1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/reboot.h>
29 #include <sys/ioctl.h>
33 #include <sys/socket.h>
36 #include <sys/prctl.h>
37 #include <dbus/dbus.h>
39 #include <systemd/sd-daemon.h>
40 #include <systemd/sd-shutdown.h>
41 #include <systemd/sd-login.h>
47 #include "utmp-wtmp.h"
50 #include "path-util.h"
52 #include "dbus-common.h"
53 #include "cgroup-show.h"
54 #include "cgroup-util.h"
56 #include "path-lookup.h"
57 #include "conf-parser.h"
58 #include "exit-status.h"
59 #include "bus-errors.h"
61 #include "unit-name.h"
63 #include "spawn-ask-password-agent.h"
64 #include "spawn-polkit-agent.h"
66 #include "logs-show.h"
67 #include "path-util.h"
68 #include "socket-util.h"
70 static const char *arg_type = NULL;
71 static const char *arg_load_state = NULL;
72 static char **arg_property = NULL;
73 static bool arg_all = false;
74 static const char *arg_job_mode = "replace";
75 static UnitFileScope arg_scope = UNIT_FILE_SYSTEM;
76 static bool arg_no_block = false;
77 static bool arg_no_legend = false;
78 static bool arg_no_pager = false;
79 static bool arg_no_wtmp = false;
80 static bool arg_no_wall = false;
81 static bool arg_no_reload = false;
82 static bool arg_ignore_inhibitors = false;
83 static bool arg_dry = false;
84 static bool arg_quiet = false;
85 static bool arg_full = false;
86 static int arg_force = 0;
87 static bool arg_ask_password = true;
88 static bool arg_failed = false;
89 static bool arg_runtime = false;
90 static char **arg_wall = NULL;
91 static const char *arg_kill_who = NULL;
92 static int arg_signal = SIGTERM;
93 static const char *arg_root = NULL;
94 static usec_t arg_when = 0;
116 ACTION_CANCEL_SHUTDOWN,
118 } arg_action = ACTION_SYSTEMCTL;
124 static enum transport {
128 } arg_transport = TRANSPORT_NORMAL;
129 static const char *arg_host = NULL;
130 static unsigned arg_lines = 10;
131 static OutputMode arg_output = OUTPUT_SHORT;
133 static bool private_bus = false;
135 static int daemon_reload(DBusConnection *bus, char **args);
136 static void halt_now(enum action a);
138 static void pager_open_if_enabled(void) {
146 static void ask_password_agent_open_if_enabled(void) {
148 /* Open the password agent as a child process if necessary */
150 if (!arg_ask_password)
153 if (arg_scope != UNIT_FILE_SYSTEM)
156 ask_password_agent_open();
160 static void polkit_agent_open_if_enabled(void) {
162 /* Open the polkit agent as a child process if necessary */
164 if (!arg_ask_password)
167 if (arg_scope != UNIT_FILE_SYSTEM)
174 static const char *ansi_highlight(bool b) {
179 return b ? ANSI_HIGHLIGHT_ON : ANSI_HIGHLIGHT_OFF;
182 static const char *ansi_highlight_red(bool b) {
187 return b ? ANSI_HIGHLIGHT_RED_ON : ANSI_HIGHLIGHT_OFF;
190 static const char *ansi_highlight_green(bool b) {
195 return b ? ANSI_HIGHLIGHT_GREEN_ON : ANSI_HIGHLIGHT_OFF;
198 static int translate_bus_error_to_exit_status(int r, const DBusError *error) {
201 if (!dbus_error_is_set(error))
204 if (dbus_error_has_name(error, DBUS_ERROR_ACCESS_DENIED) ||
205 dbus_error_has_name(error, BUS_ERROR_ONLY_BY_DEPENDENCY) ||
206 dbus_error_has_name(error, BUS_ERROR_NO_ISOLATION) ||
207 dbus_error_has_name(error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE))
208 return EXIT_NOPERMISSION;
210 if (dbus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT))
211 return EXIT_NOTINSTALLED;
213 if (dbus_error_has_name(error, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE) ||
214 dbus_error_has_name(error, BUS_ERROR_NOT_SUPPORTED))
215 return EXIT_NOTIMPLEMENTED;
217 if (dbus_error_has_name(error, BUS_ERROR_LOAD_FAILED))
218 return EXIT_NOTCONFIGURED;
226 static void warn_wall(enum action a) {
227 static const char *table[_ACTION_MAX] = {
228 [ACTION_HALT] = "The system is going down for system halt NOW!",
229 [ACTION_REBOOT] = "The system is going down for reboot NOW!",
230 [ACTION_POWEROFF] = "The system is going down for power-off NOW!",
231 [ACTION_KEXEC] = "The system is going down for kexec reboot NOW!",
232 [ACTION_RESCUE] = "The system is going down to rescue mode NOW!",
233 [ACTION_EMERGENCY] = "The system is going down to emergency mode NOW!",
234 [ACTION_CANCEL_SHUTDOWN] = "The system shutdown has been cancelled NOW!"
241 _cleanup_free_ char *p;
243 p = strv_join(arg_wall, " ");
258 utmp_wall(table[a], NULL);
261 static bool avoid_bus(void) {
263 if (running_in_chroot() > 0)
266 if (sd_booted() <= 0)
269 if (!isempty(arg_root))
272 if (arg_scope == UNIT_FILE_GLOBAL)
280 const char *description;
281 const char *load_state;
282 const char *active_state;
283 const char *sub_state;
284 const char *following;
285 const char *unit_path;
287 const char *job_type;
288 const char *job_path;
291 static int compare_unit_info(const void *a, const void *b) {
293 const struct unit_info *u = a, *v = b;
295 d1 = strrchr(u->id, '.');
296 d2 = strrchr(v->id, '.');
301 r = strcasecmp(d1, d2);
306 return strcasecmp(u->id, v->id);
309 static bool output_show_unit(const struct unit_info *u) {
313 return streq(u->active_state, "failed");
315 return (!arg_type || ((dot = strrchr(u->id, '.')) &&
316 streq(dot+1, arg_type))) &&
317 (!arg_load_state || streq(u->load_state, arg_load_state)) &&
318 (arg_all || !(streq(u->active_state, "inactive")
319 || u->following[0]) || u->job_id > 0);
322 static void output_units_list(const struct unit_info *unit_infos, unsigned c) {
323 unsigned id_len, max_id_len, active_len, sub_len, job_len, desc_len, n_shown = 0;
324 const struct unit_info *u;
327 max_id_len = sizeof("UNIT")-1;
328 active_len = sizeof("ACTIVE")-1;
329 sub_len = sizeof("SUB")-1;
330 job_len = sizeof("JOB")-1;
333 for (u = unit_infos; u < unit_infos + c; u++) {
334 if (!output_show_unit(u))
337 max_id_len = MAX(max_id_len, strlen(u->id));
338 active_len = MAX(active_len, strlen(u->active_state));
339 sub_len = MAX(sub_len, strlen(u->sub_state));
340 if (u->job_id != 0) {
341 job_len = MAX(job_len, strlen(u->job_type));
348 id_len = MIN(max_id_len, 25);
349 basic_len = 5 + id_len + 5 + active_len + sub_len;
351 basic_len += job_len + 1;
352 if (basic_len < (unsigned) columns()) {
353 unsigned extra_len, incr;
354 extra_len = columns() - basic_len;
355 /* Either UNIT already got 25, or is fully satisfied.
356 * Grant up to 25 to DESC now. */
357 incr = MIN(extra_len, 25);
360 /* split the remaining space between UNIT and DESC,
361 * but do not give UNIT more than it needs. */
363 incr = MIN(extra_len / 2, max_id_len - id_len);
365 desc_len += extra_len - incr;
371 for (u = unit_infos; u < unit_infos + c; u++) {
373 const char *on_loaded, *off_loaded;
374 const char *on_active, *off_active;
376 if (!output_show_unit(u))
379 if (!n_shown && !arg_no_legend) {
380 printf("%-*s %-6s %-*s %-*s ", id_len, "UNIT", "LOAD",
381 active_len, "ACTIVE", sub_len, "SUB");
383 printf("%-*s ", job_len, "JOB");
384 if (!arg_full && arg_no_pager)
385 printf("%.*s\n", desc_len, "DESCRIPTION");
387 printf("%s\n", "DESCRIPTION");
392 if (streq(u->load_state, "error")) {
393 on_loaded = ansi_highlight_red(true);
394 off_loaded = ansi_highlight_red(false);
396 on_loaded = off_loaded = "";
398 if (streq(u->active_state, "failed")) {
399 on_active = ansi_highlight_red(true);
400 off_active = ansi_highlight_red(false);
402 on_active = off_active = "";
404 e = arg_full ? NULL : ellipsize(u->id, id_len, 33);
406 printf("%-*s %s%-6s%s %s%-*s %-*s%s %-*s",
407 id_len, e ? e : u->id,
408 on_loaded, u->load_state, off_loaded,
409 on_active, active_len, u->active_state,
410 sub_len, u->sub_state, off_active,
411 job_count ? job_len + 1 : 0, u->job_id ? u->job_type : "");
412 if (!arg_full && arg_no_pager)
413 printf("%.*s\n", desc_len, u->description);
415 printf("%s\n", u->description);
420 if (!arg_no_legend) {
421 const char *on, *off;
424 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
425 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
426 "SUB = The low-level unit activation state, values depend on unit type.\n");
428 printf("JOB = Pending job for the unit.\n");
430 on = ansi_highlight(true);
431 off = ansi_highlight(false);
433 on = ansi_highlight_red(true);
434 off = ansi_highlight_red(false);
438 printf("%s%u loaded units listed.%s\n"
439 "To show all installed unit files use 'systemctl list-unit-files'.\n",
442 printf("%s%u loaded units listed.%s Pass --all to see loaded but inactive units, too.\n"
443 "To show all installed unit files use 'systemctl list-unit-files'.\n",
448 static int list_units(DBusConnection *bus, char **args) {
449 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
450 _cleanup_free_ struct unit_info *unit_infos = NULL;
451 DBusMessageIter iter, sub, sub2;
452 unsigned c = 0, n_units = 0;
455 pager_open_if_enabled();
457 r = bus_method_call_with_reply(
459 "org.freedesktop.systemd1",
460 "/org/freedesktop/systemd1",
461 "org.freedesktop.systemd1.Manager",
469 if (!dbus_message_iter_init(reply, &iter) ||
470 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
471 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
472 log_error("Failed to parse reply.");
476 dbus_message_iter_recurse(&iter, &sub);
478 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
481 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT);
486 n_units = MAX(2*c, 16);
487 w = realloc(unit_infos, sizeof(struct unit_info) * n_units);
496 dbus_message_iter_recurse(&sub, &sub2);
498 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->id, true) < 0 ||
499 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->description, true) < 0 ||
500 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->load_state, true) < 0 ||
501 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->active_state, true) < 0 ||
502 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->sub_state, true) < 0 ||
503 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->following, true) < 0 ||
504 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->unit_path, true) < 0 ||
505 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &u->job_id, true) < 0 ||
506 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->job_type, true) < 0 ||
507 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->job_path, false) < 0) {
508 log_error("Failed to parse reply.");
512 dbus_message_iter_next(&sub);
517 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
518 output_units_list(unit_infos, c);
524 static int compare_unit_file_list(const void *a, const void *b) {
526 const UnitFileList *u = a, *v = b;
528 d1 = strrchr(u->path, '.');
529 d2 = strrchr(v->path, '.');
534 r = strcasecmp(d1, d2);
539 return strcasecmp(path_get_file_name(u->path), path_get_file_name(v->path));
542 static bool output_show_unit_file(const UnitFileList *u) {
545 return !arg_type || ((dot = strrchr(u->path, '.')) && streq(dot+1, arg_type));
548 static void output_unit_file_list(const UnitFileList *units, unsigned c) {
549 unsigned max_id_len, id_cols, state_cols, n_shown = 0;
550 const UnitFileList *u;
552 max_id_len = sizeof("UNIT FILE")-1;
553 state_cols = sizeof("STATE")-1;
554 for (u = units; u < units + c; u++) {
555 if (!output_show_unit_file(u))
558 max_id_len = MAX(max_id_len, strlen(path_get_file_name(u->path)));
559 state_cols = MAX(state_cols, strlen(unit_file_state_to_string(u->state)));
564 id_cols = MIN(max_id_len, 25);
565 basic_cols = 1 + id_cols + state_cols;
566 if (basic_cols < (unsigned) columns())
567 id_cols += MIN(columns() - basic_cols, max_id_len - id_cols);
569 id_cols = max_id_len;
572 printf("%-*s %-*s\n", id_cols, "UNIT FILE", state_cols, "STATE");
574 for (u = units; u < units + c; u++) {
576 const char *on, *off;
579 if (!output_show_unit_file(u))
584 if (u->state == UNIT_FILE_MASKED ||
585 u->state == UNIT_FILE_MASKED_RUNTIME ||
586 u->state == UNIT_FILE_DISABLED ||
587 u->state == UNIT_FILE_INVALID) {
588 on = ansi_highlight_red(true);
589 off = ansi_highlight_red(false);
590 } else if (u->state == UNIT_FILE_ENABLED) {
591 on = ansi_highlight_green(true);
592 off = ansi_highlight_green(false);
596 id = path_get_file_name(u->path);
598 e = arg_full ? NULL : ellipsize(id, id_cols, 33);
600 printf("%-*s %s%-*s%s\n",
602 on, state_cols, unit_file_state_to_string(u->state), off);
608 printf("\n%u unit files listed.\n", n_shown);
611 static int list_unit_files(DBusConnection *bus, char **args) {
612 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
613 _cleanup_free_ UnitFileList *units = NULL;
614 DBusMessageIter iter, sub, sub2;
615 unsigned c = 0, n_units = 0;
618 pager_open_if_enabled();
625 h = hashmap_new(string_hash_func, string_compare_func);
629 r = unit_file_get_list(arg_scope, arg_root, h);
631 unit_file_list_free(h);
632 log_error("Failed to get unit file list: %s", strerror(-r));
636 n_units = hashmap_size(h);
637 units = new(UnitFileList, n_units);
639 unit_file_list_free(h);
643 HASHMAP_FOREACH(u, h, i) {
644 memcpy(units + c++, u, sizeof(UnitFileList));
650 r = bus_method_call_with_reply(
652 "org.freedesktop.systemd1",
653 "/org/freedesktop/systemd1",
654 "org.freedesktop.systemd1.Manager",
662 if (!dbus_message_iter_init(reply, &iter) ||
663 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
664 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
665 log_error("Failed to parse reply.");
669 dbus_message_iter_recurse(&iter, &sub);
671 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
675 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT);
680 n_units = MAX(2*c, 16);
681 w = realloc(units, sizeof(struct UnitFileList) * n_units);
690 dbus_message_iter_recurse(&sub, &sub2);
692 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->path, true) < 0 ||
693 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, false) < 0) {
694 log_error("Failed to parse reply.");
698 u->state = unit_file_state_from_string(state);
700 dbus_message_iter_next(&sub);
706 qsort(units, c, sizeof(UnitFileList), compare_unit_file_list);
707 output_unit_file_list(units, c);
713 static int list_dependencies_print(const char *name, int level, unsigned int branches, bool last) {
715 _cleanup_free_ char *n = NULL;
717 size_t max_len = MAX(columns(),20);
719 for (i = level - 1; i >= 0; i--) {
721 if(len > max_len - 3 && !arg_full) {
722 printf("%s...\n",max_len % 2 ? "" : " ");
725 printf("%s", draw_special_char(branches & (1 << i) ? DRAW_TREE_VERT : DRAW_TREE_SPACE));
728 if(len > max_len - 3 && !arg_full) {
729 printf("%s...\n",max_len % 2 ? "" : " ");
732 printf("%s", draw_special_char(last ? DRAW_TREE_RIGHT : DRAW_TREE_BRANCH));
735 printf("%s\n", name);
739 n = ellipsize(name, max_len-len, 100);
747 static int list_dependencies_get_dependencies(DBusConnection *bus, const char *name, char ***deps) {
748 static const char dependencies[] =
750 "RequiresOverridable\0"
752 "RequisiteOverridable\0"
755 _cleanup_free_ char *path;
756 const char *interface = "org.freedesktop.systemd1.Unit";
758 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
759 DBusMessageIter iter, sub, sub2, sub3;
768 path = unit_dbus_path_from_name(name);
774 r = bus_method_call_with_reply(
776 "org.freedesktop.systemd1",
778 "org.freedesktop.DBus.Properties",
782 DBUS_TYPE_STRING, &interface,
787 if (!dbus_message_iter_init(reply, &iter) ||
788 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
789 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
790 log_error("Failed to parse reply.");
795 dbus_message_iter_recurse(&iter, &sub);
797 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
800 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_DICT_ENTRY);
801 dbus_message_iter_recurse(&sub, &sub2);
803 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &prop, true) < 0) {
804 log_error("Failed to parse reply.");
809 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
810 log_error("Failed to parse reply.");
815 dbus_message_iter_recurse(&sub2, &sub3);
816 dbus_message_iter_next(&sub);
818 if (!nulstr_contains(dependencies, prop))
821 if (dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_ARRAY) {
822 if (dbus_message_iter_get_element_type(&sub3) == DBUS_TYPE_STRING) {
823 DBusMessageIter sub4;
824 dbus_message_iter_recurse(&sub3, &sub4);
826 while (dbus_message_iter_get_arg_type(&sub4) != DBUS_TYPE_INVALID) {
829 assert(dbus_message_iter_get_arg_type(&sub4) == DBUS_TYPE_STRING);
830 dbus_message_iter_get_basic(&sub4, &s);
832 r = strv_extend(&ret, s);
838 dbus_message_iter_next(&sub4);
851 static int list_dependencies_compare(const void *_a, const void *_b) {
852 const char **a = (const char**) _a, **b = (const char**) _b;
853 if (unit_name_to_type(*a) == UNIT_TARGET && unit_name_to_type(*b) != UNIT_TARGET)
855 if (unit_name_to_type(*a) != UNIT_TARGET && unit_name_to_type(*b) == UNIT_TARGET)
857 return strcasecmp(*a, *b);
860 static int list_dependencies_one(DBusConnection *bus, const char *name, int level, char **units, unsigned int branches) {
866 u = strv_append(units, name);
870 r = list_dependencies_get_dependencies(bus, name, &deps);
874 qsort(deps, strv_length(deps), sizeof (char*), list_dependencies_compare);
876 STRV_FOREACH(c, deps) {
877 if (strv_contains(u, *c)) {
878 r = list_dependencies_print("...", level + 1, (branches << 1) | (c[1] == NULL ? 0 : 1), 1);
884 r = list_dependencies_print(*c, level, branches, c[1] == NULL);
888 if (arg_all || unit_name_to_type(*c) == UNIT_TARGET) {
889 r = list_dependencies_one(bus, *c, level + 1, u, (branches << 1) | (c[1] == NULL ? 0 : 1));
902 static int list_dependencies(DBusConnection *bus, char **args) {
903 _cleanup_free_ char *unit = NULL;
909 unit = unit_name_mangle(args[1]);
914 u = SPECIAL_DEFAULT_TARGET;
916 pager_open_if_enabled();
920 return list_dependencies_one(bus, u, 0, NULL, 0);
923 static int dot_one_property(const char *name, const char *prop, DBusMessageIter *iter) {
925 static const char * const colors[] = {
926 "Requires", "[color=\"black\"]",
927 "RequiresOverridable", "[color=\"black\"]",
928 "Requisite", "[color=\"darkblue\"]",
929 "RequisiteOverridable", "[color=\"darkblue\"]",
930 "Wants", "[color=\"grey66\"]",
931 "Conflicts", "[color=\"red\"]",
932 "ConflictedBy", "[color=\"red\"]",
933 "After", "[color=\"green\"]"
936 const char *c = NULL;
943 for (i = 0; i < ELEMENTSOF(colors); i += 2)
944 if (streq(colors[i], prop)) {
952 if (arg_dot != DOT_ALL)
953 if ((arg_dot == DOT_ORDER) != streq(prop, "After"))
956 switch (dbus_message_iter_get_arg_type(iter)) {
958 case DBUS_TYPE_ARRAY:
960 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING) {
963 dbus_message_iter_recurse(iter, &sub);
965 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
968 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING);
969 dbus_message_iter_get_basic(&sub, &s);
970 printf("\t\"%s\"->\"%s\" %s;\n", name, s, c);
972 dbus_message_iter_next(&sub);
982 static int dot_one(DBusConnection *bus, const char *name, const char *path) {
983 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
984 const char *interface = "org.freedesktop.systemd1.Unit";
986 DBusMessageIter iter, sub, sub2, sub3;
991 r = bus_method_call_with_reply(
993 "org.freedesktop.systemd1",
995 "org.freedesktop.DBus.Properties",
999 DBUS_TYPE_STRING, &interface,
1004 if (!dbus_message_iter_init(reply, &iter) ||
1005 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1006 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
1007 log_error("Failed to parse reply.");
1011 dbus_message_iter_recurse(&iter, &sub);
1013 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1016 assert(dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_DICT_ENTRY);
1017 dbus_message_iter_recurse(&sub, &sub2);
1019 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &prop, true) < 0 ||
1020 dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
1021 log_error("Failed to parse reply.");
1025 dbus_message_iter_recurse(&sub2, &sub3);
1026 r = dot_one_property(name, prop, &sub3);
1030 dbus_message_iter_next(&sub);
1036 static int dot(DBusConnection *bus, char **args) {
1037 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1038 DBusMessageIter iter, sub, sub2;
1041 r = bus_method_call_with_reply(
1043 "org.freedesktop.systemd1",
1044 "/org/freedesktop/systemd1",
1045 "org.freedesktop.systemd1.Manager",
1053 if (!dbus_message_iter_init(reply, &iter) ||
1054 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1055 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
1056 log_error("Failed to parse reply.");
1060 printf("digraph systemd {\n");
1062 dbus_message_iter_recurse(&iter, &sub);
1063 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1064 const char *id, *description, *load_state, *active_state, *sub_state, *following, *unit_path;
1066 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
1067 log_error("Failed to parse reply.");
1071 dbus_message_iter_recurse(&sub, &sub2);
1073 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &id, true) < 0 ||
1074 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &description, true) < 0 ||
1075 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &load_state, true) < 0 ||
1076 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &active_state, true) < 0 ||
1077 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &sub_state, true) < 0 ||
1078 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &following, true) < 0 ||
1079 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, true) < 0) {
1080 log_error("Failed to parse reply.");
1084 r = dot_one(bus, id, unit_path);
1088 /* printf("\t\"%s\";\n", id); */
1089 dbus_message_iter_next(&sub);
1094 log_info(" Color legend: black = Requires\n"
1095 " dark blue = Requisite\n"
1096 " dark grey = Wants\n"
1097 " red = Conflicts\n"
1098 " green = After\n");
1101 log_notice("-- You probably want to process this output with graphviz' dot tool.\n"
1102 "-- Try a shell pipeline like 'systemctl dot | dot -Tsvg > systemd.svg'!\n");
1107 static int list_jobs(DBusConnection *bus, char **args) {
1108 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1109 DBusMessageIter iter, sub, sub2;
1113 pager_open_if_enabled();
1115 r = bus_method_call_with_reply(
1117 "org.freedesktop.systemd1",
1118 "/org/freedesktop/systemd1",
1119 "org.freedesktop.systemd1.Manager",
1127 if (!dbus_message_iter_init(reply, &iter) ||
1128 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1129 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
1130 log_error("Failed to parse reply.");
1134 dbus_message_iter_recurse(&iter, &sub);
1137 printf("%4s %-25s %-15s %-7s\n", "JOB", "UNIT", "TYPE", "STATE");
1139 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1140 const char *name, *type, *state, *job_path, *unit_path;
1144 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
1145 log_error("Failed to parse reply.");
1149 dbus_message_iter_recurse(&sub, &sub2);
1151 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &id, true) < 0 ||
1152 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
1153 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
1154 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, true) < 0 ||
1155 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &job_path, true) < 0 ||
1156 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, false) < 0) {
1157 log_error("Failed to parse reply.");
1161 e = arg_full ? NULL : ellipsize(name, 25, 33);
1162 printf("%4u %-25s %-15s %-7s\n", id, e ? e : name, type, state);
1167 dbus_message_iter_next(&sub);
1171 printf("\n%u jobs listed.\n", k);
1176 static int load_unit(DBusConnection *bus, char **args) {
1181 STRV_FOREACH(name, args+1) {
1182 _cleanup_free_ char *n = NULL;
1185 n = unit_name_mangle(*name);
1189 r = bus_method_call_with_reply(
1191 "org.freedesktop.systemd1",
1192 "/org/freedesktop/systemd1",
1193 "org.freedesktop.systemd1.Manager",
1197 DBUS_TYPE_STRING, &n,
1206 static int cancel_job(DBusConnection *bus, char **args) {
1211 if (strv_length(args) <= 1)
1212 return daemon_reload(bus, args);
1214 STRV_FOREACH(name, args+1) {
1218 r = safe_atou32(*name, &id);
1220 log_error("Failed to parse job id: %s", strerror(-r));
1224 r = bus_method_call_with_reply(
1226 "org.freedesktop.systemd1",
1227 "/org/freedesktop/systemd1",
1228 "org.freedesktop.systemd1.Manager",
1232 DBUS_TYPE_UINT32, &id,
1241 static bool need_daemon_reload(DBusConnection *bus, const char *unit) {
1242 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1243 dbus_bool_t b = FALSE;
1244 DBusMessageIter iter, sub;
1246 *interface = "org.freedesktop.systemd1.Unit",
1247 *property = "NeedDaemonReload",
1249 _cleanup_free_ char *n = NULL;
1252 /* We ignore all errors here, since this is used to show a warning only */
1254 n = unit_name_mangle(unit);
1258 r = bus_method_call_with_reply (
1260 "org.freedesktop.systemd1",
1261 "/org/freedesktop/systemd1",
1262 "org.freedesktop.systemd1.Manager",
1266 DBUS_TYPE_STRING, &n,
1271 if (!dbus_message_get_args(reply, NULL,
1272 DBUS_TYPE_OBJECT_PATH, &path,
1276 dbus_message_unref(reply);
1279 r = bus_method_call_with_reply(
1281 "org.freedesktop.systemd1",
1283 "org.freedesktop.DBus.Properties",
1287 DBUS_TYPE_STRING, &interface,
1288 DBUS_TYPE_STRING, &property,
1293 if (!dbus_message_iter_init(reply, &iter) ||
1294 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1297 dbus_message_iter_recurse(&iter, &sub);
1298 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_BOOLEAN)
1301 dbus_message_iter_get_basic(&sub, &b);
1305 typedef struct WaitData {
1312 static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *message, void *data) {
1320 dbus_error_init(&error);
1322 log_debug("Got D-Bus request: %s.%s() on %s",
1323 dbus_message_get_interface(message),
1324 dbus_message_get_member(message),
1325 dbus_message_get_path(message));
1327 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
1328 log_error("Warning! D-Bus connection terminated.");
1329 dbus_connection_close(connection);
1331 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1333 const char *path, *result, *unit;
1335 if (dbus_message_get_args(message, &error,
1336 DBUS_TYPE_UINT32, &id,
1337 DBUS_TYPE_OBJECT_PATH, &path,
1338 DBUS_TYPE_STRING, &unit,
1339 DBUS_TYPE_STRING, &result,
1340 DBUS_TYPE_INVALID)) {
1342 free(set_remove(d->set, (char*) path));
1344 if (!isempty(result))
1345 d->result = strdup(result);
1348 d->name = strdup(unit);
1353 dbus_error_free(&error);
1354 if (dbus_message_get_args(message, &error,
1355 DBUS_TYPE_UINT32, &id,
1356 DBUS_TYPE_OBJECT_PATH, &path,
1357 DBUS_TYPE_STRING, &result,
1358 DBUS_TYPE_INVALID)) {
1359 /* Compatibility with older systemd versions <
1360 * 183 during upgrades. This should be dropped
1362 free(set_remove(d->set, (char*) path));
1365 d->result = strdup(result);
1371 log_error("Failed to parse message: %s", bus_error_message(&error));
1375 dbus_error_free(&error);
1376 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1379 static int enable_wait_for_jobs(DBusConnection *bus) {
1387 dbus_error_init(&error);
1388 dbus_bus_add_match(bus,
1390 "sender='org.freedesktop.systemd1',"
1391 "interface='org.freedesktop.systemd1.Manager',"
1392 "member='JobRemoved',"
1393 "path='/org/freedesktop/systemd1'",
1396 if (dbus_error_is_set(&error)) {
1397 log_error("Failed to add match: %s", bus_error_message(&error));
1398 dbus_error_free(&error);
1402 /* This is slightly dirty, since we don't undo the match registrations. */
1406 static int wait_for_jobs(DBusConnection *bus, Set *s) {
1416 if (!dbus_connection_add_filter(bus, wait_filter, &d, NULL))
1419 while (!set_isempty(s)) {
1421 if (!dbus_connection_read_write_dispatch(bus, -1)) {
1422 log_error("Disconnected from bus.");
1423 return -ECONNREFUSED;
1430 if (streq(d.result, "timeout"))
1431 log_error("Job for %s timed out.", strna(d.name));
1432 else if (streq(d.result, "canceled"))
1433 log_error("Job for %s canceled.", strna(d.name));
1434 else if (streq(d.result, "dependency"))
1435 log_error("A dependency job for %s failed. See 'journalctl -xn' for details.", strna(d.name));
1436 else if (!streq(d.result, "done") && !streq(d.result, "skipped"))
1437 log_error("Job for %s failed. See 'systemctl status %s' and 'journalctl -xn' for details.", strna(d.name), strna(d.name));
1440 if (streq_ptr(d.result, "timeout"))
1442 else if (streq_ptr(d.result, "canceled"))
1444 else if (!streq_ptr(d.result, "done") && !streq_ptr(d.result, "skipped"))
1455 dbus_connection_remove_filter(bus, wait_filter, &d);
1459 static int check_one_unit(DBusConnection *bus, const char *name, char **check_states, bool quiet) {
1460 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1461 _cleanup_free_ char *n = NULL;
1462 DBusMessageIter iter, sub;
1464 *interface = "org.freedesktop.systemd1.Unit",
1465 *property = "ActiveState";
1466 const char *state, *path;
1472 dbus_error_init(&error);
1474 n = unit_name_mangle(name);
1478 r = bus_method_call_with_reply (
1480 "org.freedesktop.systemd1",
1481 "/org/freedesktop/systemd1",
1482 "org.freedesktop.systemd1.Manager",
1486 DBUS_TYPE_STRING, &n,
1489 dbus_error_free(&error);
1496 if (!dbus_message_get_args(reply, NULL,
1497 DBUS_TYPE_OBJECT_PATH, &path,
1498 DBUS_TYPE_INVALID)) {
1499 log_error("Failed to parse reply.");
1503 dbus_message_unref(reply);
1506 r = bus_method_call_with_reply(
1508 "org.freedesktop.systemd1",
1510 "org.freedesktop.DBus.Properties",
1514 DBUS_TYPE_STRING, &interface,
1515 DBUS_TYPE_STRING, &property,
1523 if (!dbus_message_iter_init(reply, &iter) ||
1524 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1525 log_error("Failed to parse reply.");
1529 dbus_message_iter_recurse(&iter, &sub);
1531 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1532 log_error("Failed to parse reply.");
1536 dbus_message_iter_get_basic(&sub, &state);
1541 return strv_find(check_states, state) ? 1 : 0;
1544 static void check_triggering_units(
1545 DBusConnection *bus,
1546 const char *unit_name) {
1548 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1549 DBusMessageIter iter, sub;
1550 const char *interface = "org.freedesktop.systemd1.Unit",
1551 *triggered_by_property = "TriggeredBy";
1552 char _cleanup_free_ *unit_path = NULL, *n = NULL;
1553 bool print_warning_label = true;
1556 n = unit_name_mangle(unit_name);
1562 unit_path = unit_dbus_path_from_name(n);
1568 r = bus_method_call_with_reply(
1570 "org.freedesktop.systemd1",
1572 "org.freedesktop.DBus.Properties",
1576 DBUS_TYPE_STRING, &interface,
1577 DBUS_TYPE_STRING, &triggered_by_property,
1582 if (!dbus_message_iter_init(reply, &iter) ||
1583 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1584 log_error("Failed to parse reply.");
1588 dbus_message_iter_recurse(&iter, &sub);
1589 dbus_message_iter_recurse(&sub, &iter);
1592 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1593 const char * const check_states[] = {
1598 const char *service_trigger;
1600 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1601 log_error("Failed to parse reply.");
1605 dbus_message_iter_get_basic(&sub, &service_trigger);
1607 r = check_one_unit(bus, service_trigger, (char**) check_states, true);
1611 if (print_warning_label) {
1612 log_warning("Warning: Stopping %s, but it can still be activated by:", unit_name);
1613 print_warning_label = false;
1616 log_warning(" %s", service_trigger);
1619 dbus_message_iter_next(&sub);
1623 static int start_unit_one(
1624 DBusConnection *bus,
1631 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1632 _cleanup_free_ char *n;
1641 n = unit_name_mangle(name);
1645 r = bus_method_call_with_reply(
1647 "org.freedesktop.systemd1",
1648 "/org/freedesktop/systemd1",
1649 "org.freedesktop.systemd1.Manager",
1653 DBUS_TYPE_STRING, &n,
1654 DBUS_TYPE_STRING, &mode,
1657 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
1658 /* There's always a fallback possible for
1659 * legacy actions. */
1662 log_error("Failed to issue method call: %s", bus_error_message(error));
1667 if (!dbus_message_get_args(reply, error,
1668 DBUS_TYPE_OBJECT_PATH, &path,
1669 DBUS_TYPE_INVALID)) {
1670 log_error("Failed to parse reply: %s", bus_error_message(error));
1674 if (need_daemon_reload(bus, n))
1675 log_warning("Warning: Unit file of %s changed on disk, 'systemctl %s daemon-reload' recommended.",
1676 n, arg_scope == UNIT_FILE_SYSTEM ? "--system" : "--user");
1688 log_error("Failed to add path to set.");
1696 static enum action verb_to_action(const char *verb) {
1697 if (streq(verb, "halt"))
1699 else if (streq(verb, "poweroff"))
1700 return ACTION_POWEROFF;
1701 else if (streq(verb, "reboot"))
1702 return ACTION_REBOOT;
1703 else if (streq(verb, "kexec"))
1704 return ACTION_KEXEC;
1705 else if (streq(verb, "rescue"))
1706 return ACTION_RESCUE;
1707 else if (streq(verb, "emergency"))
1708 return ACTION_EMERGENCY;
1709 else if (streq(verb, "default"))
1710 return ACTION_DEFAULT;
1711 else if (streq(verb, "exit"))
1713 else if (streq(verb, "suspend"))
1714 return ACTION_SUSPEND;
1715 else if (streq(verb, "hibernate"))
1716 return ACTION_HIBERNATE;
1717 else if (streq(verb, "hybrid-sleep"))
1718 return ACTION_HYBRID_SLEEP;
1720 return ACTION_INVALID;
1723 static int start_unit(DBusConnection *bus, char **args) {
1725 static const char * const table[_ACTION_MAX] = {
1726 [ACTION_HALT] = SPECIAL_HALT_TARGET,
1727 [ACTION_POWEROFF] = SPECIAL_POWEROFF_TARGET,
1728 [ACTION_REBOOT] = SPECIAL_REBOOT_TARGET,
1729 [ACTION_KEXEC] = SPECIAL_KEXEC_TARGET,
1730 [ACTION_RUNLEVEL2] = SPECIAL_RUNLEVEL2_TARGET,
1731 [ACTION_RUNLEVEL3] = SPECIAL_RUNLEVEL3_TARGET,
1732 [ACTION_RUNLEVEL4] = SPECIAL_RUNLEVEL4_TARGET,
1733 [ACTION_RUNLEVEL5] = SPECIAL_RUNLEVEL5_TARGET,
1734 [ACTION_RESCUE] = SPECIAL_RESCUE_TARGET,
1735 [ACTION_EMERGENCY] = SPECIAL_EMERGENCY_TARGET,
1736 [ACTION_DEFAULT] = SPECIAL_DEFAULT_TARGET,
1737 [ACTION_EXIT] = SPECIAL_EXIT_TARGET,
1738 [ACTION_SUSPEND] = SPECIAL_SUSPEND_TARGET,
1739 [ACTION_HIBERNATE] = SPECIAL_HIBERNATE_TARGET,
1740 [ACTION_HYBRID_SLEEP] = SPECIAL_HYBRID_SLEEP_TARGET
1744 const char *method, *mode, *one_name;
1749 dbus_error_init(&error);
1753 ask_password_agent_open_if_enabled();
1755 if (arg_action == ACTION_SYSTEMCTL) {
1757 streq(args[0], "stop") ||
1758 streq(args[0], "condstop") ? "StopUnit" :
1759 streq(args[0], "reload") ? "ReloadUnit" :
1760 streq(args[0], "restart") ? "RestartUnit" :
1762 streq(args[0], "try-restart") ||
1763 streq(args[0], "condrestart") ? "TryRestartUnit" :
1765 streq(args[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
1767 streq(args[0], "reload-or-try-restart") ||
1768 streq(args[0], "condreload") ||
1770 streq(args[0], "force-reload") ? "ReloadOrTryRestartUnit" :
1774 (streq(args[0], "isolate") ||
1775 streq(args[0], "rescue") ||
1776 streq(args[0], "emergency")) ? "isolate" : arg_job_mode;
1778 one_name = table[verb_to_action(args[0])];
1781 assert(arg_action < ELEMENTSOF(table));
1782 assert(table[arg_action]);
1784 method = "StartUnit";
1786 mode = (arg_action == ACTION_EMERGENCY ||
1787 arg_action == ACTION_RESCUE ||
1788 arg_action == ACTION_RUNLEVEL2 ||
1789 arg_action == ACTION_RUNLEVEL3 ||
1790 arg_action == ACTION_RUNLEVEL4 ||
1791 arg_action == ACTION_RUNLEVEL5) ? "isolate" : "replace";
1793 one_name = table[arg_action];
1796 if (!arg_no_block) {
1797 ret = enable_wait_for_jobs(bus);
1799 log_error("Could not watch jobs: %s", strerror(-ret));
1803 s = set_new(string_hash_func, string_compare_func);
1811 ret = start_unit_one(bus, method, one_name, mode, &error, s);
1813 ret = translate_bus_error_to_exit_status(ret, &error);
1815 STRV_FOREACH(name, args+1) {
1816 r = start_unit_one(bus, method, *name, mode, &error, s);
1818 ret = translate_bus_error_to_exit_status(r, &error);
1819 dbus_error_free(&error);
1824 if (!arg_no_block) {
1825 r = wait_for_jobs(bus, s);
1831 /* When stopping units, warn if they can still be triggered by
1832 * another active unit (socket, path, timer) */
1833 if (!arg_quiet && streq(method, "StopUnit")) {
1835 check_triggering_units(bus, one_name);
1837 STRV_FOREACH(name, args+1)
1838 check_triggering_units(bus, *name);
1844 dbus_error_free(&error);
1849 /* Ask systemd-logind, which might grant access to unprivileged users
1850 * through PolicyKit */
1851 static int reboot_with_logind(DBusConnection *bus, enum action a) {
1854 dbus_bool_t interactive = true;
1859 polkit_agent_open_if_enabled();
1867 case ACTION_POWEROFF:
1868 method = "PowerOff";
1871 case ACTION_SUSPEND:
1875 case ACTION_HIBERNATE:
1876 method = "Hibernate";
1879 case ACTION_HYBRID_SLEEP:
1880 method = "HybridSleep";
1887 return bus_method_call_with_reply(
1889 "org.freedesktop.login1",
1890 "/org/freedesktop/login1",
1891 "org.freedesktop.login1.Manager",
1895 DBUS_TYPE_BOOLEAN, &interactive,
1902 static int check_inhibitors(DBusConnection *bus, enum action a) {
1904 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
1905 DBusMessageIter iter, sub, sub2;
1908 _cleanup_strv_free_ char **sessions = NULL;
1914 if (arg_ignore_inhibitors || arg_force > 0)
1926 r = bus_method_call_with_reply(
1928 "org.freedesktop.login1",
1929 "/org/freedesktop/login1",
1930 "org.freedesktop.login1.Manager",
1936 /* If logind is not around, then there are no inhibitors... */
1939 if (!dbus_message_iter_init(reply, &iter) ||
1940 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1941 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
1942 log_error("Failed to parse reply.");
1946 dbus_message_iter_recurse(&iter, &sub);
1947 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
1948 const char *what, *who, *why, *mode;
1950 _cleanup_strv_free_ char **sv = NULL;
1951 _cleanup_free_ char *comm = NULL, *user = NULL;
1953 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
1954 log_error("Failed to parse reply.");
1958 dbus_message_iter_recurse(&sub, &sub2);
1960 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &what, true) < 0 ||
1961 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &who, true) < 0 ||
1962 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &why, true) < 0 ||
1963 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &mode, true) < 0 ||
1964 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &uid, true) < 0 ||
1965 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, false) < 0) {
1966 log_error("Failed to parse reply.");
1970 if (!streq(mode, "block"))
1973 sv = strv_split(what, ":");
1977 if (!strv_contains(sv,
1979 a == ACTION_POWEROFF ||
1980 a == ACTION_REBOOT ||
1981 a == ACTION_KEXEC ? "shutdown" : "sleep"))
1984 get_process_comm(pid, &comm);
1985 user = uid_to_name(uid);
1986 log_warning("Operation inhibited by \"%s\" (PID %lu \"%s\", user %s), reason is \"%s\".",
1987 who, (unsigned long) pid, strna(comm), strna(user), why);
1991 dbus_message_iter_next(&sub);
1994 dbus_message_iter_recurse(&iter, &sub);
1996 /* Check for current sessions */
1997 sd_get_sessions(&sessions);
1998 STRV_FOREACH(s, sessions) {
2000 _cleanup_free_ char *type = NULL, *tty = NULL, *seat = NULL, *user = NULL, *service = NULL, *class = NULL;
2002 if (sd_session_get_uid(*s, &uid) < 0 || uid == getuid())
2005 if (sd_session_get_class(*s, &class) < 0 || !streq(class, "user"))
2008 if (sd_session_get_type(*s, &type) < 0 || (!streq(type, "x11") && !streq(type, "tty")))
2011 sd_session_get_tty(*s, &tty);
2012 sd_session_get_seat(*s, &seat);
2013 sd_session_get_service(*s, &service);
2014 user = uid_to_name(uid);
2016 log_warning("User %s is logged in on %s.", strna(user), isempty(tty) ? (isempty(seat) ? strna(service) : seat) : tty);
2023 log_error("Please retry operation after closing inhibitors and logging out other users.\nAlternatively, ignore inhibitors and users with 'systemctl %s -i'.",
2024 a == ACTION_HALT ? "halt" :
2025 a == ACTION_POWEROFF ? "poweroff" :
2026 a == ACTION_REBOOT ? "reboot" :
2027 a == ACTION_KEXEC ? "kexec" :
2028 a == ACTION_SUSPEND ? "suspend" :
2029 a == ACTION_HIBERNATE ? "hibernate" : "hybrid-sleep");
2037 static int start_special(DBusConnection *bus, char **args) {
2043 a = verb_to_action(args[0]);
2045 r = check_inhibitors(bus, a);
2049 if (arg_force >= 2 && geteuid() != 0) {
2050 log_error("Must be root.");
2054 if (arg_force >= 2 &&
2055 (a == ACTION_HALT ||
2056 a == ACTION_POWEROFF ||
2057 a == ACTION_REBOOT))
2060 if (arg_force >= 1 &&
2061 (a == ACTION_HALT ||
2062 a == ACTION_POWEROFF ||
2063 a == ACTION_REBOOT ||
2064 a == ACTION_KEXEC ||
2066 return daemon_reload(bus, args);
2068 /* first try logind, to allow authentication with polkit */
2069 if (geteuid() != 0 &&
2070 (a == ACTION_POWEROFF ||
2071 a == ACTION_REBOOT ||
2072 a == ACTION_SUSPEND ||
2073 a == ACTION_HIBERNATE ||
2074 a == ACTION_HYBRID_SLEEP)) {
2075 r = reboot_with_logind(bus, a);
2080 r = start_unit(bus, args);
2087 static int check_unit_active(DBusConnection *bus, char **args) {
2088 const char * const check_states[] = {
2095 int r = 3; /* According to LSB: "program is not running" */
2100 STRV_FOREACH(name, args+1) {
2103 state = check_one_unit(bus, *name, (char**) check_states, arg_quiet);
2113 static int check_unit_failed(DBusConnection *bus, char **args) {
2114 const char * const check_states[] = {
2125 STRV_FOREACH(name, args+1) {
2128 state = check_one_unit(bus, *name, (char**) check_states, arg_quiet);
2138 static int kill_unit(DBusConnection *bus, char **args) {
2146 arg_kill_who = "all";
2148 STRV_FOREACH(name, args+1) {
2149 _cleanup_free_ char *n = NULL;
2151 n = unit_name_mangle(*name);
2155 r = bus_method_call_with_reply(
2157 "org.freedesktop.systemd1",
2158 "/org/freedesktop/systemd1",
2159 "org.freedesktop.systemd1.Manager",
2163 DBUS_TYPE_STRING, &n,
2164 DBUS_TYPE_STRING, &arg_kill_who,
2165 DBUS_TYPE_INT32, &arg_signal,
2173 static int set_cgroup(DBusConnection *bus, char **args) {
2174 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
2177 DBusMessageIter iter;
2179 _cleanup_free_ char *n = NULL;
2184 dbus_error_init(&error);
2187 streq(args[0], "set-cgroup") ? "SetUnitControlGroups" :
2188 streq(args[0], "unset-group") ? "UnsetUnitControlGroups"
2189 : "UnsetUnitControlGroupAttributes";
2191 n = unit_name_mangle(args[1]);
2195 m = dbus_message_new_method_call(
2196 "org.freedesktop.systemd1",
2197 "/org/freedesktop/systemd1",
2198 "org.freedesktop.systemd1.Manager",
2203 dbus_message_iter_init_append(m, &iter);
2204 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &n))
2207 r = bus_append_strv_iter(&iter, args + 2);
2211 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
2213 log_error("Failed to issue method call: %s", bus_error_message(&error));
2214 dbus_error_free(&error);
2221 static int set_cgroup_attr(DBusConnection *bus, char **args) {
2222 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
2224 DBusMessageIter iter, sub, sub2;
2226 _cleanup_free_ char *n = NULL;
2231 dbus_error_init(&error);
2233 if (strv_length(args) % 2 != 0) {
2234 log_error("Expecting an uneven number of arguments!");
2238 n = unit_name_mangle(args[1]);
2242 m = dbus_message_new_method_call(
2243 "org.freedesktop.systemd1",
2244 "/org/freedesktop/systemd1",
2245 "org.freedesktop.systemd1.Manager",
2246 "SetUnitControlGroupAttributes");
2250 dbus_message_iter_init_append(m, &iter);
2251 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &n) ||
2252 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "(ss)", &sub))
2255 STRV_FOREACH_PAIR(x, y, args + 2) {
2256 if (!dbus_message_iter_open_container(&sub, DBUS_TYPE_STRUCT, NULL, &sub2) ||
2257 !dbus_message_iter_append_basic(&sub2, DBUS_TYPE_STRING, x) ||
2258 !dbus_message_iter_append_basic(&sub2, DBUS_TYPE_STRING, y) ||
2259 !dbus_message_iter_close_container(&sub, &sub2))
2263 if (!dbus_message_iter_close_container(&iter, &sub))
2266 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
2268 log_error("Failed to issue method call: %s", bus_error_message(&error));
2269 dbus_error_free(&error);
2276 typedef struct ExecStatusInfo {
2284 usec_t start_timestamp;
2285 usec_t exit_timestamp;
2290 LIST_FIELDS(struct ExecStatusInfo, exec);
2293 static void exec_status_info_free(ExecStatusInfo *i) {
2302 static int exec_status_info_deserialize(DBusMessageIter *sub, ExecStatusInfo *i) {
2303 uint64_t start_timestamp, exit_timestamp, start_timestamp_monotonic, exit_timestamp_monotonic;
2304 DBusMessageIter sub2, sub3;
2308 int32_t code, status;
2314 if (dbus_message_iter_get_arg_type(sub) != DBUS_TYPE_STRUCT)
2317 dbus_message_iter_recurse(sub, &sub2);
2319 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0)
2322 i->path = strdup(path);
2326 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_ARRAY ||
2327 dbus_message_iter_get_element_type(&sub2) != DBUS_TYPE_STRING)
2331 dbus_message_iter_recurse(&sub2, &sub3);
2332 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
2333 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
2334 dbus_message_iter_next(&sub3);
2338 i->argv = new0(char*, n+1);
2343 dbus_message_iter_recurse(&sub2, &sub3);
2344 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
2347 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
2348 dbus_message_iter_get_basic(&sub3, &s);
2349 dbus_message_iter_next(&sub3);
2351 i->argv[n] = strdup(s);
2358 if (!dbus_message_iter_next(&sub2) ||
2359 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, true) < 0 ||
2360 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp, true) < 0 ||
2361 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp_monotonic, true) < 0 ||
2362 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp, true) < 0 ||
2363 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp_monotonic, true) < 0 ||
2364 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, true) < 0 ||
2365 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &code, true) < 0 ||
2366 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &status, false) < 0)
2370 i->start_timestamp = (usec_t) start_timestamp;
2371 i->exit_timestamp = (usec_t) exit_timestamp;
2372 i->pid = (pid_t) pid;
2379 typedef struct UnitStatusInfo {
2381 const char *load_state;
2382 const char *active_state;
2383 const char *sub_state;
2384 const char *unit_file_state;
2386 const char *description;
2387 const char *following;
2389 char **documentation;
2391 const char *fragment_path;
2392 const char *source_path;
2393 const char *default_control_group;
2395 const char *load_error;
2398 usec_t inactive_exit_timestamp;
2399 usec_t inactive_exit_timestamp_monotonic;
2400 usec_t active_enter_timestamp;
2401 usec_t active_exit_timestamp;
2402 usec_t inactive_enter_timestamp;
2404 bool need_daemon_reload;
2409 const char *status_text;
2412 usec_t start_timestamp;
2413 usec_t exit_timestamp;
2415 int exit_code, exit_status;
2417 usec_t condition_timestamp;
2418 bool condition_result;
2421 unsigned n_accepted;
2422 unsigned n_connections;
2426 const char *sysfs_path;
2428 /* Mount, Automount */
2434 LIST_HEAD(ExecStatusInfo, exec);
2437 static void print_status_info(UnitStatusInfo *i) {
2439 const char *on, *off, *ss;
2441 char since1[FORMAT_TIMESTAMP_RELATIVE_MAX], *s1;
2442 char since2[FORMAT_TIMESTAMP_MAX], *s2;
2445 arg_all * OUTPUT_SHOW_ALL |
2446 (!on_tty() || pager_have()) * OUTPUT_FULL_WIDTH |
2447 on_tty() * OUTPUT_COLOR |
2448 !arg_quiet * OUTPUT_WARN_CUTOFF |
2449 arg_full * OUTPUT_FULL_WIDTH;
2453 /* This shows pretty information about a unit. See
2454 * print_property() for a low-level property printer */
2456 printf("%s", strna(i->id));
2458 if (i->description && !streq_ptr(i->id, i->description))
2459 printf(" - %s", i->description);
2464 printf("\t Follow: unit currently follows state of %s\n", i->following);
2466 if (streq_ptr(i->load_state, "error")) {
2467 on = ansi_highlight_red(true);
2468 off = ansi_highlight_red(false);
2472 path = i->source_path ? i->source_path : i->fragment_path;
2475 printf("\t Loaded: %s%s%s (Reason: %s)\n", on, strna(i->load_state), off, i->load_error);
2476 else if (path && i->unit_file_state)
2477 printf("\t Loaded: %s%s%s (%s; %s)\n", on, strna(i->load_state), off, path, i->unit_file_state);
2479 printf("\t Loaded: %s%s%s (%s)\n", on, strna(i->load_state), off, path);
2481 printf("\t Loaded: %s%s%s\n", on, strna(i->load_state), off);
2483 ss = streq_ptr(i->active_state, i->sub_state) ? NULL : i->sub_state;
2485 if (streq_ptr(i->active_state, "failed")) {
2486 on = ansi_highlight_red(true);
2487 off = ansi_highlight_red(false);
2488 } else if (streq_ptr(i->active_state, "active") || streq_ptr(i->active_state, "reloading")) {
2489 on = ansi_highlight_green(true);
2490 off = ansi_highlight_green(false);
2495 printf("\t Active: %s%s (%s)%s",
2497 strna(i->active_state),
2501 printf("\t Active: %s%s%s",
2503 strna(i->active_state),
2506 if (!isempty(i->result) && !streq(i->result, "success"))
2507 printf(" (Result: %s)", i->result);
2509 timestamp = (streq_ptr(i->active_state, "active") ||
2510 streq_ptr(i->active_state, "reloading")) ? i->active_enter_timestamp :
2511 (streq_ptr(i->active_state, "inactive") ||
2512 streq_ptr(i->active_state, "failed")) ? i->inactive_enter_timestamp :
2513 streq_ptr(i->active_state, "activating") ? i->inactive_exit_timestamp :
2514 i->active_exit_timestamp;
2516 s1 = format_timestamp_relative(since1, sizeof(since1), timestamp);
2517 s2 = format_timestamp(since2, sizeof(since2), timestamp);
2520 printf(" since %s; %s\n", s2, s1);
2522 printf(" since %s\n", s2);
2526 if (!i->condition_result && i->condition_timestamp > 0) {
2527 s1 = format_timestamp_relative(since1, sizeof(since1), i->condition_timestamp);
2528 s2 = format_timestamp(since2, sizeof(since2), i->condition_timestamp);
2531 printf("\t start condition failed at %s; %s\n", s2, s1);
2533 printf("\t start condition failed at %s\n", s2);
2537 printf("\t Device: %s\n", i->sysfs_path);
2539 printf("\t Where: %s\n", i->where);
2541 printf("\t What: %s\n", i->what);
2543 if (!strv_isempty(i->documentation)) {
2547 STRV_FOREACH(t, i->documentation) {
2549 printf("\t Docs: %s\n", *t);
2552 printf("\t %s\n", *t);
2557 printf("\tAccepted: %u; Connected: %u\n", i->n_accepted, i->n_connections);
2559 LIST_FOREACH(exec, p, i->exec) {
2560 _cleanup_free_ char *t = NULL;
2563 /* Only show exited processes here */
2567 t = strv_join(p->argv, " ");
2568 printf("\t Process: %u %s=%s ", p->pid, p->name, strna(t));
2570 good = is_clean_exit_lsb(p->code, p->status, NULL);
2572 on = ansi_highlight_red(true);
2573 off = ansi_highlight_red(false);
2577 printf("%s(code=%s, ", on, sigchld_code_to_string(p->code));
2579 if (p->code == CLD_EXITED) {
2582 printf("status=%i", p->status);
2584 c = exit_status_to_string(p->status, EXIT_STATUS_SYSTEMD);
2589 printf("signal=%s", signal_to_string(p->status));
2591 printf(")%s\n", off);
2593 if (i->main_pid == p->pid &&
2594 i->start_timestamp == p->start_timestamp &&
2595 i->exit_timestamp == p->start_timestamp)
2596 /* Let's not show this twice */
2599 if (p->pid == i->control_pid)
2603 if (i->main_pid > 0 || i->control_pid > 0) {
2606 if (i->main_pid > 0) {
2607 printf("Main PID: %u", (unsigned) i->main_pid);
2610 _cleanup_free_ char *t = NULL;
2611 get_process_comm(i->main_pid, &t);
2614 } else if (i->exit_code > 0) {
2615 printf(" (code=%s, ", sigchld_code_to_string(i->exit_code));
2617 if (i->exit_code == CLD_EXITED) {
2620 printf("status=%i", i->exit_status);
2622 c = exit_status_to_string(i->exit_status, EXIT_STATUS_SYSTEMD);
2627 printf("signal=%s", signal_to_string(i->exit_status));
2632 if (i->main_pid > 0 && i->control_pid > 0)
2635 if (i->control_pid > 0) {
2636 _cleanup_free_ char *t = NULL;
2638 printf(" Control: %u", (unsigned) i->control_pid);
2640 get_process_comm(i->control_pid, &t);
2649 printf("\t Status: \"%s\"\n", i->status_text);
2651 if (i->default_control_group &&
2652 (i->main_pid > 0 || i->control_pid > 0 || cg_is_empty_by_spec(i->default_control_group, false) == 0)) {
2655 printf("\t CGroup: %s\n", i->default_control_group);
2657 if (arg_transport != TRANSPORT_SSH) {
2667 if (i->main_pid > 0)
2668 extra[k++] = i->main_pid;
2670 if (i->control_pid > 0)
2671 extra[k++] = i->control_pid;
2673 show_cgroup_and_extra_by_spec(i->default_control_group, "\t\t ", c, false, extra, k, flags);
2677 if (i->id && arg_transport != TRANSPORT_SSH) {
2679 show_journal_by_unit(stdout,
2683 i->inactive_exit_timestamp_monotonic,
2688 if (i->need_daemon_reload)
2689 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %s daemon-reload' recommended.\n",
2690 ansi_highlight_red(true),
2691 ansi_highlight_red(false),
2692 arg_scope == UNIT_FILE_SYSTEM ? "--system" : "--user");
2695 static void show_unit_help(UnitStatusInfo *i) {
2700 if (!i->documentation) {
2701 log_info("Documentation for %s not known.", i->id);
2705 STRV_FOREACH(p, i->documentation) {
2707 if (startswith(*p, "man:")) {
2710 char *page = NULL, *section = NULL;
2711 const char *args[4] = { "man", NULL, NULL, NULL };
2716 if ((*p)[k-1] == ')')
2717 e = strrchr(*p, '(');
2720 page = strndup((*p) + 4, e - *p - 4);
2726 section = strndup(e + 1, *p + k - e - 2);
2740 log_error("Failed to fork: %m");
2748 execvp(args[0], (char**) args);
2749 log_error("Failed to execute man: %m");
2750 _exit(EXIT_FAILURE);
2756 wait_for_terminate(pid, NULL);
2758 log_info("Can't show: %s", *p);
2762 static int status_property(const char *name, DBusMessageIter *iter, UnitStatusInfo *i) {
2768 switch (dbus_message_iter_get_arg_type(iter)) {
2770 case DBUS_TYPE_STRING: {
2773 dbus_message_iter_get_basic(iter, &s);
2776 if (streq(name, "Id"))
2778 else if (streq(name, "LoadState"))
2780 else if (streq(name, "ActiveState"))
2781 i->active_state = s;
2782 else if (streq(name, "SubState"))
2784 else if (streq(name, "Description"))
2786 else if (streq(name, "FragmentPath"))
2787 i->fragment_path = s;
2788 else if (streq(name, "SourcePath"))
2790 else if (streq(name, "DefaultControlGroup"))
2791 i->default_control_group = s;
2792 else if (streq(name, "StatusText"))
2794 else if (streq(name, "SysFSPath"))
2796 else if (streq(name, "Where"))
2798 else if (streq(name, "What"))
2800 else if (streq(name, "Following"))
2802 else if (streq(name, "UnitFileState"))
2803 i->unit_file_state = s;
2804 else if (streq(name, "Result"))
2811 case DBUS_TYPE_BOOLEAN: {
2814 dbus_message_iter_get_basic(iter, &b);
2816 if (streq(name, "Accept"))
2818 else if (streq(name, "NeedDaemonReload"))
2819 i->need_daemon_reload = b;
2820 else if (streq(name, "ConditionResult"))
2821 i->condition_result = b;
2826 case DBUS_TYPE_UINT32: {
2829 dbus_message_iter_get_basic(iter, &u);
2831 if (streq(name, "MainPID")) {
2833 i->main_pid = (pid_t) u;
2836 } else if (streq(name, "ControlPID"))
2837 i->control_pid = (pid_t) u;
2838 else if (streq(name, "ExecMainPID")) {
2840 i->main_pid = (pid_t) u;
2841 } else if (streq(name, "NAccepted"))
2843 else if (streq(name, "NConnections"))
2844 i->n_connections = u;
2849 case DBUS_TYPE_INT32: {
2852 dbus_message_iter_get_basic(iter, &j);
2854 if (streq(name, "ExecMainCode"))
2855 i->exit_code = (int) j;
2856 else if (streq(name, "ExecMainStatus"))
2857 i->exit_status = (int) j;
2862 case DBUS_TYPE_UINT64: {
2865 dbus_message_iter_get_basic(iter, &u);
2867 if (streq(name, "ExecMainStartTimestamp"))
2868 i->start_timestamp = (usec_t) u;
2869 else if (streq(name, "ExecMainExitTimestamp"))
2870 i->exit_timestamp = (usec_t) u;
2871 else if (streq(name, "ActiveEnterTimestamp"))
2872 i->active_enter_timestamp = (usec_t) u;
2873 else if (streq(name, "InactiveEnterTimestamp"))
2874 i->inactive_enter_timestamp = (usec_t) u;
2875 else if (streq(name, "InactiveExitTimestamp"))
2876 i->inactive_exit_timestamp = (usec_t) u;
2877 else if (streq(name, "InactiveExitTimestampMonotonic"))
2878 i->inactive_exit_timestamp_monotonic = (usec_t) u;
2879 else if (streq(name, "ActiveExitTimestamp"))
2880 i->active_exit_timestamp = (usec_t) u;
2881 else if (streq(name, "ConditionTimestamp"))
2882 i->condition_timestamp = (usec_t) u;
2887 case DBUS_TYPE_ARRAY: {
2889 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT &&
2890 startswith(name, "Exec")) {
2891 DBusMessageIter sub;
2893 dbus_message_iter_recurse(iter, &sub);
2894 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2895 ExecStatusInfo *info;
2898 if (!(info = new0(ExecStatusInfo, 1)))
2901 if (!(info->name = strdup(name))) {
2906 if ((r = exec_status_info_deserialize(&sub, info)) < 0) {
2911 LIST_PREPEND(ExecStatusInfo, exec, i->exec, info);
2913 dbus_message_iter_next(&sub);
2915 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING &&
2916 streq(name, "Documentation")) {
2918 DBusMessageIter sub;
2920 dbus_message_iter_recurse(iter, &sub);
2921 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING) {
2925 dbus_message_iter_get_basic(&sub, &s);
2927 l = strv_append(i->documentation, s);
2931 strv_free(i->documentation);
2932 i->documentation = l;
2934 dbus_message_iter_next(&sub);
2941 case DBUS_TYPE_STRUCT: {
2943 if (streq(name, "LoadError")) {
2944 DBusMessageIter sub;
2945 const char *n, *message;
2948 dbus_message_iter_recurse(iter, &sub);
2950 r = bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &n, true);
2954 r = bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &message, false);
2958 if (!isempty(message))
2959 i->load_error = message;
2969 static int print_property(const char *name, DBusMessageIter *iter) {
2973 /* This is a low-level property printer, see
2974 * print_status_info() for the nicer output */
2976 if (arg_property && !strv_find(arg_property, name))
2979 switch (dbus_message_iter_get_arg_type(iter)) {
2981 case DBUS_TYPE_STRUCT: {
2982 DBusMessageIter sub;
2983 dbus_message_iter_recurse(iter, &sub);
2985 if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_UINT32 && streq(name, "Job")) {
2988 dbus_message_iter_get_basic(&sub, &u);
2991 printf("%s=%u\n", name, (unsigned) u);
2993 printf("%s=\n", name);
2996 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "Unit")) {
2999 dbus_message_iter_get_basic(&sub, &s);
3001 if (arg_all || s[0])
3002 printf("%s=%s\n", name, s);
3005 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "LoadError")) {
3006 const char *a = NULL, *b = NULL;
3008 if (bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &a, true) >= 0)
3009 bus_iter_get_basic_and_next(&sub, DBUS_TYPE_STRING, &b, false);
3011 if (arg_all || !isempty(a) || !isempty(b))
3012 printf("%s=%s \"%s\"\n", name, strempty(a), strempty(b));
3020 case DBUS_TYPE_ARRAY:
3022 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "EnvironmentFiles")) {
3023 DBusMessageIter sub, sub2;
3025 dbus_message_iter_recurse(iter, &sub);
3026 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3030 dbus_message_iter_recurse(&sub, &sub2);
3032 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) >= 0 &&
3033 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, false) >= 0)
3034 printf("EnvironmentFile=%s (ignore_errors=%s)\n", path, yes_no(ignore));
3036 dbus_message_iter_next(&sub);
3041 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Paths")) {
3042 DBusMessageIter sub, sub2;
3044 dbus_message_iter_recurse(iter, &sub);
3045 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3046 const char *type, *path;
3048 dbus_message_iter_recurse(&sub, &sub2);
3050 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
3051 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
3052 printf("%s=%s\n", type, path);
3054 dbus_message_iter_next(&sub);
3059 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Timers")) {
3060 DBusMessageIter sub, sub2;
3062 dbus_message_iter_recurse(iter, &sub);
3063 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3065 uint64_t value, next_elapse;
3067 dbus_message_iter_recurse(&sub, &sub2);
3069 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &base, true) >= 0 &&
3070 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &value, true) >= 0 &&
3071 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &next_elapse, false) >= 0) {
3072 char timespan1[FORMAT_TIMESPAN_MAX], timespan2[FORMAT_TIMESPAN_MAX];
3074 printf("%s={ value=%s ; next_elapse=%s }\n",
3076 format_timespan(timespan1, sizeof(timespan1), value),
3077 format_timespan(timespan2, sizeof(timespan2), next_elapse));
3080 dbus_message_iter_next(&sub);
3085 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "ControlGroupAttributes")) {
3086 DBusMessageIter sub, sub2;
3088 dbus_message_iter_recurse(iter, &sub);
3089 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3090 const char *controller, *attr, *value;
3092 dbus_message_iter_recurse(&sub, &sub2);
3094 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &controller, true) >= 0 &&
3095 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &attr, true) >= 0 &&
3096 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &value, false) >= 0) {
3098 printf("ControlGroupAttribute={ controller=%s ; attribute=%s ; value=\"%s\" }\n",
3104 dbus_message_iter_next(&sub);
3109 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && startswith(name, "Exec")) {
3110 DBusMessageIter sub;
3112 dbus_message_iter_recurse(iter, &sub);
3113 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
3114 ExecStatusInfo info;
3117 if (exec_status_info_deserialize(&sub, &info) >= 0) {
3118 char timestamp1[FORMAT_TIMESTAMP_MAX], timestamp2[FORMAT_TIMESTAMP_MAX];
3121 t = strv_join(info.argv, " ");
3123 printf("%s={ path=%s ; argv[]=%s ; ignore_errors=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
3127 yes_no(info.ignore),
3128 strna(format_timestamp(timestamp1, sizeof(timestamp1), info.start_timestamp)),
3129 strna(format_timestamp(timestamp2, sizeof(timestamp2), info.exit_timestamp)),
3130 (unsigned) info. pid,
3131 sigchld_code_to_string(info.code),
3133 info.code == CLD_EXITED ? "" : "/",
3134 strempty(info.code == CLD_EXITED ? NULL : signal_to_string(info.status)));
3140 strv_free(info.argv);
3142 dbus_message_iter_next(&sub);
3151 if (generic_print_property(name, iter, arg_all) > 0)
3155 printf("%s=[unprintable]\n", name);
3160 static int show_one(const char *verb, DBusConnection *bus, const char *path, bool show_properties, bool *new_line) {
3161 _cleanup_free_ DBusMessage *reply = NULL;
3162 const char *interface = "";
3164 DBusMessageIter iter, sub, sub2, sub3;
3165 UnitStatusInfo info;
3173 r = bus_method_call_with_reply(
3175 "org.freedesktop.systemd1",
3177 "org.freedesktop.DBus.Properties",
3181 DBUS_TYPE_STRING, &interface,
3186 if (!dbus_message_iter_init(reply, &iter) ||
3187 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
3188 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
3189 log_error("Failed to parse reply.");
3193 dbus_message_iter_recurse(&iter, &sub);
3200 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
3203 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_DICT_ENTRY);
3204 dbus_message_iter_recurse(&sub, &sub2);
3206 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
3207 dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
3208 log_error("Failed to parse reply.");
3212 dbus_message_iter_recurse(&sub2, &sub3);
3214 if (show_properties)
3215 r = print_property(name, &sub3);
3217 r = status_property(name, &sub3, &info);
3219 log_error("Failed to parse reply.");
3223 dbus_message_iter_next(&sub);
3228 if (!show_properties) {
3229 if (streq(verb, "help"))
3230 show_unit_help(&info);
3232 print_status_info(&info);
3235 strv_free(info.documentation);
3237 if (!streq_ptr(info.active_state, "active") &&
3238 !streq_ptr(info.active_state, "reloading") &&
3239 streq(verb, "status"))
3240 /* According to LSB: "program not running" */
3243 while ((p = info.exec)) {
3244 LIST_REMOVE(ExecStatusInfo, exec, info.exec, p);
3245 exec_status_info_free(p);
3251 static int show_one_by_pid(const char *verb, DBusConnection *bus, uint32_t pid, bool *new_line) {
3252 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3253 const char *path = NULL;
3257 dbus_error_init(&error);
3259 r = bus_method_call_with_reply(
3261 "org.freedesktop.systemd1",
3262 "/org/freedesktop/systemd1",
3263 "org.freedesktop.systemd1.Manager",
3267 DBUS_TYPE_UINT32, &pid,
3272 if (!dbus_message_get_args(reply, &error,
3273 DBUS_TYPE_OBJECT_PATH, &path,
3274 DBUS_TYPE_INVALID)) {
3275 log_error("Failed to parse reply: %s", bus_error_message(&error));
3280 r = show_one(verb, bus, path, false, new_line);
3283 dbus_error_free(&error);
3288 static int show(DBusConnection *bus, char **args) {
3290 bool show_properties, new_line = false;
3296 show_properties = streq(args[0], "show");
3298 if (show_properties)
3299 pager_open_if_enabled();
3301 /* If no argument is specified inspect the manager itself */
3303 if (show_properties && strv_length(args) <= 1)
3304 return show_one(args[0], bus, "/org/freedesktop/systemd1", show_properties, &new_line);
3306 STRV_FOREACH(name, args+1) {
3309 if (safe_atou32(*name, &id) < 0) {
3310 _cleanup_free_ char *p = NULL, *n = NULL;
3311 /* Interpret as unit name */
3313 n = unit_name_mangle(*name);
3317 p = unit_dbus_path_from_name(n);
3321 r = show_one(args[0], bus, p, show_properties, &new_line);
3325 } else if (show_properties) {
3326 _cleanup_free_ char *p = NULL;
3328 /* Interpret as job id */
3329 if (asprintf(&p, "/org/freedesktop/systemd1/job/%u", id) < 0)
3332 r = show_one(args[0], bus, p, show_properties, &new_line);
3337 /* Interpret as PID */
3338 r = show_one_by_pid(args[0], bus, id, &new_line);
3347 static int dump(DBusConnection *bus, char **args) {
3348 _cleanup_free_ DBusMessage *reply = NULL;
3353 dbus_error_init(&error);
3355 pager_open_if_enabled();
3357 r = bus_method_call_with_reply(
3359 "org.freedesktop.systemd1",
3360 "/org/freedesktop/systemd1",
3361 "org.freedesktop.systemd1.Manager",
3369 if (!dbus_message_get_args(reply, &error,
3370 DBUS_TYPE_STRING, &text,
3371 DBUS_TYPE_INVALID)) {
3372 log_error("Failed to parse reply: %s", bus_error_message(&error));
3373 dbus_error_free(&error);
3377 fputs(text, stdout);
3381 static int snapshot(DBusConnection *bus, char **args) {
3382 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3385 dbus_bool_t cleanup = FALSE;
3386 DBusMessageIter iter, sub;
3389 *interface = "org.freedesktop.systemd1.Unit",
3391 _cleanup_free_ char *n = NULL;
3393 dbus_error_init(&error);
3395 if (strv_length(args) > 1)
3396 n = snapshot_name_mangle(args[1]);
3402 r = bus_method_call_with_reply (
3404 "org.freedesktop.systemd1",
3405 "/org/freedesktop/systemd1",
3406 "org.freedesktop.systemd1.Manager",
3410 DBUS_TYPE_STRING, &n,
3411 DBUS_TYPE_BOOLEAN, &cleanup,
3416 if (!dbus_message_get_args(reply, &error,
3417 DBUS_TYPE_OBJECT_PATH, &path,
3418 DBUS_TYPE_INVALID)) {
3419 log_error("Failed to parse reply: %s", bus_error_message(&error));
3420 dbus_error_free(&error);
3424 dbus_message_unref(reply);
3427 r = bus_method_call_with_reply (
3429 "org.freedesktop.systemd1",
3431 "org.freedesktop.DBus.Properties",
3435 DBUS_TYPE_STRING, &interface,
3436 DBUS_TYPE_STRING, &property,
3441 if (!dbus_message_iter_init(reply, &iter) ||
3442 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3443 log_error("Failed to parse reply.");
3447 dbus_message_iter_recurse(&iter, &sub);
3449 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
3450 log_error("Failed to parse reply.");
3454 dbus_message_iter_get_basic(&sub, &id);
3462 static int delete_snapshot(DBusConnection *bus, char **args) {
3467 STRV_FOREACH(name, args+1) {
3468 _cleanup_free_ char *n = NULL;
3471 n = snapshot_name_mangle(*name);
3475 r = bus_method_call_with_reply(
3477 "org.freedesktop.systemd1",
3478 "/org/freedesktop/systemd1",
3479 "org.freedesktop.systemd1.Manager",
3483 DBUS_TYPE_STRING, &n,
3492 static int daemon_reload(DBusConnection *bus, char **args) {
3497 if (arg_action == ACTION_RELOAD)
3499 else if (arg_action == ACTION_REEXEC)
3500 method = "Reexecute";
3502 assert(arg_action == ACTION_SYSTEMCTL);
3505 streq(args[0], "clear-jobs") ||
3506 streq(args[0], "cancel") ? "ClearJobs" :
3507 streq(args[0], "daemon-reexec") ? "Reexecute" :
3508 streq(args[0], "reset-failed") ? "ResetFailed" :
3509 streq(args[0], "halt") ? "Halt" :
3510 streq(args[0], "poweroff") ? "PowerOff" :
3511 streq(args[0], "reboot") ? "Reboot" :
3512 streq(args[0], "kexec") ? "KExec" :
3513 streq(args[0], "exit") ? "Exit" :
3514 /* "daemon-reload" */ "Reload";
3517 r = bus_method_call_with_reply(
3519 "org.freedesktop.systemd1",
3520 "/org/freedesktop/systemd1",
3521 "org.freedesktop.systemd1.Manager",
3527 if (r == -ENOENT && arg_action != ACTION_SYSTEMCTL)
3528 /* There's always a fallback possible for
3529 * legacy actions. */
3531 else if (r == -ETIMEDOUT && streq(method, "Reexecute"))
3532 /* On reexecution, we expect a disconnect, not
3536 log_error("Failed to issue method call: %s", bus_error_message(&error));
3538 dbus_error_free(&error);
3542 static int reset_failed(DBusConnection *bus, char **args) {
3546 if (strv_length(args) <= 1)
3547 return daemon_reload(bus, args);
3549 STRV_FOREACH(name, args+1) {
3550 _cleanup_free_ char *n;
3552 n = unit_name_mangle(*name);
3556 r = bus_method_call_with_reply(
3558 "org.freedesktop.systemd1",
3559 "/org/freedesktop/systemd1",
3560 "org.freedesktop.systemd1.Manager",
3564 DBUS_TYPE_STRING, &n,
3573 static int show_enviroment(DBusConnection *bus, char **args) {
3574 _cleanup_dbus_message_unref_ DBusMessage *reply = NULL;
3575 DBusMessageIter iter, sub, sub2;
3578 *interface = "org.freedesktop.systemd1.Manager",
3579 *property = "Environment";
3581 pager_open_if_enabled();
3583 r = bus_method_call_with_reply(
3585 "org.freedesktop.systemd1",
3586 "/org/freedesktop/systemd1",
3587 "org.freedesktop.DBus.Properties",
3591 DBUS_TYPE_STRING, &interface,
3592 DBUS_TYPE_STRING, &property,
3597 if (!dbus_message_iter_init(reply, &iter) ||
3598 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3599 log_error("Failed to parse reply.");
3603 dbus_message_iter_recurse(&iter, &sub);
3605 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_ARRAY ||
3606 dbus_message_iter_get_element_type(&sub) != DBUS_TYPE_STRING) {
3607 log_error("Failed to parse reply.");
3611 dbus_message_iter_recurse(&sub, &sub2);
3613 while (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_INVALID) {
3616 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_STRING) {
3617 log_error("Failed to parse reply.");
3621 dbus_message_iter_get_basic(&sub2, &text);
3624 dbus_message_iter_next(&sub2);
3630 static int switch_root(DBusConnection *bus, char **args) {
3633 _cleanup_free_ char *init = NULL;
3635 l = strv_length(args);
3636 if (l < 2 || l > 3) {
3637 log_error("Wrong number of arguments.");
3644 init = strdup(args[2]);
3646 parse_env_file("/proc/cmdline", WHITESPACE,
3656 log_debug("switching root - root: %s; init: %s", root, init);
3658 return bus_method_call_with_reply(
3660 "org.freedesktop.systemd1",
3661 "/org/freedesktop/systemd1",
3662 "org.freedesktop.systemd1.Manager",
3666 DBUS_TYPE_STRING, &root,
3667 DBUS_TYPE_STRING, &init,
3671 static int set_environment(DBusConnection *bus, char **args) {
3672 _cleanup_dbus_message_unref_ DBusMessage *m = NULL, *reply = NULL;
3675 DBusMessageIter iter;
3681 dbus_error_init(&error);
3683 method = streq(args[0], "set-environment")
3685 : "UnsetEnvironment";
3687 m = dbus_message_new_method_call(
3688 "org.freedesktop.systemd1",
3689 "/org/freedesktop/systemd1",
3690 "org.freedesktop.systemd1.Manager",
3695 dbus_message_iter_init_append(m, &iter);
3697 r = bus_append_strv_iter(&iter, args + 1);
3701 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
3703 log_error("Failed to issue method call: %s", bus_error_message(&error));
3704 dbus_error_free(&error);
3711 static int enable_sysv_units(char **args) {
3714 #if defined(HAVE_SYSV_COMPAT) && defined(HAVE_CHKCONFIG)
3715 const char *verb = args[0];
3716 unsigned f = 1, t = 1;
3719 if (arg_scope != UNIT_FILE_SYSTEM)
3722 if (!streq(verb, "enable") &&
3723 !streq(verb, "disable") &&
3724 !streq(verb, "is-enabled"))
3727 /* Processes all SysV units, and reshuffles the array so that
3728 * afterwards only the native units remain */
3731 r = lookup_paths_init(&paths, SYSTEMD_SYSTEM, false, NULL, NULL, NULL);
3736 for (f = 1; args[f]; f++) {
3739 bool found_native = false, found_sysv;
3741 const char *argv[6] = { "/sbin/chkconfig", NULL, NULL, NULL, NULL };
3742 char **k, *l, *q = NULL;
3749 if (!endswith(name, ".service"))
3752 if (path_is_absolute(name))
3755 STRV_FOREACH(k, paths.unit_path) {
3758 if (!isempty(arg_root))
3759 asprintf(&p, "%s/%s/%s", arg_root, *k, name);
3761 asprintf(&p, "%s/%s", *k, name);
3768 found_native = access(p, F_OK) >= 0;
3779 if (!isempty(arg_root))
3780 asprintf(&p, "%s/" SYSTEM_SYSVINIT_PATH "/%s", arg_root, name);
3782 asprintf(&p, SYSTEM_SYSVINIT_PATH "/%s", name);
3788 p[strlen(p) - sizeof(".service") + 1] = 0;
3789 found_sysv = access(p, F_OK) >= 0;
3796 /* Mark this entry, so that we don't try enabling it as native unit */
3797 args[f] = (char*) "";
3799 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", name);
3801 if (!isempty(arg_root))
3802 argv[c++] = q = strappend("--root=", arg_root);
3804 argv[c++] = path_get_file_name(p);
3806 streq(verb, "enable") ? "on" :
3807 streq(verb, "disable") ? "off" : "--level=5";
3810 l = strv_join((char**)argv, " ");
3818 log_info("Executing %s", l);
3823 log_error("Failed to fork: %m");
3828 } else if (pid == 0) {
3831 execv(argv[0], (char**) argv);
3832 _exit(EXIT_FAILURE);
3838 j = wait_for_terminate(pid, &status);
3840 log_error("Failed to wait for child: %s", strerror(-r));
3845 if (status.si_code == CLD_EXITED) {
3846 if (streq(verb, "is-enabled")) {
3847 if (status.si_status == 0) {
3856 } else if (status.si_status != 0) {
3867 lookup_paths_free(&paths);
3869 /* Drop all SysV units */
3870 for (f = 1, t = 1; args[f]; f++) {
3872 if (isempty(args[f]))
3875 args[t++] = args[f];
3884 static int mangle_names(char **original_names, char ***mangled_names) {
3885 char **i, **l, **name;
3887 l = new(char*, strv_length(original_names) + 1);
3892 STRV_FOREACH(name, original_names) {
3894 /* When enabling units qualified path names are OK,
3895 * too, hence allow them explicitly. */
3900 *i = unit_name_mangle(*name);
3916 static int enable_unit(DBusConnection *bus, char **args) {
3917 const char *verb = args[0];
3918 UnitFileChange *changes = NULL;
3919 unsigned n_changes = 0, i;
3920 int carries_install_info = -1;
3921 DBusMessage *m = NULL, *reply = NULL;
3924 char **mangled_names = NULL;
3926 r = enable_sysv_units(args);
3933 dbus_error_init(&error);
3935 if (!bus || avoid_bus()) {
3936 if (streq(verb, "enable")) {
3937 r = unit_file_enable(arg_scope, arg_runtime, arg_root, args+1, arg_force, &changes, &n_changes);
3938 carries_install_info = r;
3939 } else if (streq(verb, "disable"))
3940 r = unit_file_disable(arg_scope, arg_runtime, arg_root, args+1, &changes, &n_changes);
3941 else if (streq(verb, "reenable")) {
3942 r = unit_file_reenable(arg_scope, arg_runtime, arg_root, args+1, arg_force, &changes, &n_changes);
3943 carries_install_info = r;
3944 } else if (streq(verb, "link"))
3945 r = unit_file_link(arg_scope, arg_runtime, arg_root, args+1, arg_force, &changes, &n_changes);
3946 else if (streq(verb, "preset")) {
3947 r = unit_file_preset(arg_scope, arg_runtime, arg_root, args+1, arg_force, &changes, &n_changes);
3948 carries_install_info = r;
3949 } else if (streq(verb, "mask"))
3950 r = unit_file_mask(arg_scope, arg_runtime, arg_root, args+1, arg_force, &changes, &n_changes);
3951 else if (streq(verb, "unmask"))
3952 r = unit_file_unmask(arg_scope, arg_runtime, arg_root, args+1, &changes, &n_changes);
3954 assert_not_reached("Unknown verb");
3957 log_error("Operation failed: %s", strerror(-r));
3962 for (i = 0; i < n_changes; i++) {
3963 if (changes[i].type == UNIT_FILE_SYMLINK)
3964 log_info("ln -s '%s' '%s'", changes[i].source, changes[i].path);
3966 log_info("rm '%s'", changes[i].path);
3973 bool send_force = true, expect_carries_install_info = false;
3975 DBusMessageIter iter, sub, sub2;
3977 if (streq(verb, "enable")) {
3978 method = "EnableUnitFiles";
3979 expect_carries_install_info = true;
3980 } else if (streq(verb, "disable")) {
3981 method = "DisableUnitFiles";
3983 } else if (streq(verb, "reenable")) {
3984 method = "ReenableUnitFiles";
3985 expect_carries_install_info = true;
3986 } else if (streq(verb, "link"))
3987 method = "LinkUnitFiles";
3988 else if (streq(verb, "preset")) {
3989 method = "PresetUnitFiles";
3990 expect_carries_install_info = true;
3991 } else if (streq(verb, "mask"))
3992 method = "MaskUnitFiles";
3993 else if (streq(verb, "unmask")) {
3994 method = "UnmaskUnitFiles";
3997 assert_not_reached("Unknown verb");
3999 m = dbus_message_new_method_call(
4000 "org.freedesktop.systemd1",
4001 "/org/freedesktop/systemd1",
4002 "org.freedesktop.systemd1.Manager",
4009 dbus_message_iter_init_append(m, &iter);
4011 r = mangle_names(args+1, &mangled_names);
4015 r = bus_append_strv_iter(&iter, mangled_names);
4017 log_error("Failed to append unit files.");
4022 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &a)) {
4023 log_error("Failed to append runtime boolean.");
4031 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b)) {
4032 log_error("Failed to append force boolean.");
4038 reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error);
4040 log_error("Failed to issue method call: %s", bus_error_message(&error));
4045 if (!dbus_message_iter_init(reply, &iter)) {
4046 log_error("Failed to initialize iterator.");
4050 if (expect_carries_install_info) {
4051 r = bus_iter_get_basic_and_next(&iter, DBUS_TYPE_BOOLEAN, &b, true);
4053 log_error("Failed to parse reply.");
4057 carries_install_info = b;
4060 if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
4061 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
4062 log_error("Failed to parse reply.");
4067 dbus_message_iter_recurse(&iter, &sub);
4068 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
4069 const char *type, *path, *source;
4071 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
4072 log_error("Failed to parse reply.");
4077 dbus_message_iter_recurse(&sub, &sub2);
4079 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
4080 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0 ||
4081 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &source, false) < 0) {
4082 log_error("Failed to parse reply.");
4088 if (streq(type, "symlink"))
4089 log_info("ln -s '%s' '%s'", source, path);
4091 log_info("rm '%s'", path);
4094 dbus_message_iter_next(&sub);
4097 /* Try to reload if enabeld */
4099 r = daemon_reload(bus, args);
4102 if (carries_install_info == 0)
4104 "The unit files have no [Install] section. They are not meant to be enabled\n"
4105 "using systemctl.\n"
4106 "Possible reasons for having this kind of units are:\n"
4107 "1) A unit may be statically enabled by being symlinked from another unit's\n"
4108 " .wants/ or .requires/ directory.\n"
4109 "2) A unit's purpose may be to act as a helper for some other unit which has\n"
4110 " a requirement dependency on it.\n"
4111 "3) A unit may be started when needed via activation (socket, path, timer,\n"
4112 " D-Bus, udev, scripted systemctl call, ...).\n");
4116 dbus_message_unref(m);
4119 dbus_message_unref(reply);
4121 unit_file_changes_free(changes, n_changes);
4123 dbus_error_free(&error);
4125 strv_free(mangled_names);
4130 static int unit_is_enabled(DBusConnection *bus, char **args) {
4133 DBusMessage *reply = NULL;
4137 dbus_error_init(&error);
4139 r = enable_sysv_units(args);
4145 if (!bus || avoid_bus()) {
4147 STRV_FOREACH(name, args+1) {
4148 UnitFileState state;
4150 state = unit_file_get_state(arg_scope, arg_root, *name);
4156 if (state == UNIT_FILE_ENABLED ||
4157 state == UNIT_FILE_ENABLED_RUNTIME ||
4158 state == UNIT_FILE_STATIC)
4162 puts(unit_file_state_to_string(state));
4166 STRV_FOREACH(name, args+1) {
4169 r = bus_method_call_with_reply (
4171 "org.freedesktop.systemd1",
4172 "/org/freedesktop/systemd1",
4173 "org.freedesktop.systemd1.Manager",
4177 DBUS_TYPE_STRING, name,
4182 if (!dbus_message_get_args(reply, &error,
4183 DBUS_TYPE_STRING, &s,
4184 DBUS_TYPE_INVALID)) {
4185 log_error("Failed to parse reply: %s", bus_error_message(&error));
4190 dbus_message_unref(reply);
4193 if (streq(s, "enabled") ||
4194 streq(s, "enabled-runtime") ||
4203 r = enabled ? 0 : 1;
4207 dbus_message_unref(reply);
4209 dbus_error_free(&error);
4213 static int systemctl_help(void) {
4215 pager_open_if_enabled();
4217 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4218 "Query or send control commands to the systemd manager.\n\n"
4219 " -h --help Show this help\n"
4220 " --version Show package version\n"
4221 " -t --type=TYPE List only units of a particular type\n"
4222 " -p --property=NAME Show only properties by this name\n"
4223 " -a --all Show all units/properties, including dead/empty ones\n"
4224 " --failed Show only failed units\n"
4225 " --full Don't ellipsize unit names on output\n"
4226 " --fail When queueing a new job, fail if conflicting jobs are\n"
4228 " --ignore-dependencies\n"
4229 " When queueing a new job, ignore all its dependencies\n"
4230 " -i --ignore-inhibitors\n"
4231 " When shutting down or sleeping, ignore inhibitors\n"
4232 " --kill-who=WHO Who to send signal to\n"
4233 " -s --signal=SIGNAL Which signal to send\n"
4234 " -H --host=[USER@]HOST\n"
4235 " Show information for remote host\n"
4236 " -P --privileged Acquire privileges before execution\n"
4237 " -q --quiet Suppress output\n"
4238 " --no-block Do not wait until operation finished\n"
4239 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4240 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4242 " --no-legend Do not print a legend (column headers and hints)\n"
4243 " --no-pager Do not pipe output into a pager\n"
4244 " --no-ask-password\n"
4245 " Do not ask for system passwords\n"
4246 " --order When generating graph for dot, show only order\n"
4247 " --require When generating graph for dot, show only requirement\n"
4248 " --system Connect to system manager\n"
4249 " --user Connect to user service manager\n"
4250 " --global Enable/disable unit files globally\n"
4251 " -f --force When enabling unit files, override existing symlinks\n"
4252 " When shutting down, execute action immediately\n"
4253 " --root=PATH Enable unit files in the specified root directory\n"
4254 " --runtime Enable unit files only temporarily until next reboot\n"
4255 " -n --lines=INTEGER Journal entries to show\n"
4256 " -o --output=STRING Change journal output mode (short, short-monotonic,\n"
4257 " verbose, export, json, json-pretty, json-sse, cat)\n\n"
4259 " list-units List loaded units\n"
4260 " start [NAME...] Start (activate) one or more units\n"
4261 " stop [NAME...] Stop (deactivate) one or more units\n"
4262 " reload [NAME...] Reload one or more units\n"
4263 " restart [NAME...] Start or restart one or more units\n"
4264 " try-restart [NAME...] Restart one or more units if active\n"
4265 " reload-or-restart [NAME...] Reload one or more units if possible,\n"
4266 " otherwise start or restart\n"
4267 " reload-or-try-restart [NAME...] Reload one or more units if possible,\n"
4268 " otherwise restart if active\n"
4269 " isolate [NAME] Start one unit and stop all others\n"
4270 " kill [NAME...] Send signal to processes of a unit\n"
4271 " is-active [NAME...] Check whether units are active\n"
4272 " is-failed [NAME...] Check whether units are failed\n"
4273 " status [NAME...|PID...] Show runtime status of one or more units\n"
4274 " show [NAME...|JOB...] Show properties of one or more\n"
4275 " units/jobs or the manager\n"
4276 " help [NAME...|PID...] Show manual for one or more units\n"
4277 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4279 " set-cgroup [NAME] [CGROUP...] Add unit to a control group\n"
4280 " unset-cgroup [NAME] [CGROUP...] Remove unit from a control group\n"
4281 " set-cgroup-attr [NAME] [ATTR] [VALUE] ...\n"
4282 " Set control group attribute\n"
4283 " unset-cgroup-attr [NAME] [ATTR...]\n"
4284 " Unset control group attribute\n"
4285 " load [NAME...] Load one or more units\n"
4286 " list-dependencies [NAME] Recursively show units which are required\n"
4287 " or wanted by this unit\n\n"
4288 "Unit File Commands:\n"
4289 " list-unit-files List installed unit files\n"
4290 " enable [NAME...] Enable one or more unit files\n"
4291 " disable [NAME...] Disable one or more unit files\n"
4292 " reenable [NAME...] Reenable one or more unit files\n"
4293 " preset [NAME...] Enable/disable one or more unit files\n"
4294 " based on preset configuration\n"
4295 " mask [NAME...] Mask one or more units\n"
4296 " unmask [NAME...] Unmask one or more units\n"
4297 " link [PATH...] Link one or more units files into\n"
4298 " the search path\n"
4299 " is-enabled [NAME...] Check whether unit files are enabled\n\n"
4301 " list-jobs List jobs\n"
4302 " cancel [JOB...] Cancel all, one, or more jobs\n\n"
4303 "Status Commands:\n"
4304 " dump Dump server status\n"
4305 " dot Dump dependency graph for dot(1)\n\n"
4306 "Snapshot Commands:\n"
4307 " snapshot [NAME] Create a snapshot\n"
4308 " delete [NAME...] Remove one or more snapshots\n\n"
4309 "Environment Commands:\n"
4310 " show-environment Dump environment\n"
4311 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4312 " unset-environment [NAME...] Unset one or more environment variables\n\n"
4313 "Manager Lifecycle Commands:\n"
4314 " daemon-reload Reload systemd manager configuration\n"
4315 " daemon-reexec Reexecute systemd manager\n\n"
4316 "System Commands:\n"
4317 " default Enter system default mode\n"
4318 " rescue Enter system rescue mode\n"
4319 " emergency Enter system emergency mode\n"
4320 " halt Shut down and halt the system\n"
4321 " poweroff Shut down and power-off the system\n"
4322 " reboot Shut down and reboot the system\n"
4323 " kexec Shut down and reboot the system with kexec\n"
4324 " exit Request user instance exit\n"
4325 " switch-root [ROOT] [INIT] Change to a different root file system\n"
4326 " suspend Suspend the system\n"
4327 " hibernate Hibernate the system\n"
4328 " hybrid-sleep Hibernate and suspend the system\n",
4329 program_invocation_short_name);
4334 static int halt_help(void) {
4336 printf("%s [OPTIONS...]\n\n"
4337 "%s the system.\n\n"
4338 " --help Show this help\n"
4339 " --halt Halt the machine\n"
4340 " -p --poweroff Switch off the machine\n"
4341 " --reboot Reboot the machine\n"
4342 " -f --force Force immediate halt/power-off/reboot\n"
4343 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4344 " -d --no-wtmp Don't write wtmp record\n"
4345 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4346 program_invocation_short_name,
4347 arg_action == ACTION_REBOOT ? "Reboot" :
4348 arg_action == ACTION_POWEROFF ? "Power off" :
4354 static int shutdown_help(void) {
4356 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4357 "Shut down the system.\n\n"
4358 " --help Show this help\n"
4359 " -H --halt Halt the machine\n"
4360 " -P --poweroff Power-off the machine\n"
4361 " -r --reboot Reboot the machine\n"
4362 " -h Equivalent to --poweroff, overridden by --halt\n"
4363 " -k Don't halt/power-off/reboot, just send warnings\n"
4364 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4365 " -c Cancel a pending shutdown\n",
4366 program_invocation_short_name);
4371 static int telinit_help(void) {
4373 printf("%s [OPTIONS...] {COMMAND}\n\n"
4374 "Send control commands to the init daemon.\n\n"
4375 " --help Show this help\n"
4376 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4378 " 0 Power-off the machine\n"
4379 " 6 Reboot the machine\n"
4380 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4381 " 1, s, S Enter rescue mode\n"
4382 " q, Q Reload init daemon configuration\n"
4383 " u, U Reexecute init daemon\n",
4384 program_invocation_short_name);
4389 static int runlevel_help(void) {
4391 printf("%s [OPTIONS...]\n\n"
4392 "Prints the previous and current runlevel of the init system.\n\n"
4393 " --help Show this help\n",
4394 program_invocation_short_name);
4399 static int help_types(void) {
4402 puts("Available unit types:");
4403 for(i = UNIT_SERVICE; i < _UNIT_TYPE_MAX; i++)
4404 if (unit_type_table[i])
4405 puts(unit_type_table[i]);
4407 puts("\nAvailable unit load states: ");
4408 for(i = UNIT_STUB; i < _UNIT_LOAD_STATE_MAX; i++)
4409 if (unit_type_table[i])
4410 puts(unit_load_state_table[i]);
4415 static int systemctl_parse_argv(int argc, char *argv[]) {
4419 ARG_IGNORE_DEPENDENCIES,
4434 ARG_NO_ASK_PASSWORD,
4440 static const struct option options[] = {
4441 { "help", no_argument, NULL, 'h' },
4442 { "version", no_argument, NULL, ARG_VERSION },
4443 { "type", required_argument, NULL, 't' },
4444 { "property", required_argument, NULL, 'p' },
4445 { "all", no_argument, NULL, 'a' },
4446 { "failed", no_argument, NULL, ARG_FAILED },
4447 { "full", no_argument, NULL, ARG_FULL },
4448 { "fail", no_argument, NULL, ARG_FAIL },
4449 { "ignore-dependencies", no_argument, NULL, ARG_IGNORE_DEPENDENCIES },
4450 { "ignore-inhibitors", no_argument, NULL, 'i' },
4451 { "user", no_argument, NULL, ARG_USER },
4452 { "system", no_argument, NULL, ARG_SYSTEM },
4453 { "global", no_argument, NULL, ARG_GLOBAL },
4454 { "no-block", no_argument, NULL, ARG_NO_BLOCK },
4455 { "no-legend", no_argument, NULL, ARG_NO_LEGEND },
4456 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
4457 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4458 { "quiet", no_argument, NULL, 'q' },
4459 { "order", no_argument, NULL, ARG_ORDER },
4460 { "require", no_argument, NULL, ARG_REQUIRE },
4461 { "root", required_argument, NULL, ARG_ROOT },
4462 { "force", no_argument, NULL, ARG_FORCE },
4463 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
4464 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
4465 { "signal", required_argument, NULL, 's' },
4466 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
4467 { "host", required_argument, NULL, 'H' },
4468 { "privileged",no_argument, NULL, 'P' },
4469 { "runtime", no_argument, NULL, ARG_RUNTIME },
4470 { "lines", required_argument, NULL, 'n' },
4471 { "output", required_argument, NULL, 'o' },
4472 { NULL, 0, NULL, 0 }
4480 while ((c = getopt_long(argc, argv, "ht:p:aqfs:H:Pn:o:i", options, NULL)) >= 0) {
4489 puts(PACKAGE_STRING);
4490 puts(SYSTEMD_FEATURES);
4494 if (streq(optarg, "help")) {
4499 if (unit_type_from_string(optarg) >= 0) {
4503 if (unit_load_state_from_string(optarg) >= 0) {
4504 arg_load_state = optarg;
4507 log_error("Unkown unit type or load state '%s'.",
4509 log_info("Use -t help to see a list of allowed values.");
4514 if (!(l = strv_append(arg_property, optarg)))
4517 strv_free(arg_property);
4520 /* If the user asked for a particular
4521 * property, show it to him, even if it is
4532 arg_job_mode = "fail";
4535 case ARG_IGNORE_DEPENDENCIES:
4536 arg_job_mode = "ignore-dependencies";
4540 arg_scope = UNIT_FILE_USER;
4544 arg_scope = UNIT_FILE_SYSTEM;
4548 arg_scope = UNIT_FILE_GLOBAL;
4552 arg_no_block = true;
4556 arg_no_legend = true;
4560 arg_no_pager = true;
4568 arg_dot = DOT_ORDER;
4572 arg_dot = DOT_REQUIRE;
4600 arg_no_reload = true;
4604 arg_kill_who = optarg;
4608 if ((arg_signal = signal_from_string_try_harder(optarg)) < 0) {
4609 log_error("Failed to parse signal string %s.", optarg);
4614 case ARG_NO_ASK_PASSWORD:
4615 arg_ask_password = false;
4619 arg_transport = TRANSPORT_POLKIT;
4623 arg_transport = TRANSPORT_SSH;
4632 if (safe_atou(optarg, &arg_lines) < 0) {
4633 log_error("Failed to parse lines '%s'", optarg);
4639 arg_output = output_mode_from_string(optarg);
4640 if (arg_output < 0) {
4641 log_error("Unknown output '%s'.", optarg);
4647 arg_ignore_inhibitors = true;
4654 log_error("Unknown option code '%c'.", c);
4659 if (arg_transport != TRANSPORT_NORMAL && arg_scope != UNIT_FILE_SYSTEM) {
4660 log_error("Cannot access user instance remotely.");
4667 static int halt_parse_argv(int argc, char *argv[]) {
4676 static const struct option options[] = {
4677 { "help", no_argument, NULL, ARG_HELP },
4678 { "halt", no_argument, NULL, ARG_HALT },
4679 { "poweroff", no_argument, NULL, 'p' },
4680 { "reboot", no_argument, NULL, ARG_REBOOT },
4681 { "force", no_argument, NULL, 'f' },
4682 { "wtmp-only", no_argument, NULL, 'w' },
4683 { "no-wtmp", no_argument, NULL, 'd' },
4684 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4685 { NULL, 0, NULL, 0 }
4693 if (utmp_get_runlevel(&runlevel, NULL) >= 0)
4694 if (runlevel == '0' || runlevel == '6')
4697 while ((c = getopt_long(argc, argv, "pfwdnih", options, NULL)) >= 0) {
4705 arg_action = ACTION_HALT;
4709 if (arg_action != ACTION_REBOOT)
4710 arg_action = ACTION_POWEROFF;
4714 arg_action = ACTION_REBOOT;
4736 /* Compatibility nops */
4743 log_error("Unknown option code '%c'.", c);
4748 if (optind < argc) {
4749 log_error("Too many arguments.");
4756 static int parse_time_spec(const char *t, usec_t *_u) {
4760 if (streq(t, "now"))
4762 else if (!strchr(t, ':')) {
4765 if (safe_atou64(t, &u) < 0)
4768 *_u = now(CLOCK_REALTIME) + USEC_PER_MINUTE * u;
4777 hour = strtol(t, &e, 10);
4778 if (errno != 0 || *e != ':' || hour < 0 || hour > 23)
4781 minute = strtol(e+1, &e, 10);
4782 if (errno != 0 || *e != 0 || minute < 0 || minute > 59)
4785 n = now(CLOCK_REALTIME);
4786 s = (time_t) (n / USEC_PER_SEC);
4789 assert_se(localtime_r(&s, &tm));
4791 tm.tm_hour = (int) hour;
4792 tm.tm_min = (int) minute;
4795 assert_se(s = mktime(&tm));
4797 *_u = (usec_t) s * USEC_PER_SEC;
4800 *_u += USEC_PER_DAY;
4806 static int shutdown_parse_argv(int argc, char *argv[]) {
4813 static const struct option options[] = {
4814 { "help", no_argument, NULL, ARG_HELP },
4815 { "halt", no_argument, NULL, 'H' },
4816 { "poweroff", no_argument, NULL, 'P' },
4817 { "reboot", no_argument, NULL, 'r' },
4818 { "kexec", no_argument, NULL, 'K' }, /* not documented extension */
4819 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4820 { NULL, 0, NULL, 0 }
4828 while ((c = getopt_long(argc, argv, "HPrhkt:afFc", options, NULL)) >= 0) {
4836 arg_action = ACTION_HALT;
4840 arg_action = ACTION_POWEROFF;
4845 arg_action = ACTION_KEXEC;
4847 arg_action = ACTION_REBOOT;
4851 arg_action = ACTION_KEXEC;
4855 if (arg_action != ACTION_HALT)
4856 arg_action = ACTION_POWEROFF;
4869 /* Compatibility nops */
4873 arg_action = ACTION_CANCEL_SHUTDOWN;
4880 log_error("Unknown option code '%c'.", c);
4885 if (argc > optind && arg_action != ACTION_CANCEL_SHUTDOWN) {
4886 r = parse_time_spec(argv[optind], &arg_when);
4888 log_error("Failed to parse time specification: %s", argv[optind]);
4892 arg_when = now(CLOCK_REALTIME) + USEC_PER_MINUTE;
4894 if (argc > optind && arg_action == ACTION_CANCEL_SHUTDOWN)
4895 /* No time argument for shutdown cancel */
4896 arg_wall = argv + optind;
4897 else if (argc > optind + 1)
4898 /* We skip the time argument */
4899 arg_wall = argv + optind + 1;
4906 static int telinit_parse_argv(int argc, char *argv[]) {
4913 static const struct option options[] = {
4914 { "help", no_argument, NULL, ARG_HELP },
4915 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4916 { NULL, 0, NULL, 0 }
4919 static const struct {
4923 { '0', ACTION_POWEROFF },
4924 { '6', ACTION_REBOOT },
4925 { '1', ACTION_RESCUE },
4926 { '2', ACTION_RUNLEVEL2 },
4927 { '3', ACTION_RUNLEVEL3 },
4928 { '4', ACTION_RUNLEVEL4 },
4929 { '5', ACTION_RUNLEVEL5 },
4930 { 's', ACTION_RESCUE },
4931 { 'S', ACTION_RESCUE },
4932 { 'q', ACTION_RELOAD },
4933 { 'Q', ACTION_RELOAD },
4934 { 'u', ACTION_REEXEC },
4935 { 'U', ACTION_REEXEC }
4944 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
4959 log_error("Unknown option code '%c'.", c);
4964 if (optind >= argc) {
4969 if (optind + 1 < argc) {
4970 log_error("Too many arguments.");
4974 if (strlen(argv[optind]) != 1) {
4975 log_error("Expected single character argument.");
4979 for (i = 0; i < ELEMENTSOF(table); i++)
4980 if (table[i].from == argv[optind][0])
4983 if (i >= ELEMENTSOF(table)) {
4984 log_error("Unknown command '%s'.", argv[optind]);
4988 arg_action = table[i].to;
4995 static int runlevel_parse_argv(int argc, char *argv[]) {
5001 static const struct option options[] = {
5002 { "help", no_argument, NULL, ARG_HELP },
5003 { NULL, 0, NULL, 0 }
5011 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5022 log_error("Unknown option code '%c'.", c);
5027 if (optind < argc) {
5028 log_error("Too many arguments.");
5035 static int parse_argv(int argc, char *argv[]) {
5039 if (program_invocation_short_name) {
5041 if (strstr(program_invocation_short_name, "halt")) {
5042 arg_action = ACTION_HALT;
5043 return halt_parse_argv(argc, argv);
5044 } else if (strstr(program_invocation_short_name, "poweroff")) {
5045 arg_action = ACTION_POWEROFF;
5046 return halt_parse_argv(argc, argv);
5047 } else if (strstr(program_invocation_short_name, "reboot")) {
5049 arg_action = ACTION_KEXEC;
5051 arg_action = ACTION_REBOOT;
5052 return halt_parse_argv(argc, argv);
5053 } else if (strstr(program_invocation_short_name, "shutdown")) {
5054 arg_action = ACTION_POWEROFF;
5055 return shutdown_parse_argv(argc, argv);
5056 } else if (strstr(program_invocation_short_name, "init")) {
5058 if (sd_booted() > 0) {
5059 arg_action = ACTION_INVALID;
5060 return telinit_parse_argv(argc, argv);
5062 /* Hmm, so some other init system is
5063 * running, we need to forward this
5064 * request to it. For now we simply
5065 * guess that it is Upstart. */
5067 execv("/lib/upstart/telinit", argv);
5069 log_error("Couldn't find an alternative telinit implementation to spawn.");
5073 } else if (strstr(program_invocation_short_name, "runlevel")) {
5074 arg_action = ACTION_RUNLEVEL;
5075 return runlevel_parse_argv(argc, argv);
5079 arg_action = ACTION_SYSTEMCTL;
5080 return systemctl_parse_argv(argc, argv);
5083 static int action_to_runlevel(void) {
5085 static const char table[_ACTION_MAX] = {
5086 [ACTION_HALT] = '0',
5087 [ACTION_POWEROFF] = '0',
5088 [ACTION_REBOOT] = '6',
5089 [ACTION_RUNLEVEL2] = '2',
5090 [ACTION_RUNLEVEL3] = '3',
5091 [ACTION_RUNLEVEL4] = '4',
5092 [ACTION_RUNLEVEL5] = '5',
5093 [ACTION_RESCUE] = '1'
5096 assert(arg_action < _ACTION_MAX);
5098 return table[arg_action];
5101 static int talk_upstart(void) {
5102 DBusMessage *m = NULL, *reply = NULL;
5104 int previous, rl, r;
5106 env1_buf[] = "RUNLEVEL=X",
5107 env2_buf[] = "PREVLEVEL=X";
5108 char *env1 = env1_buf, *env2 = env2_buf;
5109 const char *emit = "runlevel";
5110 dbus_bool_t b_false = FALSE;
5111 DBusMessageIter iter, sub;
5112 DBusConnection *bus;
5114 dbus_error_init(&error);
5116 if (!(rl = action_to_runlevel()))
5119 if (utmp_get_runlevel(&previous, NULL) < 0)
5122 if (!(bus = dbus_connection_open_private("unix:abstract=/com/ubuntu/upstart", &error))) {
5123 if (dbus_error_has_name(&error, DBUS_ERROR_NO_SERVER)) {
5128 log_error("Failed to connect to Upstart bus: %s", bus_error_message(&error));
5133 if ((r = bus_check_peercred(bus)) < 0) {
5134 log_error("Failed to verify owner of bus.");
5138 if (!(m = dbus_message_new_method_call(
5139 "com.ubuntu.Upstart",
5140 "/com/ubuntu/Upstart",
5141 "com.ubuntu.Upstart0_6",
5144 log_error("Could not allocate message.");
5149 dbus_message_iter_init_append(m, &iter);
5151 env1_buf[sizeof(env1_buf)-2] = rl;
5152 env2_buf[sizeof(env2_buf)-2] = previous;
5154 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &emit) ||
5155 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub) ||
5156 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env1) ||
5157 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env2) ||
5158 !dbus_message_iter_close_container(&iter, &sub) ||
5159 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b_false)) {
5160 log_error("Could not append arguments to message.");
5165 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
5167 if (bus_error_is_no_service(&error)) {
5172 log_error("Failed to issue method call: %s", bus_error_message(&error));
5181 dbus_message_unref(m);
5184 dbus_message_unref(reply);
5187 dbus_connection_flush(bus);
5188 dbus_connection_close(bus);
5189 dbus_connection_unref(bus);
5192 dbus_error_free(&error);
5197 static int talk_initctl(void) {
5198 struct init_request request;
5202 if (!(rl = action_to_runlevel()))
5206 request.magic = INIT_MAGIC;
5207 request.sleeptime = 0;
5208 request.cmd = INIT_CMD_RUNLVL;
5209 request.runlevel = rl;
5211 if ((fd = open(INIT_FIFO, O_WRONLY|O_NDELAY|O_CLOEXEC|O_NOCTTY)) < 0) {
5213 if (errno == ENOENT)
5216 log_error("Failed to open "INIT_FIFO": %m");
5221 r = loop_write(fd, &request, sizeof(request), false) != sizeof(request);
5222 close_nointr_nofail(fd);
5225 log_error("Failed to write to "INIT_FIFO": %m");
5226 return errno ? -errno : -EIO;
5232 static int systemctl_main(DBusConnection *bus, int argc, char *argv[], DBusError *error) {
5234 static const struct {
5242 int (* const dispatch)(DBusConnection *bus, char **args);
5244 { "list-units", LESS, 1, list_units },
5245 { "list-unit-files", EQUAL, 1, list_unit_files },
5246 { "list-jobs", EQUAL, 1, list_jobs },
5247 { "clear-jobs", EQUAL, 1, daemon_reload },
5248 { "load", MORE, 2, load_unit },
5249 { "cancel", MORE, 2, cancel_job },
5250 { "start", MORE, 2, start_unit },
5251 { "stop", MORE, 2, start_unit },
5252 { "condstop", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5253 { "reload", MORE, 2, start_unit },
5254 { "restart", MORE, 2, start_unit },
5255 { "try-restart", MORE, 2, start_unit },
5256 { "reload-or-restart", MORE, 2, start_unit },
5257 { "reload-or-try-restart", MORE, 2, start_unit },
5258 { "force-reload", MORE, 2, start_unit }, /* For compatibility with SysV */
5259 { "condreload", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5260 { "condrestart", MORE, 2, start_unit }, /* For compatibility with RH */
5261 { "isolate", EQUAL, 2, start_unit },
5262 { "set-cgroup", MORE, 2, set_cgroup },
5263 { "unset-cgroup", MORE, 2, set_cgroup },
5264 { "set-cgroup-attr", MORE, 2, set_cgroup_attr },
5265 { "unset-cgroup-attr", MORE, 2, set_cgroup },
5266 { "kill", MORE, 2, kill_unit },
5267 { "is-active", MORE, 2, check_unit_active },
5268 { "check", MORE, 2, check_unit_active },
5269 { "is-failed", MORE, 2, check_unit_failed },
5270 { "show", MORE, 1, show },
5271 { "status", MORE, 2, show },
5272 { "help", MORE, 2, show },
5273 { "dump", EQUAL, 1, dump },
5274 { "dot", EQUAL, 1, dot },
5275 { "snapshot", LESS, 2, snapshot },
5276 { "delete", MORE, 2, delete_snapshot },
5277 { "daemon-reload", EQUAL, 1, daemon_reload },
5278 { "daemon-reexec", EQUAL, 1, daemon_reload },
5279 { "show-environment", EQUAL, 1, show_enviroment },
5280 { "set-environment", MORE, 2, set_environment },
5281 { "unset-environment", MORE, 2, set_environment },
5282 { "halt", EQUAL, 1, start_special },
5283 { "poweroff", EQUAL, 1, start_special },
5284 { "reboot", EQUAL, 1, start_special },
5285 { "kexec", EQUAL, 1, start_special },
5286 { "suspend", EQUAL, 1, start_special },
5287 { "hibernate", EQUAL, 1, start_special },
5288 { "hybrid-sleep", EQUAL, 1, start_special },
5289 { "default", EQUAL, 1, start_special },
5290 { "rescue", EQUAL, 1, start_special },
5291 { "emergency", EQUAL, 1, start_special },
5292 { "exit", EQUAL, 1, start_special },
5293 { "reset-failed", MORE, 1, reset_failed },
5294 { "enable", MORE, 2, enable_unit },
5295 { "disable", MORE, 2, enable_unit },
5296 { "is-enabled", MORE, 2, unit_is_enabled },
5297 { "reenable", MORE, 2, enable_unit },
5298 { "preset", MORE, 2, enable_unit },
5299 { "mask", MORE, 2, enable_unit },
5300 { "unmask", MORE, 2, enable_unit },
5301 { "link", MORE, 2, enable_unit },
5302 { "switch-root", MORE, 2, switch_root },
5303 { "list-dependencies", LESS, 2, list_dependencies },
5313 left = argc - optind;
5316 /* Special rule: no arguments means "list-units" */
5319 if (streq(argv[optind], "help") && !argv[optind+1]) {
5320 log_error("This command expects one or more "
5321 "unit names. Did you mean --help?");
5325 for (i = 0; i < ELEMENTSOF(verbs); i++)
5326 if (streq(argv[optind], verbs[i].verb))
5329 if (i >= ELEMENTSOF(verbs)) {
5330 log_error("Unknown operation '%s'.", argv[optind]);
5335 switch (verbs[i].argc_cmp) {
5338 if (left != verbs[i].argc) {
5339 log_error("Invalid number of arguments.");
5346 if (left < verbs[i].argc) {
5347 log_error("Too few arguments.");
5354 if (left > verbs[i].argc) {
5355 log_error("Too many arguments.");
5362 assert_not_reached("Unknown comparison operator.");
5365 /* Require a bus connection for all operations but
5367 if (!streq(verbs[i].verb, "enable") &&
5368 !streq(verbs[i].verb, "disable") &&
5369 !streq(verbs[i].verb, "is-enabled") &&
5370 !streq(verbs[i].verb, "list-unit-files") &&
5371 !streq(verbs[i].verb, "reenable") &&
5372 !streq(verbs[i].verb, "preset") &&
5373 !streq(verbs[i].verb, "mask") &&
5374 !streq(verbs[i].verb, "unmask") &&
5375 !streq(verbs[i].verb, "link")) {
5377 if (running_in_chroot() > 0) {
5378 log_info("Running in chroot, ignoring request.");
5382 if (((!streq(verbs[i].verb, "reboot") &&
5383 !streq(verbs[i].verb, "halt") &&
5384 !streq(verbs[i].verb, "poweroff")) || arg_force <= 0) && !bus) {
5385 log_error("Failed to get D-Bus connection: %s",
5386 dbus_error_is_set(error) ? error->message : "No connection to service manager.");
5392 if (!bus && !avoid_bus()) {
5393 log_error("Failed to get D-Bus connection: %s",
5394 dbus_error_is_set(error) ? error->message : "No connection to service manager.");
5399 return verbs[i].dispatch(bus, argv + optind);
5402 static int send_shutdownd(usec_t t, char mode, bool dry_run, bool warn, const char *message) {
5404 struct msghdr msghdr;
5405 struct iovec iovec[2];
5406 union sockaddr_union sockaddr;
5407 struct sd_shutdown_command c;
5409 fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0);
5416 c.dry_run = dry_run;
5420 sockaddr.sa.sa_family = AF_UNIX;
5421 strncpy(sockaddr.un.sun_path, "/run/systemd/shutdownd", sizeof(sockaddr.un.sun_path));
5424 msghdr.msg_name = &sockaddr;
5425 msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + sizeof("/run/systemd/shutdownd") - 1;
5428 iovec[0].iov_base = (char*) &c;
5429 iovec[0].iov_len = offsetof(struct sd_shutdown_command, wall_message);
5431 if (isempty(message))
5432 msghdr.msg_iovlen = 1;
5434 iovec[1].iov_base = (char*) message;
5435 iovec[1].iov_len = strlen(message);
5436 msghdr.msg_iovlen = 2;
5438 msghdr.msg_iov = iovec;
5440 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0) {
5441 close_nointr_nofail(fd);
5445 close_nointr_nofail(fd);
5449 static int reload_with_fallback(DBusConnection *bus) {
5452 /* First, try systemd via D-Bus. */
5453 if (daemon_reload(bus, NULL) >= 0)
5457 /* Nothing else worked, so let's try signals */
5458 assert(arg_action == ACTION_RELOAD || arg_action == ACTION_REEXEC);
5460 if (kill(1, arg_action == ACTION_RELOAD ? SIGHUP : SIGTERM) < 0) {
5461 log_error("kill() failed: %m");
5468 static int start_with_fallback(DBusConnection *bus) {
5471 /* First, try systemd via D-Bus. */
5472 if (start_unit(bus, NULL) >= 0)
5476 /* Hmm, talking to systemd via D-Bus didn't work. Then
5477 * let's try to talk to Upstart via D-Bus. */
5478 if (talk_upstart() > 0)
5481 /* Nothing else worked, so let's try
5483 if (talk_initctl() > 0)
5486 log_error("Failed to talk to init daemon.");
5490 warn_wall(arg_action);
5494 static _noreturn_ void halt_now(enum action a) {
5496 /* Make sure C-A-D is handled by the kernel from this
5498 reboot(RB_ENABLE_CAD);
5503 log_info("Halting.");
5504 reboot(RB_HALT_SYSTEM);
5507 case ACTION_POWEROFF:
5508 log_info("Powering off.");
5509 reboot(RB_POWER_OFF);
5513 log_info("Rebooting.");
5514 reboot(RB_AUTOBOOT);
5518 assert_not_reached("Unknown halt action.");
5521 assert_not_reached("Uh? This shouldn't happen.");
5524 static int halt_main(DBusConnection *bus) {
5527 r = check_inhibitors(bus, arg_action);
5531 if (geteuid() != 0) {
5532 /* Try logind if we are a normal user and no special
5533 * mode applies. Maybe PolicyKit allows us to shutdown
5536 if (arg_when <= 0 &&
5539 (arg_action == ACTION_POWEROFF ||
5540 arg_action == ACTION_REBOOT)) {
5541 r = reboot_with_logind(bus, arg_action);
5546 log_error("Must be root.");
5553 m = strv_join(arg_wall, " ");
5554 r = send_shutdownd(arg_when,
5555 arg_action == ACTION_HALT ? 'H' :
5556 arg_action == ACTION_POWEROFF ? 'P' :
5557 arg_action == ACTION_KEXEC ? 'K' :
5565 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r));
5567 char date[FORMAT_TIMESTAMP_MAX];
5569 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
5570 format_timestamp(date, sizeof(date), arg_when));
5575 if (!arg_dry && !arg_force)
5576 return start_with_fallback(bus);
5579 if (sd_booted() > 0)
5580 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
5582 r = utmp_put_shutdown();
5584 log_warning("Failed to write utmp record: %s", strerror(-r));
5591 halt_now(arg_action);
5592 /* We should never reach this. */
5596 static int runlevel_main(void) {
5597 int r, runlevel, previous;
5599 r = utmp_get_runlevel(&runlevel, &previous);
5606 previous <= 0 ? 'N' : previous,
5607 runlevel <= 0 ? 'N' : runlevel);
5612 int main(int argc, char*argv[]) {
5613 int r, retval = EXIT_FAILURE;
5614 DBusConnection *bus = NULL;
5617 dbus_error_init(&error);
5619 setlocale(LC_ALL, "");
5620 log_parse_environment();
5623 r = parse_argv(argc, argv);
5627 retval = EXIT_SUCCESS;
5631 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
5632 * let's shortcut this */
5633 if (arg_action == ACTION_RUNLEVEL) {
5634 r = runlevel_main();
5635 retval = r < 0 ? EXIT_FAILURE : r;
5639 if (running_in_chroot() > 0 && arg_action != ACTION_SYSTEMCTL) {
5640 log_info("Running in chroot, ignoring request.");
5646 if (arg_transport == TRANSPORT_NORMAL)
5647 bus_connect(arg_scope == UNIT_FILE_SYSTEM ? DBUS_BUS_SYSTEM : DBUS_BUS_SESSION, &bus, &private_bus, &error);
5648 else if (arg_transport == TRANSPORT_POLKIT) {
5649 bus_connect_system_polkit(&bus, &error);
5650 private_bus = false;
5651 } else if (arg_transport == TRANSPORT_SSH) {
5652 bus_connect_system_ssh(NULL, arg_host, &bus, &error);
5653 private_bus = false;
5655 assert_not_reached("Uh, invalid transport...");
5658 switch (arg_action) {
5660 case ACTION_SYSTEMCTL:
5661 r = systemctl_main(bus, argc, argv, &error);
5665 case ACTION_POWEROFF:
5671 case ACTION_RUNLEVEL2:
5672 case ACTION_RUNLEVEL3:
5673 case ACTION_RUNLEVEL4:
5674 case ACTION_RUNLEVEL5:
5676 case ACTION_EMERGENCY:
5677 case ACTION_DEFAULT:
5678 r = start_with_fallback(bus);
5683 r = reload_with_fallback(bus);
5686 case ACTION_CANCEL_SHUTDOWN: {
5690 m = strv_join(arg_wall, " ");
5692 retval = EXIT_FAILURE;
5696 r = send_shutdownd(arg_when, SD_SHUTDOWN_NONE, false, !arg_no_wall, m);
5698 log_warning("Failed to talk to shutdownd, shutdown hasn't been cancelled: %s", strerror(-r));
5703 case ACTION_INVALID:
5704 case ACTION_RUNLEVEL:
5706 assert_not_reached("Unknown action");
5709 retval = r < 0 ? EXIT_FAILURE : r;
5713 dbus_connection_flush(bus);
5714 dbus_connection_close(bus);
5715 dbus_connection_unref(bus);
5718 dbus_error_free(&error);
5722 strv_free(arg_property);
5725 ask_password_agent_close();
5726 polkit_agent_close();