]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/service.c
service: improve readability, by reducing line-breaks
[thirdparty/systemd.git] / src / core / service.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
5cb5a6ff 2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
a7334b09
LP
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 16 Lesser General Public License for more details.
a7334b09 17
5430f7f2 18 You should have received a copy of the GNU Lesser General Public License
a7334b09
LP
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
5cb5a6ff 22#include <errno.h>
034c6ed7 23#include <signal.h>
2c4104f0 24#include <unistd.h>
5cb5a6ff 25
574634bc 26#include "async.h"
4b939747 27#include "manager.h"
87f0e418 28#include "unit.h"
5cb5a6ff
LP
29#include "service.h"
30#include "load-fragment.h"
31#include "load-dropin.h"
034c6ed7 32#include "log.h"
2c4104f0 33#include "strv.h"
9e2f7c11 34#include "unit-name.h"
41f9172f 35#include "unit-printf.h"
4139c1b2 36#include "dbus-service.h"
514f4ef5 37#include "special.h"
9a57c629 38#include "exit-status.h"
f6a6225e 39#include "def.h"
9eb977db 40#include "path-util.h"
f6a6225e 41#include "util.h"
7f110ff9 42#include "utf8.h"
4d1a6904 43#include "env-util.h"
a5c32cff 44#include "fileio.h"
718db961
LP
45#include "bus-error.h"
46#include "bus-util.h"
e44da745 47#include "bus-kernel.h"
6482f626 48#include "formats-util.h"
0b452006 49#include "process-util.h"
034c6ed7 50
acbb0225 51static const UnitActiveState state_translation_table[_SERVICE_STATE_MAX] = {
87f0e418
LP
52 [SERVICE_DEAD] = UNIT_INACTIVE,
53 [SERVICE_START_PRE] = UNIT_ACTIVATING,
54 [SERVICE_START] = UNIT_ACTIVATING,
55 [SERVICE_START_POST] = UNIT_ACTIVATING,
56 [SERVICE_RUNNING] = UNIT_ACTIVE,
80876c20 57 [SERVICE_EXITED] = UNIT_ACTIVE,
032ff4af 58 [SERVICE_RELOAD] = UNIT_RELOADING,
87f0e418 59 [SERVICE_STOP] = UNIT_DEACTIVATING,
db2cb23b 60 [SERVICE_STOP_SIGABRT] = UNIT_DEACTIVATING,
87f0e418
LP
61 [SERVICE_STOP_SIGTERM] = UNIT_DEACTIVATING,
62 [SERVICE_STOP_SIGKILL] = UNIT_DEACTIVATING,
63 [SERVICE_STOP_POST] = UNIT_DEACTIVATING,
64 [SERVICE_FINAL_SIGTERM] = UNIT_DEACTIVATING,
65 [SERVICE_FINAL_SIGKILL] = UNIT_DEACTIVATING,
fdf20a31 66 [SERVICE_FAILED] = UNIT_FAILED,
6124958c 67 [SERVICE_AUTO_RESTART] = UNIT_ACTIVATING
034c6ed7 68};
5cb5a6ff 69
e056b01d
LP
70/* For Type=idle we never want to delay any other jobs, hence we
71 * consider idle jobs active as soon as we start working on them */
72static const UnitActiveState state_translation_table_idle[_SERVICE_STATE_MAX] = {
73 [SERVICE_DEAD] = UNIT_INACTIVE,
74 [SERVICE_START_PRE] = UNIT_ACTIVE,
75 [SERVICE_START] = UNIT_ACTIVE,
76 [SERVICE_START_POST] = UNIT_ACTIVE,
77 [SERVICE_RUNNING] = UNIT_ACTIVE,
78 [SERVICE_EXITED] = UNIT_ACTIVE,
79 [SERVICE_RELOAD] = UNIT_RELOADING,
80 [SERVICE_STOP] = UNIT_DEACTIVATING,
db2cb23b 81 [SERVICE_STOP_SIGABRT] = UNIT_DEACTIVATING,
e056b01d
LP
82 [SERVICE_STOP_SIGTERM] = UNIT_DEACTIVATING,
83 [SERVICE_STOP_SIGKILL] = UNIT_DEACTIVATING,
84 [SERVICE_STOP_POST] = UNIT_DEACTIVATING,
85 [SERVICE_FINAL_SIGTERM] = UNIT_DEACTIVATING,
86 [SERVICE_FINAL_SIGKILL] = UNIT_DEACTIVATING,
87 [SERVICE_FAILED] = UNIT_FAILED,
88 [SERVICE_AUTO_RESTART] = UNIT_ACTIVATING
89};
90
718db961
LP
91static int service_dispatch_io(sd_event_source *source, int fd, uint32_t events, void *userdata);
92static int service_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata);
93static int service_dispatch_watchdog(sd_event_source *source, usec_t usec, void *userdata);
94
842129f5 95static void service_enter_signal(Service *s, ServiceState state, ServiceResult f);
308d72dc 96static void service_enter_reload_by_notify(Service *s);
842129f5 97
a16e1123
LP
98static void service_init(Unit *u) {
99 Service *s = SERVICE(u);
100
101 assert(u);
ac155bb8 102 assert(u->load_state == UNIT_STUB);
a16e1123 103
1f19a534
OS
104 s->timeout_start_usec = u->manager->default_timeout_start_usec;
105 s->timeout_stop_usec = u->manager->default_timeout_stop_usec;
106 s->restart_usec = u->manager->default_restart_usec;
0b86feac 107 s->type = _SERVICE_TYPE_INVALID;
a16e1123 108 s->socket_fd = -1;
e44da745 109 s->bus_endpoint_fd = -1;
3185a36b 110 s->guess_main_pid = true;
a16e1123 111
085afe36 112 RATELIMIT_INIT(s->start_limit, u->manager->default_start_limit_interval, u->manager->default_start_limit_burst);
a16e1123
LP
113
114 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
115}
116
5e94833f
LP
117static void service_unwatch_control_pid(Service *s) {
118 assert(s);
119
120 if (s->control_pid <= 0)
121 return;
122
123 unit_unwatch_pid(UNIT(s), s->control_pid);
124 s->control_pid = 0;
125}
126
127static void service_unwatch_main_pid(Service *s) {
128 assert(s);
129
130 if (s->main_pid <= 0)
131 return;
132
133 unit_unwatch_pid(UNIT(s), s->main_pid);
134 s->main_pid = 0;
135}
136
3e52541e
MS
137static void service_unwatch_pid_file(Service *s) {
138 if (!s->pid_file_pathspec)
139 return;
140
79008bdd 141 log_unit_debug(UNIT(s)->id, "Stopping watch for %s's PID file %s", UNIT(s)->id, s->pid_file_pathspec->path);
718db961 142 path_spec_unwatch(s->pid_file_pathspec);
3e52541e
MS
143 path_spec_done(s->pid_file_pathspec);
144 free(s->pid_file_pathspec);
145 s->pid_file_pathspec = NULL;
146}
147
5925dd3c 148static int service_set_main_pid(Service *s, pid_t pid) {
e55224ca
LP
149 pid_t ppid;
150
5925dd3c
LP
151 assert(s);
152
153 if (pid <= 1)
154 return -EINVAL;
155
156 if (pid == getpid())
157 return -EINVAL;
158
7400b9d2
LP
159 if (s->main_pid == pid && s->main_pid_known)
160 return 0;
161
162 if (s->main_pid != pid) {
163 service_unwatch_main_pid(s);
164 exec_status_start(&s->main_exec_status, pid);
165 }
41efeaec 166
6dfa5494
LP
167 s->main_pid = pid;
168 s->main_pid_known = true;
169
170 if (get_parent_of_pid(pid, &ppid) >= 0 && ppid != getpid()) {
79008bdd 171 log_unit_warning(UNIT(s)->id, "%s: Supervising process "PID_FMT" which is not our child. We'll most likely not notice when it exits.", UNIT(s)->id, pid);
6dfa5494
LP
172 s->main_pid_alien = true;
173 } else
174 s->main_pid_alien = false;
5925dd3c
LP
175
176 return 0;
177}
178
4f2d528d
LP
179static void service_close_socket_fd(Service *s) {
180 assert(s);
181
574634bc 182 s->socket_fd = asynchronous_close(s->socket_fd);
4f2d528d
LP
183}
184
6cf6bbc2
LP
185static void service_connection_unref(Service *s) {
186 assert(s);
187
9444b1f2 188 if (!UNIT_ISSET(s->accept_socket))
6cf6bbc2
LP
189 return;
190
57020a3a
LP
191 socket_connection_unref(SOCKET(UNIT_DEREF(s->accept_socket)));
192 unit_ref_unset(&s->accept_socket);
6cf6bbc2
LP
193}
194
a6927d7f
MO
195static void service_stop_watchdog(Service *s) {
196 assert(s);
197
718db961 198 s->watchdog_event_source = sd_event_source_unref(s->watchdog_event_source);
842129f5 199 s->watchdog_timestamp = DUAL_TIMESTAMP_NULL;
a6927d7f
MO
200}
201
842129f5 202static void service_start_watchdog(Service *s) {
bb242b7b
MO
203 int r;
204
205 assert(s);
206
842129f5 207 if (s->watchdog_usec <= 0)
bb242b7b
MO
208 return;
209
718db961
LP
210 if (s->watchdog_event_source) {
211 r = sd_event_source_set_time(s->watchdog_event_source, s->watchdog_timestamp.monotonic + s->watchdog_usec);
212 if (r < 0) {
31938a85 213 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to reset watchdog timer: %m", UNIT(s)->id);
718db961
LP
214 return;
215 }
216
842129f5 217 r = sd_event_source_set_enabled(s->watchdog_event_source, SD_EVENT_ONESHOT);
c4ef3317 218 } else {
6a0f1f6d
LP
219 r = sd_event_add_time(
220 UNIT(s)->manager->event,
221 &s->watchdog_event_source,
222 CLOCK_MONOTONIC,
223 s->watchdog_timestamp.monotonic + s->watchdog_usec, 0,
224 service_dispatch_watchdog, s);
c4ef3317 225 if (r < 0) {
31938a85 226 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to add watchdog timer: %m", UNIT(s)->id);
c4ef3317
LP
227 return;
228 }
229
230 /* Let's process everything else which might be a sign
231 * of living before we consider a service died. */
232 r = sd_event_source_set_priority(s->watchdog_event_source, SD_EVENT_PRIORITY_IDLE);
233 }
718db961 234
bb242b7b 235 if (r < 0)
31938a85 236 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to install watchdog timer: %m", UNIT(s)->id);
bb242b7b
MO
237}
238
a6927d7f
MO
239static void service_reset_watchdog(Service *s) {
240 assert(s);
241
242 dual_timestamp_get(&s->watchdog_timestamp);
842129f5 243 service_start_watchdog(s);
a6927d7f
MO
244}
245
a354329f
LP
246static void service_fd_store_unlink(ServiceFDStore *fs) {
247
248 if (!fs)
249 return;
250
251 if (fs->service) {
252 assert(fs->service->n_fd_store > 0);
253 LIST_REMOVE(fd_store, fs->service->fd_store, fs);
254 fs->service->n_fd_store--;
255 }
256
257 if (fs->event_source) {
258 sd_event_source_set_enabled(fs->event_source, SD_EVENT_OFF);
259 sd_event_source_unref(fs->event_source);
260 }
261
262 safe_close(fs->fd);
263 free(fs);
264}
265
266static void service_release_resources(Unit *u) {
267 Service *s = SERVICE(u);
268
269 assert(s);
270
271 if (!s->fd_store)
272 return;
273
274 log_debug("Releasing all resources for %s", u->id);
275
276 while (s->fd_store)
277 service_fd_store_unlink(s->fd_store);
278
279 assert(s->n_fd_store == 0);
280}
281
87f0e418
LP
282static void service_done(Unit *u) {
283 Service *s = SERVICE(u);
44d8db9e
LP
284
285 assert(s);
286
287 free(s->pid_file);
288 s->pid_file = NULL;
289
8c47c732
LP
290 free(s->status_text);
291 s->status_text = NULL;
292
efe6e7d3
MO
293 free(s->reboot_arg);
294 s->reboot_arg = NULL;
295
613b411c 296 s->exec_runtime = exec_runtime_unref(s->exec_runtime);
e537352b 297 exec_command_free_array(s->exec_command, _SERVICE_EXEC_COMMAND_MAX);
44d8db9e 298 s->control_command = NULL;
867b3b7d 299 s->main_command = NULL;
44d8db9e 300
37520c1b
LP
301 exit_status_set_free(&s->restart_prevent_status);
302 exit_status_set_free(&s->restart_force_status);
303 exit_status_set_free(&s->success_status);
96342de6 304
44d8db9e
LP
305 /* This will leak a process, but at least no memory or any of
306 * our resources */
5e94833f
LP
307 service_unwatch_main_pid(s);
308 service_unwatch_control_pid(s);
3e52541e 309 service_unwatch_pid_file(s);
44d8db9e 310
05e343b7 311 if (s->bus_name) {
ac155bb8 312 unit_unwatch_bus_name(u, s->bus_name);
05e343b7
LP
313 free(s->bus_name);
314 s->bus_name = NULL;
315 }
316
e44da745 317 s->bus_endpoint_fd = safe_close(s->bus_endpoint_fd);
4f2d528d 318 service_close_socket_fd(s);
6cf6bbc2 319 service_connection_unref(s);
4f2d528d 320
57020a3a 321 unit_ref_unset(&s->accept_socket);
f976f3f6 322
bb242b7b
MO
323 service_stop_watchdog(s);
324
718db961 325 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
a354329f
LP
326
327 service_release_resources(u);
718db961
LP
328}
329
2339fc93
LP
330static int on_fd_store_io(sd_event_source *e, int fd, uint32_t revents, void *userdata) {
331 ServiceFDStore *fs = userdata;
332
333 assert(e);
334 assert(fs);
335
336 /* If we get either EPOLLHUP or EPOLLERR, it's time to remove this entry from the fd store */
337 service_fd_store_unlink(fs);
338 return 0;
339}
340
341static int service_add_fd_store(Service *s, int fd) {
342 ServiceFDStore *fs;
343 int r;
344
345 assert(s);
346 assert(fd >= 0);
347
348 if (s->n_fd_store >= s->n_fd_store_max)
349 return 0;
350
351 LIST_FOREACH(fd_store, fs, s->fd_store) {
352 r = same_fd(fs->fd, fd);
353 if (r < 0)
354 return r;
355 if (r > 0) {
356 /* Already included */
357 safe_close(fd);
358 return 1;
359 }
360 }
361
362 fs = new0(ServiceFDStore, 1);
363 if (!fs)
364 return -ENOMEM;
365
366 fs->fd = fd;
367 fs->service = s;
368
369 r = sd_event_add_io(UNIT(s)->manager->event, &fs->event_source, fd, 0, on_fd_store_io, fs);
370 if (r < 0) {
371 free(fs);
372 return r;
373 }
374
375 LIST_PREPEND(fd_store, s->fd_store, fs);
376 s->n_fd_store++;
377
378 return 1;
379}
380
381static int service_add_fd_store_set(Service *s, FDSet *fds) {
382 int r;
383
384 assert(s);
385
386 if (fdset_size(fds) <= 0)
387 return 0;
388
389 while (s->n_fd_store < s->n_fd_store_max) {
390 _cleanup_close_ int fd = -1;
391
392 fd = fdset_steal_first(fds);
393 if (fd < 0)
394 break;
395
396 r = service_add_fd_store(s, fd);
397 if (r < 0)
398 return log_unit_error_errno(UNIT(s)->id, r, "%s: Couldn't add fd to fd store: %m", UNIT(s)->id);
399
400 if (r > 0) {
401 log_unit_debug(UNIT(s)->id, "%s: added fd to fd store.", UNIT(s)->id);
402 fd = -1;
403 }
404 }
405
406 if (fdset_size(fds) > 0)
407 log_unit_warning(UNIT(s)->id, "%s: tried to store more fds than FDStoreMax=%u allows, closing remaining.", UNIT(s)->id, s->n_fd_store_max);
408
409 return 0;
410}
411
718db961
LP
412static int service_arm_timer(Service *s, usec_t usec) {
413 int r;
414
415 assert(s);
416
718db961
LP
417 if (s->timer_event_source) {
418 r = sd_event_source_set_time(s->timer_event_source, now(CLOCK_MONOTONIC) + usec);
419 if (r < 0)
420 return r;
421
422 return sd_event_source_set_enabled(s->timer_event_source, SD_EVENT_ONESHOT);
423 }
424
6a0f1f6d
LP
425 return sd_event_add_time(
426 UNIT(s)->manager->event,
427 &s->timer_event_source,
428 CLOCK_MONOTONIC,
429 now(CLOCK_MONOTONIC) + usec, 0,
430 service_dispatch_timer, s);
44d8db9e
LP
431}
432
243b1432
LP
433static int service_verify(Service *s) {
434 assert(s);
435
1124fe6f 436 if (UNIT(s)->load_state != UNIT_LOADED)
243b1432
LP
437 return 0;
438
96fb8242 439 if (!s->exec_command[SERVICE_EXEC_START] && !s->exec_command[SERVICE_EXEC_STOP]) {
79008bdd 440 log_unit_error(UNIT(s)->id, "%s lacks both ExecStart= and ExecStop= setting. Refusing.", UNIT(s)->id);
243b1432
LP
441 return -EINVAL;
442 }
443
96fb8242 444 if (s->type != SERVICE_ONESHOT && !s->exec_command[SERVICE_EXEC_START]) {
79008bdd 445 log_unit_error(UNIT(s)->id, "%s has no ExecStart= setting, which is only allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
96fb8242
LP
446 return -EINVAL;
447 }
448
449 if (!s->remain_after_exit && !s->exec_command[SERVICE_EXEC_START]) {
79008bdd 450 log_unit_error(UNIT(s)->id, "%s has no ExecStart= setting, which is only allowed for RemainAfterExit=yes services. Refusing.", UNIT(s)->id);
96fb8242
LP
451 return -EINVAL;
452 }
453
454 if (s->type != SERVICE_ONESHOT && s->exec_command[SERVICE_EXEC_START]->command_next) {
79008bdd 455 log_unit_error(UNIT(s)->id, "%s has more than one ExecStart= setting, which is only allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
6cf6bbc2
LP
456 return -EINVAL;
457 }
458
b0693d30 459 if (s->type == SERVICE_ONESHOT && s->restart != SERVICE_RESTART_NO) {
79008bdd 460 log_unit_error(UNIT(s)->id, "%s has Restart= setting other than no, which isn't allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
37520c1b
LP
461 return -EINVAL;
462 }
463
55ebf98c 464 if (s->type == SERVICE_ONESHOT && !exit_status_set_is_empty(&s->restart_force_status)) {
79008bdd 465 log_unit_error(UNIT(s)->id, "%s has RestartForceStatus= set, which isn't allowed for Type=oneshot services. Refusing.", UNIT(s)->id);
b0693d30
MW
466 return -EINVAL;
467 }
468
05e343b7 469 if (s->type == SERVICE_DBUS && !s->bus_name) {
79008bdd 470 log_unit_error(UNIT(s)->id, "%s is of type D-Bus but no D-Bus service name has been specified. Refusing.", UNIT(s)->id);
4d0e5dbd
LP
471 return -EINVAL;
472 }
473
7e2668c6 474 if (s->bus_name && s->type != SERVICE_DBUS)
79008bdd 475 log_unit_warning(UNIT(s)->id, "%s has a D-Bus service name specified, but is not of type dbus. Ignoring.", UNIT(s)->id);
7e2668c6 476
ebc2259d 477 if (s->exec_context.pam_name && !(s->kill_context.kill_mode == KILL_CONTROL_GROUP || s->kill_context.kill_mode == KILL_MIXED)) {
79008bdd 478 log_unit_error(UNIT(s)->id, "%s has PAM enabled. Kill mode must be set to 'control-group' or 'mixed'. Refusing.", UNIT(s)->id);
05e343b7
LP
479 return -EINVAL;
480 }
481
243b1432
LP
482 return 0;
483}
484
a40eb732
LP
485static int service_add_default_dependencies(Service *s) {
486 int r;
487
488 assert(s);
489
490 /* Add a number of automatic dependencies useful for the
491 * majority of services. */
492
493 /* First, pull in base system */
8bb2d17d 494 r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_BASIC_TARGET, NULL, true);
fccd44ec
KS
495 if (r < 0)
496 return r;
a40eb732
LP
497
498 /* Second, activate normal shutdown */
8545f7ce 499 return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
a40eb732
LP
500}
501
4dfc092a
LP
502static void service_fix_output(Service *s) {
503 assert(s);
504
505 /* If nothing has been explicitly configured, patch default
506 * output in. If input is socket/tty we avoid this however,
507 * since in that case we want output to default to the same
508 * place as we read input from. */
509
510 if (s->exec_context.std_error == EXEC_OUTPUT_INHERIT &&
511 s->exec_context.std_output == EXEC_OUTPUT_INHERIT &&
512 s->exec_context.std_input == EXEC_INPUT_NULL)
1124fe6f 513 s->exec_context.std_error = UNIT(s)->manager->default_std_error;
4dfc092a
LP
514
515 if (s->exec_context.std_output == EXEC_OUTPUT_INHERIT &&
516 s->exec_context.std_input == EXEC_INPUT_NULL)
1124fe6f 517 s->exec_context.std_output = UNIT(s)->manager->default_std_output;
4dfc092a
LP
518}
519
8545f7ce
LP
520static int service_add_extras(Service *s) {
521 int r;
522
523 assert(s);
524
525 if (s->type == _SERVICE_TYPE_INVALID) {
526 /* Figure out a type automatically */
527 if (s->bus_name)
528 s->type = SERVICE_DBUS;
529 else if (s->exec_command[SERVICE_EXEC_START])
530 s->type = SERVICE_SIMPLE;
531 else
532 s->type = SERVICE_ONESHOT;
533 }
534
535 /* Oneshot services have disabled start timeout by default */
536 if (s->type == SERVICE_ONESHOT && !s->start_timeout_defined)
537 s->timeout_start_usec = 0;
538
539 service_fix_output(s);
540
541 r = unit_patch_contexts(UNIT(s));
542 if (r < 0)
543 return r;
544
545 r = unit_add_exec_dependencies(UNIT(s), &s->exec_context);
546 if (r < 0)
547 return r;
548
549 r = unit_add_default_slice(UNIT(s), &s->cgroup_context);
550 if (r < 0)
551 return r;
552
553 if (s->type == SERVICE_NOTIFY && s->notify_access == NOTIFY_NONE)
554 s->notify_access = NOTIFY_MAIN;
555
556 if (s->watchdog_usec > 0 && s->notify_access == NOTIFY_NONE)
557 s->notify_access = NOTIFY_MAIN;
558
559 if (s->bus_name) {
6962fd3b 560#ifdef ENABLE_KDBUS
8545f7ce
LP
561 const char *n;
562
6962fd3b
MB
563 n = strjoina(s->bus_name, ".busname");
564 r = unit_add_dependency_by_name(UNIT(s), UNIT_AFTER, n, NULL, true);
8545f7ce
LP
565 if (r < 0)
566 return r;
6962fd3b 567#endif
8545f7ce 568
6962fd3b 569 r = unit_watch_bus_name(UNIT(s), s->bus_name);
8545f7ce
LP
570 if (r < 0)
571 return r;
572 }
573
574 if (UNIT(s)->default_dependencies) {
575 r = service_add_default_dependencies(s);
576 if (r < 0)
577 return r;
578 }
579
580 return 0;
581}
582
e537352b 583static int service_load(Unit *u) {
e537352b 584 Service *s = SERVICE(u);
8bb2d17d 585 int r;
e537352b
LP
586
587 assert(s);
1e2e8133 588
5cb5a6ff 589 /* Load a .service file */
c2756a68
LP
590 r = unit_load_fragment(u);
591 if (r < 0)
5cb5a6ff
LP
592 return r;
593
23a177ef 594 /* Still nothing found? Then let's give up */
ac155bb8 595 if (u->load_state == UNIT_STUB)
23a177ef 596 return -ENOENT;
034c6ed7 597
23a177ef 598 /* This is a new unit? Then let's add in some extras */
ac155bb8 599 if (u->load_state == UNIT_LOADED) {
c2756a68
LP
600
601 /* We were able to load something, then let's add in
602 * the dropin directories. */
603 r = unit_load_dropin(u);
604 if (r < 0)
605 return r;
606
8545f7ce
LP
607 /* This is a new unit? Then let's add in some
608 * extras */
609 r = service_add_extras(s);
598459ce
LP
610 if (r < 0)
611 return r;
8e274523
LP
612 }
613
243b1432 614 return service_verify(s);
034c6ed7
LP
615}
616
87f0e418 617static void service_dump(Unit *u, FILE *f, const char *prefix) {
5cb5a6ff 618 ServiceExecCommand c;
87f0e418 619 Service *s = SERVICE(u);
47be870b 620 const char *prefix2;
5cb5a6ff
LP
621
622 assert(s);
623
4c940960 624 prefix = strempty(prefix);
63c372cb 625 prefix2 = strjoina(prefix, "\t");
44d8db9e 626
5cb5a6ff 627 fprintf(f,
81a2b7ce 628 "%sService State: %s\n"
f42806df
LP
629 "%sResult: %s\n"
630 "%sReload Result: %s\n"
81a2b7ce 631 "%sPermissionsStartOnly: %s\n"
8e274523 632 "%sRootDirectoryStartOnly: %s\n"
02ee865a 633 "%sRemainAfterExit: %s\n"
3185a36b 634 "%sGuessMainPID: %s\n"
c952c6ec 635 "%sType: %s\n"
2cf3143a 636 "%sRestart: %s\n"
308d72dc
LP
637 "%sNotifyAccess: %s\n"
638 "%sNotifyState: %s\n",
81a2b7ce 639 prefix, service_state_to_string(s->state),
f42806df
LP
640 prefix, service_result_to_string(s->result),
641 prefix, service_result_to_string(s->reload_result),
81a2b7ce 642 prefix, yes_no(s->permissions_start_only),
8e274523 643 prefix, yes_no(s->root_directory_start_only),
02ee865a 644 prefix, yes_no(s->remain_after_exit),
3185a36b 645 prefix, yes_no(s->guess_main_pid),
c952c6ec 646 prefix, service_type_to_string(s->type),
2cf3143a 647 prefix, service_restart_to_string(s->restart),
308d72dc
LP
648 prefix, notify_access_to_string(s->notify_access),
649 prefix, notify_state_to_string(s->notify_state));
5cb5a6ff 650
70123e68
LP
651 if (s->control_pid > 0)
652 fprintf(f,
ccd06097
ZJS
653 "%sControl PID: "PID_FMT"\n",
654 prefix, s->control_pid);
70123e68
LP
655
656 if (s->main_pid > 0)
657 fprintf(f,
ccd06097 658 "%sMain PID: "PID_FMT"\n"
6dfa5494
LP
659 "%sMain PID Known: %s\n"
660 "%sMain PID Alien: %s\n",
ccd06097 661 prefix, s->main_pid,
6dfa5494
LP
662 prefix, yes_no(s->main_pid_known),
663 prefix, yes_no(s->main_pid_alien));
70123e68 664
034c6ed7
LP
665 if (s->pid_file)
666 fprintf(f,
667 "%sPIDFile: %s\n",
668 prefix, s->pid_file);
669
05e343b7
LP
670 if (s->bus_name)
671 fprintf(f,
672 "%sBusName: %s\n"
673 "%sBus Name Good: %s\n",
674 prefix, s->bus_name,
675 prefix, yes_no(s->bus_name_good));
676
4819ff03 677 kill_context_dump(&s->kill_context, f, prefix);
5cb5a6ff
LP
678 exec_context_dump(&s->exec_context, f, prefix);
679
e537352b 680 for (c = 0; c < _SERVICE_EXEC_COMMAND_MAX; c++) {
5cb5a6ff 681
44d8db9e
LP
682 if (!s->exec_command[c])
683 continue;
684
40d50879 685 fprintf(f, "%s-> %s:\n",
94f04347 686 prefix, service_exec_command_to_string(c));
44d8db9e
LP
687
688 exec_command_dump_list(s->exec_command[c], f, prefix2);
5cb5a6ff 689 }
44d8db9e 690
8c47c732
LP
691 if (s->status_text)
692 fprintf(f, "%sStatus Text: %s\n",
693 prefix, s->status_text);
a354329f
LP
694
695 if (s->n_fd_store_max > 0) {
696 fprintf(f,
697 "%sFile Descriptor Store Max: %u\n"
698 "%sFile Descriptor Store Current: %u\n",
699 prefix, s->n_fd_store_max,
700 prefix, s->n_fd_store);
701 }
5cb5a6ff
LP
702}
703
c5419d42 704static int service_load_pid_file(Service *s, bool may_warn) {
7fd1b19b 705 _cleanup_free_ char *k = NULL;
034c6ed7 706 int r;
5925dd3c 707 pid_t pid;
034c6ed7
LP
708
709 assert(s);
710
034c6ed7 711 if (!s->pid_file)
13230d5d 712 return -ENOENT;
034c6ed7 713
117dcc57
ZJS
714 r = read_one_line_file(s->pid_file, &k);
715 if (r < 0) {
c5419d42 716 if (may_warn)
79008bdd 717 log_unit_info(UNIT(s)->id, "PID file %s not readable (yet?) after %s.", s->pid_file, service_state_to_string(s->state));
034c6ed7 718 return r;
5375410b 719 }
034c6ed7 720
5925dd3c 721 r = parse_pid(k, &pid);
bc41f93e
ZJS
722 if (r < 0) {
723 if (may_warn)
31938a85 724 log_unit_info_errno(UNIT(s)->id, r, "Failed to read PID from file %s: %m", s->pid_file);
5925dd3c 725 return r;
bc41f93e 726 }
406eaf93 727
9f5650ae 728 if (!pid_is_alive(pid)) {
c5419d42 729 if (may_warn)
79008bdd 730 log_unit_info(UNIT(s)->id, "PID "PID_FMT" read from file %s does not exist or is a zombie.", pid, s->pid_file);
e10c9985
YS
731 return -ESRCH;
732 }
733
db01f8b3
MS
734 if (s->main_pid_known) {
735 if (pid == s->main_pid)
736 return 0;
737
79008bdd 738 log_unit_debug(UNIT(s)->id, "Main PID changing: "PID_FMT" -> "PID_FMT, s->main_pid, pid);
8bb2d17d 739
db01f8b3
MS
740 service_unwatch_main_pid(s);
741 s->main_pid_known = false;
3a111838 742 } else
79008bdd 743 log_unit_debug(UNIT(s)->id, "Main PID loaded: "PID_FMT, pid);
db01f8b3 744
117dcc57
ZJS
745 r = service_set_main_pid(s, pid);
746 if (r < 0)
16f6025e
LP
747 return r;
748
117dcc57 749 r = unit_watch_pid(UNIT(s), pid);
bc41f93e 750 if (r < 0) {
5925dd3c 751 /* FIXME: we need to do something here */
79008bdd 752 log_unit_warning(UNIT(s)->id, "Failed to watch PID "PID_FMT" from service %s", pid, UNIT(s)->id);
5925dd3c 753 return r;
bc41f93e 754 }
034c6ed7
LP
755
756 return 0;
757}
758
4fbf50b3
LP
759static int service_search_main_pid(Service *s) {
760 pid_t pid;
761 int r;
762
763 assert(s);
764
3185a36b
LP
765 /* If we know it anyway, don't ever fallback to unreliable
766 * heuristics */
4fbf50b3
LP
767 if (s->main_pid_known)
768 return 0;
769
3185a36b
LP
770 if (!s->guess_main_pid)
771 return 0;
772
4fbf50b3
LP
773 assert(s->main_pid <= 0);
774
4ad49000 775 pid = unit_search_main_pid(UNIT(s));
117dcc57 776 if (pid <= 0)
4fbf50b3
LP
777 return -ENOENT;
778
79008bdd 779 log_unit_debug(UNIT(s)->id, "Main PID guessed: "PID_FMT, pid);
117dcc57
ZJS
780 r = service_set_main_pid(s, pid);
781 if (r < 0)
4fbf50b3
LP
782 return r;
783
117dcc57 784 r = unit_watch_pid(UNIT(s), pid);
8bb2d17d 785 if (r < 0) {
4fbf50b3 786 /* FIXME: we need to do something here */
79008bdd 787 log_unit_warning(UNIT(s)->id, "Failed to watch PID "PID_FMT" from service %s", pid, UNIT(s)->id);
8bb2d17d
LP
788 return r;
789 }
790
791 return 0;
4fbf50b3
LP
792}
793
034c6ed7
LP
794static void service_set_state(Service *s, ServiceState state) {
795 ServiceState old_state;
e056b01d 796 const UnitActiveState *table;
842129f5 797
5cb5a6ff
LP
798 assert(s);
799
e056b01d
LP
800 table = s->type == SERVICE_IDLE ? state_translation_table_idle : state_translation_table;
801
034c6ed7 802 old_state = s->state;
5cb5a6ff 803 s->state = state;
034c6ed7 804
3a111838
MS
805 service_unwatch_pid_file(s);
806
842129f5
LP
807 if (!IN_SET(state,
808 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
809 SERVICE_RELOAD,
57614eb1 810 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
842129f5
LP
811 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL,
812 SERVICE_AUTO_RESTART))
718db961 813 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
034c6ed7 814
842129f5
LP
815 if (!IN_SET(state,
816 SERVICE_START, SERVICE_START_POST,
817 SERVICE_RUNNING, SERVICE_RELOAD,
57614eb1 818 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55 819 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
5e94833f 820 service_unwatch_main_pid(s);
867b3b7d
LP
821 s->main_command = NULL;
822 }
034c6ed7 823
842129f5
LP
824 if (!IN_SET(state,
825 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
826 SERVICE_RELOAD,
57614eb1 827 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
842129f5 828 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
5e94833f 829 service_unwatch_control_pid(s);
034c6ed7 830 s->control_command = NULL;
a16e1123 831 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
e537352b 832 }
034c6ed7 833
a911bb9a
LP
834 if (IN_SET(state, SERVICE_DEAD, SERVICE_FAILED, SERVICE_AUTO_RESTART))
835 unit_unwatch_all_pids(UNIT(s));
836
842129f5
LP
837 if (!IN_SET(state,
838 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
839 SERVICE_RUNNING, SERVICE_RELOAD,
57614eb1
LP
840 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
841 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL) &&
1124fe6f 842 !(state == SERVICE_DEAD && UNIT(s)->job)) {
4f2d528d 843 service_close_socket_fd(s);
6cf6bbc2
LP
844 service_connection_unref(s);
845 }
4f2d528d 846
7596e9e1 847 if (!IN_SET(state, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD))
a6927d7f
MO
848 service_stop_watchdog(s);
849
f6023656
LP
850 /* For the inactive states unit_notify() will trim the cgroup,
851 * but for exit we have to do that ourselves... */
1124fe6f 852 if (state == SERVICE_EXITED && UNIT(s)->manager->n_reloading <= 0)
b1491eba 853 unit_destroy_cgroup_if_empty(UNIT(s));
f6023656 854
9cd86184
OB
855 /* For remain_after_exit services, let's see if we can "release" the
856 * hold on the console, since unit_notify() only does that in case of
857 * change of state */
f49650ce
LP
858 if (state == SERVICE_EXITED &&
859 s->remain_after_exit &&
9cd86184 860 UNIT(s)->manager->n_on_console > 0) {
f49650ce
LP
861
862 ExecContext *ec;
863
864 ec = unit_get_exec_context(UNIT(s));
9cd86184
OB
865 if (ec && exec_context_may_touch_console(ec)) {
866 Manager *m = UNIT(s)->manager;
867
868 m->n_on_console --;
869 if (m->n_on_console == 0)
870 /* unset no_console_output flag, since the console is free */
871 m->no_console_output = false;
872 }
873 }
874
e537352b 875 if (old_state != state)
79008bdd 876 log_unit_debug(UNIT(s)->id, "%s changed %s -> %s", UNIT(s)->id, service_state_to_string(old_state), service_state_to_string(state));
acbb0225 877
e056b01d 878 unit_notify(UNIT(s), table[old_state], table[state], s->reload_result == SERVICE_SUCCESS);
f42806df 879 s->reload_result = SERVICE_SUCCESS;
034c6ed7
LP
880}
881
6e392c9c 882static int service_coldplug(Unit *u, Hashmap *deferred_work) {
a16e1123
LP
883 Service *s = SERVICE(u);
884 int r;
885
886 assert(s);
887 assert(s->state == SERVICE_DEAD);
888
889 if (s->deserialized_state != s->state) {
890
bf108e55
LP
891 if (IN_SET(s->deserialized_state,
892 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
893 SERVICE_RELOAD,
57614eb1 894 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55 895 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
92c1622e
LP
896
897 usec_t k;
6c12b52e 898
bf108e55 899 k = IN_SET(s->deserialized_state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST, SERVICE_RELOAD) ? s->timeout_start_usec : s->timeout_stop_usec;
e558336f 900
92c1622e
LP
901 /* For the start/stop timeouts 0 means off */
902 if (k > 0) {
903 r = service_arm_timer(s, k);
36697dc0 904 if (r < 0)
e558336f
LP
905 return r;
906 }
907 }
a16e1123 908
92c1622e
LP
909 if (s->deserialized_state == SERVICE_AUTO_RESTART) {
910
911 /* The restart timeouts 0 means immediately */
912 r = service_arm_timer(s, s->restart_usec);
913 if (r < 0)
914 return r;
915 }
916
9f5650ae 917 if (pid_is_unwaited(s->main_pid) &&
bf108e55
LP
918 ((s->deserialized_state == SERVICE_START && IN_SET(s->type, SERVICE_FORKING, SERVICE_DBUS, SERVICE_ONESHOT, SERVICE_NOTIFY)) ||
919 IN_SET(s->deserialized_state,
920 SERVICE_START, SERVICE_START_POST,
921 SERVICE_RUNNING, SERVICE_RELOAD,
57614eb1 922 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55
LP
923 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL))) {
924 r = unit_watch_pid(UNIT(s), s->main_pid);
925 if (r < 0)
926 return r;
927 }
a16e1123 928
9f5650ae 929 if (pid_is_unwaited(s->control_pid) &&
bf108e55
LP
930 IN_SET(s->deserialized_state,
931 SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST,
932 SERVICE_RELOAD,
57614eb1 933 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
bf108e55
LP
934 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL)) {
935 r = unit_watch_pid(UNIT(s), s->control_pid);
936 if (r < 0)
937 return r;
938 }
a16e1123 939
a911bb9a
LP
940 if (!IN_SET(s->deserialized_state, SERVICE_DEAD, SERVICE_FAILED, SERVICE_AUTO_RESTART))
941 unit_watch_all_pids(UNIT(s));
942
842129f5
LP
943 if (IN_SET(s->deserialized_state, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD))
944 service_start_watchdog(s);
bb242b7b 945
a16e1123
LP
946 service_set_state(s, s->deserialized_state);
947 }
92c1622e 948
a16e1123
LP
949 return 0;
950}
951
44d8db9e 952static int service_collect_fds(Service *s, int **fds, unsigned *n_fds) {
a354329f
LP
953 _cleanup_free_ int *rfds = NULL;
954 unsigned rn_fds = 0;
44d8db9e
LP
955 Iterator i;
956 int r;
57020a3a 957 Unit *u;
44d8db9e
LP
958
959 assert(s);
960 assert(fds);
961 assert(n_fds);
962
6cf6bbc2
LP
963 if (s->socket_fd >= 0)
964 return 0;
965
1124fe6f 966 SET_FOREACH(u, UNIT(s)->dependencies[UNIT_TRIGGERED_BY], i) {
44d8db9e
LP
967 int *cfds;
968 unsigned cn_fds;
57020a3a
LP
969 Socket *sock;
970
ac155bb8 971 if (u->type != UNIT_SOCKET)
57020a3a
LP
972 continue;
973
974 sock = SOCKET(u);
44d8db9e 975
117dcc57
ZJS
976 r = socket_collect_fds(sock, &cfds, &cn_fds);
977 if (r < 0)
a354329f 978 return r;
44d8db9e 979
a354329f
LP
980 if (cn_fds <= 0) {
981 free(cfds);
44d8db9e 982 continue;
a354329f 983 }
44d8db9e
LP
984
985 if (!rfds) {
986 rfds = cfds;
987 rn_fds = cn_fds;
988 } else {
989 int *t;
990
a354329f 991 t = realloc(rfds, (rn_fds + cn_fds) * sizeof(int));
117dcc57 992 if (!t) {
44d8db9e 993 free(cfds);
a354329f 994 return -ENOMEM;
44d8db9e
LP
995 }
996
a354329f
LP
997 memcpy(t + rn_fds, cfds, cn_fds * sizeof(int));
998 rfds = t;
999 rn_fds += cn_fds;
1000
44d8db9e
LP
1001 free(cfds);
1002
44d8db9e
LP
1003 }
1004 }
1005
a354329f
LP
1006 if (s->n_fd_store > 0) {
1007 ServiceFDStore *fs;
1008 int *t;
1009
1010 t = realloc(rfds, (rn_fds + s->n_fd_store) * sizeof(int));
1011 if (!t)
1012 return -ENOMEM;
1013
1014 rfds = t;
1015 LIST_FOREACH(fd_store, fs, s->fd_store)
1016 rfds[rn_fds++] = fs->fd;
1017 }
1018
44d8db9e
LP
1019 *fds = rfds;
1020 *n_fds = rn_fds;
3e33402a 1021
a354329f 1022 rfds = NULL;
44d8db9e 1023 return 0;
44d8db9e
LP
1024}
1025
81a2b7ce
LP
1026static int service_spawn(
1027 Service *s,
1028 ExecCommand *c,
21b2ce39 1029 usec_t timeout,
81a2b7ce
LP
1030 bool pass_fds,
1031 bool apply_permissions,
1032 bool apply_chroot,
1e3ad081 1033 bool apply_tty_stdin,
ecedd90f 1034 bool is_control,
81a2b7ce
LP
1035 pid_t *_pid) {
1036
034c6ed7
LP
1037 pid_t pid;
1038 int r;
117dcc57 1039 int *fds = NULL;
7fd1b19b 1040 _cleanup_free_ int *fdsbuf = NULL;
2105e76a 1041 unsigned n_fds = 0, n_env = 0;
e44da745 1042 _cleanup_free_ char *bus_endpoint_path = NULL;
7fd1b19b 1043 _cleanup_strv_free_ char
117dcc57 1044 **argv = NULL, **final_env = NULL, **our_env = NULL;
4ad49000 1045 const char *path;
9fa95f85
DM
1046 ExecParameters exec_params = {
1047 .apply_permissions = apply_permissions,
1048 .apply_chroot = apply_chroot,
1049 .apply_tty_stdin = apply_tty_stdin,
e44da745 1050 .bus_endpoint_fd = -1,
16115b0a 1051 .selinux_context_net = s->socket_fd_selinux_context_net
9fa95f85 1052 };
034c6ed7
LP
1053
1054 assert(s);
1055 assert(c);
1056 assert(_pid);
1057
5ad096b3
LP
1058 (void) unit_realize_cgroup(UNIT(s));
1059 if (s->reset_cpu_usage) {
1060 (void) unit_reset_cpu_usage(UNIT(s));
1061 s->reset_cpu_usage = false;
1062 }
4ad49000 1063
613b411c
LP
1064 r = unit_setup_exec_runtime(UNIT(s));
1065 if (r < 0)
1066 goto fail;
1067
6cf6bbc2
LP
1068 if (pass_fds ||
1069 s->exec_context.std_input == EXEC_INPUT_SOCKET ||
1070 s->exec_context.std_output == EXEC_OUTPUT_SOCKET ||
1071 s->exec_context.std_error == EXEC_OUTPUT_SOCKET) {
1072
4f2d528d
LP
1073 if (s->socket_fd >= 0) {
1074 fds = &s->socket_fd;
1075 n_fds = 1;
6cf6bbc2 1076 } else {
117dcc57
ZJS
1077 r = service_collect_fds(s, &fdsbuf, &n_fds);
1078 if (r < 0)
6cf6bbc2
LP
1079 goto fail;
1080
1081 fds = fdsbuf;
1082 }
4f2d528d 1083 }
44d8db9e 1084
21b2ce39
LP
1085 if (timeout > 0) {
1086 r = service_arm_timer(s, timeout);
92c1622e
LP
1087 if (r < 0)
1088 goto fail;
1089 } else
1090 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
034c6ed7 1091
19f6d710
LP
1092 r = unit_full_printf_strv(UNIT(s), c->argv, &argv);
1093 if (r < 0)
9e2f7c11 1094 goto fail;
9e2f7c11 1095
3b1c5241 1096 our_env = new0(char*, 6);
97ae63e2 1097 if (!our_env) {
2105e76a
LP
1098 r = -ENOMEM;
1099 goto fail;
1100 }
c952c6ec 1101
a158dbf1 1102 if (is_control ? s->notify_access == NOTIFY_ALL : s->notify_access != NOTIFY_NONE)
1124fe6f 1103 if (asprintf(our_env + n_env++, "NOTIFY_SOCKET=%s", UNIT(s)->manager->notify_socket) < 0) {
c952c6ec
LP
1104 r = -ENOMEM;
1105 goto fail;
1106 }
1107
2105e76a 1108 if (s->main_pid > 0)
ccd06097 1109 if (asprintf(our_env + n_env++, "MAINPID="PID_FMT, s->main_pid) < 0) {
c952c6ec
LP
1110 r = -ENOMEM;
1111 goto fail;
1112 }
2105e76a 1113
4ad49000 1114 if (UNIT(s)->manager->running_as != SYSTEMD_SYSTEM)
ccd06097 1115 if (asprintf(our_env + n_env++, "MANAGERPID="PID_FMT, getpid()) < 0) {
97ae63e2
LP
1116 r = -ENOMEM;
1117 goto fail;
1118 }
1119
3b1c5241
SL
1120 if (UNIT_DEREF(s->accept_socket)) {
1121 union sockaddr_union sa;
1122 socklen_t salen = sizeof(sa);
1123
1124 r = getpeername(s->socket_fd, &sa.sa, &salen);
1125 if (r < 0) {
1126 r = -errno;
1127 goto fail;
1128 }
1129
1130 if (IN_SET(sa.sa.sa_family, AF_INET, AF_INET6)) {
1131 _cleanup_free_ char *addr = NULL;
1132 char *t;
1133 int port;
1134
1135 r = sockaddr_pretty(&sa.sa, salen, true, false, &addr);
1136 if (r < 0)
1137 goto fail;
1138
1139 t = strappend("REMOTE_ADDR=", addr);
1140 if (!t) {
1141 r = -ENOMEM;
1142 goto fail;
1143 }
1144 our_env[n_env++] = t;
1145
1146 port = sockaddr_port(&sa.sa);
1147 if (port < 0) {
1148 r = port;
1149 goto fail;
1150 }
1151
1152 if (asprintf(&t, "REMOTE_PORT=%u", port) < 0) {
1153 r = -ENOMEM;
1154 goto fail;
1155 }
1156 our_env[n_env++] = t;
1157 }
1158 }
1159
97ae63e2
LP
1160 final_env = strv_env_merge(2, UNIT(s)->manager->environment, our_env, NULL);
1161 if (!final_env) {
2105e76a
LP
1162 r = -ENOMEM;
1163 goto fail;
1164 }
c952c6ec 1165
4ad49000 1166 if (is_control && UNIT(s)->cgroup_path) {
63c372cb 1167 path = strjoina(UNIT(s)->cgroup_path, "/control");
4ad49000
LP
1168 cg_create(SYSTEMD_CGROUP_CONTROLLER, path);
1169 } else
1170 path = UNIT(s)->cgroup_path;
1171
e44da745
DM
1172#ifdef ENABLE_KDBUS
1173 if (s->exec_context.bus_endpoint) {
1174 r = bus_kernel_create_endpoint(UNIT(s)->manager->running_as == SYSTEMD_SYSTEM ? "system" : "user",
1175 UNIT(s)->id, &bus_endpoint_path);
1176 if (r < 0)
1177 goto fail;
1178
1179 /* Pass the fd to the exec_params so that the child process can upload the policy.
1180 * Keep a reference to the fd in the service, so the endpoint is kept alive as long
1181 * as the service is running. */
1182 exec_params.bus_endpoint_fd = s->bus_endpoint_fd = r;
1183 }
1184#endif
1185
9fa95f85
DM
1186 exec_params.argv = argv;
1187 exec_params.fds = fds;
1188 exec_params.n_fds = n_fds;
1189 exec_params.environment = final_env;
1190 exec_params.confirm_spawn = UNIT(s)->manager->confirm_spawn;
1191 exec_params.cgroup_supported = UNIT(s)->manager->cgroup_supported;
1192 exec_params.cgroup_path = path;
a931ad47 1193 exec_params.cgroup_delegate = s->cgroup_context.delegate;
9fa95f85
DM
1194 exec_params.runtime_prefix = manager_get_runtime_prefix(UNIT(s)->manager);
1195 exec_params.unit_id = UNIT(s)->id;
1196 exec_params.watchdog_usec = s->watchdog_usec;
e44da745 1197 exec_params.bus_endpoint_path = bus_endpoint_path;
9fa95f85
DM
1198 if (s->type == SERVICE_IDLE)
1199 exec_params.idle_pipe = UNIT(s)->manager->idle_pipe;
1200
9e2f7c11 1201 r = exec_spawn(c,
9e2f7c11 1202 &s->exec_context,
9fa95f85 1203 &exec_params,
613b411c 1204 s->exec_runtime,
9e2f7c11 1205 &pid);
9e2f7c11 1206 if (r < 0)
034c6ed7
LP
1207 goto fail;
1208
117dcc57
ZJS
1209 r = unit_watch_pid(UNIT(s), pid);
1210 if (r < 0)
034c6ed7
LP
1211 /* FIXME: we need to do something here */
1212 goto fail;
1213
1214 *_pid = pid;
1215
5cb5a6ff 1216 return 0;
034c6ed7
LP
1217
1218fail:
1219 if (timeout)
718db961 1220 s->timer_event_source = sd_event_source_unref(s->timer_event_source);
034c6ed7
LP
1221
1222 return r;
1223}
1224
80876c20
LP
1225static int main_pid_good(Service *s) {
1226 assert(s);
1227
1228 /* Returns 0 if the pid is dead, 1 if it is good, -1 if we
1229 * don't know */
1230
1231 /* If we know the pid file, then lets just check if it is
1232 * still valid */
6dfa5494
LP
1233 if (s->main_pid_known) {
1234
1235 /* If it's an alien child let's check if it is still
1236 * alive ... */
62220cf7 1237 if (s->main_pid_alien && s->main_pid > 0)
9f5650ae 1238 return pid_is_alive(s->main_pid);
6dfa5494
LP
1239
1240 /* .. otherwise assume we'll get a SIGCHLD for it,
1241 * which we really should wait for to collect exit
1242 * status and code */
80876c20 1243 return s->main_pid > 0;
6dfa5494 1244 }
80876c20
LP
1245
1246 /* We don't know the pid */
1247 return -EAGAIN;
1248}
1249
44a6b1b6 1250_pure_ static int control_pid_good(Service *s) {
80876c20
LP
1251 assert(s);
1252
1253 return s->control_pid > 0;
1254}
1255
1256static int cgroup_good(Service *s) {
1257 int r;
1258
1259 assert(s);
1260
4ad49000
LP
1261 if (!UNIT(s)->cgroup_path)
1262 return 0;
1263
1264 r = cg_is_empty_recursive(SYSTEMD_CGROUP_CONTROLLER, UNIT(s)->cgroup_path, true);
117dcc57 1265 if (r < 0)
80876c20
LP
1266 return r;
1267
1268 return !r;
1269}
1270
f42806df 1271static void service_enter_dead(Service *s, ServiceResult f, bool allow_restart) {
034c6ed7
LP
1272 int r;
1273 assert(s);
1274
f42806df
LP
1275 if (f != SERVICE_SUCCESS)
1276 s->result = f;
034c6ed7 1277
0c7f15b3
MS
1278 service_set_state(s, s->result != SERVICE_SUCCESS ? SERVICE_FAILED : SERVICE_DEAD);
1279
2928b0a8 1280 if (s->result != SERVICE_SUCCESS) {
79008bdd 1281 log_unit_warning(UNIT(s)->id, "%s failed.", UNIT(s)->id);
2928b0a8
LP
1282 failure_action(UNIT(s)->manager, s->failure_action, s->reboot_arg);
1283 }
93ae25e6 1284
034c6ed7 1285 if (allow_restart &&
47342320 1286 !s->forbid_restart &&
034c6ed7 1287 (s->restart == SERVICE_RESTART_ALWAYS ||
f42806df
LP
1288 (s->restart == SERVICE_RESTART_ON_SUCCESS && s->result == SERVICE_SUCCESS) ||
1289 (s->restart == SERVICE_RESTART_ON_FAILURE && s->result != SERVICE_SUCCESS) ||
6cfe2fde 1290 (s->restart == SERVICE_RESTART_ON_ABNORMAL && !IN_SET(s->result, SERVICE_SUCCESS, SERVICE_FAILURE_EXIT_CODE)) ||
dc99a976 1291 (s->restart == SERVICE_RESTART_ON_WATCHDOG && s->result == SERVICE_FAILURE_WATCHDOG) ||
37520c1b 1292 (s->restart == SERVICE_RESTART_ON_ABORT && IN_SET(s->result, SERVICE_FAILURE_SIGNAL, SERVICE_FAILURE_CORE_DUMP)) ||
3e2d435b 1293 (s->main_exec_status.code == CLD_EXITED && set_contains(s->restart_force_status.status, INT_TO_PTR(s->main_exec_status.status))) ||
37520c1b 1294 (IN_SET(s->main_exec_status.code, CLD_KILLED, CLD_DUMPED) && set_contains(s->restart_force_status.signal, INT_TO_PTR(s->main_exec_status.status)))) &&
3e2d435b 1295 (s->main_exec_status.code != CLD_EXITED || !set_contains(s->restart_prevent_status.status, INT_TO_PTR(s->main_exec_status.status))) &&
37520c1b 1296 (!IN_SET(s->main_exec_status.code, CLD_KILLED, CLD_DUMPED) || !set_contains(s->restart_prevent_status.signal, INT_TO_PTR(s->main_exec_status.status)))) {
034c6ed7 1297
718db961 1298 r = service_arm_timer(s, s->restart_usec);
f42806df 1299 if (r < 0)
034c6ed7
LP
1300 goto fail;
1301
1302 service_set_state(s, SERVICE_AUTO_RESTART);
0c7f15b3 1303 }
034c6ed7 1304
47342320
LP
1305 s->forbid_restart = false;
1306
e66cf1a3 1307 /* We want fresh tmpdirs in case service is started again immediately */
613b411c
LP
1308 exec_runtime_destroy(s->exec_runtime);
1309 s->exec_runtime = exec_runtime_unref(s->exec_runtime);
c17ec25e 1310
e66cf1a3
LP
1311 /* Also, remove the runtime directory in */
1312 exec_context_destroy_runtime_directory(&s->exec_context, manager_get_runtime_prefix(UNIT(s)->manager));
1313
9285c9ff
LN
1314 /* Try to delete the pid file. At this point it will be
1315 * out-of-date, and some software might be confused by it, so
1316 * let's remove it. */
1317 if (s->pid_file)
1318 unlink_noerrno(s->pid_file);
1319
034c6ed7
LP
1320 return;
1321
1322fail:
31938a85 1323 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run install restart timer: %m", UNIT(s)->id);
f42806df 1324 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, false);
034c6ed7
LP
1325}
1326
f42806df 1327static void service_enter_stop_post(Service *s, ServiceResult f) {
034c6ed7
LP
1328 int r;
1329 assert(s);
1330
f42806df
LP
1331 if (f != SERVICE_SUCCESS)
1332 s->result = f;
034c6ed7 1333
5e94833f 1334 service_unwatch_control_pid(s);
a911bb9a 1335 unit_watch_all_pids(UNIT(s));
5e94833f 1336
117dcc57
ZJS
1337 s->control_command = s->exec_command[SERVICE_EXEC_STOP_POST];
1338 if (s->control_command) {
867b3b7d
LP
1339 s->control_command_id = SERVICE_EXEC_STOP_POST;
1340
ecedd90f
LP
1341 r = service_spawn(s,
1342 s->control_command,
21b2ce39 1343 s->timeout_stop_usec,
ecedd90f
LP
1344 false,
1345 !s->permissions_start_only,
1346 !s->root_directory_start_only,
1347 true,
ecedd90f
LP
1348 true,
1349 &s->control_pid);
1350 if (r < 0)
034c6ed7
LP
1351 goto fail;
1352
80876c20
LP
1353 service_set_state(s, SERVICE_STOP_POST);
1354 } else
ac84d1fb 1355 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_SUCCESS);
034c6ed7
LP
1356
1357 return;
1358
1359fail:
31938a85 1360 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'stop-post' task: %m", UNIT(s)->id);
f42806df 1361 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1362}
1363
4940c0b0
LP
1364static int state_to_kill_operation(ServiceState state) {
1365 switch (state) {
1366
1367 case SERVICE_STOP_SIGABRT:
1368 return KILL_ABORT;
1369
1370 case SERVICE_STOP_SIGTERM:
1371 case SERVICE_FINAL_SIGTERM:
1372 return KILL_TERMINATE;
1373
1374 case SERVICE_STOP_SIGKILL:
1375 case SERVICE_FINAL_SIGKILL:
1376 return KILL_KILL;
1377
1378 default:
1379 return _KILL_OPERATION_INVALID;
1380 }
1381}
1382
f42806df 1383static void service_enter_signal(Service *s, ServiceState state, ServiceResult f) {
034c6ed7 1384 int r;
034c6ed7
LP
1385
1386 assert(s);
1387
f42806df
LP
1388 if (f != SERVICE_SUCCESS)
1389 s->result = f;
034c6ed7 1390
a911bb9a
LP
1391 unit_watch_all_pids(UNIT(s));
1392
cd2086fe
LP
1393 r = unit_kill_context(
1394 UNIT(s),
1395 &s->kill_context,
4940c0b0 1396 state_to_kill_operation(state),
cd2086fe
LP
1397 s->main_pid,
1398 s->control_pid,
1399 s->main_pid_alien);
ac84d1fb 1400
cd2086fe
LP
1401 if (r < 0)
1402 goto fail;
034c6ed7 1403
cd2086fe 1404 if (r > 0) {
d568a335 1405 if (s->timeout_stop_usec > 0) {
718db961 1406 r = service_arm_timer(s, s->timeout_stop_usec);
d568a335 1407 if (r < 0)
e558336f 1408 goto fail;
d568a335 1409 }
d6ea93e3 1410
80876c20 1411 service_set_state(s, state);
1db0db4b 1412 } else if (IN_SET(state, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM) && s->kill_context.send_sigkill)
ac84d1fb 1413 service_enter_signal(s, SERVICE_STOP_SIGKILL, SERVICE_SUCCESS);
1db0db4b 1414 else if (IN_SET(state, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL))
f42806df 1415 service_enter_stop_post(s, SERVICE_SUCCESS);
1db0db4b 1416 else if (state == SERVICE_FINAL_SIGTERM && s->kill_context.send_sigkill)
ac84d1fb 1417 service_enter_signal(s, SERVICE_FINAL_SIGKILL, SERVICE_SUCCESS);
80876c20 1418 else
f42806df 1419 service_enter_dead(s, SERVICE_SUCCESS, true);
034c6ed7
LP
1420
1421 return;
1422
1423fail:
31938a85 1424 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to kill processes: %m", UNIT(s)->id);
034c6ed7 1425
a00973af 1426 if (IN_SET(state, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL))
f42806df 1427 service_enter_stop_post(s, SERVICE_FAILURE_RESOURCES);
034c6ed7 1428 else
f42806df 1429 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, true);
034c6ed7
LP
1430}
1431
308d72dc
LP
1432static void service_enter_stop_by_notify(Service *s) {
1433 assert(s);
1434
1435 unit_watch_all_pids(UNIT(s));
1436
1437 if (s->timeout_stop_usec > 0)
1438 service_arm_timer(s, s->timeout_stop_usec);
1439
6041a7ee
MS
1440 /* The service told us it's stopping, so it's as if we SIGTERM'd it. */
1441 service_set_state(s, SERVICE_STOP_SIGTERM);
308d72dc
LP
1442}
1443
f42806df 1444static void service_enter_stop(Service *s, ServiceResult f) {
034c6ed7 1445 int r;
5925dd3c 1446
034c6ed7
LP
1447 assert(s);
1448
f42806df
LP
1449 if (f != SERVICE_SUCCESS)
1450 s->result = f;
034c6ed7 1451
5e94833f 1452 service_unwatch_control_pid(s);
a911bb9a 1453 unit_watch_all_pids(UNIT(s));
5e94833f 1454
117dcc57
ZJS
1455 s->control_command = s->exec_command[SERVICE_EXEC_STOP];
1456 if (s->control_command) {
867b3b7d
LP
1457 s->control_command_id = SERVICE_EXEC_STOP;
1458
ecedd90f
LP
1459 r = service_spawn(s,
1460 s->control_command,
21b2ce39 1461 s->timeout_stop_usec,
ecedd90f
LP
1462 false,
1463 !s->permissions_start_only,
1464 !s->root_directory_start_only,
1465 false,
ecedd90f
LP
1466 true,
1467 &s->control_pid);
1468 if (r < 0)
034c6ed7
LP
1469 goto fail;
1470
80876c20
LP
1471 service_set_state(s, SERVICE_STOP);
1472 } else
f42806df 1473 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_SUCCESS);
034c6ed7
LP
1474
1475 return;
1476
1477fail:
31938a85 1478 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'stop' task: %m", UNIT(s)->id);
f42806df 1479 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1480}
1481
f42806df 1482static void service_enter_running(Service *s, ServiceResult f) {
4eab639f 1483 int main_pid_ok, cgroup_ok;
80876c20
LP
1484 assert(s);
1485
f42806df
LP
1486 if (f != SERVICE_SUCCESS)
1487 s->result = f;
80876c20 1488
4eab639f
LP
1489 main_pid_ok = main_pid_good(s);
1490 cgroup_ok = cgroup_good(s);
1491
1492 if ((main_pid_ok > 0 || (main_pid_ok < 0 && cgroup_ok != 0)) &&
308d72dc
LP
1493 (s->bus_name_good || s->type != SERVICE_DBUS)) {
1494
1495 /* If there are any queued up sd_notify()
1496 * notifications, process them now */
1497 if (s->notify_state == NOTIFY_RELOADING)
1498 service_enter_reload_by_notify(s);
1499 else if (s->notify_state == NOTIFY_STOPPING)
1500 service_enter_stop_by_notify(s);
1501 else
1502 service_set_state(s, SERVICE_RUNNING);
1503
1504 } else if (s->remain_after_exit)
80876c20
LP
1505 service_set_state(s, SERVICE_EXITED);
1506 else
f42806df 1507 service_enter_stop(s, SERVICE_SUCCESS);
80876c20
LP
1508}
1509
034c6ed7
LP
1510static void service_enter_start_post(Service *s) {
1511 int r;
1512 assert(s);
1513
5e94833f 1514 service_unwatch_control_pid(s);
842129f5 1515 service_reset_watchdog(s);
bb242b7b 1516
117dcc57
ZJS
1517 s->control_command = s->exec_command[SERVICE_EXEC_START_POST];
1518 if (s->control_command) {
867b3b7d
LP
1519 s->control_command_id = SERVICE_EXEC_START_POST;
1520
ecedd90f
LP
1521 r = service_spawn(s,
1522 s->control_command,
21b2ce39 1523 s->timeout_start_usec,
ecedd90f
LP
1524 false,
1525 !s->permissions_start_only,
1526 !s->root_directory_start_only,
1527 false,
ecedd90f
LP
1528 true,
1529 &s->control_pid);
1530 if (r < 0)
034c6ed7
LP
1531 goto fail;
1532
80876c20
LP
1533 service_set_state(s, SERVICE_START_POST);
1534 } else
f42806df 1535 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
1536
1537 return;
1538
1539fail:
31938a85 1540 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'start-post' task: %m", UNIT(s)->id);
f42806df 1541 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1542}
1543
4ad49000
LP
1544static void service_kill_control_processes(Service *s) {
1545 char *p;
1546
1547 if (!UNIT(s)->cgroup_path)
1548 return;
1549
63c372cb 1550 p = strjoina(UNIT(s)->cgroup_path, "/control");
4ad49000
LP
1551 cg_kill_recursive(SYSTEMD_CGROUP_CONTROLLER, p, SIGKILL, true, true, true, NULL);
1552}
1553
034c6ed7 1554static void service_enter_start(Service *s) {
4ad49000 1555 ExecCommand *c;
034c6ed7
LP
1556 pid_t pid;
1557 int r;
1558
1559 assert(s);
1560
41efeaec
LP
1561 service_unwatch_control_pid(s);
1562 service_unwatch_main_pid(s);
80876c20 1563
8f53a7b8
LP
1564 /* We want to ensure that nobody leaks processes from
1565 * START_PRE here, so let's go on a killing spree, People
1566 * should not spawn long running processes from START_PRE. */
4ad49000 1567 service_kill_control_processes(s);
8f53a7b8 1568
867b3b7d
LP
1569 if (s->type == SERVICE_FORKING) {
1570 s->control_command_id = SERVICE_EXEC_START;
1571 c = s->control_command = s->exec_command[SERVICE_EXEC_START];
1572
1573 s->main_command = NULL;
1574 } else {
1575 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
1576 s->control_command = NULL;
1577
1578 c = s->main_command = s->exec_command[SERVICE_EXEC_START];
1579 }
34e9ba66 1580
96fb8242
LP
1581 if (!c) {
1582 assert(s->type == SERVICE_ONESHOT);
1583 service_enter_start_post(s);
1584 return;
1585 }
1586
ecedd90f
LP
1587 r = service_spawn(s,
1588 c,
21b2ce39 1589 IN_SET(s->type, SERVICE_FORKING, SERVICE_DBUS, SERVICE_NOTIFY, SERVICE_ONESHOT) ? s->timeout_start_usec : 0,
ecedd90f
LP
1590 true,
1591 true,
1592 true,
1593 true,
ecedd90f
LP
1594 false,
1595 &pid);
1596 if (r < 0)
034c6ed7
LP
1597 goto fail;
1598
f2b68789 1599 if (s->type == SERVICE_SIMPLE || s->type == SERVICE_IDLE) {
034c6ed7
LP
1600 /* For simple services we immediately start
1601 * the START_POST binaries. */
1602
5925dd3c 1603 service_set_main_pid(s, pid);
034c6ed7
LP
1604 service_enter_start_post(s);
1605
1606 } else if (s->type == SERVICE_FORKING) {
1607
1608 /* For forking services we wait until the start
1609 * process exited. */
1610
e55224ca 1611 s->control_pid = pid;
80876c20
LP
1612 service_set_state(s, SERVICE_START);
1613
34e9ba66 1614 } else if (s->type == SERVICE_ONESHOT ||
8c47c732
LP
1615 s->type == SERVICE_DBUS ||
1616 s->type == SERVICE_NOTIFY) {
7d55e835 1617
34e9ba66 1618 /* For oneshot services we wait until the start
7d55e835
LP
1619 * process exited, too, but it is our main process. */
1620
05e343b7 1621 /* For D-Bus services we know the main pid right away,
8c47c732
LP
1622 * but wait for the bus name to appear on the
1623 * bus. Notify services are similar. */
05e343b7 1624
5925dd3c 1625 service_set_main_pid(s, pid);
80876c20 1626 service_set_state(s, SERVICE_START);
034c6ed7
LP
1627 } else
1628 assert_not_reached("Unknown service type");
1629
1630 return;
1631
1632fail:
31938a85 1633 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'start' task: %m", UNIT(s)->id);
f42806df 1634 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7
LP
1635}
1636
1637static void service_enter_start_pre(Service *s) {
1638 int r;
1639
1640 assert(s);
1641
5e94833f
LP
1642 service_unwatch_control_pid(s);
1643
117dcc57
ZJS
1644 s->control_command = s->exec_command[SERVICE_EXEC_START_PRE];
1645 if (s->control_command) {
8f53a7b8
LP
1646 /* Before we start anything, let's clear up what might
1647 * be left from previous runs. */
4ad49000 1648 service_kill_control_processes(s);
8f53a7b8 1649
867b3b7d
LP
1650 s->control_command_id = SERVICE_EXEC_START_PRE;
1651
ecedd90f
LP
1652 r = service_spawn(s,
1653 s->control_command,
21b2ce39 1654 s->timeout_start_usec,
ecedd90f
LP
1655 false,
1656 !s->permissions_start_only,
1657 !s->root_directory_start_only,
1658 true,
ecedd90f
LP
1659 true,
1660 &s->control_pid);
1661 if (r < 0)
034c6ed7
LP
1662 goto fail;
1663
80876c20
LP
1664 service_set_state(s, SERVICE_START_PRE);
1665 } else
034c6ed7
LP
1666 service_enter_start(s);
1667
1668 return;
1669
1670fail:
31938a85 1671 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'start-pre' task: %m", UNIT(s)->id);
f42806df 1672 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, true);
034c6ed7
LP
1673}
1674
1675static void service_enter_restart(Service *s) {
718db961 1676 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
034c6ed7 1677 int r;
398ef8ba 1678
034c6ed7
LP
1679 assert(s);
1680
a8bb2e65
LP
1681 if (UNIT(s)->job && UNIT(s)->job->type == JOB_STOP) {
1682 /* Don't restart things if we are going down anyway */
79008bdd 1683 log_unit_info(UNIT(s)->id, "Stop job pending for unit, delaying automatic restart.");
2edfa366 1684
718db961 1685 r = service_arm_timer(s, s->restart_usec);
a8bb2e65 1686 if (r < 0)
2edfa366 1687 goto fail;
feae8adb
DW
1688
1689 return;
2edfa366
LP
1690 }
1691
48bb5876
DW
1692 /* Any units that are bound to this service must also be
1693 * restarted. We use JOB_RESTART (instead of the more obvious
1694 * JOB_START) here so that those dependency jobs will be added
1695 * as well. */
1696 r = manager_add_job(UNIT(s)->manager, JOB_RESTART, UNIT(s), JOB_FAIL, false, &error, NULL);
1697 if (r < 0)
034c6ed7
LP
1698 goto fail;
1699
a8bb2e65
LP
1700 /* Note that we stay in the SERVICE_AUTO_RESTART state here,
1701 * it will be canceled as part of the service_stop() call that
1702 * is executed as part of JOB_RESTART. */
1703
79008bdd 1704 log_unit_debug(UNIT(s)->id, "%s scheduled restart job.", UNIT(s)->id);
034c6ed7
LP
1705 return;
1706
1707fail:
79008bdd 1708 log_unit_warning(UNIT(s)->id, "%s failed to schedule restart job: %s", UNIT(s)->id, bus_error_message(&error, -r));
f42806df 1709 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, false);
034c6ed7
LP
1710}
1711
308d72dc
LP
1712static void service_enter_reload_by_notify(Service *s) {
1713 assert(s);
1714
1715 if (s->timeout_start_usec > 0)
1716 service_arm_timer(s, s->timeout_start_usec);
1717
1718 service_set_state(s, SERVICE_RELOAD);
1719}
1720
034c6ed7
LP
1721static void service_enter_reload(Service *s) {
1722 int r;
1723
1724 assert(s);
1725
5e94833f
LP
1726 service_unwatch_control_pid(s);
1727
117dcc57
ZJS
1728 s->control_command = s->exec_command[SERVICE_EXEC_RELOAD];
1729 if (s->control_command) {
867b3b7d
LP
1730 s->control_command_id = SERVICE_EXEC_RELOAD;
1731
ecedd90f
LP
1732 r = service_spawn(s,
1733 s->control_command,
21b2ce39 1734 s->timeout_start_usec,
ecedd90f
LP
1735 false,
1736 !s->permissions_start_only,
1737 !s->root_directory_start_only,
1738 false,
ecedd90f
LP
1739 true,
1740 &s->control_pid);
1741 if (r < 0)
034c6ed7
LP
1742 goto fail;
1743
80876c20
LP
1744 service_set_state(s, SERVICE_RELOAD);
1745 } else
f42806df 1746 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
1747
1748 return;
1749
1750fail:
31938a85 1751 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run 'reload' task: %m", UNIT(s)->id);
f42806df
LP
1752 s->reload_result = SERVICE_FAILURE_RESOURCES;
1753 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
1754}
1755
f42806df 1756static void service_run_next_control(Service *s) {
034c6ed7
LP
1757 int r;
1758
1759 assert(s);
1760 assert(s->control_command);
1761 assert(s->control_command->command_next);
1762
34e9ba66 1763 assert(s->control_command_id != SERVICE_EXEC_START);
034c6ed7 1764
34e9ba66 1765 s->control_command = s->control_command->command_next;
5e94833f
LP
1766 service_unwatch_control_pid(s);
1767
ecedd90f
LP
1768 r = service_spawn(s,
1769 s->control_command,
21b2ce39 1770 IN_SET(s->state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD) ? s->timeout_start_usec : s->timeout_stop_usec,
ecedd90f
LP
1771 false,
1772 !s->permissions_start_only,
1773 !s->root_directory_start_only,
1774 s->control_command_id == SERVICE_EXEC_START_PRE ||
1775 s->control_command_id == SERVICE_EXEC_STOP_POST,
ecedd90f
LP
1776 true,
1777 &s->control_pid);
1778 if (r < 0)
034c6ed7
LP
1779 goto fail;
1780
1781 return;
1782
1783fail:
31938a85 1784 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run next control task: %m", UNIT(s)->id);
034c6ed7 1785
80876c20 1786 if (s->state == SERVICE_START_PRE)
f42806df 1787 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
80876c20 1788 else if (s->state == SERVICE_STOP)
f42806df 1789 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_RESOURCES);
034c6ed7 1790 else if (s->state == SERVICE_STOP_POST)
f42806df 1791 service_enter_dead(s, SERVICE_FAILURE_RESOURCES, true);
e2f3b44c 1792 else if (s->state == SERVICE_RELOAD) {
f42806df
LP
1793 s->reload_result = SERVICE_FAILURE_RESOURCES;
1794 service_enter_running(s, SERVICE_SUCCESS);
e2f3b44c 1795 } else
f42806df 1796 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
5cb5a6ff
LP
1797}
1798
f42806df 1799static void service_run_next_main(Service *s) {
34e9ba66
LP
1800 pid_t pid;
1801 int r;
1802
1803 assert(s);
867b3b7d
LP
1804 assert(s->main_command);
1805 assert(s->main_command->command_next);
1806 assert(s->type == SERVICE_ONESHOT);
34e9ba66 1807
867b3b7d 1808 s->main_command = s->main_command->command_next;
34e9ba66
LP
1809 service_unwatch_main_pid(s);
1810
ecedd90f
LP
1811 r = service_spawn(s,
1812 s->main_command,
21b2ce39 1813 s->timeout_start_usec,
ecedd90f
LP
1814 true,
1815 true,
1816 true,
1817 true,
ecedd90f
LP
1818 false,
1819 &pid);
1820 if (r < 0)
34e9ba66
LP
1821 goto fail;
1822
1823 service_set_main_pid(s, pid);
1824
1825 return;
1826
1827fail:
31938a85 1828 log_unit_warning_errno(UNIT(s)->id, r, "%s failed to run next main task: %m", UNIT(s)->id);
f42806df 1829 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
34e9ba66
LP
1830}
1831
93ae25e6
MO
1832static int service_start_limit_test(Service *s) {
1833 assert(s);
1834
1835 if (ratelimit_test(&s->start_limit))
1836 return 0;
1837
79008bdd 1838 log_unit_warning(UNIT(s)->id, "start request repeated too quickly for %s", UNIT(s)->id);
2928b0a8
LP
1839
1840 return failure_action(UNIT(s)->manager, s->start_limit_action, s->reboot_arg);
93ae25e6
MO
1841}
1842
87f0e418
LP
1843static int service_start(Unit *u) {
1844 Service *s = SERVICE(u);
4b939747 1845 int r;
5cb5a6ff
LP
1846
1847 assert(s);
1848
034c6ed7
LP
1849 /* We cannot fulfill this request right now, try again later
1850 * please! */
a00973af
LP
1851 if (IN_SET(s->state,
1852 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
1853 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL))
5cb5a6ff
LP
1854 return -EAGAIN;
1855
034c6ed7 1856 /* Already on it! */
a00973af 1857 if (IN_SET(s->state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST))
034c6ed7
LP
1858 return 0;
1859
2e9d6c12 1860 /* A service that will be restarted must be stopped first to
7f2cddae 1861 * trigger BindsTo and/or OnFailure dependencies. If a user
2e9d6c12 1862 * does not want to wait for the holdoff time to elapse, the
d4943dc7
LP
1863 * service should be manually restarted, not started. We
1864 * simply return EAGAIN here, so that any start jobs stay
1865 * queued, and assume that the auto restart timer will
1866 * eventually trigger the restart. */
1867 if (s->state == SERVICE_AUTO_RESTART)
a8bb2e65 1868 return -EAGAIN;
2e9d6c12 1869
a00973af 1870 assert(IN_SET(s->state, SERVICE_DEAD, SERVICE_FAILED));
5cb5a6ff 1871
1e2e8133 1872 /* Make sure we don't enter a busy loop of some kind. */
4b939747 1873 r = service_start_limit_test(s);
c2f34808 1874 if (r < 0) {
8d1b002a 1875 service_enter_dead(s, SERVICE_FAILURE_START_LIMIT, false);
4b939747 1876 return r;
c2f34808 1877 }
1e2e8133 1878
f42806df
LP
1879 s->result = SERVICE_SUCCESS;
1880 s->reload_result = SERVICE_SUCCESS;
034c6ed7 1881 s->main_pid_known = false;
6dfa5494 1882 s->main_pid_alien = false;
47342320 1883 s->forbid_restart = false;
5ad096b3 1884 s->reset_cpu_usage = true;
034c6ed7 1885
8cfdb077
LP
1886 free(s->status_text);
1887 s->status_text = NULL;
1888 s->status_errno = 0;
1889
308d72dc
LP
1890 s->notify_state = NOTIFY_UNKNOWN;
1891
034c6ed7 1892 service_enter_start_pre(s);
82a2b6bb 1893 return 1;
5cb5a6ff
LP
1894}
1895
87f0e418
LP
1896static int service_stop(Unit *u) {
1897 Service *s = SERVICE(u);
5cb5a6ff
LP
1898
1899 assert(s);
1900
f0c7b229 1901 /* Don't create restart jobs from here. */
47342320 1902 s->forbid_restart = true;
034c6ed7 1903
e537352b 1904 /* Already on it */
a00973af
LP
1905 if (IN_SET(s->state,
1906 SERVICE_STOP, SERVICE_STOP_SIGABRT, SERVICE_STOP_SIGTERM, SERVICE_STOP_SIGKILL, SERVICE_STOP_POST,
1907 SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL))
e537352b
LP
1908 return 0;
1909
f0c7b229 1910 /* A restart will be scheduled or is in progress. */
034c6ed7 1911 if (s->state == SERVICE_AUTO_RESTART) {
0c7f15b3 1912 service_set_state(s, SERVICE_DEAD);
034c6ed7
LP
1913 return 0;
1914 }
1915
3f6c78dc
LP
1916 /* If there's already something running we go directly into
1917 * kill mode. */
a00973af 1918 if (IN_SET(s->state, SERVICE_START_PRE, SERVICE_START, SERVICE_START_POST, SERVICE_RELOAD)) {
f42806df 1919 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_SUCCESS);
3f6c78dc
LP
1920 return 0;
1921 }
5cb5a6ff 1922
a00973af 1923 assert(IN_SET(s->state, SERVICE_RUNNING, SERVICE_EXITED));
3a762661 1924
f42806df 1925 service_enter_stop(s, SERVICE_SUCCESS);
82a2b6bb 1926 return 1;
5cb5a6ff
LP
1927}
1928
87f0e418
LP
1929static int service_reload(Unit *u) {
1930 Service *s = SERVICE(u);
034c6ed7
LP
1931
1932 assert(s);
1933
80876c20 1934 assert(s->state == SERVICE_RUNNING || s->state == SERVICE_EXITED);
034c6ed7
LP
1935
1936 service_enter_reload(s);
5cb5a6ff
LP
1937 return 0;
1938}
1939
44a6b1b6 1940_pure_ static bool service_can_reload(Unit *u) {
87f0e418 1941 Service *s = SERVICE(u);
034c6ed7
LP
1942
1943 assert(s);
1944
1945 return !!s->exec_command[SERVICE_EXEC_RELOAD];
1946}
1947
a16e1123
LP
1948static int service_serialize(Unit *u, FILE *f, FDSet *fds) {
1949 Service *s = SERVICE(u);
2339fc93 1950 ServiceFDStore *fs;
a16e1123
LP
1951
1952 assert(u);
1953 assert(f);
1954 assert(fds);
1955
1956 unit_serialize_item(u, f, "state", service_state_to_string(s->state));
f42806df
LP
1957 unit_serialize_item(u, f, "result", service_result_to_string(s->result));
1958 unit_serialize_item(u, f, "reload-result", service_result_to_string(s->reload_result));
a16e1123
LP
1959
1960 if (s->control_pid > 0)
f06db334 1961 unit_serialize_item_format(u, f, "control-pid", PID_FMT, s->control_pid);
a16e1123 1962
5925dd3c 1963 if (s->main_pid_known && s->main_pid > 0)
ccd06097 1964 unit_serialize_item_format(u, f, "main-pid", PID_FMT, s->main_pid);
a16e1123
LP
1965
1966 unit_serialize_item(u, f, "main-pid-known", yes_no(s->main_pid_known));
1967
3a2776bc
LP
1968 if (s->status_text)
1969 unit_serialize_item(u, f, "status-text", s->status_text);
1970
cfc4eb4c
LP
1971 /* FIXME: There's a minor uncleanliness here: if there are
1972 * multiple commands attached here, we will start from the
1973 * first one again */
a16e1123 1974 if (s->control_command_id >= 0)
f06db334 1975 unit_serialize_item(u, f, "control-command", service_exec_command_to_string(s->control_command_id));
a16e1123
LP
1976
1977 if (s->socket_fd >= 0) {
1978 int copy;
1979
2339fc93
LP
1980 copy = fdset_put_dup(fds, s->socket_fd);
1981 if (copy < 0)
a16e1123
LP
1982 return copy;
1983
1984 unit_serialize_item_format(u, f, "socket-fd", "%i", copy);
1985 }
1986
e44da745
DM
1987 if (s->bus_endpoint_fd >= 0) {
1988 int copy;
1989
2339fc93
LP
1990 copy = fdset_put_dup(fds, s->bus_endpoint_fd);
1991 if (copy < 0)
e44da745
DM
1992 return copy;
1993
1994 unit_serialize_item_format(u, f, "endpoint-fd", "%i", copy);
1995 }
1996
2339fc93
LP
1997 LIST_FOREACH(fd_store, fs, s->fd_store) {
1998 int copy;
1999
2000 copy = fdset_put_dup(fds, fs->fd);
2001 if (copy < 0)
2002 return copy;
2003
2004 unit_serialize_item_format(u, f, "fd-store-fd", "%i", copy);
2005 }
2006
ecdbca40 2007 if (s->main_exec_status.pid > 0) {
f06db334
LP
2008 unit_serialize_item_format(u, f, "main-exec-status-pid", PID_FMT, s->main_exec_status.pid);
2009 dual_timestamp_serialize(f, "main-exec-status-start", &s->main_exec_status.start_timestamp);
2010 dual_timestamp_serialize(f, "main-exec-status-exit", &s->main_exec_status.exit_timestamp);
ecdbca40 2011
799fd0fd 2012 if (dual_timestamp_is_set(&s->main_exec_status.exit_timestamp)) {
f06db334
LP
2013 unit_serialize_item_format(u, f, "main-exec-status-code", "%i", s->main_exec_status.code);
2014 unit_serialize_item_format(u, f, "main-exec-status-status", "%i", s->main_exec_status.status);
ecdbca40
LP
2015 }
2016 }
f06db334 2017
a6927d7f 2018 if (dual_timestamp_is_set(&s->watchdog_timestamp))
842129f5 2019 dual_timestamp_serialize(f, "watchdog-timestamp", &s->watchdog_timestamp);
ecdbca40 2020
6aca9a58 2021 if (s->forbid_restart)
8d1a2802 2022 unit_serialize_item(u, f, "forbid-restart", yes_no(s->forbid_restart));
6aca9a58 2023
a16e1123
LP
2024 return 0;
2025}
2026
2027static int service_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
2028 Service *s = SERVICE(u);
2339fc93 2029 int r;
a16e1123
LP
2030
2031 assert(u);
2032 assert(key);
2033 assert(value);
2034 assert(fds);
2035
2036 if (streq(key, "state")) {
2037 ServiceState state;
2038
117dcc57
ZJS
2039 state = service_state_from_string(value);
2040 if (state < 0)
79008bdd 2041 log_unit_debug(u->id, "Failed to parse state value %s", value);
a16e1123
LP
2042 else
2043 s->deserialized_state = state;
f42806df
LP
2044 } else if (streq(key, "result")) {
2045 ServiceResult f;
2046
2047 f = service_result_from_string(value);
2048 if (f < 0)
79008bdd 2049 log_unit_debug(u->id, "Failed to parse result value %s", value);
f42806df
LP
2050 else if (f != SERVICE_SUCCESS)
2051 s->result = f;
2052
2053 } else if (streq(key, "reload-result")) {
2054 ServiceResult f;
2055
2056 f = service_result_from_string(value);
2057 if (f < 0)
79008bdd 2058 log_unit_debug(u->id, "Failed to parse reload result value %s", value);
f42806df
LP
2059 else if (f != SERVICE_SUCCESS)
2060 s->reload_result = f;
a16e1123 2061
a16e1123 2062 } else if (streq(key, "control-pid")) {
5925dd3c 2063 pid_t pid;
a16e1123 2064
e364ad06 2065 if (parse_pid(value, &pid) < 0)
79008bdd 2066 log_unit_debug(u->id, "Failed to parse control-pid value %s", value);
a16e1123 2067 else
e55224ca 2068 s->control_pid = pid;
a16e1123 2069 } else if (streq(key, "main-pid")) {
5925dd3c 2070 pid_t pid;
a16e1123 2071
e364ad06 2072 if (parse_pid(value, &pid) < 0)
79008bdd 2073 log_unit_debug(u->id, "Failed to parse main-pid value %s", value);
7400b9d2
LP
2074 else {
2075 service_set_main_pid(s, pid);
2076 unit_watch_pid(UNIT(s), pid);
2077 }
a16e1123
LP
2078 } else if (streq(key, "main-pid-known")) {
2079 int b;
2080
117dcc57
ZJS
2081 b = parse_boolean(value);
2082 if (b < 0)
79008bdd 2083 log_unit_debug(u->id, "Failed to parse main-pid-known value %s", value);
a16e1123
LP
2084 else
2085 s->main_pid_known = b;
3a2776bc
LP
2086 } else if (streq(key, "status-text")) {
2087 char *t;
2088
117dcc57
ZJS
2089 t = strdup(value);
2090 if (!t)
2091 log_oom();
2092 else {
3a2776bc
LP
2093 free(s->status_text);
2094 s->status_text = t;
2095 }
2096
a16e1123
LP
2097 } else if (streq(key, "control-command")) {
2098 ServiceExecCommand id;
2099
117dcc57
ZJS
2100 id = service_exec_command_from_string(value);
2101 if (id < 0)
79008bdd 2102 log_unit_debug(u->id, "Failed to parse exec-command value %s", value);
a16e1123
LP
2103 else {
2104 s->control_command_id = id;
2105 s->control_command = s->exec_command[id];
2106 }
2107 } else if (streq(key, "socket-fd")) {
2108 int fd;
2109
2110 if (safe_atoi(value, &fd) < 0 || fd < 0 || !fdset_contains(fds, fd))
79008bdd 2111 log_unit_debug(u->id, "Failed to parse socket-fd value %s", value);
a16e1123 2112 else {
574634bc 2113 asynchronous_close(s->socket_fd);
a16e1123
LP
2114 s->socket_fd = fdset_remove(fds, fd);
2115 }
e44da745
DM
2116 } else if (streq(key, "endpoint-fd")) {
2117 int fd;
2118
2119 if (safe_atoi(value, &fd) < 0 || fd < 0 || !fdset_contains(fds, fd))
79008bdd 2120 log_unit_debug(u->id, "Failed to parse endpoint-fd value %s", value);
e44da745
DM
2121 else {
2122 safe_close(s->bus_endpoint_fd);
2123 s->bus_endpoint_fd = fdset_remove(fds, fd);
2124 }
2339fc93
LP
2125 } else if (streq(key, "fd-store-fd")) {
2126 int fd;
2127
2128 if (safe_atoi(value, &fd) < 0 || fd < 0 || !fdset_contains(fds, fd))
2129 log_unit_debug(u->id, "Failed to parse fd-store-fd value %s", value);
2130 else {
2131 r = service_add_fd_store(s, fd);
2132 if (r < 0)
2133 log_unit_error_errno(u->id, r, "Failed to add fd to store: %m");
2134 else if (r > 0)
2135 fdset_remove(fds, fd);
2136 }
2137
ecdbca40
LP
2138 } else if (streq(key, "main-exec-status-pid")) {
2139 pid_t pid;
2140
e364ad06 2141 if (parse_pid(value, &pid) < 0)
79008bdd 2142 log_unit_debug(u->id, "Failed to parse main-exec-status-pid value %s", value);
ecdbca40
LP
2143 else
2144 s->main_exec_status.pid = pid;
2145 } else if (streq(key, "main-exec-status-code")) {
2146 int i;
2147
e364ad06 2148 if (safe_atoi(value, &i) < 0)
79008bdd 2149 log_unit_debug(u->id, "Failed to parse main-exec-status-code value %s", value);
ecdbca40
LP
2150 else
2151 s->main_exec_status.code = i;
2152 } else if (streq(key, "main-exec-status-status")) {
2153 int i;
2154
e364ad06 2155 if (safe_atoi(value, &i) < 0)
79008bdd 2156 log_unit_debug(u->id, "Failed to parse main-exec-status-status value %s", value);
ecdbca40
LP
2157 else
2158 s->main_exec_status.status = i;
799fd0fd
LP
2159 } else if (streq(key, "main-exec-status-start"))
2160 dual_timestamp_deserialize(value, &s->main_exec_status.start_timestamp);
2161 else if (streq(key, "main-exec-status-exit"))
2162 dual_timestamp_deserialize(value, &s->main_exec_status.exit_timestamp);
a6927d7f
MO
2163 else if (streq(key, "watchdog-timestamp"))
2164 dual_timestamp_deserialize(value, &s->watchdog_timestamp);
613b411c 2165 else if (streq(key, "forbid-restart")) {
6aca9a58
SE
2166 int b;
2167
2168 b = parse_boolean(value);
2169 if (b < 0)
79008bdd 2170 log_unit_debug(u->id, "Failed to parse forbid-restart value %s", value);
6aca9a58
SE
2171 else
2172 s->forbid_restart = b;
c17ec25e 2173 } else
79008bdd 2174 log_unit_debug(u->id, "Unknown serialization key '%s'", key);
a16e1123
LP
2175
2176 return 0;
2177}
2178
44a6b1b6 2179_pure_ static UnitActiveState service_active_state(Unit *u) {
e056b01d
LP
2180 const UnitActiveState *table;
2181
87f0e418 2182 assert(u);
5cb5a6ff 2183
e056b01d
LP
2184 table = SERVICE(u)->type == SERVICE_IDLE ? state_translation_table_idle : state_translation_table;
2185
2186 return table[SERVICE(u)->state];
034c6ed7
LP
2187}
2188
10a94420
LP
2189static const char *service_sub_state_to_string(Unit *u) {
2190 assert(u);
2191
2192 return service_state_to_string(SERVICE(u)->state);
2193}
2194
701cc384
LP
2195static bool service_check_gc(Unit *u) {
2196 Service *s = SERVICE(u);
2197
2198 assert(s);
2199
6d55002a
LP
2200 /* Never clean up services that still have a process around,
2201 * even if the service is formally dead. */
2202 if (cgroup_good(s) > 0 ||
2203 main_pid_good(s) > 0 ||
2204 control_pid_good(s) > 0)
2205 return true;
2206
6d55002a
LP
2207 return false;
2208}
2209
44a6b1b6 2210_pure_ static bool service_check_snapshot(Unit *u) {
701cc384
LP
2211 Service *s = SERVICE(u);
2212
2213 assert(s);
2214
8bb2d17d 2215 return s->socket_fd < 0;
701cc384
LP
2216}
2217
3a111838
MS
2218static int service_retry_pid_file(Service *s) {
2219 int r;
2220
2221 assert(s->pid_file);
2222 assert(s->state == SERVICE_START || s->state == SERVICE_START_POST);
2223
2224 r = service_load_pid_file(s, false);
2225 if (r < 0)
2226 return r;
2227
2228 service_unwatch_pid_file(s);
2229
f42806df 2230 service_enter_running(s, SERVICE_SUCCESS);
3a111838
MS
2231 return 0;
2232}
2233
2234static int service_watch_pid_file(Service *s) {
2235 int r;
2236
79008bdd 2237 log_unit_debug(UNIT(s)->id, "Setting watch for %s's PID file %s", UNIT(s)->id, s->pid_file_pathspec->path);
8bb2d17d 2238
718db961 2239 r = path_spec_watch(s->pid_file_pathspec, service_dispatch_io);
3a111838
MS
2240 if (r < 0)
2241 goto fail;
2242
2243 /* the pidfile might have appeared just before we set the watch */
79008bdd 2244 log_unit_debug(UNIT(s)->id, "Trying to read %s's PID file %s in case it changed", UNIT(s)->id, s->pid_file_pathspec->path);
3a111838
MS
2245 service_retry_pid_file(s);
2246
2247 return 0;
2248fail:
31938a85 2249 log_unit_error_errno(UNIT(s)->id, r, "Failed to set a watch for %s's PID file %s: %m", UNIT(s)->id, s->pid_file_pathspec->path);
3a111838
MS
2250 service_unwatch_pid_file(s);
2251 return r;
2252}
2253
2254static int service_demand_pid_file(Service *s) {
2255 PathSpec *ps;
2256
2257 assert(s->pid_file);
2258 assert(!s->pid_file_pathspec);
2259
2260 ps = new0(PathSpec, 1);
2261 if (!ps)
2262 return -ENOMEM;
2263
718db961 2264 ps->unit = UNIT(s);
3a111838
MS
2265 ps->path = strdup(s->pid_file);
2266 if (!ps->path) {
2267 free(ps);
2268 return -ENOMEM;
2269 }
2270
2271 path_kill_slashes(ps->path);
2272
2273 /* PATH_CHANGED would not be enough. There are daemons (sendmail) that
2274 * keep their PID file open all the time. */
2275 ps->type = PATH_MODIFIED;
2276 ps->inotify_fd = -1;
2277
2278 s->pid_file_pathspec = ps;
2279
2280 return service_watch_pid_file(s);
2281}
2282
718db961 2283static int service_dispatch_io(sd_event_source *source, int fd, uint32_t events, void *userdata) {
e14c2802
LP
2284 PathSpec *p = userdata;
2285 Service *s;
2286
2287 assert(p);
2288
2289 s = SERVICE(p->unit);
3a111838
MS
2290
2291 assert(s);
2292 assert(fd >= 0);
2293 assert(s->state == SERVICE_START || s->state == SERVICE_START_POST);
2294 assert(s->pid_file_pathspec);
57020a3a 2295 assert(path_spec_owns_inotify_fd(s->pid_file_pathspec, fd));
3a111838 2296
79008bdd 2297 log_unit_debug(UNIT(s)->id, "inotify event for %s", UNIT(s)->id);
3a111838 2298
e14c2802 2299 if (path_spec_fd_event(p, events) < 0)
3a111838
MS
2300 goto fail;
2301
2302 if (service_retry_pid_file(s) == 0)
718db961 2303 return 0;
3a111838
MS
2304
2305 if (service_watch_pid_file(s) < 0)
2306 goto fail;
2307
718db961
LP
2308 return 0;
2309
3a111838
MS
2310fail:
2311 service_unwatch_pid_file(s);
f42806df 2312 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_RESOURCES);
718db961 2313 return 0;
3a111838
MS
2314}
2315
a911bb9a
LP
2316static void service_notify_cgroup_empty_event(Unit *u) {
2317 Service *s = SERVICE(u);
2318
2319 assert(u);
2320
79008bdd 2321 log_unit_debug(u->id, "%s: cgroup is empty", u->id);
a911bb9a
LP
2322
2323 switch (s->state) {
2324
2325 /* Waiting for SIGCHLD is usually more interesting,
2326 * because it includes return codes/signals. Which is
2327 * why we ignore the cgroup events for most cases,
2328 * except when we don't know pid which to expect the
2329 * SIGCHLD for. */
2330
2331 case SERVICE_START:
2332 case SERVICE_START_POST:
2333 /* If we were hoping for the daemon to write its PID file,
2334 * we can give up now. */
2335 if (s->pid_file_pathspec) {
79008bdd 2336 log_unit_warning(u->id, "%s never wrote its PID file. Failing.", UNIT(s)->id);
8bb2d17d 2337
a911bb9a
LP
2338 service_unwatch_pid_file(s);
2339 if (s->state == SERVICE_START)
2340 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
2341 else
2342 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
2343 }
2344 break;
2345
2346 case SERVICE_RUNNING:
2347 /* service_enter_running() will figure out what to do */
2348 service_enter_running(s, SERVICE_SUCCESS);
2349 break;
2350
db2cb23b 2351 case SERVICE_STOP_SIGABRT:
a911bb9a
LP
2352 case SERVICE_STOP_SIGTERM:
2353 case SERVICE_STOP_SIGKILL:
2354
2355 if (main_pid_good(s) <= 0 && !control_pid_good(s))
2356 service_enter_stop_post(s, SERVICE_SUCCESS);
2357
2358 break;
2359
2360 case SERVICE_STOP_POST:
2361 case SERVICE_FINAL_SIGTERM:
2362 case SERVICE_FINAL_SIGKILL:
2363 if (main_pid_good(s) <= 0 && !control_pid_good(s))
2364 service_enter_dead(s, SERVICE_SUCCESS, true);
2365
2366 break;
2367
2368 default:
2369 ;
2370 }
2371}
2372
87f0e418
LP
2373static void service_sigchld_event(Unit *u, pid_t pid, int code, int status) {
2374 Service *s = SERVICE(u);
f42806df 2375 ServiceResult f;
5cb5a6ff
LP
2376
2377 assert(s);
034c6ed7
LP
2378 assert(pid >= 0);
2379
96342de6
LN
2380 if (UNIT(s)->fragment_path ? is_clean_exit(code, status, &s->success_status) :
2381 is_clean_exit_lsb(code, status, &s->success_status))
f42806df
LP
2382 f = SERVICE_SUCCESS;
2383 else if (code == CLD_EXITED)
2384 f = SERVICE_FAILURE_EXIT_CODE;
2385 else if (code == CLD_KILLED)
2386 f = SERVICE_FAILURE_SIGNAL;
2387 else if (code == CLD_DUMPED)
2388 f = SERVICE_FAILURE_CORE_DUMP;
d06dacd0 2389 else
cfc4eb4c 2390 assert_not_reached("Unknown code");
034c6ed7
LP
2391
2392 if (s->main_pid == pid) {
db01f8b3
MS
2393 /* Forking services may occasionally move to a new PID.
2394 * As long as they update the PID file before exiting the old
2395 * PID, they're fine. */
5375410b 2396 if (service_load_pid_file(s, false) == 0)
db01f8b3 2397 return;
034c6ed7 2398
034c6ed7 2399 s->main_pid = 0;
6ea832a2 2400 exec_status_exit(&s->main_exec_status, &s->exec_context, pid, code, status);
034c6ed7 2401
867b3b7d 2402 if (s->main_command) {
fbeefb45
LP
2403 /* If this is not a forking service than the
2404 * main process got started and hence we copy
2405 * the exit status so that it is recorded both
2406 * as main and as control process exit
2407 * status */
2408
867b3b7d 2409 s->main_command->exec_status = s->main_exec_status;
b708e7ce 2410
867b3b7d 2411 if (s->main_command->ignore)
f42806df 2412 f = SERVICE_SUCCESS;
fbeefb45
LP
2413 } else if (s->exec_command[SERVICE_EXEC_START]) {
2414
2415 /* If this is a forked process, then we should
2416 * ignore the return value if this was
2417 * configured for the starter process */
2418
2419 if (s->exec_command[SERVICE_EXEC_START]->ignore)
2420 f = SERVICE_SUCCESS;
034c6ed7
LP
2421 }
2422
e2cc6eca
LP
2423 log_unit_struct(u->id,
2424 f == SERVICE_SUCCESS ? LOG_DEBUG : LOG_NOTICE,
2425 LOG_MESSAGE("%s: main process exited, code=%s, status=%i/%s",
2426 u->id, sigchld_code_to_string(code), status,
2427 strna(code == CLD_EXITED
2428 ? exit_status_to_string(status, EXIT_STATUS_FULL)
2429 : signal_to_string(status))),
2430 "EXIT_CODE=%s", sigchld_code_to_string(code),
2431 "EXIT_STATUS=%i", status,
2432 NULL);
f42806df
LP
2433
2434 if (f != SERVICE_SUCCESS)
2435 s->result = f;
034c6ed7 2436
867b3b7d
LP
2437 if (s->main_command &&
2438 s->main_command->command_next &&
f42806df 2439 f == SERVICE_SUCCESS) {
034c6ed7 2440
34e9ba66
LP
2441 /* There is another command to *
2442 * execute, so let's do that. */
034c6ed7 2443
79008bdd 2444 log_unit_debug(u->id, "%s running next main command for state %s", u->id, service_state_to_string(s->state));
f42806df 2445 service_run_next_main(s);
034c6ed7 2446
34e9ba66
LP
2447 } else {
2448
2449 /* The service exited, so the service is officially
2450 * gone. */
867b3b7d 2451 s->main_command = NULL;
34e9ba66
LP
2452
2453 switch (s->state) {
2454
2455 case SERVICE_START_POST:
2456 case SERVICE_RELOAD:
2457 case SERVICE_STOP:
2458 /* Need to wait until the operation is
2459 * done */
c4653a4d 2460 break;
7d55e835 2461
34e9ba66
LP
2462 case SERVICE_START:
2463 if (s->type == SERVICE_ONESHOT) {
2464 /* This was our main goal, so let's go on */
f42806df 2465 if (f == SERVICE_SUCCESS)
34e9ba66
LP
2466 service_enter_start_post(s);
2467 else
f42806df 2468 service_enter_signal(s, SERVICE_FINAL_SIGTERM, f);
34e9ba66 2469 break;
34e9ba66 2470 }
034c6ed7 2471
bfba3256
LP
2472 /* Fall through */
2473
34e9ba66 2474 case SERVICE_RUNNING:
f42806df 2475 service_enter_running(s, f);
34e9ba66 2476 break;
034c6ed7 2477
db2cb23b 2478 case SERVICE_STOP_SIGABRT:
34e9ba66
LP
2479 case SERVICE_STOP_SIGTERM:
2480 case SERVICE_STOP_SIGKILL:
5cb5a6ff 2481
34e9ba66 2482 if (!control_pid_good(s))
f42806df 2483 service_enter_stop_post(s, f);
5cb5a6ff 2484
34e9ba66
LP
2485 /* If there is still a control process, wait for that first */
2486 break;
2487
bf108e55
LP
2488 case SERVICE_STOP_POST:
2489 case SERVICE_FINAL_SIGTERM:
2490 case SERVICE_FINAL_SIGKILL:
2491
2492 if (!control_pid_good(s))
2493 service_enter_dead(s, f, true);
2494 break;
2495
34e9ba66
LP
2496 default:
2497 assert_not_reached("Uh, main process died at wrong time.");
2498 }
034c6ed7 2499 }
5cb5a6ff 2500
034c6ed7 2501 } else if (s->control_pid == pid) {
34e9ba66
LP
2502 s->control_pid = 0;
2503
b708e7ce 2504 if (s->control_command) {
8bb2d17d 2505 exec_status_exit(&s->control_command->exec_status, &s->exec_context, pid, code, status);
a16e1123 2506
b708e7ce 2507 if (s->control_command->ignore)
f42806df 2508 f = SERVICE_SUCCESS;
b708e7ce
LP
2509 }
2510
79008bdd
LP
2511 log_unit_full(u->id,
2512 f == SERVICE_SUCCESS ? LOG_DEBUG : LOG_NOTICE,
66870f90
ZJS
2513 "%s: control process exited, code=%s status=%i",
2514 u->id, sigchld_code_to_string(code), status);
f42806df
LP
2515
2516 if (f != SERVICE_SUCCESS)
2517 s->result = f;
034c6ed7 2518
88f3e0c9
LP
2519 /* Immediately get rid of the cgroup, so that the
2520 * kernel doesn't delay the cgroup empty messages for
2521 * the service cgroup any longer than necessary */
4ad49000 2522 service_kill_control_processes(s);
88f3e0c9 2523
34e9ba66
LP
2524 if (s->control_command &&
2525 s->control_command->command_next &&
f42806df 2526 f == SERVICE_SUCCESS) {
034c6ed7
LP
2527
2528 /* There is another command to *
2529 * execute, so let's do that. */
2530
79008bdd 2531 log_unit_debug(u->id, "%s running next control command for state %s", u->id, service_state_to_string(s->state));
f42806df 2532 service_run_next_control(s);
034c6ed7 2533
80876c20 2534 } else {
034c6ed7
LP
2535 /* No further commands for this step, so let's
2536 * figure out what to do next */
2537
a16e1123
LP
2538 s->control_command = NULL;
2539 s->control_command_id = _SERVICE_EXEC_COMMAND_INVALID;
2540
79008bdd 2541 log_unit_debug(u->id, "%s got final SIGCHLD for state %s", u->id, service_state_to_string(s->state));
bd982a8b 2542
034c6ed7
LP
2543 switch (s->state) {
2544
2545 case SERVICE_START_PRE:
f42806df 2546 if (f == SERVICE_SUCCESS)
034c6ed7
LP
2547 service_enter_start(s);
2548 else
f42806df 2549 service_enter_signal(s, SERVICE_FINAL_SIGTERM, f);
034c6ed7
LP
2550 break;
2551
2552 case SERVICE_START:
bfba3256
LP
2553 if (s->type != SERVICE_FORKING)
2554 /* Maybe spurious event due to a reload that changed the type? */
2555 break;
034c6ed7 2556
f42806df
LP
2557 if (f != SERVICE_SUCCESS) {
2558 service_enter_signal(s, SERVICE_FINAL_SIGTERM, f);
3a111838
MS
2559 break;
2560 }
034c6ed7 2561
3a111838 2562 if (s->pid_file) {
f42806df
LP
2563 bool has_start_post;
2564 int r;
2565
3a111838
MS
2566 /* Let's try to load the pid file here if we can.
2567 * The PID file might actually be created by a START_POST
2568 * script. In that case don't worry if the loading fails. */
f42806df
LP
2569
2570 has_start_post = !!s->exec_command[SERVICE_EXEC_START_POST];
2571 r = service_load_pid_file(s, !has_start_post);
3a111838
MS
2572 if (!has_start_post && r < 0) {
2573 r = service_demand_pid_file(s);
2574 if (r < 0 || !cgroup_good(s))
f42806df 2575 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_RESOURCES);
3a111838
MS
2576 break;
2577 }
034c6ed7 2578 } else
3a111838 2579 service_search_main_pid(s);
034c6ed7 2580
3a111838 2581 service_enter_start_post(s);
034c6ed7
LP
2582 break;
2583
2584 case SERVICE_START_POST:
f42806df
LP
2585 if (f != SERVICE_SUCCESS) {
2586 service_enter_stop(s, f);
2096e009 2587 break;
034c6ed7
LP
2588 }
2589
2096e009 2590 if (s->pid_file) {
f42806df
LP
2591 int r;
2592
2593 r = service_load_pid_file(s, true);
2096e009
MS
2594 if (r < 0) {
2595 r = service_demand_pid_file(s);
2596 if (r < 0 || !cgroup_good(s))
f42806df 2597 service_enter_stop(s, SERVICE_FAILURE_RESOURCES);
2096e009
MS
2598 break;
2599 }
2600 } else
2601 service_search_main_pid(s);
2602
f42806df 2603 service_enter_running(s, SERVICE_SUCCESS);
3185a36b 2604 break;
034c6ed7
LP
2605
2606 case SERVICE_RELOAD:
f42806df 2607 if (f == SERVICE_SUCCESS) {
5375410b 2608 service_load_pid_file(s, true);
3185a36b
LP
2609 service_search_main_pid(s);
2610 }
2611
f42806df
LP
2612 s->reload_result = f;
2613 service_enter_running(s, SERVICE_SUCCESS);
034c6ed7
LP
2614 break;
2615
2616 case SERVICE_STOP:
f42806df 2617 service_enter_signal(s, SERVICE_STOP_SIGTERM, f);
034c6ed7
LP
2618 break;
2619
db2cb23b 2620 case SERVICE_STOP_SIGABRT:
034c6ed7
LP
2621 case SERVICE_STOP_SIGTERM:
2622 case SERVICE_STOP_SIGKILL:
2623 if (main_pid_good(s) <= 0)
f42806df 2624 service_enter_stop_post(s, f);
034c6ed7
LP
2625
2626 /* If there is still a service
2627 * process around, wait until
2628 * that one quit, too */
2629 break;
2630
2631 case SERVICE_STOP_POST:
2632 case SERVICE_FINAL_SIGTERM:
2633 case SERVICE_FINAL_SIGKILL:
bf108e55
LP
2634 if (main_pid_good(s) <= 0)
2635 service_enter_dead(s, f, true);
034c6ed7
LP
2636 break;
2637
2638 default:
2639 assert_not_reached("Uh, control process died at wrong time.");
2640 }
2641 }
8c47c732 2642 }
c4e2ceae
LP
2643
2644 /* Notify clients about changed exit status */
2645 unit_add_to_dbus_queue(u);
a911bb9a
LP
2646
2647 /* We got one SIGCHLD for the service, let's watch all
2648 * processes that are now running of the service, and watch
2649 * that. Among the PIDs we then watch will be children
2650 * reassigned to us, which hopefully allows us to identify
2651 * when all children are gone */
2652 unit_tidy_watch_pids(u, s->main_pid, s->control_pid);
2653 unit_watch_all_pids(u);
2654
2655 /* If the PID set is empty now, then let's finish this off */
2656 if (set_isempty(u->pids))
2657 service_notify_cgroup_empty_event(u);
034c6ed7
LP
2658}
2659
718db961
LP
2660static int service_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata) {
2661 Service *s = SERVICE(userdata);
034c6ed7
LP
2662
2663 assert(s);
718db961 2664 assert(source == s->timer_event_source);
034c6ed7
LP
2665
2666 switch (s->state) {
2667
2668 case SERVICE_START_PRE:
2669 case SERVICE_START:
79008bdd 2670 log_unit_warning(UNIT(s)->id, "%s %s operation timed out. Terminating.", UNIT(s)->id, s->state == SERVICE_START ? "start" : "start-pre");
f42806df 2671 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_TIMEOUT);
80876c20
LP
2672 break;
2673
034c6ed7 2674 case SERVICE_START_POST:
79008bdd 2675 log_unit_warning(UNIT(s)->id, "%s start-post operation timed out. Stopping.", UNIT(s)->id);
f42806df 2676 service_enter_stop(s, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2677 break;
2678
e2f3b44c 2679 case SERVICE_RELOAD:
79008bdd 2680 log_unit_warning(UNIT(s)->id, "%s reload operation timed out. Stopping.", UNIT(s)->id);
f42806df
LP
2681 s->reload_result = SERVICE_FAILURE_TIMEOUT;
2682 service_enter_running(s, SERVICE_SUCCESS);
e2f3b44c
LP
2683 break;
2684
034c6ed7 2685 case SERVICE_STOP:
79008bdd 2686 log_unit_warning(UNIT(s)->id, "%s stopping timed out. Terminating.", UNIT(s)->id);
f42806df 2687 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2688 break;
2689
db2cb23b 2690 case SERVICE_STOP_SIGABRT:
2ab2ab7b
LP
2691 log_unit_warning(UNIT(s)->id, "%s stop-sigabrt timed out. Terminating.", UNIT(s)->id);
2692 service_enter_signal(s, SERVICE_STOP_SIGTERM, SERVICE_FAILURE_TIMEOUT);
db2cb23b
UTL
2693 break;
2694
034c6ed7 2695 case SERVICE_STOP_SIGTERM:
4819ff03 2696 if (s->kill_context.send_sigkill) {
79008bdd 2697 log_unit_warning(UNIT(s)->id, "%s stop-sigterm timed out. Killing.", UNIT(s)->id);
f42806df 2698 service_enter_signal(s, SERVICE_STOP_SIGKILL, SERVICE_FAILURE_TIMEOUT);
ba035df2 2699 } else {
79008bdd 2700 log_unit_warning(UNIT(s)->id, "%s stop-sigterm timed out. Skipping SIGKILL.", UNIT(s)->id);
f42806df 2701 service_enter_stop_post(s, SERVICE_FAILURE_TIMEOUT);
ba035df2
LP
2702 }
2703
034c6ed7
LP
2704 break;
2705
2706 case SERVICE_STOP_SIGKILL:
35b8ca3a 2707 /* Uh, we sent a SIGKILL and it is still not gone?
034c6ed7
LP
2708 * Must be something we cannot kill, so let's just be
2709 * weirded out and continue */
2710
79008bdd 2711 log_unit_warning(UNIT(s)->id, "%s still around after SIGKILL. Ignoring.", UNIT(s)->id);
f42806df 2712 service_enter_stop_post(s, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2713 break;
2714
2715 case SERVICE_STOP_POST:
79008bdd 2716 log_unit_warning(UNIT(s)->id, "%s stop-post timed out. Terminating.", UNIT(s)->id);
f42806df 2717 service_enter_signal(s, SERVICE_FINAL_SIGTERM, SERVICE_FAILURE_TIMEOUT);
034c6ed7
LP
2718 break;
2719
2720 case SERVICE_FINAL_SIGTERM:
4819ff03 2721 if (s->kill_context.send_sigkill) {
79008bdd 2722 log_unit_warning(UNIT(s)->id, "%s stop-final-sigterm timed out. Killing.", UNIT(s)->id);
f42806df 2723 service_enter_signal(s, SERVICE_FINAL_SIGKILL, SERVICE_FAILURE_TIMEOUT);
ba035df2 2724 } else {
79008bdd 2725 log_unit_warning(UNIT(s)->id, "%s stop-final-sigterm timed out. Skipping SIGKILL. Entering failed mode.", UNIT(s)->id);
f42806df 2726 service_enter_dead(s, SERVICE_FAILURE_TIMEOUT, false);
ba035df2
LP
2727 }
2728
034c6ed7
LP
2729 break;
2730
2731 case SERVICE_FINAL_SIGKILL:
79008bdd 2732 log_unit_warning(UNIT(s)->id, "%s still around after final SIGKILL. Entering failed mode.", UNIT(s)->id);
f42806df 2733 service_enter_dead(s, SERVICE_FAILURE_TIMEOUT, true);
034c6ed7
LP
2734 break;
2735
2736 case SERVICE_AUTO_RESTART:
79008bdd 2737 log_unit_info(UNIT(s)->id,
ef417cfd
ZJS
2738 s->restart_usec > 0 ?
2739 "%s holdoff time over, scheduling restart." :
2740 "%s has no holdoff time, scheduling restart.",
2741 UNIT(s)->id);
034c6ed7
LP
2742 service_enter_restart(s);
2743 break;
2744
2745 default:
2746 assert_not_reached("Timeout at wrong time.");
2747 }
718db961
LP
2748
2749 return 0;
2750}
2751
2752static int service_dispatch_watchdog(sd_event_source *source, usec_t usec, void *userdata) {
2753 Service *s = SERVICE(userdata);
a7850c7d 2754 char t[FORMAT_TIMESPAN_MAX];
718db961
LP
2755
2756 assert(s);
2757 assert(source == s->watchdog_event_source);
2758
79008bdd 2759 log_unit_error(UNIT(s)->id, "%s watchdog timeout (limit %s)!", UNIT(s)->id,
a7850c7d 2760 format_timespan(t, sizeof(t), s->watchdog_usec, 1));
8bb2d17d 2761
db2cb23b 2762 service_enter_signal(s, SERVICE_STOP_SIGABRT, SERVICE_FAILURE_WATCHDOG);
842129f5 2763
718db961 2764 return 0;
5cb5a6ff
LP
2765}
2766
a354329f 2767static void service_notify_message(Unit *u, pid_t pid, char **tags, FDSet *fds) {
8c47c732 2768 Service *s = SERVICE(u);
308d72dc 2769 _cleanup_free_ char *cc = NULL;
30b5275a 2770 bool notify_dbus = false;
308d72dc 2771 const char *e;
8c47c732
LP
2772
2773 assert(u);
2774
308d72dc 2775 cc = strv_join(tags, ", ");
79008bdd 2776 log_unit_debug(u->id, "%s: Got notification message from PID "PID_FMT" (%s)",
308d72dc 2777 u->id, pid, isempty(cc) ? "n/a" : cc);
da13d4d2 2778
c952c6ec 2779 if (s->notify_access == NOTIFY_NONE) {
79008bdd 2780 log_unit_warning(u->id, "%s: Got notification message from PID "PID_FMT", but reception is disabled.", u->id, pid);
c952c6ec
LP
2781 return;
2782 }
2783
336c6e46 2784 if (s->notify_access == NOTIFY_MAIN && pid != s->main_pid) {
336c6e46 2785 if (s->main_pid != 0)
79008bdd 2786 log_unit_warning(u->id, "%s: Got notification message from PID "PID_FMT", but reception only permitted for main PID "PID_FMT, u->id, pid, s->main_pid);
336c6e46 2787 else
79008bdd 2788 log_unit_debug(u->id, "%s: Got notification message from PID "PID_FMT", but reception only permitted for main PID which is currently not known", u->id, pid);
c952c6ec
LP
2789 return;
2790 }
2791
8c47c732 2792 /* Interpret MAINPID= */
28849dba 2793 e = strv_find_startswith(tags, "MAINPID=");
5e56b378 2794 if (e && IN_SET(s->state, SERVICE_START, SERVICE_START_POST, SERVICE_RUNNING, SERVICE_RELOAD)) {
28849dba 2795 if (parse_pid(e, &pid) < 0)
79008bdd 2796 log_unit_warning(u->id, "Failed to parse MAINPID= field in notification message: %s", e);
8c47c732 2797 else {
79008bdd 2798 log_unit_debug(u->id, "%s: got MAINPID=%s", u->id, e);
28849dba 2799
5925dd3c 2800 service_set_main_pid(s, pid);
7400b9d2 2801 unit_watch_pid(UNIT(s), pid);
30b5275a 2802 notify_dbus = true;
8c47c732
LP
2803 }
2804 }
2805
308d72dc
LP
2806 /* Interpret RELOADING= */
2807 if (strv_find(tags, "RELOADING=1")) {
2808
79008bdd 2809 log_unit_debug(u->id, "%s: got RELOADING=1", u->id);
308d72dc
LP
2810 s->notify_state = NOTIFY_RELOADING;
2811
2812 if (s->state == SERVICE_RUNNING)
2813 service_enter_reload_by_notify(s);
2814
2815 notify_dbus = true;
2816 }
2817
8c47c732 2818 /* Interpret READY= */
308d72dc
LP
2819 if (strv_find(tags, "READY=1")) {
2820
79008bdd 2821 log_unit_debug(u->id, "%s: got READY=1", u->id);
308d72dc
LP
2822 s->notify_state = NOTIFY_READY;
2823
2824 /* Type=notify services inform us about completed
2825 * initialization with READY=1 */
2826 if (s->type == SERVICE_NOTIFY && s->state == SERVICE_START)
2827 service_enter_start_post(s);
2828
2829 /* Sending READY=1 while we are reloading informs us
2830 * that the reloading is complete */
2831 if (s->state == SERVICE_RELOAD && s->control_pid == 0)
2832 service_enter_running(s, SERVICE_SUCCESS);
2833
2834 notify_dbus = true;
2835 }
2836
2837 /* Interpret STOPPING= */
2838 if (strv_find(tags, "STOPPING=1")) {
2839
79008bdd 2840 log_unit_debug(u->id, "%s: got STOPPING=1", u->id);
308d72dc
LP
2841 s->notify_state = NOTIFY_STOPPING;
2842
2843 if (s->state == SERVICE_RUNNING)
2844 service_enter_stop_by_notify(s);
2845
30b5275a 2846 notify_dbus = true;
8c47c732
LP
2847 }
2848
2849 /* Interpret STATUS= */
28849dba 2850 e = strv_find_startswith(tags, "STATUS=");
7f110ff9 2851 if (e) {
28849dba 2852 _cleanup_free_ char *t = NULL;
8c47c732 2853
28849dba
LP
2854 if (!isempty(e)) {
2855 if (!utf8_is_valid(e))
79008bdd 2856 log_unit_warning(u->id, "Status message in notification is not UTF-8 clean.");
28849dba 2857 else {
79008bdd 2858 log_unit_debug(u->id, "%s: got STATUS=%s", u->id, e);
7f110ff9 2859
28849dba
LP
2860 t = strdup(e);
2861 if (!t)
2862 log_oom();
3a2776bc 2863 }
28849dba 2864 }
8c47c732 2865
30b5275a 2866 if (!streq_ptr(s->status_text, t)) {
28849dba 2867
3a2776bc
LP
2868 free(s->status_text);
2869 s->status_text = t;
28849dba
LP
2870 t = NULL;
2871
30b5275a 2872 notify_dbus = true;
28849dba 2873 }
8c47c732 2874 }
842129f5 2875
4774e357 2876 /* Interpret ERRNO= */
28849dba 2877 e = strv_find_startswith(tags, "ERRNO=");
4774e357
MAA
2878 if (e) {
2879 int status_errno;
2880
28849dba 2881 if (safe_atoi(e, &status_errno) < 0 || status_errno < 0)
79008bdd 2882 log_unit_warning(u->id, "Failed to parse ERRNO= field in notification message: %s", e);
4774e357 2883 else {
79008bdd 2884 log_unit_debug(u->id, "%s: got ERRNO=%s", u->id, e);
4774e357
MAA
2885
2886 if (s->status_errno != status_errno) {
2887 s->status_errno = status_errno;
2888 notify_dbus = true;
2889 }
2890 }
2891 }
2892
6f285378 2893 /* Interpret WATCHDOG= */
a6927d7f 2894 if (strv_find(tags, "WATCHDOG=1")) {
79008bdd 2895 log_unit_debug(u->id, "%s: got WATCHDOG=1", u->id);
842129f5 2896 service_reset_watchdog(s);
a6927d7f 2897 }
c4e2ceae 2898
a354329f
LP
2899 /* Add the passed fds to the fd store */
2900 if (strv_find(tags, "FDSTORE=1")) {
2901 log_unit_debug(u->id, "%s: got FDSTORE=1", u->id);
2339fc93 2902 service_add_fd_store_set(s, fds);
a354329f
LP
2903 }
2904
c4e2ceae 2905 /* Notify clients about changed status or main pid */
30b5275a
LP
2906 if (notify_dbus)
2907 unit_add_to_dbus_queue(u);
8c47c732
LP
2908}
2909
68db7a3b
ZJS
2910static int service_get_timeout(Unit *u, uint64_t *timeout) {
2911 Service *s = SERVICE(u);
2912 int r;
2913
2914 if (!s->timer_event_source)
2915 return 0;
2916
2917 r = sd_event_source_get_time(s->timer_event_source, timeout);
2918 if (r < 0)
2919 return r;
2920
2921 return 1;
2922}
2923
05e343b7
LP
2924static void service_bus_name_owner_change(
2925 Unit *u,
2926 const char *name,
2927 const char *old_owner,
2928 const char *new_owner) {
2929
2930 Service *s = SERVICE(u);
718db961 2931 int r;
05e343b7
LP
2932
2933 assert(s);
2934 assert(name);
2935
2936 assert(streq(s->bus_name, name));
2937 assert(old_owner || new_owner);
2938
2939 if (old_owner && new_owner)
79008bdd 2940 log_unit_debug(u->id, "%s's D-Bus name %s changed owner from %s to %s", u->id, name, old_owner, new_owner);
05e343b7 2941 else if (old_owner)
79008bdd 2942 log_unit_debug(u->id, "%s's D-Bus name %s no longer registered by %s", u->id, name, old_owner);
05e343b7 2943 else
79008bdd 2944 log_unit_debug(u->id, "%s's D-Bus name %s now registered by %s", u->id, name, new_owner);
05e343b7
LP
2945
2946 s->bus_name_good = !!new_owner;
2947
2948 if (s->type == SERVICE_DBUS) {
2949
2950 /* service_enter_running() will figure out what to
2951 * do */
2952 if (s->state == SERVICE_RUNNING)
f42806df 2953 service_enter_running(s, SERVICE_SUCCESS);
05e343b7
LP
2954 else if (s->state == SERVICE_START && new_owner)
2955 service_enter_start_post(s);
2956
2957 } else if (new_owner &&
2958 s->main_pid <= 0 &&
2959 (s->state == SERVICE_START ||
2960 s->state == SERVICE_START_POST ||
2961 s->state == SERVICE_RUNNING ||
2962 s->state == SERVICE_RELOAD)) {
2963
5b12334d 2964 _cleanup_bus_creds_unref_ sd_bus_creds *creds = NULL;
718db961 2965 pid_t pid;
05e343b7 2966
718db961 2967 /* Try to acquire PID from bus service */
05e343b7 2968
056f95d0 2969 r = sd_bus_get_name_creds(u->manager->api_bus, name, SD_BUS_CREDS_PID, &creds);
5b12334d
LP
2970 if (r >= 0)
2971 r = sd_bus_creds_get_pid(creds, &pid);
718db961 2972 if (r >= 0) {
79008bdd 2973 log_unit_debug(u->id, "%s's D-Bus name %s is now owned by process %u", u->id, name, (unsigned) pid);
05e343b7 2974
718db961
LP
2975 service_set_main_pid(s, pid);
2976 unit_watch_pid(UNIT(s), pid);
2977 }
7400b9d2 2978 }
05e343b7
LP
2979}
2980
16115b0a 2981int service_set_socket_fd(Service *s, int fd, Socket *sock, bool selinux_context_net) {
79a98c60
LP
2982 _cleanup_free_ char *peer = NULL;
2983 int r;
57020a3a 2984
4f2d528d
LP
2985 assert(s);
2986 assert(fd >= 0);
2987
2988 /* This is called by the socket code when instantiating a new
2989 * service for a stream socket and the socket needs to be
2990 * configured. */
2991
1124fe6f 2992 if (UNIT(s)->load_state != UNIT_LOADED)
4f2d528d
LP
2993 return -EINVAL;
2994
2995 if (s->socket_fd >= 0)
2996 return -EBUSY;
2997
2998 if (s->state != SERVICE_DEAD)
2999 return -EAGAIN;
3000
79a98c60
LP
3001 if (getpeername_pretty(fd, &peer) >= 0) {
3002
3003 if (UNIT(s)->description) {
3004 _cleanup_free_ char *a;
3005
3006 a = strjoin(UNIT(s)->description, " (", peer, ")", NULL);
3007 if (!a)
3008 return -ENOMEM;
3009
3010 r = unit_set_description(UNIT(s), a);
3011 } else
3012 r = unit_set_description(UNIT(s), peer);
3013
3014 if (r < 0)
3015 return r;
3016 }
3017
4f2d528d 3018 s->socket_fd = fd;
16115b0a 3019 s->socket_fd_selinux_context_net = selinux_context_net;
6cf6bbc2 3020
57020a3a
LP
3021 unit_ref_set(&s->accept_socket, UNIT(sock));
3022
3023 return unit_add_two_dependencies(UNIT(sock), UNIT_BEFORE, UNIT_TRIGGERS, UNIT(s), false);
4f2d528d
LP
3024}
3025
fdf20a31 3026static void service_reset_failed(Unit *u) {
5632e374
LP
3027 Service *s = SERVICE(u);
3028
3029 assert(s);
3030
fdf20a31 3031 if (s->state == SERVICE_FAILED)
5632e374
LP
3032 service_set_state(s, SERVICE_DEAD);
3033
f42806df
LP
3034 s->result = SERVICE_SUCCESS;
3035 s->reload_result = SERVICE_SUCCESS;
451b34cc
LP
3036
3037 RATELIMIT_RESET(s->start_limit);
5632e374
LP
3038}
3039
718db961 3040static int service_kill(Unit *u, KillWho who, int signo, sd_bus_error *error) {
8a0867d6 3041 Service *s = SERVICE(u);
41efeaec 3042
814cc562 3043 return unit_kill_common(u, who, signo, s->main_pid, s->control_pid, error);
8a0867d6
LP
3044}
3045
94f04347
LP
3046static const char* const service_state_table[_SERVICE_STATE_MAX] = {
3047 [SERVICE_DEAD] = "dead",
3048 [SERVICE_START_PRE] = "start-pre",
3049 [SERVICE_START] = "start",
3050 [SERVICE_START_POST] = "start-post",
3051 [SERVICE_RUNNING] = "running",
80876c20 3052 [SERVICE_EXITED] = "exited",
94f04347
LP
3053 [SERVICE_RELOAD] = "reload",
3054 [SERVICE_STOP] = "stop",
1378a3b5 3055 [SERVICE_STOP_SIGABRT] = "stop-sigabrt",
94f04347
LP
3056 [SERVICE_STOP_SIGTERM] = "stop-sigterm",
3057 [SERVICE_STOP_SIGKILL] = "stop-sigkill",
3058 [SERVICE_STOP_POST] = "stop-post",
3059 [SERVICE_FINAL_SIGTERM] = "final-sigterm",
3060 [SERVICE_FINAL_SIGKILL] = "final-sigkill",
fdf20a31 3061 [SERVICE_FAILED] = "failed",
94f04347
LP
3062 [SERVICE_AUTO_RESTART] = "auto-restart",
3063};
3064
3065DEFINE_STRING_TABLE_LOOKUP(service_state, ServiceState);
3066
3067static const char* const service_restart_table[_SERVICE_RESTART_MAX] = {
525ee6f4
LP
3068 [SERVICE_RESTART_NO] = "no",
3069 [SERVICE_RESTART_ON_SUCCESS] = "on-success",
50caaedb 3070 [SERVICE_RESTART_ON_FAILURE] = "on-failure",
6cfe2fde 3071 [SERVICE_RESTART_ON_ABNORMAL] = "on-abnormal",
dc99a976 3072 [SERVICE_RESTART_ON_WATCHDOG] = "on-watchdog",
50caaedb 3073 [SERVICE_RESTART_ON_ABORT] = "on-abort",
6cfe2fde 3074 [SERVICE_RESTART_ALWAYS] = "always",
94f04347
LP
3075};
3076
3077DEFINE_STRING_TABLE_LOOKUP(service_restart, ServiceRestart);
3078
3079static const char* const service_type_table[_SERVICE_TYPE_MAX] = {
94f04347 3080 [SERVICE_SIMPLE] = "simple",
0d624a78 3081 [SERVICE_FORKING] = "forking",
34e9ba66 3082 [SERVICE_ONESHOT] = "oneshot",
8c47c732 3083 [SERVICE_DBUS] = "dbus",
f2b68789
LP
3084 [SERVICE_NOTIFY] = "notify",
3085 [SERVICE_IDLE] = "idle"
94f04347
LP
3086};
3087
3088DEFINE_STRING_TABLE_LOOKUP(service_type, ServiceType);
3089
e537352b 3090static const char* const service_exec_command_table[_SERVICE_EXEC_COMMAND_MAX] = {
94f04347
LP
3091 [SERVICE_EXEC_START_PRE] = "ExecStartPre",
3092 [SERVICE_EXEC_START] = "ExecStart",
3093 [SERVICE_EXEC_START_POST] = "ExecStartPost",
3094 [SERVICE_EXEC_RELOAD] = "ExecReload",
3095 [SERVICE_EXEC_STOP] = "ExecStop",
3096 [SERVICE_EXEC_STOP_POST] = "ExecStopPost",
3097};
3098
3099DEFINE_STRING_TABLE_LOOKUP(service_exec_command, ServiceExecCommand);
3100
c952c6ec
LP
3101static const char* const notify_access_table[_NOTIFY_ACCESS_MAX] = {
3102 [NOTIFY_NONE] = "none",
3103 [NOTIFY_MAIN] = "main",
3104 [NOTIFY_ALL] = "all"
3105};
3106
3107DEFINE_STRING_TABLE_LOOKUP(notify_access, NotifyAccess);
3108
308d72dc
LP
3109static const char* const notify_state_table[_NOTIFY_STATE_MAX] = {
3110 [NOTIFY_UNKNOWN] = "unknown",
3111 [NOTIFY_READY] = "ready",
3112 [NOTIFY_RELOADING] = "reloading",
3113 [NOTIFY_STOPPING] = "stopping",
3114};
3115
3116DEFINE_STRING_TABLE_LOOKUP(notify_state, NotifyState);
3117
f42806df
LP
3118static const char* const service_result_table[_SERVICE_RESULT_MAX] = {
3119 [SERVICE_SUCCESS] = "success",
3120 [SERVICE_FAILURE_RESOURCES] = "resources",
3121 [SERVICE_FAILURE_TIMEOUT] = "timeout",
3122 [SERVICE_FAILURE_EXIT_CODE] = "exit-code",
3123 [SERVICE_FAILURE_SIGNAL] = "signal",
bb242b7b 3124 [SERVICE_FAILURE_CORE_DUMP] = "core-dump",
8d1b002a
LP
3125 [SERVICE_FAILURE_WATCHDOG] = "watchdog",
3126 [SERVICE_FAILURE_START_LIMIT] = "start-limit"
f42806df
LP
3127};
3128
3129DEFINE_STRING_TABLE_LOOKUP(service_result, ServiceResult);
3130
87f0e418 3131const UnitVTable service_vtable = {
7d17cfbc 3132 .object_size = sizeof(Service),
718db961
LP
3133 .exec_context_offset = offsetof(Service, exec_context),
3134 .cgroup_context_offset = offsetof(Service, cgroup_context),
3135 .kill_context_offset = offsetof(Service, kill_context),
613b411c 3136 .exec_runtime_offset = offsetof(Service, exec_runtime),
3ef63c31 3137
f975e971
LP
3138 .sections =
3139 "Unit\0"
3140 "Service\0"
3141 "Install\0",
4ad49000 3142 .private_section = "Service",
71645aca 3143
034c6ed7
LP
3144 .init = service_init,
3145 .done = service_done,
a16e1123 3146 .load = service_load,
a354329f 3147 .release_resources = service_release_resources,
a16e1123
LP
3148
3149 .coldplug = service_coldplug,
034c6ed7 3150
5cb5a6ff
LP
3151 .dump = service_dump,
3152
3153 .start = service_start,
3154 .stop = service_stop,
3155 .reload = service_reload,
3156
034c6ed7
LP
3157 .can_reload = service_can_reload,
3158
8a0867d6
LP
3159 .kill = service_kill,
3160
a16e1123
LP
3161 .serialize = service_serialize,
3162 .deserialize_item = service_deserialize_item,
3163
5cb5a6ff 3164 .active_state = service_active_state,
10a94420 3165 .sub_state_to_string = service_sub_state_to_string,
5cb5a6ff 3166
701cc384
LP
3167 .check_gc = service_check_gc,
3168 .check_snapshot = service_check_snapshot,
3169
034c6ed7 3170 .sigchld_event = service_sigchld_event,
2c4104f0 3171
fdf20a31 3172 .reset_failed = service_reset_failed,
5632e374 3173
4ad49000 3174 .notify_cgroup_empty = service_notify_cgroup_empty_event,
8c47c732 3175 .notify_message = service_notify_message,
8e274523 3176
05e343b7 3177 .bus_name_owner_change = service_bus_name_owner_change,
05e343b7 3178
c4e2ceae 3179 .bus_interface = "org.freedesktop.systemd1.Service",
718db961 3180 .bus_vtable = bus_service_vtable,
74c964d3
LP
3181 .bus_set_property = bus_service_set_property,
3182 .bus_commit_properties = bus_service_commit_properties,
4139c1b2 3183
68db7a3b 3184 .get_timeout = service_get_timeout,
718db961
LP
3185 .can_transient = true,
3186
c6918296
MS
3187 .status_message_formats = {
3188 .starting_stopping = {
3189 [0] = "Starting %s...",
3190 [1] = "Stopping %s...",
3191 },
3192 .finished_start_job = {
3193 [JOB_DONE] = "Started %s.",
3194 [JOB_FAILED] = "Failed to start %s.",
3195 [JOB_DEPENDENCY] = "Dependency failed for %s.",
3196 [JOB_TIMEOUT] = "Timed out starting %s.",
3197 },
3198 .finished_stop_job = {
3199 [JOB_DONE] = "Stopped %s.",
3200 [JOB_FAILED] = "Stopped (with error) %s.",
3201 [JOB_TIMEOUT] = "Timed out stopping %s.",
3202 },
3203 },
5cb5a6ff 3204};