]>
Commit | Line | Data |
---|---|---|
53e1b683 | 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
c2f1db8f | 2 | #pragma once |
60918275 | 3 | |
a7334b09 LP |
4 | /*** |
5 | This file is part of systemd. | |
6 | ||
7 | Copyright 2010 Lennart Poettering | |
8 | ||
9 | systemd is free software; you can redistribute it and/or modify it | |
5430f7f2 LP |
10 | under the terms of the GNU Lesser General Public License as published by |
11 | the Free Software Foundation; either version 2.1 of the License, or | |
a7334b09 LP |
12 | (at your option) any later version. |
13 | ||
14 | systemd is distributed in the hope that it will be useful, but | |
15 | WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
5430f7f2 | 17 | Lesser General Public License for more details. |
a7334b09 | 18 | |
5430f7f2 | 19 | You should have received a copy of the GNU Lesser General Public License |
a7334b09 LP |
20 | along with systemd; If not, see <http://www.gnu.org/licenses/>. |
21 | ***/ | |
22 | ||
71d35b6b | 23 | #include <libmount.h> |
60918275 | 24 | #include <stdbool.h> |
a66d02c3 | 25 | #include <stdio.h> |
ea430986 | 26 | |
718db961 LP |
27 | #include "sd-bus.h" |
28 | #include "sd-event.h" | |
71d35b6b | 29 | |
4ad49000 | 30 | #include "cgroup-util.h" |
400f1a33 | 31 | #include "fdset.h" |
2e5c94b9 | 32 | #include "hashmap.h" |
6a48d82f | 33 | #include "ip-address-access.h" |
2e5c94b9 | 34 | #include "list.h" |
2e5c94b9 | 35 | #include "ratelimit.h" |
a16e1123 | 36 | |
4f0f902f | 37 | /* Enforce upper limit how many names we allow */ |
59d1a833 | 38 | #define MANAGER_MAX_NAMES 131072 /* 128K */ |
4f0f902f | 39 | |
60918275 | 40 | typedef struct Manager Manager; |
acbb0225 | 41 | |
f755e3b7 | 42 | typedef enum ManagerState { |
d81afec1 | 43 | MANAGER_INITIALIZING, |
f755e3b7 | 44 | MANAGER_STARTING, |
a16e1123 | 45 | MANAGER_RUNNING, |
f755e3b7 LP |
46 | MANAGER_DEGRADED, |
47 | MANAGER_MAINTENANCE, | |
48 | MANAGER_STOPPING, | |
49 | _MANAGER_STATE_MAX, | |
50 | _MANAGER_STATE_INVALID = -1 | |
51 | } ManagerState; | |
52 | ||
53 | typedef enum ManagerExitCode { | |
54 | MANAGER_OK, | |
a16e1123 LP |
55 | MANAGER_EXIT, |
56 | MANAGER_RELOAD, | |
57 | MANAGER_REEXECUTE, | |
b9080b03 FF |
58 | MANAGER_REBOOT, |
59 | MANAGER_POWEROFF, | |
60 | MANAGER_HALT, | |
61 | MANAGER_KEXEC, | |
664f88a7 | 62 | MANAGER_SWITCH_ROOT, |
a16e1123 LP |
63 | _MANAGER_EXIT_CODE_MAX, |
64 | _MANAGER_EXIT_CODE_INVALID = -1 | |
65 | } ManagerExitCode; | |
66 | ||
127d5fd1 ZJS |
67 | typedef enum StatusType { |
68 | STATUS_TYPE_EPHEMERAL, | |
69 | STATUS_TYPE_NORMAL, | |
ebc5788e | 70 | STATUS_TYPE_EMERGENCY, |
127d5fd1 ZJS |
71 | } StatusType; |
72 | ||
400f1a33 | 73 | #include "execute.h" |
60918275 | 74 | #include "job.h" |
84e3543e | 75 | #include "path-lookup.h" |
4d7213b2 | 76 | #include "show-status.h" |
400f1a33 | 77 | #include "unit-name.h" |
60918275 | 78 | |
e0a3da1f ZJS |
79 | enum { |
80 | /* 0 = run normally */ | |
81 | MANAGER_TEST_RUN_MINIMAL = 1, /* run test w/o generators */ | |
82 | MANAGER_TEST_RUN_ENV_GENERATORS = 2, /* also run env generators */ | |
83 | MANAGER_TEST_RUN_GENERATORS = 4, /* also run unit generators */ | |
84 | MANAGER_TEST_FULL = MANAGER_TEST_RUN_ENV_GENERATORS | MANAGER_TEST_RUN_GENERATORS, | |
85 | }; | |
86 | assert_cc((MANAGER_TEST_FULL & UINT8_MAX) == MANAGER_TEST_FULL); | |
87 | ||
60918275 | 88 | struct Manager { |
87f0e418 | 89 | /* Note that the set of units we know of is allowed to be |
35b8ca3a | 90 | * inconsistent. However the subset of it that is loaded may |
87d1515d LP |
91 | * not, and the list of jobs may neither. */ |
92 | ||
87f0e418 LP |
93 | /* Active jobs and units */ |
94 | Hashmap *units; /* name string => Unit object n:1 */ | |
4b58153d | 95 | Hashmap *units_by_invocation_id; |
60918275 LP |
96 | Hashmap *jobs; /* job id => Job object 1:1 */ |
97 | ||
ef734fd6 LP |
98 | /* To make it easy to iterate through the units of a specific |
99 | * type we maintain a per type linked list */ | |
ac155bb8 | 100 | LIST_HEAD(Unit, units_by_type[_UNIT_TYPE_MAX]); |
ef734fd6 | 101 | |
87f0e418 | 102 | /* Units that need to be loaded */ |
ac155bb8 | 103 | LIST_HEAD(Unit, load_queue); /* this is actually more a stack than a queue, but uh. */ |
60918275 | 104 | |
034c6ed7 LP |
105 | /* Jobs that need to be run */ |
106 | LIST_HEAD(Job, run_queue); /* more a stack than a queue, too */ | |
107 | ||
c1e1601e LP |
108 | /* Units and jobs that have not yet been announced via |
109 | * D-Bus. When something about a job changes it is added here | |
110 | * if it is not in there yet. This allows easy coalescing of | |
111 | * D-Bus change signals. */ | |
ac155bb8 | 112 | LIST_HEAD(Unit, dbus_unit_queue); |
c1e1601e LP |
113 | LIST_HEAD(Job, dbus_job_queue); |
114 | ||
701cc384 | 115 | /* Units to remove */ |
ac155bb8 | 116 | LIST_HEAD(Unit, cleanup_queue); |
23a177ef | 117 | |
c5a97ed1 LP |
118 | /* Units and jobs to check when doing GC */ |
119 | LIST_HEAD(Unit, gc_unit_queue); | |
120 | LIST_HEAD(Job, gc_job_queue); | |
701cc384 | 121 | |
4ad49000 | 122 | /* Units that should be realized */ |
91a6073e | 123 | LIST_HEAD(Unit, cgroup_realize_queue); |
4ad49000 | 124 | |
09e24654 LP |
125 | /* Units whose cgroup ran empty */ |
126 | LIST_HEAD(Unit, cgroup_empty_queue); | |
127 | ||
718db961 LP |
128 | sd_event *event; |
129 | ||
5ba6985b LP |
130 | /* We use two hash tables here, since the same PID might be |
131 | * watched by two different units: once the unit that forked | |
132 | * it off, and possibly a different unit to which it was | |
133 | * joined as cgroup member. Since we know that it is either | |
134 | * one or two units for each PID we just use to hashmaps | |
135 | * here. */ | |
136 | Hashmap *watch_pids1; /* pid => Unit object n:1 */ | |
137 | Hashmap *watch_pids2; /* pid => Unit object n:1 */ | |
9152c765 | 138 | |
95ae05c0 WC |
139 | /* A set contains all units which cgroup should be refreshed after startup */ |
140 | Set *startup_units; | |
141 | ||
f755e3b7 LP |
142 | /* A set which contains all currently failed units */ |
143 | Set *failed_units; | |
144 | ||
752b5905 LP |
145 | sd_event_source *run_queue_event_source; |
146 | ||
c952c6ec | 147 | char *notify_socket; |
718db961 LP |
148 | int notify_fd; |
149 | sd_event_source *notify_event_source; | |
150 | ||
d8fdc620 LP |
151 | int cgroups_agent_fd; |
152 | sd_event_source *cgroups_agent_event_source; | |
153 | ||
718db961 LP |
154 | int signal_fd; |
155 | sd_event_source *signal_event_source; | |
c952c6ec | 156 | |
718db961 LP |
157 | int time_change_fd; |
158 | sd_event_source *time_change_event_source; | |
9d58f1db | 159 | |
718db961 | 160 | sd_event_source *jobs_in_progress_event_source; |
acbb0225 | 161 | |
00d9ef85 LP |
162 | int user_lookup_fds[2]; |
163 | sd_event_source *user_lookup_event_source; | |
164 | ||
463d0d15 | 165 | UnitFileScope unit_file_scope; |
84e3543e | 166 | LookupPaths lookup_paths; |
fe51822e | 167 | Set *unit_path_cache; |
036643a2 | 168 | |
1137a57c LP |
169 | char **environment; |
170 | ||
e96d6be7 LP |
171 | usec_t runtime_watchdog; |
172 | usec_t shutdown_watchdog; | |
173 | ||
915b3753 LP |
174 | dual_timestamp firmware_timestamp; |
175 | dual_timestamp loader_timestamp; | |
176 | dual_timestamp kernel_timestamp; | |
e9ddabc2 | 177 | dual_timestamp initrd_timestamp; |
915b3753 | 178 | dual_timestamp userspace_timestamp; |
b0c918b9 | 179 | dual_timestamp finish_timestamp; |
2928b0a8 | 180 | |
c2e0d600 TA |
181 | dual_timestamp security_start_timestamp; |
182 | dual_timestamp security_finish_timestamp; | |
518d10e9 UTL |
183 | dual_timestamp generators_start_timestamp; |
184 | dual_timestamp generators_finish_timestamp; | |
718db961 LP |
185 | dual_timestamp units_load_start_timestamp; |
186 | dual_timestamp units_load_finish_timestamp; | |
8d567588 | 187 | |
25ac040b | 188 | struct udev* udev; |
9670d583 LP |
189 | |
190 | /* Data specific to the device subsystem */ | |
f94ea366 | 191 | struct udev_monitor* udev_monitor; |
718db961 | 192 | sd_event_source *udev_event_source; |
8fe914ec | 193 | Hashmap *devices_by_sysfs; |
ef734fd6 LP |
194 | |
195 | /* Data specific to the mount subsystem */ | |
d379d442 | 196 | struct libmnt_monitor *mount_monitor; |
718db961 | 197 | sd_event_source *mount_event_source; |
ea430986 | 198 | |
07b0b134 ML |
199 | /* Data specific to the swap filesystem */ |
200 | FILE *proc_swaps; | |
718db961 | 201 | sd_event_source *swap_event_source; |
9670d583 | 202 | Hashmap *swaps_by_devnode; |
07b0b134 | 203 | |
ea430986 | 204 | /* Data specific to the D-Bus subsystem */ |
718db961 LP |
205 | sd_bus *api_bus, *system_bus; |
206 | Set *private_buses; | |
207 | int private_listen_fd; | |
208 | sd_event_source *private_listen_event_source; | |
8f8f05a9 LP |
209 | |
210 | /* Contains all the clients that are subscribed to signals via | |
211 | the API bus. Note that private bus connections are always | |
212 | considered subscribes, since they last for very short only, | |
213 | and it is much simpler that way. */ | |
214 | sd_bus_track *subscribed; | |
215 | char **deserialized_subscribed; | |
5e8d1c9a | 216 | |
8f88ecf6 LP |
217 | /* This is used during reloading: before the reload we queue |
218 | * the reply message here, and afterwards we send it */ | |
219 | sd_bus_message *queued_message; | |
8e274523 | 220 | |
05e343b7 | 221 | Hashmap *watch_bus; /* D-Bus names => Unit object n:1 */ |
05e343b7 | 222 | |
71445ae7 LP |
223 | bool send_reloading_done; |
224 | ||
7fab9d01 | 225 | uint32_t current_job_id; |
bacbccb7 | 226 | uint32_t default_unit_job_id; |
7fab9d01 | 227 | |
9d58f1db LP |
228 | /* Data specific to the Automount subsystem */ |
229 | int dev_autofs_fd; | |
230 | ||
8e274523 | 231 | /* Data specific to the cgroup subsystem */ |
4ad49000 | 232 | Hashmap *cgroup_unit; |
efdb0237 | 233 | CGroupMask cgroup_supported; |
9444b1f2 | 234 | char *cgroup_root; |
e537352b | 235 | |
09e24654 | 236 | /* Notifications from cgroups, when the unified hierarchy is used is done via inotify. */ |
efdb0237 LP |
237 | int cgroup_inotify_fd; |
238 | sd_event_source *cgroup_inotify_event_source; | |
239 | Hashmap *cgroup_inotify_wd_unit; | |
701cc384 | 240 | |
09e24654 LP |
241 | /* A defer event for handling cgroup empty events and processing them after SIGCHLD in all cases. */ |
242 | sd_event_source *cgroup_empty_event_source; | |
243 | ||
35b8ca3a | 244 | /* Make sure the user cannot accidentally unmount our cgroup |
33be102a LP |
245 | * file system */ |
246 | int pin_cgroupfs_fd; | |
247 | ||
892a035c | 248 | unsigned gc_marker; |
efdb0237 | 249 | |
9d58f1db | 250 | /* Flags */ |
b9080b03 | 251 | ManagerExitCode exit_code:5; |
41447faf | 252 | |
9d58f1db | 253 | bool dispatching_load_queue:1; |
9d58f1db LP |
254 | bool dispatching_dbus_queue:1; |
255 | ||
72bc8d00 | 256 | bool taint_usr:1; |
e0a3da1f | 257 | |
0c2826c6 ZJS |
258 | bool ready_sent:1; |
259 | ||
e0a3da1f | 260 | unsigned test_run_flags:8; |
0d8c31ff | 261 | |
287419c1 AC |
262 | /* If non-zero, exit with the following value when the systemd |
263 | * process terminate. Useful for containers: systemd-nspawn could get | |
264 | * the return value. */ | |
265 | uint8_t return_value; | |
266 | ||
d450b6f2 | 267 | ShowStatus show_status; |
7d5ceb64 | 268 | char *confirm_spawn; |
31a7eb86 | 269 | bool no_console_output; |
d3689161 | 270 | |
0a494f1f LP |
271 | ExecOutput default_std_output, default_std_error; |
272 | ||
085afe36 | 273 | usec_t default_restart_usec, default_timeout_start_usec, default_timeout_stop_usec; |
1f19a534 | 274 | |
3f41e1e5 LN |
275 | usec_t default_start_limit_interval; |
276 | unsigned default_start_limit_burst; | |
277 | ||
085afe36 LP |
278 | bool default_cpu_accounting; |
279 | bool default_memory_accounting; | |
13c31542 | 280 | bool default_io_accounting; |
085afe36 | 281 | bool default_blockio_accounting; |
03a7b521 | 282 | bool default_tasks_accounting; |
377bfd2d | 283 | bool default_ip_accounting; |
085afe36 | 284 | |
0af20ea2 | 285 | uint64_t default_tasks_max; |
bd8f585b LP |
286 | usec_t default_timer_accuracy_usec; |
287 | ||
517d56b1 | 288 | struct rlimit *rlimit[_RLIMIT_MAX]; |
c93ff2e9 | 289 | |
a7556052 LP |
290 | /* non-zero if we are reloading or reexecuting, */ |
291 | int n_reloading; | |
e409f875 LP |
292 | |
293 | unsigned n_installed_jobs; | |
76bf48b7 | 294 | unsigned n_failed_jobs; |
f2b68789 | 295 | |
03b717a3 | 296 | /* Jobs in progress watching */ |
637f8b8e | 297 | unsigned n_running_jobs; |
7ed9f6cd | 298 | unsigned n_on_console; |
03b717a3 | 299 | unsigned jobs_in_progress_iteration; |
637f8b8e | 300 | |
e46b13c8 ZJS |
301 | /* Do we have any outstanding password prompts? */ |
302 | int have_ask_password; | |
303 | int ask_password_inotify_fd; | |
304 | sd_event_source *ask_password_event_source; | |
305 | ||
f2b68789 | 306 | /* Type=idle pipes */ |
31a7eb86 | 307 | int idle_pipe[4]; |
718db961 | 308 | sd_event_source *idle_pipe_event_source; |
664f88a7 LP |
309 | |
310 | char *switch_root; | |
311 | char *switch_root_init; | |
a57f7e2c LP |
312 | |
313 | /* This maps all possible path prefixes to the units needing | |
314 | * them. It's a hashmap with a path string as key and a Set as | |
315 | * value where Unit objects are contained. */ | |
316 | Hashmap *units_requiring_mounts_for; | |
e3dd987c | 317 | |
283868e1 SW |
318 | /* Used for processing polkit authorization responses */ |
319 | Hashmap *polkit_registry; | |
2e5c94b9 | 320 | |
29206d46 LP |
321 | /* Dynamic users/groups, indexed by their name */ |
322 | Hashmap *dynamic_users; | |
323 | ||
00d9ef85 LP |
324 | /* Keep track of all UIDs and GIDs any of our services currently use. This is useful for the RemoveIPC= logic. */ |
325 | Hashmap *uid_refs; | |
326 | Hashmap *gid_refs; | |
327 | ||
24dd31c1 | 328 | /* When the user hits C-A-D more than 7 times per 2s, do something immediately... */ |
2e5c94b9 | 329 | RateLimit ctrl_alt_del_ratelimit; |
ae8c7939 | 330 | EmergencyAction cad_burst_action; |
f2341e0a LP |
331 | |
332 | const char *unit_log_field; | |
333 | const char *unit_log_format_string; | |
ae2a2c53 | 334 | |
4b58153d LP |
335 | const char *invocation_log_field; |
336 | const char *invocation_log_format_string; | |
337 | ||
463d0d15 | 338 | int first_boot; /* tri-state */ |
3536f49e YW |
339 | |
340 | /* prefixes of e.g. RuntimeDirectory= */ | |
72fd1768 | 341 | char *prefix[_EXEC_DIRECTORY_TYPE_MAX]; |
60918275 LP |
342 | }; |
343 | ||
463d0d15 LP |
344 | #define MANAGER_IS_SYSTEM(m) ((m)->unit_file_scope == UNIT_FILE_SYSTEM) |
345 | #define MANAGER_IS_USER(m) ((m)->unit_file_scope != UNIT_FILE_SYSTEM) | |
346 | ||
2c289ea8 LP |
347 | #define MANAGER_IS_RELOADING(m) ((m)->n_reloading > 0) |
348 | ||
e0a3da1f | 349 | int manager_new(UnitFileScope scope, unsigned test_run_flags, Manager **m); |
06d8d842 | 350 | Manager* manager_free(Manager *m); |
60918275 | 351 | |
ba64af90 | 352 | void manager_enumerate(Manager *m); |
a16e1123 | 353 | int manager_startup(Manager *m, FILE *serialization, FDSet *fds); |
f50e0a01 | 354 | |
60918275 | 355 | Job *manager_get_job(Manager *m, uint32_t id); |
87f0e418 | 356 | Unit *manager_get_unit(Manager *m, const char *name); |
60918275 | 357 | |
86fbf370 | 358 | int manager_get_job_from_dbus_path(Manager *m, const char *s, Job **_j); |
ea430986 | 359 | |
718db961 LP |
360 | int manager_load_unit_prepare(Manager *m, const char *name, const char *path, sd_bus_error *e, Unit **_ret); |
361 | int manager_load_unit(Manager *m, const char *name, const char *path, sd_bus_error *e, Unit **_ret); | |
362 | int manager_load_unit_from_dbus_path(Manager *m, const char *s, sd_bus_error *e, Unit **_u); | |
28247076 | 363 | |
4bd29fe5 LP |
364 | int manager_add_job(Manager *m, JobType type, Unit *unit, JobMode mode, sd_bus_error *e, Job **_ret); |
365 | int manager_add_job_by_name(Manager *m, JobType type, const char *name, JobMode mode, sd_bus_error *e, Job **_ret); | |
53f18416 | 366 | int manager_add_job_by_name_and_warn(Manager *m, JobType type, const char *name, JobMode mode, Job **ret); |
15d167f8 | 367 | int manager_propagate_reload(Manager *m, Unit *unit, JobMode mode, sd_bus_error *e); |
60918275 | 368 | |
87f0e418 | 369 | void manager_dump_units(Manager *s, FILE *f, const char *prefix); |
cea8e32e | 370 | void manager_dump_jobs(Manager *s, FILE *f, const char *prefix); |
a66d02c3 | 371 | |
7fad411c LP |
372 | void manager_clear_jobs(Manager *m); |
373 | ||
c1e1601e | 374 | unsigned manager_dispatch_load_queue(Manager *m); |
f50e0a01 | 375 | |
718db961 | 376 | int manager_environment_add(Manager *m, char **minus, char **plus); |
c93ff2e9 | 377 | int manager_set_default_rlimits(Manager *m, struct rlimit **default_rlimit); |
b2bb3dbe | 378 | |
9152c765 | 379 | int manager_loop(Manager *m); |
83c60c9f | 380 | |
d8d5ab98 | 381 | int manager_open_serialization(Manager *m, FILE **_f); |
a16e1123 | 382 | |
b3680f49 | 383 | int manager_serialize(Manager *m, FILE *f, FDSet *fds, bool switching_root); |
a16e1123 LP |
384 | int manager_deserialize(Manager *m, FILE *f, FDSet *fds); |
385 | ||
386 | int manager_reload(Manager *m); | |
387 | ||
fdf20a31 | 388 | void manager_reset_failed(Manager *m); |
5632e374 | 389 | |
4927fcae | 390 | void manager_send_unit_audit(Manager *m, Unit *u, int type, bool success); |
e983b760 | 391 | void manager_send_unit_plymouth(Manager *m, Unit *u); |
4927fcae | 392 | |
31afa0a4 | 393 | bool manager_unit_inactive_or_pending(Manager *m, const char *name); |
8f6df3fa | 394 | |
b0c918b9 LP |
395 | void manager_check_finished(Manager *m); |
396 | ||
4cfa2c99 | 397 | void manager_recheck_journal(Manager *m); |
f1dd0c3f | 398 | |
d450b6f2 | 399 | void manager_set_show_status(Manager *m, ShowStatus mode); |
e2680723 LP |
400 | void manager_set_first_boot(Manager *m, bool b); |
401 | ||
127d5fd1 | 402 | void manager_status_printf(Manager *m, StatusType type, const char *status, const char *format, ...) _printf_(4,5); |
cb8ccb22 | 403 | void manager_flip_auto_status(Manager *m, bool enable); |
68b29a9f | 404 | |
a57f7e2c | 405 | Set *manager_get_units_requiring_mounts_for(Manager *m, const char *path); |
e66cf1a3 | 406 | |
19bbdd98 | 407 | void manager_set_exec_params(Manager *m, ExecParameters *p); |
f755e3b7 LP |
408 | |
409 | ManagerState manager_state(Manager *m); | |
410 | ||
5269eb6b | 411 | int manager_update_failed_units(Manager *m, Unit *u, bool failed); |
03455c28 | 412 | |
00d9ef85 LP |
413 | void manager_unref_uid(Manager *m, uid_t uid, bool destroy_now); |
414 | int manager_ref_uid(Manager *m, uid_t uid, bool clean_ipc); | |
415 | ||
416 | void manager_unref_gid(Manager *m, gid_t gid, bool destroy_now); | |
417 | int manager_ref_gid(Manager *m, gid_t gid, bool destroy_now); | |
418 | ||
419 | void manager_vacuum_uid_refs(Manager *m); | |
420 | void manager_vacuum_gid_refs(Manager *m); | |
421 | ||
422 | void manager_serialize_uid_refs(Manager *m, FILE *f); | |
423 | void manager_deserialize_uid_refs_one(Manager *m, const char *value); | |
424 | ||
425 | void manager_serialize_gid_refs(Manager *m, FILE *f); | |
426 | void manager_deserialize_gid_refs_one(Manager *m, const char *value); | |
427 | ||
f755e3b7 LP |
428 | const char *manager_state_to_string(ManagerState m) _const_; |
429 | ManagerState manager_state_from_string(const char *s) _pure_; | |
7d5ceb64 FB |
430 | |
431 | const char *manager_get_confirm_spawn(Manager *m); | |
b0eb2944 FB |
432 | bool manager_is_confirm_spawn_disabled(Manager *m); |
433 | void manager_disable_confirm_spawn(void); |