]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/login/logind.c
logind: rework how we manage the slice and user-runtime-dir@.service unit for each...
[thirdparty/systemd.git] / src / login / logind.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include <errno.h>
4 #include <fcntl.h>
5 #include <string.h>
6 #include <unistd.h>
7
8 #include "sd-daemon.h"
9 #include "sd-device.h"
10
11 #include "alloc-util.h"
12 #include "bus-error.h"
13 #include "bus-util.h"
14 #include "cgroup-util.h"
15 #include "def.h"
16 #include "device-util.h"
17 #include "dirent-util.h"
18 #include "fd-util.h"
19 #include "format-util.h"
20 #include "fs-util.h"
21 #include "libudev-private.h"
22 #include "logind.h"
23 #include "parse-util.h"
24 #include "process-util.h"
25 #include "selinux-util.h"
26 #include "signal-util.h"
27 #include "strv.h"
28
29 static Manager* manager_unref(Manager *m);
30 DEFINE_TRIVIAL_CLEANUP_FUNC(Manager*, manager_unref);
31
32 static int manager_new(Manager **ret) {
33 _cleanup_(manager_unrefp) Manager *m = NULL;
34 int r;
35
36 assert(ret);
37
38 m = new(Manager, 1);
39 if (!m)
40 return -ENOMEM;
41
42 *m = (Manager) {
43 .console_active_fd = -1,
44 .reserve_vt_fd = -1,
45 };
46
47 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
48
49 m->devices = hashmap_new(&string_hash_ops);
50 m->seats = hashmap_new(&string_hash_ops);
51 m->sessions = hashmap_new(&string_hash_ops);
52 m->users = hashmap_new(NULL);
53 m->inhibitors = hashmap_new(&string_hash_ops);
54 m->buttons = hashmap_new(&string_hash_ops);
55
56 m->user_units = hashmap_new(&string_hash_ops);
57 m->session_units = hashmap_new(&string_hash_ops);
58
59 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->user_units || !m->session_units)
60 return -ENOMEM;
61
62 r = sd_event_default(&m->event);
63 if (r < 0)
64 return r;
65
66 r = sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
67 if (r < 0)
68 return r;
69
70 r = sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
71 if (r < 0)
72 return r;
73
74 (void) sd_event_set_watchdog(m->event, true);
75
76 manager_reset_config(m);
77
78 *ret = TAKE_PTR(m);
79 return 0;
80 }
81
82 static Manager* manager_unref(Manager *m) {
83 Session *session;
84 User *u;
85 Device *d;
86 Seat *s;
87 Inhibitor *i;
88 Button *b;
89
90 if (!m)
91 return NULL;
92
93 while ((session = hashmap_first(m->sessions)))
94 session_free(session);
95
96 while ((u = hashmap_first(m->users)))
97 user_free(u);
98
99 while ((d = hashmap_first(m->devices)))
100 device_free(d);
101
102 while ((s = hashmap_first(m->seats)))
103 seat_free(s);
104
105 while ((i = hashmap_first(m->inhibitors)))
106 inhibitor_free(i);
107
108 while ((b = hashmap_first(m->buttons)))
109 button_free(b);
110
111 hashmap_free(m->devices);
112 hashmap_free(m->seats);
113 hashmap_free(m->sessions);
114 hashmap_free(m->users);
115 hashmap_free(m->inhibitors);
116 hashmap_free(m->buttons);
117
118 hashmap_free(m->user_units);
119 hashmap_free(m->session_units);
120
121 sd_event_source_unref(m->idle_action_event_source);
122 sd_event_source_unref(m->inhibit_timeout_source);
123 sd_event_source_unref(m->scheduled_shutdown_timeout_source);
124 sd_event_source_unref(m->nologin_timeout_source);
125 sd_event_source_unref(m->wall_message_timeout_source);
126
127 sd_event_source_unref(m->console_active_event_source);
128 sd_event_source_unref(m->udev_seat_event_source);
129 sd_event_source_unref(m->udev_device_event_source);
130 sd_event_source_unref(m->udev_vcsa_event_source);
131 sd_event_source_unref(m->udev_button_event_source);
132 sd_event_source_unref(m->lid_switch_ignore_event_source);
133
134 safe_close(m->console_active_fd);
135
136 udev_monitor_unref(m->udev_seat_monitor);
137 udev_monitor_unref(m->udev_device_monitor);
138 udev_monitor_unref(m->udev_vcsa_monitor);
139 udev_monitor_unref(m->udev_button_monitor);
140
141 if (m->unlink_nologin)
142 (void) unlink_or_warn("/run/nologin");
143
144 bus_verify_polkit_async_registry_free(m->polkit_registry);
145
146 sd_bus_unref(m->bus);
147 sd_event_unref(m->event);
148
149 safe_close(m->reserve_vt_fd);
150
151 strv_free(m->kill_only_users);
152 strv_free(m->kill_exclude_users);
153
154 free(m->scheduled_shutdown_type);
155 free(m->scheduled_shutdown_tty);
156 free(m->wall_message);
157 free(m->action_job);
158
159 return mfree(m);
160 }
161
162 static int manager_enumerate_devices(Manager *m) {
163 _cleanup_(sd_device_enumerator_unrefp) sd_device_enumerator *e = NULL;
164 sd_device *d;
165 int r;
166
167 assert(m);
168
169 /* Loads devices from udev and creates seats for them as
170 * necessary */
171
172 r = sd_device_enumerator_new(&e);
173 if (r < 0)
174 return r;
175
176 r = sd_device_enumerator_add_match_tag(e, "master-of-seat");
177 if (r < 0)
178 return r;
179
180 FOREACH_DEVICE(e, d) {
181 int k;
182
183 k = manager_process_seat_device(m, d);
184 if (k < 0)
185 r = k;
186 }
187
188 return r;
189 }
190
191 static int manager_enumerate_buttons(Manager *m) {
192 _cleanup_(sd_device_enumerator_unrefp) sd_device_enumerator *e = NULL;
193 sd_device *d;
194 int r;
195
196 assert(m);
197
198 /* Loads buttons from udev */
199
200 if (manager_all_buttons_ignored(m))
201 return 0;
202
203 r = sd_device_enumerator_new(&e);
204 if (r < 0)
205 return r;
206
207 r = sd_device_enumerator_add_match_subsystem(e, "input", true);
208 if (r < 0)
209 return r;
210
211 r = sd_device_enumerator_add_match_tag(e, "power-switch");
212 if (r < 0)
213 return r;
214
215 FOREACH_DEVICE(e, d) {
216 int k;
217
218 k = manager_process_button_device(m, d);
219 if (k < 0)
220 r = k;
221 }
222
223 return r;
224 }
225
226 static int manager_enumerate_seats(Manager *m) {
227 _cleanup_closedir_ DIR *d = NULL;
228 struct dirent *de;
229 int r = 0;
230
231 assert(m);
232
233 /* This loads data about seats stored on disk, but does not
234 * actually create any seats. Removes data of seats that no
235 * longer exist. */
236
237 d = opendir("/run/systemd/seats");
238 if (!d) {
239 if (errno == ENOENT)
240 return 0;
241
242 return log_error_errno(errno, "Failed to open /run/systemd/seats: %m");
243 }
244
245 FOREACH_DIRENT(de, d, return -errno) {
246 Seat *s;
247 int k;
248
249 if (!dirent_is_file(de))
250 continue;
251
252 s = hashmap_get(m->seats, de->d_name);
253 if (!s) {
254 if (unlinkat(dirfd(d), de->d_name, 0) < 0)
255 log_warning("Failed to remove /run/systemd/seats/%s: %m",
256 de->d_name);
257 continue;
258 }
259
260 k = seat_load(s);
261 if (k < 0)
262 r = k;
263 }
264
265 return r;
266 }
267
268 static int manager_enumerate_linger_users(Manager *m) {
269 _cleanup_closedir_ DIR *d = NULL;
270 struct dirent *de;
271 int r = 0;
272
273 assert(m);
274
275 d = opendir("/var/lib/systemd/linger");
276 if (!d) {
277 if (errno == ENOENT)
278 return 0;
279
280 return log_error_errno(errno, "Failed to open /var/lib/systemd/linger/: %m");
281 }
282
283 FOREACH_DIRENT(de, d, return -errno) {
284 int k;
285
286 if (!dirent_is_file(de))
287 continue;
288
289 k = manager_add_user_by_name(m, de->d_name, NULL);
290 if (k < 0) {
291 log_notice_errno(k, "Couldn't add lingering user %s: %m", de->d_name);
292 r = k;
293 }
294 }
295
296 return r;
297 }
298
299 static int manager_enumerate_users(Manager *m) {
300 _cleanup_closedir_ DIR *d = NULL;
301 struct dirent *de;
302 int r, k;
303
304 assert(m);
305
306 /* Add lingering users */
307 r = manager_enumerate_linger_users(m);
308
309 /* Read in user data stored on disk */
310 d = opendir("/run/systemd/users");
311 if (!d) {
312 if (errno == ENOENT)
313 return 0;
314
315 return log_error_errno(errno, "Failed to open /run/systemd/users: %m");
316 }
317
318 FOREACH_DIRENT(de, d, return -errno) {
319 User *u;
320
321 if (!dirent_is_file(de))
322 continue;
323
324 k = manager_add_user_by_name(m, de->d_name, &u);
325 if (k < 0) {
326 log_error_errno(k, "Failed to add user by file name %s: %m", de->d_name);
327
328 r = k;
329 continue;
330 }
331
332 user_add_to_gc_queue(u);
333
334 k = user_load(u);
335 if (k < 0)
336 r = k;
337 }
338
339 return r;
340 }
341
342 static int parse_fdname(const char *fdname, char **session_id, dev_t *dev) {
343 _cleanup_strv_free_ char **parts = NULL;
344 _cleanup_free_ char *id = NULL;
345 unsigned int major, minor;
346 int r;
347
348 parts = strv_split(fdname, "-");
349 if (!parts)
350 return -ENOMEM;
351 if (strv_length(parts) != 5)
352 return -EINVAL;
353
354 if (!streq(parts[0], "session"))
355 return -EINVAL;
356
357 id = strdup(parts[1]);
358 if (!id)
359 return -ENOMEM;
360
361 if (!streq(parts[2], "device"))
362 return -EINVAL;
363
364 r = safe_atou(parts[3], &major);
365 if (r < 0)
366 return r;
367 r = safe_atou(parts[4], &minor);
368 if (r < 0)
369 return r;
370
371 *dev = makedev(major, minor);
372 *session_id = TAKE_PTR(id);
373
374 return 0;
375 }
376
377 static int manager_attach_fds(Manager *m) {
378 _cleanup_strv_free_ char **fdnames = NULL;
379 int n, i, fd;
380
381 /* Upon restart, PID1 will send us back all fds of session devices
382 * that we previously opened. Each file descriptor is associated
383 * with a given session. The session ids are passed through FDNAMES. */
384
385 n = sd_listen_fds_with_names(true, &fdnames);
386 if (n <= 0)
387 return n;
388
389 for (i = 0; i < n; i++) {
390 _cleanup_free_ char *id = NULL;
391 dev_t dev;
392 struct stat st;
393 SessionDevice *sd;
394 Session *s;
395 int r;
396
397 fd = SD_LISTEN_FDS_START + i;
398
399 r = parse_fdname(fdnames[i], &id, &dev);
400 if (r < 0) {
401 log_debug_errno(r, "Failed to parse fd name %s: %m", fdnames[i]);
402 close_nointr(fd);
403 continue;
404 }
405
406 s = hashmap_get(m->sessions, id);
407 if (!s) {
408 /* If the session doesn't exist anymore, the associated session
409 * device attached to this fd doesn't either. Let's simply close
410 * this fd. */
411 log_debug("Failed to attach fd for unknown session: %s", id);
412 close_nointr(fd);
413 continue;
414 }
415
416 if (fstat(fd, &st) < 0) {
417 /* The device is allowed to go away at a random point, in which
418 * case fstat failing is expected. */
419 log_debug_errno(errno, "Failed to stat device fd for session %s: %m", id);
420 close_nointr(fd);
421 continue;
422 }
423
424 if (!S_ISCHR(st.st_mode) || st.st_rdev != dev) {
425 log_debug("Device fd doesn't point to the expected character device node");
426 close_nointr(fd);
427 continue;
428 }
429
430 sd = hashmap_get(s->devices, &dev);
431 if (!sd) {
432 /* Weird, we got an fd for a session device which wasn't
433 * recorded in the session state file... */
434 log_warning("Got fd for missing session device [%u:%u] in session %s",
435 major(dev), minor(dev), s->id);
436 close_nointr(fd);
437 continue;
438 }
439
440 log_debug("Attaching fd to session device [%u:%u] for session %s",
441 major(dev), minor(dev), s->id);
442
443 session_device_attach_fd(sd, fd, s->was_active);
444 }
445
446 return 0;
447 }
448
449 static int manager_enumerate_sessions(Manager *m) {
450 _cleanup_closedir_ DIR *d = NULL;
451 struct dirent *de;
452 int r = 0, k;
453
454 assert(m);
455
456 /* Read in session data stored on disk */
457 d = opendir("/run/systemd/sessions");
458 if (!d) {
459 if (errno == ENOENT)
460 return 0;
461
462 return log_error_errno(errno, "Failed to open /run/systemd/sessions: %m");
463 }
464
465 FOREACH_DIRENT(de, d, return -errno) {
466 struct Session *s;
467
468 if (!dirent_is_file(de))
469 continue;
470
471 if (!session_id_valid(de->d_name)) {
472 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
473 r = -EINVAL;
474 continue;
475 }
476
477 k = manager_add_session(m, de->d_name, &s);
478 if (k < 0) {
479 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name);
480 r = k;
481 continue;
482 }
483
484 session_add_to_gc_queue(s);
485
486 k = session_load(s);
487 if (k < 0)
488 r = k;
489 }
490
491 /* We might be restarted and PID1 could have sent us back the
492 * session device fds we previously saved. */
493 k = manager_attach_fds(m);
494 if (k < 0)
495 log_warning_errno(k, "Failed to reattach session device fds: %m");
496
497 return r;
498 }
499
500 static int manager_enumerate_inhibitors(Manager *m) {
501 _cleanup_closedir_ DIR *d = NULL;
502 struct dirent *de;
503 int r = 0;
504
505 assert(m);
506
507 d = opendir("/run/systemd/inhibit");
508 if (!d) {
509 if (errno == ENOENT)
510 return 0;
511
512 return log_error_errno(errno, "Failed to open /run/systemd/inhibit: %m");
513 }
514
515 FOREACH_DIRENT(de, d, return -errno) {
516 int k;
517 Inhibitor *i;
518
519 if (!dirent_is_file(de))
520 continue;
521
522 k = manager_add_inhibitor(m, de->d_name, &i);
523 if (k < 0) {
524 log_notice_errno(k, "Couldn't add inhibitor %s: %m", de->d_name);
525 r = k;
526 continue;
527 }
528
529 k = inhibitor_load(i);
530 if (k < 0)
531 r = k;
532 }
533
534 return r;
535 }
536
537 static int manager_dispatch_seat_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
538 _cleanup_(sd_device_unrefp) sd_device *d = NULL;
539 Manager *m = userdata;
540 int r;
541
542 assert(m);
543
544 r = udev_monitor_receive_sd_device(m->udev_seat_monitor, &d);
545 if (r < 0)
546 return r;
547
548 manager_process_seat_device(m, d);
549 return 0;
550 }
551
552 static int manager_dispatch_device_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
553 _cleanup_(sd_device_unrefp) sd_device *d = NULL;
554 Manager *m = userdata;
555 int r;
556
557 assert(m);
558
559 r = udev_monitor_receive_sd_device(m->udev_device_monitor, &d);
560 if (r < 0)
561 return r;
562
563 manager_process_seat_device(m, d);
564 return 0;
565 }
566
567 static int manager_dispatch_vcsa_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
568 _cleanup_(sd_device_unrefp) sd_device *d = NULL;
569 Manager *m = userdata;
570 const char *name, *action;
571 int r;
572
573 assert(m);
574
575 r = udev_monitor_receive_sd_device(m->udev_vcsa_monitor, &d);
576 if (r < 0)
577 return r;
578
579 /* Whenever a VCSA device is removed try to reallocate our
580 * VTs, to make sure our auto VTs never go away. */
581
582 if (sd_device_get_sysname(d, &name) >= 0 &&
583 startswith(name, "vcsa") &&
584 sd_device_get_property_value(d, "ACTION", &action) >= 0 &&
585 streq(action, "remove"))
586 seat_preallocate_vts(m->seat0);
587
588 return 0;
589 }
590
591 static int manager_dispatch_button_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
592 _cleanup_(sd_device_unrefp) sd_device *d = NULL;
593 Manager *m = userdata;
594 int r;
595
596 assert(m);
597
598 r = udev_monitor_receive_sd_device(m->udev_button_monitor, &d);
599 if (r < 0)
600 return r;
601
602 manager_process_button_device(m, d);
603 return 0;
604 }
605
606 static int manager_dispatch_console(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
607 Manager *m = userdata;
608
609 assert(m);
610 assert(m->seat0);
611 assert(m->console_active_fd == fd);
612
613 seat_read_active_vt(m->seat0);
614 return 0;
615 }
616
617 static int manager_reserve_vt(Manager *m) {
618 _cleanup_free_ char *p = NULL;
619
620 assert(m);
621
622 if (m->reserve_vt <= 0)
623 return 0;
624
625 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
626 return log_oom();
627
628 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
629 if (m->reserve_vt_fd < 0) {
630
631 /* Don't complain on VT-less systems */
632 if (errno != ENOENT)
633 log_warning_errno(errno, "Failed to pin reserved VT: %m");
634 return -errno;
635 }
636
637 return 0;
638 }
639
640 static int manager_connect_bus(Manager *m) {
641 int r;
642
643 assert(m);
644 assert(!m->bus);
645
646 r = sd_bus_default_system(&m->bus);
647 if (r < 0)
648 return log_error_errno(r, "Failed to connect to system bus: %m");
649
650 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable, m);
651 if (r < 0)
652 return log_error_errno(r, "Failed to add manager object vtable: %m");
653
654 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable, seat_object_find, m);
655 if (r < 0)
656 return log_error_errno(r, "Failed to add seat object vtable: %m");
657
658 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/seat", seat_node_enumerator, m);
659 if (r < 0)
660 return log_error_errno(r, "Failed to add seat enumerator: %m");
661
662 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m);
663 if (r < 0)
664 return log_error_errno(r, "Failed to add session object vtable: %m");
665
666 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m);
667 if (r < 0)
668 return log_error_errno(r, "Failed to add session enumerator: %m");
669
670 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable, user_object_find, m);
671 if (r < 0)
672 return log_error_errno(r, "Failed to add user object vtable: %m");
673
674 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/user", user_node_enumerator, m);
675 if (r < 0)
676 return log_error_errno(r, "Failed to add user enumerator: %m");
677
678 r = sd_bus_match_signal_async(
679 m->bus,
680 NULL,
681 "org.freedesktop.systemd1",
682 "/org/freedesktop/systemd1",
683 "org.freedesktop.systemd1.Manager",
684 "JobRemoved",
685 match_job_removed, NULL, m);
686 if (r < 0)
687 return log_error_errno(r, "Failed to request match for JobRemoved: %m");
688
689 r = sd_bus_match_signal_async(
690 m->bus,
691 NULL,
692 "org.freedesktop.systemd1",
693 "/org/freedesktop/systemd1",
694 "org.freedesktop.systemd1.Manager",
695 "UnitRemoved",
696 match_unit_removed, NULL, m);
697 if (r < 0)
698 return log_error_errno(r, "Failed to request match for UnitRemoved: %m");
699
700 r = sd_bus_match_signal_async(
701 m->bus,
702 NULL,
703 "org.freedesktop.systemd1",
704 NULL,
705 "org.freedesktop.DBus.Properties",
706 "PropertiesChanged",
707 match_properties_changed, NULL, m);
708 if (r < 0)
709 return log_error_errno(r, "Failed to request match for PropertiesChanged: %m");
710
711 r = sd_bus_match_signal_async(
712 m->bus,
713 NULL,
714 "org.freedesktop.systemd1",
715 "/org/freedesktop/systemd1",
716 "org.freedesktop.systemd1.Manager",
717 "Reloading",
718 match_reloading, NULL, m);
719 if (r < 0)
720 return log_error_errno(r, "Failed to request match for Reloading: %m");
721
722 r = sd_bus_call_method_async(
723 m->bus,
724 NULL,
725 "org.freedesktop.systemd1",
726 "/org/freedesktop/systemd1",
727 "org.freedesktop.systemd1.Manager",
728 "Subscribe",
729 NULL, NULL,
730 NULL);
731 if (r < 0)
732 return log_error_errno(r, "Failed to enable subscription: %m");
733
734 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.login1", 0, NULL, NULL);
735 if (r < 0)
736 return log_error_errno(r, "Failed to request name: %m");
737
738 r = sd_bus_attach_event(m->bus, m->event, SD_EVENT_PRIORITY_NORMAL);
739 if (r < 0)
740 return log_error_errno(r, "Failed to attach bus to event loop: %m");
741
742 return 0;
743 }
744
745 static int manager_vt_switch(sd_event_source *src, const struct signalfd_siginfo *si, void *data) {
746 Manager *m = data;
747 Session *active, *iter;
748
749 /*
750 * We got a VT-switch signal and we have to acknowledge it immediately.
751 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
752 * old user-space might run multiple sessions on a single VT, *sigh*.
753 * Therefore, we have to iterate all sessions and find one with a vtfd
754 * on the requested VT.
755 * As only VTs with active controllers have VT_PROCESS set, our current
756 * notion of the active VT might be wrong (for instance if the switch
757 * happens while we setup VT_PROCESS). Therefore, read the current VT
758 * first and then use s->active->vtnr as reference. Note that this is
759 * not racy, as no further VT-switch can happen as long as we're in
760 * synchronous VT_PROCESS mode.
761 */
762
763 assert(m->seat0);
764 seat_read_active_vt(m->seat0);
765
766 active = m->seat0->active;
767 if (!active || active->vtnr < 1) {
768 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
769 return 0;
770 }
771
772 if (active->vtfd >= 0) {
773 session_leave_vt(active);
774 } else {
775 LIST_FOREACH(sessions_by_seat, iter, m->seat0->sessions) {
776 if (iter->vtnr == active->vtnr && iter->vtfd >= 0) {
777 session_leave_vt(iter);
778 break;
779 }
780 }
781 }
782
783 return 0;
784 }
785
786 static int manager_connect_console(Manager *m) {
787 int r;
788
789 assert(m);
790 assert(m->console_active_fd < 0);
791
792 /* On certain systems (such as S390, Xen, and containers) /dev/tty0 does not exist (as there is no VC), so
793 * don't fail if we can't open it. */
794
795 if (access("/dev/tty0", F_OK) < 0)
796 return 0;
797
798 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
799 if (m->console_active_fd < 0) {
800
801 /* On some systems /dev/tty0 may exist even though /sys/class/tty/tty0 does not. These are broken, but
802 * common. Let's complain but continue anyway. */
803 if (errno == ENOENT) {
804 log_warning_errno(errno, "System has /dev/tty0 but not /sys/class/tty/tty0/active which is broken, ignoring: %m");
805 return 0;
806 }
807
808 return log_error_errno(errno, "Failed to open /sys/class/tty/tty0/active: %m");
809 }
810
811 r = sd_event_add_io(m->event, &m->console_active_event_source, m->console_active_fd, 0, manager_dispatch_console, m);
812 if (r < 0)
813 return log_error_errno(r, "Failed to watch foreground console: %m");
814
815 /*
816 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
817 * as VT-acquire signal. We ignore any acquire-events (yes, we still
818 * have to provide a valid signal-number for it!) and acknowledge all
819 * release events immediately.
820 */
821
822 if (SIGRTMIN + 1 > SIGRTMAX) {
823 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN, SIGRTMAX);
824 return -EINVAL;
825 }
826
827 assert_se(ignore_signals(SIGRTMIN + 1, -1) >= 0);
828 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGRTMIN, -1) >= 0);
829
830 r = sd_event_add_signal(m->event, NULL, SIGRTMIN, manager_vt_switch, m);
831 if (r < 0)
832 return log_error_errno(r, "Failed to subscribe to signal: %m");
833
834 return 0;
835 }
836
837 static int manager_connect_udev(Manager *m) {
838 int r;
839
840 assert(m);
841 assert(!m->udev_seat_monitor);
842 assert(!m->udev_device_monitor);
843 assert(!m->udev_vcsa_monitor);
844 assert(!m->udev_button_monitor);
845
846 m->udev_seat_monitor = udev_monitor_new_from_netlink(NULL, "udev");
847 if (!m->udev_seat_monitor)
848 return -ENOMEM;
849
850 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
851 if (r < 0)
852 return r;
853
854 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
855 if (r < 0)
856 return r;
857
858 r = sd_event_add_io(m->event, &m->udev_seat_event_source, udev_monitor_get_fd(m->udev_seat_monitor), EPOLLIN, manager_dispatch_seat_udev, m);
859 if (r < 0)
860 return r;
861
862 m->udev_device_monitor = udev_monitor_new_from_netlink(NULL, "udev");
863 if (!m->udev_device_monitor)
864 return -ENOMEM;
865
866 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
867 if (r < 0)
868 return r;
869
870 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
871 if (r < 0)
872 return r;
873
874 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
875 if (r < 0)
876 return r;
877
878 r = udev_monitor_enable_receiving(m->udev_device_monitor);
879 if (r < 0)
880 return r;
881
882 r = sd_event_add_io(m->event, &m->udev_device_event_source, udev_monitor_get_fd(m->udev_device_monitor), EPOLLIN, manager_dispatch_device_udev, m);
883 if (r < 0)
884 return r;
885
886 /* Don't watch keys if nobody cares */
887 if (!manager_all_buttons_ignored(m)) {
888 m->udev_button_monitor = udev_monitor_new_from_netlink(NULL, "udev");
889 if (!m->udev_button_monitor)
890 return -ENOMEM;
891
892 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
893 if (r < 0)
894 return r;
895
896 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
897 if (r < 0)
898 return r;
899
900 r = udev_monitor_enable_receiving(m->udev_button_monitor);
901 if (r < 0)
902 return r;
903
904 r = sd_event_add_io(m->event, &m->udev_button_event_source, udev_monitor_get_fd(m->udev_button_monitor), EPOLLIN, manager_dispatch_button_udev, m);
905 if (r < 0)
906 return r;
907 }
908
909 /* Don't bother watching VCSA devices, if nobody cares */
910 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
911
912 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(NULL, "udev");
913 if (!m->udev_vcsa_monitor)
914 return -ENOMEM;
915
916 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
917 if (r < 0)
918 return r;
919
920 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
921 if (r < 0)
922 return r;
923
924 r = sd_event_add_io(m->event, &m->udev_vcsa_event_source, udev_monitor_get_fd(m->udev_vcsa_monitor), EPOLLIN, manager_dispatch_vcsa_udev, m);
925 if (r < 0)
926 return r;
927 }
928
929 return 0;
930 }
931
932 static void manager_gc(Manager *m, bool drop_not_started) {
933 Seat *seat;
934 Session *session;
935 User *user;
936
937 assert(m);
938
939 while ((seat = m->seat_gc_queue)) {
940 LIST_REMOVE(gc_queue, m->seat_gc_queue, seat);
941 seat->in_gc_queue = false;
942
943 if (seat_may_gc(seat, drop_not_started)) {
944 seat_stop(seat, false);
945 seat_free(seat);
946 }
947 }
948
949 while ((session = m->session_gc_queue)) {
950 LIST_REMOVE(gc_queue, m->session_gc_queue, session);
951 session->in_gc_queue = false;
952
953 /* First, if we are not closing yet, initiate stopping */
954 if (session_may_gc(session, drop_not_started) &&
955 session_get_state(session) != SESSION_CLOSING)
956 (void) session_stop(session, false);
957
958 /* Normally, this should make the session referenced
959 * again, if it doesn't then let's get rid of it
960 * immediately */
961 if (session_may_gc(session, drop_not_started)) {
962 (void) session_finalize(session);
963 session_free(session);
964 }
965 }
966
967 while ((user = m->user_gc_queue)) {
968 LIST_REMOVE(gc_queue, m->user_gc_queue, user);
969 user->in_gc_queue = false;
970
971 /* First step: queue stop jobs */
972 if (user_may_gc(user, drop_not_started))
973 (void) user_stop(user, false);
974
975 /* Second step: finalize user */
976 if (user_may_gc(user, drop_not_started)) {
977 (void) user_finalize(user);
978 user_free(user);
979 }
980 }
981 }
982
983 static int manager_dispatch_idle_action(sd_event_source *s, uint64_t t, void *userdata) {
984 Manager *m = userdata;
985 struct dual_timestamp since;
986 usec_t n, elapse;
987 int r;
988
989 assert(m);
990
991 if (m->idle_action == HANDLE_IGNORE ||
992 m->idle_action_usec <= 0)
993 return 0;
994
995 n = now(CLOCK_MONOTONIC);
996
997 r = manager_get_idle_hint(m, &since);
998 if (r <= 0)
999 /* Not idle. Let's check if after a timeout it might be idle then. */
1000 elapse = n + m->idle_action_usec;
1001 else {
1002 /* Idle! Let's see if it's time to do something, or if
1003 * we shall sleep for longer. */
1004
1005 if (n >= since.monotonic + m->idle_action_usec &&
1006 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
1007 log_info("System idle. Taking action.");
1008
1009 manager_handle_action(m, 0, m->idle_action, false, false);
1010 m->idle_action_not_before_usec = n;
1011 }
1012
1013 elapse = MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec;
1014 }
1015
1016 if (!m->idle_action_event_source) {
1017
1018 r = sd_event_add_time(
1019 m->event,
1020 &m->idle_action_event_source,
1021 CLOCK_MONOTONIC,
1022 elapse, USEC_PER_SEC*30,
1023 manager_dispatch_idle_action, m);
1024 if (r < 0)
1025 return log_error_errno(r, "Failed to add idle event source: %m");
1026
1027 r = sd_event_source_set_priority(m->idle_action_event_source, SD_EVENT_PRIORITY_IDLE+10);
1028 if (r < 0)
1029 return log_error_errno(r, "Failed to set idle event source priority: %m");
1030 } else {
1031 r = sd_event_source_set_time(m->idle_action_event_source, elapse);
1032 if (r < 0)
1033 return log_error_errno(r, "Failed to set idle event timer: %m");
1034
1035 r = sd_event_source_set_enabled(m->idle_action_event_source, SD_EVENT_ONESHOT);
1036 if (r < 0)
1037 return log_error_errno(r, "Failed to enable idle event timer: %m");
1038 }
1039
1040 return 0;
1041 }
1042
1043 static int manager_dispatch_reload_signal(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1044 Manager *m = userdata;
1045 int r;
1046
1047 manager_reset_config(m);
1048 r = manager_parse_config_file(m);
1049 if (r < 0)
1050 log_warning_errno(r, "Failed to parse config file, using defaults: %m");
1051 else
1052 log_info("Config file reloaded.");
1053
1054 return 0;
1055 }
1056
1057 static int manager_startup(Manager *m) {
1058 int r;
1059 Seat *seat;
1060 Session *session;
1061 User *user;
1062 Button *button;
1063 Inhibitor *inhibitor;
1064 Iterator i;
1065
1066 assert(m);
1067
1068 r = sd_event_add_signal(m->event, NULL, SIGHUP, manager_dispatch_reload_signal, m);
1069 if (r < 0)
1070 return log_error_errno(r, "Failed to register SIGHUP handler: %m");
1071
1072 /* Connect to console */
1073 r = manager_connect_console(m);
1074 if (r < 0)
1075 return r;
1076
1077 /* Connect to udev */
1078 r = manager_connect_udev(m);
1079 if (r < 0)
1080 return log_error_errno(r, "Failed to create udev watchers: %m");
1081
1082 /* Connect to the bus */
1083 r = manager_connect_bus(m);
1084 if (r < 0)
1085 return r;
1086
1087 /* Instantiate magic seat 0 */
1088 r = manager_add_seat(m, "seat0", &m->seat0);
1089 if (r < 0)
1090 return log_error_errno(r, "Failed to add seat0: %m");
1091
1092 r = manager_set_lid_switch_ignore(m, 0 + m->holdoff_timeout_usec);
1093 if (r < 0)
1094 log_warning_errno(r, "Failed to set up lid switch ignore event source: %m");
1095
1096 /* Deserialize state */
1097 r = manager_enumerate_devices(m);
1098 if (r < 0)
1099 log_warning_errno(r, "Device enumeration failed: %m");
1100
1101 r = manager_enumerate_seats(m);
1102 if (r < 0)
1103 log_warning_errno(r, "Seat enumeration failed: %m");
1104
1105 r = manager_enumerate_users(m);
1106 if (r < 0)
1107 log_warning_errno(r, "User enumeration failed: %m");
1108
1109 r = manager_enumerate_sessions(m);
1110 if (r < 0)
1111 log_warning_errno(r, "Session enumeration failed: %m");
1112
1113 r = manager_enumerate_inhibitors(m);
1114 if (r < 0)
1115 log_warning_errno(r, "Inhibitor enumeration failed: %m");
1116
1117 r = manager_enumerate_buttons(m);
1118 if (r < 0)
1119 log_warning_errno(r, "Button enumeration failed: %m");
1120
1121 /* Remove stale objects before we start them */
1122 manager_gc(m, false);
1123
1124 /* Reserve the special reserved VT */
1125 manager_reserve_vt(m);
1126
1127 /* And start everything */
1128 HASHMAP_FOREACH(seat, m->seats, i)
1129 (void) seat_start(seat);
1130
1131 HASHMAP_FOREACH(user, m->users, i)
1132 (void) user_start(user);
1133
1134 HASHMAP_FOREACH(session, m->sessions, i)
1135 (void) session_start(session, NULL, NULL);
1136
1137 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1138 inhibitor_start(inhibitor);
1139
1140 HASHMAP_FOREACH(button, m->buttons, i)
1141 button_check_switches(button);
1142
1143 manager_dispatch_idle_action(NULL, 0, m);
1144
1145 return 0;
1146 }
1147
1148 static int manager_run(Manager *m) {
1149 int r;
1150
1151 assert(m);
1152
1153 for (;;) {
1154 r = sd_event_get_state(m->event);
1155 if (r < 0)
1156 return r;
1157 if (r == SD_EVENT_FINISHED)
1158 return 0;
1159
1160 manager_gc(m, true);
1161
1162 r = manager_dispatch_delayed(m, false);
1163 if (r < 0)
1164 return r;
1165 if (r > 0)
1166 continue;
1167
1168 r = sd_event_run(m->event, (uint64_t) -1);
1169 if (r < 0)
1170 return r;
1171 }
1172 }
1173
1174 int main(int argc, char *argv[]) {
1175 _cleanup_(manager_unrefp) Manager *m = NULL;
1176 int r;
1177
1178 log_set_target(LOG_TARGET_AUTO);
1179 log_set_facility(LOG_AUTH);
1180 log_parse_environment();
1181 log_open();
1182
1183 umask(0022);
1184
1185 if (argc != 1) {
1186 log_error("This program takes no arguments.");
1187 r = -EINVAL;
1188 goto finish;
1189 }
1190
1191 r = mac_selinux_init();
1192 if (r < 0) {
1193 log_error_errno(r, "Could not initialize labelling: %m");
1194 goto finish;
1195 }
1196
1197 /* Always create the directories people can create inotify watches in. Note that some applications might check
1198 * for the existence of /run/systemd/seats/ to determine whether logind is available, so please always make
1199 * sure these directories are created early on and unconditionally. */
1200 (void) mkdir_label("/run/systemd/seats", 0755);
1201 (void) mkdir_label("/run/systemd/users", 0755);
1202 (void) mkdir_label("/run/systemd/sessions", 0755);
1203
1204 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGHUP, SIGTERM, SIGINT, -1) >= 0);
1205
1206 r = manager_new(&m);
1207 if (r < 0) {
1208 log_error_errno(r, "Failed to allocate manager object: %m");
1209 goto finish;
1210 }
1211
1212 (void) manager_parse_config_file(m);
1213
1214 r = manager_startup(m);
1215 if (r < 0) {
1216 log_error_errno(r, "Failed to fully start up daemon: %m");
1217 goto finish;
1218 }
1219
1220 log_debug("systemd-logind running as pid "PID_FMT, getpid_cached());
1221
1222 (void) sd_notify(false,
1223 "READY=1\n"
1224 "STATUS=Processing requests...");
1225
1226 r = manager_run(m);
1227
1228 log_debug("systemd-logind stopped as pid "PID_FMT, getpid_cached());
1229
1230 (void) sd_notify(false,
1231 "STOPPING=1\n"
1232 "STATUS=Shutting down...");
1233
1234 finish:
1235 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1236 }