]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/logind.c
dbus: add FlushDevices() bus call to reset all seat assignments
[thirdparty/systemd.git] / src / logind.c
CommitLineData
20263082
LP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2011 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <errno.h>
23#include <pwd.h>
24#include <libudev.h>
25#include <fcntl.h>
26#include <string.h>
27#include <unistd.h>
28#include <sys/epoll.h>
5eda94dd
LP
29#include <sys/ioctl.h>
30#include <linux/vt.h>
20263082
LP
31
32#include "logind.h"
33#include "dbus-common.h"
34#include "dbus-loop.h"
193197e8
LP
35#include "strv.h"
36#include "conf-parser.h"
20263082 37
20263082
LP
38Manager *manager_new(void) {
39 Manager *m;
40
41 m = new0(Manager, 1);
42 if (!m)
43 return NULL;
44
45 m->console_active_fd = -1;
46 m->bus_fd = -1;
30ed21ce
LP
47 m->udev_seat_fd = -1;
48 m->udev_vcsa_fd = -1;
20263082
LP
49 m->epoll_fd = -1;
50 m->n_autovts = 6;
51
52 m->devices = hashmap_new(string_hash_func, string_compare_func);
53 m->seats = hashmap_new(string_hash_func, string_compare_func);
54 m->sessions = hashmap_new(string_hash_func, string_compare_func);
55 m->users = hashmap_new(trivial_hash_func, trivial_compare_func);
1713813d 56 m->cgroups = hashmap_new(string_hash_func, string_compare_func);
932e3ee7 57 m->fifo_fds = hashmap_new(trivial_hash_func, trivial_compare_func);
20263082 58
25d93491
LP
59 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->cgroups || !m->fifo_fds) {
60 manager_free(m);
61 return NULL;
62 }
63
64 m->reset_controllers = strv_new("cpu", NULL);
65 m->kill_exclude_users = strv_new("root", NULL);
66 if (!m->reset_controllers || !m->kill_exclude_users) {
20263082
LP
67 manager_free(m);
68 return NULL;
69 }
70
71 m->udev = udev_new();
72 if (!m->udev) {
73 manager_free(m);
74 return NULL;
75 }
76
77 if (cg_get_user_path(&m->cgroup_path) < 0) {
78 manager_free(m);
79 return NULL;
80 }
81
82 return m;
83}
84
85void manager_free(Manager *m) {
86 Session *session;
87 User *u;
88 Device *d;
89 Seat *s;
90
91 assert(m);
92
93 while ((session = hashmap_first(m->sessions)))
94 session_free(session);
95
96 while ((u = hashmap_first(m->users)))
97 user_free(u);
98
99 while ((d = hashmap_first(m->devices)))
100 device_free(d);
101
102 while ((s = hashmap_first(m->seats)))
103 seat_free(s);
104
105 hashmap_free(m->sessions);
106 hashmap_free(m->users);
107 hashmap_free(m->devices);
108 hashmap_free(m->seats);
1713813d 109 hashmap_free(m->cgroups);
932e3ee7 110 hashmap_free(m->fifo_fds);
20263082
LP
111
112 if (m->console_active_fd >= 0)
113 close_nointr_nofail(m->console_active_fd);
114
30ed21ce
LP
115 if (m->udev_seat_monitor)
116 udev_monitor_unref(m->udev_seat_monitor);
117
118 if (m->udev_vcsa_monitor)
119 udev_monitor_unref(m->udev_vcsa_monitor);
20263082
LP
120
121 if (m->udev)
122 udev_unref(m->udev);
123
124 if (m->bus) {
125 dbus_connection_flush(m->bus);
126 dbus_connection_close(m->bus);
127 dbus_connection_unref(m->bus);
128 }
129
130 if (m->bus_fd >= 0)
131 close_nointr_nofail(m->bus_fd);
132
133 if (m->epoll_fd >= 0)
134 close_nointr_nofail(m->epoll_fd);
135
193197e8
LP
136 strv_free(m->controllers);
137 strv_free(m->reset_controllers);
138 strv_free(m->kill_only_users);
139 strv_free(m->kill_exclude_users);
140
20263082
LP
141 free(m->cgroup_path);
142 free(m);
143}
144
145int manager_add_device(Manager *m, const char *sysfs, Device **_device) {
146 Device *d;
147
148 assert(m);
149 assert(sysfs);
150
151 d = hashmap_get(m->devices, sysfs);
152 if (d) {
153 if (_device)
154 *_device = d;
155
156 return 0;
157 }
158
159 d = device_new(m, sysfs);
160 if (!d)
161 return -ENOMEM;
162
163 if (_device)
164 *_device = d;
165
166 return 0;
167}
168
169int manager_add_seat(Manager *m, const char *id, Seat **_seat) {
170 Seat *s;
171
172 assert(m);
173 assert(id);
174
175 s = hashmap_get(m->seats, id);
176 if (s) {
177 if (_seat)
178 *_seat = s;
179
180 return 0;
181 }
182
183 s = seat_new(m, id);
184 if (!s)
185 return -ENOMEM;
186
187 if (_seat)
188 *_seat = s;
189
190 return 0;
191}
192
193int manager_add_session(Manager *m, User *u, const char *id, Session **_session) {
194 Session *s;
195
196 assert(m);
197 assert(id);
198
199 s = hashmap_get(m->sessions, id);
200 if (s) {
201 if (_session)
202 *_session = s;
203
204 return 0;
205 }
206
207 s = session_new(m, u, id);
208 if (!s)
209 return -ENOMEM;
210
211 if (_session)
212 *_session = s;
213
214 return 0;
215}
216
217int manager_add_user(Manager *m, uid_t uid, gid_t gid, const char *name, User **_user) {
218 User *u;
20263082
LP
219
220 assert(m);
221 assert(name);
222
223 u = hashmap_get(m->users, ULONG_TO_PTR((unsigned long) uid));
224 if (u) {
225 if (_user)
226 *_user = u;
227
228 return 0;
229 }
230
231 u = user_new(m, uid, gid, name);
232 if (!u)
233 return -ENOMEM;
234
14c3baca
LP
235 if (_user)
236 *_user = u;
20263082 237
14c3baca 238 return 0;
20263082
LP
239}
240
241int manager_add_user_by_name(Manager *m, const char *name, User **_user) {
242 struct passwd *p;
243
244 assert(m);
245 assert(name);
246
247 errno = 0;
248 p = getpwnam(name);
249 if (!p)
250 return errno ? -errno : -ENOENT;
251
252 return manager_add_user(m, p->pw_uid, p->pw_gid, name, _user);
253}
254
255int manager_add_user_by_uid(Manager *m, uid_t uid, User **_user) {
256 struct passwd *p;
257
258 assert(m);
259
260 errno = 0;
261 p = getpwuid(uid);
262 if (!p)
263 return errno ? -errno : -ENOENT;
264
265 return manager_add_user(m, uid, p->pw_gid, p->pw_name, _user);
266}
267
30ed21ce 268int manager_process_seat_device(Manager *m, struct udev_device *d) {
20263082
LP
269 Device *device;
270 int r;
271
272 assert(m);
273
14c3baca 274 if (streq_ptr(udev_device_get_action(d), "remove")) {
20263082 275
3f49d45a
LP
276 /* FIXME: use syspath instead of sysname here, as soon as fb driver is fixed */
277 device = hashmap_get(m->devices, udev_device_get_sysname(d));
14c3baca
LP
278 if (!device)
279 return 0;
20263082 280
14c3baca
LP
281 seat_add_to_gc_queue(device->seat);
282 device_free(device);
283
284 } else {
285 const char *sn;
286 Seat *seat;
287
3f49d45a 288 sn = udev_device_get_property_value(d, "ID_SEAT");
14c3baca
LP
289 if (!sn)
290 sn = "seat0";
291
3f49d45a
LP
292 if (!seat_name_is_valid(sn)) {
293 log_warning("Device with invalid seat name %s found, ignoring.", sn);
294 return 0;
295 }
14c3baca 296
3f49d45a 297 r = manager_add_device(m, udev_device_get_sysname(d), &device);
14c3baca
LP
298 if (r < 0)
299 return r;
300
301 r = manager_add_seat(m, sn, &seat);
302 if (r < 0) {
303 if (!device->seat)
304 device_free(device);
305
306 return r;
307 }
308
309 device_attach(device, seat);
3f49d45a 310 seat_start(seat);
14c3baca 311 }
20263082 312
20263082
LP
313 return 0;
314}
315
316int manager_enumerate_devices(Manager *m) {
317 struct udev_list_entry *item = NULL, *first = NULL;
318 struct udev_enumerate *e;
14c3baca 319 int r;
20263082
LP
320
321 assert(m);
322
323 /* Loads devices from udev and creates seats for them as
324 * necessary */
325
326 e = udev_enumerate_new(m->udev);
14c3baca
LP
327 if (!e) {
328 r = -ENOMEM;
5eda94dd 329 goto finish;
14c3baca 330 }
20263082 331
14c3baca
LP
332 r = udev_enumerate_add_match_subsystem(e, "graphics");
333 if (r < 0)
20263082
LP
334 goto finish;
335
14c3baca
LP
336 r = udev_enumerate_add_match_tag(e, "seat");
337 if (r < 0)
20263082
LP
338 goto finish;
339
14c3baca
LP
340 r = udev_enumerate_scan_devices(e);
341 if (r < 0)
20263082
LP
342 goto finish;
343
344 first = udev_enumerate_get_list_entry(e);
345 udev_list_entry_foreach(item, first) {
346 struct udev_device *d;
347 int k;
348
349 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
14c3baca
LP
350 if (!d) {
351 r = -ENOMEM;
20263082 352 goto finish;
14c3baca 353 }
20263082 354
30ed21ce 355 k = manager_process_seat_device(m, d);
20263082
LP
356 udev_device_unref(d);
357
358 if (k < 0)
359 r = k;
360 }
361
362finish:
363 if (e)
364 udev_enumerate_unref(e);
365
366 return r;
367}
368
369int manager_enumerate_seats(Manager *m) {
370 DIR *d;
371 struct dirent *de;
372 int r = 0;
373
374 assert(m);
375
376 /* This loads data about seats stored on disk, but does not
377 * actually create any seats. Removes data of seats that no
378 * longer exist. */
379
380 d = opendir("/run/systemd/seats");
381 if (!d) {
382 if (errno == ENOENT)
383 return 0;
384
385 log_error("Failed to open /run/systemd/seats: %m");
386 return -errno;
387 }
388
389 while ((de = readdir(d))) {
390 Seat *s;
391 int k;
392
393 if (!dirent_is_file(de))
394 continue;
395
396 s = hashmap_get(m->seats, de->d_name);
397 if (!s) {
398 unlinkat(dirfd(d), de->d_name, 0);
399 continue;
400 }
401
402 k = seat_load(s);
403 if (k < 0)
404 r = k;
405 }
406
407 closedir(d);
408
409 return r;
410}
411
412static int manager_enumerate_users_from_cgroup(Manager *m) {
413 int r = 0;
414 char *name;
415 DIR *d;
416
417 r = cg_enumerate_subgroups(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_path, &d);
418 if (r < 0) {
419 if (r == -ENOENT)
420 return 0;
421
422 log_error("Failed to open %s: %s", m->cgroup_path, strerror(-r));
423 return r;
424 }
425
426 while ((r = cg_read_subgroup(d, &name)) > 0) {
427 User *user;
14c3baca
LP
428 int k;
429
430 k = manager_add_user_by_name(m, name, &user);
431 if (k < 0) {
432 free(name);
433 r = k;
434 continue;
435 }
436
437 user_add_to_gc_queue(user);
438
439 if (!user->cgroup_path)
440 if (asprintf(&user->cgroup_path, "%s/%s", m->cgroup_path, name) < 0) {
441 r = -ENOMEM;
442 free(name);
443 break;
444 }
20263082 445
20263082 446 free(name);
14c3baca
LP
447 }
448
449 closedir(d);
450
451 return r;
452}
20263082 453
20263082 454
14c3baca
LP
455static int manager_enumerate_linger_users(Manager *m) {
456 DIR *d;
457 struct dirent *de;
458 int r = 0;
459
460 d = opendir("/var/lib/systemd/linger");
461 if (!d) {
462 if (errno == ENOENT)
463 return 0;
464
465 log_error("Failed to open /var/lib/systemd/linger/: %m");
466 return -errno;
467 }
468
469 while ((de = readdir(d))) {
470 int k;
471
472 if (!dirent_is_file(de))
20263082
LP
473 continue;
474
14c3baca
LP
475 k = manager_add_user_by_name(m, de->d_name, NULL);
476 if (k < 0) {
477 log_notice("Couldn't add lingering user %s: %s", de->d_name, strerror(-k));
478 r = k;
20263082
LP
479 }
480 }
481
14c3baca 482 closedir(d);
20263082
LP
483
484 return r;
485}
486
487int manager_enumerate_users(Manager *m) {
488 DIR *d;
489 struct dirent *de;
14c3baca 490 int r, k;
20263082
LP
491
492 assert(m);
493
14c3baca 494 /* First, enumerate user cgroups */
20263082
LP
495 r = manager_enumerate_users_from_cgroup(m);
496
14c3baca
LP
497 /* Second, add lingering users on top */
498 k = manager_enumerate_linger_users(m);
499 if (k < 0)
500 r = k;
501
502 /* Third, read in user data stored on disk */
20263082
LP
503 d = opendir("/run/systemd/users");
504 if (!d) {
505 if (errno == ENOENT)
506 return 0;
507
508 log_error("Failed to open /run/systemd/users: %m");
509 return -errno;
510 }
511
512 while ((de = readdir(d))) {
513 unsigned long ul;
514 User *u;
20263082
LP
515
516 if (!dirent_is_file(de))
517 continue;
518
519 k = safe_atolu(de->d_name, &ul);
520 if (k < 0) {
521 log_error("Failed to parse file name %s: %s", de->d_name, strerror(-k));
522 continue;
523 }
524
525 u = hashmap_get(m->users, ULONG_TO_PTR(ul));
526 if (!u) {
527 unlinkat(dirfd(d), de->d_name, 0);
528 continue;
529 }
530
531 k = user_load(u);
532 if (k < 0)
533 r = k;
534 }
535
536 closedir(d);
537
538 return r;
539}
540
541static int manager_enumerate_sessions_from_cgroup(Manager *m) {
542 User *u;
543 Iterator i;
544 int r = 0;
545
546 HASHMAP_FOREACH(u, m->users, i) {
547 DIR *d;
548 char *name;
549 int k;
550
14c3baca
LP
551 if (!u->cgroup_path)
552 continue;
553
20263082
LP
554 k = cg_enumerate_subgroups(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, &d);
555 if (k < 0) {
556 if (k == -ENOENT)
557 continue;
558
559 log_error("Failed to open %s: %s", u->cgroup_path, strerror(-k));
560 r = k;
561 continue;
562 }
563
564 while ((k = cg_read_subgroup(d, &name)) > 0) {
565 Session *session;
566
567 k = manager_add_session(m, u, name, &session);
14c3baca
LP
568 if (k < 0) {
569 free(name);
20263082 570 break;
14c3baca 571 }
20263082 572
14c3baca 573 session_add_to_gc_queue(session);
20263082 574
14c3baca
LP
575 if (!session->cgroup_path)
576 if (asprintf(&session->cgroup_path, "%s/%s", u->cgroup_path, name) < 0) {
577 k = -ENOMEM;
578 free(name);
579 break;
580 }
581
582 free(name);
20263082
LP
583 }
584
585 closedir(d);
586
587 if (k < 0)
588 r = k;
589 }
590
591 return r;
592}
593
594int manager_enumerate_sessions(Manager *m) {
595 DIR *d;
596 struct dirent *de;
597 int r = 0;
598
599 assert(m);
600
14c3baca 601 /* First enumerate session cgroups */
20263082
LP
602 r = manager_enumerate_sessions_from_cgroup(m);
603
14c3baca 604 /* Second, read in session data stored on disk */
20263082
LP
605 d = opendir("/run/systemd/sessions");
606 if (!d) {
607 if (errno == ENOENT)
608 return 0;
609
610 log_error("Failed to open /run/systemd/sessions: %m");
611 return -errno;
612 }
613
614 while ((de = readdir(d))) {
615 struct Session *s;
616 int k;
617
618 if (!dirent_is_file(de))
619 continue;
620
621 s = hashmap_get(m->sessions, de->d_name);
622 if (!s) {
623 unlinkat(dirfd(d), de->d_name, 0);
624 continue;
625 }
626
627 k = session_load(s);
628 if (k < 0)
629 r = k;
630 }
631
632 closedir(d);
633
634 return r;
635}
636
30ed21ce 637int manager_dispatch_seat_udev(Manager *m) {
20263082
LP
638 struct udev_device *d;
639 int r;
640
641 assert(m);
642
30ed21ce 643 d = udev_monitor_receive_device(m->udev_seat_monitor);
20263082
LP
644 if (!d)
645 return -ENOMEM;
646
30ed21ce
LP
647 r = manager_process_seat_device(m, d);
648 udev_device_unref(d);
649
650 return r;
651}
652
653
654int manager_dispatch_vcsa_udev(Manager *m) {
655 struct udev_device *d;
656 int r = 0;
657 const char *name;
658
659 assert(m);
660
661 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
662 if (!d)
663 return -ENOMEM;
664
665 name = udev_device_get_sysname(d);
666
667 /* Whenever a VCSA device is removed try to reallocate our
668 * VTs, to make sure our auto VTs never go away. */
669
670 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
671 r = seat_preallocate_vts(m->vtconsole);
672
20263082
LP
673 udev_device_unref(d);
674
675 return r;
676}
677
678int manager_dispatch_console(Manager *m) {
20263082
LP
679 assert(m);
680
20263082 681 if (m->vtconsole)
14c3baca 682 seat_read_active_vt(m->vtconsole);
20263082
LP
683
684 return 0;
685}
686
5eda94dd
LP
687static int vt_is_busy(int vtnr) {
688 struct vt_stat vt_stat;
689 int r = 0, fd;
690
691 assert(vtnr >= 1);
692
d0a522eb
LP
693 /* We explicitly open /dev/tty1 here instead of /dev/tty0. If
694 * we'd open the latter we'd open the foreground tty which
695 * hence would be unconditionally busy. By opening /dev/tty1
696 * we avoid this. Since tty1 is special and needs to be an
697 * explicitly loaded getty or DM this is safe. */
698
699 fd = open_terminal("/dev/tty1", O_RDWR|O_NOCTTY|O_CLOEXEC);
5eda94dd
LP
700 if (fd < 0)
701 return -errno;
702
703 if (ioctl(fd, VT_GETSTATE, &vt_stat) < 0)
704 r = -errno;
705 else
706 r = !!(vt_stat.v_state & (1 << vtnr));
707
708 close_nointr_nofail(fd);
709
710 return r;
711}
712
20263082 713int manager_spawn_autovt(Manager *m, int vtnr) {
5eda94dd 714 int r;
d0a522eb
LP
715 DBusMessage *message = NULL, *reply = NULL;
716 char *name = NULL;
717 const char *mode = "fail";
718 DBusError error;
5eda94dd 719
20263082 720 assert(m);
30ed21ce 721 assert(vtnr >= 1);
20263082 722
d0a522eb
LP
723 dbus_error_init(&error);
724
30ed21ce 725 if ((unsigned) vtnr > m->n_autovts)
975fd867
LP
726 return 0;
727
5eda94dd 728 r = vt_is_busy(vtnr);
975fd867 729 if (r < 0)
5eda94dd 730 return r;
975fd867
LP
731 else if (r > 0)
732 return -EBUSY;
5eda94dd 733
d0a522eb
LP
734 message = dbus_message_new_method_call("org.freedesktop.systemd1", "/org/freedesktop/systemd1", "org.freedesktop.systemd1.Manager", "StartUnit");
735 if (!message) {
736 log_error("Could not allocate message.");
737 r = -ENOMEM;
738 goto finish;
739 }
5eda94dd 740
cd9e5d0a 741 if (asprintf(&name, "autovt@tty%i.service", vtnr) < 0) {
d0a522eb
LP
742 log_error("Could not allocate service name.");
743 r = -ENOMEM;
744 goto finish;
745 }
746
747 if (!dbus_message_append_args(message,
748 DBUS_TYPE_STRING, &name,
749 DBUS_TYPE_STRING, &mode,
750 DBUS_TYPE_INVALID)) {
751 log_error("Could not attach target and flag information to message.");
752 r = -ENOMEM;
753 goto finish;
754 }
755
756 reply = dbus_connection_send_with_reply_and_block(m->bus, message, -1, &error);
757 if (!reply) {
758 log_error("Failed to start unit: %s", bus_error_message(&error));
759 goto finish;
760 }
761
762 r = 0;
763
764finish:
765 free(name);
766
767 if (message)
768 dbus_message_unref(message);
769
770 if (reply)
771 dbus_message_unref(reply);
772
773 dbus_error_free(&error);
774
775 return r;
20263082
LP
776}
777
1713813d
LP
778void manager_cgroup_notify_empty(Manager *m, const char *cgroup) {
779 Session *s;
780 char *p;
781
782 assert(m);
783 assert(cgroup);
784
785 p = strdup(cgroup);
786 if (!p) {
787 log_error("Out of memory.");
788 return;
789 }
790
791 for (;;) {
792 char *e;
20263082 793
1713813d
LP
794 if (isempty(p) || streq(p, "/"))
795 break;
796
797 s = hashmap_get(m->cgroups, p);
798 if (s)
799 session_add_to_gc_queue(s);
800
801 assert_se(e = strrchr(p, '/'));
802 *e = 0;
803 }
804
805 free(p);
20263082
LP
806}
807
31b79c2b
LP
808static void manager_pipe_notify_eof(Manager *m, int fd) {
809 Session *s;
810
811 assert_se(m);
812 assert_se(fd >= 0);
813
932e3ee7
LP
814 assert_se(s = hashmap_get(m->fifo_fds, INT_TO_PTR(fd + 1)));
815 assert(s->fifo_fd == fd);
816 session_remove_fifo(s);
31b79c2b 817
21308c65 818 session_stop(s);
31b79c2b
LP
819}
820
20263082 821static int manager_connect_bus(Manager *m) {
20263082
LP
822 DBusError error;
823 int r;
824 struct epoll_event ev;
825
826 assert(m);
827 assert(!m->bus);
828 assert(m->bus_fd < 0);
829
830 dbus_error_init(&error);
831
832 m->bus = dbus_bus_get_private(DBUS_BUS_SYSTEM, &error);
833 if (!m->bus) {
a2e52832 834 log_error("Failed to get system D-Bus connection: %s", bus_error_message(&error));
20263082
LP
835 r = -ECONNREFUSED;
836 goto fail;
837 }
838
3f49d45a
LP
839 if (!dbus_connection_register_object_path(m->bus, "/org/freedesktop/login1", &bus_manager_vtable, m) ||
840 !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/seat", &bus_seat_vtable, m) ||
841 !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/session", &bus_session_vtable, m) ||
842 !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/user", &bus_user_vtable, m) ||
1713813d 843 !dbus_connection_add_filter(m->bus, bus_message_filter, m, NULL)) {
20263082
LP
844 log_error("Not enough memory");
845 r = -ENOMEM;
846 goto fail;
847 }
848
849 dbus_bus_add_match(m->bus,
850 "type='signal',"
851 "interface='org.freedesktop.systemd1.Agent',"
852 "member='Released',"
853 "path='/org/freedesktop/systemd1/agent'",
854 &error);
855
856 if (dbus_error_is_set(&error)) {
a2e52832 857 log_error("Failed to register match: %s", bus_error_message(&error));
20263082
LP
858 r = -EIO;
859 goto fail;
860 }
861
bafd4449
LP
862 r = dbus_bus_request_name(m->bus, "org.freedesktop.login1", DBUS_NAME_FLAG_DO_NOT_QUEUE, &error);
863 if (dbus_error_is_set(&error)) {
864 log_error("Failed to register name on bus: %s", bus_error_message(&error));
865 r = -EIO;
866 goto fail;
867 }
868
869 if (r != DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER) {
870 log_error("Failed to acquire name.");
20263082
LP
871 r = -EEXIST;
872 goto fail;
873 }
874
875 m->bus_fd = bus_loop_open(m->bus);
876 if (m->bus_fd < 0) {
877 r = m->bus_fd;
878 goto fail;
879 }
880
881 zero(ev);
882 ev.events = EPOLLIN;
883 ev.data.u32 = FD_BUS;
884
885 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->bus_fd, &ev) < 0)
886 goto fail;
887
888 return 0;
889
890fail:
891 dbus_error_free(&error);
892
893 return r;
894}
895
896static int manager_connect_console(Manager *m) {
897 struct epoll_event ev;
898
899 assert(m);
900 assert(m->console_active_fd < 0);
901
902 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
903 if (m->console_active_fd < 0) {
904 log_error("Failed to open /sys/class/tty/tty0/active: %m");
905 return -errno;
906 }
907
908 zero(ev);
14c3baca 909 ev.events = 0;
20263082
LP
910 ev.data.u32 = FD_CONSOLE;
911
912 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->console_active_fd, &ev) < 0)
913 return -errno;
914
915 return 0;
916}
917
918static int manager_connect_udev(Manager *m) {
919 struct epoll_event ev;
14c3baca 920 int r;
20263082
LP
921
922 assert(m);
30ed21ce
LP
923 assert(!m->udev_seat_monitor);
924 assert(!m->udev_vcsa_monitor);
20263082 925
30ed21ce
LP
926 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
927 if (!m->udev_seat_monitor)
20263082
LP
928 return -ENOMEM;
929
30ed21ce 930 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "seat");
14c3baca
LP
931 if (r < 0)
932 return r;
20263082 933
30ed21ce 934 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_seat_monitor, "graphics", NULL);
14c3baca
LP
935 if (r < 0)
936 return r;
20263082 937
30ed21ce 938 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
14c3baca
LP
939 if (r < 0)
940 return r;
20263082 941
30ed21ce 942 m->udev_seat_fd = udev_monitor_get_fd(m->udev_seat_monitor);
20263082
LP
943
944 zero(ev);
945 ev.events = EPOLLIN;
30ed21ce 946 ev.data.u32 = FD_SEAT_UDEV;
20263082 947
30ed21ce
LP
948 if (m->n_autovts <= 0)
949 return 0;
950
951 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_seat_fd, &ev) < 0)
952 return -errno;
953
954 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
955 if (!m->udev_vcsa_monitor)
956 return -ENOMEM;
957
958 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
959 if (r < 0)
960 return r;
961
962 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
963 if (r < 0)
964 return r;
965
966 m->udev_vcsa_fd = udev_monitor_get_fd(m->udev_vcsa_monitor);
967
968 zero(ev);
969 ev.events = EPOLLIN;
970 ev.data.u32 = FD_VCSA_UDEV;
971
972 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_vcsa_fd, &ev) < 0)
20263082
LP
973 return -errno;
974
975 return 0;
976}
977
14c3baca
LP
978void manager_gc(Manager *m) {
979 Seat *seat;
980 Session *session;
981 User *user;
982
983 assert(m);
984
985 while ((seat = m->seat_gc_queue)) {
986 LIST_REMOVE(Seat, gc_queue, m->seat_gc_queue, seat);
987 seat->in_gc_queue = false;
988
989 if (seat_check_gc(seat) == 0) {
990 seat_stop(seat);
991 seat_free(seat);
992 }
993 }
994
995 while ((session = m->session_gc_queue)) {
996 LIST_REMOVE(Session, gc_queue, m->session_gc_queue, session);
997 session->in_gc_queue = false;
998
999 if (session_check_gc(session) == 0) {
1000 session_stop(session);
1001 session_free(session);
1002 }
1003 }
1004
1005 while ((user = m->user_gc_queue)) {
1006 LIST_REMOVE(User, gc_queue, m->user_gc_queue, user);
1007 user->in_gc_queue = false;
1008
1009 if (user_check_gc(user) == 0) {
1010 user_stop(user);
1011 user_free(user);
1012 }
1013 }
1014}
1015
a185c5aa
LP
1016int manager_get_idle_hint(Manager *m, dual_timestamp *t) {
1017 Session *s;
1018 bool idle_hint = true;
1019 dual_timestamp ts = { 0, 0 };
1020 Iterator i;
1021
1022 assert(m);
1023
1024 HASHMAP_FOREACH(s, m->sessions, i) {
1025 dual_timestamp k;
1026 int ih;
1027
1028 ih = session_get_idle_hint(s, &k);
1029 if (ih < 0)
1030 return ih;
1031
1032 if (!ih) {
1033 if (!idle_hint) {
1034 if (k.monotonic < ts.monotonic)
1035 ts = k;
1036 } else {
1037 idle_hint = false;
1038 ts = k;
1039 }
1040 } else if (idle_hint) {
1041
1042 if (k.monotonic > ts.monotonic)
1043 ts = k;
1044 }
1045 }
1046
1047 if (t)
1048 *t = ts;
1049
1050 return idle_hint;
1051}
1052
20263082
LP
1053int manager_startup(Manager *m) {
1054 int r;
14c3baca
LP
1055 Seat *seat;
1056 Session *session;
1057 User *user;
1058 Iterator i;
20263082
LP
1059
1060 assert(m);
1061 assert(m->epoll_fd <= 0);
1062
1063 m->epoll_fd = epoll_create1(EPOLL_CLOEXEC);
1064 if (m->epoll_fd < 0)
1065 return -errno;
1066
1067 /* Connect to udev */
1068 r = manager_connect_udev(m);
1069 if (r < 0)
1070 return r;
1071
1072 /* Connect to console */
1073 r = manager_connect_console(m);
1074 if (r < 0)
1075 return r;
1076
1077 /* Connect to the bus */
1078 r = manager_connect_bus(m);
1079 if (r < 0)
1080 return r;
1081
14c3baca
LP
1082 /* Instantiate magic seat 0 */
1083 r = manager_add_seat(m, "seat0", &m->vtconsole);
1084 if (r < 0)
1085 return r;
1086
20263082
LP
1087 /* Deserialize state */
1088 manager_enumerate_devices(m);
1089 manager_enumerate_seats(m);
1090 manager_enumerate_users(m);
1091 manager_enumerate_sessions(m);
1092
14c3baca
LP
1093 /* And start everything */
1094 HASHMAP_FOREACH(seat, m->seats, i)
1095 seat_start(seat);
1096
1097 HASHMAP_FOREACH(user, m->users, i)
1098 user_start(user);
1099
1100 HASHMAP_FOREACH(session, m->sessions, i)
1101 session_start(session);
20263082
LP
1102
1103 return 0;
1104}
1105
1106int manager_run(Manager *m) {
1107 assert(m);
1108
1109 for (;;) {
1110 struct epoll_event event;
1111 int n;
1112
14c3baca
LP
1113 manager_gc(m);
1114
20263082
LP
1115 if (dbus_connection_dispatch(m->bus) != DBUS_DISPATCH_COMPLETE)
1116 continue;
1117
1713813d
LP
1118 manager_gc(m);
1119
20263082
LP
1120 n = epoll_wait(m->epoll_fd, &event, 1, -1);
1121 if (n < 0) {
3f49d45a
LP
1122 if (errno == EINTR || errno == EAGAIN)
1123 continue;
1124
20263082
LP
1125 log_error("epoll() failed: %m");
1126 return -errno;
1127 }
1128
1129 switch (event.data.u32) {
1130
30ed21ce
LP
1131 case FD_SEAT_UDEV:
1132 manager_dispatch_seat_udev(m);
1133 break;
1134
1135 case FD_VCSA_UDEV:
1136 manager_dispatch_vcsa_udev(m);
20263082
LP
1137 break;
1138
1139 case FD_CONSOLE:
1140 manager_dispatch_console(m);
1141 break;
1142
1143 case FD_BUS:
1144 bus_loop_dispatch(m->bus_fd);
1145 break;
31b79c2b
LP
1146
1147 default:
932e3ee7
LP
1148 if (event.data.u32 >= FD_FIFO_BASE)
1149 manager_pipe_notify_eof(m, event.data.u32 - FD_FIFO_BASE);
20263082
LP
1150 }
1151 }
1152
1153 return 0;
1154}
1155
193197e8
LP
1156static int manager_parse_config_file(Manager *m) {
1157
1158 const ConfigItem items[] = {
1159 { "NAutoVTs", config_parse_unsigned, 0, &m->n_autovts, "Login" },
1160 { "KillUserProcesses", config_parse_bool, 0, &m->kill_user_processes, "Login" },
4fa4c2ac 1161 { "KillOnlyUsers", config_parse_strv, 0, &m->kill_only_users, "Login" },
193197e8
LP
1162 { "KillExcludeUsers", config_parse_strv, 0, &m->kill_exclude_users, "Login" },
1163 { "Controllers", config_parse_strv, 0, &m->controllers, "Login" },
1164 { "ResetControllers", config_parse_strv, 0, &m->reset_controllers, "Login" },
1165 { NULL, NULL, 0, NULL, NULL }
1166 };
1167
1168 static const char * const sections[] = {
1169 "Login",
1170 NULL
1171 };
1172
1173 FILE *f;
1174 const char *fn;
1175 int r;
1176
1177 assert(m);
1178
1179 fn = "/etc/systemd/systemd-logind.conf";
1180 f = fopen(fn, "re");
1181 if (!f) {
1182 if (errno == ENOENT)
1183 return 0;
1184
1185 log_warning("Failed to open configuration file %s: %m", fn);
1186 return -errno;
1187 }
1188
1189 r = config_parse(fn, f, sections, items, false, NULL);
1190 if (r < 0)
1191 log_warning("Failed to parse configuration file: %s", strerror(-r));
1192
1193 fclose(f);
1194
1195 return r;
1196}
1197
20263082
LP
1198int main(int argc, char *argv[]) {
1199 Manager *m = NULL;
5eda94dd 1200 int r;
20263082
LP
1201
1202 log_set_target(LOG_TARGET_AUTO);
1203 log_parse_environment();
1204 log_open();
1205
1206 if (argc != 1) {
1207 log_error("This program takes no arguments.");
1208 r = -EINVAL;
1209 goto finish;
1210 }
1211
1212 umask(0022);
1213
1214 m = manager_new();
1215 if (!m) {
1216 log_error("Out of memory");
1217 r = -ENOMEM;
1218 goto finish;
1219 }
1220
193197e8
LP
1221 manager_parse_config_file(m);
1222
20263082
LP
1223 r = manager_startup(m);
1224 if (r < 0) {
1225 log_error("Failed to fully start up daemon: %s", strerror(-r));
1226 goto finish;
1227 }
1228
1229 r = manager_run(m);
1230
1231finish:
1232 if (m)
1233 manager_free(m);
1234
1235 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1236}