1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/socket.h>
24 #include <sys/types.h>
25 #include <sys/timerfd.h>
32 #include "shutdownd.h"
36 #include "sd-daemon.h"
37 #include "utmp-wtmp.h"
39 static int read_packet(int fd, struct shutdownd_command *_c) {
44 struct cmsghdr cmsghdr;
45 uint8_t buf[CMSG_SPACE(sizeof(struct ucred))];
47 struct shutdownd_command c;
55 iovec.iov_len = sizeof(c);
59 msghdr.msg_iov = &iovec;
60 msghdr.msg_iovlen = 1;
61 msghdr.msg_control = &control;
62 msghdr.msg_controllen = sizeof(control);
64 if ((n = recvmsg(fd, &msghdr, MSG_DONTWAIT)) <= 0) {
66 log_error("Short read");
70 if (errno == EAGAIN || errno == EINTR)
73 log_error("recvmsg(): %m");
77 if (msghdr.msg_controllen < CMSG_LEN(sizeof(struct ucred)) ||
78 control.cmsghdr.cmsg_level != SOL_SOCKET ||
79 control.cmsghdr.cmsg_type != SCM_CREDENTIALS ||
80 control.cmsghdr.cmsg_len != CMSG_LEN(sizeof(struct ucred))) {
81 log_warning("Received message without credentials. Ignoring.");
85 ucred = (struct ucred*) CMSG_DATA(&control.cmsghdr);
86 if (ucred->uid != 0) {
87 log_warning("Got request from unprivileged user. Ignoring.");
92 log_warning("Message has invalid size. Ignoring");
96 char_array_0(c.wall_message);
102 static void warn_wall(usec_t n, struct shutdownd_command *c) {
103 char date[FORMAT_TIMESTAMP_MAX];
108 assert(c->warn_wall);
114 prefix = "The system is going down for system halt at ";
115 else if (c->mode == 'P')
116 prefix = "The system is going down for power-off at ";
117 else if (c->mode == 'r')
118 prefix = "The system is going down for reboot at ";
120 assert_not_reached("Unknown mode!");
122 if (asprintf(&l, "%s%s%s%s!", c->wall_message, c->wall_message[0] ? "\n" : "",
123 prefix, format_timestamp(date, sizeof(date), c->elapse)) < 0)
124 log_error("Failed to allocate wall message");
131 static usec_t when_wall(usec_t n, usec_t elapse) {
133 static const struct {
137 { 10 * USEC_PER_MINUTE, USEC_PER_MINUTE },
138 { USEC_PER_HOUR, 15 * USEC_PER_MINUTE },
139 { 3 * USEC_PER_HOUR, 30 * USEC_PER_MINUTE }
145 /* If the time is already passed, then don't announce */
150 for (i = 0; i < ELEMENTSOF(table); i++)
151 if (n + table[i].delay >= elapse) {
152 sub = ((left / table[i].interval) * table[i].interval);
156 if (i >= ELEMENTSOF(table))
157 sub = ((left / USEC_PER_HOUR) * USEC_PER_HOUR);
159 return elapse > sub ? elapse - sub : 1;
162 static usec_t when_nologin(usec_t elapse) {
163 return elapse > 5*USEC_PER_MINUTE ? elapse - 5*USEC_PER_MINUTE : 1;
166 int main(int argc, char *argv[]) {
175 int r = EXIT_FAILURE, n_fds;
177 struct shutdownd_command c;
178 struct pollfd pollfd[_FD_MAX];
179 bool exec_shutdown = false, unlink_nologin = false, failed = false;
182 if (getppid() != 1) {
183 log_error("This program should be invoked by init only.");
188 log_error("This program does not take arguments.");
192 log_set_target(LOG_TARGET_SYSLOG_OR_KMSG);
193 log_parse_environment();
198 if ((n_fds = sd_listen_fds(true)) < 0) {
199 log_error("Failed to read listening file descriptors from environment: %s", strerror(-r));
204 log_error("Need exactly one file descriptor.");
208 if (setsockopt(SD_LISTEN_FDS_START, SOL_SOCKET, SO_PASSCRED, &one, sizeof(one)) < 0) {
209 log_error("SO_PASSCRED failed: %m");
216 pollfd[FD_SOCKET].fd = SD_LISTEN_FDS_START;
217 pollfd[FD_SOCKET].events = POLLIN;
219 for (i = 0; i < _FD_MAX; i++) {
224 pollfd[i].events = POLLIN;
226 if ((pollfd[i].fd = timerfd_create(CLOCK_REALTIME, TFD_NONBLOCK|TFD_CLOEXEC)) < 0) {
227 log_error("timerfd_create(): %m");
235 log_debug("systemd-shutdownd running as pid %lu", (unsigned long) getpid());
239 "STATUS=Processing requests...");
245 if (poll(pollfd, _FD_MAX, -1) < 0) {
247 if (errno == EAGAIN || errno == EINTR)
250 log_error("poll(): %m");
254 n = now(CLOCK_REALTIME);
256 if (pollfd[FD_SOCKET].revents) {
258 if ((k = read_packet(pollfd[FD_SOCKET].fd, &c)) < 0)
260 else if (k > 0 && c.elapse > 0) {
261 struct itimerspec its;
262 char date[FORMAT_TIMESTAMP_MAX];
265 /* Send wall messages every so often */
267 timespec_store(&its.it_value, when_wall(n, c.elapse));
268 if (timerfd_settime(pollfd[FD_WALL_TIMER].fd, TFD_TIMER_ABSTIME, &its, NULL) < 0) {
269 log_error("timerfd_settime(): %m");
273 /* Warn immediately if less than 15 minutes are left */
275 n + 15*USEC_PER_MINUTE >= c.elapse)
279 /* Disallow logins 5 minutes prior to shutdown */
281 timespec_store(&its.it_value, when_nologin(c.elapse));
282 if (timerfd_settime(pollfd[FD_NOLOGIN_TIMER].fd, TFD_TIMER_ABSTIME, &its, NULL) < 0) {
283 log_error("timerfd_settime(): %m");
287 /* Shutdown after the specified time is reached */
289 timespec_store(&its.it_value, c.elapse);
290 if (timerfd_settime(pollfd[FD_SHUTDOWN_TIMER].fd, TFD_TIMER_ABSTIME, &its, NULL) < 0) {
291 log_error("timerfd_settime(): %m");
296 "STATUS=Shutting down at %s...",
297 format_timestamp(date, sizeof(date), c.elapse));
301 if (pollfd[FD_WALL_TIMER].revents) {
302 struct itimerspec its;
305 flush_fd(pollfd[FD_WALL_TIMER].fd);
309 timespec_store(&its.it_value, when_wall(n, c.elapse));
310 if (timerfd_settime(pollfd[FD_WALL_TIMER].fd, TFD_TIMER_ABSTIME, &its, NULL) < 0) {
311 log_error("timerfd_settime(): %m");
316 if (pollfd[FD_NOLOGIN_TIMER].revents) {
319 log_info("Creating /run/nologin, blocking further logins...");
321 if ((e = write_one_line_file_atomic("/run/nologin", "System is going down.")) < 0)
322 log_error("Failed to create /run/nologin: %s", strerror(-e));
324 unlink_nologin = true;
326 flush_fd(pollfd[FD_NOLOGIN_TIMER].fd);
329 if (pollfd[FD_SHUTDOWN_TIMER].revents) {
330 exec_shutdown = true;
334 } while (c.elapse > 0);
338 log_debug("systemd-shutdownd stopped as pid %lu", (unsigned long) getpid());
342 for (i = 0; i < _FD_MAX; i++)
343 if (pollfd[i].fd >= 0)
344 close_nointr_nofail(pollfd[i].fd);
347 unlink("/run/nologin");
349 if (exec_shutdown && !c.dry_run) {
356 execl(SYSTEMCTL_BINARY_PATH,
360 (c.warn_wall && c.wall_message[0]) ? c.wall_message :
361 (c.warn_wall ? NULL : "--no-wall"),
364 log_error("Failed to execute /sbin/shutdown: %m");
368 "STATUS=Exiting...");