aboutsummaryrefslogtreecommitdiff
path: root/sway/server.c
diff options
context:
space:
mode:
authorTobias Blass <tobiasblass@t-online.de>2018-06-13 00:39:24 +0200
committerTobias Blass <tobiasblass@t-online.de>2018-06-19 00:19:57 +0200
commita5c091e3026eb41d3a4daef3db95b47a3445aa11 (patch)
tree3317961dd1425f428ccdebce378e0f010d57a14b /sway/server.c
parent202ee511503bc7c6a18dec440ac3cdb8d5e8f859 (diff)
Perform (partial) server initialization before dropping privileges.
Some operations during backend creation (e.g. becoming DRM master) require CAP_SYS_ADMIN privileges. At this point, sway has dropped them already, though. This patch splits the privileged part of server_init into its own function and calls it before dropping its privileges. This fixes the bug with minimal security implications.
Diffstat (limited to 'sway/server.c')
-rw-r--r--sway/server.c11
1 files changed, 8 insertions, 3 deletions
diff --git a/sway/server.c b/sway/server.c
index 824b1d8e..4745ab6e 100644
--- a/sway/server.c
+++ b/sway/server.c
@@ -25,9 +25,8 @@
#include "sway/tree/layout.h"
-bool server_init(struct sway_server *server) {
- wlr_log(L_DEBUG, "Initializing Wayland server");
-
+bool server_privileged_prepare(struct sway_server *server) {
+ wlr_log(L_DEBUG, "Preparing Wayland server initialization");
server->wl_display = wl_display_create();
server->wl_event_loop = wl_display_get_event_loop(server->wl_display);
server->backend = wlr_backend_autocreate(server->wl_display, NULL);
@@ -36,6 +35,12 @@ bool server_init(struct sway_server *server) {
wlr_log(L_ERROR, "Unable to create backend");
return false;
}
+ return true;
+}
+
+bool server_init(struct sway_server *server) {
+ wlr_log(L_DEBUG, "Initializing Wayland server");
+
struct wlr_renderer *renderer = wlr_backend_get_renderer(server->backend);
assert(renderer);