1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2011 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
28 #include <sys/epoll.h>
29 #include <sys/ioctl.h>
31 #include <sys/timerfd.h>
33 #include <systemd/sd-daemon.h>
36 #include "dbus-common.h"
37 #include "dbus-loop.h"
39 #include "conf-parser.h"
42 Manager *manager_new(void) {
49 m->console_active_fd = -1;
53 m->udev_button_fd = -1;
55 m->reserve_vt_fd = -1;
59 m->inhibit_delay_max = 5 * USEC_PER_SEC;
60 m->handle_power_key = HANDLE_POWEROFF;
61 m->handle_suspend_key = HANDLE_SUSPEND;
62 m->handle_hibernate_key = HANDLE_HIBERNATE;
63 m->handle_lid_switch = HANDLE_SUSPEND;
64 m->lid_switch_ignore_inhibited = true;
66 m->idle_action_fd = -1;
67 m->idle_action_usec = 30 * USEC_PER_MINUTE;
68 m->idle_action = HANDLE_IGNORE;
69 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
71 m->devices = hashmap_new(string_hash_func, string_compare_func);
72 m->seats = hashmap_new(string_hash_func, string_compare_func);
73 m->sessions = hashmap_new(string_hash_func, string_compare_func);
74 m->users = hashmap_new(trivial_hash_func, trivial_compare_func);
75 m->inhibitors = hashmap_new(string_hash_func, string_compare_func);
76 m->buttons = hashmap_new(string_hash_func, string_compare_func);
77 m->busnames = hashmap_new(string_hash_func, string_compare_func);
79 m->user_units = hashmap_new(string_hash_func, string_compare_func);
80 m->session_units = hashmap_new(string_hash_func, string_compare_func);
82 m->session_fds = hashmap_new(trivial_hash_func, trivial_compare_func);
83 m->inhibitor_fds = hashmap_new(trivial_hash_func, trivial_compare_func);
84 m->button_fds = hashmap_new(trivial_hash_func, trivial_compare_func);
86 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->busnames ||
87 !m->user_units || !m->session_units ||
88 !m->session_fds || !m->inhibitor_fds || !m->button_fds) {
93 m->kill_exclude_users = strv_new("root", NULL);
94 if (!m->kill_exclude_users) {
108 void manager_free(Manager *m) {
119 while ((session = hashmap_first(m->sessions)))
120 session_free(session);
122 while ((u = hashmap_first(m->users)))
125 while ((d = hashmap_first(m->devices)))
128 while ((s = hashmap_first(m->seats)))
131 while ((i = hashmap_first(m->inhibitors)))
134 while ((b = hashmap_first(m->buttons)))
137 while ((n = hashmap_first(m->busnames)))
138 free(hashmap_remove(m->busnames, n));
140 hashmap_free(m->devices);
141 hashmap_free(m->seats);
142 hashmap_free(m->sessions);
143 hashmap_free(m->users);
144 hashmap_free(m->inhibitors);
145 hashmap_free(m->buttons);
146 hashmap_free(m->busnames);
148 hashmap_free(m->user_units);
149 hashmap_free(m->session_units);
151 hashmap_free(m->session_fds);
152 hashmap_free(m->inhibitor_fds);
153 hashmap_free(m->button_fds);
155 if (m->console_active_fd >= 0)
156 close_nointr_nofail(m->console_active_fd);
158 if (m->udev_seat_monitor)
159 udev_monitor_unref(m->udev_seat_monitor);
160 if (m->udev_device_monitor)
161 udev_monitor_unref(m->udev_device_monitor);
162 if (m->udev_vcsa_monitor)
163 udev_monitor_unref(m->udev_vcsa_monitor);
164 if (m->udev_button_monitor)
165 udev_monitor_unref(m->udev_button_monitor);
171 dbus_connection_flush(m->bus);
172 dbus_connection_close(m->bus);
173 dbus_connection_unref(m->bus);
177 close_nointr_nofail(m->bus_fd);
179 if (m->epoll_fd >= 0)
180 close_nointr_nofail(m->epoll_fd);
182 if (m->reserve_vt_fd >= 0)
183 close_nointr_nofail(m->reserve_vt_fd);
185 if (m->idle_action_fd >= 0)
186 close_nointr_nofail(m->idle_action_fd);
188 strv_free(m->kill_only_users);
189 strv_free(m->kill_exclude_users);
195 int manager_add_device(Manager *m, const char *sysfs, bool master, Device **_device) {
201 d = hashmap_get(m->devices, sysfs);
206 /* we support adding master-flags, but not removing them */
207 d->master = d->master || master;
212 d = device_new(m, sysfs, master);
222 int manager_add_seat(Manager *m, const char *id, Seat **_seat) {
228 s = hashmap_get(m->seats, id);
246 int manager_add_session(Manager *m, const char *id, Session **_session) {
252 s = hashmap_get(m->sessions, id);
260 s = session_new(m, id);
270 int manager_add_user(Manager *m, uid_t uid, gid_t gid, const char *name, User **_user) {
276 u = hashmap_get(m->users, ULONG_TO_PTR((unsigned long) uid));
284 u = user_new(m, uid, gid, name);
294 int manager_add_user_by_name(Manager *m, const char *name, User **_user) {
302 r = get_user_creds(&name, &uid, &gid, NULL, NULL);
306 return manager_add_user(m, uid, gid, name, _user);
309 int manager_add_user_by_uid(Manager *m, uid_t uid, User **_user) {
317 return errno ? -errno : -ENOENT;
319 return manager_add_user(m, uid, p->pw_gid, p->pw_name, _user);
322 int manager_add_inhibitor(Manager *m, const char* id, Inhibitor **_inhibitor) {
328 i = hashmap_get(m->inhibitors, id);
336 i = inhibitor_new(m, id);
346 int manager_add_button(Manager *m, const char *name, Button **_button) {
352 b = hashmap_get(m->buttons, name);
360 b = button_new(m, name);
370 int manager_watch_busname(Manager *m, const char *name) {
377 if (hashmap_get(m->busnames, name))
384 r = hashmap_put(m->busnames, n, n);
393 void manager_drop_busname(Manager *m, const char *name) {
399 key = hashmap_remove(m->busnames, name);
404 int manager_process_seat_device(Manager *m, struct udev_device *d) {
410 if (streq_ptr(udev_device_get_action(d), "remove")) {
412 device = hashmap_get(m->devices, udev_device_get_syspath(d));
416 seat_add_to_gc_queue(device->seat);
424 sn = udev_device_get_property_value(d, "ID_SEAT");
428 if (!seat_name_is_valid(sn)) {
429 log_warning("Device with invalid seat name %s found, ignoring.", sn);
433 /* ignore non-master devices for unknown seats */
434 master = udev_device_has_tag(d, "master-of-seat");
435 if (!master && !(seat = hashmap_get(m->seats, sn)))
438 r = manager_add_device(m, udev_device_get_syspath(d), master, &device);
443 r = manager_add_seat(m, sn, &seat);
452 device_attach(device, seat);
459 int manager_process_button_device(Manager *m, struct udev_device *d) {
466 if (streq_ptr(udev_device_get_action(d), "remove")) {
468 b = hashmap_get(m->buttons, udev_device_get_sysname(d));
477 r = manager_add_button(m, udev_device_get_sysname(d), &b);
481 sn = udev_device_get_property_value(d, "ID_SEAT");
485 button_set_seat(b, sn);
492 int manager_enumerate_devices(Manager *m) {
493 struct udev_list_entry *item = NULL, *first = NULL;
494 struct udev_enumerate *e;
499 /* Loads devices from udev and creates seats for them as
502 e = udev_enumerate_new(m->udev);
508 r = udev_enumerate_add_match_tag(e, "master-of-seat");
512 r = udev_enumerate_scan_devices(e);
516 first = udev_enumerate_get_list_entry(e);
517 udev_list_entry_foreach(item, first) {
518 struct udev_device *d;
521 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
527 k = manager_process_seat_device(m, d);
528 udev_device_unref(d);
536 udev_enumerate_unref(e);
541 int manager_enumerate_buttons(Manager *m) {
542 struct udev_list_entry *item = NULL, *first = NULL;
543 struct udev_enumerate *e;
548 /* Loads buttons from udev */
550 if (m->handle_power_key == HANDLE_IGNORE &&
551 m->handle_suspend_key == HANDLE_IGNORE &&
552 m->handle_hibernate_key == HANDLE_IGNORE &&
553 m->handle_lid_switch == HANDLE_IGNORE)
556 e = udev_enumerate_new(m->udev);
562 r = udev_enumerate_add_match_subsystem(e, "input");
566 r = udev_enumerate_add_match_tag(e, "power-switch");
570 r = udev_enumerate_scan_devices(e);
574 first = udev_enumerate_get_list_entry(e);
575 udev_list_entry_foreach(item, first) {
576 struct udev_device *d;
579 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
585 k = manager_process_button_device(m, d);
586 udev_device_unref(d);
594 udev_enumerate_unref(e);
599 int manager_enumerate_seats(Manager *m) {
600 _cleanup_closedir_ DIR *d = NULL;
606 /* This loads data about seats stored on disk, but does not
607 * actually create any seats. Removes data of seats that no
610 d = opendir("/run/systemd/seats");
615 log_error("Failed to open /run/systemd/seats: %m");
619 FOREACH_DIRENT(de, d, return -errno) {
623 if (!dirent_is_file(de))
626 s = hashmap_get(m->seats, de->d_name);
628 unlinkat(dirfd(d), de->d_name, 0);
640 static int manager_enumerate_linger_users(Manager *m) {
641 _cleanup_closedir_ DIR *d = NULL;
647 d = opendir("/var/lib/systemd/linger");
652 log_error("Failed to open /var/lib/systemd/linger/: %m");
656 FOREACH_DIRENT(de, d, return -errno) {
659 if (!dirent_is_file(de))
662 k = manager_add_user_by_name(m, de->d_name, NULL);
664 log_notice("Couldn't add lingering user %s: %s", de->d_name, strerror(-k));
672 int manager_enumerate_users(Manager *m) {
673 _cleanup_closedir_ DIR *d = NULL;
679 /* Add lingering users */
680 r = manager_enumerate_linger_users(m);
682 /* Read in user data stored on disk */
683 d = opendir("/run/systemd/users");
688 log_error("Failed to open /run/systemd/users: %m");
692 FOREACH_DIRENT(de, d, return -errno) {
695 if (!dirent_is_file(de))
698 k = manager_add_user_by_name(m, de->d_name, &u);
700 log_error("Failed to add user by file name %s: %s", de->d_name, strerror(-k));
706 user_add_to_gc_queue(u);
716 int manager_enumerate_sessions(Manager *m) {
717 _cleanup_closedir_ DIR *d = NULL;
723 /* Read in session data stored on disk */
724 d = opendir("/run/systemd/sessions");
729 log_error("Failed to open /run/systemd/sessions: %m");
733 FOREACH_DIRENT(de, d, return -errno) {
737 if (!dirent_is_file(de))
740 if (!session_id_valid(de->d_name)) {
741 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
746 k = manager_add_session(m, de->d_name, &s);
748 log_error("Failed to add session by file name %s: %s", de->d_name, strerror(-k));
754 session_add_to_gc_queue(s);
764 int manager_enumerate_inhibitors(Manager *m) {
765 _cleanup_closedir_ DIR *d = NULL;
771 d = opendir("/run/systemd/inhibit");
776 log_error("Failed to open /run/systemd/inhibit: %m");
780 FOREACH_DIRENT(de, d, return -errno) {
784 if (!dirent_is_file(de))
787 k = manager_add_inhibitor(m, de->d_name, &i);
789 log_notice("Couldn't add inhibitor %s: %s", de->d_name, strerror(-k));
794 k = inhibitor_load(i);
802 int manager_dispatch_seat_udev(Manager *m) {
803 struct udev_device *d;
808 d = udev_monitor_receive_device(m->udev_seat_monitor);
812 r = manager_process_seat_device(m, d);
813 udev_device_unref(d);
818 static int manager_dispatch_device_udev(Manager *m) {
819 struct udev_device *d;
824 d = udev_monitor_receive_device(m->udev_device_monitor);
828 r = manager_process_seat_device(m, d);
829 udev_device_unref(d);
834 int manager_dispatch_vcsa_udev(Manager *m) {
835 struct udev_device *d;
841 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
845 name = udev_device_get_sysname(d);
847 /* Whenever a VCSA device is removed try to reallocate our
848 * VTs, to make sure our auto VTs never go away. */
850 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
851 r = seat_preallocate_vts(m->vtconsole);
853 udev_device_unref(d);
858 int manager_dispatch_button_udev(Manager *m) {
859 struct udev_device *d;
864 d = udev_monitor_receive_device(m->udev_button_monitor);
868 r = manager_process_button_device(m, d);
869 udev_device_unref(d);
874 int manager_dispatch_console(Manager *m) {
878 seat_read_active_vt(m->vtconsole);
883 static int vt_is_busy(int vtnr) {
884 struct vt_stat vt_stat;
889 /* We explicitly open /dev/tty1 here instead of /dev/tty0. If
890 * we'd open the latter we'd open the foreground tty which
891 * hence would be unconditionally busy. By opening /dev/tty1
892 * we avoid this. Since tty1 is special and needs to be an
893 * explicitly loaded getty or DM this is safe. */
895 fd = open_terminal("/dev/tty1", O_RDWR|O_NOCTTY|O_CLOEXEC);
899 if (ioctl(fd, VT_GETSTATE, &vt_stat) < 0)
902 r = !!(vt_stat.v_state & (1 << vtnr));
904 close_nointr_nofail(fd);
909 int manager_spawn_autovt(Manager *m, int vtnr) {
912 const char *mode = "fail";
917 if ((unsigned) vtnr > m->n_autovts &&
918 (unsigned) vtnr != m->reserve_vt)
921 if ((unsigned) vtnr != m->reserve_vt) {
922 /* If this is the reserved TTY, we'll start the getty
923 * on it in any case, but otherwise only if it is not
926 r = vt_is_busy(vtnr);
933 if (asprintf(&name, "autovt@tty%i.service", vtnr) < 0) {
934 log_error("Could not allocate service name.");
939 r = bus_method_call_with_reply (
941 "org.freedesktop.systemd1",
942 "/org/freedesktop/systemd1",
943 "org.freedesktop.systemd1.Manager",
947 DBUS_TYPE_STRING, &name,
948 DBUS_TYPE_STRING, &mode,
957 static int manager_reserve_vt(Manager *m) {
958 _cleanup_free_ char *p = NULL;
962 if (m->reserve_vt <= 0)
965 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
968 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
969 if (m->reserve_vt_fd < 0) {
971 /* Don't complain on VT-less systems */
973 log_warning("Failed to pin reserved VT: %m");
980 int manager_get_session_by_pid(Manager *m, pid_t pid, Session **session) {
981 _cleanup_free_ char *unit = NULL;
989 r = cg_pid_get_unit(pid, &unit);
993 s = hashmap_get(m->session_units, unit);
1001 int manager_get_user_by_pid(Manager *m, pid_t pid, User **user) {
1002 _cleanup_free_ char *unit = NULL;
1010 r = cg_pid_get_slice(pid, &unit);
1014 u = hashmap_get(m->user_units, unit);
1022 static void manager_dispatch_other(Manager *m, int fd) {
1030 s = hashmap_get(m->session_fds, INT_TO_PTR(fd + 1));
1032 assert(s->fifo_fd == fd);
1033 session_remove_fifo(s);
1038 i = hashmap_get(m->inhibitor_fds, INT_TO_PTR(fd + 1));
1040 assert(i->fifo_fd == fd);
1046 b = hashmap_get(m->button_fds, INT_TO_PTR(fd + 1));
1048 assert(b->fd == fd);
1053 assert_not_reached("Got event for unknown fd");
1056 static int manager_connect_bus(Manager *m) {
1059 struct epoll_event ev = {
1066 assert(m->bus_fd < 0);
1068 dbus_error_init(&error);
1070 m->bus = dbus_bus_get_private(DBUS_BUS_SYSTEM, &error);
1072 log_error("Failed to get system D-Bus connection: %s", bus_error_message(&error));
1077 if (!dbus_connection_register_object_path(m->bus, "/org/freedesktop/login1", &bus_manager_vtable, m) ||
1078 !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/seat", &bus_seat_vtable, m) ||
1079 !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/session", &bus_session_vtable, m) ||
1080 !dbus_connection_register_fallback(m->bus, "/org/freedesktop/login1/user", &bus_user_vtable, m) ||
1081 !dbus_connection_add_filter(m->bus, bus_message_filter, m, NULL)) {
1086 dbus_bus_add_match(m->bus,
1088 "sender='"DBUS_SERVICE_DBUS"',"
1089 "interface='"DBUS_INTERFACE_DBUS"',"
1090 "member='NameOwnerChanged',"
1091 "path='"DBUS_PATH_DBUS"'",
1093 if (dbus_error_is_set(&error)) {
1094 log_error("Failed to add match for NameOwnerChanged: %s", bus_error_message(&error));
1095 dbus_error_free(&error);
1098 dbus_bus_add_match(m->bus,
1100 "sender='org.freedesktop.systemd1',"
1101 "interface='org.freedesktop.systemd1.Manager',"
1102 "member='JobRemoved',"
1103 "path='/org/freedesktop/systemd1'",
1105 if (dbus_error_is_set(&error)) {
1106 log_error("Failed to add match for JobRemoved: %s", bus_error_message(&error));
1107 dbus_error_free(&error);
1110 dbus_bus_add_match(m->bus,
1112 "sender='org.freedesktop.systemd1',"
1113 "interface='org.freedesktop.systemd1.Manager',"
1114 "member='UnitRemoved',"
1115 "path='/org/freedesktop/systemd1'",
1117 if (dbus_error_is_set(&error)) {
1118 log_error("Failed to add match for UnitRemoved: %s", bus_error_message(&error));
1119 dbus_error_free(&error);
1122 dbus_bus_add_match(m->bus,
1124 "sender='org.freedesktop.systemd1',"
1125 "interface='org.freedesktop.DBus.Properties',"
1126 "member='PropertiesChanged'",
1128 if (dbus_error_is_set(&error)) {
1129 log_error("Failed to add match for PropertiesChanged: %s", bus_error_message(&error));
1130 dbus_error_free(&error);
1133 dbus_bus_add_match(m->bus,
1135 "sender='org.freedesktop.systemd1',"
1136 "interface='org.freedesktop.systemd1.Manager',"
1137 "member='Reloading',"
1138 "path='/org/freedesktop/systemd1'",
1140 if (dbus_error_is_set(&error)) {
1141 log_error("Failed to add match for Reloading: %s", bus_error_message(&error));
1142 dbus_error_free(&error);
1145 r = bus_method_call_with_reply(
1147 "org.freedesktop.systemd1",
1148 "/org/freedesktop/systemd1",
1149 "org.freedesktop.systemd1.Manager",
1155 log_error("Failed to enable subscription: %s", bus_error(&error, r));
1156 dbus_error_free(&error);
1159 r = dbus_bus_request_name(m->bus, "org.freedesktop.login1", DBUS_NAME_FLAG_DO_NOT_QUEUE, &error);
1160 if (dbus_error_is_set(&error)) {
1161 log_error("Failed to register name on bus: %s", bus_error_message(&error));
1166 if (r != DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER) {
1167 log_error("Failed to acquire name.");
1172 m->bus_fd = bus_loop_open(m->bus);
1173 if (m->bus_fd < 0) {
1178 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->bus_fd, &ev) < 0)
1184 dbus_error_free(&error);
1189 static int manager_connect_console(Manager *m) {
1190 struct epoll_event ev = {
1192 .data.u32 = FD_CONSOLE,
1196 assert(m->console_active_fd < 0);
1198 /* On certain architectures (S390 and Xen, and containers),
1199 /dev/tty0 does not exist, so don't fail if we can't open
1201 if (access("/dev/tty0", F_OK) < 0) {
1202 m->console_active_fd = -1;
1206 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
1207 if (m->console_active_fd < 0) {
1209 /* On some systems the device node /dev/tty0 may exist
1210 * even though /sys/class/tty/tty0 does not. */
1211 if (errno == ENOENT)
1214 log_error("Failed to open /sys/class/tty/tty0/active: %m");
1218 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->console_active_fd, &ev) < 0)
1224 static int manager_connect_udev(Manager *m) {
1226 struct epoll_event ev = {
1228 .data.u32 = FD_SEAT_UDEV,
1232 assert(!m->udev_seat_monitor);
1233 assert(!m->udev_device_monitor);
1234 assert(!m->udev_vcsa_monitor);
1235 assert(!m->udev_button_monitor);
1237 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
1238 if (!m->udev_seat_monitor)
1241 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
1245 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
1249 m->udev_seat_fd = udev_monitor_get_fd(m->udev_seat_monitor);
1251 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_seat_fd, &ev) < 0)
1254 m->udev_device_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
1255 if (!m->udev_device_monitor)
1258 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
1262 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
1266 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
1270 r = udev_monitor_enable_receiving(m->udev_device_monitor);
1274 m->udev_device_fd = udev_monitor_get_fd(m->udev_device_monitor);
1276 ev.events = EPOLLIN;
1277 ev.data.u32 = FD_DEVICE_UDEV;
1278 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_device_fd, &ev) < 0)
1281 /* Don't watch keys if nobody cares */
1282 if (m->handle_power_key != HANDLE_IGNORE ||
1283 m->handle_suspend_key != HANDLE_IGNORE ||
1284 m->handle_hibernate_key != HANDLE_IGNORE ||
1285 m->handle_lid_switch != HANDLE_IGNORE) {
1287 m->udev_button_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
1288 if (!m->udev_button_monitor)
1291 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
1295 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
1299 r = udev_monitor_enable_receiving(m->udev_button_monitor);
1303 m->udev_button_fd = udev_monitor_get_fd(m->udev_button_monitor);
1306 ev.events = EPOLLIN;
1307 ev.data.u32 = FD_BUTTON_UDEV;
1308 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_button_fd, &ev) < 0)
1312 /* Don't bother watching VCSA devices, if nobody cares */
1313 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
1315 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
1316 if (!m->udev_vcsa_monitor)
1319 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
1323 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
1327 m->udev_vcsa_fd = udev_monitor_get_fd(m->udev_vcsa_monitor);
1330 ev.events = EPOLLIN;
1331 ev.data.u32 = FD_VCSA_UDEV;
1332 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_vcsa_fd, &ev) < 0)
1339 void manager_gc(Manager *m, bool drop_not_started) {
1346 while ((seat = m->seat_gc_queue)) {
1347 LIST_REMOVE(Seat, gc_queue, m->seat_gc_queue, seat);
1348 seat->in_gc_queue = false;
1350 if (seat_check_gc(seat, drop_not_started) == 0) {
1356 while ((session = m->session_gc_queue)) {
1357 LIST_REMOVE(Session, gc_queue, m->session_gc_queue, session);
1358 session->in_gc_queue = false;
1360 if (session_check_gc(session, drop_not_started) == 0) {
1361 session_stop(session);
1362 session_finalize(session);
1363 session_free(session);
1367 while ((user = m->user_gc_queue)) {
1368 LIST_REMOVE(User, gc_queue, m->user_gc_queue, user);
1369 user->in_gc_queue = false;
1371 if (user_check_gc(user, drop_not_started) == 0) {
1373 user_finalize(user);
1379 int manager_get_idle_hint(Manager *m, dual_timestamp *t) {
1382 dual_timestamp ts = { 0, 0 };
1387 idle_hint = !manager_is_inhibited(m, INHIBIT_IDLE, INHIBIT_BLOCK, t, false, false, 0);
1389 HASHMAP_FOREACH(s, m->sessions, i) {
1393 ih = session_get_idle_hint(s, &k);
1399 if (k.monotonic < ts.monotonic)
1405 } else if (idle_hint) {
1407 if (k.monotonic > ts.monotonic)
1418 bool manager_shall_kill(Manager *m, const char *user) {
1422 if (!m->kill_user_processes)
1425 if (strv_contains(m->kill_exclude_users, user))
1428 if (strv_isempty(m->kill_only_users))
1431 return strv_contains(m->kill_only_users, user);
1434 int manager_dispatch_idle_action(Manager *m) {
1435 struct dual_timestamp since;
1436 struct itimerspec its = {};
1442 if (m->idle_action == HANDLE_IGNORE ||
1443 m->idle_action_usec <= 0) {
1448 n = now(CLOCK_MONOTONIC);
1450 r = manager_get_idle_hint(m, &since);
1452 /* Not idle. Let's check if after a timeout it might be idle then. */
1453 timespec_store(&its.it_value, n + m->idle_action_usec);
1455 /* Idle! Let's see if it's time to do something, or if
1456 * we shall sleep for longer. */
1458 if (n >= since.monotonic + m->idle_action_usec &&
1459 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
1460 log_info("System idle. Taking action.");
1462 manager_handle_action(m, 0, m->idle_action, false, false);
1463 m->idle_action_not_before_usec = n;
1466 timespec_store(&its.it_value, MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec);
1469 if (m->idle_action_fd < 0) {
1470 struct epoll_event ev = {
1472 .data.u32 = FD_IDLE_ACTION,
1475 m->idle_action_fd = timerfd_create(CLOCK_MONOTONIC, TFD_NONBLOCK|TFD_CLOEXEC);
1476 if (m->idle_action_fd < 0) {
1477 log_error("Failed to create idle action timer: %m");
1482 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->idle_action_fd, &ev) < 0) {
1483 log_error("Failed to add idle action timer to epoll: %m");
1489 if (timerfd_settime(m->idle_action_fd, TFD_TIMER_ABSTIME, &its, NULL) < 0) {
1490 log_error("Failed to reset timerfd: %m");
1498 if (m->idle_action_fd >= 0) {
1499 close_nointr_nofail(m->idle_action_fd);
1500 m->idle_action_fd = -1;
1505 int manager_startup(Manager *m) {
1510 Inhibitor *inhibitor;
1514 assert(m->epoll_fd <= 0);
1516 m->epoll_fd = epoll_create1(EPOLL_CLOEXEC);
1517 if (m->epoll_fd < 0)
1520 /* Connect to console */
1521 r = manager_connect_console(m);
1525 /* Connect to udev */
1526 r = manager_connect_udev(m);
1530 /* Connect to the bus */
1531 r = manager_connect_bus(m);
1535 /* Instantiate magic seat 0 */
1536 r = manager_add_seat(m, "seat0", &m->vtconsole);
1540 /* Deserialize state */
1541 r = manager_enumerate_devices(m);
1543 log_warning("Device enumeration failed: %s", strerror(-r));
1545 r = manager_enumerate_seats(m);
1547 log_warning("Seat enumeration failed: %s", strerror(-r));
1549 r = manager_enumerate_users(m);
1551 log_warning("User enumeration failed: %s", strerror(-r));
1553 r = manager_enumerate_sessions(m);
1555 log_warning("Session enumeration failed: %s", strerror(-r));
1557 r = manager_enumerate_inhibitors(m);
1559 log_warning("Inhibitor enumeration failed: %s", strerror(-r));
1561 r = manager_enumerate_buttons(m);
1563 log_warning("Button enumeration failed: %s", strerror(-r));
1565 /* Remove stale objects before we start them */
1566 manager_gc(m, false);
1568 /* Reserve the special reserved VT */
1569 manager_reserve_vt(m);
1571 /* And start everything */
1572 HASHMAP_FOREACH(seat, m->seats, i)
1575 HASHMAP_FOREACH(user, m->users, i)
1578 HASHMAP_FOREACH(session, m->sessions, i)
1579 session_start(session);
1581 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1582 inhibitor_start(inhibitor);
1584 manager_dispatch_idle_action(m);
1589 static int manager_recheck_buttons(Manager *m) {
1596 HASHMAP_FOREACH(b, m->buttons, i) {
1599 q = button_recheck(b);
1609 int manager_run(Manager *m) {
1613 struct epoll_event event;
1617 manager_gc(m, true);
1619 if (manager_dispatch_delayed(m) > 0)
1622 if (manager_recheck_buttons(m) > 0)
1625 if (dbus_connection_dispatch(m->bus) != DBUS_DISPATCH_COMPLETE)
1628 manager_gc(m, true);
1630 if (m->action_what != 0 && !m->action_job) {
1633 x = now(CLOCK_MONOTONIC);
1634 y = m->action_timestamp + m->inhibit_delay_max;
1636 msec = x >= y ? 0 : (int) ((y - x) / USEC_PER_MSEC);
1639 n = epoll_wait(m->epoll_fd, &event, 1, msec);
1641 if (errno == EINTR || errno == EAGAIN)
1644 log_error("epoll() failed: %m");
1651 switch (event.data.u32) {
1654 manager_dispatch_seat_udev(m);
1657 case FD_DEVICE_UDEV:
1658 manager_dispatch_device_udev(m);
1662 manager_dispatch_vcsa_udev(m);
1665 case FD_BUTTON_UDEV:
1666 manager_dispatch_button_udev(m);
1670 manager_dispatch_console(m);
1673 case FD_IDLE_ACTION:
1674 manager_dispatch_idle_action(m);
1678 bus_loop_dispatch(m->bus_fd);
1682 if (event.data.u32 >= FD_OTHER_BASE)
1683 manager_dispatch_other(m, event.data.u32 - FD_OTHER_BASE);
1690 static int manager_parse_config_file(Manager *m) {
1691 static const char fn[] = "/etc/systemd/logind.conf";
1692 _cleanup_fclose_ FILE *f = NULL;
1697 f = fopen(fn, "re");
1699 if (errno == ENOENT)
1702 log_warning("Failed to open configuration file %s: %m", fn);
1706 r = config_parse(NULL, fn, f, "Login\0", config_item_perf_lookup,
1707 (void*) logind_gperf_lookup, false, false, m);
1709 log_warning("Failed to parse configuration file: %s", strerror(-r));
1714 int main(int argc, char *argv[]) {
1718 log_set_target(LOG_TARGET_AUTO);
1719 log_set_facility(LOG_AUTH);
1720 log_parse_environment();
1726 log_error("This program takes no arguments.");
1731 /* Always create the directories people can create inotify
1732 * watches in. Note that some applications might check for the
1733 * existence of /run/systemd/seats/ to determine whether
1734 * logind is available, so please always make sure this check
1736 mkdir_label("/run/systemd/seats", 0755);
1737 mkdir_label("/run/systemd/users", 0755);
1738 mkdir_label("/run/systemd/sessions", 0755);
1746 manager_parse_config_file(m);
1748 r = manager_startup(m);
1750 log_error("Failed to fully start up daemon: %s", strerror(-r));
1754 log_debug("systemd-logind running as pid %lu", (unsigned long) getpid());
1758 "STATUS=Processing requests...");
1762 log_debug("systemd-logind stopped as pid %lu", (unsigned long) getpid());
1766 "STATUS=Shutting down...");
1771 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;