logind-user.c revision 5cb14b3742038b28551b161635a0cba3559404b2
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd.
Copyright 2011 Lennart Poettering
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see <http://www.gnu.org/licenses/>.
***/
#include <string.h>
#include <unistd.h>
#include <errno.h>
#include "util.h"
#include "mkdir.h"
#include "rm-rf.h"
#include "hashmap.h"
#include "fileio.h"
#include "path-util.h"
#include "special.h"
#include "unit-name.h"
#include "bus-util.h"
#include "bus-error.h"
#include "conf-parser.h"
#include "clean-ipc.h"
#include "logind-user.h"
#include "smack-util.h"
#include "formats-util.h"
User *u;
assert(m);
if (!u)
return NULL;
if (!u->name)
goto fail;
goto fail;
goto fail;
u->manager = m;
return u;
fail:
free(u->state_file);
free(u);
return NULL;
}
assert(u);
if (u->in_gc_queue)
while (u->sessions)
session_free(u->sessions);
if (u->slice) {
}
if (u->service) {
}
free(u->service_job);
free(u->runtime_path);
free(u->state_file);
free(u);
}
int r;
assert(u);
assert(u->state_file);
if (!u->started)
return 0;
if (r < 0)
goto finish;
if (r < 0)
goto finish;
fprintf(f,
"# This is private data. Do not parse.\n"
"NAME=%s\n"
"STATE=%s\n",
u->name,
if (u->runtime_path)
if (u->service)
if (u->service_job)
if (u->slice)
if (u->slice_job)
if (u->display)
if (dual_timestamp_is_set(&u->timestamp))
fprintf(f,
if (u->sessions) {
Session *i;
bool first;
fputs("SESSIONS=", f);
first = true;
if (first)
first = false;
else
fputc(' ', f);
}
fputs("\nSEATS=", f);
first = true;
if (!i->seat)
continue;
if (first)
first = false;
else
fputc(' ', f);
}
fputs("\nACTIVE_SESSIONS=", f);
first = true;
if (!session_is_active(i))
continue;
if (first)
first = false;
else
fputc(' ', f);
}
fputs("\nONLINE_SESSIONS=", f);
first = true;
if (session_get_state(i) == SESSION_CLOSING)
continue;
if (first)
first = false;
else
fputc(' ', f);
}
fputs("\nACTIVE_SEATS=", f);
first = true;
if (!session_is_active(i) || !i->seat)
continue;
if (first)
first = false;
else
fputc(' ', f);
}
fputs("\nONLINE_SEATS=", f);
first = true;
continue;
if (first)
first = false;
else
fputc(' ', f);
}
fputc('\n', f);
}
fflush(f);
r = -errno;
unlink(u->state_file);
}
if (r < 0)
return r;
}
int r;
assert(u);
"RUNTIME", &u->runtime_path,
"SERVICE", &u->service,
"SERVICE_JOB", &u->service_job,
"SLICE", &u->slice,
"SLICE_JOB", &u->slice_job,
"DISPLAY", &display,
"REALTIME", &realtime,
"MONOTONIC", &monotonic,
NULL);
if (r < 0) {
if (r == -ENOENT)
return 0;
return r;
}
if (display)
u->display = s;
if (realtime) {
unsigned long long l;
}
if (monotonic) {
unsigned long long l;
}
return r;
}
static int user_mkdir_runtime_path(User *u) {
char *p;
int r;
assert(u);
if (r < 0)
return log_error_errno(r, "Failed to create /run/user: %m");
if (!u->runtime_path) {
return log_oom();
} else
p = u->runtime_path;
if (path_is_mount_point(p, 0) <= 0) {
_cleanup_free_ char *t = NULL;
(void) mkdir(p, 0700);
if (mac_smack_use())
r = asprintf(&t, "mode=0700,smackfsroot=*,uid=" UID_FMT ",gid=" GID_FMT ",size=%zu", u->uid, u->gid, u->manager->runtime_dir_size);
else
r = asprintf(&t, "mode=0700,uid=" UID_FMT ",gid=" GID_FMT ",size=%zu", u->uid, u->gid, u->manager->runtime_dir_size);
if (r < 0) {
r = log_oom();
goto fail;
}
if (r < 0) {
goto fail;
}
/* Lacking permissions, maybe
* CAP_SYS_ADMIN-less container? In this case,
* just use a normal directory. */
if (r < 0) {
log_error_errno(r, "Failed to change runtime directory ownership and mode: %m");
goto fail;
}
}
}
u->runtime_path = p;
return 0;
fail:
if (p) {
/* Try to clean up, but ignore errors */
(void) rmdir(p);
free(p);
}
u->runtime_path = NULL;
return r;
}
static int user_start_slice(User *u) {
char *job;
int r;
assert(u);
if (!u->slice) {
if (r < 0)
return r;
if (r < 0) {
} else {
}
}
if (u->slice)
return 0;
}
static int user_start_service(User *u) {
char *job;
int r;
assert(u);
if (!u->service) {
if (r < 0)
return log_error_errno(r, "Failed to build service name: %m");
if (r < 0) {
} else {
free(u->service_job);
u->service_job = job;
}
}
if (u->service)
return 0;
}
int user_start(User *u) {
int r;
assert(u);
if (u->started)
return 0;
/* Make XDG_RUNTIME_DIR */
r = user_mkdir_runtime_path(u);
if (r < 0)
return r;
/* Create cgroup */
r = user_start_slice(u);
if (r < 0)
return r;
/* Spawn user systemd */
r = user_start_service(u);
if (r < 0)
return r;
if (!dual_timestamp_is_set(&u->timestamp))
dual_timestamp_get(&u->timestamp);
u->started = true;
/* Save new user data */
user_save(u);
user_send_signal(u, true);
return 0;
}
static int user_stop_slice(User *u) {
char *job;
int r;
assert(u);
if (!u->slice)
return 0;
if (r < 0) {
return r;
}
return r;
}
static int user_stop_service(User *u) {
char *job;
int r;
assert(u);
if (!u->service)
return 0;
if (r < 0) {
return r;
}
free(u->service_job);
u->service_job = job;
return r;
}
static int user_remove_runtime_path(User *u) {
int r;
assert(u);
if (!u->runtime_path)
return 0;
r = rm_rf(u->runtime_path, 0);
if (r < 0)
/* Ignore cases where the directory isn't mounted, as that's
* quite possible, if we lacked the permissions to mount
* something */
if (r < 0)
free(u->runtime_path);
u->runtime_path = NULL;
return r;
}
Session *s;
int r = 0, k;
assert(u);
/* Stop jobs have already been queued */
if (u->stopping) {
user_save(u);
return r;
}
k = session_stop(s, force);
if (k < 0)
r = k;
}
/* Kill systemd */
k = user_stop_service(u);
if (k < 0)
r = k;
/* Kill cgroup */
k = user_stop_slice(u);
if (k < 0)
r = k;
u->stopping = true;
user_save(u);
return r;
}
int user_finalize(User *u) {
Session *s;
int r = 0, k;
assert(u);
if (u->started)
k = session_finalize(s);
if (k < 0)
r = k;
}
/* Kill XDG_RUNTIME_DIR */
k = user_remove_runtime_path(u);
if (k < 0)
r = k;
/* Clean SysV + POSIX IPC objects */
if (u->manager->remove_ipc) {
if (k < 0)
r = k;
}
unlink(u->state_file);
if (u->started) {
user_send_signal(u, false);
u->started = false;
}
return r;
}
Session *s;
bool idle_hint = true;
assert(u);
int ih;
ih = session_get_idle_hint(s, &k);
if (ih < 0)
return ih;
if (!ih) {
if (!idle_hint) {
ts = k;
} else {
idle_hint = false;
ts = k;
}
} else if (idle_hint) {
ts = k;
}
}
if (t)
*t = ts;
return idle_hint;
}
int user_check_linger_file(User *u) {
char *p = NULL;
if (!cc)
return -ENOMEM;
}
assert(u);
if (drop_not_started && !u->started)
return false;
if (u->sessions)
return true;
if (user_check_linger_file(u) > 0)
return true;
return true;
return true;
return false;
}
void user_add_to_gc_queue(User *u) {
assert(u);
if (u->in_gc_queue)
return;
u->in_gc_queue = true;
}
Session *i;
assert(u);
if (u->stopping)
return USER_CLOSING;
if (u->slice_job || u->service_job)
return USER_OPENING;
if (u->sessions) {
bool all_closing = true;
state = session_get_state(i);
if (state == SESSION_ACTIVE)
return USER_ACTIVE;
if (state != SESSION_CLOSING)
all_closing = false;
}
}
if (user_check_linger_file(u) > 0)
return USER_LINGERING;
return USER_CLOSING;
}
assert(u);
if (!u->slice)
return -ESRCH;
}
static bool elect_display_filter(Session *s) {
/* Return true if the session is a candidate for the user’s ‘primary
* session’ or ‘display’. */
assert(s);
}
/* Indexed by SessionType. Lower numbers mean more preferred. */
const int type_ranks[_SESSION_TYPE_MAX] = {
[SESSION_UNSPECIFIED] = 0,
[SESSION_TTY] = -2,
[SESSION_X11] = -3,
[SESSION_WAYLAND] = -3,
[SESSION_MIR] = -3,
[SESSION_WEB] = -1,
};
/* Calculate the partial order relationship between s1 and s2,
* returning < 0 if s1 is preferred as the user’s ‘primary session’,
* 0 if s1 and s2 are equally preferred or incomparable, or > 0 if s2
* is preferred.
*
* s1 or s2 may be NULL. */
return 0;
return 0;
}
void user_elect_display(User *u) {
Session *s;
assert(u);
/* This elects a primary session for each user, which we call
* the "display". We try to keep the assignment stable, but we
* "upgrade" to better choices. */
if (!elect_display_filter(s)) {
continue;
}
if (elect_display_compare(s, u->display) < 0) {
u->display = s;
}
}
}
static const char* const user_state_table[_USER_STATE_MAX] = {
[USER_OFFLINE] = "offline",
[USER_OPENING] = "opening",
[USER_LINGERING] = "lingering",
[USER_ONLINE] = "online",
[USER_ACTIVE] = "active",
[USER_CLOSING] = "closing"
};
const char* unit,
const char *filename,
unsigned line,
const char *section,
unsigned section_line,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
const char *e;
int r;
if (e) {
unsigned long ul;
char *f;
errno = 0;
if (errno != 0 || f != e) {
log_syntax(unit, LOG_ERR, filename, line, errno ? errno : EINVAL, "Failed to parse percentage value, ignoring: %s", rvalue);
return 0;
}
log_syntax(unit, LOG_ERR, filename, line, errno ? errno : EINVAL, "Percentage value out of range, ignoring: %s", rvalue);
return 0;
}
} else {
off_t o;
log_syntax(unit, LOG_ERR, filename, line, r < 0 ? -r : ERANGE, "Failed to parse size value, ignoring: %s", rvalue);
return 0;
}
}
return 0;
}