/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/ /*** This file is part of systemd. Copyright 2011 Lennart Poettering systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. systemd is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with systemd; If not, see . ***/ #include #include #include #include "logind-user.h" #include "util.h" #include "mkdir.h" #include "cgroup-util.h" #include "hashmap.h" #include "strv.h" User* user_new(Manager *m, uid_t uid, gid_t gid, const char *name) { User *u; assert(m); assert(name); u = new0(User, 1); if (!u) return NULL; u->name = strdup(name); if (!u->name) { free(u); return NULL; } if (asprintf(&u->state_file, "/run/systemd/users/%lu", (unsigned long) uid) < 0) { free(u->name); free(u); return NULL; } if (hashmap_put(m->users, ULONG_TO_PTR((unsigned long) uid), u) < 0) { free(u->state_file); free(u->name); free(u); return NULL; } u->manager = m; u->uid = uid; u->gid = gid; return u; } void user_free(User *u) { assert(u); if (u->in_gc_queue) LIST_REMOVE(User, gc_queue, u->manager->user_gc_queue, u); while (u->sessions) session_free(u->sessions); if (u->cgroup_path) hashmap_remove(u->manager->user_cgroups, u->cgroup_path); free(u->cgroup_path); free(u->service); free(u->runtime_path); hashmap_remove(u->manager->users, ULONG_TO_PTR((unsigned long) u->uid)); free(u->name); free(u->state_file); free(u); } int user_save(User *u) { FILE *f; int r; char *temp_path; assert(u); assert(u->state_file); if (!u->started) return 0; r = mkdir_safe_label("/run/systemd/users", 0755, 0, 0); if (r < 0) goto finish; r = fopen_temporary(u->state_file, &f, &temp_path); if (r < 0) goto finish; fchmod(fileno(f), 0644); fprintf(f, "# This is private data. Do not parse.\n" "NAME=%s\n" "STATE=%s\n", u->name, user_state_to_string(user_get_state(u))); if (u->cgroup_path) fprintf(f, "CGROUP=%s\n", u->cgroup_path); if (u->runtime_path) fprintf(f, "RUNTIME=%s\n", u->runtime_path); if (u->service) fprintf(f, "SERVICE=%s\n", u->service); if (u->display) fprintf(f, "DISPLAY=%s\n", u->display->id); if (u->sessions) { Session *i; bool first; fputs("SESSIONS=", f); first = true; LIST_FOREACH(sessions_by_user, i, u->sessions) { if (first) first = false; else fputc(' ', f); fputs(i->id, f); } fputs("\nSEATS=", f); first = true; LIST_FOREACH(sessions_by_user, i, u->sessions) { if (!i->seat) continue; if (first) first = false; else fputc(' ', f); fputs(i->seat->id, f); } fputs("\nACTIVE_SESSIONS=", f); first = true; LIST_FOREACH(sessions_by_user, i, u->sessions) { if (!session_is_active(i)) continue; if (first) first = false; else fputc(' ', f); fputs(i->id, f); } fputs("\nACTIVE_SEATS=", f); first = true; LIST_FOREACH(sessions_by_user, i, u->sessions) { if (!session_is_active(i) || !i->seat) continue; if (first) first = false; else fputs(i->seat->id, f); } fputc('\n', f); } fflush(f); if (ferror(f) || rename(temp_path, u->state_file) < 0) { r = -errno; unlink(u->state_file); unlink(temp_path); } fclose(f); free(temp_path); finish: if (r < 0) log_error("Failed to save user data for %s: %s", u->name, strerror(-r)); return r; } int user_load(User *u) { int r; char *display = NULL; Session *s = NULL; assert(u); r = parse_env_file(u->state_file, NEWLINE, "CGROUP", &u->cgroup_path, "RUNTIME", &u->runtime_path, "SERVICE", &u->service, "DISPLAY", &display, NULL); if (r < 0) { free(display); if (r == -ENOENT) return 0; log_error("Failed to read %s: %s", u->state_file, strerror(-r)); return r; } if (display) { s = hashmap_get(u->manager->sessions, display); free(display); } if (s && s->display && display_is_local(s->display)) u->display = s; return r; } static int user_mkdir_runtime_path(User *u) { char *p; int r; assert(u); r = mkdir_safe_label("/run/user", 0755, 0, 0); if (r < 0) { log_error("Failed to create /run/user: %s", strerror(-r)); return r; } if (!u->runtime_path) { if (asprintf(&p, "/run/user/%lu", (unsigned long) u->uid) < 0) return log_oom(); } else p = u->runtime_path; r = mkdir_safe_label(p, 0700, u->uid, u->gid); if (r < 0) { log_error("Failed to create runtime directory %s: %s", p, strerror(-r)); free(p); u->runtime_path = NULL; return r; } u->runtime_path = p; return 0; } static int user_create_cgroup(User *u) { char **k; char *p; int r; assert(u); if (!u->cgroup_path) { if (asprintf(&p, "%s/%s", u->manager->cgroup_path, u->name) < 0) return log_oom(); } else p = u->cgroup_path; r = cg_create(SYSTEMD_CGROUP_CONTROLLER, p); if (r < 0) { log_error("Failed to create cgroup "SYSTEMD_CGROUP_CONTROLLER":%s: %s", p, strerror(-r)); free(p); u->cgroup_path = NULL; return r; } u->cgroup_path = p; STRV_FOREACH(k, u->manager->controllers) { if (strv_contains(u->manager->reset_controllers, *k)) continue; r = cg_create(*k, p); if (r < 0) log_warning("Failed to create cgroup %s:%s: %s", *k, p, strerror(-r)); } hashmap_put(u->manager->user_cgroups, u->cgroup_path, u); return 0; } static int user_start_service(User *u) { assert(u); /* FIXME: Fill me in later ... */ return 0; } int user_start(User *u) { int r; assert(u); if (u->started) return 0; log_debug("New user %s logged in.", u->name); /* Make XDG_RUNTIME_DIR */ r = user_mkdir_runtime_path(u); if (r < 0) return r; /* Create cgroup */ r = user_create_cgroup(u); if (r < 0) return r; /* Spawn user systemd */ r = user_start_service(u); if (r < 0) return r; dual_timestamp_get(&u->timestamp); u->started = true; /* Save new user data */ user_save(u); user_send_signal(u, true); return 0; } static int user_stop_service(User *u) { assert(u); if (!u->service) return 0; return 0; } static int user_shall_kill(User *u) { assert(u); if (!u->manager->kill_user_processes) return false; if (strv_contains(u->manager->kill_exclude_users, u->name)) return false; if (strv_isempty(u->manager->kill_only_users)) return true; return strv_contains(u->manager->kill_only_users, u->name); } static int user_terminate_cgroup(User *u) { int r; char **k; assert(u); if (!u->cgroup_path) return 0; cg_trim(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, false); if (user_shall_kill(u)) { r = cg_kill_recursive_and_wait(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, true); if (r < 0) log_error("Failed to kill user cgroup: %s", strerror(-r)); } else { r = cg_is_empty_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, true); if (r < 0) log_error("Failed to check user cgroup: %s", strerror(-r)); else if (r > 0) { r = cg_delete(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path); if (r < 0) log_error("Failed to delete user cgroup: %s", strerror(-r)); } else r = -EBUSY; } STRV_FOREACH(k, u->manager->controllers) cg_trim(*k, u->cgroup_path, true); hashmap_remove(u->manager->user_cgroups, u->cgroup_path); free(u->cgroup_path); u->cgroup_path = NULL; return r; } static int user_remove_runtime_path(User *u) { int r; assert(u); if (!u->runtime_path) return 0; r = rm_rf(u->runtime_path, false, true, false); if (r < 0) log_error("Failed to remove runtime directory %s: %s", u->runtime_path, strerror(-r)); free(u->runtime_path); u->runtime_path = NULL; return r; } int user_stop(User *u) { Session *s; int r = 0, k; assert(u); if (u->started) log_debug("User %s logged out.", u->name); LIST_FOREACH(sessions_by_user, s, u->sessions) { k = session_stop(s); if (k < 0) r = k; } /* Kill systemd */ k = user_stop_service(u); if (k < 0) r = k; /* Kill cgroup */ k = user_terminate_cgroup(u); if (k < 0) r = k; /* Kill XDG_RUNTIME_DIR */ k = user_remove_runtime_path(u); if (k < 0) r = k; unlink(u->state_file); user_add_to_gc_queue(u); if (u->started) user_send_signal(u, false); u->started = false; return r; } int user_get_idle_hint(User *u, dual_timestamp *t) { Session *s; bool idle_hint = true; dual_timestamp ts = { 0, 0 }; assert(u); LIST_FOREACH(sessions_by_user, s, u->sessions) { dual_timestamp k; int ih; ih = session_get_idle_hint(s, &k); if (ih < 0) return ih; if (!ih) { if (!idle_hint) { if (k.monotonic < ts.monotonic) ts = k; } else { idle_hint = false; ts = k; } } else if (idle_hint) { if (k.monotonic > ts.monotonic) ts = k; } } if (t) *t = ts; return idle_hint; } static int user_check_linger_file(User *u) { char *p; int r; if (asprintf(&p, "/var/lib/systemd/linger/%s", u->name) < 0) return -ENOMEM; r = access(p, F_OK) >= 0; free(p); return r; } int user_check_gc(User *u, bool drop_not_started) { int r; assert(u); if (drop_not_started && !u->started) return 0; if (u->sessions) return 1; if (user_check_linger_file(u) > 0) return 1; if (u->cgroup_path) { r = cg_is_empty_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, false); if (r < 0) return r; if (r <= 0) return 1; } return 0; } void user_add_to_gc_queue(User *u) { assert(u); if (u->in_gc_queue) return; LIST_PREPEND(User, gc_queue, u->manager->user_gc_queue, u); u->in_gc_queue = true; } UserState user_get_state(User *u) { Session *i; bool all_closing = true; assert(u); LIST_FOREACH(sessions_by_user, i, u->sessions) { if (session_is_active(i)) return USER_ACTIVE; if (session_get_state(i) != SESSION_CLOSING) all_closing = false; } if (u->sessions) return all_closing ? USER_CLOSING : USER_ONLINE; if (user_check_linger_file(u) > 0) return USER_LINGERING; return USER_CLOSING; } int user_kill(User *u, int signo) { int r = 0, q; Set *pid_set = NULL; assert(u); if (!u->cgroup_path) return -ESRCH; pid_set = set_new(trivial_hash_func, trivial_compare_func); if (!pid_set) return -ENOMEM; q = cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, signo, false, true, false, pid_set); if (q < 0) if (q != -EAGAIN && q != -ESRCH && q != -ENOENT) r = q; if (pid_set) set_free(pid_set); return r; } static const char* const user_state_table[_USER_STATE_MAX] = { [USER_OFFLINE] = "offline", [USER_LINGERING] = "lingering", [USER_ONLINE] = "online", [USER_ACTIVE] = "active", [USER_CLOSING] = "closing" }; DEFINE_STRING_TABLE_LOOKUP(user_state, UserState);