policy: don't allow privileged bus users to own names
authorDaniel Mack <daniel@zonque.org>
Wed, 1 Oct 2014 17:47:05 +0000 (19:47 +0200)
committerDaniel Mack <daniel@zonque.org>
Wed, 1 Oct 2014 17:47:05 +0000 (19:47 +0200)
That check was moved to endpoint.c, but I forgot to stage that hunk.

Signed-off-by: Daniel Mack <daniel@zonque.org>
policy.c

index 968814f18bec9e5b5dba3f0da1dea025d0d1bb8c..0fc542c75521673a44f06a76bb42daf56f7939a2 100644 (file)
--- a/policy.c
+++ b/policy.c
@@ -235,9 +235,6 @@ int kdbus_policy_check_own_access(struct kdbus_policy_db *db,
        const struct kdbus_policy_db_entry *e;
        int ret;
 
-       if (kdbus_bus_cred_is_privileged(conn->bus, conn->cred))
-               return 0;
-
        down_read(&db->entries_rwlock);
        e = kdbus_policy_lookup(db, name, kdbus_str_hash(name), true);
        ret = kdbus_policy_check_access(e, conn->cred, KDBUS_POLICY_OWN);