mirror of
https://gitlab.freedesktop.org/pipewire/pipewire.git
synced 2025-11-04 13:30:12 -05:00
SPDX tags make the licensing information easy to understand and clear, and they are machine parseable. See https://spdx.dev for more information.
187 lines
4.7 KiB
C
187 lines
4.7 KiB
C
/* PipeWire */
|
|
/* SPDX-FileCopyrightText: Copyright © 2020 Wim Taymans */
|
|
/* SPDX-License-Identifier: MIT */
|
|
|
|
#include "config.h"
|
|
|
|
#include <errno.h>
|
|
#include <stdlib.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <limits.h>
|
|
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#ifdef HAVE_SYS_VFS_H
|
|
#include <sys/vfs.h>
|
|
#endif
|
|
#ifdef HAVE_PWD_H
|
|
#include <pwd.h>
|
|
#endif
|
|
|
|
#include <spa/utils/result.h>
|
|
#include <pipewire/context.h>
|
|
#include <pipewire/log.h>
|
|
#include <pipewire/keys.h>
|
|
|
|
#include "log.h"
|
|
#include "utils.h"
|
|
|
|
int get_runtime_dir(char *buf, size_t buflen)
|
|
{
|
|
const char *runtime_dir, *dir = NULL;
|
|
struct stat stat_buf;
|
|
int res, size;
|
|
|
|
runtime_dir = getenv("PULSE_RUNTIME_PATH");
|
|
if (runtime_dir == NULL) {
|
|
runtime_dir = getenv("XDG_RUNTIME_DIR");
|
|
dir = "pulse";
|
|
}
|
|
if (runtime_dir == NULL) {
|
|
pw_log_error("could not find a suitable runtime directory in"
|
|
"$PULSE_RUNTIME_PATH and $XDG_RUNTIME_DIR");
|
|
return -ENOENT;
|
|
}
|
|
|
|
size = snprintf(buf, buflen, "%s%s%s", runtime_dir,
|
|
dir ? "/" : "", dir ? dir : "");
|
|
if (size < 0)
|
|
return -errno;
|
|
if ((size_t) size >= buflen) {
|
|
pw_log_error("path %s%s%s too long", runtime_dir,
|
|
dir ? "/" : "", dir ? dir : "");
|
|
return -ENAMETOOLONG;
|
|
}
|
|
|
|
if (stat(buf, &stat_buf) < 0) {
|
|
res = -errno;
|
|
if (res != -ENOENT) {
|
|
pw_log_error("stat() %s failed: %m", buf);
|
|
return res;
|
|
}
|
|
if (mkdir(buf, 0700) < 0) {
|
|
res = -errno;
|
|
pw_log_error("mkdir() %s failed: %m", buf);
|
|
return res;
|
|
}
|
|
pw_log_info("created %s", buf);
|
|
} else if (!S_ISDIR(stat_buf.st_mode)) {
|
|
pw_log_error("%s is not a directory", buf);
|
|
return -ENOTDIR;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int check_flatpak(struct client *client, pid_t pid)
|
|
{
|
|
char root_path[2048];
|
|
int root_fd, info_fd, res;
|
|
struct stat stat_buf;
|
|
|
|
sprintf(root_path, "/proc/%ld/root", (long) pid);
|
|
root_fd = openat(AT_FDCWD, root_path, O_RDONLY | O_NONBLOCK | O_DIRECTORY | O_CLOEXEC | O_NOCTTY);
|
|
if (root_fd == -1) {
|
|
res = -errno;
|
|
if (res == -EACCES) {
|
|
struct statfs buf;
|
|
/* Access to the root dir isn't allowed. This can happen if the root is on a fuse
|
|
* filesystem, such as in a toolbox container. We will never have a fuse rootfs
|
|
* in the flatpak case, so in that case its safe to ignore this and
|
|
* continue to detect other types of apps. */
|
|
if (statfs(root_path, &buf) == 0 &&
|
|
buf.f_type == 0x65735546) /* FUSE_SUPER_MAGIC */
|
|
return 0;
|
|
}
|
|
/* Not able to open the root dir shouldn't happen. Probably the app died and
|
|
* we're failing due to /proc/$pid not existing. In that case fail instead
|
|
* of treating this as privileged. */
|
|
pw_log_info("failed to open \"%s\"%s", root_path, spa_strerror(res));
|
|
return res;
|
|
}
|
|
info_fd = openat(root_fd, ".flatpak-info", O_RDONLY | O_CLOEXEC | O_NOCTTY);
|
|
close(root_fd);
|
|
if (info_fd == -1) {
|
|
if (errno == ENOENT) {
|
|
pw_log_debug("no .flatpak-info, client on the host");
|
|
/* No file => on the host */
|
|
return 0;
|
|
}
|
|
res = -errno;
|
|
pw_log_error("error opening .flatpak-info: %m");
|
|
return res;
|
|
}
|
|
if (fstat(info_fd, &stat_buf) != 0 || !S_ISREG(stat_buf.st_mode)) {
|
|
/* Some weird fd => failure, assume sandboxed */
|
|
pw_log_error("error fstat .flatpak-info: %m");
|
|
}
|
|
close(info_fd);
|
|
return 1;
|
|
}
|
|
|
|
pid_t get_client_pid(struct client *client, int client_fd)
|
|
{
|
|
socklen_t len;
|
|
#if defined(__linux__)
|
|
struct ucred ucred;
|
|
len = sizeof(ucred);
|
|
if (getsockopt(client_fd, SOL_SOCKET, SO_PEERCRED, &ucred, &len) < 0) {
|
|
pw_log_warn("client %p: no peercred: %m", client);
|
|
} else
|
|
return ucred.pid;
|
|
#elif defined(__FreeBSD__) || defined(__MidnightBSD__)
|
|
struct xucred xucred;
|
|
len = sizeof(xucred);
|
|
if (getsockopt(client_fd, 0, LOCAL_PEERCRED, &xucred, &len) < 0) {
|
|
pw_log_warn("client %p: no peercred: %m", client);
|
|
} else {
|
|
#if __FreeBSD__ >= 13
|
|
return xucred.cr_pid;
|
|
#endif
|
|
}
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
const char *get_server_name(struct pw_context *context)
|
|
{
|
|
const char *name = NULL;
|
|
const struct pw_properties *props = pw_context_get_properties(context);
|
|
|
|
name = getenv("PIPEWIRE_REMOTE");
|
|
if ((name == NULL || name[0] == '\0') && props != NULL)
|
|
name = pw_properties_get(props, PW_KEY_REMOTE_NAME);
|
|
if (name == NULL || name[0] == '\0')
|
|
name = PW_DEFAULT_REMOTE;
|
|
return name;
|
|
}
|
|
|
|
int create_pid_file(void) {
|
|
char pid_file[PATH_MAX];
|
|
FILE *f;
|
|
int res;
|
|
|
|
if ((res = get_runtime_dir(pid_file, sizeof(pid_file))) < 0)
|
|
return res;
|
|
|
|
if (strlen(pid_file) > PATH_MAX - sizeof("/pid")) {
|
|
pw_log_error("path too long: %s/pid", pid_file);
|
|
return -ENAMETOOLONG;
|
|
}
|
|
|
|
strcat(pid_file, "/pid");
|
|
|
|
if ((f = fopen(pid_file, "we")) == NULL) {
|
|
res = -errno;
|
|
pw_log_error("failed to open pid file: %m");
|
|
return res;
|
|
}
|
|
|
|
fprintf(f, "%lu\n", (unsigned long) getpid());
|
|
fclose(f);
|
|
|
|
return 0;
|
|
}
|