X-Git-Url: http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=src%2Flibsystemd-bus%2Fbus-socket.c;h=0c4b6af447297fbe8f1e348f096df36d879f37d9;hb=843f737ade9c73609a2280dd3dd16e18222a5dcb;hp=60d9ad41c3bda2af39b906562f2a6b8660a72ae2;hpb=df2d202e6ed4001a21c6512c244acad5d4706c87;p=elogind.git diff --git a/src/libsystemd-bus/bus-socket.c b/src/libsystemd-bus/bus-socket.c index 60d9ad41c..0c4b6af44 100644 --- a/src/libsystemd-bus/bus-socket.c +++ b/src/libsystemd-bus/bus-socket.c @@ -38,6 +38,8 @@ #include "bus-internal.h" #include "bus-message.h" +#define SNDBUF_SIZE (8*1024*1024) + static void iovec_advance(struct iovec iov[], unsigned *idx, size_t size) { while (size > 0) { @@ -600,9 +602,8 @@ static int bus_socket_read_auth(sd_bus *b) { return 1; } -int bus_socket_setup(sd_bus *b) { +void bus_socket_setup(sd_bus *b) { int enable; - socklen_t l; assert(b); @@ -611,19 +612,23 @@ int bus_socket_setup(sd_bus *b) { enable = !b->bus_client; setsockopt(b->input_fd, SOL_SOCKET, SO_PASSCRED, &enable, sizeof(enable)); - enable = !b->bus_client && (b->hello_flags & KDBUS_HELLO_ATTACH_SECLABEL); + enable = !b->bus_client && (b->attach_flags & KDBUS_ATTACH_SECLABEL); setsockopt(b->input_fd, SOL_SOCKET, SO_PASSSEC, &enable, sizeof(enable)); - /* Increase the buffers to a MB */ - fd_inc_rcvbuf(b->input_fd, 1024*1024); - fd_inc_sndbuf(b->output_fd, 1024*1024); + /* Increase the buffers to 8 MB */ + fd_inc_rcvbuf(b->input_fd, SNDBUF_SIZE); + fd_inc_sndbuf(b->output_fd, SNDBUF_SIZE); - /* Get the peer for socketpair() sockets */ - l = sizeof(b->ucred); - if (getsockopt(b->input_fd, SOL_SOCKET, SO_PEERCRED, &b->ucred, &l) >= 0 && l >= sizeof(b->ucred)) - b->ucred_valid = b->ucred.pid > 0; + b->is_kernel = false; + b->message_version = 1; + b->message_endian = 0; +} - return 0; +static void bus_get_peercred(sd_bus *b) { + assert(b); + + /* Get the peer for socketpair() sockets */ + b->ucred_valid = getpeercred(b->input_fd, &b->ucred) >= 0; } static int bus_socket_start_auth_client(sd_bus *b) { @@ -671,6 +676,8 @@ static int bus_socket_start_auth_client(sd_bus *b) { int bus_socket_start_auth(sd_bus *b) { assert(b); + bus_get_peercred(b); + b->state = BUS_AUTHENTICATING; b->auth_timeout = now(CLOCK_MONOTONIC) + BUS_DEFAULT_TIMEOUT; @@ -701,9 +708,7 @@ int bus_socket_connect(sd_bus *b) { b->output_fd = b->input_fd; - r = bus_socket_setup(b); - if (r < 0) - return r; + bus_socket_setup(b); r = connect(b->input_fd, &b->sockaddr.sa, b->sockaddr_size); if (r < 0) { @@ -765,16 +770,15 @@ int bus_socket_exec(sd_bus *b) { close_nointr_nofail(s[1]); b->output_fd = b->input_fd = s[0]; + bus_socket_setup(b); + return bus_socket_start_auth(b); } int bus_socket_take_fd(sd_bus *b) { - int r; assert(b); - r = bus_socket_setup(b); - if (r < 0) - return r; + bus_socket_setup(b); return bus_socket_start_auth(b); } @@ -874,10 +878,10 @@ static int bus_socket_read_message_need(sd_bus *bus, size_t *need) { b = ((const uint32_t*) bus->rbuffer)[3]; e = ((const uint8_t*) bus->rbuffer)[0]; - if (e == SD_BUS_LITTLE_ENDIAN) { + if (e == BUS_LITTLE_ENDIAN) { a = le32toh(a); b = le32toh(b); - } else if (e == SD_BUS_BIG_ENDIAN) { + } else if (e == BUS_BIG_ENDIAN) { a = be32toh(a); b = be32toh(b); } else @@ -891,16 +895,19 @@ static int bus_socket_read_message_need(sd_bus *bus, size_t *need) { return 0; } -static int bus_socket_make_message(sd_bus *bus, size_t size, sd_bus_message **m) { +static int bus_socket_make_message(sd_bus *bus, size_t size) { sd_bus_message *t; void *b; int r; assert(bus); - assert(m); assert(bus->rbuffer_size >= size); assert(bus->state == BUS_RUNNING || bus->state == BUS_HELLO); + r = bus_rqueue_make_room(bus); + if (r < 0) + return r; + if (bus->rbuffer_size > size) { b = memdup((const uint8_t*) bus->rbuffer + size, bus->rbuffer_size - size); @@ -912,8 +919,8 @@ static int bus_socket_make_message(sd_bus *bus, size_t size, sd_bus_message **m) r = bus_message_from_malloc(bus, bus->rbuffer, size, bus->fds, bus->n_fds, - bus->ucred_valid ? &bus->ucred : NULL, - bus->label[0] ? bus->label : NULL, + !bus->bus_client && bus->ucred_valid ? &bus->ucred : NULL, + !bus->bus_client && bus->label[0] ? bus->label : NULL, &t); if (r < 0) { free(b); @@ -926,11 +933,12 @@ static int bus_socket_make_message(sd_bus *bus, size_t size, sd_bus_message **m) bus->fds = NULL; bus->n_fds = 0; - *m = t; + bus->rqueue[bus->rqueue_size++] = t; + return 1; } -int bus_socket_read_message(sd_bus *bus, sd_bus_message **m) { +int bus_socket_read_message(sd_bus *bus) { struct msghdr mh; struct iovec iov; ssize_t k; @@ -947,7 +955,6 @@ int bus_socket_read_message(sd_bus *bus, sd_bus_message **m) { bool handle_cmsg = false; assert(bus); - assert(m); assert(bus->state == BUS_RUNNING || bus->state == BUS_HELLO); r = bus_socket_read_message_need(bus, &need); @@ -955,7 +962,7 @@ int bus_socket_read_message(sd_bus *bus, sd_bus_message **m) { return r; if (bus->rbuffer_size >= need) - return bus_socket_make_message(bus, need, m); + return bus_socket_make_message(bus, need); b = realloc(bus->rbuffer, need); if (!b) @@ -1045,7 +1052,7 @@ int bus_socket_read_message(sd_bus *bus, sd_bus_message **m) { return r; if (bus->rbuffer_size >= need) - return bus_socket_make_message(bus, need, m); + return bus_socket_make_message(bus, need); return 1; }