D-Bus 1.14.10
dbus-sysdeps-win.c
1/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2/* dbus-sysdeps.c Wrappers around system/libc features (internal to D-BUS implementation)
3 *
4 * Copyright (C) 2002, 2003 Red Hat, Inc.
5 * Copyright (C) 2003 CodeFactory AB
6 * Copyright (C) 2005 Novell, Inc.
7 * Copyright (C) 2006 Peter Kümmel <syntheticpp@gmx.net>
8 * Copyright (C) 2006 Christian Ehrlicher <ch.ehrlicher@gmx.de>
9 * Copyright (C) 2006-2021 Ralf Habacker <ralf.habacker@freenet.de>
10 *
11 * Licensed under the Academic Free License version 2.1
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software
25 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
26 *
27 */
28
29#include <config.h>
30
31#define STRSAFE_NO_DEPRECATE
32
33#include "dbus-internals.h"
34#include "dbus-sha.h"
35#include "dbus-sysdeps.h"
36#include "dbus-threads.h"
37#include "dbus-protocol.h"
38#include "dbus-string.h"
39#include "dbus-sysdeps.h"
40#include "dbus-sysdeps-win.h"
41#include "dbus-protocol.h"
42#include "dbus-hash.h"
43#include "dbus-sockets-win.h"
44#include "dbus-list.h"
45#include "dbus-nonce.h"
46#include "dbus-credentials.h"
47
48#include <windows.h>
49#include <wincrypt.h>
50#include <iphlpapi.h>
51
52/* Declarations missing in mingw's and windows sdk 7.0 headers */
53extern BOOL WINAPI ConvertStringSidToSidA (LPCSTR StringSid, PSID *Sid);
54extern BOOL WINAPI ConvertSidToStringSidA (PSID Sid, LPSTR *StringSid);
55
56#include <stdio.h>
57#include <stdlib.h>
58
59#include <string.h>
60#if HAVE_ERRNO_H
61#include <errno.h>
62#endif
63#ifndef DBUS_WINCE
64#include <mbstring.h>
65#include <sys/stat.h>
66#include <sys/types.h>
67#endif
68
69#ifdef HAVE_WS2TCPIP_H
70/* getaddrinfo for Windows CE (and Windows). */
71#include <ws2tcpip.h>
72#endif
73
74#ifndef O_BINARY
75#define O_BINARY 0
76#endif
77
78#ifndef PROCESS_QUERY_LIMITED_INFORMATION
79/* MinGW32 < 4 does not define this value in its headers */
80#define PROCESS_QUERY_LIMITED_INFORMATION (0x1000)
81#endif
82
83typedef int socklen_t;
84
85/* uncomment to enable windows event based poll implementation */
86//#define USE_CHRIS_IMPL
87
88void
89_dbus_win_set_errno (int err)
90{
91#ifdef DBUS_WINCE
92 SetLastError (err);
93#else
94 errno = err;
95#endif
96}
97
98static BOOL is_winxp_sp3_or_lower (void);
99
100/*
101 * _MIB_TCPROW_EX and friends are not available in system headers
102 * and are mapped to attribute identical ...OWNER_PID typedefs.
103 */
104typedef MIB_TCPROW_OWNER_PID _MIB_TCPROW_EX;
105typedef MIB_TCPTABLE_OWNER_PID MIB_TCPTABLE_EX;
106typedef PMIB_TCPTABLE_OWNER_PID PMIB_TCPTABLE_EX;
107typedef DWORD (WINAPI *ProcAllocateAndGetTcpExtTableFromStack)(PMIB_TCPTABLE_EX*,BOOL,HANDLE,DWORD,DWORD);
108
109/* Not protected by a lock, but if we miss a write, all that
110 * happens is that the lazy initialization will happen in two threads
111 * concurrently - it results in the same value either way so that's OK */
112static ProcAllocateAndGetTcpExtTableFromStack lpfnAllocateAndGetTcpExTableFromStack = NULL;
113
119static BOOL
120load_ex_ip_helper_procedures(void)
121{
122 HMODULE hModule = LoadLibrary ("iphlpapi.dll");
123 if (hModule == NULL)
124 {
125 _dbus_verbose ("could not load iphlpapi.dll\n");
126 return FALSE;
127 }
128
129 lpfnAllocateAndGetTcpExTableFromStack = (ProcAllocateAndGetTcpExtTableFromStack) (void (*)(void))GetProcAddress (hModule, "AllocateAndGetTcpExTableFromStack");
130 if (lpfnAllocateAndGetTcpExTableFromStack == NULL)
131 {
132 _dbus_verbose ("could not find function AllocateAndGetTcpExTableFromStack in iphlpapi.dll\n");
133 return FALSE;
134 }
135 return TRUE;
136}
137
144static dbus_pid_t
145get_pid_from_extended_tcp_table(int peer_port)
146{
147 dbus_pid_t result;
148 DWORD errorCode, size = 0, i;
149 MIB_TCPTABLE_OWNER_PID *tcp_table;
150
151 if ((errorCode =
152 GetExtendedTcpTable (NULL, &size, TRUE, AF_INET, TCP_TABLE_OWNER_PID_ALL, 0)) == ERROR_INSUFFICIENT_BUFFER)
153 {
154 tcp_table = (MIB_TCPTABLE_OWNER_PID *) dbus_malloc (size);
155 if (tcp_table == NULL)
156 {
157 _dbus_verbose ("Error allocating memory\n");
158 return 0;
159 }
160 }
161 else
162 {
163 _dbus_win_warn_win_error ("unexpected error returned from GetExtendedTcpTable", errorCode);
164 return 0;
165 }
166
167 if ((errorCode = GetExtendedTcpTable (tcp_table, &size, TRUE, AF_INET, TCP_TABLE_OWNER_PID_ALL, 0)) != NO_ERROR)
168 {
169 _dbus_verbose ("Error fetching tcp table %d\n", (int)errorCode);
170 dbus_free (tcp_table);
171 return 0;
172 }
173
174 result = 0;
175 for (i = 0; i < tcp_table->dwNumEntries; i++)
176 {
177 MIB_TCPROW_OWNER_PID *p = &tcp_table->table[i];
178 int local_address = ntohl (p->dwLocalAddr);
179 int local_port = ntohs (p->dwLocalPort);
180 if (p->dwState == MIB_TCP_STATE_ESTAB
181 && local_address == INADDR_LOOPBACK && local_port == peer_port)
182 result = p->dwOwningPid;
183 }
184
185 dbus_free (tcp_table);
186 _dbus_verbose ("got pid %lu\n", result);
187 return result;
188}
189
197static dbus_pid_t
198get_pid_from_tcp_ex_table(int peer_port)
199{
200 dbus_pid_t result;
201 DWORD errorCode, i;
202 PMIB_TCPTABLE_EX tcp_table = NULL;
203
204 if (!load_ex_ip_helper_procedures ())
205 {
206 _dbus_verbose
207 ("Error not been able to load iphelper procedures\n");
208 return 0;
209 }
210
211 errorCode = lpfnAllocateAndGetTcpExTableFromStack (&tcp_table, TRUE, GetProcessHeap(), 0, 2);
212
213 if (errorCode != NO_ERROR)
214 {
215 _dbus_verbose
216 ("Error not been able to call AllocateAndGetTcpExTableFromStack()\n");
217 return 0;
218 }
219
220 result = 0;
221 for (i = 0; i < tcp_table->dwNumEntries; i++)
222 {
223 _MIB_TCPROW_EX *p = &tcp_table->table[i];
224 int local_port = ntohs (p->dwLocalPort);
225 int local_address = ntohl (p->dwLocalAddr);
226 if (local_address == INADDR_LOOPBACK && local_port == peer_port)
227 {
228 result = p->dwOwningPid;
229 break;
230 }
231 }
232
233 HeapFree (GetProcessHeap(), 0, tcp_table);
234 _dbus_verbose ("got pid %lu\n", result);
235 return result;
236}
237
243static dbus_pid_t
244_dbus_get_peer_pid_from_tcp_handle (int handle)
245{
246 struct sockaddr_storage addr;
247 socklen_t len = sizeof (addr);
248 int peer_port;
249
250 dbus_pid_t result;
251 dbus_bool_t is_localhost = FALSE;
252
253 getpeername (handle, (struct sockaddr *) &addr, &len);
254
255 if (addr.ss_family == AF_INET)
256 {
257 struct sockaddr_in *s = (struct sockaddr_in *) &addr;
258 peer_port = ntohs (s->sin_port);
259 is_localhost = (ntohl (s->sin_addr.s_addr) == INADDR_LOOPBACK);
260 }
261 else if (addr.ss_family == AF_INET6)
262 {
263 _dbus_verbose ("FIXME [61922]: IPV6 support not working on windows\n");
264 return 0;
265 /*
266 struct sockaddr_in6 *s = (struct sockaddr_in6 * )&addr;
267 peer_port = ntohs (s->sin6_port);
268 is_localhost = (memcmp(s->sin6_addr.s6_addr, in6addr_loopback.s6_addr, 16) == 0);
269 _dbus_verbose ("IPV6 %08x %08x\n", s->sin6_addr.s6_addr, in6addr_loopback.s6_addr);
270 */
271 }
272 else
273 {
274 _dbus_verbose ("no idea what address family %d is\n", addr.ss_family);
275 return 0;
276 }
277
278 if (!is_localhost)
279 {
280 _dbus_verbose ("could not fetch process id from remote process\n");
281 return 0;
282 }
283
284 if (peer_port == 0)
285 {
286 _dbus_verbose
287 ("Error not been able to fetch tcp peer port from connection\n");
288 return 0;
289 }
290
291 _dbus_verbose ("trying to get peer's pid\n");
292
293 result = get_pid_from_extended_tcp_table (peer_port);
294 if (result > 0)
295 return result;
296 result = get_pid_from_tcp_ex_table (peer_port);
297 return result;
298}
299
300/* Convert GetLastError() to a dbus error. */
301const char*
302_dbus_win_error_from_last_error (void)
303{
304 switch (GetLastError())
305 {
306 case 0:
307 return DBUS_ERROR_FAILED;
308
309 case ERROR_NO_MORE_FILES:
310 case ERROR_TOO_MANY_OPEN_FILES:
311 return DBUS_ERROR_LIMITS_EXCEEDED; /* kernel out of memory */
312
313 case ERROR_ACCESS_DENIED:
314 case ERROR_CANNOT_MAKE:
316
317 case ERROR_NOT_ENOUGH_MEMORY:
319
320 case ERROR_FILE_EXISTS:
322
323 case ERROR_FILE_NOT_FOUND:
324 case ERROR_PATH_NOT_FOUND:
326
327 default:
328 return DBUS_ERROR_FAILED;
329 }
330}
331
332
333char*
334_dbus_win_error_string (int error_number)
335{
336 char *msg;
337
338 FormatMessageA (FORMAT_MESSAGE_ALLOCATE_BUFFER |
339 FORMAT_MESSAGE_IGNORE_INSERTS |
340 FORMAT_MESSAGE_FROM_SYSTEM,
341 NULL, error_number, 0,
342 (LPSTR) &msg, 0, NULL);
343
344 if (msg[strlen (msg) - 1] == '\n')
345 msg[strlen (msg) - 1] = '\0';
346 if (msg[strlen (msg) - 1] == '\r')
347 msg[strlen (msg) - 1] = '\0';
348
349 return msg;
350}
351
352void
353_dbus_win_free_error_string (char *string)
354{
355 LocalFree (string);
356}
357
378int
380 DBusString *buffer,
381 int count)
382{
383 int bytes_read;
384 int start;
385 char *data;
386
387 _dbus_assert (count >= 0);
388
389 start = _dbus_string_get_length (buffer);
390
391 if (!_dbus_string_lengthen (buffer, count))
392 {
393 _dbus_win_set_errno (ENOMEM);
394 return -1;
395 }
396
397 data = _dbus_string_get_data_len (buffer, start, count);
398
399 again:
400
401 _dbus_verbose ("recv: count=%d fd=%Iu\n", count, fd.sock);
402 bytes_read = recv (fd.sock, data, count, 0);
403
404 if (bytes_read == SOCKET_ERROR)
405 {
406 DBUS_SOCKET_SET_ERRNO();
407 _dbus_verbose ("recv: failed: %s (%d)\n", _dbus_strerror (errno), errno);
408 bytes_read = -1;
409 }
410 else
411 _dbus_verbose ("recv: = %d\n", bytes_read);
412
413 if (bytes_read < 0)
414 {
415 if (errno == EINTR)
416 goto again;
417 else
418 {
419 /* put length back (note that this doesn't actually realloc anything) */
420 _dbus_string_set_length (buffer, start);
421 return -1;
422 }
423 }
424 else
425 {
426 /* put length back (doesn't actually realloc) */
427 _dbus_string_set_length (buffer, start + bytes_read);
428
429#if 0
430 if (bytes_read > 0)
431 _dbus_verbose_bytes_of_string (buffer, start, bytes_read);
432#endif
433
434 return bytes_read;
435 }
436}
437
448int
450 const DBusString *buffer,
451 int start,
452 int len)
453{
454 const char *data;
455 int bytes_written;
456
457 data = _dbus_string_get_const_data_len (buffer, start, len);
458
459 again:
460
461 _dbus_verbose ("send: len=%d fd=%Iu\n", len, fd.sock);
462 bytes_written = send (fd.sock, data, len, 0);
463
464 if (bytes_written == SOCKET_ERROR)
465 {
466 DBUS_SOCKET_SET_ERRNO();
467 _dbus_verbose ("send: failed: %s\n", _dbus_strerror_from_errno ());
468 bytes_written = -1;
469 }
470 else
471 _dbus_verbose ("send: = %d\n", bytes_written);
472
473 if (bytes_written < 0 && errno == EINTR)
474 goto again;
475
476#if 0
477 if (bytes_written > 0)
478 _dbus_verbose_bytes_of_string (buffer, start, bytes_written);
479#endif
480
481 return bytes_written;
482}
483
484
494 DBusError *error)
495{
496 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
497
498 again:
499 if (closesocket (fd.sock) == SOCKET_ERROR)
500 {
501 DBUS_SOCKET_SET_ERRNO ();
502
503 if (errno == EINTR)
504 goto again;
505
507 "Could not close socket: socket=%Iu, , %s",
508 fd.sock, _dbus_strerror_from_errno ());
509 return FALSE;
510 }
511 _dbus_verbose ("socket=%Iu, \n", fd.sock);
512
513 return TRUE;
514}
515
523static void
524_dbus_win_handle_set_close_on_exec (HANDLE handle)
525{
526 if ( !SetHandleInformation( (HANDLE) handle,
527 HANDLE_FLAG_INHERIT | HANDLE_FLAG_PROTECT_FROM_CLOSE,
528 0 /*disable both flags*/ ) )
529 {
530 _dbus_win_warn_win_error ("Disabling socket handle inheritance failed:", GetLastError());
531 }
532}
533
543 DBusError *error)
544{
545 u_long one = 1;
546
547 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
548
549 if (ioctlsocket (handle.sock, FIONBIO, &one) == SOCKET_ERROR)
550 {
551 DBUS_SOCKET_SET_ERRNO ();
553 "Failed to set socket %Iu to nonblocking: %s",
554 handle.sock, _dbus_strerror_from_errno ());
555 return FALSE;
556 }
557
558 return TRUE;
559}
560
561
582int
584 const DBusString *buffer1,
585 int start1,
586 int len1,
587 const DBusString *buffer2,
588 int start2,
589 int len2)
590{
591 WSABUF vectors[2];
592 const char *data1;
593 const char *data2;
594 int rc;
595 DWORD bytes_written;
596
597 _dbus_assert (buffer1 != NULL);
598 _dbus_assert (start1 >= 0);
599 _dbus_assert (start2 >= 0);
600 _dbus_assert (len1 >= 0);
601 _dbus_assert (len2 >= 0);
602
603
604 data1 = _dbus_string_get_const_data_len (buffer1, start1, len1);
605
606 if (buffer2 != NULL)
607 data2 = _dbus_string_get_const_data_len (buffer2, start2, len2);
608 else
609 {
610 data2 = NULL;
611 start2 = 0;
612 len2 = 0;
613 }
614
615 vectors[0].buf = (char*) data1;
616 vectors[0].len = len1;
617 vectors[1].buf = (char*) data2;
618 vectors[1].len = len2;
619
620 again:
621
622 _dbus_verbose ("WSASend: len1+2=%d+%d fd=%Iu\n", len1, len2, fd.sock);
623 rc = WSASend (fd.sock,
624 vectors,
625 data2 ? 2 : 1,
626 &bytes_written,
627 0,
628 NULL,
629 NULL);
630
631 if (rc == SOCKET_ERROR)
632 {
633 DBUS_SOCKET_SET_ERRNO ();
634 _dbus_verbose ("WSASend: failed: %s\n", _dbus_strerror_from_errno ());
635 bytes_written = (DWORD) -1;
636 }
637 else
638 _dbus_verbose ("WSASend: = %ld\n", bytes_written);
639
640 if (bytes_written == (DWORD) -1 && errno == EINTR)
641 goto again;
642
643 return bytes_written;
644}
645
646#if 0
647
656int
657_dbus_connect_named_pipe (const char *path,
658 DBusError *error)
659{
660 _dbus_assert_not_reached ("not implemented");
661}
662
663#endif
664
669_dbus_win_startup_winsock (void)
670{
671 /* Straight from MSDN, deuglified */
672
673 /* Protected by _DBUS_LOCK_sysdeps */
674 static dbus_bool_t beenhere = FALSE;
675
676 WORD wVersionRequested;
677 WSADATA wsaData;
678 int err;
679
680 if (!_DBUS_LOCK (sysdeps))
681 return FALSE;
682
683 if (beenhere)
684 goto out;
685
686 wVersionRequested = MAKEWORD (2, 0);
687
688 err = WSAStartup (wVersionRequested, &wsaData);
689 if (err != 0)
690 {
691 _dbus_assert_not_reached ("Could not initialize WinSock");
692 _dbus_abort ();
693 }
694
695 /* Confirm that the WinSock DLL supports 2.0. Note that if the DLL
696 * supports versions greater than 2.0 in addition to 2.0, it will
697 * still return 2.0 in wVersion since that is the version we
698 * requested.
699 */
700 if (LOBYTE (wsaData.wVersion) != 2 ||
701 HIBYTE (wsaData.wVersion) != 0)
702 {
703 _dbus_assert_not_reached ("No usable WinSock found");
704 _dbus_abort ();
705 }
706
707 beenhere = TRUE;
708
709out:
710 _DBUS_UNLOCK (sysdeps);
711 return TRUE;
712}
713
714
715
716
717
718
719
720
721
722/************************************************************************
723
724 UTF / string code
725
726 ************************************************************************/
727
731int _dbus_printf_string_upper_bound (const char *format,
732 va_list args)
733{
734 /* MSVCRT's vsnprintf semantics are a bit different */
735 char buf[1024];
736 int bufsize;
737 int len;
738 va_list args_copy;
739
740 bufsize = sizeof (buf);
741 DBUS_VA_COPY (args_copy, args);
742 len = _vsnprintf (buf, bufsize - 1, format, args_copy);
743 va_end (args_copy);
744
745 while (len == -1) /* try again */
746 {
747 char *p;
748
749 bufsize *= 2;
750
751 p = malloc (bufsize);
752
753 if (p == NULL)
754 return -1;
755
756 DBUS_VA_COPY (args_copy, args);
757 len = _vsnprintf (p, bufsize - 1, format, args_copy);
758 va_end (args_copy);
759 free (p);
760 }
761
762 return len;
763}
764
765
773wchar_t *
774_dbus_win_utf8_to_utf16 (const char *str,
775 DBusError *error)
776{
777 DBusString s;
778 int n;
779 wchar_t *retval;
780
781 _dbus_string_init_const (&s, str);
782
783 if (!_dbus_string_validate_utf8 (&s, 0, _dbus_string_get_length (&s)))
784 {
785 dbus_set_error_const (error, DBUS_ERROR_FAILED, "Invalid UTF-8");
786 return NULL;
787 }
788
789 n = MultiByteToWideChar (CP_UTF8, 0, str, -1, NULL, 0);
790
791 if (n == 0)
792 {
793 _dbus_win_set_error_from_win_error (error, GetLastError ());
794 return NULL;
795 }
796
797 retval = dbus_new (wchar_t, n);
798
799 if (!retval)
800 {
801 _DBUS_SET_OOM (error);
802 return NULL;
803 }
804
805 if (MultiByteToWideChar (CP_UTF8, 0, str, -1, retval, n) != n)
806 {
807 dbus_free (retval);
808 dbus_set_error_const (error, DBUS_ERROR_FAILED, "MultiByteToWideChar inconsistency");
809 return NULL;
810 }
811
812 return retval;
813}
814
822char *
823_dbus_win_utf16_to_utf8 (const wchar_t *str,
824 DBusError *error)
825{
826 int n;
827 char *retval;
828
829 n = WideCharToMultiByte (CP_UTF8, 0, str, -1, NULL, 0, NULL, NULL);
830
831 if (n == 0)
832 {
833 _dbus_win_set_error_from_win_error (error, GetLastError ());
834 return NULL;
835 }
836
837 retval = dbus_malloc (n);
838
839 if (!retval)
840 {
841 _DBUS_SET_OOM (error);
842 return NULL;
843 }
844
845 if (WideCharToMultiByte (CP_UTF8, 0, str, -1, retval, n, NULL, NULL) != n)
846 {
847 dbus_free (retval);
848 dbus_set_error_const (error, DBUS_ERROR_FAILED, "WideCharToMultiByte inconsistency");
849 return NULL;
850 }
851
852 return retval;
853}
854
855
856
857
858
859
860/************************************************************************
861
862
863 ************************************************************************/
864
866_dbus_win_account_to_sid (const wchar_t *waccount,
867 void **ppsid,
868 DBusError *error)
869{
870 dbus_bool_t retval = FALSE;
871 DWORD sid_length, wdomain_length;
872 SID_NAME_USE use;
873 wchar_t *wdomain;
874
875 *ppsid = NULL;
876
877 sid_length = 0;
878 wdomain_length = 0;
879 if (!LookupAccountNameW (NULL, waccount, NULL, &sid_length,
880 NULL, &wdomain_length, &use) &&
881 GetLastError () != ERROR_INSUFFICIENT_BUFFER)
882 {
883 _dbus_win_set_error_from_win_error (error, GetLastError ());
884 return FALSE;
885 }
886
887 *ppsid = dbus_malloc (sid_length);
888 if (!*ppsid)
889 {
890 _DBUS_SET_OOM (error);
891 return FALSE;
892 }
893
894 wdomain = dbus_new (wchar_t, wdomain_length);
895 if (!wdomain)
896 {
897 _DBUS_SET_OOM (error);
898 goto out1;
899 }
900
901 if (!LookupAccountNameW (NULL, waccount, (PSID) *ppsid, &sid_length,
902 wdomain, &wdomain_length, &use))
903 {
904 _dbus_win_set_error_from_win_error (error, GetLastError ());
905 goto out2;
906 }
907
908 if (!IsValidSid ((PSID) *ppsid))
909 {
910 dbus_set_error_const (error, DBUS_ERROR_FAILED, "Invalid SID");
911 goto out2;
912 }
913
914 retval = TRUE;
915
916out2:
917 dbus_free (wdomain);
918out1:
919 if (!retval)
920 {
921 dbus_free (*ppsid);
922 *ppsid = NULL;
923 }
924
925 return retval;
926}
927
937unsigned long
939{
940 return _dbus_getpid ();
941}
942
943#ifndef DBUS_WINCE
944
945static BOOL
946is_winxp_sp3_or_lower (void)
947{
948 OSVERSIONINFOEX osvi;
949 DWORDLONG dwlConditionMask = 0;
950 int op=VER_LESS_EQUAL;
951
952 // Initialize the OSVERSIONINFOEX structure.
953
954 ZeroMemory(&osvi, sizeof(OSVERSIONINFOEX));
955 osvi.dwOSVersionInfoSize = sizeof(OSVERSIONINFOEX);
956 osvi.dwMajorVersion = 5;
957 osvi.dwMinorVersion = 1;
958 osvi.wServicePackMajor = 3;
959 osvi.wServicePackMinor = 0;
960
961 // Initialize the condition mask.
962
963 VER_SET_CONDITION (dwlConditionMask, VER_MAJORVERSION, op);
964 VER_SET_CONDITION (dwlConditionMask, VER_MINORVERSION, op);
965 VER_SET_CONDITION (dwlConditionMask, VER_SERVICEPACKMAJOR, op);
966 VER_SET_CONDITION (dwlConditionMask, VER_SERVICEPACKMINOR, op);
967
968 // Perform the test.
969
970 return VerifyVersionInfo(
971 &osvi,
972 VER_MAJORVERSION | VER_MINORVERSION |
973 VER_SERVICEPACKMAJOR | VER_SERVICEPACKMINOR,
974 dwlConditionMask);
975}
976
983_dbus_getsid(char **sid, dbus_pid_t process_id)
984{
985 HANDLE process_token = INVALID_HANDLE_VALUE;
986 TOKEN_USER *token_user = NULL;
987 DWORD n;
988 PSID psid;
989 int retval = FALSE;
990
991 HANDLE process_handle;
992 if (process_id == 0)
993 process_handle = GetCurrentProcess();
994 else if (is_winxp_sp3_or_lower())
995 process_handle = OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, process_id);
996 else
997 process_handle = OpenProcess(PROCESS_QUERY_LIMITED_INFORMATION, FALSE, process_id);
998
999 if (!OpenProcessToken (process_handle, TOKEN_QUERY, &process_token))
1000 {
1001 _dbus_win_warn_win_error ("OpenProcessToken failed", GetLastError ());
1002 goto failed;
1003 }
1004 if ((!GetTokenInformation (process_token, TokenUser, NULL, 0, &n)
1005 && GetLastError () != ERROR_INSUFFICIENT_BUFFER)
1006 || (token_user = alloca (n)) == NULL
1007 || !GetTokenInformation (process_token, TokenUser, token_user, n, &n))
1008 {
1009 _dbus_win_warn_win_error ("GetTokenInformation failed", GetLastError ());
1010 goto failed;
1011 }
1012 psid = token_user->User.Sid;
1013 if (!IsValidSid (psid))
1014 {
1015 _dbus_verbose("invalid sid\n");
1016 goto failed;
1017 }
1018 if (!ConvertSidToStringSidA (psid, sid))
1019 {
1020 _dbus_verbose("invalid sid\n");
1021 goto failed;
1022 }
1023//okay:
1024 retval = TRUE;
1025
1026failed:
1027 CloseHandle (process_handle);
1028 if (process_token != INVALID_HANDLE_VALUE)
1029 CloseHandle (process_token);
1030
1031 _dbus_verbose("_dbus_getsid() got '%s' and returns %d\n", *sid, retval);
1032 return retval;
1033}
1034#endif
1035
1036/************************************************************************
1037
1038 pipes
1039
1040 ************************************************************************/
1041
1056 DBusSocket *fd2,
1057 dbus_bool_t blocking,
1058 DBusError *error)
1059{
1060 SOCKET temp, socket1 = -1, socket2 = -1;
1061 struct sockaddr_in saddr;
1062 int len;
1063 u_long arg;
1064
1065 if (!_dbus_win_startup_winsock ())
1066 {
1067 _DBUS_SET_OOM (error);
1068 return FALSE;
1069 }
1070
1071 temp = socket (AF_INET, SOCK_STREAM, 0);
1072 if (temp == INVALID_SOCKET)
1073 {
1074 DBUS_SOCKET_SET_ERRNO ();
1075 goto out0;
1076 }
1077
1078 _DBUS_ZERO (saddr);
1079 saddr.sin_family = AF_INET;
1080 saddr.sin_port = 0;
1081 saddr.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
1082
1083 if (bind (temp, (struct sockaddr *)&saddr, sizeof (saddr)) == SOCKET_ERROR)
1084 {
1085 DBUS_SOCKET_SET_ERRNO ();
1086 goto out0;
1087 }
1088
1089 if (listen (temp, 1) == SOCKET_ERROR)
1090 {
1091 DBUS_SOCKET_SET_ERRNO ();
1092 goto out0;
1093 }
1094
1095 len = sizeof (saddr);
1096 if (getsockname (temp, (struct sockaddr *)&saddr, &len) == SOCKET_ERROR)
1097 {
1098 DBUS_SOCKET_SET_ERRNO ();
1099 goto out0;
1100 }
1101
1102 socket1 = socket (AF_INET, SOCK_STREAM, 0);
1103 if (socket1 == INVALID_SOCKET)
1104 {
1105 DBUS_SOCKET_SET_ERRNO ();
1106 goto out0;
1107 }
1108
1109 if (connect (socket1, (struct sockaddr *)&saddr, len) == SOCKET_ERROR)
1110 {
1111 DBUS_SOCKET_SET_ERRNO ();
1112 goto out1;
1113 }
1114
1115 socket2 = accept (temp, (struct sockaddr *) &saddr, &len);
1116 if (socket2 == INVALID_SOCKET)
1117 {
1118 DBUS_SOCKET_SET_ERRNO ();
1119 goto out1;
1120 }
1121
1122 if (!blocking)
1123 {
1124 arg = 1;
1125 if (ioctlsocket (socket1, FIONBIO, &arg) == SOCKET_ERROR)
1126 {
1127 DBUS_SOCKET_SET_ERRNO ();
1128 goto out2;
1129 }
1130
1131 arg = 1;
1132 if (ioctlsocket (socket2, FIONBIO, &arg) == SOCKET_ERROR)
1133 {
1134 DBUS_SOCKET_SET_ERRNO ();
1135 goto out2;
1136 }
1137 }
1138
1139 fd1->sock = socket1;
1140 fd2->sock = socket2;
1141
1142 _dbus_verbose ("full-duplex pipe %Iu:%Iu <-> %Iu:%Iu\n",
1143 fd1->sock, socket1, fd2->sock, socket2);
1144
1145 closesocket (temp);
1146
1147 return TRUE;
1148
1149out2:
1150 closesocket (socket2);
1151out1:
1152 closesocket (socket1);
1153out0:
1154 closesocket (temp);
1155
1156 dbus_set_error (error, _dbus_error_from_errno (errno),
1157 "Could not setup socket pair: %s",
1159
1160 return FALSE;
1161}
1162
1163#ifdef DBUS_ENABLE_VERBOSE_MODE
1164static dbus_bool_t
1165_dbus_dump_fd_events (DBusPollFD *fds, int n_fds)
1166{
1167 DBusString msg = _DBUS_STRING_INIT_INVALID;
1168 dbus_bool_t result = FALSE;
1169 int i;
1170
1171 if (!_dbus_string_init (&msg))
1172 goto oom;
1173
1174 for (i = 0; i < n_fds; i++)
1175 {
1176 DBusPollFD *fdp = &fds[i];
1177 if (!_dbus_string_append (&msg, i > 0 ? "\n\t" : "\t"))
1178 goto oom;
1179
1180 if ((fdp->events & _DBUS_POLLIN) &&
1181 !_dbus_string_append_printf (&msg, "R:%Iu ", fdp->fd.sock))
1182 goto oom;
1183
1184 if ((fdp->events & _DBUS_POLLOUT) &&
1185 !_dbus_string_append_printf (&msg, "W:%Iu ", fdp->fd.sock))
1186 goto oom;
1187
1188 if (!_dbus_string_append_printf (&msg, "E:%Iu", fdp->fd.sock))
1189 goto oom;
1190 }
1191
1192 _dbus_verbose ("%s\n", _dbus_string_get_const_data (&msg));
1193 result = TRUE;
1194oom:
1195 _dbus_string_free (&msg);
1196 return result;
1197}
1198
1199#ifdef USE_CHRIS_IMPL
1200static dbus_bool_t
1201_dbus_dump_fd_revents (DBusPollFD *fds, int n_fds)
1202{
1203 DBusString msg = _DBUS_STRING_INIT_INVALID;
1204 dbus_bool_t result = FALSE;
1205 int i;
1206
1207 if (!_dbus_string_init (&msg))
1208 goto oom;
1209
1210 for (i = 0; i < n_fds; i++)
1211 {
1212 DBusPollFD *fdp = &fds[i];
1213 if (!_dbus_string_append (&msg, i > 0 ? "\n\t" : "\t"))
1214 goto oom;
1215
1216 if ((fdp->revents & _DBUS_POLLIN) &&
1217 !_dbus_string_append_printf (&msg, "R:%Iu ", fdp->fd.sock))
1218 goto oom;
1219
1220 if ((fdp->revents & _DBUS_POLLOUT) &&
1221 !_dbus_string_append_printf (&msg, "W:%Iu ", fdp->fd.sock))
1222 goto oom;
1223
1224 if ((fdp->revents & _DBUS_POLLERR) &&
1225 !_dbus_string_append_printf (&msg, "E:%Iu", fdp->fd.sock))
1226 goto oom;
1227 }
1228
1229 _dbus_verbose ("%s\n", _dbus_string_get_const_data (&msg));
1230 result = TRUE;
1231oom:
1232 _dbus_string_free (&msg);
1233 return result;
1234}
1235#else
1236static dbus_bool_t
1237_dbus_dump_fdset (DBusPollFD *fds, int n_fds, fd_set *read_set, fd_set *write_set, fd_set *err_set)
1238{
1239 DBusString msg = _DBUS_STRING_INIT_INVALID;
1240 dbus_bool_t result = FALSE;
1241 int i;
1242
1243 if (!_dbus_string_init (&msg))
1244 goto oom;
1245
1246 for (i = 0; i < n_fds; i++)
1247 {
1248 DBusPollFD *fdp = &fds[i];
1249
1250 if (!_dbus_string_append (&msg, i > 0 ? "\n\t" : "\t"))
1251 goto oom;
1252
1253 if (FD_ISSET (fdp->fd.sock, read_set) &&
1254 !_dbus_string_append_printf (&msg, "R:%Iu ", fdp->fd.sock))
1255 goto oom;
1256
1257 if (FD_ISSET (fdp->fd.sock, write_set) &&
1258 !_dbus_string_append_printf (&msg, "W:%Iu ", fdp->fd.sock))
1259 goto oom;
1260
1261 if (FD_ISSET (fdp->fd.sock, err_set) &&
1262 !_dbus_string_append_printf (&msg, "E:%Iu", fdp->fd.sock))
1263 goto oom;
1264 }
1265 _dbus_verbose ("%s\n", _dbus_string_get_const_data (&msg));
1266 result = TRUE;
1267oom:
1268 _dbus_string_free (&msg);
1269 return result;
1270}
1271#endif
1272#endif
1273
1274#ifdef USE_CHRIS_IMPL
1283static int
1284_dbus_poll_events (DBusPollFD *fds,
1285 int n_fds,
1286 int timeout_milliseconds)
1287{
1288 int ret = 0;
1289 int i;
1290 DWORD ready;
1291
1292#define DBUS_STACK_WSAEVENTS 256
1293 WSAEVENT eventsOnStack[DBUS_STACK_WSAEVENTS];
1294 WSAEVENT *pEvents = NULL;
1295 if (n_fds > DBUS_STACK_WSAEVENTS)
1296 pEvents = calloc(sizeof(WSAEVENT), n_fds);
1297 else
1298 pEvents = eventsOnStack;
1299
1300 if (pEvents == NULL)
1301 {
1302 _dbus_win_set_errno (ENOMEM);
1303 ret = -1;
1304 goto oom;
1305 }
1306
1307#ifdef DBUS_ENABLE_VERBOSE_MODE
1308 _dbus_verbose ("_dbus_poll: to=%d", timeout_milliseconds);
1309 if (!_dbus_dump_fd_events (fds, n_fds))
1310 {
1311 _dbus_win_set_errno (ENOMEM);
1312 ret = -1;
1313 goto oom;
1314 }
1315#endif
1316
1317 for (i = 0; i < n_fds; i++)
1318 pEvents[i] = WSA_INVALID_EVENT;
1319
1320 for (i = 0; i < n_fds; i++)
1321 {
1322 DBusPollFD *fdp = &fds[i];
1323 WSAEVENT ev;
1324 long lNetworkEvents = FD_OOB;
1325
1326 ev = WSACreateEvent();
1327
1328 if (fdp->events & _DBUS_POLLIN)
1329 lNetworkEvents |= FD_READ | FD_ACCEPT | FD_CLOSE;
1330
1331 if (fdp->events & _DBUS_POLLOUT)
1332 lNetworkEvents |= FD_WRITE | FD_CONNECT;
1333
1334 WSAEventSelect (fdp->fd.sock, ev, lNetworkEvents);
1335
1336 pEvents[i] = ev;
1337 }
1338
1339 ready = WSAWaitForMultipleEvents (n_fds, pEvents, FALSE, timeout_milliseconds, FALSE);
1340
1341 if (ready == WSA_WAIT_FAILED)
1342 {
1343 DBUS_SOCKET_SET_ERRNO ();
1344 if (errno != WSAEWOULDBLOCK)
1345 _dbus_verbose ("WSAWaitForMultipleEvents: failed: %s\n", _dbus_strerror_from_errno ());
1346 ret = -1;
1347 }
1348 else if (ready == WSA_WAIT_TIMEOUT)
1349 {
1350 _dbus_verbose ("WSAWaitForMultipleEvents: WSA_WAIT_TIMEOUT\n");
1351 ret = 0;
1352 }
1353 else if (ready < (WSA_WAIT_EVENT_0 + n_fds))
1354 {
1355 for (i = 0; i < n_fds; i++)
1356 {
1357 DBusPollFD *fdp = &fds[i];
1358 WSANETWORKEVENTS ne;
1359
1360 fdp->revents = 0;
1361
1362 WSAEnumNetworkEvents (fdp->fd.sock, pEvents[i], &ne);
1363
1364 if (ne.lNetworkEvents & (FD_READ | FD_ACCEPT | FD_CLOSE))
1365 fdp->revents |= _DBUS_POLLIN;
1366
1367 if (ne.lNetworkEvents & (FD_WRITE | FD_CONNECT))
1368 fdp->revents |= _DBUS_POLLOUT;
1369
1370 if (ne.lNetworkEvents & (FD_OOB))
1371 fdp->revents |= _DBUS_POLLERR;
1372
1373 if(ne.lNetworkEvents)
1374 ret++;
1375
1376 WSAEventSelect (fdp->fd.sock, pEvents[i], 0);
1377 }
1378#ifdef DBUS_ENABLE_VERBOSE_MODE
1379 _dbus_verbose ("_dbus_poll: to=%d", timeout_milliseconds);
1380 if (!_dbus_dump_fd_revents (fds, n_fds))
1381 {
1382 _dbus_win_set_errno (ENOMEM);
1383 ret = -1;
1384 goto oom;
1385 }
1386#endif
1387 }
1388 else
1389 {
1390 _dbus_verbose ("WSAWaitForMultipleEvents: failed for unknown reason!");
1391 ret = -1;
1392 }
1393
1394oom:
1395 if (pEvents != NULL)
1396 {
1397 for (i = 0; i < n_fds; i++)
1398 {
1399 if (pEvents[i] != WSA_INVALID_EVENT)
1400 WSACloseEvent (pEvents[i]);
1401 }
1402 if (n_fds > DBUS_STACK_WSAEVENTS)
1403 free (pEvents);
1404 }
1405
1406 return ret;
1407}
1408#else
1417static int
1418_dbus_poll_select (DBusPollFD *fds,
1419 int n_fds,
1420 int timeout_milliseconds)
1421{
1422 fd_set read_set, write_set, err_set;
1423 SOCKET max_fd = 0;
1424 int i;
1425 struct timeval tv;
1426 int ready;
1427
1428 FD_ZERO (&read_set);
1429 FD_ZERO (&write_set);
1430 FD_ZERO (&err_set);
1431#ifdef DBUS_ENABLE_VERBOSE_MODE
1432 _dbus_verbose("_dbus_poll: to=%d\n", timeout_milliseconds);
1433 if (!_dbus_dump_fd_events (fds, n_fds))
1434 {
1435 ready = -1;
1436 goto oom;
1437 }
1438#endif
1439
1440 for (i = 0; i < n_fds; i++)
1441 {
1442 DBusPollFD *fdp = &fds[i];
1443
1444 if (fdp->events & _DBUS_POLLIN)
1445 FD_SET (fdp->fd.sock, &read_set);
1446
1447 if (fdp->events & _DBUS_POLLOUT)
1448 FD_SET (fdp->fd.sock, &write_set);
1449
1450 FD_SET (fdp->fd.sock, &err_set);
1451
1452 max_fd = MAX (max_fd, fdp->fd.sock);
1453 }
1454
1455 // Avoid random lockups with send(), for lack of a better solution so far
1456 tv.tv_sec = timeout_milliseconds < 0 ? 1 : timeout_milliseconds / 1000;
1457 tv.tv_usec = timeout_milliseconds < 0 ? 0 : (timeout_milliseconds % 1000) * 1000;
1458
1459 ready = select (max_fd + 1, &read_set, &write_set, &err_set, &tv);
1460
1461 if (DBUS_SOCKET_API_RETURNS_ERROR (ready))
1462 {
1463 DBUS_SOCKET_SET_ERRNO ();
1464 if (errno != WSAEWOULDBLOCK)
1465 _dbus_verbose ("select: failed: %s\n", _dbus_strerror_from_errno ());
1466 }
1467 else if (ready == 0)
1468 _dbus_verbose ("select: = 0\n");
1469 else
1470 if (ready > 0)
1471 {
1472#ifdef DBUS_ENABLE_VERBOSE_MODE
1473 _dbus_verbose ("select: to=%d\n", ready);
1474 if (!_dbus_dump_fdset (fds, n_fds, &read_set, &write_set, &err_set))
1475 {
1476 _dbus_win_set_errno (ENOMEM);
1477 ready = -1;
1478 goto oom;
1479 }
1480#endif
1481 for (i = 0; i < n_fds; i++)
1482 {
1483 DBusPollFD *fdp = &fds[i];
1484
1485 fdp->revents = 0;
1486
1487 if (FD_ISSET (fdp->fd.sock, &read_set))
1488 fdp->revents |= _DBUS_POLLIN;
1489
1490 if (FD_ISSET (fdp->fd.sock, &write_set))
1491 fdp->revents |= _DBUS_POLLOUT;
1492
1493 if (FD_ISSET (fdp->fd.sock, &err_set))
1494 fdp->revents |= _DBUS_POLLERR;
1495 }
1496 }
1497oom:
1498 return ready;
1499}
1500#endif
1501
1510int
1512 int n_fds,
1513 int timeout_milliseconds)
1514{
1515#ifdef USE_CHRIS_IMPL
1516 return _dbus_poll_events (fds, n_fds, timeout_milliseconds);
1517#else
1518 return _dbus_poll_select (fds, n_fds, timeout_milliseconds);
1519#endif
1520}
1521
1522/******************************************************************************
1523
1524Original CVS version of dbus-sysdeps.c
1525
1526******************************************************************************/
1527/* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
1528/* dbus-sysdeps.c Wrappers around system/libc features (internal to D-Bus implementation)
1529 *
1530 * Copyright (C) 2002, 2003 Red Hat, Inc.
1531 * Copyright (C) 2003 CodeFactory AB
1532 * Copyright (C) 2005 Novell, Inc.
1533 *
1534 * Licensed under the Academic Free License version 2.1
1535 *
1536 * This program is free software; you can redistribute it and/or modify
1537 * it under the terms of the GNU General Public License as published by
1538 * the Free Software Foundation; either version 2 of the License, or
1539 * (at your option) any later version.
1540 *
1541 * This program is distributed in the hope that it will be useful,
1542 * but WITHOUT ANY WARRANTY; without even the implied warranty of
1543 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
1544 * GNU General Public License for more details.
1545 *
1546 * You should have received a copy of the GNU General Public License
1547 * along with this program; if not, write to the Free Software
1548 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
1549 *
1550 */
1551
1552
1558void
1559_dbus_exit (int code)
1560{
1561 _exit (code);
1562}
1563
1577 const char *port,
1578 const char *family,
1579 DBusError *error)
1580{
1581 return _dbus_connect_tcp_socket_with_nonce (host, port, family, (const char*)NULL, error);
1582}
1583
1585_dbus_connect_tcp_socket_with_nonce (const char *host,
1586 const char *port,
1587 const char *family,
1588 const char *noncefile,
1589 DBusError *error)
1590{
1591 int saved_errno = 0;
1592 DBusList *connect_errors = NULL;
1593 DBusSocket fd = DBUS_SOCKET_INIT;
1594 int res;
1595 struct addrinfo hints;
1596 struct addrinfo *ai = NULL;
1597 const struct addrinfo *tmp;
1598 DBusError *connect_error;
1599
1600 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1601
1602 if (!_dbus_win_startup_winsock ())
1603 {
1604 _DBUS_SET_OOM (error);
1605 return _dbus_socket_get_invalid ();
1606 }
1607
1608 _DBUS_ZERO (hints);
1609
1610 if (!family)
1611 hints.ai_family = AF_UNSPEC;
1612 else if (!strcmp(family, "ipv4"))
1613 hints.ai_family = AF_INET;
1614 else if (!strcmp(family, "ipv6"))
1615 hints.ai_family = AF_INET6;
1616 else
1617 {
1618 dbus_set_error (error,
1620 "Unknown address family %s", family);
1621 return _dbus_socket_get_invalid ();
1622 }
1623 hints.ai_protocol = IPPROTO_TCP;
1624 hints.ai_socktype = SOCK_STREAM;
1625#ifdef AI_ADDRCONFIG
1626 hints.ai_flags = AI_ADDRCONFIG;
1627#else
1628 hints.ai_flags = 0;
1629#endif
1630
1631 if ((res = getaddrinfo(host, port, &hints, &ai)) != 0 || !ai)
1632 {
1633 dbus_set_error (error,
1635 "Failed to lookup host/port: \"%s:%s\": %s (%d)",
1636 host, port, _dbus_strerror (res), res);
1637 goto out;
1638 }
1639
1640 tmp = ai;
1641 while (tmp)
1642 {
1643 if ((fd.sock = socket (tmp->ai_family, SOCK_STREAM, 0)) == INVALID_SOCKET)
1644 {
1645 saved_errno = _dbus_get_low_level_socket_errno ();
1646 dbus_set_error (error,
1647 _dbus_error_from_errno (saved_errno),
1648 "Failed to open socket: %s",
1649 _dbus_strerror (saved_errno));
1650 _dbus_socket_invalidate (&fd);
1651 goto out;
1652 }
1653 _DBUS_ASSERT_ERROR_IS_CLEAR(error);
1654
1655 if (connect (fd.sock, (struct sockaddr*) tmp->ai_addr, tmp->ai_addrlen) == SOCKET_ERROR)
1656 {
1657 saved_errno = _dbus_get_low_level_socket_errno ();
1658 closesocket(fd.sock);
1659 _dbus_socket_invalidate (&fd);
1660
1661 connect_error = dbus_new0 (DBusError, 1);
1662
1663 if (connect_error == NULL)
1664 {
1665 _DBUS_SET_OOM (error);
1666 goto out;
1667 }
1668
1669 dbus_error_init (connect_error);
1670 _dbus_set_error_with_inet_sockaddr (connect_error,
1671 tmp->ai_addr, tmp->ai_addrlen,
1672 "Failed to connect to socket",
1673 saved_errno);
1674
1675 if (!_dbus_list_append (&connect_errors, connect_error))
1676 {
1677 dbus_error_free (connect_error);
1678 dbus_free (connect_error);
1679 _DBUS_SET_OOM (error);
1680 goto out;
1681 }
1682
1683 tmp = tmp->ai_next;
1684 continue;
1685 }
1686
1687 break;
1688 }
1689
1690 if (!_dbus_socket_is_valid (fd))
1691 {
1692 _dbus_combine_tcp_errors (&connect_errors, "Failed to connect",
1693 host, port, error);
1694 goto out;
1695 }
1696
1697 if (noncefile != NULL)
1698 {
1699 DBusString noncefileStr;
1700 dbus_bool_t ret;
1701 _dbus_string_init_const (&noncefileStr, noncefile);
1702 ret = _dbus_send_nonce (fd, &noncefileStr, error);
1703
1704 if (!ret)
1705 {
1706 closesocket (fd.sock);
1707 _dbus_socket_invalidate (&fd);
1708 goto out;
1709 }
1710 }
1711
1712 /* Every SOCKET is also a HANDLE. */
1713 _dbus_win_handle_set_close_on_exec ((HANDLE) fd.sock);
1714
1715 if (!_dbus_set_socket_nonblocking (fd, error))
1716 {
1717 closesocket (fd.sock);
1718 _dbus_socket_invalidate (&fd);
1719 goto out;
1720 }
1721
1722out:
1723 if (ai != NULL)
1724 freeaddrinfo (ai);
1725
1726 while ((connect_error = _dbus_list_pop_first (&connect_errors)))
1727 {
1728 dbus_error_free (connect_error);
1729 dbus_free (connect_error);
1730 }
1731
1732 return fd;
1733}
1734
1750int
1751_dbus_listen_tcp_socket (const char *host,
1752 const char *port,
1753 const char *family,
1754 DBusString *retport,
1755 const char **retfamily,
1756 DBusSocket **fds_p,
1757 DBusError *error)
1758{
1759 int saved_errno;
1760 int nlisten_fd = 0, res, i, port_num = -1;
1761 DBusList *bind_errors = NULL;
1762 DBusError *bind_error = NULL;
1763 DBusSocket *listen_fd = NULL;
1764 struct addrinfo hints;
1765 struct addrinfo *ai, *tmp;
1766 dbus_bool_t have_ipv4 = FALSE;
1767 dbus_bool_t have_ipv6 = FALSE;
1768
1769 // On Vista, sockaddr_gen must be a sockaddr_in6, and not a sockaddr_in6_old
1770 //That's required for family == IPv6(which is the default on Vista if family is not given)
1771 //So we use our own union instead of sockaddr_gen:
1772
1773 typedef union {
1774 struct sockaddr Address;
1775 struct sockaddr_in AddressIn;
1776 struct sockaddr_in6 AddressIn6;
1777 } mysockaddr_gen;
1778
1779 *fds_p = NULL;
1780 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
1781
1782 if (!_dbus_win_startup_winsock ())
1783 {
1784 _DBUS_SET_OOM (error);
1785 return -1;
1786 }
1787
1788 _DBUS_ZERO (hints);
1789
1790 if (!family)
1791 hints.ai_family = AF_UNSPEC;
1792 else if (!strcmp(family, "ipv4"))
1793 hints.ai_family = AF_INET;
1794 else if (!strcmp(family, "ipv6"))
1795 hints.ai_family = AF_INET6;
1796 else
1797 {
1798 dbus_set_error (error,
1800 "Unknown address family %s", family);
1801 return -1;
1802 }
1803
1804 hints.ai_protocol = IPPROTO_TCP;
1805 hints.ai_socktype = SOCK_STREAM;
1806#ifdef AI_ADDRCONFIG
1807 hints.ai_flags = AI_ADDRCONFIG | AI_PASSIVE;
1808#else
1809 hints.ai_flags = AI_PASSIVE;
1810#endif
1811
1812 redo_lookup_with_port:
1813 ai = NULL;
1814 if ((res = getaddrinfo(host, port, &hints, &ai)) != 0 || !ai)
1815 {
1816 dbus_set_error (error,
1818 "Failed to lookup host/port: \"%s:%s\": %s (%d)",
1819 host ? host : "*", port, _dbus_strerror(res), res);
1820 return -1;
1821 }
1822
1823 tmp = ai;
1824 while (tmp)
1825 {
1826 const int reuseaddr = 1, tcp_nodelay_on = 1;
1827 DBusSocket fd = DBUS_SOCKET_INIT, *newlisten_fd;
1828
1829 if ((fd.sock = socket (tmp->ai_family, SOCK_STREAM, 0)) == INVALID_SOCKET)
1830 {
1831 saved_errno = _dbus_get_low_level_socket_errno ();
1832 dbus_set_error (error,
1833 _dbus_error_from_errno (saved_errno),
1834 "Failed to open socket: %s",
1835 _dbus_strerror (saved_errno));
1836 goto failed;
1837 }
1838 _DBUS_ASSERT_ERROR_IS_CLEAR(error);
1839
1840 if (setsockopt (fd.sock, SOL_SOCKET, SO_REUSEADDR, (const char *)&reuseaddr, sizeof(reuseaddr)) == SOCKET_ERROR)
1841 {
1842 saved_errno = _dbus_get_low_level_socket_errno ();
1843 _dbus_warn ("Failed to set socket option \"%s:%s\": %s",
1844 host ? host : "*", port, _dbus_strerror (saved_errno));
1845 }
1846
1847 /* Nagle's algorithm imposes a huge delay on the initial messages
1848 going over TCP. */
1849 if (setsockopt (fd.sock, IPPROTO_TCP, TCP_NODELAY, (const char *)&tcp_nodelay_on, sizeof (tcp_nodelay_on)) == SOCKET_ERROR)
1850 {
1851 saved_errno = _dbus_get_low_level_socket_errno ();
1852 _dbus_warn ("Failed to set TCP_NODELAY socket option \"%s:%s\": %s",
1853 host ? host : "*", port, _dbus_strerror (saved_errno));
1854 }
1855
1856 if (bind (fd.sock, (struct sockaddr*) tmp->ai_addr, tmp->ai_addrlen) == SOCKET_ERROR)
1857 {
1858 saved_errno = _dbus_get_low_level_socket_errno ();
1859 closesocket (fd.sock);
1860
1861 /*
1862 * We don't treat this as a fatal error, because there might be
1863 * other addresses that we can listen on. In particular:
1864 *
1865 * - If saved_errno is WSAEADDRINUSE after we
1866 * "goto redo_lookup_with_port" after binding a port on one of the
1867 * possible addresses, we will try to bind that same port on
1868 * every address, including the same address again for a second
1869 * time, which will fail with WSAEADDRINUSE .
1870 *
1871 * - If saved_errno is WSAEADDRINUSE, it might be because binding to
1872 * an IPv6 address implicitly binds to a corresponding IPv4
1873 * address or vice versa.
1874 *
1875 * - If saved_errno is WSAEADDRNOTAVAIL when we asked for family
1876 * AF_UNSPEC, it might be because IPv6 is disabled for this
1877 * particular interface.
1878 */
1879 bind_error = dbus_new0 (DBusError, 1);
1880
1881 if (bind_error == NULL)
1882 {
1883 _DBUS_SET_OOM (error);
1884 goto failed;
1885 }
1886
1887 dbus_error_init (bind_error);
1888 _dbus_set_error_with_inet_sockaddr (bind_error, tmp->ai_addr, tmp->ai_addrlen,
1889 "Failed to bind socket",
1890 saved_errno);
1891
1892 if (!_dbus_list_append (&bind_errors, bind_error))
1893 {
1894 dbus_error_free (bind_error);
1895 dbus_free (bind_error);
1896 _DBUS_SET_OOM (error);
1897 goto failed;
1898 }
1899
1900 /* Try the next address, maybe it will work better */
1901 tmp = tmp->ai_next;
1902 continue;
1903 }
1904
1905 if (listen (fd.sock, 30 /* backlog */) == SOCKET_ERROR)
1906 {
1907 saved_errno = _dbus_get_low_level_socket_errno ();
1908 closesocket (fd.sock);
1909 _dbus_set_error_with_inet_sockaddr (error, tmp->ai_addr, tmp->ai_addrlen,
1910 "Failed to listen on socket",
1911 saved_errno);
1912 goto failed;
1913 }
1914
1915 newlisten_fd = dbus_realloc(listen_fd, sizeof(DBusSocket)*(nlisten_fd+1));
1916 if (!newlisten_fd)
1917 {
1918 closesocket (fd.sock);
1920 "Failed to allocate file handle array");
1921 goto failed;
1922 }
1923 listen_fd = newlisten_fd;
1924 listen_fd[nlisten_fd] = fd;
1925 nlisten_fd++;
1926
1927 if (tmp->ai_addr->sa_family == AF_INET)
1928 have_ipv4 = TRUE;
1929 else if (tmp->ai_addr->sa_family == AF_INET6)
1930 have_ipv6 = TRUE;
1931
1932 if (!_dbus_string_get_length(retport))
1933 {
1934 /* If the user didn't specify a port, or used 0, then
1935 the kernel chooses a port. After the first address
1936 is bound to, we need to force all remaining addresses
1937 to use the same port */
1938 if (!port || !strcmp(port, "0"))
1939 {
1940 mysockaddr_gen addr;
1941 socklen_t addrlen = sizeof(addr);
1942 char portbuf[NI_MAXSERV];
1943
1944 if (getsockname (fd.sock, &addr.Address, &addrlen) == SOCKET_ERROR ||
1945 (res = getnameinfo (&addr.Address, addrlen, NULL, 0,
1946 portbuf, sizeof(portbuf),
1947 NI_NUMERICSERV)) != 0)
1948 {
1949 saved_errno = _dbus_get_low_level_socket_errno ();
1950 dbus_set_error (error, _dbus_error_from_errno (saved_errno),
1951 "Failed to resolve port \"%s:%s\": %s",
1952 host ? host : "*", port, _dbus_strerror (saved_errno));
1953 goto failed;
1954 }
1955 if (!_dbus_string_append(retport, portbuf))
1956 {
1958 goto failed;
1959 }
1960
1961 /* Release current address list & redo lookup */
1962 port = _dbus_string_get_const_data(retport);
1963 freeaddrinfo(ai);
1964 goto redo_lookup_with_port;
1965 }
1966 else
1967 {
1968 if (!_dbus_string_append(retport, port))
1969 {
1971 goto failed;
1972 }
1973 }
1974 }
1975
1976 tmp = tmp->ai_next;
1977 }
1978 freeaddrinfo(ai);
1979 ai = NULL;
1980
1981 if (!nlisten_fd)
1982 {
1983 _dbus_combine_tcp_errors (&bind_errors, "Failed to bind", host, port, error);
1984 goto failed;
1985 }
1986
1987 if (have_ipv4 && !have_ipv6)
1988 *retfamily = "ipv4";
1989 else if (!have_ipv4 && have_ipv6)
1990 *retfamily = "ipv6";
1991
1992 sscanf(_dbus_string_get_const_data(retport), "%d", &port_num);
1993
1994 for (i = 0 ; i < nlisten_fd ; i++)
1995 {
1996 _dbus_win_handle_set_close_on_exec ((HANDLE) listen_fd[i].sock);
1997 if (!_dbus_set_socket_nonblocking (listen_fd[i], error))
1998 {
1999 goto failed;
2000 }
2001 }
2002
2003 *fds_p = listen_fd;
2004
2005 /* This list might be non-empty even on success, because we might be
2006 * ignoring WSAEADDRINUSE or WSAEADDRNOTAVAIL */
2007 while ((bind_error = _dbus_list_pop_first (&bind_errors)))
2008 {
2009 dbus_error_free (bind_error);
2010 dbus_free (bind_error);
2011 }
2012 return nlisten_fd;
2013
2014 failed:
2015 if (ai)
2016 freeaddrinfo(ai);
2017 for (i = 0 ; i < nlisten_fd ; i++)
2018 closesocket (listen_fd[i].sock);
2019
2020 while ((bind_error = _dbus_list_pop_first (&bind_errors)))
2021 {
2022 dbus_error_free (bind_error);
2023 dbus_free (bind_error);
2024 }
2025
2026 dbus_free(listen_fd);
2027 return -1;
2028}
2029
2030
2040{
2041 DBusSocket client_fd;
2042
2043 retry:
2044 client_fd.sock = accept (listen_fd.sock, NULL, NULL);
2045
2046 if (!_dbus_socket_is_valid (client_fd))
2047 {
2048 DBUS_SOCKET_SET_ERRNO ();
2049 if (errno == EINTR)
2050 goto retry;
2051 }
2052
2053 _dbus_verbose ("client fd %Iu accepted\n", client_fd.sock);
2054
2055 return client_fd;
2056}
2057
2058
2059
2060
2063 DBusError *error)
2064{
2065/* FIXME: for the session bus credentials shouldn't matter (?), but
2066 * for the system bus they are presumably essential. A rough outline
2067 * of a way to implement the credential transfer would be this:
2068 *
2069 * client waits to *read* a byte.
2070 *
2071 * server creates a named pipe with a random name, sends a byte
2072 * contining its length, and its name.
2073 *
2074 * client reads the name, connects to it (using Win32 API).
2075 *
2076 * server waits for connection to the named pipe, then calls
2077 * ImpersonateNamedPipeClient(), notes its now-current credentials,
2078 * calls RevertToSelf(), closes its handles to the named pipe, and
2079 * is done. (Maybe there is some other way to get the SID of a named
2080 * pipe client without having to use impersonation?)
2081 *
2082 * client closes its handles and is done.
2083 *
2084 * Ralf: Why not sending credentials over the given this connection ?
2085 * Using named pipes makes it impossible to be connected from a unix client.
2086 *
2087 */
2088 int bytes_written;
2089 DBusString buf;
2090
2091 _dbus_string_init_const_len (&buf, "\0", 1);
2092again:
2093 bytes_written = _dbus_write_socket (handle, &buf, 0, 1 );
2094
2095 if (bytes_written < 0 && errno == EINTR)
2096 goto again;
2097
2098 if (bytes_written < 0)
2099 {
2100 dbus_set_error (error, _dbus_error_from_errno (errno),
2101 "Failed to write credentials byte: %s",
2103 return FALSE;
2104 }
2105 else if (bytes_written == 0)
2106 {
2108 "wrote zero bytes writing credentials byte");
2109 return FALSE;
2110 }
2111 else
2112 {
2113 _dbus_assert (bytes_written == 1);
2114 _dbus_verbose ("wrote 1 zero byte, credential sending isn't implemented yet\n");
2115 return TRUE;
2116 }
2117 return TRUE;
2118}
2119
2140 DBusCredentials *credentials,
2141 DBusError *error)
2142{
2143 int bytes_read = 0;
2144 DBusString buf;
2145
2146 char *sid = NULL;
2147 dbus_pid_t pid;
2148 int retval = FALSE;
2149
2150 // could fail due too OOM
2151 if (_dbus_string_init (&buf))
2152 {
2153 bytes_read = _dbus_read_socket (handle, &buf, 1 );
2154
2155 if (bytes_read > 0)
2156 _dbus_verbose ("got one zero byte from server\n");
2157
2158 _dbus_string_free (&buf);
2159 }
2160
2161 pid = _dbus_get_peer_pid_from_tcp_handle (handle.sock);
2162 if (pid == 0)
2163 return TRUE;
2164
2165 _dbus_credentials_add_pid (credentials, pid);
2166
2167 if (_dbus_getsid (&sid, pid))
2168 {
2169 if (!_dbus_credentials_add_windows_sid (credentials, sid))
2170 goto out;
2171 }
2172
2173 retval = TRUE;
2174
2175out:
2176 if (sid)
2177 LocalFree (sid);
2178
2179 return retval;
2180}
2181
2192{
2193 /* TODO */
2194 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2195 return TRUE;
2196}
2197
2198
2211 const DBusString *next_component)
2212{
2213 dbus_bool_t dir_ends_in_slash;
2214 dbus_bool_t file_starts_with_slash;
2215
2216 if (_dbus_string_get_length (dir) == 0 ||
2217 _dbus_string_get_length (next_component) == 0)
2218 return TRUE;
2219
2220 dir_ends_in_slash =
2221 ('/' == _dbus_string_get_byte (dir, _dbus_string_get_length (dir) - 1) ||
2222 '\\' == _dbus_string_get_byte (dir, _dbus_string_get_length (dir) - 1));
2223
2224 file_starts_with_slash =
2225 ('/' == _dbus_string_get_byte (next_component, 0) ||
2226 '\\' == _dbus_string_get_byte (next_component, 0));
2227
2228 if (dir_ends_in_slash && file_starts_with_slash)
2229 {
2230 _dbus_string_shorten (dir, 1);
2231 }
2232 else if (!(dir_ends_in_slash || file_starts_with_slash))
2233 {
2234 if (!_dbus_string_append_byte (dir, '\\'))
2235 return FALSE;
2236 }
2237
2238 return _dbus_string_copy (next_component, 0, dir,
2239 _dbus_string_get_length (dir));
2240}
2241
2242/*---------------- DBusCredentials ----------------------------------*/
2243
2253 const DBusString *username,
2254 DBusCredentialsAddFlags flags,
2255 DBusError *error)
2256{
2257 if (!_dbus_credentials_add_windows_sid (credentials,
2258 _dbus_string_get_const_data (username)))
2259 {
2260 _DBUS_SET_OOM (error);
2261 return FALSE;
2262 }
2263
2264 return TRUE;
2265}
2266
2277{
2278 dbus_bool_t retval = FALSE;
2279 char *sid = NULL;
2280
2281 if (!_dbus_getsid(&sid, _dbus_getpid()))
2282 goto failed;
2283
2284 if (!_dbus_credentials_add_pid (credentials, _dbus_getpid()))
2285 goto failed;
2286
2287 if (!_dbus_credentials_add_windows_sid (credentials,sid))
2288 goto failed;
2289
2290 retval = TRUE;
2291 goto end;
2292failed:
2293 retval = FALSE;
2294end:
2295 if (sid)
2296 LocalFree(sid);
2297
2298 return retval;
2299}
2300
2315{
2316 dbus_bool_t retval = FALSE;
2317 char *sid = NULL;
2318
2319 if (!_dbus_getsid(&sid, _dbus_getpid()))
2320 return FALSE;
2321
2322 retval = _dbus_string_append (str,sid);
2323
2324 LocalFree(sid);
2325 return retval;
2326}
2327
2334{
2335 return GetCurrentProcessId ();
2336}
2337
2343{
2344 return DBUS_UID_UNSET;
2345}
2346
2348#define NANOSECONDS_PER_SECOND 1000000000
2350#define MICROSECONDS_PER_SECOND 1000000
2352#define MILLISECONDS_PER_SECOND 1000
2354#define NANOSECONDS_PER_MILLISECOND 1000000
2356#define MICROSECONDS_PER_MILLISECOND 1000
2357
2362void
2364{
2365 Sleep (milliseconds);
2366}
2367
2368
2376void
2378 long *tv_usec)
2379{
2380 FILETIME ft;
2381 dbus_uint64_t time64;
2382
2383 GetSystemTimeAsFileTime (&ft);
2384
2385 memcpy (&time64, &ft, sizeof (time64));
2386
2387 /* Convert from 100s of nanoseconds since 1601-01-01
2388 * to Unix epoch. Yes, this is Y2038 unsafe.
2389 */
2390 time64 -= DBUS_INT64_CONSTANT (116444736000000000);
2391 time64 /= 10;
2392
2393 if (tv_sec)
2394 *tv_sec = time64 / 1000000;
2395
2396 if (tv_usec)
2397 *tv_usec = time64 % 1000000;
2398}
2399
2407void
2409 long *tv_usec)
2410{
2411 /* no implementation yet, fall back to wall-clock time */
2412 _dbus_get_real_time (tv_sec, tv_usec);
2413}
2414
2418void
2420{
2421}
2422
2433 DBusError *error)
2434{
2435 const char *filename_c;
2436
2437 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2438
2439 filename_c = _dbus_string_get_const_data (filename);
2440
2441 if (!CreateDirectoryA (filename_c, NULL))
2442 {
2444 "Failed to create directory %s: %s\n",
2445 filename_c, _dbus_strerror_from_errno ());
2446 return FALSE;
2447 }
2448 else
2449 return TRUE;
2450}
2451
2462 DBusError *error)
2463{
2464 const char *filename_c;
2465
2466 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2467
2468 filename_c = _dbus_string_get_const_data (filename);
2469
2470 if (!CreateDirectoryA (filename_c, NULL))
2471 {
2472 if (GetLastError () == ERROR_ALREADY_EXISTS)
2473 return TRUE;
2474
2476 "Failed to create directory %s: %s\n",
2477 filename_c, _dbus_strerror_from_errno ());
2478 return FALSE;
2479 }
2480 else
2481 return TRUE;
2482}
2483
2484
2496 int n_bytes,
2497 DBusError *error)
2498{
2499 int old_len;
2500 unsigned char *p;
2501 HCRYPTPROV hprov;
2502
2503 old_len = _dbus_string_get_length (str);
2504
2505 if (!_dbus_string_lengthen (str, n_bytes))
2506 {
2507 _DBUS_SET_OOM (error);
2508 return FALSE;
2509 }
2510
2511 p = _dbus_string_get_udata_len (str, old_len, n_bytes);
2512
2513 if (!CryptAcquireContext (&hprov, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT))
2514 {
2515 _DBUS_SET_OOM (error);
2516 return FALSE;
2517 }
2518
2519 if (!CryptGenRandom (hprov, n_bytes, p))
2520 {
2521 _DBUS_SET_OOM (error);
2522 CryptReleaseContext (hprov, 0);
2523 return FALSE;
2524 }
2525
2526 CryptReleaseContext (hprov, 0);
2527
2528 return TRUE;
2529}
2530
2537const char*
2539{
2540 /* Protected by _DBUS_LOCK_sysdeps */
2541 static const char* tmpdir = NULL;
2542 static char buf[1000];
2543
2544 if (!_DBUS_LOCK (sysdeps))
2545 return NULL;
2546
2547 if (tmpdir == NULL)
2548 {
2549 unsigned char *last_slash;
2550 unsigned char *p = (unsigned char *)buf;
2551
2552 if (!GetTempPathA (sizeof (buf), buf))
2553 {
2554 _dbus_warn ("GetTempPath failed");
2555 _dbus_abort ();
2556 }
2557
2558 /* Drop terminating backslash or slash */
2559 last_slash = _mbsrchr (p, '\\');
2560 if (last_slash > p && last_slash[1] == '\0')
2561 last_slash[0] = '\0';
2562 last_slash = _mbsrchr (p, '/');
2563 if (last_slash > p && last_slash[1] == '\0')
2564 last_slash[0] = '\0';
2565
2566 tmpdir = buf;
2567 }
2568
2569 _DBUS_UNLOCK (sysdeps);
2570
2571 _dbus_assert(tmpdir != NULL);
2572
2573 return tmpdir;
2574}
2575
2576
2587 DBusError *error)
2588{
2589 const char *filename_c;
2590
2591 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
2592
2593 filename_c = _dbus_string_get_const_data (filename);
2594
2595 if (DeleteFileA (filename_c) == 0)
2596 {
2598 "Failed to delete file %s: %s\n",
2599 filename_c, _dbus_strerror_from_errno ());
2600 return FALSE;
2601 }
2602 else
2603 return TRUE;
2604}
2605
2606#if !defined (DBUS_DISABLE_ASSERT) || defined(DBUS_ENABLE_EMBEDDED_TESTS)
2607
2608#if defined(_MSC_VER) || defined(DBUS_WINCE)
2609# ifdef BACKTRACES
2610# undef BACKTRACES
2611# endif
2612#else
2613# define BACKTRACES
2614#endif
2615
2616#ifdef BACKTRACES
2617/*
2618 * Backtrace Generator
2619 *
2620 * Copyright 2004 Eric Poech
2621 * Copyright 2004 Robert Shearman
2622 *
2623 * This library is free software; you can redistribute it and/or
2624 * modify it under the terms of the GNU Lesser General Public
2625 * License as published by the Free Software Foundation; either
2626 * version 2.1 of the License, or (at your option) any later version.
2627 *
2628 * This library is distributed in the hope that it will be useful,
2629 * but WITHOUT ANY WARRANTY; without even the implied warranty of
2630 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
2631 * Lesser General Public License for more details.
2632 *
2633 * You should have received a copy of the GNU Lesser General Public
2634 * License along with this library; if not, write to the Free Software
2635 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
2636 */
2637
2638#include <winver.h>
2639#include <imagehlp.h>
2640#include <stdio.h>
2641
2642#define DPRINTF(fmt, ...) fprintf (stderr, fmt, ##__VA_ARGS__)
2643
2644#ifdef _MSC_VER
2645#define BOOL int
2646
2647#define __i386__
2648#endif
2649
2650static void dump_backtrace_for_thread (HANDLE hThread)
2651{
2652 ADDRESS old_address;
2653 STACKFRAME sf;
2654 CONTEXT context;
2655 DWORD dwImageType;
2656 int i = 0;
2657
2658 SymSetOptions (SYMOPT_UNDNAME | SYMOPT_LOAD_LINES);
2659 SymInitialize (GetCurrentProcess (), NULL, TRUE);
2660
2661
2662 /* can't use this function for current thread as GetThreadContext
2663 * doesn't support getting context from current thread */
2664 if (hThread == GetCurrentThread())
2665 return;
2666
2667 DPRINTF ("Backtrace:\n");
2668
2669 _DBUS_ZERO (old_address);
2670 _DBUS_ZERO (context);
2671 context.ContextFlags = CONTEXT_FULL;
2672
2673 SuspendThread (hThread);
2674
2675 if (!GetThreadContext (hThread, &context))
2676 {
2677 DPRINTF ("Couldn't get thread context (error %ld)\n", GetLastError ());
2678 ResumeThread (hThread);
2679 return;
2680 }
2681
2682 _DBUS_ZERO (sf);
2683
2684#ifdef __i386__
2685 dwImageType = IMAGE_FILE_MACHINE_I386;
2686 sf.AddrFrame.Offset = context.Ebp;
2687 sf.AddrFrame.Mode = AddrModeFlat;
2688 sf.AddrPC.Offset = context.Eip;
2689 sf.AddrPC.Mode = AddrModeFlat;
2690#elif defined(_M_X64)
2691 dwImageType = IMAGE_FILE_MACHINE_AMD64;
2692 sf.AddrPC.Offset = context.Rip;
2693 sf.AddrPC.Mode = AddrModeFlat;
2694 sf.AddrFrame.Offset = context.Rsp;
2695 sf.AddrFrame.Mode = AddrModeFlat;
2696 sf.AddrStack.Offset = context.Rsp;
2697 sf.AddrStack.Mode = AddrModeFlat;
2698#elif defined(_M_IA64)
2699 dwImageType = IMAGE_FILE_MACHINE_IA64;
2700 sf.AddrPC.Offset = context.StIIP;
2701 sf.AddrPC.Mode = AddrModeFlat;
2702 sf.AddrFrame.Offset = context.IntSp;
2703 sf.AddrFrame.Mode = AddrModeFlat;
2704 sf.AddrBStore.Offset= context.RsBSP;
2705 sf.AddrBStore.Mode = AddrModeFlat;
2706 sf.AddrStack.Offset = context.IntSp;
2707 sf.AddrStack.Mode = AddrModeFlat;
2708#else
2709# error You need to fill in the STACKFRAME structure for your architecture
2710#endif
2711
2712 /*
2713 backtrace format
2714 <level> <address> <symbol>[+offset] [ '[' <file> ':' <line> ']' ] [ 'in' <module> ]
2715 example:
2716 6 0xf75ade6b wine_switch_to_stack+0x2a [/usr/src/debug/wine-snapshot/libs/wine/port.c:59] in libwine.so.1
2717 */
2718 while (StackWalk (dwImageType, GetCurrentProcess (),
2719 hThread, &sf, &context, NULL, SymFunctionTableAccess,
2720 SymGetModuleBase, NULL))
2721 {
2722 char buffer[sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(char)];
2723 PSYMBOL_INFO pSymbol = (PSYMBOL_INFO)buffer;
2724 DWORD64 displacement;
2725 IMAGEHLP_LINE line;
2726 DWORD dwDisplacement;
2727 IMAGEHLP_MODULE moduleInfo;
2728
2729 /*
2730 on Wine64 version 1.7.54, we get an infinite number of stack entries
2731 pointing to the same stack frame (_start+0x29 in <wine-loader>)
2732 see bug https://bugs.winehq.org/show_bug.cgi?id=39606
2733 */
2734#ifndef __i386__
2735 if (old_address.Offset == sf.AddrPC.Offset)
2736 {
2737 break;
2738 }
2739#endif
2740
2741 pSymbol->SizeOfStruct = sizeof(SYMBOL_INFO);
2742 pSymbol->MaxNameLen = MAX_SYM_NAME;
2743
2744 if (SymFromAddr (GetCurrentProcess (), sf.AddrPC.Offset, &displacement, pSymbol))
2745 {
2746 if (displacement)
2747 DPRINTF ("%3d %s+0x%I64x", i++, pSymbol->Name, displacement);
2748 else
2749 DPRINTF ("%3d %s", i++, pSymbol->Name);
2750 }
2751 else
2752 DPRINTF ("%3d 0x%Ix", i++, sf.AddrPC.Offset);
2753
2754 line.SizeOfStruct = sizeof(IMAGEHLP_LINE);
2755 if (SymGetLineFromAddr (GetCurrentProcess (), sf.AddrPC.Offset, &dwDisplacement, &line))
2756 {
2757 DPRINTF (" [%s:%ld]", line.FileName, line.LineNumber);
2758 }
2759
2760 moduleInfo.SizeOfStruct = sizeof(moduleInfo);
2761 if (SymGetModuleInfo (GetCurrentProcess (), sf.AddrPC.Offset, &moduleInfo))
2762 {
2763 DPRINTF (" in %s", moduleInfo.ModuleName);
2764 }
2765 DPRINTF ("\n");
2766 old_address = sf.AddrPC;
2767 }
2768 ResumeThread (hThread);
2769}
2770
2771static DWORD WINAPI dump_thread_proc (LPVOID lpParameter)
2772{
2773 dump_backtrace_for_thread ((HANDLE) lpParameter);
2774 return 0;
2775}
2776
2777/* cannot get valid context from current thread, so we have to execute
2778 * backtrace from another thread */
2779static void
2780dump_backtrace (void)
2781{
2782 HANDLE hCurrentThread;
2783 HANDLE hThread;
2784 DWORD dwThreadId;
2785 DuplicateHandle (GetCurrentProcess (), GetCurrentThread (),
2786 GetCurrentProcess (), &hCurrentThread,
2787 0, FALSE, DUPLICATE_SAME_ACCESS);
2788 hThread = CreateThread (NULL, 0, dump_thread_proc, (LPVOID)hCurrentThread,
2789 0, &dwThreadId);
2790 WaitForSingleObject (hThread, INFINITE);
2791 CloseHandle (hThread);
2792 CloseHandle (hCurrentThread);
2793}
2794#endif
2795#endif /* asserts or tests enabled */
2796
2797#ifdef BACKTRACES
2799{
2800 dump_backtrace ();
2801}
2802#else
2803void _dbus_print_backtrace (void)
2804{
2805 _dbus_verbose (" D-Bus not compiled with backtrace support\n");
2806}
2807#endif
2808
2809static dbus_uint32_t fromAscii(char ascii)
2810{
2811 if(ascii >= '0' && ascii <= '9')
2812 return ascii - '0';
2813 if(ascii >= 'A' && ascii <= 'F')
2814 return ascii - 'A' + 10;
2815 if(ascii >= 'a' && ascii <= 'f')
2816 return ascii - 'a' + 10;
2817 return 0;
2818}
2819
2821 dbus_bool_t create_if_not_found,
2822 DBusError *error)
2823{
2824#ifdef DBUS_WINCE
2825 return TRUE;
2826 // TODO
2827#else
2828 HW_PROFILE_INFOA info;
2829 char *lpc = &info.szHwProfileGuid[0];
2830 dbus_uint32_t u;
2831
2832 // the hw-profile guid lives long enough
2833 if(!GetCurrentHwProfileA(&info))
2834 {
2835 dbus_set_error (error, DBUS_ERROR_NO_MEMORY, NULL); // FIXME
2836 return FALSE;
2837 }
2838
2839 // Form: {12340001-4980-1920-6788-123456789012}
2840 lpc++;
2841 // 12340001
2842 u = ((fromAscii(lpc[0]) << 0) |
2843 (fromAscii(lpc[1]) << 4) |
2844 (fromAscii(lpc[2]) << 8) |
2845 (fromAscii(lpc[3]) << 12) |
2846 (fromAscii(lpc[4]) << 16) |
2847 (fromAscii(lpc[5]) << 20) |
2848 (fromAscii(lpc[6]) << 24) |
2849 (fromAscii(lpc[7]) << 28));
2850 machine_id->as_uint32s[0] = u;
2851
2852 lpc += 9;
2853 // 4980-1920
2854 u = ((fromAscii(lpc[0]) << 0) |
2855 (fromAscii(lpc[1]) << 4) |
2856 (fromAscii(lpc[2]) << 8) |
2857 (fromAscii(lpc[3]) << 12) |
2858 (fromAscii(lpc[5]) << 16) |
2859 (fromAscii(lpc[6]) << 20) |
2860 (fromAscii(lpc[7]) << 24) |
2861 (fromAscii(lpc[8]) << 28));
2862 machine_id->as_uint32s[1] = u;
2863
2864 lpc += 10;
2865 // 6788-1234
2866 u = ((fromAscii(lpc[0]) << 0) |
2867 (fromAscii(lpc[1]) << 4) |
2868 (fromAscii(lpc[2]) << 8) |
2869 (fromAscii(lpc[3]) << 12) |
2870 (fromAscii(lpc[5]) << 16) |
2871 (fromAscii(lpc[6]) << 20) |
2872 (fromAscii(lpc[7]) << 24) |
2873 (fromAscii(lpc[8]) << 28));
2874 machine_id->as_uint32s[2] = u;
2875
2876 lpc += 9;
2877 // 56789012
2878 u = ((fromAscii(lpc[0]) << 0) |
2879 (fromAscii(lpc[1]) << 4) |
2880 (fromAscii(lpc[2]) << 8) |
2881 (fromAscii(lpc[3]) << 12) |
2882 (fromAscii(lpc[4]) << 16) |
2883 (fromAscii(lpc[5]) << 20) |
2884 (fromAscii(lpc[6]) << 24) |
2885 (fromAscii(lpc[7]) << 28));
2886 machine_id->as_uint32s[3] = u;
2887#endif
2888 return TRUE;
2889}
2890
2891static
2892HANDLE _dbus_global_lock (const char *mutexname)
2893{
2894 HANDLE mutex;
2895 DWORD gotMutex;
2896
2897 mutex = CreateMutexA (NULL, FALSE, mutexname);
2898 if (!mutex)
2899 {
2900 return FALSE;
2901 }
2902
2903 gotMutex = WaitForSingleObject (mutex, INFINITE);
2904 switch (gotMutex)
2905 {
2906 case WAIT_ABANDONED:
2907 ReleaseMutex (mutex);
2908 CloseHandle (mutex);
2909 return 0;
2910 case WAIT_FAILED:
2911 case WAIT_TIMEOUT:
2912 return 0;
2913 default:
2914 return mutex;
2915 }
2916}
2917
2918static
2919void _dbus_global_unlock (HANDLE mutex)
2920{
2921 ReleaseMutex (mutex);
2922 CloseHandle (mutex);
2923}
2924
2925// for proper cleanup in dbus-daemon
2926static HANDLE hDBusDaemonMutex = NULL;
2927static HANDLE hDBusSharedMem = NULL;
2928// sync _dbus_daemon_publish_session_bus_address, _dbus_daemon_unpublish_session_bus_address and _dbus_daemon_already_runs
2929static const char *cUniqueDBusInitMutex = "UniqueDBusInitMutex";
2930// sync _dbus_get_autolaunch_address
2931static const char *cDBusAutolaunchMutex = "DBusAutolaunchMutex";
2932// mutex to determine if dbus-daemon is already started (per user)
2933static const char *cDBusDaemonMutex = "DBusDaemonMutex";
2934// named shm for dbus adress info (per user)
2935static const char *cDBusDaemonAddressInfo = "DBusDaemonAddressInfo";
2936
2947static dbus_bool_t
2948_dbus_get_install_root_as_hash (DBusString *out)
2949{
2950 DBusString install_path;
2951 dbus_bool_t retval = FALSE;
2952 _dbus_assert (out != NULL);
2953
2954 if (!_dbus_string_init (&install_path))
2955 return FALSE;
2956
2957 if (!_dbus_get_install_root (&install_path))
2958 goto out;
2959
2960 /* the install path can't be determined */
2961 if (_dbus_string_get_length (&install_path) == 0)
2962 {
2963 _dbus_string_set_length (out, 0);
2964 retval = TRUE;
2965 goto out;
2966 }
2967
2968 _dbus_string_tolower_ascii (&install_path, 0, _dbus_string_get_length (&install_path));
2969
2970 if (!_dbus_sha_compute (&install_path, out))
2971 goto out;
2972
2973 retval = TRUE;
2974
2975out:
2976 _dbus_string_free (&install_path);
2977 return retval;
2978}
2979
2998static dbus_bool_t
2999_dbus_get_address_string (DBusString *out, const char *basestring, const char *scope)
3000{
3001 _dbus_assert (out != NULL);
3002
3003 if (!scope || strlen (scope) == 0)
3004 {
3005 return _dbus_string_append (out, basestring);
3006 }
3007 else if (strcmp (scope, "*install-path") == 0
3008 // for 1.3 compatibility
3009 || strcmp (scope, "install-path") == 0)
3010 {
3011 DBusString temp;
3012 dbus_bool_t retval = FALSE;
3013
3014 if (!_dbus_string_init (&temp))
3015 return FALSE;
3016
3017 if (!_dbus_get_install_root_as_hash (&temp))
3018 goto out;
3019
3020 if (_dbus_string_get_length (&temp) == 0)
3021 {
3022 _dbus_string_set_length (out, 0);
3023 retval = TRUE;
3024 goto out;
3025 }
3026
3027 if (!_dbus_string_append_printf (out, "%s-%s", basestring, _dbus_string_get_const_data (&temp)))
3028 goto out;
3029
3030 retval = TRUE;
3031out:
3032 _dbus_string_free (&temp);
3033 return retval;
3034 }
3035 else if (strcmp (scope, "*user") == 0)
3036 {
3037 char *sid = NULL;
3038 dbus_bool_t retval;
3039
3040 if (!_dbus_getsid (&sid, _dbus_getpid()))
3041 return FALSE;
3042
3043 retval = _dbus_string_append_printf (out, "%s-%s", basestring, sid);
3044
3045 LocalFree(sid);
3046
3047 return retval;
3048 }
3049 else /* strlen(scope) > 0 */
3050 {
3051 return _dbus_string_append_printf (out, "%s-%s", basestring, scope);
3052 }
3053}
3054
3063static dbus_bool_t
3064_dbus_get_shm_name (DBusString *out,const char *scope)
3065{
3066 return _dbus_get_address_string (out, cDBusDaemonAddressInfo, scope);
3067}
3068
3078static dbus_bool_t
3079_dbus_get_mutex_name (DBusString *out, const char *scope)
3080{
3081 return _dbus_get_address_string (out, cDBusDaemonMutex, scope);
3082}
3083
3085_dbus_daemon_is_session_bus_address_published (const char *scope)
3086{
3087 HANDLE lock;
3088 DBusString mutex_name;
3089
3090 if (!_dbus_string_init (&mutex_name))
3091 return FALSE;
3092
3093 _dbus_verbose ("scope:%s\n", scope);
3094 if (!_dbus_get_mutex_name (&mutex_name, scope) ||
3095 /* not determinable */
3096 _dbus_string_get_length (&mutex_name) == 0)
3097 {
3098 _dbus_string_free (&mutex_name);
3099 return FALSE;
3100 }
3101
3102 if (hDBusDaemonMutex)
3103 {
3104 _dbus_verbose ("(scope:%s) -> yes\n", scope);
3105 return TRUE;
3106 }
3107
3108 // sync _dbus_daemon_publish_session_bus_address, _dbus_daemon_unpublish_session_bus_address and _dbus_daemon_already_runs
3109 lock = _dbus_global_lock (cUniqueDBusInitMutex);
3110
3111 // we use CreateMutex instead of OpenMutex because of possible race conditions,
3112 // see http://msdn.microsoft.com/en-us/library/ms684315%28VS.85%29.aspx
3113 hDBusDaemonMutex = CreateMutexA (NULL, FALSE, _dbus_string_get_const_data(&mutex_name));
3114
3115 /* The client uses mutex ownership to detect a running server, so the server should do so too.
3116 Fortunally the client deletes the mutex in the lock protected area, so checking presence
3117 will work too. */
3118
3119 _dbus_global_unlock (lock);
3120
3121 _dbus_string_free (&mutex_name);
3122
3123 if (hDBusDaemonMutex == NULL)
3124 {
3125 _dbus_verbose ("(scope:%s) -> no\n", scope);
3126 return FALSE;
3127 }
3128 if (GetLastError() == ERROR_ALREADY_EXISTS)
3129 {
3130 CloseHandle(hDBusDaemonMutex);
3131 hDBusDaemonMutex = NULL;
3132 _dbus_verbose ("(scope:%s) -> yes\n", scope);
3133 return TRUE;
3134 }
3135 // mutex wasn't created before, so return false.
3136 // We leave the mutex name allocated for later reusage
3137 // in _dbus_daemon_publish_session_bus_address.
3138 _dbus_verbose ("(scope:%s) -> no\n", scope);
3139 return FALSE;
3140}
3141
3143_dbus_daemon_publish_session_bus_address (const char* address, const char *scope)
3144{
3145 HANDLE lock;
3146 char *shared_addr = NULL;
3147 DBusString shm_name;
3148 DBusString mutex_name;
3149 dbus_uint64_t len;
3150
3151 _dbus_assert (address);
3152
3153 if (!_dbus_string_init (&mutex_name))
3154 return FALSE;
3155
3156 _dbus_verbose ("address:%s scope:%s\n", address, scope);
3157 if (!_dbus_get_mutex_name (&mutex_name, scope) ||
3158 /* not determinable */
3159 _dbus_string_get_length (&mutex_name) == 0)
3160 {
3161 _dbus_string_free (&mutex_name);
3162 return FALSE;
3163 }
3164
3165 // sync _dbus_daemon_publish_session_bus_address, _dbus_daemon_unpublish_session_bus_address and _dbus_daemon_already_runs
3166 lock = _dbus_global_lock (cUniqueDBusInitMutex);
3167
3168 if (!hDBusDaemonMutex)
3169 {
3170 hDBusDaemonMutex = CreateMutexA (NULL, FALSE, _dbus_string_get_const_data(&mutex_name));
3171 }
3172 _dbus_string_free (&mutex_name);
3173
3174 // acquire the mutex
3175 if (WaitForSingleObject (hDBusDaemonMutex, 10) != WAIT_OBJECT_0)
3176 {
3177 _dbus_global_unlock (lock);
3178 CloseHandle (hDBusDaemonMutex);
3179 return FALSE;
3180 }
3181
3182 if (!_dbus_string_init (&shm_name))
3183 {
3184 _dbus_global_unlock (lock);
3185 return FALSE;
3186 }
3187
3188 if (!_dbus_get_shm_name (&shm_name, scope) ||
3189 /* not determinable */
3190 _dbus_string_get_length (&shm_name) == 0)
3191 {
3192 _dbus_string_free (&shm_name);
3193 _dbus_global_unlock (lock);
3194 return FALSE;
3195 }
3196
3197 // create shm
3198 len = strlen (address) + 1;
3199
3200 hDBusSharedMem = CreateFileMappingA ( INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE,
3201 len >> 32, len & 0xffffffffu,
3202 _dbus_string_get_const_data (&shm_name) );
3203 _dbus_assert (hDBusSharedMem);
3204
3205 shared_addr = MapViewOfFile (hDBusSharedMem, FILE_MAP_WRITE, 0, 0, 0);
3206
3207 _dbus_assert (shared_addr);
3208
3209 strcpy(shared_addr, address);
3210
3211 // cleanup
3212 UnmapViewOfFile (shared_addr);
3213
3214 _dbus_global_unlock (lock);
3215 _dbus_verbose ("published session bus address at %s\n",_dbus_string_get_const_data (&shm_name));
3216
3217 _dbus_string_free (&shm_name);
3218 return TRUE;
3219}
3220
3237void
3239{
3240 HANDLE lock;
3241
3242 _dbus_verbose ("\n");
3243 // sync _dbus_daemon_publish_session_bus_address, _dbus_daemon_unpublish_session_bus_address and _dbus_daemon_already_runs
3244 lock = _dbus_global_lock (cUniqueDBusInitMutex);
3245
3246 CloseHandle (hDBusSharedMem);
3247
3248 hDBusSharedMem = NULL;
3249
3250 ReleaseMutex (hDBusDaemonMutex);
3251
3252 CloseHandle (hDBusDaemonMutex);
3253
3254 hDBusDaemonMutex = NULL;
3255
3256 _dbus_global_unlock (lock);
3257}
3258
3259static dbus_bool_t
3260_dbus_get_autolaunch_shm (DBusString *address, DBusString *shm_name)
3261{
3262 HANDLE sharedMem;
3263 char *shared_addr;
3264 int i;
3265
3266 // read shm
3267 for(i=0;i<20;++i) {
3268 // we know that dbus-daemon is available, so we wait until shm is available
3269 sharedMem = OpenFileMappingA (FILE_MAP_READ, FALSE, _dbus_string_get_const_data (shm_name));
3270 if (sharedMem == 0)
3271 Sleep (100);
3272 if ( sharedMem != 0)
3273 break;
3274 }
3275
3276 if (sharedMem == 0)
3277 return FALSE;
3278
3279 shared_addr = MapViewOfFile (sharedMem, FILE_MAP_READ, 0, 0, 0);
3280
3281 if (!shared_addr)
3282 return FALSE;
3283
3284 _dbus_string_init (address);
3285
3286 _dbus_string_append (address, shared_addr);
3287
3288 // cleanup
3289 UnmapViewOfFile (shared_addr);
3290
3291 CloseHandle (sharedMem);
3292
3293 return TRUE;
3294}
3295
3296static dbus_bool_t
3297_dbus_daemon_already_runs (DBusString *address, DBusString *shm_name, const char *scope)
3298{
3299 HANDLE lock;
3300 HANDLE daemon;
3301 DBusString mutex_name;
3302 dbus_bool_t bRet = TRUE;
3303
3304 if (!_dbus_string_init (&mutex_name))
3305 return FALSE;
3306
3307 if (!_dbus_get_mutex_name (&mutex_name,scope) ||
3308 /* not determinable */
3309 _dbus_string_get_length (&mutex_name) == 0)
3310 {
3311 _dbus_string_free (&mutex_name);
3312 return FALSE;
3313 }
3314
3315 // sync _dbus_daemon_publish_session_bus_address, _dbus_daemon_unpublish_session_bus_address and _dbus_daemon_already_runs
3316 lock = _dbus_global_lock (cUniqueDBusInitMutex);
3317
3318 // do checks
3319 daemon = CreateMutexA (NULL, FALSE, _dbus_string_get_const_data (&mutex_name));
3320 if(WaitForSingleObject (daemon, 10) != WAIT_TIMEOUT)
3321 {
3322 ReleaseMutex (daemon);
3323 CloseHandle (daemon);
3324
3325 _dbus_global_unlock (lock);
3326 _dbus_string_free (&mutex_name);
3327 return FALSE;
3328 }
3329
3330 // read shm
3331 bRet = _dbus_get_autolaunch_shm (address, shm_name);
3332
3333 // cleanup
3334 CloseHandle (daemon);
3335
3336 _dbus_global_unlock (lock);
3337 _dbus_string_free (&mutex_name);
3338
3339 return bRet;
3340}
3341
3344 DBusString *address,
3345 DBusError *error)
3346{
3347 HANDLE mutex = NULL;
3348 STARTUPINFOA si;
3349 PROCESS_INFORMATION pi;
3350 dbus_bool_t retval = FALSE;
3351 LPSTR lpFile;
3352 char dbus_exe_path[MAX_PATH];
3353 DBusString dbus_args = _DBUS_STRING_INIT_INVALID;
3354 const char * daemon_name = DBUS_DAEMON_NAME ".exe";
3355 DBusString shm_name;
3356
3357 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
3358
3359 if (!_dbus_string_init (&shm_name))
3360 {
3361 _DBUS_SET_OOM(error);
3362 return FALSE;
3363 }
3364
3365 if (!_dbus_get_shm_name (&shm_name, scope) ||
3366 /* not determinable */
3367 _dbus_string_get_length (&shm_name) == 0)
3368 {
3369 dbus_set_error_const (error, DBUS_ERROR_FAILED, "could not determine shm name");
3370 goto out;
3371 }
3372
3373 mutex = _dbus_global_lock (cDBusAutolaunchMutex);
3374
3375 if (_dbus_daemon_already_runs (address, &shm_name, scope))
3376 {
3377 _dbus_verbose ("found running dbus daemon for scope '%s' at %s\n",
3378 scope ? scope : "", _dbus_string_get_const_data (&shm_name) );
3379 retval = TRUE;
3380 goto out;
3381 }
3382
3383 if (!SearchPathA (NULL, daemon_name, NULL, sizeof(dbus_exe_path), dbus_exe_path, &lpFile))
3384 {
3385 // Look in directory containing dbus shared library
3386 HMODULE hmod;
3387 char dbus_module_path[MAX_PATH];
3388 DWORD rc;
3389
3390 _dbus_verbose ("did not found dbus daemon executable on default search path, "
3391 "trying path where dbus shared library is located");
3392
3393 hmod = _dbus_win_get_dll_hmodule ();
3394 rc = GetModuleFileNameA (hmod, dbus_module_path, sizeof(dbus_module_path));
3395 if (rc <= 0)
3396 {
3397 dbus_set_error_const (error, DBUS_ERROR_FAILED, "could not retrieve dbus shared library file name");
3398 retval = FALSE;
3399 goto out;
3400 }
3401 else
3402 {
3403 char *ext_idx = strrchr (dbus_module_path, '\\');
3404 if (ext_idx)
3405 *ext_idx = '\0';
3406 if (!SearchPathA (dbus_module_path, daemon_name, NULL, sizeof(dbus_exe_path), dbus_exe_path, &lpFile))
3407 {
3409 "Could not find dbus-daemon executable. "
3410 "Please add the path to %s to your PATH "
3411 "environment variable or start the daemon manually",
3412 daemon_name);
3413 retval = FALSE;
3414 goto out;
3415 }
3416 _dbus_verbose ("found dbus daemon executable at %s", dbus_module_path);
3417 }
3418 }
3419
3420
3421 // Create process
3422 ZeroMemory (&si, sizeof(si));
3423 si.cb = sizeof (si);
3424 ZeroMemory (&pi, sizeof(pi));
3425
3426 if (!_dbus_string_init (&dbus_args))
3427 {
3428 dbus_set_error_const (error, DBUS_ERROR_NO_MEMORY, "Failed to initialize argument buffer");
3429 retval = FALSE;
3430 goto out;
3431 }
3432
3433 if (!_dbus_string_append_printf (&dbus_args, "\"%s\" --session", dbus_exe_path))
3434 {
3435 dbus_set_error_const (error, DBUS_ERROR_NO_MEMORY, "Failed to append string to argument buffer");
3436 retval = FALSE;
3437 goto out;
3438 }
3439
3440// argv[i] = "--config-file=bus\\session.conf";
3441 if(CreateProcessA (dbus_exe_path, _dbus_string_get_data (&dbus_args), NULL, NULL, FALSE, CREATE_NO_WINDOW, NULL, NULL, &si, &pi))
3442 {
3443 CloseHandle (pi.hThread);
3444 CloseHandle (pi.hProcess);
3445 retval = _dbus_get_autolaunch_shm (address, &shm_name);
3446 if (retval == FALSE)
3447 dbus_set_error_const (error, DBUS_ERROR_FAILED, "Failed to get autolaunch address from launched dbus-daemon");
3448 }
3449 else
3450 {
3451 dbus_set_error_const (error, DBUS_ERROR_FAILED, "Failed to launch dbus-daemon");
3452 retval = FALSE;
3453 }
3454
3455out:
3456 _DBUS_ASSERT_ERROR_XOR_BOOL (error, retval);
3457 if (mutex != NULL)
3458 _dbus_global_unlock (mutex);
3459 _dbus_string_free (&shm_name);
3460 _dbus_string_free (&dbus_args);
3461
3462 return retval;
3463 }
3464
3465
3474 DBusError *error)
3475{
3476 // TODO
3477 return TRUE;
3478}
3479
3487dbus_int32_t
3489{
3490 // +/- 1 is needed here!
3491 // no volatile argument with mingw
3492 return InterlockedIncrement (&atomic->value) - 1;
3493}
3494
3502dbus_int32_t
3504{
3505 // +/- 1 is needed here!
3506 // no volatile argument with mingw
3507 return InterlockedDecrement (&atomic->value) + 1;
3508}
3509
3517dbus_int32_t
3519{
3520 /* In this situation, GLib issues a MemoryBarrier() and then returns
3521 * atomic->value. However, mingw from mingw.org (not to be confused with
3522 * mingw-w64 from mingw-w64.sf.net) does not have MemoryBarrier in its
3523 * headers, so we have to get a memory barrier some other way.
3524 *
3525 * InterlockedIncrement is older, and is documented on MSDN to be a full
3526 * memory barrier, so let's use that.
3527 */
3528 long dummy = 0;
3529
3530 InterlockedExchange (&dummy, 1);
3531
3532 return atomic->value;
3533}
3534
3540void
3542{
3543 InterlockedExchange (&atomic->value, 0);
3544}
3545
3551void
3553{
3554 InterlockedExchange (&atomic->value, 1);
3555}
3556
3564void
3566{
3567}
3568
3577{
3578 return e == WSAEWOULDBLOCK;
3579}
3580
3589_dbus_get_install_root (DBusString *str)
3590{
3591 /* this is just an initial guess */
3592 DWORD pathLength = MAX_PATH;
3593 unsigned char *lastSlash;
3594 unsigned char *prefix;
3595
3596 do
3597 {
3598 /* allocate enough space for our best guess at the length */
3599 if (!_dbus_string_set_length (str, pathLength))
3600 {
3601 _dbus_string_set_length (str, 0);
3602 return FALSE;
3603 }
3604
3605 SetLastError (0);
3606 pathLength = GetModuleFileNameA (_dbus_win_get_dll_hmodule (),
3607 _dbus_string_get_data (str), _dbus_string_get_length (str));
3608
3609 if (pathLength == 0 || GetLastError () != 0)
3610 {
3611 /* failed, but not OOM */
3612 _dbus_string_set_length (str, 0);
3613 return TRUE;
3614 }
3615
3616 /* if the return is strictly less than the buffer size, it has
3617 * not been truncated, so we can continue */
3618 if (pathLength < (DWORD) _dbus_string_get_length (str))
3619 {
3620 /* reduce the length to match what Windows filled in */
3621 if (!_dbus_string_set_length (str, pathLength))
3622 {
3623 _dbus_string_set_length (str, 0);
3624 return FALSE;
3625 }
3626
3627 break;
3628 }
3629
3630 /* else it may have been truncated; try with a larger buffer */
3631 pathLength *= 2;
3632 }
3633 while (TRUE);
3634
3635 /* the rest of this function works by direct byte manipulation of the
3636 * underlying buffer */
3637 prefix = _dbus_string_get_udata (str);
3638
3639 lastSlash = _mbsrchr (prefix, '\\');
3640 if (lastSlash == NULL) {
3641 /* failed, but not OOM */
3642 _dbus_string_set_length (str, 0);
3643 return TRUE;
3644 }
3645 //cut off binary name
3646 lastSlash[1] = 0;
3647
3648 //cut possible "\\bin"
3649 //this fails if we are in a double-byte system codepage and the
3650 //folder's name happens to end with the *bytes*
3651 //"\\bin"... (I.e. the second byte of some Han character and then
3652 //the Latin "bin", but that is not likely I think...
3653 if (lastSlash - prefix >= 4 && _mbsnicmp (lastSlash - 4, (const unsigned char *)"\\bin", 4) == 0)
3654 lastSlash[-3] = 0;
3655 else if (lastSlash - prefix >= 10 && _mbsnicmp (lastSlash - 10, (const unsigned char *)"\\bin\\debug", 10) == 0)
3656 lastSlash[-9] = 0;
3657 else if (lastSlash - prefix >= 12 && _mbsnicmp (lastSlash - 12, (const unsigned char *)"\\bin\\release", 12) == 0)
3658 lastSlash[-11] = 0;
3659
3660 /* fix up the length to match the byte-manipulation */
3661 _dbus_string_set_length (str, strlen ((char *) prefix));
3662
3663 return TRUE;
3664}
3665
3666/* See comment in dbus-sysdeps-unix.c */
3669 DBusString *address,
3670 DBusError *error)
3671{
3672 /* Probably fill this in with something based on COM? */
3673 *supported = FALSE;
3674 return TRUE;
3675}
3676
3692 DBusCredentials *credentials)
3693{
3694 DBusString homedir;
3695 DBusString dotdir;
3696 const char *homepath;
3697 const char *homedrive;
3698
3699 _dbus_assert (credentials != NULL);
3701
3702 if (!_dbus_string_init (&homedir))
3703 return FALSE;
3704
3705 homedrive = _dbus_getenv("HOMEDRIVE");
3706 if (homedrive != NULL && *homedrive != '\0')
3707 {
3708 _dbus_string_append(&homedir,homedrive);
3709 }
3710
3711 homepath = _dbus_getenv("HOMEPATH");
3712 if (homepath != NULL && *homepath != '\0')
3713 {
3714 _dbus_string_append(&homedir,homepath);
3715 }
3716
3717#ifdef DBUS_ENABLE_EMBEDDED_TESTS
3718 {
3719 const char *override;
3720
3721 override = _dbus_getenv ("DBUS_TEST_HOMEDIR");
3722 if (override != NULL && *override != '\0')
3723 {
3724 _dbus_string_set_length (&homedir, 0);
3725 if (!_dbus_string_append (&homedir, override))
3726 goto failed;
3727
3728 _dbus_verbose ("Using fake homedir for testing: %s\n",
3729 _dbus_string_get_const_data (&homedir));
3730 }
3731 else
3732 {
3733 /* Not strictly thread-safe, but if we fail at thread-safety here,
3734 * the worst that will happen is some extra warnings. */
3735 static dbus_bool_t already_warned = FALSE;
3736 if (!already_warned)
3737 {
3738 _dbus_warn ("Using your real home directory for testing, set DBUS_TEST_HOMEDIR to avoid");
3739 already_warned = TRUE;
3740 }
3741 }
3742 }
3743#endif
3744
3745#ifdef DBUS_WINCE
3746 /* It's not possible to create a .something directory in Windows CE
3747 using the file explorer. */
3748#define KEYRING_DIR "dbus-keyrings"
3749#else
3750#define KEYRING_DIR ".dbus-keyrings"
3751#endif
3752
3753 _dbus_string_init_const (&dotdir, KEYRING_DIR);
3754 if (!_dbus_concat_dir_and_file (&homedir,
3755 &dotdir))
3756 goto failed;
3757
3758 if (!_dbus_string_copy (&homedir, 0,
3759 directory, _dbus_string_get_length (directory))) {
3760 goto failed;
3761 }
3762
3763 _dbus_string_free (&homedir);
3764 return TRUE;
3765
3766 failed:
3767 _dbus_string_free (&homedir);
3768 return FALSE;
3769}
3770
3777_dbus_file_exists (const char *file)
3778{
3779 DWORD attributes = GetFileAttributesA (file);
3780
3781 if (attributes != INVALID_FILE_ATTRIBUTES && GetLastError() != ERROR_PATH_NOT_FOUND)
3782 return TRUE;
3783 else
3784 return FALSE;
3785}
3786
3794const char*
3795_dbus_strerror (int error_number)
3796{
3797#ifdef DBUS_WINCE
3798 // TODO
3799 return "unknown";
3800#else
3801 const char *msg;
3802
3803 switch (error_number)
3804 {
3805 case WSAEINTR:
3806 return "Interrupted function call";
3807 case WSAEACCES:
3808 return "Permission denied";
3809 case WSAEFAULT:
3810 return "Bad address";
3811 case WSAEINVAL:
3812 return "Invalid argument";
3813 case WSAEMFILE:
3814 return "Too many open files";
3815 case WSAEWOULDBLOCK:
3816 return "Resource temporarily unavailable";
3817 case WSAEINPROGRESS:
3818 return "Operation now in progress";
3819 case WSAEALREADY:
3820 return "Operation already in progress";
3821 case WSAENOTSOCK:
3822 return "Socket operation on nonsocket";
3823 case WSAEDESTADDRREQ:
3824 return "Destination address required";
3825 case WSAEMSGSIZE:
3826 return "Message too long";
3827 case WSAEPROTOTYPE:
3828 return "Protocol wrong type for socket";
3829 case WSAENOPROTOOPT:
3830 return "Bad protocol option";
3831 case WSAEPROTONOSUPPORT:
3832 return "Protocol not supported";
3833 case WSAESOCKTNOSUPPORT:
3834 return "Socket type not supported";
3835 case WSAEOPNOTSUPP:
3836 return "Operation not supported";
3837 case WSAEPFNOSUPPORT:
3838 return "Protocol family not supported";
3839 case WSAEAFNOSUPPORT:
3840 return "Address family not supported by protocol family";
3841 case WSAEADDRINUSE:
3842 return "Address already in use";
3843 case WSAEADDRNOTAVAIL:
3844 return "Cannot assign requested address";
3845 case WSAENETDOWN:
3846 return "Network is down";
3847 case WSAENETUNREACH:
3848 return "Network is unreachable";
3849 case WSAENETRESET:
3850 return "Network dropped connection on reset";
3851 case WSAECONNABORTED:
3852 return "Software caused connection abort";
3853 case WSAECONNRESET:
3854 return "Connection reset by peer";
3855 case WSAENOBUFS:
3856 return "No buffer space available";
3857 case WSAEISCONN:
3858 return "Socket is already connected";
3859 case WSAENOTCONN:
3860 return "Socket is not connected";
3861 case WSAESHUTDOWN:
3862 return "Cannot send after socket shutdown";
3863 case WSAETIMEDOUT:
3864 return "Connection timed out";
3865 case WSAECONNREFUSED:
3866 return "Connection refused";
3867 case WSAEHOSTDOWN:
3868 return "Host is down";
3869 case WSAEHOSTUNREACH:
3870 return "No route to host";
3871 case WSAEPROCLIM:
3872 return "Too many processes";
3873 case WSAEDISCON:
3874 return "Graceful shutdown in progress";
3875 case WSATYPE_NOT_FOUND:
3876 return "Class type not found";
3877 case WSAHOST_NOT_FOUND:
3878 return "Host not found";
3879 case WSATRY_AGAIN:
3880 return "Nonauthoritative host not found";
3881 case WSANO_RECOVERY:
3882 return "This is a nonrecoverable error";
3883 case WSANO_DATA:
3884 return "Valid name, no data record of requested type";
3885 case WSA_INVALID_HANDLE:
3886 return "Specified event object handle is invalid";
3887 case WSA_INVALID_PARAMETER:
3888 return "One or more parameters are invalid";
3889 case WSA_IO_INCOMPLETE:
3890 return "Overlapped I/O event object not in signaled state";
3891 case WSA_IO_PENDING:
3892 return "Overlapped operations will complete later";
3893 case WSA_NOT_ENOUGH_MEMORY:
3894 return "Insufficient memory available";
3895 case WSA_OPERATION_ABORTED:
3896 return "Overlapped operation aborted";
3897#ifdef WSAINVALIDPROCTABLE
3898
3899 case WSAINVALIDPROCTABLE:
3900 return "Invalid procedure table from service provider";
3901#endif
3902#ifdef WSAINVALIDPROVIDER
3903
3904 case WSAINVALIDPROVIDER:
3905 return "Invalid service provider version number";
3906#endif
3907#ifdef WSAPROVIDERFAILEDINIT
3908
3909 case WSAPROVIDERFAILEDINIT:
3910 return "Unable to initialize a service provider";
3911#endif
3912
3913 case WSASYSCALLFAILURE:
3914 return "System call failure";
3915
3916 default:
3917 msg = strerror (error_number);
3918
3919 if (msg == NULL)
3920 msg = "unknown";
3921
3922 return msg;
3923 }
3924#endif //DBUS_WINCE
3925}
3926
3934void
3935_dbus_win_set_error_from_win_error (DBusError *error,
3936 int code)
3937{
3938 char *msg;
3939
3940 /* As we want the English message, use the A API */
3941 FormatMessageA (FORMAT_MESSAGE_ALLOCATE_BUFFER |
3942 FORMAT_MESSAGE_IGNORE_INSERTS |
3943 FORMAT_MESSAGE_FROM_SYSTEM,
3944 NULL, code, MAKELANGID (LANG_ENGLISH, SUBLANG_ENGLISH_US),
3945 (LPSTR) &msg, 0, NULL);
3946 if (msg)
3947 {
3948 dbus_set_error (error, "win32.error", "%s", msg);
3949 LocalFree (msg);
3950 }
3951 else
3952 dbus_set_error (error, "win32.error", "Unknown error code %d or FormatMessage failed", code);
3953}
3954
3955void
3956_dbus_win_warn_win_error (const char *message,
3957 unsigned long code)
3958{
3959 DBusError error;
3960
3961 dbus_error_init (&error);
3962 _dbus_win_set_error_from_win_error (&error, code);
3963 _dbus_warn ("%s: %s", message, error.message);
3964 dbus_error_free (&error);
3965}
3966
3976 DBusError *error)
3977{
3978 const char *filename_c;
3979
3980 _DBUS_ASSERT_ERROR_IS_CLEAR (error);
3981
3982 filename_c = _dbus_string_get_const_data (filename);
3983
3984 if (RemoveDirectoryA (filename_c) == 0)
3985 {
3986 char *emsg = _dbus_win_error_string (GetLastError ());
3987 dbus_set_error (error, _dbus_win_error_from_last_error (),
3988 "Failed to remove directory %s: %s",
3989 filename_c, emsg);
3990 _dbus_win_free_error_string (emsg);
3991 return FALSE;
3992 }
3993
3994 return TRUE;
3995}
3996
4005{
4006 if (_dbus_string_get_length (filename) > 0)
4007 return _dbus_string_get_byte (filename, 1) == ':'
4008 || _dbus_string_get_byte (filename, 0) == '\\'
4009 || _dbus_string_get_byte (filename, 0) == '/';
4010 else
4011 return FALSE;
4012}
4013
4016{
4017 return FALSE;
4018}
4019
4020int
4021_dbus_save_socket_errno (void)
4022{
4023 return errno;
4024}
4025
4026void
4027_dbus_restore_socket_errno (int saved_errno)
4028{
4029 _dbus_win_set_errno (saved_errno);
4030}
4031
4032static const char *log_tag = "dbus";
4033static DBusLogFlags log_flags = DBUS_LOG_FLAGS_STDERR;
4034
4045void
4046_dbus_init_system_log (const char *tag,
4047 DBusLogFlags flags)
4048{
4049 /* We never want to turn off logging completely */
4050 _dbus_assert (
4051 (flags & (DBUS_LOG_FLAGS_STDERR | DBUS_LOG_FLAGS_SYSTEM_LOG)) != 0);
4052
4053 log_tag = tag;
4054 log_flags = flags;
4055}
4056
4064void
4065_dbus_logv (DBusSystemLogSeverity severity,
4066 const char *msg,
4067 va_list args)
4068{
4069 const char *s = "";
4070 va_list tmp;
4071
4072 switch(severity)
4073 {
4074 case DBUS_SYSTEM_LOG_INFO: s = "info"; break;
4075 case DBUS_SYSTEM_LOG_WARNING: s = "warning"; break;
4076 case DBUS_SYSTEM_LOG_SECURITY: s = "security"; break;
4077 case DBUS_SYSTEM_LOG_ERROR: s = "error"; break;
4078 default: _dbus_assert_not_reached ("invalid log severity");
4079 }
4080
4081 if (log_flags & DBUS_LOG_FLAGS_SYSTEM_LOG)
4082 {
4083 DBusString out = _DBUS_STRING_INIT_INVALID;
4084 const char *message = NULL;
4085 DBUS_VA_COPY (tmp, args);
4086
4087 if (!_dbus_string_init (&out))
4088 goto out;
4089 if (!_dbus_string_append_printf (&out, "%s: ", s))
4090 goto out;
4091 if (!_dbus_string_append_printf_valist (&out, msg, tmp))
4092 goto out;
4093 message = _dbus_string_get_const_data (&out);
4094out:
4095 if (message != NULL)
4096 {
4097 OutputDebugStringA (message);
4098 }
4099 else
4100 {
4101 OutputDebugStringA ("Out of memory while formatting message: '''");
4102 OutputDebugStringA (msg);
4103 OutputDebugStringA ("'''");
4104 }
4105
4106 va_end (tmp);
4107 _dbus_string_free (&out);
4108 }
4109
4110 if (log_flags & DBUS_LOG_FLAGS_STDERR)
4111 {
4112 DBUS_VA_COPY (tmp, args);
4113 fprintf (stderr, "%s[%lu]: %s: ", log_tag, _dbus_pid_for_log (), s);
4114 vfprintf (stderr, msg, tmp);
4115 fprintf (stderr, "\n");
4116 va_end (tmp);
4117 }
4118}
4119
4120/*
4121 * Return the low-level representation of a socket error, as used by
4122 * cross-platform socket APIs like inet_ntop(), send() and recv(). This
4123 * is the standard errno on Unix, but is WSAGetLastError() on Windows.
4124 *
4125 * Some libdbus internal functions copy this into errno, but with
4126 * hindsight that was probably a design flaw.
4127 */
4128int
4129_dbus_get_low_level_socket_errno (void)
4130{
4131 return WSAGetLastError ();
4132}
4133
4134void
4135_dbus_win_set_error_from_last_error (DBusError *error,
4136 const char *format,
4137 ...)
4138{
4139 const char *name;
4140 char *message = NULL;
4141
4142 if (error == NULL)
4143 return;
4144
4145 /* make sure to do this first, in case subsequent library calls overwrite GetLastError() */
4146 name = _dbus_win_error_from_last_error ();
4147 message = _dbus_win_error_string (GetLastError ());
4148
4149 if (format != NULL)
4150 {
4151 DBusString str;
4152 va_list args;
4153 dbus_bool_t retval;
4154
4155 if (!_dbus_string_init (&str))
4156 {
4157 _DBUS_SET_OOM (error);
4158 goto out;
4159 }
4160
4161 va_start (args, format);
4162 retval = _dbus_string_append_printf_valist (&str, format, args);
4163 va_end (args);
4164 if (!retval)
4165 {
4166 _DBUS_SET_OOM (error);
4167 _dbus_string_free (&str);
4168 goto out;
4169 }
4170
4171 dbus_set_error (error, name, "%s: %s", _dbus_string_get_const_data (&str), message);
4172 _dbus_string_free (&str);
4173 }
4174 else
4175 {
4176 dbus_set_error (error, name, "%s", message);
4177 }
4178
4179out:
4180 if (message != NULL)
4181 _dbus_win_free_error_string (message);
4182
4183 _DBUS_ASSERT_ERROR_IS_SET (error);
4184}
4185
4197HANDLE
4198_dbus_win_event_create_inheritable (DBusError *error)
4199{
4200 HANDLE handle;
4201
4202 handle = CreateEvent (NULL, TRUE, FALSE, NULL);
4203 if (handle == NULL)
4204 {
4205 _dbus_win_set_error_from_last_error (error, "Could not create event");
4206 return NULL;
4207 }
4208 else if (GetLastError () == ERROR_ALREADY_EXISTS)
4209 {
4210 _dbus_win_set_error_from_last_error (error, "Event already exists");
4211 return NULL;
4212 }
4213
4214 if (!SetHandleInformation (handle, HANDLE_FLAG_INHERIT, HANDLE_FLAG_INHERIT))
4215 {
4216 _dbus_win_set_error_from_last_error (error, "Could not set inheritance for event %p", handle);
4217 CloseHandle (handle);
4218 return NULL;
4219 }
4220 return handle;
4221}
4222
4231_dbus_win_event_set (HANDLE handle, DBusError *error)
4232{
4233 _dbus_assert (handle != NULL);
4234
4235 if (!SetEvent (handle))
4236 {
4237 _dbus_win_set_error_from_last_error (error, "Could not trigger event (handle %p)", handle);
4238 return FALSE;
4239 }
4240 return TRUE;
4241}
4242
4254_dbus_win_event_wait (HANDLE handle, int timeout, DBusError *error)
4255{
4256 DWORD status;
4257
4258 _dbus_assert (handle != NULL);
4259
4260 status = WaitForSingleObject (handle, timeout);
4261 switch (status)
4262 {
4263 case WAIT_OBJECT_0:
4264 return TRUE;
4265
4266 case WAIT_FAILED:
4267 {
4268 _dbus_win_set_error_from_last_error (error, "Unable to wait for event (handle %p)", handle);
4269 return FALSE;
4270 }
4271
4272 case WAIT_TIMEOUT:
4273 /* GetLastError() is not set */
4274 dbus_set_error (error, DBUS_ERROR_TIMEOUT, "Timed out waiting for event (handle %p)", handle);
4275 return FALSE;
4276
4277 default:
4278 /* GetLastError() is probably not set? */
4279 dbus_set_error (error, DBUS_ERROR_FAILED, "Unknown result '%lu' while waiting for event (handle %p)", status, handle);
4280 return FALSE;
4281 }
4282}
4283
4293_dbus_win_event_free (HANDLE handle, DBusError *error)
4294{
4295 if (handle == NULL || handle == INVALID_HANDLE_VALUE)
4296 return TRUE;
4297
4298 if (CloseHandle (handle))
4299 return TRUE;
4300
4301 /* the handle may already be closed */
4302 if (GetLastError () == ERROR_INVALID_HANDLE)
4303 return TRUE;
4304
4305 _dbus_win_set_error_from_last_error (error, "Could not close event (handle %p)", handle);
4306 return FALSE;
4307}
4308
4310/* tests in dbus-sysdeps-util.c */
dbus_bool_t _dbus_credentials_add_windows_sid(DBusCredentials *credentials, const char *windows_sid)
Add a Windows user SID to the credentials.
dbus_bool_t _dbus_credentials_add_pid(DBusCredentials *credentials, dbus_pid_t pid)
Add a UNIX process ID to the credentials.
dbus_bool_t _dbus_credentials_are_anonymous(DBusCredentials *credentials)
Checks whether a credentials object contains a user identity.
void dbus_set_error_const(DBusError *error, const char *name, const char *message)
Assigns an error name and message to a DBusError.
Definition: dbus-errors.c:243
void dbus_error_init(DBusError *error)
Initializes a DBusError structure.
Definition: dbus-errors.c:188
void dbus_set_error(DBusError *error, const char *name, const char *format,...)
Assigns an error name and message to a DBusError.
Definition: dbus-errors.c:354
void dbus_error_free(DBusError *error)
Frees an error that's been set (or just initialized), then reinitializes the error as in dbus_error_i...
Definition: dbus-errors.c:211
dbus_bool_t _dbus_file_exists(const char *file)
Checks if a file exists.
dbus_bool_t _dbus_delete_file(const DBusString *filename, DBusError *error)
Deletes the given file.
dbus_bool_t _dbus_make_file_world_readable(const DBusString *filename, DBusError *error)
Makes the file readable by every user in the system.
#define _dbus_assert_not_reached(explanation)
Aborts with an error message if called.
#define _dbus_assert(condition)
Aborts with an error message if the condition is false.
#define _DBUS_UNLOCK(name)
Unlocks a global lock.
#define _DBUS_LOCK(name)
Locks a global lock, initializing it first if necessary.
const char * _dbus_error_from_errno(int error_number)
Converts a UNIX errno, or Windows errno or WinSock error value into a DBusError name.
Definition: dbus-sysdeps.c:599
const char * _dbus_strerror_from_errno(void)
Get error message from errno.
Definition: dbus-sysdeps.c:758
void _dbus_warn(const char *format,...)
Prints a warning message to stderr.
#define _DBUS_ZERO(object)
Sets all bits in an object to zero.
void * _dbus_list_pop_first(DBusList **list)
Removes the first value in the list and returns it.
Definition: dbus-list.c:677
dbus_bool_t _dbus_list_append(DBusList **list, void *data)
Appends a value to the list.
Definition: dbus-list.c:271
#define NULL
A null pointer, defined appropriately for C or C++.
#define TRUE
Expands to "1".
#define FALSE
Expands to "0".
DBUS_PRIVATE_EXPORT void _dbus_verbose_bytes_of_string(const DBusString *str, int start, int len)
Dump the given part of the string to verbose log.
void dbus_free(void *memory)
Frees a block of memory previously allocated by dbus_malloc() or dbus_malloc0().
Definition: dbus-memory.c:692
void * dbus_realloc(void *memory, size_t bytes)
Resizes a block of memory previously allocated by dbus_malloc() or dbus_malloc0().
Definition: dbus-memory.c:592
#define dbus_new(type, count)
Safe macro for using dbus_malloc().
Definition: dbus-memory.h:57
#define dbus_new0(type, count)
Safe macro for using dbus_malloc0().
Definition: dbus-memory.h:58
void * dbus_malloc(size_t bytes)
Allocates the given number of bytes, as with standard malloc().
Definition: dbus-memory.c:452
#define DBUS_ERROR_TIMEOUT
Certain timeout errors, possibly ETIMEDOUT on a socket.
#define DBUS_ERROR_BAD_ADDRESS
A D-Bus bus address was malformed.
#define DBUS_ERROR_IO_ERROR
Something went wrong reading or writing to a socket, for example.
#define DBUS_ERROR_ACCESS_DENIED
Security restrictions don't allow doing what you're trying to do.
#define DBUS_ERROR_FILE_EXISTS
Existing file and the operation you're using does not silently overwrite.
#define DBUS_ERROR_LIMITS_EXCEEDED
Some limited resource is exhausted.
#define DBUS_ERROR_FAILED
A generic error; "something went wrong" - see the error message for more.
#define DBUS_ERROR_NO_MEMORY
There was not enough memory to complete an operation.
#define DBUS_ERROR_INVALID_ARGS
Invalid arguments passed to a method call.
#define DBUS_ERROR_FILE_NOT_FOUND
Missing file.
dbus_bool_t _dbus_sha_compute(const DBusString *data, DBusString *ascii_output)
Computes the ASCII hex-encoded shasum of the given data and appends it to the output string.
Definition: dbus-sha.c:483
dbus_bool_t _dbus_string_set_length(DBusString *str, int length)
Sets the length of a string.
Definition: dbus-string.c:833
dbus_bool_t _dbus_string_append(DBusString *str, const char *buffer)
Appends a nul-terminated C-style string to a DBusString.
Definition: dbus-string.c:966
dbus_bool_t _dbus_string_init(DBusString *str)
Initializes a string.
Definition: dbus-string.c:182
void _dbus_string_init_const(DBusString *str, const char *value)
Initializes a constant string.
Definition: dbus-string.c:197
dbus_bool_t _dbus_string_copy(const DBusString *source, int start, DBusString *dest, int insert_at)
Like _dbus_string_move(), but does not delete the section of the source string that's copied to the d...
Definition: dbus-string.c:1343
char * _dbus_string_get_data_len(DBusString *str, int start, int len)
Gets a sub-portion of the raw character buffer from the string.
Definition: dbus-string.c:521
dbus_bool_t _dbus_string_validate_utf8(const DBusString *str, int start, int len)
Checks that the given range of the string is valid UTF-8.
Definition: dbus-string.c:2641
void _dbus_string_init_const_len(DBusString *str, const char *value, int len)
Initializes a constant string with a length.
Definition: dbus-string.c:217
void _dbus_string_tolower_ascii(const DBusString *str, int start, int len)
Converts the given range of the string to lower case.
Definition: dbus-string.c:2571
void _dbus_string_free(DBusString *str)
Frees a string created by _dbus_string_init(), and fills it with the same contents as #_DBUS_STRING_I...
Definition: dbus-string.c:278
void _dbus_string_shorten(DBusString *str, int length_to_remove)
Makes a string shorter by the given number of bytes.
Definition: dbus-string.c:811
dbus_bool_t _dbus_string_append_printf_valist(DBusString *str, const char *format, va_list args)
Appends a printf-style formatted string to the DBusString.
Definition: dbus-string.c:1103
dbus_bool_t _dbus_string_lengthen(DBusString *str, int additional_length)
Makes a string longer by the given number of bytes.
Definition: dbus-string.c:791
dbus_bool_t _dbus_string_append_byte(DBusString *str, unsigned char byte)
Appends a single byte to the string, returning FALSE if not enough memory.
Definition: dbus-string.c:1188
dbus_bool_t _dbus_string_append_printf(DBusString *str, const char *format,...)
Appends a printf-style formatted string to the DBusString.
Definition: dbus-string.c:1145
void _dbus_logv(DBusSystemLogSeverity severity, const char *msg, va_list args)
Log a message to the system log file (e.g.
dbus_bool_t _dbus_read_local_machine_uuid(DBusGUID *machine_id, dbus_bool_t create_if_not_found, DBusError *error)
Reads the uuid of the machine we're running on from the dbus configuration.
#define _DBUS_POLLOUT
Writing now will not block.
Definition: dbus-sysdeps.h:430
unsigned long dbus_uid_t
A user ID.
Definition: dbus-sysdeps.h:137
dbus_bool_t _dbus_get_is_errno_eagain_or_ewouldblock(int e)
See if errno is EAGAIN or EWOULDBLOCK (this has to be done differently for Winsock so is abstracted)
unsigned long _dbus_pid_for_log(void)
The only reason this is separate from _dbus_getpid() is to allow it on Windows for logging but not fo...
unsigned long dbus_pid_t
A process ID.
Definition: dbus-sysdeps.h:135
int _dbus_read_socket(DBusSocket fd, DBusString *buffer, int count)
Socket interface.
void _dbus_exit(int code)
Exit the process, returning the given value.
#define _DBUS_POLLERR
Error condition.
Definition: dbus-sysdeps.h:432
int _dbus_write_socket(DBusSocket fd, const DBusString *buffer, int start, int len)
Thin wrapper around the write() system call that writes a part of a DBusString and handles EINTR for ...
void _dbus_atomic_set_nonzero(DBusAtomic *atomic)
Atomically set the value of an integer to something nonzero.
dbus_bool_t _dbus_socketpair(DBusSocket *fd1, DBusSocket *fd2, dbus_bool_t blocking, DBusError *error)
Creates pair of connect sockets (as in socketpair()).
dbus_bool_t _dbus_append_keyring_directory_for_credentials(DBusString *directory, DBusCredentials *credentials)
Appends the directory in which a keyring for the given credentials should be stored.
#define DBUS_UID_UNSET
an invalid UID used to represent an uninitialized dbus_uid_t field
Definition: dbus-sysdeps.h:144
dbus_int32_t _dbus_atomic_dec(DBusAtomic *atomic)
Atomically decrement an integer.
dbus_bool_t _dbus_close_socket(DBusSocket fd, DBusError *error)
Closes a file descriptor.
dbus_bool_t _dbus_read_credentials_socket(DBusSocket handle, DBusCredentials *credentials, DBusError *error)
Reads a single byte which must be nul (an error occurs otherwise), and reads unix credentials if avai...
const char * _dbus_getenv(const char *varname)
Wrapper for getenv().
Definition: dbus-sysdeps.c:195
dbus_pid_t _dbus_getpid(void)
Gets our process ID.
dbus_int32_t _dbus_atomic_get(DBusAtomic *atomic)
Atomically get the value of an integer.
dbus_bool_t _dbus_set_socket_nonblocking(DBusSocket handle, DBusError *error)
Sets a file descriptor to be nonblocking.
dbus_bool_t _dbus_credentials_add_from_user(DBusCredentials *credentials, const DBusString *username, DBusCredentialsAddFlags flags, DBusError *error)
Adds the credentials corresponding to the given username.
DBusSocket _dbus_connect_tcp_socket(const char *host, const char *port, const char *family, DBusError *error)
Creates a socket and connects to a socket at the given host and port.
void _dbus_disable_sigpipe(void)
signal (SIGPIPE, SIG_IGN);
dbus_bool_t _dbus_check_setuid(void)
NOTE: If you modify this function, please also consider making the corresponding change in GLib.
void _dbus_sleep_milliseconds(int milliseconds)
Sleeps the given number of milliseconds.
void _dbus_daemon_unpublish_session_bus_address(void)
Clear the platform-specific centralized location where the session bus address is published.
dbus_bool_t _dbus_check_dir_is_private_to_user(DBusString *dir, DBusError *error)
Checks to make sure the given directory is private to the user.
#define _DBUS_POLLIN
There is data to read.
Definition: dbus-sysdeps.h:426
int _dbus_listen_tcp_socket(const char *host, const char *port, const char *family, DBusString *retport, const char **retfamily, DBusSocket **fds_p, DBusError *error)
Creates a socket and binds it to the given path, then listens on the socket.
dbus_bool_t _dbus_send_credentials_socket(DBusSocket handle, DBusError *error)
Sends a single nul byte with our UNIX credentials as ancillary data.
dbus_uid_t _dbus_getuid(void)
Gets our Unix UID.
dbus_bool_t _dbus_credentials_add_from_current_process(DBusCredentials *credentials)
Adds the credentials of the current process to the passed-in credentials object.
void _dbus_atomic_set_zero(DBusAtomic *atomic)
Atomically set the value of an integer to 0.
dbus_int32_t _dbus_atomic_inc(DBusAtomic *atomic)
Atomically increments an integer.
dbus_bool_t _dbus_generate_random_bytes(DBusString *str, int n_bytes, DBusError *error)
Generates the given number of random bytes, using the best mechanism we can come up with.
int _dbus_printf_string_upper_bound(const char *format, va_list args)
Measure the message length without terminating nul.
void _dbus_get_monotonic_time(long *tv_sec, long *tv_usec)
Get current time, as in gettimeofday().
dbus_bool_t _dbus_delete_directory(const DBusString *filename, DBusError *error)
Removes a directory; Directory must be empty.
void _dbus_get_real_time(long *tv_sec, long *tv_usec)
Get current time, as in gettimeofday().
void _dbus_abort(void)
Aborts the program with SIGABRT (dumping core).
Definition: dbus-sysdeps.c:87
int _dbus_poll(DBusPollFD *fds, int n_fds, int timeout_milliseconds)
Wrapper for poll().
dbus_bool_t _dbus_get_autolaunch_address(const char *scope, DBusString *address, DBusError *error)
Returns the address of a new session bus.
int _dbus_write_socket_two(DBusSocket fd, const DBusString *buffer1, int start1, int len1, const DBusString *buffer2, int start2, int len2)
Like _dbus_write() but will use writev() if possible to write both buffers in sequence.
dbus_bool_t _dbus_concat_dir_and_file(DBusString *dir, const DBusString *next_component)
Appends the given filename to the given directory.
void _dbus_print_backtrace(void)
On GNU libc systems, print a crude backtrace to stderr.
void _dbus_init_system_log(const char *tag, DBusLogFlags flags)
Initialize the system log.
dbus_bool_t _dbus_lookup_session_address(dbus_bool_t *supported, DBusString *address, DBusError *error)
Determines the address of the session bus by querying a platform-specific method.
DBusSocket _dbus_accept(DBusSocket listen_fd)
Accepts a connection on a listening socket.
dbus_bool_t _dbus_append_user_from_current_process(DBusString *str)
Append to the string the identity we would like to have when we authenticate, on UNIX this is the cur...
void _dbus_flush_caches(void)
Called when the bus daemon is signaled to reload its configuration; any caches should be nuked.
const char * _dbus_get_tmpdir(void)
Gets the temporary files directory by inspecting the environment variables TMPDIR,...
dbus_bool_t _dbus_ensure_directory(const DBusString *filename, DBusError *error)
Creates a directory; succeeds if the directory is created or already existed.
dbus_bool_t _dbus_path_is_absolute(const DBusString *filename)
Checks whether the filename is an absolute path.
dbus_bool_t _dbus_create_directory(const DBusString *filename, DBusError *error)
Creates a directory.
dbus_uint32_t dbus_bool_t
A boolean, valid values are TRUE and FALSE.
Definition: dbus-types.h:35
An atomic integer safe to increment or decrement from multiple threads.
Definition: dbus-sysdeps.h:324
volatile dbus_int32_t value
Value of the atomic integer.
Definition: dbus-sysdeps.h:328
Object representing an exception.
Definition: dbus-errors.h:49
const char * message
public error message field
Definition: dbus-errors.h:51
A node in a linked list.
Definition: dbus-list.h:35
short events
Events to poll for.
Definition: dbus-sysdeps.h:421
short revents
Events that occurred.
Definition: dbus-sysdeps.h:422
DBusPollable fd
File descriptor.
Definition: dbus-sysdeps.h:420
Socket interface.
Definition: dbus-sysdeps.h:181
A globally unique ID ; we have one for each DBusServer, and also one for each machine with libdbus in...
dbus_uint32_t as_uint32s[DBUS_UUID_LENGTH_WORDS]
guid as four uint32 values