1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 Copyright 2011 Lennart Poettering
9 #include <sys/inotify.h>
14 #include "alloc-util.h"
15 #include "cgroup-util.h"
16 #include "dirent-util.h"
20 #include "format-util.h"
22 #include "hostname-util.h"
24 #include "login-util.h"
26 #include "parse-util.h"
27 #include "path-util.h"
28 #include "socket-util.h"
29 #include "string-util.h"
31 #include "user-util.h"
36 * invalid input parameters → -EINVAL
38 * process does not exist → -ESRCH
39 * cgroup does not exist → -ENOENT
40 * machine, session does not exist → -ENXIO
41 * requested metadata on object is missing → -ENODATA
44 _public_ int sd_pid_get_session(pid_t pid, char **session) {
47 assert_return(pid >= 0, -EINVAL);
48 assert_return(session, -EINVAL);
50 r = cg_pid_get_session(pid, session);
51 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
54 _public_ int sd_pid_get_unit(pid_t pid, char **unit) {
55 #if 0 /// UNNEEDED by elogind
59 assert_return(pid >= 0, -EINVAL);
60 assert_return(unit, -EINVAL);
62 #if 0 /// elogind does not support systemd units
63 r = cg_pid_get_unit(pid, unit);
64 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
70 _public_ int sd_pid_get_user_unit(pid_t pid, char **unit) {
71 #if 0 /// UNNEEDED by elogind
75 assert_return(pid >= 0, -EINVAL);
76 assert_return(unit, -EINVAL);
78 #if 0 /// elogind does not support systemd units
79 r = cg_pid_get_user_unit(pid, unit);
80 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
86 _public_ int sd_pid_get_machine_name(pid_t pid, char **name) {
87 #if 0 /// UNNEEDED by elogind
91 assert_return(pid >= 0, -EINVAL);
92 assert_return(name, -EINVAL);
94 #if 0 /// elogind does not support systemd units
95 r = cg_pid_get_machine_name(pid, name);
96 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
102 _public_ int sd_pid_get_slice(pid_t pid, char **slice) {
105 assert_return(pid >= 0, -EINVAL);
106 assert_return(slice, -EINVAL);
108 r = cg_pid_get_slice(pid, slice);
109 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
112 _public_ int sd_pid_get_user_slice(pid_t pid, char **slice) {
115 assert_return(pid >= 0, -EINVAL);
116 assert_return(slice, -EINVAL);
118 r = cg_pid_get_user_slice(pid, slice);
119 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
122 _public_ int sd_pid_get_owner_uid(pid_t pid, uid_t *uid) {
125 assert_return(pid >= 0, -EINVAL);
126 assert_return(uid, -EINVAL);
128 r = cg_pid_get_owner_uid(pid, uid);
129 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
132 _public_ int sd_pid_get_cgroup(pid_t pid, char **cgroup) {
136 assert_return(pid >= 0, -EINVAL);
137 assert_return(cgroup, -EINVAL);
139 r = cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER, pid, &c);
143 /* The internal APIs return the empty string for the root
144 * cgroup, let's return the "/" in the public APIs instead, as
145 * that's easier and less ambiguous for people to grok. */
158 _public_ int sd_peer_get_session(int fd, char **session) {
159 struct ucred ucred = {};
162 assert_return(fd >= 0, -EBADF);
163 assert_return(session, -EINVAL);
165 r = getpeercred(fd, &ucred);
169 return cg_pid_get_session(ucred.pid, session);
172 _public_ int sd_peer_get_owner_uid(int fd, uid_t *uid) {
176 assert_return(fd >= 0, -EBADF);
177 assert_return(uid, -EINVAL);
179 r = getpeercred(fd, &ucred);
183 return cg_pid_get_owner_uid(ucred.pid, uid);
186 _public_ int sd_peer_get_unit(int fd, char **unit) {
190 assert_return(fd >= 0, -EBADF);
191 assert_return(unit, -EINVAL);
193 r = getpeercred(fd, &ucred);
197 #if 0 /// elogind does not support systemd units
198 return cg_pid_get_unit(ucred.pid, unit);
204 _public_ int sd_peer_get_user_unit(int fd, char **unit) {
208 assert_return(fd >= 0, -EBADF);
209 assert_return(unit, -EINVAL);
211 r = getpeercred(fd, &ucred);
215 #if 0 /// elogind does not support systemd units
216 return cg_pid_get_user_unit(ucred.pid, unit);
222 _public_ int sd_peer_get_machine_name(int fd, char **machine) {
226 assert_return(fd >= 0, -EBADF);
227 assert_return(machine, -EINVAL);
229 r = getpeercred(fd, &ucred);
233 #if 0 /// elogind does not support systemd units
234 return cg_pid_get_machine_name(ucred.pid, machine);
240 _public_ int sd_peer_get_slice(int fd, char **slice) {
244 assert_return(fd >= 0, -EBADF);
245 assert_return(slice, -EINVAL);
247 r = getpeercred(fd, &ucred);
251 return cg_pid_get_slice(ucred.pid, slice);
254 _public_ int sd_peer_get_user_slice(int fd, char **slice) {
258 assert_return(fd >= 0, -EBADF);
259 assert_return(slice, -EINVAL);
261 r = getpeercred(fd, &ucred);
265 return cg_pid_get_user_slice(ucred.pid, slice);
268 _public_ int sd_peer_get_cgroup(int fd, char **cgroup) {
272 assert_return(fd >= 0, -EBADF);
273 assert_return(cgroup, -EINVAL);
275 r = getpeercred(fd, &ucred);
279 return sd_pid_get_cgroup(ucred.pid, cgroup);
282 static int file_of_uid(uid_t uid, char **p) {
284 assert_return(uid_is_valid(uid), -EINVAL);
287 if (asprintf(p, "/run/systemd/users/" UID_FMT, uid) < 0)
293 _public_ int sd_uid_get_state(uid_t uid, char**state) {
294 _cleanup_free_ char *p = NULL;
298 assert_return(state, -EINVAL);
300 r = file_of_uid(uid, &p);
304 r = parse_env_file(NULL, p, NEWLINE, "STATE", &s, NULL);
307 s = strdup("offline");
325 _public_ int sd_uid_get_display(uid_t uid, char **session) {
326 _cleanup_free_ char *p = NULL, *s = NULL;
329 assert_return(session, -EINVAL);
331 r = file_of_uid(uid, &p);
335 r = parse_env_file(NULL, p, NEWLINE, "DISPLAY", &s, NULL);
343 *session = TAKE_PTR(s);
348 static int file_of_seat(const char *seat, char **_p) {
355 if (!filename_is_valid(seat))
358 p = strappend("/run/systemd/seats/", seat);
360 _cleanup_free_ char *buf = NULL;
362 r = sd_session_get_seat(NULL, &buf);
366 p = strappend("/run/systemd/seats/", buf);
376 _public_ int sd_uid_is_on_seat(uid_t uid, int require_active, const char *seat) {
377 _cleanup_free_ char *t = NULL, *s = NULL, *p = NULL;
380 const char *word, *variable, *state;
382 assert_return(uid_is_valid(uid), -EINVAL);
384 r = file_of_seat(seat, &p);
388 variable = require_active ? "ACTIVE_UID" : "UIDS";
390 r = parse_env_file(NULL, p, NEWLINE, variable, &s, NULL);
398 if (asprintf(&t, UID_FMT, uid) < 0)
401 FOREACH_WORD(word, l, s, state)
402 if (strneq(t, word, l))
408 static int uid_get_array(uid_t uid, const char *variable, char ***array) {
409 _cleanup_free_ char *p = NULL, *s = NULL;
415 r = file_of_uid(uid, &p);
419 r = parse_env_file(NULL, p, NEWLINE, variable, &s, NULL);
420 if (r == -ENOENT || (r >= 0 && isempty(s))) {
428 a = strv_split(s, " ");
433 r = (int) strv_length(a);
443 _public_ int sd_uid_get_sessions(uid_t uid, int require_active, char ***sessions) {
444 return uid_get_array(
446 require_active == 0 ? "ONLINE_SESSIONS" :
447 require_active > 0 ? "ACTIVE_SESSIONS" :
452 _public_ int sd_uid_get_seats(uid_t uid, int require_active, char ***seats) {
453 return uid_get_array(
455 require_active == 0 ? "ONLINE_SEATS" :
456 require_active > 0 ? "ACTIVE_SEATS" :
461 static int file_of_session(const char *session, char **_p) {
468 if (!session_id_valid(session))
471 p = strappend("/run/systemd/sessions/", session);
473 _cleanup_free_ char *buf = NULL;
475 r = sd_pid_get_session(0, &buf);
479 p = strappend("/run/systemd/sessions/", buf);
489 _public_ int sd_session_is_active(const char *session) {
490 _cleanup_free_ char *p = NULL, *s = NULL;
493 r = file_of_session(session, &p);
497 r = parse_env_file(NULL, p, NEWLINE, "ACTIVE", &s, NULL);
505 return parse_boolean(s);
508 _public_ int sd_session_is_remote(const char *session) {
509 _cleanup_free_ char *p = NULL, *s = NULL;
512 r = file_of_session(session, &p);
516 r = parse_env_file(NULL, p, NEWLINE, "REMOTE", &s, NULL);
524 return parse_boolean(s);
527 _public_ int sd_session_get_state(const char *session, char **state) {
528 _cleanup_free_ char *p = NULL, *s = NULL;
531 assert_return(state, -EINVAL);
533 r = file_of_session(session, &p);
537 r = parse_env_file(NULL, p, NEWLINE, "STATE", &s, NULL);
545 *state = TAKE_PTR(s);
550 _public_ int sd_session_get_uid(const char *session, uid_t *uid) {
552 _cleanup_free_ char *p = NULL, *s = NULL;
554 assert_return(uid, -EINVAL);
556 r = file_of_session(session, &p);
560 r = parse_env_file(NULL, p, NEWLINE, "UID", &s, NULL);
568 return parse_uid(s, uid);
571 static int session_get_string(const char *session, const char *field, char **value) {
572 _cleanup_free_ char *p = NULL, *s = NULL;
575 assert_return(value, -EINVAL);
578 r = file_of_session(session, &p);
582 r = parse_env_file(NULL, p, NEWLINE, field, &s, NULL);
590 *value = TAKE_PTR(s);
594 _public_ int sd_session_get_seat(const char *session, char **seat) {
595 return session_get_string(session, "SEAT", seat);
598 _public_ int sd_session_get_tty(const char *session, char **tty) {
599 return session_get_string(session, "TTY", tty);
602 _public_ int sd_session_get_vt(const char *session, unsigned *vtnr) {
603 _cleanup_free_ char *vtnr_string = NULL;
607 assert_return(vtnr, -EINVAL);
609 r = session_get_string(session, "VTNR", &vtnr_string);
613 r = safe_atou(vtnr_string, &u);
621 _public_ int sd_session_get_service(const char *session, char **service) {
622 return session_get_string(session, "SERVICE", service);
625 _public_ int sd_session_get_type(const char *session, char **type) {
626 return session_get_string(session, "TYPE", type);
629 _public_ int sd_session_get_class(const char *session, char **class) {
630 return session_get_string(session, "CLASS", class);
633 _public_ int sd_session_get_desktop(const char *session, char **desktop) {
634 _cleanup_free_ char *escaped = NULL;
638 assert_return(desktop, -EINVAL);
640 r = session_get_string(session, "DESKTOP", &escaped);
644 r = cunescape(escaped, 0, &t);
652 _public_ int sd_session_get_display(const char *session, char **display) {
653 return session_get_string(session, "DISPLAY", display);
656 _public_ int sd_session_get_remote_user(const char *session, char **remote_user) {
657 return session_get_string(session, "REMOTE_USER", remote_user);
660 _public_ int sd_session_get_remote_host(const char *session, char **remote_host) {
661 return session_get_string(session, "REMOTE_HOST", remote_host);
664 _public_ int sd_seat_get_active(const char *seat, char **session, uid_t *uid) {
665 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
668 assert_return(session || uid, -EINVAL);
670 r = file_of_seat(seat, &p);
674 r = parse_env_file(NULL, p, NEWLINE,
690 r = parse_uid(t, uid);
696 *session = TAKE_PTR(s);
701 _public_ int sd_seat_get_sessions(const char *seat, char ***sessions, uid_t **uids, unsigned *n_uids) {
702 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
703 _cleanup_strv_free_ char **a = NULL;
704 _cleanup_free_ uid_t *b = NULL;
708 r = file_of_seat(seat, &p);
712 r = parse_env_file(NULL, p, NEWLINE,
722 a = strv_split(s, " ");
728 const char *word, *state;
731 FOREACH_WORD(word, l, t, state)
741 FOREACH_WORD(word, l, t, state) {
742 _cleanup_free_ char *k = NULL;
744 k = strndup(word, l);
748 r = parse_uid(k, b + i);
757 r = (int) strv_length(a);
760 *sessions = TAKE_PTR(a);
771 static int seat_get_can(const char *seat, const char *variable) {
772 _cleanup_free_ char *p = NULL, *s = NULL;
777 r = file_of_seat(seat, &p);
781 r = parse_env_file(NULL, p, NEWLINE,
791 return parse_boolean(s);
794 _public_ int sd_seat_can_multi_session(const char *seat) {
795 return seat_get_can(seat, "CAN_MULTI_SESSION");
798 _public_ int sd_seat_can_tty(const char *seat) {
799 return seat_get_can(seat, "CAN_TTY");
802 _public_ int sd_seat_can_graphical(const char *seat) {
803 return seat_get_can(seat, "CAN_GRAPHICAL");
806 _public_ int sd_get_seats(char ***seats) {
809 r = get_files_in_directory("/run/systemd/seats/", seats);
818 _public_ int sd_get_sessions(char ***sessions) {
821 r = get_files_in_directory("/run/systemd/sessions/", sessions);
830 _public_ int sd_get_uids(uid_t **users) {
831 _cleanup_closedir_ DIR *d;
835 _cleanup_free_ uid_t *l = NULL;
837 d = opendir("/run/systemd/users/");
839 if (errno == ENOENT) {
847 FOREACH_DIRENT_ALL(de, d, return -errno) {
851 dirent_ensure_type(d, de);
853 if (!dirent_is_file(de))
856 k = parse_uid(de->d_name, &uid);
861 if ((unsigned) r >= n) {
865 t = realloc(l, sizeof(uid_t) * n);
872 assert((unsigned) r < n);
879 *users = TAKE_PTR(l);
884 _public_ int sd_get_machine_names(char ***machines) {
885 _cleanup_strv_free_ char **l = NULL;
889 r = get_files_in_directory("/run/systemd/machines/", &l);
901 /* Filter out the unit: symlinks */
902 for (a = b = l; *a; a++) {
903 if (startswith(*a, "unit:") || !machine_name_is_valid(*a))
916 *machines = TAKE_PTR(l);
921 _public_ int sd_machine_get_class(const char *machine, char **class) {
922 _cleanup_free_ char *c = NULL;
926 assert_return(machine_name_is_valid(machine), -EINVAL);
927 assert_return(class, -EINVAL);
929 p = strjoina("/run/systemd/machines/", machine);
930 r = parse_env_file(NULL, p, NEWLINE, "CLASS", &c, NULL);
938 *class = TAKE_PTR(c);
943 _public_ int sd_machine_get_ifindices(const char *machine, int **ifindices) {
944 _cleanup_free_ char *netif = NULL;
945 size_t l, allocated = 0, nr = 0;
947 const char *p, *word, *state;
950 assert_return(machine_name_is_valid(machine), -EINVAL);
951 assert_return(ifindices, -EINVAL);
953 p = strjoina("/run/systemd/machines/", machine);
954 r = parse_env_file(NULL, p, NEWLINE, "NETIF", &netif, NULL);
964 FOREACH_WORD(word, l, netif, state) {
968 *(char*) (mempcpy(buf, word, l)) = 0;
970 if (parse_ifindex(buf, &ifi) < 0)
973 if (!GREEDY_REALLOC(ni, allocated, nr+1)) {
985 static inline int MONITOR_TO_FD(sd_login_monitor *m) {
986 return (int) (unsigned long) m - 1;
989 static inline sd_login_monitor* FD_TO_MONITOR(int fd) {
990 return (sd_login_monitor*) (unsigned long) (fd + 1);
993 _public_ int sd_login_monitor_new(const char *category, sd_login_monitor **m) {
994 _cleanup_close_ int fd = -1;
998 assert_return(m, -EINVAL);
1000 fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
1004 if (!category || streq(category, "seat")) {
1005 k = inotify_add_watch(fd, "/run/systemd/seats/", IN_MOVED_TO|IN_DELETE);
1012 if (!category || streq(category, "session")) {
1013 k = inotify_add_watch(fd, "/run/systemd/sessions/", IN_MOVED_TO|IN_DELETE);
1020 if (!category || streq(category, "uid")) {
1021 k = inotify_add_watch(fd, "/run/systemd/users/", IN_MOVED_TO|IN_DELETE);
1028 if (!category || streq(category, "machine")) {
1029 k = inotify_add_watch(fd, "/run/systemd/machines/", IN_MOVED_TO|IN_DELETE);
1039 *m = FD_TO_MONITOR(fd);
1045 _public_ sd_login_monitor* sd_login_monitor_unref(sd_login_monitor *m) {
1051 fd = MONITOR_TO_FD(m);
1057 _public_ int sd_login_monitor_flush(sd_login_monitor *m) {
1060 assert_return(m, -EINVAL);
1062 r = flush_fd(MONITOR_TO_FD(m));
1069 _public_ int sd_login_monitor_get_fd(sd_login_monitor *m) {
1071 assert_return(m, -EINVAL);
1073 return MONITOR_TO_FD(m);
1076 _public_ int sd_login_monitor_get_events(sd_login_monitor *m) {
1078 assert_return(m, -EINVAL);
1080 /* For now we will only return POLLIN here, since we don't
1081 * need anything else ever for inotify. However, let's have
1082 * this API to keep our options open should we later on need
1087 _public_ int sd_login_monitor_get_timeout(sd_login_monitor *m, uint64_t *timeout_usec) {
1089 assert_return(m, -EINVAL);
1090 assert_return(timeout_usec, -EINVAL);
1092 /* For now we will only return (uint64_t) -1, since we don't
1093 * need any timeout. However, let's have this API to keep our
1094 * options open should we later on need it. */
1095 *timeout_usec = (uint64_t) -1;