]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/login/logind.c
tree-wide: remove Lennart's copyright lines
[thirdparty/systemd.git] / src / login / logind.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <errno.h>
4 #include <fcntl.h>
5 #include <string.h>
6 #include <unistd.h>
7
8 #include "libudev.h"
9 #include "sd-daemon.h"
10
11 #include "alloc-util.h"
12 #include "bus-error.h"
13 #include "bus-util.h"
14 #include "cgroup-util.h"
15 #include "def.h"
16 #include "dirent-util.h"
17 #include "fd-util.h"
18 #include "format-util.h"
19 #include "fs-util.h"
20 #include "logind.h"
21 #include "parse-util.h"
22 #include "process-util.h"
23 #include "selinux-util.h"
24 #include "signal-util.h"
25 #include "strv.h"
26 #include "udev-util.h"
27
28 static Manager* manager_unref(Manager *m);
29 DEFINE_TRIVIAL_CLEANUP_FUNC(Manager*, manager_unref);
30
31 static int manager_new(Manager **ret) {
32 _cleanup_(manager_unrefp) Manager *m = NULL;
33 int r;
34
35 assert(ret);
36
37 m = new0(Manager, 1);
38 if (!m)
39 return -ENOMEM;
40
41 m->console_active_fd = -1;
42 m->reserve_vt_fd = -1;
43
44 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
45
46 m->devices = hashmap_new(&string_hash_ops);
47 m->seats = hashmap_new(&string_hash_ops);
48 m->sessions = hashmap_new(&string_hash_ops);
49 m->users = hashmap_new(NULL);
50 m->inhibitors = hashmap_new(&string_hash_ops);
51 m->buttons = hashmap_new(&string_hash_ops);
52
53 m->user_units = hashmap_new(&string_hash_ops);
54 m->session_units = hashmap_new(&string_hash_ops);
55
56 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->user_units || !m->session_units)
57 return -ENOMEM;
58
59 m->udev = udev_new();
60 if (!m->udev)
61 return -errno;
62
63 r = sd_event_default(&m->event);
64 if (r < 0)
65 return r;
66
67 r = sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
68 if (r < 0)
69 return r;
70
71 r = sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
72 if (r < 0)
73 return r;
74
75 (void) sd_event_set_watchdog(m->event, true);
76
77 manager_reset_config(m);
78
79 *ret = TAKE_PTR(m);
80 return 0;
81 }
82
83 static Manager* manager_unref(Manager *m) {
84 Session *session;
85 User *u;
86 Device *d;
87 Seat *s;
88 Inhibitor *i;
89 Button *b;
90
91 if (!m)
92 return NULL;
93
94 while ((session = hashmap_first(m->sessions)))
95 session_free(session);
96
97 while ((u = hashmap_first(m->users)))
98 user_free(u);
99
100 while ((d = hashmap_first(m->devices)))
101 device_free(d);
102
103 while ((s = hashmap_first(m->seats)))
104 seat_free(s);
105
106 while ((i = hashmap_first(m->inhibitors)))
107 inhibitor_free(i);
108
109 while ((b = hashmap_first(m->buttons)))
110 button_free(b);
111
112 hashmap_free(m->devices);
113 hashmap_free(m->seats);
114 hashmap_free(m->sessions);
115 hashmap_free(m->users);
116 hashmap_free(m->inhibitors);
117 hashmap_free(m->buttons);
118
119 hashmap_free(m->user_units);
120 hashmap_free(m->session_units);
121
122 sd_event_source_unref(m->idle_action_event_source);
123 sd_event_source_unref(m->inhibit_timeout_source);
124 sd_event_source_unref(m->scheduled_shutdown_timeout_source);
125 sd_event_source_unref(m->nologin_timeout_source);
126 sd_event_source_unref(m->wall_message_timeout_source);
127
128 sd_event_source_unref(m->console_active_event_source);
129 sd_event_source_unref(m->udev_seat_event_source);
130 sd_event_source_unref(m->udev_device_event_source);
131 sd_event_source_unref(m->udev_vcsa_event_source);
132 sd_event_source_unref(m->udev_button_event_source);
133 sd_event_source_unref(m->lid_switch_ignore_event_source);
134
135 safe_close(m->console_active_fd);
136
137 udev_monitor_unref(m->udev_seat_monitor);
138 udev_monitor_unref(m->udev_device_monitor);
139 udev_monitor_unref(m->udev_vcsa_monitor);
140 udev_monitor_unref(m->udev_button_monitor);
141
142 udev_unref(m->udev);
143
144 if (m->unlink_nologin)
145 (void) unlink_or_warn("/run/nologin");
146
147 bus_verify_polkit_async_registry_free(m->polkit_registry);
148
149 sd_bus_unref(m->bus);
150 sd_event_unref(m->event);
151
152 safe_close(m->reserve_vt_fd);
153
154 strv_free(m->kill_only_users);
155 strv_free(m->kill_exclude_users);
156
157 free(m->scheduled_shutdown_type);
158 free(m->scheduled_shutdown_tty);
159 free(m->wall_message);
160 free(m->action_job);
161
162 return mfree(m);
163 }
164
165 static int manager_enumerate_devices(Manager *m) {
166 struct udev_list_entry *item = NULL, *first = NULL;
167 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
168 int r;
169
170 assert(m);
171
172 /* Loads devices from udev and creates seats for them as
173 * necessary */
174
175 e = udev_enumerate_new(m->udev);
176 if (!e)
177 return -ENOMEM;
178
179 r = udev_enumerate_add_match_tag(e, "master-of-seat");
180 if (r < 0)
181 return r;
182
183 r = udev_enumerate_add_match_is_initialized(e);
184 if (r < 0)
185 return r;
186
187 r = udev_enumerate_scan_devices(e);
188 if (r < 0)
189 return r;
190
191 first = udev_enumerate_get_list_entry(e);
192 udev_list_entry_foreach(item, first) {
193 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
194 int k;
195
196 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
197 if (!d)
198 return -ENOMEM;
199
200 k = manager_process_seat_device(m, d);
201 if (k < 0)
202 r = k;
203 }
204
205 return r;
206 }
207
208 static int manager_enumerate_buttons(Manager *m) {
209 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
210 struct udev_list_entry *item = NULL, *first = NULL;
211 int r;
212
213 assert(m);
214
215 /* Loads buttons from udev */
216
217 if (manager_all_buttons_ignored(m))
218 return 0;
219
220 e = udev_enumerate_new(m->udev);
221 if (!e)
222 return -ENOMEM;
223
224 r = udev_enumerate_add_match_subsystem(e, "input");
225 if (r < 0)
226 return r;
227
228 r = udev_enumerate_add_match_tag(e, "power-switch");
229 if (r < 0)
230 return r;
231
232 r = udev_enumerate_add_match_is_initialized(e);
233 if (r < 0)
234 return r;
235
236 r = udev_enumerate_scan_devices(e);
237 if (r < 0)
238 return r;
239
240 first = udev_enumerate_get_list_entry(e);
241 udev_list_entry_foreach(item, first) {
242 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
243 int k;
244
245 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
246 if (!d)
247 return -ENOMEM;
248
249 k = manager_process_button_device(m, d);
250 if (k < 0)
251 r = k;
252 }
253
254 return r;
255 }
256
257 static int manager_enumerate_seats(Manager *m) {
258 _cleanup_closedir_ DIR *d = NULL;
259 struct dirent *de;
260 int r = 0;
261
262 assert(m);
263
264 /* This loads data about seats stored on disk, but does not
265 * actually create any seats. Removes data of seats that no
266 * longer exist. */
267
268 d = opendir("/run/systemd/seats");
269 if (!d) {
270 if (errno == ENOENT)
271 return 0;
272
273 return log_error_errno(errno, "Failed to open /run/systemd/seats: %m");
274 }
275
276 FOREACH_DIRENT(de, d, return -errno) {
277 Seat *s;
278 int k;
279
280 if (!dirent_is_file(de))
281 continue;
282
283 s = hashmap_get(m->seats, de->d_name);
284 if (!s) {
285 if (unlinkat(dirfd(d), de->d_name, 0) < 0)
286 log_warning("Failed to remove /run/systemd/seats/%s: %m",
287 de->d_name);
288 continue;
289 }
290
291 k = seat_load(s);
292 if (k < 0)
293 r = k;
294 }
295
296 return r;
297 }
298
299 static int manager_enumerate_linger_users(Manager *m) {
300 _cleanup_closedir_ DIR *d = NULL;
301 struct dirent *de;
302 int r = 0;
303
304 assert(m);
305
306 d = opendir("/var/lib/systemd/linger");
307 if (!d) {
308 if (errno == ENOENT)
309 return 0;
310
311 return log_error_errno(errno, "Failed to open /var/lib/systemd/linger/: %m");
312 }
313
314 FOREACH_DIRENT(de, d, return -errno) {
315 int k;
316
317 if (!dirent_is_file(de))
318 continue;
319
320 k = manager_add_user_by_name(m, de->d_name, NULL);
321 if (k < 0) {
322 log_notice_errno(k, "Couldn't add lingering user %s: %m", de->d_name);
323 r = k;
324 }
325 }
326
327 return r;
328 }
329
330 static int manager_enumerate_users(Manager *m) {
331 _cleanup_closedir_ DIR *d = NULL;
332 struct dirent *de;
333 int r, k;
334
335 assert(m);
336
337 /* Add lingering users */
338 r = manager_enumerate_linger_users(m);
339
340 /* Read in user data stored on disk */
341 d = opendir("/run/systemd/users");
342 if (!d) {
343 if (errno == ENOENT)
344 return 0;
345
346 return log_error_errno(errno, "Failed to open /run/systemd/users: %m");
347 }
348
349 FOREACH_DIRENT(de, d, return -errno) {
350 User *u;
351
352 if (!dirent_is_file(de))
353 continue;
354
355 k = manager_add_user_by_name(m, de->d_name, &u);
356 if (k < 0) {
357 log_error_errno(k, "Failed to add user by file name %s: %m", de->d_name);
358
359 r = k;
360 continue;
361 }
362
363 user_add_to_gc_queue(u);
364
365 k = user_load(u);
366 if (k < 0)
367 r = k;
368 }
369
370 return r;
371 }
372
373 static int parse_fdname(const char *fdname, char **session_id, dev_t *dev) {
374 _cleanup_strv_free_ char **parts = NULL;
375 _cleanup_free_ char *id = NULL;
376 unsigned int major, minor;
377 int r;
378
379 parts = strv_split(fdname, "-");
380 if (!parts)
381 return -ENOMEM;
382 if (strv_length(parts) != 5)
383 return -EINVAL;
384
385 if (!streq(parts[0], "session"))
386 return -EINVAL;
387
388 id = strdup(parts[1]);
389 if (!id)
390 return -ENOMEM;
391
392 if (!streq(parts[2], "device"))
393 return -EINVAL;
394
395 r = safe_atou(parts[3], &major);
396 if (r < 0)
397 return r;
398 r = safe_atou(parts[4], &minor);
399 if (r < 0)
400 return r;
401
402 *dev = makedev(major, minor);
403 *session_id = TAKE_PTR(id);
404
405 return 0;
406 }
407
408 static int manager_attach_fds(Manager *m) {
409 _cleanup_strv_free_ char **fdnames = NULL;
410 int n, i, fd;
411
412 /* Upon restart, PID1 will send us back all fds of session devices
413 * that we previously opened. Each file descriptor is associated
414 * with a given session. The session ids are passed through FDNAMES. */
415
416 n = sd_listen_fds_with_names(true, &fdnames);
417 if (n <= 0)
418 return n;
419
420 for (i = 0; i < n; i++) {
421 _cleanup_free_ char *id = NULL;
422 dev_t dev;
423 struct stat st;
424 SessionDevice *sd;
425 Session *s;
426 int r;
427
428 fd = SD_LISTEN_FDS_START + i;
429
430 r = parse_fdname(fdnames[i], &id, &dev);
431 if (r < 0) {
432 log_debug_errno(r, "Failed to parse fd name %s: %m", fdnames[i]);
433 close_nointr(fd);
434 continue;
435 }
436
437 s = hashmap_get(m->sessions, id);
438 if (!s) {
439 /* If the session doesn't exist anymore, the associated session
440 * device attached to this fd doesn't either. Let's simply close
441 * this fd. */
442 log_debug("Failed to attach fd for unknown session: %s", id);
443 close_nointr(fd);
444 continue;
445 }
446
447 if (fstat(fd, &st) < 0) {
448 /* The device is allowed to go away at a random point, in which
449 * case fstat failing is expected. */
450 log_debug_errno(errno, "Failed to stat device fd for session %s: %m", id);
451 close_nointr(fd);
452 continue;
453 }
454
455 if (!S_ISCHR(st.st_mode) || st.st_rdev != dev) {
456 log_debug("Device fd doesn't point to the expected character device node");
457 close_nointr(fd);
458 continue;
459 }
460
461 sd = hashmap_get(s->devices, &dev);
462 if (!sd) {
463 /* Weird, we got an fd for a session device which wasn't
464 * recorded in the session state file... */
465 log_warning("Got fd for missing session device [%u:%u] in session %s",
466 major(dev), minor(dev), s->id);
467 close_nointr(fd);
468 continue;
469 }
470
471 log_debug("Attaching fd to session device [%u:%u] for session %s",
472 major(dev), minor(dev), s->id);
473
474 session_device_attach_fd(sd, fd, s->was_active);
475 }
476
477 return 0;
478 }
479
480 static int manager_enumerate_sessions(Manager *m) {
481 _cleanup_closedir_ DIR *d = NULL;
482 struct dirent *de;
483 int r = 0, k;
484
485 assert(m);
486
487 /* Read in session data stored on disk */
488 d = opendir("/run/systemd/sessions");
489 if (!d) {
490 if (errno == ENOENT)
491 return 0;
492
493 return log_error_errno(errno, "Failed to open /run/systemd/sessions: %m");
494 }
495
496 FOREACH_DIRENT(de, d, return -errno) {
497 struct Session *s;
498
499 if (!dirent_is_file(de))
500 continue;
501
502 if (!session_id_valid(de->d_name)) {
503 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
504 r = -EINVAL;
505 continue;
506 }
507
508 k = manager_add_session(m, de->d_name, &s);
509 if (k < 0) {
510 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name);
511 r = k;
512 continue;
513 }
514
515 session_add_to_gc_queue(s);
516
517 k = session_load(s);
518 if (k < 0)
519 r = k;
520 }
521
522 /* We might be restarted and PID1 could have sent us back the
523 * session device fds we previously saved. */
524 k = manager_attach_fds(m);
525 if (k < 0)
526 log_warning_errno(k, "Failed to reattach session device fds: %m");
527
528 return r;
529 }
530
531 static int manager_enumerate_inhibitors(Manager *m) {
532 _cleanup_closedir_ DIR *d = NULL;
533 struct dirent *de;
534 int r = 0;
535
536 assert(m);
537
538 d = opendir("/run/systemd/inhibit");
539 if (!d) {
540 if (errno == ENOENT)
541 return 0;
542
543 return log_error_errno(errno, "Failed to open /run/systemd/inhibit: %m");
544 }
545
546 FOREACH_DIRENT(de, d, return -errno) {
547 int k;
548 Inhibitor *i;
549
550 if (!dirent_is_file(de))
551 continue;
552
553 k = manager_add_inhibitor(m, de->d_name, &i);
554 if (k < 0) {
555 log_notice_errno(k, "Couldn't add inhibitor %s: %m", de->d_name);
556 r = k;
557 continue;
558 }
559
560 k = inhibitor_load(i);
561 if (k < 0)
562 r = k;
563 }
564
565 return r;
566 }
567
568 static int manager_dispatch_seat_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
569 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
570 Manager *m = userdata;
571
572 assert(m);
573
574 d = udev_monitor_receive_device(m->udev_seat_monitor);
575 if (!d)
576 return -ENOMEM;
577
578 manager_process_seat_device(m, d);
579 return 0;
580 }
581
582 static int manager_dispatch_device_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
583 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
584 Manager *m = userdata;
585
586 assert(m);
587
588 d = udev_monitor_receive_device(m->udev_device_monitor);
589 if (!d)
590 return -ENOMEM;
591
592 manager_process_seat_device(m, d);
593 return 0;
594 }
595
596 static int manager_dispatch_vcsa_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
597 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
598 Manager *m = userdata;
599 const char *name;
600
601 assert(m);
602
603 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
604 if (!d)
605 return -ENOMEM;
606
607 name = udev_device_get_sysname(d);
608
609 /* Whenever a VCSA device is removed try to reallocate our
610 * VTs, to make sure our auto VTs never go away. */
611
612 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
613 seat_preallocate_vts(m->seat0);
614
615 return 0;
616 }
617
618 static int manager_dispatch_button_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
619 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
620 Manager *m = userdata;
621
622 assert(m);
623
624 d = udev_monitor_receive_device(m->udev_button_monitor);
625 if (!d)
626 return -ENOMEM;
627
628 manager_process_button_device(m, d);
629 return 0;
630 }
631
632 static int manager_dispatch_console(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
633 Manager *m = userdata;
634
635 assert(m);
636 assert(m->seat0);
637 assert(m->console_active_fd == fd);
638
639 seat_read_active_vt(m->seat0);
640 return 0;
641 }
642
643 static int manager_reserve_vt(Manager *m) {
644 _cleanup_free_ char *p = NULL;
645
646 assert(m);
647
648 if (m->reserve_vt <= 0)
649 return 0;
650
651 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
652 return log_oom();
653
654 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
655 if (m->reserve_vt_fd < 0) {
656
657 /* Don't complain on VT-less systems */
658 if (errno != ENOENT)
659 log_warning_errno(errno, "Failed to pin reserved VT: %m");
660 return -errno;
661 }
662
663 return 0;
664 }
665
666 static int manager_connect_bus(Manager *m) {
667 int r;
668
669 assert(m);
670 assert(!m->bus);
671
672 r = sd_bus_default_system(&m->bus);
673 if (r < 0)
674 return log_error_errno(r, "Failed to connect to system bus: %m");
675
676 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable, m);
677 if (r < 0)
678 return log_error_errno(r, "Failed to add manager object vtable: %m");
679
680 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable, seat_object_find, m);
681 if (r < 0)
682 return log_error_errno(r, "Failed to add seat object vtable: %m");
683
684 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/seat", seat_node_enumerator, m);
685 if (r < 0)
686 return log_error_errno(r, "Failed to add seat enumerator: %m");
687
688 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m);
689 if (r < 0)
690 return log_error_errno(r, "Failed to add session object vtable: %m");
691
692 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m);
693 if (r < 0)
694 return log_error_errno(r, "Failed to add session enumerator: %m");
695
696 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable, user_object_find, m);
697 if (r < 0)
698 return log_error_errno(r, "Failed to add user object vtable: %m");
699
700 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/user", user_node_enumerator, m);
701 if (r < 0)
702 return log_error_errno(r, "Failed to add user enumerator: %m");
703
704 r = sd_bus_match_signal_async(
705 m->bus,
706 NULL,
707 "org.freedesktop.systemd1",
708 "/org/freedesktop/systemd1",
709 "org.freedesktop.systemd1.Manager",
710 "JobRemoved",
711 match_job_removed, NULL, m);
712 if (r < 0)
713 return log_error_errno(r, "Failed to request match for JobRemoved: %m");
714
715 r = sd_bus_match_signal_async(
716 m->bus,
717 NULL,
718 "org.freedesktop.systemd1",
719 "/org/freedesktop/systemd1",
720 "org.freedesktop.systemd1.Manager",
721 "UnitRemoved",
722 match_unit_removed, NULL, m);
723 if (r < 0)
724 return log_error_errno(r, "Failed to request match for UnitRemoved: %m");
725
726 r = sd_bus_match_signal_async(
727 m->bus,
728 NULL,
729 "org.freedesktop.systemd1",
730 NULL,
731 "org.freedesktop.DBus.Properties",
732 "PropertiesChanged",
733 match_properties_changed, NULL, m);
734 if (r < 0)
735 return log_error_errno(r, "Failed to request match for PropertiesChanged: %m");
736
737 r = sd_bus_match_signal_async(
738 m->bus,
739 NULL,
740 "org.freedesktop.systemd1",
741 "/org/freedesktop/systemd1",
742 "org.freedesktop.systemd1.Manager",
743 "Reloading",
744 match_reloading, NULL, m);
745 if (r < 0)
746 return log_error_errno(r, "Failed to request match for Reloading: %m");
747
748 r = sd_bus_call_method_async(
749 m->bus,
750 NULL,
751 "org.freedesktop.systemd1",
752 "/org/freedesktop/systemd1",
753 "org.freedesktop.systemd1.Manager",
754 "Subscribe",
755 NULL, NULL,
756 NULL);
757 if (r < 0)
758 return log_error_errno(r, "Failed to enable subscription: %m");
759
760 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.login1", 0, NULL, NULL);
761 if (r < 0)
762 return log_error_errno(r, "Failed to request name: %m");
763
764 r = sd_bus_attach_event(m->bus, m->event, SD_EVENT_PRIORITY_NORMAL);
765 if (r < 0)
766 return log_error_errno(r, "Failed to attach bus to event loop: %m");
767
768 return 0;
769 }
770
771 static int manager_vt_switch(sd_event_source *src, const struct signalfd_siginfo *si, void *data) {
772 Manager *m = data;
773 Session *active, *iter;
774
775 /*
776 * We got a VT-switch signal and we have to acknowledge it immediately.
777 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
778 * old user-space might run multiple sessions on a single VT, *sigh*.
779 * Therefore, we have to iterate all sessions and find one with a vtfd
780 * on the requested VT.
781 * As only VTs with active controllers have VT_PROCESS set, our current
782 * notion of the active VT might be wrong (for instance if the switch
783 * happens while we setup VT_PROCESS). Therefore, read the current VT
784 * first and then use s->active->vtnr as reference. Note that this is
785 * not racy, as no further VT-switch can happen as long as we're in
786 * synchronous VT_PROCESS mode.
787 */
788
789 assert(m->seat0);
790 seat_read_active_vt(m->seat0);
791
792 active = m->seat0->active;
793 if (!active || active->vtnr < 1) {
794 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
795 return 0;
796 }
797
798 if (active->vtfd >= 0) {
799 session_leave_vt(active);
800 } else {
801 LIST_FOREACH(sessions_by_seat, iter, m->seat0->sessions) {
802 if (iter->vtnr == active->vtnr && iter->vtfd >= 0) {
803 session_leave_vt(iter);
804 break;
805 }
806 }
807 }
808
809 return 0;
810 }
811
812 static int manager_connect_console(Manager *m) {
813 int r;
814
815 assert(m);
816 assert(m->console_active_fd < 0);
817
818 /* On certain architectures (S390 and Xen, and containers),
819 /dev/tty0 does not exist, so don't fail if we can't open
820 it. */
821 if (access("/dev/tty0", F_OK) < 0)
822 return 0;
823
824 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
825 if (m->console_active_fd < 0) {
826
827 /* On some systems the device node /dev/tty0 may exist
828 * even though /sys/class/tty/tty0 does not. */
829 if (errno == ENOENT)
830 return 0;
831
832 return log_error_errno(errno, "Failed to open /sys/class/tty/tty0/active: %m");
833 }
834
835 r = sd_event_add_io(m->event, &m->console_active_event_source, m->console_active_fd, 0, manager_dispatch_console, m);
836 if (r < 0) {
837 log_error("Failed to watch foreground console");
838 return r;
839 }
840
841 /*
842 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
843 * as VT-acquire signal. We ignore any acquire-events (yes, we still
844 * have to provide a valid signal-number for it!) and acknowledge all
845 * release events immediately.
846 */
847
848 if (SIGRTMIN + 1 > SIGRTMAX) {
849 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN, SIGRTMAX);
850 return -EINVAL;
851 }
852
853 assert_se(ignore_signals(SIGRTMIN + 1, -1) >= 0);
854 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGRTMIN, -1) >= 0);
855
856 r = sd_event_add_signal(m->event, NULL, SIGRTMIN, manager_vt_switch, m);
857 if (r < 0)
858 return r;
859
860 return 0;
861 }
862
863 static int manager_connect_udev(Manager *m) {
864 int r;
865
866 assert(m);
867 assert(!m->udev_seat_monitor);
868 assert(!m->udev_device_monitor);
869 assert(!m->udev_vcsa_monitor);
870 assert(!m->udev_button_monitor);
871
872 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
873 if (!m->udev_seat_monitor)
874 return -ENOMEM;
875
876 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
877 if (r < 0)
878 return r;
879
880 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
881 if (r < 0)
882 return r;
883
884 r = sd_event_add_io(m->event, &m->udev_seat_event_source, udev_monitor_get_fd(m->udev_seat_monitor), EPOLLIN, manager_dispatch_seat_udev, m);
885 if (r < 0)
886 return r;
887
888 m->udev_device_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
889 if (!m->udev_device_monitor)
890 return -ENOMEM;
891
892 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
893 if (r < 0)
894 return r;
895
896 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
897 if (r < 0)
898 return r;
899
900 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
901 if (r < 0)
902 return r;
903
904 r = udev_monitor_enable_receiving(m->udev_device_monitor);
905 if (r < 0)
906 return r;
907
908 r = sd_event_add_io(m->event, &m->udev_device_event_source, udev_monitor_get_fd(m->udev_device_monitor), EPOLLIN, manager_dispatch_device_udev, m);
909 if (r < 0)
910 return r;
911
912 /* Don't watch keys if nobody cares */
913 if (!manager_all_buttons_ignored(m)) {
914 m->udev_button_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
915 if (!m->udev_button_monitor)
916 return -ENOMEM;
917
918 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
919 if (r < 0)
920 return r;
921
922 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
923 if (r < 0)
924 return r;
925
926 r = udev_monitor_enable_receiving(m->udev_button_monitor);
927 if (r < 0)
928 return r;
929
930 r = sd_event_add_io(m->event, &m->udev_button_event_source, udev_monitor_get_fd(m->udev_button_monitor), EPOLLIN, manager_dispatch_button_udev, m);
931 if (r < 0)
932 return r;
933 }
934
935 /* Don't bother watching VCSA devices, if nobody cares */
936 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
937
938 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
939 if (!m->udev_vcsa_monitor)
940 return -ENOMEM;
941
942 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
943 if (r < 0)
944 return r;
945
946 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
947 if (r < 0)
948 return r;
949
950 r = sd_event_add_io(m->event, &m->udev_vcsa_event_source, udev_monitor_get_fd(m->udev_vcsa_monitor), EPOLLIN, manager_dispatch_vcsa_udev, m);
951 if (r < 0)
952 return r;
953 }
954
955 return 0;
956 }
957
958 static void manager_gc(Manager *m, bool drop_not_started) {
959 Seat *seat;
960 Session *session;
961 User *user;
962
963 assert(m);
964
965 while ((seat = m->seat_gc_queue)) {
966 LIST_REMOVE(gc_queue, m->seat_gc_queue, seat);
967 seat->in_gc_queue = false;
968
969 if (seat_may_gc(seat, drop_not_started)) {
970 seat_stop(seat, false);
971 seat_free(seat);
972 }
973 }
974
975 while ((session = m->session_gc_queue)) {
976 LIST_REMOVE(gc_queue, m->session_gc_queue, session);
977 session->in_gc_queue = false;
978
979 /* First, if we are not closing yet, initiate stopping */
980 if (session_may_gc(session, drop_not_started) &&
981 session_get_state(session) != SESSION_CLOSING)
982 session_stop(session, false);
983
984 /* Normally, this should make the session referenced
985 * again, if it doesn't then let's get rid of it
986 * immediately */
987 if (session_may_gc(session, drop_not_started)) {
988 session_finalize(session);
989 session_free(session);
990 }
991 }
992
993 while ((user = m->user_gc_queue)) {
994 LIST_REMOVE(gc_queue, m->user_gc_queue, user);
995 user->in_gc_queue = false;
996
997 /* First step: queue stop jobs */
998 if (user_may_gc(user, drop_not_started))
999 user_stop(user, false);
1000
1001 /* Second step: finalize user */
1002 if (user_may_gc(user, drop_not_started)) {
1003 user_finalize(user);
1004 user_free(user);
1005 }
1006 }
1007 }
1008
1009 static int manager_dispatch_idle_action(sd_event_source *s, uint64_t t, void *userdata) {
1010 Manager *m = userdata;
1011 struct dual_timestamp since;
1012 usec_t n, elapse;
1013 int r;
1014
1015 assert(m);
1016
1017 if (m->idle_action == HANDLE_IGNORE ||
1018 m->idle_action_usec <= 0)
1019 return 0;
1020
1021 n = now(CLOCK_MONOTONIC);
1022
1023 r = manager_get_idle_hint(m, &since);
1024 if (r <= 0)
1025 /* Not idle. Let's check if after a timeout it might be idle then. */
1026 elapse = n + m->idle_action_usec;
1027 else {
1028 /* Idle! Let's see if it's time to do something, or if
1029 * we shall sleep for longer. */
1030
1031 if (n >= since.monotonic + m->idle_action_usec &&
1032 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
1033 log_info("System idle. Taking action.");
1034
1035 manager_handle_action(m, 0, m->idle_action, false, false);
1036 m->idle_action_not_before_usec = n;
1037 }
1038
1039 elapse = MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec;
1040 }
1041
1042 if (!m->idle_action_event_source) {
1043
1044 r = sd_event_add_time(
1045 m->event,
1046 &m->idle_action_event_source,
1047 CLOCK_MONOTONIC,
1048 elapse, USEC_PER_SEC*30,
1049 manager_dispatch_idle_action, m);
1050 if (r < 0)
1051 return log_error_errno(r, "Failed to add idle event source: %m");
1052
1053 r = sd_event_source_set_priority(m->idle_action_event_source, SD_EVENT_PRIORITY_IDLE+10);
1054 if (r < 0)
1055 return log_error_errno(r, "Failed to set idle event source priority: %m");
1056 } else {
1057 r = sd_event_source_set_time(m->idle_action_event_source, elapse);
1058 if (r < 0)
1059 return log_error_errno(r, "Failed to set idle event timer: %m");
1060
1061 r = sd_event_source_set_enabled(m->idle_action_event_source, SD_EVENT_ONESHOT);
1062 if (r < 0)
1063 return log_error_errno(r, "Failed to enable idle event timer: %m");
1064 }
1065
1066 return 0;
1067 }
1068
1069 static int manager_dispatch_reload_signal(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1070 Manager *m = userdata;
1071 int r;
1072
1073 manager_reset_config(m);
1074 r = manager_parse_config_file(m);
1075 if (r < 0)
1076 log_warning_errno(r, "Failed to parse config file, using defaults: %m");
1077 else
1078 log_info("Config file reloaded.");
1079
1080 return 0;
1081 }
1082
1083 static int manager_startup(Manager *m) {
1084 int r;
1085 Seat *seat;
1086 Session *session;
1087 User *user;
1088 Button *button;
1089 Inhibitor *inhibitor;
1090 Iterator i;
1091
1092 assert(m);
1093
1094 r = sd_event_add_signal(m->event, NULL, SIGHUP, manager_dispatch_reload_signal, m);
1095 if (r < 0)
1096 return log_error_errno(r, "Failed to register SIGHUP handler: %m");
1097
1098 /* Connect to console */
1099 r = manager_connect_console(m);
1100 if (r < 0)
1101 return r;
1102
1103 /* Connect to udev */
1104 r = manager_connect_udev(m);
1105 if (r < 0)
1106 return log_error_errno(r, "Failed to create udev watchers: %m");
1107
1108 /* Connect to the bus */
1109 r = manager_connect_bus(m);
1110 if (r < 0)
1111 return r;
1112
1113 /* Instantiate magic seat 0 */
1114 r = manager_add_seat(m, "seat0", &m->seat0);
1115 if (r < 0)
1116 return log_error_errno(r, "Failed to add seat0: %m");
1117
1118 r = manager_set_lid_switch_ignore(m, 0 + m->holdoff_timeout_usec);
1119 if (r < 0)
1120 log_warning_errno(r, "Failed to set up lid switch ignore event source: %m");
1121
1122 /* Deserialize state */
1123 r = manager_enumerate_devices(m);
1124 if (r < 0)
1125 log_warning_errno(r, "Device enumeration failed: %m");
1126
1127 r = manager_enumerate_seats(m);
1128 if (r < 0)
1129 log_warning_errno(r, "Seat enumeration failed: %m");
1130
1131 r = manager_enumerate_users(m);
1132 if (r < 0)
1133 log_warning_errno(r, "User enumeration failed: %m");
1134
1135 r = manager_enumerate_sessions(m);
1136 if (r < 0)
1137 log_warning_errno(r, "Session enumeration failed: %m");
1138
1139 r = manager_enumerate_inhibitors(m);
1140 if (r < 0)
1141 log_warning_errno(r, "Inhibitor enumeration failed: %m");
1142
1143 r = manager_enumerate_buttons(m);
1144 if (r < 0)
1145 log_warning_errno(r, "Button enumeration failed: %m");
1146
1147 /* Remove stale objects before we start them */
1148 manager_gc(m, false);
1149
1150 /* Reserve the special reserved VT */
1151 manager_reserve_vt(m);
1152
1153 /* And start everything */
1154 HASHMAP_FOREACH(seat, m->seats, i)
1155 seat_start(seat);
1156
1157 HASHMAP_FOREACH(user, m->users, i)
1158 user_start(user);
1159
1160 HASHMAP_FOREACH(session, m->sessions, i)
1161 session_start(session, NULL);
1162
1163 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1164 inhibitor_start(inhibitor);
1165
1166 HASHMAP_FOREACH(button, m->buttons, i)
1167 button_check_switches(button);
1168
1169 manager_dispatch_idle_action(NULL, 0, m);
1170
1171 return 0;
1172 }
1173
1174 static int manager_run(Manager *m) {
1175 int r;
1176
1177 assert(m);
1178
1179 for (;;) {
1180 r = sd_event_get_state(m->event);
1181 if (r < 0)
1182 return r;
1183 if (r == SD_EVENT_FINISHED)
1184 return 0;
1185
1186 manager_gc(m, true);
1187
1188 r = manager_dispatch_delayed(m, false);
1189 if (r < 0)
1190 return r;
1191 if (r > 0)
1192 continue;
1193
1194 r = sd_event_run(m->event, (uint64_t) -1);
1195 if (r < 0)
1196 return r;
1197 }
1198 }
1199
1200 int main(int argc, char *argv[]) {
1201 _cleanup_(manager_unrefp) Manager *m = NULL;
1202 int r;
1203
1204 log_set_target(LOG_TARGET_AUTO);
1205 log_set_facility(LOG_AUTH);
1206 log_parse_environment();
1207 log_open();
1208
1209 umask(0022);
1210
1211 if (argc != 1) {
1212 log_error("This program takes no arguments.");
1213 r = -EINVAL;
1214 goto finish;
1215 }
1216
1217 r = mac_selinux_init();
1218 if (r < 0) {
1219 log_error_errno(r, "Could not initialize labelling: %m");
1220 goto finish;
1221 }
1222
1223 /* Always create the directories people can create inotify watches in. Note that some applications might check
1224 * for the existence of /run/systemd/seats/ to determine whether logind is available, so please always make
1225 * sure these directories are created early on and unconditionally. */
1226 (void) mkdir_label("/run/systemd/seats", 0755);
1227 (void) mkdir_label("/run/systemd/users", 0755);
1228 (void) mkdir_label("/run/systemd/sessions", 0755);
1229
1230 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGHUP, SIGTERM, SIGINT, -1) >= 0);
1231
1232 r = manager_new(&m);
1233 if (r < 0) {
1234 log_error_errno(r, "Failed to allocate manager object: %m");
1235 goto finish;
1236 }
1237
1238 (void) manager_parse_config_file(m);
1239
1240 r = manager_startup(m);
1241 if (r < 0) {
1242 log_error_errno(r, "Failed to fully start up daemon: %m");
1243 goto finish;
1244 }
1245
1246 log_debug("systemd-logind running as pid "PID_FMT, getpid_cached());
1247
1248 (void) sd_notify(false,
1249 "READY=1\n"
1250 "STATUS=Processing requests...");
1251
1252 r = manager_run(m);
1253
1254 log_debug("systemd-logind stopped as pid "PID_FMT, getpid_cached());
1255
1256 (void) sd_notify(false,
1257 "STOPPING=1\n"
1258 "STATUS=Shutting down...");
1259
1260 finish:
1261 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1262 }