D-Bus 1.2.24

dbus-sysdeps-util-unix.c

00001 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
00002 /* dbus-sysdeps-util-unix.c Would be in dbus-sysdeps-unix.c, but not used in libdbus
00003  * 
00004  * Copyright (C) 2002, 2003, 2004, 2005  Red Hat, Inc.
00005  * Copyright (C) 2003 CodeFactory AB
00006  *
00007  * Licensed under the Academic Free License version 2.1
00008  * 
00009  * This program is free software; you can redistribute it and/or modify
00010  * it under the terms of the GNU General Public License as published by
00011  * the Free Software Foundation; either version 2 of the License, or
00012  * (at your option) any later version.
00013  *
00014  * This program is distributed in the hope that it will be useful,
00015  * but WITHOUT ANY WARRANTY; without even the implied warranty of
00016  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
00017  * GNU General Public License for more details.
00018  * 
00019  * You should have received a copy of the GNU General Public License
00020  * along with this program; if not, write to the Free Software
00021  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
00022  *
00023  */
00024 #include "dbus-sysdeps.h"
00025 #include "dbus-sysdeps-unix.h"
00026 #include "dbus-internals.h"
00027 #include "dbus-protocol.h"
00028 #include "dbus-string.h"
00029 #define DBUS_USERDB_INCLUDES_PRIVATE 1
00030 #include "dbus-userdb.h"
00031 #include "dbus-test.h"
00032 
00033 #include <sys/types.h>
00034 #include <stdlib.h>
00035 #include <string.h>
00036 #include <signal.h>
00037 #include <unistd.h>
00038 #include <stdio.h>
00039 #include <errno.h>
00040 #include <fcntl.h>
00041 #include <sys/stat.h>
00042 #include <grp.h>
00043 #include <sys/socket.h>
00044 #include <dirent.h>
00045 #include <sys/un.h>
00046 #include <syslog.h>
00047 
00048 #ifdef HAVE_SYS_SYSLIMITS_H
00049 #include <sys/syslimits.h>
00050 #endif
00051 
00052 #ifndef O_BINARY
00053 #define O_BINARY 0
00054 #endif
00055 
00071 dbus_bool_t
00072 _dbus_become_daemon (const DBusString *pidfile,
00073                      DBusPipe         *print_pid_pipe,
00074                      DBusError        *error,
00075                      dbus_bool_t       keep_umask)
00076 {
00077   const char *s;
00078   pid_t child_pid;
00079   int dev_null_fd;
00080 
00081   _dbus_verbose ("Becoming a daemon...\n");
00082 
00083   _dbus_verbose ("chdir to /\n");
00084   if (chdir ("/") < 0)
00085     {
00086       dbus_set_error (error, DBUS_ERROR_FAILED,
00087                       "Could not chdir() to root directory");
00088       return FALSE;
00089     }
00090 
00091   _dbus_verbose ("forking...\n");
00092   switch ((child_pid = fork ()))
00093     {
00094     case -1:
00095       _dbus_verbose ("fork failed\n");
00096       dbus_set_error (error, _dbus_error_from_errno (errno),
00097                       "Failed to fork daemon: %s", _dbus_strerror (errno));
00098       return FALSE;
00099       break;
00100 
00101     case 0:
00102       _dbus_verbose ("in child, closing std file descriptors\n");
00103 
00104       /* silently ignore failures here, if someone
00105        * doesn't have /dev/null we may as well try
00106        * to continue anyhow
00107        */
00108       
00109       dev_null_fd = open ("/dev/null", O_RDWR);
00110       if (dev_null_fd >= 0)
00111         {
00112           dup2 (dev_null_fd, 0);
00113           dup2 (dev_null_fd, 1);
00114           
00115           s = _dbus_getenv ("DBUS_DEBUG_OUTPUT");
00116           if (s == NULL || *s == '\0')
00117             dup2 (dev_null_fd, 2);
00118           else
00119             _dbus_verbose ("keeping stderr open due to DBUS_DEBUG_OUTPUT\n");
00120         }
00121 
00122       if (!keep_umask)
00123         {
00124           /* Get a predictable umask */
00125           _dbus_verbose ("setting umask\n");
00126           umask (022);
00127         }
00128 
00129       _dbus_verbose ("calling setsid()\n");
00130       if (setsid () == -1)
00131         _dbus_assert_not_reached ("setsid() failed");
00132       
00133       break;
00134 
00135     default:
00136       if (!_dbus_write_pid_to_file_and_pipe (pidfile, print_pid_pipe,
00137                                              child_pid, error))
00138         {
00139           _dbus_verbose ("pid file or pipe write failed: %s\n",
00140                          error->message);
00141           kill (child_pid, SIGTERM);
00142           return FALSE;
00143         }
00144 
00145       _dbus_verbose ("parent exiting\n");
00146       _exit (0);
00147       break;
00148     }
00149   
00150   return TRUE;
00151 }
00152 
00153 
00162 static dbus_bool_t
00163 _dbus_write_pid_file (const DBusString *filename,
00164                       unsigned long     pid,
00165                       DBusError        *error)
00166 {
00167   const char *cfilename;
00168   int fd;
00169   FILE *f;
00170 
00171   cfilename = _dbus_string_get_const_data (filename);
00172   
00173   fd = open (cfilename, O_WRONLY|O_CREAT|O_EXCL|O_BINARY, 0644);
00174   
00175   if (fd < 0)
00176     {
00177       dbus_set_error (error, _dbus_error_from_errno (errno),
00178                       "Failed to open \"%s\": %s", cfilename,
00179                       _dbus_strerror (errno));
00180       return FALSE;
00181     }
00182 
00183   if ((f = fdopen (fd, "w")) == NULL)
00184     {
00185       dbus_set_error (error, _dbus_error_from_errno (errno),
00186                       "Failed to fdopen fd %d: %s", fd, _dbus_strerror (errno));
00187       _dbus_close (fd, NULL);
00188       return FALSE;
00189     }
00190   
00191   if (fprintf (f, "%lu\n", pid) < 0)
00192     {
00193       dbus_set_error (error, _dbus_error_from_errno (errno),
00194                       "Failed to write to \"%s\": %s", cfilename,
00195                       _dbus_strerror (errno));
00196       
00197       fclose (f);
00198       return FALSE;
00199     }
00200 
00201   if (fclose (f) == EOF)
00202     {
00203       dbus_set_error (error, _dbus_error_from_errno (errno),
00204                       "Failed to close \"%s\": %s", cfilename,
00205                       _dbus_strerror (errno));
00206       return FALSE;
00207     }
00208   
00209   return TRUE;
00210 }
00211 
00223 dbus_bool_t
00224 _dbus_write_pid_to_file_and_pipe (const DBusString *pidfile,
00225                                   DBusPipe         *print_pid_pipe,
00226                                   dbus_pid_t        pid_to_write,
00227                                   DBusError        *error)
00228 {
00229   if (pidfile)
00230     {
00231       _dbus_verbose ("writing pid file %s\n", _dbus_string_get_const_data (pidfile));
00232       if (!_dbus_write_pid_file (pidfile,
00233                                  pid_to_write,
00234                                  error))
00235         {
00236           _dbus_verbose ("pid file write failed\n");
00237           _DBUS_ASSERT_ERROR_IS_SET(error);
00238           return FALSE;
00239         }
00240     }
00241   else
00242     {
00243       _dbus_verbose ("No pid file requested\n");
00244     }
00245 
00246   if (print_pid_pipe != NULL && _dbus_pipe_is_valid (print_pid_pipe))
00247     {
00248       DBusString pid;
00249       int bytes;
00250 
00251       _dbus_verbose ("writing our pid to pipe %d\n", print_pid_pipe->fd_or_handle);
00252       
00253       if (!_dbus_string_init (&pid))
00254         {
00255           _DBUS_SET_OOM (error);
00256           return FALSE;
00257         }
00258           
00259       if (!_dbus_string_append_int (&pid, pid_to_write) ||
00260           !_dbus_string_append (&pid, "\n"))
00261         {
00262           _dbus_string_free (&pid);
00263           _DBUS_SET_OOM (error);
00264           return FALSE;
00265         }
00266           
00267       bytes = _dbus_string_get_length (&pid);
00268       if (_dbus_pipe_write (print_pid_pipe, &pid, 0, bytes, error) != bytes)
00269         {
00270           /* _dbus_pipe_write sets error only on failure, not short write */
00271           if (error != NULL && !dbus_error_is_set(error))
00272             {
00273               dbus_set_error (error, DBUS_ERROR_FAILED,
00274                               "Printing message bus PID: did not write enough bytes\n");
00275             }
00276           _dbus_string_free (&pid);
00277           return FALSE;
00278         }
00279           
00280       _dbus_string_free (&pid);
00281     }
00282   else
00283     {
00284       _dbus_verbose ("No pid pipe to write to\n");
00285     }
00286 
00287   return TRUE;
00288 }
00289 
00296 dbus_bool_t
00297 _dbus_verify_daemon_user (const char *user)
00298 {
00299   DBusString u;
00300 
00301   _dbus_string_init_const (&u, user);
00302 
00303   return _dbus_get_user_id_and_primary_group (&u, NULL, NULL);
00304 }
00305 
00306 
00307 /* The HAVE_LIBAUDIT case lives in selinux.c */
00308 #ifndef HAVE_LIBAUDIT
00309 
00316 dbus_bool_t
00317 _dbus_change_to_daemon_user  (const char    *user,
00318                               DBusError     *error)
00319 {
00320   dbus_uid_t uid;
00321   dbus_gid_t gid;
00322   DBusString u;
00323 
00324   _dbus_string_init_const (&u, user);
00325 
00326   if (!_dbus_get_user_id_and_primary_group (&u, &uid, &gid))
00327     {
00328       dbus_set_error (error, DBUS_ERROR_FAILED,
00329                       "User '%s' does not appear to exist?",
00330                       user);
00331       return FALSE;
00332     }
00333 
00334   /* setgroups() only works if we are a privileged process,
00335    * so we don't return error on failure; the only possible
00336    * failure is that we don't have perms to do it.
00337    *
00338    * not sure this is right, maybe if setuid()
00339    * is going to work then setgroups() should also work.
00340    */
00341   if (setgroups (0, NULL) < 0)
00342     _dbus_warn ("Failed to drop supplementary groups: %s\n",
00343                 _dbus_strerror (errno));
00344 
00345   /* Set GID first, or the setuid may remove our permission
00346    * to change the GID
00347    */
00348   if (setgid (gid) < 0)
00349     {
00350       dbus_set_error (error, _dbus_error_from_errno (errno),
00351                       "Failed to set GID to %lu: %s", gid,
00352                       _dbus_strerror (errno));
00353       return FALSE;
00354     }
00355 
00356   if (setuid (uid) < 0)
00357     {
00358       dbus_set_error (error, _dbus_error_from_errno (errno),
00359                       "Failed to set UID to %lu: %s", uid,
00360                       _dbus_strerror (errno));
00361       return FALSE;
00362     }
00363 
00364   return TRUE;
00365 }
00366 #endif /* !HAVE_LIBAUDIT */
00367 
00368 void 
00369 _dbus_init_system_log (void)
00370 {
00371   openlog ("dbus", LOG_PID, LOG_DAEMON);
00372 }
00381 void
00382 _dbus_system_log (DBusSystemLogSeverity severity, const char *msg, ...)
00383 {
00384   va_list args;
00385 
00386   va_start (args, msg);
00387 
00388   _dbus_system_logv (severity, msg, args);
00389 
00390   va_end (args);
00391 }
00392 
00403 void
00404 _dbus_system_logv (DBusSystemLogSeverity severity, const char *msg, va_list args)
00405 {
00406   int flags;
00407   switch (severity)
00408     {
00409       case DBUS_SYSTEM_LOG_INFO:
00410         flags =  LOG_DAEMON | LOG_NOTICE;
00411         break;
00412       case DBUS_SYSTEM_LOG_SECURITY:
00413         flags = LOG_AUTH | LOG_NOTICE;
00414         break;
00415       case DBUS_SYSTEM_LOG_FATAL:
00416         flags = LOG_DAEMON|LOG_CRIT;
00417       default:
00418         return;
00419     }
00420 
00421   vsyslog (flags, msg, args);
00422   
00423   if (severity == DBUS_SYSTEM_LOG_FATAL)
00424     exit (1);
00425 }
00426 
00432 void
00433 _dbus_set_signal_handler (int               sig,
00434                           DBusSignalHandler handler)
00435 {
00436   struct sigaction act;
00437   sigset_t empty_mask;
00438   
00439   sigemptyset (&empty_mask);
00440   act.sa_handler = handler;
00441   act.sa_mask    = empty_mask;
00442   act.sa_flags   = 0;
00443   sigaction (sig,  &act, NULL);
00444 }
00445 
00446 
00454 dbus_bool_t
00455 _dbus_delete_directory (const DBusString *filename,
00456                         DBusError        *error)
00457 {
00458   const char *filename_c;
00459   
00460   _DBUS_ASSERT_ERROR_IS_CLEAR (error);
00461 
00462   filename_c = _dbus_string_get_const_data (filename);
00463 
00464   if (rmdir (filename_c) != 0)
00465     {
00466       dbus_set_error (error, DBUS_ERROR_FAILED,
00467                       "Failed to remove directory %s: %s\n",
00468                       filename_c, _dbus_strerror (errno));
00469       return FALSE;
00470     }
00471   
00472   return TRUE;
00473 }
00474 
00480 dbus_bool_t 
00481 _dbus_file_exists (const char *file)
00482 {
00483   return (access (file, F_OK) == 0);
00484 }
00485 
00492 dbus_bool_t 
00493 _dbus_user_at_console (const char *username,
00494                        DBusError  *error)
00495 {
00496 
00497   DBusString f;
00498   dbus_bool_t result;
00499 
00500   result = FALSE;
00501   if (!_dbus_string_init (&f))
00502     {
00503       _DBUS_SET_OOM (error);
00504       return FALSE;
00505     }
00506 
00507   if (!_dbus_string_append (&f, DBUS_CONSOLE_AUTH_DIR))
00508     {
00509       _DBUS_SET_OOM (error);
00510       goto out;
00511     }
00512 
00513 
00514   if (!_dbus_string_append (&f, username))
00515     {
00516       _DBUS_SET_OOM (error);
00517       goto out;
00518     }
00519 
00520   result = _dbus_file_exists (_dbus_string_get_const_data (&f));
00521 
00522  out:
00523   _dbus_string_free (&f);
00524 
00525   return result;
00526 }
00527 
00528 
00535 dbus_bool_t
00536 _dbus_path_is_absolute (const DBusString *filename)
00537 {
00538   if (_dbus_string_get_length (filename) > 0)
00539     return _dbus_string_get_byte (filename, 0) == '/';
00540   else
00541     return FALSE;
00542 }
00543 
00552 dbus_bool_t
00553 _dbus_stat (const DBusString *filename,
00554             DBusStat         *statbuf,
00555             DBusError        *error)
00556 {
00557   const char *filename_c;
00558   struct stat sb;
00559 
00560   _DBUS_ASSERT_ERROR_IS_CLEAR (error);
00561   
00562   filename_c = _dbus_string_get_const_data (filename);
00563 
00564   if (stat (filename_c, &sb) < 0)
00565     {
00566       dbus_set_error (error, _dbus_error_from_errno (errno),
00567                       "%s", _dbus_strerror (errno));
00568       return FALSE;
00569     }
00570 
00571   statbuf->mode = sb.st_mode;
00572   statbuf->nlink = sb.st_nlink;
00573   statbuf->uid = sb.st_uid;
00574   statbuf->gid = sb.st_gid;
00575   statbuf->size = sb.st_size;
00576   statbuf->atime = sb.st_atime;
00577   statbuf->mtime = sb.st_mtime;
00578   statbuf->ctime = sb.st_ctime;
00579 
00580   return TRUE;
00581 }
00582 
00583 
00587 struct DBusDirIter
00588 {
00589   DIR *d; 
00591 };
00592 
00600 DBusDirIter*
00601 _dbus_directory_open (const DBusString *filename,
00602                       DBusError        *error)
00603 {
00604   DIR *d;
00605   DBusDirIter *iter;
00606   const char *filename_c;
00607 
00608   _DBUS_ASSERT_ERROR_IS_CLEAR (error);
00609   
00610   filename_c = _dbus_string_get_const_data (filename);
00611 
00612   d = opendir (filename_c);
00613   if (d == NULL)
00614     {
00615       dbus_set_error (error, _dbus_error_from_errno (errno),
00616                       "Failed to read directory \"%s\": %s",
00617                       filename_c,
00618                       _dbus_strerror (errno));
00619       return NULL;
00620     }
00621   iter = dbus_new0 (DBusDirIter, 1);
00622   if (iter == NULL)
00623     {
00624       closedir (d);
00625       dbus_set_error (error, DBUS_ERROR_NO_MEMORY,
00626                       "Could not allocate memory for directory iterator");
00627       return NULL;
00628     }
00629 
00630   iter->d = d;
00631 
00632   return iter;
00633 }
00634 
00635 /* Calculate the required buffer size (in bytes) for directory
00636  * entries read from the given directory handle.  Return -1 if this
00637  * this cannot be done. 
00638  *
00639  * If you use autoconf, include fpathconf and dirfd in your
00640  * AC_CHECK_FUNCS list.  Otherwise use some other method to detect
00641  * and use them where available.
00642  */
00643 static dbus_bool_t
00644 dirent_buf_size(DIR * dirp, size_t *size)
00645 {
00646  long name_max;
00647 #   if defined(HAVE_FPATHCONF) && defined(_PC_NAME_MAX)
00648 #      if defined(HAVE_DIRFD)
00649           name_max = fpathconf(dirfd(dirp), _PC_NAME_MAX);
00650 #      elif defined(HAVE_DDFD)
00651           name_max = fpathconf(dirp->dd_fd, _PC_NAME_MAX);
00652 #      else
00653           name_max = fpathconf(dirp->__dd_fd, _PC_NAME_MAX);
00654 #      endif /* HAVE_DIRFD */
00655      if (name_max == -1)
00656 #           if defined(NAME_MAX)
00657              name_max = NAME_MAX;
00658 #           else
00659              return FALSE;
00660 #           endif
00661 #   elif defined(MAXNAMELEN)
00662      name_max = MAXNAMELEN;
00663 #   else
00664 #       if defined(NAME_MAX)
00665          name_max = NAME_MAX;
00666 #       else
00667 #           error "buffer size for readdir_r cannot be determined"
00668 #       endif
00669 #   endif
00670   if (size)
00671     *size = (size_t)offsetof(struct dirent, d_name) + name_max + 1;
00672   else
00673     return FALSE;
00674 
00675   return TRUE;
00676 }
00677 
00688 dbus_bool_t
00689 _dbus_directory_get_next_file (DBusDirIter      *iter,
00690                                DBusString       *filename,
00691                                DBusError        *error)
00692 {
00693   struct dirent *d, *ent;
00694   size_t buf_size;
00695   int err;
00696 
00697   _DBUS_ASSERT_ERROR_IS_CLEAR (error);
00698  
00699   if (!dirent_buf_size (iter->d, &buf_size))
00700     {
00701       dbus_set_error (error, DBUS_ERROR_FAILED,
00702                       "Can't calculate buffer size when reading directory");
00703       return FALSE;
00704     }
00705 
00706   d = (struct dirent *)dbus_malloc (buf_size);
00707   if (!d)
00708     {
00709       dbus_set_error (error, DBUS_ERROR_NO_MEMORY,
00710                       "No memory to read directory entry");
00711       return FALSE;
00712     }
00713 
00714  again:
00715   err = readdir_r (iter->d, d, &ent);
00716   if (err || !ent)
00717     {
00718       if (err != 0)
00719         dbus_set_error (error,
00720                         _dbus_error_from_errno (err),
00721                         "%s", _dbus_strerror (err));
00722 
00723       dbus_free (d);
00724       return FALSE;
00725     }
00726   else if (ent->d_name[0] == '.' &&
00727            (ent->d_name[1] == '\0' ||
00728             (ent->d_name[1] == '.' && ent->d_name[2] == '\0')))
00729     goto again;
00730   else
00731     {
00732       _dbus_string_set_length (filename, 0);
00733       if (!_dbus_string_append (filename, ent->d_name))
00734         {
00735           dbus_set_error (error, DBUS_ERROR_NO_MEMORY,
00736                           "No memory to read directory entry");
00737           dbus_free (d);
00738           return FALSE;
00739         }
00740       else
00741         {
00742           dbus_free (d);
00743           return TRUE;
00744         }
00745     }
00746 }
00747 
00751 void
00752 _dbus_directory_close (DBusDirIter *iter)
00753 {
00754   closedir (iter->d);
00755   dbus_free (iter);
00756 }
00757 
00758 static dbus_bool_t
00759 fill_user_info_from_group (struct group  *g,
00760                            DBusGroupInfo *info,
00761                            DBusError     *error)
00762 {
00763   _dbus_assert (g->gr_name != NULL);
00764   
00765   info->gid = g->gr_gid;
00766   info->groupname = _dbus_strdup (g->gr_name);
00767 
00768   /* info->members = dbus_strdupv (g->gr_mem) */
00769   
00770   if (info->groupname == NULL)
00771     {
00772       dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
00773       return FALSE;
00774     }
00775 
00776   return TRUE;
00777 }
00778 
00779 static dbus_bool_t
00780 fill_group_info (DBusGroupInfo    *info,
00781                  dbus_gid_t        gid,
00782                  const DBusString *groupname,
00783                  DBusError        *error)
00784 {
00785   const char *group_c_str;
00786 
00787   _dbus_assert (groupname != NULL || gid != DBUS_GID_UNSET);
00788   _dbus_assert (groupname == NULL || gid == DBUS_GID_UNSET);
00789 
00790   if (groupname)
00791     group_c_str = _dbus_string_get_const_data (groupname);
00792   else
00793     group_c_str = NULL;
00794   
00795   /* For now assuming that the getgrnam() and getgrgid() flavors
00796    * always correspond to the pwnam flavors, if not we have
00797    * to add more configure checks.
00798    */
00799   
00800 #if defined (HAVE_POSIX_GETPWNAM_R) || defined (HAVE_NONPOSIX_GETPWNAM_R)
00801   {
00802     struct group *g;
00803     int result;
00804     size_t buflen;
00805     char *buf;
00806     struct group g_str;
00807     dbus_bool_t b;
00808 
00809     /* retrieve maximum needed size for buf */
00810     buflen = sysconf (_SC_GETGR_R_SIZE_MAX);
00811 
00812     /* sysconf actually returns a long, but everything else expects size_t,
00813      * so just recast here.
00814      * https://bugs.freedesktop.org/show_bug.cgi?id=17061
00815      */
00816     if ((long) buflen <= 0)
00817       buflen = 1024;
00818 
00819     result = -1;
00820     while (1)
00821       {
00822         buf = dbus_malloc (buflen);
00823         if (buf == NULL)
00824           {
00825             dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL);
00826             return FALSE;
00827           }
00828 
00829         g = NULL;
00830 #ifdef HAVE_POSIX_GETPWNAM_R
00831         if (group_c_str)
00832           result = getgrnam_r (group_c_str, &g_str, buf, buflen,
00833                                &g);
00834         else
00835           result = getgrgid_r (gid, &g_str, buf, buflen,
00836                                &g);
00837 #else
00838         g = getgrnam_r (group_c_str, &g_str, buf, buflen);
00839         result = 0;
00840 #endif /* !HAVE_POSIX_GETPWNAM_R */
00841         /* Try a bigger buffer if ERANGE was returned:
00842            https://bugs.freedesktop.org/show_bug.cgi?id=16727
00843         */
00844         if (result == ERANGE && buflen < 512 * 1024)
00845           {
00846             dbus_free (buf);
00847             buflen *= 2;
00848           }
00849         else
00850           {
00851             break;
00852           }
00853       }
00854 
00855     if (result == 0 && g == &g_str)
00856       {
00857         b = fill_user_info_from_group (g, info, error);
00858         dbus_free (buf);
00859         return b;
00860       }
00861     else
00862       {
00863         dbus_set_error (error, _dbus_error_from_errno (errno),
00864                         "Group %s unknown or failed to look it up\n",
00865                         group_c_str ? group_c_str : "???");
00866         dbus_free (buf);
00867         return FALSE;
00868       }
00869   }
00870 #else /* ! HAVE_GETPWNAM_R */
00871   {
00872     /* I guess we're screwed on thread safety here */
00873     struct group *g;
00874 
00875     g = getgrnam (group_c_str);
00876 
00877     if (g != NULL)
00878       {
00879         return fill_user_info_from_group (g, info, error);
00880       }
00881     else
00882       {
00883         dbus_set_error (error, _dbus_error_from_errno (errno),
00884                         "Group %s unknown or failed to look it up\n",
00885                         group_c_str ? group_c_str : "???");
00886         return FALSE;
00887       }
00888   }
00889 #endif  /* ! HAVE_GETPWNAM_R */
00890 }
00891 
00901 dbus_bool_t
00902 _dbus_group_info_fill (DBusGroupInfo    *info,
00903                        const DBusString *groupname,
00904                        DBusError        *error)
00905 {
00906   return fill_group_info (info, DBUS_GID_UNSET,
00907                           groupname, error);
00908 
00909 }
00910 
00920 dbus_bool_t
00921 _dbus_group_info_fill_gid (DBusGroupInfo *info,
00922                            dbus_gid_t     gid,
00923                            DBusError     *error)
00924 {
00925   return fill_group_info (info, gid, NULL, error);
00926 }
00927 
00936 dbus_bool_t
00937 _dbus_parse_unix_user_from_config (const DBusString  *username,
00938                                    dbus_uid_t        *uid_p)
00939 {
00940   return _dbus_get_user_id (username, uid_p);
00941 
00942 }
00943 
00952 dbus_bool_t
00953 _dbus_parse_unix_group_from_config (const DBusString  *groupname,
00954                                     dbus_gid_t        *gid_p)
00955 {
00956   return _dbus_get_group_id (groupname, gid_p);
00957 }
00958 
00969 dbus_bool_t
00970 _dbus_unix_groups_from_uid (dbus_uid_t            uid,
00971                             dbus_gid_t          **group_ids,
00972                             int                  *n_group_ids)
00973 {
00974   return _dbus_groups_from_uid (uid, group_ids, n_group_ids);
00975 }
00976 
00986 dbus_bool_t
00987 _dbus_unix_user_is_at_console (dbus_uid_t         uid,
00988                                DBusError         *error)
00989 {
00990   return _dbus_is_console_user (uid, error);
00991 
00992 }
00993 
01001 dbus_bool_t
01002 _dbus_unix_user_is_process_owner (dbus_uid_t uid)
01003 {
01004   return uid == _dbus_geteuid ();
01005 }
01006 
01014 dbus_bool_t
01015 _dbus_windows_user_is_process_owner (const char *windows_sid)
01016 {
01017   return FALSE;
01018 }
01019  /* End of DBusInternalsUtils functions */
01021 
01033 dbus_bool_t
01034 _dbus_string_get_dirname  (const DBusString *filename,
01035                            DBusString       *dirname)
01036 {
01037   int sep;
01038   
01039   _dbus_assert (filename != dirname);
01040   _dbus_assert (filename != NULL);
01041   _dbus_assert (dirname != NULL);
01042 
01043   /* Ignore any separators on the end */
01044   sep = _dbus_string_get_length (filename);
01045   if (sep == 0)
01046     return _dbus_string_append (dirname, "."); /* empty string passed in */
01047     
01048   while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
01049     --sep;
01050 
01051   _dbus_assert (sep >= 0);
01052   
01053   if (sep == 0)
01054     return _dbus_string_append (dirname, "/");
01055   
01056   /* Now find the previous separator */
01057   _dbus_string_find_byte_backward (filename, sep, '/', &sep);
01058   if (sep < 0)
01059     return _dbus_string_append (dirname, ".");
01060   
01061   /* skip multiple separators */
01062   while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
01063     --sep;
01064 
01065   _dbus_assert (sep >= 0);
01066   
01067   if (sep == 0 &&
01068       _dbus_string_get_byte (filename, 0) == '/')
01069     return _dbus_string_append (dirname, "/");
01070   else
01071     return _dbus_string_copy_len (filename, 0, sep - 0,
01072                                   dirname, _dbus_string_get_length (dirname));
01073 } /* DBusString stuff */
01075 
01076 static void
01077 string_squash_nonprintable (DBusString *str)
01078 {
01079   char *buf;
01080   int i, len; 
01081   
01082   buf = _dbus_string_get_data (str);
01083   len = _dbus_string_get_length (str);
01084   
01085   for (i = 0; i < len; i++)
01086     {
01087           unsigned char c = (unsigned char) buf[i];
01088       if (c == '\0')
01089         c = ' ';
01090       else if (c < 0x20 || c > 127)
01091         c = '?';
01092     }
01093 }
01094 
01109 dbus_bool_t 
01110 _dbus_command_for_pid (unsigned long  pid,
01111                        DBusString    *str,
01112                        int            max_len,
01113                        DBusError     *error)
01114 {
01115   /* This is all Linux-specific for now */
01116   DBusString path;
01117   DBusString cmdline;
01118   int fd;
01119   
01120   if (!_dbus_string_init (&path)) 
01121     {
01122       _DBUS_SET_OOM (error);
01123       return FALSE;
01124     }
01125   
01126   if (!_dbus_string_init (&cmdline))
01127     {
01128       _DBUS_SET_OOM (error);
01129       _dbus_string_free (&path);
01130       return FALSE;
01131     }
01132   
01133   if (!_dbus_string_append_printf (&path, "/proc/%ld/cmdline", pid))
01134     goto oom;
01135   
01136   fd = open (_dbus_string_get_const_data (&path), O_RDONLY);
01137   if (fd < 0) 
01138     {
01139       dbus_set_error (error,
01140                       _dbus_error_from_errno (errno),
01141                       "Failed to open \"%s\": %s",
01142                       _dbus_string_get_const_data (&path),
01143                       _dbus_strerror (errno));
01144       goto fail;
01145     }
01146   
01147   if (!_dbus_read (fd, &cmdline, max_len))
01148     {
01149       dbus_set_error (error,
01150                       _dbus_error_from_errno (errno),
01151                       "Failed to read from \"%s\": %s",
01152                       _dbus_string_get_const_data (&path),
01153                       _dbus_strerror (errno));      
01154       goto fail;
01155     }
01156   
01157   if (!_dbus_close (fd, error))
01158     goto fail;
01159   
01160   string_squash_nonprintable (&cmdline);  
01161   
01162   if (!_dbus_string_copy (&cmdline, 0, str, _dbus_string_get_length (str)))
01163     goto oom;
01164   
01165   _dbus_string_free (&cmdline);  
01166   _dbus_string_free (&path);
01167   return TRUE;
01168 oom:
01169   _DBUS_SET_OOM (error);
01170 fail:
01171   _dbus_string_free (&cmdline);
01172   _dbus_string_free (&path);
01173   return FALSE;
01174 }
01175