D-Bus  1.14.10
dbus-sysdeps-util-unix.c
1 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2 /* dbus-sysdeps-util-unix.c Would be in dbus-sysdeps-unix.c, but not used in libdbus
3  *
4  * Copyright (C) 2002, 2003, 2004, 2005 Red Hat, Inc.
5  * Copyright (C) 2003 CodeFactory AB
6  *
7  * Licensed under the Academic Free License version 2.1
8  *
9  * This program is free software; you can redistribute it and/or modify
10  * it under the terms of the GNU General Public License as published by
11  * the Free Software Foundation; either version 2 of the License, or
12  * (at your option) any later version.
13  *
14  * This program is distributed in the hope that it will be useful,
15  * but WITHOUT ANY WARRANTY; without even the implied warranty of
16  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17  * GNU General Public License for more details.
18  *
19  * You should have received a copy of the GNU General Public License
20  * along with this program; if not, write to the Free Software
21  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
22  *
23  */
24 
25 #include <config.h>
26 #include "dbus-sysdeps.h"
27 #include "dbus-sysdeps-unix.h"
28 #include "dbus-internals.h"
29 #include "dbus-list.h"
30 #include "dbus-pipe.h"
31 #include "dbus-protocol.h"
32 #include "dbus-string.h"
33 #define DBUS_USERDB_INCLUDES_PRIVATE 1
34 #include "dbus-userdb.h"
35 #include "dbus-test.h"
36 
37 #include <sys/types.h>
38 #include <stdio.h>
39 #include <stdlib.h>
40 #include <string.h>
41 #include <signal.h>
42 #include <unistd.h>
43 #include <stdio.h>
44 #include <errno.h>
45 #include <fcntl.h>
46 #include <limits.h>
47 #include <sys/stat.h>
48 #ifdef HAVE_SYS_RESOURCE_H
49 #include <sys/resource.h>
50 #endif
51 #include <grp.h>
52 #include <sys/socket.h>
53 #include <dirent.h>
54 #include <sys/un.h>
55 
56 #ifdef HAVE_SYS_PRCTL_H
57 #include <sys/prctl.h>
58 #endif
59 
60 #ifdef HAVE_SYSTEMD
61 #include <systemd/sd-daemon.h>
62 #endif
63 
64 #ifndef O_BINARY
65 #define O_BINARY 0
66 #endif
67 
85  DBusPipe *print_pid_pipe,
86  DBusError *error,
87  dbus_bool_t keep_umask)
88 {
89  const char *s;
90  pid_t child_pid;
91  DBusEnsureStandardFdsFlags flags;
92 
93  _dbus_verbose ("Becoming a daemon...\n");
94 
95  _dbus_verbose ("chdir to /\n");
96  if (chdir ("/") < 0)
97  {
99  "Could not chdir() to root directory");
100  return FALSE;
101  }
102 
103  _dbus_verbose ("forking...\n");
104 
105  /* Make sure our output buffers aren't redundantly printed by both the
106  * parent and the child */
107  fflush (stdout);
108  fflush (stderr);
109 
110  switch ((child_pid = fork ()))
111  {
112  case -1:
113  _dbus_verbose ("fork failed\n");
114  dbus_set_error (error, _dbus_error_from_errno (errno),
115  "Failed to fork daemon: %s", _dbus_strerror (errno));
116  return FALSE;
117  break;
118 
119  case 0:
120  _dbus_verbose ("in child, closing std file descriptors\n");
121 
122  flags = DBUS_FORCE_STDIN_NULL | DBUS_FORCE_STDOUT_NULL;
123  s = _dbus_getenv ("DBUS_DEBUG_OUTPUT");
124 
125  if (s == NULL || *s == '\0')
126  flags |= DBUS_FORCE_STDERR_NULL;
127  else
128  _dbus_verbose ("keeping stderr open due to DBUS_DEBUG_OUTPUT\n");
129 
130  if (!_dbus_ensure_standard_fds (flags, &s))
131  {
132  _dbus_warn ("%s: %s", s, _dbus_strerror (errno));
133  _exit (1);
134  }
135 
136  if (!keep_umask)
137  {
138  /* Get a predictable umask */
139  _dbus_verbose ("setting umask\n");
140  umask (022);
141  }
142 
143  _dbus_verbose ("calling setsid()\n");
144  if (setsid () == -1)
145  _dbus_assert_not_reached ("setsid() failed");
146 
147  break;
148 
149  default:
150  if (!_dbus_write_pid_to_file_and_pipe (pidfile, print_pid_pipe,
151  child_pid, error))
152  {
153  _dbus_verbose ("pid file or pipe write failed: %s\n",
154  error->message);
155  kill (child_pid, SIGTERM);
156  return FALSE;
157  }
158 
159  _dbus_verbose ("parent exiting\n");
160  _exit (0);
161  break;
162  }
163 
164  return TRUE;
165 }
166 
167 
176 static dbus_bool_t
177 _dbus_write_pid_file (const DBusString *filename,
178  unsigned long pid,
179  DBusError *error)
180 {
181  const char *cfilename;
182  int fd;
183  FILE *f;
184 
185  cfilename = _dbus_string_get_const_data (filename);
186 
187  fd = open (cfilename, O_WRONLY|O_CREAT|O_EXCL|O_BINARY, 0644);
188 
189  if (fd < 0)
190  {
191  dbus_set_error (error, _dbus_error_from_errno (errno),
192  "Failed to open \"%s\": %s", cfilename,
193  _dbus_strerror (errno));
194  return FALSE;
195  }
196 
197  if ((f = fdopen (fd, "w")) == NULL)
198  {
199  dbus_set_error (error, _dbus_error_from_errno (errno),
200  "Failed to fdopen fd %d: %s", fd, _dbus_strerror (errno));
201  _dbus_close (fd, NULL);
202  return FALSE;
203  }
204 
205  if (fprintf (f, "%lu\n", pid) < 0)
206  {
207  dbus_set_error (error, _dbus_error_from_errno (errno),
208  "Failed to write to \"%s\": %s", cfilename,
209  _dbus_strerror (errno));
210 
211  fclose (f);
212  return FALSE;
213  }
214 
215  if (fclose (f) == EOF)
216  {
217  dbus_set_error (error, _dbus_error_from_errno (errno),
218  "Failed to close \"%s\": %s", cfilename,
219  _dbus_strerror (errno));
220  return FALSE;
221  }
222 
223  return TRUE;
224 }
225 
239  DBusPipe *print_pid_pipe,
240  dbus_pid_t pid_to_write,
241  DBusError *error)
242 {
243  if (pidfile)
244  {
245  _dbus_verbose ("writing pid file %s\n", _dbus_string_get_const_data (pidfile));
246  if (!_dbus_write_pid_file (pidfile,
247  pid_to_write,
248  error))
249  {
250  _dbus_verbose ("pid file write failed\n");
251  _DBUS_ASSERT_ERROR_IS_SET(error);
252  return FALSE;
253  }
254  }
255  else
256  {
257  _dbus_verbose ("No pid file requested\n");
258  }
259 
260  if (print_pid_pipe != NULL && _dbus_pipe_is_valid (print_pid_pipe))
261  {
262  DBusString pid;
263  int bytes;
264 
265  _dbus_verbose ("writing our pid to pipe %d\n",
266  print_pid_pipe->fd);
267 
268  if (!_dbus_string_init (&pid))
269  {
270  _DBUS_SET_OOM (error);
271  return FALSE;
272  }
273 
274  if (!_dbus_string_append_int (&pid, pid_to_write) ||
275  !_dbus_string_append (&pid, "\n"))
276  {
277  _dbus_string_free (&pid);
278  _DBUS_SET_OOM (error);
279  return FALSE;
280  }
281 
282  bytes = _dbus_string_get_length (&pid);
283  if (_dbus_pipe_write (print_pid_pipe, &pid, 0, bytes, error) != bytes)
284  {
285  /* _dbus_pipe_write sets error only on failure, not short write */
286  if (error != NULL && !dbus_error_is_set(error))
287  {
289  "Printing message bus PID: did not write enough bytes\n");
290  }
291  _dbus_string_free (&pid);
292  return FALSE;
293  }
294 
295  _dbus_string_free (&pid);
296  }
297  else
298  {
299  _dbus_verbose ("No pid pipe to write to\n");
300  }
301 
302  return TRUE;
303 }
304 
312 _dbus_verify_daemon_user (const char *user)
313 {
314  DBusString u;
315 
316  _dbus_string_init_const (&u, user);
317 
319 }
320 
321 
322 /* The HAVE_LIBAUDIT case lives in selinux.c */
323 #ifndef HAVE_LIBAUDIT
332 _dbus_change_to_daemon_user (const char *user,
333  DBusError *error)
334 {
335  dbus_uid_t uid;
336  dbus_gid_t gid;
337  DBusString u;
338 
339  _dbus_string_init_const (&u, user);
340 
341  if (!_dbus_get_user_id_and_primary_group (&u, &uid, &gid))
342  {
344  "User '%s' does not appear to exist?",
345  user);
346  return FALSE;
347  }
348 
349  /* setgroups() only works if we are a privileged process,
350  * so we don't return error on failure; the only possible
351  * failure is that we don't have perms to do it.
352  *
353  * not sure this is right, maybe if setuid()
354  * is going to work then setgroups() should also work.
355  */
356  if (setgroups (0, NULL) < 0)
357  _dbus_warn ("Failed to drop supplementary groups: %s",
358  _dbus_strerror (errno));
359 
360  /* Set GID first, or the setuid may remove our permission
361  * to change the GID
362  */
363  if (setgid (gid) < 0)
364  {
365  dbus_set_error (error, _dbus_error_from_errno (errno),
366  "Failed to set GID to %lu: %s", gid,
367  _dbus_strerror (errno));
368  return FALSE;
369  }
370 
371  if (setuid (uid) < 0)
372  {
373  dbus_set_error (error, _dbus_error_from_errno (errno),
374  "Failed to set UID to %lu: %s", uid,
375  _dbus_strerror (errno));
376  return FALSE;
377  }
378 
379  return TRUE;
380 }
381 #endif /* !HAVE_LIBAUDIT */
382 
383 #ifdef HAVE_SETRLIMIT
384 
385 /* We assume that if we have setrlimit, we also have getrlimit and
386  * struct rlimit.
387  */
388 
389 struct DBusRLimit {
390  struct rlimit lim;
391 };
392 
393 DBusRLimit *
394 _dbus_rlimit_save_fd_limit (DBusError *error)
395 {
396  DBusRLimit *self;
397 
398  self = dbus_new0 (DBusRLimit, 1);
399 
400  if (self == NULL)
401  {
402  _DBUS_SET_OOM (error);
403  return NULL;
404  }
405 
406  if (getrlimit (RLIMIT_NOFILE, &self->lim) < 0)
407  {
408  dbus_set_error (error, _dbus_error_from_errno (errno),
409  "Failed to get fd limit: %s", _dbus_strerror (errno));
410  dbus_free (self);
411  return NULL;
412  }
413 
414  return self;
415 }
416 
417 /* Enough fds that we shouldn't run out, even if several uids work
418  * together to carry out a denial-of-service attack. This happens to be
419  * the same number that systemd < 234 would normally use. */
420 #define ENOUGH_FDS 65536
421 
423 _dbus_rlimit_raise_fd_limit (DBusError *error)
424 {
425  struct rlimit old, lim;
426 
427  if (getrlimit (RLIMIT_NOFILE, &lim) < 0)
428  {
429  dbus_set_error (error, _dbus_error_from_errno (errno),
430  "Failed to get fd limit: %s", _dbus_strerror (errno));
431  return FALSE;
432  }
433 
434  old = lim;
435 
436  if (getuid () == 0)
437  {
438  /* We are privileged, so raise the soft limit to at least
439  * ENOUGH_FDS, and the hard limit to at least the desired soft
440  * limit. This assumes we can exercise CAP_SYS_RESOURCE on Linux,
441  * or other OSs' equivalents. */
442  if (lim.rlim_cur != RLIM_INFINITY &&
443  lim.rlim_cur < ENOUGH_FDS)
444  lim.rlim_cur = ENOUGH_FDS;
445 
446  if (lim.rlim_max != RLIM_INFINITY &&
447  lim.rlim_max < lim.rlim_cur)
448  lim.rlim_max = lim.rlim_cur;
449  }
450 
451  /* Raise the soft limit to match the hard limit, which we can do even
452  * if we are unprivileged. In particular, systemd >= 240 will normally
453  * set rlim_cur to 1024 and rlim_max to 512*1024, recent Debian
454  * versions end up setting rlim_cur to 1024 and rlim_max to 1024*1024,
455  * and older and non-systemd Linux systems would typically set rlim_cur
456  * to 1024 and rlim_max to 4096. */
457  if (lim.rlim_max == RLIM_INFINITY || lim.rlim_cur < lim.rlim_max)
458  {
459 #if defined(__APPLE__) && defined(__MACH__)
460  /* macOS 10.5 and above no longer allows RLIM_INFINITY for rlim_cur */
461  lim.rlim_cur = MIN (OPEN_MAX, lim.rlim_max);
462 #else
463  lim.rlim_cur = lim.rlim_max;
464 #endif
465  }
466 
467  /* Early-return if there is nothing to do. */
468  if (lim.rlim_max == old.rlim_max &&
469  lim.rlim_cur == old.rlim_cur)
470  return TRUE;
471 
472  if (setrlimit (RLIMIT_NOFILE, &lim) < 0)
473  {
474  dbus_set_error (error, _dbus_error_from_errno (errno),
475  "Failed to set fd limit to %lu: %s",
476  (unsigned long) lim.rlim_cur,
477  _dbus_strerror (errno));
478  return FALSE;
479  }
480 
481  return TRUE;
482 }
483 
485 _dbus_rlimit_restore_fd_limit (DBusRLimit *saved,
486  DBusError *error)
487 {
488  if (setrlimit (RLIMIT_NOFILE, &saved->lim) < 0)
489  {
490  dbus_set_error (error, _dbus_error_from_errno (errno),
491  "Failed to restore old fd limit: %s",
492  _dbus_strerror (errno));
493  return FALSE;
494  }
495 
496  return TRUE;
497 }
498 
499 #else /* !HAVE_SETRLIMIT */
500 
501 static void
502 fd_limit_not_supported (DBusError *error)
503 {
505  "cannot change fd limit on this platform");
506 }
507 
508 DBusRLimit *
509 _dbus_rlimit_save_fd_limit (DBusError *error)
510 {
511  fd_limit_not_supported (error);
512  return NULL;
513 }
514 
516 _dbus_rlimit_raise_fd_limit (DBusError *error)
517 {
518  fd_limit_not_supported (error);
519  return FALSE;
520 }
521 
523 _dbus_rlimit_restore_fd_limit (DBusRLimit *saved,
524  DBusError *error)
525 {
526  fd_limit_not_supported (error);
527  return FALSE;
528 }
529 
530 #endif
531 
532 void
533 _dbus_rlimit_free (DBusRLimit *lim)
534 {
535  dbus_free (lim);
536 }
537 
543 void
545  DBusSignalHandler handler)
546 {
547  struct sigaction act;
548  sigset_t empty_mask;
549 
550  sigemptyset (&empty_mask);
551  act.sa_handler = handler;
552  act.sa_mask = empty_mask;
553  act.sa_flags = 0;
554  sigaction (sig, &act, NULL);
555 }
556 
563 _dbus_file_exists (const char *file)
564 {
565  return (access (file, F_OK) == 0);
566 }
567 
575 _dbus_user_at_console (const char *username,
576  DBusError *error)
577 {
578 #ifdef DBUS_CONSOLE_AUTH_DIR
579  DBusString u, f;
580  dbus_bool_t result;
581 
582  result = FALSE;
583  if (!_dbus_string_init (&f))
584  {
585  _DBUS_SET_OOM (error);
586  return FALSE;
587  }
588 
589  if (!_dbus_string_append (&f, DBUS_CONSOLE_AUTH_DIR))
590  {
591  _DBUS_SET_OOM (error);
592  goto out;
593  }
594 
595  _dbus_string_init_const (&u, username);
596 
597  if (!_dbus_concat_dir_and_file (&f, &u))
598  {
599  _DBUS_SET_OOM (error);
600  goto out;
601  }
602 
603  result = _dbus_file_exists (_dbus_string_get_const_data (&f));
604 
605  out:
606  _dbus_string_free (&f);
607 
608  return result;
609 #else
610  return FALSE;
611 #endif
612 }
613 
614 
623 {
624  if (_dbus_string_get_length (filename) > 0)
625  return _dbus_string_get_byte (filename, 0) == '/';
626  else
627  return FALSE;
628 }
629 
639 _dbus_stat (const DBusString *filename,
640  DBusStat *statbuf,
641  DBusError *error)
642 {
643  const char *filename_c;
644  struct stat sb;
645 
646  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
647 
648  filename_c = _dbus_string_get_const_data (filename);
649 
650  if (stat (filename_c, &sb) < 0)
651  {
652  dbus_set_error (error, _dbus_error_from_errno (errno),
653  "%s", _dbus_strerror (errno));
654  return FALSE;
655  }
656 
657  statbuf->mode = sb.st_mode;
658  statbuf->nlink = sb.st_nlink;
659  statbuf->uid = sb.st_uid;
660  statbuf->gid = sb.st_gid;
661  statbuf->size = sb.st_size;
662  statbuf->atime = sb.st_atime;
663  statbuf->mtime = sb.st_mtime;
664  statbuf->ctime = sb.st_ctime;
665 
666  return TRUE;
667 }
668 
669 
674 {
675  DIR *d;
677 };
678 
688  DBusError *error)
689 {
690  DIR *d;
691  DBusDirIter *iter;
692  const char *filename_c;
693 
694  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
695 
696  filename_c = _dbus_string_get_const_data (filename);
697 
698  d = opendir (filename_c);
699  if (d == NULL)
700  {
701  dbus_set_error (error, _dbus_error_from_errno (errno),
702  "Failed to read directory \"%s\": %s",
703  filename_c,
704  _dbus_strerror (errno));
705  return NULL;
706  }
707  iter = dbus_new0 (DBusDirIter, 1);
708  if (iter == NULL)
709  {
710  closedir (d);
712  "Could not allocate memory for directory iterator");
713  return NULL;
714  }
715 
716  iter->d = d;
717 
718  return iter;
719 }
720 
736  DBusString *filename,
737  DBusError *error)
738 {
739  struct dirent *ent;
740  int err;
741 
742  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
743 
744  again:
745  errno = 0;
746  ent = readdir (iter->d);
747 
748  if (!ent)
749  {
750  err = errno;
751 
752  if (err != 0)
753  dbus_set_error (error,
755  "%s", _dbus_strerror (err));
756 
757  return FALSE;
758  }
759  else if (ent->d_name[0] == '.' &&
760  (ent->d_name[1] == '\0' ||
761  (ent->d_name[1] == '.' && ent->d_name[2] == '\0')))
762  goto again;
763  else
764  {
765  _dbus_string_set_length (filename, 0);
766  if (!_dbus_string_append (filename, ent->d_name))
767  {
769  "No memory to read directory entry");
770  return FALSE;
771  }
772  else
773  {
774  return TRUE;
775  }
776  }
777 }
778 
782 void
784 {
785  closedir (iter->d);
786  dbus_free (iter);
787 }
788 
789 static dbus_bool_t
790 fill_user_info_from_group (struct group *g,
791  DBusGroupInfo *info,
792  DBusError *error)
793 {
794  _dbus_assert (g->gr_name != NULL);
795 
796  info->gid = g->gr_gid;
797  info->groupname = _dbus_strdup (g->gr_name);
798 
799  /* info->members = dbus_strdupv (g->gr_mem) */
800 
801  if (info->groupname == NULL)
802  {
804  return FALSE;
805  }
806 
807  return TRUE;
808 }
809 
810 static dbus_bool_t
811 fill_group_info (DBusGroupInfo *info,
812  dbus_gid_t gid,
813  const DBusString *groupname,
814  DBusError *error)
815 {
816  const char *group_c_str;
817 
818  _dbus_assert (groupname != NULL || gid != DBUS_GID_UNSET);
819  _dbus_assert (groupname == NULL || gid == DBUS_GID_UNSET);
820 
821  if (groupname)
822  group_c_str = _dbus_string_get_const_data (groupname);
823  else
824  group_c_str = NULL;
825 
826  /* For now assuming that the getgrnam() and getgrgid() flavors
827  * always correspond to the pwnam flavors, if not we have
828  * to add more configure checks.
829  */
830 
831 #ifdef HAVE_GETPWNAM_R
832  {
833  struct group *g;
834  int result;
835  size_t buflen;
836  char *buf;
837  struct group g_str;
838  dbus_bool_t b;
839 
840  /* retrieve maximum needed size for buf */
841  buflen = sysconf (_SC_GETGR_R_SIZE_MAX);
842 
843  /* sysconf actually returns a long, but everything else expects size_t,
844  * so just recast here.
845  * https://bugs.freedesktop.org/show_bug.cgi?id=17061
846  */
847  if ((long) buflen <= 0)
848  buflen = 1024;
849 
850  result = -1;
851  while (1)
852  {
853  buf = dbus_malloc (buflen);
854  if (buf == NULL)
855  {
857  return FALSE;
858  }
859 
860  g = NULL;
861  if (group_c_str)
862  result = getgrnam_r (group_c_str, &g_str, buf, buflen,
863  &g);
864  else
865  result = getgrgid_r (gid, &g_str, buf, buflen,
866  &g);
867  /* Try a bigger buffer if ERANGE was returned:
868  https://bugs.freedesktop.org/show_bug.cgi?id=16727
869  */
870  if (result == ERANGE && buflen < 512 * 1024)
871  {
872  dbus_free (buf);
873  buflen *= 2;
874  }
875  else
876  {
877  break;
878  }
879  }
880 
881  if (result == 0 && g == &g_str)
882  {
883  b = fill_user_info_from_group (g, info, error);
884  dbus_free (buf);
885  return b;
886  }
887  else
888  {
889  dbus_set_error (error, _dbus_error_from_errno (errno),
890  "Group %s unknown or failed to look it up\n",
891  group_c_str ? group_c_str : "???");
892  dbus_free (buf);
893  return FALSE;
894  }
895  }
896 #else /* ! HAVE_GETPWNAM_R */
897  {
898  /* I guess we're screwed on thread safety here */
899  struct group *g;
900 
901 #warning getpwnam_r() not available, please report this to the dbus maintainers with details of your OS
902 
903  g = getgrnam (group_c_str);
904 
905  if (g != NULL)
906  {
907  return fill_user_info_from_group (g, info, error);
908  }
909  else
910  {
911  dbus_set_error (error, _dbus_error_from_errno (errno),
912  "Group %s unknown or failed to look it up\n",
913  group_c_str ? group_c_str : "???");
914  return FALSE;
915  }
916  }
917 #endif /* ! HAVE_GETPWNAM_R */
918 }
919 
931  const DBusString *groupname,
932  DBusError *error)
933 {
934  return fill_group_info (info, DBUS_GID_UNSET,
935  groupname, error);
936 
937 }
938 
950  dbus_gid_t gid,
951  DBusError *error)
952 {
953  return fill_group_info (info, gid, NULL, error);
954 }
955 
966  dbus_uid_t *uid_p)
967 {
968  return _dbus_get_user_id (username, uid_p);
969 
970 }
971 
982  dbus_gid_t *gid_p)
983 {
984  return _dbus_get_group_id (groupname, gid_p);
985 }
986 
1000  dbus_gid_t **group_ids,
1001  int *n_group_ids,
1002  DBusError *error)
1003 {
1004  return _dbus_groups_from_uid (uid, group_ids, n_group_ids, error);
1005 }
1006 
1018  DBusError *error)
1019 {
1020  return _dbus_is_console_user (uid, error);
1021 
1022 }
1023 
1033 {
1034  return uid == _dbus_geteuid ();
1035 }
1036 
1045 _dbus_windows_user_is_process_owner (const char *windows_sid)
1046 {
1047  return FALSE;
1048 }
1049  /* End of DBusInternalsUtils functions */
1051 
1065  DBusString *dirname)
1066 {
1067  int sep;
1068 
1069  _dbus_assert (filename != dirname);
1070  _dbus_assert (filename != NULL);
1071  _dbus_assert (dirname != NULL);
1072 
1073  /* Ignore any separators on the end */
1074  sep = _dbus_string_get_length (filename);
1075  if (sep == 0)
1076  return _dbus_string_append (dirname, "."); /* empty string passed in */
1077 
1078  while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
1079  --sep;
1080 
1081  _dbus_assert (sep >= 0);
1082 
1083  if (sep == 0)
1084  return _dbus_string_append (dirname, "/");
1085 
1086  /* Now find the previous separator */
1087  _dbus_string_find_byte_backward (filename, sep, '/', &sep);
1088  if (sep < 0)
1089  return _dbus_string_append (dirname, ".");
1090 
1091  /* skip multiple separators */
1092  while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
1093  --sep;
1094 
1095  _dbus_assert (sep >= 0);
1096 
1097  if (sep == 0 &&
1098  _dbus_string_get_byte (filename, 0) == '/')
1099  return _dbus_string_append (dirname, "/");
1100  else
1101  return _dbus_string_copy_len (filename, 0, sep - 0,
1102  dirname, _dbus_string_get_length (dirname));
1103 } /* DBusString stuff */
1105 
1106 static void
1107 string_squash_nonprintable (DBusString *str)
1108 {
1109  unsigned char *buf;
1110  int i, len;
1111 
1112  buf = _dbus_string_get_udata (str);
1113  len = _dbus_string_get_length (str);
1114 
1115  /* /proc/$pid/cmdline is a sequence of \0-terminated words, but we
1116  * want a sequence of space-separated words, with no extra trailing
1117  * space:
1118  * "/bin/sleep" "\0" "60" "\0"
1119  * -> "/bin/sleep" "\0" "60"
1120  * -> "/bin/sleep" " " "60"
1121  *
1122  * so chop off the trailing NUL before cleaning up unprintable
1123  * characters. */
1124  if (len > 0 && buf[len - 1] == '\0')
1125  {
1126  _dbus_string_shorten (str, 1);
1127  len--;
1128  }
1129 
1130  for (i = 0; i < len; i++)
1131  {
1132  unsigned char c = (unsigned char) buf[i];
1133  if (c == '\0')
1134  buf[i] = ' ';
1135  else if (c < 0x20 || c > 127)
1136  buf[i] = '?';
1137  }
1138 }
1139 
1154 dbus_bool_t
1155 _dbus_command_for_pid (unsigned long pid,
1156  DBusString *str,
1157  int max_len,
1158  DBusError *error)
1159 {
1160  /* This is all Linux-specific for now */
1161  DBusString path;
1162  DBusString cmdline;
1163  int fd;
1164 
1165  if (!_dbus_string_init (&path))
1166  {
1167  _DBUS_SET_OOM (error);
1168  return FALSE;
1169  }
1170 
1171  if (!_dbus_string_init (&cmdline))
1172  {
1173  _DBUS_SET_OOM (error);
1174  _dbus_string_free (&path);
1175  return FALSE;
1176  }
1177 
1178  if (!_dbus_string_append_printf (&path, "/proc/%ld/cmdline", pid))
1179  goto oom;
1180 
1181  fd = open (_dbus_string_get_const_data (&path), O_RDONLY);
1182  if (fd < 0)
1183  {
1184  dbus_set_error (error,
1185  _dbus_error_from_errno (errno),
1186  "Failed to open \"%s\": %s",
1187  _dbus_string_get_const_data (&path),
1188  _dbus_strerror (errno));
1189  goto fail;
1190  }
1191 
1192  if (!_dbus_read (fd, &cmdline, max_len))
1193  {
1194  dbus_set_error (error,
1195  _dbus_error_from_errno (errno),
1196  "Failed to read from \"%s\": %s",
1197  _dbus_string_get_const_data (&path),
1198  _dbus_strerror (errno));
1199  _dbus_close (fd, NULL);
1200  goto fail;
1201  }
1202 
1203  if (!_dbus_close (fd, error))
1204  goto fail;
1205 
1206  string_squash_nonprintable (&cmdline);
1207 
1208  if (!_dbus_string_copy (&cmdline, 0, str, _dbus_string_get_length (str)))
1209  goto oom;
1210 
1211  _dbus_string_free (&cmdline);
1212  _dbus_string_free (&path);
1213  return TRUE;
1214 oom:
1215  _DBUS_SET_OOM (error);
1216 fail:
1217  _dbus_string_free (&cmdline);
1218  _dbus_string_free (&path);
1219  return FALSE;
1220 }
1221 
1232 {
1233  return TRUE;
1234 }
1235 
1236 static dbus_bool_t
1237 ensure_owned_directory (const char *label,
1238  const DBusString *string,
1239  dbus_bool_t create,
1240  DBusError *error)
1241 {
1242  const char *dir = _dbus_string_get_const_data (string);
1243  struct stat buf;
1244 
1245  if (create && !_dbus_ensure_directory (string, error))
1246  return FALSE;
1247 
1248  /*
1249  * The stat()-based checks in this function are to protect against
1250  * mistakes, not malice. We are working in a directory that is meant
1251  * to be trusted; but if a user has used `su` or similar to escalate
1252  * their privileges without correctly clearing the environment, the
1253  * XDG_RUNTIME_DIR in the environment might still be the user's
1254  * and not root's. We don't want to write root-owned files into that
1255  * directory, so just warn and don't provide support for transient
1256  * services in that case.
1257  *
1258  * In particular, we use stat() and not lstat() so that if we later
1259  * decide to use a different directory name for transient services,
1260  * we can drop in a compatibility symlink without breaking older
1261  * libdbus.
1262  */
1263 
1264  if (stat (dir, &buf) != 0)
1265  {
1266  int saved_errno = errno;
1267 
1268  dbus_set_error (error, _dbus_error_from_errno (saved_errno),
1269  "%s \"%s\" not available: %s", label, dir,
1270  _dbus_strerror (saved_errno));
1271  return FALSE;
1272  }
1273 
1274  if (!S_ISDIR (buf.st_mode))
1275  {
1276  dbus_set_error (error, DBUS_ERROR_FAILED, "%s \"%s\" is not a directory",
1277  label, dir);
1278  return FALSE;
1279  }
1280 
1281  if (buf.st_uid != geteuid ())
1282  {
1284  "%s \"%s\" is owned by uid %ld, not our uid %ld",
1285  label, dir, (long) buf.st_uid, (long) geteuid ());
1286  return FALSE;
1287  }
1288 
1289  /* This is just because we have the stat() results already, so we might
1290  * as well check opportunistically. */
1291  if ((S_IWOTH | S_IWGRP) & buf.st_mode)
1292  {
1294  "%s \"%s\" can be written by others (mode 0%o)",
1295  label, dir, buf.st_mode);
1296  return FALSE;
1297  }
1298 
1299  return TRUE;
1300 }
1301 
1302 #define DBUS_UNIX_STANDARD_SESSION_SERVICEDIR "/dbus-1/services"
1303 #define DBUS_UNIX_STANDARD_SYSTEM_SERVICEDIR "/dbus-1/system-services"
1304 
1314  DBusError *error)
1315 {
1316  const char *xdg_runtime_dir;
1317  DBusString services;
1318  DBusString dbus1;
1319  DBusString xrd;
1320  dbus_bool_t ret = FALSE;
1321  char *data = NULL;
1322 
1323  if (!_dbus_string_init (&dbus1))
1324  {
1325  _DBUS_SET_OOM (error);
1326  return FALSE;
1327  }
1328 
1329  if (!_dbus_string_init (&services))
1330  {
1331  _dbus_string_free (&dbus1);
1332  _DBUS_SET_OOM (error);
1333  return FALSE;
1334  }
1335 
1336  if (!_dbus_string_init (&xrd))
1337  {
1338  _dbus_string_free (&dbus1);
1339  _dbus_string_free (&services);
1340  _DBUS_SET_OOM (error);
1341  return FALSE;
1342  }
1343 
1344  xdg_runtime_dir = _dbus_getenv ("XDG_RUNTIME_DIR");
1345 
1346  /* Not an error, we just can't have transient session services */
1347  if (xdg_runtime_dir == NULL)
1348  {
1349  _dbus_verbose ("XDG_RUNTIME_DIR is unset: transient session services "
1350  "not available here\n");
1351  ret = TRUE;
1352  goto out;
1353  }
1354 
1355  if (!_dbus_string_append (&xrd, xdg_runtime_dir) ||
1356  !_dbus_string_append_printf (&dbus1, "%s/dbus-1",
1357  xdg_runtime_dir) ||
1358  !_dbus_string_append_printf (&services, "%s/dbus-1/services",
1359  xdg_runtime_dir))
1360  {
1361  _DBUS_SET_OOM (error);
1362  goto out;
1363  }
1364 
1365  if (!ensure_owned_directory ("XDG_RUNTIME_DIR", &xrd, FALSE, error) ||
1366  !ensure_owned_directory ("XDG_RUNTIME_DIR subdirectory", &dbus1, TRUE,
1367  error) ||
1368  !ensure_owned_directory ("XDG_RUNTIME_DIR subdirectory", &services,
1369  TRUE, error))
1370  goto out;
1371 
1372  if (!_dbus_string_steal_data (&services, &data) ||
1373  !_dbus_list_append (dirs, data))
1374  {
1375  _DBUS_SET_OOM (error);
1376  goto out;
1377  }
1378 
1379  _dbus_verbose ("Transient service directory is %s\n", data);
1380  /* Ownership was transferred to @dirs */
1381  data = NULL;
1382  ret = TRUE;
1383 
1384 out:
1385  _dbus_string_free (&dbus1);
1386  _dbus_string_free (&services);
1387  _dbus_string_free (&xrd);
1388  dbus_free (data);
1389  return ret;
1390 }
1391 
1411 {
1412  const char *xdg_data_home;
1413  const char *xdg_data_dirs;
1414  DBusString servicedir_path;
1415 
1416  if (!_dbus_string_init (&servicedir_path))
1417  return FALSE;
1418 
1419  xdg_data_home = _dbus_getenv ("XDG_DATA_HOME");
1420  xdg_data_dirs = _dbus_getenv ("XDG_DATA_DIRS");
1421 
1422  if (xdg_data_home != NULL)
1423  {
1424  if (!_dbus_string_append (&servicedir_path, xdg_data_home))
1425  goto oom;
1426  }
1427  else
1428  {
1429  const DBusString *homedir;
1430  DBusString local_share;
1431 
1432  if (!_dbus_homedir_from_current_process (&homedir))
1433  goto oom;
1434 
1435  if (!_dbus_string_append (&servicedir_path, _dbus_string_get_const_data (homedir)))
1436  goto oom;
1437 
1438  _dbus_string_init_const (&local_share, "/.local/share");
1439  if (!_dbus_concat_dir_and_file (&servicedir_path, &local_share))
1440  goto oom;
1441  }
1442 
1443  if (!_dbus_string_append (&servicedir_path, ":"))
1444  goto oom;
1445 
1446  if (xdg_data_dirs != NULL)
1447  {
1448  if (!_dbus_string_append (&servicedir_path, xdg_data_dirs))
1449  goto oom;
1450 
1451  if (!_dbus_string_append (&servicedir_path, ":"))
1452  goto oom;
1453  }
1454  else
1455  {
1456  if (!_dbus_string_append (&servicedir_path, "/usr/local/share:/usr/share:"))
1457  goto oom;
1458  }
1459 
1460  /*
1461  * add configured datadir to defaults
1462  * this may be the same as an xdg dir
1463  * however the config parser should take
1464  * care of duplicates
1465  */
1466  if (!_dbus_string_append (&servicedir_path, DBUS_DATADIR))
1467  goto oom;
1468 
1469  if (!_dbus_split_paths_and_append (&servicedir_path,
1470  DBUS_UNIX_STANDARD_SESSION_SERVICEDIR,
1471  dirs))
1472  goto oom;
1473 
1474  _dbus_string_free (&servicedir_path);
1475  return TRUE;
1476 
1477  oom:
1478  _dbus_string_free (&servicedir_path);
1479  return FALSE;
1480 }
1481 
1482 
1503 {
1504  /*
1505  * DBUS_DATADIR may be the same as one of the standard directories. However,
1506  * the config parser should take care of the duplicates.
1507  *
1508  * Also, append /lib as counterpart of /usr/share on the root
1509  * directory (the root directory does not know /share), in order to
1510  * facilitate early boot system bus activation where /usr might not
1511  * be available.
1512  */
1513  static const char standard_search_path[] =
1514  "/usr/local/share:"
1515  "/usr/share:"
1516  DBUS_DATADIR ":"
1517  "/lib";
1518  DBusString servicedir_path;
1519 
1520  _dbus_string_init_const (&servicedir_path, standard_search_path);
1521 
1522  return _dbus_split_paths_and_append (&servicedir_path,
1523  DBUS_UNIX_STANDARD_SYSTEM_SERVICEDIR,
1524  dirs);
1525 }
1526 
1537 {
1538  _dbus_assert (_dbus_string_get_length (str) == 0);
1539 
1540  return _dbus_string_append (str, DBUS_SYSTEM_CONFIG_FILE);
1541 }
1542 
1551 {
1552  _dbus_assert (_dbus_string_get_length (str) == 0);
1553 
1554  return _dbus_string_append (str, DBUS_SESSION_CONFIG_FILE);
1555 }
1556 
1561 void
1563 {
1564 #ifdef HAVE_SYSTEMD
1565  sd_notify (0, "READY=1");
1566 #endif
1567 }
1568 
1573 void
1575 {
1576 #ifdef HAVE_SYSTEMD
1577  sd_notify (0, "RELOADING=1");
1578 #endif
1579 }
1580 
1585 void
1587 {
1588 #ifdef HAVE_SYSTEMD
1589  /* For systemd, this is the same code */
1591 #endif
1592 }
1593 
1598 void
1600 {
1601 #ifdef HAVE_SYSTEMD
1602  sd_notify (0, "STOPPING=1");
1603 #endif
1604 }
1605 
1620 _dbus_reset_oom_score_adj (const char **error_str_p)
1621 {
1622 #ifdef __linux__
1623  int fd = -1;
1624  dbus_bool_t ret = FALSE;
1625  int saved_errno = 0;
1626  const char *error_str = NULL;
1627 
1628 #ifdef O_CLOEXEC
1629  fd = open ("/proc/self/oom_score_adj", O_RDONLY | O_CLOEXEC);
1630 #endif
1631 
1632  if (fd < 0)
1633  {
1634  fd = open ("/proc/self/oom_score_adj", O_RDONLY);
1635  if (fd >= 0)
1637  }
1638 
1639  if (fd >= 0)
1640  {
1641  ssize_t read_result = -1;
1642  /* It doesn't actually matter whether we read the whole file,
1643  * as long as we get the presence or absence of the minus sign */
1644  char first_char = '\0';
1645 
1646  read_result = read (fd, &first_char, 1);
1647 
1648  if (read_result < 0)
1649  {
1650  /* This probably can't actually happen in practice: if we can
1651  * open it, then we can hopefully read from it */
1652  ret = FALSE;
1653  error_str = "failed to read from /proc/self/oom_score_adj";
1654  saved_errno = errno;
1655  goto out;
1656  }
1657 
1658  /* If we are running with protection from the OOM killer
1659  * (typical for the system dbus-daemon under systemd), then
1660  * oom_score_adj will be negative. Drop that protection,
1661  * returning to oom_score_adj = 0.
1662  *
1663  * Conversely, if we are running with increased susceptibility
1664  * to the OOM killer (as user sessions typically do in
1665  * systemd >= 250), oom_score_adj will be strictly positive,
1666  * and we are not allowed to decrease it to 0 without privileges.
1667  *
1668  * If it's exactly 0 (typical for non-systemd systems, and
1669  * user processes on older systemd) then there's no need to
1670  * alter it.
1671  *
1672  * We shouldn't get an empty result, but if we do, assume it
1673  * means zero and don't try to change it. */
1674  if (read_result == 0 || first_char != '-')
1675  {
1676  /* Nothing needs to be done: the OOM score adjustment is
1677  * non-negative */
1678  ret = TRUE;
1679  goto out;
1680  }
1681 
1682  close (fd);
1683 #ifdef O_CLOEXEC
1684  fd = open ("/proc/self/oom_score_adj", O_WRONLY | O_CLOEXEC);
1685 
1686  if (fd < 0)
1687 #endif
1688  {
1689  fd = open ("/proc/self/oom_score_adj", O_WRONLY);
1690  if (fd >= 0)
1692  }
1693 
1694  if (fd < 0)
1695  {
1696  ret = FALSE;
1697  error_str = "open(/proc/self/oom_score_adj) for writing";
1698  saved_errno = errno;
1699  goto out;
1700  }
1701 
1702  if (pwrite (fd, "0", sizeof (char), 0) < 0)
1703  {
1704  ret = FALSE;
1705  error_str = "writing oom_score_adj error";
1706  saved_errno = errno;
1707  goto out;
1708  }
1709 
1710  /* Success */
1711  ret = TRUE;
1712  }
1713  else if (errno == ENOENT)
1714  {
1715  /* If /proc/self/oom_score_adj doesn't exist, assume the kernel
1716  * doesn't support this feature and ignore it. */
1717  ret = TRUE;
1718  }
1719  else
1720  {
1721  ret = FALSE;
1722  error_str = "open(/proc/self/oom_score_adj) for reading";
1723  saved_errno = errno;
1724  goto out;
1725  }
1726 
1727 out:
1728  if (fd >= 0)
1729  _dbus_close (fd, NULL);
1730 
1731  if (error_str_p != NULL)
1732  *error_str_p = error_str;
1733 
1734  errno = saved_errno;
1735  return ret;
1736 #else
1737  /* nothing to do on this platform */
1738  return TRUE;
1739 #endif
1740 }
void dbus_set_error(DBusError *error, const char *name, const char *format,...)
Assigns an error name and message to a DBusError.
Definition: dbus-errors.c:354
dbus_bool_t dbus_error_is_set(const DBusError *error)
Checks whether an error occurred (the error is set).
Definition: dbus-errors.c:329
dbus_bool_t _dbus_stat(const DBusString *filename, DBusStat *statbuf, DBusError *error)
stat() wrapper.
#define _dbus_assert_not_reached(explanation)
Aborts with an error message if called.
dbus_bool_t _dbus_write_pid_to_file_and_pipe(const DBusString *pidfile, DBusPipe *print_pid_pipe, dbus_pid_t pid_to_write, DBusError *error)
Writes the given pid_to_write to a pidfile (if non-NULL) and/or to a pipe (if non-NULL).
#define _dbus_assert(condition)
Aborts with an error message if the condition is false.
dbus_bool_t _dbus_file_exists(const char *file)
Checks if a file exists.
dbus_bool_t _dbus_homedir_from_current_process(const DBusString **homedir)
Gets homedir of user owning current process.
Definition: dbus-userdb.c:440
void _dbus_directory_close(DBusDirIter *iter)
Closes a directory iteration.
const char * _dbus_error_from_errno(int error_number)
Converts a UNIX errno, or Windows errno or WinSock error value into a DBusError name.
Definition: dbus-sysdeps.c:599
dbus_bool_t _dbus_group_info_fill(DBusGroupInfo *info, const DBusString *groupname, DBusError *error)
Initializes the given DBusGroupInfo struct with information about the given group name.
dbus_bool_t _dbus_user_at_console(const char *username, DBusError *error)
Checks if user is at the console.
dbus_bool_t _dbus_parse_unix_user_from_config(const DBusString *username, dbus_uid_t *uid_p)
Parse a UNIX user from the bus config file.
dbus_bool_t _dbus_verify_daemon_user(const char *user)
Verify that after the fork we can successfully change to this user.
void _dbus_set_signal_handler(int sig, DBusSignalHandler handler)
Installs a UNIX signal handler.
dbus_bool_t _dbus_path_is_absolute(const DBusString *filename)
Checks whether the filename is an absolute path.
dbus_bool_t _dbus_change_to_daemon_user(const char *user, DBusError *error)
Changes the user and group the bus is running as.
dbus_bool_t _dbus_unix_user_is_process_owner(dbus_uid_t uid)
Checks to see if the UNIX user ID matches the UID of the process.
dbus_bool_t _dbus_get_group_id(const DBusString *groupname, dbus_gid_t *gid)
Gets group ID given groupname.
dbus_bool_t _dbus_windows_user_is_process_owner(const char *windows_sid)
Checks to see if the Windows user SID matches the owner of the process.
dbus_bool_t _dbus_parse_unix_group_from_config(const DBusString *groupname, dbus_gid_t *gid_p)
Parse a UNIX group from the bus config file.
dbus_bool_t _dbus_unix_groups_from_uid(dbus_uid_t uid, dbus_gid_t **group_ids, int *n_group_ids, DBusError *error)
Gets all groups corresponding to the given UNIX user ID.
char * _dbus_strdup(const char *str)
Duplicates a string.
dbus_bool_t _dbus_is_console_user(dbus_uid_t uid, DBusError *error)
Checks to see if the UID sent in is the console user.
DBusDirIter * _dbus_directory_open(const DBusString *filename, DBusError *error)
Open a directory to iterate over.
dbus_bool_t _dbus_groups_from_uid(dbus_uid_t uid, dbus_gid_t **group_ids, int *n_group_ids, DBusError *error)
Gets all groups corresponding to the given UID.
dbus_bool_t _dbus_directory_get_next_file(DBusDirIter *iter, DBusString *filename, DBusError *error)
Get next file in the directory.
void _dbus_warn(const char *format,...)
Prints a warning message to stderr.
dbus_bool_t _dbus_get_user_id_and_primary_group(const DBusString *username, dbus_uid_t *uid_p, dbus_gid_t *gid_p)
Gets user ID and primary group given username.
dbus_bool_t _dbus_become_daemon(const DBusString *pidfile, DBusPipe *print_pid_pipe, DBusError *error, dbus_bool_t keep_umask)
Does the chdir, fork, setsid, etc.
dbus_bool_t _dbus_group_info_fill_gid(DBusGroupInfo *info, dbus_gid_t gid, DBusError *error)
Initializes the given DBusGroupInfo struct with information about the given group ID.
dbus_bool_t _dbus_unix_user_is_at_console(dbus_uid_t uid, DBusError *error)
Checks to see if the UNIX user ID is at the console.
dbus_bool_t _dbus_get_user_id(const DBusString *username, dbus_uid_t *uid)
Gets user ID given username.
dbus_bool_t _dbus_list_append(DBusList **list, void *data)
Appends a value to the list.
Definition: dbus-list.c:271
#define NULL
A null pointer, defined appropriately for C or C++.
#define TRUE
Expands to "1".
#define FALSE
Expands to "0".
void dbus_free(void *memory)
Frees a block of memory previously allocated by dbus_malloc() or dbus_malloc0().
Definition: dbus-memory.c:692
#define dbus_new0(type, count)
Safe macro for using dbus_malloc0().
Definition: dbus-memory.h:58
void * dbus_malloc(size_t bytes)
Allocates the given number of bytes, as with standard malloc().
Definition: dbus-memory.c:452
#define DBUS_ERROR_NOT_SUPPORTED
Requested operation isn't supported (like ENOSYS on UNIX).
#define DBUS_ERROR_FAILED
A generic error; "something went wrong" - see the error message for more.
#define DBUS_ERROR_NO_MEMORY
There was not enough memory to complete an operation.
dbus_bool_t _dbus_string_set_length(DBusString *str, int length)
Sets the length of a string.
Definition: dbus-string.c:833
dbus_bool_t _dbus_string_append(DBusString *str, const char *buffer)
Appends a nul-terminated C-style string to a DBusString.
Definition: dbus-string.c:966
dbus_bool_t _dbus_string_init(DBusString *str)
Initializes a string.
Definition: dbus-string.c:182
void _dbus_string_init_const(DBusString *str, const char *value)
Initializes a constant string.
Definition: dbus-string.c:197
dbus_bool_t _dbus_string_copy(const DBusString *source, int start, DBusString *dest, int insert_at)
Like _dbus_string_move(), but does not delete the section of the source string that's copied to the d...
Definition: dbus-string.c:1343
DBUS_PRIVATE_EXPORT dbus_bool_t _dbus_string_append_int(DBusString *str, long value)
Appends an integer to a DBusString.
Definition: dbus-sysdeps.c:363
dbus_bool_t _dbus_string_steal_data(DBusString *str, char **data_return)
Like _dbus_string_get_data(), but removes the gotten data from the original string.
Definition: dbus-string.c:672
void _dbus_string_free(DBusString *str)
Frees a string created by _dbus_string_init(), and fills it with the same contents as #_DBUS_STRING_I...
Definition: dbus-string.c:278
void _dbus_string_shorten(DBusString *str, int length_to_remove)
Makes a string shorter by the given number of bytes.
Definition: dbus-string.c:811
dbus_bool_t _dbus_string_find_byte_backward(const DBusString *str, int start, unsigned char byte, int *found)
Find the given byte scanning backward from the given start.
dbus_bool_t _dbus_string_append_printf(DBusString *str, const char *format,...)
Appends a printf-style formatted string to the DBusString.
Definition: dbus-string.c:1145
dbus_bool_t _dbus_string_copy_len(const DBusString *source, int start, int len, DBusString *dest, int insert_at)
Like _dbus_string_copy(), but can copy a segment from the middle of the source string.
Definition: dbus-string.c:1435
dbus_bool_t _dbus_string_get_dirname(const DBusString *filename, DBusString *dirname)
Get the directory name from a complete filename.
dbus_bool_t _dbus_reset_oom_score_adj(const char **error_str_p)
If the current process has been protected from the Linux OOM killer (the oom_score_adj process parame...
dbus_bool_t _dbus_close(int fd, DBusError *error)
Closes a file descriptor.
void(* DBusSignalHandler)(int sig)
A UNIX signal handler.
void _dbus_fd_set_close_on_exec(int fd)
Sets the file descriptor to be close on exec.
int _dbus_read(int fd, DBusString *buffer, int count)
Thin wrapper around the read() system call that appends the data it reads to the DBusString buffer.
dbus_bool_t _dbus_ensure_standard_fds(DBusEnsureStandardFdsFlags flags, const char **error_str_p)
Ensure that the standard file descriptors stdin, stdout and stderr are open, by opening /dev/null if ...
dbus_uid_t _dbus_geteuid(void)
Gets our effective UID.
dbus_bool_t _dbus_get_standard_session_servicedirs(DBusList **dirs)
Returns the standard directories for a session bus to look for service activation files.
void _dbus_daemon_report_ready(void)
Report to a service manager that the daemon calling this function is ready for use.
unsigned long dbus_uid_t
A user ID.
Definition: dbus-sysdeps.h:137
dbus_bool_t _dbus_get_session_config_file(DBusString *str)
Get the absolute path of the session.conf file.
unsigned long dbus_pid_t
A process ID.
Definition: dbus-sysdeps.h:135
void _dbus_daemon_report_reloading(void)
Report to a service manager that the daemon calling this function is reloading configuration.
unsigned long dbus_gid_t
A group ID.
Definition: dbus-sysdeps.h:139
dbus_bool_t _dbus_command_for_pid(unsigned long pid, DBusString *str, int max_len, DBusError *error)
Get a printable string describing the command used to execute the process with pid.
dbus_bool_t _dbus_get_system_config_file(DBusString *str)
Get the absolute path of the system.conf file (there is no system bus on Windows so this can just ret...
dbus_bool_t _dbus_set_up_transient_session_servicedirs(DBusList **dirs, DBusError *error)
Returns the standard directories for a session bus to look for transient service activation files.
const char * _dbus_getenv(const char *varname)
Wrapper for getenv().
Definition: dbus-sysdeps.c:195
dbus_bool_t _dbus_get_standard_system_servicedirs(DBusList **dirs)
Returns the standard directories for a system bus to look for service activation files.
void _dbus_daemon_report_reloaded(void)
Report to a service manager that the daemon calling this function is reloading configuration.
#define DBUS_GID_UNSET
an invalid GID used to represent an uninitialized dbus_gid_t field
Definition: dbus-sysdeps.h:146
void _dbus_daemon_report_stopping(void)
Report to a service manager that the daemon calling this function is shutting down.
dbus_bool_t _dbus_concat_dir_and_file(DBusString *dir, const DBusString *next_component)
Appends the given filename to the given directory.
dbus_bool_t _dbus_split_paths_and_append(DBusString *dirs, const char *suffix, DBusList **dir_list)
Split paths into a list of char strings.
Definition: dbus-sysdeps.c:236
dbus_bool_t _dbus_replace_install_prefix(DBusString *path)
Replace the DBUS_PREFIX in the given path, in-place, by the current D-Bus installation directory.
dbus_bool_t _dbus_ensure_directory(const DBusString *filename, DBusError *error)
Creates a directory; succeeds if the directory is created or already existed.
dbus_uint32_t dbus_bool_t
A boolean, valid values are TRUE and FALSE.
Definition: dbus-types.h:35
Internals of directory iterator.
DIR * d
The DIR* from opendir()
Object representing an exception.
Definition: dbus-errors.h:49
const char * message
public error message field
Definition: dbus-errors.h:51
Information about a UNIX group.
dbus_gid_t gid
GID.
char * groupname
Group name.
A node in a linked list.
Definition: dbus-list.h:35
Portable struct with stat() results.
Definition: dbus-sysdeps.h:551
unsigned long nlink
Number of hard links.
Definition: dbus-sysdeps.h:553
unsigned long size
Size of file.
Definition: dbus-sysdeps.h:556
dbus_uid_t uid
User owning file.
Definition: dbus-sysdeps.h:554
unsigned long mode
File mode.
Definition: dbus-sysdeps.h:552
dbus_gid_t gid
Group owning file.
Definition: dbus-sysdeps.h:555
unsigned long atime
Access time.
Definition: dbus-sysdeps.h:557
unsigned long ctime
Creation time.
Definition: dbus-sysdeps.h:559
unsigned long mtime
Modify time.
Definition: dbus-sysdeps.h:558