]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/login/logind.c
Merge pull request #7599 from keszybz/slice-templates
[thirdparty/systemd.git] / src / login / logind.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 This file is part of systemd.
4
5 Copyright 2011 Lennart Poettering
6 ***/
7
8 #include <errno.h>
9 #include <fcntl.h>
10 #include <string.h>
11 #include <unistd.h>
12
13 #include "libudev.h"
14 #include "sd-daemon.h"
15
16 #include "alloc-util.h"
17 #include "bus-error.h"
18 #include "bus-util.h"
19 #include "cgroup-util.h"
20 #include "conf-parser.h"
21 #include "def.h"
22 #include "dirent-util.h"
23 #include "fd-util.h"
24 #include "format-util.h"
25 #include "fs-util.h"
26 #include "logind.h"
27 #include "parse-util.h"
28 #include "process-util.h"
29 #include "selinux-util.h"
30 #include "signal-util.h"
31 #include "strv.h"
32 #include "udev-util.h"
33
34 static void manager_free(Manager *m);
35
36 static Manager *manager_new(void) {
37 Manager *m;
38 int r;
39
40 m = new0(Manager, 1);
41 if (!m)
42 return NULL;
43
44 m->console_active_fd = -1;
45 m->reserve_vt_fd = -1;
46
47 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
48
49 m->devices = hashmap_new(&string_hash_ops);
50 m->seats = hashmap_new(&string_hash_ops);
51 m->sessions = hashmap_new(&string_hash_ops);
52 m->users = hashmap_new(NULL);
53 m->inhibitors = hashmap_new(&string_hash_ops);
54 m->buttons = hashmap_new(&string_hash_ops);
55
56 m->user_units = hashmap_new(&string_hash_ops);
57 m->session_units = hashmap_new(&string_hash_ops);
58
59 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->user_units || !m->session_units)
60 goto fail;
61
62 m->udev = udev_new();
63 if (!m->udev)
64 goto fail;
65
66 r = sd_event_default(&m->event);
67 if (r < 0)
68 goto fail;
69
70 sd_event_set_watchdog(m->event, true);
71
72 manager_reset_config(m);
73
74 return m;
75
76 fail:
77 manager_free(m);
78 return NULL;
79 }
80
81 static void manager_free(Manager *m) {
82 Session *session;
83 User *u;
84 Device *d;
85 Seat *s;
86 Inhibitor *i;
87 Button *b;
88
89 if (!m)
90 return;
91
92 while ((session = hashmap_first(m->sessions)))
93 session_free(session);
94
95 while ((u = hashmap_first(m->users)))
96 user_free(u);
97
98 while ((d = hashmap_first(m->devices)))
99 device_free(d);
100
101 while ((s = hashmap_first(m->seats)))
102 seat_free(s);
103
104 while ((i = hashmap_first(m->inhibitors)))
105 inhibitor_free(i);
106
107 while ((b = hashmap_first(m->buttons)))
108 button_free(b);
109
110 hashmap_free(m->devices);
111 hashmap_free(m->seats);
112 hashmap_free(m->sessions);
113 hashmap_free(m->users);
114 hashmap_free(m->inhibitors);
115 hashmap_free(m->buttons);
116
117 hashmap_free(m->user_units);
118 hashmap_free(m->session_units);
119
120 sd_event_source_unref(m->idle_action_event_source);
121 sd_event_source_unref(m->inhibit_timeout_source);
122 sd_event_source_unref(m->scheduled_shutdown_timeout_source);
123 sd_event_source_unref(m->nologin_timeout_source);
124 sd_event_source_unref(m->wall_message_timeout_source);
125
126 sd_event_source_unref(m->console_active_event_source);
127 sd_event_source_unref(m->udev_seat_event_source);
128 sd_event_source_unref(m->udev_device_event_source);
129 sd_event_source_unref(m->udev_vcsa_event_source);
130 sd_event_source_unref(m->udev_button_event_source);
131 sd_event_source_unref(m->lid_switch_ignore_event_source);
132
133 safe_close(m->console_active_fd);
134
135 udev_monitor_unref(m->udev_seat_monitor);
136 udev_monitor_unref(m->udev_device_monitor);
137 udev_monitor_unref(m->udev_vcsa_monitor);
138 udev_monitor_unref(m->udev_button_monitor);
139
140 udev_unref(m->udev);
141
142 if (m->unlink_nologin)
143 (void) unlink_or_warn("/run/nologin");
144
145 bus_verify_polkit_async_registry_free(m->polkit_registry);
146
147 sd_bus_unref(m->bus);
148 sd_event_unref(m->event);
149
150 safe_close(m->reserve_vt_fd);
151
152 strv_free(m->kill_only_users);
153 strv_free(m->kill_exclude_users);
154
155 free(m->scheduled_shutdown_type);
156 free(m->scheduled_shutdown_tty);
157 free(m->wall_message);
158 free(m->action_job);
159 free(m);
160 }
161
162 static int manager_enumerate_devices(Manager *m) {
163 struct udev_list_entry *item = NULL, *first = NULL;
164 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
165 int r;
166
167 assert(m);
168
169 /* Loads devices from udev and creates seats for them as
170 * necessary */
171
172 e = udev_enumerate_new(m->udev);
173 if (!e)
174 return -ENOMEM;
175
176 r = udev_enumerate_add_match_tag(e, "master-of-seat");
177 if (r < 0)
178 return r;
179
180 r = udev_enumerate_add_match_is_initialized(e);
181 if (r < 0)
182 return r;
183
184 r = udev_enumerate_scan_devices(e);
185 if (r < 0)
186 return r;
187
188 first = udev_enumerate_get_list_entry(e);
189 udev_list_entry_foreach(item, first) {
190 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
191 int k;
192
193 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
194 if (!d)
195 return -ENOMEM;
196
197 k = manager_process_seat_device(m, d);
198 if (k < 0)
199 r = k;
200 }
201
202 return r;
203 }
204
205 static int manager_enumerate_buttons(Manager *m) {
206 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
207 struct udev_list_entry *item = NULL, *first = NULL;
208 int r;
209
210 assert(m);
211
212 /* Loads buttons from udev */
213
214 if (manager_all_buttons_ignored(m))
215 return 0;
216
217 e = udev_enumerate_new(m->udev);
218 if (!e)
219 return -ENOMEM;
220
221 r = udev_enumerate_add_match_subsystem(e, "input");
222 if (r < 0)
223 return r;
224
225 r = udev_enumerate_add_match_tag(e, "power-switch");
226 if (r < 0)
227 return r;
228
229 r = udev_enumerate_add_match_is_initialized(e);
230 if (r < 0)
231 return r;
232
233 r = udev_enumerate_scan_devices(e);
234 if (r < 0)
235 return r;
236
237 first = udev_enumerate_get_list_entry(e);
238 udev_list_entry_foreach(item, first) {
239 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
240 int k;
241
242 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
243 if (!d)
244 return -ENOMEM;
245
246 k = manager_process_button_device(m, d);
247 if (k < 0)
248 r = k;
249 }
250
251 return r;
252 }
253
254 static int manager_enumerate_seats(Manager *m) {
255 _cleanup_closedir_ DIR *d = NULL;
256 struct dirent *de;
257 int r = 0;
258
259 assert(m);
260
261 /* This loads data about seats stored on disk, but does not
262 * actually create any seats. Removes data of seats that no
263 * longer exist. */
264
265 d = opendir("/run/systemd/seats");
266 if (!d) {
267 if (errno == ENOENT)
268 return 0;
269
270 return log_error_errno(errno, "Failed to open /run/systemd/seats: %m");
271 }
272
273 FOREACH_DIRENT(de, d, return -errno) {
274 Seat *s;
275 int k;
276
277 if (!dirent_is_file(de))
278 continue;
279
280 s = hashmap_get(m->seats, de->d_name);
281 if (!s) {
282 if (unlinkat(dirfd(d), de->d_name, 0) < 0)
283 log_warning("Failed to remove /run/systemd/seats/%s: %m",
284 de->d_name);
285 continue;
286 }
287
288 k = seat_load(s);
289 if (k < 0)
290 r = k;
291 }
292
293 return r;
294 }
295
296 static int manager_enumerate_linger_users(Manager *m) {
297 _cleanup_closedir_ DIR *d = NULL;
298 struct dirent *de;
299 int r = 0;
300
301 assert(m);
302
303 d = opendir("/var/lib/systemd/linger");
304 if (!d) {
305 if (errno == ENOENT)
306 return 0;
307
308 return log_error_errno(errno, "Failed to open /var/lib/systemd/linger/: %m");
309 }
310
311 FOREACH_DIRENT(de, d, return -errno) {
312 int k;
313
314 if (!dirent_is_file(de))
315 continue;
316
317 k = manager_add_user_by_name(m, de->d_name, NULL);
318 if (k < 0) {
319 log_notice_errno(k, "Couldn't add lingering user %s: %m", de->d_name);
320 r = k;
321 }
322 }
323
324 return r;
325 }
326
327 static int manager_enumerate_users(Manager *m) {
328 _cleanup_closedir_ DIR *d = NULL;
329 struct dirent *de;
330 int r, k;
331
332 assert(m);
333
334 /* Add lingering users */
335 r = manager_enumerate_linger_users(m);
336
337 /* Read in user data stored on disk */
338 d = opendir("/run/systemd/users");
339 if (!d) {
340 if (errno == ENOENT)
341 return 0;
342
343 return log_error_errno(errno, "Failed to open /run/systemd/users: %m");
344 }
345
346 FOREACH_DIRENT(de, d, return -errno) {
347 User *u;
348
349 if (!dirent_is_file(de))
350 continue;
351
352 k = manager_add_user_by_name(m, de->d_name, &u);
353 if (k < 0) {
354 log_error_errno(k, "Failed to add user by file name %s: %m", de->d_name);
355
356 r = k;
357 continue;
358 }
359
360 user_add_to_gc_queue(u);
361
362 k = user_load(u);
363 if (k < 0)
364 r = k;
365 }
366
367 return r;
368 }
369
370 static int parse_fdname(const char *fdname, char **session_id, dev_t *dev) {
371 _cleanup_strv_free_ char **parts = NULL;
372 _cleanup_free_ char *id = NULL;
373 unsigned int major, minor;
374 int r;
375
376 parts = strv_split(fdname, "-");
377 if (!parts)
378 return -ENOMEM;
379 if (strv_length(parts) != 5)
380 return -EINVAL;
381
382 if (!streq(parts[0], "session"))
383 return -EINVAL;
384 id = strdup(parts[1]);
385 if (!id)
386 return -ENOMEM;
387
388 if (!streq(parts[2], "device"))
389 return -EINVAL;
390 r = safe_atou(parts[3], &major) ||
391 safe_atou(parts[4], &minor);
392 if (r < 0)
393 return r;
394
395 *dev = makedev(major, minor);
396 *session_id = TAKE_PTR(id);
397
398 return 0;
399 }
400
401 static int manager_attach_fds(Manager *m) {
402 _cleanup_strv_free_ char **fdnames = NULL;
403 int n, i, fd;
404
405 /* Upon restart, PID1 will send us back all fds of session devices
406 * that we previously opened. Each file descriptor is associated
407 * with a given session. The session ids are passed through FDNAMES. */
408
409 n = sd_listen_fds_with_names(true, &fdnames);
410 if (n <= 0)
411 return n;
412
413 for (i = 0; i < n; i++) {
414 _cleanup_free_ char *id = NULL;
415 dev_t dev;
416 struct stat st;
417 SessionDevice *sd;
418 Session *s;
419 int r;
420
421 fd = SD_LISTEN_FDS_START + i;
422
423 r = parse_fdname(fdnames[i], &id, &dev);
424 if (r < 0) {
425 log_debug_errno(r, "Failed to parse fd name %s: %m", fdnames[i]);
426 close_nointr(fd);
427 continue;
428 }
429
430 s = hashmap_get(m->sessions, id);
431 if (!s) {
432 /* If the session doesn't exist anymore, the associated session
433 * device attached to this fd doesn't either. Let's simply close
434 * this fd. */
435 log_debug("Failed to attach fd for unknown session: %s", id);
436 close_nointr(fd);
437 continue;
438 }
439
440 if (fstat(fd, &st) < 0) {
441 /* The device is allowed to go away at a random point, in which
442 * case fstat failing is expected. */
443 log_debug_errno(errno, "Failed to stat device fd for session %s: %m", id);
444 close_nointr(fd);
445 continue;
446 }
447
448 if (!S_ISCHR(st.st_mode) || st.st_rdev != dev) {
449 log_debug("Device fd doesn't point to the expected character device node");
450 close_nointr(fd);
451 continue;
452 }
453
454 sd = hashmap_get(s->devices, &dev);
455 if (!sd) {
456 /* Weird, we got an fd for a session device which wasn't
457 * recorded in the session state file... */
458 log_warning("Got fd for missing session device [%u:%u] in session %s",
459 major(dev), minor(dev), s->id);
460 close_nointr(fd);
461 continue;
462 }
463
464 log_debug("Attaching fd to session device [%u:%u] for session %s",
465 major(dev), minor(dev), s->id);
466
467 session_device_attach_fd(sd, fd, s->was_active);
468 }
469
470 return 0;
471 }
472
473 static int manager_enumerate_sessions(Manager *m) {
474 _cleanup_closedir_ DIR *d = NULL;
475 struct dirent *de;
476 int r = 0, k;
477
478 assert(m);
479
480 /* Read in session data stored on disk */
481 d = opendir("/run/systemd/sessions");
482 if (!d) {
483 if (errno == ENOENT)
484 return 0;
485
486 return log_error_errno(errno, "Failed to open /run/systemd/sessions: %m");
487 }
488
489 FOREACH_DIRENT(de, d, return -errno) {
490 struct Session *s;
491
492 if (!dirent_is_file(de))
493 continue;
494
495 if (!session_id_valid(de->d_name)) {
496 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
497 r = -EINVAL;
498 continue;
499 }
500
501 k = manager_add_session(m, de->d_name, &s);
502 if (k < 0) {
503 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name);
504 r = k;
505 continue;
506 }
507
508 session_add_to_gc_queue(s);
509
510 k = session_load(s);
511 if (k < 0)
512 r = k;
513 }
514
515 /* We might be restarted and PID1 could have sent us back the
516 * session device fds we previously saved. */
517 k = manager_attach_fds(m);
518 if (k < 0)
519 log_warning_errno(k, "Failed to reattach session device fds: %m");
520
521 return r;
522 }
523
524 static int manager_enumerate_inhibitors(Manager *m) {
525 _cleanup_closedir_ DIR *d = NULL;
526 struct dirent *de;
527 int r = 0;
528
529 assert(m);
530
531 d = opendir("/run/systemd/inhibit");
532 if (!d) {
533 if (errno == ENOENT)
534 return 0;
535
536 return log_error_errno(errno, "Failed to open /run/systemd/inhibit: %m");
537 }
538
539 FOREACH_DIRENT(de, d, return -errno) {
540 int k;
541 Inhibitor *i;
542
543 if (!dirent_is_file(de))
544 continue;
545
546 k = manager_add_inhibitor(m, de->d_name, &i);
547 if (k < 0) {
548 log_notice_errno(k, "Couldn't add inhibitor %s: %m", de->d_name);
549 r = k;
550 continue;
551 }
552
553 k = inhibitor_load(i);
554 if (k < 0)
555 r = k;
556 }
557
558 return r;
559 }
560
561 static int manager_dispatch_seat_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
562 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
563 Manager *m = userdata;
564
565 assert(m);
566
567 d = udev_monitor_receive_device(m->udev_seat_monitor);
568 if (!d)
569 return -ENOMEM;
570
571 manager_process_seat_device(m, d);
572 return 0;
573 }
574
575 static int manager_dispatch_device_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
576 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
577 Manager *m = userdata;
578
579 assert(m);
580
581 d = udev_monitor_receive_device(m->udev_device_monitor);
582 if (!d)
583 return -ENOMEM;
584
585 manager_process_seat_device(m, d);
586 return 0;
587 }
588
589 static int manager_dispatch_vcsa_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
590 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
591 Manager *m = userdata;
592 const char *name;
593
594 assert(m);
595
596 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
597 if (!d)
598 return -ENOMEM;
599
600 name = udev_device_get_sysname(d);
601
602 /* Whenever a VCSA device is removed try to reallocate our
603 * VTs, to make sure our auto VTs never go away. */
604
605 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
606 seat_preallocate_vts(m->seat0);
607
608 return 0;
609 }
610
611 static int manager_dispatch_button_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
612 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
613 Manager *m = userdata;
614
615 assert(m);
616
617 d = udev_monitor_receive_device(m->udev_button_monitor);
618 if (!d)
619 return -ENOMEM;
620
621 manager_process_button_device(m, d);
622 return 0;
623 }
624
625 static int manager_dispatch_console(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
626 Manager *m = userdata;
627
628 assert(m);
629 assert(m->seat0);
630 assert(m->console_active_fd == fd);
631
632 seat_read_active_vt(m->seat0);
633 return 0;
634 }
635
636 static int manager_reserve_vt(Manager *m) {
637 _cleanup_free_ char *p = NULL;
638
639 assert(m);
640
641 if (m->reserve_vt <= 0)
642 return 0;
643
644 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
645 return log_oom();
646
647 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
648 if (m->reserve_vt_fd < 0) {
649
650 /* Don't complain on VT-less systems */
651 if (errno != ENOENT)
652 log_warning_errno(errno, "Failed to pin reserved VT: %m");
653 return -errno;
654 }
655
656 return 0;
657 }
658
659 static int manager_connect_bus(Manager *m) {
660 int r;
661
662 assert(m);
663 assert(!m->bus);
664
665 r = sd_bus_default_system(&m->bus);
666 if (r < 0)
667 return log_error_errno(r, "Failed to connect to system bus: %m");
668
669 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable, m);
670 if (r < 0)
671 return log_error_errno(r, "Failed to add manager object vtable: %m");
672
673 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable, seat_object_find, m);
674 if (r < 0)
675 return log_error_errno(r, "Failed to add seat object vtable: %m");
676
677 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/seat", seat_node_enumerator, m);
678 if (r < 0)
679 return log_error_errno(r, "Failed to add seat enumerator: %m");
680
681 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m);
682 if (r < 0)
683 return log_error_errno(r, "Failed to add session object vtable: %m");
684
685 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m);
686 if (r < 0)
687 return log_error_errno(r, "Failed to add session enumerator: %m");
688
689 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable, user_object_find, m);
690 if (r < 0)
691 return log_error_errno(r, "Failed to add user object vtable: %m");
692
693 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/user", user_node_enumerator, m);
694 if (r < 0)
695 return log_error_errno(r, "Failed to add user enumerator: %m");
696
697 r = sd_bus_match_signal_async(
698 m->bus,
699 NULL,
700 "org.freedesktop.systemd1",
701 "/org/freedesktop/systemd1",
702 "org.freedesktop.systemd1.Manager",
703 "JobRemoved",
704 match_job_removed, NULL, m);
705 if (r < 0)
706 return log_error_errno(r, "Failed to request match for JobRemoved: %m");
707
708 r = sd_bus_match_signal_async(
709 m->bus,
710 NULL,
711 "org.freedesktop.systemd1",
712 "/org/freedesktop/systemd1",
713 "org.freedesktop.systemd1.Manager",
714 "UnitRemoved",
715 match_unit_removed, NULL, m);
716 if (r < 0)
717 return log_error_errno(r, "Failed to request match for UnitRemoved: %m");
718
719 r = sd_bus_match_signal_async(
720 m->bus,
721 NULL,
722 "org.freedesktop.systemd1",
723 NULL,
724 "org.freedesktop.DBus.Properties",
725 "PropertiesChanged",
726 match_properties_changed, NULL, m);
727 if (r < 0)
728 return log_error_errno(r, "Failed to request match for PropertiesChanged: %m");
729
730 r = sd_bus_match_signal_async(
731 m->bus,
732 NULL,
733 "org.freedesktop.systemd1",
734 "/org/freedesktop/systemd1",
735 "org.freedesktop.systemd1.Manager",
736 "Reloading",
737 match_reloading, NULL, m);
738 if (r < 0)
739 return log_error_errno(r, "Failed to request match for Reloading: %m");
740
741 r = sd_bus_call_method_async(
742 m->bus,
743 NULL,
744 "org.freedesktop.systemd1",
745 "/org/freedesktop/systemd1",
746 "org.freedesktop.systemd1.Manager",
747 "Subscribe",
748 NULL, NULL,
749 NULL);
750 if (r < 0)
751 return log_error_errno(r, "Failed to enable subscription: %m");
752
753 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.login1", 0, NULL, NULL);
754 if (r < 0)
755 return log_error_errno(r, "Failed to request name: %m");
756
757 r = sd_bus_attach_event(m->bus, m->event, SD_EVENT_PRIORITY_NORMAL);
758 if (r < 0)
759 return log_error_errno(r, "Failed to attach bus to event loop: %m");
760
761 return 0;
762 }
763
764 static int manager_vt_switch(sd_event_source *src, const struct signalfd_siginfo *si, void *data) {
765 Manager *m = data;
766 Session *active, *iter;
767
768 /*
769 * We got a VT-switch signal and we have to acknowledge it immediately.
770 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
771 * old user-space might run multiple sessions on a single VT, *sigh*.
772 * Therefore, we have to iterate all sessions and find one with a vtfd
773 * on the requested VT.
774 * As only VTs with active controllers have VT_PROCESS set, our current
775 * notion of the active VT might be wrong (for instance if the switch
776 * happens while we setup VT_PROCESS). Therefore, read the current VT
777 * first and then use s->active->vtnr as reference. Note that this is
778 * not racy, as no further VT-switch can happen as long as we're in
779 * synchronous VT_PROCESS mode.
780 */
781
782 assert(m->seat0);
783 seat_read_active_vt(m->seat0);
784
785 active = m->seat0->active;
786 if (!active || active->vtnr < 1) {
787 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
788 return 0;
789 }
790
791 if (active->vtfd >= 0) {
792 session_leave_vt(active);
793 } else {
794 LIST_FOREACH(sessions_by_seat, iter, m->seat0->sessions) {
795 if (iter->vtnr == active->vtnr && iter->vtfd >= 0) {
796 session_leave_vt(iter);
797 break;
798 }
799 }
800 }
801
802 return 0;
803 }
804
805 static int manager_connect_console(Manager *m) {
806 int r;
807
808 assert(m);
809 assert(m->console_active_fd < 0);
810
811 /* On certain architectures (S390 and Xen, and containers),
812 /dev/tty0 does not exist, so don't fail if we can't open
813 it. */
814 if (access("/dev/tty0", F_OK) < 0)
815 return 0;
816
817 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
818 if (m->console_active_fd < 0) {
819
820 /* On some systems the device node /dev/tty0 may exist
821 * even though /sys/class/tty/tty0 does not. */
822 if (errno == ENOENT)
823 return 0;
824
825 return log_error_errno(errno, "Failed to open /sys/class/tty/tty0/active: %m");
826 }
827
828 r = sd_event_add_io(m->event, &m->console_active_event_source, m->console_active_fd, 0, manager_dispatch_console, m);
829 if (r < 0) {
830 log_error("Failed to watch foreground console");
831 return r;
832 }
833
834 /*
835 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
836 * as VT-acquire signal. We ignore any acquire-events (yes, we still
837 * have to provide a valid signal-number for it!) and acknowledge all
838 * release events immediately.
839 */
840
841 if (SIGRTMIN + 1 > SIGRTMAX) {
842 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN, SIGRTMAX);
843 return -EINVAL;
844 }
845
846 assert_se(ignore_signals(SIGRTMIN + 1, -1) >= 0);
847 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGRTMIN, -1) >= 0);
848
849 r = sd_event_add_signal(m->event, NULL, SIGRTMIN, manager_vt_switch, m);
850 if (r < 0)
851 return r;
852
853 return 0;
854 }
855
856 static int manager_connect_udev(Manager *m) {
857 int r;
858
859 assert(m);
860 assert(!m->udev_seat_monitor);
861 assert(!m->udev_device_monitor);
862 assert(!m->udev_vcsa_monitor);
863 assert(!m->udev_button_monitor);
864
865 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
866 if (!m->udev_seat_monitor)
867 return -ENOMEM;
868
869 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
870 if (r < 0)
871 return r;
872
873 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
874 if (r < 0)
875 return r;
876
877 r = sd_event_add_io(m->event, &m->udev_seat_event_source, udev_monitor_get_fd(m->udev_seat_monitor), EPOLLIN, manager_dispatch_seat_udev, m);
878 if (r < 0)
879 return r;
880
881 m->udev_device_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
882 if (!m->udev_device_monitor)
883 return -ENOMEM;
884
885 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
886 if (r < 0)
887 return r;
888
889 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
890 if (r < 0)
891 return r;
892
893 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
894 if (r < 0)
895 return r;
896
897 r = udev_monitor_enable_receiving(m->udev_device_monitor);
898 if (r < 0)
899 return r;
900
901 r = sd_event_add_io(m->event, &m->udev_device_event_source, udev_monitor_get_fd(m->udev_device_monitor), EPOLLIN, manager_dispatch_device_udev, m);
902 if (r < 0)
903 return r;
904
905 /* Don't watch keys if nobody cares */
906 if (!manager_all_buttons_ignored(m)) {
907 m->udev_button_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
908 if (!m->udev_button_monitor)
909 return -ENOMEM;
910
911 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
912 if (r < 0)
913 return r;
914
915 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
916 if (r < 0)
917 return r;
918
919 r = udev_monitor_enable_receiving(m->udev_button_monitor);
920 if (r < 0)
921 return r;
922
923 r = sd_event_add_io(m->event, &m->udev_button_event_source, udev_monitor_get_fd(m->udev_button_monitor), EPOLLIN, manager_dispatch_button_udev, m);
924 if (r < 0)
925 return r;
926 }
927
928 /* Don't bother watching VCSA devices, if nobody cares */
929 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
930
931 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
932 if (!m->udev_vcsa_monitor)
933 return -ENOMEM;
934
935 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
936 if (r < 0)
937 return r;
938
939 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
940 if (r < 0)
941 return r;
942
943 r = sd_event_add_io(m->event, &m->udev_vcsa_event_source, udev_monitor_get_fd(m->udev_vcsa_monitor), EPOLLIN, manager_dispatch_vcsa_udev, m);
944 if (r < 0)
945 return r;
946 }
947
948 return 0;
949 }
950
951 static void manager_gc(Manager *m, bool drop_not_started) {
952 Seat *seat;
953 Session *session;
954 User *user;
955
956 assert(m);
957
958 while ((seat = m->seat_gc_queue)) {
959 LIST_REMOVE(gc_queue, m->seat_gc_queue, seat);
960 seat->in_gc_queue = false;
961
962 if (seat_may_gc(seat, drop_not_started)) {
963 seat_stop(seat, false);
964 seat_free(seat);
965 }
966 }
967
968 while ((session = m->session_gc_queue)) {
969 LIST_REMOVE(gc_queue, m->session_gc_queue, session);
970 session->in_gc_queue = false;
971
972 /* First, if we are not closing yet, initiate stopping */
973 if (session_may_gc(session, drop_not_started) &&
974 session_get_state(session) != SESSION_CLOSING)
975 session_stop(session, false);
976
977 /* Normally, this should make the session referenced
978 * again, if it doesn't then let's get rid of it
979 * immediately */
980 if (session_may_gc(session, drop_not_started)) {
981 session_finalize(session);
982 session_free(session);
983 }
984 }
985
986 while ((user = m->user_gc_queue)) {
987 LIST_REMOVE(gc_queue, m->user_gc_queue, user);
988 user->in_gc_queue = false;
989
990 /* First step: queue stop jobs */
991 if (user_may_gc(user, drop_not_started))
992 user_stop(user, false);
993
994 /* Second step: finalize user */
995 if (user_may_gc(user, drop_not_started)) {
996 user_finalize(user);
997 user_free(user);
998 }
999 }
1000 }
1001
1002 static int manager_dispatch_idle_action(sd_event_source *s, uint64_t t, void *userdata) {
1003 Manager *m = userdata;
1004 struct dual_timestamp since;
1005 usec_t n, elapse;
1006 int r;
1007
1008 assert(m);
1009
1010 if (m->idle_action == HANDLE_IGNORE ||
1011 m->idle_action_usec <= 0)
1012 return 0;
1013
1014 n = now(CLOCK_MONOTONIC);
1015
1016 r = manager_get_idle_hint(m, &since);
1017 if (r <= 0)
1018 /* Not idle. Let's check if after a timeout it might be idle then. */
1019 elapse = n + m->idle_action_usec;
1020 else {
1021 /* Idle! Let's see if it's time to do something, or if
1022 * we shall sleep for longer. */
1023
1024 if (n >= since.monotonic + m->idle_action_usec &&
1025 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
1026 log_info("System idle. Taking action.");
1027
1028 manager_handle_action(m, 0, m->idle_action, false, false);
1029 m->idle_action_not_before_usec = n;
1030 }
1031
1032 elapse = MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec;
1033 }
1034
1035 if (!m->idle_action_event_source) {
1036
1037 r = sd_event_add_time(
1038 m->event,
1039 &m->idle_action_event_source,
1040 CLOCK_MONOTONIC,
1041 elapse, USEC_PER_SEC*30,
1042 manager_dispatch_idle_action, m);
1043 if (r < 0)
1044 return log_error_errno(r, "Failed to add idle event source: %m");
1045
1046 r = sd_event_source_set_priority(m->idle_action_event_source, SD_EVENT_PRIORITY_IDLE+10);
1047 if (r < 0)
1048 return log_error_errno(r, "Failed to set idle event source priority: %m");
1049 } else {
1050 r = sd_event_source_set_time(m->idle_action_event_source, elapse);
1051 if (r < 0)
1052 return log_error_errno(r, "Failed to set idle event timer: %m");
1053
1054 r = sd_event_source_set_enabled(m->idle_action_event_source, SD_EVENT_ONESHOT);
1055 if (r < 0)
1056 return log_error_errno(r, "Failed to enable idle event timer: %m");
1057 }
1058
1059 return 0;
1060 }
1061
1062 static int manager_dispatch_reload_signal(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1063 Manager *m = userdata;
1064 int r;
1065
1066 manager_reset_config(m);
1067 r = manager_parse_config_file(m);
1068 if (r < 0)
1069 log_warning_errno(r, "Failed to parse config file, using defaults: %m");
1070 else
1071 log_info("Config file reloaded.");
1072
1073 return 0;
1074 }
1075
1076 static int manager_startup(Manager *m) {
1077 int r;
1078 Seat *seat;
1079 Session *session;
1080 User *user;
1081 Button *button;
1082 Inhibitor *inhibitor;
1083 Iterator i;
1084
1085 assert(m);
1086
1087 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGHUP, -1) >= 0);
1088
1089 r = sd_event_add_signal(m->event, NULL, SIGHUP, manager_dispatch_reload_signal, m);
1090 if (r < 0)
1091 return log_error_errno(r, "Failed to register SIGHUP handler: %m");
1092
1093 /* Connect to console */
1094 r = manager_connect_console(m);
1095 if (r < 0)
1096 return r;
1097
1098 /* Connect to udev */
1099 r = manager_connect_udev(m);
1100 if (r < 0)
1101 return log_error_errno(r, "Failed to create udev watchers: %m");
1102
1103 /* Connect to the bus */
1104 r = manager_connect_bus(m);
1105 if (r < 0)
1106 return r;
1107
1108 /* Instantiate magic seat 0 */
1109 r = manager_add_seat(m, "seat0", &m->seat0);
1110 if (r < 0)
1111 return log_error_errno(r, "Failed to add seat0: %m");
1112
1113 r = manager_set_lid_switch_ignore(m, 0 + m->holdoff_timeout_usec);
1114 if (r < 0)
1115 log_warning_errno(r, "Failed to set up lid switch ignore event source: %m");
1116
1117 /* Deserialize state */
1118 r = manager_enumerate_devices(m);
1119 if (r < 0)
1120 log_warning_errno(r, "Device enumeration failed: %m");
1121
1122 r = manager_enumerate_seats(m);
1123 if (r < 0)
1124 log_warning_errno(r, "Seat enumeration failed: %m");
1125
1126 r = manager_enumerate_users(m);
1127 if (r < 0)
1128 log_warning_errno(r, "User enumeration failed: %m");
1129
1130 r = manager_enumerate_sessions(m);
1131 if (r < 0)
1132 log_warning_errno(r, "Session enumeration failed: %m");
1133
1134 r = manager_enumerate_inhibitors(m);
1135 if (r < 0)
1136 log_warning_errno(r, "Inhibitor enumeration failed: %m");
1137
1138 r = manager_enumerate_buttons(m);
1139 if (r < 0)
1140 log_warning_errno(r, "Button enumeration failed: %m");
1141
1142 /* Remove stale objects before we start them */
1143 manager_gc(m, false);
1144
1145 /* Reserve the special reserved VT */
1146 manager_reserve_vt(m);
1147
1148 /* And start everything */
1149 HASHMAP_FOREACH(seat, m->seats, i)
1150 seat_start(seat);
1151
1152 HASHMAP_FOREACH(user, m->users, i)
1153 user_start(user);
1154
1155 HASHMAP_FOREACH(session, m->sessions, i)
1156 session_start(session, NULL);
1157
1158 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1159 inhibitor_start(inhibitor);
1160
1161 HASHMAP_FOREACH(button, m->buttons, i)
1162 button_check_switches(button);
1163
1164 manager_dispatch_idle_action(NULL, 0, m);
1165
1166 return 0;
1167 }
1168
1169 static int manager_run(Manager *m) {
1170 int r;
1171
1172 assert(m);
1173
1174 for (;;) {
1175 r = sd_event_get_state(m->event);
1176 if (r < 0)
1177 return r;
1178 if (r == SD_EVENT_FINISHED)
1179 return 0;
1180
1181 manager_gc(m, true);
1182
1183 r = manager_dispatch_delayed(m, false);
1184 if (r < 0)
1185 return r;
1186 if (r > 0)
1187 continue;
1188
1189 r = sd_event_run(m->event, (uint64_t) -1);
1190 if (r < 0)
1191 return r;
1192 }
1193 }
1194
1195 int main(int argc, char *argv[]) {
1196 Manager *m = NULL;
1197 int r;
1198
1199 log_set_target(LOG_TARGET_AUTO);
1200 log_set_facility(LOG_AUTH);
1201 log_parse_environment();
1202 log_open();
1203
1204 umask(0022);
1205
1206 if (argc != 1) {
1207 log_error("This program takes no arguments.");
1208 r = -EINVAL;
1209 goto finish;
1210 }
1211
1212 r = mac_selinux_init();
1213 if (r < 0) {
1214 log_error_errno(r, "Could not initialize labelling: %m");
1215 goto finish;
1216 }
1217
1218 /* Always create the directories people can create inotify
1219 * watches in. Note that some applications might check for the
1220 * existence of /run/systemd/seats/ to determine whether
1221 * logind is available, so please always make sure this check
1222 * stays in. */
1223 mkdir_label("/run/systemd/seats", 0755);
1224 mkdir_label("/run/systemd/users", 0755);
1225 mkdir_label("/run/systemd/sessions", 0755);
1226
1227 m = manager_new();
1228 if (!m) {
1229 r = log_oom();
1230 goto finish;
1231 }
1232
1233 manager_parse_config_file(m);
1234
1235 r = manager_startup(m);
1236 if (r < 0) {
1237 log_error_errno(r, "Failed to fully start up daemon: %m");
1238 goto finish;
1239 }
1240
1241 log_debug("systemd-logind running as pid "PID_FMT, getpid_cached());
1242
1243 sd_notify(false,
1244 "READY=1\n"
1245 "STATUS=Processing requests...");
1246
1247 r = manager_run(m);
1248
1249 log_debug("systemd-logind stopped as pid "PID_FMT, getpid_cached());
1250
1251 finish:
1252 sd_notify(false,
1253 "STOPPING=1\n"
1254 "STATUS=Shutting down...");
1255
1256 manager_free(m);
1257
1258 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1259 }