2011-02-25 16:20:27 +00:00
|
|
|
/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
|
2021-03-31 23:08:12 +00:00
|
|
|
#if defined (HAVE_MALLINFO) || defined (HAVE_MALLINFO2)
|
2011-02-25 16:20:27 +00:00
|
|
|
#include <malloc.h>
|
|
|
|
#endif
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
2012-12-23 04:14:14 +00:00
|
|
|
#include <cogl-pango/cogl-pango.h>
|
2011-02-25 16:20:27 +00:00
|
|
|
#include <clutter/clutter.h>
|
2021-07-02 15:20:27 +00:00
|
|
|
#include <glib-unix.h>
|
2011-02-25 16:20:27 +00:00
|
|
|
#include <glib/gi18n-lib.h>
|
|
|
|
#include <girepository.h>
|
2021-05-06 21:17:40 +00:00
|
|
|
#include <meta/meta-context.h>
|
2011-03-05 15:49:24 +00:00
|
|
|
#include <meta/meta-plugin.h>
|
|
|
|
#include <meta/prefs.h>
|
2012-06-14 11:57:09 +00:00
|
|
|
#include <atk-bridge.h>
|
main: Prepend RPATH or RUNPATH paths to gir search paths
If one wants to run tests the non-installed gnome-shell, that currently
fails as gnome-shell the executable attempts to link against
./build/src/libgnome-shell.so, but when GObject introspection tries to
find what library to link to for Shell, it goes to the installed
libgnome-shell.so, causing two different versions of libgnome-shell.so
to be loaded.
This, however, can be avoided thanks to meson adding $ORIGIN paths to
relevant libraries before installing an executable. What this means in
practice is that we can inspect ourself upon startup, discover whether
the RPATH/RUNPATH header contains $ORIGIN, and if so, expand it to the
directory containing the executable, and prepend the introspection
search paths with said directory.
This effectively means that the introspection machinery now finds the
same library that the linker linked the gnome-shell executable with,
making it run successfully.
It's not possible to use $GI_TYPELIB_PATH since
g_irepository_prepend_library_path() takes precedence. There is no
"append" variant of that API.
Part-of: <https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/1349>
2022-08-17 19:43:21 +00:00
|
|
|
#include <link.h>
|
|
|
|
|
|
|
|
#ifdef HAVE_EXE_INTROSPECTION
|
|
|
|
#include <elf.h>
|
|
|
|
#endif
|
2011-02-25 16:20:27 +00:00
|
|
|
|
2011-06-21 14:09:09 +00:00
|
|
|
#include "shell-global.h"
|
2011-08-28 05:32:12 +00:00
|
|
|
#include "shell-global-private.h"
|
2011-02-25 16:20:27 +00:00
|
|
|
#include "shell-perf-log.h"
|
|
|
|
#include "st.h"
|
|
|
|
|
|
|
|
extern GType gnome_shell_plugin_get_type (void);
|
|
|
|
|
|
|
|
#define SHELL_DBUS_SERVICE "org.gnome.Shell"
|
|
|
|
|
2011-10-20 20:28:59 +00:00
|
|
|
#define WM_NAME "GNOME Shell"
|
2012-11-05 13:54:33 +00:00
|
|
|
#define GNOME_WM_KEYBINDINGS "Mutter,GNOME Shell"
|
2011-10-20 20:28:59 +00:00
|
|
|
|
2011-06-21 14:09:09 +00:00
|
|
|
static gboolean is_gdm_mode = FALSE;
|
2012-05-16 20:56:27 +00:00
|
|
|
static char *session_mode = NULL;
|
2017-10-20 10:41:59 +00:00
|
|
|
static int caught_signal = 0;
|
2022-11-29 15:26:46 +00:00
|
|
|
static gboolean force_animations = FALSE;
|
2011-06-21 14:09:09 +00:00
|
|
|
|
2011-08-16 12:19:59 +00:00
|
|
|
#define DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER 1
|
|
|
|
#define DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER 4
|
|
|
|
|
2012-11-28 18:45:52 +00:00
|
|
|
enum {
|
|
|
|
SHELL_DEBUG_BACKTRACE_WARNINGS = 1,
|
2017-10-20 10:41:59 +00:00
|
|
|
SHELL_DEBUG_BACKTRACE_SEGFAULTS = 2,
|
2012-11-28 18:45:52 +00:00
|
|
|
};
|
|
|
|
static int _shell_debug;
|
2017-10-24 05:28:33 +00:00
|
|
|
static gboolean _tracked_signals[NSIG] = { 0 };
|
2012-11-28 18:45:52 +00:00
|
|
|
|
2011-02-25 16:20:27 +00:00
|
|
|
static void
|
2015-09-23 18:40:42 +00:00
|
|
|
shell_dbus_acquire_name (GDBusProxy *bus,
|
|
|
|
guint32 request_name_flags,
|
|
|
|
guint32 *request_name_result,
|
|
|
|
const gchar *name,
|
|
|
|
gboolean fatal)
|
2011-02-25 16:20:27 +00:00
|
|
|
{
|
|
|
|
GError *error = NULL;
|
2011-08-16 12:19:59 +00:00
|
|
|
GVariant *request_name_variant;
|
|
|
|
|
|
|
|
if (!(request_name_variant = g_dbus_proxy_call_sync (bus,
|
|
|
|
"RequestName",
|
|
|
|
g_variant_new ("(su)", name, request_name_flags),
|
|
|
|
0, /* call flags */
|
|
|
|
-1, /* timeout */
|
|
|
|
NULL, /* cancellable */
|
|
|
|
&error)))
|
2011-09-23 17:57:46 +00:00
|
|
|
{
|
2011-11-12 23:37:47 +00:00
|
|
|
g_printerr ("failed to acquire %s: %s\n", name, error->message);
|
2015-09-24 17:16:56 +00:00
|
|
|
g_clear_error (&error);
|
2011-11-12 23:37:47 +00:00
|
|
|
if (!fatal)
|
|
|
|
return;
|
2011-08-16 12:19:59 +00:00
|
|
|
exit (1);
|
2011-09-23 17:57:46 +00:00
|
|
|
}
|
2011-08-16 12:19:59 +00:00
|
|
|
g_variant_get (request_name_variant, "(u)", request_name_result);
|
2015-09-24 17:17:36 +00:00
|
|
|
g_variant_unref (request_name_variant);
|
2011-09-23 17:57:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
shell_dbus_init (gboolean replace)
|
|
|
|
{
|
2011-08-16 12:19:59 +00:00
|
|
|
GDBusConnection *session;
|
|
|
|
GDBusProxy *bus;
|
|
|
|
GError *error = NULL;
|
2011-03-23 17:15:17 +00:00
|
|
|
guint32 request_name_flags;
|
2011-02-25 16:20:27 +00:00
|
|
|
guint32 request_name_result;
|
|
|
|
|
2011-08-16 12:19:59 +00:00
|
|
|
session = g_bus_get_sync (G_BUS_TYPE_SESSION, NULL, &error);
|
2011-02-25 16:20:27 +00:00
|
|
|
|
2011-08-16 12:19:59 +00:00
|
|
|
if (error) {
|
|
|
|
g_printerr ("Failed to connect to session bus: %s", error->message);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
bus = g_dbus_proxy_new_sync (session,
|
|
|
|
G_DBUS_PROXY_FLAGS_NONE,
|
|
|
|
NULL, /* interface info */
|
|
|
|
"org.freedesktop.DBus",
|
|
|
|
"/org/freedesktop/DBus",
|
|
|
|
"org.freedesktop.DBus",
|
|
|
|
NULL, /* cancellable */
|
|
|
|
&error);
|
2011-02-25 16:20:27 +00:00
|
|
|
|
2015-09-24 17:31:07 +00:00
|
|
|
if (!bus)
|
|
|
|
{
|
|
|
|
g_printerr ("Failed to get a session bus proxy: %s", error->message);
|
|
|
|
exit (1);
|
|
|
|
}
|
|
|
|
|
2011-08-16 12:19:59 +00:00
|
|
|
request_name_flags = G_BUS_NAME_OWNER_FLAGS_ALLOW_REPLACEMENT;
|
2011-03-23 17:15:17 +00:00
|
|
|
if (replace)
|
2017-03-10 15:20:25 +00:00
|
|
|
request_name_flags |= G_BUS_NAME_OWNER_FLAGS_REPLACE;
|
2011-08-16 12:19:59 +00:00
|
|
|
|
2011-09-23 17:57:46 +00:00
|
|
|
shell_dbus_acquire_name (bus,
|
|
|
|
request_name_flags,
|
|
|
|
&request_name_result,
|
|
|
|
SHELL_DBUS_SERVICE, TRUE);
|
2011-03-23 17:15:17 +00:00
|
|
|
if (!(request_name_result == DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER
|
|
|
|
|| request_name_result == DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER))
|
|
|
|
{
|
2011-08-16 12:19:59 +00:00
|
|
|
g_printerr (SHELL_DBUS_SERVICE " already exists on bus and --replace not specified\n");
|
2011-03-23 17:15:17 +00:00
|
|
|
exit (1);
|
2011-02-25 16:20:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
g_object_unref (bus);
|
2011-08-16 12:19:59 +00:00
|
|
|
g_object_unref (session);
|
2011-02-25 16:20:27 +00:00
|
|
|
}
|
|
|
|
|
main: Prepend RPATH or RUNPATH paths to gir search paths
If one wants to run tests the non-installed gnome-shell, that currently
fails as gnome-shell the executable attempts to link against
./build/src/libgnome-shell.so, but when GObject introspection tries to
find what library to link to for Shell, it goes to the installed
libgnome-shell.so, causing two different versions of libgnome-shell.so
to be loaded.
This, however, can be avoided thanks to meson adding $ORIGIN paths to
relevant libraries before installing an executable. What this means in
practice is that we can inspect ourself upon startup, discover whether
the RPATH/RUNPATH header contains $ORIGIN, and if so, expand it to the
directory containing the executable, and prepend the introspection
search paths with said directory.
This effectively means that the introspection machinery now finds the
same library that the linker linked the gnome-shell executable with,
making it run successfully.
It's not possible to use $GI_TYPELIB_PATH since
g_irepository_prepend_library_path() takes precedence. There is no
"append" variant of that API.
Part-of: <https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/1349>
2022-08-17 19:43:21 +00:00
|
|
|
#ifdef HAVE_EXE_INTROSPECTION
|
|
|
|
static void
|
|
|
|
maybe_add_rpath_introspection_paths (void)
|
|
|
|
{
|
|
|
|
ElfW (Dyn) *dyn;
|
|
|
|
ElfW (Dyn) *rpath = NULL;
|
|
|
|
ElfW (Dyn) *runpath = NULL;
|
|
|
|
const char *strtab = NULL;
|
|
|
|
g_auto (GStrv) paths = NULL;
|
|
|
|
g_autofree char *exe_dir = NULL;
|
|
|
|
GStrv str;
|
|
|
|
|
|
|
|
for (dyn = _DYNAMIC; dyn->d_tag != DT_NULL; dyn++)
|
|
|
|
{
|
|
|
|
if (dyn->d_tag == DT_RPATH)
|
|
|
|
rpath = dyn;
|
|
|
|
else if (dyn->d_tag == DT_RUNPATH)
|
|
|
|
runpath = dyn;
|
|
|
|
else if (dyn->d_tag == DT_STRTAB)
|
|
|
|
strtab = (const char *) dyn->d_un.d_val;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((!rpath && !runpath) || !strtab)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (rpath)
|
|
|
|
paths = g_strsplit (strtab + rpath->d_un.d_val, ":", -1);
|
|
|
|
else
|
|
|
|
paths = g_strsplit (strtab + runpath->d_un.d_val, ":", -1);
|
|
|
|
|
|
|
|
if (!paths)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (str = paths; *str; str++)
|
|
|
|
{
|
|
|
|
g_autoptr (GError) error = NULL;
|
|
|
|
g_autoptr (GString) rpath_dir = NULL;
|
|
|
|
|
|
|
|
if (!strstr (*str, "$ORIGIN"))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!exe_dir)
|
|
|
|
{
|
|
|
|
g_autofree char *exe_path = NULL;
|
|
|
|
|
|
|
|
exe_path = g_file_read_link ("/proc/self/exe", &error);
|
|
|
|
if (!exe_path)
|
|
|
|
{
|
|
|
|
g_warning ("Failed to find directory of executable: %s",
|
|
|
|
error->message);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
exe_dir = g_path_get_dirname (exe_path);
|
|
|
|
}
|
|
|
|
|
|
|
|
rpath_dir = g_string_new (*str);
|
|
|
|
g_string_replace (rpath_dir, "$ORIGIN", exe_dir, 0);
|
|
|
|
|
|
|
|
g_debug ("Prepending RPATH directory '%s' "
|
|
|
|
"to introsepciton library search path",
|
|
|
|
rpath_dir->str);
|
|
|
|
g_irepository_prepend_search_path (rpath_dir->str);
|
|
|
|
g_irepository_prepend_library_path (rpath_dir->str);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* HAVE_EXE_INTROSPECTION */
|
|
|
|
|
2012-05-18 01:52:57 +00:00
|
|
|
static void
|
|
|
|
shell_introspection_init (void)
|
|
|
|
{
|
|
|
|
|
|
|
|
g_irepository_prepend_search_path (MUTTER_TYPELIB_DIR);
|
|
|
|
g_irepository_prepend_search_path (GNOME_SHELL_PKGLIBDIR);
|
2017-08-10 18:47:59 +00:00
|
|
|
|
|
|
|
/* We need to explicitly add the directories where the private libraries are
|
|
|
|
* installed to the GIR's library path, so that they can be found at runtime
|
|
|
|
* when linking using DT_RUNPATH (instead of DT_RPATH), which is the default
|
|
|
|
* for some linkers (e.g. gold) and in some distros (e.g. Debian).
|
|
|
|
*/
|
|
|
|
g_irepository_prepend_library_path (MUTTER_TYPELIB_DIR);
|
|
|
|
g_irepository_prepend_library_path (GNOME_SHELL_PKGLIBDIR);
|
main: Prepend RPATH or RUNPATH paths to gir search paths
If one wants to run tests the non-installed gnome-shell, that currently
fails as gnome-shell the executable attempts to link against
./build/src/libgnome-shell.so, but when GObject introspection tries to
find what library to link to for Shell, it goes to the installed
libgnome-shell.so, causing two different versions of libgnome-shell.so
to be loaded.
This, however, can be avoided thanks to meson adding $ORIGIN paths to
relevant libraries before installing an executable. What this means in
practice is that we can inspect ourself upon startup, discover whether
the RPATH/RUNPATH header contains $ORIGIN, and if so, expand it to the
directory containing the executable, and prepend the introspection
search paths with said directory.
This effectively means that the introspection machinery now finds the
same library that the linker linked the gnome-shell executable with,
making it run successfully.
It's not possible to use $GI_TYPELIB_PATH since
g_irepository_prepend_library_path() takes precedence. There is no
"append" variant of that API.
Part-of: <https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/1349>
2022-08-17 19:43:21 +00:00
|
|
|
|
|
|
|
#ifdef HAVE_EXE_INTROSPECTION
|
|
|
|
maybe_add_rpath_introspection_paths ();
|
|
|
|
#endif
|
2012-05-18 01:52:57 +00:00
|
|
|
}
|
|
|
|
|
2012-12-23 04:14:14 +00:00
|
|
|
static void
|
|
|
|
shell_fonts_init (void)
|
|
|
|
{
|
|
|
|
CoglPangoFontMap *fontmap;
|
|
|
|
|
|
|
|
/* Disable text mipmapping; it causes problems on pre-GEM Intel
|
|
|
|
* drivers and we should just be rendering text at the right
|
|
|
|
* size rather than scaling it. If we do effects where we dynamically
|
|
|
|
* zoom labels, then we might want to reconsider.
|
|
|
|
*/
|
|
|
|
fontmap = COGL_PANGO_FONT_MAP (clutter_get_font_map ());
|
|
|
|
cogl_pango_font_map_set_use_mipmapping (fontmap, FALSE);
|
|
|
|
}
|
|
|
|
|
2019-06-05 23:12:47 +00:00
|
|
|
static void
|
|
|
|
shell_profiler_init (void)
|
|
|
|
{
|
|
|
|
ShellGlobal *global;
|
|
|
|
GjsProfiler *profiler;
|
|
|
|
GjsContext *context;
|
|
|
|
const char *enabled;
|
|
|
|
const char *fd_str;
|
|
|
|
int fd = -1;
|
|
|
|
|
|
|
|
/* Sysprof uses the "GJS_TRACE_FD=N" environment variable to connect GJS
|
|
|
|
* profiler data to the combined Sysprof capture. Since we are in control of
|
|
|
|
* the GjsContext, we need to proxy this FD across to the GJS profiler.
|
|
|
|
*/
|
|
|
|
|
|
|
|
fd_str = g_getenv ("GJS_TRACE_FD");
|
|
|
|
enabled = g_getenv ("GJS_ENABLE_PROFILER");
|
|
|
|
if (fd_str == NULL || enabled == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
global = shell_global_get ();
|
|
|
|
g_return_if_fail (global);
|
|
|
|
|
|
|
|
context = _shell_global_get_gjs_context (global);
|
|
|
|
g_return_if_fail (context);
|
|
|
|
|
|
|
|
profiler = gjs_context_get_profiler (context);
|
|
|
|
g_return_if_fail (profiler);
|
|
|
|
|
|
|
|
if (fd_str)
|
|
|
|
{
|
|
|
|
fd = atoi (fd_str);
|
|
|
|
|
|
|
|
if (fd > 2)
|
|
|
|
{
|
|
|
|
gjs_profiler_set_fd (profiler, fd);
|
|
|
|
gjs_profiler_start (profiler);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
shell_profiler_shutdown (void)
|
|
|
|
{
|
|
|
|
ShellGlobal *global;
|
|
|
|
GjsProfiler *profiler;
|
|
|
|
GjsContext *context;
|
|
|
|
|
|
|
|
global = shell_global_get ();
|
|
|
|
context = _shell_global_get_gjs_context (global);
|
|
|
|
profiler = gjs_context_get_profiler (context);
|
|
|
|
|
|
|
|
if (profiler)
|
|
|
|
gjs_profiler_stop (profiler);
|
|
|
|
}
|
|
|
|
|
2011-02-25 16:20:27 +00:00
|
|
|
static void
|
|
|
|
malloc_statistics_callback (ShellPerfLog *perf_log,
|
|
|
|
gpointer data)
|
|
|
|
{
|
2021-03-31 23:08:12 +00:00
|
|
|
#if defined (HAVE_MALLINFO) || defined (HAVE_MALLINFO2)
|
|
|
|
#ifdef HAVE_MALLINFO2
|
|
|
|
struct mallinfo2 info = mallinfo2 ();
|
|
|
|
#else
|
2011-02-25 16:20:27 +00:00
|
|
|
struct mallinfo info = mallinfo ();
|
2021-03-31 23:08:12 +00:00
|
|
|
#endif
|
2011-02-25 16:20:27 +00:00
|
|
|
|
|
|
|
shell_perf_log_update_statistic_i (perf_log,
|
|
|
|
"malloc.arenaSize",
|
|
|
|
info.arena);
|
|
|
|
shell_perf_log_update_statistic_i (perf_log,
|
|
|
|
"malloc.mmapSize",
|
|
|
|
info.hblkhd);
|
|
|
|
shell_perf_log_update_statistic_i (perf_log,
|
|
|
|
"malloc.usedSize",
|
|
|
|
info.uordblks);
|
2021-03-31 23:08:12 +00:00
|
|
|
#endif /* defined (HAVE_MALLINFO) || defined (HAVE_MALLINFO2) */
|
2011-02-25 16:20:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
shell_perf_log_init (void)
|
|
|
|
{
|
|
|
|
ShellPerfLog *perf_log = shell_perf_log_get_default ();
|
|
|
|
|
|
|
|
/* For probably historical reasons, mallinfo() defines the returned values,
|
|
|
|
* even those in bytes as int, not size_t. We're determined not to use
|
|
|
|
* more than 2G of malloc'ed memory, so are OK with that.
|
|
|
|
*/
|
|
|
|
shell_perf_log_define_statistic (perf_log,
|
|
|
|
"malloc.arenaSize",
|
|
|
|
"Amount of memory allocated by malloc() with brk(), in bytes",
|
|
|
|
"i");
|
|
|
|
shell_perf_log_define_statistic (perf_log,
|
|
|
|
"malloc.mmapSize",
|
|
|
|
"Amount of memory allocated by malloc() with mmap(), in bytes",
|
|
|
|
"i");
|
|
|
|
shell_perf_log_define_statistic (perf_log,
|
|
|
|
"malloc.usedSize",
|
|
|
|
"Amount of malloc'ed memory currently in use",
|
|
|
|
"i");
|
|
|
|
|
|
|
|
shell_perf_log_add_statistics_callback (perf_log,
|
|
|
|
malloc_statistics_callback,
|
|
|
|
NULL, NULL);
|
|
|
|
}
|
|
|
|
|
2012-06-14 11:57:09 +00:00
|
|
|
static void
|
|
|
|
shell_a11y_init (void)
|
|
|
|
{
|
2014-09-03 16:45:32 +00:00
|
|
|
cally_accessibility_init ();
|
|
|
|
|
2012-06-14 11:57:09 +00:00
|
|
|
if (clutter_get_accessibility_enabled () == FALSE)
|
|
|
|
{
|
|
|
|
g_warning ("Accessibility: clutter has no accessibility enabled"
|
|
|
|
" skipping the atk-bridge load");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
atk_bridge_adaptor_init (NULL, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-11-28 18:45:52 +00:00
|
|
|
static void
|
|
|
|
shell_init_debug (const char *debug_env)
|
|
|
|
{
|
|
|
|
static const GDebugKey keys[] = {
|
2017-10-20 10:41:59 +00:00
|
|
|
{ "backtrace-warnings", SHELL_DEBUG_BACKTRACE_WARNINGS },
|
|
|
|
{ "backtrace-segfaults", SHELL_DEBUG_BACKTRACE_SEGFAULTS },
|
2012-11-28 18:45:52 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
_shell_debug = g_parse_debug_string (debug_env, keys,
|
|
|
|
G_N_ELEMENTS (keys));
|
|
|
|
}
|
|
|
|
|
2019-09-02 15:05:27 +00:00
|
|
|
static GLogWriterOutput
|
|
|
|
default_log_writer (GLogLevelFlags log_level,
|
|
|
|
const GLogField *fields,
|
|
|
|
gsize n_fields,
|
|
|
|
gpointer user_data)
|
2011-06-20 13:01:54 +00:00
|
|
|
{
|
2019-09-02 15:05:27 +00:00
|
|
|
GLogWriterOutput output;
|
|
|
|
int i;
|
2012-11-28 18:45:52 +00:00
|
|
|
|
2019-09-02 15:05:27 +00:00
|
|
|
output = g_log_writer_default (log_level, fields, n_fields, user_data);
|
2012-11-28 18:45:52 +00:00
|
|
|
|
|
|
|
if ((_shell_debug & SHELL_DEBUG_BACKTRACE_WARNINGS) &&
|
|
|
|
((log_level & G_LOG_LEVEL_CRITICAL) ||
|
|
|
|
(log_level & G_LOG_LEVEL_WARNING)))
|
2019-09-02 15:05:27 +00:00
|
|
|
{
|
|
|
|
const char *log_domain = NULL;
|
|
|
|
|
|
|
|
for (i = 0; i < n_fields; i++)
|
|
|
|
{
|
|
|
|
if (g_strcmp0 (fields[i].key, "GLIB_DOMAIN") == 0)
|
|
|
|
{
|
|
|
|
log_domain = fields[i].value;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Filter out Gjs logs, those already have the stack */
|
|
|
|
if (g_strcmp0 (log_domain, "Gjs") != 0)
|
|
|
|
gjs_dumpstack ();
|
|
|
|
}
|
|
|
|
|
|
|
|
return output;
|
2011-06-20 13:01:54 +00:00
|
|
|
}
|
|
|
|
|
2019-09-02 15:05:27 +00:00
|
|
|
static GLogWriterOutput
|
|
|
|
shut_up (GLogLevelFlags log_level,
|
|
|
|
const GLogField *fields,
|
|
|
|
gsize n_fields,
|
|
|
|
gpointer user_data)
|
2012-05-18 01:52:57 +00:00
|
|
|
{
|
2019-09-02 15:05:27 +00:00
|
|
|
return (GLogWriterOutput) {0};
|
2012-05-18 01:52:57 +00:00
|
|
|
}
|
|
|
|
|
2017-10-20 10:41:59 +00:00
|
|
|
static void
|
2017-10-24 05:28:33 +00:00
|
|
|
dump_gjs_stack_alarm_sigaction (int signo)
|
2017-10-20 10:41:59 +00:00
|
|
|
{
|
2019-09-02 15:05:27 +00:00
|
|
|
g_log_set_writer_func (g_log_writer_default, NULL, NULL);
|
2017-10-20 10:41:59 +00:00
|
|
|
g_warning ("Failed to dump Javascript stack, got stuck");
|
2019-09-02 15:05:27 +00:00
|
|
|
g_log_set_writer_func (default_log_writer, NULL, NULL);
|
2017-10-20 10:41:59 +00:00
|
|
|
|
|
|
|
raise (caught_signal);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
dump_gjs_stack_on_signal_handler (int signo)
|
|
|
|
{
|
2019-07-20 08:28:53 +00:00
|
|
|
struct sigaction sa = { .sa_handler = dump_gjs_stack_alarm_sigaction };
|
2017-10-24 05:28:33 +00:00
|
|
|
gsize i;
|
|
|
|
|
|
|
|
/* Ignore all the signals starting this point, a part the one we'll raise
|
|
|
|
* (which is implicitly ignored here through SA_RESETHAND), this is needed
|
|
|
|
* not to get this handler being called by other signals that we were
|
|
|
|
* tracking and that might be emitted by code called starting from now.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < G_N_ELEMENTS (_tracked_signals); ++i)
|
|
|
|
{
|
|
|
|
if (_tracked_signals[i] && i != signo)
|
|
|
|
signal (i, SIG_IGN);
|
|
|
|
}
|
2017-10-20 10:41:59 +00:00
|
|
|
|
2017-10-24 05:28:33 +00:00
|
|
|
/* Waiting at least 5 seconds for the dumpstack, if it fails, we raise the error */
|
2017-10-20 10:41:59 +00:00
|
|
|
caught_signal = signo;
|
|
|
|
sigemptyset (&sa.sa_mask);
|
|
|
|
sigaction (SIGALRM, &sa, NULL);
|
|
|
|
|
|
|
|
alarm (5);
|
|
|
|
gjs_dumpstack ();
|
|
|
|
alarm (0);
|
|
|
|
|
|
|
|
raise (signo);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
dump_gjs_stack_on_signal (int signo)
|
|
|
|
{
|
2019-07-20 08:28:53 +00:00
|
|
|
struct sigaction sa = {
|
|
|
|
.sa_flags = SA_RESETHAND | SA_NODEFER,
|
|
|
|
.sa_handler = dump_gjs_stack_on_signal_handler,
|
|
|
|
};
|
2017-10-20 10:41:59 +00:00
|
|
|
|
2017-10-24 05:28:33 +00:00
|
|
|
sigemptyset (&sa.sa_mask);
|
2017-10-20 10:41:59 +00:00
|
|
|
|
|
|
|
sigaction (signo, &sa, NULL);
|
2017-10-24 05:28:33 +00:00
|
|
|
_tracked_signals[signo] = TRUE;
|
2017-10-20 10:41:59 +00:00
|
|
|
}
|
|
|
|
|
2012-05-18 01:52:57 +00:00
|
|
|
static gboolean
|
|
|
|
list_modes (const char *option_name,
|
|
|
|
const char *value,
|
|
|
|
gpointer data,
|
|
|
|
GError **error)
|
|
|
|
{
|
|
|
|
ShellGlobal *global;
|
|
|
|
GjsContext *context;
|
|
|
|
const char *script;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
/* Many of our imports require global to be set, so rather than
|
|
|
|
* tayloring our imports carefully here to avoid that dependency,
|
2023-02-22 00:39:21 +00:00
|
|
|
* we just set it. */
|
2019-09-02 15:05:27 +00:00
|
|
|
g_log_set_writer_func (shut_up, NULL, NULL);
|
2012-05-18 01:52:57 +00:00
|
|
|
|
|
|
|
_shell_global_init (NULL);
|
|
|
|
global = shell_global_get ();
|
|
|
|
context = _shell_global_get_gjs_context (global);
|
|
|
|
|
|
|
|
shell_introspection_init ();
|
|
|
|
|
|
|
|
script = "imports.ui.environment.init();"
|
|
|
|
"imports.ui.sessionMode.listModes();";
|
|
|
|
if (!gjs_context_eval (context, script, -1, "<main>", &status, NULL))
|
|
|
|
g_message ("Retrieving list of available modes failed.");
|
|
|
|
|
2017-02-10 02:09:21 +00:00
|
|
|
g_object_unref (context);
|
2012-05-18 01:52:57 +00:00
|
|
|
exit (status);
|
|
|
|
}
|
|
|
|
|
2011-02-25 16:20:27 +00:00
|
|
|
static gboolean
|
|
|
|
print_version (const gchar *option_name,
|
|
|
|
const gchar *value,
|
|
|
|
gpointer data,
|
|
|
|
GError **error)
|
|
|
|
{
|
|
|
|
g_print ("GNOME Shell %s\n", VERSION);
|
|
|
|
exit (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
GOptionEntry gnome_shell_options[] = {
|
|
|
|
{
|
|
|
|
"version", 0, G_OPTION_FLAG_NO_ARG, G_OPTION_ARG_CALLBACK,
|
|
|
|
print_version,
|
|
|
|
N_("Print version"),
|
|
|
|
NULL
|
|
|
|
},
|
2011-06-21 14:09:09 +00:00
|
|
|
{
|
2012-05-16 20:56:27 +00:00
|
|
|
"gdm-mode", 0, G_OPTION_FLAG_HIDDEN, G_OPTION_ARG_NONE,
|
2011-06-21 14:09:09 +00:00
|
|
|
&is_gdm_mode,
|
|
|
|
N_("Mode used by GDM for login screen"),
|
|
|
|
NULL
|
|
|
|
},
|
2012-05-16 20:56:27 +00:00
|
|
|
{
|
|
|
|
"mode", 0, 0, G_OPTION_ARG_STRING,
|
|
|
|
&session_mode,
|
2016-09-29 22:00:13 +00:00
|
|
|
N_("Use a specific mode, e.g. “gdm” for login screen"),
|
2012-05-16 20:56:27 +00:00
|
|
|
"MODE"
|
|
|
|
},
|
2012-05-18 01:52:57 +00:00
|
|
|
{
|
|
|
|
"list-modes", 0, G_OPTION_FLAG_NO_ARG, G_OPTION_ARG_CALLBACK,
|
|
|
|
list_modes,
|
|
|
|
N_("List possible modes"),
|
|
|
|
NULL
|
|
|
|
},
|
2022-11-29 15:26:46 +00:00
|
|
|
{
|
|
|
|
"force-animations", 0, G_OPTION_FLAG_NONE, G_OPTION_ARG_NONE,
|
|
|
|
&force_animations,
|
|
|
|
N_("Force animations to be enabled"),
|
|
|
|
NULL
|
|
|
|
},
|
2011-02-25 16:20:27 +00:00
|
|
|
{ NULL }
|
|
|
|
};
|
|
|
|
|
2021-07-02 15:20:27 +00:00
|
|
|
static gboolean
|
|
|
|
on_sigterm (gpointer user_data)
|
|
|
|
{
|
|
|
|
MetaContext *context = META_CONTEXT (user_data);
|
|
|
|
|
|
|
|
meta_context_terminate (context);
|
|
|
|
|
|
|
|
return G_SOURCE_REMOVE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
init_signal_handlers (MetaContext *context)
|
|
|
|
{
|
|
|
|
struct sigaction act = { 0 };
|
|
|
|
sigset_t empty_mask;
|
|
|
|
|
|
|
|
sigemptyset (&empty_mask);
|
|
|
|
act.sa_handler = SIG_IGN;
|
|
|
|
act.sa_mask = empty_mask;
|
|
|
|
act.sa_flags = 0;
|
|
|
|
if (sigaction (SIGPIPE, &act, NULL) < 0)
|
|
|
|
g_warning ("Failed to register SIGPIPE handler: %s", g_strerror (errno));
|
|
|
|
#ifdef SIGXFSZ
|
|
|
|
if (sigaction (SIGXFSZ, &act, NULL) < 0)
|
|
|
|
g_warning ("Failed to register SIGXFSZ handler: %s", g_strerror (errno));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
g_unix_signal_add (SIGTERM, on_sigterm, context);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
change_to_home_directory (void)
|
|
|
|
{
|
|
|
|
const char *home_dir;
|
|
|
|
|
|
|
|
home_dir = g_get_home_dir ();
|
|
|
|
if (!home_dir)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (chdir (home_dir) < 0)
|
|
|
|
g_warning ("Could not change to home directory %s", home_dir);
|
|
|
|
}
|
|
|
|
|
2011-02-25 16:20:27 +00:00
|
|
|
int
|
|
|
|
main (int argc, char **argv)
|
|
|
|
{
|
2021-05-06 21:17:40 +00:00
|
|
|
g_autoptr (MetaContext) context = NULL;
|
2011-02-25 16:20:27 +00:00
|
|
|
GError *error = NULL;
|
2021-05-06 21:17:40 +00:00
|
|
|
int ecode = EXIT_SUCCESS;
|
2011-02-25 16:20:27 +00:00
|
|
|
|
|
|
|
bindtextdomain (GETTEXT_PACKAGE, LOCALEDIR);
|
|
|
|
bind_textdomain_codeset (GETTEXT_PACKAGE, "UTF-8");
|
2011-04-30 14:34:51 +00:00
|
|
|
textdomain (GETTEXT_PACKAGE);
|
2011-02-25 16:20:27 +00:00
|
|
|
|
2021-05-06 21:17:40 +00:00
|
|
|
context = meta_create_context (WM_NAME);
|
|
|
|
meta_context_add_option_entries (context, gnome_shell_options,
|
|
|
|
GETTEXT_PACKAGE);
|
|
|
|
meta_context_add_option_group (context, g_irepository_get_option_group ());
|
|
|
|
|
2014-01-07 18:14:31 +00:00
|
|
|
session_mode = (char *) g_getenv ("GNOME_SHELL_SESSION_MODE");
|
|
|
|
|
2021-05-06 21:17:40 +00:00
|
|
|
if (!meta_context_configure (context, &argc, &argv, &error))
|
2011-02-25 16:20:27 +00:00
|
|
|
{
|
2021-05-06 21:17:40 +00:00
|
|
|
g_printerr ("Failed to configure: %s", error->message);
|
|
|
|
return EXIT_FAILURE;
|
2011-02-25 16:20:27 +00:00
|
|
|
}
|
|
|
|
|
2021-05-06 21:17:40 +00:00
|
|
|
meta_context_set_plugin_gtype (context, gnome_shell_plugin_get_type ());
|
|
|
|
meta_context_set_gnome_wm_keybindings (context, GNOME_WM_KEYBINDINGS);
|
2011-10-20 20:28:59 +00:00
|
|
|
|
2021-07-02 15:20:27 +00:00
|
|
|
init_signal_handlers (context);
|
|
|
|
change_to_home_directory ();
|
|
|
|
|
2021-05-06 21:17:40 +00:00
|
|
|
if (!meta_context_setup (context, &error))
|
|
|
|
{
|
|
|
|
g_printerr ("Failed to setup: %s", error->message);
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
2011-02-25 16:20:27 +00:00
|
|
|
|
|
|
|
/* FIXME: Add gjs API to set this stuff and don't depend on the
|
|
|
|
* environment. These propagate to child processes.
|
|
|
|
*/
|
|
|
|
g_setenv ("GJS_DEBUG_OUTPUT", "stderr", TRUE);
|
|
|
|
g_setenv ("GJS_DEBUG_TOPICS", "JS ERROR;JS LOG", TRUE);
|
|
|
|
|
2012-11-28 18:45:52 +00:00
|
|
|
shell_init_debug (g_getenv ("SHELL_DEBUG"));
|
|
|
|
|
2021-05-06 21:17:40 +00:00
|
|
|
shell_dbus_init (meta_context_is_replacing (context));
|
2011-02-25 16:20:27 +00:00
|
|
|
shell_a11y_init ();
|
|
|
|
shell_perf_log_init ();
|
2012-05-18 01:52:57 +00:00
|
|
|
shell_introspection_init ();
|
2012-12-23 04:14:14 +00:00
|
|
|
shell_fonts_init ();
|
2011-02-25 16:20:27 +00:00
|
|
|
|
2019-09-02 15:05:27 +00:00
|
|
|
g_log_set_writer_func (default_log_writer, NULL, NULL);
|
2011-06-20 13:01:54 +00:00
|
|
|
|
2011-02-25 16:20:27 +00:00
|
|
|
/* Initialize the global object */
|
2012-05-16 21:11:57 +00:00
|
|
|
if (session_mode == NULL)
|
2015-09-23 18:40:42 +00:00
|
|
|
session_mode = is_gdm_mode ? (char *)"gdm" : (char *)"user";
|
2012-05-16 21:11:57 +00:00
|
|
|
|
2022-11-29 15:26:46 +00:00
|
|
|
_shell_global_init ("session-mode", session_mode,
|
|
|
|
"force-animations", force_animations,
|
|
|
|
NULL);
|
2011-02-25 16:20:27 +00:00
|
|
|
|
2017-10-20 10:41:59 +00:00
|
|
|
dump_gjs_stack_on_signal (SIGABRT);
|
|
|
|
dump_gjs_stack_on_signal (SIGFPE);
|
|
|
|
dump_gjs_stack_on_signal (SIGIOT);
|
|
|
|
dump_gjs_stack_on_signal (SIGTRAP);
|
|
|
|
|
|
|
|
if ((_shell_debug & SHELL_DEBUG_BACKTRACE_SEGFAULTS))
|
|
|
|
{
|
|
|
|
dump_gjs_stack_on_signal (SIGBUS);
|
|
|
|
dump_gjs_stack_on_signal (SIGSEGV);
|
|
|
|
}
|
|
|
|
|
2019-06-05 23:12:47 +00:00
|
|
|
shell_profiler_init ();
|
2021-05-06 21:17:40 +00:00
|
|
|
|
2022-01-19 09:24:34 +00:00
|
|
|
if (meta_context_get_compositor_type (context) == META_COMPOSITOR_TYPE_WAYLAND)
|
|
|
|
meta_context_raise_rlimit_nofile (context, NULL);
|
|
|
|
|
2021-05-06 21:17:40 +00:00
|
|
|
if (!meta_context_start (context, &error))
|
|
|
|
{
|
|
|
|
g_printerr ("GNOME Shell failed to start: %s", error->message);
|
|
|
|
return EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!meta_context_run_main_loop (context, &error))
|
|
|
|
{
|
|
|
|
g_printerr ("GNOME Shell terminated with an error: %s", error->message);
|
|
|
|
ecode = EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
|
2022-08-17 14:27:09 +00:00
|
|
|
g_message ("Shutting down GNOME Shell");
|
|
|
|
_shell_global_notify_shutdown (shell_global_get ());
|
2019-06-05 23:12:47 +00:00
|
|
|
shell_profiler_shutdown ();
|
2011-05-05 22:09:59 +00:00
|
|
|
|
2022-08-17 14:32:52 +00:00
|
|
|
g_debug ("Tearing down the gjs context");
|
2016-12-06 01:31:08 +00:00
|
|
|
_shell_global_destroy_gjs_context (shell_global_get ());
|
|
|
|
g_object_unref (shell_global_get ());
|
2011-06-20 13:01:54 +00:00
|
|
|
|
2022-08-17 14:32:52 +00:00
|
|
|
g_debug ("Tearing down the mutter context");
|
|
|
|
meta_context_destroy (g_steal_pointer (&context));
|
|
|
|
|
2011-05-05 22:09:59 +00:00
|
|
|
return ecode;
|
2011-02-25 16:20:27 +00:00
|
|
|
}
|