1 /* SPDX-License-Identifier: LGPL-2.1+ */
5 This file is part of systemd.
7 Copyright 2013 Lennart Poettering
9 systemd is free software; you can redistribute it and/or modify it
10 under the terms of the GNU Lesser General Public License as published by
11 the Free Software Foundation; either version 2.1 of the License, or
12 (at your option) any later version.
14 systemd is distributed in the hope that it will be useful, but
15 WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 Lesser General Public License for more details.
19 You should have received a copy of the GNU Lesser General Public License
20 along with systemd; If not, see <http://www.gnu.org/licenses/>.
24 #include <sys/socket.h>
28 #include "bus-error.h"
29 #include "bus-kernel.h"
30 #include "bus-match.h"
36 #include "socket-util.h"
39 struct reply_callback {
40 sd_bus_message_handler_t callback;
46 struct filter_callback {
47 sd_bus_message_handler_t callback;
49 unsigned last_iteration;
51 LIST_FIELDS(struct filter_callback, callbacks);
54 struct match_callback {
55 sd_bus_message_handler_t callback;
57 unsigned last_iteration;
61 struct bus_match_node *match_node;
67 LIST_HEAD(struct node, child);
68 LIST_FIELDS(struct node, siblings);
70 LIST_HEAD(struct node_callback, callbacks);
71 LIST_HEAD(struct node_vtable, vtables);
72 LIST_HEAD(struct node_enumerator, enumerators);
73 LIST_HEAD(struct node_object_manager, object_managers);
76 struct node_callback {
80 sd_bus_message_handler_t callback;
82 unsigned last_iteration;
84 LIST_FIELDS(struct node_callback, callbacks);
87 struct node_enumerator {
90 sd_bus_node_enumerator_t callback;
92 unsigned last_iteration;
94 LIST_FIELDS(struct node_enumerator, enumerators);
97 struct node_object_manager {
100 LIST_FIELDS(struct node_object_manager, object_managers);
108 const sd_bus_vtable *vtable;
109 sd_bus_object_find_t find;
111 unsigned last_iteration;
113 LIST_FIELDS(struct node_vtable, vtables);
116 struct vtable_member {
118 const char *interface;
120 struct node_vtable *parent;
121 unsigned last_iteration;
122 const sd_bus_vtable *vtable;
125 typedef enum BusSlotType {
132 BUS_NODE_OBJECT_MANAGER,
133 _BUS_SLOT_INVALID = -1,
145 LIST_FIELDS(sd_bus_slot, slots);
148 struct reply_callback reply_callback;
149 struct filter_callback filter_callback;
150 struct match_callback match_callback;
151 struct node_callback node_callback;
152 struct node_enumerator node_enumerator;
153 struct node_object_manager node_object_manager;
154 struct node_vtable node_vtable;
160 BUS_WATCH_BIND, /* waiting for the socket to appear via inotify */
169 static inline bool BUS_IS_OPEN(enum bus_state state) {
170 return state > BUS_UNSET && state < BUS_CLOSING;
180 /* We use atomic ref counting here since sd_bus_message
181 objects retain references to their originating sd_bus but
182 we want to allow them to be processed in a different
183 thread. We won't provide full thread safety, but only the
184 bare minimum that makes it possible to use sd_bus and
185 sd_bus_message objects independently and on different
186 threads as long as each object is used only once at the
190 enum bus_state state;
191 int input_fd, output_fd;
200 bool anonymous_auth:1;
202 bool prefer_writev:1;
203 bool match_callbacks_modified:1;
204 bool filter_callbacks_modified:1;
205 bool nodes_modified:1;
207 bool manual_peer_interface:1;
210 bool allow_interactive_authorization:1;
211 bool exit_on_disconnect:1;
213 bool exit_triggered:1;
222 sd_bus_message **rqueue;
223 unsigned rqueue_size;
224 size_t rqueue_allocated;
226 sd_bus_message **wqueue;
227 unsigned wqueue_size;
229 size_t wqueue_allocated;
236 struct bus_match_node match_callbacks;
237 Prioq *reply_callbacks_prioq;
238 OrderedHashmap *reply_callbacks;
239 LIST_HEAD(struct filter_callback, filter_callbacks);
242 Hashmap *vtable_methods;
243 Hashmap *vtable_properties;
245 union sockaddr_union sockaddr;
246 socklen_t sockaddr_size;
251 sd_id128_t server_id;
254 unsigned address_index;
256 int last_connect_error;
260 struct iovec auth_iovec[3];
278 unsigned iteration_counter;
280 /* We do locking around the memfd cache, since we want to
281 * allow people to process a sd_bus_message in a different
282 * thread then it was generated on and free it there. Since
283 * adding something to the memfd cache might happen when a
284 * message is released, we hence need to protect this bit with
286 pthread_mutex_t memfd_cache_mutex;
287 struct memfd_cache memfd_cache[MEMFD_CACHE_MAX];
288 unsigned n_memfd_cache;
292 uint64_t hello_flags;
293 uint64_t attach_flags;
295 sd_event_source *input_io_event_source;
296 sd_event_source *output_io_event_source;
297 sd_event_source *time_event_source;
298 sd_event_source *quit_event_source;
299 sd_event_source *inotify_event_source;
303 sd_bus_message *current_message;
304 sd_bus_slot *current_slot;
305 sd_bus_message_handler_t current_handler;
306 void *current_userdata;
308 sd_bus **default_bus_ptr;
315 sd_bus_track *track_queue;
317 LIST_HEAD(sd_bus_slot, slots);
318 LIST_HEAD(sd_bus_track, tracks);
320 int *inotify_watches;
321 size_t n_inotify_watches;
324 /* For method calls we time-out at 25s, like in the D-Bus reference implementation */
325 #define BUS_DEFAULT_TIMEOUT ((usec_t) (25 * USEC_PER_SEC))
327 /* For the authentication phase we grant 90s, to provide extra room during boot, when RNGs and such are not filled up
328 * with enough entropy yet and might delay the boot */
329 #define BUS_AUTH_TIMEOUT ((usec_t) DEFAULT_TIMEOUT_USEC)
331 #define BUS_WQUEUE_MAX (192*1024)
332 #define BUS_RQUEUE_MAX (192*1024)
334 #define BUS_MESSAGE_SIZE_MAX (64*1024*1024)
335 #define BUS_AUTH_SIZE_MAX (64*1024)
337 #define BUS_CONTAINER_DEPTH 128
339 /* Defined by the specification as maximum size of an array in
341 #define BUS_ARRAY_MAX_SIZE 67108864
343 #define BUS_FDS_MAX 1024
345 #define BUS_EXEC_ARGV_MAX 256
347 bool interface_name_is_valid(const char *p) _pure_;
348 bool service_name_is_valid(const char *p) _pure_;
349 #if 0 /// UNNEEDED by elogind
350 char* service_name_startswith(const char *a, const char *b);
352 bool member_name_is_valid(const char *p) _pure_;
353 bool object_path_is_valid(const char *p) _pure_;
354 char *object_path_startswith(const char *a, const char *b) _pure_;
356 bool namespace_complex_pattern(const char *pattern, const char *value) _pure_;
357 bool path_complex_pattern(const char *pattern, const char *value) _pure_;
359 bool namespace_simple_pattern(const char *pattern, const char *value) _pure_;
360 bool path_simple_pattern(const char *pattern, const char *value) _pure_;
362 int bus_message_type_from_string(const char *s, uint8_t *u) _pure_;
363 const char *bus_message_type_to_string(uint8_t u) _pure_;
365 #define error_name_is_valid interface_name_is_valid
367 int bus_ensure_running(sd_bus *bus);
368 int bus_start_running(sd_bus *bus);
369 int bus_next_address(sd_bus *bus);
371 int bus_seal_synthetic_message(sd_bus *b, sd_bus_message *m);
373 int bus_rqueue_make_room(sd_bus *bus);
375 bool bus_pid_changed(sd_bus *bus);
377 char *bus_address_escape(const char *v);
379 int bus_attach_io_events(sd_bus *b);
380 int bus_attach_inotify_event(sd_bus *b);
382 void bus_close_inotify_fd(sd_bus *b);
383 void bus_close_io_fds(sd_bus *b);
385 #define OBJECT_PATH_FOREACH_PREFIX(prefix, path) \
386 for (char *_slash = ({ strcpy((prefix), (path)); streq((prefix), "/") ? NULL : strrchr((prefix), '/'); }) ; \
387 _slash && !(_slash[(_slash) == (prefix)] = 0); \
388 _slash = streq((prefix), "/") ? NULL : strrchr((prefix), '/'))
390 /* If we are invoking callbacks of a bus object, ensure unreffing the
391 * bus from the callback doesn't destroy the object we are working
393 #define BUS_DONT_DESTROY(bus) \
394 _cleanup_(sd_bus_unrefp) _unused_ sd_bus *_dont_destroy_##bus = sd_bus_ref(bus)
396 int bus_set_address_system(sd_bus *bus);
397 #if 0 /// UNNEEDED by elogind
398 int bus_set_address_user(sd_bus *bus);
400 int bus_set_address_system_remote(sd_bus *b, const char *host);
401 int bus_set_address_system_machine(sd_bus *b, const char *machine);
403 #if 0 /// UNNEEDED by elogind
404 int bus_remove_match_by_string(sd_bus *bus, const char *match, sd_bus_message_handler_t callback, void *userdata);
407 int bus_get_root_path(sd_bus *bus);
409 int bus_maybe_reply_error(sd_bus_message *m, int r, sd_bus_error *error);
411 #define bus_assert_return(expr, r, error) \
413 if (!assert_log(expr, #expr)) \
414 return sd_bus_error_set_errno(error, r); \
418 * enum kdbus_attach_flags - flags for metadata attachments
419 * @KDBUS_ATTACH_TIMESTAMP: Timestamp
420 * @KDBUS_ATTACH_CREDS: Credentials
421 * @KDBUS_ATTACH_PIDS: PIDs
422 * @KDBUS_ATTACH_AUXGROUPS: Auxiliary groups
423 * @KDBUS_ATTACH_NAMES: Well-known names
424 * @KDBUS_ATTACH_TID_COMM: The "comm" process identifier of the TID
425 * @KDBUS_ATTACH_PID_COMM: The "comm" process identifier of the PID
426 * @KDBUS_ATTACH_EXE: The path of the executable
427 * @KDBUS_ATTACH_CMDLINE: The process command line
428 * @KDBUS_ATTACH_CGROUP: The croup membership
429 * @KDBUS_ATTACH_CAPS: The process capabilities
430 * @KDBUS_ATTACH_SECLABEL: The security label
431 * @KDBUS_ATTACH_AUDIT: The audit IDs
432 * @KDBUS_ATTACH_CONN_DESCRIPTION: The human-readable connection name
433 * @_KDBUS_ATTACH_ALL: All of the above
434 * @_KDBUS_ATTACH_ANY: Wildcard match to enable any kind of
437 enum kdbus_attach_flags {
438 KDBUS_ATTACH_TIMESTAMP = 1ULL << 0,
439 KDBUS_ATTACH_CREDS = 1ULL << 1,
440 KDBUS_ATTACH_PIDS = 1ULL << 2,
441 KDBUS_ATTACH_AUXGROUPS = 1ULL << 3,
442 KDBUS_ATTACH_NAMES = 1ULL << 4,
443 KDBUS_ATTACH_TID_COMM = 1ULL << 5,
444 KDBUS_ATTACH_PID_COMM = 1ULL << 6,
445 KDBUS_ATTACH_EXE = 1ULL << 7,
446 KDBUS_ATTACH_CMDLINE = 1ULL << 8,
447 KDBUS_ATTACH_CGROUP = 1ULL << 9,
448 KDBUS_ATTACH_CAPS = 1ULL << 10,
449 KDBUS_ATTACH_SECLABEL = 1ULL << 11,
450 KDBUS_ATTACH_AUDIT = 1ULL << 12,
451 KDBUS_ATTACH_CONN_DESCRIPTION = 1ULL << 13,
452 _KDBUS_ATTACH_ALL = (1ULL << 14) - 1,
453 _KDBUS_ATTACH_ANY = ~0ULL
457 * enum kdbus_hello_flags - flags for struct kdbus_cmd_hello
458 * @KDBUS_HELLO_ACCEPT_FD: The connection allows the reception of
459 * any passed file descriptors
460 * @KDBUS_HELLO_ACTIVATOR: Special-purpose connection which registers
461 * a well-know name for a process to be started
462 * when traffic arrives
463 * @KDBUS_HELLO_POLICY_HOLDER: Special-purpose connection which registers
464 * policy entries for a name. The provided name
465 * is not activated and not registered with the
466 * name database, it only allows unprivileged
467 * connections to acquire a name, talk or discover
469 * @KDBUS_HELLO_MONITOR: Special-purpose connection to monitor
472 enum kdbus_hello_flags {
473 KDBUS_HELLO_ACCEPT_FD = 1ULL << 0,
474 KDBUS_HELLO_ACTIVATOR = 1ULL << 1,
475 KDBUS_HELLO_POLICY_HOLDER = 1ULL << 2,
476 KDBUS_HELLO_MONITOR = 1ULL << 3,