D-Bus 1.2.24
|
00001 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */ 00002 /* dbus-sysdeps-util-unix.c Would be in dbus-sysdeps-unix.c, but not used in libdbus 00003 * 00004 * Copyright (C) 2002, 2003, 2004, 2005 Red Hat, Inc. 00005 * Copyright (C) 2003 CodeFactory AB 00006 * 00007 * Licensed under the Academic Free License version 2.1 00008 * 00009 * This program is free software; you can redistribute it and/or modify 00010 * it under the terms of the GNU General Public License as published by 00011 * the Free Software Foundation; either version 2 of the License, or 00012 * (at your option) any later version. 00013 * 00014 * This program is distributed in the hope that it will be useful, 00015 * but WITHOUT ANY WARRANTY; without even the implied warranty of 00016 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 00017 * GNU General Public License for more details. 00018 * 00019 * You should have received a copy of the GNU General Public License 00020 * along with this program; if not, write to the Free Software 00021 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA 00022 * 00023 */ 00024 #include "dbus-sysdeps.h" 00025 #include "dbus-sysdeps-unix.h" 00026 #include "dbus-internals.h" 00027 #include "dbus-protocol.h" 00028 #include "dbus-string.h" 00029 #define DBUS_USERDB_INCLUDES_PRIVATE 1 00030 #include "dbus-userdb.h" 00031 #include "dbus-test.h" 00032 00033 #include <sys/types.h> 00034 #include <stdlib.h> 00035 #include <string.h> 00036 #include <signal.h> 00037 #include <unistd.h> 00038 #include <stdio.h> 00039 #include <errno.h> 00040 #include <fcntl.h> 00041 #include <sys/stat.h> 00042 #include <grp.h> 00043 #include <sys/socket.h> 00044 #include <dirent.h> 00045 #include <sys/un.h> 00046 #include <syslog.h> 00047 00048 #ifdef HAVE_SYS_SYSLIMITS_H 00049 #include <sys/syslimits.h> 00050 #endif 00051 00052 #ifndef O_BINARY 00053 #define O_BINARY 0 00054 #endif 00055 00071 dbus_bool_t 00072 _dbus_become_daemon (const DBusString *pidfile, 00073 DBusPipe *print_pid_pipe, 00074 DBusError *error, 00075 dbus_bool_t keep_umask) 00076 { 00077 const char *s; 00078 pid_t child_pid; 00079 int dev_null_fd; 00080 00081 _dbus_verbose ("Becoming a daemon...\n"); 00082 00083 _dbus_verbose ("chdir to /\n"); 00084 if (chdir ("/") < 0) 00085 { 00086 dbus_set_error (error, DBUS_ERROR_FAILED, 00087 "Could not chdir() to root directory"); 00088 return FALSE; 00089 } 00090 00091 _dbus_verbose ("forking...\n"); 00092 switch ((child_pid = fork ())) 00093 { 00094 case -1: 00095 _dbus_verbose ("fork failed\n"); 00096 dbus_set_error (error, _dbus_error_from_errno (errno), 00097 "Failed to fork daemon: %s", _dbus_strerror (errno)); 00098 return FALSE; 00099 break; 00100 00101 case 0: 00102 _dbus_verbose ("in child, closing std file descriptors\n"); 00103 00104 /* silently ignore failures here, if someone 00105 * doesn't have /dev/null we may as well try 00106 * to continue anyhow 00107 */ 00108 00109 dev_null_fd = open ("/dev/null", O_RDWR); 00110 if (dev_null_fd >= 0) 00111 { 00112 dup2 (dev_null_fd, 0); 00113 dup2 (dev_null_fd, 1); 00114 00115 s = _dbus_getenv ("DBUS_DEBUG_OUTPUT"); 00116 if (s == NULL || *s == '\0') 00117 dup2 (dev_null_fd, 2); 00118 else 00119 _dbus_verbose ("keeping stderr open due to DBUS_DEBUG_OUTPUT\n"); 00120 } 00121 00122 if (!keep_umask) 00123 { 00124 /* Get a predictable umask */ 00125 _dbus_verbose ("setting umask\n"); 00126 umask (022); 00127 } 00128 00129 _dbus_verbose ("calling setsid()\n"); 00130 if (setsid () == -1) 00131 _dbus_assert_not_reached ("setsid() failed"); 00132 00133 break; 00134 00135 default: 00136 if (!_dbus_write_pid_to_file_and_pipe (pidfile, print_pid_pipe, 00137 child_pid, error)) 00138 { 00139 _dbus_verbose ("pid file or pipe write failed: %s\n", 00140 error->message); 00141 kill (child_pid, SIGTERM); 00142 return FALSE; 00143 } 00144 00145 _dbus_verbose ("parent exiting\n"); 00146 _exit (0); 00147 break; 00148 } 00149 00150 return TRUE; 00151 } 00152 00153 00162 static dbus_bool_t 00163 _dbus_write_pid_file (const DBusString *filename, 00164 unsigned long pid, 00165 DBusError *error) 00166 { 00167 const char *cfilename; 00168 int fd; 00169 FILE *f; 00170 00171 cfilename = _dbus_string_get_const_data (filename); 00172 00173 fd = open (cfilename, O_WRONLY|O_CREAT|O_EXCL|O_BINARY, 0644); 00174 00175 if (fd < 0) 00176 { 00177 dbus_set_error (error, _dbus_error_from_errno (errno), 00178 "Failed to open \"%s\": %s", cfilename, 00179 _dbus_strerror (errno)); 00180 return FALSE; 00181 } 00182 00183 if ((f = fdopen (fd, "w")) == NULL) 00184 { 00185 dbus_set_error (error, _dbus_error_from_errno (errno), 00186 "Failed to fdopen fd %d: %s", fd, _dbus_strerror (errno)); 00187 _dbus_close (fd, NULL); 00188 return FALSE; 00189 } 00190 00191 if (fprintf (f, "%lu\n", pid) < 0) 00192 { 00193 dbus_set_error (error, _dbus_error_from_errno (errno), 00194 "Failed to write to \"%s\": %s", cfilename, 00195 _dbus_strerror (errno)); 00196 00197 fclose (f); 00198 return FALSE; 00199 } 00200 00201 if (fclose (f) == EOF) 00202 { 00203 dbus_set_error (error, _dbus_error_from_errno (errno), 00204 "Failed to close \"%s\": %s", cfilename, 00205 _dbus_strerror (errno)); 00206 return FALSE; 00207 } 00208 00209 return TRUE; 00210 } 00211 00223 dbus_bool_t 00224 _dbus_write_pid_to_file_and_pipe (const DBusString *pidfile, 00225 DBusPipe *print_pid_pipe, 00226 dbus_pid_t pid_to_write, 00227 DBusError *error) 00228 { 00229 if (pidfile) 00230 { 00231 _dbus_verbose ("writing pid file %s\n", _dbus_string_get_const_data (pidfile)); 00232 if (!_dbus_write_pid_file (pidfile, 00233 pid_to_write, 00234 error)) 00235 { 00236 _dbus_verbose ("pid file write failed\n"); 00237 _DBUS_ASSERT_ERROR_IS_SET(error); 00238 return FALSE; 00239 } 00240 } 00241 else 00242 { 00243 _dbus_verbose ("No pid file requested\n"); 00244 } 00245 00246 if (print_pid_pipe != NULL && _dbus_pipe_is_valid (print_pid_pipe)) 00247 { 00248 DBusString pid; 00249 int bytes; 00250 00251 _dbus_verbose ("writing our pid to pipe %d\n", print_pid_pipe->fd_or_handle); 00252 00253 if (!_dbus_string_init (&pid)) 00254 { 00255 _DBUS_SET_OOM (error); 00256 return FALSE; 00257 } 00258 00259 if (!_dbus_string_append_int (&pid, pid_to_write) || 00260 !_dbus_string_append (&pid, "\n")) 00261 { 00262 _dbus_string_free (&pid); 00263 _DBUS_SET_OOM (error); 00264 return FALSE; 00265 } 00266 00267 bytes = _dbus_string_get_length (&pid); 00268 if (_dbus_pipe_write (print_pid_pipe, &pid, 0, bytes, error) != bytes) 00269 { 00270 /* _dbus_pipe_write sets error only on failure, not short write */ 00271 if (error != NULL && !dbus_error_is_set(error)) 00272 { 00273 dbus_set_error (error, DBUS_ERROR_FAILED, 00274 "Printing message bus PID: did not write enough bytes\n"); 00275 } 00276 _dbus_string_free (&pid); 00277 return FALSE; 00278 } 00279 00280 _dbus_string_free (&pid); 00281 } 00282 else 00283 { 00284 _dbus_verbose ("No pid pipe to write to\n"); 00285 } 00286 00287 return TRUE; 00288 } 00289 00296 dbus_bool_t 00297 _dbus_verify_daemon_user (const char *user) 00298 { 00299 DBusString u; 00300 00301 _dbus_string_init_const (&u, user); 00302 00303 return _dbus_get_user_id_and_primary_group (&u, NULL, NULL); 00304 } 00305 00306 00307 /* The HAVE_LIBAUDIT case lives in selinux.c */ 00308 #ifndef HAVE_LIBAUDIT 00309 00316 dbus_bool_t 00317 _dbus_change_to_daemon_user (const char *user, 00318 DBusError *error) 00319 { 00320 dbus_uid_t uid; 00321 dbus_gid_t gid; 00322 DBusString u; 00323 00324 _dbus_string_init_const (&u, user); 00325 00326 if (!_dbus_get_user_id_and_primary_group (&u, &uid, &gid)) 00327 { 00328 dbus_set_error (error, DBUS_ERROR_FAILED, 00329 "User '%s' does not appear to exist?", 00330 user); 00331 return FALSE; 00332 } 00333 00334 /* setgroups() only works if we are a privileged process, 00335 * so we don't return error on failure; the only possible 00336 * failure is that we don't have perms to do it. 00337 * 00338 * not sure this is right, maybe if setuid() 00339 * is going to work then setgroups() should also work. 00340 */ 00341 if (setgroups (0, NULL) < 0) 00342 _dbus_warn ("Failed to drop supplementary groups: %s\n", 00343 _dbus_strerror (errno)); 00344 00345 /* Set GID first, or the setuid may remove our permission 00346 * to change the GID 00347 */ 00348 if (setgid (gid) < 0) 00349 { 00350 dbus_set_error (error, _dbus_error_from_errno (errno), 00351 "Failed to set GID to %lu: %s", gid, 00352 _dbus_strerror (errno)); 00353 return FALSE; 00354 } 00355 00356 if (setuid (uid) < 0) 00357 { 00358 dbus_set_error (error, _dbus_error_from_errno (errno), 00359 "Failed to set UID to %lu: %s", uid, 00360 _dbus_strerror (errno)); 00361 return FALSE; 00362 } 00363 00364 return TRUE; 00365 } 00366 #endif /* !HAVE_LIBAUDIT */ 00367 00368 void 00369 _dbus_init_system_log (void) 00370 { 00371 openlog ("dbus", LOG_PID, LOG_DAEMON); 00372 } 00381 void 00382 _dbus_system_log (DBusSystemLogSeverity severity, const char *msg, ...) 00383 { 00384 va_list args; 00385 00386 va_start (args, msg); 00387 00388 _dbus_system_logv (severity, msg, args); 00389 00390 va_end (args); 00391 } 00392 00403 void 00404 _dbus_system_logv (DBusSystemLogSeverity severity, const char *msg, va_list args) 00405 { 00406 int flags; 00407 switch (severity) 00408 { 00409 case DBUS_SYSTEM_LOG_INFO: 00410 flags = LOG_DAEMON | LOG_NOTICE; 00411 break; 00412 case DBUS_SYSTEM_LOG_SECURITY: 00413 flags = LOG_AUTH | LOG_NOTICE; 00414 break; 00415 case DBUS_SYSTEM_LOG_FATAL: 00416 flags = LOG_DAEMON|LOG_CRIT; 00417 default: 00418 return; 00419 } 00420 00421 vsyslog (flags, msg, args); 00422 00423 if (severity == DBUS_SYSTEM_LOG_FATAL) 00424 exit (1); 00425 } 00426 00432 void 00433 _dbus_set_signal_handler (int sig, 00434 DBusSignalHandler handler) 00435 { 00436 struct sigaction act; 00437 sigset_t empty_mask; 00438 00439 sigemptyset (&empty_mask); 00440 act.sa_handler = handler; 00441 act.sa_mask = empty_mask; 00442 act.sa_flags = 0; 00443 sigaction (sig, &act, NULL); 00444 } 00445 00446 00454 dbus_bool_t 00455 _dbus_delete_directory (const DBusString *filename, 00456 DBusError *error) 00457 { 00458 const char *filename_c; 00459 00460 _DBUS_ASSERT_ERROR_IS_CLEAR (error); 00461 00462 filename_c = _dbus_string_get_const_data (filename); 00463 00464 if (rmdir (filename_c) != 0) 00465 { 00466 dbus_set_error (error, DBUS_ERROR_FAILED, 00467 "Failed to remove directory %s: %s\n", 00468 filename_c, _dbus_strerror (errno)); 00469 return FALSE; 00470 } 00471 00472 return TRUE; 00473 } 00474 00480 dbus_bool_t 00481 _dbus_file_exists (const char *file) 00482 { 00483 return (access (file, F_OK) == 0); 00484 } 00485 00492 dbus_bool_t 00493 _dbus_user_at_console (const char *username, 00494 DBusError *error) 00495 { 00496 00497 DBusString f; 00498 dbus_bool_t result; 00499 00500 result = FALSE; 00501 if (!_dbus_string_init (&f)) 00502 { 00503 _DBUS_SET_OOM (error); 00504 return FALSE; 00505 } 00506 00507 if (!_dbus_string_append (&f, DBUS_CONSOLE_AUTH_DIR)) 00508 { 00509 _DBUS_SET_OOM (error); 00510 goto out; 00511 } 00512 00513 00514 if (!_dbus_string_append (&f, username)) 00515 { 00516 _DBUS_SET_OOM (error); 00517 goto out; 00518 } 00519 00520 result = _dbus_file_exists (_dbus_string_get_const_data (&f)); 00521 00522 out: 00523 _dbus_string_free (&f); 00524 00525 return result; 00526 } 00527 00528 00535 dbus_bool_t 00536 _dbus_path_is_absolute (const DBusString *filename) 00537 { 00538 if (_dbus_string_get_length (filename) > 0) 00539 return _dbus_string_get_byte (filename, 0) == '/'; 00540 else 00541 return FALSE; 00542 } 00543 00552 dbus_bool_t 00553 _dbus_stat (const DBusString *filename, 00554 DBusStat *statbuf, 00555 DBusError *error) 00556 { 00557 const char *filename_c; 00558 struct stat sb; 00559 00560 _DBUS_ASSERT_ERROR_IS_CLEAR (error); 00561 00562 filename_c = _dbus_string_get_const_data (filename); 00563 00564 if (stat (filename_c, &sb) < 0) 00565 { 00566 dbus_set_error (error, _dbus_error_from_errno (errno), 00567 "%s", _dbus_strerror (errno)); 00568 return FALSE; 00569 } 00570 00571 statbuf->mode = sb.st_mode; 00572 statbuf->nlink = sb.st_nlink; 00573 statbuf->uid = sb.st_uid; 00574 statbuf->gid = sb.st_gid; 00575 statbuf->size = sb.st_size; 00576 statbuf->atime = sb.st_atime; 00577 statbuf->mtime = sb.st_mtime; 00578 statbuf->ctime = sb.st_ctime; 00579 00580 return TRUE; 00581 } 00582 00583 00587 struct DBusDirIter 00588 { 00589 DIR *d; 00591 }; 00592 00600 DBusDirIter* 00601 _dbus_directory_open (const DBusString *filename, 00602 DBusError *error) 00603 { 00604 DIR *d; 00605 DBusDirIter *iter; 00606 const char *filename_c; 00607 00608 _DBUS_ASSERT_ERROR_IS_CLEAR (error); 00609 00610 filename_c = _dbus_string_get_const_data (filename); 00611 00612 d = opendir (filename_c); 00613 if (d == NULL) 00614 { 00615 dbus_set_error (error, _dbus_error_from_errno (errno), 00616 "Failed to read directory \"%s\": %s", 00617 filename_c, 00618 _dbus_strerror (errno)); 00619 return NULL; 00620 } 00621 iter = dbus_new0 (DBusDirIter, 1); 00622 if (iter == NULL) 00623 { 00624 closedir (d); 00625 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, 00626 "Could not allocate memory for directory iterator"); 00627 return NULL; 00628 } 00629 00630 iter->d = d; 00631 00632 return iter; 00633 } 00634 00635 /* Calculate the required buffer size (in bytes) for directory 00636 * entries read from the given directory handle. Return -1 if this 00637 * this cannot be done. 00638 * 00639 * If you use autoconf, include fpathconf and dirfd in your 00640 * AC_CHECK_FUNCS list. Otherwise use some other method to detect 00641 * and use them where available. 00642 */ 00643 static dbus_bool_t 00644 dirent_buf_size(DIR * dirp, size_t *size) 00645 { 00646 long name_max; 00647 # if defined(HAVE_FPATHCONF) && defined(_PC_NAME_MAX) 00648 # if defined(HAVE_DIRFD) 00649 name_max = fpathconf(dirfd(dirp), _PC_NAME_MAX); 00650 # elif defined(HAVE_DDFD) 00651 name_max = fpathconf(dirp->dd_fd, _PC_NAME_MAX); 00652 # else 00653 name_max = fpathconf(dirp->__dd_fd, _PC_NAME_MAX); 00654 # endif /* HAVE_DIRFD */ 00655 if (name_max == -1) 00656 # if defined(NAME_MAX) 00657 name_max = NAME_MAX; 00658 # else 00659 return FALSE; 00660 # endif 00661 # elif defined(MAXNAMELEN) 00662 name_max = MAXNAMELEN; 00663 # else 00664 # if defined(NAME_MAX) 00665 name_max = NAME_MAX; 00666 # else 00667 # error "buffer size for readdir_r cannot be determined" 00668 # endif 00669 # endif 00670 if (size) 00671 *size = (size_t)offsetof(struct dirent, d_name) + name_max + 1; 00672 else 00673 return FALSE; 00674 00675 return TRUE; 00676 } 00677 00688 dbus_bool_t 00689 _dbus_directory_get_next_file (DBusDirIter *iter, 00690 DBusString *filename, 00691 DBusError *error) 00692 { 00693 struct dirent *d, *ent; 00694 size_t buf_size; 00695 int err; 00696 00697 _DBUS_ASSERT_ERROR_IS_CLEAR (error); 00698 00699 if (!dirent_buf_size (iter->d, &buf_size)) 00700 { 00701 dbus_set_error (error, DBUS_ERROR_FAILED, 00702 "Can't calculate buffer size when reading directory"); 00703 return FALSE; 00704 } 00705 00706 d = (struct dirent *)dbus_malloc (buf_size); 00707 if (!d) 00708 { 00709 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, 00710 "No memory to read directory entry"); 00711 return FALSE; 00712 } 00713 00714 again: 00715 err = readdir_r (iter->d, d, &ent); 00716 if (err || !ent) 00717 { 00718 if (err != 0) 00719 dbus_set_error (error, 00720 _dbus_error_from_errno (err), 00721 "%s", _dbus_strerror (err)); 00722 00723 dbus_free (d); 00724 return FALSE; 00725 } 00726 else if (ent->d_name[0] == '.' && 00727 (ent->d_name[1] == '\0' || 00728 (ent->d_name[1] == '.' && ent->d_name[2] == '\0'))) 00729 goto again; 00730 else 00731 { 00732 _dbus_string_set_length (filename, 0); 00733 if (!_dbus_string_append (filename, ent->d_name)) 00734 { 00735 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, 00736 "No memory to read directory entry"); 00737 dbus_free (d); 00738 return FALSE; 00739 } 00740 else 00741 { 00742 dbus_free (d); 00743 return TRUE; 00744 } 00745 } 00746 } 00747 00751 void 00752 _dbus_directory_close (DBusDirIter *iter) 00753 { 00754 closedir (iter->d); 00755 dbus_free (iter); 00756 } 00757 00758 static dbus_bool_t 00759 fill_user_info_from_group (struct group *g, 00760 DBusGroupInfo *info, 00761 DBusError *error) 00762 { 00763 _dbus_assert (g->gr_name != NULL); 00764 00765 info->gid = g->gr_gid; 00766 info->groupname = _dbus_strdup (g->gr_name); 00767 00768 /* info->members = dbus_strdupv (g->gr_mem) */ 00769 00770 if (info->groupname == NULL) 00771 { 00772 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL); 00773 return FALSE; 00774 } 00775 00776 return TRUE; 00777 } 00778 00779 static dbus_bool_t 00780 fill_group_info (DBusGroupInfo *info, 00781 dbus_gid_t gid, 00782 const DBusString *groupname, 00783 DBusError *error) 00784 { 00785 const char *group_c_str; 00786 00787 _dbus_assert (groupname != NULL || gid != DBUS_GID_UNSET); 00788 _dbus_assert (groupname == NULL || gid == DBUS_GID_UNSET); 00789 00790 if (groupname) 00791 group_c_str = _dbus_string_get_const_data (groupname); 00792 else 00793 group_c_str = NULL; 00794 00795 /* For now assuming that the getgrnam() and getgrgid() flavors 00796 * always correspond to the pwnam flavors, if not we have 00797 * to add more configure checks. 00798 */ 00799 00800 #if defined (HAVE_POSIX_GETPWNAM_R) || defined (HAVE_NONPOSIX_GETPWNAM_R) 00801 { 00802 struct group *g; 00803 int result; 00804 size_t buflen; 00805 char *buf; 00806 struct group g_str; 00807 dbus_bool_t b; 00808 00809 /* retrieve maximum needed size for buf */ 00810 buflen = sysconf (_SC_GETGR_R_SIZE_MAX); 00811 00812 /* sysconf actually returns a long, but everything else expects size_t, 00813 * so just recast here. 00814 * https://bugs.freedesktop.org/show_bug.cgi?id=17061 00815 */ 00816 if ((long) buflen <= 0) 00817 buflen = 1024; 00818 00819 result = -1; 00820 while (1) 00821 { 00822 buf = dbus_malloc (buflen); 00823 if (buf == NULL) 00824 { 00825 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL); 00826 return FALSE; 00827 } 00828 00829 g = NULL; 00830 #ifdef HAVE_POSIX_GETPWNAM_R 00831 if (group_c_str) 00832 result = getgrnam_r (group_c_str, &g_str, buf, buflen, 00833 &g); 00834 else 00835 result = getgrgid_r (gid, &g_str, buf, buflen, 00836 &g); 00837 #else 00838 g = getgrnam_r (group_c_str, &g_str, buf, buflen); 00839 result = 0; 00840 #endif /* !HAVE_POSIX_GETPWNAM_R */ 00841 /* Try a bigger buffer if ERANGE was returned: 00842 https://bugs.freedesktop.org/show_bug.cgi?id=16727 00843 */ 00844 if (result == ERANGE && buflen < 512 * 1024) 00845 { 00846 dbus_free (buf); 00847 buflen *= 2; 00848 } 00849 else 00850 { 00851 break; 00852 } 00853 } 00854 00855 if (result == 0 && g == &g_str) 00856 { 00857 b = fill_user_info_from_group (g, info, error); 00858 dbus_free (buf); 00859 return b; 00860 } 00861 else 00862 { 00863 dbus_set_error (error, _dbus_error_from_errno (errno), 00864 "Group %s unknown or failed to look it up\n", 00865 group_c_str ? group_c_str : "???"); 00866 dbus_free (buf); 00867 return FALSE; 00868 } 00869 } 00870 #else /* ! HAVE_GETPWNAM_R */ 00871 { 00872 /* I guess we're screwed on thread safety here */ 00873 struct group *g; 00874 00875 g = getgrnam (group_c_str); 00876 00877 if (g != NULL) 00878 { 00879 return fill_user_info_from_group (g, info, error); 00880 } 00881 else 00882 { 00883 dbus_set_error (error, _dbus_error_from_errno (errno), 00884 "Group %s unknown or failed to look it up\n", 00885 group_c_str ? group_c_str : "???"); 00886 return FALSE; 00887 } 00888 } 00889 #endif /* ! HAVE_GETPWNAM_R */ 00890 } 00891 00901 dbus_bool_t 00902 _dbus_group_info_fill (DBusGroupInfo *info, 00903 const DBusString *groupname, 00904 DBusError *error) 00905 { 00906 return fill_group_info (info, DBUS_GID_UNSET, 00907 groupname, error); 00908 00909 } 00910 00920 dbus_bool_t 00921 _dbus_group_info_fill_gid (DBusGroupInfo *info, 00922 dbus_gid_t gid, 00923 DBusError *error) 00924 { 00925 return fill_group_info (info, gid, NULL, error); 00926 } 00927 00936 dbus_bool_t 00937 _dbus_parse_unix_user_from_config (const DBusString *username, 00938 dbus_uid_t *uid_p) 00939 { 00940 return _dbus_get_user_id (username, uid_p); 00941 00942 } 00943 00952 dbus_bool_t 00953 _dbus_parse_unix_group_from_config (const DBusString *groupname, 00954 dbus_gid_t *gid_p) 00955 { 00956 return _dbus_get_group_id (groupname, gid_p); 00957 } 00958 00969 dbus_bool_t 00970 _dbus_unix_groups_from_uid (dbus_uid_t uid, 00971 dbus_gid_t **group_ids, 00972 int *n_group_ids) 00973 { 00974 return _dbus_groups_from_uid (uid, group_ids, n_group_ids); 00975 } 00976 00986 dbus_bool_t 00987 _dbus_unix_user_is_at_console (dbus_uid_t uid, 00988 DBusError *error) 00989 { 00990 return _dbus_is_console_user (uid, error); 00991 00992 } 00993 01001 dbus_bool_t 01002 _dbus_unix_user_is_process_owner (dbus_uid_t uid) 01003 { 01004 return uid == _dbus_geteuid (); 01005 } 01006 01014 dbus_bool_t 01015 _dbus_windows_user_is_process_owner (const char *windows_sid) 01016 { 01017 return FALSE; 01018 } 01019 /* End of DBusInternalsUtils functions */ 01021 01033 dbus_bool_t 01034 _dbus_string_get_dirname (const DBusString *filename, 01035 DBusString *dirname) 01036 { 01037 int sep; 01038 01039 _dbus_assert (filename != dirname); 01040 _dbus_assert (filename != NULL); 01041 _dbus_assert (dirname != NULL); 01042 01043 /* Ignore any separators on the end */ 01044 sep = _dbus_string_get_length (filename); 01045 if (sep == 0) 01046 return _dbus_string_append (dirname, "."); /* empty string passed in */ 01047 01048 while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/') 01049 --sep; 01050 01051 _dbus_assert (sep >= 0); 01052 01053 if (sep == 0) 01054 return _dbus_string_append (dirname, "/"); 01055 01056 /* Now find the previous separator */ 01057 _dbus_string_find_byte_backward (filename, sep, '/', &sep); 01058 if (sep < 0) 01059 return _dbus_string_append (dirname, "."); 01060 01061 /* skip multiple separators */ 01062 while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/') 01063 --sep; 01064 01065 _dbus_assert (sep >= 0); 01066 01067 if (sep == 0 && 01068 _dbus_string_get_byte (filename, 0) == '/') 01069 return _dbus_string_append (dirname, "/"); 01070 else 01071 return _dbus_string_copy_len (filename, 0, sep - 0, 01072 dirname, _dbus_string_get_length (dirname)); 01073 } /* DBusString stuff */ 01075 01076 static void 01077 string_squash_nonprintable (DBusString *str) 01078 { 01079 char *buf; 01080 int i, len; 01081 01082 buf = _dbus_string_get_data (str); 01083 len = _dbus_string_get_length (str); 01084 01085 for (i = 0; i < len; i++) 01086 { 01087 unsigned char c = (unsigned char) buf[i]; 01088 if (c == '\0') 01089 c = ' '; 01090 else if (c < 0x20 || c > 127) 01091 c = '?'; 01092 } 01093 } 01094 01109 dbus_bool_t 01110 _dbus_command_for_pid (unsigned long pid, 01111 DBusString *str, 01112 int max_len, 01113 DBusError *error) 01114 { 01115 /* This is all Linux-specific for now */ 01116 DBusString path; 01117 DBusString cmdline; 01118 int fd; 01119 01120 if (!_dbus_string_init (&path)) 01121 { 01122 _DBUS_SET_OOM (error); 01123 return FALSE; 01124 } 01125 01126 if (!_dbus_string_init (&cmdline)) 01127 { 01128 _DBUS_SET_OOM (error); 01129 _dbus_string_free (&path); 01130 return FALSE; 01131 } 01132 01133 if (!_dbus_string_append_printf (&path, "/proc/%ld/cmdline", pid)) 01134 goto oom; 01135 01136 fd = open (_dbus_string_get_const_data (&path), O_RDONLY); 01137 if (fd < 0) 01138 { 01139 dbus_set_error (error, 01140 _dbus_error_from_errno (errno), 01141 "Failed to open \"%s\": %s", 01142 _dbus_string_get_const_data (&path), 01143 _dbus_strerror (errno)); 01144 goto fail; 01145 } 01146 01147 if (!_dbus_read (fd, &cmdline, max_len)) 01148 { 01149 dbus_set_error (error, 01150 _dbus_error_from_errno (errno), 01151 "Failed to read from \"%s\": %s", 01152 _dbus_string_get_const_data (&path), 01153 _dbus_strerror (errno)); 01154 goto fail; 01155 } 01156 01157 if (!_dbus_close (fd, error)) 01158 goto fail; 01159 01160 string_squash_nonprintable (&cmdline); 01161 01162 if (!_dbus_string_copy (&cmdline, 0, str, _dbus_string_get_length (str))) 01163 goto oom; 01164 01165 _dbus_string_free (&cmdline); 01166 _dbus_string_free (&path); 01167 return TRUE; 01168 oom: 01169 _DBUS_SET_OOM (error); 01170 fail: 01171 _dbus_string_free (&cmdline); 01172 _dbus_string_free (&path); 01173 return FALSE; 01174 } 01175