1 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2 /* dbus-transport-socket.c Socket subclasses of DBusTransport
4 * Copyright (C) 2002, 2003, 2004, 2006 Red Hat Inc.
6 * Licensed under the Academic Free License version 2.1
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
25 #include "dbus-internals.h"
26 #include "dbus-connection-internal.h"
27 #include "dbus-nonce.h"
28 #include "dbus-transport-socket.h"
29 #include "dbus-transport-protected.h"
30 #include "dbus-watch.h"
31 #include "dbus-credentials.h"
32 #include <stdio.h> //todo to remove
36 * @defgroup DBusTransportSocket DBusTransport implementations for sockets
37 * @ingroup DBusInternals
38 * @brief Implementation details of DBusTransport on sockets
44 * Opaque object representing a socket file descriptor transport.
46 typedef struct DBusTransportSocket DBusTransportSocket;
49 * Implementation details of DBusTransportSocket. All members are private.
51 struct DBusTransportSocket
53 DBusTransport base; /**< Parent instance */
54 int fd; /**< File descriptor. */
55 DBusWatch *read_watch; /**< Watch for readability. */
56 DBusWatch *write_watch; /**< Watch for writability. */
58 int max_bytes_read_per_iteration; /**< To avoid blocking too long. */
59 int max_bytes_written_per_iteration; /**< To avoid blocking too long. */
61 int message_bytes_written; /**< Number of bytes of current
62 * outgoing message that have
65 DBusString encoded_outgoing; /**< Encoded version of current
68 DBusString encoded_incoming; /**< Encoded version of current
74 free_watches (DBusTransport *transport)
76 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
78 _dbus_verbose ("start\n");
80 if (socket_transport->read_watch)
82 if (transport->connection)
83 _dbus_connection_remove_watch_unlocked (transport->connection,
84 socket_transport->read_watch);
85 _dbus_watch_invalidate (socket_transport->read_watch);
86 _dbus_watch_unref (socket_transport->read_watch);
87 socket_transport->read_watch = NULL;
90 if (socket_transport->write_watch)
92 if (transport->connection)
93 _dbus_connection_remove_watch_unlocked (transport->connection,
94 socket_transport->write_watch);
95 _dbus_watch_invalidate (socket_transport->write_watch);
96 _dbus_watch_unref (socket_transport->write_watch);
97 socket_transport->write_watch = NULL;
100 _dbus_verbose ("end\n");
104 socket_finalize (DBusTransport *transport)
106 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
108 _dbus_verbose ("\n");
110 free_watches (transport);
112 _dbus_string_free (&socket_transport->encoded_outgoing);
113 _dbus_string_free (&socket_transport->encoded_incoming);
115 _dbus_transport_finalize_base (transport);
117 _dbus_assert (socket_transport->read_watch == NULL);
118 _dbus_assert (socket_transport->write_watch == NULL);
120 dbus_free (transport);
124 check_write_watch (DBusTransport *transport)
126 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
129 if (transport->connection == NULL)
132 if (transport->disconnected)
134 _dbus_assert (socket_transport->write_watch == NULL);
138 _dbus_transport_ref (transport);
140 if (_dbus_transport_try_to_authenticate (transport))
141 needed = _dbus_connection_has_messages_to_send_unlocked (transport->connection);
144 if (transport->send_credentials_pending)
148 DBusAuthState auth_state;
150 auth_state = _dbus_auth_do_work (transport->auth);
152 /* If we need memory we install the write watch just in case,
153 * if there's no need for it, it will get de-installed
154 * next time we try reading.
156 if (auth_state == DBUS_AUTH_STATE_HAVE_BYTES_TO_SEND ||
157 auth_state == DBUS_AUTH_STATE_WAITING_FOR_MEMORY)
164 _dbus_verbose ("check_write_watch(): needed = %d on connection %p watch %p fd = %d outgoing messages exist %d\n",
165 needed, transport->connection, socket_transport->write_watch,
166 socket_transport->fd,
167 _dbus_connection_has_messages_to_send_unlocked (transport->connection));
169 _dbus_connection_toggle_watch_unlocked (transport->connection,
170 socket_transport->write_watch,
173 _dbus_transport_unref (transport);
177 check_read_watch (DBusTransport *transport)
179 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
180 dbus_bool_t need_read_watch;
182 _dbus_verbose ("fd = %d\n",socket_transport->fd);
184 if (transport->connection == NULL)
187 if (transport->disconnected)
189 _dbus_assert (socket_transport->read_watch == NULL);
193 _dbus_transport_ref (transport);
195 if (_dbus_transport_try_to_authenticate (transport))
197 (_dbus_counter_get_size_value (transport->live_messages) < transport->max_live_messages_size) &&
198 (_dbus_counter_get_unix_fd_value (transport->live_messages) < transport->max_live_messages_unix_fds);
201 if (transport->receive_credentials_pending)
202 need_read_watch = TRUE;
205 /* The reason to disable need_read_watch when not WAITING_FOR_INPUT
206 * is to avoid spinning on the file descriptor when we're waiting
207 * to write or for some other part of the auth process
209 DBusAuthState auth_state;
211 auth_state = _dbus_auth_do_work (transport->auth);
213 /* If we need memory we install the read watch just in case,
214 * if there's no need for it, it will get de-installed
215 * next time we try reading. If we're authenticated we
216 * install it since we normally have it installed while
219 if (auth_state == DBUS_AUTH_STATE_WAITING_FOR_INPUT ||
220 auth_state == DBUS_AUTH_STATE_WAITING_FOR_MEMORY ||
221 auth_state == DBUS_AUTH_STATE_AUTHENTICATED)
222 need_read_watch = TRUE;
224 need_read_watch = FALSE;
228 _dbus_verbose (" setting read watch enabled = %d\n", need_read_watch);
229 _dbus_connection_toggle_watch_unlocked (transport->connection,
230 socket_transport->read_watch,
233 _dbus_transport_unref (transport);
237 do_io_error (DBusTransport *transport)
239 _dbus_transport_ref (transport);
240 _dbus_transport_disconnect (transport);
241 _dbus_transport_unref (transport);
244 /* return value is whether we successfully read any new data. */
246 read_data_into_auth (DBusTransport *transport,
249 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
255 _dbus_auth_get_buffer (transport->auth, &buffer);
257 bytes_read = _dbus_read_socket (socket_transport->fd,
258 buffer, socket_transport->max_bytes_read_per_iteration);
260 _dbus_auth_return_buffer (transport->auth, buffer,
261 bytes_read > 0 ? bytes_read : 0);
265 _dbus_verbose (" read %d bytes in auth phase\n", bytes_read);
269 else if (bytes_read < 0)
271 /* EINTR already handled for us */
273 if (_dbus_get_is_errno_enomem ())
277 else if (_dbus_get_is_errno_eagain_or_ewouldblock ())
278 ; /* do nothing, just return FALSE below */
281 _dbus_verbose ("Error reading from remote app: %s\n",
282 _dbus_strerror_from_errno ());
283 do_io_error (transport);
290 _dbus_assert (bytes_read == 0);
292 _dbus_verbose ("Disconnected from remote app\n");
293 do_io_error (transport);
299 /* Return value is whether we successfully wrote any bytes */
301 write_data_from_auth (DBusTransport *transport)
303 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
305 const DBusString *buffer;
307 if (!_dbus_auth_get_bytes_to_send (transport->auth,
311 bytes_written = _dbus_write_socket (socket_transport->fd,
313 0, _dbus_string_get_length (buffer));
315 if (bytes_written > 0)
317 _dbus_auth_bytes_sent (transport->auth, bytes_written);
320 else if (bytes_written < 0)
322 /* EINTR already handled for us */
324 if (_dbus_get_is_errno_eagain_or_ewouldblock ())
328 _dbus_verbose ("Error writing to remote app: %s\n",
329 _dbus_strerror_from_errno ());
330 do_io_error (transport);
339 exchange_credentials (DBusTransport *transport,
340 dbus_bool_t do_reading,
341 dbus_bool_t do_writing)
343 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
344 DBusError error = DBUS_ERROR_INIT;
346 _dbus_verbose ("exchange_credentials: do_reading = %d, do_writing = %d\n",
347 do_reading, do_writing);
349 if (do_writing && transport->send_credentials_pending)
351 if (_dbus_send_credentials_socket (socket_transport->fd,
354 transport->send_credentials_pending = FALSE;
358 _dbus_verbose ("Failed to write credentials: %s\n", error.message);
359 dbus_error_free (&error);
360 do_io_error (transport);
364 if (do_reading && transport->receive_credentials_pending)
366 /* FIXME this can fail due to IO error _or_ OOM, broken
367 * (somewhat tricky to fix since the OOM error can be set after
368 * we already read the credentials byte, so basically we need to
369 * separate reading the byte and storing it in the
370 * transport->credentials). Does not really matter for now
371 * because storing in credentials never actually fails on unix.
373 if (_dbus_read_credentials_socket (socket_transport->fd,
374 transport->credentials,
377 transport->receive_credentials_pending = FALSE;
381 _dbus_verbose ("Failed to read credentials %s\n", error.message);
382 dbus_error_free (&error);
383 do_io_error (transport);
387 if (!(transport->send_credentials_pending ||
388 transport->receive_credentials_pending))
390 if (!_dbus_auth_set_credentials (transport->auth,
391 transport->credentials))
399 do_authentication (DBusTransport *transport,
400 dbus_bool_t do_reading,
401 dbus_bool_t do_writing,
402 dbus_bool_t *auth_completed)
405 dbus_bool_t orig_auth_state;
409 orig_auth_state = _dbus_transport_try_to_authenticate (transport);
411 /* This is essential to avoid the check_write_watch() at the end,
412 * we don't want to add a write watch in do_iteration before
413 * we try writing and get EAGAIN
418 *auth_completed = FALSE;
422 _dbus_transport_ref (transport);
424 while (!_dbus_transport_try_to_authenticate (transport) &&
425 _dbus_transport_get_is_connected (transport))
427 if (!exchange_credentials (transport, do_reading, do_writing))
434 if (transport->send_credentials_pending ||
435 transport->receive_credentials_pending)
437 _dbus_verbose ("send_credentials_pending = %d receive_credentials_pending = %d\n",
438 transport->send_credentials_pending,
439 transport->receive_credentials_pending);
443 #define TRANSPORT_SIDE(t) ((t)->is_server ? "server" : "client")
444 switch (_dbus_auth_do_work (transport->auth))
446 case DBUS_AUTH_STATE_WAITING_FOR_INPUT:
447 _dbus_verbose (" %s auth state: waiting for input\n",
448 TRANSPORT_SIDE (transport));
449 if (!do_reading || !read_data_into_auth (transport, &oom))
453 case DBUS_AUTH_STATE_WAITING_FOR_MEMORY:
454 _dbus_verbose (" %s auth state: waiting for memory\n",
455 TRANSPORT_SIDE (transport));
460 case DBUS_AUTH_STATE_HAVE_BYTES_TO_SEND:
461 _dbus_verbose (" %s auth state: bytes to send\n",
462 TRANSPORT_SIDE (transport));
463 if (!do_writing || !write_data_from_auth (transport))
467 case DBUS_AUTH_STATE_NEED_DISCONNECT:
468 _dbus_verbose (" %s auth state: need to disconnect\n",
469 TRANSPORT_SIDE (transport));
470 do_io_error (transport);
473 case DBUS_AUTH_STATE_AUTHENTICATED:
474 _dbus_verbose (" %s auth state: authenticated\n",
475 TRANSPORT_SIDE (transport));
482 *auth_completed = (orig_auth_state != _dbus_transport_try_to_authenticate (transport));
484 check_read_watch (transport);
485 check_write_watch (transport);
486 _dbus_transport_unref (transport);
494 /* returns false on oom */
496 do_writing (DBusTransport *transport)
499 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
502 /* No messages without authentication! */
503 if (!_dbus_transport_try_to_authenticate (transport))
505 _dbus_verbose ("Not authenticated, not writing anything\n");
509 if (transport->disconnected)
511 _dbus_verbose ("Not connected, not writing anything\n");
516 _dbus_verbose ("do_writing(), have_messages = %d, fd = %d\n",
517 _dbus_connection_has_messages_to_send_unlocked (transport->connection),
518 socket_transport->fd);
524 while (!transport->disconnected &&
525 _dbus_connection_has_messages_to_send_unlocked (transport->connection))
528 DBusMessage *message;
529 const DBusString *header;
530 const DBusString *body;
531 int header_len, body_len;
532 int total_bytes_to_write;
534 if (total > socket_transport->max_bytes_written_per_iteration)
536 _dbus_verbose ("%d bytes exceeds %d bytes written per iteration, returning\n",
537 total, socket_transport->max_bytes_written_per_iteration);
541 message = _dbus_connection_get_message_to_send (transport->connection);
542 _dbus_assert (message != NULL);
543 dbus_message_lock (message);
546 _dbus_verbose ("writing message %p\n", message);
549 _dbus_message_get_network_data (message,
552 header_len = _dbus_string_get_length (header);
553 body_len = _dbus_string_get_length (body);
555 if (_dbus_auth_needs_encoding (transport->auth))
557 /* Does fd passing even make sense with encoded data? */
558 _dbus_assert(!DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport));
560 if (_dbus_string_get_length (&socket_transport->encoded_outgoing) == 0)
562 if (!_dbus_auth_encode_data (transport->auth,
563 header, &socket_transport->encoded_outgoing))
569 if (!_dbus_auth_encode_data (transport->auth,
570 body, &socket_transport->encoded_outgoing))
572 _dbus_string_set_length (&socket_transport->encoded_outgoing, 0);
578 total_bytes_to_write = _dbus_string_get_length (&socket_transport->encoded_outgoing);
581 _dbus_verbose ("encoded message is %d bytes\n",
582 total_bytes_to_write);
586 _dbus_write_socket (socket_transport->fd,
587 &socket_transport->encoded_outgoing,
588 socket_transport->message_bytes_written,
589 total_bytes_to_write - socket_transport->message_bytes_written);
593 total_bytes_to_write = header_len + body_len;
596 _dbus_verbose ("message is %d bytes\n",
597 total_bytes_to_write);
600 #ifdef HAVE_UNIX_FD_PASSING
601 if (socket_transport->message_bytes_written <= 0 && DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport))
603 /* Send the fds along with the first byte of the message */
607 _dbus_message_get_unix_fds(message, &unix_fds, &n);
610 _dbus_write_socket_with_unix_fds_two (socket_transport->fd,
612 socket_transport->message_bytes_written,
613 header_len - socket_transport->message_bytes_written,
619 if (bytes_written > 0 && n > 0)
620 _dbus_verbose("Wrote %i unix fds\n", n);
625 if (socket_transport->message_bytes_written < header_len)
628 _dbus_write_socket_two (socket_transport->fd,
630 socket_transport->message_bytes_written,
631 header_len - socket_transport->message_bytes_written,
638 _dbus_write_socket (socket_transport->fd,
640 (socket_transport->message_bytes_written - header_len),
642 (socket_transport->message_bytes_written - header_len));
647 if (bytes_written < 0)
649 /* EINTR already handled for us */
651 /* For some discussion of why we also ignore EPIPE here, see
652 * http://lists.freedesktop.org/archives/dbus/2008-March/009526.html
655 if (_dbus_get_is_errno_eagain_or_ewouldblock () || _dbus_get_is_errno_epipe ())
659 _dbus_verbose ("Error writing to remote app: %s\n",
660 _dbus_strerror_from_errno ());
661 do_io_error (transport);
667 _dbus_verbose (" wrote %d bytes of %d\n", bytes_written,
668 total_bytes_to_write);
670 total += bytes_written;
671 socket_transport->message_bytes_written += bytes_written;
673 _dbus_assert (socket_transport->message_bytes_written <=
674 total_bytes_to_write);
676 if (socket_transport->message_bytes_written == total_bytes_to_write)
678 socket_transport->message_bytes_written = 0;
679 _dbus_string_set_length (&socket_transport->encoded_outgoing, 0);
680 _dbus_string_compact (&socket_transport->encoded_outgoing, 2048);
682 _dbus_connection_message_sent_unlocked (transport->connection,
695 /* returns false on out-of-memory */
697 do_reading (DBusTransport *transport)
699 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
705 _dbus_verbose ("fd = %d\n",socket_transport->fd);
707 /* No messages without authentication! */
708 if (!_dbus_transport_try_to_authenticate (transport))
717 /* See if we've exceeded max messages and need to disable reading */
718 check_read_watch (transport);
720 if (total > socket_transport->max_bytes_read_per_iteration)
722 _dbus_verbose ("%d bytes exceeds %d bytes read per iteration, returning\n",
723 total, socket_transport->max_bytes_read_per_iteration);
727 _dbus_assert (socket_transport->read_watch != NULL ||
728 transport->disconnected);
730 if (transport->disconnected)
733 if (!dbus_watch_get_enabled (socket_transport->read_watch))
736 if (_dbus_auth_needs_decoding (transport->auth))
738 /* Does fd passing even make sense with encoded data? */
739 _dbus_assert(!DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport));
741 if (_dbus_string_get_length (&socket_transport->encoded_incoming) > 0)
742 bytes_read = _dbus_string_get_length (&socket_transport->encoded_incoming);
744 bytes_read = _dbus_read_socket (socket_transport->fd,
745 &socket_transport->encoded_incoming,
746 socket_transport->max_bytes_read_per_iteration);
748 _dbus_assert (_dbus_string_get_length (&socket_transport->encoded_incoming) ==
755 _dbus_message_loader_get_buffer (transport->loader,
758 orig_len = _dbus_string_get_length (buffer);
760 if (!_dbus_auth_decode_data (transport->auth,
761 &socket_transport->encoded_incoming,
764 _dbus_verbose ("Out of memory decoding incoming data\n");
765 _dbus_message_loader_return_buffer (transport->loader,
767 _dbus_string_get_length (buffer) - orig_len);
773 _dbus_message_loader_return_buffer (transport->loader,
775 _dbus_string_get_length (buffer) - orig_len);
777 _dbus_string_set_length (&socket_transport->encoded_incoming, 0);
778 _dbus_string_compact (&socket_transport->encoded_incoming, 2048);
783 _dbus_message_loader_get_buffer (transport->loader,
786 #ifdef HAVE_UNIX_FD_PASSING
787 if (DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport))
791 if (!_dbus_message_loader_get_unix_fds(transport->loader, &fds, &n_fds))
793 _dbus_verbose ("Out of memory reading file descriptors\n");
794 _dbus_message_loader_return_buffer (transport->loader, buffer, 0);
799 bytes_read = _dbus_read_socket_with_unix_fds(socket_transport->fd,
801 socket_transport->max_bytes_read_per_iteration,
804 if (bytes_read >= 0 && n_fds > 0)
805 _dbus_verbose("Read %i unix fds\n", n_fds);
807 _dbus_message_loader_return_unix_fds(transport->loader, fds, bytes_read < 0 ? 0 : n_fds);
812 bytes_read = _dbus_read_socket (socket_transport->fd,
813 buffer, socket_transport->max_bytes_read_per_iteration);
816 _dbus_message_loader_return_buffer (transport->loader,
818 bytes_read < 0 ? 0 : bytes_read);
823 /* EINTR already handled for us */
825 if (_dbus_get_is_errno_enomem ())
827 _dbus_verbose ("Out of memory in read()/do_reading()\n");
831 else if (_dbus_get_is_errno_eagain_or_ewouldblock ())
835 _dbus_verbose ("Error reading from remote app: %s\n",
836 _dbus_strerror_from_errno ());
837 do_io_error (transport);
841 else if (bytes_read == 0)
843 _dbus_verbose ("Disconnected from remote app\n");
844 do_io_error (transport);
849 _dbus_verbose (" read %d bytes\n", bytes_read);
853 if (!_dbus_transport_queue_messages (transport))
856 _dbus_verbose (" out of memory when queueing messages we just read in the transport\n");
860 /* Try reading more data until we get EAGAIN and return, or
861 * exceed max bytes per iteration. If in blocking mode of
862 * course we'll block instead of returning.
875 unix_error_with_read_to_come (DBusTransport *itransport,
879 DBusTransportSocket *transport = (DBusTransportSocket *) itransport;
881 if (!(flags & DBUS_WATCH_HANGUP || flags & DBUS_WATCH_ERROR))
884 /* If we have a read watch enabled ...
885 we -might have data incoming ... => handle the HANGUP there */
886 if (watch != transport->read_watch &&
887 _dbus_watch_get_enabled (transport->read_watch))
894 socket_handle_watch (DBusTransport *transport,
898 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
900 _dbus_assert (watch == socket_transport->read_watch ||
901 watch == socket_transport->write_watch);
902 _dbus_assert (watch != NULL);
904 /* If we hit an error here on a write watch, don't disconnect the transport yet because data can
905 * still be in the buffer and do_reading may need several iteration to read
906 * it all (because of its max_bytes_read_per_iteration limit).
908 if (!(flags & DBUS_WATCH_READABLE) && unix_error_with_read_to_come (transport, watch, flags))
910 _dbus_verbose ("Hang up or error on watch\n");
911 _dbus_transport_disconnect (transport);
915 if (watch == socket_transport->read_watch &&
916 (flags & DBUS_WATCH_READABLE))
918 dbus_bool_t auth_finished;
920 _dbus_verbose ("handling read watch %p flags = %x\n",
923 if (!do_authentication (transport, TRUE, FALSE, &auth_finished))
926 /* We don't want to do a read immediately following
927 * a successful authentication. This is so we
928 * have a chance to propagate the authentication
929 * state further up. Specifically, we need to
930 * process any pending data from the auth object.
934 if (!do_reading (transport))
936 _dbus_verbose ("no memory to read\n");
942 _dbus_verbose ("Not reading anything since we just completed the authentication\n");
945 else if (watch == socket_transport->write_watch &&
946 (flags & DBUS_WATCH_WRITABLE))
949 _dbus_verbose ("handling write watch, have_outgoing_messages = %d\n",
950 _dbus_connection_has_messages_to_send_unlocked (transport->connection));
952 if (!do_authentication (transport, FALSE, TRUE, NULL))
955 if (!do_writing (transport))
957 _dbus_verbose ("no memory to write\n");
961 /* See if we still need the write watch */
962 check_write_watch (transport);
964 #ifdef DBUS_ENABLE_VERBOSE_MODE
967 if (watch == socket_transport->read_watch)
968 _dbus_verbose ("asked to handle read watch with non-read condition 0x%x\n",
970 else if (watch == socket_transport->write_watch)
971 _dbus_verbose ("asked to handle write watch with non-write condition 0x%x\n",
974 _dbus_verbose ("asked to handle watch %p on fd %d that we don't recognize\n",
975 watch, dbus_watch_get_socket (watch));
977 #endif /* DBUS_ENABLE_VERBOSE_MODE */
983 socket_disconnect (DBusTransport *transport)
985 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
987 _dbus_verbose ("\n");
989 free_watches (transport);
991 _dbus_close_socket (socket_transport->fd, NULL);
992 socket_transport->fd = -1;
996 socket_connection_set (DBusTransport *transport)
998 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
1000 _dbus_watch_set_handler (socket_transport->write_watch,
1001 _dbus_connection_handle_watch,
1002 transport->connection, NULL);
1004 _dbus_watch_set_handler (socket_transport->read_watch,
1005 _dbus_connection_handle_watch,
1006 transport->connection, NULL);
1008 if (!_dbus_connection_add_watch_unlocked (transport->connection,
1009 socket_transport->write_watch))
1012 if (!_dbus_connection_add_watch_unlocked (transport->connection,
1013 socket_transport->read_watch))
1015 _dbus_connection_remove_watch_unlocked (transport->connection,
1016 socket_transport->write_watch);
1020 check_read_watch (transport);
1021 check_write_watch (transport);
1027 * @todo We need to have a way to wake up the select sleep if
1028 * a new iteration request comes in with a flag (read/write) that
1029 * we're not currently serving. Otherwise a call that just reads
1030 * could block a write call forever (if there are no incoming
1034 socket_do_iteration (DBusTransport *transport,
1036 int timeout_milliseconds)
1038 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
1043 _dbus_verbose (" iteration flags = %s%s timeout = %d read_watch = %p write_watch = %p fd = %d\n",
1044 flags & DBUS_ITERATION_DO_READING ? "read" : "",
1045 flags & DBUS_ITERATION_DO_WRITING ? "write" : "",
1046 timeout_milliseconds,
1047 socket_transport->read_watch,
1048 socket_transport->write_watch,
1049 socket_transport->fd);
1051 /* the passed in DO_READING/DO_WRITING flags indicate whether to
1052 * read/write messages, but regardless of those we may need to block
1053 * for reading/writing to do auth. But if we do reading for auth,
1054 * we don't want to read any messages yet if not given DO_READING.
1057 poll_fd.fd = socket_transport->fd;
1060 if (_dbus_transport_try_to_authenticate (transport))
1062 /* This is kind of a hack; if we have stuff to write, then try
1063 * to avoid the poll. This is probably about a 5% speedup on an
1064 * echo client/server.
1066 * If both reading and writing were requested, we want to avoid this
1067 * since it could have funky effects:
1068 * - both ends spinning waiting for the other one to read
1069 * data so they can finish writing
1070 * - prioritizing all writing ahead of reading
1072 if ((flags & DBUS_ITERATION_DO_WRITING) &&
1073 !(flags & (DBUS_ITERATION_DO_READING | DBUS_ITERATION_BLOCK)) &&
1074 !transport->disconnected &&
1075 _dbus_connection_has_messages_to_send_unlocked (transport->connection))
1077 do_writing (transport);
1079 if (transport->disconnected ||
1080 !_dbus_connection_has_messages_to_send_unlocked (transport->connection))
1084 /* If we get here, we decided to do the poll() after all */
1085 _dbus_assert (socket_transport->read_watch);
1086 if (flags & DBUS_ITERATION_DO_READING)
1087 poll_fd.events |= _DBUS_POLLIN;
1089 _dbus_assert (socket_transport->write_watch);
1090 if (flags & DBUS_ITERATION_DO_WRITING)
1091 poll_fd.events |= _DBUS_POLLOUT;
1095 DBusAuthState auth_state;
1097 auth_state = _dbus_auth_do_work (transport->auth);
1099 if (transport->receive_credentials_pending ||
1100 auth_state == DBUS_AUTH_STATE_WAITING_FOR_INPUT)
1101 poll_fd.events |= _DBUS_POLLIN;
1103 if (transport->send_credentials_pending ||
1104 auth_state == DBUS_AUTH_STATE_HAVE_BYTES_TO_SEND)
1105 poll_fd.events |= _DBUS_POLLOUT;
1110 if (flags & DBUS_ITERATION_BLOCK)
1111 poll_timeout = timeout_milliseconds;
1115 /* For blocking selects we drop the connection lock here
1116 * to avoid blocking out connection access during a potentially
1117 * indefinite blocking call. The io path is still protected
1118 * by the io_path_cond condvar, so we won't reenter this.
1120 if (flags & DBUS_ITERATION_BLOCK)
1122 _dbus_verbose ("unlock pre poll\n");
1123 _dbus_connection_unlock (transport->connection);
1127 poll_res = _dbus_poll (&poll_fd, 1, poll_timeout);
1129 if (poll_res < 0 && _dbus_get_is_errno_eintr ())
1132 if (flags & DBUS_ITERATION_BLOCK)
1134 _dbus_verbose ("lock post poll\n");
1135 _dbus_connection_lock (transport->connection);
1141 poll_fd.revents = 0; /* some concern that posix does not guarantee this;
1142 * valgrind flags it as an error. though it probably
1143 * is guaranteed on linux at least.
1146 if (poll_fd.revents & _DBUS_POLLERR)
1147 do_io_error (transport);
1150 dbus_bool_t need_read = (poll_fd.revents & _DBUS_POLLIN) > 0;
1151 dbus_bool_t need_write = (poll_fd.revents & _DBUS_POLLOUT) > 0;
1152 dbus_bool_t authentication_completed;
1154 _dbus_verbose ("in iteration, need_read=%d need_write=%d\n",
1155 need_read, need_write);
1156 do_authentication (transport, need_read, need_write,
1157 &authentication_completed);
1159 /* See comment in socket_handle_watch. */
1160 if (authentication_completed)
1163 if (need_read && (flags & DBUS_ITERATION_DO_READING))
1164 do_reading (transport);
1165 if (need_write && (flags & DBUS_ITERATION_DO_WRITING))
1166 do_writing (transport);
1171 _dbus_verbose ("Error from _dbus_poll(): %s\n",
1172 _dbus_strerror_from_errno ());
1178 /* We need to install the write watch only if we did not
1179 * successfully write everything. Note we need to be careful that we
1180 * don't call check_write_watch *before* do_writing, since it's
1181 * inefficient to add the write watch, and we can avoid it most of
1182 * the time since we can write immediately.
1184 * However, we MUST always call check_write_watch(); DBusConnection code
1185 * relies on the fact that running an iteration will notice that
1186 * messages are pending.
1188 check_write_watch (transport);
1190 _dbus_verbose (" ... leaving do_iteration()\n");
1194 socket_live_messages_changed (DBusTransport *transport)
1196 /* See if we should look for incoming messages again */
1197 check_read_watch (transport);
1202 socket_get_socket_fd (DBusTransport *transport,
1205 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
1207 *fd_p = socket_transport->fd;
1212 static const DBusTransportVTable socket_vtable = {
1214 socket_handle_watch,
1216 socket_connection_set,
1217 socket_do_iteration,
1218 socket_live_messages_changed,
1219 socket_get_socket_fd
1223 * Creates a new transport for the given socket file descriptor. The file
1224 * descriptor must be nonblocking (use _dbus_set_fd_nonblocking() to
1225 * make it so). This function is shared by various transports that
1226 * boil down to a full duplex file descriptor.
1228 * @param fd the file descriptor.
1229 * @param server_guid non-#NULL if this transport is on the server side of a connection
1230 * @param address the transport's address
1231 * @returns the new transport, or #NULL if no memory.
1234 _dbus_transport_new_for_socket (int fd,
1235 const DBusString *server_guid,
1236 const DBusString *address)
1238 DBusTransportSocket *socket_transport;
1240 socket_transport = dbus_new0 (DBusTransportSocket, 1);
1241 if (socket_transport == NULL)
1244 if (!_dbus_string_init (&socket_transport->encoded_outgoing))
1247 if (!_dbus_string_init (&socket_transport->encoded_incoming))
1250 socket_transport->write_watch = _dbus_watch_new (fd,
1251 DBUS_WATCH_WRITABLE,
1254 if (socket_transport->write_watch == NULL)
1257 socket_transport->read_watch = _dbus_watch_new (fd,
1258 DBUS_WATCH_READABLE,
1261 if (socket_transport->read_watch == NULL)
1264 if (!_dbus_transport_init_base (&socket_transport->base,
1266 server_guid, address))
1269 #ifdef HAVE_UNIX_FD_PASSING
1270 _dbus_auth_set_unix_fd_possible(socket_transport->base.auth, _dbus_socket_can_pass_unix_fd(fd));
1273 socket_transport->fd = fd;
1274 socket_transport->message_bytes_written = 0;
1276 /* These values should probably be tunable or something. */
1277 socket_transport->max_bytes_read_per_iteration = 2048;
1278 socket_transport->max_bytes_written_per_iteration = 2048;
1280 return (DBusTransport*) socket_transport;
1283 _dbus_watch_invalidate (socket_transport->read_watch);
1284 _dbus_watch_unref (socket_transport->read_watch);
1286 _dbus_watch_invalidate (socket_transport->write_watch);
1287 _dbus_watch_unref (socket_transport->write_watch);
1289 _dbus_string_free (&socket_transport->encoded_incoming);
1291 _dbus_string_free (&socket_transport->encoded_outgoing);
1293 dbus_free (socket_transport);
1298 * Creates a new transport for the given hostname and port.
1299 * If host is NULL, it will default to localhost
1301 * @param host the host to connect to
1302 * @param port the port to connect to
1303 * @param family the address family to connect to
1304 * @param noncefile path to nonce file
1305 * @param error location to store reason for failure.
1306 * @returns a new transport, or #NULL on failure.
1309 _dbus_transport_new_for_tcp_socket (const char *host,
1312 const char *noncefile,
1316 DBusTransport *transport;
1319 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1321 if (!_dbus_string_init (&address))
1323 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
1330 if (!_dbus_string_append (&address, noncefile ? "nonce-tcp:" : "tcp:"))
1333 if (!_dbus_string_append (&address, "host=") ||
1334 !_dbus_string_append (&address, host))
1337 if (!_dbus_string_append (&address, ",port=") ||
1338 !_dbus_string_append (&address, port))
1341 if (family != NULL &&
1342 (!_dbus_string_append (&address, ",family=") ||
1343 !_dbus_string_append (&address, family)))
1346 if (noncefile != NULL &&
1347 (!_dbus_string_append (&address, ",noncefile=") ||
1348 !_dbus_string_append (&address, noncefile)))
1351 fd = _dbus_connect_tcp_socket_with_nonce (host, port, family, noncefile, error);
1354 _DBUS_ASSERT_ERROR_IS_SET (error);
1355 _dbus_string_free (&address);
1359 _dbus_verbose ("Successfully connected to tcp socket %s:%s\n",
1362 transport = _dbus_transport_new_for_socket (fd, NULL, &address);
1363 _dbus_string_free (&address);
1364 if (transport == NULL)
1366 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
1367 _dbus_close_socket (fd, NULL);
1374 _dbus_string_free (&address);
1375 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
1380 * Opens a TCP socket transport.
1382 * @param entry the address entry to try opening as a tcp transport.
1383 * @param transport_p return location for the opened transport
1384 * @param error error to be set
1385 * @returns result of the attempt
1387 DBusTransportOpenResult
1388 _dbus_transport_open_socket(DBusAddressEntry *entry,
1389 DBusTransport **transport_p,
1394 dbus_bool_t isNonceTcp;
1396 method = dbus_address_entry_get_method (entry);
1397 _dbus_assert (method != NULL);
1399 isTcp = strcmp (method, "tcp") == 0;
1400 isNonceTcp = strcmp (method, "nonce-tcp") == 0;
1402 if (isTcp || isNonceTcp)
1404 const char *host = dbus_address_entry_get_value (entry, "host");
1405 const char *port = dbus_address_entry_get_value (entry, "port");
1406 const char *family = dbus_address_entry_get_value (entry, "family");
1407 const char *noncefile = dbus_address_entry_get_value (entry, "noncefile");
1409 if ((isNonceTcp == TRUE) != (noncefile != NULL)) {
1410 _dbus_set_bad_address (error, method, "noncefile", NULL);
1411 return DBUS_TRANSPORT_OPEN_BAD_ADDRESS;
1416 _dbus_set_bad_address (error, method, "port", NULL);
1417 return DBUS_TRANSPORT_OPEN_BAD_ADDRESS;
1420 *transport_p = _dbus_transport_new_for_tcp_socket (host, port, family, noncefile, error);
1421 if (*transport_p == NULL)
1423 _DBUS_ASSERT_ERROR_IS_SET (error);
1424 return DBUS_TRANSPORT_OPEN_DID_NOT_CONNECT;
1428 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1429 return DBUS_TRANSPORT_OPEN_OK;
1434 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1435 return DBUS_TRANSPORT_OPEN_NOT_HANDLED;