1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
25 #include <sys/epoll.h>
26 #include <sys/timerfd.h>
33 #include "sd-messages.h"
38 #include "path-util.h"
39 #include "load-fragment.h"
40 #include "load-dropin.h"
42 #include "unit-name.h"
43 #include "dbus-unit.h"
45 #include "cgroup-util.h"
49 #include "fileio-label.h"
50 #include "bus-errors.h"
55 const UnitVTable * const unit_vtable[_UNIT_TYPE_MAX] = {
56 [UNIT_SERVICE] = &service_vtable,
57 [UNIT_SOCKET] = &socket_vtable,
58 [UNIT_BUSNAME] = &busname_vtable,
59 [UNIT_TARGET] = &target_vtable,
60 [UNIT_SNAPSHOT] = &snapshot_vtable,
61 [UNIT_DEVICE] = &device_vtable,
62 [UNIT_MOUNT] = &mount_vtable,
63 [UNIT_AUTOMOUNT] = &automount_vtable,
64 [UNIT_SWAP] = &swap_vtable,
65 [UNIT_TIMER] = &timer_vtable,
66 [UNIT_PATH] = &path_vtable,
67 [UNIT_SLICE] = &slice_vtable,
68 [UNIT_SCOPE] = &scope_vtable
71 Unit *unit_new(Manager *m, size_t size) {
75 assert(size >= sizeof(Unit));
81 u->names = set_new(string_hash_func, string_compare_func);
88 u->type = _UNIT_TYPE_INVALID;
89 u->deserialized_job = _JOB_TYPE_INVALID;
90 u->default_dependencies = true;
91 u->unit_file_state = _UNIT_FILE_STATE_INVALID;
92 u->on_failure_job_mode = JOB_REPLACE;
97 bool unit_has_name(Unit *u, const char *name) {
101 return !!set_get(u->names, (char*) name);
104 int unit_add_name(Unit *u, const char *text) {
112 if (unit_name_is_template(text)) {
116 s = unit_name_replace_instance(text, u->instance);
123 if (!unit_name_is_valid(s, TEMPLATE_INVALID)) {
128 assert_se((t = unit_name_to_type(s)) >= 0);
130 if (u->type != _UNIT_TYPE_INVALID && t != u->type) {
135 r = unit_name_to_instance(s, &i);
139 if (i && unit_vtable[t]->no_instances) {
144 /* Ensure that this unit is either instanced or not instanced,
146 if (u->type != _UNIT_TYPE_INVALID && !u->instance != !i) {
151 if (unit_vtable[t]->no_alias &&
152 !set_isempty(u->names) &&
153 !set_get(u->names, s)) {
158 if (hashmap_size(u->manager->units) >= MANAGER_MAX_NAMES) {
163 r = set_put(u->names, s);
170 r = hashmap_put(u->manager->units, s, u);
172 set_remove(u->names, s);
176 if (u->type == _UNIT_TYPE_INVALID) {
182 LIST_PREPEND(units_by_type, u->manager->units_by_type[t], u);
184 if (UNIT_VTABLE(u)->init)
185 UNIT_VTABLE(u)->init(u);
189 unit_add_to_dbus_queue(u);
199 int unit_choose_id(Unit *u, const char *name) {
201 _cleanup_free_ char *t = NULL;
207 if (unit_name_is_template(name)) {
212 t = unit_name_replace_instance(name, u->instance);
219 /* Selects one of the names of this unit as the id */
220 s = set_get(u->names, (char*) name);
225 r = unit_name_to_instance(s, &i);
234 unit_add_to_dbus_queue(u);
239 int unit_set_description(Unit *u, const char *description) {
244 if (isempty(description))
247 s = strdup(description);
252 free(u->description);
255 unit_add_to_dbus_queue(u);
259 bool unit_check_gc(Unit *u) {
262 if (u->load_state == UNIT_STUB)
265 if (UNIT_VTABLE(u)->no_gc)
277 if (unit_active_state(u) != UNIT_INACTIVE)
283 if (UNIT_VTABLE(u)->check_gc)
284 if (UNIT_VTABLE(u)->check_gc(u))
290 void unit_add_to_load_queue(Unit *u) {
292 assert(u->type != _UNIT_TYPE_INVALID);
294 if (u->load_state != UNIT_STUB || u->in_load_queue)
297 LIST_PREPEND(load_queue, u->manager->load_queue, u);
298 u->in_load_queue = true;
301 void unit_add_to_cleanup_queue(Unit *u) {
304 if (u->in_cleanup_queue)
307 LIST_PREPEND(cleanup_queue, u->manager->cleanup_queue, u);
308 u->in_cleanup_queue = true;
311 void unit_add_to_gc_queue(Unit *u) {
314 if (u->in_gc_queue || u->in_cleanup_queue)
317 if (unit_check_gc(u))
320 LIST_PREPEND(gc_queue, u->manager->gc_queue, u);
321 u->in_gc_queue = true;
323 u->manager->n_in_gc_queue ++;
326 void unit_add_to_dbus_queue(Unit *u) {
328 assert(u->type != _UNIT_TYPE_INVALID);
330 if (u->load_state == UNIT_STUB || u->in_dbus_queue)
333 /* Shortcut things if nobody cares */
334 if (set_isempty(u->manager->subscribed)) {
335 u->sent_dbus_new_signal = true;
339 LIST_PREPEND(dbus_queue, u->manager->dbus_unit_queue, u);
340 u->in_dbus_queue = true;
343 static void bidi_set_free(Unit *u, Set *s) {
349 /* Frees the set and makes sure we are dropped from the
350 * inverse pointers */
352 SET_FOREACH(other, s, i) {
355 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++)
356 set_remove(other->dependencies[d], u);
358 unit_add_to_gc_queue(other);
364 static void unit_remove_transient(Unit *u) {
372 if (u->fragment_path)
373 unlink(u->fragment_path);
375 STRV_FOREACH(i, u->dropin_paths) {
376 _cleanup_free_ char *p = NULL;
381 r = path_get_parent(*i, &p);
387 static void unit_free_requires_mounts_for(Unit *u) {
390 STRV_FOREACH(j, u->requires_mounts_for) {
391 char s[strlen(*j) + 1];
393 PATH_FOREACH_PREFIX_MORE(s, *j) {
397 x = hashmap_get2(u->manager->units_requiring_mounts_for, s, (void**) &y);
403 if (set_isempty(x)) {
404 hashmap_remove(u->manager->units_requiring_mounts_for, y);
411 strv_free(u->requires_mounts_for);
412 u->requires_mounts_for = NULL;
415 void unit_free(Unit *u) {
422 if (u->manager->n_reloading <= 0)
423 unit_remove_transient(u);
425 bus_unit_send_removed_signal(u);
427 if (u->load_state != UNIT_STUB)
428 if (UNIT_VTABLE(u)->done)
429 UNIT_VTABLE(u)->done(u);
431 unit_free_requires_mounts_for(u);
433 SET_FOREACH(t, u->names, i)
434 hashmap_remove_value(u->manager->units, t, u);
448 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++)
449 bidi_set_free(u, u->dependencies[d]);
451 if (u->type != _UNIT_TYPE_INVALID)
452 LIST_REMOVE(units_by_type, u->manager->units_by_type[u->type], u);
454 if (u->in_load_queue)
455 LIST_REMOVE(load_queue, u->manager->load_queue, u);
457 if (u->in_dbus_queue)
458 LIST_REMOVE(dbus_queue, u->manager->dbus_unit_queue, u);
460 if (u->in_cleanup_queue)
461 LIST_REMOVE(cleanup_queue, u->manager->cleanup_queue, u);
463 if (u->in_gc_queue) {
464 LIST_REMOVE(gc_queue, u->manager->gc_queue, u);
465 u->manager->n_in_gc_queue--;
468 if (u->in_cgroup_queue)
469 LIST_REMOVE(cgroup_queue, u->manager->cgroup_queue, u);
471 if (u->cgroup_path) {
472 hashmap_remove(u->manager->cgroup_unit, u->cgroup_path);
473 free(u->cgroup_path);
476 free(u->description);
477 strv_free(u->documentation);
478 free(u->fragment_path);
479 free(u->source_path);
480 strv_free(u->dropin_paths);
483 set_free_free(u->names);
485 unit_unwatch_all_pids(u);
487 condition_free_list(u->conditions);
489 unit_ref_unset(&u->slice);
492 unit_ref_unset(u->refs);
497 UnitActiveState unit_active_state(Unit *u) {
500 if (u->load_state == UNIT_MERGED)
501 return unit_active_state(unit_follow_merge(u));
503 /* After a reload it might happen that a unit is not correctly
504 * loaded but still has a process around. That's why we won't
505 * shortcut failed loading to UNIT_INACTIVE_FAILED. */
507 return UNIT_VTABLE(u)->active_state(u);
510 const char* unit_sub_state_to_string(Unit *u) {
513 return UNIT_VTABLE(u)->sub_state_to_string(u);
516 static void complete_move(Set **s, Set **other) {
524 set_move(*s, *other);
531 static void merge_names(Unit *u, Unit *other) {
538 complete_move(&u->names, &other->names);
540 set_free_free(other->names);
544 SET_FOREACH(t, u->names, i)
545 assert_se(hashmap_replace(u->manager->units, t, u) == 0);
548 static void merge_dependencies(Unit *u, Unit *other, UnitDependency d) {
555 assert(d < _UNIT_DEPENDENCY_MAX);
557 /* Fix backwards pointers */
558 SET_FOREACH(back, other->dependencies[d], i) {
561 for (k = 0; k < _UNIT_DEPENDENCY_MAX; k++) {
562 r = set_remove_and_put(back->dependencies[k], other, u);
564 set_remove(back->dependencies[k], other);
566 assert(r >= 0 || r == -ENOENT);
570 complete_move(&u->dependencies[d], &other->dependencies[d]);
572 set_free(other->dependencies[d]);
573 other->dependencies[d] = NULL;
576 int unit_merge(Unit *u, Unit *other) {
581 assert(u->manager == other->manager);
582 assert(u->type != _UNIT_TYPE_INVALID);
584 other = unit_follow_merge(other);
589 if (u->type != other->type)
592 if (!u->instance != !other->instance)
595 if (other->load_state != UNIT_STUB &&
596 other->load_state != UNIT_NOT_FOUND)
605 if (!UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(other)))
609 merge_names(u, other);
611 /* Redirect all references */
613 unit_ref_set(other->refs, u);
615 /* Merge dependencies */
616 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++)
617 merge_dependencies(u, other, d);
619 other->load_state = UNIT_MERGED;
620 other->merged_into = u;
622 /* If there is still some data attached to the other node, we
623 * don't need it anymore, and can free it. */
624 if (other->load_state != UNIT_STUB)
625 if (UNIT_VTABLE(other)->done)
626 UNIT_VTABLE(other)->done(other);
628 unit_add_to_dbus_queue(u);
629 unit_add_to_cleanup_queue(other);
634 int unit_merge_by_name(Unit *u, const char *name) {
637 _cleanup_free_ char *s = NULL;
642 if (unit_name_is_template(name)) {
646 s = unit_name_replace_instance(name, u->instance);
653 other = manager_get_unit(u->manager, name);
655 r = unit_add_name(u, name);
657 r = unit_merge(u, other);
662 Unit* unit_follow_merge(Unit *u) {
665 while (u->load_state == UNIT_MERGED)
666 assert_se(u = u->merged_into);
671 int unit_add_exec_dependencies(Unit *u, ExecContext *c) {
677 if (c->working_directory) {
678 r = unit_require_mounts_for(u, c->working_directory);
683 if (c->root_directory) {
684 r = unit_require_mounts_for(u, c->root_directory);
689 if (c->std_output != EXEC_OUTPUT_KMSG &&
690 c->std_output != EXEC_OUTPUT_SYSLOG &&
691 c->std_output != EXEC_OUTPUT_JOURNAL &&
692 c->std_output != EXEC_OUTPUT_KMSG_AND_CONSOLE &&
693 c->std_output != EXEC_OUTPUT_SYSLOG_AND_CONSOLE &&
694 c->std_output != EXEC_OUTPUT_JOURNAL_AND_CONSOLE &&
695 c->std_error != EXEC_OUTPUT_KMSG &&
696 c->std_error != EXEC_OUTPUT_SYSLOG &&
697 c->std_error != EXEC_OUTPUT_JOURNAL &&
698 c->std_error != EXEC_OUTPUT_KMSG_AND_CONSOLE &&
699 c->std_error != EXEC_OUTPUT_JOURNAL_AND_CONSOLE &&
700 c->std_error != EXEC_OUTPUT_SYSLOG_AND_CONSOLE)
703 /* If syslog or kernel logging is requested, make sure our own
704 * logging daemon is run first. */
706 if (u->manager->running_as == SYSTEMD_SYSTEM) {
707 r = unit_add_dependency_by_name(u, UNIT_AFTER, SPECIAL_JOURNALD_SOCKET, NULL, true);
715 const char *unit_description(Unit *u) {
719 return u->description;
724 void unit_dump(Unit *u, FILE *f, const char *prefix) {
728 _cleanup_free_ char *p2 = NULL;
731 timestamp1[FORMAT_TIMESTAMP_MAX],
732 timestamp2[FORMAT_TIMESTAMP_MAX],
733 timestamp3[FORMAT_TIMESTAMP_MAX],
734 timestamp4[FORMAT_TIMESTAMP_MAX],
735 timespan[FORMAT_TIMESPAN_MAX];
737 _cleanup_set_free_ Set *following_set = NULL;
741 assert(u->type >= 0);
745 p2 = strappend(prefix, "\t");
746 prefix2 = p2 ? p2 : prefix;
750 "%s\tDescription: %s\n"
752 "%s\tUnit Load State: %s\n"
753 "%s\tUnit Active State: %s\n"
754 "%s\tInactive Exit Timestamp: %s\n"
755 "%s\tActive Enter Timestamp: %s\n"
756 "%s\tActive Exit Timestamp: %s\n"
757 "%s\tInactive Enter Timestamp: %s\n"
758 "%s\tGC Check Good: %s\n"
759 "%s\tNeed Daemon Reload: %s\n"
760 "%s\tTransient: %s\n"
763 "%s\tCGroup realized: %s\n"
764 "%s\tCGroup mask: 0x%x\n"
765 "%s\tCGroup members mask: 0x%x\n",
767 prefix, unit_description(u),
768 prefix, strna(u->instance),
769 prefix, unit_load_state_to_string(u->load_state),
770 prefix, unit_active_state_to_string(unit_active_state(u)),
771 prefix, strna(format_timestamp(timestamp1, sizeof(timestamp1), u->inactive_exit_timestamp.realtime)),
772 prefix, strna(format_timestamp(timestamp2, sizeof(timestamp2), u->active_enter_timestamp.realtime)),
773 prefix, strna(format_timestamp(timestamp3, sizeof(timestamp3), u->active_exit_timestamp.realtime)),
774 prefix, strna(format_timestamp(timestamp4, sizeof(timestamp4), u->inactive_enter_timestamp.realtime)),
775 prefix, yes_no(unit_check_gc(u)),
776 prefix, yes_no(unit_need_daemon_reload(u)),
777 prefix, yes_no(u->transient),
778 prefix, strna(unit_slice_name(u)),
779 prefix, strna(u->cgroup_path),
780 prefix, yes_no(u->cgroup_realized),
781 prefix, u->cgroup_realized_mask,
782 prefix, u->cgroup_members_mask);
784 SET_FOREACH(t, u->names, i)
785 fprintf(f, "%s\tName: %s\n", prefix, t);
787 STRV_FOREACH(j, u->documentation)
788 fprintf(f, "%s\tDocumentation: %s\n", prefix, *j);
790 following = unit_following(u);
792 fprintf(f, "%s\tFollowing: %s\n", prefix, following->id);
794 r = unit_following_set(u, &following_set);
798 SET_FOREACH(other, following_set, i)
799 fprintf(f, "%s\tFollowing Set Member: %s\n", prefix, other->id);
802 if (u->fragment_path)
803 fprintf(f, "%s\tFragment Path: %s\n", prefix, u->fragment_path);
806 fprintf(f, "%s\tSource Path: %s\n", prefix, u->source_path);
808 STRV_FOREACH(j, u->dropin_paths)
809 fprintf(f, "%s\tDropIn Path: %s\n", prefix, *j);
811 if (u->job_timeout > 0)
812 fprintf(f, "%s\tJob Timeout: %s\n", prefix, format_timespan(timespan, sizeof(timespan), u->job_timeout, 0));
814 condition_dump_list(u->conditions, f, prefix);
816 if (dual_timestamp_is_set(&u->condition_timestamp))
818 "%s\tCondition Timestamp: %s\n"
819 "%s\tCondition Result: %s\n",
820 prefix, strna(format_timestamp(timestamp1, sizeof(timestamp1), u->condition_timestamp.realtime)),
821 prefix, yes_no(u->condition_result));
823 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++) {
826 SET_FOREACH(other, u->dependencies[d], i)
827 fprintf(f, "%s\t%s: %s\n", prefix, unit_dependency_to_string(d), other->id);
830 if (!strv_isempty(u->requires_mounts_for)) {
832 "%s\tRequiresMountsFor:", prefix);
834 STRV_FOREACH(j, u->requires_mounts_for)
835 fprintf(f, " %s", *j);
840 if (u->load_state == UNIT_LOADED) {
843 "%s\tStopWhenUnneeded: %s\n"
844 "%s\tRefuseManualStart: %s\n"
845 "%s\tRefuseManualStop: %s\n"
846 "%s\tDefaultDependencies: %s\n"
847 "%s\tOnFailureJobMode: %s\n"
848 "%s\tIgnoreOnIsolate: %s\n"
849 "%s\tIgnoreOnSnapshot: %s\n",
850 prefix, yes_no(u->stop_when_unneeded),
851 prefix, yes_no(u->refuse_manual_start),
852 prefix, yes_no(u->refuse_manual_stop),
853 prefix, yes_no(u->default_dependencies),
854 prefix, job_mode_to_string(u->on_failure_job_mode),
855 prefix, yes_no(u->ignore_on_isolate),
856 prefix, yes_no(u->ignore_on_snapshot));
858 if (UNIT_VTABLE(u)->dump)
859 UNIT_VTABLE(u)->dump(u, f, prefix2);
861 } else if (u->load_state == UNIT_MERGED)
863 "%s\tMerged into: %s\n",
864 prefix, u->merged_into->id);
865 else if (u->load_state == UNIT_ERROR)
866 fprintf(f, "%s\tLoad Error Code: %s\n", prefix, strerror(-u->load_error));
870 job_dump(u->job, f, prefix2);
873 job_dump(u->nop_job, f, prefix2);
877 /* Common implementation for multiple backends */
878 int unit_load_fragment_and_dropin(Unit *u) {
883 /* Load a .{service,socket,...} file */
884 r = unit_load_fragment(u);
888 if (u->load_state == UNIT_STUB)
891 /* Load drop-in directory data */
892 r = unit_load_dropin(unit_follow_merge(u));
899 /* Common implementation for multiple backends */
900 int unit_load_fragment_and_dropin_optional(Unit *u) {
905 /* Same as unit_load_fragment_and_dropin(), but whether
906 * something can be loaded or not doesn't matter. */
908 /* Load a .service file */
909 r = unit_load_fragment(u);
913 if (u->load_state == UNIT_STUB)
914 u->load_state = UNIT_LOADED;
916 /* Load drop-in directory data */
917 r = unit_load_dropin(unit_follow_merge(u));
924 int unit_add_default_target_dependency(Unit *u, Unit *target) {
928 if (target->type != UNIT_TARGET)
931 /* Only add the dependency if both units are loaded, so that
932 * that loop check below is reliable */
933 if (u->load_state != UNIT_LOADED ||
934 target->load_state != UNIT_LOADED)
937 /* If either side wants no automatic dependencies, then let's
939 if (!u->default_dependencies ||
940 !target->default_dependencies)
943 /* Don't create loops */
944 if (set_get(target->dependencies[UNIT_BEFORE], u))
947 return unit_add_dependency(target, UNIT_AFTER, u, true);
950 static int unit_add_target_dependencies(Unit *u) {
952 static const UnitDependency deps[] = {
954 UNIT_REQUIRED_BY_OVERRIDABLE,
966 for (k = 0; k < ELEMENTSOF(deps); k++)
967 SET_FOREACH(target, u->dependencies[deps[k]], i) {
968 r = unit_add_default_target_dependency(u, target);
976 static int unit_add_slice_dependencies(Unit *u) {
979 if (!unit_get_cgroup_context(u))
982 if (UNIT_ISSET(u->slice))
983 return unit_add_two_dependencies(u, UNIT_AFTER, UNIT_WANTS, UNIT_DEREF(u->slice), true);
985 return unit_add_two_dependencies_by_name(u, UNIT_AFTER, UNIT_WANTS, SPECIAL_ROOT_SLICE, NULL, true);
988 static int unit_add_mount_dependencies(Unit *u) {
994 STRV_FOREACH(i, u->requires_mounts_for) {
995 char prefix[strlen(*i) + 1];
997 PATH_FOREACH_PREFIX_MORE(prefix, *i) {
1000 r = manager_get_unit_by_path(u->manager, prefix, ".mount", &m);
1008 if (m->load_state != UNIT_LOADED)
1011 r = unit_add_dependency(u, UNIT_AFTER, m, true);
1015 if (m->fragment_path) {
1016 r = unit_add_dependency(u, UNIT_REQUIRES, m, true);
1026 int unit_load(Unit *u) {
1031 if (u->in_load_queue) {
1032 LIST_REMOVE(load_queue, u->manager->load_queue, u);
1033 u->in_load_queue = false;
1036 if (u->type == _UNIT_TYPE_INVALID)
1039 if (u->load_state != UNIT_STUB)
1042 if (UNIT_VTABLE(u)->load) {
1043 r = UNIT_VTABLE(u)->load(u);
1048 if (u->load_state == UNIT_STUB) {
1053 if (u->load_state == UNIT_LOADED) {
1055 r = unit_add_target_dependencies(u);
1059 r = unit_add_slice_dependencies(u);
1063 r = unit_add_mount_dependencies(u);
1067 if (u->on_failure_job_mode == JOB_ISOLATE && set_size(u->dependencies[UNIT_ON_FAILURE]) > 1) {
1068 log_error_unit(u->id, "More than one OnFailure= dependencies specified for %s but OnFailureJobMode=isolate set. Refusing.", u->id);
1073 unit_update_cgroup_members_masks(u);
1076 assert((u->load_state != UNIT_MERGED) == !u->merged_into);
1078 unit_add_to_dbus_queue(unit_follow_merge(u));
1079 unit_add_to_gc_queue(u);
1084 u->load_state = u->load_state == UNIT_STUB ? UNIT_NOT_FOUND : UNIT_ERROR;
1086 unit_add_to_dbus_queue(u);
1087 unit_add_to_gc_queue(u);
1089 log_debug_unit(u->id, "Failed to load configuration for %s: %s",
1090 u->id, strerror(-r));
1095 static bool unit_condition_test(Unit *u) {
1098 dual_timestamp_get(&u->condition_timestamp);
1099 u->condition_result = condition_test_list(u->id, u->conditions);
1101 return u->condition_result;
1104 _pure_ static const char* unit_get_status_message_format(Unit *u, JobType t) {
1105 const UnitStatusMessageFormats *format_table;
1109 assert(t < _JOB_TYPE_MAX);
1111 if (t != JOB_START && t != JOB_STOP)
1114 format_table = &UNIT_VTABLE(u)->status_message_formats;
1118 return format_table->starting_stopping[t == JOB_STOP];
1121 _pure_ static const char *unit_get_status_message_format_try_harder(Unit *u, JobType t) {
1126 assert(t < _JOB_TYPE_MAX);
1128 format = unit_get_status_message_format(u, t);
1132 /* Return generic strings */
1134 return "Starting %s.";
1135 else if (t == JOB_STOP)
1136 return "Stopping %s.";
1137 else if (t == JOB_RELOAD)
1138 return "Reloading %s.";
1143 static void unit_status_print_starting_stopping(Unit *u, JobType t) {
1148 /* We only print status messages for selected units on
1149 * selected operations. */
1151 format = unit_get_status_message_format(u, t);
1155 DISABLE_WARNING_FORMAT_NONLITERAL;
1156 unit_status_printf(u, "", format);
1160 static void unit_status_log_starting_stopping_reloading(Unit *u, JobType t) {
1167 if (t != JOB_START && t != JOB_STOP && t != JOB_RELOAD)
1170 if (log_on_console())
1173 /* We log status messages for all units and all operations. */
1175 format = unit_get_status_message_format_try_harder(u, t);
1179 DISABLE_WARNING_FORMAT_NONLITERAL;
1180 snprintf(buf, sizeof(buf), format, unit_description(u));
1184 mid = t == JOB_START ? SD_MESSAGE_UNIT_STARTING :
1185 t == JOB_STOP ? SD_MESSAGE_UNIT_STOPPING :
1186 SD_MESSAGE_UNIT_RELOADING;
1188 log_struct_unit(LOG_INFO,
1196 * -EBADR: This unit type does not support starting.
1197 * -EALREADY: Unit is already started.
1198 * -EAGAIN: An operation is already in progress. Retry later.
1199 * -ECANCELED: Too many requests for now.
1201 int unit_start(Unit *u) {
1202 UnitActiveState state;
1207 if (u->load_state != UNIT_LOADED)
1210 /* If this is already started, then this will succeed. Note
1211 * that this will even succeed if this unit is not startable
1212 * by the user. This is relied on to detect when we need to
1213 * wait for units and when waiting is finished. */
1214 state = unit_active_state(u);
1215 if (UNIT_IS_ACTIVE_OR_RELOADING(state))
1218 /* If the conditions failed, don't do anything at all. If we
1219 * already are activating this call might still be useful to
1220 * speed up activation in case there is some hold-off time,
1221 * but we don't want to recheck the condition in that case. */
1222 if (state != UNIT_ACTIVATING &&
1223 !unit_condition_test(u)) {
1224 log_debug_unit(u->id, "Starting of %s requested but condition failed. Ignoring.", u->id);
1228 /* Forward to the main object, if we aren't it. */
1229 following = unit_following(u);
1231 log_debug_unit(u->id, "Redirecting start request from %s to %s.",
1232 u->id, following->id);
1233 return unit_start(following);
1236 unit_status_log_starting_stopping_reloading(u, JOB_START);
1237 unit_status_print_starting_stopping(u, JOB_START);
1239 /* If it is stopped, but we cannot start it, then fail */
1240 if (!UNIT_VTABLE(u)->start)
1243 /* We don't suppress calls to ->start() here when we are
1244 * already starting, to allow this request to be used as a
1245 * "hurry up" call, for example when the unit is in some "auto
1246 * restart" state where it waits for a holdoff timer to elapse
1247 * before it will start again. */
1249 unit_add_to_dbus_queue(u);
1251 return UNIT_VTABLE(u)->start(u);
1254 bool unit_can_start(Unit *u) {
1257 return !!UNIT_VTABLE(u)->start;
1260 bool unit_can_isolate(Unit *u) {
1263 return unit_can_start(u) &&
1268 * -EBADR: This unit type does not support stopping.
1269 * -EALREADY: Unit is already stopped.
1270 * -EAGAIN: An operation is already in progress. Retry later.
1272 int unit_stop(Unit *u) {
1273 UnitActiveState state;
1278 state = unit_active_state(u);
1279 if (UNIT_IS_INACTIVE_OR_FAILED(state))
1282 if ((following = unit_following(u))) {
1283 log_debug_unit(u->id, "Redirecting stop request from %s to %s.",
1284 u->id, following->id);
1285 return unit_stop(following);
1288 unit_status_log_starting_stopping_reloading(u, JOB_STOP);
1289 unit_status_print_starting_stopping(u, JOB_STOP);
1291 if (!UNIT_VTABLE(u)->stop)
1294 unit_add_to_dbus_queue(u);
1296 return UNIT_VTABLE(u)->stop(u);
1300 * -EBADR: This unit type does not support reloading.
1301 * -ENOEXEC: Unit is not started.
1302 * -EAGAIN: An operation is already in progress. Retry later.
1304 int unit_reload(Unit *u) {
1305 UnitActiveState state;
1310 if (u->load_state != UNIT_LOADED)
1313 if (!unit_can_reload(u))
1316 state = unit_active_state(u);
1317 if (state == UNIT_RELOADING)
1320 if (state != UNIT_ACTIVE) {
1321 log_warning_unit(u->id, "Unit %s cannot be reloaded because it is inactive.",
1326 following = unit_following(u);
1328 log_debug_unit(u->id, "Redirecting reload request from %s to %s.",
1329 u->id, following->id);
1330 return unit_reload(following);
1333 unit_status_log_starting_stopping_reloading(u, JOB_RELOAD);
1335 unit_add_to_dbus_queue(u);
1336 return UNIT_VTABLE(u)->reload(u);
1339 bool unit_can_reload(Unit *u) {
1342 if (!UNIT_VTABLE(u)->reload)
1345 if (!UNIT_VTABLE(u)->can_reload)
1348 return UNIT_VTABLE(u)->can_reload(u);
1351 static void unit_check_unneeded(Unit *u) {
1357 /* If this service shall be shut down when unneeded then do
1360 if (!u->stop_when_unneeded)
1363 if (!UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(u)))
1366 SET_FOREACH(other, u->dependencies[UNIT_REQUIRED_BY], i)
1367 if (unit_active_or_pending(other))
1370 SET_FOREACH(other, u->dependencies[UNIT_REQUIRED_BY_OVERRIDABLE], i)
1371 if (unit_active_or_pending(other))
1374 SET_FOREACH(other, u->dependencies[UNIT_WANTED_BY], i)
1375 if (unit_active_or_pending(other))
1378 SET_FOREACH(other, u->dependencies[UNIT_BOUND_BY], i)
1379 if (unit_active_or_pending(other))
1382 log_info_unit(u->id, "Service %s is not needed anymore. Stopping.", u->id);
1384 /* Ok, nobody needs us anymore. Sniff. Then let's commit suicide */
1385 manager_add_job(u->manager, JOB_STOP, u, JOB_FAIL, true, NULL, NULL);
1388 static void retroactively_start_dependencies(Unit *u) {
1393 assert(UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(u)));
1395 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES], i)
1396 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1397 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1398 manager_add_job(u->manager, JOB_START, other, JOB_REPLACE, true, NULL, NULL);
1400 SET_FOREACH(other, u->dependencies[UNIT_BINDS_TO], i)
1401 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1402 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1403 manager_add_job(u->manager, JOB_START, other, JOB_REPLACE, true, NULL, NULL);
1405 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES_OVERRIDABLE], i)
1406 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1407 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1408 manager_add_job(u->manager, JOB_START, other, JOB_FAIL, false, NULL, NULL);
1410 SET_FOREACH(other, u->dependencies[UNIT_WANTS], i)
1411 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1412 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1413 manager_add_job(u->manager, JOB_START, other, JOB_FAIL, false, NULL, NULL);
1415 SET_FOREACH(other, u->dependencies[UNIT_CONFLICTS], i)
1416 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1417 manager_add_job(u->manager, JOB_STOP, other, JOB_REPLACE, true, NULL, NULL);
1419 SET_FOREACH(other, u->dependencies[UNIT_CONFLICTED_BY], i)
1420 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1421 manager_add_job(u->manager, JOB_STOP, other, JOB_REPLACE, true, NULL, NULL);
1424 static void retroactively_stop_dependencies(Unit *u) {
1429 assert(UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(u)));
1431 /* Pull down units which are bound to us recursively if enabled */
1432 SET_FOREACH(other, u->dependencies[UNIT_BOUND_BY], i)
1433 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1434 manager_add_job(u->manager, JOB_STOP, other, JOB_REPLACE, true, NULL, NULL);
1437 static void check_unneeded_dependencies(Unit *u) {
1442 assert(UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(u)));
1444 /* Garbage collect services that might not be needed anymore, if enabled */
1445 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES], i)
1446 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1447 unit_check_unneeded(other);
1448 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES_OVERRIDABLE], i)
1449 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1450 unit_check_unneeded(other);
1451 SET_FOREACH(other, u->dependencies[UNIT_WANTS], i)
1452 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1453 unit_check_unneeded(other);
1454 SET_FOREACH(other, u->dependencies[UNIT_REQUISITE], i)
1455 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1456 unit_check_unneeded(other);
1457 SET_FOREACH(other, u->dependencies[UNIT_REQUISITE_OVERRIDABLE], i)
1458 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1459 unit_check_unneeded(other);
1460 SET_FOREACH(other, u->dependencies[UNIT_BINDS_TO], i)
1461 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1462 unit_check_unneeded(other);
1465 void unit_start_on_failure(Unit *u) {
1471 if (set_size(u->dependencies[UNIT_ON_FAILURE]) <= 0)
1474 log_info_unit(u->id, "Triggering OnFailure= dependencies of %s.", u->id);
1476 SET_FOREACH(other, u->dependencies[UNIT_ON_FAILURE], i) {
1479 r = manager_add_job(u->manager, JOB_START, other, u->on_failure_job_mode, true, NULL, NULL);
1481 log_error_unit(u->id, "Failed to enqueue OnFailure= job: %s", strerror(-r));
1485 void unit_trigger_notify(Unit *u) {
1491 SET_FOREACH(other, u->dependencies[UNIT_TRIGGERED_BY], i)
1492 if (UNIT_VTABLE(other)->trigger_notify)
1493 UNIT_VTABLE(other)->trigger_notify(other, u);
1496 void unit_notify(Unit *u, UnitActiveState os, UnitActiveState ns, bool reload_success) {
1501 assert(os < _UNIT_ACTIVE_STATE_MAX);
1502 assert(ns < _UNIT_ACTIVE_STATE_MAX);
1504 /* Note that this is called for all low-level state changes,
1505 * even if they might map to the same high-level
1506 * UnitActiveState! That means that ns == os is OK an expected
1507 * behavior here. For example: if a mount point is remounted
1508 * this function will be called too! */
1512 if (m->n_reloading <= 0) {
1515 dual_timestamp_get(&ts);
1517 if (UNIT_IS_INACTIVE_OR_FAILED(os) && !UNIT_IS_INACTIVE_OR_FAILED(ns))
1518 u->inactive_exit_timestamp = ts;
1519 else if (!UNIT_IS_INACTIVE_OR_FAILED(os) && UNIT_IS_INACTIVE_OR_FAILED(ns))
1520 u->inactive_enter_timestamp = ts;
1522 if (!UNIT_IS_ACTIVE_OR_RELOADING(os) && UNIT_IS_ACTIVE_OR_RELOADING(ns))
1523 u->active_enter_timestamp = ts;
1524 else if (UNIT_IS_ACTIVE_OR_RELOADING(os) && !UNIT_IS_ACTIVE_OR_RELOADING(ns))
1525 u->active_exit_timestamp = ts;
1528 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1529 unit_destroy_cgroup(u);
1531 /* Note that this doesn't apply to RemainAfterExit services exiting
1532 * sucessfully, since there's no change of state in that case. Which is
1533 * why it is handled in service_set_state() */
1534 if (UNIT_IS_INACTIVE_OR_FAILED(os) != UNIT_IS_INACTIVE_OR_FAILED(ns)) {
1537 ec = unit_get_exec_context(u);
1538 if (ec && exec_context_may_touch_console(ec)) {
1539 if (UNIT_IS_INACTIVE_OR_FAILED(ns)) {
1542 if (m->n_on_console == 0)
1543 /* unset no_console_output flag, since the console is free */
1544 m->no_console_output = false;
1553 if (u->job->state == JOB_WAITING)
1555 /* So we reached a different state for this
1556 * job. Let's see if we can run it now if it
1557 * failed previously due to EAGAIN. */
1558 job_add_to_run_queue(u->job);
1560 /* Let's check whether this state change constitutes a
1561 * finished job, or maybe contradicts a running job and
1562 * hence needs to invalidate jobs. */
1564 switch (u->job->type) {
1567 case JOB_VERIFY_ACTIVE:
1569 if (UNIT_IS_ACTIVE_OR_RELOADING(ns))
1570 job_finish_and_invalidate(u->job, JOB_DONE, true);
1571 else if (u->job->state == JOB_RUNNING && ns != UNIT_ACTIVATING) {
1574 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1575 job_finish_and_invalidate(u->job, ns == UNIT_FAILED ? JOB_FAILED : JOB_DONE, true);
1581 case JOB_RELOAD_OR_START:
1583 if (u->job->state == JOB_RUNNING) {
1584 if (ns == UNIT_ACTIVE)
1585 job_finish_and_invalidate(u->job, reload_success ? JOB_DONE : JOB_FAILED, true);
1586 else if (ns != UNIT_ACTIVATING && ns != UNIT_RELOADING) {
1589 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1590 job_finish_and_invalidate(u->job, ns == UNIT_FAILED ? JOB_FAILED : JOB_DONE, true);
1598 case JOB_TRY_RESTART:
1600 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1601 job_finish_and_invalidate(u->job, JOB_DONE, true);
1602 else if (u->job->state == JOB_RUNNING && ns != UNIT_DEACTIVATING) {
1604 job_finish_and_invalidate(u->job, JOB_FAILED, true);
1610 assert_not_reached("Job type unknown");
1616 if (m->n_reloading <= 0) {
1618 /* If this state change happened without being
1619 * requested by a job, then let's retroactively start
1620 * or stop dependencies. We skip that step when
1621 * deserializing, since we don't want to create any
1622 * additional jobs just because something is already
1626 if (UNIT_IS_INACTIVE_OR_FAILED(os) && UNIT_IS_ACTIVE_OR_ACTIVATING(ns))
1627 retroactively_start_dependencies(u);
1628 else if (UNIT_IS_ACTIVE_OR_ACTIVATING(os) && UNIT_IS_INACTIVE_OR_DEACTIVATING(ns))
1629 retroactively_stop_dependencies(u);
1632 /* stop unneeded units regardless if going down was expected or not */
1633 if (UNIT_IS_INACTIVE_OR_DEACTIVATING(ns))
1634 check_unneeded_dependencies(u);
1636 if (ns != os && ns == UNIT_FAILED) {
1637 log_notice_unit(u->id, "Unit %s entered failed state.", u->id);
1638 unit_start_on_failure(u);
1642 /* Some names are special */
1643 if (UNIT_IS_ACTIVE_OR_RELOADING(ns)) {
1645 if (unit_has_name(u, SPECIAL_DBUS_SERVICE))
1646 /* The bus just might have become available,
1647 * hence try to connect to it, if we aren't
1651 if (u->type == UNIT_SERVICE &&
1652 !UNIT_IS_ACTIVE_OR_RELOADING(os) &&
1653 m->n_reloading <= 0) {
1654 /* Write audit record if we have just finished starting up */
1655 manager_send_unit_audit(m, u, AUDIT_SERVICE_START, true);
1659 if (!UNIT_IS_ACTIVE_OR_RELOADING(os))
1660 manager_send_unit_plymouth(m, u);
1664 /* We don't care about D-Bus here, since we'll get an
1665 * asynchronous notification for it anyway. */
1667 if (u->type == UNIT_SERVICE &&
1668 UNIT_IS_INACTIVE_OR_FAILED(ns) &&
1669 !UNIT_IS_INACTIVE_OR_FAILED(os) &&
1670 m->n_reloading <= 0) {
1672 /* Hmm, if there was no start record written
1673 * write it now, so that we always have a nice
1676 manager_send_unit_audit(m, u, AUDIT_SERVICE_START, ns == UNIT_INACTIVE);
1678 if (ns == UNIT_INACTIVE)
1679 manager_send_unit_audit(m, u, AUDIT_SERVICE_STOP, true);
1681 /* Write audit record if we have just finished shutting down */
1682 manager_send_unit_audit(m, u, AUDIT_SERVICE_STOP, ns == UNIT_INACTIVE);
1684 u->in_audit = false;
1688 manager_recheck_journal(m);
1689 unit_trigger_notify(u);
1691 /* Maybe we finished startup and are now ready for being
1692 * stopped because unneeded? */
1693 if (u->manager->n_reloading <= 0)
1694 unit_check_unneeded(u);
1696 unit_add_to_dbus_queue(u);
1697 unit_add_to_gc_queue(u);
1700 int unit_watch_pid(Unit *u, pid_t pid) {
1706 /* Watch a specific PID. We only support one or two units
1707 * watching each PID for now, not more. */
1709 r = hashmap_ensure_allocated(&u->manager->watch_pids1, trivial_hash_func, trivial_compare_func);
1713 r = set_ensure_allocated(&u->pids, trivial_hash_func, trivial_compare_func);
1717 r = hashmap_put(u->manager->watch_pids1, LONG_TO_PTR(pid), u);
1719 r = hashmap_ensure_allocated(&u->manager->watch_pids2, trivial_hash_func, trivial_compare_func);
1723 r = hashmap_put(u->manager->watch_pids2, LONG_TO_PTR(pid), u);
1726 q = set_put(u->pids, LONG_TO_PTR(pid));
1733 void unit_unwatch_pid(Unit *u, pid_t pid) {
1737 hashmap_remove_value(u->manager->watch_pids1, LONG_TO_PTR(pid), u);
1738 hashmap_remove_value(u->manager->watch_pids2, LONG_TO_PTR(pid), u);
1739 set_remove(u->pids, LONG_TO_PTR(pid));
1742 static int watch_pids_in_path(Unit *u, const char *path) {
1743 _cleanup_closedir_ DIR *d = NULL;
1744 _cleanup_fclose_ FILE *f = NULL;
1750 /* Adds all PIDs from a specific cgroup path to the set of PIDs we watch. */
1752 r = cg_enumerate_processes(SYSTEMD_CGROUP_CONTROLLER, path, &f);
1756 while ((r = cg_read_pid(f, &pid)) > 0) {
1757 r = unit_watch_pid(u, pid);
1758 if (r < 0 && ret >= 0)
1761 if (r < 0 && ret >= 0)
1764 } else if (ret >= 0)
1767 r = cg_enumerate_subgroups(SYSTEMD_CGROUP_CONTROLLER, path, &d);
1771 while ((r = cg_read_subgroup(d, &fn)) > 0) {
1772 _cleanup_free_ char *p = NULL;
1774 p = strjoin(path, "/", fn, NULL);
1780 r = watch_pids_in_path(u, p);
1781 if (r < 0 && ret >= 0)
1784 if (r < 0 && ret >= 0)
1787 } else if (ret >= 0)
1794 int unit_watch_all_pids(Unit *u) {
1797 if (!u->cgroup_path)
1800 /* Adds all PIDs from our cgroup to the set of PIDs we watch */
1802 return watch_pids_in_path(u, u->cgroup_path);
1805 void unit_unwatch_all_pids(Unit *u) {
1811 SET_FOREACH(e, u->pids, i) {
1812 hashmap_remove_value(u->manager->watch_pids1, e, u);
1813 hashmap_remove_value(u->manager->watch_pids2, e, u);
1820 void unit_tidy_watch_pids(Unit *u, pid_t except1, pid_t except2) {
1826 /* Cleans dead PIDs from our list */
1828 SET_FOREACH(e, u->pids, i) {
1829 pid_t pid = PTR_TO_LONG(e);
1831 if (pid == except1 || pid == except2)
1834 if (!pid_is_unwaited(pid))
1835 set_remove(u->pids, e);
1839 bool unit_job_is_applicable(Unit *u, JobType j) {
1841 assert(j >= 0 && j < _JOB_TYPE_MAX);
1845 case JOB_VERIFY_ACTIVE:
1852 case JOB_TRY_RESTART:
1853 return unit_can_start(u);
1856 return unit_can_reload(u);
1858 case JOB_RELOAD_OR_START:
1859 return unit_can_reload(u) && unit_can_start(u);
1862 assert_not_reached("Invalid job type");
1866 int unit_add_dependency(Unit *u, UnitDependency d, Unit *other, bool add_reference) {
1868 static const UnitDependency inverse_table[_UNIT_DEPENDENCY_MAX] = {
1869 [UNIT_REQUIRES] = UNIT_REQUIRED_BY,
1870 [UNIT_REQUIRES_OVERRIDABLE] = UNIT_REQUIRED_BY_OVERRIDABLE,
1871 [UNIT_WANTS] = UNIT_WANTED_BY,
1872 [UNIT_REQUISITE] = UNIT_REQUIRED_BY,
1873 [UNIT_REQUISITE_OVERRIDABLE] = UNIT_REQUIRED_BY_OVERRIDABLE,
1874 [UNIT_BINDS_TO] = UNIT_BOUND_BY,
1875 [UNIT_PART_OF] = UNIT_CONSISTS_OF,
1876 [UNIT_REQUIRED_BY] = _UNIT_DEPENDENCY_INVALID,
1877 [UNIT_REQUIRED_BY_OVERRIDABLE] = _UNIT_DEPENDENCY_INVALID,
1878 [UNIT_WANTED_BY] = _UNIT_DEPENDENCY_INVALID,
1879 [UNIT_BOUND_BY] = UNIT_BINDS_TO,
1880 [UNIT_CONSISTS_OF] = UNIT_PART_OF,
1881 [UNIT_CONFLICTS] = UNIT_CONFLICTED_BY,
1882 [UNIT_CONFLICTED_BY] = UNIT_CONFLICTS,
1883 [UNIT_BEFORE] = UNIT_AFTER,
1884 [UNIT_AFTER] = UNIT_BEFORE,
1885 [UNIT_ON_FAILURE] = _UNIT_DEPENDENCY_INVALID,
1886 [UNIT_REFERENCES] = UNIT_REFERENCED_BY,
1887 [UNIT_REFERENCED_BY] = UNIT_REFERENCES,
1888 [UNIT_TRIGGERS] = UNIT_TRIGGERED_BY,
1889 [UNIT_TRIGGERED_BY] = UNIT_TRIGGERS,
1890 [UNIT_PROPAGATES_RELOAD_TO] = UNIT_RELOAD_PROPAGATED_FROM,
1891 [UNIT_RELOAD_PROPAGATED_FROM] = UNIT_PROPAGATES_RELOAD_TO,
1892 [UNIT_JOINS_NAMESPACE_OF] = UNIT_JOINS_NAMESPACE_OF,
1894 int r, q = 0, v = 0, w = 0;
1897 assert(d >= 0 && d < _UNIT_DEPENDENCY_MAX);
1900 u = unit_follow_merge(u);
1901 other = unit_follow_merge(other);
1903 /* We won't allow dependencies on ourselves. We will not
1904 * consider them an error however. */
1908 r = set_ensure_allocated(&u->dependencies[d], trivial_hash_func, trivial_compare_func);
1912 if (inverse_table[d] != _UNIT_DEPENDENCY_INVALID) {
1913 r = set_ensure_allocated(&other->dependencies[inverse_table[d]], trivial_hash_func, trivial_compare_func);
1918 if (add_reference) {
1919 r = set_ensure_allocated(&u->dependencies[UNIT_REFERENCES], trivial_hash_func, trivial_compare_func);
1923 r = set_ensure_allocated(&other->dependencies[UNIT_REFERENCED_BY], trivial_hash_func, trivial_compare_func);
1928 q = set_put(u->dependencies[d], other);
1932 if (inverse_table[d] != _UNIT_DEPENDENCY_INVALID && inverse_table[d] != d) {
1933 v = set_put(other->dependencies[inverse_table[d]], u);
1940 if (add_reference) {
1941 w = set_put(u->dependencies[UNIT_REFERENCES], other);
1947 r = set_put(other->dependencies[UNIT_REFERENCED_BY], u);
1952 unit_add_to_dbus_queue(u);
1957 set_remove(u->dependencies[d], other);
1960 set_remove(other->dependencies[inverse_table[d]], u);
1963 set_remove(u->dependencies[UNIT_REFERENCES], other);
1968 int unit_add_two_dependencies(Unit *u, UnitDependency d, UnitDependency e, Unit *other, bool add_reference) {
1973 if ((r = unit_add_dependency(u, d, other, add_reference)) < 0)
1976 if ((r = unit_add_dependency(u, e, other, add_reference)) < 0)
1982 static const char *resolve_template(Unit *u, const char *name, const char*path, char **p) {
1986 assert(name || path);
1990 name = basename(path);
1992 if (!unit_name_is_template(name)) {
1998 s = unit_name_replace_instance(name, u->instance);
2000 _cleanup_free_ char *i = NULL;
2002 i = unit_name_to_prefix(u->id);
2006 s = unit_name_replace_instance(name, i);
2016 int unit_add_dependency_by_name(Unit *u, UnitDependency d, const char *name, const char *path, bool add_reference) {
2019 _cleanup_free_ char *s = NULL;
2022 assert(name || path);
2024 name = resolve_template(u, name, path, &s);
2028 r = manager_load_unit(u->manager, name, path, NULL, &other);
2032 return unit_add_dependency(u, d, other, add_reference);
2035 int unit_add_two_dependencies_by_name(Unit *u, UnitDependency d, UnitDependency e, const char *name, const char *path, bool add_reference) {
2038 _cleanup_free_ char *s = NULL;
2041 assert(name || path);
2043 if (!(name = resolve_template(u, name, path, &s)))
2046 if ((r = manager_load_unit(u->manager, name, path, NULL, &other)) < 0)
2049 r = unit_add_two_dependencies(u, d, e, other, add_reference);
2054 int unit_add_dependency_by_name_inverse(Unit *u, UnitDependency d, const char *name, const char *path, bool add_reference) {
2057 _cleanup_free_ char *s = NULL;
2060 assert(name || path);
2062 if (!(name = resolve_template(u, name, path, &s)))
2065 if ((r = manager_load_unit(u->manager, name, path, NULL, &other)) < 0)
2068 r = unit_add_dependency(other, d, u, add_reference);
2073 int unit_add_two_dependencies_by_name_inverse(Unit *u, UnitDependency d, UnitDependency e, const char *name, const char *path, bool add_reference) {
2076 _cleanup_free_ char *s = NULL;
2079 assert(name || path);
2081 if (!(name = resolve_template(u, name, path, &s)))
2084 if ((r = manager_load_unit(u->manager, name, path, NULL, &other)) < 0)
2087 if ((r = unit_add_two_dependencies(other, d, e, u, add_reference)) < 0)
2093 int set_unit_path(const char *p) {
2094 _cleanup_free_ char *c = NULL;
2096 /* This is mostly for debug purposes */
2097 c = path_make_absolute_cwd(p);
2098 if (setenv("SYSTEMD_UNIT_PATH", c, 0) < 0)
2104 char *unit_dbus_path(Unit *u) {
2110 return unit_dbus_path_from_name(u->id);
2113 char *unit_default_cgroup_path(Unit *u) {
2114 _cleanup_free_ char *escaped = NULL, *slice = NULL;
2119 if (unit_has_name(u, SPECIAL_ROOT_SLICE))
2120 return strdup(u->manager->cgroup_root);
2122 if (UNIT_ISSET(u->slice) && !unit_has_name(UNIT_DEREF(u->slice), SPECIAL_ROOT_SLICE)) {
2123 r = cg_slice_to_path(UNIT_DEREF(u->slice)->id, &slice);
2128 escaped = cg_escape(u->id);
2133 return strjoin(u->manager->cgroup_root, "/", slice, "/", escaped, NULL);
2135 return strjoin(u->manager->cgroup_root, "/", escaped, NULL);
2138 int unit_add_default_slice(Unit *u) {
2139 _cleanup_free_ char *b = NULL;
2140 const char *slice_name;
2146 if (UNIT_ISSET(u->slice))
2149 if (!unit_get_cgroup_context(u))
2153 _cleanup_free_ char *prefix = NULL, *escaped = NULL;
2155 /* Implicitly place all instantiated units in their
2156 * own per-template slice */
2158 prefix = unit_name_to_prefix(u->id);
2162 /* The prefix is already escaped, but it might include
2163 * "-" which has a special meaning for slice units,
2164 * hence escape it here extra. */
2165 escaped = strreplace(prefix, "-", "\\x2d");
2169 if (u->manager->running_as == SYSTEMD_SYSTEM)
2170 b = strjoin("system-", escaped, ".slice", NULL);
2172 b = strappend(escaped, ".slice");
2179 u->manager->running_as == SYSTEMD_SYSTEM
2180 ? SPECIAL_SYSTEM_SLICE
2181 : SPECIAL_ROOT_SLICE;
2183 r = manager_load_unit(u->manager, slice_name, NULL, NULL, &slice);
2187 unit_ref_set(&u->slice, slice);
2191 const char *unit_slice_name(Unit *u) {
2194 if (!UNIT_ISSET(u->slice))
2197 return UNIT_DEREF(u->slice)->id;
2200 int unit_load_related_unit(Unit *u, const char *type, Unit **_found) {
2201 _cleanup_free_ char *t = NULL;
2208 t = unit_name_change_suffix(u->id, type);
2212 assert(!unit_has_name(u, t));
2214 r = manager_load_unit(u->manager, t, NULL, NULL, _found);
2215 assert(r < 0 || *_found != u);
2219 int unit_watch_bus_name(Unit *u, const char *name) {
2223 /* Watch a specific name on the bus. We only support one unit
2224 * watching each name for now. */
2226 return hashmap_put(u->manager->watch_bus, name, u);
2229 void unit_unwatch_bus_name(Unit *u, const char *name) {
2233 hashmap_remove_value(u->manager->watch_bus, name, u);
2236 bool unit_can_serialize(Unit *u) {
2239 return UNIT_VTABLE(u)->serialize && UNIT_VTABLE(u)->deserialize_item;
2242 int unit_serialize(Unit *u, FILE *f, FDSet *fds, bool serialize_jobs) {
2250 if (!unit_can_serialize(u))
2253 r = UNIT_VTABLE(u)->serialize(u, f, fds);
2257 rt = unit_get_exec_runtime(u);
2259 r = exec_runtime_serialize(rt, u, f, fds);
2264 dual_timestamp_serialize(f, "inactive-exit-timestamp", &u->inactive_exit_timestamp);
2265 dual_timestamp_serialize(f, "active-enter-timestamp", &u->active_enter_timestamp);
2266 dual_timestamp_serialize(f, "active-exit-timestamp", &u->active_exit_timestamp);
2267 dual_timestamp_serialize(f, "inactive-enter-timestamp", &u->inactive_enter_timestamp);
2268 dual_timestamp_serialize(f, "condition-timestamp", &u->condition_timestamp);
2270 if (dual_timestamp_is_set(&u->condition_timestamp))
2271 unit_serialize_item(u, f, "condition-result", yes_no(u->condition_result));
2273 unit_serialize_item(u, f, "transient", yes_no(u->transient));
2276 unit_serialize_item(u, f, "cgroup", u->cgroup_path);
2278 if (serialize_jobs) {
2280 fprintf(f, "job\n");
2281 job_serialize(u->job, f, fds);
2285 fprintf(f, "job\n");
2286 job_serialize(u->nop_job, f, fds);
2295 void unit_serialize_item_format(Unit *u, FILE *f, const char *key, const char *format, ...) {
2306 va_start(ap, format);
2307 vfprintf(f, format, ap);
2313 void unit_serialize_item(Unit *u, FILE *f, const char *key, const char *value) {
2319 fprintf(f, "%s=%s\n", key, value);
2322 int unit_deserialize(Unit *u, FILE *f, FDSet *fds) {
2324 ExecRuntime **rt = NULL;
2331 if (!unit_can_serialize(u))
2334 offset = UNIT_VTABLE(u)->exec_runtime_offset;
2336 rt = (ExecRuntime**) ((uint8_t*) u + offset);
2339 char line[LINE_MAX], *l, *v;
2342 if (!fgets(line, sizeof(line), f)) {
2355 k = strcspn(l, "=");
2363 if (streq(l, "job")) {
2365 /* new-style serialized job */
2366 Job *j = job_new_raw(u);
2370 r = job_deserialize(j, f, fds);
2376 r = hashmap_put(u->manager->jobs, UINT32_TO_PTR(j->id), j);
2382 r = job_install_deserialized(j);
2384 hashmap_remove(u->manager->jobs, UINT32_TO_PTR(j->id));
2389 if (j->state == JOB_RUNNING)
2390 u->manager->n_running_jobs++;
2393 JobType type = job_type_from_string(v);
2395 log_debug("Failed to parse job type value %s", v);
2397 u->deserialized_job = type;
2400 } else if (streq(l, "inactive-exit-timestamp")) {
2401 dual_timestamp_deserialize(v, &u->inactive_exit_timestamp);
2403 } else if (streq(l, "active-enter-timestamp")) {
2404 dual_timestamp_deserialize(v, &u->active_enter_timestamp);
2406 } else if (streq(l, "active-exit-timestamp")) {
2407 dual_timestamp_deserialize(v, &u->active_exit_timestamp);
2409 } else if (streq(l, "inactive-enter-timestamp")) {
2410 dual_timestamp_deserialize(v, &u->inactive_enter_timestamp);
2412 } else if (streq(l, "condition-timestamp")) {
2413 dual_timestamp_deserialize(v, &u->condition_timestamp);
2415 } else if (streq(l, "condition-result")) {
2418 b = parse_boolean(v);
2420 log_debug("Failed to parse condition result value %s", v);
2422 u->condition_result = b;
2426 } else if (streq(l, "transient")) {
2429 b = parse_boolean(v);
2431 log_debug("Failed to parse transient bool %s", v);
2436 } else if (streq(l, "cgroup")) {
2443 free(u->cgroup_path);
2446 assert(hashmap_put(u->manager->cgroup_unit, s, u) == 1);
2451 r = exec_runtime_deserialize_item(rt, u, l, v, fds);
2458 r = UNIT_VTABLE(u)->deserialize_item(u, l, v, fds);
2464 int unit_add_node_link(Unit *u, const char *what, bool wants) {
2466 _cleanup_free_ char *e = NULL;
2474 /* Adds in links to the device node that this unit is based on */
2476 if (!is_device_path(what))
2479 e = unit_name_from_path(what, ".device");
2483 r = manager_load_unit(u->manager, e, NULL, NULL, &device);
2488 r = unit_add_two_dependencies(u, UNIT_AFTER, UNIT_BINDS_TO, device, true);
2493 r = unit_add_dependency(device, UNIT_WANTS, u, false);
2501 int unit_coldplug(Unit *u) {
2506 if (UNIT_VTABLE(u)->coldplug)
2507 if ((r = UNIT_VTABLE(u)->coldplug(u)) < 0)
2511 r = job_coldplug(u->job);
2514 } else if (u->deserialized_job >= 0) {
2516 r = manager_add_job(u->manager, u->deserialized_job, u, JOB_IGNORE_REQUIREMENTS, false, NULL, NULL);
2520 u->deserialized_job = _JOB_TYPE_INVALID;
2526 void unit_status_printf(Unit *u, const char *status, const char *unit_status_msg_format) {
2527 DISABLE_WARNING_FORMAT_NONLITERAL;
2528 manager_status_printf(u->manager, false, status, unit_status_msg_format, unit_description(u));
2532 bool unit_need_daemon_reload(Unit *u) {
2533 _cleanup_strv_free_ char **t = NULL;
2536 unsigned loaded_cnt, current_cnt;
2540 if (u->fragment_path) {
2542 if (stat(u->fragment_path, &st) < 0)
2543 /* What, cannot access this anymore? */
2546 if (u->fragment_mtime > 0 &&
2547 timespec_load(&st.st_mtim) != u->fragment_mtime)
2551 if (u->source_path) {
2553 if (stat(u->source_path, &st) < 0)
2556 if (u->source_mtime > 0 &&
2557 timespec_load(&st.st_mtim) != u->source_mtime)
2561 t = unit_find_dropin_paths(u);
2562 loaded_cnt = strv_length(t);
2563 current_cnt = strv_length(u->dropin_paths);
2565 if (loaded_cnt == current_cnt) {
2566 if (loaded_cnt == 0)
2569 if (strv_overlap(u->dropin_paths, t)) {
2570 STRV_FOREACH(path, u->dropin_paths) {
2572 if (stat(*path, &st) < 0)
2575 if (u->dropin_mtime > 0 &&
2576 timespec_load(&st.st_mtim) > u->dropin_mtime)
2587 void unit_reset_failed(Unit *u) {
2590 if (UNIT_VTABLE(u)->reset_failed)
2591 UNIT_VTABLE(u)->reset_failed(u);
2594 Unit *unit_following(Unit *u) {
2597 if (UNIT_VTABLE(u)->following)
2598 return UNIT_VTABLE(u)->following(u);
2603 bool unit_stop_pending(Unit *u) {
2606 /* This call does check the current state of the unit. It's
2607 * hence useful to be called from state change calls of the
2608 * unit itself, where the state isn't updated yet. This is
2609 * different from unit_inactive_or_pending() which checks both
2610 * the current state and for a queued job. */
2612 return u->job && u->job->type == JOB_STOP;
2615 bool unit_inactive_or_pending(Unit *u) {
2618 /* Returns true if the unit is inactive or going down */
2620 if (UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(u)))
2623 if (unit_stop_pending(u))
2629 bool unit_active_or_pending(Unit *u) {
2632 /* Returns true if the unit is active or going up */
2634 if (UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(u)))
2638 (u->job->type == JOB_START ||
2639 u->job->type == JOB_RELOAD_OR_START ||
2640 u->job->type == JOB_RESTART))
2646 int unit_kill(Unit *u, KillWho w, int signo, sd_bus_error *error) {
2648 assert(w >= 0 && w < _KILL_WHO_MAX);
2650 assert(signo < _NSIG);
2652 if (!UNIT_VTABLE(u)->kill)
2655 return UNIT_VTABLE(u)->kill(u, w, signo, error);
2658 static Set *unit_pid_set(pid_t main_pid, pid_t control_pid) {
2662 pid_set = set_new(trivial_hash_func, trivial_compare_func);
2666 /* Exclude the main/control pids from being killed via the cgroup */
2668 r = set_put(pid_set, LONG_TO_PTR(main_pid));
2673 if (control_pid > 0) {
2674 r = set_put(pid_set, LONG_TO_PTR(control_pid));
2686 int unit_kill_common(
2692 sd_bus_error *error) {
2696 if (who == KILL_MAIN && main_pid <= 0) {
2698 sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_PROCESS, "%s units have no main processes", unit_type_to_string(u->type));
2700 sd_bus_error_set_const(error, BUS_ERROR_NO_SUCH_PROCESS, "No main process to kill");
2704 if (who == KILL_CONTROL && control_pid <= 0) {
2705 if (control_pid < 0)
2706 sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_PROCESS, "%s units have no control processes", unit_type_to_string(u->type));
2708 sd_bus_error_set_const(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
2712 if (who == KILL_CONTROL || who == KILL_ALL)
2713 if (control_pid > 0)
2714 if (kill(control_pid, signo) < 0)
2717 if (who == KILL_MAIN || who == KILL_ALL)
2719 if (kill(main_pid, signo) < 0)
2722 if (who == KILL_ALL && u->cgroup_path) {
2723 _cleanup_set_free_ Set *pid_set = NULL;
2726 /* Exclude the main/control pids from being killed via the cgroup */
2727 pid_set = unit_pid_set(main_pid, control_pid);
2731 q = cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, signo, false, true, false, pid_set);
2732 if (q < 0 && q != -EAGAIN && q != -ESRCH && q != -ENOENT)
2739 int unit_following_set(Unit *u, Set **s) {
2743 if (UNIT_VTABLE(u)->following_set)
2744 return UNIT_VTABLE(u)->following_set(u, s);
2750 UnitFileState unit_get_unit_file_state(Unit *u) {
2753 if (u->unit_file_state < 0 && u->fragment_path)
2754 u->unit_file_state = unit_file_get_state(
2755 u->manager->running_as == SYSTEMD_SYSTEM ? UNIT_FILE_SYSTEM : UNIT_FILE_USER,
2756 NULL, basename(u->fragment_path));
2758 return u->unit_file_state;
2761 Unit* unit_ref_set(UnitRef *ref, Unit *u) {
2766 unit_ref_unset(ref);
2769 LIST_PREPEND(refs, u->refs, ref);
2773 void unit_ref_unset(UnitRef *ref) {
2779 LIST_REMOVE(refs, ref->unit->refs, ref);
2783 int unit_exec_context_defaults(Unit *u, ExecContext *c) {
2790 /* This only copies in the ones that need memory */
2791 for (i = 0; i < RLIMIT_NLIMITS; i++)
2792 if (u->manager->rlimit[i] && !c->rlimit[i]) {
2793 c->rlimit[i] = newdup(struct rlimit, u->manager->rlimit[i], 1);
2798 if (u->manager->running_as == SYSTEMD_USER &&
2799 !c->working_directory) {
2801 r = get_home_dir(&c->working_directory);
2809 ExecContext *unit_get_exec_context(Unit *u) {
2813 offset = UNIT_VTABLE(u)->exec_context_offset;
2817 return (ExecContext*) ((uint8_t*) u + offset);
2820 KillContext *unit_get_kill_context(Unit *u) {
2824 offset = UNIT_VTABLE(u)->kill_context_offset;
2828 return (KillContext*) ((uint8_t*) u + offset);
2831 CGroupContext *unit_get_cgroup_context(Unit *u) {
2834 offset = UNIT_VTABLE(u)->cgroup_context_offset;
2838 return (CGroupContext*) ((uint8_t*) u + offset);
2841 ExecRuntime *unit_get_exec_runtime(Unit *u) {
2844 offset = UNIT_VTABLE(u)->exec_runtime_offset;
2848 return *(ExecRuntime**) ((uint8_t*) u + offset);
2851 static int drop_in_file(Unit *u, UnitSetPropertiesMode mode, const char *name, char **_p, char **_q) {
2852 _cleanup_free_ char *b = NULL;
2861 b = xescape(name, "/.");
2865 if (!filename_is_safe(b))
2868 if (u->manager->running_as == SYSTEMD_USER) {
2869 _cleanup_free_ char *c = NULL;
2871 r = user_config_home(&c);
2877 p = strjoin(c, "/", u->id, ".d", NULL);
2878 } else if (mode == UNIT_PERSISTENT && !u->transient)
2879 p = strjoin("/etc/systemd/system/", u->id, ".d", NULL);
2881 p = strjoin("/run/systemd/system/", u->id, ".d", NULL);
2885 q = strjoin(p, "/90-", b, ".conf", NULL);
2896 int unit_write_drop_in(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *data) {
2897 _cleanup_free_ char *p = NULL, *q = NULL;
2904 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
2907 r = drop_in_file(u, mode, name, &p, &q);
2912 return write_string_file_atomic_label(q, data);
2915 int unit_write_drop_in_format(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *format, ...) {
2916 _cleanup_free_ char *p = NULL;
2924 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
2927 va_start(ap, format);
2928 r = vasprintf(&p, format, ap);
2934 return unit_write_drop_in(u, mode, name, p);
2937 int unit_write_drop_in_private(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *data) {
2938 _cleanup_free_ char *ndata = NULL;
2944 if (!UNIT_VTABLE(u)->private_section)
2947 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
2950 ndata = strjoin("[", UNIT_VTABLE(u)->private_section, "]\n", data, NULL);
2954 return unit_write_drop_in(u, mode, name, ndata);
2957 int unit_write_drop_in_private_format(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *format, ...) {
2958 _cleanup_free_ char *p = NULL;
2966 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
2969 va_start(ap, format);
2970 r = vasprintf(&p, format, ap);
2976 return unit_write_drop_in_private(u, mode, name, p);
2979 int unit_remove_drop_in(Unit *u, UnitSetPropertiesMode mode, const char *name) {
2980 _cleanup_free_ char *p = NULL, *q = NULL;
2985 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
2988 r = drop_in_file(u, mode, name, &p, &q);
2993 r = errno == ENOENT ? 0 : -errno;
3001 int unit_make_transient(Unit *u) {
3006 u->load_state = UNIT_STUB;
3008 u->transient = true;
3010 free(u->fragment_path);
3011 u->fragment_path = NULL;
3013 if (u->manager->running_as == SYSTEMD_USER) {
3014 _cleanup_free_ char *c = NULL;
3016 r = user_config_home(&c);
3022 u->fragment_path = strjoin(c, "/", u->id, NULL);
3023 if (!u->fragment_path)
3028 u->fragment_path = strappend("/run/systemd/system/", u->id);
3029 if (!u->fragment_path)
3032 mkdir_p("/run/systemd/system", 0755);
3035 return write_string_file_atomic_label(u->fragment_path, "# Transient stub");
3038 int unit_kill_context(
3044 bool main_pid_alien) {
3046 int sig, wait_for_exit = false, r;
3051 if (c->kill_mode == KILL_NONE)
3054 sig = sigkill ? SIGKILL : c->kill_signal;
3057 r = kill_and_sigcont(main_pid, sig);
3059 if (r < 0 && r != -ESRCH) {
3060 _cleanup_free_ char *comm = NULL;
3061 get_process_comm(main_pid, &comm);
3063 log_warning_unit(u->id, "Failed to kill main process " PID_FMT " (%s): %s", main_pid, strna(comm), strerror(-r));
3065 if (!main_pid_alien)
3066 wait_for_exit = true;
3068 if (c->send_sighup && !sigkill)
3069 kill(main_pid, SIGHUP);
3073 if (control_pid > 0) {
3074 r = kill_and_sigcont(control_pid, sig);
3076 if (r < 0 && r != -ESRCH) {
3077 _cleanup_free_ char *comm = NULL;
3078 get_process_comm(control_pid, &comm);
3080 log_warning_unit(u->id, "Failed to kill control process " PID_FMT " (%s): %s", control_pid, strna(comm), strerror(-r));
3082 wait_for_exit = true;
3084 if (c->send_sighup && !sigkill)
3085 kill(control_pid, SIGHUP);
3089 if ((c->kill_mode == KILL_CONTROL_GROUP || (c->kill_mode == KILL_MIXED && sigkill)) && u->cgroup_path) {
3090 _cleanup_set_free_ Set *pid_set = NULL;
3092 /* Exclude the main/control pids from being killed via the cgroup */
3093 pid_set = unit_pid_set(main_pid, control_pid);
3097 r = cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, sig, true, true, false, pid_set);
3099 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
3100 log_warning_unit(u->id, "Failed to kill control group: %s", strerror(-r));
3103 /* FIXME: For now, we will not wait for the
3104 * cgroup members to die, simply because
3105 * cgroup notification is unreliable. It
3106 * doesn't work at all in containers, and
3107 * outside of containers it can be confused
3108 * easily by leaving directories in the
3111 /* wait_for_exit = true; */
3113 if (c->send_sighup && !sigkill) {
3116 pid_set = unit_pid_set(main_pid, control_pid);
3120 cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, SIGHUP, false, true, false, pid_set);
3125 return wait_for_exit;
3128 int unit_require_mounts_for(Unit *u, const char *path) {
3129 char prefix[strlen(path) + 1], *p;
3135 /* Registers a unit for requiring a certain path and all its
3136 * prefixes. We keep a simple array of these paths in the
3137 * unit, since its usually short. However, we build a prefix
3138 * table for all possible prefixes so that new appearing mount
3139 * units can easily determine which units to make themselves a
3142 if (!path_is_absolute(path))
3149 path_kill_slashes(p);
3151 if (!path_is_safe(p)) {
3156 if (strv_contains(u->requires_mounts_for, p)) {
3161 r = strv_push(&u->requires_mounts_for, p);
3167 PATH_FOREACH_PREFIX_MORE(prefix, p) {
3170 x = hashmap_get(u->manager->units_requiring_mounts_for, prefix);
3174 if (!u->manager->units_requiring_mounts_for) {
3175 u->manager->units_requiring_mounts_for = hashmap_new(string_hash_func, string_compare_func);
3176 if (!u->manager->units_requiring_mounts_for)
3184 x = set_new(NULL, NULL);
3190 r = hashmap_put(u->manager->units_requiring_mounts_for, q, x);
3206 int unit_setup_exec_runtime(Unit *u) {
3212 offset = UNIT_VTABLE(u)->exec_runtime_offset;
3215 /* Check if ther already is an ExecRuntime for this unit? */
3216 rt = (ExecRuntime**) ((uint8_t*) u + offset);
3220 /* Try to get it from somebody else */
3221 SET_FOREACH(other, u->dependencies[UNIT_JOINS_NAMESPACE_OF], i) {
3223 *rt = unit_get_exec_runtime(other);
3225 exec_runtime_ref(*rt);
3230 return exec_runtime_make(rt, unit_get_exec_context(u), u->id);
3233 static const char* const unit_active_state_table[_UNIT_ACTIVE_STATE_MAX] = {
3234 [UNIT_ACTIVE] = "active",
3235 [UNIT_RELOADING] = "reloading",
3236 [UNIT_INACTIVE] = "inactive",
3237 [UNIT_FAILED] = "failed",
3238 [UNIT_ACTIVATING] = "activating",
3239 [UNIT_DEACTIVATING] = "deactivating"
3242 DEFINE_STRING_TABLE_LOOKUP(unit_active_state, UnitActiveState);
3244 static const char* const unit_dependency_table[_UNIT_DEPENDENCY_MAX] = {
3245 [UNIT_REQUIRES] = "Requires",
3246 [UNIT_REQUIRES_OVERRIDABLE] = "RequiresOverridable",
3247 [UNIT_REQUISITE] = "Requisite",
3248 [UNIT_REQUISITE_OVERRIDABLE] = "RequisiteOverridable",
3249 [UNIT_WANTS] = "Wants",
3250 [UNIT_BINDS_TO] = "BindsTo",
3251 [UNIT_PART_OF] = "PartOf",
3252 [UNIT_REQUIRED_BY] = "RequiredBy",
3253 [UNIT_REQUIRED_BY_OVERRIDABLE] = "RequiredByOverridable",
3254 [UNIT_WANTED_BY] = "WantedBy",
3255 [UNIT_BOUND_BY] = "BoundBy",
3256 [UNIT_CONSISTS_OF] = "ConsistsOf",
3257 [UNIT_CONFLICTS] = "Conflicts",
3258 [UNIT_CONFLICTED_BY] = "ConflictedBy",
3259 [UNIT_BEFORE] = "Before",
3260 [UNIT_AFTER] = "After",
3261 [UNIT_ON_FAILURE] = "OnFailure",
3262 [UNIT_TRIGGERS] = "Triggers",
3263 [UNIT_TRIGGERED_BY] = "TriggeredBy",
3264 [UNIT_PROPAGATES_RELOAD_TO] = "PropagatesReloadTo",
3265 [UNIT_RELOAD_PROPAGATED_FROM] = "ReloadPropagatedFrom",
3266 [UNIT_REFERENCES] = "References",
3267 [UNIT_REFERENCED_BY] = "ReferencedBy",
3268 [UNIT_JOINS_NAMESPACE_OF] = "JoinsNamespaceOf",
3271 DEFINE_STRING_TABLE_LOOKUP(unit_dependency, UnitDependency);