1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 This file is part of systemd.
5 Copyright 2011 Lennart Poettering
13 #if 0 /// elogind needs the systems udev header
18 #include "sd-daemon.h"
20 #include "alloc-util.h"
21 #include "bus-error.h"
23 //#include "cgroup-util.h"
25 #include "dirent-util.h"
27 #include "format-util.h"
30 //#include "parse-util.h"
31 //#include "process-util.h"
32 #include "selinux-util.h"
33 #include "signal-util.h"
35 #include "udev-util.h"
36 /// Additional includes needed by elogind
37 #include "cgroup.h" // From src/core/
40 #include "musl_missing.h"
41 #include "process-util.h"
42 #include "cgroup-util.h"
44 static void manager_free(Manager *m);
46 #if 0 /// elogind does not support autospawning of vts
48 static Manager *manager_new(void) {
56 m->console_active_fd = -1;
57 #if 0 /// UNNEEDED by elogind
58 m->reserve_vt_fd = -1;
61 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
63 m->devices = hashmap_new(&string_hash_ops);
64 m->seats = hashmap_new(&string_hash_ops);
65 m->sessions = hashmap_new(&string_hash_ops);
66 m->users = hashmap_new(NULL);
67 m->inhibitors = hashmap_new(&string_hash_ops);
68 m->buttons = hashmap_new(&string_hash_ops);
70 m->user_units = hashmap_new(&string_hash_ops);
71 m->session_units = hashmap_new(&string_hash_ops);
73 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->user_units || !m->session_units)
76 #if 1 /// elogind needs some more data
77 r = elogind_manager_new(m);
85 r = sd_event_default(&m->event);
89 sd_event_set_watchdog(m->event, true);
91 manager_reset_config(m);
100 static void manager_free(Manager *m) {
111 while ((session = hashmap_first(m->sessions)))
112 session_free(session);
114 while ((u = hashmap_first(m->users)))
117 while ((d = hashmap_first(m->devices)))
120 while ((s = hashmap_first(m->seats)))
123 while ((i = hashmap_first(m->inhibitors)))
126 while ((b = hashmap_first(m->buttons)))
129 hashmap_free(m->devices);
130 hashmap_free(m->seats);
131 hashmap_free(m->sessions);
132 hashmap_free(m->users);
133 hashmap_free(m->inhibitors);
134 hashmap_free(m->buttons);
136 hashmap_free(m->user_units);
137 hashmap_free(m->session_units);
139 sd_event_source_unref(m->idle_action_event_source);
140 sd_event_source_unref(m->inhibit_timeout_source);
141 sd_event_source_unref(m->scheduled_shutdown_timeout_source);
142 sd_event_source_unref(m->nologin_timeout_source);
143 sd_event_source_unref(m->wall_message_timeout_source);
145 sd_event_source_unref(m->console_active_event_source);
146 sd_event_source_unref(m->udev_seat_event_source);
147 sd_event_source_unref(m->udev_device_event_source);
148 sd_event_source_unref(m->udev_vcsa_event_source);
149 sd_event_source_unref(m->udev_button_event_source);
150 sd_event_source_unref(m->lid_switch_ignore_event_source);
152 safe_close(m->console_active_fd);
154 udev_monitor_unref(m->udev_seat_monitor);
155 udev_monitor_unref(m->udev_device_monitor);
156 udev_monitor_unref(m->udev_vcsa_monitor);
157 udev_monitor_unref(m->udev_button_monitor);
161 if (m->unlink_nologin)
162 (void) unlink_or_warn("/run/nologin");
164 bus_verify_polkit_async_registry_free(m->polkit_registry);
166 sd_bus_unref(m->bus);
167 sd_event_unref(m->event);
169 #if 0 /// elogind does not support autospawning of vts
170 safe_close(m->reserve_vt_fd);
172 #if 1 /// elogind has to free its own data
173 elogind_manager_free(m);
176 strv_free(m->kill_only_users);
177 strv_free(m->kill_exclude_users);
179 free(m->scheduled_shutdown_type);
180 free(m->scheduled_shutdown_tty);
181 free(m->wall_message);
182 #if 0 /// UNNEEDED by elogind
188 static int manager_enumerate_devices(Manager *m) {
189 struct udev_list_entry *item = NULL, *first = NULL;
190 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
195 /* Loads devices from udev and creates seats for them as
198 e = udev_enumerate_new(m->udev);
202 r = udev_enumerate_add_match_tag(e, "master-of-seat");
206 r = udev_enumerate_add_match_is_initialized(e);
210 r = udev_enumerate_scan_devices(e);
214 first = udev_enumerate_get_list_entry(e);
215 udev_list_entry_foreach(item, first) {
216 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
219 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
223 k = manager_process_seat_device(m, d);
231 static int manager_enumerate_buttons(Manager *m) {
232 _cleanup_(udev_enumerate_unrefp) struct udev_enumerate *e = NULL;
233 struct udev_list_entry *item = NULL, *first = NULL;
238 /* Loads buttons from udev */
240 if (manager_all_buttons_ignored(m))
243 e = udev_enumerate_new(m->udev);
247 r = udev_enumerate_add_match_subsystem(e, "input");
251 r = udev_enumerate_add_match_tag(e, "power-switch");
255 r = udev_enumerate_add_match_is_initialized(e);
259 r = udev_enumerate_scan_devices(e);
263 first = udev_enumerate_get_list_entry(e);
264 udev_list_entry_foreach(item, first) {
265 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
268 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
272 k = manager_process_button_device(m, d);
280 static int manager_enumerate_seats(Manager *m) {
281 _cleanup_closedir_ DIR *d = NULL;
287 /* This loads data about seats stored on disk, but does not
288 * actually create any seats. Removes data of seats that no
291 d = opendir("/run/systemd/seats");
296 return log_error_errno(errno, "Failed to open /run/systemd/seats: %m");
299 FOREACH_DIRENT(de, d, return -errno) {
303 if (!dirent_is_file(de))
306 s = hashmap_get(m->seats, de->d_name);
308 if (unlinkat(dirfd(d), de->d_name, 0) < 0)
309 log_warning("Failed to remove /run/systemd/seats/%s: %m",
322 static int manager_enumerate_linger_users(Manager *m) {
323 _cleanup_closedir_ DIR *d = NULL;
329 d = opendir("/var/lib/elogind/linger");
334 return log_error_errno(errno, "Failed to open /var/lib/elogind/linger/: %m");
337 FOREACH_DIRENT(de, d, return -errno) {
340 if (!dirent_is_file(de))
343 k = manager_add_user_by_name(m, de->d_name, NULL);
345 log_notice_errno(k, "Couldn't add lingering user %s: %m", de->d_name);
353 static int manager_enumerate_users(Manager *m) {
354 _cleanup_closedir_ DIR *d = NULL;
360 /* Add lingering users */
361 r = manager_enumerate_linger_users(m);
363 /* Read in user data stored on disk */
364 d = opendir("/run/systemd/users");
369 return log_error_errno(errno, "Failed to open /run/systemd/users: %m");
372 FOREACH_DIRENT(de, d, return -errno) {
375 if (!dirent_is_file(de))
378 k = manager_add_user_by_name(m, de->d_name, &u);
380 log_error_errno(k, "Failed to add user by file name %s: %m", de->d_name);
386 user_add_to_gc_queue(u);
396 static int parse_fdname(const char *fdname, char **session_id, dev_t *dev) {
397 _cleanup_strv_free_ char **parts = NULL;
398 _cleanup_free_ char *id = NULL;
399 unsigned int major, minor;
402 parts = strv_split(fdname, "-");
405 if (strv_length(parts) != 5)
408 if (!streq(parts[0], "session"))
410 id = strdup(parts[1]);
414 if (!streq(parts[2], "device"))
416 r = safe_atou(parts[3], &major) ||
417 safe_atou(parts[4], &minor);
421 *dev = makedev(major, minor);
422 *session_id = TAKE_PTR(id);
427 static int manager_attach_fds(Manager *m) {
428 _cleanup_strv_free_ char **fdnames = NULL;
431 /* Upon restart, PID1 will send us back all fds of session devices
432 * that we previously opened. Each file descriptor is associated
433 * with a given session. The session ids are passed through FDNAMES. */
435 n = sd_listen_fds_with_names(true, &fdnames);
439 for (i = 0; i < n; i++) {
440 _cleanup_free_ char *id = NULL;
447 fd = SD_LISTEN_FDS_START + i;
449 r = parse_fdname(fdnames[i], &id, &dev);
451 log_debug_errno(r, "Failed to parse fd name %s: %m", fdnames[i]);
456 s = hashmap_get(m->sessions, id);
458 /* If the session doesn't exist anymore, the associated session
459 * device attached to this fd doesn't either. Let's simply close
461 log_debug("Failed to attach fd for unknown session: %s", id);
466 if (fstat(fd, &st) < 0) {
467 /* The device is allowed to go away at a random point, in which
468 * case fstat failing is expected. */
469 log_debug_errno(errno, "Failed to stat device fd for session %s: %m", id);
474 if (!S_ISCHR(st.st_mode) || st.st_rdev != dev) {
475 log_debug("Device fd doesn't point to the expected character device node");
480 sd = hashmap_get(s->devices, &dev);
482 /* Weird, we got an fd for a session device which wasn't
483 * recorded in the session state file... */
484 log_warning("Got fd for missing session device [%u:%u] in session %s",
485 major(dev), minor(dev), s->id);
490 log_debug("Attaching fd to session device [%u:%u] for session %s",
491 major(dev), minor(dev), s->id);
493 session_device_attach_fd(sd, fd, s->was_active);
499 static int manager_enumerate_sessions(Manager *m) {
500 _cleanup_closedir_ DIR *d = NULL;
506 /* Read in session data stored on disk */
507 d = opendir("/run/systemd/sessions");
512 return log_error_errno(errno, "Failed to open /run/systemd/sessions: %m");
515 FOREACH_DIRENT(de, d, return -errno) {
518 if (!dirent_is_file(de))
521 if (!session_id_valid(de->d_name)) {
522 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
527 k = manager_add_session(m, de->d_name, &s);
529 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name);
534 session_add_to_gc_queue(s);
541 /* We might be restarted and PID1 could have sent us back the
542 * session device fds we previously saved. */
543 k = manager_attach_fds(m);
545 log_warning_errno(k, "Failed to reattach session device fds: %m");
550 static int manager_enumerate_inhibitors(Manager *m) {
551 _cleanup_closedir_ DIR *d = NULL;
557 d = opendir("/run/systemd/inhibit");
562 return log_error_errno(errno, "Failed to open /run/systemd/inhibit: %m");
565 FOREACH_DIRENT(de, d, return -errno) {
569 if (!dirent_is_file(de))
572 k = manager_add_inhibitor(m, de->d_name, &i);
574 log_notice_errno(k, "Couldn't add inhibitor %s: %m", de->d_name);
579 k = inhibitor_load(i);
587 static int manager_dispatch_seat_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
588 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
589 Manager *m = userdata;
593 d = udev_monitor_receive_device(m->udev_seat_monitor);
597 manager_process_seat_device(m, d);
601 static int manager_dispatch_device_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
602 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
603 Manager *m = userdata;
607 d = udev_monitor_receive_device(m->udev_device_monitor);
611 manager_process_seat_device(m, d);
615 #if 0 /// UNNEEDED by elogind
616 static int manager_dispatch_vcsa_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
617 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
618 Manager *m = userdata;
623 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
627 name = udev_device_get_sysname(d);
629 /* Whenever a VCSA device is removed try to reallocate our
630 * VTs, to make sure our auto VTs never go away. */
632 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
633 seat_preallocate_vts(m->seat0);
639 static int manager_dispatch_button_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
640 _cleanup_(udev_device_unrefp) struct udev_device *d = NULL;
641 Manager *m = userdata;
645 d = udev_monitor_receive_device(m->udev_button_monitor);
649 manager_process_button_device(m, d);
653 static int manager_dispatch_console(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
654 Manager *m = userdata;
658 assert(m->console_active_fd == fd);
660 seat_read_active_vt(m->seat0);
664 #if 0 /// UNNEEDED by elogind
665 static int manager_reserve_vt(Manager *m) {
666 _cleanup_free_ char *p = NULL;
670 if (m->reserve_vt <= 0)
673 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
676 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
677 if (m->reserve_vt_fd < 0) {
679 /* Don't complain on VT-less systems */
681 log_warning_errno(errno, "Failed to pin reserved VT: %m");
689 static int manager_connect_bus(Manager *m) {
695 r = sd_bus_default_system(&m->bus);
697 return log_error_errno(r, "Failed to connect to system bus: %m");
699 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable, m);
701 return log_error_errno(r, "Failed to add manager object vtable: %m");
703 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable, seat_object_find, m);
705 return log_error_errno(r, "Failed to add seat object vtable: %m");
707 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/seat", seat_node_enumerator, m);
709 return log_error_errno(r, "Failed to add seat enumerator: %m");
711 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m);
713 return log_error_errno(r, "Failed to add session object vtable: %m");
715 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m);
717 return log_error_errno(r, "Failed to add session enumerator: %m");
719 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable, user_object_find, m);
721 return log_error_errno(r, "Failed to add user object vtable: %m");
723 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/user", user_node_enumerator, m);
725 return log_error_errno(r, "Failed to add user enumerator: %m");
727 #if 0 /// elogind does not support systemd as PID 1
728 r = sd_bus_match_signal_async(
731 "org.freedesktop.systemd1",
732 "/org/freedesktop/systemd1",
733 "org.freedesktop.systemd1.Manager",
735 match_job_removed, NULL, m);
737 return log_error_errno(r, "Failed to request match for JobRemoved: %m");
739 r = sd_bus_match_signal_async(
742 "org.freedesktop.systemd1",
743 "/org/freedesktop/systemd1",
744 "org.freedesktop.systemd1.Manager",
746 match_unit_removed, NULL, m);
748 return log_error_errno(r, "Failed to request match for UnitRemoved: %m");
750 r = sd_bus_match_signal_async(
753 "org.freedesktop.systemd1",
755 "org.freedesktop.DBus.Properties",
757 match_properties_changed, NULL, m);
759 return log_error_errno(r, "Failed to request match for PropertiesChanged: %m");
761 r = sd_bus_match_signal_async(
764 "org.freedesktop.systemd1",
765 "/org/freedesktop/systemd1",
766 "org.freedesktop.systemd1.Manager",
768 match_reloading, NULL, m);
770 return log_error_errno(r, "Failed to request match for Reloading: %m");
772 r = sd_bus_call_method_async(
775 "org.freedesktop.systemd1",
776 "/org/freedesktop/systemd1",
777 "org.freedesktop.systemd1.Manager",
783 return log_error_errno(r, "Failed to enable subscription: %m");
785 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.login1", 0, NULL, NULL);
787 return log_error_errno(r, "Failed to request name: %m");
789 r = sd_bus_attach_event(m->bus, m->event, SD_EVENT_PRIORITY_NORMAL);
791 return log_error_errno(r, "Failed to attach bus to event loop: %m");
793 #if 0 /// elogind has to setup its release agent
796 r = elogind_setup_cgroups_agent(m);
802 static int manager_vt_switch(sd_event_source *src, const struct signalfd_siginfo *si, void *data) {
804 Session *active, *iter;
807 * We got a VT-switch signal and we have to acknowledge it immediately.
808 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
809 * old user-space might run multiple sessions on a single VT, *sigh*.
810 * Therefore, we have to iterate all sessions and find one with a vtfd
811 * on the requested VT.
812 * As only VTs with active controllers have VT_PROCESS set, our current
813 * notion of the active VT might be wrong (for instance if the switch
814 * happens while we setup VT_PROCESS). Therefore, read the current VT
815 * first and then use s->active->vtnr as reference. Note that this is
816 * not racy, as no further VT-switch can happen as long as we're in
817 * synchronous VT_PROCESS mode.
821 seat_read_active_vt(m->seat0);
823 active = m->seat0->active;
824 if (!active || active->vtnr < 1) {
825 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
829 if (active->vtfd >= 0) {
830 session_leave_vt(active);
832 LIST_FOREACH(sessions_by_seat, iter, m->seat0->sessions) {
833 if (iter->vtnr == active->vtnr && iter->vtfd >= 0) {
834 session_leave_vt(iter);
843 static int manager_connect_console(Manager *m) {
847 assert(m->console_active_fd < 0);
849 /* On certain architectures (S390 and Xen, and containers),
850 /dev/tty0 does not exist, so don't fail if we can't open
852 if (access("/dev/tty0", F_OK) < 0)
855 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
856 if (m->console_active_fd < 0) {
858 /* On some systems the device node /dev/tty0 may exist
859 * even though /sys/class/tty/tty0 does not. */
863 return log_error_errno(errno, "Failed to open /sys/class/tty/tty0/active: %m");
866 r = sd_event_add_io(m->event, &m->console_active_event_source, m->console_active_fd, 0, manager_dispatch_console, m);
868 log_error("Failed to watch foreground console");
873 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
874 * as VT-acquire signal. We ignore any acquire-events (yes, we still
875 * have to provide a valid signal-number for it!) and acknowledge all
876 * release events immediately.
879 if (SIGRTMIN + 1 > SIGRTMAX) {
880 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN, SIGRTMAX);
884 assert_se(ignore_signals(SIGRTMIN + 1, -1) >= 0);
885 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGRTMIN, -1) >= 0);
887 r = sd_event_add_signal(m->event, NULL, SIGRTMIN, manager_vt_switch, m);
894 static int manager_connect_udev(Manager *m) {
898 assert(!m->udev_seat_monitor);
899 assert(!m->udev_device_monitor);
900 assert(!m->udev_vcsa_monitor);
901 assert(!m->udev_button_monitor);
903 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
904 if (!m->udev_seat_monitor)
907 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
911 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
915 r = sd_event_add_io(m->event, &m->udev_seat_event_source, udev_monitor_get_fd(m->udev_seat_monitor), EPOLLIN, manager_dispatch_seat_udev, m);
919 m->udev_device_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
920 if (!m->udev_device_monitor)
923 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
927 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
931 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
935 r = udev_monitor_enable_receiving(m->udev_device_monitor);
939 r = sd_event_add_io(m->event, &m->udev_device_event_source, udev_monitor_get_fd(m->udev_device_monitor), EPOLLIN, manager_dispatch_device_udev, m);
943 /* Don't watch keys if nobody cares */
944 if (!manager_all_buttons_ignored(m)) {
945 m->udev_button_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
946 if (!m->udev_button_monitor)
949 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
953 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
957 r = udev_monitor_enable_receiving(m->udev_button_monitor);
961 r = sd_event_add_io(m->event, &m->udev_button_event_source, udev_monitor_get_fd(m->udev_button_monitor), EPOLLIN, manager_dispatch_button_udev, m);
966 /* Don't bother watching VCSA devices, if nobody cares */
967 #if 0 /// elogind does not support autospawning of vts
968 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
970 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
971 if (!m->udev_vcsa_monitor)
974 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
978 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
982 r = sd_event_add_io(m->event, &m->udev_vcsa_event_source, udev_monitor_get_fd(m->udev_vcsa_monitor), EPOLLIN, manager_dispatch_vcsa_udev, m);
991 static void manager_gc(Manager *m, bool drop_not_started) {
998 while ((seat = m->seat_gc_queue)) {
999 LIST_REMOVE(gc_queue, m->seat_gc_queue, seat);
1000 seat->in_gc_queue = false;
1002 if (seat_may_gc(seat, drop_not_started)) {
1003 seat_stop(seat, false);
1008 while ((session = m->session_gc_queue)) {
1009 LIST_REMOVE(gc_queue, m->session_gc_queue, session);
1010 session->in_gc_queue = false;
1012 /* First, if we are not closing yet, initiate stopping */
1013 if (session_may_gc(session, drop_not_started) &&
1014 session_get_state(session) != SESSION_CLOSING)
1015 session_stop(session, false);
1017 /* Normally, this should make the session referenced
1018 * again, if it doesn't then let's get rid of it
1020 if (session_may_gc(session, drop_not_started)) {
1021 session_finalize(session);
1022 session_free(session);
1026 while ((user = m->user_gc_queue)) {
1027 LIST_REMOVE(gc_queue, m->user_gc_queue, user);
1028 user->in_gc_queue = false;
1030 /* First step: queue stop jobs */
1031 if (user_may_gc(user, drop_not_started))
1032 user_stop(user, false);
1034 /* Second step: finalize user */
1035 if (user_may_gc(user, drop_not_started)) {
1036 user_finalize(user);
1042 static int manager_dispatch_idle_action(sd_event_source *s, uint64_t t, void *userdata) {
1043 Manager *m = userdata;
1044 struct dual_timestamp since;
1050 if (m->idle_action == HANDLE_IGNORE ||
1051 m->idle_action_usec <= 0)
1054 n = now(CLOCK_MONOTONIC);
1056 r = manager_get_idle_hint(m, &since);
1058 /* Not idle. Let's check if after a timeout it might be idle then. */
1059 elapse = n + m->idle_action_usec;
1061 /* Idle! Let's see if it's time to do something, or if
1062 * we shall sleep for longer. */
1064 if (n >= since.monotonic + m->idle_action_usec &&
1065 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
1066 log_info("System idle. Taking action.");
1068 manager_handle_action(m, 0, m->idle_action, false, false);
1069 m->idle_action_not_before_usec = n;
1072 elapse = MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec;
1075 if (!m->idle_action_event_source) {
1077 r = sd_event_add_time(
1079 &m->idle_action_event_source,
1081 elapse, USEC_PER_SEC*30,
1082 manager_dispatch_idle_action, m);
1084 return log_error_errno(r, "Failed to add idle event source: %m");
1086 r = sd_event_source_set_priority(m->idle_action_event_source, SD_EVENT_PRIORITY_IDLE+10);
1088 return log_error_errno(r, "Failed to set idle event source priority: %m");
1090 r = sd_event_source_set_time(m->idle_action_event_source, elapse);
1092 return log_error_errno(r, "Failed to set idle event timer: %m");
1094 r = sd_event_source_set_enabled(m->idle_action_event_source, SD_EVENT_ONESHOT);
1096 return log_error_errno(r, "Failed to enable idle event timer: %m");
1102 #if 0 /// elogind parses its own config file
1104 const char* logind_conf = getenv("ELOGIND_CONF_FILE");
1109 logind_conf = PKGSYSCONFDIR "/logind.conf";
1111 return config_parse(NULL, logind_conf, NULL, "Login\0Sleep\0",
1112 config_item_perf_lookup, logind_gperf_lookup,
1114 static int manager_dispatch_reload_signal(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1115 Manager *m = userdata;
1118 manager_reset_config(m);
1119 r = manager_parse_config_file(m);
1121 log_warning_errno(r, "Failed to parse config file, using defaults: %m");
1123 log_info("Config file reloaded.");
1125 #if 1 /// elogind needs an Add-On for sleep configuration
1126 elogind_manager_reset_config(m);
1131 static int manager_startup(Manager *m) {
1137 Inhibitor *inhibitor;
1142 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGHUP, -1) >= 0);
1144 r = sd_event_add_signal(m->event, NULL, SIGHUP, manager_dispatch_reload_signal, m);
1146 return log_error_errno(r, "Failed to register SIGHUP handler: %m");
1148 #if 1 /// elogind needs some extra preparations before connecting...
1149 elogind_manager_startup(m);
1151 /* Connect to console */
1152 r = manager_connect_console(m);
1156 /* Connect to udev */
1157 r = manager_connect_udev(m);
1159 return log_error_errno(r, "Failed to create udev watchers: %m");
1161 /* Connect to the bus */
1162 r = manager_connect_bus(m);
1166 /* Instantiate magic seat 0 */
1167 r = manager_add_seat(m, "seat0", &m->seat0);
1169 return log_error_errno(r, "Failed to add seat0: %m");
1171 r = manager_set_lid_switch_ignore(m, 0 + m->holdoff_timeout_usec);
1173 log_warning_errno(r, "Failed to set up lid switch ignore event source: %m");
1175 /* Deserialize state */
1176 r = manager_enumerate_devices(m);
1178 log_warning_errno(r, "Device enumeration failed: %m");
1180 r = manager_enumerate_seats(m);
1182 log_warning_errno(r, "Seat enumeration failed: %m");
1184 r = manager_enumerate_users(m);
1186 log_warning_errno(r, "User enumeration failed: %m");
1188 r = manager_enumerate_sessions(m);
1190 log_warning_errno(r, "Session enumeration failed: %m");
1192 r = manager_enumerate_inhibitors(m);
1194 log_warning_errno(r, "Inhibitor enumeration failed: %m");
1196 r = manager_enumerate_buttons(m);
1198 log_warning_errno(r, "Button enumeration failed: %m");
1200 /* Remove stale objects before we start them */
1201 manager_gc(m, false);
1203 /* Reserve the special reserved VT */
1204 #if 0 /// elogind does not support autospawning of vts
1205 manager_reserve_vt(m);
1208 /* And start everything */
1209 HASHMAP_FOREACH(seat, m->seats, i)
1212 HASHMAP_FOREACH(user, m->users, i)
1215 HASHMAP_FOREACH(session, m->sessions, i)
1216 session_start(session, NULL);
1218 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1219 inhibitor_start(inhibitor);
1221 HASHMAP_FOREACH(button, m->buttons, i)
1222 button_check_switches(button);
1224 manager_dispatch_idle_action(NULL, 0, m);
1229 static int manager_run(Manager *m) {
1235 r = sd_event_get_state(m->event);
1238 if (r == SD_EVENT_FINISHED)
1241 manager_gc(m, true);
1243 r = manager_dispatch_delayed(m, false);
1249 r = sd_event_run(m->event, (uint64_t) -1);
1255 int main(int argc, char *argv[]) {
1259 #if 1 /// perform extra checks for elogind startup
1260 r = elogind_startup(argc, argv);
1262 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1264 elogind_set_program_name(argv[0]);
1265 log_set_target(LOG_TARGET_AUTO);
1266 log_set_facility(LOG_AUTH);
1267 log_parse_environment();
1268 #if ENABLE_DEBUG_ELOGIND
1269 log_set_max_level(LOG_DEBUG);
1270 log_set_target(LOG_TARGET_SYSLOG_OR_KMSG);
1271 #endif // ENABLE_DEBUG_ELOGIND
1276 #if 0 /// elogind has some extra functionality at startup, argc can be != 1
1278 log_error("This program takes no arguments.");
1284 r = mac_selinux_init();
1286 log_error_errno(r, "Could not initialize labelling: %m");
1290 /* Always create the directories people can create inotify
1291 * watches in. Note that some applications might check for the
1292 * existence of /run/systemd/seats/ to determine whether
1293 * logind is available, so please always make sure this check
1295 #if 0 /// elogind can not rely on systemd to help, so we need a bit more effort than this
1296 mkdir_label("/run/systemd/seats", 0755);
1297 mkdir_label("/run/systemd/users", 0755);
1298 mkdir_label("/run/systemd/sessions", 0755);
1300 r = mkdir_label("/run/systemd", 0755);
1301 if ( (r < 0) && (-EEXIST != r) )
1302 return log_error_errno(r, "Failed to create /run/systemd : %m");
1303 r = mkdir_label("/run/systemd/seats", 0755);
1304 if ( r < 0 && (-EEXIST != r) )
1305 return log_error_errno(r, "Failed to create /run/systemd/seats : %m");
1306 r = mkdir_label("/run/systemd/users", 0755);
1307 if ( r < 0 && (-EEXIST != r) )
1308 return log_error_errno(r, "Failed to create /run/systemd/users : %m");
1309 r = mkdir_label("/run/systemd/sessions", 0755);
1310 if ( r < 0 && (-EEXIST != r) )
1311 return log_error_errno(r, "Failed to create /run/systemd/sessions : %m");
1312 r = mkdir_label("/run/systemd/machines", 0755);
1313 if ( r < 0 && (-EEXIST != r) )
1314 return log_error_errno(r, "Failed to create /run/systemd/machines : %m");
1323 manager_parse_config_file(m);
1325 #if 1 /// elogind needs an Add-On for sleep configuration
1326 elogind_manager_reset_config(m);
1328 r = manager_startup(m);
1330 log_error_errno(r, "Failed to fully start up daemon: %m");
1334 log_debug("elogind running as pid "PID_FMT, getpid_cached());
1338 "STATUS=Processing requests...");
1342 log_debug("elogind stopped as pid "PID_FMT, getpid_cached());
1347 "STATUS=Shutting down...");
1351 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;