dbus issueshttps://gitlab.freedesktop.org/dbus/dbus/-/issues2018-11-19T15:42:21Zhttps://gitlab.freedesktop.org/dbus/dbus/-/issues/214Drop chdir("/") in dbus-launch2018-11-19T15:42:21ZBugzilla Migration UserDrop chdir("/") in dbus-launch## Submitted by David King
Assigned to **D-Bus Maintainers**
**[Link to original bug (#106987)](https://bugs.freedesktop.org/show_bug.cgi?id=106987)**
## Description
In RHEL 7, Paul Gozart came across some unexpected behaviour in...## Submitted by David King
Assigned to **D-Bus Maintainers**
**[Link to original bug (#106987)](https://bugs.freedesktop.org/show_bug.cgi?id=106987)**
## Description
In RHEL 7, Paul Gozart came across some unexpected behaviour in gedit when run as a regular user, where the save dialog used the root path ("/") as the default location. This was traced down by Ray Strode to gedit in newer RHEL 7 versions being launched by dbus activation (as most GNOME applications are, if they use GApplication), and the dbus-daemon used for the session bus in RHEL being launched with dbus-launch (by gnome-session, as systemd is not used as a user session manager in RHEL 7).
There is a chdir("/") call in dbus-launch with the following justification:
/* We chdir ("/") since we are persistent and daemon-like, and fork
* again so dbus-launch can reap the parent. However, we don't
* setsid() or close fd 0 because the idea is to remain attached
* to the tty and the X server in order to kill the message bus
* when the session ends.
*/
Arguably, this is not the best behaviour for a tool that is only used to run session buses, which are scoped to the lifetime of the user's session (with some exceptions, of course), and given the pervasive use of dbus-launch by session managers to start dbus-daemon as a session bus, I think that it is best to drop the chdir() call entirely.
Version: git master
### See also
* https://bugzilla.redhat.com/show_bug.cgi?id=1470310https://gitlab.freedesktop.org/dbus/dbus/-/issues/177[SELinux] Return the context of the dbus-daemon process if asking about org.f...2018-10-15T14:49:37ZBugzilla Migration User[SELinux] Return the context of the dbus-daemon process if asking about org.freedesktop.DBus## Submitted by Laurent Bigonville
Assigned to **D-Bus Maintainers**
**[Link to original bug (#101315)](https://bugs.freedesktop.org/show_bug.cgi?id=101315)**
## Description
Hi,
Currently when asked the SELinux context of the own...## Submitted by Laurent Bigonville
Assigned to **D-Bus Maintainers**
**[Link to original bug (#101315)](https://bugs.freedesktop.org/show_bug.cgi?id=101315)**
## Description
Hi,
Currently when asked the SELinux context of the owner of org.freedesktop.DBus, the dbus-daemon is returning an error.
In the same situation when asked about the Unix user or the PID, the daemon would return its own user or pid.
The following patch is doing the same for the SELinux context by returning the daemon one
Version: git masterhttps://gitlab.freedesktop.org/dbus/dbus/-/issues/176fdpass test fails on Solaris2018-10-15T14:35:00ZBugzilla Migration Userfdpass test fails on Solaris## Submitted by vlm..@..lny.cz
Assigned to **D-Bus Maintainers**
**[Link to original bug (#101221)](https://bugs.freedesktop.org/show_bug.cgi?id=101221)**
## Description
Created attachment 131553
Increase the number of file descri...## Submitted by vlm..@..lny.cz
Assigned to **D-Bus Maintainers**
**[Link to original bug (#101221)](https://bugs.freedesktop.org/show_bug.cgi?id=101221)**
## Description
Created attachment 131553
Increase the number of file descriptors
Hi,
The test fdpass expects to have more than ~800 file descriptors available for current process. On Solaris the default is to have the soft limit set to 256 file descriptors.
The test fails with this error:
Not enough RLIMIT_NOFILE to run this test
This is the attached patch I am using on Solaris. It could be enanced (like #ifdef __sun), but I am not sure whether something like this would be accepted. I'm not sure whether increasing the file descriptors limit too high does not make some of the tests to not work as they won't reach the limit at 1024.
~~**Patch 131553**~~, "Increase the number of file descriptors":
[dbus-06-test-fdpass.patch](/uploads/c08b368a895a7d5d93ba213da421bdc5/dbus-06-test-fdpass.patch)
Version: 1.10https://gitlab.freedesktop.org/dbus/dbus/-/issues/172Specify the drivers error code in the dbus specification2018-11-07T16:57:10ZBugzilla Migration UserSpecify the drivers error code in the dbus specification## Submitted by Tom Gundersen `@tomegun`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#100795)](https://bugs.freedesktop.org/show_bug.cgi?id=100795)**
## Description
Created attachment 131047
document all driver call...## Submitted by Tom Gundersen `@tomegun`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#100795)](https://bugs.freedesktop.org/show_bug.cgi?id=100795)**
## Description
Created attachment 131047
document all driver calls in the same section
These patches document some well-known error codes returned by the dbus daemon in response to calls to the driver. Error codes returned as a result of internal errors or a misconfigured daemon are not documented.
~~**Patch 131047**~~, "document all driver calls in the same section":
[0001-docs-document-all-of-the-org.freedesktop.DBus-method.patch](/uploads/29d1aa3b0d07bfb1bd18a2929803662d/0001-docs-document-all-of-the-org.freedesktop.DBus-method.patch)https://gitlab.freedesktop.org/dbus/dbus/-/issues/157[OS X] : enable standard (non-launchd) dbus-launch and the use of privileged ...2020-09-28T12:27:25ZBugzilla Migration User[OS X] : enable standard (non-launchd) dbus-launch and the use of privileged services via the system bus## Submitted by René J.V. Bertin
Assigned to **D-Bus Maintainers**
**[Link to original bug (#97927)](https://bugs.freedesktop.org/show_bug.cgi?id=97927)**
## Description
Created attachment 126778
patch against the master branch, #...## Submitted by René J.V. Bertin
Assigned to **D-Bus Maintainers**
**[Link to original bug (#97927)](https://bugs.freedesktop.org/show_bug.cgi?id=97927)**
## Description
Created attachment 126778
patch against the master branch, #1e43857
After discussing this on the ML ("about using privileged (KAuth) helpers: system dbus daemon on OS X?") I think it is about time to open a ticket with a patch that I feel I can propose as a reference implementation.
This patch combines 2 wishes of mine:
1- being able to launch a session daemon when logged in remotely to OS X/macOS, i.e. when launchd cannot be used. In that case the OS is used as a traditional Unix, typically with X11 providing remote display, and there are no technical reasons why DBus wouldn't support this mode of operation ("shouldn't" may be a different thing).
I'm including this because making this possible was in fact in large part a side-effect of the 2nd wish:
2- allow the use of privileged services via the system bus, for instance those based on the KF5 KAuth framework.
With hindsight, point 2 was very easy to implement because the the mechanism to launch the privileged service executable is works as intended on OS X. What failed was the basic libdbus initialisation in the service executable, which didn't provide a session bus address entry in the bus_connection_addresses array.
Given the context the exact value of that entry is without importance. On Linux it would be set to "autolaunch:"; in the attached patch I set it to "launchd:env=DBUS_LAUNCHD_SESSION_BUS_SOCKET" because that appears to be an existing convention. Enabling the code path that takes care of setting this fallback value is what made it relevant to include point 1 above.
There are a few points that are open to discussion:
- is "launchd:env=FOO" indeed an appropriate fallback address? I don't think it will ever be used but may overlook a borderline situation.
- should the org.freedesktop.dbus-system.plist launchd profile provided by my patch be installed by default or should it be optional or an operation to be done manually? Note that installing it doesn't load profile.
- should _dbus_lookup_launchd_socket() indeed check the value of DBUS_LAUNCHD_SESSION_BUS_SOCKET in the environment, and if so should that value have priority over the value obtained from launchctl? The intention I had with the addition was to give a similar mechanism to override the "default" session bus as can be achieved on Linux by overriding DBUS_SESSION_BUS_ADDRESS. NB: changing the DBUS_LAUNCHD_SESSION_BUS_SOCKET value via launchctl has an immediate session-wide effect.
**Patch 126778**, "patch against the master branch, #1e43857":
[combined-patch.diff](/uploads/2a377b384d5b2f4e0feb42c19b21e7b3/combined-patch.diff)
Version: git masterhttps://gitlab.freedesktop.org/dbus/dbus/-/issues/156wid can be used without initialisation in dbus-launch.c2018-10-15T13:47:30ZBugzilla Migration Userwid can be used without initialisation in dbus-launch.c## Submitted by René J.V. Bertin
Assigned to **D-Bus Maintainers**
**[Link to original bug (#97924)](https://bugs.freedesktop.org/show_bug.cgi?id=97924)**
## Description
Going over the code I after noticing that dbus-launch set DB...## Submitted by René J.V. Bertin
Assigned to **D-Bus Maintainers**
**[Link to original bug (#97924)](https://bugs.freedesktop.org/show_bug.cgi?id=97924)**
## Description
Going over the code I after noticing that dbus-launch set DBUS_SESSION_BUS_WINDOWID to an invalid wid, I see that the wid variable can indeed be used without having been initialised.
IMHO, either dbus-launch.c should initialise the wid variable to 0 at declaration, or x11_get_address() should be modified as such:
diff --git a/tools/dbus-launch-x11.c b/tools/dbus-launch-x11.c
index a09444b..d79b4a7 100644
--- a/tools/dbus-launch-x11.c
+++ b/tools/dbus-launch-x11.c
@@ -305,10 +305,10 @@ x11_get_address (char **paddress, pid_t *pid, long *wid)
/* locate the selection owner */
owner = XGetSelectionOwner (xdisplay, selection_atom);
- if (owner == None)
- return TRUE; /* no owner */
if (wid != NULL)
*wid = (long) owner;
+ if (owner == None)
+ return TRUE; /* no owner */
/* get the bus address */
result = XGetWindowProperty (xdisplay, owner, address_atom, 0, 1024, False,
Version: git masterhttps://gitlab.freedesktop.org/dbus/dbus/-/issues/153Remove platform-specific code from DBusWatch2018-10-15T13:49:58ZBugzilla Migration UserRemove platform-specific code from DBusWatch## Submitted by Thomas Zimmermann
Assigned to **Thomas Zimmermann**
**[Link to original bug (#97358)](https://bugs.freedesktop.org/show_bug.cgi?id=97358)**
## Description
DBusWatch contains platform-specific code, which should be ...## Submitted by Thomas Zimmermann
Assigned to **Thomas Zimmermann**
**[Link to original bug (#97358)](https://bugs.freedesktop.org/show_bug.cgi?id=97358)**
## Description
DBusWatch contains platform-specific code, which should be removed. The file dbus-watch.c already has a TODO item about this.
Version: git masterhttps://gitlab.freedesktop.org/dbus/dbus/-/issues/150W32: dbus does not support SSPI-based authentication mechanisms2019-05-31T18:24:51ZBugzilla Migration UserW32: dbus does not support SSPI-based authentication mechanisms## Submitted by LRN
Assigned to **D-Bus Maintainers**
**[Link to original bug (#96577)](https://bugs.freedesktop.org/show_bug.cgi?id=96577)**
## Description
As discussed on dbus@lists.freedesktop.org ML, dbus could use
an actual O...## Submitted by LRN
Assigned to **D-Bus Maintainers**
**[Link to original bug (#96577)](https://bugs.freedesktop.org/show_bug.cgi?id=96577)**
## Description
As discussed on dbus@lists.freedesktop.org ML, dbus could use
an actual OS-supported authentication on Windows (EXTERNAL on Windows
is a hack, DBUS_COOKIE_SHA1 has obvious drawbacks).
### Depends on
* [Bug 99512](https://bugs.freedesktop.org/show_bug.cgi?id=99512)https://gitlab.freedesktop.org/dbus/dbus/-/issues/142Check ListNames() permissions with MLS (SELinux)2018-11-21T16:48:44ZBugzilla Migration UserCheck ListNames() permissions with MLS (SELinux)## Submitted by David King
Assigned to **D-Bus Maintainers**
**[Link to original bug (#93920)](https://bugs.freedesktop.org/show_bug.cgi?id=93920)**
## Description
It's desirable to block services with different MLS permissions fr...## Submitted by David King
Assigned to **D-Bus Maintainers**
**[Link to original bug (#93920)](https://bugs.freedesktop.org/show_bug.cgi?id=93920)**
## Description
It's desirable to block services with different MLS permissions from knowing about other, specifically when calling ListNames(). Attaching a patch that is included in dbus in RHEL 7.
Version: git masterhttps://gitlab.freedesktop.org/dbus/dbus/-/issues/130[SPEC EXTENSION][PATCH] Add new "arg0has=" string array matches2018-10-15T14:31:41ZBugzilla Migration User[SPEC EXTENSION][PATCH] Add new "arg0has=" string array matches## Submitted by Lennart Poettering
Assigned to **D-Bus Maintainers**
**[Link to original bug (#91755)](https://bugs.freedesktop.org/show_bug.cgi?id=91755)**
## Description
Created attachment 117913
preparation: fix whitespace in t...## Submitted by Lennart Poettering
Assigned to **D-Bus Maintainers**
**[Link to original bug (#91755)](https://bugs.freedesktop.org/show_bug.cgi?id=91755)**
## Description
Created attachment 117913
preparation: fix whitespace in the spec XML
This adds support for "arg0has=" style matches that test strings against messages containing string arrays ("as"). It applies if there's at least one string in the array that matches.
This is useful for implementing udev style "tagging" of devices.
This has been discussed on the ML a while back:
http://lists.freedesktop.org/archives/dbus/2015-April/016666.html
There's also a sd-bus PR implementing this:
https://github.com/systemd/systemd/pull/1036
This bug also adds a preparatory patch containing a trailing whitespace cleanup for the spec, to make it easier to edit and patch.
~~**Patch 117913**~~, "preparation: fix whitespace in the spec XML":
[0001-spec-trailing-whitespace-clean-up.patch](/uploads/753cd08b41acef712cef563396d44f91/0001-spec-trailing-whitespace-clean-up.patch)
Version: git masterhttps://gitlab.freedesktop.org/dbus/dbus/-/issues/89Running dbus as windows service2022-03-25T16:02:00ZBugzilla Migration UserRunning dbus as windows service## Submitted by Ralf Habacker `@rhabacker`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#68741)](https://bugs.freedesktop.org/show_bug.cgi?id=68741)**
## Description
Created attachment 84892
Add dbus service helper a...## Submitted by Ralf Habacker `@rhabacker`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#68741)](https://bugs.freedesktop.org/show_bug.cgi?id=68741)**
## Description
Created attachment 84892
Add dbus service helper application
The append patches implements a basic implementation for running dbus as windows service, which has been requested.
**Patch 84892**, "Add dbus service helper application":
[0001-Add-windows-service-handler.patch](/uploads/5a0962c3d5e267fea527e3c2e3042106/0001-Add-windows-service-handler.patch)
Version: 1.5
### Depends on
dbus should definitely not be used across privilege boundaries on Windows until it is in a security-supportable state, which means issues like #45 need to be fixed first.https://gitlab.freedesktop.org/dbus/dbus/-/issues/86[PATCH] launch-helper: fix error code parsing2019-05-13T15:10:20ZBugzilla Migration User[PATCH] launch-helper: fix error code parsing## Submitted by Chengwei Yang `@chengwei`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#66728)](https://bugs.freedesktop.org/show_bug.cgi?id=66728)**
## Description
If `<servicehelper>` used to activate a system serv...## Submitted by Chengwei Yang `@chengwei`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#66728)](https://bugs.freedesktop.org/show_bug.cgi?id=66728)**
## Description
If `<servicehelper>` used to activate a system service, it will do some user check, however, if `<user>` doesn't specified in system.conf, the user will be "" because it always make sure parser->user initialized as a DBusString, I think the idea behind is to avoid OOM later.
However, when the above situation occurrs, the error is a little confusing.
"
Error org.freedesktop.DBus.Error.Spawn.PermissionsInvalid: The permission of the setuid helper is not correct
"
I think it's better to compalin like below.
"
Error org.freedesktop.DBus.Error.Spawn.ConfigInvalid: Could not get user from config file
"
Version: 1.5https://gitlab.freedesktop.org/dbus/dbus/-/issues/60Feature request: support for file descriptors in dbus-send2018-10-15T14:28:04ZBugzilla Migration UserFeature request: support for file descriptors in dbus-send## Submitted by Elizabeth Jones `@ellyjones`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#43557)](https://bugs.freedesktop.org/show_bug.cgi?id=43557)**
## Description
Created attachment 54161
Patch against dbus-1.4....## Submitted by Elizabeth Jones `@ellyjones`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#43557)](https://bugs.freedesktop.org/show_bug.cgi?id=43557)**
## Description
Created attachment 54161
Patch against dbus-1.4.12 to add this feature.
dbus-send(1) cannot currently send file descriptors, although the underlying dbus protocol can. Add support for same, with a new syntax "fd:`<n>`".
Patch attached.
**Patch 54161**, "Patch against dbus-1.4.12 to add this feature.":
[dbus-1.4.12-send-unix-fd.patch](/uploads/3d03d8321d0bc1cff43b7f112dfda3eb/dbus-1.4.12-send-unix-fd.patch)
Version: 1.5https://gitlab.freedesktop.org/dbus/dbus/-/issues/59Feature request: support for variant maps in dbus-send2021-04-19T09:27:18ZBugzilla Migration UserFeature request: support for variant maps in dbus-send## Submitted by Elizabeth Jones `@ellyjones`
Assigned to **Havoc Pennington**
**[Link to original bug (#43555)](https://bugs.freedesktop.org/show_bug.cgi?id=43555)**
## Description
Created attachment 54159
Patch against dbus-1.4.1...## Submitted by Elizabeth Jones `@ellyjones`
Assigned to **Havoc Pennington**
**[Link to original bug (#43555)](https://bugs.freedesktop.org/show_bug.cgi?id=43555)**
## Description
Created attachment 54159
Patch against dbus-1.4.12 to add this feature.
dbus-send(1) does not support nested containers at all. There is a common idiom of having a{sv} as the last argument of dbus API functions to support later extensions, but dbus-send(1) cannot call these functions. Therefore, add special-case support for a{sv}, which can be done without extending the dbus-send(1) syntax in a backward-incompatible way.
Patch attached.
**Patch 54159**, "Patch against dbus-1.4.12 to add this feature.":
[dbus-1.4.12-send-variant-dict.patch](/uploads/dc30ce45e45d9c52bb0b6e42a96f78a8/dbus-1.4.12-send-variant-dict.patch)
Version: 1.5https://gitlab.freedesktop.org/dbus/dbus/-/issues/39add peak message sizes to Stats interface2018-10-15T14:09:47ZBugzilla Migration Useradd peak message sizes to Stats interface## Submitted by Simon McVittie
Assigned to **D-Bus Maintainers**
**[Link to original bug (#34040)](https://bugs.freedesktop.org/show_bug.cgi?id=34040)**
## Description
+++ This bug was initially created as a clone of Bug #33757 ++...## Submitted by Simon McVittie
Assigned to **D-Bus Maintainers**
**[Link to original bug (#34040)](https://bugs.freedesktop.org/show_bug.cgi?id=34040)**
## Description
+++ This bug was initially created as a clone of Bug #33757 +++
This branch adds a Stats interface. It doesn't yet solve Bug #24307 (it doesn't include the actual match rules), but it does include various potentially-interesting numbers.
In the longer term Colin wants such things to be on a secondary /var/run/dbus/system_bus_management_socket or some such, but splitting off interfaces now seems like a good start on that.
Version: 1.5
### Depends on
* [Bug 33757](https://bugs.freedesktop.org/show_bug.cgi?id=33757)
### Blocking
* [Bug 24307](https://bugs.freedesktop.org/show_bug.cgi?id=24307)https://gitlab.freedesktop.org/dbus/dbus/-/issues/38lack of clarity in dbus-marshal-recursive.c: can type_str be NULL?2023-01-26T16:00:05ZBugzilla Migration Userlack of clarity in dbus-marshal-recursive.c: can type_str be NULL?## Submitted by Simon McVittie
Assigned to **Simon McVittie**
**[Link to original bug (#33870)](https://bugs.freedesktop.org/show_bug.cgi?id=33870)**
## Description
+++ This bug was initially created as a clone of Bug #33128 +++
...## Submitted by Simon McVittie
Assigned to **Simon McVittie**
**[Link to original bug (#33870)](https://bugs.freedesktop.org/show_bug.cgi?id=33870)**
## Description
+++ This bug was initially created as a clone of Bug #33128 +++
Attachment #42061 (a patch applied in Maemo) adds an assertion that writer->type_str can't be NULL in a particular part of the marshalling code, which was probably done to shut up a static analysis tool. It's not at all obvious whether the assertion is justified.
On closer inspection of the code, it seems that type_str can be NULL initially, but everything that uses it is guarded by extra initialization which ensures that it's non-NULL by copying in the message's signature. This is deferred until after dbus_message_iter_init, so that that function can't fail with OOM.
I think the right way to improve clarity here would be to rearrange the initialization so it's literally never NULL, then we can get rid of ~15 useless "is it NULL?" guards.
Possibilities include:
- copy the signature in dbus_message_iter_init; if that fails, set an "already had OOM" flag which we check in all other accessors
- defer initializing the writer until the point at which we currently copy in the signature
- preallocate the DBusString for the signature as part of the DBusMessage
Version: 1.5
### Depends on
* [Bug 38285](https://bugs.freedesktop.org/show_bug.cgi?id=38285)https://gitlab.freedesktop.org/dbus/dbus/-/issues/35[PATCH] Allow to setup connect timeout for TCP transport2023-01-26T16:00:05ZBugzilla Migration User[PATCH] Allow to setup connect timeout for TCP transport## Submitted by Pavel Strashkin
Assigned to **D-Bus Maintainers**
**[Link to original bug (#33234)](https://bugs.freedesktop.org/show_bug.cgi?id=33234)**
## Description
There is no way to setup connect timeout when you're trying t...## Submitted by Pavel Strashkin
Assigned to **D-Bus Maintainers**
**[Link to original bug (#33234)](https://bugs.freedesktop.org/show_bug.cgi?id=33234)**
## Description
There is no way to setup connect timeout when you're trying to connect
to dbus via TCP. For an example, if you have the following connection
string "tcp:host=A,port=B", and host "A" is unavailable by some reason
then your client will get in stuck. When it come back or when
ETIMEDOUT error happens depends on OS. Get in stuck is a bad thing so
there has to be a way to configure connect timeout via "timeout"
keyword in connection string. The value is in miliseconds. Default
timeout may be 60s.
Attached patch introduces such feature so it's possible to use the
following connection string: "tcp:host=A,port=B,timeout=5000" (5s
timeout). I believe that it's a very helpfull feature. I'm sorry that
my patch is for 1.2.24, but if everything is clear (logic, code, ...)
then i'll backport it to master branch.
Version: 1.5https://gitlab.freedesktop.org/dbus/dbus/-/issues/34Scope autolaunch to requesting client2023-01-26T16:00:05ZBugzilla Migration UserScope autolaunch to requesting client## Submitted by Colin Walters `@walters`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#32509)](https://bugs.freedesktop.org/show_bug.cgi?id=32509)**
## Description
See
https://bugzilla.redhat.com/show_bug.cgi?id=663...## Submitted by Colin Walters `@walters`
Assigned to **D-Bus Maintainers**
**[Link to original bug (#32509)](https://bugs.freedesktop.org/show_bug.cgi?id=32509)**
## Description
See
https://bugzilla.redhat.com/show_bug.cgi?id=663467
Version: 1.5https://gitlab.freedesktop.org/dbus/dbus/-/issues/30Add DBUS_MACHINE_UUID_FILE enviroment variable2023-01-26T16:00:05ZBugzilla Migration UserAdd DBUS_MACHINE_UUID_FILE enviroment variable## Submitted by Louis-Francis Ratté-Boulianne
Assigned to **D-Bus Maintainers**
**[Link to original bug (#29618)](https://bugs.freedesktop.org/show_bug.cgi?id=29618)**
## Description
Created attachment 37923
Add DBUS_MACHINE_UUID_...## Submitted by Louis-Francis Ratté-Boulianne
Assigned to **D-Bus Maintainers**
**[Link to original bug (#29618)](https://bugs.freedesktop.org/show_bug.cgi?id=29618)**
## Description
Created attachment 37923
Add DBUS_MACHINE_UUID_FILE enviroment variable
Right now, you can't package dbus into another application bundle (on OSX) because the dbus-daemon is still looking for the machine uuid file at the path set at compile time.
I'm attaching a patch that allows to set that path at runtime using an environment variable.
~~**Attachment 37923**~~, "Add DBUS_MACHINE_UUID_FILE enviroment variable":
[0008-uuid-env.patch](/uploads/c707b73cd6f2895ab318c94eb49f9c1c/0008-uuid-env.patch)
Version: 1.5https://gitlab.freedesktop.org/dbus/dbus/-/issues/29_dbus_get_autolaunch_address can be slow closing file descriptors2023-01-26T16:00:05ZBugzilla Migration User_dbus_get_autolaunch_address can be slow closing file descriptors## Submitted by Padraig O'Briain
Assigned to **Havoc Pennington**
**[Link to original bug (#29526)](https://bugs.freedesktop.org/show_bug.cgi?id=29526)**
## Description
Created attachment 37806
Proposed patch
On my system _dbus_g...## Submitted by Padraig O'Briain
Assigned to **Havoc Pennington**
**[Link to original bug (#29526)](https://bugs.freedesktop.org/show_bug.cgi?id=29526)**
## Description
Created attachment 37806
Proposed patch
On my system _dbus_get-autolaunch_address takes almost 1.5 seconds.
This is because the maximum number of file descriptors is 65536.
**Attachment 37806**, "Proposed patch":
[dbus-02-closefrom.diff](/uploads/5f90c2c56fea973d04199c05060ac24d/dbus-02-closefrom.diff)
Version: 1.5