1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/reboot.h>
29 #include <sys/ioctl.h>
33 #include <sys/socket.h>
36 #include <sys/prctl.h>
37 #include <dbus/dbus.h>
39 #include <systemd/sd-daemon.h>
40 #include <systemd/sd-shutdown.h>
41 #include <systemd/sd-login.h>
47 #include "utmp-wtmp.h"
50 #include "path-util.h"
52 #include "dbus-common.h"
53 #include "cgroup-show.h"
54 #include "cgroup-util.h"
56 #include "path-lookup.h"
57 #include "conf-parser.h"
58 #include "exit-status.h"
59 #include "bus-errors.h"
61 #include "unit-name.h"
63 #include "spawn-ask-password-agent.h"
64 #include "spawn-polkit-agent.h"
66 #include "logs-show.h"
67 #include "path-util.h"
68 #include "socket-util.h"
71 static char **arg_types = NULL;
72 static char **arg_load_states = NULL;
73 static char **arg_properties = NULL;
74 static bool arg_all = false;
75 static enum dependency {
80 } arg_dependency = DEPENDENCY_FORWARD;
81 static const char *arg_job_mode = "replace";
82 static UnitFileScope arg_scope = UNIT_FILE_SYSTEM;
83 static bool arg_no_block = false;
84 static bool arg_no_legend = false;
85 static bool arg_no_pager = false;
86 static bool arg_no_wtmp = false;
87 static bool arg_no_wall = false;
88 static bool arg_no_reload = false;
89 static bool arg_show_types = false;
90 static bool arg_ignore_inhibitors = false;
91 static bool arg_dry = false;
92 static bool arg_quiet = false;
93 static bool arg_full = false;
94 static int arg_force = 0;
95 static bool arg_ask_password = true;
96 static bool arg_failed = false;
97 static bool arg_runtime = false;
98 static char **arg_wall = NULL;
99 static const char *arg_kill_who = NULL;
100 static int arg_signal = SIGTERM;
101 static const char *arg_root = NULL;
102 static usec_t arg_when = 0;
124 ACTION_CANCEL_SHUTDOWN,
126 } arg_action = ACTION_SYSTEMCTL;
127 static enum transport {
131 } arg_transport = TRANSPORT_NORMAL;
132 static char *arg_host = NULL;
133 static char *arg_user = NULL;
134 static unsigned arg_lines = 10;
135 static OutputMode arg_output = OUTPUT_SHORT;
136 static bool arg_plain = false;
138 static bool private_bus = false;
140 static int daemon_reload(DBusConnection *bus, char **args);
141 static void halt_now(enum action a);
143 static void pager_open_if_enabled(void) {
151 static void ask_password_agent_open_if_enabled(void) {
153 /* Open the password agent as a child process if necessary */
155 if (!arg_ask_password)
158 if (arg_scope != UNIT_FILE_SYSTEM)
161 ask_password_agent_open();
165 static void polkit_agent_open_if_enabled(void) {
167 /* Open the polkit agent as a child process if necessary */
169 if (!arg_ask_password)
172 if (arg_scope != UNIT_FILE_SYSTEM)
179 static const char *ansi_highlight(bool b) {
184 return b ? ANSI_HIGHLIGHT_ON : ANSI_HIGHLIGHT_OFF;
187 static const char *ansi_highlight_red(bool b) {
192 return b ? ANSI_HIGHLIGHT_RED_ON : ANSI_HIGHLIGHT_OFF;
195 static const char *ansi_highlight_green(bool b) {
200 return b ? ANSI_HIGHLIGHT_GREEN_ON : ANSI_HIGHLIGHT_OFF;
203 static int translate_bus_error_to_exit_status(int r, const DBusError *error) {
206 if (!dbus_error_is_set(error))
209 if (dbus_error_has_name(error, DBUS_ERROR_ACCESS_DENIED) ||
210 dbus_error_has_name(error, BUS_ERROR_ONLY_BY_DEPENDENCY) ||
211 dbus_error_has_name(error, BUS_ERROR_NO_ISOLATION) ||
212 dbus_error_has_name(error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE))
213 return EXIT_NOPERMISSION;
215 if (dbus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT))
216 return EXIT_NOTINSTALLED;
218 if (dbus_error_has_name(error, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE) ||
219 dbus_error_has_name(error, BUS_ERROR_NOT_SUPPORTED))
220 return EXIT_NOTIMPLEMENTED;
222 if (dbus_error_has_name(error, BUS_ERROR_LOAD_FAILED))
223 return EXIT_NOTCONFIGURED;
231 static void warn_wall(enum action a) {
232 static const char *table[_ACTION_MAX] = {
233 [ACTION_HALT] = "The system is going down for system halt NOW!",
234 [ACTION_REBOOT] = "The system is going down for reboot NOW!",
235 [ACTION_POWEROFF] = "The system is going down for power-off NOW!",
236 [ACTION_KEXEC] = "The system is going down for kexec reboot NOW!",
237 [ACTION_RESCUE] = "The system is going down to rescue mode NOW!",
238 [ACTION_EMERGENCY] = "The system is going down to emergency mode NOW!",
239 [ACTION_CANCEL_SHUTDOWN] = "The system shutdown has been cancelled NOW!"
246 _cleanup_free_ char *p;
248 p = strv_join(arg_wall, " ");
263 utmp_wall(table[a], NULL);
266 static bool avoid_bus(void) {
268 if (running_in_chroot() > 0)
271 if (sd_booted() <= 0)
274 if (!isempty(arg_root))
277 if (arg_scope == UNIT_FILE_GLOBAL)
283 static int compare_unit_info(const void *a, const void *b) {
285 const struct unit_info *u = a, *v = b;
287 d1 = strrchr(u->id, '.');
288 d2 = strrchr(v->id, '.');
293 r = strcasecmp(d1, d2);
298 return strcasecmp(u->id, v->id);
301 static bool output_show_unit(const struct unit_info *u) {
305 return streq(u->active_state, "failed");
307 return (!arg_types || ((dot = strrchr(u->id, '.')) &&
308 strv_find(arg_types, dot+1))) &&
309 (!arg_load_states || strv_find(arg_load_states, u->load_state)) &&
310 (arg_all || !(streq(u->active_state, "inactive")
311 || u->following[0]) || u->job_id > 0);
314 static void output_units_list(const struct unit_info *unit_infos, unsigned c) {
315 unsigned id_len, max_id_len, active_len, sub_len, job_len, desc_len, n_shown = 0;
316 const struct unit_info *u;
319 max_id_len = sizeof("UNIT")-1;
320 active_len = sizeof("ACTIVE")-1;
321 sub_len = sizeof("SUB")-1;
322 job_len = sizeof("JOB")-1;
325 for (u = unit_infos; u < unit_infos + c; u++) {
326 if (!output_show_unit(u))
329 max_id_len = MAX(max_id_len, strlen(u->id));
330 active_len = MAX(active_len, strlen(u->active_state));
331 sub_len = MAX(sub_len, strlen(u->sub_state));
332 if (u->job_id != 0) {
333 job_len = MAX(job_len, strlen(u->job_type));
340 id_len = MIN(max_id_len, 25u);
341 basic_len = 5 + id_len + 5 + active_len + sub_len;
343 basic_len += job_len + 1;
344 if (basic_len < (unsigned) columns()) {
345 unsigned extra_len, incr;
346 extra_len = columns() - basic_len;
347 /* Either UNIT already got 25, or is fully satisfied.
348 * Grant up to 25 to DESC now. */
349 incr = MIN(extra_len, 25u);
352 /* split the remaining space between UNIT and DESC,
353 * but do not give UNIT more than it needs. */
355 incr = MIN(extra_len / 2, max_id_len - id_len);
357 desc_len += extra_len - incr;
363 for (u = unit_infos; u < unit_infos + c; u++) {
364 _cleanup_free_ char *e = NULL;
365 const char *on_loaded, *off_loaded, *on = "";
366 const char *on_active, *off_active, *off = "";
368 if (!output_show_unit(u))
371 if (!n_shown && !arg_no_legend) {
372 printf("%-*s %-6s %-*s %-*s ", id_len, "UNIT", "LOAD",
373 active_len, "ACTIVE", sub_len, "SUB");
375 printf("%-*s ", job_len, "JOB");
376 if (!arg_full && arg_no_pager)
377 printf("%.*s\n", desc_len, "DESCRIPTION");
379 printf("%s\n", "DESCRIPTION");
384 if (streq(u->load_state, "error")) {
385 on_loaded = on = ansi_highlight_red(true);
386 off_loaded = off = ansi_highlight_red(false);
388 on_loaded = off_loaded = "";
390 if (streq(u->active_state, "failed")) {
391 on_active = on = ansi_highlight_red(true);
392 off_active = off = ansi_highlight_red(false);
394 on_active = off_active = "";
396 e = arg_full ? NULL : ellipsize(u->id, id_len, 33);
398 printf("%s%-*s%s %s%-6s%s %s%-*s %-*s%s %-*s",
399 on, id_len, e ? e : u->id, off,
400 on_loaded, u->load_state, off_loaded,
401 on_active, active_len, u->active_state,
402 sub_len, u->sub_state, off_active,
403 job_count ? job_len + 1 : 0, u->job_id ? u->job_type : "");
404 if (!arg_full && arg_no_pager)
405 printf("%.*s\n", desc_len, u->description);
407 printf("%s\n", u->description);
410 if (!arg_no_legend) {
411 const char *on, *off;
414 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
415 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
416 "SUB = The low-level unit activation state, values depend on unit type.\n");
418 printf("JOB = Pending job for the unit.\n");
420 on = ansi_highlight(true);
421 off = ansi_highlight(false);
423 on = ansi_highlight_red(true);
424 off = ansi_highlight_red(false);
428 printf("%s%u loaded units listed.%s\n"
429 "To show all installed unit files use 'systemctl list-unit-files'.\n",
432 printf("%s%u loaded units listed.%s Pass --all to see loaded but inactive units, too.\n"
433 "To show all installed unit files use 'systemctl list-unit-files'.\n",
438 static int get_unit_list(DBusConnection *bus, DBusMessage **reply,
439 struct unit_info **unit_infos, unsigned *c) {
440 DBusMessageIter iter, sub;
448 r = bus_method_call_with_reply(
450 "org.freedesktop.systemd1",
451 "/org/freedesktop/systemd1",
452 "org.freedesktop.systemd1.Manager",
460 if (!dbus_message_iter_init(*reply, &iter) ||
461 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
462 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
463 log_error("Failed to parse reply.");
467 dbus_message_iter_recurse(&iter, &sub);
469 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
470 if (!GREEDY_REALLOC(*unit_infos, size, *c + 1))
473 bus_parse_unit_info(&sub, *unit_infos + *c);
476 dbus_message_iter_next(&sub);
482 static int list_units(DBusConnection *bus, char **args) {
483 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
484 _cleanup_free_ struct unit_info *unit_infos = NULL;
488 pager_open_if_enabled();
490 r = get_unit_list(bus, &reply, &unit_infos, &c);
494 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
496 output_units_list(unit_infos, c);
501 static int get_triggered_units(DBusConnection *bus, const char* unit_path,
504 const char *interface = "org.freedesktop.systemd1.Unit",
505 *triggers_property = "Triggers";
506 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
507 DBusMessageIter iter, sub;
510 r = bus_method_call_with_reply(bus,
511 "org.freedesktop.systemd1",
513 "org.freedesktop.DBus.Properties",
517 DBUS_TYPE_STRING, &interface,
518 DBUS_TYPE_STRING, &triggers_property,
523 if (!dbus_message_iter_init(reply, &iter) ||
524 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
525 log_error("Failed to parse reply.");
529 dbus_message_iter_recurse(&iter, &sub);
530 dbus_message_iter_recurse(&sub, &iter);
533 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
536 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
537 log_error("Failed to parse reply.");
541 dbus_message_iter_get_basic(&sub, &unit);
542 r = strv_extend(triggered, unit);
546 dbus_message_iter_next(&sub);
552 static int get_listening(DBusConnection *bus, const char* unit_path,
553 char*** listen, unsigned *c)
555 const char *interface = "org.freedesktop.systemd1.Socket",
556 *listen_property = "Listen";
557 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
558 DBusMessageIter iter, sub;
561 r = bus_method_call_with_reply(bus,
562 "org.freedesktop.systemd1",
564 "org.freedesktop.DBus.Properties",
568 DBUS_TYPE_STRING, &interface,
569 DBUS_TYPE_STRING, &listen_property,
574 if (!dbus_message_iter_init(reply, &iter) ||
575 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
576 log_error("Failed to parse reply.");
580 dbus_message_iter_recurse(&iter, &sub);
581 dbus_message_iter_recurse(&sub, &iter);
584 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
585 DBusMessageIter sub2;
586 const char *type, *path;
588 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
589 log_error("Failed to parse reply.");
593 dbus_message_iter_recurse(&sub, &sub2);
595 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
596 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0) {
597 r = strv_extend(listen, type);
601 r = strv_extend(listen, path);
608 dbus_message_iter_next(&sub);
620 /* Note: triggered is a list here, although it almost certainly
621 * will always be one unit. Nevertheless, dbus API allows for multiple
622 * values, so let's follow that.*/
625 /* The strv above is shared. free is set only in the first one. */
629 static int socket_info_compare(struct socket_info *a, struct socket_info *b) {
630 int o = strcmp(a->path, b->path);
632 o = strcmp(a->type, b->type);
636 static int output_sockets_list(struct socket_info *socket_infos, unsigned cs) {
637 struct socket_info *s;
638 unsigned pathlen = sizeof("LISTEN") - 1,
639 typelen = (sizeof("TYPE") - 1) * arg_show_types,
640 socklen = sizeof("UNIT") - 1,
641 servlen = sizeof("ACTIVATES") - 1;
642 const char *on, *off;
644 for (s = socket_infos; s < socket_infos + cs; s++) {
648 socklen = MAX(socklen, strlen(s->id));
650 typelen = MAX(typelen, strlen(s->type));
651 pathlen = MAX(pathlen, strlen(s->path));
653 STRV_FOREACH(a, s->triggered)
654 tmp += strlen(*a) + 2*(a != s->triggered);
655 servlen = MAX(servlen, tmp);
660 printf("%-*s %-*.*s%-*s %s\n",
662 typelen + arg_show_types, typelen + arg_show_types, "TYPE ",
666 for (s = socket_infos; s < socket_infos + cs; s++) {
670 printf("%-*s %-*s %-*s",
671 pathlen, s->path, typelen, s->type, socklen, s->id);
674 pathlen, s->path, socklen, s->id);
675 STRV_FOREACH(a, s->triggered)
677 a == s->triggered ? "" : ",", *a);
681 on = ansi_highlight(true);
682 off = ansi_highlight(false);
686 on = ansi_highlight_red(true);
687 off = ansi_highlight_red(false);
690 if (!arg_no_legend) {
691 printf("%s%u sockets listed.%s\n", on, cs, off);
693 printf("Pass --all to see loaded but inactive sockets, too.\n");
699 static int list_sockets(DBusConnection *bus, char **args) {
700 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
701 _cleanup_free_ struct unit_info *unit_infos = NULL;
702 struct socket_info *socket_infos = NULL;
703 const struct unit_info *u;
704 struct socket_info *s;
705 unsigned cu = 0, cs = 0;
709 pager_open_if_enabled();
711 r = get_unit_list(bus, &reply, &unit_infos, &cu);
715 for (u = unit_infos; u < unit_infos + cu; u++) {
717 _cleanup_strv_free_ char **listen = NULL, **triggered = NULL;
720 if (!output_show_unit(u))
723 if ((dot = strrchr(u->id, '.')) && !streq(dot+1, "socket"))
726 r = get_triggered_units(bus, u->unit_path, &triggered);
730 r = get_listening(bus, u->unit_path, &listen, &c);
734 if (!GREEDY_REALLOC(socket_infos, size, cs + c)) {
739 for (i = 0; i < c; i++)
740 socket_infos[cs + i] = (struct socket_info) {
743 .path = listen[i*2 + 1],
744 .triggered = triggered,
745 .own_triggered = i==0,
748 /* from this point on we will cleanup those socket_infos */
751 listen = triggered = NULL; /* avoid cleanup */
754 qsort(socket_infos, cs, sizeof(struct socket_info),
755 (__compar_fn_t) socket_info_compare);
757 output_sockets_list(socket_infos, cs);
760 assert(cs == 0 || socket_infos);
761 for (s = socket_infos; s < socket_infos + cs; s++) {
764 if (s->own_triggered)
765 strv_free(s->triggered);
772 static int compare_unit_file_list(const void *a, const void *b) {
774 const UnitFileList *u = a, *v = b;
776 d1 = strrchr(u->path, '.');
777 d2 = strrchr(v->path, '.');
782 r = strcasecmp(d1, d2);
787 return strcasecmp(path_get_file_name(u->path), path_get_file_name(v->path));
790 static bool output_show_unit_file(const UnitFileList *u) {
793 return !arg_types || ((dot = strrchr(u->path, '.')) && strv_find(arg_types, dot+1));
796 static void output_unit_file_list(const UnitFileList *units, unsigned c) {
797 unsigned max_id_len, id_cols, state_cols, n_shown = 0;
798 const UnitFileList *u;
800 max_id_len = sizeof("UNIT FILE")-1;
801 state_cols = sizeof("STATE")-1;
802 for (u = units; u < units + c; u++) {
803 if (!output_show_unit_file(u))
806 max_id_len = MAX(max_id_len, strlen(path_get_file_name(u->path)));
807 state_cols = MAX(state_cols, strlen(unit_file_state_to_string(u->state)));
812 id_cols = MIN(max_id_len, 25u);
813 basic_cols = 1 + id_cols + state_cols;
814 if (basic_cols < (unsigned) columns())
815 id_cols += MIN(columns() - basic_cols, max_id_len - id_cols);
817 id_cols = max_id_len;
820 printf("%-*s %-*s\n", id_cols, "UNIT FILE", state_cols, "STATE");
822 for (u = units; u < units + c; u++) {
823 _cleanup_free_ char *e = NULL;
824 const char *on, *off;
827 if (!output_show_unit_file(u))
832 if (u->state == UNIT_FILE_MASKED ||
833 u->state == UNIT_FILE_MASKED_RUNTIME ||
834 u->state == UNIT_FILE_DISABLED ||
835 u->state == UNIT_FILE_INVALID) {
836 on = ansi_highlight_red(true);
837 off = ansi_highlight_red(false);
838 } else if (u->state == UNIT_FILE_ENABLED) {
839 on = ansi_highlight_green(true);
840 off = ansi_highlight_green(false);
844 id = path_get_file_name(u->path);
846 e = arg_full ? NULL : ellipsize(id, id_cols, 33);
848 printf("%-*s %s%-*s%s\n",
850 on, state_cols, unit_file_state_to_string(u->state), off);
854 printf("\n%u unit files listed.\n", n_shown);
857 static int list_unit_files(DBusConnection *bus, char **args) {
858 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
859 _cleanup_free_ UnitFileList *units = NULL;
860 DBusMessageIter iter, sub, sub2;
861 unsigned c = 0, n_units = 0;
864 pager_open_if_enabled();
871 h = hashmap_new(string_hash_func, string_compare_func);
875 r = unit_file_get_list(arg_scope, arg_root, h);
877 unit_file_list_free(h);
878 log_error("Failed to get unit file list: %s", strerror(-r));
882 n_units = hashmap_size(h);
883 units = new(UnitFileList, n_units);
885 unit_file_list_free(h);
889 HASHMAP_FOREACH(u, h, i) {
890 memcpy(units + c++, u, sizeof(UnitFileList));
896 r = bus_method_call_with_reply(
898 "org.freedesktop.systemd1",
899 "/org/freedesktop/systemd1",
900 "org.freedesktop.systemd1.Manager",
908 if (!dbus_message_iter_init(reply, &iter) ||
909 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
910 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
911 log_error("Failed to parse reply.");
915 dbus_message_iter_recurse(&iter, &sub);
917 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
921 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT);
926 n_units = MAX(2*c, 16u);
927 w = realloc(units, sizeof(struct UnitFileList) * n_units);
936 dbus_message_iter_recurse(&sub, &sub2);
938 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->path, true) < 0 ||
939 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, false) < 0) {
940 log_error("Failed to parse reply.");
944 u->state = unit_file_state_from_string(state);
946 dbus_message_iter_next(&sub);
952 qsort(units, c, sizeof(UnitFileList), compare_unit_file_list);
953 output_unit_file_list(units, c);
959 static int list_dependencies_print(const char *name, int level, unsigned int branches, bool last) {
961 _cleanup_free_ char *n = NULL;
963 size_t max_len = MAX(columns(),20u);
966 for (i = level - 1; i >= 0; i--) {
968 if(len > max_len - 3 && !arg_full) {
969 printf("%s...\n",max_len % 2 ? "" : " ");
972 printf("%s", draw_special_char(branches & (1 << i) ? DRAW_TREE_VERT : DRAW_TREE_SPACE));
975 if(len > max_len - 3 && !arg_full) {
976 printf("%s...\n",max_len % 2 ? "" : " ");
979 printf("%s", draw_special_char(last ? DRAW_TREE_RIGHT : DRAW_TREE_BRANCH));
983 printf("%s\n", name);
987 n = ellipsize(name, max_len-len, 100);
995 static int list_dependencies_get_dependencies(DBusConnection *bus, const char *name, char ***deps) {
996 static const char *dependencies[] = {
997 [DEPENDENCY_FORWARD] = "Requires\0"
998 "RequiresOverridable\0"
1000 "RequisiteOverridable\0"
1002 [DEPENDENCY_REVERSE] = "RequiredBy\0"
1003 "RequiredByOverridable\0"
1006 [DEPENDENCY_AFTER] = "After\0",
1007 [DEPENDENCY_BEFORE] = "Before\0",
1010 _cleanup_free_ char *path;
1011 const char *interface = "org.freedesktop.systemd1.Unit";
1013 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1014 DBusMessageIter iter, sub, sub2, sub3;
1023 path = unit_dbus_path_from_name(name);
1029 r = bus_method_call_with_reply(
1031 "org.freedesktop.systemd1",
1033 "org.freedesktop.DBus.Properties",
1037 DBUS_TYPE_STRING, &interface,
1042 if (!dbus_message_iter_init(reply, &iter) ||
1043 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1044 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
1045 log_error("Failed to parse reply.");
1050 dbus_message_iter_recurse(&iter, &sub);
1052 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1055 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_DICT_ENTRY);
1056 dbus_message_iter_recurse(&sub, &sub2);
1058 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &prop, true) < 0) {
1059 log_error("Failed to parse reply.");
1064 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
1065 log_error("Failed to parse reply.");
1070 dbus_message_iter_recurse(&sub2, &sub3);
1071 dbus_message_iter_next(&sub);
1073 assert(arg_dependency < ELEMENTSOF(dependencies));
1074 if (!nulstr_contains(dependencies[arg_dependency], prop))
1077 if (dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_ARRAY) {
1078 if (dbus_message_iter_get_element_type(&sub3) == DBUS_TYPE_STRING) {
1079 DBusMessageIter sub4;
1080 dbus_message_iter_recurse(&sub3, &sub4);
1082 while (dbus_message_iter_get_arg_type(&sub4) != DBUS_TYPE_INVALID) {
1085 assert(dbus_message_iter_get_arg_type(&sub4) == DBUS_TYPE_STRING);
1086 dbus_message_iter_get_basic(&sub4, &s);
1088 r = strv_extend(&ret, s);
1094 dbus_message_iter_next(&sub4);
1107 static int list_dependencies_compare(const void *_a, const void *_b) {
1108 const char **a = (const char**) _a, **b = (const char**) _b;
1109 if (unit_name_to_type(*a) == UNIT_TARGET && unit_name_to_type(*b) != UNIT_TARGET)
1111 if (unit_name_to_type(*a) != UNIT_TARGET && unit_name_to_type(*b) == UNIT_TARGET)
1113 return strcasecmp(*a, *b);
1116 static int list_dependencies_one(DBusConnection *bus, const char *name, int level, char ***units, unsigned int branches) {
1117 _cleanup_strv_free_ char **deps = NULL, **u;
1121 u = strv_append(*units, name);
1125 r = list_dependencies_get_dependencies(bus, name, &deps);
1129 qsort(deps, strv_length(deps), sizeof (char*), list_dependencies_compare);
1131 STRV_FOREACH(c, deps) {
1132 if (strv_contains(u, *c)) {
1134 r = list_dependencies_print("...", level + 1, (branches << 1) | (c[1] == NULL ? 0 : 1), 1);
1141 r = list_dependencies_print(*c, level, branches, c[1] == NULL);
1145 if (arg_all || unit_name_to_type(*c) == UNIT_TARGET) {
1146 r = list_dependencies_one(bus, *c, level + 1, &u, (branches << 1) | (c[1] == NULL ? 0 : 1));
1159 static int list_dependencies(DBusConnection *bus, char **args) {
1160 _cleanup_free_ char *unit = NULL;
1161 _cleanup_strv_free_ char **units = NULL;
1167 unit = unit_name_mangle(args[1]);
1172 u = SPECIAL_DEFAULT_TARGET;
1174 pager_open_if_enabled();
1178 return list_dependencies_one(bus, u, 0, &units, 0);
1181 static int get_default(DBusConnection *bus, char **args) {
1183 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
1185 _cleanup_dbus_error_free_ DBusError error;
1187 dbus_error_init(&error);
1189 if (!bus || avoid_bus()) {
1190 r = unit_file_get_default(arg_scope, arg_root, &path);
1193 log_error("Operation failed: %s", strerror(-r));
1199 r = bus_method_call_with_reply(
1201 "org.freedesktop.systemd1",
1202 "/org/freedesktop/systemd1",
1203 "org.freedesktop.systemd1.Manager",
1210 log_error("Operation failed: %s", strerror(-r));
1214 if (!dbus_message_get_args(reply, &error,
1215 DBUS_TYPE_STRING, &path,
1216 DBUS_TYPE_INVALID)) {
1217 log_error("Failed to parse reply: %s", bus_error_message(&error));
1218 dbus_error_free(&error);
1224 printf("%s\n", path);
1227 if ((!bus || avoid_bus()) && path)
1236 char *name, *type, *state;
1239 static void list_jobs_print(struct job_info* jobs, size_t n) {
1242 const char *on, *off;
1243 bool shorten = false;
1245 assert(n == 0 || jobs);
1248 on = ansi_highlight_green(true);
1249 off = ansi_highlight_green(false);
1251 printf("%sNo jobs running.%s\n", on, off);
1255 pager_open_if_enabled();
1258 /* JOB UNIT TYPE STATE */
1259 unsigned l0 = 3, l1 = 4, l2 = 4, l3 = 5;
1261 for (i = 0, j = jobs; i < n; i++, j++) {
1262 assert(j->name && j->type && j->state);
1263 l0 = MAX(l0, DECIMAL_STR_WIDTH(j->id));
1264 l1 = MAX(l1, strlen(j->name));
1265 l2 = MAX(l2, strlen(j->type));
1266 l3 = MAX(l3, strlen(j->state));
1269 if (!arg_full && l0 + 1 + l1 + l2 + 1 + l3 > columns()) {
1270 l1 = MAX(33u, columns() - l0 - l2 - l3 - 3);
1275 printf("%*s %-*s %-*s %-*s\n",
1281 for (i = 0, j = jobs; i < n; i++, j++) {
1282 _cleanup_free_ char *e = NULL;
1284 if (streq(j->state, "running")) {
1285 on = ansi_highlight(true);
1286 off = ansi_highlight(false);
1290 e = shorten ? ellipsize(j->name, l1, 33) : NULL;
1291 printf("%*u %s%-*s%s %-*s %s%-*s%s\n",
1293 on, l1, e ? e : j->name, off,
1295 on, l3, j->state, off);
1299 on = ansi_highlight(true);
1300 off = ansi_highlight(false);
1303 printf("\n%s%zu jobs listed%s.\n", on, n, off);
1306 static int list_jobs(DBusConnection *bus, char **args) {
1307 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1308 DBusMessageIter iter, sub, sub2;
1310 struct job_info *jobs = NULL;
1311 size_t size = 0, used = 0;
1313 r = bus_method_call_with_reply(
1315 "org.freedesktop.systemd1",
1316 "/org/freedesktop/systemd1",
1317 "org.freedesktop.systemd1.Manager",
1325 if (!dbus_message_iter_init(reply, &iter) ||
1326 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1327 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
1328 log_error("Failed to parse reply.");
1332 dbus_message_iter_recurse(&iter, &sub);
1334 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1335 const char *name, *type, *state, *job_path, *unit_path;
1338 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
1339 log_error("Failed to parse reply.");
1343 dbus_message_iter_recurse(&sub, &sub2);
1345 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &id, true) < 0 ||
1346 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
1347 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
1348 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, true) < 0 ||
1349 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &job_path, true) < 0 ||
1350 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, false) < 0) {
1351 log_error("Failed to parse reply.");
1356 if (!GREEDY_REALLOC(jobs, size, used + 1)) {
1361 jobs[used++] = (struct job_info) { id,
1365 if (!jobs[used-1].name || !jobs[used-1].type || !jobs[used-1].state) {
1370 dbus_message_iter_next(&sub);
1373 list_jobs_print(jobs, used);
1377 free(jobs[used].name);
1378 free(jobs[used].type);
1379 free(jobs[used].state);
1386 static int load_unit(DBusConnection *bus, char **args) {
1391 STRV_FOREACH(name, args+1) {
1392 _cleanup_free_ char *n = NULL;
1395 n = unit_name_mangle(*name);
1399 r = bus_method_call_with_reply(
1401 "org.freedesktop.systemd1",
1402 "/org/freedesktop/systemd1",
1403 "org.freedesktop.systemd1.Manager",
1407 DBUS_TYPE_STRING, &n,
1416 static int cancel_job(DBusConnection *bus, char **args) {
1421 if (strv_length(args) <= 1)
1422 return daemon_reload(bus, args);
1424 STRV_FOREACH(name, args+1) {
1428 r = safe_atou32(*name, &id);
1430 log_error("Failed to parse job id: %s", strerror(-r));
1434 r = bus_method_call_with_reply(
1436 "org.freedesktop.systemd1",
1437 "/org/freedesktop/systemd1",
1438 "org.freedesktop.systemd1.Manager",
1442 DBUS_TYPE_UINT32, &id,
1451 static bool need_daemon_reload(DBusConnection *bus, const char *unit) {
1452 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1453 dbus_bool_t b = FALSE;
1454 DBusMessageIter iter, sub;
1456 *interface = "org.freedesktop.systemd1.Unit",
1457 *property = "NeedDaemonReload",
1459 _cleanup_free_ char *n = NULL;
1462 /* We ignore all errors here, since this is used to show a warning only */
1464 n = unit_name_mangle(unit);
1468 r = bus_method_call_with_reply(
1470 "org.freedesktop.systemd1",
1471 "/org/freedesktop/systemd1",
1472 "org.freedesktop.systemd1.Manager",
1476 DBUS_TYPE_STRING, &n,
1481 if (!dbus_message_get_args(reply, NULL,
1482 DBUS_TYPE_OBJECT_PATH, &path,
1486 dbus_message_unref(reply);
1489 r = bus_method_call_with_reply(
1491 "org.freedesktop.systemd1",
1493 "org.freedesktop.DBus.Properties",
1497 DBUS_TYPE_STRING, &interface,
1498 DBUS_TYPE_STRING, &property,
1503 if (!dbus_message_iter_init(reply, &iter) ||
1504 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1507 dbus_message_iter_recurse(&iter, &sub);
1508 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_BOOLEAN)
1511 dbus_message_iter_get_basic(&sub, &b);
1515 typedef struct WaitData {
1522 static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *message, void *data) {
1523 _cleanup_dbus_error_free_ DBusError error;
1526 dbus_error_init(&error);
1532 log_debug("Got D-Bus request: %s.%s() on %s",
1533 dbus_message_get_interface(message),
1534 dbus_message_get_member(message),
1535 dbus_message_get_path(message));
1537 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
1538 log_error("Warning! D-Bus connection terminated.");
1539 dbus_connection_close(connection);
1541 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1543 const char *path, *result, *unit;
1545 if (dbus_message_get_args(message, &error,
1546 DBUS_TYPE_UINT32, &id,
1547 DBUS_TYPE_OBJECT_PATH, &path,
1548 DBUS_TYPE_STRING, &unit,
1549 DBUS_TYPE_STRING, &result,
1550 DBUS_TYPE_INVALID)) {
1552 free(set_remove(d->set, (char*) path));
1554 if (!isempty(result))
1555 d->result = strdup(result);
1558 d->name = strdup(unit);
1560 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1563 dbus_error_free(&error);
1564 if (dbus_message_get_args(message, &error,
1565 DBUS_TYPE_UINT32, &id,
1566 DBUS_TYPE_OBJECT_PATH, &path,
1567 DBUS_TYPE_STRING, &result,
1568 DBUS_TYPE_INVALID)) {
1569 /* Compatibility with older systemd versions <
1570 * 183 during upgrades. This should be dropped
1572 free(set_remove(d->set, (char*) path));
1575 d->result = strdup(result);
1577 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1581 log_error("Failed to parse message: %s", bus_error_message(&error));
1584 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1587 static int enable_wait_for_jobs(DBusConnection *bus) {
1595 dbus_error_init(&error);
1596 dbus_bus_add_match(bus,
1598 "sender='org.freedesktop.systemd1',"
1599 "interface='org.freedesktop.systemd1.Manager',"
1600 "member='JobRemoved',"
1601 "path='/org/freedesktop/systemd1'",
1604 if (dbus_error_is_set(&error)) {
1605 log_error("Failed to add match: %s", bus_error_message(&error));
1606 dbus_error_free(&error);
1610 /* This is slightly dirty, since we don't undo the match registrations. */
1614 static int wait_for_jobs(DBusConnection *bus, Set *s) {
1616 WaitData d = { .set = s };
1621 if (!dbus_connection_add_filter(bus, wait_filter, &d, NULL))
1624 while (!set_isempty(s)) {
1626 if (!dbus_connection_read_write_dispatch(bus, -1)) {
1627 log_error("Disconnected from bus.");
1628 return -ECONNREFUSED;
1635 if (streq(d.result, "timeout"))
1636 log_error("Job for %s timed out.", strna(d.name));
1637 else if (streq(d.result, "canceled"))
1638 log_error("Job for %s canceled.", strna(d.name));
1639 else if (streq(d.result, "dependency"))
1640 log_error("A dependency job for %s failed. See 'journalctl -xn' for details.", strna(d.name));
1641 else if (!streq(d.result, "done") && !streq(d.result, "skipped"))
1642 log_error("Job for %s failed. See 'systemctl status %s' and 'journalctl -xn' for details.", strna(d.name), strna(d.name));
1645 if (streq_ptr(d.result, "timeout"))
1647 else if (streq_ptr(d.result, "canceled"))
1649 else if (!streq_ptr(d.result, "done") && !streq_ptr(d.result, "skipped"))
1660 dbus_connection_remove_filter(bus, wait_filter, &d);
1664 static int check_one_unit(DBusConnection *bus, const char *name, char **check_states, bool quiet) {
1665 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1666 _cleanup_free_ char *n = NULL;
1667 DBusMessageIter iter, sub;
1669 *interface = "org.freedesktop.systemd1.Unit",
1670 *property = "ActiveState";
1671 const char *state, *path;
1677 dbus_error_init(&error);
1679 n = unit_name_mangle(name);
1683 r = bus_method_call_with_reply (
1685 "org.freedesktop.systemd1",
1686 "/org/freedesktop/systemd1",
1687 "org.freedesktop.systemd1.Manager",
1691 DBUS_TYPE_STRING, &n,
1694 dbus_error_free(&error);
1701 if (!dbus_message_get_args(reply, NULL,
1702 DBUS_TYPE_OBJECT_PATH, &path,
1703 DBUS_TYPE_INVALID)) {
1704 log_error("Failed to parse reply.");
1708 dbus_message_unref(reply);
1711 r = bus_method_call_with_reply(
1713 "org.freedesktop.systemd1",
1715 "org.freedesktop.DBus.Properties",
1719 DBUS_TYPE_STRING, &interface,
1720 DBUS_TYPE_STRING, &property,
1728 if (!dbus_message_iter_init(reply, &iter) ||
1729 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1730 log_error("Failed to parse reply.");
1734 dbus_message_iter_recurse(&iter, &sub);
1736 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1737 log_error("Failed to parse reply.");
1741 dbus_message_iter_get_basic(&sub, &state);
1746 return strv_find(check_states, state) ? 1 : 0;
1749 static void check_triggering_units(
1750 DBusConnection *bus,
1751 const char *unit_name) {
1753 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1754 DBusMessageIter iter, sub;
1755 const char *interface = "org.freedesktop.systemd1.Unit",
1756 *load_state_property = "LoadState",
1757 *triggered_by_property = "TriggeredBy",
1759 _cleanup_free_ char *unit_path = NULL, *n = NULL;
1760 bool print_warning_label = true;
1763 n = unit_name_mangle(unit_name);
1769 unit_path = unit_dbus_path_from_name(n);
1775 r = bus_method_call_with_reply(
1777 "org.freedesktop.systemd1",
1779 "org.freedesktop.DBus.Properties",
1783 DBUS_TYPE_STRING, &interface,
1784 DBUS_TYPE_STRING, &load_state_property,
1789 if (!dbus_message_iter_init(reply, &iter) ||
1790 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1791 log_error("Failed to parse reply.");
1795 dbus_message_iter_recurse(&iter, &sub);
1797 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1798 log_error("Failed to parse reply.");
1802 dbus_message_iter_get_basic(&sub, &state);
1804 if (streq(state, "masked"))
1807 dbus_message_unref(reply);
1810 r = bus_method_call_with_reply(
1812 "org.freedesktop.systemd1",
1814 "org.freedesktop.DBus.Properties",
1818 DBUS_TYPE_STRING, &interface,
1819 DBUS_TYPE_STRING, &triggered_by_property,
1824 if (!dbus_message_iter_init(reply, &iter) ||
1825 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1826 log_error("Failed to parse reply.");
1830 dbus_message_iter_recurse(&iter, &sub);
1831 dbus_message_iter_recurse(&sub, &iter);
1834 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1835 const char * const check_states[] = {
1840 const char *service_trigger;
1842 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1843 log_error("Failed to parse reply.");
1847 dbus_message_iter_get_basic(&sub, &service_trigger);
1849 r = check_one_unit(bus, service_trigger, (char**) check_states, true);
1853 if (print_warning_label) {
1854 log_warning("Warning: Stopping %s, but it can still be activated by:", unit_name);
1855 print_warning_label = false;
1858 log_warning(" %s", service_trigger);
1861 dbus_message_iter_next(&sub);
1865 static int start_unit_one(
1866 DBusConnection *bus,
1873 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1874 _cleanup_free_ char *n;
1883 n = unit_name_mangle(name);
1887 r = bus_method_call_with_reply(
1889 "org.freedesktop.systemd1",
1890 "/org/freedesktop/systemd1",
1891 "org.freedesktop.systemd1.Manager",
1895 DBUS_TYPE_STRING, &n,
1896 DBUS_TYPE_STRING, &mode,
1899 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
1900 /* There's always a fallback possible for
1901 * legacy actions. */
1904 log_error("Failed to issue method call: %s", bus_error_message(error));
1909 if (!dbus_message_get_args(reply, error,
1910 DBUS_TYPE_OBJECT_PATH, &path,
1911 DBUS_TYPE_INVALID)) {
1912 log_error("Failed to parse reply: %s", bus_error_message(error));
1916 if (need_daemon_reload(bus, n))
1917 log_warning("Warning: Unit file of %s changed on disk, 'systemctl %sdaemon-reload' recommended.",
1918 n, arg_scope == UNIT_FILE_SYSTEM ? "" : "--user ");
1927 r = set_consume(s, p);
1929 log_error("Failed to add path to set.");
1937 static const struct {
1941 } action_table[_ACTION_MAX] = {
1942 [ACTION_HALT] = { SPECIAL_HALT_TARGET, "halt", "replace-irreversibly" },
1943 [ACTION_POWEROFF] = { SPECIAL_POWEROFF_TARGET, "poweroff", "replace-irreversibly" },
1944 [ACTION_REBOOT] = { SPECIAL_REBOOT_TARGET, "reboot", "replace-irreversibly" },
1945 [ACTION_KEXEC] = { SPECIAL_KEXEC_TARGET, "kexec", "replace-irreversibly" },
1946 [ACTION_RUNLEVEL2] = { SPECIAL_RUNLEVEL2_TARGET, NULL, "isolate" },
1947 [ACTION_RUNLEVEL3] = { SPECIAL_RUNLEVEL3_TARGET, NULL, "isolate" },
1948 [ACTION_RUNLEVEL4] = { SPECIAL_RUNLEVEL4_TARGET, NULL, "isolate" },
1949 [ACTION_RUNLEVEL5] = { SPECIAL_RUNLEVEL5_TARGET, NULL, "isolate" },
1950 [ACTION_RESCUE] = { SPECIAL_RESCUE_TARGET, "rescue", "isolate" },
1951 [ACTION_EMERGENCY] = { SPECIAL_EMERGENCY_TARGET, "emergency", "isolate" },
1952 [ACTION_DEFAULT] = { SPECIAL_DEFAULT_TARGET, "default", "isolate" },
1953 [ACTION_EXIT] = { SPECIAL_EXIT_TARGET, "exit", "replace-irreversibly" },
1954 [ACTION_SUSPEND] = { SPECIAL_SUSPEND_TARGET, "suspend", "replace-irreversibly" },
1955 [ACTION_HIBERNATE] = { SPECIAL_HIBERNATE_TARGET, "hibernate", "replace-irreversibly" },
1956 [ACTION_HYBRID_SLEEP] = { SPECIAL_HYBRID_SLEEP_TARGET, "hybrid-sleep", "replace-irreversibly" },
1959 static enum action verb_to_action(const char *verb) {
1962 for (i = ACTION_INVALID; i < _ACTION_MAX; i++)
1963 if (action_table[i].verb && streq(verb, action_table[i].verb))
1965 return ACTION_INVALID;
1968 static int start_unit(DBusConnection *bus, char **args) {
1971 const char *method, *mode, *one_name;
1972 _cleanup_set_free_free_ Set *s = NULL;
1973 _cleanup_dbus_error_free_ DBusError error;
1976 dbus_error_init(&error);
1980 ask_password_agent_open_if_enabled();
1982 if (arg_action == ACTION_SYSTEMCTL) {
1985 streq(args[0], "stop") ||
1986 streq(args[0], "condstop") ? "StopUnit" :
1987 streq(args[0], "reload") ? "ReloadUnit" :
1988 streq(args[0], "restart") ? "RestartUnit" :
1990 streq(args[0], "try-restart") ||
1991 streq(args[0], "condrestart") ? "TryRestartUnit" :
1993 streq(args[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
1995 streq(args[0], "reload-or-try-restart") ||
1996 streq(args[0], "condreload") ||
1998 streq(args[0], "force-reload") ? "ReloadOrTryRestartUnit" :
2000 action = verb_to_action(args[0]);
2002 mode = streq(args[0], "isolate") ? "isolate" :
2003 action_table[action].mode ?: arg_job_mode;
2005 one_name = action_table[action].target;
2008 assert(arg_action < ELEMENTSOF(action_table));
2009 assert(action_table[arg_action].target);
2011 method = "StartUnit";
2013 mode = action_table[arg_action].mode;
2014 one_name = action_table[arg_action].target;
2017 if (!arg_no_block) {
2018 ret = enable_wait_for_jobs(bus);
2020 log_error("Could not watch jobs: %s", strerror(-ret));
2024 s = set_new(string_hash_func, string_compare_func);
2030 ret = start_unit_one(bus, method, one_name, mode, &error, s);
2032 ret = translate_bus_error_to_exit_status(ret, &error);
2034 STRV_FOREACH(name, args+1) {
2035 r = start_unit_one(bus, method, *name, mode, &error, s);
2037 ret = translate_bus_error_to_exit_status(r, &error);
2038 dbus_error_free(&error);
2043 if (!arg_no_block) {
2044 r = wait_for_jobs(bus, s);
2048 /* When stopping units, warn if they can still be triggered by
2049 * another active unit (socket, path, timer) */
2050 if (!arg_quiet && streq(method, "StopUnit")) {
2052 check_triggering_units(bus, one_name);
2054 STRV_FOREACH(name, args+1)
2055 check_triggering_units(bus, *name);
2062 /* Ask systemd-logind, which might grant access to unprivileged users
2063 * through PolicyKit */
2064 static int reboot_with_logind(DBusConnection *bus, enum action a) {
2067 dbus_bool_t interactive = true;
2072 polkit_agent_open_if_enabled();
2080 case ACTION_POWEROFF:
2081 method = "PowerOff";
2084 case ACTION_SUSPEND:
2088 case ACTION_HIBERNATE:
2089 method = "Hibernate";
2092 case ACTION_HYBRID_SLEEP:
2093 method = "HybridSleep";
2100 return bus_method_call_with_reply(
2102 "org.freedesktop.login1",
2103 "/org/freedesktop/login1",
2104 "org.freedesktop.login1.Manager",
2108 DBUS_TYPE_BOOLEAN, &interactive,
2115 static int check_inhibitors(DBusConnection *bus, enum action a) {
2117 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
2118 DBusMessageIter iter, sub, sub2;
2121 _cleanup_strv_free_ char **sessions = NULL;
2127 if (arg_ignore_inhibitors || arg_force > 0)
2139 r = bus_method_call_with_reply(
2141 "org.freedesktop.login1",
2142 "/org/freedesktop/login1",
2143 "org.freedesktop.login1.Manager",
2149 /* If logind is not around, then there are no inhibitors... */
2152 if (!dbus_message_iter_init(reply, &iter) ||
2153 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
2154 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
2155 log_error("Failed to parse reply.");
2159 dbus_message_iter_recurse(&iter, &sub);
2160 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2161 const char *what, *who, *why, *mode;
2163 _cleanup_strv_free_ char **sv = NULL;
2164 _cleanup_free_ char *comm = NULL, *user = NULL;
2166 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
2167 log_error("Failed to parse reply.");
2171 dbus_message_iter_recurse(&sub, &sub2);
2173 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &what, true) < 0 ||
2174 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &who, true) < 0 ||
2175 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &why, true) < 0 ||
2176 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &mode, true) < 0 ||
2177 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &uid, true) < 0 ||
2178 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, false) < 0) {
2179 log_error("Failed to parse reply.");
2183 if (!streq(mode, "block"))
2186 sv = strv_split(what, ":");
2190 if (!strv_contains(sv,
2192 a == ACTION_POWEROFF ||
2193 a == ACTION_REBOOT ||
2194 a == ACTION_KEXEC ? "shutdown" : "sleep"))
2197 get_process_comm(pid, &comm);
2198 user = uid_to_name(uid);
2199 log_warning("Operation inhibited by \"%s\" (PID %lu \"%s\", user %s), reason is \"%s\".",
2200 who, (unsigned long) pid, strna(comm), strna(user), why);
2204 dbus_message_iter_next(&sub);
2207 dbus_message_iter_recurse(&iter, &sub);
2209 /* Check for current sessions */
2210 sd_get_sessions(&sessions);
2211 STRV_FOREACH(s, sessions) {
2213 _cleanup_free_ char *type = NULL, *tty = NULL, *seat = NULL, *user = NULL, *service = NULL, *class = NULL;
2215 if (sd_session_get_uid(*s, &uid) < 0 || uid == getuid())
2218 if (sd_session_get_class(*s, &class) < 0 || !streq(class, "user"))
2221 if (sd_session_get_type(*s, &type) < 0 || (!streq(type, "x11") && !streq(type, "tty")))
2224 sd_session_get_tty(*s, &tty);
2225 sd_session_get_seat(*s, &seat);
2226 sd_session_get_service(*s, &service);
2227 user = uid_to_name(uid);
2229 log_warning("User %s is logged in on %s.", strna(user), isempty(tty) ? (isempty(seat) ? strna(service) : seat) : tty);
2236 log_error("Please retry operation after closing inhibitors and logging out other users.\nAlternatively, ignore inhibitors and users with 'systemctl %s -i'.",
2237 action_table[a].verb);
2245 static int start_special(DBusConnection *bus, char **args) {
2251 a = verb_to_action(args[0]);
2253 r = check_inhibitors(bus, a);
2257 if (arg_force >= 2 && geteuid() != 0) {
2258 log_error("Must be root.");
2262 if (arg_force >= 2 &&
2263 (a == ACTION_HALT ||
2264 a == ACTION_POWEROFF ||
2265 a == ACTION_REBOOT))
2268 if (arg_force >= 1 &&
2269 (a == ACTION_HALT ||
2270 a == ACTION_POWEROFF ||
2271 a == ACTION_REBOOT ||
2272 a == ACTION_KEXEC ||
2274 return daemon_reload(bus, args);
2276 /* first try logind, to allow authentication with polkit */
2277 if (geteuid() != 0 &&
2278 (a == ACTION_POWEROFF ||
2279 a == ACTION_REBOOT ||
2280 a == ACTION_SUSPEND ||
2281 a == ACTION_HIBERNATE ||
2282 a == ACTION_HYBRID_SLEEP)) {
2283 r = reboot_with_logind(bus, a);
2288 r = start_unit(bus, args);
2289 if (r == EXIT_SUCCESS)
2295 static int check_unit_active(DBusConnection *bus, char **args) {
2296 const char * const check_states[] = {
2303 int r = 3; /* According to LSB: "program is not running" */
2308 STRV_FOREACH(name, args+1) {
2311 state = check_one_unit(bus, *name, (char**) check_states, arg_quiet);
2321 static int check_unit_failed(DBusConnection *bus, char **args) {
2322 const char * const check_states[] = {
2333 STRV_FOREACH(name, args+1) {
2336 state = check_one_unit(bus, *name, (char**) check_states, arg_quiet);
2346 static int kill_unit(DBusConnection *bus, char **args) {
2354 arg_kill_who = "all";
2356 STRV_FOREACH(name, args+1) {
2357 _cleanup_free_ char *n = NULL;
2359 n = unit_name_mangle(*name);
2363 r = bus_method_call_with_reply(
2365 "org.freedesktop.systemd1",
2366 "/org/freedesktop/systemd1",
2367 "org.freedesktop.systemd1.Manager",
2371 DBUS_TYPE_STRING, &n,
2372 DBUS_TYPE_STRING, &arg_kill_who,
2373 DBUS_TYPE_INT32, &arg_signal,
2381 typedef struct ExecStatusInfo {
2389 usec_t start_timestamp;
2390 usec_t exit_timestamp;
2395 LIST_FIELDS(struct ExecStatusInfo, exec);
2398 static void exec_status_info_free(ExecStatusInfo *i) {
2407 static int exec_status_info_deserialize(DBusMessageIter *sub, ExecStatusInfo *i) {
2408 uint64_t start_timestamp, exit_timestamp, start_timestamp_monotonic, exit_timestamp_monotonic;
2409 DBusMessageIter sub2, sub3;
2413 int32_t code, status;
2419 if (dbus_message_iter_get_arg_type(sub) != DBUS_TYPE_STRUCT)
2422 dbus_message_iter_recurse(sub, &sub2);
2424 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0)
2427 i->path = strdup(path);
2431 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_ARRAY ||
2432 dbus_message_iter_get_element_type(&sub2) != DBUS_TYPE_STRING)
2436 dbus_message_iter_recurse(&sub2, &sub3);
2437 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
2438 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
2439 dbus_message_iter_next(&sub3);
2443 i->argv = new0(char*, n+1);
2448 dbus_message_iter_recurse(&sub2, &sub3);
2449 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
2452 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
2453 dbus_message_iter_get_basic(&sub3, &s);
2454 dbus_message_iter_next(&sub3);
2456 i->argv[n] = strdup(s);
2463 if (!dbus_message_iter_next(&sub2) ||
2464 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, true) < 0 ||
2465 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp, true) < 0 ||
2466 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp_monotonic, true) < 0 ||
2467 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp, true) < 0 ||
2468 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp_monotonic, true) < 0 ||
2469 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, true) < 0 ||
2470 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &code, true) < 0 ||
2471 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &status, false) < 0)
2475 i->start_timestamp = (usec_t) start_timestamp;
2476 i->exit_timestamp = (usec_t) exit_timestamp;
2477 i->pid = (pid_t) pid;
2484 typedef struct UnitStatusInfo {
2486 const char *load_state;
2487 const char *active_state;
2488 const char *sub_state;
2489 const char *unit_file_state;
2491 const char *description;
2492 const char *following;
2494 char **documentation;
2496 const char *fragment_path;
2497 const char *source_path;
2498 const char *control_group;
2500 char **dropin_paths;
2502 const char *load_error;
2505 usec_t inactive_exit_timestamp;
2506 usec_t inactive_exit_timestamp_monotonic;
2507 usec_t active_enter_timestamp;
2508 usec_t active_exit_timestamp;
2509 usec_t inactive_enter_timestamp;
2511 bool need_daemon_reload;
2516 const char *status_text;
2517 const char *pid_file;
2520 usec_t start_timestamp;
2521 usec_t exit_timestamp;
2523 int exit_code, exit_status;
2525 usec_t condition_timestamp;
2526 bool condition_result;
2529 unsigned n_accepted;
2530 unsigned n_connections;
2533 /* Pairs of type, path */
2537 const char *sysfs_path;
2539 /* Mount, Automount */
2545 LIST_HEAD(ExecStatusInfo, exec);
2548 static void print_status_info(UnitStatusInfo *i) {
2550 const char *on, *off, *ss;
2552 char since1[FORMAT_TIMESTAMP_RELATIVE_MAX], *s1;
2553 char since2[FORMAT_TIMESTAMP_MAX], *s2;
2556 arg_all * OUTPUT_SHOW_ALL |
2557 (!on_tty() || pager_have()) * OUTPUT_FULL_WIDTH |
2558 on_tty() * OUTPUT_COLOR |
2559 !arg_quiet * OUTPUT_WARN_CUTOFF |
2560 arg_full * OUTPUT_FULL_WIDTH;
2565 /* This shows pretty information about a unit. See
2566 * print_property() for a low-level property printer */
2568 printf("%s", strna(i->id));
2570 if (i->description && !streq_ptr(i->id, i->description))
2571 printf(" - %s", i->description);
2576 printf(" Follow: unit currently follows state of %s\n", i->following);
2578 if (streq_ptr(i->load_state, "error")) {
2579 on = ansi_highlight_red(true);
2580 off = ansi_highlight_red(false);
2584 path = i->source_path ? i->source_path : i->fragment_path;
2587 printf(" Loaded: %s%s%s (Reason: %s)\n",
2588 on, strna(i->load_state), off, i->load_error);
2589 else if (path && i->unit_file_state)
2590 printf(" Loaded: %s%s%s (%s; %s)\n",
2591 on, strna(i->load_state), off, path, i->unit_file_state);
2593 printf(" Loaded: %s%s%s (%s)\n",
2594 on, strna(i->load_state), off, path);
2596 printf(" Loaded: %s%s%s\n",
2597 on, strna(i->load_state), off);
2599 if (!strv_isempty(i->dropin_paths)) {
2604 STRV_FOREACH(dropin, i->dropin_paths) {
2605 if (! dir || last) {
2606 printf(dir ? " " : " Drop-In: ");
2610 if (path_get_parent(*dropin, &dir) < 0) {
2615 printf("%s\n %s", dir,
2616 draw_special_char(DRAW_TREE_RIGHT));
2619 last = ! (*(dropin + 1) && startswith(*(dropin + 1), dir));
2621 printf("%s%s", path_get_file_name(*dropin), last ? "\n" : ", ");
2627 ss = streq_ptr(i->active_state, i->sub_state) ? NULL : i->sub_state;
2629 if (streq_ptr(i->active_state, "failed")) {
2630 on = ansi_highlight_red(true);
2631 off = ansi_highlight_red(false);
2632 } else if (streq_ptr(i->active_state, "active") || streq_ptr(i->active_state, "reloading")) {
2633 on = ansi_highlight_green(true);
2634 off = ansi_highlight_green(false);
2639 printf(" Active: %s%s (%s)%s",
2640 on, strna(i->active_state), ss, off);
2642 printf(" Active: %s%s%s",
2643 on, strna(i->active_state), off);
2645 if (!isempty(i->result) && !streq(i->result, "success"))
2646 printf(" (Result: %s)", i->result);
2648 timestamp = (streq_ptr(i->active_state, "active") ||
2649 streq_ptr(i->active_state, "reloading")) ? i->active_enter_timestamp :
2650 (streq_ptr(i->active_state, "inactive") ||
2651 streq_ptr(i->active_state, "failed")) ? i->inactive_enter_timestamp :
2652 streq_ptr(i->active_state, "activating") ? i->inactive_exit_timestamp :
2653 i->active_exit_timestamp;
2655 s1 = format_timestamp_relative(since1, sizeof(since1), timestamp);
2656 s2 = format_timestamp(since2, sizeof(since2), timestamp);
2659 printf(" since %s; %s\n", s2, s1);
2661 printf(" since %s\n", s2);
2665 if (!i->condition_result && i->condition_timestamp > 0) {
2666 s1 = format_timestamp_relative(since1, sizeof(since1), i->condition_timestamp);
2667 s2 = format_timestamp(since2, sizeof(since2), i->condition_timestamp);
2670 printf(" start condition failed at %s; %s\n", s2, s1);
2672 printf(" start condition failed at %s\n", s2);
2676 printf(" Device: %s\n", i->sysfs_path);
2678 printf(" Where: %s\n", i->where);
2680 printf(" What: %s\n", i->what);
2682 STRV_FOREACH(t, i->documentation)
2683 printf(" %*s %s\n", 9, t == i->documentation ? "Docs:" : "", *t);
2685 STRV_FOREACH_PAIR(t, t2, i->listen)
2686 printf(" %*s %s (%s)\n", 9, t == i->listen ? "Listen:" : "", *t2, *t);
2689 printf(" Accepted: %u; Connected: %u\n", i->n_accepted, i->n_connections);
2691 LIST_FOREACH(exec, p, i->exec) {
2692 _cleanup_free_ char *argv = NULL;
2695 /* Only show exited processes here */
2699 argv = strv_join(p->argv, " ");
2700 printf(" Process: %u %s=%s ", p->pid, p->name, strna(argv));
2702 good = is_clean_exit_lsb(p->code, p->status, NULL);
2704 on = ansi_highlight_red(true);
2705 off = ansi_highlight_red(false);
2709 printf("%s(code=%s, ", on, sigchld_code_to_string(p->code));
2711 if (p->code == CLD_EXITED) {
2714 printf("status=%i", p->status);
2716 c = exit_status_to_string(p->status, EXIT_STATUS_SYSTEMD);
2721 printf("signal=%s", signal_to_string(p->status));
2723 printf(")%s\n", off);
2725 if (i->main_pid == p->pid &&
2726 i->start_timestamp == p->start_timestamp &&
2727 i->exit_timestamp == p->start_timestamp)
2728 /* Let's not show this twice */
2731 if (p->pid == i->control_pid)
2735 if (i->main_pid > 0 || i->control_pid > 0) {
2736 if (i->main_pid > 0) {
2737 printf(" Main PID: %u", (unsigned) i->main_pid);
2740 _cleanup_free_ char *comm = NULL;
2741 get_process_comm(i->main_pid, &comm);
2743 printf(" (%s)", comm);
2744 } else if (i->exit_code > 0) {
2745 printf(" (code=%s, ", sigchld_code_to_string(i->exit_code));
2747 if (i->exit_code == CLD_EXITED) {
2750 printf("status=%i", i->exit_status);
2752 c = exit_status_to_string(i->exit_status, EXIT_STATUS_SYSTEMD);
2757 printf("signal=%s", signal_to_string(i->exit_status));
2761 if (i->control_pid > 0)
2765 if (i->control_pid > 0) {
2766 _cleanup_free_ char *c = NULL;
2768 printf(" %8s: %u", i->main_pid ? "" : " Control", (unsigned) i->control_pid);
2770 get_process_comm(i->control_pid, &c);
2779 printf(" Status: \"%s\"\n", i->status_text);
2781 if (i->control_group &&
2782 (i->main_pid > 0 || i->control_pid > 0 || cg_is_empty_by_spec(i->control_group, false) == 0)) {
2785 printf(" CGroup: %s\n", i->control_group);
2787 if (arg_transport != TRANSPORT_SSH) {
2790 char prefix[] = " ";
2793 if (c > sizeof(prefix) - 1)
2794 c -= sizeof(prefix) - 1;
2798 if (i->main_pid > 0)
2799 extra[k++] = i->main_pid;
2801 if (i->control_pid > 0)
2802 extra[k++] = i->control_pid;
2804 show_cgroup_and_extra_by_spec(i->control_group, prefix,
2805 c, false, extra, k, flags);
2809 if (i->id && arg_transport != TRANSPORT_SSH) {
2811 show_journal_by_unit(stdout,
2815 i->inactive_exit_timestamp_monotonic,
2819 arg_scope == UNIT_FILE_SYSTEM);
2822 if (i->need_daemon_reload)
2823 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %sdaemon-reload' recommended.\n",
2824 ansi_highlight_red(true),
2825 ansi_highlight_red(false),
2826 arg_scope == UNIT_FILE_SYSTEM ? "" : "--user ");
2829 static void show_unit_help(UnitStatusInfo *i) {
2834 if (!i->documentation) {
2835 log_info("Documentation for %s not known.", i->id);
2839 STRV_FOREACH(p, i->documentation) {
2841 if (startswith(*p, "man:")) {
2844 _cleanup_free_ char *page = NULL, *section = NULL;
2845 const char *args[4] = { "man", NULL, NULL, NULL };
2850 if ((*p)[k-1] == ')')
2851 e = strrchr(*p, '(');
2854 page = strndup((*p) + 4, e - *p - 4);
2855 section = strndup(e + 1, *p + k - e - 2);
2856 if (!page || !section) {
2868 log_error("Failed to fork: %m");
2874 execvp(args[0], (char**) args);
2875 log_error("Failed to execute man: %m");
2876 _exit(EXIT_FAILURE);
2879 wait_for_terminate(pid, NULL);
2881 log_info("Can't show: %s", *p);
2885 static int status_property(const char *name, DBusMessageIter *iter, UnitStatusInfo *i) {
2891 switch (dbus_message_iter_get_arg_type(iter)) {
2893 case DBUS_TYPE_STRING: {
2896 dbus_message_iter_get_basic(iter, &s);
2899 if (streq(name, "Id"))
2901 else if (streq(name, "LoadState"))
2903 else if (streq(name, "ActiveState"))
2904 i->active_state = s;
2905 else if (streq(name, "SubState"))
2907 else if (streq(name, "Description"))
2909 else if (streq(name, "FragmentPath"))
2910 i->fragment_path = s;
2911 else if (streq(name, "SourcePath"))
2914 else if (streq(name, "DefaultControlGroup"))
2915 i->control_group = s;
2917 else if (streq(name, "ControlGroup"))
2918 i->control_group = s;
2919 else if (streq(name, "StatusText"))
2921 else if (streq(name, "PIDFile"))
2923 else if (streq(name, "SysFSPath"))
2925 else if (streq(name, "Where"))
2927 else if (streq(name, "What"))
2929 else if (streq(name, "Following"))
2931 else if (streq(name, "UnitFileState"))
2932 i->unit_file_state = s;
2933 else if (streq(name, "Result"))
2940 case DBUS_TYPE_BOOLEAN: {
2943 dbus_message_iter_get_basic(iter, &b);
2945 if (streq(name, "Accept"))
2947 else if (streq(name, "NeedDaemonReload"))
2948 i->need_daemon_reload = b;
2949 else if (streq(name, "ConditionResult"))
2950 i->condition_result = b;
2955 case DBUS_TYPE_UINT32: {
2958 dbus_message_iter_get_basic(iter, &u);
2960 if (streq(name, "MainPID")) {
2962 i->main_pid = (pid_t) u;
2965 } else if (streq(name, "ControlPID"))
2966 i->control_pid = (pid_t) u;
2967 else if (streq(name, "ExecMainPID")) {
2969 i->main_pid = (pid_t) u;
2970 } else if (streq(name, "NAccepted"))
2972 else if (streq(name, "NConnections"))
2973 i->n_connections = u;
2978 case DBUS_TYPE_INT32: {
2981 dbus_message_iter_get_basic(iter, &j);
2983 if (streq(name, "ExecMainCode"))
2984 i->exit_code = (int) j;
2985 else if (streq(name, "ExecMainStatus"))
2986 i->exit_status = (int) j;
2991 case DBUS_TYPE_UINT64: {
2994 dbus_message_iter_get_basic(iter, &u);
2996 if (streq(name, "ExecMainStartTimestamp"))
2997 i->start_timestamp = (usec_t) u;
2998 else if (streq(name, "ExecMainExitTimestamp"))
2999 i->exit_timestamp = (usec_t) u;
3000 else if (streq(name, "ActiveEnterTimestamp"))
3001 i->active_enter_timestamp = (usec_t) u;
3002 else if (streq(name, "InactiveEnterTimestamp"))
3003 i->inactive_enter_timestamp = (usec_t) u;
3004 else if (streq(name, "InactiveExitTimestamp"))
3005 i->inactive_exit_timestamp = (usec_t) u;
3006 else if (streq(name, "InactiveExitTimestampMonotonic"))
3007 i->inactive_exit_timestamp_monotonic = (usec_t) u;
3008 else if (streq(name, "ActiveExitTimestamp"))
3009 i->active_exit_timestamp = (usec_t) u;
3010 else if (streq(name, "ConditionTimestamp"))
3011 i->condition_timestamp = (usec_t) u;
3016 case DBUS_TYPE_ARRAY: {
3018 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT &&
3019 startswith(name, "Exec")) {
3020 DBusMessageIter sub;
3022 dbus_message_iter_recurse(iter, &sub);
3023 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3024 ExecStatusInfo *info;
3027 if (!(info = new0(ExecStatusInfo, 1)))
3030 if (!(info->name = strdup(name))) {
3035 if ((r = exec_status_info_deserialize(&sub, info)) < 0) {
3040 LIST_PREPEND(ExecStatusInfo, exec, i->exec, info);
3042 dbus_message_iter_next(&sub);
3045 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Listen")) {
3046 DBusMessageIter sub, sub2;
3048 dbus_message_iter_recurse(iter, &sub);
3049 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3050 const char *type, *path;
3052 dbus_message_iter_recurse(&sub, &sub2);
3054 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
3055 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0) {
3058 r = strv_extend(&i->listen, type);
3061 r = strv_extend(&i->listen, path);
3066 dbus_message_iter_next(&sub);
3071 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING && streq(name, "DropInPaths")) {
3072 int r = bus_parse_strv_iter(iter, &i->dropin_paths);
3076 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING &&
3077 streq(name, "Documentation")) {
3079 DBusMessageIter sub;
3081 dbus_message_iter_recurse(iter, &sub);
3082 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING) {
3086 dbus_message_iter_get_basic(&sub, &s);
3088 r = strv_extend(&i->documentation, s);
3092 dbus_message_iter_next(&sub);
3099 case DBUS_TYPE_STRUCT: {
3101 if (streq(name, "LoadError")) {
3102 DBusMessageIter sub;
3103 const char *n, *message;
3106 dbus_message_iter_recurse(iter, &sub);
3108 r = bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &n, true);
3112 r = bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &message, false);
3116 if (!isempty(message))
3117 i->load_error = message;
3127 static int print_property(const char *name, DBusMessageIter *iter) {
3131 /* This is a low-level property printer, see
3132 * print_status_info() for the nicer output */
3134 if (arg_properties && !strv_find(arg_properties, name))
3137 switch (dbus_message_iter_get_arg_type(iter)) {
3139 case DBUS_TYPE_STRUCT: {
3140 DBusMessageIter sub;
3141 dbus_message_iter_recurse(iter, &sub);
3143 if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_UINT32 && streq(name, "Job")) {
3146 dbus_message_iter_get_basic(&sub, &u);
3149 printf("%s=%u\n", name, (unsigned) u);
3151 printf("%s=\n", name);
3154 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "Unit")) {
3157 dbus_message_iter_get_basic(&sub, &s);
3159 if (arg_all || s[0])
3160 printf("%s=%s\n", name, s);
3163 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "LoadError")) {
3164 const char *a = NULL, *b = NULL;
3166 if (bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &a, true) >= 0)
3167 bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &b, false);
3169 if (arg_all || !isempty(a) || !isempty(b))
3170 printf("%s=%s \"%s\"\n", name, strempty(a), strempty(b));
3178 case DBUS_TYPE_ARRAY:
3180 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "EnvironmentFiles")) {
3181 DBusMessageIter sub, sub2;
3183 dbus_message_iter_recurse(iter, &sub);
3184 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3188 dbus_message_iter_recurse(&sub, &sub2);
3190 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) >= 0 &&
3191 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, false) >= 0)
3192 printf("EnvironmentFile=%s (ignore_errors=%s)\n", path, yes_no(ignore));
3194 dbus_message_iter_next(&sub);
3199 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Paths")) {
3200 DBusMessageIter sub, sub2;
3202 dbus_message_iter_recurse(iter, &sub);
3204 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3205 const char *type, *path;
3207 dbus_message_iter_recurse(&sub, &sub2);
3209 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
3210 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
3211 printf("%s=%s\n", type, path);
3213 dbus_message_iter_next(&sub);
3218 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Listen")) {
3219 DBusMessageIter sub, sub2;
3221 dbus_message_iter_recurse(iter, &sub);
3222 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3223 const char *type, *path;
3225 dbus_message_iter_recurse(&sub, &sub2);
3227 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
3228 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
3229 printf("Listen%s=%s\n", type, path);
3231 dbus_message_iter_next(&sub);
3236 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Timers")) {
3237 DBusMessageIter sub, sub2;
3239 dbus_message_iter_recurse(iter, &sub);
3240 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3242 uint64_t value, next_elapse;
3244 dbus_message_iter_recurse(&sub, &sub2);
3246 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &base, true) >= 0 &&
3247 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &value, true) >= 0 &&
3248 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &next_elapse, false) >= 0) {
3249 char timespan1[FORMAT_TIMESPAN_MAX], timespan2[FORMAT_TIMESPAN_MAX];
3251 printf("%s={ value=%s ; next_elapse=%s }\n",
3253 format_timespan(timespan1, sizeof(timespan1), value, 0),
3254 format_timespan(timespan2, sizeof(timespan2), next_elapse, 0));
3257 dbus_message_iter_next(&sub);
3262 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "ControlGroupAttributes")) {
3263 DBusMessageIter sub, sub2;
3265 dbus_message_iter_recurse(iter, &sub);
3266 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3267 const char *controller, *attr, *value;
3269 dbus_message_iter_recurse(&sub, &sub2);
3271 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &controller, true) >= 0 &&
3272 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &attr, true) >= 0 &&
3273 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &value, false) >= 0) {
3275 printf("ControlGroupAttributes={ controller=%s ; attribute=%s ; value=\"%s\" }\n",
3281 dbus_message_iter_next(&sub);
3286 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && startswith(name, "Exec")) {
3287 DBusMessageIter sub;
3289 dbus_message_iter_recurse(iter, &sub);
3290 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3291 ExecStatusInfo info = {};
3293 if (exec_status_info_deserialize(&sub, &info) >= 0) {
3294 char timestamp1[FORMAT_TIMESTAMP_MAX], timestamp2[FORMAT_TIMESTAMP_MAX];
3295 _cleanup_free_ char *t;
3297 t = strv_join(info.argv, " ");
3299 printf("%s={ path=%s ; argv[]=%s ; ignore_errors=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
3303 yes_no(info.ignore),
3304 strna(format_timestamp(timestamp1, sizeof(timestamp1), info.start_timestamp)),
3305 strna(format_timestamp(timestamp2, sizeof(timestamp2), info.exit_timestamp)),
3306 (unsigned) info. pid,
3307 sigchld_code_to_string(info.code),
3309 info.code == CLD_EXITED ? "" : "/",
3310 strempty(info.code == CLD_EXITED ? NULL : signal_to_string(info.status)));
3314 strv_free(info.argv);
3316 dbus_message_iter_next(&sub);
3321 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "DeviceAllow")) {
3322 DBusMessageIter sub, sub2;
3324 dbus_message_iter_recurse(iter, &sub);
3325 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3326 const char *path, *rwm;
3328 dbus_message_iter_recurse(&sub, &sub2);
3330 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) >= 0 &&
3331 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &rwm, false) >= 0)
3332 printf("%s=%s %s\n", name, strna(path), strna(rwm));
3334 dbus_message_iter_next(&sub);
3338 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && (streq(name, "BlockIOReadBandwidth") || streq(name, "BlockIOWriteBandwidth"))) {
3339 DBusMessageIter sub, sub2;
3341 dbus_message_iter_recurse(iter, &sub);
3342 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3346 dbus_message_iter_recurse(&sub, &sub2);
3348 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) >= 0 &&
3349 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &bandwidth, false) >= 0)
3350 printf("%s=%s %" PRIu64 "\n", name, strna(path), bandwidth);
3352 dbus_message_iter_next(&sub);
3361 if (generic_print_property(name, iter, arg_all) > 0)
3365 printf("%s=[unprintable]\n", name);
3370 static int show_one(const char *verb, DBusConnection *bus, const char *path, bool show_properties, bool *new_line) {
3371 _cleanup_free_ DBusMessage *reply = NULL;
3372 const char *interface = "";
3374 DBusMessageIter iter, sub, sub2, sub3;
3375 UnitStatusInfo info = {};
3381 r = bus_method_call_with_reply(
3383 "org.freedesktop.systemd1",
3385 "org.freedesktop.DBus.Properties",
3389 DBUS_TYPE_STRING, &interface,
3394 if (!dbus_message_iter_init(reply, &iter) ||
3395 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
3396 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
3397 log_error("Failed to parse reply.");
3401 dbus_message_iter_recurse(&iter, &sub);
3408 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
3411 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_DICT_ENTRY);
3412 dbus_message_iter_recurse(&sub, &sub2);
3414 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
3415 dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
3416 log_error("Failed to parse reply.");
3420 dbus_message_iter_recurse(&sub2, &sub3);
3422 if (show_properties)
3423 r = print_property(name, &sub3);
3425 r = status_property(name, &sub3, &info);
3427 log_error("Failed to parse reply.");
3431 dbus_message_iter_next(&sub);
3436 if (!show_properties) {
3437 if (streq(verb, "help"))
3438 show_unit_help(&info);
3440 print_status_info(&info);
3443 strv_free(info.documentation);
3444 strv_free(info.dropin_paths);
3445 strv_free(info.listen);
3447 if (!streq_ptr(info.active_state, "active") &&
3448 !streq_ptr(info.active_state, "reloading") &&
3449 streq(verb, "status")) {
3450 /* According to LSB: "program not running" */
3451 /* 0: program is running or service is OK
3452 * 1: program is dead and /var/run pid file exists
3453 * 2: program is dead and /var/lock lock file exists
3454 * 3: program is not running
3455 * 4: program or service status is unknown
3457 if (info.pid_file && access(info.pid_file, F_OK) == 0)
3463 while ((p = info.exec)) {
3464 LIST_REMOVE(ExecStatusInfo, exec, info.exec, p);
3465 exec_status_info_free(p);
3471 static int show_one_by_pid(const char *verb, DBusConnection *bus, uint32_t pid, bool *new_line) {
3472 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3473 const char *path = NULL;
3474 _cleanup_dbus_error_free_ DBusError error;
3477 dbus_error_init(&error);
3479 r = bus_method_call_with_reply(
3481 "org.freedesktop.systemd1",
3482 "/org/freedesktop/systemd1",
3483 "org.freedesktop.systemd1.Manager",
3487 DBUS_TYPE_UINT32, &pid,
3492 if (!dbus_message_get_args(reply, &error,
3493 DBUS_TYPE_OBJECT_PATH, &path,
3494 DBUS_TYPE_INVALID)) {
3495 log_error("Failed to parse reply: %s", bus_error_message(&error));
3499 r = show_one(verb, bus, path, false, new_line);
3503 static int show_all(const char* verb, DBusConnection *bus, bool show_properties, bool *new_line) {
3504 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3505 _cleanup_free_ struct unit_info *unit_infos = NULL;
3507 const struct unit_info *u;
3510 r = get_unit_list(bus, &reply, &unit_infos, &c);
3514 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
3516 for (u = unit_infos; u < unit_infos + c; u++) {
3517 _cleanup_free_ char *p = NULL;
3519 if (!output_show_unit(u))
3522 p = unit_dbus_path_from_name(u->id);
3526 printf("%s -> '%s'\n", u->id, p);
3528 r = show_one(verb, bus, p, show_properties, new_line);
3536 static int show(DBusConnection *bus, char **args) {
3538 bool show_properties, show_status, new_line = false;
3544 show_properties = streq(args[0], "show");
3545 show_status = streq(args[0], "status");
3547 if (show_properties)
3548 pager_open_if_enabled();
3550 /* If no argument is specified inspect the manager itself */
3552 if (show_properties && strv_length(args) <= 1)
3553 return show_one(args[0], bus, "/org/freedesktop/systemd1", show_properties, &new_line);
3555 if (show_status && strv_length(args) <= 1)
3556 return show_all(args[0], bus, false, &new_line);
3558 STRV_FOREACH(name, args+1) {
3561 if (safe_atou32(*name, &id) < 0) {
3562 _cleanup_free_ char *p = NULL, *n = NULL;
3563 /* Interpret as unit name */
3565 n = unit_name_mangle(*name);
3569 p = unit_dbus_path_from_name(n);
3573 r = show_one(args[0], bus, p, show_properties, &new_line);
3577 } else if (show_properties) {
3578 _cleanup_free_ char *p = NULL;
3580 /* Interpret as job id */
3581 if (asprintf(&p, "/org/freedesktop/systemd1/job/%u", id) < 0)
3584 r = show_one(args[0], bus, p, show_properties, &new_line);
3589 /* Interpret as PID */
3590 r = show_one_by_pid(args[0], bus, id, &new_line);
3599 static int append_assignment(DBusMessageIter *iter, const char *assignment) {
3602 DBusMessageIter sub;
3608 eq = strchr(assignment, '=');
3610 log_error("Not an assignment: %s", assignment);
3614 field = strndupa(assignment, eq - assignment);
3617 if (!dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &field))
3620 if (streq(field, "CPUAccounting") ||
3621 streq(field, "MemoryAccounting") ||
3622 streq(field, "BlockIOAccounting")) {
3625 r = parse_boolean(eq);
3627 log_error("Failed to parse boolean assignment %s.", assignment);
3632 if (!dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT, "b", &sub) ||
3633 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_BOOLEAN, &b))
3636 } else if (streq(field, "MemoryLimit") || streq(field, "MemorySoftLimit")) {
3640 r = parse_bytes(eq, &bytes);
3642 log_error("Failed to parse bytes specification %s", assignment);
3647 if (!dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT, "t", &sub) ||
3648 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_UINT64, &u))
3651 } else if (streq(field, "CPUShares") || streq(field, "BlockIOWeight")) {
3654 r = safe_atou64(eq, &u);
3656 log_error("Failed to parse %s value %s.", field, eq);
3660 if (!dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT, "t", &sub) ||
3661 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_UINT64, &u))
3664 } else if (streq(field, "DevicePolicy")) {
3666 if (!dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT, "s", &sub) ||
3667 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &eq))
3670 } else if (streq(field, "DeviceAllow")) {
3671 DBusMessageIter sub2;
3673 if (!dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT, "a(ss)", &sub) ||
3674 !dbus_message_iter_open_container(&sub, DBUS_TYPE_ARRAY, "(ss)", &sub2))
3678 const char *path, *rwm;
3679 DBusMessageIter sub3;
3682 e = strchr(eq, ' ');
3684 path = strndupa(eq, e - eq);
3691 if (!dbus_message_iter_open_container(&sub2, DBUS_TYPE_STRUCT, NULL, &sub3) ||
3692 !dbus_message_iter_append_basic(&sub3, DBUS_TYPE_STRING, &path) ||
3693 !dbus_message_iter_append_basic(&sub3, DBUS_TYPE_STRING, &rwm) ||
3694 !dbus_message_iter_close_container(&sub2, &sub3))
3698 if (!dbus_message_iter_close_container(&sub, &sub2))
3702 log_error("Unknown assignment %s.", assignment);
3706 if (!dbus_message_iter_close_container(iter, &sub))
3712 static int set_property(DBusConnection *bus, char **args) {
3714 _cleanup_free_ DBusMessage *m = NULL, *reply = NULL;
3715 DBusMessageIter iter, sub;
3716 dbus_bool_t runtime;
3721 dbus_error_init(&error);
3723 m = dbus_message_new_method_call(
3724 "org.freedesktop.systemd1",
3725 "/org/freedesktop/systemd1",
3726 "org.freedesktop.systemd1.Manager",
3727 "SetUnitProperties");
3731 dbus_message_iter_init_append(m, &iter);
3733 runtime = arg_runtime;
3735 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &args[1]) ||
3736 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &runtime) ||
3737 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "(sv)", &sub))
3740 STRV_FOREACH(i, args + 2) {
3741 DBusMessageIter sub2;
3743 if (!dbus_message_iter_open_container(&sub, DBUS_TYPE_STRUCT, NULL, &sub2))
3746 r = append_assignment(&sub2, *i);
3750 if (!dbus_message_iter_close_container(&sub, &sub2))
3755 if (!dbus_message_iter_close_container(&iter, &sub))
3758 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
3760 log_error("Failed to issue method call: %s", bus_error_message(&error));
3761 dbus_error_free(&error);
3768 static int dump(DBusConnection *bus, char **args) {
3769 _cleanup_free_ DBusMessage *reply = NULL;
3774 dbus_error_init(&error);
3776 pager_open_if_enabled();
3778 r = bus_method_call_with_reply(
3780 "org.freedesktop.systemd1",
3781 "/org/freedesktop/systemd1",
3782 "org.freedesktop.systemd1.Manager",
3790 if (!dbus_message_get_args(reply, &error,
3791 DBUS_TYPE_STRING, &text,
3792 DBUS_TYPE_INVALID)) {
3793 log_error("Failed to parse reply: %s", bus_error_message(&error));
3794 dbus_error_free(&error);
3798 fputs(text, stdout);
3802 static int snapshot(DBusConnection *bus, char **args) {
3803 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3806 dbus_bool_t cleanup = FALSE;
3807 DBusMessageIter iter, sub;
3810 *interface = "org.freedesktop.systemd1.Unit",
3812 _cleanup_free_ char *n = NULL;
3814 dbus_error_init(&error);
3816 if (strv_length(args) > 1)
3817 n = unit_name_mangle_with_suffix(args[1], ".snapshot");
3823 r = bus_method_call_with_reply (
3825 "org.freedesktop.systemd1",
3826 "/org/freedesktop/systemd1",
3827 "org.freedesktop.systemd1.Manager",
3831 DBUS_TYPE_STRING, &n,
3832 DBUS_TYPE_BOOLEAN, &cleanup,
3837 if (!dbus_message_get_args(reply, &error,
3838 DBUS_TYPE_OBJECT_PATH, &path,
3839 DBUS_TYPE_INVALID)) {
3840 log_error("Failed to parse reply: %s", bus_error_message(&error));
3841 dbus_error_free(&error);
3845 dbus_message_unref(reply);
3848 r = bus_method_call_with_reply (
3850 "org.freedesktop.systemd1",
3852 "org.freedesktop.DBus.Properties",
3856 DBUS_TYPE_STRING, &interface,
3857 DBUS_TYPE_STRING, &property,
3862 if (!dbus_message_iter_init(reply, &iter) ||
3863 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3864 log_error("Failed to parse reply.");
3868 dbus_message_iter_recurse(&iter, &sub);
3870 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
3871 log_error("Failed to parse reply.");
3875 dbus_message_iter_get_basic(&sub, &id);
3883 static int delete_snapshot(DBusConnection *bus, char **args) {
3888 STRV_FOREACH(name, args+1) {
3889 _cleanup_free_ char *n = NULL;
3892 n = unit_name_mangle_with_suffix(*name, ".snapshot");
3896 r = bus_method_call_with_reply(
3898 "org.freedesktop.systemd1",
3899 "/org/freedesktop/systemd1",
3900 "org.freedesktop.systemd1.Manager",
3904 DBUS_TYPE_STRING, &n,
3913 static int daemon_reload(DBusConnection *bus, char **args) {
3918 if (arg_action == ACTION_RELOAD)
3920 else if (arg_action == ACTION_REEXEC)
3921 method = "Reexecute";
3923 assert(arg_action == ACTION_SYSTEMCTL);
3926 streq(args[0], "clear-jobs") ||
3927 streq(args[0], "cancel") ? "ClearJobs" :
3928 streq(args[0], "daemon-reexec") ? "Reexecute" :
3929 streq(args[0], "reset-failed") ? "ResetFailed" :
3930 streq(args[0], "halt") ? "Halt" :
3931 streq(args[0], "poweroff") ? "PowerOff" :
3932 streq(args[0], "reboot") ? "Reboot" :
3933 streq(args[0], "kexec") ? "KExec" :
3934 streq(args[0], "exit") ? "Exit" :
3935 /* "daemon-reload" */ "Reload";
3938 r = bus_method_call_with_reply(
3940 "org.freedesktop.systemd1",
3941 "/org/freedesktop/systemd1",
3942 "org.freedesktop.systemd1.Manager",
3948 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
3949 /* There's always a fallback possible for
3950 * legacy actions. */
3952 else if (r == -ETIMEDOUT && streq(method, "Reexecute"))
3953 /* On reexecution, we expect a disconnect, not
3957 log_error("Failed to issue method call: %s", bus_error_message(&error));
3959 dbus_error_free(&error);
3963 static int reset_failed(DBusConnection *bus, char **args) {
3967 if (strv_length(args) <= 1)
3968 return daemon_reload(bus, args);
3970 STRV_FOREACH(name, args+1) {
3971 _cleanup_free_ char *n;
3973 n = unit_name_mangle(*name);
3977 r = bus_method_call_with_reply(
3979 "org.freedesktop.systemd1",
3980 "/org/freedesktop/systemd1",
3981 "org.freedesktop.systemd1.Manager",
3985 DBUS_TYPE_STRING, &n,
3994 static int show_enviroment(DBusConnection *bus, char **args) {
3995 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3996 DBusMessageIter iter, sub, sub2;
3999 *interface = "org.freedesktop.systemd1.Manager",
4000 *property = "Environment";
4002 pager_open_if_enabled();
4004 r = bus_method_call_with_reply(
4006 "org.freedesktop.systemd1",
4007 "/org/freedesktop/systemd1",
4008 "org.freedesktop.DBus.Properties",
4012 DBUS_TYPE_STRING, &interface,
4013 DBUS_TYPE_STRING, &property,
4018 if (!dbus_message_iter_init(reply, &iter) ||
4019 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
4020 log_error("Failed to parse reply.");
4024 dbus_message_iter_recurse(&iter, &sub);
4026 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_ARRAY ||
4027 dbus_message_iter_get_element_type(&sub) != DBUS_TYPE_STRING) {
4028 log_error("Failed to parse reply.");
4032 dbus_message_iter_recurse(&sub, &sub2);
4034 while (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_INVALID) {
4037 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_STRING) {
4038 log_error("Failed to parse reply.");
4042 dbus_message_iter_get_basic(&sub2, &text);
4045 dbus_message_iter_next(&sub2);
4051 static int switch_root(DBusConnection *bus, char **args) {
4054 _cleanup_free_ char *init = NULL;
4056 l = strv_length(args);
4057 if (l < 2 || l > 3) {
4058 log_error("Wrong number of arguments.");
4065 init = strdup(args[2]);
4067 parse_env_file("/proc/cmdline", WHITESPACE,
4077 log_debug("switching root - root: %s; init: %s", root, init);
4079 return bus_method_call_with_reply(
4081 "org.freedesktop.systemd1",
4082 "/org/freedesktop/systemd1",
4083 "org.freedesktop.systemd1.Manager",
4087 DBUS_TYPE_STRING, &root,
4088 DBUS_TYPE_STRING, &init,
4092 static int set_environment(DBusConnection *bus, char **args) {
4093 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
4096 DBusMessageIter iter;
4102 dbus_error_init(&error);
4104 method = streq(args[0], "set-environment")
4106 : "UnsetEnvironment";
4108 m = dbus_message_new_method_call(
4109 "org.freedesktop.systemd1",
4110 "/org/freedesktop/systemd1",
4111 "org.freedesktop.systemd1.Manager",
4116 dbus_message_iter_init_append(m, &iter);
4118 r = bus_append_strv_iter(&iter, args + 1);
4122 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
4124 log_error("Failed to issue method call: %s", bus_error_message(&error));
4125 dbus_error_free(&error);
4132 static int enable_sysv_units(char **args) {
4135 #if defined(HAVE_SYSV_COMPAT) && defined(HAVE_CHKCONFIG)
4136 const char *verb = args[0];
4137 unsigned f = 1, t = 1;
4138 LookupPaths paths = {};
4140 if (arg_scope != UNIT_FILE_SYSTEM)
4143 if (!streq(verb, "enable") &&
4144 !streq(verb, "disable") &&
4145 !streq(verb, "is-enabled"))
4148 /* Processes all SysV units, and reshuffles the array so that
4149 * afterwards only the native units remain */
4151 r = lookup_paths_init(&paths, SYSTEMD_SYSTEM, false, NULL, NULL, NULL);
4156 for (f = 1; args[f]; f++) {
4158 _cleanup_free_ char *p = NULL, *q = NULL;
4159 bool found_native = false, found_sysv;
4161 const char *argv[6] = { "/sbin/chkconfig", NULL, NULL, NULL, NULL };
4169 if (!endswith(name, ".service"))
4172 if (path_is_absolute(name))
4175 STRV_FOREACH(k, paths.unit_path) {
4176 if (!isempty(arg_root))
4177 asprintf(&p, "%s/%s/%s", arg_root, *k, name);
4179 asprintf(&p, "%s/%s", *k, name);
4186 found_native = access(p, F_OK) >= 0;
4197 if (!isempty(arg_root))
4198 asprintf(&p, "%s/" SYSTEM_SYSVINIT_PATH "/%s", arg_root, name);
4200 asprintf(&p, SYSTEM_SYSVINIT_PATH "/%s", name);
4206 p[strlen(p) - sizeof(".service") + 1] = 0;
4207 found_sysv = access(p, F_OK) >= 0;
4212 /* Mark this entry, so that we don't try enabling it as native unit */
4213 args[f] = (char*) "";
4215 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", name);
4217 if (!isempty(arg_root))
4218 argv[c++] = q = strappend("--root=", arg_root);
4220 argv[c++] = path_get_file_name(p);
4222 streq(verb, "enable") ? "on" :
4223 streq(verb, "disable") ? "off" : "--level=5";
4226 l = strv_join((char**)argv, " ");
4232 log_info("Executing %s", l);
4237 log_error("Failed to fork: %m");
4240 } else if (pid == 0) {
4243 execv(argv[0], (char**) argv);
4244 _exit(EXIT_FAILURE);
4247 j = wait_for_terminate(pid, &status);
4249 log_error("Failed to wait for child: %s", strerror(-r));
4254 if (status.si_code == CLD_EXITED) {
4255 if (streq(verb, "is-enabled")) {
4256 if (status.si_status == 0) {
4265 } else if (status.si_status != 0) {
4276 lookup_paths_free(&paths);
4278 /* Drop all SysV units */
4279 for (f = 1, t = 1; args[f]; f++) {
4281 if (isempty(args[f]))
4284 args[t++] = args[f];
4293 static int mangle_names(char **original_names, char ***mangled_names) {
4294 char **i, **l, **name;
4296 l = new(char*, strv_length(original_names) + 1);
4301 STRV_FOREACH(name, original_names) {
4303 /* When enabling units qualified path names are OK,
4304 * too, hence allow them explicitly. */
4309 *i = unit_name_mangle(*name);
4325 static int enable_unit(DBusConnection *bus, char **args) {
4326 const char *verb = args[0];
4327 UnitFileChange *changes = NULL;
4328 unsigned n_changes = 0, i;
4329 int carries_install_info = -1;
4330 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
4332 _cleanup_dbus_error_free_ DBusError error;
4333 _cleanup_strv_free_ char **mangled_names = NULL;
4335 dbus_error_init(&error);
4337 r = enable_sysv_units(args);
4344 r = mangle_names(args+1, &mangled_names);
4348 if (!bus || avoid_bus()) {
4349 if (streq(verb, "enable")) {
4350 r = unit_file_enable(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4351 carries_install_info = r;
4352 } else if (streq(verb, "disable"))
4353 r = unit_file_disable(arg_scope, arg_runtime, arg_root, mangled_names, &changes, &n_changes);
4354 else if (streq(verb, "reenable")) {
4355 r = unit_file_reenable(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4356 carries_install_info = r;
4357 } else if (streq(verb, "link"))
4358 r = unit_file_link(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4359 else if (streq(verb, "preset")) {
4360 r = unit_file_preset(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4361 carries_install_info = r;
4362 } else if (streq(verb, "mask"))
4363 r = unit_file_mask(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4364 else if (streq(verb, "unmask"))
4365 r = unit_file_unmask(arg_scope, arg_runtime, arg_root, mangled_names, &changes, &n_changes);
4366 else if (streq(verb, "set-default"))
4367 r = unit_file_set_default(arg_scope, arg_root, args[1], &changes, &n_changes);
4369 assert_not_reached("Unknown verb");
4372 log_error("Operation failed: %s", strerror(-r));
4377 for (i = 0; i < n_changes; i++) {
4378 if (changes[i].type == UNIT_FILE_SYMLINK)
4379 log_info("ln -s '%s' '%s'", changes[i].source, changes[i].path);
4381 log_info("rm '%s'", changes[i].path);
4388 bool send_force = true, expect_carries_install_info = false;
4390 DBusMessageIter iter, sub, sub2;
4392 if (streq(verb, "enable")) {
4393 method = "EnableUnitFiles";
4394 expect_carries_install_info = true;
4395 } else if (streq(verb, "disable")) {
4396 method = "DisableUnitFiles";
4398 } else if (streq(verb, "reenable")) {
4399 method = "ReenableUnitFiles";
4400 expect_carries_install_info = true;
4401 } else if (streq(verb, "link"))
4402 method = "LinkUnitFiles";
4403 else if (streq(verb, "preset")) {
4404 method = "PresetUnitFiles";
4405 expect_carries_install_info = true;
4406 } else if (streq(verb, "mask"))
4407 method = "MaskUnitFiles";
4408 else if (streq(verb, "unmask")) {
4409 method = "UnmaskUnitFiles";
4411 } else if (streq(verb, "set-default")) {
4412 method = "SetDefaultTarget";
4414 assert_not_reached("Unknown verb");
4416 m = dbus_message_new_method_call(
4417 "org.freedesktop.systemd1",
4418 "/org/freedesktop/systemd1",
4419 "org.freedesktop.systemd1.Manager",
4426 dbus_message_iter_init_append(m, &iter);
4428 r = bus_append_strv_iter(&iter, mangled_names);
4430 log_error("Failed to append unit files.");
4435 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &a)) {
4436 log_error("Failed to append runtime boolean.");
4444 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b)) {
4445 log_error("Failed to append force boolean.");
4451 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
4453 log_error("Failed to issue method call: %s", bus_error_message(&error));
4458 if (!dbus_message_iter_init(reply, &iter)) {
4459 log_error("Failed to initialize iterator.");
4463 if (expect_carries_install_info) {
4464 r = bus_iter_get_basic_and_next(&iter, DBUS_TYPE_BOOLEAN, &b, true);
4466 log_error("Failed to parse reply.");
4470 carries_install_info = b;
4473 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
4474 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
4475 log_error("Failed to parse reply.");
4480 dbus_message_iter_recurse(&iter, &sub);
4481 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
4482 const char *type, *path, *source;
4484 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
4485 log_error("Failed to parse reply.");
4490 dbus_message_iter_recurse(&sub, &sub2);
4492 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
4493 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0 ||
4494 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &source, false) < 0) {
4495 log_error("Failed to parse reply.");
4501 if (streq(type, "symlink"))
4502 log_info("ln -s '%s' '%s'", source, path);
4504 log_info("rm '%s'", path);
4507 dbus_message_iter_next(&sub);
4510 /* Try to reload if enabeld */
4512 r = daemon_reload(bus, args);
4515 if (carries_install_info == 0)
4516 log_warning("The unit files have no [Install] section. They are not meant to be enabled\n"
4517 "using systemctl.\n"
4518 "Possible reasons for having this kind of units are:\n"
4519 "1) A unit may be statically enabled by being symlinked from another unit's\n"
4520 " .wants/ or .requires/ directory.\n"
4521 "2) A unit's purpose may be to act as a helper for some other unit which has\n"
4522 " a requirement dependency on it.\n"
4523 "3) A unit may be started when needed via activation (socket, path, timer,\n"
4524 " D-Bus, udev, scripted systemctl call, ...).\n");
4527 unit_file_changes_free(changes, n_changes);
4532 static int set_log_level(DBusConnection *bus, char **args) {
4533 _cleanup_dbus_error_free_ DBusError error;
4534 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
4535 DBusMessageIter iter, sub;
4536 const char* property = "LogLevel";
4537 const char* interface = "org.freedesktop.systemd1.Manager";
4544 dbus_error_init(&error);
4546 m = dbus_message_new_method_call("org.freedesktop.systemd1",
4547 "/org/freedesktop/systemd1",
4548 "org.freedesktop.DBus.Properties",
4553 dbus_message_iter_init_append(m, &iter);
4555 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &interface) ||
4556 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &property) ||
4557 !dbus_message_iter_open_container(&iter, DBUS_TYPE_VARIANT, "s", &sub))
4560 if (!dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &value)) {
4561 dbus_message_iter_abandon_container(&iter, &sub);
4565 if (!dbus_message_iter_close_container(&iter, &sub))
4568 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
4570 log_error("Failed to issue method call: %s", bus_error_message(&error));
4577 static int unit_is_enabled(DBusConnection *bus, char **args) {
4578 _cleanup_dbus_error_free_ DBusError error;
4580 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
4585 dbus_error_init(&error);
4587 r = enable_sysv_units(args);
4593 if (!bus || avoid_bus()) {
4595 STRV_FOREACH(name, args+1) {
4596 UnitFileState state;
4598 n = unit_name_mangle(*name);
4602 state = unit_file_get_state(arg_scope, arg_root, n);
4609 if (state == UNIT_FILE_ENABLED ||
4610 state == UNIT_FILE_ENABLED_RUNTIME ||
4611 state == UNIT_FILE_STATIC)
4615 puts(unit_file_state_to_string(state));
4619 STRV_FOREACH(name, args+1) {
4622 n = unit_name_mangle(*name);
4626 r = bus_method_call_with_reply (
4628 "org.freedesktop.systemd1",
4629 "/org/freedesktop/systemd1",
4630 "org.freedesktop.systemd1.Manager",
4634 DBUS_TYPE_STRING, &n,
4642 if (!dbus_message_get_args(reply, &error,
4643 DBUS_TYPE_STRING, &s,
4644 DBUS_TYPE_INVALID)) {
4645 log_error("Failed to parse reply: %s", bus_error_message(&error));
4649 dbus_message_unref(reply);
4652 if (streq(s, "enabled") ||
4653 streq(s, "enabled-runtime") ||
4662 return enabled ? 0 : 1;
4665 static int systemctl_help(void) {
4667 pager_open_if_enabled();
4669 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4670 "Query or send control commands to the systemd manager.\n\n"
4671 " -h --help Show this help\n"
4672 " --version Show package version\n"
4673 " -t --type=TYPE List only units of a particular type\n"
4674 " -p --property=NAME Show only properties by this name\n"
4675 " -a --all Show all loaded units/properties, including dead/empty\n"
4676 " ones. To list all units installed on the system, use\n"
4677 " the 'list-unit-files' command instead.\n"
4678 " --reverse Show reverse dependencies with 'list-dependencies'\n"
4679 " --failed Show only failed units\n"
4680 " -l --full Don't ellipsize unit names on output\n"
4681 " --fail When queueing a new job, fail if conflicting jobs are\n"
4683 " --irreversible Create jobs which cannot be implicitly cancelled\n"
4684 " --show-types When showing sockets, explicitly show their type\n"
4685 " --ignore-dependencies\n"
4686 " When queueing a new job, ignore all its dependencies\n"
4687 " -i --ignore-inhibitors\n"
4688 " When shutting down or sleeping, ignore inhibitors\n"
4689 " --kill-who=WHO Who to send signal to\n"
4690 " -s --signal=SIGNAL Which signal to send\n"
4691 " -H --host=[USER@]HOST\n"
4692 " Show information for remote host\n"
4693 " -P --privileged Acquire privileges before execution\n"
4694 " -q --quiet Suppress output\n"
4695 " --no-block Do not wait until operation finished\n"
4696 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4697 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4699 " --no-legend Do not print a legend (column headers and hints)\n"
4700 " --no-pager Do not pipe output into a pager\n"
4701 " --no-ask-password\n"
4702 " Do not ask for system passwords\n"
4703 " --system Connect to system manager\n"
4704 " --user Connect to user service manager\n"
4705 " --global Enable/disable unit files globally\n"
4706 " -f --force When enabling unit files, override existing symlinks\n"
4707 " When shutting down, execute action immediately\n"
4708 " --root=PATH Enable unit files in the specified root directory\n"
4709 " --runtime Enable unit files only temporarily until next reboot\n"
4710 " -n --lines=INTEGER Journal entries to show\n"
4711 " -o --output=STRING Change journal output mode (short, short-monotonic,\n"
4712 " verbose, export, json, json-pretty, json-sse, cat)\n\n"
4714 " list-units List loaded units\n"
4715 " list-sockets List loaded sockets ordered by address\n"
4716 " start [NAME...] Start (activate) one or more units\n"
4717 " stop [NAME...] Stop (deactivate) one or more units\n"
4718 " reload [NAME...] Reload one or more units\n"
4719 " restart [NAME...] Start or restart one or more units\n"
4720 " try-restart [NAME...] Restart one or more units if active\n"
4721 " reload-or-restart [NAME...] Reload one or more units if possible,\n"
4722 " otherwise start or restart\n"
4723 " reload-or-try-restart [NAME...] Reload one or more units if possible,\n"
4724 " otherwise restart if active\n"
4725 " isolate [NAME] Start one unit and stop all others\n"
4726 " kill [NAME...] Send signal to processes of a unit\n"
4727 " is-active [NAME...] Check whether units are active\n"
4728 " is-failed [NAME...] Check whether units are failed\n"
4729 " status [NAME...|PID...] Show runtime status of one or more units\n"
4730 " show [NAME...|JOB...] Show properties of one or more\n"
4731 " units/jobs or the manager\n"
4732 " set-property [NAME] [ASSIGNMENT...]\n"
4733 " Sets one or more properties of a unit\n"
4734 " help [NAME...|PID...] Show manual for one or more units\n"
4735 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4737 " load [NAME...] Load one or more units\n"
4738 " list-dependencies [NAME] Recursively show units which are required\n"
4739 " or wanted by this unit or by which this\n"
4740 " unit is required or wanted\n\n"
4741 "Unit File Commands:\n"
4742 " list-unit-files List installed unit files\n"
4743 " enable [NAME...] Enable one or more unit files\n"
4744 " disable [NAME...] Disable one or more unit files\n"
4745 " reenable [NAME...] Reenable one or more unit files\n"
4746 " preset [NAME...] Enable/disable one or more unit files\n"
4747 " based on preset configuration\n"
4748 " mask [NAME...] Mask one or more units\n"
4749 " unmask [NAME...] Unmask one or more units\n"
4750 " link [PATH...] Link one or more units files into\n"
4751 " the search path\n"
4752 " get-default Get the name of the default target\n"
4753 " set-default NAME Set the default target\n"
4754 " is-enabled [NAME...] Check whether unit files are enabled\n\n"
4756 " list-jobs List jobs\n"
4757 " cancel [JOB...] Cancel all, one, or more jobs\n\n"
4758 "Status Commands:\n"
4759 " dump Dump server status\n"
4760 "Snapshot Commands:\n"
4761 " snapshot [NAME] Create a snapshot\n"
4762 " delete [NAME...] Remove one or more snapshots\n\n"
4763 "Environment Commands:\n"
4764 " show-environment Dump environment\n"
4765 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4766 " unset-environment [NAME...] Unset one or more environment variables\n"
4767 " set-log-level LEVEL Set logging threshold for systemd\n\n"
4768 "Manager Lifecycle Commands:\n"
4769 " daemon-reload Reload systemd manager configuration\n"
4770 " daemon-reexec Reexecute systemd manager\n\n"
4771 "System Commands:\n"
4772 " default Enter system default mode\n"
4773 " rescue Enter system rescue mode\n"
4774 " emergency Enter system emergency mode\n"
4775 " halt Shut down and halt the system\n"
4776 " poweroff Shut down and power-off the system\n"
4777 " reboot Shut down and reboot the system\n"
4778 " kexec Shut down and reboot the system with kexec\n"
4779 " exit Request user instance exit\n"
4780 " switch-root [ROOT] [INIT] Change to a different root file system\n"
4781 " suspend Suspend the system\n"
4782 " hibernate Hibernate the system\n"
4783 " hybrid-sleep Hibernate and suspend the system\n",
4784 program_invocation_short_name);
4789 static int halt_help(void) {
4791 printf("%s [OPTIONS...]\n\n"
4792 "%s the system.\n\n"
4793 " --help Show this help\n"
4794 " --halt Halt the machine\n"
4795 " -p --poweroff Switch off the machine\n"
4796 " --reboot Reboot the machine\n"
4797 " -f --force Force immediate halt/power-off/reboot\n"
4798 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4799 " -d --no-wtmp Don't write wtmp record\n"
4800 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4801 program_invocation_short_name,
4802 arg_action == ACTION_REBOOT ? "Reboot" :
4803 arg_action == ACTION_POWEROFF ? "Power off" :
4809 static int shutdown_help(void) {
4811 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4812 "Shut down the system.\n\n"
4813 " --help Show this help\n"
4814 " -H --halt Halt the machine\n"
4815 " -P --poweroff Power-off the machine\n"
4816 " -r --reboot Reboot the machine\n"
4817 " -h Equivalent to --poweroff, overridden by --halt\n"
4818 " -k Don't halt/power-off/reboot, just send warnings\n"
4819 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4820 " -c Cancel a pending shutdown\n",
4821 program_invocation_short_name);
4826 static int telinit_help(void) {
4828 printf("%s [OPTIONS...] {COMMAND}\n\n"
4829 "Send control commands to the init daemon.\n\n"
4830 " --help Show this help\n"
4831 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4833 " 0 Power-off the machine\n"
4834 " 6 Reboot the machine\n"
4835 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4836 " 1, s, S Enter rescue mode\n"
4837 " q, Q Reload init daemon configuration\n"
4838 " u, U Reexecute init daemon\n",
4839 program_invocation_short_name);
4844 static int runlevel_help(void) {
4846 printf("%s [OPTIONS...]\n\n"
4847 "Prints the previous and current runlevel of the init system.\n\n"
4848 " --help Show this help\n",
4849 program_invocation_short_name);
4854 static int help_types(void) {
4858 puts("Available unit types:");
4859 for(i = 0; i < _UNIT_TYPE_MAX; i++) {
4860 t = unit_type_to_string(i);
4865 puts("\nAvailable unit load states: ");
4866 for(i = 0; i < _UNIT_LOAD_STATE_MAX; i++) {
4867 t = unit_load_state_to_string(i);
4875 static int systemctl_parse_argv(int argc, char *argv[]) {
4884 ARG_IGNORE_DEPENDENCIES,
4896 ARG_NO_ASK_PASSWORD,
4903 static const struct option options[] = {
4904 { "help", no_argument, NULL, 'h' },
4905 { "version", no_argument, NULL, ARG_VERSION },
4906 { "type", required_argument, NULL, 't' },
4907 { "property", required_argument, NULL, 'p' },
4908 { "all", no_argument, NULL, 'a' },
4909 { "reverse", no_argument, NULL, ARG_REVERSE },
4910 { "after", no_argument, NULL, ARG_AFTER },
4911 { "before", no_argument, NULL, ARG_BEFORE },
4912 { "show-types", no_argument, NULL, ARG_SHOW_TYPES },
4913 { "failed", no_argument, NULL, ARG_FAILED },
4914 { "full", no_argument, NULL, 'l' },
4915 { "fail", no_argument, NULL, ARG_FAIL },
4916 { "irreversible", no_argument, NULL, ARG_IRREVERSIBLE },
4917 { "ignore-dependencies", no_argument, NULL, ARG_IGNORE_DEPENDENCIES },
4918 { "ignore-inhibitors", no_argument, NULL, 'i' },
4919 { "user", no_argument, NULL, ARG_USER },
4920 { "system", no_argument, NULL, ARG_SYSTEM },
4921 { "global", no_argument, NULL, ARG_GLOBAL },
4922 { "no-block", no_argument, NULL, ARG_NO_BLOCK },
4923 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
4924 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
4925 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4926 { "quiet", no_argument, NULL, 'q' },
4927 { "root", required_argument, NULL, ARG_ROOT },
4928 { "force", no_argument, NULL, ARG_FORCE },
4929 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
4930 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
4931 { "signal", required_argument, NULL, 's' },
4932 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
4933 { "host", required_argument, NULL, 'H' },
4934 { "privileged",no_argument, NULL, 'P' },
4935 { "runtime", no_argument, NULL, ARG_RUNTIME },
4936 { "lines", required_argument, NULL, 'n' },
4937 { "output", required_argument, NULL, 'o' },
4938 { "plain", no_argument, NULL, ARG_PLAIN },
4939 { NULL, 0, NULL, 0 }
4947 while ((c = getopt_long(argc, argv, "ht:p:alqfs:H:Pn:o:i", options, NULL)) >= 0) {
4956 puts(PACKAGE_STRING);
4957 puts(SYSTEMD_FEATURES);
4964 FOREACH_WORD_SEPARATOR(word, size, optarg, ",", state) {
4965 _cleanup_free_ char *type;
4967 type = strndup(word, size);
4971 if (streq(type, "help")) {
4976 if (unit_type_from_string(type) >= 0) {
4977 if (strv_push(&arg_types, type))
4983 if (unit_load_state_from_string(optarg) >= 0) {
4984 if (strv_push(&arg_load_states, type))
4990 log_error("Unknown unit type or load state '%s'.", type);
4991 log_info("Use -t help to see a list of allowed values.");
4999 /* Make sure that if the empty property list
5000 was specified, we won't show any properties. */
5001 if (isempty(optarg) && !arg_properties) {
5002 arg_properties = strv_new(NULL, NULL);
5003 if (!arg_properties)
5009 FOREACH_WORD_SEPARATOR(word, size, optarg, ",", state) {
5012 prop = strndup(word, size);
5016 if (strv_push(&arg_properties, prop)) {
5023 /* If the user asked for a particular
5024 * property, show it to him, even if it is
5036 arg_dependency = DEPENDENCY_REVERSE;
5040 arg_dependency = DEPENDENCY_AFTER;
5044 arg_dependency = DEPENDENCY_BEFORE;
5047 case ARG_SHOW_TYPES:
5048 arg_show_types = true;
5052 arg_job_mode = "fail";
5055 case ARG_IRREVERSIBLE:
5056 arg_job_mode = "replace-irreversibly";
5059 case ARG_IGNORE_DEPENDENCIES:
5060 arg_job_mode = "ignore-dependencies";
5064 arg_scope = UNIT_FILE_USER;
5068 arg_scope = UNIT_FILE_SYSTEM;
5072 arg_scope = UNIT_FILE_GLOBAL;
5076 arg_no_block = true;
5080 arg_no_legend = true;
5084 arg_no_pager = true;
5116 arg_no_reload = true;
5120 arg_kill_who = optarg;
5124 if ((arg_signal = signal_from_string_try_harder(optarg)) < 0) {
5125 log_error("Failed to parse signal string %s.", optarg);
5130 case ARG_NO_ASK_PASSWORD:
5131 arg_ask_password = false;
5135 arg_transport = TRANSPORT_POLKIT;
5139 arg_transport = TRANSPORT_SSH;
5140 parse_user_at_host(optarg, &arg_user, &arg_host);
5148 if (safe_atou(optarg, &arg_lines) < 0) {
5149 log_error("Failed to parse lines '%s'", optarg);
5155 arg_output = output_mode_from_string(optarg);
5156 if (arg_output < 0) {
5157 log_error("Unknown output '%s'.", optarg);
5163 arg_ignore_inhibitors = true;
5174 log_error("Unknown option code '%c'.", c);
5179 if (arg_transport != TRANSPORT_NORMAL && arg_scope != UNIT_FILE_SYSTEM) {
5180 log_error("Cannot access user instance remotely.");
5187 static int halt_parse_argv(int argc, char *argv[]) {
5196 static const struct option options[] = {
5197 { "help", no_argument, NULL, ARG_HELP },
5198 { "halt", no_argument, NULL, ARG_HALT },
5199 { "poweroff", no_argument, NULL, 'p' },
5200 { "reboot", no_argument, NULL, ARG_REBOOT },
5201 { "force", no_argument, NULL, 'f' },
5202 { "wtmp-only", no_argument, NULL, 'w' },
5203 { "no-wtmp", no_argument, NULL, 'd' },
5204 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5205 { NULL, 0, NULL, 0 }
5213 if (utmp_get_runlevel(&runlevel, NULL) >= 0)
5214 if (runlevel == '0' || runlevel == '6')
5217 while ((c = getopt_long(argc, argv, "pfwdnih", options, NULL)) >= 0) {
5225 arg_action = ACTION_HALT;
5229 if (arg_action != ACTION_REBOOT)
5230 arg_action = ACTION_POWEROFF;
5234 arg_action = ACTION_REBOOT;
5256 /* Compatibility nops */
5263 log_error("Unknown option code '%c'.", c);
5268 if (optind < argc) {
5269 log_error("Too many arguments.");
5276 static int parse_time_spec(const char *t, usec_t *_u) {
5280 if (streq(t, "now"))
5282 else if (!strchr(t, ':')) {
5285 if (safe_atou64(t, &u) < 0)
5288 *_u = now(CLOCK_REALTIME) + USEC_PER_MINUTE * u;
5297 hour = strtol(t, &e, 10);
5298 if (errno > 0 || *e != ':' || hour < 0 || hour > 23)
5301 minute = strtol(e+1, &e, 10);
5302 if (errno > 0 || *e != 0 || minute < 0 || minute > 59)
5305 n = now(CLOCK_REALTIME);
5306 s = (time_t) (n / USEC_PER_SEC);
5308 assert_se(localtime_r(&s, &tm));
5310 tm.tm_hour = (int) hour;
5311 tm.tm_min = (int) minute;
5314 assert_se(s = mktime(&tm));
5316 *_u = (usec_t) s * USEC_PER_SEC;
5319 *_u += USEC_PER_DAY;
5325 static int shutdown_parse_argv(int argc, char *argv[]) {
5332 static const struct option options[] = {
5333 { "help", no_argument, NULL, ARG_HELP },
5334 { "halt", no_argument, NULL, 'H' },
5335 { "poweroff", no_argument, NULL, 'P' },
5336 { "reboot", no_argument, NULL, 'r' },
5337 { "kexec", no_argument, NULL, 'K' }, /* not documented extension */
5338 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5339 { NULL, 0, NULL, 0 }
5347 while ((c = getopt_long(argc, argv, "HPrhkt:afFc", options, NULL)) >= 0) {
5355 arg_action = ACTION_HALT;
5359 arg_action = ACTION_POWEROFF;
5364 arg_action = ACTION_KEXEC;
5366 arg_action = ACTION_REBOOT;
5370 arg_action = ACTION_KEXEC;
5374 if (arg_action != ACTION_HALT)
5375 arg_action = ACTION_POWEROFF;
5388 /* Compatibility nops */
5392 arg_action = ACTION_CANCEL_SHUTDOWN;
5399 log_error("Unknown option code '%c'.", c);
5404 if (argc > optind && arg_action != ACTION_CANCEL_SHUTDOWN) {
5405 r = parse_time_spec(argv[optind], &arg_when);
5407 log_error("Failed to parse time specification: %s", argv[optind]);
5411 arg_when = now(CLOCK_REALTIME) + USEC_PER_MINUTE;
5413 if (argc > optind && arg_action == ACTION_CANCEL_SHUTDOWN)
5414 /* No time argument for shutdown cancel */
5415 arg_wall = argv + optind;
5416 else if (argc > optind + 1)
5417 /* We skip the time argument */
5418 arg_wall = argv + optind + 1;
5425 static int telinit_parse_argv(int argc, char *argv[]) {
5432 static const struct option options[] = {
5433 { "help", no_argument, NULL, ARG_HELP },
5434 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5435 { NULL, 0, NULL, 0 }
5438 static const struct {
5442 { '0', ACTION_POWEROFF },
5443 { '6', ACTION_REBOOT },
5444 { '1', ACTION_RESCUE },
5445 { '2', ACTION_RUNLEVEL2 },
5446 { '3', ACTION_RUNLEVEL3 },
5447 { '4', ACTION_RUNLEVEL4 },
5448 { '5', ACTION_RUNLEVEL5 },
5449 { 's', ACTION_RESCUE },
5450 { 'S', ACTION_RESCUE },
5451 { 'q', ACTION_RELOAD },
5452 { 'Q', ACTION_RELOAD },
5453 { 'u', ACTION_REEXEC },
5454 { 'U', ACTION_REEXEC }
5463 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5478 log_error("Unknown option code '%c'.", c);
5483 if (optind >= argc) {
5488 if (optind + 1 < argc) {
5489 log_error("Too many arguments.");
5493 if (strlen(argv[optind]) != 1) {
5494 log_error("Expected single character argument.");
5498 for (i = 0; i < ELEMENTSOF(table); i++)
5499 if (table[i].from == argv[optind][0])
5502 if (i >= ELEMENTSOF(table)) {
5503 log_error("Unknown command '%s'.", argv[optind]);
5507 arg_action = table[i].to;
5514 static int runlevel_parse_argv(int argc, char *argv[]) {
5520 static const struct option options[] = {
5521 { "help", no_argument, NULL, ARG_HELP },
5522 { NULL, 0, NULL, 0 }
5530 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5541 log_error("Unknown option code '%c'.", c);
5546 if (optind < argc) {
5547 log_error("Too many arguments.");
5554 static int parse_argv(int argc, char *argv[]) {
5558 if (program_invocation_short_name) {
5560 if (strstr(program_invocation_short_name, "halt")) {
5561 arg_action = ACTION_HALT;
5562 return halt_parse_argv(argc, argv);
5563 } else if (strstr(program_invocation_short_name, "poweroff")) {
5564 arg_action = ACTION_POWEROFF;
5565 return halt_parse_argv(argc, argv);
5566 } else if (strstr(program_invocation_short_name, "reboot")) {
5568 arg_action = ACTION_KEXEC;
5570 arg_action = ACTION_REBOOT;
5571 return halt_parse_argv(argc, argv);
5572 } else if (strstr(program_invocation_short_name, "shutdown")) {
5573 arg_action = ACTION_POWEROFF;
5574 return shutdown_parse_argv(argc, argv);
5575 } else if (strstr(program_invocation_short_name, "init")) {
5577 if (sd_booted() > 0) {
5578 arg_action = ACTION_INVALID;
5579 return telinit_parse_argv(argc, argv);
5581 /* Hmm, so some other init system is
5582 * running, we need to forward this
5583 * request to it. For now we simply
5584 * guess that it is Upstart. */
5586 execv(TELINIT, argv);
5588 log_error("Couldn't find an alternative telinit implementation to spawn.");
5592 } else if (strstr(program_invocation_short_name, "runlevel")) {
5593 arg_action = ACTION_RUNLEVEL;
5594 return runlevel_parse_argv(argc, argv);
5598 arg_action = ACTION_SYSTEMCTL;
5599 return systemctl_parse_argv(argc, argv);
5602 _pure_ static int action_to_runlevel(void) {
5604 static const char table[_ACTION_MAX] = {
5605 [ACTION_HALT] = '0',
5606 [ACTION_POWEROFF] = '0',
5607 [ACTION_REBOOT] = '6',
5608 [ACTION_RUNLEVEL2] = '2',
5609 [ACTION_RUNLEVEL3] = '3',
5610 [ACTION_RUNLEVEL4] = '4',
5611 [ACTION_RUNLEVEL5] = '5',
5612 [ACTION_RESCUE] = '1'
5615 assert(arg_action < _ACTION_MAX);
5617 return table[arg_action];
5620 static int talk_upstart(void) {
5621 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
5622 _cleanup_dbus_error_free_ DBusError error;
5623 int previous, rl, r;
5625 env1_buf[] = "RUNLEVEL=X",
5626 env2_buf[] = "PREVLEVEL=X";
5627 char *env1 = env1_buf, *env2 = env2_buf;
5628 const char *emit = "runlevel";
5629 dbus_bool_t b_false = FALSE;
5630 DBusMessageIter iter, sub;
5631 DBusConnection *bus;
5633 dbus_error_init(&error);
5635 if (!(rl = action_to_runlevel()))
5638 if (utmp_get_runlevel(&previous, NULL) < 0)
5641 if (!(bus = dbus_connection_open_private("unix:abstract=/com/ubuntu/upstart", &error))) {
5642 if (dbus_error_has_name(&error, DBUS_ERROR_NO_SERVER)) {
5647 log_error("Failed to connect to Upstart bus: %s", bus_error_message(&error));
5652 if ((r = bus_check_peercred(bus)) < 0) {
5653 log_error("Failed to verify owner of bus.");
5657 if (!(m = dbus_message_new_method_call(
5658 "com.ubuntu.Upstart",
5659 "/com/ubuntu/Upstart",
5660 "com.ubuntu.Upstart0_6",
5663 log_error("Could not allocate message.");
5668 dbus_message_iter_init_append(m, &iter);
5670 env1_buf[sizeof(env1_buf)-2] = rl;
5671 env2_buf[sizeof(env2_buf)-2] = previous;
5673 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &emit) ||
5674 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub) ||
5675 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env1) ||
5676 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env2) ||
5677 !dbus_message_iter_close_container(&iter, &sub) ||
5678 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b_false)) {
5679 log_error("Could not append arguments to message.");
5684 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
5686 if (bus_error_is_no_service(&error)) {
5691 log_error("Failed to issue method call: %s", bus_error_message(&error));
5700 dbus_connection_flush(bus);
5701 dbus_connection_close(bus);
5702 dbus_connection_unref(bus);
5708 static int talk_initctl(void) {
5709 struct init_request request = {};
5711 _cleanup_close_ int fd = -1;
5714 rl = action_to_runlevel();
5718 request.magic = INIT_MAGIC;
5719 request.sleeptime = 0;
5720 request.cmd = INIT_CMD_RUNLVL;
5721 request.runlevel = rl;
5723 fd = open(INIT_FIFO, O_WRONLY|O_NDELAY|O_CLOEXEC|O_NOCTTY);
5725 if (errno == ENOENT)
5728 log_error("Failed to open "INIT_FIFO": %m");
5733 r = loop_write(fd, &request, sizeof(request), false) != sizeof(request);
5735 log_error("Failed to write to "INIT_FIFO": %m");
5736 return errno > 0 ? -errno : -EIO;
5742 static int systemctl_main(DBusConnection *bus, int argc, char *argv[], DBusError *error) {
5744 static const struct {
5752 int (* const dispatch)(DBusConnection *bus, char **args);
5754 { "list-units", LESS, 1, list_units },
5755 { "list-unit-files", EQUAL, 1, list_unit_files },
5756 { "list-sockets", LESS, 1, list_sockets },
5757 { "list-jobs", EQUAL, 1, list_jobs },
5758 { "clear-jobs", EQUAL, 1, daemon_reload },
5759 { "load", MORE, 2, load_unit },
5760 { "cancel", MORE, 2, cancel_job },
5761 { "start", MORE, 2, start_unit },
5762 { "stop", MORE, 2, start_unit },
5763 { "condstop", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5764 { "reload", MORE, 2, start_unit },
5765 { "restart", MORE, 2, start_unit },
5766 { "try-restart", MORE, 2, start_unit },
5767 { "reload-or-restart", MORE, 2, start_unit },
5768 { "reload-or-try-restart", MORE, 2, start_unit },
5769 { "force-reload", MORE, 2, start_unit }, /* For compatibility with SysV */
5770 { "condreload", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5771 { "condrestart", MORE, 2, start_unit }, /* For compatibility with RH */
5772 { "isolate", EQUAL, 2, start_unit },
5773 { "kill", MORE, 2, kill_unit },
5774 { "is-active", MORE, 2, check_unit_active },
5775 { "check", MORE, 2, check_unit_active },
5776 { "is-failed", MORE, 2, check_unit_failed },
5777 { "show", MORE, 1, show },
5778 { "status", MORE, 1, show },
5779 { "help", MORE, 2, show },
5780 { "dump", EQUAL, 1, dump },
5781 { "snapshot", LESS, 2, snapshot },
5782 { "delete", MORE, 2, delete_snapshot },
5783 { "daemon-reload", EQUAL, 1, daemon_reload },
5784 { "daemon-reexec", EQUAL, 1, daemon_reload },
5785 { "show-environment", EQUAL, 1, show_enviroment },
5786 { "set-environment", MORE, 2, set_environment },
5787 { "unset-environment", MORE, 2, set_environment },
5788 { "halt", EQUAL, 1, start_special },
5789 { "poweroff", EQUAL, 1, start_special },
5790 { "reboot", EQUAL, 1, start_special },
5791 { "kexec", EQUAL, 1, start_special },
5792 { "suspend", EQUAL, 1, start_special },
5793 { "hibernate", EQUAL, 1, start_special },
5794 { "hybrid-sleep", EQUAL, 1, start_special },
5795 { "default", EQUAL, 1, start_special },
5796 { "rescue", EQUAL, 1, start_special },
5797 { "emergency", EQUAL, 1, start_special },
5798 { "exit", EQUAL, 1, start_special },
5799 { "reset-failed", MORE, 1, reset_failed },
5800 { "enable", MORE, 2, enable_unit },
5801 { "disable", MORE, 2, enable_unit },
5802 { "is-enabled", MORE, 2, unit_is_enabled },
5803 { "reenable", MORE, 2, enable_unit },
5804 { "preset", MORE, 2, enable_unit },
5805 { "mask", MORE, 2, enable_unit },
5806 { "unmask", MORE, 2, enable_unit },
5807 { "link", MORE, 2, enable_unit },
5808 { "switch-root", MORE, 2, switch_root },
5809 { "list-dependencies", LESS, 2, list_dependencies },
5810 { "set-default", EQUAL, 2, enable_unit },
5811 { "get-default", LESS, 1, get_default },
5812 { "set-log-level", EQUAL, 2, set_log_level },
5813 { "set-property", MORE, 3, set_property },
5823 left = argc - optind;
5826 /* Special rule: no arguments means "list-units" */
5829 if (streq(argv[optind], "help") && !argv[optind+1]) {
5830 log_error("This command expects one or more "
5831 "unit names. Did you mean --help?");
5835 for (i = 0; i < ELEMENTSOF(verbs); i++)
5836 if (streq(argv[optind], verbs[i].verb))
5839 if (i >= ELEMENTSOF(verbs)) {
5840 log_error("Unknown operation '%s'.", argv[optind]);
5845 switch (verbs[i].argc_cmp) {
5848 if (left != verbs[i].argc) {
5849 log_error("Invalid number of arguments.");
5856 if (left < verbs[i].argc) {
5857 log_error("Too few arguments.");
5864 if (left > verbs[i].argc) {
5865 log_error("Too many arguments.");
5872 assert_not_reached("Unknown comparison operator.");
5875 /* Require a bus connection for all operations but
5877 if (!streq(verbs[i].verb, "enable") &&
5878 !streq(verbs[i].verb, "disable") &&
5879 !streq(verbs[i].verb, "is-enabled") &&
5880 !streq(verbs[i].verb, "list-unit-files") &&
5881 !streq(verbs[i].verb, "reenable") &&
5882 !streq(verbs[i].verb, "preset") &&
5883 !streq(verbs[i].verb, "mask") &&
5884 !streq(verbs[i].verb, "unmask") &&
5885 !streq(verbs[i].verb, "link") &&
5886 !streq(verbs[i].verb, "set-default") &&
5887 !streq(verbs[i].verb, "get-default")) {
5889 if (running_in_chroot() > 0) {
5890 log_info("Running in chroot, ignoring request.");
5894 if (((!streq(verbs[i].verb, "reboot") &&
5895 !streq(verbs[i].verb, "halt") &&
5896 !streq(verbs[i].verb, "poweroff")) || arg_force <= 0) && !bus) {
5897 log_error("Failed to get D-Bus connection: %s",
5898 dbus_error_is_set(error) ? error->message : "No connection to service manager.");
5904 if (!bus && !avoid_bus()) {
5905 log_error("Failed to get D-Bus connection: %s",
5906 dbus_error_is_set(error) ? error->message : "No connection to service manager.");
5911 return verbs[i].dispatch(bus, argv + optind);
5914 static int send_shutdownd(usec_t t, char mode, bool dry_run, bool warn, const char *message) {
5915 _cleanup_close_ int fd;
5916 struct sd_shutdown_command c = {
5922 union sockaddr_union sockaddr = {
5923 .un.sun_family = AF_UNIX,
5924 .un.sun_path = "/run/systemd/shutdownd",
5926 struct iovec iovec[2] = {
5927 {.iov_base = (char*) &c,
5928 .iov_len = offsetof(struct sd_shutdown_command, wall_message),
5931 struct msghdr msghdr = {
5932 .msg_name = &sockaddr,
5933 .msg_namelen = offsetof(struct sockaddr_un, sun_path)
5934 + sizeof("/run/systemd/shutdownd") - 1,
5939 fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0);
5943 if (!isempty(message)) {
5944 iovec[1].iov_base = (char*) message;
5945 iovec[1].iov_len = strlen(message);
5946 msghdr.msg_iovlen++;
5949 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0)
5955 static int reload_with_fallback(DBusConnection *bus) {
5958 /* First, try systemd via D-Bus. */
5959 if (daemon_reload(bus, NULL) >= 0)
5963 /* Nothing else worked, so let's try signals */
5964 assert(arg_action == ACTION_RELOAD || arg_action == ACTION_REEXEC);
5966 if (kill(1, arg_action == ACTION_RELOAD ? SIGHUP : SIGTERM) < 0) {
5967 log_error("kill() failed: %m");
5974 static int start_with_fallback(DBusConnection *bus) {
5977 /* First, try systemd via D-Bus. */
5978 if (start_unit(bus, NULL) >= 0)
5982 /* Hmm, talking to systemd via D-Bus didn't work. Then
5983 * let's try to talk to Upstart via D-Bus. */
5984 if (talk_upstart() > 0)
5987 /* Nothing else worked, so let's try
5989 if (talk_initctl() > 0)
5992 log_error("Failed to talk to init daemon.");
5996 warn_wall(arg_action);
6000 static _noreturn_ void halt_now(enum action a) {
6002 /* Make sure C-A-D is handled by the kernel from this
6004 reboot(RB_ENABLE_CAD);
6009 log_info("Halting.");
6010 reboot(RB_HALT_SYSTEM);
6013 case ACTION_POWEROFF:
6014 log_info("Powering off.");
6015 reboot(RB_POWER_OFF);
6019 log_info("Rebooting.");
6020 reboot(RB_AUTOBOOT);
6024 assert_not_reached("Unknown halt action.");
6027 assert_not_reached("Uh? This shouldn't happen.");
6030 static int halt_main(DBusConnection *bus) {
6033 r = check_inhibitors(bus, arg_action);
6037 if (geteuid() != 0) {
6038 /* Try logind if we are a normal user and no special
6039 * mode applies. Maybe PolicyKit allows us to shutdown
6042 if (arg_when <= 0 &&
6045 (arg_action == ACTION_POWEROFF ||
6046 arg_action == ACTION_REBOOT)) {
6047 r = reboot_with_logind(bus, arg_action);
6052 log_error("Must be root.");
6057 _cleanup_free_ char *m;
6059 m = strv_join(arg_wall, " ");
6060 r = send_shutdownd(arg_when,
6061 arg_action == ACTION_HALT ? 'H' :
6062 arg_action == ACTION_POWEROFF ? 'P' :
6063 arg_action == ACTION_KEXEC ? 'K' :
6070 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r));
6072 char date[FORMAT_TIMESTAMP_MAX];
6074 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
6075 format_timestamp(date, sizeof(date), arg_when));
6080 if (!arg_dry && !arg_force)
6081 return start_with_fallback(bus);
6084 if (sd_booted() > 0)
6085 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
6087 r = utmp_put_shutdown();
6089 log_warning("Failed to write utmp record: %s", strerror(-r));
6096 halt_now(arg_action);
6097 /* We should never reach this. */
6101 static int runlevel_main(void) {
6102 int r, runlevel, previous;
6104 r = utmp_get_runlevel(&runlevel, &previous);
6111 previous <= 0 ? 'N' : previous,
6112 runlevel <= 0 ? 'N' : runlevel);
6117 int main(int argc, char*argv[]) {
6118 int r, retval = EXIT_FAILURE;
6119 DBusConnection *bus = NULL;
6120 _cleanup_dbus_error_free_ DBusError error;
6122 dbus_error_init(&error);
6124 setlocale(LC_ALL, "");
6125 log_parse_environment();
6128 r = parse_argv(argc, argv);
6132 retval = EXIT_SUCCESS;
6136 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
6137 * let's shortcut this */
6138 if (arg_action == ACTION_RUNLEVEL) {
6139 r = runlevel_main();
6140 retval = r < 0 ? EXIT_FAILURE : r;
6144 if (running_in_chroot() > 0 && arg_action != ACTION_SYSTEMCTL) {
6145 log_info("Running in chroot, ignoring request.");
6151 if (arg_transport == TRANSPORT_NORMAL)
6152 bus_connect(arg_scope == UNIT_FILE_SYSTEM ? DBUS_BUS_SYSTEM : DBUS_BUS_SESSION, &bus, &private_bus, &error);
6153 else if (arg_transport == TRANSPORT_POLKIT) {
6154 bus_connect_system_polkit(&bus, &error);
6155 private_bus = false;
6156 } else if (arg_transport == TRANSPORT_SSH) {
6157 bus_connect_system_ssh(arg_user, arg_host, &bus, &error);
6158 private_bus = false;
6160 assert_not_reached("Uh, invalid transport...");
6163 switch (arg_action) {
6165 case ACTION_SYSTEMCTL:
6166 r = systemctl_main(bus, argc, argv, &error);
6170 case ACTION_POWEROFF:
6176 case ACTION_RUNLEVEL2:
6177 case ACTION_RUNLEVEL3:
6178 case ACTION_RUNLEVEL4:
6179 case ACTION_RUNLEVEL5:
6181 case ACTION_EMERGENCY:
6182 case ACTION_DEFAULT:
6183 r = start_with_fallback(bus);
6188 r = reload_with_fallback(bus);
6191 case ACTION_CANCEL_SHUTDOWN: {
6195 m = strv_join(arg_wall, " ");
6197 retval = EXIT_FAILURE;
6201 r = send_shutdownd(arg_when, SD_SHUTDOWN_NONE, false, !arg_no_wall, m);
6203 log_warning("Failed to talk to shutdownd, shutdown hasn't been cancelled: %s", strerror(-r));
6208 case ACTION_INVALID:
6209 case ACTION_RUNLEVEL:
6211 assert_not_reached("Unknown action");
6214 retval = r < 0 ? EXIT_FAILURE : r;
6218 dbus_connection_flush(bus);
6219 dbus_connection_close(bus);
6220 dbus_connection_unref(bus);
6225 strv_free(arg_types);
6226 strv_free(arg_load_states);
6227 strv_free(arg_properties);
6230 ask_password_agent_close();
6231 polkit_agent_close();