1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/reboot.h>
28 #include <sys/ioctl.h>
32 #include <sys/socket.h>
35 #include <sys/prctl.h>
37 #include <dbus/dbus.h>
43 #include "utmp-wtmp.h"
47 #include "dbus-common.h"
48 #include "cgroup-show.h"
49 #include "cgroup-util.h"
51 #include "path-lookup.h"
52 #include "conf-parser.h"
53 #include "sd-daemon.h"
54 #include "shutdownd.h"
55 #include "exit-status.h"
56 #include "bus-errors.h"
58 #include "unit-name.h"
60 static const char *arg_type = NULL;
61 static char **arg_property = NULL;
62 static bool arg_all = false;
63 static const char *arg_job_mode = "replace";
64 static bool arg_user = false;
65 static bool arg_global = false;
66 static bool arg_immediate = false;
67 static bool arg_no_block = false;
68 static bool arg_no_pager = false;
69 static bool arg_no_wtmp = false;
70 static bool arg_no_sync = false;
71 static bool arg_no_wall = false;
72 static bool arg_no_reload = false;
73 static bool arg_dry = false;
74 static bool arg_quiet = false;
75 static bool arg_full = false;
76 static bool arg_force = false;
77 static bool arg_defaults = false;
78 static bool arg_ask_password = false;
79 static bool arg_failed = false;
80 static char **arg_wall = NULL;
81 static const char *arg_kill_who = NULL;
82 static const char *arg_kill_mode = NULL;
83 static int arg_signal = SIGTERM;
84 static usec_t arg_when = 0;
103 ACTION_CANCEL_SHUTDOWN,
105 } arg_action = ACTION_SYSTEMCTL;
112 static bool private_bus = false;
114 static pid_t pager_pid = 0;
115 static pid_t agent_pid = 0;
117 static int daemon_reload(DBusConnection *bus, char **args, unsigned n);
118 static void pager_open(void);
120 static bool on_tty(void) {
123 /* Note that this is invoked relatively early, before we start
124 * the pager. That means the value we return reflects whether
125 * we originally were started on a tty, not if we currently
126 * are. But this is intended, since we want colour and so on
127 * when run in our own pager. */
129 if (_unlikely_(t < 0))
130 t = isatty(STDOUT_FILENO) > 0;
135 static void spawn_ask_password_agent(void) {
141 /* We check STDIN here, not STDOUT, since this is about input,
143 if (!isatty(STDIN_FILENO))
146 if (!arg_ask_password)
154 /* Spawns a temporary TTY agent, making sure it goes away when
157 if ((agent_pid = fork()) < 0)
160 if (agent_pid == 0) {
164 bool stdout_is_tty, stderr_is_tty;
166 /* Make sure the agent goes away when the parent dies */
167 if (prctl(PR_SET_PDEATHSIG, SIGTERM) < 0)
170 /* Check whether our parent died before we were able
171 * to set the death signal */
172 if (getppid() != parent)
175 /* Don't leak fds to the agent */
176 close_all_fds(NULL, 0);
178 stdout_is_tty = isatty(STDOUT_FILENO);
179 stderr_is_tty = isatty(STDERR_FILENO);
181 if (!stdout_is_tty || !stderr_is_tty) {
182 /* Detach from stdout/stderr. and reopen
183 * /dev/tty for them. This is important to
184 * ensure that when systemctl is started via
185 * popen() or a similar call that expects to
186 * read EOF we actually do generate EOF and
187 * not delay this indefinitely by because we
188 * keep an unused copy of stdin around. */
189 if ((fd = open("/dev/tty", O_WRONLY)) < 0) {
190 log_error("Failed to open /dev/tty: %m");
195 dup2(fd, STDOUT_FILENO);
198 dup2(fd, STDERR_FILENO);
204 execl(SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH, SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH, "--watch", NULL);
206 log_error("Unable to execute agent: %m");
211 static const char *ansi_highlight(bool b) {
216 return b ? ANSI_HIGHLIGHT_ON : ANSI_HIGHLIGHT_OFF;
219 static const char *ansi_highlight_green(bool b) {
224 return b ? ANSI_HIGHLIGHT_GREEN_ON : ANSI_HIGHLIGHT_OFF;
227 static bool error_is_no_service(const DBusError *error) {
230 if (!dbus_error_is_set(error))
233 if (dbus_error_has_name(error, DBUS_ERROR_NAME_HAS_NO_OWNER))
236 if (dbus_error_has_name(error, DBUS_ERROR_SERVICE_UNKNOWN))
239 return startswith(error->name, "org.freedesktop.DBus.Error.Spawn.");
242 static int translate_bus_error_to_exit_status(int r, const DBusError *error) {
245 if (!dbus_error_is_set(error))
248 if (dbus_error_has_name(error, DBUS_ERROR_ACCESS_DENIED) ||
249 dbus_error_has_name(error, BUS_ERROR_ONLY_BY_DEPENDENCY) ||
250 dbus_error_has_name(error, BUS_ERROR_NO_ISOLATION) ||
251 dbus_error_has_name(error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE))
252 return EXIT_NOPERMISSION;
254 if (dbus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT))
255 return EXIT_NOTINSTALLED;
257 if (dbus_error_has_name(error, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE) ||
258 dbus_error_has_name(error, BUS_ERROR_NOT_SUPPORTED))
259 return EXIT_NOTIMPLEMENTED;
261 if (dbus_error_has_name(error, BUS_ERROR_LOAD_FAILED))
262 return EXIT_NOTCONFIGURED;
270 static int bus_iter_get_basic_and_next(DBusMessageIter *iter, int type, void *data, bool next) {
275 if (dbus_message_iter_get_arg_type(iter) != type)
278 dbus_message_iter_get_basic(iter, data);
280 if (!dbus_message_iter_next(iter) != !next)
286 static void warn_wall(enum action action) {
287 static const char *table[_ACTION_MAX] = {
288 [ACTION_HALT] = "The system is going down for system halt NOW!",
289 [ACTION_REBOOT] = "The system is going down for reboot NOW!",
290 [ACTION_POWEROFF] = "The system is going down for power-off NOW!",
291 [ACTION_KEXEC] = "The system is going down for kexec reboot NOW!",
292 [ACTION_RESCUE] = "The system is going down to rescue mode NOW!",
293 [ACTION_EMERGENCY] = "The system is going down to emergency mode NOW!"
302 if (!(p = strv_join(arg_wall, " "))) {
303 log_error("Failed to join strings.");
319 utmp_wall(table[action], NULL);
324 const char *description;
325 const char *load_state;
326 const char *active_state;
327 const char *sub_state;
328 const char *following;
329 const char *unit_path;
331 const char *job_type;
332 const char *job_path;
335 static int compare_unit_info(const void *a, const void *b) {
337 const struct unit_info *u = a, *v = b;
339 d1 = strrchr(u->id, '.');
340 d2 = strrchr(v->id, '.');
345 if ((r = strcasecmp(d1, d2)) != 0)
349 return strcasecmp(u->id, v->id);
352 static bool output_show_unit(const struct unit_info *u) {
356 return streq(u->active_state, "failed");
358 return (!arg_type || ((dot = strrchr(u->id, '.')) &&
359 streq(dot+1, arg_type))) &&
360 (arg_all || !(streq(u->active_state, "inactive") || u->following[0]) || u->job_id > 0);
363 static void output_units_list(const struct unit_info *unit_infos, unsigned c) {
364 unsigned active_len, sub_len, job_len, n_shown = 0;
365 const struct unit_info *u;
367 active_len = sizeof("ACTIVE")-1;
368 sub_len = sizeof("SUB")-1;
369 job_len = sizeof("JOB")-1;
371 for (u = unit_infos; u < unit_infos + c; u++) {
372 if (!output_show_unit(u))
375 active_len = MAX(active_len, strlen(u->active_state));
376 sub_len = MAX(sub_len, strlen(u->sub_state));
378 job_len = MAX(job_len, strlen(u->job_type));
382 printf("%-25s %-6s %-*s %-*s %-*s", "UNIT", "LOAD",
383 active_len, "ACTIVE", sub_len, "SUB", job_len, "JOB");
384 if (columns() >= 80+12 || arg_full)
385 printf(" %s\n", "DESCRIPTION");
390 for (u = unit_infos; u < unit_infos + c; u++) {
393 const char *on_loaded, *off_loaded;
394 const char *on_active, *off_active;
396 if (!output_show_unit(u))
401 if (!streq(u->load_state, "loaded") &&
402 !streq(u->load_state, "banned")) {
403 on_loaded = ansi_highlight(true);
404 off_loaded = ansi_highlight(false);
406 on_loaded = off_loaded = "";
408 if (streq(u->active_state, "failed")) {
409 on_active = ansi_highlight(true);
410 off_active = ansi_highlight(false);
412 on_active = off_active = "";
414 e = arg_full ? NULL : ellipsize(u->id, 25, 33);
416 printf("%-25s %s%-6s%s %s%-*s %-*s%s%n",
418 on_loaded, u->load_state, off_loaded,
419 on_active, active_len, u->active_state,
420 sub_len, u->sub_state, off_active,
425 a -= strlen(on_loaded) + strlen(off_loaded);
426 a -= strlen(on_active) + strlen(off_active);
429 printf(" %-*s", job_len, u->job_type);
433 if (a + b + 1 < columns()) {
435 printf(" %-*s", job_len, "");
438 printf(" %s", u->description);
440 printf(" %.*s", columns() - a - b - 1, u->description);
447 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
448 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
449 "SUB = The low-level unit activation state, values depend on unit type.\n"
450 "JOB = Pending job for the unit.\n");
453 printf("\n%u units listed.\n", n_shown);
455 printf("\n%u units listed. Pass --all to see inactive units, too.\n", n_shown);
459 static int list_units(DBusConnection *bus, char **args, unsigned n) {
460 DBusMessage *m = NULL, *reply = NULL;
463 DBusMessageIter iter, sub, sub2;
464 unsigned c = 0, n_units = 0;
465 struct unit_info *unit_infos = NULL;
467 dbus_error_init(&error);
473 if (!(m = dbus_message_new_method_call(
474 "org.freedesktop.systemd1",
475 "/org/freedesktop/systemd1",
476 "org.freedesktop.systemd1.Manager",
478 log_error("Could not allocate message.");
482 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
483 log_error("Failed to issue method call: %s", bus_error_message(&error));
488 if (!dbus_message_iter_init(reply, &iter) ||
489 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
490 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
491 log_error("Failed to parse reply.");
496 dbus_message_iter_recurse(&iter, &sub);
498 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
501 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
502 log_error("Failed to parse reply.");
510 n_units = MAX(2*c, 16);
511 w = realloc(unit_infos, sizeof(struct unit_info) * n_units);
514 log_error("Failed to allocate unit array.");
524 dbus_message_iter_recurse(&sub, &sub2);
526 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->id, true) < 0 ||
527 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->description, true) < 0 ||
528 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->load_state, true) < 0 ||
529 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->active_state, true) < 0 ||
530 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->sub_state, true) < 0 ||
531 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->following, true) < 0 ||
532 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->unit_path, true) < 0 ||
533 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &u->job_id, true) < 0 ||
534 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->job_type, true) < 0 ||
535 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->job_path, false) < 0) {
536 log_error("Failed to parse reply.");
541 dbus_message_iter_next(&sub);
546 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
547 output_units_list(unit_infos, c);
554 dbus_message_unref(m);
557 dbus_message_unref(reply);
561 dbus_error_free(&error);
566 static int dot_one_property(const char *name, const char *prop, DBusMessageIter *iter) {
567 static const char * const colors[] = {
568 "Requires", "[color=\"black\"]",
569 "RequiresOverridable", "[color=\"black\"]",
570 "Requisite", "[color=\"darkblue\"]",
571 "RequisiteOverridable", "[color=\"darkblue\"]",
572 "Wants", "[color=\"darkgrey\"]",
573 "Conflicts", "[color=\"red\"]",
574 "ConflictedBy", "[color=\"red\"]",
575 "After", "[color=\"green\"]"
578 const char *c = NULL;
585 for (i = 0; i < ELEMENTSOF(colors); i += 2)
586 if (streq(colors[i], prop)) {
594 if (arg_dot != DOT_ALL)
595 if ((arg_dot == DOT_ORDER) != streq(prop, "After"))
598 switch (dbus_message_iter_get_arg_type(iter)) {
600 case DBUS_TYPE_ARRAY:
602 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING) {
605 dbus_message_iter_recurse(iter, &sub);
607 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
610 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING);
611 dbus_message_iter_get_basic(&sub, &s);
612 printf("\t\"%s\"->\"%s\" %s;\n", name, s, c);
614 dbus_message_iter_next(&sub);
624 static int dot_one(DBusConnection *bus, const char *name, const char *path) {
625 DBusMessage *m = NULL, *reply = NULL;
626 const char *interface = "org.freedesktop.systemd1.Unit";
629 DBusMessageIter iter, sub, sub2, sub3;
634 dbus_error_init(&error);
636 if (!(m = dbus_message_new_method_call(
637 "org.freedesktop.systemd1",
639 "org.freedesktop.DBus.Properties",
641 log_error("Could not allocate message.");
646 if (!dbus_message_append_args(m,
647 DBUS_TYPE_STRING, &interface,
648 DBUS_TYPE_INVALID)) {
649 log_error("Could not append arguments to message.");
654 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
655 log_error("Failed to issue method call: %s", bus_error_message(&error));
660 if (!dbus_message_iter_init(reply, &iter) ||
661 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
662 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
663 log_error("Failed to parse reply.");
668 dbus_message_iter_recurse(&iter, &sub);
670 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
673 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_DICT_ENTRY) {
674 log_error("Failed to parse reply.");
679 dbus_message_iter_recurse(&sub, &sub2);
681 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &prop, true) < 0) {
682 log_error("Failed to parse reply.");
687 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
688 log_error("Failed to parse reply.");
693 dbus_message_iter_recurse(&sub2, &sub3);
695 if (dot_one_property(name, prop, &sub3)) {
696 log_error("Failed to parse reply.");
701 dbus_message_iter_next(&sub);
708 dbus_message_unref(m);
711 dbus_message_unref(reply);
713 dbus_error_free(&error);
718 static int dot(DBusConnection *bus, char **args, unsigned n) {
719 DBusMessage *m = NULL, *reply = NULL;
722 DBusMessageIter iter, sub, sub2;
724 dbus_error_init(&error);
728 if (!(m = dbus_message_new_method_call(
729 "org.freedesktop.systemd1",
730 "/org/freedesktop/systemd1",
731 "org.freedesktop.systemd1.Manager",
733 log_error("Could not allocate message.");
737 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
738 log_error("Failed to issue method call: %s", bus_error_message(&error));
743 if (!dbus_message_iter_init(reply, &iter) ||
744 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
745 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
746 log_error("Failed to parse reply.");
751 printf("digraph systemd {\n");
753 dbus_message_iter_recurse(&iter, &sub);
754 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
755 const char *id, *description, *load_state, *active_state, *sub_state, *following, *unit_path;
757 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
758 log_error("Failed to parse reply.");
763 dbus_message_iter_recurse(&sub, &sub2);
765 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &id, true) < 0 ||
766 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &description, true) < 0 ||
767 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &load_state, true) < 0 ||
768 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &active_state, true) < 0 ||
769 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &sub_state, true) < 0 ||
770 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &following, true) < 0 ||
771 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, true) < 0) {
772 log_error("Failed to parse reply.");
777 if ((r = dot_one(bus, id, unit_path)) < 0)
780 /* printf("\t\"%s\";\n", id); */
781 dbus_message_iter_next(&sub);
786 log_info(" Color legend: black = Requires\n"
787 " dark blue = Requisite\n"
788 " dark grey = Wants\n"
792 if (isatty(fileno(stdout)))
793 log_notice("-- You probably want to process this output with graphviz' dot tool.\n"
794 "-- Try a shell pipeline like 'systemctl dot | dot -Tsvg > systemd.svg'!\n");
800 dbus_message_unref(m);
803 dbus_message_unref(reply);
805 dbus_error_free(&error);
810 static int list_jobs(DBusConnection *bus, char **args, unsigned n) {
811 DBusMessage *m = NULL, *reply = NULL;
814 DBusMessageIter iter, sub, sub2;
817 dbus_error_init(&error);
823 if (!(m = dbus_message_new_method_call(
824 "org.freedesktop.systemd1",
825 "/org/freedesktop/systemd1",
826 "org.freedesktop.systemd1.Manager",
828 log_error("Could not allocate message.");
832 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
833 log_error("Failed to issue method call: %s", bus_error_message(&error));
838 if (!dbus_message_iter_init(reply, &iter) ||
839 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
840 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
841 log_error("Failed to parse reply.");
846 dbus_message_iter_recurse(&iter, &sub);
848 if (isatty(STDOUT_FILENO))
849 printf("%4s %-25s %-15s %-7s\n", "JOB", "UNIT", "TYPE", "STATE");
851 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
852 const char *name, *type, *state, *job_path, *unit_path;
856 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
857 log_error("Failed to parse reply.");
862 dbus_message_iter_recurse(&sub, &sub2);
864 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &id, true) < 0 ||
865 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
866 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
867 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, true) < 0 ||
868 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &job_path, true) < 0 ||
869 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, false) < 0) {
870 log_error("Failed to parse reply.");
875 e = arg_full ? NULL : ellipsize(name, 25, 33);
876 printf("%4u %-25s %-15s %-7s\n", id, e ? e : name, type, state);
881 dbus_message_iter_next(&sub);
884 if (isatty(STDOUT_FILENO))
885 printf("\n%u jobs listed.\n", k);
891 dbus_message_unref(m);
894 dbus_message_unref(reply);
896 dbus_error_free(&error);
901 static int load_unit(DBusConnection *bus, char **args, unsigned n) {
902 DBusMessage *m = NULL, *reply = NULL;
907 dbus_error_init(&error);
912 for (i = 1; i < n; i++) {
914 if (!(m = dbus_message_new_method_call(
915 "org.freedesktop.systemd1",
916 "/org/freedesktop/systemd1",
917 "org.freedesktop.systemd1.Manager",
919 log_error("Could not allocate message.");
924 if (!dbus_message_append_args(m,
925 DBUS_TYPE_STRING, &args[i],
926 DBUS_TYPE_INVALID)) {
927 log_error("Could not append arguments to message.");
932 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
933 log_error("Failed to issue method call: %s", bus_error_message(&error));
938 dbus_message_unref(m);
939 dbus_message_unref(reply);
948 dbus_message_unref(m);
951 dbus_message_unref(reply);
953 dbus_error_free(&error);
958 static int cancel_job(DBusConnection *bus, char **args, unsigned n) {
959 DBusMessage *m = NULL, *reply = NULL;
964 dbus_error_init(&error);
970 return daemon_reload(bus, args, n);
972 for (i = 1; i < n; i++) {
976 if (!(m = dbus_message_new_method_call(
977 "org.freedesktop.systemd1",
978 "/org/freedesktop/systemd1",
979 "org.freedesktop.systemd1.Manager",
981 log_error("Could not allocate message.");
986 if ((r = safe_atou(args[i], &id)) < 0) {
987 log_error("Failed to parse job id: %s", strerror(-r));
991 assert_cc(sizeof(uint32_t) == sizeof(id));
992 if (!dbus_message_append_args(m,
993 DBUS_TYPE_UINT32, &id,
994 DBUS_TYPE_INVALID)) {
995 log_error("Could not append arguments to message.");
1000 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1001 log_error("Failed to issue method call: %s", bus_error_message(&error));
1006 if (!dbus_message_get_args(reply, &error,
1007 DBUS_TYPE_OBJECT_PATH, &path,
1008 DBUS_TYPE_INVALID)) {
1009 log_error("Failed to parse reply: %s", bus_error_message(&error));
1014 dbus_message_unref(m);
1015 if (!(m = dbus_message_new_method_call(
1016 "org.freedesktop.systemd1",
1018 "org.freedesktop.systemd1.Job",
1020 log_error("Could not allocate message.");
1025 dbus_message_unref(reply);
1026 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1027 log_error("Failed to issue method call: %s", bus_error_message(&error));
1032 dbus_message_unref(m);
1033 dbus_message_unref(reply);
1041 dbus_message_unref(m);
1044 dbus_message_unref(reply);
1046 dbus_error_free(&error);
1051 static bool need_daemon_reload(DBusConnection *bus, const char *unit) {
1052 DBusMessage *m = NULL, *reply = NULL;
1053 dbus_bool_t b = FALSE;
1054 DBusMessageIter iter, sub;
1056 *interface = "org.freedesktop.systemd1.Unit",
1057 *property = "NeedDaemonReload",
1060 /* We ignore all errors here, since this is used to show a warning only */
1062 if (!(m = dbus_message_new_method_call(
1063 "org.freedesktop.systemd1",
1064 "/org/freedesktop/systemd1",
1065 "org.freedesktop.systemd1.Manager",
1069 if (!dbus_message_append_args(m,
1070 DBUS_TYPE_STRING, &unit,
1074 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, NULL)))
1077 if (!dbus_message_get_args(reply, NULL,
1078 DBUS_TYPE_OBJECT_PATH, &path,
1082 dbus_message_unref(m);
1083 if (!(m = dbus_message_new_method_call(
1084 "org.freedesktop.systemd1",
1086 "org.freedesktop.DBus.Properties",
1090 if (!dbus_message_append_args(m,
1091 DBUS_TYPE_STRING, &interface,
1092 DBUS_TYPE_STRING, &property,
1093 DBUS_TYPE_INVALID)) {
1097 dbus_message_unref(reply);
1098 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, NULL)))
1101 if (!dbus_message_iter_init(reply, &iter) ||
1102 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1105 dbus_message_iter_recurse(&iter, &sub);
1107 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_BOOLEAN)
1110 dbus_message_iter_get_basic(&sub, &b);
1114 dbus_message_unref(m);
1117 dbus_message_unref(reply);
1122 typedef struct WaitData {
1127 static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *message, void *data) {
1135 dbus_error_init(&error);
1137 log_debug("Got D-Bus request: %s.%s() on %s",
1138 dbus_message_get_interface(message),
1139 dbus_message_get_member(message),
1140 dbus_message_get_path(message));
1142 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
1143 log_error("Warning! D-Bus connection terminated.");
1144 dbus_connection_close(connection);
1146 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1148 const char *path, *result;
1149 dbus_bool_t success = true;
1151 if (dbus_message_get_args(message, &error,
1152 DBUS_TYPE_UINT32, &id,
1153 DBUS_TYPE_OBJECT_PATH, &path,
1154 DBUS_TYPE_STRING, &result,
1155 DBUS_TYPE_INVALID)) {
1158 if ((p = set_remove(d->set, (char*) path)))
1162 d->result = strdup(result);
1167 dbus_error_free(&error);
1169 if (dbus_message_get_args(message, &error,
1170 DBUS_TYPE_UINT32, &id,
1171 DBUS_TYPE_OBJECT_PATH, &path,
1172 DBUS_TYPE_BOOLEAN, &success,
1173 DBUS_TYPE_INVALID)) {
1176 /* Compatibility with older systemd versions <
1177 * 19 during upgrades. This should be dropped
1180 if ((p = set_remove(d->set, (char*) path)))
1184 d->result = strdup("failed");
1190 log_error("Failed to parse message: %s", bus_error_message(&error));
1194 dbus_error_free(&error);
1195 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1198 static int enable_wait_for_jobs(DBusConnection *bus) {
1206 dbus_error_init(&error);
1207 dbus_bus_add_match(bus,
1209 "sender='org.freedesktop.systemd1',"
1210 "interface='org.freedesktop.systemd1.Manager',"
1211 "member='JobRemoved',"
1212 "path='/org/freedesktop/systemd1'",
1215 if (dbus_error_is_set(&error)) {
1216 log_error("Failed to add match: %s", bus_error_message(&error));
1217 dbus_error_free(&error);
1221 /* This is slightly dirty, since we don't undo the match registrations. */
1225 static int wait_for_jobs(DBusConnection *bus, Set *s) {
1235 if (!dbus_connection_add_filter(bus, wait_filter, &d, NULL)) {
1236 log_error("Failed to add filter.");
1241 while (!set_isempty(s) &&
1242 dbus_connection_read_write_dispatch(bus, -1))
1245 if (!arg_quiet && d.result) {
1246 if (streq(d.result, "timeout"))
1247 log_error("Job timed out.");
1248 else if (streq(d.result, "canceled"))
1249 log_error("Job canceled.");
1250 else if (streq(d.result, "dependency"))
1251 log_error("A dependency job failed. See system logs for details.");
1252 else if (!streq(d.result, "done"))
1253 log_error("Job failed. See system logs and 'systemctl status' for details.");
1256 if (streq_ptr(d.result, "timeout"))
1258 else if (streq_ptr(d.result, "canceled"))
1260 else if (!streq_ptr(d.result, "done"))
1268 /* This is slightly dirty, since we don't undo the filter registration. */
1273 static int start_unit_one(
1274 DBusConnection *bus,
1281 DBusMessage *m = NULL, *reply = NULL;
1290 assert(arg_no_block || s);
1292 if (!(m = dbus_message_new_method_call(
1293 "org.freedesktop.systemd1",
1294 "/org/freedesktop/systemd1",
1295 "org.freedesktop.systemd1.Manager",
1297 log_error("Could not allocate message.");
1302 if (!dbus_message_append_args(m,
1303 DBUS_TYPE_STRING, &name,
1304 DBUS_TYPE_STRING, &mode,
1305 DBUS_TYPE_INVALID)) {
1306 log_error("Could not append arguments to message.");
1311 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, error))) {
1313 if (arg_action != ACTION_SYSTEMCTL && error_is_no_service(error)) {
1314 /* There's always a fallback possible for
1315 * legacy actions. */
1320 log_error("Failed to issue method call: %s", bus_error_message(error));
1325 if (!dbus_message_get_args(reply, error,
1326 DBUS_TYPE_OBJECT_PATH, &path,
1327 DBUS_TYPE_INVALID)) {
1328 log_error("Failed to parse reply: %s", bus_error_message(error));
1333 if (need_daemon_reload(bus, name))
1334 log_warning("Unit file of created job changed on disk, 'systemctl %s daemon-reload' recommended.",
1335 arg_user ? "--user" : "--system");
1337 if (!arg_no_block) {
1340 if (!(p = strdup(path))) {
1341 log_error("Failed to duplicate path.");
1346 if ((r = set_put(s, p)) < 0) {
1348 log_error("Failed to add path to set.");
1357 dbus_message_unref(m);
1360 dbus_message_unref(reply);
1365 static enum action verb_to_action(const char *verb) {
1366 if (streq(verb, "halt"))
1368 else if (streq(verb, "poweroff"))
1369 return ACTION_POWEROFF;
1370 else if (streq(verb, "reboot"))
1371 return ACTION_REBOOT;
1372 else if (streq(verb, "kexec"))
1373 return ACTION_KEXEC;
1374 else if (streq(verb, "rescue"))
1375 return ACTION_RESCUE;
1376 else if (streq(verb, "emergency"))
1377 return ACTION_EMERGENCY;
1378 else if (streq(verb, "default"))
1379 return ACTION_DEFAULT;
1380 else if (streq(verb, "exit"))
1383 return ACTION_INVALID;
1386 static int start_unit(DBusConnection *bus, char **args, unsigned n) {
1388 static const char * const table[_ACTION_MAX] = {
1389 [ACTION_HALT] = SPECIAL_HALT_TARGET,
1390 [ACTION_POWEROFF] = SPECIAL_POWEROFF_TARGET,
1391 [ACTION_REBOOT] = SPECIAL_REBOOT_TARGET,
1392 [ACTION_KEXEC] = SPECIAL_KEXEC_TARGET,
1393 [ACTION_RUNLEVEL2] = SPECIAL_RUNLEVEL2_TARGET,
1394 [ACTION_RUNLEVEL3] = SPECIAL_RUNLEVEL3_TARGET,
1395 [ACTION_RUNLEVEL4] = SPECIAL_RUNLEVEL4_TARGET,
1396 [ACTION_RUNLEVEL5] = SPECIAL_RUNLEVEL5_TARGET,
1397 [ACTION_RESCUE] = SPECIAL_RESCUE_TARGET,
1398 [ACTION_EMERGENCY] = SPECIAL_EMERGENCY_TARGET,
1399 [ACTION_DEFAULT] = SPECIAL_DEFAULT_TARGET,
1400 [ACTION_EXIT] = SPECIAL_EXIT_TARGET
1405 const char *method, *mode, *one_name;
1409 dbus_error_init(&error);
1413 spawn_ask_password_agent();
1415 if (arg_action == ACTION_SYSTEMCTL) {
1417 streq(args[0], "stop") ? "StopUnit" :
1418 streq(args[0], "reload") ? "ReloadUnit" :
1419 streq(args[0], "restart") ? "RestartUnit" :
1420 streq(args[0], "try-restart") ||
1421 streq(args[0], "condrestart") ? "TryRestartUnit" :
1422 streq(args[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
1423 streq(args[0], "reload-or-try-restart") ||
1424 streq(args[0], "force-reload") ? "ReloadOrTryRestartUnit" :
1428 (streq(args[0], "isolate") ||
1429 streq(args[0], "rescue") ||
1430 streq(args[0], "emergency")) ? "isolate" : arg_job_mode;
1432 one_name = table[verb_to_action(args[0])];
1435 assert(arg_action < ELEMENTSOF(table));
1436 assert(table[arg_action]);
1438 method = "StartUnit";
1440 mode = (arg_action == ACTION_EMERGENCY ||
1441 arg_action == ACTION_RESCUE ||
1442 arg_action == ACTION_RUNLEVEL2 ||
1443 arg_action == ACTION_RUNLEVEL3 ||
1444 arg_action == ACTION_RUNLEVEL4 ||
1445 arg_action == ACTION_RUNLEVEL5) ? "isolate" : "replace";
1447 one_name = table[arg_action];
1450 if (!arg_no_block) {
1451 if ((ret = enable_wait_for_jobs(bus)) < 0) {
1452 log_error("Could not watch jobs: %s", strerror(-ret));
1456 if (!(s = set_new(string_hash_func, string_compare_func))) {
1457 log_error("Failed to allocate set.");
1464 if ((ret = start_unit_one(bus, method, one_name, mode, &error, s)) <= 0)
1467 for (i = 1; i < n; i++)
1468 if ((r = start_unit_one(bus, method, args[i], mode, &error, s)) != 0) {
1469 ret = translate_bus_error_to_exit_status(r, &error);
1470 dbus_error_free(&error);
1475 if ((r = wait_for_jobs(bus, s)) < 0) {
1484 dbus_error_free(&error);
1489 static int start_special(DBusConnection *bus, char **args, unsigned n) {
1496 (streq(args[0], "halt") ||
1497 streq(args[0], "poweroff") ||
1498 streq(args[0], "reboot") ||
1499 streq(args[0], "kexec") ||
1500 streq(args[0], "exit")))
1501 return daemon_reload(bus, args, n);
1503 r = start_unit(bus, args, n);
1506 warn_wall(verb_to_action(args[0]));
1511 static int check_unit(DBusConnection *bus, char **args, unsigned n) {
1512 DBusMessage *m = NULL, *reply = NULL;
1514 *interface = "org.freedesktop.systemd1.Unit",
1515 *property = "ActiveState";
1516 int r = 3; /* According to LSB: "program is not running" */
1523 dbus_error_init(&error);
1525 for (i = 1; i < n; i++) {
1526 const char *path = NULL;
1528 DBusMessageIter iter, sub;
1530 if (!(m = dbus_message_new_method_call(
1531 "org.freedesktop.systemd1",
1532 "/org/freedesktop/systemd1",
1533 "org.freedesktop.systemd1.Manager",
1535 log_error("Could not allocate message.");
1540 if (!dbus_message_append_args(m,
1541 DBUS_TYPE_STRING, &args[i],
1542 DBUS_TYPE_INVALID)) {
1543 log_error("Could not append arguments to message.");
1548 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1550 /* Hmm, cannot figure out anything about this unit... */
1554 dbus_error_free(&error);
1555 dbus_message_unref(m);
1559 if (!dbus_message_get_args(reply, &error,
1560 DBUS_TYPE_OBJECT_PATH, &path,
1561 DBUS_TYPE_INVALID)) {
1562 log_error("Failed to parse reply: %s", bus_error_message(&error));
1567 dbus_message_unref(m);
1568 if (!(m = dbus_message_new_method_call(
1569 "org.freedesktop.systemd1",
1571 "org.freedesktop.DBus.Properties",
1573 log_error("Could not allocate message.");
1578 if (!dbus_message_append_args(m,
1579 DBUS_TYPE_STRING, &interface,
1580 DBUS_TYPE_STRING, &property,
1581 DBUS_TYPE_INVALID)) {
1582 log_error("Could not append arguments to message.");
1587 dbus_message_unref(reply);
1588 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1589 log_error("Failed to issue method call: %s", bus_error_message(&error));
1594 if (!dbus_message_iter_init(reply, &iter) ||
1595 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1596 log_error("Failed to parse reply.");
1601 dbus_message_iter_recurse(&iter, &sub);
1603 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1604 log_error("Failed to parse reply.");
1609 dbus_message_iter_get_basic(&sub, &state);
1614 if (streq(state, "active") || streq(state, "reloading"))
1617 dbus_message_unref(m);
1618 dbus_message_unref(reply);
1624 dbus_message_unref(m);
1627 dbus_message_unref(reply);
1629 dbus_error_free(&error);
1634 static int kill_unit(DBusConnection *bus, char **args, unsigned n) {
1635 DBusMessage *m = NULL, *reply = NULL;
1643 dbus_error_init(&error);
1646 arg_kill_who = "all";
1649 arg_kill_mode = streq(arg_kill_who, "all") ? "control-group" : "process";
1651 for (i = 1; i < n; i++) {
1653 if (!(m = dbus_message_new_method_call(
1654 "org.freedesktop.systemd1",
1655 "/org/freedesktop/systemd1",
1656 "org.freedesktop.systemd1.Manager",
1658 log_error("Could not allocate message.");
1663 if (!dbus_message_append_args(m,
1664 DBUS_TYPE_STRING, &args[i],
1665 DBUS_TYPE_STRING, &arg_kill_who,
1666 DBUS_TYPE_STRING, &arg_kill_mode,
1667 DBUS_TYPE_INT32, &arg_signal,
1668 DBUS_TYPE_INVALID)) {
1669 log_error("Could not append arguments to message.");
1674 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1675 log_error("Failed to issue method call: %s", bus_error_message(&error));
1676 dbus_error_free(&error);
1680 dbus_message_unref(m);
1683 dbus_message_unref(reply);
1689 dbus_message_unref(m);
1692 dbus_message_unref(reply);
1694 dbus_error_free(&error);
1699 typedef struct ExecStatusInfo {
1707 usec_t start_timestamp;
1708 usec_t exit_timestamp;
1713 LIST_FIELDS(struct ExecStatusInfo, exec);
1716 static void exec_status_info_free(ExecStatusInfo *i) {
1725 static int exec_status_info_deserialize(DBusMessageIter *sub, ExecStatusInfo *i) {
1726 uint64_t start_timestamp, exit_timestamp;
1727 DBusMessageIter sub2, sub3;
1731 int32_t code, status;
1737 if (dbus_message_iter_get_arg_type(sub) != DBUS_TYPE_STRUCT)
1740 dbus_message_iter_recurse(sub, &sub2);
1742 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0)
1745 if (!(i->path = strdup(path)))
1748 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_ARRAY ||
1749 dbus_message_iter_get_element_type(&sub2) != DBUS_TYPE_STRING)
1753 dbus_message_iter_recurse(&sub2, &sub3);
1754 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
1755 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
1756 dbus_message_iter_next(&sub3);
1761 if (!(i->argv = new0(char*, n+1)))
1765 dbus_message_iter_recurse(&sub2, &sub3);
1766 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
1769 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
1770 dbus_message_iter_get_basic(&sub3, &s);
1771 dbus_message_iter_next(&sub3);
1773 if (!(i->argv[n++] = strdup(s)))
1777 if (!dbus_message_iter_next(&sub2) ||
1778 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, true) < 0 ||
1779 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp, true) < 0 ||
1780 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp, true) < 0 ||
1781 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, true) < 0 ||
1782 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &code, true) < 0 ||
1783 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &status, false) < 0)
1787 i->start_timestamp = (usec_t) start_timestamp;
1788 i->exit_timestamp = (usec_t) exit_timestamp;
1789 i->pid = (pid_t) pid;
1796 typedef struct UnitStatusInfo {
1798 const char *load_state;
1799 const char *active_state;
1800 const char *sub_state;
1802 const char *description;
1803 const char *following;
1806 const char *default_control_group;
1808 usec_t inactive_exit_timestamp;
1809 usec_t active_enter_timestamp;
1810 usec_t active_exit_timestamp;
1811 usec_t inactive_enter_timestamp;
1813 bool need_daemon_reload;
1818 const char *status_text;
1820 #ifdef HAVE_SYSV_COMPAT
1824 usec_t start_timestamp;
1825 usec_t exit_timestamp;
1827 int exit_code, exit_status;
1830 unsigned n_accepted;
1831 unsigned n_connections;
1835 const char *sysfs_path;
1837 /* Mount, Automount */
1843 LIST_HEAD(ExecStatusInfo, exec);
1846 static void print_status_info(UnitStatusInfo *i) {
1848 const char *on, *off, *ss;
1850 char since1[FORMAT_TIMESTAMP_PRETTY_MAX], *s1;
1851 char since2[FORMAT_TIMESTAMP_MAX], *s2;
1855 /* This shows pretty information about a unit. See
1856 * print_property() for a low-level property printer */
1858 printf("%s", strna(i->id));
1860 if (i->description && !streq_ptr(i->id, i->description))
1861 printf(" - %s", i->description);
1866 printf("\t Follow: unit currently follows state of %s\n", i->following);
1868 if (streq_ptr(i->load_state, "failed") ||
1869 streq_ptr(i->load_state, "banned")) {
1870 on = ansi_highlight(true);
1871 off = ansi_highlight(false);
1876 printf("\t Loaded: %s%s%s (%s)\n", on, strna(i->load_state), off, i->path);
1878 printf("\t Loaded: %s%s%s\n", on, strna(i->load_state), off);
1880 ss = streq_ptr(i->active_state, i->sub_state) ? NULL : i->sub_state;
1882 if (streq_ptr(i->active_state, "failed")) {
1883 on = ansi_highlight(true);
1884 off = ansi_highlight(false);
1885 } else if (streq_ptr(i->active_state, "active") || streq_ptr(i->active_state, "reloading")) {
1886 on = ansi_highlight_green(true);
1887 off = ansi_highlight_green(false);
1892 printf("\t Active: %s%s (%s)%s",
1894 strna(i->active_state),
1898 printf("\t Active: %s%s%s",
1900 strna(i->active_state),
1903 timestamp = (streq_ptr(i->active_state, "active") ||
1904 streq_ptr(i->active_state, "reloading")) ? i->active_enter_timestamp :
1905 (streq_ptr(i->active_state, "inactive") ||
1906 streq_ptr(i->active_state, "failed")) ? i->inactive_enter_timestamp :
1907 streq_ptr(i->active_state, "activating") ? i->inactive_exit_timestamp :
1908 i->active_exit_timestamp;
1910 s1 = format_timestamp_pretty(since1, sizeof(since1), timestamp);
1911 s2 = format_timestamp(since2, sizeof(since2), timestamp);
1914 printf(" since %s; %s\n", s2, s1);
1916 printf(" since %s\n", s2);
1921 printf("\t Device: %s\n", i->sysfs_path);
1923 printf("\t Where: %s\n", i->where);
1925 printf("\t What: %s\n", i->what);
1928 printf("\tAccepted: %u; Connected: %u\n", i->n_accepted, i->n_connections);
1930 LIST_FOREACH(exec, p, i->exec) {
1934 /* Only show exited processes here */
1938 t = strv_join(p->argv, " ");
1939 printf("\t Process: %u %s=%s ", p->pid, p->name, strna(t));
1942 #ifdef HAVE_SYSV_COMPAT
1944 good = is_clean_exit_lsb(p->code, p->status);
1947 good = is_clean_exit(p->code, p->status);
1950 on = ansi_highlight(true);
1951 off = ansi_highlight(false);
1955 printf("%s(code=%s, ", on, sigchld_code_to_string(p->code));
1957 if (p->code == CLD_EXITED) {
1960 printf("status=%i", p->status);
1962 #ifdef HAVE_SYSV_COMPAT
1963 if ((c = exit_status_to_string(p->status, i->is_sysv ? EXIT_STATUS_LSB : EXIT_STATUS_SYSTEMD)))
1965 if ((c = exit_status_to_string(p->status, EXIT_STATUS_SYSTEMD)))
1970 printf("signal=%s", signal_to_string(p->status));
1972 printf(")%s\n", off);
1976 if (i->main_pid == p->pid &&
1977 i->start_timestamp == p->start_timestamp &&
1978 i->exit_timestamp == p->start_timestamp)
1979 /* Let's not show this twice */
1982 if (p->pid == i->control_pid)
1986 if (i->main_pid > 0 || i->control_pid > 0) {
1989 if (i->main_pid > 0) {
1990 printf("Main PID: %u", (unsigned) i->main_pid);
1994 get_process_name(i->main_pid, &t);
1999 } else if (i->exit_code > 0) {
2000 printf(" (code=%s, ", sigchld_code_to_string(i->exit_code));
2002 if (i->exit_code == CLD_EXITED) {
2005 printf("status=%i", i->exit_status);
2007 #ifdef HAVE_SYSV_COMPAT
2008 if ((c = exit_status_to_string(i->exit_status, i->is_sysv ? EXIT_STATUS_LSB : EXIT_STATUS_SYSTEMD)))
2010 if ((c = exit_status_to_string(i->exit_status, EXIT_STATUS_SYSTEMD)))
2015 printf("signal=%s", signal_to_string(i->exit_status));
2020 if (i->main_pid > 0 && i->control_pid > 0)
2023 if (i->control_pid > 0) {
2026 printf(" Control: %u", (unsigned) i->control_pid);
2028 get_process_name(i->control_pid, &t);
2039 printf("\t Status: \"%s\"\n", i->status_text);
2041 if (i->default_control_group) {
2044 printf("\t CGroup: %s\n", i->default_control_group);
2046 if ((c = columns()) > 18)
2051 show_cgroup_by_path(i->default_control_group, "\t\t ", c);
2054 if (i->need_daemon_reload)
2055 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %s daemon-reload' recommended.\n",
2056 ansi_highlight(true),
2057 ansi_highlight(false),
2058 arg_user ? "--user" : "--system");
2061 static int status_property(const char *name, DBusMessageIter *iter, UnitStatusInfo *i) {
2063 switch (dbus_message_iter_get_arg_type(iter)) {
2065 case DBUS_TYPE_STRING: {
2068 dbus_message_iter_get_basic(iter, &s);
2071 if (streq(name, "Id"))
2073 else if (streq(name, "LoadState"))
2075 else if (streq(name, "ActiveState"))
2076 i->active_state = s;
2077 else if (streq(name, "SubState"))
2079 else if (streq(name, "Description"))
2081 else if (streq(name, "FragmentPath"))
2083 #ifdef HAVE_SYSV_COMPAT
2084 else if (streq(name, "SysVPath")) {
2089 else if (streq(name, "DefaultControlGroup"))
2090 i->default_control_group = s;
2091 else if (streq(name, "StatusText"))
2093 else if (streq(name, "SysFSPath"))
2095 else if (streq(name, "Where"))
2097 else if (streq(name, "What"))
2099 else if (streq(name, "Following"))
2106 case DBUS_TYPE_BOOLEAN: {
2109 dbus_message_iter_get_basic(iter, &b);
2111 if (streq(name, "Accept"))
2113 else if (streq(name, "NeedDaemonReload"))
2114 i->need_daemon_reload = b;
2119 case DBUS_TYPE_UINT32: {
2122 dbus_message_iter_get_basic(iter, &u);
2124 if (streq(name, "MainPID")) {
2126 i->main_pid = (pid_t) u;
2129 } else if (streq(name, "ControlPID"))
2130 i->control_pid = (pid_t) u;
2131 else if (streq(name, "ExecMainPID")) {
2133 i->main_pid = (pid_t) u;
2134 } else if (streq(name, "NAccepted"))
2136 else if (streq(name, "NConnections"))
2137 i->n_connections = u;
2142 case DBUS_TYPE_INT32: {
2145 dbus_message_iter_get_basic(iter, &j);
2147 if (streq(name, "ExecMainCode"))
2148 i->exit_code = (int) j;
2149 else if (streq(name, "ExecMainStatus"))
2150 i->exit_status = (int) j;
2155 case DBUS_TYPE_UINT64: {
2158 dbus_message_iter_get_basic(iter, &u);
2160 if (streq(name, "ExecMainStartTimestamp"))
2161 i->start_timestamp = (usec_t) u;
2162 else if (streq(name, "ExecMainExitTimestamp"))
2163 i->exit_timestamp = (usec_t) u;
2164 else if (streq(name, "ActiveEnterTimestamp"))
2165 i->active_enter_timestamp = (usec_t) u;
2166 else if (streq(name, "InactiveEnterTimestamp"))
2167 i->inactive_enter_timestamp = (usec_t) u;
2168 else if (streq(name, "InactiveExitTimestamp"))
2169 i->inactive_exit_timestamp = (usec_t) u;
2170 else if (streq(name, "ActiveExitTimestamp"))
2171 i->active_exit_timestamp = (usec_t) u;
2176 case DBUS_TYPE_ARRAY: {
2178 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT &&
2179 startswith(name, "Exec")) {
2180 DBusMessageIter sub;
2182 dbus_message_iter_recurse(iter, &sub);
2183 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2184 ExecStatusInfo *info;
2187 if (!(info = new0(ExecStatusInfo, 1)))
2190 if (!(info->name = strdup(name))) {
2195 if ((r = exec_status_info_deserialize(&sub, info)) < 0) {
2200 LIST_PREPEND(ExecStatusInfo, exec, i->exec, info);
2202 dbus_message_iter_next(&sub);
2213 static int print_property(const char *name, DBusMessageIter *iter) {
2217 /* This is a low-level property printer, see
2218 * print_status_info() for the nicer output */
2220 if (arg_property && !strv_find(arg_property, name))
2223 switch (dbus_message_iter_get_arg_type(iter)) {
2225 case DBUS_TYPE_STRING: {
2227 dbus_message_iter_get_basic(iter, &s);
2229 if (arg_all || s[0])
2230 printf("%s=%s\n", name, s);
2235 case DBUS_TYPE_BOOLEAN: {
2237 dbus_message_iter_get_basic(iter, &b);
2238 printf("%s=%s\n", name, yes_no(b));
2243 case DBUS_TYPE_UINT64: {
2245 dbus_message_iter_get_basic(iter, &u);
2247 /* Yes, heuristics! But we can change this check
2248 * should it turn out to not be sufficient */
2250 if (strstr(name, "Timestamp")) {
2251 char timestamp[FORMAT_TIMESTAMP_MAX], *t;
2253 if ((t = format_timestamp(timestamp, sizeof(timestamp), u)) || arg_all)
2254 printf("%s=%s\n", name, strempty(t));
2255 } else if (strstr(name, "USec")) {
2256 char timespan[FORMAT_TIMESPAN_MAX];
2258 printf("%s=%s\n", name, format_timespan(timespan, sizeof(timespan), u));
2260 printf("%s=%llu\n", name, (unsigned long long) u);
2265 case DBUS_TYPE_UINT32: {
2267 dbus_message_iter_get_basic(iter, &u);
2269 if (strstr(name, "UMask") || strstr(name, "Mode"))
2270 printf("%s=%04o\n", name, u);
2272 printf("%s=%u\n", name, (unsigned) u);
2277 case DBUS_TYPE_INT32: {
2279 dbus_message_iter_get_basic(iter, &i);
2281 printf("%s=%i\n", name, (int) i);
2285 case DBUS_TYPE_DOUBLE: {
2287 dbus_message_iter_get_basic(iter, &d);
2289 printf("%s=%g\n", name, d);
2293 case DBUS_TYPE_STRUCT: {
2294 DBusMessageIter sub;
2295 dbus_message_iter_recurse(iter, &sub);
2297 if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_UINT32 && streq(name, "Job")) {
2300 dbus_message_iter_get_basic(&sub, &u);
2303 printf("%s=%u\n", name, (unsigned) u);
2305 printf("%s=\n", name);
2308 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "Unit")) {
2311 dbus_message_iter_get_basic(&sub, &s);
2313 if (arg_all || s[0])
2314 printf("%s=%s\n", name, s);
2322 case DBUS_TYPE_ARRAY:
2324 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING) {
2325 DBusMessageIter sub;
2328 dbus_message_iter_recurse(iter, &sub);
2330 dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2331 printf("%s=", name);
2333 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2336 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING);
2337 dbus_message_iter_get_basic(&sub, &s);
2338 printf("%s%s", space ? " " : "", s);
2341 dbus_message_iter_next(&sub);
2349 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_BYTE) {
2350 DBusMessageIter sub;
2352 dbus_message_iter_recurse(iter, &sub);
2354 dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2355 printf("%s=", name);
2357 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2360 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_BYTE);
2361 dbus_message_iter_get_basic(&sub, &u);
2364 dbus_message_iter_next(&sub);
2372 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Paths")) {
2373 DBusMessageIter sub, sub2;
2375 dbus_message_iter_recurse(iter, &sub);
2376 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2377 const char *type, *path;
2379 dbus_message_iter_recurse(&sub, &sub2);
2381 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
2382 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
2383 printf("%s=%s\n", type, path);
2385 dbus_message_iter_next(&sub);
2390 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Timers")) {
2391 DBusMessageIter sub, sub2;
2393 dbus_message_iter_recurse(iter, &sub);
2394 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2396 uint64_t value, next_elapse;
2398 dbus_message_iter_recurse(&sub, &sub2);
2400 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &base, true) >= 0 &&
2401 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &value, true) >= 0 &&
2402 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &next_elapse, false) >= 0) {
2403 char timespan1[FORMAT_TIMESPAN_MAX], timespan2[FORMAT_TIMESPAN_MAX];
2405 printf("%s={ value=%s ; next_elapse=%s }\n",
2407 format_timespan(timespan1, sizeof(timespan1), value),
2408 format_timespan(timespan2, sizeof(timespan2), next_elapse));
2411 dbus_message_iter_next(&sub);
2416 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && startswith(name, "Exec")) {
2417 DBusMessageIter sub;
2419 dbus_message_iter_recurse(iter, &sub);
2420 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2421 ExecStatusInfo info;
2424 if (exec_status_info_deserialize(&sub, &info) >= 0) {
2425 char timestamp1[FORMAT_TIMESTAMP_MAX], timestamp2[FORMAT_TIMESTAMP_MAX];
2428 t = strv_join(info.argv, " ");
2430 printf("%s={ path=%s ; argv[]=%s ; ignore=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
2434 yes_no(info.ignore),
2435 strna(format_timestamp(timestamp1, sizeof(timestamp1), info.start_timestamp)),
2436 strna(format_timestamp(timestamp2, sizeof(timestamp2), info.exit_timestamp)),
2437 (unsigned) info. pid,
2438 sigchld_code_to_string(info.code),
2440 info.code == CLD_EXITED ? "" : "/",
2441 strempty(info.code == CLD_EXITED ? NULL : signal_to_string(info.status)));
2447 strv_free(info.argv);
2449 dbus_message_iter_next(&sub);
2459 printf("%s=[unprintable]\n", name);
2464 static int show_one(const char *verb, DBusConnection *bus, const char *path, bool show_properties, bool *new_line) {
2465 DBusMessage *m = NULL, *reply = NULL;
2466 const char *interface = "";
2469 DBusMessageIter iter, sub, sub2, sub3;
2470 UnitStatusInfo info;
2478 dbus_error_init(&error);
2480 if (!(m = dbus_message_new_method_call(
2481 "org.freedesktop.systemd1",
2483 "org.freedesktop.DBus.Properties",
2485 log_error("Could not allocate message.");
2490 if (!dbus_message_append_args(m,
2491 DBUS_TYPE_STRING, &interface,
2492 DBUS_TYPE_INVALID)) {
2493 log_error("Could not append arguments to message.");
2498 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2499 log_error("Failed to issue method call: %s", bus_error_message(&error));
2504 if (!dbus_message_iter_init(reply, &iter) ||
2505 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
2506 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
2507 log_error("Failed to parse reply.");
2512 dbus_message_iter_recurse(&iter, &sub);
2519 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2522 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_DICT_ENTRY) {
2523 log_error("Failed to parse reply.");
2528 dbus_message_iter_recurse(&sub, &sub2);
2530 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0) {
2531 log_error("Failed to parse reply.");
2536 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
2537 log_error("Failed to parse reply.");
2542 dbus_message_iter_recurse(&sub2, &sub3);
2544 if (show_properties)
2545 r = print_property(name, &sub3);
2547 r = status_property(name, &sub3, &info);
2550 log_error("Failed to parse reply.");
2555 dbus_message_iter_next(&sub);
2560 if (!show_properties)
2561 print_status_info(&info);
2563 if (!streq_ptr(info.active_state, "active") &&
2564 !streq_ptr(info.active_state, "reloading") &&
2565 streq(verb, "status"))
2566 /* According to LSB: "program not running" */
2569 while ((p = info.exec)) {
2570 LIST_REMOVE(ExecStatusInfo, exec, info.exec, p);
2571 exec_status_info_free(p);
2576 dbus_message_unref(m);
2579 dbus_message_unref(reply);
2581 dbus_error_free(&error);
2586 static int show(DBusConnection *bus, char **args, unsigned n) {
2587 DBusMessage *m = NULL, *reply = NULL;
2591 bool show_properties, new_line = false;
2596 dbus_error_init(&error);
2598 show_properties = !streq(args[0], "status");
2600 if (show_properties)
2603 if (show_properties && n <= 1) {
2604 /* If not argument is specified inspect the manager
2607 ret = show_one(args[0], bus, "/org/freedesktop/systemd1", show_properties, &new_line);
2611 for (i = 1; i < n; i++) {
2612 const char *path = NULL;
2615 if (safe_atou32(args[i], &id) < 0) {
2617 /* Interpret as unit name */
2619 if (!(m = dbus_message_new_method_call(
2620 "org.freedesktop.systemd1",
2621 "/org/freedesktop/systemd1",
2622 "org.freedesktop.systemd1.Manager",
2624 log_error("Could not allocate message.");
2629 if (!dbus_message_append_args(m,
2630 DBUS_TYPE_STRING, &args[i],
2631 DBUS_TYPE_INVALID)) {
2632 log_error("Could not append arguments to message.");
2637 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2639 if (!dbus_error_has_name(&error, DBUS_ERROR_ACCESS_DENIED)) {
2640 log_error("Failed to issue method call: %s", bus_error_message(&error));
2645 dbus_error_free(&error);
2647 dbus_message_unref(m);
2648 if (!(m = dbus_message_new_method_call(
2649 "org.freedesktop.systemd1",
2650 "/org/freedesktop/systemd1",
2651 "org.freedesktop.systemd1.Manager",
2653 log_error("Could not allocate message.");
2658 if (!dbus_message_append_args(m,
2659 DBUS_TYPE_STRING, &args[i],
2660 DBUS_TYPE_INVALID)) {
2661 log_error("Could not append arguments to message.");
2666 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2667 log_error("Failed to issue method call: %s", bus_error_message(&error));
2669 if (dbus_error_has_name(&error, BUS_ERROR_NO_SUCH_UNIT))
2670 ret = 4; /* According to LSB: "program or service status is unknown" */
2677 } else if (show_properties) {
2679 /* Interpret as job id */
2681 if (!(m = dbus_message_new_method_call(
2682 "org.freedesktop.systemd1",
2683 "/org/freedesktop/systemd1",
2684 "org.freedesktop.systemd1.Manager",
2686 log_error("Could not allocate message.");
2691 if (!dbus_message_append_args(m,
2692 DBUS_TYPE_UINT32, &id,
2693 DBUS_TYPE_INVALID)) {
2694 log_error("Could not append arguments to message.");
2699 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2700 log_error("Failed to issue method call: %s", bus_error_message(&error));
2706 /* Interpret as PID */
2708 if (!(m = dbus_message_new_method_call(
2709 "org.freedesktop.systemd1",
2710 "/org/freedesktop/systemd1",
2711 "org.freedesktop.systemd1.Manager",
2713 log_error("Could not allocate message.");
2718 if (!dbus_message_append_args(m,
2719 DBUS_TYPE_UINT32, &id,
2720 DBUS_TYPE_INVALID)) {
2721 log_error("Could not append arguments to message.");
2726 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2727 log_error("Failed to issue method call: %s", bus_error_message(&error));
2733 if (!dbus_message_get_args(reply, &error,
2734 DBUS_TYPE_OBJECT_PATH, &path,
2735 DBUS_TYPE_INVALID)) {
2736 log_error("Failed to parse reply: %s", bus_error_message(&error));
2741 if ((r = show_one(args[0], bus, path, show_properties, &new_line)) != 0)
2744 dbus_message_unref(m);
2745 dbus_message_unref(reply);
2751 dbus_message_unref(m);
2754 dbus_message_unref(reply);
2756 dbus_error_free(&error);
2761 static DBusHandlerResult monitor_filter(DBusConnection *connection, DBusMessage *message, void *data) {
2763 DBusMessage *m = NULL, *reply = NULL;
2768 dbus_error_init(&error);
2770 log_debug("Got D-Bus request: %s.%s() on %s",
2771 dbus_message_get_interface(message),
2772 dbus_message_get_member(message),
2773 dbus_message_get_path(message));
2775 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
2776 log_error("Warning! D-Bus connection terminated.");
2777 dbus_connection_close(connection);
2779 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "UnitNew") ||
2780 dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "UnitRemoved")) {
2781 const char *id, *path;
2783 if (!dbus_message_get_args(message, &error,
2784 DBUS_TYPE_STRING, &id,
2785 DBUS_TYPE_OBJECT_PATH, &path,
2787 log_error("Failed to parse message: %s", bus_error_message(&error));
2788 else if (streq(dbus_message_get_member(message), "UnitNew"))
2789 printf("Unit %s added.\n", id);
2791 printf("Unit %s removed.\n", id);
2793 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobNew") ||
2794 dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
2796 const char *path, *result;
2798 if (!dbus_message_get_args(message, &error,
2799 DBUS_TYPE_UINT32, &id,
2800 DBUS_TYPE_OBJECT_PATH, &path,
2801 DBUS_TYPE_STRING, &result,
2803 log_error("Failed to parse message: %s", bus_error_message(&error));
2804 else if (streq(dbus_message_get_member(message), "JobNew"))
2805 printf("Job %u added.\n", id);
2807 printf("Job %u removed.\n", id);
2810 } else if (dbus_message_is_signal(message, "org.freedesktop.DBus.Properties", "PropertiesChanged")) {
2812 const char *path, *interface, *property = "Id";
2813 DBusMessageIter iter, sub;
2815 path = dbus_message_get_path(message);
2817 if (!dbus_message_get_args(message, &error,
2818 DBUS_TYPE_STRING, &interface,
2819 DBUS_TYPE_INVALID)) {
2820 log_error("Failed to parse message: %s", bus_error_message(&error));
2824 if (!streq(interface, "org.freedesktop.systemd1.Job") &&
2825 !streq(interface, "org.freedesktop.systemd1.Unit"))
2828 if (!(m = dbus_message_new_method_call(
2829 "org.freedesktop.systemd1",
2831 "org.freedesktop.DBus.Properties",
2833 log_error("Could not allocate message.");
2837 if (!dbus_message_append_args(m,
2838 DBUS_TYPE_STRING, &interface,
2839 DBUS_TYPE_STRING, &property,
2840 DBUS_TYPE_INVALID)) {
2841 log_error("Could not append arguments to message.");
2845 if (!(reply = dbus_connection_send_with_reply_and_block(connection, m, -1, &error))) {
2846 log_error("Failed to issue method call: %s", bus_error_message(&error));
2850 if (!dbus_message_iter_init(reply, &iter) ||
2851 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
2852 log_error("Failed to parse reply.");
2856 dbus_message_iter_recurse(&iter, &sub);
2858 if (streq(interface, "org.freedesktop.systemd1.Unit")) {
2861 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
2862 log_error("Failed to parse reply.");
2866 dbus_message_iter_get_basic(&sub, &id);
2867 printf("Unit %s changed.\n", id);
2871 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_UINT32) {
2872 log_error("Failed to parse reply.");
2876 dbus_message_iter_get_basic(&sub, &id);
2877 printf("Job %u changed.\n", id);
2883 dbus_message_unref(m);
2886 dbus_message_unref(reply);
2888 dbus_error_free(&error);
2889 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
2893 dbus_message_unref(m);
2896 dbus_message_unref(reply);
2898 dbus_error_free(&error);
2899 return DBUS_HANDLER_RESULT_NEED_MEMORY;
2902 static int monitor(DBusConnection *bus, char **args, unsigned n) {
2903 DBusMessage *m = NULL, *reply = NULL;
2907 dbus_error_init(&error);
2910 dbus_bus_add_match(bus,
2912 "sender='org.freedesktop.systemd1',"
2913 "interface='org.freedesktop.systemd1.Manager',"
2914 "path='/org/freedesktop/systemd1'",
2917 if (dbus_error_is_set(&error)) {
2918 log_error("Failed to add match: %s", bus_error_message(&error));
2923 dbus_bus_add_match(bus,
2925 "sender='org.freedesktop.systemd1',"
2926 "interface='org.freedesktop.DBus.Properties',"
2927 "member='PropertiesChanged'",
2930 if (dbus_error_is_set(&error)) {
2931 log_error("Failed to add match: %s", bus_error_message(&error));
2937 if (!dbus_connection_add_filter(bus, monitor_filter, NULL, NULL)) {
2938 log_error("Failed to add filter.");
2943 if (!(m = dbus_message_new_method_call(
2944 "org.freedesktop.systemd1",
2945 "/org/freedesktop/systemd1",
2946 "org.freedesktop.systemd1.Manager",
2948 log_error("Could not allocate message.");
2953 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2954 log_error("Failed to issue method call: %s", bus_error_message(&error));
2959 while (dbus_connection_read_write_dispatch(bus, -1))
2966 /* This is slightly dirty, since we don't undo the filter or the matches. */
2969 dbus_message_unref(m);
2972 dbus_message_unref(reply);
2974 dbus_error_free(&error);
2979 static int dump(DBusConnection *bus, char **args, unsigned n) {
2980 DBusMessage *m = NULL, *reply = NULL;
2985 dbus_error_init(&error);
2989 if (!(m = dbus_message_new_method_call(
2990 "org.freedesktop.systemd1",
2991 "/org/freedesktop/systemd1",
2992 "org.freedesktop.systemd1.Manager",
2994 log_error("Could not allocate message.");
2998 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2999 log_error("Failed to issue method call: %s", bus_error_message(&error));
3004 if (!dbus_message_get_args(reply, &error,
3005 DBUS_TYPE_STRING, &text,
3006 DBUS_TYPE_INVALID)) {
3007 log_error("Failed to parse reply: %s", bus_error_message(&error));
3012 fputs(text, stdout);
3018 dbus_message_unref(m);
3021 dbus_message_unref(reply);
3023 dbus_error_free(&error);
3028 static int snapshot(DBusConnection *bus, char **args, unsigned n) {
3029 DBusMessage *m = NULL, *reply = NULL;
3032 const char *name = "", *path, *id;
3033 dbus_bool_t cleanup = FALSE;
3034 DBusMessageIter iter, sub;
3036 *interface = "org.freedesktop.systemd1.Unit",
3039 dbus_error_init(&error);
3041 if (!(m = dbus_message_new_method_call(
3042 "org.freedesktop.systemd1",
3043 "/org/freedesktop/systemd1",
3044 "org.freedesktop.systemd1.Manager",
3045 "CreateSnapshot"))) {
3046 log_error("Could not allocate message.");
3053 if (!dbus_message_append_args(m,
3054 DBUS_TYPE_STRING, &name,
3055 DBUS_TYPE_BOOLEAN, &cleanup,
3056 DBUS_TYPE_INVALID)) {
3057 log_error("Could not append arguments to message.");
3062 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3063 log_error("Failed to issue method call: %s", bus_error_message(&error));
3068 if (!dbus_message_get_args(reply, &error,
3069 DBUS_TYPE_OBJECT_PATH, &path,
3070 DBUS_TYPE_INVALID)) {
3071 log_error("Failed to parse reply: %s", bus_error_message(&error));
3076 dbus_message_unref(m);
3077 if (!(m = dbus_message_new_method_call(
3078 "org.freedesktop.systemd1",
3080 "org.freedesktop.DBus.Properties",
3082 log_error("Could not allocate message.");
3086 if (!dbus_message_append_args(m,
3087 DBUS_TYPE_STRING, &interface,
3088 DBUS_TYPE_STRING, &property,
3089 DBUS_TYPE_INVALID)) {
3090 log_error("Could not append arguments to message.");
3095 dbus_message_unref(reply);
3096 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3097 log_error("Failed to issue method call: %s", bus_error_message(&error));
3102 if (!dbus_message_iter_init(reply, &iter) ||
3103 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3104 log_error("Failed to parse reply.");
3109 dbus_message_iter_recurse(&iter, &sub);
3111 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
3112 log_error("Failed to parse reply.");
3117 dbus_message_iter_get_basic(&sub, &id);
3125 dbus_message_unref(m);
3128 dbus_message_unref(reply);
3130 dbus_error_free(&error);
3135 static int delete_snapshot(DBusConnection *bus, char **args, unsigned n) {
3136 DBusMessage *m = NULL, *reply = NULL;
3144 dbus_error_init(&error);
3146 for (i = 1; i < n; i++) {
3147 const char *path = NULL;
3149 if (!(m = dbus_message_new_method_call(
3150 "org.freedesktop.systemd1",
3151 "/org/freedesktop/systemd1",
3152 "org.freedesktop.systemd1.Manager",
3154 log_error("Could not allocate message.");
3159 if (!dbus_message_append_args(m,
3160 DBUS_TYPE_STRING, &args[i],
3161 DBUS_TYPE_INVALID)) {
3162 log_error("Could not append arguments to message.");
3167 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3168 log_error("Failed to issue method call: %s", bus_error_message(&error));
3173 if (!dbus_message_get_args(reply, &error,
3174 DBUS_TYPE_OBJECT_PATH, &path,
3175 DBUS_TYPE_INVALID)) {
3176 log_error("Failed to parse reply: %s", bus_error_message(&error));
3181 dbus_message_unref(m);
3182 if (!(m = dbus_message_new_method_call(
3183 "org.freedesktop.systemd1",
3185 "org.freedesktop.systemd1.Snapshot",
3187 log_error("Could not allocate message.");
3192 dbus_message_unref(reply);
3193 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3194 log_error("Failed to issue method call: %s", bus_error_message(&error));
3199 dbus_message_unref(m);
3200 dbus_message_unref(reply);
3208 dbus_message_unref(m);
3211 dbus_message_unref(reply);
3213 dbus_error_free(&error);
3218 static int daemon_reload(DBusConnection *bus, char **args, unsigned n) {
3219 DBusMessage *m = NULL, *reply = NULL;
3224 dbus_error_init(&error);
3226 if (arg_action == ACTION_RELOAD)
3228 else if (arg_action == ACTION_REEXEC)
3229 method = "Reexecute";
3231 assert(arg_action == ACTION_SYSTEMCTL);
3234 streq(args[0], "clear-jobs") ||
3235 streq(args[0], "cancel") ? "ClearJobs" :
3236 streq(args[0], "daemon-reexec") ? "Reexecute" :
3237 streq(args[0], "reset-failed") ? "ResetFailed" :
3238 streq(args[0], "halt") ? "Halt" :
3239 streq(args[0], "poweroff") ? "PowerOff" :
3240 streq(args[0], "reboot") ? "Reboot" :
3241 streq(args[0], "kexec") ? "KExec" :
3242 streq(args[0], "exit") ? "Exit" :
3243 /* "daemon-reload" */ "Reload";
3246 if (!(m = dbus_message_new_method_call(
3247 "org.freedesktop.systemd1",
3248 "/org/freedesktop/systemd1",
3249 "org.freedesktop.systemd1.Manager",
3251 log_error("Could not allocate message.");
3255 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3257 if (arg_action != ACTION_SYSTEMCTL && error_is_no_service(&error)) {
3258 /* There's always a fallback possible for
3259 * legacy actions. */
3264 log_error("Failed to issue method call: %s", bus_error_message(&error));
3273 dbus_message_unref(m);
3276 dbus_message_unref(reply);
3278 dbus_error_free(&error);
3283 static int reset_failed(DBusConnection *bus, char **args, unsigned n) {
3284 DBusMessage *m = NULL, *reply = NULL;
3290 dbus_error_init(&error);
3293 return daemon_reload(bus, args, n);
3295 for (i = 1; i < n; i++) {
3297 if (!(m = dbus_message_new_method_call(
3298 "org.freedesktop.systemd1",
3299 "/org/freedesktop/systemd1",
3300 "org.freedesktop.systemd1.Manager",
3301 "ResetFailedUnit"))) {
3302 log_error("Could not allocate message.");
3307 if (!dbus_message_append_args(m,
3308 DBUS_TYPE_STRING, args + i,
3309 DBUS_TYPE_INVALID)) {
3310 log_error("Could not append arguments to message.");
3315 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3316 log_error("Failed to issue method call: %s", bus_error_message(&error));
3321 dbus_message_unref(m);
3322 dbus_message_unref(reply);
3330 dbus_message_unref(m);
3333 dbus_message_unref(reply);
3335 dbus_error_free(&error);
3340 static int show_enviroment(DBusConnection *bus, char **args, unsigned n) {
3341 DBusMessage *m = NULL, *reply = NULL;
3343 DBusMessageIter iter, sub, sub2;
3346 *interface = "org.freedesktop.systemd1.Manager",
3347 *property = "Environment";
3349 dbus_error_init(&error);
3353 if (!(m = dbus_message_new_method_call(
3354 "org.freedesktop.systemd1",
3355 "/org/freedesktop/systemd1",
3356 "org.freedesktop.DBus.Properties",
3358 log_error("Could not allocate message.");
3362 if (!dbus_message_append_args(m,
3363 DBUS_TYPE_STRING, &interface,
3364 DBUS_TYPE_STRING, &property,
3365 DBUS_TYPE_INVALID)) {
3366 log_error("Could not append arguments to message.");
3371 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3372 log_error("Failed to issue method call: %s", bus_error_message(&error));
3377 if (!dbus_message_iter_init(reply, &iter) ||
3378 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3379 log_error("Failed to parse reply.");
3384 dbus_message_iter_recurse(&iter, &sub);
3386 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_ARRAY ||
3387 dbus_message_iter_get_element_type(&sub) != DBUS_TYPE_STRING) {
3388 log_error("Failed to parse reply.");
3393 dbus_message_iter_recurse(&sub, &sub2);
3395 while (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_INVALID) {
3398 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_STRING) {
3399 log_error("Failed to parse reply.");
3404 dbus_message_iter_get_basic(&sub2, &text);
3405 printf("%s\n", text);
3407 dbus_message_iter_next(&sub2);
3414 dbus_message_unref(m);
3417 dbus_message_unref(reply);
3419 dbus_error_free(&error);
3424 static int set_environment(DBusConnection *bus, char **args, unsigned n) {
3425 DBusMessage *m = NULL, *reply = NULL;
3429 DBusMessageIter iter, sub;
3432 dbus_error_init(&error);
3434 method = streq(args[0], "set-environment")
3436 : "UnsetEnvironment";
3438 if (!(m = dbus_message_new_method_call(
3439 "org.freedesktop.systemd1",
3440 "/org/freedesktop/systemd1",
3441 "org.freedesktop.systemd1.Manager",
3444 log_error("Could not allocate message.");
3448 dbus_message_iter_init_append(m, &iter);
3450 if (!dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub)) {
3451 log_error("Could not append arguments to message.");
3456 for (i = 1; i < n; i++)
3457 if (!dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &args[i])) {
3458 log_error("Could not append arguments to message.");
3463 if (!dbus_message_iter_close_container(&iter, &sub)) {
3464 log_error("Could not append arguments to message.");
3469 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3470 log_error("Failed to issue method call: %s", bus_error_message(&error));
3479 dbus_message_unref(m);
3482 dbus_message_unref(reply);
3484 dbus_error_free(&error);
3497 static Hashmap *will_install = NULL, *have_installed = NULL;
3498 static Set *remove_symlinks_to = NULL;
3499 static unsigned n_symlinks = 0;
3501 static void install_info_free(InstallInfo *i) {
3506 strv_free(i->aliases);
3507 strv_free(i->wanted_by);
3511 static void install_info_hashmap_free(Hashmap *m) {
3514 while ((i = hashmap_steal_first(m)))
3515 install_info_free(i);
3520 static int install_info_add(const char *name) {
3524 assert(will_install);
3526 if (!unit_name_is_valid_no_type(name, true)) {
3527 log_warning("Unit name %s is not a valid unit name.", name);
3531 if (hashmap_get(have_installed, name) ||
3532 hashmap_get(will_install, name))
3535 if (!(i = new0(InstallInfo, 1))) {
3540 if (!(i->name = strdup(name))) {
3545 if ((r = hashmap_put(will_install, i->name, i)) < 0)
3552 install_info_free(i);
3557 static int config_parse_also(
3558 const char *filename,
3560 const char *section,
3574 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
3578 if (!(n = strndup(w, l)))
3581 if ((r = install_info_add(n)) < 0) {
3582 log_warning("Cannot install unit %s: %s", n, strerror(-r));
3593 static int mark_symlink_for_removal(const char *p) {
3598 assert(path_is_absolute(p));
3600 if (!remove_symlinks_to)
3603 if (!(n = strdup(p)))
3606 path_kill_slashes(n);
3608 if ((r = set_put(remove_symlinks_to, n)) < 0) {
3610 return r == -EEXIST ? 0 : r;
3616 static int remove_marked_symlinks_fd(int fd, const char *config_path, const char *root, bool *deleted) {
3625 if (!(d = fdopendir(fd))) {
3626 close_nointr_nofail(fd);
3632 while ((de = readdir(d))) {
3633 bool is_dir = false, is_link = false;
3635 if (ignore_file(de->d_name))
3638 if (de->d_type == DT_LNK)
3640 else if (de->d_type == DT_DIR)
3642 else if (de->d_type == DT_UNKNOWN) {
3645 if (fstatat(fd, de->d_name, &st, AT_SYMLINK_NOFOLLOW) < 0) {
3646 log_error("Failed to stat %s/%s: %m", root, de->d_name);
3653 is_link = S_ISLNK(st.st_mode);
3654 is_dir = S_ISDIR(st.st_mode);
3662 if ((nfd = openat(fd, de->d_name, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW)) < 0) {
3663 log_error("Failed to open %s/%s: %m", root, de->d_name);
3670 if (asprintf(&p, "%s/%s", root, de->d_name) < 0) {
3671 log_error("Failed to allocate directory string.");
3672 close_nointr_nofail(nfd);
3677 /* This will close nfd, regardless whether it succeeds or not */
3678 q = remove_marked_symlinks_fd(nfd, config_path, p, deleted);
3684 } else if (is_link) {
3688 if (asprintf(&p, "%s/%s", root, de->d_name) < 0) {
3689 log_error("Failed to allocate symlink string.");
3694 if ((q = readlink_and_make_absolute(p, &dest)) < 0) {
3695 log_error("Cannot read symlink %s: %s", p, strerror(-q));
3703 if ((c = canonicalize_file_name(dest))) {
3704 /* This might fail if the destination
3705 * is already removed */
3711 path_kill_slashes(dest);
3712 if (set_get(remove_symlinks_to, dest)) {
3715 log_info("rm '%s'", p);
3717 if (unlink(p) < 0) {
3718 log_error("Cannot unlink symlink %s: %m", p);
3723 rmdir_parents(p, config_path);
3724 path_kill_slashes(p);
3726 if (!set_get(remove_symlinks_to, p)) {
3728 if ((r = mark_symlink_for_removal(p)) < 0) {
3747 static int remove_marked_symlinks(const char *config_path) {
3751 assert(config_path);
3753 if (set_size(remove_symlinks_to) <= 0)
3756 if ((fd = open(config_path, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW)) < 0)
3763 if ((cfd = dup(fd)) < 0) {
3768 /* This takes possession of cfd and closes it */
3769 if ((q = remove_marked_symlinks_fd(cfd, config_path, config_path, &deleted)) < 0) {
3775 close_nointr_nofail(fd);
3780 static int create_symlink(const char *verb, const char *old_path, const char *new_path) {
3787 if (streq(verb, "enable")) {
3790 mkdir_parents(new_path, 0755);
3792 if (symlink(old_path, new_path) >= 0) {
3795 log_info("ln -s '%s' '%s'", old_path, new_path);
3800 if (errno != EEXIST) {
3801 log_error("Cannot link %s to %s: %m", old_path, new_path);
3805 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3807 if (errno == EINVAL) {
3808 log_error("Cannot link %s to %s, file exists already and is not a symlink.", old_path, new_path);
3812 log_error("readlink() failed: %s", strerror(-r));
3816 if (streq(dest, old_path)) {
3822 log_error("Cannot link %s to %s, symlink exists already and points to %s.", old_path, new_path, dest);
3831 log_info("ln -s '%s' '%s'", old_path, new_path);
3833 if (symlink(old_path, new_path) >= 0)
3836 log_error("Cannot link %s to %s: %m", old_path, new_path);
3839 } else if (streq(verb, "disable")) {
3842 if ((r = mark_symlink_for_removal(old_path)) < 0)
3845 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3846 if (errno == ENOENT)
3849 if (errno == EINVAL) {
3850 log_warning("File %s not a symlink, ignoring.", old_path);
3854 log_error("readlink() failed: %s", strerror(-r));
3858 if (!streq(dest, old_path)) {
3859 log_warning("File %s not a symlink to %s but points to %s, ignoring.", new_path, old_path, dest);
3866 if ((r = mark_symlink_for_removal(new_path)) < 0)
3870 log_info("rm '%s'", new_path);
3872 if (unlink(new_path) >= 0)
3875 log_error("Cannot unlink %s: %m", new_path);
3878 } else if (streq(verb, "is-enabled")) {
3881 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3883 if (errno == ENOENT || errno == EINVAL)
3886 log_error("readlink() failed: %s", strerror(-r));
3890 if (streq(dest, old_path)) {
3898 assert_not_reached("Unknown action.");
3901 static int install_info_symlink_alias(const char *verb, InstallInfo *i, const char *config_path) {
3903 char *alias_path = NULL;
3908 assert(config_path);
3910 STRV_FOREACH(s, i->aliases) {
3913 if (!(alias_path = path_make_absolute(*s, config_path))) {
3914 log_error("Out of memory");
3919 if ((r = create_symlink(verb, i->path, alias_path)) != 0)
3922 if (streq(verb, "disable"))
3923 rmdir_parents(alias_path, config_path);
3933 static int install_info_symlink_wants(const char *verb, InstallInfo *i, const char *config_path) {
3935 char *alias_path = NULL;
3940 assert(config_path);
3942 STRV_FOREACH(s, i->wanted_by) {
3943 if (!unit_name_is_valid_no_type(*s, true)) {
3944 log_error("Invalid name %s.", *s);
3952 if (asprintf(&alias_path, "%s/%s.wants/%s", config_path, *s, i->name) < 0) {
3953 log_error("Out of memory");
3958 if ((r = create_symlink(verb, i->path, alias_path)) != 0)
3961 if (streq(verb, "disable"))
3962 rmdir_parents(alias_path, config_path);
3973 static int install_info_apply(const char *verb, LookupPaths *paths, InstallInfo *i, const char *config_path) {
3975 const ConfigItem items[] = {
3976 { "Alias", config_parse_strv, &i->aliases, "Install" },
3977 { "WantedBy", config_parse_strv, &i->wanted_by, "Install" },
3978 { "Also", config_parse_also, NULL, "Install" },
3980 { NULL, NULL, NULL, NULL }
3984 char *filename = NULL;
3991 STRV_FOREACH(p, paths->unit_path) {
3994 if (!(filename = path_make_absolute(i->name, *p))) {
3995 log_error("Out of memory");
3999 /* Ensure that we don't follow symlinks */
4000 if ((fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOFOLLOW|O_NOCTTY)) >= 0)
4001 if ((f = fdopen(fd, "re")))
4004 if (errno == ELOOP) {
4005 log_error("Refusing to operate on symlinks, please pass unit names or absolute paths to unit files.");
4010 if (errno != ENOENT) {
4011 log_error("Failed to open %s: %m", filename);
4021 #if defined(TARGET_FEDORA) && defined (HAVE_SYSV_COMPAT)
4023 if (endswith(i->name, ".service")) {
4027 if (asprintf(&sysv, SYSTEM_SYSVINIT_PATH "/%s", i->name) < 0) {
4028 log_error("Out of memory");
4032 sysv[strlen(sysv) - sizeof(".service") + 1] = 0;
4033 exists = access(sysv, F_OK) >= 0;
4039 const char *argv[] = {
4046 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", i->name);
4048 argv[1] = file_name_from_path(sysv);
4050 streq(verb, "enable") ? "on" :
4051 streq(verb, "disable") ? "off" : NULL;
4053 log_info("Executing %s %s %s", argv[0], argv[1], strempty(argv[2]));
4055 if ((pid = fork()) < 0) {
4056 log_error("Failed to fork: %m");
4059 } else if (pid == 0) {
4060 execv(argv[0], (char**) argv);
4061 _exit(EXIT_FAILURE);
4066 if ((r = wait_for_terminate(pid, &status)) < 0)
4069 if (status.si_code == CLD_EXITED) {
4070 if (status.si_status == 0 && (streq(verb, "enable") || streq(verb, "disable")))
4073 return status.si_status == 0 ? 0 : -EINVAL;
4083 log_error("Couldn't find %s.", i->name);
4089 if ((r = config_parse(filename, f, NULL, items, true, i)) < 0) {
4094 n_symlinks += strv_length(i->aliases);
4095 n_symlinks += strv_length(i->wanted_by);
4099 if ((r = install_info_symlink_alias(verb, i, config_path)) != 0)
4102 if ((r = install_info_symlink_wants(verb, i, config_path)) != 0)
4105 if ((r = mark_symlink_for_removal(filename)) < 0)
4108 if ((r = remove_marked_symlinks(config_path)) < 0)
4114 static char *get_config_path(void) {
4116 if (arg_user && arg_global)
4117 return strdup(USER_CONFIG_UNIT_PATH);
4122 if (user_config_home(&p) < 0)
4128 return strdup(SYSTEM_CONFIG_UNIT_PATH);
4131 static int enable_unit(DBusConnection *bus, char **args, unsigned n) {
4135 char *config_path = NULL;
4138 const char *verb = args[0];
4140 dbus_error_init(&error);
4143 if ((r = lookup_paths_init(&paths, arg_user ? MANAGER_USER : MANAGER_SYSTEM)) < 0) {
4144 log_error("Failed to determine lookup paths: %s", strerror(-r));
4148 if (!(config_path = get_config_path())) {
4149 log_error("Failed to determine config path");
4154 will_install = hashmap_new(string_hash_func, string_compare_func);
4155 have_installed = hashmap_new(string_hash_func, string_compare_func);
4157 if (!will_install || !have_installed) {
4158 log_error("Failed to allocate unit sets.");
4163 if (!arg_defaults && streq(verb, "disable"))
4164 if (!(remove_symlinks_to = set_new(string_hash_func, string_compare_func))) {
4165 log_error("Failed to allocate symlink sets.");
4170 for (j = 1; j < n; j++)
4171 if ((r = install_info_add(args[j])) < 0) {
4172 log_warning("Cannot install unit %s: %s", args[j], strerror(-r));
4176 while ((i = hashmap_first(will_install))) {
4179 assert_se(hashmap_move_one(have_installed, will_install, i->name) == 0);
4181 if ((q = install_info_apply(verb, &paths, i, config_path)) != 0) {
4189 /* In test mode and found something */
4195 if (streq(verb, "is-enabled"))
4196 r = r > 0 ? 0 : -ENOENT;
4198 if (n_symlinks <= 0)
4199 log_warning("Unit files contain no applicable installation information. Ignoring.");
4202 /* Don't try to reload anything if the user asked us to not do this */
4204 /* Don't try to reload anything when updating a unit globally */
4206 /* Don't try to reload anything if we are called for system changes but the system wasn't booted with systemd */
4207 (arg_user || sd_booted() > 0) &&
4208 /* Don't try to reload anything if we are running in a chroot environment */
4209 (arg_user || running_in_chroot() <= 0) ) {
4212 if ((q = daemon_reload(bus, args, n)) < 0)
4218 install_info_hashmap_free(will_install);
4219 install_info_hashmap_free(have_installed);
4221 set_free_free(remove_symlinks_to);
4223 lookup_paths_free(&paths);
4230 static int systemctl_help(void) {
4232 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4233 "Send control commands to or query the systemd manager.\n\n"
4234 " -h --help Show this help\n"
4235 " --version Show package version\n"
4236 " -t --type=TYPE List only units of a particular type\n"
4237 " -p --property=NAME Show only properties by this name\n"
4238 " -a --all Show all units/properties, including dead/empty ones\n"
4239 " --failed Show only failed units\n"
4240 " --full Don't ellipsize unit names on output\n"
4241 " --fail When queueing a new job, fail if conflicting jobs are\n"
4243 " --ignore-dependencies\n"
4244 " When queueing a new job, ignore all its dependencies\n"
4245 " -q --quiet Suppress output\n"
4246 " --no-block Do not wait until operation finished\n"
4247 " --no-pager Do not pipe output into a pager.\n"
4248 " --system Connect to system manager\n"
4249 " --user Connect to user service manager\n"
4250 " --order When generating graph for dot, show only order\n"
4251 " --require When generating graph for dot, show only requirement\n"
4252 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4253 " --global Enable/disable unit files globally\n"
4254 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4256 " --no-ask-password\n"
4257 " Do not ask for system passwords\n"
4258 " --kill-mode=MODE How to send signal\n"
4259 " --kill-who=WHO Who to send signal to\n"
4260 " -s --signal=SIGNAL Which signal to send\n"
4261 " -f --force When enabling unit files, override existing symlinks\n"
4262 " When shutting down, execute action immediately\n"
4263 " --defaults When disabling unit files, remove default symlinks only\n\n"
4265 " list-units List units\n"
4266 " start [NAME...] Start (activate) one or more units\n"
4267 " stop [NAME...] Stop (deactivate) one or more units\n"
4268 " reload [NAME...] Reload one or more units\n"
4269 " restart [NAME...] Start or restart one or more units\n"
4270 " try-restart [NAME...] Restart one or more units if active\n"
4271 " reload-or-restart [NAME...] Reload one or more units is possible,\n"
4272 " otherwise start or restart\n"
4273 " reload-or-try-restart [NAME...] Reload one or more units is possible,\n"
4274 " otherwise restart if active\n"
4275 " isolate [NAME] Start one unit and stop all others\n"
4276 " kill [NAME...] Send signal to processes of a unit\n"
4277 " is-active [NAME...] Check whether units are active\n"
4278 " status [NAME...|PID...] Show runtime status of one or more units\n"
4279 " show [NAME...|JOB...] Show properties of one or more\n"
4280 " units/jobs or the manager\n"
4281 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4283 " enable [NAME...] Enable one or more unit files\n"
4284 " disable [NAME...] Disable one or more unit files\n"
4285 " is-enabled [NAME...] Check whether unit files are enabled\n"
4286 " load [NAME...] Load one or more units\n"
4287 " list-jobs List jobs\n"
4288 " cancel [JOB...] Cancel all, one, or more jobs\n"
4289 " monitor Monitor unit/job changes\n"
4290 " dump Dump server status\n"
4291 " dot Dump dependency graph for dot(1)\n"
4292 " snapshot [NAME] Create a snapshot\n"
4293 " delete [NAME...] Remove one or more snapshots\n"
4294 " daemon-reload Reload systemd manager configuration\n"
4295 " daemon-reexec Reexecute systemd manager\n"
4296 " show-environment Dump environment\n"
4297 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4298 " unset-environment [NAME...] Unset one or more environment variables\n"
4299 " default Enter system default mode\n"
4300 " rescue Enter system rescue mode\n"
4301 " emergency Enter system emergency mode\n"
4302 " halt Shut down and halt the system\n"
4303 " poweroff Shut down and power-off the system\n"
4304 " reboot Shut down and reboot the system\n"
4305 " kexec Shut down and reboot the system with kexec\n"
4306 " exit Ask for user instance termination\n",
4307 program_invocation_short_name);
4312 static int halt_help(void) {
4314 printf("%s [OPTIONS...]\n\n"
4315 "%s the system.\n\n"
4316 " --help Show this help\n"
4317 " --halt Halt the machine\n"
4318 " -p --poweroff Switch off the machine\n"
4319 " --reboot Reboot the machine\n"
4320 " -f --force Force immediate halt/power-off/reboot\n"
4321 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4322 " -d --no-wtmp Don't write wtmp record\n"
4323 " -n --no-sync Don't sync before halt/power-off/reboot\n"
4324 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4325 program_invocation_short_name,
4326 arg_action == ACTION_REBOOT ? "Reboot" :
4327 arg_action == ACTION_POWEROFF ? "Power off" :
4333 static int shutdown_help(void) {
4335 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4336 "Shut down the system.\n\n"
4337 " --help Show this help\n"
4338 " -H --halt Halt the machine\n"
4339 " -P --poweroff Power-off the machine\n"
4340 " -r --reboot Reboot the machine\n"
4341 " -h Equivalent to --poweroff, overriden by --halt\n"
4342 " -k Don't halt/power-off/reboot, just send warnings\n"
4343 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4344 " -c Cancel a pending shutdown\n",
4345 program_invocation_short_name);
4350 static int telinit_help(void) {
4352 printf("%s [OPTIONS...] {COMMAND}\n\n"
4353 "Send control commands to the init daemon.\n\n"
4354 " --help Show this help\n"
4355 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4357 " 0 Power-off the machine\n"
4358 " 6 Reboot the machine\n"
4359 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4360 " 1, s, S Enter rescue mode\n"
4361 " q, Q Reload init daemon configuration\n"
4362 " u, U Reexecute init daemon\n",
4363 program_invocation_short_name);
4368 static int runlevel_help(void) {
4370 printf("%s [OPTIONS...]\n\n"
4371 "Prints the previous and current runlevel of the init system.\n\n"
4372 " --help Show this help\n",
4373 program_invocation_short_name);
4378 static int systemctl_parse_argv(int argc, char *argv[]) {
4382 ARG_IGNORE_DEPENDENCIES,
4397 ARG_NO_ASK_PASSWORD,
4401 static const struct option options[] = {
4402 { "help", no_argument, NULL, 'h' },
4403 { "version", no_argument, NULL, ARG_VERSION },
4404 { "type", required_argument, NULL, 't' },
4405 { "property", required_argument, NULL, 'p' },
4406 { "all", no_argument, NULL, 'a' },
4407 { "failed", no_argument, NULL, ARG_FAILED },
4408 { "full", no_argument, NULL, ARG_FULL },
4409 { "fail", no_argument, NULL, ARG_FAIL },
4410 { "ignore-dependencies", no_argument, NULL, ARG_IGNORE_DEPENDENCIES },
4411 { "user", no_argument, NULL, ARG_USER },
4412 { "system", no_argument, NULL, ARG_SYSTEM },
4413 { "global", no_argument, NULL, ARG_GLOBAL },
4414 { "no-block", no_argument, NULL, ARG_NO_BLOCK },
4415 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
4416 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4417 { "quiet", no_argument, NULL, 'q' },
4418 { "order", no_argument, NULL, ARG_ORDER },
4419 { "require", no_argument, NULL, ARG_REQUIRE },
4420 { "force", no_argument, NULL, 'f' },
4421 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
4422 { "defaults", no_argument, NULL, ARG_DEFAULTS },
4423 { "kill-mode", required_argument, NULL, ARG_KILL_MODE },
4424 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
4425 { "signal", required_argument, NULL, 's' },
4426 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
4427 { NULL, 0, NULL, 0 }
4435 /* Only when running as systemctl we ask for passwords */
4436 arg_ask_password = true;
4438 while ((c = getopt_long(argc, argv, "ht:p:aqfs:", options, NULL)) >= 0) {
4447 puts(PACKAGE_STRING);
4449 puts(SYSTEMD_FEATURES);
4459 if (!(l = strv_append(arg_property, optarg)))
4462 strv_free(arg_property);
4465 /* If the user asked for a particular
4466 * property, show it to him, even if it is
4477 arg_job_mode = "fail";
4480 case ARG_IGNORE_DEPENDENCIES:
4481 arg_job_mode = "ignore-dependencies";
4493 arg_no_block = true;
4497 arg_no_pager = true;
4505 arg_dot = DOT_ORDER;
4509 arg_dot = DOT_REQUIRE;
4529 arg_no_reload = true;
4538 arg_defaults = true;
4542 arg_kill_who = optarg;
4546 arg_kill_mode = optarg;
4550 if ((arg_signal = signal_from_string_try_harder(optarg)) < 0) {
4551 log_error("Failed to parse signal string %s.", optarg);
4556 case ARG_NO_ASK_PASSWORD:
4557 arg_ask_password = false;
4564 log_error("Unknown option code %c", c);
4572 static int halt_parse_argv(int argc, char *argv[]) {
4581 static const struct option options[] = {
4582 { "help", no_argument, NULL, ARG_HELP },
4583 { "halt", no_argument, NULL, ARG_HALT },
4584 { "poweroff", no_argument, NULL, 'p' },
4585 { "reboot", no_argument, NULL, ARG_REBOOT },
4586 { "force", no_argument, NULL, 'f' },
4587 { "wtmp-only", no_argument, NULL, 'w' },
4588 { "no-wtmp", no_argument, NULL, 'd' },
4589 { "no-sync", no_argument, NULL, 'n' },
4590 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4591 { NULL, 0, NULL, 0 }
4599 if (utmp_get_runlevel(&runlevel, NULL) >= 0)
4600 if (runlevel == '0' || runlevel == '6')
4601 arg_immediate = true;
4603 while ((c = getopt_long(argc, argv, "pfwdnih", options, NULL)) >= 0) {
4611 arg_action = ACTION_HALT;
4615 if (arg_action != ACTION_REBOOT)
4616 arg_action = ACTION_POWEROFF;
4620 arg_action = ACTION_REBOOT;
4624 arg_immediate = true;
4645 /* Compatibility nops */
4652 log_error("Unknown option code %c", c);
4657 if (optind < argc) {
4658 log_error("Too many arguments.");
4665 static int parse_time_spec(const char *t, usec_t *_u) {
4669 if (streq(t, "now"))
4671 else if (t[0] == '+') {
4674 if (safe_atou64(t + 1, &u) < 0)
4677 *_u = now(CLOCK_REALTIME) + USEC_PER_MINUTE * u;
4686 hour = strtol(t, &e, 10);
4687 if (errno != 0 || *e != ':' || hour < 0 || hour > 23)
4690 minute = strtol(e+1, &e, 10);
4691 if (errno != 0 || *e != 0 || minute < 0 || minute > 59)
4694 n = now(CLOCK_REALTIME);
4695 s = (time_t) (n / USEC_PER_SEC);
4698 assert_se(localtime_r(&s, &tm));
4700 tm.tm_hour = (int) hour;
4701 tm.tm_min = (int) minute;
4704 assert_se(s = mktime(&tm));
4706 *_u = (usec_t) s * USEC_PER_SEC;
4709 *_u += USEC_PER_DAY;
4715 static bool kexec_loaded(void) {
4716 bool loaded = false;
4719 if (read_one_line_file("/sys/kernel/kexec_loaded", &s) >= 0) {
4727 static int shutdown_parse_argv(int argc, char *argv[]) {
4734 static const struct option options[] = {
4735 { "help", no_argument, NULL, ARG_HELP },
4736 { "halt", no_argument, NULL, 'H' },
4737 { "poweroff", no_argument, NULL, 'P' },
4738 { "reboot", no_argument, NULL, 'r' },
4739 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4740 { NULL, 0, NULL, 0 }
4748 while ((c = getopt_long(argc, argv, "HPrhkt:afFc", options, NULL)) >= 0) {
4756 arg_action = ACTION_HALT;
4760 arg_action = ACTION_POWEROFF;
4765 arg_action = ACTION_KEXEC;
4767 arg_action = ACTION_REBOOT;
4771 if (arg_action != ACTION_HALT)
4772 arg_action = ACTION_POWEROFF;
4785 /* Compatibility nops */
4789 arg_action = ACTION_CANCEL_SHUTDOWN;
4796 log_error("Unknown option code %c", c);
4801 if (argc > optind) {
4802 if ((r = parse_time_spec(argv[optind], &arg_when)) < 0) {
4803 log_error("Failed to parse time specification: %s", argv[optind]);
4807 arg_when = now(CLOCK_REALTIME) + USEC_PER_MINUTE;
4809 /* We skip the time argument */
4810 if (argc > optind + 1)
4811 arg_wall = argv + optind + 1;
4818 static int telinit_parse_argv(int argc, char *argv[]) {
4825 static const struct option options[] = {
4826 { "help", no_argument, NULL, ARG_HELP },
4827 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4828 { NULL, 0, NULL, 0 }
4831 static const struct {
4835 { '0', ACTION_POWEROFF },
4836 { '6', ACTION_REBOOT },
4837 { '1', ACTION_RESCUE },
4838 { '2', ACTION_RUNLEVEL2 },
4839 { '3', ACTION_RUNLEVEL3 },
4840 { '4', ACTION_RUNLEVEL4 },
4841 { '5', ACTION_RUNLEVEL5 },
4842 { 's', ACTION_RESCUE },
4843 { 'S', ACTION_RESCUE },
4844 { 'q', ACTION_RELOAD },
4845 { 'Q', ACTION_RELOAD },
4846 { 'u', ACTION_REEXEC },
4847 { 'U', ACTION_REEXEC }
4856 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
4871 log_error("Unknown option code %c", c);
4876 if (optind >= argc) {
4881 if (optind + 1 < argc) {
4882 log_error("Too many arguments.");
4886 if (strlen(argv[optind]) != 1) {
4887 log_error("Expected single character argument.");
4891 for (i = 0; i < ELEMENTSOF(table); i++)
4892 if (table[i].from == argv[optind][0])
4895 if (i >= ELEMENTSOF(table)) {
4896 log_error("Unknown command %s.", argv[optind]);
4900 arg_action = table[i].to;
4907 static int runlevel_parse_argv(int argc, char *argv[]) {
4913 static const struct option options[] = {
4914 { "help", no_argument, NULL, ARG_HELP },
4915 { NULL, 0, NULL, 0 }
4923 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
4934 log_error("Unknown option code %c", c);
4939 if (optind < argc) {
4940 log_error("Too many arguments.");
4947 static int parse_argv(int argc, char *argv[]) {
4951 if (program_invocation_short_name) {
4953 if (strstr(program_invocation_short_name, "halt")) {
4954 arg_action = ACTION_HALT;
4955 return halt_parse_argv(argc, argv);
4956 } else if (strstr(program_invocation_short_name, "poweroff")) {
4957 arg_action = ACTION_POWEROFF;
4958 return halt_parse_argv(argc, argv);
4959 } else if (strstr(program_invocation_short_name, "reboot")) {
4961 arg_action = ACTION_KEXEC;
4963 arg_action = ACTION_REBOOT;
4964 return halt_parse_argv(argc, argv);
4965 } else if (strstr(program_invocation_short_name, "shutdown")) {
4966 arg_action = ACTION_POWEROFF;
4967 return shutdown_parse_argv(argc, argv);
4968 } else if (strstr(program_invocation_short_name, "init")) {
4970 if (sd_booted() > 0) {
4971 arg_action = ACTION_INVALID;
4972 return telinit_parse_argv(argc, argv);
4974 /* Hmm, so some other init system is
4975 * running, we need to forward this
4976 * request to it. For now we simply
4977 * guess that it is Upstart. */
4979 execv("/lib/upstart/telinit", argv);
4981 log_error("Couldn't find an alternative telinit implementation to spawn.");
4985 } else if (strstr(program_invocation_short_name, "runlevel")) {
4986 arg_action = ACTION_RUNLEVEL;
4987 return runlevel_parse_argv(argc, argv);
4991 arg_action = ACTION_SYSTEMCTL;
4992 return systemctl_parse_argv(argc, argv);
4995 static int action_to_runlevel(void) {
4997 static const char table[_ACTION_MAX] = {
4998 [ACTION_HALT] = '0',
4999 [ACTION_POWEROFF] = '0',
5000 [ACTION_REBOOT] = '6',
5001 [ACTION_RUNLEVEL2] = '2',
5002 [ACTION_RUNLEVEL3] = '3',
5003 [ACTION_RUNLEVEL4] = '4',
5004 [ACTION_RUNLEVEL5] = '5',
5005 [ACTION_RESCUE] = '1'
5008 assert(arg_action < _ACTION_MAX);
5010 return table[arg_action];
5013 static int talk_upstart(void) {
5014 DBusMessage *m = NULL, *reply = NULL;
5016 int previous, rl, r;
5018 env1_buf[] = "RUNLEVEL=X",
5019 env2_buf[] = "PREVLEVEL=X";
5020 char *env1 = env1_buf, *env2 = env2_buf;
5021 const char *emit = "runlevel";
5022 dbus_bool_t b_false = FALSE;
5023 DBusMessageIter iter, sub;
5024 DBusConnection *bus;
5026 dbus_error_init(&error);
5028 if (!(rl = action_to_runlevel()))
5031 if (utmp_get_runlevel(&previous, NULL) < 0)
5034 if (!(bus = dbus_connection_open_private("unix:abstract=/com/ubuntu/upstart", &error))) {
5035 if (dbus_error_has_name(&error, DBUS_ERROR_NO_SERVER)) {
5040 log_error("Failed to connect to Upstart bus: %s", bus_error_message(&error));
5045 if ((r = bus_check_peercred(bus)) < 0) {
5046 log_error("Failed to verify owner of bus.");
5050 if (!(m = dbus_message_new_method_call(
5051 "com.ubuntu.Upstart",
5052 "/com/ubuntu/Upstart",
5053 "com.ubuntu.Upstart0_6",
5056 log_error("Could not allocate message.");
5061 dbus_message_iter_init_append(m, &iter);
5063 env1_buf[sizeof(env1_buf)-2] = rl;
5064 env2_buf[sizeof(env2_buf)-2] = previous;
5066 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &emit) ||
5067 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub) ||
5068 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env1) ||
5069 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env2) ||
5070 !dbus_message_iter_close_container(&iter, &sub) ||
5071 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b_false)) {
5072 log_error("Could not append arguments to message.");
5077 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
5079 if (error_is_no_service(&error)) {
5084 log_error("Failed to issue method call: %s", bus_error_message(&error));
5093 dbus_message_unref(m);
5096 dbus_message_unref(reply);
5099 dbus_connection_flush(bus);
5100 dbus_connection_close(bus);
5101 dbus_connection_unref(bus);
5104 dbus_error_free(&error);
5109 static int talk_initctl(void) {
5110 struct init_request request;
5114 if (!(rl = action_to_runlevel()))
5118 request.magic = INIT_MAGIC;
5119 request.sleeptime = 0;
5120 request.cmd = INIT_CMD_RUNLVL;
5121 request.runlevel = rl;
5123 if ((fd = open(INIT_FIFO, O_WRONLY|O_NDELAY|O_CLOEXEC|O_NOCTTY)) < 0) {
5125 if (errno == ENOENT)
5128 log_error("Failed to open "INIT_FIFO": %m");
5133 r = loop_write(fd, &request, sizeof(request), false) != sizeof(request);
5134 close_nointr_nofail(fd);
5137 log_error("Failed to write to "INIT_FIFO": %m");
5138 return errno ? -errno : -EIO;
5144 static int systemctl_main(DBusConnection *bus, int argc, char *argv[], DBusError *error) {
5146 static const struct {
5154 int (* const dispatch)(DBusConnection *bus, char **args, unsigned n);
5156 { "list-units", LESS, 1, list_units },
5157 { "list-jobs", EQUAL, 1, list_jobs },
5158 { "clear-jobs", EQUAL, 1, daemon_reload },
5159 { "load", MORE, 2, load_unit },
5160 { "cancel", MORE, 2, cancel_job },
5161 { "start", MORE, 2, start_unit },
5162 { "stop", MORE, 2, start_unit },
5163 { "reload", MORE, 2, start_unit },
5164 { "restart", MORE, 2, start_unit },
5165 { "try-restart", MORE, 2, start_unit },
5166 { "reload-or-restart", MORE, 2, start_unit },
5167 { "reload-or-try-restart", MORE, 2, start_unit },
5168 { "force-reload", MORE, 2, start_unit }, /* For compatibility with SysV */
5169 { "condrestart", MORE, 2, start_unit }, /* For compatibility with RH */
5170 { "isolate", EQUAL, 2, start_unit },
5171 { "kill", MORE, 2, kill_unit },
5172 { "is-active", MORE, 2, check_unit },
5173 { "check", MORE, 2, check_unit },
5174 { "show", MORE, 1, show },
5175 { "status", MORE, 2, show },
5176 { "monitor", EQUAL, 1, monitor },
5177 { "dump", EQUAL, 1, dump },
5178 { "dot", EQUAL, 1, dot },
5179 { "snapshot", LESS, 2, snapshot },
5180 { "delete", MORE, 2, delete_snapshot },
5181 { "daemon-reload", EQUAL, 1, daemon_reload },
5182 { "daemon-reexec", EQUAL, 1, daemon_reload },
5183 { "show-environment", EQUAL, 1, show_enviroment },
5184 { "set-environment", MORE, 2, set_environment },
5185 { "unset-environment", MORE, 2, set_environment },
5186 { "halt", EQUAL, 1, start_special },
5187 { "poweroff", EQUAL, 1, start_special },
5188 { "reboot", EQUAL, 1, start_special },
5189 { "kexec", EQUAL, 1, start_special },
5190 { "default", EQUAL, 1, start_special },
5191 { "rescue", EQUAL, 1, start_special },
5192 { "emergency", EQUAL, 1, start_special },
5193 { "exit", EQUAL, 1, start_special },
5194 { "reset-failed", MORE, 1, reset_failed },
5195 { "enable", MORE, 2, enable_unit },
5196 { "disable", MORE, 2, enable_unit },
5197 { "is-enabled", MORE, 2, enable_unit }
5207 left = argc - optind;
5210 /* Special rule: no arguments means "list-units" */
5213 if (streq(argv[optind], "help")) {
5218 for (i = 0; i < ELEMENTSOF(verbs); i++)
5219 if (streq(argv[optind], verbs[i].verb))
5222 if (i >= ELEMENTSOF(verbs)) {
5223 log_error("Unknown operation %s", argv[optind]);
5228 switch (verbs[i].argc_cmp) {
5231 if (left != verbs[i].argc) {
5232 log_error("Invalid number of arguments.");
5239 if (left < verbs[i].argc) {
5240 log_error("Too few arguments.");
5247 if (left > verbs[i].argc) {
5248 log_error("Too many arguments.");
5255 assert_not_reached("Unknown comparison operator.");
5258 /* Require a bus connection for all operations but
5260 if (!streq(verbs[i].verb, "enable") &&
5261 !streq(verbs[i].verb, "disable") &&
5263 log_error("Failed to get D-Bus connection: %s", error->message);
5267 return verbs[i].dispatch(bus, argv + optind, left);
5270 static int send_shutdownd(usec_t t, char mode, bool warn, const char *message) {
5272 struct msghdr msghdr;
5274 union sockaddr_union sockaddr;
5275 struct shutdownd_command c;
5283 strncpy(c.wall_message, message, sizeof(c.wall_message));
5285 if ((fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0)
5289 sockaddr.sa.sa_family = AF_UNIX;
5290 sockaddr.un.sun_path[0] = 0;
5291 strncpy(sockaddr.un.sun_path+1, "/org/freedesktop/systemd1/shutdownd", sizeof(sockaddr.un.sun_path)-1);
5294 iovec.iov_base = (char*) &c;
5295 iovec.iov_len = sizeof(c);
5298 msghdr.msg_name = &sockaddr;
5299 msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + 1 + sizeof("/org/freedesktop/systemd1/shutdownd") - 1;
5301 msghdr.msg_iov = &iovec;
5302 msghdr.msg_iovlen = 1;
5304 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0) {
5305 close_nointr_nofail(fd);
5309 close_nointr_nofail(fd);
5313 static int reload_with_fallback(DBusConnection *bus) {
5316 /* First, try systemd via D-Bus. */
5317 if (daemon_reload(bus, NULL, 0) > 0)
5321 /* Nothing else worked, so let's try signals */
5322 assert(arg_action == ACTION_RELOAD || arg_action == ACTION_REEXEC);
5324 if (kill(1, arg_action == ACTION_RELOAD ? SIGHUP : SIGTERM) < 0) {
5325 log_error("kill() failed: %m");
5332 static int start_with_fallback(DBusConnection *bus) {
5335 /* First, try systemd via D-Bus. */
5336 if (start_unit(bus, NULL, 0) >= 0)
5340 /* Hmm, talking to systemd via D-Bus didn't work. Then
5341 * let's try to talk to Upstart via D-Bus. */
5342 if (talk_upstart() > 0)
5345 /* Nothing else worked, so let's try
5347 if (talk_initctl() > 0)
5350 log_error("Failed to talk to init daemon.");
5354 warn_wall(arg_action);
5358 static int halt_main(DBusConnection *bus) {
5361 if (geteuid() != 0) {
5362 log_error("Must be root.");
5368 char date[FORMAT_TIMESTAMP_MAX];
5370 m = strv_join(arg_wall, " ");
5371 r = send_shutdownd(arg_when,
5372 arg_action == ACTION_HALT ? 'H' :
5373 arg_action == ACTION_POWEROFF ? 'P' :
5380 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r));
5382 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
5383 format_timestamp(date, sizeof(date), arg_when));
5388 if (!arg_dry && !arg_immediate)
5389 return start_with_fallback(bus);
5392 if (sd_booted() > 0)
5393 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
5394 else if ((r = utmp_put_shutdown(0)) < 0)
5395 log_warning("Failed to write utmp record: %s", strerror(-r));
5404 /* Make sure C-A-D is handled by the kernel from this
5406 reboot(RB_ENABLE_CAD);
5408 switch (arg_action) {
5411 log_info("Halting.");
5412 reboot(RB_HALT_SYSTEM);
5415 case ACTION_POWEROFF:
5416 log_info("Powering off.");
5417 reboot(RB_POWER_OFF);
5421 log_info("Rebooting.");
5422 reboot(RB_AUTOBOOT);
5426 assert_not_reached("Unknown halt action.");
5429 /* We should never reach this. */
5433 static int runlevel_main(void) {
5434 int r, runlevel, previous;
5436 if ((r = utmp_get_runlevel(&runlevel, &previous)) < 0) {
5437 printf("unknown\n");
5442 previous <= 0 ? 'N' : previous,
5443 runlevel <= 0 ? 'N' : runlevel);
5448 static void pager_open(void) {
5456 if (!on_tty() || arg_no_pager)
5459 if ((pager = getenv("PAGER")))
5460 if (!*pager || streq(pager, "cat"))
5463 /* Determine and cache number of columns before we spawn the
5464 * pager so that we get the value from the actual tty */
5468 log_error("Failed to create pager pipe: %m");
5472 parent_pid = getpid();
5475 if (pager_pid < 0) {
5476 log_error("Failed to fork pager: %m");
5481 /* In the child start the pager */
5482 if (pager_pid == 0) {
5484 dup2(fd[0], STDIN_FILENO);
5487 setenv("LESS", "FRSX", 0);
5489 /* Make sure the pager goes away when the parent dies */
5490 if (prctl(PR_SET_PDEATHSIG, SIGTERM) < 0)
5491 _exit(EXIT_FAILURE);
5493 /* Check whether our parent died before we were able
5494 * to set the death signal */
5495 if (getppid() != parent_pid)
5496 _exit(EXIT_SUCCESS);
5499 execlp(pager, pager, NULL);
5500 execl("/bin/sh", "sh", "-c", pager, NULL);
5502 /* Debian's alternatives command for pagers is
5503 * called 'pager'. Note that we do not call
5504 * sensible-pagers here, since that is just a
5505 * shell script that implements a logic that
5506 * is similar to this one anyway, but is
5507 * Debian-specific. */
5508 execlp("pager", "pager", NULL);
5510 execlp("less", "less", NULL);
5511 execlp("more", "more", NULL);
5514 log_error("Unable to execute pager: %m");
5515 _exit(EXIT_FAILURE);
5518 /* Return in the parent */
5519 if (dup2(fd[1], STDOUT_FILENO) < 0)
5520 log_error("Failed to duplicate pager pipe: %m");
5525 static void pager_close(void) {
5531 /* Inform pager that we are done */
5533 wait_for_terminate(pager_pid, &dummy);
5537 static void agent_close(void) {
5543 /* Inform agent that we are done */
5544 kill(agent_pid, SIGTERM);
5545 wait_for_terminate(agent_pid, &dummy);
5549 int main(int argc, char*argv[]) {
5550 int r, retval = EXIT_FAILURE;
5551 DBusConnection *bus = NULL;
5554 dbus_error_init(&error);
5556 log_parse_environment();
5559 if ((r = parse_argv(argc, argv)) < 0)
5562 retval = EXIT_SUCCESS;
5566 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
5567 * let's shortcut this */
5568 if (arg_action == ACTION_RUNLEVEL) {
5569 r = runlevel_main();
5570 retval = r < 0 ? EXIT_FAILURE : r;
5574 bus_connect(arg_user ? DBUS_BUS_SESSION : DBUS_BUS_SYSTEM, &bus, &private_bus, &error);
5576 switch (arg_action) {
5578 case ACTION_SYSTEMCTL:
5579 r = systemctl_main(bus, argc, argv, &error);
5583 case ACTION_POWEROFF:
5589 case ACTION_RUNLEVEL2:
5590 case ACTION_RUNLEVEL3:
5591 case ACTION_RUNLEVEL4:
5592 case ACTION_RUNLEVEL5:
5594 case ACTION_EMERGENCY:
5595 case ACTION_DEFAULT:
5596 r = start_with_fallback(bus);
5601 r = reload_with_fallback(bus);
5604 case ACTION_CANCEL_SHUTDOWN:
5605 r = send_shutdownd(0, 0, false, NULL);
5608 case ACTION_INVALID:
5609 case ACTION_RUNLEVEL:
5611 assert_not_reached("Unknown action");
5614 retval = r < 0 ? EXIT_FAILURE : r;
5619 dbus_connection_flush(bus);
5620 dbus_connection_close(bus);
5621 dbus_connection_unref(bus);
5624 dbus_error_free(&error);
5628 strv_free(arg_property);