1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
22 #include <sys/reboot.h>
28 #include <sys/ioctl.h>
32 #include <sys/socket.h>
35 #include <sys/prctl.h>
37 #include <dbus/dbus.h>
43 #include "utmp-wtmp.h"
47 #include "dbus-common.h"
48 #include "cgroup-show.h"
49 #include "cgroup-util.h"
51 #include "path-lookup.h"
52 #include "conf-parser.h"
53 #include "sd-daemon.h"
54 #include "shutdownd.h"
55 #include "exit-status.h"
56 #include "bus-errors.h"
58 #include "unit-name.h"
60 static const char *arg_type
= NULL
;
61 static char **arg_property
= NULL
;
62 static bool arg_all
= false;
63 static const char *arg_job_mode
= "replace";
64 static bool arg_user
= false;
65 static bool arg_global
= false;
66 static bool arg_immediate
= false;
67 static bool arg_no_block
= false;
68 static bool arg_no_pager
= false;
69 static bool arg_no_wtmp
= false;
70 static bool arg_no_sync
= false;
71 static bool arg_no_wall
= false;
72 static bool arg_no_reload
= false;
73 static bool arg_dry
= false;
74 static bool arg_quiet
= false;
75 static bool arg_full
= false;
76 static bool arg_force
= false;
77 static bool arg_defaults
= false;
78 static bool arg_ask_password
= false;
79 static bool arg_failed
= false;
80 static char **arg_wall
= NULL
;
81 static const char *arg_kill_who
= NULL
;
82 static const char *arg_kill_mode
= NULL
;
83 static int arg_signal
= SIGTERM
;
84 static usec_t arg_when
= 0;
103 ACTION_CANCEL_SHUTDOWN
,
105 } arg_action
= ACTION_SYSTEMCTL
;
111 static enum transport
{
115 } arg_transport
= TRANSPORT_NORMAL
;
116 static const char *arg_host
= NULL
;
118 static bool private_bus
= false;
120 static pid_t pager_pid
= 0;
121 static pid_t agent_pid
= 0;
123 static int daemon_reload(DBusConnection
*bus
, char **args
, unsigned n
);
124 static void pager_open(void);
126 static bool on_tty(void) {
129 /* Note that this is invoked relatively early, before we start
130 * the pager. That means the value we return reflects whether
131 * we originally were started on a tty, not if we currently
132 * are. But this is intended, since we want colour and so on
133 * when run in our own pager. */
135 if (_unlikely_(t
< 0))
136 t
= isatty(STDOUT_FILENO
) > 0;
141 static void spawn_ask_password_agent(void) {
147 /* We check STDIN here, not STDOUT, since this is about input,
149 if (!isatty(STDIN_FILENO
))
152 if (!arg_ask_password
)
160 /* Spawns a temporary TTY agent, making sure it goes away when
163 if ((agent_pid
= fork()) < 0)
166 if (agent_pid
== 0) {
170 bool stdout_is_tty
, stderr_is_tty
;
172 /* Make sure the agent goes away when the parent dies */
173 if (prctl(PR_SET_PDEATHSIG
, SIGTERM
) < 0)
176 /* Check whether our parent died before we were able
177 * to set the death signal */
178 if (getppid() != parent
)
181 /* Don't leak fds to the agent */
182 close_all_fds(NULL
, 0);
184 stdout_is_tty
= isatty(STDOUT_FILENO
);
185 stderr_is_tty
= isatty(STDERR_FILENO
);
187 if (!stdout_is_tty
|| !stderr_is_tty
) {
188 /* Detach from stdout/stderr. and reopen
189 * /dev/tty for them. This is important to
190 * ensure that when systemctl is started via
191 * popen() or a similar call that expects to
192 * read EOF we actually do generate EOF and
193 * not delay this indefinitely by because we
194 * keep an unused copy of stdin around. */
195 if ((fd
= open("/dev/tty", O_WRONLY
)) < 0) {
196 log_error("Failed to open /dev/tty: %m");
201 dup2(fd
, STDOUT_FILENO
);
204 dup2(fd
, STDERR_FILENO
);
210 execl(SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH
, SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH
, "--watch", NULL
);
212 log_error("Unable to execute agent: %m");
217 static const char *ansi_highlight(bool b
) {
222 return b
? ANSI_HIGHLIGHT_ON
: ANSI_HIGHLIGHT_OFF
;
225 static const char *ansi_highlight_green(bool b
) {
230 return b
? ANSI_HIGHLIGHT_GREEN_ON
: ANSI_HIGHLIGHT_OFF
;
233 static bool error_is_no_service(const DBusError
*error
) {
236 if (!dbus_error_is_set(error
))
239 if (dbus_error_has_name(error
, DBUS_ERROR_NAME_HAS_NO_OWNER
))
242 if (dbus_error_has_name(error
, DBUS_ERROR_SERVICE_UNKNOWN
))
245 return startswith(error
->name
, "org.freedesktop.DBus.Error.Spawn.");
248 static int translate_bus_error_to_exit_status(int r
, const DBusError
*error
) {
251 if (!dbus_error_is_set(error
))
254 if (dbus_error_has_name(error
, DBUS_ERROR_ACCESS_DENIED
) ||
255 dbus_error_has_name(error
, BUS_ERROR_ONLY_BY_DEPENDENCY
) ||
256 dbus_error_has_name(error
, BUS_ERROR_NO_ISOLATION
) ||
257 dbus_error_has_name(error
, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE
))
258 return EXIT_NOPERMISSION
;
260 if (dbus_error_has_name(error
, BUS_ERROR_NO_SUCH_UNIT
))
261 return EXIT_NOTINSTALLED
;
263 if (dbus_error_has_name(error
, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE
) ||
264 dbus_error_has_name(error
, BUS_ERROR_NOT_SUPPORTED
))
265 return EXIT_NOTIMPLEMENTED
;
267 if (dbus_error_has_name(error
, BUS_ERROR_LOAD_FAILED
))
268 return EXIT_NOTCONFIGURED
;
276 static int bus_iter_get_basic_and_next(DBusMessageIter
*iter
, int type
, void *data
, bool next
) {
281 if (dbus_message_iter_get_arg_type(iter
) != type
)
284 dbus_message_iter_get_basic(iter
, data
);
286 if (!dbus_message_iter_next(iter
) != !next
)
292 static void warn_wall(enum action action
) {
293 static const char *table
[_ACTION_MAX
] = {
294 [ACTION_HALT
] = "The system is going down for system halt NOW!",
295 [ACTION_REBOOT
] = "The system is going down for reboot NOW!",
296 [ACTION_POWEROFF
] = "The system is going down for power-off NOW!",
297 [ACTION_KEXEC
] = "The system is going down for kexec reboot NOW!",
298 [ACTION_RESCUE
] = "The system is going down to rescue mode NOW!",
299 [ACTION_EMERGENCY
] = "The system is going down to emergency mode NOW!"
308 if (!(p
= strv_join(arg_wall
, " "))) {
309 log_error("Failed to join strings.");
325 utmp_wall(table
[action
], NULL
);
330 const char *description
;
331 const char *load_state
;
332 const char *active_state
;
333 const char *sub_state
;
334 const char *following
;
335 const char *unit_path
;
337 const char *job_type
;
338 const char *job_path
;
341 static int compare_unit_info(const void *a
, const void *b
) {
343 const struct unit_info
*u
= a
, *v
= b
;
345 d1
= strrchr(u
->id
, '.');
346 d2
= strrchr(v
->id
, '.');
351 if ((r
= strcasecmp(d1
, d2
)) != 0)
355 return strcasecmp(u
->id
, v
->id
);
358 static bool output_show_unit(const struct unit_info
*u
) {
362 return streq(u
->active_state
, "failed");
364 return (!arg_type
|| ((dot
= strrchr(u
->id
, '.')) &&
365 streq(dot
+1, arg_type
))) &&
366 (arg_all
|| !(streq(u
->active_state
, "inactive") || u
->following
[0]) || u
->job_id
> 0);
369 static void output_units_list(const struct unit_info
*unit_infos
, unsigned c
) {
370 unsigned active_len
, sub_len
, job_len
, n_shown
= 0;
371 const struct unit_info
*u
;
373 active_len
= sizeof("ACTIVE")-1;
374 sub_len
= sizeof("SUB")-1;
375 job_len
= sizeof("JOB")-1;
377 for (u
= unit_infos
; u
< unit_infos
+ c
; u
++) {
378 if (!output_show_unit(u
))
381 active_len
= MAX(active_len
, strlen(u
->active_state
));
382 sub_len
= MAX(sub_len
, strlen(u
->sub_state
));
384 job_len
= MAX(job_len
, strlen(u
->job_type
));
388 printf("%-25s %-6s %-*s %-*s %-*s", "UNIT", "LOAD",
389 active_len
, "ACTIVE", sub_len
, "SUB", job_len
, "JOB");
390 if (columns() >= 80+12 || arg_full
)
391 printf(" %s\n", "DESCRIPTION");
396 for (u
= unit_infos
; u
< unit_infos
+ c
; u
++) {
399 const char *on_loaded
, *off_loaded
;
400 const char *on_active
, *off_active
;
402 if (!output_show_unit(u
))
407 if (!streq(u
->load_state
, "loaded") &&
408 !streq(u
->load_state
, "banned")) {
409 on_loaded
= ansi_highlight(true);
410 off_loaded
= ansi_highlight(false);
412 on_loaded
= off_loaded
= "";
414 if (streq(u
->active_state
, "failed")) {
415 on_active
= ansi_highlight(true);
416 off_active
= ansi_highlight(false);
418 on_active
= off_active
= "";
420 e
= arg_full
? NULL
: ellipsize(u
->id
, 25, 33);
422 printf("%-25s %s%-6s%s %s%-*s %-*s%s%n",
424 on_loaded
, u
->load_state
, off_loaded
,
425 on_active
, active_len
, u
->active_state
,
426 sub_len
, u
->sub_state
, off_active
,
431 a
-= strlen(on_loaded
) + strlen(off_loaded
);
432 a
-= strlen(on_active
) + strlen(off_active
);
435 printf(" %-*s", job_len
, u
->job_type
);
439 if (a
+ b
+ 1 < columns()) {
441 printf(" %-*s", job_len
, "");
444 printf(" %s", u
->description
);
446 printf(" %.*s", columns() - a
- b
- 1, u
->description
);
453 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
454 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
455 "SUB = The low-level unit activation state, values depend on unit type.\n"
456 "JOB = Pending job for the unit.\n");
459 printf("\n%u units listed.\n", n_shown
);
461 printf("\n%u units listed. Pass --all to see inactive units, too.\n", n_shown
);
465 static int list_units(DBusConnection
*bus
, char **args
, unsigned n
) {
466 DBusMessage
*m
= NULL
, *reply
= NULL
;
469 DBusMessageIter iter
, sub
, sub2
;
470 unsigned c
= 0, n_units
= 0;
471 struct unit_info
*unit_infos
= NULL
;
473 dbus_error_init(&error
);
479 if (!(m
= dbus_message_new_method_call(
480 "org.freedesktop.systemd1",
481 "/org/freedesktop/systemd1",
482 "org.freedesktop.systemd1.Manager",
484 log_error("Could not allocate message.");
488 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
489 log_error("Failed to issue method call: %s", bus_error_message(&error
));
494 if (!dbus_message_iter_init(reply
, &iter
) ||
495 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_ARRAY
||
496 dbus_message_iter_get_element_type(&iter
) != DBUS_TYPE_STRUCT
) {
497 log_error("Failed to parse reply.");
502 dbus_message_iter_recurse(&iter
, &sub
);
504 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
507 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_STRUCT
) {
508 log_error("Failed to parse reply.");
516 n_units
= MAX(2*c
, 16);
517 w
= realloc(unit_infos
, sizeof(struct unit_info
) * n_units
);
520 log_error("Failed to allocate unit array.");
530 dbus_message_iter_recurse(&sub
, &sub2
);
532 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &u
->id
, true) < 0 ||
533 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &u
->description
, true) < 0 ||
534 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &u
->load_state
, true) < 0 ||
535 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &u
->active_state
, true) < 0 ||
536 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &u
->sub_state
, true) < 0 ||
537 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &u
->following
, true) < 0 ||
538 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_OBJECT_PATH
, &u
->unit_path
, true) < 0 ||
539 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_UINT32
, &u
->job_id
, true) < 0 ||
540 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &u
->job_type
, true) < 0 ||
541 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_OBJECT_PATH
, &u
->job_path
, false) < 0) {
542 log_error("Failed to parse reply.");
547 dbus_message_iter_next(&sub
);
552 qsort(unit_infos
, c
, sizeof(struct unit_info
), compare_unit_info
);
553 output_units_list(unit_infos
, c
);
560 dbus_message_unref(m
);
563 dbus_message_unref(reply
);
567 dbus_error_free(&error
);
572 static int dot_one_property(const char *name
, const char *prop
, DBusMessageIter
*iter
) {
573 static const char * const colors
[] = {
574 "Requires", "[color=\"black\"]",
575 "RequiresOverridable", "[color=\"black\"]",
576 "Requisite", "[color=\"darkblue\"]",
577 "RequisiteOverridable", "[color=\"darkblue\"]",
578 "Wants", "[color=\"darkgrey\"]",
579 "Conflicts", "[color=\"red\"]",
580 "ConflictedBy", "[color=\"red\"]",
581 "After", "[color=\"green\"]"
584 const char *c
= NULL
;
591 for (i
= 0; i
< ELEMENTSOF(colors
); i
+= 2)
592 if (streq(colors
[i
], prop
)) {
600 if (arg_dot
!= DOT_ALL
)
601 if ((arg_dot
== DOT_ORDER
) != streq(prop
, "After"))
604 switch (dbus_message_iter_get_arg_type(iter
)) {
606 case DBUS_TYPE_ARRAY
:
608 if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_STRING
) {
611 dbus_message_iter_recurse(iter
, &sub
);
613 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
616 assert(dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRING
);
617 dbus_message_iter_get_basic(&sub
, &s
);
618 printf("\t\"%s\"->\"%s\" %s;\n", name
, s
, c
);
620 dbus_message_iter_next(&sub
);
630 static int dot_one(DBusConnection
*bus
, const char *name
, const char *path
) {
631 DBusMessage
*m
= NULL
, *reply
= NULL
;
632 const char *interface
= "org.freedesktop.systemd1.Unit";
635 DBusMessageIter iter
, sub
, sub2
, sub3
;
640 dbus_error_init(&error
);
642 if (!(m
= dbus_message_new_method_call(
643 "org.freedesktop.systemd1",
645 "org.freedesktop.DBus.Properties",
647 log_error("Could not allocate message.");
652 if (!dbus_message_append_args(m
,
653 DBUS_TYPE_STRING
, &interface
,
654 DBUS_TYPE_INVALID
)) {
655 log_error("Could not append arguments to message.");
660 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
661 log_error("Failed to issue method call: %s", bus_error_message(&error
));
666 if (!dbus_message_iter_init(reply
, &iter
) ||
667 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_ARRAY
||
668 dbus_message_iter_get_element_type(&iter
) != DBUS_TYPE_DICT_ENTRY
) {
669 log_error("Failed to parse reply.");
674 dbus_message_iter_recurse(&iter
, &sub
);
676 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
679 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_DICT_ENTRY
) {
680 log_error("Failed to parse reply.");
685 dbus_message_iter_recurse(&sub
, &sub2
);
687 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &prop
, true) < 0) {
688 log_error("Failed to parse reply.");
693 if (dbus_message_iter_get_arg_type(&sub2
) != DBUS_TYPE_VARIANT
) {
694 log_error("Failed to parse reply.");
699 dbus_message_iter_recurse(&sub2
, &sub3
);
701 if (dot_one_property(name
, prop
, &sub3
)) {
702 log_error("Failed to parse reply.");
707 dbus_message_iter_next(&sub
);
714 dbus_message_unref(m
);
717 dbus_message_unref(reply
);
719 dbus_error_free(&error
);
724 static int dot(DBusConnection
*bus
, char **args
, unsigned n
) {
725 DBusMessage
*m
= NULL
, *reply
= NULL
;
728 DBusMessageIter iter
, sub
, sub2
;
730 dbus_error_init(&error
);
734 if (!(m
= dbus_message_new_method_call(
735 "org.freedesktop.systemd1",
736 "/org/freedesktop/systemd1",
737 "org.freedesktop.systemd1.Manager",
739 log_error("Could not allocate message.");
743 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
744 log_error("Failed to issue method call: %s", bus_error_message(&error
));
749 if (!dbus_message_iter_init(reply
, &iter
) ||
750 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_ARRAY
||
751 dbus_message_iter_get_element_type(&iter
) != DBUS_TYPE_STRUCT
) {
752 log_error("Failed to parse reply.");
757 printf("digraph systemd {\n");
759 dbus_message_iter_recurse(&iter
, &sub
);
760 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
761 const char *id
, *description
, *load_state
, *active_state
, *sub_state
, *following
, *unit_path
;
763 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_STRUCT
) {
764 log_error("Failed to parse reply.");
769 dbus_message_iter_recurse(&sub
, &sub2
);
771 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &id
, true) < 0 ||
772 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &description
, true) < 0 ||
773 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &load_state
, true) < 0 ||
774 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &active_state
, true) < 0 ||
775 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &sub_state
, true) < 0 ||
776 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &following
, true) < 0 ||
777 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_OBJECT_PATH
, &unit_path
, true) < 0) {
778 log_error("Failed to parse reply.");
783 if ((r
= dot_one(bus
, id
, unit_path
)) < 0)
786 /* printf("\t\"%s\";\n", id); */
787 dbus_message_iter_next(&sub
);
792 log_info(" Color legend: black = Requires\n"
793 " dark blue = Requisite\n"
794 " dark grey = Wants\n"
798 if (isatty(fileno(stdout
)))
799 log_notice("-- You probably want to process this output with graphviz' dot tool.\n"
800 "-- Try a shell pipeline like 'systemctl dot | dot -Tsvg > systemd.svg'!\n");
806 dbus_message_unref(m
);
809 dbus_message_unref(reply
);
811 dbus_error_free(&error
);
816 static int list_jobs(DBusConnection
*bus
, char **args
, unsigned n
) {
817 DBusMessage
*m
= NULL
, *reply
= NULL
;
820 DBusMessageIter iter
, sub
, sub2
;
823 dbus_error_init(&error
);
829 if (!(m
= dbus_message_new_method_call(
830 "org.freedesktop.systemd1",
831 "/org/freedesktop/systemd1",
832 "org.freedesktop.systemd1.Manager",
834 log_error("Could not allocate message.");
838 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
839 log_error("Failed to issue method call: %s", bus_error_message(&error
));
844 if (!dbus_message_iter_init(reply
, &iter
) ||
845 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_ARRAY
||
846 dbus_message_iter_get_element_type(&iter
) != DBUS_TYPE_STRUCT
) {
847 log_error("Failed to parse reply.");
852 dbus_message_iter_recurse(&iter
, &sub
);
854 if (isatty(STDOUT_FILENO
))
855 printf("%4s %-25s %-15s %-7s\n", "JOB", "UNIT", "TYPE", "STATE");
857 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
858 const char *name
, *type
, *state
, *job_path
, *unit_path
;
862 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_STRUCT
) {
863 log_error("Failed to parse reply.");
868 dbus_message_iter_recurse(&sub
, &sub2
);
870 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_UINT32
, &id
, true) < 0 ||
871 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &name
, true) < 0 ||
872 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &type
, true) < 0 ||
873 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &state
, true) < 0 ||
874 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_OBJECT_PATH
, &job_path
, true) < 0 ||
875 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_OBJECT_PATH
, &unit_path
, false) < 0) {
876 log_error("Failed to parse reply.");
881 e
= arg_full
? NULL
: ellipsize(name
, 25, 33);
882 printf("%4u %-25s %-15s %-7s\n", id
, e
? e
: name
, type
, state
);
887 dbus_message_iter_next(&sub
);
890 if (isatty(STDOUT_FILENO
))
891 printf("\n%u jobs listed.\n", k
);
897 dbus_message_unref(m
);
900 dbus_message_unref(reply
);
902 dbus_error_free(&error
);
907 static int load_unit(DBusConnection
*bus
, char **args
, unsigned n
) {
908 DBusMessage
*m
= NULL
, *reply
= NULL
;
913 dbus_error_init(&error
);
918 for (i
= 1; i
< n
; i
++) {
920 if (!(m
= dbus_message_new_method_call(
921 "org.freedesktop.systemd1",
922 "/org/freedesktop/systemd1",
923 "org.freedesktop.systemd1.Manager",
925 log_error("Could not allocate message.");
930 if (!dbus_message_append_args(m
,
931 DBUS_TYPE_STRING
, &args
[i
],
932 DBUS_TYPE_INVALID
)) {
933 log_error("Could not append arguments to message.");
938 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
939 log_error("Failed to issue method call: %s", bus_error_message(&error
));
944 dbus_message_unref(m
);
945 dbus_message_unref(reply
);
954 dbus_message_unref(m
);
957 dbus_message_unref(reply
);
959 dbus_error_free(&error
);
964 static int cancel_job(DBusConnection
*bus
, char **args
, unsigned n
) {
965 DBusMessage
*m
= NULL
, *reply
= NULL
;
970 dbus_error_init(&error
);
976 return daemon_reload(bus
, args
, n
);
978 for (i
= 1; i
< n
; i
++) {
982 if (!(m
= dbus_message_new_method_call(
983 "org.freedesktop.systemd1",
984 "/org/freedesktop/systemd1",
985 "org.freedesktop.systemd1.Manager",
987 log_error("Could not allocate message.");
992 if ((r
= safe_atou(args
[i
], &id
)) < 0) {
993 log_error("Failed to parse job id: %s", strerror(-r
));
997 assert_cc(sizeof(uint32_t) == sizeof(id
));
998 if (!dbus_message_append_args(m
,
999 DBUS_TYPE_UINT32
, &id
,
1000 DBUS_TYPE_INVALID
)) {
1001 log_error("Could not append arguments to message.");
1006 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
1007 log_error("Failed to issue method call: %s", bus_error_message(&error
));
1012 if (!dbus_message_get_args(reply
, &error
,
1013 DBUS_TYPE_OBJECT_PATH
, &path
,
1014 DBUS_TYPE_INVALID
)) {
1015 log_error("Failed to parse reply: %s", bus_error_message(&error
));
1020 dbus_message_unref(m
);
1021 if (!(m
= dbus_message_new_method_call(
1022 "org.freedesktop.systemd1",
1024 "org.freedesktop.systemd1.Job",
1026 log_error("Could not allocate message.");
1031 dbus_message_unref(reply
);
1032 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
1033 log_error("Failed to issue method call: %s", bus_error_message(&error
));
1038 dbus_message_unref(m
);
1039 dbus_message_unref(reply
);
1047 dbus_message_unref(m
);
1050 dbus_message_unref(reply
);
1052 dbus_error_free(&error
);
1057 static bool need_daemon_reload(DBusConnection
*bus
, const char *unit
) {
1058 DBusMessage
*m
= NULL
, *reply
= NULL
;
1059 dbus_bool_t b
= FALSE
;
1060 DBusMessageIter iter
, sub
;
1062 *interface
= "org.freedesktop.systemd1.Unit",
1063 *property
= "NeedDaemonReload",
1066 /* We ignore all errors here, since this is used to show a warning only */
1068 if (!(m
= dbus_message_new_method_call(
1069 "org.freedesktop.systemd1",
1070 "/org/freedesktop/systemd1",
1071 "org.freedesktop.systemd1.Manager",
1075 if (!dbus_message_append_args(m
,
1076 DBUS_TYPE_STRING
, &unit
,
1080 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, NULL
)))
1083 if (!dbus_message_get_args(reply
, NULL
,
1084 DBUS_TYPE_OBJECT_PATH
, &path
,
1088 dbus_message_unref(m
);
1089 if (!(m
= dbus_message_new_method_call(
1090 "org.freedesktop.systemd1",
1092 "org.freedesktop.DBus.Properties",
1096 if (!dbus_message_append_args(m
,
1097 DBUS_TYPE_STRING
, &interface
,
1098 DBUS_TYPE_STRING
, &property
,
1099 DBUS_TYPE_INVALID
)) {
1103 dbus_message_unref(reply
);
1104 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, NULL
)))
1107 if (!dbus_message_iter_init(reply
, &iter
) ||
1108 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_VARIANT
)
1111 dbus_message_iter_recurse(&iter
, &sub
);
1113 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_BOOLEAN
)
1116 dbus_message_iter_get_basic(&sub
, &b
);
1120 dbus_message_unref(m
);
1123 dbus_message_unref(reply
);
1128 typedef struct WaitData
{
1133 static DBusHandlerResult
wait_filter(DBusConnection
*connection
, DBusMessage
*message
, void *data
) {
1141 dbus_error_init(&error
);
1143 log_debug("Got D-Bus request: %s.%s() on %s",
1144 dbus_message_get_interface(message
),
1145 dbus_message_get_member(message
),
1146 dbus_message_get_path(message
));
1148 if (dbus_message_is_signal(message
, DBUS_INTERFACE_LOCAL
, "Disconnected")) {
1149 log_error("Warning! D-Bus connection terminated.");
1150 dbus_connection_close(connection
);
1152 } else if (dbus_message_is_signal(message
, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1154 const char *path
, *result
;
1155 dbus_bool_t success
= true;
1157 if (dbus_message_get_args(message
, &error
,
1158 DBUS_TYPE_UINT32
, &id
,
1159 DBUS_TYPE_OBJECT_PATH
, &path
,
1160 DBUS_TYPE_STRING
, &result
,
1161 DBUS_TYPE_INVALID
)) {
1164 if ((p
= set_remove(d
->set
, (char*) path
)))
1168 d
->result
= strdup(result
);
1173 dbus_error_free(&error
);
1175 if (dbus_message_get_args(message
, &error
,
1176 DBUS_TYPE_UINT32
, &id
,
1177 DBUS_TYPE_OBJECT_PATH
, &path
,
1178 DBUS_TYPE_BOOLEAN
, &success
,
1179 DBUS_TYPE_INVALID
)) {
1182 /* Compatibility with older systemd versions <
1183 * 19 during upgrades. This should be dropped
1186 if ((p
= set_remove(d
->set
, (char*) path
)))
1190 d
->result
= strdup("failed");
1196 log_error("Failed to parse message: %s", bus_error_message(&error
));
1200 dbus_error_free(&error
);
1201 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED
;
1204 static int enable_wait_for_jobs(DBusConnection
*bus
) {
1212 dbus_error_init(&error
);
1213 dbus_bus_add_match(bus
,
1215 "sender='org.freedesktop.systemd1',"
1216 "interface='org.freedesktop.systemd1.Manager',"
1217 "member='JobRemoved',"
1218 "path='/org/freedesktop/systemd1'",
1221 if (dbus_error_is_set(&error
)) {
1222 log_error("Failed to add match: %s", bus_error_message(&error
));
1223 dbus_error_free(&error
);
1227 /* This is slightly dirty, since we don't undo the match registrations. */
1231 static int wait_for_jobs(DBusConnection
*bus
, Set
*s
) {
1241 if (!dbus_connection_add_filter(bus
, wait_filter
, &d
, NULL
)) {
1242 log_error("Failed to add filter.");
1247 while (!set_isempty(s
) &&
1248 dbus_connection_read_write_dispatch(bus
, -1))
1251 if (!arg_quiet
&& d
.result
) {
1252 if (streq(d
.result
, "timeout"))
1253 log_error("Job timed out.");
1254 else if (streq(d
.result
, "canceled"))
1255 log_error("Job canceled.");
1256 else if (streq(d
.result
, "dependency"))
1257 log_error("A dependency job failed. See system logs for details.");
1258 else if (!streq(d
.result
, "done") && !streq(d
.result
, "skipped"))
1259 log_error("Job failed. See system logs and 'systemctl status' for details.");
1262 if (streq_ptr(d
.result
, "timeout"))
1264 else if (streq_ptr(d
.result
, "canceled"))
1266 else if (!streq_ptr(d
.result
, "done") && !streq_ptr(d
.result
, "skipped"))
1274 /* This is slightly dirty, since we don't undo the filter registration. */
1279 static int start_unit_one(
1280 DBusConnection
*bus
,
1287 DBusMessage
*m
= NULL
, *reply
= NULL
;
1296 assert(arg_no_block
|| s
);
1298 if (!(m
= dbus_message_new_method_call(
1299 "org.freedesktop.systemd1",
1300 "/org/freedesktop/systemd1",
1301 "org.freedesktop.systemd1.Manager",
1303 log_error("Could not allocate message.");
1308 if (!dbus_message_append_args(m
,
1309 DBUS_TYPE_STRING
, &name
,
1310 DBUS_TYPE_STRING
, &mode
,
1311 DBUS_TYPE_INVALID
)) {
1312 log_error("Could not append arguments to message.");
1317 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, error
))) {
1319 if (arg_action
!= ACTION_SYSTEMCTL
&& error_is_no_service(error
)) {
1320 /* There's always a fallback possible for
1321 * legacy actions. */
1326 log_error("Failed to issue method call: %s", bus_error_message(error
));
1331 if (!dbus_message_get_args(reply
, error
,
1332 DBUS_TYPE_OBJECT_PATH
, &path
,
1333 DBUS_TYPE_INVALID
)) {
1334 log_error("Failed to parse reply: %s", bus_error_message(error
));
1339 if (need_daemon_reload(bus
, name
))
1340 log_warning("Unit file of created job changed on disk, 'systemctl %s daemon-reload' recommended.",
1341 arg_user
? "--user" : "--system");
1343 if (!arg_no_block
) {
1346 if (!(p
= strdup(path
))) {
1347 log_error("Failed to duplicate path.");
1352 if ((r
= set_put(s
, p
)) < 0) {
1354 log_error("Failed to add path to set.");
1363 dbus_message_unref(m
);
1366 dbus_message_unref(reply
);
1371 static enum action
verb_to_action(const char *verb
) {
1372 if (streq(verb
, "halt"))
1374 else if (streq(verb
, "poweroff"))
1375 return ACTION_POWEROFF
;
1376 else if (streq(verb
, "reboot"))
1377 return ACTION_REBOOT
;
1378 else if (streq(verb
, "kexec"))
1379 return ACTION_KEXEC
;
1380 else if (streq(verb
, "rescue"))
1381 return ACTION_RESCUE
;
1382 else if (streq(verb
, "emergency"))
1383 return ACTION_EMERGENCY
;
1384 else if (streq(verb
, "default"))
1385 return ACTION_DEFAULT
;
1386 else if (streq(verb
, "exit"))
1389 return ACTION_INVALID
;
1392 static int start_unit(DBusConnection
*bus
, char **args
, unsigned n
) {
1394 static const char * const table
[_ACTION_MAX
] = {
1395 [ACTION_HALT
] = SPECIAL_HALT_TARGET
,
1396 [ACTION_POWEROFF
] = SPECIAL_POWEROFF_TARGET
,
1397 [ACTION_REBOOT
] = SPECIAL_REBOOT_TARGET
,
1398 [ACTION_KEXEC
] = SPECIAL_KEXEC_TARGET
,
1399 [ACTION_RUNLEVEL2
] = SPECIAL_RUNLEVEL2_TARGET
,
1400 [ACTION_RUNLEVEL3
] = SPECIAL_RUNLEVEL3_TARGET
,
1401 [ACTION_RUNLEVEL4
] = SPECIAL_RUNLEVEL4_TARGET
,
1402 [ACTION_RUNLEVEL5
] = SPECIAL_RUNLEVEL5_TARGET
,
1403 [ACTION_RESCUE
] = SPECIAL_RESCUE_TARGET
,
1404 [ACTION_EMERGENCY
] = SPECIAL_EMERGENCY_TARGET
,
1405 [ACTION_DEFAULT
] = SPECIAL_DEFAULT_TARGET
,
1406 [ACTION_EXIT
] = SPECIAL_EXIT_TARGET
1411 const char *method
, *mode
, *one_name
;
1415 dbus_error_init(&error
);
1419 spawn_ask_password_agent();
1421 if (arg_action
== ACTION_SYSTEMCTL
) {
1423 streq(args
[0], "stop") ||
1424 streq(args
[0], "condstop") ? "StopUnit" :
1425 streq(args
[0], "reload") ? "ReloadUnit" :
1426 streq(args
[0], "restart") ? "RestartUnit" :
1428 streq(args
[0], "try-restart") ||
1429 streq(args
[0], "condrestart") ? "TryRestartUnit" :
1431 streq(args
[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
1433 streq(args
[0], "reload-or-try-restart") ||
1434 streq(args
[0], "condreload") ||
1436 streq(args
[0], "force-reload") ? "ReloadOrTryRestartUnit" :
1440 (streq(args
[0], "isolate") ||
1441 streq(args
[0], "rescue") ||
1442 streq(args
[0], "emergency")) ? "isolate" : arg_job_mode
;
1444 one_name
= table
[verb_to_action(args
[0])];
1447 assert(arg_action
< ELEMENTSOF(table
));
1448 assert(table
[arg_action
]);
1450 method
= "StartUnit";
1452 mode
= (arg_action
== ACTION_EMERGENCY
||
1453 arg_action
== ACTION_RESCUE
||
1454 arg_action
== ACTION_RUNLEVEL2
||
1455 arg_action
== ACTION_RUNLEVEL3
||
1456 arg_action
== ACTION_RUNLEVEL4
||
1457 arg_action
== ACTION_RUNLEVEL5
) ? "isolate" : "replace";
1459 one_name
= table
[arg_action
];
1462 if (!arg_no_block
) {
1463 if ((ret
= enable_wait_for_jobs(bus
)) < 0) {
1464 log_error("Could not watch jobs: %s", strerror(-ret
));
1468 if (!(s
= set_new(string_hash_func
, string_compare_func
))) {
1469 log_error("Failed to allocate set.");
1476 if ((ret
= start_unit_one(bus
, method
, one_name
, mode
, &error
, s
)) <= 0)
1479 for (i
= 1; i
< n
; i
++)
1480 if ((r
= start_unit_one(bus
, method
, args
[i
], mode
, &error
, s
)) != 0) {
1481 ret
= translate_bus_error_to_exit_status(r
, &error
);
1482 dbus_error_free(&error
);
1487 if ((r
= wait_for_jobs(bus
, s
)) < 0) {
1496 dbus_error_free(&error
);
1501 static int start_special(DBusConnection
*bus
, char **args
, unsigned n
) {
1508 (streq(args
[0], "halt") ||
1509 streq(args
[0], "poweroff") ||
1510 streq(args
[0], "reboot") ||
1511 streq(args
[0], "kexec") ||
1512 streq(args
[0], "exit")))
1513 return daemon_reload(bus
, args
, n
);
1515 r
= start_unit(bus
, args
, n
);
1518 warn_wall(verb_to_action(args
[0]));
1523 static int check_unit(DBusConnection
*bus
, char **args
, unsigned n
) {
1524 DBusMessage
*m
= NULL
, *reply
= NULL
;
1526 *interface
= "org.freedesktop.systemd1.Unit",
1527 *property
= "ActiveState";
1528 int r
= 3; /* According to LSB: "program is not running" */
1535 dbus_error_init(&error
);
1537 for (i
= 1; i
< n
; i
++) {
1538 const char *path
= NULL
;
1540 DBusMessageIter iter
, sub
;
1542 if (!(m
= dbus_message_new_method_call(
1543 "org.freedesktop.systemd1",
1544 "/org/freedesktop/systemd1",
1545 "org.freedesktop.systemd1.Manager",
1547 log_error("Could not allocate message.");
1552 if (!dbus_message_append_args(m
,
1553 DBUS_TYPE_STRING
, &args
[i
],
1554 DBUS_TYPE_INVALID
)) {
1555 log_error("Could not append arguments to message.");
1560 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
1562 /* Hmm, cannot figure out anything about this unit... */
1566 dbus_error_free(&error
);
1567 dbus_message_unref(m
);
1571 if (!dbus_message_get_args(reply
, &error
,
1572 DBUS_TYPE_OBJECT_PATH
, &path
,
1573 DBUS_TYPE_INVALID
)) {
1574 log_error("Failed to parse reply: %s", bus_error_message(&error
));
1579 dbus_message_unref(m
);
1580 if (!(m
= dbus_message_new_method_call(
1581 "org.freedesktop.systemd1",
1583 "org.freedesktop.DBus.Properties",
1585 log_error("Could not allocate message.");
1590 if (!dbus_message_append_args(m
,
1591 DBUS_TYPE_STRING
, &interface
,
1592 DBUS_TYPE_STRING
, &property
,
1593 DBUS_TYPE_INVALID
)) {
1594 log_error("Could not append arguments to message.");
1599 dbus_message_unref(reply
);
1600 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
1601 log_error("Failed to issue method call: %s", bus_error_message(&error
));
1606 if (!dbus_message_iter_init(reply
, &iter
) ||
1607 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_VARIANT
) {
1608 log_error("Failed to parse reply.");
1613 dbus_message_iter_recurse(&iter
, &sub
);
1615 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_STRING
) {
1616 log_error("Failed to parse reply.");
1621 dbus_message_iter_get_basic(&sub
, &state
);
1626 if (streq(state
, "active") || streq(state
, "reloading"))
1629 dbus_message_unref(m
);
1630 dbus_message_unref(reply
);
1636 dbus_message_unref(m
);
1639 dbus_message_unref(reply
);
1641 dbus_error_free(&error
);
1646 static int kill_unit(DBusConnection
*bus
, char **args
, unsigned n
) {
1647 DBusMessage
*m
= NULL
, *reply
= NULL
;
1655 dbus_error_init(&error
);
1658 arg_kill_who
= "all";
1661 arg_kill_mode
= streq(arg_kill_who
, "all") ? "control-group" : "process";
1663 for (i
= 1; i
< n
; i
++) {
1665 if (!(m
= dbus_message_new_method_call(
1666 "org.freedesktop.systemd1",
1667 "/org/freedesktop/systemd1",
1668 "org.freedesktop.systemd1.Manager",
1670 log_error("Could not allocate message.");
1675 if (!dbus_message_append_args(m
,
1676 DBUS_TYPE_STRING
, &args
[i
],
1677 DBUS_TYPE_STRING
, &arg_kill_who
,
1678 DBUS_TYPE_STRING
, &arg_kill_mode
,
1679 DBUS_TYPE_INT32
, &arg_signal
,
1680 DBUS_TYPE_INVALID
)) {
1681 log_error("Could not append arguments to message.");
1686 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
1687 log_error("Failed to issue method call: %s", bus_error_message(&error
));
1688 dbus_error_free(&error
);
1692 dbus_message_unref(m
);
1695 dbus_message_unref(reply
);
1701 dbus_message_unref(m
);
1704 dbus_message_unref(reply
);
1706 dbus_error_free(&error
);
1711 typedef struct ExecStatusInfo
{
1719 usec_t start_timestamp
;
1720 usec_t exit_timestamp
;
1725 LIST_FIELDS(struct ExecStatusInfo
, exec
);
1728 static void exec_status_info_free(ExecStatusInfo
*i
) {
1737 static int exec_status_info_deserialize(DBusMessageIter
*sub
, ExecStatusInfo
*i
) {
1738 uint64_t start_timestamp
, exit_timestamp
;
1739 DBusMessageIter sub2
, sub3
;
1743 int32_t code
, status
;
1749 if (dbus_message_iter_get_arg_type(sub
) != DBUS_TYPE_STRUCT
)
1752 dbus_message_iter_recurse(sub
, &sub2
);
1754 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &path
, true) < 0)
1757 if (!(i
->path
= strdup(path
)))
1760 if (dbus_message_iter_get_arg_type(&sub2
) != DBUS_TYPE_ARRAY
||
1761 dbus_message_iter_get_element_type(&sub2
) != DBUS_TYPE_STRING
)
1765 dbus_message_iter_recurse(&sub2
, &sub3
);
1766 while (dbus_message_iter_get_arg_type(&sub3
) != DBUS_TYPE_INVALID
) {
1767 assert(dbus_message_iter_get_arg_type(&sub3
) == DBUS_TYPE_STRING
);
1768 dbus_message_iter_next(&sub3
);
1773 if (!(i
->argv
= new0(char*, n
+1)))
1777 dbus_message_iter_recurse(&sub2
, &sub3
);
1778 while (dbus_message_iter_get_arg_type(&sub3
) != DBUS_TYPE_INVALID
) {
1781 assert(dbus_message_iter_get_arg_type(&sub3
) == DBUS_TYPE_STRING
);
1782 dbus_message_iter_get_basic(&sub3
, &s
);
1783 dbus_message_iter_next(&sub3
);
1785 if (!(i
->argv
[n
++] = strdup(s
)))
1789 if (!dbus_message_iter_next(&sub2
) ||
1790 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_BOOLEAN
, &ignore
, true) < 0 ||
1791 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_UINT64
, &start_timestamp
, true) < 0 ||
1792 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_UINT64
, &exit_timestamp
, true) < 0 ||
1793 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_UINT32
, &pid
, true) < 0 ||
1794 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_INT32
, &code
, true) < 0 ||
1795 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_INT32
, &status
, false) < 0)
1799 i
->start_timestamp
= (usec_t
) start_timestamp
;
1800 i
->exit_timestamp
= (usec_t
) exit_timestamp
;
1801 i
->pid
= (pid_t
) pid
;
1808 typedef struct UnitStatusInfo
{
1810 const char *load_state
;
1811 const char *active_state
;
1812 const char *sub_state
;
1814 const char *description
;
1815 const char *following
;
1818 const char *default_control_group
;
1820 usec_t inactive_exit_timestamp
;
1821 usec_t active_enter_timestamp
;
1822 usec_t active_exit_timestamp
;
1823 usec_t inactive_enter_timestamp
;
1825 bool need_daemon_reload
;
1830 const char *status_text
;
1832 #ifdef HAVE_SYSV_COMPAT
1836 usec_t start_timestamp
;
1837 usec_t exit_timestamp
;
1839 int exit_code
, exit_status
;
1841 usec_t condition_timestamp
;
1842 bool condition_result
;
1845 unsigned n_accepted
;
1846 unsigned n_connections
;
1850 const char *sysfs_path
;
1852 /* Mount, Automount */
1858 LIST_HEAD(ExecStatusInfo
, exec
);
1861 static void print_status_info(UnitStatusInfo
*i
) {
1863 const char *on
, *off
, *ss
;
1865 char since1
[FORMAT_TIMESTAMP_PRETTY_MAX
], *s1
;
1866 char since2
[FORMAT_TIMESTAMP_MAX
], *s2
;
1870 /* This shows pretty information about a unit. See
1871 * print_property() for a low-level property printer */
1873 printf("%s", strna(i
->id
));
1875 if (i
->description
&& !streq_ptr(i
->id
, i
->description
))
1876 printf(" - %s", i
->description
);
1881 printf("\t Follow: unit currently follows state of %s\n", i
->following
);
1883 if (streq_ptr(i
->load_state
, "failed") ||
1884 streq_ptr(i
->load_state
, "banned")) {
1885 on
= ansi_highlight(true);
1886 off
= ansi_highlight(false);
1891 printf("\t Loaded: %s%s%s (%s)\n", on
, strna(i
->load_state
), off
, i
->path
);
1893 printf("\t Loaded: %s%s%s\n", on
, strna(i
->load_state
), off
);
1895 ss
= streq_ptr(i
->active_state
, i
->sub_state
) ? NULL
: i
->sub_state
;
1897 if (streq_ptr(i
->active_state
, "failed")) {
1898 on
= ansi_highlight(true);
1899 off
= ansi_highlight(false);
1900 } else if (streq_ptr(i
->active_state
, "active") || streq_ptr(i
->active_state
, "reloading")) {
1901 on
= ansi_highlight_green(true);
1902 off
= ansi_highlight_green(false);
1907 printf("\t Active: %s%s (%s)%s",
1909 strna(i
->active_state
),
1913 printf("\t Active: %s%s%s",
1915 strna(i
->active_state
),
1918 timestamp
= (streq_ptr(i
->active_state
, "active") ||
1919 streq_ptr(i
->active_state
, "reloading")) ? i
->active_enter_timestamp
:
1920 (streq_ptr(i
->active_state
, "inactive") ||
1921 streq_ptr(i
->active_state
, "failed")) ? i
->inactive_enter_timestamp
:
1922 streq_ptr(i
->active_state
, "activating") ? i
->inactive_exit_timestamp
:
1923 i
->active_exit_timestamp
;
1925 s1
= format_timestamp_pretty(since1
, sizeof(since1
), timestamp
);
1926 s2
= format_timestamp(since2
, sizeof(since2
), timestamp
);
1929 printf(" since %s; %s\n", s2
, s1
);
1931 printf(" since %s\n", s2
);
1935 if (!i
->condition_result
&& i
->condition_timestamp
> 0) {
1936 s1
= format_timestamp_pretty(since1
, sizeof(since1
), i
->condition_timestamp
);
1937 s2
= format_timestamp(since2
, sizeof(since2
), i
->condition_timestamp
);
1940 printf("\t start condition failed at %s; %s\n", s2
, s1
);
1942 printf("\t start condition failed at %s\n", s2
);
1946 printf("\t Device: %s\n", i
->sysfs_path
);
1948 printf("\t Where: %s\n", i
->where
);
1950 printf("\t What: %s\n", i
->what
);
1953 printf("\tAccepted: %u; Connected: %u\n", i
->n_accepted
, i
->n_connections
);
1955 LIST_FOREACH(exec
, p
, i
->exec
) {
1959 /* Only show exited processes here */
1963 t
= strv_join(p
->argv
, " ");
1964 printf("\t Process: %u %s=%s ", p
->pid
, p
->name
, strna(t
));
1967 #ifdef HAVE_SYSV_COMPAT
1969 good
= is_clean_exit_lsb(p
->code
, p
->status
);
1972 good
= is_clean_exit(p
->code
, p
->status
);
1975 on
= ansi_highlight(true);
1976 off
= ansi_highlight(false);
1980 printf("%s(code=%s, ", on
, sigchld_code_to_string(p
->code
));
1982 if (p
->code
== CLD_EXITED
) {
1985 printf("status=%i", p
->status
);
1987 #ifdef HAVE_SYSV_COMPAT
1988 if ((c
= exit_status_to_string(p
->status
, i
->is_sysv
? EXIT_STATUS_LSB
: EXIT_STATUS_SYSTEMD
)))
1990 if ((c
= exit_status_to_string(p
->status
, EXIT_STATUS_SYSTEMD
)))
1995 printf("signal=%s", signal_to_string(p
->status
));
1997 printf(")%s\n", off
);
2001 if (i
->main_pid
== p
->pid
&&
2002 i
->start_timestamp
== p
->start_timestamp
&&
2003 i
->exit_timestamp
== p
->start_timestamp
)
2004 /* Let's not show this twice */
2007 if (p
->pid
== i
->control_pid
)
2011 if (i
->main_pid
> 0 || i
->control_pid
> 0) {
2014 if (i
->main_pid
> 0) {
2015 printf("Main PID: %u", (unsigned) i
->main_pid
);
2019 get_process_name(i
->main_pid
, &t
);
2024 } else if (i
->exit_code
> 0) {
2025 printf(" (code=%s, ", sigchld_code_to_string(i
->exit_code
));
2027 if (i
->exit_code
== CLD_EXITED
) {
2030 printf("status=%i", i
->exit_status
);
2032 #ifdef HAVE_SYSV_COMPAT
2033 if ((c
= exit_status_to_string(i
->exit_status
, i
->is_sysv
? EXIT_STATUS_LSB
: EXIT_STATUS_SYSTEMD
)))
2035 if ((c
= exit_status_to_string(i
->exit_status
, EXIT_STATUS_SYSTEMD
)))
2040 printf("signal=%s", signal_to_string(i
->exit_status
));
2045 if (i
->main_pid
> 0 && i
->control_pid
> 0)
2048 if (i
->control_pid
> 0) {
2051 printf(" Control: %u", (unsigned) i
->control_pid
);
2053 get_process_name(i
->control_pid
, &t
);
2064 printf("\t Status: \"%s\"\n", i
->status_text
);
2066 if (i
->default_control_group
) {
2069 printf("\t CGroup: %s\n", i
->default_control_group
);
2071 if (arg_transport
!= TRANSPORT_SSH
) {
2072 if ((c
= columns()) > 18)
2077 show_cgroup_by_path(i
->default_control_group
, "\t\t ", c
);
2081 if (i
->need_daemon_reload
)
2082 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %s daemon-reload' recommended.\n",
2083 ansi_highlight(true),
2084 ansi_highlight(false),
2085 arg_user
? "--user" : "--system");
2088 static int status_property(const char *name
, DBusMessageIter
*iter
, UnitStatusInfo
*i
) {
2090 switch (dbus_message_iter_get_arg_type(iter
)) {
2092 case DBUS_TYPE_STRING
: {
2095 dbus_message_iter_get_basic(iter
, &s
);
2098 if (streq(name
, "Id"))
2100 else if (streq(name
, "LoadState"))
2102 else if (streq(name
, "ActiveState"))
2103 i
->active_state
= s
;
2104 else if (streq(name
, "SubState"))
2106 else if (streq(name
, "Description"))
2108 else if (streq(name
, "FragmentPath"))
2110 #ifdef HAVE_SYSV_COMPAT
2111 else if (streq(name
, "SysVPath")) {
2116 else if (streq(name
, "DefaultControlGroup"))
2117 i
->default_control_group
= s
;
2118 else if (streq(name
, "StatusText"))
2120 else if (streq(name
, "SysFSPath"))
2122 else if (streq(name
, "Where"))
2124 else if (streq(name
, "What"))
2126 else if (streq(name
, "Following"))
2133 case DBUS_TYPE_BOOLEAN
: {
2136 dbus_message_iter_get_basic(iter
, &b
);
2138 if (streq(name
, "Accept"))
2140 else if (streq(name
, "NeedDaemonReload"))
2141 i
->need_daemon_reload
= b
;
2142 else if (streq(name
, "ConditionResult"))
2143 i
->condition_result
= b
;
2148 case DBUS_TYPE_UINT32
: {
2151 dbus_message_iter_get_basic(iter
, &u
);
2153 if (streq(name
, "MainPID")) {
2155 i
->main_pid
= (pid_t
) u
;
2158 } else if (streq(name
, "ControlPID"))
2159 i
->control_pid
= (pid_t
) u
;
2160 else if (streq(name
, "ExecMainPID")) {
2162 i
->main_pid
= (pid_t
) u
;
2163 } else if (streq(name
, "NAccepted"))
2165 else if (streq(name
, "NConnections"))
2166 i
->n_connections
= u
;
2171 case DBUS_TYPE_INT32
: {
2174 dbus_message_iter_get_basic(iter
, &j
);
2176 if (streq(name
, "ExecMainCode"))
2177 i
->exit_code
= (int) j
;
2178 else if (streq(name
, "ExecMainStatus"))
2179 i
->exit_status
= (int) j
;
2184 case DBUS_TYPE_UINT64
: {
2187 dbus_message_iter_get_basic(iter
, &u
);
2189 if (streq(name
, "ExecMainStartTimestamp"))
2190 i
->start_timestamp
= (usec_t
) u
;
2191 else if (streq(name
, "ExecMainExitTimestamp"))
2192 i
->exit_timestamp
= (usec_t
) u
;
2193 else if (streq(name
, "ActiveEnterTimestamp"))
2194 i
->active_enter_timestamp
= (usec_t
) u
;
2195 else if (streq(name
, "InactiveEnterTimestamp"))
2196 i
->inactive_enter_timestamp
= (usec_t
) u
;
2197 else if (streq(name
, "InactiveExitTimestamp"))
2198 i
->inactive_exit_timestamp
= (usec_t
) u
;
2199 else if (streq(name
, "ActiveExitTimestamp"))
2200 i
->active_exit_timestamp
= (usec_t
) u
;
2201 else if (streq(name
, "ConditionTimestamp"))
2202 i
->condition_timestamp
= (usec_t
) u
;
2207 case DBUS_TYPE_ARRAY
: {
2209 if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_STRUCT
&&
2210 startswith(name
, "Exec")) {
2211 DBusMessageIter sub
;
2213 dbus_message_iter_recurse(iter
, &sub
);
2214 while (dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRUCT
) {
2215 ExecStatusInfo
*info
;
2218 if (!(info
= new0(ExecStatusInfo
, 1)))
2221 if (!(info
->name
= strdup(name
))) {
2226 if ((r
= exec_status_info_deserialize(&sub
, info
)) < 0) {
2231 LIST_PREPEND(ExecStatusInfo
, exec
, i
->exec
, info
);
2233 dbus_message_iter_next(&sub
);
2244 static int print_property(const char *name
, DBusMessageIter
*iter
) {
2248 /* This is a low-level property printer, see
2249 * print_status_info() for the nicer output */
2251 if (arg_property
&& !strv_find(arg_property
, name
))
2254 switch (dbus_message_iter_get_arg_type(iter
)) {
2256 case DBUS_TYPE_STRING
: {
2258 dbus_message_iter_get_basic(iter
, &s
);
2260 if (arg_all
|| s
[0])
2261 printf("%s=%s\n", name
, s
);
2266 case DBUS_TYPE_BOOLEAN
: {
2268 dbus_message_iter_get_basic(iter
, &b
);
2269 printf("%s=%s\n", name
, yes_no(b
));
2274 case DBUS_TYPE_UINT64
: {
2276 dbus_message_iter_get_basic(iter
, &u
);
2278 /* Yes, heuristics! But we can change this check
2279 * should it turn out to not be sufficient */
2281 if (strstr(name
, "Timestamp")) {
2282 char timestamp
[FORMAT_TIMESTAMP_MAX
], *t
;
2284 if ((t
= format_timestamp(timestamp
, sizeof(timestamp
), u
)) || arg_all
)
2285 printf("%s=%s\n", name
, strempty(t
));
2286 } else if (strstr(name
, "USec")) {
2287 char timespan
[FORMAT_TIMESPAN_MAX
];
2289 printf("%s=%s\n", name
, format_timespan(timespan
, sizeof(timespan
), u
));
2291 printf("%s=%llu\n", name
, (unsigned long long) u
);
2296 case DBUS_TYPE_UINT32
: {
2298 dbus_message_iter_get_basic(iter
, &u
);
2300 if (strstr(name
, "UMask") || strstr(name
, "Mode"))
2301 printf("%s=%04o\n", name
, u
);
2303 printf("%s=%u\n", name
, (unsigned) u
);
2308 case DBUS_TYPE_INT32
: {
2310 dbus_message_iter_get_basic(iter
, &i
);
2312 printf("%s=%i\n", name
, (int) i
);
2316 case DBUS_TYPE_DOUBLE
: {
2318 dbus_message_iter_get_basic(iter
, &d
);
2320 printf("%s=%g\n", name
, d
);
2324 case DBUS_TYPE_STRUCT
: {
2325 DBusMessageIter sub
;
2326 dbus_message_iter_recurse(iter
, &sub
);
2328 if (dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_UINT32
&& streq(name
, "Job")) {
2331 dbus_message_iter_get_basic(&sub
, &u
);
2334 printf("%s=%u\n", name
, (unsigned) u
);
2336 printf("%s=\n", name
);
2339 } else if (dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRING
&& streq(name
, "Unit")) {
2342 dbus_message_iter_get_basic(&sub
, &s
);
2344 if (arg_all
|| s
[0])
2345 printf("%s=%s\n", name
, s
);
2353 case DBUS_TYPE_ARRAY
:
2355 if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_STRING
) {
2356 DBusMessageIter sub
;
2359 dbus_message_iter_recurse(iter
, &sub
);
2361 dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
2362 printf("%s=", name
);
2364 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
2367 assert(dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRING
);
2368 dbus_message_iter_get_basic(&sub
, &s
);
2369 printf("%s%s", space
? " " : "", s
);
2372 dbus_message_iter_next(&sub
);
2380 } else if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_BYTE
) {
2381 DBusMessageIter sub
;
2383 dbus_message_iter_recurse(iter
, &sub
);
2385 dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
2386 printf("%s=", name
);
2388 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
2391 assert(dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_BYTE
);
2392 dbus_message_iter_get_basic(&sub
, &u
);
2395 dbus_message_iter_next(&sub
);
2403 } else if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_STRUCT
&& streq(name
, "EnvironmentFiles")) {
2404 DBusMessageIter sub
, sub2
;
2406 dbus_message_iter_recurse(iter
, &sub
);
2407 while (dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRUCT
) {
2411 dbus_message_iter_recurse(&sub
, &sub2
);
2413 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &path
, true) >= 0 &&
2414 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_BOOLEAN
, &ignore
, false) >= 0)
2415 printf("EnvironmentFile=%s (ignore=%s)\n", path
, yes_no(ignore
));
2417 dbus_message_iter_next(&sub
);
2422 } else if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_STRUCT
&& streq(name
, "Paths")) {
2423 DBusMessageIter sub
, sub2
;
2425 dbus_message_iter_recurse(iter
, &sub
);
2426 while (dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRUCT
) {
2427 const char *type
, *path
;
2429 dbus_message_iter_recurse(&sub
, &sub2
);
2431 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &type
, true) >= 0 &&
2432 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &path
, false) >= 0)
2433 printf("%s=%s\n", type
, path
);
2435 dbus_message_iter_next(&sub
);
2440 } else if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_STRUCT
&& streq(name
, "Timers")) {
2441 DBusMessageIter sub
, sub2
;
2443 dbus_message_iter_recurse(iter
, &sub
);
2444 while (dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRUCT
) {
2446 uint64_t value
, next_elapse
;
2448 dbus_message_iter_recurse(&sub
, &sub2
);
2450 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &base
, true) >= 0 &&
2451 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_UINT64
, &value
, true) >= 0 &&
2452 bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_UINT64
, &next_elapse
, false) >= 0) {
2453 char timespan1
[FORMAT_TIMESPAN_MAX
], timespan2
[FORMAT_TIMESPAN_MAX
];
2455 printf("%s={ value=%s ; next_elapse=%s }\n",
2457 format_timespan(timespan1
, sizeof(timespan1
), value
),
2458 format_timespan(timespan2
, sizeof(timespan2
), next_elapse
));
2461 dbus_message_iter_next(&sub
);
2466 } else if (dbus_message_iter_get_element_type(iter
) == DBUS_TYPE_STRUCT
&& startswith(name
, "Exec")) {
2467 DBusMessageIter sub
;
2469 dbus_message_iter_recurse(iter
, &sub
);
2470 while (dbus_message_iter_get_arg_type(&sub
) == DBUS_TYPE_STRUCT
) {
2471 ExecStatusInfo info
;
2474 if (exec_status_info_deserialize(&sub
, &info
) >= 0) {
2475 char timestamp1
[FORMAT_TIMESTAMP_MAX
], timestamp2
[FORMAT_TIMESTAMP_MAX
];
2478 t
= strv_join(info
.argv
, " ");
2480 printf("%s={ path=%s ; argv[]=%s ; ignore=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
2484 yes_no(info
.ignore
),
2485 strna(format_timestamp(timestamp1
, sizeof(timestamp1
), info
.start_timestamp
)),
2486 strna(format_timestamp(timestamp2
, sizeof(timestamp2
), info
.exit_timestamp
)),
2487 (unsigned) info
. pid
,
2488 sigchld_code_to_string(info
.code
),
2490 info
.code
== CLD_EXITED
? "" : "/",
2491 strempty(info
.code
== CLD_EXITED
? NULL
: signal_to_string(info
.status
)));
2497 strv_free(info
.argv
);
2499 dbus_message_iter_next(&sub
);
2509 printf("%s=[unprintable]\n", name
);
2514 static int show_one(const char *verb
, DBusConnection
*bus
, const char *path
, bool show_properties
, bool *new_line
) {
2515 DBusMessage
*m
= NULL
, *reply
= NULL
;
2516 const char *interface
= "";
2519 DBusMessageIter iter
, sub
, sub2
, sub3
;
2520 UnitStatusInfo info
;
2528 dbus_error_init(&error
);
2530 if (!(m
= dbus_message_new_method_call(
2531 "org.freedesktop.systemd1",
2533 "org.freedesktop.DBus.Properties",
2535 log_error("Could not allocate message.");
2540 if (!dbus_message_append_args(m
,
2541 DBUS_TYPE_STRING
, &interface
,
2542 DBUS_TYPE_INVALID
)) {
2543 log_error("Could not append arguments to message.");
2548 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
2549 log_error("Failed to issue method call: %s", bus_error_message(&error
));
2554 if (!dbus_message_iter_init(reply
, &iter
) ||
2555 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_ARRAY
||
2556 dbus_message_iter_get_element_type(&iter
) != DBUS_TYPE_DICT_ENTRY
) {
2557 log_error("Failed to parse reply.");
2562 dbus_message_iter_recurse(&iter
, &sub
);
2569 while (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_INVALID
) {
2572 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_DICT_ENTRY
) {
2573 log_error("Failed to parse reply.");
2578 dbus_message_iter_recurse(&sub
, &sub2
);
2580 if (bus_iter_get_basic_and_next(&sub2
, DBUS_TYPE_STRING
, &name
, true) < 0) {
2581 log_error("Failed to parse reply.");
2586 if (dbus_message_iter_get_arg_type(&sub2
) != DBUS_TYPE_VARIANT
) {
2587 log_error("Failed to parse reply.");
2592 dbus_message_iter_recurse(&sub2
, &sub3
);
2594 if (show_properties
)
2595 r
= print_property(name
, &sub3
);
2597 r
= status_property(name
, &sub3
, &info
);
2600 log_error("Failed to parse reply.");
2605 dbus_message_iter_next(&sub
);
2610 if (!show_properties
)
2611 print_status_info(&info
);
2613 if (!streq_ptr(info
.active_state
, "active") &&
2614 !streq_ptr(info
.active_state
, "reloading") &&
2615 streq(verb
, "status"))
2616 /* According to LSB: "program not running" */
2619 while ((p
= info
.exec
)) {
2620 LIST_REMOVE(ExecStatusInfo
, exec
, info
.exec
, p
);
2621 exec_status_info_free(p
);
2626 dbus_message_unref(m
);
2629 dbus_message_unref(reply
);
2631 dbus_error_free(&error
);
2636 static int show(DBusConnection
*bus
, char **args
, unsigned n
) {
2637 DBusMessage
*m
= NULL
, *reply
= NULL
;
2641 bool show_properties
, new_line
= false;
2646 dbus_error_init(&error
);
2648 show_properties
= !streq(args
[0], "status");
2650 if (show_properties
)
2653 if (show_properties
&& n
<= 1) {
2654 /* If not argument is specified inspect the manager
2657 ret
= show_one(args
[0], bus
, "/org/freedesktop/systemd1", show_properties
, &new_line
);
2661 for (i
= 1; i
< n
; i
++) {
2662 const char *path
= NULL
;
2665 if (safe_atou32(args
[i
], &id
) < 0) {
2667 /* Interpret as unit name */
2669 if (!(m
= dbus_message_new_method_call(
2670 "org.freedesktop.systemd1",
2671 "/org/freedesktop/systemd1",
2672 "org.freedesktop.systemd1.Manager",
2674 log_error("Could not allocate message.");
2679 if (!dbus_message_append_args(m
,
2680 DBUS_TYPE_STRING
, &args
[i
],
2681 DBUS_TYPE_INVALID
)) {
2682 log_error("Could not append arguments to message.");
2687 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
2689 if (!dbus_error_has_name(&error
, DBUS_ERROR_ACCESS_DENIED
)) {
2690 log_error("Failed to issue method call: %s", bus_error_message(&error
));
2695 dbus_error_free(&error
);
2697 dbus_message_unref(m
);
2698 if (!(m
= dbus_message_new_method_call(
2699 "org.freedesktop.systemd1",
2700 "/org/freedesktop/systemd1",
2701 "org.freedesktop.systemd1.Manager",
2703 log_error("Could not allocate message.");
2708 if (!dbus_message_append_args(m
,
2709 DBUS_TYPE_STRING
, &args
[i
],
2710 DBUS_TYPE_INVALID
)) {
2711 log_error("Could not append arguments to message.");
2716 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
2717 log_error("Failed to issue method call: %s", bus_error_message(&error
));
2719 if (dbus_error_has_name(&error
, BUS_ERROR_NO_SUCH_UNIT
))
2720 ret
= 4; /* According to LSB: "program or service status is unknown" */
2727 } else if (show_properties
) {
2729 /* Interpret as job id */
2731 if (!(m
= dbus_message_new_method_call(
2732 "org.freedesktop.systemd1",
2733 "/org/freedesktop/systemd1",
2734 "org.freedesktop.systemd1.Manager",
2736 log_error("Could not allocate message.");
2741 if (!dbus_message_append_args(m
,
2742 DBUS_TYPE_UINT32
, &id
,
2743 DBUS_TYPE_INVALID
)) {
2744 log_error("Could not append arguments to message.");
2749 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
2750 log_error("Failed to issue method call: %s", bus_error_message(&error
));
2756 /* Interpret as PID */
2758 if (!(m
= dbus_message_new_method_call(
2759 "org.freedesktop.systemd1",
2760 "/org/freedesktop/systemd1",
2761 "org.freedesktop.systemd1.Manager",
2763 log_error("Could not allocate message.");
2768 if (!dbus_message_append_args(m
,
2769 DBUS_TYPE_UINT32
, &id
,
2770 DBUS_TYPE_INVALID
)) {
2771 log_error("Could not append arguments to message.");
2776 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
2777 log_error("Failed to issue method call: %s", bus_error_message(&error
));
2783 if (!dbus_message_get_args(reply
, &error
,
2784 DBUS_TYPE_OBJECT_PATH
, &path
,
2785 DBUS_TYPE_INVALID
)) {
2786 log_error("Failed to parse reply: %s", bus_error_message(&error
));
2791 if ((r
= show_one(args
[0], bus
, path
, show_properties
, &new_line
)) != 0)
2794 dbus_message_unref(m
);
2795 dbus_message_unref(reply
);
2801 dbus_message_unref(m
);
2804 dbus_message_unref(reply
);
2806 dbus_error_free(&error
);
2811 static DBusHandlerResult
monitor_filter(DBusConnection
*connection
, DBusMessage
*message
, void *data
) {
2813 DBusMessage
*m
= NULL
, *reply
= NULL
;
2818 dbus_error_init(&error
);
2820 log_debug("Got D-Bus request: %s.%s() on %s",
2821 dbus_message_get_interface(message
),
2822 dbus_message_get_member(message
),
2823 dbus_message_get_path(message
));
2825 if (dbus_message_is_signal(message
, DBUS_INTERFACE_LOCAL
, "Disconnected")) {
2826 log_error("Warning! D-Bus connection terminated.");
2827 dbus_connection_close(connection
);
2829 } else if (dbus_message_is_signal(message
, "org.freedesktop.systemd1.Manager", "UnitNew") ||
2830 dbus_message_is_signal(message
, "org.freedesktop.systemd1.Manager", "UnitRemoved")) {
2831 const char *id
, *path
;
2833 if (!dbus_message_get_args(message
, &error
,
2834 DBUS_TYPE_STRING
, &id
,
2835 DBUS_TYPE_OBJECT_PATH
, &path
,
2837 log_error("Failed to parse message: %s", bus_error_message(&error
));
2838 else if (streq(dbus_message_get_member(message
), "UnitNew"))
2839 printf("Unit %s added.\n", id
);
2841 printf("Unit %s removed.\n", id
);
2843 } else if (dbus_message_is_signal(message
, "org.freedesktop.systemd1.Manager", "JobNew") ||
2844 dbus_message_is_signal(message
, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
2846 const char *path
, *result
;
2848 if (!dbus_message_get_args(message
, &error
,
2849 DBUS_TYPE_UINT32
, &id
,
2850 DBUS_TYPE_OBJECT_PATH
, &path
,
2851 DBUS_TYPE_STRING
, &result
,
2853 log_error("Failed to parse message: %s", bus_error_message(&error
));
2854 else if (streq(dbus_message_get_member(message
), "JobNew"))
2855 printf("Job %u added.\n", id
);
2857 printf("Job %u removed.\n", id
);
2860 } else if (dbus_message_is_signal(message
, "org.freedesktop.DBus.Properties", "PropertiesChanged")) {
2862 const char *path
, *interface
, *property
= "Id";
2863 DBusMessageIter iter
, sub
;
2865 path
= dbus_message_get_path(message
);
2867 if (!dbus_message_get_args(message
, &error
,
2868 DBUS_TYPE_STRING
, &interface
,
2869 DBUS_TYPE_INVALID
)) {
2870 log_error("Failed to parse message: %s", bus_error_message(&error
));
2874 if (!streq(interface
, "org.freedesktop.systemd1.Job") &&
2875 !streq(interface
, "org.freedesktop.systemd1.Unit"))
2878 if (!(m
= dbus_message_new_method_call(
2879 "org.freedesktop.systemd1",
2881 "org.freedesktop.DBus.Properties",
2883 log_error("Could not allocate message.");
2887 if (!dbus_message_append_args(m
,
2888 DBUS_TYPE_STRING
, &interface
,
2889 DBUS_TYPE_STRING
, &property
,
2890 DBUS_TYPE_INVALID
)) {
2891 log_error("Could not append arguments to message.");
2895 if (!(reply
= dbus_connection_send_with_reply_and_block(connection
, m
, -1, &error
))) {
2896 log_error("Failed to issue method call: %s", bus_error_message(&error
));
2900 if (!dbus_message_iter_init(reply
, &iter
) ||
2901 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_VARIANT
) {
2902 log_error("Failed to parse reply.");
2906 dbus_message_iter_recurse(&iter
, &sub
);
2908 if (streq(interface
, "org.freedesktop.systemd1.Unit")) {
2911 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_STRING
) {
2912 log_error("Failed to parse reply.");
2916 dbus_message_iter_get_basic(&sub
, &id
);
2917 printf("Unit %s changed.\n", id
);
2921 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_UINT32
) {
2922 log_error("Failed to parse reply.");
2926 dbus_message_iter_get_basic(&sub
, &id
);
2927 printf("Job %u changed.\n", id
);
2933 dbus_message_unref(m
);
2936 dbus_message_unref(reply
);
2938 dbus_error_free(&error
);
2939 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED
;
2943 dbus_message_unref(m
);
2946 dbus_message_unref(reply
);
2948 dbus_error_free(&error
);
2949 return DBUS_HANDLER_RESULT_NEED_MEMORY
;
2952 static int monitor(DBusConnection
*bus
, char **args
, unsigned n
) {
2953 DBusMessage
*m
= NULL
, *reply
= NULL
;
2957 dbus_error_init(&error
);
2960 dbus_bus_add_match(bus
,
2962 "sender='org.freedesktop.systemd1',"
2963 "interface='org.freedesktop.systemd1.Manager',"
2964 "path='/org/freedesktop/systemd1'",
2967 if (dbus_error_is_set(&error
)) {
2968 log_error("Failed to add match: %s", bus_error_message(&error
));
2973 dbus_bus_add_match(bus
,
2975 "sender='org.freedesktop.systemd1',"
2976 "interface='org.freedesktop.DBus.Properties',"
2977 "member='PropertiesChanged'",
2980 if (dbus_error_is_set(&error
)) {
2981 log_error("Failed to add match: %s", bus_error_message(&error
));
2987 if (!dbus_connection_add_filter(bus
, monitor_filter
, NULL
, NULL
)) {
2988 log_error("Failed to add filter.");
2993 if (!(m
= dbus_message_new_method_call(
2994 "org.freedesktop.systemd1",
2995 "/org/freedesktop/systemd1",
2996 "org.freedesktop.systemd1.Manager",
2998 log_error("Could not allocate message.");
3003 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3004 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3009 while (dbus_connection_read_write_dispatch(bus
, -1))
3016 /* This is slightly dirty, since we don't undo the filter or the matches. */
3019 dbus_message_unref(m
);
3022 dbus_message_unref(reply
);
3024 dbus_error_free(&error
);
3029 static int dump(DBusConnection
*bus
, char **args
, unsigned n
) {
3030 DBusMessage
*m
= NULL
, *reply
= NULL
;
3035 dbus_error_init(&error
);
3039 if (!(m
= dbus_message_new_method_call(
3040 "org.freedesktop.systemd1",
3041 "/org/freedesktop/systemd1",
3042 "org.freedesktop.systemd1.Manager",
3044 log_error("Could not allocate message.");
3048 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3049 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3054 if (!dbus_message_get_args(reply
, &error
,
3055 DBUS_TYPE_STRING
, &text
,
3056 DBUS_TYPE_INVALID
)) {
3057 log_error("Failed to parse reply: %s", bus_error_message(&error
));
3062 fputs(text
, stdout
);
3068 dbus_message_unref(m
);
3071 dbus_message_unref(reply
);
3073 dbus_error_free(&error
);
3078 static int snapshot(DBusConnection
*bus
, char **args
, unsigned n
) {
3079 DBusMessage
*m
= NULL
, *reply
= NULL
;
3082 const char *name
= "", *path
, *id
;
3083 dbus_bool_t cleanup
= FALSE
;
3084 DBusMessageIter iter
, sub
;
3086 *interface
= "org.freedesktop.systemd1.Unit",
3089 dbus_error_init(&error
);
3091 if (!(m
= dbus_message_new_method_call(
3092 "org.freedesktop.systemd1",
3093 "/org/freedesktop/systemd1",
3094 "org.freedesktop.systemd1.Manager",
3095 "CreateSnapshot"))) {
3096 log_error("Could not allocate message.");
3103 if (!dbus_message_append_args(m
,
3104 DBUS_TYPE_STRING
, &name
,
3105 DBUS_TYPE_BOOLEAN
, &cleanup
,
3106 DBUS_TYPE_INVALID
)) {
3107 log_error("Could not append arguments to message.");
3112 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3113 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3118 if (!dbus_message_get_args(reply
, &error
,
3119 DBUS_TYPE_OBJECT_PATH
, &path
,
3120 DBUS_TYPE_INVALID
)) {
3121 log_error("Failed to parse reply: %s", bus_error_message(&error
));
3126 dbus_message_unref(m
);
3127 if (!(m
= dbus_message_new_method_call(
3128 "org.freedesktop.systemd1",
3130 "org.freedesktop.DBus.Properties",
3132 log_error("Could not allocate message.");
3136 if (!dbus_message_append_args(m
,
3137 DBUS_TYPE_STRING
, &interface
,
3138 DBUS_TYPE_STRING
, &property
,
3139 DBUS_TYPE_INVALID
)) {
3140 log_error("Could not append arguments to message.");
3145 dbus_message_unref(reply
);
3146 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3147 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3152 if (!dbus_message_iter_init(reply
, &iter
) ||
3153 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_VARIANT
) {
3154 log_error("Failed to parse reply.");
3159 dbus_message_iter_recurse(&iter
, &sub
);
3161 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_STRING
) {
3162 log_error("Failed to parse reply.");
3167 dbus_message_iter_get_basic(&sub
, &id
);
3175 dbus_message_unref(m
);
3178 dbus_message_unref(reply
);
3180 dbus_error_free(&error
);
3185 static int delete_snapshot(DBusConnection
*bus
, char **args
, unsigned n
) {
3186 DBusMessage
*m
= NULL
, *reply
= NULL
;
3194 dbus_error_init(&error
);
3196 for (i
= 1; i
< n
; i
++) {
3197 const char *path
= NULL
;
3199 if (!(m
= dbus_message_new_method_call(
3200 "org.freedesktop.systemd1",
3201 "/org/freedesktop/systemd1",
3202 "org.freedesktop.systemd1.Manager",
3204 log_error("Could not allocate message.");
3209 if (!dbus_message_append_args(m
,
3210 DBUS_TYPE_STRING
, &args
[i
],
3211 DBUS_TYPE_INVALID
)) {
3212 log_error("Could not append arguments to message.");
3217 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3218 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3223 if (!dbus_message_get_args(reply
, &error
,
3224 DBUS_TYPE_OBJECT_PATH
, &path
,
3225 DBUS_TYPE_INVALID
)) {
3226 log_error("Failed to parse reply: %s", bus_error_message(&error
));
3231 dbus_message_unref(m
);
3232 if (!(m
= dbus_message_new_method_call(
3233 "org.freedesktop.systemd1",
3235 "org.freedesktop.systemd1.Snapshot",
3237 log_error("Could not allocate message.");
3242 dbus_message_unref(reply
);
3243 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3244 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3249 dbus_message_unref(m
);
3250 dbus_message_unref(reply
);
3258 dbus_message_unref(m
);
3261 dbus_message_unref(reply
);
3263 dbus_error_free(&error
);
3268 static int daemon_reload(DBusConnection
*bus
, char **args
, unsigned n
) {
3269 DBusMessage
*m
= NULL
, *reply
= NULL
;
3274 dbus_error_init(&error
);
3276 if (arg_action
== ACTION_RELOAD
)
3278 else if (arg_action
== ACTION_REEXEC
)
3279 method
= "Reexecute";
3281 assert(arg_action
== ACTION_SYSTEMCTL
);
3284 streq(args
[0], "clear-jobs") ||
3285 streq(args
[0], "cancel") ? "ClearJobs" :
3286 streq(args
[0], "daemon-reexec") ? "Reexecute" :
3287 streq(args
[0], "reset-failed") ? "ResetFailed" :
3288 streq(args
[0], "halt") ? "Halt" :
3289 streq(args
[0], "poweroff") ? "PowerOff" :
3290 streq(args
[0], "reboot") ? "Reboot" :
3291 streq(args
[0], "kexec") ? "KExec" :
3292 streq(args
[0], "exit") ? "Exit" :
3293 /* "daemon-reload" */ "Reload";
3296 if (!(m
= dbus_message_new_method_call(
3297 "org.freedesktop.systemd1",
3298 "/org/freedesktop/systemd1",
3299 "org.freedesktop.systemd1.Manager",
3301 log_error("Could not allocate message.");
3305 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3307 if (arg_action
!= ACTION_SYSTEMCTL
&& error_is_no_service(&error
)) {
3308 /* There's always a fallback possible for
3309 * legacy actions. */
3314 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3323 dbus_message_unref(m
);
3326 dbus_message_unref(reply
);
3328 dbus_error_free(&error
);
3333 static int reset_failed(DBusConnection
*bus
, char **args
, unsigned n
) {
3334 DBusMessage
*m
= NULL
, *reply
= NULL
;
3340 dbus_error_init(&error
);
3343 return daemon_reload(bus
, args
, n
);
3345 for (i
= 1; i
< n
; i
++) {
3347 if (!(m
= dbus_message_new_method_call(
3348 "org.freedesktop.systemd1",
3349 "/org/freedesktop/systemd1",
3350 "org.freedesktop.systemd1.Manager",
3351 "ResetFailedUnit"))) {
3352 log_error("Could not allocate message.");
3357 if (!dbus_message_append_args(m
,
3358 DBUS_TYPE_STRING
, args
+ i
,
3359 DBUS_TYPE_INVALID
)) {
3360 log_error("Could not append arguments to message.");
3365 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3366 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3371 dbus_message_unref(m
);
3372 dbus_message_unref(reply
);
3380 dbus_message_unref(m
);
3383 dbus_message_unref(reply
);
3385 dbus_error_free(&error
);
3390 static int show_enviroment(DBusConnection
*bus
, char **args
, unsigned n
) {
3391 DBusMessage
*m
= NULL
, *reply
= NULL
;
3393 DBusMessageIter iter
, sub
, sub2
;
3396 *interface
= "org.freedesktop.systemd1.Manager",
3397 *property
= "Environment";
3399 dbus_error_init(&error
);
3403 if (!(m
= dbus_message_new_method_call(
3404 "org.freedesktop.systemd1",
3405 "/org/freedesktop/systemd1",
3406 "org.freedesktop.DBus.Properties",
3408 log_error("Could not allocate message.");
3412 if (!dbus_message_append_args(m
,
3413 DBUS_TYPE_STRING
, &interface
,
3414 DBUS_TYPE_STRING
, &property
,
3415 DBUS_TYPE_INVALID
)) {
3416 log_error("Could not append arguments to message.");
3421 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3422 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3427 if (!dbus_message_iter_init(reply
, &iter
) ||
3428 dbus_message_iter_get_arg_type(&iter
) != DBUS_TYPE_VARIANT
) {
3429 log_error("Failed to parse reply.");
3434 dbus_message_iter_recurse(&iter
, &sub
);
3436 if (dbus_message_iter_get_arg_type(&sub
) != DBUS_TYPE_ARRAY
||
3437 dbus_message_iter_get_element_type(&sub
) != DBUS_TYPE_STRING
) {
3438 log_error("Failed to parse reply.");
3443 dbus_message_iter_recurse(&sub
, &sub2
);
3445 while (dbus_message_iter_get_arg_type(&sub2
) != DBUS_TYPE_INVALID
) {
3448 if (dbus_message_iter_get_arg_type(&sub2
) != DBUS_TYPE_STRING
) {
3449 log_error("Failed to parse reply.");
3454 dbus_message_iter_get_basic(&sub2
, &text
);
3455 printf("%s\n", text
);
3457 dbus_message_iter_next(&sub2
);
3464 dbus_message_unref(m
);
3467 dbus_message_unref(reply
);
3469 dbus_error_free(&error
);
3474 static int set_environment(DBusConnection
*bus
, char **args
, unsigned n
) {
3475 DBusMessage
*m
= NULL
, *reply
= NULL
;
3479 DBusMessageIter iter
, sub
;
3482 dbus_error_init(&error
);
3484 method
= streq(args
[0], "set-environment")
3486 : "UnsetEnvironment";
3488 if (!(m
= dbus_message_new_method_call(
3489 "org.freedesktop.systemd1",
3490 "/org/freedesktop/systemd1",
3491 "org.freedesktop.systemd1.Manager",
3494 log_error("Could not allocate message.");
3498 dbus_message_iter_init_append(m
, &iter
);
3500 if (!dbus_message_iter_open_container(&iter
, DBUS_TYPE_ARRAY
, "s", &sub
)) {
3501 log_error("Could not append arguments to message.");
3506 for (i
= 1; i
< n
; i
++)
3507 if (!dbus_message_iter_append_basic(&sub
, DBUS_TYPE_STRING
, &args
[i
])) {
3508 log_error("Could not append arguments to message.");
3513 if (!dbus_message_iter_close_container(&iter
, &sub
)) {
3514 log_error("Could not append arguments to message.");
3519 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
3520 log_error("Failed to issue method call: %s", bus_error_message(&error
));
3529 dbus_message_unref(m
);
3532 dbus_message_unref(reply
);
3534 dbus_error_free(&error
);
3547 static Hashmap
*will_install
= NULL
, *have_installed
= NULL
;
3548 static Set
*remove_symlinks_to
= NULL
;
3549 static unsigned n_symlinks
= 0;
3551 static void install_info_free(InstallInfo
*i
) {
3556 strv_free(i
->aliases
);
3557 strv_free(i
->wanted_by
);
3561 static void install_info_hashmap_free(Hashmap
*m
) {
3564 while ((i
= hashmap_steal_first(m
)))
3565 install_info_free(i
);
3570 static int install_info_add(const char *name
) {
3574 assert(will_install
);
3576 if (!unit_name_is_valid_no_type(name
, true)) {
3577 log_warning("Unit name %s is not a valid unit name.", name
);
3581 if (hashmap_get(have_installed
, name
) ||
3582 hashmap_get(will_install
, name
))
3585 if (!(i
= new0(InstallInfo
, 1))) {
3590 if (!(i
->name
= strdup(name
))) {
3595 if ((r
= hashmap_put(will_install
, i
->name
, i
)) < 0)
3602 install_info_free(i
);
3607 static int config_parse_also(
3608 const char *filename
,
3610 const char *section
,
3625 FOREACH_WORD_QUOTED(w
, l
, rvalue
, state
) {
3629 if (!(n
= strndup(w
, l
)))
3632 if ((r
= install_info_add(n
)) < 0) {
3633 log_warning("Cannot install unit %s: %s", n
, strerror(-r
));
3644 static int mark_symlink_for_removal(const char *p
) {
3649 assert(path_is_absolute(p
));
3651 if (!remove_symlinks_to
)
3654 if (!(n
= strdup(p
)))
3657 path_kill_slashes(n
);
3659 if ((r
= set_put(remove_symlinks_to
, n
)) < 0) {
3661 return r
== -EEXIST
? 0 : r
;
3667 static int remove_marked_symlinks_fd(int fd
, const char *config_path
, const char *root
, bool *deleted
) {
3676 if (!(d
= fdopendir(fd
))) {
3677 close_nointr_nofail(fd
);
3683 while ((de
= readdir(d
))) {
3684 bool is_dir
= false, is_link
= false;
3686 if (ignore_file(de
->d_name
))
3689 if (de
->d_type
== DT_LNK
)
3691 else if (de
->d_type
== DT_DIR
)
3693 else if (de
->d_type
== DT_UNKNOWN
) {
3696 if (fstatat(fd
, de
->d_name
, &st
, AT_SYMLINK_NOFOLLOW
) < 0) {
3697 log_error("Failed to stat %s/%s: %m", root
, de
->d_name
);
3704 is_link
= S_ISLNK(st
.st_mode
);
3705 is_dir
= S_ISDIR(st
.st_mode
);
3713 if ((nfd
= openat(fd
, de
->d_name
, O_RDONLY
|O_NONBLOCK
|O_DIRECTORY
|O_CLOEXEC
|O_NOFOLLOW
)) < 0) {
3714 log_error("Failed to open %s/%s: %m", root
, de
->d_name
);
3721 if (asprintf(&p
, "%s/%s", root
, de
->d_name
) < 0) {
3722 log_error("Failed to allocate directory string.");
3723 close_nointr_nofail(nfd
);
3728 /* This will close nfd, regardless whether it succeeds or not */
3729 q
= remove_marked_symlinks_fd(nfd
, config_path
, p
, deleted
);
3735 } else if (is_link
) {
3739 if (asprintf(&p
, "%s/%s", root
, de
->d_name
) < 0) {
3740 log_error("Failed to allocate symlink string.");
3745 if ((q
= readlink_and_make_absolute(p
, &dest
)) < 0) {
3746 log_error("Cannot read symlink %s: %s", p
, strerror(-q
));
3754 if ((c
= canonicalize_file_name(dest
))) {
3755 /* This might fail if the destination
3756 * is already removed */
3762 path_kill_slashes(dest
);
3763 if (set_get(remove_symlinks_to
, dest
)) {
3766 log_info("rm '%s'", p
);
3768 if (unlink(p
) < 0) {
3769 log_error("Cannot unlink symlink %s: %m", p
);
3774 rmdir_parents(p
, config_path
);
3775 path_kill_slashes(p
);
3777 if (!set_get(remove_symlinks_to
, p
)) {
3779 if ((r
= mark_symlink_for_removal(p
)) < 0) {
3798 static int remove_marked_symlinks(const char *config_path
) {
3802 assert(config_path
);
3804 if (set_size(remove_symlinks_to
) <= 0)
3807 if ((fd
= open(config_path
, O_RDONLY
|O_NONBLOCK
|O_DIRECTORY
|O_CLOEXEC
|O_NOFOLLOW
)) < 0)
3814 if ((cfd
= dup(fd
)) < 0) {
3819 /* This takes possession of cfd and closes it */
3820 if ((q
= remove_marked_symlinks_fd(cfd
, config_path
, config_path
, &deleted
)) < 0) {
3826 close_nointr_nofail(fd
);
3831 static int create_symlink(const char *verb
, const char *old_path
, const char *new_path
) {
3838 if (streq(verb
, "enable")) {
3841 mkdir_parents(new_path
, 0755);
3843 if (symlink(old_path
, new_path
) >= 0) {
3846 log_info("ln -s '%s' '%s'", old_path
, new_path
);
3851 if (errno
!= EEXIST
) {
3852 log_error("Cannot link %s to %s: %m", old_path
, new_path
);
3856 if ((r
= readlink_and_make_absolute(new_path
, &dest
)) < 0) {
3858 if (errno
== EINVAL
) {
3859 log_error("Cannot link %s to %s, file exists already and is not a symlink.", old_path
, new_path
);
3863 log_error("readlink() failed: %s", strerror(-r
));
3867 if (streq(dest
, old_path
)) {
3873 log_error("Cannot link %s to %s, symlink exists already and points to %s.", old_path
, new_path
, dest
);
3882 log_info("ln -s '%s' '%s'", old_path
, new_path
);
3884 if (symlink(old_path
, new_path
) >= 0)
3887 log_error("Cannot link %s to %s: %m", old_path
, new_path
);
3890 } else if (streq(verb
, "disable")) {
3893 if ((r
= mark_symlink_for_removal(old_path
)) < 0)
3896 if ((r
= readlink_and_make_absolute(new_path
, &dest
)) < 0) {
3897 if (errno
== ENOENT
)
3900 if (errno
== EINVAL
) {
3901 log_warning("File %s not a symlink, ignoring.", old_path
);
3905 log_error("readlink() failed: %s", strerror(-r
));
3909 if (!streq(dest
, old_path
)) {
3910 log_warning("File %s not a symlink to %s but points to %s, ignoring.", new_path
, old_path
, dest
);
3917 if ((r
= mark_symlink_for_removal(new_path
)) < 0)
3921 log_info("rm '%s'", new_path
);
3923 if (unlink(new_path
) >= 0)
3926 log_error("Cannot unlink %s: %m", new_path
);
3929 } else if (streq(verb
, "is-enabled")) {
3932 if ((r
= readlink_and_make_absolute(new_path
, &dest
)) < 0) {
3934 if (errno
== ENOENT
|| errno
== EINVAL
)
3937 log_error("readlink() failed: %s", strerror(-r
));
3941 if (streq(dest
, old_path
)) {
3949 assert_not_reached("Unknown action.");
3952 static int install_info_symlink_alias(const char *verb
, InstallInfo
*i
, const char *config_path
) {
3954 char *alias_path
= NULL
;
3959 assert(config_path
);
3961 STRV_FOREACH(s
, i
->aliases
) {
3964 if (!(alias_path
= path_make_absolute(*s
, config_path
))) {
3965 log_error("Out of memory");
3970 if ((r
= create_symlink(verb
, i
->path
, alias_path
)) != 0)
3973 if (streq(verb
, "disable"))
3974 rmdir_parents(alias_path
, config_path
);
3984 static int install_info_symlink_wants(const char *verb
, InstallInfo
*i
, const char *config_path
) {
3986 char *alias_path
= NULL
;
3991 assert(config_path
);
3993 STRV_FOREACH(s
, i
->wanted_by
) {
3994 if (!unit_name_is_valid_no_type(*s
, true)) {
3995 log_error("Invalid name %s.", *s
);
4003 if (asprintf(&alias_path
, "%s/%s.wants/%s", config_path
, *s
, i
->name
) < 0) {
4004 log_error("Out of memory");
4009 if ((r
= create_symlink(verb
, i
->path
, alias_path
)) != 0)
4012 if (streq(verb
, "disable"))
4013 rmdir_parents(alias_path
, config_path
);
4024 static int install_info_apply(const char *verb
, LookupPaths
*paths
, InstallInfo
*i
, const char *config_path
) {
4026 const ConfigItem items
[] = {
4027 { "Alias", config_parse_strv
, 0, &i
->aliases
, "Install" },
4028 { "WantedBy", config_parse_strv
, 0, &i
->wanted_by
, "Install" },
4029 { "Also", config_parse_also
, 0, NULL
, "Install" },
4031 { NULL
, NULL
, 0, NULL
, NULL
}
4035 char *filename
= NULL
;
4042 STRV_FOREACH(p
, paths
->unit_path
) {
4045 if (!(filename
= path_make_absolute(i
->name
, *p
))) {
4046 log_error("Out of memory");
4050 /* Ensure that we don't follow symlinks */
4051 if ((fd
= open(filename
, O_RDONLY
|O_CLOEXEC
|O_NOFOLLOW
|O_NOCTTY
)) >= 0)
4052 if ((f
= fdopen(fd
, "re")))
4055 if (errno
== ELOOP
) {
4056 log_error("Refusing to operate on symlinks, please pass unit names or absolute paths to unit files.");
4061 if (errno
!= ENOENT
) {
4062 log_error("Failed to open %s: %m", filename
);
4072 #if (defined(TARGET_FEDORA) || defined(TARGET_MANDRIVA)) && defined (HAVE_SYSV_COMPAT)
4074 if (endswith(i
->name
, ".service")) {
4078 if (asprintf(&sysv
, SYSTEM_SYSVINIT_PATH
"/%s", i
->name
) < 0) {
4079 log_error("Out of memory");
4083 sysv
[strlen(sysv
) - sizeof(".service") + 1] = 0;
4084 exists
= access(sysv
, F_OK
) >= 0;
4090 const char *argv
[] = {
4097 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", i
->name
);
4099 argv
[1] = file_name_from_path(sysv
);
4101 streq(verb
, "enable") ? "on" :
4102 streq(verb
, "disable") ? "off" : "--level=5";
4104 log_info("Executing %s %s %s", argv
[0], argv
[1], strempty(argv
[2]));
4106 if ((pid
= fork()) < 0) {
4107 log_error("Failed to fork: %m");
4110 } else if (pid
== 0) {
4111 execv(argv
[0], (char**) argv
);
4112 _exit(EXIT_FAILURE
);
4117 if ((r
= wait_for_terminate(pid
, &status
)) < 0)
4120 if (status
.si_code
== CLD_EXITED
) {
4122 if (streq(verb
, "is-enabled"))
4123 return status
.si_status
== 0 ? 1 : 0;
4125 if (status
.si_status
== 0)
4128 return status
.si_status
== 0 ? 0 : -EINVAL
;
4139 log_error("Couldn't find %s.", i
->name
);
4145 if ((r
= config_parse(filename
, f
, NULL
, items
, true, i
)) < 0) {
4150 n_symlinks
+= strv_length(i
->aliases
);
4151 n_symlinks
+= strv_length(i
->wanted_by
);
4155 if ((r
= install_info_symlink_alias(verb
, i
, config_path
)) != 0)
4158 if ((r
= install_info_symlink_wants(verb
, i
, config_path
)) != 0)
4161 if ((r
= mark_symlink_for_removal(filename
)) < 0)
4164 if ((r
= remove_marked_symlinks(config_path
)) < 0)
4170 static char *get_config_path(void) {
4172 if (arg_user
&& arg_global
)
4173 return strdup(USER_CONFIG_UNIT_PATH
);
4178 if (user_config_home(&p
) < 0)
4184 return strdup(SYSTEM_CONFIG_UNIT_PATH
);
4187 static int enable_unit(DBusConnection
*bus
, char **args
, unsigned n
) {
4191 char *config_path
= NULL
;
4194 const char *verb
= args
[0];
4196 dbus_error_init(&error
);
4199 if ((r
= lookup_paths_init(&paths
, arg_user
? MANAGER_USER
: MANAGER_SYSTEM
)) < 0) {
4200 log_error("Failed to determine lookup paths: %s", strerror(-r
));
4204 if (!(config_path
= get_config_path())) {
4205 log_error("Failed to determine config path");
4210 will_install
= hashmap_new(string_hash_func
, string_compare_func
);
4211 have_installed
= hashmap_new(string_hash_func
, string_compare_func
);
4213 if (!will_install
|| !have_installed
) {
4214 log_error("Failed to allocate unit sets.");
4219 if (!arg_defaults
&& streq(verb
, "disable"))
4220 if (!(remove_symlinks_to
= set_new(string_hash_func
, string_compare_func
))) {
4221 log_error("Failed to allocate symlink sets.");
4226 for (j
= 1; j
< n
; j
++)
4227 if ((r
= install_info_add(args
[j
])) < 0) {
4228 log_warning("Cannot install unit %s: %s", args
[j
], strerror(-r
));
4234 while ((i
= hashmap_first(will_install
))) {
4237 assert_se(hashmap_move_one(have_installed
, will_install
, i
->name
) == 0);
4239 if ((q
= install_info_apply(verb
, &paths
, i
, config_path
)) != 0) {
4247 /* In test mode and found something */
4253 if (streq(verb
, "is-enabled"))
4254 r
= r
> 0 ? 0 : -ENOENT
;
4256 if (n_symlinks
<= 0)
4257 log_warning("Unit files contain no applicable installation information. Ignoring.");
4260 /* Don't try to reload anything if the user asked us to not do this */
4262 /* Don't try to reload anything when updating a unit globally */
4264 /* Don't try to reload anything if we are called for system changes but the system wasn't booted with systemd */
4265 (arg_user
|| sd_booted() > 0) &&
4266 /* Don't try to reload anything if we are running in a chroot environment */
4267 (arg_user
|| running_in_chroot() <= 0) ) {
4270 if ((q
= daemon_reload(bus
, args
, n
)) < 0)
4276 install_info_hashmap_free(will_install
);
4277 install_info_hashmap_free(have_installed
);
4279 set_free_free(remove_symlinks_to
);
4281 lookup_paths_free(&paths
);
4288 static int systemctl_help(void) {
4290 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4291 "Send control commands to or query the systemd manager.\n\n"
4292 " -h --help Show this help\n"
4293 " --version Show package version\n"
4294 " -t --type=TYPE List only units of a particular type\n"
4295 " -p --property=NAME Show only properties by this name\n"
4296 " -a --all Show all units/properties, including dead/empty ones\n"
4297 " --failed Show only failed units\n"
4298 " --full Don't ellipsize unit names on output\n"
4299 " --fail When queueing a new job, fail if conflicting jobs are\n"
4301 " --ignore-dependencies\n"
4302 " When queueing a new job, ignore all its dependencies\n"
4303 " --kill-mode=MODE How to send signal\n"
4304 " --kill-who=WHO Who to send signal to\n"
4305 " -s --signal=SIGNAL Which signal to send\n"
4306 " -H --host=[user@]host\n"
4307 " Show information for remote host\n"
4308 " -P --privileged Acquire privileges before execution\n"
4309 " -q --quiet Suppress output\n"
4310 " --no-block Do not wait until operation finished\n"
4311 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4312 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4314 " --no-pager Do not pipe output into a pager.\n"
4315 " --no-ask-password\n"
4316 " Do not ask for system passwords\n"
4317 " --order When generating graph for dot, show only order\n"
4318 " --require When generating graph for dot, show only requirement\n"
4319 " --system Connect to system manager\n"
4320 " --user Connect to user service manager\n"
4321 " --global Enable/disable unit files globally\n"
4322 " -f --force When enabling unit files, override existing symlinks\n"
4323 " When shutting down, execute action immediately\n"
4324 " --defaults When disabling unit files, remove default symlinks only\n\n"
4326 " list-units List units\n"
4327 " start [NAME...] Start (activate) one or more units\n"
4328 " stop [NAME...] Stop (deactivate) one or more units\n"
4329 " reload [NAME...] Reload one or more units\n"
4330 " restart [NAME...] Start or restart one or more units\n"
4331 " try-restart [NAME...] Restart one or more units if active\n"
4332 " reload-or-restart [NAME...] Reload one or more units is possible,\n"
4333 " otherwise start or restart\n"
4334 " reload-or-try-restart [NAME...] Reload one or more units is possible,\n"
4335 " otherwise restart if active\n"
4336 " isolate [NAME] Start one unit and stop all others\n"
4337 " kill [NAME...] Send signal to processes of a unit\n"
4338 " is-active [NAME...] Check whether units are active\n"
4339 " status [NAME...|PID...] Show runtime status of one or more units\n"
4340 " show [NAME...|JOB...] Show properties of one or more\n"
4341 " units/jobs or the manager\n"
4342 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4344 " enable [NAME...] Enable one or more unit files\n"
4345 " disable [NAME...] Disable one or more unit files\n"
4346 " is-enabled [NAME...] Check whether unit files are enabled\n"
4347 " load [NAME...] Load one or more units\n"
4348 " list-jobs List jobs\n"
4349 " cancel [JOB...] Cancel all, one, or more jobs\n"
4350 " monitor Monitor unit/job changes\n"
4351 " dump Dump server status\n"
4352 " dot Dump dependency graph for dot(1)\n"
4353 " snapshot [NAME] Create a snapshot\n"
4354 " delete [NAME...] Remove one or more snapshots\n"
4355 " daemon-reload Reload systemd manager configuration\n"
4356 " daemon-reexec Reexecute systemd manager\n"
4357 " show-environment Dump environment\n"
4358 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4359 " unset-environment [NAME...] Unset one or more environment variables\n"
4360 " default Enter system default mode\n"
4361 " rescue Enter system rescue mode\n"
4362 " emergency Enter system emergency mode\n"
4363 " halt Shut down and halt the system\n"
4364 " poweroff Shut down and power-off the system\n"
4365 " reboot Shut down and reboot the system\n"
4366 " kexec Shut down and reboot the system with kexec\n"
4367 " exit Ask for user instance termination\n",
4368 program_invocation_short_name
);
4373 static int halt_help(void) {
4375 printf("%s [OPTIONS...]\n\n"
4376 "%s the system.\n\n"
4377 " --help Show this help\n"
4378 " --halt Halt the machine\n"
4379 " -p --poweroff Switch off the machine\n"
4380 " --reboot Reboot the machine\n"
4381 " -f --force Force immediate halt/power-off/reboot\n"
4382 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4383 " -d --no-wtmp Don't write wtmp record\n"
4384 " -n --no-sync Don't sync before halt/power-off/reboot\n"
4385 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4386 program_invocation_short_name
,
4387 arg_action
== ACTION_REBOOT
? "Reboot" :
4388 arg_action
== ACTION_POWEROFF
? "Power off" :
4394 static int shutdown_help(void) {
4396 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4397 "Shut down the system.\n\n"
4398 " --help Show this help\n"
4399 " -H --halt Halt the machine\n"
4400 " -P --poweroff Power-off the machine\n"
4401 " -r --reboot Reboot the machine\n"
4402 " -h Equivalent to --poweroff, overriden by --halt\n"
4403 " -k Don't halt/power-off/reboot, just send warnings\n"
4404 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4405 " -c Cancel a pending shutdown\n",
4406 program_invocation_short_name
);
4411 static int telinit_help(void) {
4413 printf("%s [OPTIONS...] {COMMAND}\n\n"
4414 "Send control commands to the init daemon.\n\n"
4415 " --help Show this help\n"
4416 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4418 " 0 Power-off the machine\n"
4419 " 6 Reboot the machine\n"
4420 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4421 " 1, s, S Enter rescue mode\n"
4422 " q, Q Reload init daemon configuration\n"
4423 " u, U Reexecute init daemon\n",
4424 program_invocation_short_name
);
4429 static int runlevel_help(void) {
4431 printf("%s [OPTIONS...]\n\n"
4432 "Prints the previous and current runlevel of the init system.\n\n"
4433 " --help Show this help\n",
4434 program_invocation_short_name
);
4439 static int systemctl_parse_argv(int argc
, char *argv
[]) {
4443 ARG_IGNORE_DEPENDENCIES
,
4458 ARG_NO_ASK_PASSWORD
,
4462 static const struct option options
[] = {
4463 { "help", no_argument
, NULL
, 'h' },
4464 { "version", no_argument
, NULL
, ARG_VERSION
},
4465 { "type", required_argument
, NULL
, 't' },
4466 { "property", required_argument
, NULL
, 'p' },
4467 { "all", no_argument
, NULL
, 'a' },
4468 { "failed", no_argument
, NULL
, ARG_FAILED
},
4469 { "full", no_argument
, NULL
, ARG_FULL
},
4470 { "fail", no_argument
, NULL
, ARG_FAIL
},
4471 { "ignore-dependencies", no_argument
, NULL
, ARG_IGNORE_DEPENDENCIES
},
4472 { "user", no_argument
, NULL
, ARG_USER
},
4473 { "system", no_argument
, NULL
, ARG_SYSTEM
},
4474 { "global", no_argument
, NULL
, ARG_GLOBAL
},
4475 { "no-block", no_argument
, NULL
, ARG_NO_BLOCK
},
4476 { "no-pager", no_argument
, NULL
, ARG_NO_PAGER
},
4477 { "no-wall", no_argument
, NULL
, ARG_NO_WALL
},
4478 { "quiet", no_argument
, NULL
, 'q' },
4479 { "order", no_argument
, NULL
, ARG_ORDER
},
4480 { "require", no_argument
, NULL
, ARG_REQUIRE
},
4481 { "force", no_argument
, NULL
, 'f' },
4482 { "no-reload", no_argument
, NULL
, ARG_NO_RELOAD
},
4483 { "defaults", no_argument
, NULL
, ARG_DEFAULTS
},
4484 { "kill-mode", required_argument
, NULL
, ARG_KILL_MODE
},
4485 { "kill-who", required_argument
, NULL
, ARG_KILL_WHO
},
4486 { "signal", required_argument
, NULL
, 's' },
4487 { "no-ask-password", no_argument
, NULL
, ARG_NO_ASK_PASSWORD
},
4488 { "host", required_argument
, NULL
, 'H' },
4489 { "privileged",no_argument
, NULL
, 'P' },
4490 { NULL
, 0, NULL
, 0 }
4498 /* Only when running as systemctl we ask for passwords */
4499 arg_ask_password
= true;
4501 while ((c
= getopt_long(argc
, argv
, "ht:p:aqfs:H:P", options
, NULL
)) >= 0) {
4510 puts(PACKAGE_STRING
);
4512 puts(SYSTEMD_FEATURES
);
4522 if (!(l
= strv_append(arg_property
, optarg
)))
4525 strv_free(arg_property
);
4528 /* If the user asked for a particular
4529 * property, show it to him, even if it is
4540 arg_job_mode
= "fail";
4543 case ARG_IGNORE_DEPENDENCIES
:
4544 arg_job_mode
= "ignore-dependencies";
4556 arg_no_block
= true;
4560 arg_no_pager
= true;
4568 arg_dot
= DOT_ORDER
;
4572 arg_dot
= DOT_REQUIRE
;
4592 arg_no_reload
= true;
4601 arg_defaults
= true;
4605 arg_kill_who
= optarg
;
4609 arg_kill_mode
= optarg
;
4613 if ((arg_signal
= signal_from_string_try_harder(optarg
)) < 0) {
4614 log_error("Failed to parse signal string %s.", optarg
);
4619 case ARG_NO_ASK_PASSWORD
:
4620 arg_ask_password
= false;
4624 arg_transport
= TRANSPORT_POLKIT
;
4628 arg_transport
= TRANSPORT_SSH
;
4636 log_error("Unknown option code %c", c
);
4641 if (arg_transport
!= TRANSPORT_NORMAL
&& arg_user
) {
4642 log_error("Cannot access user instance remotely.");
4649 static int halt_parse_argv(int argc
, char *argv
[]) {
4658 static const struct option options
[] = {
4659 { "help", no_argument
, NULL
, ARG_HELP
},
4660 { "halt", no_argument
, NULL
, ARG_HALT
},
4661 { "poweroff", no_argument
, NULL
, 'p' },
4662 { "reboot", no_argument
, NULL
, ARG_REBOOT
},
4663 { "force", no_argument
, NULL
, 'f' },
4664 { "wtmp-only", no_argument
, NULL
, 'w' },
4665 { "no-wtmp", no_argument
, NULL
, 'd' },
4666 { "no-sync", no_argument
, NULL
, 'n' },
4667 { "no-wall", no_argument
, NULL
, ARG_NO_WALL
},
4668 { NULL
, 0, NULL
, 0 }
4676 if (utmp_get_runlevel(&runlevel
, NULL
) >= 0)
4677 if (runlevel
== '0' || runlevel
== '6')
4678 arg_immediate
= true;
4680 while ((c
= getopt_long(argc
, argv
, "pfwdnih", options
, NULL
)) >= 0) {
4688 arg_action
= ACTION_HALT
;
4692 if (arg_action
!= ACTION_REBOOT
)
4693 arg_action
= ACTION_POWEROFF
;
4697 arg_action
= ACTION_REBOOT
;
4701 arg_immediate
= true;
4722 /* Compatibility nops */
4729 log_error("Unknown option code %c", c
);
4734 if (optind
< argc
) {
4735 log_error("Too many arguments.");
4742 static int parse_time_spec(const char *t
, usec_t
*_u
) {
4746 if (streq(t
, "now"))
4748 else if (t
[0] == '+') {
4751 if (safe_atou64(t
+ 1, &u
) < 0)
4754 *_u
= now(CLOCK_REALTIME
) + USEC_PER_MINUTE
* u
;
4763 hour
= strtol(t
, &e
, 10);
4764 if (errno
!= 0 || *e
!= ':' || hour
< 0 || hour
> 23)
4767 minute
= strtol(e
+1, &e
, 10);
4768 if (errno
!= 0 || *e
!= 0 || minute
< 0 || minute
> 59)
4771 n
= now(CLOCK_REALTIME
);
4772 s
= (time_t) (n
/ USEC_PER_SEC
);
4775 assert_se(localtime_r(&s
, &tm
));
4777 tm
.tm_hour
= (int) hour
;
4778 tm
.tm_min
= (int) minute
;
4781 assert_se(s
= mktime(&tm
));
4783 *_u
= (usec_t
) s
* USEC_PER_SEC
;
4786 *_u
+= USEC_PER_DAY
;
4792 static bool kexec_loaded(void) {
4793 bool loaded
= false;
4796 if (read_one_line_file("/sys/kernel/kexec_loaded", &s
) >= 0) {
4804 static int shutdown_parse_argv(int argc
, char *argv
[]) {
4811 static const struct option options
[] = {
4812 { "help", no_argument
, NULL
, ARG_HELP
},
4813 { "halt", no_argument
, NULL
, 'H' },
4814 { "poweroff", no_argument
, NULL
, 'P' },
4815 { "reboot", no_argument
, NULL
, 'r' },
4816 { "no-wall", no_argument
, NULL
, ARG_NO_WALL
},
4817 { NULL
, 0, NULL
, 0 }
4825 while ((c
= getopt_long(argc
, argv
, "HPrhkt:afFc", options
, NULL
)) >= 0) {
4833 arg_action
= ACTION_HALT
;
4837 arg_action
= ACTION_POWEROFF
;
4842 arg_action
= ACTION_KEXEC
;
4844 arg_action
= ACTION_REBOOT
;
4848 if (arg_action
!= ACTION_HALT
)
4849 arg_action
= ACTION_POWEROFF
;
4862 /* Compatibility nops */
4866 arg_action
= ACTION_CANCEL_SHUTDOWN
;
4873 log_error("Unknown option code %c", c
);
4878 if (argc
> optind
) {
4879 if ((r
= parse_time_spec(argv
[optind
], &arg_when
)) < 0) {
4880 log_error("Failed to parse time specification: %s", argv
[optind
]);
4884 arg_when
= now(CLOCK_REALTIME
) + USEC_PER_MINUTE
;
4886 /* We skip the time argument */
4887 if (argc
> optind
+ 1)
4888 arg_wall
= argv
+ optind
+ 1;
4895 static int telinit_parse_argv(int argc
, char *argv
[]) {
4902 static const struct option options
[] = {
4903 { "help", no_argument
, NULL
, ARG_HELP
},
4904 { "no-wall", no_argument
, NULL
, ARG_NO_WALL
},
4905 { NULL
, 0, NULL
, 0 }
4908 static const struct {
4912 { '0', ACTION_POWEROFF
},
4913 { '6', ACTION_REBOOT
},
4914 { '1', ACTION_RESCUE
},
4915 { '2', ACTION_RUNLEVEL2
},
4916 { '3', ACTION_RUNLEVEL3
},
4917 { '4', ACTION_RUNLEVEL4
},
4918 { '5', ACTION_RUNLEVEL5
},
4919 { 's', ACTION_RESCUE
},
4920 { 'S', ACTION_RESCUE
},
4921 { 'q', ACTION_RELOAD
},
4922 { 'Q', ACTION_RELOAD
},
4923 { 'u', ACTION_REEXEC
},
4924 { 'U', ACTION_REEXEC
}
4933 while ((c
= getopt_long(argc
, argv
, "", options
, NULL
)) >= 0) {
4948 log_error("Unknown option code %c", c
);
4953 if (optind
>= argc
) {
4958 if (optind
+ 1 < argc
) {
4959 log_error("Too many arguments.");
4963 if (strlen(argv
[optind
]) != 1) {
4964 log_error("Expected single character argument.");
4968 for (i
= 0; i
< ELEMENTSOF(table
); i
++)
4969 if (table
[i
].from
== argv
[optind
][0])
4972 if (i
>= ELEMENTSOF(table
)) {
4973 log_error("Unknown command %s.", argv
[optind
]);
4977 arg_action
= table
[i
].to
;
4984 static int runlevel_parse_argv(int argc
, char *argv
[]) {
4990 static const struct option options
[] = {
4991 { "help", no_argument
, NULL
, ARG_HELP
},
4992 { NULL
, 0, NULL
, 0 }
5000 while ((c
= getopt_long(argc
, argv
, "", options
, NULL
)) >= 0) {
5011 log_error("Unknown option code %c", c
);
5016 if (optind
< argc
) {
5017 log_error("Too many arguments.");
5024 static int parse_argv(int argc
, char *argv
[]) {
5028 if (program_invocation_short_name
) {
5030 if (strstr(program_invocation_short_name
, "halt")) {
5031 arg_action
= ACTION_HALT
;
5032 return halt_parse_argv(argc
, argv
);
5033 } else if (strstr(program_invocation_short_name
, "poweroff")) {
5034 arg_action
= ACTION_POWEROFF
;
5035 return halt_parse_argv(argc
, argv
);
5036 } else if (strstr(program_invocation_short_name
, "reboot")) {
5038 arg_action
= ACTION_KEXEC
;
5040 arg_action
= ACTION_REBOOT
;
5041 return halt_parse_argv(argc
, argv
);
5042 } else if (strstr(program_invocation_short_name
, "shutdown")) {
5043 arg_action
= ACTION_POWEROFF
;
5044 return shutdown_parse_argv(argc
, argv
);
5045 } else if (strstr(program_invocation_short_name
, "init")) {
5047 if (sd_booted() > 0) {
5048 arg_action
= ACTION_INVALID
;
5049 return telinit_parse_argv(argc
, argv
);
5051 /* Hmm, so some other init system is
5052 * running, we need to forward this
5053 * request to it. For now we simply
5054 * guess that it is Upstart. */
5056 execv("/lib/upstart/telinit", argv
);
5058 log_error("Couldn't find an alternative telinit implementation to spawn.");
5062 } else if (strstr(program_invocation_short_name
, "runlevel")) {
5063 arg_action
= ACTION_RUNLEVEL
;
5064 return runlevel_parse_argv(argc
, argv
);
5068 arg_action
= ACTION_SYSTEMCTL
;
5069 return systemctl_parse_argv(argc
, argv
);
5072 static int action_to_runlevel(void) {
5074 static const char table
[_ACTION_MAX
] = {
5075 [ACTION_HALT
] = '0',
5076 [ACTION_POWEROFF
] = '0',
5077 [ACTION_REBOOT
] = '6',
5078 [ACTION_RUNLEVEL2
] = '2',
5079 [ACTION_RUNLEVEL3
] = '3',
5080 [ACTION_RUNLEVEL4
] = '4',
5081 [ACTION_RUNLEVEL5
] = '5',
5082 [ACTION_RESCUE
] = '1'
5085 assert(arg_action
< _ACTION_MAX
);
5087 return table
[arg_action
];
5090 static int talk_upstart(void) {
5091 DBusMessage
*m
= NULL
, *reply
= NULL
;
5093 int previous
, rl
, r
;
5095 env1_buf
[] = "RUNLEVEL=X",
5096 env2_buf
[] = "PREVLEVEL=X";
5097 char *env1
= env1_buf
, *env2
= env2_buf
;
5098 const char *emit
= "runlevel";
5099 dbus_bool_t b_false
= FALSE
;
5100 DBusMessageIter iter
, sub
;
5101 DBusConnection
*bus
;
5103 dbus_error_init(&error
);
5105 if (!(rl
= action_to_runlevel()))
5108 if (utmp_get_runlevel(&previous
, NULL
) < 0)
5111 if (!(bus
= dbus_connection_open_private("unix:abstract=/com/ubuntu/upstart", &error
))) {
5112 if (dbus_error_has_name(&error
, DBUS_ERROR_NO_SERVER
)) {
5117 log_error("Failed to connect to Upstart bus: %s", bus_error_message(&error
));
5122 if ((r
= bus_check_peercred(bus
)) < 0) {
5123 log_error("Failed to verify owner of bus.");
5127 if (!(m
= dbus_message_new_method_call(
5128 "com.ubuntu.Upstart",
5129 "/com/ubuntu/Upstart",
5130 "com.ubuntu.Upstart0_6",
5133 log_error("Could not allocate message.");
5138 dbus_message_iter_init_append(m
, &iter
);
5140 env1_buf
[sizeof(env1_buf
)-2] = rl
;
5141 env2_buf
[sizeof(env2_buf
)-2] = previous
;
5143 if (!dbus_message_iter_append_basic(&iter
, DBUS_TYPE_STRING
, &emit
) ||
5144 !dbus_message_iter_open_container(&iter
, DBUS_TYPE_ARRAY
, "s", &sub
) ||
5145 !dbus_message_iter_append_basic(&sub
, DBUS_TYPE_STRING
, &env1
) ||
5146 !dbus_message_iter_append_basic(&sub
, DBUS_TYPE_STRING
, &env2
) ||
5147 !dbus_message_iter_close_container(&iter
, &sub
) ||
5148 !dbus_message_iter_append_basic(&iter
, DBUS_TYPE_BOOLEAN
, &b_false
)) {
5149 log_error("Could not append arguments to message.");
5154 if (!(reply
= dbus_connection_send_with_reply_and_block(bus
, m
, -1, &error
))) {
5156 if (error_is_no_service(&error
)) {
5161 log_error("Failed to issue method call: %s", bus_error_message(&error
));
5170 dbus_message_unref(m
);
5173 dbus_message_unref(reply
);
5176 dbus_connection_flush(bus
);
5177 dbus_connection_close(bus
);
5178 dbus_connection_unref(bus
);
5181 dbus_error_free(&error
);
5186 static int talk_initctl(void) {
5187 struct init_request request
;
5191 if (!(rl
= action_to_runlevel()))
5195 request
.magic
= INIT_MAGIC
;
5196 request
.sleeptime
= 0;
5197 request
.cmd
= INIT_CMD_RUNLVL
;
5198 request
.runlevel
= rl
;
5200 if ((fd
= open(INIT_FIFO
, O_WRONLY
|O_NDELAY
|O_CLOEXEC
|O_NOCTTY
)) < 0) {
5202 if (errno
== ENOENT
)
5205 log_error("Failed to open "INIT_FIFO
": %m");
5210 r
= loop_write(fd
, &request
, sizeof(request
), false) != sizeof(request
);
5211 close_nointr_nofail(fd
);
5214 log_error("Failed to write to "INIT_FIFO
": %m");
5215 return errno
? -errno
: -EIO
;
5221 static int systemctl_main(DBusConnection
*bus
, int argc
, char *argv
[], DBusError
*error
) {
5223 static const struct {
5231 int (* const dispatch
)(DBusConnection
*bus
, char **args
, unsigned n
);
5233 { "list-units", LESS
, 1, list_units
},
5234 { "list-jobs", EQUAL
, 1, list_jobs
},
5235 { "clear-jobs", EQUAL
, 1, daemon_reload
},
5236 { "load", MORE
, 2, load_unit
},
5237 { "cancel", MORE
, 2, cancel_job
},
5238 { "start", MORE
, 2, start_unit
},
5239 { "stop", MORE
, 2, start_unit
},
5240 { "condstop", MORE
, 2, start_unit
}, /* For compatibility with ALTLinux */
5241 { "reload", MORE
, 2, start_unit
},
5242 { "restart", MORE
, 2, start_unit
},
5243 { "try-restart", MORE
, 2, start_unit
},
5244 { "reload-or-restart", MORE
, 2, start_unit
},
5245 { "reload-or-try-restart", MORE
, 2, start_unit
},
5246 { "force-reload", MORE
, 2, start_unit
}, /* For compatibility with SysV */
5247 { "condreload", MORE
, 2, start_unit
}, /* For compatibility with ALTLinux */
5248 { "condrestart", MORE
, 2, start_unit
}, /* For compatibility with RH */
5249 { "isolate", EQUAL
, 2, start_unit
},
5250 { "kill", MORE
, 2, kill_unit
},
5251 { "is-active", MORE
, 2, check_unit
},
5252 { "check", MORE
, 2, check_unit
},
5253 { "show", MORE
, 1, show
},
5254 { "status", MORE
, 2, show
},
5255 { "monitor", EQUAL
, 1, monitor
},
5256 { "dump", EQUAL
, 1, dump
},
5257 { "dot", EQUAL
, 1, dot
},
5258 { "snapshot", LESS
, 2, snapshot
},
5259 { "delete", MORE
, 2, delete_snapshot
},
5260 { "daemon-reload", EQUAL
, 1, daemon_reload
},
5261 { "daemon-reexec", EQUAL
, 1, daemon_reload
},
5262 { "show-environment", EQUAL
, 1, show_enviroment
},
5263 { "set-environment", MORE
, 2, set_environment
},
5264 { "unset-environment", MORE
, 2, set_environment
},
5265 { "halt", EQUAL
, 1, start_special
},
5266 { "poweroff", EQUAL
, 1, start_special
},
5267 { "reboot", EQUAL
, 1, start_special
},
5268 { "kexec", EQUAL
, 1, start_special
},
5269 { "default", EQUAL
, 1, start_special
},
5270 { "rescue", EQUAL
, 1, start_special
},
5271 { "emergency", EQUAL
, 1, start_special
},
5272 { "exit", EQUAL
, 1, start_special
},
5273 { "reset-failed", MORE
, 1, reset_failed
},
5274 { "enable", MORE
, 2, enable_unit
},
5275 { "disable", MORE
, 2, enable_unit
},
5276 { "is-enabled", MORE
, 2, enable_unit
}
5286 left
= argc
- optind
;
5289 /* Special rule: no arguments means "list-units" */
5292 if (streq(argv
[optind
], "help")) {
5297 for (i
= 0; i
< ELEMENTSOF(verbs
); i
++)
5298 if (streq(argv
[optind
], verbs
[i
].verb
))
5301 if (i
>= ELEMENTSOF(verbs
)) {
5302 log_error("Unknown operation %s", argv
[optind
]);
5307 switch (verbs
[i
].argc_cmp
) {
5310 if (left
!= verbs
[i
].argc
) {
5311 log_error("Invalid number of arguments.");
5318 if (left
< verbs
[i
].argc
) {
5319 log_error("Too few arguments.");
5326 if (left
> verbs
[i
].argc
) {
5327 log_error("Too many arguments.");
5334 assert_not_reached("Unknown comparison operator.");
5337 /* Require a bus connection for all operations but
5339 if (!streq(verbs
[i
].verb
, "enable") &&
5340 !streq(verbs
[i
].verb
, "disable") &&
5342 log_error("Failed to get D-Bus connection: %s", error
->message
);
5346 return verbs
[i
].dispatch(bus
, argv
+ optind
, left
);
5349 static int send_shutdownd(usec_t t
, char mode
, bool warn
, const char *message
) {
5351 struct msghdr msghdr
;
5353 union sockaddr_union sockaddr
;
5354 struct shutdownd_command c
;
5362 strncpy(c
.wall_message
, message
, sizeof(c
.wall_message
));
5364 if ((fd
= socket(AF_UNIX
, SOCK_DGRAM
|SOCK_CLOEXEC
, 0)) < 0)
5368 sockaddr
.sa
.sa_family
= AF_UNIX
;
5369 sockaddr
.un
.sun_path
[0] = 0;
5370 strncpy(sockaddr
.un
.sun_path
, "/run/systemd/shutdownd", sizeof(sockaddr
.un
.sun_path
));
5373 iovec
.iov_base
= (char*) &c
;
5374 iovec
.iov_len
= sizeof(c
);
5377 msghdr
.msg_name
= &sockaddr
;
5378 msghdr
.msg_namelen
= offsetof(struct sockaddr_un
, sun_path
) + sizeof("/run/systemd/shutdownd") - 1;
5380 msghdr
.msg_iov
= &iovec
;
5381 msghdr
.msg_iovlen
= 1;
5383 if (sendmsg(fd
, &msghdr
, MSG_NOSIGNAL
) < 0) {
5384 close_nointr_nofail(fd
);
5388 close_nointr_nofail(fd
);
5392 static int reload_with_fallback(DBusConnection
*bus
) {
5395 /* First, try systemd via D-Bus. */
5396 if (daemon_reload(bus
, NULL
, 0) > 0)
5400 /* Nothing else worked, so let's try signals */
5401 assert(arg_action
== ACTION_RELOAD
|| arg_action
== ACTION_REEXEC
);
5403 if (kill(1, arg_action
== ACTION_RELOAD
? SIGHUP
: SIGTERM
) < 0) {
5404 log_error("kill() failed: %m");
5411 static int start_with_fallback(DBusConnection
*bus
) {
5414 /* First, try systemd via D-Bus. */
5415 if (start_unit(bus
, NULL
, 0) >= 0)
5419 /* Hmm, talking to systemd via D-Bus didn't work. Then
5420 * let's try to talk to Upstart via D-Bus. */
5421 if (talk_upstart() > 0)
5424 /* Nothing else worked, so let's try
5426 if (talk_initctl() > 0)
5429 log_error("Failed to talk to init daemon.");
5433 warn_wall(arg_action
);
5437 static int halt_main(DBusConnection
*bus
) {
5440 if (geteuid() != 0) {
5441 log_error("Must be root.");
5447 char date
[FORMAT_TIMESTAMP_MAX
];
5449 m
= strv_join(arg_wall
, " ");
5450 r
= send_shutdownd(arg_when
,
5451 arg_action
== ACTION_HALT
? 'H' :
5452 arg_action
== ACTION_POWEROFF
? 'P' :
5459 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r
));
5461 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
5462 format_timestamp(date
, sizeof(date
), arg_when
));
5467 if (!arg_dry
&& !arg_immediate
)
5468 return start_with_fallback(bus
);
5471 if (sd_booted() > 0)
5472 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
5473 else if ((r
= utmp_put_shutdown(0)) < 0)
5474 log_warning("Failed to write utmp record: %s", strerror(-r
));
5483 /* Make sure C-A-D is handled by the kernel from this
5485 reboot(RB_ENABLE_CAD
);
5487 switch (arg_action
) {
5490 log_info("Halting.");
5491 reboot(RB_HALT_SYSTEM
);
5494 case ACTION_POWEROFF
:
5495 log_info("Powering off.");
5496 reboot(RB_POWER_OFF
);
5500 log_info("Rebooting.");
5501 reboot(RB_AUTOBOOT
);
5505 assert_not_reached("Unknown halt action.");
5508 /* We should never reach this. */
5512 static int runlevel_main(void) {
5513 int r
, runlevel
, previous
;
5515 if ((r
= utmp_get_runlevel(&runlevel
, &previous
)) < 0) {
5516 printf("unknown\n");
5521 previous
<= 0 ? 'N' : previous
,
5522 runlevel
<= 0 ? 'N' : runlevel
);
5527 static void pager_open(void) {
5535 if (!on_tty() || arg_no_pager
)
5538 if ((pager
= getenv("PAGER")))
5539 if (!*pager
|| streq(pager
, "cat"))
5542 /* Determine and cache number of columns before we spawn the
5543 * pager so that we get the value from the actual tty */
5547 log_error("Failed to create pager pipe: %m");
5551 parent_pid
= getpid();
5554 if (pager_pid
< 0) {
5555 log_error("Failed to fork pager: %m");
5560 /* In the child start the pager */
5561 if (pager_pid
== 0) {
5563 dup2(fd
[0], STDIN_FILENO
);
5566 setenv("LESS", "FRSX", 0);
5568 /* Make sure the pager goes away when the parent dies */
5569 if (prctl(PR_SET_PDEATHSIG
, SIGTERM
) < 0)
5570 _exit(EXIT_FAILURE
);
5572 /* Check whether our parent died before we were able
5573 * to set the death signal */
5574 if (getppid() != parent_pid
)
5575 _exit(EXIT_SUCCESS
);
5578 execlp(pager
, pager
, NULL
);
5579 execl("/bin/sh", "sh", "-c", pager
, NULL
);
5581 /* Debian's alternatives command for pagers is
5582 * called 'pager'. Note that we do not call
5583 * sensible-pagers here, since that is just a
5584 * shell script that implements a logic that
5585 * is similar to this one anyway, but is
5586 * Debian-specific. */
5587 execlp("pager", "pager", NULL
);
5589 execlp("less", "less", NULL
);
5590 execlp("more", "more", NULL
);
5593 log_error("Unable to execute pager: %m");
5594 _exit(EXIT_FAILURE
);
5597 /* Return in the parent */
5598 if (dup2(fd
[1], STDOUT_FILENO
) < 0)
5599 log_error("Failed to duplicate pager pipe: %m");
5604 static void pager_close(void) {
5610 /* Inform pager that we are done */
5612 kill(pager_pid
, SIGCONT
);
5613 wait_for_terminate(pager_pid
, &dummy
);
5617 static void agent_close(void) {
5623 /* Inform agent that we are done */
5624 kill(agent_pid
, SIGTERM
);
5625 kill(agent_pid
, SIGCONT
);
5626 wait_for_terminate(agent_pid
, &dummy
);
5630 int main(int argc
, char*argv
[]) {
5631 int r
, retval
= EXIT_FAILURE
;
5632 DBusConnection
*bus
= NULL
;
5635 dbus_error_init(&error
);
5637 log_parse_environment();
5640 if ((r
= parse_argv(argc
, argv
)) < 0)
5643 retval
= EXIT_SUCCESS
;
5647 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
5648 * let's shortcut this */
5649 if (arg_action
== ACTION_RUNLEVEL
) {
5650 r
= runlevel_main();
5651 retval
= r
< 0 ? EXIT_FAILURE
: r
;
5655 if (arg_transport
== TRANSPORT_NORMAL
)
5656 bus_connect(arg_user
? DBUS_BUS_SESSION
: DBUS_BUS_SYSTEM
, &bus
, &private_bus
, &error
);
5657 else if (arg_transport
== TRANSPORT_POLKIT
) {
5658 bus_connect_system_polkit(&bus
, &error
);
5659 private_bus
= false;
5660 } else if (arg_transport
== TRANSPORT_SSH
) {
5661 bus_connect_system_ssh(NULL
, arg_host
, &bus
, &error
);
5662 private_bus
= false;
5664 assert_not_reached("Uh, invalid transport...");
5666 switch (arg_action
) {
5668 case ACTION_SYSTEMCTL
:
5669 r
= systemctl_main(bus
, argc
, argv
, &error
);
5673 case ACTION_POWEROFF
:
5679 case ACTION_RUNLEVEL2
:
5680 case ACTION_RUNLEVEL3
:
5681 case ACTION_RUNLEVEL4
:
5682 case ACTION_RUNLEVEL5
:
5684 case ACTION_EMERGENCY
:
5685 case ACTION_DEFAULT
:
5686 r
= start_with_fallback(bus
);
5691 r
= reload_with_fallback(bus
);
5694 case ACTION_CANCEL_SHUTDOWN
:
5695 r
= send_shutdownd(0, 0, false, NULL
);
5698 case ACTION_INVALID
:
5699 case ACTION_RUNLEVEL
:
5701 assert_not_reached("Unknown action");
5704 retval
= r
< 0 ? EXIT_FAILURE
: r
;
5709 dbus_connection_flush(bus
);
5710 dbus_connection_close(bus
);
5711 dbus_connection_unref(bus
);
5714 dbus_error_free(&error
);
5718 strv_free(arg_property
);