1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/reboot.h>
28 #include <sys/ioctl.h>
32 #include <sys/socket.h>
35 #include <sys/prctl.h>
37 #include <dbus/dbus.h>
43 #include "utmp-wtmp.h"
47 #include "dbus-common.h"
48 #include "cgroup-show.h"
49 #include "cgroup-util.h"
51 #include "path-lookup.h"
52 #include "conf-parser.h"
53 #include "sd-daemon.h"
54 #include "shutdownd.h"
55 #include "exit-status.h"
56 #include "bus-errors.h"
58 #include "unit-name.h"
60 static const char *arg_type = NULL;
61 static char **arg_property = NULL;
62 static bool arg_all = false;
63 static const char *arg_job_mode = "replace";
64 static bool arg_user = false;
65 static bool arg_global = false;
66 static bool arg_immediate = false;
67 static bool arg_no_block = false;
68 static bool arg_no_pager = false;
69 static bool arg_no_wtmp = false;
70 static bool arg_no_sync = false;
71 static bool arg_no_wall = false;
72 static bool arg_no_reload = false;
73 static bool arg_dry = false;
74 static bool arg_quiet = false;
75 static bool arg_full = false;
76 static bool arg_force = false;
77 static bool arg_defaults = false;
78 static bool arg_ask_password = false;
79 static bool arg_failed = false;
80 static char **arg_wall = NULL;
81 static const char *arg_kill_who = NULL;
82 static const char *arg_kill_mode = NULL;
83 static int arg_signal = SIGTERM;
84 static usec_t arg_when = 0;
103 ACTION_CANCEL_SHUTDOWN,
105 } arg_action = ACTION_SYSTEMCTL;
111 static enum transport {
115 } arg_transport = TRANSPORT_NORMAL;
116 static const char *arg_host = NULL;
118 static bool private_bus = false;
120 static pid_t pager_pid = 0;
121 static pid_t agent_pid = 0;
123 static int daemon_reload(DBusConnection *bus, char **args, unsigned n);
124 static void pager_open(void);
126 static bool on_tty(void) {
129 /* Note that this is invoked relatively early, before we start
130 * the pager. That means the value we return reflects whether
131 * we originally were started on a tty, not if we currently
132 * are. But this is intended, since we want colour and so on
133 * when run in our own pager. */
135 if (_unlikely_(t < 0))
136 t = isatty(STDOUT_FILENO) > 0;
141 static void spawn_ask_password_agent(void) {
147 /* We check STDIN here, not STDOUT, since this is about input,
149 if (!isatty(STDIN_FILENO))
152 if (!arg_ask_password)
160 /* Spawns a temporary TTY agent, making sure it goes away when
163 if ((agent_pid = fork()) < 0)
166 if (agent_pid == 0) {
170 bool stdout_is_tty, stderr_is_tty;
172 /* Make sure the agent goes away when the parent dies */
173 if (prctl(PR_SET_PDEATHSIG, SIGTERM) < 0)
176 /* Check whether our parent died before we were able
177 * to set the death signal */
178 if (getppid() != parent)
181 /* Don't leak fds to the agent */
182 close_all_fds(NULL, 0);
184 stdout_is_tty = isatty(STDOUT_FILENO);
185 stderr_is_tty = isatty(STDERR_FILENO);
187 if (!stdout_is_tty || !stderr_is_tty) {
188 /* Detach from stdout/stderr. and reopen
189 * /dev/tty for them. This is important to
190 * ensure that when systemctl is started via
191 * popen() or a similar call that expects to
192 * read EOF we actually do generate EOF and
193 * not delay this indefinitely by because we
194 * keep an unused copy of stdin around. */
195 if ((fd = open("/dev/tty", O_WRONLY)) < 0) {
196 log_error("Failed to open /dev/tty: %m");
201 dup2(fd, STDOUT_FILENO);
204 dup2(fd, STDERR_FILENO);
210 execl(SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH, SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH, "--watch", NULL);
212 log_error("Unable to execute agent: %m");
217 static const char *ansi_highlight(bool b) {
222 return b ? ANSI_HIGHLIGHT_ON : ANSI_HIGHLIGHT_OFF;
225 static const char *ansi_highlight_green(bool b) {
230 return b ? ANSI_HIGHLIGHT_GREEN_ON : ANSI_HIGHLIGHT_OFF;
233 static bool error_is_no_service(const DBusError *error) {
236 if (!dbus_error_is_set(error))
239 if (dbus_error_has_name(error, DBUS_ERROR_NAME_HAS_NO_OWNER))
242 if (dbus_error_has_name(error, DBUS_ERROR_SERVICE_UNKNOWN))
245 return startswith(error->name, "org.freedesktop.DBus.Error.Spawn.");
248 static int translate_bus_error_to_exit_status(int r, const DBusError *error) {
251 if (!dbus_error_is_set(error))
254 if (dbus_error_has_name(error, DBUS_ERROR_ACCESS_DENIED) ||
255 dbus_error_has_name(error, BUS_ERROR_ONLY_BY_DEPENDENCY) ||
256 dbus_error_has_name(error, BUS_ERROR_NO_ISOLATION) ||
257 dbus_error_has_name(error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE))
258 return EXIT_NOPERMISSION;
260 if (dbus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT))
261 return EXIT_NOTINSTALLED;
263 if (dbus_error_has_name(error, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE) ||
264 dbus_error_has_name(error, BUS_ERROR_NOT_SUPPORTED))
265 return EXIT_NOTIMPLEMENTED;
267 if (dbus_error_has_name(error, BUS_ERROR_LOAD_FAILED))
268 return EXIT_NOTCONFIGURED;
276 static int bus_iter_get_basic_and_next(DBusMessageIter *iter, int type, void *data, bool next) {
281 if (dbus_message_iter_get_arg_type(iter) != type)
284 dbus_message_iter_get_basic(iter, data);
286 if (!dbus_message_iter_next(iter) != !next)
292 static void warn_wall(enum action action) {
293 static const char *table[_ACTION_MAX] = {
294 [ACTION_HALT] = "The system is going down for system halt NOW!",
295 [ACTION_REBOOT] = "The system is going down for reboot NOW!",
296 [ACTION_POWEROFF] = "The system is going down for power-off NOW!",
297 [ACTION_KEXEC] = "The system is going down for kexec reboot NOW!",
298 [ACTION_RESCUE] = "The system is going down to rescue mode NOW!",
299 [ACTION_EMERGENCY] = "The system is going down to emergency mode NOW!"
308 if (!(p = strv_join(arg_wall, " "))) {
309 log_error("Failed to join strings.");
325 utmp_wall(table[action], NULL);
330 const char *description;
331 const char *load_state;
332 const char *active_state;
333 const char *sub_state;
334 const char *following;
335 const char *unit_path;
337 const char *job_type;
338 const char *job_path;
341 static int compare_unit_info(const void *a, const void *b) {
343 const struct unit_info *u = a, *v = b;
345 d1 = strrchr(u->id, '.');
346 d2 = strrchr(v->id, '.');
351 if ((r = strcasecmp(d1, d2)) != 0)
355 return strcasecmp(u->id, v->id);
358 static bool output_show_unit(const struct unit_info *u) {
362 return streq(u->active_state, "failed");
364 return (!arg_type || ((dot = strrchr(u->id, '.')) &&
365 streq(dot+1, arg_type))) &&
366 (arg_all || !(streq(u->active_state, "inactive") || u->following[0]) || u->job_id > 0);
369 static void output_units_list(const struct unit_info *unit_infos, unsigned c) {
370 unsigned active_len, sub_len, job_len, n_shown = 0;
371 const struct unit_info *u;
373 active_len = sizeof("ACTIVE")-1;
374 sub_len = sizeof("SUB")-1;
375 job_len = sizeof("JOB")-1;
377 for (u = unit_infos; u < unit_infos + c; u++) {
378 if (!output_show_unit(u))
381 active_len = MAX(active_len, strlen(u->active_state));
382 sub_len = MAX(sub_len, strlen(u->sub_state));
384 job_len = MAX(job_len, strlen(u->job_type));
388 printf("%-25s %-6s %-*s %-*s %-*s", "UNIT", "LOAD",
389 active_len, "ACTIVE", sub_len, "SUB", job_len, "JOB");
390 if (columns() >= 80+12 || arg_full)
391 printf(" %s\n", "DESCRIPTION");
396 for (u = unit_infos; u < unit_infos + c; u++) {
399 const char *on_loaded, *off_loaded;
400 const char *on_active, *off_active;
402 if (!output_show_unit(u))
407 if (!streq(u->load_state, "loaded") &&
408 !streq(u->load_state, "banned")) {
409 on_loaded = ansi_highlight(true);
410 off_loaded = ansi_highlight(false);
412 on_loaded = off_loaded = "";
414 if (streq(u->active_state, "failed")) {
415 on_active = ansi_highlight(true);
416 off_active = ansi_highlight(false);
418 on_active = off_active = "";
420 e = arg_full ? NULL : ellipsize(u->id, 25, 33);
422 printf("%-25s %s%-6s%s %s%-*s %-*s%s%n",
424 on_loaded, u->load_state, off_loaded,
425 on_active, active_len, u->active_state,
426 sub_len, u->sub_state, off_active,
431 a -= strlen(on_loaded) + strlen(off_loaded);
432 a -= strlen(on_active) + strlen(off_active);
435 printf(" %-*s", job_len, u->job_type);
439 if (a + b + 1 < columns()) {
441 printf(" %-*s", job_len, "");
444 printf(" %s", u->description);
446 printf(" %.*s", columns() - a - b - 1, u->description);
453 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
454 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
455 "SUB = The low-level unit activation state, values depend on unit type.\n"
456 "JOB = Pending job for the unit.\n");
459 printf("\n%u units listed.\n", n_shown);
461 printf("\n%u units listed. Pass --all to see inactive units, too.\n", n_shown);
465 static int list_units(DBusConnection *bus, char **args, unsigned n) {
466 DBusMessage *m = NULL, *reply = NULL;
469 DBusMessageIter iter, sub, sub2;
470 unsigned c = 0, n_units = 0;
471 struct unit_info *unit_infos = NULL;
473 dbus_error_init(&error);
479 if (!(m = dbus_message_new_method_call(
480 "org.freedesktop.systemd1",
481 "/org/freedesktop/systemd1",
482 "org.freedesktop.systemd1.Manager",
484 log_error("Could not allocate message.");
488 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
489 log_error("Failed to issue method call: %s", bus_error_message(&error));
494 if (!dbus_message_iter_init(reply, &iter) ||
495 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
496 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
497 log_error("Failed to parse reply.");
502 dbus_message_iter_recurse(&iter, &sub);
504 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
507 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
508 log_error("Failed to parse reply.");
516 n_units = MAX(2*c, 16);
517 w = realloc(unit_infos, sizeof(struct unit_info) * n_units);
520 log_error("Failed to allocate unit array.");
530 dbus_message_iter_recurse(&sub, &sub2);
532 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->id, true) < 0 ||
533 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->description, true) < 0 ||
534 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->load_state, true) < 0 ||
535 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->active_state, true) < 0 ||
536 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->sub_state, true) < 0 ||
537 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->following, true) < 0 ||
538 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->unit_path, true) < 0 ||
539 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &u->job_id, true) < 0 ||
540 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->job_type, true) < 0 ||
541 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->job_path, false) < 0) {
542 log_error("Failed to parse reply.");
547 dbus_message_iter_next(&sub);
552 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
553 output_units_list(unit_infos, c);
560 dbus_message_unref(m);
563 dbus_message_unref(reply);
567 dbus_error_free(&error);
572 static int dot_one_property(const char *name, const char *prop, DBusMessageIter *iter) {
573 static const char * const colors[] = {
574 "Requires", "[color=\"black\"]",
575 "RequiresOverridable", "[color=\"black\"]",
576 "Requisite", "[color=\"darkblue\"]",
577 "RequisiteOverridable", "[color=\"darkblue\"]",
578 "Wants", "[color=\"darkgrey\"]",
579 "Conflicts", "[color=\"red\"]",
580 "ConflictedBy", "[color=\"red\"]",
581 "After", "[color=\"green\"]"
584 const char *c = NULL;
591 for (i = 0; i < ELEMENTSOF(colors); i += 2)
592 if (streq(colors[i], prop)) {
600 if (arg_dot != DOT_ALL)
601 if ((arg_dot == DOT_ORDER) != streq(prop, "After"))
604 switch (dbus_message_iter_get_arg_type(iter)) {
606 case DBUS_TYPE_ARRAY:
608 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING) {
611 dbus_message_iter_recurse(iter, &sub);
613 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
616 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING);
617 dbus_message_iter_get_basic(&sub, &s);
618 printf("\t\"%s\"->\"%s\" %s;\n", name, s, c);
620 dbus_message_iter_next(&sub);
630 static int dot_one(DBusConnection *bus, const char *name, const char *path) {
631 DBusMessage *m = NULL, *reply = NULL;
632 const char *interface = "org.freedesktop.systemd1.Unit";
635 DBusMessageIter iter, sub, sub2, sub3;
640 dbus_error_init(&error);
642 if (!(m = dbus_message_new_method_call(
643 "org.freedesktop.systemd1",
645 "org.freedesktop.DBus.Properties",
647 log_error("Could not allocate message.");
652 if (!dbus_message_append_args(m,
653 DBUS_TYPE_STRING, &interface,
654 DBUS_TYPE_INVALID)) {
655 log_error("Could not append arguments to message.");
660 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
661 log_error("Failed to issue method call: %s", bus_error_message(&error));
666 if (!dbus_message_iter_init(reply, &iter) ||
667 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
668 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
669 log_error("Failed to parse reply.");
674 dbus_message_iter_recurse(&iter, &sub);
676 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
679 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_DICT_ENTRY) {
680 log_error("Failed to parse reply.");
685 dbus_message_iter_recurse(&sub, &sub2);
687 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &prop, true) < 0) {
688 log_error("Failed to parse reply.");
693 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
694 log_error("Failed to parse reply.");
699 dbus_message_iter_recurse(&sub2, &sub3);
701 if (dot_one_property(name, prop, &sub3)) {
702 log_error("Failed to parse reply.");
707 dbus_message_iter_next(&sub);
714 dbus_message_unref(m);
717 dbus_message_unref(reply);
719 dbus_error_free(&error);
724 static int dot(DBusConnection *bus, char **args, unsigned n) {
725 DBusMessage *m = NULL, *reply = NULL;
728 DBusMessageIter iter, sub, sub2;
730 dbus_error_init(&error);
734 if (!(m = dbus_message_new_method_call(
735 "org.freedesktop.systemd1",
736 "/org/freedesktop/systemd1",
737 "org.freedesktop.systemd1.Manager",
739 log_error("Could not allocate message.");
743 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
744 log_error("Failed to issue method call: %s", bus_error_message(&error));
749 if (!dbus_message_iter_init(reply, &iter) ||
750 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
751 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
752 log_error("Failed to parse reply.");
757 printf("digraph systemd {\n");
759 dbus_message_iter_recurse(&iter, &sub);
760 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
761 const char *id, *description, *load_state, *active_state, *sub_state, *following, *unit_path;
763 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
764 log_error("Failed to parse reply.");
769 dbus_message_iter_recurse(&sub, &sub2);
771 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &id, true) < 0 ||
772 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &description, true) < 0 ||
773 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &load_state, true) < 0 ||
774 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &active_state, true) < 0 ||
775 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &sub_state, true) < 0 ||
776 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &following, true) < 0 ||
777 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, true) < 0) {
778 log_error("Failed to parse reply.");
783 if ((r = dot_one(bus, id, unit_path)) < 0)
786 /* printf("\t\"%s\";\n", id); */
787 dbus_message_iter_next(&sub);
792 log_info(" Color legend: black = Requires\n"
793 " dark blue = Requisite\n"
794 " dark grey = Wants\n"
798 if (isatty(fileno(stdout)))
799 log_notice("-- You probably want to process this output with graphviz' dot tool.\n"
800 "-- Try a shell pipeline like 'systemctl dot | dot -Tsvg > systemd.svg'!\n");
806 dbus_message_unref(m);
809 dbus_message_unref(reply);
811 dbus_error_free(&error);
816 static int list_jobs(DBusConnection *bus, char **args, unsigned n) {
817 DBusMessage *m = NULL, *reply = NULL;
820 DBusMessageIter iter, sub, sub2;
823 dbus_error_init(&error);
829 if (!(m = dbus_message_new_method_call(
830 "org.freedesktop.systemd1",
831 "/org/freedesktop/systemd1",
832 "org.freedesktop.systemd1.Manager",
834 log_error("Could not allocate message.");
838 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
839 log_error("Failed to issue method call: %s", bus_error_message(&error));
844 if (!dbus_message_iter_init(reply, &iter) ||
845 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
846 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
847 log_error("Failed to parse reply.");
852 dbus_message_iter_recurse(&iter, &sub);
854 if (isatty(STDOUT_FILENO))
855 printf("%4s %-25s %-15s %-7s\n", "JOB", "UNIT", "TYPE", "STATE");
857 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
858 const char *name, *type, *state, *job_path, *unit_path;
862 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
863 log_error("Failed to parse reply.");
868 dbus_message_iter_recurse(&sub, &sub2);
870 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &id, true) < 0 ||
871 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
872 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
873 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, true) < 0 ||
874 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &job_path, true) < 0 ||
875 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, false) < 0) {
876 log_error("Failed to parse reply.");
881 e = arg_full ? NULL : ellipsize(name, 25, 33);
882 printf("%4u %-25s %-15s %-7s\n", id, e ? e : name, type, state);
887 dbus_message_iter_next(&sub);
890 if (isatty(STDOUT_FILENO))
891 printf("\n%u jobs listed.\n", k);
897 dbus_message_unref(m);
900 dbus_message_unref(reply);
902 dbus_error_free(&error);
907 static int load_unit(DBusConnection *bus, char **args, unsigned n) {
908 DBusMessage *m = NULL, *reply = NULL;
913 dbus_error_init(&error);
918 for (i = 1; i < n; i++) {
920 if (!(m = dbus_message_new_method_call(
921 "org.freedesktop.systemd1",
922 "/org/freedesktop/systemd1",
923 "org.freedesktop.systemd1.Manager",
925 log_error("Could not allocate message.");
930 if (!dbus_message_append_args(m,
931 DBUS_TYPE_STRING, &args[i],
932 DBUS_TYPE_INVALID)) {
933 log_error("Could not append arguments to message.");
938 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
939 log_error("Failed to issue method call: %s", bus_error_message(&error));
944 dbus_message_unref(m);
945 dbus_message_unref(reply);
954 dbus_message_unref(m);
957 dbus_message_unref(reply);
959 dbus_error_free(&error);
964 static int cancel_job(DBusConnection *bus, char **args, unsigned n) {
965 DBusMessage *m = NULL, *reply = NULL;
970 dbus_error_init(&error);
976 return daemon_reload(bus, args, n);
978 for (i = 1; i < n; i++) {
982 if (!(m = dbus_message_new_method_call(
983 "org.freedesktop.systemd1",
984 "/org/freedesktop/systemd1",
985 "org.freedesktop.systemd1.Manager",
987 log_error("Could not allocate message.");
992 if ((r = safe_atou(args[i], &id)) < 0) {
993 log_error("Failed to parse job id: %s", strerror(-r));
997 assert_cc(sizeof(uint32_t) == sizeof(id));
998 if (!dbus_message_append_args(m,
999 DBUS_TYPE_UINT32, &id,
1000 DBUS_TYPE_INVALID)) {
1001 log_error("Could not append arguments to message.");
1006 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1007 log_error("Failed to issue method call: %s", bus_error_message(&error));
1012 if (!dbus_message_get_args(reply, &error,
1013 DBUS_TYPE_OBJECT_PATH, &path,
1014 DBUS_TYPE_INVALID)) {
1015 log_error("Failed to parse reply: %s", bus_error_message(&error));
1020 dbus_message_unref(m);
1021 if (!(m = dbus_message_new_method_call(
1022 "org.freedesktop.systemd1",
1024 "org.freedesktop.systemd1.Job",
1026 log_error("Could not allocate message.");
1031 dbus_message_unref(reply);
1032 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1033 log_error("Failed to issue method call: %s", bus_error_message(&error));
1038 dbus_message_unref(m);
1039 dbus_message_unref(reply);
1047 dbus_message_unref(m);
1050 dbus_message_unref(reply);
1052 dbus_error_free(&error);
1057 static bool need_daemon_reload(DBusConnection *bus, const char *unit) {
1058 DBusMessage *m = NULL, *reply = NULL;
1059 dbus_bool_t b = FALSE;
1060 DBusMessageIter iter, sub;
1062 *interface = "org.freedesktop.systemd1.Unit",
1063 *property = "NeedDaemonReload",
1066 /* We ignore all errors here, since this is used to show a warning only */
1068 if (!(m = dbus_message_new_method_call(
1069 "org.freedesktop.systemd1",
1070 "/org/freedesktop/systemd1",
1071 "org.freedesktop.systemd1.Manager",
1075 if (!dbus_message_append_args(m,
1076 DBUS_TYPE_STRING, &unit,
1080 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, NULL)))
1083 if (!dbus_message_get_args(reply, NULL,
1084 DBUS_TYPE_OBJECT_PATH, &path,
1088 dbus_message_unref(m);
1089 if (!(m = dbus_message_new_method_call(
1090 "org.freedesktop.systemd1",
1092 "org.freedesktop.DBus.Properties",
1096 if (!dbus_message_append_args(m,
1097 DBUS_TYPE_STRING, &interface,
1098 DBUS_TYPE_STRING, &property,
1099 DBUS_TYPE_INVALID)) {
1103 dbus_message_unref(reply);
1104 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, NULL)))
1107 if (!dbus_message_iter_init(reply, &iter) ||
1108 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1111 dbus_message_iter_recurse(&iter, &sub);
1113 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_BOOLEAN)
1116 dbus_message_iter_get_basic(&sub, &b);
1120 dbus_message_unref(m);
1123 dbus_message_unref(reply);
1128 typedef struct WaitData {
1133 static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *message, void *data) {
1141 dbus_error_init(&error);
1143 log_debug("Got D-Bus request: %s.%s() on %s",
1144 dbus_message_get_interface(message),
1145 dbus_message_get_member(message),
1146 dbus_message_get_path(message));
1148 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
1149 log_error("Warning! D-Bus connection terminated.");
1150 dbus_connection_close(connection);
1152 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1154 const char *path, *result;
1155 dbus_bool_t success = true;
1157 if (dbus_message_get_args(message, &error,
1158 DBUS_TYPE_UINT32, &id,
1159 DBUS_TYPE_OBJECT_PATH, &path,
1160 DBUS_TYPE_STRING, &result,
1161 DBUS_TYPE_INVALID)) {
1164 if ((p = set_remove(d->set, (char*) path)))
1168 d->result = strdup(result);
1173 dbus_error_free(&error);
1175 if (dbus_message_get_args(message, &error,
1176 DBUS_TYPE_UINT32, &id,
1177 DBUS_TYPE_OBJECT_PATH, &path,
1178 DBUS_TYPE_BOOLEAN, &success,
1179 DBUS_TYPE_INVALID)) {
1182 /* Compatibility with older systemd versions <
1183 * 19 during upgrades. This should be dropped
1186 if ((p = set_remove(d->set, (char*) path)))
1190 d->result = strdup("failed");
1196 log_error("Failed to parse message: %s", bus_error_message(&error));
1200 dbus_error_free(&error);
1201 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1204 static int enable_wait_for_jobs(DBusConnection *bus) {
1212 dbus_error_init(&error);
1213 dbus_bus_add_match(bus,
1215 "sender='org.freedesktop.systemd1',"
1216 "interface='org.freedesktop.systemd1.Manager',"
1217 "member='JobRemoved',"
1218 "path='/org/freedesktop/systemd1'",
1221 if (dbus_error_is_set(&error)) {
1222 log_error("Failed to add match: %s", bus_error_message(&error));
1223 dbus_error_free(&error);
1227 /* This is slightly dirty, since we don't undo the match registrations. */
1231 static int wait_for_jobs(DBusConnection *bus, Set *s) {
1241 if (!dbus_connection_add_filter(bus, wait_filter, &d, NULL)) {
1242 log_error("Failed to add filter.");
1247 while (!set_isempty(s) &&
1248 dbus_connection_read_write_dispatch(bus, -1))
1251 if (!arg_quiet && d.result) {
1252 if (streq(d.result, "timeout"))
1253 log_error("Job timed out.");
1254 else if (streq(d.result, "canceled"))
1255 log_error("Job canceled.");
1256 else if (streq(d.result, "dependency"))
1257 log_error("A dependency job failed. See system logs for details.");
1258 else if (!streq(d.result, "done") && !streq(d.result, "skipped"))
1259 log_error("Job failed. See system logs and 'systemctl status' for details.");
1262 if (streq_ptr(d.result, "timeout"))
1264 else if (streq_ptr(d.result, "canceled"))
1266 else if (!streq_ptr(d.result, "done") && !streq_ptr(d.result, "skipped"))
1274 /* This is slightly dirty, since we don't undo the filter registration. */
1279 static int start_unit_one(
1280 DBusConnection *bus,
1287 DBusMessage *m = NULL, *reply = NULL;
1296 assert(arg_no_block || s);
1298 if (!(m = dbus_message_new_method_call(
1299 "org.freedesktop.systemd1",
1300 "/org/freedesktop/systemd1",
1301 "org.freedesktop.systemd1.Manager",
1303 log_error("Could not allocate message.");
1308 if (!dbus_message_append_args(m,
1309 DBUS_TYPE_STRING, &name,
1310 DBUS_TYPE_STRING, &mode,
1311 DBUS_TYPE_INVALID)) {
1312 log_error("Could not append arguments to message.");
1317 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, error))) {
1319 if (arg_action != ACTION_SYSTEMCTL && error_is_no_service(error)) {
1320 /* There's always a fallback possible for
1321 * legacy actions. */
1326 log_error("Failed to issue method call: %s", bus_error_message(error));
1331 if (!dbus_message_get_args(reply, error,
1332 DBUS_TYPE_OBJECT_PATH, &path,
1333 DBUS_TYPE_INVALID)) {
1334 log_error("Failed to parse reply: %s", bus_error_message(error));
1339 if (need_daemon_reload(bus, name))
1340 log_warning("Unit file of created job changed on disk, 'systemctl %s daemon-reload' recommended.",
1341 arg_user ? "--user" : "--system");
1343 if (!arg_no_block) {
1346 if (!(p = strdup(path))) {
1347 log_error("Failed to duplicate path.");
1352 if ((r = set_put(s, p)) < 0) {
1354 log_error("Failed to add path to set.");
1363 dbus_message_unref(m);
1366 dbus_message_unref(reply);
1371 static enum action verb_to_action(const char *verb) {
1372 if (streq(verb, "halt"))
1374 else if (streq(verb, "poweroff"))
1375 return ACTION_POWEROFF;
1376 else if (streq(verb, "reboot"))
1377 return ACTION_REBOOT;
1378 else if (streq(verb, "kexec"))
1379 return ACTION_KEXEC;
1380 else if (streq(verb, "rescue"))
1381 return ACTION_RESCUE;
1382 else if (streq(verb, "emergency"))
1383 return ACTION_EMERGENCY;
1384 else if (streq(verb, "default"))
1385 return ACTION_DEFAULT;
1386 else if (streq(verb, "exit"))
1389 return ACTION_INVALID;
1392 static int start_unit(DBusConnection *bus, char **args, unsigned n) {
1394 static const char * const table[_ACTION_MAX] = {
1395 [ACTION_HALT] = SPECIAL_HALT_TARGET,
1396 [ACTION_POWEROFF] = SPECIAL_POWEROFF_TARGET,
1397 [ACTION_REBOOT] = SPECIAL_REBOOT_TARGET,
1398 [ACTION_KEXEC] = SPECIAL_KEXEC_TARGET,
1399 [ACTION_RUNLEVEL2] = SPECIAL_RUNLEVEL2_TARGET,
1400 [ACTION_RUNLEVEL3] = SPECIAL_RUNLEVEL3_TARGET,
1401 [ACTION_RUNLEVEL4] = SPECIAL_RUNLEVEL4_TARGET,
1402 [ACTION_RUNLEVEL5] = SPECIAL_RUNLEVEL5_TARGET,
1403 [ACTION_RESCUE] = SPECIAL_RESCUE_TARGET,
1404 [ACTION_EMERGENCY] = SPECIAL_EMERGENCY_TARGET,
1405 [ACTION_DEFAULT] = SPECIAL_DEFAULT_TARGET,
1406 [ACTION_EXIT] = SPECIAL_EXIT_TARGET
1411 const char *method, *mode, *one_name;
1415 dbus_error_init(&error);
1419 spawn_ask_password_agent();
1421 if (arg_action == ACTION_SYSTEMCTL) {
1423 streq(args[0], "stop") ? "StopUnit" :
1424 streq(args[0], "reload") ? "ReloadUnit" :
1425 streq(args[0], "restart") ? "RestartUnit" :
1427 streq(args[0], "try-restart") ||
1428 streq(args[0], "condrestart") ? "TryRestartUnit" :
1430 streq(args[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
1432 streq(args[0], "reload-or-try-restart") ||
1433 streq(args[0], "condreload") ||
1435 streq(args[0], "force-reload") ? "ReloadOrTryRestartUnit" :
1439 (streq(args[0], "isolate") ||
1440 streq(args[0], "rescue") ||
1441 streq(args[0], "emergency")) ? "isolate" : arg_job_mode;
1443 one_name = table[verb_to_action(args[0])];
1446 assert(arg_action < ELEMENTSOF(table));
1447 assert(table[arg_action]);
1449 method = "StartUnit";
1451 mode = (arg_action == ACTION_EMERGENCY ||
1452 arg_action == ACTION_RESCUE ||
1453 arg_action == ACTION_RUNLEVEL2 ||
1454 arg_action == ACTION_RUNLEVEL3 ||
1455 arg_action == ACTION_RUNLEVEL4 ||
1456 arg_action == ACTION_RUNLEVEL5) ? "isolate" : "replace";
1458 one_name = table[arg_action];
1461 if (!arg_no_block) {
1462 if ((ret = enable_wait_for_jobs(bus)) < 0) {
1463 log_error("Could not watch jobs: %s", strerror(-ret));
1467 if (!(s = set_new(string_hash_func, string_compare_func))) {
1468 log_error("Failed to allocate set.");
1475 if ((ret = start_unit_one(bus, method, one_name, mode, &error, s)) <= 0)
1478 for (i = 1; i < n; i++)
1479 if ((r = start_unit_one(bus, method, args[i], mode, &error, s)) != 0) {
1480 ret = translate_bus_error_to_exit_status(r, &error);
1481 dbus_error_free(&error);
1486 if ((r = wait_for_jobs(bus, s)) < 0) {
1495 dbus_error_free(&error);
1500 static int start_special(DBusConnection *bus, char **args, unsigned n) {
1507 (streq(args[0], "halt") ||
1508 streq(args[0], "poweroff") ||
1509 streq(args[0], "reboot") ||
1510 streq(args[0], "kexec") ||
1511 streq(args[0], "exit")))
1512 return daemon_reload(bus, args, n);
1514 r = start_unit(bus, args, n);
1517 warn_wall(verb_to_action(args[0]));
1522 static int check_unit(DBusConnection *bus, char **args, unsigned n) {
1523 DBusMessage *m = NULL, *reply = NULL;
1525 *interface = "org.freedesktop.systemd1.Unit",
1526 *property = "ActiveState";
1527 int r = 3; /* According to LSB: "program is not running" */
1534 dbus_error_init(&error);
1536 for (i = 1; i < n; i++) {
1537 const char *path = NULL;
1539 DBusMessageIter iter, sub;
1541 if (!(m = dbus_message_new_method_call(
1542 "org.freedesktop.systemd1",
1543 "/org/freedesktop/systemd1",
1544 "org.freedesktop.systemd1.Manager",
1546 log_error("Could not allocate message.");
1551 if (!dbus_message_append_args(m,
1552 DBUS_TYPE_STRING, &args[i],
1553 DBUS_TYPE_INVALID)) {
1554 log_error("Could not append arguments to message.");
1559 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1561 /* Hmm, cannot figure out anything about this unit... */
1565 dbus_error_free(&error);
1566 dbus_message_unref(m);
1570 if (!dbus_message_get_args(reply, &error,
1571 DBUS_TYPE_OBJECT_PATH, &path,
1572 DBUS_TYPE_INVALID)) {
1573 log_error("Failed to parse reply: %s", bus_error_message(&error));
1578 dbus_message_unref(m);
1579 if (!(m = dbus_message_new_method_call(
1580 "org.freedesktop.systemd1",
1582 "org.freedesktop.DBus.Properties",
1584 log_error("Could not allocate message.");
1589 if (!dbus_message_append_args(m,
1590 DBUS_TYPE_STRING, &interface,
1591 DBUS_TYPE_STRING, &property,
1592 DBUS_TYPE_INVALID)) {
1593 log_error("Could not append arguments to message.");
1598 dbus_message_unref(reply);
1599 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1600 log_error("Failed to issue method call: %s", bus_error_message(&error));
1605 if (!dbus_message_iter_init(reply, &iter) ||
1606 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1607 log_error("Failed to parse reply.");
1612 dbus_message_iter_recurse(&iter, &sub);
1614 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1615 log_error("Failed to parse reply.");
1620 dbus_message_iter_get_basic(&sub, &state);
1625 if (streq(state, "active") || streq(state, "reloading"))
1628 dbus_message_unref(m);
1629 dbus_message_unref(reply);
1635 dbus_message_unref(m);
1638 dbus_message_unref(reply);
1640 dbus_error_free(&error);
1645 static int kill_unit(DBusConnection *bus, char **args, unsigned n) {
1646 DBusMessage *m = NULL, *reply = NULL;
1654 dbus_error_init(&error);
1657 arg_kill_who = "all";
1660 arg_kill_mode = streq(arg_kill_who, "all") ? "control-group" : "process";
1662 for (i = 1; i < n; i++) {
1664 if (!(m = dbus_message_new_method_call(
1665 "org.freedesktop.systemd1",
1666 "/org/freedesktop/systemd1",
1667 "org.freedesktop.systemd1.Manager",
1669 log_error("Could not allocate message.");
1674 if (!dbus_message_append_args(m,
1675 DBUS_TYPE_STRING, &args[i],
1676 DBUS_TYPE_STRING, &arg_kill_who,
1677 DBUS_TYPE_STRING, &arg_kill_mode,
1678 DBUS_TYPE_INT32, &arg_signal,
1679 DBUS_TYPE_INVALID)) {
1680 log_error("Could not append arguments to message.");
1685 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1686 log_error("Failed to issue method call: %s", bus_error_message(&error));
1687 dbus_error_free(&error);
1691 dbus_message_unref(m);
1694 dbus_message_unref(reply);
1700 dbus_message_unref(m);
1703 dbus_message_unref(reply);
1705 dbus_error_free(&error);
1710 typedef struct ExecStatusInfo {
1718 usec_t start_timestamp;
1719 usec_t exit_timestamp;
1724 LIST_FIELDS(struct ExecStatusInfo, exec);
1727 static void exec_status_info_free(ExecStatusInfo *i) {
1736 static int exec_status_info_deserialize(DBusMessageIter *sub, ExecStatusInfo *i) {
1737 uint64_t start_timestamp, exit_timestamp;
1738 DBusMessageIter sub2, sub3;
1742 int32_t code, status;
1748 if (dbus_message_iter_get_arg_type(sub) != DBUS_TYPE_STRUCT)
1751 dbus_message_iter_recurse(sub, &sub2);
1753 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0)
1756 if (!(i->path = strdup(path)))
1759 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_ARRAY ||
1760 dbus_message_iter_get_element_type(&sub2) != DBUS_TYPE_STRING)
1764 dbus_message_iter_recurse(&sub2, &sub3);
1765 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
1766 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
1767 dbus_message_iter_next(&sub3);
1772 if (!(i->argv = new0(char*, n+1)))
1776 dbus_message_iter_recurse(&sub2, &sub3);
1777 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
1780 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
1781 dbus_message_iter_get_basic(&sub3, &s);
1782 dbus_message_iter_next(&sub3);
1784 if (!(i->argv[n++] = strdup(s)))
1788 if (!dbus_message_iter_next(&sub2) ||
1789 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, true) < 0 ||
1790 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp, true) < 0 ||
1791 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp, true) < 0 ||
1792 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, true) < 0 ||
1793 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &code, true) < 0 ||
1794 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &status, false) < 0)
1798 i->start_timestamp = (usec_t) start_timestamp;
1799 i->exit_timestamp = (usec_t) exit_timestamp;
1800 i->pid = (pid_t) pid;
1807 typedef struct UnitStatusInfo {
1809 const char *load_state;
1810 const char *active_state;
1811 const char *sub_state;
1813 const char *description;
1814 const char *following;
1817 const char *default_control_group;
1819 usec_t inactive_exit_timestamp;
1820 usec_t active_enter_timestamp;
1821 usec_t active_exit_timestamp;
1822 usec_t inactive_enter_timestamp;
1824 bool need_daemon_reload;
1829 const char *status_text;
1831 #ifdef HAVE_SYSV_COMPAT
1835 usec_t start_timestamp;
1836 usec_t exit_timestamp;
1838 int exit_code, exit_status;
1840 usec_t condition_timestamp;
1841 bool condition_result;
1844 unsigned n_accepted;
1845 unsigned n_connections;
1849 const char *sysfs_path;
1851 /* Mount, Automount */
1857 LIST_HEAD(ExecStatusInfo, exec);
1860 static void print_status_info(UnitStatusInfo *i) {
1862 const char *on, *off, *ss;
1864 char since1[FORMAT_TIMESTAMP_PRETTY_MAX], *s1;
1865 char since2[FORMAT_TIMESTAMP_MAX], *s2;
1869 /* This shows pretty information about a unit. See
1870 * print_property() for a low-level property printer */
1872 printf("%s", strna(i->id));
1874 if (i->description && !streq_ptr(i->id, i->description))
1875 printf(" - %s", i->description);
1880 printf("\t Follow: unit currently follows state of %s\n", i->following);
1882 if (streq_ptr(i->load_state, "failed") ||
1883 streq_ptr(i->load_state, "banned")) {
1884 on = ansi_highlight(true);
1885 off = ansi_highlight(false);
1890 printf("\t Loaded: %s%s%s (%s)\n", on, strna(i->load_state), off, i->path);
1892 printf("\t Loaded: %s%s%s\n", on, strna(i->load_state), off);
1894 ss = streq_ptr(i->active_state, i->sub_state) ? NULL : i->sub_state;
1896 if (streq_ptr(i->active_state, "failed")) {
1897 on = ansi_highlight(true);
1898 off = ansi_highlight(false);
1899 } else if (streq_ptr(i->active_state, "active") || streq_ptr(i->active_state, "reloading")) {
1900 on = ansi_highlight_green(true);
1901 off = ansi_highlight_green(false);
1906 printf("\t Active: %s%s (%s)%s",
1908 strna(i->active_state),
1912 printf("\t Active: %s%s%s",
1914 strna(i->active_state),
1917 timestamp = (streq_ptr(i->active_state, "active") ||
1918 streq_ptr(i->active_state, "reloading")) ? i->active_enter_timestamp :
1919 (streq_ptr(i->active_state, "inactive") ||
1920 streq_ptr(i->active_state, "failed")) ? i->inactive_enter_timestamp :
1921 streq_ptr(i->active_state, "activating") ? i->inactive_exit_timestamp :
1922 i->active_exit_timestamp;
1924 s1 = format_timestamp_pretty(since1, sizeof(since1), timestamp);
1925 s2 = format_timestamp(since2, sizeof(since2), timestamp);
1928 printf(" since %s; %s\n", s2, s1);
1930 printf(" since %s\n", s2);
1934 if (!i->condition_result && i->condition_timestamp > 0) {
1935 s1 = format_timestamp_pretty(since1, sizeof(since1), i->condition_timestamp);
1936 s2 = format_timestamp(since2, sizeof(since2), i->condition_timestamp);
1939 printf("\t start condition failed at %s; %s\n", s2, s1);
1941 printf("\t start condition failed at %s\n", s2);
1945 printf("\t Device: %s\n", i->sysfs_path);
1947 printf("\t Where: %s\n", i->where);
1949 printf("\t What: %s\n", i->what);
1952 printf("\tAccepted: %u; Connected: %u\n", i->n_accepted, i->n_connections);
1954 LIST_FOREACH(exec, p, i->exec) {
1958 /* Only show exited processes here */
1962 t = strv_join(p->argv, " ");
1963 printf("\t Process: %u %s=%s ", p->pid, p->name, strna(t));
1966 #ifdef HAVE_SYSV_COMPAT
1968 good = is_clean_exit_lsb(p->code, p->status);
1971 good = is_clean_exit(p->code, p->status);
1974 on = ansi_highlight(true);
1975 off = ansi_highlight(false);
1979 printf("%s(code=%s, ", on, sigchld_code_to_string(p->code));
1981 if (p->code == CLD_EXITED) {
1984 printf("status=%i", p->status);
1986 #ifdef HAVE_SYSV_COMPAT
1987 if ((c = exit_status_to_string(p->status, i->is_sysv ? EXIT_STATUS_LSB : EXIT_STATUS_SYSTEMD)))
1989 if ((c = exit_status_to_string(p->status, EXIT_STATUS_SYSTEMD)))
1994 printf("signal=%s", signal_to_string(p->status));
1996 printf(")%s\n", off);
2000 if (i->main_pid == p->pid &&
2001 i->start_timestamp == p->start_timestamp &&
2002 i->exit_timestamp == p->start_timestamp)
2003 /* Let's not show this twice */
2006 if (p->pid == i->control_pid)
2010 if (i->main_pid > 0 || i->control_pid > 0) {
2013 if (i->main_pid > 0) {
2014 printf("Main PID: %u", (unsigned) i->main_pid);
2018 get_process_name(i->main_pid, &t);
2023 } else if (i->exit_code > 0) {
2024 printf(" (code=%s, ", sigchld_code_to_string(i->exit_code));
2026 if (i->exit_code == CLD_EXITED) {
2029 printf("status=%i", i->exit_status);
2031 #ifdef HAVE_SYSV_COMPAT
2032 if ((c = exit_status_to_string(i->exit_status, i->is_sysv ? EXIT_STATUS_LSB : EXIT_STATUS_SYSTEMD)))
2034 if ((c = exit_status_to_string(i->exit_status, EXIT_STATUS_SYSTEMD)))
2039 printf("signal=%s", signal_to_string(i->exit_status));
2044 if (i->main_pid > 0 && i->control_pid > 0)
2047 if (i->control_pid > 0) {
2050 printf(" Control: %u", (unsigned) i->control_pid);
2052 get_process_name(i->control_pid, &t);
2063 printf("\t Status: \"%s\"\n", i->status_text);
2065 if (i->default_control_group) {
2068 printf("\t CGroup: %s\n", i->default_control_group);
2070 if (arg_transport != TRANSPORT_SSH) {
2071 if ((c = columns()) > 18)
2076 show_cgroup_by_path(i->default_control_group, "\t\t ", c);
2080 if (i->need_daemon_reload)
2081 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %s daemon-reload' recommended.\n",
2082 ansi_highlight(true),
2083 ansi_highlight(false),
2084 arg_user ? "--user" : "--system");
2087 static int status_property(const char *name, DBusMessageIter *iter, UnitStatusInfo *i) {
2089 switch (dbus_message_iter_get_arg_type(iter)) {
2091 case DBUS_TYPE_STRING: {
2094 dbus_message_iter_get_basic(iter, &s);
2097 if (streq(name, "Id"))
2099 else if (streq(name, "LoadState"))
2101 else if (streq(name, "ActiveState"))
2102 i->active_state = s;
2103 else if (streq(name, "SubState"))
2105 else if (streq(name, "Description"))
2107 else if (streq(name, "FragmentPath"))
2109 #ifdef HAVE_SYSV_COMPAT
2110 else if (streq(name, "SysVPath")) {
2115 else if (streq(name, "DefaultControlGroup"))
2116 i->default_control_group = s;
2117 else if (streq(name, "StatusText"))
2119 else if (streq(name, "SysFSPath"))
2121 else if (streq(name, "Where"))
2123 else if (streq(name, "What"))
2125 else if (streq(name, "Following"))
2132 case DBUS_TYPE_BOOLEAN: {
2135 dbus_message_iter_get_basic(iter, &b);
2137 if (streq(name, "Accept"))
2139 else if (streq(name, "NeedDaemonReload"))
2140 i->need_daemon_reload = b;
2141 else if (streq(name, "ConditionResult"))
2142 i->condition_result = b;
2147 case DBUS_TYPE_UINT32: {
2150 dbus_message_iter_get_basic(iter, &u);
2152 if (streq(name, "MainPID")) {
2154 i->main_pid = (pid_t) u;
2157 } else if (streq(name, "ControlPID"))
2158 i->control_pid = (pid_t) u;
2159 else if (streq(name, "ExecMainPID")) {
2161 i->main_pid = (pid_t) u;
2162 } else if (streq(name, "NAccepted"))
2164 else if (streq(name, "NConnections"))
2165 i->n_connections = u;
2170 case DBUS_TYPE_INT32: {
2173 dbus_message_iter_get_basic(iter, &j);
2175 if (streq(name, "ExecMainCode"))
2176 i->exit_code = (int) j;
2177 else if (streq(name, "ExecMainStatus"))
2178 i->exit_status = (int) j;
2183 case DBUS_TYPE_UINT64: {
2186 dbus_message_iter_get_basic(iter, &u);
2188 if (streq(name, "ExecMainStartTimestamp"))
2189 i->start_timestamp = (usec_t) u;
2190 else if (streq(name, "ExecMainExitTimestamp"))
2191 i->exit_timestamp = (usec_t) u;
2192 else if (streq(name, "ActiveEnterTimestamp"))
2193 i->active_enter_timestamp = (usec_t) u;
2194 else if (streq(name, "InactiveEnterTimestamp"))
2195 i->inactive_enter_timestamp = (usec_t) u;
2196 else if (streq(name, "InactiveExitTimestamp"))
2197 i->inactive_exit_timestamp = (usec_t) u;
2198 else if (streq(name, "ActiveExitTimestamp"))
2199 i->active_exit_timestamp = (usec_t) u;
2200 else if (streq(name, "ConditionTimestamp"))
2201 i->condition_timestamp = (usec_t) u;
2206 case DBUS_TYPE_ARRAY: {
2208 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT &&
2209 startswith(name, "Exec")) {
2210 DBusMessageIter sub;
2212 dbus_message_iter_recurse(iter, &sub);
2213 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2214 ExecStatusInfo *info;
2217 if (!(info = new0(ExecStatusInfo, 1)))
2220 if (!(info->name = strdup(name))) {
2225 if ((r = exec_status_info_deserialize(&sub, info)) < 0) {
2230 LIST_PREPEND(ExecStatusInfo, exec, i->exec, info);
2232 dbus_message_iter_next(&sub);
2243 static int print_property(const char *name, DBusMessageIter *iter) {
2247 /* This is a low-level property printer, see
2248 * print_status_info() for the nicer output */
2250 if (arg_property && !strv_find(arg_property, name))
2253 switch (dbus_message_iter_get_arg_type(iter)) {
2255 case DBUS_TYPE_STRING: {
2257 dbus_message_iter_get_basic(iter, &s);
2259 if (arg_all || s[0])
2260 printf("%s=%s\n", name, s);
2265 case DBUS_TYPE_BOOLEAN: {
2267 dbus_message_iter_get_basic(iter, &b);
2268 printf("%s=%s\n", name, yes_no(b));
2273 case DBUS_TYPE_UINT64: {
2275 dbus_message_iter_get_basic(iter, &u);
2277 /* Yes, heuristics! But we can change this check
2278 * should it turn out to not be sufficient */
2280 if (strstr(name, "Timestamp")) {
2281 char timestamp[FORMAT_TIMESTAMP_MAX], *t;
2283 if ((t = format_timestamp(timestamp, sizeof(timestamp), u)) || arg_all)
2284 printf("%s=%s\n", name, strempty(t));
2285 } else if (strstr(name, "USec")) {
2286 char timespan[FORMAT_TIMESPAN_MAX];
2288 printf("%s=%s\n", name, format_timespan(timespan, sizeof(timespan), u));
2290 printf("%s=%llu\n", name, (unsigned long long) u);
2295 case DBUS_TYPE_UINT32: {
2297 dbus_message_iter_get_basic(iter, &u);
2299 if (strstr(name, "UMask") || strstr(name, "Mode"))
2300 printf("%s=%04o\n", name, u);
2302 printf("%s=%u\n", name, (unsigned) u);
2307 case DBUS_TYPE_INT32: {
2309 dbus_message_iter_get_basic(iter, &i);
2311 printf("%s=%i\n", name, (int) i);
2315 case DBUS_TYPE_DOUBLE: {
2317 dbus_message_iter_get_basic(iter, &d);
2319 printf("%s=%g\n", name, d);
2323 case DBUS_TYPE_STRUCT: {
2324 DBusMessageIter sub;
2325 dbus_message_iter_recurse(iter, &sub);
2327 if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_UINT32 && streq(name, "Job")) {
2330 dbus_message_iter_get_basic(&sub, &u);
2333 printf("%s=%u\n", name, (unsigned) u);
2335 printf("%s=\n", name);
2338 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "Unit")) {
2341 dbus_message_iter_get_basic(&sub, &s);
2343 if (arg_all || s[0])
2344 printf("%s=%s\n", name, s);
2352 case DBUS_TYPE_ARRAY:
2354 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING) {
2355 DBusMessageIter sub;
2358 dbus_message_iter_recurse(iter, &sub);
2360 dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2361 printf("%s=", name);
2363 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2366 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING);
2367 dbus_message_iter_get_basic(&sub, &s);
2368 printf("%s%s", space ? " " : "", s);
2371 dbus_message_iter_next(&sub);
2379 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_BYTE) {
2380 DBusMessageIter sub;
2382 dbus_message_iter_recurse(iter, &sub);
2384 dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2385 printf("%s=", name);
2387 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2390 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_BYTE);
2391 dbus_message_iter_get_basic(&sub, &u);
2394 dbus_message_iter_next(&sub);
2402 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "EnvironmentFiles")) {
2403 DBusMessageIter sub, sub2;
2405 dbus_message_iter_recurse(iter, &sub);
2406 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2410 dbus_message_iter_recurse(&sub, &sub2);
2412 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) >= 0 &&
2413 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, false) >= 0)
2414 printf("EnvironmentFile=%s (ignore=%s)\n", path, yes_no(ignore));
2416 dbus_message_iter_next(&sub);
2421 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Paths")) {
2422 DBusMessageIter sub, sub2;
2424 dbus_message_iter_recurse(iter, &sub);
2425 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2426 const char *type, *path;
2428 dbus_message_iter_recurse(&sub, &sub2);
2430 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
2431 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
2432 printf("%s=%s\n", type, path);
2434 dbus_message_iter_next(&sub);
2439 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Timers")) {
2440 DBusMessageIter sub, sub2;
2442 dbus_message_iter_recurse(iter, &sub);
2443 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2445 uint64_t value, next_elapse;
2447 dbus_message_iter_recurse(&sub, &sub2);
2449 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &base, true) >= 0 &&
2450 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &value, true) >= 0 &&
2451 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &next_elapse, false) >= 0) {
2452 char timespan1[FORMAT_TIMESPAN_MAX], timespan2[FORMAT_TIMESPAN_MAX];
2454 printf("%s={ value=%s ; next_elapse=%s }\n",
2456 format_timespan(timespan1, sizeof(timespan1), value),
2457 format_timespan(timespan2, sizeof(timespan2), next_elapse));
2460 dbus_message_iter_next(&sub);
2465 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && startswith(name, "Exec")) {
2466 DBusMessageIter sub;
2468 dbus_message_iter_recurse(iter, &sub);
2469 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2470 ExecStatusInfo info;
2473 if (exec_status_info_deserialize(&sub, &info) >= 0) {
2474 char timestamp1[FORMAT_TIMESTAMP_MAX], timestamp2[FORMAT_TIMESTAMP_MAX];
2477 t = strv_join(info.argv, " ");
2479 printf("%s={ path=%s ; argv[]=%s ; ignore=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
2483 yes_no(info.ignore),
2484 strna(format_timestamp(timestamp1, sizeof(timestamp1), info.start_timestamp)),
2485 strna(format_timestamp(timestamp2, sizeof(timestamp2), info.exit_timestamp)),
2486 (unsigned) info. pid,
2487 sigchld_code_to_string(info.code),
2489 info.code == CLD_EXITED ? "" : "/",
2490 strempty(info.code == CLD_EXITED ? NULL : signal_to_string(info.status)));
2496 strv_free(info.argv);
2498 dbus_message_iter_next(&sub);
2508 printf("%s=[unprintable]\n", name);
2513 static int show_one(const char *verb, DBusConnection *bus, const char *path, bool show_properties, bool *new_line) {
2514 DBusMessage *m = NULL, *reply = NULL;
2515 const char *interface = "";
2518 DBusMessageIter iter, sub, sub2, sub3;
2519 UnitStatusInfo info;
2527 dbus_error_init(&error);
2529 if (!(m = dbus_message_new_method_call(
2530 "org.freedesktop.systemd1",
2532 "org.freedesktop.DBus.Properties",
2534 log_error("Could not allocate message.");
2539 if (!dbus_message_append_args(m,
2540 DBUS_TYPE_STRING, &interface,
2541 DBUS_TYPE_INVALID)) {
2542 log_error("Could not append arguments to message.");
2547 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2548 log_error("Failed to issue method call: %s", bus_error_message(&error));
2553 if (!dbus_message_iter_init(reply, &iter) ||
2554 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
2555 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
2556 log_error("Failed to parse reply.");
2561 dbus_message_iter_recurse(&iter, &sub);
2568 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2571 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_DICT_ENTRY) {
2572 log_error("Failed to parse reply.");
2577 dbus_message_iter_recurse(&sub, &sub2);
2579 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0) {
2580 log_error("Failed to parse reply.");
2585 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
2586 log_error("Failed to parse reply.");
2591 dbus_message_iter_recurse(&sub2, &sub3);
2593 if (show_properties)
2594 r = print_property(name, &sub3);
2596 r = status_property(name, &sub3, &info);
2599 log_error("Failed to parse reply.");
2604 dbus_message_iter_next(&sub);
2609 if (!show_properties)
2610 print_status_info(&info);
2612 if (!streq_ptr(info.active_state, "active") &&
2613 !streq_ptr(info.active_state, "reloading") &&
2614 streq(verb, "status"))
2615 /* According to LSB: "program not running" */
2618 while ((p = info.exec)) {
2619 LIST_REMOVE(ExecStatusInfo, exec, info.exec, p);
2620 exec_status_info_free(p);
2625 dbus_message_unref(m);
2628 dbus_message_unref(reply);
2630 dbus_error_free(&error);
2635 static int show(DBusConnection *bus, char **args, unsigned n) {
2636 DBusMessage *m = NULL, *reply = NULL;
2640 bool show_properties, new_line = false;
2645 dbus_error_init(&error);
2647 show_properties = !streq(args[0], "status");
2649 if (show_properties)
2652 if (show_properties && n <= 1) {
2653 /* If not argument is specified inspect the manager
2656 ret = show_one(args[0], bus, "/org/freedesktop/systemd1", show_properties, &new_line);
2660 for (i = 1; i < n; i++) {
2661 const char *path = NULL;
2664 if (safe_atou32(args[i], &id) < 0) {
2666 /* Interpret as unit name */
2668 if (!(m = dbus_message_new_method_call(
2669 "org.freedesktop.systemd1",
2670 "/org/freedesktop/systemd1",
2671 "org.freedesktop.systemd1.Manager",
2673 log_error("Could not allocate message.");
2678 if (!dbus_message_append_args(m,
2679 DBUS_TYPE_STRING, &args[i],
2680 DBUS_TYPE_INVALID)) {
2681 log_error("Could not append arguments to message.");
2686 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2688 if (!dbus_error_has_name(&error, DBUS_ERROR_ACCESS_DENIED)) {
2689 log_error("Failed to issue method call: %s", bus_error_message(&error));
2694 dbus_error_free(&error);
2696 dbus_message_unref(m);
2697 if (!(m = dbus_message_new_method_call(
2698 "org.freedesktop.systemd1",
2699 "/org/freedesktop/systemd1",
2700 "org.freedesktop.systemd1.Manager",
2702 log_error("Could not allocate message.");
2707 if (!dbus_message_append_args(m,
2708 DBUS_TYPE_STRING, &args[i],
2709 DBUS_TYPE_INVALID)) {
2710 log_error("Could not append arguments to message.");
2715 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2716 log_error("Failed to issue method call: %s", bus_error_message(&error));
2718 if (dbus_error_has_name(&error, BUS_ERROR_NO_SUCH_UNIT))
2719 ret = 4; /* According to LSB: "program or service status is unknown" */
2726 } else if (show_properties) {
2728 /* Interpret as job id */
2730 if (!(m = dbus_message_new_method_call(
2731 "org.freedesktop.systemd1",
2732 "/org/freedesktop/systemd1",
2733 "org.freedesktop.systemd1.Manager",
2735 log_error("Could not allocate message.");
2740 if (!dbus_message_append_args(m,
2741 DBUS_TYPE_UINT32, &id,
2742 DBUS_TYPE_INVALID)) {
2743 log_error("Could not append arguments to message.");
2748 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2749 log_error("Failed to issue method call: %s", bus_error_message(&error));
2755 /* Interpret as PID */
2757 if (!(m = dbus_message_new_method_call(
2758 "org.freedesktop.systemd1",
2759 "/org/freedesktop/systemd1",
2760 "org.freedesktop.systemd1.Manager",
2762 log_error("Could not allocate message.");
2767 if (!dbus_message_append_args(m,
2768 DBUS_TYPE_UINT32, &id,
2769 DBUS_TYPE_INVALID)) {
2770 log_error("Could not append arguments to message.");
2775 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2776 log_error("Failed to issue method call: %s", bus_error_message(&error));
2782 if (!dbus_message_get_args(reply, &error,
2783 DBUS_TYPE_OBJECT_PATH, &path,
2784 DBUS_TYPE_INVALID)) {
2785 log_error("Failed to parse reply: %s", bus_error_message(&error));
2790 if ((r = show_one(args[0], bus, path, show_properties, &new_line)) != 0)
2793 dbus_message_unref(m);
2794 dbus_message_unref(reply);
2800 dbus_message_unref(m);
2803 dbus_message_unref(reply);
2805 dbus_error_free(&error);
2810 static DBusHandlerResult monitor_filter(DBusConnection *connection, DBusMessage *message, void *data) {
2812 DBusMessage *m = NULL, *reply = NULL;
2817 dbus_error_init(&error);
2819 log_debug("Got D-Bus request: %s.%s() on %s",
2820 dbus_message_get_interface(message),
2821 dbus_message_get_member(message),
2822 dbus_message_get_path(message));
2824 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
2825 log_error("Warning! D-Bus connection terminated.");
2826 dbus_connection_close(connection);
2828 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "UnitNew") ||
2829 dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "UnitRemoved")) {
2830 const char *id, *path;
2832 if (!dbus_message_get_args(message, &error,
2833 DBUS_TYPE_STRING, &id,
2834 DBUS_TYPE_OBJECT_PATH, &path,
2836 log_error("Failed to parse message: %s", bus_error_message(&error));
2837 else if (streq(dbus_message_get_member(message), "UnitNew"))
2838 printf("Unit %s added.\n", id);
2840 printf("Unit %s removed.\n", id);
2842 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobNew") ||
2843 dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
2845 const char *path, *result;
2847 if (!dbus_message_get_args(message, &error,
2848 DBUS_TYPE_UINT32, &id,
2849 DBUS_TYPE_OBJECT_PATH, &path,
2850 DBUS_TYPE_STRING, &result,
2852 log_error("Failed to parse message: %s", bus_error_message(&error));
2853 else if (streq(dbus_message_get_member(message), "JobNew"))
2854 printf("Job %u added.\n", id);
2856 printf("Job %u removed.\n", id);
2859 } else if (dbus_message_is_signal(message, "org.freedesktop.DBus.Properties", "PropertiesChanged")) {
2861 const char *path, *interface, *property = "Id";
2862 DBusMessageIter iter, sub;
2864 path = dbus_message_get_path(message);
2866 if (!dbus_message_get_args(message, &error,
2867 DBUS_TYPE_STRING, &interface,
2868 DBUS_TYPE_INVALID)) {
2869 log_error("Failed to parse message: %s", bus_error_message(&error));
2873 if (!streq(interface, "org.freedesktop.systemd1.Job") &&
2874 !streq(interface, "org.freedesktop.systemd1.Unit"))
2877 if (!(m = dbus_message_new_method_call(
2878 "org.freedesktop.systemd1",
2880 "org.freedesktop.DBus.Properties",
2882 log_error("Could not allocate message.");
2886 if (!dbus_message_append_args(m,
2887 DBUS_TYPE_STRING, &interface,
2888 DBUS_TYPE_STRING, &property,
2889 DBUS_TYPE_INVALID)) {
2890 log_error("Could not append arguments to message.");
2894 if (!(reply = dbus_connection_send_with_reply_and_block(connection, m, -1, &error))) {
2895 log_error("Failed to issue method call: %s", bus_error_message(&error));
2899 if (!dbus_message_iter_init(reply, &iter) ||
2900 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
2901 log_error("Failed to parse reply.");
2905 dbus_message_iter_recurse(&iter, &sub);
2907 if (streq(interface, "org.freedesktop.systemd1.Unit")) {
2910 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
2911 log_error("Failed to parse reply.");
2915 dbus_message_iter_get_basic(&sub, &id);
2916 printf("Unit %s changed.\n", id);
2920 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_UINT32) {
2921 log_error("Failed to parse reply.");
2925 dbus_message_iter_get_basic(&sub, &id);
2926 printf("Job %u changed.\n", id);
2932 dbus_message_unref(m);
2935 dbus_message_unref(reply);
2937 dbus_error_free(&error);
2938 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
2942 dbus_message_unref(m);
2945 dbus_message_unref(reply);
2947 dbus_error_free(&error);
2948 return DBUS_HANDLER_RESULT_NEED_MEMORY;
2951 static int monitor(DBusConnection *bus, char **args, unsigned n) {
2952 DBusMessage *m = NULL, *reply = NULL;
2956 dbus_error_init(&error);
2959 dbus_bus_add_match(bus,
2961 "sender='org.freedesktop.systemd1',"
2962 "interface='org.freedesktop.systemd1.Manager',"
2963 "path='/org/freedesktop/systemd1'",
2966 if (dbus_error_is_set(&error)) {
2967 log_error("Failed to add match: %s", bus_error_message(&error));
2972 dbus_bus_add_match(bus,
2974 "sender='org.freedesktop.systemd1',"
2975 "interface='org.freedesktop.DBus.Properties',"
2976 "member='PropertiesChanged'",
2979 if (dbus_error_is_set(&error)) {
2980 log_error("Failed to add match: %s", bus_error_message(&error));
2986 if (!dbus_connection_add_filter(bus, monitor_filter, NULL, NULL)) {
2987 log_error("Failed to add filter.");
2992 if (!(m = dbus_message_new_method_call(
2993 "org.freedesktop.systemd1",
2994 "/org/freedesktop/systemd1",
2995 "org.freedesktop.systemd1.Manager",
2997 log_error("Could not allocate message.");
3002 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3003 log_error("Failed to issue method call: %s", bus_error_message(&error));
3008 while (dbus_connection_read_write_dispatch(bus, -1))
3015 /* This is slightly dirty, since we don't undo the filter or the matches. */
3018 dbus_message_unref(m);
3021 dbus_message_unref(reply);
3023 dbus_error_free(&error);
3028 static int dump(DBusConnection *bus, char **args, unsigned n) {
3029 DBusMessage *m = NULL, *reply = NULL;
3034 dbus_error_init(&error);
3038 if (!(m = dbus_message_new_method_call(
3039 "org.freedesktop.systemd1",
3040 "/org/freedesktop/systemd1",
3041 "org.freedesktop.systemd1.Manager",
3043 log_error("Could not allocate message.");
3047 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3048 log_error("Failed to issue method call: %s", bus_error_message(&error));
3053 if (!dbus_message_get_args(reply, &error,
3054 DBUS_TYPE_STRING, &text,
3055 DBUS_TYPE_INVALID)) {
3056 log_error("Failed to parse reply: %s", bus_error_message(&error));
3061 fputs(text, stdout);
3067 dbus_message_unref(m);
3070 dbus_message_unref(reply);
3072 dbus_error_free(&error);
3077 static int snapshot(DBusConnection *bus, char **args, unsigned n) {
3078 DBusMessage *m = NULL, *reply = NULL;
3081 const char *name = "", *path, *id;
3082 dbus_bool_t cleanup = FALSE;
3083 DBusMessageIter iter, sub;
3085 *interface = "org.freedesktop.systemd1.Unit",
3088 dbus_error_init(&error);
3090 if (!(m = dbus_message_new_method_call(
3091 "org.freedesktop.systemd1",
3092 "/org/freedesktop/systemd1",
3093 "org.freedesktop.systemd1.Manager",
3094 "CreateSnapshot"))) {
3095 log_error("Could not allocate message.");
3102 if (!dbus_message_append_args(m,
3103 DBUS_TYPE_STRING, &name,
3104 DBUS_TYPE_BOOLEAN, &cleanup,
3105 DBUS_TYPE_INVALID)) {
3106 log_error("Could not append arguments to message.");
3111 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3112 log_error("Failed to issue method call: %s", bus_error_message(&error));
3117 if (!dbus_message_get_args(reply, &error,
3118 DBUS_TYPE_OBJECT_PATH, &path,
3119 DBUS_TYPE_INVALID)) {
3120 log_error("Failed to parse reply: %s", bus_error_message(&error));
3125 dbus_message_unref(m);
3126 if (!(m = dbus_message_new_method_call(
3127 "org.freedesktop.systemd1",
3129 "org.freedesktop.DBus.Properties",
3131 log_error("Could not allocate message.");
3135 if (!dbus_message_append_args(m,
3136 DBUS_TYPE_STRING, &interface,
3137 DBUS_TYPE_STRING, &property,
3138 DBUS_TYPE_INVALID)) {
3139 log_error("Could not append arguments to message.");
3144 dbus_message_unref(reply);
3145 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3146 log_error("Failed to issue method call: %s", bus_error_message(&error));
3151 if (!dbus_message_iter_init(reply, &iter) ||
3152 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3153 log_error("Failed to parse reply.");
3158 dbus_message_iter_recurse(&iter, &sub);
3160 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
3161 log_error("Failed to parse reply.");
3166 dbus_message_iter_get_basic(&sub, &id);
3174 dbus_message_unref(m);
3177 dbus_message_unref(reply);
3179 dbus_error_free(&error);
3184 static int delete_snapshot(DBusConnection *bus, char **args, unsigned n) {
3185 DBusMessage *m = NULL, *reply = NULL;
3193 dbus_error_init(&error);
3195 for (i = 1; i < n; i++) {
3196 const char *path = NULL;
3198 if (!(m = dbus_message_new_method_call(
3199 "org.freedesktop.systemd1",
3200 "/org/freedesktop/systemd1",
3201 "org.freedesktop.systemd1.Manager",
3203 log_error("Could not allocate message.");
3208 if (!dbus_message_append_args(m,
3209 DBUS_TYPE_STRING, &args[i],
3210 DBUS_TYPE_INVALID)) {
3211 log_error("Could not append arguments to message.");
3216 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3217 log_error("Failed to issue method call: %s", bus_error_message(&error));
3222 if (!dbus_message_get_args(reply, &error,
3223 DBUS_TYPE_OBJECT_PATH, &path,
3224 DBUS_TYPE_INVALID)) {
3225 log_error("Failed to parse reply: %s", bus_error_message(&error));
3230 dbus_message_unref(m);
3231 if (!(m = dbus_message_new_method_call(
3232 "org.freedesktop.systemd1",
3234 "org.freedesktop.systemd1.Snapshot",
3236 log_error("Could not allocate message.");
3241 dbus_message_unref(reply);
3242 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3243 log_error("Failed to issue method call: %s", bus_error_message(&error));
3248 dbus_message_unref(m);
3249 dbus_message_unref(reply);
3257 dbus_message_unref(m);
3260 dbus_message_unref(reply);
3262 dbus_error_free(&error);
3267 static int daemon_reload(DBusConnection *bus, char **args, unsigned n) {
3268 DBusMessage *m = NULL, *reply = NULL;
3273 dbus_error_init(&error);
3275 if (arg_action == ACTION_RELOAD)
3277 else if (arg_action == ACTION_REEXEC)
3278 method = "Reexecute";
3280 assert(arg_action == ACTION_SYSTEMCTL);
3283 streq(args[0], "clear-jobs") ||
3284 streq(args[0], "cancel") ? "ClearJobs" :
3285 streq(args[0], "daemon-reexec") ? "Reexecute" :
3286 streq(args[0], "reset-failed") ? "ResetFailed" :
3287 streq(args[0], "halt") ? "Halt" :
3288 streq(args[0], "poweroff") ? "PowerOff" :
3289 streq(args[0], "reboot") ? "Reboot" :
3290 streq(args[0], "kexec") ? "KExec" :
3291 streq(args[0], "exit") ? "Exit" :
3292 /* "daemon-reload" */ "Reload";
3295 if (!(m = dbus_message_new_method_call(
3296 "org.freedesktop.systemd1",
3297 "/org/freedesktop/systemd1",
3298 "org.freedesktop.systemd1.Manager",
3300 log_error("Could not allocate message.");
3304 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3306 if (arg_action != ACTION_SYSTEMCTL && error_is_no_service(&error)) {
3307 /* There's always a fallback possible for
3308 * legacy actions. */
3313 log_error("Failed to issue method call: %s", bus_error_message(&error));
3322 dbus_message_unref(m);
3325 dbus_message_unref(reply);
3327 dbus_error_free(&error);
3332 static int reset_failed(DBusConnection *bus, char **args, unsigned n) {
3333 DBusMessage *m = NULL, *reply = NULL;
3339 dbus_error_init(&error);
3342 return daemon_reload(bus, args, n);
3344 for (i = 1; i < n; i++) {
3346 if (!(m = dbus_message_new_method_call(
3347 "org.freedesktop.systemd1",
3348 "/org/freedesktop/systemd1",
3349 "org.freedesktop.systemd1.Manager",
3350 "ResetFailedUnit"))) {
3351 log_error("Could not allocate message.");
3356 if (!dbus_message_append_args(m,
3357 DBUS_TYPE_STRING, args + i,
3358 DBUS_TYPE_INVALID)) {
3359 log_error("Could not append arguments to message.");
3364 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3365 log_error("Failed to issue method call: %s", bus_error_message(&error));
3370 dbus_message_unref(m);
3371 dbus_message_unref(reply);
3379 dbus_message_unref(m);
3382 dbus_message_unref(reply);
3384 dbus_error_free(&error);
3389 static int show_enviroment(DBusConnection *bus, char **args, unsigned n) {
3390 DBusMessage *m = NULL, *reply = NULL;
3392 DBusMessageIter iter, sub, sub2;
3395 *interface = "org.freedesktop.systemd1.Manager",
3396 *property = "Environment";
3398 dbus_error_init(&error);
3402 if (!(m = dbus_message_new_method_call(
3403 "org.freedesktop.systemd1",
3404 "/org/freedesktop/systemd1",
3405 "org.freedesktop.DBus.Properties",
3407 log_error("Could not allocate message.");
3411 if (!dbus_message_append_args(m,
3412 DBUS_TYPE_STRING, &interface,
3413 DBUS_TYPE_STRING, &property,
3414 DBUS_TYPE_INVALID)) {
3415 log_error("Could not append arguments to message.");
3420 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3421 log_error("Failed to issue method call: %s", bus_error_message(&error));
3426 if (!dbus_message_iter_init(reply, &iter) ||
3427 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3428 log_error("Failed to parse reply.");
3433 dbus_message_iter_recurse(&iter, &sub);
3435 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_ARRAY ||
3436 dbus_message_iter_get_element_type(&sub) != DBUS_TYPE_STRING) {
3437 log_error("Failed to parse reply.");
3442 dbus_message_iter_recurse(&sub, &sub2);
3444 while (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_INVALID) {
3447 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_STRING) {
3448 log_error("Failed to parse reply.");
3453 dbus_message_iter_get_basic(&sub2, &text);
3454 printf("%s\n", text);
3456 dbus_message_iter_next(&sub2);
3463 dbus_message_unref(m);
3466 dbus_message_unref(reply);
3468 dbus_error_free(&error);
3473 static int set_environment(DBusConnection *bus, char **args, unsigned n) {
3474 DBusMessage *m = NULL, *reply = NULL;
3478 DBusMessageIter iter, sub;
3481 dbus_error_init(&error);
3483 method = streq(args[0], "set-environment")
3485 : "UnsetEnvironment";
3487 if (!(m = dbus_message_new_method_call(
3488 "org.freedesktop.systemd1",
3489 "/org/freedesktop/systemd1",
3490 "org.freedesktop.systemd1.Manager",
3493 log_error("Could not allocate message.");
3497 dbus_message_iter_init_append(m, &iter);
3499 if (!dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub)) {
3500 log_error("Could not append arguments to message.");
3505 for (i = 1; i < n; i++)
3506 if (!dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &args[i])) {
3507 log_error("Could not append arguments to message.");
3512 if (!dbus_message_iter_close_container(&iter, &sub)) {
3513 log_error("Could not append arguments to message.");
3518 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3519 log_error("Failed to issue method call: %s", bus_error_message(&error));
3528 dbus_message_unref(m);
3531 dbus_message_unref(reply);
3533 dbus_error_free(&error);
3546 static Hashmap *will_install = NULL, *have_installed = NULL;
3547 static Set *remove_symlinks_to = NULL;
3548 static unsigned n_symlinks = 0;
3550 static void install_info_free(InstallInfo *i) {
3555 strv_free(i->aliases);
3556 strv_free(i->wanted_by);
3560 static void install_info_hashmap_free(Hashmap *m) {
3563 while ((i = hashmap_steal_first(m)))
3564 install_info_free(i);
3569 static int install_info_add(const char *name) {
3573 assert(will_install);
3575 if (!unit_name_is_valid_no_type(name, true)) {
3576 log_warning("Unit name %s is not a valid unit name.", name);
3580 if (hashmap_get(have_installed, name) ||
3581 hashmap_get(will_install, name))
3584 if (!(i = new0(InstallInfo, 1))) {
3589 if (!(i->name = strdup(name))) {
3594 if ((r = hashmap_put(will_install, i->name, i)) < 0)
3601 install_info_free(i);
3606 static int config_parse_also(
3607 const char *filename,
3609 const char *section,
3623 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
3627 if (!(n = strndup(w, l)))
3630 if ((r = install_info_add(n)) < 0) {
3631 log_warning("Cannot install unit %s: %s", n, strerror(-r));
3642 static int mark_symlink_for_removal(const char *p) {
3647 assert(path_is_absolute(p));
3649 if (!remove_symlinks_to)
3652 if (!(n = strdup(p)))
3655 path_kill_slashes(n);
3657 if ((r = set_put(remove_symlinks_to, n)) < 0) {
3659 return r == -EEXIST ? 0 : r;
3665 static int remove_marked_symlinks_fd(int fd, const char *config_path, const char *root, bool *deleted) {
3674 if (!(d = fdopendir(fd))) {
3675 close_nointr_nofail(fd);
3681 while ((de = readdir(d))) {
3682 bool is_dir = false, is_link = false;
3684 if (ignore_file(de->d_name))
3687 if (de->d_type == DT_LNK)
3689 else if (de->d_type == DT_DIR)
3691 else if (de->d_type == DT_UNKNOWN) {
3694 if (fstatat(fd, de->d_name, &st, AT_SYMLINK_NOFOLLOW) < 0) {
3695 log_error("Failed to stat %s/%s: %m", root, de->d_name);
3702 is_link = S_ISLNK(st.st_mode);
3703 is_dir = S_ISDIR(st.st_mode);
3711 if ((nfd = openat(fd, de->d_name, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW)) < 0) {
3712 log_error("Failed to open %s/%s: %m", root, de->d_name);
3719 if (asprintf(&p, "%s/%s", root, de->d_name) < 0) {
3720 log_error("Failed to allocate directory string.");
3721 close_nointr_nofail(nfd);
3726 /* This will close nfd, regardless whether it succeeds or not */
3727 q = remove_marked_symlinks_fd(nfd, config_path, p, deleted);
3733 } else if (is_link) {
3737 if (asprintf(&p, "%s/%s", root, de->d_name) < 0) {
3738 log_error("Failed to allocate symlink string.");
3743 if ((q = readlink_and_make_absolute(p, &dest)) < 0) {
3744 log_error("Cannot read symlink %s: %s", p, strerror(-q));
3752 if ((c = canonicalize_file_name(dest))) {
3753 /* This might fail if the destination
3754 * is already removed */
3760 path_kill_slashes(dest);
3761 if (set_get(remove_symlinks_to, dest)) {
3764 log_info("rm '%s'", p);
3766 if (unlink(p) < 0) {
3767 log_error("Cannot unlink symlink %s: %m", p);
3772 rmdir_parents(p, config_path);
3773 path_kill_slashes(p);
3775 if (!set_get(remove_symlinks_to, p)) {
3777 if ((r = mark_symlink_for_removal(p)) < 0) {
3796 static int remove_marked_symlinks(const char *config_path) {
3800 assert(config_path);
3802 if (set_size(remove_symlinks_to) <= 0)
3805 if ((fd = open(config_path, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW)) < 0)
3812 if ((cfd = dup(fd)) < 0) {
3817 /* This takes possession of cfd and closes it */
3818 if ((q = remove_marked_symlinks_fd(cfd, config_path, config_path, &deleted)) < 0) {
3824 close_nointr_nofail(fd);
3829 static int create_symlink(const char *verb, const char *old_path, const char *new_path) {
3836 if (streq(verb, "enable")) {
3839 mkdir_parents(new_path, 0755);
3841 if (symlink(old_path, new_path) >= 0) {
3844 log_info("ln -s '%s' '%s'", old_path, new_path);
3849 if (errno != EEXIST) {
3850 log_error("Cannot link %s to %s: %m", old_path, new_path);
3854 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3856 if (errno == EINVAL) {
3857 log_error("Cannot link %s to %s, file exists already and is not a symlink.", old_path, new_path);
3861 log_error("readlink() failed: %s", strerror(-r));
3865 if (streq(dest, old_path)) {
3871 log_error("Cannot link %s to %s, symlink exists already and points to %s.", old_path, new_path, dest);
3880 log_info("ln -s '%s' '%s'", old_path, new_path);
3882 if (symlink(old_path, new_path) >= 0)
3885 log_error("Cannot link %s to %s: %m", old_path, new_path);
3888 } else if (streq(verb, "disable")) {
3891 if ((r = mark_symlink_for_removal(old_path)) < 0)
3894 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3895 if (errno == ENOENT)
3898 if (errno == EINVAL) {
3899 log_warning("File %s not a symlink, ignoring.", old_path);
3903 log_error("readlink() failed: %s", strerror(-r));
3907 if (!streq(dest, old_path)) {
3908 log_warning("File %s not a symlink to %s but points to %s, ignoring.", new_path, old_path, dest);
3915 if ((r = mark_symlink_for_removal(new_path)) < 0)
3919 log_info("rm '%s'", new_path);
3921 if (unlink(new_path) >= 0)
3924 log_error("Cannot unlink %s: %m", new_path);
3927 } else if (streq(verb, "is-enabled")) {
3930 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3932 if (errno == ENOENT || errno == EINVAL)
3935 log_error("readlink() failed: %s", strerror(-r));
3939 if (streq(dest, old_path)) {
3947 assert_not_reached("Unknown action.");
3950 static int install_info_symlink_alias(const char *verb, InstallInfo *i, const char *config_path) {
3952 char *alias_path = NULL;
3957 assert(config_path);
3959 STRV_FOREACH(s, i->aliases) {
3962 if (!(alias_path = path_make_absolute(*s, config_path))) {
3963 log_error("Out of memory");
3968 if ((r = create_symlink(verb, i->path, alias_path)) != 0)
3971 if (streq(verb, "disable"))
3972 rmdir_parents(alias_path, config_path);
3982 static int install_info_symlink_wants(const char *verb, InstallInfo *i, const char *config_path) {
3984 char *alias_path = NULL;
3989 assert(config_path);
3991 STRV_FOREACH(s, i->wanted_by) {
3992 if (!unit_name_is_valid_no_type(*s, true)) {
3993 log_error("Invalid name %s.", *s);
4001 if (asprintf(&alias_path, "%s/%s.wants/%s", config_path, *s, i->name) < 0) {
4002 log_error("Out of memory");
4007 if ((r = create_symlink(verb, i->path, alias_path)) != 0)
4010 if (streq(verb, "disable"))
4011 rmdir_parents(alias_path, config_path);
4022 static int install_info_apply(const char *verb, LookupPaths *paths, InstallInfo *i, const char *config_path) {
4024 const ConfigItem items[] = {
4025 { "Alias", config_parse_strv, &i->aliases, "Install" },
4026 { "WantedBy", config_parse_strv, &i->wanted_by, "Install" },
4027 { "Also", config_parse_also, NULL, "Install" },
4029 { NULL, NULL, NULL, NULL }
4033 char *filename = NULL;
4040 STRV_FOREACH(p, paths->unit_path) {
4043 if (!(filename = path_make_absolute(i->name, *p))) {
4044 log_error("Out of memory");
4048 /* Ensure that we don't follow symlinks */
4049 if ((fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOFOLLOW|O_NOCTTY)) >= 0)
4050 if ((f = fdopen(fd, "re")))
4053 if (errno == ELOOP) {
4054 log_error("Refusing to operate on symlinks, please pass unit names or absolute paths to unit files.");
4059 if (errno != ENOENT) {
4060 log_error("Failed to open %s: %m", filename);
4070 #if (defined(TARGET_FEDORA) || defined(TARGET_MANDRIVA)) && defined (HAVE_SYSV_COMPAT)
4072 if (endswith(i->name, ".service")) {
4076 if (asprintf(&sysv, SYSTEM_SYSVINIT_PATH "/%s", i->name) < 0) {
4077 log_error("Out of memory");
4081 sysv[strlen(sysv) - sizeof(".service") + 1] = 0;
4082 exists = access(sysv, F_OK) >= 0;
4088 const char *argv[] = {
4095 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", i->name);
4097 argv[1] = file_name_from_path(sysv);
4099 streq(verb, "enable") ? "on" :
4100 streq(verb, "disable") ? "off" : "--level=3";
4102 log_info("Executing %s %s %s", argv[0], argv[1], strempty(argv[2]));
4104 if ((pid = fork()) < 0) {
4105 log_error("Failed to fork: %m");
4108 } else if (pid == 0) {
4109 execv(argv[0], (char**) argv);
4110 _exit(EXIT_FAILURE);
4115 if ((r = wait_for_terminate(pid, &status)) < 0)
4118 if (status.si_code == CLD_EXITED) {
4120 if (streq(verb, "is-enabled"))
4121 return status.si_status == 0 ? 1 : 0;
4123 if (status.si_status == 0)
4126 return status.si_status == 0 ? 0 : -EINVAL;
4137 log_error("Couldn't find %s.", i->name);
4143 if ((r = config_parse(filename, f, NULL, items, true, i)) < 0) {
4148 n_symlinks += strv_length(i->aliases);
4149 n_symlinks += strv_length(i->wanted_by);
4153 if ((r = install_info_symlink_alias(verb, i, config_path)) != 0)
4156 if ((r = install_info_symlink_wants(verb, i, config_path)) != 0)
4159 if ((r = mark_symlink_for_removal(filename)) < 0)
4162 if ((r = remove_marked_symlinks(config_path)) < 0)
4168 static char *get_config_path(void) {
4170 if (arg_user && arg_global)
4171 return strdup(USER_CONFIG_UNIT_PATH);
4176 if (user_config_home(&p) < 0)
4182 return strdup(SYSTEM_CONFIG_UNIT_PATH);
4185 static int enable_unit(DBusConnection *bus, char **args, unsigned n) {
4189 char *config_path = NULL;
4192 const char *verb = args[0];
4194 dbus_error_init(&error);
4197 if ((r = lookup_paths_init(&paths, arg_user ? MANAGER_USER : MANAGER_SYSTEM)) < 0) {
4198 log_error("Failed to determine lookup paths: %s", strerror(-r));
4202 if (!(config_path = get_config_path())) {
4203 log_error("Failed to determine config path");
4208 will_install = hashmap_new(string_hash_func, string_compare_func);
4209 have_installed = hashmap_new(string_hash_func, string_compare_func);
4211 if (!will_install || !have_installed) {
4212 log_error("Failed to allocate unit sets.");
4217 if (!arg_defaults && streq(verb, "disable"))
4218 if (!(remove_symlinks_to = set_new(string_hash_func, string_compare_func))) {
4219 log_error("Failed to allocate symlink sets.");
4224 for (j = 1; j < n; j++)
4225 if ((r = install_info_add(args[j])) < 0) {
4226 log_warning("Cannot install unit %s: %s", args[j], strerror(-r));
4232 while ((i = hashmap_first(will_install))) {
4235 assert_se(hashmap_move_one(have_installed, will_install, i->name) == 0);
4237 if ((q = install_info_apply(verb, &paths, i, config_path)) != 0) {
4245 /* In test mode and found something */
4251 if (streq(verb, "is-enabled"))
4252 r = r > 0 ? 0 : -ENOENT;
4254 if (n_symlinks <= 0)
4255 log_warning("Unit files contain no applicable installation information. Ignoring.");
4258 /* Don't try to reload anything if the user asked us to not do this */
4260 /* Don't try to reload anything when updating a unit globally */
4262 /* Don't try to reload anything if we are called for system changes but the system wasn't booted with systemd */
4263 (arg_user || sd_booted() > 0) &&
4264 /* Don't try to reload anything if we are running in a chroot environment */
4265 (arg_user || running_in_chroot() <= 0) ) {
4268 if ((q = daemon_reload(bus, args, n)) < 0)
4274 install_info_hashmap_free(will_install);
4275 install_info_hashmap_free(have_installed);
4277 set_free_free(remove_symlinks_to);
4279 lookup_paths_free(&paths);
4286 static int systemctl_help(void) {
4288 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4289 "Send control commands to or query the systemd manager.\n\n"
4290 " -h --help Show this help\n"
4291 " --version Show package version\n"
4292 " -t --type=TYPE List only units of a particular type\n"
4293 " -p --property=NAME Show only properties by this name\n"
4294 " -a --all Show all units/properties, including dead/empty ones\n"
4295 " --failed Show only failed units\n"
4296 " --full Don't ellipsize unit names on output\n"
4297 " --fail When queueing a new job, fail if conflicting jobs are\n"
4299 " --ignore-dependencies\n"
4300 " When queueing a new job, ignore all its dependencies\n"
4301 " --kill-mode=MODE How to send signal\n"
4302 " --kill-who=WHO Who to send signal to\n"
4303 " -s --signal=SIGNAL Which signal to send\n"
4304 " -H --host=[user@]host\n"
4305 " Show information for remote host\n"
4306 " -P --privileged Acquire privileges before execution\n"
4307 " -q --quiet Suppress output\n"
4308 " --no-block Do not wait until operation finished\n"
4309 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4310 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4312 " --no-pager Do not pipe output into a pager.\n"
4313 " --no-ask-password\n"
4314 " Do not ask for system passwords\n"
4315 " --order When generating graph for dot, show only order\n"
4316 " --require When generating graph for dot, show only requirement\n"
4317 " --system Connect to system manager\n"
4318 " --user Connect to user service manager\n"
4319 " --global Enable/disable unit files globally\n"
4320 " -f --force When enabling unit files, override existing symlinks\n"
4321 " When shutting down, execute action immediately\n"
4322 " --defaults When disabling unit files, remove default symlinks only\n\n"
4324 " list-units List units\n"
4325 " start [NAME...] Start (activate) one or more units\n"
4326 " stop [NAME...] Stop (deactivate) one or more units\n"
4327 " reload [NAME...] Reload one or more units\n"
4328 " restart [NAME...] Start or restart one or more units\n"
4329 " try-restart [NAME...] Restart one or more units if active\n"
4330 " reload-or-restart [NAME...] Reload one or more units is possible,\n"
4331 " otherwise start or restart\n"
4332 " reload-or-try-restart [NAME...] Reload one or more units is possible,\n"
4333 " otherwise restart if active\n"
4334 " isolate [NAME] Start one unit and stop all others\n"
4335 " kill [NAME...] Send signal to processes of a unit\n"
4336 " is-active [NAME...] Check whether units are active\n"
4337 " status [NAME...|PID...] Show runtime status of one or more units\n"
4338 " show [NAME...|JOB...] Show properties of one or more\n"
4339 " units/jobs or the manager\n"
4340 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4342 " enable [NAME...] Enable one or more unit files\n"
4343 " disable [NAME...] Disable one or more unit files\n"
4344 " is-enabled [NAME...] Check whether unit files are enabled\n"
4345 " load [NAME...] Load one or more units\n"
4346 " list-jobs List jobs\n"
4347 " cancel [JOB...] Cancel all, one, or more jobs\n"
4348 " monitor Monitor unit/job changes\n"
4349 " dump Dump server status\n"
4350 " dot Dump dependency graph for dot(1)\n"
4351 " snapshot [NAME] Create a snapshot\n"
4352 " delete [NAME...] Remove one or more snapshots\n"
4353 " daemon-reload Reload systemd manager configuration\n"
4354 " daemon-reexec Reexecute systemd manager\n"
4355 " show-environment Dump environment\n"
4356 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4357 " unset-environment [NAME...] Unset one or more environment variables\n"
4358 " default Enter system default mode\n"
4359 " rescue Enter system rescue mode\n"
4360 " emergency Enter system emergency mode\n"
4361 " halt Shut down and halt the system\n"
4362 " poweroff Shut down and power-off the system\n"
4363 " reboot Shut down and reboot the system\n"
4364 " kexec Shut down and reboot the system with kexec\n"
4365 " exit Ask for user instance termination\n",
4366 program_invocation_short_name);
4371 static int halt_help(void) {
4373 printf("%s [OPTIONS...]\n\n"
4374 "%s the system.\n\n"
4375 " --help Show this help\n"
4376 " --halt Halt the machine\n"
4377 " -p --poweroff Switch off the machine\n"
4378 " --reboot Reboot the machine\n"
4379 " -f --force Force immediate halt/power-off/reboot\n"
4380 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4381 " -d --no-wtmp Don't write wtmp record\n"
4382 " -n --no-sync Don't sync before halt/power-off/reboot\n"
4383 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4384 program_invocation_short_name,
4385 arg_action == ACTION_REBOOT ? "Reboot" :
4386 arg_action == ACTION_POWEROFF ? "Power off" :
4392 static int shutdown_help(void) {
4394 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4395 "Shut down the system.\n\n"
4396 " --help Show this help\n"
4397 " -H --halt Halt the machine\n"
4398 " -P --poweroff Power-off the machine\n"
4399 " -r --reboot Reboot the machine\n"
4400 " -h Equivalent to --poweroff, overriden by --halt\n"
4401 " -k Don't halt/power-off/reboot, just send warnings\n"
4402 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4403 " -c Cancel a pending shutdown\n",
4404 program_invocation_short_name);
4409 static int telinit_help(void) {
4411 printf("%s [OPTIONS...] {COMMAND}\n\n"
4412 "Send control commands to the init daemon.\n\n"
4413 " --help Show this help\n"
4414 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4416 " 0 Power-off the machine\n"
4417 " 6 Reboot the machine\n"
4418 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4419 " 1, s, S Enter rescue mode\n"
4420 " q, Q Reload init daemon configuration\n"
4421 " u, U Reexecute init daemon\n",
4422 program_invocation_short_name);
4427 static int runlevel_help(void) {
4429 printf("%s [OPTIONS...]\n\n"
4430 "Prints the previous and current runlevel of the init system.\n\n"
4431 " --help Show this help\n",
4432 program_invocation_short_name);
4437 static int systemctl_parse_argv(int argc, char *argv[]) {
4441 ARG_IGNORE_DEPENDENCIES,
4456 ARG_NO_ASK_PASSWORD,
4460 static const struct option options[] = {
4461 { "help", no_argument, NULL, 'h' },
4462 { "version", no_argument, NULL, ARG_VERSION },
4463 { "type", required_argument, NULL, 't' },
4464 { "property", required_argument, NULL, 'p' },
4465 { "all", no_argument, NULL, 'a' },
4466 { "failed", no_argument, NULL, ARG_FAILED },
4467 { "full", no_argument, NULL, ARG_FULL },
4468 { "fail", no_argument, NULL, ARG_FAIL },
4469 { "ignore-dependencies", no_argument, NULL, ARG_IGNORE_DEPENDENCIES },
4470 { "user", no_argument, NULL, ARG_USER },
4471 { "system", no_argument, NULL, ARG_SYSTEM },
4472 { "global", no_argument, NULL, ARG_GLOBAL },
4473 { "no-block", no_argument, NULL, ARG_NO_BLOCK },
4474 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
4475 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4476 { "quiet", no_argument, NULL, 'q' },
4477 { "order", no_argument, NULL, ARG_ORDER },
4478 { "require", no_argument, NULL, ARG_REQUIRE },
4479 { "force", no_argument, NULL, 'f' },
4480 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
4481 { "defaults", no_argument, NULL, ARG_DEFAULTS },
4482 { "kill-mode", required_argument, NULL, ARG_KILL_MODE },
4483 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
4484 { "signal", required_argument, NULL, 's' },
4485 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
4486 { "host", required_argument, NULL, 'H' },
4487 { "privileged",no_argument, NULL, 'P' },
4488 { NULL, 0, NULL, 0 }
4496 /* Only when running as systemctl we ask for passwords */
4497 arg_ask_password = true;
4499 while ((c = getopt_long(argc, argv, "ht:p:aqfs:H:P", options, NULL)) >= 0) {
4508 puts(PACKAGE_STRING);
4510 puts(SYSTEMD_FEATURES);
4520 if (!(l = strv_append(arg_property, optarg)))
4523 strv_free(arg_property);
4526 /* If the user asked for a particular
4527 * property, show it to him, even if it is
4538 arg_job_mode = "fail";
4541 case ARG_IGNORE_DEPENDENCIES:
4542 arg_job_mode = "ignore-dependencies";
4554 arg_no_block = true;
4558 arg_no_pager = true;
4566 arg_dot = DOT_ORDER;
4570 arg_dot = DOT_REQUIRE;
4590 arg_no_reload = true;
4599 arg_defaults = true;
4603 arg_kill_who = optarg;
4607 arg_kill_mode = optarg;
4611 if ((arg_signal = signal_from_string_try_harder(optarg)) < 0) {
4612 log_error("Failed to parse signal string %s.", optarg);
4617 case ARG_NO_ASK_PASSWORD:
4618 arg_ask_password = false;
4622 arg_transport = TRANSPORT_POLKIT;
4626 arg_transport = TRANSPORT_SSH;
4634 log_error("Unknown option code %c", c);
4639 if (arg_transport != TRANSPORT_NORMAL && arg_user) {
4640 log_error("Cannot access user instance remotely.");
4647 static int halt_parse_argv(int argc, char *argv[]) {
4656 static const struct option options[] = {
4657 { "help", no_argument, NULL, ARG_HELP },
4658 { "halt", no_argument, NULL, ARG_HALT },
4659 { "poweroff", no_argument, NULL, 'p' },
4660 { "reboot", no_argument, NULL, ARG_REBOOT },
4661 { "force", no_argument, NULL, 'f' },
4662 { "wtmp-only", no_argument, NULL, 'w' },
4663 { "no-wtmp", no_argument, NULL, 'd' },
4664 { "no-sync", no_argument, NULL, 'n' },
4665 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4666 { NULL, 0, NULL, 0 }
4674 if (utmp_get_runlevel(&runlevel, NULL) >= 0)
4675 if (runlevel == '0' || runlevel == '6')
4676 arg_immediate = true;
4678 while ((c = getopt_long(argc, argv, "pfwdnih", options, NULL)) >= 0) {
4686 arg_action = ACTION_HALT;
4690 if (arg_action != ACTION_REBOOT)
4691 arg_action = ACTION_POWEROFF;
4695 arg_action = ACTION_REBOOT;
4699 arg_immediate = true;
4720 /* Compatibility nops */
4727 log_error("Unknown option code %c", c);
4732 if (optind < argc) {
4733 log_error("Too many arguments.");
4740 static int parse_time_spec(const char *t, usec_t *_u) {
4744 if (streq(t, "now"))
4746 else if (t[0] == '+') {
4749 if (safe_atou64(t + 1, &u) < 0)
4752 *_u = now(CLOCK_REALTIME) + USEC_PER_MINUTE * u;
4761 hour = strtol(t, &e, 10);
4762 if (errno != 0 || *e != ':' || hour < 0 || hour > 23)
4765 minute = strtol(e+1, &e, 10);
4766 if (errno != 0 || *e != 0 || minute < 0 || minute > 59)
4769 n = now(CLOCK_REALTIME);
4770 s = (time_t) (n / USEC_PER_SEC);
4773 assert_se(localtime_r(&s, &tm));
4775 tm.tm_hour = (int) hour;
4776 tm.tm_min = (int) minute;
4779 assert_se(s = mktime(&tm));
4781 *_u = (usec_t) s * USEC_PER_SEC;
4784 *_u += USEC_PER_DAY;
4790 static bool kexec_loaded(void) {
4791 bool loaded = false;
4794 if (read_one_line_file("/sys/kernel/kexec_loaded", &s) >= 0) {
4802 static int shutdown_parse_argv(int argc, char *argv[]) {
4809 static const struct option options[] = {
4810 { "help", no_argument, NULL, ARG_HELP },
4811 { "halt", no_argument, NULL, 'H' },
4812 { "poweroff", no_argument, NULL, 'P' },
4813 { "reboot", no_argument, NULL, 'r' },
4814 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4815 { NULL, 0, NULL, 0 }
4823 while ((c = getopt_long(argc, argv, "HPrhkt:afFc", options, NULL)) >= 0) {
4831 arg_action = ACTION_HALT;
4835 arg_action = ACTION_POWEROFF;
4840 arg_action = ACTION_KEXEC;
4842 arg_action = ACTION_REBOOT;
4846 if (arg_action != ACTION_HALT)
4847 arg_action = ACTION_POWEROFF;
4860 /* Compatibility nops */
4864 arg_action = ACTION_CANCEL_SHUTDOWN;
4871 log_error("Unknown option code %c", c);
4876 if (argc > optind) {
4877 if ((r = parse_time_spec(argv[optind], &arg_when)) < 0) {
4878 log_error("Failed to parse time specification: %s", argv[optind]);
4882 arg_when = now(CLOCK_REALTIME) + USEC_PER_MINUTE;
4884 /* We skip the time argument */
4885 if (argc > optind + 1)
4886 arg_wall = argv + optind + 1;
4893 static int telinit_parse_argv(int argc, char *argv[]) {
4900 static const struct option options[] = {
4901 { "help", no_argument, NULL, ARG_HELP },
4902 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4903 { NULL, 0, NULL, 0 }
4906 static const struct {
4910 { '0', ACTION_POWEROFF },
4911 { '6', ACTION_REBOOT },
4912 { '1', ACTION_RESCUE },
4913 { '2', ACTION_RUNLEVEL2 },
4914 { '3', ACTION_RUNLEVEL3 },
4915 { '4', ACTION_RUNLEVEL4 },
4916 { '5', ACTION_RUNLEVEL5 },
4917 { 's', ACTION_RESCUE },
4918 { 'S', ACTION_RESCUE },
4919 { 'q', ACTION_RELOAD },
4920 { 'Q', ACTION_RELOAD },
4921 { 'u', ACTION_REEXEC },
4922 { 'U', ACTION_REEXEC }
4931 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
4946 log_error("Unknown option code %c", c);
4951 if (optind >= argc) {
4956 if (optind + 1 < argc) {
4957 log_error("Too many arguments.");
4961 if (strlen(argv[optind]) != 1) {
4962 log_error("Expected single character argument.");
4966 for (i = 0; i < ELEMENTSOF(table); i++)
4967 if (table[i].from == argv[optind][0])
4970 if (i >= ELEMENTSOF(table)) {
4971 log_error("Unknown command %s.", argv[optind]);
4975 arg_action = table[i].to;
4982 static int runlevel_parse_argv(int argc, char *argv[]) {
4988 static const struct option options[] = {
4989 { "help", no_argument, NULL, ARG_HELP },
4990 { NULL, 0, NULL, 0 }
4998 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5009 log_error("Unknown option code %c", c);
5014 if (optind < argc) {
5015 log_error("Too many arguments.");
5022 static int parse_argv(int argc, char *argv[]) {
5026 if (program_invocation_short_name) {
5028 if (strstr(program_invocation_short_name, "halt")) {
5029 arg_action = ACTION_HALT;
5030 return halt_parse_argv(argc, argv);
5031 } else if (strstr(program_invocation_short_name, "poweroff")) {
5032 arg_action = ACTION_POWEROFF;
5033 return halt_parse_argv(argc, argv);
5034 } else if (strstr(program_invocation_short_name, "reboot")) {
5036 arg_action = ACTION_KEXEC;
5038 arg_action = ACTION_REBOOT;
5039 return halt_parse_argv(argc, argv);
5040 } else if (strstr(program_invocation_short_name, "shutdown")) {
5041 arg_action = ACTION_POWEROFF;
5042 return shutdown_parse_argv(argc, argv);
5043 } else if (strstr(program_invocation_short_name, "init")) {
5045 if (sd_booted() > 0) {
5046 arg_action = ACTION_INVALID;
5047 return telinit_parse_argv(argc, argv);
5049 /* Hmm, so some other init system is
5050 * running, we need to forward this
5051 * request to it. For now we simply
5052 * guess that it is Upstart. */
5054 execv("/lib/upstart/telinit", argv);
5056 log_error("Couldn't find an alternative telinit implementation to spawn.");
5060 } else if (strstr(program_invocation_short_name, "runlevel")) {
5061 arg_action = ACTION_RUNLEVEL;
5062 return runlevel_parse_argv(argc, argv);
5066 arg_action = ACTION_SYSTEMCTL;
5067 return systemctl_parse_argv(argc, argv);
5070 static int action_to_runlevel(void) {
5072 static const char table[_ACTION_MAX] = {
5073 [ACTION_HALT] = '0',
5074 [ACTION_POWEROFF] = '0',
5075 [ACTION_REBOOT] = '6',
5076 [ACTION_RUNLEVEL2] = '2',
5077 [ACTION_RUNLEVEL3] = '3',
5078 [ACTION_RUNLEVEL4] = '4',
5079 [ACTION_RUNLEVEL5] = '5',
5080 [ACTION_RESCUE] = '1'
5083 assert(arg_action < _ACTION_MAX);
5085 return table[arg_action];
5088 static int talk_upstart(void) {
5089 DBusMessage *m = NULL, *reply = NULL;
5091 int previous, rl, r;
5093 env1_buf[] = "RUNLEVEL=X",
5094 env2_buf[] = "PREVLEVEL=X";
5095 char *env1 = env1_buf, *env2 = env2_buf;
5096 const char *emit = "runlevel";
5097 dbus_bool_t b_false = FALSE;
5098 DBusMessageIter iter, sub;
5099 DBusConnection *bus;
5101 dbus_error_init(&error);
5103 if (!(rl = action_to_runlevel()))
5106 if (utmp_get_runlevel(&previous, NULL) < 0)
5109 if (!(bus = dbus_connection_open_private("unix:abstract=/com/ubuntu/upstart", &error))) {
5110 if (dbus_error_has_name(&error, DBUS_ERROR_NO_SERVER)) {
5115 log_error("Failed to connect to Upstart bus: %s", bus_error_message(&error));
5120 if ((r = bus_check_peercred(bus)) < 0) {
5121 log_error("Failed to verify owner of bus.");
5125 if (!(m = dbus_message_new_method_call(
5126 "com.ubuntu.Upstart",
5127 "/com/ubuntu/Upstart",
5128 "com.ubuntu.Upstart0_6",
5131 log_error("Could not allocate message.");
5136 dbus_message_iter_init_append(m, &iter);
5138 env1_buf[sizeof(env1_buf)-2] = rl;
5139 env2_buf[sizeof(env2_buf)-2] = previous;
5141 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &emit) ||
5142 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub) ||
5143 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env1) ||
5144 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env2) ||
5145 !dbus_message_iter_close_container(&iter, &sub) ||
5146 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b_false)) {
5147 log_error("Could not append arguments to message.");
5152 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
5154 if (error_is_no_service(&error)) {
5159 log_error("Failed to issue method call: %s", bus_error_message(&error));
5168 dbus_message_unref(m);
5171 dbus_message_unref(reply);
5174 dbus_connection_flush(bus);
5175 dbus_connection_close(bus);
5176 dbus_connection_unref(bus);
5179 dbus_error_free(&error);
5184 static int talk_initctl(void) {
5185 struct init_request request;
5189 if (!(rl = action_to_runlevel()))
5193 request.magic = INIT_MAGIC;
5194 request.sleeptime = 0;
5195 request.cmd = INIT_CMD_RUNLVL;
5196 request.runlevel = rl;
5198 if ((fd = open(INIT_FIFO, O_WRONLY|O_NDELAY|O_CLOEXEC|O_NOCTTY)) < 0) {
5200 if (errno == ENOENT)
5203 log_error("Failed to open "INIT_FIFO": %m");
5208 r = loop_write(fd, &request, sizeof(request), false) != sizeof(request);
5209 close_nointr_nofail(fd);
5212 log_error("Failed to write to "INIT_FIFO": %m");
5213 return errno ? -errno : -EIO;
5219 static int systemctl_main(DBusConnection *bus, int argc, char *argv[], DBusError *error) {
5221 static const struct {
5229 int (* const dispatch)(DBusConnection *bus, char **args, unsigned n);
5231 { "list-units", LESS, 1, list_units },
5232 { "list-jobs", EQUAL, 1, list_jobs },
5233 { "clear-jobs", EQUAL, 1, daemon_reload },
5234 { "load", MORE, 2, load_unit },
5235 { "cancel", MORE, 2, cancel_job },
5236 { "start", MORE, 2, start_unit },
5237 { "stop", MORE, 2, start_unit },
5238 { "reload", MORE, 2, start_unit },
5239 { "restart", MORE, 2, start_unit },
5240 { "try-restart", MORE, 2, start_unit },
5241 { "reload-or-restart", MORE, 2, start_unit },
5242 { "reload-or-try-restart", MORE, 2, start_unit },
5243 { "force-reload", MORE, 2, start_unit }, /* For compatibility with SysV */
5244 { "condreload", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5245 { "condrestart", MORE, 2, start_unit }, /* For compatibility with RH */
5246 { "isolate", EQUAL, 2, start_unit },
5247 { "kill", MORE, 2, kill_unit },
5248 { "is-active", MORE, 2, check_unit },
5249 { "check", MORE, 2, check_unit },
5250 { "show", MORE, 1, show },
5251 { "status", MORE, 2, show },
5252 { "monitor", EQUAL, 1, monitor },
5253 { "dump", EQUAL, 1, dump },
5254 { "dot", EQUAL, 1, dot },
5255 { "snapshot", LESS, 2, snapshot },
5256 { "delete", MORE, 2, delete_snapshot },
5257 { "daemon-reload", EQUAL, 1, daemon_reload },
5258 { "daemon-reexec", EQUAL, 1, daemon_reload },
5259 { "show-environment", EQUAL, 1, show_enviroment },
5260 { "set-environment", MORE, 2, set_environment },
5261 { "unset-environment", MORE, 2, set_environment },
5262 { "halt", EQUAL, 1, start_special },
5263 { "poweroff", EQUAL, 1, start_special },
5264 { "reboot", EQUAL, 1, start_special },
5265 { "kexec", EQUAL, 1, start_special },
5266 { "default", EQUAL, 1, start_special },
5267 { "rescue", EQUAL, 1, start_special },
5268 { "emergency", EQUAL, 1, start_special },
5269 { "exit", EQUAL, 1, start_special },
5270 { "reset-failed", MORE, 1, reset_failed },
5271 { "enable", MORE, 2, enable_unit },
5272 { "disable", MORE, 2, enable_unit },
5273 { "is-enabled", MORE, 2, enable_unit }
5283 left = argc - optind;
5286 /* Special rule: no arguments means "list-units" */
5289 if (streq(argv[optind], "help")) {
5294 for (i = 0; i < ELEMENTSOF(verbs); i++)
5295 if (streq(argv[optind], verbs[i].verb))
5298 if (i >= ELEMENTSOF(verbs)) {
5299 log_error("Unknown operation %s", argv[optind]);
5304 switch (verbs[i].argc_cmp) {
5307 if (left != verbs[i].argc) {
5308 log_error("Invalid number of arguments.");
5315 if (left < verbs[i].argc) {
5316 log_error("Too few arguments.");
5323 if (left > verbs[i].argc) {
5324 log_error("Too many arguments.");
5331 assert_not_reached("Unknown comparison operator.");
5334 /* Require a bus connection for all operations but
5336 if (!streq(verbs[i].verb, "enable") &&
5337 !streq(verbs[i].verb, "disable") &&
5339 log_error("Failed to get D-Bus connection: %s", error->message);
5343 return verbs[i].dispatch(bus, argv + optind, left);
5346 static int send_shutdownd(usec_t t, char mode, bool warn, const char *message) {
5348 struct msghdr msghdr;
5350 union sockaddr_union sockaddr;
5351 struct shutdownd_command c;
5359 strncpy(c.wall_message, message, sizeof(c.wall_message));
5361 if ((fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0)
5365 sockaddr.sa.sa_family = AF_UNIX;
5366 sockaddr.un.sun_path[0] = 0;
5367 strncpy(sockaddr.un.sun_path, "/dev/.run/systemd/shutdownd", sizeof(sockaddr.un.sun_path));
5370 iovec.iov_base = (char*) &c;
5371 iovec.iov_len = sizeof(c);
5374 msghdr.msg_name = &sockaddr;
5375 msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + sizeof("/dev/.run/systemd/shutdownd") - 1;
5377 msghdr.msg_iov = &iovec;
5378 msghdr.msg_iovlen = 1;
5380 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0) {
5381 close_nointr_nofail(fd);
5385 close_nointr_nofail(fd);
5389 static int reload_with_fallback(DBusConnection *bus) {
5392 /* First, try systemd via D-Bus. */
5393 if (daemon_reload(bus, NULL, 0) > 0)
5397 /* Nothing else worked, so let's try signals */
5398 assert(arg_action == ACTION_RELOAD || arg_action == ACTION_REEXEC);
5400 if (kill(1, arg_action == ACTION_RELOAD ? SIGHUP : SIGTERM) < 0) {
5401 log_error("kill() failed: %m");
5408 static int start_with_fallback(DBusConnection *bus) {
5411 /* First, try systemd via D-Bus. */
5412 if (start_unit(bus, NULL, 0) >= 0)
5416 /* Hmm, talking to systemd via D-Bus didn't work. Then
5417 * let's try to talk to Upstart via D-Bus. */
5418 if (talk_upstart() > 0)
5421 /* Nothing else worked, so let's try
5423 if (talk_initctl() > 0)
5426 log_error("Failed to talk to init daemon.");
5430 warn_wall(arg_action);
5434 static int halt_main(DBusConnection *bus) {
5437 if (geteuid() != 0) {
5438 log_error("Must be root.");
5444 char date[FORMAT_TIMESTAMP_MAX];
5446 m = strv_join(arg_wall, " ");
5447 r = send_shutdownd(arg_when,
5448 arg_action == ACTION_HALT ? 'H' :
5449 arg_action == ACTION_POWEROFF ? 'P' :
5456 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r));
5458 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
5459 format_timestamp(date, sizeof(date), arg_when));
5464 if (!arg_dry && !arg_immediate)
5465 return start_with_fallback(bus);
5468 if (sd_booted() > 0)
5469 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
5470 else if ((r = utmp_put_shutdown(0)) < 0)
5471 log_warning("Failed to write utmp record: %s", strerror(-r));
5480 /* Make sure C-A-D is handled by the kernel from this
5482 reboot(RB_ENABLE_CAD);
5484 switch (arg_action) {
5487 log_info("Halting.");
5488 reboot(RB_HALT_SYSTEM);
5491 case ACTION_POWEROFF:
5492 log_info("Powering off.");
5493 reboot(RB_POWER_OFF);
5497 log_info("Rebooting.");
5498 reboot(RB_AUTOBOOT);
5502 assert_not_reached("Unknown halt action.");
5505 /* We should never reach this. */
5509 static int runlevel_main(void) {
5510 int r, runlevel, previous;
5512 if ((r = utmp_get_runlevel(&runlevel, &previous)) < 0) {
5513 printf("unknown\n");
5518 previous <= 0 ? 'N' : previous,
5519 runlevel <= 0 ? 'N' : runlevel);
5524 static void pager_open(void) {
5532 if (!on_tty() || arg_no_pager)
5535 if ((pager = getenv("PAGER")))
5536 if (!*pager || streq(pager, "cat"))
5539 /* Determine and cache number of columns before we spawn the
5540 * pager so that we get the value from the actual tty */
5544 log_error("Failed to create pager pipe: %m");
5548 parent_pid = getpid();
5551 if (pager_pid < 0) {
5552 log_error("Failed to fork pager: %m");
5557 /* In the child start the pager */
5558 if (pager_pid == 0) {
5560 dup2(fd[0], STDIN_FILENO);
5563 setenv("LESS", "FRSX", 0);
5565 /* Make sure the pager goes away when the parent dies */
5566 if (prctl(PR_SET_PDEATHSIG, SIGTERM) < 0)
5567 _exit(EXIT_FAILURE);
5569 /* Check whether our parent died before we were able
5570 * to set the death signal */
5571 if (getppid() != parent_pid)
5572 _exit(EXIT_SUCCESS);
5575 execlp(pager, pager, NULL);
5576 execl("/bin/sh", "sh", "-c", pager, NULL);
5578 /* Debian's alternatives command for pagers is
5579 * called 'pager'. Note that we do not call
5580 * sensible-pagers here, since that is just a
5581 * shell script that implements a logic that
5582 * is similar to this one anyway, but is
5583 * Debian-specific. */
5584 execlp("pager", "pager", NULL);
5586 execlp("less", "less", NULL);
5587 execlp("more", "more", NULL);
5590 log_error("Unable to execute pager: %m");
5591 _exit(EXIT_FAILURE);
5594 /* Return in the parent */
5595 if (dup2(fd[1], STDOUT_FILENO) < 0)
5596 log_error("Failed to duplicate pager pipe: %m");
5601 static void pager_close(void) {
5607 /* Inform pager that we are done */
5609 kill(pager_pid, SIGCONT);
5610 wait_for_terminate(pager_pid, &dummy);
5614 static void agent_close(void) {
5620 /* Inform agent that we are done */
5621 kill(agent_pid, SIGTERM);
5622 kill(agent_pid, SIGCONT);
5623 wait_for_terminate(agent_pid, &dummy);
5627 int main(int argc, char*argv[]) {
5628 int r, retval = EXIT_FAILURE;
5629 DBusConnection *bus = NULL;
5632 dbus_error_init(&error);
5634 log_parse_environment();
5637 if ((r = parse_argv(argc, argv)) < 0)
5640 retval = EXIT_SUCCESS;
5644 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
5645 * let's shortcut this */
5646 if (arg_action == ACTION_RUNLEVEL) {
5647 r = runlevel_main();
5648 retval = r < 0 ? EXIT_FAILURE : r;
5652 if (arg_transport == TRANSPORT_NORMAL)
5653 bus_connect(arg_user ? DBUS_BUS_SESSION : DBUS_BUS_SYSTEM, &bus, &private_bus, &error);
5654 else if (arg_transport == TRANSPORT_POLKIT) {
5655 bus_connect_system_polkit(&bus, &error);
5656 private_bus = false;
5657 } else if (arg_transport == TRANSPORT_SSH) {
5658 bus_connect_system_ssh(NULL, arg_host, &bus, &error);
5659 private_bus = false;
5661 assert_not_reached("Uh, invalid transport...");
5663 switch (arg_action) {
5665 case ACTION_SYSTEMCTL:
5666 r = systemctl_main(bus, argc, argv, &error);
5670 case ACTION_POWEROFF:
5676 case ACTION_RUNLEVEL2:
5677 case ACTION_RUNLEVEL3:
5678 case ACTION_RUNLEVEL4:
5679 case ACTION_RUNLEVEL5:
5681 case ACTION_EMERGENCY:
5682 case ACTION_DEFAULT:
5683 r = start_with_fallback(bus);
5688 r = reload_with_fallback(bus);
5691 case ACTION_CANCEL_SHUTDOWN:
5692 r = send_shutdownd(0, 0, false, NULL);
5695 case ACTION_INVALID:
5696 case ACTION_RUNLEVEL:
5698 assert_not_reached("Unknown action");
5701 retval = r < 0 ? EXIT_FAILURE : r;
5706 dbus_connection_flush(bus);
5707 dbus_connection_close(bus);
5708 dbus_connection_unref(bus);
5711 dbus_error_free(&error);
5715 strv_free(arg_property);