]>
Commit | Line | Data |
---|---|---|
c2f1db8f | 1 | #pragma once |
60918275 | 2 | |
a7334b09 LP |
3 | /*** |
4 | This file is part of systemd. | |
5 | ||
6 | Copyright 2010 Lennart Poettering | |
7 | ||
8 | systemd is free software; you can redistribute it and/or modify it | |
5430f7f2 LP |
9 | under the terms of the GNU Lesser General Public License as published by |
10 | the Free Software Foundation; either version 2.1 of the License, or | |
a7334b09 LP |
11 | (at your option) any later version. |
12 | ||
13 | systemd is distributed in the hope that it will be useful, but | |
14 | WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
5430f7f2 | 16 | Lesser General Public License for more details. |
a7334b09 | 17 | |
5430f7f2 | 18 | You should have received a copy of the GNU Lesser General Public License |
a7334b09 LP |
19 | along with systemd; If not, see <http://www.gnu.org/licenses/>. |
20 | ***/ | |
21 | ||
71d35b6b | 22 | #include <libmount.h> |
60918275 | 23 | #include <stdbool.h> |
a66d02c3 | 24 | #include <stdio.h> |
ea430986 | 25 | |
718db961 LP |
26 | #include "sd-bus.h" |
27 | #include "sd-event.h" | |
71d35b6b | 28 | |
4ad49000 | 29 | #include "cgroup-util.h" |
400f1a33 | 30 | #include "fdset.h" |
2e5c94b9 | 31 | #include "hashmap.h" |
6a48d82f | 32 | #include "ip-address-access.h" |
2e5c94b9 | 33 | #include "list.h" |
2e5c94b9 | 34 | #include "ratelimit.h" |
a16e1123 | 35 | |
4f0f902f | 36 | /* Enforce upper limit how many names we allow */ |
59d1a833 | 37 | #define MANAGER_MAX_NAMES 131072 /* 128K */ |
4f0f902f | 38 | |
60918275 | 39 | typedef struct Manager Manager; |
acbb0225 | 40 | |
f755e3b7 | 41 | typedef enum ManagerState { |
d81afec1 | 42 | MANAGER_INITIALIZING, |
f755e3b7 | 43 | MANAGER_STARTING, |
a16e1123 | 44 | MANAGER_RUNNING, |
f755e3b7 LP |
45 | MANAGER_DEGRADED, |
46 | MANAGER_MAINTENANCE, | |
47 | MANAGER_STOPPING, | |
48 | _MANAGER_STATE_MAX, | |
49 | _MANAGER_STATE_INVALID = -1 | |
50 | } ManagerState; | |
51 | ||
52 | typedef enum ManagerExitCode { | |
53 | MANAGER_OK, | |
a16e1123 LP |
54 | MANAGER_EXIT, |
55 | MANAGER_RELOAD, | |
56 | MANAGER_REEXECUTE, | |
b9080b03 FF |
57 | MANAGER_REBOOT, |
58 | MANAGER_POWEROFF, | |
59 | MANAGER_HALT, | |
60 | MANAGER_KEXEC, | |
664f88a7 | 61 | MANAGER_SWITCH_ROOT, |
a16e1123 LP |
62 | _MANAGER_EXIT_CODE_MAX, |
63 | _MANAGER_EXIT_CODE_INVALID = -1 | |
64 | } ManagerExitCode; | |
65 | ||
127d5fd1 ZJS |
66 | typedef enum StatusType { |
67 | STATUS_TYPE_EPHEMERAL, | |
68 | STATUS_TYPE_NORMAL, | |
ebc5788e | 69 | STATUS_TYPE_EMERGENCY, |
127d5fd1 ZJS |
70 | } StatusType; |
71 | ||
400f1a33 | 72 | #include "execute.h" |
60918275 | 73 | #include "job.h" |
84e3543e | 74 | #include "path-lookup.h" |
4d7213b2 | 75 | #include "show-status.h" |
400f1a33 | 76 | #include "unit-name.h" |
60918275 | 77 | |
e0a3da1f ZJS |
78 | enum { |
79 | /* 0 = run normally */ | |
80 | MANAGER_TEST_RUN_MINIMAL = 1, /* run test w/o generators */ | |
81 | MANAGER_TEST_RUN_ENV_GENERATORS = 2, /* also run env generators */ | |
82 | MANAGER_TEST_RUN_GENERATORS = 4, /* also run unit generators */ | |
83 | MANAGER_TEST_FULL = MANAGER_TEST_RUN_ENV_GENERATORS | MANAGER_TEST_RUN_GENERATORS, | |
84 | }; | |
85 | assert_cc((MANAGER_TEST_FULL & UINT8_MAX) == MANAGER_TEST_FULL); | |
86 | ||
60918275 | 87 | struct Manager { |
87f0e418 | 88 | /* Note that the set of units we know of is allowed to be |
35b8ca3a | 89 | * inconsistent. However the subset of it that is loaded may |
87d1515d LP |
90 | * not, and the list of jobs may neither. */ |
91 | ||
87f0e418 LP |
92 | /* Active jobs and units */ |
93 | Hashmap *units; /* name string => Unit object n:1 */ | |
4b58153d | 94 | Hashmap *units_by_invocation_id; |
60918275 LP |
95 | Hashmap *jobs; /* job id => Job object 1:1 */ |
96 | ||
ef734fd6 LP |
97 | /* To make it easy to iterate through the units of a specific |
98 | * type we maintain a per type linked list */ | |
ac155bb8 | 99 | LIST_HEAD(Unit, units_by_type[_UNIT_TYPE_MAX]); |
ef734fd6 | 100 | |
87f0e418 | 101 | /* Units that need to be loaded */ |
ac155bb8 | 102 | LIST_HEAD(Unit, load_queue); /* this is actually more a stack than a queue, but uh. */ |
60918275 | 103 | |
034c6ed7 LP |
104 | /* Jobs that need to be run */ |
105 | LIST_HEAD(Job, run_queue); /* more a stack than a queue, too */ | |
106 | ||
c1e1601e LP |
107 | /* Units and jobs that have not yet been announced via |
108 | * D-Bus. When something about a job changes it is added here | |
109 | * if it is not in there yet. This allows easy coalescing of | |
110 | * D-Bus change signals. */ | |
ac155bb8 | 111 | LIST_HEAD(Unit, dbus_unit_queue); |
c1e1601e LP |
112 | LIST_HEAD(Job, dbus_job_queue); |
113 | ||
701cc384 | 114 | /* Units to remove */ |
ac155bb8 | 115 | LIST_HEAD(Unit, cleanup_queue); |
23a177ef | 116 | |
c5a97ed1 LP |
117 | /* Units and jobs to check when doing GC */ |
118 | LIST_HEAD(Unit, gc_unit_queue); | |
119 | LIST_HEAD(Job, gc_job_queue); | |
701cc384 | 120 | |
4ad49000 | 121 | /* Units that should be realized */ |
91a6073e | 122 | LIST_HEAD(Unit, cgroup_realize_queue); |
4ad49000 | 123 | |
09e24654 LP |
124 | /* Units whose cgroup ran empty */ |
125 | LIST_HEAD(Unit, cgroup_empty_queue); | |
126 | ||
718db961 LP |
127 | sd_event *event; |
128 | ||
5ba6985b LP |
129 | /* We use two hash tables here, since the same PID might be |
130 | * watched by two different units: once the unit that forked | |
131 | * it off, and possibly a different unit to which it was | |
132 | * joined as cgroup member. Since we know that it is either | |
133 | * one or two units for each PID we just use to hashmaps | |
134 | * here. */ | |
135 | Hashmap *watch_pids1; /* pid => Unit object n:1 */ | |
136 | Hashmap *watch_pids2; /* pid => Unit object n:1 */ | |
9152c765 | 137 | |
95ae05c0 WC |
138 | /* A set contains all units which cgroup should be refreshed after startup */ |
139 | Set *startup_units; | |
140 | ||
f755e3b7 LP |
141 | /* A set which contains all currently failed units */ |
142 | Set *failed_units; | |
143 | ||
752b5905 LP |
144 | sd_event_source *run_queue_event_source; |
145 | ||
c952c6ec | 146 | char *notify_socket; |
718db961 LP |
147 | int notify_fd; |
148 | sd_event_source *notify_event_source; | |
149 | ||
d8fdc620 LP |
150 | int cgroups_agent_fd; |
151 | sd_event_source *cgroups_agent_event_source; | |
152 | ||
718db961 LP |
153 | int signal_fd; |
154 | sd_event_source *signal_event_source; | |
c952c6ec | 155 | |
718db961 LP |
156 | int time_change_fd; |
157 | sd_event_source *time_change_event_source; | |
9d58f1db | 158 | |
718db961 | 159 | sd_event_source *jobs_in_progress_event_source; |
acbb0225 | 160 | |
00d9ef85 LP |
161 | int user_lookup_fds[2]; |
162 | sd_event_source *user_lookup_event_source; | |
163 | ||
463d0d15 | 164 | UnitFileScope unit_file_scope; |
84e3543e | 165 | LookupPaths lookup_paths; |
fe51822e | 166 | Set *unit_path_cache; |
036643a2 | 167 | |
1137a57c LP |
168 | char **environment; |
169 | ||
e96d6be7 LP |
170 | usec_t runtime_watchdog; |
171 | usec_t shutdown_watchdog; | |
172 | ||
915b3753 LP |
173 | dual_timestamp firmware_timestamp; |
174 | dual_timestamp loader_timestamp; | |
175 | dual_timestamp kernel_timestamp; | |
e9ddabc2 | 176 | dual_timestamp initrd_timestamp; |
915b3753 | 177 | dual_timestamp userspace_timestamp; |
b0c918b9 | 178 | dual_timestamp finish_timestamp; |
2928b0a8 | 179 | |
c2e0d600 TA |
180 | dual_timestamp security_start_timestamp; |
181 | dual_timestamp security_finish_timestamp; | |
518d10e9 UTL |
182 | dual_timestamp generators_start_timestamp; |
183 | dual_timestamp generators_finish_timestamp; | |
718db961 LP |
184 | dual_timestamp units_load_start_timestamp; |
185 | dual_timestamp units_load_finish_timestamp; | |
8d567588 | 186 | |
25ac040b | 187 | struct udev* udev; |
9670d583 LP |
188 | |
189 | /* Data specific to the device subsystem */ | |
f94ea366 | 190 | struct udev_monitor* udev_monitor; |
718db961 | 191 | sd_event_source *udev_event_source; |
8fe914ec | 192 | Hashmap *devices_by_sysfs; |
ef734fd6 LP |
193 | |
194 | /* Data specific to the mount subsystem */ | |
d379d442 | 195 | struct libmnt_monitor *mount_monitor; |
718db961 | 196 | sd_event_source *mount_event_source; |
ea430986 | 197 | |
07b0b134 ML |
198 | /* Data specific to the swap filesystem */ |
199 | FILE *proc_swaps; | |
718db961 | 200 | sd_event_source *swap_event_source; |
9670d583 | 201 | Hashmap *swaps_by_devnode; |
07b0b134 | 202 | |
ea430986 | 203 | /* Data specific to the D-Bus subsystem */ |
718db961 LP |
204 | sd_bus *api_bus, *system_bus; |
205 | Set *private_buses; | |
206 | int private_listen_fd; | |
207 | sd_event_source *private_listen_event_source; | |
8f8f05a9 LP |
208 | |
209 | /* Contains all the clients that are subscribed to signals via | |
210 | the API bus. Note that private bus connections are always | |
211 | considered subscribes, since they last for very short only, | |
212 | and it is much simpler that way. */ | |
213 | sd_bus_track *subscribed; | |
214 | char **deserialized_subscribed; | |
5e8d1c9a | 215 | |
8f88ecf6 LP |
216 | /* This is used during reloading: before the reload we queue |
217 | * the reply message here, and afterwards we send it */ | |
218 | sd_bus_message *queued_message; | |
8e274523 | 219 | |
05e343b7 | 220 | Hashmap *watch_bus; /* D-Bus names => Unit object n:1 */ |
05e343b7 | 221 | |
71445ae7 LP |
222 | bool send_reloading_done; |
223 | ||
7fab9d01 | 224 | uint32_t current_job_id; |
bacbccb7 | 225 | uint32_t default_unit_job_id; |
7fab9d01 | 226 | |
9d58f1db LP |
227 | /* Data specific to the Automount subsystem */ |
228 | int dev_autofs_fd; | |
229 | ||
8e274523 | 230 | /* Data specific to the cgroup subsystem */ |
4ad49000 | 231 | Hashmap *cgroup_unit; |
efdb0237 | 232 | CGroupMask cgroup_supported; |
9444b1f2 | 233 | char *cgroup_root; |
e537352b | 234 | |
09e24654 | 235 | /* Notifications from cgroups, when the unified hierarchy is used is done via inotify. */ |
efdb0237 LP |
236 | int cgroup_inotify_fd; |
237 | sd_event_source *cgroup_inotify_event_source; | |
238 | Hashmap *cgroup_inotify_wd_unit; | |
701cc384 | 239 | |
09e24654 LP |
240 | /* A defer event for handling cgroup empty events and processing them after SIGCHLD in all cases. */ |
241 | sd_event_source *cgroup_empty_event_source; | |
242 | ||
35b8ca3a | 243 | /* Make sure the user cannot accidentally unmount our cgroup |
33be102a LP |
244 | * file system */ |
245 | int pin_cgroupfs_fd; | |
246 | ||
892a035c | 247 | unsigned gc_marker; |
efdb0237 | 248 | |
9d58f1db | 249 | /* Flags */ |
b9080b03 | 250 | ManagerExitCode exit_code:5; |
41447faf | 251 | |
9d58f1db | 252 | bool dispatching_load_queue:1; |
9d58f1db LP |
253 | bool dispatching_dbus_queue:1; |
254 | ||
72bc8d00 | 255 | bool taint_usr:1; |
e0a3da1f | 256 | |
0c2826c6 ZJS |
257 | bool ready_sent:1; |
258 | ||
e0a3da1f | 259 | unsigned test_run_flags:8; |
0d8c31ff | 260 | |
287419c1 AC |
261 | /* If non-zero, exit with the following value when the systemd |
262 | * process terminate. Useful for containers: systemd-nspawn could get | |
263 | * the return value. */ | |
264 | uint8_t return_value; | |
265 | ||
d450b6f2 | 266 | ShowStatus show_status; |
7d5ceb64 | 267 | char *confirm_spawn; |
31a7eb86 | 268 | bool no_console_output; |
d3689161 | 269 | |
0a494f1f LP |
270 | ExecOutput default_std_output, default_std_error; |
271 | ||
085afe36 | 272 | usec_t default_restart_usec, default_timeout_start_usec, default_timeout_stop_usec; |
1f19a534 | 273 | |
3f41e1e5 LN |
274 | usec_t default_start_limit_interval; |
275 | unsigned default_start_limit_burst; | |
276 | ||
085afe36 LP |
277 | bool default_cpu_accounting; |
278 | bool default_memory_accounting; | |
13c31542 | 279 | bool default_io_accounting; |
085afe36 | 280 | bool default_blockio_accounting; |
03a7b521 | 281 | bool default_tasks_accounting; |
377bfd2d | 282 | bool default_ip_accounting; |
085afe36 | 283 | |
0af20ea2 | 284 | uint64_t default_tasks_max; |
bd8f585b LP |
285 | usec_t default_timer_accuracy_usec; |
286 | ||
517d56b1 | 287 | struct rlimit *rlimit[_RLIMIT_MAX]; |
c93ff2e9 | 288 | |
a7556052 LP |
289 | /* non-zero if we are reloading or reexecuting, */ |
290 | int n_reloading; | |
e409f875 LP |
291 | |
292 | unsigned n_installed_jobs; | |
76bf48b7 | 293 | unsigned n_failed_jobs; |
f2b68789 | 294 | |
03b717a3 | 295 | /* Jobs in progress watching */ |
637f8b8e | 296 | unsigned n_running_jobs; |
7ed9f6cd | 297 | unsigned n_on_console; |
03b717a3 | 298 | unsigned jobs_in_progress_iteration; |
637f8b8e | 299 | |
e46b13c8 ZJS |
300 | /* Do we have any outstanding password prompts? */ |
301 | int have_ask_password; | |
302 | int ask_password_inotify_fd; | |
303 | sd_event_source *ask_password_event_source; | |
304 | ||
f2b68789 | 305 | /* Type=idle pipes */ |
31a7eb86 | 306 | int idle_pipe[4]; |
718db961 | 307 | sd_event_source *idle_pipe_event_source; |
664f88a7 LP |
308 | |
309 | char *switch_root; | |
310 | char *switch_root_init; | |
a57f7e2c LP |
311 | |
312 | /* This maps all possible path prefixes to the units needing | |
313 | * them. It's a hashmap with a path string as key and a Set as | |
314 | * value where Unit objects are contained. */ | |
315 | Hashmap *units_requiring_mounts_for; | |
e3dd987c | 316 | |
283868e1 SW |
317 | /* Used for processing polkit authorization responses */ |
318 | Hashmap *polkit_registry; | |
2e5c94b9 | 319 | |
29206d46 LP |
320 | /* Dynamic users/groups, indexed by their name */ |
321 | Hashmap *dynamic_users; | |
322 | ||
00d9ef85 LP |
323 | /* Keep track of all UIDs and GIDs any of our services currently use. This is useful for the RemoveIPC= logic. */ |
324 | Hashmap *uid_refs; | |
325 | Hashmap *gid_refs; | |
326 | ||
24dd31c1 | 327 | /* When the user hits C-A-D more than 7 times per 2s, do something immediately... */ |
2e5c94b9 | 328 | RateLimit ctrl_alt_del_ratelimit; |
ae8c7939 | 329 | EmergencyAction cad_burst_action; |
f2341e0a LP |
330 | |
331 | const char *unit_log_field; | |
332 | const char *unit_log_format_string; | |
ae2a2c53 | 333 | |
4b58153d LP |
334 | const char *invocation_log_field; |
335 | const char *invocation_log_format_string; | |
336 | ||
463d0d15 | 337 | int first_boot; /* tri-state */ |
3536f49e YW |
338 | |
339 | /* prefixes of e.g. RuntimeDirectory= */ | |
72fd1768 | 340 | char *prefix[_EXEC_DIRECTORY_TYPE_MAX]; |
60918275 LP |
341 | }; |
342 | ||
463d0d15 LP |
343 | #define MANAGER_IS_SYSTEM(m) ((m)->unit_file_scope == UNIT_FILE_SYSTEM) |
344 | #define MANAGER_IS_USER(m) ((m)->unit_file_scope != UNIT_FILE_SYSTEM) | |
345 | ||
2c289ea8 LP |
346 | #define MANAGER_IS_RELOADING(m) ((m)->n_reloading > 0) |
347 | ||
e0a3da1f | 348 | int manager_new(UnitFileScope scope, unsigned test_run_flags, Manager **m); |
06d8d842 | 349 | Manager* manager_free(Manager *m); |
60918275 | 350 | |
ba64af90 | 351 | void manager_enumerate(Manager *m); |
a16e1123 | 352 | int manager_startup(Manager *m, FILE *serialization, FDSet *fds); |
f50e0a01 | 353 | |
60918275 | 354 | Job *manager_get_job(Manager *m, uint32_t id); |
87f0e418 | 355 | Unit *manager_get_unit(Manager *m, const char *name); |
60918275 | 356 | |
86fbf370 | 357 | int manager_get_job_from_dbus_path(Manager *m, const char *s, Job **_j); |
ea430986 | 358 | |
718db961 LP |
359 | int manager_load_unit_prepare(Manager *m, const char *name, const char *path, sd_bus_error *e, Unit **_ret); |
360 | int manager_load_unit(Manager *m, const char *name, const char *path, sd_bus_error *e, Unit **_ret); | |
361 | int manager_load_unit_from_dbus_path(Manager *m, const char *s, sd_bus_error *e, Unit **_u); | |
28247076 | 362 | |
4bd29fe5 LP |
363 | int manager_add_job(Manager *m, JobType type, Unit *unit, JobMode mode, sd_bus_error *e, Job **_ret); |
364 | int manager_add_job_by_name(Manager *m, JobType type, const char *name, JobMode mode, sd_bus_error *e, Job **_ret); | |
53f18416 | 365 | int manager_add_job_by_name_and_warn(Manager *m, JobType type, const char *name, JobMode mode, Job **ret); |
15d167f8 | 366 | int manager_propagate_reload(Manager *m, Unit *unit, JobMode mode, sd_bus_error *e); |
60918275 | 367 | |
87f0e418 | 368 | void manager_dump_units(Manager *s, FILE *f, const char *prefix); |
cea8e32e | 369 | void manager_dump_jobs(Manager *s, FILE *f, const char *prefix); |
a66d02c3 | 370 | |
7fad411c LP |
371 | void manager_clear_jobs(Manager *m); |
372 | ||
c1e1601e | 373 | unsigned manager_dispatch_load_queue(Manager *m); |
f50e0a01 | 374 | |
718db961 | 375 | int manager_environment_add(Manager *m, char **minus, char **plus); |
c93ff2e9 | 376 | int manager_set_default_rlimits(Manager *m, struct rlimit **default_rlimit); |
b2bb3dbe | 377 | |
9152c765 | 378 | int manager_loop(Manager *m); |
83c60c9f | 379 | |
d8d5ab98 | 380 | int manager_open_serialization(Manager *m, FILE **_f); |
a16e1123 | 381 | |
b3680f49 | 382 | int manager_serialize(Manager *m, FILE *f, FDSet *fds, bool switching_root); |
a16e1123 LP |
383 | int manager_deserialize(Manager *m, FILE *f, FDSet *fds); |
384 | ||
385 | int manager_reload(Manager *m); | |
386 | ||
fdf20a31 | 387 | void manager_reset_failed(Manager *m); |
5632e374 | 388 | |
4927fcae | 389 | void manager_send_unit_audit(Manager *m, Unit *u, int type, bool success); |
e983b760 | 390 | void manager_send_unit_plymouth(Manager *m, Unit *u); |
4927fcae | 391 | |
31afa0a4 | 392 | bool manager_unit_inactive_or_pending(Manager *m, const char *name); |
8f6df3fa | 393 | |
b0c918b9 LP |
394 | void manager_check_finished(Manager *m); |
395 | ||
4cfa2c99 | 396 | void manager_recheck_journal(Manager *m); |
f1dd0c3f | 397 | |
d450b6f2 | 398 | void manager_set_show_status(Manager *m, ShowStatus mode); |
e2680723 LP |
399 | void manager_set_first_boot(Manager *m, bool b); |
400 | ||
127d5fd1 | 401 | void manager_status_printf(Manager *m, StatusType type, const char *status, const char *format, ...) _printf_(4,5); |
cb8ccb22 | 402 | void manager_flip_auto_status(Manager *m, bool enable); |
68b29a9f | 403 | |
a57f7e2c | 404 | Set *manager_get_units_requiring_mounts_for(Manager *m, const char *path); |
e66cf1a3 | 405 | |
19bbdd98 | 406 | void manager_set_exec_params(Manager *m, ExecParameters *p); |
f755e3b7 LP |
407 | |
408 | ManagerState manager_state(Manager *m); | |
409 | ||
5269eb6b | 410 | int manager_update_failed_units(Manager *m, Unit *u, bool failed); |
03455c28 | 411 | |
00d9ef85 LP |
412 | void manager_unref_uid(Manager *m, uid_t uid, bool destroy_now); |
413 | int manager_ref_uid(Manager *m, uid_t uid, bool clean_ipc); | |
414 | ||
415 | void manager_unref_gid(Manager *m, gid_t gid, bool destroy_now); | |
416 | int manager_ref_gid(Manager *m, gid_t gid, bool destroy_now); | |
417 | ||
418 | void manager_vacuum_uid_refs(Manager *m); | |
419 | void manager_vacuum_gid_refs(Manager *m); | |
420 | ||
421 | void manager_serialize_uid_refs(Manager *m, FILE *f); | |
422 | void manager_deserialize_uid_refs_one(Manager *m, const char *value); | |
423 | ||
424 | void manager_serialize_gid_refs(Manager *m, FILE *f); | |
425 | void manager_deserialize_gid_refs_one(Manager *m, const char *value); | |
426 | ||
f755e3b7 LP |
427 | const char *manager_state_to_string(ManagerState m) _const_; |
428 | ManagerState manager_state_from_string(const char *s) _pure_; | |
7d5ceb64 FB |
429 | |
430 | const char *manager_get_confirm_spawn(Manager *m); | |
b0eb2944 FB |
431 | bool manager_is_confirm_spawn_disabled(Manager *m); |
432 | void manager_disable_confirm_spawn(void); |