1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2013 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #ifdef HAVE_VALGRIND_MEMCHECK_H
23 #include <valgrind/memcheck.h>
31 #include "bus-internal.h"
32 #include "bus-message.h"
33 #include "bus-control.h"
34 #include "bus-bloom.h"
36 #include "cgroup-util.h"
38 _public_ int sd_bus_get_unique_name(sd_bus *bus, const char **unique) {
41 assert_return(bus, -EINVAL);
42 assert_return(unique, -EINVAL);
43 assert_return(!bus_pid_changed(bus), -ECHILD);
45 r = bus_ensure_running(bus);
49 *unique = bus->unique_name;
53 static int bus_request_name_kernel(sd_bus *bus, const char *name, uint64_t flags) {
54 struct kdbus_cmd_name *n;
62 size = offsetof(struct kdbus_cmd_name, items) + KDBUS_ITEM_SIZE(l);
63 n = alloca0_align(size, 8);
65 kdbus_translate_request_name_flags(flags, (uint64_t *) &n->flags);
67 n->items[0].size = KDBUS_ITEM_HEADER_SIZE + l;
68 n->items[0].type = KDBUS_ITEM_NAME;
69 memcpy(n->items[0].str, name, l);
71 #ifdef HAVE_VALGRIND_MEMCHECK_H
72 VALGRIND_MAKE_MEM_DEFINED(n, n->size);
75 r = ioctl(bus->input_fd, KDBUS_CMD_NAME_ACQUIRE, n);
79 if (n->flags & KDBUS_NAME_IN_QUEUE)
85 static int bus_request_name_dbus1(sd_bus *bus, const char *name, uint64_t flags) {
86 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
87 uint32_t ret, param = 0;
93 if (flags & SD_BUS_NAME_ALLOW_REPLACEMENT)
94 param |= BUS_NAME_ALLOW_REPLACEMENT;
95 if (flags & SD_BUS_NAME_REPLACE_EXISTING)
96 param |= BUS_NAME_REPLACE_EXISTING;
97 if (!(flags & SD_BUS_NAME_QUEUE))
98 param |= BUS_NAME_DO_NOT_QUEUE;
100 r = sd_bus_call_method(
102 "org.freedesktop.DBus",
103 "/org/freedesktop/DBus",
104 "org.freedesktop.DBus",
114 r = sd_bus_message_read(reply, "u", &ret);
118 if (ret == BUS_NAME_ALREADY_OWNER)
120 else if (ret == BUS_NAME_EXISTS)
122 else if (ret == BUS_NAME_IN_QUEUE)
124 else if (ret == BUS_NAME_PRIMARY_OWNER)
130 _public_ int sd_bus_request_name(sd_bus *bus, const char *name, uint64_t flags) {
131 assert_return(bus, -EINVAL);
132 assert_return(name, -EINVAL);
133 assert_return(bus->bus_client, -EINVAL);
134 assert_return(!bus_pid_changed(bus), -ECHILD);
135 assert_return(!(flags & ~(SD_BUS_NAME_ALLOW_REPLACEMENT|SD_BUS_NAME_REPLACE_EXISTING|SD_BUS_NAME_QUEUE)), -EINVAL);
136 assert_return(service_name_is_valid(name), -EINVAL);
137 assert_return(name[0] != ':', -EINVAL);
139 if (!BUS_IS_OPEN(bus->state))
143 return bus_request_name_kernel(bus, name, flags);
145 return bus_request_name_dbus1(bus, name, flags);
148 static int bus_release_name_kernel(sd_bus *bus, const char *name) {
149 struct kdbus_cmd_name *n;
156 l = strlen(name) + 1;
157 size = offsetof(struct kdbus_cmd_name, items) + KDBUS_ITEM_SIZE(l);
158 n = alloca0_align(size, 8);
161 n->items[0].size = KDBUS_ITEM_HEADER_SIZE + l;
162 n->items[0].type = KDBUS_ITEM_NAME;
163 memcpy(n->items[0].str, name, l);
165 #ifdef HAVE_VALGRIND_MEMCHECK_H
166 VALGRIND_MAKE_MEM_DEFINED(n, n->size);
168 r = ioctl(bus->input_fd, KDBUS_CMD_NAME_RELEASE, n);
175 static int bus_release_name_dbus1(sd_bus *bus, const char *name) {
176 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
183 r = sd_bus_call_method(
185 "org.freedesktop.DBus",
186 "/org/freedesktop/DBus",
187 "org.freedesktop.DBus",
196 r = sd_bus_message_read(reply, "u", &ret);
199 if (ret == BUS_NAME_NON_EXISTENT)
201 if (ret == BUS_NAME_NOT_OWNER)
203 if (ret == BUS_NAME_RELEASED)
209 _public_ int sd_bus_release_name(sd_bus *bus, const char *name) {
210 assert_return(bus, -EINVAL);
211 assert_return(name, -EINVAL);
212 assert_return(bus->bus_client, -EINVAL);
213 assert_return(!bus_pid_changed(bus), -ECHILD);
214 assert_return(service_name_is_valid(name), -EINVAL);
215 assert_return(name[0] != ':', -EINVAL);
217 if (!BUS_IS_OPEN(bus->state))
221 return bus_release_name_kernel(bus, name);
223 return bus_release_name_dbus1(bus, name);
226 static int kernel_cmd_free(sd_bus *bus, uint64_t offset)
228 struct kdbus_cmd_free cmd;
236 r = ioctl(bus->input_fd, KDBUS_CMD_FREE, &cmd);
243 static int kernel_get_list(sd_bus *bus, uint64_t flags, char ***x) {
244 struct kdbus_cmd_name_list cmd = {};
245 struct kdbus_name_list *name_list;
246 struct kdbus_name_info *name;
247 uint64_t previous_id = 0;
250 /* Caller will free half-constructed list on failure... */
254 r = ioctl(bus->input_fd, KDBUS_CMD_NAME_LIST, &cmd);
258 name_list = (struct kdbus_name_list *) ((uint8_t *) bus->kdbus_buffer + cmd.offset);
260 KDBUS_ITEM_FOREACH(name, name_list, names) {
262 struct kdbus_item *item;
263 const char *entry_name = NULL;
265 if ((flags & KDBUS_NAME_LIST_UNIQUE) && name->owner_id != previous_id) {
268 if (asprintf(&n, ":1.%llu", (unsigned long long) name->owner_id) < 0) {
273 r = strv_consume(x, n);
277 previous_id = name->owner_id;
280 KDBUS_ITEM_FOREACH(item, name, items)
281 if (item->type == KDBUS_ITEM_NAME)
282 entry_name = item->str;
284 if (entry_name && service_name_is_valid(entry_name)) {
285 r = strv_extend(x, entry_name);
296 kernel_cmd_free(bus, cmd.offset);
300 static int bus_list_names_kernel(sd_bus *bus, char ***acquired, char ***activatable) {
301 _cleanup_strv_free_ char **x = NULL, **y = NULL;
305 r = kernel_get_list(bus, KDBUS_NAME_LIST_UNIQUE | KDBUS_NAME_LIST_NAMES, &x);
311 r = kernel_get_list(bus, KDBUS_NAME_LIST_ACTIVATORS, &y);
327 static int bus_list_names_dbus1(sd_bus *bus, char ***acquired, char ***activatable) {
328 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
329 _cleanup_strv_free_ char **x = NULL, **y = NULL;
333 r = sd_bus_call_method(
335 "org.freedesktop.DBus",
336 "/org/freedesktop/DBus",
337 "org.freedesktop.DBus",
345 r = sd_bus_message_read_strv(reply, &x);
349 reply = sd_bus_message_unref(reply);
353 r = sd_bus_call_method(
355 "org.freedesktop.DBus",
356 "/org/freedesktop/DBus",
357 "org.freedesktop.DBus",
358 "ListActivatableNames",
365 r = sd_bus_message_read_strv(reply, &y);
381 _public_ int sd_bus_list_names(sd_bus *bus, char ***acquired, char ***activatable) {
382 assert_return(bus, -EINVAL);
383 assert_return(acquired || activatable, -EINVAL);
384 assert_return(!bus_pid_changed(bus), -ECHILD);
386 if (!BUS_IS_OPEN(bus->state))
390 return bus_list_names_kernel(bus, acquired, activatable);
392 return bus_list_names_dbus1(bus, acquired, activatable);
395 static int bus_populate_creds_from_items(sd_bus *bus,
396 struct kdbus_info *info,
400 struct kdbus_item *item;
404 KDBUS_ITEM_FOREACH(item, info, items) {
406 switch (item->type) {
408 case KDBUS_ITEM_CREDS:
409 m = (SD_BUS_CREDS_UID | SD_BUS_CREDS_GID | SD_BUS_CREDS_PID) & mask;
412 c->uid = (uid_t) item->creds.uid;
413 c->pid = (pid_t) item->creds.pid;
414 c->gid = (gid_t) item->creds.gid;
418 if (mask & SD_BUS_CREDS_TID && item->creds.tid > 0) {
419 c->tid = (pid_t) item->creds.tid;
420 c->mask |= SD_BUS_CREDS_TID;
423 if (mask & SD_BUS_CREDS_PID_STARTTIME && item->creds.starttime > 0) {
424 c->pid_starttime = item->creds.starttime;
425 c->mask |= SD_BUS_CREDS_PID_STARTTIME;
430 case KDBUS_ITEM_PID_COMM:
431 if (mask & SD_BUS_CREDS_COMM) {
432 c->comm = strdup(item->str);
436 c->mask |= SD_BUS_CREDS_COMM;
440 case KDBUS_ITEM_TID_COMM:
441 if (mask & SD_BUS_CREDS_TID_COMM) {
442 c->tid_comm = strdup(item->str);
446 c->mask |= SD_BUS_CREDS_TID_COMM;
451 if (mask & SD_BUS_CREDS_EXE) {
452 c->exe = strdup(item->str);
456 c->mask |= SD_BUS_CREDS_EXE;
460 case KDBUS_ITEM_CMDLINE:
461 if (mask & SD_BUS_CREDS_CMDLINE) {
462 c->cmdline_size = item->size - KDBUS_ITEM_HEADER_SIZE;
463 c->cmdline = memdup(item->data, c->cmdline_size);
467 c->mask |= SD_BUS_CREDS_CMDLINE;
471 case KDBUS_ITEM_CGROUP:
472 m = (SD_BUS_CREDS_CGROUP | SD_BUS_CREDS_UNIT |
473 SD_BUS_CREDS_USER_UNIT | SD_BUS_CREDS_SLICE |
474 SD_BUS_CREDS_SESSION | SD_BUS_CREDS_OWNER_UID) & mask;
477 c->cgroup = strdup(item->str);
481 r = bus_get_root_path(bus);
485 c->cgroup_root = strdup(bus->cgroup_root);
493 case KDBUS_ITEM_CAPS:
494 m = (SD_BUS_CREDS_EFFECTIVE_CAPS | SD_BUS_CREDS_PERMITTED_CAPS |
495 SD_BUS_CREDS_INHERITABLE_CAPS | SD_BUS_CREDS_BOUNDING_CAPS) & mask;
498 c->capability_size = item->size - KDBUS_ITEM_HEADER_SIZE;
499 c->capability = memdup(item->data, c->capability_size);
507 case KDBUS_ITEM_SECLABEL:
508 if (mask & SD_BUS_CREDS_SELINUX_CONTEXT) {
509 c->label = strdup(item->str);
513 c->mask |= SD_BUS_CREDS_SELINUX_CONTEXT;
517 case KDBUS_ITEM_AUDIT:
518 m = (SD_BUS_CREDS_AUDIT_SESSION_ID | SD_BUS_CREDS_AUDIT_LOGIN_UID) & mask;
521 c->audit_session_id = item->audit.sessionid;
522 c->audit_login_uid = item->audit.loginuid;
527 case KDBUS_ITEM_NAME:
528 if ((mask & SD_BUS_CREDS_WELL_KNOWN_NAMES) && service_name_is_valid(item->name.name)) {
529 r = strv_extend(&c->well_known_names, item->name.name);
533 c->mask |= SD_BUS_CREDS_WELL_KNOWN_NAMES;
537 case KDBUS_ITEM_CONN_NAME:
538 if ((mask & SD_BUS_CREDS_CONNECTION_NAME)) {
539 c->conn_name = strdup(item->str);
543 c->mask |= SD_BUS_CREDS_CONNECTION_NAME;
552 static int bus_get_name_creds_kdbus(
556 sd_bus_creds **creds) {
558 _cleanup_bus_creds_unref_ sd_bus_creds *c = NULL;
559 struct kdbus_cmd_info *cmd;
560 struct kdbus_info *conn_info;
565 r = bus_kernel_parse_unique_name(name, &id);
569 size = offsetof(struct kdbus_cmd_info, items);
570 cmd = alloca0_align(size, 8);
573 l = strlen(name) + 1;
574 size = offsetof(struct kdbus_cmd_info, items) + KDBUS_ITEM_SIZE(l);
575 cmd = alloca0_align(size, 8);
576 cmd->items[0].size = KDBUS_ITEM_HEADER_SIZE + l;
577 cmd->items[0].type = KDBUS_ITEM_NAME;
578 memcpy(cmd->items[0].str, name, l);
582 kdbus_translate_attach_flags(mask, (uint64_t*) &cmd->flags);
584 r = ioctl(bus->input_fd, KDBUS_CMD_CONN_INFO, cmd);
588 conn_info = (struct kdbus_info *) ((uint8_t *) bus->kdbus_buffer + cmd->offset);
590 /* Non-activated names are considered not available */
591 if (conn_info->flags & KDBUS_HELLO_ACTIVATOR) {
605 if (mask & SD_BUS_CREDS_UNIQUE_NAME) {
606 if (asprintf(&c->unique_name, ":1.%llu", (unsigned long long) conn_info->id) < 0) {
611 c->mask |= SD_BUS_CREDS_UNIQUE_NAME;
614 r = bus_populate_creds_from_items(bus, conn_info, mask, c);
626 kernel_cmd_free(bus, cmd->offset);
630 static int bus_get_name_creds_dbus1(
634 sd_bus_creds **creds) {
636 _cleanup_bus_message_unref_ sd_bus_message *reply_unique = NULL, *reply = NULL;
637 _cleanup_bus_creds_unref_ sd_bus_creds *c = NULL;
638 const char *unique = NULL;
642 /* Only query the owner if the caller wants to know it or if
643 * the caller just wants to check whether a name exists */
644 if ((mask & SD_BUS_CREDS_UNIQUE_NAME) || mask == 0) {
645 r = sd_bus_call_method(
647 "org.freedesktop.DBus",
648 "/org/freedesktop/DBus",
649 "org.freedesktop.DBus",
658 r = sd_bus_message_read(reply_unique, "s", &unique);
668 if ((mask & SD_BUS_CREDS_UNIQUE_NAME) && unique) {
669 c->unique_name = strdup(unique);
673 c->mask |= SD_BUS_CREDS_UNIQUE_NAME;
676 if (mask & (SD_BUS_CREDS_PID|SD_BUS_CREDS_PID_STARTTIME|SD_BUS_CREDS_GID|
677 SD_BUS_CREDS_COMM|SD_BUS_CREDS_EXE|SD_BUS_CREDS_CMDLINE|
678 SD_BUS_CREDS_CGROUP|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_USER_UNIT|SD_BUS_CREDS_SLICE|SD_BUS_CREDS_SESSION|SD_BUS_CREDS_OWNER_UID|
679 SD_BUS_CREDS_EFFECTIVE_CAPS|SD_BUS_CREDS_PERMITTED_CAPS|SD_BUS_CREDS_INHERITABLE_CAPS|SD_BUS_CREDS_BOUNDING_CAPS|
680 SD_BUS_CREDS_AUDIT_SESSION_ID|SD_BUS_CREDS_AUDIT_LOGIN_UID)) {
683 r = sd_bus_call_method(
685 "org.freedesktop.DBus",
686 "/org/freedesktop/DBus",
687 "org.freedesktop.DBus",
688 "GetConnectionUnixProcessID",
692 unique ? unique : name);
696 r = sd_bus_message_read(reply, "u", &u);
701 if (mask & SD_BUS_CREDS_PID) {
703 c->mask |= SD_BUS_CREDS_PID;
706 reply = sd_bus_message_unref(reply);
709 if (mask & SD_BUS_CREDS_UID) {
712 r = sd_bus_call_method(
714 "org.freedesktop.DBus",
715 "/org/freedesktop/DBus",
716 "org.freedesktop.DBus",
717 "GetConnectionUnixUser",
721 unique ? unique : name);
725 r = sd_bus_message_read(reply, "u", &u);
730 c->mask |= SD_BUS_CREDS_UID;
732 reply = sd_bus_message_unref(reply);
735 if (mask & SD_BUS_CREDS_SELINUX_CONTEXT) {
736 const void *p = NULL;
739 r = sd_bus_call_method(
741 "org.freedesktop.DBus",
742 "/org/freedesktop/DBus",
743 "org.freedesktop.DBus",
744 "GetConnectionSELinuxSecurityContext",
748 unique ? unique : name);
752 r = sd_bus_message_read_array(reply, 'y', &p, &sz);
756 c->label = strndup(p, sz);
760 c->mask |= SD_BUS_CREDS_SELINUX_CONTEXT;
763 r = bus_creds_add_more(c, mask, pid, 0);
776 _public_ int sd_bus_get_name_creds(
780 sd_bus_creds **creds) {
782 assert_return(bus, -EINVAL);
783 assert_return(name, -EINVAL);
784 assert_return(mask <= _SD_BUS_CREDS_ALL, -ENOTSUP);
785 assert_return(mask == 0 || creds, -EINVAL);
786 assert_return(!bus_pid_changed(bus), -ECHILD);
787 assert_return(service_name_is_valid(name), -EINVAL);
788 assert_return(bus->bus_client, -ENODATA);
790 if (!BUS_IS_OPEN(bus->state))
794 return bus_get_name_creds_kdbus(bus, name, mask, creds);
796 return bus_get_name_creds_dbus1(bus, name, mask, creds);
799 static int add_name_change_match(sd_bus *bus,
802 const char *old_owner,
803 const char *new_owner) {
805 uint64_t name_id = KDBUS_MATCH_ID_ANY, old_owner_id = 0, new_owner_id = 0;
806 int is_name_id = -1, r;
807 struct kdbus_item *item;
811 /* If we encounter a match that could match against
812 * NameOwnerChanged messages, then we need to create
813 * KDBUS_ITEM_NAME_{ADD,REMOVE,CHANGE} and
814 * KDBUS_ITEM_ID_{ADD,REMOVE} matches for it, possibly
815 * multiple if the match is underspecified.
817 * The NameOwnerChanged signals take three parameters with
818 * unique or well-known names, but only some forms actually
821 * WELLKNOWN, "", UNIQUE → KDBUS_ITEM_NAME_ADD
822 * WELLKNOWN, UNIQUE, "" → KDBUS_ITEM_NAME_REMOVE
823 * WELLKNOWN, UNIQUE, UNIQUE → KDBUS_ITEM_NAME_CHANGE
824 * UNIQUE, "", UNIQUE → KDBUS_ITEM_ID_ADD
825 * UNIQUE, UNIQUE, "" → KDBUS_ITEM_ID_REMOVE
827 * For the latter two the two unique names must be identical.
832 is_name_id = bus_kernel_parse_unique_name(name, &name_id);
837 if (!isempty(old_owner)) {
838 r = bus_kernel_parse_unique_name(old_owner, &old_owner_id);
843 if (is_name_id > 0 && old_owner_id != name_id)
846 old_owner_id = KDBUS_MATCH_ID_ANY;
848 if (!isempty(new_owner)) {
849 r = bus_kernel_parse_unique_name(new_owner, &new_owner_id);
854 if (is_name_id > 0 && new_owner_id != name_id)
857 new_owner_id = KDBUS_MATCH_ID_ANY;
859 if (is_name_id <= 0) {
860 struct kdbus_cmd_match *m;
863 /* If the name argument is missing or is a well-known
864 * name, then add KDBUS_ITEM_NAME_{ADD,REMOVE,CHANGE}
867 l = name ? strlen(name) + 1 : 0;
869 sz = ALIGN8(offsetof(struct kdbus_cmd_match, items) +
870 offsetof(struct kdbus_item, name_change) +
871 offsetof(struct kdbus_notify_name_change, name) +
874 m = alloca0_align(sz, 8);
880 offsetof(struct kdbus_item, name_change) +
881 offsetof(struct kdbus_notify_name_change, name) +
884 item->name_change.old_id.id = old_owner_id;
885 item->name_change.new_id.id = new_owner_id;
888 memcpy(item->name_change.name, name, l);
890 /* If the old name is unset or empty, then
891 * this can match against added names */
892 if (!old_owner || old_owner[0] == 0) {
893 item->type = KDBUS_ITEM_NAME_ADD;
895 r = ioctl(bus->input_fd, KDBUS_CMD_MATCH_ADD, m);
900 /* If the new name is unset or empty, then
901 * this can match against removed names */
902 if (!new_owner || new_owner[0] == 0) {
903 item->type = KDBUS_ITEM_NAME_REMOVE;
905 r = ioctl(bus->input_fd, KDBUS_CMD_MATCH_ADD, m);
910 /* The CHANGE match we need in either case, because
911 * what is reported as a name change by the kernel
912 * might just be an owner change between starter and
913 * normal clients. For userspace such a change should
914 * be considered a removal/addition, hence let's
915 * subscribe to this unconditionally. */
916 item->type = KDBUS_ITEM_NAME_CHANGE;
917 r = ioctl(bus->input_fd, KDBUS_CMD_MATCH_ADD, m);
922 if (is_name_id != 0) {
923 struct kdbus_cmd_match *m;
926 /* If the name argument is missing or is a unique
927 * name, then add KDBUS_ITEM_ID_{ADD,REMOVE} matches
930 sz = ALIGN8(offsetof(struct kdbus_cmd_match, items) +
931 offsetof(struct kdbus_item, id_change) +
932 sizeof(struct kdbus_notify_id_change));
934 m = alloca0_align(sz, 8);
940 offsetof(struct kdbus_item, id_change) +
941 sizeof(struct kdbus_notify_id_change);
942 item->id_change.id = name_id;
944 /* If the old name is unset or empty, then this can
945 * match against added ids */
946 if (!old_owner || old_owner[0] == 0) {
947 item->type = KDBUS_ITEM_ID_ADD;
949 r = ioctl(bus->input_fd, KDBUS_CMD_MATCH_ADD, m);
954 /* If thew new name is unset or empty, then this can
955 * match against removed ids */
956 if (!new_owner || new_owner[0] == 0) {
957 item->type = KDBUS_ITEM_ID_REMOVE;
959 r = ioctl(bus->input_fd, KDBUS_CMD_MATCH_ADD, m);
968 int bus_add_match_internal_kernel(
970 struct bus_match_component *components,
971 unsigned n_components,
974 struct kdbus_cmd_match *m;
975 struct kdbus_item *item;
978 const char *sender = NULL;
979 size_t sender_length = 0;
980 uint64_t src_id = KDBUS_MATCH_ID_ANY;
981 bool using_bloom = false;
983 bool matches_name_change = true;
984 const char *name_change_arg[3] = {};
989 bloom = alloca0(bus->bloom_size);
991 sz = ALIGN8(offsetof(struct kdbus_cmd_match, items));
993 for (i = 0; i < n_components; i++) {
994 struct bus_match_component *c = &components[i];
998 case BUS_MATCH_SENDER:
999 if (!streq(c->value_str, "org.freedesktop.DBus"))
1000 matches_name_change = false;
1002 r = bus_kernel_parse_unique_name(c->value_str, &src_id);
1006 sz += ALIGN8(offsetof(struct kdbus_item, id) + sizeof(uint64_t));
1008 sender = c->value_str;
1009 sender_length = strlen(sender);
1010 sz += ALIGN8(offsetof(struct kdbus_item, str) + sender_length + 1);
1015 case BUS_MATCH_MESSAGE_TYPE:
1016 if (c->value_u8 != SD_BUS_MESSAGE_SIGNAL)
1017 matches_name_change = false;
1019 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, "message-type", bus_message_type_to_string(c->value_u8));
1023 case BUS_MATCH_INTERFACE:
1024 if (!streq(c->value_str, "org.freedesktop.DBus"))
1025 matches_name_change = false;
1027 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, "interface", c->value_str);
1031 case BUS_MATCH_MEMBER:
1032 if (!streq(c->value_str, "NameOwnerChanged"))
1033 matches_name_change = false;
1035 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, "member", c->value_str);
1039 case BUS_MATCH_PATH:
1040 if (!streq(c->value_str, "/org/freedesktop/DBus"))
1041 matches_name_change = false;
1043 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, "path", c->value_str);
1047 case BUS_MATCH_PATH_NAMESPACE:
1048 if (!streq(c->value_str, "/")) {
1049 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, "path-slash-prefix", c->value_str);
1054 case BUS_MATCH_ARG...BUS_MATCH_ARG_LAST: {
1055 char buf[sizeof("arg")-1 + 2 + 1];
1057 if (c->type - BUS_MATCH_ARG < 3)
1058 name_change_arg[c->type - BUS_MATCH_ARG] = c->value_str;
1060 snprintf(buf, sizeof(buf), "arg%u", c->type - BUS_MATCH_ARG);
1061 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, buf, c->value_str);
1066 case BUS_MATCH_ARG_PATH...BUS_MATCH_ARG_PATH_LAST: {
1067 char buf[sizeof("arg")-1 + 2 + sizeof("-slash-prefix")];
1069 snprintf(buf, sizeof(buf), "arg%u-slash-prefix", c->type - BUS_MATCH_ARG_PATH);
1070 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, buf, c->value_str);
1075 case BUS_MATCH_ARG_NAMESPACE...BUS_MATCH_ARG_NAMESPACE_LAST: {
1076 char buf[sizeof("arg")-1 + 2 + sizeof("-dot-prefix")];
1078 snprintf(buf, sizeof(buf), "arg%u-dot-prefix", c->type - BUS_MATCH_ARG_NAMESPACE);
1079 bloom_add_pair(bloom, bus->bloom_size, bus->bloom_n_hash, buf, c->value_str);
1084 case BUS_MATCH_DESTINATION:
1085 /* The bloom filter does not include
1086 the destination, since it is only
1087 available for broadcast messages
1088 which do not carry a destination
1089 since they are undirected. */
1092 case BUS_MATCH_ROOT:
1093 case BUS_MATCH_VALUE:
1094 case BUS_MATCH_LEAF:
1095 case _BUS_MATCH_NODE_TYPE_MAX:
1096 case _BUS_MATCH_NODE_TYPE_INVALID:
1097 assert_not_reached("Invalid match type?");
1102 sz += ALIGN8(offsetof(struct kdbus_item, data64) + bus->bloom_size);
1104 m = alloca0_align(sz, 8);
1110 if (src_id != KDBUS_MATCH_ID_ANY) {
1111 item->size = offsetof(struct kdbus_item, id) + sizeof(uint64_t);
1112 item->type = KDBUS_ITEM_ID;
1114 item = KDBUS_ITEM_NEXT(item);
1118 item->size = offsetof(struct kdbus_item, data64) + bus->bloom_size;
1119 item->type = KDBUS_ITEM_BLOOM_MASK;
1120 memcpy(item->data64, bloom, bus->bloom_size);
1121 item = KDBUS_ITEM_NEXT(item);
1125 item->size = offsetof(struct kdbus_item, str) + sender_length + 1;
1126 item->type = KDBUS_ITEM_NAME;
1127 memcpy(item->str, sender, sender_length + 1);
1130 r = ioctl(bus->input_fd, KDBUS_CMD_MATCH_ADD, m);
1134 if (matches_name_change) {
1136 /* If this match could theoretically match
1137 * NameOwnerChanged messages, we need to
1138 * install a second non-bloom filter explitly
1141 r = add_name_change_match(bus, cookie, name_change_arg[0], name_change_arg[1], name_change_arg[2]);
1149 #define internal_match(bus, m) \
1150 ((bus)->hello_flags & KDBUS_HELLO_MONITOR \
1151 ? (isempty(m) ? "eavesdrop='true'" : strappenda((m), ",eavesdrop='true'")) \
1154 static int bus_add_match_internal_dbus1(
1156 const char *match) {
1163 e = internal_match(bus, match);
1165 return sd_bus_call_method(
1167 "org.freedesktop.DBus",
1168 "/org/freedesktop/DBus",
1169 "org.freedesktop.DBus",
1177 int bus_add_match_internal(
1180 struct bus_match_component *components,
1181 unsigned n_components,
1187 return bus_add_match_internal_kernel(bus, components, n_components, cookie);
1189 return bus_add_match_internal_dbus1(bus, match);
1192 int bus_remove_match_internal_kernel(
1196 struct kdbus_cmd_match m;
1202 m.size = offsetof(struct kdbus_cmd_match, items);
1205 r = ioctl(bus->input_fd, KDBUS_CMD_MATCH_REMOVE, &m);
1212 static int bus_remove_match_internal_dbus1(
1214 const char *match) {
1221 e = internal_match(bus, match);
1223 return sd_bus_call_method(
1225 "org.freedesktop.DBus",
1226 "/org/freedesktop/DBus",
1227 "org.freedesktop.DBus",
1235 int bus_remove_match_internal(
1243 return bus_remove_match_internal_kernel(bus, cookie);
1245 return bus_remove_match_internal_dbus1(bus, match);
1248 _public_ int sd_bus_get_name_machine_id(sd_bus *bus, const char *name, sd_id128_t *machine) {
1249 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL, *m = NULL;
1253 assert_return(bus, -EINVAL);
1254 assert_return(name, -EINVAL);
1255 assert_return(machine, -EINVAL);
1256 assert_return(!bus_pid_changed(bus), -ECHILD);
1257 assert_return(service_name_is_valid(name), -EINVAL);
1259 if (!BUS_IS_OPEN(bus->state))
1262 if (streq_ptr(name, bus->unique_name))
1263 return sd_id128_get_machine(machine);
1265 r = sd_bus_message_new_method_call(
1270 "org.freedesktop.DBus.Peer",
1275 r = sd_bus_message_set_auto_start(m, false);
1279 r = sd_bus_call(bus, m, 0, NULL, &reply);
1283 r = sd_bus_message_read(reply, "s", &mid);
1287 return sd_id128_from_string(mid, machine);