int root_handle;
int registration_done;
int allowed;
- int global;
+ bool multi_user;
int thread_active;
char sock_path[PATH_MAX];
/* Socket from app (connect) to session daemon (listen) for communication */
static struct sock_info global_apps = {
.name = "global",
- .global = 1,
+ .multi_user = true,
.root_handle = -1,
.registration_done = 0,
static struct sock_info local_apps = {
.name = "local",
- .global = 0,
+ .multi_user = false,
.root_handle = -1,
.registration_done = 0,
.allowed = 0, /* Check setuid bit first */
/*
* Returns the HOME directory path. Caller MUST NOT free(3) the returned
* pointer.
- * The following env are checked in order of priority:
- * 1 - LTTNG_UST_HOME
- * 2 - LTTNG_HOME
- * 3 - HOME
*/
static
const char *get_lttng_home_dir(void)
{
const char *val;
- val = (const char *) lttng_ust_getenv("LTTNG_UST_HOME");
- if (val != NULL) {
- return val;
- }
-
val = (const char *) lttng_ust_getenv("LTTNG_HOME");
if (val != NULL) {
return val;
}
-
return (const char *) lttng_ust_getenv("HOME");
}
/* Child */
create_mode = S_IRUSR | S_IWUSR | S_IRGRP;
- if (sock_info->global)
+ if (sock_info->multi_user)
create_mode |= S_IROTH | S_IWGRP | S_IWOTH;
/*
* We're alone in a child process, so we can modify the
* sessiond will be able to override all rights and wake
* us up.
*/
- if (!sock_info->global && errno != EACCES) {
+ if (!sock_info->multi_user && errno != EACCES) {
ERR("Error opening shm %s", sock_info->wait_shm_path);
_exit(EXIT_FAILURE);
}
return -1;
}
end:
- if (wait_shm_fd >= 0 && !sock_info->global) {
+ if (wait_shm_fd >= 0 && !sock_info->multi_user) {
struct stat statbuf;
/*