X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=bus%2Fkdbus-d.c;h=a0975fdac998d6e37ff351490a12a447c992560f;hb=c1a77d2c58c78abc606f1cb7918704596ebf2bfe;hp=215378148d5eb391206c4982b7cc62896515e189;hpb=bf2f209f6a9ede80561a6f421526f7cc55f76033;p=platform%2Fupstream%2Fdbus.git diff --git a/bus/kdbus-d.c b/bus/kdbus-d.c index 2153781..a0975fd 100644 --- a/bus/kdbus-d.c +++ b/bus/kdbus-d.c @@ -1,104 +1,993 @@ -/* - * kdbus-d.c +/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */ +/* kdbus-d.c kdbus related daemon functions + * + * Copyright (C) 2013 Samsung Electronics + * + * Licensed under the Academic Free License version 2.1 * - * Created on: Sep 4, 2013 - * Author: r.pajak + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version and under the terms of the GNU + * Lesser General Public License as published by the + * Free Software Foundation; either version 2.1 of the License, or (at + * your option) any later version. * - * kdbus add-on to dbus daemon + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA * */ - +#include #include "kdbus-d.h" #include -#include #include #include "dispatch.h" +#include +#include +#include "connection.h" +#include "activation.h" +#include "services.h" +#include #include #include #include #include #include +#include -char* make_kdbus_bus(DBusBusType type, DBusError *error) +/* + * Converts string with unique name into __u64 id number. If the name is not unique, sets error. + */ +__u64 sender_name_to_id(const char* name, DBusError* error) { - struct { - struct kdbus_cmd_bus_make head; - uint64_t n_size; - uint64_t n_type; - char name[64]; - } __attribute__ ((__aligned__(8))) bus_make; + __u64 sender_id = 0; - int fdc, ret; - char *bus; + if(!strncmp(name, ":1.", 3)) /*if name is unique name it must be converted to unique id*/ + sender_id = strtoull(&name[3], NULL, 10); + else + dbus_set_error (error, DBUS_ERROR_INVALID_ARGS, "Could not convert sender of the message into kdbus unique id"); + + return sender_id; +} - /*TODO Distinguish session and system bus make*/ - /*TODO Add dbus_set_error(error, DBUS_ERROR_FAILED, "...") (?)*/ +/** + * Seeks key in rule string, and duplicates value of the key into pValue. + * Because of the duplication, pValue must be freed after use. + * + * @param rule rule to look through + * @param key key to look for + * @param pValue pointer to value of the key found + * @return length of the value string, 0 means not found + */ +static int parse_match_key(const char *rule, const char* key, char** pValue) +{ + const char* pBegin; + const char* pValueEnd; + int value_length = 0; - _dbus_verbose("Opening /dev/kdbus/control\n"); - fdc = open("/dev/kdbus/control", O_RDWR|O_CLOEXEC); - if (fdc < 0) + pBegin = strstr(rule, key); + if(pBegin) + { + pBegin += strlen(key); + pValueEnd = strchr(pBegin, '\''); + if(pValueEnd) { - _dbus_verbose("--- error %d (%m)\n", fdc); - return NULL; + value_length = pValueEnd - pBegin; + *pValue = strndup(pBegin, value_length); + if(*pValue) + _dbus_verbose ("found for key: %s value:'%s'\n", key, *pValue); } + } + return value_length; +} + +/** + * Adds a match rule to match broadcast messages going through the message bus. + * Do no affect messages addressed directly. + * + * The "rule" argument is the string form of a match rule. + * + * Only part of the dbus's matching capabilities is implemented in kdbus now, because of different mechanism. + * Current mapping: + * interface match key mapped to bloom + * sender match key mapped to src_name + * + * @param transport transport + * @param id id of connection for which the rule is to be added + * @param rule textual form of match rule + */ +dbus_bool_t add_match_kdbus (DBusTransport* transport, __u64 id, const char *rule) +{ + struct kdbus_cmd_match* pCmd_match; + struct kdbus_item *pItem; + __u64 src_id = KDBUS_MATCH_SRC_ID_ANY; + uint64_t size; + int name_size; + char* pName = NULL; + char* pInterface = NULL; + dbus_bool_t ret_value = FALSE; + int fd; + __u64 bloom_size; - memset(&bus_make, 0, sizeof(bus_make)); - bus_make.head.bloom_size = 64; - bus_make.head.flags = KDBUS_MAKE_ACCESS_WORLD; + if(!_dbus_transport_get_socket_fd(transport, &fd)) + return FALSE; - snprintf(bus_make.name, sizeof(bus_make.name), "%u-kdbus", getuid()); - bus_make.n_type = KDBUS_MAKE_NAME; - bus_make.n_size = KDBUS_PART_HEADER_SIZE + strlen(bus_make.name) + 1; - bus_make.head.size = sizeof(struct kdbus_cmd_bus_make) + bus_make.n_size; + bloom_size = dbus_transport_get_bloom_size(transport); - _dbus_verbose("Creating bus '%s'\n", bus_make.name); - ret = ioctl(fdc, KDBUS_CMD_BUS_MAKE, &bus_make); - if (ret) + /*parsing rule and calculating size of command*/ + size = sizeof(struct kdbus_cmd_match); + if(parse_match_key(rule, "interface='", &pInterface)) /*actual size is not important for interface because bloom size is defined by bus*/ + size += KDBUS_ITEM_HEADER_SIZE + bloom_size; + name_size = parse_match_key(rule, "sender='", &pName); + if(name_size) + { + if(!strncmp(pName, ":1.", 3)) /*if name is unique name it must be converted to unique id*/ { - _dbus_verbose("--- error %d (%m)\n", ret); - return NULL; + src_id = strtoull(&pName[3], NULL, 10); + free(pName); + pName = NULL; } + else + size += KDBUS_ITEM_SIZE(name_size + 1); //well known name + } + + pCmd_match = alloca(size); + if(pCmd_match == NULL) + goto out; - if (asprintf(&bus, "kdbus:path=/dev/kdbus/%s/bus", bus_make.name) < 0) + pCmd_match->id = id; + pCmd_match->cookie = id; + pCmd_match->size = size; + pCmd_match->src_id = src_id; + + pItem = pCmd_match->items; + if(pName) + { + pItem->type = KDBUS_MATCH_SRC_NAME; + pItem->size = KDBUS_ITEM_HEADER_SIZE + name_size + 1; + memcpy(pItem->str, pName, strlen(pName) + 1); + pItem = KDBUS_PART_NEXT(pItem); + } + if(pInterface) + { + pItem->type = KDBUS_MATCH_BLOOM; + pItem->size = KDBUS_ITEM_HEADER_SIZE + bloom_size; + strncpy(pItem->data, pInterface, bloom_size); + } + + if(ioctl(fd, KDBUS_CMD_MATCH_ADD, pCmd_match)) + _dbus_verbose("Failed adding match bus rule %s,\nerror: %d, %m\n", rule, errno); + else + { + _dbus_verbose("Added match bus rule %s for id:%llu\n", rule, (unsigned long long)id); + ret_value = TRUE; + } + +out: + if(pName) + free(pName); + if(pInterface) + free(pInterface); + return ret_value; +} + +/** + * Opposing to dbus, in kdbus removes all match rules with given + * cookie, which in this implementation is equal to uniqe id. + * + * @param transport transport + * @param id connection id for which rules are to be removed + */ +dbus_bool_t remove_match_kdbus (DBusTransport* transport, __u64 id) +{ + struct kdbus_cmd_match __attribute__ ((__aligned__(8))) cmd; + int fd; + + if(!_dbus_transport_get_socket_fd(transport, &fd)) + return FALSE; + + cmd.cookie = id; + cmd.id = id; + cmd.size = sizeof(struct kdbus_cmd_match); + + if(ioctl(fd, KDBUS_CMD_MATCH_REMOVE, &cmd)) + { + _dbus_verbose("Failed removing match rule for id: %llu; error: %d, %m\n", (unsigned long long)id, errno); + return FALSE; + } + else + { + _dbus_verbose("Match rule removed correctly.\n"); + return TRUE; + } +} + +/* + * Creates kdbus bus of given type. + */ +char* make_kdbus_bus(DBusBusType type, const char* address, DBusError *error) +{ + // TODO Function alloca() used. In upstream there was a patch proposing to + // replace alloca() with malloc() to assure memory alignment. If there will be + // suggestion to use malloc instead of alloca this function has to be modified + struct kdbus_cmd_make *bus_make; + struct kdbus_item *item; + __u64 name_size, bus_make_size; + int fdc, ret; + char *addr_value = NULL; + char *bus = NULL; + char *name = NULL; + + if(type == DBUS_BUS_SYSTEM) + name_size = snprintf(name, 0, "%u-kdbus-%s", getuid(), "system") + 1; + else if(type == DBUS_BUS_SESSION) + name_size = snprintf(name, 0, "%u-kdbus", getuid()) + 1; + else + name_size = snprintf(name, 0, "%u-kdbus-%u", getuid(), getpid()) + 1; + + name = alloca(name_size); + if (!name) + { + return NULL; + } + + bus_make_size = sizeof(struct kdbus_cmd_make) + KDBUS_ITEM_SIZE(name_size) + KDBUS_ITEM_SIZE(sizeof(__u64)); + bus_make = alloca(bus_make_size); + if (!bus_make) { - BUS_SET_OOM (error); - return NULL; + return NULL; } - _dbus_verbose("Return value '%s'\n", bus); - return bus; + bus_make->size = bus_make_size; +#ifdef POLICY_TO_KDBUS + bus_make->flags = KDBUS_MAKE_ACCESS_WORLD; +#else + bus_make->flags = KDBUS_MAKE_ACCESS_WORLD | KDBUS_MAKE_POLICY_OPEN; +#endif + item = bus_make->items; + + item->type = KDBUS_ITEM_MAKE_NAME; + item->size = KDBUS_ITEM_HEADER_SIZE + name_size; + if(type == DBUS_BUS_SYSTEM) + sprintf(name, "%u-kdbus-%s", getuid(), "system"); + else if(type == DBUS_BUS_SESSION) + sprintf(name, "%u-kdbus", getuid()); + else + sprintf(name, "%u-kdbus-%u", getuid(), getpid()); + memcpy((bus_make->items)->str, name, name_size); + + item = KDBUS_PART_NEXT(item); + item->type = KDBUS_ITEM_BLOOM_SIZE; + item->size = KDBUS_ITEM_HEADER_SIZE + sizeof(__u64); + item->data64[0] = 64; + +#ifdef KDBUS_FOR_SBB + addr_value = strchr(address, ':') + 1; + if(*addr_value) + { + if(!strcmp(addr_value, "sbb")) + bus_make->flags |= KDBUS_MAKE_SBB_OFFSET; + else + { + dbus_set_error_const(error, DBUS_ERROR_BAD_ADDRESS, "Invalid address parameter."); + return NULL; + } + } +#endif + + _dbus_verbose("Opening /dev/kdbus/control\n"); + fdc = open("/dev/kdbus/control", O_RDWR|O_CLOEXEC); + if (fdc < 0) + { + _dbus_verbose("--- error %d (%m)\n", fdc); + dbus_set_error(error, DBUS_ERROR_FAILED, "Opening /dev/kdbus/control failed: %d (%m)", fdc); + return NULL; + } + + _dbus_verbose("Creating bus '%s'\n", (bus_make->items[0]).str); + ret = ioctl(fdc, KDBUS_CMD_BUS_MAKE, bus_make); + if (ret) + { + _dbus_verbose("--- error %d (%m)\n", errno); + dbus_set_error(error, DBUS_ERROR_FAILED, "Creating bus '%s' failed: %d (%m)", + (bus_make->items[0]).str, errno); + return NULL; + } + + if (asprintf(&bus, "kdbus:path=/dev/kdbus/%s/bus", (bus_make->items[0]).str) < 0) + { + BUS_SET_OOM (error); + return NULL; + } + + _dbus_verbose("Return value '%s'\n", bus); + return bus; } +/* + * Minimal server init needed by context to go further. + */ DBusServer* empty_server_init(char* address) { return dbus_server_init_mini(address); } +static dbus_bool_t add_matches_for_kdbus_broadcasts(DBusConnection* connection) +{ + struct kdbus_cmd_match* pCmd_match; + struct kdbus_item *pItem; + uint64_t size; + int fd; + DBusTransport *transport; + + transport = dbus_connection_get_transport(connection); + + if(!_dbus_transport_get_socket_fd(transport, &fd)) + { + errno = EPERM; + return FALSE; + } + + size = sizeof(struct kdbus_cmd_match); + size += KDBUS_ITEM_SIZE(1)*3 + KDBUS_ITEM_SIZE(sizeof(__u64))*2; /*3 name related items plus 2 id related items*/ + + pCmd_match = alloca(size); + if(pCmd_match == NULL) + { + errno = ENOMEM; + return FALSE; + } + + pCmd_match->id = 0; + pCmd_match->cookie = 1; + pCmd_match->size = size; + pCmd_match->src_id = 0; + + pItem = pCmd_match->items; + pItem->type = KDBUS_MATCH_NAME_CHANGE; + pItem->size = KDBUS_ITEM_HEADER_SIZE + 1; + pItem = KDBUS_PART_NEXT(pItem); + pItem->type = KDBUS_MATCH_NAME_ADD; + pItem->size = KDBUS_ITEM_HEADER_SIZE + 1; + pItem = KDBUS_PART_NEXT(pItem); + pItem->type = KDBUS_MATCH_NAME_REMOVE; + pItem->size = KDBUS_ITEM_HEADER_SIZE + 1; + pItem = KDBUS_PART_NEXT(pItem); + pItem->type = KDBUS_MATCH_ID_ADD; + pItem->size = KDBUS_ITEM_HEADER_SIZE + sizeof(__u64); + pItem->id = KDBUS_MATCH_SRC_ID_ANY; + pItem = KDBUS_PART_NEXT(pItem); + pItem->type = KDBUS_MATCH_ID_REMOVE; + pItem->size = KDBUS_ITEM_HEADER_SIZE + sizeof(__u64); + pItem->id = KDBUS_MATCH_SRC_ID_ANY; + + if(ioctl(fd, KDBUS_CMD_MATCH_ADD, pCmd_match)) + { + _dbus_verbose("Failed adding match rule for daemon, error: %d, %m\n", errno); + return FALSE; + } + + _dbus_verbose("Added match rule for daemon correctly.\n"); + return TRUE; +} + +/* + * Connects daemon to bus created by him and adds matches for "system" broadcasts. + * Do not requests org.freedesktop.DBus name, because it's to early + * (some structures of BusContext are not ready yet). + */ DBusConnection* daemon_as_client(DBusBusType type, char* address, DBusError *error) { - DBusConnection* connection; + DBusConnection* connection; + + dbus_bus_set_bus_connection_address(type, address); + + connection = dbus_bus_get_private(type, error); /*todo possibly could be optimised by using lower functions*/ + if(connection == NULL) + return NULL; + + if(!add_matches_for_kdbus_broadcasts(connection)) + { + dbus_set_error (error, _dbus_error_from_errno (errno), "Could not add match for daemon, %s", _dbus_strerror_from_errno ()); + goto failed; + } + + if(dbus_error_is_set(error)) + { + failed: + _dbus_connection_close_possibly_shared (connection); + dbus_connection_unref (connection); + connection = NULL; + } + else + _dbus_verbose ("Daemon connected as kdbus client.\n"); + + return connection; +} + +/* + * Asks bus for org.freedesktop.DBus well-known name. + */ +dbus_bool_t register_daemon_name(DBusConnection* connection) +{ + DBusString daemon_name; + dbus_bool_t retval = FALSE; + BusTransaction *transaction; - dbus_bus_set_bus_connection_address(type, address); + _dbus_string_init_const(&daemon_name, DBUS_SERVICE_DBUS); +#ifdef POLICY_TO_KDBUS + if(!register_kdbus_policy(DBUS_SERVICE_DBUS, dbus_connection_get_transport(connection), geteuid())) + return FALSE; +#endif - connection = dbus_bus_get(type, error); - if(connection == NULL) - return NULL; + if(kdbus_request_name(connection, &daemon_name, 0, 0) != DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER) + return FALSE; - if(dbus_bus_request_name(connection, DBUS_SERVICE_DBUS, 0, error) != DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER) - goto failed; + transaction = bus_transaction_new (bus_connection_get_context(connection)); + if (transaction == NULL) + { + kdbus_release_name(connection, &daemon_name, 0); + goto out; + } + + if(!bus_registry_ensure (bus_connection_get_registry (connection), &daemon_name, connection, 0, transaction, NULL)) + { + kdbus_release_name(connection, &daemon_name, 0); + goto out; + } + + retval = TRUE; - dbus_bus_add_match(connection, "type='signal', member='NameAcquired'", error); - dbus_bus_add_match(connection, "type='signal', member='NameLost'", error); +out: + if(retval) + bus_transaction_execute_and_free(transaction); + else + bus_transaction_cancel_and_free(transaction); + + return retval; +} + +dbus_uint32_t kdbus_request_name(DBusConnection* connection, const DBusString *service_name, dbus_uint32_t flags, __u64 sender_id) +{ + int fd; + + _dbus_transport_get_socket_fd(dbus_connection_get_transport(connection), &fd); + + return request_kdbus_name(fd, _dbus_string_get_const_data(service_name), flags, sender_id); +} + +dbus_uint32_t kdbus_release_name(DBusConnection* connection, const DBusString *service_name, __u64 sender_id) +{ + int fd; + + _dbus_transport_get_socket_fd(dbus_connection_get_transport(connection), &fd); + + return release_kdbus_name(fd, _dbus_string_get_const_data(service_name), sender_id); +} + +/* + * Asks kdbus for well-known names registered on the bus + */ +dbus_bool_t kdbus_list_services (DBusConnection* connection, char ***listp, int *array_len) +{ + int fd; + struct kdbus_cmd_name_list __attribute__ ((__aligned__(8))) cmd; + struct kdbus_name_list *name_list; + struct kdbus_cmd_name *name; + DBusTransport *transport = dbus_connection_get_transport(connection); + dbus_bool_t ret_val = FALSE; + char** list; + int list_len = 0; + int i = 0; + int j; + + if(!_dbus_transport_get_socket_fd(transport, &fd)) + return FALSE; + + cmd.flags = KDBUS_NAME_LIST_NAMES | KDBUS_NAME_LIST_UNIQUE; + +again: + if(ioctl(fd, KDBUS_CMD_NAME_LIST, &cmd)) + { + if(errno == EINTR) + goto again; + else + { + _dbus_verbose("kdbus error asking for name list: err %d (%m)\n",errno); + return FALSE; + } + } + + name_list = (struct kdbus_name_list *)((char*)dbus_transport_get_pool_pointer(transport) + cmd.offset); + + for (name = name_list->names; (uint8_t *)(name) < (uint8_t *)(name_list) + name_list->size; name = KDBUS_PART_NEXT(name)) + list_len++; + + _dbus_verbose ("List len: %d\n", list_len); + + list = malloc(sizeof(char*) * (list_len + 1)); + if(list == NULL) + goto out; + + for (name = name_list->names; (uint8_t *)(name) < (uint8_t *)(name_list) + name_list->size; name = KDBUS_PART_NEXT(name)) + { + if(name->size > sizeof(struct kdbus_cmd_name) ) + { + list[i] = strdup(name->name); + if(list[i] == NULL) + goto out; + } + else + { + list[i] = malloc(snprintf(list[i], 0, ":1.%llu0", (unsigned long long)name->id)); + if(list[i] == NULL) + goto out; + sprintf(list[i], ":1.%llu", (unsigned long long int)name->id); + } + _dbus_verbose ("Name %d: %s\n", i, list[i]); + ++i; + } + + list[i] = NULL; + *array_len = list_len; + *listp = list; + ret_val = TRUE; + +out: + if (ioctl(fd, KDBUS_CMD_FREE, &cmd.offset) < 0) + { + if(errno == EINTR) + goto out; + _dbus_verbose("kdbus error freeing pool: %d (%m)\n", errno); + ret_val = FALSE; + } + if(ret_val == FALSE) + { + for(j=0; jsize = cmd_size; + pCmd->id = 0; + memcpy(pCmd->name, name, name_length); + + _dbus_verbose ("Asking for queued owners of %s\n", pCmd->name); + + _dbus_transport_get_socket_fd(transport, &fd); + + again: + if(ioctl(fd, KDBUS_CMD_NAME_LIST_QUEUED, pCmd)) + { + if(errno == EINTR) + goto again; + else if(errno == ESRCH) + { + dbus_set_error (error, DBUS_ERROR_NAME_HAS_NO_OWNER, + "Could not get owners of name '%s': no such name", name); + return FALSE; + } + else + { + _dbus_verbose("kdbus error asking for queued owners list: err %d (%m)\n",errno); + goto out; + } + } + + name_list = (struct kdbus_name_list *)((char*)dbus_transport_get_pool_pointer(transport) + pCmd->offset); + + for (owner = name_list->names; (uint8_t *)(owner) < (uint8_t *)(name_list) + name_list->size; owner = KDBUS_PART_NEXT(owner)) + { + char *uname = NULL; + + _dbus_verbose ("Got queued owner id: %llu\n", (unsigned long long)owner->id); + uname = malloc(snprintf(uname, 0, ":1.%llu0", (unsigned long long)owner->id)); + if(uname == NULL) + goto out; + sprintf(uname, ":1.%llu", (unsigned long long int)owner->id); + if (!_dbus_list_append (return_list, uname)) + goto out; + } + + ret_val = TRUE; + + out: + if (ioctl(fd, KDBUS_CMD_FREE, &pCmd->offset) < 0) + { + if(errno == EINTR) + goto out; + _dbus_verbose("kdbus error freeing pool: %d (%m)\n", errno); + ret_val = FALSE; + } + if(ret_val == FALSE) + { + DBusList *link; + + dbus_set_error (error, _dbus_error_from_errno (errno), + "Failed to list queued owners of \"%s\": %s", + name, _dbus_strerror (errno)); + + link = _dbus_list_get_first_link (return_list); + while (link != NULL) + { + DBusList *next = _dbus_list_get_next_link (return_list, link); + + if(link->data != NULL) + free(link->data); + + _dbus_list_free_link (link); + link = next; + } + } + + return ret_val; +} + +/* + * Register match rule in kdbus on behalf of sender of the message + */ +dbus_bool_t kdbus_add_match_rule (DBusConnection* connection, DBusMessage* message, const char* text, DBusError* error) +{ + __u64 sender_id; + + sender_id = sender_name_to_id(dbus_message_get_sender(message), error); if(dbus_error_is_set(error)) + return FALSE; + + if(!add_match_kdbus (dbus_connection_get_transport(connection), sender_id, text)) { -failed: - _dbus_connection_close_possibly_shared (connection); - dbus_connection_unref (connection); - connection = NULL; + dbus_set_error (error, _dbus_error_from_errno (errno), "Could not add match for id:%llu, %s", + sender_id, _dbus_strerror_from_errno ()); + return FALSE; + } + + return TRUE; +} + +/* + * Removes match rule in kdbus on behalf of sender of the message + */ +dbus_bool_t kdbus_remove_match (DBusConnection* connection, DBusMessage* message, DBusError* error) +{ + __u64 sender_id; + + sender_id = sender_name_to_id(dbus_message_get_sender(message), error); + if(dbus_error_is_set(error)) + return FALSE; + + if(!remove_match_kdbus (dbus_connection_get_transport(connection), sender_id)) + { + dbus_set_error (error, _dbus_error_from_errno (errno), "Could not remove match rules for id:%llu", sender_id); + return FALSE; + } + + return TRUE; +} + +int kdbus_get_name_owner(DBusConnection* connection, const char* name, char* owner) +{ + int ret; + struct nameInfo info; + + ret = kdbus_NameQuery(name, dbus_connection_get_transport(connection), &info); + if(ret == 0) //unique id of the name + { + sprintf(owner, ":1.%llu", (unsigned long long int)info.uniqueId); + _dbus_verbose("Unique name discovered:%s\n", owner); + } + else if((ret != -ENOENT) && (ret != -ENXIO)) + _dbus_verbose("kdbus error sending name query: err %d (%m)\n", ret); + + return ret; +} + +/* + * Asks kdbus for selinux_security_context of the owner of the name given in the message + */ +dbus_bool_t kdbus_get_connection_unix_selinux_security_context(DBusConnection* connection, DBusMessage* message, DBusMessage* reply, DBusError* error) +{ + char* name = NULL; + struct nameInfo info; + int inter_ret; + dbus_bool_t ret = FALSE; + + dbus_message_get_args(message, NULL, DBUS_TYPE_STRING, &name, DBUS_TYPE_INVALID); + inter_ret = kdbus_NameQuery(name, dbus_connection_get_transport(connection), &info); + if((inter_ret == -ENOENT) || (inter_ret == -ENXIO)) //name has no owner + dbus_set_error (error, DBUS_ERROR_FAILED, "Could not get security context of name '%s': no such name", name); + else if(inter_ret < 0) + { + _dbus_verbose("kdbus error determining security context: err %d (%m)\n", errno); + dbus_set_error (error, DBUS_ERROR_FAILED, "Could not determine security context for '%s'", name); } else - _dbus_verbose ("Daemon connected as kdbus client.\n"); + { + if (!dbus_message_append_args (reply, DBUS_TYPE_ARRAY, DBUS_TYPE_BYTE, &info.sec_label, info.sec_label_len, DBUS_TYPE_INVALID)) + { + _DBUS_SET_OOM (error); + return FALSE; + } + ret = TRUE; + } + + return ret; +} + +/* + * Create connection structure for given name. It is needed to control starters - activatable services + * and for ListQueued method (as long as kdbus is not supporting it). This connections don't have it's own + * fd so it is set up on the basis of daemon's transport. Functionality of such connection is limited. + */ +DBusConnection* create_phantom_connection(DBusConnection* connection, const char* name, DBusError* error) +{ + DBusConnection *phantom_connection; + DBusString Sname; + + _dbus_string_init_const(&Sname, name); + + phantom_connection = _dbus_connection_new_for_used_transport (dbus_connection_get_transport(connection)); + if(phantom_connection == NULL) + return FALSE; + if(!bus_connections_setup_connection(bus_connection_get_connections(connection), phantom_connection)) + { + dbus_connection_unref_phantom(phantom_connection); + phantom_connection = NULL; + dbus_set_error (error, DBUS_ERROR_FAILED , "Name \"%s\" could not be acquired", name); + goto out; + } + dbus_bus_set_unique_name(phantom_connection, name); + if(!bus_connection_complete(phantom_connection, &Sname, error)) + { + bus_connection_disconnected(phantom_connection); + phantom_connection = NULL; + goto out; + } + + _dbus_verbose ("Created phantom connection for %s\n", bus_connection_get_name(phantom_connection)); + +out: + return phantom_connection; +} + +/* + * Registers activatable services as kdbus starters. + */ +dbus_bool_t register_kdbus_starters(DBusConnection* connection) +{ + int i,j, len; + char **services; + dbus_bool_t retval = FALSE; + int fd; + BusTransaction *transaction; + DBusString name; + DBusTransport* transport; + + transaction = bus_transaction_new (bus_connection_get_context(connection)); + if (transaction == NULL) + return FALSE; + + if (!bus_activation_list_services (bus_connection_get_activation (connection), &services, &len)) + return FALSE; + + transport = dbus_connection_get_transport(connection); + + if(!_dbus_transport_get_socket_fd (transport, &fd)) + return FALSE; + + _dbus_string_init(&name); + + for(i=0; idata; + if(service == NULL) + goto out; + + ret = release_kdbus_name(fd, bus_service_get_name(service), 0); + + if (ret == DBUS_RELEASE_NAME_REPLY_RELEASED) + { + if(!bus_service_remove_owner(service, connection, transaction, NULL)) + _dbus_verbose ("Unable to remove\n"); + } + else if(ret < 0) + goto out; + + link = _dbus_list_get_next_link (services_old, link); + } + + if(!register_kdbus_starters(connection)) + { + _dbus_verbose ("Registering kdbus starters for dbus activatable names failed!\n"); + goto out; + } + retval = TRUE; + +out: + if(retval) + bus_transaction_execute_and_free(transaction); + else + bus_transaction_cancel_and_free(transaction); + + return retval; +} + +/* + * Analyzes system broadcasts about id and name changes. + * Basing on this it sends NameAcquired and NameLost signals and clear phantom connections. + */ +void handleNameOwnerChanged(DBusMessage *msg, BusTransaction *transaction, DBusConnection *connection) +{ + const char *name, *old, *new; + + if(!dbus_message_get_args(msg, NULL, DBUS_TYPE_STRING, &name, DBUS_TYPE_STRING, &old, DBUS_TYPE_STRING, &new, DBUS_TYPE_INVALID)) + { + _dbus_verbose ("Couldn't get args of NameOwnerChanged signal.\n");//, error.message); + return; + } + + _dbus_verbose ("Got NameOwnerChanged signal:\nName: %s\nOld: %s\nNew: %s\n", name, old, new); + + if(!strncmp(name, ":1.", 3))/*if it starts from :1. it is unique name - this might be IdRemoved info*/ + { + if(!strcmp(name, old)) //yes it is - someone has disconnected + { + DBusConnection* conn; + + conn = bus_connections_find_conn_by_name(bus_connection_get_connections(connection), name); + if(conn) + bus_connection_disconnected(conn); + } + } + else //it is well-known name + { + if((*old != 0) && (strcmp(old, bus_connection_get_name(connection)))) + { + DBusMessage *message; + + if(bus_connections_find_conn_by_name(bus_connection_get_connections(connection), old) == NULL) + goto next; + + _dbus_verbose ("Owner '%s' lost name '%s'. Sending NameLost.\n", old, name); + + message = dbus_message_new_signal (DBUS_PATH_DBUS, DBUS_INTERFACE_DBUS, "NameLost"); + if (message == NULL) + goto next; + + if (!dbus_message_set_destination (message, old) || !dbus_message_append_args (message, + DBUS_TYPE_STRING, &name, + DBUS_TYPE_INVALID)) + { + dbus_message_unref (message); + goto next; + } + + bus_transaction_send_from_driver (transaction, connection, message); + dbus_message_unref (message); + } + next: + if((*new != 0) && (strcmp(new, bus_connection_get_name(connection)))) + { + DBusMessage *message; + + _dbus_verbose ("Owner '%s' acquired name '%s'. Sending NameAcquired.\n", new, name); + + message = dbus_message_new_signal (DBUS_PATH_DBUS, DBUS_INTERFACE_DBUS, "NameAcquired"); + if (message == NULL) + return; + + if (!dbus_message_set_destination (message, new) || !dbus_message_append_args (message, + DBUS_TYPE_STRING, &name, + DBUS_TYPE_INVALID)) + { + dbus_message_unref (message); + return; + } + + bus_transaction_send_from_driver (transaction, connection, message); + dbus_message_unref (message); + } + } - return connection; + if(bus_transaction_send(transaction, connection, msg)) + _dbus_verbose ("NameOwnerChanged sent\n"); + else + _dbus_verbose ("Sending NameOwnerChanged failed\n"); }