#define _XOPEN_SOURCE 700 #define _POSIX_C_SOURCE 200112L #include #include #include #include #include #include #include #include #include #include #include #include #ifdef __linux__ #include #include #endif #include #include "sway/commands.h" #include "sway/config.h" #include "sway/debug.h" #include "sway/desktop/transaction.h" #include "sway/server.h" #include "sway/swaynag.h" #include "sway/tree/layout.h" #include "sway/ipc-server.h" #include "ipc-client.h" #include "readline.h" #include "stringop.h" #include "util.h" static bool terminate_request = false; static int exit_value = 0; struct sway_server server; void sway_terminate(int exit_code) { terminate_request = true; exit_value = exit_code; ipc_event_shutdown("exit"); wl_display_terminate(server.wl_display); } void sig_handler(int signal) { //close_views(&root_container); sway_terminate(EXIT_SUCCESS); } void detect_raspi() { bool raspi = false; FILE *f = fopen("/sys/firmware/devicetree/base/model", "r"); if (!f) { return; } char *line; while(!feof(f)) { if (!(line = read_line(f))) { break; } if (strstr(line, "Raspberry Pi")) { raspi = true; } free(line); } fclose(f); FILE *g = fopen("/proc/modules", "r"); if (!g) { return; } bool vc4 = false; while (!feof(g)) { if (!(line = read_line(g))) { break; } if (strstr(line, "vc4")) { vc4 = true; } free(line); } fclose(g); if (!vc4 && raspi) { fprintf(stderr, "\x1B[1;31mWarning: You have a " "Raspberry Pi, but the vc4 Module is " "not loaded! Set 'dtoverlay=vc4-kms-v3d'" "in /boot/config.txt and reboot.\x1B[0m\n"); } } void detect_proprietary() { FILE *f = fopen("/proc/modules", "r"); if (!f) { return; } while (!feof(f)) { char *line; if (!(line = read_line(f))) { break; } if (strstr(line, "nvidia")) { fprintf(stderr, "\x1B[1;31mWarning: Proprietary Nvidia drivers are " "NOT supported. Use Nouveau.\x1B[0m\n"); free(line); break; } if (strstr(line, "fglrx")) { fprintf(stderr, "\x1B[1;31mWarning: Proprietary AMD drivers do " "NOT support Wayland. Use radeon.\x1B[0m\n"); free(line); break; } free(line); } fclose(f); } void run_as_ipc_client(char *command, char *socket_path) { int socketfd = ipc_open_socket(socket_path); uint32_t len = strlen(command); char *resp = ipc_single_command(socketfd, IPC_COMMAND, command, &len); printf("%s\n", resp); close(socketfd); } static void log_env() { const char *log_vars[] = { "PATH", "LD_LIBRARY_PATH", "LD_PRELOAD_PATH", "LD_LIBRARY_PATH", "SWAY_CURSOR_THEME", "SWAY_CURSOR_SIZE", "SWAYSOCK" }; for (size_t i = 0; i < sizeof(log_vars) / sizeof(char *); ++i) { wlr_log(WLR_INFO, "%s=%s", log_vars[i], getenv(log_vars[i])); } } static void log_distro() { const char *paths[] = { "/etc/lsb-release", "/etc/os-release", "/etc/debian_version", "/etc/redhat-release", "/etc/gentoo-release", }; for (size_t i = 0; i < sizeof(paths) / sizeof(char *); ++i) { FILE *f = fopen(paths[i], "r"); if (f) { wlr_log(WLR_INFO, "Contents of %s:", paths[i]); while (!feof(f)) { char *line; if (!(line = read_line(f))) { break; } if (*line) { wlr_log(WLR_INFO, "%s", line); } free(line); } fclose(f); } } } static void log_kernel() { FILE *f = popen("uname -a", "r"); if (!f) { wlr_log(WLR_INFO, "Unable to determine kernel version"); return; } while (!feof(f)) { char *line; if (!(line = read_line(f))) { break; } if (*line) { wlr_log(WLR_INFO, "%s", line); } free(line); } pclose(f); } static void security_sanity_check() { // TODO: Notify users visually if this has issues struct stat s; if (stat("/proc", &s)) { wlr_log(WLR_ERROR, "!! DANGER !! /proc is not available - sway CANNOT enforce security rules!"); } #ifdef __linux__ cap_flag_value_t v; cap_t cap = cap_get_proc(); if (!cap || cap_get_flag(cap, CAP_SYS_PTRACE, CAP_PERMITTED, &v) != 0 || v != CAP_SET) { wlr_log(WLR_ERROR, "!! DANGER !! Sway does not have CAP_SYS_PTRACE and cannot enforce security rules for processes running as other users."); } if (cap) { cap_free(cap); } #endif } static void executable_sanity_check() { #ifdef __linux__ struct stat sb; char *exe = realpath("/proc/self/exe", NULL); stat(exe, &sb); // We assume that cap_get_file returning NULL implies ENODATA if (sb.st_mode & (S_ISUID|S_ISGID) && cap_get_file(exe)) { wlr_log(WLR_ERROR, "sway executable has both the s(g)uid bit AND file caps set."); wlr_log(WLR_ERROR, "This is strongly discouraged (and completely broken)."); wlr_log(WLR_ERROR, "Please clear one of them (either the suid bit, or the file caps)."); wlr_log(WLR_ERROR, "If unsure, strip the file caps."); exit(EXIT_FAILURE); } free(exe); #endif } static void drop_permissions(bool keep_caps) { if (getuid() != geteuid() || getgid() != getegid()) { if (setgid(getgid()) != 0) { wlr_log(WLR_ERROR, "Unable to drop root"); exit(EXIT_FAILURE); } if (setuid(getuid()) != 0) { wlr_log(WLR_ERROR, "Unable to drop root"); exit(EXIT_FAILURE); } } if (setuid(0) != -1) { wlr_log(WLR_ERROR, "Root privileges can be restored."); exit(EXIT_FAILURE); } #ifdef __linux__ if (keep_caps) { // Drop every cap except CAP_SYS_PTRACE cap_t caps = cap_init(); cap_value_t keep = CAP_SYS_PTRACE; wlr_log(WLR_INFO, "Dropping extra capabilities"); if (cap_set_flag(caps, CAP_PERMITTED, 1, &keep, CAP_SET) || cap_set_flag(caps, CAP_EFFECTIVE, 1, &keep, CAP_SET) || cap_set_proc(caps)) { wlr_log(WLR_ERROR, "Failed to drop extra capabilities"); exit(EXIT_FAILURE); } } #endif } void enable_debug_flag(const char *flag) { if (strcmp(flag, "render-tree") == 0) { enable_debug_tree = true; } else if (strncmp(flag, "damage=", 7) == 0) { damage_debug = &flag[7]; } else if (strcmp(flag, "txn-debug") == 0) { txn_debug = true; } else if (strncmp(flag, "txn-timeout=", 12) == 0) { txn_timeout_ms = atoi(&flag[12]); } } int main(int argc, char **argv) { static int verbose = 0, debug = 0, validate = 0; static struct option long_options[] = { {"help", no_argument, NULL, 'h'}, {"config", required_argument, NULL, 'c'}, {"validate", no_argument, NULL, 'C'}, {"debug", no_argument, NULL, 'd'}, {"version", no_argument, NULL, 'v'}, {"verbose", no_argument, NULL, 'V'}, {"get-socketpath", no_argument, NULL, 'p'}, {0, 0, 0, 0} }; char *config_path = NULL; const char* usage = "Usage: sway [options] [command]\n" "\n" " -h, --help Show help message and quit.\n" " -c, --config Specify a config file.\n" " -C, --validate Check the validity of the config file, then exit.\n" " -d, --debug Enables full logging, including debug information.\n" " -v, --version Show the version number and quit.\n" " -V, --verbose Enables more verbose logging.\n" " --get-socketpath Gets the IPC socket path and prints it, then exits.\n" "\n"; // Security: unsetenv("LD_PRELOAD"); #ifdef _LD_LIBRARY_PATH setenv("LD_LIBRARY_PATH", _LD_LIBRARY_PATH, 1); #else unsetenv("LD_LIBRARY_PATH"); #endif int c; while (1) { int option_index = 0; c = getopt_long(argc, argv, "hCdD:vVc:", long_options, &option_index); if (c == -1) { break; } switch (c) { case 'h': // help fprintf(stdout, "%s", usage); exit(EXIT_SUCCESS); break; case 'c': // config config_path = strdup(optarg); break; case 'C': // validate validate = 1; break; case 'd': // debug debug = 1; break; case 'D': // extended debug options enable_debug_flag(optarg); break; case 'v': // version fprintf(stdout, "sway version " SWAY_VERSION "\n"); exit(EXIT_SUCCESS); break; case 'V': // verbose verbose = 1; break; case 'p': ; // --get-socketpath if (getenv("SWAYSOCK")) { fprintf(stdout, "%s\n", getenv("SWAYSOCK")); exit(EXIT_SUCCESS); } else { fprintf(stderr, "sway socket not detected.\n"); exit(EXIT_FAILURE); } break; default: fprintf(stderr, "%s", usage); exit(EXIT_FAILURE); } } // TODO: switch logging over to wlroots? if (debug) { wlr_log_init(WLR_DEBUG, NULL); } else if (verbose || validate) { wlr_log_init(WLR_INFO, NULL); } else { wlr_log_init(WLR_ERROR, NULL); } if (optind < argc) { // Behave as IPC client if(optind != 1) { wlr_log(WLR_ERROR, "Don't use options with the IPC client"); exit(EXIT_FAILURE); } drop_permissions(false); char *socket_path = getenv("SWAYSOCK"); if (!socket_path) { wlr_log(WLR_ERROR, "Unable to retrieve socket path"); exit(EXIT_FAILURE); } char *command = join_args(argv + optind, argc - optind); run_as_ipc_client(command, socket_path); return 0; } executable_sanity_check(); bool suid = false; if (!server_privileged_prepare(&server)) { return 1; } #ifdef __linux__ if (getuid() != geteuid() || getgid() != getegid()) { // Retain capabilities after setuid() if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0)) { wlr_log(WLR_ERROR, "Cannot keep caps after setuid()"); exit(EXIT_FAILURE); } suid = true; } #endif log_kernel(); log_distro(); detect_proprietary(); detect_raspi(); #ifdef __linux__ drop_permissions(suid); #endif // handle SIGTERM signals signal(SIGTERM, sig_handler); // prevent ipc from crashing sway signal(SIGPIPE, SIG_IGN); wlr_log(WLR_INFO, "Starting sway version " SWAY_VERSION); layout_init(); if (!server_init(&server)) { return 1; } ipc_init(&server); log_env(); if (validate) { bool valid = load_main_config(config_path, false, true); return valid ? 0 : 1; } setenv("WAYLAND_DISPLAY", server.socket, true); if (!load_main_config(config_path, false, false)) { sway_terminate(EXIT_FAILURE); } if (config_path) { free(config_path); } security_sanity_check(); if (!terminate_request) { if (!server_start_backend(&server)) { sway_terminate(EXIT_FAILURE); } } config->active = true; // Execute commands until there are none left wlr_log(WLR_DEBUG, "Running deferred commands"); while (config->cmd_queue->length) { char *line = config->cmd_queue->items[0]; struct cmd_results *res = execute_command(line, NULL); if (res->status != CMD_SUCCESS) { wlr_log(WLR_ERROR, "Error on line '%s': %s", line, res->error); } free_cmd_results(res); free(line); list_del(config->cmd_queue, 0); } transaction_commit_dirty(); if (config->swaynag_config_errors.pid > 0) { swaynag_show(&config->swaynag_config_errors); } if (!terminate_request) { server_run(&server); } wlr_log(WLR_INFO, "Shutting down sway"); server_fini(&server); if (config) { free_config(config); } pango_cairo_font_map_set_default(NULL); return exit_value; }