1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2013 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #ifdef HAVE_VALGRIND_MEMCHECK_H
23 #include <valgrind/memcheck.h>
33 #include "bus-internal.h"
34 #include "bus-message.h"
35 #include "bus-kernel.h"
36 #include "bus-bloom.h"
38 #include "cgroup-util.h"
40 #define UNIQUE_NAME_MAX (3+DECIMAL_STR_MAX(uint64_t))
42 int bus_kernel_parse_unique_name(const char *s, uint64_t *id) {
48 if (!startswith(s, ":1."))
51 r = safe_atou64(s + 3, id);
58 static void append_payload_vec(struct kdbus_item **d, const void *p, size_t sz) {
64 /* Note that p can be NULL, which encodes a region full of
65 * zeroes, which is useful to optimize certain padding
68 (*d)->size = offsetof(struct kdbus_item, vec) + sizeof(struct kdbus_vec);
69 (*d)->type = KDBUS_ITEM_PAYLOAD_VEC;
70 (*d)->vec.address = PTR_TO_UINT64(p);
73 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
76 static void append_payload_memfd(struct kdbus_item **d, int memfd, size_t sz) {
82 (*d)->size = offsetof(struct kdbus_item, memfd) + sizeof(struct kdbus_memfd);
83 (*d)->type = KDBUS_ITEM_PAYLOAD_MEMFD;
84 (*d)->memfd.fd = memfd;
85 (*d)->memfd.size = sz;
87 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
90 static void append_destination(struct kdbus_item **d, const char *s, size_t length) {
96 (*d)->size = offsetof(struct kdbus_item, str) + length + 1;
97 (*d)->type = KDBUS_ITEM_DST_NAME;
98 memcpy((*d)->str, s, length + 1);
100 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
103 static void* append_bloom(struct kdbus_item **d, size_t length) {
110 (*d)->size = offsetof(struct kdbus_item, data) + length;
111 (*d)->type = KDBUS_ITEM_BLOOM;
114 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
119 static void append_fds(struct kdbus_item **d, const int fds[], unsigned n_fds) {
125 (*d)->size = offsetof(struct kdbus_item, fds) + sizeof(int) * n_fds;
126 (*d)->type = KDBUS_ITEM_FDS;
127 memcpy((*d)->fds, fds, sizeof(int) * n_fds);
129 *d = (struct kdbus_item *) ((uint8_t*) *d + (*d)->size);
132 static int bus_message_setup_bloom(sd_bus_message *m, void *bloom) {
139 memset(bloom, 0, BLOOM_SIZE);
141 bloom_add_pair(bloom, "message-type", bus_message_type_to_string(m->header->type));
144 bloom_add_pair(bloom, "interface", m->interface);
146 bloom_add_pair(bloom, "member", m->member);
148 bloom_add_pair(bloom, "path", m->path);
149 bloom_add_pair(bloom, "path-slash-prefix", m->path);
150 bloom_add_prefixes(bloom, "path-slash-prefix", m->path, '/');
153 r = sd_bus_message_rewind(m, true);
157 for (i = 0; i < 64; i++) {
160 char buf[sizeof("arg")-1 + 2 + sizeof("-slash-prefix")];
163 r = sd_bus_message_peek_type(m, &type, NULL);
167 if (type != SD_BUS_TYPE_STRING &&
168 type != SD_BUS_TYPE_OBJECT_PATH &&
169 type != SD_BUS_TYPE_SIGNATURE)
172 r = sd_bus_message_read_basic(m, type, &t);
176 e = stpcpy(buf, "arg");
178 *(e++) = '0' + (char) i;
180 *(e++) = '0' + (char) (i / 10);
181 *(e++) = '0' + (char) (i % 10);
185 bloom_add_pair(bloom, buf, t);
187 strcpy(e, "-dot-prefix");
188 bloom_add_prefixes(bloom, buf, t, '.');
189 strcpy(e, "-slash-prefix");
190 bloom_add_prefixes(bloom, buf, t, '/');
196 static int bus_message_setup_kmsg(sd_bus *b, sd_bus_message *m) {
197 struct bus_body_part *part;
198 struct kdbus_item *d;
209 /* We put this together only once, if this message is reused
210 * we reuse the earlier-built version */
214 if (m->destination) {
215 r = bus_kernel_parse_unique_name(m->destination, &unique);
223 sz = offsetof(struct kdbus_msg, items);
225 assert_cc(ALIGN8(offsetof(struct kdbus_item, vec) + sizeof(struct kdbus_vec)) ==
226 ALIGN8(offsetof(struct kdbus_item, memfd) + sizeof(struct kdbus_memfd)));
228 /* Add in fixed header, fields header and payload */
229 sz += (1 + m->n_body_parts) *
230 ALIGN8(offsetof(struct kdbus_item, vec) + sizeof(struct kdbus_vec));
232 /* Add space for bloom filter */
233 sz += ALIGN8(offsetof(struct kdbus_item, data) + BLOOM_SIZE);
235 /* Add in well-known destination header */
237 dl = strlen(m->destination);
238 sz += ALIGN8(offsetof(struct kdbus_item, str) + dl + 1);
241 /* Add space for unix fds */
243 sz += ALIGN8(offsetof(struct kdbus_item, fds) + sizeof(int)*m->n_fds);
245 m->kdbus = memalign(8, sz);
251 m->free_kdbus = true;
252 memset(m->kdbus, 0, sz);
255 ((m->header->flags & BUS_MESSAGE_NO_REPLY_EXPECTED) ? 0 : KDBUS_MSG_FLAGS_EXPECT_REPLY) |
256 ((m->header->flags & BUS_MESSAGE_NO_AUTO_START) ? KDBUS_MSG_FLAGS_NO_AUTO_START : 0);
259 m->destination ? unique : KDBUS_DST_ID_BROADCAST;
260 m->kdbus->payload_type = KDBUS_PAYLOAD_DBUS;
261 m->kdbus->cookie = m->header->serial;
263 if (m->header->flags & BUS_MESSAGE_NO_REPLY_EXPECTED)
264 m->kdbus->cookie_reply = m->reply_cookie;
266 m->kdbus->timeout_ns = m->timeout * NSEC_PER_USEC;
271 append_destination(&d, m->destination, dl);
273 append_payload_vec(&d, m->header, BUS_MESSAGE_BODY_BEGIN(m));
275 MESSAGE_FOREACH_PART(part, i, m) {
277 /* If this is padding then simply send a
278 * vector with a NULL data pointer which the
279 * kernel will just pass through. This is the
280 * most efficient way to encode zeroes */
282 append_payload_vec(&d, NULL, part->size);
286 if (part->memfd >= 0 && part->sealed && m->destination) {
287 /* Try to send a memfd, if the part is
288 * sealed and this is not a broadcast. Since we can only */
290 append_payload_memfd(&d, part->memfd, part->size);
294 /* Otherwise let's send a vector to the actual data,
295 * for that we need to map it first. */
296 r = bus_body_part_map(part);
300 append_payload_vec(&d, part->data, part->size);
303 if (m->kdbus->dst_id == KDBUS_DST_ID_BROADCAST) {
306 p = append_bloom(&d, BLOOM_SIZE);
307 r = bus_message_setup_bloom(m, p);
313 append_fds(&d, m->fds, m->n_fds);
315 m->kdbus->size = (uint8_t*) d - (uint8_t*) m->kdbus;
316 assert(m->kdbus->size <= sz);
325 static int bus_kernel_make_message(sd_bus *bus, struct kdbus_msg *k) {
326 sd_bus_message *m = NULL;
327 struct kdbus_item *d;
329 _cleanup_free_ int *fds = NULL;
330 struct bus_header *h = NULL;
331 size_t total, n_bytes = 0, idx = 0;
332 const char *destination = NULL, *seclabel = NULL;
337 assert(k->payload_type == KDBUS_PAYLOAD_DBUS);
339 KDBUS_ITEM_FOREACH(d, k, items) {
342 l = d->size - offsetof(struct kdbus_item, data);
346 case KDBUS_ITEM_PAYLOAD_OFF:
348 h = (struct bus_header *)((uint8_t *)k + d->vec.offset);
350 if (!bus_header_is_complete(h, d->vec.size))
354 n_bytes += d->vec.size;
357 case KDBUS_ITEM_PAYLOAD_MEMFD:
361 n_bytes += d->memfd.size;
364 case KDBUS_ITEM_FDS: {
369 f = realloc(fds, sizeof(int) * (n_fds + j));
374 memcpy(fds + n_fds, d->fds, sizeof(int) * j);
379 case KDBUS_ITEM_SECLABEL:
388 r = bus_header_message_size(h, &total);
392 if (n_bytes != total)
395 /* on kdbus we only speak native endian gvariant, never dbus1
396 * marshalling or reverse endian */
397 if (h->version != 2 ||
398 h->endian != BUS_NATIVE_ENDIAN)
401 r = bus_message_from_header(bus, h, sizeof(struct bus_header), fds, n_fds, NULL, seclabel, 0, &m);
405 /* The well-known names list is different from the other
406 credentials. If we asked for it, but nothing is there, this
407 means that the list of well-known names is simply empty, not
408 that we lack any data */
410 m->creds.mask |= (SD_BUS_CREDS_UNIQUE_NAME|SD_BUS_CREDS_WELL_KNOWN_NAMES) & bus->creds_mask;
412 KDBUS_ITEM_FOREACH(d, k, items) {
415 l = d->size - offsetof(struct kdbus_item, data);
419 case KDBUS_ITEM_PAYLOAD_OFF: {
422 begin_body = BUS_MESSAGE_BODY_BEGIN(m);
424 if (idx + d->vec.size > begin_body) {
425 struct bus_body_part *part;
427 /* Contains body material */
429 part = message_append_part(m);
435 /* A -1 offset is NUL padding. */
436 part->is_zero = d->vec.offset == ~0ULL;
438 if (idx >= begin_body) {
440 part->data = (uint8_t *)k + d->vec.offset;
441 part->size = d->vec.size;
444 part->data = (uint8_t *)k + d->vec.offset + (begin_body - idx);
445 part->size = d->vec.size - (begin_body - idx);
455 case KDBUS_ITEM_PAYLOAD_MEMFD: {
456 struct bus_body_part *part;
458 if (idx < BUS_MESSAGE_BODY_BEGIN(m)) {
463 part = message_append_part(m);
469 part->memfd = d->memfd.fd;
470 part->size = d->memfd.size;
473 idx += d->memfd.size;
477 case KDBUS_ITEM_CREDS:
478 /* UID/GID/PID are always valid */
479 m->creds.uid = (uid_t) d->creds.uid;
480 m->creds.gid = (gid_t) d->creds.gid;
481 m->creds.pid = (pid_t) d->creds.pid;
482 m->creds.mask |= (SD_BUS_CREDS_UID|SD_BUS_CREDS_GID|SD_BUS_CREDS_PID) & bus->creds_mask;
484 /* The PID starttime/TID might be missing
485 * however, when the data is faked by some
486 * data bus proxy and it lacks that
487 * information about the real client since
488 * SO_PEERCRED is used for that */
490 if (d->creds.starttime > 0) {
491 m->creds.pid_starttime = d->creds.starttime / NSEC_PER_USEC;
492 m->creds.mask |= SD_BUS_CREDS_PID_STARTTIME & bus->creds_mask;
495 if (d->creds.tid > 0) {
496 m->creds.tid = (pid_t) d->creds.tid;
497 m->creds.mask |= SD_BUS_CREDS_TID & bus->creds_mask;
501 case KDBUS_ITEM_TIMESTAMP:
502 m->realtime = d->timestamp.realtime_ns / NSEC_PER_USEC;
503 m->monotonic = d->timestamp.monotonic_ns / NSEC_PER_USEC;
506 case KDBUS_ITEM_PID_COMM:
507 m->creds.comm = d->str;
508 m->creds.mask |= SD_BUS_CREDS_COMM & bus->creds_mask;
511 case KDBUS_ITEM_TID_COMM:
512 m->creds.tid_comm = d->str;
513 m->creds.mask |= SD_BUS_CREDS_TID_COMM & bus->creds_mask;
517 m->creds.exe = d->str;
518 m->creds.mask |= SD_BUS_CREDS_EXE & bus->creds_mask;
521 case KDBUS_ITEM_CMDLINE:
522 m->creds.cmdline = d->str;
523 m->creds.cmdline_size = l;
524 m->creds.mask |= SD_BUS_CREDS_CMDLINE & bus->creds_mask;
527 case KDBUS_ITEM_CGROUP:
528 m->creds.cgroup = d->str;
529 m->creds.mask |= (SD_BUS_CREDS_CGROUP|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_USER_UNIT|SD_BUS_CREDS_SLICE|SD_BUS_CREDS_SESSION|SD_BUS_CREDS_OWNER_UID) & bus->creds_mask;
531 if (!bus->cgroup_root) {
532 r = cg_get_root_path(&bus->cgroup_root);
537 m->creds.cgroup_root = bus->cgroup_root;
541 case KDBUS_ITEM_AUDIT:
542 m->creds.audit_session_id = (uint32_t) d->audit.sessionid;
543 m->creds.audit_login_uid = (uid_t) d->audit.loginuid;
544 m->creds.mask |= (SD_BUS_CREDS_AUDIT_SESSION_ID|SD_BUS_CREDS_AUDIT_LOGIN_UID) & bus->creds_mask;
547 case KDBUS_ITEM_CAPS:
548 m->creds.capability = d->data;
549 m->creds.capability_size = l;
550 m->creds.mask |= (SD_BUS_CREDS_EFFECTIVE_CAPS|SD_BUS_CREDS_PERMITTED_CAPS|SD_BUS_CREDS_INHERITABLE_CAPS|SD_BUS_CREDS_BOUNDING_CAPS) & bus->creds_mask;
553 case KDBUS_ITEM_DST_NAME:
554 if (!service_name_is_valid(d->str))
557 destination = d->str;
560 case KDBUS_ITEM_NAME:
561 if (!service_name_is_valid(d->name.name))
564 r = strv_extend(&m->creds.well_known_names, d->name.name);
570 case KDBUS_ITEM_SECLABEL:
574 log_debug("Got unknown field from kernel %llu", d->type);
578 r = bus_message_parse_fields(m);
582 /* Override information from the user header with data from the kernel */
583 if (k->src_id == KDBUS_SRC_ID_KERNEL)
584 m->sender = m->creds.unique_name = (char*) "org.freedesktop.DBus";
586 snprintf(m->sender_buffer, sizeof(m->sender_buffer), ":1.%llu", (unsigned long long) k->src_id);
587 m->sender = m->creds.unique_name = m->sender_buffer;
591 m->destination = destination;
592 else if (k->dst_id == KDBUS_DST_ID_BROADCAST)
593 m->destination = NULL;
594 else if (k->dst_id == KDBUS_DST_ID_NAME)
595 m->destination = bus->unique_name; /* fill in unique name if the well-known name is missing */
597 snprintf(m->destination_buffer, sizeof(m->destination_buffer), ":1.%llu", (unsigned long long) k->dst_id);
598 m->destination = m->destination_buffer;
601 /* We take possession of the kmsg struct now */
603 m->release_kdbus = true;
607 bus->rqueue[bus->rqueue_size++] = m;
613 struct bus_body_part *part;
616 /* Make sure the memfds are not freed twice */
617 MESSAGE_FOREACH_PART(part, i, m)
618 if (part->memfd >= 0)
621 sd_bus_message_unref(m);
627 int bus_kernel_take_fd(sd_bus *b) {
628 struct kdbus_cmd_hello *hello;
629 struct kdbus_item *item;
640 sz = ALIGN8(offsetof(struct kdbus_cmd_hello, items));
642 if (b->fake_creds_valid)
643 sz += ALIGN8(offsetof(struct kdbus_item, creds)) + sizeof(struct kdbus_creds);
646 l = strlen(b->fake_label);
647 sz += ALIGN8(offsetof(struct kdbus_item, str) + l + 1);
652 hello->conn_flags = b->hello_flags;
653 hello->attach_flags = b->attach_flags;
654 hello->pool_size = KDBUS_POOL_SIZE;
658 if (b->fake_creds_valid) {
659 item->size = offsetof(struct kdbus_item, creds) + sizeof(struct kdbus_creds);
660 item->type = KDBUS_ITEM_CREDS;
661 item->creds = b->fake_creds;
663 item = KDBUS_ITEM_NEXT(item);
667 item->size = offsetof(struct kdbus_item, str) + l + 1;
668 memcpy(item->str, b->fake_label, l+1);
671 r = ioctl(b->input_fd, KDBUS_CMD_HELLO, hello);
675 if (!b->kdbus_buffer) {
676 b->kdbus_buffer = mmap(NULL, KDBUS_POOL_SIZE, PROT_READ, MAP_SHARED, b->input_fd, 0);
677 if (b->kdbus_buffer == MAP_FAILED) {
678 b->kdbus_buffer = NULL;
683 /* The higher 32bit of both flags fields are considered
684 * 'incompatible flags'. Refuse them all for now. */
685 if (hello->bus_flags > 0xFFFFFFFFULL ||
686 hello->conn_flags > 0xFFFFFFFFULL)
689 if (hello->bloom_size != BLOOM_SIZE)
692 if (asprintf(&b->unique_name, ":1.%llu", (unsigned long long) hello->id) < 0)
695 b->unique_id = hello->id;
698 b->bus_client = true;
699 b->can_fds = !!(hello->conn_flags & KDBUS_HELLO_ACCEPT_FD);
700 b->message_version = 2;
701 b->message_endian = BUS_NATIVE_ENDIAN;
703 /* the kernel told us the UUID of the underlying bus */
704 memcpy(b->server_id.bytes, hello->id128, sizeof(b->server_id.bytes));
706 return bus_start_running(b);
709 int bus_kernel_connect(sd_bus *b) {
711 assert(b->input_fd < 0);
712 assert(b->output_fd < 0);
718 b->input_fd = open(b->kernel, O_RDWR|O_NOCTTY|O_CLOEXEC);
722 b->output_fd = b->input_fd;
724 return bus_kernel_take_fd(b);
727 static void close_kdbus_msg(sd_bus *bus, struct kdbus_msg *k) {
729 struct kdbus_item *d;
734 off = (uint8_t *)k - (uint8_t *)bus->kdbus_buffer;
735 ioctl(bus->input_fd, KDBUS_CMD_FREE, &off);
737 KDBUS_ITEM_FOREACH(d, k, items) {
739 if (d->type == KDBUS_ITEM_FDS)
740 close_many(d->fds, (d->size - offsetof(struct kdbus_item, fds)) / sizeof(int));
741 else if (d->type == KDBUS_ITEM_PAYLOAD_MEMFD)
742 close_nointr_nofail(d->memfd.fd);
746 int bus_kernel_write_message(sd_bus *bus, sd_bus_message *m, bool hint_sync_call) {
751 assert(bus->state == BUS_RUNNING);
753 /* If we can't deliver, we want room for the error message */
754 r = bus_rqueue_make_room(bus);
758 r = bus_message_setup_kmsg(bus, m);
762 /* If this is a synchronous method call, then let's tell the
763 * kernel, so that it can pass CPU time/scheduling to the
764 * destination for the time, if it wants to. If we
765 * synchronously wait for the result anyway, we won't need CPU
768 m->kdbus->flags |= KDBUS_MSG_FLAGS_EXPECT_REPLY|KDBUS_MSG_FLAGS_SYNC_REPLY;
770 r = ioctl(bus->output_fd, KDBUS_CMD_MSG_SEND, m->kdbus);
772 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
773 sd_bus_message *reply;
775 if (errno == EAGAIN || errno == EINTR)
777 else if (errno == ENXIO || errno == ESRCH) {
779 /* ENXIO: unique name not known
780 * ESRCH: well-known name not known */
782 if (m->header->type == SD_BUS_MESSAGE_METHOD_CALL)
783 sd_bus_error_setf(&error, SD_BUS_ERROR_SERVICE_UNKNOWN, "Destination %s not known", m->destination);
785 log_debug("Could not deliver message to %s as destination is not known. Ignoring.", m->destination);
789 } else if (errno == EADDRNOTAVAIL) {
791 /* EADDRNOTAVAIL: activation is possible, but turned off in request flags */
793 if (m->header->type == SD_BUS_MESSAGE_METHOD_CALL)
794 sd_bus_error_setf(&error, SD_BUS_ERROR_SERVICE_UNKNOWN, "Activation of %s not requested", m->destination);
796 log_debug("Could not deliver message to %s as destination is not activated. Ignoring.", m->destination);
802 r = bus_message_new_synthetic_error(
804 BUS_MESSAGE_COOKIE(m),
811 r = bus_seal_synthetic_message(bus, reply);
815 bus->rqueue[bus->rqueue_size++] = reply;
817 } else if (hint_sync_call) {
820 k = (struct kdbus_msg *)((uint8_t *)bus->kdbus_buffer + m->kdbus->offset_reply);
823 if (k->payload_type == KDBUS_PAYLOAD_DBUS) {
825 r = bus_kernel_make_message(bus, k);
827 close_kdbus_msg(bus, k);
829 /* Anybody can send us invalid messages, let's just drop them. */
830 if (r == -EBADMSG || r == -EPROTOTYPE)
831 log_debug("Ignoring invalid message: %s", strerror(-r));
836 log_debug("Ignoring message with unknown payload type %llu.", (unsigned long long) k->payload_type);
837 close_kdbus_msg(bus, k);
844 static int push_name_owner_changed(sd_bus *bus, const char *name, const char *old_owner, const char *new_owner) {
845 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
850 r = sd_bus_message_new_signal(
852 "/org/freedesktop/DBus",
853 "org.freedesktop.DBus",
859 r = sd_bus_message_append(m, "sss", name, old_owner, new_owner);
863 m->sender = "org.freedesktop.DBus";
865 r = bus_seal_synthetic_message(bus, m);
869 bus->rqueue[bus->rqueue_size++] = m;
875 static int translate_name_change(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) {
876 char new_owner[UNIQUE_NAME_MAX], old_owner[UNIQUE_NAME_MAX];
882 if (d->type == KDBUS_ITEM_NAME_ADD || (d->name_change.old.flags & (KDBUS_NAME_IN_QUEUE|KDBUS_NAME_ACTIVATOR)))
885 sprintf(old_owner, ":1.%llu", (unsigned long long) d->name_change.old.id);
887 if (d->type == KDBUS_ITEM_NAME_REMOVE || (d->name_change.new.flags & (KDBUS_NAME_IN_QUEUE|KDBUS_NAME_ACTIVATOR))) {
889 if (isempty(old_owner))
894 sprintf(new_owner, ":1.%llu", (unsigned long long) d->name_change.new.id);
896 return push_name_owner_changed(bus, d->name_change.name, old_owner, new_owner);
899 static int translate_id_change(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) {
900 char owner[UNIQUE_NAME_MAX];
906 sprintf(owner, ":1.%llu", d->id_change.id);
908 return push_name_owner_changed(
910 d->type == KDBUS_ITEM_ID_ADD ? NULL : owner,
911 d->type == KDBUS_ITEM_ID_ADD ? owner : NULL);
914 static int translate_reply(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) {
915 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
922 r = bus_message_new_synthetic_error(
925 d->type == KDBUS_ITEM_REPLY_TIMEOUT ?
926 &SD_BUS_ERROR_MAKE_CONST(SD_BUS_ERROR_NO_REPLY, "Method call timed out") :
927 &SD_BUS_ERROR_MAKE_CONST(SD_BUS_ERROR_NO_REPLY, "Method call peer died"),
932 m->sender = "org.freedesktop.DBus";
934 r = bus_seal_synthetic_message(bus, m);
938 bus->rqueue[bus->rqueue_size++] = m;
944 static int bus_kernel_translate_message(sd_bus *bus, struct kdbus_msg *k) {
945 struct kdbus_item *d, *found = NULL;
947 static int (* const translate[])(sd_bus *bus, struct kdbus_msg *k, struct kdbus_item *d) = {
948 [KDBUS_ITEM_NAME_ADD - _KDBUS_ITEM_KERNEL_BASE] = translate_name_change,
949 [KDBUS_ITEM_NAME_REMOVE - _KDBUS_ITEM_KERNEL_BASE] = translate_name_change,
950 [KDBUS_ITEM_NAME_CHANGE - _KDBUS_ITEM_KERNEL_BASE] = translate_name_change,
952 [KDBUS_ITEM_ID_ADD - _KDBUS_ITEM_KERNEL_BASE] = translate_id_change,
953 [KDBUS_ITEM_ID_REMOVE - _KDBUS_ITEM_KERNEL_BASE] = translate_id_change,
955 [KDBUS_ITEM_REPLY_TIMEOUT - _KDBUS_ITEM_KERNEL_BASE] = translate_reply,
956 [KDBUS_ITEM_REPLY_DEAD - _KDBUS_ITEM_KERNEL_BASE] = translate_reply,
961 assert(k->payload_type == KDBUS_PAYLOAD_KERNEL);
963 KDBUS_ITEM_FOREACH(d, k, items) {
964 if (d->type >= _KDBUS_ITEM_KERNEL_BASE && d->type < _KDBUS_ITEM_KERNEL_BASE + ELEMENTSOF(translate)) {
969 log_debug("Got unknown field from kernel %llu", d->type);
973 log_debug("Didn't find a kernel message to translate.");
977 return translate[found->type - _KDBUS_ITEM_KERNEL_BASE](bus, k, found);
980 int bus_kernel_read_message(sd_bus *bus) {
981 struct kdbus_cmd_recv recv = {};
987 r = bus_rqueue_make_room(bus);
991 r = ioctl(bus->input_fd, KDBUS_CMD_MSG_RECV, &recv);
999 k = (struct kdbus_msg *)((uint8_t *)bus->kdbus_buffer + recv.offset);
1000 if (k->payload_type == KDBUS_PAYLOAD_DBUS) {
1001 r = bus_kernel_make_message(bus, k);
1003 /* Anybody can send us invalid messages, let's just drop them. */
1004 if (r == -EBADMSG || r == -EPROTOTYPE) {
1005 log_debug("Ignoring invalid message: %s", strerror(-r));
1009 } else if (k->payload_type == KDBUS_PAYLOAD_KERNEL)
1010 r = bus_kernel_translate_message(bus, k);
1012 log_debug("Ignoring message with unknown payload type %llu.", (unsigned long long) k->payload_type);
1017 close_kdbus_msg(bus, k);
1019 return r < 0 ? r : 1;
1022 int bus_kernel_pop_memfd(sd_bus *bus, void **address, size_t *mapped, size_t *allocated) {
1023 struct memfd_cache *c;
1030 if (!bus || !bus->is_kernel)
1033 assert_se(pthread_mutex_lock(&bus->memfd_cache_mutex) >= 0);
1035 if (bus->n_memfd_cache <= 0) {
1036 struct kdbus_cmd_memfd_make cmd = {
1037 .size = sizeof(struct kdbus_cmd_memfd_make),
1041 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1043 r = ioctl(bus->input_fd, KDBUS_CMD_MEMFD_NEW, &cmd);
1053 c = &bus->memfd_cache[--bus->n_memfd_cache];
1056 assert(c->mapped == 0 || c->address);
1058 *address = c->address;
1059 *mapped = c->mapped;
1060 *allocated = c->allocated;
1063 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1068 static void close_and_munmap(int fd, void *address, size_t size) {
1070 assert_se(munmap(address, PAGE_ALIGN(size)) >= 0);
1072 close_nointr_nofail(fd);
1075 void bus_kernel_push_memfd(sd_bus *bus, int fd, void *address, size_t mapped, size_t allocated) {
1076 struct memfd_cache *c;
1077 uint64_t max_mapped = PAGE_ALIGN(MEMFD_CACHE_ITEM_SIZE_MAX);
1080 assert(mapped == 0 || address);
1082 if (!bus || !bus->is_kernel) {
1083 close_and_munmap(fd, address, mapped);
1087 assert_se(pthread_mutex_lock(&bus->memfd_cache_mutex) >= 0);
1089 if (bus->n_memfd_cache >= ELEMENTSOF(bus->memfd_cache)) {
1090 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1092 close_and_munmap(fd, address, mapped);
1096 c = &bus->memfd_cache[bus->n_memfd_cache++];
1098 c->address = address;
1100 /* If overly long, let's return a bit to the OS */
1101 if (mapped > max_mapped) {
1102 assert_se(ioctl(fd, KDBUS_CMD_MEMFD_SIZE_SET, &max_mapped) >= 0);
1103 assert_se(munmap((uint8_t*) address + max_mapped, PAGE_ALIGN(mapped - max_mapped)) >= 0);
1104 c->mapped = c->allocated = max_mapped;
1107 c->allocated = allocated;
1110 assert_se(pthread_mutex_unlock(&bus->memfd_cache_mutex) >= 0);
1113 void bus_kernel_flush_memfd(sd_bus *b) {
1118 for (i = 0; i < b->n_memfd_cache; i++)
1119 close_and_munmap(b->memfd_cache[i].fd, b->memfd_cache[i].address, b->memfd_cache[i].mapped);
1122 int kdbus_translate_request_name_flags(uint64_t flags, uint64_t *kdbus_flags) {
1125 assert(kdbus_flags);
1127 if (flags & SD_BUS_NAME_ALLOW_REPLACEMENT)
1128 f |= KDBUS_NAME_ALLOW_REPLACEMENT;
1130 if (flags & SD_BUS_NAME_REPLACE_EXISTING)
1131 f |= KDBUS_NAME_REPLACE_EXISTING;
1133 if (flags & SD_BUS_NAME_QUEUE)
1134 f |= KDBUS_NAME_QUEUE;
1140 int kdbus_translate_attach_flags(uint64_t mask, uint64_t *kdbus_mask) {
1145 if (mask & (SD_BUS_CREDS_UID|SD_BUS_CREDS_GID|SD_BUS_CREDS_PID|SD_BUS_CREDS_PID_STARTTIME|SD_BUS_CREDS_TID))
1146 m |= KDBUS_ATTACH_CREDS;
1148 if (mask & (SD_BUS_CREDS_COMM|SD_BUS_CREDS_TID_COMM))
1149 m |= KDBUS_ATTACH_COMM;
1151 if (mask & SD_BUS_CREDS_EXE)
1152 m |= KDBUS_ATTACH_EXE;
1154 if (mask & SD_BUS_CREDS_CMDLINE)
1155 m |= KDBUS_ATTACH_CMDLINE;
1157 if (mask & (SD_BUS_CREDS_CGROUP|SD_BUS_CREDS_UNIT|SD_BUS_CREDS_USER_UNIT|SD_BUS_CREDS_SLICE|SD_BUS_CREDS_SESSION|SD_BUS_CREDS_OWNER_UID))
1158 m |= KDBUS_ATTACH_CGROUP;
1160 if (mask & (SD_BUS_CREDS_EFFECTIVE_CAPS|SD_BUS_CREDS_PERMITTED_CAPS|SD_BUS_CREDS_INHERITABLE_CAPS|SD_BUS_CREDS_BOUNDING_CAPS))
1161 m |= KDBUS_ATTACH_CAPS;
1163 if (mask & SD_BUS_CREDS_SELINUX_CONTEXT)
1164 m |= KDBUS_ATTACH_SECLABEL;
1166 if (mask & (SD_BUS_CREDS_AUDIT_SESSION_ID|SD_BUS_CREDS_AUDIT_LOGIN_UID))
1167 m |= KDBUS_ATTACH_AUDIT;
1169 if (mask & SD_BUS_CREDS_WELL_KNOWN_NAMES)
1170 m |= KDBUS_ATTACH_NAMES;
1176 int bus_kernel_create_bus(const char *name, bool world, char **s) {
1177 struct kdbus_cmd_make *make;
1178 struct kdbus_item *n;
1184 fd = open("/dev/kdbus/control", O_RDWR|O_NOCTTY|O_CLOEXEC);
1188 make = alloca0(ALIGN8(offsetof(struct kdbus_cmd_make, items) +
1189 offsetof(struct kdbus_item, data64) + sizeof(uint64_t) +
1190 offsetof(struct kdbus_item, str) +
1191 DECIMAL_STR_MAX(uid_t) + 1 + strlen(name) + 1));
1193 make->size = offsetof(struct kdbus_cmd_make, items);
1196 n->size = offsetof(struct kdbus_item, data64) + sizeof(uint64_t);
1197 n->type = KDBUS_ITEM_BLOOM_SIZE;
1198 n->data64[0] = BLOOM_SIZE;
1199 assert_cc(BLOOM_SIZE % 8 == 0);
1200 make->size += ALIGN8(n->size);
1202 n = KDBUS_ITEM_NEXT(n);
1203 sprintf(n->str, "%lu-%s", (unsigned long) getuid(), name);
1204 n->size = offsetof(struct kdbus_item, str) + strlen(n->str) + 1;
1205 n->type = KDBUS_ITEM_MAKE_NAME;
1206 make->size += ALIGN8(n->size);
1208 make->flags = KDBUS_MAKE_POLICY_OPEN | (world ? KDBUS_MAKE_ACCESS_WORLD : 0);
1210 if (ioctl(fd, KDBUS_CMD_BUS_MAKE, make) < 0) {
1211 close_nointr_nofail(fd);
1215 /* The higher 32bit of the flags field are considered
1216 * 'incompatible flags'. Refuse them all for now. */
1217 if (make->flags > 0xFFFFFFFFULL) {
1218 close_nointr_nofail(fd);
1225 p = strjoin("/dev/kdbus/", n->str, "/bus", NULL);
1227 close_nointr_nofail(fd);
1237 int bus_kernel_create_starter(const char *bus, const char *name) {
1238 struct kdbus_cmd_hello *hello;
1239 struct kdbus_item *n;
1246 p = alloca(sizeof("/dev/kdbus/") - 1 + DECIMAL_STR_MAX(uid_t) + 1 + strlen(bus) + sizeof("/bus"));
1247 sprintf(p, "/dev/kdbus/%lu-%s/bus", (unsigned long) getuid(), bus);
1249 fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC);
1253 hello = alloca0(ALIGN8(offsetof(struct kdbus_cmd_hello, items) +
1254 offsetof(struct kdbus_item, str) +
1258 strcpy(n->str, name);
1259 n->size = offsetof(struct kdbus_item, str) + strlen(n->str) + 1;
1260 n->type = KDBUS_ITEM_NAME;
1262 hello->size = ALIGN8(offsetof(struct kdbus_cmd_hello, items) + n->size);
1263 hello->conn_flags = KDBUS_HELLO_ACTIVATOR;
1264 hello->pool_size = KDBUS_POOL_SIZE;
1266 if (ioctl(fd, KDBUS_CMD_HELLO, hello) < 0) {
1267 close_nointr_nofail(fd);
1271 /* The higher 32bit of both flags fields are considered
1272 * 'incompatible flags'. Refuse them all for now. */
1273 if (hello->bus_flags > 0xFFFFFFFFULL ||
1274 hello->conn_flags > 0xFFFFFFFFULL) {
1275 close_nointr_nofail(fd);
1279 if (hello->bloom_size != BLOOM_SIZE) {
1280 close_nointr_nofail(fd);
1287 int bus_kernel_create_namespace(const char *name, char **s) {
1288 struct kdbus_cmd_make *make;
1289 struct kdbus_item *n;
1295 fd = open("/dev/kdbus/control", O_RDWR|O_NOCTTY|O_CLOEXEC);
1299 make = alloca0(ALIGN8(offsetof(struct kdbus_cmd_make, items) +
1300 offsetof(struct kdbus_item, str) +
1304 strcpy(n->str, name);
1305 n->size = offsetof(struct kdbus_item, str) + strlen(n->str) + 1;
1306 n->type = KDBUS_ITEM_MAKE_NAME;
1308 make->size = ALIGN8(offsetof(struct kdbus_cmd_make, items) + n->size);
1309 make->flags = KDBUS_MAKE_POLICY_OPEN | KDBUS_MAKE_ACCESS_WORLD;
1311 if (ioctl(fd, KDBUS_CMD_NS_MAKE, make) < 0) {
1312 close_nointr_nofail(fd);
1316 /* The higher 32bit of the flags field are considered
1317 * 'incompatible flags'. Refuse them all for now. */
1318 if (make->flags > 0xFFFFFFFFULL) {
1319 close_nointr_nofail(fd);
1326 p = strappend("/dev/kdbus/ns/", name);
1328 close_nointr_nofail(fd);
1338 int bus_kernel_create_monitor(const char *bus) {
1339 struct kdbus_cmd_hello *hello;
1345 p = alloca(sizeof("/dev/kdbus/") - 1 + DECIMAL_STR_MAX(uid_t) + 1 + strlen(bus) + sizeof("/bus"));
1346 sprintf(p, "/dev/kdbus/%lu-%s/bus", (unsigned long) getuid(), bus);
1348 fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC);
1352 hello = alloca0(sizeof(struct kdbus_cmd_hello));
1353 hello->size = sizeof(struct kdbus_cmd_hello);
1354 hello->conn_flags = KDBUS_HELLO_ACTIVATOR;
1355 hello->pool_size = KDBUS_POOL_SIZE;
1357 if (ioctl(fd, KDBUS_CMD_HELLO, hello) < 0) {
1358 close_nointr_nofail(fd);
1362 /* The higher 32bit of both flags fields are considered
1363 * 'incompatible flags'. Refuse them all for now. */
1364 if (hello->bus_flags > 0xFFFFFFFFULL ||
1365 hello->conn_flags > 0xFFFFFFFFULL) {
1366 close_nointr_nofail(fd);
1373 int bus_kernel_try_close(sd_bus *bus) {
1375 assert(bus->is_kernel);
1377 if (ioctl(bus->input_fd, KDBUS_CMD_BYEBYE) < 0)