1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
29 #include "sd-messages.h"
34 #include "path-util.h"
35 #include "load-fragment.h"
36 #include "load-dropin.h"
38 #include "unit-name.h"
39 #include "dbus-unit.h"
41 #include "cgroup-util.h"
44 #include "fileio-label.h"
45 #include "bus-common-errors.h"
50 const UnitVTable * const unit_vtable[_UNIT_TYPE_MAX] = {
51 [UNIT_SERVICE] = &service_vtable,
52 [UNIT_SOCKET] = &socket_vtable,
53 [UNIT_BUSNAME] = &busname_vtable,
54 [UNIT_TARGET] = &target_vtable,
55 [UNIT_SNAPSHOT] = &snapshot_vtable,
56 [UNIT_DEVICE] = &device_vtable,
57 [UNIT_MOUNT] = &mount_vtable,
58 [UNIT_AUTOMOUNT] = &automount_vtable,
59 [UNIT_SWAP] = &swap_vtable,
60 [UNIT_TIMER] = &timer_vtable,
61 [UNIT_PATH] = &path_vtable,
62 [UNIT_SLICE] = &slice_vtable,
63 [UNIT_SCOPE] = &scope_vtable
66 static int maybe_warn_about_dependency(const char *id, const char *other, UnitDependency dependency);
68 Unit *unit_new(Manager *m, size_t size) {
72 assert(size >= sizeof(Unit));
78 u->names = set_new(&string_hash_ops);
85 u->type = _UNIT_TYPE_INVALID;
86 u->deserialized_job = _JOB_TYPE_INVALID;
87 u->default_dependencies = true;
88 u->unit_file_state = _UNIT_FILE_STATE_INVALID;
89 u->unit_file_preset = -1;
90 u->on_failure_job_mode = JOB_REPLACE;
95 bool unit_has_name(Unit *u, const char *name) {
99 return !!set_get(u->names, (char*) name);
102 static void unit_init(Unit *u) {
109 assert(u->type >= 0);
111 cc = unit_get_cgroup_context(u);
113 cgroup_context_init(cc);
115 /* Copy in the manager defaults into the cgroup
116 * context, _before_ the rest of the settings have
117 * been initialized */
119 cc->cpu_accounting = u->manager->default_cpu_accounting;
120 cc->blockio_accounting = u->manager->default_blockio_accounting;
121 cc->memory_accounting = u->manager->default_memory_accounting;
124 ec = unit_get_exec_context(u);
126 exec_context_init(ec);
128 kc = unit_get_kill_context(u);
130 kill_context_init(kc);
132 if (UNIT_VTABLE(u)->init)
133 UNIT_VTABLE(u)->init(u);
136 int unit_add_name(Unit *u, const char *text) {
137 _cleanup_free_ char *s = NULL, *i = NULL;
144 if (unit_name_is_template(text)) {
149 s = unit_name_replace_instance(text, u->instance);
155 if (!unit_name_is_valid(s, TEMPLATE_INVALID))
158 assert_se((t = unit_name_to_type(s)) >= 0);
160 if (u->type != _UNIT_TYPE_INVALID && t != u->type)
163 r = unit_name_to_instance(s, &i);
167 if (i && unit_vtable[t]->no_instances)
170 /* Ensure that this unit is either instanced or not instanced,
172 if (u->type != _UNIT_TYPE_INVALID && !u->instance != !i)
175 if (unit_vtable[t]->no_alias &&
176 !set_isempty(u->names) &&
177 !set_get(u->names, s))
180 if (hashmap_size(u->manager->units) >= MANAGER_MAX_NAMES)
183 r = set_put(u->names, s);
191 r = hashmap_put(u->manager->units, s, u);
193 set_remove(u->names, s);
197 if (u->type == _UNIT_TYPE_INVALID) {
202 LIST_PREPEND(units_by_type, u->manager->units_by_type[t], u);
211 unit_add_to_dbus_queue(u);
215 int unit_choose_id(Unit *u, const char *name) {
216 _cleanup_free_ char *t = NULL;
223 if (unit_name_is_template(name)) {
228 t = unit_name_replace_instance(name, u->instance);
235 /* Selects one of the names of this unit as the id */
236 s = set_get(u->names, (char*) name);
240 r = unit_name_to_instance(s, &i);
249 unit_add_to_dbus_queue(u);
254 int unit_set_description(Unit *u, const char *description) {
259 if (isempty(description))
262 s = strdup(description);
267 free(u->description);
270 unit_add_to_dbus_queue(u);
274 bool unit_check_gc(Unit *u) {
275 UnitActiveState state;
284 state = unit_active_state(u);
286 /* If the unit is inactive and failed and no job is queued for
287 * it, then release its runtime resources */
288 if (UNIT_IS_INACTIVE_OR_FAILED(state) &&
289 UNIT_VTABLE(u)->release_resources)
290 UNIT_VTABLE(u)->release_resources(u);
292 /* But we keep the unit object around for longer when it is
293 * referenced or configured to not be gc'ed */
294 if (state != UNIT_INACTIVE)
297 if (UNIT_VTABLE(u)->no_gc)
306 if (UNIT_VTABLE(u)->check_gc)
307 if (UNIT_VTABLE(u)->check_gc(u))
313 void unit_add_to_load_queue(Unit *u) {
315 assert(u->type != _UNIT_TYPE_INVALID);
317 if (u->load_state != UNIT_STUB || u->in_load_queue)
320 LIST_PREPEND(load_queue, u->manager->load_queue, u);
321 u->in_load_queue = true;
324 void unit_add_to_cleanup_queue(Unit *u) {
327 if (u->in_cleanup_queue)
330 LIST_PREPEND(cleanup_queue, u->manager->cleanup_queue, u);
331 u->in_cleanup_queue = true;
334 void unit_add_to_gc_queue(Unit *u) {
337 if (u->in_gc_queue || u->in_cleanup_queue)
340 if (unit_check_gc(u))
343 LIST_PREPEND(gc_queue, u->manager->gc_queue, u);
344 u->in_gc_queue = true;
346 u->manager->n_in_gc_queue ++;
349 void unit_add_to_dbus_queue(Unit *u) {
351 assert(u->type != _UNIT_TYPE_INVALID);
353 if (u->load_state == UNIT_STUB || u->in_dbus_queue)
356 /* Shortcut things if nobody cares */
357 if (sd_bus_track_count(u->manager->subscribed) <= 0 &&
358 set_isempty(u->manager->private_buses)) {
359 u->sent_dbus_new_signal = true;
363 LIST_PREPEND(dbus_queue, u->manager->dbus_unit_queue, u);
364 u->in_dbus_queue = true;
367 static void bidi_set_free(Unit *u, Set *s) {
373 /* Frees the set and makes sure we are dropped from the
374 * inverse pointers */
376 SET_FOREACH(other, s, i) {
379 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++)
380 set_remove(other->dependencies[d], u);
382 unit_add_to_gc_queue(other);
388 static void unit_remove_transient(Unit *u) {
396 if (u->fragment_path)
397 unlink(u->fragment_path);
399 STRV_FOREACH(i, u->dropin_paths) {
400 _cleanup_free_ char *p = NULL;
405 r = path_get_parent(*i, &p);
411 static void unit_free_requires_mounts_for(Unit *u) {
414 STRV_FOREACH(j, u->requires_mounts_for) {
415 char s[strlen(*j) + 1];
417 PATH_FOREACH_PREFIX_MORE(s, *j) {
421 x = hashmap_get2(u->manager->units_requiring_mounts_for, s, (void**) &y);
427 if (set_isempty(x)) {
428 hashmap_remove(u->manager->units_requiring_mounts_for, y);
435 strv_free(u->requires_mounts_for);
436 u->requires_mounts_for = NULL;
439 static void unit_done(Unit *u) {
448 if (UNIT_VTABLE(u)->done)
449 UNIT_VTABLE(u)->done(u);
451 ec = unit_get_exec_context(u);
453 exec_context_done(ec);
455 cc = unit_get_cgroup_context(u);
457 cgroup_context_done(cc);
460 void unit_free(Unit *u) {
467 if (u->manager->n_reloading <= 0)
468 unit_remove_transient(u);
470 bus_unit_send_removed_signal(u);
474 unit_free_requires_mounts_for(u);
476 SET_FOREACH(t, u->names, i)
477 hashmap_remove_value(u->manager->units, t, u);
491 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++)
492 bidi_set_free(u, u->dependencies[d]);
494 if (u->type != _UNIT_TYPE_INVALID)
495 LIST_REMOVE(units_by_type, u->manager->units_by_type[u->type], u);
497 if (u->in_load_queue)
498 LIST_REMOVE(load_queue, u->manager->load_queue, u);
500 if (u->in_dbus_queue)
501 LIST_REMOVE(dbus_queue, u->manager->dbus_unit_queue, u);
503 if (u->in_cleanup_queue)
504 LIST_REMOVE(cleanup_queue, u->manager->cleanup_queue, u);
506 if (u->in_gc_queue) {
507 LIST_REMOVE(gc_queue, u->manager->gc_queue, u);
508 u->manager->n_in_gc_queue--;
511 if (u->in_cgroup_queue)
512 LIST_REMOVE(cgroup_queue, u->manager->cgroup_queue, u);
514 if (u->cgroup_path) {
515 hashmap_remove(u->manager->cgroup_unit, u->cgroup_path);
516 free(u->cgroup_path);
519 set_remove(u->manager->failed_units, u);
520 set_remove(u->manager->startup_units, u);
522 free(u->description);
523 strv_free(u->documentation);
524 free(u->fragment_path);
525 free(u->source_path);
526 strv_free(u->dropin_paths);
529 free(u->job_timeout_reboot_arg);
531 set_free_free(u->names);
533 unit_unwatch_all_pids(u);
535 condition_free_list(u->conditions);
536 condition_free_list(u->asserts);
538 unit_ref_unset(&u->slice);
541 unit_ref_unset(u->refs);
546 UnitActiveState unit_active_state(Unit *u) {
549 if (u->load_state == UNIT_MERGED)
550 return unit_active_state(unit_follow_merge(u));
552 /* After a reload it might happen that a unit is not correctly
553 * loaded but still has a process around. That's why we won't
554 * shortcut failed loading to UNIT_INACTIVE_FAILED. */
556 return UNIT_VTABLE(u)->active_state(u);
559 const char* unit_sub_state_to_string(Unit *u) {
562 return UNIT_VTABLE(u)->sub_state_to_string(u);
565 static int complete_move(Set **s, Set **other) {
575 r = set_move(*s, *other);
586 static int merge_names(Unit *u, Unit *other) {
594 r = complete_move(&u->names, &other->names);
598 set_free_free(other->names);
602 SET_FOREACH(t, u->names, i)
603 assert_se(hashmap_replace(u->manager->units, t, u) == 0);
608 static int reserve_dependencies(Unit *u, Unit *other, UnitDependency d) {
613 assert(d < _UNIT_DEPENDENCY_MAX);
616 * If u does not have this dependency set allocated, there is no need
617 * to reserve anything. In that case other's set will be transferred
618 * as a whole to u by complete_move().
620 if (!u->dependencies[d])
623 /* merge_dependencies() will skip a u-on-u dependency */
624 n_reserve = set_size(other->dependencies[d]) - !!set_get(other->dependencies[d], u);
626 return set_reserve(u->dependencies[d], n_reserve);
629 static void merge_dependencies(Unit *u, Unit *other, const char *other_id, UnitDependency d) {
636 assert(d < _UNIT_DEPENDENCY_MAX);
638 /* Fix backwards pointers */
639 SET_FOREACH(back, other->dependencies[d], i) {
642 for (k = 0; k < _UNIT_DEPENDENCY_MAX; k++) {
643 /* Do not add dependencies between u and itself */
645 if (set_remove(back->dependencies[k], other))
646 maybe_warn_about_dependency(u->id, other_id, k);
648 r = set_remove_and_put(back->dependencies[k], other, u);
650 set_remove(back->dependencies[k], other);
652 assert(r >= 0 || r == -ENOENT);
657 /* Also do not move dependencies on u to itself */
658 back = set_remove(other->dependencies[d], u);
660 maybe_warn_about_dependency(u->id, other_id, d);
662 /* The move cannot fail. The caller must have performed a reservation. */
663 assert_se(complete_move(&u->dependencies[d], &other->dependencies[d]) == 0);
665 set_free(other->dependencies[d]);
666 other->dependencies[d] = NULL;
669 int unit_merge(Unit *u, Unit *other) {
671 const char *other_id = NULL;
676 assert(u->manager == other->manager);
677 assert(u->type != _UNIT_TYPE_INVALID);
679 other = unit_follow_merge(other);
684 if (u->type != other->type)
687 if (!u->instance != !other->instance)
690 if (other->load_state != UNIT_STUB &&
691 other->load_state != UNIT_NOT_FOUND)
700 if (!UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(other)))
704 other_id = strdupa(other->id);
706 /* Make reservations to ensure merge_dependencies() won't fail */
707 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++) {
708 r = reserve_dependencies(u, other, d);
710 * We don't rollback reservations if we fail. We don't have
711 * a way to undo reservations. A reservation is not a leak.
718 r = merge_names(u, other);
722 /* Redirect all references */
724 unit_ref_set(other->refs, u);
726 /* Merge dependencies */
727 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++)
728 merge_dependencies(u, other, other_id, d);
730 other->load_state = UNIT_MERGED;
731 other->merged_into = u;
733 /* If there is still some data attached to the other node, we
734 * don't need it anymore, and can free it. */
735 if (other->load_state != UNIT_STUB)
736 if (UNIT_VTABLE(other)->done)
737 UNIT_VTABLE(other)->done(other);
739 unit_add_to_dbus_queue(u);
740 unit_add_to_cleanup_queue(other);
745 int unit_merge_by_name(Unit *u, const char *name) {
748 _cleanup_free_ char *s = NULL;
753 if (unit_name_is_template(name)) {
757 s = unit_name_replace_instance(name, u->instance);
764 other = manager_get_unit(u->manager, name);
766 r = unit_add_name(u, name);
768 r = unit_merge(u, other);
773 Unit* unit_follow_merge(Unit *u) {
776 while (u->load_state == UNIT_MERGED)
777 assert_se(u = u->merged_into);
782 int unit_add_exec_dependencies(Unit *u, ExecContext *c) {
788 if (c->working_directory) {
789 r = unit_require_mounts_for(u, c->working_directory);
794 if (c->root_directory) {
795 r = unit_require_mounts_for(u, c->root_directory);
800 if (u->manager->running_as != SYSTEMD_SYSTEM)
803 if (c->private_tmp) {
804 r = unit_require_mounts_for(u, "/tmp");
808 r = unit_require_mounts_for(u, "/var/tmp");
813 if (c->std_output != EXEC_OUTPUT_KMSG &&
814 c->std_output != EXEC_OUTPUT_SYSLOG &&
815 c->std_output != EXEC_OUTPUT_JOURNAL &&
816 c->std_output != EXEC_OUTPUT_KMSG_AND_CONSOLE &&
817 c->std_output != EXEC_OUTPUT_SYSLOG_AND_CONSOLE &&
818 c->std_output != EXEC_OUTPUT_JOURNAL_AND_CONSOLE &&
819 c->std_error != EXEC_OUTPUT_KMSG &&
820 c->std_error != EXEC_OUTPUT_SYSLOG &&
821 c->std_error != EXEC_OUTPUT_JOURNAL &&
822 c->std_error != EXEC_OUTPUT_KMSG_AND_CONSOLE &&
823 c->std_error != EXEC_OUTPUT_JOURNAL_AND_CONSOLE &&
824 c->std_error != EXEC_OUTPUT_SYSLOG_AND_CONSOLE)
827 /* If syslog or kernel logging is requested, make sure our own
828 * logging daemon is run first. */
830 r = unit_add_dependency_by_name(u, UNIT_AFTER, SPECIAL_JOURNALD_SOCKET, NULL, true);
837 const char *unit_description(Unit *u) {
841 return u->description;
846 void unit_dump(Unit *u, FILE *f, const char *prefix) {
852 timestamp1[FORMAT_TIMESTAMP_MAX],
853 timestamp2[FORMAT_TIMESTAMP_MAX],
854 timestamp3[FORMAT_TIMESTAMP_MAX],
855 timestamp4[FORMAT_TIMESTAMP_MAX],
856 timespan[FORMAT_TIMESPAN_MAX];
858 _cleanup_set_free_ Set *following_set = NULL;
862 assert(u->type >= 0);
864 prefix = strempty(prefix);
865 prefix2 = strjoina(prefix, "\t");
869 "%s\tDescription: %s\n"
871 "%s\tUnit Load State: %s\n"
872 "%s\tUnit Active State: %s\n"
873 "%s\tInactive Exit Timestamp: %s\n"
874 "%s\tActive Enter Timestamp: %s\n"
875 "%s\tActive Exit Timestamp: %s\n"
876 "%s\tInactive Enter Timestamp: %s\n"
877 "%s\tGC Check Good: %s\n"
878 "%s\tNeed Daemon Reload: %s\n"
879 "%s\tTransient: %s\n"
882 "%s\tCGroup realized: %s\n"
883 "%s\tCGroup mask: 0x%x\n"
884 "%s\tCGroup members mask: 0x%x\n",
886 prefix, unit_description(u),
887 prefix, strna(u->instance),
888 prefix, unit_load_state_to_string(u->load_state),
889 prefix, unit_active_state_to_string(unit_active_state(u)),
890 prefix, strna(format_timestamp(timestamp1, sizeof(timestamp1), u->inactive_exit_timestamp.realtime)),
891 prefix, strna(format_timestamp(timestamp2, sizeof(timestamp2), u->active_enter_timestamp.realtime)),
892 prefix, strna(format_timestamp(timestamp3, sizeof(timestamp3), u->active_exit_timestamp.realtime)),
893 prefix, strna(format_timestamp(timestamp4, sizeof(timestamp4), u->inactive_enter_timestamp.realtime)),
894 prefix, yes_no(unit_check_gc(u)),
895 prefix, yes_no(unit_need_daemon_reload(u)),
896 prefix, yes_no(u->transient),
897 prefix, strna(unit_slice_name(u)),
898 prefix, strna(u->cgroup_path),
899 prefix, yes_no(u->cgroup_realized),
900 prefix, u->cgroup_realized_mask,
901 prefix, u->cgroup_members_mask);
903 SET_FOREACH(t, u->names, i)
904 fprintf(f, "%s\tName: %s\n", prefix, t);
906 STRV_FOREACH(j, u->documentation)
907 fprintf(f, "%s\tDocumentation: %s\n", prefix, *j);
909 following = unit_following(u);
911 fprintf(f, "%s\tFollowing: %s\n", prefix, following->id);
913 r = unit_following_set(u, &following_set);
917 SET_FOREACH(other, following_set, i)
918 fprintf(f, "%s\tFollowing Set Member: %s\n", prefix, other->id);
921 if (u->fragment_path)
922 fprintf(f, "%s\tFragment Path: %s\n", prefix, u->fragment_path);
925 fprintf(f, "%s\tSource Path: %s\n", prefix, u->source_path);
927 STRV_FOREACH(j, u->dropin_paths)
928 fprintf(f, "%s\tDropIn Path: %s\n", prefix, *j);
930 if (u->job_timeout > 0)
931 fprintf(f, "%s\tJob Timeout: %s\n", prefix, format_timespan(timespan, sizeof(timespan), u->job_timeout, 0));
933 if (u->job_timeout_action != FAILURE_ACTION_NONE)
934 fprintf(f, "%s\tJob Timeout Action: %s\n", prefix, failure_action_to_string(u->job_timeout_action));
936 if (u->job_timeout_reboot_arg)
937 fprintf(f, "%s\tJob Timeout Reboot Argument: %s\n", prefix, u->job_timeout_reboot_arg);
939 condition_dump_list(u->conditions, f, prefix, condition_type_to_string);
940 condition_dump_list(u->asserts, f, prefix, assert_type_to_string);
942 if (dual_timestamp_is_set(&u->condition_timestamp))
944 "%s\tCondition Timestamp: %s\n"
945 "%s\tCondition Result: %s\n",
946 prefix, strna(format_timestamp(timestamp1, sizeof(timestamp1), u->condition_timestamp.realtime)),
947 prefix, yes_no(u->condition_result));
949 if (dual_timestamp_is_set(&u->assert_timestamp))
951 "%s\tAssert Timestamp: %s\n"
952 "%s\tAssert Result: %s\n",
953 prefix, strna(format_timestamp(timestamp1, sizeof(timestamp1), u->assert_timestamp.realtime)),
954 prefix, yes_no(u->assert_result));
956 for (d = 0; d < _UNIT_DEPENDENCY_MAX; d++) {
959 SET_FOREACH(other, u->dependencies[d], i)
960 fprintf(f, "%s\t%s: %s\n", prefix, unit_dependency_to_string(d), other->id);
963 if (!strv_isempty(u->requires_mounts_for)) {
965 "%s\tRequiresMountsFor:", prefix);
967 STRV_FOREACH(j, u->requires_mounts_for)
968 fprintf(f, " %s", *j);
973 if (u->load_state == UNIT_LOADED) {
976 "%s\tStopWhenUnneeded: %s\n"
977 "%s\tRefuseManualStart: %s\n"
978 "%s\tRefuseManualStop: %s\n"
979 "%s\tDefaultDependencies: %s\n"
980 "%s\tOnFailureJobMode: %s\n"
981 "%s\tIgnoreOnIsolate: %s\n"
982 "%s\tIgnoreOnSnapshot: %s\n",
983 prefix, yes_no(u->stop_when_unneeded),
984 prefix, yes_no(u->refuse_manual_start),
985 prefix, yes_no(u->refuse_manual_stop),
986 prefix, yes_no(u->default_dependencies),
987 prefix, job_mode_to_string(u->on_failure_job_mode),
988 prefix, yes_no(u->ignore_on_isolate),
989 prefix, yes_no(u->ignore_on_snapshot));
991 if (UNIT_VTABLE(u)->dump)
992 UNIT_VTABLE(u)->dump(u, f, prefix2);
994 } else if (u->load_state == UNIT_MERGED)
996 "%s\tMerged into: %s\n",
997 prefix, u->merged_into->id);
998 else if (u->load_state == UNIT_ERROR)
999 fprintf(f, "%s\tLoad Error Code: %s\n", prefix, strerror(-u->load_error));
1003 job_dump(u->job, f, prefix2);
1006 job_dump(u->nop_job, f, prefix2);
1010 /* Common implementation for multiple backends */
1011 int unit_load_fragment_and_dropin(Unit *u) {
1016 /* Load a .{service,socket,...} file */
1017 r = unit_load_fragment(u);
1021 if (u->load_state == UNIT_STUB)
1024 /* Load drop-in directory data */
1025 r = unit_load_dropin(unit_follow_merge(u));
1032 /* Common implementation for multiple backends */
1033 int unit_load_fragment_and_dropin_optional(Unit *u) {
1038 /* Same as unit_load_fragment_and_dropin(), but whether
1039 * something can be loaded or not doesn't matter. */
1041 /* Load a .service file */
1042 r = unit_load_fragment(u);
1046 if (u->load_state == UNIT_STUB)
1047 u->load_state = UNIT_LOADED;
1049 /* Load drop-in directory data */
1050 r = unit_load_dropin(unit_follow_merge(u));
1057 int unit_add_default_target_dependency(Unit *u, Unit *target) {
1061 if (target->type != UNIT_TARGET)
1064 /* Only add the dependency if both units are loaded, so that
1065 * that loop check below is reliable */
1066 if (u->load_state != UNIT_LOADED ||
1067 target->load_state != UNIT_LOADED)
1070 /* If either side wants no automatic dependencies, then let's
1072 if (!u->default_dependencies ||
1073 !target->default_dependencies)
1076 /* Don't create loops */
1077 if (set_get(target->dependencies[UNIT_BEFORE], u))
1080 return unit_add_dependency(target, UNIT_AFTER, u, true);
1083 static int unit_add_target_dependencies(Unit *u) {
1085 static const UnitDependency deps[] = {
1087 UNIT_REQUIRED_BY_OVERRIDABLE,
1099 for (k = 0; k < ELEMENTSOF(deps); k++)
1100 SET_FOREACH(target, u->dependencies[deps[k]], i) {
1101 r = unit_add_default_target_dependency(u, target);
1109 static int unit_add_slice_dependencies(Unit *u) {
1112 if (!unit_get_cgroup_context(u))
1115 if (UNIT_ISSET(u->slice))
1116 return unit_add_two_dependencies(u, UNIT_AFTER, UNIT_WANTS, UNIT_DEREF(u->slice), true);
1118 if (streq(u->id, SPECIAL_ROOT_SLICE))
1121 return unit_add_two_dependencies_by_name(u, UNIT_AFTER, UNIT_WANTS, SPECIAL_ROOT_SLICE, NULL, true);
1124 static int unit_add_mount_dependencies(Unit *u) {
1130 STRV_FOREACH(i, u->requires_mounts_for) {
1131 char prefix[strlen(*i) + 1];
1133 PATH_FOREACH_PREFIX_MORE(prefix, *i) {
1136 r = manager_get_unit_by_path(u->manager, prefix, ".mount", &m);
1144 if (m->load_state != UNIT_LOADED)
1147 r = unit_add_dependency(u, UNIT_AFTER, m, true);
1151 if (m->fragment_path) {
1152 r = unit_add_dependency(u, UNIT_REQUIRES, m, true);
1162 static int unit_add_startup_units(Unit *u) {
1166 c = unit_get_cgroup_context(u);
1170 if (c->startup_cpu_shares == (unsigned long) -1 &&
1171 c->startup_blockio_weight == (unsigned long) -1)
1174 r = set_put(u->manager->startup_units, u);
1181 int unit_load(Unit *u) {
1186 if (u->in_load_queue) {
1187 LIST_REMOVE(load_queue, u->manager->load_queue, u);
1188 u->in_load_queue = false;
1191 if (u->type == _UNIT_TYPE_INVALID)
1194 if (u->load_state != UNIT_STUB)
1197 if (UNIT_VTABLE(u)->load) {
1198 r = UNIT_VTABLE(u)->load(u);
1203 if (u->load_state == UNIT_STUB) {
1208 if (u->load_state == UNIT_LOADED) {
1210 r = unit_add_target_dependencies(u);
1214 r = unit_add_slice_dependencies(u);
1218 r = unit_add_mount_dependencies(u);
1222 r = unit_add_startup_units(u);
1226 if (u->on_failure_job_mode == JOB_ISOLATE && set_size(u->dependencies[UNIT_ON_FAILURE]) > 1) {
1227 log_unit_error(u->id, "More than one OnFailure= dependencies specified for %s but OnFailureJobMode=isolate set. Refusing.", u->id);
1232 unit_update_cgroup_members_masks(u);
1235 assert((u->load_state != UNIT_MERGED) == !u->merged_into);
1237 unit_add_to_dbus_queue(unit_follow_merge(u));
1238 unit_add_to_gc_queue(u);
1243 u->load_state = u->load_state == UNIT_STUB ? UNIT_NOT_FOUND : UNIT_ERROR;
1245 unit_add_to_dbus_queue(u);
1246 unit_add_to_gc_queue(u);
1248 log_unit_debug(u->id, "Failed to load configuration for %s: %s",
1249 u->id, strerror(-r));
1254 static bool unit_condition_test_list(Unit *u, Condition *first, const char *(*to_string)(ConditionType t)) {
1261 /* If the condition list is empty, then it is true */
1265 /* Otherwise, if all of the non-trigger conditions apply and
1266 * if any of the trigger conditions apply (unless there are
1267 * none) we return true */
1268 LIST_FOREACH(conditions, c, first) {
1271 r = condition_test(c);
1273 log_unit_warning(u->id,
1274 "Couldn't determine result for %s=%s%s%s for %s, assuming failed: %s",
1276 c->trigger ? "|" : "",
1277 c->negate ? "!" : "",
1282 log_unit_debug(u->id,
1283 "%s=%s%s%s %s for %s.",
1285 c->trigger ? "|" : "",
1286 c->negate ? "!" : "",
1288 condition_result_to_string(c->result),
1291 if (!c->trigger && r <= 0)
1294 if (c->trigger && triggered <= 0)
1298 return triggered != 0;
1301 static bool unit_condition_test(Unit *u) {
1304 dual_timestamp_get(&u->condition_timestamp);
1305 u->condition_result = unit_condition_test_list(u, u->conditions, condition_type_to_string);
1307 return u->condition_result;
1310 static bool unit_assert_test(Unit *u) {
1313 dual_timestamp_get(&u->assert_timestamp);
1314 u->assert_result = unit_condition_test_list(u, u->asserts, assert_type_to_string);
1316 return u->assert_result;
1319 _pure_ static const char* unit_get_status_message_format(Unit *u, JobType t) {
1320 const UnitStatusMessageFormats *format_table;
1324 assert(t < _JOB_TYPE_MAX);
1326 if (t != JOB_START && t != JOB_STOP)
1329 format_table = &UNIT_VTABLE(u)->status_message_formats;
1333 return format_table->starting_stopping[t == JOB_STOP];
1336 _pure_ static const char *unit_get_status_message_format_try_harder(Unit *u, JobType t) {
1341 assert(t < _JOB_TYPE_MAX);
1343 format = unit_get_status_message_format(u, t);
1347 /* Return generic strings */
1349 return "Starting %s.";
1350 else if (t == JOB_STOP)
1351 return "Stopping %s.";
1352 else if (t == JOB_RELOAD)
1353 return "Reloading %s.";
1358 static void unit_status_print_starting_stopping(Unit *u, JobType t) {
1363 /* We only print status messages for selected units on
1364 * selected operations. */
1366 format = unit_get_status_message_format(u, t);
1370 DISABLE_WARNING_FORMAT_NONLITERAL;
1371 unit_status_printf(u, "", format);
1375 static void unit_status_log_starting_stopping_reloading(Unit *u, JobType t) {
1382 if (t != JOB_START && t != JOB_STOP && t != JOB_RELOAD)
1385 if (log_on_console())
1388 /* We log status messages for all units and all operations. */
1390 format = unit_get_status_message_format_try_harder(u, t);
1394 DISABLE_WARNING_FORMAT_NONLITERAL;
1395 snprintf(buf, sizeof(buf), format, unit_description(u));
1398 mid = t == JOB_START ? SD_MESSAGE_UNIT_STARTING :
1399 t == JOB_STOP ? SD_MESSAGE_UNIT_STOPPING :
1400 SD_MESSAGE_UNIT_RELOADING;
1402 log_unit_struct(u->id,
1404 LOG_MESSAGE_ID(mid),
1405 LOG_MESSAGE("%s", buf),
1410 * -EBADR: This unit type does not support starting.
1411 * -EALREADY: Unit is already started.
1412 * -EAGAIN: An operation is already in progress. Retry later.
1413 * -ECANCELED: Too many requests for now.
1414 * -EPROTO: Assert failed
1416 int unit_start(Unit *u) {
1417 UnitActiveState state;
1423 if (u->load_state != UNIT_LOADED)
1426 /* If this is already started, then this will succeed. Note
1427 * that this will even succeed if this unit is not startable
1428 * by the user. This is relied on to detect when we need to
1429 * wait for units and when waiting is finished. */
1430 state = unit_active_state(u);
1431 if (UNIT_IS_ACTIVE_OR_RELOADING(state))
1434 /* If the conditions failed, don't do anything at all. If we
1435 * already are activating this call might still be useful to
1436 * speed up activation in case there is some hold-off time,
1437 * but we don't want to recheck the condition in that case. */
1438 if (state != UNIT_ACTIVATING &&
1439 !unit_condition_test(u)) {
1440 log_unit_debug(u->id, "Starting of %s requested but condition failed. Not starting unit.", u->id);
1444 /* If the asserts failed, fail the entire job */
1445 if (state != UNIT_ACTIVATING &&
1446 !unit_assert_test(u)) {
1447 log_unit_debug(u->id, "Starting of %s requested but asserts failed.", u->id);
1451 /* Forward to the main object, if we aren't it. */
1452 following = unit_following(u);
1454 log_unit_debug(u->id, "Redirecting start request from %s to %s.", u->id, following->id);
1455 return unit_start(following);
1458 if (UNIT_VTABLE(u)->supported && !UNIT_VTABLE(u)->supported(u->manager))
1461 /* If it is stopped, but we cannot start it, then fail */
1462 if (!UNIT_VTABLE(u)->start)
1465 /* We don't suppress calls to ->start() here when we are
1466 * already starting, to allow this request to be used as a
1467 * "hurry up" call, for example when the unit is in some "auto
1468 * restart" state where it waits for a holdoff timer to elapse
1469 * before it will start again. */
1471 unit_add_to_dbus_queue(u);
1473 r = UNIT_VTABLE(u)->start(u);
1477 /* Log if the start function actually did something */
1478 unit_status_log_starting_stopping_reloading(u, JOB_START);
1479 unit_status_print_starting_stopping(u, JOB_START);
1483 bool unit_can_start(Unit *u) {
1486 return !!UNIT_VTABLE(u)->start;
1489 bool unit_can_isolate(Unit *u) {
1492 return unit_can_start(u) &&
1497 * -EBADR: This unit type does not support stopping.
1498 * -EALREADY: Unit is already stopped.
1499 * -EAGAIN: An operation is already in progress. Retry later.
1501 int unit_stop(Unit *u) {
1502 UnitActiveState state;
1508 state = unit_active_state(u);
1509 if (UNIT_IS_INACTIVE_OR_FAILED(state))
1512 following = unit_following(u);
1514 log_unit_debug(u->id, "Redirecting stop request from %s to %s.", u->id, following->id);
1515 return unit_stop(following);
1518 if (!UNIT_VTABLE(u)->stop)
1521 unit_add_to_dbus_queue(u);
1523 r = UNIT_VTABLE(u)->stop(u);
1527 unit_status_log_starting_stopping_reloading(u, JOB_STOP);
1528 unit_status_print_starting_stopping(u, JOB_STOP);
1533 * -EBADR: This unit type does not support reloading.
1534 * -ENOEXEC: Unit is not started.
1535 * -EAGAIN: An operation is already in progress. Retry later.
1537 int unit_reload(Unit *u) {
1538 UnitActiveState state;
1544 if (u->load_state != UNIT_LOADED)
1547 if (!unit_can_reload(u))
1550 state = unit_active_state(u);
1551 if (state == UNIT_RELOADING)
1554 if (state != UNIT_ACTIVE) {
1555 log_unit_warning(u->id, "Unit %s cannot be reloaded because it is inactive.", u->id);
1559 following = unit_following(u);
1561 log_unit_debug(u->id, "Redirecting reload request from %s to %s.", u->id, following->id);
1562 return unit_reload(following);
1565 unit_add_to_dbus_queue(u);
1567 r = UNIT_VTABLE(u)->reload(u);
1571 unit_status_log_starting_stopping_reloading(u, JOB_RELOAD);
1575 bool unit_can_reload(Unit *u) {
1578 if (!UNIT_VTABLE(u)->reload)
1581 if (!UNIT_VTABLE(u)->can_reload)
1584 return UNIT_VTABLE(u)->can_reload(u);
1587 static void unit_check_unneeded(Unit *u) {
1593 /* If this service shall be shut down when unneeded then do
1596 if (!u->stop_when_unneeded)
1599 if (!UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(u)))
1602 SET_FOREACH(other, u->dependencies[UNIT_REQUIRED_BY], i)
1603 if (unit_active_or_pending(other))
1606 SET_FOREACH(other, u->dependencies[UNIT_REQUIRED_BY_OVERRIDABLE], i)
1607 if (unit_active_or_pending(other))
1610 SET_FOREACH(other, u->dependencies[UNIT_WANTED_BY], i)
1611 if (unit_active_or_pending(other))
1614 SET_FOREACH(other, u->dependencies[UNIT_BOUND_BY], i)
1615 if (unit_active_or_pending(other))
1618 log_unit_info(u->id, "Unit %s is not needed anymore. Stopping.", u->id);
1620 /* Ok, nobody needs us anymore. Sniff. Then let's commit suicide */
1621 manager_add_job(u->manager, JOB_STOP, u, JOB_FAIL, true, NULL, NULL);
1624 static void unit_check_binds_to(Unit *u) {
1634 if (unit_active_state(u) != UNIT_ACTIVE)
1637 SET_FOREACH(other, u->dependencies[UNIT_BINDS_TO], i) {
1641 if (!UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(other)))
1650 log_unit_info(u->id, "Unit %s is bound to inactive unit. Stopping, too.", u->id);
1652 /* A unit we need to run is gone. Sniff. Let's stop this. */
1653 manager_add_job(u->manager, JOB_STOP, u, JOB_FAIL, true, NULL, NULL);
1656 static void retroactively_start_dependencies(Unit *u) {
1661 assert(UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(u)));
1663 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES], i)
1664 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1665 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1666 manager_add_job(u->manager, JOB_START, other, JOB_REPLACE, true, NULL, NULL);
1668 SET_FOREACH(other, u->dependencies[UNIT_BINDS_TO], i)
1669 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1670 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1671 manager_add_job(u->manager, JOB_START, other, JOB_REPLACE, true, NULL, NULL);
1673 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES_OVERRIDABLE], i)
1674 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1675 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1676 manager_add_job(u->manager, JOB_START, other, JOB_FAIL, false, NULL, NULL);
1678 SET_FOREACH(other, u->dependencies[UNIT_WANTS], i)
1679 if (!set_get(u->dependencies[UNIT_AFTER], other) &&
1680 !UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(other)))
1681 manager_add_job(u->manager, JOB_START, other, JOB_FAIL, false, NULL, NULL);
1683 SET_FOREACH(other, u->dependencies[UNIT_CONFLICTS], i)
1684 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1685 manager_add_job(u->manager, JOB_STOP, other, JOB_REPLACE, true, NULL, NULL);
1687 SET_FOREACH(other, u->dependencies[UNIT_CONFLICTED_BY], i)
1688 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1689 manager_add_job(u->manager, JOB_STOP, other, JOB_REPLACE, true, NULL, NULL);
1692 static void retroactively_stop_dependencies(Unit *u) {
1697 assert(UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(u)));
1699 /* Pull down units which are bound to us recursively if enabled */
1700 SET_FOREACH(other, u->dependencies[UNIT_BOUND_BY], i)
1701 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1702 manager_add_job(u->manager, JOB_STOP, other, JOB_REPLACE, true, NULL, NULL);
1705 static void check_unneeded_dependencies(Unit *u) {
1710 assert(UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(u)));
1712 /* Garbage collect services that might not be needed anymore, if enabled */
1713 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES], i)
1714 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1715 unit_check_unneeded(other);
1716 SET_FOREACH(other, u->dependencies[UNIT_REQUIRES_OVERRIDABLE], i)
1717 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1718 unit_check_unneeded(other);
1719 SET_FOREACH(other, u->dependencies[UNIT_WANTS], i)
1720 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1721 unit_check_unneeded(other);
1722 SET_FOREACH(other, u->dependencies[UNIT_REQUISITE], i)
1723 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1724 unit_check_unneeded(other);
1725 SET_FOREACH(other, u->dependencies[UNIT_REQUISITE_OVERRIDABLE], i)
1726 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1727 unit_check_unneeded(other);
1728 SET_FOREACH(other, u->dependencies[UNIT_BINDS_TO], i)
1729 if (!UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(other)))
1730 unit_check_unneeded(other);
1733 void unit_start_on_failure(Unit *u) {
1739 if (set_size(u->dependencies[UNIT_ON_FAILURE]) <= 0)
1742 log_unit_info(u->id, "Triggering OnFailure= dependencies of %s.", u->id);
1744 SET_FOREACH(other, u->dependencies[UNIT_ON_FAILURE], i) {
1747 r = manager_add_job(u->manager, JOB_START, other, u->on_failure_job_mode, true, NULL, NULL);
1749 log_unit_error_errno(u->id, r, "Failed to enqueue OnFailure= job: %m");
1753 void unit_trigger_notify(Unit *u) {
1759 SET_FOREACH(other, u->dependencies[UNIT_TRIGGERED_BY], i)
1760 if (UNIT_VTABLE(other)->trigger_notify)
1761 UNIT_VTABLE(other)->trigger_notify(other, u);
1764 void unit_notify(Unit *u, UnitActiveState os, UnitActiveState ns, bool reload_success) {
1769 assert(os < _UNIT_ACTIVE_STATE_MAX);
1770 assert(ns < _UNIT_ACTIVE_STATE_MAX);
1772 /* Note that this is called for all low-level state changes,
1773 * even if they might map to the same high-level
1774 * UnitActiveState! That means that ns == os is an expected
1775 * behavior here. For example: if a mount point is remounted
1776 * this function will be called too! */
1780 /* Update timestamps for state changes */
1781 if (m->n_reloading <= 0) {
1784 dual_timestamp_get(&ts);
1786 if (UNIT_IS_INACTIVE_OR_FAILED(os) && !UNIT_IS_INACTIVE_OR_FAILED(ns))
1787 u->inactive_exit_timestamp = ts;
1788 else if (!UNIT_IS_INACTIVE_OR_FAILED(os) && UNIT_IS_INACTIVE_OR_FAILED(ns))
1789 u->inactive_enter_timestamp = ts;
1791 if (!UNIT_IS_ACTIVE_OR_RELOADING(os) && UNIT_IS_ACTIVE_OR_RELOADING(ns))
1792 u->active_enter_timestamp = ts;
1793 else if (UNIT_IS_ACTIVE_OR_RELOADING(os) && !UNIT_IS_ACTIVE_OR_RELOADING(ns))
1794 u->active_exit_timestamp = ts;
1797 /* Keep track of failed units */
1798 if (ns == UNIT_FAILED)
1799 set_put(u->manager->failed_units, u);
1801 set_remove(u->manager->failed_units, u);
1803 /* Make sure the cgroup is always removed when we become inactive */
1804 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1805 unit_destroy_cgroup_if_empty(u);
1807 /* Note that this doesn't apply to RemainAfterExit services exiting
1808 * successfully, since there's no change of state in that case. Which is
1809 * why it is handled in service_set_state() */
1810 if (UNIT_IS_INACTIVE_OR_FAILED(os) != UNIT_IS_INACTIVE_OR_FAILED(ns)) {
1813 ec = unit_get_exec_context(u);
1814 if (ec && exec_context_may_touch_console(ec)) {
1815 if (UNIT_IS_INACTIVE_OR_FAILED(ns)) {
1818 if (m->n_on_console == 0)
1819 /* unset no_console_output flag, since the console is free */
1820 m->no_console_output = false;
1829 if (u->job->state == JOB_WAITING)
1831 /* So we reached a different state for this
1832 * job. Let's see if we can run it now if it
1833 * failed previously due to EAGAIN. */
1834 job_add_to_run_queue(u->job);
1836 /* Let's check whether this state change constitutes a
1837 * finished job, or maybe contradicts a running job and
1838 * hence needs to invalidate jobs. */
1840 switch (u->job->type) {
1843 case JOB_VERIFY_ACTIVE:
1845 if (UNIT_IS_ACTIVE_OR_RELOADING(ns))
1846 job_finish_and_invalidate(u->job, JOB_DONE, true);
1847 else if (u->job->state == JOB_RUNNING && ns != UNIT_ACTIVATING) {
1850 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1851 job_finish_and_invalidate(u->job, ns == UNIT_FAILED ? JOB_FAILED : JOB_DONE, true);
1857 case JOB_RELOAD_OR_START:
1859 if (u->job->state == JOB_RUNNING) {
1860 if (ns == UNIT_ACTIVE)
1861 job_finish_and_invalidate(u->job, reload_success ? JOB_DONE : JOB_FAILED, true);
1862 else if (ns != UNIT_ACTIVATING && ns != UNIT_RELOADING) {
1865 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1866 job_finish_and_invalidate(u->job, ns == UNIT_FAILED ? JOB_FAILED : JOB_DONE, true);
1874 case JOB_TRY_RESTART:
1876 if (UNIT_IS_INACTIVE_OR_FAILED(ns))
1877 job_finish_and_invalidate(u->job, JOB_DONE, true);
1878 else if (u->job->state == JOB_RUNNING && ns != UNIT_DEACTIVATING) {
1880 job_finish_and_invalidate(u->job, JOB_FAILED, true);
1886 assert_not_reached("Job type unknown");
1892 if (m->n_reloading <= 0) {
1894 /* If this state change happened without being
1895 * requested by a job, then let's retroactively start
1896 * or stop dependencies. We skip that step when
1897 * deserializing, since we don't want to create any
1898 * additional jobs just because something is already
1902 if (UNIT_IS_INACTIVE_OR_FAILED(os) && UNIT_IS_ACTIVE_OR_ACTIVATING(ns))
1903 retroactively_start_dependencies(u);
1904 else if (UNIT_IS_ACTIVE_OR_ACTIVATING(os) && UNIT_IS_INACTIVE_OR_DEACTIVATING(ns))
1905 retroactively_stop_dependencies(u);
1908 /* stop unneeded units regardless if going down was expected or not */
1909 if (UNIT_IS_INACTIVE_OR_DEACTIVATING(ns))
1910 check_unneeded_dependencies(u);
1912 if (ns != os && ns == UNIT_FAILED) {
1913 log_unit_notice(u->id, "Unit %s entered failed state.", u->id);
1914 unit_start_on_failure(u);
1918 /* Some names are special */
1919 if (UNIT_IS_ACTIVE_OR_RELOADING(ns)) {
1921 if (unit_has_name(u, SPECIAL_DBUS_SERVICE))
1922 /* The bus might have just become available,
1923 * hence try to connect to it, if we aren't
1927 if (u->type == UNIT_SERVICE &&
1928 !UNIT_IS_ACTIVE_OR_RELOADING(os) &&
1929 m->n_reloading <= 0) {
1930 /* Write audit record if we have just finished starting up */
1931 manager_send_unit_audit(m, u, AUDIT_SERVICE_START, true);
1935 if (!UNIT_IS_ACTIVE_OR_RELOADING(os))
1936 manager_send_unit_plymouth(m, u);
1940 /* We don't care about D-Bus here, since we'll get an
1941 * asynchronous notification for it anyway. */
1943 if (u->type == UNIT_SERVICE &&
1944 UNIT_IS_INACTIVE_OR_FAILED(ns) &&
1945 !UNIT_IS_INACTIVE_OR_FAILED(os) &&
1946 m->n_reloading <= 0) {
1948 /* Hmm, if there was no start record written
1949 * write it now, so that we always have a nice
1952 manager_send_unit_audit(m, u, AUDIT_SERVICE_START, ns == UNIT_INACTIVE);
1954 if (ns == UNIT_INACTIVE)
1955 manager_send_unit_audit(m, u, AUDIT_SERVICE_STOP, true);
1957 /* Write audit record if we have just finished shutting down */
1958 manager_send_unit_audit(m, u, AUDIT_SERVICE_STOP, ns == UNIT_INACTIVE);
1960 u->in_audit = false;
1964 manager_recheck_journal(m);
1965 unit_trigger_notify(u);
1967 if (u->manager->n_reloading <= 0) {
1968 /* Maybe we finished startup and are now ready for
1969 * being stopped because unneeded? */
1970 unit_check_unneeded(u);
1972 /* Maybe we finished startup, but something we needed
1973 * has vanished? Let's die then. (This happens when
1974 * something BindsTo= to a Type=oneshot unit, as these
1975 * units go directly from starting to inactive,
1976 * without ever entering started.) */
1977 unit_check_binds_to(u);
1980 unit_add_to_dbus_queue(u);
1981 unit_add_to_gc_queue(u);
1984 int unit_watch_pid(Unit *u, pid_t pid) {
1990 /* Watch a specific PID. We only support one or two units
1991 * watching each PID for now, not more. */
1993 r = set_ensure_allocated(&u->pids, NULL);
1997 r = hashmap_ensure_allocated(&u->manager->watch_pids1, NULL);
2001 r = hashmap_put(u->manager->watch_pids1, LONG_TO_PTR(pid), u);
2003 r = hashmap_ensure_allocated(&u->manager->watch_pids2, NULL);
2007 r = hashmap_put(u->manager->watch_pids2, LONG_TO_PTR(pid), u);
2010 q = set_put(u->pids, LONG_TO_PTR(pid));
2017 void unit_unwatch_pid(Unit *u, pid_t pid) {
2021 hashmap_remove_value(u->manager->watch_pids1, LONG_TO_PTR(pid), u);
2022 hashmap_remove_value(u->manager->watch_pids2, LONG_TO_PTR(pid), u);
2023 set_remove(u->pids, LONG_TO_PTR(pid));
2026 void unit_unwatch_all_pids(Unit *u) {
2029 while (!set_isempty(u->pids))
2030 unit_unwatch_pid(u, PTR_TO_LONG(set_first(u->pids)));
2036 static int unit_watch_pids_in_path(Unit *u, const char *path) {
2037 _cleanup_closedir_ DIR *d = NULL;
2038 _cleanup_fclose_ FILE *f = NULL;
2044 /* Adds all PIDs from a specific cgroup path to the set of PIDs we watch. */
2046 r = cg_enumerate_processes(SYSTEMD_CGROUP_CONTROLLER, path, &f);
2050 while ((r = cg_read_pid(f, &pid)) > 0) {
2051 r = unit_watch_pid(u, pid);
2052 if (r < 0 && ret >= 0)
2055 if (r < 0 && ret >= 0)
2058 } else if (ret >= 0)
2061 r = cg_enumerate_subgroups(SYSTEMD_CGROUP_CONTROLLER, path, &d);
2065 while ((r = cg_read_subgroup(d, &fn)) > 0) {
2066 _cleanup_free_ char *p = NULL;
2068 p = strjoin(path, "/", fn, NULL);
2074 r = unit_watch_pids_in_path(u, p);
2075 if (r < 0 && ret >= 0)
2078 if (r < 0 && ret >= 0)
2081 } else if (ret >= 0)
2087 int unit_watch_all_pids(Unit *u) {
2090 /* Adds all PIDs from our cgroup to the set of PIDs we watch */
2092 if (!u->cgroup_path)
2095 return unit_watch_pids_in_path(u, u->cgroup_path);
2098 void unit_tidy_watch_pids(Unit *u, pid_t except1, pid_t except2) {
2104 /* Cleans dead PIDs from our list */
2106 SET_FOREACH(e, u->pids, i) {
2107 pid_t pid = PTR_TO_LONG(e);
2109 if (pid == except1 || pid == except2)
2112 if (!pid_is_unwaited(pid))
2113 unit_unwatch_pid(u, pid);
2117 bool unit_job_is_applicable(Unit *u, JobType j) {
2119 assert(j >= 0 && j < _JOB_TYPE_MAX);
2123 case JOB_VERIFY_ACTIVE:
2130 case JOB_TRY_RESTART:
2131 return unit_can_start(u);
2134 return unit_can_reload(u);
2136 case JOB_RELOAD_OR_START:
2137 return unit_can_reload(u) && unit_can_start(u);
2140 assert_not_reached("Invalid job type");
2144 static int maybe_warn_about_dependency(const char *id, const char *other, UnitDependency dependency) {
2147 switch (dependency) {
2149 case UNIT_REQUIRES_OVERRIDABLE:
2151 case UNIT_REQUISITE:
2152 case UNIT_REQUISITE_OVERRIDABLE:
2155 case UNIT_REQUIRED_BY:
2156 case UNIT_REQUIRED_BY_OVERRIDABLE:
2157 case UNIT_WANTED_BY:
2159 case UNIT_CONSISTS_OF:
2160 case UNIT_REFERENCES:
2161 case UNIT_REFERENCED_BY:
2162 case UNIT_PROPAGATES_RELOAD_TO:
2163 case UNIT_RELOAD_PROPAGATED_FROM:
2164 case UNIT_JOINS_NAMESPACE_OF:
2167 case UNIT_CONFLICTS:
2168 case UNIT_CONFLICTED_BY:
2171 case UNIT_ON_FAILURE:
2173 case UNIT_TRIGGERED_BY:
2174 if (streq_ptr(id, other))
2175 log_unit_warning(id, "Dependency %s=%s dropped from unit %s",
2176 unit_dependency_to_string(dependency), id, other);
2178 log_unit_warning(id, "Dependency %s=%s dropped from unit %s merged into %s",
2179 unit_dependency_to_string(dependency), id,
2183 case _UNIT_DEPENDENCY_MAX:
2184 case _UNIT_DEPENDENCY_INVALID:
2188 assert_not_reached("Invalid dependency type");
2191 int unit_add_dependency(Unit *u, UnitDependency d, Unit *other, bool add_reference) {
2193 static const UnitDependency inverse_table[_UNIT_DEPENDENCY_MAX] = {
2194 [UNIT_REQUIRES] = UNIT_REQUIRED_BY,
2195 [UNIT_REQUIRES_OVERRIDABLE] = UNIT_REQUIRED_BY_OVERRIDABLE,
2196 [UNIT_WANTS] = UNIT_WANTED_BY,
2197 [UNIT_REQUISITE] = UNIT_REQUIRED_BY,
2198 [UNIT_REQUISITE_OVERRIDABLE] = UNIT_REQUIRED_BY_OVERRIDABLE,
2199 [UNIT_BINDS_TO] = UNIT_BOUND_BY,
2200 [UNIT_PART_OF] = UNIT_CONSISTS_OF,
2201 [UNIT_REQUIRED_BY] = _UNIT_DEPENDENCY_INVALID,
2202 [UNIT_REQUIRED_BY_OVERRIDABLE] = _UNIT_DEPENDENCY_INVALID,
2203 [UNIT_WANTED_BY] = _UNIT_DEPENDENCY_INVALID,
2204 [UNIT_BOUND_BY] = UNIT_BINDS_TO,
2205 [UNIT_CONSISTS_OF] = UNIT_PART_OF,
2206 [UNIT_CONFLICTS] = UNIT_CONFLICTED_BY,
2207 [UNIT_CONFLICTED_BY] = UNIT_CONFLICTS,
2208 [UNIT_BEFORE] = UNIT_AFTER,
2209 [UNIT_AFTER] = UNIT_BEFORE,
2210 [UNIT_ON_FAILURE] = _UNIT_DEPENDENCY_INVALID,
2211 [UNIT_REFERENCES] = UNIT_REFERENCED_BY,
2212 [UNIT_REFERENCED_BY] = UNIT_REFERENCES,
2213 [UNIT_TRIGGERS] = UNIT_TRIGGERED_BY,
2214 [UNIT_TRIGGERED_BY] = UNIT_TRIGGERS,
2215 [UNIT_PROPAGATES_RELOAD_TO] = UNIT_RELOAD_PROPAGATED_FROM,
2216 [UNIT_RELOAD_PROPAGATED_FROM] = UNIT_PROPAGATES_RELOAD_TO,
2217 [UNIT_JOINS_NAMESPACE_OF] = UNIT_JOINS_NAMESPACE_OF,
2219 int r, q = 0, v = 0, w = 0;
2220 Unit *orig_u = u, *orig_other = other;
2223 assert(d >= 0 && d < _UNIT_DEPENDENCY_MAX);
2226 u = unit_follow_merge(u);
2227 other = unit_follow_merge(other);
2229 /* We won't allow dependencies on ourselves. We will not
2230 * consider them an error however. */
2232 maybe_warn_about_dependency(orig_u->id, orig_other->id, d);
2236 r = set_ensure_allocated(&u->dependencies[d], NULL);
2240 if (inverse_table[d] != _UNIT_DEPENDENCY_INVALID) {
2241 r = set_ensure_allocated(&other->dependencies[inverse_table[d]], NULL);
2246 if (add_reference) {
2247 r = set_ensure_allocated(&u->dependencies[UNIT_REFERENCES], NULL);
2251 r = set_ensure_allocated(&other->dependencies[UNIT_REFERENCED_BY], NULL);
2256 q = set_put(u->dependencies[d], other);
2260 if (inverse_table[d] != _UNIT_DEPENDENCY_INVALID && inverse_table[d] != d) {
2261 v = set_put(other->dependencies[inverse_table[d]], u);
2268 if (add_reference) {
2269 w = set_put(u->dependencies[UNIT_REFERENCES], other);
2275 r = set_put(other->dependencies[UNIT_REFERENCED_BY], u);
2280 unit_add_to_dbus_queue(u);
2285 set_remove(u->dependencies[d], other);
2288 set_remove(other->dependencies[inverse_table[d]], u);
2291 set_remove(u->dependencies[UNIT_REFERENCES], other);
2296 int unit_add_two_dependencies(Unit *u, UnitDependency d, UnitDependency e, Unit *other, bool add_reference) {
2301 r = unit_add_dependency(u, d, other, add_reference);
2305 r = unit_add_dependency(u, e, other, add_reference);
2312 static const char *resolve_template(Unit *u, const char *name, const char*path, char **p) {
2316 assert(name || path);
2320 name = basename(path);
2322 if (!unit_name_is_template(name)) {
2328 s = unit_name_replace_instance(name, u->instance);
2330 _cleanup_free_ char *i = NULL;
2332 i = unit_name_to_prefix(u->id);
2336 s = unit_name_replace_instance(name, i);
2346 int unit_add_dependency_by_name(Unit *u, UnitDependency d, const char *name, const char *path, bool add_reference) {
2349 _cleanup_free_ char *s = NULL;
2352 assert(name || path);
2354 name = resolve_template(u, name, path, &s);
2358 r = manager_load_unit(u->manager, name, path, NULL, &other);
2362 return unit_add_dependency(u, d, other, add_reference);
2365 int unit_add_two_dependencies_by_name(Unit *u, UnitDependency d, UnitDependency e, const char *name, const char *path, bool add_reference) {
2366 _cleanup_free_ char *s = NULL;
2371 assert(name || path);
2373 name = resolve_template(u, name, path, &s);
2377 r = manager_load_unit(u->manager, name, path, NULL, &other);
2381 return unit_add_two_dependencies(u, d, e, other, add_reference);
2384 int unit_add_dependency_by_name_inverse(Unit *u, UnitDependency d, const char *name, const char *path, bool add_reference) {
2387 _cleanup_free_ char *s = NULL;
2390 assert(name || path);
2392 name = resolve_template(u, name, path, &s);
2396 r = manager_load_unit(u->manager, name, path, NULL, &other);
2400 return unit_add_dependency(other, d, u, add_reference);
2403 int unit_add_two_dependencies_by_name_inverse(Unit *u, UnitDependency d, UnitDependency e, const char *name, const char *path, bool add_reference) {
2406 _cleanup_free_ char *s = NULL;
2409 assert(name || path);
2411 name = resolve_template(u, name, path, &s);
2415 r = manager_load_unit(u->manager, name, path, NULL, &other);
2419 r = unit_add_two_dependencies(other, d, e, u, add_reference);
2426 int set_unit_path(const char *p) {
2427 /* This is mostly for debug purposes */
2428 if (setenv("SYSTEMD_UNIT_PATH", p, 0) < 0)
2434 char *unit_dbus_path(Unit *u) {
2440 return unit_dbus_path_from_name(u->id);
2443 char *unit_default_cgroup_path(Unit *u) {
2444 _cleanup_free_ char *escaped = NULL, *slice = NULL;
2449 if (unit_has_name(u, SPECIAL_ROOT_SLICE))
2450 return strdup(u->manager->cgroup_root);
2452 if (UNIT_ISSET(u->slice) && !unit_has_name(UNIT_DEREF(u->slice), SPECIAL_ROOT_SLICE)) {
2453 r = cg_slice_to_path(UNIT_DEREF(u->slice)->id, &slice);
2458 escaped = cg_escape(u->id);
2463 return strjoin(u->manager->cgroup_root, "/", slice, "/", escaped, NULL);
2465 return strjoin(u->manager->cgroup_root, "/", escaped, NULL);
2468 int unit_add_default_slice(Unit *u, CGroupContext *c) {
2469 _cleanup_free_ char *b = NULL;
2470 const char *slice_name;
2477 if (UNIT_ISSET(u->slice))
2481 _cleanup_free_ char *prefix = NULL, *escaped = NULL;
2483 /* Implicitly place all instantiated units in their
2484 * own per-template slice */
2486 prefix = unit_name_to_prefix(u->id);
2490 /* The prefix is already escaped, but it might include
2491 * "-" which has a special meaning for slice units,
2492 * hence escape it here extra. */
2493 escaped = strreplace(prefix, "-", "\\x2d");
2497 if (u->manager->running_as == SYSTEMD_SYSTEM)
2498 b = strjoin("system-", escaped, ".slice", NULL);
2500 b = strappend(escaped, ".slice");
2507 u->manager->running_as == SYSTEMD_SYSTEM
2508 ? SPECIAL_SYSTEM_SLICE
2509 : SPECIAL_ROOT_SLICE;
2511 r = manager_load_unit(u->manager, slice_name, NULL, NULL, &slice);
2515 unit_ref_set(&u->slice, slice);
2519 const char *unit_slice_name(Unit *u) {
2522 if (!UNIT_ISSET(u->slice))
2525 return UNIT_DEREF(u->slice)->id;
2528 int unit_load_related_unit(Unit *u, const char *type, Unit **_found) {
2529 _cleanup_free_ char *t = NULL;
2536 t = unit_name_change_suffix(u->id, type);
2540 assert(!unit_has_name(u, t));
2542 r = manager_load_unit(u->manager, t, NULL, NULL, _found);
2543 assert(r < 0 || *_found != u);
2547 int unit_watch_bus_name(Unit *u, const char *name) {
2551 /* Watch a specific name on the bus. We only support one unit
2552 * watching each name for now. */
2554 return hashmap_put(u->manager->watch_bus, name, u);
2557 void unit_unwatch_bus_name(Unit *u, const char *name) {
2561 hashmap_remove_value(u->manager->watch_bus, name, u);
2564 bool unit_can_serialize(Unit *u) {
2567 return UNIT_VTABLE(u)->serialize && UNIT_VTABLE(u)->deserialize_item;
2570 int unit_serialize(Unit *u, FILE *f, FDSet *fds, bool serialize_jobs) {
2577 if (unit_can_serialize(u)) {
2580 r = UNIT_VTABLE(u)->serialize(u, f, fds);
2584 rt = unit_get_exec_runtime(u);
2586 r = exec_runtime_serialize(rt, u, f, fds);
2592 dual_timestamp_serialize(f, "inactive-exit-timestamp", &u->inactive_exit_timestamp);
2593 dual_timestamp_serialize(f, "active-enter-timestamp", &u->active_enter_timestamp);
2594 dual_timestamp_serialize(f, "active-exit-timestamp", &u->active_exit_timestamp);
2595 dual_timestamp_serialize(f, "inactive-enter-timestamp", &u->inactive_enter_timestamp);
2596 dual_timestamp_serialize(f, "condition-timestamp", &u->condition_timestamp);
2597 dual_timestamp_serialize(f, "assert-timestamp", &u->assert_timestamp);
2599 if (dual_timestamp_is_set(&u->condition_timestamp))
2600 unit_serialize_item(u, f, "condition-result", yes_no(u->condition_result));
2602 if (dual_timestamp_is_set(&u->assert_timestamp))
2603 unit_serialize_item(u, f, "assert-result", yes_no(u->assert_result));
2605 unit_serialize_item(u, f, "transient", yes_no(u->transient));
2608 unit_serialize_item(u, f, "cgroup", u->cgroup_path);
2610 if (serialize_jobs) {
2612 fprintf(f, "job\n");
2613 job_serialize(u->job, f, fds);
2617 fprintf(f, "job\n");
2618 job_serialize(u->nop_job, f, fds);
2627 void unit_serialize_item_format(Unit *u, FILE *f, const char *key, const char *format, ...) {
2638 va_start(ap, format);
2639 vfprintf(f, format, ap);
2645 void unit_serialize_item(Unit *u, FILE *f, const char *key, const char *value) {
2651 fprintf(f, "%s=%s\n", key, value);
2654 int unit_deserialize(Unit *u, FILE *f, FDSet *fds) {
2655 ExecRuntime **rt = NULL;
2663 offset = UNIT_VTABLE(u)->exec_runtime_offset;
2665 rt = (ExecRuntime**) ((uint8_t*) u + offset);
2668 char line[LINE_MAX], *l, *v;
2671 if (!fgets(line, sizeof(line), f)) {
2684 k = strcspn(l, "=");
2692 if (streq(l, "job")) {
2694 /* new-style serialized job */
2701 r = job_deserialize(j, f, fds);
2707 r = hashmap_put(u->manager->jobs, UINT32_TO_PTR(j->id), j);
2713 r = job_install_deserialized(j);
2715 hashmap_remove(u->manager->jobs, UINT32_TO_PTR(j->id));
2723 type = job_type_from_string(v);
2725 log_debug("Failed to parse job type value %s", v);
2727 u->deserialized_job = type;
2730 } else if (streq(l, "inactive-exit-timestamp")) {
2731 dual_timestamp_deserialize(v, &u->inactive_exit_timestamp);
2733 } else if (streq(l, "active-enter-timestamp")) {
2734 dual_timestamp_deserialize(v, &u->active_enter_timestamp);
2736 } else if (streq(l, "active-exit-timestamp")) {
2737 dual_timestamp_deserialize(v, &u->active_exit_timestamp);
2739 } else if (streq(l, "inactive-enter-timestamp")) {
2740 dual_timestamp_deserialize(v, &u->inactive_enter_timestamp);
2742 } else if (streq(l, "condition-timestamp")) {
2743 dual_timestamp_deserialize(v, &u->condition_timestamp);
2745 } else if (streq(l, "assert-timestamp")) {
2746 dual_timestamp_deserialize(v, &u->assert_timestamp);
2748 } else if (streq(l, "condition-result")) {
2751 b = parse_boolean(v);
2753 log_debug("Failed to parse condition result value %s", v);
2755 u->condition_result = b;
2759 } else if (streq(l, "assert-result")) {
2762 b = parse_boolean(v);
2764 log_debug("Failed to parse assert result value %s", v);
2766 u->assert_result = b;
2770 } else if (streq(l, "transient")) {
2773 b = parse_boolean(v);
2775 log_debug("Failed to parse transient bool %s", v);
2780 } else if (streq(l, "cgroup")) {
2787 if (u->cgroup_path) {
2790 p = hashmap_remove(u->manager->cgroup_unit, u->cgroup_path);
2791 log_info("Removing cgroup_path %s from hashmap (%p)",
2793 free(u->cgroup_path);
2797 assert(hashmap_put(u->manager->cgroup_unit, s, u) == 1);
2802 if (unit_can_serialize(u)) {
2804 r = exec_runtime_deserialize_item(rt, u, l, v, fds);
2811 r = UNIT_VTABLE(u)->deserialize_item(u, l, v, fds);
2818 int unit_add_node_link(Unit *u, const char *what, bool wants) {
2820 _cleanup_free_ char *e = NULL;
2828 /* Adds in links to the device node that this unit is based on */
2830 if (!is_device_path(what))
2833 e = unit_name_from_path(what, ".device");
2837 r = manager_load_unit(u->manager, e, NULL, NULL, &device);
2842 r = unit_add_two_dependencies(u, UNIT_AFTER, UNIT_BINDS_TO, device, true);
2847 r = unit_add_dependency(device, UNIT_WANTS, u, false);
2855 int unit_coldplug(Unit *u) {
2860 if (UNIT_VTABLE(u)->coldplug)
2861 if ((r = UNIT_VTABLE(u)->coldplug(u)) < 0)
2865 r = job_coldplug(u->job);
2868 } else if (u->deserialized_job >= 0) {
2870 r = manager_add_job(u->manager, u->deserialized_job, u, JOB_IGNORE_REQUIREMENTS, false, NULL, NULL);
2874 u->deserialized_job = _JOB_TYPE_INVALID;
2880 void unit_status_printf(Unit *u, const char *status, const char *unit_status_msg_format) {
2881 DISABLE_WARNING_FORMAT_NONLITERAL;
2882 manager_status_printf(u->manager, STATUS_TYPE_NORMAL,
2883 status, unit_status_msg_format, unit_description(u));
2887 bool unit_need_daemon_reload(Unit *u) {
2888 _cleanup_strv_free_ char **t = NULL;
2891 unsigned loaded_cnt, current_cnt;
2895 if (u->fragment_path) {
2897 if (stat(u->fragment_path, &st) < 0)
2898 /* What, cannot access this anymore? */
2901 if (u->fragment_mtime > 0 &&
2902 timespec_load(&st.st_mtim) != u->fragment_mtime)
2906 if (u->source_path) {
2908 if (stat(u->source_path, &st) < 0)
2911 if (u->source_mtime > 0 &&
2912 timespec_load(&st.st_mtim) != u->source_mtime)
2916 (void) unit_find_dropin_paths(u, &t);
2917 loaded_cnt = strv_length(t);
2918 current_cnt = strv_length(u->dropin_paths);
2920 if (loaded_cnt == current_cnt) {
2921 if (loaded_cnt == 0)
2924 if (strv_overlap(u->dropin_paths, t)) {
2925 STRV_FOREACH(path, u->dropin_paths) {
2927 if (stat(*path, &st) < 0)
2930 if (u->dropin_mtime > 0 &&
2931 timespec_load(&st.st_mtim) > u->dropin_mtime)
2942 void unit_reset_failed(Unit *u) {
2945 if (UNIT_VTABLE(u)->reset_failed)
2946 UNIT_VTABLE(u)->reset_failed(u);
2949 Unit *unit_following(Unit *u) {
2952 if (UNIT_VTABLE(u)->following)
2953 return UNIT_VTABLE(u)->following(u);
2958 bool unit_stop_pending(Unit *u) {
2961 /* This call does check the current state of the unit. It's
2962 * hence useful to be called from state change calls of the
2963 * unit itself, where the state isn't updated yet. This is
2964 * different from unit_inactive_or_pending() which checks both
2965 * the current state and for a queued job. */
2967 return u->job && u->job->type == JOB_STOP;
2970 bool unit_inactive_or_pending(Unit *u) {
2973 /* Returns true if the unit is inactive or going down */
2975 if (UNIT_IS_INACTIVE_OR_DEACTIVATING(unit_active_state(u)))
2978 if (unit_stop_pending(u))
2984 bool unit_active_or_pending(Unit *u) {
2987 /* Returns true if the unit is active or going up */
2989 if (UNIT_IS_ACTIVE_OR_ACTIVATING(unit_active_state(u)))
2993 (u->job->type == JOB_START ||
2994 u->job->type == JOB_RELOAD_OR_START ||
2995 u->job->type == JOB_RESTART))
3001 int unit_kill(Unit *u, KillWho w, int signo, sd_bus_error *error) {
3003 assert(w >= 0 && w < _KILL_WHO_MAX);
3005 assert(signo < _NSIG);
3007 if (!UNIT_VTABLE(u)->kill)
3010 return UNIT_VTABLE(u)->kill(u, w, signo, error);
3013 static Set *unit_pid_set(pid_t main_pid, pid_t control_pid) {
3017 pid_set = set_new(NULL);
3021 /* Exclude the main/control pids from being killed via the cgroup */
3023 r = set_put(pid_set, LONG_TO_PTR(main_pid));
3028 if (control_pid > 0) {
3029 r = set_put(pid_set, LONG_TO_PTR(control_pid));
3041 int unit_kill_common(
3047 sd_bus_error *error) {
3051 if (who == KILL_MAIN && main_pid <= 0) {
3053 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_PROCESS, "%s units have no main processes", unit_type_to_string(u->type));
3055 return sd_bus_error_set_const(error, BUS_ERROR_NO_SUCH_PROCESS, "No main process to kill");
3058 if (who == KILL_CONTROL && control_pid <= 0) {
3059 if (control_pid < 0)
3060 return sd_bus_error_setf(error, BUS_ERROR_NO_SUCH_PROCESS, "%s units have no control processes", unit_type_to_string(u->type));
3062 return sd_bus_error_set_const(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
3065 if (who == KILL_CONTROL || who == KILL_ALL)
3066 if (control_pid > 0)
3067 if (kill(control_pid, signo) < 0)
3070 if (who == KILL_MAIN || who == KILL_ALL)
3072 if (kill(main_pid, signo) < 0)
3075 if (who == KILL_ALL && u->cgroup_path) {
3076 _cleanup_set_free_ Set *pid_set = NULL;
3079 /* Exclude the main/control pids from being killed via the cgroup */
3080 pid_set = unit_pid_set(main_pid, control_pid);
3084 q = cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, signo, false, true, false, pid_set);
3085 if (q < 0 && q != -EAGAIN && q != -ESRCH && q != -ENOENT)
3092 int unit_following_set(Unit *u, Set **s) {
3096 if (UNIT_VTABLE(u)->following_set)
3097 return UNIT_VTABLE(u)->following_set(u, s);
3103 UnitFileState unit_get_unit_file_state(Unit *u) {
3106 if (u->unit_file_state < 0 && u->fragment_path)
3107 u->unit_file_state = unit_file_get_state(
3108 u->manager->running_as == SYSTEMD_SYSTEM ? UNIT_FILE_SYSTEM : UNIT_FILE_USER,
3109 NULL, basename(u->fragment_path));
3111 return u->unit_file_state;
3114 int unit_get_unit_file_preset(Unit *u) {
3117 if (u->unit_file_preset < 0 && u->fragment_path)
3118 u->unit_file_preset = unit_file_query_preset(
3119 u->manager->running_as == SYSTEMD_SYSTEM ? UNIT_FILE_SYSTEM : UNIT_FILE_USER,
3120 NULL, basename(u->fragment_path));
3122 return u->unit_file_preset;
3125 Unit* unit_ref_set(UnitRef *ref, Unit *u) {
3130 unit_ref_unset(ref);
3133 LIST_PREPEND(refs, u->refs, ref);
3137 void unit_ref_unset(UnitRef *ref) {
3143 LIST_REMOVE(refs, ref->unit->refs, ref);
3147 int unit_patch_contexts(Unit *u) {
3155 /* Patch in the manager defaults into the exec and cgroup
3156 * contexts, _after_ the rest of the settings have been
3159 ec = unit_get_exec_context(u);
3161 /* This only copies in the ones that need memory */
3162 for (i = 0; i < _RLIMIT_MAX; i++)
3163 if (u->manager->rlimit[i] && !ec->rlimit[i]) {
3164 ec->rlimit[i] = newdup(struct rlimit, u->manager->rlimit[i], 1);
3169 if (u->manager->running_as == SYSTEMD_USER &&
3170 !ec->working_directory) {
3172 r = get_home_dir(&ec->working_directory);
3176 /* Allow user services to run, even if the
3177 * home directory is missing */
3178 ec->working_directory_missing_ok = true;
3181 if (u->manager->running_as == SYSTEMD_USER &&
3182 (ec->syscall_whitelist ||
3183 !set_isempty(ec->syscall_filter) ||
3184 !set_isempty(ec->syscall_archs) ||
3185 ec->address_families_whitelist ||
3186 !set_isempty(ec->address_families)))
3187 ec->no_new_privileges = true;
3189 if (ec->private_devices)
3190 ec->capability_bounding_set_drop |= (uint64_t) 1ULL << (uint64_t) CAP_MKNOD;
3193 cc = unit_get_cgroup_context(u);
3197 ec->private_devices &&
3198 cc->device_policy == CGROUP_AUTO)
3199 cc->device_policy = CGROUP_CLOSED;
3205 ExecContext *unit_get_exec_context(Unit *u) {
3212 offset = UNIT_VTABLE(u)->exec_context_offset;
3216 return (ExecContext*) ((uint8_t*) u + offset);
3219 KillContext *unit_get_kill_context(Unit *u) {
3226 offset = UNIT_VTABLE(u)->kill_context_offset;
3230 return (KillContext*) ((uint8_t*) u + offset);
3233 CGroupContext *unit_get_cgroup_context(Unit *u) {
3239 offset = UNIT_VTABLE(u)->cgroup_context_offset;
3243 return (CGroupContext*) ((uint8_t*) u + offset);
3246 ExecRuntime *unit_get_exec_runtime(Unit *u) {
3252 offset = UNIT_VTABLE(u)->exec_runtime_offset;
3256 return *(ExecRuntime**) ((uint8_t*) u + offset);
3259 static int unit_drop_in_dir(Unit *u, UnitSetPropertiesMode mode, bool transient, char **dir) {
3260 if (u->manager->running_as == SYSTEMD_USER) {
3263 if (mode == UNIT_PERSISTENT && !transient)
3264 r = user_config_home(dir);
3266 r = user_runtime_dir(dir);
3273 if (mode == UNIT_PERSISTENT && !transient)
3274 *dir = strdup("/etc/systemd/system");
3276 *dir = strdup("/run/systemd/system");
3283 static int unit_drop_in_file(Unit *u,
3284 UnitSetPropertiesMode mode, const char *name, char **p, char **q) {
3285 _cleanup_free_ char *dir = NULL;
3290 r = unit_drop_in_dir(u, mode, u->transient, &dir);
3294 return drop_in_file(dir, u->id, 50, name, p, q);
3297 int unit_write_drop_in(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *data) {
3299 _cleanup_free_ char *dir = NULL, *p = NULL, *q = NULL;
3304 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
3307 r = unit_drop_in_dir(u, mode, u->transient, &dir);
3311 r = write_drop_in(dir, u->id, 50, name, data);
3315 r = drop_in_file(dir, u->id, 50, name, &p, &q);
3319 r = strv_extend(&u->dropin_paths, q);
3323 strv_sort(u->dropin_paths);
3324 strv_uniq(u->dropin_paths);
3326 u->dropin_mtime = now(CLOCK_REALTIME);
3331 int unit_write_drop_in_format(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *format, ...) {
3332 _cleanup_free_ char *p = NULL;
3340 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
3343 va_start(ap, format);
3344 r = vasprintf(&p, format, ap);
3350 return unit_write_drop_in(u, mode, name, p);
3353 int unit_write_drop_in_private(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *data) {
3354 _cleanup_free_ char *ndata = NULL;
3360 if (!UNIT_VTABLE(u)->private_section)
3363 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
3366 ndata = strjoin("[", UNIT_VTABLE(u)->private_section, "]\n", data, NULL);
3370 return unit_write_drop_in(u, mode, name, ndata);
3373 int unit_write_drop_in_private_format(Unit *u, UnitSetPropertiesMode mode, const char *name, const char *format, ...) {
3374 _cleanup_free_ char *p = NULL;
3382 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
3385 va_start(ap, format);
3386 r = vasprintf(&p, format, ap);
3392 return unit_write_drop_in_private(u, mode, name, p);
3395 int unit_remove_drop_in(Unit *u, UnitSetPropertiesMode mode, const char *name) {
3396 _cleanup_free_ char *p = NULL, *q = NULL;
3401 if (!IN_SET(mode, UNIT_PERSISTENT, UNIT_RUNTIME))
3404 r = unit_drop_in_file(u, mode, name, &p, &q);
3409 r = errno == ENOENT ? 0 : -errno;
3417 int unit_make_transient(Unit *u) {
3422 u->load_state = UNIT_STUB;
3424 u->transient = true;
3426 free(u->fragment_path);
3427 u->fragment_path = NULL;
3429 if (u->manager->running_as == SYSTEMD_USER) {
3430 _cleanup_free_ char *c = NULL;
3432 r = user_runtime_dir(&c);
3438 u->fragment_path = strjoin(c, "/", u->id, NULL);
3439 if (!u->fragment_path)
3444 u->fragment_path = strappend("/run/systemd/system/", u->id);
3445 if (!u->fragment_path)
3448 mkdir_p("/run/systemd/system", 0755);
3451 return write_string_file_atomic_label(u->fragment_path, "# Transient stub");
3454 int unit_kill_context(
3460 bool main_pid_alien) {
3462 int sig, wait_for_exit = false, r;
3467 if (c->kill_mode == KILL_NONE)
3477 case KILL_TERMINATE:
3478 sig = c->kill_signal;
3481 assert_not_reached("KillOperation unknown");
3485 r = kill_and_sigcont(main_pid, sig);
3487 if (r < 0 && r != -ESRCH) {
3488 _cleanup_free_ char *comm = NULL;
3489 get_process_comm(main_pid, &comm);
3491 log_unit_warning_errno(u->id, r, "Failed to kill main process " PID_FMT " (%s): %m", main_pid, strna(comm));
3493 if (!main_pid_alien)
3494 wait_for_exit = true;
3496 if (c->send_sighup && k != KILL_KILL)
3497 kill(main_pid, SIGHUP);
3501 if (control_pid > 0) {
3502 r = kill_and_sigcont(control_pid, sig);
3504 if (r < 0 && r != -ESRCH) {
3505 _cleanup_free_ char *comm = NULL;
3506 get_process_comm(control_pid, &comm);
3508 log_unit_warning_errno(u->id, r, "Failed to kill control process " PID_FMT " (%s): %m", control_pid, strna(comm));
3510 wait_for_exit = true;
3512 if (c->send_sighup && k != KILL_KILL)
3513 kill(control_pid, SIGHUP);
3517 if ((c->kill_mode == KILL_CONTROL_GROUP || (c->kill_mode == KILL_MIXED && k == KILL_KILL)) && u->cgroup_path) {
3518 _cleanup_set_free_ Set *pid_set = NULL;
3520 /* Exclude the main/control pids from being killed via the cgroup */
3521 pid_set = unit_pid_set(main_pid, control_pid);
3525 r = cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, sig, true, true, false, pid_set);
3527 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
3528 log_unit_warning_errno(u->id, r, "Failed to kill control group: %m");
3531 /* FIXME: For now, we will not wait for the
3532 * cgroup members to die, simply because
3533 * cgroup notification is unreliable. It
3534 * doesn't work at all in containers, and
3535 * outside of containers it can be confused
3536 * easily by leaving directories in the
3539 /* wait_for_exit = true; */
3541 if (c->send_sighup && k != KILL_KILL) {
3544 pid_set = unit_pid_set(main_pid, control_pid);
3548 cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path, SIGHUP, false, true, false, pid_set);
3553 return wait_for_exit;
3556 int unit_require_mounts_for(Unit *u, const char *path) {
3557 char prefix[strlen(path) + 1], *p;
3563 /* Registers a unit for requiring a certain path and all its
3564 * prefixes. We keep a simple array of these paths in the
3565 * unit, since its usually short. However, we build a prefix
3566 * table for all possible prefixes so that new appearing mount
3567 * units can easily determine which units to make themselves a
3570 if (!path_is_absolute(path))
3577 path_kill_slashes(p);
3579 if (!path_is_safe(p)) {
3584 if (strv_contains(u->requires_mounts_for, p)) {
3589 r = strv_consume(&u->requires_mounts_for, p);
3593 PATH_FOREACH_PREFIX_MORE(prefix, p) {
3596 x = hashmap_get(u->manager->units_requiring_mounts_for, prefix);
3600 if (!u->manager->units_requiring_mounts_for) {
3601 u->manager->units_requiring_mounts_for = hashmap_new(&string_hash_ops);
3602 if (!u->manager->units_requiring_mounts_for)
3616 r = hashmap_put(u->manager->units_requiring_mounts_for, q, x);
3632 int unit_setup_exec_runtime(Unit *u) {
3638 offset = UNIT_VTABLE(u)->exec_runtime_offset;
3641 /* Check if there already is an ExecRuntime for this unit? */
3642 rt = (ExecRuntime**) ((uint8_t*) u + offset);
3646 /* Try to get it from somebody else */
3647 SET_FOREACH(other, u->dependencies[UNIT_JOINS_NAMESPACE_OF], i) {
3649 *rt = unit_get_exec_runtime(other);
3651 exec_runtime_ref(*rt);
3656 return exec_runtime_make(rt, unit_get_exec_context(u), u->id);
3659 static const char* const unit_active_state_table[_UNIT_ACTIVE_STATE_MAX] = {
3660 [UNIT_ACTIVE] = "active",
3661 [UNIT_RELOADING] = "reloading",
3662 [UNIT_INACTIVE] = "inactive",
3663 [UNIT_FAILED] = "failed",
3664 [UNIT_ACTIVATING] = "activating",
3665 [UNIT_DEACTIVATING] = "deactivating"
3668 DEFINE_STRING_TABLE_LOOKUP(unit_active_state, UnitActiveState);