]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/login/logind.c
logind: terminate cleanly on SIGTERM/SIGINT
[thirdparty/systemd.git] / src / login / logind.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2 /***
3 This file is part of systemd.
4
5 Copyright 2011 Lennart Poettering
6 ***/
7
8 #include <errno.h>
9 #include <fcntl.h>
10 #include <string.h>
11 #include <unistd.h>
12
13 #include "libudev.h"
14 #include "sd-daemon.h"
15
16 #include "alloc-util.h"
17 #include "bus-error.h"
18 #include "bus-util.h"
19 #include "cgroup-util.h"
20 #include "def.h"
21 #include "dirent-util.h"
22 #include "fd-util.h"
23 #include "format-util.h"
24 #include "fs-util.h"
25 #include "logind.h"
26 #include "parse-util.h"
27 #include "process-util.h"
28 #include "selinux-util.h"
29 #include "signal-util.h"
30 #include "strv.h"
31 #include "udev-util.h"
32
33 static Manager* manager_unref(Manager *m);
34 DEFINE_TRIVIAL_CLEANUP_FUNC(Manager*, manager_unref);
35
36 static int manager_new(Manager **ret) {
37 _cleanup_(manager_unrefp) Manager *m = NULL;
38 int r;
39
40 assert(ret);
41
42 m = new0(Manager, 1);
43 if (!m)
44 return -ENOMEM;
45
46 m->console_active_fd = -1;
47 m->reserve_vt_fd = -1;
48
49 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
50
51 m->devices = hashmap_new(&string_hash_ops);
52 m->seats = hashmap_new(&string_hash_ops);
53 m->sessions = hashmap_new(&string_hash_ops);
54 m->users = hashmap_new(NULL);
55 m->inhibitors = hashmap_new(&string_hash_ops);
56 m->buttons = hashmap_new(&string_hash_ops);
57
58 m->user_units = hashmap_new(&string_hash_ops);
59 m->session_units = hashmap_new(&string_hash_ops);
60
61 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->user_units || !m->session_units)
62 return -ENOMEM;
63
64 m->udev = udev_new();
65 if (!m->udev)
66 return -errno;
67
68 r = sd_event_default(&m->event);
69 if (r < 0)
70 return r;
71
72 r = sd_event_add_signal(m->event, NULL, SIGINT, NULL, NULL);
73 if (r < 0)
74 return r;
75
76 r = sd_event_add_signal(m->event, NULL, SIGTERM, NULL, NULL);
77 if (r < 0)
78 return r;
79
80 (void) sd_event_set_watchdog(m->event, true);
81
82 manager_reset_config(m);
83
84 *ret = TAKE_PTR(m);
85 return 0;
86 }
87
88 static Manager* manager_unref(Manager *m) {
89 Session *session;
90 User *u;
91 Device *d;
92 Seat *s;
93 Inhibitor *i;
94 Button *b;
95
96 if (!m)
97 return NULL;
98
99 while ((session = hashmap_first(m->sessions)))
100 session_free(session);
101
102 while ((u = hashmap_first(m->users)))
103 user_free(u);
104
105 while ((d = hashmap_first(m->devices)))
106 device_free(d);
107
108 while ((s = hashmap_first(m->seats)))
109 seat_free(s);
110
111 while ((i = hashmap_first(m->inhibitors)))
112 inhibitor_free(i);
113
114 while ((b = hashmap_first(m->buttons)))
115 button_free(b);
116
117 hashmap_free(m->devices);
118 hashmap_free(m->seats);
119 hashmap_free(m->sessions);
120 hashmap_free(m->users);
121 hashmap_free(m->inhibitors);
122 hashmap_free(m->buttons);
123
124 hashmap_free(m->user_units);
125 hashmap_free(m->session_units);
126
127 sd_event_source_unref(m->idle_action_event_source);
128 sd_event_source_unref(m->inhibit_timeout_source);
129 sd_event_source_unref(m->scheduled_shutdown_timeout_source);
130 sd_event_source_unref(m->nologin_timeout_source);
131 sd_event_source_unref(m->wall_message_timeout_source);
132
133 sd_event_source_unref(m->console_active_event_source);
134 sd_event_source_unref(m->udev_seat_event_source);
135 sd_event_source_unref(m->udev_device_event_source);
136 sd_event_source_unref(m->udev_vcsa_event_source);
137 sd_event_source_unref(m->udev_button_event_source);
138 sd_event_source_unref(m->lid_switch_ignore_event_source);
139
140 safe_close(m->console_active_fd);
141
142 udev_monitor_unref(m->udev_seat_monitor);
143 udev_monitor_unref(m->udev_device_monitor);
144 udev_monitor_unref(m->udev_vcsa_monitor);
145 udev_monitor_unref(m->udev_button_monitor);
146
147 udev_unref(m->udev);
148
149 if (m->unlink_nologin)
150 (void) unlink_or_warn("/run/nologin");
151
152 bus_verify_polkit_async_registry_free(m->polkit_registry);
153
154 sd_bus_unref(m->bus);
155 sd_event_unref(m->event);
156
157 safe_close(m->reserve_vt_fd);
158
159 strv_free(m->kill_only_users);
160 strv_free(m->kill_exclude_users);
161
162 free(m->scheduled_shutdown_type);
163 free(m->scheduled_shutdown_tty);
164 free(m->wall_message);
165 free(m->action_job);
166
167 return mfree(m);
168 }
169
170 static int manager_enumerate_devices(Manager *m) {
171 struct udev_list_entry *item = NULL, *first = NULL;
172 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
173 int r;
174
175 assert(m);
176
177 /* Loads devices from udev and creates seats for them as
178 * necessary */
179
180 e = udev_enumerate_new(m->udev);
181 if (!e)
182 return -ENOMEM;
183
184 r = udev_enumerate_add_match_tag(e, "master-of-seat");
185 if (r < 0)
186 return r;
187
188 r = udev_enumerate_add_match_is_initialized(e);
189 if (r < 0)
190 return r;
191
192 r = udev_enumerate_scan_devices(e);
193 if (r < 0)
194 return r;
195
196 first = udev_enumerate_get_list_entry(e);
197 udev_list_entry_foreach(item, first) {
198 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
199 int k;
200
201 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
202 if (!d)
203 return -ENOMEM;
204
205 k = manager_process_seat_device(m, d);
206 if (k < 0)
207 r = k;
208 }
209
210 return r;
211 }
212
213 static int manager_enumerate_buttons(Manager *m) {
214 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
215 struct udev_list_entry *item = NULL, *first = NULL;
216 int r;
217
218 assert(m);
219
220 /* Loads buttons from udev */
221
222 if (manager_all_buttons_ignored(m))
223 return 0;
224
225 e = udev_enumerate_new(m->udev);
226 if (!e)
227 return -ENOMEM;
228
229 r = udev_enumerate_add_match_subsystem(e, "input");
230 if (r < 0)
231 return r;
232
233 r = udev_enumerate_add_match_tag(e, "power-switch");
234 if (r < 0)
235 return r;
236
237 r = udev_enumerate_add_match_is_initialized(e);
238 if (r < 0)
239 return r;
240
241 r = udev_enumerate_scan_devices(e);
242 if (r < 0)
243 return r;
244
245 first = udev_enumerate_get_list_entry(e);
246 udev_list_entry_foreach(item, first) {
247 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
248 int k;
249
250 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
251 if (!d)
252 return -ENOMEM;
253
254 k = manager_process_button_device(m, d);
255 if (k < 0)
256 r = k;
257 }
258
259 return r;
260 }
261
262 static int manager_enumerate_seats(Manager *m) {
263 _cleanup_closedir_ DIR *d = NULL;
264 struct dirent *de;
265 int r = 0;
266
267 assert(m);
268
269 /* This loads data about seats stored on disk, but does not
270 * actually create any seats. Removes data of seats that no
271 * longer exist. */
272
273 d = opendir("/run/systemd/seats");
274 if (!d) {
275 if (errno == ENOENT)
276 return 0;
277
278 return log_error_errno(errno, "Failed to open /run/systemd/seats: %m");
279 }
280
281 FOREACH_DIRENT(de, d, return -errno) {
282 Seat *s;
283 int k;
284
285 if (!dirent_is_file(de))
286 continue;
287
288 s = hashmap_get(m->seats, de->d_name);
289 if (!s) {
290 if (unlinkat(dirfd(d), de->d_name, 0) < 0)
291 log_warning("Failed to remove /run/systemd/seats/%s: %m",
292 de->d_name);
293 continue;
294 }
295
296 k = seat_load(s);
297 if (k < 0)
298 r = k;
299 }
300
301 return r;
302 }
303
304 static int manager_enumerate_linger_users(Manager *m) {
305 _cleanup_closedir_ DIR *d = NULL;
306 struct dirent *de;
307 int r = 0;
308
309 assert(m);
310
311 d = opendir("/var/lib/systemd/linger");
312 if (!d) {
313 if (errno == ENOENT)
314 return 0;
315
316 return log_error_errno(errno, "Failed to open /var/lib/systemd/linger/: %m");
317 }
318
319 FOREACH_DIRENT(de, d, return -errno) {
320 int k;
321
322 if (!dirent_is_file(de))
323 continue;
324
325 k = manager_add_user_by_name(m, de->d_name, NULL);
326 if (k < 0) {
327 log_notice_errno(k, "Couldn't add lingering user %s: %m", de->d_name);
328 r = k;
329 }
330 }
331
332 return r;
333 }
334
335 static int manager_enumerate_users(Manager *m) {
336 _cleanup_closedir_ DIR *d = NULL;
337 struct dirent *de;
338 int r, k;
339
340 assert(m);
341
342 /* Add lingering users */
343 r = manager_enumerate_linger_users(m);
344
345 /* Read in user data stored on disk */
346 d = opendir("/run/systemd/users");
347 if (!d) {
348 if (errno == ENOENT)
349 return 0;
350
351 return log_error_errno(errno, "Failed to open /run/systemd/users: %m");
352 }
353
354 FOREACH_DIRENT(de, d, return -errno) {
355 User *u;
356
357 if (!dirent_is_file(de))
358 continue;
359
360 k = manager_add_user_by_name(m, de->d_name, &u);
361 if (k < 0) {
362 log_error_errno(k, "Failed to add user by file name %s: %m", de->d_name);
363
364 r = k;
365 continue;
366 }
367
368 user_add_to_gc_queue(u);
369
370 k = user_load(u);
371 if (k < 0)
372 r = k;
373 }
374
375 return r;
376 }
377
378 static int parse_fdname(const char *fdname, char **session_id, dev_t *dev) {
379 _cleanup_strv_free_ char **parts = NULL;
380 _cleanup_free_ char *id = NULL;
381 unsigned int major, minor;
382 int r;
383
384 parts = strv_split(fdname, "-");
385 if (!parts)
386 return -ENOMEM;
387 if (strv_length(parts) != 5)
388 return -EINVAL;
389
390 if (!streq(parts[0], "session"))
391 return -EINVAL;
392 id = strdup(parts[1]);
393 if (!id)
394 return -ENOMEM;
395
396 if (!streq(parts[2], "device"))
397 return -EINVAL;
398 r = safe_atou(parts[3], &major) ||
399 safe_atou(parts[4], &minor);
400 if (r < 0)
401 return r;
402
403 *dev = makedev(major, minor);
404 *session_id = TAKE_PTR(id);
405
406 return 0;
407 }
408
409 static int manager_attach_fds(Manager *m) {
410 _cleanup_strv_free_ char **fdnames = NULL;
411 int n, i, fd;
412
413 /* Upon restart, PID1 will send us back all fds of session devices
414 * that we previously opened. Each file descriptor is associated
415 * with a given session. The session ids are passed through FDNAMES. */
416
417 n = sd_listen_fds_with_names(true, &fdnames);
418 if (n <= 0)
419 return n;
420
421 for (i = 0; i < n; i++) {
422 _cleanup_free_ char *id = NULL;
423 dev_t dev;
424 struct stat st;
425 SessionDevice *sd;
426 Session *s;
427 int r;
428
429 fd = SD_LISTEN_FDS_START + i;
430
431 r = parse_fdname(fdnames[i], &id, &dev);
432 if (r < 0) {
433 log_debug_errno(r, "Failed to parse fd name %s: %m", fdnames[i]);
434 close_nointr(fd);
435 continue;
436 }
437
438 s = hashmap_get(m->sessions, id);
439 if (!s) {
440 /* If the session doesn't exist anymore, the associated session
441 * device attached to this fd doesn't either. Let's simply close
442 * this fd. */
443 log_debug("Failed to attach fd for unknown session: %s", id);
444 close_nointr(fd);
445 continue;
446 }
447
448 if (fstat(fd, &st) < 0) {
449 /* The device is allowed to go away at a random point, in which
450 * case fstat failing is expected. */
451 log_debug_errno(errno, "Failed to stat device fd for session %s: %m", id);
452 close_nointr(fd);
453 continue;
454 }
455
456 if (!S_ISCHR(st.st_mode) || st.st_rdev != dev) {
457 log_debug("Device fd doesn't point to the expected character device node");
458 close_nointr(fd);
459 continue;
460 }
461
462 sd = hashmap_get(s->devices, &dev);
463 if (!sd) {
464 /* Weird, we got an fd for a session device which wasn't
465 * recorded in the session state file... */
466 log_warning("Got fd for missing session device [%u:%u] in session %s",
467 major(dev), minor(dev), s->id);
468 close_nointr(fd);
469 continue;
470 }
471
472 log_debug("Attaching fd to session device [%u:%u] for session %s",
473 major(dev), minor(dev), s->id);
474
475 session_device_attach_fd(sd, fd, s->was_active);
476 }
477
478 return 0;
479 }
480
481 static int manager_enumerate_sessions(Manager *m) {
482 _cleanup_closedir_ DIR *d = NULL;
483 struct dirent *de;
484 int r = 0, k;
485
486 assert(m);
487
488 /* Read in session data stored on disk */
489 d = opendir("/run/systemd/sessions");
490 if (!d) {
491 if (errno == ENOENT)
492 return 0;
493
494 return log_error_errno(errno, "Failed to open /run/systemd/sessions: %m");
495 }
496
497 FOREACH_DIRENT(de, d, return -errno) {
498 struct Session *s;
499
500 if (!dirent_is_file(de))
501 continue;
502
503 if (!session_id_valid(de->d_name)) {
504 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
505 r = -EINVAL;
506 continue;
507 }
508
509 k = manager_add_session(m, de->d_name, &s);
510 if (k < 0) {
511 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name);
512 r = k;
513 continue;
514 }
515
516 session_add_to_gc_queue(s);
517
518 k = session_load(s);
519 if (k < 0)
520 r = k;
521 }
522
523 /* We might be restarted and PID1 could have sent us back the
524 * session device fds we previously saved. */
525 k = manager_attach_fds(m);
526 if (k < 0)
527 log_warning_errno(k, "Failed to reattach session device fds: %m");
528
529 return r;
530 }
531
532 static int manager_enumerate_inhibitors(Manager *m) {
533 _cleanup_closedir_ DIR *d = NULL;
534 struct dirent *de;
535 int r = 0;
536
537 assert(m);
538
539 d = opendir("/run/systemd/inhibit");
540 if (!d) {
541 if (errno == ENOENT)
542 return 0;
543
544 return log_error_errno(errno, "Failed to open /run/systemd/inhibit: %m");
545 }
546
547 FOREACH_DIRENT(de, d, return -errno) {
548 int k;
549 Inhibitor *i;
550
551 if (!dirent_is_file(de))
552 continue;
553
554 k = manager_add_inhibitor(m, de->d_name, &i);
555 if (k < 0) {
556 log_notice_errno(k, "Couldn't add inhibitor %s: %m", de->d_name);
557 r = k;
558 continue;
559 }
560
561 k = inhibitor_load(i);
562 if (k < 0)
563 r = k;
564 }
565
566 return r;
567 }
568
569 static int manager_dispatch_seat_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
570 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
571 Manager *m = userdata;
572
573 assert(m);
574
575 d = udev_monitor_receive_device(m->udev_seat_monitor);
576 if (!d)
577 return -ENOMEM;
578
579 manager_process_seat_device(m, d);
580 return 0;
581 }
582
583 static int manager_dispatch_device_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
584 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
585 Manager *m = userdata;
586
587 assert(m);
588
589 d = udev_monitor_receive_device(m->udev_device_monitor);
590 if (!d)
591 return -ENOMEM;
592
593 manager_process_seat_device(m, d);
594 return 0;
595 }
596
597 static int manager_dispatch_vcsa_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
598 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
599 Manager *m = userdata;
600 const char *name;
601
602 assert(m);
603
604 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
605 if (!d)
606 return -ENOMEM;
607
608 name = udev_device_get_sysname(d);
609
610 /* Whenever a VCSA device is removed try to reallocate our
611 * VTs, to make sure our auto VTs never go away. */
612
613 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
614 seat_preallocate_vts(m->seat0);
615
616 return 0;
617 }
618
619 static int manager_dispatch_button_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
620 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
621 Manager *m = userdata;
622
623 assert(m);
624
625 d = udev_monitor_receive_device(m->udev_button_monitor);
626 if (!d)
627 return -ENOMEM;
628
629 manager_process_button_device(m, d);
630 return 0;
631 }
632
633 static int manager_dispatch_console(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
634 Manager *m = userdata;
635
636 assert(m);
637 assert(m->seat0);
638 assert(m->console_active_fd == fd);
639
640 seat_read_active_vt(m->seat0);
641 return 0;
642 }
643
644 static int manager_reserve_vt(Manager *m) {
645 _cleanup_free_ char *p = NULL;
646
647 assert(m);
648
649 if (m->reserve_vt <= 0)
650 return 0;
651
652 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
653 return log_oom();
654
655 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
656 if (m->reserve_vt_fd < 0) {
657
658 /* Don't complain on VT-less systems */
659 if (errno != ENOENT)
660 log_warning_errno(errno, "Failed to pin reserved VT: %m");
661 return -errno;
662 }
663
664 return 0;
665 }
666
667 static int manager_connect_bus(Manager *m) {
668 int r;
669
670 assert(m);
671 assert(!m->bus);
672
673 r = sd_bus_default_system(&m->bus);
674 if (r < 0)
675 return log_error_errno(r, "Failed to connect to system bus: %m");
676
677 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable, m);
678 if (r < 0)
679 return log_error_errno(r, "Failed to add manager object vtable: %m");
680
681 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable, seat_object_find, m);
682 if (r < 0)
683 return log_error_errno(r, "Failed to add seat object vtable: %m");
684
685 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/seat", seat_node_enumerator, m);
686 if (r < 0)
687 return log_error_errno(r, "Failed to add seat enumerator: %m");
688
689 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m);
690 if (r < 0)
691 return log_error_errno(r, "Failed to add session object vtable: %m");
692
693 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m);
694 if (r < 0)
695 return log_error_errno(r, "Failed to add session enumerator: %m");
696
697 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable, user_object_find, m);
698 if (r < 0)
699 return log_error_errno(r, "Failed to add user object vtable: %m");
700
701 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/user", user_node_enumerator, m);
702 if (r < 0)
703 return log_error_errno(r, "Failed to add user enumerator: %m");
704
705 r = sd_bus_match_signal_async(
706 m->bus,
707 NULL,
708 "org.freedesktop.systemd1",
709 "/org/freedesktop/systemd1",
710 "org.freedesktop.systemd1.Manager",
711 "JobRemoved",
712 match_job_removed, NULL, m);
713 if (r < 0)
714 return log_error_errno(r, "Failed to request match for JobRemoved: %m");
715
716 r = sd_bus_match_signal_async(
717 m->bus,
718 NULL,
719 "org.freedesktop.systemd1",
720 "/org/freedesktop/systemd1",
721 "org.freedesktop.systemd1.Manager",
722 "UnitRemoved",
723 match_unit_removed, NULL, m);
724 if (r < 0)
725 return log_error_errno(r, "Failed to request match for UnitRemoved: %m");
726
727 r = sd_bus_match_signal_async(
728 m->bus,
729 NULL,
730 "org.freedesktop.systemd1",
731 NULL,
732 "org.freedesktop.DBus.Properties",
733 "PropertiesChanged",
734 match_properties_changed, NULL, m);
735 if (r < 0)
736 return log_error_errno(r, "Failed to request match for PropertiesChanged: %m");
737
738 r = sd_bus_match_signal_async(
739 m->bus,
740 NULL,
741 "org.freedesktop.systemd1",
742 "/org/freedesktop/systemd1",
743 "org.freedesktop.systemd1.Manager",
744 "Reloading",
745 match_reloading, NULL, m);
746 if (r < 0)
747 return log_error_errno(r, "Failed to request match for Reloading: %m");
748
749 r = sd_bus_call_method_async(
750 m->bus,
751 NULL,
752 "org.freedesktop.systemd1",
753 "/org/freedesktop/systemd1",
754 "org.freedesktop.systemd1.Manager",
755 "Subscribe",
756 NULL, NULL,
757 NULL);
758 if (r < 0)
759 return log_error_errno(r, "Failed to enable subscription: %m");
760
761 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.login1", 0, NULL, NULL);
762 if (r < 0)
763 return log_error_errno(r, "Failed to request name: %m");
764
765 r = sd_bus_attach_event(m->bus, m->event, SD_EVENT_PRIORITY_NORMAL);
766 if (r < 0)
767 return log_error_errno(r, "Failed to attach bus to event loop: %m");
768
769 return 0;
770 }
771
772 static int manager_vt_switch(sd_event_source *src, const struct signalfd_siginfo *si, void *data) {
773 Manager *m = data;
774 Session *active, *iter;
775
776 /*
777 * We got a VT-switch signal and we have to acknowledge it immediately.
778 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
779 * old user-space might run multiple sessions on a single VT, *sigh*.
780 * Therefore, we have to iterate all sessions and find one with a vtfd
781 * on the requested VT.
782 * As only VTs with active controllers have VT_PROCESS set, our current
783 * notion of the active VT might be wrong (for instance if the switch
784 * happens while we setup VT_PROCESS). Therefore, read the current VT
785 * first and then use s->active->vtnr as reference. Note that this is
786 * not racy, as no further VT-switch can happen as long as we're in
787 * synchronous VT_PROCESS mode.
788 */
789
790 assert(m->seat0);
791 seat_read_active_vt(m->seat0);
792
793 active = m->seat0->active;
794 if (!active || active->vtnr < 1) {
795 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
796 return 0;
797 }
798
799 if (active->vtfd >= 0) {
800 session_leave_vt(active);
801 } else {
802 LIST_FOREACH(sessions_by_seat, iter, m->seat0->sessions) {
803 if (iter->vtnr == active->vtnr && iter->vtfd >= 0) {
804 session_leave_vt(iter);
805 break;
806 }
807 }
808 }
809
810 return 0;
811 }
812
813 static int manager_connect_console(Manager *m) {
814 int r;
815
816 assert(m);
817 assert(m->console_active_fd < 0);
818
819 /* On certain architectures (S390 and Xen, and containers),
820 /dev/tty0 does not exist, so don't fail if we can't open
821 it. */
822 if (access("/dev/tty0", F_OK) < 0)
823 return 0;
824
825 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
826 if (m->console_active_fd < 0) {
827
828 /* On some systems the device node /dev/tty0 may exist
829 * even though /sys/class/tty/tty0 does not. */
830 if (errno == ENOENT)
831 return 0;
832
833 return log_error_errno(errno, "Failed to open /sys/class/tty/tty0/active: %m");
834 }
835
836 r = sd_event_add_io(m->event, &m->console_active_event_source, m->console_active_fd, 0, manager_dispatch_console, m);
837 if (r < 0) {
838 log_error("Failed to watch foreground console");
839 return r;
840 }
841
842 /*
843 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
844 * as VT-acquire signal. We ignore any acquire-events (yes, we still
845 * have to provide a valid signal-number for it!) and acknowledge all
846 * release events immediately.
847 */
848
849 if (SIGRTMIN + 1 > SIGRTMAX) {
850 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN, SIGRTMAX);
851 return -EINVAL;
852 }
853
854 assert_se(ignore_signals(SIGRTMIN + 1, -1) >= 0);
855 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGRTMIN, -1) >= 0);
856
857 r = sd_event_add_signal(m->event, NULL, SIGRTMIN, manager_vt_switch, m);
858 if (r < 0)
859 return r;
860
861 return 0;
862 }
863
864 static int manager_connect_udev(Manager *m) {
865 int r;
866
867 assert(m);
868 assert(!m->udev_seat_monitor);
869 assert(!m->udev_device_monitor);
870 assert(!m->udev_vcsa_monitor);
871 assert(!m->udev_button_monitor);
872
873 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
874 if (!m->udev_seat_monitor)
875 return -ENOMEM;
876
877 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
878 if (r < 0)
879 return r;
880
881 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
882 if (r < 0)
883 return r;
884
885 r = sd_event_add_io(m->event, &m->udev_seat_event_source, udev_monitor_get_fd(m->udev_seat_monitor), EPOLLIN, manager_dispatch_seat_udev, m);
886 if (r < 0)
887 return r;
888
889 m->udev_device_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
890 if (!m->udev_device_monitor)
891 return -ENOMEM;
892
893 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
894 if (r < 0)
895 return r;
896
897 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
898 if (r < 0)
899 return r;
900
901 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
902 if (r < 0)
903 return r;
904
905 r = udev_monitor_enable_receiving(m->udev_device_monitor);
906 if (r < 0)
907 return r;
908
909 r = sd_event_add_io(m->event, &m->udev_device_event_source, udev_monitor_get_fd(m->udev_device_monitor), EPOLLIN, manager_dispatch_device_udev, m);
910 if (r < 0)
911 return r;
912
913 /* Don't watch keys if nobody cares */
914 if (!manager_all_buttons_ignored(m)) {
915 m->udev_button_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
916 if (!m->udev_button_monitor)
917 return -ENOMEM;
918
919 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
920 if (r < 0)
921 return r;
922
923 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
924 if (r < 0)
925 return r;
926
927 r = udev_monitor_enable_receiving(m->udev_button_monitor);
928 if (r < 0)
929 return r;
930
931 r = sd_event_add_io(m->event, &m->udev_button_event_source, udev_monitor_get_fd(m->udev_button_monitor), EPOLLIN, manager_dispatch_button_udev, m);
932 if (r < 0)
933 return r;
934 }
935
936 /* Don't bother watching VCSA devices, if nobody cares */
937 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
938
939 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
940 if (!m->udev_vcsa_monitor)
941 return -ENOMEM;
942
943 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
944 if (r < 0)
945 return r;
946
947 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
948 if (r < 0)
949 return r;
950
951 r = sd_event_add_io(m->event, &m->udev_vcsa_event_source, udev_monitor_get_fd(m->udev_vcsa_monitor), EPOLLIN, manager_dispatch_vcsa_udev, m);
952 if (r < 0)
953 return r;
954 }
955
956 return 0;
957 }
958
959 static void manager_gc(Manager *m, bool drop_not_started) {
960 Seat *seat;
961 Session *session;
962 User *user;
963
964 assert(m);
965
966 while ((seat = m->seat_gc_queue)) {
967 LIST_REMOVE(gc_queue, m->seat_gc_queue, seat);
968 seat->in_gc_queue = false;
969
970 if (seat_may_gc(seat, drop_not_started)) {
971 seat_stop(seat, false);
972 seat_free(seat);
973 }
974 }
975
976 while ((session = m->session_gc_queue)) {
977 LIST_REMOVE(gc_queue, m->session_gc_queue, session);
978 session->in_gc_queue = false;
979
980 /* First, if we are not closing yet, initiate stopping */
981 if (session_may_gc(session, drop_not_started) &&
982 session_get_state(session) != SESSION_CLOSING)
983 session_stop(session, false);
984
985 /* Normally, this should make the session referenced
986 * again, if it doesn't then let's get rid of it
987 * immediately */
988 if (session_may_gc(session, drop_not_started)) {
989 session_finalize(session);
990 session_free(session);
991 }
992 }
993
994 while ((user = m->user_gc_queue)) {
995 LIST_REMOVE(gc_queue, m->user_gc_queue, user);
996 user->in_gc_queue = false;
997
998 /* First step: queue stop jobs */
999 if (user_may_gc(user, drop_not_started))
1000 user_stop(user, false);
1001
1002 /* Second step: finalize user */
1003 if (user_may_gc(user, drop_not_started)) {
1004 user_finalize(user);
1005 user_free(user);
1006 }
1007 }
1008 }
1009
1010 static int manager_dispatch_idle_action(sd_event_source *s, uint64_t t, void *userdata) {
1011 Manager *m = userdata;
1012 struct dual_timestamp since;
1013 usec_t n, elapse;
1014 int r;
1015
1016 assert(m);
1017
1018 if (m->idle_action == HANDLE_IGNORE ||
1019 m->idle_action_usec <= 0)
1020 return 0;
1021
1022 n = now(CLOCK_MONOTONIC);
1023
1024 r = manager_get_idle_hint(m, &since);
1025 if (r <= 0)
1026 /* Not idle. Let's check if after a timeout it might be idle then. */
1027 elapse = n + m->idle_action_usec;
1028 else {
1029 /* Idle! Let's see if it's time to do something, or if
1030 * we shall sleep for longer. */
1031
1032 if (n >= since.monotonic + m->idle_action_usec &&
1033 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
1034 log_info("System idle. Taking action.");
1035
1036 manager_handle_action(m, 0, m->idle_action, false, false);
1037 m->idle_action_not_before_usec = n;
1038 }
1039
1040 elapse = MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec;
1041 }
1042
1043 if (!m->idle_action_event_source) {
1044
1045 r = sd_event_add_time(
1046 m->event,
1047 &m->idle_action_event_source,
1048 CLOCK_MONOTONIC,
1049 elapse, USEC_PER_SEC*30,
1050 manager_dispatch_idle_action, m);
1051 if (r < 0)
1052 return log_error_errno(r, "Failed to add idle event source: %m");
1053
1054 r = sd_event_source_set_priority(m->idle_action_event_source, SD_EVENT_PRIORITY_IDLE+10);
1055 if (r < 0)
1056 return log_error_errno(r, "Failed to set idle event source priority: %m");
1057 } else {
1058 r = sd_event_source_set_time(m->idle_action_event_source, elapse);
1059 if (r < 0)
1060 return log_error_errno(r, "Failed to set idle event timer: %m");
1061
1062 r = sd_event_source_set_enabled(m->idle_action_event_source, SD_EVENT_ONESHOT);
1063 if (r < 0)
1064 return log_error_errno(r, "Failed to enable idle event timer: %m");
1065 }
1066
1067 return 0;
1068 }
1069
1070 static int manager_dispatch_reload_signal(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1071 Manager *m = userdata;
1072 int r;
1073
1074 manager_reset_config(m);
1075 r = manager_parse_config_file(m);
1076 if (r < 0)
1077 log_warning_errno(r, "Failed to parse config file, using defaults: %m");
1078 else
1079 log_info("Config file reloaded.");
1080
1081 return 0;
1082 }
1083
1084 static int manager_startup(Manager *m) {
1085 int r;
1086 Seat *seat;
1087 Session *session;
1088 User *user;
1089 Button *button;
1090 Inhibitor *inhibitor;
1091 Iterator i;
1092
1093 assert(m);
1094
1095 r = sd_event_add_signal(m->event, NULL, SIGHUP, manager_dispatch_reload_signal, m);
1096 if (r < 0)
1097 return log_error_errno(r, "Failed to register SIGHUP handler: %m");
1098
1099 /* Connect to console */
1100 r = manager_connect_console(m);
1101 if (r < 0)
1102 return r;
1103
1104 /* Connect to udev */
1105 r = manager_connect_udev(m);
1106 if (r < 0)
1107 return log_error_errno(r, "Failed to create udev watchers: %m");
1108
1109 /* Connect to the bus */
1110 r = manager_connect_bus(m);
1111 if (r < 0)
1112 return r;
1113
1114 /* Instantiate magic seat 0 */
1115 r = manager_add_seat(m, "seat0", &m->seat0);
1116 if (r < 0)
1117 return log_error_errno(r, "Failed to add seat0: %m");
1118
1119 r = manager_set_lid_switch_ignore(m, 0 + m->holdoff_timeout_usec);
1120 if (r < 0)
1121 log_warning_errno(r, "Failed to set up lid switch ignore event source: %m");
1122
1123 /* Deserialize state */
1124 r = manager_enumerate_devices(m);
1125 if (r < 0)
1126 log_warning_errno(r, "Device enumeration failed: %m");
1127
1128 r = manager_enumerate_seats(m);
1129 if (r < 0)
1130 log_warning_errno(r, "Seat enumeration failed: %m");
1131
1132 r = manager_enumerate_users(m);
1133 if (r < 0)
1134 log_warning_errno(r, "User enumeration failed: %m");
1135
1136 r = manager_enumerate_sessions(m);
1137 if (r < 0)
1138 log_warning_errno(r, "Session enumeration failed: %m");
1139
1140 r = manager_enumerate_inhibitors(m);
1141 if (r < 0)
1142 log_warning_errno(r, "Inhibitor enumeration failed: %m");
1143
1144 r = manager_enumerate_buttons(m);
1145 if (r < 0)
1146 log_warning_errno(r, "Button enumeration failed: %m");
1147
1148 /* Remove stale objects before we start them */
1149 manager_gc(m, false);
1150
1151 /* Reserve the special reserved VT */
1152 manager_reserve_vt(m);
1153
1154 /* And start everything */
1155 HASHMAP_FOREACH(seat, m->seats, i)
1156 seat_start(seat);
1157
1158 HASHMAP_FOREACH(user, m->users, i)
1159 user_start(user);
1160
1161 HASHMAP_FOREACH(session, m->sessions, i)
1162 session_start(session, NULL);
1163
1164 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1165 inhibitor_start(inhibitor);
1166
1167 HASHMAP_FOREACH(button, m->buttons, i)
1168 button_check_switches(button);
1169
1170 manager_dispatch_idle_action(NULL, 0, m);
1171
1172 return 0;
1173 }
1174
1175 static int manager_run(Manager *m) {
1176 int r;
1177
1178 assert(m);
1179
1180 for (;;) {
1181 r = sd_event_get_state(m->event);
1182 if (r < 0)
1183 return r;
1184 if (r == SD_EVENT_FINISHED)
1185 return 0;
1186
1187 manager_gc(m, true);
1188
1189 r = manager_dispatch_delayed(m, false);
1190 if (r < 0)
1191 return r;
1192 if (r > 0)
1193 continue;
1194
1195 r = sd_event_run(m->event, (uint64_t) -1);
1196 if (r < 0)
1197 return r;
1198 }
1199 }
1200
1201 int main(int argc, char *argv[]) {
1202 _cleanup_(manager_unrefp) Manager *m = NULL;
1203 int r;
1204
1205 log_set_target(LOG_TARGET_AUTO);
1206 log_set_facility(LOG_AUTH);
1207 log_parse_environment();
1208 log_open();
1209
1210 umask(0022);
1211
1212 if (argc != 1) {
1213 log_error("This program takes no arguments.");
1214 r = -EINVAL;
1215 goto finish;
1216 }
1217
1218 r = mac_selinux_init();
1219 if (r < 0) {
1220 log_error_errno(r, "Could not initialize labelling: %m");
1221 goto finish;
1222 }
1223
1224 /* Always create the directories people can create inotify
1225 * watches in. Note that some applications might check for the
1226 * existence of /run/systemd/seats/ to determine whether
1227 * logind is available, so please always make sure this check
1228 * stays in. */
1229 mkdir_label("/run/systemd/seats", 0755);
1230 mkdir_label("/run/systemd/users", 0755);
1231 mkdir_label("/run/systemd/sessions", 0755);
1232
1233 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGHUP, SIGTERM, SIGINT, -1) >= 0);
1234
1235 r = manager_new(&m);
1236 if (r < 0) {
1237 log_error_errno(r, "Failed to allocate manager object: %m");
1238 goto finish;
1239 }
1240
1241 (void) manager_parse_config_file(m);
1242
1243 r = manager_startup(m);
1244 if (r < 0) {
1245 log_error_errno(r, "Failed to fully start up daemon: %m");
1246 goto finish;
1247 }
1248
1249 log_debug("systemd-logind running as pid "PID_FMT, getpid_cached());
1250
1251 (void) sd_notify(false,
1252 "READY=1\n"
1253 "STATUS=Processing requests...");
1254
1255 r = manager_run(m);
1256
1257 log_debug("systemd-logind stopped as pid "PID_FMT, getpid_cached());
1258
1259 (void) sd_notify(false,
1260 "STOPPING=1\n"
1261 "STATUS=Shutting down...");
1262
1263 finish:
1264 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1265 }