diff options
author | Tobias Blass <tobiasblass@t-online.de> | 2018-06-13 00:39:24 +0200 |
---|---|---|
committer | Tobias Blass <tobiasblass@t-online.de> | 2018-06-19 00:19:57 +0200 |
commit | a5c091e3026eb41d3a4daef3db95b47a3445aa11 (patch) | |
tree | 3317961dd1425f428ccdebce378e0f010d57a14b /sway/server.c | |
parent | 202ee511503bc7c6a18dec440ac3cdb8d5e8f859 (diff) |
Perform (partial) server initialization before dropping privileges.
Some operations during backend creation (e.g. becoming DRM master)
require CAP_SYS_ADMIN privileges. At this point, sway has dropped them
already, though. This patch splits the privileged part of server_init
into its own function and calls it before dropping its privileges.
This fixes the bug with minimal security implications.
Diffstat (limited to 'sway/server.c')
-rw-r--r-- | sway/server.c | 11 |
1 files changed, 8 insertions, 3 deletions
diff --git a/sway/server.c b/sway/server.c index 824b1d8e..4745ab6e 100644 --- a/sway/server.c +++ b/sway/server.c @@ -25,9 +25,8 @@ #include "sway/tree/layout.h" -bool server_init(struct sway_server *server) { - wlr_log(L_DEBUG, "Initializing Wayland server"); - +bool server_privileged_prepare(struct sway_server *server) { + wlr_log(L_DEBUG, "Preparing Wayland server initialization"); server->wl_display = wl_display_create(); server->wl_event_loop = wl_display_get_event_loop(server->wl_display); server->backend = wlr_backend_autocreate(server->wl_display, NULL); @@ -36,6 +35,12 @@ bool server_init(struct sway_server *server) { wlr_log(L_ERROR, "Unable to create backend"); return false; } + return true; +} + +bool server_init(struct sway_server *server) { + wlr_log(L_DEBUG, "Initializing Wayland server"); + struct wlr_renderer *renderer = wlr_backend_get_renderer(server->backend); assert(renderer); |