D-Bus  1.6.8
dbus-sysdeps-util-unix.c
1 /* -*- mode: C; c-file-style: "gnu"; indent-tabs-mode: nil; -*- */
2 /* dbus-sysdeps-util-unix.c Would be in dbus-sysdeps-unix.c, but not used in libdbus
3  *
4  * Copyright (C) 2002, 2003, 2004, 2005 Red Hat, Inc.
5  * Copyright (C) 2003 CodeFactory AB
6  *
7  * Licensed under the Academic Free License version 2.1
8  *
9  * This program is free software; you can redistribute it and/or modify
10  * it under the terms of the GNU General Public License as published by
11  * the Free Software Foundation; either version 2 of the License, or
12  * (at your option) any later version.
13  *
14  * This program is distributed in the hope that it will be useful,
15  * but WITHOUT ANY WARRANTY; without even the implied warranty of
16  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17  * GNU General Public License for more details.
18  *
19  * You should have received a copy of the GNU General Public License
20  * along with this program; if not, write to the Free Software
21  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
22  *
23  */
24 
25 #include <config.h>
26 #include "dbus-sysdeps.h"
27 #include "dbus-sysdeps-unix.h"
28 #include "dbus-internals.h"
29 #include "dbus-pipe.h"
30 #include "dbus-protocol.h"
31 #include "dbus-string.h"
32 #define DBUS_USERDB_INCLUDES_PRIVATE 1
33 #include "dbus-userdb.h"
34 #include "dbus-test.h"
35 
36 #include <sys/types.h>
37 #include <stdlib.h>
38 #include <string.h>
39 #include <signal.h>
40 #include <unistd.h>
41 #include <stdio.h>
42 #include <errno.h>
43 #include <fcntl.h>
44 #include <sys/stat.h>
45 #ifdef HAVE_SYS_RESOURCE_H
46 #include <sys/resource.h>
47 #endif
48 #include <grp.h>
49 #include <sys/socket.h>
50 #include <dirent.h>
51 #include <sys/un.h>
52 #include <syslog.h>
53 
54 #ifdef HAVE_SYS_SYSLIMITS_H
55 #include <sys/syslimits.h>
56 #endif
57 
58 #ifndef O_BINARY
59 #define O_BINARY 0
60 #endif
61 
79  DBusPipe *print_pid_pipe,
80  DBusError *error,
81  dbus_bool_t keep_umask)
82 {
83  const char *s;
84  pid_t child_pid;
85  int dev_null_fd;
86 
87  _dbus_verbose ("Becoming a daemon...\n");
88 
89  _dbus_verbose ("chdir to /\n");
90  if (chdir ("/") < 0)
91  {
93  "Could not chdir() to root directory");
94  return FALSE;
95  }
96 
97  _dbus_verbose ("forking...\n");
98  switch ((child_pid = fork ()))
99  {
100  case -1:
101  _dbus_verbose ("fork failed\n");
102  dbus_set_error (error, _dbus_error_from_errno (errno),
103  "Failed to fork daemon: %s", _dbus_strerror (errno));
104  return FALSE;
105  break;
106 
107  case 0:
108  _dbus_verbose ("in child, closing std file descriptors\n");
109 
110  /* silently ignore failures here, if someone
111  * doesn't have /dev/null we may as well try
112  * to continue anyhow
113  */
114 
115  dev_null_fd = open ("/dev/null", O_RDWR);
116  if (dev_null_fd >= 0)
117  {
118  dup2 (dev_null_fd, 0);
119  dup2 (dev_null_fd, 1);
120 
121  s = _dbus_getenv ("DBUS_DEBUG_OUTPUT");
122  if (s == NULL || *s == '\0')
123  dup2 (dev_null_fd, 2);
124  else
125  _dbus_verbose ("keeping stderr open due to DBUS_DEBUG_OUTPUT\n");
126  }
127 
128  if (!keep_umask)
129  {
130  /* Get a predictable umask */
131  _dbus_verbose ("setting umask\n");
132  umask (022);
133  }
134 
135  _dbus_verbose ("calling setsid()\n");
136  if (setsid () == -1)
137  _dbus_assert_not_reached ("setsid() failed");
138 
139  break;
140 
141  default:
142  if (!_dbus_write_pid_to_file_and_pipe (pidfile, print_pid_pipe,
143  child_pid, error))
144  {
145  _dbus_verbose ("pid file or pipe write failed: %s\n",
146  error->message);
147  kill (child_pid, SIGTERM);
148  return FALSE;
149  }
150 
151  _dbus_verbose ("parent exiting\n");
152  _exit (0);
153  break;
154  }
155 
156  return TRUE;
157 }
158 
159 
168 static dbus_bool_t
169 _dbus_write_pid_file (const DBusString *filename,
170  unsigned long pid,
171  DBusError *error)
172 {
173  const char *cfilename;
174  int fd;
175  FILE *f;
176 
177  cfilename = _dbus_string_get_const_data (filename);
178 
179  fd = open (cfilename, O_WRONLY|O_CREAT|O_EXCL|O_BINARY, 0644);
180 
181  if (fd < 0)
182  {
183  dbus_set_error (error, _dbus_error_from_errno (errno),
184  "Failed to open \"%s\": %s", cfilename,
185  _dbus_strerror (errno));
186  return FALSE;
187  }
188 
189  if ((f = fdopen (fd, "w")) == NULL)
190  {
191  dbus_set_error (error, _dbus_error_from_errno (errno),
192  "Failed to fdopen fd %d: %s", fd, _dbus_strerror (errno));
193  _dbus_close (fd, NULL);
194  return FALSE;
195  }
196 
197  if (fprintf (f, "%lu\n", pid) < 0)
198  {
199  dbus_set_error (error, _dbus_error_from_errno (errno),
200  "Failed to write to \"%s\": %s", cfilename,
201  _dbus_strerror (errno));
202 
203  fclose (f);
204  return FALSE;
205  }
206 
207  if (fclose (f) == EOF)
208  {
209  dbus_set_error (error, _dbus_error_from_errno (errno),
210  "Failed to close \"%s\": %s", cfilename,
211  _dbus_strerror (errno));
212  return FALSE;
213  }
214 
215  return TRUE;
216 }
217 
231  DBusPipe *print_pid_pipe,
232  dbus_pid_t pid_to_write,
233  DBusError *error)
234 {
235  if (pidfile)
236  {
237  _dbus_verbose ("writing pid file %s\n", _dbus_string_get_const_data (pidfile));
238  if (!_dbus_write_pid_file (pidfile,
239  pid_to_write,
240  error))
241  {
242  _dbus_verbose ("pid file write failed\n");
243  _DBUS_ASSERT_ERROR_IS_SET(error);
244  return FALSE;
245  }
246  }
247  else
248  {
249  _dbus_verbose ("No pid file requested\n");
250  }
251 
252  if (print_pid_pipe != NULL && _dbus_pipe_is_valid (print_pid_pipe))
253  {
254  DBusString pid;
255  int bytes;
256 
257  _dbus_verbose ("writing our pid to pipe %d\n",
258  print_pid_pipe->fd);
259 
260  if (!_dbus_string_init (&pid))
261  {
262  _DBUS_SET_OOM (error);
263  return FALSE;
264  }
265 
266  if (!_dbus_string_append_int (&pid, pid_to_write) ||
267  !_dbus_string_append (&pid, "\n"))
268  {
269  _dbus_string_free (&pid);
270  _DBUS_SET_OOM (error);
271  return FALSE;
272  }
273 
274  bytes = _dbus_string_get_length (&pid);
275  if (_dbus_pipe_write (print_pid_pipe, &pid, 0, bytes, error) != bytes)
276  {
277  /* _dbus_pipe_write sets error only on failure, not short write */
278  if (error != NULL && !dbus_error_is_set(error))
279  {
281  "Printing message bus PID: did not write enough bytes\n");
282  }
283  _dbus_string_free (&pid);
284  return FALSE;
285  }
286 
287  _dbus_string_free (&pid);
288  }
289  else
290  {
291  _dbus_verbose ("No pid pipe to write to\n");
292  }
293 
294  return TRUE;
295 }
296 
304 _dbus_verify_daemon_user (const char *user)
305 {
306  DBusString u;
307 
308  _dbus_string_init_const (&u, user);
309 
311 }
312 
313 
314 /* The HAVE_LIBAUDIT case lives in selinux.c */
315 #ifndef HAVE_LIBAUDIT
316 
324 _dbus_change_to_daemon_user (const char *user,
325  DBusError *error)
326 {
327  dbus_uid_t uid;
328  dbus_gid_t gid;
329  DBusString u;
330 
331  _dbus_string_init_const (&u, user);
332 
333  if (!_dbus_get_user_id_and_primary_group (&u, &uid, &gid))
334  {
336  "User '%s' does not appear to exist?",
337  user);
338  return FALSE;
339  }
340 
341  /* setgroups() only works if we are a privileged process,
342  * so we don't return error on failure; the only possible
343  * failure is that we don't have perms to do it.
344  *
345  * not sure this is right, maybe if setuid()
346  * is going to work then setgroups() should also work.
347  */
348  if (setgroups (0, NULL) < 0)
349  _dbus_warn ("Failed to drop supplementary groups: %s\n",
350  _dbus_strerror (errno));
351 
352  /* Set GID first, or the setuid may remove our permission
353  * to change the GID
354  */
355  if (setgid (gid) < 0)
356  {
357  dbus_set_error (error, _dbus_error_from_errno (errno),
358  "Failed to set GID to %lu: %s", gid,
359  _dbus_strerror (errno));
360  return FALSE;
361  }
362 
363  if (setuid (uid) < 0)
364  {
365  dbus_set_error (error, _dbus_error_from_errno (errno),
366  "Failed to set UID to %lu: %s", uid,
367  _dbus_strerror (errno));
368  return FALSE;
369  }
370 
371  return TRUE;
372 }
373 #endif /* !HAVE_LIBAUDIT */
374 
375 
386 void
388 {
389 #ifdef HAVE_SETRLIMIT
390  struct rlimit lim;
391  struct rlimit target_lim;
392 
393  /* No point to doing this practically speaking
394  * if we're not uid 0. We expect the system
395  * bus to use this before we change UID, and
396  * the session bus takes the Linux default
397  * of 1024 for both cur and max.
398  */
399  if (getuid () != 0)
400  return;
401 
402  if (getrlimit (RLIMIT_NOFILE, &lim) < 0)
403  return;
404 
405  if (lim.rlim_cur >= limit)
406  return;
407 
408  /* Ignore "maximum limit", assume we have the "superuser"
409  * privileges. On Linux this is CAP_SYS_RESOURCE.
410  */
411  target_lim.rlim_cur = target_lim.rlim_max = limit;
412  /* Also ignore errors; if we fail, we will at least work
413  * up to whatever limit we had, which seems better than
414  * just outright aborting.
415  *
416  * However, in the future we should probably log this so OS builders
417  * have a chance to notice any misconfiguration like dbus-daemon
418  * being started without CAP_SYS_RESOURCE.
419  */
420  setrlimit (RLIMIT_NOFILE, &target_lim);
421 #endif
422 }
423 
424 void
425 _dbus_init_system_log (void)
426 {
427 #if HAVE_DECL_LOG_PERROR
428  openlog ("dbus", LOG_PID | LOG_PERROR, LOG_DAEMON);
429 #else
430  openlog ("dbus", LOG_PID, LOG_DAEMON);
431 #endif
432 }
433 
442 void
443 _dbus_system_log (DBusSystemLogSeverity severity, const char *msg, ...)
444 {
445  va_list args;
446 
447  va_start (args, msg);
448 
449  _dbus_system_logv (severity, msg, args);
450 
451  va_end (args);
452 }
453 
464 void
465 _dbus_system_logv (DBusSystemLogSeverity severity, const char *msg, va_list args)
466 {
467  int flags;
468  switch (severity)
469  {
470  case DBUS_SYSTEM_LOG_INFO:
471  flags = LOG_DAEMON | LOG_NOTICE;
472  break;
473  case DBUS_SYSTEM_LOG_SECURITY:
474  flags = LOG_AUTH | LOG_NOTICE;
475  break;
476  case DBUS_SYSTEM_LOG_FATAL:
477  flags = LOG_DAEMON|LOG_CRIT;
478  break;
479  default:
480  return;
481  }
482 
483 #ifndef HAVE_DECL_LOG_PERROR
484  {
485  /* vsyslog() won't write to stderr, so we'd better do it */
486  va_list tmp;
487 
488  DBUS_VA_COPY (tmp, args);
489  fprintf (stderr, "dbus[" DBUS_PID_FORMAT "]: ", _dbus_getpid ());
490  vfprintf (stderr, msg, tmp);
491  fputc ('\n', stderr);
492  va_end (tmp);
493  }
494 #endif
495 
496  vsyslog (flags, msg, args);
497 
498  if (severity == DBUS_SYSTEM_LOG_FATAL)
499  exit (1);
500 }
501 
507 void
509  DBusSignalHandler handler)
510 {
511  struct sigaction act;
512  sigset_t empty_mask;
513 
514  sigemptyset (&empty_mask);
515  act.sa_handler = handler;
516  act.sa_mask = empty_mask;
517  act.sa_flags = 0;
518  sigaction (sig, &act, NULL);
519 }
520 
527 _dbus_file_exists (const char *file)
528 {
529  return (access (file, F_OK) == 0);
530 }
531 
539 _dbus_user_at_console (const char *username,
540  DBusError *error)
541 {
542 
543  DBusString u, f;
544  dbus_bool_t result;
545 
546  result = FALSE;
547  if (!_dbus_string_init (&f))
548  {
549  _DBUS_SET_OOM (error);
550  return FALSE;
551  }
552 
553  if (!_dbus_string_append (&f, DBUS_CONSOLE_AUTH_DIR))
554  {
555  _DBUS_SET_OOM (error);
556  goto out;
557  }
558 
559  _dbus_string_init_const (&u, username);
560 
561  if (!_dbus_concat_dir_and_file (&f, &u))
562  {
563  _DBUS_SET_OOM (error);
564  goto out;
565  }
566 
567  result = _dbus_file_exists (_dbus_string_get_const_data (&f));
568 
569  out:
570  _dbus_string_free (&f);
571 
572  return result;
573 }
574 
575 
584 {
585  if (_dbus_string_get_length (filename) > 0)
586  return _dbus_string_get_byte (filename, 0) == '/';
587  else
588  return FALSE;
589 }
590 
600 _dbus_stat (const DBusString *filename,
601  DBusStat *statbuf,
602  DBusError *error)
603 {
604  const char *filename_c;
605  struct stat sb;
606 
607  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
608 
609  filename_c = _dbus_string_get_const_data (filename);
610 
611  if (stat (filename_c, &sb) < 0)
612  {
613  dbus_set_error (error, _dbus_error_from_errno (errno),
614  "%s", _dbus_strerror (errno));
615  return FALSE;
616  }
617 
618  statbuf->mode = sb.st_mode;
619  statbuf->nlink = sb.st_nlink;
620  statbuf->uid = sb.st_uid;
621  statbuf->gid = sb.st_gid;
622  statbuf->size = sb.st_size;
623  statbuf->atime = sb.st_atime;
624  statbuf->mtime = sb.st_mtime;
625  statbuf->ctime = sb.st_ctime;
626 
627  return TRUE;
628 }
629 
630 
635 {
636  DIR *d;
638 };
639 
649  DBusError *error)
650 {
651  DIR *d;
652  DBusDirIter *iter;
653  const char *filename_c;
654 
655  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
656 
657  filename_c = _dbus_string_get_const_data (filename);
658 
659  d = opendir (filename_c);
660  if (d == NULL)
661  {
662  dbus_set_error (error, _dbus_error_from_errno (errno),
663  "Failed to read directory \"%s\": %s",
664  filename_c,
665  _dbus_strerror (errno));
666  return NULL;
667  }
668  iter = dbus_new0 (DBusDirIter, 1);
669  if (iter == NULL)
670  {
671  closedir (d);
673  "Could not allocate memory for directory iterator");
674  return NULL;
675  }
676 
677  iter->d = d;
678 
679  return iter;
680 }
681 
697  DBusString *filename,
698  DBusError *error)
699 {
700  struct dirent *ent;
701  int err;
702 
703  _DBUS_ASSERT_ERROR_IS_CLEAR (error);
704 
705  again:
706  errno = 0;
707  ent = readdir (iter->d);
708 
709  if (!ent)
710  {
711  err = errno;
712 
713  if (err != 0)
714  dbus_set_error (error,
716  "%s", _dbus_strerror (err));
717 
718  return FALSE;
719  }
720  else if (ent->d_name[0] == '.' &&
721  (ent->d_name[1] == '\0' ||
722  (ent->d_name[1] == '.' && ent->d_name[2] == '\0')))
723  goto again;
724  else
725  {
726  _dbus_string_set_length (filename, 0);
727  if (!_dbus_string_append (filename, ent->d_name))
728  {
730  "No memory to read directory entry");
731  return FALSE;
732  }
733  else
734  {
735  return TRUE;
736  }
737  }
738 }
739 
743 void
745 {
746  closedir (iter->d);
747  dbus_free (iter);
748 }
749 
750 static dbus_bool_t
751 fill_user_info_from_group (struct group *g,
752  DBusGroupInfo *info,
753  DBusError *error)
754 {
755  _dbus_assert (g->gr_name != NULL);
756 
757  info->gid = g->gr_gid;
758  info->groupname = _dbus_strdup (g->gr_name);
759 
760  /* info->members = dbus_strdupv (g->gr_mem) */
761 
762  if (info->groupname == NULL)
763  {
765  return FALSE;
766  }
767 
768  return TRUE;
769 }
770 
771 static dbus_bool_t
772 fill_group_info (DBusGroupInfo *info,
773  dbus_gid_t gid,
774  const DBusString *groupname,
775  DBusError *error)
776 {
777  const char *group_c_str;
778 
779  _dbus_assert (groupname != NULL || gid != DBUS_GID_UNSET);
780  _dbus_assert (groupname == NULL || gid == DBUS_GID_UNSET);
781 
782  if (groupname)
783  group_c_str = _dbus_string_get_const_data (groupname);
784  else
785  group_c_str = NULL;
786 
787  /* For now assuming that the getgrnam() and getgrgid() flavors
788  * always correspond to the pwnam flavors, if not we have
789  * to add more configure checks.
790  */
791 
792 #if defined (HAVE_POSIX_GETPWNAM_R) || defined (HAVE_NONPOSIX_GETPWNAM_R)
793  {
794  struct group *g;
795  int result;
796  size_t buflen;
797  char *buf;
798  struct group g_str;
799  dbus_bool_t b;
800 
801  /* retrieve maximum needed size for buf */
802  buflen = sysconf (_SC_GETGR_R_SIZE_MAX);
803 
804  /* sysconf actually returns a long, but everything else expects size_t,
805  * so just recast here.
806  * https://bugs.freedesktop.org/show_bug.cgi?id=17061
807  */
808  if ((long) buflen <= 0)
809  buflen = 1024;
810 
811  result = -1;
812  while (1)
813  {
814  buf = dbus_malloc (buflen);
815  if (buf == NULL)
816  {
818  return FALSE;
819  }
820 
821  g = NULL;
822 #ifdef HAVE_POSIX_GETPWNAM_R
823  if (group_c_str)
824  result = getgrnam_r (group_c_str, &g_str, buf, buflen,
825  &g);
826  else
827  result = getgrgid_r (gid, &g_str, buf, buflen,
828  &g);
829 #else
830  g = getgrnam_r (group_c_str, &g_str, buf, buflen);
831  result = 0;
832 #endif /* !HAVE_POSIX_GETPWNAM_R */
833  /* Try a bigger buffer if ERANGE was returned:
834  https://bugs.freedesktop.org/show_bug.cgi?id=16727
835  */
836  if (result == ERANGE && buflen < 512 * 1024)
837  {
838  dbus_free (buf);
839  buflen *= 2;
840  }
841  else
842  {
843  break;
844  }
845  }
846 
847  if (result == 0 && g == &g_str)
848  {
849  b = fill_user_info_from_group (g, info, error);
850  dbus_free (buf);
851  return b;
852  }
853  else
854  {
855  dbus_set_error (error, _dbus_error_from_errno (errno),
856  "Group %s unknown or failed to look it up\n",
857  group_c_str ? group_c_str : "???");
858  dbus_free (buf);
859  return FALSE;
860  }
861  }
862 #else /* ! HAVE_GETPWNAM_R */
863  {
864  /* I guess we're screwed on thread safety here */
865  struct group *g;
866 
867  g = getgrnam (group_c_str);
868 
869  if (g != NULL)
870  {
871  return fill_user_info_from_group (g, info, error);
872  }
873  else
874  {
875  dbus_set_error (error, _dbus_error_from_errno (errno),
876  "Group %s unknown or failed to look it up\n",
877  group_c_str ? group_c_str : "???");
878  return FALSE;
879  }
880  }
881 #endif /* ! HAVE_GETPWNAM_R */
882 }
883 
895  const DBusString *groupname,
896  DBusError *error)
897 {
898  return fill_group_info (info, DBUS_GID_UNSET,
899  groupname, error);
900 
901 }
902 
914  dbus_gid_t gid,
915  DBusError *error)
916 {
917  return fill_group_info (info, gid, NULL, error);
918 }
919 
930  dbus_uid_t *uid_p)
931 {
932  return _dbus_get_user_id (username, uid_p);
933 
934 }
935 
946  dbus_gid_t *gid_p)
947 {
948  return _dbus_get_group_id (groupname, gid_p);
949 }
950 
963  dbus_gid_t **group_ids,
964  int *n_group_ids)
965 {
966  return _dbus_groups_from_uid (uid, group_ids, n_group_ids);
967 }
968 
980  DBusError *error)
981 {
982  return _dbus_is_console_user (uid, error);
983 
984 }
985 
995 {
996  return uid == _dbus_geteuid ();
997 }
998 
1007 _dbus_windows_user_is_process_owner (const char *windows_sid)
1008 {
1009  return FALSE;
1010 }
1011  /* End of DBusInternalsUtils functions */
1013 
1027  DBusString *dirname)
1028 {
1029  int sep;
1030 
1031  _dbus_assert (filename != dirname);
1032  _dbus_assert (filename != NULL);
1033  _dbus_assert (dirname != NULL);
1034 
1035  /* Ignore any separators on the end */
1036  sep = _dbus_string_get_length (filename);
1037  if (sep == 0)
1038  return _dbus_string_append (dirname, "."); /* empty string passed in */
1039 
1040  while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
1041  --sep;
1042 
1043  _dbus_assert (sep >= 0);
1044 
1045  if (sep == 0)
1046  return _dbus_string_append (dirname, "/");
1047 
1048  /* Now find the previous separator */
1049  _dbus_string_find_byte_backward (filename, sep, '/', &sep);
1050  if (sep < 0)
1051  return _dbus_string_append (dirname, ".");
1052 
1053  /* skip multiple separators */
1054  while (sep > 0 && _dbus_string_get_byte (filename, sep - 1) == '/')
1055  --sep;
1056 
1057  _dbus_assert (sep >= 0);
1058 
1059  if (sep == 0 &&
1060  _dbus_string_get_byte (filename, 0) == '/')
1061  return _dbus_string_append (dirname, "/");
1062  else
1063  return _dbus_string_copy_len (filename, 0, sep - 0,
1064  dirname, _dbus_string_get_length (dirname));
1065 } /* DBusString stuff */
1067 
1068 static void
1069 string_squash_nonprintable (DBusString *str)
1070 {
1071  unsigned char *buf;
1072  int i, len;
1073 
1074  buf = _dbus_string_get_data (str);
1075  len = _dbus_string_get_length (str);
1076 
1077  for (i = 0; i < len; i++)
1078  {
1079  unsigned char c = (unsigned char) buf[i];
1080  if (c == '\0')
1081  buf[i] = ' ';
1082  else if (c < 0x20 || c > 127)
1083  buf[i] = '?';
1084  }
1085 }
1086 
1101 dbus_bool_t
1102 _dbus_command_for_pid (unsigned long pid,
1103  DBusString *str,
1104  int max_len,
1105  DBusError *error)
1106 {
1107  /* This is all Linux-specific for now */
1108  DBusString path;
1109  DBusString cmdline;
1110  int fd;
1111 
1112  if (!_dbus_string_init (&path))
1113  {
1114  _DBUS_SET_OOM (error);
1115  return FALSE;
1116  }
1117 
1118  if (!_dbus_string_init (&cmdline))
1119  {
1120  _DBUS_SET_OOM (error);
1121  _dbus_string_free (&path);
1122  return FALSE;
1123  }
1124 
1125  if (!_dbus_string_append_printf (&path, "/proc/%ld/cmdline", pid))
1126  goto oom;
1127 
1128  fd = open (_dbus_string_get_const_data (&path), O_RDONLY);
1129  if (fd < 0)
1130  {
1131  dbus_set_error (error,
1132  _dbus_error_from_errno (errno),
1133  "Failed to open \"%s\": %s",
1134  _dbus_string_get_const_data (&path),
1135  _dbus_strerror (errno));
1136  goto fail;
1137  }
1138 
1139  if (!_dbus_read (fd, &cmdline, max_len))
1140  {
1141  dbus_set_error (error,
1142  _dbus_error_from_errno (errno),
1143  "Failed to read from \"%s\": %s",
1144  _dbus_string_get_const_data (&path),
1145  _dbus_strerror (errno));
1146  goto fail;
1147  }
1148 
1149  if (!_dbus_close (fd, error))
1150  goto fail;
1151 
1152  string_squash_nonprintable (&cmdline);
1153 
1154  if (!_dbus_string_copy (&cmdline, 0, str, _dbus_string_get_length (str)))
1155  goto oom;
1156 
1157  _dbus_string_free (&cmdline);
1158  _dbus_string_free (&path);
1159  return TRUE;
1160 oom:
1161  _DBUS_SET_OOM (error);
1162 fail:
1163  _dbus_string_free (&cmdline);
1164  _dbus_string_free (&path);
1165  return FALSE;
1166 }