]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/systemctl.c
udev: tty - re-add accidentially removed hvc* match
[thirdparty/systemd.git] / src / systemctl.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <sys/reboot.h>
23 #include <stdio.h>
24 #include <getopt.h>
25 #include <stdbool.h>
26 #include <string.h>
27 #include <errno.h>
28 #include <sys/ioctl.h>
29 #include <termios.h>
30 #include <unistd.h>
31 #include <fcntl.h>
32 #include <sys/socket.h>
33 #include <sys/stat.h>
34 #include <stddef.h>
35 #include <sys/prctl.h>
36
37 #include <dbus/dbus.h>
38
39 #include "log.h"
40 #include "util.h"
41 #include "macro.h"
42 #include "set.h"
43 #include "utmp-wtmp.h"
44 #include "special.h"
45 #include "initreq.h"
46 #include "strv.h"
47 #include "dbus-common.h"
48 #include "cgroup-show.h"
49 #include "cgroup-util.h"
50 #include "list.h"
51 #include "path-lookup.h"
52 #include "conf-parser.h"
53 #include "sd-daemon.h"
54 #include "shutdownd.h"
55 #include "exit-status.h"
56 #include "bus-errors.h"
57 #include "build.h"
58 #include "unit-name.h"
59
60 static const char *arg_type = NULL;
61 static char **arg_property = NULL;
62 static bool arg_all = false;
63 static const char *arg_job_mode = "replace";
64 static bool arg_user = false;
65 static bool arg_global = false;
66 static bool arg_immediate = false;
67 static bool arg_no_block = false;
68 static bool arg_no_pager = false;
69 static bool arg_no_wtmp = false;
70 static bool arg_no_sync = false;
71 static bool arg_no_wall = false;
72 static bool arg_no_reload = false;
73 static bool arg_dry = false;
74 static bool arg_quiet = false;
75 static bool arg_full = false;
76 static bool arg_force = false;
77 static bool arg_defaults = false;
78 static bool arg_ask_password = false;
79 static bool arg_failed = false;
80 static char **arg_wall = NULL;
81 static const char *arg_kill_who = NULL;
82 static const char *arg_kill_mode = NULL;
83 static int arg_signal = SIGTERM;
84 static usec_t arg_when = 0;
85 static enum action {
86 ACTION_INVALID,
87 ACTION_SYSTEMCTL,
88 ACTION_HALT,
89 ACTION_POWEROFF,
90 ACTION_REBOOT,
91 ACTION_KEXEC,
92 ACTION_EXIT,
93 ACTION_RUNLEVEL2,
94 ACTION_RUNLEVEL3,
95 ACTION_RUNLEVEL4,
96 ACTION_RUNLEVEL5,
97 ACTION_RESCUE,
98 ACTION_EMERGENCY,
99 ACTION_DEFAULT,
100 ACTION_RELOAD,
101 ACTION_REEXEC,
102 ACTION_RUNLEVEL,
103 ACTION_CANCEL_SHUTDOWN,
104 _ACTION_MAX
105 } arg_action = ACTION_SYSTEMCTL;
106 static enum dot {
107 DOT_ALL,
108 DOT_ORDER,
109 DOT_REQUIRE
110 } arg_dot = DOT_ALL;
111 static enum transport {
112 TRANSPORT_NORMAL,
113 TRANSPORT_SSH,
114 TRANSPORT_POLKIT
115 } arg_transport = TRANSPORT_NORMAL;
116 static const char *arg_host = NULL;
117
118 static bool private_bus = false;
119
120 static pid_t pager_pid = 0;
121 static pid_t agent_pid = 0;
122
123 static int daemon_reload(DBusConnection *bus, char **args, unsigned n);
124 static void pager_open(void);
125
126 static bool on_tty(void) {
127 static int t = -1;
128
129 /* Note that this is invoked relatively early, before we start
130 * the pager. That means the value we return reflects whether
131 * we originally were started on a tty, not if we currently
132 * are. But this is intended, since we want colour and so on
133 * when run in our own pager. */
134
135 if (_unlikely_(t < 0))
136 t = isatty(STDOUT_FILENO) > 0;
137
138 return t;
139 }
140
141 static void spawn_ask_password_agent(void) {
142 pid_t parent;
143
144 if (agent_pid > 0)
145 return;
146
147 /* We check STDIN here, not STDOUT, since this is about input,
148 * not output */
149 if (!isatty(STDIN_FILENO))
150 return;
151
152 if (!arg_ask_password)
153 return;
154
155 if (arg_user)
156 return;
157
158 parent = getpid();
159
160 /* Spawns a temporary TTY agent, making sure it goes away when
161 * we go away */
162
163 if ((agent_pid = fork()) < 0)
164 return;
165
166 if (agent_pid == 0) {
167 /* In the child */
168
169 int fd;
170 bool stdout_is_tty, stderr_is_tty;
171
172 /* Make sure the agent goes away when the parent dies */
173 if (prctl(PR_SET_PDEATHSIG, SIGTERM) < 0)
174 _exit(EXIT_FAILURE);
175
176 /* Check whether our parent died before we were able
177 * to set the death signal */
178 if (getppid() != parent)
179 _exit(EXIT_SUCCESS);
180
181 /* Don't leak fds to the agent */
182 close_all_fds(NULL, 0);
183
184 stdout_is_tty = isatty(STDOUT_FILENO);
185 stderr_is_tty = isatty(STDERR_FILENO);
186
187 if (!stdout_is_tty || !stderr_is_tty) {
188 /* Detach from stdout/stderr. and reopen
189 * /dev/tty for them. This is important to
190 * ensure that when systemctl is started via
191 * popen() or a similar call that expects to
192 * read EOF we actually do generate EOF and
193 * not delay this indefinitely by because we
194 * keep an unused copy of stdin around. */
195 if ((fd = open("/dev/tty", O_WRONLY)) < 0) {
196 log_error("Failed to open /dev/tty: %m");
197 _exit(EXIT_FAILURE);
198 }
199
200 if (!stdout_is_tty)
201 dup2(fd, STDOUT_FILENO);
202
203 if (!stderr_is_tty)
204 dup2(fd, STDERR_FILENO);
205
206 if (fd > 2)
207 close(fd);
208 }
209
210 execl(SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH, SYSTEMD_TTY_ASK_PASSWORD_AGENT_BINARY_PATH, "--watch", NULL);
211
212 log_error("Unable to execute agent: %m");
213 _exit(EXIT_FAILURE);
214 }
215 }
216
217 static const char *ansi_highlight(bool b) {
218
219 if (!on_tty())
220 return "";
221
222 return b ? ANSI_HIGHLIGHT_ON : ANSI_HIGHLIGHT_OFF;
223 }
224
225 static const char *ansi_highlight_green(bool b) {
226
227 if (!on_tty())
228 return "";
229
230 return b ? ANSI_HIGHLIGHT_GREEN_ON : ANSI_HIGHLIGHT_OFF;
231 }
232
233 static bool error_is_no_service(const DBusError *error) {
234 assert(error);
235
236 if (!dbus_error_is_set(error))
237 return false;
238
239 if (dbus_error_has_name(error, DBUS_ERROR_NAME_HAS_NO_OWNER))
240 return true;
241
242 if (dbus_error_has_name(error, DBUS_ERROR_SERVICE_UNKNOWN))
243 return true;
244
245 return startswith(error->name, "org.freedesktop.DBus.Error.Spawn.");
246 }
247
248 static int translate_bus_error_to_exit_status(int r, const DBusError *error) {
249 assert(error);
250
251 if (!dbus_error_is_set(error))
252 return r;
253
254 if (dbus_error_has_name(error, DBUS_ERROR_ACCESS_DENIED) ||
255 dbus_error_has_name(error, BUS_ERROR_ONLY_BY_DEPENDENCY) ||
256 dbus_error_has_name(error, BUS_ERROR_NO_ISOLATION) ||
257 dbus_error_has_name(error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE))
258 return EXIT_NOPERMISSION;
259
260 if (dbus_error_has_name(error, BUS_ERROR_NO_SUCH_UNIT))
261 return EXIT_NOTINSTALLED;
262
263 if (dbus_error_has_name(error, BUS_ERROR_JOB_TYPE_NOT_APPLICABLE) ||
264 dbus_error_has_name(error, BUS_ERROR_NOT_SUPPORTED))
265 return EXIT_NOTIMPLEMENTED;
266
267 if (dbus_error_has_name(error, BUS_ERROR_LOAD_FAILED))
268 return EXIT_NOTCONFIGURED;
269
270 if (r != 0)
271 return r;
272
273 return EXIT_FAILURE;
274 }
275
276 static int bus_iter_get_basic_and_next(DBusMessageIter *iter, int type, void *data, bool next) {
277
278 assert(iter);
279 assert(data);
280
281 if (dbus_message_iter_get_arg_type(iter) != type)
282 return -EIO;
283
284 dbus_message_iter_get_basic(iter, data);
285
286 if (!dbus_message_iter_next(iter) != !next)
287 return -EIO;
288
289 return 0;
290 }
291
292 static void warn_wall(enum action action) {
293 static const char *table[_ACTION_MAX] = {
294 [ACTION_HALT] = "The system is going down for system halt NOW!",
295 [ACTION_REBOOT] = "The system is going down for reboot NOW!",
296 [ACTION_POWEROFF] = "The system is going down for power-off NOW!",
297 [ACTION_KEXEC] = "The system is going down for kexec reboot NOW!",
298 [ACTION_RESCUE] = "The system is going down to rescue mode NOW!",
299 [ACTION_EMERGENCY] = "The system is going down to emergency mode NOW!"
300 };
301
302 if (arg_no_wall)
303 return;
304
305 if (arg_wall) {
306 char *p;
307
308 if (!(p = strv_join(arg_wall, " "))) {
309 log_error("Failed to join strings.");
310 return;
311 }
312
313 if (*p) {
314 utmp_wall(p, NULL);
315 free(p);
316 return;
317 }
318
319 free(p);
320 }
321
322 if (!table[action])
323 return;
324
325 utmp_wall(table[action], NULL);
326 }
327
328 struct unit_info {
329 const char *id;
330 const char *description;
331 const char *load_state;
332 const char *active_state;
333 const char *sub_state;
334 const char *following;
335 const char *unit_path;
336 uint32_t job_id;
337 const char *job_type;
338 const char *job_path;
339 };
340
341 static int compare_unit_info(const void *a, const void *b) {
342 const char *d1, *d2;
343 const struct unit_info *u = a, *v = b;
344
345 d1 = strrchr(u->id, '.');
346 d2 = strrchr(v->id, '.');
347
348 if (d1 && d2) {
349 int r;
350
351 if ((r = strcasecmp(d1, d2)) != 0)
352 return r;
353 }
354
355 return strcasecmp(u->id, v->id);
356 }
357
358 static bool output_show_unit(const struct unit_info *u) {
359 const char *dot;
360
361 if (arg_failed)
362 return streq(u->active_state, "failed");
363
364 return (!arg_type || ((dot = strrchr(u->id, '.')) &&
365 streq(dot+1, arg_type))) &&
366 (arg_all || !(streq(u->active_state, "inactive") || u->following[0]) || u->job_id > 0);
367 }
368
369 static void output_units_list(const struct unit_info *unit_infos, unsigned c) {
370 unsigned active_len, sub_len, job_len, n_shown = 0;
371 const struct unit_info *u;
372
373 active_len = sizeof("ACTIVE")-1;
374 sub_len = sizeof("SUB")-1;
375 job_len = sizeof("JOB")-1;
376
377 for (u = unit_infos; u < unit_infos + c; u++) {
378 if (!output_show_unit(u))
379 continue;
380
381 active_len = MAX(active_len, strlen(u->active_state));
382 sub_len = MAX(sub_len, strlen(u->sub_state));
383 if (u->job_id != 0)
384 job_len = MAX(job_len, strlen(u->job_type));
385 }
386
387 if (on_tty()) {
388 printf("%-25s %-6s %-*s %-*s %-*s", "UNIT", "LOAD",
389 active_len, "ACTIVE", sub_len, "SUB", job_len, "JOB");
390 if (columns() >= 80+12 || arg_full)
391 printf(" %s\n", "DESCRIPTION");
392 else
393 printf("\n");
394 }
395
396 for (u = unit_infos; u < unit_infos + c; u++) {
397 char *e;
398 int a = 0, b = 0;
399 const char *on_loaded, *off_loaded;
400 const char *on_active, *off_active;
401
402 if (!output_show_unit(u))
403 continue;
404
405 n_shown++;
406
407 if (!streq(u->load_state, "loaded") &&
408 !streq(u->load_state, "banned")) {
409 on_loaded = ansi_highlight(true);
410 off_loaded = ansi_highlight(false);
411 } else
412 on_loaded = off_loaded = "";
413
414 if (streq(u->active_state, "failed")) {
415 on_active = ansi_highlight(true);
416 off_active = ansi_highlight(false);
417 } else
418 on_active = off_active = "";
419
420 e = arg_full ? NULL : ellipsize(u->id, 25, 33);
421
422 printf("%-25s %s%-6s%s %s%-*s %-*s%s%n",
423 e ? e : u->id,
424 on_loaded, u->load_state, off_loaded,
425 on_active, active_len, u->active_state,
426 sub_len, u->sub_state, off_active,
427 &a);
428
429 free(e);
430
431 a -= strlen(on_loaded) + strlen(off_loaded);
432 a -= strlen(on_active) + strlen(off_active);
433
434 if (u->job_id != 0)
435 printf(" %-*s", job_len, u->job_type);
436 else
437 b = 1 + job_len;
438
439 if (a + b + 1 < columns()) {
440 if (u->job_id == 0)
441 printf(" %-*s", job_len, "");
442
443 if (arg_full)
444 printf(" %s", u->description);
445 else
446 printf(" %.*s", columns() - a - b - 1, u->description);
447 }
448
449 fputs("\n", stdout);
450 }
451
452 if (on_tty()) {
453 printf("\nLOAD = Reflects whether the unit definition was properly loaded.\n"
454 "ACTIVE = The high-level unit activation state, i.e. generalization of SUB.\n"
455 "SUB = The low-level unit activation state, values depend on unit type.\n"
456 "JOB = Pending job for the unit.\n");
457
458 if (arg_all)
459 printf("\n%u units listed.\n", n_shown);
460 else
461 printf("\n%u units listed. Pass --all to see inactive units, too.\n", n_shown);
462 }
463 }
464
465 static int list_units(DBusConnection *bus, char **args, unsigned n) {
466 DBusMessage *m = NULL, *reply = NULL;
467 DBusError error;
468 int r;
469 DBusMessageIter iter, sub, sub2;
470 unsigned c = 0, n_units = 0;
471 struct unit_info *unit_infos = NULL;
472
473 dbus_error_init(&error);
474
475 assert(bus);
476
477 pager_open();
478
479 if (!(m = dbus_message_new_method_call(
480 "org.freedesktop.systemd1",
481 "/org/freedesktop/systemd1",
482 "org.freedesktop.systemd1.Manager",
483 "ListUnits"))) {
484 log_error("Could not allocate message.");
485 return -ENOMEM;
486 }
487
488 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
489 log_error("Failed to issue method call: %s", bus_error_message(&error));
490 r = -EIO;
491 goto finish;
492 }
493
494 if (!dbus_message_iter_init(reply, &iter) ||
495 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
496 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
497 log_error("Failed to parse reply.");
498 r = -EIO;
499 goto finish;
500 }
501
502 dbus_message_iter_recurse(&iter, &sub);
503
504 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
505 struct unit_info *u;
506
507 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
508 log_error("Failed to parse reply.");
509 r = -EIO;
510 goto finish;
511 }
512
513 if (c >= n_units) {
514 struct unit_info *w;
515
516 n_units = MAX(2*c, 16);
517 w = realloc(unit_infos, sizeof(struct unit_info) * n_units);
518
519 if (!w) {
520 log_error("Failed to allocate unit array.");
521 r = -ENOMEM;
522 goto finish;
523 }
524
525 unit_infos = w;
526 }
527
528 u = unit_infos+c;
529
530 dbus_message_iter_recurse(&sub, &sub2);
531
532 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->id, true) < 0 ||
533 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->description, true) < 0 ||
534 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->load_state, true) < 0 ||
535 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->active_state, true) < 0 ||
536 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->sub_state, true) < 0 ||
537 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->following, true) < 0 ||
538 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->unit_path, true) < 0 ||
539 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &u->job_id, true) < 0 ||
540 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &u->job_type, true) < 0 ||
541 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &u->job_path, false) < 0) {
542 log_error("Failed to parse reply.");
543 r = -EIO;
544 goto finish;
545 }
546
547 dbus_message_iter_next(&sub);
548 c++;
549 }
550
551 if (c > 0) {
552 qsort(unit_infos, c, sizeof(struct unit_info), compare_unit_info);
553 output_units_list(unit_infos, c);
554 }
555
556 r = 0;
557
558 finish:
559 if (m)
560 dbus_message_unref(m);
561
562 if (reply)
563 dbus_message_unref(reply);
564
565 free(unit_infos);
566
567 dbus_error_free(&error);
568
569 return r;
570 }
571
572 static int dot_one_property(const char *name, const char *prop, DBusMessageIter *iter) {
573 static const char * const colors[] = {
574 "Requires", "[color=\"black\"]",
575 "RequiresOverridable", "[color=\"black\"]",
576 "Requisite", "[color=\"darkblue\"]",
577 "RequisiteOverridable", "[color=\"darkblue\"]",
578 "Wants", "[color=\"darkgrey\"]",
579 "Conflicts", "[color=\"red\"]",
580 "ConflictedBy", "[color=\"red\"]",
581 "After", "[color=\"green\"]"
582 };
583
584 const char *c = NULL;
585 unsigned i;
586
587 assert(name);
588 assert(prop);
589 assert(iter);
590
591 for (i = 0; i < ELEMENTSOF(colors); i += 2)
592 if (streq(colors[i], prop)) {
593 c = colors[i+1];
594 break;
595 }
596
597 if (!c)
598 return 0;
599
600 if (arg_dot != DOT_ALL)
601 if ((arg_dot == DOT_ORDER) != streq(prop, "After"))
602 return 0;
603
604 switch (dbus_message_iter_get_arg_type(iter)) {
605
606 case DBUS_TYPE_ARRAY:
607
608 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING) {
609 DBusMessageIter sub;
610
611 dbus_message_iter_recurse(iter, &sub);
612
613 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
614 const char *s;
615
616 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING);
617 dbus_message_iter_get_basic(&sub, &s);
618 printf("\t\"%s\"->\"%s\" %s;\n", name, s, c);
619
620 dbus_message_iter_next(&sub);
621 }
622
623 return 0;
624 }
625 }
626
627 return 0;
628 }
629
630 static int dot_one(DBusConnection *bus, const char *name, const char *path) {
631 DBusMessage *m = NULL, *reply = NULL;
632 const char *interface = "org.freedesktop.systemd1.Unit";
633 int r;
634 DBusError error;
635 DBusMessageIter iter, sub, sub2, sub3;
636
637 assert(bus);
638 assert(path);
639
640 dbus_error_init(&error);
641
642 if (!(m = dbus_message_new_method_call(
643 "org.freedesktop.systemd1",
644 path,
645 "org.freedesktop.DBus.Properties",
646 "GetAll"))) {
647 log_error("Could not allocate message.");
648 r = -ENOMEM;
649 goto finish;
650 }
651
652 if (!dbus_message_append_args(m,
653 DBUS_TYPE_STRING, &interface,
654 DBUS_TYPE_INVALID)) {
655 log_error("Could not append arguments to message.");
656 r = -ENOMEM;
657 goto finish;
658 }
659
660 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
661 log_error("Failed to issue method call: %s", bus_error_message(&error));
662 r = -EIO;
663 goto finish;
664 }
665
666 if (!dbus_message_iter_init(reply, &iter) ||
667 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
668 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
669 log_error("Failed to parse reply.");
670 r = -EIO;
671 goto finish;
672 }
673
674 dbus_message_iter_recurse(&iter, &sub);
675
676 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
677 const char *prop;
678
679 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_DICT_ENTRY) {
680 log_error("Failed to parse reply.");
681 r = -EIO;
682 goto finish;
683 }
684
685 dbus_message_iter_recurse(&sub, &sub2);
686
687 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &prop, true) < 0) {
688 log_error("Failed to parse reply.");
689 r = -EIO;
690 goto finish;
691 }
692
693 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
694 log_error("Failed to parse reply.");
695 r = -EIO;
696 goto finish;
697 }
698
699 dbus_message_iter_recurse(&sub2, &sub3);
700
701 if (dot_one_property(name, prop, &sub3)) {
702 log_error("Failed to parse reply.");
703 r = -EIO;
704 goto finish;
705 }
706
707 dbus_message_iter_next(&sub);
708 }
709
710 r = 0;
711
712 finish:
713 if (m)
714 dbus_message_unref(m);
715
716 if (reply)
717 dbus_message_unref(reply);
718
719 dbus_error_free(&error);
720
721 return r;
722 }
723
724 static int dot(DBusConnection *bus, char **args, unsigned n) {
725 DBusMessage *m = NULL, *reply = NULL;
726 DBusError error;
727 int r;
728 DBusMessageIter iter, sub, sub2;
729
730 dbus_error_init(&error);
731
732 assert(bus);
733
734 if (!(m = dbus_message_new_method_call(
735 "org.freedesktop.systemd1",
736 "/org/freedesktop/systemd1",
737 "org.freedesktop.systemd1.Manager",
738 "ListUnits"))) {
739 log_error("Could not allocate message.");
740 return -ENOMEM;
741 }
742
743 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
744 log_error("Failed to issue method call: %s", bus_error_message(&error));
745 r = -EIO;
746 goto finish;
747 }
748
749 if (!dbus_message_iter_init(reply, &iter) ||
750 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
751 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
752 log_error("Failed to parse reply.");
753 r = -EIO;
754 goto finish;
755 }
756
757 printf("digraph systemd {\n");
758
759 dbus_message_iter_recurse(&iter, &sub);
760 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
761 const char *id, *description, *load_state, *active_state, *sub_state, *following, *unit_path;
762
763 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
764 log_error("Failed to parse reply.");
765 r = -EIO;
766 goto finish;
767 }
768
769 dbus_message_iter_recurse(&sub, &sub2);
770
771 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &id, true) < 0 ||
772 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &description, true) < 0 ||
773 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &load_state, true) < 0 ||
774 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &active_state, true) < 0 ||
775 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &sub_state, true) < 0 ||
776 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &following, true) < 0 ||
777 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, true) < 0) {
778 log_error("Failed to parse reply.");
779 r = -EIO;
780 goto finish;
781 }
782
783 if ((r = dot_one(bus, id, unit_path)) < 0)
784 goto finish;
785
786 /* printf("\t\"%s\";\n", id); */
787 dbus_message_iter_next(&sub);
788 }
789
790 printf("}\n");
791
792 log_info(" Color legend: black = Requires\n"
793 " dark blue = Requisite\n"
794 " dark grey = Wants\n"
795 " red = Conflicts\n"
796 " green = After\n");
797
798 if (isatty(fileno(stdout)))
799 log_notice("-- You probably want to process this output with graphviz' dot tool.\n"
800 "-- Try a shell pipeline like 'systemctl dot | dot -Tsvg > systemd.svg'!\n");
801
802 r = 0;
803
804 finish:
805 if (m)
806 dbus_message_unref(m);
807
808 if (reply)
809 dbus_message_unref(reply);
810
811 dbus_error_free(&error);
812
813 return r;
814 }
815
816 static int list_jobs(DBusConnection *bus, char **args, unsigned n) {
817 DBusMessage *m = NULL, *reply = NULL;
818 DBusError error;
819 int r;
820 DBusMessageIter iter, sub, sub2;
821 unsigned k = 0;
822
823 dbus_error_init(&error);
824
825 assert(bus);
826
827 pager_open();
828
829 if (!(m = dbus_message_new_method_call(
830 "org.freedesktop.systemd1",
831 "/org/freedesktop/systemd1",
832 "org.freedesktop.systemd1.Manager",
833 "ListJobs"))) {
834 log_error("Could not allocate message.");
835 return -ENOMEM;
836 }
837
838 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
839 log_error("Failed to issue method call: %s", bus_error_message(&error));
840 r = -EIO;
841 goto finish;
842 }
843
844 if (!dbus_message_iter_init(reply, &iter) ||
845 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
846 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRUCT) {
847 log_error("Failed to parse reply.");
848 r = -EIO;
849 goto finish;
850 }
851
852 dbus_message_iter_recurse(&iter, &sub);
853
854 if (isatty(STDOUT_FILENO))
855 printf("%4s %-25s %-15s %-7s\n", "JOB", "UNIT", "TYPE", "STATE");
856
857 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
858 const char *name, *type, *state, *job_path, *unit_path;
859 uint32_t id;
860 char *e;
861
862 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRUCT) {
863 log_error("Failed to parse reply.");
864 r = -EIO;
865 goto finish;
866 }
867
868 dbus_message_iter_recurse(&sub, &sub2);
869
870 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &id, true) < 0 ||
871 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0 ||
872 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) < 0 ||
873 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &state, true) < 0 ||
874 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &job_path, true) < 0 ||
875 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_OBJECT_PATH, &unit_path, false) < 0) {
876 log_error("Failed to parse reply.");
877 r = -EIO;
878 goto finish;
879 }
880
881 e = arg_full ? NULL : ellipsize(name, 25, 33);
882 printf("%4u %-25s %-15s %-7s\n", id, e ? e : name, type, state);
883 free(e);
884
885 k++;
886
887 dbus_message_iter_next(&sub);
888 }
889
890 if (isatty(STDOUT_FILENO))
891 printf("\n%u jobs listed.\n", k);
892
893 r = 0;
894
895 finish:
896 if (m)
897 dbus_message_unref(m);
898
899 if (reply)
900 dbus_message_unref(reply);
901
902 dbus_error_free(&error);
903
904 return r;
905 }
906
907 static int load_unit(DBusConnection *bus, char **args, unsigned n) {
908 DBusMessage *m = NULL, *reply = NULL;
909 DBusError error;
910 int r;
911 unsigned i;
912
913 dbus_error_init(&error);
914
915 assert(bus);
916 assert(args);
917
918 for (i = 1; i < n; i++) {
919
920 if (!(m = dbus_message_new_method_call(
921 "org.freedesktop.systemd1",
922 "/org/freedesktop/systemd1",
923 "org.freedesktop.systemd1.Manager",
924 "LoadUnit"))) {
925 log_error("Could not allocate message.");
926 r = -ENOMEM;
927 goto finish;
928 }
929
930 if (!dbus_message_append_args(m,
931 DBUS_TYPE_STRING, &args[i],
932 DBUS_TYPE_INVALID)) {
933 log_error("Could not append arguments to message.");
934 r = -ENOMEM;
935 goto finish;
936 }
937
938 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
939 log_error("Failed to issue method call: %s", bus_error_message(&error));
940 r = -EIO;
941 goto finish;
942 }
943
944 dbus_message_unref(m);
945 dbus_message_unref(reply);
946
947 m = reply = NULL;
948 }
949
950 r = 0;
951
952 finish:
953 if (m)
954 dbus_message_unref(m);
955
956 if (reply)
957 dbus_message_unref(reply);
958
959 dbus_error_free(&error);
960
961 return r;
962 }
963
964 static int cancel_job(DBusConnection *bus, char **args, unsigned n) {
965 DBusMessage *m = NULL, *reply = NULL;
966 DBusError error;
967 int r;
968 unsigned i;
969
970 dbus_error_init(&error);
971
972 assert(bus);
973 assert(args);
974
975 if (n <= 1)
976 return daemon_reload(bus, args, n);
977
978 for (i = 1; i < n; i++) {
979 unsigned id;
980 const char *path;
981
982 if (!(m = dbus_message_new_method_call(
983 "org.freedesktop.systemd1",
984 "/org/freedesktop/systemd1",
985 "org.freedesktop.systemd1.Manager",
986 "GetJob"))) {
987 log_error("Could not allocate message.");
988 r = -ENOMEM;
989 goto finish;
990 }
991
992 if ((r = safe_atou(args[i], &id)) < 0) {
993 log_error("Failed to parse job id: %s", strerror(-r));
994 goto finish;
995 }
996
997 assert_cc(sizeof(uint32_t) == sizeof(id));
998 if (!dbus_message_append_args(m,
999 DBUS_TYPE_UINT32, &id,
1000 DBUS_TYPE_INVALID)) {
1001 log_error("Could not append arguments to message.");
1002 r = -ENOMEM;
1003 goto finish;
1004 }
1005
1006 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1007 log_error("Failed to issue method call: %s", bus_error_message(&error));
1008 r = -EIO;
1009 goto finish;
1010 }
1011
1012 if (!dbus_message_get_args(reply, &error,
1013 DBUS_TYPE_OBJECT_PATH, &path,
1014 DBUS_TYPE_INVALID)) {
1015 log_error("Failed to parse reply: %s", bus_error_message(&error));
1016 r = -EIO;
1017 goto finish;
1018 }
1019
1020 dbus_message_unref(m);
1021 if (!(m = dbus_message_new_method_call(
1022 "org.freedesktop.systemd1",
1023 path,
1024 "org.freedesktop.systemd1.Job",
1025 "Cancel"))) {
1026 log_error("Could not allocate message.");
1027 r = -ENOMEM;
1028 goto finish;
1029 }
1030
1031 dbus_message_unref(reply);
1032 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1033 log_error("Failed to issue method call: %s", bus_error_message(&error));
1034 r = -EIO;
1035 goto finish;
1036 }
1037
1038 dbus_message_unref(m);
1039 dbus_message_unref(reply);
1040 m = reply = NULL;
1041 }
1042
1043 r = 0;
1044
1045 finish:
1046 if (m)
1047 dbus_message_unref(m);
1048
1049 if (reply)
1050 dbus_message_unref(reply);
1051
1052 dbus_error_free(&error);
1053
1054 return r;
1055 }
1056
1057 static bool need_daemon_reload(DBusConnection *bus, const char *unit) {
1058 DBusMessage *m = NULL, *reply = NULL;
1059 dbus_bool_t b = FALSE;
1060 DBusMessageIter iter, sub;
1061 const char
1062 *interface = "org.freedesktop.systemd1.Unit",
1063 *property = "NeedDaemonReload",
1064 *path;
1065
1066 /* We ignore all errors here, since this is used to show a warning only */
1067
1068 if (!(m = dbus_message_new_method_call(
1069 "org.freedesktop.systemd1",
1070 "/org/freedesktop/systemd1",
1071 "org.freedesktop.systemd1.Manager",
1072 "GetUnit")))
1073 goto finish;
1074
1075 if (!dbus_message_append_args(m,
1076 DBUS_TYPE_STRING, &unit,
1077 DBUS_TYPE_INVALID))
1078 goto finish;
1079
1080 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, NULL)))
1081 goto finish;
1082
1083 if (!dbus_message_get_args(reply, NULL,
1084 DBUS_TYPE_OBJECT_PATH, &path,
1085 DBUS_TYPE_INVALID))
1086 goto finish;
1087
1088 dbus_message_unref(m);
1089 if (!(m = dbus_message_new_method_call(
1090 "org.freedesktop.systemd1",
1091 path,
1092 "org.freedesktop.DBus.Properties",
1093 "Get")))
1094 goto finish;
1095
1096 if (!dbus_message_append_args(m,
1097 DBUS_TYPE_STRING, &interface,
1098 DBUS_TYPE_STRING, &property,
1099 DBUS_TYPE_INVALID)) {
1100 goto finish;
1101 }
1102
1103 dbus_message_unref(reply);
1104 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, NULL)))
1105 goto finish;
1106
1107 if (!dbus_message_iter_init(reply, &iter) ||
1108 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT)
1109 goto finish;
1110
1111 dbus_message_iter_recurse(&iter, &sub);
1112
1113 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_BOOLEAN)
1114 goto finish;
1115
1116 dbus_message_iter_get_basic(&sub, &b);
1117
1118 finish:
1119 if (m)
1120 dbus_message_unref(m);
1121
1122 if (reply)
1123 dbus_message_unref(reply);
1124
1125 return b;
1126 }
1127
1128 typedef struct WaitData {
1129 Set *set;
1130 char *result;
1131 } WaitData;
1132
1133 static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *message, void *data) {
1134 DBusError error;
1135 WaitData *d = data;
1136
1137 assert(connection);
1138 assert(message);
1139 assert(d);
1140
1141 dbus_error_init(&error);
1142
1143 log_debug("Got D-Bus request: %s.%s() on %s",
1144 dbus_message_get_interface(message),
1145 dbus_message_get_member(message),
1146 dbus_message_get_path(message));
1147
1148 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
1149 log_error("Warning! D-Bus connection terminated.");
1150 dbus_connection_close(connection);
1151
1152 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
1153 uint32_t id;
1154 const char *path, *result;
1155 dbus_bool_t success = true;
1156
1157 if (dbus_message_get_args(message, &error,
1158 DBUS_TYPE_UINT32, &id,
1159 DBUS_TYPE_OBJECT_PATH, &path,
1160 DBUS_TYPE_STRING, &result,
1161 DBUS_TYPE_INVALID)) {
1162 char *p;
1163
1164 if ((p = set_remove(d->set, (char*) path)))
1165 free(p);
1166
1167 if (*result)
1168 d->result = strdup(result);
1169
1170 goto finish;
1171 }
1172 #ifndef LEGACY
1173 dbus_error_free(&error);
1174
1175 if (dbus_message_get_args(message, &error,
1176 DBUS_TYPE_UINT32, &id,
1177 DBUS_TYPE_OBJECT_PATH, &path,
1178 DBUS_TYPE_BOOLEAN, &success,
1179 DBUS_TYPE_INVALID)) {
1180 char *p;
1181
1182 /* Compatibility with older systemd versions <
1183 * 19 during upgrades. This should be dropped
1184 * one day */
1185
1186 if ((p = set_remove(d->set, (char*) path)))
1187 free(p);
1188
1189 if (!success)
1190 d->result = strdup("failed");
1191
1192 goto finish;
1193 }
1194 #endif
1195
1196 log_error("Failed to parse message: %s", bus_error_message(&error));
1197 }
1198
1199 finish:
1200 dbus_error_free(&error);
1201 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1202 }
1203
1204 static int enable_wait_for_jobs(DBusConnection *bus) {
1205 DBusError error;
1206
1207 assert(bus);
1208
1209 if (private_bus)
1210 return 0;
1211
1212 dbus_error_init(&error);
1213 dbus_bus_add_match(bus,
1214 "type='signal',"
1215 "sender='org.freedesktop.systemd1',"
1216 "interface='org.freedesktop.systemd1.Manager',"
1217 "member='JobRemoved',"
1218 "path='/org/freedesktop/systemd1'",
1219 &error);
1220
1221 if (dbus_error_is_set(&error)) {
1222 log_error("Failed to add match: %s", bus_error_message(&error));
1223 dbus_error_free(&error);
1224 return -EIO;
1225 }
1226
1227 /* This is slightly dirty, since we don't undo the match registrations. */
1228 return 0;
1229 }
1230
1231 static int wait_for_jobs(DBusConnection *bus, Set *s) {
1232 int r;
1233 WaitData d;
1234
1235 assert(bus);
1236 assert(s);
1237
1238 zero(d);
1239 d.set = s;
1240
1241 if (!dbus_connection_add_filter(bus, wait_filter, &d, NULL)) {
1242 log_error("Failed to add filter.");
1243 r = -ENOMEM;
1244 goto finish;
1245 }
1246
1247 while (!set_isempty(s) &&
1248 dbus_connection_read_write_dispatch(bus, -1))
1249 ;
1250
1251 if (!arg_quiet && d.result) {
1252 if (streq(d.result, "timeout"))
1253 log_error("Job timed out.");
1254 else if (streq(d.result, "canceled"))
1255 log_error("Job canceled.");
1256 else if (streq(d.result, "dependency"))
1257 log_error("A dependency job failed. See system logs for details.");
1258 else if (!streq(d.result, "done") && !streq(d.result, "skipped"))
1259 log_error("Job failed. See system logs and 'systemctl status' for details.");
1260 }
1261
1262 if (streq_ptr(d.result, "timeout"))
1263 r = -ETIME;
1264 else if (streq_ptr(d.result, "canceled"))
1265 r = -ECANCELED;
1266 else if (!streq_ptr(d.result, "done") && !streq_ptr(d.result, "skipped"))
1267 r = -EIO;
1268 else
1269 r = 0;
1270
1271 free(d.result);
1272
1273 finish:
1274 /* This is slightly dirty, since we don't undo the filter registration. */
1275
1276 return r;
1277 }
1278
1279 static int start_unit_one(
1280 DBusConnection *bus,
1281 const char *method,
1282 const char *name,
1283 const char *mode,
1284 DBusError *error,
1285 Set *s) {
1286
1287 DBusMessage *m = NULL, *reply = NULL;
1288 const char *path;
1289 int r;
1290
1291 assert(bus);
1292 assert(method);
1293 assert(name);
1294 assert(mode);
1295 assert(error);
1296 assert(arg_no_block || s);
1297
1298 if (!(m = dbus_message_new_method_call(
1299 "org.freedesktop.systemd1",
1300 "/org/freedesktop/systemd1",
1301 "org.freedesktop.systemd1.Manager",
1302 method))) {
1303 log_error("Could not allocate message.");
1304 r = -ENOMEM;
1305 goto finish;
1306 }
1307
1308 if (!dbus_message_append_args(m,
1309 DBUS_TYPE_STRING, &name,
1310 DBUS_TYPE_STRING, &mode,
1311 DBUS_TYPE_INVALID)) {
1312 log_error("Could not append arguments to message.");
1313 r = -ENOMEM;
1314 goto finish;
1315 }
1316
1317 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, error))) {
1318
1319 if (arg_action != ACTION_SYSTEMCTL && error_is_no_service(error)) {
1320 /* There's always a fallback possible for
1321 * legacy actions. */
1322 r = -EADDRNOTAVAIL;
1323 goto finish;
1324 }
1325
1326 log_error("Failed to issue method call: %s", bus_error_message(error));
1327 r = -EIO;
1328 goto finish;
1329 }
1330
1331 if (!dbus_message_get_args(reply, error,
1332 DBUS_TYPE_OBJECT_PATH, &path,
1333 DBUS_TYPE_INVALID)) {
1334 log_error("Failed to parse reply: %s", bus_error_message(error));
1335 r = -EIO;
1336 goto finish;
1337 }
1338
1339 if (need_daemon_reload(bus, name))
1340 log_warning("Unit file of created job changed on disk, 'systemctl %s daemon-reload' recommended.",
1341 arg_user ? "--user" : "--system");
1342
1343 if (!arg_no_block) {
1344 char *p;
1345
1346 if (!(p = strdup(path))) {
1347 log_error("Failed to duplicate path.");
1348 r = -ENOMEM;
1349 goto finish;
1350 }
1351
1352 if ((r = set_put(s, p)) < 0) {
1353 free(p);
1354 log_error("Failed to add path to set.");
1355 goto finish;
1356 }
1357 }
1358
1359 r = 0;
1360
1361 finish:
1362 if (m)
1363 dbus_message_unref(m);
1364
1365 if (reply)
1366 dbus_message_unref(reply);
1367
1368 return r;
1369 }
1370
1371 static enum action verb_to_action(const char *verb) {
1372 if (streq(verb, "halt"))
1373 return ACTION_HALT;
1374 else if (streq(verb, "poweroff"))
1375 return ACTION_POWEROFF;
1376 else if (streq(verb, "reboot"))
1377 return ACTION_REBOOT;
1378 else if (streq(verb, "kexec"))
1379 return ACTION_KEXEC;
1380 else if (streq(verb, "rescue"))
1381 return ACTION_RESCUE;
1382 else if (streq(verb, "emergency"))
1383 return ACTION_EMERGENCY;
1384 else if (streq(verb, "default"))
1385 return ACTION_DEFAULT;
1386 else if (streq(verb, "exit"))
1387 return ACTION_EXIT;
1388 else
1389 return ACTION_INVALID;
1390 }
1391
1392 static int start_unit(DBusConnection *bus, char **args, unsigned n) {
1393
1394 static const char * const table[_ACTION_MAX] = {
1395 [ACTION_HALT] = SPECIAL_HALT_TARGET,
1396 [ACTION_POWEROFF] = SPECIAL_POWEROFF_TARGET,
1397 [ACTION_REBOOT] = SPECIAL_REBOOT_TARGET,
1398 [ACTION_KEXEC] = SPECIAL_KEXEC_TARGET,
1399 [ACTION_RUNLEVEL2] = SPECIAL_RUNLEVEL2_TARGET,
1400 [ACTION_RUNLEVEL3] = SPECIAL_RUNLEVEL3_TARGET,
1401 [ACTION_RUNLEVEL4] = SPECIAL_RUNLEVEL4_TARGET,
1402 [ACTION_RUNLEVEL5] = SPECIAL_RUNLEVEL5_TARGET,
1403 [ACTION_RESCUE] = SPECIAL_RESCUE_TARGET,
1404 [ACTION_EMERGENCY] = SPECIAL_EMERGENCY_TARGET,
1405 [ACTION_DEFAULT] = SPECIAL_DEFAULT_TARGET,
1406 [ACTION_EXIT] = SPECIAL_EXIT_TARGET
1407 };
1408
1409 int r, ret = 0;
1410 unsigned i;
1411 const char *method, *mode, *one_name;
1412 Set *s = NULL;
1413 DBusError error;
1414
1415 dbus_error_init(&error);
1416
1417 assert(bus);
1418
1419 spawn_ask_password_agent();
1420
1421 if (arg_action == ACTION_SYSTEMCTL) {
1422 method =
1423 streq(args[0], "stop") ||
1424 streq(args[0], "condstop") ? "StopUnit" :
1425 streq(args[0], "reload") ? "ReloadUnit" :
1426 streq(args[0], "restart") ? "RestartUnit" :
1427
1428 streq(args[0], "try-restart") ||
1429 streq(args[0], "condrestart") ? "TryRestartUnit" :
1430
1431 streq(args[0], "reload-or-restart") ? "ReloadOrRestartUnit" :
1432
1433 streq(args[0], "reload-or-try-restart") ||
1434 streq(args[0], "condreload") ||
1435
1436 streq(args[0], "force-reload") ? "ReloadOrTryRestartUnit" :
1437 "StartUnit";
1438
1439 mode =
1440 (streq(args[0], "isolate") ||
1441 streq(args[0], "rescue") ||
1442 streq(args[0], "emergency")) ? "isolate" : arg_job_mode;
1443
1444 one_name = table[verb_to_action(args[0])];
1445
1446 } else {
1447 assert(arg_action < ELEMENTSOF(table));
1448 assert(table[arg_action]);
1449
1450 method = "StartUnit";
1451
1452 mode = (arg_action == ACTION_EMERGENCY ||
1453 arg_action == ACTION_RESCUE ||
1454 arg_action == ACTION_RUNLEVEL2 ||
1455 arg_action == ACTION_RUNLEVEL3 ||
1456 arg_action == ACTION_RUNLEVEL4 ||
1457 arg_action == ACTION_RUNLEVEL5) ? "isolate" : "replace";
1458
1459 one_name = table[arg_action];
1460 }
1461
1462 if (!arg_no_block) {
1463 if ((ret = enable_wait_for_jobs(bus)) < 0) {
1464 log_error("Could not watch jobs: %s", strerror(-ret));
1465 goto finish;
1466 }
1467
1468 if (!(s = set_new(string_hash_func, string_compare_func))) {
1469 log_error("Failed to allocate set.");
1470 ret = -ENOMEM;
1471 goto finish;
1472 }
1473 }
1474
1475 if (one_name) {
1476 if ((ret = start_unit_one(bus, method, one_name, mode, &error, s)) <= 0)
1477 goto finish;
1478 } else {
1479 for (i = 1; i < n; i++)
1480 if ((r = start_unit_one(bus, method, args[i], mode, &error, s)) != 0) {
1481 ret = translate_bus_error_to_exit_status(r, &error);
1482 dbus_error_free(&error);
1483 }
1484 }
1485
1486 if (!arg_no_block)
1487 if ((r = wait_for_jobs(bus, s)) < 0) {
1488 ret = r;
1489 goto finish;
1490 }
1491
1492 finish:
1493 if (s)
1494 set_free_free(s);
1495
1496 dbus_error_free(&error);
1497
1498 return ret;
1499 }
1500
1501 static int start_special(DBusConnection *bus, char **args, unsigned n) {
1502 int r;
1503
1504 assert(bus);
1505 assert(args);
1506
1507 if (arg_force &&
1508 (streq(args[0], "halt") ||
1509 streq(args[0], "poweroff") ||
1510 streq(args[0], "reboot") ||
1511 streq(args[0], "kexec") ||
1512 streq(args[0], "exit")))
1513 return daemon_reload(bus, args, n);
1514
1515 r = start_unit(bus, args, n);
1516
1517 if (r >= 0)
1518 warn_wall(verb_to_action(args[0]));
1519
1520 return r;
1521 }
1522
1523 static int check_unit(DBusConnection *bus, char **args, unsigned n) {
1524 DBusMessage *m = NULL, *reply = NULL;
1525 const char
1526 *interface = "org.freedesktop.systemd1.Unit",
1527 *property = "ActiveState";
1528 int r = 3; /* According to LSB: "program is not running" */
1529 DBusError error;
1530 unsigned i;
1531
1532 assert(bus);
1533 assert(args);
1534
1535 dbus_error_init(&error);
1536
1537 for (i = 1; i < n; i++) {
1538 const char *path = NULL;
1539 const char *state;
1540 DBusMessageIter iter, sub;
1541
1542 if (!(m = dbus_message_new_method_call(
1543 "org.freedesktop.systemd1",
1544 "/org/freedesktop/systemd1",
1545 "org.freedesktop.systemd1.Manager",
1546 "GetUnit"))) {
1547 log_error("Could not allocate message.");
1548 r = -ENOMEM;
1549 goto finish;
1550 }
1551
1552 if (!dbus_message_append_args(m,
1553 DBUS_TYPE_STRING, &args[i],
1554 DBUS_TYPE_INVALID)) {
1555 log_error("Could not append arguments to message.");
1556 r = -ENOMEM;
1557 goto finish;
1558 }
1559
1560 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1561
1562 /* Hmm, cannot figure out anything about this unit... */
1563 if (!arg_quiet)
1564 puts("unknown");
1565
1566 dbus_error_free(&error);
1567 dbus_message_unref(m);
1568 continue;
1569 }
1570
1571 if (!dbus_message_get_args(reply, &error,
1572 DBUS_TYPE_OBJECT_PATH, &path,
1573 DBUS_TYPE_INVALID)) {
1574 log_error("Failed to parse reply: %s", bus_error_message(&error));
1575 r = -EIO;
1576 goto finish;
1577 }
1578
1579 dbus_message_unref(m);
1580 if (!(m = dbus_message_new_method_call(
1581 "org.freedesktop.systemd1",
1582 path,
1583 "org.freedesktop.DBus.Properties",
1584 "Get"))) {
1585 log_error("Could not allocate message.");
1586 r = -ENOMEM;
1587 goto finish;
1588 }
1589
1590 if (!dbus_message_append_args(m,
1591 DBUS_TYPE_STRING, &interface,
1592 DBUS_TYPE_STRING, &property,
1593 DBUS_TYPE_INVALID)) {
1594 log_error("Could not append arguments to message.");
1595 r = -ENOMEM;
1596 goto finish;
1597 }
1598
1599 dbus_message_unref(reply);
1600 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1601 log_error("Failed to issue method call: %s", bus_error_message(&error));
1602 r = -EIO;
1603 goto finish;
1604 }
1605
1606 if (!dbus_message_iter_init(reply, &iter) ||
1607 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
1608 log_error("Failed to parse reply.");
1609 r = -EIO;
1610 goto finish;
1611 }
1612
1613 dbus_message_iter_recurse(&iter, &sub);
1614
1615 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
1616 log_error("Failed to parse reply.");
1617 r = -EIO;
1618 goto finish;
1619 }
1620
1621 dbus_message_iter_get_basic(&sub, &state);
1622
1623 if (!arg_quiet)
1624 puts(state);
1625
1626 if (streq(state, "active") || streq(state, "reloading"))
1627 r = 0;
1628
1629 dbus_message_unref(m);
1630 dbus_message_unref(reply);
1631 m = reply = NULL;
1632 }
1633
1634 finish:
1635 if (m)
1636 dbus_message_unref(m);
1637
1638 if (reply)
1639 dbus_message_unref(reply);
1640
1641 dbus_error_free(&error);
1642
1643 return r;
1644 }
1645
1646 static int kill_unit(DBusConnection *bus, char **args, unsigned n) {
1647 DBusMessage *m = NULL, *reply = NULL;
1648 int r = 0;
1649 DBusError error;
1650 unsigned i;
1651
1652 assert(bus);
1653 assert(args);
1654
1655 dbus_error_init(&error);
1656
1657 if (!arg_kill_who)
1658 arg_kill_who = "all";
1659
1660 if (!arg_kill_mode)
1661 arg_kill_mode = streq(arg_kill_who, "all") ? "control-group" : "process";
1662
1663 for (i = 1; i < n; i++) {
1664
1665 if (!(m = dbus_message_new_method_call(
1666 "org.freedesktop.systemd1",
1667 "/org/freedesktop/systemd1",
1668 "org.freedesktop.systemd1.Manager",
1669 "KillUnit"))) {
1670 log_error("Could not allocate message.");
1671 r = -ENOMEM;
1672 goto finish;
1673 }
1674
1675 if (!dbus_message_append_args(m,
1676 DBUS_TYPE_STRING, &args[i],
1677 DBUS_TYPE_STRING, &arg_kill_who,
1678 DBUS_TYPE_STRING, &arg_kill_mode,
1679 DBUS_TYPE_INT32, &arg_signal,
1680 DBUS_TYPE_INVALID)) {
1681 log_error("Could not append arguments to message.");
1682 r = -ENOMEM;
1683 goto finish;
1684 }
1685
1686 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
1687 log_error("Failed to issue method call: %s", bus_error_message(&error));
1688 dbus_error_free(&error);
1689 r = -EIO;
1690 }
1691
1692 dbus_message_unref(m);
1693
1694 if (reply)
1695 dbus_message_unref(reply);
1696 m = reply = NULL;
1697 }
1698
1699 finish:
1700 if (m)
1701 dbus_message_unref(m);
1702
1703 if (reply)
1704 dbus_message_unref(reply);
1705
1706 dbus_error_free(&error);
1707
1708 return r;
1709 }
1710
1711 typedef struct ExecStatusInfo {
1712 char *name;
1713
1714 char *path;
1715 char **argv;
1716
1717 bool ignore;
1718
1719 usec_t start_timestamp;
1720 usec_t exit_timestamp;
1721 pid_t pid;
1722 int code;
1723 int status;
1724
1725 LIST_FIELDS(struct ExecStatusInfo, exec);
1726 } ExecStatusInfo;
1727
1728 static void exec_status_info_free(ExecStatusInfo *i) {
1729 assert(i);
1730
1731 free(i->name);
1732 free(i->path);
1733 strv_free(i->argv);
1734 free(i);
1735 }
1736
1737 static int exec_status_info_deserialize(DBusMessageIter *sub, ExecStatusInfo *i) {
1738 uint64_t start_timestamp, exit_timestamp;
1739 DBusMessageIter sub2, sub3;
1740 const char*path;
1741 unsigned n;
1742 uint32_t pid;
1743 int32_t code, status;
1744 dbus_bool_t ignore;
1745
1746 assert(i);
1747 assert(i);
1748
1749 if (dbus_message_iter_get_arg_type(sub) != DBUS_TYPE_STRUCT)
1750 return -EIO;
1751
1752 dbus_message_iter_recurse(sub, &sub2);
1753
1754 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) < 0)
1755 return -EIO;
1756
1757 if (!(i->path = strdup(path)))
1758 return -ENOMEM;
1759
1760 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_ARRAY ||
1761 dbus_message_iter_get_element_type(&sub2) != DBUS_TYPE_STRING)
1762 return -EIO;
1763
1764 n = 0;
1765 dbus_message_iter_recurse(&sub2, &sub3);
1766 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
1767 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
1768 dbus_message_iter_next(&sub3);
1769 n++;
1770 }
1771
1772
1773 if (!(i->argv = new0(char*, n+1)))
1774 return -ENOMEM;
1775
1776 n = 0;
1777 dbus_message_iter_recurse(&sub2, &sub3);
1778 while (dbus_message_iter_get_arg_type(&sub3) != DBUS_TYPE_INVALID) {
1779 const char *s;
1780
1781 assert(dbus_message_iter_get_arg_type(&sub3) == DBUS_TYPE_STRING);
1782 dbus_message_iter_get_basic(&sub3, &s);
1783 dbus_message_iter_next(&sub3);
1784
1785 if (!(i->argv[n++] = strdup(s)))
1786 return -ENOMEM;
1787 }
1788
1789 if (!dbus_message_iter_next(&sub2) ||
1790 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, true) < 0 ||
1791 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &start_timestamp, true) < 0 ||
1792 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &exit_timestamp, true) < 0 ||
1793 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT32, &pid, true) < 0 ||
1794 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &code, true) < 0 ||
1795 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_INT32, &status, false) < 0)
1796 return -EIO;
1797
1798 i->ignore = ignore;
1799 i->start_timestamp = (usec_t) start_timestamp;
1800 i->exit_timestamp = (usec_t) exit_timestamp;
1801 i->pid = (pid_t) pid;
1802 i->code = code;
1803 i->status = status;
1804
1805 return 0;
1806 }
1807
1808 typedef struct UnitStatusInfo {
1809 const char *id;
1810 const char *load_state;
1811 const char *active_state;
1812 const char *sub_state;
1813
1814 const char *description;
1815 const char *following;
1816
1817 const char *path;
1818 const char *default_control_group;
1819
1820 usec_t inactive_exit_timestamp;
1821 usec_t active_enter_timestamp;
1822 usec_t active_exit_timestamp;
1823 usec_t inactive_enter_timestamp;
1824
1825 bool need_daemon_reload;
1826
1827 /* Service */
1828 pid_t main_pid;
1829 pid_t control_pid;
1830 const char *status_text;
1831 bool running:1;
1832 #ifdef HAVE_SYSV_COMPAT
1833 bool is_sysv:1;
1834 #endif
1835
1836 usec_t start_timestamp;
1837 usec_t exit_timestamp;
1838
1839 int exit_code, exit_status;
1840
1841 usec_t condition_timestamp;
1842 bool condition_result;
1843
1844 /* Socket */
1845 unsigned n_accepted;
1846 unsigned n_connections;
1847 bool accept;
1848
1849 /* Device */
1850 const char *sysfs_path;
1851
1852 /* Mount, Automount */
1853 const char *where;
1854
1855 /* Swap */
1856 const char *what;
1857
1858 LIST_HEAD(ExecStatusInfo, exec);
1859 } UnitStatusInfo;
1860
1861 static void print_status_info(UnitStatusInfo *i) {
1862 ExecStatusInfo *p;
1863 const char *on, *off, *ss;
1864 usec_t timestamp;
1865 char since1[FORMAT_TIMESTAMP_PRETTY_MAX], *s1;
1866 char since2[FORMAT_TIMESTAMP_MAX], *s2;
1867
1868 assert(i);
1869
1870 /* This shows pretty information about a unit. See
1871 * print_property() for a low-level property printer */
1872
1873 printf("%s", strna(i->id));
1874
1875 if (i->description && !streq_ptr(i->id, i->description))
1876 printf(" - %s", i->description);
1877
1878 printf("\n");
1879
1880 if (i->following)
1881 printf("\t Follow: unit currently follows state of %s\n", i->following);
1882
1883 if (streq_ptr(i->load_state, "failed") ||
1884 streq_ptr(i->load_state, "banned")) {
1885 on = ansi_highlight(true);
1886 off = ansi_highlight(false);
1887 } else
1888 on = off = "";
1889
1890 if (i->path)
1891 printf("\t Loaded: %s%s%s (%s)\n", on, strna(i->load_state), off, i->path);
1892 else
1893 printf("\t Loaded: %s%s%s\n", on, strna(i->load_state), off);
1894
1895 ss = streq_ptr(i->active_state, i->sub_state) ? NULL : i->sub_state;
1896
1897 if (streq_ptr(i->active_state, "failed")) {
1898 on = ansi_highlight(true);
1899 off = ansi_highlight(false);
1900 } else if (streq_ptr(i->active_state, "active") || streq_ptr(i->active_state, "reloading")) {
1901 on = ansi_highlight_green(true);
1902 off = ansi_highlight_green(false);
1903 } else
1904 on = off = "";
1905
1906 if (ss)
1907 printf("\t Active: %s%s (%s)%s",
1908 on,
1909 strna(i->active_state),
1910 ss,
1911 off);
1912 else
1913 printf("\t Active: %s%s%s",
1914 on,
1915 strna(i->active_state),
1916 off);
1917
1918 timestamp = (streq_ptr(i->active_state, "active") ||
1919 streq_ptr(i->active_state, "reloading")) ? i->active_enter_timestamp :
1920 (streq_ptr(i->active_state, "inactive") ||
1921 streq_ptr(i->active_state, "failed")) ? i->inactive_enter_timestamp :
1922 streq_ptr(i->active_state, "activating") ? i->inactive_exit_timestamp :
1923 i->active_exit_timestamp;
1924
1925 s1 = format_timestamp_pretty(since1, sizeof(since1), timestamp);
1926 s2 = format_timestamp(since2, sizeof(since2), timestamp);
1927
1928 if (s1)
1929 printf(" since %s; %s\n", s2, s1);
1930 else if (s2)
1931 printf(" since %s\n", s2);
1932 else
1933 printf("\n");
1934
1935 if (!i->condition_result && i->condition_timestamp > 0) {
1936 s1 = format_timestamp_pretty(since1, sizeof(since1), i->condition_timestamp);
1937 s2 = format_timestamp(since2, sizeof(since2), i->condition_timestamp);
1938
1939 if (s1)
1940 printf("\t start condition failed at %s; %s\n", s2, s1);
1941 else if (s2)
1942 printf("\t start condition failed at %s\n", s2);
1943 }
1944
1945 if (i->sysfs_path)
1946 printf("\t Device: %s\n", i->sysfs_path);
1947 if (i->where)
1948 printf("\t Where: %s\n", i->where);
1949 if (i->what)
1950 printf("\t What: %s\n", i->what);
1951
1952 if (i->accept)
1953 printf("\tAccepted: %u; Connected: %u\n", i->n_accepted, i->n_connections);
1954
1955 LIST_FOREACH(exec, p, i->exec) {
1956 char *t;
1957 bool good;
1958
1959 /* Only show exited processes here */
1960 if (p->code == 0)
1961 continue;
1962
1963 t = strv_join(p->argv, " ");
1964 printf("\t Process: %u %s=%s ", p->pid, p->name, strna(t));
1965 free(t);
1966
1967 #ifdef HAVE_SYSV_COMPAT
1968 if (i->is_sysv)
1969 good = is_clean_exit_lsb(p->code, p->status);
1970 else
1971 #endif
1972 good = is_clean_exit(p->code, p->status);
1973
1974 if (!good) {
1975 on = ansi_highlight(true);
1976 off = ansi_highlight(false);
1977 } else
1978 on = off = "";
1979
1980 printf("%s(code=%s, ", on, sigchld_code_to_string(p->code));
1981
1982 if (p->code == CLD_EXITED) {
1983 const char *c;
1984
1985 printf("status=%i", p->status);
1986
1987 #ifdef HAVE_SYSV_COMPAT
1988 if ((c = exit_status_to_string(p->status, i->is_sysv ? EXIT_STATUS_LSB : EXIT_STATUS_SYSTEMD)))
1989 #else
1990 if ((c = exit_status_to_string(p->status, EXIT_STATUS_SYSTEMD)))
1991 #endif
1992 printf("/%s", c);
1993
1994 } else
1995 printf("signal=%s", signal_to_string(p->status));
1996
1997 printf(")%s\n", off);
1998
1999 on = off = NULL;
2000
2001 if (i->main_pid == p->pid &&
2002 i->start_timestamp == p->start_timestamp &&
2003 i->exit_timestamp == p->start_timestamp)
2004 /* Let's not show this twice */
2005 i->main_pid = 0;
2006
2007 if (p->pid == i->control_pid)
2008 i->control_pid = 0;
2009 }
2010
2011 if (i->main_pid > 0 || i->control_pid > 0) {
2012 printf("\t");
2013
2014 if (i->main_pid > 0) {
2015 printf("Main PID: %u", (unsigned) i->main_pid);
2016
2017 if (i->running) {
2018 char *t = NULL;
2019 get_process_name(i->main_pid, &t);
2020 if (t) {
2021 printf(" (%s)", t);
2022 free(t);
2023 }
2024 } else if (i->exit_code > 0) {
2025 printf(" (code=%s, ", sigchld_code_to_string(i->exit_code));
2026
2027 if (i->exit_code == CLD_EXITED) {
2028 const char *c;
2029
2030 printf("status=%i", i->exit_status);
2031
2032 #ifdef HAVE_SYSV_COMPAT
2033 if ((c = exit_status_to_string(i->exit_status, i->is_sysv ? EXIT_STATUS_LSB : EXIT_STATUS_SYSTEMD)))
2034 #else
2035 if ((c = exit_status_to_string(i->exit_status, EXIT_STATUS_SYSTEMD)))
2036 #endif
2037 printf("/%s", c);
2038
2039 } else
2040 printf("signal=%s", signal_to_string(i->exit_status));
2041 printf(")");
2042 }
2043 }
2044
2045 if (i->main_pid > 0 && i->control_pid > 0)
2046 printf(";");
2047
2048 if (i->control_pid > 0) {
2049 char *t = NULL;
2050
2051 printf(" Control: %u", (unsigned) i->control_pid);
2052
2053 get_process_name(i->control_pid, &t);
2054 if (t) {
2055 printf(" (%s)", t);
2056 free(t);
2057 }
2058 }
2059
2060 printf("\n");
2061 }
2062
2063 if (i->status_text)
2064 printf("\t Status: \"%s\"\n", i->status_text);
2065
2066 if (i->default_control_group) {
2067 unsigned c;
2068
2069 printf("\t CGroup: %s\n", i->default_control_group);
2070
2071 if (arg_transport != TRANSPORT_SSH) {
2072 if ((c = columns()) > 18)
2073 c -= 18;
2074 else
2075 c = 0;
2076
2077 show_cgroup_by_path(i->default_control_group, "\t\t ", c);
2078 }
2079 }
2080
2081 if (i->need_daemon_reload)
2082 printf("\n%sWarning:%s Unit file changed on disk, 'systemctl %s daemon-reload' recommended.\n",
2083 ansi_highlight(true),
2084 ansi_highlight(false),
2085 arg_user ? "--user" : "--system");
2086 }
2087
2088 static int status_property(const char *name, DBusMessageIter *iter, UnitStatusInfo *i) {
2089
2090 switch (dbus_message_iter_get_arg_type(iter)) {
2091
2092 case DBUS_TYPE_STRING: {
2093 const char *s;
2094
2095 dbus_message_iter_get_basic(iter, &s);
2096
2097 if (s[0]) {
2098 if (streq(name, "Id"))
2099 i->id = s;
2100 else if (streq(name, "LoadState"))
2101 i->load_state = s;
2102 else if (streq(name, "ActiveState"))
2103 i->active_state = s;
2104 else if (streq(name, "SubState"))
2105 i->sub_state = s;
2106 else if (streq(name, "Description"))
2107 i->description = s;
2108 else if (streq(name, "FragmentPath"))
2109 i->path = s;
2110 #ifdef HAVE_SYSV_COMPAT
2111 else if (streq(name, "SysVPath")) {
2112 i->is_sysv = true;
2113 i->path = s;
2114 }
2115 #endif
2116 else if (streq(name, "DefaultControlGroup"))
2117 i->default_control_group = s;
2118 else if (streq(name, "StatusText"))
2119 i->status_text = s;
2120 else if (streq(name, "SysFSPath"))
2121 i->sysfs_path = s;
2122 else if (streq(name, "Where"))
2123 i->where = s;
2124 else if (streq(name, "What"))
2125 i->what = s;
2126 else if (streq(name, "Following"))
2127 i->following = s;
2128 }
2129
2130 break;
2131 }
2132
2133 case DBUS_TYPE_BOOLEAN: {
2134 dbus_bool_t b;
2135
2136 dbus_message_iter_get_basic(iter, &b);
2137
2138 if (streq(name, "Accept"))
2139 i->accept = b;
2140 else if (streq(name, "NeedDaemonReload"))
2141 i->need_daemon_reload = b;
2142 else if (streq(name, "ConditionResult"))
2143 i->condition_result = b;
2144
2145 break;
2146 }
2147
2148 case DBUS_TYPE_UINT32: {
2149 uint32_t u;
2150
2151 dbus_message_iter_get_basic(iter, &u);
2152
2153 if (streq(name, "MainPID")) {
2154 if (u > 0) {
2155 i->main_pid = (pid_t) u;
2156 i->running = true;
2157 }
2158 } else if (streq(name, "ControlPID"))
2159 i->control_pid = (pid_t) u;
2160 else if (streq(name, "ExecMainPID")) {
2161 if (u > 0)
2162 i->main_pid = (pid_t) u;
2163 } else if (streq(name, "NAccepted"))
2164 i->n_accepted = u;
2165 else if (streq(name, "NConnections"))
2166 i->n_connections = u;
2167
2168 break;
2169 }
2170
2171 case DBUS_TYPE_INT32: {
2172 int32_t j;
2173
2174 dbus_message_iter_get_basic(iter, &j);
2175
2176 if (streq(name, "ExecMainCode"))
2177 i->exit_code = (int) j;
2178 else if (streq(name, "ExecMainStatus"))
2179 i->exit_status = (int) j;
2180
2181 break;
2182 }
2183
2184 case DBUS_TYPE_UINT64: {
2185 uint64_t u;
2186
2187 dbus_message_iter_get_basic(iter, &u);
2188
2189 if (streq(name, "ExecMainStartTimestamp"))
2190 i->start_timestamp = (usec_t) u;
2191 else if (streq(name, "ExecMainExitTimestamp"))
2192 i->exit_timestamp = (usec_t) u;
2193 else if (streq(name, "ActiveEnterTimestamp"))
2194 i->active_enter_timestamp = (usec_t) u;
2195 else if (streq(name, "InactiveEnterTimestamp"))
2196 i->inactive_enter_timestamp = (usec_t) u;
2197 else if (streq(name, "InactiveExitTimestamp"))
2198 i->inactive_exit_timestamp = (usec_t) u;
2199 else if (streq(name, "ActiveExitTimestamp"))
2200 i->active_exit_timestamp = (usec_t) u;
2201 else if (streq(name, "ConditionTimestamp"))
2202 i->condition_timestamp = (usec_t) u;
2203
2204 break;
2205 }
2206
2207 case DBUS_TYPE_ARRAY: {
2208
2209 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT &&
2210 startswith(name, "Exec")) {
2211 DBusMessageIter sub;
2212
2213 dbus_message_iter_recurse(iter, &sub);
2214 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2215 ExecStatusInfo *info;
2216 int r;
2217
2218 if (!(info = new0(ExecStatusInfo, 1)))
2219 return -ENOMEM;
2220
2221 if (!(info->name = strdup(name))) {
2222 free(info);
2223 return -ENOMEM;
2224 }
2225
2226 if ((r = exec_status_info_deserialize(&sub, info)) < 0) {
2227 free(info);
2228 return r;
2229 }
2230
2231 LIST_PREPEND(ExecStatusInfo, exec, i->exec, info);
2232
2233 dbus_message_iter_next(&sub);
2234 }
2235 }
2236
2237 break;
2238 }
2239 }
2240
2241 return 0;
2242 }
2243
2244 static int print_property(const char *name, DBusMessageIter *iter) {
2245 assert(name);
2246 assert(iter);
2247
2248 /* This is a low-level property printer, see
2249 * print_status_info() for the nicer output */
2250
2251 if (arg_property && !strv_find(arg_property, name))
2252 return 0;
2253
2254 switch (dbus_message_iter_get_arg_type(iter)) {
2255
2256 case DBUS_TYPE_STRING: {
2257 const char *s;
2258 dbus_message_iter_get_basic(iter, &s);
2259
2260 if (arg_all || s[0])
2261 printf("%s=%s\n", name, s);
2262
2263 return 0;
2264 }
2265
2266 case DBUS_TYPE_BOOLEAN: {
2267 dbus_bool_t b;
2268 dbus_message_iter_get_basic(iter, &b);
2269 printf("%s=%s\n", name, yes_no(b));
2270
2271 return 0;
2272 }
2273
2274 case DBUS_TYPE_UINT64: {
2275 uint64_t u;
2276 dbus_message_iter_get_basic(iter, &u);
2277
2278 /* Yes, heuristics! But we can change this check
2279 * should it turn out to not be sufficient */
2280
2281 if (strstr(name, "Timestamp")) {
2282 char timestamp[FORMAT_TIMESTAMP_MAX], *t;
2283
2284 if ((t = format_timestamp(timestamp, sizeof(timestamp), u)) || arg_all)
2285 printf("%s=%s\n", name, strempty(t));
2286 } else if (strstr(name, "USec")) {
2287 char timespan[FORMAT_TIMESPAN_MAX];
2288
2289 printf("%s=%s\n", name, format_timespan(timespan, sizeof(timespan), u));
2290 } else
2291 printf("%s=%llu\n", name, (unsigned long long) u);
2292
2293 return 0;
2294 }
2295
2296 case DBUS_TYPE_UINT32: {
2297 uint32_t u;
2298 dbus_message_iter_get_basic(iter, &u);
2299
2300 if (strstr(name, "UMask") || strstr(name, "Mode"))
2301 printf("%s=%04o\n", name, u);
2302 else
2303 printf("%s=%u\n", name, (unsigned) u);
2304
2305 return 0;
2306 }
2307
2308 case DBUS_TYPE_INT32: {
2309 int32_t i;
2310 dbus_message_iter_get_basic(iter, &i);
2311
2312 printf("%s=%i\n", name, (int) i);
2313 return 0;
2314 }
2315
2316 case DBUS_TYPE_DOUBLE: {
2317 double d;
2318 dbus_message_iter_get_basic(iter, &d);
2319
2320 printf("%s=%g\n", name, d);
2321 return 0;
2322 }
2323
2324 case DBUS_TYPE_STRUCT: {
2325 DBusMessageIter sub;
2326 dbus_message_iter_recurse(iter, &sub);
2327
2328 if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_UINT32 && streq(name, "Job")) {
2329 uint32_t u;
2330
2331 dbus_message_iter_get_basic(&sub, &u);
2332
2333 if (u)
2334 printf("%s=%u\n", name, (unsigned) u);
2335 else if (arg_all)
2336 printf("%s=\n", name);
2337
2338 return 0;
2339 } else if (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING && streq(name, "Unit")) {
2340 const char *s;
2341
2342 dbus_message_iter_get_basic(&sub, &s);
2343
2344 if (arg_all || s[0])
2345 printf("%s=%s\n", name, s);
2346
2347 return 0;
2348 }
2349
2350 break;
2351 }
2352
2353 case DBUS_TYPE_ARRAY:
2354
2355 if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRING) {
2356 DBusMessageIter sub;
2357 bool space = false;
2358
2359 dbus_message_iter_recurse(iter, &sub);
2360 if (arg_all ||
2361 dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2362 printf("%s=", name);
2363
2364 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2365 const char *s;
2366
2367 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRING);
2368 dbus_message_iter_get_basic(&sub, &s);
2369 printf("%s%s", space ? " " : "", s);
2370
2371 space = true;
2372 dbus_message_iter_next(&sub);
2373 }
2374
2375 puts("");
2376 }
2377
2378 return 0;
2379
2380 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_BYTE) {
2381 DBusMessageIter sub;
2382
2383 dbus_message_iter_recurse(iter, &sub);
2384 if (arg_all ||
2385 dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2386 printf("%s=", name);
2387
2388 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2389 uint8_t u;
2390
2391 assert(dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_BYTE);
2392 dbus_message_iter_get_basic(&sub, &u);
2393 printf("%02x", u);
2394
2395 dbus_message_iter_next(&sub);
2396 }
2397
2398 puts("");
2399 }
2400
2401 return 0;
2402
2403 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "EnvironmentFiles")) {
2404 DBusMessageIter sub, sub2;
2405
2406 dbus_message_iter_recurse(iter, &sub);
2407 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2408 const char *path;
2409 dbus_bool_t ignore;
2410
2411 dbus_message_iter_recurse(&sub, &sub2);
2412
2413 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, true) >= 0 &&
2414 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_BOOLEAN, &ignore, false) >= 0)
2415 printf("EnvironmentFile=%s (ignore=%s)\n", path, yes_no(ignore));
2416
2417 dbus_message_iter_next(&sub);
2418 }
2419
2420 return 0;
2421
2422 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Paths")) {
2423 DBusMessageIter sub, sub2;
2424
2425 dbus_message_iter_recurse(iter, &sub);
2426 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2427 const char *type, *path;
2428
2429 dbus_message_iter_recurse(&sub, &sub2);
2430
2431 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &type, true) >= 0 &&
2432 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &path, false) >= 0)
2433 printf("%s=%s\n", type, path);
2434
2435 dbus_message_iter_next(&sub);
2436 }
2437
2438 return 0;
2439
2440 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && streq(name, "Timers")) {
2441 DBusMessageIter sub, sub2;
2442
2443 dbus_message_iter_recurse(iter, &sub);
2444 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2445 const char *base;
2446 uint64_t value, next_elapse;
2447
2448 dbus_message_iter_recurse(&sub, &sub2);
2449
2450 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &base, true) >= 0 &&
2451 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &value, true) >= 0 &&
2452 bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_UINT64, &next_elapse, false) >= 0) {
2453 char timespan1[FORMAT_TIMESPAN_MAX], timespan2[FORMAT_TIMESPAN_MAX];
2454
2455 printf("%s={ value=%s ; next_elapse=%s }\n",
2456 base,
2457 format_timespan(timespan1, sizeof(timespan1), value),
2458 format_timespan(timespan2, sizeof(timespan2), next_elapse));
2459 }
2460
2461 dbus_message_iter_next(&sub);
2462 }
2463
2464 return 0;
2465
2466 } else if (dbus_message_iter_get_element_type(iter) == DBUS_TYPE_STRUCT && startswith(name, "Exec")) {
2467 DBusMessageIter sub;
2468
2469 dbus_message_iter_recurse(iter, &sub);
2470 while (dbus_message_iter_get_arg_type(&sub) == DBUS_TYPE_STRUCT) {
2471 ExecStatusInfo info;
2472
2473 zero(info);
2474 if (exec_status_info_deserialize(&sub, &info) >= 0) {
2475 char timestamp1[FORMAT_TIMESTAMP_MAX], timestamp2[FORMAT_TIMESTAMP_MAX];
2476 char *t;
2477
2478 t = strv_join(info.argv, " ");
2479
2480 printf("%s={ path=%s ; argv[]=%s ; ignore=%s ; start_time=[%s] ; stop_time=[%s] ; pid=%u ; code=%s ; status=%i%s%s }\n",
2481 name,
2482 strna(info.path),
2483 strna(t),
2484 yes_no(info.ignore),
2485 strna(format_timestamp(timestamp1, sizeof(timestamp1), info.start_timestamp)),
2486 strna(format_timestamp(timestamp2, sizeof(timestamp2), info.exit_timestamp)),
2487 (unsigned) info. pid,
2488 sigchld_code_to_string(info.code),
2489 info.status,
2490 info.code == CLD_EXITED ? "" : "/",
2491 strempty(info.code == CLD_EXITED ? NULL : signal_to_string(info.status)));
2492
2493 free(t);
2494 }
2495
2496 free(info.path);
2497 strv_free(info.argv);
2498
2499 dbus_message_iter_next(&sub);
2500 }
2501
2502 return 0;
2503 }
2504
2505 break;
2506 }
2507
2508 if (arg_all)
2509 printf("%s=[unprintable]\n", name);
2510
2511 return 0;
2512 }
2513
2514 static int show_one(const char *verb, DBusConnection *bus, const char *path, bool show_properties, bool *new_line) {
2515 DBusMessage *m = NULL, *reply = NULL;
2516 const char *interface = "";
2517 int r;
2518 DBusError error;
2519 DBusMessageIter iter, sub, sub2, sub3;
2520 UnitStatusInfo info;
2521 ExecStatusInfo *p;
2522
2523 assert(bus);
2524 assert(path);
2525 assert(new_line);
2526
2527 zero(info);
2528 dbus_error_init(&error);
2529
2530 if (!(m = dbus_message_new_method_call(
2531 "org.freedesktop.systemd1",
2532 path,
2533 "org.freedesktop.DBus.Properties",
2534 "GetAll"))) {
2535 log_error("Could not allocate message.");
2536 r = -ENOMEM;
2537 goto finish;
2538 }
2539
2540 if (!dbus_message_append_args(m,
2541 DBUS_TYPE_STRING, &interface,
2542 DBUS_TYPE_INVALID)) {
2543 log_error("Could not append arguments to message.");
2544 r = -ENOMEM;
2545 goto finish;
2546 }
2547
2548 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2549 log_error("Failed to issue method call: %s", bus_error_message(&error));
2550 r = -EIO;
2551 goto finish;
2552 }
2553
2554 if (!dbus_message_iter_init(reply, &iter) ||
2555 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
2556 dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_DICT_ENTRY) {
2557 log_error("Failed to parse reply.");
2558 r = -EIO;
2559 goto finish;
2560 }
2561
2562 dbus_message_iter_recurse(&iter, &sub);
2563
2564 if (*new_line)
2565 printf("\n");
2566
2567 *new_line = true;
2568
2569 while (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_INVALID) {
2570 const char *name;
2571
2572 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_DICT_ENTRY) {
2573 log_error("Failed to parse reply.");
2574 r = -EIO;
2575 goto finish;
2576 }
2577
2578 dbus_message_iter_recurse(&sub, &sub2);
2579
2580 if (bus_iter_get_basic_and_next(&sub2, DBUS_TYPE_STRING, &name, true) < 0) {
2581 log_error("Failed to parse reply.");
2582 r = -EIO;
2583 goto finish;
2584 }
2585
2586 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_VARIANT) {
2587 log_error("Failed to parse reply.");
2588 r = -EIO;
2589 goto finish;
2590 }
2591
2592 dbus_message_iter_recurse(&sub2, &sub3);
2593
2594 if (show_properties)
2595 r = print_property(name, &sub3);
2596 else
2597 r = status_property(name, &sub3, &info);
2598
2599 if (r < 0) {
2600 log_error("Failed to parse reply.");
2601 r = -EIO;
2602 goto finish;
2603 }
2604
2605 dbus_message_iter_next(&sub);
2606 }
2607
2608 r = 0;
2609
2610 if (!show_properties)
2611 print_status_info(&info);
2612
2613 if (!streq_ptr(info.active_state, "active") &&
2614 !streq_ptr(info.active_state, "reloading") &&
2615 streq(verb, "status"))
2616 /* According to LSB: "program not running" */
2617 r = 3;
2618
2619 while ((p = info.exec)) {
2620 LIST_REMOVE(ExecStatusInfo, exec, info.exec, p);
2621 exec_status_info_free(p);
2622 }
2623
2624 finish:
2625 if (m)
2626 dbus_message_unref(m);
2627
2628 if (reply)
2629 dbus_message_unref(reply);
2630
2631 dbus_error_free(&error);
2632
2633 return r;
2634 }
2635
2636 static int show(DBusConnection *bus, char **args, unsigned n) {
2637 DBusMessage *m = NULL, *reply = NULL;
2638 int r, ret = 0;
2639 DBusError error;
2640 unsigned i;
2641 bool show_properties, new_line = false;
2642
2643 assert(bus);
2644 assert(args);
2645
2646 dbus_error_init(&error);
2647
2648 show_properties = !streq(args[0], "status");
2649
2650 if (show_properties)
2651 pager_open();
2652
2653 if (show_properties && n <= 1) {
2654 /* If not argument is specified inspect the manager
2655 * itself */
2656
2657 ret = show_one(args[0], bus, "/org/freedesktop/systemd1", show_properties, &new_line);
2658 goto finish;
2659 }
2660
2661 for (i = 1; i < n; i++) {
2662 const char *path = NULL;
2663 uint32_t id;
2664
2665 if (safe_atou32(args[i], &id) < 0) {
2666
2667 /* Interpret as unit name */
2668
2669 if (!(m = dbus_message_new_method_call(
2670 "org.freedesktop.systemd1",
2671 "/org/freedesktop/systemd1",
2672 "org.freedesktop.systemd1.Manager",
2673 "LoadUnit"))) {
2674 log_error("Could not allocate message.");
2675 ret = -ENOMEM;
2676 goto finish;
2677 }
2678
2679 if (!dbus_message_append_args(m,
2680 DBUS_TYPE_STRING, &args[i],
2681 DBUS_TYPE_INVALID)) {
2682 log_error("Could not append arguments to message.");
2683 ret = -ENOMEM;
2684 goto finish;
2685 }
2686
2687 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2688
2689 if (!dbus_error_has_name(&error, DBUS_ERROR_ACCESS_DENIED)) {
2690 log_error("Failed to issue method call: %s", bus_error_message(&error));
2691 ret = -EIO;
2692 goto finish;
2693 }
2694
2695 dbus_error_free(&error);
2696
2697 dbus_message_unref(m);
2698 if (!(m = dbus_message_new_method_call(
2699 "org.freedesktop.systemd1",
2700 "/org/freedesktop/systemd1",
2701 "org.freedesktop.systemd1.Manager",
2702 "GetUnit"))) {
2703 log_error("Could not allocate message.");
2704 ret = -ENOMEM;
2705 goto finish;
2706 }
2707
2708 if (!dbus_message_append_args(m,
2709 DBUS_TYPE_STRING, &args[i],
2710 DBUS_TYPE_INVALID)) {
2711 log_error("Could not append arguments to message.");
2712 ret = -ENOMEM;
2713 goto finish;
2714 }
2715
2716 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2717 log_error("Failed to issue method call: %s", bus_error_message(&error));
2718
2719 if (dbus_error_has_name(&error, BUS_ERROR_NO_SUCH_UNIT))
2720 ret = 4; /* According to LSB: "program or service status is unknown" */
2721 else
2722 ret = -EIO;
2723 goto finish;
2724 }
2725 }
2726
2727 } else if (show_properties) {
2728
2729 /* Interpret as job id */
2730
2731 if (!(m = dbus_message_new_method_call(
2732 "org.freedesktop.systemd1",
2733 "/org/freedesktop/systemd1",
2734 "org.freedesktop.systemd1.Manager",
2735 "GetJob"))) {
2736 log_error("Could not allocate message.");
2737 ret = -ENOMEM;
2738 goto finish;
2739 }
2740
2741 if (!dbus_message_append_args(m,
2742 DBUS_TYPE_UINT32, &id,
2743 DBUS_TYPE_INVALID)) {
2744 log_error("Could not append arguments to message.");
2745 ret = -ENOMEM;
2746 goto finish;
2747 }
2748
2749 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2750 log_error("Failed to issue method call: %s", bus_error_message(&error));
2751 ret = -EIO;
2752 goto finish;
2753 }
2754 } else {
2755
2756 /* Interpret as PID */
2757
2758 if (!(m = dbus_message_new_method_call(
2759 "org.freedesktop.systemd1",
2760 "/org/freedesktop/systemd1",
2761 "org.freedesktop.systemd1.Manager",
2762 "GetUnitByPID"))) {
2763 log_error("Could not allocate message.");
2764 ret = -ENOMEM;
2765 goto finish;
2766 }
2767
2768 if (!dbus_message_append_args(m,
2769 DBUS_TYPE_UINT32, &id,
2770 DBUS_TYPE_INVALID)) {
2771 log_error("Could not append arguments to message.");
2772 ret = -ENOMEM;
2773 goto finish;
2774 }
2775
2776 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
2777 log_error("Failed to issue method call: %s", bus_error_message(&error));
2778 ret = -EIO;
2779 goto finish;
2780 }
2781 }
2782
2783 if (!dbus_message_get_args(reply, &error,
2784 DBUS_TYPE_OBJECT_PATH, &path,
2785 DBUS_TYPE_INVALID)) {
2786 log_error("Failed to parse reply: %s", bus_error_message(&error));
2787 ret = -EIO;
2788 goto finish;
2789 }
2790
2791 if ((r = show_one(args[0], bus, path, show_properties, &new_line)) != 0)
2792 ret = r;
2793
2794 dbus_message_unref(m);
2795 dbus_message_unref(reply);
2796 m = reply = NULL;
2797 }
2798
2799 finish:
2800 if (m)
2801 dbus_message_unref(m);
2802
2803 if (reply)
2804 dbus_message_unref(reply);
2805
2806 dbus_error_free(&error);
2807
2808 return ret;
2809 }
2810
2811 static DBusHandlerResult monitor_filter(DBusConnection *connection, DBusMessage *message, void *data) {
2812 DBusError error;
2813 DBusMessage *m = NULL, *reply = NULL;
2814
2815 assert(connection);
2816 assert(message);
2817
2818 dbus_error_init(&error);
2819
2820 log_debug("Got D-Bus request: %s.%s() on %s",
2821 dbus_message_get_interface(message),
2822 dbus_message_get_member(message),
2823 dbus_message_get_path(message));
2824
2825 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, "Disconnected")) {
2826 log_error("Warning! D-Bus connection terminated.");
2827 dbus_connection_close(connection);
2828
2829 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "UnitNew") ||
2830 dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "UnitRemoved")) {
2831 const char *id, *path;
2832
2833 if (!dbus_message_get_args(message, &error,
2834 DBUS_TYPE_STRING, &id,
2835 DBUS_TYPE_OBJECT_PATH, &path,
2836 DBUS_TYPE_INVALID))
2837 log_error("Failed to parse message: %s", bus_error_message(&error));
2838 else if (streq(dbus_message_get_member(message), "UnitNew"))
2839 printf("Unit %s added.\n", id);
2840 else
2841 printf("Unit %s removed.\n", id);
2842
2843 } else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobNew") ||
2844 dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {
2845 uint32_t id;
2846 const char *path, *result;
2847
2848 if (!dbus_message_get_args(message, &error,
2849 DBUS_TYPE_UINT32, &id,
2850 DBUS_TYPE_OBJECT_PATH, &path,
2851 DBUS_TYPE_STRING, &result,
2852 DBUS_TYPE_INVALID))
2853 log_error("Failed to parse message: %s", bus_error_message(&error));
2854 else if (streq(dbus_message_get_member(message), "JobNew"))
2855 printf("Job %u added.\n", id);
2856 else
2857 printf("Job %u removed.\n", id);
2858
2859
2860 } else if (dbus_message_is_signal(message, "org.freedesktop.DBus.Properties", "PropertiesChanged")) {
2861
2862 const char *path, *interface, *property = "Id";
2863 DBusMessageIter iter, sub;
2864
2865 path = dbus_message_get_path(message);
2866
2867 if (!dbus_message_get_args(message, &error,
2868 DBUS_TYPE_STRING, &interface,
2869 DBUS_TYPE_INVALID)) {
2870 log_error("Failed to parse message: %s", bus_error_message(&error));
2871 goto finish;
2872 }
2873
2874 if (!streq(interface, "org.freedesktop.systemd1.Job") &&
2875 !streq(interface, "org.freedesktop.systemd1.Unit"))
2876 goto finish;
2877
2878 if (!(m = dbus_message_new_method_call(
2879 "org.freedesktop.systemd1",
2880 path,
2881 "org.freedesktop.DBus.Properties",
2882 "Get"))) {
2883 log_error("Could not allocate message.");
2884 goto oom;
2885 }
2886
2887 if (!dbus_message_append_args(m,
2888 DBUS_TYPE_STRING, &interface,
2889 DBUS_TYPE_STRING, &property,
2890 DBUS_TYPE_INVALID)) {
2891 log_error("Could not append arguments to message.");
2892 goto finish;
2893 }
2894
2895 if (!(reply = dbus_connection_send_with_reply_and_block(connection, m, -1, &error))) {
2896 log_error("Failed to issue method call: %s", bus_error_message(&error));
2897 goto finish;
2898 }
2899
2900 if (!dbus_message_iter_init(reply, &iter) ||
2901 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
2902 log_error("Failed to parse reply.");
2903 goto finish;
2904 }
2905
2906 dbus_message_iter_recurse(&iter, &sub);
2907
2908 if (streq(interface, "org.freedesktop.systemd1.Unit")) {
2909 const char *id;
2910
2911 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
2912 log_error("Failed to parse reply.");
2913 goto finish;
2914 }
2915
2916 dbus_message_iter_get_basic(&sub, &id);
2917 printf("Unit %s changed.\n", id);
2918 } else {
2919 uint32_t id;
2920
2921 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_UINT32) {
2922 log_error("Failed to parse reply.");
2923 goto finish;
2924 }
2925
2926 dbus_message_iter_get_basic(&sub, &id);
2927 printf("Job %u changed.\n", id);
2928 }
2929 }
2930
2931 finish:
2932 if (m)
2933 dbus_message_unref(m);
2934
2935 if (reply)
2936 dbus_message_unref(reply);
2937
2938 dbus_error_free(&error);
2939 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
2940
2941 oom:
2942 if (m)
2943 dbus_message_unref(m);
2944
2945 if (reply)
2946 dbus_message_unref(reply);
2947
2948 dbus_error_free(&error);
2949 return DBUS_HANDLER_RESULT_NEED_MEMORY;
2950 }
2951
2952 static int monitor(DBusConnection *bus, char **args, unsigned n) {
2953 DBusMessage *m = NULL, *reply = NULL;
2954 DBusError error;
2955 int r;
2956
2957 dbus_error_init(&error);
2958
2959 if (!private_bus) {
2960 dbus_bus_add_match(bus,
2961 "type='signal',"
2962 "sender='org.freedesktop.systemd1',"
2963 "interface='org.freedesktop.systemd1.Manager',"
2964 "path='/org/freedesktop/systemd1'",
2965 &error);
2966
2967 if (dbus_error_is_set(&error)) {
2968 log_error("Failed to add match: %s", bus_error_message(&error));
2969 r = -EIO;
2970 goto finish;
2971 }
2972
2973 dbus_bus_add_match(bus,
2974 "type='signal',"
2975 "sender='org.freedesktop.systemd1',"
2976 "interface='org.freedesktop.DBus.Properties',"
2977 "member='PropertiesChanged'",
2978 &error);
2979
2980 if (dbus_error_is_set(&error)) {
2981 log_error("Failed to add match: %s", bus_error_message(&error));
2982 r = -EIO;
2983 goto finish;
2984 }
2985 }
2986
2987 if (!dbus_connection_add_filter(bus, monitor_filter, NULL, NULL)) {
2988 log_error("Failed to add filter.");
2989 r = -ENOMEM;
2990 goto finish;
2991 }
2992
2993 if (!(m = dbus_message_new_method_call(
2994 "org.freedesktop.systemd1",
2995 "/org/freedesktop/systemd1",
2996 "org.freedesktop.systemd1.Manager",
2997 "Subscribe"))) {
2998 log_error("Could not allocate message.");
2999 r = -ENOMEM;
3000 goto finish;
3001 }
3002
3003 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3004 log_error("Failed to issue method call: %s", bus_error_message(&error));
3005 r = -EIO;
3006 goto finish;
3007 }
3008
3009 while (dbus_connection_read_write_dispatch(bus, -1))
3010 ;
3011
3012 r = 0;
3013
3014 finish:
3015
3016 /* This is slightly dirty, since we don't undo the filter or the matches. */
3017
3018 if (m)
3019 dbus_message_unref(m);
3020
3021 if (reply)
3022 dbus_message_unref(reply);
3023
3024 dbus_error_free(&error);
3025
3026 return r;
3027 }
3028
3029 static int dump(DBusConnection *bus, char **args, unsigned n) {
3030 DBusMessage *m = NULL, *reply = NULL;
3031 DBusError error;
3032 int r;
3033 const char *text;
3034
3035 dbus_error_init(&error);
3036
3037 pager_open();
3038
3039 if (!(m = dbus_message_new_method_call(
3040 "org.freedesktop.systemd1",
3041 "/org/freedesktop/systemd1",
3042 "org.freedesktop.systemd1.Manager",
3043 "Dump"))) {
3044 log_error("Could not allocate message.");
3045 return -ENOMEM;
3046 }
3047
3048 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3049 log_error("Failed to issue method call: %s", bus_error_message(&error));
3050 r = -EIO;
3051 goto finish;
3052 }
3053
3054 if (!dbus_message_get_args(reply, &error,
3055 DBUS_TYPE_STRING, &text,
3056 DBUS_TYPE_INVALID)) {
3057 log_error("Failed to parse reply: %s", bus_error_message(&error));
3058 r = -EIO;
3059 goto finish;
3060 }
3061
3062 fputs(text, stdout);
3063
3064 r = 0;
3065
3066 finish:
3067 if (m)
3068 dbus_message_unref(m);
3069
3070 if (reply)
3071 dbus_message_unref(reply);
3072
3073 dbus_error_free(&error);
3074
3075 return r;
3076 }
3077
3078 static int snapshot(DBusConnection *bus, char **args, unsigned n) {
3079 DBusMessage *m = NULL, *reply = NULL;
3080 DBusError error;
3081 int r;
3082 const char *name = "", *path, *id;
3083 dbus_bool_t cleanup = FALSE;
3084 DBusMessageIter iter, sub;
3085 const char
3086 *interface = "org.freedesktop.systemd1.Unit",
3087 *property = "Id";
3088
3089 dbus_error_init(&error);
3090
3091 if (!(m = dbus_message_new_method_call(
3092 "org.freedesktop.systemd1",
3093 "/org/freedesktop/systemd1",
3094 "org.freedesktop.systemd1.Manager",
3095 "CreateSnapshot"))) {
3096 log_error("Could not allocate message.");
3097 return -ENOMEM;
3098 }
3099
3100 if (n > 1)
3101 name = args[1];
3102
3103 if (!dbus_message_append_args(m,
3104 DBUS_TYPE_STRING, &name,
3105 DBUS_TYPE_BOOLEAN, &cleanup,
3106 DBUS_TYPE_INVALID)) {
3107 log_error("Could not append arguments to message.");
3108 r = -ENOMEM;
3109 goto finish;
3110 }
3111
3112 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3113 log_error("Failed to issue method call: %s", bus_error_message(&error));
3114 r = -EIO;
3115 goto finish;
3116 }
3117
3118 if (!dbus_message_get_args(reply, &error,
3119 DBUS_TYPE_OBJECT_PATH, &path,
3120 DBUS_TYPE_INVALID)) {
3121 log_error("Failed to parse reply: %s", bus_error_message(&error));
3122 r = -EIO;
3123 goto finish;
3124 }
3125
3126 dbus_message_unref(m);
3127 if (!(m = dbus_message_new_method_call(
3128 "org.freedesktop.systemd1",
3129 path,
3130 "org.freedesktop.DBus.Properties",
3131 "Get"))) {
3132 log_error("Could not allocate message.");
3133 return -ENOMEM;
3134 }
3135
3136 if (!dbus_message_append_args(m,
3137 DBUS_TYPE_STRING, &interface,
3138 DBUS_TYPE_STRING, &property,
3139 DBUS_TYPE_INVALID)) {
3140 log_error("Could not append arguments to message.");
3141 r = -ENOMEM;
3142 goto finish;
3143 }
3144
3145 dbus_message_unref(reply);
3146 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3147 log_error("Failed to issue method call: %s", bus_error_message(&error));
3148 r = -EIO;
3149 goto finish;
3150 }
3151
3152 if (!dbus_message_iter_init(reply, &iter) ||
3153 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3154 log_error("Failed to parse reply.");
3155 r = -EIO;
3156 goto finish;
3157 }
3158
3159 dbus_message_iter_recurse(&iter, &sub);
3160
3161 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_STRING) {
3162 log_error("Failed to parse reply.");
3163 r = -EIO;
3164 goto finish;
3165 }
3166
3167 dbus_message_iter_get_basic(&sub, &id);
3168
3169 if (!arg_quiet)
3170 puts(id);
3171 r = 0;
3172
3173 finish:
3174 if (m)
3175 dbus_message_unref(m);
3176
3177 if (reply)
3178 dbus_message_unref(reply);
3179
3180 dbus_error_free(&error);
3181
3182 return r;
3183 }
3184
3185 static int delete_snapshot(DBusConnection *bus, char **args, unsigned n) {
3186 DBusMessage *m = NULL, *reply = NULL;
3187 int r;
3188 DBusError error;
3189 unsigned i;
3190
3191 assert(bus);
3192 assert(args);
3193
3194 dbus_error_init(&error);
3195
3196 for (i = 1; i < n; i++) {
3197 const char *path = NULL;
3198
3199 if (!(m = dbus_message_new_method_call(
3200 "org.freedesktop.systemd1",
3201 "/org/freedesktop/systemd1",
3202 "org.freedesktop.systemd1.Manager",
3203 "GetUnit"))) {
3204 log_error("Could not allocate message.");
3205 r = -ENOMEM;
3206 goto finish;
3207 }
3208
3209 if (!dbus_message_append_args(m,
3210 DBUS_TYPE_STRING, &args[i],
3211 DBUS_TYPE_INVALID)) {
3212 log_error("Could not append arguments to message.");
3213 r = -ENOMEM;
3214 goto finish;
3215 }
3216
3217 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3218 log_error("Failed to issue method call: %s", bus_error_message(&error));
3219 r = -EIO;
3220 goto finish;
3221 }
3222
3223 if (!dbus_message_get_args(reply, &error,
3224 DBUS_TYPE_OBJECT_PATH, &path,
3225 DBUS_TYPE_INVALID)) {
3226 log_error("Failed to parse reply: %s", bus_error_message(&error));
3227 r = -EIO;
3228 goto finish;
3229 }
3230
3231 dbus_message_unref(m);
3232 if (!(m = dbus_message_new_method_call(
3233 "org.freedesktop.systemd1",
3234 path,
3235 "org.freedesktop.systemd1.Snapshot",
3236 "Remove"))) {
3237 log_error("Could not allocate message.");
3238 r = -ENOMEM;
3239 goto finish;
3240 }
3241
3242 dbus_message_unref(reply);
3243 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3244 log_error("Failed to issue method call: %s", bus_error_message(&error));
3245 r = -EIO;
3246 goto finish;
3247 }
3248
3249 dbus_message_unref(m);
3250 dbus_message_unref(reply);
3251 m = reply = NULL;
3252 }
3253
3254 r = 0;
3255
3256 finish:
3257 if (m)
3258 dbus_message_unref(m);
3259
3260 if (reply)
3261 dbus_message_unref(reply);
3262
3263 dbus_error_free(&error);
3264
3265 return r;
3266 }
3267
3268 static int daemon_reload(DBusConnection *bus, char **args, unsigned n) {
3269 DBusMessage *m = NULL, *reply = NULL;
3270 DBusError error;
3271 int r;
3272 const char *method;
3273
3274 dbus_error_init(&error);
3275
3276 if (arg_action == ACTION_RELOAD)
3277 method = "Reload";
3278 else if (arg_action == ACTION_REEXEC)
3279 method = "Reexecute";
3280 else {
3281 assert(arg_action == ACTION_SYSTEMCTL);
3282
3283 method =
3284 streq(args[0], "clear-jobs") ||
3285 streq(args[0], "cancel") ? "ClearJobs" :
3286 streq(args[0], "daemon-reexec") ? "Reexecute" :
3287 streq(args[0], "reset-failed") ? "ResetFailed" :
3288 streq(args[0], "halt") ? "Halt" :
3289 streq(args[0], "poweroff") ? "PowerOff" :
3290 streq(args[0], "reboot") ? "Reboot" :
3291 streq(args[0], "kexec") ? "KExec" :
3292 streq(args[0], "exit") ? "Exit" :
3293 /* "daemon-reload" */ "Reload";
3294 }
3295
3296 if (!(m = dbus_message_new_method_call(
3297 "org.freedesktop.systemd1",
3298 "/org/freedesktop/systemd1",
3299 "org.freedesktop.systemd1.Manager",
3300 method))) {
3301 log_error("Could not allocate message.");
3302 return -ENOMEM;
3303 }
3304
3305 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3306
3307 if (arg_action != ACTION_SYSTEMCTL && error_is_no_service(&error)) {
3308 /* There's always a fallback possible for
3309 * legacy actions. */
3310 r = -EADDRNOTAVAIL;
3311 goto finish;
3312 }
3313
3314 log_error("Failed to issue method call: %s", bus_error_message(&error));
3315 r = -EIO;
3316 goto finish;
3317 }
3318
3319 r = 0;
3320
3321 finish:
3322 if (m)
3323 dbus_message_unref(m);
3324
3325 if (reply)
3326 dbus_message_unref(reply);
3327
3328 dbus_error_free(&error);
3329
3330 return r;
3331 }
3332
3333 static int reset_failed(DBusConnection *bus, char **args, unsigned n) {
3334 DBusMessage *m = NULL, *reply = NULL;
3335 unsigned i;
3336 int r;
3337 DBusError error;
3338
3339 assert(bus);
3340 dbus_error_init(&error);
3341
3342 if (n <= 1)
3343 return daemon_reload(bus, args, n);
3344
3345 for (i = 1; i < n; i++) {
3346
3347 if (!(m = dbus_message_new_method_call(
3348 "org.freedesktop.systemd1",
3349 "/org/freedesktop/systemd1",
3350 "org.freedesktop.systemd1.Manager",
3351 "ResetFailedUnit"))) {
3352 log_error("Could not allocate message.");
3353 r = -ENOMEM;
3354 goto finish;
3355 }
3356
3357 if (!dbus_message_append_args(m,
3358 DBUS_TYPE_STRING, args + i,
3359 DBUS_TYPE_INVALID)) {
3360 log_error("Could not append arguments to message.");
3361 r = -ENOMEM;
3362 goto finish;
3363 }
3364
3365 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3366 log_error("Failed to issue method call: %s", bus_error_message(&error));
3367 r = -EIO;
3368 goto finish;
3369 }
3370
3371 dbus_message_unref(m);
3372 dbus_message_unref(reply);
3373 m = reply = NULL;
3374 }
3375
3376 r = 0;
3377
3378 finish:
3379 if (m)
3380 dbus_message_unref(m);
3381
3382 if (reply)
3383 dbus_message_unref(reply);
3384
3385 dbus_error_free(&error);
3386
3387 return r;
3388 }
3389
3390 static int show_enviroment(DBusConnection *bus, char **args, unsigned n) {
3391 DBusMessage *m = NULL, *reply = NULL;
3392 DBusError error;
3393 DBusMessageIter iter, sub, sub2;
3394 int r;
3395 const char
3396 *interface = "org.freedesktop.systemd1.Manager",
3397 *property = "Environment";
3398
3399 dbus_error_init(&error);
3400
3401 pager_open();
3402
3403 if (!(m = dbus_message_new_method_call(
3404 "org.freedesktop.systemd1",
3405 "/org/freedesktop/systemd1",
3406 "org.freedesktop.DBus.Properties",
3407 "Get"))) {
3408 log_error("Could not allocate message.");
3409 return -ENOMEM;
3410 }
3411
3412 if (!dbus_message_append_args(m,
3413 DBUS_TYPE_STRING, &interface,
3414 DBUS_TYPE_STRING, &property,
3415 DBUS_TYPE_INVALID)) {
3416 log_error("Could not append arguments to message.");
3417 r = -ENOMEM;
3418 goto finish;
3419 }
3420
3421 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3422 log_error("Failed to issue method call: %s", bus_error_message(&error));
3423 r = -EIO;
3424 goto finish;
3425 }
3426
3427 if (!dbus_message_iter_init(reply, &iter) ||
3428 dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_VARIANT) {
3429 log_error("Failed to parse reply.");
3430 r = -EIO;
3431 goto finish;
3432 }
3433
3434 dbus_message_iter_recurse(&iter, &sub);
3435
3436 if (dbus_message_iter_get_arg_type(&sub) != DBUS_TYPE_ARRAY ||
3437 dbus_message_iter_get_element_type(&sub) != DBUS_TYPE_STRING) {
3438 log_error("Failed to parse reply.");
3439 r = -EIO;
3440 goto finish;
3441 }
3442
3443 dbus_message_iter_recurse(&sub, &sub2);
3444
3445 while (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_INVALID) {
3446 const char *text;
3447
3448 if (dbus_message_iter_get_arg_type(&sub2) != DBUS_TYPE_STRING) {
3449 log_error("Failed to parse reply.");
3450 r = -EIO;
3451 goto finish;
3452 }
3453
3454 dbus_message_iter_get_basic(&sub2, &text);
3455 printf("%s\n", text);
3456
3457 dbus_message_iter_next(&sub2);
3458 }
3459
3460 r = 0;
3461
3462 finish:
3463 if (m)
3464 dbus_message_unref(m);
3465
3466 if (reply)
3467 dbus_message_unref(reply);
3468
3469 dbus_error_free(&error);
3470
3471 return r;
3472 }
3473
3474 static int set_environment(DBusConnection *bus, char **args, unsigned n) {
3475 DBusMessage *m = NULL, *reply = NULL;
3476 DBusError error;
3477 int r;
3478 const char *method;
3479 DBusMessageIter iter, sub;
3480 unsigned i;
3481
3482 dbus_error_init(&error);
3483
3484 method = streq(args[0], "set-environment")
3485 ? "SetEnvironment"
3486 : "UnsetEnvironment";
3487
3488 if (!(m = dbus_message_new_method_call(
3489 "org.freedesktop.systemd1",
3490 "/org/freedesktop/systemd1",
3491 "org.freedesktop.systemd1.Manager",
3492 method))) {
3493
3494 log_error("Could not allocate message.");
3495 return -ENOMEM;
3496 }
3497
3498 dbus_message_iter_init_append(m, &iter);
3499
3500 if (!dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub)) {
3501 log_error("Could not append arguments to message.");
3502 r = -ENOMEM;
3503 goto finish;
3504 }
3505
3506 for (i = 1; i < n; i++)
3507 if (!dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &args[i])) {
3508 log_error("Could not append arguments to message.");
3509 r = -ENOMEM;
3510 goto finish;
3511 }
3512
3513 if (!dbus_message_iter_close_container(&iter, &sub)) {
3514 log_error("Could not append arguments to message.");
3515 r = -ENOMEM;
3516 goto finish;
3517 }
3518
3519 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
3520 log_error("Failed to issue method call: %s", bus_error_message(&error));
3521 r = -EIO;
3522 goto finish;
3523 }
3524
3525 r = 0;
3526
3527 finish:
3528 if (m)
3529 dbus_message_unref(m);
3530
3531 if (reply)
3532 dbus_message_unref(reply);
3533
3534 dbus_error_free(&error);
3535
3536 return r;
3537 }
3538
3539 typedef struct {
3540 char *name;
3541 char *path;
3542
3543 char **aliases;
3544 char **wanted_by;
3545 } InstallInfo;
3546
3547 static Hashmap *will_install = NULL, *have_installed = NULL;
3548 static Set *remove_symlinks_to = NULL;
3549 static unsigned n_symlinks = 0;
3550
3551 static void install_info_free(InstallInfo *i) {
3552 assert(i);
3553
3554 free(i->name);
3555 free(i->path);
3556 strv_free(i->aliases);
3557 strv_free(i->wanted_by);
3558 free(i);
3559 }
3560
3561 static void install_info_hashmap_free(Hashmap *m) {
3562 InstallInfo *i;
3563
3564 while ((i = hashmap_steal_first(m)))
3565 install_info_free(i);
3566
3567 hashmap_free(m);
3568 }
3569
3570 static int install_info_add(const char *name) {
3571 InstallInfo *i;
3572 int r;
3573
3574 assert(will_install);
3575
3576 if (!unit_name_is_valid_no_type(name, true)) {
3577 log_warning("Unit name %s is not a valid unit name.", name);
3578 return -EINVAL;
3579 }
3580
3581 if (hashmap_get(have_installed, name) ||
3582 hashmap_get(will_install, name))
3583 return 0;
3584
3585 if (!(i = new0(InstallInfo, 1))) {
3586 r = -ENOMEM;
3587 goto fail;
3588 }
3589
3590 if (!(i->name = strdup(name))) {
3591 r = -ENOMEM;
3592 goto fail;
3593 }
3594
3595 if ((r = hashmap_put(will_install, i->name, i)) < 0)
3596 goto fail;
3597
3598 return 0;
3599
3600 fail:
3601 if (i)
3602 install_info_free(i);
3603
3604 return r;
3605 }
3606
3607 static int config_parse_also(
3608 const char *filename,
3609 unsigned line,
3610 const char *section,
3611 const char *lvalue,
3612 int ltype,
3613 const char *rvalue,
3614 void *data,
3615 void *userdata) {
3616
3617 char *w;
3618 size_t l;
3619 char *state;
3620
3621 assert(filename);
3622 assert(lvalue);
3623 assert(rvalue);
3624
3625 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
3626 char *n;
3627 int r;
3628
3629 if (!(n = strndup(w, l)))
3630 return -ENOMEM;
3631
3632 if ((r = install_info_add(n)) < 0) {
3633 log_warning("Cannot install unit %s: %s", n, strerror(-r));
3634 free(n);
3635 return r;
3636 }
3637
3638 free(n);
3639 }
3640
3641 return 0;
3642 }
3643
3644 static int mark_symlink_for_removal(const char *p) {
3645 char *n;
3646 int r;
3647
3648 assert(p);
3649 assert(path_is_absolute(p));
3650
3651 if (!remove_symlinks_to)
3652 return 0;
3653
3654 if (!(n = strdup(p)))
3655 return -ENOMEM;
3656
3657 path_kill_slashes(n);
3658
3659 if ((r = set_put(remove_symlinks_to, n)) < 0) {
3660 free(n);
3661 return r == -EEXIST ? 0 : r;
3662 }
3663
3664 return 0;
3665 }
3666
3667 static int remove_marked_symlinks_fd(int fd, const char *config_path, const char *root, bool *deleted) {
3668 int r = 0;
3669 DIR *d;
3670 struct dirent *de;
3671
3672 assert(fd >= 0);
3673 assert(root);
3674 assert(deleted);
3675
3676 if (!(d = fdopendir(fd))) {
3677 close_nointr_nofail(fd);
3678 return -errno;
3679 }
3680
3681 rewinddir(d);
3682
3683 while ((de = readdir(d))) {
3684 bool is_dir = false, is_link = false;
3685
3686 if (ignore_file(de->d_name))
3687 continue;
3688
3689 if (de->d_type == DT_LNK)
3690 is_link = true;
3691 else if (de->d_type == DT_DIR)
3692 is_dir = true;
3693 else if (de->d_type == DT_UNKNOWN) {
3694 struct stat st;
3695
3696 if (fstatat(fd, de->d_name, &st, AT_SYMLINK_NOFOLLOW) < 0) {
3697 log_error("Failed to stat %s/%s: %m", root, de->d_name);
3698
3699 if (r == 0)
3700 r = -errno;
3701 continue;
3702 }
3703
3704 is_link = S_ISLNK(st.st_mode);
3705 is_dir = S_ISDIR(st.st_mode);
3706 } else
3707 continue;
3708
3709 if (is_dir) {
3710 int nfd, q;
3711 char *p;
3712
3713 if ((nfd = openat(fd, de->d_name, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW)) < 0) {
3714 log_error("Failed to open %s/%s: %m", root, de->d_name);
3715
3716 if (r == 0)
3717 r = -errno;
3718 continue;
3719 }
3720
3721 if (asprintf(&p, "%s/%s", root, de->d_name) < 0) {
3722 log_error("Failed to allocate directory string.");
3723 close_nointr_nofail(nfd);
3724 r = -ENOMEM;
3725 break;
3726 }
3727
3728 /* This will close nfd, regardless whether it succeeds or not */
3729 q = remove_marked_symlinks_fd(nfd, config_path, p, deleted);
3730 free(p);
3731
3732 if (r == 0)
3733 r = q;
3734
3735 } else if (is_link) {
3736 char *p, *dest, *c;
3737 int q;
3738
3739 if (asprintf(&p, "%s/%s", root, de->d_name) < 0) {
3740 log_error("Failed to allocate symlink string.");
3741 r = -ENOMEM;
3742 break;
3743 }
3744
3745 if ((q = readlink_and_make_absolute(p, &dest)) < 0) {
3746 log_error("Cannot read symlink %s: %s", p, strerror(-q));
3747 free(p);
3748
3749 if (r == 0)
3750 r = q;
3751 continue;
3752 }
3753
3754 if ((c = canonicalize_file_name(dest))) {
3755 /* This might fail if the destination
3756 * is already removed */
3757
3758 free(dest);
3759 dest = c;
3760 }
3761
3762 path_kill_slashes(dest);
3763 if (set_get(remove_symlinks_to, dest)) {
3764
3765 if (!arg_quiet)
3766 log_info("rm '%s'", p);
3767
3768 if (unlink(p) < 0) {
3769 log_error("Cannot unlink symlink %s: %m", p);
3770
3771 if (r == 0)
3772 r = -errno;
3773 } else {
3774 rmdir_parents(p, config_path);
3775 path_kill_slashes(p);
3776
3777 if (!set_get(remove_symlinks_to, p)) {
3778
3779 if ((r = mark_symlink_for_removal(p)) < 0) {
3780 if (r == 0)
3781 r = q;
3782 } else
3783 *deleted = true;
3784 }
3785 }
3786 }
3787
3788 free(p);
3789 free(dest);
3790 }
3791 }
3792
3793 closedir(d);
3794
3795 return r;
3796 }
3797
3798 static int remove_marked_symlinks(const char *config_path) {
3799 int fd, r = 0;
3800 bool deleted;
3801
3802 assert(config_path);
3803
3804 if (set_size(remove_symlinks_to) <= 0)
3805 return 0;
3806
3807 if ((fd = open(config_path, O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW)) < 0)
3808 return -errno;
3809
3810 do {
3811 int q, cfd;
3812 deleted = false;
3813
3814 if ((cfd = dup(fd)) < 0) {
3815 r = -errno;
3816 break;
3817 }
3818
3819 /* This takes possession of cfd and closes it */
3820 if ((q = remove_marked_symlinks_fd(cfd, config_path, config_path, &deleted)) < 0) {
3821 if (r == 0)
3822 r = q;
3823 }
3824 } while (deleted);
3825
3826 close_nointr_nofail(fd);
3827
3828 return r;
3829 }
3830
3831 static int create_symlink(const char *verb, const char *old_path, const char *new_path) {
3832 int r;
3833
3834 assert(old_path);
3835 assert(new_path);
3836 assert(verb);
3837
3838 if (streq(verb, "enable")) {
3839 char *dest;
3840
3841 mkdir_parents(new_path, 0755);
3842
3843 if (symlink(old_path, new_path) >= 0) {
3844
3845 if (!arg_quiet)
3846 log_info("ln -s '%s' '%s'", old_path, new_path);
3847
3848 return 0;
3849 }
3850
3851 if (errno != EEXIST) {
3852 log_error("Cannot link %s to %s: %m", old_path, new_path);
3853 return -errno;
3854 }
3855
3856 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3857
3858 if (errno == EINVAL) {
3859 log_error("Cannot link %s to %s, file exists already and is not a symlink.", old_path, new_path);
3860 return -EEXIST;
3861 }
3862
3863 log_error("readlink() failed: %s", strerror(-r));
3864 return r;
3865 }
3866
3867 if (streq(dest, old_path)) {
3868 free(dest);
3869 return 0;
3870 }
3871
3872 if (!arg_force) {
3873 log_error("Cannot link %s to %s, symlink exists already and points to %s.", old_path, new_path, dest);
3874 free(dest);
3875 return -EEXIST;
3876 }
3877
3878 free(dest);
3879 unlink(new_path);
3880
3881 if (!arg_quiet)
3882 log_info("ln -s '%s' '%s'", old_path, new_path);
3883
3884 if (symlink(old_path, new_path) >= 0)
3885 return 0;
3886
3887 log_error("Cannot link %s to %s: %m", old_path, new_path);
3888 return -errno;
3889
3890 } else if (streq(verb, "disable")) {
3891 char *dest;
3892
3893 if ((r = mark_symlink_for_removal(old_path)) < 0)
3894 return r;
3895
3896 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3897 if (errno == ENOENT)
3898 return 0;
3899
3900 if (errno == EINVAL) {
3901 log_warning("File %s not a symlink, ignoring.", old_path);
3902 return 0;
3903 }
3904
3905 log_error("readlink() failed: %s", strerror(-r));
3906 return r;
3907 }
3908
3909 if (!streq(dest, old_path)) {
3910 log_warning("File %s not a symlink to %s but points to %s, ignoring.", new_path, old_path, dest);
3911 free(dest);
3912 return 0;
3913 }
3914
3915 free(dest);
3916
3917 if ((r = mark_symlink_for_removal(new_path)) < 0)
3918 return r;
3919
3920 if (!arg_quiet)
3921 log_info("rm '%s'", new_path);
3922
3923 if (unlink(new_path) >= 0)
3924 return 0;
3925
3926 log_error("Cannot unlink %s: %m", new_path);
3927 return -errno;
3928
3929 } else if (streq(verb, "is-enabled")) {
3930 char *dest;
3931
3932 if ((r = readlink_and_make_absolute(new_path, &dest)) < 0) {
3933
3934 if (errno == ENOENT || errno == EINVAL)
3935 return 0;
3936
3937 log_error("readlink() failed: %s", strerror(-r));
3938 return r;
3939 }
3940
3941 if (streq(dest, old_path)) {
3942 free(dest);
3943 return 1;
3944 }
3945
3946 return 0;
3947 }
3948
3949 assert_not_reached("Unknown action.");
3950 }
3951
3952 static int install_info_symlink_alias(const char *verb, InstallInfo *i, const char *config_path) {
3953 char **s;
3954 char *alias_path = NULL;
3955 int r;
3956
3957 assert(verb);
3958 assert(i);
3959 assert(config_path);
3960
3961 STRV_FOREACH(s, i->aliases) {
3962
3963 free(alias_path);
3964 if (!(alias_path = path_make_absolute(*s, config_path))) {
3965 log_error("Out of memory");
3966 r = -ENOMEM;
3967 goto finish;
3968 }
3969
3970 if ((r = create_symlink(verb, i->path, alias_path)) != 0)
3971 goto finish;
3972
3973 if (streq(verb, "disable"))
3974 rmdir_parents(alias_path, config_path);
3975 }
3976 r = 0;
3977
3978 finish:
3979 free(alias_path);
3980
3981 return r;
3982 }
3983
3984 static int install_info_symlink_wants(const char *verb, InstallInfo *i, const char *config_path) {
3985 char **s;
3986 char *alias_path = NULL;
3987 int r;
3988
3989 assert(verb);
3990 assert(i);
3991 assert(config_path);
3992
3993 STRV_FOREACH(s, i->wanted_by) {
3994 if (!unit_name_is_valid_no_type(*s, true)) {
3995 log_error("Invalid name %s.", *s);
3996 r = -EINVAL;
3997 goto finish;
3998 }
3999
4000 free(alias_path);
4001 alias_path = NULL;
4002
4003 if (asprintf(&alias_path, "%s/%s.wants/%s", config_path, *s, i->name) < 0) {
4004 log_error("Out of memory");
4005 r = -ENOMEM;
4006 goto finish;
4007 }
4008
4009 if ((r = create_symlink(verb, i->path, alias_path)) != 0)
4010 goto finish;
4011
4012 if (streq(verb, "disable"))
4013 rmdir_parents(alias_path, config_path);
4014 }
4015
4016 r = 0;
4017
4018 finish:
4019 free(alias_path);
4020
4021 return r;
4022 }
4023
4024 static int install_info_apply(const char *verb, LookupPaths *paths, InstallInfo *i, const char *config_path) {
4025
4026 const ConfigItem items[] = {
4027 { "Alias", config_parse_strv, 0, &i->aliases, "Install" },
4028 { "WantedBy", config_parse_strv, 0, &i->wanted_by, "Install" },
4029 { "Also", config_parse_also, 0, NULL, "Install" },
4030
4031 { NULL, NULL, 0, NULL, NULL }
4032 };
4033
4034 char **p;
4035 char *filename = NULL;
4036 FILE *f = NULL;
4037 int r;
4038
4039 assert(paths);
4040 assert(i);
4041
4042 STRV_FOREACH(p, paths->unit_path) {
4043 int fd;
4044
4045 if (!(filename = path_make_absolute(i->name, *p))) {
4046 log_error("Out of memory");
4047 return -ENOMEM;
4048 }
4049
4050 /* Ensure that we don't follow symlinks */
4051 if ((fd = open(filename, O_RDONLY|O_CLOEXEC|O_NOFOLLOW|O_NOCTTY)) >= 0)
4052 if ((f = fdopen(fd, "re")))
4053 break;
4054
4055 if (errno == ELOOP) {
4056 log_error("Refusing to operate on symlinks, please pass unit names or absolute paths to unit files.");
4057 free(filename);
4058 return -errno;
4059 }
4060
4061 if (errno != ENOENT) {
4062 log_error("Failed to open %s: %m", filename);
4063 free(filename);
4064 return -errno;
4065 }
4066
4067 free(filename);
4068 filename = NULL;
4069 }
4070
4071 if (!f) {
4072 #if (defined(TARGET_FEDORA) || defined(TARGET_MANDRIVA)) && defined (HAVE_SYSV_COMPAT)
4073
4074 if (endswith(i->name, ".service")) {
4075 char *sysv;
4076 bool exists;
4077
4078 if (asprintf(&sysv, SYSTEM_SYSVINIT_PATH "/%s", i->name) < 0) {
4079 log_error("Out of memory");
4080 return -ENOMEM;
4081 }
4082
4083 sysv[strlen(sysv) - sizeof(".service") + 1] = 0;
4084 exists = access(sysv, F_OK) >= 0;
4085
4086 if (exists) {
4087 pid_t pid;
4088 siginfo_t status;
4089
4090 const char *argv[] = {
4091 "/sbin/chkconfig",
4092 NULL,
4093 NULL,
4094 NULL
4095 };
4096
4097 log_info("%s is not a native service, redirecting to /sbin/chkconfig.", i->name);
4098
4099 argv[1] = file_name_from_path(sysv);
4100 argv[2] =
4101 streq(verb, "enable") ? "on" :
4102 streq(verb, "disable") ? "off" : "--level=5";
4103
4104 log_info("Executing %s %s %s", argv[0], argv[1], strempty(argv[2]));
4105
4106 if ((pid = fork()) < 0) {
4107 log_error("Failed to fork: %m");
4108 free(sysv);
4109 return -errno;
4110 } else if (pid == 0) {
4111 execv(argv[0], (char**) argv);
4112 _exit(EXIT_FAILURE);
4113 }
4114
4115 free(sysv);
4116
4117 if ((r = wait_for_terminate(pid, &status)) < 0)
4118 return r;
4119
4120 if (status.si_code == CLD_EXITED) {
4121
4122 if (streq(verb, "is-enabled"))
4123 return status.si_status == 0 ? 1 : 0;
4124
4125 if (status.si_status == 0)
4126 n_symlinks ++;
4127
4128 return status.si_status == 0 ? 0 : -EINVAL;
4129
4130 } else
4131 return -EPROTO;
4132 }
4133
4134 free(sysv);
4135 }
4136
4137 #endif
4138
4139 log_error("Couldn't find %s.", i->name);
4140 return -ENOENT;
4141 }
4142
4143 i->path = filename;
4144
4145 if ((r = config_parse(filename, f, NULL, items, true, i)) < 0) {
4146 fclose(f);
4147 return r;
4148 }
4149
4150 n_symlinks += strv_length(i->aliases);
4151 n_symlinks += strv_length(i->wanted_by);
4152
4153 fclose(f);
4154
4155 if ((r = install_info_symlink_alias(verb, i, config_path)) != 0)
4156 return r;
4157
4158 if ((r = install_info_symlink_wants(verb, i, config_path)) != 0)
4159 return r;
4160
4161 if ((r = mark_symlink_for_removal(filename)) < 0)
4162 return r;
4163
4164 if ((r = remove_marked_symlinks(config_path)) < 0)
4165 return r;
4166
4167 return 0;
4168 }
4169
4170 static char *get_config_path(void) {
4171
4172 if (arg_user && arg_global)
4173 return strdup(USER_CONFIG_UNIT_PATH);
4174
4175 if (arg_user) {
4176 char *p;
4177
4178 if (user_config_home(&p) < 0)
4179 return NULL;
4180
4181 return p;
4182 }
4183
4184 return strdup(SYSTEM_CONFIG_UNIT_PATH);
4185 }
4186
4187 static int enable_unit(DBusConnection *bus, char **args, unsigned n) {
4188 DBusError error;
4189 int r;
4190 LookupPaths paths;
4191 char *config_path = NULL;
4192 unsigned j;
4193 InstallInfo *i;
4194 const char *verb = args[0];
4195
4196 dbus_error_init(&error);
4197
4198 zero(paths);
4199 if ((r = lookup_paths_init(&paths, arg_user ? MANAGER_USER : MANAGER_SYSTEM)) < 0) {
4200 log_error("Failed to determine lookup paths: %s", strerror(-r));
4201 goto finish;
4202 }
4203
4204 if (!(config_path = get_config_path())) {
4205 log_error("Failed to determine config path");
4206 r = -ENOMEM;
4207 goto finish;
4208 }
4209
4210 will_install = hashmap_new(string_hash_func, string_compare_func);
4211 have_installed = hashmap_new(string_hash_func, string_compare_func);
4212
4213 if (!will_install || !have_installed) {
4214 log_error("Failed to allocate unit sets.");
4215 r = -ENOMEM;
4216 goto finish;
4217 }
4218
4219 if (!arg_defaults && streq(verb, "disable"))
4220 if (!(remove_symlinks_to = set_new(string_hash_func, string_compare_func))) {
4221 log_error("Failed to allocate symlink sets.");
4222 r = -ENOMEM;
4223 goto finish;
4224 }
4225
4226 for (j = 1; j < n; j++)
4227 if ((r = install_info_add(args[j])) < 0) {
4228 log_warning("Cannot install unit %s: %s", args[j], strerror(-r));
4229 goto finish;
4230 }
4231
4232 r = 0;
4233
4234 while ((i = hashmap_first(will_install))) {
4235 int q;
4236
4237 assert_se(hashmap_move_one(have_installed, will_install, i->name) == 0);
4238
4239 if ((q = install_info_apply(verb, &paths, i, config_path)) != 0) {
4240
4241 if (q < 0) {
4242 if (r == 0)
4243 r = q;
4244 goto finish;
4245 }
4246
4247 /* In test mode and found something */
4248 r = 1;
4249 break;
4250 }
4251 }
4252
4253 if (streq(verb, "is-enabled"))
4254 r = r > 0 ? 0 : -ENOENT;
4255 else {
4256 if (n_symlinks <= 0)
4257 log_warning("Unit files contain no applicable installation information. Ignoring.");
4258
4259 if (bus &&
4260 /* Don't try to reload anything if the user asked us to not do this */
4261 !arg_no_reload &&
4262 /* Don't try to reload anything when updating a unit globally */
4263 !arg_global &&
4264 /* Don't try to reload anything if we are called for system changes but the system wasn't booted with systemd */
4265 (arg_user || sd_booted() > 0) &&
4266 /* Don't try to reload anything if we are running in a chroot environment */
4267 (arg_user || running_in_chroot() <= 0) ) {
4268 int q;
4269
4270 if ((q = daemon_reload(bus, args, n)) < 0)
4271 r = q;
4272 }
4273 }
4274
4275 finish:
4276 install_info_hashmap_free(will_install);
4277 install_info_hashmap_free(have_installed);
4278
4279 set_free_free(remove_symlinks_to);
4280
4281 lookup_paths_free(&paths);
4282
4283 free(config_path);
4284
4285 return r;
4286 }
4287
4288 static int systemctl_help(void) {
4289
4290 printf("%s [OPTIONS...] {COMMAND} ...\n\n"
4291 "Send control commands to or query the systemd manager.\n\n"
4292 " -h --help Show this help\n"
4293 " --version Show package version\n"
4294 " -t --type=TYPE List only units of a particular type\n"
4295 " -p --property=NAME Show only properties by this name\n"
4296 " -a --all Show all units/properties, including dead/empty ones\n"
4297 " --failed Show only failed units\n"
4298 " --full Don't ellipsize unit names on output\n"
4299 " --fail When queueing a new job, fail if conflicting jobs are\n"
4300 " pending\n"
4301 " --ignore-dependencies\n"
4302 " When queueing a new job, ignore all its dependencies\n"
4303 " --kill-mode=MODE How to send signal\n"
4304 " --kill-who=WHO Who to send signal to\n"
4305 " -s --signal=SIGNAL Which signal to send\n"
4306 " -H --host=[user@]host\n"
4307 " Show information for remote host\n"
4308 " -P --privileged Acquire privileges before execution\n"
4309 " -q --quiet Suppress output\n"
4310 " --no-block Do not wait until operation finished\n"
4311 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4312 " --no-reload When enabling/disabling unit files, don't reload daemon\n"
4313 " configuration\n"
4314 " --no-pager Do not pipe output into a pager.\n"
4315 " --no-ask-password\n"
4316 " Do not ask for system passwords\n"
4317 " --order When generating graph for dot, show only order\n"
4318 " --require When generating graph for dot, show only requirement\n"
4319 " --system Connect to system manager\n"
4320 " --user Connect to user service manager\n"
4321 " --global Enable/disable unit files globally\n"
4322 " -f --force When enabling unit files, override existing symlinks\n"
4323 " When shutting down, execute action immediately\n"
4324 " --defaults When disabling unit files, remove default symlinks only\n\n"
4325 "Commands:\n"
4326 " list-units List units\n"
4327 " start [NAME...] Start (activate) one or more units\n"
4328 " stop [NAME...] Stop (deactivate) one or more units\n"
4329 " reload [NAME...] Reload one or more units\n"
4330 " restart [NAME...] Start or restart one or more units\n"
4331 " try-restart [NAME...] Restart one or more units if active\n"
4332 " reload-or-restart [NAME...] Reload one or more units is possible,\n"
4333 " otherwise start or restart\n"
4334 " reload-or-try-restart [NAME...] Reload one or more units is possible,\n"
4335 " otherwise restart if active\n"
4336 " isolate [NAME] Start one unit and stop all others\n"
4337 " kill [NAME...] Send signal to processes of a unit\n"
4338 " is-active [NAME...] Check whether units are active\n"
4339 " status [NAME...|PID...] Show runtime status of one or more units\n"
4340 " show [NAME...|JOB...] Show properties of one or more\n"
4341 " units/jobs or the manager\n"
4342 " reset-failed [NAME...] Reset failed state for all, one, or more\n"
4343 " units\n"
4344 " enable [NAME...] Enable one or more unit files\n"
4345 " disable [NAME...] Disable one or more unit files\n"
4346 " is-enabled [NAME...] Check whether unit files are enabled\n"
4347 " load [NAME...] Load one or more units\n"
4348 " list-jobs List jobs\n"
4349 " cancel [JOB...] Cancel all, one, or more jobs\n"
4350 " monitor Monitor unit/job changes\n"
4351 " dump Dump server status\n"
4352 " dot Dump dependency graph for dot(1)\n"
4353 " snapshot [NAME] Create a snapshot\n"
4354 " delete [NAME...] Remove one or more snapshots\n"
4355 " daemon-reload Reload systemd manager configuration\n"
4356 " daemon-reexec Reexecute systemd manager\n"
4357 " show-environment Dump environment\n"
4358 " set-environment [NAME=VALUE...] Set one or more environment variables\n"
4359 " unset-environment [NAME...] Unset one or more environment variables\n"
4360 " default Enter system default mode\n"
4361 " rescue Enter system rescue mode\n"
4362 " emergency Enter system emergency mode\n"
4363 " halt Shut down and halt the system\n"
4364 " poweroff Shut down and power-off the system\n"
4365 " reboot Shut down and reboot the system\n"
4366 " kexec Shut down and reboot the system with kexec\n"
4367 " exit Ask for user instance termination\n",
4368 program_invocation_short_name);
4369
4370 return 0;
4371 }
4372
4373 static int halt_help(void) {
4374
4375 printf("%s [OPTIONS...]\n\n"
4376 "%s the system.\n\n"
4377 " --help Show this help\n"
4378 " --halt Halt the machine\n"
4379 " -p --poweroff Switch off the machine\n"
4380 " --reboot Reboot the machine\n"
4381 " -f --force Force immediate halt/power-off/reboot\n"
4382 " -w --wtmp-only Don't halt/power-off/reboot, just write wtmp record\n"
4383 " -d --no-wtmp Don't write wtmp record\n"
4384 " -n --no-sync Don't sync before halt/power-off/reboot\n"
4385 " --no-wall Don't send wall message before halt/power-off/reboot\n",
4386 program_invocation_short_name,
4387 arg_action == ACTION_REBOOT ? "Reboot" :
4388 arg_action == ACTION_POWEROFF ? "Power off" :
4389 "Halt");
4390
4391 return 0;
4392 }
4393
4394 static int shutdown_help(void) {
4395
4396 printf("%s [OPTIONS...] [TIME] [WALL...]\n\n"
4397 "Shut down the system.\n\n"
4398 " --help Show this help\n"
4399 " -H --halt Halt the machine\n"
4400 " -P --poweroff Power-off the machine\n"
4401 " -r --reboot Reboot the machine\n"
4402 " -h Equivalent to --poweroff, overriden by --halt\n"
4403 " -k Don't halt/power-off/reboot, just send warnings\n"
4404 " --no-wall Don't send wall message before halt/power-off/reboot\n"
4405 " -c Cancel a pending shutdown\n",
4406 program_invocation_short_name);
4407
4408 return 0;
4409 }
4410
4411 static int telinit_help(void) {
4412
4413 printf("%s [OPTIONS...] {COMMAND}\n\n"
4414 "Send control commands to the init daemon.\n\n"
4415 " --help Show this help\n"
4416 " --no-wall Don't send wall message before halt/power-off/reboot\n\n"
4417 "Commands:\n"
4418 " 0 Power-off the machine\n"
4419 " 6 Reboot the machine\n"
4420 " 2, 3, 4, 5 Start runlevelX.target unit\n"
4421 " 1, s, S Enter rescue mode\n"
4422 " q, Q Reload init daemon configuration\n"
4423 " u, U Reexecute init daemon\n",
4424 program_invocation_short_name);
4425
4426 return 0;
4427 }
4428
4429 static int runlevel_help(void) {
4430
4431 printf("%s [OPTIONS...]\n\n"
4432 "Prints the previous and current runlevel of the init system.\n\n"
4433 " --help Show this help\n",
4434 program_invocation_short_name);
4435
4436 return 0;
4437 }
4438
4439 static int systemctl_parse_argv(int argc, char *argv[]) {
4440
4441 enum {
4442 ARG_FAIL = 0x100,
4443 ARG_IGNORE_DEPENDENCIES,
4444 ARG_VERSION,
4445 ARG_USER,
4446 ARG_SYSTEM,
4447 ARG_GLOBAL,
4448 ARG_NO_BLOCK,
4449 ARG_NO_PAGER,
4450 ARG_NO_WALL,
4451 ARG_ORDER,
4452 ARG_REQUIRE,
4453 ARG_FULL,
4454 ARG_NO_RELOAD,
4455 ARG_DEFAULTS,
4456 ARG_KILL_MODE,
4457 ARG_KILL_WHO,
4458 ARG_NO_ASK_PASSWORD,
4459 ARG_FAILED
4460 };
4461
4462 static const struct option options[] = {
4463 { "help", no_argument, NULL, 'h' },
4464 { "version", no_argument, NULL, ARG_VERSION },
4465 { "type", required_argument, NULL, 't' },
4466 { "property", required_argument, NULL, 'p' },
4467 { "all", no_argument, NULL, 'a' },
4468 { "failed", no_argument, NULL, ARG_FAILED },
4469 { "full", no_argument, NULL, ARG_FULL },
4470 { "fail", no_argument, NULL, ARG_FAIL },
4471 { "ignore-dependencies", no_argument, NULL, ARG_IGNORE_DEPENDENCIES },
4472 { "user", no_argument, NULL, ARG_USER },
4473 { "system", no_argument, NULL, ARG_SYSTEM },
4474 { "global", no_argument, NULL, ARG_GLOBAL },
4475 { "no-block", no_argument, NULL, ARG_NO_BLOCK },
4476 { "no-pager", no_argument, NULL, ARG_NO_PAGER },
4477 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4478 { "quiet", no_argument, NULL, 'q' },
4479 { "order", no_argument, NULL, ARG_ORDER },
4480 { "require", no_argument, NULL, ARG_REQUIRE },
4481 { "force", no_argument, NULL, 'f' },
4482 { "no-reload", no_argument, NULL, ARG_NO_RELOAD },
4483 { "defaults", no_argument, NULL, ARG_DEFAULTS },
4484 { "kill-mode", required_argument, NULL, ARG_KILL_MODE },
4485 { "kill-who", required_argument, NULL, ARG_KILL_WHO },
4486 { "signal", required_argument, NULL, 's' },
4487 { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD },
4488 { "host", required_argument, NULL, 'H' },
4489 { "privileged",no_argument, NULL, 'P' },
4490 { NULL, 0, NULL, 0 }
4491 };
4492
4493 int c;
4494
4495 assert(argc >= 0);
4496 assert(argv);
4497
4498 /* Only when running as systemctl we ask for passwords */
4499 arg_ask_password = true;
4500
4501 while ((c = getopt_long(argc, argv, "ht:p:aqfs:H:P", options, NULL)) >= 0) {
4502
4503 switch (c) {
4504
4505 case 'h':
4506 systemctl_help();
4507 return 0;
4508
4509 case ARG_VERSION:
4510 puts(PACKAGE_STRING);
4511 puts(DISTRIBUTION);
4512 puts(SYSTEMD_FEATURES);
4513 return 0;
4514
4515 case 't':
4516 arg_type = optarg;
4517 break;
4518
4519 case 'p': {
4520 char **l;
4521
4522 if (!(l = strv_append(arg_property, optarg)))
4523 return -ENOMEM;
4524
4525 strv_free(arg_property);
4526 arg_property = l;
4527
4528 /* If the user asked for a particular
4529 * property, show it to him, even if it is
4530 * empty. */
4531 arg_all = true;
4532 break;
4533 }
4534
4535 case 'a':
4536 arg_all = true;
4537 break;
4538
4539 case ARG_FAIL:
4540 arg_job_mode = "fail";
4541 break;
4542
4543 case ARG_IGNORE_DEPENDENCIES:
4544 arg_job_mode = "ignore-dependencies";
4545 break;
4546
4547 case ARG_USER:
4548 arg_user = true;
4549 break;
4550
4551 case ARG_SYSTEM:
4552 arg_user = false;
4553 break;
4554
4555 case ARG_NO_BLOCK:
4556 arg_no_block = true;
4557 break;
4558
4559 case ARG_NO_PAGER:
4560 arg_no_pager = true;
4561 break;
4562
4563 case ARG_NO_WALL:
4564 arg_no_wall = true;
4565 break;
4566
4567 case ARG_ORDER:
4568 arg_dot = DOT_ORDER;
4569 break;
4570
4571 case ARG_REQUIRE:
4572 arg_dot = DOT_REQUIRE;
4573 break;
4574
4575 case ARG_FULL:
4576 arg_full = true;
4577 break;
4578
4579 case ARG_FAILED:
4580 arg_failed = true;
4581 break;
4582
4583 case 'q':
4584 arg_quiet = true;
4585 break;
4586
4587 case 'f':
4588 arg_force = true;
4589 break;
4590
4591 case ARG_NO_RELOAD:
4592 arg_no_reload = true;
4593 break;
4594
4595 case ARG_GLOBAL:
4596 arg_global = true;
4597 arg_user = true;
4598 break;
4599
4600 case ARG_DEFAULTS:
4601 arg_defaults = true;
4602 break;
4603
4604 case ARG_KILL_WHO:
4605 arg_kill_who = optarg;
4606 break;
4607
4608 case ARG_KILL_MODE:
4609 arg_kill_mode = optarg;
4610 break;
4611
4612 case 's':
4613 if ((arg_signal = signal_from_string_try_harder(optarg)) < 0) {
4614 log_error("Failed to parse signal string %s.", optarg);
4615 return -EINVAL;
4616 }
4617 break;
4618
4619 case ARG_NO_ASK_PASSWORD:
4620 arg_ask_password = false;
4621 break;
4622
4623 case 'P':
4624 arg_transport = TRANSPORT_POLKIT;
4625 break;
4626
4627 case 'H':
4628 arg_transport = TRANSPORT_SSH;
4629 arg_host = optarg;
4630 break;
4631
4632 case '?':
4633 return -EINVAL;
4634
4635 default:
4636 log_error("Unknown option code %c", c);
4637 return -EINVAL;
4638 }
4639 }
4640
4641 if (arg_transport != TRANSPORT_NORMAL && arg_user) {
4642 log_error("Cannot access user instance remotely.");
4643 return -EINVAL;
4644 }
4645
4646 return 1;
4647 }
4648
4649 static int halt_parse_argv(int argc, char *argv[]) {
4650
4651 enum {
4652 ARG_HELP = 0x100,
4653 ARG_HALT,
4654 ARG_REBOOT,
4655 ARG_NO_WALL
4656 };
4657
4658 static const struct option options[] = {
4659 { "help", no_argument, NULL, ARG_HELP },
4660 { "halt", no_argument, NULL, ARG_HALT },
4661 { "poweroff", no_argument, NULL, 'p' },
4662 { "reboot", no_argument, NULL, ARG_REBOOT },
4663 { "force", no_argument, NULL, 'f' },
4664 { "wtmp-only", no_argument, NULL, 'w' },
4665 { "no-wtmp", no_argument, NULL, 'd' },
4666 { "no-sync", no_argument, NULL, 'n' },
4667 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4668 { NULL, 0, NULL, 0 }
4669 };
4670
4671 int c, runlevel;
4672
4673 assert(argc >= 0);
4674 assert(argv);
4675
4676 if (utmp_get_runlevel(&runlevel, NULL) >= 0)
4677 if (runlevel == '0' || runlevel == '6')
4678 arg_immediate = true;
4679
4680 while ((c = getopt_long(argc, argv, "pfwdnih", options, NULL)) >= 0) {
4681 switch (c) {
4682
4683 case ARG_HELP:
4684 halt_help();
4685 return 0;
4686
4687 case ARG_HALT:
4688 arg_action = ACTION_HALT;
4689 break;
4690
4691 case 'p':
4692 if (arg_action != ACTION_REBOOT)
4693 arg_action = ACTION_POWEROFF;
4694 break;
4695
4696 case ARG_REBOOT:
4697 arg_action = ACTION_REBOOT;
4698 break;
4699
4700 case 'f':
4701 arg_immediate = true;
4702 break;
4703
4704 case 'w':
4705 arg_dry = true;
4706 break;
4707
4708 case 'd':
4709 arg_no_wtmp = true;
4710 break;
4711
4712 case 'n':
4713 arg_no_sync = true;
4714 break;
4715
4716 case ARG_NO_WALL:
4717 arg_no_wall = true;
4718 break;
4719
4720 case 'i':
4721 case 'h':
4722 /* Compatibility nops */
4723 break;
4724
4725 case '?':
4726 return -EINVAL;
4727
4728 default:
4729 log_error("Unknown option code %c", c);
4730 return -EINVAL;
4731 }
4732 }
4733
4734 if (optind < argc) {
4735 log_error("Too many arguments.");
4736 return -EINVAL;
4737 }
4738
4739 return 1;
4740 }
4741
4742 static int parse_time_spec(const char *t, usec_t *_u) {
4743 assert(t);
4744 assert(_u);
4745
4746 if (streq(t, "now"))
4747 *_u = 0;
4748 else if (t[0] == '+') {
4749 uint64_t u;
4750
4751 if (safe_atou64(t + 1, &u) < 0)
4752 return -EINVAL;
4753
4754 *_u = now(CLOCK_REALTIME) + USEC_PER_MINUTE * u;
4755 } else {
4756 char *e = NULL;
4757 long hour, minute;
4758 struct tm tm;
4759 time_t s;
4760 usec_t n;
4761
4762 errno = 0;
4763 hour = strtol(t, &e, 10);
4764 if (errno != 0 || *e != ':' || hour < 0 || hour > 23)
4765 return -EINVAL;
4766
4767 minute = strtol(e+1, &e, 10);
4768 if (errno != 0 || *e != 0 || minute < 0 || minute > 59)
4769 return -EINVAL;
4770
4771 n = now(CLOCK_REALTIME);
4772 s = (time_t) (n / USEC_PER_SEC);
4773
4774 zero(tm);
4775 assert_se(localtime_r(&s, &tm));
4776
4777 tm.tm_hour = (int) hour;
4778 tm.tm_min = (int) minute;
4779 tm.tm_sec = 0;
4780
4781 assert_se(s = mktime(&tm));
4782
4783 *_u = (usec_t) s * USEC_PER_SEC;
4784
4785 while (*_u <= n)
4786 *_u += USEC_PER_DAY;
4787 }
4788
4789 return 0;
4790 }
4791
4792 static bool kexec_loaded(void) {
4793 bool loaded = false;
4794 char *s;
4795
4796 if (read_one_line_file("/sys/kernel/kexec_loaded", &s) >= 0) {
4797 if (s[0] == '1')
4798 loaded = true;
4799 free(s);
4800 }
4801 return loaded;
4802 }
4803
4804 static int shutdown_parse_argv(int argc, char *argv[]) {
4805
4806 enum {
4807 ARG_HELP = 0x100,
4808 ARG_NO_WALL
4809 };
4810
4811 static const struct option options[] = {
4812 { "help", no_argument, NULL, ARG_HELP },
4813 { "halt", no_argument, NULL, 'H' },
4814 { "poweroff", no_argument, NULL, 'P' },
4815 { "reboot", no_argument, NULL, 'r' },
4816 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4817 { NULL, 0, NULL, 0 }
4818 };
4819
4820 int c, r;
4821
4822 assert(argc >= 0);
4823 assert(argv);
4824
4825 while ((c = getopt_long(argc, argv, "HPrhkt:afFc", options, NULL)) >= 0) {
4826 switch (c) {
4827
4828 case ARG_HELP:
4829 shutdown_help();
4830 return 0;
4831
4832 case 'H':
4833 arg_action = ACTION_HALT;
4834 break;
4835
4836 case 'P':
4837 arg_action = ACTION_POWEROFF;
4838 break;
4839
4840 case 'r':
4841 if (kexec_loaded())
4842 arg_action = ACTION_KEXEC;
4843 else
4844 arg_action = ACTION_REBOOT;
4845 break;
4846
4847 case 'h':
4848 if (arg_action != ACTION_HALT)
4849 arg_action = ACTION_POWEROFF;
4850 break;
4851
4852 case 'k':
4853 arg_dry = true;
4854 break;
4855
4856 case ARG_NO_WALL:
4857 arg_no_wall = true;
4858 break;
4859
4860 case 't':
4861 case 'a':
4862 /* Compatibility nops */
4863 break;
4864
4865 case 'c':
4866 arg_action = ACTION_CANCEL_SHUTDOWN;
4867 break;
4868
4869 case '?':
4870 return -EINVAL;
4871
4872 default:
4873 log_error("Unknown option code %c", c);
4874 return -EINVAL;
4875 }
4876 }
4877
4878 if (argc > optind) {
4879 if ((r = parse_time_spec(argv[optind], &arg_when)) < 0) {
4880 log_error("Failed to parse time specification: %s", argv[optind]);
4881 return r;
4882 }
4883 } else
4884 arg_when = now(CLOCK_REALTIME) + USEC_PER_MINUTE;
4885
4886 /* We skip the time argument */
4887 if (argc > optind + 1)
4888 arg_wall = argv + optind + 1;
4889
4890 optind = argc;
4891
4892 return 1;
4893 }
4894
4895 static int telinit_parse_argv(int argc, char *argv[]) {
4896
4897 enum {
4898 ARG_HELP = 0x100,
4899 ARG_NO_WALL
4900 };
4901
4902 static const struct option options[] = {
4903 { "help", no_argument, NULL, ARG_HELP },
4904 { "no-wall", no_argument, NULL, ARG_NO_WALL },
4905 { NULL, 0, NULL, 0 }
4906 };
4907
4908 static const struct {
4909 char from;
4910 enum action to;
4911 } table[] = {
4912 { '0', ACTION_POWEROFF },
4913 { '6', ACTION_REBOOT },
4914 { '1', ACTION_RESCUE },
4915 { '2', ACTION_RUNLEVEL2 },
4916 { '3', ACTION_RUNLEVEL3 },
4917 { '4', ACTION_RUNLEVEL4 },
4918 { '5', ACTION_RUNLEVEL5 },
4919 { 's', ACTION_RESCUE },
4920 { 'S', ACTION_RESCUE },
4921 { 'q', ACTION_RELOAD },
4922 { 'Q', ACTION_RELOAD },
4923 { 'u', ACTION_REEXEC },
4924 { 'U', ACTION_REEXEC }
4925 };
4926
4927 unsigned i;
4928 int c;
4929
4930 assert(argc >= 0);
4931 assert(argv);
4932
4933 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
4934 switch (c) {
4935
4936 case ARG_HELP:
4937 telinit_help();
4938 return 0;
4939
4940 case ARG_NO_WALL:
4941 arg_no_wall = true;
4942 break;
4943
4944 case '?':
4945 return -EINVAL;
4946
4947 default:
4948 log_error("Unknown option code %c", c);
4949 return -EINVAL;
4950 }
4951 }
4952
4953 if (optind >= argc) {
4954 telinit_help();
4955 return -EINVAL;
4956 }
4957
4958 if (optind + 1 < argc) {
4959 log_error("Too many arguments.");
4960 return -EINVAL;
4961 }
4962
4963 if (strlen(argv[optind]) != 1) {
4964 log_error("Expected single character argument.");
4965 return -EINVAL;
4966 }
4967
4968 for (i = 0; i < ELEMENTSOF(table); i++)
4969 if (table[i].from == argv[optind][0])
4970 break;
4971
4972 if (i >= ELEMENTSOF(table)) {
4973 log_error("Unknown command %s.", argv[optind]);
4974 return -EINVAL;
4975 }
4976
4977 arg_action = table[i].to;
4978
4979 optind ++;
4980
4981 return 1;
4982 }
4983
4984 static int runlevel_parse_argv(int argc, char *argv[]) {
4985
4986 enum {
4987 ARG_HELP = 0x100,
4988 };
4989
4990 static const struct option options[] = {
4991 { "help", no_argument, NULL, ARG_HELP },
4992 { NULL, 0, NULL, 0 }
4993 };
4994
4995 int c;
4996
4997 assert(argc >= 0);
4998 assert(argv);
4999
5000 while ((c = getopt_long(argc, argv, "", options, NULL)) >= 0) {
5001 switch (c) {
5002
5003 case ARG_HELP:
5004 runlevel_help();
5005 return 0;
5006
5007 case '?':
5008 return -EINVAL;
5009
5010 default:
5011 log_error("Unknown option code %c", c);
5012 return -EINVAL;
5013 }
5014 }
5015
5016 if (optind < argc) {
5017 log_error("Too many arguments.");
5018 return -EINVAL;
5019 }
5020
5021 return 1;
5022 }
5023
5024 static int parse_argv(int argc, char *argv[]) {
5025 assert(argc >= 0);
5026 assert(argv);
5027
5028 if (program_invocation_short_name) {
5029
5030 if (strstr(program_invocation_short_name, "halt")) {
5031 arg_action = ACTION_HALT;
5032 return halt_parse_argv(argc, argv);
5033 } else if (strstr(program_invocation_short_name, "poweroff")) {
5034 arg_action = ACTION_POWEROFF;
5035 return halt_parse_argv(argc, argv);
5036 } else if (strstr(program_invocation_short_name, "reboot")) {
5037 if (kexec_loaded())
5038 arg_action = ACTION_KEXEC;
5039 else
5040 arg_action = ACTION_REBOOT;
5041 return halt_parse_argv(argc, argv);
5042 } else if (strstr(program_invocation_short_name, "shutdown")) {
5043 arg_action = ACTION_POWEROFF;
5044 return shutdown_parse_argv(argc, argv);
5045 } else if (strstr(program_invocation_short_name, "init")) {
5046
5047 if (sd_booted() > 0) {
5048 arg_action = ACTION_INVALID;
5049 return telinit_parse_argv(argc, argv);
5050 } else {
5051 /* Hmm, so some other init system is
5052 * running, we need to forward this
5053 * request to it. For now we simply
5054 * guess that it is Upstart. */
5055
5056 execv("/lib/upstart/telinit", argv);
5057
5058 log_error("Couldn't find an alternative telinit implementation to spawn.");
5059 return -EIO;
5060 }
5061
5062 } else if (strstr(program_invocation_short_name, "runlevel")) {
5063 arg_action = ACTION_RUNLEVEL;
5064 return runlevel_parse_argv(argc, argv);
5065 }
5066 }
5067
5068 arg_action = ACTION_SYSTEMCTL;
5069 return systemctl_parse_argv(argc, argv);
5070 }
5071
5072 static int action_to_runlevel(void) {
5073
5074 static const char table[_ACTION_MAX] = {
5075 [ACTION_HALT] = '0',
5076 [ACTION_POWEROFF] = '0',
5077 [ACTION_REBOOT] = '6',
5078 [ACTION_RUNLEVEL2] = '2',
5079 [ACTION_RUNLEVEL3] = '3',
5080 [ACTION_RUNLEVEL4] = '4',
5081 [ACTION_RUNLEVEL5] = '5',
5082 [ACTION_RESCUE] = '1'
5083 };
5084
5085 assert(arg_action < _ACTION_MAX);
5086
5087 return table[arg_action];
5088 }
5089
5090 static int talk_upstart(void) {
5091 DBusMessage *m = NULL, *reply = NULL;
5092 DBusError error;
5093 int previous, rl, r;
5094 char
5095 env1_buf[] = "RUNLEVEL=X",
5096 env2_buf[] = "PREVLEVEL=X";
5097 char *env1 = env1_buf, *env2 = env2_buf;
5098 const char *emit = "runlevel";
5099 dbus_bool_t b_false = FALSE;
5100 DBusMessageIter iter, sub;
5101 DBusConnection *bus;
5102
5103 dbus_error_init(&error);
5104
5105 if (!(rl = action_to_runlevel()))
5106 return 0;
5107
5108 if (utmp_get_runlevel(&previous, NULL) < 0)
5109 previous = 'N';
5110
5111 if (!(bus = dbus_connection_open_private("unix:abstract=/com/ubuntu/upstart", &error))) {
5112 if (dbus_error_has_name(&error, DBUS_ERROR_NO_SERVER)) {
5113 r = 0;
5114 goto finish;
5115 }
5116
5117 log_error("Failed to connect to Upstart bus: %s", bus_error_message(&error));
5118 r = -EIO;
5119 goto finish;
5120 }
5121
5122 if ((r = bus_check_peercred(bus)) < 0) {
5123 log_error("Failed to verify owner of bus.");
5124 goto finish;
5125 }
5126
5127 if (!(m = dbus_message_new_method_call(
5128 "com.ubuntu.Upstart",
5129 "/com/ubuntu/Upstart",
5130 "com.ubuntu.Upstart0_6",
5131 "EmitEvent"))) {
5132
5133 log_error("Could not allocate message.");
5134 r = -ENOMEM;
5135 goto finish;
5136 }
5137
5138 dbus_message_iter_init_append(m, &iter);
5139
5140 env1_buf[sizeof(env1_buf)-2] = rl;
5141 env2_buf[sizeof(env2_buf)-2] = previous;
5142
5143 if (!dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &emit) ||
5144 !dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY, "s", &sub) ||
5145 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env1) ||
5146 !dbus_message_iter_append_basic(&sub, DBUS_TYPE_STRING, &env2) ||
5147 !dbus_message_iter_close_container(&iter, &sub) ||
5148 !dbus_message_iter_append_basic(&iter, DBUS_TYPE_BOOLEAN, &b_false)) {
5149 log_error("Could not append arguments to message.");
5150 r = -ENOMEM;
5151 goto finish;
5152 }
5153
5154 if (!(reply = dbus_connection_send_with_reply_and_block(bus, m, -1, &error))) {
5155
5156 if (error_is_no_service(&error)) {
5157 r = -EADDRNOTAVAIL;
5158 goto finish;
5159 }
5160
5161 log_error("Failed to issue method call: %s", bus_error_message(&error));
5162 r = -EIO;
5163 goto finish;
5164 }
5165
5166 r = 0;
5167
5168 finish:
5169 if (m)
5170 dbus_message_unref(m);
5171
5172 if (reply)
5173 dbus_message_unref(reply);
5174
5175 if (bus) {
5176 dbus_connection_flush(bus);
5177 dbus_connection_close(bus);
5178 dbus_connection_unref(bus);
5179 }
5180
5181 dbus_error_free(&error);
5182
5183 return r;
5184 }
5185
5186 static int talk_initctl(void) {
5187 struct init_request request;
5188 int r, fd;
5189 char rl;
5190
5191 if (!(rl = action_to_runlevel()))
5192 return 0;
5193
5194 zero(request);
5195 request.magic = INIT_MAGIC;
5196 request.sleeptime = 0;
5197 request.cmd = INIT_CMD_RUNLVL;
5198 request.runlevel = rl;
5199
5200 if ((fd = open(INIT_FIFO, O_WRONLY|O_NDELAY|O_CLOEXEC|O_NOCTTY)) < 0) {
5201
5202 if (errno == ENOENT)
5203 return 0;
5204
5205 log_error("Failed to open "INIT_FIFO": %m");
5206 return -errno;
5207 }
5208
5209 errno = 0;
5210 r = loop_write(fd, &request, sizeof(request), false) != sizeof(request);
5211 close_nointr_nofail(fd);
5212
5213 if (r < 0) {
5214 log_error("Failed to write to "INIT_FIFO": %m");
5215 return errno ? -errno : -EIO;
5216 }
5217
5218 return 1;
5219 }
5220
5221 static int systemctl_main(DBusConnection *bus, int argc, char *argv[], DBusError *error) {
5222
5223 static const struct {
5224 const char* verb;
5225 const enum {
5226 MORE,
5227 LESS,
5228 EQUAL
5229 } argc_cmp;
5230 const int argc;
5231 int (* const dispatch)(DBusConnection *bus, char **args, unsigned n);
5232 } verbs[] = {
5233 { "list-units", LESS, 1, list_units },
5234 { "list-jobs", EQUAL, 1, list_jobs },
5235 { "clear-jobs", EQUAL, 1, daemon_reload },
5236 { "load", MORE, 2, load_unit },
5237 { "cancel", MORE, 2, cancel_job },
5238 { "start", MORE, 2, start_unit },
5239 { "stop", MORE, 2, start_unit },
5240 { "condstop", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5241 { "reload", MORE, 2, start_unit },
5242 { "restart", MORE, 2, start_unit },
5243 { "try-restart", MORE, 2, start_unit },
5244 { "reload-or-restart", MORE, 2, start_unit },
5245 { "reload-or-try-restart", MORE, 2, start_unit },
5246 { "force-reload", MORE, 2, start_unit }, /* For compatibility with SysV */
5247 { "condreload", MORE, 2, start_unit }, /* For compatibility with ALTLinux */
5248 { "condrestart", MORE, 2, start_unit }, /* For compatibility with RH */
5249 { "isolate", EQUAL, 2, start_unit },
5250 { "kill", MORE, 2, kill_unit },
5251 { "is-active", MORE, 2, check_unit },
5252 { "check", MORE, 2, check_unit },
5253 { "show", MORE, 1, show },
5254 { "status", MORE, 2, show },
5255 { "monitor", EQUAL, 1, monitor },
5256 { "dump", EQUAL, 1, dump },
5257 { "dot", EQUAL, 1, dot },
5258 { "snapshot", LESS, 2, snapshot },
5259 { "delete", MORE, 2, delete_snapshot },
5260 { "daemon-reload", EQUAL, 1, daemon_reload },
5261 { "daemon-reexec", EQUAL, 1, daemon_reload },
5262 { "show-environment", EQUAL, 1, show_enviroment },
5263 { "set-environment", MORE, 2, set_environment },
5264 { "unset-environment", MORE, 2, set_environment },
5265 { "halt", EQUAL, 1, start_special },
5266 { "poweroff", EQUAL, 1, start_special },
5267 { "reboot", EQUAL, 1, start_special },
5268 { "kexec", EQUAL, 1, start_special },
5269 { "default", EQUAL, 1, start_special },
5270 { "rescue", EQUAL, 1, start_special },
5271 { "emergency", EQUAL, 1, start_special },
5272 { "exit", EQUAL, 1, start_special },
5273 { "reset-failed", MORE, 1, reset_failed },
5274 { "enable", MORE, 2, enable_unit },
5275 { "disable", MORE, 2, enable_unit },
5276 { "is-enabled", MORE, 2, enable_unit }
5277 };
5278
5279 int left;
5280 unsigned i;
5281
5282 assert(argc >= 0);
5283 assert(argv);
5284 assert(error);
5285
5286 left = argc - optind;
5287
5288 if (left <= 0)
5289 /* Special rule: no arguments means "list-units" */
5290 i = 0;
5291 else {
5292 if (streq(argv[optind], "help")) {
5293 systemctl_help();
5294 return 0;
5295 }
5296
5297 for (i = 0; i < ELEMENTSOF(verbs); i++)
5298 if (streq(argv[optind], verbs[i].verb))
5299 break;
5300
5301 if (i >= ELEMENTSOF(verbs)) {
5302 log_error("Unknown operation %s", argv[optind]);
5303 return -EINVAL;
5304 }
5305 }
5306
5307 switch (verbs[i].argc_cmp) {
5308
5309 case EQUAL:
5310 if (left != verbs[i].argc) {
5311 log_error("Invalid number of arguments.");
5312 return -EINVAL;
5313 }
5314
5315 break;
5316
5317 case MORE:
5318 if (left < verbs[i].argc) {
5319 log_error("Too few arguments.");
5320 return -EINVAL;
5321 }
5322
5323 break;
5324
5325 case LESS:
5326 if (left > verbs[i].argc) {
5327 log_error("Too many arguments.");
5328 return -EINVAL;
5329 }
5330
5331 break;
5332
5333 default:
5334 assert_not_reached("Unknown comparison operator.");
5335 }
5336
5337 /* Require a bus connection for all operations but
5338 * enable/disable */
5339 if (!streq(verbs[i].verb, "enable") &&
5340 !streq(verbs[i].verb, "disable") &&
5341 !bus) {
5342 log_error("Failed to get D-Bus connection: %s", error->message);
5343 return -EIO;
5344 }
5345
5346 return verbs[i].dispatch(bus, argv + optind, left);
5347 }
5348
5349 static int send_shutdownd(usec_t t, char mode, bool warn, const char *message) {
5350 int fd = -1;
5351 struct msghdr msghdr;
5352 struct iovec iovec;
5353 union sockaddr_union sockaddr;
5354 struct shutdownd_command c;
5355
5356 zero(c);
5357 c.elapse = t;
5358 c.mode = mode;
5359 c.warn_wall = warn;
5360
5361 if (message)
5362 strncpy(c.wall_message, message, sizeof(c.wall_message));
5363
5364 if ((fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0)
5365 return -errno;
5366
5367 zero(sockaddr);
5368 sockaddr.sa.sa_family = AF_UNIX;
5369 sockaddr.un.sun_path[0] = 0;
5370 strncpy(sockaddr.un.sun_path, "/run/systemd/shutdownd", sizeof(sockaddr.un.sun_path));
5371
5372 zero(iovec);
5373 iovec.iov_base = (char*) &c;
5374 iovec.iov_len = sizeof(c);
5375
5376 zero(msghdr);
5377 msghdr.msg_name = &sockaddr;
5378 msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + sizeof("/run/systemd/shutdownd") - 1;
5379
5380 msghdr.msg_iov = &iovec;
5381 msghdr.msg_iovlen = 1;
5382
5383 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0) {
5384 close_nointr_nofail(fd);
5385 return -errno;
5386 }
5387
5388 close_nointr_nofail(fd);
5389 return 0;
5390 }
5391
5392 static int reload_with_fallback(DBusConnection *bus) {
5393
5394 if (bus) {
5395 /* First, try systemd via D-Bus. */
5396 if (daemon_reload(bus, NULL, 0) > 0)
5397 return 0;
5398 }
5399
5400 /* Nothing else worked, so let's try signals */
5401 assert(arg_action == ACTION_RELOAD || arg_action == ACTION_REEXEC);
5402
5403 if (kill(1, arg_action == ACTION_RELOAD ? SIGHUP : SIGTERM) < 0) {
5404 log_error("kill() failed: %m");
5405 return -errno;
5406 }
5407
5408 return 0;
5409 }
5410
5411 static int start_with_fallback(DBusConnection *bus) {
5412
5413 if (bus) {
5414 /* First, try systemd via D-Bus. */
5415 if (start_unit(bus, NULL, 0) >= 0)
5416 goto done;
5417 }
5418
5419 /* Hmm, talking to systemd via D-Bus didn't work. Then
5420 * let's try to talk to Upstart via D-Bus. */
5421 if (talk_upstart() > 0)
5422 goto done;
5423
5424 /* Nothing else worked, so let's try
5425 * /dev/initctl */
5426 if (talk_initctl() > 0)
5427 goto done;
5428
5429 log_error("Failed to talk to init daemon.");
5430 return -EIO;
5431
5432 done:
5433 warn_wall(arg_action);
5434 return 0;
5435 }
5436
5437 static int halt_main(DBusConnection *bus) {
5438 int r;
5439
5440 if (geteuid() != 0) {
5441 log_error("Must be root.");
5442 return -EPERM;
5443 }
5444
5445 if (arg_when > 0) {
5446 char *m;
5447 char date[FORMAT_TIMESTAMP_MAX];
5448
5449 m = strv_join(arg_wall, " ");
5450 r = send_shutdownd(arg_when,
5451 arg_action == ACTION_HALT ? 'H' :
5452 arg_action == ACTION_POWEROFF ? 'P' :
5453 'r',
5454 !arg_no_wall,
5455 m);
5456 free(m);
5457
5458 if (r < 0)
5459 log_warning("Failed to talk to shutdownd, proceeding with immediate shutdown: %s", strerror(-r));
5460 else {
5461 log_info("Shutdown scheduled for %s, use 'shutdown -c' to cancel.",
5462 format_timestamp(date, sizeof(date), arg_when));
5463 return 0;
5464 }
5465 }
5466
5467 if (!arg_dry && !arg_immediate)
5468 return start_with_fallback(bus);
5469
5470 if (!arg_no_wtmp) {
5471 if (sd_booted() > 0)
5472 log_debug("Not writing utmp record, assuming that systemd-update-utmp is used.");
5473 else if ((r = utmp_put_shutdown(0)) < 0)
5474 log_warning("Failed to write utmp record: %s", strerror(-r));
5475 }
5476
5477 if (!arg_no_sync)
5478 sync();
5479
5480 if (arg_dry)
5481 return 0;
5482
5483 /* Make sure C-A-D is handled by the kernel from this
5484 * point on... */
5485 reboot(RB_ENABLE_CAD);
5486
5487 switch (arg_action) {
5488
5489 case ACTION_HALT:
5490 log_info("Halting.");
5491 reboot(RB_HALT_SYSTEM);
5492 break;
5493
5494 case ACTION_POWEROFF:
5495 log_info("Powering off.");
5496 reboot(RB_POWER_OFF);
5497 break;
5498
5499 case ACTION_REBOOT:
5500 log_info("Rebooting.");
5501 reboot(RB_AUTOBOOT);
5502 break;
5503
5504 default:
5505 assert_not_reached("Unknown halt action.");
5506 }
5507
5508 /* We should never reach this. */
5509 return -ENOSYS;
5510 }
5511
5512 static int runlevel_main(void) {
5513 int r, runlevel, previous;
5514
5515 if ((r = utmp_get_runlevel(&runlevel, &previous)) < 0) {
5516 printf("unknown\n");
5517 return r;
5518 }
5519
5520 printf("%c %c\n",
5521 previous <= 0 ? 'N' : previous,
5522 runlevel <= 0 ? 'N' : runlevel);
5523
5524 return 0;
5525 }
5526
5527 static void pager_open(void) {
5528 int fd[2];
5529 const char *pager;
5530 pid_t parent_pid;
5531
5532 if (pager_pid > 0)
5533 return;
5534
5535 if (!on_tty() || arg_no_pager)
5536 return;
5537
5538 if ((pager = getenv("PAGER")))
5539 if (!*pager || streq(pager, "cat"))
5540 return;
5541
5542 /* Determine and cache number of columns before we spawn the
5543 * pager so that we get the value from the actual tty */
5544 columns();
5545
5546 if (pipe(fd) < 0) {
5547 log_error("Failed to create pager pipe: %m");
5548 return;
5549 }
5550
5551 parent_pid = getpid();
5552
5553 pager_pid = fork();
5554 if (pager_pid < 0) {
5555 log_error("Failed to fork pager: %m");
5556 close_pipe(fd);
5557 return;
5558 }
5559
5560 /* In the child start the pager */
5561 if (pager_pid == 0) {
5562
5563 dup2(fd[0], STDIN_FILENO);
5564 close_pipe(fd);
5565
5566 setenv("LESS", "FRSX", 0);
5567
5568 /* Make sure the pager goes away when the parent dies */
5569 if (prctl(PR_SET_PDEATHSIG, SIGTERM) < 0)
5570 _exit(EXIT_FAILURE);
5571
5572 /* Check whether our parent died before we were able
5573 * to set the death signal */
5574 if (getppid() != parent_pid)
5575 _exit(EXIT_SUCCESS);
5576
5577 if (pager) {
5578 execlp(pager, pager, NULL);
5579 execl("/bin/sh", "sh", "-c", pager, NULL);
5580 } else {
5581 /* Debian's alternatives command for pagers is
5582 * called 'pager'. Note that we do not call
5583 * sensible-pagers here, since that is just a
5584 * shell script that implements a logic that
5585 * is similar to this one anyway, but is
5586 * Debian-specific. */
5587 execlp("pager", "pager", NULL);
5588
5589 execlp("less", "less", NULL);
5590 execlp("more", "more", NULL);
5591 }
5592
5593 log_error("Unable to execute pager: %m");
5594 _exit(EXIT_FAILURE);
5595 }
5596
5597 /* Return in the parent */
5598 if (dup2(fd[1], STDOUT_FILENO) < 0)
5599 log_error("Failed to duplicate pager pipe: %m");
5600
5601 close_pipe(fd);
5602 }
5603
5604 static void pager_close(void) {
5605 siginfo_t dummy;
5606
5607 if (pager_pid <= 0)
5608 return;
5609
5610 /* Inform pager that we are done */
5611 fclose(stdout);
5612 kill(pager_pid, SIGCONT);
5613 wait_for_terminate(pager_pid, &dummy);
5614 pager_pid = 0;
5615 }
5616
5617 static void agent_close(void) {
5618 siginfo_t dummy;
5619
5620 if (agent_pid <= 0)
5621 return;
5622
5623 /* Inform agent that we are done */
5624 kill(agent_pid, SIGTERM);
5625 kill(agent_pid, SIGCONT);
5626 wait_for_terminate(agent_pid, &dummy);
5627 agent_pid = 0;
5628 }
5629
5630 int main(int argc, char*argv[]) {
5631 int r, retval = EXIT_FAILURE;
5632 DBusConnection *bus = NULL;
5633 DBusError error;
5634
5635 dbus_error_init(&error);
5636
5637 log_parse_environment();
5638 log_open();
5639
5640 if ((r = parse_argv(argc, argv)) < 0)
5641 goto finish;
5642 else if (r == 0) {
5643 retval = EXIT_SUCCESS;
5644 goto finish;
5645 }
5646
5647 /* /sbin/runlevel doesn't need to communicate via D-Bus, so
5648 * let's shortcut this */
5649 if (arg_action == ACTION_RUNLEVEL) {
5650 r = runlevel_main();
5651 retval = r < 0 ? EXIT_FAILURE : r;
5652 goto finish;
5653 }
5654
5655 if (arg_transport == TRANSPORT_NORMAL)
5656 bus_connect(arg_user ? DBUS_BUS_SESSION : DBUS_BUS_SYSTEM, &bus, &private_bus, &error);
5657 else if (arg_transport == TRANSPORT_POLKIT) {
5658 bus_connect_system_polkit(&bus, &error);
5659 private_bus = false;
5660 } else if (arg_transport == TRANSPORT_SSH) {
5661 bus_connect_system_ssh(NULL, arg_host, &bus, &error);
5662 private_bus = false;
5663 } else
5664 assert_not_reached("Uh, invalid transport...");
5665
5666 switch (arg_action) {
5667
5668 case ACTION_SYSTEMCTL:
5669 r = systemctl_main(bus, argc, argv, &error);
5670 break;
5671
5672 case ACTION_HALT:
5673 case ACTION_POWEROFF:
5674 case ACTION_REBOOT:
5675 case ACTION_KEXEC:
5676 r = halt_main(bus);
5677 break;
5678
5679 case ACTION_RUNLEVEL2:
5680 case ACTION_RUNLEVEL3:
5681 case ACTION_RUNLEVEL4:
5682 case ACTION_RUNLEVEL5:
5683 case ACTION_RESCUE:
5684 case ACTION_EMERGENCY:
5685 case ACTION_DEFAULT:
5686 r = start_with_fallback(bus);
5687 break;
5688
5689 case ACTION_RELOAD:
5690 case ACTION_REEXEC:
5691 r = reload_with_fallback(bus);
5692 break;
5693
5694 case ACTION_CANCEL_SHUTDOWN:
5695 r = send_shutdownd(0, 0, false, NULL);
5696 break;
5697
5698 case ACTION_INVALID:
5699 case ACTION_RUNLEVEL:
5700 default:
5701 assert_not_reached("Unknown action");
5702 }
5703
5704 retval = r < 0 ? EXIT_FAILURE : r;
5705
5706 finish:
5707
5708 if (bus) {
5709 dbus_connection_flush(bus);
5710 dbus_connection_close(bus);
5711 dbus_connection_unref(bus);
5712 }
5713
5714 dbus_error_free(&error);
5715
5716 dbus_shutdown();
5717
5718 strv_free(arg_property);
5719
5720 pager_close();
5721 agent_close();
5722
5723 return retval;
5724 }