mirror of
				https://gitlab.freedesktop.org/pulseaudio/pulseaudio.git
				synced 2025-11-03 09:01:50 -05:00 
			
		
		
		
	* add new field "read_only" to memory blocks * add new API function pa_context_get_server() * filter capture data through mcalign on client * make module-tunnel use pa_socket_client_new_string() instead of using pa_resolve_server() directly. * remove pa_resolve_server() * remove debug.h and replace it by a macro definition on the gcc command line * some strbuf cleanups * small fixes in pa_stream for cleanup when server dies * new CLI command "load-sample-dir-lazy" * send FQDN as part of server info * rework mcalign, this time with memory block merging * fix iochannel cleanup when connection dies * check getaddrinfo() results git-svn-id: file:///home/lennart/svn/public/pulseaudio/trunk@286 fefdeb5f-60dc-0310-8127-8f9354f1896f
		
			
				
	
	
		
			117 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			117 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* $Id$ */
 | 
						|
 | 
						|
/***
 | 
						|
  This file is part of polypaudio.
 | 
						|
 
 | 
						|
  polypaudio is free software; you can redistribute it and/or modify
 | 
						|
  it under the terms of the GNU Lesser General Public License as published
 | 
						|
  by the Free Software Foundation; either version 2 of the License,
 | 
						|
  or (at your option) any later version.
 | 
						|
 
 | 
						|
  polypaudio is distributed in the hope that it will be useful, but
 | 
						|
  WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 | 
						|
  General Public License for more details.
 | 
						|
 
 | 
						|
  You should have received a copy of the GNU Lesser General Public License
 | 
						|
  along with polypaudio; if not, write to the Free Software
 | 
						|
  Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
 | 
						|
  USA.
 | 
						|
***/
 | 
						|
 | 
						|
#ifdef HAVE_CONFIG_H
 | 
						|
#include <config.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#include <assert.h>
 | 
						|
#include <unistd.h>
 | 
						|
#include <errno.h>
 | 
						|
#include <string.h>
 | 
						|
 | 
						|
#ifdef HAVE_SYS_CAPABILITY_H
 | 
						|
#include <sys/capability.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#include "log.h"
 | 
						|
#include "caps.h"
 | 
						|
 | 
						|
/* Drop root rights when called SUID root */
 | 
						|
void pa_drop_root(void) {
 | 
						|
    uid_t uid = getuid();
 | 
						|
    
 | 
						|
    if (uid == 0 || geteuid() != 0)
 | 
						|
        return;
 | 
						|
    
 | 
						|
    pa_log(__FILE__": dropping root rights.\n");
 | 
						|
    
 | 
						|
    setreuid(uid, uid);
 | 
						|
/*    setuid(uid);
 | 
						|
    seteuid(uid);*/
 | 
						|
}
 | 
						|
 | 
						|
#ifdef HAVE_SYS_CAPABILITY_H
 | 
						|
 | 
						|
/* Limit capabilities set to CAPSYS_NICE */
 | 
						|
int pa_limit_caps(void) {
 | 
						|
    int r = -1;
 | 
						|
    cap_t caps;
 | 
						|
    cap_value_t nice_cap = CAP_SYS_NICE;
 | 
						|
 | 
						|
    caps = cap_init();
 | 
						|
    assert(caps);
 | 
						|
 | 
						|
    cap_clear(caps);
 | 
						|
 | 
						|
    cap_set_flag(caps, CAP_EFFECTIVE, 1, &nice_cap, CAP_SET);
 | 
						|
    cap_set_flag(caps, CAP_PERMITTED, 1, &nice_cap, CAP_SET);
 | 
						|
 | 
						|
    if (cap_set_proc(caps) < 0)
 | 
						|
        goto fail;
 | 
						|
 | 
						|
    pa_log(__FILE__": dropped capabilities successfully.\n");
 | 
						|
    
 | 
						|
    r = 0;
 | 
						|
 | 
						|
fail:
 | 
						|
    cap_free (caps);
 | 
						|
    
 | 
						|
    return r;
 | 
						|
}
 | 
						|
 | 
						|
/* Drop all capabilities, effectively becoming a normal user */
 | 
						|
int pa_drop_caps(void) {
 | 
						|
    cap_t caps;
 | 
						|
    int r = -1;
 | 
						|
 | 
						|
    caps = cap_init();
 | 
						|
    assert(caps);
 | 
						|
 | 
						|
    cap_clear(caps);
 | 
						|
 | 
						|
    if (cap_set_proc(caps) < 0) {
 | 
						|
        pa_log(__FILE__": failed to drop capabilities: %s\n", strerror(errno));
 | 
						|
        goto fail;
 | 
						|
    }
 | 
						|
    
 | 
						|
    r = 0;
 | 
						|
 | 
						|
fail:
 | 
						|
    cap_free (caps);
 | 
						|
    
 | 
						|
    return r;
 | 
						|
}
 | 
						|
 | 
						|
#else
 | 
						|
 | 
						|
/* NOOPs in case capabilities are not available. */
 | 
						|
int pa_limit_caps(void) {
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
int pa_drop_caps(void) {
 | 
						|
    pa_drop_root();
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
#endif
 | 
						|
 |