D-Bus 1.14.0
dbus-sysdeps-util-unix.c
1/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2/* dbus-sysdeps-util-unix.c Would be in dbus-sysdeps-unix.c, but not used in libdbus
3 *
4 * Copyright (C) 2002, 2003, 2004, 2005 Red Hat, Inc.
5 * Copyright (C) 2003 CodeFactory AB
6 *
7 * Licensed under the Academic Free License version 2.1
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
22 *
23 */
24
25#include <config.h>
26#include "dbus-sysdeps.h"
27#include "dbus-sysdeps-unix.h"
28#include "dbus-internals.h"
29#include "dbus-list.h"
30#include "dbus-pipe.h"
31#include "dbus-protocol.h"
32#include "dbus-string.h"
33#define DBUS_USERDB_INCLUDES_PRIVATE 1
34#include "dbus-userdb.h"
35#include "dbus-test.h"
36
37#include <sys/types.h>
38#include <stdio.h>
39#include <stdlib.h>
40#include <string.h>
41#include <signal.h>
42#include <unistd.h>
43#include <stdio.h>
44#include <errno.h>
45#include <fcntl.h>
46#include <sys/stat.h>
47#ifdef HAVE_SYS_RESOURCE_H
48#include <sys/resource.h>
49#endif
50#include <grp.h>
51#include <sys/socket.h>
52#include <dirent.h>
53#include <sys/un.h>
54
55#ifdef HAVE_SYS_PRCTL_H
56#include <sys/prctl.h>
57#endif
58
59#ifdef HAVE_SYS_SYSLIMITS_H
60#include <sys/syslimits.h>
61#endif
62
63#ifdef HAVE_SYSTEMD
64#include <systemd/sd-daemon.h>
65#endif
66
67#ifndef O_BINARY
68#define O_BINARY 0
69#endif
70
88 DBusPipe *print_pid_pipe,
89 DBusError *error,
90 dbus_bool_t keep_umask)
91{
92 const char *s;
93 pid_t child_pid;
94 DBusEnsureStandardFdsFlags flags;
95
96 _dbus_verbose ("Becoming a daemon...\n");
97
98 _dbus_verbose ("chdir to /\n");
99 if (chdir ("/") < 0)
100 {
102 "Could not chdir() to root directory");
103 return FALSE;
104 }
105
106 _dbus_verbose ("forking...\n");
107
108 /* Make sure our output buffers aren't redundantly printed by both the
109 * parent and the child */
110 fflush (stdout);
111 fflush (stderr);
112
113 switch ((child_pid = fork ()))
114 {
115 case -1:
116 _dbus_verbose ("fork failed\n");
118 "Failed to fork daemon: %s", _dbus_strerror (errno));
119 return FALSE;
120 break;
121
122 case 0:
123 _dbus_verbose ("in child, closing std file descriptors\n");
124
125 flags = DBUS_FORCE_STDIN_NULL | DBUS_FORCE_STDOUT_NULL;
126 s = _dbus_getenv ("DBUS_DEBUG_OUTPUT");
127
128 if (s == NULL || *s == '\0')
129 flags |= DBUS_FORCE_STDERR_NULL;
130 else
131 _dbus_verbose ("keeping stderr open due to DBUS_DEBUG_OUTPUT\n");
132
133 if (!_dbus_ensure_standard_fds (flags, &s))
134 {
135 _dbus_warn ("%s: %s", s, _dbus_strerror (errno));
136 _exit (1);
137 }
138
139 if (!keep_umask)
140 {
141 /* Get a predictable umask */
142 _dbus_verbose ("setting umask\n");
143 umask (022);
144 }
145
146 _dbus_verbose ("calling setsid()\n");
147 if (setsid () == -1)
148 _dbus_assert_not_reached ("setsid() failed");
149
150 break;
151
152 default:
153 if (!_dbus_write_pid_to_file_and_pipe (pidfile, print_pid_pipe,
154 child_pid, error))
155 {
156 _dbus_verbose ("pid file or pipe write failed: %s\n",
157 error->message);
158 kill (child_pid, SIGTERM);
159 return FALSE;
160 }
161
162 _dbus_verbose ("parent exiting\n");
163 _exit (0);
164 break;
165 }
166
167 return TRUE;
168}
169
170
179static dbus_bool_t
180_dbus_write_pid_file (const DBusString *filename,
181 unsigned long pid,
182 DBusError *error)
183{
184 const char *cfilename;
185 int fd;
186 FILE *f;
187
188 cfilename = _dbus_string_get_const_data (filename);
189
190 fd = open (cfilename, O_WRONLY|O_CREAT|O_EXCL|O_BINARY, 0644);
191
192 if (fd < 0)
193 {
195 "Failed to open \"%s\": %s", cfilename,
196 _dbus_strerror (errno));
197 return FALSE;
198 }
199
200 if ((f = fdopen (fd, "w")) == NULL)
201 {
203 "Failed to fdopen fd %d: %s", fd, _dbus_strerror (errno));
204 _dbus_close (fd, NULL);
205 return FALSE;
206 }
207
208 if (fprintf (f, "%lu\n", pid) < 0)
209 {
211 "Failed to write to \"%s\": %s", cfilename,
212 _dbus_strerror (errno));
213
214 fclose (f);
215 return FALSE;
216 }
217
218 if (fclose (f) == EOF)
219 {
221 "Failed to close \"%s\": %s", cfilename,
222 _dbus_strerror (errno));
223 return FALSE;
224 }
225
226 return TRUE;
227}
228
242 DBusPipe *print_pid_pipe,
243 dbus_pid_t pid_to_write,
244 DBusError *error)
245{
246 if (pidfile)
247 {
248 _dbus_verbose ("writing pid file %s\n", _dbus_string_get_const_data (pidfile));
249 if (!_dbus_write_pid_file (pidfile,
250 pid_to_write,
251 error))
252 {
253 _dbus_verbose ("pid file write failed\n");
254 _DBUS_ASSERT_ERROR_IS_SET(error);
255 return FALSE;
256 }
257 }
258 else
259 {
260 _dbus_verbose ("No pid file requested\n");
261 }
262
263 if (print_pid_pipe != NULL && _dbus_pipe_is_valid (print_pid_pipe))
264 {
265 DBusString pid;
266 int bytes;
267
268 _dbus_verbose ("writing our pid to pipe %d\n",
269 print_pid_pipe->fd);
270
271 if (!_dbus_string_init (&pid))
272 {
273 _DBUS_SET_OOM (error);
274 return FALSE;
275 }
276
277 if (!_dbus_string_append_int (&pid, pid_to_write) ||
278 !_dbus_string_append (&pid, "\n"))
279 {
280 _dbus_string_free (&pid);
281 _DBUS_SET_OOM (error);
282 return FALSE;
283 }
284
285 bytes = _dbus_string_get_length (&pid);
286 if (_dbus_pipe_write (print_pid_pipe, &pid, 0, bytes, error) != bytes)
287 {
288 /* _dbus_pipe_write sets error only on failure, not short write */
289 if (error != NULL && !dbus_error_is_set(error))
290 {
292 "Printing message bus PID: did not write enough bytes\n");
293 }
294 _dbus_string_free (&pid);
295 return FALSE;
296 }
297
298 _dbus_string_free (&pid);
299 }
300 else
301 {
302 _dbus_verbose ("No pid pipe to write to\n");
303 }
304
305 return TRUE;
306}
307
315_dbus_verify_daemon_user (const char *user)
316{
317 DBusString u;
318
319 _dbus_string_init_const (&u, user);
320
322}
323
324
325/* The HAVE_LIBAUDIT case lives in selinux.c */
326#ifndef HAVE_LIBAUDIT
336 DBusError *error)
337{
338 dbus_uid_t uid;
339 dbus_gid_t gid;
340 DBusString u;
341
342 _dbus_string_init_const (&u, user);
343
344 if (!_dbus_get_user_id_and_primary_group (&u, &uid, &gid))
345 {
347 "User '%s' does not appear to exist?",
348 user);
349 return FALSE;
350 }
351
352 /* setgroups() only works if we are a privileged process,
353 * so we don't return error on failure; the only possible
354 * failure is that we don't have perms to do it.
355 *
356 * not sure this is right, maybe if setuid()
357 * is going to work then setgroups() should also work.
358 */
359 if (setgroups (0, NULL) < 0)
360 _dbus_warn ("Failed to drop supplementary groups: %s",
361 _dbus_strerror (errno));
362
363 /* Set GID first, or the setuid may remove our permission
364 * to change the GID
365 */
366 if (setgid (gid) < 0)
367 {
369 "Failed to set GID to %lu: %s", gid,
370 _dbus_strerror (errno));
371 return FALSE;
372 }
373
374 if (setuid (uid) < 0)
375 {
377 "Failed to set UID to %lu: %s", uid,
378 _dbus_strerror (errno));
379 return FALSE;
380 }
381
382 return TRUE;
383}
384#endif /* !HAVE_LIBAUDIT */
385
386#ifdef HAVE_SETRLIMIT
387
388/* We assume that if we have setrlimit, we also have getrlimit and
389 * struct rlimit.
390 */
391
392struct DBusRLimit {
393 struct rlimit lim;
394};
395
396DBusRLimit *
397_dbus_rlimit_save_fd_limit (DBusError *error)
398{
399 DBusRLimit *self;
400
401 self = dbus_new0 (DBusRLimit, 1);
402
403 if (self == NULL)
404 {
405 _DBUS_SET_OOM (error);
406 return NULL;
407 }
408
409 if (getrlimit (RLIMIT_NOFILE, &self->lim) < 0)
410 {
412 "Failed to get fd limit: %s", _dbus_strerror (errno));
413 dbus_free (self);
414 return NULL;
415 }
416
417 return self;
418}
419
420/* Enough fds that we shouldn't run out, even if several uids work
421 * together to carry out a denial-of-service attack. This happens to be
422 * the same number that systemd < 234 would normally use. */
423#define ENOUGH_FDS 65536
424
426_dbus_rlimit_raise_fd_limit (DBusError *error)
427{
428 struct rlimit old, lim;
429
430 if (getrlimit (RLIMIT_NOFILE, &lim) < 0)
431 {
433 "Failed to get fd limit: %s", _dbus_strerror (errno));
434 return FALSE;
435 }
436
437 old = lim;
438
439 if (getuid () == 0)
440 {
441 /* We are privileged, so raise the soft limit to at least
442 * ENOUGH_FDS, and the hard limit to at least the desired soft
443 * limit. This assumes we can exercise CAP_SYS_RESOURCE on Linux,
444 * or other OSs' equivalents. */
445 if (lim.rlim_cur != RLIM_INFINITY &&
446 lim.rlim_cur < ENOUGH_FDS)
447 lim.rlim_cur = ENOUGH_FDS;
448
449 if (lim.rlim_max != RLIM_INFINITY &&
450 lim.rlim_max < lim.rlim_cur)
451 lim.rlim_max = lim.rlim_cur;
452 }
453
454 /* Raise the soft limit to match the hard limit, which we can do even
455 * if we are unprivileged. In particular, systemd >= 240 will normally
456 * set rlim_cur to 1024 and rlim_max to 512*1024, recent Debian
457 * versions end up setting rlim_cur to 1024 and rlim_max to 1024*1024,
458 * and older and non-systemd Linux systems would typically set rlim_cur
459 * to 1024 and rlim_max to 4096. */
460 if (lim.rlim_max == RLIM_INFINITY || lim.rlim_cur < lim.rlim_max)
461 {
462#if defined(__APPLE__) && defined(__MACH__)
463 /* macOS 10.5 and above no longer allows RLIM_INFINITY for rlim_cur */
464 lim.rlim_cur = MIN (OPEN_MAX, lim.rlim_max);
465#else
466 lim.rlim_cur = lim.rlim_max;
467#endif
468 }
469
470 /* Early-return if there is nothing to do. */
471 if (lim.rlim_max == old.rlim_max &&
472 lim.rlim_cur == old.rlim_cur)
473 return TRUE;
474
475 if (setrlimit (RLIMIT_NOFILE, &lim) < 0)
476 {
478 "Failed to set fd limit to %lu: %s",
479 (unsigned long) lim.rlim_cur,
480 _dbus_strerror (errno));
481 return FALSE;
482 }
483
484 return TRUE;
485}
486
488_dbus_rlimit_restore_fd_limit (DBusRLimit *saved,
489 DBusError *error)
490{
491 if (setrlimit (RLIMIT_NOFILE, &saved->lim) < 0)
492 {
494 "Failed to restore old fd limit: %s",
495 _dbus_strerror (errno));
496 return FALSE;
497 }
498
499 return TRUE;
500}
501
502#else /* !HAVE_SETRLIMIT */
503
504static void
505fd_limit_not_supported (DBusError *error)
506{
508 "cannot change fd limit on this platform");
509}
510
511DBusRLimit *
512_dbus_rlimit_save_fd_limit (DBusError *error)
513{
514 fd_limit_not_supported (error);
515 return NULL;
516}
517
519_dbus_rlimit_raise_fd_limit (DBusError *error)
520{
521 fd_limit_not_supported (error);
522 return FALSE;
523}
524
526_dbus_rlimit_restore_fd_limit (DBusRLimit *saved,
527 DBusError *error)
528{
529 fd_limit_not_supported (error);
530 return FALSE;
531}
532
533#endif
534
535void
536_dbus_rlimit_free (DBusRLimit *lim)
537{
538 dbus_free (lim);
539}
540
546void
548 DBusSignalHandler handler)
549{
550 struct sigaction act;
551 sigset_t empty_mask;
552
553 sigemptyset (&empty_mask);
554 act.sa_handler = handler;
555 act.sa_mask = empty_mask;
556 act.sa_flags = 0;
557 sigaction (sig, &act, NULL);
558}
559
566_dbus_file_exists (const char *file)
567{
568 return (access (file, F_OK) == 0);
569}
570
578_dbus_user_at_console (const char *username,
579 DBusError *error)
580{
581#ifdef DBUS_CONSOLE_AUTH_DIR
582 DBusString u, f;
583 dbus_bool_t result;
584
585 result = FALSE;
586 if (!_dbus_string_init (&f))
587 {
588 _DBUS_SET_OOM (error);
589 return FALSE;
590 }
591
592 if (!_dbus_string_append (&f, DBUS_CONSOLE_AUTH_DIR))
593 {
594 _DBUS_SET_OOM (error);
595 goto out;
596 }
597
598 _dbus_string_init_const (&u, username);
599
600 if (!_dbus_concat_dir_and_file (&f, &u))
601 {
602 _DBUS_SET_OOM (error);
603 goto out;
604 }
605
606 result = _dbus_file_exists (_dbus_string_get_const_data (&f));
607
608 out:
610
611 return result;
612#else
613 return FALSE;
614#endif
615}
616
617
626{
627 if (_dbus_string_get_length (filename) > 0)
628 return _dbus_string_get_byte (filename, 0) == '/';
629 else
630 return FALSE;
631}
632
642_dbus_stat (const DBusString *filename,
643 DBusStat *statbuf,
644 DBusError *error)
645{
646 const char *filename_c;
647 struct stat sb;
648
649 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
650
651 filename_c = _dbus_string_get_const_data (filename);
652
653 if (stat (filename_c, &sb) < 0)
654 {
656 "%s", _dbus_strerror (errno));
657 return FALSE;
658 }
659
660 statbuf->mode = sb.st_mode;
661 statbuf->nlink = sb.st_nlink;
662 statbuf->uid = sb.st_uid;
663 statbuf->gid = sb.st_gid;
664 statbuf->size = sb.st_size;
665 statbuf->atime = sb.st_atime;
666 statbuf->mtime = sb.st_mtime;
667 statbuf->ctime = sb.st_ctime;
668
669 return TRUE;
670}
671
672
677{
678 DIR *d;
680};
681
691 DBusError *error)
692{
693 DIR *d;
694 DBusDirIter *iter;
695 const char *filename_c;
696
697 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
698
699 filename_c = _dbus_string_get_const_data (filename);
700
701 d = opendir (filename_c);
702 if (d == NULL)
703 {
705 "Failed to read directory \"%s\": %s",
706 filename_c,
707 _dbus_strerror (errno));
708 return NULL;
709 }
710 iter = dbus_new0 (DBusDirIter, 1);
711 if (iter == NULL)
712 {
713 closedir (d);
715 "Could not allocate memory for directory iterator");
716 return NULL;
717 }
718
719 iter->d = d;
720
721 return iter;
722}
723
739 DBusString *filename,
740 DBusError *error)
741{
742 struct dirent *ent;
743 int err;
744
745 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
746
747 again:
748 errno = 0;
749 ent = readdir (iter->d);
750
751 if (!ent)
752 {
753 err = errno;
754
755 if (err != 0)
756 dbus_set_error (error,
758 "%s", _dbus_strerror (err));
759
760 return FALSE;
761 }
762 else if (ent->d_name[0] == '.' &&
763 (ent->d_name[1] == '\0' ||
764 (ent->d_name[1] == '.' && ent->d_name[2] == '\0')))
765 goto again;
766 else
767 {
768 _dbus_string_set_length (filename, 0);
769 if (!_dbus_string_append (filename, ent->d_name))
770 {
772 "No memory to read directory entry");
773 return FALSE;
774 }
775 else
776 {
777 return TRUE;
778 }
779 }
780}
781
785void
787{
788 closedir (iter->d);
789 dbus_free (iter);
790}
791
792static dbus_bool_t
793fill_user_info_from_group (struct group *g,
794 DBusGroupInfo *info,
795 DBusError *error)
796{
797 _dbus_assert (g->gr_name != NULL);
798
799 info->gid = g->gr_gid;
800 info->groupname = _dbus_strdup (g->gr_name);
801
802 /* info->members = dbus_strdupv (g->gr_mem) */
803
804 if (info->groupname == NULL)
805 {
807 return FALSE;
808 }
809
810 return TRUE;
811}
812
813static dbus_bool_t
814fill_group_info (DBusGroupInfo *info,
815 dbus_gid_t gid,
816 const DBusString *groupname,
817 DBusError *error)
818{
819 const char *group_c_str;
820
821 _dbus_assert (groupname != NULL || gid != DBUS_GID_UNSET);
822 _dbus_assert (groupname == NULL || gid == DBUS_GID_UNSET);
823
824 if (groupname)
825 group_c_str = _dbus_string_get_const_data (groupname);
826 else
827 group_c_str = NULL;
828
829 /* For now assuming that the getgrnam() and getgrgid() flavors
830 * always correspond to the pwnam flavors, if not we have
831 * to add more configure checks.
832 */
833
834#ifdef HAVE_GETPWNAM_R
835 {
836 struct group *g;
837 int result;
838 size_t buflen;
839 char *buf;
840 struct group g_str;
841 dbus_bool_t b;
842
843 /* retrieve maximum needed size for buf */
844 buflen = sysconf (_SC_GETGR_R_SIZE_MAX);
845
846 /* sysconf actually returns a long, but everything else expects size_t,
847 * so just recast here.
848 * https://bugs.freedesktop.org/show_bug.cgi?id=17061
849 */
850 if ((long) buflen <= 0)
851 buflen = 1024;
852
853 result = -1;
854 while (1)
855 {
856 buf = dbus_malloc (buflen);
857 if (buf == NULL)
858 {
860 return FALSE;
861 }
862
863 g = NULL;
864 if (group_c_str)
865 result = getgrnam_r (group_c_str, &g_str, buf, buflen,
866 &g);
867 else
868 result = getgrgid_r (gid, &g_str, buf, buflen,
869 &g);
870 /* Try a bigger buffer if ERANGE was returned:
871 https://bugs.freedesktop.org/show_bug.cgi?id=16727
872 */
873 if (result == ERANGE && buflen < 512 * 1024)
874 {
875 dbus_free (buf);
876 buflen *= 2;
877 }
878 else
879 {
880 break;
881 }
882 }
883
884 if (result == 0 && g == &g_str)
885 {
886 b = fill_user_info_from_group (g, info, error);
887 dbus_free (buf);
888 return b;
889 }
890 else
891 {
893 "Group %s unknown or failed to look it up\n",
894 group_c_str ? group_c_str : "???");
895 dbus_free (buf);
896 return FALSE;
897 }
898 }
899#else /* ! HAVE_GETPWNAM_R */
900 {
901 /* I guess we're screwed on thread safety here */
902 struct group *g;
903
904#warning getpwnam_r() not available, please report this to the dbus maintainers with details of your OS
905
906 g = getgrnam (group_c_str);
907
908 if (g != NULL)
909 {
910 return fill_user_info_from_group (g, info, error);
911 }
912 else
913 {
915 "Group %s unknown or failed to look it up\n",
916 group_c_str ? group_c_str : "???");
917 return FALSE;
918 }
919 }
920#endif /* ! HAVE_GETPWNAM_R */
921}
922
934 const DBusString *groupname,
935 DBusError *error)
936{
937 return fill_group_info (info, DBUS_GID_UNSET,
938 groupname, error);
939
940}
941
953 dbus_gid_t gid,
954 DBusError *error)
955{
956 return fill_group_info (info, gid, NULL, error);
957}
958
969 dbus_uid_t *uid_p)
970{
971 return _dbus_get_user_id (username, uid_p);
972
973}
974
985 dbus_gid_t *gid_p)
986{
987 return _dbus_get_group_id (groupname, gid_p);
988}
989
1002 dbus_gid_t **group_ids,
1003 int *n_group_ids)
1004{
1005 return _dbus_groups_from_uid (uid, group_ids, n_group_ids);
1006}
1007
1019 DBusError *error)
1020{
1021 return _dbus_is_console_user (uid, error);
1022
1023}
1024
1034{
1035 return uid == _dbus_geteuid ();
1036}
1037
1047{
1048 return FALSE;
1049}
1050 /* End of DBusInternalsUtils functions */
1052
1066 DBusString *dirname)
1067{
1068 int sep;
1069
1070 _dbus_assert (filename != dirname);
1071 _dbus_assert (filename != NULL);
1072 _dbus_assert (dirname != NULL);
1073
1074 /* Ignore any separators on the end */
1075 sep = _dbus_string_get_length (filename);
1076 if (sep == 0)
1077 return _dbus_string_append (dirname, "."); /* empty string passed in */
1078
1079 while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
1080 --sep;
1081
1082 _dbus_assert (sep >= 0);
1083
1084 if (sep == 0)
1085 return _dbus_string_append (dirname, "/");
1086
1087 /* Now find the previous separator */
1088 _dbus_string_find_byte_backward (filename, sep, '/', &sep);
1089 if (sep < 0)
1090 return _dbus_string_append (dirname, ".");
1091
1092 /* skip multiple separators */
1093 while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
1094 --sep;
1095
1096 _dbus_assert (sep >= 0);
1097
1098 if (sep == 0 &&
1099 _dbus_string_get_byte (filename, 0) == '/')
1100 return _dbus_string_append (dirname, "/");
1101 else
1102 return _dbus_string_copy_len (filename, 0, sep - 0,
1103 dirname, _dbus_string_get_length (dirname));
1104} /* DBusString stuff */
1106
1107static void
1108string_squash_nonprintable (DBusString *str)
1109{
1110 unsigned char *buf;
1111 int i, len;
1112
1113 buf = _dbus_string_get_udata (str);
1114 len = _dbus_string_get_length (str);
1115
1116 /* /proc/$pid/cmdline is a sequence of \0-terminated words, but we
1117 * want a sequence of space-separated words, with no extra trailing
1118 * space:
1119 * "/bin/sleep" "\0" "60" "\0"
1120 * -> "/bin/sleep" "\0" "60"
1121 * -> "/bin/sleep" " " "60"
1122 *
1123 * so chop off the trailing NUL before cleaning up unprintable
1124 * characters. */
1125 if (len > 0 && buf[len - 1] == '\0')
1126 {
1127 _dbus_string_shorten (str, 1);
1128 len--;
1129 }
1130
1131 for (i = 0; i < len; i++)
1132 {
1133 unsigned char c = (unsigned char) buf[i];
1134 if (c == '\0')
1135 buf[i] = ' ';
1136 else if (c < 0x20 || c > 127)
1137 buf[i] = '?';
1138 }
1139}
1140
1156_dbus_command_for_pid (unsigned long pid,
1157 DBusString *str,
1158 int max_len,
1159 DBusError *error)
1160{
1161 /* This is all Linux-specific for now */
1162 DBusString path;
1163 DBusString cmdline;
1164 int fd;
1165
1166 if (!_dbus_string_init (&path))
1167 {
1168 _DBUS_SET_OOM (error);
1169 return FALSE;
1170 }
1171
1172 if (!_dbus_string_init (&cmdline))
1173 {
1174 _DBUS_SET_OOM (error);
1175 _dbus_string_free (&path);
1176 return FALSE;
1177 }
1178
1179 if (!_dbus_string_append_printf (&path, "/proc/%ld/cmdline", pid))
1180 goto oom;
1181
1182 fd = open (_dbus_string_get_const_data (&path), O_RDONLY);
1183 if (fd < 0)
1184 {
1185 dbus_set_error (error,
1186 _dbus_error_from_errno (errno),
1187 "Failed to open \"%s\": %s",
1188 _dbus_string_get_const_data (&path),
1189 _dbus_strerror (errno));
1190 goto fail;
1191 }
1192
1193 if (!_dbus_read (fd, &cmdline, max_len))
1194 {
1195 dbus_set_error (error,
1196 _dbus_error_from_errno (errno),
1197 "Failed to read from \"%s\": %s",
1198 _dbus_string_get_const_data (&path),
1199 _dbus_strerror (errno));
1200 _dbus_close (fd, NULL);
1201 goto fail;
1202 }
1203
1204 if (!_dbus_close (fd, error))
1205 goto fail;
1206
1207 string_squash_nonprintable (&cmdline);
1208
1209 if (!_dbus_string_copy (&cmdline, 0, str, _dbus_string_get_length (str)))
1210 goto oom;
1211
1212 _dbus_string_free (&cmdline);
1213 _dbus_string_free (&path);
1214 return TRUE;
1215oom:
1216 _DBUS_SET_OOM (error);
1217fail:
1218 _dbus_string_free (&cmdline);
1219 _dbus_string_free (&path);
1220 return FALSE;
1221}
1222
1233{
1234 return TRUE;
1235}
1236
1237static dbus_bool_t
1238ensure_owned_directory (const char *label,
1239 const DBusString *string,
1240 dbus_bool_t create,
1241 DBusError *error)
1242{
1243 const char *dir = _dbus_string_get_const_data (string);
1244 struct stat buf;
1245
1246 if (create && !_dbus_ensure_directory (string, error))
1247 return FALSE;
1248
1249 /*
1250 * The stat()-based checks in this function are to protect against
1251 * mistakes, not malice. We are working in a directory that is meant
1252 * to be trusted; but if a user has used `su` or similar to escalate
1253 * their privileges without correctly clearing the environment, the
1254 * XDG_RUNTIME_DIR in the environment might still be the user's
1255 * and not root's. We don't want to write root-owned files into that
1256 * directory, so just warn and don't provide support for transient
1257 * services in that case.
1258 *
1259 * In particular, we use stat() and not lstat() so that if we later
1260 * decide to use a different directory name for transient services,
1261 * we can drop in a compatibility symlink without breaking older
1262 * libdbus.
1263 */
1264
1265 if (stat (dir, &buf) != 0)
1266 {
1267 int saved_errno = errno;
1268
1269 dbus_set_error (error, _dbus_error_from_errno (saved_errno),
1270 "%s \"%s\" not available: %s", label, dir,
1271 _dbus_strerror (saved_errno));
1272 return FALSE;
1273 }
1274
1275 if (!S_ISDIR (buf.st_mode))
1276 {
1277 dbus_set_error (error, DBUS_ERROR_FAILED, "%s \"%s\" is not a directory",
1278 label, dir);
1279 return FALSE;
1280 }
1281
1282 if (buf.st_uid != geteuid ())
1283 {
1285 "%s \"%s\" is owned by uid %ld, not our uid %ld",
1286 label, dir, (long) buf.st_uid, (long) geteuid ());
1287 return FALSE;
1288 }
1289
1290 /* This is just because we have the stat() results already, so we might
1291 * as well check opportunistically. */
1292 if ((S_IWOTH | S_IWGRP) & buf.st_mode)
1293 {
1295 "%s \"%s\" can be written by others (mode 0%o)",
1296 label, dir, buf.st_mode);
1297 return FALSE;
1298 }
1299
1300 return TRUE;
1301}
1302
1303#define DBUS_UNIX_STANDARD_SESSION_SERVICEDIR "/dbus-1/services"
1304#define DBUS_UNIX_STANDARD_SYSTEM_SERVICEDIR "/dbus-1/system-services"
1305
1315 DBusError *error)
1316{
1317 const char *xdg_runtime_dir;
1318 DBusString services;
1319 DBusString dbus1;
1320 DBusString xrd;
1321 dbus_bool_t ret = FALSE;
1322 char *data = NULL;
1323
1324 if (!_dbus_string_init (&dbus1))
1325 {
1326 _DBUS_SET_OOM (error);
1327 return FALSE;
1328 }
1329
1330 if (!_dbus_string_init (&services))
1331 {
1332 _dbus_string_free (&dbus1);
1333 _DBUS_SET_OOM (error);
1334 return FALSE;
1335 }
1336
1337 if (!_dbus_string_init (&xrd))
1338 {
1339 _dbus_string_free (&dbus1);
1340 _dbus_string_free (&services);
1341 _DBUS_SET_OOM (error);
1342 return FALSE;
1343 }
1344
1345 xdg_runtime_dir = _dbus_getenv ("XDG_RUNTIME_DIR");
1346
1347 /* Not an error, we just can't have transient session services */
1348 if (xdg_runtime_dir == NULL)
1349 {
1350 _dbus_verbose ("XDG_RUNTIME_DIR is unset: transient session services "
1351 "not available here\n");
1352 ret = TRUE;
1353 goto out;
1354 }
1355
1356 if (!_dbus_string_append (&xrd, xdg_runtime_dir) ||
1357 !_dbus_string_append_printf (&dbus1, "%s/dbus-1",
1358 xdg_runtime_dir) ||
1359 !_dbus_string_append_printf (&services, "%s/dbus-1/services",
1360 xdg_runtime_dir))
1361 {
1362 _DBUS_SET_OOM (error);
1363 goto out;
1364 }
1365
1366 if (!ensure_owned_directory ("XDG_RUNTIME_DIR", &xrd, FALSE, error) ||
1367 !ensure_owned_directory ("XDG_RUNTIME_DIR subdirectory", &dbus1, TRUE,
1368 error) ||
1369 !ensure_owned_directory ("XDG_RUNTIME_DIR subdirectory", &services,
1370 TRUE, error))
1371 goto out;
1372
1373 if (!_dbus_string_steal_data (&services, &data) ||
1374 !_dbus_list_append (dirs, data))
1375 {
1376 _DBUS_SET_OOM (error);
1377 goto out;
1378 }
1379
1380 _dbus_verbose ("Transient service directory is %s\n", data);
1381 /* Ownership was transferred to @dirs */
1382 data = NULL;
1383 ret = TRUE;
1384
1385out:
1386 _dbus_string_free (&dbus1);
1387 _dbus_string_free (&services);
1388 _dbus_string_free (&xrd);
1389 dbus_free (data);
1390 return ret;
1391}
1392
1412{
1413 const char *xdg_data_home;
1414 const char *xdg_data_dirs;
1415 DBusString servicedir_path;
1416
1417 if (!_dbus_string_init (&servicedir_path))
1418 return FALSE;
1419
1420 xdg_data_home = _dbus_getenv ("XDG_DATA_HOME");
1421 xdg_data_dirs = _dbus_getenv ("XDG_DATA_DIRS");
1422
1423 if (xdg_data_home != NULL)
1424 {
1425 if (!_dbus_string_append (&servicedir_path, xdg_data_home))
1426 goto oom;
1427 }
1428 else
1429 {
1430 const DBusString *homedir;
1431 DBusString local_share;
1432
1433 if (!_dbus_homedir_from_current_process (&homedir))
1434 goto oom;
1435
1436 if (!_dbus_string_append (&servicedir_path, _dbus_string_get_const_data (homedir)))
1437 goto oom;
1438
1439 _dbus_string_init_const (&local_share, "/.local/share");
1440 if (!_dbus_concat_dir_and_file (&servicedir_path, &local_share))
1441 goto oom;
1442 }
1443
1444 if (!_dbus_string_append (&servicedir_path, ":"))
1445 goto oom;
1446
1447 if (xdg_data_dirs != NULL)
1448 {
1449 if (!_dbus_string_append (&servicedir_path, xdg_data_dirs))
1450 goto oom;
1451
1452 if (!_dbus_string_append (&servicedir_path, ":"))
1453 goto oom;
1454 }
1455 else
1456 {
1457 if (!_dbus_string_append (&servicedir_path, "/usr/local/share:/usr/share:"))
1458 goto oom;
1459 }
1460
1461 /*
1462 * add configured datadir to defaults
1463 * this may be the same as an xdg dir
1464 * however the config parser should take
1465 * care of duplicates
1466 */
1467 if (!_dbus_string_append (&servicedir_path, DBUS_DATADIR))
1468 goto oom;
1469
1470 if (!_dbus_split_paths_and_append (&servicedir_path,
1471 DBUS_UNIX_STANDARD_SESSION_SERVICEDIR,
1472 dirs))
1473 goto oom;
1474
1475 _dbus_string_free (&servicedir_path);
1476 return TRUE;
1477
1478 oom:
1479 _dbus_string_free (&servicedir_path);
1480 return FALSE;
1481}
1482
1483
1504{
1505 /*
1506 * DBUS_DATADIR may be the same as one of the standard directories. However,
1507 * the config parser should take care of the duplicates.
1508 *
1509 * Also, append /lib as counterpart of /usr/share on the root
1510 * directory (the root directory does not know /share), in order to
1511 * facilitate early boot system bus activation where /usr might not
1512 * be available.
1513 */
1514 static const char standard_search_path[] =
1515 "/usr/local/share:"
1516 "/usr/share:"
1517 DBUS_DATADIR ":"
1518 "/lib";
1519 DBusString servicedir_path;
1520
1521 _dbus_string_init_const (&servicedir_path, standard_search_path);
1522
1523 return _dbus_split_paths_and_append (&servicedir_path,
1524 DBUS_UNIX_STANDARD_SYSTEM_SERVICEDIR,
1525 dirs);
1526}
1527
1538{
1539 _dbus_assert (_dbus_string_get_length (str) == 0);
1540
1541 return _dbus_string_append (str, DBUS_SYSTEM_CONFIG_FILE);
1542}
1543
1552{
1553 _dbus_assert (_dbus_string_get_length (str) == 0);
1554
1555 return _dbus_string_append (str, DBUS_SESSION_CONFIG_FILE);
1556}
1557
1562void
1564{
1565#ifdef HAVE_SYSTEMD
1566 sd_notify (0, "READY=1");
1567#endif
1568}
1569
1574void
1576{
1577#ifdef HAVE_SYSTEMD
1578 sd_notify (0, "RELOADING=1");
1579#endif
1580}
1581
1586void
1588{
1589#ifdef HAVE_SYSTEMD
1590 /* For systemd, this is the same code */
1592#endif
1593}
1594
1599void
1601{
1602#ifdef HAVE_SYSTEMD
1603 sd_notify (0, "STOPPING=1");
1604#endif
1605}
1606
1621_dbus_reset_oom_score_adj (const char **error_str_p)
1622{
1623#ifdef __linux__
1624 int fd = -1;
1625 dbus_bool_t ret = FALSE;
1626 int saved_errno = 0;
1627 const char *error_str = NULL;
1628
1629#ifdef O_CLOEXEC
1630 fd = open ("/proc/self/oom_score_adj", O_RDWR | O_CLOEXEC);
1631#endif
1632
1633 if (fd < 0)
1634 {
1635 fd = open ("/proc/self/oom_score_adj", O_RDWR);
1637 }
1638
1639 if (fd >= 0)
1640 {
1641 ssize_t read_result = -1;
1642 /* It doesn't actually matter whether we read the whole file,
1643 * as long as we get the presence or absence of the minus sign */
1644 char first_char = '\0';
1645
1646 read_result = read (fd, &first_char, 1);
1647
1648 if (read_result < 0)
1649 {
1650 /* This probably can't actually happen in practice: if we can
1651 * open it, then we can hopefully read from it */
1652 ret = FALSE;
1653 error_str = "failed to read from /proc/self/oom_score_adj";
1654 saved_errno = errno;
1655 goto out;
1656 }
1657
1658 /* If we are running with protection from the OOM killer
1659 * (typical for the system dbus-daemon under systemd), then
1660 * oom_score_adj will be negative. Drop that protection,
1661 * returning to oom_score_adj = 0.
1662 *
1663 * Conversely, if we are running with increased susceptibility
1664 * to the OOM killer (as user sessions typically do in
1665 * systemd >= 250), oom_score_adj will be strictly positive,
1666 * and we are not allowed to decrease it to 0 without privileges.
1667 *
1668 * If it's exactly 0 (typical for non-systemd systems, and
1669 * user processes on older systemd) then there's no need to
1670 * alter it.
1671 *
1672 * We shouldn't get an empty result, but if we do, assume it
1673 * means zero and don't try to change it. */
1674 if (read_result == 0 || first_char != '-')
1675 {
1676 /* Nothing needs to be done: the OOM score adjustment is
1677 * non-negative */
1678 ret = TRUE;
1679 goto out;
1680 }
1681
1682 if (pwrite (fd, "0", sizeof (char), 0) < 0)
1683 {
1684 ret = FALSE;
1685 error_str = "writing oom_score_adj error";
1686 saved_errno = errno;
1687 goto out;
1688 }
1689
1690 /* Success */
1691 ret = TRUE;
1692 }
1693 else if (errno == ENOENT)
1694 {
1695 /* If /proc/self/oom_score_adj doesn't exist, assume the kernel
1696 * doesn't support this feature and ignore it. */
1697 ret = TRUE;
1698 }
1699 else
1700 {
1701 ret = FALSE;
1702 error_str = "open(/proc/self/oom_score_adj)";
1703 saved_errno = errno;
1704 goto out;
1705 }
1706
1707out:
1708 if (fd >= 0)
1709 _dbus_close (fd, NULL);
1710
1711 if (error_str_p != NULL)
1712 *error_str_p = error_str;
1713
1714 errno = saved_errno;
1715 return ret;
1716#else
1717 /* nothing to do on this platform */
1718 return TRUE;
1719#endif
1720}
void dbus_set_error(DBusError *error, const char *name, const char *format,...)
Assigns an error name and message to a DBusError.
Definition: dbus-errors.c:354
dbus_bool_t dbus_error_is_set(const DBusError *error)
Checks whether an error occurred (the error is set).
Definition: dbus-errors.c:329
dbus_bool_t _dbus_stat(const DBusString *filename, DBusStat *statbuf, DBusError *error)
stat() wrapper.
#define _dbus_assert_not_reached(explanation)
Aborts with an error message if called.
dbus_bool_t _dbus_write_pid_to_file_and_pipe(const DBusString *pidfile, DBusPipe *print_pid_pipe, dbus_pid_t pid_to_write, DBusError *error)
Writes the given pid_to_write to a pidfile (if non-NULL) and/or to a pipe (if non-NULL).
#define _dbus_assert(condition)
Aborts with an error message if the condition is false.
dbus_bool_t _dbus_file_exists(const char *file)
Checks if a file exists.
dbus_bool_t _dbus_homedir_from_current_process(const DBusString **homedir)
Gets homedir of user owning current process.
Definition: dbus-userdb.c:440
void _dbus_directory_close(DBusDirIter *iter)
Closes a directory iteration.
dbus_bool_t _dbus_group_info_fill(DBusGroupInfo *info, const DBusString *groupname, DBusError *error)
Initializes the given DBusGroupInfo struct with information about the given group name.
dbus_bool_t _dbus_user_at_console(const char *username, DBusError *error)
Checks if user is at the console.
DBusDirIter * _dbus_directory_open(const DBusString *filename, DBusError *error)
Open a directory to iterate over.
dbus_bool_t _dbus_parse_unix_user_from_config(const DBusString *username, dbus_uid_t *uid_p)
Parse a UNIX user from the bus config file.
dbus_bool_t _dbus_verify_daemon_user(const char *user)
Verify that after the fork we can successfully change to this user.
const char * _dbus_error_from_errno(int error_number)
Converts a UNIX errno, or Windows errno or WinSock error value into a DBusError name.
Definition: dbus-sysdeps.c:599
void _dbus_set_signal_handler(int sig, DBusSignalHandler handler)
Installs a UNIX signal handler.
dbus_bool_t _dbus_path_is_absolute(const DBusString *filename)
Checks whether the filename is an absolute path.
char * _dbus_strdup(const char *str)
Duplicates a string.
dbus_bool_t _dbus_unix_groups_from_uid(dbus_uid_t uid, dbus_gid_t **group_ids, int *n_group_ids)
Gets all groups corresponding to the given UNIX user ID.
dbus_bool_t _dbus_change_to_daemon_user(const char *user, DBusError *error)
Changes the user and group the bus is running as.
dbus_bool_t _dbus_unix_user_is_process_owner(dbus_uid_t uid)
Checks to see if the UNIX user ID matches the UID of the process.
dbus_bool_t _dbus_get_group_id(const DBusString *groupname, dbus_gid_t *gid)
Gets group ID given groupname.
dbus_bool_t _dbus_windows_user_is_process_owner(const char *windows_sid)
Checks to see if the Windows user SID matches the owner of the process.
dbus_bool_t _dbus_parse_unix_group_from_config(const DBusString *groupname, dbus_gid_t *gid_p)
Parse a UNIX group from the bus config file.
dbus_bool_t _dbus_is_console_user(dbus_uid_t uid, DBusError *error)
Checks to see if the UID sent in is the console user.
dbus_bool_t _dbus_directory_get_next_file(DBusDirIter *iter, DBusString *filename, DBusError *error)
Get next file in the directory.
void _dbus_warn(const char *format,...)
Prints a warning message to stderr.
dbus_bool_t _dbus_get_user_id_and_primary_group(const DBusString *username, dbus_uid_t *uid_p, dbus_gid_t *gid_p)
Gets user ID and primary group given username.
dbus_bool_t _dbus_become_daemon(const DBusString *pidfile, DBusPipe *print_pid_pipe, DBusError *error, dbus_bool_t keep_umask)
Does the chdir, fork, setsid, etc.
dbus_bool_t _dbus_group_info_fill_gid(DBusGroupInfo *info, dbus_gid_t gid, DBusError *error)
Initializes the given DBusGroupInfo struct with information about the given group ID.
dbus_bool_t _dbus_groups_from_uid(dbus_uid_t uid, dbus_gid_t **group_ids, int *n_group_ids)
Gets all groups corresponding to the given UID.
dbus_bool_t _dbus_unix_user_is_at_console(dbus_uid_t uid, DBusError *error)
Checks to see if the UNIX user ID is at the console.
dbus_bool_t _dbus_get_user_id(const DBusString *username, dbus_uid_t *uid)
Gets user ID given username.
dbus_bool_t _dbus_list_append(DBusList **list, void *data)
Appends a value to the list.
Definition: dbus-list.c:271
#define NULL
A null pointer, defined appropriately for C or C++.
#define TRUE
Expands to "1".
#define FALSE
Expands to "0".
void dbus_free(void *memory)
Frees a block of memory previously allocated by dbus_malloc() or dbus_malloc0().
Definition: dbus-memory.c:692
#define dbus_new0(type, count)
Safe macro for using dbus_malloc0().
Definition: dbus-memory.h:58
void * dbus_malloc(size_t bytes)
Allocates the given number of bytes, as with standard malloc().
Definition: dbus-memory.c:452
#define DBUS_ERROR_NOT_SUPPORTED
Requested operation isn't supported (like ENOSYS on UNIX).
#define DBUS_ERROR_FAILED
A generic error; "something went wrong" - see the error message for more.
#define DBUS_ERROR_NO_MEMORY
There was not enough memory to complete an operation.
dbus_bool_t _dbus_string_set_length(DBusString *str, int length)
Sets the length of a string.
Definition: dbus-string.c:833
dbus_bool_t _dbus_string_append(DBusString *str, const char *buffer)
Appends a nul-terminated C-style string to a DBusString.
Definition: dbus-string.c:966
dbus_bool_t _dbus_string_init(DBusString *str)
Initializes a string.
Definition: dbus-string.c:182
void _dbus_string_init_const(DBusString *str, const char *value)
Initializes a constant string.
Definition: dbus-string.c:197
dbus_bool_t _dbus_string_copy(const DBusString *source, int start, DBusString *dest, int insert_at)
Like _dbus_string_move(), but does not delete the section of the source string that's copied to the d...
Definition: dbus-string.c:1343
DBUS_PRIVATE_EXPORT dbus_bool_t _dbus_string_append_int(DBusString *str, long value)
Appends an integer to a DBusString.
Definition: dbus-sysdeps.c:363
dbus_bool_t _dbus_string_steal_data(DBusString *str, char **data_return)
Like _dbus_string_get_data(), but removes the gotten data from the original string.
Definition: dbus-string.c:672
void _dbus_string_free(DBusString *str)
Frees a string created by _dbus_string_init(), and fills it with the same contents as #_DBUS_STRING_I...
Definition: dbus-string.c:278
void _dbus_string_shorten(DBusString *str, int length_to_remove)
Makes a string shorter by the given number of bytes.
Definition: dbus-string.c:811
dbus_bool_t _dbus_string_find_byte_backward(const DBusString *str, int start, unsigned char byte, int *found)
Find the given byte scanning backward from the given start.
dbus_bool_t _dbus_string_append_printf(DBusString *str, const char *format,...)
Appends a printf-style formatted string to the DBusString.
Definition: dbus-string.c:1145
dbus_bool_t _dbus_string_copy_len(const DBusString *source, int start, int len, DBusString *dest, int insert_at)
Like _dbus_string_copy(), but can copy a segment from the middle of the source string.
Definition: dbus-string.c:1435
dbus_bool_t _dbus_string_get_dirname(const DBusString *filename, DBusString *dirname)
Get the directory name from a complete filename.
dbus_bool_t _dbus_reset_oom_score_adj(const char **error_str_p)
If the current process has been protected from the Linux OOM killer (the oom_score_adj process parame...
dbus_bool_t _dbus_close(int fd, DBusError *error)
Closes a file descriptor.
void(* DBusSignalHandler)(int sig)
A UNIX signal handler.
void _dbus_fd_set_close_on_exec(int fd)
Sets the file descriptor to be close on exec.
int _dbus_read(int fd, DBusString *buffer, int count)
Thin wrapper around the read() system call that appends the data it reads to the DBusString buffer.
dbus_bool_t _dbus_ensure_standard_fds(DBusEnsureStandardFdsFlags flags, const char **error_str_p)
Ensure that the standard file descriptors stdin, stdout and stderr are open, by opening /dev/null if ...
dbus_uid_t _dbus_geteuid(void)
Gets our effective UID.
dbus_bool_t _dbus_get_standard_session_servicedirs(DBusList **dirs)
Returns the standard directories for a session bus to look for service activation files.
void _dbus_daemon_report_ready(void)
Report to a service manager that the daemon calling this function is ready for use.
unsigned long dbus_uid_t
A user ID.
Definition: dbus-sysdeps.h:137
dbus_bool_t _dbus_get_session_config_file(DBusString *str)
Get the absolute path of the session.conf file.
unsigned long dbus_pid_t
A process ID.
Definition: dbus-sysdeps.h:135
void _dbus_daemon_report_reloading(void)
Report to a service manager that the daemon calling this function is reloading configuration.
unsigned long dbus_gid_t
A group ID.
Definition: dbus-sysdeps.h:139
dbus_bool_t _dbus_command_for_pid(unsigned long pid, DBusString *str, int max_len, DBusError *error)
Get a printable string describing the command used to execute the process with pid.
dbus_bool_t _dbus_get_system_config_file(DBusString *str)
Get the absolute path of the system.conf file (there is no system bus on Windows so this can just ret...
dbus_bool_t _dbus_set_up_transient_session_servicedirs(DBusList **dirs, DBusError *error)
Returns the standard directories for a session bus to look for transient service activation files.
const char * _dbus_getenv(const char *varname)
Wrapper for getenv().
Definition: dbus-sysdeps.c:195
dbus_bool_t _dbus_get_standard_system_servicedirs(DBusList **dirs)
Returns the standard directories for a system bus to look for service activation files.
void _dbus_daemon_report_reloaded(void)
Report to a service manager that the daemon calling this function is reloading configuration.
#define DBUS_GID_UNSET
an invalid GID used to represent an uninitialized dbus_gid_t field
Definition: dbus-sysdeps.h:146
void _dbus_daemon_report_stopping(void)
Report to a service manager that the daemon calling this function is shutting down.
dbus_bool_t _dbus_concat_dir_and_file(DBusString *dir, const DBusString *next_component)
Appends the given filename to the given directory.
dbus_bool_t _dbus_split_paths_and_append(DBusString *dirs, const char *suffix, DBusList **dir_list)
Split paths into a list of char strings.
Definition: dbus-sysdeps.c:236
dbus_bool_t _dbus_replace_install_prefix(DBusString *path)
Replace the DBUS_PREFIX in the given path, in-place, by the current D-Bus installation directory.
dbus_bool_t _dbus_ensure_directory(const DBusString *filename, DBusError *error)
Creates a directory; succeeds if the directory is created or already existed.
dbus_uint32_t dbus_bool_t
A boolean, valid values are TRUE and FALSE.
Definition: dbus-types.h:35
Internals of directory iterator.
DIR * d
The DIR* from opendir()
Object representing an exception.
Definition: dbus-errors.h:49
const char * message
public error message field
Definition: dbus-errors.h:51
Information about a UNIX group.
dbus_gid_t gid
GID.
char * groupname
Group name.
A node in a linked list.
Definition: dbus-list.h:35
Portable struct with stat() results.
Definition: dbus-sysdeps.h:550
unsigned long nlink
Number of hard links.
Definition: dbus-sysdeps.h:552
unsigned long size
Size of file.
Definition: dbus-sysdeps.h:555
dbus_uid_t uid
User owning file.
Definition: dbus-sysdeps.h:553
unsigned long mode
File mode.
Definition: dbus-sysdeps.h:551
dbus_gid_t gid
Group owning file.
Definition: dbus-sysdeps.h:554
unsigned long atime
Access time.
Definition: dbus-sysdeps.h:556
unsigned long ctime
Creation time.
Definition: dbus-sysdeps.h:558
unsigned long mtime
Modify time.
Definition: dbus-sysdeps.h:557