1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2013 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #ifdef HAVE_VALGRIND_MEMCHECK_H
23 #include <valgrind/memcheck.h>
29 #include <sys/prctl.h>
34 #include "bus-internal.h"
35 #include "bus-message.h"
36 #include "bus-kernel.h"
37 #include "bus-bloom.h"
39 #include "cgroup-util.h"
41 #define UNIQUE_NAME_MAX (3+DECIMAL_STR_MAX(uint64_t))
43 int bus_kernel_parse_unique_name(const char *s, uint64_t *id) {
49 if (!startswith(s, ":1."))
52 r = safe_atou64(s + 3, id);
59 static void append_payload_vec(struct kdbus_item **d, const void *p, size_t sz) {
65 /* Note that p can be NULL, which encodes a region full of
66 * zeroes, which is useful to optimize certain padding
69 (*d)->size = offsetof(struct kdbus_item, vec) + sizeof(struct kdbus_vec);
70 (*d)->type = KDBUS_ITEM_PAYLOAD_VEC;
71 (*d)->vec.address = PTR_TO_UINT64(p);
74 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
77 static void append_payload_memfd(struct kdbus_item **d, int memfd, size_t sz) {
83 (*d)->size = offsetof(struct kdbus_item, memfd) + sizeof(struct kdbus_memfd);
84 (*d)->type = KDBUS_ITEM_PAYLOAD_MEMFD;
85 (*d)->memfd.fd = memfd;
86 (*d)->memfd.size = sz;
88 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
91 static void append_destination(struct kdbus_item **d, const char *s, size_t length) {
97 (*d)->size = offsetof(struct kdbus_item, str) + length + 1;
98 (*d)->type = KDBUS_ITEM_DST_NAME;
99 memcpy((*d)->str, s, length + 1);
101 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
104 static void* append_bloom(struct kdbus_item **d, size_t length) {
111 (*d)->size = offsetof(struct kdbus_item, data) + length;
112 (*d)->type = KDBUS_ITEM_BLOOM;
115 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
120 static void append_fds(struct kdbus_item **d, const int fds[], unsigned n_fds) {
126 (*d)->size = offsetof(struct kdbus_item, fds) + sizeof(int) * n_fds;
127 (*d)->type = KDBUS_ITEM_FDS;
128 memcpy((*d)->fds, fds, sizeof(int) * n_fds);
130 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
133 static int bus_message_setup_bloom(sd_bus_message *m, void *bloom) {
140 memset(bloom, 0, BLOOM_SIZE);
142 bloom_add_pair(bloom, "message-type", bus_message_type_to_string(m->header->type));
145 bloom_add_pair(bloom, "interface", m->interface);
147 bloom_add_pair(bloom, "member", m->member);
149 bloom_add_pair(bloom, "path", m->path);
150 bloom_add_pair(bloom, "path-slash-prefix", m->path);
151 bloom_add_prefixes(bloom, "path-slash-prefix", m->path, '/');
154 r = sd_bus_message_rewind(m, true);
158 for (i = 0; i < 64; i++) {
161 char buf[sizeof("arg")-1 + 2 + sizeof("-slash-prefix")];
164 r = sd_bus_message_peek_type(m, &type, NULL);
168 if (type != SD_BUS_TYPE_STRING &&
169 type != SD_BUS_TYPE_OBJECT_PATH &&
170 type != SD_BUS_TYPE_SIGNATURE)
173 r = sd_bus_message_read_basic(m, type, &t);
177 e = stpcpy(buf, "arg");
179 *(e++) = '0' + (char) i;
181 *(e++) = '0' + (char) (i / 10);
182 *(e++) = '0' + (char) (i % 10);
186 bloom_add_pair(bloom, buf, t);
188 strcpy(e, "-dot-prefix");
189 bloom_add_prefixes(bloom, buf, t, '.');
190 strcpy(e, "-slash-prefix");
191 bloom_add_prefixes(bloom, buf, t, '/');
197 static int bus_message_setup_kmsg(sd_bus *b, sd_bus_message *m) {
198 struct bus_body_part *part;
199 struct kdbus_item *d;
210 /* We put this together only once, if this message is reused
211 * we reuse the earlier-built version */
215 if (m->destination) {
216 r = bus_kernel_parse_unique_name(m->destination, &unique);
224 sz = offsetof(struct kdbus_msg, items);
226 assert_cc(ALIGN8(offsetof(struct kdbus_item, vec) + sizeof(struct kdbus_vec)) ==
227 ALIGN8(offsetof(struct kdbus_item, memfd) + sizeof(struct kdbus_memfd)));
229 /* Add in fixed header, fields header and payload */
230 sz += (1 + m->n_body_parts) *
231 ALIGN8(offsetof(struct kdbus_item, vec) + sizeof(struct kdbus_vec));
233 /* Add space for bloom filter */
234 sz += ALIGN8(offsetof(struct kdbus_item, data) + BLOOM_SIZE);
236 /* Add in well-known destination header */
238 dl = strlen(m->destination);
239 sz += ALIGN8(offsetof(struct kdbus_item, str) + dl + 1);
242 /* Add space for unix fds */
244 sz += ALIGN8(offsetof(struct kdbus_item, fds) + sizeof(int)*m->n_fds);
246 m->kdbus = memalign(8, sz);
252 m->free_kdbus = true;
253 memset(m->kdbus, 0, sz);
256 ((m->header->flags & BUS_MESSAGE_NO_REPLY_EXPECTED) ? 0 : KDBUS_MSG_FLAGS_EXPECT_REPLY) |
257 ((m->header->flags & BUS_MESSAGE_NO_AUTO_START) ? KDBUS_MSG_FLAGS_NO_AUTO_START : 0);
260 m->destination ? unique : KDBUS_DST_ID_BROADCAST;
261 m->kdbus->payload_type = KDBUS_PAYLOAD_DBUS;
262 m->kdbus->cookie = m->header->serial;
264 if (m->header->flags & BUS_MESSAGE_NO_REPLY_EXPECTED)
265 m->kdbus->cookie_reply = m->reply_cookie;
267 m->kdbus->timeout_ns = m->timeout * NSEC_PER_USEC;
272 append_destination(&d, m->destination, dl);
274 append_payload_vec(&d, m->header, BUS_MESSAGE_BODY_BEGIN(m));
276 MESSAGE_FOREACH_PART(part, i, m) {
278 /* If this is padding then simply send a
279 * vector with a NULL data pointer which the
280 * kernel will just pass through. This is the
281 * most efficient way to encode zeroes */
283 append_payload_vec(&d, NULL, part->size);
287 if (part->memfd >= 0 && part->sealed && m->destination) {
288 /* Try to send a memfd, if the part is
289 * sealed and this is not a broadcast. Since we can only */
291 append_payload_memfd(&d, part->memfd, part->size);
295 /* Otherwise let's send a vector to the actual data,
296 * for that we need to map it first. */
297 r = bus_body_part_map(part);
301 append_payload_vec(&d, part->data, part->size);
304 if (m->kdbus->dst_id == KDBUS_DST_ID_BROADCAST) {
307 p = append_bloom(&d, BLOOM_SIZE);
308 r = bus_message_setup_bloom(m, p);
314 append_fds(&d, m->fds, m->n_fds);
316 m->kdbus->size = (uint8_t*) d - (uint8_t*) m->kdbus;
317 assert(m->kdbus->size <= sz);
326 static int bus_kernel_make_message(sd_bus *bus, struct kdbus_msg *k) {
327 sd_bus_message *m = NULL;
328 struct kdbus_item *d;
330 _cleanup_free_ int *fds = NULL;
331 struct bus_header *h = NULL;
332 size_t total, n_bytes = 0, idx = 0;
333 const char *destination = NULL, *seclabel = NULL;
338 assert(k->payload_type == KDBUS_PAYLOAD_DBUS);
340 KDBUS_ITEM_FOREACH(d, k, items) {
343 l = d->size - offsetof(struct kdbus_item, data);
347 case KDBUS_ITEM_PAYLOAD_OFF:
349 h = (struct bus_header *)((uint8_t *)k + d->vec.offset);
351 if (!bus_header_is_complete(h, d->vec.size))
355 n_bytes += d->vec.size;
358 case KDBUS_ITEM_PAYLOAD_MEMFD:
362 n_bytes += d->memfd.size;
365 case KDBUS_ITEM_FDS: {
370 f = realloc(fds, sizeof(int) * (n_fds + j));
375 memcpy(fds + n_fds, d->fds, sizeof(int) * j);
380 case KDBUS_ITEM_SECLABEL:
389 r = bus_header_message_size(h, &total);
393 if (n_bytes != total)
396 /* on kdbus we only speak native endian gvariant, never dbus1
397 * marshalling or reverse endian */
398 if (h->version != 2 ||
399 h->endian != BUS_NATIVE_ENDIAN)
402 r = bus_message_from_header(bus, h, sizeof(struct bus_header), fds, n_fds, NULL, seclabel, 0, &m);
406 /* The well-known names list is different from the other
407 credentials. If we asked for it, but nothing is there, this
408 means that the list of well-known names is simply empty, not
409 that we lack any data */
411 m->creds.mask |= (SD_BUS_CREDS_UNIQUE_NAME|SD_BUS_CREDS_WELL_KNOWN_NAMES) & bus->creds_mask;
413 KDBUS_ITEM_FOREACH(d, k, items) {
416 l = d->size - offsetof(struct kdbus_item, data);
420 case KDBUS_ITEM_PAYLOAD_OFF: {
423 begin_body = BUS_MESSAGE_BODY_BEGIN(m);
425 if (idx + d->vec.size > begin_body) {
426 struct bus_body_part *part;
428 /* Contains body material */
430 part = message_append_part(m);
436 /* A -1 offset is NUL padding. */
437 part->is_zero = d->vec.offset == ~0ULL;
439 if (idx >= begin_body) {
441 part->data = (uint8_t *)k + d->vec.offset;
442 part->size = d->vec.size;
445 part->data = (uint8_t *)k + d->vec.offset + (begin_body - idx);
446 part->size = d->vec.size - (begin_body - idx);
456 case KDBUS_ITEM_PAYLOAD_MEMFD: {
457 struct bus_body_part *part;
459 if (idx < BUS_MESSAGE_BODY_BEGIN(m)) {
464 part = message_append_part(m);
470 part->memfd = d->memfd.fd;
471 part->size = d->memfd.size;
474 idx += d->memfd.size;
478 case KDBUS_ITEM_CREDS:
479 /* UID/GID/PID are always valid */
480 m->creds.uid = (uid_t) d->creds.uid;
481 m->creds.gid = (gid_t) d->creds.gid;
482 m->creds.pid = (pid_t) d->creds.pid;
483 m->creds.mask |= (SD_BUS_CREDS_UID|SD_BUS_CREDS_GID|SD_BUS_CREDS_PID) & bus->creds_mask;
485 /* The PID starttime/TID might be missing
486 * however, when the data is faked by some
487 * data bus proxy and it lacks that
488 * information about the real client since
489 * SO_PEERCRED is used for that */
491 if (d->creds.starttime > 0) {
492 m->creds.pid_starttime = d->creds.starttime / NSEC_PER_USEC;
493 m->creds.mask |= SD_BUS_CREDS_PID_STARTTIME & bus->creds_mask;
496 if (d->creds.tid > 0) {
497 m->creds.tid = (pid_t) d->creds.tid;
498 m->creds.mask |= SD_BUS_CREDS_TID & bus->creds_mask;
502 case KDBUS_ITEM_TIMESTAMP:
503 m->realtime = d->timestamp.realtime_ns / NSEC_PER_USEC;
504 m->monotonic = d->timestamp.monotonic_ns / NSEC_PER_USEC;
505 m->seqnum = d->timestamp.seqnum;
508 case KDBUS_ITEM_PID_COMM:
509 m->creds.comm = d->str;
510 m->creds.mask |= SD_BUS_CREDS_COMM & bus->creds_mask;
513 case KDBUS_ITEM_TID_COMM:
514 m->creds.tid_comm = d->str;
515 m->creds.mask |= SD_BUS_CREDS_TID_COMM & bus->creds_mask;
519 m->creds.exe = d->str;
520 m->creds.mask |= SD_BUS_CREDS_EXE & bus->creds_mask;
523 case KDBUS_ITEM_CMDLINE:
524 m->creds.cmdline = d->str;
525 m->creds.cmdline_size = l;
526 m->creds.mask |= SD_BUS_CREDS_CMDLINE & bus->creds_mask;
529 case KDBUS_ITEM_CGROUP:
530 m->creds.cgroup = d->str;
531 m->creds.mask |= (SD_BUS_CREDS_CGROUP|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_USER_UNIT|SD_BUS_CREDS_SLICE|SD_BUS_CREDS_SESSION|SD_BUS_CREDS_OWNER_UID) & bus->creds_mask;
533 if (!bus->cgroup_root) {
534 r = cg_get_root_path(&bus->cgroup_root);
539 m->creds.cgroup_root = bus->cgroup_root;
543 case KDBUS_ITEM_AUDIT:
544 m->creds.audit_session_id = (uint32_t) d->audit.sessionid;
545 m->creds.audit_login_uid = (uid_t) d->audit.loginuid;
546 m->creds.mask |= (SD_BUS_CREDS_AUDIT_SESSION_ID|SD_BUS_CREDS_AUDIT_LOGIN_UID) & bus->creds_mask;
549 case KDBUS_ITEM_CAPS:
550 m->creds.capability = d->data;
551 m->creds.capability_size = l;
552 m->creds.mask |= (SD_BUS_CREDS_EFFECTIVE_CAPS|SD_BUS_CREDS_PERMITTED_CAPS|SD_BUS_CREDS_INHERITABLE_CAPS|SD_BUS_CREDS_BOUNDING_CAPS) & bus->creds_mask;
555 case KDBUS_ITEM_DST_NAME:
556 if (!service_name_is_valid(d->str))
559 destination = d->str;
562 case KDBUS_ITEM_NAME:
563 if (!service_name_is_valid(d->name.name))
566 r = strv_extend(&m->creds.well_known_names, d->name.name);
572 case KDBUS_ITEM_SECLABEL:
576 log_debug("Got unknown field from kernel %llu", d->type);
580 r = bus_message_parse_fields(m);
584 /* Override information from the user header with data from the kernel */
585 if (k->src_id == KDBUS_SRC_ID_KERNEL)
586 m->sender = m->creds.unique_name = (char*) "org.freedesktop.DBus";
588 snprintf(m->sender_buffer, sizeof(m->sender_buffer), ":1.%llu", (unsigned long long) k->src_id);
589 m->sender = m->creds.unique_name = m->sender_buffer;
593 m->destination = destination;
594 else if (k->dst_id == KDBUS_DST_ID_BROADCAST)
595 m->destination = NULL;
596 else if (k->dst_id == KDBUS_DST_ID_NAME)
597 m->destination = bus->unique_name; /* fill in unique name if the well-known name is missing */
599 snprintf(m->destination_buffer, sizeof(m->destination_buffer), ":1.%llu", (unsigned long long) k->dst_id);
600 m->destination = m->destination_buffer;
603 /* We take possession of the kmsg struct now */
605 m->release_kdbus = true;
609 bus->rqueue[bus->rqueue_size++] = m;
615 struct bus_body_part *part;
618 /* Make sure the memfds are not freed twice */
619 MESSAGE_FOREACH_PART(part, i, m)
620 if (part->memfd >= 0)
623 sd_bus_message_unref(m);
629 int bus_kernel_take_fd(sd_bus *b) {
630 struct kdbus_cmd_hello *hello;
631 struct kdbus_item *item;
632 _cleanup_free_ char *g = NULL;
634 size_t l = 0, m = 0, sz;
644 if (b->connection_name) {
645 g = sd_bus_label_escape(b->connection_name);
653 /* If no name is explicitly set, we'll include a hint
654 * indicating the library implementation, a hint which
655 * kind of bus this is and the thread name */
657 assert_se(prctl(PR_GET_NAME, (unsigned long) pr) >= 0);
660 name = b->is_system ? "sd-system" :
661 b->is_user ? "sd-user" : "sd";
663 _cleanup_free_ char *e = NULL;
665 e = sd_bus_label_escape(pr);
669 g = strappend(b->is_system ? "sd-system-" :
670 b->is_user ? "sd-user-" : "sd-",
678 b->connection_name = sd_bus_label_unescape(name);
679 if (!b->connection_name)
685 sz = ALIGN8(offsetof(struct kdbus_cmd_hello, items)) +
686 ALIGN8(offsetof(struct kdbus_item, str) + m + 1);
688 if (b->fake_creds_valid)
689 sz += ALIGN8(offsetof(struct kdbus_item, creds) + sizeof(struct kdbus_creds));
692 l = strlen(b->fake_label);
693 sz += ALIGN8(offsetof(struct kdbus_item, str) + l + 1);
698 hello->conn_flags = b->hello_flags;
699 hello->attach_flags = b->attach_flags;
700 hello->pool_size = KDBUS_POOL_SIZE;
704 item->size = offsetof(struct kdbus_item, str) + m + 1;
705 item->type = KDBUS_ITEM_CONN_NAME;
706 memcpy(item->str, name, m + 1);
707 item = KDBUS_ITEM_NEXT(item);
709 if (b->fake_creds_valid) {
710 item->size = offsetof(struct kdbus_item, creds) + sizeof(struct kdbus_creds);
711 item->type = KDBUS_ITEM_CREDS;
712 item->creds = b->fake_creds;
714 item = KDBUS_ITEM_NEXT(item);
718 item->size = offsetof(struct kdbus_item, str) + l + 1;
719 item->type = KDBUS_ITEM_SECLABEL;
720 memcpy(item->str, b->fake_label, l+1);
723 r = ioctl(b->input_fd, KDBUS_CMD_HELLO, hello);
727 if (!b->kdbus_buffer) {
728 b->kdbus_buffer = mmap(NULL, KDBUS_POOL_SIZE, PROT_READ, MAP_SHARED, b->input_fd, 0);
729 if (b->kdbus_buffer == MAP_FAILED) {
730 b->kdbus_buffer = NULL;
735 /* The higher 32bit of both flags fields are considered
736 * 'incompatible flags'. Refuse them all for now. */
737 if (hello->bus_flags > 0xFFFFFFFFULL ||
738 hello->conn_flags > 0xFFFFFFFFULL)
741 if (hello->bloom_size != BLOOM_SIZE)
744 if (asprintf(&b->unique_name, ":1.%llu", (unsigned long long) hello->id) < 0)
747 b->unique_id = hello->id;
750 b->bus_client = true;
751 b->can_fds = !!(hello->conn_flags & KDBUS_HELLO_ACCEPT_FD);
752 b->message_version = 2;
753 b->message_endian = BUS_NATIVE_ENDIAN;
755 /* the kernel told us the UUID of the underlying bus */
756 memcpy(b->server_id.bytes, hello->id128, sizeof(b->server_id.bytes));
758 return bus_start_running(b);
761 int bus_kernel_connect(sd_bus *b) {
763 assert(b->input_fd < 0);
764 assert(b->output_fd < 0);
770 b->input_fd = open(b->kernel, O_RDWR|O_NOCTTY|O_CLOEXEC);
774 b->output_fd = b->input_fd;
776 return bus_kernel_take_fd(b);
779 static void close_kdbus_msg(sd_bus *bus, struct kdbus_msg *k) {
781 struct kdbus_item *d;
786 off = (uint8_t *)k - (uint8_t *)bus->kdbus_buffer;
787 ioctl(bus->input_fd, KDBUS_CMD_FREE, &off);
789 KDBUS_ITEM_FOREACH(d, k, items) {
791 if (d->type == KDBUS_ITEM_FDS)
792 close_many(d->fds, (d->size - offsetof(struct kdbus_item, fds)) / sizeof(int));
793 else if (d->type == KDBUS_ITEM_PAYLOAD_MEMFD)
794 close_nointr_nofail(d->memfd.fd);
798 int bus_kernel_write_message(sd_bus *bus, sd_bus_message *m, bool hint_sync_call) {
803 assert(bus->state == BUS_RUNNING);
805 /* If we can't deliver, we want room for the error message */
806 r = bus_rqueue_make_room(bus);
810 r = bus_message_setup_kmsg(bus, m);
814 /* If this is a synchronous method call, then let's tell the
815 * kernel, so that it can pass CPU time/scheduling to the
816 * destination for the time, if it wants to. If we
817 * synchronously wait for the result anyway, we won't need CPU
820 m->kdbus->flags |= KDBUS_MSG_FLAGS_EXPECT_REPLY|KDBUS_MSG_FLAGS_SYNC_REPLY;
822 r = ioctl(bus->output_fd, KDBUS_CMD_MSG_SEND, m->kdbus);
824 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
825 sd_bus_message *reply;
827 if (errno == EAGAIN || errno == EINTR)
829 else if (errno == ENXIO || errno == ESRCH) {
831 /* ENXIO: unique name not known
832 * ESRCH: well-known name not known */
834 if (m->header->type == SD_BUS_MESSAGE_METHOD_CALL)
835 sd_bus_error_setf(&error, SD_BUS_ERROR_SERVICE_UNKNOWN, "Destination %s not known", m->destination);
837 log_debug("Could not deliver message to %s as destination is not known. Ignoring.", m->destination);
841 } else if (errno == EADDRNOTAVAIL) {
843 /* EADDRNOTAVAIL: activation is possible, but turned off in request flags */
845 if (m->header->type == SD_BUS_MESSAGE_METHOD_CALL)
846 sd_bus_error_setf(&error, SD_BUS_ERROR_SERVICE_UNKNOWN, "Activation of %s not requested", m->destination);
848 log_debug("Could not deliver message to %s as destination is not activated. Ignoring.", m->destination);
854 r = bus_message_new_synthetic_error(
856 BUS_MESSAGE_COOKIE(m),
863 r = bus_seal_synthetic_message(bus, reply);
867 bus->rqueue[bus->rqueue_size++] = reply;
869 } else if (hint_sync_call) {
872 k = (struct kdbus_msg *)((uint8_t *)bus->kdbus_buffer + m->kdbus->offset_reply);
875 if (k->payload_type == KDBUS_PAYLOAD_DBUS) {
877 r = bus_kernel_make_message(bus, k);
879 close_kdbus_msg(bus, k);
881 /* Anybody can send us invalid messages, let's just drop them. */
882 if (r == -EBADMSG || r == -EPROTOTYPE)
883 log_debug("Ignoring invalid message: %s", strerror(-r));
888 log_debug("Ignoring message with unknown payload type %llu.", (unsigned long long) k->payload_type);
889 close_kdbus_msg(bus, k);
896 static int push_name_owner_changed(sd_bus *bus, const char *name, const char *old_owner, const char *new_owner) {
897 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
902 r = sd_bus_message_new_signal(
904 "/org/freedesktop/DBus",
905 "org.freedesktop.DBus",
911 r = sd_bus_message_append(m, "sss", name, old_owner, new_owner);
915 m->sender = "org.freedesktop.DBus";
917 r = bus_seal_synthetic_message(bus, m);
921 bus->rqueue[bus->rqueue_size++] = m;
927 static int translate_name_change(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) {
928 char new_owner[UNIQUE_NAME_MAX], old_owner[UNIQUE_NAME_MAX];
934 if (d->type == KDBUS_ITEM_NAME_ADD || (d->name_change.old.flags & (KDBUS_NAME_IN_QUEUE|KDBUS_NAME_ACTIVATOR)))
937 sprintf(old_owner, ":1.%llu", (unsigned long long) d->name_change.old.id);
939 if (d->type == KDBUS_ITEM_NAME_REMOVE || (d->name_change.new.flags & (KDBUS_NAME_IN_QUEUE|KDBUS_NAME_ACTIVATOR))) {
941 if (isempty(old_owner))
946 sprintf(new_owner, ":1.%llu", (unsigned long long) d->name_change.new.id);
948 return push_name_owner_changed(bus, d->name_change.name, old_owner, new_owner);
951 static int translate_id_change(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) {
952 char owner[UNIQUE_NAME_MAX];
958 sprintf(owner, ":1.%llu", d->id_change.id);
960 return push_name_owner_changed(
962 d->type == KDBUS_ITEM_ID_ADD ? NULL : owner,
963 d->type == KDBUS_ITEM_ID_ADD ? owner : NULL);
966 static int translate_reply(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) {
967 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
974 r = bus_message_new_synthetic_error(
977 d->type == KDBUS_ITEM_REPLY_TIMEOUT ?
978 &SD_BUS_ERROR_MAKE_CONST(SD_BUS_ERROR_NO_REPLY, "Method call timed out") :
979 &SD_BUS_ERROR_MAKE_CONST(SD_BUS_ERROR_NO_REPLY, "Method call peer died"),
984 m->sender = "org.freedesktop.DBus";
986 r = bus_seal_synthetic_message(bus, m);
990 bus->rqueue[bus->rqueue_size++] = m;
996 static int bus_kernel_translate_message(sd_bus *bus, struct kdbus_msg *k) {
997 struct kdbus_item *d, *found = NULL;
999 static int (* const translate[])(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) = {
1000 [KDBUS_ITEM_NAME_ADD - _KDBUS_ITEM_KERNEL_BASE] = translate_name_change,
1001 [KDBUS_ITEM_NAME_REMOVE - _KDBUS_ITEM_KERNEL_BASE] = translate_name_change,
1002 [KDBUS_ITEM_NAME_CHANGE - _KDBUS_ITEM_KERNEL_BASE] = translate_name_change,
1004 [KDBUS_ITEM_ID_ADD - _KDBUS_ITEM_KERNEL_BASE] = translate_id_change,
1005 [KDBUS_ITEM_ID_REMOVE - _KDBUS_ITEM_KERNEL_BASE] = translate_id_change,
1007 [KDBUS_ITEM_REPLY_TIMEOUT - _KDBUS_ITEM_KERNEL_BASE] = translate_reply,
1008 [KDBUS_ITEM_REPLY_DEAD - _KDBUS_ITEM_KERNEL_BASE] = translate_reply,
1013 assert(k->payload_type == KDBUS_PAYLOAD_KERNEL);
1015 KDBUS_ITEM_FOREACH(d, k, items) {
1016 if (d->type >= _KDBUS_ITEM_KERNEL_BASE && d->type < _KDBUS_ITEM_KERNEL_BASE + ELEMENTSOF(translate)) {
1021 log_debug("Got unknown field from kernel %llu", d->type);
1025 log_debug("Didn't find a kernel message to translate.");
1029 return translate[found->type - _KDBUS_ITEM_KERNEL_BASE](bus, k, found);
1032 int bus_kernel_read_message(sd_bus *bus) {
1033 struct kdbus_cmd_recv recv = {};
1034 struct kdbus_msg *k;
1039 r = bus_rqueue_make_room(bus);
1043 r = ioctl(bus->input_fd, KDBUS_CMD_MSG_RECV, &recv);
1045 if (errno == EAGAIN)
1051 k = (struct kdbus_msg *)((uint8_t *)bus->kdbus_buffer + recv.offset);
1052 if (k->payload_type == KDBUS_PAYLOAD_DBUS) {
1053 r = bus_kernel_make_message(bus, k);
1055 /* Anybody can send us invalid messages, let's just drop them. */
1056 if (r == -EBADMSG || r == -EPROTOTYPE) {
1057 log_debug("Ignoring invalid message: %s", strerror(-r));
1061 } else if (k->payload_type == KDBUS_PAYLOAD_KERNEL)
1062 r = bus_kernel_translate_message(bus, k);
1064 log_debug("Ignoring message with unknown payload type %llu.", (unsigned long long) k->payload_type);
1069 close_kdbus_msg(bus, k);
1071 return r < 0 ? r : 1;
1074 int bus_kernel_pop_memfd(sd_bus *bus, void **address, size_t *mapped, size_t *allocated) {
1075 struct memfd_cache *c;
1082 if (!bus || !bus->is_kernel)
1085 assert_se(pthread_mutex_lock(&bus->memfd_cache_mutex) >= 0);
1087 if (bus->n_memfd_cache <= 0) {
1088 _cleanup_free_ char *g = NULL;
1089 struct kdbus_cmd_memfd_make *cmd;
1090 struct kdbus_item *item;
1094 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1096 assert(bus->connection_name);
1098 g = sd_bus_label_escape(bus->connection_name);
1103 sz = ALIGN8(offsetof(struct kdbus_cmd_memfd_make, items)) +
1104 ALIGN8(offsetof(struct kdbus_item, str)) +
1110 item->size = ALIGN8(offsetof(struct kdbus_item, str)) + l + 1;
1111 item->type = KDBUS_ITEM_MEMFD_NAME;
1112 memcpy(item->str, g, l + 1);
1114 r = ioctl(bus->input_fd, KDBUS_CMD_MEMFD_NEW, cmd);
1124 c = &bus->memfd_cache[--bus->n_memfd_cache];
1127 assert(c->mapped == 0 || c->address);
1129 *address = c->address;
1130 *mapped = c->mapped;
1131 *allocated = c->allocated;
1134 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1139 static void close_and_munmap(int fd, void *address, size_t size) {
1141 assert_se(munmap(address, PAGE_ALIGN(size)) >= 0);
1143 close_nointr_nofail(fd);
1146 void bus_kernel_push_memfd(sd_bus *bus, int fd, void *address, size_t mapped, size_t allocated) {
1147 struct memfd_cache *c;
1148 uint64_t max_mapped = PAGE_ALIGN(MEMFD_CACHE_ITEM_SIZE_MAX);
1151 assert(mapped == 0 || address);
1153 if (!bus || !bus->is_kernel) {
1154 close_and_munmap(fd, address, mapped);
1158 assert_se(pthread_mutex_lock(&bus->memfd_cache_mutex) >= 0);
1160 if (bus->n_memfd_cache >= ELEMENTSOF(bus->memfd_cache)) {
1161 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1163 close_and_munmap(fd, address, mapped);
1167 c = &bus->memfd_cache[bus->n_memfd_cache++];
1169 c->address = address;
1171 /* If overly long, let's return a bit to the OS */
1172 if (mapped > max_mapped) {
1173 assert_se(ioctl(fd, KDBUS_CMD_MEMFD_SIZE_SET, &max_mapped) >= 0);
1174 assert_se(munmap((uint8_t*) address + max_mapped, PAGE_ALIGN(mapped - max_mapped)) >= 0);
1175 c->mapped = c->allocated = max_mapped;
1178 c->allocated = allocated;
1181 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1184 void bus_kernel_flush_memfd(sd_bus *b) {
1189 for (i = 0; i < b->n_memfd_cache; i++)
1190 close_and_munmap(b->memfd_cache[i].fd, b->memfd_cache[i].address, b->memfd_cache[i].mapped);
1193 int kdbus_translate_request_name_flags(uint64_t flags, uint64_t *kdbus_flags) {
1196 assert(kdbus_flags);
1198 if (flags & SD_BUS_NAME_ALLOW_REPLACEMENT)
1199 f |= KDBUS_NAME_ALLOW_REPLACEMENT;
1201 if (flags & SD_BUS_NAME_REPLACE_EXISTING)
1202 f |= KDBUS_NAME_REPLACE_EXISTING;
1204 if (flags & SD_BUS_NAME_QUEUE)
1205 f |= KDBUS_NAME_QUEUE;
1211 int kdbus_translate_attach_flags(uint64_t mask, uint64_t *kdbus_mask) {
1216 if (mask & (SD_BUS_CREDS_UID|SD_BUS_CREDS_GID|SD_BUS_CREDS_PID|SD_BUS_CREDS_PID_STARTTIME|SD_BUS_CREDS_TID))
1217 m |= KDBUS_ATTACH_CREDS;
1219 if (mask & (SD_BUS_CREDS_COMM|SD_BUS_CREDS_TID_COMM))
1220 m |= KDBUS_ATTACH_COMM;
1222 if (mask & SD_BUS_CREDS_EXE)
1223 m |= KDBUS_ATTACH_EXE;
1225 if (mask & SD_BUS_CREDS_CMDLINE)
1226 m |= KDBUS_ATTACH_CMDLINE;
1228 if (mask & (SD_BUS_CREDS_CGROUP|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_USER_UNIT|SD_BUS_CREDS_SLICE|SD_BUS_CREDS_SESSION|SD_BUS_CREDS_OWNER_UID))
1229 m |= KDBUS_ATTACH_CGROUP;
1231 if (mask & (SD_BUS_CREDS_EFFECTIVE_CAPS|SD_BUS_CREDS_PERMITTED_CAPS|SD_BUS_CREDS_INHERITABLE_CAPS|SD_BUS_CREDS_BOUNDING_CAPS))
1232 m |= KDBUS_ATTACH_CAPS;
1234 if (mask & SD_BUS_CREDS_SELINUX_CONTEXT)
1235 m |= KDBUS_ATTACH_SECLABEL;
1237 if (mask & (SD_BUS_CREDS_AUDIT_SESSION_ID|SD_BUS_CREDS_AUDIT_LOGIN_UID))
1238 m |= KDBUS_ATTACH_AUDIT;
1240 if (mask & SD_BUS_CREDS_WELL_KNOWN_NAMES)
1241 m |= KDBUS_ATTACH_NAMES;
1247 int bus_kernel_create_bus(const char *name, bool world, char **s) {
1248 struct kdbus_cmd_make *make;
1249 struct kdbus_item *n;
1255 fd = open("/dev/kdbus/control", O_RDWR|O_NOCTTY|O_CLOEXEC);
1259 make = alloca0(ALIGN8(offsetof(struct kdbus_cmd_make, items) +
1260 offsetof(struct kdbus_item, data64) + sizeof(uint64_t) +
1261 offsetof(struct kdbus_item, str) +
1262 DECIMAL_STR_MAX(uid_t) + 1 + strlen(name) + 1));
1264 make->size = offsetof(struct kdbus_cmd_make, items);
1267 n->size = offsetof(struct kdbus_item, data64) + sizeof(uint64_t);
1268 n->type = KDBUS_ITEM_BLOOM_SIZE;
1269 n->data64[0] = BLOOM_SIZE;
1270 assert_cc(BLOOM_SIZE % 8 == 0);
1271 make->size += ALIGN8(n->size);
1273 n = KDBUS_ITEM_NEXT(n);
1274 sprintf(n->str, "%lu-%s", (unsigned long) getuid(), name);
1275 n->size = offsetof(struct kdbus_item, str) + strlen(n->str) + 1;
1276 n->type = KDBUS_ITEM_MAKE_NAME;
1277 make->size += ALIGN8(n->size);
1279 make->flags = KDBUS_MAKE_POLICY_OPEN | (world ? KDBUS_MAKE_ACCESS_WORLD : 0);
1281 if (ioctl(fd, KDBUS_CMD_BUS_MAKE, make) < 0) {
1282 close_nointr_nofail(fd);
1286 /* The higher 32bit of the flags field are considered
1287 * 'incompatible flags'. Refuse them all for now. */
1288 if (make->flags > 0xFFFFFFFFULL) {
1289 close_nointr_nofail(fd);
1296 p = strjoin("/dev/kdbus/", n->str, "/bus", NULL);
1298 close_nointr_nofail(fd);
1308 int bus_kernel_create_starter(const char *bus, const char *name) {
1309 struct kdbus_cmd_hello *hello;
1310 struct kdbus_item *n;
1317 p = alloca(sizeof("/dev/kdbus/") - 1 + DECIMAL_STR_MAX(uid_t) + 1 + strlen(bus) + sizeof("/bus"));
1318 sprintf(p, "/dev/kdbus/%lu-%s/bus", (unsigned long) getuid(), bus);
1320 fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC);
1324 hello = alloca0(ALIGN8(offsetof(struct kdbus_cmd_hello, items) +
1325 offsetof(struct kdbus_item, str) +
1329 strcpy(n->str, name);
1330 n->size = offsetof(struct kdbus_item, str) + strlen(n->str) + 1;
1331 n->type = KDBUS_ITEM_NAME;
1333 hello->size = ALIGN8(offsetof(struct kdbus_cmd_hello, items) + n->size);
1334 hello->conn_flags = KDBUS_HELLO_ACTIVATOR;
1335 hello->pool_size = KDBUS_POOL_SIZE;
1337 if (ioctl(fd, KDBUS_CMD_HELLO, hello) < 0) {
1338 close_nointr_nofail(fd);
1342 /* The higher 32bit of both flags fields are considered
1343 * 'incompatible flags'. Refuse them all for now. */
1344 if (hello->bus_flags > 0xFFFFFFFFULL ||
1345 hello->conn_flags > 0xFFFFFFFFULL) {
1346 close_nointr_nofail(fd);
1350 if (hello->bloom_size != BLOOM_SIZE) {
1351 close_nointr_nofail(fd);
1358 int bus_kernel_create_namespace(const char *name, char **s) {
1359 struct kdbus_cmd_make *make;
1360 struct kdbus_item *n;
1366 fd = open("/dev/kdbus/control", O_RDWR|O_NOCTTY|O_CLOEXEC);
1370 make = alloca0(ALIGN8(offsetof(struct kdbus_cmd_make, items) +
1371 offsetof(struct kdbus_item, str) +
1375 strcpy(n->str, name);
1376 n->size = offsetof(struct kdbus_item, str) + strlen(n->str) + 1;
1377 n->type = KDBUS_ITEM_MAKE_NAME;
1379 make->size = ALIGN8(offsetof(struct kdbus_cmd_make, items) + n->size);
1380 make->flags = KDBUS_MAKE_POLICY_OPEN | KDBUS_MAKE_ACCESS_WORLD;
1382 if (ioctl(fd, KDBUS_CMD_NS_MAKE, make) < 0) {
1383 close_nointr_nofail(fd);
1387 /* The higher 32bit of the flags field are considered
1388 * 'incompatible flags'. Refuse them all for now. */
1389 if (make->flags > 0xFFFFFFFFULL) {
1390 close_nointr_nofail(fd);
1397 p = strappend("/dev/kdbus/ns/", name);
1399 close_nointr_nofail(fd);
1409 int bus_kernel_create_monitor(const char *bus) {
1410 struct kdbus_cmd_hello *hello;
1416 p = alloca(sizeof("/dev/kdbus/") - 1 + DECIMAL_STR_MAX(uid_t) + 1 + strlen(bus) + sizeof("/bus"));
1417 sprintf(p, "/dev/kdbus/%lu-%s/bus", (unsigned long) getuid(), bus);
1419 fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC);
1423 hello = alloca0(sizeof(struct kdbus_cmd_hello));
1424 hello->size = sizeof(struct kdbus_cmd_hello);
1425 hello->conn_flags = KDBUS_HELLO_ACTIVATOR;
1426 hello->pool_size = KDBUS_POOL_SIZE;
1428 if (ioctl(fd, KDBUS_CMD_HELLO, hello) < 0) {
1429 close_nointr_nofail(fd);
1433 /* The higher 32bit of both flags fields are considered
1434 * 'incompatible flags'. Refuse them all for now. */
1435 if (hello->bus_flags > 0xFFFFFFFFULL ||
1436 hello->conn_flags > 0xFFFFFFFFULL) {
1437 close_nointr_nofail(fd);
1444 int bus_kernel_try_close(sd_bus *bus) {
1446 assert(bus->is_kernel);
1448 if (ioctl(bus->input_fd, KDBUS_CMD_BYEBYE) < 0)