1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 This file is part of systemd.
5 Copyright 2011 Lennart Poettering
7 systemd is free software; you can redistribute it and/or modify it
8 under the terms of the GNU Lesser General Public License as published by
9 the Free Software Foundation; either version 2.1 of the License, or
10 (at your option) any later version.
12 systemd is distributed in the hope that it will be useful, but
13 WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 Lesser General Public License for more details.
17 You should have received a copy of the GNU Lesser General Public License
18 along with systemd; If not, see <http://www.gnu.org/licenses/>.
26 #if 0 /// elogind needs the systems udev header
31 #include "sd-daemon.h"
33 #include "alloc-util.h"
34 #include "bus-error.h"
36 //#include "cgroup-util.h"
37 #include "conf-parser.h"
39 #include "dirent-util.h"
41 #include "format-util.h"
42 //#include "fs-util.h"
44 //#include "process-util.h"
45 #include "selinux-util.h"
46 #include "signal-util.h"
48 #include "udev-util.h"
49 /// Additional includes needed by elogind
50 #include "cgroup.h" // From src/core/
53 #include "musl_missing.h"
54 #include "process-util.h"
55 #include "cgroup-util.h"
57 static void manager_free(Manager *m);
59 static void manager_reset_config(Manager *m) {
60 #if 0 /// elogind does not support autospawning of vts
65 m->inhibit_delay_max = 5 * USEC_PER_SEC;
66 m->handle_power_key = HANDLE_POWEROFF;
67 m->handle_suspend_key = HANDLE_SUSPEND;
68 m->handle_hibernate_key = HANDLE_HIBERNATE;
69 m->handle_lid_switch = HANDLE_SUSPEND;
70 m->handle_lid_switch_ep = _HANDLE_ACTION_INVALID;
71 m->handle_lid_switch_docked = HANDLE_IGNORE;
72 m->power_key_ignore_inhibited = false;
73 m->suspend_key_ignore_inhibited = false;
74 m->hibernate_key_ignore_inhibited = false;
75 m->lid_switch_ignore_inhibited = true;
77 m->holdoff_timeout_usec = 30 * USEC_PER_SEC;
79 m->idle_action_usec = 30 * USEC_PER_MINUTE;
80 m->idle_action = HANDLE_IGNORE;
82 m->runtime_dir_size = physical_memory_scale(10U, 100U); /* 10% */
83 m->user_tasks_max = system_tasks_max_scale(DEFAULT_USER_TASKS_MAX_PERCENTAGE, 100U); /* 33% */
84 m->sessions_max = 8192;
85 m->inhibitors_max = 8192;
87 m->kill_user_processes = KILL_USER_PROCESSES;
89 m->kill_only_users = strv_free(m->kill_only_users);
90 m->kill_exclude_users = strv_free(m->kill_exclude_users);
93 static Manager *manager_new(void) {
101 m->console_active_fd = -1;
102 #if 0 /// UNNEEDED by elogind
103 m->reserve_vt_fd = -1;
106 m->idle_action_not_before_usec = now(CLOCK_MONOTONIC);
108 m->devices = hashmap_new(&string_hash_ops);
109 m->seats = hashmap_new(&string_hash_ops);
110 m->sessions = hashmap_new(&string_hash_ops);
111 m->users = hashmap_new(NULL);
112 m->inhibitors = hashmap_new(&string_hash_ops);
113 m->buttons = hashmap_new(&string_hash_ops);
115 m->user_units = hashmap_new(&string_hash_ops);
116 m->session_units = hashmap_new(&string_hash_ops);
118 if (!m->devices || !m->seats || !m->sessions || !m->users || !m->inhibitors || !m->buttons || !m->user_units || !m->session_units)
121 #if 1 /// elogind needs some more data
122 r = elogind_manager_new(m);
126 m->udev = udev_new();
130 r = sd_event_default(&m->event);
134 sd_event_set_watchdog(m->event, true);
136 manager_reset_config(m);
145 static void manager_free(Manager *m) {
156 while ((session = hashmap_first(m->sessions)))
157 session_free(session);
159 while ((u = hashmap_first(m->users)))
162 while ((d = hashmap_first(m->devices)))
165 while ((s = hashmap_first(m->seats)))
168 while ((i = hashmap_first(m->inhibitors)))
171 while ((b = hashmap_first(m->buttons)))
174 hashmap_free(m->devices);
175 hashmap_free(m->seats);
176 hashmap_free(m->sessions);
177 hashmap_free(m->users);
178 hashmap_free(m->inhibitors);
179 hashmap_free(m->buttons);
181 hashmap_free(m->user_units);
182 hashmap_free(m->session_units);
184 sd_event_source_unref(m->idle_action_event_source);
185 sd_event_source_unref(m->inhibit_timeout_source);
186 sd_event_source_unref(m->scheduled_shutdown_timeout_source);
187 sd_event_source_unref(m->nologin_timeout_source);
188 sd_event_source_unref(m->wall_message_timeout_source);
190 sd_event_source_unref(m->console_active_event_source);
191 sd_event_source_unref(m->udev_seat_event_source);
192 sd_event_source_unref(m->udev_device_event_source);
193 sd_event_source_unref(m->udev_vcsa_event_source);
194 sd_event_source_unref(m->udev_button_event_source);
195 sd_event_source_unref(m->lid_switch_ignore_event_source);
197 safe_close(m->console_active_fd);
199 udev_monitor_unref(m->udev_seat_monitor);
200 udev_monitor_unref(m->udev_device_monitor);
201 udev_monitor_unref(m->udev_vcsa_monitor);
202 udev_monitor_unref(m->udev_button_monitor);
206 if (m->unlink_nologin)
207 (void) unlink_or_warn("/run/nologin");
209 bus_verify_polkit_async_registry_free(m->polkit_registry);
211 sd_bus_unref(m->bus);
212 sd_event_unref(m->event);
214 #if 0 /// elogind does not support autospawning of vts
215 safe_close(m->reserve_vt_fd);
217 #if 1 /// elogind has to free its own data
218 elogind_manager_free(m);
221 strv_free(m->kill_only_users);
222 strv_free(m->kill_exclude_users);
224 free(m->scheduled_shutdown_type);
225 free(m->scheduled_shutdown_tty);
226 free(m->wall_message);
227 #if 0 /// UNNEEDED by elogind
233 static int manager_enumerate_devices(Manager *m) {
234 struct udev_list_entry *item = NULL, *first = NULL;
235 _cleanup_udev_enumerate_unref_ struct udev_enumerate *e = NULL;
240 /* Loads devices from udev and creates seats for them as
243 e = udev_enumerate_new(m->udev);
247 r = udev_enumerate_add_match_tag(e, "master-of-seat");
251 r = udev_enumerate_add_match_is_initialized(e);
255 r = udev_enumerate_scan_devices(e);
259 first = udev_enumerate_get_list_entry(e);
260 udev_list_entry_foreach(item, first) {
261 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
264 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
268 k = manager_process_seat_device(m, d);
276 static int manager_enumerate_buttons(Manager *m) {
277 _cleanup_udev_enumerate_unref_ struct udev_enumerate *e = NULL;
278 struct udev_list_entry *item = NULL, *first = NULL;
283 /* Loads buttons from udev */
285 if (manager_all_buttons_ignored(m))
288 e = udev_enumerate_new(m->udev);
292 r = udev_enumerate_add_match_subsystem(e, "input");
296 r = udev_enumerate_add_match_tag(e, "power-switch");
300 r = udev_enumerate_add_match_is_initialized(e);
304 r = udev_enumerate_scan_devices(e);
308 first = udev_enumerate_get_list_entry(e);
309 udev_list_entry_foreach(item, first) {
310 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
313 d = udev_device_new_from_syspath(m->udev, udev_list_entry_get_name(item));
317 k = manager_process_button_device(m, d);
325 static int manager_enumerate_seats(Manager *m) {
326 _cleanup_closedir_ DIR *d = NULL;
332 /* This loads data about seats stored on disk, but does not
333 * actually create any seats. Removes data of seats that no
336 d = opendir("/run/systemd/seats");
341 return log_error_errno(errno, "Failed to open /run/systemd/seats: %m");
344 FOREACH_DIRENT(de, d, return -errno) {
348 if (!dirent_is_file(de))
351 s = hashmap_get(m->seats, de->d_name);
353 if (unlinkat(dirfd(d), de->d_name, 0) < 0)
354 log_warning("Failed to remove /run/systemd/seats/%s: %m",
367 static int manager_enumerate_linger_users(Manager *m) {
368 _cleanup_closedir_ DIR *d = NULL;
374 d = opendir("/var/lib/elogind/linger");
379 return log_error_errno(errno, "Failed to open /var/lib/elogind/linger/: %m");
382 FOREACH_DIRENT(de, d, return -errno) {
385 if (!dirent_is_file(de))
388 k = manager_add_user_by_name(m, de->d_name, NULL);
390 log_notice_errno(k, "Couldn't add lingering user %s: %m", de->d_name);
398 static int manager_enumerate_users(Manager *m) {
399 _cleanup_closedir_ DIR *d = NULL;
405 /* Add lingering users */
406 r = manager_enumerate_linger_users(m);
408 /* Read in user data stored on disk */
409 d = opendir("/run/systemd/users");
414 return log_error_errno(errno, "Failed to open /run/systemd/users: %m");
417 FOREACH_DIRENT(de, d, return -errno) {
420 if (!dirent_is_file(de))
423 k = manager_add_user_by_name(m, de->d_name, &u);
425 log_error_errno(k, "Failed to add user by file name %s: %m", de->d_name);
431 user_add_to_gc_queue(u);
441 static int manager_attach_fds(Manager *m) {
442 _cleanup_strv_free_ char **fdnames = NULL;
445 /* Upon restart, PID1 will send us back all fds of session devices
446 * that we previously opened. Each file descriptor is associated
447 * with a given session. The session ids are passed through FDNAMES. */
449 n = sd_listen_fds_with_names(true, &fdnames);
453 for (i = 0; i < n; i++) {
459 fd = SD_LISTEN_FDS_START + i;
461 id = startswith(fdnames[i], "session-");
465 s = hashmap_get(m->sessions, id);
467 /* If the session doesn't exist anymore, the associated session
468 * device attached to this fd doesn't either. Let's simply close
470 log_debug("Failed to attach fd for unknown session: %s", id);
475 if (fstat(fd, &st) < 0) {
476 /* The device is allowed to go away at a random point, in which
477 * case fstat failing is expected. */
478 log_debug_errno(errno, "Failed to stat device fd for session %s: %m", id);
483 sd = hashmap_get(s->devices, &st.st_rdev);
485 /* Weird we got an fd for a session device which wasn't
486 * recorded in the session state file... */
487 log_warning("Got fd for missing session device [%u:%u] in session %s",
488 major(st.st_rdev), minor(st.st_rdev), s->id);
493 log_debug("Attaching fd to session device [%u:%u] for session %s",
494 major(st.st_rdev), minor(st.st_rdev), s->id);
496 session_device_attach_fd(sd, fd, s->was_active);
502 static int manager_enumerate_sessions(Manager *m) {
503 _cleanup_closedir_ DIR *d = NULL;
509 /* Read in session data stored on disk */
510 d = opendir("/run/systemd/sessions");
515 return log_error_errno(errno, "Failed to open /run/systemd/sessions: %m");
518 FOREACH_DIRENT(de, d, return -errno) {
521 if (!dirent_is_file(de))
524 if (!session_id_valid(de->d_name)) {
525 log_warning("Invalid session file name '%s', ignoring.", de->d_name);
530 k = manager_add_session(m, de->d_name, &s);
532 log_error_errno(k, "Failed to add session by file name %s: %m", de->d_name);
537 session_add_to_gc_queue(s);
544 /* We might be restarted and PID1 could have sent us back the
545 * session device fds we previously saved. */
546 k = manager_attach_fds(m);
548 log_warning_errno(k, "Failed to reattach session device fds: %m");
553 static int manager_enumerate_inhibitors(Manager *m) {
554 _cleanup_closedir_ DIR *d = NULL;
560 d = opendir("/run/systemd/inhibit");
565 return log_error_errno(errno, "Failed to open /run/systemd/inhibit: %m");
568 FOREACH_DIRENT(de, d, return -errno) {
572 if (!dirent_is_file(de))
575 k = manager_add_inhibitor(m, de->d_name, &i);
577 log_notice_errno(k, "Couldn't add inhibitor %s: %m", de->d_name);
582 k = inhibitor_load(i);
590 static int manager_dispatch_seat_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
591 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
592 Manager *m = userdata;
596 d = udev_monitor_receive_device(m->udev_seat_monitor);
600 manager_process_seat_device(m, d);
604 static int manager_dispatch_device_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
605 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
606 Manager *m = userdata;
610 d = udev_monitor_receive_device(m->udev_device_monitor);
614 manager_process_seat_device(m, d);
618 #if 0 /// UNNEEDED by elogind
619 static int manager_dispatch_vcsa_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
620 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
621 Manager *m = userdata;
626 d = udev_monitor_receive_device(m->udev_vcsa_monitor);
630 name = udev_device_get_sysname(d);
632 /* Whenever a VCSA device is removed try to reallocate our
633 * VTs, to make sure our auto VTs never go away. */
635 if (name && startswith(name, "vcsa") && streq_ptr(udev_device_get_action(d), "remove"))
636 seat_preallocate_vts(m->seat0);
642 static int manager_dispatch_button_udev(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
643 _cleanup_udev_device_unref_ struct udev_device *d = NULL;
644 Manager *m = userdata;
648 d = udev_monitor_receive_device(m->udev_button_monitor);
652 manager_process_button_device(m, d);
656 static int manager_dispatch_console(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
657 Manager *m = userdata;
661 assert(m->console_active_fd == fd);
663 seat_read_active_vt(m->seat0);
667 #if 0 /// UNNEEDED by elogind
668 static int manager_reserve_vt(Manager *m) {
669 _cleanup_free_ char *p = NULL;
673 if (m->reserve_vt <= 0)
676 if (asprintf(&p, "/dev/tty%u", m->reserve_vt) < 0)
679 m->reserve_vt_fd = open(p, O_RDWR|O_NOCTTY|O_CLOEXEC|O_NONBLOCK);
680 if (m->reserve_vt_fd < 0) {
682 /* Don't complain on VT-less systems */
684 log_warning_errno(errno, "Failed to pin reserved VT: %m");
692 static int manager_connect_bus(Manager *m) {
698 r = sd_bus_default_system(&m->bus);
700 return log_error_errno(r, "Failed to connect to system bus: %m");
702 r = sd_bus_add_object_vtable(m->bus, NULL, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable, m);
704 return log_error_errno(r, "Failed to add manager object vtable: %m");
706 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable, seat_object_find, m);
708 return log_error_errno(r, "Failed to add seat object vtable: %m");
710 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/seat", seat_node_enumerator, m);
712 return log_error_errno(r, "Failed to add seat enumerator: %m");
714 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable, session_object_find, m);
716 return log_error_errno(r, "Failed to add session object vtable: %m");
718 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/session", session_node_enumerator, m);
720 return log_error_errno(r, "Failed to add session enumerator: %m");
722 r = sd_bus_add_fallback_vtable(m->bus, NULL, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable, user_object_find, m);
724 return log_error_errno(r, "Failed to add user object vtable: %m");
726 r = sd_bus_add_node_enumerator(m->bus, NULL, "/org/freedesktop/login1/user", user_node_enumerator, m);
728 return log_error_errno(r, "Failed to add user enumerator: %m");
730 #if 0 /// elogind does not support systemd as PID 1
731 r = sd_bus_match_signal_async(
734 "org.freedesktop.systemd1",
735 "/org/freedesktop/systemd1",
736 "org.freedesktop.systemd1.Manager",
738 match_job_removed, NULL, m);
740 return log_error_errno(r, "Failed to request match for JobRemoved: %m");
742 r = sd_bus_match_signal_async(
745 "org.freedesktop.systemd1",
746 "/org/freedesktop/systemd1",
747 "org.freedesktop.systemd1.Manager",
749 match_unit_removed, NULL, m);
751 return log_error_errno(r, "Failed to request match for UnitRemoved: %m");
753 r = sd_bus_match_signal_async(
756 "org.freedesktop.systemd1",
758 "org.freedesktop.DBus.Properties",
760 match_properties_changed, NULL, m);
762 return log_error_errno(r, "Failed to request match for PropertiesChanged: %m");
764 r = sd_bus_match_signal_async(
767 "org.freedesktop.systemd1",
768 "/org/freedesktop/systemd1",
769 "org.freedesktop.systemd1.Manager",
771 match_reloading, NULL, m);
773 return log_error_errno(r, "Failed to request match for Reloading: %m");
775 r = sd_bus_call_method_async(
778 "org.freedesktop.systemd1",
779 "/org/freedesktop/systemd1",
780 "org.freedesktop.systemd1.Manager",
786 return log_error_errno(r, "Failed to enable subscription: %m");
788 r = sd_bus_request_name_async(m->bus, NULL, "org.freedesktop.login1", 0, NULL, NULL);
790 return log_error_errno(r, "Failed to request name: %m");
792 r = sd_bus_attach_event(m->bus, m->event, SD_EVENT_PRIORITY_NORMAL);
794 return log_error_errno(r, "Failed to attach bus to event loop: %m");
796 #if 0 /// elogind has to setup its release agent
799 r = elogind_setup_cgroups_agent(m);
805 static int manager_vt_switch(sd_event_source *src, const struct signalfd_siginfo *si, void *data) {
807 Session *active, *iter;
810 * We got a VT-switch signal and we have to acknowledge it immediately.
811 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
812 * old user-space might run multiple sessions on a single VT, *sigh*.
813 * Therefore, we have to iterate all sessions and find one with a vtfd
814 * on the requested VT.
815 * As only VTs with active controllers have VT_PROCESS set, our current
816 * notion of the active VT might be wrong (for instance if the switch
817 * happens while we setup VT_PROCESS). Therefore, read the current VT
818 * first and then use s->active->vtnr as reference. Note that this is
819 * not racy, as no further VT-switch can happen as long as we're in
820 * synchronous VT_PROCESS mode.
824 seat_read_active_vt(m->seat0);
826 active = m->seat0->active;
827 if (!active || active->vtnr < 1) {
828 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
832 if (active->vtfd >= 0) {
833 session_leave_vt(active);
835 LIST_FOREACH(sessions_by_seat, iter, m->seat0->sessions) {
836 if (iter->vtnr == active->vtnr && iter->vtfd >= 0) {
837 session_leave_vt(iter);
846 static int manager_connect_console(Manager *m) {
850 assert(m->console_active_fd < 0);
852 /* On certain architectures (S390 and Xen, and containers),
853 /dev/tty0 does not exist, so don't fail if we can't open
855 if (access("/dev/tty0", F_OK) < 0)
858 m->console_active_fd = open("/sys/class/tty/tty0/active", O_RDONLY|O_NOCTTY|O_CLOEXEC);
859 if (m->console_active_fd < 0) {
861 /* On some systems the device node /dev/tty0 may exist
862 * even though /sys/class/tty/tty0 does not. */
866 return log_error_errno(errno, "Failed to open /sys/class/tty/tty0/active: %m");
869 r = sd_event_add_io(m->event, &m->console_active_event_source, m->console_active_fd, 0, manager_dispatch_console, m);
871 log_error("Failed to watch foreground console");
876 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
877 * as VT-acquire signal. We ignore any acquire-events (yes, we still
878 * have to provide a valid signal-number for it!) and acknowledge all
879 * release events immediately.
882 if (SIGRTMIN + 1 > SIGRTMAX) {
883 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN, SIGRTMAX);
887 assert_se(ignore_signals(SIGRTMIN + 1, -1) >= 0);
888 assert_se(sigprocmask_many(SIG_BLOCK, NULL, SIGRTMIN, -1) >= 0);
890 r = sd_event_add_signal(m->event, NULL, SIGRTMIN, manager_vt_switch, m);
897 static int manager_connect_udev(Manager *m) {
901 assert(!m->udev_seat_monitor);
902 assert(!m->udev_device_monitor);
903 assert(!m->udev_vcsa_monitor);
904 assert(!m->udev_button_monitor);
906 m->udev_seat_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
907 if (!m->udev_seat_monitor)
910 r = udev_monitor_filter_add_match_tag(m->udev_seat_monitor, "master-of-seat");
914 r = udev_monitor_enable_receiving(m->udev_seat_monitor);
918 r = sd_event_add_io(m->event, &m->udev_seat_event_source, udev_monitor_get_fd(m->udev_seat_monitor), EPOLLIN, manager_dispatch_seat_udev, m);
922 m->udev_device_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
923 if (!m->udev_device_monitor)
926 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "input", NULL);
930 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "graphics", NULL);
934 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_device_monitor, "drm", NULL);
938 r = udev_monitor_enable_receiving(m->udev_device_monitor);
942 r = sd_event_add_io(m->event, &m->udev_device_event_source, udev_monitor_get_fd(m->udev_device_monitor), EPOLLIN, manager_dispatch_device_udev, m);
946 /* Don't watch keys if nobody cares */
947 if (!manager_all_buttons_ignored(m)) {
948 m->udev_button_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
949 if (!m->udev_button_monitor)
952 r = udev_monitor_filter_add_match_tag(m->udev_button_monitor, "power-switch");
956 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_button_monitor, "input", NULL);
960 r = udev_monitor_enable_receiving(m->udev_button_monitor);
964 r = sd_event_add_io(m->event, &m->udev_button_event_source, udev_monitor_get_fd(m->udev_button_monitor), EPOLLIN, manager_dispatch_button_udev, m);
969 /* Don't bother watching VCSA devices, if nobody cares */
970 #if 0 /// elogind does not support autospawning of vts
971 if (m->n_autovts > 0 && m->console_active_fd >= 0) {
973 m->udev_vcsa_monitor = udev_monitor_new_from_netlink(m->udev, "udev");
974 if (!m->udev_vcsa_monitor)
977 r = udev_monitor_filter_add_match_subsystem_devtype(m->udev_vcsa_monitor, "vc", NULL);
981 r = udev_monitor_enable_receiving(m->udev_vcsa_monitor);
985 r = sd_event_add_io(m->event, &m->udev_vcsa_event_source, udev_monitor_get_fd(m->udev_vcsa_monitor), EPOLLIN, manager_dispatch_vcsa_udev, m);
994 static void manager_gc(Manager *m, bool drop_not_started) {
1001 while ((seat = m->seat_gc_queue)) {
1002 LIST_REMOVE(gc_queue, m->seat_gc_queue, seat);
1003 seat->in_gc_queue = false;
1005 if (!seat_check_gc(seat, drop_not_started)) {
1006 seat_stop(seat, false);
1011 while ((session = m->session_gc_queue)) {
1012 LIST_REMOVE(gc_queue, m->session_gc_queue, session);
1013 session->in_gc_queue = false;
1015 /* First, if we are not closing yet, initiate stopping */
1016 if (!session_check_gc(session, drop_not_started) &&
1017 session_get_state(session) != SESSION_CLOSING)
1018 session_stop(session, false);
1020 /* Normally, this should make the session referenced
1021 * again, if it doesn't then let's get rid of it
1023 if (!session_check_gc(session, drop_not_started)) {
1024 session_finalize(session);
1025 session_free(session);
1029 while ((user = m->user_gc_queue)) {
1030 LIST_REMOVE(gc_queue, m->user_gc_queue, user);
1031 user->in_gc_queue = false;
1033 /* First step: queue stop jobs */
1034 if (!user_check_gc(user, drop_not_started))
1035 user_stop(user, false);
1037 /* Second step: finalize user */
1038 if (!user_check_gc(user, drop_not_started)) {
1039 user_finalize(user);
1045 static int manager_dispatch_idle_action(sd_event_source *s, uint64_t t, void *userdata) {
1046 Manager *m = userdata;
1047 struct dual_timestamp since;
1053 if (m->idle_action == HANDLE_IGNORE ||
1054 m->idle_action_usec <= 0)
1057 n = now(CLOCK_MONOTONIC);
1059 r = manager_get_idle_hint(m, &since);
1061 /* Not idle. Let's check if after a timeout it might be idle then. */
1062 elapse = n + m->idle_action_usec;
1064 /* Idle! Let's see if it's time to do something, or if
1065 * we shall sleep for longer. */
1067 if (n >= since.monotonic + m->idle_action_usec &&
1068 (m->idle_action_not_before_usec <= 0 || n >= m->idle_action_not_before_usec + m->idle_action_usec)) {
1069 log_info("System idle. Taking action.");
1071 manager_handle_action(m, 0, m->idle_action, false, false);
1072 m->idle_action_not_before_usec = n;
1075 elapse = MAX(since.monotonic, m->idle_action_not_before_usec) + m->idle_action_usec;
1078 if (!m->idle_action_event_source) {
1080 r = sd_event_add_time(
1082 &m->idle_action_event_source,
1084 elapse, USEC_PER_SEC*30,
1085 manager_dispatch_idle_action, m);
1087 return log_error_errno(r, "Failed to add idle event source: %m");
1089 r = sd_event_source_set_priority(m->idle_action_event_source, SD_EVENT_PRIORITY_IDLE+10);
1091 return log_error_errno(r, "Failed to set idle event source priority: %m");
1093 r = sd_event_source_set_time(m->idle_action_event_source, elapse);
1095 return log_error_errno(r, "Failed to set idle event timer: %m");
1097 r = sd_event_source_set_enabled(m->idle_action_event_source, SD_EVENT_ONESHOT);
1099 return log_error_errno(r, "Failed to enable idle event timer: %m");
1105 static int manager_parse_config_file(Manager *m) {
1106 #if 0 /// elogind parses its own config file
1109 return config_parse_many_nulstr(PKGSYSCONFDIR "/logind.conf",
1110 CONF_PATHS_NULSTR("systemd/logind.conf.d"),
1112 config_item_perf_lookup, logind_gperf_lookup,
1114 const char* logind_conf = getenv("ELOGIND_CONF_FILE");
1119 logind_conf = PKGSYSCONFDIR "/logind.conf";
1121 return config_parse(NULL, logind_conf, NULL, "Login\0Sleep\0",
1122 config_item_perf_lookup, logind_gperf_lookup,
1124 CONFIG_PARSE_WARN, m);
1127 static int manager_dispatch_reload_signal(sd_event_source *s, const struct signalfd_siginfo *si, void *userdata) {
1128 Manager *m = userdata;
1131 manager_reset_config(m);
1132 r = manager_parse_config_file(m);
1134 log_warning_errno(r, "Failed to parse config file, using defaults: %m");
1136 log_info("Config file reloaded.");
1138 #if 1 /// elogind needs an Add-On for sleep configuration
1139 elogind_manager_reset_config(m);
1144 static int manager_startup(Manager *m) {
1150 Inhibitor *inhibitor;
1155 assert_se(sigprocmask_many(SIG_SETMASK, NULL, SIGHUP, -1) >= 0);
1157 r = sd_event_add_signal(m->event, NULL, SIGHUP, manager_dispatch_reload_signal, m);
1159 return log_error_errno(r, "Failed to register SIGHUP handler: %m");
1161 #if 1 /// elogind needs some extra preparations before connecting...
1162 elogind_manager_startup(m);
1164 /* Connect to console */
1165 r = manager_connect_console(m);
1169 /* Connect to udev */
1170 r = manager_connect_udev(m);
1172 return log_error_errno(r, "Failed to create udev watchers: %m");
1174 /* Connect to the bus */
1175 r = manager_connect_bus(m);
1179 /* Instantiate magic seat 0 */
1180 r = manager_add_seat(m, "seat0", &m->seat0);
1182 return log_error_errno(r, "Failed to add seat0: %m");
1184 r = manager_set_lid_switch_ignore(m, 0 + m->holdoff_timeout_usec);
1186 log_warning_errno(r, "Failed to set up lid switch ignore event source: %m");
1188 /* Deserialize state */
1189 r = manager_enumerate_devices(m);
1191 log_warning_errno(r, "Device enumeration failed: %m");
1193 r = manager_enumerate_seats(m);
1195 log_warning_errno(r, "Seat enumeration failed: %m");
1197 r = manager_enumerate_users(m);
1199 log_warning_errno(r, "User enumeration failed: %m");
1201 r = manager_enumerate_sessions(m);
1203 log_warning_errno(r, "Session enumeration failed: %m");
1205 r = manager_enumerate_inhibitors(m);
1207 log_warning_errno(r, "Inhibitor enumeration failed: %m");
1209 r = manager_enumerate_buttons(m);
1211 log_warning_errno(r, "Button enumeration failed: %m");
1213 /* Remove stale objects before we start them */
1214 manager_gc(m, false);
1216 /* Reserve the special reserved VT */
1217 #if 0 /// elogind does not support autospawning of vts
1218 manager_reserve_vt(m);
1221 /* And start everything */
1222 HASHMAP_FOREACH(seat, m->seats, i)
1225 HASHMAP_FOREACH(user, m->users, i)
1228 HASHMAP_FOREACH(session, m->sessions, i)
1229 session_start(session);
1231 HASHMAP_FOREACH(inhibitor, m->inhibitors, i)
1232 inhibitor_start(inhibitor);
1234 HASHMAP_FOREACH(button, m->buttons, i)
1235 button_check_switches(button);
1237 manager_dispatch_idle_action(NULL, 0, m);
1242 static int manager_run(Manager *m) {
1248 r = sd_event_get_state(m->event);
1251 if (r == SD_EVENT_FINISHED)
1254 manager_gc(m, true);
1256 r = manager_dispatch_delayed(m, false);
1262 r = sd_event_run(m->event, (uint64_t) -1);
1268 int main(int argc, char *argv[]) {
1272 #if 1 /// perform extra checks for elogind startup
1273 r = elogind_startup(argc, argv);
1275 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;
1277 elogind_set_program_name(argv[0]);
1278 log_set_target(LOG_TARGET_AUTO);
1279 log_set_facility(LOG_AUTH);
1280 log_parse_environment();
1281 #ifdef ENABLE_DEBUG_ELOGIND
1282 log_set_max_level(LOG_DEBUG);
1283 log_set_target(LOG_TARGET_SYSLOG_OR_KMSG);
1284 #endif // ENABLE_DEBUG_ELOGIND
1289 #if 0 /// elogind has some extra functionality at startup, argc can be != 1
1291 log_error("This program takes no arguments.");
1297 r = mac_selinux_init();
1299 log_error_errno(r, "Could not initialize labelling: %m");
1303 /* Always create the directories people can create inotify
1304 * watches in. Note that some applications might check for the
1305 * existence of /run/systemd/seats/ to determine whether
1306 * logind is available, so please always make sure this check
1308 #if 0 /// elogind can not rely on systemd to help, so we need a bit more effort than this
1309 mkdir_label("/run/systemd/seats", 0755);
1310 mkdir_label("/run/systemd/users", 0755);
1311 mkdir_label("/run/systemd/sessions", 0755);
1313 r = mkdir_label("/run/systemd", 0755);
1314 if ( (r < 0) && (-EEXIST != r) )
1315 return log_error_errno(r, "Failed to create /run/systemd : %m");
1316 r = mkdir_label("/run/systemd/seats", 0755);
1317 if ( r < 0 && (-EEXIST != r) )
1318 return log_error_errno(r, "Failed to create /run/systemd/seats : %m");
1319 r = mkdir_label("/run/systemd/users", 0755);
1320 if ( r < 0 && (-EEXIST != r) )
1321 return log_error_errno(r, "Failed to create /run/systemd/users : %m");
1322 r = mkdir_label("/run/systemd/sessions", 0755);
1323 if ( r < 0 && (-EEXIST != r) )
1324 return log_error_errno(r, "Failed to create /run/systemd/sessions : %m");
1325 r = mkdir_label("/run/systemd/machines", 0755);
1326 if ( r < 0 && (-EEXIST != r) )
1327 return log_error_errno(r, "Failed to create /run/systemd/machines : %m");
1336 manager_parse_config_file(m);
1338 #if 1 /// elogind needs an Add-On for sleep configuration
1339 elogind_manager_reset_config(m);
1341 r = manager_startup(m);
1343 log_error_errno(r, "Failed to fully start up daemon: %m");
1347 log_debug("elogind running as pid "PID_FMT, getpid_cached());
1351 "STATUS=Processing requests...");
1355 log_debug("elogind stopped as pid "PID_FMT, getpid_cached());
1360 "STATUS=Shutting down...");
1364 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;