summaryrefslogtreecommitdiff
path: root/bus/selinux.h
diff options
context:
space:
mode:
authorSimon McVittie <simon.mcvittie@collabora.co.uk>2016-11-21 20:56:55 +0000
committerSimon McVittie <simon.mcvittie@collabora.co.uk>2016-11-28 12:11:41 +0000
commit373cc47c7c50adb1b624526cfa452d52954621a5 (patch)
treef27305cd14ef4727a79572145c47d9f79f959ec8 /bus/selinux.h
parent5503511f91a66f0888937690e95d85100bcde4e4 (diff)
downloaddbus-373cc47c7c50adb1b624526cfa452d52954621a5.tar.gz
Do not auto-activate services if we could not send a message
We specifically do not check recipient policies, because the recipient policy is based on properties of the recipient process (in particular, its uid), which we do not necessarily know until we have already started it. In this initial implementation we do not check LSMs either, because we cannot know what LSM context the recipient process is going to have. However, LSM support will need to be added to make this feature useful, because StartServiceByName is normally allowed in non-LSM environments, and is more powerful than auto-activation anyway. The StartServiceByName method does not go through this check, because if access to that method has been granted, then it's somewhat obvious that you can start arbitrary services. Signed-off-by: Simon McVittie <simon.mcvittie@collabora.co.uk> Reviewed-by: Philip Withnall <philip.withnall@collabora.co.uk> Bug: https://bugs.freedesktop.org/show_bug.cgi?id=98666
Diffstat (limited to 'bus/selinux.h')
-rw-r--r--bus/selinux.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/bus/selinux.h b/bus/selinux.h
index e44c97ed..5252b189 100644
--- a/bus/selinux.h
+++ b/bus/selinux.h
@@ -61,6 +61,7 @@ dbus_bool_t bus_selinux_allows_send (DBusConnection *sender,
const char *member,
const char *error_name,
const char *destination,
+ BusActivationEntry *activation_entry,
DBusError *error);
BusSELinuxID* bus_selinux_init_connection_id (DBusConnection *connection,