wlroots/backend
Patrick Steinhardt fa05d3cde6 session: Don't refuse unprivileged creation of "direct" backend
When starting a compositor that's using the "direct" session backend,
wlroots needs to handle calls to `drmSetMaster()` and `drmDropMaster()`.
As both calls used to require `CAP_SYS_ADMIN`, wlroots thus simply
refused starting in case the process doesn't enjoy evelated privileges.

Permission rules have changed since linux.git commit 45bc3d26c95a (drm:
rework SET_MASTER and DROP_MASTER perm handling, 2020-03-19). As a
result, starting with Linux v5.8, both ioctls will now also succeed if
the process is currently or has been the DRM master. And as the first
process to open render nodes will become the DRM master automatically,
this effectively means that process elevation is not strictly required
in all setups anymore.

So let's drop the `geteuid() != 0` permission check to allow those new
rules to do their magic.
2020-09-04 11:39:25 +02:00
..
drm drm: fix uninitialized read 2020-07-31 09:32:14 +02:00
headless output: rename impl->rollback to rollback_render 2020-06-19 11:50:42 -06:00
libinput Fix -Wreturn-type warnings 2020-05-19 14:54:02 +02:00
multi backend/multi: handle backends depending on each other properly 2020-05-02 19:36:03 +02:00
noop backend/noop: add missing rollback_render output impl 2020-06-19 13:07:24 -06:00
session session: Don't refuse unprivileged creation of "direct" backend 2020-09-04 11:39:25 +02:00
wayland wayland: emit relative pointer events only for current pointer 2020-09-04 10:13:35 +02:00
x11 output: rename impl->rollback to rollback_render 2020-06-19 11:50:42 -06:00
backend.c Drop RDP backend 2020-01-10 19:38:39 +01:00
meson.build Drop RDP backend 2020-01-10 19:38:39 +01:00