1 /* SPDX-License-Identifier: LGPL-2.1+ */
11 #include "alloc-util.h"
12 #include "bus-error.h"
13 #include "bus-locator.h"
14 #include "bus-log-control-api.h"
15 #include "bus-polkit.h"
16 #include "cgroup-util.h"
17 #include "daemon-util.h"
19 #include "device-util.h"
20 #include "dirent-util.h"
22 #include "format-util.h"
24 #include "logind-dbus.h"
25 #include "logind-seat-dbus.h"
26 #include "logind-session-dbus.h"
27 #include "logind-user-dbus.h"
29 #include "main-func.h"
30 #include "parse-util.h"
31 #include "process-util.h"
32 #include "selinux-util.h"
33 #include "service-util.h"
34 #include "signal-util.h"
36 #include "terminal-util.h"
37 #include "udev-util.h"
38 #include "user-util.h"
40 static Manager
* manager_unref(Manager
*m
);
41 DEFINE_TRIVIAL_CLEANUP_FUNC(Manager
*, manager_unref
);
43 static int manager_new(Manager
**ret
) {
44 _cleanup_(manager_unrefp
) Manager
*m
= NULL
;
54 .console_active_fd
= -1,
56 .idle_action_not_before_usec
= now(CLOCK_MONOTONIC
),
59 m
->devices
= hashmap_new(&string_hash_ops
);
60 m
->seats
= hashmap_new(&string_hash_ops
);
61 m
->sessions
= hashmap_new(&string_hash_ops
);
62 m
->sessions_by_leader
= hashmap_new(NULL
);
63 m
->users
= hashmap_new(NULL
);
64 m
->inhibitors
= hashmap_new(&string_hash_ops
);
65 m
->buttons
= hashmap_new(&string_hash_ops
);
67 m
->user_units
= hashmap_new(&string_hash_ops
);
68 m
->session_units
= hashmap_new(&string_hash_ops
);
70 if (!m
->devices
|| !m
->seats
|| !m
->sessions
|| !m
->sessions_by_leader
|| !m
->users
|| !m
->inhibitors
|| !m
->buttons
|| !m
->user_units
|| !m
->session_units
)
73 r
= sd_event_default(&m
->event
);
77 r
= sd_event_add_signal(m
->event
, NULL
, SIGINT
, NULL
, NULL
);
81 r
= sd_event_add_signal(m
->event
, NULL
, SIGTERM
, NULL
, NULL
);
85 (void) sd_event_set_watchdog(m
->event
, true);
87 manager_reset_config(m
);
93 static Manager
* manager_unref(Manager
*m
) {
104 while ((session
= hashmap_first(m
->sessions
)))
105 session_free(session
);
107 while ((u
= hashmap_first(m
->users
)))
110 while ((d
= hashmap_first(m
->devices
)))
113 while ((s
= hashmap_first(m
->seats
)))
116 while ((i
= hashmap_first(m
->inhibitors
)))
119 while ((b
= hashmap_first(m
->buttons
)))
122 hashmap_free(m
->devices
);
123 hashmap_free(m
->seats
);
124 hashmap_free(m
->sessions
);
125 hashmap_free(m
->sessions_by_leader
);
126 hashmap_free(m
->users
);
127 hashmap_free(m
->inhibitors
);
128 hashmap_free(m
->buttons
);
129 hashmap_free(m
->brightness_writers
);
131 hashmap_free(m
->user_units
);
132 hashmap_free(m
->session_units
);
134 sd_event_source_unref(m
->idle_action_event_source
);
135 sd_event_source_unref(m
->inhibit_timeout_source
);
136 sd_event_source_unref(m
->scheduled_shutdown_timeout_source
);
137 sd_event_source_unref(m
->nologin_timeout_source
);
138 sd_event_source_unref(m
->wall_message_timeout_source
);
140 sd_event_source_unref(m
->console_active_event_source
);
141 sd_event_source_unref(m
->lid_switch_ignore_event_source
);
144 sd_event_source_unref(m
->utmp_event_source
);
147 safe_close(m
->console_active_fd
);
149 sd_device_monitor_unref(m
->device_seat_monitor
);
150 sd_device_monitor_unref(m
->device_monitor
);
151 sd_device_monitor_unref(m
->device_vcsa_monitor
);
152 sd_device_monitor_unref(m
->device_button_monitor
);
154 if (m
->unlink_nologin
)
155 (void) unlink_or_warn("/run/nologin");
157 bus_verify_polkit_async_registry_free(m
->polkit_registry
);
159 sd_bus_flush_close_unref(m
->bus
);
160 sd_event_unref(m
->event
);
162 safe_close(m
->reserve_vt_fd
);
164 strv_free(m
->kill_only_users
);
165 strv_free(m
->kill_exclude_users
);
167 free(m
->scheduled_shutdown_type
);
168 free(m
->scheduled_shutdown_tty
);
169 free(m
->wall_message
);
172 strv_free(m
->efi_boot_loader_entries
);
173 free(m
->efi_loader_entry_one_shot
);
178 static int manager_enumerate_devices(Manager
*m
) {
179 _cleanup_(sd_device_enumerator_unrefp
) sd_device_enumerator
*e
= NULL
;
185 /* Loads devices from udev and creates seats for them as
188 r
= sd_device_enumerator_new(&e
);
192 r
= sd_device_enumerator_add_match_tag(e
, "master-of-seat");
196 FOREACH_DEVICE(e
, d
) {
199 k
= manager_process_seat_device(m
, d
);
207 static int manager_enumerate_buttons(Manager
*m
) {
208 _cleanup_(sd_device_enumerator_unrefp
) sd_device_enumerator
*e
= NULL
;
214 /* Loads buttons from udev */
216 if (manager_all_buttons_ignored(m
))
219 r
= sd_device_enumerator_new(&e
);
223 r
= sd_device_enumerator_add_match_subsystem(e
, "input", true);
227 r
= sd_device_enumerator_add_match_tag(e
, "power-switch");
231 FOREACH_DEVICE(e
, d
) {
234 k
= manager_process_button_device(m
, d
);
242 static int manager_enumerate_seats(Manager
*m
) {
243 _cleanup_closedir_
DIR *d
= NULL
;
249 /* This loads data about seats stored on disk, but does not
250 * actually create any seats. Removes data of seats that no
253 d
= opendir("/run/systemd/seats");
258 return log_error_errno(errno
, "Failed to open /run/systemd/seats: %m");
261 FOREACH_DIRENT(de
, d
, return -errno
) {
265 if (!dirent_is_file(de
))
268 s
= hashmap_get(m
->seats
, de
->d_name
);
270 if (unlinkat(dirfd(d
), de
->d_name
, 0) < 0)
271 log_warning("Failed to remove /run/systemd/seats/%s: %m",
284 static int manager_enumerate_linger_users(Manager
*m
) {
285 _cleanup_closedir_
DIR *d
= NULL
;
291 d
= opendir("/var/lib/systemd/linger");
296 return log_error_errno(errno
, "Failed to open /var/lib/systemd/linger/: %m");
299 FOREACH_DIRENT(de
, d
, return -errno
) {
302 dirent_ensure_type(d
, de
);
303 if (!dirent_is_file(de
))
306 k
= manager_add_user_by_name(m
, de
->d_name
, NULL
);
308 r
= log_warning_errno(k
, "Couldn't add lingering user %s, ignoring: %m", de
->d_name
);
314 static int manager_enumerate_users(Manager
*m
) {
315 _cleanup_closedir_
DIR *d
= NULL
;
321 /* Add lingering users */
322 r
= manager_enumerate_linger_users(m
);
324 /* Read in user data stored on disk */
325 d
= opendir("/run/systemd/users");
330 return log_error_errno(errno
, "Failed to open /run/systemd/users: %m");
333 FOREACH_DIRENT(de
, d
, return -errno
) {
337 if (!dirent_is_file(de
))
340 k
= parse_uid(de
->d_name
, &uid
);
342 r
= log_warning_errno(k
, "Failed to parse filename /run/systemd/users/%s as UID.", de
->d_name
);
346 k
= manager_add_user_by_uid(m
, uid
, &u
);
348 r
= log_warning_errno(k
, "Failed to add user by file name %s, ignoring: %m", de
->d_name
);
352 user_add_to_gc_queue(u
);
362 static int parse_fdname(const char *fdname
, char **session_id
, dev_t
*dev
) {
363 _cleanup_strv_free_
char **parts
= NULL
;
364 _cleanup_free_
char *id
= NULL
;
365 unsigned major
, minor
;
368 parts
= strv_split(fdname
, "-");
371 if (strv_length(parts
) != 5)
374 if (!streq(parts
[0], "session"))
377 id
= strdup(parts
[1]);
381 if (!streq(parts
[2], "device"))
384 r
= safe_atou(parts
[3], &major
);
387 r
= safe_atou(parts
[4], &minor
);
391 *dev
= makedev(major
, minor
);
392 *session_id
= TAKE_PTR(id
);
397 static int deliver_fd(Manager
*m
, const char *fdname
, int fd
) {
398 _cleanup_free_
char *id
= NULL
;
408 r
= parse_fdname(fdname
, &id
, &dev
);
410 return log_debug_errno(r
, "Failed to parse fd name %s: %m", fdname
);
412 s
= hashmap_get(m
->sessions
, id
);
414 /* If the session doesn't exist anymore, the associated session device attached to this fd
415 * doesn't either. Let's simply close this fd. */
416 return log_debug_errno(SYNTHETIC_ERRNO(ENXIO
), "Failed to attach fd for unknown session: %s", id
);
418 if (fstat(fd
, &st
) < 0)
419 /* The device is allowed to go away at a random point, in which case fstat() failing is
421 return log_debug_errno(errno
, "Failed to stat device fd for session %s: %m", id
);
423 if (!S_ISCHR(st
.st_mode
) || st
.st_rdev
!= dev
)
424 return log_debug_errno(SYNTHETIC_ERRNO(ENODEV
), "Device fd doesn't point to the expected character device node");
426 sd
= hashmap_get(s
->devices
, &dev
);
428 /* Weird, we got an fd for a session device which wasn't recorded in the session state
430 return log_warning_errno(SYNTHETIC_ERRNO(ENODEV
), "Got fd for missing session device [%u:%u] in session %s",
431 major(dev
), minor(dev
), s
->id
);
433 log_debug("Attaching fd to session device [%u:%u] for session %s",
434 major(dev
), minor(dev
), s
->id
);
436 session_device_attach_fd(sd
, fd
, s
->was_active
);
440 static int manager_attach_fds(Manager
*m
) {
441 _cleanup_strv_free_
char **fdnames
= NULL
;
444 /* Upon restart, PID1 will send us back all fds of session devices that we previously opened. Each
445 * file descriptor is associated with a given session. The session ids are passed through FDNAMES. */
447 n
= sd_listen_fds_with_names(true, &fdnames
);
449 return log_warning_errno(n
, "Failed to acquire passed fd list: %m");
453 for (int i
= 0; i
< n
; i
++) {
454 int fd
= SD_LISTEN_FDS_START
+ i
;
456 if (deliver_fd(m
, fdnames
[i
], fd
) >= 0)
459 /* Hmm, we couldn't deliver the fd to any session device object? If so, let's close the fd */
462 /* Remove from fdstore as well */
463 (void) sd_notifyf(false,
465 "FDNAME=%s", fdnames
[i
]);
471 static int manager_enumerate_sessions(Manager
*m
) {
472 _cleanup_closedir_
DIR *d
= NULL
;
478 /* Read in session data stored on disk */
479 d
= opendir("/run/systemd/sessions");
484 return log_error_errno(errno
, "Failed to open /run/systemd/sessions: %m");
487 FOREACH_DIRENT(de
, d
, return -errno
) {
490 if (!dirent_is_file(de
))
493 k
= manager_add_session(m
, de
->d_name
, &s
);
495 r
= log_warning_errno(k
, "Failed to add session by file name %s, ignoring: %m", de
->d_name
);
499 session_add_to_gc_queue(s
);
506 /* We might be restarted and PID1 could have sent us back the session device fds we previously
508 (void) manager_attach_fds(m
);
513 static int manager_enumerate_inhibitors(Manager
*m
) {
514 _cleanup_closedir_
DIR *d
= NULL
;
520 d
= opendir("/run/systemd/inhibit");
525 return log_error_errno(errno
, "Failed to open /run/systemd/inhibit: %m");
528 FOREACH_DIRENT(de
, d
, return -errno
) {
532 if (!dirent_is_file(de
))
535 k
= manager_add_inhibitor(m
, de
->d_name
, &i
);
537 r
= log_warning_errno(k
, "Couldn't add inhibitor %s, ignoring: %m", de
->d_name
);
541 k
= inhibitor_load(i
);
549 static int manager_dispatch_seat_udev(sd_device_monitor
*monitor
, sd_device
*device
, void *userdata
) {
550 Manager
*m
= userdata
;
555 manager_process_seat_device(m
, device
);
559 static int manager_dispatch_device_udev(sd_device_monitor
*monitor
, sd_device
*device
, void *userdata
) {
560 Manager
*m
= userdata
;
565 manager_process_seat_device(m
, device
);
569 static int manager_dispatch_vcsa_udev(sd_device_monitor
*monitor
, sd_device
*device
, void *userdata
) {
570 Manager
*m
= userdata
;
576 /* Whenever a VCSA device is removed try to reallocate our
577 * VTs, to make sure our auto VTs never go away. */
579 if (sd_device_get_sysname(device
, &name
) >= 0 &&
580 startswith(name
, "vcsa") &&
581 device_for_action(device
, DEVICE_ACTION_REMOVE
))
582 seat_preallocate_vts(m
->seat0
);
587 static int manager_dispatch_button_udev(sd_device_monitor
*monitor
, sd_device
*device
, void *userdata
) {
588 Manager
*m
= userdata
;
593 manager_process_button_device(m
, device
);
597 static int manager_dispatch_console(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
598 Manager
*m
= userdata
;
602 assert(m
->console_active_fd
== fd
);
604 seat_read_active_vt(m
->seat0
);
608 static int manager_reserve_vt(Manager
*m
) {
609 _cleanup_free_
char *p
= NULL
;
613 if (m
->reserve_vt
<= 0)
616 if (asprintf(&p
, "/dev/tty%u", m
->reserve_vt
) < 0)
619 m
->reserve_vt_fd
= open(p
, O_RDWR
|O_NOCTTY
|O_CLOEXEC
|O_NONBLOCK
);
620 if (m
->reserve_vt_fd
< 0) {
622 /* Don't complain on VT-less systems */
624 log_warning_errno(errno
, "Failed to pin reserved VT: %m");
631 static int manager_connect_bus(Manager
*m
) {
637 r
= sd_bus_default_system(&m
->bus
);
639 return log_error_errno(r
, "Failed to connect to system bus: %m");
641 r
= bus_add_implementation(m
->bus
, &manager_object
, m
);
645 r
= bus_log_control_api_register(m
->bus
);
649 r
= bus_match_signal_async(m
->bus
, NULL
, bus_systemd_mgr
, "JobRemoved", match_job_removed
, NULL
, m
);
651 return log_error_errno(r
, "Failed to request match for JobRemoved: %m");
653 r
= bus_match_signal_async(m
->bus
, NULL
, bus_systemd_mgr
, "UnitRemoved", match_unit_removed
, NULL
, m
);
655 return log_error_errno(r
, "Failed to request match for UnitRemoved: %m");
657 r
= sd_bus_match_signal_async(
660 "org.freedesktop.systemd1",
662 "org.freedesktop.DBus.Properties",
664 match_properties_changed
, NULL
, m
);
666 return log_error_errno(r
, "Failed to request match for PropertiesChanged: %m");
668 r
= bus_match_signal_async(m
->bus
, NULL
, bus_systemd_mgr
, "Reloading", match_reloading
, NULL
, m
);
670 return log_error_errno(r
, "Failed to request match for Reloading: %m");
672 r
= bus_call_method_async(m
->bus
, NULL
, bus_systemd_mgr
, "Subscribe", NULL
, NULL
, NULL
);
674 return log_error_errno(r
, "Failed to enable subscription: %m");
676 r
= sd_bus_request_name_async(m
->bus
, NULL
, "org.freedesktop.login1", 0, NULL
, NULL
);
678 return log_error_errno(r
, "Failed to request name: %m");
680 r
= sd_bus_attach_event(m
->bus
, m
->event
, SD_EVENT_PRIORITY_NORMAL
);
682 return log_error_errno(r
, "Failed to attach bus to event loop: %m");
687 static int manager_vt_switch(sd_event_source
*src
, const struct signalfd_siginfo
*si
, void *data
) {
689 Session
*active
, *iter
;
692 * We got a VT-switch signal and we have to acknowledge it immediately.
693 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
694 * old user-space might run multiple sessions on a single VT, *sigh*.
695 * Therefore, we have to iterate all sessions and find one with a vtfd
696 * on the requested VT.
697 * As only VTs with active controllers have VT_PROCESS set, our current
698 * notion of the active VT might be wrong (for instance if the switch
699 * happens while we setup VT_PROCESS). Therefore, read the current VT
700 * first and then use s->active->vtnr as reference. Note that this is
701 * not racy, as no further VT-switch can happen as long as we're in
702 * synchronous VT_PROCESS mode.
706 seat_read_active_vt(m
->seat0
);
708 active
= m
->seat0
->active
;
709 if (!active
|| active
->vtnr
< 1) {
710 _cleanup_close_
int fd
= -1;
713 /* We are requested to acknowledge the VT-switch signal by the kernel but
714 * there's no registered sessions for the current VT. Normally this
715 * shouldn't happen but something wrong might have happened when we tried
716 * to release the VT. Better be safe than sorry, and try to release the VT
717 * one more time otherwise the user will be locked with the current VT. */
719 log_warning("Received VT_PROCESS signal without a registered session, restoring VT.");
721 /* At this point we only have the kernel mapping for referring to the
723 fd
= open_terminal("/dev/tty0", O_RDWR
|O_NOCTTY
|O_CLOEXEC
|O_NONBLOCK
);
725 log_warning_errno(fd
, "Failed to open, ignoring: %m");
729 r
= vt_release(fd
, true);
731 log_warning_errno(r
, "Failed to release VT, ignoring: %m");
736 if (active
->vtfd
>= 0) {
737 session_leave_vt(active
);
739 LIST_FOREACH(sessions_by_seat
, iter
, m
->seat0
->sessions
) {
740 if (iter
->vtnr
== active
->vtnr
&& iter
->vtfd
>= 0) {
741 session_leave_vt(iter
);
750 static int manager_connect_console(Manager
*m
) {
754 assert(m
->console_active_fd
< 0);
756 /* On certain systems (such as S390, Xen, and containers) /dev/tty0 does not exist (as there is no VC), so
757 * don't fail if we can't open it. */
759 if (access("/dev/tty0", F_OK
) < 0)
762 m
->console_active_fd
= open("/sys/class/tty/tty0/active", O_RDONLY
|O_NOCTTY
|O_CLOEXEC
);
763 if (m
->console_active_fd
< 0) {
765 /* On some systems /dev/tty0 may exist even though /sys/class/tty/tty0 does not. These are broken, but
766 * common. Let's complain but continue anyway. */
767 if (errno
== ENOENT
) {
768 log_warning_errno(errno
, "System has /dev/tty0 but not /sys/class/tty/tty0/active which is broken, ignoring: %m");
772 return log_error_errno(errno
, "Failed to open /sys/class/tty/tty0/active: %m");
775 r
= sd_event_add_io(m
->event
, &m
->console_active_event_source
, m
->console_active_fd
, 0, manager_dispatch_console
, m
);
777 return log_error_errno(r
, "Failed to watch foreground console: %m");
780 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
781 * as VT-acquire signal. We ignore any acquire-events (yes, we still
782 * have to provide a valid signal-number for it!) and acknowledge all
783 * release events immediately.
786 if (SIGRTMIN
+ 1 > SIGRTMAX
)
787 return log_error_errno(SYNTHETIC_ERRNO(EINVAL
),
788 "Not enough real-time signals available: %u-%u",
791 assert_se(ignore_signals(SIGRTMIN
+ 1, -1) >= 0);
792 assert_se(sigprocmask_many(SIG_BLOCK
, NULL
, SIGRTMIN
, -1) >= 0);
794 r
= sd_event_add_signal(m
->event
, NULL
, SIGRTMIN
, manager_vt_switch
, m
);
796 return log_error_errno(r
, "Failed to subscribe to signal: %m");
801 static int manager_connect_udev(Manager
*m
) {
805 assert(!m
->device_seat_monitor
);
806 assert(!m
->device_monitor
);
807 assert(!m
->device_vcsa_monitor
);
808 assert(!m
->device_button_monitor
);
810 r
= sd_device_monitor_new(&m
->device_seat_monitor
);
814 r
= sd_device_monitor_filter_add_match_tag(m
->device_seat_monitor
, "master-of-seat");
818 r
= sd_device_monitor_attach_event(m
->device_seat_monitor
, m
->event
);
822 r
= sd_device_monitor_start(m
->device_seat_monitor
, manager_dispatch_seat_udev
, m
);
826 (void) sd_event_source_set_description(sd_device_monitor_get_event_source(m
->device_seat_monitor
), "logind-seat-monitor");
828 r
= sd_device_monitor_new(&m
->device_monitor
);
832 r
= sd_device_monitor_filter_add_match_subsystem_devtype(m
->device_monitor
, "input", NULL
);
836 r
= sd_device_monitor_filter_add_match_subsystem_devtype(m
->device_monitor
, "graphics", NULL
);
840 r
= sd_device_monitor_filter_add_match_subsystem_devtype(m
->device_monitor
, "drm", NULL
);
844 r
= sd_device_monitor_attach_event(m
->device_monitor
, m
->event
);
848 r
= sd_device_monitor_start(m
->device_monitor
, manager_dispatch_device_udev
, m
);
852 (void) sd_event_source_set_description(sd_device_monitor_get_event_source(m
->device_monitor
), "logind-device-monitor");
854 /* Don't watch keys if nobody cares */
855 if (!manager_all_buttons_ignored(m
)) {
856 r
= sd_device_monitor_new(&m
->device_button_monitor
);
860 r
= sd_device_monitor_filter_add_match_tag(m
->device_button_monitor
, "power-switch");
864 r
= sd_device_monitor_filter_add_match_subsystem_devtype(m
->device_button_monitor
, "input", NULL
);
868 r
= sd_device_monitor_attach_event(m
->device_button_monitor
, m
->event
);
872 r
= sd_device_monitor_start(m
->device_button_monitor
, manager_dispatch_button_udev
, m
);
876 (void) sd_event_source_set_description(sd_device_monitor_get_event_source(m
->device_button_monitor
), "logind-button-monitor");
879 /* Don't bother watching VCSA devices, if nobody cares */
880 if (m
->n_autovts
> 0 && m
->console_active_fd
>= 0) {
882 r
= sd_device_monitor_new(&m
->device_vcsa_monitor
);
886 r
= sd_device_monitor_filter_add_match_subsystem_devtype(m
->device_vcsa_monitor
, "vc", NULL
);
890 r
= sd_device_monitor_attach_event(m
->device_vcsa_monitor
, m
->event
);
894 r
= sd_device_monitor_start(m
->device_vcsa_monitor
, manager_dispatch_vcsa_udev
, m
);
898 (void) sd_event_source_set_description(sd_device_monitor_get_event_source(m
->device_vcsa_monitor
), "logind-vcsa-monitor");
904 static void manager_gc(Manager
*m
, bool drop_not_started
) {
911 while ((seat
= m
->seat_gc_queue
)) {
912 LIST_REMOVE(gc_queue
, m
->seat_gc_queue
, seat
);
913 seat
->in_gc_queue
= false;
915 if (seat_may_gc(seat
, drop_not_started
)) {
916 seat_stop(seat
, /* force = */ false);
921 while ((session
= m
->session_gc_queue
)) {
922 LIST_REMOVE(gc_queue
, m
->session_gc_queue
, session
);
923 session
->in_gc_queue
= false;
925 /* First, if we are not closing yet, initiate stopping. */
926 if (session_may_gc(session
, drop_not_started
) &&
927 session_get_state(session
) != SESSION_CLOSING
)
928 (void) session_stop(session
, /* force = */ false);
930 /* Normally, this should make the session referenced again, if it doesn't then let's get rid
931 * of it immediately. */
932 if (session_may_gc(session
, drop_not_started
)) {
933 (void) session_finalize(session
);
934 session_free(session
);
938 while ((user
= m
->user_gc_queue
)) {
939 LIST_REMOVE(gc_queue
, m
->user_gc_queue
, user
);
940 user
->in_gc_queue
= false;
942 /* First step: queue stop jobs */
943 if (user_may_gc(user
, drop_not_started
))
944 (void) user_stop(user
, false);
946 /* Second step: finalize user */
947 if (user_may_gc(user
, drop_not_started
)) {
948 (void) user_finalize(user
);
954 static int manager_dispatch_idle_action(sd_event_source
*s
, uint64_t t
, void *userdata
) {
955 Manager
*m
= userdata
;
956 struct dual_timestamp since
;
962 if (m
->idle_action
== HANDLE_IGNORE
||
963 m
->idle_action_usec
<= 0)
966 n
= now(CLOCK_MONOTONIC
);
968 r
= manager_get_idle_hint(m
, &since
);
970 /* Not idle. Let's check if after a timeout it might be idle then. */
971 elapse
= n
+ m
->idle_action_usec
;
973 /* Idle! Let's see if it's time to do something, or if
974 * we shall sleep for longer. */
976 if (n
>= since
.monotonic
+ m
->idle_action_usec
&&
977 (m
->idle_action_not_before_usec
<= 0 || n
>= m
->idle_action_not_before_usec
+ m
->idle_action_usec
)) {
978 log_info("System idle. Doing %s operation.", handle_action_to_string(m
->idle_action
));
980 manager_handle_action(m
, 0, m
->idle_action
, false, false);
981 m
->idle_action_not_before_usec
= n
;
984 elapse
= MAX(since
.monotonic
, m
->idle_action_not_before_usec
) + m
->idle_action_usec
;
987 if (!m
->idle_action_event_source
) {
989 r
= sd_event_add_time(
991 &m
->idle_action_event_source
,
993 elapse
, USEC_PER_SEC
*30,
994 manager_dispatch_idle_action
, m
);
996 return log_error_errno(r
, "Failed to add idle event source: %m");
998 r
= sd_event_source_set_priority(m
->idle_action_event_source
, SD_EVENT_PRIORITY_IDLE
+10);
1000 return log_error_errno(r
, "Failed to set idle event source priority: %m");
1002 r
= sd_event_source_set_time(m
->idle_action_event_source
, elapse
);
1004 return log_error_errno(r
, "Failed to set idle event timer: %m");
1006 r
= sd_event_source_set_enabled(m
->idle_action_event_source
, SD_EVENT_ONESHOT
);
1008 return log_error_errno(r
, "Failed to enable idle event timer: %m");
1014 static int manager_dispatch_reload_signal(sd_event_source
*s
, const struct signalfd_siginfo
*si
, void *userdata
) {
1015 Manager
*m
= userdata
;
1018 manager_reset_config(m
);
1019 r
= manager_parse_config_file(m
);
1021 log_warning_errno(r
, "Failed to parse config file, using defaults: %m");
1023 log_info("Config file reloaded.");
1028 static int manager_startup(Manager
*m
) {
1034 Inhibitor
*inhibitor
;
1038 r
= sd_event_add_signal(m
->event
, NULL
, SIGHUP
, manager_dispatch_reload_signal
, m
);
1040 return log_error_errno(r
, "Failed to register SIGHUP handler: %m");
1042 /* Connect to utmp */
1043 manager_connect_utmp(m
);
1045 /* Connect to console */
1046 r
= manager_connect_console(m
);
1050 /* Connect to udev */
1051 r
= manager_connect_udev(m
);
1053 return log_error_errno(r
, "Failed to create udev watchers: %m");
1055 /* Connect to the bus */
1056 r
= manager_connect_bus(m
);
1060 /* Instantiate magic seat 0 */
1061 r
= manager_add_seat(m
, "seat0", &m
->seat0
);
1063 return log_error_errno(r
, "Failed to add seat0: %m");
1065 r
= manager_set_lid_switch_ignore(m
, 0 + m
->holdoff_timeout_usec
);
1067 log_warning_errno(r
, "Failed to set up lid switch ignore event source: %m");
1069 /* Deserialize state */
1070 r
= manager_enumerate_devices(m
);
1072 log_warning_errno(r
, "Device enumeration failed: %m");
1074 r
= manager_enumerate_seats(m
);
1076 log_warning_errno(r
, "Seat enumeration failed: %m");
1078 r
= manager_enumerate_users(m
);
1080 log_warning_errno(r
, "User enumeration failed: %m");
1082 r
= manager_enumerate_sessions(m
);
1084 log_warning_errno(r
, "Session enumeration failed: %m");
1086 r
= manager_enumerate_inhibitors(m
);
1088 log_warning_errno(r
, "Inhibitor enumeration failed: %m");
1090 r
= manager_enumerate_buttons(m
);
1092 log_warning_errno(r
, "Button enumeration failed: %m");
1094 /* Remove stale objects before we start them */
1095 manager_gc(m
, false);
1097 /* Reserve the special reserved VT */
1098 manager_reserve_vt(m
);
1100 /* Read in utmp if it exists */
1101 manager_read_utmp(m
);
1103 /* And start everything */
1104 HASHMAP_FOREACH(seat
, m
->seats
)
1105 (void) seat_start(seat
);
1107 HASHMAP_FOREACH(user
, m
->users
)
1108 (void) user_start(user
);
1110 HASHMAP_FOREACH(session
, m
->sessions
)
1111 (void) session_start(session
, NULL
, NULL
);
1113 HASHMAP_FOREACH(inhibitor
, m
->inhibitors
) {
1114 (void) inhibitor_start(inhibitor
);
1116 /* Let's see if the inhibitor is dead now, then remove it */
1117 if (inhibitor_is_orphan(inhibitor
)) {
1118 inhibitor_stop(inhibitor
);
1119 inhibitor_free(inhibitor
);
1123 HASHMAP_FOREACH(button
, m
->buttons
)
1124 button_check_switches(button
);
1126 manager_dispatch_idle_action(NULL
, 0, m
);
1131 static int manager_run(Manager
*m
) {
1137 r
= sd_event_get_state(m
->event
);
1140 if (r
== SD_EVENT_FINISHED
)
1143 manager_gc(m
, true);
1145 r
= manager_dispatch_delayed(m
, false);
1151 r
= sd_event_run(m
->event
, (uint64_t) -1);
1157 static int run(int argc
, char *argv
[]) {
1158 _cleanup_(manager_unrefp
) Manager
*m
= NULL
;
1159 _cleanup_(notify_on_cleanup
) const char *notify_message
= NULL
;
1162 log_set_facility(LOG_AUTH
);
1163 log_setup_service();
1165 r
= service_parse_argv("systemd-logind.service",
1166 "Manager for user logins and devices and privileged operations.",
1167 BUS_IMPLEMENTATIONS(&manager_object
,
1168 &log_control_object
),
1175 r
= mac_selinux_init();
1179 /* Always create the directories people can create inotify watches in. Note that some applications
1180 * might check for the existence of /run/systemd/seats/ to determine whether logind is available, so
1181 * please always make sure these directories are created early on and unconditionally. */
1182 (void) mkdir_label("/run/systemd/seats", 0755);
1183 (void) mkdir_label("/run/systemd/users", 0755);
1184 (void) mkdir_label("/run/systemd/sessions", 0755);
1186 assert_se(sigprocmask_many(SIG_BLOCK
, NULL
, SIGHUP
, SIGTERM
, SIGINT
, SIGCHLD
, -1) >= 0);
1188 r
= manager_new(&m
);
1190 return log_error_errno(r
, "Failed to allocate manager object: %m");
1192 (void) manager_parse_config_file(m
);
1194 r
= manager_startup(m
);
1196 return log_error_errno(r
, "Failed to fully start up daemon: %m");
1198 notify_message
= notify_start(NOTIFY_READY
, NOTIFY_STOPPING
);
1199 return manager_run(m
);
1202 DEFINE_MAIN_FUNCTION(run
);