chiark / gitweb /
0fff698e9507424a3b50bc707073e0642d1baa13
[elogind.git] / src / bus-driverd / bus-driverd.c
1 /***
2   This file is part of systemd.
3
4   Copyright 2013 Daniel Mack
5
6   systemd is free software; you can redistribute it and/or modify it
7   under the terms of the GNU Lesser General Public License as published by
8   the Free Software Foundation; either version 2.1 of the License, or
9   (at your option) any later version.
10
11   systemd is distributed in the hope that it will be useful, but
12   WITHOUT ANY WARRANTY; without even the implied warranty of
13   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14   Lesser General Public License for more details.
15
16   You should have received a copy of the GNU Lesser General Public License
17   along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <stdlib.h>
21 #include <stdbool.h>
22 #include <unistd.h>
23 #include <getopt.h>
24 #include <locale.h>
25 #include <string.h>
26 #include <poll.h>
27 #include <netdb.h>
28 #include <sys/socket.h>
29 #include <sys/un.h>
30 #include <sys/timex.h>
31 #include <sys/utsname.h>
32 #include <unistd.h>
33
34 #include "kdbus.h"
35 #include "sd-bus.h"
36 #include "bus-internal.h"
37 #include "sd-daemon.h"
38 #include "sd-event.h"
39 #include "event-util.h"
40 #include "bus-util.h"
41 #include "bus-error.h"
42 #include "bus-message.h"
43 #include "bus-kernel.h"
44 #include "socket-util.h"
45 #include "util.h"
46 #include "build.h"
47 #include "strv.h"
48 #include "sd-id128.h"
49 #include "async.h"
50 #include "hashmap.h"
51 #include "def.h"
52 #include "unit-name.h"
53 #include "bus-control.h"
54
55 #define CLIENTS_MAX 1024
56 #define MATCHES_MAX 1024
57
58 typedef struct Match Match;
59 typedef struct Client Client;
60 typedef struct Context Context;
61
62 struct Match {
63         Client *client;
64         char *match;
65         uint64_t cookie;
66         LIST_FIELDS(Match, matches);
67 };
68
69 struct Client {
70         Context *context;
71         uint64_t id;
72         uint64_t next_cookie;
73         Hashmap *matches;
74         unsigned n_matches;
75         char *watch;
76 };
77
78 struct Context {
79         sd_bus *bus;
80         sd_event *event;
81         Hashmap *clients;
82 };
83
84 static void match_free(Match *m) {
85
86         if (!m)
87                 return;
88
89         if (m->client) {
90                 Match *first;
91
92                 first = hashmap_get(m->client->matches, m->match);
93                 LIST_REMOVE(matches, first, m);
94                 if (first)
95                         assert_se(hashmap_replace(m->client->matches, m->match, first) >= 0);
96                 else
97                         hashmap_remove(m->client->matches, m->match);
98
99                 m->client->n_matches--;
100         }
101
102         free(m->match);
103         free(m);
104 }
105
106 static int match_new(Client *c, struct bus_match_component *components, unsigned n_components, Match **_m) {
107         Match *m, *first;
108         int r;
109
110         assert(c);
111         assert(_m);
112
113         r = hashmap_ensure_allocated(&c->matches, string_hash_func, string_compare_func);
114         if (r < 0)
115                 return r;
116
117         m = new0(Match, 1);
118         if (!m)
119                 return -ENOMEM;
120
121         m->match = bus_match_to_string(components, n_components);
122         if (!m->match) {
123                 r = -ENOMEM;
124                 goto fail;
125         }
126
127         m->cookie = ++c->next_cookie;
128
129         first = hashmap_get(c->matches, m->match);
130         LIST_PREPEND(matches, first, m);
131         r = hashmap_replace(c->matches, m->match, first);
132         if (r < 0) {
133                 LIST_REMOVE(matches, first, m);
134                 goto fail;
135         }
136
137         m->client = c;
138         c->n_matches++;
139
140         *_m = m;
141         m = NULL;
142
143         return 0;
144
145 fail:
146         match_free(m);
147         return r;
148 }
149
150 static int on_name_owner_changed(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error);
151
152 static void client_free(Client *c) {
153         Match *m;
154
155         if (!c)
156                 return;
157
158         if (c->context) {
159                 if (c->watch)
160                         sd_bus_remove_match(c->context->bus, c->watch, on_name_owner_changed, c);
161
162                 assert_se(hashmap_remove(c->context->clients, &c->id) == c);
163         }
164
165         while ((m = hashmap_first(c->matches)))
166                 match_free(m);
167
168         hashmap_free(c->matches);
169         free(c->watch);
170
171         free(c);
172 }
173
174 static int on_name_owner_changed(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
175         Client *c = userdata;
176
177         assert(bus);
178         assert(m);
179
180         client_free(c);
181         return 0;
182 }
183
184 static int client_acquire(Context *context, uint64_t id, Client **_c) {
185         char *watch = NULL;
186         Client *c;
187         int r;
188
189         assert(context);
190         assert(_c);
191
192         c = hashmap_get(context->clients, &id);
193         if (c) {
194                 *_c = c;
195                 return 0;
196         }
197
198         if (hashmap_size(context->clients) >= CLIENTS_MAX)
199                 return -ENOBUFS;
200
201         r = hashmap_ensure_allocated(&context->clients, uint64_hash_func, uint64_compare_func);
202         if (r < 0)
203                 return r;
204
205         c = new0(Client, 1);
206         if (!c)
207                 return -ENOMEM;
208
209         c->id = id;
210
211         r = hashmap_put(context->clients, &c->id, c);
212         if (r < 0)
213                 goto fail;
214
215         c->context = context;
216
217         if (asprintf(&watch,
218                      "type='signal',"
219                      "sender='org.freedesktop.DBus',"
220                      "path='/org/freedesktop/DBus',"
221                      "interface='org.freedesktop.DBus',"
222                      "member='NameOwnerChanged',"
223                      "arg0=':1.%llu'", (unsigned long long) id) < 0) {
224                 r = -ENOMEM;
225                 goto fail;
226         }
227
228         r = sd_bus_add_match(context->bus, watch, on_name_owner_changed, c);
229         if (r < 0) {
230                 free(watch);
231                 goto fail;
232         }
233
234         c->watch = watch;
235
236         *_c = c;
237         return 0;
238
239 fail:
240         client_free(c);
241         return r;
242 }
243
244 static int driver_add_match(sd_bus *bus, sd_bus_message *message, void *userdata, sd_bus_error *error) {
245
246         struct bus_match_component *components = NULL;
247         Context *context = userdata;
248         unsigned n_components = 0;
249         Match *m = NULL;
250         Client *c = NULL;
251         char *arg0;
252         uint64_t id;
253         int r;
254
255         assert(bus);
256         assert(message);
257         assert(context);
258
259         r = sd_bus_message_read(message, "s", &arg0);
260         if (r < 0)
261                 return r;
262
263         r = bus_kernel_parse_unique_name(message->sender, &id);
264         if (r < 0)
265                 return r;
266
267         r = client_acquire(context, id, &c);
268         if (r == -ENOBUFS)
269                 return sd_bus_error_setf(error, SD_BUS_ERROR_LIMITS_EXCEEDED, "Reached limit of %u clients", CLIENTS_MAX);
270         if (r < 0)
271                 return r;
272
273         if (c->n_matches >= MATCHES_MAX) {
274                 r = sd_bus_error_setf(error, SD_BUS_ERROR_LIMITS_EXCEEDED, "Reached limit of %u matches per client", MATCHES_MAX);
275                 goto fail;
276         }
277
278         r = bus_match_parse(arg0, &components, &n_components);
279         if (r < 0) {
280                 r = sd_bus_error_setf(error, SD_BUS_ERROR_MATCH_RULE_INVALID, "Match rule \"%s\" is not valid", arg0);
281                 goto fail;
282         }
283
284         r = match_new(c, components, n_components, &m);
285         if (r < 0)
286                 goto fail;
287
288         r = bus_add_match_internal_kernel(bus, id, components, n_components, m->cookie);
289         if (r < 0)
290                 goto fail;
291
292         bus_match_parse_free(components, n_components);
293
294         return sd_bus_reply_method_return(message, NULL);
295
296 fail:
297         bus_match_parse_free(components, n_components);
298
299         match_free(m);
300
301         if (c->n_matches <= 0)
302                 client_free(c);
303
304         return r;
305 }
306
307 static int driver_remove_match(sd_bus *bus, sd_bus_message *message, void *userdata, sd_bus_error *error) {
308
309         struct bus_match_component *components = NULL;
310         _cleanup_free_ char *normalized = NULL;
311         Context *context = userdata;
312         unsigned n_components = 0;
313         Client *c = NULL;
314         Match *m = NULL;
315         char *arg0;
316         uint64_t id;
317         int r;
318
319         assert(bus);
320         assert(message);
321         assert(context);
322
323         r = sd_bus_message_read(message, "s", &arg0);
324         if (r < 0)
325                 return r;
326
327         r = bus_kernel_parse_unique_name(message->sender, &id);
328         if (r < 0)
329                 return r;
330
331         c = hashmap_get(context->clients, &id);
332         if (!c)
333                 return sd_bus_error_setf(error, SD_BUS_ERROR_MATCH_RULE_NOT_FOUND, "You have not registered any matches.");
334
335         r = bus_match_parse(arg0, &components, &n_components);
336         if (r < 0) {
337                 r = sd_bus_error_setf(error, SD_BUS_ERROR_MATCH_RULE_INVALID, "Match rule \"%s\" is not valid", arg0);
338                 goto finish;
339         }
340
341         normalized = bus_match_to_string(components, n_components);
342         if (!normalized) {
343                 r = -ENOMEM;
344                 goto finish;
345         }
346
347         m = hashmap_get(c->matches, normalized);
348         if (!m) {
349                 r = sd_bus_error_setf(error, SD_BUS_ERROR_MATCH_RULE_NOT_FOUND, "Match rule \"%s\" not found.");
350                 goto finish;
351         }
352
353         bus_remove_match_internal_kernel(bus, id, m->cookie);
354         match_free(m);
355
356         r = sd_bus_reply_method_return(message, NULL);
357
358 finish:
359         bus_match_parse_free(components, n_components);
360
361         if (c->n_matches <= 0)
362                 client_free(c);
363
364         return r;
365 }
366
367 static int driver_get_security_ctx(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
368         _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
369         _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
370         char *arg0;
371         int r;
372
373         r = sd_bus_message_read(m, "s", &arg0);
374         if (r < 0)
375                 return r;
376
377         assert_return(service_name_is_valid(arg0), -EINVAL);
378
379         r = sd_bus_get_owner(bus, arg0, SD_BUS_CREDS_SELINUX_CONTEXT, &creds);
380         if (r == -ENOENT)
381                 return sd_bus_error_setf(error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Name %s is currently not owned by anyone.", arg0);
382         if (r < 0)
383                 return r;
384
385         r = sd_bus_message_new_method_return(m, &reply);
386         if (r < 0)
387                 return r;
388
389         r = sd_bus_message_append_array(reply, 'y', creds->label, strlen(creds->label));
390         if (r < 0)
391                 return r;
392
393         return sd_bus_send(bus, reply, NULL);
394 }
395
396 static int driver_get_pid(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
397         _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
398         char *arg0;
399         int r;
400
401         r = sd_bus_message_read(m, "s", &arg0);
402         if (r < 0)
403                 return r;
404
405         assert_return(service_name_is_valid(arg0), -EINVAL);
406
407         r = sd_bus_get_owner(bus, arg0, SD_BUS_CREDS_PID, &creds);
408         if (r == -ENOENT)
409                 return sd_bus_error_setf(error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Name %s is currently not owned by anyone.", arg0);
410         if (r < 0)
411                 return r;
412
413         return sd_bus_reply_method_return(m, "u", creds->pid);
414 }
415
416 static int driver_get_user(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
417         _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
418         char *arg0;
419         int r;
420
421         r = sd_bus_message_read(m, "s", &arg0);
422         if (r < 0)
423                 return r;
424
425         assert_return(service_name_is_valid(arg0), -EINVAL);
426
427         r = sd_bus_get_owner(bus, arg0, SD_BUS_CREDS_UID, &creds);
428         if (r == -ENOENT)
429                 return sd_bus_error_setf(error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Name %s is currently not owned by anyone.", arg0);
430         if (r < 0)
431                 return r;
432
433         return sd_bus_reply_method_return(m, "u", creds->uid);
434 }
435
436 static int driver_get_id(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
437         sd_id128_t server_id;
438         char buf[SD_ID128_STRING_MAX];
439         int r;
440
441         r = sd_bus_get_server_id(bus, &server_id);
442         if (r < 0)
443                 return r;
444
445         return sd_bus_reply_method_return(m, "s", sd_id128_to_string(server_id, buf));
446 }
447
448 static int driver_get_name_owner(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
449         _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
450         char *arg0;
451         int r;
452
453         r = sd_bus_message_read(m, "s", &arg0);
454         if (r < 0)
455                 return r;
456
457         assert_return(service_name_is_valid(arg0), -EINVAL);
458
459         r = sd_bus_get_owner(bus, arg0, SD_BUS_CREDS_UNIQUE_NAME, &creds);
460         if (r == -ENOENT)
461                 return sd_bus_error_setf(error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Name %s is currently not owned by anyone.", arg0);
462         if (r < 0)
463                 return r;
464
465         return sd_bus_reply_method_return(m, "s", creds->unique_name);
466 }
467
468 static int driver_hello(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
469         return sd_bus_reply_method_return(m, "s", m->sender);
470 }
471
472 static int return_strv(sd_bus *bus, sd_bus_message *m, char **l) {
473         _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
474         int r;
475
476         r = sd_bus_message_new_method_return(m, &reply);
477         if (r < 0)
478                 return r;
479
480         r = sd_bus_message_append_strv(reply, l);
481         if (r < 0)
482                 return r;
483
484         return sd_bus_send(bus, reply, NULL);
485 }
486
487 static int driver_list_names(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
488         _cleanup_strv_free_ char **names = NULL;
489         int r;
490
491         r = sd_bus_list_names(bus, &names, NULL);
492         if (r < 0)
493                 return r;
494
495         /* Let's sort the names list to make it stable */
496         strv_sort(names);
497
498         return return_strv(bus, m, names);
499 }
500
501 static int driver_list_activatable_names(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
502         _cleanup_strv_free_ char **names = NULL;
503         int r;
504
505         r = sd_bus_list_names(bus, NULL, &names);
506         if (r < 0)
507                 return r;
508
509         /* Let's sort the names list to make it stable */
510         strv_sort(names);
511
512         return return_strv(bus, m, names);
513 }
514
515 static int driver_list_queued_owners(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
516         struct kdbus_cmd_name_list cmd = {};
517         struct kdbus_name_list *name_list;
518         struct kdbus_cmd_name *name;
519         _cleanup_strv_free_ char **owners = NULL;
520         char *arg0;
521         int r;
522
523         r = sd_bus_message_read(m, "s", &arg0);
524         if (r < 0)
525                 return r;
526
527         assert_return(service_name_is_valid(arg0), -EINVAL);
528
529         cmd.flags = KDBUS_NAME_LIST_QUEUED;
530
531         r = ioctl(bus->input_fd, KDBUS_CMD_NAME_LIST, &cmd);
532         if (r < 0)
533                 return -errno;
534
535         name_list = (struct kdbus_name_list *) ((uint8_t *) bus->kdbus_buffer + cmd.offset);
536
537         KDBUS_ITEM_FOREACH(name, name_list, names) {
538                 char *n;
539
540                 if (name->size <= sizeof(*name))
541                         continue;
542
543                 if (!streq(name->name, arg0))
544                         continue;
545
546                 if (asprintf(&n, ":1.%llu", (unsigned long long) name->id) < 0)
547                         return -ENOMEM;
548
549                 r = strv_push(&owners, n);
550                 if (r < 0) {
551                         free(n);
552                         return -ENOMEM;
553                 }
554         }
555
556         r = ioctl(bus->input_fd, KDBUS_CMD_FREE, &cmd.offset);
557         if (r < 0)
558                 return -errno;
559
560         return return_strv(bus, m, owners);
561 }
562
563 static int driver_name_has_owner(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
564         char *arg0;
565         int r;
566
567         r = sd_bus_message_read(m, "s", &arg0);
568         if (r < 0)
569                 return r;
570
571         assert_return(service_name_is_valid(arg0), -EINVAL);
572
573         r = sd_bus_get_owner(bus, arg0, 0, NULL);
574         if (r < 0 && r != -ENOENT)
575                 return r;
576
577         return sd_bus_reply_method_return(m, "b", r >= 0);
578 }
579
580 static int driver_request_name(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
581         struct kdbus_cmd_name *n;
582         uint32_t flags;
583         size_t size, l;
584         uint64_t id;
585         const char *name;
586         int r;
587
588         r = sd_bus_message_read(m, "su", &name, &flags);
589         if (r < 0)
590                 return r;
591
592         assert_return(service_name_is_valid(name), -EINVAL);
593         assert_return((flags & ~(BUS_NAME_ALLOW_REPLACEMENT|BUS_NAME_REPLACE_EXISTING|BUS_NAME_DO_NOT_QUEUE)) == 0, -EINVAL);
594
595         l = strlen(name);
596         size = offsetof(struct kdbus_cmd_name, name) + l + 1;
597         n = alloca0(size);
598         n->size = size;
599         memcpy(n->name, name, l+1);
600         kdbus_translate_request_name_flags(flags, (uint64_t *) &n->flags);
601
602         /* This function is open-coded because we request the name 'on behalf'
603          * of the requesting connection */
604         r = bus_kernel_parse_unique_name(m->sender, &id);
605         if (r < 0)
606                 return r;
607
608         n->id = id;
609
610         r = ioctl(bus->input_fd, KDBUS_CMD_NAME_ACQUIRE, n);
611         if (r < 0) {
612                 if (errno == EEXIST)
613                         return sd_bus_reply_method_return(m, "u", BUS_NAME_EXISTS);
614                 if (errno == EALREADY)
615                         return sd_bus_reply_method_return(m, "u", BUS_NAME_ALREADY_OWNER);
616
617                 return -errno;
618         }
619
620         if (n->flags & KDBUS_NAME_IN_QUEUE)
621                 return sd_bus_reply_method_return(m, "u", BUS_NAME_IN_QUEUE);
622
623         return sd_bus_reply_method_return(m, "u", BUS_NAME_PRIMARY_OWNER);
624 }
625
626 static int driver_release_name(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
627         struct kdbus_cmd_name *n;
628         const char *name;
629         size_t l, size;
630         uint64_t id;
631         int r;
632
633         r = sd_bus_message_read(m, "s", &name);
634         if (r < 0)
635                 return r;
636
637         assert_return(service_name_is_valid(name), -EINVAL);
638
639         l = strlen(name);
640         size = offsetof(struct kdbus_cmd_name, name) + l + 1;
641         n = alloca0(size);
642         n->size = size;
643         memcpy(n->name, name, l+1);
644
645         /* This function is open-coded because we request the name 'on behalf'
646          * of the requesting connection */
647         r = bus_kernel_parse_unique_name(m->sender, &id);
648         if (r < 0)
649                 return r;
650
651         n->id = id;
652
653         r = ioctl(bus->input_fd, KDBUS_CMD_NAME_RELEASE, n);
654         if (r < 0) {
655                 if (errno == ESRCH)
656                         return sd_bus_reply_method_return(m, "u", BUS_NAME_NON_EXISTENT);
657                 if (errno == EADDRINUSE)
658                         return sd_bus_reply_method_return(m, "u", BUS_NAME_NOT_OWNER);
659                 return -errno;
660         }
661
662         return sd_bus_reply_method_return(m, "u", BUS_NAME_RELEASED);
663 }
664
665 static int driver_start_service_by_name(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
666         _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
667         _cleanup_strv_free_ char **t = NULL;
668         _cleanup_free_ char *path = NULL;
669         uint32_t flags;
670         char *name, *u;
671         int r;
672
673         r = sd_bus_message_read(m, "su", &name, &flags);
674         if (r < 0)
675                 return r;
676
677         assert_return(service_name_is_valid(name), -EINVAL);
678         assert_return(flags == 0, -ENOTSUP);
679
680         r = sd_bus_get_owner(bus, name, 0, NULL);
681         if (r >= 0)
682                 return sd_bus_reply_method_return(m, "u", BUS_START_REPLY_ALREADY_RUNNING);
683         if (r != -ENOENT)
684                 return r;
685
686         u = strappenda(name, ".busname");
687
688         path = unit_dbus_path_from_name(u);
689         if (!path)
690                 return -ENOMEM;
691
692         r = sd_bus_get_property_strv(
693                         bus,
694                         "org.freedesktop.systemd1",
695                         path,
696                         "org.freedesktop.systemd1.Unit",
697                         "Triggers",
698                         error,
699                         &t);
700         if (r < 0)
701                 return r;
702
703         if (!t[0] || t[1])
704                 return -EIO;
705
706         r = sd_bus_call_method(
707                         bus,
708                         "org.freedesktop.systemd1",
709                         "/org/freedesktop/systemd1",
710                         "org.freedesktop.systemd1.Manager",
711                         "StartUnit",
712                         error,
713                         &reply,
714                         "ss",
715                         t[0],
716                         "replace");
717         if (r < 0)
718                 return r;
719
720         return sd_bus_reply_method_return(m, "u", BUS_START_REPLY_SUCCESS);
721 }
722
723 static int driver_unsupported(sd_bus *bus, sd_bus_message *m, void *userdata, sd_bus_error *error) {
724         return sd_bus_error_setf(error, SD_BUS_ERROR_NOT_SUPPORTED, "%s() is not supported", sd_bus_message_get_member(m));
725 }
726
727 static const sd_bus_vtable driver_vtable[] = {
728         SD_BUS_VTABLE_START(0),
729         SD_BUS_METHOD("AddMatch", "s", NULL, driver_add_match, SD_BUS_VTABLE_UNPRIVILEGED),
730         SD_BUS_METHOD("GetConnectionSELinuxSecurityContext", "s", "ay", driver_get_security_ctx, SD_BUS_VTABLE_UNPRIVILEGED),
731         SD_BUS_METHOD("GetConnectionUnixProcessID", "s", "u", driver_get_pid, SD_BUS_VTABLE_UNPRIVILEGED),
732         SD_BUS_METHOD("GetConnectionUnixUser", "s", "u", driver_get_user, SD_BUS_VTABLE_UNPRIVILEGED),
733         SD_BUS_METHOD("GetId", NULL, "s", driver_get_id, SD_BUS_VTABLE_UNPRIVILEGED),
734         SD_BUS_METHOD("GetNameOwner", "s", "s", driver_get_name_owner, SD_BUS_VTABLE_UNPRIVILEGED),
735         SD_BUS_METHOD("Hello", NULL, "s", driver_hello, SD_BUS_VTABLE_UNPRIVILEGED),
736         SD_BUS_METHOD("ListActivatableNames", NULL, "as", driver_list_activatable_names, SD_BUS_VTABLE_UNPRIVILEGED),
737         SD_BUS_METHOD("ListNames", NULL, "as", driver_list_names, SD_BUS_VTABLE_UNPRIVILEGED),
738         SD_BUS_METHOD("ListQueuedOwners", "s", "as", driver_list_queued_owners, SD_BUS_VTABLE_UNPRIVILEGED),
739         SD_BUS_METHOD("NameHasOwner", "s", "b", driver_name_has_owner, SD_BUS_VTABLE_UNPRIVILEGED),
740         SD_BUS_METHOD("ReleaseName", "s", "u", driver_release_name, SD_BUS_VTABLE_UNPRIVILEGED),
741         SD_BUS_METHOD("ReloadConfig", NULL, NULL, driver_unsupported, SD_BUS_VTABLE_DEPRECATED),
742         SD_BUS_METHOD("RemoveMatch", "s", NULL, driver_remove_match, SD_BUS_VTABLE_UNPRIVILEGED),
743         SD_BUS_METHOD("RequestName", "su", "u", driver_request_name, SD_BUS_VTABLE_UNPRIVILEGED),
744         SD_BUS_METHOD("StartServiceByName", "su", "u", driver_start_service_by_name, SD_BUS_VTABLE_UNPRIVILEGED),
745         SD_BUS_METHOD("UpdateActivationEnvironment", "a{ss}", NULL, driver_unsupported, SD_BUS_VTABLE_DEPRECATED),
746         SD_BUS_SIGNAL("NameAcquired", "s", SD_BUS_VTABLE_DEPRECATED),
747         SD_BUS_SIGNAL("NameLost", "s", SD_BUS_VTABLE_DEPRECATED),
748         SD_BUS_SIGNAL("NameOwnerChanged", "sss", 0),
749         SD_BUS_VTABLE_END
750 };
751
752 static int connect_bus(Context *c) {
753         int r;
754
755         assert(c);
756
757         r = sd_bus_default_system(&c->bus);
758         if (r < 0) {
759                 log_error("Failed to create bus: %s", strerror(-r));
760                 return r;
761         }
762
763         if (!c->bus->is_kernel) {
764                 log_error("Not running on kdbus");
765                 return -EPERM;
766         }
767
768         r = sd_bus_add_object_vtable(c->bus, "/org/freedesktop/DBus", "org.freedesktop.DBus", driver_vtable, c);
769         if (r < 0) {
770                 log_error("Failed to add manager object vtable: %s", strerror(-r));
771                 return r;
772         }
773
774         r = sd_bus_request_name(c->bus, "org.freedesktop.DBus", 0);
775         if (r < 0) {
776                 log_error("Unable to request name: %s\n", strerror(-r));
777                 return r;
778         }
779
780         r = sd_bus_attach_event(c->bus, c->event, 0);
781         if (r < 0) {
782                 log_error("Error while adding bus to event loop: %s", strerror(-r));
783                 return r;
784         }
785
786         return 0;
787 }
788
789 static bool check_idle(void *userdata) {
790         Context *c = userdata;
791         assert(c);
792
793         return hashmap_isempty(c->clients);
794 }
795
796 int main(int argc, char *argv[]) {
797         Context context = {};
798         Client *c;
799         int r;
800
801         log_set_target(LOG_TARGET_AUTO);
802         log_parse_environment();
803         log_open();
804
805         if (argc != 1) {
806                 log_error("This program takes no arguments.");
807                 r = -EINVAL;
808                 goto finish;
809         }
810
811         r = sd_event_default(&context.event);
812         if (r < 0) {
813                 log_error("Failed to allocate event loop: %s", strerror(-r));
814                 goto finish;
815         }
816
817         sd_event_set_watchdog(context.event, true);
818
819         r = connect_bus(&context);
820         if (r < 0)
821                 goto finish;
822
823         r = bus_event_loop_with_idle(context.event, context.bus, "org.freedesktop.DBus", DEFAULT_EXIT_USEC, check_idle, &context);
824         if (r < 0) {
825                 log_error("Failed to run event loop: %s", strerror(-r));
826                 goto finish;
827         }
828
829 finish:
830         while ((c = hashmap_first(context.clients)))
831                 client_free(c);
832
833         sd_bus_unref(context.bus);
834         sd_event_unref(context.event);
835
836         return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
837
838 }