2 This file is part of systemd.
4 Copyright 2010 Lennart Poettering
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
28 #include "alloc-util.h"
29 #include "bus-error.h"
30 #include "bus-unit-util.h"
32 //#include "cgroup-show.h"
33 #include "cgroup-util.h"
35 //#include "logs-show.h"
38 #include "parse-util.h"
39 #include "process-util.h"
40 #include "signal-util.h"
41 //#include "spawn-polkit-agent.h"
43 #include "sysfs-show.h"
44 #include "terminal-util.h"
45 #include "unit-name.h"
46 #include "user-util.h"
50 /// Additional includes needed by elogind
51 #include "eloginctl.h"
53 static char **arg_property = NULL;
54 static bool arg_all = false;
55 static bool arg_value = false;
56 static bool arg_full = false;
57 static bool arg_no_pager = false;
58 static bool arg_legend = true;
59 static const char *arg_kill_who = NULL;
60 static int arg_signal = SIGTERM;
61 #if 0 /// UNNEEDED by elogind
62 static BusTransport arg_transport = BUS_TRANSPORT_LOCAL;
63 static char *arg_host = NULL;
64 static bool arg_ask_password = true;
65 static unsigned arg_lines = 10;
66 static OutputMode arg_output = OUTPUT_SHORT;
68 /// Instead we need this:
69 extern BusTransport arg_transport;
70 static char *arg_host = NULL;
71 extern bool arg_ask_password;
72 extern bool arg_no_wall;
73 extern usec_t arg_when;
74 extern bool arg_ignore_inhibitors;
75 extern elogind_action arg_action;
78 #if 0 /// UNNEEDED by elogind
79 static void polkit_agent_open_if_enabled(void) {
81 /* Open the polkit agent as a child process if necessary */
83 if (!arg_ask_password)
86 if (arg_transport != BUS_TRANSPORT_LOCAL)
92 static OutputFlags get_output_flags(void) {
95 arg_all * OUTPUT_SHOW_ALL |
96 arg_full * OUTPUT_FULL_WIDTH |
97 (!on_tty() || pager_have()) * OUTPUT_FULL_WIDTH |
98 colors_enabled() * OUTPUT_COLOR;
102 static int get_session_path(sd_bus *bus, const char *session_id, sd_bus_error *error, char **path) {
103 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
107 r = sd_bus_call_method(
109 "org.freedesktop.login1",
110 "/org/freedesktop/login1",
111 "org.freedesktop.login1.Manager",
118 r = sd_bus_message_read(reply, "o", &ans);
130 static int list_sessions(int argc, char *argv[], void *userdata) {
131 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
132 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
133 const char *id, *user, *seat, *object;
134 sd_bus *bus = userdata;
142 pager_open(arg_no_pager, false);
144 r = sd_bus_call_method(
146 "org.freedesktop.login1",
147 "/org/freedesktop/login1",
148 "org.freedesktop.login1.Manager",
153 log_error("Failed to list sessions: %s", bus_error_message(&error, r));
157 r = sd_bus_message_enter_container(reply, 'a', "(susso)");
159 return bus_log_parse_error(r);
162 printf("%10s %10s %-16s %-16s %-16s\n", "SESSION", "UID", "USER", "SEAT", "TTY");
164 while ((r = sd_bus_message_read(reply, "(susso)", &id, &uid, &user, &seat, &object)) > 0) {
165 _cleanup_(sd_bus_error_free) sd_bus_error error2 = SD_BUS_ERROR_NULL;
166 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply2 = NULL;
167 _cleanup_free_ char *path = NULL;
168 const char *tty = NULL;
170 r = get_session_path(bus, id, &error2, &path);
172 log_warning("Failed to get session path: %s", bus_error_message(&error, r));
174 r = sd_bus_get_property(
176 "org.freedesktop.login1",
178 "org.freedesktop.login1.Session",
184 log_warning("Failed to get TTY for session %s: %s",
185 id, bus_error_message(&error2, r));
187 r = sd_bus_message_read(reply2, "s", &tty);
189 return bus_log_parse_error(r);
193 printf("%10s %10"PRIu32" %-16s %-16s %-16s\n", id, uid, user, seat, strna(tty));
197 return bus_log_parse_error(r);
200 printf("\n%u sessions listed.\n", k);
205 static int list_users(int argc, char *argv[], void *userdata) {
206 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
207 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
208 const char *user, *object;
209 sd_bus *bus = userdata;
217 pager_open(arg_no_pager, false);
219 r = sd_bus_call_method(
221 "org.freedesktop.login1",
222 "/org/freedesktop/login1",
223 "org.freedesktop.login1.Manager",
228 log_error("Failed to list users: %s", bus_error_message(&error, r));
232 r = sd_bus_message_enter_container(reply, 'a', "(uso)");
234 return bus_log_parse_error(r);
237 printf("%10s %-16s\n", "UID", "USER");
239 while ((r = sd_bus_message_read(reply, "(uso)", &uid, &user, &object)) > 0) {
240 printf("%10"PRIu32" %-16s\n", uid, user);
244 return bus_log_parse_error(r);
247 printf("\n%u users listed.\n", k);
252 static int list_seats(int argc, char *argv[], void *userdata) {
253 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
254 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
255 const char *seat, *object;
256 sd_bus *bus = userdata;
262 pager_open(arg_no_pager, false);
264 r = sd_bus_call_method(
266 "org.freedesktop.login1",
267 "/org/freedesktop/login1",
268 "org.freedesktop.login1.Manager",
273 log_error("Failed to list seats: %s", bus_error_message(&error, r));
277 r = sd_bus_message_enter_container(reply, 'a', "(so)");
279 return bus_log_parse_error(r);
282 printf("%-16s\n", "SEAT");
284 while ((r = sd_bus_message_read(reply, "(so)", &seat, &object)) > 0) {
285 printf("%-16s\n", seat);
289 return bus_log_parse_error(r);
292 printf("\n%u seats listed.\n", k);
297 #if 0 /// UNNEEDED by elogind
298 static int show_unit_cgroup(sd_bus *bus, const char *interface, const char *unit, pid_t leader) {
299 _cleanup_free_ char *cgroup = NULL;
300 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
307 r = show_cgroup_get_unit_path_and_warn(bus, unit, &cgroup);
320 r = unit_show_processes(bus, unit, cgroup, "\t\t ", c, get_output_flags(), &error);
323 if (arg_transport == BUS_TRANSPORT_REMOTE)
326 /* Fallback for older systemd versions where the GetUnitProcesses() call is not yet available */
328 if (cg_is_empty_recursive(SYSTEMD_CGROUP_CONTROLLER, cgroup) != 0 && leader <= 0)
331 show_cgroup_and_extra(SYSTEMD_CGROUP_CONTROLLER, cgroup, "\t\t ", c, &leader, leader > 0, get_output_flags());
333 return log_error_errno(r, "Failed to dump process list: %s", bus_error_message(&error, r));
339 typedef struct SessionStatusInfo {
343 struct dual_timestamp timestamp;
360 typedef struct UserStatusInfo {
364 struct dual_timestamp timestamp;
371 typedef struct SeatStatusInfo {
373 char *active_session;
377 static void session_status_info_clear(SessionStatusInfo *info) {
384 free(info->remote_host);
385 free(info->remote_user);
396 static void user_status_info_clear(UserStatusInfo *info) {
400 strv_free(info->sessions);
407 static void seat_status_info_clear(SeatStatusInfo *info) {
410 free(info->active_session);
411 strv_free(info->sessions);
416 static int prop_map_first_of_struct(sd_bus *bus, const char *member, sd_bus_message *m, sd_bus_error *error, void *userdata) {
417 const char *contents;
420 r = sd_bus_message_peek_type(m, NULL, &contents);
424 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_STRUCT, contents);
428 if (contents[0] == 's' || contents[0] == 'o') {
430 char **p = (char **) userdata;
432 r = sd_bus_message_read_basic(m, contents[0], &s);
436 r = free_and_strdup(p, s);
440 r = sd_bus_message_read_basic(m, contents[0], userdata);
445 r = sd_bus_message_skip(m, contents+1);
449 r = sd_bus_message_exit_container(m);
456 static int prop_map_sessions_strv(sd_bus *bus, const char *member, sd_bus_message *m, sd_bus_error *error, void *userdata) {
463 r = sd_bus_message_enter_container(m, 'a', "(so)");
467 while ((r = sd_bus_message_read(m, "(so)", &name, NULL)) > 0) {
468 r = strv_extend(userdata, name);
475 return sd_bus_message_exit_container(m);
478 static int print_session_status_info(sd_bus *bus, const char *path, bool *new_line) {
480 static const struct bus_properties_map map[] = {
481 { "Id", "s", NULL, offsetof(SessionStatusInfo, id) },
482 { "Name", "s", NULL, offsetof(SessionStatusInfo, name) },
483 { "TTY", "s", NULL, offsetof(SessionStatusInfo, tty) },
484 { "Display", "s", NULL, offsetof(SessionStatusInfo, display) },
485 { "RemoteHost", "s", NULL, offsetof(SessionStatusInfo, remote_host) },
486 { "RemoteUser", "s", NULL, offsetof(SessionStatusInfo, remote_user) },
487 { "Service", "s", NULL, offsetof(SessionStatusInfo, service) },
488 { "Desktop", "s", NULL, offsetof(SessionStatusInfo, desktop) },
489 { "Type", "s", NULL, offsetof(SessionStatusInfo, type) },
490 { "Class", "s", NULL, offsetof(SessionStatusInfo, class) },
491 { "Scope", "s", NULL, offsetof(SessionStatusInfo, scope) },
492 { "State", "s", NULL, offsetof(SessionStatusInfo, state) },
493 { "VTNr", "u", NULL, offsetof(SessionStatusInfo, vtnr) },
494 { "Leader", "u", NULL, offsetof(SessionStatusInfo, leader) },
495 { "Remote", "b", NULL, offsetof(SessionStatusInfo, remote) },
496 { "Timestamp", "t", NULL, offsetof(SessionStatusInfo, timestamp.realtime) },
497 { "TimestampMonotonic", "t", NULL, offsetof(SessionStatusInfo, timestamp.monotonic) },
498 { "User", "(uo)", prop_map_first_of_struct, offsetof(SessionStatusInfo, uid) },
499 { "Seat", "(so)", prop_map_first_of_struct, offsetof(SessionStatusInfo, seat) },
503 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
504 char since1[FORMAT_TIMESTAMP_RELATIVE_MAX], *s1;
505 char since2[FORMAT_TIMESTAMP_MAX], *s2;
506 _cleanup_(session_status_info_clear) SessionStatusInfo i = {};
509 r = bus_map_all_properties(bus, "org.freedesktop.login1", path, map, &error, &i);
511 return log_error_errno(r, "Could not get properties: %s", bus_error_message(&error, r));
518 printf("%s - ", strna(i.id));
521 printf("%s (%"PRIu32")\n", i.name, i.uid);
523 printf("%"PRIu32"\n", i.uid);
525 s1 = format_timestamp_relative(since1, sizeof(since1), i.timestamp.realtime);
526 s2 = format_timestamp(since2, sizeof(since2), i.timestamp.realtime);
529 printf("\t Since: %s; %s\n", s2, s1);
531 printf("\t Since: %s\n", s2);
534 _cleanup_free_ char *t = NULL;
536 printf("\t Leader: %"PRIu32, i.leader);
538 get_process_comm(i.leader, &t);
545 if (!isempty(i.seat)) {
546 printf("\t Seat: %s", i.seat);
549 printf("; vc%u", i.vtnr);
555 printf("\t TTY: %s\n", i.tty);
557 printf("\t Display: %s\n", i.display);
559 if (i.remote_host && i.remote_user)
560 printf("\t Remote: %s@%s\n", i.remote_user, i.remote_host);
561 else if (i.remote_host)
562 printf("\t Remote: %s\n", i.remote_host);
563 else if (i.remote_user)
564 printf("\t Remote: user %s\n", i.remote_user);
566 printf("\t Remote: Yes\n");
569 printf("\t Service: %s", i.service);
572 printf("; type %s", i.type);
575 printf("; class %s", i.class);
579 printf("\t Type: %s", i.type);
582 printf("; class %s", i.class);
586 printf("\t Class: %s\n", i.class);
588 if (!isempty(i.desktop))
589 printf("\t Desktop: %s\n", i.desktop);
592 printf("\t State: %s\n", i.state);
595 printf("\t Unit: %s\n", i.scope);
596 #if 0 /// UNNEEDED by elogind
597 show_unit_cgroup(bus, "org.freedesktop.systemd1.Scope", i.scope, i.leader);
599 if (arg_transport == BUS_TRANSPORT_LOCAL) {
601 show_journal_by_unit(
606 i.timestamp.monotonic,
609 get_output_flags() | OUTPUT_BEGIN_NEWLINE,
610 SD_JOURNAL_LOCAL_ONLY,
620 static int print_user_status_info(sd_bus *bus, const char *path, bool *new_line) {
622 static const struct bus_properties_map map[] = {
623 { "Name", "s", NULL, offsetof(UserStatusInfo, name) },
624 { "Linger", "b", NULL, offsetof(UserStatusInfo, linger) },
625 { "Slice", "s", NULL, offsetof(UserStatusInfo, slice) },
626 { "State", "s", NULL, offsetof(UserStatusInfo, state) },
627 { "UID", "u", NULL, offsetof(UserStatusInfo, uid) },
628 { "Timestamp", "t", NULL, offsetof(UserStatusInfo, timestamp.realtime) },
629 { "TimestampMonotonic", "t", NULL, offsetof(UserStatusInfo, timestamp.monotonic) },
630 { "Display", "(so)", prop_map_first_of_struct, offsetof(UserStatusInfo, display) },
631 { "Sessions", "a(so)", prop_map_sessions_strv, offsetof(UserStatusInfo, sessions) },
635 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
636 char since1[FORMAT_TIMESTAMP_RELATIVE_MAX], *s1;
637 char since2[FORMAT_TIMESTAMP_MAX], *s2;
638 _cleanup_(user_status_info_clear) UserStatusInfo i = {};
641 r = bus_map_all_properties(bus, "org.freedesktop.login1", path, map, &error, &i);
643 return log_error_errno(r, "Could not get properties: %s", bus_error_message(&error, r));
651 printf("%s (%"PRIu32")\n", i.name, i.uid);
653 printf("%"PRIu32"\n", i.uid);
655 s1 = format_timestamp_relative(since1, sizeof(since1), i.timestamp.realtime);
656 s2 = format_timestamp(since2, sizeof(since2), i.timestamp.realtime);
659 printf("\t Since: %s; %s\n", s2, s1);
661 printf("\t Since: %s\n", s2);
663 if (!isempty(i.state))
664 printf("\t State: %s\n", i.state);
666 if (!strv_isempty(i.sessions)) {
668 printf("\tSessions:");
670 STRV_FOREACH(l, i.sessions)
672 streq_ptr(*l, i.display) ? "*" : "",
678 printf("\t Linger: %s\n", yes_no(i.linger));
681 printf("\t Unit: %s\n", i.slice);
682 #if 0 /// UNNEEDED by elogind
683 show_unit_cgroup(bus, "org.freedesktop.systemd1.Slice", i.slice, 0);
685 show_journal_by_unit(
690 i.timestamp.monotonic,
693 get_output_flags() | OUTPUT_BEGIN_NEWLINE,
694 SD_JOURNAL_LOCAL_ONLY,
703 static int print_seat_status_info(sd_bus *bus, const char *path, bool *new_line) {
705 static const struct bus_properties_map map[] = {
706 { "Id", "s", NULL, offsetof(SeatStatusInfo, id) },
707 { "ActiveSession", "(so)", prop_map_first_of_struct, offsetof(SeatStatusInfo, active_session) },
708 { "Sessions", "a(so)", prop_map_sessions_strv, offsetof(SeatStatusInfo, sessions) },
712 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
713 _cleanup_(seat_status_info_clear) SeatStatusInfo i = {};
716 r = bus_map_all_properties(bus, "org.freedesktop.login1", path, map, &error, &i);
718 return log_error_errno(r, "Could not get properties: %s", bus_error_message(&error, r));
725 printf("%s\n", strna(i.id));
727 if (!strv_isempty(i.sessions)) {
729 printf("\tSessions:");
731 STRV_FOREACH(l, i.sessions) {
732 if (streq_ptr(*l, i.active_session))
741 if (arg_transport == BUS_TRANSPORT_LOCAL) {
750 printf("\t Devices:\n");
752 show_sysfs(i.id, "\t\t ", c);
758 #define property(name, fmt, ...) \
761 printf(fmt "\n", __VA_ARGS__); \
763 printf("%s=" fmt "\n", name, __VA_ARGS__); \
766 static int print_property(const char *name, sd_bus_message *m, const char *contents) {
773 if (arg_property && !strv_find(arg_property, name))
774 /* skip what we didn't read */
775 return sd_bus_message_skip(m, contents);
777 switch (contents[0]) {
779 case SD_BUS_TYPE_STRUCT_BEGIN:
781 if (contents[1] == SD_BUS_TYPE_STRING && STR_IN_SET(name, "Display", "Seat", "ActiveSession")) {
784 r = sd_bus_message_read(m, "(so)", &s, NULL);
786 return bus_log_parse_error(r);
788 if (arg_all || !isempty(s))
789 property(name, "%s", s);
793 } else if (contents[1] == SD_BUS_TYPE_UINT32 && streq(name, "User")) {
796 r = sd_bus_message_read(m, "(uo)", &uid, NULL);
798 return bus_log_parse_error(r);
800 if (!uid_is_valid(uid)) {
801 log_error("Invalid user ID: " UID_FMT, uid);
805 property(name, UID_FMT, uid);
811 case SD_BUS_TYPE_ARRAY:
813 if (contents[1] == SD_BUS_TYPE_STRUCT_BEGIN && streq(name, "Sessions")) {
817 r = sd_bus_message_enter_container(m, SD_BUS_TYPE_ARRAY, "(so)");
819 return bus_log_parse_error(r);
824 while ((r = sd_bus_message_read(m, "(so)", &s, NULL)) > 0) {
825 printf("%s%s", space ? " " : "", s);
829 if (space || !arg_value)
833 return bus_log_parse_error(r);
835 r = sd_bus_message_exit_container(m);
837 return bus_log_parse_error(r);
845 r = bus_print_property(name, m, arg_value, arg_all);
847 return bus_log_parse_error(r);
850 r = sd_bus_message_skip(m, contents);
852 return bus_log_parse_error(r);
855 printf("%s=[unprintable]\n", name);
861 static int show_properties(sd_bus *bus, const char *path, bool *new_line) {
862 _cleanup_(sd_bus_message_unrefp) sd_bus_message *reply = NULL;
863 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
870 r = sd_bus_call_method(
872 "org.freedesktop.login1",
874 "org.freedesktop.DBus.Properties",
880 return log_error_errno(r, "Failed to get properties: %s", bus_error_message(&error, r));
882 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_ARRAY, "{sv}");
884 return bus_log_parse_error(r);
891 while ((r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_DICT_ENTRY, "sv")) > 0) {
892 const char *name, *contents;
894 r = sd_bus_message_read(reply, "s", &name);
896 return bus_log_parse_error(r);
898 r = sd_bus_message_peek_type(reply, NULL, &contents);
900 return bus_log_parse_error(r);
902 r = sd_bus_message_enter_container(reply, SD_BUS_TYPE_VARIANT, contents);
904 return bus_log_parse_error(r);
906 r = print_property(name, reply, contents);
910 r = sd_bus_message_exit_container(reply);
912 return bus_log_parse_error(r);
914 r = sd_bus_message_exit_container(reply);
916 return bus_log_parse_error(r);
919 return bus_log_parse_error(r);
921 r = sd_bus_message_exit_container(reply);
923 return bus_log_parse_error(r);
928 static int show_session(int argc, char *argv[], void *userdata) {
929 bool properties, new_line = false;
930 sd_bus *bus = userdata;
932 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
933 _cleanup_free_ char *path = NULL;
938 properties = !strstr(argv[0], "status");
940 pager_open(arg_no_pager, false);
943 const char *session, *p = "/org/freedesktop/login1/session/self";
946 /* If no argument is specified inspect the manager itself */
947 return show_properties(bus, "/org/freedesktop/login1", &new_line);
949 /* And in the pretty case, show data of the calling session */
950 session = getenv("XDG_SESSION_ID");
952 r = get_session_path(bus, session, &error, &path);
954 log_error("Failed to get session path: %s", bus_error_message(&error, r));
960 return print_session_status_info(bus, p, &new_line);
963 for (i = 1; i < argc; i++) {
964 r = get_session_path(bus, argv[i], &error, &path);
966 log_error("Failed to get session path: %s", bus_error_message(&error, r));
971 r = show_properties(bus, path, &new_line);
973 r = print_session_status_info(bus, path, &new_line);
982 static int show_user(int argc, char *argv[], void *userdata) {
983 bool properties, new_line = false;
984 sd_bus *bus = userdata;
990 properties = !strstr(argv[0], "status");
992 pager_open(arg_no_pager, false);
995 /* If not argument is specified inspect the manager
998 return show_properties(bus, "/org/freedesktop/login1", &new_line);
1000 return print_user_status_info(bus, "/org/freedesktop/login1/user/self", &new_line);
1003 for (i = 1; i < argc; i++) {
1004 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1005 _cleanup_(sd_bus_message_unrefp) sd_bus_message * reply = NULL;
1006 const char *path = NULL;
1009 r = get_user_creds((const char**) (argv+i), &uid, NULL, NULL, NULL);
1011 return log_error_errno(r, "Failed to look up user %s: %m", argv[i]);
1013 r = sd_bus_call_method(
1015 "org.freedesktop.login1",
1016 "/org/freedesktop/login1",
1017 "org.freedesktop.login1.Manager",
1020 "u", (uint32_t) uid);
1022 log_error("Failed to get user: %s", bus_error_message(&error, r));
1026 r = sd_bus_message_read(reply, "o", &path);
1028 return bus_log_parse_error(r);
1031 r = show_properties(bus, path, &new_line);
1033 r = print_user_status_info(bus, path, &new_line);
1042 static int show_seat(int argc, char *argv[], void *userdata) {
1043 bool properties, new_line = false;
1044 sd_bus *bus = userdata;
1050 properties = !strstr(argv[0], "status");
1052 pager_open(arg_no_pager, false);
1055 /* If not argument is specified inspect the manager
1058 return show_properties(bus, "/org/freedesktop/login1", &new_line);
1060 return print_seat_status_info(bus, "/org/freedesktop/login1/seat/self", &new_line);
1063 for (i = 1; i < argc; i++) {
1064 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1065 _cleanup_(sd_bus_message_unrefp) sd_bus_message * reply = NULL;
1066 const char *path = NULL;
1068 r = sd_bus_call_method(
1070 "org.freedesktop.login1",
1071 "/org/freedesktop/login1",
1072 "org.freedesktop.login1.Manager",
1077 log_error("Failed to get seat: %s", bus_error_message(&error, r));
1081 r = sd_bus_message_read(reply, "o", &path);
1083 return bus_log_parse_error(r);
1086 r = show_properties(bus, path, &new_line);
1088 r = print_seat_status_info(bus, path, &new_line);
1097 static int activate(int argc, char *argv[], void *userdata) {
1098 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1099 sd_bus *bus = userdata;
1100 char *short_argv[3];
1106 polkit_agent_open_if_enabled();
1109 /* No argument? Let's either use $XDG_SESSION_ID (if specified), or an empty
1110 * session name, in which case logind will try to guess our session. */
1112 short_argv[0] = argv[0];
1113 short_argv[1] = getenv("XDG_SESSION_ID") ?: (char*) "";
1114 short_argv[2] = NULL;
1120 for (i = 1; i < argc; i++) {
1122 r = sd_bus_call_method(
1124 "org.freedesktop.login1",
1125 "/org/freedesktop/login1",
1126 "org.freedesktop.login1.Manager",
1127 streq(argv[0], "lock-session") ? "LockSession" :
1128 streq(argv[0], "unlock-session") ? "UnlockSession" :
1129 streq(argv[0], "terminate-session") ? "TerminateSession" :
1134 log_error("Failed to issue method call: %s", bus_error_message(&error, -r));
1142 static int kill_session(int argc, char *argv[], void *userdata) {
1143 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1144 sd_bus *bus = userdata;
1150 polkit_agent_open_if_enabled();
1153 arg_kill_who = "all";
1155 for (i = 1; i < argc; i++) {
1157 r = sd_bus_call_method(
1159 "org.freedesktop.login1",
1160 "/org/freedesktop/login1",
1161 "org.freedesktop.login1.Manager",
1164 "ssi", argv[i], arg_kill_who, arg_signal);
1166 log_error("Could not kill session: %s", bus_error_message(&error, -r));
1174 static int enable_linger(int argc, char *argv[], void *userdata) {
1175 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1176 sd_bus *bus = userdata;
1177 char* short_argv[3];
1184 polkit_agent_open_if_enabled();
1186 b = streq(argv[0], "enable-linger");
1189 /* No argument? Let's either use $XDG_SESSION_ID (if specified), or an empty
1190 * session name, in which case logind will try to guess our session. */
1192 short_argv[0] = argv[0];
1193 short_argv[1] = getenv("XDG_SESSION_ID") ?: (char*) "";
1194 short_argv[2] = NULL;
1199 for (i = 1; i < argc; i++) {
1202 if (isempty(argv[i]))
1205 r = get_user_creds((const char**) (argv+i), &uid, NULL, NULL, NULL);
1207 return log_error_errno(r, "Failed to look up user %s: %m", argv[i]);
1210 r = sd_bus_call_method(
1212 "org.freedesktop.login1",
1213 "/org/freedesktop/login1",
1214 "org.freedesktop.login1.Manager",
1217 "ubb", (uint32_t) uid, b, true);
1219 log_error("Could not enable linger: %s", bus_error_message(&error, -r));
1227 static int terminate_user(int argc, char *argv[], void *userdata) {
1228 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1229 sd_bus *bus = userdata;
1235 polkit_agent_open_if_enabled();
1237 for (i = 1; i < argc; i++) {
1240 r = get_user_creds((const char**) (argv+i), &uid, NULL, NULL, NULL);
1242 return log_error_errno(r, "Failed to look up user %s: %m", argv[i]);
1244 r = sd_bus_call_method(
1246 "org.freedesktop.login1",
1247 "/org/freedesktop/login1",
1248 "org.freedesktop.login1.Manager",
1251 "u", (uint32_t) uid);
1253 log_error("Could not terminate user: %s", bus_error_message(&error, -r));
1261 static int kill_user(int argc, char *argv[], void *userdata) {
1262 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1263 sd_bus *bus = userdata;
1269 polkit_agent_open_if_enabled();
1272 arg_kill_who = "all";
1274 for (i = 1; i < argc; i++) {
1277 r = get_user_creds((const char**) (argv+i), &uid, NULL, NULL, NULL);
1279 return log_error_errno(r, "Failed to look up user %s: %m", argv[i]);
1281 r = sd_bus_call_method(
1283 "org.freedesktop.login1",
1284 "/org/freedesktop/login1",
1285 "org.freedesktop.login1.Manager",
1288 "ui", (uint32_t) uid, arg_signal);
1290 log_error("Could not kill user: %s", bus_error_message(&error, -r));
1298 static int attach(int argc, char *argv[], void *userdata) {
1299 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1300 sd_bus *bus = userdata;
1306 polkit_agent_open_if_enabled();
1308 for (i = 2; i < argc; i++) {
1310 r = sd_bus_call_method(
1312 "org.freedesktop.login1",
1313 "/org/freedesktop/login1",
1314 "org.freedesktop.login1.Manager",
1317 "ssb", argv[1], argv[i], true);
1320 log_error("Could not attach device: %s", bus_error_message(&error, -r));
1328 static int flush_devices(int argc, char *argv[], void *userdata) {
1329 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1330 sd_bus *bus = userdata;
1336 polkit_agent_open_if_enabled();
1338 r = sd_bus_call_method(
1340 "org.freedesktop.login1",
1341 "/org/freedesktop/login1",
1342 "org.freedesktop.login1.Manager",
1347 log_error("Could not flush devices: %s", bus_error_message(&error, -r));
1352 static int lock_sessions(int argc, char *argv[], void *userdata) {
1353 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1354 sd_bus *bus = userdata;
1360 polkit_agent_open_if_enabled();
1362 r = sd_bus_call_method(
1364 "org.freedesktop.login1",
1365 "/org/freedesktop/login1",
1366 "org.freedesktop.login1.Manager",
1367 streq(argv[0], "lock-sessions") ? "LockSessions" : "UnlockSessions",
1371 log_error("Could not lock sessions: %s", bus_error_message(&error, -r));
1376 static int terminate_seat(int argc, char *argv[], void *userdata) {
1377 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
1378 sd_bus *bus = userdata;
1384 polkit_agent_open_if_enabled();
1386 for (i = 1; i < argc; i++) {
1388 r = sd_bus_call_method(
1390 "org.freedesktop.login1",
1391 "/org/freedesktop/login1",
1392 "org.freedesktop.login1.Manager",
1397 log_error("Could not terminate seat: %s", bus_error_message(&error, -r));
1405 static int help(int argc, char *argv[], void *userdata) {
1407 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
1408 "Send control commands to or query the login manager.\n\n"
1409 " -h --help Show this help\n"
1410 " --version Show package version\n"
1411 " --no-pager Do not pipe output into a pager\n"
1412 #if 1 /// elogind supports --no-wall
1413 " --no-wall Do not print any wall message\n"
1415 " --no-legend Do not show the headers and footers\n"
1416 " --no-ask-password Don't prompt for password\n"
1417 " -H --host=[USER@]HOST Operate on remote host\n"
1418 " -M --machine=CONTAINER Operate on local container\n"
1419 " -p --property=NAME Show only properties by this name\n"
1420 " -a --all Show all properties, including empty ones\n"
1421 " --value When showing properties, only print the value\n"
1422 " -l --full Do not ellipsize output\n"
1423 " --kill-who=WHO Who to send signal to\n"
1424 " -s --signal=SIGNAL Which signal to send\n"
1425 #if 0 /// UNNEEDED by elogind
1426 " -n --lines=INTEGER Number of journal entries to show\n"
1427 " -o --output=STRING Change journal output mode (short, short-precise,\n"
1428 " short-iso, short-iso-precise, short-full,\n"
1429 " short-monotonic, short-unix, verbose, export,\n"
1430 " json, json-pretty, json-sse, cat)\n"
1432 /// elogind can cancel shutdowns and allows to ignore inhibitors
1433 " -c Cancel a pending shutdown or reboot\n"
1434 " -i --ignore-inhibitors When shutting down or sleeping, ignore inhibitors\n\n"
1436 "Session Commands:\n"
1437 #if 0 /// elogind has "list" as a shorthand for "list-sessions"
1438 " list-sessions List sessions\n"
1440 " list[-sessions] List sessions (default command)\n"
1442 " session-status [ID...] Show session status\n"
1443 " show-session [ID...] Show properties of sessions or the manager\n"
1444 " activate [ID] Activate a session\n"
1445 " lock-session [ID...] Screen lock one or more sessions\n"
1446 " unlock-session [ID...] Screen unlock one or more sessions\n"
1447 " lock-sessions Screen lock all current sessions\n"
1448 " unlock-sessions Screen unlock all current sessions\n"
1449 " terminate-session ID... Terminate one or more sessions\n"
1450 " kill-session ID... Send signal to processes of a session\n\n"
1452 " list-users List users\n"
1453 " user-status [USER...] Show user status\n"
1454 " show-user [USER...] Show properties of users or the manager\n"
1455 " enable-linger [USER...] Enable linger state of one or more users\n"
1456 " disable-linger [USER...] Disable linger state of one or more users\n"
1457 " terminate-user USER... Terminate all sessions of one or more users\n"
1458 " kill-user USER... Send signal to processes of a user\n\n"
1460 " list-seats List seats\n"
1461 " seat-status [NAME...] Show seat status\n"
1462 " show-seat [NAME...] Show properties of seats or the manager\n"
1463 " attach NAME DEVICE... Attach one or more devices to a seat\n"
1464 " flush-devices Flush all device associations\n"
1465 #if 0 /// elogind adds some system commands to loginctl
1466 " terminate-seat NAME... Terminate all sessions on one or more seats\n"
1468 " terminate-seat NAME... Terminate all sessions on one or more seats\n\n"
1469 "System Commands:\n"
1470 " poweroff [TIME] [WALL...] Turn off the machine\n"
1471 " reboot [TIME] [WALL...] Reboot the machine\n"
1472 " suspend Suspend the machine to memory\n"
1473 " hibernate Suspend the machine to disk\n"
1474 " hybrid-sleep Suspend the machine to memory and disk\n"
1476 , program_invocation_short_name);
1481 static int parse_argv(int argc, char *argv[]) {
1484 ARG_VERSION = 0x100,
1487 #if 1 /// elogind supports --no-wall
1492 ARG_NO_ASK_PASSWORD,
1495 static const struct option options[] = {
1496 { "help", no_argument, NULL, 'h' },
1497 { "version", no_argument, NULL, ARG_VERSION },
1498 { "property", required_argument, NULL, 'p' },
1499 { "all", no_argument, NULL, 'a' },
1500 { "value", no_argument, NULL, ARG_VALUE },
1501 { "full", no_argument, NULL, 'l' },
1502 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
1503 #if 1 /// elogind supports --no-wall
1504 { "no-wall", no_argument, NULL, ARG_NO_WALL },
1506 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
1507 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
1508 { "signal", required_argument, NULL, 's' },
1509 { "host", required_argument, NULL, 'H' },
1510 { "machine", required_argument, NULL, 'M' },
1511 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
1512 #if 0 /// UNNEEDED by elogind
1513 { "lines", required_argument, NULL, 'n' },
1514 { "output", required_argument, NULL, 'o' },
1516 /// elogind allows to ignore inhibitors for system commands.
1517 { "ignore-inhibitors", no_argument, NULL, 'i' },
1527 #if 0 /// elogind adds some system commands to loginctl
1528 while ((c = getopt_long(argc, argv, "hp:als:H:M:n:o:", options, NULL)) >= 0)
1530 while ((c = getopt_long(argc, argv, "hp:als:H:M:n:o:ci", options, NULL)) >= 0)
1536 help(0, NULL, NULL);
1543 r = strv_extend(&arg_property, optarg);
1547 /* If the user asked for a particular
1548 * property, show it to him, even if it is
1566 #if 0 /// UNNEEDED by elogind
1568 if (safe_atou(optarg, &arg_lines) < 0) {
1569 log_error("Failed to parse lines '%s'", optarg);
1575 arg_output = output_mode_from_string(optarg);
1576 if (arg_output < 0) {
1577 log_error("Unknown output '%s'.", optarg);
1584 arg_no_pager = true;
1586 #if 1 /// elogind supports --no-wall
1596 case ARG_NO_ASK_PASSWORD:
1597 arg_ask_password = false;
1601 arg_kill_who = optarg;
1605 arg_signal = signal_from_string_try_harder(optarg);
1606 if (arg_signal < 0) {
1607 log_error("Failed to parse signal string %s.", optarg);
1613 arg_transport = BUS_TRANSPORT_REMOTE;
1618 arg_transport = BUS_TRANSPORT_MACHINE;
1621 #if 1 /// elogind can cancel shutdowns and allows to ignore inhibitors
1623 arg_action = ACTION_CANCEL_SHUTDOWN;
1627 arg_ignore_inhibitors = true;
1634 assert_not_reached("Unhandled option");
1640 static int loginctl_main(int argc, char *argv[], sd_bus *bus) {
1642 static const Verb verbs[] = {
1643 { "help", VERB_ANY, VERB_ANY, 0, help },
1644 #if 0 /// elogind has "list" as a shorthand for "list-sessions"
1645 { "list-sessions", VERB_ANY, 1, VERB_DEFAULT, list_sessions },
1647 { "list", VERB_ANY, 1, VERB_DEFAULT, list_sessions },
1648 { "list-sessions", VERB_ANY, 1, 0, list_sessions },
1650 { "session-status", VERB_ANY, VERB_ANY, 0, show_session },
1651 { "show-session", VERB_ANY, VERB_ANY, 0, show_session },
1652 { "activate", VERB_ANY, 2, 0, activate },
1653 { "lock-session", VERB_ANY, VERB_ANY, 0, activate },
1654 { "unlock-session", VERB_ANY, VERB_ANY, 0, activate },
1655 { "lock-sessions", VERB_ANY, 1, 0, lock_sessions },
1656 { "unlock-sessions", VERB_ANY, 1, 0, lock_sessions },
1657 { "terminate-session", 2, VERB_ANY, 0, activate },
1658 { "kill-session", 2, VERB_ANY, 0, kill_session },
1659 { "list-users", VERB_ANY, 1, 0, list_users },
1660 { "user-status", VERB_ANY, VERB_ANY, 0, show_user },
1661 { "show-user", VERB_ANY, VERB_ANY, 0, show_user },
1662 { "enable-linger", VERB_ANY, VERB_ANY, 0, enable_linger },
1663 { "disable-linger", VERB_ANY, VERB_ANY, 0, enable_linger },
1664 { "terminate-user", 2, VERB_ANY, 0, terminate_user },
1665 { "kill-user", 2, VERB_ANY, 0, kill_user },
1666 { "list-seats", VERB_ANY, 1, 0, list_seats },
1667 { "seat-status", VERB_ANY, VERB_ANY, 0, show_seat },
1668 { "show-seat", VERB_ANY, VERB_ANY, 0, show_seat },
1669 { "attach", 3, VERB_ANY, 0, attach },
1670 { "flush-devices", VERB_ANY, 1, 0, flush_devices },
1671 { "terminate-seat", 2, VERB_ANY, 0, terminate_seat },
1672 #if 1 /// elogind adds some system commands to loginctl
1673 { "poweroff", VERB_ANY, VERB_ANY, 0, start_special },
1674 { "reboot", VERB_ANY, VERB_ANY, 0, start_special },
1675 { "suspend", VERB_ANY, 1, 0, start_special },
1676 { "hibernate", VERB_ANY, 1, 0, start_special },
1677 { "hybrid-sleep", VERB_ANY, 1, 0, start_special },
1678 { "cancel-shutdown", VERB_ANY, 1, 0, start_special },
1683 #if 1 /// elogind can do shutdown and allows its cancellation
1684 if ((argc == optind) && (ACTION_CANCEL_SHUTDOWN == arg_action))
1685 return elogind_cancel_shutdown(bus);
1687 return dispatch_verb(argc, argv, verbs, bus);
1690 int main(int argc, char *argv[]) {
1694 setlocale(LC_ALL, "");
1695 elogind_set_program_name(argv[0]);
1696 log_parse_environment();
1699 r = parse_argv(argc, argv);
1703 r = bus_connect_transport(arg_transport, arg_host, false, &bus);
1705 log_error_errno(r, "Failed to create bus connection: %m");
1709 sd_bus_set_allow_interactive_authorization(bus, arg_ask_password);
1711 r = loginctl_main(argc, argv, bus);
1714 sd_bus_flush_close_unref(bus);
1717 #if 0 /// elogind does that in elogind_cleanup()
1718 polkit_agent_close();
1721 strv_free(arg_property);
1723 #if 1 /// elogind has some own cleanups to do
1726 return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS;