/systemd/src/login/ |
H A D | logind-session-device.h | 35 Session *session; member in struct:SessionDevice
|
H A D | logind-user-dbus.c | 82 Session *session; local 93 LIST_FOREACH(sessions_by_user, session, u->sessions) { 96 p = session_bus_path(session); 100 r = sd_bus_message_append(reply, "(so)", session->id, p);
|
H A D | logind-core.c | 278 int manager_get_session_by_pid(Manager *m, pid_t pid, Session **session) { argument 296 if (session) 297 *session = s;
|
H A D | logind-seat-dbus.c | 120 Session *session; local 131 LIST_FOREACH(sessions_by_seat, session, s->sessions) { 134 p = session_bus_path(session); 138 r = sd_bus_message_append(reply, "(so)", session->id, p); 227 Session *session; local 237 session = hashmap_get(s->manager->sessions, name); 238 if (!session) 239 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_SESSION, "No session '%s' known", name); 241 if (session->seat != s) 244 r = session_activate(session); 337 Session *session; local 419 Session *session; local [all...] |
H A D | logind-seat.c | 236 int seat_set_active(Seat *s, Session *session) { argument 240 assert(!session || session->seat == s); 242 if (session == s->active) 246 s->active = session; 255 if (session && session->started) { 256 session_send_changed(session, "Active", NULL); 257 session_device_resume_all(session); 260 if (!session || sessio 469 Session *session; local 483 seat_evict_position(Seat *s, Session *session) argument 507 seat_claim_position(Seat *s, Session *session, unsigned int pos) argument 522 seat_assign_position(Seat *s, Session *session) argument 535 seat_attach_session(Seat *s, Session *session) argument 558 Session *session; local 610 Session *session; local [all...] |
H A D | logind-session-dbus.c | 28 #include "logind-session-device.h" 29 #include "logind-session.h" 274 return sd_bus_error_setf(error, SD_BUS_ERROR_ACCESS_DENIED, "Only owner of session may set idle hint"); 349 return sd_bus_error_setf(error, SD_BUS_ERROR_ACCESS_DENIED, "Only owner of session may take control"); 365 return sd_bus_error_setf(error, BUS_ERROR_NOT_IN_CONTROL, "You are not in control of this session"); 387 return sd_bus_error_setf(error, BUS_ERROR_NOT_IN_CONTROL, "You are not in control of this session"); 425 return sd_bus_error_setf(error, BUS_ERROR_NOT_IN_CONTROL, "You are not in control of this session"); 451 return sd_bus_error_setf(error, BUS_ERROR_NOT_IN_CONTROL, "You are not in control of this session"); 512 Session *session; local 521 if (streq(path, "/org/freedesktop/login1/session/sel 577 Session *session; local 675 Session *session; local [all...] |
H A D | logind.c | 109 Session *session; local 118 while ((session = hashmap_first(m->sessions))) 119 session_free(session); 405 /* Read in session data stored on disk */ 422 log_warning("Invalid session file name '%s', ignoring.", de->d_name); 429 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name); 603 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m); 605 return log_error_errno(r, "Failed to add session object vtable: %m"); 607 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m); 609 return log_error_errno(r, "Failed to add session enumerato 880 Session *session; local 992 Session *session; local [all...] |
H A D | logind-dbus.c | 55 Session *session; local 72 session = hashmap_get(m->sessions, name); 73 if (!session) 74 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_SESSION, "No session '%s' known", name); 76 *ret = session; 91 /* Note that we get the owner UID of the session, not the actual client UID here! */ 118 Session *session; local 120 r = manager_get_session_from_creds(m, message, NULL, error, &session); 124 seat = session->seat; 272 Session *session; local 295 Session *session = NULL; local 421 Session *session; local 579 Session *session = NULL; local 852 Session *session; local 876 Session *session; local 897 Session *session; local 931 Session *session; local 980 Session *session; local 1020 Session *session; local 1342 Session *session; local 2592 Session *session; local 2652 Session *session; local 2680 Session *session; local 2712 Session *session; local [all...] |
/systemd/src/libsystemd/sd-login/ |
H A D | test-login.c | 38 char *session; local 48 assert_se(sd_pid_get_session(0, &session) == 0); 49 printf("session = %s\n", session); 61 printf("user's display session = %s\n", strna(display_session)); 89 r = sd_session_is_active(session); 93 r = sd_session_is_remote(session); 97 r = sd_session_get_state(session, &state); 102 assert_se(sd_session_get_uid(session, &u) >= 0); 106 assert_se(sd_session_get_type(session, [all...] |
H A D | sd-login.c | 54 * machine, session does not exist → -ENXIO 58 _public_ int sd_pid_get_session(pid_t pid, char **session) { argument 61 assert_return(session, -EINVAL); 63 return cg_pid_get_session(pid, session); 140 _public_ int sd_peer_get_session(int fd, char **session) { argument 145 assert_return(session, -EINVAL); 151 return cg_pid_get_session(ucred.pid, session); 295 _public_ int sd_uid_get_display(uid_t uid, char **session) { argument 299 assert_return(session, -EINVAL); 313 *session 433 file_of_session(const char *session, char **_p) argument 461 sd_session_is_active(const char *session) argument 480 sd_session_is_remote(const char *session) argument 499 sd_session_get_state(const char *session, char **state) argument 523 sd_session_get_uid(const char *session, uid_t *uid) argument 544 session_get_string(const char *session, const char *field, char **value) argument 568 sd_session_get_seat(const char *session, char **seat) argument 572 sd_session_get_tty(const char *session, char **tty) argument 576 sd_session_get_vt(const char *session, unsigned *vtnr) argument 595 sd_session_get_service(const char *session, char **service) argument 599 sd_session_get_type(const char *session, char **type) argument 603 sd_session_get_class(const char *session, char **class) argument 607 sd_session_get_desktop(const char *session, char **desktop) argument 626 sd_session_get_display(const char *session, char **display) argument 630 sd_session_get_remote_user(const char *session, char **remote_user) argument 634 sd_session_get_remote_host(const char *session, char **remote_host) argument 638 sd_seat_get_active(const char *seat, char **session, uid_t *uid) argument [all...] |
/systemd/src/journal-remote/ |
H A D | microhttpd-util.c | 113 { {"1", "audit"}, LOG_WARNING, true}, /* gnutls session audit */ 184 static int verify_cert_authorized(gnutls_session_t session) { argument 190 r = gnutls_certificate_verify_peers2(session, &status); 194 type = gnutls_certificate_type_get(session); 205 static int get_client_cert(gnutls_session_t session, gnutls_x509_crt_t *client_cert) { argument 211 assert(session); 214 pcert = gnutls_certificate_get_peers(session, &listsize); 266 gnutls_session_t session; local 279 log_error("MHD_get_connection_info failed: session is unencrypted"); 284 session [all...] |
/systemd/src/libsystemd/sd-bus/ |
H A D | bus-creds.h | 58 char *session; member in struct:sd_bus_creds
|
H A D | busctl.c | 169 const char *unique, *session, *unit, *cn; local 216 r = sd_bus_creds_get_session(creds, &session); 218 printf(" %-10s", session);
|
/systemd/src/test/ |
H A D | test-cgroup-util.c | 89 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/foobar.service", 0, "foobar.service"); 90 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/waldo.slice/foobar.service", 0, "foobar.service"); 91 check_p_g_u_u("/user.slice/user-1002.slice/session-2.scope/foobar.service/waldo", 0, "foobar.service"); 92 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/foobar.service/waldo/uuuux", 0, "foobar.service"); 93 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/waldo/waldo/uuuux", -ENXIO, NULL); 94 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/foobar@pie.service/pa/po", 0, "foobar@pie.service"); 95 check_p_g_u_u("/session-2.scope/foobar@pie.service/pa/po", 0, "foobar@pie.service"); 96 check_p_g_u_u("/xyz.slice/xyz-waldo.slice/session-77.scope/foobar@pie.service/pa/po", 0, "foobar@pie.service"); 98 check_p_g_u_u("/session-3.scope/_cpu.service", 0, "cpu.service"); 112 check_p_g_s("/user.slice/user-1000.slice/session 188 _cleanup_free_ char *path = NULL, *path_shifted = NULL, *session = NULL, *unit = NULL, *user_unit = NULL, *machine = NULL, *slice = NULL; local [all...] |
/systemd/src/coredump/ |
H A D | coredumpctl.c | 366 *unit = NULL, *user_unit = NULL, *session = NULL, local 387 retrieve(d, l, "COREDUMP_SESSION", &session); 482 if (session) 483 fprintf(file, " Session: %s\n", session);
|
/systemd/src/journal/ |
H A D | journald-server.c | 668 char *session = NULL; local 675 session = strjoina("_SYSTEMD_SESSION=", t); 677 IOVEC_SET_STRING(iovec[n++], session); 691 } else if (unit_id && !session) { 700 } else if (unit_id && session) { 848 * unprivileged session. */
|
/systemd/src/basic/ |
H A D | cgroup-util.c | 1354 * Skip session-*.scope, but require it to be there. 1365 if (n < strlen("session-x.scope")) 1368 if (memcmp(p, "session-", 8) == 0 && memcmp(p + n - 6, ".scope", 6) == 0) { 1374 /* Note that session scopes never need unescaping, 1441 /* Alternatively skip the user session if it is in the path... */ 1500 int cg_path_get_session(const char *path, char **session) { argument 1511 start = startswith(unit, "session-"); 1522 if (session) { 1529 *session = rr; 1535 int cg_pid_get_session(pid_t pid, char **session) { argument [all...] |