os/ossrv/ofdbus/dbus/bus/bus.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/* -*- mode: C; c-file-style: "gnu" -*- */
sl@0
     2
/* bus.c  message bus context object
sl@0
     3
 *
sl@0
     4
 * Copyright (C) 2003, 2004 Red Hat, Inc.
sl@0
     5
 * Portion Copyright © 2008 Nokia Corporation and/or its subsidiary(-ies). All rights reserved.
sl@0
     6
 * Licensed under the Academic Free License version 2.1
sl@0
     7
 * 
sl@0
     8
 * This program is free software; you can redistribute it and/or modify
sl@0
     9
 * it under the terms of the GNU General Public License as published by
sl@0
    10
 * the Free Software Foundation; either version 2 of the License, or
sl@0
    11
 * (at your option) any later version.
sl@0
    12
 *
sl@0
    13
 * This program is distributed in the hope that it will be useful,
sl@0
    14
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
sl@0
    15
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
sl@0
    16
 * GNU General Public License for more details.
sl@0
    17
 * 
sl@0
    18
 * You should have received a copy of the GNU General Public License
sl@0
    19
 * along with this program; if not, write to the Free Software
sl@0
    20
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
sl@0
    21
 *
sl@0
    22
 */
sl@0
    23
sl@0
    24
#include "bus.h"
sl@0
    25
#include "activation.h"
sl@0
    26
#include "connection.h"
sl@0
    27
#include "services.h"
sl@0
    28
#include "utils.h"
sl@0
    29
#include "policy.h"
sl@0
    30
#include "config-parser.h"
sl@0
    31
#include "signals.h"
sl@0
    32
#include "selinux.h"
sl@0
    33
#include "dir-watch.h"
sl@0
    34
#ifndef __SYMBIAN32__
sl@0
    35
#include <dbus/dbus-list.h>
sl@0
    36
#include <dbus/dbus-hash.h>
sl@0
    37
#include <dbus/dbus-internals.h>
sl@0
    38
#else
sl@0
    39
#include "dbus-list.h"
sl@0
    40
#include "dbus-hash.h"
sl@0
    41
#include "dbus-internals.h"
sl@0
    42
#endif
sl@0
    43
sl@0
    44
struct BusContext
sl@0
    45
{
sl@0
    46
  int refcount;
sl@0
    47
  char *config_file;
sl@0
    48
  char *type;
sl@0
    49
  char *address;
sl@0
    50
  char *pidfile;
sl@0
    51
  char *user;
sl@0
    52
  DBusLoop *loop;
sl@0
    53
  DBusList *servers;
sl@0
    54
  BusConnections *connections;
sl@0
    55
  BusActivation *activation;
sl@0
    56
  BusRegistry *registry;
sl@0
    57
  BusPolicy *policy;
sl@0
    58
  BusMatchmaker *matchmaker;
sl@0
    59
  DBusUserDatabase *user_database;
sl@0
    60
  BusLimits limits;
sl@0
    61
  unsigned int fork : 1;
sl@0
    62
};
sl@0
    63
sl@0
    64
static dbus_int32_t server_data_slot = -1;
sl@0
    65
sl@0
    66
typedef struct
sl@0
    67
{
sl@0
    68
  BusContext *context;
sl@0
    69
} BusServerData;
sl@0
    70
sl@0
    71
#define BUS_SERVER_DATA(server) (dbus_server_get_data ((server), server_data_slot))
sl@0
    72
sl@0
    73
static BusContext*
sl@0
    74
server_get_context (DBusServer *server)
sl@0
    75
{
sl@0
    76
  BusContext *context;
sl@0
    77
  BusServerData *bd;
sl@0
    78
  
sl@0
    79
  if (!dbus_server_allocate_data_slot (&server_data_slot))
sl@0
    80
    return NULL;
sl@0
    81
sl@0
    82
  bd = BUS_SERVER_DATA (server);
sl@0
    83
  if (bd == NULL)
sl@0
    84
    {
sl@0
    85
      dbus_server_free_data_slot (&server_data_slot);
sl@0
    86
      return NULL;
sl@0
    87
    }
sl@0
    88
sl@0
    89
  context = bd->context;
sl@0
    90
sl@0
    91
  dbus_server_free_data_slot (&server_data_slot);
sl@0
    92
sl@0
    93
  return context;
sl@0
    94
}
sl@0
    95
sl@0
    96
static dbus_bool_t
sl@0
    97
server_watch_callback (DBusWatch     *watch,
sl@0
    98
                       unsigned int   condition,
sl@0
    99
                       void          *data)
sl@0
   100
{
sl@0
   101
  /* FIXME this can be done in dbus-mainloop.c
sl@0
   102
   * if the code in activation.c for the babysitter
sl@0
   103
   * watch handler is fixed.
sl@0
   104
   */
sl@0
   105
  
sl@0
   106
  return dbus_watch_handle (watch, condition);
sl@0
   107
}
sl@0
   108
sl@0
   109
static dbus_bool_t
sl@0
   110
add_server_watch (DBusWatch  *watch,
sl@0
   111
                  void       *data)
sl@0
   112
{
sl@0
   113
  DBusServer *server = data;
sl@0
   114
  BusContext *context;
sl@0
   115
  
sl@0
   116
  context = server_get_context (server);
sl@0
   117
  
sl@0
   118
  return _dbus_loop_add_watch (context->loop,
sl@0
   119
                               watch, server_watch_callback, server,
sl@0
   120
                               NULL);
sl@0
   121
}
sl@0
   122
sl@0
   123
static void
sl@0
   124
remove_server_watch (DBusWatch  *watch,
sl@0
   125
                     void       *data)
sl@0
   126
{
sl@0
   127
  DBusServer *server = data;
sl@0
   128
  BusContext *context;
sl@0
   129
  
sl@0
   130
  context = server_get_context (server);
sl@0
   131
  
sl@0
   132
  _dbus_loop_remove_watch (context->loop,
sl@0
   133
                           watch, server_watch_callback, server);
sl@0
   134
}
sl@0
   135
sl@0
   136
sl@0
   137
static void
sl@0
   138
server_timeout_callback (DBusTimeout   *timeout,
sl@0
   139
                         void          *data)
sl@0
   140
{
sl@0
   141
  /* can return FALSE on OOM but we just let it fire again later */
sl@0
   142
  dbus_timeout_handle (timeout);
sl@0
   143
}
sl@0
   144
sl@0
   145
static dbus_bool_t
sl@0
   146
add_server_timeout (DBusTimeout *timeout,
sl@0
   147
                    void        *data)
sl@0
   148
{
sl@0
   149
  DBusServer *server = data;
sl@0
   150
  BusContext *context;
sl@0
   151
  
sl@0
   152
  context = server_get_context (server);
sl@0
   153
sl@0
   154
  return _dbus_loop_add_timeout (context->loop,
sl@0
   155
                                 timeout, server_timeout_callback, server, NULL);
sl@0
   156
}
sl@0
   157
sl@0
   158
static void
sl@0
   159
remove_server_timeout (DBusTimeout *timeout,
sl@0
   160
                       void        *data)
sl@0
   161
{
sl@0
   162
  DBusServer *server = data;
sl@0
   163
  BusContext *context;
sl@0
   164
  
sl@0
   165
  context = server_get_context (server);
sl@0
   166
  
sl@0
   167
  _dbus_loop_remove_timeout (context->loop,
sl@0
   168
                             timeout, server_timeout_callback, server);
sl@0
   169
}
sl@0
   170
sl@0
   171
static void
sl@0
   172
new_connection_callback (DBusServer     *server,
sl@0
   173
                         DBusConnection *new_connection,
sl@0
   174
                         void           *data)
sl@0
   175
{
sl@0
   176
  BusContext *context = data;
sl@0
   177
  
sl@0
   178
  if (!bus_connections_setup_connection (context->connections, new_connection))
sl@0
   179
    {
sl@0
   180
      _dbus_verbose ("No memory to setup new connection\n");
sl@0
   181
sl@0
   182
      /* if we don't do this, it will get unref'd without
sl@0
   183
       * being disconnected... kind of strange really
sl@0
   184
       * that we have to do this, people won't get it right
sl@0
   185
       * in general.
sl@0
   186
       */
sl@0
   187
      dbus_connection_close (new_connection);
sl@0
   188
    }
sl@0
   189
sl@0
   190
  dbus_connection_set_max_received_size (new_connection,
sl@0
   191
                                         context->limits.max_incoming_bytes);
sl@0
   192
sl@0
   193
  dbus_connection_set_max_message_size (new_connection,
sl@0
   194
                                        context->limits.max_message_size);
sl@0
   195
  
sl@0
   196
  /* on OOM, we won't have ref'd the connection so it will die. */
sl@0
   197
}
sl@0
   198
sl@0
   199
static void
sl@0
   200
free_server_data (void *data)
sl@0
   201
{
sl@0
   202
  BusServerData *bd = data;  
sl@0
   203
  
sl@0
   204
  dbus_free (bd);
sl@0
   205
}
sl@0
   206
sl@0
   207
static dbus_bool_t
sl@0
   208
setup_server (BusContext *context,
sl@0
   209
              DBusServer *server,
sl@0
   210
              char      **auth_mechanisms,
sl@0
   211
              DBusError  *error)
sl@0
   212
{
sl@0
   213
  BusServerData *bd;
sl@0
   214
sl@0
   215
  bd = dbus_new0 (BusServerData, 1);
sl@0
   216
  if (!dbus_server_set_data (server,
sl@0
   217
                             server_data_slot,
sl@0
   218
                             bd, free_server_data))
sl@0
   219
    {
sl@0
   220
      dbus_free (bd);
sl@0
   221
      BUS_SET_OOM (error);
sl@0
   222
      return FALSE;
sl@0
   223
    }
sl@0
   224
sl@0
   225
  bd->context = context;
sl@0
   226
  
sl@0
   227
  if (!dbus_server_set_auth_mechanisms (server, (const char**) auth_mechanisms))
sl@0
   228
    {
sl@0
   229
      BUS_SET_OOM (error);
sl@0
   230
      return FALSE;
sl@0
   231
    }
sl@0
   232
  
sl@0
   233
  dbus_server_set_new_connection_function (server,
sl@0
   234
                                           new_connection_callback,
sl@0
   235
                                           context, NULL);
sl@0
   236
  
sl@0
   237
  if (!dbus_server_set_watch_functions (server,
sl@0
   238
                                        add_server_watch,
sl@0
   239
                                        remove_server_watch,
sl@0
   240
                                        NULL,
sl@0
   241
                                        server,
sl@0
   242
                                        NULL))
sl@0
   243
    {
sl@0
   244
      BUS_SET_OOM (error);
sl@0
   245
      return FALSE;
sl@0
   246
    }
sl@0
   247
sl@0
   248
  if (!dbus_server_set_timeout_functions (server,
sl@0
   249
                                          add_server_timeout,
sl@0
   250
                                          remove_server_timeout,
sl@0
   251
                                          NULL,
sl@0
   252
                                          server, NULL))
sl@0
   253
    {
sl@0
   254
      BUS_SET_OOM (error);
sl@0
   255
      return FALSE;
sl@0
   256
    }
sl@0
   257
  
sl@0
   258
  return TRUE;
sl@0
   259
}
sl@0
   260
sl@0
   261
/* This code only gets executed the first time the
sl@0
   262
   config files are parsed.  It is not executed
sl@0
   263
   when config files are reloaded.*/
sl@0
   264
static dbus_bool_t
sl@0
   265
process_config_first_time_only (BusContext      *context,
sl@0
   266
				BusConfigParser *parser,
sl@0
   267
				DBusError       *error)
sl@0
   268
{
sl@0
   269
  DBusList *link;
sl@0
   270
  DBusList **addresses;
sl@0
   271
  const char *user, *pidfile;
sl@0
   272
  char **auth_mechanisms;
sl@0
   273
  DBusList **auth_mechanisms_list;
sl@0
   274
  int len;
sl@0
   275
  dbus_bool_t retval;
sl@0
   276
sl@0
   277
  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
sl@0
   278
sl@0
   279
  retval = FALSE;
sl@0
   280
  auth_mechanisms = NULL;
sl@0
   281
sl@0
   282
  /* Check for an existing pid file. Of course this is a race;
sl@0
   283
   * we'd have to use fcntl() locks on the pid file to
sl@0
   284
   * avoid that. But we want to check for the pid file
sl@0
   285
   * before overwriting any existing sockets, etc.
sl@0
   286
   */
sl@0
   287
  pidfile = bus_config_parser_get_pidfile (parser);
sl@0
   288
  if (pidfile != NULL)
sl@0
   289
    {
sl@0
   290
      DBusString u;
sl@0
   291
      DBusStat stbuf;
sl@0
   292
      
sl@0
   293
      _dbus_string_init_const (&u, pidfile);
sl@0
   294
      
sl@0
   295
      if (_dbus_stat (&u, &stbuf, NULL))
sl@0
   296
	{
sl@0
   297
	  dbus_set_error (error, DBUS_ERROR_FAILED,
sl@0
   298
			  "The pid file \"%s\" exists, if the message bus is not running, remove this file",
sl@0
   299
			  pidfile);
sl@0
   300
	  goto failed;
sl@0
   301
	}
sl@0
   302
    }
sl@0
   303
  
sl@0
   304
  /* keep around the pid filename so we can delete it later */
sl@0
   305
  context->pidfile = _dbus_strdup (pidfile);
sl@0
   306
sl@0
   307
  /* Build an array of auth mechanisms */
sl@0
   308
  
sl@0
   309
  auth_mechanisms_list = bus_config_parser_get_mechanisms (parser);
sl@0
   310
  len = _dbus_list_get_length (auth_mechanisms_list);
sl@0
   311
sl@0
   312
  if (len > 0)
sl@0
   313
    {
sl@0
   314
      int i;
sl@0
   315
sl@0
   316
      auth_mechanisms = dbus_new0 (char*, len + 1);
sl@0
   317
      if (auth_mechanisms == NULL)
sl@0
   318
	{
sl@0
   319
	  BUS_SET_OOM (error);
sl@0
   320
	  goto failed;
sl@0
   321
	}
sl@0
   322
      
sl@0
   323
      i = 0;
sl@0
   324
      link = _dbus_list_get_first_link (auth_mechanisms_list);
sl@0
   325
      while (link != NULL)
sl@0
   326
        {
sl@0
   327
          auth_mechanisms[i] = _dbus_strdup (link->data);
sl@0
   328
          if (auth_mechanisms[i] == NULL)
sl@0
   329
	    {
sl@0
   330
	      BUS_SET_OOM (error);
sl@0
   331
	      goto failed;
sl@0
   332
	    }
sl@0
   333
          link = _dbus_list_get_next_link (auth_mechanisms_list, link);
sl@0
   334
        }
sl@0
   335
    }
sl@0
   336
  else
sl@0
   337
    {
sl@0
   338
      auth_mechanisms = NULL;
sl@0
   339
    }
sl@0
   340
sl@0
   341
  /* Listen on our addresses */
sl@0
   342
  
sl@0
   343
  addresses = bus_config_parser_get_addresses (parser);  
sl@0
   344
  
sl@0
   345
  link = _dbus_list_get_first_link (addresses);
sl@0
   346
  while (link != NULL)
sl@0
   347
    {
sl@0
   348
      DBusServer *server;
sl@0
   349
      
sl@0
   350
      server = dbus_server_listen (link->data, error);
sl@0
   351
      if (server == NULL)
sl@0
   352
	{
sl@0
   353
	  _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   354
	  goto failed;
sl@0
   355
	}
sl@0
   356
      else if (!setup_server (context, server, auth_mechanisms, error))
sl@0
   357
	{
sl@0
   358
	  _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   359
	  goto failed;
sl@0
   360
	}
sl@0
   361
sl@0
   362
      if (!_dbus_list_append (&context->servers, server))
sl@0
   363
        {
sl@0
   364
          BUS_SET_OOM (error);
sl@0
   365
          goto failed;
sl@0
   366
        }          
sl@0
   367
      
sl@0
   368
      link = _dbus_list_get_next_link (addresses, link);
sl@0
   369
    }
sl@0
   370
sl@0
   371
  /* note that type may be NULL */
sl@0
   372
  context->type = _dbus_strdup (bus_config_parser_get_type (parser));
sl@0
   373
  if (bus_config_parser_get_type (parser) != NULL && context->type == NULL)
sl@0
   374
    {
sl@0
   375
      BUS_SET_OOM (error);
sl@0
   376
      goto failed;
sl@0
   377
    }
sl@0
   378
sl@0
   379
  user = bus_config_parser_get_user (parser);
sl@0
   380
  if (user != NULL)
sl@0
   381
    {
sl@0
   382
      context->user = _dbus_strdup (user);
sl@0
   383
      if (context->user == NULL)
sl@0
   384
	{
sl@0
   385
	  BUS_SET_OOM (error);
sl@0
   386
	  goto failed;
sl@0
   387
	}
sl@0
   388
    }
sl@0
   389
sl@0
   390
  context->fork = bus_config_parser_get_fork (parser);
sl@0
   391
  
sl@0
   392
  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
sl@0
   393
  retval = TRUE;
sl@0
   394
sl@0
   395
 failed:
sl@0
   396
  dbus_free_string_array (auth_mechanisms);
sl@0
   397
  return retval;
sl@0
   398
}
sl@0
   399
sl@0
   400
/* This code gets executed every time the config files
sl@0
   401
   are parsed: both during BusContext construction
sl@0
   402
   and on reloads. */
sl@0
   403
static dbus_bool_t
sl@0
   404
process_config_every_time (BusContext      *context,
sl@0
   405
			   BusConfigParser *parser,
sl@0
   406
			   dbus_bool_t      is_reload,
sl@0
   407
			   DBusError       *error)
sl@0
   408
{
sl@0
   409
  DBusString full_address;
sl@0
   410
  DBusList *link;
sl@0
   411
  char *addr;
sl@0
   412
sl@0
   413
  dbus_bool_t retval;
sl@0
   414
sl@0
   415
  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
sl@0
   416
sl@0
   417
  addr = NULL;
sl@0
   418
  retval = FALSE;
sl@0
   419
sl@0
   420
  if (!_dbus_string_init (&full_address))
sl@0
   421
    {
sl@0
   422
      BUS_SET_OOM (error);
sl@0
   423
      return FALSE;
sl@0
   424
    }
sl@0
   425
sl@0
   426
  /* get our limits and timeout lengths */
sl@0
   427
  bus_config_parser_get_limits (parser, &context->limits);
sl@0
   428
sl@0
   429
  context->policy = bus_config_parser_steal_policy (parser);
sl@0
   430
  _dbus_assert (context->policy != NULL);
sl@0
   431
sl@0
   432
  /* We have to build the address backward, so that
sl@0
   433
   * <listen> later in the config file have priority
sl@0
   434
   */
sl@0
   435
  link = _dbus_list_get_last_link (&context->servers);
sl@0
   436
  while (link != NULL)
sl@0
   437
    {
sl@0
   438
      addr = dbus_server_get_address (link->data);
sl@0
   439
      if (addr == NULL)
sl@0
   440
        {
sl@0
   441
          BUS_SET_OOM (error);
sl@0
   442
          goto failed;
sl@0
   443
        }
sl@0
   444
sl@0
   445
      if (_dbus_string_get_length (&full_address) > 0)
sl@0
   446
        {
sl@0
   447
          if (!_dbus_string_append (&full_address, ";"))
sl@0
   448
            {
sl@0
   449
              BUS_SET_OOM (error);
sl@0
   450
              goto failed;
sl@0
   451
            }
sl@0
   452
        }
sl@0
   453
sl@0
   454
      if (!_dbus_string_append (&full_address, addr))
sl@0
   455
        {
sl@0
   456
          BUS_SET_OOM (error);
sl@0
   457
          goto failed;
sl@0
   458
        }
sl@0
   459
sl@0
   460
      dbus_free (addr);
sl@0
   461
      addr = NULL;
sl@0
   462
sl@0
   463
      link = _dbus_list_get_prev_link (&context->servers, link);
sl@0
   464
    }
sl@0
   465
sl@0
   466
  if (is_reload)
sl@0
   467
    dbus_free (context->address);
sl@0
   468
sl@0
   469
  if (!_dbus_string_copy_data (&full_address, &context->address))
sl@0
   470
    {
sl@0
   471
      BUS_SET_OOM (error);
sl@0
   472
      goto failed;
sl@0
   473
    }
sl@0
   474
sl@0
   475
  /* Create activation subsystem */
sl@0
   476
  
sl@0
   477
  if (is_reload)
sl@0
   478
    bus_activation_unref (context->activation);
sl@0
   479
  
sl@0
   480
  context->activation = bus_activation_new (context, &full_address,
sl@0
   481
                                            bus_config_parser_get_service_dirs (parser),
sl@0
   482
                                            error);
sl@0
   483
  if (context->activation == NULL)
sl@0
   484
    {
sl@0
   485
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   486
      goto failed;
sl@0
   487
    }
sl@0
   488
sl@0
   489
  /* Drop existing conf-dir watches (if applicable) */
sl@0
   490
sl@0
   491
  if (is_reload)
sl@0
   492
    bus_drop_all_directory_watches ();
sl@0
   493
sl@0
   494
  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
sl@0
   495
  retval = TRUE;
sl@0
   496
sl@0
   497
 failed:
sl@0
   498
  _dbus_string_free (&full_address);
sl@0
   499
  
sl@0
   500
  if (addr)
sl@0
   501
    dbus_free (addr);
sl@0
   502
sl@0
   503
  return retval;
sl@0
   504
}
sl@0
   505
sl@0
   506
static dbus_bool_t
sl@0
   507
process_config_postinit (BusContext      *context,
sl@0
   508
			 BusConfigParser *parser,
sl@0
   509
			 DBusError       *error)
sl@0
   510
{
sl@0
   511
  DBusHashTable *service_context_table;
sl@0
   512
sl@0
   513
  service_context_table = bus_config_parser_steal_service_context_table (parser);
sl@0
   514
  if (!bus_registry_set_service_context_table (context->registry,
sl@0
   515
					       service_context_table))
sl@0
   516
    {
sl@0
   517
      BUS_SET_OOM (error);
sl@0
   518
      return FALSE;
sl@0
   519
    }
sl@0
   520
sl@0
   521
  _dbus_hash_table_unref (service_context_table);
sl@0
   522
sl@0
   523
  /* Watch all conf directories */
sl@0
   524
  _dbus_list_foreach (bus_config_parser_get_conf_dirs (parser),
sl@0
   525
		      (DBusForeachFunction) bus_watch_directory,
sl@0
   526
		      context);
sl@0
   527
sl@0
   528
  return TRUE;
sl@0
   529
}
sl@0
   530
sl@0
   531
BusContext*
sl@0
   532
bus_context_new (const DBusString *config_file,
sl@0
   533
                 ForceForkSetting  force_fork,
sl@0
   534
                 int               print_addr_fd,
sl@0
   535
                 int               print_pid_fd,
sl@0
   536
                 DBusError        *error)
sl@0
   537
{
sl@0
   538
  BusContext *context;
sl@0
   539
  BusConfigParser *parser;
sl@0
   540
  DBusCredentials creds;
sl@0
   541
sl@0
   542
  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
sl@0
   543
sl@0
   544
  context = NULL;
sl@0
   545
  parser = NULL;
sl@0
   546
sl@0
   547
  if (!dbus_server_allocate_data_slot (&server_data_slot))
sl@0
   548
    {
sl@0
   549
      BUS_SET_OOM (error);
sl@0
   550
      return NULL;
sl@0
   551
    }
sl@0
   552
sl@0
   553
  context = dbus_new0 (BusContext, 1);
sl@0
   554
  if (context == NULL)
sl@0
   555
    {
sl@0
   556
      BUS_SET_OOM (error);
sl@0
   557
      goto failed;
sl@0
   558
    }
sl@0
   559
  context->refcount = 1;
sl@0
   560
sl@0
   561
  if (!_dbus_string_copy_data (config_file, &context->config_file))
sl@0
   562
    {
sl@0
   563
      BUS_SET_OOM (error);
sl@0
   564
      goto failed;
sl@0
   565
    }
sl@0
   566
sl@0
   567
  context->loop = _dbus_loop_new ();
sl@0
   568
  if (context->loop == NULL)
sl@0
   569
    {
sl@0
   570
      BUS_SET_OOM (error);
sl@0
   571
      goto failed;
sl@0
   572
    }
sl@0
   573
sl@0
   574
  context->registry = bus_registry_new (context);
sl@0
   575
  if (context->registry == NULL)
sl@0
   576
    {
sl@0
   577
      BUS_SET_OOM (error);
sl@0
   578
      goto failed;
sl@0
   579
    }
sl@0
   580
sl@0
   581
  parser = bus_config_load (config_file, TRUE, NULL, error);
sl@0
   582
  if (parser == NULL)
sl@0
   583
    {
sl@0
   584
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   585
      goto failed;
sl@0
   586
    }
sl@0
   587
  
sl@0
   588
  if (!process_config_first_time_only (context, parser, error))
sl@0
   589
    {
sl@0
   590
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   591
      goto failed;
sl@0
   592
    }
sl@0
   593
  if (!process_config_every_time (context, parser, FALSE, error))
sl@0
   594
    {
sl@0
   595
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   596
      goto failed;
sl@0
   597
    }
sl@0
   598
  
sl@0
   599
  /* we need another ref of the server data slot for the context
sl@0
   600
   * to own
sl@0
   601
   */
sl@0
   602
  if (!dbus_server_allocate_data_slot (&server_data_slot))
sl@0
   603
    _dbus_assert_not_reached ("second ref of server data slot failed");
sl@0
   604
sl@0
   605
  context->user_database = _dbus_user_database_new ();
sl@0
   606
  if (context->user_database == NULL)
sl@0
   607
    {
sl@0
   608
      BUS_SET_OOM (error);
sl@0
   609
      goto failed;
sl@0
   610
    }
sl@0
   611
  
sl@0
   612
  /* Note that we don't know whether the print_addr_fd is
sl@0
   613
   * one of the sockets we're using to listen on, or some
sl@0
   614
   * other random thing. But I think the answer is "don't do
sl@0
   615
   * that then"
sl@0
   616
   */
sl@0
   617
  if (print_addr_fd >= 0)
sl@0
   618
    {
sl@0
   619
      DBusString addr;
sl@0
   620
      const char *a = bus_context_get_address (context);
sl@0
   621
      int bytes;
sl@0
   622
      
sl@0
   623
      _dbus_assert (a != NULL);
sl@0
   624
      if (!_dbus_string_init (&addr))
sl@0
   625
        {
sl@0
   626
          BUS_SET_OOM (error);
sl@0
   627
          goto failed;
sl@0
   628
        }
sl@0
   629
        
sl@0
   630
                
sl@0
   631
        
sl@0
   632
        #ifndef __SYMBIAN32__
sl@0
   633
         if (!_dbus_string_append (&addr, a) ||
sl@0
   634
          !_dbus_string_append (&addr, "\n")) 
sl@0
   635
      #else
sl@0
   636
      if (!_dbus_string_append (&addr, a) )
sl@0
   637
    
sl@0
   638
       #endif 
sl@0
   639
        {
sl@0
   640
          _dbus_string_free (&addr);
sl@0
   641
          BUS_SET_OOM (error);
sl@0
   642
          goto failed;
sl@0
   643
        }
sl@0
   644
		
sl@0
   645
		
sl@0
   646
      bytes = _dbus_string_get_length (&addr);
sl@0
   647
      if (_dbus_write_socket (print_addr_fd, &addr, 0, bytes) != bytes)
sl@0
   648
        {
sl@0
   649
          dbus_set_error (error, DBUS_ERROR_FAILED,
sl@0
   650
                          "Printing message bus address: %s\n",
sl@0
   651
                          _dbus_strerror (errno));
sl@0
   652
          _dbus_string_free (&addr);
sl@0
   653
          goto failed;
sl@0
   654
        }
sl@0
   655
sl@0
   656
      if (print_addr_fd > 2)
sl@0
   657
        _dbus_close_socket (print_addr_fd, NULL);
sl@0
   658
sl@0
   659
      _dbus_string_free (&addr);
sl@0
   660
    }
sl@0
   661
  
sl@0
   662
  context->connections = bus_connections_new (context);
sl@0
   663
  if (context->connections == NULL)
sl@0
   664
    {
sl@0
   665
      BUS_SET_OOM (error);
sl@0
   666
      goto failed;
sl@0
   667
    }
sl@0
   668
sl@0
   669
  context->matchmaker = bus_matchmaker_new ();
sl@0
   670
  if (context->matchmaker == NULL)
sl@0
   671
    {
sl@0
   672
      BUS_SET_OOM (error);
sl@0
   673
      goto failed;
sl@0
   674
    }
sl@0
   675
sl@0
   676
  /* check user before we fork */
sl@0
   677
  if (context->user != NULL)
sl@0
   678
    {
sl@0
   679
      DBusString u;
sl@0
   680
sl@0
   681
      _dbus_string_init_const (&u, context->user);
sl@0
   682
sl@0
   683
      if (!_dbus_credentials_from_username (&u, &creds) ||
sl@0
   684
          creds.uid < 0 ||
sl@0
   685
          creds.gid < 0)
sl@0
   686
        {
sl@0
   687
          dbus_set_error (error, DBUS_ERROR_FAILED,
sl@0
   688
                          "Could not get UID and GID for username \"%s\"",
sl@0
   689
                          context->user);
sl@0
   690
          goto failed;
sl@0
   691
        }
sl@0
   692
    }
sl@0
   693
sl@0
   694
  /* Now become a daemon if appropriate */
sl@0
   695
  if ((force_fork != FORK_NEVER && context->fork) || force_fork == FORK_ALWAYS)
sl@0
   696
    {
sl@0
   697
      DBusString u;
sl@0
   698
sl@0
   699
      if (context->pidfile)
sl@0
   700
        _dbus_string_init_const (&u, context->pidfile);
sl@0
   701
      
sl@0
   702
      if (!_dbus_become_daemon (context->pidfile ? &u : NULL, 
sl@0
   703
				print_pid_fd,
sl@0
   704
				error))
sl@0
   705
	{
sl@0
   706
	  _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   707
	  goto failed;
sl@0
   708
	}
sl@0
   709
    }
sl@0
   710
  else
sl@0
   711
    {
sl@0
   712
      /* Need to write PID file for ourselves, not for the child process */
sl@0
   713
      if (context->pidfile != NULL)
sl@0
   714
        {
sl@0
   715
          DBusString u;
sl@0
   716
sl@0
   717
          _dbus_string_init_const (&u, context->pidfile);
sl@0
   718
          
sl@0
   719
          if (!_dbus_write_pid_file (&u, _dbus_getpid (), error))
sl@0
   720
	    {
sl@0
   721
	      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   722
	      goto failed;
sl@0
   723
	    }
sl@0
   724
        }
sl@0
   725
    }
sl@0
   726
sl@0
   727
  /* Write PID if requested */
sl@0
   728
  if (print_pid_fd >= 0)
sl@0
   729
    {
sl@0
   730
      DBusString pid;
sl@0
   731
      int bytes;
sl@0
   732
sl@0
   733
      if (!_dbus_string_init (&pid))
sl@0
   734
        {
sl@0
   735
          BUS_SET_OOM (error);
sl@0
   736
          goto failed;
sl@0
   737
        }
sl@0
   738
      
sl@0
   739
      if (!_dbus_string_append_int (&pid, _dbus_getpid ()) ||
sl@0
   740
          !_dbus_string_append (&pid, "\n"))
sl@0
   741
        {
sl@0
   742
          _dbus_string_free (&pid);
sl@0
   743
          BUS_SET_OOM (error);
sl@0
   744
          goto failed;
sl@0
   745
        }
sl@0
   746
sl@0
   747
      bytes = _dbus_string_get_length (&pid);
sl@0
   748
      if (_dbus_write_socket (print_pid_fd, &pid, 0, bytes) != bytes)
sl@0
   749
        {
sl@0
   750
          dbus_set_error (error, DBUS_ERROR_FAILED,
sl@0
   751
                          "Printing message bus PID: %s\n",
sl@0
   752
                          _dbus_strerror (errno));
sl@0
   753
          _dbus_string_free (&pid);
sl@0
   754
          goto failed;
sl@0
   755
        }
sl@0
   756
sl@0
   757
      if (print_pid_fd > 2)
sl@0
   758
        _dbus_close_socket (print_pid_fd, NULL);
sl@0
   759
      
sl@0
   760
      _dbus_string_free (&pid);
sl@0
   761
    }
sl@0
   762
sl@0
   763
  if (!bus_selinux_full_init ())
sl@0
   764
    {
sl@0
   765
      _dbus_warn ("SELinux initialization failed\n");
sl@0
   766
    }
sl@0
   767
sl@0
   768
  if (!process_config_postinit (context, parser, error))
sl@0
   769
    {
sl@0
   770
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   771
      goto failed;
sl@0
   772
    }
sl@0
   773
sl@0
   774
  if (parser != NULL)
sl@0
   775
    {
sl@0
   776
      bus_config_parser_unref (parser);
sl@0
   777
      parser = NULL;
sl@0
   778
    }
sl@0
   779
  
sl@0
   780
  /* Here we change our credentials if required,
sl@0
   781
   * as soon as we've set up our sockets and pidfile
sl@0
   782
   */
sl@0
   783
  if (context->user != NULL)
sl@0
   784
    {
sl@0
   785
      if (!_dbus_change_identity (creds.uid, creds.gid, error))
sl@0
   786
	{
sl@0
   787
	  _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   788
	  goto failed;
sl@0
   789
	}
sl@0
   790
    }
sl@0
   791
  
sl@0
   792
  dbus_server_free_data_slot (&server_data_slot);
sl@0
   793
  
sl@0
   794
  return context;
sl@0
   795
  
sl@0
   796
 failed:  
sl@0
   797
  if (parser != NULL)
sl@0
   798
    bus_config_parser_unref (parser);
sl@0
   799
  if (context != NULL)
sl@0
   800
    bus_context_unref (context);
sl@0
   801
sl@0
   802
  if (server_data_slot >= 0)
sl@0
   803
    dbus_server_free_data_slot (&server_data_slot);
sl@0
   804
  
sl@0
   805
  return NULL;
sl@0
   806
}
sl@0
   807
sl@0
   808
dbus_bool_t
sl@0
   809
bus_context_reload_config (BusContext *context,
sl@0
   810
			   DBusError  *error)
sl@0
   811
{
sl@0
   812
  BusConfigParser *parser;
sl@0
   813
  DBusString config_file;
sl@0
   814
  dbus_bool_t ret;
sl@0
   815
sl@0
   816
  /* Flush the user database cache */
sl@0
   817
  _dbus_user_database_flush(context->user_database);
sl@0
   818
sl@0
   819
  ret = FALSE;
sl@0
   820
  _dbus_string_init_const (&config_file, context->config_file);
sl@0
   821
  parser = bus_config_load (&config_file, TRUE, NULL, error);
sl@0
   822
  if (parser == NULL)
sl@0
   823
    {
sl@0
   824
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   825
      goto failed;
sl@0
   826
    }
sl@0
   827
  
sl@0
   828
  if (!process_config_every_time (context, parser, TRUE, error))
sl@0
   829
    {
sl@0
   830
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   831
      goto failed;
sl@0
   832
    }
sl@0
   833
  if (!process_config_postinit (context, parser, error))
sl@0
   834
    {
sl@0
   835
      _DBUS_ASSERT_ERROR_IS_SET (error);
sl@0
   836
      goto failed;
sl@0
   837
    }
sl@0
   838
  ret = TRUE;
sl@0
   839
sl@0
   840
 failed:  
sl@0
   841
  if (parser != NULL)
sl@0
   842
    bus_config_parser_unref (parser);
sl@0
   843
  return ret;
sl@0
   844
}
sl@0
   845
sl@0
   846
static void
sl@0
   847
shutdown_server (BusContext *context,
sl@0
   848
                 DBusServer *server)
sl@0
   849
{
sl@0
   850
  if (server == NULL ||
sl@0
   851
      !dbus_server_get_is_connected (server))
sl@0
   852
    return;
sl@0
   853
  
sl@0
   854
  if (!dbus_server_set_watch_functions (server,
sl@0
   855
                                        NULL, NULL, NULL,
sl@0
   856
                                        context,
sl@0
   857
                                        NULL))
sl@0
   858
    _dbus_assert_not_reached ("setting watch functions to NULL failed");
sl@0
   859
  
sl@0
   860
  if (!dbus_server_set_timeout_functions (server,
sl@0
   861
                                          NULL, NULL, NULL,
sl@0
   862
                                          context,
sl@0
   863
                                          NULL))
sl@0
   864
    _dbus_assert_not_reached ("setting timeout functions to NULL failed");
sl@0
   865
  
sl@0
   866
  dbus_server_disconnect (server);
sl@0
   867
}
sl@0
   868
sl@0
   869
void
sl@0
   870
bus_context_shutdown (BusContext  *context)
sl@0
   871
{
sl@0
   872
  DBusList *link;
sl@0
   873
sl@0
   874
  link = _dbus_list_get_first_link (&context->servers);
sl@0
   875
  while (link != NULL)
sl@0
   876
    {
sl@0
   877
      shutdown_server (context, link->data);
sl@0
   878
sl@0
   879
      link = _dbus_list_get_next_link (&context->servers, link);
sl@0
   880
    }
sl@0
   881
}
sl@0
   882
sl@0
   883
BusContext *
sl@0
   884
bus_context_ref (BusContext *context)
sl@0
   885
{
sl@0
   886
  _dbus_assert (context->refcount > 0);
sl@0
   887
  context->refcount += 1;
sl@0
   888
sl@0
   889
  return context;
sl@0
   890
}
sl@0
   891
sl@0
   892
void
sl@0
   893
bus_context_unref (BusContext *context)
sl@0
   894
{
sl@0
   895
  _dbus_assert (context->refcount > 0);
sl@0
   896
  context->refcount -= 1;
sl@0
   897
sl@0
   898
  if (context->refcount == 0)
sl@0
   899
    {
sl@0
   900
      DBusList *link;
sl@0
   901
      
sl@0
   902
      _dbus_verbose ("Finalizing bus context %p\n", context);
sl@0
   903
      
sl@0
   904
      bus_context_shutdown (context);
sl@0
   905
sl@0
   906
      if (context->connections)
sl@0
   907
        {
sl@0
   908
          bus_connections_unref (context->connections);
sl@0
   909
          context->connections = NULL;
sl@0
   910
        }
sl@0
   911
      
sl@0
   912
      if (context->registry)
sl@0
   913
        {
sl@0
   914
          bus_registry_unref (context->registry);
sl@0
   915
          context->registry = NULL;
sl@0
   916
        }
sl@0
   917
      
sl@0
   918
      if (context->activation)
sl@0
   919
        {
sl@0
   920
          bus_activation_unref (context->activation);
sl@0
   921
          context->activation = NULL;
sl@0
   922
        }
sl@0
   923
sl@0
   924
      link = _dbus_list_get_first_link (&context->servers);
sl@0
   925
      while (link != NULL)
sl@0
   926
        {
sl@0
   927
          dbus_server_unref (link->data);
sl@0
   928
          
sl@0
   929
          link = _dbus_list_get_next_link (&context->servers, link);
sl@0
   930
        }
sl@0
   931
      _dbus_list_clear (&context->servers);
sl@0
   932
sl@0
   933
      if (context->policy)
sl@0
   934
        {
sl@0
   935
          bus_policy_unref (context->policy);
sl@0
   936
          context->policy = NULL;
sl@0
   937
        }
sl@0
   938
      
sl@0
   939
      if (context->loop)
sl@0
   940
        {
sl@0
   941
          _dbus_loop_unref (context->loop);
sl@0
   942
          context->loop = NULL;
sl@0
   943
        }
sl@0
   944
sl@0
   945
      if (context->matchmaker)
sl@0
   946
        {
sl@0
   947
          bus_matchmaker_unref (context->matchmaker);
sl@0
   948
          context->matchmaker = NULL;
sl@0
   949
        }
sl@0
   950
      
sl@0
   951
      dbus_free (context->config_file);
sl@0
   952
      dbus_free (context->type);
sl@0
   953
      dbus_free (context->address);
sl@0
   954
      dbus_free (context->user);
sl@0
   955
sl@0
   956
      if (context->pidfile)
sl@0
   957
	{
sl@0
   958
          DBusString u;
sl@0
   959
          _dbus_string_init_const (&u, context->pidfile);
sl@0
   960
sl@0
   961
          /* Deliberately ignore errors here, since there's not much
sl@0
   962
	   * we can do about it, and we're exiting anyways.
sl@0
   963
	   */
sl@0
   964
	  _dbus_delete_file (&u, NULL);
sl@0
   965
sl@0
   966
          dbus_free (context->pidfile); 
sl@0
   967
	}
sl@0
   968
sl@0
   969
      if (context->user_database != NULL)
sl@0
   970
	_dbus_user_database_unref (context->user_database);
sl@0
   971
      
sl@0
   972
      dbus_free (context);
sl@0
   973
sl@0
   974
      dbus_server_free_data_slot (&server_data_slot);
sl@0
   975
    }
sl@0
   976
}
sl@0
   977
sl@0
   978
/* type may be NULL */
sl@0
   979
const char*
sl@0
   980
bus_context_get_type (BusContext *context)
sl@0
   981
{
sl@0
   982
  return context->type;
sl@0
   983
}
sl@0
   984
sl@0
   985
const char*
sl@0
   986
bus_context_get_address (BusContext *context)
sl@0
   987
{
sl@0
   988
  return context->address;
sl@0
   989
}
sl@0
   990
sl@0
   991
BusRegistry*
sl@0
   992
bus_context_get_registry (BusContext  *context)
sl@0
   993
{
sl@0
   994
  return context->registry;
sl@0
   995
}
sl@0
   996
sl@0
   997
BusConnections*
sl@0
   998
bus_context_get_connections (BusContext  *context)
sl@0
   999
{
sl@0
  1000
  return context->connections;
sl@0
  1001
}
sl@0
  1002
sl@0
  1003
BusActivation*
sl@0
  1004
bus_context_get_activation (BusContext  *context)
sl@0
  1005
{
sl@0
  1006
  return context->activation;
sl@0
  1007
}
sl@0
  1008
sl@0
  1009
BusMatchmaker*
sl@0
  1010
bus_context_get_matchmaker (BusContext  *context)
sl@0
  1011
{
sl@0
  1012
  return context->matchmaker;
sl@0
  1013
}
sl@0
  1014
sl@0
  1015
DBusLoop*
sl@0
  1016
bus_context_get_loop (BusContext *context)
sl@0
  1017
{
sl@0
  1018
  return context->loop;
sl@0
  1019
}
sl@0
  1020
sl@0
  1021
DBusUserDatabase*
sl@0
  1022
bus_context_get_user_database (BusContext *context)
sl@0
  1023
{
sl@0
  1024
  return context->user_database;
sl@0
  1025
}
sl@0
  1026
sl@0
  1027
dbus_bool_t
sl@0
  1028
bus_context_allow_user (BusContext   *context,
sl@0
  1029
                        unsigned long uid)
sl@0
  1030
{
sl@0
  1031
  return bus_policy_allow_user (context->policy,
sl@0
  1032
                                context->user_database,
sl@0
  1033
                                uid);
sl@0
  1034
}
sl@0
  1035
sl@0
  1036
BusPolicy *
sl@0
  1037
bus_context_get_policy (BusContext *context)
sl@0
  1038
{
sl@0
  1039
  return context->policy;
sl@0
  1040
}
sl@0
  1041
sl@0
  1042
BusClientPolicy*
sl@0
  1043
bus_context_create_client_policy (BusContext      *context,
sl@0
  1044
                                  DBusConnection  *connection,
sl@0
  1045
                                  DBusError       *error)
sl@0
  1046
{
sl@0
  1047
  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
sl@0
  1048
  return bus_policy_create_client_policy (context->policy, connection,
sl@0
  1049
                                          error);
sl@0
  1050
}
sl@0
  1051
sl@0
  1052
int
sl@0
  1053
bus_context_get_activation_timeout (BusContext *context)
sl@0
  1054
{
sl@0
  1055
  
sl@0
  1056
  return context->limits.activation_timeout;
sl@0
  1057
}
sl@0
  1058
sl@0
  1059
int
sl@0
  1060
bus_context_get_auth_timeout (BusContext *context)
sl@0
  1061
{
sl@0
  1062
  return context->limits.auth_timeout;
sl@0
  1063
}
sl@0
  1064
sl@0
  1065
int
sl@0
  1066
bus_context_get_max_completed_connections (BusContext *context)
sl@0
  1067
{
sl@0
  1068
  return context->limits.max_completed_connections;
sl@0
  1069
}
sl@0
  1070
sl@0
  1071
int
sl@0
  1072
bus_context_get_max_incomplete_connections (BusContext *context)
sl@0
  1073
{
sl@0
  1074
  return context->limits.max_incomplete_connections;
sl@0
  1075
}
sl@0
  1076
sl@0
  1077
int
sl@0
  1078
bus_context_get_max_connections_per_user (BusContext *context)
sl@0
  1079
{
sl@0
  1080
  return context->limits.max_connections_per_user;
sl@0
  1081
}
sl@0
  1082
sl@0
  1083
int
sl@0
  1084
bus_context_get_max_pending_activations (BusContext *context)
sl@0
  1085
{
sl@0
  1086
  return context->limits.max_pending_activations;
sl@0
  1087
}
sl@0
  1088
sl@0
  1089
int
sl@0
  1090
bus_context_get_max_services_per_connection (BusContext *context)
sl@0
  1091
{
sl@0
  1092
  return context->limits.max_services_per_connection;
sl@0
  1093
}
sl@0
  1094
sl@0
  1095
int
sl@0
  1096
bus_context_get_max_match_rules_per_connection (BusContext *context)
sl@0
  1097
{
sl@0
  1098
  return context->limits.max_match_rules_per_connection;
sl@0
  1099
}
sl@0
  1100
sl@0
  1101
int
sl@0
  1102
bus_context_get_max_replies_per_connection (BusContext *context)
sl@0
  1103
{
sl@0
  1104
  return context->limits.max_replies_per_connection;
sl@0
  1105
}
sl@0
  1106
sl@0
  1107
int
sl@0
  1108
bus_context_get_reply_timeout (BusContext *context)
sl@0
  1109
{
sl@0
  1110
  return context->limits.reply_timeout;
sl@0
  1111
}
sl@0
  1112
sl@0
  1113
/*
sl@0
  1114
 * addressed_recipient is the recipient specified in the message.
sl@0
  1115
 *
sl@0
  1116
 * proposed_recipient is the recipient we're considering sending
sl@0
  1117
 * to right this second, and may be an eavesdropper.
sl@0
  1118
 *
sl@0
  1119
 * sender is the sender of the message.
sl@0
  1120
 *
sl@0
  1121
 * NULL for proposed_recipient or sender definitely means the bus driver.
sl@0
  1122
 *
sl@0
  1123
 * NULL for addressed_recipient may mean the bus driver, or may mean
sl@0
  1124
 * no destination was specified in the message (e.g. a signal).
sl@0
  1125
 */
sl@0
  1126
dbus_bool_t
sl@0
  1127
bus_context_check_security_policy (BusContext     *context,
sl@0
  1128
                                   BusTransaction *transaction,
sl@0
  1129
                                   DBusConnection *sender,
sl@0
  1130
                                   DBusConnection *addressed_recipient,
sl@0
  1131
                                   DBusConnection *proposed_recipient,
sl@0
  1132
                                   DBusMessage    *message,
sl@0
  1133
                                   DBusError      *error)
sl@0
  1134
{
sl@0
  1135
  BusClientPolicy *sender_policy;
sl@0
  1136
  BusClientPolicy *recipient_policy;
sl@0
  1137
  int type;
sl@0
  1138
  dbus_bool_t requested_reply;
sl@0
  1139
  
sl@0
  1140
  type = dbus_message_get_type (message);
sl@0
  1141
  
sl@0
  1142
  /* dispatch.c was supposed to ensure these invariants */
sl@0
  1143
  _dbus_assert (dbus_message_get_destination (message) != NULL ||
sl@0
  1144
                type == DBUS_MESSAGE_TYPE_SIGNAL ||
sl@0
  1145
                (sender == NULL && !bus_connection_is_active (proposed_recipient)));
sl@0
  1146
  _dbus_assert (type == DBUS_MESSAGE_TYPE_SIGNAL ||
sl@0
  1147
                addressed_recipient != NULL ||
sl@0
  1148
                strcmp (dbus_message_get_destination (message), DBUS_SERVICE_DBUS) == 0);
sl@0
  1149
  
sl@0
  1150
  switch (type)
sl@0
  1151
    {
sl@0
  1152
    case DBUS_MESSAGE_TYPE_METHOD_CALL:
sl@0
  1153
    case DBUS_MESSAGE_TYPE_SIGNAL:
sl@0
  1154
    case DBUS_MESSAGE_TYPE_METHOD_RETURN:
sl@0
  1155
    case DBUS_MESSAGE_TYPE_ERROR:
sl@0
  1156
      break;
sl@0
  1157
      
sl@0
  1158
    default:
sl@0
  1159
      _dbus_verbose ("security check disallowing message of unknown type %d\n",
sl@0
  1160
                     type);
sl@0
  1161
sl@0
  1162
      dbus_set_error (error, DBUS_ERROR_ACCESS_DENIED,
sl@0
  1163
                      "Message bus will not accept messages of unknown type\n");
sl@0
  1164
              
sl@0
  1165
      return FALSE;
sl@0
  1166
    }
sl@0
  1167
sl@0
  1168
  requested_reply = FALSE;
sl@0
  1169
  
sl@0
  1170
  if (sender != NULL)
sl@0
  1171
    {
sl@0
  1172
      const char *dest;
sl@0
  1173
sl@0
  1174
      dest = dbus_message_get_destination (message);
sl@0
  1175
	
sl@0
  1176
      /* First verify the SELinux access controls.  If allowed then
sl@0
  1177
       * go on with the standard checks.
sl@0
  1178
       */
sl@0
  1179
      if (!bus_selinux_allows_send (sender, proposed_recipient,
sl@0
  1180
				    dbus_message_type_to_string (dbus_message_get_type (message)),
sl@0
  1181
				    dbus_message_get_interface (message),
sl@0
  1182
				    dbus_message_get_member (message),
sl@0
  1183
				    dbus_message_get_error_name (message),
sl@0
  1184
				    dest ? dest : DBUS_SERVICE_DBUS, error))
sl@0
  1185
        {
sl@0
  1186
sl@0
  1187
	  if (dbus_error_is_set (error) &&
sl@0
  1188
	      dbus_error_has_name (error, DBUS_ERROR_NO_MEMORY))
sl@0
  1189
	    {
sl@0
  1190
	      return FALSE;
sl@0
  1191
	    }
sl@0
  1192
	  
sl@0
  1193
sl@0
  1194
          dbus_set_error (error, DBUS_ERROR_ACCESS_DENIED,
sl@0
  1195
                          "An SELinux policy prevents this sender "
sl@0
  1196
                          "from sending this message to this recipient "
sl@0
  1197
                          "(rejected message had interface \"%s\" "
sl@0
  1198
                          "member \"%s\" error name \"%s\" destination \"%s\")",
sl@0
  1199
                          dbus_message_get_interface (message) ?
sl@0
  1200
                          dbus_message_get_interface (message) : "(unset)",
sl@0
  1201
                          dbus_message_get_member (message) ?
sl@0
  1202
                          dbus_message_get_member (message) : "(unset)",
sl@0
  1203
                          dbus_message_get_error_name (message) ?
sl@0
  1204
                          dbus_message_get_error_name (message) : "(unset)",
sl@0
  1205
                          dest ? dest : DBUS_SERVICE_DBUS);
sl@0
  1206
          _dbus_verbose ("SELinux security check denying send to service\n");
sl@0
  1207
          return FALSE;
sl@0
  1208
        }
sl@0
  1209
       
sl@0
  1210
      if (bus_connection_is_active (sender))
sl@0
  1211
        {
sl@0
  1212
          sender_policy = bus_connection_get_policy (sender);
sl@0
  1213
          _dbus_assert (sender_policy != NULL);
sl@0
  1214
          
sl@0
  1215
          /* Fill in requested_reply variable with TRUE if this is a
sl@0
  1216
           * reply and the reply was pending.
sl@0
  1217
           */
sl@0
  1218
          if (dbus_message_get_reply_serial (message) != 0)
sl@0
  1219
            {
sl@0
  1220
              if (proposed_recipient != NULL /* not to the bus driver */ &&
sl@0
  1221
                  addressed_recipient == proposed_recipient /* not eavesdropping */)
sl@0
  1222
                {
sl@0
  1223
                  DBusError error2;                  
sl@0
  1224
                  
sl@0
  1225
                  dbus_error_init (&error2);
sl@0
  1226
                  requested_reply = bus_connections_check_reply (bus_connection_get_connections (sender),
sl@0
  1227
                                                                 transaction,
sl@0
  1228
                                                                 sender, addressed_recipient, message,
sl@0
  1229
                                                                 &error2);
sl@0
  1230
                  if (dbus_error_is_set (&error2))
sl@0
  1231
                    {
sl@0
  1232
                      dbus_move_error (&error2, error);
sl@0
  1233
                      return FALSE;
sl@0
  1234
                    }
sl@0
  1235
                }
sl@0
  1236
            }
sl@0
  1237
        }
sl@0
  1238
      else
sl@0
  1239
        {
sl@0
  1240
          /* Policy for inactive connections is that they can only send
sl@0
  1241
           * the hello message to the bus driver
sl@0
  1242
           */
sl@0
  1243
          if (proposed_recipient == NULL &&
sl@0
  1244
              dbus_message_is_method_call (message,
sl@0
  1245
                                           DBUS_INTERFACE_DBUS,
sl@0
  1246
                                           "Hello"))
sl@0
  1247
            {
sl@0
  1248
              _dbus_verbose ("security check allowing %s message\n",
sl@0
  1249
                             "Hello");
sl@0
  1250
              return TRUE;
sl@0
  1251
            }
sl@0
  1252
          else
sl@0
  1253
            {
sl@0
  1254
              _dbus_verbose ("security check disallowing non-%s message\n",
sl@0
  1255
                             "Hello");
sl@0
  1256
sl@0
  1257
              dbus_set_error (error, DBUS_ERROR_ACCESS_DENIED,
sl@0
  1258
                              "Client tried to send a message other than %s without being registered",
sl@0
  1259
                              "Hello");
sl@0
  1260
              
sl@0
  1261
              return FALSE;
sl@0
  1262
            }
sl@0
  1263
        }
sl@0
  1264
    }
sl@0
  1265
  else
sl@0
  1266
    {
sl@0
  1267
      sender_policy = NULL;
sl@0
  1268
sl@0
  1269
      /* If the sender is the bus driver, we assume any reply was a
sl@0
  1270
       * requested reply as bus driver won't send bogus ones
sl@0
  1271
       */
sl@0
  1272
      if (addressed_recipient == proposed_recipient /* not eavesdropping */ &&
sl@0
  1273
          dbus_message_get_reply_serial (message) != 0)
sl@0
  1274
        requested_reply = TRUE;
sl@0
  1275
    }
sl@0
  1276
sl@0
  1277
  _dbus_assert ((sender != NULL && sender_policy != NULL) ||
sl@0
  1278
                (sender == NULL && sender_policy == NULL));
sl@0
  1279
  
sl@0
  1280
  if (proposed_recipient != NULL)
sl@0
  1281
    {
sl@0
  1282
      /* only the bus driver can send to an inactive recipient (as it
sl@0
  1283
       * owns no services, so other apps can't address it). Inactive
sl@0
  1284
       * recipients can receive any message.
sl@0
  1285
       */
sl@0
  1286
      if (bus_connection_is_active (proposed_recipient))
sl@0
  1287
        {
sl@0
  1288
          recipient_policy = bus_connection_get_policy (proposed_recipient);
sl@0
  1289
          _dbus_assert (recipient_policy != NULL);
sl@0
  1290
        }
sl@0
  1291
      else if (sender == NULL)
sl@0
  1292
        {
sl@0
  1293
          _dbus_verbose ("security check using NULL recipient policy for message from bus\n");
sl@0
  1294
          recipient_policy = NULL;
sl@0
  1295
        }
sl@0
  1296
      else
sl@0
  1297
        {
sl@0
  1298
          _dbus_assert_not_reached ("a message was somehow sent to an inactive recipient from a source other than the message bus\n");
sl@0
  1299
          recipient_policy = NULL;
sl@0
  1300
        }
sl@0
  1301
    }
sl@0
  1302
  else
sl@0
  1303
    recipient_policy = NULL;
sl@0
  1304
  
sl@0
  1305
  _dbus_assert ((proposed_recipient != NULL && recipient_policy != NULL) ||
sl@0
  1306
                (proposed_recipient != NULL && sender == NULL && recipient_policy == NULL) ||
sl@0
  1307
                (proposed_recipient == NULL && recipient_policy == NULL));
sl@0
  1308
  
sl@0
  1309
  if (sender_policy &&
sl@0
  1310
      !bus_client_policy_check_can_send (sender_policy,
sl@0
  1311
                                         context->registry,
sl@0
  1312
                                         requested_reply,
sl@0
  1313
                                         proposed_recipient,
sl@0
  1314
                                         message))
sl@0
  1315
    {
sl@0
  1316
      const char *dest;
sl@0
  1317
sl@0
  1318
      dest = dbus_message_get_destination (message);
sl@0
  1319
      dbus_set_error (error, DBUS_ERROR_ACCESS_DENIED,
sl@0
  1320
                      "A security policy in place prevents this sender "
sl@0
  1321
                      "from sending this message to this recipient, "
sl@0
  1322
                      "see message bus configuration file (rejected message "
sl@0
  1323
                      "had interface \"%s\" member \"%s\" error name \"%s\" destination \"%s\")",
sl@0
  1324
                      dbus_message_get_interface (message) ?
sl@0
  1325
                      dbus_message_get_interface (message) : "(unset)",
sl@0
  1326
                      dbus_message_get_member (message) ?
sl@0
  1327
                      dbus_message_get_member (message) : "(unset)",
sl@0
  1328
                      dbus_message_get_error_name (message) ?
sl@0
  1329
                      dbus_message_get_error_name (message) : "(unset)",
sl@0
  1330
                      dest ? dest : DBUS_SERVICE_DBUS);
sl@0
  1331
      _dbus_verbose ("security policy disallowing message due to sender policy\n");
sl@0
  1332
      return FALSE;
sl@0
  1333
    }
sl@0
  1334
sl@0
  1335
  if (recipient_policy &&
sl@0
  1336
      !bus_client_policy_check_can_receive (recipient_policy,
sl@0
  1337
                                            context->registry,
sl@0
  1338
                                            requested_reply,
sl@0
  1339
                                            sender,
sl@0
  1340
                                            addressed_recipient, proposed_recipient,
sl@0
  1341
                                            message))
sl@0
  1342
    {
sl@0
  1343
      const char *dest;
sl@0
  1344
sl@0
  1345
      dest = dbus_message_get_destination (message);
sl@0
  1346
      dbus_set_error (error, DBUS_ERROR_ACCESS_DENIED,
sl@0
  1347
                      "A security policy in place prevents this recipient "
sl@0
  1348
                      "from receiving this message from this sender, "
sl@0
  1349
                      "see message bus configuration file (rejected message "
sl@0
  1350
                      "had interface \"%s\" member \"%s\" error name \"%s\" destination \"%s\" reply serial %u requested_reply=%d)",
sl@0
  1351
                      dbus_message_get_interface (message) ?
sl@0
  1352
                      dbus_message_get_interface (message) : "(unset)",
sl@0
  1353
                      dbus_message_get_member (message) ?
sl@0
  1354
                      dbus_message_get_member (message) : "(unset)",
sl@0
  1355
                      dbus_message_get_error_name (message) ?
sl@0
  1356
                      dbus_message_get_error_name (message) : "(unset)",
sl@0
  1357
                      dest ? dest : DBUS_SERVICE_DBUS,
sl@0
  1358
                      dbus_message_get_reply_serial (message),
sl@0
  1359
                      requested_reply);
sl@0
  1360
      _dbus_verbose ("security policy disallowing message due to recipient policy\n");
sl@0
  1361
      return FALSE;
sl@0
  1362
    }
sl@0
  1363
sl@0
  1364
  /* See if limits on size have been exceeded */
sl@0
  1365
  if (proposed_recipient &&
sl@0
  1366
      dbus_connection_get_outgoing_size (proposed_recipient) >
sl@0
  1367
      context->limits.max_outgoing_bytes)
sl@0
  1368
    {
sl@0
  1369
      const char *dest;
sl@0
  1370
sl@0
  1371
      dest = dbus_message_get_destination (message);
sl@0
  1372
      dbus_set_error (error, DBUS_ERROR_LIMITS_EXCEEDED,
sl@0
  1373
                      "The destination service \"%s\" has a full message queue",
sl@0
  1374
                      dest ? dest : (proposed_recipient ?
sl@0
  1375
                                     bus_connection_get_name (proposed_recipient) : 
sl@0
  1376
                                     DBUS_SERVICE_DBUS));
sl@0
  1377
      _dbus_verbose ("security policy disallowing message due to full message queue\n");
sl@0
  1378
      return FALSE;
sl@0
  1379
    }
sl@0
  1380
sl@0
  1381
  /* Record that we will allow a reply here in the future (don't
sl@0
  1382
   * bother if the recipient is the bus or this is an eavesdropping
sl@0
  1383
   * connection). Only the addressed recipient may reply.
sl@0
  1384
   */
sl@0
  1385
  if (type == DBUS_MESSAGE_TYPE_METHOD_CALL &&
sl@0
  1386
      sender && 
sl@0
  1387
      addressed_recipient &&
sl@0
  1388
      addressed_recipient == proposed_recipient && /* not eavesdropping */
sl@0
  1389
      !bus_connections_expect_reply (bus_connection_get_connections (sender),
sl@0
  1390
                                     transaction,
sl@0
  1391
                                     sender, addressed_recipient,
sl@0
  1392
                                     message, error))
sl@0
  1393
    {
sl@0
  1394
      _dbus_verbose ("Failed to record reply expectation or problem with the message expecting a reply\n");
sl@0
  1395
      return FALSE;
sl@0
  1396
    }
sl@0
  1397
  
sl@0
  1398
  _dbus_verbose ("security policy allowing message\n");
sl@0
  1399
  return TRUE;
sl@0
  1400
}