1 /* SPDX-License-Identifier: LGPL-2.1+ */
8 #include <sys/inotify.h>
13 #include "alloc-util.h"
14 #include "cgroup-util.h"
15 #include "dirent-util.h"
19 #include "format-util.h"
21 #include "hostname-util.h"
23 #include "login-util.h"
25 #include "parse-util.h"
26 #include "path-util.h"
27 #include "socket-util.h"
28 #include "string-util.h"
30 #include "user-util.h"
35 * invalid input parameters → -EINVAL
37 * process does not exist → -ESRCH
38 * cgroup does not exist → -ENOENT
39 * machine, session does not exist → -ENXIO
40 * requested metadata on object is missing → -ENODATA
43 _public_ int sd_pid_get_session(pid_t pid, char **session) {
46 assert_return(pid >= 0, -EINVAL);
47 assert_return(session, -EINVAL);
49 r = cg_pid_get_session(pid, session);
50 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
53 _public_ int sd_pid_get_unit(pid_t pid, char **unit) {
54 #if 0 /// UNNEEDED by elogind
58 assert_return(pid >= 0, -EINVAL);
59 assert_return(unit, -EINVAL);
61 #if 0 /// elogind does not support systemd units
62 r = cg_pid_get_unit(pid, unit);
63 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
69 _public_ int sd_pid_get_user_unit(pid_t pid, char **unit) {
70 #if 0 /// UNNEEDED by elogind
74 assert_return(pid >= 0, -EINVAL);
75 assert_return(unit, -EINVAL);
77 #if 0 /// elogind does not support systemd units
78 r = cg_pid_get_user_unit(pid, unit);
79 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
85 _public_ int sd_pid_get_machine_name(pid_t pid, char **name) {
86 #if 0 /// UNNEEDED by elogind
90 assert_return(pid >= 0, -EINVAL);
91 assert_return(name, -EINVAL);
93 #if 0 /// elogind does not support systemd units
94 r = cg_pid_get_machine_name(pid, name);
95 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
101 _public_ int sd_pid_get_slice(pid_t pid, char **slice) {
104 assert_return(pid >= 0, -EINVAL);
105 assert_return(slice, -EINVAL);
107 r = cg_pid_get_slice(pid, slice);
108 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
111 _public_ int sd_pid_get_user_slice(pid_t pid, char **slice) {
114 assert_return(pid >= 0, -EINVAL);
115 assert_return(slice, -EINVAL);
117 r = cg_pid_get_user_slice(pid, slice);
118 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
121 _public_ int sd_pid_get_owner_uid(pid_t pid, uid_t *uid) {
124 assert_return(pid >= 0, -EINVAL);
125 assert_return(uid, -EINVAL);
127 r = cg_pid_get_owner_uid(pid, uid);
128 return IN_SET(r, -ENXIO, -ENOMEDIUM) ? -ENODATA : r;
131 _public_ int sd_pid_get_cgroup(pid_t pid, char **cgroup) {
135 assert_return(pid >= 0, -EINVAL);
136 assert_return(cgroup, -EINVAL);
138 r = cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER, pid, &c);
142 /* The internal APIs return the empty string for the root
143 * cgroup, let's return the "/" in the public APIs instead, as
144 * that's easier and less ambiguous for people to grok. */
157 _public_ int sd_peer_get_session(int fd, char **session) {
158 struct ucred ucred = {};
161 assert_return(fd >= 0, -EBADF);
162 assert_return(session, -EINVAL);
164 r = getpeercred(fd, &ucred);
168 return cg_pid_get_session(ucred.pid, session);
171 _public_ int sd_peer_get_owner_uid(int fd, uid_t *uid) {
175 assert_return(fd >= 0, -EBADF);
176 assert_return(uid, -EINVAL);
178 r = getpeercred(fd, &ucred);
182 return cg_pid_get_owner_uid(ucred.pid, uid);
185 _public_ int sd_peer_get_unit(int fd, char **unit) {
189 assert_return(fd >= 0, -EBADF);
190 assert_return(unit, -EINVAL);
192 r = getpeercred(fd, &ucred);
196 #if 0 /// elogind does not support systemd units
197 return cg_pid_get_unit(ucred.pid, unit);
203 _public_ int sd_peer_get_user_unit(int fd, char **unit) {
207 assert_return(fd >= 0, -EBADF);
208 assert_return(unit, -EINVAL);
210 r = getpeercred(fd, &ucred);
214 #if 0 /// elogind does not support systemd units
215 return cg_pid_get_user_unit(ucred.pid, unit);
221 _public_ int sd_peer_get_machine_name(int fd, char **machine) {
225 assert_return(fd >= 0, -EBADF);
226 assert_return(machine, -EINVAL);
228 r = getpeercred(fd, &ucred);
232 #if 0 /// elogind does not support systemd units
233 return cg_pid_get_machine_name(ucred.pid, machine);
239 _public_ int sd_peer_get_slice(int fd, char **slice) {
243 assert_return(fd >= 0, -EBADF);
244 assert_return(slice, -EINVAL);
246 r = getpeercred(fd, &ucred);
250 return cg_pid_get_slice(ucred.pid, slice);
253 _public_ int sd_peer_get_user_slice(int fd, char **slice) {
257 assert_return(fd >= 0, -EBADF);
258 assert_return(slice, -EINVAL);
260 r = getpeercred(fd, &ucred);
264 return cg_pid_get_user_slice(ucred.pid, slice);
267 _public_ int sd_peer_get_cgroup(int fd, char **cgroup) {
271 assert_return(fd >= 0, -EBADF);
272 assert_return(cgroup, -EINVAL);
274 r = getpeercred(fd, &ucred);
278 return sd_pid_get_cgroup(ucred.pid, cgroup);
281 static int file_of_uid(uid_t uid, char **p) {
283 assert_return(uid_is_valid(uid), -EINVAL);
286 if (asprintf(p, "/run/systemd/users/" UID_FMT, uid) < 0)
292 _public_ int sd_uid_get_state(uid_t uid, char**state) {
293 _cleanup_free_ char *p = NULL;
297 assert_return(state, -EINVAL);
299 r = file_of_uid(uid, &p);
303 r = parse_env_file(NULL, p, NEWLINE, "STATE", &s, NULL);
306 s = strdup("offline");
324 _public_ int sd_uid_get_display(uid_t uid, char **session) {
325 _cleanup_free_ char *p = NULL, *s = NULL;
328 assert_return(session, -EINVAL);
330 r = file_of_uid(uid, &p);
334 r = parse_env_file(NULL, p, NEWLINE, "DISPLAY", &s, NULL);
342 *session = TAKE_PTR(s);
347 static int file_of_seat(const char *seat, char **_p) {
354 if (!filename_is_valid(seat))
357 p = strappend("/run/systemd/seats/", seat);
359 _cleanup_free_ char *buf = NULL;
361 r = sd_session_get_seat(NULL, &buf);
365 p = strappend("/run/systemd/seats/", buf);
375 _public_ int sd_uid_is_on_seat(uid_t uid, int require_active, const char *seat) {
376 _cleanup_free_ char *t = NULL, *s = NULL, *p = NULL;
379 const char *word, *variable, *state;
381 assert_return(uid_is_valid(uid), -EINVAL);
383 r = file_of_seat(seat, &p);
387 variable = require_active ? "ACTIVE_UID" : "UIDS";
389 r = parse_env_file(NULL, p, NEWLINE, variable, &s, NULL);
397 if (asprintf(&t, UID_FMT, uid) < 0)
400 FOREACH_WORD(word, l, s, state)
401 if (strneq(t, word, l))
407 static int uid_get_array(uid_t uid, const char *variable, char ***array) {
408 _cleanup_free_ char *p = NULL, *s = NULL;
414 r = file_of_uid(uid, &p);
418 r = parse_env_file(NULL, p, NEWLINE, variable, &s, NULL);
419 if (r == -ENOENT || (r >= 0 && isempty(s))) {
427 a = strv_split(s, " ");
432 r = (int) strv_length(a);
442 _public_ int sd_uid_get_sessions(uid_t uid, int require_active, char ***sessions) {
443 return uid_get_array(
445 require_active == 0 ? "ONLINE_SESSIONS" :
446 require_active > 0 ? "ACTIVE_SESSIONS" :
451 _public_ int sd_uid_get_seats(uid_t uid, int require_active, char ***seats) {
452 return uid_get_array(
454 require_active == 0 ? "ONLINE_SEATS" :
455 require_active > 0 ? "ACTIVE_SEATS" :
460 static int file_of_session(const char *session, char **_p) {
467 if (!session_id_valid(session))
470 p = strappend("/run/systemd/sessions/", session);
472 _cleanup_free_ char *buf = NULL;
474 r = sd_pid_get_session(0, &buf);
478 p = strappend("/run/systemd/sessions/", buf);
488 _public_ int sd_session_is_active(const char *session) {
489 _cleanup_free_ char *p = NULL, *s = NULL;
492 r = file_of_session(session, &p);
496 r = parse_env_file(NULL, p, NEWLINE, "ACTIVE", &s, NULL);
504 return parse_boolean(s);
507 _public_ int sd_session_is_remote(const char *session) {
508 _cleanup_free_ char *p = NULL, *s = NULL;
511 r = file_of_session(session, &p);
515 r = parse_env_file(NULL, p, NEWLINE, "REMOTE", &s, NULL);
523 return parse_boolean(s);
526 _public_ int sd_session_get_state(const char *session, char **state) {
527 _cleanup_free_ char *p = NULL, *s = NULL;
530 assert_return(state, -EINVAL);
532 r = file_of_session(session, &p);
536 r = parse_env_file(NULL, p, NEWLINE, "STATE", &s, NULL);
544 *state = TAKE_PTR(s);
549 _public_ int sd_session_get_uid(const char *session, uid_t *uid) {
551 _cleanup_free_ char *p = NULL, *s = NULL;
553 assert_return(uid, -EINVAL);
555 r = file_of_session(session, &p);
559 r = parse_env_file(NULL, p, NEWLINE, "UID", &s, NULL);
567 return parse_uid(s, uid);
570 static int session_get_string(const char *session, const char *field, char **value) {
571 _cleanup_free_ char *p = NULL, *s = NULL;
574 assert_return(value, -EINVAL);
577 r = file_of_session(session, &p);
581 r = parse_env_file(NULL, p, NEWLINE, field, &s, NULL);
589 *value = TAKE_PTR(s);
593 _public_ int sd_session_get_seat(const char *session, char **seat) {
594 return session_get_string(session, "SEAT", seat);
597 _public_ int sd_session_get_tty(const char *session, char **tty) {
598 return session_get_string(session, "TTY", tty);
601 _public_ int sd_session_get_vt(const char *session, unsigned *vtnr) {
602 _cleanup_free_ char *vtnr_string = NULL;
606 assert_return(vtnr, -EINVAL);
608 r = session_get_string(session, "VTNR", &vtnr_string);
612 r = safe_atou(vtnr_string, &u);
620 _public_ int sd_session_get_service(const char *session, char **service) {
621 return session_get_string(session, "SERVICE", service);
624 _public_ int sd_session_get_type(const char *session, char **type) {
625 return session_get_string(session, "TYPE", type);
628 _public_ int sd_session_get_class(const char *session, char **class) {
629 return session_get_string(session, "CLASS", class);
632 _public_ int sd_session_get_desktop(const char *session, char **desktop) {
633 _cleanup_free_ char *escaped = NULL;
637 assert_return(desktop, -EINVAL);
639 r = session_get_string(session, "DESKTOP", &escaped);
643 r = cunescape(escaped, 0, &t);
651 _public_ int sd_session_get_display(const char *session, char **display) {
652 return session_get_string(session, "DISPLAY", display);
655 _public_ int sd_session_get_remote_user(const char *session, char **remote_user) {
656 return session_get_string(session, "REMOTE_USER", remote_user);
659 _public_ int sd_session_get_remote_host(const char *session, char **remote_host) {
660 return session_get_string(session, "REMOTE_HOST", remote_host);
663 _public_ int sd_seat_get_active(const char *seat, char **session, uid_t *uid) {
664 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
667 assert_return(session || uid, -EINVAL);
669 r = file_of_seat(seat, &p);
673 r = parse_env_file(NULL, p, NEWLINE,
689 r = parse_uid(t, uid);
695 *session = TAKE_PTR(s);
700 _public_ int sd_seat_get_sessions(const char *seat, char ***sessions, uid_t **uids, unsigned *n_uids) {
701 _cleanup_free_ char *p = NULL, *s = NULL, *t = NULL;
702 _cleanup_strv_free_ char **a = NULL;
703 _cleanup_free_ uid_t *b = NULL;
707 r = file_of_seat(seat, &p);
711 r = parse_env_file(NULL, p, NEWLINE,
721 a = strv_split(s, " ");
727 const char *word, *state;
730 FOREACH_WORD(word, l, t, state)
740 FOREACH_WORD(word, l, t, state) {
741 _cleanup_free_ char *k = NULL;
743 k = strndup(word, l);
747 r = parse_uid(k, b + i);
756 r = (int) strv_length(a);
759 *sessions = TAKE_PTR(a);
770 static int seat_get_can(const char *seat, const char *variable) {
771 _cleanup_free_ char *p = NULL, *s = NULL;
776 r = file_of_seat(seat, &p);
780 r = parse_env_file(NULL, p, NEWLINE,
790 return parse_boolean(s);
793 _public_ int sd_seat_can_multi_session(const char *seat) {
794 return seat_get_can(seat, "CAN_MULTI_SESSION");
797 _public_ int sd_seat_can_tty(const char *seat) {
798 return seat_get_can(seat, "CAN_TTY");
801 _public_ int sd_seat_can_graphical(const char *seat) {
802 return seat_get_can(seat, "CAN_GRAPHICAL");
805 _public_ int sd_get_seats(char ***seats) {
808 r = get_files_in_directory("/run/systemd/seats/", seats);
817 _public_ int sd_get_sessions(char ***sessions) {
820 r = get_files_in_directory("/run/systemd/sessions/", sessions);
829 _public_ int sd_get_uids(uid_t **users) {
830 _cleanup_closedir_ DIR *d;
834 _cleanup_free_ uid_t *l = NULL;
836 d = opendir("/run/systemd/users/");
838 if (errno == ENOENT) {
846 FOREACH_DIRENT_ALL(de, d, return -errno) {
850 dirent_ensure_type(d, de);
852 if (!dirent_is_file(de))
855 k = parse_uid(de->d_name, &uid);
860 if ((unsigned) r >= n) {
864 t = realloc(l, sizeof(uid_t) * n);
871 assert((unsigned) r < n);
878 *users = TAKE_PTR(l);
883 _public_ int sd_get_machine_names(char ***machines) {
884 _cleanup_strv_free_ char **l = NULL;
888 r = get_files_in_directory("/run/systemd/machines/", &l);
900 /* Filter out the unit: symlinks */
901 for (a = b = l; *a; a++) {
902 if (startswith(*a, "unit:") || !machine_name_is_valid(*a))
915 *machines = TAKE_PTR(l);
920 _public_ int sd_machine_get_class(const char *machine, char **class) {
921 _cleanup_free_ char *c = NULL;
925 assert_return(machine_name_is_valid(machine), -EINVAL);
926 assert_return(class, -EINVAL);
928 p = strjoina("/run/systemd/machines/", machine);
929 r = parse_env_file(NULL, p, NEWLINE, "CLASS", &c, NULL);
937 *class = TAKE_PTR(c);
942 _public_ int sd_machine_get_ifindices(const char *machine, int **ifindices) {
943 _cleanup_free_ char *netif = NULL;
944 size_t l, allocated = 0, nr = 0;
946 const char *p, *word, *state;
949 assert_return(machine_name_is_valid(machine), -EINVAL);
950 assert_return(ifindices, -EINVAL);
952 p = strjoina("/run/systemd/machines/", machine);
953 r = parse_env_file(NULL, p, NEWLINE, "NETIF", &netif, NULL);
963 FOREACH_WORD(word, l, netif, state) {
967 *(char*) (mempcpy(buf, word, l)) = 0;
969 if (parse_ifindex(buf, &ifi) < 0)
972 if (!GREEDY_REALLOC(ni, allocated, nr+1)) {
984 static inline int MONITOR_TO_FD(sd_login_monitor *m) {
985 return (int) (unsigned long) m - 1;
988 static inline sd_login_monitor* FD_TO_MONITOR(int fd) {
989 return (sd_login_monitor*) (unsigned long) (fd + 1);
992 _public_ int sd_login_monitor_new(const char *category, sd_login_monitor **m) {
993 _cleanup_close_ int fd = -1;
997 assert_return(m, -EINVAL);
999 fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
1003 if (!category || streq(category, "seat")) {
1004 k = inotify_add_watch(fd, "/run/systemd/seats/", IN_MOVED_TO|IN_DELETE);
1011 if (!category || streq(category, "session")) {
1012 k = inotify_add_watch(fd, "/run/systemd/sessions/", IN_MOVED_TO|IN_DELETE);
1019 if (!category || streq(category, "uid")) {
1020 k = inotify_add_watch(fd, "/run/systemd/users/", IN_MOVED_TO|IN_DELETE);
1027 if (!category || streq(category, "machine")) {
1028 k = inotify_add_watch(fd, "/run/systemd/machines/", IN_MOVED_TO|IN_DELETE);
1038 *m = FD_TO_MONITOR(fd);
1044 _public_ sd_login_monitor* sd_login_monitor_unref(sd_login_monitor *m) {
1050 fd = MONITOR_TO_FD(m);
1056 _public_ int sd_login_monitor_flush(sd_login_monitor *m) {
1059 assert_return(m, -EINVAL);
1061 r = flush_fd(MONITOR_TO_FD(m));
1068 _public_ int sd_login_monitor_get_fd(sd_login_monitor *m) {
1070 assert_return(m, -EINVAL);
1072 return MONITOR_TO_FD(m);
1075 _public_ int sd_login_monitor_get_events(sd_login_monitor *m) {
1077 assert_return(m, -EINVAL);
1079 /* For now we will only return POLLIN here, since we don't
1080 * need anything else ever for inotify. However, let's have
1081 * this API to keep our options open should we later on need
1086 _public_ int sd_login_monitor_get_timeout(sd_login_monitor *m, uint64_t *timeout_usec) {
1088 assert_return(m, -EINVAL);
1089 assert_return(timeout_usec, -EINVAL);
1091 /* For now we will only return (uint64_t) -1, since we don't
1092 * need any timeout. However, let's have this API to keep our
1093 * options open should we later on need it. */
1094 *timeout_usec = (uint64_t) -1;