]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/login/logind.c
Merge pull request #3777 from poettering/id128-rework
[thirdparty/systemd.git] / src / login / logind.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2011 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <errno.h>
21 #include <fcntl.h>
22 #include <string.h>
23 #include <unistd.h>
24
25 #include "libudev.h"
26 #include "sd-daemon.h"
27
28 #include "alloc-util.h"
29 #include "bus-error.h"
30 #include "bus-util.h"
31 #include "conf-parser.h"
32 #include "def.h"
33 #include "dirent-util.h"
34 #include "fd-util.h"
35 #include "formats-util.h"
36 #include "logind.h"
37 #include "selinux-util.h"
38 #include "signal-util.h"
39 #include "strv.h"
40 #include "udev-util.h"
41
42 static void manager_free(Manager *m);
43
44 static void manager_reset_config(Manager *m) {
45 m->n_autovts = 6;
46 m->reserve_vt = 6;
47 m->remove_ipc = true;
48 m->inhibit_delay_max = 5 * USEC_PER_SEC;
49 m->handle_power_key = HANDLE_POWEROFF;
50 m->handle_suspend_key = HANDLE_SUSPEND;
51 m->handle_hibernate_key = HANDLE_HIBERNATE;
52 m->handle_lid_switch = HANDLE_SUSPEND;
53 m->handle_lid_switch_docked = HANDLE_IGNORE;
54 m->power_key_ignore_inhibited = false;
55 m->suspend_key_ignore_inhibited = false;
56 m->hibernate_key_ignore_inhibited = false;
57 m->lid_switch_ignore_inhibited = true;
58
59 m->holdoff_timeout_usec = 30 * USEC_PER_SEC;
60
61 m->idle_action_usec = 30 * USEC_PER_MINUTE;
62 m->idle_action = HANDLE_IGNORE;
63
64 m->runtime_dir_size = physical_memory_scale(10U, 100U); /* 10% */
65 m->user_tasks_max = system_tasks_max_scale(33U, 100U); /* 33% */
66 m->sessions_max = 8192;
67 m->inhibitors_max = 8192;
68
69 m->kill_user_processes = KILL_USER_PROCESSES;
70
71 m->kill_only_users = strv_free(m->kill_only_users);
72 m->kill_exclude_users = strv_free(m->kill_exclude_users);
73 }
74
75 static Manager *manager_new(void) {
76 Manager *m;
77 int r;
78
79 m = new0(Manager, 1);
80 if (!m)
81 return NULL;
82
83 m->console_active_fd = -1;
84 m->reserve_vt_fd = -1;
85
86 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
87
88 m->devices = hashmap_new(&string_hash_ops);
89 m->seats = hashmap_new(&string_hash_ops);
90 m->sessions = hashmap_new(&string_hash_ops);
91 m->users = hashmap_new(NULL);
92 m->inhibitors = hashmap_new(&string_hash_ops);
93 m->buttons = hashmap_new(&string_hash_ops);
94
95 m->user_units = hashmap_new(&string_hash_ops);
96 m->session_units = hashmap_new(&string_hash_ops);
97
98 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->user_units || !m->session_units)
99 goto fail;
100
101 m->udev = udev_new();
102 if (!m->udev)
103 goto fail;
104
105 r = sd_event_default(&m->event);
106 if (r < 0)
107 goto fail;
108
109 sd_event_set_watchdog(m->event, true);
110
111 manager_reset_config(m);
112
113 return m;
114
115 fail:
116 manager_free(m);
117 return NULL;
118 }
119
120 static void manager_free(Manager *m) {
121 Session *session;
122 User *u;
123 Device *d;
124 Seat *s;
125 Inhibitor *i;
126 Button *b;
127
128 assert(m);
129
130 while ((session = hashmap_first(m->sessions)))
131 session_free(session);
132
133 while ((u = hashmap_first(m->users)))
134 user_free(u);
135
136 while ((d = hashmap_first(m->devices)))
137 device_free(d);
138
139 while ((s = hashmap_first(m->seats)))
140 seat_free(s);
141
142 while ((i = hashmap_first(m->inhibitors)))
143 inhibitor_free(i);
144
145 while ((b = hashmap_first(m->buttons)))
146 button_free(b);
147
148 hashmap_free(m->devices);
149 hashmap_free(m->seats);
150 hashmap_free(m->sessions);
151 hashmap_free(m->users);
152 hashmap_free(m->inhibitors);
153 hashmap_free(m->buttons);
154
155 hashmap_free(m->user_units);
156 hashmap_free(m->session_units);
157
158 sd_event_source_unref(m->idle_action_event_source);
159 sd_event_source_unref(m->inhibit_timeout_source);
160 sd_event_source_unref(m->scheduled_shutdown_timeout_source);
161 sd_event_source_unref(m->nologin_timeout_source);
162 sd_event_source_unref(m->wall_message_timeout_source);
163
164 sd_event_source_unref(m->console_active_event_source);
165 sd_event_source_unref(m->udev_seat_event_source);
166 sd_event_source_unref(m->udev_device_event_source);
167 sd_event_source_unref(m->udev_vcsa_event_source);
168 sd_event_source_unref(m->udev_button_event_source);
169 sd_event_source_unref(m->lid_switch_ignore_event_source);
170
171 safe_close(m->console_active_fd);
172
173 udev_monitor_unref(m->udev_seat_monitor);
174 udev_monitor_unref(m->udev_device_monitor);
175 udev_monitor_unref(m->udev_vcsa_monitor);
176 udev_monitor_unref(m->udev_button_monitor);
177
178 udev_unref(m->udev);
179
180 if (m->unlink_nologin)
181 (void) unlink("/run/nologin");
182
183 bus_verify_polkit_async_registry_free(m->polkit_registry);
184
185 sd_bus_unref(m->bus);
186 sd_event_unref(m->event);
187
188 safe_close(m->reserve_vt_fd);
189
190 strv_free(m->kill_only_users);
191 strv_free(m->kill_exclude_users);
192
193 free(m->scheduled_shutdown_type);
194 free(m->scheduled_shutdown_tty);
195 free(m->wall_message);
196 free(m->action_job);
197 free(m);
198 }
199
200 static int manager_enumerate_devices(Manager *m) {
201 struct udev_list_entry *item = NULL, *first = NULL;
202 _cleanup_udev_enumerate_unref_ struct udev_enumerate *e = NULL;
203 int r;
204
205 assert(m);
206
207 /* Loads devices from udev and creates seats for them as
208 * necessary */
209
210 e = udev_enumerate_new(m->udev);
211 if (!e)
212 return -ENOMEM;
213
214 r = udev_enumerate_add_match_tag(e, "master-of-seat");
215 if (r < 0)
216 return r;
217
218 r = udev_enumerate_add_match_is_initialized(e);
219 if (r < 0)
220 return r;
221
222 r = udev_enumerate_scan_devices(e);
223 if (r < 0)
224 return r;
225
226 first = udev_enumerate_get_list_entry(e);
227 udev_list_entry_foreach(item, first) {
228 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
229 int k;
230
231 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
232 if (!d)
233 return -ENOMEM;
234
235 k = manager_process_seat_device(m, d);
236 if (k < 0)
237 r = k;
238 }
239
240 return r;
241 }
242
243 static int manager_enumerate_buttons(Manager *m) {
244 _cleanup_udev_enumerate_unref_ struct udev_enumerate *e = NULL;
245 struct udev_list_entry *item = NULL, *first = NULL;
246 int r;
247
248 assert(m);
249
250 /* Loads buttons from udev */
251
252 if (m->handle_power_key == HANDLE_IGNORE &&
253 m->handle_suspend_key == HANDLE_IGNORE &&
254 m->handle_hibernate_key == HANDLE_IGNORE &&
255 m->handle_lid_switch == HANDLE_IGNORE &&
256 m->handle_lid_switch_docked == HANDLE_IGNORE)
257 return 0;
258
259 e = udev_enumerate_new(m->udev);
260 if (!e)
261 return -ENOMEM;
262
263 r = udev_enumerate_add_match_subsystem(e, "input");
264 if (r < 0)
265 return r;
266
267 r = udev_enumerate_add_match_tag(e, "power-switch");
268 if (r < 0)
269 return r;
270
271 r = udev_enumerate_add_match_is_initialized(e);
272 if (r < 0)
273 return r;
274
275 r = udev_enumerate_scan_devices(e);
276 if (r < 0)
277 return r;
278
279 first = udev_enumerate_get_list_entry(e);
280 udev_list_entry_foreach(item, first) {
281 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
282 int k;
283
284 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
285 if (!d)
286 return -ENOMEM;
287
288 k = manager_process_button_device(m, d);
289 if (k < 0)
290 r = k;
291 }
292
293 return r;
294 }
295
296 static int manager_enumerate_seats(Manager *m) {
297 _cleanup_closedir_ DIR *d = NULL;
298 struct dirent *de;
299 int r = 0;
300
301 assert(m);
302
303 /* This loads data about seats stored on disk, but does not
304 * actually create any seats. Removes data of seats that no
305 * longer exist. */
306
307 d = opendir("/run/systemd/seats");
308 if (!d) {
309 if (errno == ENOENT)
310 return 0;
311
312 return log_error_errno(errno, "Failed to open /run/systemd/seats: %m");
313 }
314
315 FOREACH_DIRENT(de, d, return -errno) {
316 Seat *s;
317 int k;
318
319 if (!dirent_is_file(de))
320 continue;
321
322 s = hashmap_get(m->seats, de->d_name);
323 if (!s) {
324 unlinkat(dirfd(d), de->d_name, 0);
325 continue;
326 }
327
328 k = seat_load(s);
329 if (k < 0)
330 r = k;
331 }
332
333 return r;
334 }
335
336 static int manager_enumerate_linger_users(Manager *m) {
337 _cleanup_closedir_ DIR *d = NULL;
338 struct dirent *de;
339 int r = 0;
340
341 assert(m);
342
343 d = opendir("/var/lib/systemd/linger");
344 if (!d) {
345 if (errno == ENOENT)
346 return 0;
347
348 return log_error_errno(errno, "Failed to open /var/lib/systemd/linger/: %m");
349 }
350
351 FOREACH_DIRENT(de, d, return -errno) {
352 int k;
353
354 if (!dirent_is_file(de))
355 continue;
356
357 k = manager_add_user_by_name(m, de->d_name, NULL);
358 if (k < 0) {
359 log_notice_errno(k, "Couldn't add lingering user %s: %m", de->d_name);
360 r = k;
361 }
362 }
363
364 return r;
365 }
366
367 static int manager_enumerate_users(Manager *m) {
368 _cleanup_closedir_ DIR *d = NULL;
369 struct dirent *de;
370 int r, k;
371
372 assert(m);
373
374 /* Add lingering users */
375 r = manager_enumerate_linger_users(m);
376
377 /* Read in user data stored on disk */
378 d = opendir("/run/systemd/users");
379 if (!d) {
380 if (errno == ENOENT)
381 return 0;
382
383 return log_error_errno(errno, "Failed to open /run/systemd/users: %m");
384 }
385
386 FOREACH_DIRENT(de, d, return -errno) {
387 User *u;
388
389 if (!dirent_is_file(de))
390 continue;
391
392 k = manager_add_user_by_name(m, de->d_name, &u);
393 if (k < 0) {
394 log_error_errno(k, "Failed to add user by file name %s: %m", de->d_name);
395
396 r = k;
397 continue;
398 }
399
400 user_add_to_gc_queue(u);
401
402 k = user_load(u);
403 if (k < 0)
404 r = k;
405 }
406
407 return r;
408 }
409
410 static int manager_enumerate_sessions(Manager *m) {
411 _cleanup_closedir_ DIR *d = NULL;
412 struct dirent *de;
413 int r = 0;
414
415 assert(m);
416
417 /* Read in session data stored on disk */
418 d = opendir("/run/systemd/sessions");
419 if (!d) {
420 if (errno == ENOENT)
421 return 0;
422
423 return log_error_errno(errno, "Failed to open /run/systemd/sessions: %m");
424 }
425
426 FOREACH_DIRENT(de, d, return -errno) {
427 struct Session *s;
428 int k;
429
430 if (!dirent_is_file(de))
431 continue;
432
433 if (!session_id_valid(de->d_name)) {
434 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
435 r = -EINVAL;
436 continue;
437 }
438
439 k = manager_add_session(m, de->d_name, &s);
440 if (k < 0) {
441 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name);
442
443 r = k;
444 continue;
445 }
446
447 session_add_to_gc_queue(s);
448
449 k = session_load(s);
450 if (k < 0)
451 r = k;
452 }
453
454 return r;
455 }
456
457 static int manager_enumerate_inhibitors(Manager *m) {
458 _cleanup_closedir_ DIR *d = NULL;
459 struct dirent *de;
460 int r = 0;
461
462 assert(m);
463
464 d = opendir("/run/systemd/inhibit");
465 if (!d) {
466 if (errno == ENOENT)
467 return 0;
468
469 return log_error_errno(errno, "Failed to open /run/systemd/inhibit: %m");
470 }
471
472 FOREACH_DIRENT(de, d, return -errno) {
473 int k;
474 Inhibitor *i;
475
476 if (!dirent_is_file(de))
477 continue;
478
479 k = manager_add_inhibitor(m, de->d_name, &i);
480 if (k < 0) {
481 log_notice_errno(k, "Couldn't add inhibitor %s: %m", de->d_name);
482 r = k;
483 continue;
484 }
485
486 k = inhibitor_load(i);
487 if (k < 0)
488 r = k;
489 }
490
491 return r;
492 }
493
494 static int manager_dispatch_seat_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
495 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
496 Manager *m = userdata;
497
498 assert(m);
499
500 d = udev_monitor_receive_device(m->udev_seat_monitor);
501 if (!d)
502 return -ENOMEM;
503
504 manager_process_seat_device(m, d);
505 return 0;
506 }
507
508 static int manager_dispatch_device_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
509 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
510 Manager *m = userdata;
511
512 assert(m);
513
514 d = udev_monitor_receive_device(m->udev_device_monitor);
515 if (!d)
516 return -ENOMEM;
517
518 manager_process_seat_device(m, d);
519 return 0;
520 }
521
522 static int manager_dispatch_vcsa_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
523 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
524 Manager *m = userdata;
525 const char *name;
526
527 assert(m);
528
529 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
530 if (!d)
531 return -ENOMEM;
532
533 name = udev_device_get_sysname(d);
534
535 /* Whenever a VCSA device is removed try to reallocate our
536 * VTs, to make sure our auto VTs never go away. */
537
538 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
539 seat_preallocate_vts(m->seat0);
540
541 return 0;
542 }
543
544 static int manager_dispatch_button_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
545 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
546 Manager *m = userdata;
547
548 assert(m);
549
550 d = udev_monitor_receive_device(m->udev_button_monitor);
551 if (!d)
552 return -ENOMEM;
553
554 manager_process_button_device(m, d);
555 return 0;
556 }
557
558 static int manager_dispatch_console(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
559 Manager *m = userdata;
560
561 assert(m);
562 assert(m->seat0);
563 assert(m->console_active_fd == fd);
564
565 seat_read_active_vt(m->seat0);
566 return 0;
567 }
568
569 static int manager_reserve_vt(Manager *m) {
570 _cleanup_free_ char *p = NULL;
571
572 assert(m);
573
574 if (m->reserve_vt <= 0)
575 return 0;
576
577 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
578 return log_oom();
579
580 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
581 if (m->reserve_vt_fd < 0) {
582
583 /* Don't complain on VT-less systems */
584 if (errno != ENOENT)
585 log_warning_errno(errno, "Failed to pin reserved VT: %m");
586 return -errno;
587 }
588
589 return 0;
590 }
591
592 static int manager_connect_bus(Manager *m) {
593 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
594 int r;
595
596 assert(m);
597 assert(!m->bus);
598
599 r = sd_bus_default_system(&m->bus);
600 if (r < 0)
601 return log_error_errno(r, "Failed to connect to system bus: %m");
602
603 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable, m);
604 if (r < 0)
605 return log_error_errno(r, "Failed to add manager object vtable: %m");
606
607 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable, seat_object_find, m);
608 if (r < 0)
609 return log_error_errno(r, "Failed to add seat object vtable: %m");
610
611 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/seat", seat_node_enumerator, m);
612 if (r < 0)
613 return log_error_errno(r, "Failed to add seat enumerator: %m");
614
615 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m);
616 if (r < 0)
617 return log_error_errno(r, "Failed to add session object vtable: %m");
618
619 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m);
620 if (r < 0)
621 return log_error_errno(r, "Failed to add session enumerator: %m");
622
623 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable, user_object_find, m);
624 if (r < 0)
625 return log_error_errno(r, "Failed to add user object vtable: %m");
626
627 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/user", user_node_enumerator, m);
628 if (r < 0)
629 return log_error_errno(r, "Failed to add user enumerator: %m");
630
631 r = sd_bus_add_match(m->bus,
632 NULL,
633 "type='signal',"
634 "sender='org.freedesktop.systemd1',"
635 "interface='org.freedesktop.systemd1.Manager',"
636 "member='JobRemoved',"
637 "path='/org/freedesktop/systemd1'",
638 match_job_removed, m);
639 if (r < 0)
640 return log_error_errno(r, "Failed to add match for JobRemoved: %m");
641
642 r = sd_bus_add_match(m->bus,
643 NULL,
644 "type='signal',"
645 "sender='org.freedesktop.systemd1',"
646 "interface='org.freedesktop.systemd1.Manager',"
647 "member='UnitRemoved',"
648 "path='/org/freedesktop/systemd1'",
649 match_unit_removed, m);
650 if (r < 0)
651 return log_error_errno(r, "Failed to add match for UnitRemoved: %m");
652
653 r = sd_bus_add_match(m->bus,
654 NULL,
655 "type='signal',"
656 "sender='org.freedesktop.systemd1',"
657 "interface='org.freedesktop.DBus.Properties',"
658 "member='PropertiesChanged'",
659 match_properties_changed, m);
660 if (r < 0)
661 return log_error_errno(r, "Failed to add match for PropertiesChanged: %m");
662
663 r = sd_bus_add_match(m->bus,
664 NULL,
665 "type='signal',"
666 "sender='org.freedesktop.systemd1',"
667 "interface='org.freedesktop.systemd1.Manager',"
668 "member='Reloading',"
669 "path='/org/freedesktop/systemd1'",
670 match_reloading, m);
671 if (r < 0)
672 return log_error_errno(r, "Failed to add match for Reloading: %m");
673
674 r = sd_bus_call_method(
675 m->bus,
676 "org.freedesktop.systemd1",
677 "/org/freedesktop/systemd1",
678 "org.freedesktop.systemd1.Manager",
679 "Subscribe",
680 &error,
681 NULL, NULL);
682 if (r < 0) {
683 log_error("Failed to enable subscription: %s", bus_error_message(&error, r));
684 return r;
685 }
686
687 r = sd_bus_request_name(m->bus, "org.freedesktop.login1", 0);
688 if (r < 0)
689 return log_error_errno(r, "Failed to register name: %m");
690
691 r = sd_bus_attach_event(m->bus, m->event, SD_EVENT_PRIORITY_NORMAL);
692 if (r < 0)
693 return log_error_errno(r, "Failed to attach bus to event loop: %m");
694
695 return 0;
696 }
697
698 static int manager_vt_switch(sd_event_source *src, const struct signalfd_siginfo *si, void *data) {
699 Manager *m = data;
700 Session *active, *iter;
701
702 /*
703 * We got a VT-switch signal and we have to acknowledge it immediately.
704 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
705 * old user-space might run multiple sessions on a single VT, *sigh*.
706 * Therefore, we have to iterate all sessions and find one with a vtfd
707 * on the requested VT.
708 * As only VTs with active controllers have VT_PROCESS set, our current
709 * notion of the active VT might be wrong (for instance if the switch
710 * happens while we setup VT_PROCESS). Therefore, read the current VT
711 * first and then use s->active->vtnr as reference. Note that this is
712 * not racy, as no further VT-switch can happen as long as we're in
713 * synchronous VT_PROCESS mode.
714 */
715
716 assert(m->seat0);
717 seat_read_active_vt(m->seat0);
718
719 active = m->seat0->active;
720 if (!active || active->vtnr < 1) {
721 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
722 return 0;
723 }
724
725 if (active->vtfd >= 0) {
726 session_leave_vt(active);
727 } else {
728 LIST_FOREACH(sessions_by_seat, iter, m->seat0->sessions) {
729 if (iter->vtnr == active->vtnr && iter->vtfd >= 0) {
730 session_leave_vt(iter);
731 break;
732 }
733 }
734 }
735
736 return 0;
737 }
738
739 static int manager_connect_console(Manager *m) {
740 int r;
741
742 assert(m);
743 assert(m->console_active_fd < 0);
744
745 /* On certain architectures (S390 and Xen, and containers),
746 /dev/tty0 does not exist, so don't fail if we can't open
747 it. */
748 if (access("/dev/tty0", F_OK) < 0)
749 return 0;
750
751 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
752 if (m->console_active_fd < 0) {
753
754 /* On some systems the device node /dev/tty0 may exist
755 * even though /sys/class/tty/tty0 does not. */
756 if (errno == ENOENT)
757 return 0;
758
759 return log_error_errno(errno, "Failed to open /sys/class/tty/tty0/active: %m");
760 }
761
762 r = sd_event_add_io(m->event, &m->console_active_event_source, m->console_active_fd, 0, manager_dispatch_console, m);
763 if (r < 0) {
764 log_error("Failed to watch foreground console");
765 return r;
766 }
767
768 /*
769 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
770 * as VT-acquire signal. We ignore any acquire-events (yes, we still
771 * have to provide a valid signal-number for it!) and acknowledge all
772 * release events immediately.
773 */
774
775 if (SIGRTMIN + 1 > SIGRTMAX) {
776 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN, SIGRTMAX);
777 return -EINVAL;
778 }
779
780 assert_se(ignore_signals(SIGRTMIN + 1, -1) >= 0);
781 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGRTMIN, -1) >= 0);
782
783 r = sd_event_add_signal(m->event, NULL, SIGRTMIN, manager_vt_switch, m);
784 if (r < 0)
785 return r;
786
787 return 0;
788 }
789
790 static int manager_connect_udev(Manager *m) {
791 int r;
792
793 assert(m);
794 assert(!m->udev_seat_monitor);
795 assert(!m->udev_device_monitor);
796 assert(!m->udev_vcsa_monitor);
797 assert(!m->udev_button_monitor);
798
799 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
800 if (!m->udev_seat_monitor)
801 return -ENOMEM;
802
803 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
804 if (r < 0)
805 return r;
806
807 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
808 if (r < 0)
809 return r;
810
811 r = sd_event_add_io(m->event, &m->udev_seat_event_source, udev_monitor_get_fd(m->udev_seat_monitor), EPOLLIN, manager_dispatch_seat_udev, m);
812 if (r < 0)
813 return r;
814
815 m->udev_device_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
816 if (!m->udev_device_monitor)
817 return -ENOMEM;
818
819 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
820 if (r < 0)
821 return r;
822
823 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
824 if (r < 0)
825 return r;
826
827 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
828 if (r < 0)
829 return r;
830
831 r = udev_monitor_enable_receiving(m->udev_device_monitor);
832 if (r < 0)
833 return r;
834
835 r = sd_event_add_io(m->event, &m->udev_device_event_source, udev_monitor_get_fd(m->udev_device_monitor), EPOLLIN, manager_dispatch_device_udev, m);
836 if (r < 0)
837 return r;
838
839 /* Don't watch keys if nobody cares */
840 if (m->handle_power_key != HANDLE_IGNORE ||
841 m->handle_suspend_key != HANDLE_IGNORE ||
842 m->handle_hibernate_key != HANDLE_IGNORE ||
843 m->handle_lid_switch != HANDLE_IGNORE ||
844 m->handle_lid_switch_docked != HANDLE_IGNORE) {
845
846 m->udev_button_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
847 if (!m->udev_button_monitor)
848 return -ENOMEM;
849
850 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
851 if (r < 0)
852 return r;
853
854 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
855 if (r < 0)
856 return r;
857
858 r = udev_monitor_enable_receiving(m->udev_button_monitor);
859 if (r < 0)
860 return r;
861
862 r = sd_event_add_io(m->event, &m->udev_button_event_source, udev_monitor_get_fd(m->udev_button_monitor), EPOLLIN, manager_dispatch_button_udev, m);
863 if (r < 0)
864 return r;
865 }
866
867 /* Don't bother watching VCSA devices, if nobody cares */
868 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
869
870 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
871 if (!m->udev_vcsa_monitor)
872 return -ENOMEM;
873
874 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
875 if (r < 0)
876 return r;
877
878 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
879 if (r < 0)
880 return r;
881
882 r = sd_event_add_io(m->event, &m->udev_vcsa_event_source, udev_monitor_get_fd(m->udev_vcsa_monitor), EPOLLIN, manager_dispatch_vcsa_udev, m);
883 if (r < 0)
884 return r;
885 }
886
887 return 0;
888 }
889
890 static void manager_gc(Manager *m, bool drop_not_started) {
891 Seat *seat;
892 Session *session;
893 User *user;
894
895 assert(m);
896
897 while ((seat = m->seat_gc_queue)) {
898 LIST_REMOVE(gc_queue, m->seat_gc_queue, seat);
899 seat->in_gc_queue = false;
900
901 if (!seat_check_gc(seat, drop_not_started)) {
902 seat_stop(seat, false);
903 seat_free(seat);
904 }
905 }
906
907 while ((session = m->session_gc_queue)) {
908 LIST_REMOVE(gc_queue, m->session_gc_queue, session);
909 session->in_gc_queue = false;
910
911 /* First, if we are not closing yet, initiate stopping */
912 if (!session_check_gc(session, drop_not_started) &&
913 session_get_state(session) != SESSION_CLOSING)
914 session_stop(session, false);
915
916 /* Normally, this should make the session referenced
917 * again, if it doesn't then let's get rid of it
918 * immediately */
919 if (!session_check_gc(session, drop_not_started)) {
920 session_finalize(session);
921 session_free(session);
922 }
923 }
924
925 while ((user = m->user_gc_queue)) {
926 LIST_REMOVE(gc_queue, m->user_gc_queue, user);
927 user->in_gc_queue = false;
928
929 /* First step: queue stop jobs */
930 if (!user_check_gc(user, drop_not_started))
931 user_stop(user, false);
932
933 /* Second step: finalize user */
934 if (!user_check_gc(user, drop_not_started)) {
935 user_finalize(user);
936 user_free(user);
937 }
938 }
939 }
940
941 static int manager_dispatch_idle_action(sd_event_source *s, uint64_t t, void *userdata) {
942 Manager *m = userdata;
943 struct dual_timestamp since;
944 usec_t n, elapse;
945 int r;
946
947 assert(m);
948
949 if (m->idle_action == HANDLE_IGNORE ||
950 m->idle_action_usec <= 0)
951 return 0;
952
953 n = now(CLOCK_MONOTONIC);
954
955 r = manager_get_idle_hint(m, &since);
956 if (r <= 0)
957 /* Not idle. Let's check if after a timeout it might be idle then. */
958 elapse = n + m->idle_action_usec;
959 else {
960 /* Idle! Let's see if it's time to do something, or if
961 * we shall sleep for longer. */
962
963 if (n >= since.monotonic + m->idle_action_usec &&
964 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
965 log_info("System idle. Taking action.");
966
967 manager_handle_action(m, 0, m->idle_action, false, false);
968 m->idle_action_not_before_usec = n;
969 }
970
971 elapse = MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec;
972 }
973
974 if (!m->idle_action_event_source) {
975
976 r = sd_event_add_time(
977 m->event,
978 &m->idle_action_event_source,
979 CLOCK_MONOTONIC,
980 elapse, USEC_PER_SEC*30,
981 manager_dispatch_idle_action, m);
982 if (r < 0)
983 return log_error_errno(r, "Failed to add idle event source: %m");
984
985 r = sd_event_source_set_priority(m->idle_action_event_source, SD_EVENT_PRIORITY_IDLE+10);
986 if (r < 0)
987 return log_error_errno(r, "Failed to set idle event source priority: %m");
988 } else {
989 r = sd_event_source_set_time(m->idle_action_event_source, elapse);
990 if (r < 0)
991 return log_error_errno(r, "Failed to set idle event timer: %m");
992
993 r = sd_event_source_set_enabled(m->idle_action_event_source, SD_EVENT_ONESHOT);
994 if (r < 0)
995 return log_error_errno(r, "Failed to enable idle event timer: %m");
996 }
997
998 return 0;
999 }
1000
1001 static int manager_parse_config_file(Manager *m) {
1002 assert(m);
1003
1004 return config_parse_many(PKGSYSCONFDIR "/logind.conf",
1005 CONF_PATHS_NULSTR("systemd/logind.conf.d"),
1006 "Login\0",
1007 config_item_perf_lookup, logind_gperf_lookup,
1008 false, m);
1009 }
1010
1011 static int manager_dispatch_reload_signal(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1012 Manager *m = userdata;
1013 int r;
1014
1015 manager_reset_config(m);
1016 r = manager_parse_config_file(m);
1017 if (r < 0)
1018 log_warning_errno(r, "Failed to parse config file, using defaults: %m");
1019 else
1020 log_info("Config file reloaded.");
1021
1022 return 0;
1023 }
1024
1025 static int manager_startup(Manager *m) {
1026 int r;
1027 Seat *seat;
1028 Session *session;
1029 User *user;
1030 Button *button;
1031 Inhibitor *inhibitor;
1032 Iterator i;
1033
1034 assert(m);
1035
1036 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGHUP, -1) >= 0);
1037
1038 r = sd_event_add_signal(m->event, NULL, SIGHUP, manager_dispatch_reload_signal, m);
1039 if (r < 0)
1040 return log_error_errno(r, "Failed to register SIGHUP handler: %m");
1041
1042 /* Connect to console */
1043 r = manager_connect_console(m);
1044 if (r < 0)
1045 return r;
1046
1047 /* Connect to udev */
1048 r = manager_connect_udev(m);
1049 if (r < 0)
1050 return log_error_errno(r, "Failed to create udev watchers: %m");
1051
1052 /* Connect to the bus */
1053 r = manager_connect_bus(m);
1054 if (r < 0)
1055 return r;
1056
1057 /* Instantiate magic seat 0 */
1058 r = manager_add_seat(m, "seat0", &m->seat0);
1059 if (r < 0)
1060 return log_error_errno(r, "Failed to add seat0: %m");
1061
1062 r = manager_set_lid_switch_ignore(m, 0 + m->holdoff_timeout_usec);
1063 if (r < 0)
1064 log_warning_errno(r, "Failed to set up lid switch ignore event source: %m");
1065
1066 /* Deserialize state */
1067 r = manager_enumerate_devices(m);
1068 if (r < 0)
1069 log_warning_errno(r, "Device enumeration failed: %m");
1070
1071 r = manager_enumerate_seats(m);
1072 if (r < 0)
1073 log_warning_errno(r, "Seat enumeration failed: %m");
1074
1075 r = manager_enumerate_users(m);
1076 if (r < 0)
1077 log_warning_errno(r, "User enumeration failed: %m");
1078
1079 r = manager_enumerate_sessions(m);
1080 if (r < 0)
1081 log_warning_errno(r, "Session enumeration failed: %m");
1082
1083 r = manager_enumerate_inhibitors(m);
1084 if (r < 0)
1085 log_warning_errno(r, "Inhibitor enumeration failed: %m");
1086
1087 r = manager_enumerate_buttons(m);
1088 if (r < 0)
1089 log_warning_errno(r, "Button enumeration failed: %m");
1090
1091 /* Remove stale objects before we start them */
1092 manager_gc(m, false);
1093
1094 /* Reserve the special reserved VT */
1095 manager_reserve_vt(m);
1096
1097 /* And start everything */
1098 HASHMAP_FOREACH(seat, m->seats, i)
1099 seat_start(seat);
1100
1101 HASHMAP_FOREACH(user, m->users, i)
1102 user_start(user);
1103
1104 HASHMAP_FOREACH(session, m->sessions, i)
1105 session_start(session);
1106
1107 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1108 inhibitor_start(inhibitor);
1109
1110 HASHMAP_FOREACH(button, m->buttons, i)
1111 button_check_switches(button);
1112
1113 manager_dispatch_idle_action(NULL, 0, m);
1114
1115 return 0;
1116 }
1117
1118 static int manager_run(Manager *m) {
1119 int r;
1120
1121 assert(m);
1122
1123 for (;;) {
1124 r = sd_event_get_state(m->event);
1125 if (r < 0)
1126 return r;
1127 if (r == SD_EVENT_FINISHED)
1128 return 0;
1129
1130 manager_gc(m, true);
1131
1132 r = manager_dispatch_delayed(m, false);
1133 if (r < 0)
1134 return r;
1135 if (r > 0)
1136 continue;
1137
1138 r = sd_event_run(m->event, (uint64_t) -1);
1139 if (r < 0)
1140 return r;
1141 }
1142 }
1143
1144 int main(int argc, char *argv[]) {
1145 Manager *m = NULL;
1146 int r;
1147
1148 log_set_target(LOG_TARGET_AUTO);
1149 log_set_facility(LOG_AUTH);
1150 log_parse_environment();
1151 log_open();
1152
1153 umask(0022);
1154
1155 if (argc != 1) {
1156 log_error("This program takes no arguments.");
1157 r = -EINVAL;
1158 goto finish;
1159 }
1160
1161 r = mac_selinux_init();
1162 if (r < 0) {
1163 log_error_errno(r, "Could not initialize labelling: %m");
1164 goto finish;
1165 }
1166
1167 /* Always create the directories people can create inotify
1168 * watches in. Note that some applications might check for the
1169 * existence of /run/systemd/seats/ to determine whether
1170 * logind is available, so please always make sure this check
1171 * stays in. */
1172 mkdir_label("/run/systemd/seats", 0755);
1173 mkdir_label("/run/systemd/users", 0755);
1174 mkdir_label("/run/systemd/sessions", 0755);
1175
1176 m = manager_new();
1177 if (!m) {
1178 r = log_oom();
1179 goto finish;
1180 }
1181
1182 manager_parse_config_file(m);
1183
1184 r = manager_startup(m);
1185 if (r < 0) {
1186 log_error_errno(r, "Failed to fully start up daemon: %m");
1187 goto finish;
1188 }
1189
1190 log_debug("systemd-logind running as pid "PID_FMT, getpid());
1191
1192 sd_notify(false,
1193 "READY=1\n"
1194 "STATUS=Processing requests...");
1195
1196 r = manager_run(m);
1197
1198 log_debug("systemd-logind stopped as pid "PID_FMT, getpid());
1199
1200 finish:
1201 sd_notify(false,
1202 "STOPPING=1\n"
1203 "STATUS=Shutting down...");
1204
1205 manager_free(m);
1206
1207 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1208 }