diff options
| author | Tobias Blass <[email protected]> | 2018-06-13 00:39:24 +0200 | 
|---|---|---|
| committer | Tobias Blass <[email protected]> | 2018-06-19 00:19:57 +0200 | 
| commit | a5c091e3026eb41d3a4daef3db95b47a3445aa11 (patch) | |
| tree | 3317961dd1425f428ccdebce378e0f010d57a14b /sway/main.c | |
| parent | 202ee511503bc7c6a18dec440ac3cdb8d5e8f859 (diff) | |
Perform (partial) server initialization before dropping privileges.
Some operations during backend creation (e.g. becoming DRM master)
require CAP_SYS_ADMIN privileges. At this point, sway has dropped them
already, though. This patch splits the privileged part of server_init
into its own function and calls it before dropping its privileges.
This fixes the bug with minimal security implications.
Diffstat (limited to 'sway/main.c')
| -rw-r--r-- | sway/main.c | 5 | 
1 files changed, 5 insertions, 0 deletions
diff --git a/sway/main.c b/sway/main.c index a7e808ad..a325dc3a 100644 --- a/sway/main.c +++ b/sway/main.c @@ -359,6 +359,11 @@ int main(int argc, char **argv) {  	executable_sanity_check();  	bool suid = false; + +	if (!server_privileged_prepare(&server)) { +		return 1; +	} +  #ifdef __linux__  	if (getuid() != geteuid() || getgid() != getegid()) {  		// Retain capabilities after setuid()  | 
