{
struct kdbus_msg *msg = NULL;
uint64_t cookie = 0xdeadbeef;
- uint64_t flags = KDBUS_NAME_REPLACE_EXISTING;
+ uint64_t flags;
struct kdbus_conn *activator;
struct kdbus_conn *service;
struct kdbus_conn *client;
/* Policies are still checked, access denied */
RUN_UNPRIVILEGED_CONN(unpriv, env->buspath, ({
+ flags = KDBUS_NAME_REPLACE_EXISTING;
ASSERT_RETURN(-EPERM,==,kdbus_name_acquire(unpriv, "foo.priv.activator", &flags));
}));
+ flags = KDBUS_NAME_REPLACE_EXISTING;
ASSERT_ZERO(kdbus_name_acquire(service, "foo.priv.activator", &flags));
/* We read our previous starter message */
ASSERT_ZERO(kdbus_msg_recv_poll(service, 100, NULL, NULL));
RUN_UNPRIVILEGED_CONN(unpriv, env->buspath, ({
- ASSERT_RETURN(-EPERM,==,kdbus_name_acquire(unpriv, "foo.priv.activator", &flags));
+ flags = KDBUS_NAME_REPLACE_EXISTING;
+ ASSERT_EXIT(-EPERM,==,kdbus_name_acquire(unpriv, "foo.priv.activator", &flags));
}));
kdbus_conn_free(service);