1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
6 This file is part of systemd.
8 Copyright 2010 Lennart Poettering
10 systemd is free software; you can redistribute it and/or modify it
11 under the terms of the GNU Lesser General Public License as published by
12 the Free Software Foundation; either version 2.1 of the License, or
13 (at your option) any later version.
15 systemd is distributed in the hope that it will be useful, but
16 WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 Lesser General Public License for more details.
20 You should have received a copy of the GNU Lesser General Public License
21 along with systemd; If not, see <http://www.gnu.org/licenses/>.
24 typedef struct ExecStatus ExecStatus;
25 typedef struct ExecCommand ExecCommand;
26 typedef struct ExecContext ExecContext;
27 typedef struct ExecRuntime ExecRuntime;
28 typedef struct ExecParameters ExecParameters;
30 #include <linux/types.h>
32 #include <sys/resource.h>
33 #include <sys/capability.h>
43 #include "namespace.h"
44 #include "bus-endpoint.h"
46 typedef enum ExecInput {
53 _EXEC_INPUT_INVALID = -1
56 typedef enum ExecOutput {
61 EXEC_OUTPUT_SYSLOG_AND_CONSOLE,
63 EXEC_OUTPUT_KMSG_AND_CONSOLE,
65 EXEC_OUTPUT_JOURNAL_AND_CONSOLE,
68 _EXEC_OUTPUT_INVALID = -1
72 dual_timestamp start_timestamp;
73 dual_timestamp exit_timestamp;
75 int code; /* as in siginfo_t::si_code */
76 int status; /* as in sigingo_t::si_status */
82 ExecStatus exec_status;
83 LIST_FIELDS(ExecCommand, command); /* useful for chaining commands */
93 int netns_storage_socket[2];
98 char **environment_files;
100 struct rlimit *rlimit[_RLIMIT_MAX];
101 char *working_directory, *root_directory;
102 bool working_directory_missing_ok;
105 int oom_score_adjust;
108 int cpu_sched_policy;
109 int cpu_sched_priority;
112 unsigned cpuset_ncpus;
115 ExecOutput std_output;
116 ExecOutput std_error;
118 nsec_t timer_slack_nsec;
124 bool tty_vt_disallocate;
128 /* Since resolving these names might might involve socket
129 * connections and we don't want to deadlock ourselves these
130 * names are resolved on execution only and in the child
134 char **supplementary_groups;
140 bool selinux_context_ignore;
141 char *selinux_context;
143 bool apparmor_profile_ignore;
144 char *apparmor_profile;
146 bool smack_process_label_ignore;
147 char *smack_process_label;
149 char **read_write_dirs, **read_only_dirs, **inaccessible_dirs;
150 unsigned long mount_flags;
152 uint64_t capability_bounding_set_drop;
158 char *syslog_identifier;
159 bool syslog_level_prefix;
161 bool cpu_sched_reset_on_fork;
164 bool private_network;
165 bool private_devices;
166 ProtectSystem protect_system;
167 ProtectHome protect_home;
169 bool no_new_privileges;
171 /* This is not exposed to the user but available
172 * internally. We need it to make sure that whenever we spawn
173 * /bin/mount it is run in the same process group as us so
174 * that the autofs logic detects that it belongs to us and we
175 * don't enter a trigger loop. */
178 unsigned long personality;
183 bool syscall_whitelist:1;
185 Set *address_families;
186 bool address_families_whitelist:1;
188 char **runtime_directory;
189 mode_t runtime_directory_mode;
191 bool oom_score_adjust_set:1;
194 bool cpu_sched_set:1;
195 bool no_new_privileges_set:1;
197 /* custom dbus enpoint */
198 BusEndpoint *bus_endpoint;
202 #include "cgroup-util.h"
204 struct ExecParameters {
206 int *fds; unsigned n_fds;
208 bool apply_permissions;
210 bool apply_tty_stdin;
212 bool selinux_context_net;
213 CGroupControllerMask cgroup_supported;
214 const char *cgroup_path;
215 bool cgroup_delegate;
216 const char *runtime_prefix;
218 usec_t watchdog_usec;
220 char *bus_endpoint_path;
224 int exec_spawn(ExecCommand *command,
225 const ExecContext *context,
226 const ExecParameters *exec_params,
227 ExecRuntime *runtime,
230 void exec_command_done(ExecCommand *c);
231 void exec_command_done_array(ExecCommand *c, unsigned n);
233 ExecCommand* exec_command_free_list(ExecCommand *c);
234 void exec_command_free_array(ExecCommand **c, unsigned n);
236 char *exec_command_line(char **argv);
238 void exec_command_dump(ExecCommand *c, FILE *f, const char *prefix);
239 void exec_command_dump_list(ExecCommand *c, FILE *f, const char *prefix);
240 void exec_command_append_list(ExecCommand **l, ExecCommand *e);
241 int exec_command_set(ExecCommand *c, const char *path, ...);
242 int exec_command_append(ExecCommand *c, const char *path, ...);
244 void exec_context_init(ExecContext *c);
245 void exec_context_done(ExecContext *c);
246 void exec_context_dump(ExecContext *c, FILE* f, const char *prefix);
248 int exec_context_destroy_runtime_directory(ExecContext *c, const char *runtime_root);
250 int exec_context_load_environment(const ExecContext *c, const char *unit_id, char ***l);
252 bool exec_context_may_touch_console(ExecContext *c);
253 bool exec_context_maintains_privileges(ExecContext *c);
255 void exec_status_start(ExecStatus *s, pid_t pid);
256 void exec_status_exit(ExecStatus *s, ExecContext *context, pid_t pid, int code, int status);
257 void exec_status_dump(ExecStatus *s, FILE *f, const char *prefix);
259 int exec_runtime_make(ExecRuntime **rt, ExecContext *c, const char *id);
260 ExecRuntime *exec_runtime_ref(ExecRuntime *r);
261 ExecRuntime *exec_runtime_unref(ExecRuntime *r);
263 int exec_runtime_serialize(ExecRuntime *rt, Unit *u, FILE *f, FDSet *fds);
264 int exec_runtime_deserialize_item(ExecRuntime **rt, Unit *u, const char *key, const char *value, FDSet *fds);
266 void exec_runtime_destroy(ExecRuntime *rt);
268 const char* exec_output_to_string(ExecOutput i) _const_;
269 ExecOutput exec_output_from_string(const char *s) _pure_;
271 const char* exec_input_to_string(ExecInput i) _const_;
272 ExecInput exec_input_from_string(const char *s) _pure_;