]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/service.c
exit-status: introduce common exit_status_set_test() call for testing exit status...
[thirdparty/systemd.git] / src / core / service.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
5cb5a6ff 2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
a7334b09
LP
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 16 Lesser General Public License for more details.
a7334b09 17
5430f7f2 18 You should have received a copy of the GNU Lesser General Public License
a7334b09
LP
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
5cb5a6ff 22#include <errno.h>
034c6ed7 23#include <signal.h>
2c4104f0 24#include <unistd.h>
5cb5a6ff 25
574634bc 26#include "async.h"
4b939747 27#include "manager.h"
87f0e418 28#include "unit.h"
5cb5a6ff
LP
29#include "service.h"
30#include "load-fragment.h"
31#include "load-dropin.h"
034c6ed7 32#include "log.h"
2c4104f0 33#include "strv.h"
9e2f7c11 34#include "unit-name.h"
41f9172f 35#include "unit-printf.h"
4139c1b2 36#include "dbus-service.h"
514f4ef5 37#include "special.h"
9a57c629 38#include "exit-status.h"
f6a6225e 39#include "def.h"
9eb977db 40#include "path-util.h"
f6a6225e 41#include "util.h"
7f110ff9 42#include "utf8.h"
4d1a6904 43#include "env-util.h"
a5c32cff 44#include "fileio.h"
718db961
LP
45#include "bus-error.h"
46#include "bus-util.h"
e44da745 47#include "bus-kernel.h"
6482f626 48#include "formats-util.h"
0b452006 49#include "process-util.h"
034c6ed7 50
acbb0225 51static const UnitActiveState state_translation_table[_SERVICE_STATE_MAX] = {
87f0e418
LP
52 [SERVICE_DEAD] = UNIT_INACTIVE,
53 [SERVICE_START_PRE] = UNIT_ACTIVATING,
54 [SERVICE_START] = UNIT_ACTIVATING,
55 [SERVICE_START_POST] = UNIT_ACTIVATING,
56 [SERVICE_RUNNING] = UNIT_ACTIVE,
80876c20 57 [SERVICE_EXITED] = UNIT_ACTIVE,
032ff4af 58 [SERVICE_RELOAD] = UNIT_RELOADING,
87f0e418 59 [SERVICE_STOP] = UNIT_DEACTIVATING,
db2cb23b 60 [SERVICE_STOP_SIGABRT] = UNIT_DEACTIVATING,
87f0e418
LP
61 [SERVICE_STOP_SIGTERM] = UNIT_DEACTIVATING,
62 [SERVICE_STOP_SIGKILL] = UNIT_DEACTIVATING,
63 [SERVICE_STOP_POST] = UNIT_DEACTIVATING,
64 [SERVICE_FINAL_SIGTERM] = UNIT_DEACTIVATING,
65 [SERVICE_FINAL_SIGKILL] = UNIT_DEACTIVATING,
fdf20a31 66 [SERVICE_FAILED] = UNIT_FAILED,
6124958c 67 [SERVICE_AUTO_RESTART] = UNIT_ACTIVATING
034c6ed7 68};
5cb5a6ff 69
e056b01d
LP
70/* For Type=idle we never want to delay any other jobs, hence we
71 * consider idle jobs active as soon as we start working on them */
72static const UnitActiveState state_translation_table_idle[_SERVICE_STATE_MAX] = {
73 [SERVICE_DEAD] = UNIT_INACTIVE,
74 [SERVICE_START_PRE] = UNIT_ACTIVE,
75 [SERVICE_START] = UNIT_ACTIVE,
76 [SERVICE_START_POST] = UNIT_ACTIVE,
77 [SERVICE_RUNNING] = UNIT_ACTIVE,
78 [SERVICE_EXITED] = UNIT_ACTIVE,
79 [SERVICE_RELOAD] = UNIT_RELOADING,
80 [SERVICE_STOP] = UNIT_DEACTIVATING,
db2cb23b 81 [SERVICE_STOP_SIGABRT] = UNIT_DEACTIVATING,
e056b01d
LP
82 [SERVICE_STOP_SIGTERM] = UNIT_DEACTIVATING,
83 [SERVICE_STOP_SIGKILL] = UNIT_DEACTIVATING,
84 [SERVICE_STOP_POST] = UNIT_DEACTIVATING,
85 [SERVICE_FINAL_SIGTERM] = UNIT_DEACTIVATING,
86 [SERVICE_FINAL_SIGKILL] = UNIT_DEACTIVATING,
87 [SERVICE_FAILED] = UNIT_FAILED,
88 [SERVICE_AUTO_RESTART] = UNIT_ACTIVATING
89};
90
718db961
LP
91static int service_dispatch_io(sd_event_source *source, int fd, uint32_t events, void *userdata);
92static int service_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata);
93static int service_dispatch_watchdog(sd_event_source *source, usec_t usec, void *userdata);
94
842129f5 95static void service_enter_signal(Service *s, ServiceState state, ServiceResult f);
308d72dc 96static void service_enter_reload_by_notify(Service *s);
842129f5 97
a16e1123
LP
98static void service_init(Unit *u) {
99 Service *s = SERVICE(u);
100
101 assert(u);
ac155bb8 102 assert(u->load_state == UNIT_STUB);
a16e1123 103
1f19a534
OS
104 s->timeout_start_usec = u->manager->default_timeout_start_usec;
105 s->timeout_stop_usec = u->manager->default_timeout_stop_usec;
106 s->restart_usec = u->manager->default_restart_usec;
0b86feac 107 s->type = _SERVICE_TYPE_INVALID;
a16e1123 108 s->socket_fd = -1;
e44da745 109 s->bus_endpoint_fd = -1;
3185a36b 110 s->guess_main_pid = true;
a16e1123 111
085afe36 112 RATELIMIT_INIT(s->start_limit, u->manager->default_start_limit_interval, u->manager->default_start_limit_burst);
a16e1123
LP
113
114 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
115}
116
5e94833f
LP
117static void service_unwatch_control_pid(Service *s) {
118 assert(s);
119
120 if (s->control_pid <= 0)
121 return;
122
123 unit_unwatch_pid(UNIT(s), s->control_pid);
124 s->control_pid = 0;
125}
126
127static void service_unwatch_main_pid(Service *s) {
128 assert(s);
129
130 if (s->main_pid <= 0)
131 return;
132
133 unit_unwatch_pid(UNIT(s), s->main_pid);
134 s->main_pid = 0;
135}
136
3e52541e
MS
137static void service_unwatch_pid_file(Service *s) {
138 if (!s->pid_file_pathspec)
139 return;
140
79008bdd 141 log_unit_debug(UNIT(s)->id, "Stopping watch for %s's PID file %s", UNIT(s)->id, s->pid_file_pathspec->path);
718db961 142 path_spec_unwatch(s->pid_file_pathspec);
3e52541e
MS
143 path_spec_done(s->pid_file_pathspec);
144 free(s->pid_file_pathspec);
145 s->pid_file_pathspec = NULL;
146}
147
5925dd3c 148static int service_set_main_pid(Service *s, pid_t pid) {
e55224ca
LP
149 pid_t ppid;
150
5925dd3c
LP
151 assert(s);
152
153 if (pid <= 1)
154 return -EINVAL;
155
156 if (pid == getpid())
157 return -EINVAL;
158
7400b9d2
LP
159 if (s->main_pid == pid && s->main_pid_known)
160 return 0;
161
162 if (s->main_pid != pid) {
163 service_unwatch_main_pid(s);
164 exec_status_start(&s->main_exec_status, pid);
165 }
41efeaec 166
6dfa5494
LP
167 s->main_pid = pid;
168 s->main_pid_known = true;
169
170 if (get_parent_of_pid(pid, &ppid) >= 0 && ppid != getpid()) {
79008bdd 171 log_unit_warning(UNIT(s)->id, "%s: Supervising process "PID_FMT" which is not our child. We'll most likely not notice when it exits.", UNIT(s)->id, pid);
6dfa5494
LP
172 s->main_pid_alien = true;
173 } else
174 s->main_pid_alien = false;
5925dd3c
LP
175
176 return 0;
177}
178
4f2d528d
LP
179static void service_close_socket_fd(Service *s) {
180 assert(s);
181
574634bc 182 s->socket_fd = asynchronous_close(s->socket_fd);
4f2d528d
LP
183}
184
6cf6bbc2
LP
185static void service_connection_unref(Service *s) {
186 assert(s);
187
9444b1f2 188 if (!UNIT_ISSET(s->accept_socket))
6cf6bbc2
LP
189 return;
190
57020a3a
LP
191 socket_connection_unref(SOCKET(UNIT_DEREF(s->accept_socket)));
192 unit_ref_unset(&s->accept_socket);
6cf6bbc2
LP
193}
194
a6927d7f
MO
195static void service_stop_watchdog(Service *s) {
196 assert(s);
197
718db961 198 s->watchdog_event_source = sd_event_source_unref(s->watchdog_event_source);
842129f5 199 s->watchdog_timestamp = DUAL_TIMESTAMP_NULL;
a6927d7f
MO
200}
201
842129f5 202static void service_start_watchdog(Service *s) {
bb242b7b
MO
203 int r;
204
205 assert(s);
206
842129f5 207 if (s->watchdog_usec <= 0)
bb242b7b
MO
208 return;
209
718db961
LP
210 if (s->watchdog_event_source) {
211 r = sd_event_source_set_time(s->watchdog_event_source, s->watchdog_timestamp.monotonic + s->watchdog_usec);
212 if (r < 0) {
31938a85 213 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to reset watchdog timer: %m", UNIT(s)->id);
718db961
LP
214 return;
215 }
216
842129f5 217 r = sd_event_source_set_enabled(s->watchdog_event_source, SD_EVENT_ONESHOT);
c4ef3317 218 } else {
6a0f1f6d
LP
219 r = sd_event_add_time(
220 UNIT(s)->manager->event,
221 &s->watchdog_event_source,
222 CLOCK_MONOTONIC,
223 s->watchdog_timestamp.monotonic + s->watchdog_usec, 0,
224 service_dispatch_watchdog, s);
c4ef3317 225 if (r < 0) {
31938a85 226 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to add watchdog timer: %m", UNIT(s)->id);
c4ef3317
LP
227 return;
228 }
229
230 /* Let's process everything else which might be a sign
231 * of living before we consider a service died. */
232 r = sd_event_source_set_priority(s->watchdog_event_source, SD_EVENT_PRIORITY_IDLE);
233 }
718db961 234
bb242b7b 235 if (r < 0)
31938a85 236 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to install watchdog timer: %m", UNIT(s)->id);
bb242b7b
MO
237}
238
a6927d7f
MO
239static void service_reset_watchdog(Service *s) {
240 assert(s);
241
242 dual_timestamp_get(&s->watchdog_timestamp);
842129f5 243 service_start_watchdog(s);
a6927d7f
MO
244}
245
a354329f
LP
246static void service_fd_store_unlink(ServiceFDStore *fs) {
247
248 if (!fs)
249 return;
250
251 if (fs->service) {
252 assert(fs->service->n_fd_store > 0);
253 LIST_REMOVE(fd_store, fs->service->fd_store, fs);
254 fs->service->n_fd_store--;
255 }
256
257 if (fs->event_source) {
258 sd_event_source_set_enabled(fs->event_source, SD_EVENT_OFF);
259 sd_event_source_unref(fs->event_source);
260 }
261
262 safe_close(fs->fd);
263 free(fs);
264}
265
266static void service_release_resources(Unit *u) {
267 Service *s = SERVICE(u);
268
269 assert(s);
270
271 if (!s->fd_store)
272 return;
273
274 log_debug("Releasing all resources for %s", u->id);
275
276 while (s->fd_store)
277 service_fd_store_unlink(s->fd_store);
278
279 assert(s->n_fd_store == 0);
280}
281
87f0e418
LP
282static void service_done(Unit *u) {
283 Service *s = SERVICE(u);
44d8db9e
LP
284
285 assert(s);
286
287 free(s->pid_file);
288 s->pid_file = NULL;
289
8c47c732
LP
290 free(s->status_text);
291 s->status_text = NULL;
292
efe6e7d3
MO
293 free(s->reboot_arg);
294 s->reboot_arg = NULL;
295
613b411c 296 s->exec_runtime = exec_runtime_unref(s->exec_runtime);
e537352b 297 exec_command_free_array(s->exec_command, _SERVICE_EXEC_COMMAND_MAX);
44d8db9e 298 s->control_command = NULL;
867b3b7d 299 s->main_command = NULL;
44d8db9e 300
37520c1b
LP
301 exit_status_set_free(&s->restart_prevent_status);
302 exit_status_set_free(&s->restart_force_status);
303 exit_status_set_free(&s->success_status);
96342de6 304
44d8db9e
LP
305 /* This will leak a process, but at least no memory or any of
306 * our resources */
5e94833f
LP
307 service_unwatch_main_pid(s);
308 service_unwatch_control_pid(s);
3e52541e 309 service_unwatch_pid_file(s);
44d8db9e 310
05e343b7 311 if (s->bus_name) {
ac155bb8 312 unit_unwatch_bus_name(u, s->bus_name);
05e343b7
LP
313 free(s->bus_name);
314 s->bus_name = NULL;
315 }
316
e44da745 317 s->bus_endpoint_fd = safe_close(s->bus_endpoint_fd);
4f2d528d 318 service_close_socket_fd(s);
6cf6bbc2 319 service_connection_unref(s);
4f2d528d 320
57020a3a 321 unit_ref_unset(&s->accept_socket);
f976f3f6 322
bb242b7b
MO
323 service_stop_watchdog(s);
324
718db961 325 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
a354329f
LP
326
327 service_release_resources(u);
718db961
LP
328}
329
2339fc93
LP
330static int on_fd_store_io(sd_event_source *e, int fd, uint32_t revents, void *userdata) {
331 ServiceFDStore *fs = userdata;
332
333 assert(e);
334 assert(fs);
335
336 /* If we get either EPOLLHUP or EPOLLERR, it's time to remove this entry from the fd store */
337 service_fd_store_unlink(fs);
338 return 0;
339}
340
341static int service_add_fd_store(Service *s, int fd) {
342 ServiceFDStore *fs;
343 int r;
344
345 assert(s);
346 assert(fd >= 0);
347
348 if (s->n_fd_store >= s->n_fd_store_max)
349 return 0;
350
351 LIST_FOREACH(fd_store, fs, s->fd_store) {
352 r = same_fd(fs->fd, fd);
353 if (r < 0)
354 return r;
355 if (r > 0) {
356 /* Already included */
357 safe_close(fd);
358 return 1;
359 }
360 }
361
362 fs = new0(ServiceFDStore, 1);
363 if (!fs)
364 return -ENOMEM;
365
366 fs->fd = fd;
367 fs->service = s;
368
369 r = sd_event_add_io(UNIT(s)->manager->event, &fs->event_source, fd, 0, on_fd_store_io, fs);
370 if (r < 0) {
371 free(fs);
372 return r;
373 }
374
375 LIST_PREPEND(fd_store, s->fd_store, fs);
376 s->n_fd_store++;
377
378 return 1;
379}
380
381static int service_add_fd_store_set(Service *s, FDSet *fds) {
382 int r;
383
384 assert(s);
385
386 if (fdset_size(fds) <= 0)
387 return 0;
388
389 while (s->n_fd_store < s->n_fd_store_max) {
390 _cleanup_close_ int fd = -1;
391
392 fd = fdset_steal_first(fds);
393 if (fd < 0)
394 break;
395
396 r = service_add_fd_store(s, fd);
397 if (r < 0)
398 return log_unit_error_errno(UNIT(s)->id, r, "%s: Couldn't add fd to fd store: %m", UNIT(s)->id);
399
400 if (r > 0) {
401 log_unit_debug(UNIT(s)->id, "%s: added fd to fd store.", UNIT(s)->id);
402 fd = -1;
403 }
404 }
405
406 if (fdset_size(fds) > 0)
407 log_unit_warning(UNIT(s)->id, "%s: tried to store more fds than FDStoreMax=%u allows, closing remaining.", UNIT(s)->id, s->n_fd_store_max);
408
409 return 0;
410}
411
718db961
LP
412static int service_arm_timer(Service *s, usec_t usec) {
413 int r;
414
415 assert(s);
416
718db961
LP
417 if (s->timer_event_source) {
418 r = sd_event_source_set_time(s->timer_event_source, now(CLOCK_MONOTONIC) + usec);
419 if (r < 0)
420 return r;
421
422 return sd_event_source_set_enabled(s->timer_event_source, SD_EVENT_ONESHOT);
423 }
424
6a0f1f6d
LP
425 return sd_event_add_time(
426 UNIT(s)->manager->event,
427 &s->timer_event_source,
428 CLOCK_MONOTONIC,
429 now(CLOCK_MONOTONIC) + usec, 0,
430 service_dispatch_timer, s);
44d8db9e
LP
431}
432
243b1432
LP
433static int service_verify(Service *s) {
434 assert(s);
435
1124fe6f 436 if (UNIT(s)->load_state != UNIT_LOADED)
243b1432
LP
437 return 0;
438
96fb8242 439 if (!s->exec_command[SERVICE_EXEC_START] && !s->exec_command[SERVICE_EXEC_STOP]) {
79008bdd 440 log_unit_error(UNIT(s)->id, "%s lacks both ExecStart= and ExecStop= setting. Refusing.", UNIT(s)->id);
243b1432
LP
441 return -EINVAL;
442 }
443
96fb8242 444 if (s->type != SERVICE_ONESHOT && !s->exec_command[SERVICE_EXEC_START]) {
79008bdd 445 log_unit_error(UNIT(s)->id, "%s has no ExecStart= setting, which is only allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
96fb8242
LP
446 return -EINVAL;
447 }
448
449 if (!s->remain_after_exit && !s->exec_command[SERVICE_EXEC_START]) {
79008bdd 450 log_unit_error(UNIT(s)->id, "%s has no ExecStart= setting, which is only allowed for RemainAfterExit=yes services. Refusing.", UNIT(s)->id);
96fb8242
LP
451 return -EINVAL;
452 }
453
454 if (s->type != SERVICE_ONESHOT && s->exec_command[SERVICE_EXEC_START]->command_next) {
79008bdd 455 log_unit_error(UNIT(s)->id, "%s has more than one ExecStart= setting, which is only allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
6cf6bbc2
LP
456 return -EINVAL;
457 }
458
b0693d30 459 if (s->type == SERVICE_ONESHOT && s->restart != SERVICE_RESTART_NO) {
79008bdd 460 log_unit_error(UNIT(s)->id, "%s has Restart= setting other than no, which isn't allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
37520c1b
LP
461 return -EINVAL;
462 }
463
55ebf98c 464 if (s->type == SERVICE_ONESHOT && !exit_status_set_is_empty(&s->restart_force_status)) {
79008bdd 465 log_unit_error(UNIT(s)->id, "%s has RestartForceStatus= set, which isn't allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
b0693d30
MW
466 return -EINVAL;
467 }
468
05e343b7 469 if (s->type == SERVICE_DBUS && !s->bus_name) {
79008bdd 470 log_unit_error(UNIT(s)->id, "%s is of type D-Bus but no D-Bus service name has been specified. Refusing.", UNIT(s)->id);
4d0e5dbd
LP
471 return -EINVAL;
472 }
473
7e2668c6 474 if (s->bus_name && s->type != SERVICE_DBUS)
79008bdd 475 log_unit_warning(UNIT(s)->id, "%s has a D-Bus service name specified, but is not of type dbus. Ignoring.", UNIT(s)->id);
7e2668c6 476
ebc2259d 477 if (s->exec_context.pam_name && !(s->kill_context.kill_mode == KILL_CONTROL_GROUP || s->kill_context.kill_mode == KILL_MIXED)) {
79008bdd 478 log_unit_error(UNIT(s)->id, "%s has PAM enabled. Kill mode must be set to 'control-group' or 'mixed'. Refusing.", UNIT(s)->id);
05e343b7
LP
479 return -EINVAL;
480 }
481
243b1432
LP
482 return 0;
483}
484
a40eb732
LP
485static int service_add_default_dependencies(Service *s) {
486 int r;
487
488 assert(s);
489
490 /* Add a number of automatic dependencies useful for the
491 * majority of services. */
492
493 /* First, pull in base system */
8bb2d17d 494 r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_BASIC_TARGET, NULL, true);
fccd44ec
KS
495 if (r < 0)
496 return r;
a40eb732
LP
497
498 /* Second, activate normal shutdown */
8545f7ce 499 return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
a40eb732
LP
500}
501
4dfc092a
LP
502static void service_fix_output(Service *s) {
503 assert(s);
504
505 /* If nothing has been explicitly configured, patch default
506 * output in. If input is socket/tty we avoid this however,
507 * since in that case we want output to default to the same
508 * place as we read input from. */
509
510 if (s->exec_context.std_error == EXEC_OUTPUT_INHERIT &&
511 s->exec_context.std_output == EXEC_OUTPUT_INHERIT &&
512 s->exec_context.std_input == EXEC_INPUT_NULL)
1124fe6f 513 s->exec_context.std_error = UNIT(s)->manager->default_std_error;
4dfc092a
LP
514
515 if (s->exec_context.std_output == EXEC_OUTPUT_INHERIT &&
516 s->exec_context.std_input == EXEC_INPUT_NULL)
1124fe6f 517 s->exec_context.std_output = UNIT(s)->manager->default_std_output;
4dfc092a
LP
518}
519
8545f7ce
LP
520static int service_add_extras(Service *s) {
521 int r;
522
523 assert(s);
524
525 if (s->type == _SERVICE_TYPE_INVALID) {
526 /* Figure out a type automatically */
527 if (s->bus_name)
528 s->type = SERVICE_DBUS;
529 else if (s->exec_command[SERVICE_EXEC_START])
530 s->type = SERVICE_SIMPLE;
531 else
532 s->type = SERVICE_ONESHOT;
533 }
534
535 /* Oneshot services have disabled start timeout by default */
536 if (s->type == SERVICE_ONESHOT && !s->start_timeout_defined)
537 s->timeout_start_usec = 0;
538
539 service_fix_output(s);
540
541 r = unit_patch_contexts(UNIT(s));
542 if (r < 0)
543 return r;
544
545 r = unit_add_exec_dependencies(UNIT(s), &s->exec_context);
546 if (r < 0)
547 return r;
548
549 r = unit_add_default_slice(UNIT(s), &s->cgroup_context);
550 if (r < 0)
551 return r;
552
553 if (s->type == SERVICE_NOTIFY && s->notify_access == NOTIFY_NONE)
554 s->notify_access = NOTIFY_MAIN;
555
556 if (s->watchdog_usec > 0 && s->notify_access == NOTIFY_NONE)
557 s->notify_access = NOTIFY_MAIN;
558
559 if (s->bus_name) {
6962fd3b 560#ifdef ENABLE_KDBUS
8545f7ce
LP
561 const char *n;
562
6962fd3b
MB
563 n = strjoina(s->bus_name, ".busname");
564 r = unit_add_dependency_by_name(UNIT(s), UNIT_AFTER, n, NULL, true);
8545f7ce
LP
565 if (r < 0)
566 return r;
6962fd3b 567#endif
8545f7ce 568
6962fd3b 569 r = unit_watch_bus_name(UNIT(s), s->bus_name);
8545f7ce
LP
570 if (r < 0)
571 return r;
572 }
573
574 if (UNIT(s)->default_dependencies) {
575 r = service_add_default_dependencies(s);
576 if (r < 0)
577 return r;
578 }
579
580 return 0;
581}
582
e537352b 583static int service_load(Unit *u) {
e537352b 584 Service *s = SERVICE(u);
8bb2d17d 585 int r;
e537352b
LP
586
587 assert(s);
1e2e8133 588
5cb5a6ff 589 /* Load a .service file */
c2756a68
LP
590 r = unit_load_fragment(u);
591 if (r < 0)
5cb5a6ff
LP
592 return r;
593
23a177ef 594 /* Still nothing found? Then let's give up */
ac155bb8 595 if (u->load_state == UNIT_STUB)
23a177ef 596 return -ENOENT;
034c6ed7 597
23a177ef 598 /* This is a new unit? Then let's add in some extras */
ac155bb8 599 if (u->load_state == UNIT_LOADED) {
c2756a68
LP
600
601 /* We were able to load something, then let's add in
602 * the dropin directories. */
603 r = unit_load_dropin(u);
604 if (r < 0)
605 return r;
606
8545f7ce
LP
607 /* This is a new unit? Then let's add in some
608 * extras */
609 r = service_add_extras(s);
598459ce
LP
610 if (r < 0)
611 return r;
8e274523
LP
612 }
613
243b1432 614 return service_verify(s);
034c6ed7
LP
615}
616
87f0e418 617static void service_dump(Unit *u, FILE *f, const char *prefix) {
5cb5a6ff 618 ServiceExecCommand c;
87f0e418 619 Service *s = SERVICE(u);
47be870b 620 const char *prefix2;
5cb5a6ff
LP
621
622 assert(s);
623
4c940960 624 prefix = strempty(prefix);
63c372cb 625 prefix2 = strjoina(prefix, "\t");
44d8db9e 626
5cb5a6ff 627 fprintf(f,
81a2b7ce 628 "%sService State: %s\n"
f42806df
LP
629 "%sResult: %s\n"
630 "%sReload Result: %s\n"
81a2b7ce 631 "%sPermissionsStartOnly: %s\n"
8e274523 632 "%sRootDirectoryStartOnly: %s\n"
02ee865a 633 "%sRemainAfterExit: %s\n"
3185a36b 634 "%sGuessMainPID: %s\n"
c952c6ec 635 "%sType: %s\n"
2cf3143a 636 "%sRestart: %s\n"
308d72dc
LP
637 "%sNotifyAccess: %s\n"
638 "%sNotifyState: %s\n",
81a2b7ce 639 prefix, service_state_to_string(s->state),
f42806df
LP
640 prefix, service_result_to_string(s->result),
641 prefix, service_result_to_string(s->reload_result),
81a2b7ce 642 prefix, yes_no(s->permissions_start_only),
8e274523 643 prefix, yes_no(s->root_directory_start_only),
02ee865a 644 prefix, yes_no(s->remain_after_exit),
3185a36b 645 prefix, yes_no(s->guess_main_pid),
c952c6ec 646 prefix, service_type_to_string(s->type),
2cf3143a 647 prefix, service_restart_to_string(s->restart),
308d72dc
LP
648 prefix, notify_access_to_string(s->notify_access),
649 prefix, notify_state_to_string(s->notify_state));
5cb5a6ff 650
70123e68
LP
651 if (s->control_pid > 0)
652 fprintf(f,
ccd06097
ZJS
653 "%sControl PID: "PID_FMT"\n",
654 prefix, s->control_pid);
70123e68
LP
655
656 if (s->main_pid > 0)
657 fprintf(f,
ccd06097 658 "%sMain PID: "PID_FMT"\n"
6dfa5494
LP
659 "%sMain PID Known: %s\n"
660 "%sMain PID Alien: %s\n",
ccd06097 661 prefix, s->main_pid,
6dfa5494
LP
662 prefix, yes_no(s->main_pid_known),
663 prefix, yes_no(s->main_pid_alien));
70123e68 664
034c6ed7
LP
665 if (s->pid_file)
666 fprintf(f,
667 "%sPIDFile: %s\n",
668 prefix, s->pid_file);
669
05e343b7
LP
670 if (s->bus_name)
671 fprintf(f,
672 "%sBusName: %s\n"
673 "%sBus Name Good: %s\n",
674 prefix, s->bus_name,
675 prefix, yes_no(s->bus_name_good));
676
4819ff03 677 kill_context_dump(&s->kill_context, f, prefix);
5cb5a6ff
LP
678 exec_context_dump(&s->exec_context, f, prefix);
679
e537352b 680 for (c = 0; c < _SERVICE_EXEC_COMMAND_MAX; c++) {
5cb5a6ff 681
44d8db9e
LP
682 if (!s->exec_command[c])
683 continue;
684
40d50879 685 fprintf(f, "%s-> %s:\n",
94f04347 686 prefix, service_exec_command_to_string(c));
44d8db9e
LP
687
688 exec_command_dump_list(s->exec_command[c], f, prefix2);
5cb5a6ff 689 }
44d8db9e 690
8c47c732
LP
691 if (s->status_text)
692 fprintf(f, "%sStatus Text: %s\n",
693 prefix, s->status_text);
a354329f
LP
694
695 if (s->n_fd_store_max > 0) {
696 fprintf(f,
697 "%sFile Descriptor Store Max: %u\n"
698 "%sFile Descriptor Store Current: %u\n",
699 prefix, s->n_fd_store_max,
700 prefix, s->n_fd_store);
701 }
5cb5a6ff
LP
702}
703
c5419d42 704static int service_load_pid_file(Service *s, bool may_warn) {
7fd1b19b 705 _cleanup_free_ char *k = NULL;
034c6ed7 706 int r;
5925dd3c 707 pid_t pid;
034c6ed7
LP
708
709 assert(s);
710
034c6ed7 711 if (!s->pid_file)
13230d5d 712 return -ENOENT;
034c6ed7 713
117dcc57
ZJS
714 r = read_one_line_file(s->pid_file, &k);
715 if (r < 0) {
c5419d42 716 if (may_warn)
79008bdd 717 log_unit_info(UNIT(s)->id, "PID file %s not readable (yet?) after %s.", s->pid_file, service_state_to_string(s->state));
034c6ed7 718 return r;
5375410b 719 }
034c6ed7 720
5925dd3c 721 r = parse_pid(k, &pid);
bc41f93e
ZJS
722 if (r < 0) {
723 if (may_warn)
31938a85 724 log_unit_info_errno(UNIT(s)->id, r, "Failed to read PID from file %s: %m", s->pid_file);
5925dd3c 725 return r;
bc41f93e 726 }
406eaf93 727
9f5650ae 728 if (!pid_is_alive(pid)) {
c5419d42 729 if (may_warn)
79008bdd 730 log_unit_info(UNIT(s)->id, "PID "PID_FMT" read from file %s does not exist or is a zombie.", pid, s->pid_file);
e10c9985
YS
731 return -ESRCH;
732 }
733
db01f8b3
MS
734 if (s->main_pid_known) {
735 if (pid == s->main_pid)
736 return 0;
737
79008bdd 738 log_unit_debug(UNIT(s)->id, "Main PID changing: "PID_FMT" -> "PID_FMT, s->main_pid, pid);
8bb2d17d 739
db01f8b3
MS
740 service_unwatch_main_pid(s);
741 s->main_pid_known = false;
3a111838 742 } else
79008bdd 743 log_unit_debug(UNIT(s)->id, "Main PID loaded: "PID_FMT, pid);
db01f8b3 744
117dcc57
ZJS
745 r = service_set_main_pid(s, pid);
746 if (r < 0)
16f6025e
LP
747 return r;
748
117dcc57 749 r = unit_watch_pid(UNIT(s), pid);
bc41f93e 750 if (r < 0) {
5925dd3c 751 /* FIXME: we need to do something here */
79008bdd 752 log_unit_warning(UNIT(s)->id, "Failed to watch PID "PID_FMT" from service %s", pid, UNIT(s)->id);
5925dd3c 753 return r;
bc41f93e 754 }
034c6ed7
LP
755
756 return 0;
757}
758
4fbf50b3
LP
759static int service_search_main_pid(Service *s) {
760 pid_t pid;
761 int r;
762
763 assert(s);
764
3185a36b
LP
765 /* If we know it anyway, don't ever fallback to unreliable
766 * heuristics */
4fbf50b3
LP
767 if (s->main_pid_known)
768 return 0;
769
3185a36b
LP
770 if (!s->guess_main_pid)
771 return 0;
772
4fbf50b3
LP
773 assert(s->main_pid <= 0);
774
4ad49000 775 pid = unit_search_main_pid(UNIT(s));
117dcc57 776 if (pid <= 0)
4fbf50b3
LP
777 return -ENOENT;
778
79008bdd 779 log_unit_debug(UNIT(s)->id, "Main PID guessed: "PID_FMT, pid);
117dcc57
ZJS
780 r = service_set_main_pid(s, pid);
781 if (r < 0)
4fbf50b3
LP
782 return r;
783
117dcc57 784 r = unit_watch_pid(UNIT(s), pid);
8bb2d17d 785 if (r < 0) {
4fbf50b3 786 /* FIXME: we need to do something here */
79008bdd 787 log_unit_warning(UNIT(s)->id, "Failed to watch PID "PID_FMT" from service %s", pid, UNIT(s)->id);
8bb2d17d
LP
788 return r;
789 }
790
791 return 0;
4fbf50b3
LP
792}
793
034c6ed7
LP
794static void service_set_state(Service *s, ServiceState state) {
795 ServiceState old_state;
e056b01d 796 const UnitActiveState *table;
842129f5 797
5cb5a6ff
LP
798 assert(s);
799
e056b01d
LP
800 table = s->type == SERVICE_IDLE ? state_translation_table_idle : state_translation_table;
801
034c6ed7 802 old_state = s->state;
5cb5a6ff 803 s->state = state;
034c6ed7 804
3a111838
MS
805 service_unwatch_pid_file(s);
806
842129f5
LP
807 if (!IN_SET(state,
808 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
809 SERVICE_RELOAD,
57614eb1 810 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
842129f5
LP
811 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL,
812 SERVICE_AUTO_RESTART))
718db961 813 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
034c6ed7 814
842129f5
LP
815 if (!IN_SET(state,
816 SERVICE_START, SERVICE_START_POST,
817 SERVICE_RUNNING, SERVICE_RELOAD,
57614eb1 818 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55 819 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
5e94833f 820 service_unwatch_main_pid(s);
867b3b7d
LP
821 s->main_command = NULL;
822 }
034c6ed7 823
842129f5
LP
824 if (!IN_SET(state,
825 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
826 SERVICE_RELOAD,
57614eb1 827 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
842129f5 828 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
5e94833f 829 service_unwatch_control_pid(s);
034c6ed7 830 s->control_command = NULL;
a16e1123 831 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
e537352b 832 }
034c6ed7 833
a911bb9a
LP
834 if (IN_SET(state, SERVICE_DEAD, SERVICE_FAILED, SERVICE_AUTO_RESTART))
835 unit_unwatch_all_pids(UNIT(s));
836
842129f5
LP
837 if (!IN_SET(state,
838 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
839 SERVICE_RUNNING, SERVICE_RELOAD,
57614eb1
LP
840 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
841 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL) &&
1124fe6f 842 !(state == SERVICE_DEAD && UNIT(s)->job)) {
4f2d528d 843 service_close_socket_fd(s);
6cf6bbc2
LP
844 service_connection_unref(s);
845 }
4f2d528d 846
7596e9e1 847 if (!IN_SET(state, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD))
a6927d7f
MO
848 service_stop_watchdog(s);
849
f6023656
LP
850 /* For the inactive states unit_notify() will trim the cgroup,
851 * but for exit we have to do that ourselves... */
1124fe6f 852 if (state == SERVICE_EXITED && UNIT(s)->manager->n_reloading <= 0)
b1491eba 853 unit_destroy_cgroup_if_empty(UNIT(s));
f6023656 854
9cd86184
OB
855 /* For remain_after_exit services, let's see if we can "release" the
856 * hold on the console, since unit_notify() only does that in case of
857 * change of state */
f49650ce
LP
858 if (state == SERVICE_EXITED &&
859 s->remain_after_exit &&
9cd86184 860 UNIT(s)->manager->n_on_console > 0) {
f49650ce
LP
861
862 ExecContext *ec;
863
864 ec = unit_get_exec_context(UNIT(s));
9cd86184
OB
865 if (ec && exec_context_may_touch_console(ec)) {
866 Manager *m = UNIT(s)->manager;
867
868 m->n_on_console --;
869 if (m->n_on_console == 0)
870 /* unset no_console_output flag, since the console is free */
871 m->no_console_output = false;
872 }
873 }
874
e537352b 875 if (old_state != state)
79008bdd 876 log_unit_debug(UNIT(s)->id, "%s changed %s -> %s", UNIT(s)->id, service_state_to_string(old_state), service_state_to_string(state));
acbb0225 877
e056b01d 878 unit_notify(UNIT(s), table[old_state], table[state], s->reload_result == SERVICE_SUCCESS);
f42806df 879 s->reload_result = SERVICE_SUCCESS;
034c6ed7
LP
880}
881
be847e82 882static int service_coldplug(Unit *u) {
a16e1123
LP
883 Service *s = SERVICE(u);
884 int r;
885
886 assert(s);
887 assert(s->state == SERVICE_DEAD);
888
889 if (s->deserialized_state != s->state) {
890
bf108e55
LP
891 if (IN_SET(s->deserialized_state,
892 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
893 SERVICE_RELOAD,
57614eb1 894 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55 895 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
92c1622e
LP
896
897 usec_t k;
6c12b52e 898
bf108e55 899 k = IN_SET(s->deserialized_state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST, SERVICE_RELOAD) ? s->timeout_start_usec : s->timeout_stop_usec;
e558336f 900
92c1622e
LP
901 /* For the start/stop timeouts 0 means off */
902 if (k > 0) {
903 r = service_arm_timer(s, k);
36697dc0 904 if (r < 0)
e558336f
LP
905 return r;
906 }
907 }
a16e1123 908
92c1622e
LP
909 if (s->deserialized_state == SERVICE_AUTO_RESTART) {
910
911 /* The restart timeouts 0 means immediately */
912 r = service_arm_timer(s, s->restart_usec);
913 if (r < 0)
914 return r;
915 }
916
9f5650ae 917 if (pid_is_unwaited(s->main_pid) &&
bf108e55
LP
918 ((s->deserialized_state == SERVICE_START && IN_SET(s->type, SERVICE_FORKING, SERVICE_DBUS, SERVICE_ONESHOT, SERVICE_NOTIFY)) ||
919 IN_SET(s->deserialized_state,
920 SERVICE_START, SERVICE_START_POST,
921 SERVICE_RUNNING, SERVICE_RELOAD,
57614eb1 922 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55
LP
923 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL))) {
924 r = unit_watch_pid(UNIT(s), s->main_pid);
925 if (r < 0)
926 return r;
927 }
a16e1123 928
9f5650ae 929 if (pid_is_unwaited(s->control_pid) &&
bf108e55
LP
930 IN_SET(s->deserialized_state,
931 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
932 SERVICE_RELOAD,
57614eb1 933 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55
LP
934 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
935 r = unit_watch_pid(UNIT(s), s->control_pid);
936 if (r < 0)
937 return r;
938 }
a16e1123 939
a911bb9a
LP
940 if (!IN_SET(s->deserialized_state, SERVICE_DEAD, SERVICE_FAILED, SERVICE_AUTO_RESTART))
941 unit_watch_all_pids(UNIT(s));
942
842129f5
LP
943 if (IN_SET(s->deserialized_state, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD))
944 service_start_watchdog(s);
bb242b7b 945
a16e1123
LP
946 service_set_state(s, s->deserialized_state);
947 }
92c1622e 948
a16e1123
LP
949 return 0;
950}
951
44d8db9e 952static int service_collect_fds(Service *s, int **fds, unsigned *n_fds) {
a354329f
LP
953 _cleanup_free_ int *rfds = NULL;
954 unsigned rn_fds = 0;
44d8db9e
LP
955 Iterator i;
956 int r;
57020a3a 957 Unit *u;
44d8db9e
LP
958
959 assert(s);
960 assert(fds);
961 assert(n_fds);
962
6cf6bbc2
LP
963 if (s->socket_fd >= 0)
964 return 0;
965
1124fe6f 966 SET_FOREACH(u, UNIT(s)->dependencies[UNIT_TRIGGERED_BY], i) {
44d8db9e
LP
967 int *cfds;
968 unsigned cn_fds;
57020a3a
LP
969 Socket *sock;
970
ac155bb8 971 if (u->type != UNIT_SOCKET)
57020a3a
LP
972 continue;
973
974 sock = SOCKET(u);
44d8db9e 975
117dcc57
ZJS
976 r = socket_collect_fds(sock, &cfds, &cn_fds);
977 if (r < 0)
a354329f 978 return r;
44d8db9e 979
a354329f
LP
980 if (cn_fds <= 0) {
981 free(cfds);
44d8db9e 982 continue;
a354329f 983 }
44d8db9e
LP
984
985 if (!rfds) {
986 rfds = cfds;
987 rn_fds = cn_fds;
988 } else {
989 int *t;
990
a354329f 991 t = realloc(rfds, (rn_fds + cn_fds) * sizeof(int));
117dcc57 992 if (!t) {
44d8db9e 993 free(cfds);
a354329f 994 return -ENOMEM;
44d8db9e
LP
995 }
996
a354329f
LP
997 memcpy(t + rn_fds, cfds, cn_fds * sizeof(int));
998 rfds = t;
999 rn_fds += cn_fds;
1000
44d8db9e
LP
1001 free(cfds);
1002
44d8db9e
LP
1003 }
1004 }
1005
a354329f
LP
1006 if (s->n_fd_store > 0) {
1007 ServiceFDStore *fs;
1008 int *t;
1009
1010 t = realloc(rfds, (rn_fds + s->n_fd_store) * sizeof(int));
1011 if (!t)
1012 return -ENOMEM;
1013
1014 rfds = t;
1015 LIST_FOREACH(fd_store, fs, s->fd_store)
1016 rfds[rn_fds++] = fs->fd;
1017 }
1018
44d8db9e
LP
1019 *fds = rfds;
1020 *n_fds = rn_fds;
3e33402a 1021
a354329f 1022 rfds = NULL;
44d8db9e 1023 return 0;
44d8db9e
LP
1024}
1025
81a2b7ce
LP
1026static int service_spawn(
1027 Service *s,
1028 ExecCommand *c,
21b2ce39 1029 usec_t timeout,
81a2b7ce
LP
1030 bool pass_fds,
1031 bool apply_permissions,
1032 bool apply_chroot,
1e3ad081 1033 bool apply_tty_stdin,
ecedd90f 1034 bool is_control,
81a2b7ce
LP
1035 pid_t *_pid) {
1036
034c6ed7
LP
1037 pid_t pid;
1038 int r;
117dcc57 1039 int *fds = NULL;
7fd1b19b 1040 _cleanup_free_ int *fdsbuf = NULL;
2105e76a 1041 unsigned n_fds = 0, n_env = 0;
e44da745 1042 _cleanup_free_ char *bus_endpoint_path = NULL;
7fd1b19b 1043 _cleanup_strv_free_ char
117dcc57 1044 **argv = NULL, **final_env = NULL, **our_env = NULL;
4ad49000 1045 const char *path;
9fa95f85
DM
1046 ExecParameters exec_params = {
1047 .apply_permissions = apply_permissions,
1048 .apply_chroot = apply_chroot,
1049 .apply_tty_stdin = apply_tty_stdin,
e44da745 1050 .bus_endpoint_fd = -1,
16115b0a 1051 .selinux_context_net = s->socket_fd_selinux_context_net
9fa95f85 1052 };
034c6ed7
LP
1053
1054 assert(s);
1055 assert(c);
1056 assert(_pid);
1057
5ad096b3
LP
1058 (void) unit_realize_cgroup(UNIT(s));
1059 if (s->reset_cpu_usage) {
1060 (void) unit_reset_cpu_usage(UNIT(s));
1061 s->reset_cpu_usage = false;
1062 }
4ad49000 1063
613b411c
LP
1064 r = unit_setup_exec_runtime(UNIT(s));
1065 if (r < 0)
1066 goto fail;
1067
6cf6bbc2
LP
1068 if (pass_fds ||
1069 s->exec_context.std_input == EXEC_INPUT_SOCKET ||
1070 s->exec_context.std_output == EXEC_OUTPUT_SOCKET ||
1071 s->exec_context.std_error == EXEC_OUTPUT_SOCKET) {
1072
4f2d528d
LP
1073 if (s->socket_fd >= 0) {
1074 fds = &s->socket_fd;
1075 n_fds = 1;
6cf6bbc2 1076 } else {
117dcc57
ZJS
1077 r = service_collect_fds(s, &fdsbuf, &n_fds);
1078 if (r < 0)
6cf6bbc2
LP
1079 goto fail;
1080
1081 fds = fdsbuf;
1082 }
4f2d528d 1083 }
44d8db9e 1084
21b2ce39
LP
1085 if (timeout > 0) {
1086 r = service_arm_timer(s, timeout);
92c1622e
LP
1087 if (r < 0)
1088 goto fail;
1089 } else
1090 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
034c6ed7 1091
19f6d710
LP
1092 r = unit_full_printf_strv(UNIT(s), c->argv, &argv);
1093 if (r < 0)
9e2f7c11 1094 goto fail;
9e2f7c11 1095
3b1c5241 1096 our_env = new0(char*, 6);
97ae63e2 1097 if (!our_env) {
2105e76a
LP
1098 r = -ENOMEM;
1099 goto fail;
1100 }
c952c6ec 1101
a158dbf1 1102 if (is_control ? s->notify_access == NOTIFY_ALL : s->notify_access != NOTIFY_NONE)
1124fe6f 1103 if (asprintf(our_env + n_env++, "NOTIFY_SOCKET=%s", UNIT(s)->manager->notify_socket) < 0) {
c952c6ec
LP
1104 r = -ENOMEM;
1105 goto fail;
1106 }
1107
2105e76a 1108 if (s->main_pid > 0)
ccd06097 1109 if (asprintf(our_env + n_env++, "MAINPID="PID_FMT, s->main_pid) < 0) {
c952c6ec
LP
1110 r = -ENOMEM;
1111 goto fail;
1112 }
2105e76a 1113
4ad49000 1114 if (UNIT(s)->manager->running_as != SYSTEMD_SYSTEM)
ccd06097 1115 if (asprintf(our_env + n_env++, "MANAGERPID="PID_FMT, getpid()) < 0) {
97ae63e2
LP
1116 r = -ENOMEM;
1117 goto fail;
1118 }
1119
3b1c5241
SL
1120 if (UNIT_DEREF(s->accept_socket)) {
1121 union sockaddr_union sa;
1122 socklen_t salen = sizeof(sa);
1123
1124 r = getpeername(s->socket_fd, &sa.sa, &salen);
1125 if (r < 0) {
1126 r = -errno;
1127 goto fail;
1128 }
1129
1130 if (IN_SET(sa.sa.sa_family, AF_INET, AF_INET6)) {
1131 _cleanup_free_ char *addr = NULL;
1132 char *t;
1133 int port;
1134
1135 r = sockaddr_pretty(&sa.sa, salen, true, false, &addr);
1136 if (r < 0)
1137 goto fail;
1138
1139 t = strappend("REMOTE_ADDR=", addr);
1140 if (!t) {
1141 r = -ENOMEM;
1142 goto fail;
1143 }
1144 our_env[n_env++] = t;
1145
1146 port = sockaddr_port(&sa.sa);
1147 if (port < 0) {
1148 r = port;
1149 goto fail;
1150 }
1151
1152 if (asprintf(&t, "REMOTE_PORT=%u", port) < 0) {
1153 r = -ENOMEM;
1154 goto fail;
1155 }
1156 our_env[n_env++] = t;
1157 }
1158 }
1159
97ae63e2
LP
1160 final_env = strv_env_merge(2, UNIT(s)->manager->environment, our_env, NULL);
1161 if (!final_env) {
2105e76a
LP
1162 r = -ENOMEM;
1163 goto fail;
1164 }
c952c6ec 1165
4ad49000 1166 if (is_control && UNIT(s)->cgroup_path) {
63c372cb 1167 path = strjoina(UNIT(s)->cgroup_path, "/control");
4ad49000
LP
1168 cg_create(SYSTEMD_CGROUP_CONTROLLER, path);
1169 } else
1170 path = UNIT(s)->cgroup_path;
1171
e44da745
DM
1172#ifdef ENABLE_KDBUS
1173 if (s->exec_context.bus_endpoint) {
1174 r = bus_kernel_create_endpoint(UNIT(s)->manager->running_as == SYSTEMD_SYSTEM ? "system" : "user",
1175 UNIT(s)->id, &bus_endpoint_path);
1176 if (r < 0)
1177 goto fail;
1178
1179 /* Pass the fd to the exec_params so that the child process can upload the policy.
1180 * Keep a reference to the fd in the service, so the endpoint is kept alive as long
1181 * as the service is running. */
1182 exec_params.bus_endpoint_fd = s->bus_endpoint_fd = r;
1183 }
1184#endif
1185
9fa95f85
DM
1186 exec_params.argv = argv;
1187 exec_params.fds = fds;
1188 exec_params.n_fds = n_fds;
1189 exec_params.environment = final_env;
1190 exec_params.confirm_spawn = UNIT(s)->manager->confirm_spawn;
1191 exec_params.cgroup_supported = UNIT(s)->manager->cgroup_supported;
1192 exec_params.cgroup_path = path;
a931ad47 1193 exec_params.cgroup_delegate = s->cgroup_context.delegate;
9fa95f85
DM
1194 exec_params.runtime_prefix = manager_get_runtime_prefix(UNIT(s)->manager);
1195 exec_params.unit_id = UNIT(s)->id;
1196 exec_params.watchdog_usec = s->watchdog_usec;
e44da745 1197 exec_params.bus_endpoint_path = bus_endpoint_path;
9fa95f85
DM
1198 if (s->type == SERVICE_IDLE)
1199 exec_params.idle_pipe = UNIT(s)->manager->idle_pipe;
1200
9e2f7c11 1201 r = exec_spawn(c,
9e2f7c11 1202 &s->exec_context,
9fa95f85 1203 &exec_params,
613b411c 1204 s->exec_runtime,
9e2f7c11 1205 &pid);
9e2f7c11 1206 if (r < 0)
034c6ed7
LP
1207 goto fail;
1208
117dcc57
ZJS
1209 r = unit_watch_pid(UNIT(s), pid);
1210 if (r < 0)
034c6ed7
LP
1211 /* FIXME: we need to do something here */
1212 goto fail;
1213
1214 *_pid = pid;
1215
5cb5a6ff 1216 return 0;
034c6ed7
LP
1217
1218fail:
1219 if (timeout)
718db961 1220 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
034c6ed7
LP
1221
1222 return r;
1223}
1224
80876c20
LP
1225static int main_pid_good(Service *s) {
1226 assert(s);
1227
1228 /* Returns 0 if the pid is dead, 1 if it is good, -1 if we
1229 * don't know */
1230
1231 /* If we know the pid file, then lets just check if it is
1232 * still valid */
6dfa5494
LP
1233 if (s->main_pid_known) {
1234
1235 /* If it's an alien child let's check if it is still
1236 * alive ... */
62220cf7 1237 if (s->main_pid_alien && s->main_pid > 0)
9f5650ae 1238 return pid_is_alive(s->main_pid);
6dfa5494
LP
1239
1240 /* .. otherwise assume we'll get a SIGCHLD for it,
1241 * which we really should wait for to collect exit
1242 * status and code */
80876c20 1243 return s->main_pid > 0;
6dfa5494 1244 }
80876c20
LP
1245
1246 /* We don't know the pid */
1247 return -EAGAIN;
1248}
1249
44a6b1b6 1250_pure_ static int control_pid_good(Service *s) {
80876c20
LP
1251 assert(s);
1252
1253 return s->control_pid > 0;
1254}
1255
1256static int cgroup_good(Service *s) {
1257 int r;
1258
1259 assert(s);
1260
4ad49000
LP
1261 if (!UNIT(s)->cgroup_path)
1262 return 0;
1263
1264 r = cg_is_empty_recursive(SYSTEMD_CGROUP_CONTROLLER, UNIT(s)->cgroup_path, true);
117dcc57 1265 if (r < 0)
80876c20
LP
1266 return r;
1267
1268 return !r;
1269}
1270
f42806df 1271static void service_enter_dead(Service *s, ServiceResult f, bool allow_restart) {
034c6ed7
LP
1272 int r;
1273 assert(s);
1274
f42806df
LP
1275 if (f != SERVICE_SUCCESS)
1276 s->result = f;
034c6ed7 1277
0c7f15b3
MS
1278 service_set_state(s, s->result != SERVICE_SUCCESS ? SERVICE_FAILED : SERVICE_DEAD);
1279
2928b0a8 1280 if (s->result != SERVICE_SUCCESS) {
79008bdd 1281 log_unit_warning(UNIT(s)->id, "%s failed.", UNIT(s)->id);
2928b0a8
LP
1282 failure_action(UNIT(s)->manager, s->failure_action, s->reboot_arg);
1283 }
93ae25e6 1284
034c6ed7 1285 if (allow_restart &&
47342320 1286 !s->forbid_restart &&
034c6ed7 1287 (s->restart == SERVICE_RESTART_ALWAYS ||
f42806df
LP
1288 (s->restart == SERVICE_RESTART_ON_SUCCESS && s->result == SERVICE_SUCCESS) ||
1289 (s->restart == SERVICE_RESTART_ON_FAILURE && s->result != SERVICE_SUCCESS) ||
6cfe2fde 1290 (s->restart == SERVICE_RESTART_ON_ABNORMAL && !IN_SET(s->result, SERVICE_SUCCESS, SERVICE_FAILURE_EXIT_CODE)) ||
dc99a976 1291 (s->restart == SERVICE_RESTART_ON_WATCHDOG && s->result == SERVICE_FAILURE_WATCHDOG) ||
37520c1b 1292 (s->restart == SERVICE_RESTART_ON_ABORT && IN_SET(s->result, SERVICE_FAILURE_SIGNAL, SERVICE_FAILURE_CORE_DUMP)) ||
597466f4
LP
1293 exit_status_set_test(&s->restart_force_status, s->main_exec_status.code, s->main_exec_status.status)) &&
1294 !exit_status_set_test(&s->restart_prevent_status, s->main_exec_status.code, s->main_exec_status.status)) {
034c6ed7 1295
718db961 1296 r = service_arm_timer(s, s->restart_usec);
f42806df 1297 if (r < 0)
034c6ed7
LP
1298 goto fail;
1299
1300 service_set_state(s, SERVICE_AUTO_RESTART);
0c7f15b3 1301 }
034c6ed7 1302
47342320
LP
1303 s->forbid_restart = false;
1304
e66cf1a3 1305 /* We want fresh tmpdirs in case service is started again immediately */
613b411c
LP
1306 exec_runtime_destroy(s->exec_runtime);
1307 s->exec_runtime = exec_runtime_unref(s->exec_runtime);
c17ec25e 1308
e66cf1a3
LP
1309 /* Also, remove the runtime directory in */
1310 exec_context_destroy_runtime_directory(&s->exec_context, manager_get_runtime_prefix(UNIT(s)->manager));
1311
9285c9ff
LN
1312 /* Try to delete the pid file. At this point it will be
1313 * out-of-date, and some software might be confused by it, so
1314 * let's remove it. */
1315 if (s->pid_file)
1316 unlink_noerrno(s->pid_file);
1317
034c6ed7
LP
1318 return;
1319
1320fail:
31938a85 1321 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run install restart timer: %m", UNIT(s)->id);
f42806df 1322 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, false);
034c6ed7
LP
1323}
1324
f42806df 1325static void service_enter_stop_post(Service *s, ServiceResult f) {
034c6ed7
LP
1326 int r;
1327 assert(s);
1328
f42806df
LP
1329 if (f != SERVICE_SUCCESS)
1330 s->result = f;
034c6ed7 1331
5e94833f 1332 service_unwatch_control_pid(s);
a911bb9a 1333 unit_watch_all_pids(UNIT(s));
5e94833f 1334
117dcc57
ZJS
1335 s->control_command = s->exec_command[SERVICE_EXEC_STOP_POST];
1336 if (s->control_command) {
867b3b7d
LP
1337 s->control_command_id = SERVICE_EXEC_STOP_POST;
1338
ecedd90f
LP
1339 r = service_spawn(s,
1340 s->control_command,
21b2ce39 1341 s->timeout_stop_usec,
ecedd90f
LP
1342 false,
1343 !s->permissions_start_only,
1344 !s->root_directory_start_only,
1345 true,
ecedd90f
LP
1346 true,
1347 &s->control_pid);
1348 if (r < 0)
034c6ed7
LP
1349 goto fail;
1350
80876c20
LP
1351 service_set_state(s, SERVICE_STOP_POST);
1352 } else
ac84d1fb 1353 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_SUCCESS);
034c6ed7
LP
1354
1355 return;
1356
1357fail:
31938a85 1358 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'stop-post' task: %m", UNIT(s)->id);
f42806df 1359 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1360}
1361
4940c0b0
LP
1362static int state_to_kill_operation(ServiceState state) {
1363 switch (state) {
1364
1365 case SERVICE_STOP_SIGABRT:
1366 return KILL_ABORT;
1367
1368 case SERVICE_STOP_SIGTERM:
1369 case SERVICE_FINAL_SIGTERM:
1370 return KILL_TERMINATE;
1371
1372 case SERVICE_STOP_SIGKILL:
1373 case SERVICE_FINAL_SIGKILL:
1374 return KILL_KILL;
1375
1376 default:
1377 return _KILL_OPERATION_INVALID;
1378 }
1379}
1380
f42806df 1381static void service_enter_signal(Service *s, ServiceState state, ServiceResult f) {
034c6ed7 1382 int r;
034c6ed7
LP
1383
1384 assert(s);
1385
f42806df
LP
1386 if (f != SERVICE_SUCCESS)
1387 s->result = f;
034c6ed7 1388
a911bb9a
LP
1389 unit_watch_all_pids(UNIT(s));
1390
cd2086fe
LP
1391 r = unit_kill_context(
1392 UNIT(s),
1393 &s->kill_context,
4940c0b0 1394 state_to_kill_operation(state),
cd2086fe
LP
1395 s->main_pid,
1396 s->control_pid,
1397 s->main_pid_alien);
ac84d1fb 1398
cd2086fe
LP
1399 if (r < 0)
1400 goto fail;
034c6ed7 1401
cd2086fe 1402 if (r > 0) {
d568a335 1403 if (s->timeout_stop_usec > 0) {
718db961 1404 r = service_arm_timer(s, s->timeout_stop_usec);
d568a335 1405 if (r < 0)
e558336f 1406 goto fail;
d568a335 1407 }
d6ea93e3 1408
80876c20 1409 service_set_state(s, state);
1db0db4b 1410 } else if (IN_SET(state, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM) && s->kill_context.send_sigkill)
ac84d1fb 1411 service_enter_signal(s, SERVICE_STOP_SIGKILL, SERVICE_SUCCESS);
1db0db4b 1412 else if (IN_SET(state, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL))
f42806df 1413 service_enter_stop_post(s, SERVICE_SUCCESS);
1db0db4b 1414 else if (state == SERVICE_FINAL_SIGTERM && s->kill_context.send_sigkill)
ac84d1fb 1415 service_enter_signal(s, SERVICE_FINAL_SIGKILL, SERVICE_SUCCESS);
80876c20 1416 else
f42806df 1417 service_enter_dead(s, SERVICE_SUCCESS, true);
034c6ed7
LP
1418
1419 return;
1420
1421fail:
31938a85 1422 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to kill processes: %m", UNIT(s)->id);
034c6ed7 1423
a00973af 1424 if (IN_SET(state, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL))
f42806df 1425 service_enter_stop_post(s, SERVICE_FAILURE_RESOURCES);
034c6ed7 1426 else
f42806df 1427 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, true);
034c6ed7
LP
1428}
1429
308d72dc
LP
1430static void service_enter_stop_by_notify(Service *s) {
1431 assert(s);
1432
1433 unit_watch_all_pids(UNIT(s));
1434
1435 if (s->timeout_stop_usec > 0)
1436 service_arm_timer(s, s->timeout_stop_usec);
1437
6041a7ee
MS
1438 /* The service told us it's stopping, so it's as if we SIGTERM'd it. */
1439 service_set_state(s, SERVICE_STOP_SIGTERM);
308d72dc
LP
1440}
1441
f42806df 1442static void service_enter_stop(Service *s, ServiceResult f) {
034c6ed7 1443 int r;
5925dd3c 1444
034c6ed7
LP
1445 assert(s);
1446
f42806df
LP
1447 if (f != SERVICE_SUCCESS)
1448 s->result = f;
034c6ed7 1449
5e94833f 1450 service_unwatch_control_pid(s);
a911bb9a 1451 unit_watch_all_pids(UNIT(s));
5e94833f 1452
117dcc57
ZJS
1453 s->control_command = s->exec_command[SERVICE_EXEC_STOP];
1454 if (s->control_command) {
867b3b7d
LP
1455 s->control_command_id = SERVICE_EXEC_STOP;
1456
ecedd90f
LP
1457 r = service_spawn(s,
1458 s->control_command,
21b2ce39 1459 s->timeout_stop_usec,
ecedd90f
LP
1460 false,
1461 !s->permissions_start_only,
1462 !s->root_directory_start_only,
1463 false,
ecedd90f
LP
1464 true,
1465 &s->control_pid);
1466 if (r < 0)
034c6ed7
LP
1467 goto fail;
1468
80876c20
LP
1469 service_set_state(s, SERVICE_STOP);
1470 } else
f42806df 1471 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_SUCCESS);
034c6ed7
LP
1472
1473 return;
1474
1475fail:
31938a85 1476 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'stop' task: %m", UNIT(s)->id);
f42806df 1477 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1478}
1479
f42806df 1480static void service_enter_running(Service *s, ServiceResult f) {
4eab639f 1481 int main_pid_ok, cgroup_ok;
80876c20
LP
1482 assert(s);
1483
f42806df
LP
1484 if (f != SERVICE_SUCCESS)
1485 s->result = f;
80876c20 1486
4eab639f
LP
1487 main_pid_ok = main_pid_good(s);
1488 cgroup_ok = cgroup_good(s);
1489
1490 if ((main_pid_ok > 0 || (main_pid_ok < 0 && cgroup_ok != 0)) &&
308d72dc
LP
1491 (s->bus_name_good || s->type != SERVICE_DBUS)) {
1492
1493 /* If there are any queued up sd_notify()
1494 * notifications, process them now */
1495 if (s->notify_state == NOTIFY_RELOADING)
1496 service_enter_reload_by_notify(s);
1497 else if (s->notify_state == NOTIFY_STOPPING)
1498 service_enter_stop_by_notify(s);
1499 else
1500 service_set_state(s, SERVICE_RUNNING);
1501
1502 } else if (s->remain_after_exit)
80876c20
LP
1503 service_set_state(s, SERVICE_EXITED);
1504 else
f42806df 1505 service_enter_stop(s, SERVICE_SUCCESS);
80876c20
LP
1506}
1507
034c6ed7
LP
1508static void service_enter_start_post(Service *s) {
1509 int r;
1510 assert(s);
1511
5e94833f 1512 service_unwatch_control_pid(s);
842129f5 1513 service_reset_watchdog(s);
bb242b7b 1514
117dcc57
ZJS
1515 s->control_command = s->exec_command[SERVICE_EXEC_START_POST];
1516 if (s->control_command) {
867b3b7d
LP
1517 s->control_command_id = SERVICE_EXEC_START_POST;
1518
ecedd90f
LP
1519 r = service_spawn(s,
1520 s->control_command,
21b2ce39 1521 s->timeout_start_usec,
ecedd90f
LP
1522 false,
1523 !s->permissions_start_only,
1524 !s->root_directory_start_only,
1525 false,
ecedd90f
LP
1526 true,
1527 &s->control_pid);
1528 if (r < 0)
034c6ed7
LP
1529 goto fail;
1530
80876c20
LP
1531 service_set_state(s, SERVICE_START_POST);
1532 } else
f42806df 1533 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
1534
1535 return;
1536
1537fail:
31938a85 1538 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'start-post' task: %m", UNIT(s)->id);
f42806df 1539 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1540}
1541
4ad49000
LP
1542static void service_kill_control_processes(Service *s) {
1543 char *p;
1544
1545 if (!UNIT(s)->cgroup_path)
1546 return;
1547
63c372cb 1548 p = strjoina(UNIT(s)->cgroup_path, "/control");
4ad49000
LP
1549 cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, p, SIGKILL, true, true, true, NULL);
1550}
1551
034c6ed7 1552static void service_enter_start(Service *s) {
4ad49000 1553 ExecCommand *c;
034c6ed7
LP
1554 pid_t pid;
1555 int r;
1556
1557 assert(s);
1558
41efeaec
LP
1559 service_unwatch_control_pid(s);
1560 service_unwatch_main_pid(s);
80876c20 1561
8f53a7b8
LP
1562 /* We want to ensure that nobody leaks processes from
1563 * START_PRE here, so let's go on a killing spree, People
1564 * should not spawn long running processes from START_PRE. */
4ad49000 1565 service_kill_control_processes(s);
8f53a7b8 1566
867b3b7d
LP
1567 if (s->type == SERVICE_FORKING) {
1568 s->control_command_id = SERVICE_EXEC_START;
1569 c = s->control_command = s->exec_command[SERVICE_EXEC_START];
1570
1571 s->main_command = NULL;
1572 } else {
1573 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
1574 s->control_command = NULL;
1575
1576 c = s->main_command = s->exec_command[SERVICE_EXEC_START];
1577 }
34e9ba66 1578
96fb8242
LP
1579 if (!c) {
1580 assert(s->type == SERVICE_ONESHOT);
1581 service_enter_start_post(s);
1582 return;
1583 }
1584
ecedd90f
LP
1585 r = service_spawn(s,
1586 c,
21b2ce39 1587 IN_SET(s->type, SERVICE_FORKING, SERVICE_DBUS, SERVICE_NOTIFY, SERVICE_ONESHOT) ? s->timeout_start_usec : 0,
ecedd90f
LP
1588 true,
1589 true,
1590 true,
1591 true,
ecedd90f
LP
1592 false,
1593 &pid);
1594 if (r < 0)
034c6ed7
LP
1595 goto fail;
1596
f2b68789 1597 if (s->type == SERVICE_SIMPLE || s->type == SERVICE_IDLE) {
034c6ed7
LP
1598 /* For simple services we immediately start
1599 * the START_POST binaries. */
1600
5925dd3c 1601 service_set_main_pid(s, pid);
034c6ed7
LP
1602 service_enter_start_post(s);
1603
1604 } else if (s->type == SERVICE_FORKING) {
1605
1606 /* For forking services we wait until the start
1607 * process exited. */
1608
e55224ca 1609 s->control_pid = pid;
80876c20
LP
1610 service_set_state(s, SERVICE_START);
1611
34e9ba66 1612 } else if (s->type == SERVICE_ONESHOT ||
8c47c732
LP
1613 s->type == SERVICE_DBUS ||
1614 s->type == SERVICE_NOTIFY) {
7d55e835 1615
34e9ba66 1616 /* For oneshot services we wait until the start
7d55e835
LP
1617 * process exited, too, but it is our main process. */
1618
05e343b7 1619 /* For D-Bus services we know the main pid right away,
8c47c732
LP
1620 * but wait for the bus name to appear on the
1621 * bus. Notify services are similar. */
05e343b7 1622
5925dd3c 1623 service_set_main_pid(s, pid);
80876c20 1624 service_set_state(s, SERVICE_START);
034c6ed7
LP
1625 } else
1626 assert_not_reached("Unknown service type");
1627
1628 return;
1629
1630fail:
31938a85 1631 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'start' task: %m", UNIT(s)->id);
f42806df 1632 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1633}
1634
1635static void service_enter_start_pre(Service *s) {
1636 int r;
1637
1638 assert(s);
1639
5e94833f
LP
1640 service_unwatch_control_pid(s);
1641
117dcc57
ZJS
1642 s->control_command = s->exec_command[SERVICE_EXEC_START_PRE];
1643 if (s->control_command) {
8f53a7b8
LP
1644 /* Before we start anything, let's clear up what might
1645 * be left from previous runs. */
4ad49000 1646 service_kill_control_processes(s);
8f53a7b8 1647
867b3b7d
LP
1648 s->control_command_id = SERVICE_EXEC_START_PRE;
1649
ecedd90f
LP
1650 r = service_spawn(s,
1651 s->control_command,
21b2ce39 1652 s->timeout_start_usec,
ecedd90f
LP
1653 false,
1654 !s->permissions_start_only,
1655 !s->root_directory_start_only,
1656 true,
ecedd90f
LP
1657 true,
1658 &s->control_pid);
1659 if (r < 0)
034c6ed7
LP
1660 goto fail;
1661
80876c20
LP
1662 service_set_state(s, SERVICE_START_PRE);
1663 } else
034c6ed7
LP
1664 service_enter_start(s);
1665
1666 return;
1667
1668fail:
31938a85 1669 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'start-pre' task: %m", UNIT(s)->id);
f42806df 1670 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, true);
034c6ed7
LP
1671}
1672
1673static void service_enter_restart(Service *s) {
718db961 1674 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
034c6ed7 1675 int r;
398ef8ba 1676
034c6ed7
LP
1677 assert(s);
1678
a8bb2e65
LP
1679 if (UNIT(s)->job && UNIT(s)->job->type == JOB_STOP) {
1680 /* Don't restart things if we are going down anyway */
79008bdd 1681 log_unit_info(UNIT(s)->id, "Stop job pending for unit, delaying automatic restart.");
2edfa366 1682
718db961 1683 r = service_arm_timer(s, s->restart_usec);
a8bb2e65 1684 if (r < 0)
2edfa366 1685 goto fail;
feae8adb
DW
1686
1687 return;
2edfa366
LP
1688 }
1689
48bb5876
DW
1690 /* Any units that are bound to this service must also be
1691 * restarted. We use JOB_RESTART (instead of the more obvious
1692 * JOB_START) here so that those dependency jobs will be added
1693 * as well. */
1694 r = manager_add_job(UNIT(s)->manager, JOB_RESTART, UNIT(s), JOB_FAIL, false, &error, NULL);
1695 if (r < 0)
034c6ed7
LP
1696 goto fail;
1697
a8bb2e65
LP
1698 /* Note that we stay in the SERVICE_AUTO_RESTART state here,
1699 * it will be canceled as part of the service_stop() call that
1700 * is executed as part of JOB_RESTART. */
1701
79008bdd 1702 log_unit_debug(UNIT(s)->id, "%s scheduled restart job.", UNIT(s)->id);
034c6ed7
LP
1703 return;
1704
1705fail:
79008bdd 1706 log_unit_warning(UNIT(s)->id, "%s failed to schedule restart job: %s", UNIT(s)->id, bus_error_message(&error, -r));
f42806df 1707 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, false);
034c6ed7
LP
1708}
1709
308d72dc
LP
1710static void service_enter_reload_by_notify(Service *s) {
1711 assert(s);
1712
1713 if (s->timeout_start_usec > 0)
1714 service_arm_timer(s, s->timeout_start_usec);
1715
1716 service_set_state(s, SERVICE_RELOAD);
1717}
1718
034c6ed7
LP
1719static void service_enter_reload(Service *s) {
1720 int r;
1721
1722 assert(s);
1723
5e94833f
LP
1724 service_unwatch_control_pid(s);
1725
117dcc57
ZJS
1726 s->control_command = s->exec_command[SERVICE_EXEC_RELOAD];
1727 if (s->control_command) {
867b3b7d
LP
1728 s->control_command_id = SERVICE_EXEC_RELOAD;
1729
ecedd90f
LP
1730 r = service_spawn(s,
1731 s->control_command,
21b2ce39 1732 s->timeout_start_usec,
ecedd90f
LP
1733 false,
1734 !s->permissions_start_only,
1735 !s->root_directory_start_only,
1736 false,
ecedd90f
LP
1737 true,
1738 &s->control_pid);
1739 if (r < 0)
034c6ed7
LP
1740 goto fail;
1741
80876c20
LP
1742 service_set_state(s, SERVICE_RELOAD);
1743 } else
f42806df 1744 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
1745
1746 return;
1747
1748fail:
31938a85 1749 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'reload' task: %m", UNIT(s)->id);
f42806df
LP
1750 s->reload_result = SERVICE_FAILURE_RESOURCES;
1751 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
1752}
1753
f42806df 1754static void service_run_next_control(Service *s) {
034c6ed7
LP
1755 int r;
1756
1757 assert(s);
1758 assert(s->control_command);
1759 assert(s->control_command->command_next);
1760
34e9ba66 1761 assert(s->control_command_id != SERVICE_EXEC_START);
034c6ed7 1762
34e9ba66 1763 s->control_command = s->control_command->command_next;
5e94833f
LP
1764 service_unwatch_control_pid(s);
1765
ecedd90f
LP
1766 r = service_spawn(s,
1767 s->control_command,
21b2ce39 1768 IN_SET(s->state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD) ? s->timeout_start_usec : s->timeout_stop_usec,
ecedd90f
LP
1769 false,
1770 !s->permissions_start_only,
1771 !s->root_directory_start_only,
1772 s->control_command_id == SERVICE_EXEC_START_PRE ||
1773 s->control_command_id == SERVICE_EXEC_STOP_POST,
ecedd90f
LP
1774 true,
1775 &s->control_pid);
1776 if (r < 0)
034c6ed7
LP
1777 goto fail;
1778
1779 return;
1780
1781fail:
31938a85 1782 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run next control task: %m", UNIT(s)->id);
034c6ed7 1783
80876c20 1784 if (s->state == SERVICE_START_PRE)
f42806df 1785 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
80876c20 1786 else if (s->state == SERVICE_STOP)
f42806df 1787 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7 1788 else if (s->state == SERVICE_STOP_POST)
f42806df 1789 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, true);
e2f3b44c 1790 else if (s->state == SERVICE_RELOAD) {
f42806df
LP
1791 s->reload_result = SERVICE_FAILURE_RESOURCES;
1792 service_enter_running(s, SERVICE_SUCCESS);
e2f3b44c 1793 } else
f42806df 1794 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
5cb5a6ff
LP
1795}
1796
f42806df 1797static void service_run_next_main(Service *s) {
34e9ba66
LP
1798 pid_t pid;
1799 int r;
1800
1801 assert(s);
867b3b7d
LP
1802 assert(s->main_command);
1803 assert(s->main_command->command_next);
1804 assert(s->type == SERVICE_ONESHOT);
34e9ba66 1805
867b3b7d 1806 s->main_command = s->main_command->command_next;
34e9ba66
LP
1807 service_unwatch_main_pid(s);
1808
ecedd90f
LP
1809 r = service_spawn(s,
1810 s->main_command,
21b2ce39 1811 s->timeout_start_usec,
ecedd90f
LP
1812 true,
1813 true,
1814 true,
1815 true,
ecedd90f
LP
1816 false,
1817 &pid);
1818 if (r < 0)
34e9ba66
LP
1819 goto fail;
1820
1821 service_set_main_pid(s, pid);
1822
1823 return;
1824
1825fail:
31938a85 1826 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run next main task: %m", UNIT(s)->id);
f42806df 1827 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
34e9ba66
LP
1828}
1829
93ae25e6
MO
1830static int service_start_limit_test(Service *s) {
1831 assert(s);
1832
1833 if (ratelimit_test(&s->start_limit))
1834 return 0;
1835
79008bdd 1836 log_unit_warning(UNIT(s)->id, "start request repeated too quickly for %s", UNIT(s)->id);
2928b0a8
LP
1837
1838 return failure_action(UNIT(s)->manager, s->start_limit_action, s->reboot_arg);
93ae25e6
MO
1839}
1840
87f0e418
LP
1841static int service_start(Unit *u) {
1842 Service *s = SERVICE(u);
4b939747 1843 int r;
5cb5a6ff
LP
1844
1845 assert(s);
1846
034c6ed7
LP
1847 /* We cannot fulfill this request right now, try again later
1848 * please! */
a00973af
LP
1849 if (IN_SET(s->state,
1850 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
1851 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL))
5cb5a6ff
LP
1852 return -EAGAIN;
1853
034c6ed7 1854 /* Already on it! */
a00973af 1855 if (IN_SET(s->state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST))
034c6ed7
LP
1856 return 0;
1857
2e9d6c12 1858 /* A service that will be restarted must be stopped first to
7f2cddae 1859 * trigger BindsTo and/or OnFailure dependencies. If a user
2e9d6c12 1860 * does not want to wait for the holdoff time to elapse, the
d4943dc7
LP
1861 * service should be manually restarted, not started. We
1862 * simply return EAGAIN here, so that any start jobs stay
1863 * queued, and assume that the auto restart timer will
1864 * eventually trigger the restart. */
1865 if (s->state == SERVICE_AUTO_RESTART)
a8bb2e65 1866 return -EAGAIN;
2e9d6c12 1867
a00973af 1868 assert(IN_SET(s->state, SERVICE_DEAD, SERVICE_FAILED));
5cb5a6ff 1869
1e2e8133 1870 /* Make sure we don't enter a busy loop of some kind. */
4b939747 1871 r = service_start_limit_test(s);
c2f34808 1872 if (r < 0) {
8d1b002a 1873 service_enter_dead(s, SERVICE_FAILURE_START_LIMIT, false);
4b939747 1874 return r;
c2f34808 1875 }
1e2e8133 1876
f42806df
LP
1877 s->result = SERVICE_SUCCESS;
1878 s->reload_result = SERVICE_SUCCESS;
034c6ed7 1879 s->main_pid_known = false;
6dfa5494 1880 s->main_pid_alien = false;
47342320 1881 s->forbid_restart = false;
5ad096b3 1882 s->reset_cpu_usage = true;
034c6ed7 1883
8cfdb077
LP
1884 free(s->status_text);
1885 s->status_text = NULL;
1886 s->status_errno = 0;
1887
308d72dc
LP
1888 s->notify_state = NOTIFY_UNKNOWN;
1889
034c6ed7 1890 service_enter_start_pre(s);
82a2b6bb 1891 return 1;
5cb5a6ff
LP
1892}
1893
87f0e418
LP
1894static int service_stop(Unit *u) {
1895 Service *s = SERVICE(u);
5cb5a6ff
LP
1896
1897 assert(s);
1898
f0c7b229 1899 /* Don't create restart jobs from here. */
47342320 1900 s->forbid_restart = true;
034c6ed7 1901
e537352b 1902 /* Already on it */
a00973af
LP
1903 if (IN_SET(s->state,
1904 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
1905 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL))
e537352b
LP
1906 return 0;
1907
f0c7b229 1908 /* A restart will be scheduled or is in progress. */
034c6ed7 1909 if (s->state == SERVICE_AUTO_RESTART) {
0c7f15b3 1910 service_set_state(s, SERVICE_DEAD);
034c6ed7
LP
1911 return 0;
1912 }
1913
3f6c78dc
LP
1914 /* If there's already something running we go directly into
1915 * kill mode. */
a00973af 1916 if (IN_SET(s->state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST, SERVICE_RELOAD)) {
f42806df 1917 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_SUCCESS);
3f6c78dc
LP
1918 return 0;
1919 }
5cb5a6ff 1920
a00973af 1921 assert(IN_SET(s->state, SERVICE_RUNNING, SERVICE_EXITED));
3a762661 1922
f42806df 1923 service_enter_stop(s, SERVICE_SUCCESS);
82a2b6bb 1924 return 1;
5cb5a6ff
LP
1925}
1926
87f0e418
LP
1927static int service_reload(Unit *u) {
1928 Service *s = SERVICE(u);
034c6ed7
LP
1929
1930 assert(s);
1931
80876c20 1932 assert(s->state == SERVICE_RUNNING || s->state == SERVICE_EXITED);
034c6ed7
LP
1933
1934 service_enter_reload(s);
5cb5a6ff
LP
1935 return 0;
1936}
1937
44a6b1b6 1938_pure_ static bool service_can_reload(Unit *u) {
87f0e418 1939 Service *s = SERVICE(u);
034c6ed7
LP
1940
1941 assert(s);
1942
1943 return !!s->exec_command[SERVICE_EXEC_RELOAD];
1944}
1945
a16e1123
LP
1946static int service_serialize(Unit *u, FILE *f, FDSet *fds) {
1947 Service *s = SERVICE(u);
2339fc93 1948 ServiceFDStore *fs;
a16e1123
LP
1949
1950 assert(u);
1951 assert(f);
1952 assert(fds);
1953
1954 unit_serialize_item(u, f, "state", service_state_to_string(s->state));
f42806df
LP
1955 unit_serialize_item(u, f, "result", service_result_to_string(s->result));
1956 unit_serialize_item(u, f, "reload-result", service_result_to_string(s->reload_result));
a16e1123
LP
1957
1958 if (s->control_pid > 0)
f06db334 1959 unit_serialize_item_format(u, f, "control-pid", PID_FMT, s->control_pid);
a16e1123 1960
5925dd3c 1961 if (s->main_pid_known && s->main_pid > 0)
ccd06097 1962 unit_serialize_item_format(u, f, "main-pid", PID_FMT, s->main_pid);
a16e1123
LP
1963
1964 unit_serialize_item(u, f, "main-pid-known", yes_no(s->main_pid_known));
1965
3a2776bc
LP
1966 if (s->status_text)
1967 unit_serialize_item(u, f, "status-text", s->status_text);
1968
cfc4eb4c
LP
1969 /* FIXME: There's a minor uncleanliness here: if there are
1970 * multiple commands attached here, we will start from the
1971 * first one again */
a16e1123 1972 if (s->control_command_id >= 0)
f06db334 1973 unit_serialize_item(u, f, "control-command", service_exec_command_to_string(s->control_command_id));
a16e1123
LP
1974
1975 if (s->socket_fd >= 0) {
1976 int copy;
1977
2339fc93
LP
1978 copy = fdset_put_dup(fds, s->socket_fd);
1979 if (copy < 0)
a16e1123
LP
1980 return copy;
1981
1982 unit_serialize_item_format(u, f, "socket-fd", "%i", copy);
1983 }
1984
e44da745
DM
1985 if (s->bus_endpoint_fd >= 0) {
1986 int copy;
1987
2339fc93
LP
1988 copy = fdset_put_dup(fds, s->bus_endpoint_fd);
1989 if (copy < 0)
e44da745
DM
1990 return copy;
1991
1992 unit_serialize_item_format(u, f, "endpoint-fd", "%i", copy);
1993 }
1994
2339fc93
LP
1995 LIST_FOREACH(fd_store, fs, s->fd_store) {
1996 int copy;
1997
1998 copy = fdset_put_dup(fds, fs->fd);
1999 if (copy < 0)
2000 return copy;
2001
2002 unit_serialize_item_format(u, f, "fd-store-fd", "%i", copy);
2003 }
2004
ecdbca40 2005 if (s->main_exec_status.pid > 0) {
f06db334
LP
2006 unit_serialize_item_format(u, f, "main-exec-status-pid", PID_FMT, s->main_exec_status.pid);
2007 dual_timestamp_serialize(f, "main-exec-status-start", &s->main_exec_status.start_timestamp);
2008 dual_timestamp_serialize(f, "main-exec-status-exit", &s->main_exec_status.exit_timestamp);
ecdbca40 2009
799fd0fd 2010 if (dual_timestamp_is_set(&s->main_exec_status.exit_timestamp)) {
f06db334
LP
2011 unit_serialize_item_format(u, f, "main-exec-status-code", "%i", s->main_exec_status.code);
2012 unit_serialize_item_format(u, f, "main-exec-status-status", "%i", s->main_exec_status.status);
ecdbca40
LP
2013 }
2014 }
f06db334 2015
a6927d7f 2016 if (dual_timestamp_is_set(&s->watchdog_timestamp))
842129f5 2017 dual_timestamp_serialize(f, "watchdog-timestamp", &s->watchdog_timestamp);
ecdbca40 2018
6aca9a58 2019 if (s->forbid_restart)
8d1a2802 2020 unit_serialize_item(u, f, "forbid-restart", yes_no(s->forbid_restart));
6aca9a58 2021
a16e1123
LP
2022 return 0;
2023}
2024
2025static int service_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
2026 Service *s = SERVICE(u);
2339fc93 2027 int r;
a16e1123
LP
2028
2029 assert(u);
2030 assert(key);
2031 assert(value);
2032 assert(fds);
2033
2034 if (streq(key, "state")) {
2035 ServiceState state;
2036
117dcc57
ZJS
2037 state = service_state_from_string(value);
2038 if (state < 0)
79008bdd 2039 log_unit_debug(u->id, "Failed to parse state value %s", value);
a16e1123
LP
2040 else
2041 s->deserialized_state = state;
f42806df
LP
2042 } else if (streq(key, "result")) {
2043 ServiceResult f;
2044
2045 f = service_result_from_string(value);
2046 if (f < 0)
79008bdd 2047 log_unit_debug(u->id, "Failed to parse result value %s", value);
f42806df
LP
2048 else if (f != SERVICE_SUCCESS)
2049 s->result = f;
2050
2051 } else if (streq(key, "reload-result")) {
2052 ServiceResult f;
2053
2054 f = service_result_from_string(value);
2055 if (f < 0)
79008bdd 2056 log_unit_debug(u->id, "Failed to parse reload result value %s", value);
f42806df
LP
2057 else if (f != SERVICE_SUCCESS)
2058 s->reload_result = f;
a16e1123 2059
a16e1123 2060 } else if (streq(key, "control-pid")) {
5925dd3c 2061 pid_t pid;
a16e1123 2062
e364ad06 2063 if (parse_pid(value, &pid) < 0)
79008bdd 2064 log_unit_debug(u->id, "Failed to parse control-pid value %s", value);
a16e1123 2065 else
e55224ca 2066 s->control_pid = pid;
a16e1123 2067 } else if (streq(key, "main-pid")) {
5925dd3c 2068 pid_t pid;
a16e1123 2069
e364ad06 2070 if (parse_pid(value, &pid) < 0)
79008bdd 2071 log_unit_debug(u->id, "Failed to parse main-pid value %s", value);
7400b9d2
LP
2072 else {
2073 service_set_main_pid(s, pid);
2074 unit_watch_pid(UNIT(s), pid);
2075 }
a16e1123
LP
2076 } else if (streq(key, "main-pid-known")) {
2077 int b;
2078
117dcc57
ZJS
2079 b = parse_boolean(value);
2080 if (b < 0)
79008bdd 2081 log_unit_debug(u->id, "Failed to parse main-pid-known value %s", value);
a16e1123
LP
2082 else
2083 s->main_pid_known = b;
3a2776bc
LP
2084 } else if (streq(key, "status-text")) {
2085 char *t;
2086
117dcc57
ZJS
2087 t = strdup(value);
2088 if (!t)
2089 log_oom();
2090 else {
3a2776bc
LP
2091 free(s->status_text);
2092 s->status_text = t;
2093 }
2094
a16e1123
LP
2095 } else if (streq(key, "control-command")) {
2096 ServiceExecCommand id;
2097
117dcc57
ZJS
2098 id = service_exec_command_from_string(value);
2099 if (id < 0)
79008bdd 2100 log_unit_debug(u->id, "Failed to parse exec-command value %s", value);
a16e1123
LP
2101 else {
2102 s->control_command_id = id;
2103 s->control_command = s->exec_command[id];
2104 }
2105 } else if (streq(key, "socket-fd")) {
2106 int fd;
2107
2108 if (safe_atoi(value, &fd) < 0 || fd < 0 || !fdset_contains(fds, fd))
79008bdd 2109 log_unit_debug(u->id, "Failed to parse socket-fd value %s", value);
a16e1123 2110 else {
574634bc 2111 asynchronous_close(s->socket_fd);
a16e1123
LP
2112 s->socket_fd = fdset_remove(fds, fd);
2113 }
e44da745
DM
2114 } else if (streq(key, "endpoint-fd")) {
2115 int fd;
2116
2117 if (safe_atoi(value, &fd) < 0 || fd < 0 || !fdset_contains(fds, fd))
79008bdd 2118 log_unit_debug(u->id, "Failed to parse endpoint-fd value %s", value);
e44da745
DM
2119 else {
2120 safe_close(s->bus_endpoint_fd);
2121 s->bus_endpoint_fd = fdset_remove(fds, fd);
2122 }
2339fc93
LP
2123 } else if (streq(key, "fd-store-fd")) {
2124 int fd;
2125
2126 if (safe_atoi(value, &fd) < 0 || fd < 0 || !fdset_contains(fds, fd))
2127 log_unit_debug(u->id, "Failed to parse fd-store-fd value %s", value);
2128 else {
2129 r = service_add_fd_store(s, fd);
2130 if (r < 0)
2131 log_unit_error_errno(u->id, r, "Failed to add fd to store: %m");
2132 else if (r > 0)
2133 fdset_remove(fds, fd);
2134 }
2135
ecdbca40
LP
2136 } else if (streq(key, "main-exec-status-pid")) {
2137 pid_t pid;
2138
e364ad06 2139 if (parse_pid(value, &pid) < 0)
79008bdd 2140 log_unit_debug(u->id, "Failed to parse main-exec-status-pid value %s", value);
ecdbca40
LP
2141 else
2142 s->main_exec_status.pid = pid;
2143 } else if (streq(key, "main-exec-status-code")) {
2144 int i;
2145
e364ad06 2146 if (safe_atoi(value, &i) < 0)
79008bdd 2147 log_unit_debug(u->id, "Failed to parse main-exec-status-code value %s", value);
ecdbca40
LP
2148 else
2149 s->main_exec_status.code = i;
2150 } else if (streq(key, "main-exec-status-status")) {
2151 int i;
2152
e364ad06 2153 if (safe_atoi(value, &i) < 0)
79008bdd 2154 log_unit_debug(u->id, "Failed to parse main-exec-status-status value %s", value);
ecdbca40
LP
2155 else
2156 s->main_exec_status.status = i;
799fd0fd
LP
2157 } else if (streq(key, "main-exec-status-start"))
2158 dual_timestamp_deserialize(value, &s->main_exec_status.start_timestamp);
2159 else if (streq(key, "main-exec-status-exit"))
2160 dual_timestamp_deserialize(value, &s->main_exec_status.exit_timestamp);
a6927d7f
MO
2161 else if (streq(key, "watchdog-timestamp"))
2162 dual_timestamp_deserialize(value, &s->watchdog_timestamp);
613b411c 2163 else if (streq(key, "forbid-restart")) {
6aca9a58
SE
2164 int b;
2165
2166 b = parse_boolean(value);
2167 if (b < 0)
79008bdd 2168 log_unit_debug(u->id, "Failed to parse forbid-restart value %s", value);
6aca9a58
SE
2169 else
2170 s->forbid_restart = b;
c17ec25e 2171 } else
79008bdd 2172 log_unit_debug(u->id, "Unknown serialization key '%s'", key);
a16e1123
LP
2173
2174 return 0;
2175}
2176
44a6b1b6 2177_pure_ static UnitActiveState service_active_state(Unit *u) {
e056b01d
LP
2178 const UnitActiveState *table;
2179
87f0e418 2180 assert(u);
5cb5a6ff 2181
e056b01d
LP
2182 table = SERVICE(u)->type == SERVICE_IDLE ? state_translation_table_idle : state_translation_table;
2183
2184 return table[SERVICE(u)->state];
034c6ed7
LP
2185}
2186
10a94420
LP
2187static const char *service_sub_state_to_string(Unit *u) {
2188 assert(u);
2189
2190 return service_state_to_string(SERVICE(u)->state);
2191}
2192
701cc384
LP
2193static bool service_check_gc(Unit *u) {
2194 Service *s = SERVICE(u);
2195
2196 assert(s);
2197
6d55002a
LP
2198 /* Never clean up services that still have a process around,
2199 * even if the service is formally dead. */
2200 if (cgroup_good(s) > 0 ||
2201 main_pid_good(s) > 0 ||
2202 control_pid_good(s) > 0)
2203 return true;
2204
6d55002a
LP
2205 return false;
2206}
2207
44a6b1b6 2208_pure_ static bool service_check_snapshot(Unit *u) {
701cc384
LP
2209 Service *s = SERVICE(u);
2210
2211 assert(s);
2212
8bb2d17d 2213 return s->socket_fd < 0;
701cc384
LP
2214}
2215
3a111838
MS
2216static int service_retry_pid_file(Service *s) {
2217 int r;
2218
2219 assert(s->pid_file);
2220 assert(s->state == SERVICE_START || s->state == SERVICE_START_POST);
2221
2222 r = service_load_pid_file(s, false);
2223 if (r < 0)
2224 return r;
2225
2226 service_unwatch_pid_file(s);
2227
f42806df 2228 service_enter_running(s, SERVICE_SUCCESS);
3a111838
MS
2229 return 0;
2230}
2231
2232static int service_watch_pid_file(Service *s) {
2233 int r;
2234
79008bdd 2235 log_unit_debug(UNIT(s)->id, "Setting watch for %s's PID file %s", UNIT(s)->id, s->pid_file_pathspec->path);
8bb2d17d 2236
718db961 2237 r = path_spec_watch(s->pid_file_pathspec, service_dispatch_io);
3a111838
MS
2238 if (r < 0)
2239 goto fail;
2240
2241 /* the pidfile might have appeared just before we set the watch */
79008bdd 2242 log_unit_debug(UNIT(s)->id, "Trying to read %s's PID file %s in case it changed", UNIT(s)->id, s->pid_file_pathspec->path);
3a111838
MS
2243 service_retry_pid_file(s);
2244
2245 return 0;
2246fail:
31938a85 2247 log_unit_error_errno(UNIT(s)->id, r, "Failed to set a watch for %s's PID file %s: %m", UNIT(s)->id, s->pid_file_pathspec->path);
3a111838
MS
2248 service_unwatch_pid_file(s);
2249 return r;
2250}
2251
2252static int service_demand_pid_file(Service *s) {
2253 PathSpec *ps;
2254
2255 assert(s->pid_file);
2256 assert(!s->pid_file_pathspec);
2257
2258 ps = new0(PathSpec, 1);
2259 if (!ps)
2260 return -ENOMEM;
2261
718db961 2262 ps->unit = UNIT(s);
3a111838
MS
2263 ps->path = strdup(s->pid_file);
2264 if (!ps->path) {
2265 free(ps);
2266 return -ENOMEM;
2267 }
2268
2269 path_kill_slashes(ps->path);
2270
2271 /* PATH_CHANGED would not be enough. There are daemons (sendmail) that
2272 * keep their PID file open all the time. */
2273 ps->type = PATH_MODIFIED;
2274 ps->inotify_fd = -1;
2275
2276 s->pid_file_pathspec = ps;
2277
2278 return service_watch_pid_file(s);
2279}
2280
718db961 2281static int service_dispatch_io(sd_event_source *source, int fd, uint32_t events, void *userdata) {
e14c2802
LP
2282 PathSpec *p = userdata;
2283 Service *s;
2284
2285 assert(p);
2286
2287 s = SERVICE(p->unit);
3a111838
MS
2288
2289 assert(s);
2290 assert(fd >= 0);
2291 assert(s->state == SERVICE_START || s->state == SERVICE_START_POST);
2292 assert(s->pid_file_pathspec);
57020a3a 2293 assert(path_spec_owns_inotify_fd(s->pid_file_pathspec, fd));
3a111838 2294
79008bdd 2295 log_unit_debug(UNIT(s)->id, "inotify event for %s", UNIT(s)->id);
3a111838 2296
e14c2802 2297 if (path_spec_fd_event(p, events) < 0)
3a111838
MS
2298 goto fail;
2299
2300 if (service_retry_pid_file(s) == 0)
718db961 2301 return 0;
3a111838
MS
2302
2303 if (service_watch_pid_file(s) < 0)
2304 goto fail;
2305
718db961
LP
2306 return 0;
2307
3a111838
MS
2308fail:
2309 service_unwatch_pid_file(s);
f42806df 2310 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_RESOURCES);
718db961 2311 return 0;
3a111838
MS
2312}
2313
a911bb9a
LP
2314static void service_notify_cgroup_empty_event(Unit *u) {
2315 Service *s = SERVICE(u);
2316
2317 assert(u);
2318
79008bdd 2319 log_unit_debug(u->id, "%s: cgroup is empty", u->id);
a911bb9a
LP
2320
2321 switch (s->state) {
2322
2323 /* Waiting for SIGCHLD is usually more interesting,
2324 * because it includes return codes/signals. Which is
2325 * why we ignore the cgroup events for most cases,
2326 * except when we don't know pid which to expect the
2327 * SIGCHLD for. */
2328
2329 case SERVICE_START:
2330 case SERVICE_START_POST:
2331 /* If we were hoping for the daemon to write its PID file,
2332 * we can give up now. */
2333 if (s->pid_file_pathspec) {
79008bdd 2334 log_unit_warning(u->id, "%s never wrote its PID file. Failing.", UNIT(s)->id);
8bb2d17d 2335
a911bb9a
LP
2336 service_unwatch_pid_file(s);
2337 if (s->state == SERVICE_START)
2338 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
2339 else
2340 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
2341 }
2342 break;
2343
2344 case SERVICE_RUNNING:
2345 /* service_enter_running() will figure out what to do */
2346 service_enter_running(s, SERVICE_SUCCESS);
2347 break;
2348
db2cb23b 2349 case SERVICE_STOP_SIGABRT:
a911bb9a
LP
2350 case SERVICE_STOP_SIGTERM:
2351 case SERVICE_STOP_SIGKILL:
2352
2353 if (main_pid_good(s) <= 0 && !control_pid_good(s))
2354 service_enter_stop_post(s, SERVICE_SUCCESS);
2355
2356 break;
2357
2358 case SERVICE_STOP_POST:
2359 case SERVICE_FINAL_SIGTERM:
2360 case SERVICE_FINAL_SIGKILL:
2361 if (main_pid_good(s) <= 0 && !control_pid_good(s))
2362 service_enter_dead(s, SERVICE_SUCCESS, true);
2363
2364 break;
2365
2366 default:
2367 ;
2368 }
2369}
2370
87f0e418
LP
2371static void service_sigchld_event(Unit *u, pid_t pid, int code, int status) {
2372 Service *s = SERVICE(u);
f42806df 2373 ServiceResult f;
5cb5a6ff
LP
2374
2375 assert(s);
034c6ed7
LP
2376 assert(pid >= 0);
2377
96342de6
LN
2378 if (UNIT(s)->fragment_path ? is_clean_exit(code, status, &s->success_status) :
2379 is_clean_exit_lsb(code, status, &s->success_status))
f42806df
LP
2380 f = SERVICE_SUCCESS;
2381 else if (code == CLD_EXITED)
2382 f = SERVICE_FAILURE_EXIT_CODE;
2383 else if (code == CLD_KILLED)
2384 f = SERVICE_FAILURE_SIGNAL;
2385 else if (code == CLD_DUMPED)
2386 f = SERVICE_FAILURE_CORE_DUMP;
d06dacd0 2387 else
cfc4eb4c 2388 assert_not_reached("Unknown code");
034c6ed7
LP
2389
2390 if (s->main_pid == pid) {
db01f8b3
MS
2391 /* Forking services may occasionally move to a new PID.
2392 * As long as they update the PID file before exiting the old
2393 * PID, they're fine. */
5375410b 2394 if (service_load_pid_file(s, false) == 0)
db01f8b3 2395 return;
034c6ed7 2396
034c6ed7 2397 s->main_pid = 0;
6ea832a2 2398 exec_status_exit(&s->main_exec_status, &s->exec_context, pid, code, status);
034c6ed7 2399
867b3b7d 2400 if (s->main_command) {
fbeefb45
LP
2401 /* If this is not a forking service than the
2402 * main process got started and hence we copy
2403 * the exit status so that it is recorded both
2404 * as main and as control process exit
2405 * status */
2406
867b3b7d 2407 s->main_command->exec_status = s->main_exec_status;
b708e7ce 2408
867b3b7d 2409 if (s->main_command->ignore)
f42806df 2410 f = SERVICE_SUCCESS;
fbeefb45
LP
2411 } else if (s->exec_command[SERVICE_EXEC_START]) {
2412
2413 /* If this is a forked process, then we should
2414 * ignore the return value if this was
2415 * configured for the starter process */
2416
2417 if (s->exec_command[SERVICE_EXEC_START]->ignore)
2418 f = SERVICE_SUCCESS;
034c6ed7
LP
2419 }
2420
e2cc6eca
LP
2421 log_unit_struct(u->id,
2422 f == SERVICE_SUCCESS ? LOG_DEBUG : LOG_NOTICE,
2423 LOG_MESSAGE("%s: main process exited, code=%s, status=%i/%s",
2424 u->id, sigchld_code_to_string(code), status,
2425 strna(code == CLD_EXITED
2426 ? exit_status_to_string(status, EXIT_STATUS_FULL)
2427 : signal_to_string(status))),
2428 "EXIT_CODE=%s", sigchld_code_to_string(code),
2429 "EXIT_STATUS=%i", status,
2430 NULL);
f42806df
LP
2431
2432 if (f != SERVICE_SUCCESS)
2433 s->result = f;
034c6ed7 2434
867b3b7d
LP
2435 if (s->main_command &&
2436 s->main_command->command_next &&
f42806df 2437 f == SERVICE_SUCCESS) {
034c6ed7 2438
34e9ba66
LP
2439 /* There is another command to *
2440 * execute, so let's do that. */
034c6ed7 2441
79008bdd 2442 log_unit_debug(u->id, "%s running next main command for state %s", u->id, service_state_to_string(s->state));
f42806df 2443 service_run_next_main(s);
034c6ed7 2444
34e9ba66
LP
2445 } else {
2446
2447 /* The service exited, so the service is officially
2448 * gone. */
867b3b7d 2449 s->main_command = NULL;
34e9ba66
LP
2450
2451 switch (s->state) {
2452
2453 case SERVICE_START_POST:
2454 case SERVICE_RELOAD:
2455 case SERVICE_STOP:
2456 /* Need to wait until the operation is
2457 * done */
c4653a4d 2458 break;
7d55e835 2459
34e9ba66
LP
2460 case SERVICE_START:
2461 if (s->type == SERVICE_ONESHOT) {
2462 /* This was our main goal, so let's go on */
f42806df 2463 if (f == SERVICE_SUCCESS)
34e9ba66
LP
2464 service_enter_start_post(s);
2465 else
f42806df 2466 service_enter_signal(s, SERVICE_FINAL_SIGTERM, f);
34e9ba66 2467 break;
34e9ba66 2468 }
034c6ed7 2469
bfba3256
LP
2470 /* Fall through */
2471
34e9ba66 2472 case SERVICE_RUNNING:
f42806df 2473 service_enter_running(s, f);
34e9ba66 2474 break;
034c6ed7 2475
db2cb23b 2476 case SERVICE_STOP_SIGABRT:
34e9ba66
LP
2477 case SERVICE_STOP_SIGTERM:
2478 case SERVICE_STOP_SIGKILL:
5cb5a6ff 2479
34e9ba66 2480 if (!control_pid_good(s))
f42806df 2481 service_enter_stop_post(s, f);
5cb5a6ff 2482
34e9ba66
LP
2483 /* If there is still a control process, wait for that first */
2484 break;
2485
bf108e55
LP
2486 case SERVICE_STOP_POST:
2487 case SERVICE_FINAL_SIGTERM:
2488 case SERVICE_FINAL_SIGKILL:
2489
2490 if (!control_pid_good(s))
2491 service_enter_dead(s, f, true);
2492 break;
2493
34e9ba66
LP
2494 default:
2495 assert_not_reached("Uh, main process died at wrong time.");
2496 }
034c6ed7 2497 }
5cb5a6ff 2498
034c6ed7 2499 } else if (s->control_pid == pid) {
34e9ba66
LP
2500 s->control_pid = 0;
2501
b708e7ce 2502 if (s->control_command) {
8bb2d17d 2503 exec_status_exit(&s->control_command->exec_status, &s->exec_context, pid, code, status);
a16e1123 2504
b708e7ce 2505 if (s->control_command->ignore)
f42806df 2506 f = SERVICE_SUCCESS;
b708e7ce
LP
2507 }
2508
79008bdd
LP
2509 log_unit_full(u->id,
2510 f == SERVICE_SUCCESS ? LOG_DEBUG : LOG_NOTICE,
66870f90
ZJS
2511 "%s: control process exited, code=%s status=%i",
2512 u->id, sigchld_code_to_string(code), status);
f42806df
LP
2513
2514 if (f != SERVICE_SUCCESS)
2515 s->result = f;
034c6ed7 2516
88f3e0c9
LP
2517 /* Immediately get rid of the cgroup, so that the
2518 * kernel doesn't delay the cgroup empty messages for
2519 * the service cgroup any longer than necessary */
4ad49000 2520 service_kill_control_processes(s);
88f3e0c9 2521
34e9ba66
LP
2522 if (s->control_command &&
2523 s->control_command->command_next &&
f42806df 2524 f == SERVICE_SUCCESS) {
034c6ed7
LP
2525
2526 /* There is another command to *
2527 * execute, so let's do that. */
2528
79008bdd 2529 log_unit_debug(u->id, "%s running next control command for state %s", u->id, service_state_to_string(s->state));
f42806df 2530 service_run_next_control(s);
034c6ed7 2531
80876c20 2532 } else {
034c6ed7
LP
2533 /* No further commands for this step, so let's
2534 * figure out what to do next */
2535
a16e1123
LP
2536 s->control_command = NULL;
2537 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
2538
79008bdd 2539 log_unit_debug(u->id, "%s got final SIGCHLD for state %s", u->id, service_state_to_string(s->state));
bd982a8b 2540
034c6ed7
LP
2541 switch (s->state) {
2542
2543 case SERVICE_START_PRE:
f42806df 2544 if (f == SERVICE_SUCCESS)
034c6ed7
LP
2545 service_enter_start(s);
2546 else
f42806df 2547 service_enter_signal(s, SERVICE_FINAL_SIGTERM, f);
034c6ed7
LP
2548 break;
2549
2550 case SERVICE_START:
bfba3256
LP
2551 if (s->type != SERVICE_FORKING)
2552 /* Maybe spurious event due to a reload that changed the type? */
2553 break;
034c6ed7 2554
f42806df
LP
2555 if (f != SERVICE_SUCCESS) {
2556 service_enter_signal(s, SERVICE_FINAL_SIGTERM, f);
3a111838
MS
2557 break;
2558 }
034c6ed7 2559
3a111838 2560 if (s->pid_file) {
f42806df
LP
2561 bool has_start_post;
2562 int r;
2563
3a111838
MS
2564 /* Let's try to load the pid file here if we can.
2565 * The PID file might actually be created by a START_POST
2566 * script. In that case don't worry if the loading fails. */
f42806df
LP
2567
2568 has_start_post = !!s->exec_command[SERVICE_EXEC_START_POST];
2569 r = service_load_pid_file(s, !has_start_post);
3a111838
MS
2570 if (!has_start_post && r < 0) {
2571 r = service_demand_pid_file(s);
2572 if (r < 0 || !cgroup_good(s))
f42806df 2573 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
3a111838
MS
2574 break;
2575 }
034c6ed7 2576 } else
3a111838 2577 service_search_main_pid(s);
034c6ed7 2578
3a111838 2579 service_enter_start_post(s);
034c6ed7
LP
2580 break;
2581
2582 case SERVICE_START_POST:
f42806df
LP
2583 if (f != SERVICE_SUCCESS) {
2584 service_enter_stop(s, f);
2096e009 2585 break;
034c6ed7
LP
2586 }
2587
2096e009 2588 if (s->pid_file) {
f42806df
LP
2589 int r;
2590
2591 r = service_load_pid_file(s, true);
2096e009
MS
2592 if (r < 0) {
2593 r = service_demand_pid_file(s);
2594 if (r < 0 || !cgroup_good(s))
f42806df 2595 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
2096e009
MS
2596 break;
2597 }
2598 } else
2599 service_search_main_pid(s);
2600
f42806df 2601 service_enter_running(s, SERVICE_SUCCESS);
3185a36b 2602 break;
034c6ed7
LP
2603
2604 case SERVICE_RELOAD:
f42806df 2605 if (f == SERVICE_SUCCESS) {
5375410b 2606 service_load_pid_file(s, true);
3185a36b
LP
2607 service_search_main_pid(s);
2608 }
2609
f42806df
LP
2610 s->reload_result = f;
2611 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
2612 break;
2613
2614 case SERVICE_STOP:
f42806df 2615 service_enter_signal(s, SERVICE_STOP_SIGTERM, f);
034c6ed7
LP
2616 break;
2617
db2cb23b 2618 case SERVICE_STOP_SIGABRT:
034c6ed7
LP
2619 case SERVICE_STOP_SIGTERM:
2620 case SERVICE_STOP_SIGKILL:
2621 if (main_pid_good(s) <= 0)
f42806df 2622 service_enter_stop_post(s, f);
034c6ed7
LP
2623
2624 /* If there is still a service
2625 * process around, wait until
2626 * that one quit, too */
2627 break;
2628
2629 case SERVICE_STOP_POST:
2630 case SERVICE_FINAL_SIGTERM:
2631 case SERVICE_FINAL_SIGKILL:
bf108e55
LP
2632 if (main_pid_good(s) <= 0)
2633 service_enter_dead(s, f, true);
034c6ed7
LP
2634 break;
2635
2636 default:
2637 assert_not_reached("Uh, control process died at wrong time.");
2638 }
2639 }
8c47c732 2640 }
c4e2ceae
LP
2641
2642 /* Notify clients about changed exit status */
2643 unit_add_to_dbus_queue(u);
a911bb9a
LP
2644
2645 /* We got one SIGCHLD for the service, let's watch all
2646 * processes that are now running of the service, and watch
2647 * that. Among the PIDs we then watch will be children
2648 * reassigned to us, which hopefully allows us to identify
2649 * when all children are gone */
2650 unit_tidy_watch_pids(u, s->main_pid, s->control_pid);
2651 unit_watch_all_pids(u);
2652
2653 /* If the PID set is empty now, then let's finish this off */
2654 if (set_isempty(u->pids))
2655 service_notify_cgroup_empty_event(u);
034c6ed7
LP
2656}
2657
718db961
LP
2658static int service_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata) {
2659 Service *s = SERVICE(userdata);
034c6ed7
LP
2660
2661 assert(s);
718db961 2662 assert(source == s->timer_event_source);
034c6ed7
LP
2663
2664 switch (s->state) {
2665
2666 case SERVICE_START_PRE:
2667 case SERVICE_START:
79008bdd 2668 log_unit_warning(UNIT(s)->id, "%s %s operation timed out. Terminating.", UNIT(s)->id, s->state == SERVICE_START ? "start" : "start-pre");
f42806df 2669 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_TIMEOUT);
80876c20
LP
2670 break;
2671
034c6ed7 2672 case SERVICE_START_POST:
79008bdd 2673 log_unit_warning(UNIT(s)->id, "%s start-post operation timed out. Stopping.", UNIT(s)->id);
f42806df 2674 service_enter_stop(s, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2675 break;
2676
e2f3b44c 2677 case SERVICE_RELOAD:
79008bdd 2678 log_unit_warning(UNIT(s)->id, "%s reload operation timed out. Stopping.", UNIT(s)->id);
f42806df
LP
2679 s->reload_result = SERVICE_FAILURE_TIMEOUT;
2680 service_enter_running(s, SERVICE_SUCCESS);
e2f3b44c
LP
2681 break;
2682
034c6ed7 2683 case SERVICE_STOP:
79008bdd 2684 log_unit_warning(UNIT(s)->id, "%s stopping timed out. Terminating.", UNIT(s)->id);
f42806df 2685 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2686 break;
2687
db2cb23b 2688 case SERVICE_STOP_SIGABRT:
2ab2ab7b
LP
2689 log_unit_warning(UNIT(s)->id, "%s stop-sigabrt timed out. Terminating.", UNIT(s)->id);
2690 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_TIMEOUT);
db2cb23b
UTL
2691 break;
2692
034c6ed7 2693 case SERVICE_STOP_SIGTERM:
4819ff03 2694 if (s->kill_context.send_sigkill) {
79008bdd 2695 log_unit_warning(UNIT(s)->id, "%s stop-sigterm timed out. Killing.", UNIT(s)->id);
f42806df 2696 service_enter_signal(s, SERVICE_STOP_SIGKILL, SERVICE_FAILURE_TIMEOUT);
ba035df2 2697 } else {
79008bdd 2698 log_unit_warning(UNIT(s)->id, "%s stop-sigterm timed out. Skipping SIGKILL.", UNIT(s)->id);
f42806df 2699 service_enter_stop_post(s, SERVICE_FAILURE_TIMEOUT);
ba035df2
LP
2700 }
2701
034c6ed7
LP
2702 break;
2703
2704 case SERVICE_STOP_SIGKILL:
35b8ca3a 2705 /* Uh, we sent a SIGKILL and it is still not gone?
034c6ed7
LP
2706 * Must be something we cannot kill, so let's just be
2707 * weirded out and continue */
2708
79008bdd 2709 log_unit_warning(UNIT(s)->id, "%s still around after SIGKILL. Ignoring.", UNIT(s)->id);
f42806df 2710 service_enter_stop_post(s, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2711 break;
2712
2713 case SERVICE_STOP_POST:
79008bdd 2714 log_unit_warning(UNIT(s)->id, "%s stop-post timed out. Terminating.", UNIT(s)->id);
f42806df 2715 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2716 break;
2717
2718 case SERVICE_FINAL_SIGTERM:
4819ff03 2719 if (s->kill_context.send_sigkill) {
79008bdd 2720 log_unit_warning(UNIT(s)->id, "%s stop-final-sigterm timed out. Killing.", UNIT(s)->id);
f42806df 2721 service_enter_signal(s, SERVICE_FINAL_SIGKILL, SERVICE_FAILURE_TIMEOUT);
ba035df2 2722 } else {
79008bdd 2723 log_unit_warning(UNIT(s)->id, "%s stop-final-sigterm timed out. Skipping SIGKILL. Entering failed mode.", UNIT(s)->id);
f42806df 2724 service_enter_dead(s, SERVICE_FAILURE_TIMEOUT, false);
ba035df2
LP
2725 }
2726
034c6ed7
LP
2727 break;
2728
2729 case SERVICE_FINAL_SIGKILL:
79008bdd 2730 log_unit_warning(UNIT(s)->id, "%s still around after final SIGKILL. Entering failed mode.", UNIT(s)->id);
f42806df 2731 service_enter_dead(s, SERVICE_FAILURE_TIMEOUT, true);
034c6ed7
LP
2732 break;
2733
2734 case SERVICE_AUTO_RESTART:
79008bdd 2735 log_unit_info(UNIT(s)->id,
ef417cfd
ZJS
2736 s->restart_usec > 0 ?
2737 "%s holdoff time over, scheduling restart." :
2738 "%s has no holdoff time, scheduling restart.",
2739 UNIT(s)->id);
034c6ed7
LP
2740 service_enter_restart(s);
2741 break;
2742
2743 default:
2744 assert_not_reached("Timeout at wrong time.");
2745 }
718db961
LP
2746
2747 return 0;
2748}
2749
2750static int service_dispatch_watchdog(sd_event_source *source, usec_t usec, void *userdata) {
2751 Service *s = SERVICE(userdata);
a7850c7d 2752 char t[FORMAT_TIMESPAN_MAX];
718db961
LP
2753
2754 assert(s);
2755 assert(source == s->watchdog_event_source);
2756
79008bdd 2757 log_unit_error(UNIT(s)->id, "%s watchdog timeout (limit %s)!", UNIT(s)->id,
a7850c7d 2758 format_timespan(t, sizeof(t), s->watchdog_usec, 1));
8bb2d17d 2759
db2cb23b 2760 service_enter_signal(s, SERVICE_STOP_SIGABRT, SERVICE_FAILURE_WATCHDOG);
842129f5 2761
718db961 2762 return 0;
5cb5a6ff
LP
2763}
2764
a354329f 2765static void service_notify_message(Unit *u, pid_t pid, char **tags, FDSet *fds) {
8c47c732 2766 Service *s = SERVICE(u);
308d72dc 2767 _cleanup_free_ char *cc = NULL;
30b5275a 2768 bool notify_dbus = false;
308d72dc 2769 const char *e;
8c47c732
LP
2770
2771 assert(u);
2772
308d72dc 2773 cc = strv_join(tags, ", ");
79008bdd 2774 log_unit_debug(u->id, "%s: Got notification message from PID "PID_FMT" (%s)",
308d72dc 2775 u->id, pid, isempty(cc) ? "n/a" : cc);
da13d4d2 2776
c952c6ec 2777 if (s->notify_access == NOTIFY_NONE) {
79008bdd 2778 log_unit_warning(u->id, "%s: Got notification message from PID "PID_FMT", but reception is disabled.", u->id, pid);
c952c6ec
LP
2779 return;
2780 }
2781
336c6e46 2782 if (s->notify_access == NOTIFY_MAIN && pid != s->main_pid) {
336c6e46 2783 if (s->main_pid != 0)
79008bdd 2784 log_unit_warning(u->id, "%s: Got notification message from PID "PID_FMT", but reception only permitted for main PID "PID_FMT, u->id, pid, s->main_pid);
336c6e46 2785 else
79008bdd 2786 log_unit_debug(u->id, "%s: Got notification message from PID "PID_FMT", but reception only permitted for main PID which is currently not known", u->id, pid);
c952c6ec
LP
2787 return;
2788 }
2789
8c47c732 2790 /* Interpret MAINPID= */
28849dba 2791 e = strv_find_startswith(tags, "MAINPID=");
5e56b378 2792 if (e && IN_SET(s->state, SERVICE_START, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD)) {
28849dba 2793 if (parse_pid(e, &pid) < 0)
79008bdd 2794 log_unit_warning(u->id, "Failed to parse MAINPID= field in notification message: %s", e);
8c47c732 2795 else {
79008bdd 2796 log_unit_debug(u->id, "%s: got MAINPID=%s", u->id, e);
28849dba 2797
5925dd3c 2798 service_set_main_pid(s, pid);
7400b9d2 2799 unit_watch_pid(UNIT(s), pid);
30b5275a 2800 notify_dbus = true;
8c47c732
LP
2801 }
2802 }
2803
308d72dc
LP
2804 /* Interpret RELOADING= */
2805 if (strv_find(tags, "RELOADING=1")) {
2806
79008bdd 2807 log_unit_debug(u->id, "%s: got RELOADING=1", u->id);
308d72dc
LP
2808 s->notify_state = NOTIFY_RELOADING;
2809
2810 if (s->state == SERVICE_RUNNING)
2811 service_enter_reload_by_notify(s);
2812
2813 notify_dbus = true;
2814 }
2815
8c47c732 2816 /* Interpret READY= */
308d72dc
LP
2817 if (strv_find(tags, "READY=1")) {
2818
79008bdd 2819 log_unit_debug(u->id, "%s: got READY=1", u->id);
308d72dc
LP
2820 s->notify_state = NOTIFY_READY;
2821
2822 /* Type=notify services inform us about completed
2823 * initialization with READY=1 */
2824 if (s->type == SERVICE_NOTIFY && s->state == SERVICE_START)
2825 service_enter_start_post(s);
2826
2827 /* Sending READY=1 while we are reloading informs us
2828 * that the reloading is complete */
2829 if (s->state == SERVICE_RELOAD && s->control_pid == 0)
2830 service_enter_running(s, SERVICE_SUCCESS);
2831
2832 notify_dbus = true;
2833 }
2834
2835 /* Interpret STOPPING= */
2836 if (strv_find(tags, "STOPPING=1")) {
2837
79008bdd 2838 log_unit_debug(u->id, "%s: got STOPPING=1", u->id);
308d72dc
LP
2839 s->notify_state = NOTIFY_STOPPING;
2840
2841 if (s->state == SERVICE_RUNNING)
2842 service_enter_stop_by_notify(s);
2843
30b5275a 2844 notify_dbus = true;
8c47c732
LP
2845 }
2846
2847 /* Interpret STATUS= */
28849dba 2848 e = strv_find_startswith(tags, "STATUS=");
7f110ff9 2849 if (e) {
28849dba 2850 _cleanup_free_ char *t = NULL;
8c47c732 2851
28849dba
LP
2852 if (!isempty(e)) {
2853 if (!utf8_is_valid(e))
79008bdd 2854 log_unit_warning(u->id, "Status message in notification is not UTF-8 clean.");
28849dba 2855 else {
79008bdd 2856 log_unit_debug(u->id, "%s: got STATUS=%s", u->id, e);
7f110ff9 2857
28849dba
LP
2858 t = strdup(e);
2859 if (!t)
2860 log_oom();
3a2776bc 2861 }
28849dba 2862 }
8c47c732 2863
30b5275a 2864 if (!streq_ptr(s->status_text, t)) {
28849dba 2865
3a2776bc
LP
2866 free(s->status_text);
2867 s->status_text = t;
28849dba
LP
2868 t = NULL;
2869
30b5275a 2870 notify_dbus = true;
28849dba 2871 }
8c47c732 2872 }
842129f5 2873
4774e357 2874 /* Interpret ERRNO= */
28849dba 2875 e = strv_find_startswith(tags, "ERRNO=");
4774e357
MAA
2876 if (e) {
2877 int status_errno;
2878
28849dba 2879 if (safe_atoi(e, &status_errno) < 0 || status_errno < 0)
79008bdd 2880 log_unit_warning(u->id, "Failed to parse ERRNO= field in notification message: %s", e);
4774e357 2881 else {
79008bdd 2882 log_unit_debug(u->id, "%s: got ERRNO=%s", u->id, e);
4774e357
MAA
2883
2884 if (s->status_errno != status_errno) {
2885 s->status_errno = status_errno;
2886 notify_dbus = true;
2887 }
2888 }
2889 }
2890
6f285378 2891 /* Interpret WATCHDOG= */
a6927d7f 2892 if (strv_find(tags, "WATCHDOG=1")) {
79008bdd 2893 log_unit_debug(u->id, "%s: got WATCHDOG=1", u->id);
842129f5 2894 service_reset_watchdog(s);
a6927d7f 2895 }
c4e2ceae 2896
a354329f
LP
2897 /* Add the passed fds to the fd store */
2898 if (strv_find(tags, "FDSTORE=1")) {
2899 log_unit_debug(u->id, "%s: got FDSTORE=1", u->id);
2339fc93 2900 service_add_fd_store_set(s, fds);
a354329f
LP
2901 }
2902
c4e2ceae 2903 /* Notify clients about changed status or main pid */
30b5275a
LP
2904 if (notify_dbus)
2905 unit_add_to_dbus_queue(u);
8c47c732
LP
2906}
2907
68db7a3b
ZJS
2908static int service_get_timeout(Unit *u, uint64_t *timeout) {
2909 Service *s = SERVICE(u);
2910 int r;
2911
2912 if (!s->timer_event_source)
2913 return 0;
2914
2915 r = sd_event_source_get_time(s->timer_event_source, timeout);
2916 if (r < 0)
2917 return r;
2918
2919 return 1;
2920}
2921
05e343b7
LP
2922static void service_bus_name_owner_change(
2923 Unit *u,
2924 const char *name,
2925 const char *old_owner,
2926 const char *new_owner) {
2927
2928 Service *s = SERVICE(u);
718db961 2929 int r;
05e343b7
LP
2930
2931 assert(s);
2932 assert(name);
2933
2934 assert(streq(s->bus_name, name));
2935 assert(old_owner || new_owner);
2936
2937 if (old_owner && new_owner)
79008bdd 2938 log_unit_debug(u->id, "%s's D-Bus name %s changed owner from %s to %s", u->id, name, old_owner, new_owner);
05e343b7 2939 else if (old_owner)
79008bdd 2940 log_unit_debug(u->id, "%s's D-Bus name %s no longer registered by %s", u->id, name, old_owner);
05e343b7 2941 else
79008bdd 2942 log_unit_debug(u->id, "%s's D-Bus name %s now registered by %s", u->id, name, new_owner);
05e343b7
LP
2943
2944 s->bus_name_good = !!new_owner;
2945
2946 if (s->type == SERVICE_DBUS) {
2947
2948 /* service_enter_running() will figure out what to
2949 * do */
2950 if (s->state == SERVICE_RUNNING)
f42806df 2951 service_enter_running(s, SERVICE_SUCCESS);
05e343b7
LP
2952 else if (s->state == SERVICE_START && new_owner)
2953 service_enter_start_post(s);
2954
2955 } else if (new_owner &&
2956 s->main_pid <= 0 &&
2957 (s->state == SERVICE_START ||
2958 s->state == SERVICE_START_POST ||
2959 s->state == SERVICE_RUNNING ||
2960 s->state == SERVICE_RELOAD)) {
2961
5b12334d 2962 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
718db961 2963 pid_t pid;
05e343b7 2964
718db961 2965 /* Try to acquire PID from bus service */
05e343b7 2966
056f95d0 2967 r = sd_bus_get_name_creds(u->manager->api_bus, name, SD_BUS_CREDS_PID, &creds);
5b12334d
LP
2968 if (r >= 0)
2969 r = sd_bus_creds_get_pid(creds, &pid);
718db961 2970 if (r >= 0) {
79008bdd 2971 log_unit_debug(u->id, "%s's D-Bus name %s is now owned by process %u", u->id, name, (unsigned) pid);
05e343b7 2972
718db961
LP
2973 service_set_main_pid(s, pid);
2974 unit_watch_pid(UNIT(s), pid);
2975 }
7400b9d2 2976 }
05e343b7
LP
2977}
2978
16115b0a 2979int service_set_socket_fd(Service *s, int fd, Socket *sock, bool selinux_context_net) {
79a98c60
LP
2980 _cleanup_free_ char *peer = NULL;
2981 int r;
57020a3a 2982
4f2d528d
LP
2983 assert(s);
2984 assert(fd >= 0);
2985
2986 /* This is called by the socket code when instantiating a new
2987 * service for a stream socket and the socket needs to be
2988 * configured. */
2989
1124fe6f 2990 if (UNIT(s)->load_state != UNIT_LOADED)
4f2d528d
LP
2991 return -EINVAL;
2992
2993 if (s->socket_fd >= 0)
2994 return -EBUSY;
2995
2996 if (s->state != SERVICE_DEAD)
2997 return -EAGAIN;
2998
79a98c60
LP
2999 if (getpeername_pretty(fd, &peer) >= 0) {
3000
3001 if (UNIT(s)->description) {
3002 _cleanup_free_ char *a;
3003
3004 a = strjoin(UNIT(s)->description, " (", peer, ")", NULL);
3005 if (!a)
3006 return -ENOMEM;
3007
3008 r = unit_set_description(UNIT(s), a);
3009 } else
3010 r = unit_set_description(UNIT(s), peer);
3011
3012 if (r < 0)
3013 return r;
3014 }
3015
4f2d528d 3016 s->socket_fd = fd;
16115b0a 3017 s->socket_fd_selinux_context_net = selinux_context_net;
6cf6bbc2 3018
57020a3a
LP
3019 unit_ref_set(&s->accept_socket, UNIT(sock));
3020
3021 return unit_add_two_dependencies(UNIT(sock), UNIT_BEFORE, UNIT_TRIGGERS, UNIT(s), false);
4f2d528d
LP
3022}
3023
fdf20a31 3024static void service_reset_failed(Unit *u) {
5632e374
LP
3025 Service *s = SERVICE(u);
3026
3027 assert(s);
3028
fdf20a31 3029 if (s->state == SERVICE_FAILED)
5632e374
LP
3030 service_set_state(s, SERVICE_DEAD);
3031
f42806df
LP
3032 s->result = SERVICE_SUCCESS;
3033 s->reload_result = SERVICE_SUCCESS;
451b34cc
LP
3034
3035 RATELIMIT_RESET(s->start_limit);
5632e374
LP
3036}
3037
718db961 3038static int service_kill(Unit *u, KillWho who, int signo, sd_bus_error *error) {
8a0867d6 3039 Service *s = SERVICE(u);
41efeaec 3040
814cc562 3041 return unit_kill_common(u, who, signo, s->main_pid, s->control_pid, error);
8a0867d6
LP
3042}
3043
94f04347
LP
3044static const char* const service_state_table[_SERVICE_STATE_MAX] = {
3045 [SERVICE_DEAD] = "dead",
3046 [SERVICE_START_PRE] = "start-pre",
3047 [SERVICE_START] = "start",
3048 [SERVICE_START_POST] = "start-post",
3049 [SERVICE_RUNNING] = "running",
80876c20 3050 [SERVICE_EXITED] = "exited",
94f04347
LP
3051 [SERVICE_RELOAD] = "reload",
3052 [SERVICE_STOP] = "stop",
1378a3b5 3053 [SERVICE_STOP_SIGABRT] = "stop-sigabrt",
94f04347
LP
3054 [SERVICE_STOP_SIGTERM] = "stop-sigterm",
3055 [SERVICE_STOP_SIGKILL] = "stop-sigkill",
3056 [SERVICE_STOP_POST] = "stop-post",
3057 [SERVICE_FINAL_SIGTERM] = "final-sigterm",
3058 [SERVICE_FINAL_SIGKILL] = "final-sigkill",
fdf20a31 3059 [SERVICE_FAILED] = "failed",
94f04347
LP
3060 [SERVICE_AUTO_RESTART] = "auto-restart",
3061};
3062
3063DEFINE_STRING_TABLE_LOOKUP(service_state, ServiceState);
3064
3065static const char* const service_restart_table[_SERVICE_RESTART_MAX] = {
525ee6f4
LP
3066 [SERVICE_RESTART_NO] = "no",
3067 [SERVICE_RESTART_ON_SUCCESS] = "on-success",
50caaedb 3068 [SERVICE_RESTART_ON_FAILURE] = "on-failure",
6cfe2fde 3069 [SERVICE_RESTART_ON_ABNORMAL] = "on-abnormal",
dc99a976 3070 [SERVICE_RESTART_ON_WATCHDOG] = "on-watchdog",
50caaedb 3071 [SERVICE_RESTART_ON_ABORT] = "on-abort",
6cfe2fde 3072 [SERVICE_RESTART_ALWAYS] = "always",
94f04347
LP
3073};
3074
3075DEFINE_STRING_TABLE_LOOKUP(service_restart, ServiceRestart);
3076
3077static const char* const service_type_table[_SERVICE_TYPE_MAX] = {
94f04347 3078 [SERVICE_SIMPLE] = "simple",
0d624a78 3079 [SERVICE_FORKING] = "forking",
34e9ba66 3080 [SERVICE_ONESHOT] = "oneshot",
8c47c732 3081 [SERVICE_DBUS] = "dbus",
f2b68789
LP
3082 [SERVICE_NOTIFY] = "notify",
3083 [SERVICE_IDLE] = "idle"
94f04347
LP
3084};
3085
3086DEFINE_STRING_TABLE_LOOKUP(service_type, ServiceType);
3087
e537352b 3088static const char* const service_exec_command_table[_SERVICE_EXEC_COMMAND_MAX] = {
94f04347
LP
3089 [SERVICE_EXEC_START_PRE] = "ExecStartPre",
3090 [SERVICE_EXEC_START] = "ExecStart",
3091 [SERVICE_EXEC_START_POST] = "ExecStartPost",
3092 [SERVICE_EXEC_RELOAD] = "ExecReload",
3093 [SERVICE_EXEC_STOP] = "ExecStop",
3094 [SERVICE_EXEC_STOP_POST] = "ExecStopPost",
3095};
3096
3097DEFINE_STRING_TABLE_LOOKUP(service_exec_command, ServiceExecCommand);
3098
c952c6ec
LP
3099static const char* const notify_access_table[_NOTIFY_ACCESS_MAX] = {
3100 [NOTIFY_NONE] = "none",
3101 [NOTIFY_MAIN] = "main",
3102 [NOTIFY_ALL] = "all"
3103};
3104
3105DEFINE_STRING_TABLE_LOOKUP(notify_access, NotifyAccess);
3106
308d72dc
LP
3107static const char* const notify_state_table[_NOTIFY_STATE_MAX] = {
3108 [NOTIFY_UNKNOWN] = "unknown",
3109 [NOTIFY_READY] = "ready",
3110 [NOTIFY_RELOADING] = "reloading",
3111 [NOTIFY_STOPPING] = "stopping",
3112};
3113
3114DEFINE_STRING_TABLE_LOOKUP(notify_state, NotifyState);
3115
f42806df
LP
3116static const char* const service_result_table[_SERVICE_RESULT_MAX] = {
3117 [SERVICE_SUCCESS] = "success",
3118 [SERVICE_FAILURE_RESOURCES] = "resources",
3119 [SERVICE_FAILURE_TIMEOUT] = "timeout",
3120 [SERVICE_FAILURE_EXIT_CODE] = "exit-code",
3121 [SERVICE_FAILURE_SIGNAL] = "signal",
bb242b7b 3122 [SERVICE_FAILURE_CORE_DUMP] = "core-dump",
8d1b002a
LP
3123 [SERVICE_FAILURE_WATCHDOG] = "watchdog",
3124 [SERVICE_FAILURE_START_LIMIT] = "start-limit"
f42806df
LP
3125};
3126
3127DEFINE_STRING_TABLE_LOOKUP(service_result, ServiceResult);
3128
87f0e418 3129const UnitVTable service_vtable = {
7d17cfbc 3130 .object_size = sizeof(Service),
718db961
LP
3131 .exec_context_offset = offsetof(Service, exec_context),
3132 .cgroup_context_offset = offsetof(Service, cgroup_context),
3133 .kill_context_offset = offsetof(Service, kill_context),
613b411c 3134 .exec_runtime_offset = offsetof(Service, exec_runtime),
3ef63c31 3135
f975e971
LP
3136 .sections =
3137 "Unit\0"
3138 "Service\0"
3139 "Install\0",
4ad49000 3140 .private_section = "Service",
71645aca 3141
034c6ed7
LP
3142 .init = service_init,
3143 .done = service_done,
a16e1123 3144 .load = service_load,
a354329f 3145 .release_resources = service_release_resources,
a16e1123
LP
3146
3147 .coldplug = service_coldplug,
034c6ed7 3148
5cb5a6ff
LP
3149 .dump = service_dump,
3150
3151 .start = service_start,
3152 .stop = service_stop,
3153 .reload = service_reload,
3154
034c6ed7
LP
3155 .can_reload = service_can_reload,
3156
8a0867d6
LP
3157 .kill = service_kill,
3158
a16e1123
LP
3159 .serialize = service_serialize,
3160 .deserialize_item = service_deserialize_item,
3161
5cb5a6ff 3162 .active_state = service_active_state,
10a94420 3163 .sub_state_to_string = service_sub_state_to_string,
5cb5a6ff 3164
701cc384
LP
3165 .check_gc = service_check_gc,
3166 .check_snapshot = service_check_snapshot,
3167
034c6ed7 3168 .sigchld_event = service_sigchld_event,
2c4104f0 3169
fdf20a31 3170 .reset_failed = service_reset_failed,
5632e374 3171
4ad49000 3172 .notify_cgroup_empty = service_notify_cgroup_empty_event,
8c47c732 3173 .notify_message = service_notify_message,
8e274523 3174
05e343b7 3175 .bus_name_owner_change = service_bus_name_owner_change,
05e343b7 3176
c4e2ceae 3177 .bus_interface = "org.freedesktop.systemd1.Service",
718db961 3178 .bus_vtable = bus_service_vtable,
74c964d3
LP
3179 .bus_set_property = bus_service_set_property,
3180 .bus_commit_properties = bus_service_commit_properties,
4139c1b2 3181
68db7a3b 3182 .get_timeout = service_get_timeout,
718db961
LP
3183 .can_transient = true,
3184
c6918296
MS
3185 .status_message_formats = {
3186 .starting_stopping = {
3187 [0] = "Starting %s...",
3188 [1] = "Stopping %s...",
3189 },
3190 .finished_start_job = {
3191 [JOB_DONE] = "Started %s.",
3192 [JOB_FAILED] = "Failed to start %s.",
3193 [JOB_DEPENDENCY] = "Dependency failed for %s.",
3194 [JOB_TIMEOUT] = "Timed out starting %s.",
3195 },
3196 .finished_stop_job = {
3197 [JOB_DONE] = "Stopped %s.",
3198 [JOB_FAILED] = "Stopped (with error) %s.",
3199 [JOB_TIMEOUT] = "Timed out stopping %s.",
3200 },
3201 },
5cb5a6ff 3202};