From b750101eb236130cf056c675997decbac904cc49 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 17:35:18 +0200 Subject: Adding upstream version 252.22. Signed-off-by: Daniel Baumann --- src/systemctl/systemctl-logind.c | 414 +++++++++++++++++++++++++++++++++++++++ 1 file changed, 414 insertions(+) create mode 100644 src/systemctl/systemctl-logind.c (limited to 'src/systemctl/systemctl-logind.c') diff --git a/src/systemctl/systemctl-logind.c b/src/systemctl/systemctl-logind.c new file mode 100644 index 0000000..1c3b68f --- /dev/null +++ b/src/systemctl/systemctl-logind.c @@ -0,0 +1,414 @@ +/* SPDX-License-Identifier: LGPL-2.1-or-later */ + +#include + +#include "sd-login.h" + +#include "bus-error.h" +#include "bus-locator.h" +#include "login-util.h" +#include "process-util.h" +#include "systemctl-logind.h" +#include "systemctl-start-unit.h" +#include "systemctl-util.h" +#include "systemctl.h" +#include "terminal-util.h" +#include "user-util.h" + +static int logind_set_wall_message(sd_bus *bus) { +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + _cleanup_free_ char *m = NULL; + int r; + + m = strv_join(arg_wall, " "); + if (!m) + return log_oom(); + + log_debug("%s wall message \"%s\".", arg_dry_run ? "Would set" : "Setting", m); + if (arg_dry_run) + return 0; + + r = bus_call_method(bus, bus_login_mgr, "SetWallMessage", &error, NULL, "sb", m, !arg_no_wall); + if (r < 0) + return log_warning_errno(r, "Failed to set wall message, ignoring: %s", bus_error_message(&error, r)); +#endif + return 0; +} + +/* Ask systemd-logind, which might grant access to unprivileged users through polkit */ +int logind_reboot(enum action a) { +#if ENABLE_LOGIND + static const char* actions[_ACTION_MAX] = { + [ACTION_POWEROFF] = "PowerOff", + [ACTION_REBOOT] = "Reboot", + [ACTION_KEXEC] = "Reboot", + [ACTION_HALT] = "Halt", + [ACTION_SUSPEND] = "Suspend", + [ACTION_HIBERNATE] = "Hibernate", + [ACTION_HYBRID_SLEEP] = "HybridSleep", + [ACTION_SUSPEND_THEN_HIBERNATE] = "SuspendThenHibernate", + }; + + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + uint64_t flags = 0; + sd_bus *bus; + int r; + + if (a < 0 || a >= _ACTION_MAX || !actions[a]) + return -EINVAL; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + polkit_agent_open_maybe(); + (void) logind_set_wall_message(bus); + + const char *method_with_flags = strjoina(actions[a], "WithFlags"); + + log_debug("%s org.freedesktop.login1.Manager %s dbus call.", + arg_dry_run ? "Would execute" : "Executing", method_with_flags); + + if (arg_dry_run) + return 0; + + SET_FLAG(flags, SD_LOGIND_ROOT_CHECK_INHIBITORS, arg_check_inhibitors > 0); + SET_FLAG(flags, SD_LOGIND_REBOOT_VIA_KEXEC, a == ACTION_KEXEC); + + r = bus_call_method(bus, bus_login_mgr, method_with_flags, &error, NULL, "t", flags); + if (r >= 0) + return 0; + if (!sd_bus_error_has_name(&error, SD_BUS_ERROR_UNKNOWN_METHOD)) + return log_error_errno(r, "Call to %s failed: %s", actions[a], bus_error_message(&error, r)); + + /* Fall back to original methods in case there is an older version of systemd-logind */ + log_debug("Method %s not available: %s. Falling back to %s", method_with_flags, bus_error_message(&error, r), actions[a]); + sd_bus_error_free(&error); + + r = bus_call_method(bus, bus_login_mgr, actions[a], &error, NULL, "b", arg_ask_password); + if (r < 0) + return log_error_errno(r, "Call to %s failed: %s", actions[a], bus_error_message(&error, r)); + + return 0; +#else + return -ENOSYS; +#endif +} + +int logind_check_inhibitors(enum action a) { +#if ENABLE_LOGIND + _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL; + _cleanup_strv_free_ char **sessions = NULL; + const char *what, *who, *why, *mode; + uint32_t uid, pid; + sd_bus *bus; + unsigned c = 0; + int r; + + if (arg_check_inhibitors == 0 || arg_force > 0) + return 0; + + if (arg_when > 0) + return 0; + + if (arg_check_inhibitors < 0) { + if (geteuid() == 0) + return 0; + + if (!on_tty()) + return 0; + } + + if (arg_transport != BUS_TRANSPORT_LOCAL) + return 0; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + r = bus_call_method(bus, bus_login_mgr, "ListInhibitors", NULL, &reply, NULL); + if (r < 0) + /* If logind is not around, then there are no inhibitors... */ + return 0; + + r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "(ssssuu)"); + if (r < 0) + return bus_log_parse_error(r); + + while ((r = sd_bus_message_read(reply, "(ssssuu)", &what, &who, &why, &mode, &uid, &pid)) > 0) { + _cleanup_free_ char *comm = NULL, *user = NULL; + _cleanup_strv_free_ char **sv = NULL; + + if (!streq(mode, "block")) + continue; + + sv = strv_split(what, ":"); + if (!sv) + return log_oom(); + + if (!pid_is_valid((pid_t) pid)) + return log_error_errno(SYNTHETIC_ERRNO(ERANGE), "Invalid PID "PID_FMT".", (pid_t) pid); + + if (!strv_contains(sv, + IN_SET(a, + ACTION_HALT, + ACTION_POWEROFF, + ACTION_REBOOT, + ACTION_KEXEC) ? "shutdown" : "sleep")) + continue; + + (void) get_process_comm(pid, &comm); + user = uid_to_name(uid); + + log_warning("Operation inhibited by \"%s\" (PID "PID_FMT" \"%s\", user %s), reason is \"%s\".", + who, (pid_t) pid, strna(comm), strna(user), why); + + c++; + } + if (r < 0) + return bus_log_parse_error(r); + + r = sd_bus_message_exit_container(reply); + if (r < 0) + return bus_log_parse_error(r); + + /* Check for current sessions */ + sd_get_sessions(&sessions); + STRV_FOREACH(s, sessions) { + _cleanup_free_ char *type = NULL, *tty = NULL, *seat = NULL, *user = NULL, *service = NULL, *class = NULL; + + if (sd_session_get_uid(*s, &uid) < 0 || uid == getuid()) + continue; + + if (sd_session_get_class(*s, &class) < 0 || !streq(class, "user")) + continue; + + if (sd_session_get_type(*s, &type) < 0 || !STR_IN_SET(type, "x11", "wayland", "tty", "mir")) + continue; + + sd_session_get_tty(*s, &tty); + sd_session_get_seat(*s, &seat); + sd_session_get_service(*s, &service); + user = uid_to_name(uid); + + log_warning("User %s is logged in on %s.", strna(user), isempty(tty) ? (isempty(seat) ? strna(service) : seat) : tty); + c++; + } + + if (c <= 0) + return 0; + + return log_error_errno(SYNTHETIC_ERRNO(EPERM), + "Please retry operation after closing inhibitors and logging out other users.\n" + "Alternatively, ignore inhibitors and users with 'systemctl %s -i'.", + action_table[a].verb); +#else + return 0; +#endif +} + +int prepare_firmware_setup(void) { + + if (!arg_firmware_setup) + return 0; + +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + sd_bus *bus; + int r; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + r = bus_call_method(bus, bus_login_mgr, "SetRebootToFirmwareSetup", &error, NULL, "b", true); + if (r < 0) + return log_error_errno(r, "Cannot indicate to EFI to boot into setup mode: %s", bus_error_message(&error, r)); + + return 0; +#else + return log_error_errno(SYNTHETIC_ERRNO(ENOSYS), + "Booting into firmware setup not supported."); +#endif +} + +int prepare_boot_loader_menu(void) { + + if (arg_boot_loader_menu == USEC_INFINITY) + return 0; + +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + sd_bus *bus; + int r; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + r = bus_call_method(bus, bus_login_mgr, "SetRebootToBootLoaderMenu", &error, NULL, "t", arg_boot_loader_menu); + if (r < 0) + return log_error_errno(r, "Cannot indicate to boot loader to enter boot loader entry menu: %s", bus_error_message(&error, r)); + + return 0; +#else + return log_error_errno(SYNTHETIC_ERRNO(ENOSYS), + "Booting into boot loader menu not supported."); +#endif +} + +int prepare_boot_loader_entry(void) { + + if (!arg_boot_loader_entry) + return 0; + +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + sd_bus *bus; + int r; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + r = bus_call_method(bus, bus_login_mgr, "SetRebootToBootLoaderEntry", &error, NULL, "s", arg_boot_loader_entry); + if (r < 0) + return log_error_errno(r, "Cannot set boot into loader entry '%s': %s", arg_boot_loader_entry, bus_error_message(&error, r)); + + return 0; +#else + return log_error_errno(SYNTHETIC_ERRNO(ENOSYS), + "Booting into boot loader entry not supported."); +#endif +} + +int logind_schedule_shutdown(void) { + +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + const char *action; + sd_bus *bus; + int r; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + action = action_table[arg_action].verb; + if (!action) + return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Scheduling not supported for this action."); + + if (arg_dry_run) + action = strjoina("dry-", action); + + (void) logind_set_wall_message(bus); + + r = bus_call_method(bus, bus_login_mgr, "ScheduleShutdown", &error, NULL, "st", action, arg_when); + if (r < 0) + return log_warning_errno(r, "Failed to schedule shutdown: %s", bus_error_message(&error, r)); + + if (!arg_quiet) + logind_show_shutdown(); + + return 0; +#else + return log_error_errno(SYNTHETIC_ERRNO(ENOSYS), + "Cannot schedule shutdown without logind support, proceeding with immediate shutdown."); +#endif +} + +int logind_cancel_shutdown(void) { +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + sd_bus *bus; + int r; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + (void) logind_set_wall_message(bus); + + r = bus_call_method(bus, bus_login_mgr, "CancelScheduledShutdown", &error, NULL, NULL); + if (r < 0) + return log_warning_errno(r, "Failed to talk to logind, shutdown hasn't been cancelled: %s", bus_error_message(&error, r)); + + return 0; +#else + return log_error_errno(SYNTHETIC_ERRNO(ENOSYS), + "Not compiled with logind support, cannot cancel scheduled shutdowns."); +#endif +} + +int logind_show_shutdown(void) { +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL; + sd_bus *bus; + const char *action = NULL; + uint64_t elapse; + int r; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + r = bus_get_property(bus, bus_login_mgr, "ScheduledShutdown", &error, &reply, "(st)"); + if (r < 0) + return log_error_errno(r, "Failed to query scheduled shutdown: %s", bus_error_message(&error, r)); + + r = sd_bus_message_read(reply, "(st)", &action, &elapse); + if (r < 0) + return r; + + if (isempty(action)) + return log_error_errno(SYNTHETIC_ERRNO(ENODATA), "No scheduled shutdown."); + + if (STR_IN_SET(action, "halt", "poweroff", "exit")) + action = "Shutdown"; + else if (streq(action, "kexec")) + action = "Reboot via kexec"; + else if (streq(action, "reboot")) + action = "Reboot"; + + /* If we don't recognize the action string, we'll show it as-is */ + + log_info("%s scheduled for %s, use 'shutdown -c' to cancel.", + action, + FORMAT_TIMESTAMP_STYLE(elapse, arg_timestamp_style)); + + return 0; +#else + return log_error_errno(SYNTHETIC_ERRNO(ENOSYS), + "Not compiled with logind support, cannot show scheduled shutdowns."); +#endif +} + +int help_boot_loader_entry(void) { +#if ENABLE_LOGIND + _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; + _cleanup_strv_free_ char **l = NULL; + sd_bus *bus; + int r; + + r = acquire_bus(BUS_FULL, &bus); + if (r < 0) + return r; + + r = bus_get_property_strv(bus, bus_login_mgr, "BootLoaderEntries", &error, &l); + if (r < 0) + return log_error_errno(r, "Failed to enumerate boot loader entries: %s", bus_error_message(&error, r)); + + if (strv_isempty(l)) + return log_error_errno(SYNTHETIC_ERRNO(ENODATA), "No boot loader entries discovered."); + + STRV_FOREACH(i, l) + puts(*i); + + return 0; +#else + return log_error_errno(SYNTHETIC_ERRNO(ENOSYS), + "Not compiled with logind support, cannot display boot loader entries."); +#endif +} -- cgit v1.2.3