/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/ /*** This file is part of systemd. Copyright 2011 Lennart Poettering systemd is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. systemd is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with systemd; If not, see . ***/ #include #include #include #include #include #include #include #include #include #include "logind.h" #include "dbus-common.h" #include "dbus-loop.h" #include "strv.h" #include "conf-parser.h" Manager *manager_new(void) { Manager *m; m = new0(Manager, 1); if (!m) return NULL; m->console_active_fd = -1; m->bus_fd = -1; m->udev_seat_fd = -1; m->udev_vcsa_fd = -1; m->epoll_fd = -1; m->n_autovts = 6; m->devices = hashmap_new(string_hash_func, string_compare_func); m->seats = hashmap_new(string_hash_func, string_compare_func); m->sessions = hashmap_new(string_hash_func, string_compare_func); m->users = hashmap_new(trivial_hash_func, trivial_compare_func); m->cgroups = hashmap_new(string_hash_func, string_compare_func); m->fifo_fds = hashmap_new(trivial_hash_func, trivial_compare_func); if (!m->devices || !m->seats || !m->sessions || !m->users || !m->cgroups || !m->fifo_fds) { manager_free(m); return NULL; } m->reset_controllers = strv_new("cpu", NULL); m->kill_exclude_users = strv_new("root", NULL); if (!m->reset_controllers || !m->kill_exclude_users) { manager_free(m); return NULL; } m->udev = udev_new(); if (!m->udev) { manager_free(m); return NULL; } if (cg_get_user_path(&m->cgroup_path) < 0) { manager_free(m); return NULL; } return m; } void manager_free(Manager *m) { Session *session; User *u; Device *d; Seat *s; assert(m); while ((session = hashmap_first(m->sessions))) session_free(session); while ((u = hashmap_first(m->users))) user_free(u); while ((d = hashmap_first(m->devices))) device_free(d); while ((s = hashmap_first(m->seats))) seat_free(s); hashmap_free(m->sessions); hashmap_free(m->users); hashmap_free(m->devices); hashmap_free(m->seats); hashmap_free(m->cgroups); hashmap_free(m->fifo_fds); if (m->console_active_fd >= 0) close_nointr_nofail(m->console_active_fd); if (m->udev_seat_monitor) udev_monitor_unref(m->udev_seat_monitor); if (m->udev_vcsa_monitor) udev_monitor_unref(m->udev_vcsa_monitor); if (m->udev) udev_unref(m->udev); if (m->bus) { dbus_connection_flush(m->bus); dbus_connection_close(m->bus); dbus_connection_unref(m->bus); } if (m->bus_fd >= 0) close_nointr_nofail(m->bus_fd); if (m->epoll_fd >= 0) close_nointr_nofail(m->epoll_fd); strv_free(m->controllers); strv_free(m->reset_controllers); strv_free(m->kill_only_users); strv_free(m->kill_exclude_users); free(m->cgroup_path); free(m); } int manager_add_device(Manager *m, const char *sysfs, Device **_device) { Device *d; assert(m); assert(sysfs); d = hashmap_get(m->devices, sysfs); if (d) { if (_device) *_device = d; return 0; } d = device_new(m, sysfs); if (!d) return -ENOMEM; if (_device) *_device = d; return 0; } int manager_add_seat(Manager *m, const char *id, Seat **_seat) { Seat *s; assert(m); assert(id); s = hashmap_get(m->seats, id); if (s) { if (_seat) *_seat = s; return 0; } s = seat_new(m, id); if (!s) return -ENOMEM; if (_seat) *_seat = s; return 0; } int manager_add_session(Manager *m, User *u, const char *id, Session **_session) { Session *s; assert(m); assert(id); s = hashmap_get(m->sessions, id); if (s) { if (_session) *_session = s; return 0; } s = session_new(m, u, id); if (!s) return -ENOMEM; if (_session) *_session = s; return 0; } int manager_add_user(Manager *m, uid_t uid, gid_t gid, const char *name, User **_user) { User *u; assert(m); assert(name); u = hashmap_get(m->users, ULONG_TO_PTR((unsigned long) uid)); if (u) { if (_user) *_user = u; return 0; } u = user_new(m, uid, gid, name); if (!u) return -ENOMEM; if (_user) *_user = u; return 0; } int manager_add_user_by_name(Manager *m, const char *name, User **_user) { struct passwd *p; assert(m); assert(name); errno = 0; p = getpwnam(name); if (!p) return errno ? -errno : -ENOENT; return manager_add_user(m, p->pw_uid, p->pw_gid, name, _user); } int manager_add_user_by_uid(Manager *m, uid_t uid, User **_user) { struct passwd *p; assert(m); errno = 0; p = getpwuid(uid); if (!p) return errno ? -errno : -ENOENT; return manager_add_user(m, uid, p->pw_gid, p->pw_name, _user); } int manager_process_seat_device(Manager *m, struct udev_device *d) { Device *device; int r; assert(m); if (streq_ptr(udev_device_get_action(d), "remove")) { /* FIXME: use syspath instead of sysname here, as soon as fb driver is fixed */ device = hashmap_get(m->devices, udev_device_get_sysname(d)); if (!device) return 0; seat_add_to_gc_queue(device->seat); device_free(device); } else { const char *sn; Seat *seat; sn = udev_device_get_property_value(d, "ID_SEAT"); if (!sn) sn = "seat0"; if (!seat_name_is_valid(sn)) { log_warning("Device with invalid seat name %s found, ignoring.", sn); return 0; } r = manager_add_device(m, udev_device_get_sysname(d), &device); if (r < 0) return r; r = manager_add_seat(m, sn, &seat); if (r < 0) { if (!device->seat) device_free(device); return r; } device_attach(device, seat); seat_start(seat); } return 0; } int manager_enumerate_devices(Manager *m) { struct udev_list_entry *item = NULL, *first = NULL; struct udev_enumerate *e; int r; assert(m); /* Loads devices from udev and creates seats for them as * necessary */ e = udev_enumerate_new(m->udev); if (!e) { r = -ENOMEM; goto finish; } r = udev_enumerate_add_match_subsystem(e, "graphics"); if (r < 0) goto finish; r = udev_enumerate_add_match_tag(e, "seat"); if (r < 0) goto finish; r = udev_enumerate_scan_devices(e); if (r < 0) goto finish; first = udev_enumerate_get_list_entry(e); udev_list_entry_foreach(item, first) { struct udev_device *d; int k; d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item)); if (!d) { r = -ENOMEM; goto finish; } k = manager_process_seat_device(m, d); udev_device_unref(d); if (k < 0) r = k; } finish: if (e) udev_enumerate_unref(e); return r; } int manager_enumerate_seats(Manager *m) { DIR *d; struct dirent *de; int r = 0; assert(m); /* This loads data about seats stored on disk, but does not * actually create any seats. Removes data of seats that no * longer exist. */ d = opendir("/run/systemd/seats"); if (!d) { if (errno == ENOENT) return 0; log_error("Failed to open /run/systemd/seats: %m"); return -errno; } while ((de = readdir(d))) { Seat *s; int k; if (!dirent_is_file(de)) continue; s = hashmap_get(m->seats, de->d_name); if (!s) { unlinkat(dirfd(d), de->d_name, 0); continue; } k = seat_load(s); if (k < 0) r = k; } closedir(d); return r; } static int manager_enumerate_users_from_cgroup(Manager *m) { int r = 0; char *name; DIR *d; r = cg_enumerate_subgroups(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_path, &d); if (r < 0) { if (r == -ENOENT) return 0; log_error("Failed to open %s: %s", m->cgroup_path, strerror(-r)); return r; } while ((r = cg_read_subgroup(d, &name)) > 0) { User *user; int k; k = manager_add_user_by_name(m, name, &user); if (k < 0) { free(name); r = k; continue; } user_add_to_gc_queue(user); if (!user->cgroup_path) if (asprintf(&user->cgroup_path, "%s/%s", m->cgroup_path, name) < 0) { r = -ENOMEM; free(name); break; } free(name); } closedir(d); return r; } static int manager_enumerate_linger_users(Manager *m) { DIR *d; struct dirent *de; int r = 0; d = opendir("/var/lib/systemd/linger"); if (!d) { if (errno == ENOENT) return 0; log_error("Failed to open /var/lib/systemd/linger/: %m"); return -errno; } while ((de = readdir(d))) { int k; if (!dirent_is_file(de)) continue; k = manager_add_user_by_name(m, de->d_name, NULL); if (k < 0) { log_notice("Couldn't add lingering user %s: %s", de->d_name, strerror(-k)); r = k; } } closedir(d); return r; } int manager_enumerate_users(Manager *m) { DIR *d; struct dirent *de; int r, k; assert(m); /* First, enumerate user cgroups */ r = manager_enumerate_users_from_cgroup(m); /* Second, add lingering users on top */ k = manager_enumerate_linger_users(m); if (k < 0) r = k; /* Third, read in user data stored on disk */ d = opendir("/run/systemd/users"); if (!d) { if (errno == ENOENT) return 0; log_error("Failed to open /run/systemd/users: %m"); return -errno; } while ((de = readdir(d))) { unsigned long ul; User *u; if (!dirent_is_file(de)) continue; k = safe_atolu(de->d_name, &ul); if (k < 0) { log_error("Failed to parse file name %s: %s", de->d_name, strerror(-k)); continue; } u = hashmap_get(m->users, ULONG_TO_PTR(ul)); if (!u) { unlinkat(dirfd(d), de->d_name, 0); continue; } k = user_load(u); if (k < 0) r = k; } closedir(d); return r; } static int manager_enumerate_sessions_from_cgroup(Manager *m) { User *u; Iterator i; int r = 0; HASHMAP_FOREACH(u, m->users, i) { DIR *d; char *name; int k; if (!u->cgroup_path) continue; k = cg_enumerate_subgroups(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, &d); if (k < 0) { if (k == -ENOENT) continue; log_error("Failed to open %s: %s", u->cgroup_path, strerror(-k)); r = k; continue; } while ((k = cg_read_subgroup(d, &name)) > 0) { Session *session; k = manager_add_session(m, u, name, &session); if (k < 0) { free(name); break; } session_add_to_gc_queue(session); if (!session->cgroup_path) if (asprintf(&session->cgroup_path, "%s/%s", u->cgroup_path, name) < 0) { k = -ENOMEM; free(name); break; } free(name); } closedir(d); if (k < 0) r = k; } return r; } int manager_enumerate_sessions(Manager *m) { DIR *d; struct dirent *de; int r = 0; assert(m); /* First enumerate session cgroups */ r = manager_enumerate_sessions_from_cgroup(m); /* Second, read in session data stored on disk */ d = opendir("/run/systemd/sessions"); if (!d) { if (errno == ENOENT) return 0; log_error("Failed to open /run/systemd/sessions: %m"); return -errno; } while ((de = readdir(d))) { struct Session *s; int k; if (!dirent_is_file(de)) continue; s = hashmap_get(m->sessions, de->d_name); if (!s) { unlinkat(dirfd(d), de->d_name, 0); continue; } k = session_load(s); if (k < 0) r = k; } closedir(d); return r; } int manager_dispatch_seat_udev(Manager *m) { struct udev_device *d; int r; assert(m); d = udev_monitor_receive_device(m->udev_seat_monitor); if (!d) return -ENOMEM; r = manager_process_seat_device(m, d); udev_device_unref(d); return r; } int manager_dispatch_vcsa_udev(Manager *m) { struct udev_device *d; int r = 0; const char *name; assert(m); d = udev_monitor_receive_device(m->udev_vcsa_monitor); if (!d) return -ENOMEM; name = udev_device_get_sysname(d); /* Whenever a VCSA device is removed try to reallocate our * VTs, to make sure our auto VTs never go away. */ if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove")) r = seat_preallocate_vts(m->vtconsole); udev_device_unref(d); return r; } int manager_dispatch_console(Manager *m) { assert(m); if (m->vtconsole) seat_read_active_vt(m->vtconsole); return 0; } static int vt_is_busy(int vtnr) { struct vt_stat vt_stat; int r = 0, fd; assert(vtnr >= 1); /* We explicitly open /dev/tty1 here instead of /dev/tty0. If * we'd open the latter we'd open the foreground tty which * hence would be unconditionally busy. By opening /dev/tty1 * we avoid this. Since tty1 is special and needs to be an * explicitly loaded getty or DM this is safe. */ fd = open_terminal("/dev/tty1", O_RDWR|O_NOCTTY|O_CLOEXEC); if (fd < 0) return -errno; if (ioctl(fd, VT_GETSTATE, &vt_stat) < 0) r = -errno; else r = !!(vt_stat.v_state & (1 << vtnr)); close_nointr_nofail(fd); return r; } int manager_spawn_autovt(Manager *m, int vtnr) { int r; DBusMessage *message = NULL, *reply = NULL; char *name = NULL; const char *mode = "fail"; DBusError error; assert(m); assert(vtnr >= 1); dbus_error_init(&error); if ((unsigned) vtnr > m->n_autovts) return 0; r = vt_is_busy(vtnr); if (r < 0) return r; else if (r > 0) return -EBUSY; message = dbus_message_new_method_call("org.freedesktop.systemd1", "/org/freedesktop/systemd1", "org.freedesktop.systemd1.Manager", "StartUnit"); if (!message) { log_error("Could not allocate message."); r = -ENOMEM; goto finish; } if (asprintf(&name, "autovt@tty%i.service", vtnr) < 0) { log_error("Could not allocate service name."); r = -ENOMEM; goto finish; } if (!dbus_message_append_args(message, DBUS_TYPE_STRING, &name, DBUS_TYPE_STRING, &mode, DBUS_TYPE_INVALID)) { log_error("Could not attach target and flag information to message."); r = -ENOMEM; goto finish; } reply = dbus_connection_send_with_reply_and_block(m->bus, message, -1, &error); if (!reply) { log_error("Failed to start unit: %s", bus_error_message(&error)); goto finish; } r = 0; finish: free(name); if (message) dbus_message_unref(message); if (reply) dbus_message_unref(reply); dbus_error_free(&error); return r; } void manager_cgroup_notify_empty(Manager *m, const char *cgroup) { Session *s; char *p; assert(m); assert(cgroup); p = strdup(cgroup); if (!p) { log_error("Out of memory."); return; } for (;;) { char *e; if (isempty(p) || streq(p, "/")) break; s = hashmap_get(m->cgroups, p); if (s) session_add_to_gc_queue(s); assert_se(e = strrchr(p, '/')); *e = 0; } free(p); } static void manager_pipe_notify_eof(Manager *m, int fd) { Session *s; assert_se(m); assert_se(fd >= 0); assert_se(s = hashmap_get(m->fifo_fds, INT_TO_PTR(fd + 1))); assert(s->fifo_fd == fd); session_remove_fifo(s); session_stop(s); } static int manager_connect_bus(Manager *m) { DBusError error; int r; struct epoll_event ev; assert(m); assert(!m->bus); assert(m->bus_fd < 0); dbus_error_init(&error); m->bus = dbus_bus_get_private(DBUS_BUS_SYSTEM, &error); if (!m->bus) { log_error("Failed to get system D-Bus connection: %s", bus_error_message(&error)); r = -ECONNREFUSED; goto fail; } if (!dbus_connection_register_object_path(m->bus, "/org/freedesktop/login1", &bus_manager_vtable, m) || !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/seat", &bus_seat_vtable, m) || !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/session", &bus_session_vtable, m) || !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/user", &bus_user_vtable, m) || !dbus_connection_add_filter(m->bus, bus_message_filter, m, NULL)) { log_error("Not enough memory"); r = -ENOMEM; goto fail; } dbus_bus_add_match(m->bus, "type='signal'," "interface='org.freedesktop.systemd1.Agent'," "member='Released'," "path='/org/freedesktop/systemd1/agent'", &error); if (dbus_error_is_set(&error)) { log_error("Failed to register match: %s", bus_error_message(&error)); r = -EIO; goto fail; } r = dbus_bus_request_name(m->bus, "org.freedesktop.login1", DBUS_NAME_FLAG_DO_NOT_QUEUE, &error); if (dbus_error_is_set(&error)) { log_error("Failed to register name on bus: %s", bus_error_message(&error)); r = -EIO; goto fail; } if (r != DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER) { log_error("Failed to acquire name."); r = -EEXIST; goto fail; } m->bus_fd = bus_loop_open(m->bus); if (m->bus_fd < 0) { r = m->bus_fd; goto fail; } zero(ev); ev.events = EPOLLIN; ev.data.u32 = FD_BUS; if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->bus_fd, &ev) < 0) goto fail; return 0; fail: dbus_error_free(&error); return r; } static int manager_connect_console(Manager *m) { struct epoll_event ev; assert(m); assert(m->console_active_fd < 0); m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC); if (m->console_active_fd < 0) { log_error("Failed to open /sys/class/tty/tty0/active: %m"); return -errno; } zero(ev); ev.events = 0; ev.data.u32 = FD_CONSOLE; if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->console_active_fd, &ev) < 0) return -errno; return 0; } static int manager_connect_udev(Manager *m) { struct epoll_event ev; int r; assert(m); assert(!m->udev_seat_monitor); assert(!m->udev_vcsa_monitor); m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev"); if (!m->udev_seat_monitor) return -ENOMEM; r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "seat"); if (r < 0) return r; r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_seat_monitor, "graphics", NULL); if (r < 0) return r; r = udev_monitor_enable_receiving(m->udev_seat_monitor); if (r < 0) return r; m->udev_seat_fd = udev_monitor_get_fd(m->udev_seat_monitor); zero(ev); ev.events = EPOLLIN; ev.data.u32 = FD_SEAT_UDEV; if (m->n_autovts <= 0) return 0; if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_seat_fd, &ev) < 0) return -errno; m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev"); if (!m->udev_vcsa_monitor) return -ENOMEM; r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL); if (r < 0) return r; r = udev_monitor_enable_receiving(m->udev_vcsa_monitor); if (r < 0) return r; m->udev_vcsa_fd = udev_monitor_get_fd(m->udev_vcsa_monitor); zero(ev); ev.events = EPOLLIN; ev.data.u32 = FD_VCSA_UDEV; if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_vcsa_fd, &ev) < 0) return -errno; return 0; } void manager_gc(Manager *m) { Seat *seat; Session *session; User *user; assert(m); while ((seat = m->seat_gc_queue)) { LIST_REMOVE(Seat, gc_queue, m->seat_gc_queue, seat); seat->in_gc_queue = false; if (seat_check_gc(seat) == 0) { seat_stop(seat); seat_free(seat); } } while ((session = m->session_gc_queue)) { LIST_REMOVE(Session, gc_queue, m->session_gc_queue, session); session->in_gc_queue = false; if (session_check_gc(session) == 0) { session_stop(session); session_free(session); } } while ((user = m->user_gc_queue)) { LIST_REMOVE(User, gc_queue, m->user_gc_queue, user); user->in_gc_queue = false; if (user_check_gc(user) == 0) { user_stop(user); user_free(user); } } } int manager_get_idle_hint(Manager *m, dual_timestamp *t) { Session *s; bool idle_hint = true; dual_timestamp ts = { 0, 0 }; Iterator i; assert(m); HASHMAP_FOREACH(s, m->sessions, i) { dual_timestamp k; int ih; ih = session_get_idle_hint(s, &k); if (ih < 0) return ih; if (!ih) { if (!idle_hint) { if (k.monotonic < ts.monotonic) ts = k; } else { idle_hint = false; ts = k; } } else if (idle_hint) { if (k.monotonic > ts.monotonic) ts = k; } } if (t) *t = ts; return idle_hint; } int manager_startup(Manager *m) { int r; Seat *seat; Session *session; User *user; Iterator i; assert(m); assert(m->epoll_fd <= 0); m->epoll_fd = epoll_create1(EPOLL_CLOEXEC); if (m->epoll_fd < 0) return -errno; /* Connect to udev */ r = manager_connect_udev(m); if (r < 0) return r; /* Connect to console */ r = manager_connect_console(m); if (r < 0) return r; /* Connect to the bus */ r = manager_connect_bus(m); if (r < 0) return r; /* Instantiate magic seat 0 */ r = manager_add_seat(m, "seat0", &m->vtconsole); if (r < 0) return r; /* Deserialize state */ manager_enumerate_devices(m); manager_enumerate_seats(m); manager_enumerate_users(m); manager_enumerate_sessions(m); /* And start everything */ HASHMAP_FOREACH(seat, m->seats, i) seat_start(seat); HASHMAP_FOREACH(user, m->users, i) user_start(user); HASHMAP_FOREACH(session, m->sessions, i) session_start(session); return 0; } int manager_run(Manager *m) { assert(m); for (;;) { struct epoll_event event; int n; manager_gc(m); if (dbus_connection_dispatch(m->bus) != DBUS_DISPATCH_COMPLETE) continue; manager_gc(m); n = epoll_wait(m->epoll_fd, &event, 1, -1); if (n < 0) { if (errno == EINTR || errno == EAGAIN) continue; log_error("epoll() failed: %m"); return -errno; } switch (event.data.u32) { case FD_SEAT_UDEV: manager_dispatch_seat_udev(m); break; case FD_VCSA_UDEV: manager_dispatch_vcsa_udev(m); break; case FD_CONSOLE: manager_dispatch_console(m); break; case FD_BUS: bus_loop_dispatch(m->bus_fd); break; default: if (event.data.u32 >= FD_FIFO_BASE) manager_pipe_notify_eof(m, event.data.u32 - FD_FIFO_BASE); } } return 0; } static int manager_parse_config_file(Manager *m) { const ConfigItem items[] = { { "NAutoVTs", config_parse_unsigned, 0, &m->n_autovts, "Login" }, { "KillUserProcesses", config_parse_bool, 0, &m->kill_user_processes, "Login" }, { "KilOnlyUsers", config_parse_strv, 0, &m->kill_only_users, "Login" }, { "KillExcludeUsers", config_parse_strv, 0, &m->kill_exclude_users, "Login" }, { "Controllers", config_parse_strv, 0, &m->controllers, "Login" }, { "ResetControllers", config_parse_strv, 0, &m->reset_controllers, "Login" }, { NULL, NULL, 0, NULL, NULL } }; static const char * const sections[] = { "Login", NULL }; FILE *f; const char *fn; int r; assert(m); fn = "/etc/systemd/systemd-logind.conf"; f = fopen(fn, "re"); if (!f) { if (errno == ENOENT) return 0; log_warning("Failed to open configuration file %s: %m", fn); return -errno; } r = config_parse(fn, f, sections, items, false, NULL); if (r < 0) log_warning("Failed to parse configuration file: %s", strerror(-r)); fclose(f); return r; } int main(int argc, char *argv[]) { Manager *m = NULL; int r; log_set_target(LOG_TARGET_AUTO); log_parse_environment(); log_open(); if (argc != 1) { log_error("This program takes no arguments."); r = -EINVAL; goto finish; } umask(0022); m = manager_new(); if (!m) { log_error("Out of memory"); r = -ENOMEM; goto finish; } manager_parse_config_file(m); r = manager_startup(m); if (r < 0) { log_error("Failed to fully start up daemon: %s", strerror(-r)); goto finish; } r = manager_run(m); finish: if (m) manager_free(m); return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS; }