULL);
|
2012-12-05 22:47:11 +04:00
|
|
|
|
|
|
|
if (n < 0) {
|
|
|
|
fprintf(stderr, "Unable to retrieve groups: %m\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
groups = malloc(n * sizeof(gid_t));
|
|
|
|
if (!groups)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (getgroups(n, groups) < 0) {
|
2012-12-05 22:47:11 +04:00
|
|
|
fprintf(stderr, "Unable to retrieve groups: %m\n");
|
2012-01-30 17:04:04 +04:00
|
|
|
free(groups);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return groups;
|
|
|
|
}
|
|
|
|
|
2014-10-03 22:13:42 +04:00
|
|
|
static bool
|
2012-01-30 17:04:04 +04:00
|
|
|
weston_launch_allowed(struct weston_launch *wl)
|
|
|
|
{
|
|
|
|
struct group *gr;
|
|
|
|
gid_t *groups;
|
|
|
|
int i;
|
|
|
|
#ifdef HAVE_SYSTEMD_LOGIN
|
|
|
|
char *session, *seat;
|
|
|
|
int err;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (getuid() == 0)
|
2014-10-03 22:13:42 +04:00
|
|
|
return true;
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
gr = getgrnam("weston-launch");
|
|
|
|
if (gr) {
|
|
|
|
groups = read_groups();
|
|
|
|
if (groups) {
|
|
|
|
for (i = 0; groups[i]; ++i) {
|
|
|
|
if (groups[i] == gr->gr_gid) {
|
|
|
|
free(groups);
|
2014-10-03 22:13:42 +04:00
|
|
|
return true;
|
2012-01-30 17:04:04 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
free(groups);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef HAVE_SYSTEMD_LOGIN
|
|
|
|
err = sd_pid_get_session(getpid(), &session);
|
|
|
|
if (err == 0 && session) {
|
|
|
|
if (sd_session_is_active(session) &&
|
|
|
|
sd_session_get_seat(session, &seat) == 0) {
|
|
|
|
free(seat);
|
|
|
|
free(session);
|
2014-10-03 22:13:42 +04:00
|
|
|
return true;
|
2012-01-30 17:04:04 +04:00
|
|
|
}
|
|
|
|
free(session);
|
|
|
|
}
|
|
|
|
#endif
|
2015-06-06 16:02:22 +03:00
|
|
|
|
2014-10-03 22:13:42 +04:00
|
|
|
return false;
|
2012-01-30 17:04:04 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
pam_conversation_fn(int msg_count,
|
|
|
|
const struct pam_message **messages,
|
|
|
|
struct pam_response **responses,
|
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
return PAM_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
setup_pam(struct weston_launch *wl)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
wl->pc.conv = pam_conversation_fn;
|
|
|
|
wl->pc.appdata_ptr = wl;
|
|
|
|
|
|
|
|
err = pam_start("login", wl->pw->pw_name, &wl->pc, &wl->ph);
|
2012-10-12 14:25:05 +04:00
|
|
|
if (err != PAM_SUCCESS) {
|
|
|
|
fprintf(stderr, "failed to start pam transaction: %d: %s\n",
|
|
|
|
err, pam_strerror(wl->ph, err));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
err = pam_set_item(wl->ph, PAM_TTY, ttyname(wl->tty));
|
|
|
|
if (err != PAM_SUCCESS) {
|
|
|
|
fprintf(stderr, "failed to set PAM_TTY item: %d: %s\n",
|
|
|
|
err, pam_strerror(wl->ph, err));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = pam_open_session(wl->ph, 0);
|
|
|
|
if (err != PAM_SUCCESS) {
|
|
|
|
fprintf(stderr, "failed to open pam session: %d: %s\n",
|
|
|
|
err, pam_strerror(wl->ph, err));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
setup_launcher_socket(struct weston_launch *wl)
|
|
|
|
{
|
2013-09-18 22:01:48 +04:00
|
|
|
if (socketpair(AF_LOCAL, SOCK_SEQPACKET, 0, wl->sock) < 0)
|
2012-01-30 17:04:04 +04:00
|
|
|
error(1, errno, "socketpair failed");
|
2015-06-06 16:02:22 +03:00
|
|
|
|
2013-09-18 22:00:56 +04:00
|
|
|
if (fcntl(wl->sock[0], F_SETFD, FD_CLOEXEC) < 0)
|
|
|
|
error(1, errno, "fcntl failed");
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
setup_signals(struct weston_launch *wl)
|
|
|
|
{
|
2013-03-09 22:38:56 +04:00
|
|
|
int ret;
|
2012-01-30 17:04:04 +04:00
|
|
|
sigset_t mask;
|
|
|
|
struct sigaction sa;
|
|
|
|
|
|
|
|
memset(&sa, 0, sizeof sa);
|
|
|
|
sa.sa_handler = SIG_DFL;
|
|
|
|
sa.sa_flags = SA_NOCLDSTOP | SA_RESTART;
|
2013-03-09 22:38:56 +04:00
|
|
|
ret = sigaction(SIGCHLD, &sa, NULL);
|
|
|
|
assert(ret == 0);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-22 22:59:18 +04:00
|
|
|
sa.sa_handler = SIG_IGN;
|
|
|
|
sa.sa_flags = 0;
|
|
|
|
sigaction(SIGHUP, &sa, NULL);
|
|
|
|
|
2013-03-09 22:38:56 +04:00
|
|
|
ret = sigemptyset(&mask);
|
|
|
|
assert(ret == 0);
|
2012-01-30 17:04:04 +04:00
|
|
|
sigaddset(&mask, SIGCHLD);
|
|
|
|
sigaddset(&mask, SIGINT);
|
|
|
|
sigaddset(&mask, SIGTERM);
|
2013-09-18 09:15:37 +04:00
|
|
|
sigaddset(&mask, SIGUSR1);
|
|
|
|
sigaddset(&mask, SIGUSR2);
|
2013-03-09 22:38:56 +04:00
|
|
|
ret = sigprocmask(SIG_BLOCK, &mask, NULL);
|
|
|
|
assert(ret == 0);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
wl->signalfd = signalfd(-1, &mask, SFD_NONBLOCK | SFD_CLOEXEC);
|
|
|
|
if (wl->signalfd < 0)
|
|
|
|
return -errno;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
setenv_fd(const char *env, int fd)
|
|
|
|
{
|
|
|
|
char buf[32];
|
|
|
|
|
|
|
|
snprintf(buf, sizeof buf, "%d", fd);
|
|
|
|
setenv(env, buf, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2013-09-18 09:15:37 +04:00
|
|
|
send_reply(struct weston_launch *wl, int reply)
|
2012-01-30 17:04:04 +04:00
|
|
|
{
|
2013-09-18 09:15:37 +04:00
|
|
|
int len;
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
do {
|
2013-09-18 09:15:37 +04:00
|
|
|
len = send(wl->sock[0], &reply, sizeof reply, 0);
|
2012-01-30 17:04:04 +04:00
|
|
|
} while (len < 0 && errno == EINTR);
|
|
|
|
|
2013-09-18 09:15:37 +04:00
|
|
|
return len;
|
2012-01-30 17:04:04 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
handle_open(struct weston_launch *wl, struct msghdr *msg, ssize_t len)
|
|
|
|
{
|
|
|
|
int fd = -1, ret = -1;
|
|
|
|
char control[CMSG_SPACE(sizeof(fd))];
|
|
|
|
struct cmsghdr *cmsg;
|
|
|
|
struct stat s;
|
|
|
|
struct msghdr nmsg;
|
|
|
|
struct iovec iov;
|
|
|
|
struct weston_launcher_open *message;
|
2012-04-10 09:26:18 +04:00
|
|
|
union cmsg_data *data;
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
message = msg->msg_iov->iov_base;
|
|
|
|
if ((size_t)len < sizeof(*message))
|
|
|
|
goto err0;
|
|
|
|
|
|
|
|
/* Ensure path is null-terminated */
|
|
|
|
((char *) message)[len-1] = '\0';
|
|
|
|
|
|
|
|
fd = open(message->path, message->flags);
|
2013-05-20 19:55:10 +04:00
|
|
|
if (fd < 0) {
|
|
|
|
fprintf(stderr, "Error opening device %s: %m\n",
|
|
|
|
message->path);
|
2012-01-30 17:04:04 +04:00
|
|
|
goto err0;
|
2013-05-20 19:55:10 +04:00
|
|
|
}
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-09-19 09:14:09 +04:00
|
|
|
if (fstat(fd, &s) < 0) {
|
|
|
|
close(fd);
|
|
|
|
fd = -1;
|
|
|
|
fprintf(stderr, "Failed to stat %s\n", message->path);
|
|
|
|
goto err0;
|
|
|
|
}
|
|
|
|
|
2013-09-18 01:03:42 +04:00
|
|
|
if (major(s.st_rdev) != INPUT_MAJOR &&
|
|
|
|
major(s.st_rdev) != DRM_MAJOR) {
|
2012-01-30 17:04:04 +04:00
|
|
|
close(fd);
|
|
|
|
fd = -1;
|
2013-09-18 01:03:42 +04:00
|
|
|
fprintf(stderr, "Device %s is not an input or drm device\n",
|
2013-05-20 19:55:10 +04:00
|
|
|
message->path);
|
2012-01-30 17:04:04 +04:00
|
|
|
goto err0;
|
|
|
|
}
|
|
|
|
|
|
|
|
err0:
|
|
|
|
memset(&nmsg, 0, sizeof nmsg);
|
|
|
|
nmsg.msg_iov = &iov;
|
|
|
|
nmsg.msg_iovlen = 1;
|
|
|
|
if (fd != -1) {
|
|
|
|
nmsg.msg_control = control;
|
|
|
|
nmsg.msg_controllen = sizeof control;
|
|
|
|
cmsg = CMSG_FIRSTHDR(&nmsg);
|
|
|
|
cmsg->cmsg_level = SOL_SOCKET;
|
|
|
|
cmsg->cmsg_type = SCM_RIGHTS;
|
|
|
|
cmsg->cmsg_len = CMSG_LEN(sizeof(fd));
|
2012-04-10 09:26:18 +04:00
|
|
|
data = (union cmsg_data *) CMSG_DATA(cmsg);
|
|
|
|
data->fd = fd;
|
2012-01-30 17:04:04 +04:00
|
|
|
nmsg.msg_controllen = cmsg->cmsg_len;
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
iov.iov_base = &ret;
|
|
|
|
iov.iov_len = sizeof ret;
|
|
|
|
|
|
|
|
if (wl->verbose)
|
|
|
|
fprintf(stderr, "weston-launch: opened %s: ret: %d, fd: %d\n",
|
|
|
|
message->path, ret, fd);
|
|
|
|
do {
|
|
|
|
len = sendmsg(wl->sock[0], &nmsg, 0);
|
|
|
|
} while (len < 0 && errno == EINTR);
|
|
|
|
|
|
|
|
if (len < 0)
|
|
|
|
return -1;
|
|
|
|
|
2013-10-09 22:25:14 +04:00
|
|
|
if (fd != -1 && major(s.st_rdev) == DRM_MAJOR)
|
2013-09-18 09:15:37 +04:00
|
|
|
wl->drm_fd = fd;
|
2013-10-26 00:34:58 +04:00
|
|
|
if (fd != -1 && major(s.st_rdev) == INPUT_MAJOR &&
|
|
|
|
wl->last_input_fd < fd)
|
|
|
|
wl->last_input_fd = fd;
|
2013-09-18 09:15:37 +04:00
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
handle_socket_msg(struct weston_launch *wl)
|
|
|
|
{
|
|
|
|
char control[CMSG_SPACE(sizeof(int))];
|
|
|
|
char buf[BUFSIZ];
|
|
|
|
struct msghdr msg;
|
|
|
|
struct iovec iov;
|
|
|
|
int ret = -1;
|
|
|
|
ssize_t len;
|
|
|
|
struct weston_launcher_message *message;
|
|
|
|
|
|
|
|
memset(&msg, 0, sizeof(msg));
|
|
|
|
iov.iov_base = buf;
|
|
|
|
iov.iov_len = sizeof buf;
|
|
|
|
msg.msg_iov = &iov;
|
|
|
|
msg.msg_iovlen = 1;
|
|
|
|
msg.msg_control = control;
|
|
|
|
msg.msg_controllen = sizeof control;
|
|
|
|
|
|
|
|
do {
|
|
|
|
len = recvmsg(wl->sock[0], &msg, 0);
|
|
|
|
} while (len < 0 && errno == EINTR);
|
|
|
|
|
|
|
|
if (len < 1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
message = (void *) buf;
|
|
|
|
switch (message->opcode) {
|
|
|
|
case WESTON_LAUNCHER_OPEN:
|
|
|
|
ret = handle_open(wl, &msg, len);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
quit(struct weston_launch *wl, int status)
|
|
|
|
{
|
2013-09-18 09:43:22 +04:00
|
|
|
struct vt_mode mode = { 0 };
|
2012-01-30 17:04:04 +04:00
|
|
|
int err;
|
|
|
|
|
|
|
|
close(wl->signalfd);
|
|
|
|
close(wl->sock[0]);
|
|
|
|
|
2013-07-22 21:35:47 +04:00
|
|
|
if (wl->new_user) {
|
|
|
|
err = pam_close_session(wl->ph, 0);
|
|
|
|
if (err)
|
|
|
|
fprintf(stderr, "pam_close_session failed: %d: %s\n",
|
|
|
|
err, pam_strerror(wl->ph, err));
|
|
|
|
pam_end(wl->ph, err);
|
|
|
|
}
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-09-19 10:00:17 +04:00
|
|
|
if (ioctl(wl->tty, KDSKBMUTE, 0) &&
|
|
|
|
ioctl(wl->tty, KDSKBMODE, wl->kb_mode))
|
2013-09-18 09:43:22 +04:00
|
|
|
fprintf(stderr, "failed to restore keyboard mode: %m\n");
|
|
|
|
|
|
|
|
if (ioctl(wl->tty, KDSETMODE, KD_TEXT))
|
|
|
|
fprintf(stderr, "failed to set KD_TEXT mode on tty: %m\n");
|
|
|
|
|
2013-10-31 03:27:16 +04:00
|
|
|
/* We have to drop master before we switch the VT back in
|
|
|
|
* VT_AUTO, so we don't risk switching to a VT with another
|
|
|
|
* display server, that will then fail to set drm master. */
|
|
|
|
drmDropMaster(wl->drm_fd);
|
|
|
|
|
2013-09-18 09:43:22 +04:00
|
|
|
mode.mode = VT_AUTO;
|
|
|
|
if (ioctl(wl->tty, VT_SETMODE, &mode) < 0)
|
|
|
|
fprintf(stderr, "could not reset vt handling\n");
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
exit(status);
|
|
|
|
}
|
|
|
|
|
2013-10-26 00:34:58 +04:00
|
|
|
static void
|
|
|
|
close_input_fds(struct weston_launch *wl)
|
|
|
|
{
|
|
|
|
struct stat s;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
for (fd = 3; fd <= wl->last_input_fd; fd++) {
|
|
|
|
if (fstat(fd, &s) == 0 && major(s.st_rdev) == INPUT_MAJOR) {
|
|
|
|
/* EVIOCREVOKE may fail if the kernel doesn't
|
|
|
|
* support it, but all we can do is ignore it. */
|
|
|
|
ioctl(fd, EVIOCREVOKE, 0);
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
static int
|
|
|
|
handle_signal(struct weston_launch *wl)
|
|
|
|
{
|
|
|
|
struct signalfd_siginfo sig;
|
2013-03-10 18:14:01 +04:00
|
|
|
int pid, status, ret;
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
if (read(wl->signalfd, &sig, sizeof sig) != sizeof sig) {
|
|
|
|
error(0, errno, "reading signalfd failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (sig.ssi_signo) {
|
|
|
|
case SIGCHLD:
|
|
|
|
pid = waitpid(-1, &status, 0);
|
|
|
|
if (pid == wl->child) {
|
|
|
|
wl->child = 0;
|
2013-03-10 18:14:01 +04:00
|
|
|
if (WIFEXITED(status))
|
|
|
|
ret = WEXITSTATUS(status);
|
|
|
|
else if (WIFSIGNALED(status))
|
|
|
|
/*
|
|
|
|
* If weston dies because of signal N, we
|
|
|
|
* return 10+N. This is distinct from
|
|
|
|
* weston-launch dying because of a signal
|
|
|
|
* (128+N).
|
|
|
|
*/
|
|
|
|
ret = 10 + WTERMSIG(status);
|
|
|
|
else
|
|
|
|
ret = 0;
|
|
|
|
quit(wl, ret);
|
2012-01-30 17:04:04 +04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SIGTERM:
|
|
|
|
case SIGINT:
|
|
|
|
if (wl->child)
|
2013-06-17 23:23:20 +04:00
|
|
|
kill(wl->child, sig.ssi_signo);
|
2012-01-30 17:04:04 +04:00
|
|
|
break;
|
2013-09-18 09:15:37 +04:00
|
|
|
case SIGUSR1:
|
|
|
|
send_reply(wl, WESTON_LAUNCHER_DEACTIVATE);
|
2013-10-26 00:34:58 +04:00
|
|
|
close_input_fds(wl);
|
2013-09-18 09:15:37 +04:00
|
|
|
drmDropMaster(wl->drm_fd);
|
|
|
|
ioctl(wl->tty, VT_RELDISP, 1);
|
|
|
|
break;
|
|
|
|
case SIGUSR2:
|
|
|
|
ioctl(wl->tty, VT_RELDISP, VT_ACKACQ);
|
|
|
|
drmSetMaster(wl->drm_fd);
|
|
|
|
send_reply(wl, WESTON_LAUNCHER_ACTIVATE);
|
|
|
|
break;
|
2012-01-30 17:04:04 +04:00
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
setup_tty(struct weston_launch *wl, const char *tty)
|
|
|
|
{
|
|
|
|
struct stat buf;
|
2013-09-18 09:15:37 +04:00
|
|
|
struct vt_mode mode = { 0 };
|
2012-01-30 17:04:04 +04:00
|
|
|
char *t;
|
|
|
|
|
2013-07-22 21:35:47 +04:00
|
|
|
if (!wl->new_user) {
|
|
|
|
wl->tty = STDIN_FILENO;
|
|
|
|
} else if (tty) {
|
2012-01-30 17:04:04 +04:00
|
|
|
t = ttyname(STDIN_FILENO);
|
|
|
|
if (t && strcmp(t, tty) == 0)
|
|
|
|
wl->tty = STDIN_FILENO;
|
|
|
|
else
|
|
|
|
wl->tty = open(tty, O_RDWR | O_NOCTTY);
|
|
|
|
} else {
|
|
|
|
int tty0 = open("/dev/tty0", O_WRONLY | O_CLOEXEC);
|
|
|
|
char filename[16];
|
|
|
|
|
|
|
|
if (tty0 < 0)
|
2012-04-17 21:10:11 +04:00
|
|
|
error(1, errno, "could not open tty0");
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
if (ioctl(tty0, VT_OPENQRY, &wl->ttynr) < 0 || wl->ttynr == -1)
|
2015-06-06 16:02:22 +03:00
|
|
|
error(1, errno, "failed to find non-opened console");
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
snprintf(filename, sizeof filename, "/dev/tty%d", wl->ttynr);
|
|
|
|
wl->tty = open(filename, O_RDWR | O_NOCTTY);
|
|
|
|
close(tty0);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (wl->tty < 0)
|
|
|
|
error(1, errno, "failed to open tty");
|
|
|
|
|
2013-10-03 00:06:02 +04:00
|
|
|
if (fstat(wl->tty, &buf) == -1 ||
|
|
|
|
major(buf.st_rdev) != TTY_MAJOR || minor(buf.st_rdev) == 0)
|
|
|
|
error(1, 0, "weston-launch must be run from a virtual terminal");
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
if (tty) {
|
|
|
|
if (fstat(wl->tty, &buf) < 0)
|
|
|
|
error(1, errno, "stat %s failed", tty);
|
|
|
|
|
|
|
|
if (major(buf.st_rdev) != TTY_MAJOR)
|
|
|
|
error(1, 0, "invalid tty device: %s", tty);
|
|
|
|
|
|
|
|
wl->ttynr = minor(buf.st_rdev);
|
|
|
|
}
|
|
|
|
|
2013-09-19 10:00:17 +04:00
|
|
|
if (ioctl(wl->tty, KDGKBMODE, &wl->kb_mode))
|
|
|
|
error(1, errno, "failed to get current keyboard mode: %m\n");
|
2013-09-18 09:43:22 +04:00
|
|
|
|
2013-09-19 10:00:17 +04:00
|
|
|
if (ioctl(wl->tty, KDSKBMUTE, 1) &&
|
|
|
|
ioctl(wl->tty, KDSKBMODE, K_OFF))
|
|
|
|
error(1, errno, "failed to set K_OFF keyboard mode: %m\n");
|
2013-09-18 09:43:22 +04:00
|
|
|
|
2013-09-19 10:00:17 +04:00
|
|
|
if (ioctl(wl->tty, KDSETMODE, KD_GRAPHICS))
|
2013-09-18 09:43:22 +04:00
|
|
|
error(1, errno, "failed to set KD_GRAPHICS mode on tty: %m\n");
|
|
|
|
|
2013-09-18 09:15:37 +04:00
|
|
|
mode.mode = VT_PROCESS;
|
|
|
|
mode.relsig = SIGUSR1;
|
|
|
|
mode.acqsig = SIGUSR2;
|
|
|
|
if (ioctl(wl->tty, VT_SETMODE, &mode) < 0)
|
|
|
|
error(1, errno, "failed to take control of vt handling\n");
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-07-20 08:25:20 +04:00
|
|
|
static void
|
2013-07-22 21:35:47 +04:00
|
|
|
setup_session(struct weston_launch *wl)
|
2013-07-20 08:25:20 +04:00
|
|
|
{
|
|
|
|
char **env;
|
2013-07-22 21:35:47 +04:00
|
|
|
char *term;
|
2013-07-20 08:25:20 +04:00
|
|
|
int i;
|
|
|
|
|
|
|
|
if (wl->tty != STDIN_FILENO) {
|
|
|
|
if (setsid() < 0)
|
|
|
|
error(1, errno, "setsid failed");
|
|
|
|
if (ioctl(wl->tty, TIOCSCTTY, 0) < 0)
|
|
|
|
error(1, errno, "TIOCSCTTY failed - tty is in use");
|
|
|
|
}
|
|
|
|
|
2013-07-22 21:35:47 +04:00
|
|
|
term = getenv("TERM");
|
|
|
|
clearenv();
|
2013-08-09 14:30:38 +04:00
|
|
|
if (term)
|
|
|
|
setenv("TERM", term, 1);
|
2013-07-22 21:35:47 +04:00
|
|
|
setenv("USER", wl->pw->pw_name, 1);
|
|
|
|
setenv("LOGNAME", wl->pw->pw_name, 1);
|
|
|
|
setenv("HOME", wl->pw->pw_dir, 1);
|
|
|
|
setenv("SHELL", wl->pw->pw_shell, 1);
|
|
|
|
|
2013-07-20 08:25:20 +04:00
|
|
|
env = pam_getenvlist(wl->ph);
|
|
|
|
if (env) {
|
|
|
|
for (i = 0; env[i]; ++i) {
|
2015-08-09 18:50:40 +03:00
|
|
|
if (putenv(env[i]) != 0)
|
2013-07-20 08:25:20 +04:00
|
|
|
error(0, 0, "putenv %s failed", env[i]);
|
|
|
|
}
|
|
|
|
free(env);
|
|
|
|
}
|
2013-07-22 21:35:47 +04:00
|
|
|
}
|
|
|
|
|
2013-08-06 06:10:09 +04:00
|
|
|
static void
|
|
|
|
drop_privileges(struct weston_launch *wl)
|
|
|
|
{
|
|
|
|
if (setgid(wl->pw->pw_gid) < 0 ||
|
|
|
|
#ifdef HAVE_INITGROUPS
|
|
|
|
initgroups(wl->pw->pw_name, wl->pw->pw_gid) < 0 ||
|
|
|
|
#endif
|
|
|
|
setuid(wl->pw->pw_uid) < 0)
|
|
|
|
error(1, errno, "dropping privileges failed");
|
|
|
|
}
|
|
|
|
|
2013-07-22 21:35:47 +04:00
|
|
|
static void
|
|
|
|
launch_compositor(struct weston_launch *wl, int argc, char *argv[])
|
|
|
|
{
|
|
|
|
char *child_argv[MAX_ARGV_SIZE];
|
2013-07-30 21:43:41 +04:00
|
|
|
sigset_t mask;
|
2013-07-22 21:35:47 +04:00
|
|
|
int i;
|
|
|
|
|
|
|
|
if (wl->verbose)
|
|
|
|
printf("weston-launch: spawned weston with pid: %d\n", getpid());
|
|
|
|
if (wl->new_user)
|
|
|
|
setup_session(wl);
|
2013-07-20 08:25:20 +04:00
|
|
|
|
2013-10-01 14:20:29 +04:00
|
|
|
if (geteuid() == 0)
|
|
|
|
drop_privileges(wl);
|
2013-08-06 06:10:09 +04:00
|
|
|
|
2013-09-19 10:00:17 +04:00
|
|
|
setenv_fd("WESTON_TTY_FD", wl->tty);
|
2013-07-20 08:25:20 +04:00
|
|
|
setenv_fd("WESTON_LAUNCHER_SOCK", wl->sock[1]);
|
|
|
|
|
|
|
|
unsetenv("DISPLAY");
|
|
|
|
|
2013-07-30 20:45:04 +04:00
|
|
|
/* Do not give our signal mask to the new process. */
|
|
|
|
sigemptyset(&mask);
|
|
|
|
sigaddset(&mask, SIGTERM);
|
|
|
|
sigaddset(&mask, SIGCHLD);
|
|
|
|
sigaddset(&mask, SIGINT);
|
|
|
|
sigprocmask(SIG_UNBLOCK, &mask, NULL);
|
|
|
|
|
2013-10-22 02:14:44 +04:00
|
|
|
child_argv[0] = "/bin/sh";
|
2013-07-20 08:25:20 +04:00
|
|
|
child_argv[1] = "-l";
|
|
|
|
child_argv[2] = "-c";
|
|
|
|
child_argv[3] = BINDIR "/weston \"$@\"";
|
|
|
|
child_argv[4] = "weston";
|
|
|
|
for (i = 0; i < argc; ++i)
|
|
|
|
child_argv[5 + i] = argv[i];
|
|
|
|
child_argv[5 + i] = NULL;
|
|
|
|
|
|
|
|
execv(child_argv[0], child_argv);
|
|
|
|
error(1, errno, "exec failed");
|
|
|
|
}
|
|
|
|
|
2012-01-30 17:04:04 +04:00
|
|
|
static void
|
|
|
|
help(const char *name)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "Usage: %s [args...] [-- [weston args..]]\n", name);
|
|
|
|
fprintf(stderr, " -u, --user Start session as specified username\n");
|
2012-04-17 21:10:11 +04:00
|
|
|
fprintf(stderr, " -t, --tty Start session on alternative tty\n");
|
2012-01-30 17:04:04 +04:00
|
|
|
fprintf(stderr, " -v, --verbose Be verbose\n");
|
|
|
|
fprintf(stderr, " -h, --help Display this help message\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
struct weston_launch wl;
|
|
|
|
int i, c;
|
2013-07-22 21:35:47 +04:00
|
|
|
char *tty = NULL;
|
2012-01-30 17:04:04 +04:00
|
|
|
struct option opts[] = {
|
|
|
|
{ "user", required_argument, NULL, 'u' },
|
|
|
|
{ "tty", required_argument, NULL, 't' },
|
|
|
|
{ "verbose", no_argument, NULL, 'v' },
|
|
|
|
{ "help", no_argument, NULL, 'h' },
|
|
|
|
{ 0, 0, NULL, 0 }
|
2015-06-06 16:02:22 +03:00
|
|
|
};
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
memset(&wl, 0, sizeof wl);
|
|
|
|
|
2013-07-20 08:26:24 +04:00
|
|
|
while ((c = getopt_long(argc, argv, "u:t::vh", opts, &i)) != -1) {
|
2012-01-30 17:04:04 +04:00
|
|
|
switch (c) {
|
|
|
|
case 'u':
|
2013-07-22 21:35:47 +04:00
|
|
|
wl.new_user = optarg;
|
2012-01-30 17:04:04 +04:00
|
|
|
if (getuid() != 0)
|
|
|
|
error(1, 0, "Permission denied. -u allowed for root only");
|
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
tty = optarg;
|
|
|
|
break;
|
|
|
|
case 'v':
|
|
|
|
wl.verbose = 1;
|
|
|
|
break;
|
|
|
|
case 'h':
|
2013-01-22 10:40:59 +04:00
|
|
|
help("weston-launch");
|
2013-03-12 01:06:52 +04:00
|
|
|
exit(EXIT_FAILURE);
|
2016-05-07 14:57:40 +03:00
|
|
|
default:
|
|
|
|
exit(EXIT_FAILURE);
|
2012-01-30 17:04:04 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-22 23:55:33 +04:00
|
|
|
if ((argc - optind) > (MAX_ARGV_SIZE - 6))
|
2013-05-17 18:20:37 +04:00
|
|
|
error(1, E2BIG, "Too many arguments to pass to weston");
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-22 21:35:47 +04:00
|
|
|
if (wl.new_user)
|
|
|
|
wl.pw = getpwnam(wl.new_user);
|
2012-01-30 17:04:04 +04:00
|
|
|
else
|
|
|
|
wl.pw = getpwuid(getuid());
|
|
|
|
if (wl.pw == NULL)
|
|
|
|
error(1, errno, "failed to get username");
|
|
|
|
|
|
|
|
if (!weston_launch_allowed(&wl))
|
2012-04-17 21:10:11 +04:00
|
|
|
error(1, 0, "Permission denied. You should either:\n"
|
2012-01-30 17:04:04 +04:00
|
|
|
#ifdef HAVE_SYSTEMD_LOGIN
|
|
|
|
" - run from an active and local (systemd) session.\n"
|
|
|
|
#else
|
|
|
|
" - enable systemd session support for weston-launch.\n"
|
|
|
|
#endif
|
2012-04-17 21:10:11 +04:00
|
|
|
" - or add yourself to the 'weston-launch' group.");
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
if (setup_tty(&wl, tty) < 0)
|
2013-03-12 01:06:52 +04:00
|
|
|
exit(EXIT_FAILURE);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-22 21:35:47 +04:00
|
|
|
if (wl.new_user && setup_pam(&wl) < 0)
|
2013-03-12 01:06:52 +04:00
|
|
|
exit(EXIT_FAILURE);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
if (setup_launcher_socket(&wl) < 0)
|
2013-03-12 01:06:52 +04:00
|
|
|
exit(EXIT_FAILURE);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
|
|
|
if (setup_signals(&wl) < 0)
|
2013-03-12 01:06:52 +04:00
|
|
|
exit(EXIT_FAILURE);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-20 08:25:20 +04:00
|
|
|
wl.child = fork();
|
2015-06-20 01:47:40 +03:00
|
|
|
if (wl.child == -1)
|
|
|
|
error(EXIT_FAILURE, errno, "fork failed");
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-20 08:25:20 +04:00
|
|
|
if (wl.child == 0)
|
|
|
|
launch_compositor(&wl, argc - optind, argv + optind);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-20 08:25:20 +04:00
|
|
|
close(wl.sock[1]);
|
|
|
|
if (wl.tty != STDIN_FILENO)
|
|
|
|
close(wl.tty);
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-20 08:25:20 +04:00
|
|
|
while (1) {
|
2013-07-23 22:43:03 +04:00
|
|
|
struct pollfd fds[2];
|
2013-07-20 08:25:20 +04:00
|
|
|
int n;
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-23 22:43:03 +04:00
|
|
|
fds[0].fd = wl.sock[0];
|
|
|
|
fds[0].events = POLLIN;
|
|
|
|
fds[1].fd = wl.signalfd;
|
|
|
|
fds[1].events = POLLIN;
|
2012-01-30 17:04:04 +04:00
|
|
|
|
2013-07-23 22:43:03 +04:00
|
|
|
n = poll(fds, 2, -1);
|
|
|
|
if (n < 0)
|
|
|
|
error(0, errno, "poll failed");
|
|
|
|
if (fds[0].revents & POLLIN)
|
2013-07-20 08:25:20 +04:00
|
|
|
handle_socket_msg(&wl);
|
2013-07-23 22:43:03 +04:00
|
|
|
if (fds[1].revents)
|
2013-07-20 08:25:20 +04:00
|
|
|
handle_signal(&wl);
|
2012-01-30 17:04:04 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|