anitazha / rpms / systemd

Forked from rpms/systemd 3 years ago
Clone

Blame SOURCES/0570-service-serialize-information-about-currently-execut.patch

dd65c9
From 5aafbcced90ae2a3b418d6fe26c67e820daa8bad Mon Sep 17 00:00:00 2001
dd65c9
From: Michal Sekletar <msekleta@redhat.com>
dd65c9
Date: Mon, 23 Jan 2017 17:12:35 +0100
dd65c9
Subject: [PATCH] service: serialize information about currently executing
dd65c9
 command
dd65c9
dd65c9
Stored information will help us to resume execution after the
dd65c9
daemon-reload.
dd65c9
dd65c9
This commit implements following scheme,
dd65c9
dd65c9
* On serialization:
dd65c9
  - we count rank of the currently executing command
dd65c9
  - we store command type, its rank and command line arguments
dd65c9
dd65c9
* On deserialization:
dd65c9
  - configuration is parsed and loaded
dd65c9
  - we deserialize stored data, command type, rank and arguments
dd65c9
  - we look at the given rank in the list and if command there has same
dd65c9
    arguments then we restore execution at that point
dd65c9
  - otherwise we search respective command list and we look for command
dd65c9
    that has the same arguments
dd65c9
  - if both methods fail we do not do not resume execution at all
dd65c9
dd65c9
To better illustrate how does above scheme works, please consider
dd65c9
following cases (<<< denotes position where we resume execution after reload)
dd65c9
dd65c9
; Original unit file
dd65c9
[Service]
dd65c9
ExecStart=/bin/true <<<
dd65c9
ExecStart=/bin/false
dd65c9
dd65c9
; Swapped commands
dd65c9
; Second command is not going to be executed
dd65c9
[Service]
dd65c9
ExecStart=/bin/false
dd65c9
ExecStart=/bin/true <<<
dd65c9
dd65c9
; Commands added before
dd65c9
; Same commands are problematic and execution could be restarted at wrong place
dd65c9
[Service]
dd65c9
ExecStart=/bin/foo
dd65c9
ExecStart=/bin/bar
dd65c9
ExecStart=/bin/true <<<
dd65c9
ExecStart=/bin/false
dd65c9
dd65c9
; Commands added after
dd65c9
; Same commands are not an issue in this case
dd65c9
[Service]
dd65c9
ExecStart=/bin/true <<<
dd65c9
ExecStart=/bin/false
dd65c9
ExecStart=/bin/foo
dd65c9
ExecStart=/bin/bar
dd65c9
dd65c9
; New commands interleaved with old commands
dd65c9
; Some new commands will be executed while others won't
dd65c9
ExecStart=/bin/foo
dd65c9
ExecStart=/bin/true <<<
dd65c9
ExecStart=/bin/bar
dd65c9
ExecStart=/bin/false
dd65c9
dd65c9
As you can see, above scheme has some drawbacks. However, in most
dd65c9
cases (we assume that in most common case unit file command list is not
dd65c9
changed while some other command is running for the same unit) it
dd65c9
should cause that systemd does the right thing, which is restoring
dd65c9
execution exactly at the point we were before daemon-reload.
dd65c9
dd65c9
Fixes #518
dd65c9
dd65c9
(cherry picked from commit e266c068b5597e18b2299f9c9d3ee6cf04198c41)
dd65c9
dd65c9
Resolves: #1404657,#1471230
dd65c9
---
23b3cf
 src/core/service.c | 195 +++++++++++++++++++++++++++++++++++++++++----
dd65c9
 1 file changed, 180 insertions(+), 15 deletions(-)
dd65c9
dd65c9
diff --git a/src/core/service.c b/src/core/service.c
Pablo Greco 48fc63
index 3bd6c33381..9ad3a0eb01 100644
dd65c9
--- a/src/core/service.c
dd65c9
+++ b/src/core/service.c
dd65c9
@@ -1950,6 +1950,80 @@ _pure_ static bool service_can_reload(Unit *u) {
dd65c9
         return !!s->exec_command[SERVICE_EXEC_RELOAD];
dd65c9
 }
dd65c9
 
dd65c9
+static unsigned service_exec_command_index(Unit *u, ServiceExecCommand id, ExecCommand *current) {
dd65c9
+        Service *s = SERVICE(u);
dd65c9
+        unsigned idx = 0;
dd65c9
+        ExecCommand *first, *c;
dd65c9
+
dd65c9
+        assert(s);
dd65c9
+
dd65c9
+        first = s->exec_command[id];
dd65c9
+
dd65c9
+        /* Figure out where we are in the list by walking back to the beginning */
dd65c9
+        for (c = current; c != first; c = c->command_prev)
dd65c9
+                idx++;
dd65c9
+
dd65c9
+        return idx;
dd65c9
+}
dd65c9
+
dd65c9
+static int service_serialize_exec_command(Unit *u, FILE *f, ExecCommand *command) {
dd65c9
+        Service *s = SERVICE(u);
dd65c9
+        ServiceExecCommand id;
dd65c9
+        unsigned idx;
dd65c9
+        const char *type;
dd65c9
+        char **arg;
dd65c9
+        _cleanup_strv_free_ char **escaped_args = NULL;
dd65c9
+        _cleanup_free_ char *args = NULL, *p = NULL;
dd65c9
+        size_t allocated = 0, length = 0;
dd65c9
+
dd65c9
+        assert(s);
dd65c9
+        assert(f);
dd65c9
+
dd65c9
+        if (!command)
dd65c9
+                return 0;
dd65c9
+
dd65c9
+        if (command == s->control_command) {
dd65c9
+                type = "control";
dd65c9
+                id = s->control_command_id;
dd65c9
+        } else {
dd65c9
+                type = "main";
dd65c9
+                id = SERVICE_EXEC_START;
dd65c9
+        }
dd65c9
+
dd65c9
+        idx = service_exec_command_index(u, id, command);
dd65c9
+
dd65c9
+        STRV_FOREACH(arg, command->argv) {
dd65c9
+                size_t n;
dd65c9
+                _cleanup_free_ char *e = NULL;
dd65c9
+
dd65c9
+                e = xescape(*arg, WHITESPACE);
dd65c9
+                if (!e)
dd65c9
+                        return -ENOMEM;
dd65c9
+
dd65c9
+                n = strlen(e);
dd65c9
+                if (!GREEDY_REALLOC(args, allocated, length + 1 + n + 1))
dd65c9
+                        return -ENOMEM;
dd65c9
+
dd65c9
+                if (length > 0)
dd65c9
+                        args[length++] = ' ';
dd65c9
+
dd65c9
+                memcpy(args + length, e, n);
dd65c9
+                length += n;
dd65c9
+        }
dd65c9
+
dd65c9
+        if (!GREEDY_REALLOC(args, allocated, length + 1))
dd65c9
+                return -ENOMEM;
dd65c9
+        args[length++] = 0;
dd65c9
+
dd65c9
+        p = xescape(command->path, WHITESPACE);
dd65c9
+        if (!p)
dd65c9
+                return -ENOMEM;
dd65c9
+
dd65c9
+        fprintf(f, "%s-command=%s %u %s %s\n", type, service_exec_command_to_string(id), idx, p, args);
dd65c9
+
dd65c9
+        return 0;
dd65c9
+}
dd65c9
+
dd65c9
 static int service_serialize(Unit *u, FILE *f, FDSet *fds) {
dd65c9
         Service *s = SERVICE(u);
dd65c9
         ServiceFDStore *fs;
dd65c9
@@ -1974,12 +2048,8 @@ static int service_serialize(Unit *u, FILE *f, FDSet *fds) {
dd65c9
         if (s->status_text)
dd65c9
                 unit_serialize_item(u, f, "status-text", s->status_text);
dd65c9
 
dd65c9
-        /* FIXME: There's a minor uncleanliness here: if there are
dd65c9
-         * multiple commands attached here, we will start from the
dd65c9
-         * first one again */
dd65c9
-        if (s->control_command_id >= 0)
dd65c9
-                unit_serialize_item(u, f, "control-command",
dd65c9
-                                    service_exec_command_to_string(s->control_command_id));
dd65c9
+        service_serialize_exec_command(u, f, s->control_command);
dd65c9
+        service_serialize_exec_command(u, f, s->main_command);
dd65c9
 
dd65c9
         if (s->socket_fd >= 0) {
dd65c9
                 int copy;
dd65c9
@@ -2035,6 +2105,106 @@ static int service_serialize(Unit *u, FILE *f, FDSet *fds) {
dd65c9
         return 0;
dd65c9
 }
dd65c9
 
dd65c9
+static int service_deserialize_exec_command(Unit *u, const char *key, const char *value) {
dd65c9
+        Service *s = SERVICE(u);
dd65c9
+        int r;
dd65c9
+        unsigned idx = 0, i;
dd65c9
+        bool control, found = false;
dd65c9
+        ServiceExecCommand id = _SERVICE_EXEC_COMMAND_INVALID;
dd65c9
+        ExecCommand *command = NULL;
dd65c9
+        _cleanup_free_ char *args = NULL, *path = NULL;
dd65c9
+        _cleanup_strv_free_ char **argv = NULL;
dd65c9
+
dd65c9
+        enum ExecCommandState {
dd65c9
+                STATE_EXEC_COMMAND_TYPE,
dd65c9
+                STATE_EXEC_COMMAND_INDEX,
dd65c9
+                STATE_EXEC_COMMAND_PATH,
dd65c9
+                STATE_EXEC_COMMAND_ARGS,
dd65c9
+                _STATE_EXEC_COMMAND_MAX,
dd65c9
+                _STATE_EXEC_COMMAND_INVALID = -1,
dd65c9
+        } state;
dd65c9
+
dd65c9
+        assert(s);
dd65c9
+        assert(key);
dd65c9
+        assert(value);
dd65c9
+
dd65c9
+        control = streq(key, "control-command");
dd65c9
+
dd65c9
+        state = STATE_EXEC_COMMAND_TYPE;
dd65c9
+
dd65c9
+        for (;;) {
dd65c9
+                _cleanup_free_ char *arg = NULL;
dd65c9
+
dd65c9
+                r = extract_first_word(&value, &arg, NULL, EXTRACT_CUNESCAPE);
dd65c9
+                if (r == 0)
dd65c9
+                        break;
dd65c9
+                else if (r < 0)
dd65c9
+                        return r;
dd65c9
+
dd65c9
+                switch (state) {
dd65c9
+                case STATE_EXEC_COMMAND_TYPE:
dd65c9
+                        id = service_exec_command_from_string(arg);
dd65c9
+                        if (id < 0)
dd65c9
+                                return -EINVAL;
dd65c9
+
dd65c9
+                        state = STATE_EXEC_COMMAND_INDEX;
dd65c9
+                        break;
dd65c9
+                case STATE_EXEC_COMMAND_INDEX:
dd65c9
+                        r = safe_atou(arg, &idx);
dd65c9
+                        if (r < 0)
dd65c9
+                                return -EINVAL;
dd65c9
+
dd65c9
+                        state = STATE_EXEC_COMMAND_PATH;
dd65c9
+                        break;
dd65c9
+                case STATE_EXEC_COMMAND_PATH:
dd65c9
+                        path = arg;
dd65c9
+                        arg = NULL;
dd65c9
+                        state = STATE_EXEC_COMMAND_ARGS;
dd65c9
+
dd65c9
+                        if (!path_is_absolute(path))
dd65c9
+                                return -EINVAL;
dd65c9
+                        break;
dd65c9
+                case STATE_EXEC_COMMAND_ARGS:
dd65c9
+                        r = strv_extend(&argv, arg);
dd65c9
+                        if (r < 0)
dd65c9
+                                return -ENOMEM;
dd65c9
+                        break;
dd65c9
+                default:
dd65c9
+                        assert_not_reached("Unknown error at deserialization of exec command");
dd65c9
+                        break;
dd65c9
+                }
dd65c9
+        }
dd65c9
+
dd65c9
+        if (state != STATE_EXEC_COMMAND_ARGS)
dd65c9
+                return -EINVAL;
dd65c9
+
dd65c9
+        /* Let's check whether exec command on given offset matches data that we just deserialized */
dd65c9
+        for (command = s->exec_command[id], i = 0; command; command = command->command_next, i++) {
dd65c9
+                if (i != idx)
dd65c9
+                        continue;
dd65c9
+
dd65c9
+                found = strv_equal(argv, command->argv) && streq(command->path, path);
dd65c9
+                break;
dd65c9
+        }
dd65c9
+
dd65c9
+        if (!found) {
dd65c9
+                /* Command at the index we serialized is different, let's look for command that exactly
dd65c9
+                 * matches but is on different index. If there is no such command we will not resume execution. */
dd65c9
+                for (command = s->exec_command[id]; command; command = command->command_next)
dd65c9
+                        if (strv_equal(command->argv, argv) && streq(command->path, path))
dd65c9
+                                break;
dd65c9
+        }
dd65c9
+
dd65c9
+        if (command && control)
dd65c9
+                s->control_command = command;
dd65c9
+        else if (command)
dd65c9
+                s->main_command = command;
dd65c9
+        else
dd65c9
+                log_unit_warning(u->id, "Current command vanished from the unit file, execution of the command list won't be resumed.");
dd65c9
+
dd65c9
+        return 0;
dd65c9
+}
dd65c9
+
dd65c9
 static int service_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
dd65c9
         Service *s = SERVICE(u);
dd65c9
         int r;
dd65c9
@@ -2105,16 +2275,11 @@ static int service_deserialize_item(Unit *u, const char *key, const char *value,
dd65c9
                         s->status_text = t;
dd65c9
                 }
dd65c9
 
dd65c9
-        } else if (streq(key, "control-command")) {
dd65c9
-                ServiceExecCommand id;
dd65c9
+        } else if (STR_IN_SET(key, "main-command", "control-command")) {
dd65c9
+                r = service_deserialize_exec_command(u, key, value);
dd65c9
+                if (r < 0)
dd65c9
+                        log_unit_debug_errno(u->id, r, "Failed to parse serialized command \"%s\": %m", value);
dd65c9
 
dd65c9
-                id = service_exec_command_from_string(value);
dd65c9
-                if (id < 0)
dd65c9
-                        log_unit_debug(u->id, "Failed to parse exec-command value %s", value);
dd65c9
-                else {
dd65c9
-                        s->control_command_id = id;
dd65c9
-                        s->control_command = s->exec_command[id];
dd65c9
-                }
dd65c9
         } else if (streq(key, "socket-fd")) {
dd65c9
                 int fd;
dd65c9