1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <dbus/dbus.h>
28 #include <sys/types.h>
35 #include "mount-setup.h"
36 #include "hostname-setup.h"
37 #include "load-fragment.h"
43 ACTION_DUMP_CONFIGURATION_ITEMS
44 } action = ACTION_RUN;
46 static char *default_unit = NULL;
47 static ManagerRunningAs running_as = _MANAGER_RUNNING_AS_INVALID;
48 static bool dump_core = true;
50 _noreturn static void freeze(void) {
55 _noreturn static void crash(int sig) {
58 log_error("Caught <%s>, not dumping core.", strsignal(sig));
62 log_warning("Caugh <%s>, dumping core.", strsignal(sig));
64 if ((pid = fork()) < 0)
65 log_error("Caught <%s>, cannot dump core: %s", strsignal(sig), strerror(errno));
71 /* Enable default signal handler for core dump */
73 sa.sa_handler = SIG_DFL;
74 assert_se(sigaction(sig, &sa, NULL) == 0);
76 /* Don't limit the core dump size */
78 rl.rlim_cur = RLIM_INFINITY;
79 rl.rlim_max = RLIM_INFINITY;
80 setrlimit(RLIMIT_CORE, &rl);
82 /* Just to be sure... */
83 assert_se(chdir("/") == 0);
85 /* Raise the signal again */
88 assert_not_reached("We shouldn't be here...");
93 log_error("Freezing execution.");
97 static void install_crash_handler(void) {
102 sa.sa_handler = crash;
103 sa.sa_flags = SA_NODEFER;
105 assert_se(sigaction(SIGSEGV, &sa, NULL) == 0);
106 assert_se(sigaction(SIGABRT, &sa, NULL) == 0);
109 static int set_default_unit(const char *u) {
114 if (!(c = strdup(u)))
122 static int parse_proc_cmdline_word(const char *word) {
124 static const char * const rlmap[] = {
125 "single", SPECIAL_RUNLEVEL1_TARGET,
126 "-s", SPECIAL_RUNLEVEL1_TARGET,
127 "s", SPECIAL_RUNLEVEL1_TARGET,
128 "S", SPECIAL_RUNLEVEL1_TARGET,
129 "1", SPECIAL_RUNLEVEL1_TARGET,
130 "2", SPECIAL_RUNLEVEL2_TARGET,
131 "3", SPECIAL_RUNLEVEL3_TARGET,
132 "4", SPECIAL_RUNLEVEL4_TARGET,
133 "5", SPECIAL_RUNLEVEL5_TARGET
136 if (startswith(word, "systemd.default="))
137 return set_default_unit(word + 16);
139 else if (startswith(word, "systemd.log_target=")) {
141 if (log_set_target_from_string(word + 19) < 0)
142 log_warning("Failed to parse log target %s. Ignoring.", word + 19);
144 } else if (startswith(word, "systemd.log_level=")) {
146 if (log_set_max_level_from_string(word + 18) < 0)
147 log_warning("Failed to parse log level %s. Ignoring.", word + 18);
152 /* SysV compatibility */
153 for (i = 0; i < ELEMENTSOF(rlmap); i += 2)
154 if (streq(word, rlmap[i]))
155 return set_default_unit(rlmap[i+1]);
161 static int parse_proc_cmdline(void) {
168 if ((r = read_one_line_file("/proc/cmdline", &line)) < 0) {
169 log_warning("Failed to read /proc/cmdline, ignoring: %s", strerror(errno));
173 FOREACH_WORD_QUOTED(w, l, line, state) {
176 if (!(word = strndup(w, l))) {
181 r = parse_proc_cmdline_word(word);
195 static int parse_argv(int argc, char *argv[]) {
198 ARG_LOG_LEVEL = 0x100,
203 ARG_DUMP_CONFIGURATION_ITEMS
206 static const struct option options[] = {
207 { "log-level", required_argument, NULL, ARG_LOG_LEVEL },
208 { "log-target", required_argument, NULL, ARG_LOG_TARGET },
209 { "default", required_argument, NULL, ARG_DEFAULT },
210 { "running-as", required_argument, NULL, ARG_RUNNING_AS },
211 { "test", no_argument, NULL, ARG_TEST },
212 { "help", no_argument, NULL, 'h' },
213 { "dump-configuration-items", no_argument, NULL, ARG_DUMP_CONFIGURATION_ITEMS },
222 while ((c = getopt_long(argc, argv, "h", options, NULL)) >= 0)
227 if ((r = log_set_max_level_from_string(optarg)) < 0) {
228 log_error("Failed to parse log level %s.", optarg);
236 if ((r = log_set_target_from_string(optarg)) < 0) {
237 log_error("Failed to parse log target %s.", optarg);
245 if ((r = set_default_unit(optarg)) < 0) {
246 log_error("Failed to set default unit %s: %s", optarg, strerror(-r));
252 case ARG_RUNNING_AS: {
255 if ((as = manager_running_as_from_string(optarg)) < 0) {
256 log_error("Failed to parse running as value %s", optarg);
265 action = ACTION_TEST;
268 case ARG_DUMP_CONFIGURATION_ITEMS:
269 action = ACTION_DUMP_CONFIGURATION_ITEMS;
273 action = ACTION_HELP;
280 log_error("Unknown option code %c", c);
287 static int help(void) {
289 printf("%s [options]\n\n"
290 " -h --help Show this help\n"
291 " --default=UNIT Set default unit\n"
292 " --log-level=LEVEL Set log level\n"
293 " --log-target=TARGET Set log target (console, syslog, kmsg)\n"
294 " --running-as=AS Set running as (init, system, session)\n"
295 " --test Determine startup sequence, dump it and exit\n"
296 " --dump-configuration-items Dump understood unit configuration items\n",
302 int main(int argc, char *argv[]) {
309 running_as = MANAGER_INIT;
310 else if (getuid() == 0)
311 running_as = MANAGER_SYSTEM;
313 running_as = MANAGER_SESSION;
315 if (set_default_unit(SPECIAL_DEFAULT_TARGET) < 0)
318 /* Mount /proc, /sys and friends, so that /proc/cmdline and
319 * /proc/$PID/fd is available. */
320 if (mount_setup() < 0)
323 /* Reset all signal handlers. */
324 assert_se(reset_all_signal_handlers() == 0);
326 /* Close all open files */
327 assert_se(close_all_fds(NULL, 0) == 0);
329 if (running_as != MANAGER_SESSION)
330 if (parse_proc_cmdline() < 0)
333 log_parse_environment();
335 if (parse_argv(argc, argv) < 0)
338 if (action == ACTION_HELP) {
341 } else if (action == ACTION_DUMP_CONFIGURATION_ITEMS) {
342 unit_dump_config_items(stdout);
347 assert_se(action == ACTION_RUN || action == ACTION_TEST);
349 /* Set up PATH unless it is already set */
351 "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
352 running_as == MANAGER_INIT);
354 /* Move out of the way, so that we won't block unmounts */
355 assert_se(chdir("/") == 0);
357 /* Become a session leader if we aren't one yet. */
360 /* Disable the umask logic */
363 /* Make sure D-Bus doesn't fiddle with the SIGPIPE handlers */
364 dbus_connection_set_change_sigpipe(FALSE);
366 /* Open the logging devices, if possible and necessary */
370 /* Make sure we leave a core dump */
371 install_crash_handler();
373 log_debug("systemd running in %s mode.", manager_running_as_to_string(running_as));
375 if (running_as == MANAGER_INIT)
378 if ((r = manager_new(running_as, &m)) < 0) {
379 log_error("Failed to allocate manager object: %s", strerror(-r));
383 if ((r = manager_coldplug(m)) < 0) {
384 log_error("Failed to retrieve coldplug information: %s", strerror(-r));
388 log_debug("Activating default unit: %s", default_unit);
390 if ((r = manager_load_unit(m, default_unit, &target)) < 0) {
391 log_error("Failed to load default target: %s", strerror(-r));
393 log_info("Trying to load rescue target...");
394 if ((r = manager_load_unit(m, SPECIAL_RESCUE_TARGET, &target)) < 0) {
395 log_error("Failed to load rescue target: %s", strerror(-r));
400 if (action == ACTION_TEST) {
401 printf("→ By units:\n");
402 manager_dump_units(m, stdout, "\t");
405 if ((r = manager_add_job(m, JOB_START, target, JOB_REPLACE, false, &job)) < 0) {
406 log_error("Failed to start default target: %s", strerror(-r));
410 if (action == ACTION_TEST) {
411 printf("→ By jobs:\n");
412 manager_dump_jobs(m, stdout, "\t");
421 if ((r = manager_loop(m)) < 0) {
422 log_error("Failed to run mainloop: %s", strerror(-r));