1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/reboot.h>
29 #include <sys/ioctl.h>
33 #include <sys/socket.h>
36 #include <sys/prctl.h>
37 #include <dbus/dbus.h>
39 #include <systemd/sd-daemon.h>
40 #include <systemd/sd-shutdown.h>
41 #include <systemd/sd-login.h>
47 #include "utmp-wtmp.h"
50 #include "path-util.h"
52 #include "dbus-common.h"
53 #include "cgroup-show.h"
54 #include "cgroup-util.h"
56 #include "path-lookup.h"
57 #include "conf-parser.h"
58 #include "exit-status.h"
59 #include "bus-errors.h"
61 #include "unit-name.h"
63 #include "spawn-ask-password-agent.h"
64 #include "spawn-polkit-agent.h"
66 #include "logs-show.h"
67 #include "path-util.h"
68 #include "socket-util.h"
71 static char **arg_types = NULL;
72 static char **arg_load_states = NULL;
73 static char **arg_properties = NULL;
74 static bool arg_all = false;
75 static enum dependency {
80 } arg_dependency = DEPENDENCY_FORWARD;
81 static const char *arg_job_mode = "replace";
82 static UnitFileScope arg_scope = UNIT_FILE_SYSTEM;
83 static bool arg_no_block = false;
84 static bool arg_no_legend = false;
85 static bool arg_no_pager = false;
86 static bool arg_no_wtmp = false;
87 static bool arg_no_wall = false;
88 static bool arg_no_reload = false;
89 static bool arg_show_types = false;
90 static bool arg_ignore_inhibitors = false;
91 static bool arg_dry = false;
92 static bool arg_quiet = false;
93 static bool arg_full = false;
94 static int arg_force = 0;
95 static bool arg_ask_password = true;
96 static bool arg_failed = false;
97 static bool arg_runtime = false;
98 static char **arg_wall = NULL;
99 static const char *arg_kill_who = NULL;
100 static int arg_signal = SIGTERM;
101 static const char *arg_root = NULL;
102 static usec_t arg_when = 0;
124 ACTION_CANCEL_SHUTDOWN,
126 } arg_action = ACTION_SYSTEMCTL;
127 static enum transport {
131 } arg_transport = TRANSPORT_NORMAL;
132 static char *arg_host = NULL;
133 static char *arg_user = NULL;
134 static unsigned arg_lines = 10;
135 static OutputMode arg_output = OUTPUT_SHORT;
136 static bool arg_plain = false;
138 static bool private_bus = false;
140 static int daemon_reload(DBusConnection *bus, char **args);
141 static void halt_now(enum action a);
143 static void pager_open_if_enabled(void) {
151 static void ask_password_agent_open_if_enabled(void) {
153 /* Open the password agent as a child process if necessary */
155 if (!arg_ask_password)
158 if (arg_scope != UNIT_FILE_SYSTEM)
161 ask_password_agent_open();
165 static void polkit_agent_open_if_enabled(void) {
167 /* Open the polkit agent as a child process if necessary */
169 if (!arg_ask_password)
172 if (arg_scope != UNIT_FILE_SYSTEM)
179 static const char *ansi_highlight(bool b) {
184 return b ? ANSI_HIGHLIGHT_ON : ANSI_HIGHLIGHT_OFF;
187 static const char *ansi_highlight_red(bool b) {
192 return b ? ANSI_HIGHLIGHT_RED_ON : ANSI_HIGHLIGHT_OFF;
195 static const char *ansi_highlight_green(bool b) {
200 return b ? ANSI_HIGHLIGHT_GREEN_ON : ANSI_HIGHLIGHT_OFF;
203 static int translate_bus_error_to_exit_status(int r, const DBusError *error) {
206 if (!dbus_error_is_set(error))
209 if (dbus_error_has_name(error, DBUS_ERROR_ACCESS_DENIED) ||
210 dbus_error_has_name(error, BUS_ERROR_ONLY_BY_DEPENDENCY) ||
211 dbus_error_has_name(error, BUS_ERROR_NO_ISOLATION) ||
212 dbus_error_has_name(error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE))
213 return EXIT_NOPERMISSION;
215 if (dbus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT))
216 return EXIT_NOTINSTALLED;
218 if (dbus_error_has_name(error, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE) ||
219 dbus_error_has_name(error, BUS_ERROR_NOT_SUPPORTED))
220 return EXIT_NOTIMPLEMENTED;
222 if (dbus_error_has_name(error, BUS_ERROR_LOAD_FAILED))
223 return EXIT_NOTCONFIGURED;
231 static void warn_wall(enum action a) {
232 static const char *table[_ACTION_MAX] = {
233 [ACTION_HALT] = "The system is going down for system halt NOW!",
234 [ACTION_REBOOT] = "The system is going down for reboot NOW!",
235 [ACTION_POWEROFF] = "The system is going down for power-off NOW!",
236 [ACTION_KEXEC] = "The system is going down for kexec reboot NOW!",
237 [ACTION_RESCUE] = "The system is going down to rescue mode NOW!",
238 [ACTION_EMERGENCY] = "The system is going down to emergency mode NOW!",
239 [ACTION_CANCEL_SHUTDOWN] = "The system shutdown has been cancelled NOW!"
246 _cleanup_free_ char *p;
248 p = strv_join(arg_wall, " ");
263 utmp_wall(table[a], NULL);
266 static bool avoid_bus(void) {
268 if (running_in_chroot() > 0)
271 if (sd_booted() <= 0)
274 if (!isempty(arg_root))
277 if (arg_scope == UNIT_FILE_GLOBAL)
283 static int compare_unit_info(const void *a, const void *b) {
285 const struct unit_info *u = a, *v = b;
287 d1 = strrchr(u->id, '.');
288 d2 = strrchr(v->id, '.');
293 r = strcasecmp(d1, d2);
298 return strcasecmp(u->id, v->id);
301 static bool output_show_unit(const struct unit_info *u) {
305 return streq(u->active_state, "failed");
307 return (!arg_types || ((dot = strrchr(u->id, '.')) &&
308 strv_find(arg_types, dot+1))) &&
309 (!arg_load_states || strv_find(arg_load_states, u->load_state)) &&
310 (arg_all || !(streq(u->active_state, "inactive")
311 || u->following[0]) || u->job_id > 0);
314 static void output_units_list(const struct unit_info *unit_infos, unsigned c) {
315 unsigned id_len, max_id_len, active_len, sub_len, job_len, desc_len, n_shown = 0;
316 const struct unit_info *u;
319 max_id_len = sizeof("UNIT")-1;
320 active_len = sizeof("ACTIVE")-1;
321 sub_len = sizeof("SUB")-1;
322 job_len = sizeof("JOB")-1;
325 for (u = unit_infos; u < unit_infos + c; u++) {
326 if (!output_show_unit(u))
329 max_id_len = MAX(max_id_len, strlen(u->id));
330 active_len = MAX(active_len, strlen(u->active_state));
331 sub_len = MAX(sub_len, strlen(u->sub_state));
332 if (u->job_id != 0) {
333 job_len = MAX(job_len, strlen(u->job_type));
340 id_len = MIN(max_id_len, 25u);
341 basic_len = 5 + id_len + 5 + active_len + sub_len;
343 basic_len += job_len + 1;
344 if (basic_len < (unsigned) columns()) {
345 unsigned extra_len, incr;
346 extra_len = columns() - basic_len;
347 /* Either UNIT already got 25, or is fully satisfied.
348 * Grant up to 25 to DESC now. */
349 incr = MIN(extra_len, 25u);
352 /* split the remaining space between UNIT and DESC,
353 * but do not give UNIT more than it needs. */
355 incr = MIN(extra_len / 2, max_id_len - id_len);
357 desc_len += extra_len - incr;
363 for (u = unit_infos; u < unit_infos + c; u++) {
364 _cleanup_free_ char *e = NULL;
365 const char *on_loaded, *off_loaded, *on = "";
366 const char *on_active, *off_active, *off = "";
368 if (!output_show_unit(u))
371 if (!n_shown && !arg_no_legend) {
372 printf("%-*s %-6s %-*s %-*s ", id_len, "UNIT", "LOAD",
373 active_len, "ACTIVE", sub_len, "SUB");
375 printf("%-*s ", job_len, "JOB");
376 if (!arg_full && arg_no_pager)
377 printf("%.*s\n", desc_len, "DESCRIPTION");
379 printf("%s\n", "DESCRIPTION");
384 if (streq(u->load_state, "error")) {
385 on_loaded = on = ansi_highlight_red(true);
386 off_loaded = off = ansi_highlight_red(false);
388 on_loaded = off_loaded = "";
390 if (streq(u->active_state, "failed")) {
391 on_active = on = ansi_highlight_red(true);
392 off_active = off = ansi_highlight_red(false);
394 on_active = off_active = "";
396 e = arg_full ? NULL : ellipsize(u->id, id_len, 33);
398 printf("%s%-*s%s %s%-6s%s %s%-*s %-*s%s %-*s",
399 on, id_len, e ? e : u->id, off,
400 on_loaded, u->load_state, off_loaded,
401 on_active, active_len, u->active_state,
402 sub_len, u->sub_state, off_active,
403 job_count ? job_len + 1 : 0, u->job_id ? u->job_type : "");
404 if (!arg_full && arg_no_pager)
405 printf("%.*s\n", desc_len, u->description);
407 printf("%s\n", u->description);
410 if (!arg_no_legend) {
411 const char *on, *off;
414 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
415 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
416 "SUB = The low-level unit activation state, values depend on unit type.\n");
418 printf("JOB = Pending job for the unit.\n");
420 on = ansi_highlight(true);
421 off = ansi_highlight(false);
423 on = ansi_highlight_red(true);
424 off = ansi_highlight_red(false);
428 printf("%s%u loaded units listed.%s\n"
429 "To show all installed unit files use 'systemctl list-unit-files'.\n",
432 printf("%s%u loaded units listed.%s Pass --all to see loaded but inactive units, too.\n"
433 "To show all installed unit files use 'systemctl list-unit-files'.\n",
438 static int get_unit_list(DBusConnection *bus, DBusMessage **reply,
439 struct unit_info **unit_infos, unsigned *c) {
440 DBusMessageIter iter, sub;
448 r = bus_method_call_with_reply(
450 "org.freedesktop.systemd1",
451 "/org/freedesktop/systemd1",
452 "org.freedesktop.systemd1.Manager",
460 if (!dbus_message_iter_init(*reply, &iter) ||
461 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
462 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
463 log_error("Failed to parse reply.");
467 dbus_message_iter_recurse(&iter, &sub);
469 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
470 if (!GREEDY_REALLOC(*unit_infos, size, *c + 1))
473 bus_parse_unit_info(&sub, *unit_infos + *c);
476 dbus_message_iter_next(&sub);
482 static int list_units(DBusConnection *bus, char **args) {
483 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
484 _cleanup_free_ struct unit_info *unit_infos = NULL;
488 pager_open_if_enabled();
490 r = get_unit_list(bus, &reply, &unit_infos, &c);
494 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
496 output_units_list(unit_infos, c);
501 static int get_triggered_units(DBusConnection *bus, const char* unit_path,
504 const char *interface = "org.freedesktop.systemd1.Unit",
505 *triggers_property = "Triggers";
506 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
507 DBusMessageIter iter, sub;
510 r = bus_method_call_with_reply(bus,
511 "org.freedesktop.systemd1",
513 "org.freedesktop.DBus.Properties",
517 DBUS_TYPE_STRING, &interface,
518 DBUS_TYPE_STRING, &triggers_property,
523 if (!dbus_message_iter_init(reply, &iter) ||
524 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
525 log_error("Failed to parse reply.");
529 dbus_message_iter_recurse(&iter, &sub);
530 dbus_message_iter_recurse(&sub, &iter);
533 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
536 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
537 log_error("Failed to parse reply.");
541 dbus_message_iter_get_basic(&sub, &unit);
542 r = strv_extend(triggered, unit);
546 dbus_message_iter_next(&sub);
552 static int get_listening(DBusConnection *bus, const char* unit_path,
553 char*** listen, unsigned *c)
555 const char *interface = "org.freedesktop.systemd1.Socket",
556 *listen_property = "Listen";
557 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
558 DBusMessageIter iter, sub;
561 r = bus_method_call_with_reply(bus,
562 "org.freedesktop.systemd1",
564 "org.freedesktop.DBus.Properties",
568 DBUS_TYPE_STRING, &interface,
569 DBUS_TYPE_STRING, &listen_property,
574 if (!dbus_message_iter_init(reply, &iter) ||
575 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
576 log_error("Failed to parse reply.");
580 dbus_message_iter_recurse(&iter, &sub);
581 dbus_message_iter_recurse(&sub, &iter);
584 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
585 DBusMessageIter sub2;
586 const char *type, *path;
588 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
589 log_error("Failed to parse reply.");
593 dbus_message_iter_recurse(&sub, &sub2);
595 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
596 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0) {
597 r = strv_extend(listen, type);
601 r = strv_extend(listen, path);
608 dbus_message_iter_next(&sub);
620 /* Note: triggered is a list here, although it almost certainly
621 * will always be one unit. Nevertheless, dbus API allows for multiple
622 * values, so let's follow that.*/
625 /* The strv above is shared. free is set only in the first one. */
629 static int socket_info_compare(struct socket_info *a, struct socket_info *b) {
630 int o = strcmp(a->path, b->path);
632 o = strcmp(a->type, b->type);
636 static int output_sockets_list(struct socket_info *socket_infos, unsigned cs) {
637 struct socket_info *s;
638 unsigned pathlen = sizeof("LISTEN") - 1,
639 typelen = (sizeof("TYPE") - 1) * arg_show_types,
640 socklen = sizeof("UNIT") - 1,
641 servlen = sizeof("ACTIVATES") - 1;
642 const char *on, *off;
644 for (s = socket_infos; s < socket_infos + cs; s++) {
648 socklen = MAX(socklen, strlen(s->id));
650 typelen = MAX(typelen, strlen(s->type));
651 pathlen = MAX(pathlen, strlen(s->path));
653 STRV_FOREACH(a, s->triggered)
654 tmp += strlen(*a) + 2*(a != s->triggered);
655 servlen = MAX(servlen, tmp);
660 printf("%-*s %-*.*s%-*s %s\n",
662 typelen + arg_show_types, typelen + arg_show_types, "TYPE ",
666 for (s = socket_infos; s < socket_infos + cs; s++) {
670 printf("%-*s %-*s %-*s",
671 pathlen, s->path, typelen, s->type, socklen, s->id);
674 pathlen, s->path, socklen, s->id);
675 STRV_FOREACH(a, s->triggered)
677 a == s->triggered ? "" : ",", *a);
681 on = ansi_highlight(true);
682 off = ansi_highlight(false);
686 on = ansi_highlight_red(true);
687 off = ansi_highlight_red(false);
690 if (!arg_no_legend) {
691 printf("%s%u sockets listed.%s\n", on, cs, off);
693 printf("Pass --all to see loaded but inactive sockets, too.\n");
699 static int list_sockets(DBusConnection *bus, char **args) {
700 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
701 _cleanup_free_ struct unit_info *unit_infos = NULL;
702 struct socket_info *socket_infos = NULL;
703 const struct unit_info *u;
704 struct socket_info *s;
705 unsigned cu = 0, cs = 0;
709 pager_open_if_enabled();
711 r = get_unit_list(bus, &reply, &unit_infos, &cu);
715 for (u = unit_infos; u < unit_infos + cu; u++) {
717 _cleanup_strv_free_ char **listen = NULL, **triggered = NULL;
720 if (!output_show_unit(u))
723 if ((dot = strrchr(u->id, '.')) && !streq(dot+1, "socket"))
726 r = get_triggered_units(bus, u->unit_path, &triggered);
730 r = get_listening(bus, u->unit_path, &listen, &c);
734 if (!GREEDY_REALLOC(socket_infos, size, cs + c)) {
739 for (i = 0; i < c; i++)
740 socket_infos[cs + i] = (struct socket_info) {
743 .path = listen[i*2 + 1],
744 .triggered = triggered,
745 .own_triggered = i==0,
748 /* from this point on we will cleanup those socket_infos */
751 listen = triggered = NULL; /* avoid cleanup */
754 qsort(socket_infos, cs, sizeof(struct socket_info),
755 (__compar_fn_t) socket_info_compare);
757 output_sockets_list(socket_infos, cs);
760 assert(cs == 0 || socket_infos);
761 for (s = socket_infos; s < socket_infos + cs; s++) {
764 if (s->own_triggered)
765 strv_free(s->triggered);
772 static int compare_unit_file_list(const void *a, const void *b) {
774 const UnitFileList *u = a, *v = b;
776 d1 = strrchr(u->path, '.');
777 d2 = strrchr(v->path, '.');
782 r = strcasecmp(d1, d2);
787 return strcasecmp(path_get_file_name(u->path), path_get_file_name(v->path));
790 static bool output_show_unit_file(const UnitFileList *u) {
793 return !arg_types || ((dot = strrchr(u->path, '.')) && strv_find(arg_types, dot+1));
796 static void output_unit_file_list(const UnitFileList *units, unsigned c) {
797 unsigned max_id_len, id_cols, state_cols, n_shown = 0;
798 const UnitFileList *u;
800 max_id_len = sizeof("UNIT FILE")-1;
801 state_cols = sizeof("STATE")-1;
802 for (u = units; u < units + c; u++) {
803 if (!output_show_unit_file(u))
806 max_id_len = MAX(max_id_len, strlen(path_get_file_name(u->path)));
807 state_cols = MAX(state_cols, strlen(unit_file_state_to_string(u->state)));
812 id_cols = MIN(max_id_len, 25u);
813 basic_cols = 1 + id_cols + state_cols;
814 if (basic_cols < (unsigned) columns())
815 id_cols += MIN(columns() - basic_cols, max_id_len - id_cols);
817 id_cols = max_id_len;
820 printf("%-*s %-*s\n", id_cols, "UNIT FILE", state_cols, "STATE");
822 for (u = units; u < units + c; u++) {
823 _cleanup_free_ char *e = NULL;
824 const char *on, *off;
827 if (!output_show_unit_file(u))
832 if (u->state == UNIT_FILE_MASKED ||
833 u->state == UNIT_FILE_MASKED_RUNTIME ||
834 u->state == UNIT_FILE_DISABLED ||
835 u->state == UNIT_FILE_INVALID) {
836 on = ansi_highlight_red(true);
837 off = ansi_highlight_red(false);
838 } else if (u->state == UNIT_FILE_ENABLED) {
839 on = ansi_highlight_green(true);
840 off = ansi_highlight_green(false);
844 id = path_get_file_name(u->path);
846 e = arg_full ? NULL : ellipsize(id, id_cols, 33);
848 printf("%-*s %s%-*s%s\n",
850 on, state_cols, unit_file_state_to_string(u->state), off);
854 printf("\n%u unit files listed.\n", n_shown);
857 static int list_unit_files(DBusConnection *bus, char **args) {
858 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
859 _cleanup_free_ UnitFileList *units = NULL;
860 DBusMessageIter iter, sub, sub2;
861 unsigned c = 0, n_units = 0;
864 pager_open_if_enabled();
871 h = hashmap_new(string_hash_func, string_compare_func);
875 r = unit_file_get_list(arg_scope, arg_root, h);
877 unit_file_list_free(h);
878 log_error("Failed to get unit file list: %s", strerror(-r));
882 n_units = hashmap_size(h);
883 units = new(UnitFileList, n_units);
885 unit_file_list_free(h);
889 HASHMAP_FOREACH(u, h, i) {
890 memcpy(units + c++, u, sizeof(UnitFileList));
896 r = bus_method_call_with_reply(
898 "org.freedesktop.systemd1",
899 "/org/freedesktop/systemd1",
900 "org.freedesktop.systemd1.Manager",
908 if (!dbus_message_iter_init(reply, &iter) ||
909 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
910 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
911 log_error("Failed to parse reply.");
915 dbus_message_iter_recurse(&iter, &sub);
917 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
921 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT);
926 n_units = MAX(2*c, 16u);
927 w = realloc(units, sizeof(struct UnitFileList) * n_units);
936 dbus_message_iter_recurse(&sub, &sub2);
938 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->path, true) < 0 ||
939 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, false) < 0) {
940 log_error("Failed to parse reply.");
944 u->state = unit_file_state_from_string(state);
946 dbus_message_iter_next(&sub);
952 qsort(units, c, sizeof(UnitFileList), compare_unit_file_list);
953 output_unit_file_list(units, c);
959 static int list_dependencies_print(const char *name, int level, unsigned int branches, bool last) {
961 _cleanup_free_ char *n = NULL;
963 size_t max_len = MAX(columns(),20u);
966 for (i = level - 1; i >= 0; i--) {
968 if(len > max_len - 3 && !arg_full) {
969 printf("%s...\n",max_len % 2 ? "" : " ");
972 printf("%s", draw_special_char(branches & (1 << i) ? DRAW_TREE_VERT : DRAW_TREE_SPACE));
975 if(len > max_len - 3 && !arg_full) {
976 printf("%s...\n",max_len % 2 ? "" : " ");
979 printf("%s", draw_special_char(last ? DRAW_TREE_RIGHT : DRAW_TREE_BRANCH));
983 printf("%s\n", name);
987 n = ellipsize(name, max_len-len, 100);
995 static int list_dependencies_get_dependencies(DBusConnection *bus, const char *name, char ***deps) {
996 static const char *dependencies[] = {
997 [DEPENDENCY_FORWARD] = "Requires\0"
998 "RequiresOverridable\0"
1000 "RequisiteOverridable\0"
1002 [DEPENDENCY_REVERSE] = "RequiredBy\0"
1003 "RequiredByOverridable\0"
1006 [DEPENDENCY_AFTER] = "After\0",
1007 [DEPENDENCY_BEFORE] = "Before\0",
1010 _cleanup_free_ char *path;
1011 const char *interface = "org.freedesktop.systemd1.Unit";
1013 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1014 DBusMessageIter iter, sub, sub2, sub3;
1023 path = unit_dbus_path_from_name(name);
1029 r = bus_method_call_with_reply(
1031 "org.freedesktop.systemd1",
1033 "org.freedesktop.DBus.Properties",
1037 DBUS_TYPE_STRING, &interface,
1042 if (!dbus_message_iter_init(reply, &iter) ||
1043 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1044 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
1045 log_error("Failed to parse reply.");
1050 dbus_message_iter_recurse(&iter, &sub);
1052 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1055 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_DICT_ENTRY);
1056 dbus_message_iter_recurse(&sub, &sub2);
1058 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &prop, true) < 0) {
1059 log_error("Failed to parse reply.");
1064 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
1065 log_error("Failed to parse reply.");
1070 dbus_message_iter_recurse(&sub2, &sub3);
1071 dbus_message_iter_next(&sub);
1073 assert(arg_dependency < ELEMENTSOF(dependencies));
1074 if (!nulstr_contains(dependencies[arg_dependency], prop))
1077 if (dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_ARRAY) {
1078 if (dbus_message_iter_get_element_type(&sub3) == DBUS_TYPE_STRING) {
1079 DBusMessageIter sub4;
1080 dbus_message_iter_recurse(&sub3, &sub4);
1082 while (dbus_message_iter_get_arg_type(&sub4) != DBUS_TYPE_INVALID) {
1085 assert(dbus_message_iter_get_arg_type(&sub4) == DBUS_TYPE_STRING);
1086 dbus_message_iter_get_basic(&sub4, &s);
1088 r = strv_extend(&ret, s);
1094 dbus_message_iter_next(&sub4);
1107 static int list_dependencies_compare(const void *_a, const void *_b) {
1108 const char **a = (const char**) _a, **b = (const char**) _b;
1109 if (unit_name_to_type(*a) == UNIT_TARGET && unit_name_to_type(*b) != UNIT_TARGET)
1111 if (unit_name_to_type(*a) != UNIT_TARGET && unit_name_to_type(*b) == UNIT_TARGET)
1113 return strcasecmp(*a, *b);
1116 static int list_dependencies_one(DBusConnection *bus, const char *name, int level, char ***units, unsigned int branches) {
1117 _cleanup_strv_free_ char **deps = NULL, **u;
1121 u = strv_append(*units, name);
1125 r = list_dependencies_get_dependencies(bus, name, &deps);
1129 qsort(deps, strv_length(deps), sizeof (char*), list_dependencies_compare);
1131 STRV_FOREACH(c, deps) {
1132 if (strv_contains(u, *c)) {
1134 r = list_dependencies_print("...", level + 1, (branches << 1) | (c[1] == NULL ? 0 : 1), 1);
1141 r = list_dependencies_print(*c, level, branches, c[1] == NULL);
1145 if (arg_all || unit_name_to_type(*c) == UNIT_TARGET) {
1146 r = list_dependencies_one(bus, *c, level + 1, &u, (branches << 1) | (c[1] == NULL ? 0 : 1));
1159 static int list_dependencies(DBusConnection *bus, char **args) {
1160 _cleanup_free_ char *unit = NULL;
1161 _cleanup_strv_free_ char **units = NULL;
1167 unit = unit_name_mangle(args[1]);
1172 u = SPECIAL_DEFAULT_TARGET;
1174 pager_open_if_enabled();
1178 return list_dependencies_one(bus, u, 0, &units, 0);
1181 static int get_default(DBusConnection *bus, char **args) {
1183 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
1185 _cleanup_dbus_error_free_ DBusError error;
1187 dbus_error_init(&error);
1189 if (!bus || avoid_bus()) {
1190 r = unit_file_get_default(arg_scope, arg_root, &path);
1193 log_error("Operation failed: %s", strerror(-r));
1199 r = bus_method_call_with_reply(
1201 "org.freedesktop.systemd1",
1202 "/org/freedesktop/systemd1",
1203 "org.freedesktop.systemd1.Manager",
1210 log_error("Operation failed: %s", strerror(-r));
1214 if (!dbus_message_get_args(reply, &error,
1215 DBUS_TYPE_STRING, &path,
1216 DBUS_TYPE_INVALID)) {
1217 log_error("Failed to parse reply: %s", bus_error_message(&error));
1218 dbus_error_free(&error);
1224 printf("%s\n", path);
1227 if ((!bus || avoid_bus()) && path)
1236 char *name, *type, *state;
1239 static void list_jobs_print(struct job_info* jobs, size_t n) {
1242 const char *on, *off;
1243 bool shorten = false;
1245 assert(n == 0 || jobs);
1248 on = ansi_highlight_green(true);
1249 off = ansi_highlight_green(false);
1251 printf("%sNo jobs running.%s\n", on, off);
1255 pager_open_if_enabled();
1258 /* JOB UNIT TYPE STATE */
1259 unsigned l0 = 3, l1 = 4, l2 = 4, l3 = 5;
1261 for (i = 0, j = jobs; i < n; i++, j++) {
1262 assert(j->name && j->type && j->state);
1263 l0 = MAX(l0, DECIMAL_STR_WIDTH(j->id));
1264 l1 = MAX(l1, strlen(j->name));
1265 l2 = MAX(l2, strlen(j->type));
1266 l3 = MAX(l3, strlen(j->state));
1269 if (!arg_full && l0 + 1 + l1 + l2 + 1 + l3 > columns()) {
1270 l1 = MAX(33u, columns() - l0 - l2 - l3 - 3);
1275 printf("%*s %-*s %-*s %-*s\n",
1281 for (i = 0, j = jobs; i < n; i++, j++) {
1282 _cleanup_free_ char *e = NULL;
1284 if (streq(j->state, "running")) {
1285 on = ansi_highlight(true);
1286 off = ansi_highlight(false);
1290 e = shorten ? ellipsize(j->name, l1, 33) : NULL;
1291 printf("%*u %s%-*s%s %-*s %s%-*s%s\n",
1293 on, l1, e ? e : j->name, off,
1295 on, l3, j->state, off);
1299 on = ansi_highlight(true);
1300 off = ansi_highlight(false);
1303 printf("\n%s%zu jobs listed%s.\n", on, n, off);
1306 static int list_jobs(DBusConnection *bus, char **args) {
1307 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1308 DBusMessageIter iter, sub, sub2;
1310 struct job_info *jobs = NULL;
1311 size_t size = 0, used = 0;
1313 r = bus_method_call_with_reply(
1315 "org.freedesktop.systemd1",
1316 "/org/freedesktop/systemd1",
1317 "org.freedesktop.systemd1.Manager",
1325 if (!dbus_message_iter_init(reply, &iter) ||
1326 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1327 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
1328 log_error("Failed to parse reply.");
1332 dbus_message_iter_recurse(&iter, &sub);
1334 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1335 const char *name, *type, *state, *job_path, *unit_path;
1338 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
1339 log_error("Failed to parse reply.");
1343 dbus_message_iter_recurse(&sub, &sub2);
1345 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &id, true) < 0 ||
1346 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
1347 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
1348 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, true) < 0 ||
1349 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &job_path, true) < 0 ||
1350 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, false) < 0) {
1351 log_error("Failed to parse reply.");
1356 if (!GREEDY_REALLOC(jobs, size, used + 1)) {
1361 jobs[used++] = (struct job_info) { id,
1365 if (!jobs[used-1].name || !jobs[used-1].type || !jobs[used-1].state) {
1370 dbus_message_iter_next(&sub);
1373 list_jobs_print(jobs, used);
1377 free(jobs[used].name);
1378 free(jobs[used].type);
1379 free(jobs[used].state);
1386 static int load_unit(DBusConnection *bus, char **args) {
1391 STRV_FOREACH(name, args+1) {
1392 _cleanup_free_ char *n = NULL;
1395 n = unit_name_mangle(*name);
1399 r = bus_method_call_with_reply(
1401 "org.freedesktop.systemd1",
1402 "/org/freedesktop/systemd1",
1403 "org.freedesktop.systemd1.Manager",
1407 DBUS_TYPE_STRING, &n,
1416 static int cancel_job(DBusConnection *bus, char **args) {
1421 if (strv_length(args) <= 1)
1422 return daemon_reload(bus, args);
1424 STRV_FOREACH(name, args+1) {
1428 r = safe_atou32(*name, &id);
1430 log_error("Failed to parse job id: %s", strerror(-r));
1434 r = bus_method_call_with_reply(
1436 "org.freedesktop.systemd1",
1437 "/org/freedesktop/systemd1",
1438 "org.freedesktop.systemd1.Manager",
1442 DBUS_TYPE_UINT32, &id,
1451 static bool need_daemon_reload(DBusConnection *bus, const char *unit) {
1452 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1453 dbus_bool_t b = FALSE;
1454 DBusMessageIter iter, sub;
1456 *interface = "org.freedesktop.systemd1.Unit",
1457 *property = "NeedDaemonReload",
1459 _cleanup_free_ char *n = NULL;
1462 /* We ignore all errors here, since this is used to show a warning only */
1464 n = unit_name_mangle(unit);
1468 r = bus_method_call_with_reply(
1470 "org.freedesktop.systemd1",
1471 "/org/freedesktop/systemd1",
1472 "org.freedesktop.systemd1.Manager",
1476 DBUS_TYPE_STRING, &n,
1481 if (!dbus_message_get_args(reply, NULL,
1482 DBUS_TYPE_OBJECT_PATH, &path,
1486 dbus_message_unref(reply);
1489 r = bus_method_call_with_reply(
1491 "org.freedesktop.systemd1",
1493 "org.freedesktop.DBus.Properties",
1497 DBUS_TYPE_STRING, &interface,
1498 DBUS_TYPE_STRING, &property,
1503 if (!dbus_message_iter_init(reply, &iter) ||
1504 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1507 dbus_message_iter_recurse(&iter, &sub);
1508 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_BOOLEAN)
1511 dbus_message_iter_get_basic(&sub, &b);
1515 typedef struct WaitData {
1522 static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *message, void *data) {
1523 _cleanup_dbus_error_free_ DBusError error;
1526 dbus_error_init(&error);
1532 log_debug("Got D-Bus request: %s.%s() on %s",
1533 dbus_message_get_interface(message),
1534 dbus_message_get_member(message),
1535 dbus_message_get_path(message));
1537 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
1538 log_error("Warning! D-Bus connection terminated.");
1539 dbus_connection_close(connection);
1541 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1543 const char *path, *result, *unit;
1545 if (dbus_message_get_args(message, &error,
1546 DBUS_TYPE_UINT32, &id,
1547 DBUS_TYPE_OBJECT_PATH, &path,
1548 DBUS_TYPE_STRING, &unit,
1549 DBUS_TYPE_STRING, &result,
1550 DBUS_TYPE_INVALID)) {
1552 free(set_remove(d->set, (char*) path));
1554 if (!isempty(result))
1555 d->result = strdup(result);
1558 d->name = strdup(unit);
1560 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1563 dbus_error_free(&error);
1564 if (dbus_message_get_args(message, &error,
1565 DBUS_TYPE_UINT32, &id,
1566 DBUS_TYPE_OBJECT_PATH, &path,
1567 DBUS_TYPE_STRING, &result,
1568 DBUS_TYPE_INVALID)) {
1569 /* Compatibility with older systemd versions <
1570 * 183 during upgrades. This should be dropped
1572 free(set_remove(d->set, (char*) path));
1575 d->result = strdup(result);
1577 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1581 log_error("Failed to parse message: %s", bus_error_message(&error));
1584 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1587 static int enable_wait_for_jobs(DBusConnection *bus) {
1595 dbus_error_init(&error);
1596 dbus_bus_add_match(bus,
1598 "sender='org.freedesktop.systemd1',"
1599 "interface='org.freedesktop.systemd1.Manager',"
1600 "member='JobRemoved',"
1601 "path='/org/freedesktop/systemd1'",
1604 if (dbus_error_is_set(&error)) {
1605 log_error("Failed to add match: %s", bus_error_message(&error));
1606 dbus_error_free(&error);
1610 /* This is slightly dirty, since we don't undo the match registrations. */
1614 static int wait_for_jobs(DBusConnection *bus, Set *s) {
1616 WaitData d = { .set = s };
1621 if (!dbus_connection_add_filter(bus, wait_filter, &d, NULL))
1624 while (!set_isempty(s)) {
1626 if (!dbus_connection_read_write_dispatch(bus, -1)) {
1627 log_error("Disconnected from bus.");
1628 return -ECONNREFUSED;
1635 if (streq(d.result, "timeout"))
1636 log_error("Job for %s timed out.", strna(d.name));
1637 else if (streq(d.result, "canceled"))
1638 log_error("Job for %s canceled.", strna(d.name));
1639 else if (streq(d.result, "dependency"))
1640 log_error("A dependency job for %s failed. See 'journalctl -xn' for details.", strna(d.name));
1641 else if (!streq(d.result, "done") && !streq(d.result, "skipped"))
1642 log_error("Job for %s failed. See 'systemctl status %s' and 'journalctl -xn' for details.", strna(d.name), strna(d.name));
1645 if (streq_ptr(d.result, "timeout"))
1647 else if (streq_ptr(d.result, "canceled"))
1649 else if (!streq_ptr(d.result, "done") && !streq_ptr(d.result, "skipped"))
1660 dbus_connection_remove_filter(bus, wait_filter, &d);
1664 static int check_one_unit(DBusConnection *bus, const char *name, char **check_states, bool quiet) {
1665 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1666 _cleanup_free_ char *n = NULL;
1667 DBusMessageIter iter, sub;
1669 *interface = "org.freedesktop.systemd1.Unit",
1670 *property = "ActiveState";
1671 const char *state, *path;
1677 dbus_error_init(&error);
1679 n = unit_name_mangle(name);
1683 r = bus_method_call_with_reply (
1685 "org.freedesktop.systemd1",
1686 "/org/freedesktop/systemd1",
1687 "org.freedesktop.systemd1.Manager",
1691 DBUS_TYPE_STRING, &n,
1694 dbus_error_free(&error);
1701 if (!dbus_message_get_args(reply, NULL,
1702 DBUS_TYPE_OBJECT_PATH, &path,
1703 DBUS_TYPE_INVALID)) {
1704 log_error("Failed to parse reply.");
1708 dbus_message_unref(reply);
1711 r = bus_method_call_with_reply(
1713 "org.freedesktop.systemd1",
1715 "org.freedesktop.DBus.Properties",
1719 DBUS_TYPE_STRING, &interface,
1720 DBUS_TYPE_STRING, &property,
1728 if (!dbus_message_iter_init(reply, &iter) ||
1729 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1730 log_error("Failed to parse reply.");
1734 dbus_message_iter_recurse(&iter, &sub);
1736 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1737 log_error("Failed to parse reply.");
1741 dbus_message_iter_get_basic(&sub, &state);
1746 return strv_find(check_states, state) ? 1 : 0;
1749 static void check_triggering_units(
1750 DBusConnection *bus,
1751 const char *unit_name) {
1753 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1754 DBusMessageIter iter, sub;
1755 const char *interface = "org.freedesktop.systemd1.Unit",
1756 *load_state_property = "LoadState",
1757 *triggered_by_property = "TriggeredBy",
1759 _cleanup_free_ char *unit_path = NULL, *n = NULL;
1760 bool print_warning_label = true;
1763 n = unit_name_mangle(unit_name);
1769 unit_path = unit_dbus_path_from_name(n);
1775 r = bus_method_call_with_reply(
1777 "org.freedesktop.systemd1",
1779 "org.freedesktop.DBus.Properties",
1783 DBUS_TYPE_STRING, &interface,
1784 DBUS_TYPE_STRING, &load_state_property,
1789 if (!dbus_message_iter_init(reply, &iter) ||
1790 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1791 log_error("Failed to parse reply.");
1795 dbus_message_iter_recurse(&iter, &sub);
1797 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1798 log_error("Failed to parse reply.");
1802 dbus_message_iter_get_basic(&sub, &state);
1804 if (streq(state, "masked"))
1807 dbus_message_unref(reply);
1810 r = bus_method_call_with_reply(
1812 "org.freedesktop.systemd1",
1814 "org.freedesktop.DBus.Properties",
1818 DBUS_TYPE_STRING, &interface,
1819 DBUS_TYPE_STRING, &triggered_by_property,
1824 if (!dbus_message_iter_init(reply, &iter) ||
1825 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1826 log_error("Failed to parse reply.");
1830 dbus_message_iter_recurse(&iter, &sub);
1831 dbus_message_iter_recurse(&sub, &iter);
1834 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1835 const char * const check_states[] = {
1840 const char *service_trigger;
1842 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1843 log_error("Failed to parse reply.");
1847 dbus_message_iter_get_basic(&sub, &service_trigger);
1849 r = check_one_unit(bus, service_trigger, (char**) check_states, true);
1853 if (print_warning_label) {
1854 log_warning("Warning: Stopping %s, but it can still be activated by:", unit_name);
1855 print_warning_label = false;
1858 log_warning(" %s", service_trigger);
1861 dbus_message_iter_next(&sub);
1865 static int start_unit_one(
1866 DBusConnection *bus,
1873 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1874 _cleanup_free_ char *n;
1883 n = unit_name_mangle(name);
1887 r = bus_method_call_with_reply(
1889 "org.freedesktop.systemd1",
1890 "/org/freedesktop/systemd1",
1891 "org.freedesktop.systemd1.Manager",
1895 DBUS_TYPE_STRING, &n,
1896 DBUS_TYPE_STRING, &mode,
1899 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
1900 /* There's always a fallback possible for
1901 * legacy actions. */
1904 log_error("Failed to issue method call: %s", bus_error_message(error));
1909 if (!dbus_message_get_args(reply, error,
1910 DBUS_TYPE_OBJECT_PATH, &path,
1911 DBUS_TYPE_INVALID)) {
1912 log_error("Failed to parse reply: %s", bus_error_message(error));
1916 if (need_daemon_reload(bus, n))
1917 log_warning("Warning: Unit file of %s changed on disk, 'systemctl %sdaemon-reload' recommended.",
1918 n, arg_scope == UNIT_FILE_SYSTEM ? "" : "--user ");
1927 r = set_consume(s, p);
1929 log_error("Failed to add path to set.");
1937 static const struct {
1941 } action_table[_ACTION_MAX] = {
1942 [ACTION_HALT] = { SPECIAL_HALT_TARGET, "halt", "replace-irreversibly" },
1943 [ACTION_POWEROFF] = { SPECIAL_POWEROFF_TARGET, "poweroff", "replace-irreversibly" },
1944 [ACTION_REBOOT] = { SPECIAL_REBOOT_TARGET, "reboot", "replace-irreversibly" },
1945 [ACTION_KEXEC] = { SPECIAL_KEXEC_TARGET, "kexec", "replace-irreversibly" },
1946 [ACTION_RUNLEVEL2] = { SPECIAL_RUNLEVEL2_TARGET, NULL, "isolate" },
1947 [ACTION_RUNLEVEL3] = { SPECIAL_RUNLEVEL3_TARGET, NULL, "isolate" },
1948 [ACTION_RUNLEVEL4] = { SPECIAL_RUNLEVEL4_TARGET, NULL, "isolate" },
1949 [ACTION_RUNLEVEL5] = { SPECIAL_RUNLEVEL5_TARGET, NULL, "isolate" },
1950 [ACTION_RESCUE] = { SPECIAL_RESCUE_TARGET, "rescue", "isolate" },
1951 [ACTION_EMERGENCY] = { SPECIAL_EMERGENCY_TARGET, "emergency", "isolate" },
1952 [ACTION_DEFAULT] = { SPECIAL_DEFAULT_TARGET, "default", "isolate" },
1953 [ACTION_EXIT] = { SPECIAL_EXIT_TARGET, "exit", "replace-irreversibly" },
1954 [ACTION_SUSPEND] = { SPECIAL_SUSPEND_TARGET, "suspend", "replace-irreversibly" },
1955 [ACTION_HIBERNATE] = { SPECIAL_HIBERNATE_TARGET, "hibernate", "replace-irreversibly" },
1956 [ACTION_HYBRID_SLEEP] = { SPECIAL_HYBRID_SLEEP_TARGET, "hybrid-sleep", "replace-irreversibly" },
1959 static enum action verb_to_action(const char *verb) {
1962 for (i = ACTION_INVALID; i < _ACTION_MAX; i++)
1963 if (action_table[i].verb && streq(verb, action_table[i].verb))
1965 return ACTION_INVALID;
1968 static int start_unit(DBusConnection *bus, char **args) {
1971 const char *method, *mode, *one_name;
1972 _cleanup_set_free_free_ Set *s = NULL;
1973 _cleanup_dbus_error_free_ DBusError error;
1976 dbus_error_init(&error);
1980 ask_password_agent_open_if_enabled();
1982 if (arg_action == ACTION_SYSTEMCTL) {
1985 streq(args[0], "stop") ||
1986 streq(args[0], "condstop") ? "StopUnit" :
1987 streq(args[0], "reload") ? "ReloadUnit" :
1988 streq(args[0], "restart") ? "RestartUnit" :
1990 streq(args[0], "try-restart") ||
1991 streq(args[0], "condrestart") ? "TryRestartUnit" :
1993 streq(args[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
1995 streq(args[0], "reload-or-try-restart") ||
1996 streq(args[0], "condreload") ||
1998 streq(args[0], "force-reload") ? "ReloadOrTryRestartUnit" :
2000 action = verb_to_action(args[0]);
2002 mode = streq(args[0], "isolate") ? "isolate" :
2003 action_table[action].mode ?: arg_job_mode;
2005 one_name = action_table[action].target;
2008 assert(arg_action < ELEMENTSOF(action_table));
2009 assert(action_table[arg_action].target);
2011 method = "StartUnit";
2013 mode = action_table[arg_action].mode;
2014 one_name = action_table[arg_action].target;
2017 if (!arg_no_block) {
2018 ret = enable_wait_for_jobs(bus);
2020 log_error("Could not watch jobs: %s", strerror(-ret));
2024 s = set_new(string_hash_func, string_compare_func);
2030 ret = start_unit_one(bus, method, one_name, mode, &error, s);
2032 ret = translate_bus_error_to_exit_status(ret, &error);
2034 STRV_FOREACH(name, args+1) {
2035 r = start_unit_one(bus, method, *name, mode, &error, s);
2037 ret = translate_bus_error_to_exit_status(r, &error);
2038 dbus_error_free(&error);
2043 if (!arg_no_block) {
2044 r = wait_for_jobs(bus, s);
2048 /* When stopping units, warn if they can still be triggered by
2049 * another active unit (socket, path, timer) */
2050 if (!arg_quiet && streq(method, "StopUnit")) {
2052 check_triggering_units(bus, one_name);
2054 STRV_FOREACH(name, args+1)
2055 check_triggering_units(bus, *name);
2062 /* Ask systemd-logind, which might grant access to unprivileged users
2063 * through PolicyKit */
2064 static int reboot_with_logind(DBusConnection *bus, enum action a) {
2067 dbus_bool_t interactive = true;
2072 polkit_agent_open_if_enabled();
2080 case ACTION_POWEROFF:
2081 method = "PowerOff";
2084 case ACTION_SUSPEND:
2088 case ACTION_HIBERNATE:
2089 method = "Hibernate";
2092 case ACTION_HYBRID_SLEEP:
2093 method = "HybridSleep";
2100 return bus_method_call_with_reply(
2102 "org.freedesktop.login1",
2103 "/org/freedesktop/login1",
2104 "org.freedesktop.login1.Manager",
2108 DBUS_TYPE_BOOLEAN, &interactive,
2115 static int check_inhibitors(DBusConnection *bus, enum action a) {
2117 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
2118 DBusMessageIter iter, sub, sub2;
2121 _cleanup_strv_free_ char **sessions = NULL;
2127 if (arg_ignore_inhibitors || arg_force > 0)
2139 r = bus_method_call_with_reply(
2141 "org.freedesktop.login1",
2142 "/org/freedesktop/login1",
2143 "org.freedesktop.login1.Manager",
2149 /* If logind is not around, then there are no inhibitors... */
2152 if (!dbus_message_iter_init(reply, &iter) ||
2153 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
2154 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
2155 log_error("Failed to parse reply.");
2159 dbus_message_iter_recurse(&iter, &sub);
2160 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2161 const char *what, *who, *why, *mode;
2163 _cleanup_strv_free_ char **sv = NULL;
2164 _cleanup_free_ char *comm = NULL, *user = NULL;
2166 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
2167 log_error("Failed to parse reply.");
2171 dbus_message_iter_recurse(&sub, &sub2);
2173 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &what, true) < 0 ||
2174 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &who, true) < 0 ||
2175 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &why, true) < 0 ||
2176 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &mode, true) < 0 ||
2177 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &uid, true) < 0 ||
2178 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, false) < 0) {
2179 log_error("Failed to parse reply.");
2183 if (!streq(mode, "block"))
2186 sv = strv_split(what, ":");
2190 if (!strv_contains(sv,
2192 a == ACTION_POWEROFF ||
2193 a == ACTION_REBOOT ||
2194 a == ACTION_KEXEC ? "shutdown" : "sleep"))
2197 get_process_comm(pid, &comm);
2198 user = uid_to_name(uid);
2199 log_warning("Operation inhibited by \"%s\" (PID %lu \"%s\", user %s), reason is \"%s\".",
2200 who, (unsigned long) pid, strna(comm), strna(user), why);
2204 dbus_message_iter_next(&sub);
2207 dbus_message_iter_recurse(&iter, &sub);
2209 /* Check for current sessions */
2210 sd_get_sessions(&sessions);
2211 STRV_FOREACH(s, sessions) {
2213 _cleanup_free_ char *type = NULL, *tty = NULL, *seat = NULL, *user = NULL, *service = NULL, *class = NULL;
2215 if (sd_session_get_uid(*s, &uid) < 0 || uid == getuid())
2218 if (sd_session_get_class(*s, &class) < 0 || !streq(class, "user"))
2221 if (sd_session_get_type(*s, &type) < 0 || (!streq(type, "x11") && !streq(type, "tty")))
2224 sd_session_get_tty(*s, &tty);
2225 sd_session_get_seat(*s, &seat);
2226 sd_session_get_service(*s, &service);
2227 user = uid_to_name(uid);
2229 log_warning("User %s is logged in on %s.", strna(user), isempty(tty) ? (isempty(seat) ? strna(service) : seat) : tty);
2236 log_error("Please retry operation after closing inhibitors and logging out other users.\nAlternatively, ignore inhibitors and users with 'systemctl %s -i'.",
2237 action_table[a].verb);
2245 static int start_special(DBusConnection *bus, char **args) {
2251 a = verb_to_action(args[0]);
2253 r = check_inhibitors(bus, a);
2257 if (arg_force >= 2 && geteuid() != 0) {
2258 log_error("Must be root.");
2262 if (arg_force >= 2 &&
2263 (a == ACTION_HALT ||
2264 a == ACTION_POWEROFF ||
2265 a == ACTION_REBOOT))
2268 if (arg_force >= 1 &&
2269 (a == ACTION_HALT ||
2270 a == ACTION_POWEROFF ||
2271 a == ACTION_REBOOT ||
2272 a == ACTION_KEXEC ||
2274 return daemon_reload(bus, args);
2276 /* first try logind, to allow authentication with polkit */
2277 if (geteuid() != 0 &&
2278 (a == ACTION_POWEROFF ||
2279 a == ACTION_REBOOT ||
2280 a == ACTION_SUSPEND ||
2281 a == ACTION_HIBERNATE ||
2282 a == ACTION_HYBRID_SLEEP)) {
2283 r = reboot_with_logind(bus, a);
2288 r = start_unit(bus, args);
2289 if (r == EXIT_SUCCESS)
2295 static int check_unit_active(DBusConnection *bus, char **args) {
2296 const char * const check_states[] = {
2303 int r = 3; /* According to LSB: "program is not running" */
2308 STRV_FOREACH(name, args+1) {
2311 state = check_one_unit(bus, *name, (char**) check_states, arg_quiet);
2321 static int check_unit_failed(DBusConnection *bus, char **args) {
2322 const char * const check_states[] = {
2333 STRV_FOREACH(name, args+1) {
2336 state = check_one_unit(bus, *name, (char**) check_states, arg_quiet);
2346 static int kill_unit(DBusConnection *bus, char **args) {
2354 arg_kill_who = "all";
2356 STRV_FOREACH(name, args+1) {
2357 _cleanup_free_ char *n = NULL;
2359 n = unit_name_mangle(*name);
2363 r = bus_method_call_with_reply(
2365 "org.freedesktop.systemd1",
2366 "/org/freedesktop/systemd1",
2367 "org.freedesktop.systemd1.Manager",
2371 DBUS_TYPE_STRING, &n,
2372 DBUS_TYPE_STRING, &arg_kill_who,
2373 DBUS_TYPE_INT32, &arg_signal,
2381 static int set_cgroup(DBusConnection *bus, char **args) {
2382 _cleanup_free_ char *n = NULL;
2383 const char *method, *runtime;
2391 streq(args[0], "set-cgroup") ? "SetUnitControlGroup" :
2392 streq(args[0], "unset-cgroup") ? "UnsetUnitControlGroup"
2393 : "UnsetUnitControlGroupAttribute";
2395 runtime = arg_runtime ? "runtime" : "persistent";
2397 n = unit_name_mangle(args[1]);
2401 STRV_FOREACH(argument, args + 2) {
2403 r = bus_method_call_with_reply(
2405 "org.freedesktop.systemd1",
2406 "/org/freedesktop/systemd1",
2407 "org.freedesktop.systemd1.Manager",
2411 DBUS_TYPE_STRING, &n,
2412 DBUS_TYPE_STRING, argument,
2413 DBUS_TYPE_STRING, &runtime,
2422 static int set_cgroup_attr(DBusConnection *bus, char **args) {
2423 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
2425 DBusMessageIter iter;
2426 _cleanup_free_ char *n = NULL;
2427 const char *runtime;
2433 dbus_error_init(&error);
2435 runtime = arg_runtime ? "runtime" : "persistent";
2437 n = unit_name_mangle(args[1]);
2441 m = dbus_message_new_method_call(
2442 "org.freedesktop.systemd1",
2443 "/org/freedesktop/systemd1",
2444 "org.freedesktop.systemd1.Manager",
2445 "SetUnitControlGroupAttribute");
2449 dbus_message_iter_init_append(m, &iter);
2450 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &n) ||
2451 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &args[2]))
2454 r = bus_append_strv_iter(&iter, args + 3);
2458 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &runtime))
2461 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
2463 log_error("Failed to issue method call: %s", bus_error_message(&error));
2464 dbus_error_free(&error);
2471 static int get_cgroup_attr(DBusConnection *bus, char **args) {
2472 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
2473 _cleanup_free_ char *n = NULL;
2480 n = unit_name_mangle(args[1]);
2484 STRV_FOREACH(argument, args + 2) {
2485 _cleanup_strv_free_ char **list = NULL;
2486 DBusMessageIter iter;
2489 r = bus_method_call_with_reply(
2491 "org.freedesktop.systemd1",
2492 "/org/freedesktop/systemd1",
2493 "org.freedesktop.systemd1.Manager",
2494 "GetUnitControlGroupAttribute",
2497 DBUS_TYPE_STRING, &n,
2498 DBUS_TYPE_STRING, argument,
2503 if (!dbus_message_iter_init(reply, &iter)) {
2504 log_error("Failed to initialize iterator.");
2508 r = bus_parse_strv_iter(&iter, &list);
2510 log_error("Failed to parse value list.");
2514 STRV_FOREACH(a, list) {
2515 if (endswith(*a, "\n"))
2525 typedef struct ExecStatusInfo {
2533 usec_t start_timestamp;
2534 usec_t exit_timestamp;
2539 LIST_FIELDS(struct ExecStatusInfo, exec);
2542 static void exec_status_info_free(ExecStatusInfo *i) {
2551 static int exec_status_info_deserialize(DBusMessageIter *sub, ExecStatusInfo *i) {
2552 uint64_t start_timestamp, exit_timestamp, start_timestamp_monotonic, exit_timestamp_monotonic;
2553 DBusMessageIter sub2, sub3;
2557 int32_t code, status;
2563 if (dbus_message_iter_get_arg_type(sub) != DBUS_TYPE_STRUCT)
2566 dbus_message_iter_recurse(sub, &sub2);
2568 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0)
2571 i->path = strdup(path);
2575 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_ARRAY ||
2576 dbus_message_iter_get_element_type(&sub2) != DBUS_TYPE_STRING)
2580 dbus_message_iter_recurse(&sub2, &sub3);
2581 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
2582 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
2583 dbus_message_iter_next(&sub3);
2587 i->argv = new0(char*, n+1);
2592 dbus_message_iter_recurse(&sub2, &sub3);
2593 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
2596 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
2597 dbus_message_iter_get_basic(&sub3, &s);
2598 dbus_message_iter_next(&sub3);
2600 i->argv[n] = strdup(s);
2607 if (!dbus_message_iter_next(&sub2) ||
2608 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, true) < 0 ||
2609 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp, true) < 0 ||
2610 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp_monotonic, true) < 0 ||
2611 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp, true) < 0 ||
2612 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp_monotonic, true) < 0 ||
2613 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, true) < 0 ||
2614 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &code, true) < 0 ||
2615 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &status, false) < 0)
2619 i->start_timestamp = (usec_t) start_timestamp;
2620 i->exit_timestamp = (usec_t) exit_timestamp;
2621 i->pid = (pid_t) pid;
2628 typedef struct UnitStatusInfo {
2630 const char *load_state;
2631 const char *active_state;
2632 const char *sub_state;
2633 const char *unit_file_state;
2635 const char *description;
2636 const char *following;
2638 char **documentation;
2640 const char *fragment_path;
2641 const char *source_path;
2642 const char *default_control_group;
2644 char **dropin_paths;
2646 const char *load_error;
2649 usec_t inactive_exit_timestamp;
2650 usec_t inactive_exit_timestamp_monotonic;
2651 usec_t active_enter_timestamp;
2652 usec_t active_exit_timestamp;
2653 usec_t inactive_enter_timestamp;
2655 bool need_daemon_reload;
2660 const char *status_text;
2661 const char *pid_file;
2664 usec_t start_timestamp;
2665 usec_t exit_timestamp;
2667 int exit_code, exit_status;
2669 usec_t condition_timestamp;
2670 bool condition_result;
2673 unsigned n_accepted;
2674 unsigned n_connections;
2677 /* Pairs of type, path */
2681 const char *sysfs_path;
2683 /* Mount, Automount */
2689 LIST_HEAD(ExecStatusInfo, exec);
2692 static void print_status_info(UnitStatusInfo *i) {
2694 const char *on, *off, *ss;
2696 char since1[FORMAT_TIMESTAMP_RELATIVE_MAX], *s1;
2697 char since2[FORMAT_TIMESTAMP_MAX], *s2;
2700 arg_all * OUTPUT_SHOW_ALL |
2701 (!on_tty() || pager_have()) * OUTPUT_FULL_WIDTH |
2702 on_tty() * OUTPUT_COLOR |
2703 !arg_quiet * OUTPUT_WARN_CUTOFF |
2704 arg_full * OUTPUT_FULL_WIDTH;
2709 /* This shows pretty information about a unit. See
2710 * print_property() for a low-level property printer */
2712 printf("%s", strna(i->id));
2714 if (i->description && !streq_ptr(i->id, i->description))
2715 printf(" - %s", i->description);
2720 printf(" Follow: unit currently follows state of %s\n", i->following);
2722 if (streq_ptr(i->load_state, "error")) {
2723 on = ansi_highlight_red(true);
2724 off = ansi_highlight_red(false);
2728 path = i->source_path ? i->source_path : i->fragment_path;
2731 printf(" Loaded: %s%s%s (Reason: %s)\n",
2732 on, strna(i->load_state), off, i->load_error);
2733 else if (path && i->unit_file_state)
2734 printf(" Loaded: %s%s%s (%s; %s)\n",
2735 on, strna(i->load_state), off, path, i->unit_file_state);
2737 printf(" Loaded: %s%s%s (%s)\n",
2738 on, strna(i->load_state), off, path);
2740 printf(" Loaded: %s%s%s\n",
2741 on, strna(i->load_state), off);
2743 if (!strv_isempty(i->dropin_paths)) {
2748 STRV_FOREACH(dropin, i->dropin_paths) {
2749 if (! dir || last) {
2750 printf(dir ? " " : " Drop-In: ");
2754 if (path_get_parent(*dropin, &dir) < 0) {
2759 printf("%s\n %s", dir,
2760 draw_special_char(DRAW_TREE_RIGHT));
2763 last = ! (*(dropin + 1) && startswith(*(dropin + 1), dir));
2765 printf("%s%s", path_get_file_name(*dropin), last ? "\n" : ", ");
2771 ss = streq_ptr(i->active_state, i->sub_state) ? NULL : i->sub_state;
2773 if (streq_ptr(i->active_state, "failed")) {
2774 on = ansi_highlight_red(true);
2775 off = ansi_highlight_red(false);
2776 } else if (streq_ptr(i->active_state, "active") || streq_ptr(i->active_state, "reloading")) {
2777 on = ansi_highlight_green(true);
2778 off = ansi_highlight_green(false);
2783 printf(" Active: %s%s (%s)%s",
2784 on, strna(i->active_state), ss, off);
2786 printf(" Active: %s%s%s",
2787 on, strna(i->active_state), off);
2789 if (!isempty(i->result) && !streq(i->result, "success"))
2790 printf(" (Result: %s)", i->result);
2792 timestamp = (streq_ptr(i->active_state, "active") ||
2793 streq_ptr(i->active_state, "reloading")) ? i->active_enter_timestamp :
2794 (streq_ptr(i->active_state, "inactive") ||
2795 streq_ptr(i->active_state, "failed")) ? i->inactive_enter_timestamp :
2796 streq_ptr(i->active_state, "activating") ? i->inactive_exit_timestamp :
2797 i->active_exit_timestamp;
2799 s1 = format_timestamp_relative(since1, sizeof(since1), timestamp);
2800 s2 = format_timestamp(since2, sizeof(since2), timestamp);
2803 printf(" since %s; %s\n", s2, s1);
2805 printf(" since %s\n", s2);
2809 if (!i->condition_result && i->condition_timestamp > 0) {
2810 s1 = format_timestamp_relative(since1, sizeof(since1), i->condition_timestamp);
2811 s2 = format_timestamp(since2, sizeof(since2), i->condition_timestamp);
2814 printf(" start condition failed at %s; %s\n", s2, s1);
2816 printf(" start condition failed at %s\n", s2);
2820 printf(" Device: %s\n", i->sysfs_path);
2822 printf(" Where: %s\n", i->where);
2824 printf(" What: %s\n", i->what);
2826 STRV_FOREACH(t, i->documentation)
2827 printf(" %*s %s\n", 9, t == i->documentation ? "Docs:" : "", *t);
2829 STRV_FOREACH_PAIR(t, t2, i->listen)
2830 printf(" %*s %s (%s)\n", 9, t == i->listen ? "Listen:" : "", *t2, *t);
2833 printf(" Accepted: %u; Connected: %u\n", i->n_accepted, i->n_connections);
2835 LIST_FOREACH(exec, p, i->exec) {
2836 _cleanup_free_ char *argv = NULL;
2839 /* Only show exited processes here */
2843 argv = strv_join(p->argv, " ");
2844 printf(" Process: %u %s=%s ", p->pid, p->name, strna(argv));
2846 good = is_clean_exit_lsb(p->code, p->status, NULL);
2848 on = ansi_highlight_red(true);
2849 off = ansi_highlight_red(false);
2853 printf("%s(code=%s, ", on, sigchld_code_to_string(p->code));
2855 if (p->code == CLD_EXITED) {
2858 printf("status=%i", p->status);
2860 c = exit_status_to_string(p->status, EXIT_STATUS_SYSTEMD);
2865 printf("signal=%s", signal_to_string(p->status));
2867 printf(")%s\n", off);
2869 if (i->main_pid == p->pid &&
2870 i->start_timestamp == p->start_timestamp &&
2871 i->exit_timestamp == p->start_timestamp)
2872 /* Let's not show this twice */
2875 if (p->pid == i->control_pid)
2879 if (i->main_pid > 0 || i->control_pid > 0) {
2880 if (i->main_pid > 0) {
2881 printf(" Main PID: %u", (unsigned) i->main_pid);
2884 _cleanup_free_ char *comm = NULL;
2885 get_process_comm(i->main_pid, &comm);
2887 printf(" (%s)", comm);
2888 } else if (i->exit_code > 0) {
2889 printf(" (code=%s, ", sigchld_code_to_string(i->exit_code));
2891 if (i->exit_code == CLD_EXITED) {
2894 printf("status=%i", i->exit_status);
2896 c = exit_status_to_string(i->exit_status, EXIT_STATUS_SYSTEMD);
2901 printf("signal=%s", signal_to_string(i->exit_status));
2905 if (i->control_pid > 0)
2909 if (i->control_pid > 0) {
2910 _cleanup_free_ char *c = NULL;
2912 printf(" %8s: %u", i->main_pid ? "" : " Control", (unsigned) i->control_pid);
2914 get_process_comm(i->control_pid, &c);
2923 printf(" Status: \"%s\"\n", i->status_text);
2925 if (i->default_control_group &&
2926 (i->main_pid > 0 || i->control_pid > 0 || cg_is_empty_by_spec(i->default_control_group, false) == 0)) {
2929 printf(" CGroup: %s\n", i->default_control_group);
2931 if (arg_transport != TRANSPORT_SSH) {
2934 char prefix[] = " ";
2937 if (c > sizeof(prefix) - 1)
2938 c -= sizeof(prefix) - 1;
2942 if (i->main_pid > 0)
2943 extra[k++] = i->main_pid;
2945 if (i->control_pid > 0)
2946 extra[k++] = i->control_pid;
2948 show_cgroup_and_extra_by_spec(i->default_control_group, prefix,
2949 c, false, extra, k, flags);
2953 if (i->id && arg_transport != TRANSPORT_SSH) {
2955 show_journal_by_unit(stdout,
2959 i->inactive_exit_timestamp_monotonic,
2963 arg_scope == UNIT_FILE_SYSTEM);
2966 if (i->need_daemon_reload)
2967 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %sdaemon-reload' recommended.\n",
2968 ansi_highlight_red(true),
2969 ansi_highlight_red(false),
2970 arg_scope == UNIT_FILE_SYSTEM ? "" : "--user ");
2973 static void show_unit_help(UnitStatusInfo *i) {
2978 if (!i->documentation) {
2979 log_info("Documentation for %s not known.", i->id);
2983 STRV_FOREACH(p, i->documentation) {
2985 if (startswith(*p, "man:")) {
2988 _cleanup_free_ char *page = NULL, *section = NULL;
2989 const char *args[4] = { "man", NULL, NULL, NULL };
2994 if ((*p)[k-1] == ')')
2995 e = strrchr(*p, '(');
2998 page = strndup((*p) + 4, e - *p - 4);
2999 section = strndup(e + 1, *p + k - e - 2);
3000 if (!page || !section) {
3012 log_error("Failed to fork: %m");
3018 execvp(args[0], (char**) args);
3019 log_error("Failed to execute man: %m");
3020 _exit(EXIT_FAILURE);
3023 wait_for_terminate(pid, NULL);
3025 log_info("Can't show: %s", *p);
3029 static int status_property(const char *name, DBusMessageIter *iter, UnitStatusInfo *i) {
3035 switch (dbus_message_iter_get_arg_type(iter)) {
3037 case DBUS_TYPE_STRING: {
3040 dbus_message_iter_get_basic(iter, &s);
3043 if (streq(name, "Id"))
3045 else if (streq(name, "LoadState"))
3047 else if (streq(name, "ActiveState"))
3048 i->active_state = s;
3049 else if (streq(name, "SubState"))
3051 else if (streq(name, "Description"))
3053 else if (streq(name, "FragmentPath"))
3054 i->fragment_path = s;
3055 else if (streq(name, "SourcePath"))
3057 else if (streq(name, "DefaultControlGroup"))
3058 i->default_control_group = s;
3059 else if (streq(name, "StatusText"))
3061 else if (streq(name, "PIDFile"))
3063 else if (streq(name, "SysFSPath"))
3065 else if (streq(name, "Where"))
3067 else if (streq(name, "What"))
3069 else if (streq(name, "Following"))
3071 else if (streq(name, "UnitFileState"))
3072 i->unit_file_state = s;
3073 else if (streq(name, "Result"))
3080 case DBUS_TYPE_BOOLEAN: {
3083 dbus_message_iter_get_basic(iter, &b);
3085 if (streq(name, "Accept"))
3087 else if (streq(name, "NeedDaemonReload"))
3088 i->need_daemon_reload = b;
3089 else if (streq(name, "ConditionResult"))
3090 i->condition_result = b;
3095 case DBUS_TYPE_UINT32: {
3098 dbus_message_iter_get_basic(iter, &u);
3100 if (streq(name, "MainPID")) {
3102 i->main_pid = (pid_t) u;
3105 } else if (streq(name, "ControlPID"))
3106 i->control_pid = (pid_t) u;
3107 else if (streq(name, "ExecMainPID")) {
3109 i->main_pid = (pid_t) u;
3110 } else if (streq(name, "NAccepted"))
3112 else if (streq(name, "NConnections"))
3113 i->n_connections = u;
3118 case DBUS_TYPE_INT32: {
3121 dbus_message_iter_get_basic(iter, &j);
3123 if (streq(name, "ExecMainCode"))
3124 i->exit_code = (int) j;
3125 else if (streq(name, "ExecMainStatus"))
3126 i->exit_status = (int) j;
3131 case DBUS_TYPE_UINT64: {
3134 dbus_message_iter_get_basic(iter, &u);
3136 if (streq(name, "ExecMainStartTimestamp"))
3137 i->start_timestamp = (usec_t) u;
3138 else if (streq(name, "ExecMainExitTimestamp"))
3139 i->exit_timestamp = (usec_t) u;
3140 else if (streq(name, "ActiveEnterTimestamp"))
3141 i->active_enter_timestamp = (usec_t) u;
3142 else if (streq(name, "InactiveEnterTimestamp"))
3143 i->inactive_enter_timestamp = (usec_t) u;
3144 else if (streq(name, "InactiveExitTimestamp"))
3145 i->inactive_exit_timestamp = (usec_t) u;
3146 else if (streq(name, "InactiveExitTimestampMonotonic"))
3147 i->inactive_exit_timestamp_monotonic = (usec_t) u;
3148 else if (streq(name, "ActiveExitTimestamp"))
3149 i->active_exit_timestamp = (usec_t) u;
3150 else if (streq(name, "ConditionTimestamp"))
3151 i->condition_timestamp = (usec_t) u;
3156 case DBUS_TYPE_ARRAY: {
3158 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT &&
3159 startswith(name, "Exec")) {
3160 DBusMessageIter sub;
3162 dbus_message_iter_recurse(iter, &sub);
3163 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3164 ExecStatusInfo *info;
3167 if (!(info = new0(ExecStatusInfo, 1)))
3170 if (!(info->name = strdup(name))) {
3175 if ((r = exec_status_info_deserialize(&sub, info)) < 0) {
3180 LIST_PREPEND(ExecStatusInfo, exec, i->exec, info);
3182 dbus_message_iter_next(&sub);
3185 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Listen")) {
3186 DBusMessageIter sub, sub2;
3188 dbus_message_iter_recurse(iter, &sub);
3189 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3190 const char *type, *path;
3192 dbus_message_iter_recurse(&sub, &sub2);
3194 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
3195 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0) {
3198 r = strv_extend(&i->listen, type);
3201 r = strv_extend(&i->listen, path);
3206 dbus_message_iter_next(&sub);
3211 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING && streq(name, "DropInPaths")) {
3212 int r = bus_parse_strv_iter(iter, &i->dropin_paths);
3216 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING &&
3217 streq(name, "Documentation")) {
3219 DBusMessageIter sub;
3221 dbus_message_iter_recurse(iter, &sub);
3222 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING) {
3226 dbus_message_iter_get_basic(&sub, &s);
3228 r = strv_extend(&i->documentation, s);
3232 dbus_message_iter_next(&sub);
3239 case DBUS_TYPE_STRUCT: {
3241 if (streq(name, "LoadError")) {
3242 DBusMessageIter sub;
3243 const char *n, *message;
3246 dbus_message_iter_recurse(iter, &sub);
3248 r = bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &n, true);
3252 r = bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &message, false);
3256 if (!isempty(message))
3257 i->load_error = message;
3267 static int print_property(const char *name, DBusMessageIter *iter) {
3271 /* This is a low-level property printer, see
3272 * print_status_info() for the nicer output */
3274 if (arg_properties && !strv_find(arg_properties, name))
3277 switch (dbus_message_iter_get_arg_type(iter)) {
3279 case DBUS_TYPE_STRUCT: {
3280 DBusMessageIter sub;
3281 dbus_message_iter_recurse(iter, &sub);
3283 if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_UINT32 && streq(name, "Job")) {
3286 dbus_message_iter_get_basic(&sub, &u);
3289 printf("%s=%u\n", name, (unsigned) u);
3291 printf("%s=\n", name);
3294 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "Unit")) {
3297 dbus_message_iter_get_basic(&sub, &s);
3299 if (arg_all || s[0])
3300 printf("%s=%s\n", name, s);
3303 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "LoadError")) {
3304 const char *a = NULL, *b = NULL;
3306 if (bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &a, true) >= 0)
3307 bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &b, false);
3309 if (arg_all || !isempty(a) || !isempty(b))
3310 printf("%s=%s \"%s\"\n", name, strempty(a), strempty(b));
3318 case DBUS_TYPE_ARRAY:
3320 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "EnvironmentFiles")) {
3321 DBusMessageIter sub, sub2;
3323 dbus_message_iter_recurse(iter, &sub);
3324 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3328 dbus_message_iter_recurse(&sub, &sub2);
3330 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) >= 0 &&
3331 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, false) >= 0)
3332 printf("EnvironmentFile=%s (ignore_errors=%s)\n", path, yes_no(ignore));
3334 dbus_message_iter_next(&sub);
3339 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Paths")) {
3340 DBusMessageIter sub, sub2;
3342 dbus_message_iter_recurse(iter, &sub);
3344 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3345 const char *type, *path;
3347 dbus_message_iter_recurse(&sub, &sub2);
3349 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
3350 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
3351 printf("%s=%s\n", type, path);
3353 dbus_message_iter_next(&sub);
3358 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Listen")) {
3359 DBusMessageIter sub, sub2;
3361 dbus_message_iter_recurse(iter, &sub);
3362 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3363 const char *type, *path;
3365 dbus_message_iter_recurse(&sub, &sub2);
3367 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
3368 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
3369 printf("Listen%s=%s\n", type, path);
3371 dbus_message_iter_next(&sub);
3376 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Timers")) {
3377 DBusMessageIter sub, sub2;
3379 dbus_message_iter_recurse(iter, &sub);
3380 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3382 uint64_t value, next_elapse;
3384 dbus_message_iter_recurse(&sub, &sub2);
3386 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &base, true) >= 0 &&
3387 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &value, true) >= 0 &&
3388 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &next_elapse, false) >= 0) {
3389 char timespan1[FORMAT_TIMESPAN_MAX], timespan2[FORMAT_TIMESPAN_MAX];
3391 printf("%s={ value=%s ; next_elapse=%s }\n",
3393 format_timespan(timespan1, sizeof(timespan1), value, 0),
3394 format_timespan(timespan2, sizeof(timespan2), next_elapse, 0));
3397 dbus_message_iter_next(&sub);
3402 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "ControlGroupAttributes")) {
3403 DBusMessageIter sub, sub2;
3405 dbus_message_iter_recurse(iter, &sub);
3406 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3407 const char *controller, *attr, *value;
3409 dbus_message_iter_recurse(&sub, &sub2);
3411 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &controller, true) >= 0 &&
3412 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &attr, true) >= 0 &&
3413 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &value, false) >= 0) {
3415 printf("ControlGroupAttributes={ controller=%s ; attribute=%s ; value=\"%s\" }\n",
3421 dbus_message_iter_next(&sub);
3426 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && startswith(name, "Exec")) {
3427 DBusMessageIter sub;
3429 dbus_message_iter_recurse(iter, &sub);
3430 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3431 ExecStatusInfo info = {};
3433 if (exec_status_info_deserialize(&sub, &info) >= 0) {
3434 char timestamp1[FORMAT_TIMESTAMP_MAX], timestamp2[FORMAT_TIMESTAMP_MAX];
3435 _cleanup_free_ char *t;
3437 t = strv_join(info.argv, " ");
3439 printf("%s={ path=%s ; argv[]=%s ; ignore_errors=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
3443 yes_no(info.ignore),
3444 strna(format_timestamp(timestamp1, sizeof(timestamp1), info.start_timestamp)),
3445 strna(format_timestamp(timestamp2, sizeof(timestamp2), info.exit_timestamp)),
3446 (unsigned) info. pid,
3447 sigchld_code_to_string(info.code),
3449 info.code == CLD_EXITED ? "" : "/",
3450 strempty(info.code == CLD_EXITED ? NULL : signal_to_string(info.status)));
3454 strv_free(info.argv);
3456 dbus_message_iter_next(&sub);
3465 if (generic_print_property(name, iter, arg_all) > 0)
3469 printf("%s=[unprintable]\n", name);
3474 static int show_one(const char *verb, DBusConnection *bus, const char *path, bool show_properties, bool *new_line) {
3475 _cleanup_free_ DBusMessage *reply = NULL;
3476 const char *interface = "";
3478 DBusMessageIter iter, sub, sub2, sub3;
3479 UnitStatusInfo info = {};
3485 r = bus_method_call_with_reply(
3487 "org.freedesktop.systemd1",
3489 "org.freedesktop.DBus.Properties",
3493 DBUS_TYPE_STRING, &interface,
3498 if (!dbus_message_iter_init(reply, &iter) ||
3499 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
3500 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
3501 log_error("Failed to parse reply.");
3505 dbus_message_iter_recurse(&iter, &sub);
3512 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
3515 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_DICT_ENTRY);
3516 dbus_message_iter_recurse(&sub, &sub2);
3518 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
3519 dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
3520 log_error("Failed to parse reply.");
3524 dbus_message_iter_recurse(&sub2, &sub3);
3526 if (show_properties)
3527 r = print_property(name, &sub3);
3529 r = status_property(name, &sub3, &info);
3531 log_error("Failed to parse reply.");
3535 dbus_message_iter_next(&sub);
3540 if (!show_properties) {
3541 if (streq(verb, "help"))
3542 show_unit_help(&info);
3544 print_status_info(&info);
3547 strv_free(info.documentation);
3548 strv_free(info.dropin_paths);
3549 strv_free(info.listen);
3551 if (!streq_ptr(info.active_state, "active") &&
3552 !streq_ptr(info.active_state, "reloading") &&
3553 streq(verb, "status")) {
3554 /* According to LSB: "program not running" */
3555 /* 0: program is running or service is OK
3556 * 1: program is dead and /var/run pid file exists
3557 * 2: program is dead and /var/lock lock file exists
3558 * 3: program is not running
3559 * 4: program or service status is unknown
3561 if (info.pid_file && access(info.pid_file, F_OK) == 0)
3567 while ((p = info.exec)) {
3568 LIST_REMOVE(ExecStatusInfo, exec, info.exec, p);
3569 exec_status_info_free(p);
3575 static int show_one_by_pid(const char *verb, DBusConnection *bus, uint32_t pid, bool *new_line) {
3576 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3577 const char *path = NULL;
3578 _cleanup_dbus_error_free_ DBusError error;
3581 dbus_error_init(&error);
3583 r = bus_method_call_with_reply(
3585 "org.freedesktop.systemd1",
3586 "/org/freedesktop/systemd1",
3587 "org.freedesktop.systemd1.Manager",
3591 DBUS_TYPE_UINT32, &pid,
3596 if (!dbus_message_get_args(reply, &error,
3597 DBUS_TYPE_OBJECT_PATH, &path,
3598 DBUS_TYPE_INVALID)) {
3599 log_error("Failed to parse reply: %s", bus_error_message(&error));
3603 r = show_one(verb, bus, path, false, new_line);
3607 static int show_all(const char* verb, DBusConnection *bus, bool show_properties, bool *new_line) {
3608 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3609 _cleanup_free_ struct unit_info *unit_infos = NULL;
3611 const struct unit_info *u;
3614 r = get_unit_list(bus, &reply, &unit_infos, &c);
3618 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
3620 for (u = unit_infos; u < unit_infos + c; u++) {
3621 _cleanup_free_ char *p = NULL;
3623 if (!output_show_unit(u))
3626 p = unit_dbus_path_from_name(u->id);
3630 printf("%s -> '%s'\n", u->id, p);
3632 r = show_one(verb, bus, p, show_properties, new_line);
3640 static int show(DBusConnection *bus, char **args) {
3642 bool show_properties, show_status, new_line = false;
3648 show_properties = streq(args[0], "show");
3649 show_status = streq(args[0], "status");
3651 if (show_properties)
3652 pager_open_if_enabled();
3654 /* If no argument is specified inspect the manager itself */
3656 if (show_properties && strv_length(args) <= 1)
3657 return show_one(args[0], bus, "/org/freedesktop/systemd1", show_properties, &new_line);
3659 if (show_status && strv_length(args) <= 1)
3660 return show_all(args[0], bus, false, &new_line);
3662 STRV_FOREACH(name, args+1) {
3665 if (safe_atou32(*name, &id) < 0) {
3666 _cleanup_free_ char *p = NULL, *n = NULL;
3667 /* Interpret as unit name */
3669 n = unit_name_mangle(*name);
3673 p = unit_dbus_path_from_name(n);
3677 r = show_one(args[0], bus, p, show_properties, &new_line);
3681 } else if (show_properties) {
3682 _cleanup_free_ char *p = NULL;
3684 /* Interpret as job id */
3685 if (asprintf(&p, "/org/freedesktop/systemd1/job/%u", id) < 0)
3688 r = show_one(args[0], bus, p, show_properties, &new_line);
3693 /* Interpret as PID */
3694 r = show_one_by_pid(args[0], bus, id, &new_line);
3703 static int dump(DBusConnection *bus, char **args) {
3704 _cleanup_free_ DBusMessage *reply = NULL;
3709 dbus_error_init(&error);
3711 pager_open_if_enabled();
3713 r = bus_method_call_with_reply(
3715 "org.freedesktop.systemd1",
3716 "/org/freedesktop/systemd1",
3717 "org.freedesktop.systemd1.Manager",
3725 if (!dbus_message_get_args(reply, &error,
3726 DBUS_TYPE_STRING, &text,
3727 DBUS_TYPE_INVALID)) {
3728 log_error("Failed to parse reply: %s", bus_error_message(&error));
3729 dbus_error_free(&error);
3733 fputs(text, stdout);
3737 static int snapshot(DBusConnection *bus, char **args) {
3738 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3741 dbus_bool_t cleanup = FALSE;
3742 DBusMessageIter iter, sub;
3745 *interface = "org.freedesktop.systemd1.Unit",
3747 _cleanup_free_ char *n = NULL;
3749 dbus_error_init(&error);
3751 if (strv_length(args) > 1)
3752 n = unit_name_mangle_with_suffix(args[1], ".snapshot");
3758 r = bus_method_call_with_reply (
3760 "org.freedesktop.systemd1",
3761 "/org/freedesktop/systemd1",
3762 "org.freedesktop.systemd1.Manager",
3766 DBUS_TYPE_STRING, &n,
3767 DBUS_TYPE_BOOLEAN, &cleanup,
3772 if (!dbus_message_get_args(reply, &error,
3773 DBUS_TYPE_OBJECT_PATH, &path,
3774 DBUS_TYPE_INVALID)) {
3775 log_error("Failed to parse reply: %s", bus_error_message(&error));
3776 dbus_error_free(&error);
3780 dbus_message_unref(reply);
3783 r = bus_method_call_with_reply (
3785 "org.freedesktop.systemd1",
3787 "org.freedesktop.DBus.Properties",
3791 DBUS_TYPE_STRING, &interface,
3792 DBUS_TYPE_STRING, &property,
3797 if (!dbus_message_iter_init(reply, &iter) ||
3798 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3799 log_error("Failed to parse reply.");
3803 dbus_message_iter_recurse(&iter, &sub);
3805 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
3806 log_error("Failed to parse reply.");
3810 dbus_message_iter_get_basic(&sub, &id);
3818 static int delete_snapshot(DBusConnection *bus, char **args) {
3823 STRV_FOREACH(name, args+1) {
3824 _cleanup_free_ char *n = NULL;
3827 n = unit_name_mangle_with_suffix(*name, ".snapshot");
3831 r = bus_method_call_with_reply(
3833 "org.freedesktop.systemd1",
3834 "/org/freedesktop/systemd1",
3835 "org.freedesktop.systemd1.Manager",
3839 DBUS_TYPE_STRING, &n,
3848 static int daemon_reload(DBusConnection *bus, char **args) {
3853 if (arg_action == ACTION_RELOAD)
3855 else if (arg_action == ACTION_REEXEC)
3856 method = "Reexecute";
3858 assert(arg_action == ACTION_SYSTEMCTL);
3861 streq(args[0], "clear-jobs") ||
3862 streq(args[0], "cancel") ? "ClearJobs" :
3863 streq(args[0], "daemon-reexec") ? "Reexecute" :
3864 streq(args[0], "reset-failed") ? "ResetFailed" :
3865 streq(args[0], "halt") ? "Halt" :
3866 streq(args[0], "poweroff") ? "PowerOff" :
3867 streq(args[0], "reboot") ? "Reboot" :
3868 streq(args[0], "kexec") ? "KExec" :
3869 streq(args[0], "exit") ? "Exit" :
3870 /* "daemon-reload" */ "Reload";
3873 r = bus_method_call_with_reply(
3875 "org.freedesktop.systemd1",
3876 "/org/freedesktop/systemd1",
3877 "org.freedesktop.systemd1.Manager",
3883 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
3884 /* There's always a fallback possible for
3885 * legacy actions. */
3887 else if (r == -ETIMEDOUT && streq(method, "Reexecute"))
3888 /* On reexecution, we expect a disconnect, not
3892 log_error("Failed to issue method call: %s", bus_error_message(&error));
3894 dbus_error_free(&error);
3898 static int reset_failed(DBusConnection *bus, char **args) {
3902 if (strv_length(args) <= 1)
3903 return daemon_reload(bus, args);
3905 STRV_FOREACH(name, args+1) {
3906 _cleanup_free_ char *n;
3908 n = unit_name_mangle(*name);
3912 r = bus_method_call_with_reply(
3914 "org.freedesktop.systemd1",
3915 "/org/freedesktop/systemd1",
3916 "org.freedesktop.systemd1.Manager",
3920 DBUS_TYPE_STRING, &n,
3929 static int show_enviroment(DBusConnection *bus, char **args) {
3930 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3931 DBusMessageIter iter, sub, sub2;
3934 *interface = "org.freedesktop.systemd1.Manager",
3935 *property = "Environment";
3937 pager_open_if_enabled();
3939 r = bus_method_call_with_reply(
3941 "org.freedesktop.systemd1",
3942 "/org/freedesktop/systemd1",
3943 "org.freedesktop.DBus.Properties",
3947 DBUS_TYPE_STRING, &interface,
3948 DBUS_TYPE_STRING, &property,
3953 if (!dbus_message_iter_init(reply, &iter) ||
3954 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3955 log_error("Failed to parse reply.");
3959 dbus_message_iter_recurse(&iter, &sub);
3961 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_ARRAY ||
3962 dbus_message_iter_get_element_type(&sub) != DBUS_TYPE_STRING) {
3963 log_error("Failed to parse reply.");
3967 dbus_message_iter_recurse(&sub, &sub2);
3969 while (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_INVALID) {
3972 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_STRING) {
3973 log_error("Failed to parse reply.");
3977 dbus_message_iter_get_basic(&sub2, &text);
3980 dbus_message_iter_next(&sub2);
3986 static int switch_root(DBusConnection *bus, char **args) {
3989 _cleanup_free_ char *init = NULL;
3991 l = strv_length(args);
3992 if (l < 2 || l > 3) {
3993 log_error("Wrong number of arguments.");
4000 init = strdup(args[2]);
4002 parse_env_file("/proc/cmdline", WHITESPACE,
4012 log_debug("switching root - root: %s; init: %s", root, init);
4014 return bus_method_call_with_reply(
4016 "org.freedesktop.systemd1",
4017 "/org/freedesktop/systemd1",
4018 "org.freedesktop.systemd1.Manager",
4022 DBUS_TYPE_STRING, &root,
4023 DBUS_TYPE_STRING, &init,
4027 static int set_environment(DBusConnection *bus, char **args) {
4028 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
4031 DBusMessageIter iter;
4037 dbus_error_init(&error);
4039 method = streq(args[0], "set-environment")
4041 : "UnsetEnvironment";
4043 m = dbus_message_new_method_call(
4044 "org.freedesktop.systemd1",
4045 "/org/freedesktop/systemd1",
4046 "org.freedesktop.systemd1.Manager",
4051 dbus_message_iter_init_append(m, &iter);
4053 r = bus_append_strv_iter(&iter, args + 1);
4057 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
4059 log_error("Failed to issue method call: %s", bus_error_message(&error));
4060 dbus_error_free(&error);
4067 static int enable_sysv_units(char **args) {
4070 #if defined(HAVE_SYSV_COMPAT) && defined(HAVE_CHKCONFIG)
4071 const char *verb = args[0];
4072 unsigned f = 1, t = 1;
4073 LookupPaths paths = {};
4075 if (arg_scope != UNIT_FILE_SYSTEM)
4078 if (!streq(verb, "enable") &&
4079 !streq(verb, "disable") &&
4080 !streq(verb, "is-enabled"))
4083 /* Processes all SysV units, and reshuffles the array so that
4084 * afterwards only the native units remain */
4086 r = lookup_paths_init(&paths, SYSTEMD_SYSTEM, false, NULL, NULL, NULL);
4091 for (f = 1; args[f]; f++) {
4093 _cleanup_free_ char *p = NULL, *q = NULL;
4094 bool found_native = false, found_sysv;
4096 const char *argv[6] = { "/sbin/chkconfig", NULL, NULL, NULL, NULL };
4104 if (!endswith(name, ".service"))
4107 if (path_is_absolute(name))
4110 STRV_FOREACH(k, paths.unit_path) {
4111 if (!isempty(arg_root))
4112 asprintf(&p, "%s/%s/%s", arg_root, *k, name);
4114 asprintf(&p, "%s/%s", *k, name);
4121 found_native = access(p, F_OK) >= 0;
4132 if (!isempty(arg_root))
4133 asprintf(&p, "%s/" SYSTEM_SYSVINIT_PATH "/%s", arg_root, name);
4135 asprintf(&p, SYSTEM_SYSVINIT_PATH "/%s", name);
4141 p[strlen(p) - sizeof(".service") + 1] = 0;
4142 found_sysv = access(p, F_OK) >= 0;
4147 /* Mark this entry, so that we don't try enabling it as native unit */
4148 args[f] = (char*) "";
4150 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", name);
4152 if (!isempty(arg_root))
4153 argv[c++] = q = strappend("--root=", arg_root);
4155 argv[c++] = path_get_file_name(p);
4157 streq(verb, "enable") ? "on" :
4158 streq(verb, "disable") ? "off" : "--level=5";
4161 l = strv_join((char**)argv, " ");
4167 log_info("Executing %s", l);
4172 log_error("Failed to fork: %m");
4175 } else if (pid == 0) {
4178 execv(argv[0], (char**) argv);
4179 _exit(EXIT_FAILURE);
4182 j = wait_for_terminate(pid, &status);
4184 log_error("Failed to wait for child: %s", strerror(-r));
4189 if (status.si_code == CLD_EXITED) {
4190 if (streq(verb, "is-enabled")) {
4191 if (status.si_status == 0) {
4200 } else if (status.si_status != 0) {
4211 lookup_paths_free(&paths);
4213 /* Drop all SysV units */
4214 for (f = 1, t = 1; args[f]; f++) {
4216 if (isempty(args[f]))
4219 args[t++] = args[f];
4228 static int mangle_names(char **original_names, char ***mangled_names) {
4229 char **i, **l, **name;
4231 l = new(char*, strv_length(original_names) + 1);
4236 STRV_FOREACH(name, original_names) {
4238 /* When enabling units qualified path names are OK,
4239 * too, hence allow them explicitly. */
4244 *i = unit_name_mangle(*name);
4260 static int enable_unit(DBusConnection *bus, char **args) {
4261 const char *verb = args[0];
4262 UnitFileChange *changes = NULL;
4263 unsigned n_changes = 0, i;
4264 int carries_install_info = -1;
4265 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
4267 _cleanup_dbus_error_free_ DBusError error;
4268 _cleanup_strv_free_ char **mangled_names = NULL;
4270 dbus_error_init(&error);
4272 r = enable_sysv_units(args);
4279 r = mangle_names(args+1, &mangled_names);
4283 if (!bus || avoid_bus()) {
4284 if (streq(verb, "enable")) {
4285 r = unit_file_enable(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4286 carries_install_info = r;
4287 } else if (streq(verb, "disable"))
4288 r = unit_file_disable(arg_scope, arg_runtime, arg_root, mangled_names, &changes, &n_changes);
4289 else if (streq(verb, "reenable")) {
4290 r = unit_file_reenable(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4291 carries_install_info = r;
4292 } else if (streq(verb, "link"))
4293 r = unit_file_link(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4294 else if (streq(verb, "preset")) {
4295 r = unit_file_preset(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4296 carries_install_info = r;
4297 } else if (streq(verb, "mask"))
4298 r = unit_file_mask(arg_scope, arg_runtime, arg_root, mangled_names, arg_force, &changes, &n_changes);
4299 else if (streq(verb, "unmask"))
4300 r = unit_file_unmask(arg_scope, arg_runtime, arg_root, mangled_names, &changes, &n_changes);
4301 else if (streq(verb, "set-default"))
4302 r = unit_file_set_default(arg_scope, arg_root, args[1], &changes, &n_changes);
4304 assert_not_reached("Unknown verb");
4307 log_error("Operation failed: %s", strerror(-r));
4312 for (i = 0; i < n_changes; i++) {
4313 if (changes[i].type == UNIT_FILE_SYMLINK)
4314 log_info("ln -s '%s' '%s'", changes[i].source, changes[i].path);
4316 log_info("rm '%s'", changes[i].path);
4323 bool send_force = true, expect_carries_install_info = false;
4325 DBusMessageIter iter, sub, sub2;
4327 if (streq(verb, "enable")) {
4328 method = "EnableUnitFiles";
4329 expect_carries_install_info = true;
4330 } else if (streq(verb, "disable")) {
4331 method = "DisableUnitFiles";
4333 } else if (streq(verb, "reenable")) {
4334 method = "ReenableUnitFiles";
4335 expect_carries_install_info = true;
4336 } else if (streq(verb, "link"))
4337 method = "LinkUnitFiles";
4338 else if (streq(verb, "preset")) {
4339 method = "PresetUnitFiles";
4340 expect_carries_install_info = true;
4341 } else if (streq(verb, "mask"))
4342 method = "MaskUnitFiles";
4343 else if (streq(verb, "unmask")) {
4344 method = "UnmaskUnitFiles";
4346 } else if (streq(verb, "set-default")) {
4347 method = "SetDefaultTarget";
4349 assert_not_reached("Unknown verb");
4351 m = dbus_message_new_method_call(
4352 "org.freedesktop.systemd1",
4353 "/org/freedesktop/systemd1",
4354 "org.freedesktop.systemd1.Manager",
4361 dbus_message_iter_init_append(m, &iter);
4363 r = bus_append_strv_iter(&iter, mangled_names);
4365 log_error("Failed to append unit files.");
4370 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &a)) {
4371 log_error("Failed to append runtime boolean.");
4379 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b)) {
4380 log_error("Failed to append force boolean.");
4386 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
4388 log_error("Failed to issue method call: %s", bus_error_message(&error));
4393 if (!dbus_message_iter_init(reply, &iter)) {
4394 log_error("Failed to initialize iterator.");
4398 if (expect_carries_install_info) {
4399 r = bus_iter_get_basic_and_next(&iter, DBUS_TYPE_BOOLEAN, &b, true);
4401 log_error("Failed to parse reply.");
4405 carries_install_info = b;
4408 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
4409 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
4410 log_error("Failed to parse reply.");
4415 dbus_message_iter_recurse(&iter, &sub);
4416 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
4417 const char *type, *path, *source;
4419 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
4420 log_error("Failed to parse reply.");
4425 dbus_message_iter_recurse(&sub, &sub2);
4427 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
4428 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0 ||
4429 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &source, false) < 0) {
4430 log_error("Failed to parse reply.");
4436 if (streq(type, "symlink"))
4437 log_info("ln -s '%s' '%s'", source, path);
4439 log_info("rm '%s'", path);
4442 dbus_message_iter_next(&sub);
4445 /* Try to reload if enabeld */
4447 r = daemon_reload(bus, args);
4450 if (carries_install_info == 0)
4451 log_warning("The unit files have no [Install] section. They are not meant to be enabled\n"
4452 "using systemctl.\n"
4453 "Possible reasons for having this kind of units are:\n"
4454 "1) A unit may be statically enabled by being symlinked from another unit's\n"
4455 " .wants/ or .requires/ directory.\n"
4456 "2) A unit's purpose may be to act as a helper for some other unit which has\n"
4457 " a requirement dependency on it.\n"
4458 "3) A unit may be started when needed via activation (socket, path, timer,\n"
4459 " D-Bus, udev, scripted systemctl call, ...).\n");
4462 unit_file_changes_free(changes, n_changes);
4467 static int set_log_level(DBusConnection *bus, char **args) {
4468 _cleanup_dbus_error_free_ DBusError error;
4469 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
4470 DBusMessageIter iter, sub;
4471 const char* property = "LogLevel";
4472 const char* interface = "org.freedesktop.systemd1.Manager";
4479 dbus_error_init(&error);
4481 m = dbus_message_new_method_call("org.freedesktop.systemd1",
4482 "/org/freedesktop/systemd1",
4483 "org.freedesktop.DBus.Properties",
4488 dbus_message_iter_init_append(m, &iter);
4490 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &interface) ||
4491 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &property) ||
4492 !dbus_message_iter_open_container(&iter, DBUS_TYPE_VARIANT, "s", &sub))
4495 if (!dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &value)) {
4496 dbus_message_iter_abandon_container(&iter, &sub);
4500 if (!dbus_message_iter_close_container(&iter, &sub))
4503 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
4505 log_error("Failed to issue method call: %s", bus_error_message(&error));
4512 static int unit_is_enabled(DBusConnection *bus, char **args) {
4513 _cleanup_dbus_error_free_ DBusError error;
4515 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
4520 dbus_error_init(&error);
4522 r = enable_sysv_units(args);
4528 if (!bus || avoid_bus()) {
4530 STRV_FOREACH(name, args+1) {
4531 UnitFileState state;
4533 n = unit_name_mangle(*name);
4537 state = unit_file_get_state(arg_scope, arg_root, n);
4544 if (state == UNIT_FILE_ENABLED ||
4545 state == UNIT_FILE_ENABLED_RUNTIME ||
4546 state == UNIT_FILE_STATIC)
4550 puts(unit_file_state_to_string(state));
4554 STRV_FOREACH(name, args+1) {
4557 n = unit_name_mangle(*name);
4561 r = bus_method_call_with_reply (
4563 "org.freedesktop.systemd1",
4564 "/org/freedesktop/systemd1",
4565 "org.freedesktop.systemd1.Manager",
4569 DBUS_TYPE_STRING, &n,
4577 if (!dbus_message_get_args(reply, &error,
4578 DBUS_TYPE_STRING, &s,
4579 DBUS_TYPE_INVALID)) {
4580 log_error("Failed to parse reply: %s", bus_error_message(&error));
4584 dbus_message_unref(reply);
4587 if (streq(s, "enabled") ||
4588 streq(s, "enabled-runtime") ||
4597 return enabled ? 0 : 1;
4600 static int systemctl_help(void) {
4602 pager_open_if_enabled();
4604 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4605 "Query or send control commands to the systemd manager.\n\n"
4606 " -h --help Show this help\n"
4607 " --version Show package version\n"
4608 " -t --type=TYPE List only units of a particular type\n"
4609 " -p --property=NAME Show only properties by this name\n"
4610 " -a --all Show all loaded units/properties, including dead/empty\n"
4611 " ones. To list all units installed on the system, use\n"
4612 " the 'list-unit-files' command instead.\n"
4613 " --reverse Show reverse dependencies with 'list-dependencies'\n"
4614 " --failed Show only failed units\n"
4615 " -l --full Don't ellipsize unit names on output\n"
4616 " --fail When queueing a new job, fail if conflicting jobs are\n"
4618 " --irreversible Create jobs which cannot be implicitly cancelled\n"
4619 " --show-types When showing sockets, explicitly show their type\n"
4620 " --ignore-dependencies\n"
4621 " When queueing a new job, ignore all its dependencies\n"
4622 " -i --ignore-inhibitors\n"
4623 " When shutting down or sleeping, ignore inhibitors\n"
4624 " --kill-who=WHO Who to send signal to\n"
4625 " -s --signal=SIGNAL Which signal to send\n"
4626 " -H --host=[USER@]HOST\n"
4627 " Show information for remote host\n"
4628 " -P --privileged Acquire privileges before execution\n"
4629 " -q --quiet Suppress output\n"
4630 " --no-block Do not wait until operation finished\n"
4631 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4632 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4634 " --no-legend Do not print a legend (column headers and hints)\n"
4635 " --no-pager Do not pipe output into a pager\n"
4636 " --no-ask-password\n"
4637 " Do not ask for system passwords\n"
4638 " --system Connect to system manager\n"
4639 " --user Connect to user service manager\n"
4640 " --global Enable/disable unit files globally\n"
4641 " -f --force When enabling unit files, override existing symlinks\n"
4642 " When shutting down, execute action immediately\n"
4643 " --root=PATH Enable unit files in the specified root directory\n"
4644 " --runtime Enable unit files only temporarily until next reboot\n"
4645 " -n --lines=INTEGER Journal entries to show\n"
4646 " -o --output=STRING Change journal output mode (short, short-monotonic,\n"
4647 " verbose, export, json, json-pretty, json-sse, cat)\n\n"
4649 " list-units List loaded units\n"
4650 " list-sockets List loaded sockets ordered by address\n"
4651 " start [NAME...] Start (activate) one or more units\n"
4652 " stop [NAME...] Stop (deactivate) one or more units\n"
4653 " reload [NAME...] Reload one or more units\n"
4654 " restart [NAME...] Start or restart one or more units\n"
4655 " try-restart [NAME...] Restart one or more units if active\n"
4656 " reload-or-restart [NAME...] Reload one or more units if possible,\n"
4657 " otherwise start or restart\n"
4658 " reload-or-try-restart [NAME...] Reload one or more units if possible,\n"
4659 " otherwise restart if active\n"
4660 " isolate [NAME] Start one unit and stop all others\n"
4661 " kill [NAME...] Send signal to processes of a unit\n"
4662 " is-active [NAME...] Check whether units are active\n"
4663 " is-failed [NAME...] Check whether units are failed\n"
4664 " status [NAME...|PID...] Show runtime status of one or more units\n"
4665 " show [NAME...|JOB...] Show properties of one or more\n"
4666 " units/jobs or the manager\n"
4667 " help [NAME...|PID...] Show manual for one or more units\n"
4668 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4670 " get-cgroup-attr [NAME] [ATTR] ...\n"
4671 " Get control group attrubute\n"
4672 " set-cgroup-attr [NAME] [ATTR] [VALUE] ...\n"
4673 " Set control group attribute\n"
4674 " unset-cgroup-attr [NAME] [ATTR...]\n"
4675 " Unset control group attribute\n"
4676 " set-cgroup [NAME] [CGROUP...] Add unit to a control group\n"
4677 " unset-cgroup [NAME] [CGROUP...] Remove unit from a control group\n"
4678 " load [NAME...] Load one or more units\n"
4679 " list-dependencies [NAME] Recursively show units which are required\n"
4680 " or wanted by this unit or by which this\n"
4681 " unit is required or wanted\n\n"
4682 "Unit File Commands:\n"
4683 " list-unit-files List installed unit files\n"
4684 " enable [NAME...] Enable one or more unit files\n"
4685 " disable [NAME...] Disable one or more unit files\n"
4686 " reenable [NAME...] Reenable one or more unit files\n"
4687 " preset [NAME...] Enable/disable one or more unit files\n"
4688 " based on preset configuration\n"
4689 " mask [NAME...] Mask one or more units\n"
4690 " unmask [NAME...] Unmask one or more units\n"
4691 " link [PATH...] Link one or more units files into\n"
4692 " the search path\n"
4693 " get-default Get the name of the default target\n"
4694 " set-default NAME Set the default target\n"
4695 " is-enabled [NAME...] Check whether unit files are enabled\n\n"
4697 " list-jobs List jobs\n"
4698 " cancel [JOB...] Cancel all, one, or more jobs\n\n"
4699 "Status Commands:\n"
4700 " dump Dump server status\n"
4701 "Snapshot Commands:\n"
4702 " snapshot [NAME] Create a snapshot\n"
4703 " delete [NAME...] Remove one or more snapshots\n\n"
4704 "Environment Commands:\n"
4705 " show-environment Dump environment\n"
4706 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4707 " unset-environment [NAME...] Unset one or more environment variables\n"
4708 " set-log-level LEVEL Set logging threshold for systemd\n\n"
4709 "Manager Lifecycle Commands:\n"
4710 " daemon-reload Reload systemd manager configuration\n"
4711 " daemon-reexec Reexecute systemd manager\n\n"
4712 "System Commands:\n"
4713 " default Enter system default mode\n"
4714 " rescue Enter system rescue mode\n"
4715 " emergency Enter system emergency mode\n"
4716 " halt Shut down and halt the system\n"
4717 " poweroff Shut down and power-off the system\n"
4718 " reboot Shut down and reboot the system\n"
4719 " kexec Shut down and reboot the system with kexec\n"
4720 " exit Request user instance exit\n"
4721 " switch-root [ROOT] [INIT] Change to a different root file system\n"
4722 " suspend Suspend the system\n"
4723 " hibernate Hibernate the system\n"
4724 " hybrid-sleep Hibernate and suspend the system\n",
4725 program_invocation_short_name);
4730 static int halt_help(void) {
4732 printf("%s [OPTIONS...]\n\n"
4733 "%s the system.\n\n"
4734 " --help Show this help\n"
4735 " --halt Halt the machine\n"
4736 " -p --poweroff Switch off the machine\n"
4737 " --reboot Reboot the machine\n"
4738 " -f --force Force immediate halt/power-off/reboot\n"
4739 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4740 " -d --no-wtmp Don't write wtmp record\n"
4741 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4742 program_invocation_short_name,
4743 arg_action == ACTION_REBOOT ? "Reboot" :
4744 arg_action == ACTION_POWEROFF ? "Power off" :
4750 static int shutdown_help(void) {
4752 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4753 "Shut down the system.\n\n"
4754 " --help Show this help\n"
4755 " -H --halt Halt the machine\n"
4756 " -P --poweroff Power-off the machine\n"
4757 " -r --reboot Reboot the machine\n"
4758 " -h Equivalent to --poweroff, overridden by --halt\n"
4759 " -k Don't halt/power-off/reboot, just send warnings\n"
4760 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4761 " -c Cancel a pending shutdown\n",
4762 program_invocation_short_name);
4767 static int telinit_help(void) {
4769 printf("%s [OPTIONS...] {COMMAND}\n\n"
4770 "Send control commands to the init daemon.\n\n"
4771 " --help Show this help\n"
4772 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4774 " 0 Power-off the machine\n"
4775 " 6 Reboot the machine\n"
4776 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4777 " 1, s, S Enter rescue mode\n"
4778 " q, Q Reload init daemon configuration\n"
4779 " u, U Reexecute init daemon\n",
4780 program_invocation_short_name);
4785 static int runlevel_help(void) {
4787 printf("%s [OPTIONS...]\n\n"
4788 "Prints the previous and current runlevel of the init system.\n\n"
4789 " --help Show this help\n",
4790 program_invocation_short_name);
4795 static int help_types(void) {
4799 puts("Available unit types:");
4800 for(i = 0; i < _UNIT_TYPE_MAX; i++) {
4801 t = unit_type_to_string(i);
4806 puts("\nAvailable unit load states: ");
4807 for(i = 0; i < _UNIT_LOAD_STATE_MAX; i++) {
4808 t = unit_load_state_to_string(i);
4816 static int systemctl_parse_argv(int argc, char *argv[]) {
4825 ARG_IGNORE_DEPENDENCIES,
4837 ARG_NO_ASK_PASSWORD,
4844 static const struct option options[] = {
4845 { "help", no_argument, NULL, 'h' },
4846 { "version", no_argument, NULL, ARG_VERSION },
4847 { "type", required_argument, NULL, 't' },
4848 { "property", required_argument, NULL, 'p' },
4849 { "all", no_argument, NULL, 'a' },
4850 { "reverse", no_argument, NULL, ARG_REVERSE },
4851 { "after", no_argument, NULL, ARG_AFTER },
4852 { "before", no_argument, NULL, ARG_BEFORE },
4853 { "show-types", no_argument, NULL, ARG_SHOW_TYPES },
4854 { "failed", no_argument, NULL, ARG_FAILED },
4855 { "full", no_argument, NULL, 'l' },
4856 { "fail", no_argument, NULL, ARG_FAIL },
4857 { "irreversible", no_argument, NULL, ARG_IRREVERSIBLE },
4858 { "ignore-dependencies", no_argument, NULL, ARG_IGNORE_DEPENDENCIES },
4859 { "ignore-inhibitors", no_argument, NULL, 'i' },
4860 { "user", no_argument, NULL, ARG_USER },
4861 { "system", no_argument, NULL, ARG_SYSTEM },
4862 { "global", no_argument, NULL, ARG_GLOBAL },
4863 { "no-block", no_argument, NULL, ARG_NO_BLOCK },
4864 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
4865 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
4866 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4867 { "quiet", no_argument, NULL, 'q' },
4868 { "root", required_argument, NULL, ARG_ROOT },
4869 { "force", no_argument, NULL, ARG_FORCE },
4870 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
4871 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
4872 { "signal", required_argument, NULL, 's' },
4873 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
4874 { "host", required_argument, NULL, 'H' },
4875 { "privileged",no_argument, NULL, 'P' },
4876 { "runtime", no_argument, NULL, ARG_RUNTIME },
4877 { "lines", required_argument, NULL, 'n' },
4878 { "output", required_argument, NULL, 'o' },
4879 { "plain", no_argument, NULL, ARG_PLAIN },
4880 { NULL, 0, NULL, 0 }
4888 while ((c = getopt_long(argc, argv, "ht:p:alqfs:H:Pn:o:i", options, NULL)) >= 0) {
4897 puts(PACKAGE_STRING);
4898 puts(SYSTEMD_FEATURES);
4905 FOREACH_WORD_SEPARATOR(word, size, optarg, ",", state) {
4906 _cleanup_free_ char *type;
4908 type = strndup(word, size);
4912 if (streq(type, "help")) {
4917 if (unit_type_from_string(type) >= 0) {
4918 if (strv_push(&arg_types, type))
4924 if (unit_load_state_from_string(optarg) >= 0) {
4925 if (strv_push(&arg_load_states, type))
4931 log_error("Unknown unit type or load state '%s'.", type);
4932 log_info("Use -t help to see a list of allowed values.");
4940 /* Make sure that if the empty property list
4941 was specified, we won't show any properties. */
4942 if (isempty(optarg) && !arg_properties) {
4943 arg_properties = strv_new(NULL, NULL);
4944 if (!arg_properties)
4950 FOREACH_WORD_SEPARATOR(word, size, optarg, ",", state) {
4953 prop = strndup(word, size);
4957 if (strv_push(&arg_properties, prop)) {
4964 /* If the user asked for a particular
4965 * property, show it to him, even if it is
4977 arg_dependency = DEPENDENCY_REVERSE;
4981 arg_dependency = DEPENDENCY_AFTER;
4985 arg_dependency = DEPENDENCY_BEFORE;
4988 case ARG_SHOW_TYPES:
4989 arg_show_types = true;
4993 arg_job_mode = "fail";
4996 case ARG_IRREVERSIBLE:
4997 arg_job_mode = "replace-irreversibly";
5000 case ARG_IGNORE_DEPENDENCIES:
5001 arg_job_mode = "ignore-dependencies";
5005 arg_scope = UNIT_FILE_USER;
5009 arg_scope = UNIT_FILE_SYSTEM;
5013 arg_scope = UNIT_FILE_GLOBAL;
5017 arg_no_block = true;
5021 arg_no_legend = true;
5025 arg_no_pager = true;
5057 arg_no_reload = true;
5061 arg_kill_who = optarg;
5065 if ((arg_signal = signal_from_string_try_harder(optarg)) < 0) {
5066 log_error("Failed to parse signal string %s.", optarg);
5071 case ARG_NO_ASK_PASSWORD:
5072 arg_ask_password = false;
5076 arg_transport = TRANSPORT_POLKIT;
5080 arg_transport = TRANSPORT_SSH;
5081 parse_user_at_host(optarg, &arg_user, &arg_host);
5089 if (safe_atou(optarg, &arg_lines) < 0) {
5090 log_error("Failed to parse lines '%s'", optarg);
5096 arg_output = output_mode_from_string(optarg);
5097 if (arg_output < 0) {
5098 log_error("Unknown output '%s'.", optarg);
5104 arg_ignore_inhibitors = true;
5115 log_error("Unknown option code '%c'.", c);
5120 if (arg_transport != TRANSPORT_NORMAL && arg_scope != UNIT_FILE_SYSTEM) {
5121 log_error("Cannot access user instance remotely.");
5128 static int halt_parse_argv(int argc, char *argv[]) {
5137 static const struct option options[] = {
5138 { "help", no_argument, NULL, ARG_HELP },
5139 { "halt", no_argument, NULL, ARG_HALT },
5140 { "poweroff", no_argument, NULL, 'p' },
5141 { "reboot", no_argument, NULL, ARG_REBOOT },
5142 { "force", no_argument, NULL, 'f' },
5143 { "wtmp-only", no_argument, NULL, 'w' },
5144 { "no-wtmp", no_argument, NULL, 'd' },
5145 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5146 { NULL, 0, NULL, 0 }
5154 if (utmp_get_runlevel(&runlevel, NULL) >= 0)
5155 if (runlevel == '0' || runlevel == '6')
5158 while ((c = getopt_long(argc, argv, "pfwdnih", options, NULL)) >= 0) {
5166 arg_action = ACTION_HALT;
5170 if (arg_action != ACTION_REBOOT)
5171 arg_action = ACTION_POWEROFF;
5175 arg_action = ACTION_REBOOT;
5197 /* Compatibility nops */
5204 log_error("Unknown option code '%c'.", c);
5209 if (optind < argc) {
5210 log_error("Too many arguments.");
5217 static int parse_time_spec(const char *t, usec_t *_u) {
5221 if (streq(t, "now"))
5223 else if (!strchr(t, ':')) {
5226 if (safe_atou64(t, &u) < 0)
5229 *_u = now(CLOCK_REALTIME) + USEC_PER_MINUTE * u;
5238 hour = strtol(t, &e, 10);
5239 if (errno > 0 || *e != ':' || hour < 0 || hour > 23)
5242 minute = strtol(e+1, &e, 10);
5243 if (errno > 0 || *e != 0 || minute < 0 || minute > 59)
5246 n = now(CLOCK_REALTIME);
5247 s = (time_t) (n / USEC_PER_SEC);
5249 assert_se(localtime_r(&s, &tm));
5251 tm.tm_hour = (int) hour;
5252 tm.tm_min = (int) minute;
5255 assert_se(s = mktime(&tm));
5257 *_u = (usec_t) s * USEC_PER_SEC;
5260 *_u += USEC_PER_DAY;
5266 static int shutdown_parse_argv(int argc, char *argv[]) {
5273 static const struct option options[] = {
5274 { "help", no_argument, NULL, ARG_HELP },
5275 { "halt", no_argument, NULL, 'H' },
5276 { "poweroff", no_argument, NULL, 'P' },
5277 { "reboot", no_argument, NULL, 'r' },
5278 { "kexec", no_argument, NULL, 'K' }, /* not documented extension */
5279 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5280 { NULL, 0, NULL, 0 }
5288 while ((c = getopt_long(argc, argv, "HPrhkt:afFc", options, NULL)) >= 0) {
5296 arg_action = ACTION_HALT;
5300 arg_action = ACTION_POWEROFF;
5305 arg_action = ACTION_KEXEC;
5307 arg_action = ACTION_REBOOT;
5311 arg_action = ACTION_KEXEC;
5315 if (arg_action != ACTION_HALT)
5316 arg_action = ACTION_POWEROFF;
5329 /* Compatibility nops */
5333 arg_action = ACTION_CANCEL_SHUTDOWN;
5340 log_error("Unknown option code '%c'.", c);
5345 if (argc > optind && arg_action != ACTION_CANCEL_SHUTDOWN) {
5346 r = parse_time_spec(argv[optind], &arg_when);
5348 log_error("Failed to parse time specification: %s", argv[optind]);
5352 arg_when = now(CLOCK_REALTIME) + USEC_PER_MINUTE;
5354 if (argc > optind && arg_action == ACTION_CANCEL_SHUTDOWN)
5355 /* No time argument for shutdown cancel */
5356 arg_wall = argv + optind;
5357 else if (argc > optind + 1)
5358 /* We skip the time argument */
5359 arg_wall = argv + optind + 1;
5366 static int telinit_parse_argv(int argc, char *argv[]) {
5373 static const struct option options[] = {
5374 { "help", no_argument, NULL, ARG_HELP },
5375 { "no-wall", no_argument, NULL, ARG_NO_WALL },
5376 { NULL, 0, NULL, 0 }
5379 static const struct {
5383 { '0', ACTION_POWEROFF },
5384 { '6', ACTION_REBOOT },
5385 { '1', ACTION_RESCUE },
5386 { '2', ACTION_RUNLEVEL2 },
5387 { '3', ACTION_RUNLEVEL3 },
5388 { '4', ACTION_RUNLEVEL4 },
5389 { '5', ACTION_RUNLEVEL5 },
5390 { 's', ACTION_RESCUE },
5391 { 'S', ACTION_RESCUE },
5392 { 'q', ACTION_RELOAD },
5393 { 'Q', ACTION_RELOAD },
5394 { 'u', ACTION_REEXEC },
5395 { 'U', ACTION_REEXEC }
5404 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5419 log_error("Unknown option code '%c'.", c);
5424 if (optind >= argc) {
5429 if (optind + 1 < argc) {
5430 log_error("Too many arguments.");
5434 if (strlen(argv[optind]) != 1) {
5435 log_error("Expected single character argument.");
5439 for (i = 0; i < ELEMENTSOF(table); i++)
5440 if (table[i].from == argv[optind][0])
5443 if (i >= ELEMENTSOF(table)) {
5444 log_error("Unknown command '%s'.", argv[optind]);
5448 arg_action = table[i].to;
5455 static int runlevel_parse_argv(int argc, char *argv[]) {
5461 static const struct option options[] = {
5462 { "help", no_argument, NULL, ARG_HELP },
5463 { NULL, 0, NULL, 0 }
5471 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5482 log_error("Unknown option code '%c'.", c);
5487 if (optind < argc) {
5488 log_error("Too many arguments.");
5495 static int parse_argv(int argc, char *argv[]) {
5499 if (program_invocation_short_name) {
5501 if (strstr(program_invocation_short_name, "halt")) {
5502 arg_action = ACTION_HALT;
5503 return halt_parse_argv(argc, argv);
5504 } else if (strstr(program_invocation_short_name, "poweroff")) {
5505 arg_action = ACTION_POWEROFF;
5506 return halt_parse_argv(argc, argv);
5507 } else if (strstr(program_invocation_short_name, "reboot")) {
5509 arg_action = ACTION_KEXEC;
5511 arg_action = ACTION_REBOOT;
5512 return halt_parse_argv(argc, argv);
5513 } else if (strstr(program_invocation_short_name, "shutdown")) {
5514 arg_action = ACTION_POWEROFF;
5515 return shutdown_parse_argv(argc, argv);
5516 } else if (strstr(program_invocation_short_name, "init")) {
5518 if (sd_booted() > 0) {
5519 arg_action = ACTION_INVALID;
5520 return telinit_parse_argv(argc, argv);
5522 /* Hmm, so some other init system is
5523 * running, we need to forward this
5524 * request to it. For now we simply
5525 * guess that it is Upstart. */
5527 execv(TELINIT, argv);
5529 log_error("Couldn't find an alternative telinit implementation to spawn.");
5533 } else if (strstr(program_invocation_short_name, "runlevel")) {
5534 arg_action = ACTION_RUNLEVEL;
5535 return runlevel_parse_argv(argc, argv);
5539 arg_action = ACTION_SYSTEMCTL;
5540 return systemctl_parse_argv(argc, argv);
5543 _pure_ static int action_to_runlevel(void) {
5545 static const char table[_ACTION_MAX] = {
5546 [ACTION_HALT] = '0',
5547 [ACTION_POWEROFF] = '0',
5548 [ACTION_REBOOT] = '6',
5549 [ACTION_RUNLEVEL2] = '2',
5550 [ACTION_RUNLEVEL3] = '3',
5551 [ACTION_RUNLEVEL4] = '4',
5552 [ACTION_RUNLEVEL5] = '5',
5553 [ACTION_RESCUE] = '1'
5556 assert(arg_action < _ACTION_MAX);
5558 return table[arg_action];
5561 static int talk_upstart(void) {
5562 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
5563 _cleanup_dbus_error_free_ DBusError error;
5564 int previous, rl, r;
5566 env1_buf[] = "RUNLEVEL=X",
5567 env2_buf[] = "PREVLEVEL=X";
5568 char *env1 = env1_buf, *env2 = env2_buf;
5569 const char *emit = "runlevel";
5570 dbus_bool_t b_false = FALSE;
5571 DBusMessageIter iter, sub;
5572 DBusConnection *bus;
5574 dbus_error_init(&error);
5576 if (!(rl = action_to_runlevel()))
5579 if (utmp_get_runlevel(&previous, NULL) < 0)
5582 if (!(bus = dbus_connection_open_private("unix:abstract=/com/ubuntu/upstart", &error))) {
5583 if (dbus_error_has_name(&error, DBUS_ERROR_NO_SERVER)) {
5588 log_error("Failed to connect to Upstart bus: %s", bus_error_message(&error));
5593 if ((r = bus_check_peercred(bus)) < 0) {
5594 log_error("Failed to verify owner of bus.");
5598 if (!(m = dbus_message_new_method_call(
5599 "com.ubuntu.Upstart",
5600 "/com/ubuntu/Upstart",
5601 "com.ubuntu.Upstart0_6",
5604 log_error("Could not allocate message.");
5609 dbus_message_iter_init_append(m, &iter);
5611 env1_buf[sizeof(env1_buf)-2] = rl;
5612 env2_buf[sizeof(env2_buf)-2] = previous;
5614 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &emit) ||
5615 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub) ||
5616 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env1) ||
5617 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env2) ||
5618 !dbus_message_iter_close_container(&iter, &sub) ||
5619 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b_false)) {
5620 log_error("Could not append arguments to message.");
5625 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
5627 if (bus_error_is_no_service(&error)) {
5632 log_error("Failed to issue method call: %s", bus_error_message(&error));
5641 dbus_connection_flush(bus);
5642 dbus_connection_close(bus);
5643 dbus_connection_unref(bus);
5649 static int talk_initctl(void) {
5650 struct init_request request = {};
5652 _cleanup_close_ int fd = -1;
5655 rl = action_to_runlevel();
5659 request.magic = INIT_MAGIC;
5660 request.sleeptime = 0;
5661 request.cmd = INIT_CMD_RUNLVL;
5662 request.runlevel = rl;
5664 fd = open(INIT_FIFO, O_WRONLY|O_NDELAY|O_CLOEXEC|O_NOCTTY);
5666 if (errno == ENOENT)
5669 log_error("Failed to open "INIT_FIFO": %m");
5674 r = loop_write(fd, &request, sizeof(request), false) != sizeof(request);
5676 log_error("Failed to write to "INIT_FIFO": %m");
5677 return errno > 0 ? -errno : -EIO;
5683 static int systemctl_main(DBusConnection *bus, int argc, char *argv[], DBusError *error) {
5685 static const struct {
5693 int (* const dispatch)(DBusConnection *bus, char **args);
5695 { "list-units", LESS, 1, list_units },
5696 { "list-unit-files", EQUAL, 1, list_unit_files },
5697 { "list-sockets", LESS, 1, list_sockets },
5698 { "list-jobs", EQUAL, 1, list_jobs },
5699 { "clear-jobs", EQUAL, 1, daemon_reload },
5700 { "load", MORE, 2, load_unit },
5701 { "cancel", MORE, 2, cancel_job },
5702 { "start", MORE, 2, start_unit },
5703 { "stop", MORE, 2, start_unit },
5704 { "condstop", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5705 { "reload", MORE, 2, start_unit },
5706 { "restart", MORE, 2, start_unit },
5707 { "try-restart", MORE, 2, start_unit },
5708 { "reload-or-restart", MORE, 2, start_unit },
5709 { "reload-or-try-restart", MORE, 2, start_unit },
5710 { "force-reload", MORE, 2, start_unit }, /* For compatibility with SysV */
5711 { "condreload", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5712 { "condrestart", MORE, 2, start_unit }, /* For compatibility with RH */
5713 { "isolate", EQUAL, 2, start_unit },
5714 { "set-cgroup", MORE, 3, set_cgroup },
5715 { "unset-cgroup", MORE, 3, set_cgroup },
5716 { "get-cgroup-attr", MORE, 3, get_cgroup_attr },
5717 { "set-cgroup-attr", MORE, 4, set_cgroup_attr },
5718 { "unset-cgroup-attr", MORE, 3, set_cgroup },
5719 { "kill", MORE, 2, kill_unit },
5720 { "is-active", MORE, 2, check_unit_active },
5721 { "check", MORE, 2, check_unit_active },
5722 { "is-failed", MORE, 2, check_unit_failed },
5723 { "show", MORE, 1, show },
5724 { "status", MORE, 1, show },
5725 { "help", MORE, 2, show },
5726 { "dump", EQUAL, 1, dump },
5727 { "snapshot", LESS, 2, snapshot },
5728 { "delete", MORE, 2, delete_snapshot },
5729 { "daemon-reload", EQUAL, 1, daemon_reload },
5730 { "daemon-reexec", EQUAL, 1, daemon_reload },
5731 { "show-environment", EQUAL, 1, show_enviroment },
5732 { "set-environment", MORE, 2, set_environment },
5733 { "unset-environment", MORE, 2, set_environment },
5734 { "halt", EQUAL, 1, start_special },
5735 { "poweroff", EQUAL, 1, start_special },
5736 { "reboot", EQUAL, 1, start_special },
5737 { "kexec", EQUAL, 1, start_special },
5738 { "suspend", EQUAL, 1, start_special },
5739 { "hibernate", EQUAL, 1, start_special },
5740 { "hybrid-sleep", EQUAL, 1, start_special },
5741 { "default", EQUAL, 1, start_special },
5742 { "rescue", EQUAL, 1, start_special },
5743 { "emergency", EQUAL, 1, start_special },
5744 { "exit", EQUAL, 1, start_special },
5745 { "reset-failed", MORE, 1, reset_failed },
5746 { "enable", MORE, 2, enable_unit },
5747 { "disable", MORE, 2, enable_unit },
5748 { "is-enabled", MORE, 2, unit_is_enabled },
5749 { "reenable", MORE, 2, enable_unit },
5750 { "preset", MORE, 2, enable_unit },
5751 { "mask", MORE, 2, enable_unit },
5752 { "unmask", MORE, 2, enable_unit },
5753 { "link", MORE, 2, enable_unit },
5754 { "switch-root", MORE, 2, switch_root },
5755 { "list-dependencies", LESS, 2, list_dependencies },
5756 { "set-default", EQUAL, 2, enable_unit },
5757 { "get-default", LESS, 1, get_default },
5758 { "set-log-level", EQUAL, 2, set_log_level },
5768 left = argc - optind;
5771 /* Special rule: no arguments means "list-units" */
5774 if (streq(argv[optind], "help") && !argv[optind+1]) {
5775 log_error("This command expects one or more "
5776 "unit names. Did you mean --help?");
5780 for (i = 0; i < ELEMENTSOF(verbs); i++)
5781 if (streq(argv[optind], verbs[i].verb))
5784 if (i >= ELEMENTSOF(verbs)) {
5785 log_error("Unknown operation '%s'.", argv[optind]);
5790 switch (verbs[i].argc_cmp) {
5793 if (left != verbs[i].argc) {
5794 log_error("Invalid number of arguments.");
5801 if (left < verbs[i].argc) {
5802 log_error("Too few arguments.");
5809 if (left > verbs[i].argc) {
5810 log_error("Too many arguments.");
5817 assert_not_reached("Unknown comparison operator.");
5820 /* Require a bus connection for all operations but
5822 if (!streq(verbs[i].verb, "enable") &&
5823 !streq(verbs[i].verb, "disable") &&
5824 !streq(verbs[i].verb, "is-enabled") &&
5825 !streq(verbs[i].verb, "list-unit-files") &&
5826 !streq(verbs[i].verb, "reenable") &&
5827 !streq(verbs[i].verb, "preset") &&
5828 !streq(verbs[i].verb, "mask") &&
5829 !streq(verbs[i].verb, "unmask") &&
5830 !streq(verbs[i].verb, "link") &&
5831 !streq(verbs[i].verb, "set-default") &&
5832 !streq(verbs[i].verb, "get-default")) {
5834 if (running_in_chroot() > 0) {
5835 log_info("Running in chroot, ignoring request.");
5839 if (((!streq(verbs[i].verb, "reboot") &&
5840 !streq(verbs[i].verb, "halt") &&
5841 !streq(verbs[i].verb, "poweroff")) || arg_force <= 0) && !bus) {
5842 log_error("Failed to get D-Bus connection: %s",
5843 dbus_error_is_set(error) ? error->message : "No connection to service manager.");
5849 if (!bus && !avoid_bus()) {
5850 log_error("Failed to get D-Bus connection: %s",
5851 dbus_error_is_set(error) ? error->message : "No connection to service manager.");
5856 return verbs[i].dispatch(bus, argv + optind);
5859 static int send_shutdownd(usec_t t, char mode, bool dry_run, bool warn, const char *message) {
5860 _cleanup_close_ int fd;
5861 struct sd_shutdown_command c = {
5867 union sockaddr_union sockaddr = {
5868 .un.sun_family = AF_UNIX,
5869 .un.sun_path = "/run/systemd/shutdownd",
5871 struct iovec iovec[2] = {
5872 {.iov_base = (char*) &c,
5873 .iov_len = offsetof(struct sd_shutdown_command, wall_message),
5876 struct msghdr msghdr = {
5877 .msg_name = &sockaddr,
5878 .msg_namelen = offsetof(struct sockaddr_un, sun_path)
5879 + sizeof("/run/systemd/shutdownd") - 1,
5884 fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0);
5888 if (!isempty(message)) {
5889 iovec[1].iov_base = (char*) message;
5890 iovec[1].iov_len = strlen(message);
5891 msghdr.msg_iovlen++;
5894 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0)
5900 static int reload_with_fallback(DBusConnection *bus) {
5903 /* First, try systemd via D-Bus. */
5904 if (daemon_reload(bus, NULL) >= 0)
5908 /* Nothing else worked, so let's try signals */
5909 assert(arg_action == ACTION_RELOAD || arg_action == ACTION_REEXEC);
5911 if (kill(1, arg_action == ACTION_RELOAD ? SIGHUP : SIGTERM) < 0) {
5912 log_error("kill() failed: %m");
5919 static int start_with_fallback(DBusConnection *bus) {
5922 /* First, try systemd via D-Bus. */
5923 if (start_unit(bus, NULL) >= 0)
5927 /* Hmm, talking to systemd via D-Bus didn't work. Then
5928 * let's try to talk to Upstart via D-Bus. */
5929 if (talk_upstart() > 0)
5932 /* Nothing else worked, so let's try
5934 if (talk_initctl() > 0)
5937 log_error("Failed to talk to init daemon.");
5941 warn_wall(arg_action);
5945 static _noreturn_ void halt_now(enum action a) {
5947 /* Make sure C-A-D is handled by the kernel from this
5949 reboot(RB_ENABLE_CAD);
5954 log_info("Halting.");
5955 reboot(RB_HALT_SYSTEM);
5958 case ACTION_POWEROFF:
5959 log_info("Powering off.");
5960 reboot(RB_POWER_OFF);
5964 log_info("Rebooting.");
5965 reboot(RB_AUTOBOOT);
5969 assert_not_reached("Unknown halt action.");
5972 assert_not_reached("Uh? This shouldn't happen.");
5975 static int halt_main(DBusConnection *bus) {
5978 r = check_inhibitors(bus, arg_action);
5982 if (geteuid() != 0) {
5983 /* Try logind if we are a normal user and no special
5984 * mode applies. Maybe PolicyKit allows us to shutdown
5987 if (arg_when <= 0 &&
5990 (arg_action == ACTION_POWEROFF ||
5991 arg_action == ACTION_REBOOT)) {
5992 r = reboot_with_logind(bus, arg_action);
5997 log_error("Must be root.");
6002 _cleanup_free_ char *m;
6004 m = strv_join(arg_wall, " ");
6005 r = send_shutdownd(arg_when,
6006 arg_action == ACTION_HALT ? 'H' :
6007 arg_action == ACTION_POWEROFF ? 'P' :
6008 arg_action == ACTION_KEXEC ? 'K' :
6015 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r));
6017 char date[FORMAT_TIMESTAMP_MAX];
6019 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
6020 format_timestamp(date, sizeof(date), arg_when));
6025 if (!arg_dry && !arg_force)
6026 return start_with_fallback(bus);
6029 if (sd_booted() > 0)
6030 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
6032 r = utmp_put_shutdown();
6034 log_warning("Failed to write utmp record: %s", strerror(-r));
6041 halt_now(arg_action);
6042 /* We should never reach this. */
6046 static int runlevel_main(void) {
6047 int r, runlevel, previous;
6049 r = utmp_get_runlevel(&runlevel, &previous);
6056 previous <= 0 ? 'N' : previous,
6057 runlevel <= 0 ? 'N' : runlevel);
6062 int main(int argc, char*argv[]) {
6063 int r, retval = EXIT_FAILURE;
6064 DBusConnection *bus = NULL;
6065 _cleanup_dbus_error_free_ DBusError error;
6067 dbus_error_init(&error);
6069 setlocale(LC_ALL, "");
6070 log_parse_environment();
6073 r = parse_argv(argc, argv);
6077 retval = EXIT_SUCCESS;
6081 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
6082 * let's shortcut this */
6083 if (arg_action == ACTION_RUNLEVEL) {
6084 r = runlevel_main();
6085 retval = r < 0 ? EXIT_FAILURE : r;
6089 if (running_in_chroot() > 0 && arg_action != ACTION_SYSTEMCTL) {
6090 log_info("Running in chroot, ignoring request.");
6096 if (arg_transport == TRANSPORT_NORMAL)
6097 bus_connect(arg_scope == UNIT_FILE_SYSTEM ? DBUS_BUS_SYSTEM : DBUS_BUS_SESSION, &bus, &private_bus, &error);
6098 else if (arg_transport == TRANSPORT_POLKIT) {
6099 bus_connect_system_polkit(&bus, &error);
6100 private_bus = false;
6101 } else if (arg_transport == TRANSPORT_SSH) {
6102 bus_connect_system_ssh(arg_user, arg_host, &bus, &error);
6103 private_bus = false;
6105 assert_not_reached("Uh, invalid transport...");
6108 switch (arg_action) {
6110 case ACTION_SYSTEMCTL:
6111 r = systemctl_main(bus, argc, argv, &error);
6115 case ACTION_POWEROFF:
6121 case ACTION_RUNLEVEL2:
6122 case ACTION_RUNLEVEL3:
6123 case ACTION_RUNLEVEL4:
6124 case ACTION_RUNLEVEL5:
6126 case ACTION_EMERGENCY:
6127 case ACTION_DEFAULT:
6128 r = start_with_fallback(bus);
6133 r = reload_with_fallback(bus);
6136 case ACTION_CANCEL_SHUTDOWN: {
6140 m = strv_join(arg_wall, " ");
6142 retval = EXIT_FAILURE;
6146 r = send_shutdownd(arg_when, SD_SHUTDOWN_NONE, false, !arg_no_wall, m);
6148 log_warning("Failed to talk to shutdownd, shutdown hasn't been cancelled: %s", strerror(-r));
6153 case ACTION_INVALID:
6154 case ACTION_RUNLEVEL:
6156 assert_not_reached("Unknown action");
6159 retval = r < 0 ? EXIT_FAILURE : r;
6163 dbus_connection_flush(bus);
6164 dbus_connection_close(bus);
6165 dbus_connection_unref(bus);
6170 strv_free(arg_types);
6171 strv_free(arg_load_states);
6172 strv_free(arg_properties);
6175 ask_password_agent_close();
6176 polkit_agent_close();