2006-11-26 11:13:41 -07:00
|
|
|
/*
|
|
|
|
|
|
|
|
Copyright 1987, 1998 The Open Group
|
|
|
|
|
|
|
|
Permission to use, copy, modify, distribute, and sell this software and its
|
|
|
|
documentation for any purpose is hereby granted without fee, provided that
|
|
|
|
the above copyright notice appear in all copies and that both that
|
|
|
|
copyright notice and this permission notice appear in supporting
|
|
|
|
documentation.
|
|
|
|
|
|
|
|
The above copyright notice and this permission notice shall be included
|
|
|
|
in all copies or substantial portions of the Software.
|
|
|
|
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
|
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
|
|
IN NO EVENT SHALL THE OPEN GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR
|
|
|
|
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
|
|
|
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
|
|
|
OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
|
|
|
|
Except as contained in this notice, the name of The Open Group shall
|
|
|
|
not be used in advertising or otherwise to promote the sale, use or
|
|
|
|
other dealings in this Software without prior written authorization
|
|
|
|
from The Open Group.
|
|
|
|
|
|
|
|
Copyright 1987 by Digital Equipment Corporation, Maynard, Massachusetts,
|
|
|
|
Copyright 1994 Quarterdeck Office Systems.
|
|
|
|
|
|
|
|
All Rights Reserved
|
|
|
|
|
|
|
|
Permission to use, copy, modify, and distribute this software and its
|
|
|
|
documentation for any purpose and without fee is hereby granted,
|
|
|
|
provided that the above copyright notice appear in all copies and that
|
|
|
|
both that copyright notice and this permission notice appear in
|
|
|
|
supporting documentation, and that the names of Digital and
|
|
|
|
Quarterdeck not be used in advertising or publicity pertaining to
|
|
|
|
distribution of the software without specific, written prior
|
|
|
|
permission.
|
|
|
|
|
|
|
|
DIGITAL AND QUARTERDECK DISCLAIM ALL WARRANTIES WITH REGARD TO THIS
|
|
|
|
SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
|
|
|
FITNESS, IN NO EVENT SHALL DIGITAL BE LIABLE FOR ANY SPECIAL, INDIRECT
|
|
|
|
OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS
|
|
|
|
OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
|
|
|
|
OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE
|
|
|
|
OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_DIX_CONFIG_H
|
|
|
|
#include <dix-config.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef __CYGWIN__
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <signal.h>
|
2010-07-27 13:02:24 -06:00
|
|
|
/*
|
|
|
|
Sigh... We really need a prototype for this to know it is stdcall,
|
|
|
|
but #include-ing <windows.h> here is not a good idea...
|
|
|
|
*/
|
|
|
|
__stdcall unsigned long GetTickCount(void);
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(WIN32) && !defined(__CYGWIN__)
|
|
|
|
#include <X11/Xwinsock.h>
|
|
|
|
#endif
|
|
|
|
#include <X11/Xos.h>
|
|
|
|
#include <stdio.h>
|
2007-03-03 04:31:18 -07:00
|
|
|
#include <time.h>
|
2007-11-24 12:04:00 -07:00
|
|
|
#if !defined(WIN32) || !defined(__MINGW32__)
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/resource.h>
|
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
#include "misc.h"
|
|
|
|
#include <X11/X.h>
|
|
|
|
#define XSERV_t
|
|
|
|
#define TRANS_SERVER
|
|
|
|
#define TRANS_REOPEN
|
|
|
|
#include <X11/Xtrans/Xtrans.h>
|
|
|
|
#include "input.h"
|
|
|
|
#include "dixfont.h"
|
|
|
|
#include "osdep.h"
|
|
|
|
#include "extension.h"
|
|
|
|
#ifdef X_POSIX_C_SOURCE
|
|
|
|
#define _POSIX_C_SOURCE X_POSIX_C_SOURCE
|
|
|
|
#include <signal.h>
|
|
|
|
#undef _POSIX_C_SOURCE
|
|
|
|
#else
|
2009-09-06 13:44:18 -06:00
|
|
|
#if defined(_POSIX_SOURCE)
|
2006-11-26 11:13:41 -07:00
|
|
|
#include <signal.h>
|
|
|
|
#else
|
|
|
|
#define _POSIX_SOURCE
|
|
|
|
#include <signal.h>
|
|
|
|
#undef _POSIX_SOURCE
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
#ifndef WIN32
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
#if !defined(SYSV) && !defined(WIN32)
|
2006-11-26 11:13:41 -07:00
|
|
|
#include <sys/resource.h>
|
|
|
|
#endif
|
|
|
|
#include <sys/stat.h>
|
2012-06-10 07:21:05 -06:00
|
|
|
#include <ctype.h> /* for isspace */
|
2006-11-26 11:13:41 -07:00
|
|
|
#include <stdarg.h>
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
#include <stdlib.h> /* for malloc() */
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
#if defined(TCPCONN) || defined(STREAMSCONN)
|
2012-06-10 07:21:05 -06:00
|
|
|
#ifndef WIN32
|
|
|
|
#include <netdb.h>
|
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "opaque.h"
|
|
|
|
|
|
|
|
#include "dixstruct.h"
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
#include "xkbsrv.h"
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
#include "picture.h"
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noTestExtensions;
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef COMPOSITE
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noCompositeExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef DAMAGE
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noDamageExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef DBE
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noDbeExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef DPMSExtension
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noDPMSExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef GLXEXT
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noGlxExtension = FALSE;
|
|
|
|
Bool noGlxVisualInit = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef SCREENSAVER
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noScreenSaverExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef MITSHM
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noMITShmExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef RANDR
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noRRExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noRenderExtension = FALSE;
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XCSECURITY
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noSecurityExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef RES
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noResExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef XF86BIGFONT
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noXFree86BigfontExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef XFreeXDGA
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noXFree86DGAExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef XF86DRI
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noXFree86DRIExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef XF86VIDMODE
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noXFree86VidModeExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef XFIXES
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noXFixesExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef PANORAMIX
|
|
|
|
/* Xinerama is disabled by default unless enabled via +xinerama */
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noPanoramiXExtension = TRUE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2008-11-02 08:26:08 -07:00
|
|
|
#ifdef XSELINUX
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noSELinuxExtension = FALSE;
|
|
|
|
int selinuxEnforcingState = SELINUX_MODE_DEFAULT;
|
2008-11-02 08:26:08 -07:00
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XV
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noXvExtension = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2008-11-02 08:26:08 -07:00
|
|
|
#ifdef DRI2
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noDRI2Extension = FALSE;
|
2008-11-02 08:26:08 -07:00
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
Bool noGEExtension = FALSE;
|
2009-09-06 13:44:18 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#define X_INCLUDE_NETDB_H
|
|
|
|
#include <X11/Xos_r.h>
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
Bool CoreDump;
|
|
|
|
|
|
|
|
#ifdef PANORAMIX
|
|
|
|
Bool PanoramiXExtensionDisabledHack = FALSE;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int auditTrailLevel = 1;
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
char *SeatId = NULL;
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#if defined(SVR4) || defined(__linux__) || defined(CSRG_BASED)
|
|
|
|
#define HAS_SAVED_IDS_AND_SETEUID
|
|
|
|
#endif
|
|
|
|
|
|
|
|
OsSigHandlerPtr
|
2010-07-27 13:02:24 -06:00
|
|
|
OsSignal(int sig, OsSigHandlerPtr handler)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
struct sigaction act, oact;
|
|
|
|
|
|
|
|
sigemptyset(&act.sa_mask);
|
|
|
|
if (handler != SIG_IGN)
|
2012-06-10 07:21:05 -06:00
|
|
|
sigaddset(&act.sa_mask, sig);
|
2006-11-26 11:13:41 -07:00
|
|
|
act.sa_flags = 0;
|
|
|
|
act.sa_handler = handler;
|
2008-06-14 18:17:32 -06:00
|
|
|
if (sigaction(sig, &act, &oact))
|
2012-06-10 07:21:05 -06:00
|
|
|
perror("sigaction");
|
2006-11-26 11:13:41 -07:00
|
|
|
return oact.sa_handler;
|
|
|
|
}
|
2009-09-06 13:44:18 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
/*
|
|
|
|
* Explicit support for a server lock file like the ones used for UUCP.
|
|
|
|
* For architectures with virtual terminals that can run more than one
|
|
|
|
* server at a time. This keeps the servers from stomping on each other
|
|
|
|
* if the user forgets to give them different display numbers.
|
|
|
|
*/
|
|
|
|
#define LOCK_DIR "/tmp"
|
|
|
|
#define LOCK_TMP_PREFIX "/.tX"
|
|
|
|
#define LOCK_PREFIX "/.X"
|
|
|
|
#define LOCK_SUFFIX "-lock"
|
|
|
|
|
|
|
|
static Bool StillLocking = FALSE;
|
|
|
|
static char LockFile[PATH_MAX];
|
|
|
|
static Bool nolock = FALSE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* LockServer --
|
|
|
|
* Check if the server lock file exists. If so, check if the PID
|
|
|
|
* contained inside is valid. If so, then die. Otherwise, create
|
|
|
|
* the lock file containing the PID.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
LockServer(void)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
char tmp[PATH_MAX], pid_str[12];
|
|
|
|
int lfd, i, haslock, l_pid, t;
|
|
|
|
const char *tmppath = LOCK_DIR;
|
|
|
|
int len;
|
|
|
|
char port[20];
|
|
|
|
|
|
|
|
if (nolock)
|
|
|
|
return;
|
|
|
|
/*
|
|
|
|
* Path names
|
|
|
|
*/
|
|
|
|
snprintf(port, sizeof(port), "%d", atoi(display));
|
|
|
|
len = strlen(LOCK_PREFIX) > strlen(LOCK_TMP_PREFIX) ? strlen(LOCK_PREFIX) :
|
|
|
|
strlen(LOCK_TMP_PREFIX);
|
|
|
|
len += strlen(tmppath) + strlen(port) + strlen(LOCK_SUFFIX) + 1;
|
|
|
|
if (len > sizeof(LockFile))
|
|
|
|
FatalError("Display name `%s' is too long\n", port);
|
|
|
|
(void) snprintf(tmp, sizeof(tmp),
|
|
|
|
"%s" LOCK_TMP_PREFIX "%s" LOCK_SUFFIX, tmppath, port);
|
|
|
|
(void) snprintf(LockFile, sizeof(LockFile),
|
|
|
|
"%s" LOCK_PREFIX "%s" LOCK_SUFFIX, tmppath, port);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a temporary file containing our PID. Attempt three times
|
|
|
|
* to create the file.
|
|
|
|
*/
|
|
|
|
StillLocking = TRUE;
|
2006-11-26 11:13:41 -07:00
|
|
|
i = 0;
|
|
|
|
do {
|
2012-06-10 07:21:05 -06:00
|
|
|
i++;
|
|
|
|
lfd = open(tmp, O_CREAT | O_EXCL | O_WRONLY, 0644);
|
|
|
|
if (lfd < 0)
|
|
|
|
sleep(2);
|
|
|
|
else
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
} while (i < 3);
|
2012-06-10 07:21:05 -06:00
|
|
|
if (lfd < 0) {
|
2006-11-26 11:13:41 -07:00
|
|
|
unlink(tmp);
|
2012-06-10 07:21:05 -06:00
|
|
|
i = 0;
|
|
|
|
do {
|
|
|
|
i++;
|
|
|
|
lfd = open(tmp, O_CREAT | O_EXCL | O_WRONLY, 0644);
|
|
|
|
if (lfd < 0)
|
|
|
|
sleep(2);
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
} while (i < 3);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
if (lfd < 0)
|
|
|
|
FatalError("Could not create lock file in %s\n", tmp);
|
|
|
|
snprintf(pid_str, sizeof(pid_str), "%10ld\n", (long) getpid());
|
|
|
|
(void) write(lfd, pid_str, 11);
|
|
|
|
#ifdef __OpenBSD__
|
|
|
|
/* if possible give away the lock file to the real uid/gid */
|
|
|
|
fchown(lfd, getuid(), getgid());
|
|
|
|
#endif
|
|
|
|
(void) fchmod(lfd, 0444);
|
|
|
|
(void) close(lfd);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* OK. Now the tmp file exists. Try three times to move it in place
|
|
|
|
* for the lock.
|
|
|
|
*/
|
|
|
|
i = 0;
|
|
|
|
haslock = 0;
|
|
|
|
while ((!haslock) && (i++ < 3)) {
|
|
|
|
haslock = (link(tmp, LockFile) == 0);
|
|
|
|
if (haslock) {
|
|
|
|
/*
|
|
|
|
* We're done.
|
|
|
|
*/
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/*
|
|
|
|
* Read the pid from the existing file
|
|
|
|
*/
|
|
|
|
lfd = open(LockFile, O_RDONLY | O_NOFOLLOW);
|
|
|
|
if (lfd < 0) {
|
|
|
|
unlink(tmp);
|
|
|
|
FatalError("Can't read lock file %s\n", LockFile);
|
|
|
|
}
|
|
|
|
pid_str[0] = '\0';
|
|
|
|
if (read(lfd, pid_str, 11) != 11) {
|
|
|
|
/*
|
|
|
|
* Bogus lock file.
|
|
|
|
*/
|
|
|
|
unlink(LockFile);
|
|
|
|
close(lfd);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
pid_str[11] = '\0';
|
|
|
|
sscanf(pid_str, "%d", &l_pid);
|
|
|
|
close(lfd);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now try to kill the PID to see if it exists.
|
|
|
|
*/
|
|
|
|
errno = 0;
|
|
|
|
t = kill(l_pid, 0);
|
|
|
|
if ((t < 0) && (errno == ESRCH)) {
|
|
|
|
/*
|
|
|
|
* Stale lock file.
|
|
|
|
*/
|
|
|
|
unlink(LockFile);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
else if (((t < 0) && (errno == EPERM)) || (t == 0)) {
|
|
|
|
/*
|
|
|
|
* Process is still active.
|
|
|
|
*/
|
|
|
|
unlink(tmp);
|
|
|
|
FatalError
|
|
|
|
("Server is already active for display %s\n%s %s\n%s\n",
|
|
|
|
port, "\tIf this server is no longer running, remove",
|
|
|
|
LockFile, "\tand start again.");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
unlink(tmp);
|
|
|
|
if (!haslock)
|
|
|
|
FatalError("Could not create server lock file: %s\n", LockFile);
|
|
|
|
StillLocking = FALSE;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* UnlockServer --
|
|
|
|
* Remove the server lock file.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
UnlockServer(void)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
if (nolock)
|
|
|
|
return;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (!StillLocking) {
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
(void) unlink(LockFile);
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2006-11-28 13:29:31 -07:00
|
|
|
|
|
|
|
#ifdef X_PRIVSEP
|
|
|
|
int
|
|
|
|
ChownLock(uid_t uid, gid_t gid)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
return chown(LockFile, uid, gid);
|
2006-11-28 13:29:31 -07:00
|
|
|
}
|
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
/* Force connections to close on SIGHUP from init */
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
AutoResetServer(int sig)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
int olderrno = errno;
|
|
|
|
|
|
|
|
dispatchException |= DE_RESET;
|
|
|
|
isItTimeToYield = TRUE;
|
|
|
|
errno = olderrno;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Force connections to close and then exit on SIGTERM, SIGINT */
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void
|
2006-11-26 11:13:41 -07:00
|
|
|
GiveUp(int sig)
|
|
|
|
{
|
|
|
|
int olderrno = errno;
|
|
|
|
|
|
|
|
dispatchException |= DE_TERMINATE;
|
|
|
|
isItTimeToYield = TRUE;
|
|
|
|
errno = olderrno;
|
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
#if (defined WIN32 && defined __MINGW32__) || defined(__CYGWIN__)
|
|
|
|
CARD32
|
2012-06-10 07:21:05 -06:00
|
|
|
GetTimeInMillis(void)
|
2007-11-24 12:04:00 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
return GetTickCount();
|
2007-11-24 12:04:00 -07:00
|
|
|
}
|
|
|
|
#else
|
2010-07-27 13:02:24 -06:00
|
|
|
CARD32
|
2006-11-26 11:13:41 -07:00
|
|
|
GetTimeInMillis(void)
|
|
|
|
{
|
|
|
|
struct timeval tv;
|
|
|
|
|
|
|
|
#ifdef MONOTONIC_CLOCK
|
|
|
|
struct timespec tp;
|
2011-04-02 10:08:38 -06:00
|
|
|
static clockid_t clockid;
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2011-04-02 10:08:38 -06:00
|
|
|
if (!clockid) {
|
|
|
|
#ifdef CLOCK_MONOTONIC_COARSE
|
|
|
|
if (clock_getres(CLOCK_MONOTONIC_COARSE, &tp) == 0 &&
|
|
|
|
(tp.tv_nsec / 1000) <= 1000 &&
|
|
|
|
clock_gettime(CLOCK_MONOTONIC_COARSE, &tp) == 0)
|
|
|
|
clockid = CLOCK_MONOTONIC_COARSE;
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
if (clock_gettime(CLOCK_MONOTONIC, &tp) == 0)
|
|
|
|
clockid = CLOCK_MONOTONIC;
|
|
|
|
else
|
|
|
|
clockid = ~0L;
|
|
|
|
}
|
|
|
|
if (clockid != ~0L && clock_gettime(clockid, &tp) == 0)
|
2006-11-26 11:13:41 -07:00
|
|
|
return (tp.tv_sec * 1000) + (tp.tv_nsec / 1000000L);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
X_GETTIMEOFDAY(&tv);
|
2012-06-10 07:21:05 -06:00
|
|
|
return (tv.tv_sec * 1000) + (tv.tv_usec / 1000);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2007-11-24 12:04:00 -07:00
|
|
|
#endif
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
AdjustWaitForDelay(pointer waitTime, unsigned long newdelay)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
static struct timeval delay_val;
|
|
|
|
struct timeval **wt = (struct timeval **) waitTime;
|
|
|
|
unsigned long olddelay;
|
|
|
|
|
|
|
|
if (*wt == NULL) {
|
|
|
|
delay_val.tv_sec = newdelay / 1000;
|
|
|
|
delay_val.tv_usec = 1000 * (newdelay % 1000);
|
|
|
|
*wt = &delay_val;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
else {
|
|
|
|
olddelay = (*wt)->tv_sec * 1000 + (*wt)->tv_usec / 1000;
|
|
|
|
if (newdelay < olddelay) {
|
|
|
|
(*wt)->tv_sec = newdelay / 1000;
|
|
|
|
(*wt)->tv_usec = 1000 * (newdelay % 1000);
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
void
|
|
|
|
UseMsg(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
ErrorF("use: X [:<display>] [option]\n");
|
2010-07-27 13:02:24 -06:00
|
|
|
ErrorF("-a # default pointer acceleration (factor)\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("-ac disable access control restrictions\n");
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("-audit int set audit trail level\n");
|
|
|
|
ErrorF("-auth file select authorization file\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("-br create root window with black background\n");
|
|
|
|
ErrorF("+bs enable any backing store support\n");
|
|
|
|
ErrorF("-bs disable any backing store support\n");
|
|
|
|
ErrorF("-c turns off key-click\n");
|
|
|
|
ErrorF("c # key-click volume (0-100)\n");
|
|
|
|
ErrorF("-cc int default color visual class\n");
|
2010-07-27 13:02:24 -06:00
|
|
|
ErrorF("-nocursor disable the cursor\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("-core generate core dump on fatal error\n");
|
|
|
|
ErrorF("-dpi int screen resolution in dots per inch\n");
|
|
|
|
#ifdef DPMSExtension
|
|
|
|
ErrorF("-dpms disables VESA DPMS monitor control\n");
|
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF
|
|
|
|
("-deferglyphs [none|all|16] defer loading of [no|all|16-bit] glyphs\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("-f # bell base (0-100)\n");
|
|
|
|
ErrorF("-fc string cursor font\n");
|
|
|
|
ErrorF("-fn string default font name\n");
|
|
|
|
ErrorF("-fp string default font path\n");
|
|
|
|
ErrorF("-help prints message with these options\n");
|
|
|
|
ErrorF("-I ignore all remaining arguments\n");
|
|
|
|
#ifdef RLIMIT_DATA
|
|
|
|
ErrorF("-ld int limit data space to N Kb\n");
|
|
|
|
#endif
|
|
|
|
#ifdef RLIMIT_NOFILE
|
|
|
|
ErrorF("-lf int limit number of open files to N\n");
|
|
|
|
#endif
|
|
|
|
#ifdef RLIMIT_STACK
|
|
|
|
ErrorF("-ls int limit stack space to N Kb\n");
|
|
|
|
#endif
|
|
|
|
ErrorF("-nolock disable the locking mechanism\n");
|
|
|
|
ErrorF("-nolisten string don't listen on protocol\n");
|
|
|
|
ErrorF("-noreset don't reset after last client exists\n");
|
2011-11-05 07:32:40 -06:00
|
|
|
ErrorF("-background [none] create root window with no background\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("-reset reset after last client exists\n");
|
|
|
|
ErrorF("-p # screen-saver pattern duration (minutes)\n");
|
|
|
|
ErrorF("-pn accept failure to listen on all ports\n");
|
|
|
|
ErrorF("-nopn reject failure to listen on all ports\n");
|
|
|
|
ErrorF("-r turns off auto-repeat\n");
|
|
|
|
ErrorF("r turns on auto-repeat \n");
|
|
|
|
ErrorF("-render [default|mono|gray|color] set render color alloc policy\n");
|
2009-09-06 13:44:18 -06:00
|
|
|
#ifndef __OpenBSD__
|
|
|
|
ErrorF("-retro start with classic stipple and cursor\n");
|
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("-retard start with black background "
|
|
|
|
"and no cursor\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2009-09-06 13:44:18 -06:00
|
|
|
ErrorF("-s # screen-saver timeout (minutes)\n");
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("-seat string seat to run on\n");
|
2010-07-27 13:02:24 -06:00
|
|
|
ErrorF("-t # default pointer threshold (pixels/t)\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("-terminate terminate at server reset\n");
|
|
|
|
ErrorF("-to # connection time out\n");
|
|
|
|
ErrorF("-tst disable testing extensions\n");
|
|
|
|
ErrorF("ttyxx server started from init on /dev/ttyxx\n");
|
|
|
|
ErrorF("v video blanking for screen-saver\n");
|
|
|
|
ErrorF("-v screen-saver without video blanking\n");
|
|
|
|
ErrorF("-wm WhenMapped default backing-store\n");
|
|
|
|
ErrorF("-wr create root window with white background\n");
|
|
|
|
ErrorF("-maxbigreqsize set maximal bigrequest size \n");
|
|
|
|
#ifdef PANORAMIX
|
|
|
|
ErrorF("+xinerama Enable XINERAMA extension\n");
|
|
|
|
ErrorF("-xinerama Disable XINERAMA extension\n");
|
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF
|
|
|
|
("-dumbSched Disable smart scheduling, enable old behavior\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("-schedInterval int Set scheduler interval in msec\n");
|
2011-11-05 07:32:40 -06:00
|
|
|
ErrorF("-sigstop Enable SIGSTOP based startup\n");
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("+extension name Enable extension\n");
|
|
|
|
ErrorF("-extension name Disable extension\n");
|
|
|
|
#ifdef XDMCP
|
|
|
|
XdmcpUseMsg();
|
|
|
|
#endif
|
|
|
|
XkbUseMsg();
|
|
|
|
ddxUseMsg();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This function performs a rudimentary sanity check
|
|
|
|
* on the display name passed in on the command-line,
|
|
|
|
* since this string is used to generate filenames.
|
|
|
|
* It is especially important that the display name
|
|
|
|
* not contain a "/" and not start with a "-".
|
|
|
|
* --kvajk
|
|
|
|
*/
|
2012-06-10 07:21:05 -06:00
|
|
|
static int
|
2006-11-26 11:13:41 -07:00
|
|
|
VerifyDisplayName(const char *d)
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
if (d == (char *) 0)
|
|
|
|
return 0; /* null */
|
|
|
|
if (*d == '\0')
|
|
|
|
return 0; /* empty */
|
|
|
|
if (*d == '-')
|
|
|
|
return 0; /* could be confused for an option */
|
|
|
|
if (*d == '.')
|
|
|
|
return 0; /* must not equal "." or ".." */
|
|
|
|
if (strchr(d, '/') != (char *) 0)
|
|
|
|
return 0; /* very important!!! */
|
2010-12-05 08:36:02 -07:00
|
|
|
return 1;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function parses the command line. Handles device-independent fields
|
|
|
|
* and allows ddx to handle additional fields. It is not allowed to modify
|
|
|
|
* argc or any of the strings pointed to by argv.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
ProcessCommandLine(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
int i, skip;
|
|
|
|
|
|
|
|
defaultKeyboardControl.autoRepeat = TRUE;
|
|
|
|
|
|
|
|
#ifdef NO_PART_NET
|
|
|
|
PartialNetwork = FALSE;
|
|
|
|
#else
|
|
|
|
PartialNetwork = TRUE;
|
|
|
|
#endif
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
for (i = 1; i < argc; i++) {
|
|
|
|
/* call ddx first, so it can peek/override if it wants */
|
|
|
|
if ((skip = ddxProcessArgument(argc, argv, i))) {
|
|
|
|
i += (skip - 1);
|
|
|
|
}
|
|
|
|
else if (argv[i][0] == ':') {
|
|
|
|
/* initialize display */
|
|
|
|
display = argv[i];
|
|
|
|
display++;
|
|
|
|
if (!VerifyDisplayName(display)) {
|
2006-11-26 11:13:41 -07:00
|
|
|
ErrorF("Bad display name: %s\n", display);
|
|
|
|
UseMsg();
|
2012-06-10 07:21:05 -06:00
|
|
|
FatalError("Bad display name, exiting: %s\n", display);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-a") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultPointerControl.num = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-ac") == 0) {
|
|
|
|
defeatAccessControl = TRUE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-audit") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
auditTrailLevel = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-auth") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
InitAuthorization(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-br") == 0); /* default */
|
|
|
|
else if (strcmp(argv[i], "+bs") == 0)
|
|
|
|
enableBackingStore = TRUE;
|
|
|
|
else if (strcmp(argv[i], "-bs") == 0)
|
|
|
|
disableBackingStore = TRUE;
|
|
|
|
else if (strcmp(argv[i], "c") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultKeyboardControl.click = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-c") == 0) {
|
|
|
|
defaultKeyboardControl.click = 0;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-cc") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultColorVisualClass = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-core") == 0) {
|
2007-11-24 12:04:00 -07:00
|
|
|
#if !defined(WIN32) || !defined(__MINGW32__)
|
2012-06-10 07:21:05 -06:00
|
|
|
struct rlimit core_limit;
|
|
|
|
|
|
|
|
getrlimit(RLIMIT_CORE, &core_limit);
|
|
|
|
core_limit.rlim_cur = core_limit.rlim_max;
|
|
|
|
setrlimit(RLIMIT_CORE, &core_limit);
|
|
|
|
#endif
|
|
|
|
CoreDump = TRUE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-nocursor") == 0) {
|
2010-07-27 13:02:24 -06:00
|
|
|
EnableCursor = FALSE;
|
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "-dpi") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
monitorResolution = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef DPMSExtension
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "dpms") == 0)
|
|
|
|
/* ignored for compatibility */ ;
|
|
|
|
else if (strcmp(argv[i], "-dpms") == 0)
|
|
|
|
DPMSDisabledSwitch = TRUE;
|
|
|
|
#endif
|
|
|
|
else if (strcmp(argv[i], "-deferglyphs") == 0) {
|
|
|
|
if (++i >= argc || !ParseGlyphCachingMode(argv[i]))
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-f") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultKeyboardControl.bell = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-fc") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultCursorFont = argv[i];
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-fn") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultTextFont = argv[i];
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-fp") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
defaultFontPath = argv[i];
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-help") == 0) {
|
|
|
|
UseMsg();
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
else if ((skip = XkbProcessArguments(argc, argv, i)) != 0) {
|
|
|
|
if (skip > 0)
|
|
|
|
i += skip - 1;
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef RLIMIT_DATA
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "-ld") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
limitDataSpace = atoi(argv[i]);
|
|
|
|
if (limitDataSpace > 0)
|
|
|
|
limitDataSpace *= 1024;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef RLIMIT_NOFILE
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "-lf") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
limitNoFile = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef RLIMIT_STACK
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "-ls") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
limitStackSpace = atoi(argv[i]);
|
|
|
|
if (limitStackSpace > 0)
|
|
|
|
limitStackSpace *= 1024;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
else if (strcmp(argv[i], "-nolock") == 0) {
|
2007-11-24 12:04:00 -07:00
|
|
|
#if !defined(WIN32) && !defined(__CYGWIN__)
|
2012-06-10 07:21:05 -06:00
|
|
|
if (getuid() != 0)
|
|
|
|
ErrorF
|
|
|
|
("Warning: the -nolock option can only be used by root\n");
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
nolock = TRUE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-nolisten") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
if (_XSERVTransNoListen(argv[i]))
|
|
|
|
FatalError("Failed to disable listen for %s transport",
|
|
|
|
argv[i]);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-noreset") == 0) {
|
|
|
|
dispatchExceptionAtReset = 0;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-reset") == 0) {
|
|
|
|
dispatchExceptionAtReset = DE_RESET;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-p") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultScreenSaverInterval = ((CARD32) atoi(argv[i])) *
|
|
|
|
MILLI_PER_MIN;
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-pogo") == 0) {
|
|
|
|
dispatchException = DE_TERMINATE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-pn") == 0)
|
|
|
|
PartialNetwork = TRUE;
|
|
|
|
else if (strcmp(argv[i], "-nopn") == 0)
|
|
|
|
PartialNetwork = FALSE;
|
|
|
|
else if (strcmp(argv[i], "r") == 0)
|
|
|
|
defaultKeyboardControl.autoRepeat = TRUE;
|
|
|
|
else if (strcmp(argv[i], "-r") == 0)
|
|
|
|
defaultKeyboardControl.autoRepeat = FALSE;
|
2009-09-06 13:44:18 -06:00
|
|
|
#ifndef __OpenBSD__
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "-retro") == 0)
|
|
|
|
party_like_its_1989 = TRUE;
|
2009-09-06 13:44:18 -06:00
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
else if ( strcmp( argv[i], "-retard") == 0)
|
|
|
|
party_like_its_1989 = FALSE;
|
|
|
|
#endif
|
|
|
|
else if (strcmp(argv[i], "-s") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultScreenSaverTime = ((CARD32) atoi(argv[i])) *
|
|
|
|
MILLI_PER_MIN;
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-seat") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
SeatId = argv[i];
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-t") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
defaultPointerControl.threshold = atoi(argv[i]);
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-terminate") == 0) {
|
|
|
|
dispatchExceptionAtReset = DE_TERMINATE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-to") == 0) {
|
|
|
|
if (++i < argc)
|
|
|
|
TimeOutValue = ((CARD32) atoi(argv[i])) * MILLI_PER_SECOND;
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-tst") == 0) {
|
|
|
|
noTestExtensions = TRUE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "v") == 0)
|
|
|
|
defaultScreenSaverBlanking = PreferBlanking;
|
|
|
|
else if (strcmp(argv[i], "-v") == 0)
|
|
|
|
defaultScreenSaverBlanking = DontPreferBlanking;
|
|
|
|
else if (strcmp(argv[i], "-wm") == 0)
|
|
|
|
defaultBackingStore = WhenMapped;
|
|
|
|
else if (strcmp(argv[i], "-wr") == 0)
|
2006-11-26 11:13:41 -07:00
|
|
|
whiteRoot = TRUE;
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "-background") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
if (!strcmp(argv[i], "none"))
|
2011-11-05 07:32:40 -06:00
|
|
|
bgNoneRoot = TRUE;
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
}
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "-maxbigreqsize") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
long reqSizeArg = atol(argv[i]);
|
|
|
|
|
|
|
|
/* Request size > 128MB does not make much sense... */
|
|
|
|
if (reqSizeArg > 0L && reqSizeArg < 128L) {
|
|
|
|
maxBigRequestSize = (reqSizeArg * 1048576L) - 1L;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef PANORAMIX
|
2012-06-10 07:21:05 -06:00
|
|
|
else if (strcmp(argv[i], "+xinerama") == 0) {
|
|
|
|
noPanoramiXExtension = FALSE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-xinerama") == 0) {
|
|
|
|
noPanoramiXExtension = TRUE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-disablexineramaextension") == 0) {
|
|
|
|
PanoramiXExtensionDisabledHack = TRUE;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
else if (strcmp(argv[i], "-I") == 0) {
|
|
|
|
/* ignore all remaining arguments */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else if (strncmp(argv[i], "tty", 3) == 0) {
|
2010-12-05 08:36:02 -07:00
|
|
|
/* init supplies us with this useless information */
|
2012-06-10 07:21:05 -06:00
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XDMCP
|
2012-06-10 07:21:05 -06:00
|
|
|
else if ((skip = XdmcpOptions(argc, argv, i)) != i) {
|
|
|
|
i = skip - 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
else if (strcmp(argv[i], "-dumbSched") == 0) {
|
|
|
|
SmartScheduleDisable = TRUE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-schedInterval") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
SmartScheduleInterval = atoi(argv[i]);
|
|
|
|
SmartScheduleSlice = SmartScheduleInterval;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-schedMax") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
SmartScheduleMaxSlice = atoi(argv[i]);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-render") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
int policy = PictureParseCmapPolicy(argv[i]);
|
|
|
|
|
|
|
|
if (policy != PictureCmapPolicyInvalid)
|
|
|
|
PictureCmapPolicy = policy;
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-sigstop") == 0) {
|
|
|
|
RunFromSigStopParent = TRUE;
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "+extension") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
if (!EnableDisableExtension(argv[i], TRUE))
|
|
|
|
EnableDisableExtensionError(argv[i], TRUE);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else if (strcmp(argv[i], "-extension") == 0) {
|
|
|
|
if (++i < argc) {
|
|
|
|
if (!EnableDisableExtension(argv[i], FALSE))
|
|
|
|
EnableDisableExtensionError(argv[i], FALSE);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
UseMsg();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
ErrorF("Unrecognized option: %s\n", argv[i]);
|
|
|
|
UseMsg();
|
|
|
|
FatalError("Unrecognized option: %s\n", argv[i]);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Implement a simple-minded font authorization scheme. The authorization
|
|
|
|
name is "hp-hostname-1", the contents are simply the host name. */
|
|
|
|
int
|
|
|
|
set_font_authorizations(char **authorizations, int *authlen, pointer client)
|
|
|
|
{
|
|
|
|
#define AUTHORIZATION_NAME "hp-hostname-1"
|
|
|
|
#if defined(TCPCONN) || defined(STREAMSCONN)
|
|
|
|
static char *result = NULL;
|
|
|
|
static char *p = NULL;
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (p == NULL) {
|
|
|
|
char hname[1024], *hnameptr;
|
|
|
|
unsigned int len;
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#if defined(IPv6) && defined(AF_INET6)
|
2012-06-10 07:21:05 -06:00
|
|
|
struct addrinfo hints, *ai = NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
struct hostent *host;
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef XTHREADS_NEEDS_BYNAMEPARAMS
|
2012-06-10 07:21:05 -06:00
|
|
|
_Xgethostbynameparams hparams;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
gethostname(hname, 1024);
|
2006-11-26 11:13:41 -07:00
|
|
|
#if defined(IPv6) && defined(AF_INET6)
|
2012-06-10 07:21:05 -06:00
|
|
|
memset(&hints, 0, sizeof(hints));
|
|
|
|
hints.ai_flags = AI_CANONNAME;
|
|
|
|
if (getaddrinfo(hname, NULL, &hints, &ai) == 0) {
|
|
|
|
hnameptr = ai->ai_canonname;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
hnameptr = hname;
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
host = _XGethostbyname(hname, hparams);
|
|
|
|
if (host == NULL)
|
|
|
|
hnameptr = hname;
|
|
|
|
else
|
|
|
|
hnameptr = host->h_name;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
len = strlen(hnameptr) + 1;
|
|
|
|
result = malloc(len + sizeof(AUTHORIZATION_NAME) + 4);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
p = result;
|
2006-11-26 11:13:41 -07:00
|
|
|
*p++ = sizeof(AUTHORIZATION_NAME) >> 8;
|
|
|
|
*p++ = sizeof(AUTHORIZATION_NAME) & 0xff;
|
|
|
|
*p++ = (len) >> 8;
|
|
|
|
*p++ = (len & 0xff);
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
memmove(p, AUTHORIZATION_NAME, sizeof(AUTHORIZATION_NAME));
|
|
|
|
p += sizeof(AUTHORIZATION_NAME);
|
|
|
|
memmove(p, hnameptr, len);
|
|
|
|
p += len;
|
2006-11-26 11:13:41 -07:00
|
|
|
#if defined(IPv6) && defined(AF_INET6)
|
2012-06-10 07:21:05 -06:00
|
|
|
if (ai) {
|
|
|
|
freeaddrinfo(ai);
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
*authlen = p - result;
|
|
|
|
*authorizations = result;
|
|
|
|
return 1;
|
2012-06-10 07:21:05 -06:00
|
|
|
#else /* TCPCONN */
|
2006-11-26 11:13:41 -07:00
|
|
|
return 0;
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif /* TCPCONN */
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void *
|
2006-11-26 11:13:41 -07:00
|
|
|
Xalloc(unsigned long amount)
|
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
/*
|
|
|
|
* Xalloc used to return NULL when large amount of memory is requested. In
|
|
|
|
* order to catch the buggy callers this warning has been added, slated to
|
|
|
|
* removal by anyone who touches this code (or just looks at it) in 2011.
|
|
|
|
*
|
|
|
|
* -- Mikhail Gusarov
|
|
|
|
*/
|
2012-06-10 07:21:05 -06:00
|
|
|
if ((long) amount <= 0)
|
|
|
|
ErrorF("Warning: Xalloc: "
|
|
|
|
"requesting unpleasantly large amount of memory: %lu bytes.\n",
|
2010-12-05 08:36:02 -07:00
|
|
|
amount);
|
2009-09-06 13:44:18 -06:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
return malloc(amount);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void *
|
2006-11-26 11:13:41 -07:00
|
|
|
XNFalloc(unsigned long amount)
|
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
void *ptr = malloc(amount);
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
if (!ptr)
|
|
|
|
FatalError("Out of memory");
|
2009-09-06 13:44:18 -06:00
|
|
|
return ptr;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void *
|
2006-11-26 11:13:41 -07:00
|
|
|
Xcalloc(unsigned long amount)
|
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
return calloc(1, amount);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void *
|
2006-11-26 11:13:41 -07:00
|
|
|
XNFcalloc(unsigned long amount)
|
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
void *ret = calloc(1, amount);
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
if (!ret)
|
|
|
|
FatalError("XNFcalloc: Out of memory");
|
2006-11-26 11:13:41 -07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void *
|
2010-12-05 08:36:02 -07:00
|
|
|
Xrealloc(void *ptr, unsigned long amount)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
/*
|
|
|
|
* Xrealloc used to return NULL when large amount of memory is requested. In
|
|
|
|
* order to catch the buggy callers this warning has been added, slated to
|
|
|
|
* removal by anyone who touches this code (or just looks at it) in 2011.
|
|
|
|
*
|
|
|
|
* -- Mikhail Gusarov
|
|
|
|
*/
|
2012-06-10 07:21:05 -06:00
|
|
|
if ((long) amount <= 0)
|
|
|
|
ErrorF("Warning: Xrealloc: "
|
|
|
|
"requesting unpleasantly large amount of memory: %lu bytes.\n",
|
2010-12-05 08:36:02 -07:00
|
|
|
amount);
|
2009-09-06 13:44:18 -06:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
return realloc(ptr, amount);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void *
|
2010-12-05 08:36:02 -07:00
|
|
|
XNFrealloc(void *ptr, unsigned long amount)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
void *ret = realloc(ptr, amount);
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
if (!ret)
|
2012-06-10 07:21:05 -06:00
|
|
|
FatalError("XNFrealloc: Out of memory");
|
2010-12-05 08:36:02 -07:00
|
|
|
return ret;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
void
|
2010-12-05 08:36:02 -07:00
|
|
|
Xfree(void *ptr)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
free(ptr);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
char *
|
|
|
|
Xstrdup(const char *s)
|
|
|
|
{
|
|
|
|
if (s == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2010-12-05 08:36:02 -07:00
|
|
|
return strdup(s);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
char *
|
2006-11-26 11:13:41 -07:00
|
|
|
XNFstrdup(const char *s)
|
|
|
|
{
|
2010-12-05 08:36:02 -07:00
|
|
|
char *ret;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
if (s == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2010-12-05 08:36:02 -07:00
|
|
|
|
|
|
|
ret = strdup(s);
|
|
|
|
if (!ret)
|
2012-06-10 07:21:05 -06:00
|
|
|
FatalError("XNFstrdup: Out of memory");
|
2010-12-05 08:36:02 -07:00
|
|
|
return ret;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
SmartScheduleStopTimer(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
struct itimerval timer;
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
if (SmartScheduleDisable)
|
2012-06-10 07:21:05 -06:00
|
|
|
return;
|
2006-11-26 11:13:41 -07:00
|
|
|
timer.it_interval.tv_sec = 0;
|
|
|
|
timer.it_interval.tv_usec = 0;
|
|
|
|
timer.it_value.tv_sec = 0;
|
|
|
|
timer.it_value.tv_usec = 0;
|
2012-06-10 07:21:05 -06:00
|
|
|
(void) setitimer(ITIMER_REAL, &timer, 0);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
SmartScheduleStartTimer(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
struct itimerval timer;
|
|
|
|
|
2008-11-02 08:26:08 -07:00
|
|
|
if (SmartScheduleDisable)
|
2012-06-10 07:21:05 -06:00
|
|
|
return;
|
2006-11-26 11:13:41 -07:00
|
|
|
timer.it_interval.tv_sec = 0;
|
|
|
|
timer.it_interval.tv_usec = SmartScheduleInterval * 1000;
|
|
|
|
timer.it_value.tv_sec = 0;
|
|
|
|
timer.it_value.tv_usec = SmartScheduleInterval * 1000;
|
2012-06-10 07:21:05 -06:00
|
|
|
setitimer(ITIMER_REAL, &timer, 0);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2012-06-10 07:21:05 -06:00
|
|
|
SmartScheduleTimer(int sig)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
SmartScheduleTime += SmartScheduleInterval;
|
|
|
|
}
|
|
|
|
|
2011-11-05 07:32:40 -06:00
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
SmartScheduleInit(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
struct sigaction act;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
if (SmartScheduleDisable)
|
2012-06-10 07:21:05 -06:00
|
|
|
return;
|
2011-11-05 07:32:40 -06:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
memset((char *) &act, 0, sizeof(struct sigaction));
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
/* Set up the timer signal function */
|
|
|
|
act.sa_handler = SmartScheduleTimer;
|
2012-06-10 07:21:05 -06:00
|
|
|
sigemptyset(&act.sa_mask);
|
|
|
|
sigaddset(&act.sa_mask, SIGALRM);
|
|
|
|
if (sigaction(SIGALRM, &act, 0) < 0) {
|
|
|
|
perror("sigaction for smart scheduler");
|
|
|
|
SmartScheduleDisable = TRUE;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef SIG_BLOCK
|
2012-06-10 07:21:05 -06:00
|
|
|
static sigset_t PreviousSignalMask;
|
|
|
|
static int BlockedSignalCount;
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
OsBlockSignals(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
#ifdef SIG_BLOCK
|
2012-06-10 07:21:05 -06:00
|
|
|
if (BlockedSignalCount++ == 0) {
|
|
|
|
sigset_t set;
|
|
|
|
|
|
|
|
sigemptyset(&set);
|
|
|
|
sigaddset(&set, SIGALRM);
|
|
|
|
sigaddset(&set, SIGVTALRM);
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifdef SIGWINCH
|
2012-06-10 07:21:05 -06:00
|
|
|
sigaddset(&set, SIGWINCH);
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
#ifdef SIGIO
|
2012-06-10 07:21:05 -06:00
|
|
|
sigaddset(&set, SIGIO);
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
2012-06-10 07:21:05 -06:00
|
|
|
sigaddset(&set, SIGTSTP);
|
|
|
|
sigaddset(&set, SIGTTIN);
|
|
|
|
sigaddset(&set, SIGTTOU);
|
|
|
|
sigaddset(&set, SIGCHLD);
|
|
|
|
sigprocmask(SIG_BLOCK, &set, &PreviousSignalMask);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
OsReleaseSignals(void)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
#ifdef SIG_BLOCK
|
2012-06-10 07:21:05 -06:00
|
|
|
if (--BlockedSignalCount == 0) {
|
|
|
|
sigprocmask(SIG_SETMASK, &PreviousSignalMask, 0);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
/*
|
|
|
|
* Pending signals may interfere with core dumping. Provide a
|
|
|
|
* mechanism to block signals when aborting.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void
|
2012-06-10 07:21:05 -06:00
|
|
|
OsAbort(void)
|
2010-07-27 13:02:24 -06:00
|
|
|
{
|
|
|
|
#ifndef __APPLE__
|
|
|
|
OsBlockSignals();
|
|
|
|
#endif
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
2007-11-24 12:04:00 -07:00
|
|
|
#if !defined(WIN32)
|
2006-11-26 11:13:41 -07:00
|
|
|
/*
|
|
|
|
* "safer" versions of system(3), popen(3) and pclose(3) which give up
|
|
|
|
* all privs before running a command.
|
|
|
|
*
|
|
|
|
* This is based on the code in FreeBSD 2.2 libc.
|
|
|
|
*
|
|
|
|
* XXX It'd be good to redirect stderr so that it ends up in the log file
|
|
|
|
* as well. As it is now, xkbcomp messages don't end up in the log file.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2012-06-10 07:21:05 -06:00
|
|
|
System(const char *command)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
int pid, p;
|
2012-06-10 07:21:05 -06:00
|
|
|
void (*csig) (int);
|
2006-11-26 11:13:41 -07:00
|
|
|
int status;
|
|
|
|
|
|
|
|
if (!command)
|
2012-06-10 07:21:05 -06:00
|
|
|
return 1;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
csig = signal(SIGCHLD, SIG_DFL);
|
2008-06-14 18:17:32 -06:00
|
|
|
if (csig == SIG_ERR) {
|
2012-06-10 07:21:05 -06:00
|
|
|
perror("signal");
|
|
|
|
return -1;
|
2008-06-14 18:17:32 -06:00
|
|
|
}
|
2011-11-05 07:32:40 -06:00
|
|
|
DebugF("System: `%s'\n", command);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
switch (pid = fork()) {
|
2012-06-10 07:21:05 -06:00
|
|
|
case -1: /* error */
|
|
|
|
p = -1;
|
|
|
|
case 0: /* child */
|
|
|
|
if (setgid(getgid()) == -1)
|
|
|
|
_exit(127);
|
|
|
|
if (setuid(getuid()) == -1)
|
|
|
|
_exit(127);
|
|
|
|
execl("/bin/sh", "sh", "-c", command, (char *) NULL);
|
|
|
|
_exit(127);
|
|
|
|
default: /* parent */
|
|
|
|
do {
|
|
|
|
p = waitpid(pid, &status, 0);
|
|
|
|
} while (p == -1 && errno == EINTR);
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2008-06-14 18:17:32 -06:00
|
|
|
if (signal(SIGCHLD, csig) == SIG_ERR) {
|
2012-06-10 07:21:05 -06:00
|
|
|
perror("signal");
|
|
|
|
return -1;
|
2008-06-14 18:17:32 -06:00
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
return p == -1 ? -1 : status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct pid {
|
|
|
|
struct pid *next;
|
|
|
|
FILE *fp;
|
|
|
|
int pid;
|
|
|
|
} *pidlist;
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
OsSigHandlerPtr old_alarm = NULL; /* XXX horrible awful hack */
|
2008-06-14 18:17:32 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
pointer
|
2012-06-10 07:21:05 -06:00
|
|
|
Popen(const char *command, const char *type)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
struct pid *cur;
|
|
|
|
FILE *iop;
|
|
|
|
int pdes[2], pid;
|
|
|
|
|
|
|
|
if (command == NULL || type == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
if ((*type != 'r' && *type != 'w') || type[1])
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
if ((cur = malloc(sizeof(struct pid))) == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
if (pipe(pdes) < 0) {
|
2012-06-10 07:21:05 -06:00
|
|
|
free(cur);
|
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
2008-06-14 18:17:32 -06:00
|
|
|
/* Ignore the smart scheduler while this is going on */
|
2009-01-12 13:17:47 -07:00
|
|
|
old_alarm = OsSignal(SIGALRM, SIG_IGN);
|
2008-06-14 18:17:32 -06:00
|
|
|
if (old_alarm == SIG_ERR) {
|
2012-06-10 07:21:05 -06:00
|
|
|
close(pdes[0]);
|
|
|
|
close(pdes[1]);
|
|
|
|
free(cur);
|
|
|
|
perror("signal");
|
|
|
|
return NULL;
|
2008-06-14 18:17:32 -06:00
|
|
|
}
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
switch (pid = fork()) {
|
2012-06-10 07:21:05 -06:00
|
|
|
case -1: /* error */
|
|
|
|
close(pdes[0]);
|
|
|
|
close(pdes[1]);
|
|
|
|
free(cur);
|
|
|
|
if (OsSignal(SIGALRM, old_alarm) == SIG_ERR)
|
|
|
|
perror("signal");
|
|
|
|
return NULL;
|
|
|
|
case 0: /* child */
|
|
|
|
if (setgid(getgid()) == -1)
|
|
|
|
_exit(127);
|
|
|
|
if (setuid(getuid()) == -1)
|
|
|
|
_exit(127);
|
|
|
|
if (*type == 'r') {
|
|
|
|
if (pdes[1] != 1) {
|
|
|
|
/* stdout */
|
|
|
|
dup2(pdes[1], 1);
|
|
|
|
close(pdes[1]);
|
|
|
|
}
|
|
|
|
close(pdes[0]);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if (pdes[0] != 0) {
|
|
|
|
/* stdin */
|
|
|
|
dup2(pdes[0], 0);
|
|
|
|
close(pdes[0]);
|
|
|
|
}
|
|
|
|
close(pdes[1]);
|
|
|
|
}
|
|
|
|
execl("/bin/sh", "sh", "-c", command, (char *) NULL);
|
|
|
|
_exit(127);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Avoid EINTR during stdio calls */
|
2012-06-10 07:21:05 -06:00
|
|
|
OsBlockSignals();
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
/* parent */
|
|
|
|
if (*type == 'r') {
|
2012-06-10 07:21:05 -06:00
|
|
|
iop = fdopen(pdes[0], type);
|
|
|
|
close(pdes[1]);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
iop = fdopen(pdes[1], type);
|
|
|
|
close(pdes[0]);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
cur->fp = iop;
|
|
|
|
cur->pid = pid;
|
|
|
|
cur->next = pidlist;
|
|
|
|
pidlist = cur;
|
|
|
|
|
2011-11-05 07:32:40 -06:00
|
|
|
DebugF("Popen: `%s', fp = %p\n", command, iop);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
return iop;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fopen that drops privileges */
|
|
|
|
pointer
|
2012-06-10 07:21:05 -06:00
|
|
|
Fopen(const char *file, const char *type)
|
2006-11-26 11:13:41 -07:00
|
|
|
{
|
|
|
|
FILE *iop;
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
#ifndef HAS_SAVED_IDS_AND_SETEUID
|
|
|
|
struct pid *cur;
|
|
|
|
int pdes[2], pid;
|
|
|
|
|
|
|
|
if (file == NULL || type == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
if ((*type != 'r' && *type != 'w') || type[1])
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2010-12-05 08:36:02 -07:00
|
|
|
if ((cur = malloc(sizeof(struct pid))) == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
if (pipe(pdes) < 0) {
|
2012-06-10 07:21:05 -06:00
|
|
|
free(cur);
|
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
switch (pid = fork()) {
|
2012-06-10 07:21:05 -06:00
|
|
|
case -1: /* error */
|
|
|
|
close(pdes[0]);
|
|
|
|
close(pdes[1]);
|
|
|
|
free(cur);
|
|
|
|
return NULL;
|
|
|
|
case 0: /* child */
|
|
|
|
if (setgid(getgid()) == -1)
|
|
|
|
_exit(127);
|
|
|
|
if (setuid(getuid()) == -1)
|
|
|
|
_exit(127);
|
|
|
|
if (*type == 'r') {
|
|
|
|
if (pdes[1] != 1) {
|
|
|
|
/* stdout */
|
|
|
|
dup2(pdes[1], 1);
|
|
|
|
close(pdes[1]);
|
|
|
|
}
|
|
|
|
close(pdes[0]);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if (pdes[0] != 0) {
|
|
|
|
/* stdin */
|
|
|
|
dup2(pdes[0], 0);
|
|
|
|
close(pdes[0]);
|
|
|
|
}
|
|
|
|
close(pdes[1]);
|
|
|
|
}
|
|
|
|
execl("/bin/cat", "cat", file, (char *) NULL);
|
|
|
|
_exit(127);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Avoid EINTR during stdio calls */
|
2012-06-10 07:21:05 -06:00
|
|
|
OsBlockSignals();
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
/* parent */
|
|
|
|
if (*type == 'r') {
|
2012-06-10 07:21:05 -06:00
|
|
|
iop = fdopen(pdes[0], type);
|
|
|
|
close(pdes[1]);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
iop = fdopen(pdes[1], type);
|
|
|
|
close(pdes[0]);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
cur->fp = iop;
|
|
|
|
cur->pid = pid;
|
|
|
|
cur->next = pidlist;
|
|
|
|
pidlist = cur;
|
|
|
|
|
2011-11-05 07:32:40 -06:00
|
|
|
DebugF("Fopen(%s), fp = %p\n", file, iop);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
return iop;
|
|
|
|
#else
|
|
|
|
int ruid, euid;
|
|
|
|
|
|
|
|
ruid = getuid();
|
|
|
|
euid = geteuid();
|
2012-06-10 07:21:05 -06:00
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
if (seteuid(ruid) == -1) {
|
2012-06-10 07:21:05 -06:00
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
iop = fopen(file, type);
|
|
|
|
|
|
|
|
if (seteuid(euid) == -1) {
|
2012-06-10 07:21:05 -06:00
|
|
|
fclose(iop);
|
|
|
|
return NULL;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
return iop;
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif /* HAS_SAVED_IDS_AND_SETEUID */
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
Pclose(pointer iop)
|
|
|
|
{
|
|
|
|
struct pid *cur, *last;
|
|
|
|
int pstat;
|
|
|
|
int pid;
|
|
|
|
|
2011-11-05 07:32:40 -06:00
|
|
|
DebugF("Pclose: fp = %p\n", iop);
|
2006-11-26 11:13:41 -07:00
|
|
|
fclose(iop);
|
|
|
|
|
|
|
|
for (last = NULL, cur = pidlist; cur; last = cur, cur = cur->next)
|
2012-06-10 07:21:05 -06:00
|
|
|
if (cur->fp == iop)
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
if (cur == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
return -1;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
do {
|
2012-06-10 07:21:05 -06:00
|
|
|
pid = waitpid(cur->pid, &pstat, 0);
|
2006-11-26 11:13:41 -07:00
|
|
|
} while (pid == -1 && errno == EINTR);
|
|
|
|
|
|
|
|
if (last == NULL)
|
2012-06-10 07:21:05 -06:00
|
|
|
pidlist = cur->next;
|
2006-11-26 11:13:41 -07:00
|
|
|
else
|
2012-06-10 07:21:05 -06:00
|
|
|
last->next = cur->next;
|
2010-12-05 08:36:02 -07:00
|
|
|
free(cur);
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
/* allow EINTR again */
|
2012-06-10 07:21:05 -06:00
|
|
|
OsReleaseSignals();
|
|
|
|
|
2009-01-12 13:17:47 -07:00
|
|
|
if (old_alarm && OsSignal(SIGALRM, old_alarm) == SIG_ERR) {
|
2012-06-10 07:21:05 -06:00
|
|
|
perror("signal");
|
|
|
|
return -1;
|
2008-06-14 18:17:32 -06:00
|
|
|
}
|
|
|
|
|
2006-11-26 11:13:41 -07:00
|
|
|
return pid == -1 ? -1 : pstat;
|
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
int
|
2006-11-26 11:13:41 -07:00
|
|
|
Fclose(pointer iop)
|
|
|
|
{
|
|
|
|
#ifdef HAS_SAVED_IDS_AND_SETEUID
|
|
|
|
return fclose(iop);
|
|
|
|
#else
|
|
|
|
return Pclose(iop);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif /* !WIN32 */
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* CheckUserParameters: check for long command line arguments and long
|
|
|
|
* environment variables. By default, these checks are only done when
|
|
|
|
* the server's euid != ruid. In 3.3.x, these checks were done in an
|
|
|
|
* external wrapper utility.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Consider LD* variables insecure? */
|
|
|
|
#ifndef REMOVE_ENV_LD
|
|
|
|
#define REMOVE_ENV_LD 1
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Remove long environment variables? */
|
|
|
|
#ifndef REMOVE_LONG_ENV
|
|
|
|
#define REMOVE_LONG_ENV 1
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Disallow stdout or stderr as pipes? It's possible to block the X server
|
|
|
|
* when piping stdout+stderr to a pipe.
|
|
|
|
*
|
|
|
|
* Don't enable this because it looks like it's going to cause problems.
|
|
|
|
*/
|
|
|
|
#ifndef NO_OUTPUT_PIPES
|
|
|
|
#define NO_OUTPUT_PIPES 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Check args and env only if running setuid (euid == 0 && euid != uid) ? */
|
|
|
|
#ifndef CHECK_EUID
|
|
|
|
#ifndef WIN32
|
|
|
|
#define CHECK_EUID 1
|
|
|
|
#else
|
|
|
|
#define CHECK_EUID 0
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Maybe the locale can be faked to make isprint(3) report that everything
|
|
|
|
* is printable? Avoid it by default.
|
|
|
|
*/
|
|
|
|
#ifndef USE_ISPRINT
|
|
|
|
#define USE_ISPRINT 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define MAX_ARG_LENGTH 128
|
|
|
|
#define MAX_ENV_LENGTH 256
|
2012-06-10 07:21:05 -06:00
|
|
|
#define MAX_ENV_PATH_LENGTH 2048 /* Limit for *PATH and TERMCAP */
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
#if USE_ISPRINT
|
|
|
|
#include <ctype.h>
|
|
|
|
#define checkPrintable(c) isprint(c)
|
|
|
|
#else
|
|
|
|
#define checkPrintable(c) (((c) & 0x7f) >= 0x20 && ((c) & 0x7f) != 0x7f)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
enum BadCode {
|
|
|
|
NotBad = 0,
|
|
|
|
UnsafeArg,
|
|
|
|
ArgTooLong,
|
|
|
|
UnprintableArg,
|
|
|
|
EnvTooLong,
|
|
|
|
OutputIsPipe,
|
|
|
|
InternalError
|
|
|
|
};
|
|
|
|
|
|
|
|
#if defined(VENDORSUPPORT)
|
|
|
|
#define BUGADDRESS VENDORSUPPORT
|
|
|
|
#elif defined(BUILDERADDR)
|
|
|
|
#define BUGADDRESS BUILDERADDR
|
|
|
|
#else
|
|
|
|
#define BUGADDRESS "xorg@freedesktop.org"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
void
|
|
|
|
CheckUserParameters(int argc, char **argv, char **envp)
|
|
|
|
{
|
|
|
|
enum BadCode bad = NotBad;
|
|
|
|
int i = 0, j;
|
|
|
|
char *a, *e = NULL;
|
|
|
|
|
|
|
|
#if CHECK_EUID
|
|
|
|
if (geteuid() == 0 && getuid() != geteuid())
|
|
|
|
#endif
|
|
|
|
{
|
2012-06-10 07:21:05 -06:00
|
|
|
/* Check each argv[] */
|
|
|
|
for (i = 1; i < argc; i++) {
|
|
|
|
if (strcmp(argv[i], "-fp") == 0) {
|
|
|
|
i++; /* continue with next argument. skip the length check */
|
|
|
|
if (i >= argc)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if (strlen(argv[i]) > MAX_ARG_LENGTH) {
|
|
|
|
bad = ArgTooLong;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
a = argv[i];
|
|
|
|
while (*a) {
|
|
|
|
if (checkPrintable(*a) == 0) {
|
|
|
|
bad = UnprintableArg;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
a++;
|
|
|
|
}
|
|
|
|
if (bad)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!bad) {
|
|
|
|
/* Check each envp[] */
|
|
|
|
for (i = 0; envp[i]; i++) {
|
|
|
|
|
|
|
|
/* Check for bad environment variables and values */
|
2006-11-26 11:13:41 -07:00
|
|
|
#if REMOVE_ENV_LD
|
2012-06-10 07:21:05 -06:00
|
|
|
while (envp[i] && (strncmp(envp[i], "LD", 2) == 0)) {
|
|
|
|
for (j = i; envp[j]; j++) {
|
|
|
|
envp[j] = envp[j + 1];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (envp[i] && (strlen(envp[i]) > MAX_ENV_LENGTH)) {
|
2006-11-26 11:13:41 -07:00
|
|
|
#if REMOVE_LONG_ENV
|
2012-06-10 07:21:05 -06:00
|
|
|
for (j = i; envp[j]; j++) {
|
|
|
|
envp[j] = envp[j + 1];
|
|
|
|
}
|
|
|
|
i--;
|
2006-11-26 11:13:41 -07:00
|
|
|
#else
|
2012-06-10 07:21:05 -06:00
|
|
|
char *eq;
|
|
|
|
int len;
|
|
|
|
|
|
|
|
eq = strchr(envp[i], '=');
|
|
|
|
if (!eq)
|
|
|
|
continue;
|
|
|
|
len = eq - envp[i];
|
|
|
|
e = strndup(envp[i], len);
|
|
|
|
if (!e) {
|
|
|
|
bad = InternalError;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (len >= 4 &&
|
|
|
|
(strcmp(e + len - 4, "PATH") == 0 ||
|
|
|
|
strcmp(e, "TERMCAP") == 0)) {
|
|
|
|
if (strlen(envp[i]) > MAX_ENV_PATH_LENGTH) {
|
|
|
|
bad = EnvTooLong;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
free(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
bad = EnvTooLong;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#if NO_OUTPUT_PIPES
|
2012-06-10 07:21:05 -06:00
|
|
|
if (!bad) {
|
|
|
|
struct stat buf;
|
2006-11-26 11:13:41 -07:00
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
if (fstat(fileno(stdout), &buf) == 0 && S_ISFIFO(buf.st_mode))
|
|
|
|
bad = OutputIsPipe;
|
|
|
|
if (fstat(fileno(stderr), &buf) == 0 && S_ISFIFO(buf.st_mode))
|
|
|
|
bad = OutputIsPipe;
|
|
|
|
}
|
2006-11-26 11:13:41 -07:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
switch (bad) {
|
|
|
|
case NotBad:
|
2012-06-10 07:21:05 -06:00
|
|
|
return;
|
2006-11-26 11:13:41 -07:00
|
|
|
case UnsafeArg:
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("Command line argument number %d is unsafe\n", i);
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
case ArgTooLong:
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("Command line argument number %d is too long\n", i);
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
case UnprintableArg:
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("Command line argument number %d contains unprintable"
|
|
|
|
" characters\n", i);
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
case EnvTooLong:
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("Environment variable `%s' is too long\n", e);
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
case OutputIsPipe:
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("Stdout and/or stderr is a pipe\n");
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
case InternalError:
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("Internal Error\n");
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
default:
|
2012-06-10 07:21:05 -06:00
|
|
|
ErrorF("Unknown error\n");
|
|
|
|
break;
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
FatalError("X server aborted because of unsafe environment\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CheckUserAuthorization: check if the user is allowed to start the
|
|
|
|
* X server. This usually means some sort of PAM checking, and it is
|
|
|
|
* usually only done for setuid servers (uid != euid).
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef USE_PAM
|
|
|
|
#include <security/pam_appl.h>
|
|
|
|
#include <security/pam_misc.h>
|
|
|
|
#include <pwd.h>
|
2012-06-10 07:21:05 -06:00
|
|
|
#endif /* USE_PAM */
|
2006-11-26 11:13:41 -07:00
|
|
|
|
|
|
|
void
|
|
|
|
CheckUserAuthorization(void)
|
|
|
|
{
|
|
|
|
#ifdef USE_PAM
|
|
|
|
static struct pam_conv conv = {
|
2012-06-10 07:21:05 -06:00
|
|
|
misc_conv,
|
|
|
|
NULL
|
2006-11-26 11:13:41 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
pam_handle_t *pamh = NULL;
|
|
|
|
struct passwd *pw;
|
|
|
|
int retval;
|
|
|
|
|
|
|
|
if (getuid() != geteuid()) {
|
2012-06-10 07:21:05 -06:00
|
|
|
pw = getpwuid(getuid());
|
|
|
|
if (pw == NULL)
|
|
|
|
FatalError("getpwuid() failed for uid %d\n", getuid());
|
|
|
|
|
|
|
|
retval = pam_start("xserver", pw->pw_name, &conv, &pamh);
|
|
|
|
if (retval != PAM_SUCCESS)
|
|
|
|
FatalError("pam_start() failed.\n"
|
|
|
|
"\tMissing or mangled PAM config file or module?\n");
|
|
|
|
|
|
|
|
retval = pam_authenticate(pamh, 0);
|
|
|
|
if (retval != PAM_SUCCESS) {
|
|
|
|
pam_end(pamh, retval);
|
|
|
|
FatalError("PAM authentication failed, cannot start X server.\n"
|
|
|
|
"\tPerhaps you do not have console ownership?\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
retval = pam_acct_mgmt(pamh, 0);
|
|
|
|
if (retval != PAM_SUCCESS) {
|
|
|
|
pam_end(pamh, retval);
|
|
|
|
FatalError("PAM authentication failed, cannot start X server.\n"
|
|
|
|
"\tPerhaps you do not have console ownership?\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this is not a session, so do not do session management */
|
|
|
|
pam_end(pamh, PAM_SUCCESS);
|
2006-11-26 11:13:41 -07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2010-07-27 13:02:24 -06:00
|
|
|
/*
|
|
|
|
* Tokenize a string into a NULL terminated array of strings. Always returns
|
|
|
|
* an allocated array unless an error occurs.
|
|
|
|
*/
|
2012-06-10 07:21:05 -06:00
|
|
|
char **
|
2010-07-27 13:02:24 -06:00
|
|
|
xstrtokenize(const char *str, const char *separators)
|
|
|
|
{
|
|
|
|
char **list, **nlist;
|
|
|
|
char *tok, *tmp;
|
|
|
|
unsigned num = 0, n;
|
|
|
|
|
|
|
|
if (!str)
|
|
|
|
return NULL;
|
|
|
|
list = calloc(1, sizeof(*list));
|
|
|
|
if (!list)
|
|
|
|
return NULL;
|
|
|
|
tmp = strdup(str);
|
|
|
|
if (!tmp)
|
|
|
|
goto error;
|
|
|
|
for (tok = strtok(tmp, separators); tok; tok = strtok(NULL, separators)) {
|
|
|
|
nlist = realloc(list, (num + 2) * sizeof(*list));
|
|
|
|
if (!nlist)
|
|
|
|
goto error;
|
|
|
|
list = nlist;
|
|
|
|
list[num] = strdup(tok);
|
|
|
|
if (!list[num])
|
|
|
|
goto error;
|
|
|
|
list[++num] = NULL;
|
|
|
|
}
|
|
|
|
free(tmp);
|
|
|
|
return list;
|
|
|
|
|
2012-06-10 07:21:05 -06:00
|
|
|
error:
|
2010-07-27 13:02:24 -06:00
|
|
|
free(tmp);
|
|
|
|
for (n = 0; n < num; n++)
|
|
|
|
free(list[n]);
|
|
|
|
free(list);
|
|
|
|
return NULL;
|
|
|
|
}
|