1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 This file is part of systemd.
5 Copyright 2011 Lennart Poettering
14 #include "sd-daemon.h"
16 #include "alloc-util.h"
17 #include "bus-error.h"
19 #include "cgroup-util.h"
20 #include "conf-parser.h"
22 #include "dirent-util.h"
24 #include "format-util.h"
27 #include "parse-util.h"
28 #include "process-util.h"
29 #include "selinux-util.h"
30 #include "signal-util.h"
32 #include "udev-util.h"
34 static void manager_free(Manager
*m
);
36 static Manager
*manager_new(void) {
44 m
->console_active_fd
= -1;
45 m
->reserve_vt_fd
= -1;
47 m
->idle_action_not_before_usec
= now(CLOCK_MONOTONIC
);
49 m
->devices
= hashmap_new(&string_hash_ops
);
50 m
->seats
= hashmap_new(&string_hash_ops
);
51 m
->sessions
= hashmap_new(&string_hash_ops
);
52 m
->users
= hashmap_new(NULL
);
53 m
->inhibitors
= hashmap_new(&string_hash_ops
);
54 m
->buttons
= hashmap_new(&string_hash_ops
);
56 m
->user_units
= hashmap_new(&string_hash_ops
);
57 m
->session_units
= hashmap_new(&string_hash_ops
);
59 if (!m
->devices
|| !m
->seats
|| !m
->sessions
|| !m
->users
|| !m
->inhibitors
|| !m
->buttons
|| !m
->user_units
|| !m
->session_units
)
66 r
= sd_event_default(&m
->event
);
70 sd_event_set_watchdog(m
->event
, true);
72 manager_reset_config(m
);
81 static void manager_free(Manager
*m
) {
92 while ((session
= hashmap_first(m
->sessions
)))
93 session_free(session
);
95 while ((u
= hashmap_first(m
->users
)))
98 while ((d
= hashmap_first(m
->devices
)))
101 while ((s
= hashmap_first(m
->seats
)))
104 while ((i
= hashmap_first(m
->inhibitors
)))
107 while ((b
= hashmap_first(m
->buttons
)))
110 hashmap_free(m
->devices
);
111 hashmap_free(m
->seats
);
112 hashmap_free(m
->sessions
);
113 hashmap_free(m
->users
);
114 hashmap_free(m
->inhibitors
);
115 hashmap_free(m
->buttons
);
117 hashmap_free(m
->user_units
);
118 hashmap_free(m
->session_units
);
120 sd_event_source_unref(m
->idle_action_event_source
);
121 sd_event_source_unref(m
->inhibit_timeout_source
);
122 sd_event_source_unref(m
->scheduled_shutdown_timeout_source
);
123 sd_event_source_unref(m
->nologin_timeout_source
);
124 sd_event_source_unref(m
->wall_message_timeout_source
);
126 sd_event_source_unref(m
->console_active_event_source
);
127 sd_event_source_unref(m
->udev_seat_event_source
);
128 sd_event_source_unref(m
->udev_device_event_source
);
129 sd_event_source_unref(m
->udev_vcsa_event_source
);
130 sd_event_source_unref(m
->udev_button_event_source
);
131 sd_event_source_unref(m
->lid_switch_ignore_event_source
);
133 safe_close(m
->console_active_fd
);
135 udev_monitor_unref(m
->udev_seat_monitor
);
136 udev_monitor_unref(m
->udev_device_monitor
);
137 udev_monitor_unref(m
->udev_vcsa_monitor
);
138 udev_monitor_unref(m
->udev_button_monitor
);
142 if (m
->unlink_nologin
)
143 (void) unlink_or_warn("/run/nologin");
145 bus_verify_polkit_async_registry_free(m
->polkit_registry
);
147 sd_bus_unref(m
->bus
);
148 sd_event_unref(m
->event
);
150 safe_close(m
->reserve_vt_fd
);
152 strv_free(m
->kill_only_users
);
153 strv_free(m
->kill_exclude_users
);
155 free(m
->scheduled_shutdown_type
);
156 free(m
->scheduled_shutdown_tty
);
157 free(m
->wall_message
);
162 static int manager_enumerate_devices(Manager
*m
) {
163 struct udev_list_entry
*item
= NULL
, *first
= NULL
;
164 _cleanup_(udev_enumerate_unrefp
) struct udev_enumerate
*e
= NULL
;
169 /* Loads devices from udev and creates seats for them as
172 e
= udev_enumerate_new(m
->udev
);
176 r
= udev_enumerate_add_match_tag(e
, "master-of-seat");
180 r
= udev_enumerate_add_match_is_initialized(e
);
184 r
= udev_enumerate_scan_devices(e
);
188 first
= udev_enumerate_get_list_entry(e
);
189 udev_list_entry_foreach(item
, first
) {
190 _cleanup_(udev_device_unrefp
) struct udev_device
*d
= NULL
;
193 d
= udev_device_new_from_syspath(m
->udev
, udev_list_entry_get_name(item
));
197 k
= manager_process_seat_device(m
, d
);
205 static int manager_enumerate_buttons(Manager
*m
) {
206 _cleanup_(udev_enumerate_unrefp
) struct udev_enumerate
*e
= NULL
;
207 struct udev_list_entry
*item
= NULL
, *first
= NULL
;
212 /* Loads buttons from udev */
214 if (manager_all_buttons_ignored(m
))
217 e
= udev_enumerate_new(m
->udev
);
221 r
= udev_enumerate_add_match_subsystem(e
, "input");
225 r
= udev_enumerate_add_match_tag(e
, "power-switch");
229 r
= udev_enumerate_add_match_is_initialized(e
);
233 r
= udev_enumerate_scan_devices(e
);
237 first
= udev_enumerate_get_list_entry(e
);
238 udev_list_entry_foreach(item
, first
) {
239 _cleanup_(udev_device_unrefp
) struct udev_device
*d
= NULL
;
242 d
= udev_device_new_from_syspath(m
->udev
, udev_list_entry_get_name(item
));
246 k
= manager_process_button_device(m
, d
);
254 static int manager_enumerate_seats(Manager
*m
) {
255 _cleanup_closedir_
DIR *d
= NULL
;
261 /* This loads data about seats stored on disk, but does not
262 * actually create any seats. Removes data of seats that no
265 d
= opendir("/run/systemd/seats");
270 return log_error_errno(errno
, "Failed to open /run/systemd/seats: %m");
273 FOREACH_DIRENT(de
, d
, return -errno
) {
277 if (!dirent_is_file(de
))
280 s
= hashmap_get(m
->seats
, de
->d_name
);
282 if (unlinkat(dirfd(d
), de
->d_name
, 0) < 0)
283 log_warning("Failed to remove /run/systemd/seats/%s: %m",
296 static int manager_enumerate_linger_users(Manager
*m
) {
297 _cleanup_closedir_
DIR *d
= NULL
;
303 d
= opendir("/var/lib/systemd/linger");
308 return log_error_errno(errno
, "Failed to open /var/lib/systemd/linger/: %m");
311 FOREACH_DIRENT(de
, d
, return -errno
) {
314 if (!dirent_is_file(de
))
317 k
= manager_add_user_by_name(m
, de
->d_name
, NULL
);
319 log_notice_errno(k
, "Couldn't add lingering user %s: %m", de
->d_name
);
327 static int manager_enumerate_users(Manager
*m
) {
328 _cleanup_closedir_
DIR *d
= NULL
;
334 /* Add lingering users */
335 r
= manager_enumerate_linger_users(m
);
337 /* Read in user data stored on disk */
338 d
= opendir("/run/systemd/users");
343 return log_error_errno(errno
, "Failed to open /run/systemd/users: %m");
346 FOREACH_DIRENT(de
, d
, return -errno
) {
349 if (!dirent_is_file(de
))
352 k
= manager_add_user_by_name(m
, de
->d_name
, &u
);
354 log_error_errno(k
, "Failed to add user by file name %s: %m", de
->d_name
);
360 user_add_to_gc_queue(u
);
370 static int parse_fdname(const char *fdname
, char **session_id
, dev_t
*dev
) {
371 _cleanup_strv_free_
char **parts
= NULL
;
372 _cleanup_free_
char *id
= NULL
;
373 unsigned int major
, minor
;
376 parts
= strv_split(fdname
, "-");
379 if (strv_length(parts
) != 5)
382 if (!streq(parts
[0], "session"))
384 id
= strdup(parts
[1]);
388 if (!streq(parts
[2], "device"))
390 r
= safe_atou(parts
[3], &major
) ||
391 safe_atou(parts
[4], &minor
);
395 *dev
= makedev(major
, minor
);
396 *session_id
= TAKE_PTR(id
);
401 static int manager_attach_fds(Manager
*m
) {
402 _cleanup_strv_free_
char **fdnames
= NULL
;
405 /* Upon restart, PID1 will send us back all fds of session devices
406 * that we previously opened. Each file descriptor is associated
407 * with a given session. The session ids are passed through FDNAMES. */
409 n
= sd_listen_fds_with_names(true, &fdnames
);
413 for (i
= 0; i
< n
; i
++) {
414 _cleanup_free_
char *id
= NULL
;
421 fd
= SD_LISTEN_FDS_START
+ i
;
423 r
= parse_fdname(fdnames
[i
], &id
, &dev
);
425 log_debug_errno(r
, "Failed to parse fd name %s: %m", fdnames
[i
]);
430 s
= hashmap_get(m
->sessions
, id
);
432 /* If the session doesn't exist anymore, the associated session
433 * device attached to this fd doesn't either. Let's simply close
435 log_debug("Failed to attach fd for unknown session: %s", id
);
440 if (fstat(fd
, &st
) < 0) {
441 /* The device is allowed to go away at a random point, in which
442 * case fstat failing is expected. */
443 log_debug_errno(errno
, "Failed to stat device fd for session %s: %m", id
);
448 if (!S_ISCHR(st
.st_mode
) || st
.st_rdev
!= dev
) {
449 log_debug("Device fd doesn't point to the expected character device node");
454 sd
= hashmap_get(s
->devices
, &dev
);
456 /* Weird, we got an fd for a session device which wasn't
457 * recorded in the session state file... */
458 log_warning("Got fd for missing session device [%u:%u] in session %s",
459 major(dev
), minor(dev
), s
->id
);
464 log_debug("Attaching fd to session device [%u:%u] for session %s",
465 major(dev
), minor(dev
), s
->id
);
467 session_device_attach_fd(sd
, fd
, s
->was_active
);
473 static int manager_enumerate_sessions(Manager
*m
) {
474 _cleanup_closedir_
DIR *d
= NULL
;
480 /* Read in session data stored on disk */
481 d
= opendir("/run/systemd/sessions");
486 return log_error_errno(errno
, "Failed to open /run/systemd/sessions: %m");
489 FOREACH_DIRENT(de
, d
, return -errno
) {
492 if (!dirent_is_file(de
))
495 if (!session_id_valid(de
->d_name
)) {
496 log_warning("Invalid session file name '%s', ignoring.", de
->d_name
);
501 k
= manager_add_session(m
, de
->d_name
, &s
);
503 log_error_errno(k
, "Failed to add session by file name %s: %m", de
->d_name
);
508 session_add_to_gc_queue(s
);
515 /* We might be restarted and PID1 could have sent us back the
516 * session device fds we previously saved. */
517 k
= manager_attach_fds(m
);
519 log_warning_errno(k
, "Failed to reattach session device fds: %m");
524 static int manager_enumerate_inhibitors(Manager
*m
) {
525 _cleanup_closedir_
DIR *d
= NULL
;
531 d
= opendir("/run/systemd/inhibit");
536 return log_error_errno(errno
, "Failed to open /run/systemd/inhibit: %m");
539 FOREACH_DIRENT(de
, d
, return -errno
) {
543 if (!dirent_is_file(de
))
546 k
= manager_add_inhibitor(m
, de
->d_name
, &i
);
548 log_notice_errno(k
, "Couldn't add inhibitor %s: %m", de
->d_name
);
553 k
= inhibitor_load(i
);
561 static int manager_dispatch_seat_udev(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
562 _cleanup_(udev_device_unrefp
) struct udev_device
*d
= NULL
;
563 Manager
*m
= userdata
;
567 d
= udev_monitor_receive_device(m
->udev_seat_monitor
);
571 manager_process_seat_device(m
, d
);
575 static int manager_dispatch_device_udev(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
576 _cleanup_(udev_device_unrefp
) struct udev_device
*d
= NULL
;
577 Manager
*m
= userdata
;
581 d
= udev_monitor_receive_device(m
->udev_device_monitor
);
585 manager_process_seat_device(m
, d
);
589 static int manager_dispatch_vcsa_udev(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
590 _cleanup_(udev_device_unrefp
) struct udev_device
*d
= NULL
;
591 Manager
*m
= userdata
;
596 d
= udev_monitor_receive_device(m
->udev_vcsa_monitor
);
600 name
= udev_device_get_sysname(d
);
602 /* Whenever a VCSA device is removed try to reallocate our
603 * VTs, to make sure our auto VTs never go away. */
605 if (name
&& startswith(name
, "vcsa") && streq_ptr(udev_device_get_action(d
), "remove"))
606 seat_preallocate_vts(m
->seat0
);
611 static int manager_dispatch_button_udev(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
612 _cleanup_(udev_device_unrefp
) struct udev_device
*d
= NULL
;
613 Manager
*m
= userdata
;
617 d
= udev_monitor_receive_device(m
->udev_button_monitor
);
621 manager_process_button_device(m
, d
);
625 static int manager_dispatch_console(sd_event_source
*s
, int fd
, uint32_t revents
, void *userdata
) {
626 Manager
*m
= userdata
;
630 assert(m
->console_active_fd
== fd
);
632 seat_read_active_vt(m
->seat0
);
636 static int manager_reserve_vt(Manager
*m
) {
637 _cleanup_free_
char *p
= NULL
;
641 if (m
->reserve_vt
<= 0)
644 if (asprintf(&p
, "/dev/tty%u", m
->reserve_vt
) < 0)
647 m
->reserve_vt_fd
= open(p
, O_RDWR
|O_NOCTTY
|O_CLOEXEC
|O_NONBLOCK
);
648 if (m
->reserve_vt_fd
< 0) {
650 /* Don't complain on VT-less systems */
652 log_warning_errno(errno
, "Failed to pin reserved VT: %m");
659 static int manager_connect_bus(Manager
*m
) {
665 r
= sd_bus_default_system(&m
->bus
);
667 return log_error_errno(r
, "Failed to connect to system bus: %m");
669 r
= sd_bus_add_object_vtable(m
->bus
, NULL
, "/org/freedesktop/login1", "org.freedesktop.login1.Manager", manager_vtable
, m
);
671 return log_error_errno(r
, "Failed to add manager object vtable: %m");
673 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/login1/seat", "org.freedesktop.login1.Seat", seat_vtable
, seat_object_find
, m
);
675 return log_error_errno(r
, "Failed to add seat object vtable: %m");
677 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/login1/seat", seat_node_enumerator
, m
);
679 return log_error_errno(r
, "Failed to add seat enumerator: %m");
681 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/login1/session", "org.freedesktop.login1.Session", session_vtable
, session_object_find
, m
);
683 return log_error_errno(r
, "Failed to add session object vtable: %m");
685 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/login1/session", session_node_enumerator
, m
);
687 return log_error_errno(r
, "Failed to add session enumerator: %m");
689 r
= sd_bus_add_fallback_vtable(m
->bus
, NULL
, "/org/freedesktop/login1/user", "org.freedesktop.login1.User", user_vtable
, user_object_find
, m
);
691 return log_error_errno(r
, "Failed to add user object vtable: %m");
693 r
= sd_bus_add_node_enumerator(m
->bus
, NULL
, "/org/freedesktop/login1/user", user_node_enumerator
, m
);
695 return log_error_errno(r
, "Failed to add user enumerator: %m");
697 r
= sd_bus_match_signal_async(
700 "org.freedesktop.systemd1",
701 "/org/freedesktop/systemd1",
702 "org.freedesktop.systemd1.Manager",
704 match_job_removed
, NULL
, m
);
706 return log_error_errno(r
, "Failed to request match for JobRemoved: %m");
708 r
= sd_bus_match_signal_async(
711 "org.freedesktop.systemd1",
712 "/org/freedesktop/systemd1",
713 "org.freedesktop.systemd1.Manager",
715 match_unit_removed
, NULL
, m
);
717 return log_error_errno(r
, "Failed to request match for UnitRemoved: %m");
719 r
= sd_bus_match_signal_async(
722 "org.freedesktop.systemd1",
724 "org.freedesktop.DBus.Properties",
726 match_properties_changed
, NULL
, m
);
728 return log_error_errno(r
, "Failed to request match for PropertiesChanged: %m");
730 r
= sd_bus_match_signal_async(
733 "org.freedesktop.systemd1",
734 "/org/freedesktop/systemd1",
735 "org.freedesktop.systemd1.Manager",
737 match_reloading
, NULL
, m
);
739 return log_error_errno(r
, "Failed to request match for Reloading: %m");
741 r
= sd_bus_call_method_async(
744 "org.freedesktop.systemd1",
745 "/org/freedesktop/systemd1",
746 "org.freedesktop.systemd1.Manager",
751 return log_error_errno(r
, "Failed to enable subscription: %m");
753 r
= sd_bus_request_name_async(m
->bus
, NULL
, "org.freedesktop.login1", 0, NULL
, NULL
);
755 return log_error_errno(r
, "Failed to request name: %m");
757 r
= sd_bus_attach_event(m
->bus
, m
->event
, SD_EVENT_PRIORITY_NORMAL
);
759 return log_error_errno(r
, "Failed to attach bus to event loop: %m");
764 static int manager_vt_switch(sd_event_source
*src
, const struct signalfd_siginfo
*si
, void *data
) {
766 Session
*active
, *iter
;
769 * We got a VT-switch signal and we have to acknowledge it immediately.
770 * Preferably, we'd just use m->seat0->active->vtfd, but unfortunately,
771 * old user-space might run multiple sessions on a single VT, *sigh*.
772 * Therefore, we have to iterate all sessions and find one with a vtfd
773 * on the requested VT.
774 * As only VTs with active controllers have VT_PROCESS set, our current
775 * notion of the active VT might be wrong (for instance if the switch
776 * happens while we setup VT_PROCESS). Therefore, read the current VT
777 * first and then use s->active->vtnr as reference. Note that this is
778 * not racy, as no further VT-switch can happen as long as we're in
779 * synchronous VT_PROCESS mode.
783 seat_read_active_vt(m
->seat0
);
785 active
= m
->seat0
->active
;
786 if (!active
|| active
->vtnr
< 1) {
787 log_warning("Received VT_PROCESS signal without a registered session on that VT.");
791 if (active
->vtfd
>= 0) {
792 session_leave_vt(active
);
794 LIST_FOREACH(sessions_by_seat
, iter
, m
->seat0
->sessions
) {
795 if (iter
->vtnr
== active
->vtnr
&& iter
->vtfd
>= 0) {
796 session_leave_vt(iter
);
805 static int manager_connect_console(Manager
*m
) {
809 assert(m
->console_active_fd
< 0);
811 /* On certain architectures (S390 and Xen, and containers),
812 /dev/tty0 does not exist, so don't fail if we can't open
814 if (access("/dev/tty0", F_OK
) < 0)
817 m
->console_active_fd
= open("/sys/class/tty/tty0/active", O_RDONLY
|O_NOCTTY
|O_CLOEXEC
);
818 if (m
->console_active_fd
< 0) {
820 /* On some systems the device node /dev/tty0 may exist
821 * even though /sys/class/tty/tty0 does not. */
825 return log_error_errno(errno
, "Failed to open /sys/class/tty/tty0/active: %m");
828 r
= sd_event_add_io(m
->event
, &m
->console_active_event_source
, m
->console_active_fd
, 0, manager_dispatch_console
, m
);
830 log_error("Failed to watch foreground console");
835 * SIGRTMIN is used as global VT-release signal, SIGRTMIN + 1 is used
836 * as VT-acquire signal. We ignore any acquire-events (yes, we still
837 * have to provide a valid signal-number for it!) and acknowledge all
838 * release events immediately.
841 if (SIGRTMIN
+ 1 > SIGRTMAX
) {
842 log_error("Not enough real-time signals available: %u-%u", SIGRTMIN
, SIGRTMAX
);
846 assert_se(ignore_signals(SIGRTMIN
+ 1, -1) >= 0);
847 assert_se(sigprocmask_many(SIG_BLOCK
, NULL
, SIGRTMIN
, -1) >= 0);
849 r
= sd_event_add_signal(m
->event
, NULL
, SIGRTMIN
, manager_vt_switch
, m
);
856 static int manager_connect_udev(Manager
*m
) {
860 assert(!m
->udev_seat_monitor
);
861 assert(!m
->udev_device_monitor
);
862 assert(!m
->udev_vcsa_monitor
);
863 assert(!m
->udev_button_monitor
);
865 m
->udev_seat_monitor
= udev_monitor_new_from_netlink(m
->udev
, "udev");
866 if (!m
->udev_seat_monitor
)
869 r
= udev_monitor_filter_add_match_tag(m
->udev_seat_monitor
, "master-of-seat");
873 r
= udev_monitor_enable_receiving(m
->udev_seat_monitor
);
877 r
= sd_event_add_io(m
->event
, &m
->udev_seat_event_source
, udev_monitor_get_fd(m
->udev_seat_monitor
), EPOLLIN
, manager_dispatch_seat_udev
, m
);
881 m
->udev_device_monitor
= udev_monitor_new_from_netlink(m
->udev
, "udev");
882 if (!m
->udev_device_monitor
)
885 r
= udev_monitor_filter_add_match_subsystem_devtype(m
->udev_device_monitor
, "input", NULL
);
889 r
= udev_monitor_filter_add_match_subsystem_devtype(m
->udev_device_monitor
, "graphics", NULL
);
893 r
= udev_monitor_filter_add_match_subsystem_devtype(m
->udev_device_monitor
, "drm", NULL
);
897 r
= udev_monitor_enable_receiving(m
->udev_device_monitor
);
901 r
= sd_event_add_io(m
->event
, &m
->udev_device_event_source
, udev_monitor_get_fd(m
->udev_device_monitor
), EPOLLIN
, manager_dispatch_device_udev
, m
);
905 /* Don't watch keys if nobody cares */
906 if (!manager_all_buttons_ignored(m
)) {
907 m
->udev_button_monitor
= udev_monitor_new_from_netlink(m
->udev
, "udev");
908 if (!m
->udev_button_monitor
)
911 r
= udev_monitor_filter_add_match_tag(m
->udev_button_monitor
, "power-switch");
915 r
= udev_monitor_filter_add_match_subsystem_devtype(m
->udev_button_monitor
, "input", NULL
);
919 r
= udev_monitor_enable_receiving(m
->udev_button_monitor
);
923 r
= sd_event_add_io(m
->event
, &m
->udev_button_event_source
, udev_monitor_get_fd(m
->udev_button_monitor
), EPOLLIN
, manager_dispatch_button_udev
, m
);
928 /* Don't bother watching VCSA devices, if nobody cares */
929 if (m
->n_autovts
> 0 && m
->console_active_fd
>= 0) {
931 m
->udev_vcsa_monitor
= udev_monitor_new_from_netlink(m
->udev
, "udev");
932 if (!m
->udev_vcsa_monitor
)
935 r
= udev_monitor_filter_add_match_subsystem_devtype(m
->udev_vcsa_monitor
, "vc", NULL
);
939 r
= udev_monitor_enable_receiving(m
->udev_vcsa_monitor
);
943 r
= sd_event_add_io(m
->event
, &m
->udev_vcsa_event_source
, udev_monitor_get_fd(m
->udev_vcsa_monitor
), EPOLLIN
, manager_dispatch_vcsa_udev
, m
);
951 static void manager_gc(Manager
*m
, bool drop_not_started
) {
958 while ((seat
= m
->seat_gc_queue
)) {
959 LIST_REMOVE(gc_queue
, m
->seat_gc_queue
, seat
);
960 seat
->in_gc_queue
= false;
962 if (seat_may_gc(seat
, drop_not_started
)) {
963 seat_stop(seat
, false);
968 while ((session
= m
->session_gc_queue
)) {
969 LIST_REMOVE(gc_queue
, m
->session_gc_queue
, session
);
970 session
->in_gc_queue
= false;
972 /* First, if we are not closing yet, initiate stopping */
973 if (session_may_gc(session
, drop_not_started
) &&
974 session_get_state(session
) != SESSION_CLOSING
)
975 session_stop(session
, false);
977 /* Normally, this should make the session referenced
978 * again, if it doesn't then let's get rid of it
980 if (session_may_gc(session
, drop_not_started
)) {
981 session_finalize(session
);
982 session_free(session
);
986 while ((user
= m
->user_gc_queue
)) {
987 LIST_REMOVE(gc_queue
, m
->user_gc_queue
, user
);
988 user
->in_gc_queue
= false;
990 /* First step: queue stop jobs */
991 if (user_may_gc(user
, drop_not_started
))
992 user_stop(user
, false);
994 /* Second step: finalize user */
995 if (user_may_gc(user
, drop_not_started
)) {
1002 static int manager_dispatch_idle_action(sd_event_source
*s
, uint64_t t
, void *userdata
) {
1003 Manager
*m
= userdata
;
1004 struct dual_timestamp since
;
1010 if (m
->idle_action
== HANDLE_IGNORE
||
1011 m
->idle_action_usec
<= 0)
1014 n
= now(CLOCK_MONOTONIC
);
1016 r
= manager_get_idle_hint(m
, &since
);
1018 /* Not idle. Let's check if after a timeout it might be idle then. */
1019 elapse
= n
+ m
->idle_action_usec
;
1021 /* Idle! Let's see if it's time to do something, or if
1022 * we shall sleep for longer. */
1024 if (n
>= since
.monotonic
+ m
->idle_action_usec
&&
1025 (m
->idle_action_not_before_usec
<= 0 || n
>= m
->idle_action_not_before_usec
+ m
->idle_action_usec
)) {
1026 log_info("System idle. Taking action.");
1028 manager_handle_action(m
, 0, m
->idle_action
, false, false);
1029 m
->idle_action_not_before_usec
= n
;
1032 elapse
= MAX(since
.monotonic
, m
->idle_action_not_before_usec
) + m
->idle_action_usec
;
1035 if (!m
->idle_action_event_source
) {
1037 r
= sd_event_add_time(
1039 &m
->idle_action_event_source
,
1041 elapse
, USEC_PER_SEC
*30,
1042 manager_dispatch_idle_action
, m
);
1044 return log_error_errno(r
, "Failed to add idle event source: %m");
1046 r
= sd_event_source_set_priority(m
->idle_action_event_source
, SD_EVENT_PRIORITY_IDLE
+10);
1048 return log_error_errno(r
, "Failed to set idle event source priority: %m");
1050 r
= sd_event_source_set_time(m
->idle_action_event_source
, elapse
);
1052 return log_error_errno(r
, "Failed to set idle event timer: %m");
1054 r
= sd_event_source_set_enabled(m
->idle_action_event_source
, SD_EVENT_ONESHOT
);
1056 return log_error_errno(r
, "Failed to enable idle event timer: %m");
1062 static int manager_dispatch_reload_signal(sd_event_source
*s
, const struct signalfd_siginfo
*si
, void *userdata
) {
1063 Manager
*m
= userdata
;
1066 manager_reset_config(m
);
1067 r
= manager_parse_config_file(m
);
1069 log_warning_errno(r
, "Failed to parse config file, using defaults: %m");
1071 log_info("Config file reloaded.");
1076 static int manager_startup(Manager
*m
) {
1082 Inhibitor
*inhibitor
;
1087 assert_se(sigprocmask_many(SIG_SETMASK
, NULL
, SIGHUP
, -1) >= 0);
1089 r
= sd_event_add_signal(m
->event
, NULL
, SIGHUP
, manager_dispatch_reload_signal
, m
);
1091 return log_error_errno(r
, "Failed to register SIGHUP handler: %m");
1093 /* Connect to console */
1094 r
= manager_connect_console(m
);
1098 /* Connect to udev */
1099 r
= manager_connect_udev(m
);
1101 return log_error_errno(r
, "Failed to create udev watchers: %m");
1103 /* Connect to the bus */
1104 r
= manager_connect_bus(m
);
1108 /* Instantiate magic seat 0 */
1109 r
= manager_add_seat(m
, "seat0", &m
->seat0
);
1111 return log_error_errno(r
, "Failed to add seat0: %m");
1113 r
= manager_set_lid_switch_ignore(m
, 0 + m
->holdoff_timeout_usec
);
1115 log_warning_errno(r
, "Failed to set up lid switch ignore event source: %m");
1117 /* Deserialize state */
1118 r
= manager_enumerate_devices(m
);
1120 log_warning_errno(r
, "Device enumeration failed: %m");
1122 r
= manager_enumerate_seats(m
);
1124 log_warning_errno(r
, "Seat enumeration failed: %m");
1126 r
= manager_enumerate_users(m
);
1128 log_warning_errno(r
, "User enumeration failed: %m");
1130 r
= manager_enumerate_sessions(m
);
1132 log_warning_errno(r
, "Session enumeration failed: %m");
1134 r
= manager_enumerate_inhibitors(m
);
1136 log_warning_errno(r
, "Inhibitor enumeration failed: %m");
1138 r
= manager_enumerate_buttons(m
);
1140 log_warning_errno(r
, "Button enumeration failed: %m");
1142 /* Remove stale objects before we start them */
1143 manager_gc(m
, false);
1145 /* Reserve the special reserved VT */
1146 manager_reserve_vt(m
);
1148 /* And start everything */
1149 HASHMAP_FOREACH(seat
, m
->seats
, i
)
1152 HASHMAP_FOREACH(user
, m
->users
, i
)
1155 HASHMAP_FOREACH(session
, m
->sessions
, i
)
1156 session_start(session
, NULL
);
1158 HASHMAP_FOREACH(inhibitor
, m
->inhibitors
, i
)
1159 inhibitor_start(inhibitor
);
1161 HASHMAP_FOREACH(button
, m
->buttons
, i
)
1162 button_check_switches(button
);
1164 manager_dispatch_idle_action(NULL
, 0, m
);
1169 static int manager_run(Manager
*m
) {
1175 r
= sd_event_get_state(m
->event
);
1178 if (r
== SD_EVENT_FINISHED
)
1181 manager_gc(m
, true);
1183 r
= manager_dispatch_delayed(m
, false);
1189 r
= sd_event_run(m
->event
, (uint64_t) -1);
1195 int main(int argc
, char *argv
[]) {
1199 log_set_target(LOG_TARGET_AUTO
);
1200 log_set_facility(LOG_AUTH
);
1201 log_parse_environment();
1207 log_error("This program takes no arguments.");
1212 r
= mac_selinux_init();
1214 log_error_errno(r
, "Could not initialize labelling: %m");
1218 /* Always create the directories people can create inotify
1219 * watches in. Note that some applications might check for the
1220 * existence of /run/systemd/seats/ to determine whether
1221 * logind is available, so please always make sure this check
1223 mkdir_label("/run/systemd/seats", 0755);
1224 mkdir_label("/run/systemd/users", 0755);
1225 mkdir_label("/run/systemd/sessions", 0755);
1233 manager_parse_config_file(m
);
1235 r
= manager_startup(m
);
1237 log_error_errno(r
, "Failed to fully start up daemon: %m");
1241 log_debug("systemd-logind running as pid "PID_FMT
, getpid_cached());
1245 "STATUS=Processing requests...");
1249 log_debug("systemd-logind stopped as pid "PID_FMT
, getpid_cached());
1254 "STATUS=Shutting down...");
1258 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;