1 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2 /* dbus-transport-socket.c Socket subclasses of DBusTransport
4 * Copyright (C) 2002, 2003, 2004, 2006 Red Hat Inc.
6 * Licensed under the Academic Free License version 2.1
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
25 #include "dbus-internals.h"
26 #include "dbus-connection-internal.h"
27 #include "dbus-nonce.h"
28 #include "dbus-transport-socket.h"
29 #include "dbus-transport-protected.h"
30 #include "dbus-watch.h"
31 #include "dbus-credentials.h"
34 * @defgroup DBusTransportSocket DBusTransport implementations for sockets
35 * @ingroup DBusInternals
36 * @brief Implementation details of DBusTransport on sockets
42 * Opaque object representing a socket file descriptor transport.
44 typedef struct DBusTransportSocket DBusTransportSocket;
47 * Implementation details of DBusTransportSocket. All members are private.
49 struct DBusTransportSocket
51 DBusTransport base; /**< Parent instance */
52 DBusSocket fd; /**< File descriptor. */
53 DBusWatch *read_watch; /**< Watch for readability. */
54 DBusWatch *write_watch; /**< Watch for writability. */
56 int max_bytes_read_per_iteration; /**< To avoid blocking too long. */
57 int max_bytes_written_per_iteration; /**< To avoid blocking too long. */
59 int message_bytes_written; /**< Number of bytes of current
60 * outgoing message that have
63 DBusString encoded_outgoing; /**< Encoded version of current
66 DBusString encoded_incoming; /**< Encoded version of current
72 free_watches (DBusTransport *transport)
74 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
76 _dbus_verbose ("start\n");
78 if (socket_transport->read_watch)
80 if (transport->connection)
81 _dbus_connection_remove_watch_unlocked (transport->connection,
82 socket_transport->read_watch);
83 _dbus_watch_invalidate (socket_transport->read_watch);
84 _dbus_watch_unref (socket_transport->read_watch);
85 socket_transport->read_watch = NULL;
88 if (socket_transport->write_watch)
90 if (transport->connection)
91 _dbus_connection_remove_watch_unlocked (transport->connection,
92 socket_transport->write_watch);
93 _dbus_watch_invalidate (socket_transport->write_watch);
94 _dbus_watch_unref (socket_transport->write_watch);
95 socket_transport->write_watch = NULL;
98 _dbus_verbose ("end\n");
102 socket_finalize (DBusTransport *transport)
104 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
106 _dbus_verbose ("\n");
108 free_watches (transport);
110 _dbus_string_free (&socket_transport->encoded_outgoing);
111 _dbus_string_free (&socket_transport->encoded_incoming);
113 _dbus_transport_finalize_base (transport);
115 _dbus_assert (socket_transport->read_watch == NULL);
116 _dbus_assert (socket_transport->write_watch == NULL);
118 dbus_free (transport);
122 check_write_watch (DBusTransport *transport)
124 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
127 if (transport->connection == NULL)
130 if (transport->disconnected)
132 _dbus_assert (socket_transport->write_watch == NULL);
136 _dbus_transport_ref (transport);
138 if (_dbus_transport_try_to_authenticate (transport))
139 needed = _dbus_connection_has_messages_to_send_unlocked (transport->connection);
142 if (transport->send_credentials_pending)
146 DBusAuthState auth_state;
148 auth_state = _dbus_auth_do_work (transport->auth);
150 /* If we need memory we install the write watch just in case,
151 * if there's no need for it, it will get de-installed
152 * next time we try reading.
154 if (auth_state == DBUS_AUTH_STATE_HAVE_BYTES_TO_SEND ||
155 auth_state == DBUS_AUTH_STATE_WAITING_FOR_MEMORY)
162 _dbus_verbose ("check_write_watch(): needed = %d on connection %p watch %p fd = %" DBUS_SOCKET_FORMAT " outgoing messages exist %d\n",
163 needed, transport->connection, socket_transport->write_watch,
164 _dbus_socket_printable (socket_transport->fd),
165 _dbus_connection_has_messages_to_send_unlocked (transport->connection));
167 _dbus_connection_toggle_watch_unlocked (transport->connection,
168 socket_transport->write_watch,
171 _dbus_transport_unref (transport);
175 check_read_watch (DBusTransport *transport)
177 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
178 dbus_bool_t need_read_watch;
180 _dbus_verbose ("fd = %" DBUS_SOCKET_FORMAT "\n",
181 _dbus_socket_printable (socket_transport->fd));
183 if (transport->connection == NULL)
186 if (transport->disconnected)
188 _dbus_assert (socket_transport->read_watch == NULL);
192 _dbus_transport_ref (transport);
194 if (_dbus_transport_try_to_authenticate (transport))
196 (_dbus_counter_get_size_value (transport->live_messages) < transport->max_live_messages_size) &&
197 (_dbus_counter_get_unix_fd_value (transport->live_messages) < transport->max_live_messages_unix_fds);
200 if (transport->receive_credentials_pending)
201 need_read_watch = TRUE;
204 /* The reason to disable need_read_watch when not WAITING_FOR_INPUT
205 * is to avoid spinning on the file descriptor when we're waiting
206 * to write or for some other part of the auth process
208 DBusAuthState auth_state;
210 auth_state = _dbus_auth_do_work (transport->auth);
212 /* If we need memory we install the read watch just in case,
213 * if there's no need for it, it will get de-installed
214 * next time we try reading. If we're authenticated we
215 * install it since we normally have it installed while
218 if (auth_state == DBUS_AUTH_STATE_WAITING_FOR_INPUT ||
219 auth_state == DBUS_AUTH_STATE_WAITING_FOR_MEMORY ||
220 auth_state == DBUS_AUTH_STATE_AUTHENTICATED)
221 need_read_watch = TRUE;
223 need_read_watch = FALSE;
227 _dbus_verbose (" setting read watch enabled = %d\n", need_read_watch);
228 _dbus_connection_toggle_watch_unlocked (transport->connection,
229 socket_transport->read_watch,
232 _dbus_transport_unref (transport);
236 do_io_error (DBusTransport *transport)
238 _dbus_transport_ref (transport);
239 _dbus_transport_disconnect (transport);
240 _dbus_transport_unref (transport);
243 /* return value is whether we successfully read any new data. */
245 read_data_into_auth (DBusTransport *transport,
248 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
255 _dbus_auth_get_buffer (transport->auth, &buffer);
257 bytes_read = _dbus_read_socket (socket_transport->fd,
258 buffer, socket_transport->max_bytes_read_per_iteration);
259 saved_errno = _dbus_save_socket_errno ();
261 _dbus_auth_return_buffer (transport->auth, buffer);
265 _dbus_verbose (" read %d bytes in auth phase\n", bytes_read);
269 else if (bytes_read < 0)
271 /* EINTR already handled for us */
273 if (_dbus_get_is_errno_enomem (saved_errno))
277 else if (_dbus_get_is_errno_eagain_or_ewouldblock (saved_errno))
278 ; /* do nothing, just return FALSE below */
281 _dbus_verbose ("Error reading from remote app: %s\n",
282 _dbus_strerror (saved_errno));
283 do_io_error (transport);
290 _dbus_assert (bytes_read == 0);
292 _dbus_verbose ("Disconnected from remote app\n");
293 do_io_error (transport);
299 /* Return value is whether we successfully wrote any bytes */
301 write_data_from_auth (DBusTransport *transport)
303 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
306 const DBusString *buffer;
308 if (!_dbus_auth_get_bytes_to_send (transport->auth,
312 bytes_written = _dbus_write_socket (socket_transport->fd,
314 0, _dbus_string_get_length (buffer));
315 saved_errno = _dbus_save_socket_errno ();
317 if (bytes_written > 0)
319 _dbus_auth_bytes_sent (transport->auth, bytes_written);
322 else if (bytes_written < 0)
324 /* EINTR already handled for us */
326 if (_dbus_get_is_errno_eagain_or_ewouldblock (saved_errno))
330 _dbus_verbose ("Error writing to remote app: %s\n",
331 _dbus_strerror (saved_errno));
332 do_io_error (transport);
341 exchange_credentials (DBusTransport *transport,
342 dbus_bool_t do_reading,
343 dbus_bool_t do_writing)
345 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
346 DBusError error = DBUS_ERROR_INIT;
348 _dbus_verbose ("exchange_credentials: do_reading = %d, do_writing = %d\n",
349 do_reading, do_writing);
351 if (do_writing && transport->send_credentials_pending)
353 if (_dbus_send_credentials_socket (socket_transport->fd,
356 transport->send_credentials_pending = FALSE;
360 _dbus_verbose ("Failed to write credentials: %s\n", error.message);
361 dbus_error_free (&error);
362 do_io_error (transport);
366 if (do_reading && transport->receive_credentials_pending)
368 /* FIXME this can fail due to IO error _or_ OOM, broken
369 * (somewhat tricky to fix since the OOM error can be set after
370 * we already read the credentials byte, so basically we need to
371 * separate reading the byte and storing it in the
372 * transport->credentials). Does not really matter for now
373 * because storing in credentials never actually fails on unix.
375 if (_dbus_read_credentials_socket (socket_transport->fd,
376 transport->credentials,
379 transport->receive_credentials_pending = FALSE;
383 _dbus_verbose ("Failed to read credentials %s\n", error.message);
384 dbus_error_free (&error);
385 do_io_error (transport);
389 if (!(transport->send_credentials_pending ||
390 transport->receive_credentials_pending))
392 if (!_dbus_auth_set_credentials (transport->auth,
393 transport->credentials))
401 do_authentication (DBusTransport *transport,
402 dbus_bool_t do_reading,
403 dbus_bool_t do_writing,
404 dbus_bool_t *auth_completed)
407 dbus_bool_t orig_auth_state;
411 orig_auth_state = _dbus_transport_try_to_authenticate (transport);
413 /* This is essential to avoid the check_write_watch() at the end,
414 * we don't want to add a write watch in do_iteration before
415 * we try writing and get EAGAIN
420 *auth_completed = FALSE;
424 _dbus_transport_ref (transport);
426 while (!_dbus_transport_try_to_authenticate (transport) &&
427 _dbus_transport_get_is_connected (transport))
429 if (!exchange_credentials (transport, do_reading, do_writing))
436 if (transport->send_credentials_pending ||
437 transport->receive_credentials_pending)
439 _dbus_verbose ("send_credentials_pending = %d receive_credentials_pending = %d\n",
440 transport->send_credentials_pending,
441 transport->receive_credentials_pending);
445 #define TRANSPORT_SIDE(t) ((t)->is_server ? "server" : "client")
446 switch (_dbus_auth_do_work (transport->auth))
448 case DBUS_AUTH_STATE_WAITING_FOR_INPUT:
449 _dbus_verbose (" %s auth state: waiting for input\n",
450 TRANSPORT_SIDE (transport));
451 if (!do_reading || !read_data_into_auth (transport, &oom))
455 case DBUS_AUTH_STATE_WAITING_FOR_MEMORY:
456 _dbus_verbose (" %s auth state: waiting for memory\n",
457 TRANSPORT_SIDE (transport));
462 case DBUS_AUTH_STATE_HAVE_BYTES_TO_SEND:
463 _dbus_verbose (" %s auth state: bytes to send\n",
464 TRANSPORT_SIDE (transport));
465 if (!do_writing || !write_data_from_auth (transport))
469 case DBUS_AUTH_STATE_NEED_DISCONNECT:
470 _dbus_verbose (" %s auth state: need to disconnect\n",
471 TRANSPORT_SIDE (transport));
472 do_io_error (transport);
475 case DBUS_AUTH_STATE_AUTHENTICATED:
476 _dbus_verbose (" %s auth state: authenticated\n",
477 TRANSPORT_SIDE (transport));
480 case DBUS_AUTH_STATE_INVALID:
483 _dbus_assert_not_reached ("invalid auth state");
489 *auth_completed = (orig_auth_state != _dbus_transport_try_to_authenticate (transport));
491 check_read_watch (transport);
492 check_write_watch (transport);
493 _dbus_transport_unref (transport);
501 /* returns false on oom */
503 do_writing (DBusTransport *transport)
506 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
509 /* No messages without authentication! */
510 if (!_dbus_transport_try_to_authenticate (transport))
512 _dbus_verbose ("Not authenticated, not writing anything\n");
516 if (transport->disconnected)
518 _dbus_verbose ("Not connected, not writing anything\n");
523 _dbus_verbose ("do_writing(), have_messages = %d, fd = %" DBUS_SOCKET_FORMAT "\n",
524 _dbus_connection_has_messages_to_send_unlocked (transport->connection),
525 _dbus_socket_printable (socket_transport->fd));
531 transport->overflowed = FALSE;
533 while (!transport->disconnected &&
534 _dbus_connection_has_messages_to_send_unlocked (transport->connection))
537 DBusMessage *message;
538 const DBusString *header;
539 const DBusString *body;
540 int header_len, body_len;
541 int total_bytes_to_write;
544 if (total > socket_transport->max_bytes_written_per_iteration)
546 _dbus_verbose ("%d bytes exceeds %d bytes written per iteration, returning\n",
547 total, socket_transport->max_bytes_written_per_iteration);
551 message = _dbus_connection_get_message_to_send (transport->connection);
552 _dbus_assert (message != NULL);
553 dbus_message_lock (message);
556 _dbus_verbose ("writing message %p\n", message);
559 _dbus_message_get_network_data (message,
562 header_len = _dbus_string_get_length (header);
563 body_len = _dbus_string_get_length (body);
565 if (_dbus_auth_needs_encoding (transport->auth))
567 /* Does fd passing even make sense with encoded data? */
568 _dbus_assert(!DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport));
570 if (_dbus_string_get_length (&socket_transport->encoded_outgoing) == 0)
572 if (!_dbus_auth_encode_data (transport->auth,
573 header, &socket_transport->encoded_outgoing))
579 if (!_dbus_auth_encode_data (transport->auth,
580 body, &socket_transport->encoded_outgoing))
582 _dbus_string_set_length (&socket_transport->encoded_outgoing, 0);
588 total_bytes_to_write = _dbus_string_get_length (&socket_transport->encoded_outgoing);
591 _dbus_verbose ("encoded message is %d bytes\n",
592 total_bytes_to_write);
596 _dbus_write_socket (socket_transport->fd,
597 &socket_transport->encoded_outgoing,
598 socket_transport->message_bytes_written,
599 total_bytes_to_write - socket_transport->message_bytes_written);
600 saved_errno = _dbus_save_socket_errno ();
604 total_bytes_to_write = header_len + body_len;
607 _dbus_verbose ("message is %d bytes\n",
608 total_bytes_to_write);
611 #ifdef HAVE_UNIX_FD_PASSING
612 if (socket_transport->message_bytes_written <= 0 && DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport))
614 /* Send the fds along with the first byte of the message */
618 _dbus_message_get_unix_fds(message, &unix_fds, &n);
621 _dbus_write_socket_with_unix_fds_two (socket_transport->fd,
623 socket_transport->message_bytes_written,
624 header_len - socket_transport->message_bytes_written,
629 saved_errno = _dbus_save_socket_errno ();
631 if (bytes_written > 0 && n > 0)
632 _dbus_verbose("Wrote %i unix fds\n", n);
637 if (socket_transport->message_bytes_written < header_len)
640 _dbus_write_socket_two (socket_transport->fd,
642 socket_transport->message_bytes_written,
643 header_len - socket_transport->message_bytes_written,
650 _dbus_write_socket (socket_transport->fd,
652 (socket_transport->message_bytes_written - header_len),
654 (socket_transport->message_bytes_written - header_len));
657 saved_errno = _dbus_save_socket_errno ();
661 if (bytes_written < 0)
663 /* EINTR already handled for us */
665 /* If the other end closed the socket with close() or shutdown(), we
666 * receive EPIPE here but we must not close the socket yet: there
667 * might still be some data to read. See:
668 * http://lists.freedesktop.org/archives/dbus/2008-March/009526.html
671 if (_dbus_get_is_errno_eagain_or_ewouldblock (saved_errno) || _dbus_get_is_errno_epipe (saved_errno))
673 transport->overflowed = TRUE;
677 /* Since Linux commit 25888e (from 2.6.37-rc4, Nov 2010), sendmsg()
678 * on Unix sockets returns -1 errno=ETOOMANYREFS when the passfd
679 * mechanism (SCM_RIGHTS) is used recursively with a recursion level
680 * of maximum 4. The kernel does not have an API to check whether
681 * the passed fds can be forwarded and it can change asynchronously.
683 * https://bugs.freedesktop.org/show_bug.cgi?id=80163
686 else if (_dbus_get_is_errno_etoomanyrefs (saved_errno))
688 /* We only send fds in the first byte of the message.
689 * ETOOMANYREFS cannot happen after.
691 _dbus_assert (socket_transport->message_bytes_written == 0);
693 _dbus_verbose (" discard message of %d bytes due to ETOOMANYREFS\n",
694 total_bytes_to_write);
696 socket_transport->message_bytes_written = 0;
697 _dbus_string_set_length (&socket_transport->encoded_outgoing, 0);
698 _dbus_string_compact (&socket_transport->encoded_outgoing, 2048);
700 /* The message was not actually sent but it needs to be removed
701 * from the outgoing queue
703 _dbus_connection_message_sent_unlocked (transport->connection,
708 _dbus_verbose ("Error writing to remote app: %s\n",
709 _dbus_strerror (saved_errno));
710 do_io_error (transport);
716 _dbus_verbose (" wrote %d bytes of %d\n", bytes_written,
717 total_bytes_to_write);
719 total += bytes_written;
720 socket_transport->message_bytes_written += bytes_written;
722 _dbus_assert (socket_transport->message_bytes_written <=
723 total_bytes_to_write);
725 if (socket_transport->message_bytes_written == total_bytes_to_write)
727 socket_transport->message_bytes_written = 0;
728 _dbus_string_set_length (&socket_transport->encoded_outgoing, 0);
729 _dbus_string_compact (&socket_transport->encoded_outgoing, 2048);
731 _dbus_connection_message_sent_unlocked (transport->connection,
744 /* returns false on out-of-memory */
746 do_reading (DBusTransport *transport)
748 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
755 _dbus_verbose ("fd = %" DBUS_SOCKET_FORMAT "\n",
756 _dbus_socket_printable (socket_transport->fd));
758 /* No messages without authentication! */
759 if (!_dbus_transport_try_to_authenticate (transport))
768 /* See if we've exceeded max messages and need to disable reading */
769 check_read_watch (transport);
771 if (total > socket_transport->max_bytes_read_per_iteration)
773 _dbus_verbose ("%d bytes exceeds %d bytes read per iteration, returning\n",
774 total, socket_transport->max_bytes_read_per_iteration);
778 _dbus_assert (socket_transport->read_watch != NULL ||
779 transport->disconnected);
781 if (transport->disconnected)
784 if (!dbus_watch_get_enabled (socket_transport->read_watch))
787 if (_dbus_auth_needs_decoding (transport->auth))
789 /* Does fd passing even make sense with encoded data? */
790 _dbus_assert(!DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport));
792 if (_dbus_string_get_length (&socket_transport->encoded_incoming) > 0)
793 bytes_read = _dbus_string_get_length (&socket_transport->encoded_incoming);
795 bytes_read = _dbus_read_socket (socket_transport->fd,
796 &socket_transport->encoded_incoming,
797 socket_transport->max_bytes_read_per_iteration);
799 saved_errno = _dbus_save_socket_errno ();
801 _dbus_assert (_dbus_string_get_length (&socket_transport->encoded_incoming) ==
806 _dbus_message_loader_get_buffer (transport->loader,
811 if (!_dbus_auth_decode_data (transport->auth,
812 &socket_transport->encoded_incoming,
815 _dbus_verbose ("Out of memory decoding incoming data\n");
816 _dbus_message_loader_return_buffer (transport->loader,
823 _dbus_message_loader_return_buffer (transport->loader,
826 _dbus_string_set_length (&socket_transport->encoded_incoming, 0);
827 _dbus_string_compact (&socket_transport->encoded_incoming, 2048);
832 int max_to_read = DBUS_MAXIMUM_MESSAGE_LENGTH;
833 dbus_bool_t may_read_unix_fds = TRUE;
835 _dbus_message_loader_get_buffer (transport->loader,
840 if (max_to_read > socket_transport->max_bytes_read_per_iteration)
841 max_to_read = socket_transport->max_bytes_read_per_iteration;
843 #ifdef HAVE_UNIX_FD_PASSING
844 if (DBUS_TRANSPORT_CAN_SEND_UNIX_FD(transport) && may_read_unix_fds)
849 if (!_dbus_message_loader_get_unix_fds(transport->loader, &fds, &n_fds))
851 _dbus_verbose ("Out of memory reading file descriptors\n");
852 _dbus_message_loader_return_buffer (transport->loader, buffer);
857 bytes_read = _dbus_read_socket_with_unix_fds(socket_transport->fd,
861 saved_errno = _dbus_save_socket_errno ();
863 if (bytes_read >= 0 && n_fds > 0)
864 _dbus_verbose("Read %i unix fds\n", n_fds);
866 _dbus_message_loader_return_unix_fds(transport->loader, fds, bytes_read < 0 ? 0 : n_fds);
871 bytes_read = _dbus_read_socket (socket_transport->fd,
872 buffer, max_to_read);
873 saved_errno = _dbus_save_socket_errno ();
876 _dbus_message_loader_return_buffer (transport->loader,
882 /* EINTR already handled for us */
884 if (_dbus_get_is_errno_enomem (saved_errno))
886 _dbus_verbose ("Out of memory in read()/do_reading()\n");
890 else if (_dbus_get_is_errno_eagain_or_ewouldblock (saved_errno))
894 _dbus_verbose ("Error reading from remote app: %s\n",
895 _dbus_strerror (saved_errno));
896 do_io_error (transport);
900 else if (bytes_read == 0)
902 _dbus_verbose ("Disconnected from remote app\n");
903 do_io_error (transport);
908 _dbus_verbose (" read %d bytes\n", bytes_read);
912 if (!_dbus_transport_queue_messages (transport))
915 _dbus_verbose (" out of memory when queueing messages we just read in the transport\n");
919 /* Try reading more data until we get EAGAIN and return, or
920 * exceed max bytes per iteration. If in blocking mode of
921 * course we'll block instead of returning.
934 unix_error_with_read_to_come (DBusTransport *itransport,
938 DBusTransportSocket *transport = (DBusTransportSocket *) itransport;
940 if (!(flags & DBUS_WATCH_HANGUP || flags & DBUS_WATCH_ERROR))
943 /* If we have a read watch enabled ...
944 we -might have data incoming ... => handle the HANGUP there */
945 if (watch != transport->read_watch &&
946 _dbus_watch_get_enabled (transport->read_watch))
953 socket_handle_watch (DBusTransport *transport,
957 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
959 _dbus_assert (watch == socket_transport->read_watch ||
960 watch == socket_transport->write_watch);
961 _dbus_assert (watch != NULL);
963 /* If we hit an error here on a write watch, don't disconnect the transport yet because data can
964 * still be in the buffer and do_reading may need several iteration to read
965 * it all (because of its max_bytes_read_per_iteration limit).
967 if (!(flags & DBUS_WATCH_READABLE) && unix_error_with_read_to_come (transport, watch, flags))
969 _dbus_verbose ("Hang up or error on watch\n");
970 _dbus_transport_disconnect (transport);
974 if (watch == socket_transport->read_watch &&
975 (flags & DBUS_WATCH_READABLE))
977 dbus_bool_t auth_finished;
979 _dbus_verbose ("handling read watch %p flags = %x\n",
982 if (!do_authentication (transport, TRUE, FALSE, &auth_finished))
985 /* We don't want to do a read immediately following
986 * a successful authentication. This is so we
987 * have a chance to propagate the authentication
988 * state further up. Specifically, we need to
989 * process any pending data from the auth object.
993 if (!do_reading (transport))
995 _dbus_verbose ("no memory to read\n");
1001 _dbus_verbose ("Not reading anything since we just completed the authentication\n");
1004 else if (watch == socket_transport->write_watch &&
1005 (flags & DBUS_WATCH_WRITABLE))
1008 _dbus_verbose ("handling write watch, have_outgoing_messages = %d\n",
1009 _dbus_connection_has_messages_to_send_unlocked (transport->connection));
1011 if (!do_authentication (transport, FALSE, TRUE, NULL))
1014 if (!do_writing (transport))
1016 _dbus_verbose ("no memory to write\n");
1020 /* See if we still need the write watch */
1021 check_write_watch (transport);
1023 #ifdef DBUS_ENABLE_VERBOSE_MODE
1026 if (watch == socket_transport->read_watch)
1027 _dbus_verbose ("asked to handle read watch with non-read condition 0x%x\n",
1029 else if (watch == socket_transport->write_watch)
1030 _dbus_verbose ("asked to handle write watch with non-write condition 0x%x\n",
1033 _dbus_verbose ("asked to handle watch %p on fd %" DBUS_SOCKET_FORMAT " that we don't recognize\n",
1034 watch, _dbus_socket_printable (_dbus_watch_get_socket (watch)));
1036 #endif /* DBUS_ENABLE_VERBOSE_MODE */
1042 socket_disconnect (DBusTransport *transport)
1044 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
1046 _dbus_verbose ("\n");
1048 free_watches (transport);
1050 _dbus_close_socket (socket_transport->fd, NULL);
1051 _dbus_socket_invalidate (&socket_transport->fd);
1055 socket_connection_set (DBusTransport *transport)
1057 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
1059 _dbus_watch_set_handler (socket_transport->write_watch,
1060 _dbus_connection_handle_watch,
1061 transport->connection, NULL);
1063 _dbus_watch_set_handler (socket_transport->read_watch,
1064 _dbus_connection_handle_watch,
1065 transport->connection, NULL);
1067 if (!_dbus_connection_add_watch_unlocked (transport->connection,
1068 socket_transport->write_watch))
1071 if (!_dbus_connection_add_watch_unlocked (transport->connection,
1072 socket_transport->read_watch))
1074 _dbus_connection_remove_watch_unlocked (transport->connection,
1075 socket_transport->write_watch);
1079 check_read_watch (transport);
1080 check_write_watch (transport);
1086 * @todo We need to have a way to wake up the select sleep if
1087 * a new iteration request comes in with a flag (read/write) that
1088 * we're not currently serving. Otherwise a call that just reads
1089 * could block a write call forever (if there are no incoming
1093 socket_do_iteration (DBusTransport *transport,
1095 int timeout_milliseconds)
1097 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
1102 _dbus_verbose (" iteration flags = %s%s timeout = %d read_watch = %p write_watch = %p fd = %" DBUS_SOCKET_FORMAT "\n",
1103 flags & DBUS_ITERATION_DO_READING ? "read" : "",
1104 flags & DBUS_ITERATION_DO_WRITING ? "write" : "",
1105 timeout_milliseconds,
1106 socket_transport->read_watch,
1107 socket_transport->write_watch,
1108 _dbus_socket_printable (socket_transport->fd));
1110 /* the passed in DO_READING/DO_WRITING flags indicate whether to
1111 * read/write messages, but regardless of those we may need to block
1112 * for reading/writing to do auth. But if we do reading for auth,
1113 * we don't want to read any messages yet if not given DO_READING.
1116 poll_fd.fd = _dbus_socket_get_pollable (socket_transport->fd);
1119 if (_dbus_transport_try_to_authenticate (transport))
1121 /* This is kind of a hack; if we have stuff to write, then try
1122 * to avoid the poll. This is probably about a 5% speedup on an
1123 * echo client/server.
1125 * If both reading and writing were requested, we want to avoid this
1126 * since it could have funky effects:
1127 * - both ends spinning waiting for the other one to read
1128 * data so they can finish writing
1129 * - prioritizing all writing ahead of reading
1131 if ((flags & DBUS_ITERATION_DO_WRITING) &&
1132 !(flags & (DBUS_ITERATION_DO_READING | DBUS_ITERATION_BLOCK)) &&
1133 !transport->disconnected &&
1134 _dbus_connection_has_messages_to_send_unlocked (transport->connection))
1136 do_writing (transport);
1138 if (transport->disconnected ||
1139 !_dbus_connection_has_messages_to_send_unlocked (transport->connection))
1143 /* If we get here, we decided to do the poll() after all */
1144 _dbus_assert (socket_transport->read_watch);
1145 if (flags & DBUS_ITERATION_DO_READING)
1146 poll_fd.events |= _DBUS_POLLIN;
1148 _dbus_assert (socket_transport->write_watch);
1149 if (flags & DBUS_ITERATION_DO_WRITING)
1150 poll_fd.events |= _DBUS_POLLOUT;
1154 DBusAuthState auth_state;
1156 auth_state = _dbus_auth_do_work (transport->auth);
1158 if (transport->receive_credentials_pending ||
1159 auth_state == DBUS_AUTH_STATE_WAITING_FOR_INPUT)
1160 poll_fd.events |= _DBUS_POLLIN;
1162 if (transport->send_credentials_pending ||
1163 auth_state == DBUS_AUTH_STATE_HAVE_BYTES_TO_SEND)
1164 poll_fd.events |= _DBUS_POLLOUT;
1171 if (flags & DBUS_ITERATION_BLOCK)
1172 poll_timeout = timeout_milliseconds;
1176 /* For blocking selects we drop the connection lock here
1177 * to avoid blocking out connection access during a potentially
1178 * indefinite blocking call. The io path is still protected
1179 * by the io_path_cond condvar, so we won't reenter this.
1181 if (flags & DBUS_ITERATION_BLOCK)
1183 _dbus_verbose ("unlock pre poll\n");
1184 _dbus_connection_unlock (transport->connection);
1188 poll_res = _dbus_poll (&poll_fd, 1, poll_timeout);
1189 saved_errno = _dbus_save_socket_errno ();
1191 if (poll_res < 0 && _dbus_get_is_errno_eintr (saved_errno))
1194 if (flags & DBUS_ITERATION_BLOCK)
1196 _dbus_verbose ("lock post poll\n");
1197 _dbus_connection_lock (transport->connection);
1203 poll_fd.revents = 0; /* some concern that posix does not guarantee this;
1204 * valgrind flags it as an error. though it probably
1205 * is guaranteed on linux at least.
1208 if (poll_fd.revents & _DBUS_POLLERR)
1209 do_io_error (transport);
1212 dbus_bool_t need_read = (poll_fd.revents & _DBUS_POLLIN) > 0;
1213 dbus_bool_t need_write = (poll_fd.revents & _DBUS_POLLOUT) > 0;
1214 dbus_bool_t authentication_completed;
1216 _dbus_verbose ("in iteration, need_read=%d need_write=%d\n",
1217 need_read, need_write);
1218 do_authentication (transport, need_read, need_write,
1219 &authentication_completed);
1221 /* See comment in socket_handle_watch. */
1222 if (authentication_completed)
1225 if (need_read && (flags & DBUS_ITERATION_DO_READING))
1226 do_reading (transport);
1227 if (need_write && (flags & DBUS_ITERATION_DO_WRITING))
1228 do_writing (transport);
1233 _dbus_verbose ("Error from _dbus_poll(): %s\n",
1234 _dbus_strerror (saved_errno));
1240 /* We need to install the write watch only if we did not
1241 * successfully write everything. Note we need to be careful that we
1242 * don't call check_write_watch *before* do_writing, since it's
1243 * inefficient to add the write watch, and we can avoid it most of
1244 * the time since we can write immediately.
1246 * However, we MUST always call check_write_watch(); DBusConnection code
1247 * relies on the fact that running an iteration will notice that
1248 * messages are pending.
1250 check_write_watch (transport);
1252 _dbus_verbose (" ... leaving do_iteration()\n");
1256 socket_live_messages_changed (DBusTransport *transport)
1258 /* See if we should look for incoming messages again */
1259 check_read_watch (transport);
1264 socket_get_socket_fd (DBusTransport *transport,
1267 DBusTransportSocket *socket_transport = (DBusTransportSocket*) transport;
1269 *fd_p = socket_transport->fd;
1274 static const DBusTransportVTable socket_vtable = {
1276 socket_handle_watch,
1278 socket_connection_set,
1279 socket_do_iteration,
1280 socket_live_messages_changed,
1281 socket_get_socket_fd
1285 * Creates a new transport for the given socket file descriptor. The file
1286 * descriptor must be nonblocking (use _dbus_set_fd_nonblocking() to
1287 * make it so). This function is shared by various transports that
1288 * boil down to a full duplex file descriptor.
1290 * @param fd the file descriptor.
1291 * @param server_guid non-#NULL if this transport is on the server side of a connection
1292 * @param address the transport's address
1293 * @returns the new transport, or #NULL if no memory.
1296 _dbus_transport_new_for_socket (DBusSocket fd,
1297 const DBusString *server_guid,
1298 const DBusString *address)
1300 DBusTransportSocket *socket_transport;
1302 socket_transport = dbus_new0 (DBusTransportSocket, 1);
1303 if (socket_transport == NULL)
1306 if (!_dbus_string_init (&socket_transport->encoded_outgoing))
1309 if (!_dbus_string_init (&socket_transport->encoded_incoming))
1312 socket_transport->write_watch = _dbus_watch_new (_dbus_socket_get_pollable (fd),
1313 DBUS_WATCH_WRITABLE,
1316 if (socket_transport->write_watch == NULL)
1319 socket_transport->read_watch = _dbus_watch_new (_dbus_socket_get_pollable (fd),
1320 DBUS_WATCH_READABLE,
1323 if (socket_transport->read_watch == NULL)
1326 if (!_dbus_transport_init_base (&socket_transport->base,
1328 server_guid, address))
1331 #ifdef HAVE_UNIX_FD_PASSING
1332 _dbus_auth_set_unix_fd_possible(socket_transport->base.auth, _dbus_socket_can_pass_unix_fd(fd));
1335 socket_transport->fd = fd;
1336 socket_transport->message_bytes_written = 0;
1338 /* These values should probably be tunable or something. */
1339 socket_transport->max_bytes_read_per_iteration = 2048;
1340 socket_transport->max_bytes_written_per_iteration = 2048;
1342 return (DBusTransport*) socket_transport;
1345 _dbus_watch_invalidate (socket_transport->read_watch);
1346 _dbus_watch_unref (socket_transport->read_watch);
1348 _dbus_watch_invalidate (socket_transport->write_watch);
1349 _dbus_watch_unref (socket_transport->write_watch);
1351 _dbus_string_free (&socket_transport->encoded_incoming);
1353 _dbus_string_free (&socket_transport->encoded_outgoing);
1355 dbus_free (socket_transport);
1360 * Creates a new transport for the given hostname and port.
1361 * If host is NULL, it will default to localhost
1363 * @param host the host to connect to
1364 * @param port the port to connect to
1365 * @param family the address family to connect to
1366 * @param noncefile path to nonce file
1367 * @param error location to store reason for failure.
1368 * @returns a new transport, or #NULL on failure.
1371 _dbus_transport_new_for_tcp_socket (const char *host,
1374 const char *noncefile,
1378 DBusTransport *transport;
1381 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1383 if (!_dbus_string_init (&address))
1385 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
1392 if (!_dbus_string_append (&address, noncefile ? "nonce-tcp:" : "tcp:"))
1395 if (!_dbus_string_append (&address, "host=") ||
1396 !_dbus_string_append (&address, host))
1399 if (!_dbus_string_append (&address, ",port=") ||
1400 !_dbus_string_append (&address, port))
1403 if (family != NULL &&
1404 (!_dbus_string_append (&address, ",family=") ||
1405 !_dbus_string_append (&address, family)))
1408 if (noncefile != NULL &&
1409 (!_dbus_string_append (&address, ",noncefile=") ||
1410 !_dbus_string_append (&address, noncefile)))
1413 fd = _dbus_connect_tcp_socket_with_nonce (host, port, family, noncefile, error);
1414 if (!_dbus_socket_is_valid (fd))
1416 _DBUS_ASSERT_ERROR_IS_SET (error);
1417 _dbus_string_free (&address);
1421 _dbus_verbose ("Successfully connected to tcp socket %s:%s\n",
1424 transport = _dbus_transport_new_for_socket (fd, NULL, &address);
1425 _dbus_string_free (&address);
1426 if (transport == NULL)
1428 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
1429 _dbus_close_socket (fd, NULL);
1430 _dbus_socket_invalidate (&fd);
1436 _dbus_string_free (&address);
1437 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
1442 * Opens a TCP socket transport.
1444 * @param entry the address entry to try opening as a tcp transport.
1445 * @param transport_p return location for the opened transport
1446 * @param error error to be set
1447 * @returns result of the attempt
1449 DBusTransportOpenResult
1450 _dbus_transport_open_socket(DBusAddressEntry *entry,
1451 DBusTransport **transport_p,
1456 dbus_bool_t isNonceTcp;
1458 method = dbus_address_entry_get_method (entry);
1459 _dbus_assert (method != NULL);
1461 isTcp = strcmp (method, "tcp") == 0;
1462 isNonceTcp = strcmp (method, "nonce-tcp") == 0;
1464 if (isTcp || isNonceTcp)
1466 const char *host = dbus_address_entry_get_value (entry, "host");
1467 const char *port = dbus_address_entry_get_value (entry, "port");
1468 const char *family = dbus_address_entry_get_value (entry, "family");
1469 const char *noncefile = dbus_address_entry_get_value (entry, "noncefile");
1471 if ((isNonceTcp == TRUE) != (noncefile != NULL)) {
1472 _dbus_set_bad_address (error, method, "noncefile", NULL);
1473 return DBUS_TRANSPORT_OPEN_BAD_ADDRESS;
1478 _dbus_set_bad_address (error, method, "port", NULL);
1479 return DBUS_TRANSPORT_OPEN_BAD_ADDRESS;
1482 *transport_p = _dbus_transport_new_for_tcp_socket (host, port, family, noncefile, error);
1483 if (*transport_p == NULL)
1485 _DBUS_ASSERT_ERROR_IS_SET (error);
1486 return DBUS_TRANSPORT_OPEN_DID_NOT_CONNECT;
1490 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1491 return DBUS_TRANSPORT_OPEN_OK;
1496 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1497 return DBUS_TRANSPORT_OPEN_NOT_HANDLED;