Sortix 1.1dev ports manual
This manual documents Sortix 1.1dev ports. You can instead view this document in the latest official manual.
dbus-daemon(1) | General Commands Manual | dbus-daemon(1) |
NAME
dbus-daemon - Message bus daemonSYNOPSIS
dbus-daemon dbus-daemon [--version] [--session] [--system] [--config-file=FILE] [--print-address[=DESCRIPTOR]] [--print-pid[=DESCRIPTOR]] [--fork]DESCRIPTION
dbus-daemon is the D-Bus message bus daemon. See http://www.freedesktop.org/software/dbus/ for more information about the big picture. D-Bus is first a library that provides one-to-one communication between any two applications; dbus-daemon is an application that uses this library to implement a message bus daemon. Multiple programs connect to the message bus daemon and can exchange messages with one another. There are two standard message bus instances: the systemwide message bus (installed on many systems as the "messagebus" init service) and the per-user-login-session message bus (started each time a user logs in). dbus-daemon is used for both of these instances, but with a different configuration file. The --session option is equivalent to "--config-file=/etc/dbus-1/session.conf" and the --system option is equivalent to "--config-file=/etc/dbus-1/system.conf". By creating additional configuration files and using the --config-file option, additional special-purpose message bus daemons could be created. The systemwide daemon is normally launched by an init script, standardly called simply "messagebus". The systemwide daemon is largely used for broadcasting system events, such as changes to the printer queue, or adding/removing devices. The per-session daemon is used for various interprocess communication among desktop applications (however, it is not tied to X or the GUI in any way). SIGHUP will cause the D-Bus daemon to PARTIALLY reload its configuration file and to flush its user/group information caches. Some configuration changes would require kicking all apps off the bus; so they will only take effect if you restart the daemon. Policy changes should take effect with SIGHUP.OPTIONS
The following options are supported:- --config-file=FILE
- Use the given configuration file.
- --fork
- Force the message bus to fork and become a daemon, even if the configuration file does not specify that it should. In most contexts the configuration file already gets this right, though. --nofork Force the message bus not to fork and become a daemon, even if the configuration file specifies that it should.
- --print-address[=DESCRIPTOR]
- Print the address of the message bus to standard output, or to the given file descriptor. This is used by programs that launch the message bus.
- --print-pid[=DESCRIPTOR]
- Print the process ID of the message bus to standard output, or to the given file descriptor. This is used by programs that launch the message bus.
- --session
- Use the standard configuration file for the per-login-session message bus.
- --system
- Use the standard configuration file for the systemwide message bus.
- --version
- Print the version of the daemon.
- --introspect
- Print the introspection information for all D-Bus internal interfaces.
- --address[=ADDRESS]
- Set the address to listen on. This option overrides the address configured in the configuration file.
- --systemd-activation
- Enable systemd-style service activation. Only useful in conjunction with the systemd system and session manager on Linux.
- --nopidfile
- Don't write a PID file even if one is configured in the
configuration files.
CONFIGURATION FILE
A message bus daemon has a configuration file that specializes it for a particular application. For example, one configuration file might set up the message bus to be a systemwide message bus, while another might set it up to be a per-user-login-session bus. The configuration file also establishes resource limits, security parameters, and so forth. The configuration file is not part of any interoperability specification and its backward compatibility is not guaranteed; this document is documentation, not specification. The standard systemwide and per-session message bus setups are configured in the files "/etc/dbus-1/system.conf" and "/etc/dbus-1/session.conf". These files normally <include> a system-local.conf or session-local.conf; you can put local overrides in those files to avoid modifying the primary configuration files.<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
- <busconfig>
-
- <type>
-
- <include>
-
- <includedir>
-
- <user>
-
- <fork>
-
- <keep_umask>
-
- <listen>
-
- <auth>
-
- <servicedir>
-
- <standard_session_servicedirs/>
-
- <standard_system_servicedirs/>
-
- <servicehelper/>
-
- <limit>
-
<limit name="max_message_size">64</limit> <limit name="max_completed_connections">512</limit>
"max_incoming_bytes" : total size in bytes of messages incoming from a single connection "max_incoming_unix_fds" : total number of unix fds of messages incoming from a single connection "max_outgoing_bytes" : total size in bytes of messages queued up for a single connection "max_outgoing_unix_fds" : total number of unix fds of messages queued up for a single connection "max_message_size" : max size of a single message in bytes "max_message_unix_fds" : max unix fds of a single message "service_start_timeout" : milliseconds (thousandths) until a started service has to connect "auth_timeout" : milliseconds (thousandths) a connection is given to authenticate "max_completed_connections" : max number of authenticated connections "max_incomplete_connections" : max number of unauthenticated connections "max_connections_per_user" : max number of completed connections from the same user "max_pending_service_starts" : max number of service launches in progress at the same time "max_names_per_connection" : max number of names a single connection can own "max_match_rules_per_connection": max number of match rules for a single connection "max_replies_per_connection" : max number of pending method replies per connection (number of calls-in-progress) "reply_timeout" : milliseconds (thousandths) until a method call times out
- <policy>
-
context="(default|mandatory)" at_console="(true|false)" user="username or userid" group="group name or gid"
- all context="default" policies are applied - all group="connection's user's group" policies are applied in undefined order - all user="connection's auth user" policies are applied in undefined order - all at_console="true" policies are applied - all at_console="false" policies are applied - all context="mandatory" policies are applied
- <deny>
- <allow>
send_interface="interface_name" send_member="method_or_signal_name" send_error="error_name" send_destination="name" send_type="method_call" | "method_return" | "signal" | "error" send_path="/path/name" receive_interface="interface_name" receive_member="method_or_signal_name" receive_error="error_name" receive_sender="name" receive_type="method_call" | "method_return" | "signal" | "error" receive_path="/path/name" send_requested_reply="true" | "false" receive_requested_reply="true" | "false" eavesdrop="true" | "false" own="name" own_prefix="name" user="username" group="groupname"
<deny send_destination="org.freedesktop.Service" send_interface="org.freedesktop.System" send_member="Reboot"/> <deny send_destination="org.freedesktop.System"/> <deny receive_sender="org.freedesktop.System"/> <deny user="john"/> <deny group="enemies"/>
- <selinux>
-
- <associate>
-
<associate own="org.freedesktop.Foobar" context="foo_t"/>
<associate own="*" context="foo_t"/>If you find a reason this is useful, let the developers know. Right now the default will be the security context of the bus itself.
SELinux
See http://www.nsa.gov/selinux/ for full details on SELinux. Some useful excerpts:- Every subject (process) and object (e.g. file, socket, IPC
object, etc) in the system is assigned a collection of security
attributes, known as a security context. A security context contains all
of the security attributes associated with a particular subject or object
that are relevant to the security policy.
- In order to better encapsulate security contexts and to
provide greater efficiency, the policy enforcement code of SELinux
typically handles security identifiers (SIDs) rather than security
contexts. A SID is an integer that is mapped by the security server to a
security context at runtime.
- When a security decision is required, the policy
enforcement code passes a pair of SIDs (typically the SID of a subject and
the SID of an object, but sometimes a pair of subject SIDs or a pair of
object SIDs), and an object security class to the security server. The
object security class indicates the kind of object, e.g. a process, a
regular file, a directory, a TCP socket, etc.
- Access decisions specify whether or not a permission is
granted for a given pair of SIDs and class. Each object class has a set of
associated permissions defined to control operations on objects with that
class.
DEBUGGING
If you're trying to figure out where your messages are going or why you aren't getting messages, there are several things you can try. Remember that the system bus is heavily locked down and if you haven't installed a security policy file to allow your message through, it won't work. For the session bus, this is not a concern. The simplest way to figure out what's happening on the bus is to run the dbus-monitor program, which comes with the D-Bus package. You can also send test messages with dbus-send. These programs have their own man pages. If you want to know what the daemon itself is doing, you might consider running a separate copy of the daemon to test against. This will allow you to put the daemon under a debugger, or run it with verbose output, without messing up your real session and system daemons. To run a separate test copy of the daemon, for example you might open a terminal and type:DBUS_VERBOSE=1 dbus-daemon --session --print-addressThe test daemon address will be printed when the daemon starts. You will need to copy-and-paste this address and use it as the value of the DBUS_SESSION_BUS_ADDRESS environment variable when you launch the applications you want to test. This will cause those applications to connect to your test bus instead of the DBUS_SESSION_BUS_ADDRESS of your real session bus. DBUS_VERBOSE=1 will have NO EFFECT unless your copy of D-Bus was compiled with verbose mode enabled. This is not recommended in production builds due to performance impact. You may need to rebuild D-Bus if your copy was not built with debugging in mind. (DBUS_VERBOSE also affects the D-Bus library and thus applications using D-Bus; it may be useful to see verbose output on both the client side and from the daemon.) If you want to get fancy, you can create a custom bus configuration for your test bus (see the session.conf and system.conf files that define the two default configurations for example). This would allow you to specify a different directory for .service files, for example.