1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
7 Copyright 2013 Marc-Antoine Perennou
9 systemd is free software; you can redistribute it and/or modify it
10 under the terms of the GNU Lesser General Public License as published by
11 the Free Software Foundation; either version 2.1 of the License, or
12 (at your option) any later version.
14 systemd is distributed in the hope that it will be useful, but
15 WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 Lesser General Public License for more details.
19 You should have received a copy of the GNU Lesser General Public License
20 along with systemd; If not, see <http://www.gnu.org/licenses/>.
23 #include <sys/reboot.h>
24 #include <linux/reboot.h>
25 #include <sys/syscall.h>
32 #include <sys/ioctl.h>
36 #include <sys/socket.h>
39 #include <sys/prctl.h>
41 #include "sd-daemon.h"
42 #include "sd-shutdown.h"
49 #include "utmp-wtmp.h"
52 #include "path-util.h"
54 #include "cgroup-show.h"
55 #include "cgroup-util.h"
57 #include "path-lookup.h"
58 #include "conf-parser.h"
59 #include "exit-status.h"
60 #include "bus-errors.h"
62 #include "unit-name.h"
64 #include "spawn-ask-password-agent.h"
65 #include "spawn-polkit-agent.h"
67 #include "logs-show.h"
68 #include "socket-util.h"
71 #include "bus-message.h"
72 #include "bus-error.h"
73 #include "bus-errors.h"
75 static char **arg_types = NULL;
76 static char **arg_states = NULL;
77 static char **arg_properties = NULL;
78 static bool arg_all = false;
79 static bool original_stdout_is_tty;
80 static enum dependency {
85 } arg_dependency = DEPENDENCY_FORWARD;
86 static const char *arg_job_mode = "replace";
87 static UnitFileScope arg_scope = UNIT_FILE_SYSTEM;
88 static bool arg_no_block = false;
89 static bool arg_no_legend = false;
90 static bool arg_no_pager = false;
91 static bool arg_no_wtmp = false;
92 static bool arg_no_wall = false;
93 static bool arg_no_reload = false;
94 static bool arg_show_types = false;
95 static bool arg_ignore_inhibitors = false;
96 static bool arg_dry = false;
97 static bool arg_quiet = false;
98 static bool arg_full = false;
99 static int arg_force = 0;
100 static bool arg_ask_password = true;
101 static bool arg_runtime = false;
102 static char **arg_wall = NULL;
103 static const char *arg_kill_who = NULL;
104 static int arg_signal = SIGTERM;
105 static const char *arg_root = NULL;
106 static usec_t arg_when = 0;
128 ACTION_CANCEL_SHUTDOWN,
130 } arg_action = ACTION_SYSTEMCTL;
131 static BusTransport arg_transport = BUS_TRANSPORT_LOCAL;
132 static char *arg_host = NULL;
133 static unsigned arg_lines = 10;
134 static OutputMode arg_output = OUTPUT_SHORT;
135 static bool arg_plain = false;
137 static int daemon_reload(sd_bus *bus, char **args);
138 static int halt_now(enum action a);
140 static int check_one_unit(sd_bus *bus, const char *name, const char *good_states, bool quiet);
142 static void pager_open_if_enabled(void) {
150 static void ask_password_agent_open_if_enabled(void) {
152 /* Open the password agent as a child process if necessary */
154 if (!arg_ask_password)
157 if (arg_scope != UNIT_FILE_SYSTEM)
160 if (arg_transport != BUS_TRANSPORT_LOCAL)
163 ask_password_agent_open();
167 static void polkit_agent_open_if_enabled(void) {
169 /* Open the polkit agent as a child process if necessary */
171 if (!arg_ask_password)
174 if (arg_scope != UNIT_FILE_SYSTEM)
177 if (arg_transport != BUS_TRANSPORT_LOCAL)
184 static int translate_bus_error_to_exit_status(int r, const sd_bus_error *error) {
187 if (!sd_bus_error_is_set(error))
190 if (sd_bus_error_has_name(error, SD_BUS_ERROR_ACCESS_DENIED) ||
191 sd_bus_error_has_name(error, BUS_ERROR_ONLY_BY_DEPENDENCY) ||
192 sd_bus_error_has_name(error, BUS_ERROR_NO_ISOLATION) ||
193 sd_bus_error_has_name(error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE))
194 return EXIT_NOPERMISSION;
196 if (sd_bus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT))
197 return EXIT_NOTINSTALLED;
199 if (sd_bus_error_has_name(error, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE) ||
200 sd_bus_error_has_name(error, SD_BUS_ERROR_NOT_SUPPORTED))
201 return EXIT_NOTIMPLEMENTED;
203 if (sd_bus_error_has_name(error, BUS_ERROR_LOAD_FAILED))
204 return EXIT_NOTCONFIGURED;
212 static void warn_wall(enum action a) {
213 static const char *table[_ACTION_MAX] = {
214 [ACTION_HALT] = "The system is going down for system halt NOW!",
215 [ACTION_REBOOT] = "The system is going down for reboot NOW!",
216 [ACTION_POWEROFF] = "The system is going down for power-off NOW!",
217 [ACTION_KEXEC] = "The system is going down for kexec reboot NOW!",
218 [ACTION_RESCUE] = "The system is going down to rescue mode NOW!",
219 [ACTION_EMERGENCY] = "The system is going down to emergency mode NOW!",
220 [ACTION_CANCEL_SHUTDOWN] = "The system shutdown has been cancelled NOW!"
227 _cleanup_free_ char *p;
229 p = strv_join(arg_wall, " ");
244 utmp_wall(table[a], NULL);
247 static bool avoid_bus(void) {
249 if (running_in_chroot() > 0)
252 if (sd_booted() <= 0)
255 if (!isempty(arg_root))
258 if (arg_scope == UNIT_FILE_GLOBAL)
264 static int compare_unit_info(const void *a, const void *b) {
265 const UnitInfo *u = a, *v = b;
268 d1 = strrchr(u->id, '.');
269 d2 = strrchr(v->id, '.');
274 r = strcasecmp(d1, d2);
279 return strcasecmp(u->id, v->id);
282 static bool output_show_unit(const UnitInfo *u) {
285 if (!strv_isempty(arg_states))
287 strv_contains(arg_states, u->load_state) ||
288 strv_contains(arg_states, u->sub_state) ||
289 strv_contains(arg_states, u->active_state);
291 return (!arg_types || ((dot = strrchr(u->id, '.')) &&
292 strv_find(arg_types, dot+1))) &&
293 (arg_all || !(streq(u->active_state, "inactive")
294 || u->following[0]) || u->job_id > 0);
297 static void output_units_list(const UnitInfo *unit_infos, unsigned c) {
298 unsigned id_len, max_id_len, load_len, active_len, sub_len, job_len, desc_len;
300 unsigned n_shown = 0;
303 max_id_len = sizeof("UNIT")-1;
304 load_len = sizeof("LOAD")-1;
305 active_len = sizeof("ACTIVE")-1;
306 sub_len = sizeof("SUB")-1;
307 job_len = sizeof("JOB")-1;
310 for (u = unit_infos; u < unit_infos + c; u++) {
311 if (!output_show_unit(u))
314 max_id_len = MAX(max_id_len, strlen(u->id));
315 load_len = MAX(load_len, strlen(u->load_state));
316 active_len = MAX(active_len, strlen(u->active_state));
317 sub_len = MAX(sub_len, strlen(u->sub_state));
319 if (u->job_id != 0) {
320 job_len = MAX(job_len, strlen(u->job_type));
325 if (!arg_full && original_stdout_is_tty) {
328 id_len = MIN(max_id_len, 25u);
329 basic_len = 5 + id_len + 5 + active_len + sub_len;
332 basic_len += job_len + 1;
334 if (basic_len < (unsigned) columns()) {
335 unsigned extra_len, incr;
336 extra_len = columns() - basic_len;
338 /* Either UNIT already got 25, or is fully satisfied.
339 * Grant up to 25 to DESC now. */
340 incr = MIN(extra_len, 25u);
344 /* split the remaining space between UNIT and DESC,
345 * but do not give UNIT more than it needs. */
347 incr = MIN(extra_len / 2, max_id_len - id_len);
349 desc_len += extra_len - incr;
355 for (u = unit_infos; u < unit_infos + c; u++) {
356 _cleanup_free_ char *e = NULL;
357 const char *on_loaded, *off_loaded, *on = "";
358 const char *on_active, *off_active, *off = "";
360 if (!output_show_unit(u))
363 if (!n_shown && !arg_no_legend) {
364 printf("%-*s %-*s %-*s %-*s ",
367 active_len, "ACTIVE",
371 printf("%-*s ", job_len, "JOB");
373 if (!arg_full && arg_no_pager)
374 printf("%.*s\n", desc_len, "DESCRIPTION");
376 printf("%s\n", "DESCRIPTION");
381 if (streq(u->load_state, "error") ||
382 streq(u->load_state, "not-found")) {
383 on_loaded = on = ansi_highlight_red();
384 off_loaded = off = ansi_highlight_off();
386 on_loaded = off_loaded = "";
388 if (streq(u->active_state, "failed")) {
389 on_active = on = ansi_highlight_red();
390 off_active = off = ansi_highlight_off();
392 on_active = off_active = "";
394 e = arg_full ? NULL : ellipsize(u->id, id_len, 33);
396 printf("%s%-*s%s %s%-*s%s %s%-*s %-*s%s %-*s",
397 on, id_len, e ? e : u->id, off,
398 on_loaded, load_len, u->load_state, off_loaded,
399 on_active, active_len, u->active_state,
400 sub_len, u->sub_state, off_active,
401 job_count ? job_len + 1 : 0, u->job_id ? u->job_type : "");
404 printf("%.*s\n", desc_len, u->description);
406 printf("%s\n", u->description);
409 if (!arg_no_legend) {
410 const char *on, *off;
413 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
414 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
415 "SUB = The low-level unit activation state, values depend on unit type.\n");
417 printf("JOB = Pending job for the unit.\n");
419 on = ansi_highlight();
420 off = ansi_highlight_off();
422 on = ansi_highlight_red();
423 off = ansi_highlight_off();
427 printf("%s%u loaded units listed.%s\n"
428 "To show all installed unit files use 'systemctl list-unit-files'.\n",
431 printf("%s%u loaded units listed.%s Pass --all to see loaded but inactive units, too.\n"
432 "To show all installed unit files use 'systemctl list-unit-files'.\n",
437 static int get_unit_list(
439 sd_bus_message **_reply,
440 UnitInfo **_unit_infos) {
442 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
443 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
444 _cleanup_free_ UnitInfo *unit_infos = NULL;
453 r = sd_bus_call_method(
455 "org.freedesktop.systemd1",
456 "/org/freedesktop/systemd1",
457 "org.freedesktop.systemd1.Manager",
463 log_error("Failed to list units: %s", bus_error_message(&error, r));
467 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "(ssssssouso)");
469 return bus_log_parse_error(r);
471 while ((r = bus_parse_unit_info(reply, &u)) > 0) {
473 if (!GREEDY_REALLOC(unit_infos, size, c+1))
479 return bus_log_parse_error(r);
481 r = sd_bus_message_exit_container(reply);
483 return bus_log_parse_error(r);
488 *_unit_infos = unit_infos;
494 static int list_units(sd_bus *bus, char **args) {
495 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
496 _cleanup_free_ UnitInfo *unit_infos = NULL;
499 pager_open_if_enabled();
501 r = get_unit_list(bus, &reply, &unit_infos);
505 qsort_safe(unit_infos, r, sizeof(UnitInfo), compare_unit_info);
506 output_units_list(unit_infos, r);
511 static int get_triggered_units(
516 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
519 r = sd_bus_get_property_strv(
521 "org.freedesktop.systemd1",
523 "org.freedesktop.systemd1.Unit",
529 log_error("Failed to determine triggers: %s", bus_error_message(&error, r));
534 static int get_listening(
536 const char* unit_path,
539 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
540 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
541 const char *type, *path;
544 r = sd_bus_get_property(
546 "org.freedesktop.systemd1",
548 "org.freedesktop.systemd1.Socket",
554 log_error("Failed to get list of listening sockets: %s", bus_error_message(&error, r));
558 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "(ss)");
560 return bus_log_parse_error(r);
562 while ((r = sd_bus_message_read(reply, "(ss)", &type, &path)) > 0) {
564 r = strv_extend(listening, type);
568 r = strv_extend(listening, path);
575 return bus_log_parse_error(r);
577 r = sd_bus_message_exit_container(reply);
579 return bus_log_parse_error(r);
590 /* Note: triggered is a list here, although it almost certainly
591 * will always be one unit. Nevertheless, dbus API allows for multiple
592 * values, so let's follow that.*/
595 /* The strv above is shared. free is set only in the first one. */
599 static int socket_info_compare(const struct socket_info *a, const struct socket_info *b) {
605 o = strcmp(a->path, b->path);
607 o = strcmp(a->type, b->type);
612 static int output_sockets_list(struct socket_info *socket_infos, unsigned cs) {
613 struct socket_info *s;
614 unsigned pathlen = sizeof("LISTEN") - 1,
615 typelen = (sizeof("TYPE") - 1) * arg_show_types,
616 socklen = sizeof("UNIT") - 1,
617 servlen = sizeof("ACTIVATES") - 1;
618 const char *on, *off;
620 for (s = socket_infos; s < socket_infos + cs; s++) {
624 socklen = MAX(socklen, strlen(s->id));
626 typelen = MAX(typelen, strlen(s->type));
627 pathlen = MAX(pathlen, strlen(s->path));
629 STRV_FOREACH(a, s->triggered)
630 tmp += strlen(*a) + 2*(a != s->triggered);
631 servlen = MAX(servlen, tmp);
636 printf("%-*s %-*.*s%-*s %s\n",
638 typelen + arg_show_types, typelen + arg_show_types, "TYPE ",
642 for (s = socket_infos; s < socket_infos + cs; s++) {
646 printf("%-*s %-*s %-*s",
647 pathlen, s->path, typelen, s->type, socklen, s->id);
650 pathlen, s->path, socklen, s->id);
651 STRV_FOREACH(a, s->triggered)
653 a == s->triggered ? "" : ",", *a);
657 on = ansi_highlight();
658 off = ansi_highlight_off();
662 on = ansi_highlight_red();
663 off = ansi_highlight_off();
666 if (!arg_no_legend) {
667 printf("%s%u sockets listed.%s\n", on, cs, off);
669 printf("Pass --all to see loaded but inactive sockets, too.\n");
675 static int list_sockets(sd_bus *bus, char **args) {
676 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
677 _cleanup_free_ UnitInfo *unit_infos = NULL;
678 struct socket_info *socket_infos = NULL;
680 struct socket_info *s;
685 pager_open_if_enabled();
687 n = get_unit_list(bus, &reply, &unit_infos);
691 for (u = unit_infos; u < unit_infos + n; u++) {
692 _cleanup_strv_free_ char **listening = NULL, **triggered = NULL;
695 if (!output_show_unit(u))
698 if (!endswith(u->id, ".socket"))
701 r = get_triggered_units(bus, u->unit_path, &triggered);
705 c = get_listening(bus, u->unit_path, &listening);
711 if (!GREEDY_REALLOC(socket_infos, size, cs + c)) {
716 for (i = 0; i < c; i++)
717 socket_infos[cs + i] = (struct socket_info) {
719 .type = listening[i*2],
720 .path = listening[i*2 + 1],
721 .triggered = triggered,
722 .own_triggered = i==0,
725 /* from this point on we will cleanup those socket_infos */
728 listening = triggered = NULL; /* avoid cleanup */
731 qsort_safe(socket_infos, cs, sizeof(struct socket_info),
732 (__compar_fn_t) socket_info_compare);
734 output_sockets_list(socket_infos, cs);
737 assert(cs == 0 || socket_infos);
738 for (s = socket_infos; s < socket_infos + cs; s++) {
741 if (s->own_triggered)
742 strv_free(s->triggered);
749 static int get_next_elapse(
752 dual_timestamp *next) {
754 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
762 r = sd_bus_get_property_trivial(
764 "org.freedesktop.systemd1",
766 "org.freedesktop.systemd1.Timer",
767 "NextElapseUSecMonotonic",
772 log_error("Failed to get next elapsation time: %s", bus_error_message(&error, r));
776 r = sd_bus_get_property_trivial(
778 "org.freedesktop.systemd1",
780 "org.freedesktop.systemd1.Timer",
781 "NextElapseUSecRealtime",
786 log_error("Failed to get next elapsation time: %s", bus_error_message(&error, r));
800 static int timer_info_compare(const struct timer_info *a, const struct timer_info *b) {
804 if (a->next_elapse < b->next_elapse)
806 if (a->next_elapse > b->next_elapse)
809 return strcmp(a->id, b->id);
812 static int output_timers_list(struct timer_info *timer_infos, unsigned n) {
813 struct timer_info *t;
815 nextlen = sizeof("NEXT") - 1,
816 leftlen = sizeof("LEFT") - 1,
817 unitlen = sizeof("UNIT") - 1,
818 activatelen = sizeof("ACTIVATES") - 1;
820 const char *on, *off;
822 assert(timer_infos || n == 0);
824 for (t = timer_infos; t < timer_infos + n; t++) {
828 if (t->next_elapse > 0) {
829 char tstamp[FORMAT_TIMESTAMP_MAX] = "", trel[FORMAT_TIMESTAMP_RELATIVE_MAX] = "";
831 format_timestamp(tstamp, sizeof(tstamp), t->next_elapse);
832 nextlen = MAX(nextlen, strlen(tstamp) + 1);
834 format_timestamp_relative(trel, sizeof(trel), t->next_elapse);
835 leftlen = MAX(leftlen, strlen(trel));
838 unitlen = MAX(unitlen, strlen(t->id));
840 STRV_FOREACH(a, t->triggered)
841 ul += strlen(*a) + 2*(a != t->triggered);
842 activatelen = MAX(activatelen, ul);
847 printf("%-*s %-*s %-*s %s\n",
853 for (t = timer_infos; t < timer_infos + n; t++) {
854 char tstamp[FORMAT_TIMESTAMP_MAX] = "n/a", trel[FORMAT_TIMESTAMP_RELATIVE_MAX] = "n/a";
857 format_timestamp(tstamp, sizeof(tstamp), t->next_elapse);
858 format_timestamp_relative(trel, sizeof(trel), t->next_elapse);
860 printf("%-*s %-*s %-*s",
861 nextlen, tstamp, leftlen, trel, unitlen, t->id);
863 STRV_FOREACH(a, t->triggered)
865 a == t->triggered ? "" : ",", *a);
869 on = ansi_highlight();
870 off = ansi_highlight_off();
874 on = ansi_highlight_red();
875 off = ansi_highlight_off();
878 if (!arg_no_legend) {
879 printf("%s%u timers listed.%s\n", on, n, off);
881 printf("Pass --all to see loaded but inactive timers, too.\n");
887 static int list_timers(sd_bus *bus, char **args) {
889 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
890 _cleanup_free_ struct timer_info *timer_infos = NULL;
891 _cleanup_free_ UnitInfo *unit_infos = NULL;
892 struct timer_info *t;
899 pager_open_if_enabled();
901 n = get_unit_list(bus, &reply, &unit_infos);
905 dual_timestamp_get(&nw);
907 for (u = unit_infos; u < unit_infos + n; u++) {
908 _cleanup_strv_free_ char **triggered = NULL;
912 if (!output_show_unit(u))
915 if (!endswith(u->id, ".timer"))
918 r = get_triggered_units(bus, u->unit_path, &triggered);
922 r = get_next_elapse(bus, u->unit_path, &next);
926 if (next.monotonic != (usec_t) -1 && next.monotonic > 0) {
929 if (next.monotonic > nw.monotonic)
930 converted = nw.realtime + (next.monotonic - nw.monotonic);
932 converted = nw.realtime - (nw.monotonic - next.monotonic);
934 if (next.realtime != (usec_t) -1 && next.realtime > 0)
935 m = MIN(converted, next.realtime);
941 if (!GREEDY_REALLOC(timer_infos, size, c+1)) {
946 timer_infos[c++] = (struct timer_info) {
949 .triggered = triggered,
952 triggered = NULL; /* avoid cleanup */
955 qsort_safe(timer_infos, c, sizeof(struct timer_info),
956 (__compar_fn_t) timer_info_compare);
958 output_timers_list(timer_infos, c);
961 for (t = timer_infos; t < timer_infos + c; t++)
962 strv_free(t->triggered);
967 static int compare_unit_file_list(const void *a, const void *b) {
969 const UnitFileList *u = a, *v = b;
971 d1 = strrchr(u->path, '.');
972 d2 = strrchr(v->path, '.');
977 r = strcasecmp(d1, d2);
982 return strcasecmp(path_get_file_name(u->path), path_get_file_name(v->path));
985 static bool output_show_unit_file(const UnitFileList *u) {
988 return !arg_types || ((dot = strrchr(u->path, '.')) && strv_find(arg_types, dot+1));
991 static void output_unit_file_list(const UnitFileList *units, unsigned c) {
992 unsigned max_id_len, id_cols, state_cols, n_shown = 0;
993 const UnitFileList *u;
995 max_id_len = sizeof("UNIT FILE")-1;
996 state_cols = sizeof("STATE")-1;
998 for (u = units; u < units + c; u++) {
999 if (!output_show_unit_file(u))
1002 max_id_len = MAX(max_id_len, strlen(path_get_file_name(u->path)));
1003 state_cols = MAX(state_cols, strlen(unit_file_state_to_string(u->state)));
1007 unsigned basic_cols;
1009 id_cols = MIN(max_id_len, 25u);
1010 basic_cols = 1 + id_cols + state_cols;
1011 if (basic_cols < (unsigned) columns())
1012 id_cols += MIN(columns() - basic_cols, max_id_len - id_cols);
1014 id_cols = max_id_len;
1017 printf("%-*s %-*s\n",
1018 id_cols, "UNIT FILE",
1019 state_cols, "STATE");
1021 for (u = units; u < units + c; u++) {
1022 _cleanup_free_ char *e = NULL;
1023 const char *on, *off;
1026 if (!output_show_unit_file(u))
1031 if (u->state == UNIT_FILE_MASKED ||
1032 u->state == UNIT_FILE_MASKED_RUNTIME ||
1033 u->state == UNIT_FILE_DISABLED ||
1034 u->state == UNIT_FILE_INVALID) {
1035 on = ansi_highlight_red();
1036 off = ansi_highlight_off();
1037 } else if (u->state == UNIT_FILE_ENABLED) {
1038 on = ansi_highlight_green();
1039 off = ansi_highlight_off();
1043 id = path_get_file_name(u->path);
1045 e = arg_full ? NULL : ellipsize(id, id_cols, 33);
1047 printf("%-*s %s%-*s%s\n",
1048 id_cols, e ? e : id,
1049 on, state_cols, unit_file_state_to_string(u->state), off);
1053 printf("\n%u unit files listed.\n", n_shown);
1056 static int list_unit_files(sd_bus *bus, char **args) {
1057 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1058 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1059 _cleanup_free_ UnitFileList *units = NULL;
1065 pager_open_if_enabled();
1073 h = hashmap_new(string_hash_func, string_compare_func);
1077 r = unit_file_get_list(arg_scope, arg_root, h);
1079 unit_file_list_free(h);
1080 log_error("Failed to get unit file list: %s", strerror(-r));
1084 n_units = hashmap_size(h);
1085 units = new(UnitFileList, n_units);
1087 unit_file_list_free(h);
1091 HASHMAP_FOREACH(u, h, i) {
1092 memcpy(units + c++, u, sizeof(UnitFileList));
1096 assert(c == n_units);
1101 r = sd_bus_call_method(
1103 "org.freedesktop.systemd1",
1104 "/org/freedesktop/systemd1",
1105 "org.freedesktop.systemd1.Manager",
1111 log_error("Failed to list unit files: %s", bus_error_message(&error, r));
1115 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "(ss)");
1117 return bus_log_parse_error(r);
1119 while ((r = sd_bus_message_read(reply, "(ss)", &path, &state)) > 0) {
1121 if (!GREEDY_REALLOC(units, size, c + 1))
1124 units[c++] = (struct UnitFileList) {
1126 unit_file_state_from_string(state)
1130 return bus_log_parse_error(r);
1132 r = sd_bus_message_exit_container(reply);
1134 return bus_log_parse_error(r);
1138 qsort(units, c, sizeof(UnitFileList), compare_unit_file_list);
1139 output_unit_file_list(units, c);
1145 static int list_dependencies_print(const char *name, int level, unsigned int branches, bool last) {
1146 _cleanup_free_ char *n = NULL;
1147 size_t max_len = MAX(columns(),20u);
1153 for (i = level - 1; i >= 0; i--) {
1155 if (len > max_len - 3 && !arg_full) {
1156 printf("%s...\n",max_len % 2 ? "" : " ");
1159 printf("%s", draw_special_char(branches & (1 << i) ? DRAW_TREE_VERT : DRAW_TREE_SPACE));
1163 if (len > max_len - 3 && !arg_full) {
1164 printf("%s...\n",max_len % 2 ? "" : " ");
1168 printf("%s", draw_special_char(last ? DRAW_TREE_RIGHT : DRAW_TREE_BRANCH));
1172 printf("%s\n", name);
1176 n = ellipsize(name, max_len-len, 100);
1184 static int list_dependencies_get_dependencies(sd_bus *bus, const char *name, char ***deps) {
1186 static const char *dependencies[] = {
1187 [DEPENDENCY_FORWARD] = "Requires\0"
1188 "RequiresOverridable\0"
1190 "RequisiteOverridable\0"
1192 [DEPENDENCY_REVERSE] = "RequiredBy\0"
1193 "RequiredByOverridable\0"
1196 [DEPENDENCY_AFTER] = "After\0",
1197 [DEPENDENCY_BEFORE] = "Before\0",
1200 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1201 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1202 _cleanup_strv_free_ char **ret = NULL;
1203 _cleanup_free_ char *path = NULL;
1209 assert(arg_dependency < ELEMENTSOF(dependencies));
1211 path = unit_dbus_path_from_name(name);
1215 r = sd_bus_call_method(
1217 "org.freedesktop.systemd1",
1219 "org.freedesktop.DBus.Properties",
1223 "s", "org.freedesktop.systemd1.Unit");
1225 log_error("Failed to get properties of %s: %s", name, bus_error_message(&error, r));
1229 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "{sv}");
1231 return bus_log_parse_error(r);
1233 while ((r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_DICT_ENTRY, "sv")) > 0) {
1236 r = sd_bus_message_read(reply, "s", &prop);
1238 return bus_log_parse_error(r);
1240 if (!nulstr_contains(dependencies[arg_dependency], prop)) {
1241 r = sd_bus_message_skip(reply, "v");
1243 return bus_log_parse_error(r);
1246 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_VARIANT, "as");
1248 return bus_log_parse_error(r);
1250 r = bus_message_read_strv_extend(reply, &ret);
1252 return bus_log_parse_error(r);
1254 r = sd_bus_message_exit_container(reply);
1256 return bus_log_parse_error(r);
1259 r = sd_bus_message_exit_container(reply);
1261 return bus_log_parse_error(r);
1265 return bus_log_parse_error(r);
1267 r = sd_bus_message_exit_container(reply);
1269 return bus_log_parse_error(r);
1277 static int list_dependencies_compare(const void *_a, const void *_b) {
1278 const char **a = (const char**) _a, **b = (const char**) _b;
1280 if (unit_name_to_type(*a) == UNIT_TARGET && unit_name_to_type(*b) != UNIT_TARGET)
1282 if (unit_name_to_type(*a) != UNIT_TARGET && unit_name_to_type(*b) == UNIT_TARGET)
1285 return strcasecmp(*a, *b);
1288 static int list_dependencies_one(
1293 unsigned int branches) {
1295 _cleanup_strv_free_ char **deps = NULL, **u;
1303 u = strv_append(*units, name);
1307 r = list_dependencies_get_dependencies(bus, name, &deps);
1311 qsort_safe(deps, strv_length(deps), sizeof (char*), list_dependencies_compare);
1313 STRV_FOREACH(c, deps) {
1316 if (strv_contains(u, *c)) {
1318 r = list_dependencies_print("...", level + 1, (branches << 1) | (c[1] == NULL ? 0 : 1), 1);
1325 state = check_one_unit(bus, *c, "activating\0active\0reloading\0", true);
1327 printf("%s%s%s", ansi_highlight_green(), draw_special_char(DRAW_BLACK_CIRCLE), ansi_highlight_off());
1329 printf("%s%s%s", ansi_highlight_red(), draw_special_char(DRAW_BLACK_CIRCLE), ansi_highlight_off());
1331 r = list_dependencies_print(*c, level, branches, c[1] == NULL);
1335 if (arg_all || unit_name_to_type(*c) == UNIT_TARGET) {
1336 r = list_dependencies_one(bus, *c, level + 1, &u, (branches << 1) | (c[1] == NULL ? 0 : 1));
1351 static int list_dependencies(sd_bus *bus, char **args) {
1352 _cleanup_strv_free_ char **units = NULL;
1353 _cleanup_free_ char *unit = NULL;
1359 unit = unit_name_mangle(args[1]);
1364 u = SPECIAL_DEFAULT_TARGET;
1366 pager_open_if_enabled();
1370 return list_dependencies_one(bus, u, 0, &units, 0);
1373 static int get_default(sd_bus *bus, char **args) {
1374 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1375 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1376 _cleanup_free_ char *_path = NULL;
1380 if (!bus || avoid_bus()) {
1381 r = unit_file_get_default(arg_scope, arg_root, &_path);
1383 log_error("Failed to get default target: %s", strerror(-r));
1389 r = sd_bus_call_method(
1391 "org.freedesktop.systemd1",
1392 "/org/freedesktop/systemd1",
1393 "org.freedesktop.systemd1.Manager",
1399 log_error("Failed to get default target: %s", bus_error_message(&error, -r));
1403 r = sd_bus_message_read(reply, "s", &path);
1405 return bus_log_parse_error(r);
1409 printf("%s\n", path);
1414 static void dump_unit_file_changes(const UnitFileChange *changes, unsigned n_changes) {
1417 assert(changes || n_changes == 0);
1419 for (i = 0; i < n_changes; i++) {
1420 if (changes[i].type == UNIT_FILE_SYMLINK)
1421 log_info("ln -s '%s' '%s'", changes[i].source, changes[i].path);
1423 log_info("rm '%s'", changes[i].path);
1427 static int deserialize_and_dump_unit_file_changes(sd_bus_message *m) {
1428 const char *type, *path, *source;
1431 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(sss)");
1433 return bus_log_parse_error(r);
1435 while ((r = sd_bus_message_read(m, "(sss)", &type, &path, &source)) > 0) {
1437 if (streq(type, "symlink"))
1438 log_info("ln -s '%s' '%s'", source, path);
1440 log_info("rm '%s'", path);
1444 return bus_log_parse_error(r);
1446 r = sd_bus_message_exit_container(m);
1448 return bus_log_parse_error(r);
1453 static int set_default(sd_bus *bus, char **args) {
1454 _cleanup_free_ char *unit = NULL;
1455 UnitFileChange *changes = NULL;
1456 unsigned n_changes = 0;
1459 unit = unit_name_mangle_with_suffix(args[1], ".target");
1463 if (!bus || avoid_bus()) {
1464 r = unit_file_set_default(arg_scope, arg_root, unit, arg_force, &changes, &n_changes);
1466 log_error("Failed to set default target: %s", strerror(-r));
1471 dump_unit_file_changes(changes, n_changes);
1475 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1476 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1478 r = sd_bus_call_method(
1480 "org.freedesktop.systemd1",
1481 "/org/freedesktop/systemd1",
1482 "org.freedesktop.systemd1.Manager",
1486 "sb", unit, arg_force);
1488 log_error("Failed to set default target: %s", bus_error_message(&error, -r));
1492 r = deserialize_and_dump_unit_file_changes(reply);
1496 /* Try to reload if enabeld */
1498 r = daemon_reload(bus, args);
1503 unit_file_changes_free(changes, n_changes);
1510 const char *name, *type, *state;
1513 static void output_jobs_list(const struct job_info* jobs, unsigned n) {
1514 unsigned id_len, unit_len, type_len, state_len;
1515 const struct job_info *j;
1516 const char *on, *off;
1517 bool shorten = false;
1519 assert(n == 0 || jobs);
1522 on = ansi_highlight_green();
1523 off = ansi_highlight_off();
1525 printf("%sNo jobs running.%s\n", on, off);
1529 pager_open_if_enabled();
1531 id_len = sizeof("JOB")-1;
1532 unit_len = sizeof("UNIT")-1;
1533 type_len = sizeof("TYPE")-1;
1534 state_len = sizeof("STATE")-1;
1536 for (j = jobs; j < jobs + n; j++) {
1537 uint32_t id = j->id;
1538 assert(j->name && j->type && j->state);
1540 id_len = MAX(id_len, DECIMAL_STR_WIDTH(id));
1541 unit_len = MAX(unit_len, strlen(j->name));
1542 type_len = MAX(type_len, strlen(j->type));
1543 state_len = MAX(state_len, strlen(j->state));
1546 if (!arg_full && id_len + 1 + unit_len + type_len + 1 + state_len > columns()) {
1547 unit_len = MAX(33u, columns() - id_len - type_len - state_len - 3);
1552 printf("%*s %-*s %-*s %-*s\n",
1556 state_len, "STATE");
1558 for (j = jobs; j < jobs + n; j++) {
1559 _cleanup_free_ char *e = NULL;
1561 if (streq(j->state, "running")) {
1562 on = ansi_highlight();
1563 off = ansi_highlight_off();
1567 e = shorten ? ellipsize(j->name, unit_len, 33) : NULL;
1568 printf("%*u %s%-*s%s %-*s %s%-*s%s\n",
1570 on, unit_len, e ? e : j->name, off,
1572 on, state_len, j->state, off);
1575 if (!arg_no_legend) {
1576 on = ansi_highlight();
1577 off = ansi_highlight_off();
1579 printf("\n%s%u jobs listed%s.\n", on, n, off);
1583 static int list_jobs(sd_bus *bus, char **args) {
1584 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1585 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1586 const char *name, *type, *state, *job_path, *unit_path;
1587 _cleanup_free_ struct job_info *jobs = NULL;
1593 r = sd_bus_call_method(
1595 "org.freedesktop.systemd1",
1596 "/org/freedesktop/systemd1",
1597 "org.freedesktop.systemd1.Manager",
1603 log_error("Failed to list jobs: %s", bus_error_message(&error, r));
1607 r = sd_bus_message_enter_container(reply, 'a', "(usssoo)");
1609 return bus_log_parse_error(r);
1611 while ((r = sd_bus_message_read(reply, "(usssoo)", &id, &name, &type, &state, &job_path, &unit_path)) > 0) {
1613 if (!GREEDY_REALLOC(jobs, size, c + 1))
1616 jobs[c++] = (struct job_info) {
1624 return bus_log_parse_error(r);
1626 r = sd_bus_message_exit_container(reply);
1628 return bus_log_parse_error(r);
1630 output_jobs_list(jobs, c);
1634 static int cancel_job(sd_bus *bus, char **args) {
1635 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1640 if (strv_length(args) <= 1)
1641 return daemon_reload(bus, args);
1643 STRV_FOREACH(name, args+1) {
1647 r = safe_atou32(*name, &id);
1649 log_error("Failed to parse job id \"%s\": %s", *name, strerror(-r));
1653 r = sd_bus_call_method(
1655 "org.freedesktop.systemd1",
1656 "/org/freedesktop/systemd1",
1657 "org.freedesktop.systemd1.Manager",
1663 log_error("Failed to cancel job %u: %s", (unsigned) id, bus_error_message(&error, r));
1671 static int need_daemon_reload(sd_bus *bus, const char *unit) {
1672 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1673 _cleanup_free_ char *n = NULL;
1677 /* We ignore all errors here, since this is used to show a
1680 n = unit_name_mangle(unit);
1684 /* We don't use unit_dbus_path_from_name() directly since we
1685 * don't want to load the unit if it isn't loaded. */
1687 r = sd_bus_call_method(
1689 "org.freedesktop.systemd1",
1690 "/org/freedesktop/systemd1",
1691 "org.freedesktop.systemd1.Manager",
1699 r = sd_bus_message_read(reply, "o", &path);
1703 r = sd_bus_get_property_trivial(
1705 "org.freedesktop.systemd1",
1707 "org.freedesktop.systemd1.Unit",
1717 typedef struct WaitData {
1724 static int wait_filter(sd_bus *bus, sd_bus_message *m, void *data, sd_bus_error *error) {
1731 log_debug("Got D-Bus request: %s.%s() on %s",
1732 sd_bus_message_get_interface(m),
1733 sd_bus_message_get_member(m),
1734 sd_bus_message_get_path(m));
1736 if (sd_bus_message_is_signal(m, "org.freedesktop.DBus.Local", "Disconnected")) {
1737 log_error("Warning! D-Bus connection terminated.");
1739 } else if (sd_bus_message_is_signal(m, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1741 const char *path, *result, *unit;
1745 r = sd_bus_message_read(m, "uoss", &id, &path, &unit, &result);
1747 ret = set_remove(d->set, (char*) path);
1753 if (!isempty(result))
1754 d->result = strdup(result);
1757 d->name = strdup(unit);
1762 r = sd_bus_message_read(m, "uos", &id, &path, &result);
1764 ret = set_remove(d->set, (char*) path);
1771 d->result = strdup(result);
1777 bus_log_parse_error(r);
1783 static int enable_wait_for_jobs(sd_bus *bus) {
1788 r = sd_bus_add_match(
1791 "sender='org.freedesktop.systemd1',"
1792 "interface='org.freedesktop.systemd1.Manager',"
1793 "member='JobRemoved',"
1794 "path='/org/freedesktop/systemd1'",
1797 log_error("Failed to add match");
1801 /* This is slightly dirty, since we don't undo the match registrations. */
1805 static int wait_for_jobs(sd_bus *bus, Set *s) {
1806 WaitData d = { .set = s };
1812 r = sd_bus_add_filter(bus, wait_filter, &d);
1816 while (!set_isempty(s)) {
1818 r = sd_bus_process(bus, NULL);
1823 r = sd_bus_wait(bus, (uint64_t) -1);
1832 if (streq(d.result, "timeout"))
1833 log_error("Job for %s timed out.", strna(d.name));
1834 else if (streq(d.result, "canceled"))
1835 log_error("Job for %s canceled.", strna(d.name));
1836 else if (streq(d.result, "dependency"))
1837 log_error("A dependency job for %s failed. See 'journalctl -xn' for details.", strna(d.name));
1838 else if (!streq(d.result, "done") && !streq(d.result, "skipped"))
1839 log_error("Job for %s failed. See 'systemctl status %s' and 'journalctl -xn' for details.", strna(d.name), strna(d.name));
1842 if (streq_ptr(d.result, "timeout"))
1844 else if (streq_ptr(d.result, "canceled"))
1846 else if (!streq_ptr(d.result, "done") && !streq_ptr(d.result, "skipped"))
1857 return sd_bus_remove_filter(bus, wait_filter, &d);
1860 static int check_one_unit(sd_bus *bus, const char *name, const char *good_states, bool quiet) {
1861 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1862 _cleanup_free_ char *n = NULL, *state = NULL;
1868 n = unit_name_mangle(name);
1872 /* We don't use unit_dbus_path_from_name() directly since we
1873 * don't want to load the unit if it isn't loaded. */
1875 r = sd_bus_call_method(
1877 "org.freedesktop.systemd1",
1878 "/org/freedesktop/systemd1",
1879 "org.freedesktop.systemd1.Manager",
1890 r = sd_bus_message_read(reply, "o", &path);
1892 return bus_log_parse_error(r);
1894 r = sd_bus_get_property_string(
1896 "org.freedesktop.systemd1",
1898 "org.freedesktop.systemd1.Unit",
1911 return nulstr_contains(good_states, state);
1914 static int check_triggering_units(
1918 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
1919 _cleanup_free_ char *path = NULL, *n = NULL, *state = NULL;
1920 _cleanup_strv_free_ char **triggered_by = NULL;
1921 bool print_warning_label = true;
1925 n = unit_name_mangle(name);
1929 path = unit_dbus_path_from_name(n);
1933 r = sd_bus_get_property_string(
1935 "org.freedesktop.systemd1",
1937 "org.freedesktop.systemd1.Unit",
1942 log_error("Failed to get load state of %s: %s", n, bus_error_message(&error, r));
1946 if (streq(state, "masked"))
1949 r = sd_bus_get_property_strv(
1951 "org.freedesktop.systemd1",
1953 "org.freedesktop.systemd1.Unit",
1958 log_error("Failed to get triggered by array of %s: %s", n, bus_error_message(&error, r));
1962 STRV_FOREACH(i, triggered_by) {
1963 r = check_one_unit(bus, *i, "active\0reloading\0", true);
1965 log_error("Failed to check unit: %s", strerror(-r));
1972 if (print_warning_label) {
1973 log_warning("Warning: Stopping %s, but it can still be activated by:", n);
1974 print_warning_label = false;
1977 log_warning(" %s", *i);
1983 static int start_unit_one(
1988 sd_bus_error *error,
1991 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
1992 _cleanup_free_ char *n;
2001 n = unit_name_mangle(name);
2005 r = sd_bus_call_method(
2007 "org.freedesktop.systemd1",
2008 "/org/freedesktop/systemd1",
2009 "org.freedesktop.systemd1.Manager",
2015 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
2016 /* There's always a fallback possible for
2017 * legacy actions. */
2018 return -EADDRNOTAVAIL;
2020 log_error("Failed to start %s: %s", name, bus_error_message(error, r));
2024 r = sd_bus_message_read(reply, "o", &path);
2026 return bus_log_parse_error(r);
2028 if (need_daemon_reload(bus, n) > 0)
2029 log_warning("Warning: Unit file of %s changed on disk, 'systemctl%s daemon-reload' recommended.",
2030 n, arg_scope == UNIT_FILE_SYSTEM ? "" : " --user");
2039 r = set_consume(s, p);
2047 static const struct {
2051 } action_table[_ACTION_MAX] = {
2052 [ACTION_HALT] = { SPECIAL_HALT_TARGET, "halt", "replace-irreversibly" },
2053 [ACTION_POWEROFF] = { SPECIAL_POWEROFF_TARGET, "poweroff", "replace-irreversibly" },
2054 [ACTION_REBOOT] = { SPECIAL_REBOOT_TARGET, "reboot", "replace-irreversibly" },
2055 [ACTION_KEXEC] = { SPECIAL_KEXEC_TARGET, "kexec", "replace-irreversibly" },
2056 [ACTION_RUNLEVEL2] = { SPECIAL_RUNLEVEL2_TARGET, NULL, "isolate" },
2057 [ACTION_RUNLEVEL3] = { SPECIAL_RUNLEVEL3_TARGET, NULL, "isolate" },
2058 [ACTION_RUNLEVEL4] = { SPECIAL_RUNLEVEL4_TARGET, NULL, "isolate" },
2059 [ACTION_RUNLEVEL5] = { SPECIAL_RUNLEVEL5_TARGET, NULL, "isolate" },
2060 [ACTION_RESCUE] = { SPECIAL_RESCUE_TARGET, "rescue", "isolate" },
2061 [ACTION_EMERGENCY] = { SPECIAL_EMERGENCY_TARGET, "emergency", "isolate" },
2062 [ACTION_DEFAULT] = { SPECIAL_DEFAULT_TARGET, "default", "isolate" },
2063 [ACTION_EXIT] = { SPECIAL_EXIT_TARGET, "exit", "replace-irreversibly" },
2064 [ACTION_SUSPEND] = { SPECIAL_SUSPEND_TARGET, "suspend", "replace-irreversibly" },
2065 [ACTION_HIBERNATE] = { SPECIAL_HIBERNATE_TARGET, "hibernate", "replace-irreversibly" },
2066 [ACTION_HYBRID_SLEEP] = { SPECIAL_HYBRID_SLEEP_TARGET, "hybrid-sleep", "replace-irreversibly" },
2069 static enum action verb_to_action(const char *verb) {
2072 for (i = _ACTION_INVALID; i < _ACTION_MAX; i++)
2073 if (streq_ptr(action_table[i].verb, verb))
2076 return _ACTION_INVALID;
2079 static int start_unit(sd_bus *bus, char **args) {
2080 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
2081 _cleanup_set_free_free_ Set *s = NULL;
2082 const char *method, *mode, *one_name;
2088 ask_password_agent_open_if_enabled();
2090 if (arg_action == ACTION_SYSTEMCTL) {
2093 streq(args[0], "stop") ||
2094 streq(args[0], "condstop") ? "StopUnit" :
2095 streq(args[0], "reload") ? "ReloadUnit" :
2096 streq(args[0], "restart") ? "RestartUnit" :
2098 streq(args[0], "try-restart") ||
2099 streq(args[0], "condrestart") ? "TryRestartUnit" :
2101 streq(args[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
2103 streq(args[0], "reload-or-try-restart") ||
2104 streq(args[0], "condreload") ||
2105 streq(args[0], "force-reload") ? "ReloadOrTryRestartUnit" :
2107 action = verb_to_action(args[0]);
2109 mode = streq(args[0], "isolate") ? "isolate" :
2110 action_table[action].mode ?: arg_job_mode;
2112 one_name = action_table[action].target;
2114 assert(arg_action < ELEMENTSOF(action_table));
2115 assert(action_table[arg_action].target);
2117 method = "StartUnit";
2119 mode = action_table[arg_action].mode;
2120 one_name = action_table[arg_action].target;
2123 if (!arg_no_block) {
2124 r = enable_wait_for_jobs(bus);
2126 log_error("Could not watch jobs: %s", strerror(-r));
2130 s = set_new(string_hash_func, string_compare_func);
2136 r = start_unit_one(bus, method, one_name, mode, &error, s);
2138 r = translate_bus_error_to_exit_status(r, &error);
2142 STRV_FOREACH(name, args+1) {
2145 q = start_unit_one(bus, method, *name, mode, &error, s);
2147 r = translate_bus_error_to_exit_status(r, &error);
2148 sd_bus_error_free(&error);
2153 if (!arg_no_block) {
2156 q = wait_for_jobs(bus, s);
2160 /* When stopping units, warn if they can still be triggered by
2161 * another active unit (socket, path, timer) */
2162 if (!arg_quiet && streq(method, "StopUnit")) {
2164 check_triggering_units(bus, one_name);
2166 STRV_FOREACH(name, args+1)
2167 check_triggering_units(bus, *name);
2174 /* Ask systemd-logind, which might grant access to unprivileged users
2175 * through PolicyKit */
2176 static int reboot_with_logind(sd_bus *bus, enum action a) {
2178 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
2185 polkit_agent_open_if_enabled();
2193 case ACTION_POWEROFF:
2194 method = "PowerOff";
2197 case ACTION_SUSPEND:
2201 case ACTION_HIBERNATE:
2202 method = "Hibernate";
2205 case ACTION_HYBRID_SLEEP:
2206 method = "HybridSleep";
2213 r = sd_bus_call_method(
2215 "org.freedesktop.login1",
2216 "/org/freedesktop/login1",
2217 "org.freedesktop.login1.Manager",
2223 log_error("Failed to execute operation: %s", bus_error_message(&error, r));
2231 static int check_inhibitors(sd_bus *bus, enum action a) {
2233 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
2234 _cleanup_strv_free_ char **sessions = NULL;
2235 const char *what, *who, *why, *mode;
2244 if (arg_ignore_inhibitors || arg_force > 0)
2256 r = sd_bus_call_method(
2258 "org.freedesktop.login1",
2259 "/org/freedesktop/login1",
2260 "org.freedesktop.login1.Manager",
2266 /* If logind is not around, then there are no inhibitors... */
2269 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "(ssssuu)");
2271 return bus_log_parse_error(r);
2273 while ((r = sd_bus_message_read(reply, "(ssssuu)", &what, &who, &why, &mode, &uid, &pid)) > 0) {
2274 _cleanup_free_ char *comm = NULL, *user = NULL;
2275 _cleanup_strv_free_ char **sv = NULL;
2277 if (!streq(mode, "block"))
2280 sv = strv_split(what, ":");
2284 if (!strv_contains(sv,
2286 a == ACTION_POWEROFF ||
2287 a == ACTION_REBOOT ||
2288 a == ACTION_KEXEC ? "shutdown" : "sleep"))
2291 get_process_comm(pid, &comm);
2292 user = uid_to_name(uid);
2294 log_warning("Operation inhibited by \"%s\" (PID %lu \"%s\", user %s), reason is \"%s\".",
2295 who, (unsigned long) pid, strna(comm), strna(user), why);
2300 return bus_log_parse_error(r);
2302 r = sd_bus_message_exit_container(reply);
2304 return bus_log_parse_error(r);
2306 /* Check for current sessions */
2307 sd_get_sessions(&sessions);
2308 STRV_FOREACH(s, sessions) {
2309 _cleanup_free_ char *type = NULL, *tty = NULL, *seat = NULL, *user = NULL, *service = NULL, *class = NULL;
2311 if (sd_session_get_uid(*s, &uid) < 0 || uid == getuid())
2314 if (sd_session_get_class(*s, &class) < 0 || !streq(class, "user"))
2317 if (sd_session_get_type(*s, &type) < 0 || (!streq(type, "x11") && !streq(type, "tty")))
2320 sd_session_get_tty(*s, &tty);
2321 sd_session_get_seat(*s, &seat);
2322 sd_session_get_service(*s, &service);
2323 user = uid_to_name(uid);
2325 log_warning("User %s is logged in on %s.", strna(user), isempty(tty) ? (isempty(seat) ? strna(service) : seat) : tty);
2332 log_error("Please retry operation after closing inhibitors and logging out other users.\nAlternatively, ignore inhibitors and users with 'systemctl %s -i'.",
2333 action_table[a].verb);
2341 static int start_special(sd_bus *bus, char **args) {
2347 a = verb_to_action(args[0]);
2349 r = check_inhibitors(bus, a);
2353 if (arg_force >= 2 && geteuid() != 0) {
2354 log_error("Must be root.");
2358 if (arg_force >= 2 &&
2359 (a == ACTION_HALT ||
2360 a == ACTION_POWEROFF ||
2361 a == ACTION_REBOOT))
2364 if (arg_force >= 1 &&
2365 (a == ACTION_HALT ||
2366 a == ACTION_POWEROFF ||
2367 a == ACTION_REBOOT ||
2368 a == ACTION_KEXEC ||
2370 return daemon_reload(bus, args);
2372 /* first try logind, to allow authentication with polkit */
2373 if (geteuid() != 0 &&
2374 (a == ACTION_POWEROFF ||
2375 a == ACTION_REBOOT ||
2376 a == ACTION_SUSPEND ||
2377 a == ACTION_HIBERNATE ||
2378 a == ACTION_HYBRID_SLEEP)) {
2379 r = reboot_with_logind(bus, a);
2384 r = start_unit(bus, args);
2385 if (r == EXIT_SUCCESS)
2391 static int check_unit_active(sd_bus *bus, char **args) {
2393 int r = 3; /* According to LSB: "program is not running" */
2398 STRV_FOREACH(name, args+1) {
2401 state = check_one_unit(bus, *name, "active\0reloading\0", arg_quiet);
2411 static int check_unit_failed(sd_bus *bus, char **args) {
2418 STRV_FOREACH(name, args+1) {
2421 state = check_one_unit(bus, *name, "failed\0", arg_quiet);
2431 static int kill_unit(sd_bus *bus, char **args) {
2432 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
2440 arg_kill_who = "all";
2442 STRV_FOREACH(name, args+1) {
2443 _cleanup_free_ char *n = NULL;
2445 n = unit_name_mangle(*name);
2449 r = sd_bus_call_method(
2451 "org.freedesktop.systemd1",
2452 "/org/freedesktop/systemd1",
2453 "org.freedesktop.systemd1.Manager",
2457 "ssi", n, arg_kill_who, arg_signal);
2459 log_error("Failed to kill unit %s: %s", n, bus_error_message(&error, r));
2467 typedef struct ExecStatusInfo {
2475 usec_t start_timestamp;
2476 usec_t exit_timestamp;
2481 LIST_FIELDS(struct ExecStatusInfo, exec);
2484 static void exec_status_info_free(ExecStatusInfo *i) {
2493 static int exec_status_info_deserialize(sd_bus_message *m, ExecStatusInfo *i) {
2494 uint64_t start_timestamp, exit_timestamp, start_timestamp_monotonic, exit_timestamp_monotonic;
2497 int32_t code, status;
2503 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_STRUCT, "sasbttttuii");
2505 return bus_log_parse_error(r);
2509 r = sd_bus_message_read(m, "s", &path);
2511 return bus_log_parse_error(r);
2513 i->path = strdup(path);
2517 r = sd_bus_message_read_strv(m, &i->argv);
2519 return bus_log_parse_error(r);
2521 r = sd_bus_message_read(m,
2524 &start_timestamp, &start_timestamp_monotonic,
2525 &exit_timestamp, &exit_timestamp_monotonic,
2529 return bus_log_parse_error(r);
2532 i->start_timestamp = (usec_t) start_timestamp;
2533 i->exit_timestamp = (usec_t) exit_timestamp;
2534 i->pid = (pid_t) pid;
2538 r = sd_bus_message_exit_container(m);
2540 return bus_log_parse_error(r);
2545 typedef struct UnitStatusInfo {
2547 const char *load_state;
2548 const char *active_state;
2549 const char *sub_state;
2550 const char *unit_file_state;
2552 const char *description;
2553 const char *following;
2555 char **documentation;
2557 const char *fragment_path;
2558 const char *source_path;
2559 const char *control_group;
2561 char **dropin_paths;
2563 const char *load_error;
2566 usec_t inactive_exit_timestamp;
2567 usec_t inactive_exit_timestamp_monotonic;
2568 usec_t active_enter_timestamp;
2569 usec_t active_exit_timestamp;
2570 usec_t inactive_enter_timestamp;
2572 bool need_daemon_reload;
2577 const char *status_text;
2578 const char *pid_file;
2581 usec_t start_timestamp;
2582 usec_t exit_timestamp;
2584 int exit_code, exit_status;
2586 usec_t condition_timestamp;
2587 bool condition_result;
2588 bool failed_condition_trigger;
2589 bool failed_condition_negate;
2590 const char *failed_condition;
2591 const char *failed_condition_param;
2594 unsigned n_accepted;
2595 unsigned n_connections;
2598 /* Pairs of type, path */
2602 const char *sysfs_path;
2604 /* Mount, Automount */
2610 LIST_HEAD(ExecStatusInfo, exec);
2613 static void print_status_info(
2618 const char *on, *off, *ss;
2620 char since1[FORMAT_TIMESTAMP_RELATIVE_MAX], *s1;
2621 char since2[FORMAT_TIMESTAMP_MAX], *s2;
2624 arg_all * OUTPUT_SHOW_ALL |
2625 (!on_tty() || pager_have()) * OUTPUT_FULL_WIDTH |
2626 on_tty() * OUTPUT_COLOR |
2627 !arg_quiet * OUTPUT_WARN_CUTOFF |
2628 arg_full * OUTPUT_FULL_WIDTH;
2633 /* This shows pretty information about a unit. See
2634 * print_property() for a low-level property printer */
2636 printf("%s", strna(i->id));
2638 if (i->description && !streq_ptr(i->id, i->description))
2639 printf(" - %s", i->description);
2644 printf(" Follow: unit currently follows state of %s\n", i->following);
2646 if (streq_ptr(i->load_state, "error")) {
2647 on = ansi_highlight_red();
2648 off = ansi_highlight_off();
2652 path = i->source_path ? i->source_path : i->fragment_path;
2655 printf(" Loaded: %s%s%s (Reason: %s)\n",
2656 on, strna(i->load_state), off, i->load_error);
2657 else if (path && i->unit_file_state)
2658 printf(" Loaded: %s%s%s (%s; %s)\n",
2659 on, strna(i->load_state), off, path, i->unit_file_state);
2661 printf(" Loaded: %s%s%s (%s)\n",
2662 on, strna(i->load_state), off, path);
2664 printf(" Loaded: %s%s%s\n",
2665 on, strna(i->load_state), off);
2667 if (!strv_isempty(i->dropin_paths)) {
2668 _cleanup_free_ char *dir = NULL;
2672 STRV_FOREACH(dropin, i->dropin_paths) {
2673 if (! dir || last) {
2674 printf(dir ? " " : " Drop-In: ");
2679 if (path_get_parent(*dropin, &dir) < 0) {
2684 printf("%s\n %s", dir,
2685 draw_special_char(DRAW_TREE_RIGHT));
2688 last = ! (*(dropin + 1) && startswith(*(dropin + 1), dir));
2690 printf("%s%s", path_get_file_name(*dropin), last ? "\n" : ", ");
2694 ss = streq_ptr(i->active_state, i->sub_state) ? NULL : i->sub_state;
2696 if (streq_ptr(i->active_state, "failed")) {
2697 on = ansi_highlight_red();
2698 off = ansi_highlight_off();
2699 } else if (streq_ptr(i->active_state, "active") || streq_ptr(i->active_state, "reloading")) {
2700 on = ansi_highlight_green();
2701 off = ansi_highlight_off();
2706 printf(" Active: %s%s (%s)%s",
2707 on, strna(i->active_state), ss, off);
2709 printf(" Active: %s%s%s",
2710 on, strna(i->active_state), off);
2712 if (!isempty(i->result) && !streq(i->result, "success"))
2713 printf(" (Result: %s)", i->result);
2715 timestamp = (streq_ptr(i->active_state, "active") ||
2716 streq_ptr(i->active_state, "reloading")) ? i->active_enter_timestamp :
2717 (streq_ptr(i->active_state, "inactive") ||
2718 streq_ptr(i->active_state, "failed")) ? i->inactive_enter_timestamp :
2719 streq_ptr(i->active_state, "activating") ? i->inactive_exit_timestamp :
2720 i->active_exit_timestamp;
2722 s1 = format_timestamp_relative(since1, sizeof(since1), timestamp);
2723 s2 = format_timestamp(since2, sizeof(since2), timestamp);
2726 printf(" since %s; %s\n", s2, s1);
2728 printf(" since %s\n", s2);
2732 if (!i->condition_result && i->condition_timestamp > 0) {
2733 s1 = format_timestamp_relative(since1, sizeof(since1), i->condition_timestamp);
2734 s2 = format_timestamp(since2, sizeof(since2), i->condition_timestamp);
2736 printf(" start condition failed at %s%s%s\n",
2737 s2, s1 ? "; " : "", s1 ? s1 : "");
2738 if (i->failed_condition_trigger)
2739 printf(" none of the trigger conditions were met\n");
2740 else if (i->failed_condition)
2741 printf(" %s=%s%s was not met\n",
2742 i->failed_condition,
2743 i->failed_condition_negate ? "!" : "",
2744 i->failed_condition_param);
2748 printf(" Device: %s\n", i->sysfs_path);
2750 printf(" Where: %s\n", i->where);
2752 printf(" What: %s\n", i->what);
2754 STRV_FOREACH(t, i->documentation)
2755 printf(" %*s %s\n", 9, t == i->documentation ? "Docs:" : "", *t);
2757 STRV_FOREACH_PAIR(t, t2, i->listen)
2758 printf(" %*s %s (%s)\n", 9, t == i->listen ? "Listen:" : "", *t2, *t);
2761 printf(" Accepted: %u; Connected: %u\n", i->n_accepted, i->n_connections);
2763 LIST_FOREACH(exec, p, i->exec) {
2764 _cleanup_free_ char *argv = NULL;
2767 /* Only show exited processes here */
2771 argv = strv_join(p->argv, " ");
2772 printf(" Process: %u %s=%s ", p->pid, p->name, strna(argv));
2774 good = is_clean_exit_lsb(p->code, p->status, NULL);
2776 on = ansi_highlight_red();
2777 off = ansi_highlight_off();
2781 printf("%s(code=%s, ", on, sigchld_code_to_string(p->code));
2783 if (p->code == CLD_EXITED) {
2786 printf("status=%i", p->status);
2788 c = exit_status_to_string(p->status, EXIT_STATUS_SYSTEMD);
2793 printf("signal=%s", signal_to_string(p->status));
2795 printf(")%s\n", off);
2797 if (i->main_pid == p->pid &&
2798 i->start_timestamp == p->start_timestamp &&
2799 i->exit_timestamp == p->start_timestamp)
2800 /* Let's not show this twice */
2803 if (p->pid == i->control_pid)
2807 if (i->main_pid > 0 || i->control_pid > 0) {
2808 if (i->main_pid > 0) {
2809 printf(" Main PID: %u", (unsigned) i->main_pid);
2812 _cleanup_free_ char *comm = NULL;
2813 get_process_comm(i->main_pid, &comm);
2815 printf(" (%s)", comm);
2816 } else if (i->exit_code > 0) {
2817 printf(" (code=%s, ", sigchld_code_to_string(i->exit_code));
2819 if (i->exit_code == CLD_EXITED) {
2822 printf("status=%i", i->exit_status);
2824 c = exit_status_to_string(i->exit_status, EXIT_STATUS_SYSTEMD);
2829 printf("signal=%s", signal_to_string(i->exit_status));
2833 if (i->control_pid > 0)
2837 if (i->control_pid > 0) {
2838 _cleanup_free_ char *c = NULL;
2840 printf(" %8s: %u", i->main_pid ? "" : " Control", (unsigned) i->control_pid);
2842 get_process_comm(i->control_pid, &c);
2851 printf(" Status: \"%s\"\n", i->status_text);
2853 if (i->control_group &&
2854 (i->main_pid > 0 || i->control_pid > 0 || cg_is_empty_recursive(SYSTEMD_CGROUP_CONTROLLER, i->control_group, false) == 0)) {
2857 printf(" CGroup: %s\n", i->control_group);
2859 if (arg_transport == BUS_TRANSPORT_LOCAL || arg_transport == BUS_TRANSPORT_CONTAINER) {
2862 char prefix[] = " ";
2865 if (c > sizeof(prefix) - 1)
2866 c -= sizeof(prefix) - 1;
2870 if (i->main_pid > 0)
2871 extra[k++] = i->main_pid;
2873 if (i->control_pid > 0)
2874 extra[k++] = i->control_pid;
2876 show_cgroup_and_extra(SYSTEMD_CGROUP_CONTROLLER, i->control_group, prefix,
2877 c, false, extra, k, flags);
2881 if (i->id && arg_transport == BUS_TRANSPORT_LOCAL) {
2883 show_journal_by_unit(stdout,
2887 i->inactive_exit_timestamp_monotonic,
2891 arg_scope == UNIT_FILE_SYSTEM,
2895 if (i->need_daemon_reload)
2896 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %sdaemon-reload' recommended.\n",
2897 ansi_highlight_red(),
2898 ansi_highlight_off(),
2899 arg_scope == UNIT_FILE_SYSTEM ? "" : "--user ");
2902 static void show_unit_help(UnitStatusInfo *i) {
2907 if (!i->documentation) {
2908 log_info("Documentation for %s not known.", i->id);
2912 STRV_FOREACH(p, i->documentation) {
2914 if (startswith(*p, "man:")) {
2915 const char *args[4] = { "man", NULL, NULL, NULL };
2916 _cleanup_free_ char *page = NULL, *section = NULL;
2923 if ((*p)[k-1] == ')')
2924 e = strrchr(*p, '(');
2927 page = strndup((*p) + 4, e - *p - 4);
2928 section = strndup(e + 1, *p + k - e - 2);
2929 if (!page || !section) {
2941 log_error("Failed to fork: %m");
2947 execvp(args[0], (char**) args);
2948 log_error("Failed to execute man: %m");
2949 _exit(EXIT_FAILURE);
2952 wait_for_terminate(pid, NULL);
2954 log_info("Can't show: %s", *p);
2958 static int status_property(const char *name, sd_bus_message *m, UnitStatusInfo *i, const char *contents) {
2965 switch (contents[0]) {
2967 case SD_BUS_TYPE_STRING: {
2970 r = sd_bus_message_read(m, "s", &s);
2972 return bus_log_parse_error(r);
2975 if (streq(name, "Id"))
2977 else if (streq(name, "LoadState"))
2979 else if (streq(name, "ActiveState"))
2980 i->active_state = s;
2981 else if (streq(name, "SubState"))
2983 else if (streq(name, "Description"))
2985 else if (streq(name, "FragmentPath"))
2986 i->fragment_path = s;
2987 else if (streq(name, "SourcePath"))
2990 else if (streq(name, "DefaultControlGroup")) {
2992 e = startswith(s, SYSTEMD_CGROUP_CONTROLLER ":");
2994 i->control_group = e;
2997 else if (streq(name, "ControlGroup"))
2998 i->control_group = s;
2999 else if (streq(name, "StatusText"))
3001 else if (streq(name, "PIDFile"))
3003 else if (streq(name, "SysFSPath"))
3005 else if (streq(name, "Where"))
3007 else if (streq(name, "What"))
3009 else if (streq(name, "Following"))
3011 else if (streq(name, "UnitFileState"))
3012 i->unit_file_state = s;
3013 else if (streq(name, "Result"))
3020 case SD_BUS_TYPE_BOOLEAN: {
3023 r = sd_bus_message_read(m, "b", &b);
3025 return bus_log_parse_error(r);
3027 if (streq(name, "Accept"))
3029 else if (streq(name, "NeedDaemonReload"))
3030 i->need_daemon_reload = b;
3031 else if (streq(name, "ConditionResult"))
3032 i->condition_result = b;
3037 case SD_BUS_TYPE_UINT32: {
3040 r = sd_bus_message_read(m, "u", &u);
3042 return bus_log_parse_error(r);
3044 if (streq(name, "MainPID")) {
3046 i->main_pid = (pid_t) u;
3049 } else if (streq(name, "ControlPID"))
3050 i->control_pid = (pid_t) u;
3051 else if (streq(name, "ExecMainPID")) {
3053 i->main_pid = (pid_t) u;
3054 } else if (streq(name, "NAccepted"))
3056 else if (streq(name, "NConnections"))
3057 i->n_connections = u;
3062 case SD_BUS_TYPE_INT32: {
3065 r = sd_bus_message_read(m, "i", &j);
3067 return bus_log_parse_error(r);
3069 if (streq(name, "ExecMainCode"))
3070 i->exit_code = (int) j;
3071 else if (streq(name, "ExecMainStatus"))
3072 i->exit_status = (int) j;
3077 case SD_BUS_TYPE_UINT64: {
3080 r = sd_bus_message_read(m, "t", &u);
3082 return bus_log_parse_error(r);
3084 if (streq(name, "ExecMainStartTimestamp"))
3085 i->start_timestamp = (usec_t) u;
3086 else if (streq(name, "ExecMainExitTimestamp"))
3087 i->exit_timestamp = (usec_t) u;
3088 else if (streq(name, "ActiveEnterTimestamp"))
3089 i->active_enter_timestamp = (usec_t) u;
3090 else if (streq(name, "InactiveEnterTimestamp"))
3091 i->inactive_enter_timestamp = (usec_t) u;
3092 else if (streq(name, "InactiveExitTimestamp"))
3093 i->inactive_exit_timestamp = (usec_t) u;
3094 else if (streq(name, "InactiveExitTimestampMonotonic"))
3095 i->inactive_exit_timestamp_monotonic = (usec_t) u;
3096 else if (streq(name, "ActiveExitTimestamp"))
3097 i->active_exit_timestamp = (usec_t) u;
3098 else if (streq(name, "ConditionTimestamp"))
3099 i->condition_timestamp = (usec_t) u;
3104 case SD_BUS_TYPE_ARRAY:
3106 if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && startswith(name, "Exec")) {
3107 _cleanup_free_ ExecStatusInfo *info = NULL;
3109 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(sasbttttuii)");
3111 return bus_log_parse_error(r);
3113 info = new0(ExecStatusInfo, 1);
3117 while ((r = exec_status_info_deserialize(m, info)) > 0) {
3119 info->name = strdup(name);
3123 LIST_PREPEND(exec, i->exec, info);
3125 info = new0(ExecStatusInfo, 1);
3131 return bus_log_parse_error(r);
3133 r = sd_bus_message_exit_container(m);
3135 return bus_log_parse_error(r);
3139 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "Listen")) {
3140 const char *type, *path;
3142 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(ss)");
3144 return bus_log_parse_error(r);
3146 while ((r = sd_bus_message_read(m, "(ss)", &type, &path)) > 0) {
3148 r = strv_extend(&i->listen, type);
3152 r = strv_extend(&i->listen, path);
3157 return bus_log_parse_error(r);
3159 r = sd_bus_message_exit_container(m);
3161 return bus_log_parse_error(r);
3165 } else if (contents[1] == SD_BUS_TYPE_STRING && streq(name, "DropInPaths")) {
3167 r = sd_bus_message_read_strv(m, &i->dropin_paths);
3169 return bus_log_parse_error(r);
3171 } else if (contents[1] == SD_BUS_TYPE_STRING && streq(name, "Documentation")) {
3173 r = sd_bus_message_read_strv(m, &i->documentation);
3175 return bus_log_parse_error(r);
3177 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "Conditions")) {
3178 const char *cond, *param;
3179 int trigger, negate;
3182 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(sbbsi)");
3184 return bus_log_parse_error(r);
3186 while ((r = sd_bus_message_read(m, "(sbbsi)", &cond, &trigger, &negate, ¶m, &state)) > 0) {
3187 log_debug("%s %d %d %s %d", cond, trigger, negate, param, state);
3188 if (state < 0 && (!trigger || !i->failed_condition)) {
3189 i->failed_condition = cond;
3190 i->failed_condition_trigger = trigger;
3191 i->failed_condition_negate = negate;
3192 i->failed_condition_param = param;
3196 return bus_log_parse_error(r);
3198 r = sd_bus_message_exit_container(m);
3200 return bus_log_parse_error(r);
3207 case SD_BUS_TYPE_STRUCT_BEGIN:
3209 if (streq(name, "LoadError")) {
3210 const char *n, *message;
3212 r = sd_bus_message_read(m, "(ss)", &n, &message);
3214 return bus_log_parse_error(r);
3216 if (!isempty(message))
3217 i->load_error = message;
3230 r = sd_bus_message_skip(m, contents);
3232 return bus_log_parse_error(r);
3237 static int print_property(const char *name, sd_bus_message *m, const char *contents) {
3243 /* This is a low-level property printer, see
3244 * print_status_info() for the nicer output */
3246 if (arg_properties && !strv_find(arg_properties, name)) {
3247 /* skip what we didn't read */
3248 r = sd_bus_message_skip(m, contents);
3252 switch (contents[0]) {
3254 case SD_BUS_TYPE_STRUCT_BEGIN:
3256 if (contents[1] == SD_BUS_TYPE_UINT32 && streq(name, "Job")) {
3259 r = sd_bus_message_read(m, "(uo)", &u, NULL);
3261 return bus_log_parse_error(r);
3264 printf("%s=%u\n", name, (unsigned) u);
3266 printf("%s=\n", name);
3270 } else if (contents[1] == SD_BUS_TYPE_STRING && streq(name, "Unit")) {
3273 r = sd_bus_message_read(m, "(so)", &s, NULL);
3275 return bus_log_parse_error(r);
3277 if (arg_all || !isempty(s))
3278 printf("%s=%s\n", name, s);
3282 } else if (contents[1] == SD_BUS_TYPE_STRING && streq(name, "LoadError")) {
3283 const char *a = NULL, *b = NULL;
3285 r = sd_bus_message_read(m, "(ss)", &a, &b);
3287 return bus_log_parse_error(r);
3289 if (arg_all || !isempty(a) || !isempty(b))
3290 printf("%s=%s \"%s\"\n", name, strempty(a), strempty(b));
3297 case SD_BUS_TYPE_ARRAY:
3299 if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "EnvironmentFiles")) {
3303 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(sb)");
3305 return bus_log_parse_error(r);
3307 while ((r = sd_bus_message_read(m, "(sb)", &path, &ignore)) > 0)
3308 printf("EnvironmentFile=%s (ignore_errors=%s)\n", path, yes_no(ignore));
3311 return bus_log_parse_error(r);
3313 r = sd_bus_message_exit_container(m);
3315 return bus_log_parse_error(r);
3319 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "Paths")) {
3320 const char *type, *path;
3322 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(ss)");
3324 return bus_log_parse_error(r);
3326 while ((r = sd_bus_message_read(m, "(ss)", &type, &path)) > 0)
3327 printf("%s=%s\n", type, path);
3329 return bus_log_parse_error(r);
3331 r = sd_bus_message_exit_container(m);
3333 return bus_log_parse_error(r);
3337 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "Listen")) {
3338 const char *type, *path;
3340 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(ss)");
3342 return bus_log_parse_error(r);
3344 while ((r = sd_bus_message_read(m, "(ss)", &type, &path)) > 0)
3345 printf("Listen%s=%s\n", type, path);
3347 return bus_log_parse_error(r);
3349 r = sd_bus_message_exit_container(m);
3351 return bus_log_parse_error(r);
3355 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "Timers")) {
3357 uint64_t value, next_elapse;
3359 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(stt)");
3361 return bus_log_parse_error(r);
3363 while ((r = sd_bus_message_read(m, "(stt)", &base, &value, &next_elapse)) > 0) {
3364 char timespan1[FORMAT_TIMESPAN_MAX], timespan2[FORMAT_TIMESPAN_MAX];
3366 printf("%s={ value=%s ; next_elapse=%s }\n",
3368 format_timespan(timespan1, sizeof(timespan1), value, 0),
3369 format_timespan(timespan2, sizeof(timespan2), next_elapse, 0));
3372 return bus_log_parse_error(r);
3374 r = sd_bus_message_exit_container(m);
3376 return bus_log_parse_error(r);
3380 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && startswith(name, "Exec")) {
3381 ExecStatusInfo info = {};
3383 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(sasbttttuii)");
3385 return bus_log_parse_error(r);
3387 while ((r = exec_status_info_deserialize(m, &info)) > 0) {
3388 char timestamp1[FORMAT_TIMESTAMP_MAX], timestamp2[FORMAT_TIMESTAMP_MAX];
3389 _cleanup_free_ char *tt;
3391 tt = strv_join(info.argv, " ");
3393 printf("%s={ path=%s ; argv[]=%s ; ignore_errors=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
3397 yes_no(info.ignore),
3398 strna(format_timestamp(timestamp1, sizeof(timestamp1), info.start_timestamp)),
3399 strna(format_timestamp(timestamp2, sizeof(timestamp2), info.exit_timestamp)),
3400 (unsigned) info. pid,
3401 sigchld_code_to_string(info.code),
3403 info.code == CLD_EXITED ? "" : "/",
3404 strempty(info.code == CLD_EXITED ? NULL : signal_to_string(info.status)));
3407 strv_free(info.argv);
3411 r = sd_bus_message_exit_container(m);
3413 return bus_log_parse_error(r);
3417 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "DeviceAllow")) {
3418 const char *path, *rwm;
3420 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(ss)");
3422 return bus_log_parse_error(r);
3424 while ((r = sd_bus_message_read(m, "(ss)", &path, &rwm)) > 0)
3425 printf("%s=%s %s\n", name, strna(path), strna(rwm));
3427 return bus_log_parse_error(r);
3429 r = sd_bus_message_exit_container(m);
3431 return bus_log_parse_error(r);
3435 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "BlockIODeviceWeight")) {
3439 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(st)");
3441 return bus_log_parse_error(r);
3443 while ((r = sd_bus_message_read(m, "(st)", &path, &weight)) > 0)
3444 printf("%s=%s %" PRIu64 "\n", name, strna(path), weight);
3446 return bus_log_parse_error(r);
3448 r = sd_bus_message_exit_container(m);
3450 return bus_log_parse_error(r);
3454 } else if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && (streq(name, "BlockIOReadBandwidth") || streq(name, "BlockIOWriteBandwidth"))) {
3458 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(st)");
3460 return bus_log_parse_error(r);
3462 while ((r = sd_bus_message_read(m, "(st)", &path, &bandwidth)) > 0)
3463 printf("%s=%s %" PRIu64 "\n", name, strna(path), bandwidth);
3465 return bus_log_parse_error(r);
3467 r = sd_bus_message_exit_container(m);
3469 return bus_log_parse_error(r);
3477 r = bus_print_property(name, m, arg_all);
3479 return bus_log_parse_error(r);
3482 r = sd_bus_message_skip(m, contents);
3484 return bus_log_parse_error(r);
3487 printf("%s=[unprintable]\n", name);
3493 static int show_one(
3497 bool show_properties,
3501 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
3502 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
3503 UnitStatusInfo info = {};
3510 r = sd_bus_call_method(
3512 "org.freedesktop.systemd1",
3514 "org.freedesktop.DBus.Properties",
3520 log_error("Failed to get properties: %s", bus_error_message(&error, r));
3524 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "{sv}");
3526 return bus_log_parse_error(r);
3533 while ((r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_DICT_ENTRY, "sv")) > 0) {
3534 const char *name, *contents;
3536 r = sd_bus_message_read(reply, "s", &name);
3538 return bus_log_parse_error(r);
3540 r = sd_bus_message_peek_type(reply, NULL, &contents);
3542 return bus_log_parse_error(r);
3544 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_VARIANT, contents);
3546 return bus_log_parse_error(r);
3548 if (show_properties)
3549 r = print_property(name, reply, contents);
3551 r = status_property(name, reply, &info, contents);
3555 r = sd_bus_message_exit_container(reply);
3557 return bus_log_parse_error(r);
3559 r = sd_bus_message_exit_container(reply);
3561 return bus_log_parse_error(r);
3564 return bus_log_parse_error(r);
3566 r = sd_bus_message_exit_container(reply);
3568 return bus_log_parse_error(r);
3572 if (!show_properties) {
3573 if (streq(verb, "help"))
3574 show_unit_help(&info);
3576 print_status_info(&info, ellipsized);
3579 strv_free(info.documentation);
3580 strv_free(info.dropin_paths);
3581 strv_free(info.listen);
3583 if (!streq_ptr(info.active_state, "active") &&
3584 !streq_ptr(info.active_state, "reloading") &&
3585 streq(verb, "status")) {
3586 /* According to LSB: "program not running" */
3587 /* 0: program is running or service is OK
3588 * 1: program is dead and /var/run pid file exists
3589 * 2: program is dead and /var/lock lock file exists
3590 * 3: program is not running
3591 * 4: program or service status is unknown
3593 if (info.pid_file && access(info.pid_file, F_OK) == 0)
3599 while ((p = info.exec)) {
3600 LIST_REMOVE(exec, info.exec, p);
3601 exec_status_info_free(p);
3607 static int get_unit_dbus_path_by_pid(
3612 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
3613 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
3616 r = sd_bus_call_method(
3618 "org.freedesktop.systemd1",
3619 "/org/freedesktop/systemd1",
3620 "org.freedesktop.systemd1.Manager",
3626 log_error("Failed to get unit for PID %lu: %s", (unsigned long) pid, bus_error_message(&error, r));
3630 r = sd_bus_message_read(reply, "o", unit);
3632 return bus_log_parse_error(r);
3637 static int show_all(
3640 bool show_properties,
3644 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
3645 _cleanup_free_ UnitInfo *unit_infos = NULL;
3650 r = get_unit_list(bus, &reply, &unit_infos);
3654 pager_open_if_enabled();
3658 qsort_safe(unit_infos, c, sizeof(UnitInfo), compare_unit_info);
3660 for (u = unit_infos; u < unit_infos + c; u++) {
3661 _cleanup_free_ char *p = NULL;
3663 if (!output_show_unit(u))
3666 p = unit_dbus_path_from_name(u->id);
3670 r = show_one(verb, bus, p, show_properties, new_line, ellipsized);
3678 static int cat(sd_bus *bus, char **args) {
3682 _cleanup_free_ char *unit = NULL, *n = NULL;
3687 pager_open_if_enabled();
3689 STRV_FOREACH(name, args+1) {
3690 _cleanup_free_ char *fragment_path = NULL;
3691 _cleanup_strv_free_ char **dropin_paths = NULL;
3695 n = unit_name_mangle(*name);
3699 unit = unit_dbus_path_from_name(n);
3703 if (need_daemon_reload(bus, n) > 0)
3704 log_warning("Unit file of %s changed on disk. Run 'systemctl%s daemon-reload'.",
3705 n, arg_scope == UNIT_FILE_SYSTEM ? "" : " --user");
3707 r = sd_bus_get_property_string(
3709 "org.freedesktop.systemd1",
3711 "org.freedesktop.systemd1.Unit",
3716 log_warning("Failed to get FragmentPath: %s", bus_error_message(&error, r));
3720 r = sd_bus_get_property_strv(
3722 "org.freedesktop.systemd1",
3724 "org.freedesktop.systemd1.Unit",
3729 log_warning("Failed to get DropInPaths: %s", bus_error_message(&error, r));
3733 if (!isempty(fragment_path)) {
3734 fprintf(stdout, "# %s\n", fragment_path);
3736 r = sendfile_full(STDOUT_FILENO, fragment_path);
3738 log_warning("Failed to cat %s: %s", fragment_path, strerror(-r));
3743 STRV_FOREACH(path, dropin_paths) {
3744 fprintf(stdout, "%s# %s\n",
3745 isempty(fragment_path) && path == dropin_paths ? "" : "\n",
3748 r = sendfile_full(STDOUT_FILENO, *path);
3750 log_warning("Failed to cat %s: %s", *path, strerror(-r));
3759 static int show(sd_bus *bus, char **args) {
3761 bool show_properties, show_status, new_line = false;
3763 bool ellipsized = false;
3768 show_properties = streq(args[0], "show");
3769 show_status = streq(args[0], "status");
3771 if (show_properties)
3772 pager_open_if_enabled();
3774 /* If no argument is specified inspect the manager itself */
3776 if (show_properties && strv_length(args) <= 1)
3777 return show_one(args[0], bus, "/org/freedesktop/systemd1", show_properties, &new_line, &ellipsized);
3779 if (show_status && strv_length(args) <= 1)
3780 ret = show_all(args[0], bus, false, &new_line, &ellipsized);
3782 STRV_FOREACH(name, args+1) {
3783 _cleanup_free_ char *unit = NULL;
3786 if (safe_atou32(*name, &id) < 0) {
3787 _cleanup_free_ char *n = NULL;
3788 /* Interpret as unit name */
3790 n = unit_name_mangle(*name);
3794 unit = unit_dbus_path_from_name(n);
3798 } else if (show_properties) {
3799 /* Interpret as job id */
3800 if (asprintf(&unit, "/org/freedesktop/systemd1/job/%u", id) < 0)
3804 /* Interpret as PID */
3805 r = get_unit_dbus_path_by_pid(bus, id, &unit);
3810 show_one(args[0], bus, unit, show_properties, &new_line, &ellipsized);
3813 if (ellipsized && !arg_quiet)
3814 printf("Hint: Some lines were ellipsized, use -l to show in full.\n");
3819 static int append_assignment(sd_bus_message *m, const char *assignment) {
3827 eq = strchr(assignment, '=');
3829 log_error("Not an assignment: %s", assignment);
3833 field = strndupa(assignment, eq - assignment);
3836 r = sd_bus_message_append_basic(m, SD_BUS_TYPE_STRING, field);
3838 return bus_log_create_error(r);
3840 if (streq(field, "CPUAccounting") ||
3841 streq(field, "MemoryAccounting") ||
3842 streq(field, "BlockIOAccounting")) {
3844 r = parse_boolean(eq);
3846 log_error("Failed to parse boolean assignment %s.", assignment);
3850 r = sd_bus_message_append(m, "v", "b", r);
3852 } else if (streq(field, "MemoryLimit")) {
3855 r = parse_bytes(eq, &bytes);
3857 log_error("Failed to parse bytes specification %s", assignment);
3861 r = sd_bus_message_append(m, "v", "t", (uint64_t) bytes);
3863 } else if (streq(field, "CPUShares") || streq(field, "BlockIOWeight")) {
3866 r = safe_atou64(eq, &u);
3868 log_error("Failed to parse %s value %s.", field, eq);
3872 r = sd_bus_message_append(m, "v", "t", u);
3874 } else if (streq(field, "DevicePolicy"))
3875 r = sd_bus_message_append(m, "v", "s", eq);
3877 else if (streq(field, "DeviceAllow")) {
3880 r = sd_bus_message_append(m, "v", "a(ss)", 0);
3882 const char *path, *rwm;
3885 e = strchr(eq, ' ');
3887 path = strndupa(eq, e - eq);
3894 if (!path_startswith(path, "/dev")) {
3895 log_error("%s is not a device file in /dev.", path);
3899 r = sd_bus_message_append(m, "v", "a(ss)", 1, path, rwm);
3902 } else if (streq(field, "BlockIOReadBandwidth") || streq(field, "BlockIOWriteBandwidth")) {
3905 r = sd_bus_message_append(m, "v", "a(st)", 0);
3907 const char *path, *bandwidth;
3911 e = strchr(eq, ' ');
3913 path = strndupa(eq, e - eq);
3916 log_error("Failed to parse %s value %s.", field, eq);
3920 if (!path_startswith(path, "/dev")) {
3921 log_error("%s is not a device file in /dev.", path);
3925 r = parse_bytes(bandwidth, &bytes);
3927 log_error("Failed to parse byte value %s.", bandwidth);
3931 r = sd_bus_message_append(m, "v", "a(st)", 1, path, (uint64_t) bytes);
3934 } else if (streq(field, "BlockIODeviceWeight")) {
3937 r = sd_bus_message_append(m, "v", "a(st)", 0);
3939 const char *path, *weight;
3943 e = strchr(eq, ' ');
3945 path = strndupa(eq, e - eq);
3948 log_error("Failed to parse %s value %s.", field, eq);
3952 if (!path_startswith(path, "/dev")) {
3953 log_error("%s is not a device file in /dev.", path);
3957 r = safe_atou64(weight, &u);
3959 log_error("Failed to parse %s value %s.", field, weight);
3962 r = sd_bus_message_append(m, "v", "a(st)", path, u);
3966 log_error("Unknown assignment %s.", assignment);
3971 return bus_log_create_error(r);
3976 static int set_property(sd_bus *bus, char **args) {
3977 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
3978 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
3979 _cleanup_free_ char *n = NULL;
3983 r = sd_bus_message_new_method_call(
3985 "org.freedesktop.systemd1",
3986 "/org/freedesktop/systemd1",
3987 "org.freedesktop.systemd1.Manager",
3988 "SetUnitProperties",
3991 return bus_log_create_error(r);
3993 n = unit_name_mangle(args[1]);
3997 r = sd_bus_message_append(m, "sb", n, arg_runtime);
3999 return bus_log_create_error(r);
4001 r = sd_bus_message_open_container(m, SD_BUS_TYPE_ARRAY, "(sv)");
4003 return bus_log_create_error(r);
4005 STRV_FOREACH(i, args + 2) {
4006 r = sd_bus_message_open_container(m, SD_BUS_TYPE_STRUCT, "sv");
4008 return bus_log_create_error(r);
4010 r = append_assignment(m, *i);
4014 r = sd_bus_message_close_container(m);
4016 return bus_log_create_error(r);
4019 r = sd_bus_message_close_container(m);
4021 return bus_log_create_error(r);
4023 r = sd_bus_call(bus, m, 0, &error, NULL);
4025 log_error("Failed to set unit properties on %s: %s", n, bus_error_message(&error, r));
4032 static int snapshot(sd_bus *bus, char **args) {
4033 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4034 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
4035 _cleanup_free_ char *n = NULL, *id = NULL;
4039 if (strv_length(args) > 1)
4040 n = unit_name_mangle_with_suffix(args[1], ".snapshot");
4046 r = sd_bus_call_method(
4048 "org.freedesktop.systemd1",
4049 "/org/freedesktop/systemd1",
4050 "org.freedesktop.systemd1.Manager",
4056 log_error("Failed to create snapshot: %s", bus_error_message(&error, r));
4060 r = sd_bus_message_read(reply, "o", &path);
4062 return bus_log_parse_error(r);
4064 r = sd_bus_get_property_string(
4066 "org.freedesktop.systemd1",
4068 "org.freedesktop.systemd1.Unit",
4073 log_error("Failed to get ID of snapshot: %s", bus_error_message(&error, r));
4083 static int delete_snapshot(sd_bus *bus, char **args) {
4084 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4090 STRV_FOREACH(name, args+1) {
4091 _cleanup_free_ char *n = NULL;
4093 n = unit_name_mangle_with_suffix(*name, ".snapshot");
4097 r = sd_bus_call_method(
4099 "org.freedesktop.systemd1",
4100 "/org/freedesktop/systemd1",
4101 "org.freedesktop.systemd1.Manager",
4107 log_error("Failed to remove snapshot %s: %s", n, bus_error_message(&error, r));
4115 static int daemon_reload(sd_bus *bus, char **args) {
4116 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4120 if (arg_action == ACTION_RELOAD)
4122 else if (arg_action == ACTION_REEXEC)
4123 method = "Reexecute";
4125 assert(arg_action == ACTION_SYSTEMCTL);
4128 streq(args[0], "clear-jobs") ||
4129 streq(args[0], "cancel") ? "ClearJobs" :
4130 streq(args[0], "daemon-reexec") ? "Reexecute" :
4131 streq(args[0], "reset-failed") ? "ResetFailed" :
4132 streq(args[0], "halt") ? "Halt" :
4133 streq(args[0], "poweroff") ? "PowerOff" :
4134 streq(args[0], "reboot") ? "Reboot" :
4135 streq(args[0], "kexec") ? "KExec" :
4136 streq(args[0], "exit") ? "Exit" :
4137 /* "daemon-reload" */ "Reload";
4140 r = sd_bus_call_method(
4142 "org.freedesktop.systemd1",
4143 "/org/freedesktop/systemd1",
4144 "org.freedesktop.systemd1.Manager",
4150 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
4151 /* There's always a fallback possible for
4152 * legacy actions. */
4154 else if ((r == -ETIMEDOUT || r == -ECONNRESET) && streq(method, "Reexecute"))
4155 /* On reexecution, we expect a disconnect, not a
4159 log_error("Failed to execute operation: %s", bus_error_message(&error, r));
4161 return r < 0 ? r : 0;
4164 static int reset_failed(sd_bus *bus, char **args) {
4165 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4169 if (strv_length(args) <= 1)
4170 return daemon_reload(bus, args);
4172 STRV_FOREACH(name, args+1) {
4173 _cleanup_free_ char *n;
4175 n = unit_name_mangle(*name);
4179 r = sd_bus_call_method(
4181 "org.freedesktop.systemd1",
4182 "/org/freedesktop/systemd1",
4183 "org.freedesktop.systemd1.Manager",
4189 log_error("Failed to reset failed state of unit %s: %s", n, bus_error_message(&error, r));
4197 static int show_environment(sd_bus *bus, char **args) {
4198 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4199 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
4203 pager_open_if_enabled();
4205 r = sd_bus_get_property(
4207 "org.freedesktop.systemd1",
4208 "/org/freedesktop/systemd1",
4209 "org.freedesktop.systemd1.Manager",
4215 log_error("Failed to get environment: %s", bus_error_message(&error, r));
4219 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "s");
4221 return bus_log_parse_error(r);
4223 while ((r = sd_bus_message_read_basic(reply, SD_BUS_TYPE_STRING, &text)) > 0)
4226 return bus_log_parse_error(r);
4228 r = sd_bus_message_exit_container(reply);
4230 return bus_log_parse_error(r);
4235 static int switch_root(sd_bus *bus, char **args) {
4236 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4237 _cleanup_free_ char *init = NULL;
4242 l = strv_length(args);
4243 if (l < 2 || l > 3) {
4244 log_error("Wrong number of arguments.");
4251 init = strdup(args[2]);
4253 parse_env_file("/proc/cmdline", WHITESPACE,
4264 log_debug("switching root - root: %s; init: %s", root, init);
4266 r = sd_bus_call_method(
4268 "org.freedesktop.systemd1",
4269 "/org/freedesktop/systemd1",
4270 "org.freedesktop.systemd1.Manager",
4276 log_error("Failed to switch root: %s", bus_error_message(&error, r));
4283 static int set_environment(sd_bus *bus, char **args) {
4284 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4285 _cleanup_bus_message_unref_ sd_bus_message *m = NULL;
4292 method = streq(args[0], "set-environment")
4294 : "UnsetEnvironment";
4296 r = sd_bus_message_new_method_call(
4298 "org.freedesktop.systemd1",
4299 "/org/freedesktop/systemd1",
4300 "org.freedesktop.systemd1.Manager",
4304 return bus_log_create_error(r);
4306 r = sd_bus_message_append_strv(m, args + 1);
4308 return bus_log_create_error(r);
4310 r = sd_bus_call(bus, m, 0, &error, NULL);
4312 log_error("Failed to set environment: %s", bus_error_message(&error, r));
4319 static int enable_sysv_units(const char *verb, char **args) {
4322 #if defined(HAVE_SYSV_COMPAT) && defined(HAVE_CHKCONFIG)
4323 unsigned f = 1, t = 1;
4324 _cleanup_lookup_paths_free_ LookupPaths paths = {};
4326 if (arg_scope != UNIT_FILE_SYSTEM)
4329 if (!streq(verb, "enable") &&
4330 !streq(verb, "disable") &&
4331 !streq(verb, "is-enabled"))
4334 /* Processes all SysV units, and reshuffles the array so that
4335 * afterwards only the native units remain */
4337 r = lookup_paths_init(&paths, SYSTEMD_SYSTEM, false, NULL, NULL, NULL);
4342 for (f = 0; args[f]; f++) {
4344 _cleanup_free_ char *p = NULL, *q = NULL;
4345 bool found_native = false, found_sysv;
4347 const char *argv[6] = { "/sbin/chkconfig", NULL, NULL, NULL, NULL };
4355 if (!endswith(name, ".service"))
4358 if (path_is_absolute(name))
4361 STRV_FOREACH(k, paths.unit_path) {
4362 if (!isempty(arg_root))
4363 asprintf(&p, "%s/%s/%s", arg_root, *k, name);
4365 asprintf(&p, "%s/%s", *k, name);
4372 found_native = access(p, F_OK) >= 0;
4383 if (!isempty(arg_root))
4384 asprintf(&p, "%s/" SYSTEM_SYSVINIT_PATH "/%s", arg_root, name);
4386 asprintf(&p, SYSTEM_SYSVINIT_PATH "/%s", name);
4392 p[strlen(p) - sizeof(".service") + 1] = 0;
4393 found_sysv = access(p, F_OK) >= 0;
4398 /* Mark this entry, so that we don't try enabling it as native unit */
4399 args[f] = (char*) "";
4401 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", name);
4403 if (!isempty(arg_root))
4404 argv[c++] = q = strappend("--root=", arg_root);
4406 argv[c++] = path_get_file_name(p);
4408 streq(verb, "enable") ? "on" :
4409 streq(verb, "disable") ? "off" : "--level=5";
4412 l = strv_join((char**)argv, " ");
4418 log_info("Executing %s", l);
4423 log_error("Failed to fork: %m");
4426 } else if (pid == 0) {
4429 execv(argv[0], (char**) argv);
4430 _exit(EXIT_FAILURE);
4433 j = wait_for_terminate(pid, &status);
4435 log_error("Failed to wait for child: %s", strerror(-r));
4440 if (status.si_code == CLD_EXITED) {
4441 if (streq(verb, "is-enabled")) {
4442 if (status.si_status == 0) {
4451 } else if (status.si_status != 0) {
4462 /* Drop all SysV units */
4463 for (f = 0, t = 0; args[f]; f++) {
4465 if (isempty(args[f]))
4468 args[t++] = args[f];
4477 static int mangle_names(char **original_names, char ***mangled_names) {
4478 char **i, **l, **name;
4480 l = new(char*, strv_length(original_names) + 1);
4485 STRV_FOREACH(name, original_names) {
4487 /* When enabling units qualified path names are OK,
4488 * too, hence allow them explicitly. */
4493 *i = unit_name_mangle(*name);
4509 static int enable_unit(sd_bus *bus, char **args) {
4510 _cleanup_strv_free_ char **mangled_names = NULL;
4511 const char *verb = args[0];
4512 UnitFileChange *changes = NULL;
4513 unsigned n_changes = 0;
4514 int carries_install_info = -1;
4520 r = mangle_names(args+1, &mangled_names);
4524 r = enable_sysv_units(verb, mangled_names);
4528 if (!bus || avoid_bus()) {
4529 if (streq(verb, "enable")) {
4530 r = unit_file_enable(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4531 carries_install_info = r;
4532 } else if (streq(verb, "disable"))
4533 r = unit_file_disable(arg_scope, arg_runtime, arg_root, mangled_names, &changes, &n_changes);
4534 else if (streq(verb, "reenable")) {
4535 r = unit_file_reenable(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4536 carries_install_info = r;
4537 } else if (streq(verb, "link"))
4538 r = unit_file_link(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4539 else if (streq(verb, "preset")) {
4540 r = unit_file_preset(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4541 carries_install_info = r;
4542 } else if (streq(verb, "mask"))
4543 r = unit_file_mask(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4544 else if (streq(verb, "unmask"))
4545 r = unit_file_unmask(arg_scope, arg_runtime, arg_root, mangled_names, &changes, &n_changes);
4547 assert_not_reached("Unknown verb");
4550 log_error("Operation failed: %s", strerror(-r));
4555 dump_unit_file_changes(changes, n_changes);
4559 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL, *m = NULL;
4560 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4561 int expect_carries_install_info = false;
4562 bool send_force = true;
4565 if (streq(verb, "enable")) {
4566 method = "EnableUnitFiles";
4567 expect_carries_install_info = true;
4568 } else if (streq(verb, "disable")) {
4569 method = "DisableUnitFiles";
4571 } else if (streq(verb, "reenable")) {
4572 method = "ReenableUnitFiles";
4573 expect_carries_install_info = true;
4574 } else if (streq(verb, "link"))
4575 method = "LinkUnitFiles";
4576 else if (streq(verb, "preset")) {
4577 method = "PresetUnitFiles";
4578 expect_carries_install_info = true;
4579 } else if (streq(verb, "mask"))
4580 method = "MaskUnitFiles";
4581 else if (streq(verb, "unmask")) {
4582 method = "UnmaskUnitFiles";
4585 assert_not_reached("Unknown verb");
4587 r = sd_bus_message_new_method_call(
4589 "org.freedesktop.systemd1",
4590 "/org/freedesktop/systemd1",
4591 "org.freedesktop.systemd1.Manager",
4595 return bus_log_create_error(r);
4597 r = sd_bus_message_append_strv(m, mangled_names);
4599 return bus_log_create_error(r);
4601 r = sd_bus_message_append(m, "b", arg_runtime);
4603 return bus_log_create_error(r);
4606 r = sd_bus_message_append(m, "b", arg_force);
4608 return bus_log_create_error(r);
4611 r = sd_bus_call(bus, m, 0, &error, &reply);
4613 log_error("Failed to execute operation: %s", bus_error_message(&error, r));
4617 if (expect_carries_install_info) {
4618 r = sd_bus_message_read(reply, "b", &carries_install_info);
4620 return bus_log_parse_error(r);
4623 r = deserialize_and_dump_unit_file_changes(reply);
4627 /* Try to reload if enabeld */
4629 r = daemon_reload(bus, args);
4634 if (carries_install_info == 0)
4635 log_warning("The unit files have no [Install] section. They are not meant to be enabled\n"
4636 "using systemctl.\n"
4637 "Possible reasons for having this kind of units are:\n"
4638 "1) A unit may be statically enabled by being symlinked from another unit's\n"
4639 " .wants/ or .requires/ directory.\n"
4640 "2) A unit's purpose may be to act as a helper for some other unit which has\n"
4641 " a requirement dependency on it.\n"
4642 "3) A unit may be started when needed via activation (socket, path, timer,\n"
4643 " D-Bus, udev, scripted systemctl call, ...).\n");
4646 unit_file_changes_free(changes, n_changes);
4651 static int unit_is_enabled(sd_bus *bus, char **args) {
4653 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
4654 _cleanup_strv_free_ char **mangled_names = NULL;
4659 r = mangle_names(args+1, &mangled_names);
4663 r = enable_sysv_units(args[0], mangled_names);
4669 if (!bus || avoid_bus()) {
4671 STRV_FOREACH(name, mangled_names) {
4672 UnitFileState state;
4674 state = unit_file_get_state(arg_scope, arg_root, *name);
4676 log_error("Failed to get unit file state for %s: %s", *name, strerror(-state));
4680 if (state == UNIT_FILE_ENABLED ||
4681 state == UNIT_FILE_ENABLED_RUNTIME ||
4682 state == UNIT_FILE_STATIC)
4686 puts(unit_file_state_to_string(state));
4690 STRV_FOREACH(name, mangled_names) {
4691 _cleanup_bus_message_unref_ sd_bus_message *reply = NULL;
4694 r = sd_bus_call_method(
4696 "org.freedesktop.systemd1",
4697 "/org/freedesktop/systemd1",
4698 "org.freedesktop.systemd1.Manager",
4704 log_error("Failed to get unit file state for %s: %s", *name, bus_error_message(&error, r));
4708 r = sd_bus_message_read(reply, "s", &s);
4710 return bus_log_parse_error(r);
4712 if (streq(s, "enabled") ||
4713 streq(s, "enabled-runtime") ||
4725 static int systemctl_help(void) {
4727 pager_open_if_enabled();
4729 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4730 "Query or send control commands to the systemd manager.\n\n"
4731 " -h --help Show this help\n"
4732 " --version Show package version\n"
4733 " --system Connect to system manager\n"
4734 " --user Connect to user service manager\n"
4735 " -H --host=[USER@]HOST\n"
4736 " Operate on remote host\n"
4737 " -M --machine=CONTAINER\n"
4738 " Operate on local container\n"
4739 " -t --type=TYPE List only units of a particular type\n"
4740 " --state=STATE List only units with particular LOAD or SUB or ACTIVE state\n"
4741 " -p --property=NAME Show only properties by this name\n"
4742 " -a --all Show all loaded units/properties, including dead/empty\n"
4743 " ones. To list all units installed on the system, use\n"
4744 " the 'list-unit-files' command instead.\n"
4745 " -l --full Don't ellipsize unit names on output\n"
4746 " --reverse Show reverse dependencies with 'list-dependencies'\n"
4747 " --job-mode=MODE Specify how to deal with already queued jobs, when\n"
4748 " queueing a new job\n"
4749 " --show-types When showing sockets, explicitly show their type\n"
4750 " -i --ignore-inhibitors\n"
4751 " When shutting down or sleeping, ignore inhibitors\n"
4752 " --kill-who=WHO Who to send signal to\n"
4753 " -s --signal=SIGNAL Which signal to send\n"
4754 " -q --quiet Suppress output\n"
4755 " --no-block Do not wait until operation finished\n"
4756 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4757 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4759 " --no-legend Do not print a legend (column headers and hints)\n"
4760 " --no-pager Do not pipe output into a pager\n"
4761 " --no-ask-password\n"
4762 " Do not ask for system passwords\n"
4763 " --global Enable/disable unit files globally\n"
4764 " --runtime Enable unit files only temporarily until next reboot\n"
4765 " -f --force When enabling unit files, override existing symlinks\n"
4766 " When shutting down, execute action immediately\n"
4767 " --root=PATH Enable unit files in the specified root directory\n"
4768 " -n --lines=INTEGER Number of journal entries to show\n"
4769 " -o --output=STRING Change journal output mode (short, short-monotonic,\n"
4770 " verbose, export, json, json-pretty, json-sse, cat)\n\n"
4772 " list-units List loaded units\n"
4773 " list-sockets List loaded sockets ordered by address\n"
4774 " list-timers List loaded timers ordered by next elapse\n"
4775 " start [NAME...] Start (activate) one or more units\n"
4776 " stop [NAME...] Stop (deactivate) one or more units\n"
4777 " reload [NAME...] Reload one or more units\n"
4778 " restart [NAME...] Start or restart one or more units\n"
4779 " try-restart [NAME...] Restart one or more units if active\n"
4780 " reload-or-restart [NAME...] Reload one or more units if possible,\n"
4781 " otherwise start or restart\n"
4782 " reload-or-try-restart [NAME...] Reload one or more units if possible,\n"
4783 " otherwise restart if active\n"
4784 " isolate [NAME] Start one unit and stop all others\n"
4785 " kill [NAME...] Send signal to processes of a unit\n"
4786 " is-active [NAME...] Check whether units are active\n"
4787 " is-failed [NAME...] Check whether units are failed\n"
4788 " status [NAME...|PID...] Show runtime status of one or more units\n"
4789 " show [NAME...|JOB...] Show properties of one or more\n"
4790 " units/jobs or the manager\n"
4791 " cat [NAME...] Show files and drop-ins of one or more units\n"
4792 " set-property [NAME] [ASSIGNMENT...]\n"
4793 " Sets one or more properties of a unit\n"
4794 " help [NAME...|PID...] Show manual for one or more units\n"
4795 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4797 " list-dependencies [NAME] Recursively show units which are required\n"
4798 " or wanted by this unit or by which this\n"
4799 " unit is required or wanted\n\n"
4800 "Unit File Commands:\n"
4801 " list-unit-files List installed unit files\n"
4802 " enable [NAME...] Enable one or more unit files\n"
4803 " disable [NAME...] Disable one or more unit files\n"
4804 " reenable [NAME...] Reenable one or more unit files\n"
4805 " preset [NAME...] Enable/disable one or more unit files\n"
4806 " based on preset configuration\n"
4807 " is-enabled [NAME...] Check whether unit files are enabled\n\n"
4808 " mask [NAME...] Mask one or more units\n"
4809 " unmask [NAME...] Unmask one or more units\n"
4810 " link [PATH...] Link one or more units files into\n"
4811 " the search path\n"
4812 " get-default Get the name of the default target\n"
4813 " set-default NAME Set the default target\n\n"
4815 " list-jobs List jobs\n"
4816 " cancel [JOB...] Cancel all, one, or more jobs\n\n"
4817 "Snapshot Commands:\n"
4818 " snapshot [NAME] Create a snapshot\n"
4819 " delete [NAME...] Remove one or more snapshots\n\n"
4820 "Environment Commands:\n"
4821 " show-environment Dump environment\n"
4822 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4823 " unset-environment [NAME...] Unset one or more environment variables\n\n"
4824 "Manager Lifecycle Commands:\n"
4825 " daemon-reload Reload systemd manager configuration\n"
4826 " daemon-reexec Reexecute systemd manager\n\n"
4827 "System Commands:\n"
4828 " default Enter system default mode\n"
4829 " rescue Enter system rescue mode\n"
4830 " emergency Enter system emergency mode\n"
4831 " halt Shut down and halt the system\n"
4832 " poweroff Shut down and power-off the system\n"
4833 " reboot [ARG] Shut down and reboot the system\n"
4834 " kexec Shut down and reboot the system with kexec\n"
4835 " exit Request user instance exit\n"
4836 " switch-root [ROOT] [INIT] Change to a different root file system\n"
4837 " suspend Suspend the system\n"
4838 " hibernate Hibernate the system\n"
4839 " hybrid-sleep Hibernate and suspend the system\n",
4840 program_invocation_short_name);
4845 static int halt_help(void) {
4847 printf("%s [OPTIONS...]%s\n\n"
4848 "%s the system.\n\n"
4849 " --help Show this help\n"
4850 " --halt Halt the machine\n"
4851 " -p --poweroff Switch off the machine\n"
4852 " --reboot Reboot the machine\n"
4853 " -f --force Force immediate halt/power-off/reboot\n"
4854 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4855 " -d --no-wtmp Don't write wtmp record\n"
4856 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4857 program_invocation_short_name,
4858 arg_action == ACTION_REBOOT ? " [ARG]" : "",
4859 arg_action == ACTION_REBOOT ? "Reboot" :
4860 arg_action == ACTION_POWEROFF ? "Power off" :
4866 static int shutdown_help(void) {
4868 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4869 "Shut down the system.\n\n"
4870 " --help Show this help\n"
4871 " -H --halt Halt the machine\n"
4872 " -P --poweroff Power-off the machine\n"
4873 " -r --reboot Reboot the machine\n"
4874 " -h Equivalent to --poweroff, overridden by --halt\n"
4875 " -k Don't halt/power-off/reboot, just send warnings\n"
4876 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4877 " -c Cancel a pending shutdown\n",
4878 program_invocation_short_name);
4883 static int telinit_help(void) {
4885 printf("%s [OPTIONS...] {COMMAND}\n\n"
4886 "Send control commands to the init daemon.\n\n"
4887 " --help Show this help\n"
4888 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4890 " 0 Power-off the machine\n"
4891 " 6 Reboot the machine\n"
4892 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4893 " 1, s, S Enter rescue mode\n"
4894 " q, Q Reload init daemon configuration\n"
4895 " u, U Reexecute init daemon\n",
4896 program_invocation_short_name);
4901 static int runlevel_help(void) {
4903 printf("%s [OPTIONS...]\n\n"
4904 "Prints the previous and current runlevel of the init system.\n\n"
4905 " --help Show this help\n",
4906 program_invocation_short_name);
4911 static int help_types(void) {
4915 puts("Available unit types:");
4916 for (i = 0; i < _UNIT_TYPE_MAX; i++) {
4917 t = unit_type_to_string(i);
4925 static int systemctl_parse_argv(int argc, char *argv[]) {
4934 ARG_IGNORE_DEPENDENCIES,
4946 ARG_NO_ASK_PASSWORD,
4955 static const struct option options[] = {
4956 { "help", no_argument, NULL, 'h' },
4957 { "version", no_argument, NULL, ARG_VERSION },
4958 { "type", required_argument, NULL, 't' },
4959 { "property", required_argument, NULL, 'p' },
4960 { "all", no_argument, NULL, 'a' },
4961 { "reverse", no_argument, NULL, ARG_REVERSE },
4962 { "after", no_argument, NULL, ARG_AFTER },
4963 { "before", no_argument, NULL, ARG_BEFORE },
4964 { "show-types", no_argument, NULL, ARG_SHOW_TYPES },
4965 { "failed", no_argument, NULL, ARG_FAILED }, /* compatibility only */
4966 { "full", no_argument, NULL, 'l' },
4967 { "job-mode", required_argument, NULL, ARG_JOB_MODE },
4968 { "fail", no_argument, NULL, ARG_FAIL }, /* compatibility only */
4969 { "irreversible", no_argument, NULL, ARG_IRREVERSIBLE }, /* compatibility only */
4970 { "ignore-dependencies", no_argument, NULL, ARG_IGNORE_DEPENDENCIES }, /* compatibility only */
4971 { "ignore-inhibitors", no_argument, NULL, 'i' },
4972 { "user", no_argument, NULL, ARG_USER },
4973 { "system", no_argument, NULL, ARG_SYSTEM },
4974 { "global", no_argument, NULL, ARG_GLOBAL },
4975 { "no-block", no_argument, NULL, ARG_NO_BLOCK },
4976 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
4977 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
4978 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4979 { "quiet", no_argument, NULL, 'q' },
4980 { "root", required_argument, NULL, ARG_ROOT },
4981 { "force", no_argument, NULL, ARG_FORCE },
4982 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
4983 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
4984 { "signal", required_argument, NULL, 's' },
4985 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
4986 { "host", required_argument, NULL, 'H' },
4987 { "machine", required_argument, NULL, 'M' },
4988 { "runtime", no_argument, NULL, ARG_RUNTIME },
4989 { "lines", required_argument, NULL, 'n' },
4990 { "output", required_argument, NULL, 'o' },
4991 { "plain", no_argument, NULL, ARG_PLAIN },
4992 { "state", required_argument, NULL, ARG_STATE },
5001 while ((c = getopt_long(argc, argv, "ht:p:alqfs:H:M:n:o:i", options, NULL)) >= 0) {
5006 return systemctl_help();
5009 puts(PACKAGE_STRING);
5010 puts(SYSTEMD_FEATURES);
5017 FOREACH_WORD_SEPARATOR(word, size, optarg, ",", state) {
5018 _cleanup_free_ char *type;
5020 type = strndup(word, size);
5024 if (streq(type, "help")) {
5029 if (unit_type_from_string(type) >= 0) {
5030 if (strv_push(&arg_types, type))
5036 /* It's much nicer to use --state= for
5037 * load states, but let's support this
5038 * in --types= too for compatibility
5039 * with old versions */
5040 if (unit_load_state_from_string(optarg) >= 0) {
5041 if (strv_push(&arg_states, type) < 0)
5047 log_error("Unknown unit type or load state '%s'.", type);
5048 log_info("Use -t help to see a list of allowed values.");
5056 /* Make sure that if the empty property list
5057 was specified, we won't show any properties. */
5058 if (isempty(optarg) && !arg_properties) {
5059 arg_properties = new0(char*, 1);
5060 if (!arg_properties)
5066 FOREACH_WORD_SEPARATOR(word, size, optarg, ",", state) {
5069 prop = strndup(word, size);
5073 if (strv_push(&arg_properties, prop) < 0) {
5080 /* If the user asked for a particular
5081 * property, show it to him, even if it is
5093 arg_dependency = DEPENDENCY_REVERSE;
5097 arg_dependency = DEPENDENCY_AFTER;
5101 arg_dependency = DEPENDENCY_BEFORE;
5104 case ARG_SHOW_TYPES:
5105 arg_show_types = true;
5109 arg_job_mode = optarg;
5113 arg_job_mode = "fail";
5116 case ARG_IRREVERSIBLE:
5117 arg_job_mode = "replace-irreversibly";
5120 case ARG_IGNORE_DEPENDENCIES:
5121 arg_job_mode = "ignore-dependencies";
5125 arg_scope = UNIT_FILE_USER;
5129 arg_scope = UNIT_FILE_SYSTEM;
5133 arg_scope = UNIT_FILE_GLOBAL;
5137 arg_no_block = true;
5141 arg_no_legend = true;
5145 arg_no_pager = true;
5161 if (strv_extend(&arg_states, "failed") < 0)
5179 arg_no_reload = true;
5183 arg_kill_who = optarg;
5187 if ((arg_signal = signal_from_string_try_harder(optarg)) < 0) {
5188 log_error("Failed to parse signal string %s.", optarg);
5193 case ARG_NO_ASK_PASSWORD:
5194 arg_ask_password = false;
5198 arg_transport = BUS_TRANSPORT_REMOTE;
5203 arg_transport = BUS_TRANSPORT_CONTAINER;
5212 if (safe_atou(optarg, &arg_lines) < 0) {
5213 log_error("Failed to parse lines '%s'", optarg);
5219 arg_output = output_mode_from_string(optarg);
5220 if (arg_output < 0) {
5221 log_error("Unknown output '%s'.", optarg);
5227 arg_ignore_inhibitors = true;
5238 FOREACH_WORD_SEPARATOR(word, size, optarg, ",", state) {
5241 s = strndup(word, size);
5245 if (strv_push(&arg_states, s) < 0) {
5257 assert_not_reached("Unhandled option");
5261 if (arg_transport != BUS_TRANSPORT_LOCAL && arg_scope != UNIT_FILE_SYSTEM) {
5262 log_error("Cannot access user instance remotely.");
5269 static int halt_parse_argv(int argc, char *argv[]) {
5278 static const struct option options[] = {
5279 { "help", no_argument, NULL, ARG_HELP },
5280 { "halt", no_argument, NULL, ARG_HALT },
5281 { "poweroff", no_argument, NULL, 'p' },
5282 { "reboot", no_argument, NULL, ARG_REBOOT },
5283 { "force", no_argument, NULL, 'f' },
5284 { "wtmp-only", no_argument, NULL, 'w' },
5285 { "no-wtmp", no_argument, NULL, 'd' },
5286 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5295 if (utmp_get_runlevel(&runlevel, NULL) >= 0)
5296 if (runlevel == '0' || runlevel == '6')
5299 while ((c = getopt_long(argc, argv, "pfwdnih", options, NULL)) >= 0) {
5306 arg_action = ACTION_HALT;
5310 if (arg_action != ACTION_REBOOT)
5311 arg_action = ACTION_POWEROFF;
5315 arg_action = ACTION_REBOOT;
5337 /* Compatibility nops */
5344 assert_not_reached("Unhandled option");
5348 if (arg_action == ACTION_REBOOT && argc == optind + 1) {
5349 r = write_string_file(REBOOT_PARAM_FILE, argv[optind]);
5351 log_error("Failed to write reboot param to "
5352 REBOOT_PARAM_FILE": %s", strerror(-r));
5355 } else if (optind < argc) {
5356 log_error("Too many arguments.");
5363 static int parse_time_spec(const char *t, usec_t *_u) {
5367 if (streq(t, "now"))
5369 else if (!strchr(t, ':')) {
5372 if (safe_atou64(t, &u) < 0)
5375 *_u = now(CLOCK_REALTIME) + USEC_PER_MINUTE * u;
5384 hour = strtol(t, &e, 10);
5385 if (errno > 0 || *e != ':' || hour < 0 || hour > 23)
5388 minute = strtol(e+1, &e, 10);
5389 if (errno > 0 || *e != 0 || minute < 0 || minute > 59)
5392 n = now(CLOCK_REALTIME);
5393 s = (time_t) (n / USEC_PER_SEC);
5395 assert_se(localtime_r(&s, &tm));
5397 tm.tm_hour = (int) hour;
5398 tm.tm_min = (int) minute;
5401 assert_se(s = mktime(&tm));
5403 *_u = (usec_t) s * USEC_PER_SEC;
5406 *_u += USEC_PER_DAY;
5412 static int shutdown_parse_argv(int argc, char *argv[]) {
5419 static const struct option options[] = {
5420 { "help", no_argument, NULL, ARG_HELP },
5421 { "halt", no_argument, NULL, 'H' },
5422 { "poweroff", no_argument, NULL, 'P' },
5423 { "reboot", no_argument, NULL, 'r' },
5424 { "kexec", no_argument, NULL, 'K' }, /* not documented extension */
5425 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5434 while ((c = getopt_long(argc, argv, "HPrhkt:afFc", options, NULL)) >= 0) {
5438 return shutdown_help();
5441 arg_action = ACTION_HALT;
5445 arg_action = ACTION_POWEROFF;
5450 arg_action = ACTION_KEXEC;
5452 arg_action = ACTION_REBOOT;
5456 arg_action = ACTION_KEXEC;
5460 if (arg_action != ACTION_HALT)
5461 arg_action = ACTION_POWEROFF;
5474 /* Compatibility nops */
5478 arg_action = ACTION_CANCEL_SHUTDOWN;
5485 assert_not_reached("Unhandled option");
5489 if (argc > optind && arg_action != ACTION_CANCEL_SHUTDOWN) {
5490 r = parse_time_spec(argv[optind], &arg_when);
5492 log_error("Failed to parse time specification: %s", argv[optind]);
5496 arg_when = now(CLOCK_REALTIME) + USEC_PER_MINUTE;
5498 if (argc > optind && arg_action == ACTION_CANCEL_SHUTDOWN)
5499 /* No time argument for shutdown cancel */
5500 arg_wall = argv + optind;
5501 else if (argc > optind + 1)
5502 /* We skip the time argument */
5503 arg_wall = argv + optind + 1;
5510 static int telinit_parse_argv(int argc, char *argv[]) {
5517 static const struct option options[] = {
5518 { "help", no_argument, NULL, ARG_HELP },
5519 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5523 static const struct {
5527 { '0', ACTION_POWEROFF },
5528 { '6', ACTION_REBOOT },
5529 { '1', ACTION_RESCUE },
5530 { '2', ACTION_RUNLEVEL2 },
5531 { '3', ACTION_RUNLEVEL3 },
5532 { '4', ACTION_RUNLEVEL4 },
5533 { '5', ACTION_RUNLEVEL5 },
5534 { 's', ACTION_RESCUE },
5535 { 'S', ACTION_RESCUE },
5536 { 'q', ACTION_RELOAD },
5537 { 'Q', ACTION_RELOAD },
5538 { 'u', ACTION_REEXEC },
5539 { 'U', ACTION_REEXEC }
5548 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5552 return telinit_help();
5562 assert_not_reached("Unhandled option");
5566 if (optind >= argc) {
5571 if (optind + 1 < argc) {
5572 log_error("Too many arguments.");
5576 if (strlen(argv[optind]) != 1) {
5577 log_error("Expected single character argument.");
5581 for (i = 0; i < ELEMENTSOF(table); i++)
5582 if (table[i].from == argv[optind][0])
5585 if (i >= ELEMENTSOF(table)) {
5586 log_error("Unknown command '%s'.", argv[optind]);
5590 arg_action = table[i].to;
5597 static int runlevel_parse_argv(int argc, char *argv[]) {
5603 static const struct option options[] = {
5604 { "help", no_argument, NULL, ARG_HELP },
5613 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5617 return runlevel_help();
5624 assert_not_reached("Unhandled option");
5628 if (optind < argc) {
5629 log_error("Too many arguments.");
5636 static int parse_argv(int argc, char *argv[]) {
5640 if (program_invocation_short_name) {
5642 if (strstr(program_invocation_short_name, "halt")) {
5643 arg_action = ACTION_HALT;
5644 return halt_parse_argv(argc, argv);
5645 } else if (strstr(program_invocation_short_name, "poweroff")) {
5646 arg_action = ACTION_POWEROFF;
5647 return halt_parse_argv(argc, argv);
5648 } else if (strstr(program_invocation_short_name, "reboot")) {
5650 arg_action = ACTION_KEXEC;
5652 arg_action = ACTION_REBOOT;
5653 return halt_parse_argv(argc, argv);
5654 } else if (strstr(program_invocation_short_name, "shutdown")) {
5655 arg_action = ACTION_POWEROFF;
5656 return shutdown_parse_argv(argc, argv);
5657 } else if (strstr(program_invocation_short_name, "init")) {
5659 if (sd_booted() > 0) {
5660 arg_action = _ACTION_INVALID;
5661 return telinit_parse_argv(argc, argv);
5663 /* Hmm, so some other init system is
5664 * running, we need to forward this
5665 * request to it. For now we simply
5666 * guess that it is Upstart. */
5668 execv(TELINIT, argv);
5670 log_error("Couldn't find an alternative telinit implementation to spawn.");
5674 } else if (strstr(program_invocation_short_name, "runlevel")) {
5675 arg_action = ACTION_RUNLEVEL;
5676 return runlevel_parse_argv(argc, argv);
5680 arg_action = ACTION_SYSTEMCTL;
5681 return systemctl_parse_argv(argc, argv);
5684 _pure_ static int action_to_runlevel(void) {
5686 static const char table[_ACTION_MAX] = {
5687 [ACTION_HALT] = '0',
5688 [ACTION_POWEROFF] = '0',
5689 [ACTION_REBOOT] = '6',
5690 [ACTION_RUNLEVEL2] = '2',
5691 [ACTION_RUNLEVEL3] = '3',
5692 [ACTION_RUNLEVEL4] = '4',
5693 [ACTION_RUNLEVEL5] = '5',
5694 [ACTION_RESCUE] = '1'
5697 assert(arg_action < _ACTION_MAX);
5699 return table[arg_action];
5702 static int talk_initctl(void) {
5704 struct init_request request = {
5705 .magic = INIT_MAGIC,
5707 .cmd = INIT_CMD_RUNLVL
5710 _cleanup_close_ int fd = -1;
5714 rl = action_to_runlevel();
5718 request.runlevel = rl;
5720 fd = open(INIT_FIFO, O_WRONLY|O_NDELAY|O_CLOEXEC|O_NOCTTY);
5722 if (errno == ENOENT)
5725 log_error("Failed to open "INIT_FIFO": %m");
5730 r = loop_write(fd, &request, sizeof(request), false) != sizeof(request);
5732 log_error("Failed to write to "INIT_FIFO": %m");
5733 return errno > 0 ? -errno : -EIO;
5739 static int systemctl_main(sd_bus *bus, int argc, char *argv[], int bus_error) {
5741 static const struct {
5749 int (* const dispatch)(sd_bus *bus, char **args);
5751 { "list-units", LESS, 1, list_units },
5752 { "list-unit-files", EQUAL, 1, list_unit_files },
5753 { "list-sockets", LESS, 1, list_sockets },
5754 { "list-timers", LESS, 1, list_timers },
5755 { "list-jobs", EQUAL, 1, list_jobs },
5756 { "clear-jobs", EQUAL, 1, daemon_reload },
5757 { "cancel", MORE, 2, cancel_job },
5758 { "start", MORE, 2, start_unit },
5759 { "stop", MORE, 2, start_unit },
5760 { "condstop", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5761 { "reload", MORE, 2, start_unit },
5762 { "restart", MORE, 2, start_unit },
5763 { "try-restart", MORE, 2, start_unit },
5764 { "reload-or-restart", MORE, 2, start_unit },
5765 { "reload-or-try-restart", MORE, 2, start_unit },
5766 { "force-reload", MORE, 2, start_unit }, /* For compatibility with SysV */
5767 { "condreload", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5768 { "condrestart", MORE, 2, start_unit }, /* For compatibility with RH */
5769 { "isolate", EQUAL, 2, start_unit },
5770 { "kill", MORE, 2, kill_unit },
5771 { "is-active", MORE, 2, check_unit_active },
5772 { "check", MORE, 2, check_unit_active },
5773 { "is-failed", MORE, 2, check_unit_failed },
5774 { "show", MORE, 1, show },
5775 { "cat", MORE, 2, cat },
5776 { "status", MORE, 1, show },
5777 { "help", MORE, 2, show },
5778 { "snapshot", LESS, 2, snapshot },
5779 { "delete", MORE, 2, delete_snapshot },
5780 { "daemon-reload", EQUAL, 1, daemon_reload },
5781 { "daemon-reexec", EQUAL, 1, daemon_reload },
5782 { "show-environment", EQUAL, 1, show_environment },
5783 { "set-environment", MORE, 2, set_environment },
5784 { "unset-environment", MORE, 2, set_environment },
5785 { "halt", EQUAL, 1, start_special },
5786 { "poweroff", EQUAL, 1, start_special },
5787 { "reboot", EQUAL, 1, start_special },
5788 { "kexec", EQUAL, 1, start_special },
5789 { "suspend", EQUAL, 1, start_special },
5790 { "hibernate", EQUAL, 1, start_special },
5791 { "hybrid-sleep", EQUAL, 1, start_special },
5792 { "default", EQUAL, 1, start_special },
5793 { "rescue", EQUAL, 1, start_special },
5794 { "emergency", EQUAL, 1, start_special },
5795 { "exit", EQUAL, 1, start_special },
5796 { "reset-failed", MORE, 1, reset_failed },
5797 { "enable", MORE, 2, enable_unit },
5798 { "disable", MORE, 2, enable_unit },
5799 { "is-enabled", MORE, 2, unit_is_enabled },
5800 { "reenable", MORE, 2, enable_unit },
5801 { "preset", MORE, 2, enable_unit },
5802 { "mask", MORE, 2, enable_unit },
5803 { "unmask", MORE, 2, enable_unit },
5804 { "link", MORE, 2, enable_unit },
5805 { "switch-root", MORE, 2, switch_root },
5806 { "list-dependencies", LESS, 2, list_dependencies },
5807 { "set-default", EQUAL, 2, set_default },
5808 { "get-default", EQUAL, 1, get_default },
5809 { "set-property", MORE, 3, set_property },
5818 left = argc - optind;
5821 /* Special rule: no arguments means "list-units" */
5824 if (streq(argv[optind], "help") && !argv[optind+1]) {
5825 log_error("This command expects one or more "
5826 "unit names. Did you mean --help?");
5830 for (i = 0; i < ELEMENTSOF(verbs); i++)
5831 if (streq(argv[optind], verbs[i].verb))
5834 if (i >= ELEMENTSOF(verbs)) {
5835 log_error("Unknown operation '%s'.", argv[optind]);
5840 switch (verbs[i].argc_cmp) {
5843 if (left != verbs[i].argc) {
5844 log_error("Invalid number of arguments.");
5851 if (left < verbs[i].argc) {
5852 log_error("Too few arguments.");
5859 if (left > verbs[i].argc) {
5860 log_error("Too many arguments.");
5867 assert_not_reached("Unknown comparison operator.");
5870 /* Require a bus connection for all operations but
5872 if (!streq(verbs[i].verb, "enable") &&
5873 !streq(verbs[i].verb, "disable") &&
5874 !streq(verbs[i].verb, "is-enabled") &&
5875 !streq(verbs[i].verb, "list-unit-files") &&
5876 !streq(verbs[i].verb, "reenable") &&
5877 !streq(verbs[i].verb, "preset") &&
5878 !streq(verbs[i].verb, "mask") &&
5879 !streq(verbs[i].verb, "unmask") &&
5880 !streq(verbs[i].verb, "link") &&
5881 !streq(verbs[i].verb, "set-default") &&
5882 !streq(verbs[i].verb, "get-default")) {
5884 if (running_in_chroot() > 0) {
5885 log_info("Running in chroot, ignoring request.");
5889 if (((!streq(verbs[i].verb, "reboot") &&
5890 !streq(verbs[i].verb, "halt") &&
5891 !streq(verbs[i].verb, "poweroff")) || arg_force <= 0) && !bus) {
5892 log_error("Failed to get D-Bus connection: %s", strerror (-bus_error));
5898 if (!bus && !avoid_bus()) {
5899 log_error("Failed to get D-Bus connection: %s", strerror (-bus_error));
5904 return verbs[i].dispatch(bus, argv + optind);
5907 static int send_shutdownd(usec_t t, char mode, bool dry_run, bool warn, const char *message) {
5909 struct sd_shutdown_command c = {
5916 union sockaddr_union sockaddr = {
5917 .un.sun_family = AF_UNIX,
5918 .un.sun_path = "/run/systemd/shutdownd",
5921 struct iovec iovec[2] = {{
5922 .iov_base = (char*) &c,
5923 .iov_len = offsetof(struct sd_shutdown_command, wall_message),
5926 struct msghdr msghdr = {
5927 .msg_name = &sockaddr,
5928 .msg_namelen = offsetof(struct sockaddr_un, sun_path)
5929 + sizeof("/run/systemd/shutdownd") - 1,
5934 _cleanup_close_ int fd;
5936 fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0);
5940 if (!isempty(message)) {
5941 iovec[1].iov_base = (char*) message;
5942 iovec[1].iov_len = strlen(message);
5943 msghdr.msg_iovlen++;
5946 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0)
5952 static int reload_with_fallback(sd_bus *bus) {
5955 /* First, try systemd via D-Bus. */
5956 if (daemon_reload(bus, NULL) >= 0)
5960 /* Nothing else worked, so let's try signals */
5961 assert(arg_action == ACTION_RELOAD || arg_action == ACTION_REEXEC);
5963 if (kill(1, arg_action == ACTION_RELOAD ? SIGHUP : SIGTERM) < 0) {
5964 log_error("kill() failed: %m");
5971 static int start_with_fallback(sd_bus *bus) {
5974 /* First, try systemd via D-Bus. */
5975 if (start_unit(bus, NULL) >= 0)
5979 /* Nothing else worked, so let's try
5981 if (talk_initctl() > 0)
5984 log_error("Failed to talk to init daemon.");
5988 warn_wall(arg_action);
5992 static int halt_now(enum action a) {
5994 /* Make sure C-A-D is handled by the kernel from this
5996 reboot(RB_ENABLE_CAD);
6001 log_info("Halting.");
6002 reboot(RB_HALT_SYSTEM);
6005 case ACTION_POWEROFF:
6006 log_info("Powering off.");
6007 reboot(RB_POWER_OFF);
6010 case ACTION_REBOOT: {
6011 _cleanup_free_ char *param = NULL;
6013 if (read_one_line_file(REBOOT_PARAM_FILE, ¶m) >= 0) {
6014 log_info("Rebooting with argument '%s'.", param);
6015 syscall(SYS_reboot, LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2,
6016 LINUX_REBOOT_CMD_RESTART2, param);
6019 log_info("Rebooting.");
6020 reboot(RB_AUTOBOOT);
6025 assert_not_reached("Unknown action.");
6029 static int halt_main(sd_bus *bus) {
6032 r = check_inhibitors(bus, arg_action);
6036 if (geteuid() != 0) {
6037 /* Try logind if we are a normal user and no special
6038 * mode applies. Maybe PolicyKit allows us to shutdown
6041 if (arg_when <= 0 &&
6044 (arg_action == ACTION_POWEROFF ||
6045 arg_action == ACTION_REBOOT)) {
6046 r = reboot_with_logind(bus, arg_action);
6051 log_error("Must be root.");
6056 _cleanup_free_ char *m;
6058 m = strv_join(arg_wall, " ");
6062 r = send_shutdownd(arg_when,
6063 arg_action == ACTION_HALT ? 'H' :
6064 arg_action == ACTION_POWEROFF ? 'P' :
6065 arg_action == ACTION_KEXEC ? 'K' :
6072 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r));
6074 char date[FORMAT_TIMESTAMP_MAX];
6076 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
6077 format_timestamp(date, sizeof(date), arg_when));
6082 if (!arg_dry && !arg_force)
6083 return start_with_fallback(bus);
6086 if (sd_booted() > 0)
6087 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
6089 r = utmp_put_shutdown();
6091 log_warning("Failed to write utmp record: %s", strerror(-r));
6098 r = halt_now(arg_action);
6099 log_error("Failed to reboot: %s", strerror(-r));
6104 static int runlevel_main(void) {
6105 int r, runlevel, previous;
6107 r = utmp_get_runlevel(&runlevel, &previous);
6114 previous <= 0 ? 'N' : previous,
6115 runlevel <= 0 ? 'N' : runlevel);
6120 int main(int argc, char*argv[]) {
6121 _cleanup_bus_unref_ sd_bus *bus = NULL;
6124 setlocale(LC_ALL, "");
6125 log_parse_environment();
6128 /* Explicitly not on_tty() to avoid setting cached value.
6129 * This becomes relevant for piping output which might be
6131 original_stdout_is_tty = isatty(STDOUT_FILENO);
6133 r = parse_argv(argc, argv);
6137 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
6138 * let's shortcut this */
6139 if (arg_action == ACTION_RUNLEVEL) {
6140 r = runlevel_main();
6144 if (running_in_chroot() > 0 && arg_action != ACTION_SYSTEMCTL) {
6145 log_info("Running in chroot, ignoring request.");
6151 r = bus_open_transport_systemd(arg_transport, arg_host, arg_scope != UNIT_FILE_SYSTEM, &bus);
6153 /* systemctl_main() will print an error message for the bus
6154 * connection, but only if it needs to */
6156 switch (arg_action) {
6158 case ACTION_SYSTEMCTL:
6159 r = systemctl_main(bus, argc, argv, r);
6163 case ACTION_POWEROFF:
6169 case ACTION_RUNLEVEL2:
6170 case ACTION_RUNLEVEL3:
6171 case ACTION_RUNLEVEL4:
6172 case ACTION_RUNLEVEL5:
6174 case ACTION_EMERGENCY:
6175 case ACTION_DEFAULT:
6176 r = start_with_fallback(bus);
6181 r = reload_with_fallback(bus);
6184 case ACTION_CANCEL_SHUTDOWN: {
6185 _cleanup_free_ char *m = NULL;
6188 m = strv_join(arg_wall, " ");
6195 r = send_shutdownd(arg_when, SD_SHUTDOWN_NONE, false, !arg_no_wall, m);
6197 log_warning("Failed to talk to shutdownd, shutdown hasn't been cancelled: %s", strerror(-r));
6201 case ACTION_RUNLEVEL:
6202 case _ACTION_INVALID:
6204 assert_not_reached("Unknown action");
6209 ask_password_agent_close();
6210 polkit_agent_close();
6212 strv_free(arg_types);
6213 strv_free(arg_states);
6214 strv_free(arg_properties);
6216 return r < 0 ? EXIT_FAILURE : r;