]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
6edd7d0a | 2 | /*** |
96b2fb93 LP |
3 | Copyright © 2010-2017 Canonical |
4 | Copyright © 2018 Dell Inc. | |
6edd7d0a LP |
5 | ***/ |
6 | ||
6edd7d0a | 7 | #include <errno.h> |
ca78ad1d | 8 | #include <fcntl.h> |
19adb8a3 | 9 | #include <getopt.h> |
1bbbefe7 | 10 | #include <poll.h> |
1bbbefe7 | 11 | #include <sys/timerfd.h> |
37f80890 | 12 | #include <sys/types.h> |
90efe8a6 | 13 | #include <sys/utsname.h> |
ca78ad1d | 14 | #include <unistd.h> |
6edd7d0a | 15 | |
f13f91f0 | 16 | #include "sd-bus.h" |
90efe8a6 MY |
17 | #include "sd-device.h" |
18 | #include "sd-id128.h" | |
aa62a893 | 19 | #include "sd-messages.h" |
3f6fd1ba | 20 | |
7d769198 | 21 | #include "battery-capacity.h" |
319c4648 | 22 | #include "battery-util.h" |
d6b4d1c7 | 23 | #include "build.h" |
ba0fb5ac | 24 | #include "bus-error.h" |
f13f91f0 SS |
25 | #include "bus-locator.h" |
26 | #include "bus-util.h" | |
28db6fbf | 27 | #include "constants.h" |
4560d99e | 28 | #include "devnum-util.h" |
90efe8a6 | 29 | #include "efivars.h" |
89711996 | 30 | #include "exec-util.h" |
3ffd4af2 | 31 | #include "fd-util.h" |
a5c32cff | 32 | #include "fileio.h" |
ba0fb5ac | 33 | #include "format-util.h" |
54d7fcc6 | 34 | #include "hibernate-util.h" |
90efe8a6 | 35 | #include "id128-util.h" |
0f2d351f | 36 | #include "io-util.h" |
90efe8a6 | 37 | #include "json.h" |
3f6fd1ba | 38 | #include "log.h" |
5e332028 | 39 | #include "main-func.h" |
90efe8a6 | 40 | #include "os-util.h" |
ed698d30 | 41 | #include "parse-util.h" |
294bf0c3 | 42 | #include "pretty-print.h" |
54d7fcc6 | 43 | #include "sleep-config.h" |
f13f91f0 | 44 | #include "special.h" |
c58493c0 | 45 | #include "stdio-util.h" |
07630cea | 46 | #include "string-util.h" |
3f6fd1ba | 47 | #include "strv.h" |
1bbbefe7 | 48 | #include "time-util.h" |
19adb8a3 | 49 | |
f05b4bb9 MY |
50 | #define DEFAULT_HIBERNATE_DELAY_USEC_NO_BATTERY (2 * USEC_PER_HOUR) |
51 | ||
c8cd8ca3 | 52 | static SleepOperation arg_operation = _SLEEP_OPERATION_INVALID; |
98dc9d1f | 53 | |
596873c1 | 54 | static int write_efi_hibernate_location(const HibernationDevice *hibernation_device, bool required) { |
03b70f06 | 55 | int log_level = required ? LOG_ERR : LOG_DEBUG; |
90efe8a6 MY |
56 | |
57 | #if ENABLE_EFI | |
58 | _cleanup_(json_variant_unrefp) JsonVariant *v = NULL; | |
59 | _cleanup_free_ char *formatted = NULL, *id = NULL, *image_id = NULL, | |
60 | *version_id = NULL, *image_version = NULL; | |
61 | _cleanup_(sd_device_unrefp) sd_device *device = NULL; | |
62 | const char *uuid_str; | |
63 | sd_id128_t uuid; | |
64 | struct utsname uts = {}; | |
03b70f06 | 65 | int r, log_level_ignore = required ? LOG_WARNING : LOG_DEBUG; |
90efe8a6 | 66 | |
596873c1 | 67 | assert(hibernation_device); |
90efe8a6 MY |
68 | |
69 | if (!is_efi_boot()) | |
7470b807 MY |
70 | return log_full_errno(log_level, SYNTHETIC_ERRNO(EOPNOTSUPP), |
71 | "Not an EFI boot, passing HibernateLocation via EFI variable is not possible."); | |
90efe8a6 | 72 | |
596873c1 | 73 | r = sd_device_new_from_devnum(&device, 'b', hibernation_device->devno); |
90efe8a6 MY |
74 | if (r < 0) |
75 | return log_full_errno(log_level, r, "Failed to create sd-device object for '%s': %m", | |
596873c1 | 76 | hibernation_device->path); |
90efe8a6 MY |
77 | |
78 | r = sd_device_get_property_value(device, "ID_FS_UUID", &uuid_str); | |
79 | if (r < 0) | |
80 | return log_full_errno(log_level, r, "Failed to get filesystem UUID for device '%s': %m", | |
596873c1 | 81 | hibernation_device->path); |
90efe8a6 MY |
82 | |
83 | r = sd_id128_from_string(uuid_str, &uuid); | |
84 | if (r < 0) | |
85 | return log_full_errno(log_level, r, "Failed to parse ID_FS_UUID '%s' for device '%s': %m", | |
596873c1 | 86 | uuid_str, hibernation_device->path); |
90efe8a6 MY |
87 | |
88 | if (uname(&uts) < 0) | |
89 | log_full_errno(log_level_ignore, errno, "Failed to get kernel info, ignoring: %m"); | |
90 | ||
91 | r = parse_os_release(NULL, | |
92 | "ID", &id, | |
93 | "IMAGE_ID", &image_id, | |
94 | "VERSION_ID", &version_id, | |
95 | "IMAGE_VERSION", &image_version); | |
96 | if (r < 0) | |
97 | log_full_errno(log_level_ignore, r, "Failed to parse os-release, ignoring: %m"); | |
98 | ||
99 | r = json_build(&v, JSON_BUILD_OBJECT( | |
100 | JSON_BUILD_PAIR_UUID("uuid", uuid), | |
596873c1 | 101 | JSON_BUILD_PAIR_UNSIGNED("offset", hibernation_device->offset), |
90efe8a6 MY |
102 | JSON_BUILD_PAIR_CONDITION(!isempty(uts.release), "kernelVersion", JSON_BUILD_STRING(uts.release)), |
103 | JSON_BUILD_PAIR_CONDITION(id, "osReleaseId", JSON_BUILD_STRING(id)), | |
104 | JSON_BUILD_PAIR_CONDITION(image_id, "osReleaseImageId", JSON_BUILD_STRING(image_id)), | |
105 | JSON_BUILD_PAIR_CONDITION(version_id, "osReleaseVersionId", JSON_BUILD_STRING(version_id)), | |
106 | JSON_BUILD_PAIR_CONDITION(image_version, "osReleaseImageVersion", JSON_BUILD_STRING(image_version)))); | |
107 | if (r < 0) | |
108 | return log_full_errno(log_level, r, "Failed to build JSON object: %m"); | |
109 | ||
110 | r = json_variant_format(v, 0, &formatted); | |
111 | if (r < 0) | |
112 | return log_full_errno(log_level, r, "Failed to format JSON object: %m"); | |
113 | ||
114 | r = efi_set_variable_string(EFI_SYSTEMD_VARIABLE(HibernateLocation), formatted); | |
115 | if (r < 0) | |
116 | return log_full_errno(log_level, r, "Failed to set EFI variable HibernateLocation: %m"); | |
117 | ||
118 | log_debug("Set EFI variable HibernateLocation to '%s'.", formatted); | |
7470b807 MY |
119 | return 0; |
120 | #else | |
121 | return log_full_errno(log_level, SYNTHETIC_ERRNO(EOPNOTSUPP), | |
122 | "EFI support not enabled, passing HibernateLocation via EFI variable is not possible."); | |
90efe8a6 | 123 | #endif |
90efe8a6 MY |
124 | } |
125 | ||
78c21009 | 126 | static int write_state(int fd, char * const *states) { |
19adb8a3 | 127 | int r = 0; |
19adb8a3 | 128 | |
78c21009 MY |
129 | assert(fd >= 0); |
130 | assert(states); | |
131 | ||
132 | STRV_FOREACH(state, states) { | |
133 | _cleanup_fclose_ FILE *f = NULL; | |
aa62a893 LP |
134 | int k; |
135 | ||
78c21009 MY |
136 | k = fdopen_independent(fd, "we", &f); |
137 | if (k < 0) | |
138 | return RET_GATHER(r, k); | |
139 | ||
140 | k = write_string_stream(f, *state, WRITE_STRING_FILE_DISABLE_BUFFER); | |
141 | if (k >= 0) { | |
142 | log_debug("Using sleep state '%s'.", *state); | |
19adb8a3 | 143 | return 0; |
78c21009 | 144 | } |
aa62a893 | 145 | |
78c21009 | 146 | RET_GATHER(r, log_debug_errno(k, "Failed to write '%s' to /sys/power/state: %m", *state)); |
19adb8a3 | 147 | } |
6edd7d0a | 148 | |
19adb8a3 ZJS |
149 | return r; |
150 | } | |
6edd7d0a | 151 | |
78c21009 | 152 | static int write_mode(char * const *modes) { |
19adb8a3 ZJS |
153 | int r = 0; |
154 | ||
78c21009 | 155 | STRV_FOREACH(mode, modes) { |
19adb8a3 ZJS |
156 | int k; |
157 | ||
78c21009 MY |
158 | k = write_string_file("/sys/power/disk", *mode, WRITE_STRING_FILE_DISABLE_BUFFER); |
159 | if (k >= 0) { | |
160 | log_debug("Using sleep disk mode '%s'.", *mode); | |
19adb8a3 | 161 | return 0; |
78c21009 MY |
162 | } |
163 | ||
164 | RET_GATHER(r, log_debug_errno(k, "Failed to write '%s' to /sys/power/disk: %m", *mode)); | |
6edd7d0a LP |
165 | } |
166 | ||
19adb8a3 ZJS |
167 | return r; |
168 | } | |
6edd7d0a | 169 | |
ba0fb5ac LP |
170 | static int lock_all_homes(void) { |
171 | _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; | |
172 | _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL; | |
173 | _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL; | |
174 | int r; | |
175 | ||
176 | /* Let's synchronously lock all home directories managed by homed that have been marked for it. This | |
177 | * way the key material required to access these volumes is hopefully removed from memory. */ | |
178 | ||
e14348c6 | 179 | r = sd_bus_open_system(&bus); |
ba0fb5ac | 180 | if (r < 0) |
122f6f1e | 181 | return log_error_errno(r, "Failed to connect to system bus: %m"); |
ba0fb5ac | 182 | |
a29f13f2 | 183 | r = bus_message_new_method_call(bus, &m, bus_home_mgr, "LockAllHomes"); |
ba0fb5ac LP |
184 | if (r < 0) |
185 | return bus_log_create_error(r); | |
186 | ||
187 | /* If homed is not running it can't have any home directories active either. */ | |
188 | r = sd_bus_message_set_auto_start(m, false); | |
189 | if (r < 0) | |
190 | return log_error_errno(r, "Failed to disable auto-start of LockAllHomes() message: %m"); | |
191 | ||
192 | r = sd_bus_call(bus, m, DEFAULT_TIMEOUT_USEC, &error, NULL); | |
193 | if (r < 0) { | |
1c5950bd ZJS |
194 | if (!bus_error_is_unknown_service(&error)) |
195 | return log_error_errno(r, "Failed to lock home directories: %s", bus_error_message(&error, r)); | |
ba0fb5ac | 196 | |
75029e15 ZJS |
197 | log_debug("systemd-homed is not running, locking of home directories skipped."); |
198 | } else | |
199 | log_debug("Successfully requested locking of all home directories."); | |
200 | return 0; | |
ba0fb5ac LP |
201 | } |
202 | ||
c8cd8ca3 LP |
203 | static int execute( |
204 | const SleepConfig *sleep_config, | |
205 | SleepOperation operation, | |
206 | const char *action) { | |
207 | ||
cc1c8d12 | 208 | const char *arguments[] = { |
e2cc6eca | 209 | NULL, |
cc1c8d12 | 210 | "pre", |
c8cd8ca3 LP |
211 | /* NB: we use 'arg_operation' instead of 'operation' here, as we want to communicate the overall |
212 | * operation here, not the specific one, in case of s2h. */ | |
cc1c8d12 | 213 | sleep_operation_to_string(arg_operation), |
e2cc6eca LP |
214 | NULL |
215 | }; | |
b5084605 LP |
216 | static const char* const dirs[] = { |
217 | SYSTEM_SLEEP_PATH, | |
218 | NULL | |
219 | }; | |
e2cc6eca | 220 | |
78c21009 | 221 | _cleanup_close_ int state_fd = -EBADF; |
7bdf56a2 | 222 | int r; |
6524990f | 223 | |
c8cd8ca3 LP |
224 | assert(sleep_config); |
225 | assert(operation >= 0); | |
cc1c8d12 | 226 | assert(operation < _SLEEP_OPERATION_CONFIG_MAX); /* Others are handled by execute_s2h() instead */ |
c8cd8ca3 | 227 | |
cc1c8d12 | 228 | if (strv_isempty(sleep_config->states[operation])) |
c8cd8ca3 LP |
229 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), |
230 | "No sleep states configured for sleep operation %s, can't sleep.", | |
231 | sleep_operation_to_string(operation)); | |
232 | ||
78c21009 MY |
233 | /* This file is opened first, so that if we hit an error, we can abort before modifying any state. */ |
234 | state_fd = open("/sys/power/state", O_WRONLY|O_CLOEXEC); | |
235 | if (state_fd < 0) | |
236 | return -errno; | |
57512c89 | 237 | |
c02540dc | 238 | /* Configure hibernation settings if we are supposed to hibernate */ |
e024cdd2 | 239 | if (sleep_operation_is_hibernation(operation)) { |
1fe536aa | 240 | _cleanup_(hibernation_device_done) HibernationDevice hibernation_device = {}; |
1923373a MY |
241 | bool resume_set; |
242 | ||
596873c1 | 243 | r = find_suitable_hibernation_device(&hibernation_device); |
17c40b3a | 244 | if (r < 0) |
c02540dc | 245 | return log_error_errno(r, "Failed to find location to hibernate to: %m"); |
1923373a MY |
246 | resume_set = r > 0; |
247 | ||
596873c1 | 248 | r = write_efi_hibernate_location(&hibernation_device, !resume_set); |
1923373a | 249 | if (!resume_set) { |
f1f331a2 FB |
250 | if (r == -EOPNOTSUPP) |
251 | return log_error_errno(r, "No valid 'resume=' option found, refusing to hibernate."); | |
252 | if (r < 0) | |
253 | return r; | |
254 | ||
596873c1 | 255 | r = write_resume_config(hibernation_device.devno, hibernation_device.offset, hibernation_device.path); |
fe33920c | 256 | if (r < 0) |
cc1c8d12 | 257 | goto fail; |
7bdf56a2 | 258 | } |
2002d8cd | 259 | |
cc1c8d12 MY |
260 | r = write_mode(sleep_config->modes[operation]); |
261 | if (r < 0) { | |
262 | log_error_errno(r, "Failed to write mode to /sys/power/disk: %m"); | |
263 | goto fail; | |
264 | } | |
17c40b3a | 265 | } |
19adb8a3 | 266 | |
c8cd8ca3 LP |
267 | /* Pass an action string to the call-outs. This is mostly our operation string, except if the |
268 | * hibernate step of s-t-h fails, in which case we communicate that with a separate action. */ | |
269 | if (!action) | |
270 | action = sleep_operation_to_string(operation); | |
271 | ||
cc1c8d12 MY |
272 | if (setenv("SYSTEMD_SLEEP_ACTION", action, /* overwrite = */ 1) < 0) |
273 | log_warning_errno(errno, "Failed to set SYSTEMD_SLEEP_ACTION=%s, ignoring: %m", action); | |
ae463e4e | 274 | |
cc1c8d12 | 275 | (void) execute_directories(dirs, DEFAULT_TIMEOUT_USEC, NULL, NULL, (char **) arguments, NULL, EXEC_DIR_PARALLEL | EXEC_DIR_IGNORE_ERRORS); |
ba0fb5ac | 276 | (void) lock_all_homes(); |
6edd7d0a | 277 | |
19adb8a3 | 278 | log_struct(LOG_INFO, |
2b044526 | 279 | "MESSAGE_ID=" SD_MESSAGE_SLEEP_START_STR, |
cc1c8d12 | 280 | LOG_MESSAGE("Performing sleep operation '%s'...", sleep_operation_to_string(operation)), |
c8cd8ca3 | 281 | "SLEEP=%s", sleep_operation_to_string(arg_operation)); |
19adb8a3 | 282 | |
cc1c8d12 | 283 | r = write_state(state_fd, sleep_config->states[operation]); |
19adb8a3 | 284 | if (r < 0) |
14250f09 LP |
285 | log_struct_errno(LOG_ERR, r, |
286 | "MESSAGE_ID=" SD_MESSAGE_SLEEP_STOP_STR, | |
c8cd8ca3 LP |
287 | LOG_MESSAGE("Failed to put system to sleep. System resumed again: %m"), |
288 | "SLEEP=%s", sleep_operation_to_string(arg_operation)); | |
14250f09 LP |
289 | else |
290 | log_struct(LOG_INFO, | |
291 | "MESSAGE_ID=" SD_MESSAGE_SLEEP_STOP_STR, | |
cc1c8d12 | 292 | LOG_MESSAGE("System returned from sleep operation '%s'.", sleep_operation_to_string(arg_operation)), |
c8cd8ca3 | 293 | "SLEEP=%s", sleep_operation_to_string(arg_operation)); |
eb267289 | 294 | |
cc1c8d12 MY |
295 | arguments[1] = "post"; |
296 | (void) execute_directories(dirs, DEFAULT_TIMEOUT_USEC, NULL, NULL, (char **) arguments, NULL, EXEC_DIR_PARALLEL | EXEC_DIR_IGNORE_ERRORS); | |
297 | ||
298 | if (r >= 0) | |
299 | return 0; | |
300 | ||
301 | fail: | |
8ad973ed MY |
302 | if (sleep_operation_is_hibernation(operation)) |
303 | clear_efi_hibernate_location_and_warn(); | |
6edd7d0a | 304 | |
19adb8a3 ZJS |
305 | return r; |
306 | } | |
6edd7d0a | 307 | |
cc1c8d12 MY |
308 | /* Return true if wakeup type is APM timer */ |
309 | static int check_wakeup_type(void) { | |
310 | static const char dmi_object_path[] = "/sys/firmware/dmi/entries/1-0/raw"; | |
311 | uint8_t wakeup_type_byte, tablesize; | |
312 | _cleanup_free_ char *buf = NULL; | |
313 | size_t bufsize; | |
314 | int r; | |
315 | ||
316 | /* implementation via dmi/entries */ | |
317 | r = read_full_virtual_file(dmi_object_path, &buf, &bufsize); | |
318 | if (r < 0) | |
319 | return log_debug_errno(r, "Unable to read %s: %m", dmi_object_path); | |
320 | if (bufsize < 25) | |
321 | return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), | |
322 | "Only read %zu bytes from %s (expected 25)", | |
323 | bufsize, dmi_object_path); | |
324 | ||
325 | /* index 1 stores the size of table */ | |
326 | tablesize = (uint8_t) buf[1]; | |
327 | if (tablesize < 25) | |
328 | return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), | |
329 | "Table size less than the index[0x18] where waketype byte is available."); | |
330 | ||
331 | wakeup_type_byte = (uint8_t) buf[24]; | |
332 | /* 0 is Reserved and 8 is AC Power Restored. As per table 12 in | |
333 | * https://www.dmtf.org/sites/default/files/standards/documents/DSP0134_3.4.0.pdf */ | |
334 | if (wakeup_type_byte >= 128) | |
335 | return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "Expected value in range 0-127"); | |
336 | ||
337 | if (wakeup_type_byte == 3) { | |
338 | log_debug("DMI BIOS System Information indicates wakeup type is APM Timer"); | |
339 | return true; | |
340 | } | |
341 | ||
342 | return false; | |
343 | } | |
344 | ||
1afe3d71 | 345 | static int custom_timer_suspend(const SleepConfig *sleep_config) { |
4f58b656 | 346 | usec_t hibernate_timestamp; |
c58493c0 ML |
347 | int r; |
348 | ||
28ca9c24 | 349 | assert(sleep_config); |
c58493c0 | 350 | |
4f58b656 YW |
351 | hibernate_timestamp = usec_add(now(CLOCK_BOOTTIME), sleep_config->hibernate_delay_usec); |
352 | ||
e0b3a70f | 353 | while (battery_is_discharging_and_low() == 0) { |
de5d8b40 | 354 | _cleanup_hashmap_free_ Hashmap *last_capacity = NULL, *current_capacity = NULL; |
254d1313 | 355 | _cleanup_close_ int tfd = -EBADF; |
96d662fa | 356 | struct itimerspec ts = {}; |
2ed56afe | 357 | usec_t suspend_interval; |
96d662fa | 358 | bool woken_by_timer; |
96d662fa SS |
359 | |
360 | tfd = timerfd_create(CLOCK_BOOTTIME_ALARM, TFD_NONBLOCK|TFD_CLOEXEC); | |
361 | if (tfd < 0) | |
362 | return log_error_errno(errno, "Error creating timerfd: %m"); | |
363 | ||
d812e104 | 364 | /* Store current battery capacity before suspension */ |
746cf898 | 365 | r = fetch_batteries_capacity_by_name(&last_capacity); |
d812e104 | 366 | if (r < 0) |
96d662fa SS |
367 | return log_error_errno(r, "Error fetching battery capacity percentage: %m"); |
368 | ||
4f58b656 YW |
369 | if (hashmap_isempty(last_capacity)) |
370 | /* In case of no battery, system suspend interval will be set to HibernateDelaySec= or 2 hours. */ | |
f05b4bb9 MY |
371 | suspend_interval = timestamp_is_set(hibernate_timestamp) |
372 | ? sleep_config->hibernate_delay_usec : DEFAULT_HIBERNATE_DELAY_USEC_NO_BATTERY; | |
4f58b656 YW |
373 | else { |
374 | r = get_total_suspend_interval(last_capacity, &suspend_interval); | |
375 | if (r < 0) { | |
376 | log_debug_errno(r, "Failed to estimate suspend interval using previous discharge rate, ignoring: %m"); | |
377 | /* In case of any errors, especially when we do not know the battery | |
378 | * discharging rate, system suspend interval will be set to | |
379 | * SuspendEstimationSec=. */ | |
380 | suspend_interval = sleep_config->suspend_estimation_usec; | |
381 | } | |
2ed56afe | 382 | } |
746cf898 | 383 | |
4f58b656 | 384 | /* Do not suspend more than HibernateDelaySec= */ |
d812e104 | 385 | usec_t before_timestamp = now(CLOCK_BOOTTIME); |
4f58b656 YW |
386 | suspend_interval = MIN(suspend_interval, usec_sub_unsigned(hibernate_timestamp, before_timestamp)); |
387 | if (suspend_interval <= 0) | |
388 | break; /* system should hibernate */ | |
d812e104 | 389 | |
96d662fa SS |
390 | log_debug("Set timerfd wake alarm for %s", FORMAT_TIMESPAN(suspend_interval, USEC_PER_SEC)); |
391 | /* Wake alarm for system with or without battery to hibernate or estimate discharge rate whichever is applicable */ | |
392 | timespec_store(&ts.it_value, suspend_interval); | |
393 | ||
394 | if (timerfd_settime(tfd, 0, &ts, NULL) < 0) | |
395 | return log_error_errno(errno, "Error setting battery estimate timer: %m"); | |
396 | ||
397 | r = execute(sleep_config, SLEEP_SUSPEND, NULL); | |
398 | if (r < 0) | |
399 | return r; | |
c58493c0 | 400 | |
96d662fa SS |
401 | r = fd_wait_for_event(tfd, POLLIN, 0); |
402 | if (r < 0) | |
403 | return log_error_errno(r, "Error polling timerfd: %m"); | |
404 | /* Store fd_wait status */ | |
405 | woken_by_timer = FLAGS_SET(r, POLLIN); | |
406 | ||
746cf898 | 407 | r = fetch_batteries_capacity_by_name(¤t_capacity); |
d812e104 | 408 | if (r < 0 || hashmap_isempty(current_capacity)) { |
746cf898 | 409 | /* In case of no battery or error while getting charge level, no need to measure |
d812e104 YW |
410 | * discharge rate. Instead the system should wake up if it is manual wakeup or |
411 | * hibernate if this is a timer wakeup. */ | |
412 | if (r < 0) | |
413 | log_debug_errno(r, "Battery capacity percentage unavailable, cannot estimate discharge rate: %m"); | |
414 | else | |
415 | log_debug("No battery found."); | |
746cf898 SS |
416 | if (!woken_by_timer) |
417 | return 0; | |
96d662fa | 418 | break; |
746cf898 | 419 | } |
96d662fa | 420 | |
d812e104 | 421 | usec_t after_timestamp = now(CLOCK_BOOTTIME); |
099810a6 ZJS |
422 | log_debug("Attempting to estimate battery discharge rate after wakeup from %s sleep", |
423 | FORMAT_TIMESPAN(after_timestamp - before_timestamp, USEC_PER_HOUR)); | |
96d662fa | 424 | |
746cf898 SS |
425 | if (after_timestamp != before_timestamp) { |
426 | r = estimate_battery_discharge_rate_per_hour(last_capacity, current_capacity, before_timestamp, after_timestamp); | |
91ea7ebc | 427 | if (r < 0) |
746cf898 SS |
428 | log_warning_errno(r, "Failed to estimate and update battery discharge rate, ignoring: %m"); |
429 | } else | |
430 | log_debug("System woke up too early to estimate discharge rate"); | |
c58493c0 | 431 | |
96d662fa SS |
432 | if (!woken_by_timer) |
433 | /* Return as manual wakeup done. This also will return in case battery was charged during suspension */ | |
434 | return 0; | |
1afe3d71 SS |
435 | |
436 | r = check_wakeup_type(); | |
437 | if (r < 0) | |
438 | log_debug_errno(r, "Failed to check hardware wakeup type, ignoring: %m"); | |
439 | if (r > 0) { | |
440 | log_debug("wakeup type is APM timer"); | |
441 | /* system should hibernate */ | |
442 | break; | |
443 | } | |
444 | } | |
445 | ||
446 | return 1; | |
447 | } | |
448 | ||
f13f91f0 SS |
449 | /* Freeze when invoked and thaw on cleanup */ |
450 | static int freeze_thaw_user_slice(const char **method) { | |
451 | _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; | |
452 | _cleanup_(sd_bus_flush_close_unrefp) sd_bus *bus = NULL; | |
453 | int r; | |
454 | ||
455 | if (!method || !*method) | |
456 | return 0; | |
457 | ||
458 | r = bus_connect_system_systemd(&bus); | |
459 | if (r < 0) | |
460 | return log_debug_errno(r, "Failed to open connection to systemd: %m"); | |
461 | ||
f274f8bf | 462 | (void) sd_bus_set_method_call_timeout(bus, FREEZE_TIMEOUT); |
432a3211 | 463 | |
f13f91f0 SS |
464 | r = bus_call_method(bus, bus_systemd_mgr, *method, &error, NULL, "s", SPECIAL_USER_SLICE); |
465 | if (r < 0) | |
466 | return log_debug_errno(r, "Failed to execute operation: %s", bus_error_message(&error, r)); | |
467 | ||
468 | return 1; | |
469 | } | |
470 | ||
1afe3d71 | 471 | static int execute_s2h(const SleepConfig *sleep_config) { |
efa736d3 | 472 | _unused_ _cleanup_(freeze_thaw_user_slice) const char *auto_method_thaw = "ThawUnit"; |
4f58b656 | 473 | int r; |
1afe3d71 SS |
474 | |
475 | assert(sleep_config); | |
476 | ||
f13f91f0 SS |
477 | r = freeze_thaw_user_slice(&(const char*) { "FreezeUnit" }); |
478 | if (r < 0) | |
479 | log_debug_errno(r, "Failed to freeze unit user.slice, ignoring: %m"); | |
f13f91f0 | 480 | |
4f58b656 YW |
481 | /* Only check if we have automated battery alarms if HibernateDelaySec= is not set, as in that case |
482 | * we'll busy poll for the configured interval instead */ | |
483 | if (!timestamp_is_set(sleep_config->hibernate_delay_usec)) { | |
484 | r = check_wakeup_type(); | |
485 | if (r < 0) | |
486 | log_debug_errno(r, "Failed to check hardware wakeup type, ignoring: %m"); | |
487 | else { | |
488 | r = battery_trip_point_alarm_exists(); | |
489 | if (r < 0) | |
490 | log_debug_errno(r, "Failed to check whether acpi_btp support is enabled or not, ignoring: %m"); | |
491 | } | |
492 | } else | |
493 | r = 0; /* Force fallback path */ | |
1afe3d71 | 494 | |
4f58b656 | 495 | if (r > 0) { /* If we have both wakeup alarms and battery trip point support, use them */ |
1afe3d71 SS |
496 | log_debug("Attempting to suspend..."); |
497 | r = execute(sleep_config, SLEEP_SUSPEND, NULL); | |
498 | if (r < 0) | |
499 | return r; | |
500 | ||
501 | r = check_wakeup_type(); | |
502 | if (r < 0) | |
503 | return log_debug_errno(r, "Failed to check hardware wakeup type: %m"); | |
504 | ||
505 | if (r == 0) | |
506 | /* For APM Timer wakeup, system should hibernate else wakeup */ | |
507 | return 0; | |
508 | } else { | |
509 | r = custom_timer_suspend(sleep_config); | |
3c3f4601 | 510 | if (r < 0) |
1afe3d71 | 511 | return log_debug_errno(r, "Suspend cycle with manual battery discharge rate estimation failed: %m"); |
3c3f4601 | 512 | if (r == 0) |
1afe3d71 SS |
513 | /* manual wakeup */ |
514 | return 0; | |
96d662fa | 515 | } |
1afe3d71 | 516 | /* For above custom timer, if 1 is returned, system will directly hibernate */ |
28ca9c24 | 517 | |
96d662fa | 518 | log_debug("Attempting to hibernate"); |
c8cd8ca3 | 519 | r = execute(sleep_config, SLEEP_HIBERNATE, NULL); |
f05e1ae6 | 520 | if (r < 0) { |
b0c035e3 | 521 | log_notice("Couldn't hibernate, will try to suspend again."); |
0f2d351f | 522 | |
c8cd8ca3 | 523 | r = execute(sleep_config, SLEEP_SUSPEND, "suspend-after-failed-hibernate"); |
0f2d351f | 524 | if (r < 0) |
b0c035e3 | 525 | return r; |
f05e1ae6 LP |
526 | } |
527 | ||
528 | return 0; | |
c58493c0 ML |
529 | } |
530 | ||
37ec0fdd LP |
531 | static int help(void) { |
532 | _cleanup_free_ char *link = NULL; | |
533 | int r; | |
534 | ||
535 | r = terminal_urlify_man("systemd-suspend.service", "8", &link); | |
536 | if (r < 0) | |
537 | return log_oom(); | |
538 | ||
19adb8a3 ZJS |
539 | printf("%s COMMAND\n\n" |
540 | "Suspend the system, hibernate the system, or both.\n\n" | |
37ec0fdd LP |
541 | " -h --help Show this help and exit\n" |
542 | " --version Print version string and exit\n" | |
543 | "\nCommands:\n" | |
544 | " suspend Suspend the system\n" | |
545 | " hibernate Hibernate the system\n" | |
546 | " hybrid-sleep Both hibernate and suspend the system\n" | |
e68c79db | 547 | " suspend-then-hibernate Initially suspend and then hibernate\n" |
0374cbd6 MY |
548 | " the system after a fixed period of time or\n" |
549 | " when battery is low\n" | |
bc556335 DDM |
550 | "\nSee the %s for details.\n", |
551 | program_invocation_short_name, | |
552 | link); | |
37ec0fdd LP |
553 | |
554 | return 0; | |
19adb8a3 | 555 | } |
6edd7d0a | 556 | |
19adb8a3 | 557 | static int parse_argv(int argc, char *argv[]) { |
37f80890 | 558 | |
19adb8a3 ZJS |
559 | enum { |
560 | ARG_VERSION = 0x100, | |
561 | }; | |
562 | ||
563 | static const struct option options[] = { | |
564 | { "help", no_argument, NULL, 'h' }, | |
565 | { "version", no_argument, NULL, ARG_VERSION }, | |
eb9da376 | 566 | {} |
19adb8a3 ZJS |
567 | }; |
568 | ||
569 | int c; | |
570 | ||
571 | assert(argc >= 0); | |
572 | assert(argv); | |
573 | ||
601185b4 | 574 | while ((c = getopt_long(argc, argv, "h", options, NULL)) >= 0) |
79893116 | 575 | switch (c) { |
37f80890 | 576 | |
19adb8a3 | 577 | case 'h': |
37ec0fdd | 578 | return help(); |
19adb8a3 ZJS |
579 | |
580 | case ARG_VERSION: | |
3f6fd1ba | 581 | return version(); |
19adb8a3 ZJS |
582 | |
583 | case '?': | |
584 | return -EINVAL; | |
585 | ||
586 | default: | |
04499a70 | 587 | assert_not_reached(); |
37f80890 | 588 | |
19adb8a3 ZJS |
589 | } |
590 | ||
baaa35ad ZJS |
591 | if (argc - optind != 1) |
592 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), | |
593 | "Usage: %s COMMAND", | |
594 | program_invocation_short_name); | |
19adb8a3 | 595 | |
c8cd8ca3 LP |
596 | arg_operation = sleep_operation_from_string(argv[optind]); |
597 | if (arg_operation < 0) | |
598 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "Unknown command '%s'.", argv[optind]); | |
19adb8a3 ZJS |
599 | |
600 | return 1 /* work to do */; | |
601 | } | |
602 | ||
7caefb81 | 603 | static int run(int argc, char *argv[]) { |
087a25d2 | 604 | _cleanup_(sleep_config_freep) SleepConfig *sleep_config = NULL; |
19adb8a3 ZJS |
605 | int r; |
606 | ||
d2acb93d | 607 | log_setup(); |
19adb8a3 ZJS |
608 | |
609 | r = parse_argv(argc, argv); | |
610 | if (r <= 0) | |
7caefb81 | 611 | return r; |
19adb8a3 | 612 | |
28ca9c24 ZS |
613 | r = parse_sleep_config(&sleep_config); |
614 | if (r < 0) | |
615 | return r; | |
616 | ||
c8cd8ca3 | 617 | if (!sleep_config->allow[arg_operation]) |
baaa35ad | 618 | return log_error_errno(SYNTHETIC_ERRNO(EACCES), |
c8cd8ca3 LP |
619 | "Sleep operation \"%s\" is disabled by configuration, refusing.", |
620 | sleep_operation_to_string(arg_operation)); | |
e8f1d00d | 621 | |
3d132111 LP |
622 | switch (arg_operation) { |
623 | ||
624 | case SLEEP_SUSPEND_THEN_HIBERNATE: | |
625 | r = execute_s2h(sleep_config); | |
626 | break; | |
627 | ||
628 | case SLEEP_HYBRID_SLEEP: | |
629 | r = execute(sleep_config, SLEEP_HYBRID_SLEEP, NULL); | |
630 | if (r < 0) { | |
631 | /* If we can't hybrid sleep, then let's try to suspend at least. After all, the user | |
632 | * asked us to do both: suspend + hibernate, and it's almost certainly the | |
633 | * hibernation that failed, hence still do the other thing, the suspend. */ | |
634 | ||
4706c3ec | 635 | log_notice_errno(r, "Couldn't hybrid sleep, will try to suspend instead: %m"); |
3d132111 LP |
636 | |
637 | r = execute(sleep_config, SLEEP_SUSPEND, "suspend-after-failed-hybrid-sleep"); | |
638 | } | |
639 | ||
640 | break; | |
641 | ||
642 | default: | |
643 | r = execute(sleep_config, arg_operation, NULL); | |
644 | break; | |
37f80890 | 645 | |
3d132111 LP |
646 | } |
647 | ||
648 | return r; | |
6edd7d0a | 649 | } |
7caefb81 ZJS |
650 | |
651 | DEFINE_MAIN_FUNCTION(run); |