1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2011 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
25 #include <sys/inotify.h>
29 #include "cgroup-util.h"
33 #include "login-shared.h"
36 _public_ int sd_pid_get_session(pid_t pid, char **session) {
38 assert_return(pid >= 0, -EINVAL);
39 assert_return(session, -EINVAL);
41 return cg_pid_get_session(pid, session);
44 _public_ int sd_pid_get_unit(pid_t pid, char **unit) {
46 assert_return(pid >= 0, -EINVAL);
47 assert_return(unit, -EINVAL);
49 return cg_pid_get_unit(pid, unit);
52 _public_ int sd_pid_get_user_unit(pid_t pid, char **unit) {
54 assert_return(pid >= 0, -EINVAL);
55 assert_return(unit, -EINVAL);
57 return cg_pid_get_user_unit(pid, unit);
60 _public_ int sd_pid_get_machine_name(pid_t pid, char **name) {
62 assert_return(pid >= 0, -EINVAL);
63 assert_return(name, -EINVAL);
65 return cg_pid_get_machine_name(pid, name);
68 _public_ int sd_pid_get_slice(pid_t pid, char **slice) {
70 assert_return(pid >= 0, -EINVAL);
71 assert_return(slice, -EINVAL);
73 return cg_pid_get_slice(pid, slice);
76 _public_ int sd_pid_get_owner_uid(pid_t pid, uid_t *uid) {
78 assert_return(pid >= 0, -EINVAL);
79 assert_return(uid, -EINVAL);
81 return cg_pid_get_owner_uid(pid, uid);
84 _public_ int sd_peer_get_session(int fd, char **session) {
88 assert_return(fd >= 0, -EINVAL);
89 assert_return(session, -EINVAL);
91 r = getpeercred(fd, &ucred);
95 return cg_pid_get_session(ucred.pid, session);
98 _public_ int sd_peer_get_owner_uid(int fd, uid_t *uid) {
102 assert_return(fd >= 0, -EINVAL);
103 assert_return(uid, -EINVAL);
105 r = getpeercred(fd, &ucred);
109 return cg_pid_get_owner_uid(ucred.pid, uid);
112 _public_ int sd_peer_get_unit(int fd, char **unit) {
116 assert_return(fd >= 0, -EINVAL);
117 assert_return(unit, -EINVAL);
119 r = getpeercred(fd, &ucred);
123 return cg_pid_get_unit(ucred.pid, unit);
126 _public_ int sd_peer_get_user_unit(int fd, char **unit) {
130 assert_return(fd >= 0, -EINVAL);
131 assert_return(unit, -EINVAL);
133 r = getpeercred(fd, &ucred);
137 return cg_pid_get_user_unit(ucred.pid, unit);
140 _public_ int sd_peer_get_machine_name(int fd, char **machine) {
144 assert_return(fd >= 0, -EINVAL);
145 assert_return(machine, -EINVAL);
147 r = getpeercred(fd, &ucred);
151 return cg_pid_get_machine_name(ucred.pid, machine);
154 _public_ int sd_peer_get_slice(int fd, char **slice) {
158 assert_return(fd >= 0, -EINVAL);
159 assert_return(slice, -EINVAL);
161 r = getpeercred(fd, &ucred);
165 return cg_pid_get_slice(ucred.pid, slice);
168 static int file_of_uid(uid_t uid, char **p) {
171 if (asprintf(p, "/run/systemd/users/" UID_FMT, uid) < 0)
177 _public_ int sd_uid_get_state(uid_t uid, char**state) {
178 _cleanup_free_ char *p = NULL;
182 assert_return(state, -EINVAL);
184 r = file_of_uid(uid, &p);
188 r = parse_env_file(p, NEWLINE, "STATE", &s, NULL);
191 s = strdup("offline");
205 _public_ int sd_uid_get_display(uid_t uid, char **session) {
206 _cleanup_free_ char *p = NULL, *s = NULL;
209 assert_return(session, -EINVAL);
211 r = file_of_uid(uid, &p);
215 r = parse_env_file(p, NEWLINE, "DISPLAY", &s, NULL);
228 _public_ int sd_uid_is_on_seat(uid_t uid, int require_active, const char *seat) {
229 _cleanup_free_ char *t = NULL, *s = NULL, *p = NULL;
232 const char *word, *variable, *state;
234 assert_return(seat, -EINVAL);
236 variable = require_active ? "ACTIVE_UID" : "UIDS";
238 p = strappend("/run/systemd/seats/", seat);
242 r = parse_env_file(p, NEWLINE, variable, &s, NULL);
250 if (asprintf(&t, UID_FMT, uid) < 0)
253 FOREACH_WORD(word, l, s, state) {
254 if (strneq(t, word, l))
261 static int uid_get_array(uid_t uid, const char *variable, char ***array) {
262 _cleanup_free_ char *p = NULL, *s = NULL;
266 r = file_of_uid(uid, &p);
270 r = parse_env_file(p, NEWLINE,
289 a = strv_split(s, " ");
305 _public_ int sd_uid_get_sessions(uid_t uid, int require_active, char ***sessions) {
306 return uid_get_array(
308 require_active == 0 ? "ONLINE_SESSIONS" :
309 require_active > 0 ? "ACTIVE_SESSIONS" :
314 _public_ int sd_uid_get_seats(uid_t uid, int require_active, char ***seats) {
315 return uid_get_array(
317 require_active == 0 ? "ONLINE_SEATS" :
318 require_active > 0 ? "ACTIVE_SEATS" :
323 static int file_of_session(const char *session, char **_p) {
330 if (!session_id_valid(session))
333 p = strappend("/run/systemd/sessions/", session);
335 _cleanup_free_ char *buf = NULL;
337 r = sd_pid_get_session(0, &buf);
341 p = strappend("/run/systemd/sessions/", buf);
351 _public_ int sd_session_is_active(const char *session) {
353 _cleanup_free_ char *p = NULL, *s = NULL;
355 r = file_of_session(session, &p);
359 r = parse_env_file(p, NEWLINE, "ACTIVE", &s, NULL);
366 return parse_boolean(s);
369 _public_ int sd_session_is_remote(const char *session) {
371 _cleanup_free_ char *p = NULL, *s = NULL;
373 r = file_of_session(session, &p);
377 r = parse_env_file(p, NEWLINE, "REMOTE", &s, NULL);
384 return parse_boolean(s);
387 _public_ int sd_session_get_state(const char *session, char **state) {
388 _cleanup_free_ char *p = NULL, *s = NULL;
391 assert_return(state, -EINVAL);
393 r = file_of_session(session, &p);
397 r = parse_env_file(p, NEWLINE, "STATE", &s, NULL);
409 _public_ int sd_session_get_uid(const char *session, uid_t *uid) {
411 _cleanup_free_ char *p = NULL, *s = NULL;
413 assert_return(uid, -EINVAL);
415 r = file_of_session(session, &p);
419 r = parse_env_file(p, NEWLINE, "UID", &s, NULL);
426 return parse_uid(s, uid);
429 static int session_get_string(const char *session, const char *field, char **value) {
430 _cleanup_free_ char *p = NULL, *s = NULL;
433 assert_return(value, -EINVAL);
435 r = file_of_session(session, &p);
439 r = parse_env_file(p, NEWLINE, field, &s, NULL);
451 _public_ int sd_session_get_seat(const char *session, char **seat) {
452 return session_get_string(session, "SEAT", seat);
455 _public_ int sd_session_get_tty(const char *session, char **tty) {
456 return session_get_string(session, "TTY", tty);
459 _public_ int sd_session_get_vt(const char *session, unsigned *vtnr) {
460 _cleanup_free_ char *vtnr_string = NULL;
464 r = session_get_string(session, "VTNR", &vtnr_string);
468 r = safe_atou(vtnr_string, &u);
476 _public_ int sd_session_get_service(const char *session, char **service) {
477 return session_get_string(session, "SERVICE", service);
480 _public_ int sd_session_get_type(const char *session, char **type) {
481 return session_get_string(session, "TYPE", type);
484 _public_ int sd_session_get_class(const char *session, char **class) {
485 return session_get_string(session, "CLASS", class);
488 _public_ int sd_session_get_display(const char *session, char **display) {
489 return session_get_string(session, "DISPLAY", display);
492 _public_ int sd_session_get_remote_user(const char *session, char **remote_user) {
493 return session_get_string(session, "REMOTE_USER", remote_user);
496 _public_ int sd_session_get_remote_host(const char *session, char **remote_host) {
497 return session_get_string(session, "REMOTE_HOST", remote_host);
500 static int file_of_seat(const char *seat, char **_p) {
507 p = strappend("/run/systemd/seats/", seat);
509 _cleanup_free_ char *buf = NULL;
511 r = sd_session_get_seat(NULL, &buf);
515 p = strappend("/run/systemd/seats/", buf);
526 _public_ int sd_seat_get_active(const char *seat, char **session, uid_t *uid) {
527 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
530 assert_return(session || uid, -EINVAL);
532 r = file_of_seat(seat, &p);
536 r = parse_env_file(p, NEWLINE,
550 r = parse_uid(t, uid);
563 _public_ int sd_seat_get_sessions(const char *seat, char ***sessions, uid_t **uids, unsigned *n_uids) {
564 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
565 _cleanup_strv_free_ char **a = NULL;
566 _cleanup_free_ uid_t *b = NULL;
570 r = file_of_seat(seat, &p);
574 r = parse_env_file(p, NEWLINE,
576 "ACTIVE_SESSIONS", &t,
583 a = strv_split(s, " ");
589 const char *word, *state;
592 FOREACH_WORD(word, l, t, state)
602 FOREACH_WORD(word, l, t, state) {
603 _cleanup_free_ char *k = NULL;
605 k = strndup(word, l);
609 r = parse_uid(k, b + i);
637 static int seat_get_can(const char *seat, const char *variable) {
638 _cleanup_free_ char *p = NULL, *s = NULL;
641 assert_return(variable, -EINVAL);
643 r = file_of_seat(seat, &p);
647 r = parse_env_file(p, NEWLINE,
655 return parse_boolean(s);
658 _public_ int sd_seat_can_multi_session(const char *seat) {
659 return seat_get_can(seat, "CAN_MULTI_SESSION");
662 _public_ int sd_seat_can_tty(const char *seat) {
663 return seat_get_can(seat, "CAN_TTY");
666 _public_ int sd_seat_can_graphical(const char *seat) {
667 return seat_get_can(seat, "CAN_GRAPHICAL");
670 _public_ int sd_get_seats(char ***seats) {
671 return get_files_in_directory("/run/systemd/seats/", seats);
674 _public_ int sd_get_sessions(char ***sessions) {
675 return get_files_in_directory("/run/systemd/sessions/", sessions);
678 _public_ int sd_get_uids(uid_t **users) {
679 _cleanup_closedir_ DIR *d;
682 _cleanup_free_ uid_t *l = NULL;
684 d = opendir("/run/systemd/users/");
695 if (!de && errno != 0)
701 dirent_ensure_type(d, de);
703 if (!dirent_is_file(de))
706 k = parse_uid(de->d_name, &uid);
711 if ((unsigned) r >= n) {
715 t = realloc(l, sizeof(uid_t) * n);
722 assert((unsigned) r < n);
736 _public_ int sd_get_machine_names(char ***machines) {
737 char **l = NULL, **a, **b;
740 assert_return(machines, -EINVAL);
742 r = get_files_in_directory("/run/systemd/machines/", &l);
749 /* Filter out the unit: symlinks */
750 for (a = l, b = l; *a; a++) {
751 if (startswith(*a, "unit:"))
767 _public_ int sd_machine_get_class(const char *machine, char **class) {
768 _cleanup_free_ char *c = NULL;
772 assert_return(machine_name_is_valid(machine), -EINVAL);
773 assert_return(class, -EINVAL);
775 p = strappenda("/run/systemd/machines/", machine);
776 r = parse_env_file(p, NEWLINE, "CLASS", &c, NULL);
788 _public_ int sd_machine_get_ifindices(const char *machine, int **ifindices) {
789 _cleanup_free_ char *netif = NULL;
790 size_t l, allocated = 0, nr = 0;
792 const char *p, *word, *state;
795 assert_return(machine_name_is_valid(machine), -EINVAL);
796 assert_return(ifindices, -EINVAL);
798 p = strappenda("/run/systemd/machines/", machine);
799 r = parse_env_file(p, NEWLINE, "NETIF", &netif, NULL);
807 FOREACH_WORD(word, l, netif, state) {
811 *(char*) (mempcpy(buf, word, l)) = 0;
813 if (safe_atoi(buf, &ifi) < 0)
818 if (!GREEDY_REALLOC(ni, allocated, nr+1)) {
830 static inline int MONITOR_TO_FD(sd_login_monitor *m) {
831 return (int) (unsigned long) m - 1;
834 static inline sd_login_monitor* FD_TO_MONITOR(int fd) {
835 return (sd_login_monitor*) (unsigned long) (fd + 1);
838 _public_ int sd_login_monitor_new(const char *category, sd_login_monitor **m) {
842 assert_return(m, -EINVAL);
844 fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
848 if (!category || streq(category, "seat")) {
849 k = inotify_add_watch(fd, "/run/systemd/seats/", IN_MOVED_TO|IN_DELETE);
858 if (!category || streq(category, "session")) {
859 k = inotify_add_watch(fd, "/run/systemd/sessions/", IN_MOVED_TO|IN_DELETE);
868 if (!category || streq(category, "uid")) {
869 k = inotify_add_watch(fd, "/run/systemd/users/", IN_MOVED_TO|IN_DELETE);
878 if (!category || streq(category, "machine")) {
879 k = inotify_add_watch(fd, "/run/systemd/machines/", IN_MOVED_TO|IN_DELETE);
893 *m = FD_TO_MONITOR(fd);
897 _public_ sd_login_monitor* sd_login_monitor_unref(sd_login_monitor *m) {
900 assert_return(m, NULL);
902 fd = MONITOR_TO_FD(m);
908 _public_ int sd_login_monitor_flush(sd_login_monitor *m) {
910 assert_return(m, -EINVAL);
912 return flush_fd(MONITOR_TO_FD(m));
915 _public_ int sd_login_monitor_get_fd(sd_login_monitor *m) {
917 assert_return(m, -EINVAL);
919 return MONITOR_TO_FD(m);
922 _public_ int sd_login_monitor_get_events(sd_login_monitor *m) {
924 assert_return(m, -EINVAL);
926 /* For now we will only return POLLIN here, since we don't
927 * need anything else ever for inotify. However, let's have
928 * this API to keep our options open should we later on need
933 _public_ int sd_login_monitor_get_timeout(sd_login_monitor *m, uint64_t *timeout_usec) {
935 assert_return(m, -EINVAL);
936 assert_return(timeout_usec, -EINVAL);
938 /* For now we will only return (uint64_t) -1, since we don't
939 * need any timeout. However, let's have this API to keep our
940 * options open should we later on need it. */
941 *timeout_usec = (uint64_t) -1;