]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/socket.c
service: refuse to start services that are configured for per-connection instantiatio...
[thirdparty/systemd.git] / src / socket.c
CommitLineData
5cb5a6ff
LP
1/*-*- Mode: C; c-basic-offset: 8 -*-*/
2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
83c60c9f
LP
22#include <sys/types.h>
23#include <sys/stat.h>
24#include <unistd.h>
25#include <errno.h>
26#include <fcntl.h>
f94ea366 27#include <sys/epoll.h>
034c6ed7 28#include <signal.h>
4f2d528d 29#include <arpa/inet.h>
83c60c9f 30
87f0e418 31#include "unit.h"
5cb5a6ff 32#include "socket.h"
83c60c9f 33#include "log.h"
23a177ef
LP
34#include "load-dropin.h"
35#include "load-fragment.h"
9e2f7c11 36#include "strv.h"
4f2d528d 37#include "unit-name.h"
4139c1b2 38#include "dbus-socket.h"
4fd5948e 39#include "missing.h"
a40eb732 40#include "special.h"
398ef8ba 41#include "bus-errors.h"
83c60c9f 42
acbb0225 43static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
87f0e418
LP
44 [SOCKET_DEAD] = UNIT_INACTIVE,
45 [SOCKET_START_PRE] = UNIT_ACTIVATING,
46 [SOCKET_START_POST] = UNIT_ACTIVATING,
47 [SOCKET_LISTENING] = UNIT_ACTIVE,
48 [SOCKET_RUNNING] = UNIT_ACTIVE,
49 [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
50 [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
51 [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
52 [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
80876c20
LP
53 [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
54 [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
032ff4af 55 [SOCKET_MAINTENANCE] = UNIT_MAINTENANCE
83c60c9f 56};
5cb5a6ff 57
a16e1123
LP
58static void socket_init(Unit *u) {
59 Socket *s = SOCKET(u);
60
61 assert(u);
62 assert(u->meta.load_state == UNIT_STUB);
63
a16e1123
LP
64 s->backlog = SOMAXCONN;
65 s->timeout_usec = DEFAULT_TIMEOUT_USEC;
66 s->directory_mode = 0755;
67 s->socket_mode = 0666;
68
6cf6bbc2
LP
69 s->max_connections = 64;
70
4fd5948e 71 s->priority = -1;
4fd5948e
LP
72 s->ip_tos = -1;
73 s->ip_ttl = -1;
4fd5948e 74 s->mark = -1;
4fd5948e 75
a16e1123
LP
76 exec_context_init(&s->exec_context);
77
78 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
79}
acbb0225 80
5e94833f
LP
81static void socket_unwatch_control_pid(Socket *s) {
82 assert(s);
83
84 if (s->control_pid <= 0)
85 return;
86
87 unit_unwatch_pid(UNIT(s), s->control_pid);
88 s->control_pid = 0;
89}
90
87f0e418
LP
91static void socket_done(Unit *u) {
92 Socket *s = SOCKET(u);
034c6ed7 93 SocketPort *p;
6cf6bbc2 94 Meta *i;
034c6ed7
LP
95
96 assert(s);
97
98 while ((p = s->ports)) {
99 LIST_REMOVE(SocketPort, port, s->ports, p);
100
a16e1123
LP
101 if (p->fd >= 0) {
102 unit_unwatch_fd(UNIT(s), &p->fd_watch);
103 close_nointr_nofail(p->fd);
104 }
105
034c6ed7
LP
106 free(p->path);
107 free(p);
108 }
109
110 exec_context_done(&s->exec_context);
e537352b 111 exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
034c6ed7
LP
112 s->control_command = NULL;
113
5e94833f 114 socket_unwatch_control_pid(s);
034c6ed7
LP
115
116 s->service = NULL;
117
acbb0225 118 free(s->bind_to_device);
e537352b 119 s->bind_to_device = NULL;
acbb0225
LP
120
121 unit_unwatch_timer(u, &s->timer_watch);
6cf6bbc2
LP
122
123 /* Make sure no service instance refers to us anymore. */
124 LIST_FOREACH(units_per_type, i, u->meta.manager->units_per_type[UNIT_SERVICE]) {
125 Service *service = (Service *) i;
126
127 if (service->socket == s)
128 service->socket = NULL;
129 }
5cb5a6ff
LP
130}
131
4f2d528d
LP
132static bool have_non_accept_socket(Socket *s) {
133 SocketPort *p;
134
135 assert(s);
136
137 if (!s->accept)
138 return true;
139
dd5ad9d4
LP
140 LIST_FOREACH(port, p, s->ports) {
141
142 if (p->type != SOCKET_SOCKET)
143 return true;
144
4f2d528d
LP
145 if (!socket_address_can_accept(&p->address))
146 return true;
dd5ad9d4 147 }
4f2d528d
LP
148
149 return false;
150}
151
152static int socket_verify(Socket *s) {
153 assert(s);
154
4cd1fbcc 155 if (s->meta.load_state != UNIT_LOADED)
4f2d528d
LP
156 return 0;
157
158 if (!s->ports) {
4cd1fbcc 159 log_error("%s lacks Listen setting. Refusing.", s->meta.id);
4f2d528d
LP
160 return -EINVAL;
161 }
162
6cf6bbc2 163 if (s->accept && s->max_connections <= 0) {
4d0e5dbd
LP
164 log_error("%s's MaxConnection setting too small. Refusing.", s->meta.id);
165 return -EINVAL;
166 }
167
2e22afe9 168 if (s->exec_context.pam_name && s->exec_context.kill_mode != KILL_CONTROL_GROUP) {
4d0e5dbd 169 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", s->meta.id);
6cf6bbc2
LP
170 return -EINVAL;
171 }
172
4f2d528d
LP
173 return 0;
174}
175
6e2ef85b
LP
176static bool socket_needs_mount(Socket *s, const char *prefix) {
177 SocketPort *p;
178
179 assert(s);
180
181 LIST_FOREACH(port, p, s->ports) {
182
183 if (p->type == SOCKET_SOCKET) {
184 if (socket_address_needs_mount(&p->address, prefix))
185 return true;
186 } else {
187 assert(p->type == SOCKET_FIFO);
188 if (path_startswith(p->path, prefix))
189 return true;
190 }
191 }
192
193 return false;
194}
195
196int socket_add_one_mount_link(Socket *s, Mount *m) {
197 int r;
198
199 assert(s);
200 assert(m);
201
202 if (s->meta.load_state != UNIT_LOADED ||
203 m->meta.load_state != UNIT_LOADED)
204 return 0;
205
206 if (!socket_needs_mount(s, m->where))
207 return 0;
208
2c966c03 209 if ((r = unit_add_two_dependencies(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true)) < 0)
6e2ef85b
LP
210 return r;
211
212 return 0;
213}
214
215static int socket_add_mount_links(Socket *s) {
216 Meta *other;
217 int r;
218
219 assert(s);
220
221 LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
222 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
223 return r;
224
225 return 0;
226}
227
228static int socket_add_device_link(Socket *s) {
229 char *t;
230 int r;
231
232 assert(s);
233
234 if (!s->bind_to_device)
235 return 0;
236
237 if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
238 return -ENOMEM;
239
240 r = unit_add_node_link(UNIT(s), t, false);
241 free(t);
242
243 return r;
244}
245
a40eb732
LP
246static int socket_add_default_dependencies(Socket *s) {
247 int r;
248 assert(s);
249
250 if (s->meta.manager->running_as == MANAGER_SYSTEM)
251 if ((r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true)) < 0)
252 return r;
253
254 return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
255}
256
e537352b
LP
257static int socket_load(Unit *u) {
258 Socket *s = SOCKET(u);
259 int r;
44d8db9e 260
e537352b
LP
261 assert(u);
262 assert(u->meta.load_state == UNIT_STUB);
44d8db9e 263
e537352b 264 if ((r = unit_load_fragment_and_dropin(u)) < 0)
23a177ef 265 return r;
44d8db9e 266
23a177ef 267 /* This is a new unit? Then let's add in some extras */
e537352b 268 if (u->meta.load_state == UNIT_LOADED) {
44d8db9e 269
4f2d528d 270 if (have_non_accept_socket(s)) {
25366e09 271 if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)) < 0)
4f2d528d 272 return r;
23a177ef 273
701cc384 274 if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
4f2d528d
LP
275 return r;
276 }
44d8db9e 277
6e2ef85b
LP
278 if ((r = socket_add_mount_links(s)) < 0)
279 return r;
280
281 if ((r = socket_add_device_link(s)) < 0)
282 return r;
283
23a177ef
LP
284 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
285 return r;
286
287 if ((r = unit_add_default_cgroup(u)) < 0)
288 return r;
a40eb732
LP
289
290 if (s->meta.default_dependencies)
291 if ((r = socket_add_default_dependencies(s)) < 0)
292 return r;
23a177ef
LP
293 }
294
4f2d528d 295 return socket_verify(s);
44d8db9e
LP
296}
297
542563ba
LP
298static const char* listen_lookup(int type) {
299
300 if (type == SOCK_STREAM)
301 return "ListenStream";
302 else if (type == SOCK_DGRAM)
303 return "ListenDatagram";
304 else if (type == SOCK_SEQPACKET)
305 return "ListenSequentialPacket";
306
034c6ed7 307 assert_not_reached("Unknown socket type");
542563ba
LP
308 return NULL;
309}
310
87f0e418 311static void socket_dump(Unit *u, FILE *f, const char *prefix) {
5cb5a6ff 312
5cb5a6ff 313 SocketExecCommand c;
87f0e418 314 Socket *s = SOCKET(u);
542563ba 315 SocketPort *p;
82ba9f08
LP
316 const char *prefix2;
317 char *p2;
5cb5a6ff
LP
318
319 assert(s);
fa068367 320 assert(f);
5cb5a6ff 321
82ba9f08
LP
322 p2 = strappend(prefix, "\t");
323 prefix2 = p2 ? p2 : prefix;
c43d20a0 324
5cb5a6ff
LP
325 fprintf(f,
326 "%sSocket State: %s\n"
542563ba 327 "%sBindIPv6Only: %s\n"
b5a0699f
LP
328 "%sBacklog: %u\n"
329 "%sSocketMode: %04o\n"
4fd5948e
LP
330 "%sDirectoryMode: %04o\n"
331 "%sKeepAlive: %s\n"
332 "%sFreeBind: %s\n",
a16e1123 333 prefix, socket_state_to_string(s->state),
c0120d99 334 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
b5a0699f
LP
335 prefix, s->backlog,
336 prefix, s->socket_mode,
4fd5948e
LP
337 prefix, s->directory_mode,
338 prefix, yes_no(s->keep_alive),
339 prefix, yes_no(s->free_bind));
542563ba 340
70123e68
LP
341 if (s->control_pid > 0)
342 fprintf(f,
bb00e604
LP
343 "%sControl PID: %lu\n",
344 prefix, (unsigned long) s->control_pid);
70123e68 345
acbb0225
LP
346 if (s->bind_to_device)
347 fprintf(f,
348 "%sBindToDevice: %s\n",
349 prefix, s->bind_to_device);
350
4f2d528d
LP
351 if (s->accept)
352 fprintf(f,
6cf6bbc2
LP
353 "%sAccepted: %u\n"
354 "%sNConnections: %u\n"
355 "%sMaxConnections: %u\n",
356 prefix, s->n_accepted,
357 prefix, s->n_connections,
358 prefix, s->max_connections);
4f2d528d 359
4fd5948e
LP
360 if (s->priority >= 0)
361 fprintf(f,
362 "%sPriority: %i\n",
363 prefix, s->priority);
364
365 if (s->receive_buffer > 0)
366 fprintf(f,
367 "%sReceiveBuffer: %zu\n",
368 prefix, s->receive_buffer);
369
370 if (s->send_buffer > 0)
371 fprintf(f,
372 "%sSendBuffer: %zu\n",
373 prefix, s->send_buffer);
374
375 if (s->ip_tos >= 0)
376 fprintf(f,
377 "%sIPTOS: %i\n",
378 prefix, s->ip_tos);
379
380 if (s->ip_ttl >= 0)
381 fprintf(f,
382 "%sIPTTL: %i\n",
383 prefix, s->ip_ttl);
384
385 if (s->pipe_size > 0)
386 fprintf(f,
387 "%sPipeSize: %zu\n",
388 prefix, s->pipe_size);
389
390 if (s->mark >= 0)
391 fprintf(f,
392 "%sMark: %i\n",
393 prefix, s->mark);
394
034c6ed7 395 LIST_FOREACH(port, p, s->ports) {
5cb5a6ff 396
542563ba
LP
397 if (p->type == SOCKET_SOCKET) {
398 const char *t;
399 int r;
400 char *k;
401
402 if ((r = socket_address_print(&p->address, &k)) < 0)
403 t = strerror(-r);
404 else
405 t = k;
406
407 fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
408 free(k);
409 } else
410 fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
411 }
5cb5a6ff
LP
412
413 exec_context_dump(&s->exec_context, f, prefix);
414
e537352b 415 for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
c43d20a0
LP
416 if (!s->exec_command[c])
417 continue;
5cb5a6ff 418
40d50879 419 fprintf(f, "%s-> %s:\n",
a16e1123 420 prefix, socket_exec_command_to_string(c));
c43d20a0
LP
421
422 exec_command_dump_list(s->exec_command[c], f, prefix2);
5cb5a6ff 423 }
c43d20a0 424
82ba9f08 425 free(p2);
5cb5a6ff
LP
426}
427
4f2d528d
LP
428static int instance_from_socket(int fd, unsigned nr, char **instance) {
429 socklen_t l;
430 char *r;
431 union {
432 struct sockaddr sa;
433 struct sockaddr_un un;
434 struct sockaddr_in in;
435 struct sockaddr_in6 in6;
436 struct sockaddr_storage storage;
437 } local, remote;
438
439 assert(fd >= 0);
440 assert(instance);
441
442 l = sizeof(local);
443 if (getsockname(fd, &local.sa, &l) < 0)
444 return -errno;
445
446 l = sizeof(remote);
447 if (getpeername(fd, &remote.sa, &l) < 0)
448 return -errno;
449
450 switch (local.sa.sa_family) {
451
452 case AF_INET: {
453 uint32_t
454 a = ntohl(local.in.sin_addr.s_addr),
455 b = ntohl(remote.in.sin_addr.s_addr);
456
457 if (asprintf(&r,
a16e1123 458 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
4f2d528d
LP
459 nr,
460 a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
461 ntohs(local.in.sin_port),
462 b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
463 ntohs(remote.in.sin_port)) < 0)
464 return -ENOMEM;
465
466 break;
467 }
468
469 case AF_INET6: {
2b061f5a
LP
470 static const char ipv4_prefix[] = {
471 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
472 };
473
474 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
475 memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
476 const uint8_t
477 *a = local.in6.sin6_addr.s6_addr+12,
478 *b = remote.in6.sin6_addr.s6_addr+12;
479
480 if (asprintf(&r,
481 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
482 nr,
483 a[0], a[1], a[2], a[3],
484 ntohs(local.in6.sin6_port),
485 b[0], b[1], b[2], b[3],
486 ntohs(remote.in6.sin6_port)) < 0)
487 return -ENOMEM;
488 } else {
489 char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
490
491 if (asprintf(&r,
492 "%u-%s:%u-%s:%u",
493 nr,
494 inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
495 ntohs(local.in6.sin6_port),
496 inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
497 ntohs(remote.in6.sin6_port)) < 0)
498 return -ENOMEM;
499 }
4f2d528d
LP
500
501 break;
502 }
503
504 case AF_UNIX: {
505 struct ucred ucred;
506
507 l = sizeof(ucred);
508 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
509 return -errno;
510
511 if (asprintf(&r,
bb00e604 512 "%u-%lu-%lu",
4f2d528d 513 nr,
bb00e604
LP
514 (unsigned long) ucred.pid,
515 (unsigned long) ucred.uid) < 0)
4f2d528d
LP
516 return -ENOMEM;
517
518 break;
519 }
520
521 default:
522 assert_not_reached("Unhandled socket type.");
523 }
524
525 *instance = r;
526 return 0;
527}
528
034c6ed7 529static void socket_close_fds(Socket *s) {
83c60c9f
LP
530 SocketPort *p;
531
532 assert(s);
533
034c6ed7 534 LIST_FOREACH(port, p, s->ports) {
83c60c9f
LP
535 if (p->fd < 0)
536 continue;
537
acbb0225 538 unit_unwatch_fd(UNIT(s), &p->fd_watch);
a16e1123
LP
539 close_nointr_nofail(p->fd);
540
541 /* One little note: we should never delete any sockets
542 * in the file system here! After all some other
543 * process we spawned might still have a reference of
544 * this fd and wants to continue to use it. Therefore
545 * we delete sockets in the file system before we
546 * create a new one, not after we stopped using
547 * one! */
9152c765 548
83c60c9f
LP
549 p->fd = -1;
550 }
551}
552
4fd5948e
LP
553static void socket_apply_socket_options(Socket *s, int fd) {
554 assert(s);
555 assert(fd >= 0);
556
557 if (s->keep_alive) {
558 int b = s->keep_alive;
559 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &b, sizeof(b)) < 0)
560 log_warning("SO_KEEPALIVE failed: %m");
561 }
562
563 if (s->priority >= 0)
564 if (setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &s->priority, sizeof(s->priority)) < 0)
565 log_warning("SO_PRIORITY failed: %m");
566
567 if (s->receive_buffer > 0) {
568 int value = (int) s->receive_buffer;
569 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &value, sizeof(value)) < 0)
570 log_warning("SO_RCVBUF failed: %m");
571 }
572
573 if (s->send_buffer > 0) {
574 int value = (int) s->send_buffer;
575 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &value, sizeof(value)) < 0)
576 log_warning("SO_SNDBUF failed: %m");
577 }
578
579 if (s->mark >= 0)
580 if (setsockopt(fd, SOL_SOCKET, SO_MARK, &s->mark, sizeof(s->mark)) < 0)
581 log_warning("SO_MARK failed: %m");
582
583 if (s->ip_tos >= 0)
584 if (setsockopt(fd, IPPROTO_IP, IP_TOS, &s->ip_tos, sizeof(s->ip_tos)) < 0)
585 log_warning("IP_TOS failed: %m");
586
46925ac5
LP
587 if (s->ip_ttl >= 0) {
588 int r, x;
589
590 r = setsockopt(fd, IPPROTO_IP, IP_TTL, &s->ip_ttl, sizeof(s->ip_ttl));
591 x = setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &s->ip_ttl, sizeof(s->ip_ttl));
592
593 if (r < 0 && x < 0)
594 log_warning("IP_TTL/IPV6_UNICAST_HOPS failed: %m");
595 }
4fd5948e
LP
596}
597
598static void socket_apply_pipe_options(Socket *s, int fd) {
599 assert(s);
600 assert(fd >= 0);
601
602 if (s->pipe_size > 0)
603 if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
604 log_warning("F_SETPIPE_SZ: %m");
605}
606
034c6ed7 607static int socket_open_fds(Socket *s) {
83c60c9f
LP
608 SocketPort *p;
609 int r;
610
611 assert(s);
612
034c6ed7 613 LIST_FOREACH(port, p, s->ports) {
83c60c9f 614
034c6ed7
LP
615 if (p->fd >= 0)
616 continue;
83c60c9f
LP
617
618 if (p->type == SOCKET_SOCKET) {
619
b5a0699f
LP
620 if ((r = socket_address_listen(
621 &p->address,
622 s->backlog,
623 s->bind_ipv6_only,
624 s->bind_to_device,
4fd5948e 625 s->free_bind,
b5a0699f
LP
626 s->directory_mode,
627 s->socket_mode,
628 &p->fd)) < 0)
83c60c9f
LP
629 goto rollback;
630
4fd5948e
LP
631 socket_apply_socket_options(s, p->fd);
632
83c60c9f
LP
633 } else {
634 struct stat st;
635 assert(p->type == SOCKET_FIFO);
636
8cb45bf8
LP
637 mkdir_parents(p->path, s->directory_mode);
638
639 if (mkfifo(p->path, s->socket_mode) < 0 && errno != EEXIST) {
83c60c9f
LP
640 r = -errno;
641 goto rollback;
642 }
643
644 if ((p->fd = open(p->path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
645 r = -errno;
646 goto rollback;
647 }
648
649 if (fstat(p->fd, &st) < 0) {
650 r = -errno;
651 goto rollback;
652 }
653
654 /* FIXME verify user, access mode */
655
656 if (!S_ISFIFO(st.st_mode)) {
657 r = -EEXIST;
658 goto rollback;
659 }
4fd5948e
LP
660
661 socket_apply_pipe_options(s, p->fd);
83c60c9f 662 }
034c6ed7
LP
663 }
664
665 return 0;
666
667rollback:
668 socket_close_fds(s);
669 return r;
670}
671
672static void socket_unwatch_fds(Socket *s) {
673 SocketPort *p;
9152c765 674
034c6ed7
LP
675 assert(s);
676
677 LIST_FOREACH(port, p, s->ports) {
678 if (p->fd < 0)
679 continue;
680
acbb0225 681 unit_unwatch_fd(UNIT(s), &p->fd_watch);
83c60c9f 682 }
034c6ed7
LP
683}
684
685static int socket_watch_fds(Socket *s) {
686 SocketPort *p;
687 int r;
688
689 assert(s);
83c60c9f 690
034c6ed7
LP
691 LIST_FOREACH(port, p, s->ports) {
692 if (p->fd < 0)
693 continue;
694
cabab516 695 p->fd_watch.socket_accept =
4f2d528d 696 s->accept &&
dd5ad9d4 697 p->type == SOCKET_SOCKET &&
4f2d528d
LP
698 socket_address_can_accept(&p->address);
699
f94ea366 700 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
034c6ed7
LP
701 goto fail;
702 }
83c60c9f 703
542563ba 704 return 0;
83c60c9f 705
034c6ed7
LP
706fail:
707 socket_unwatch_fds(s);
708 return r;
709}
710
711static void socket_set_state(Socket *s, SocketState state) {
712 SocketState old_state;
713 assert(s);
714
715 old_state = s->state;
716 s->state = state;
717
718 if (state != SOCKET_START_PRE &&
719 state != SOCKET_START_POST &&
720 state != SOCKET_STOP_PRE &&
721 state != SOCKET_STOP_PRE_SIGTERM &&
722 state != SOCKET_STOP_PRE_SIGKILL &&
723 state != SOCKET_STOP_POST &&
80876c20
LP
724 state != SOCKET_FINAL_SIGTERM &&
725 state != SOCKET_FINAL_SIGKILL) {
acbb0225 726 unit_unwatch_timer(UNIT(s), &s->timer_watch);
5e94833f 727 socket_unwatch_control_pid(s);
034c6ed7 728 s->control_command = NULL;
a16e1123 729 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
e537352b 730 }
034c6ed7 731
a16e1123
LP
732 if (state != SOCKET_LISTENING)
733 socket_unwatch_fds(s);
734
034c6ed7
LP
735 if (state != SOCKET_START_POST &&
736 state != SOCKET_LISTENING &&
737 state != SOCKET_RUNNING &&
738 state != SOCKET_STOP_PRE &&
739 state != SOCKET_STOP_PRE_SIGTERM &&
740 state != SOCKET_STOP_PRE_SIGKILL)
741 socket_close_fds(s);
742
e537352b 743 if (state != old_state)
40d50879 744 log_debug("%s changed %s -> %s",
a16e1123
LP
745 s->meta.id,
746 socket_state_to_string(old_state),
747 socket_state_to_string(state));
acbb0225
LP
748
749 unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
034c6ed7
LP
750}
751
a16e1123
LP
752static int socket_coldplug(Unit *u) {
753 Socket *s = SOCKET(u);
754 int r;
755
756 assert(s);
757 assert(s->state == SOCKET_DEAD);
758
759 if (s->deserialized_state != s->state) {
760
761 if (s->deserialized_state == SOCKET_START_PRE ||
762 s->deserialized_state == SOCKET_START_POST ||
763 s->deserialized_state == SOCKET_STOP_PRE ||
764 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
765 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
766 s->deserialized_state == SOCKET_STOP_POST ||
767 s->deserialized_state == SOCKET_FINAL_SIGTERM ||
768 s->deserialized_state == SOCKET_FINAL_SIGKILL) {
769
770 if (s->control_pid <= 0)
771 return -EBADMSG;
772
773 if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
774 return r;
775
776 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
777 return r;
778 }
779
780 if (s->deserialized_state == SOCKET_START_POST ||
781 s->deserialized_state == SOCKET_LISTENING ||
782 s->deserialized_state == SOCKET_RUNNING ||
783 s->deserialized_state == SOCKET_STOP_PRE ||
784 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
785 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
786 if ((r = socket_open_fds(s)) < 0)
787 return r;
788
789 if (s->deserialized_state == SOCKET_LISTENING)
790 if ((r = socket_watch_fds(s)) < 0)
791 return r;
792
793 socket_set_state(s, s->deserialized_state);
794 }
795
796 return 0;
797}
798
e537352b 799static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
034c6ed7
LP
800 pid_t pid;
801 int r;
9e2f7c11 802 char **argv;
034c6ed7
LP
803
804 assert(s);
805 assert(c);
806 assert(_pid);
807
e537352b
LP
808 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
809 goto fail;
034c6ed7 810
9e2f7c11
LP
811 if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
812 r = -ENOMEM;
813 goto fail;
814 }
815
816 r = exec_spawn(c,
817 argv,
818 &s->exec_context,
819 NULL, 0,
1137a57c 820 s->meta.manager->environment,
9e2f7c11
LP
821 true,
822 true,
1e3ad081 823 true,
4cd1fbcc
LP
824 s->meta.manager->confirm_spawn,
825 s->meta.cgroup_bondings,
9e2f7c11
LP
826 &pid);
827
828 strv_free(argv);
829 if (r < 0)
034c6ed7
LP
830 goto fail;
831
87f0e418 832 if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
034c6ed7
LP
833 /* FIXME: we need to do something here */
834 goto fail;
83c60c9f 835
034c6ed7
LP
836 *_pid = pid;
837
838 return 0;
839
840fail:
e537352b 841 unit_unwatch_timer(UNIT(s), &s->timer_watch);
83c60c9f
LP
842
843 return r;
542563ba
LP
844}
845
034c6ed7
LP
846static void socket_enter_dead(Socket *s, bool success) {
847 assert(s);
848
849 if (!success)
850 s->failure = true;
851
18c78fb1 852 socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
034c6ed7
LP
853}
854
80876c20
LP
855static void socket_enter_signal(Socket *s, SocketState state, bool success);
856
034c6ed7
LP
857static void socket_enter_stop_post(Socket *s, bool success) {
858 int r;
859 assert(s);
860
861 if (!success)
862 s->failure = true;
863
5e94833f
LP
864 socket_unwatch_control_pid(s);
865
a16e1123
LP
866 s->control_command_id = SOCKET_EXEC_STOP_POST;
867
80876c20 868 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
e537352b 869 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
870 goto fail;
871
80876c20
LP
872 socket_set_state(s, SOCKET_STOP_POST);
873 } else
874 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
034c6ed7
LP
875
876 return;
877
878fail:
6cf6bbc2 879 log_warning("%s failed to run 'stop-post' task: %s", s->meta.id, strerror(-r));
80876c20 880 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
881}
882
883static void socket_enter_signal(Socket *s, SocketState state, bool success) {
884 int r;
80876c20 885 bool sent = false;
034c6ed7
LP
886
887 assert(s);
888
889 if (!success)
890 s->failure = true;
891
2e22afe9
LP
892 if (s->exec_context.kill_mode != KILL_NONE) {
893 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? s->exec_context.kill_signal : SIGKILL;
034c6ed7 894
2e22afe9 895 if (s->exec_context.kill_mode == KILL_CONTROL_GROUP) {
50159e6a 896
4cd1fbcc 897 if ((r = cgroup_bonding_kill_list(s->meta.cgroup_bondings, sig)) < 0) {
50159e6a
LP
898 if (r != -EAGAIN && r != -ESRCH)
899 goto fail;
900 } else
901 sent = true;
034c6ed7 902 }
50159e6a 903
80876c20 904 if (!sent && s->control_pid > 0)
2e22afe9 905 if (kill(s->exec_context.kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
50159e6a
LP
906 r = -errno;
907 goto fail;
908 }
d6ea93e3 909 }
034c6ed7 910
e93bc5a6 911 if (sent && s->control_pid > 0) {
80876c20
LP
912 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
913 goto fail;
d6ea93e3 914
80876c20
LP
915 socket_set_state(s, state);
916 } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
917 socket_enter_stop_post(s, true);
918 else
034c6ed7
LP
919 socket_enter_dead(s, true);
920
921 return;
922
923fail:
9e2f7c11 924 log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
034c6ed7
LP
925
926 if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
927 socket_enter_stop_post(s, false);
928 else
929 socket_enter_dead(s, false);
930}
931
932static void socket_enter_stop_pre(Socket *s, bool success) {
933 int r;
934 assert(s);
935
936 if (!success)
937 s->failure = true;
938
5e94833f
LP
939 socket_unwatch_control_pid(s);
940
a16e1123
LP
941 s->control_command_id = SOCKET_EXEC_STOP_PRE;
942
80876c20 943 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
e537352b 944 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
945 goto fail;
946
80876c20
LP
947 socket_set_state(s, SOCKET_STOP_PRE);
948 } else
034c6ed7
LP
949 socket_enter_stop_post(s, true);
950
951 return;
952
953fail:
6cf6bbc2 954 log_warning("%s failed to run 'stop-pre' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
955 socket_enter_stop_post(s, false);
956}
957
e9af15c3
LP
958static void socket_enter_listening(Socket *s) {
959 int r;
960 assert(s);
961
962 if ((r = socket_watch_fds(s)) < 0) {
9e2f7c11 963 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
e9af15c3
LP
964 goto fail;
965 }
966
967 socket_set_state(s, SOCKET_LISTENING);
968 return;
969
970fail:
971 socket_enter_stop_pre(s, false);
972}
973
034c6ed7
LP
974static void socket_enter_start_post(Socket *s) {
975 int r;
976 assert(s);
977
e9af15c3 978 if ((r = socket_open_fds(s)) < 0) {
9e2f7c11 979 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
034c6ed7
LP
980 goto fail;
981 }
982
5e94833f
LP
983 socket_unwatch_control_pid(s);
984
a16e1123
LP
985 s->control_command_id = SOCKET_EXEC_START_POST;
986
80876c20 987 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
e537352b 988 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
6cf6bbc2 989 log_warning("%s failed to run 'start-post' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
990 goto fail;
991 }
992
80876c20
LP
993 socket_set_state(s, SOCKET_START_POST);
994 } else
e9af15c3 995 socket_enter_listening(s);
034c6ed7
LP
996
997 return;
998
999fail:
1000 socket_enter_stop_pre(s, false);
1001}
1002
1003static void socket_enter_start_pre(Socket *s) {
1004 int r;
1005 assert(s);
1006
5e94833f
LP
1007 socket_unwatch_control_pid(s);
1008
a16e1123
LP
1009 s->control_command_id = SOCKET_EXEC_START_PRE;
1010
80876c20 1011 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
e537352b 1012 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
1013 goto fail;
1014
80876c20
LP
1015 socket_set_state(s, SOCKET_START_PRE);
1016 } else
034c6ed7
LP
1017 socket_enter_start_post(s);
1018
1019 return;
1020
1021fail:
6cf6bbc2 1022 log_warning("%s failed to run 'start-pre' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
1023 socket_enter_dead(s, false);
1024}
1025
4f2d528d 1026static void socket_enter_running(Socket *s, int cfd) {
034c6ed7 1027 int r;
398ef8ba 1028 DBusError error;
034c6ed7
LP
1029
1030 assert(s);
398ef8ba 1031 dbus_error_init(&error);
034c6ed7 1032
ba3e67a7
LP
1033 /* We don't take connections anymore if we are supposed to
1034 * shut down anyway */
1035 if (s->meta.job && s->meta.job->type == JOB_STOP) {
7c610628
LP
1036 if (cfd >= 0)
1037 close_nointr_nofail(cfd);
1038 else {
1039 /* Flush all sockets by closing and reopening them */
1040 socket_close_fds(s);
1041
1042 if ((r = socket_watch_fds(s)) < 0) {
1043 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
1044 socket_enter_stop_pre(s, false);
1045 }
1046 }
1047
ba3e67a7
LP
1048 return;
1049 }
1050
4f2d528d 1051 if (cfd < 0) {
398ef8ba 1052 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, &error, NULL)) < 0)
4f2d528d
LP
1053 goto fail;
1054
1055 socket_set_state(s, SOCKET_RUNNING);
1056 } else {
1057 Unit *u;
b4f10a5e 1058 char *prefix, *instance = NULL, *name;
4f2d528d 1059
6cf6bbc2
LP
1060 if (s->n_connections >= s->max_connections) {
1061 log_warning("Too many incoming connections (%u)", s->n_connections);
1062 close_nointr_nofail(cfd);
1063 return;
1064 }
1065
b6dbbe1c 1066 if ((r = instance_from_socket(cfd, s->n_accepted++, &instance)) < 0)
4f2d528d
LP
1067 goto fail;
1068
4cd1fbcc 1069 if (!(prefix = unit_name_to_prefix(s->meta.id))) {
4f2d528d
LP
1070 free(instance);
1071 r = -ENOMEM;
1072 goto fail;
1073 }
1074
1075 name = unit_name_build(prefix, instance, ".service");
1076 free(prefix);
1077 free(instance);
1078
b6dbbe1c 1079 if (!name) {
4f2d528d 1080 r = -ENOMEM;
b6dbbe1c
LP
1081 goto fail;
1082 }
4f2d528d 1083
398ef8ba 1084 r = manager_load_unit(s->meta.manager, name, NULL, NULL, &u);
4f2d528d
LP
1085 free(name);
1086
1087 if (r < 0)
1088 goto fail;
1089
6cf6bbc2 1090 if ((r = service_set_socket_fd(SERVICE(u), cfd, s)) < 0)
4f2d528d
LP
1091 goto fail;
1092
1093 cfd = -1;
1094
6cf6bbc2
LP
1095 s->n_connections ++;
1096
398ef8ba 1097 if ((r = manager_add_job(u->meta.manager, JOB_START, u, JOB_REPLACE, true, &error, NULL)) < 0)
4f2d528d
LP
1098 goto fail;
1099 }
034c6ed7 1100
034c6ed7
LP
1101 return;
1102
1103fail:
398ef8ba 1104 log_warning("%s failed to queue socket startup job: %s", s->meta.id, bus_error(&error, r));
80876c20 1105 socket_enter_stop_pre(s, false);
4f2d528d
LP
1106
1107 if (cfd >= 0)
1108 close_nointr_nofail(cfd);
398ef8ba
LP
1109
1110 dbus_error_free(&error);
034c6ed7
LP
1111}
1112
1113static void socket_run_next(Socket *s, bool success) {
1114 int r;
1115
1116 assert(s);
1117 assert(s->control_command);
1118 assert(s->control_command->command_next);
1119
1120 if (!success)
1121 s->failure = true;
1122
5e94833f
LP
1123 socket_unwatch_control_pid(s);
1124
034c6ed7
LP
1125 s->control_command = s->control_command->command_next;
1126
e537352b 1127 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
1128 goto fail;
1129
1130 return;
1131
1132fail:
6cf6bbc2 1133 log_warning("%s failed to run next task: %s", s->meta.id, strerror(-r));
80876c20
LP
1134
1135 if (s->state == SOCKET_START_POST)
1136 socket_enter_stop_pre(s, false);
034c6ed7
LP
1137 else if (s->state == SOCKET_STOP_POST)
1138 socket_enter_dead(s, false);
1139 else
80876c20 1140 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1141}
1142
87f0e418
LP
1143static int socket_start(Unit *u) {
1144 Socket *s = SOCKET(u);
83c60c9f
LP
1145
1146 assert(s);
1147
034c6ed7
LP
1148 /* We cannot fulfill this request right now, try again later
1149 * please! */
1150 if (s->state == SOCKET_STOP_PRE ||
1151 s->state == SOCKET_STOP_PRE_SIGKILL ||
1152 s->state == SOCKET_STOP_PRE_SIGTERM ||
1153 s->state == SOCKET_STOP_POST ||
80876c20
LP
1154 s->state == SOCKET_FINAL_SIGTERM ||
1155 s->state == SOCKET_FINAL_SIGKILL)
034c6ed7
LP
1156 return -EAGAIN;
1157
83c60c9f
LP
1158 if (s->state == SOCKET_START_PRE ||
1159 s->state == SOCKET_START_POST)
034c6ed7 1160 return 0;
83c60c9f 1161
034c6ed7 1162 /* Cannot run this without the service being around */
4f2d528d
LP
1163 if (s->service) {
1164 if (s->service->meta.load_state != UNIT_LOADED)
1165 return -ENOENT;
1166
1167 /* If the service is alredy actvie we cannot start the
1168 * socket */
1169 if (s->service->state != SERVICE_DEAD &&
18c78fb1 1170 s->service->state != SERVICE_MAINTENANCE &&
4f2d528d
LP
1171 s->service->state != SERVICE_AUTO_RESTART)
1172 return -EBUSY;
1173 }
e537352b 1174
18c78fb1 1175 assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
83c60c9f 1176
034c6ed7
LP
1177 s->failure = false;
1178 socket_enter_start_pre(s);
1179 return 0;
1180}
83c60c9f 1181
87f0e418
LP
1182static int socket_stop(Unit *u) {
1183 Socket *s = SOCKET(u);
034c6ed7
LP
1184
1185 assert(s);
1186
e537352b
LP
1187 /* Already on it */
1188 if (s->state == SOCKET_STOP_PRE ||
1189 s->state == SOCKET_STOP_PRE_SIGTERM ||
1190 s->state == SOCKET_STOP_PRE_SIGKILL ||
1191 s->state == SOCKET_STOP_POST ||
80876c20 1192 s->state == SOCKET_FINAL_SIGTERM ||
3f6c78dc 1193 s->state == SOCKET_FINAL_SIGKILL)
e537352b
LP
1194 return 0;
1195
3f6c78dc
LP
1196 /* If there's already something running we go directly into
1197 * kill mode. */
1198 if (s->state == SOCKET_START_PRE ||
1199 s->state == SOCKET_START_POST) {
1200 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, true);
1201 return -EAGAIN;
1202 }
1203
034c6ed7 1204 assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
83c60c9f 1205
034c6ed7 1206 socket_enter_stop_pre(s, true);
542563ba
LP
1207 return 0;
1208}
1209
a16e1123
LP
1210static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1211 Socket *s = SOCKET(u);
1212 SocketPort *p;
1213 int r;
1214
1215 assert(u);
1216 assert(f);
1217 assert(fds);
1218
1219 unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1220 unit_serialize_item(u, f, "failure", yes_no(s->failure));
1221 unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1222
1223 if (s->control_pid > 0)
5925dd3c 1224 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) s->control_pid);
a16e1123
LP
1225
1226 if (s->control_command_id >= 0)
1227 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1228
1229 LIST_FOREACH(port, p, s->ports) {
1230 int copy;
1231
1232 if (p->fd < 0)
1233 continue;
1234
1235 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1236 return copy;
1237
1238 if (p->type == SOCKET_SOCKET) {
1239 char *t;
1240
1241 if ((r = socket_address_print(&p->address, &t)) < 0)
1242 return r;
1243
27ca8d7a 1244 unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
a16e1123
LP
1245 free(t);
1246 } else {
1247 assert(p->type == SOCKET_FIFO);
1248 unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1249 }
1250 }
1251
1252 return 0;
1253}
1254
1255static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1256 Socket *s = SOCKET(u);
1257 int r;
1258
1259 assert(u);
1260 assert(key);
1261 assert(value);
1262 assert(fds);
1263
1264 if (streq(key, "state")) {
1265 SocketState state;
1266
1267 if ((state = socket_state_from_string(value)) < 0)
1268 log_debug("Failed to parse state value %s", value);
1269 else
1270 s->deserialized_state = state;
1271 } else if (streq(key, "failure")) {
1272 int b;
1273
1274 if ((b = parse_boolean(value)) < 0)
1275 log_debug("Failed to parse failure value %s", value);
1276 else
1277 s->failure = b || s->failure;
1278
1279 } else if (streq(key, "n-accepted")) {
1280 unsigned k;
1281
1282 if ((r = safe_atou(value, &k)) < 0)
1283 log_debug("Failed to parse n-accepted value %s", value);
1284 else
1285 s->n_accepted += k;
1286 } else if (streq(key, "control-pid")) {
5925dd3c 1287 pid_t pid;
a16e1123 1288
5925dd3c 1289 if ((r = parse_pid(value, &pid)) < 0)
a16e1123
LP
1290 log_debug("Failed to parse control-pid value %s", value);
1291 else
5925dd3c 1292 s->control_pid = pid;
a16e1123
LP
1293 } else if (streq(key, "control-command")) {
1294 SocketExecCommand id;
1295
1296 if ((id = socket_exec_command_from_string(value)) < 0)
1297 log_debug("Failed to parse exec-command value %s", value);
1298 else {
1299 s->control_command_id = id;
1300 s->control_command = s->exec_command[id];
1301 }
1302 } else if (streq(key, "fifo")) {
1303 int fd, skip = 0;
1304 SocketPort *p;
1305
1306 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1307 log_debug("Failed to parse fifo value %s", value);
1308 else {
1309
1310 LIST_FOREACH(port, p, s->ports)
1311 if (streq(p->path, value+skip))
1312 break;
1313
1314 if (p) {
1315 if (p->fd >= 0)
1316 close_nointr_nofail(p->fd);
1317 p->fd = fdset_remove(fds, fd);
1318 }
1319 }
1320
1321 } else if (streq(key, "socket")) {
27ca8d7a 1322 int fd, type, skip = 0;
a16e1123
LP
1323 SocketPort *p;
1324
27ca8d7a 1325 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
a16e1123
LP
1326 log_debug("Failed to parse socket value %s", value);
1327 else {
1328
1329 LIST_FOREACH(port, p, s->ports)
27ca8d7a 1330 if (socket_address_is(&p->address, value+skip, type))
a16e1123
LP
1331 break;
1332
1333 if (p) {
1334 if (p->fd >= 0)
1335 close_nointr_nofail(p->fd);
1336 p->fd = fdset_remove(fds, fd);
1337 }
1338 }
1339
1340 } else
1341 log_debug("Unknown serialization key '%s'", key);
1342
1343 return 0;
1344}
1345
87f0e418
LP
1346static UnitActiveState socket_active_state(Unit *u) {
1347 assert(u);
5cb5a6ff 1348
acbb0225 1349 return state_translation_table[SOCKET(u)->state];
5cb5a6ff
LP
1350}
1351
10a94420
LP
1352static const char *socket_sub_state_to_string(Unit *u) {
1353 assert(u);
1354
a16e1123 1355 return socket_state_to_string(SOCKET(u)->state);
10a94420
LP
1356}
1357
6cf6bbc2
LP
1358static bool socket_check_gc(Unit *u) {
1359 Socket *s = SOCKET(u);
1360
1361 assert(u);
1362
1363 return s->n_connections > 0;
1364}
1365
acbb0225 1366static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
87f0e418 1367 Socket *s = SOCKET(u);
4f2d528d 1368 int cfd = -1;
9152c765 1369
034c6ed7 1370 assert(s);
8d567588 1371 assert(fd >= 0);
9152c765 1372
871d7de4
LP
1373 if (s->state != SOCKET_LISTENING)
1374 return;
1375
9e2f7c11 1376 log_debug("Incoming traffic on %s", u->meta.id);
9152c765 1377
4f2d528d
LP
1378 if (events != EPOLLIN) {
1379 log_error("Got invalid poll event on socket.");
8d567588 1380 goto fail;
4f2d528d
LP
1381 }
1382
cabab516 1383 if (w->socket_accept) {
4f2d528d
LP
1384 for (;;) {
1385
1386 if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1387
1388 if (errno == EINTR)
1389 continue;
1390
1391 log_error("Failed to accept socket: %m");
8d567588 1392 goto fail;
4f2d528d
LP
1393 }
1394
1395 break;
1396 }
4fd5948e
LP
1397
1398 socket_apply_socket_options(s, cfd);
4f2d528d 1399 }
9152c765 1400
4f2d528d 1401 socket_enter_running(s, cfd);
8d567588
LP
1402 return;
1403
1404fail:
1405 socket_enter_stop_pre(s, false);
9152c765
LP
1406}
1407
87f0e418
LP
1408static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1409 Socket *s = SOCKET(u);
034c6ed7 1410 bool success;
5cb5a6ff
LP
1411
1412 assert(s);
034c6ed7 1413 assert(pid >= 0);
5cb5a6ff 1414
8c47c732
LP
1415 if (pid != s->control_pid)
1416 return;
542563ba 1417
034c6ed7
LP
1418 s->control_pid = 0;
1419
8c47c732 1420 success = is_clean_exit(code, status);
8c47c732 1421
b708e7ce 1422 if (s->control_command) {
b58b4116 1423 exec_status_exit(&s->control_command->exec_status, pid, code, status);
a16e1123 1424
b708e7ce
LP
1425 if (s->control_command->ignore)
1426 success = true;
1427 }
1428
9e2f7c11 1429 log_debug("%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
b708e7ce 1430 s->failure = s->failure || !success;
034c6ed7 1431
a16e1123
LP
1432 if (s->control_command && s->control_command->command_next && success) {
1433 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
034c6ed7 1434 socket_run_next(s, success);
acbb0225 1435 } else {
a16e1123
LP
1436 s->control_command = NULL;
1437 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1438
034c6ed7
LP
1439 /* No further commands for this step, so let's figure
1440 * out what to do next */
5cb5a6ff 1441
a16e1123 1442 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
acbb0225 1443
034c6ed7
LP
1444 switch (s->state) {
1445
1446 case SOCKET_START_PRE:
1447 if (success)
acbb0225 1448 socket_enter_start_post(s);
034c6ed7 1449 else
80876c20 1450 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1451 break;
1452
1453 case SOCKET_START_POST:
1454 if (success)
e9af15c3 1455 socket_enter_listening(s);
034c6ed7
LP
1456 else
1457 socket_enter_stop_pre(s, false);
1458 break;
1459
1460 case SOCKET_STOP_PRE:
1461 case SOCKET_STOP_PRE_SIGTERM:
1462 case SOCKET_STOP_PRE_SIGKILL:
1463 socket_enter_stop_post(s, success);
1464 break;
1465
1466 case SOCKET_STOP_POST:
80876c20
LP
1467 case SOCKET_FINAL_SIGTERM:
1468 case SOCKET_FINAL_SIGKILL:
034c6ed7
LP
1469 socket_enter_dead(s, success);
1470 break;
1471
1472 default:
1473 assert_not_reached("Uh, control process died at wrong time.");
1474 }
1475 }
1476}
5cb5a6ff 1477
acbb0225 1478static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
87f0e418 1479 Socket *s = SOCKET(u);
5cb5a6ff 1480
034c6ed7
LP
1481 assert(s);
1482 assert(elapsed == 1);
acbb0225 1483 assert(w == &s->timer_watch);
034c6ed7
LP
1484
1485 switch (s->state) {
1486
1487 case SOCKET_START_PRE:
9e2f7c11 1488 log_warning("%s starting timed out. Terminating.", u->meta.id);
80876c20
LP
1489 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1490
034c6ed7 1491 case SOCKET_START_POST:
9e2f7c11 1492 log_warning("%s starting timed out. Stopping.", u->meta.id);
034c6ed7
LP
1493 socket_enter_stop_pre(s, false);
1494 break;
1495
1496 case SOCKET_STOP_PRE:
9e2f7c11 1497 log_warning("%s stopping timed out. Terminating.", u->meta.id);
034c6ed7
LP
1498 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1499 break;
1500
1501 case SOCKET_STOP_PRE_SIGTERM:
9e2f7c11 1502 log_warning("%s stopping timed out. Killing.", u->meta.id);
034c6ed7
LP
1503 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1504 break;
1505
1506 case SOCKET_STOP_PRE_SIGKILL:
9e2f7c11 1507 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
034c6ed7
LP
1508 socket_enter_stop_post(s, false);
1509 break;
1510
1511 case SOCKET_STOP_POST:
9e2f7c11 1512 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
80876c20 1513 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1514 break;
1515
80876c20 1516 case SOCKET_FINAL_SIGTERM:
9e2f7c11 1517 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
80876c20 1518 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
034c6ed7
LP
1519 break;
1520
80876c20 1521 case SOCKET_FINAL_SIGKILL:
18c78fb1 1522 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
034c6ed7
LP
1523 socket_enter_dead(s, false);
1524 break;
1525
1526 default:
1527 assert_not_reached("Timeout at wrong time.");
1528 }
5cb5a6ff
LP
1529}
1530
44d8db9e
LP
1531int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1532 int *rfds;
1533 unsigned rn_fds, k;
1534 SocketPort *p;
1535
1536 assert(s);
1537 assert(fds);
1538 assert(n_fds);
1539
1540 /* Called from the service code for requesting our fds */
1541
1542 rn_fds = 0;
1543 LIST_FOREACH(port, p, s->ports)
1544 if (p->fd >= 0)
1545 rn_fds++;
1546
1547 if (!(rfds = new(int, rn_fds)) < 0)
1548 return -ENOMEM;
1549
1550 k = 0;
1551 LIST_FOREACH(port, p, s->ports)
1552 if (p->fd >= 0)
1553 rfds[k++] = p->fd;
1554
1555 assert(k == rn_fds);
1556
1557 *fds = rfds;
1558 *n_fds = rn_fds;
1559
1560 return 0;
1561}
1562
ceee3d82
LP
1563void socket_notify_service_dead(Socket *s) {
1564 assert(s);
1565
6cf6bbc2
LP
1566 /* The service is dead. Dang!
1567 *
1568 * This is strictly for one-instance-for-all-connections
1569 * services. */
ceee3d82
LP
1570
1571 if (s->state == SOCKET_RUNNING) {
9e2f7c11 1572 log_debug("%s got notified about service death.", s->meta.id);
ceee3d82
LP
1573 socket_enter_listening(s);
1574 }
1575}
1576
6cf6bbc2
LP
1577void socket_connection_unref(Socket *s) {
1578 assert(s);
1579
1580 /* The service is dead. Yay!
1581 *
1582 * This is strictly for one-onstance-per-connection
1583 * services. */
1584
1585 assert(s->n_connections > 0);
1586 s->n_connections--;
1587
1588 log_debug("%s: One connection closed, %u left.", s->meta.id, s->n_connections);
1589}
1590
a16e1123
LP
1591static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1592 [SOCKET_DEAD] = "dead",
1593 [SOCKET_START_PRE] = "start-pre",
1594 [SOCKET_START_POST] = "start-post",
1595 [SOCKET_LISTENING] = "listening",
1596 [SOCKET_RUNNING] = "running",
1597 [SOCKET_STOP_PRE] = "stop-pre",
1598 [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1599 [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1600 [SOCKET_STOP_POST] = "stop-post",
1601 [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1602 [SOCKET_FINAL_SIGKILL] = "final-sigkill",
18c78fb1 1603 [SOCKET_MAINTENANCE] = "maintenance"
a16e1123
LP
1604};
1605
1606DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1607
1608static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1609 [SOCKET_EXEC_START_PRE] = "StartPre",
1610 [SOCKET_EXEC_START_POST] = "StartPost",
1611 [SOCKET_EXEC_STOP_PRE] = "StopPre",
1612 [SOCKET_EXEC_STOP_POST] = "StopPost"
1613};
1614
1615DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1616
87f0e418 1617const UnitVTable socket_vtable = {
5cb5a6ff
LP
1618 .suffix = ".socket",
1619
034c6ed7
LP
1620 .init = socket_init,
1621 .done = socket_done,
a16e1123
LP
1622 .load = socket_load,
1623
1624 .coldplug = socket_coldplug,
034c6ed7 1625
5cb5a6ff
LP
1626 .dump = socket_dump,
1627
542563ba
LP
1628 .start = socket_start,
1629 .stop = socket_stop,
5cb5a6ff 1630
a16e1123
LP
1631 .serialize = socket_serialize,
1632 .deserialize_item = socket_deserialize_item,
1633
5cb5a6ff 1634 .active_state = socket_active_state,
10a94420 1635 .sub_state_to_string = socket_sub_state_to_string,
5cb5a6ff 1636
6cf6bbc2
LP
1637 .check_gc = socket_check_gc,
1638
9152c765 1639 .fd_event = socket_fd_event,
034c6ed7 1640 .sigchld_event = socket_sigchld_event,
4139c1b2
LP
1641 .timer_event = socket_timer_event,
1642
1643 .bus_message_handler = bus_socket_message_handler
5cb5a6ff 1644};