summaryrefslogtreecommitdiff
path: root/src/login/sysfs-show.c
diff options
context:
space:
mode:
authorDavid Herrmann <dh.herrmann@gmail.com>2015-07-01 18:31:18 +0200
committerKay Sievers <kay@vrfy.org>2015-07-01 18:32:51 +0200
commit3723263f4989ebeb087cf0a1259884de962bc85e (patch)
tree96d9135337434ad1caf6300a8b2b14be66952ebf /src/login/sysfs-show.c
parent0204c4bd69f694b527643ace9d434befce80085c (diff)
bus-proxy: never apply policy when sending signals
Unlike dbus-daemon, the bus-proxy does not know the receiver of a broadcast (as the kernel has exclusive access on the bus connections). Hence, and "destination=" matches in dbus1 policies cannot be applied. But kdbus does not place any restrictions on *SENDING* broadcasts, anyway. The kernel never returns EPERM to KDBUS_CMD_SEND if KDBUS_MSG_SIGNAL is set. Instead, receiver policies are checked. Hence, stop checking sender policies for signals in bus-proxy and leave it up to the kernel. This fixes some network-manager bus-proxy issues where NM uses weird dst-based matches against interface-based matches. As we cannot perform dst-based matches, our bus-proxy cannot properly implement this policy.
Diffstat (limited to 'src/login/sysfs-show.c')
0 files changed, 0 insertions, 0 deletions