chiark / gitweb /
bus-proxyd: improve compatibility with dbus-1
[elogind.git] / src / bus-proxyd / bus-proxyd.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7   Copyright 2013 Daniel Mack
8   Copyright 2014 Kay Sievers
9
10   systemd is free software; you can redistribute it and/or modify it
11   under the terms of the GNU Lesser General Public License as published by
12   the Free Software Foundation; either version 2.1 of the License, or
13   (at your option) any later version.
14
15   systemd is distributed in the hope that it will be useful, but
16   WITHOUT ANY WARRANTY; without even the implied warranty of
17   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18   Lesser General Public License for more details.
19
20   You should have received a copy of the GNU Lesser General Public License
21   along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 ***/
23
24 #include <sys/socket.h>
25 #include <sys/un.h>
26 #include <sys/types.h>
27 #include <fcntl.h>
28 #include <unistd.h>
29 #include <string.h>
30 #include <errno.h>
31 #include <sys/poll.h>
32 #include <stddef.h>
33 #include <getopt.h>
34
35 #include "log.h"
36 #include "util.h"
37 #include "socket-util.h"
38 #include "sd-daemon.h"
39 #include "sd-bus.h"
40 #include "bus-internal.h"
41 #include "bus-message.h"
42 #include "bus-util.h"
43 #include "build.h"
44 #include "strv.h"
45 #include "def.h"
46 #include "capability.h"
47 #include "bus-policy.h"
48
49 static char *arg_address = NULL;
50 static char *arg_command_line_buffer = NULL;
51 static bool arg_drop_privileges = false;
52 static char **arg_configuration = NULL;
53
54 static int help(void) {
55
56         printf("%s [OPTIONS...]\n\n"
57                "Connect STDIO or a socket to a given bus address.\n\n"
58                "  -h --help               Show this help\n"
59                "     --version            Show package version\n"
60                "     --drop-privileges    Drop privileges\n"
61                "     --configuration=PATH Configuration file or directory\n"
62                "     --machine=MACHINE    Connect to specified machine\n"
63                "     --address=ADDRESS    Connect to the bus specified by ADDRESS\n"
64                "                          (default: " DEFAULT_SYSTEM_BUS_PATH ")\n",
65                program_invocation_short_name);
66
67         return 0;
68 }
69
70 static int parse_argv(int argc, char *argv[]) {
71
72         enum {
73                 ARG_VERSION = 0x100,
74                 ARG_ADDRESS,
75                 ARG_DROP_PRIVILEGES,
76                 ARG_CONFIGURATION,
77                 ARG_MACHINE,
78         };
79
80         static const struct option options[] = {
81                 { "help",            no_argument,       NULL, 'h'                 },
82                 { "version",         no_argument,       NULL, ARG_VERSION         },
83                 { "address",         required_argument, NULL, ARG_ADDRESS         },
84                 { "drop-privileges", no_argument,       NULL, ARG_DROP_PRIVILEGES },
85                 { "configuration",   required_argument, NULL, ARG_CONFIGURATION   },
86                 { "machine",         required_argument, NULL, ARG_MACHINE         },
87                 {},
88         };
89
90         int c, r;
91
92         assert(argc >= 0);
93         assert(argv);
94
95         while ((c = getopt_long(argc, argv, "h", options, NULL)) >= 0)
96
97                 switch (c) {
98
99                 case 'h':
100                         help();
101                         return 0;
102
103                 case ARG_VERSION:
104                         puts(PACKAGE_STRING);
105                         puts(SYSTEMD_FEATURES);
106                         return 0;
107
108                 case ARG_ADDRESS: {
109                         char *a;
110
111                         a = strdup(optarg);
112                         if (!a)
113                                 return log_oom();
114
115                         free(arg_address);
116                         arg_address = a;
117                         break;
118                 }
119
120                 case ARG_DROP_PRIVILEGES:
121                         arg_drop_privileges = true;
122                         break;
123
124                 case ARG_CONFIGURATION:
125                         r = strv_extend(&arg_configuration, optarg);
126                         if (r < 0)
127                                 return log_oom();
128                         break;
129
130                 case ARG_MACHINE: {
131                         _cleanup_free_ char *e = NULL;
132                         char *a;
133
134                         e = bus_address_escape(optarg);
135                         if (!e)
136                                 return log_oom();
137
138 #ifdef ENABLE_KDBUS
139                         a = strjoin("x-container-kernel:machine=", e, ";x-container-unix:machine=", e, NULL);
140 #else
141                         a = strjoin("x-container-unix:machine=", e, NULL);
142 #endif
143                         if (!a)
144                                 return log_oom();
145
146                         free(arg_address);
147                         arg_address = a;
148
149                         break;
150                 }
151
152                 case '?':
153                         return -EINVAL;
154
155                 default:
156                         assert_not_reached("Unhandled option");
157                 }
158
159         /* If the first command line argument is only "x" characters
160          * we'll write who we are talking to into it, so that "ps" is
161          * explanatory */
162         arg_command_line_buffer = argv[optind];
163         if (argc > optind + 1 || (arg_command_line_buffer && !in_charset(arg_command_line_buffer, "x"))) {
164                 log_error("Too many arguments");
165                 return -EINVAL;
166         }
167
168         if (!arg_address) {
169                 arg_address = strdup(DEFAULT_SYSTEM_BUS_PATH);
170                 if (!arg_address)
171                         return log_oom();
172         }
173
174         return 1;
175 }
176
177 static int rename_service(sd_bus *a, sd_bus *b) {
178         _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
179         _cleanup_free_ char *p = NULL, *name = NULL;
180         const char *comm;
181         char **cmdline;
182         uid_t uid;
183         pid_t pid;
184         int r;
185
186         assert(a);
187         assert(b);
188
189         r = sd_bus_get_peer_creds(b, SD_BUS_CREDS_UID|SD_BUS_CREDS_PID|SD_BUS_CREDS_CMDLINE|SD_BUS_CREDS_COMM, &creds);
190         if (r < 0)
191                 return r;
192
193         r = sd_bus_creds_get_uid(creds, &uid);
194         if (r < 0)
195                 return r;
196
197         r = sd_bus_creds_get_pid(creds, &pid);
198         if (r < 0)
199                 return r;
200
201         r = sd_bus_creds_get_cmdline(creds, &cmdline);
202         if (r < 0)
203                 return r;
204
205         r = sd_bus_creds_get_comm(creds, &comm);
206         if (r < 0)
207                 return r;
208
209         name = uid_to_name(uid);
210         if (!name)
211                 return -ENOMEM;
212
213         p = strv_join(cmdline, " ");
214         if (!p)
215                 return -ENOMEM;
216
217         /* The status string gets the full command line ... */
218         sd_notifyf(false,
219                    "STATUS=Processing requests from client PID "PID_FMT" (%s); UID "UID_FMT" (%s)",
220                    pid, p,
221                    uid, name);
222
223         /* ... and the argv line only the short comm */
224         if (arg_command_line_buffer) {
225                 size_t m, w;
226
227                 m = strlen(arg_command_line_buffer);
228                 w = snprintf(arg_command_line_buffer, m,
229                              "[PID "PID_FMT"/%s; UID "UID_FMT"/%s]",
230                              pid, comm,
231                              uid, name);
232
233                 if (m > w)
234                         memzero(arg_command_line_buffer + w, m - w);
235         }
236
237         log_debug("Running on behalf of PID "PID_FMT" (%s), UID "UID_FMT" (%s), %s",
238                   pid, p,
239                   uid, name,
240                   a->unique_name);
241
242         return 0;
243 }
244
245 static int synthesize_name_acquired(sd_bus *a, sd_bus *b, sd_bus_message *m) {
246         _cleanup_bus_message_unref_ sd_bus_message *n = NULL;
247         const char *name, *old_owner, *new_owner;
248         int r;
249
250         assert(a);
251         assert(b);
252         assert(m);
253
254         /* If we get NameOwnerChanged for our own name, we need to
255          * synthesize NameLost/NameAcquired, since socket clients need
256          * that, even though it is obsoleted on kdbus */
257
258         if (!a->is_kernel)
259                 return 0;
260
261         if (!sd_bus_message_is_signal(m, "org.freedesktop.DBus", "NameOwnerChanged") ||
262             !streq_ptr(m->path, "/org/freedesktop/DBus") ||
263             !streq_ptr(m->sender, "org.freedesktop.DBus"))
264                 return 0;
265
266         r = sd_bus_message_read(m, "sss", &name, &old_owner, &new_owner);
267         if (r < 0)
268                 return r;
269
270         r = sd_bus_message_rewind(m, true);
271         if (r < 0)
272                 return r;
273
274         if (streq(old_owner, a->unique_name)) {
275
276                 r = sd_bus_message_new_signal(
277                                 b,
278                                 &n,
279                                 "/org/freedesktop/DBus",
280                                 "org.freedesktop.DBus",
281                                 "NameLost");
282
283         } else if (streq(new_owner, a->unique_name)) {
284
285                 r = sd_bus_message_new_signal(
286                                 b,
287                                 &n,
288                                 "/org/freedesktop/DBus",
289                                 "org.freedesktop.DBus",
290                                 "NameAcquired");
291         } else
292                 return 0;
293
294         if (r < 0)
295                 return r;
296
297         r = sd_bus_message_append(n, "s", name);
298         if (r < 0)
299                 return r;
300
301         r = bus_message_append_sender(n, "org.freedesktop.DBus");
302         if (r < 0)
303                 return r;
304
305         r = bus_seal_synthetic_message(b, n);
306         if (r < 0)
307                 return r;
308
309         return sd_bus_send(b, n, NULL);
310 }
311
312 static int process_policy(sd_bus *a, sd_bus *b, sd_bus_message *m) {
313         _cleanup_bus_message_unref_ sd_bus_message *n = NULL;
314         int r;
315
316         assert(a);
317         assert(b);
318         assert(m);
319
320         if (!a->is_kernel)
321                 return 0;
322
323         if (!sd_bus_message_is_method_call(m, "org.freedesktop.DBus.Properties", "GetAll"))
324                 return 0;
325
326         if (!streq_ptr(m->path, "/org/gnome/DisplayManager/Slave"))
327                 return 0;
328
329         r = sd_bus_message_new_method_errorf(m, &n, SD_BUS_ERROR_ACCESS_DENIED, "gdm, you are stupid");
330         if (r < 0)
331                 return r;
332
333         r = bus_message_append_sender(n, "org.freedesktop.DBus");
334         if (r < 0) {
335                 log_error("Failed to append sender to gdm reply: %s", strerror(-r));
336                 return r;
337         }
338
339         r = bus_seal_synthetic_message(b, n);
340         if (r < 0) {
341                 log_error("Failed to seal gdm reply: %s", strerror(-r));
342                 return r;
343         }
344
345         r = sd_bus_send(b, n, NULL);
346         if (r < 0) {
347                 log_error("Failed to send gdm reply: %s", strerror(-r));
348                 return r;
349         }
350
351         return 1;
352 }
353
354 static int synthetic_driver_send(sd_bus *b, sd_bus_message *m) {
355         int r;
356
357         assert(b);
358         assert(m);
359
360         r = bus_message_append_sender(m, "org.freedesktop.DBus");
361         if (r < 0)
362                 return r;
363
364         r = bus_seal_synthetic_message(b, m);
365         if (r < 0)
366                 return r;
367
368         return sd_bus_send(b, m, NULL);
369 }
370
371 static int synthetic_reply_method_error(sd_bus_message *call, const sd_bus_error *e) {
372         _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
373         int r;
374
375         assert(call);
376
377         if (call->header->flags & BUS_MESSAGE_NO_REPLY_EXPECTED)
378                 return 0;
379
380         r = sd_bus_message_new_method_error(call, &m, e);
381         if (r < 0)
382                 return r;
383
384         return synthetic_driver_send(call->bus, m);
385 }
386
387 static int synthetic_reply_method_errno(sd_bus_message *call, int error, const sd_bus_error *p) {
388
389         _cleanup_bus_error_free_ sd_bus_error berror = SD_BUS_ERROR_NULL;
390
391         assert(call);
392
393         if (call->header->flags & BUS_MESSAGE_NO_REPLY_EXPECTED)
394                 return 0;
395
396         if (sd_bus_error_is_set(p))
397                 return synthetic_reply_method_error(call, p);
398
399         sd_bus_error_set_errno(&berror, error);
400
401         return synthetic_reply_method_error(call, &berror);
402 }
403
404 static int synthetic_reply_method_return(sd_bus_message *call, const char *types, ...) {
405         _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
406         int r;
407
408         assert(call);
409
410         if (call->header->flags & BUS_MESSAGE_NO_REPLY_EXPECTED)
411                 return 0;
412
413         r = sd_bus_message_new_method_return(call, &m);
414         if (r < 0)
415                 return r;
416
417         if (!isempty(types)) {
418                 va_list ap;
419
420                 va_start(ap, types);
421                 r = bus_message_append_ap(m, types, ap);
422                 va_end(ap);
423                 if (r < 0)
424                         return r;
425         }
426
427         return synthetic_driver_send(call->bus, m);
428 }
429
430 static int synthetic_reply_return_strv(sd_bus_message *call, char **l) {
431         _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
432         int r;
433
434         assert(call);
435
436         r = sd_bus_message_new_method_return(call, &m);
437         if (r < 0)
438                 return synthetic_reply_method_errno(call, r, NULL);
439
440         r = sd_bus_message_append_strv(m, l);
441         if (r < 0)
442                 return synthetic_reply_method_errno(call, r, NULL);
443
444         return synthetic_driver_send(call->bus, m);
445 }
446
447 static int get_creds_by_name(sd_bus *bus, const char *name, uint64_t mask, sd_bus_creds **_creds, sd_bus_error *error) {
448         _cleanup_bus_creds_unref_ sd_bus_creds *c = NULL;
449         int r;
450
451         assert(bus);
452         assert(name);
453         assert(_creds);
454
455         assert_return(service_name_is_valid(name), -EINVAL);
456
457         r = sd_bus_get_owner(bus, name, mask, &c);
458         if (r == -ESRCH || r == -ENXIO)
459                 return sd_bus_error_setf(error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Name %s is currently not owned by anyone.", name);
460         if (r < 0)
461                 return r;
462
463         if ((c->mask & mask) != mask)
464                 return -ENOTSUP;
465
466         *_creds = c;
467         c = NULL;
468
469         return 0;
470 }
471
472 static int get_creds_by_message(sd_bus *bus, sd_bus_message *m, uint64_t mask, sd_bus_creds **_creds, sd_bus_error *error) {
473         const char *name;
474         int r;
475
476         assert(bus);
477         assert(m);
478         assert(_creds);
479
480         r = sd_bus_message_read(m, "s", &name);
481         if (r < 0)
482                 return r;
483
484         return get_creds_by_name(bus, name, mask, _creds, error);
485 }
486
487 static int peer_is_privileged(sd_bus *bus, sd_bus_message *m) {
488         _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
489         uid_t uid;
490         int r;
491
492         r = get_creds_by_message(bus, m, SD_BUS_CREDS_UID, &creds, NULL);
493         if (r < 0)
494                 return r;
495
496         r = sd_bus_creds_get_uid(creds, &uid);
497         if (r < 0)
498                 return r;
499
500         r = sd_bus_creds_has_effective_cap(creds, CAP_SYS_ADMIN);
501         if (r > 0)
502                 return true;
503
504         if (uid == getuid())
505                 return true;
506
507         return false;
508 }
509
510 static int process_driver(sd_bus *a, sd_bus *b, sd_bus_message *m) {
511         int r;
512
513         assert(a);
514         assert(b);
515         assert(m);
516
517         if (!a->is_kernel)
518                 return 0;
519
520         if (!streq_ptr(sd_bus_message_get_destination(m), "org.freedesktop.DBus"))
521                 return 0;
522
523         if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus.Introspectable", "Introspect")) {
524                 if (0 && !isempty(sd_bus_message_get_signature(m, true))) {
525                         _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
526
527                         r = sd_bus_error_setf(&error, SD_BUS_ERROR_INVALID_ARGS, "Expected no parameters");
528
529                         return synthetic_reply_method_errno(m, r, &error);
530                 }
531
532                 return synthetic_reply_method_return(m, "s",
533                         "<!DOCTYPE node PUBLIC \"-//freedesktop//DTD D-BUS Object Introspection 1.0//EN\" "
534                           "\"http://www.freedesktop.org/standards/dbus/1.0/introspect.dtd\">\n"
535                         "<node>\n"
536                         " <interface name=\"org.freedesktop.DBus.Introspectable\">\n"
537                         "  <method name=\"Introspect\">\n"
538                         "   <arg name=\"data\" type=\"s\" direction=\"out\"/>\n"
539                         "  </method>\n"
540                         " </interface>\n"
541                         " <interface name=\"org.freedesktop.DBus\">\n"
542                         "  <method name=\"AddMatch\">\n"
543                         "   <arg type=\"s\" direction=\"in\"/>\n"
544                         "  </method>\n"
545                         "  <method name=\"RemoveMatch\">\n"
546                         "   <arg type=\"s\" direction=\"in\"/>\n"
547                         "  </method>\n"
548                         "  <method name=\"GetConnectionSELinuxSecurityContext\">\n"
549                         "   <arg type=\"s\" direction=\"in\"/>\n"
550                         "   <arg type=\"ay\" direction=\"out\"/>\n"
551                         "  </method>\n"
552                         "  <method name=\"GetConnectionUnixProcessID\">\n"
553                         "   <arg type=\"s\" direction=\"in\"/>\n"
554                         "   <arg type=\"u\" direction=\"out\"/>\n"
555                         "  </method>\n"
556                         "  <method name=\"GetConnectionUnixUser\">\n"
557                         "   <arg type=\"s\" direction=\"in\"/>\n"
558                         "   <arg type=\"u\" direction=\"out\"/>\n"
559                         "  </method>\n"
560                         "  <method name=\"GetId\">\n"
561                         "   <arg type=\"s\" direction=\"out\"/>\n"
562                         "  </method>\n"
563                         "  <method name=\"GetNameOwner\">\n"
564                         "   <arg type=\"s\" direction=\"in\"/>\n"
565                         "   <arg type=\"s\" direction=\"out\"/>\n"
566                         "  </method>\n"
567                         "  <method name=\"Hello\">\n"
568                         "   <arg type=\"s\" direction=\"out\"/>\n"
569                         "  </method>\n"
570                         "  <method name=\"ListActivatableNames\">\n"
571                         "   <arg type=\"as\" direction=\"out\"/>\n"
572                         "  </method>\n"
573                         "  <method name=\"ListNames\">\n"
574                         "   <arg type=\"as\" direction=\"out\"/>\n"
575                         "  </method>\n"
576                         "  <method name=\"ListQueuedOwners\">\n"
577                         "   <arg type=\"s\" direction=\"in\"/>\n"
578                         "   <arg type=\"as\" direction=\"out\"/>\n"
579                         "  </method>\n"
580                         "  <method name=\"NameHasOwner\">\n"
581                         "   <arg type=\"s\" direction=\"in\"/>\n"
582                         "   <arg type=\"b\" direction=\"out\"/>\n"
583                         "  </method>\n"
584                         "  <method name=\"ReleaseName\">\n"
585                         "   <arg type=\"s\" direction=\"in\"/>\n"
586                         "   <arg type=\"u\" direction=\"out\"/>\n"
587                         "  </method>\n"
588                         "  <method name=\"ReloadConfig\">\n"
589                         "  </method>\n"
590                         "  <method name=\"RequestName\">\n"
591                         "   <arg type=\"s\" direction=\"in\"/>\n"
592                         "   <arg type=\"u\" direction=\"in\"/>\n"
593                         "   <arg type=\"u\" direction=\"out\"/>\n"
594                         "  </method>\n"
595                         "  <method name=\"StartServiceByName\">\n"
596                         "   <arg type=\"s\" direction=\"in\"/>\n"
597                         "   <arg type=\"u\" direction=\"in\"/>\n"
598                         "   <arg type=\"u\" direction=\"out\"/>\n"
599                         "  </method>\n"
600                         "  <method name=\"UpdateActivationEnvironment\">\n"
601                         "   <arg type=\"a{ss}\" direction=\"in\"/>\n"
602                         "  </method>\n"
603                         "  <signal name=\"NameAcquired\">\n"
604                         "   <arg type=\"s\"/>\n"
605                         "  </signal>\n"
606                         "  <signal name=\"NameLost\">\n"
607                         "   <arg type=\"s\"/>\n"
608                         "  </signal>\n"
609                         "  <signal name=\"NameOwnerChanged\">\n"
610                         "   <arg type=\"s\"/>\n"
611                         "   <arg type=\"s\"/>\n"
612                         "   <arg type=\"s\"/>\n"
613                         "  </signal>\n"
614                         " </interface>\n"
615                         "</node>\n");
616
617         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "AddMatch")) {
618                 const char *match;
619
620                 r = sd_bus_message_read(m, "s", &match);
621                 if (r < 0)
622                         return synthetic_reply_method_errno(m, r, NULL);
623
624                 r = sd_bus_add_match(a, NULL, match, NULL, NULL);
625                 if (r < 0)
626                         return synthetic_reply_method_errno(m, r, NULL);
627
628                 return synthetic_reply_method_return(m, NULL);
629
630         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "RemoveMatch")) {
631                 const char *match;
632
633                 r = sd_bus_message_read(m, "s", &match);
634                 if (r < 0)
635                         return synthetic_reply_method_errno(m, r, NULL);
636
637                 r = bus_remove_match_by_string(a, match, NULL, NULL);
638                 if (r == 0)
639                         return synthetic_reply_method_error(m, &SD_BUS_ERROR_MAKE_CONST(SD_BUS_ERROR_MATCH_RULE_NOT_FOUND, "Match rule not found"));
640                 if (r < 0)
641                         return synthetic_reply_method_errno(m, r, NULL);
642
643                 return synthetic_reply_method_return(m, NULL);
644
645         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "GetConnectionSELinuxSecurityContext")) {
646                 const char *name;
647                 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
648                 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
649
650                 r = sd_bus_message_read(m, "s", &name);
651                 if (r < 0)
652                         return r;
653
654                 r = get_creds_by_name(a, name, SD_BUS_CREDS_SELINUX_CONTEXT, &creds, NULL);
655                 if (r == -ESRCH || r == -ENXIO) {
656                         sd_bus_error_setf(&error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Could not get security context of name '%s': no such name.", name);
657                         return synthetic_reply_method_errno(m, r, &error);
658                 }
659                 if (r < 0)
660                         return synthetic_reply_method_errno(m, r, NULL);
661
662                 return synthetic_reply_method_return(m, "y", creds->label, strlen(creds->label));
663
664         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "GetConnectionUnixProcessID")) {
665                 const char *name;
666                 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
667                 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
668
669                 r = sd_bus_message_read(m, "s", &name);
670                 if (r < 0)
671                         return r;
672
673                 r = get_creds_by_name(a, name, SD_BUS_CREDS_PID, &creds, NULL);
674                 if (r == -ESRCH || r == -ENXIO) {
675                         sd_bus_error_setf(&error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Could not get PID of name '%s': no such name.", name);
676                         return synthetic_reply_method_errno(m, r, &error);
677                 }
678                 if (r < 0)
679                         return synthetic_reply_method_errno(m, r, NULL);
680
681                 return synthetic_reply_method_return(m, "u", (uint32_t) creds->pid);
682
683         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "GetConnectionUnixUser")) {
684                 const char *name;
685                 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
686                 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
687
688                 r = sd_bus_message_read(m, "s", &name);
689                 if (r < 0)
690                         return r;
691
692                 r = get_creds_by_name(a, name, SD_BUS_CREDS_UID, &creds, NULL);
693                 if (r == -ESRCH || r == -ENXIO) {
694                         sd_bus_error_setf(&error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Could not get UID of name '%s': no such name.", name);
695                         return synthetic_reply_method_errno(m, r, &error);
696                 }
697                 if (r < 0)
698                         return synthetic_reply_method_errno(m, r, NULL);
699
700                 return synthetic_reply_method_return(m, "u", (uint32_t) creds->uid);
701
702         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "GetId")) {
703                 sd_id128_t server_id;
704                 char buf[SD_ID128_STRING_MAX];
705
706                 r = sd_bus_get_server_id(a, &server_id);
707                 if (r < 0)
708                         return synthetic_reply_method_errno(m, r, NULL);
709
710                 return synthetic_reply_method_return(m, "s", sd_id128_to_string(server_id, buf));
711
712         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "GetNameOwner")) {
713                 const char *name;
714                 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
715                 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
716
717                 r = sd_bus_message_read(m, "s", &name);
718                 if (r < 0)
719                         return synthetic_reply_method_errno(m, r, NULL);
720
721                 if (streq(name, "org.freedesktop.DBus"))
722                         return synthetic_reply_method_return(m, "s", "org.freedesktop.DBus");
723
724                 r = get_creds_by_name(a, name, SD_BUS_CREDS_UNIQUE_NAME, &creds, &error);
725                 if (r < 0)
726                         return synthetic_reply_method_errno(m, r, &error);
727
728                 return synthetic_reply_method_return(m, "s", creds->unique_name);
729
730         /* "Hello" is handled in process_hello() */
731
732         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "ListActivatableNames")) {
733                 _cleanup_strv_free_ char **names = NULL;
734
735                 r = sd_bus_list_names(a, NULL, &names);
736                 if (r < 0)
737                         return synthetic_reply_method_errno(m, r, NULL);
738
739                 /* Let's sort the names list to make it stable */
740                 strv_sort(names);
741
742                 return synthetic_reply_return_strv(m, names);
743
744         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "ListNames")) {
745                 _cleanup_strv_free_ char **names = NULL;
746
747                 r = sd_bus_list_names(a, &names, NULL);
748                 if (r < 0)
749                         return synthetic_reply_method_errno(m, r, NULL);
750
751                 r = strv_extend(&names, "org.freedesktop.DBus");
752                 if (r < 0)
753                         return synthetic_reply_method_errno(m, r, NULL);
754
755                 /* Let's sort the names list to make it stable */
756                 strv_sort(names);
757
758                 return synthetic_reply_return_strv(m, names);
759
760         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "ListQueuedOwners")) {
761                 struct kdbus_cmd_name_list cmd = {};
762                 struct kdbus_name_list *name_list;
763                 struct kdbus_cmd_free cmd_free;
764                 struct kdbus_cmd_name *name;
765                 _cleanup_strv_free_ char **owners = NULL;
766                 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
767                 char *arg0;
768                 int err = 0;
769
770                 r = sd_bus_message_read(m, "s", &arg0);
771                 if (r < 0)
772                         return synthetic_reply_method_errno(m, r, NULL);
773
774                 if (!service_name_is_valid(arg0))
775                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
776
777                 r = sd_bus_get_owner(a, arg0, 0, NULL);
778                 if (r == -ESRCH || r == -ENXIO) {
779                         sd_bus_error_setf(&error, SD_BUS_ERROR_NAME_HAS_NO_OWNER, "Could not get owners of name '%s': no such name.", arg0);
780                         return synthetic_reply_method_errno(m, r, &error);
781                 }
782                 if (r < 0)
783                         return synthetic_reply_method_errno(m, r, NULL);
784
785                 cmd.flags = KDBUS_NAME_LIST_QUEUED;
786                 r = ioctl(a->input_fd, KDBUS_CMD_NAME_LIST, &cmd);
787                 if (r < 0)
788                         return synthetic_reply_method_errno(m, -errno, NULL);
789
790                 name_list = (struct kdbus_name_list *) ((uint8_t *) a->kdbus_buffer + cmd.offset);
791
792                 KDBUS_ITEM_FOREACH(name, name_list, names) {
793                         const char *entry_name = NULL;
794                         struct kdbus_item *item;
795                         char *n;
796
797                         KDBUS_ITEM_FOREACH(item, name, items)
798                                 if (item->type == KDBUS_ITEM_NAME)
799                                         entry_name = item->str;
800
801                         if (!streq_ptr(entry_name, arg0))
802                                 continue;
803
804                         if (asprintf(&n, ":1.%llu", (unsigned long long) name->owner_id) < 0) {
805                                 err  = -ENOMEM;
806                                 break;
807                         }
808
809                         r = strv_consume(&owners, n);
810                         if (r < 0) {
811                                 err = r;
812                                 break;
813                         }
814                 }
815
816                 cmd_free.flags = 0;
817                 cmd_free.offset = cmd.offset;
818
819                 r = ioctl(a->input_fd, KDBUS_CMD_FREE, &cmd_free);
820                 if (r < 0)
821                         return synthetic_reply_method_errno(m, r, NULL);
822
823                 if (err < 0)
824                         return synthetic_reply_method_errno(m, err, NULL);
825
826                 return synthetic_reply_return_strv(m, owners);
827
828         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "NameHasOwner")) {
829                 const char *name;
830
831                 r = sd_bus_message_read(m, "s", &name);
832                 if (r < 0)
833                         return synthetic_reply_method_errno(m, r, NULL);
834
835                 if (!service_name_is_valid(name))
836                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
837
838                 if (streq(name, "org.freedesktop.DBus"))
839                         return synthetic_reply_method_return(m, "b", true);
840
841                 r = sd_bus_get_owner(a, name, 0, NULL);
842                 if (r < 0 && r != -ESRCH && r != -ENXIO)
843                         return synthetic_reply_method_errno(m, r, NULL);
844
845                 return synthetic_reply_method_return(m, "b", r >= 0);
846
847         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "ReleaseName")) {
848                 const char *name;
849
850                 r = sd_bus_message_read(m, "s", &name);
851                 if (r < 0)
852                         return synthetic_reply_method_errno(m, r, NULL);
853
854                 if (!service_name_is_valid(name))
855                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
856
857                 r = sd_bus_release_name(a, name);
858                 if (r < 0) {
859                         if (r == -ESRCH)
860                                 return synthetic_reply_method_return(m, "u", BUS_NAME_NON_EXISTENT);
861                         if (r == -EADDRINUSE)
862                                 return synthetic_reply_method_return(m, "u", BUS_NAME_NOT_OWNER);
863
864                         return synthetic_reply_method_errno(m, r, NULL);
865                 }
866
867                 return synthetic_reply_method_return(m, "u", BUS_NAME_RELEASED);
868
869         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "ReloadConfig")) {
870                 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
871
872                 r = sd_bus_error_setf(&error, SD_BUS_ERROR_NOT_SUPPORTED, "%s() is not supported", sd_bus_message_get_member(m));
873
874                 return synthetic_reply_method_errno(m, r, &error);
875
876         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "RequestName")) {
877                 const char *name;
878                 uint32_t flags;
879
880                 r = sd_bus_message_read(m, "su", &name, &flags);
881                 if (r < 0)
882                         return synthetic_reply_method_errno(m, r, NULL);
883
884                 if (!service_name_is_valid(name))
885                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
886                 if ((flags & ~(BUS_NAME_ALLOW_REPLACEMENT|BUS_NAME_REPLACE_EXISTING|BUS_NAME_DO_NOT_QUEUE)) != 0)
887                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
888
889                 r = sd_bus_request_name(a, name, flags);
890                 if (r < 0) {
891                         if (r == -EEXIST)
892                                 return synthetic_reply_method_return(m, "u", BUS_NAME_EXISTS);
893                         if (r == -EALREADY)
894                                 return synthetic_reply_method_return(m, "u", BUS_NAME_ALREADY_OWNER);
895                         return synthetic_reply_method_errno(m, r, NULL);
896                 }
897
898                 if (r == 0)
899                         return synthetic_reply_method_return(m, "u", BUS_NAME_IN_QUEUE);
900
901                 return synthetic_reply_method_return(m, "u", BUS_NAME_PRIMARY_OWNER);
902
903         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "StartServiceByName")) {
904                 _cleanup_bus_message_unref_ sd_bus_message *msg = NULL;
905                 const char *name;
906                 uint32_t flags;
907
908                 r = sd_bus_message_read(m, "su", &name, &flags);
909                 if (r < 0)
910                         return synthetic_reply_method_errno(m, r, NULL);
911
912                 if (!service_name_is_valid(name))
913                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
914                 if (flags != 0)
915                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
916
917                 r = sd_bus_get_owner(a, name, 0, NULL);
918                 if (r >= 0 || streq(name, "org.freedesktop.DBus"))
919                         return synthetic_reply_method_return(m, "u", BUS_START_REPLY_ALREADY_RUNNING);
920                 if (r != -ESRCH)
921                         return synthetic_reply_method_errno(m, r, NULL);
922
923                 r = sd_bus_message_new_method_call(
924                                 a,
925                                 &msg,
926                                 name,
927                                 "/",
928                                 "org.freedesktop.DBus.Peer",
929                                 "Ping");
930                 if (r < 0)
931                         return synthetic_reply_method_errno(m, r, NULL);
932
933                 r = sd_bus_send(a, msg, NULL);
934                 if (r < 0)
935                         return synthetic_reply_method_errno(m, r, NULL);
936
937                 return synthetic_reply_method_return(m, "u", BUS_START_REPLY_SUCCESS);
938
939         } else if (sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "UpdateActivationEnvironment")) {
940                 _cleanup_bus_message_unref_ sd_bus_message *msg = NULL;
941                 _cleanup_strv_free_ char **args = NULL;
942
943                 if (!peer_is_privileged(a, m))
944                         return synthetic_reply_method_errno(m, -EPERM, NULL);
945
946                 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "{ss}");
947                 if (r < 0)
948                         return synthetic_reply_method_errno(m, r, NULL);
949
950                 while ((r = sd_bus_message_enter_container(m, SD_BUS_TYPE_DICT_ENTRY, "ss")) > 0) {
951                         _cleanup_free_ char *s = NULL;
952                         const char *key;
953                         const char *value;
954
955                         r = sd_bus_message_read(m, "ss", &key, &value);
956                         if (r < 0)
957                                 return synthetic_reply_method_errno(m, r, NULL);
958
959                         s = strjoin(key, "=", value, NULL);
960                         if (!s)
961                                 return synthetic_reply_method_errno(m, -ENOMEM, NULL);
962
963                         r  = strv_extend(&args, s);
964                         if (r < 0)
965                                 return synthetic_reply_method_errno(m, r, NULL);
966
967                         r = sd_bus_message_exit_container(m);
968                         if (r < 0)
969                                 return synthetic_reply_method_errno(m, r, NULL);
970                 }
971
972                 r = sd_bus_message_exit_container(m);
973                 if (r < 0)
974                         return synthetic_reply_method_errno(m, r, NULL);
975
976                 if (!args)
977                         return synthetic_reply_method_errno(m, -EINVAL, NULL);
978
979                 r = sd_bus_message_new_method_call(
980                                 a,
981                                 &msg,
982                                 "org.freedesktop.systemd1",
983                                 "/org/freedesktop/systemd1",
984                                 "org.freedesktop.systemd1.Manager",
985                                 "SetEnvironment");
986                 if (r < 0)
987                         return synthetic_reply_method_errno(m, r, NULL);
988
989                 r = sd_bus_message_append_strv(msg, args);
990                 if (r < 0)
991                         return synthetic_reply_method_errno(m, r, NULL);
992
993                 r = sd_bus_call(a, msg, 0, NULL, NULL);
994                 if (r < 0)
995                         return synthetic_reply_method_errno(m, r, NULL);
996
997                return synthetic_reply_method_return(m, NULL);
998
999         } else {
1000                 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1001
1002                 r = sd_bus_error_setf(&error, SD_BUS_ERROR_UNKNOWN_METHOD, "Unknown method '%s'.", m->member);
1003
1004                 return synthetic_reply_method_errno(m, r, &error);
1005         }
1006 }
1007
1008 static int process_hello(sd_bus *a, sd_bus *b, sd_bus_message *m, bool *got_hello) {
1009         _cleanup_bus_message_unref_ sd_bus_message *n = NULL;
1010         bool is_hello;
1011         int r;
1012
1013         assert(a);
1014         assert(b);
1015         assert(m);
1016         assert(got_hello);
1017
1018         /* As reaction to hello we need to respond with two messages:
1019          * the callback reply and the NameAcquired for the unique
1020          * name, since hello is otherwise obsolete on kdbus. */
1021
1022         is_hello =
1023                 sd_bus_message_is_method_call(m, "org.freedesktop.DBus", "Hello") &&
1024                 streq_ptr(m->destination, "org.freedesktop.DBus");
1025
1026         if (!is_hello) {
1027
1028                 if (*got_hello)
1029                         return 0;
1030
1031                 log_error("First packet isn't hello (it's %s.%s), aborting.", m->interface, m->member);
1032                 return -EIO;
1033         }
1034
1035         if (*got_hello) {
1036                 log_error("Got duplicate hello, aborting.");
1037                 return -EIO;
1038         }
1039
1040         *got_hello = true;
1041
1042         if (!a->is_kernel)
1043                 return 0;
1044
1045         r = sd_bus_message_new_method_return(m, &n);
1046         if (r < 0) {
1047                 log_error("Failed to generate HELLO reply: %s", strerror(-r));
1048                 return r;
1049         }
1050
1051         r = sd_bus_message_append(n, "s", a->unique_name);
1052         if (r < 0) {
1053                 log_error("Failed to append unique name to HELLO reply: %s", strerror(-r));
1054                 return r;
1055         }
1056
1057         r = bus_message_append_sender(n, "org.freedesktop.DBus");
1058         if (r < 0) {
1059                 log_error("Failed to append sender to HELLO reply: %s", strerror(-r));
1060                 return r;
1061         }
1062
1063         r = bus_seal_synthetic_message(b, n);
1064         if (r < 0) {
1065                 log_error("Failed to seal HELLO reply: %s", strerror(-r));
1066                 return r;
1067         }
1068
1069         r = sd_bus_send(b, n, NULL);
1070         if (r < 0) {
1071                 log_error("Failed to send HELLO reply: %s", strerror(-r));
1072                 return r;
1073         }
1074
1075         n = sd_bus_message_unref(n);
1076         r = sd_bus_message_new_signal(
1077                         b,
1078                         &n,
1079                         "/org/freedesktop/DBus",
1080                         "org.freedesktop.DBus",
1081                         "NameAcquired");
1082         if (r < 0) {
1083                 log_error("Failed to allocate initial NameAcquired message: %s", strerror(-r));
1084                 return r;
1085         }
1086
1087         r = sd_bus_message_append(n, "s", a->unique_name);
1088         if (r < 0) {
1089                 log_error("Failed to append unique name to NameAcquired message: %s", strerror(-r));
1090                 return r;
1091         }
1092
1093         r = bus_message_append_sender(n, "org.freedesktop.DBus");
1094         if (r < 0) {
1095                 log_error("Failed to append sender to NameAcquired message: %s", strerror(-r));
1096                 return r;
1097         }
1098
1099         r = bus_seal_synthetic_message(b, n);
1100         if (r < 0) {
1101                 log_error("Failed to seal NameAcquired message: %s", strerror(-r));
1102                 return r;
1103         }
1104
1105         r = sd_bus_send(b, n, NULL);
1106         if (r < 0) {
1107                 log_error("Failed to send NameAcquired message: %s", strerror(-r));
1108                 return r;
1109         }
1110
1111         return 1;
1112 }
1113
1114 static int patch_sender(sd_bus *a, sd_bus_message *m) {
1115         char **well_known = NULL;
1116         sd_bus_creds *c;
1117         int r;
1118
1119         assert(a);
1120         assert(m);
1121
1122         if (!a->is_kernel)
1123                 return 0;
1124
1125         /* We will change the sender of messages from the bus driver
1126          * so that they originate from the bus driver. This is a
1127          * speciality originating from dbus1, where the bus driver did
1128          * not have a unique id, but only the well-known name. */
1129
1130         c = sd_bus_message_get_creds(m);
1131         if (!c)
1132                 return 0;
1133
1134         r = sd_bus_creds_get_well_known_names(c, &well_known);
1135         if (r < 0)
1136                 return r;
1137
1138         if (strv_contains(well_known, "org.freedesktop.DBus"))
1139                 m->sender = "org.freedesktop.DBus";
1140
1141         return 0;
1142 }
1143
1144 int main(int argc, char *argv[]) {
1145
1146         _cleanup_bus_close_unref_ sd_bus *a = NULL, *b = NULL;
1147         sd_id128_t server_id;
1148         int r, in_fd, out_fd;
1149         bool got_hello = false;
1150         bool is_unix;
1151         struct ucred ucred = {};
1152         _cleanup_free_ char *peersec = NULL;
1153         Policy policy = {};
1154
1155         log_set_target(LOG_TARGET_JOURNAL_OR_KMSG);
1156         log_parse_environment();
1157         log_open();
1158
1159         r = parse_argv(argc, argv);
1160         if (r <= 0)
1161                 goto finish;
1162
1163         r = policy_load(&policy, arg_configuration);
1164         if (r < 0) {
1165                 log_error("Failed to load policy: %s", strerror(-r));
1166                 goto finish;
1167         }
1168
1169         /* policy_dump(&policy); */
1170
1171         r = sd_listen_fds(0);
1172         if (r == 0) {
1173                 in_fd = STDIN_FILENO;
1174                 out_fd = STDOUT_FILENO;
1175         } else if (r == 1) {
1176                 in_fd = SD_LISTEN_FDS_START;
1177                 out_fd = SD_LISTEN_FDS_START;
1178         } else {
1179                 log_error("Illegal number of file descriptors passed");
1180                 goto finish;
1181         }
1182
1183         is_unix =
1184                 sd_is_socket(in_fd, AF_UNIX, 0, 0) > 0 &&
1185                 sd_is_socket(out_fd, AF_UNIX, 0, 0) > 0;
1186
1187         if (is_unix) {
1188                 r = getpeercred(in_fd, &ucred);
1189                 if (r < 0) {
1190                         log_error("Failed to get peer creds: %s", strerror(-r));
1191                         goto finish;
1192                 }
1193
1194                 (void) getpeersec(in_fd, &peersec);
1195         }
1196
1197         if (arg_drop_privileges) {
1198                 const char *user = "systemd-bus-proxy";
1199                 uid_t uid;
1200                 gid_t gid;
1201
1202                 r = get_user_creds(&user, &uid, &gid, NULL, NULL);
1203                 if (r < 0) {
1204                         log_error("Cannot resolve user name %s: %s", user, strerror(-r));
1205                         goto finish;
1206                 }
1207
1208                 r = drop_privileges(uid, gid, 1ULL << CAP_IPC_OWNER);
1209                 if (r < 0)
1210                         goto finish;
1211         }
1212
1213         r = sd_bus_new(&a);
1214         if (r < 0) {
1215                 log_error("Failed to allocate bus: %s", strerror(-r));
1216                 goto finish;
1217         }
1218
1219         r = sd_bus_set_name(a, "sd-proxy");
1220         if (r < 0) {
1221                 log_error("Failed to set bus name: %s", strerror(-r));
1222                 goto finish;
1223         }
1224
1225         r = sd_bus_set_address(a, arg_address);
1226         if (r < 0) {
1227                 log_error("Failed to set address to connect to: %s", strerror(-r));
1228                 goto finish;
1229         }
1230
1231         r = sd_bus_negotiate_fds(a, is_unix);
1232         if (r < 0) {
1233                 log_error("Failed to set FD negotiation: %s", strerror(-r));
1234                 goto finish;
1235         }
1236
1237         if (ucred.pid > 0) {
1238                 a->fake_creds.pid = ucred.pid;
1239                 a->fake_creds.uid = ucred.uid;
1240                 a->fake_creds.gid = ucred.gid;
1241                 a->fake_creds_valid = true;
1242         }
1243
1244         if (peersec) {
1245                 a->fake_label = peersec;
1246                 peersec = NULL;
1247         }
1248
1249         a->manual_peer_interface = true;
1250
1251         r = sd_bus_start(a);
1252         if (r < 0) {
1253                 log_error("Failed to start bus client: %s", strerror(-r));
1254                 goto finish;
1255         }
1256
1257         r = sd_bus_get_server_id(a, &server_id);
1258         if (r < 0) {
1259                 log_error("Failed to get server ID: %s", strerror(-r));
1260                 goto finish;
1261         }
1262
1263         r = sd_bus_new(&b);
1264         if (r < 0) {
1265                 log_error("Failed to allocate bus: %s", strerror(-r));
1266                 goto finish;
1267         }
1268
1269         r = sd_bus_set_fd(b, in_fd, out_fd);
1270         if (r < 0) {
1271                 log_error("Failed to set fds: %s", strerror(-r));
1272                 goto finish;
1273         }
1274
1275         r = sd_bus_set_server(b, 1, server_id);
1276         if (r < 0) {
1277                 log_error("Failed to set server mode: %s", strerror(-r));
1278                 goto finish;
1279         }
1280
1281         r = sd_bus_negotiate_fds(b, is_unix);
1282         if (r < 0) {
1283                 log_error("Failed to set FD negotiation: %s", strerror(-r));
1284                 goto finish;
1285         }
1286
1287         r = sd_bus_set_anonymous(b, true);
1288         if (r < 0) {
1289                 log_error("Failed to set anonymous authentication: %s", strerror(-r));
1290                 goto finish;
1291         }
1292
1293         b->manual_peer_interface = true;
1294
1295         r = sd_bus_start(b);
1296         if (r < 0) {
1297                 log_error("Failed to start bus client: %s", strerror(-r));
1298                 goto finish;
1299         }
1300
1301         r = rename_service(a, b);
1302         if (r < 0)
1303                 log_debug("Failed to rename process: %s", strerror(-r));
1304
1305         if (a->is_kernel) {
1306                 _cleanup_free_ char *match = NULL;
1307                 const char *unique;
1308
1309                 r = sd_bus_get_unique_name(a, &unique);
1310                 if (r < 0) {
1311                         log_error("Failed to get unique name: %s", strerror(-r));
1312                         goto finish;
1313                 }
1314
1315                 match = strjoin("type='signal',"
1316                                 "sender='org.freedesktop.DBus',"
1317                                 "path='/org/freedesktop/DBus',"
1318                                 "interface='org.freedesktop.DBus',"
1319                                 "member='NameOwnerChanged',"
1320                                 "arg1='",
1321                                 unique,
1322                                 "'",
1323                                 NULL);
1324                 if (!match) {
1325                         log_oom();
1326                         goto finish;
1327                 }
1328
1329                 r = sd_bus_add_match(a, NULL, match, NULL, NULL);
1330                 if (r < 0) {
1331                         log_error("Failed to add match for NameLost: %s", strerror(-r));
1332                         goto finish;
1333                 }
1334
1335                 free(match);
1336                 match = strjoin("type='signal',"
1337                                 "sender='org.freedesktop.DBus',"
1338                                 "path='/org/freedesktop/DBus',"
1339                                 "interface='org.freedesktop.DBus',"
1340                                 "member='NameOwnerChanged',"
1341                                 "arg2='",
1342                                 unique,
1343                                 "'",
1344                                 NULL);
1345                 if (!match) {
1346                         log_oom();
1347                         goto finish;
1348                 }
1349
1350                 r = sd_bus_add_match(a, NULL, match, NULL, NULL);
1351                 if (r < 0) {
1352                         log_error("Failed to add match for NameAcquired: %s", strerror(-r));
1353                         goto finish;
1354                 }
1355         }
1356
1357         for (;;) {
1358                 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
1359                 int events_a, events_b, fd;
1360                 uint64_t timeout_a, timeout_b, t;
1361                 struct timespec _ts, *ts;
1362                 struct pollfd *pollfd;
1363                 int k;
1364
1365                 if (got_hello) {
1366                         r = sd_bus_process(a, &m);
1367                         if (r < 0) {
1368                                 /* treat 'connection reset by peer' as clean exit condition */
1369                                 if (r == -ECONNRESET)
1370                                         r = 0;
1371                                 else
1372                                         log_error("Failed to process bus a: %s", strerror(-r));
1373
1374                                 goto finish;
1375                         }
1376
1377                         if (m) {
1378                                 /* We officially got EOF, let's quit */
1379                                 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected")) {
1380                                         r = 0;
1381                                         goto finish;
1382                                 }
1383
1384                                 k = synthesize_name_acquired(a, b, m);
1385                                 if (k < 0) {
1386                                         r = k;
1387                                         log_error("Failed to synthesize message: %s", strerror(-r));
1388                                         goto finish;
1389                                 }
1390
1391                                 patch_sender(a, m);
1392
1393                                 k = sd_bus_send(b, m, NULL);
1394                                 if (k < 0) {
1395                                         if (k == -ECONNRESET)
1396                                                 r = 0;
1397                                         else {
1398                                                 r = k;
1399                                                 log_error("Failed to send message: %s", strerror(-r));
1400                                         }
1401
1402                                         goto finish;
1403                                 }
1404                         }
1405
1406                         if (r > 0)
1407                                 continue;
1408                 }
1409
1410                 r = sd_bus_process(b, &m);
1411                 if (r < 0) {
1412                         /* treat 'connection reset by peer' as clean exit condition */
1413                         if (r == -ECONNRESET)
1414                                 r = 0;
1415                         else
1416                                 log_error("Failed to process bus b: %s", strerror(-r));
1417
1418                         goto finish;
1419                 }
1420
1421                 if (m) {
1422                         /* We officially got EOF, let's quit */
1423                         if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected")) {
1424                                 r = 0;
1425                                 goto finish;
1426                         }
1427
1428                         k = process_hello(a, b, m, &got_hello);
1429                         if (k < 0) {
1430                                 r = k;
1431                                 log_error("Failed to process HELLO: %s", strerror(-r));
1432                                 goto finish;
1433                         }
1434
1435                         if (k > 0)
1436                                 r = k;
1437                         else {
1438                                 k = process_policy(a, b, m);
1439                                 if (k < 0) {
1440                                         r = k;
1441                                         log_error("Failed to process policy: %s", strerror(-r));
1442                                         goto finish;
1443                                 }
1444
1445                                 k = process_driver(a, b, m);
1446                                 if (k < 0) {
1447                                         r = k;
1448                                         log_error("Failed to process driver calls: %s", strerror(-r));
1449                                         goto finish;
1450                                 }
1451
1452                                 if (k > 0)
1453                                         r = k;
1454                                 else {
1455                                         k = sd_bus_send(a, m, NULL);
1456                                         if (k < 0) {
1457                                                 if (k == -ECONNRESET)
1458                                                         r = 0;
1459                                                 else {
1460                                                         r = k;
1461                                                         log_error("Failed to send message: %s", strerror(-r));
1462                                                 }
1463
1464                                                 goto finish;
1465                                         }
1466                                 }
1467                         }
1468                 }
1469
1470                 if (r > 0)
1471                         continue;
1472
1473                 fd = sd_bus_get_fd(a);
1474                 if (fd < 0) {
1475                         log_error("Failed to get fd: %s", strerror(-r));
1476                         goto finish;
1477                 }
1478
1479                 events_a = sd_bus_get_events(a);
1480                 if (events_a < 0) {
1481                         log_error("Failed to get events mask: %s", strerror(-r));
1482                         goto finish;
1483                 }
1484
1485                 r = sd_bus_get_timeout(a, &timeout_a);
1486                 if (r < 0) {
1487                         log_error("Failed to get timeout: %s", strerror(-r));
1488                         goto finish;
1489                 }
1490
1491                 events_b = sd_bus_get_events(b);
1492                 if (events_b < 0) {
1493                         log_error("Failed to get events mask: %s", strerror(-r));
1494                         goto finish;
1495                 }
1496
1497                 r = sd_bus_get_timeout(b, &timeout_b);
1498                 if (r < 0) {
1499                         log_error("Failed to get timeout: %s", strerror(-r));
1500                         goto finish;
1501                 }
1502
1503                 t = timeout_a;
1504                 if (t == (uint64_t) -1 || (timeout_b != (uint64_t) -1 && timeout_b < timeout_a))
1505                         t = timeout_b;
1506
1507                 if (t == (uint64_t) -1)
1508                         ts = NULL;
1509                 else {
1510                         usec_t nw;
1511
1512                         nw = now(CLOCK_MONOTONIC);
1513                         if (t > nw)
1514                                 t -= nw;
1515                         else
1516                                 t = 0;
1517
1518                         ts = timespec_store(&_ts, t);
1519                 }
1520
1521                 pollfd = (struct pollfd[3]) {
1522                         {.fd = fd,     .events = events_a,           },
1523                         {.fd = in_fd,  .events = events_b & POLLIN,  },
1524                         {.fd = out_fd, .events = events_b & POLLOUT, }
1525                 };
1526
1527                 r = ppoll(pollfd, 3, ts, NULL);
1528                 if (r < 0) {
1529                         log_error("ppoll() failed: %m");
1530                         goto finish;
1531                 }
1532         }
1533
1534 finish:
1535         sd_notify(false,
1536                   "STOPPING=1\n"
1537                   "STATUS=Shutting down.");
1538
1539         policy_free(&policy);
1540         strv_free(arg_configuration);
1541         free(arg_address);
1542
1543         return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1544 }