]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/socket.c
systemctl: introduce reset-maintenance command
[thirdparty/systemd.git] / src / socket.c
1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <sys/types.h>
23 #include <sys/stat.h>
24 #include <unistd.h>
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <sys/epoll.h>
28 #include <signal.h>
29 #include <arpa/inet.h>
30
31 #include "unit.h"
32 #include "socket.h"
33 #include "log.h"
34 #include "load-dropin.h"
35 #include "load-fragment.h"
36 #include "strv.h"
37 #include "unit-name.h"
38 #include "dbus-socket.h"
39 #include "missing.h"
40 #include "special.h"
41 #include "bus-errors.h"
42
43 static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
44 [SOCKET_DEAD] = UNIT_INACTIVE,
45 [SOCKET_START_PRE] = UNIT_ACTIVATING,
46 [SOCKET_START_POST] = UNIT_ACTIVATING,
47 [SOCKET_LISTENING] = UNIT_ACTIVE,
48 [SOCKET_RUNNING] = UNIT_ACTIVE,
49 [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
50 [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
51 [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
52 [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
53 [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
54 [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
55 [SOCKET_MAINTENANCE] = UNIT_MAINTENANCE
56 };
57
58 static void socket_init(Unit *u) {
59 Socket *s = SOCKET(u);
60
61 assert(u);
62 assert(u->meta.load_state == UNIT_STUB);
63
64 s->backlog = SOMAXCONN;
65 s->timeout_usec = DEFAULT_TIMEOUT_USEC;
66 s->directory_mode = 0755;
67 s->socket_mode = 0666;
68
69 s->max_connections = 64;
70
71 s->priority = -1;
72 s->ip_tos = -1;
73 s->ip_ttl = -1;
74 s->mark = -1;
75
76 exec_context_init(&s->exec_context);
77
78 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
79 }
80
81 static void socket_unwatch_control_pid(Socket *s) {
82 assert(s);
83
84 if (s->control_pid <= 0)
85 return;
86
87 unit_unwatch_pid(UNIT(s), s->control_pid);
88 s->control_pid = 0;
89 }
90
91 static void socket_done(Unit *u) {
92 Socket *s = SOCKET(u);
93 SocketPort *p;
94 Meta *i;
95
96 assert(s);
97
98 while ((p = s->ports)) {
99 LIST_REMOVE(SocketPort, port, s->ports, p);
100
101 if (p->fd >= 0) {
102 unit_unwatch_fd(UNIT(s), &p->fd_watch);
103 close_nointr_nofail(p->fd);
104 }
105
106 free(p->path);
107 free(p);
108 }
109
110 exec_context_done(&s->exec_context);
111 exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
112 s->control_command = NULL;
113
114 socket_unwatch_control_pid(s);
115
116 s->service = NULL;
117
118 free(s->bind_to_device);
119 s->bind_to_device = NULL;
120
121 unit_unwatch_timer(u, &s->timer_watch);
122
123 /* Make sure no service instance refers to us anymore. */
124 LIST_FOREACH(units_per_type, i, u->meta.manager->units_per_type[UNIT_SERVICE]) {
125 Service *service = (Service *) i;
126
127 if (service->socket == s)
128 service->socket = NULL;
129 }
130 }
131
132 static int socket_instantiate_service(Socket *s) {
133 char *prefix, *name;
134 int r;
135 Unit *u;
136
137 assert(s);
138
139 /* This fills in s->service if it isn't filled in yet. For
140 * Accept=yes sockets we create the next connection service
141 * here. For Accept=no this is mostly a NOP since the service
142 * is figured out at load time anyway. */
143
144 if (s->service)
145 return 0;
146
147 assert(s->accept);
148
149 if (!(prefix = unit_name_to_prefix(s->meta.id)))
150 return -ENOMEM;
151
152 r = asprintf(&name, "%s@%u.service", prefix, s->n_accepted);
153 free(prefix);
154
155 if (r < 0)
156 return -ENOMEM;
157
158 r = manager_load_unit(s->meta.manager, name, NULL, NULL, &u);
159 free(name);
160
161 if (r < 0)
162 return r;
163
164 s->service = SERVICE(u);
165 return 0;
166 }
167
168 static bool have_non_accept_socket(Socket *s) {
169 SocketPort *p;
170
171 assert(s);
172
173 if (!s->accept)
174 return true;
175
176 LIST_FOREACH(port, p, s->ports) {
177
178 if (p->type != SOCKET_SOCKET)
179 return true;
180
181 if (!socket_address_can_accept(&p->address))
182 return true;
183 }
184
185 return false;
186 }
187
188 static int socket_verify(Socket *s) {
189 assert(s);
190
191 if (s->meta.load_state != UNIT_LOADED)
192 return 0;
193
194 if (!s->ports) {
195 log_error("%s lacks Listen setting. Refusing.", s->meta.id);
196 return -EINVAL;
197 }
198
199 if (s->accept && have_non_accept_socket(s)) {
200 log_error("%s configured for accepting sockets, but sockets are non-accepting. Refusing.", s->meta.id);
201 return -EINVAL;
202 }
203
204 if (s->accept && s->max_connections <= 0) {
205 log_error("%s's MaxConnection setting too small. Refusing.", s->meta.id);
206 return -EINVAL;
207 }
208
209 if (s->exec_context.pam_name && s->exec_context.kill_mode != KILL_CONTROL_GROUP) {
210 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", s->meta.id);
211 return -EINVAL;
212 }
213
214 return 0;
215 }
216
217 static bool socket_needs_mount(Socket *s, const char *prefix) {
218 SocketPort *p;
219
220 assert(s);
221
222 LIST_FOREACH(port, p, s->ports) {
223
224 if (p->type == SOCKET_SOCKET) {
225 if (socket_address_needs_mount(&p->address, prefix))
226 return true;
227 } else {
228 assert(p->type == SOCKET_FIFO);
229 if (path_startswith(p->path, prefix))
230 return true;
231 }
232 }
233
234 return false;
235 }
236
237 int socket_add_one_mount_link(Socket *s, Mount *m) {
238 int r;
239
240 assert(s);
241 assert(m);
242
243 if (s->meta.load_state != UNIT_LOADED ||
244 m->meta.load_state != UNIT_LOADED)
245 return 0;
246
247 if (!socket_needs_mount(s, m->where))
248 return 0;
249
250 if ((r = unit_add_two_dependencies(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true)) < 0)
251 return r;
252
253 return 0;
254 }
255
256 static int socket_add_mount_links(Socket *s) {
257 Meta *other;
258 int r;
259
260 assert(s);
261
262 LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
263 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
264 return r;
265
266 return 0;
267 }
268
269 static int socket_add_device_link(Socket *s) {
270 char *t;
271 int r;
272
273 assert(s);
274
275 if (!s->bind_to_device)
276 return 0;
277
278 if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
279 return -ENOMEM;
280
281 r = unit_add_node_link(UNIT(s), t, false);
282 free(t);
283
284 return r;
285 }
286
287 static int socket_add_default_dependencies(Socket *s) {
288 int r;
289 assert(s);
290
291 if (s->meta.manager->running_as == MANAGER_SYSTEM)
292 if ((r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true)) < 0)
293 return r;
294
295 return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
296 }
297
298 static int socket_load(Unit *u) {
299 Socket *s = SOCKET(u);
300 int r;
301
302 assert(u);
303 assert(u->meta.load_state == UNIT_STUB);
304
305 if ((r = unit_load_fragment_and_dropin(u)) < 0)
306 return r;
307
308 /* This is a new unit? Then let's add in some extras */
309 if (u->meta.load_state == UNIT_LOADED) {
310
311 if (have_non_accept_socket(s)) {
312 if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)) < 0)
313 return r;
314
315 if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
316 return r;
317 }
318
319 if ((r = socket_add_mount_links(s)) < 0)
320 return r;
321
322 if ((r = socket_add_device_link(s)) < 0)
323 return r;
324
325 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
326 return r;
327
328 if ((r = unit_add_default_cgroup(u)) < 0)
329 return r;
330
331 if (s->meta.default_dependencies)
332 if ((r = socket_add_default_dependencies(s)) < 0)
333 return r;
334 }
335
336 return socket_verify(s);
337 }
338
339 static const char* listen_lookup(int type) {
340
341 if (type == SOCK_STREAM)
342 return "ListenStream";
343 else if (type == SOCK_DGRAM)
344 return "ListenDatagram";
345 else if (type == SOCK_SEQPACKET)
346 return "ListenSequentialPacket";
347
348 assert_not_reached("Unknown socket type");
349 return NULL;
350 }
351
352 static void socket_dump(Unit *u, FILE *f, const char *prefix) {
353
354 SocketExecCommand c;
355 Socket *s = SOCKET(u);
356 SocketPort *p;
357 const char *prefix2;
358 char *p2;
359
360 assert(s);
361 assert(f);
362
363 p2 = strappend(prefix, "\t");
364 prefix2 = p2 ? p2 : prefix;
365
366 fprintf(f,
367 "%sSocket State: %s\n"
368 "%sBindIPv6Only: %s\n"
369 "%sBacklog: %u\n"
370 "%sSocketMode: %04o\n"
371 "%sDirectoryMode: %04o\n"
372 "%sKeepAlive: %s\n"
373 "%sFreeBind: %s\n",
374 prefix, socket_state_to_string(s->state),
375 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
376 prefix, s->backlog,
377 prefix, s->socket_mode,
378 prefix, s->directory_mode,
379 prefix, yes_no(s->keep_alive),
380 prefix, yes_no(s->free_bind));
381
382 if (s->control_pid > 0)
383 fprintf(f,
384 "%sControl PID: %lu\n",
385 prefix, (unsigned long) s->control_pid);
386
387 if (s->bind_to_device)
388 fprintf(f,
389 "%sBindToDevice: %s\n",
390 prefix, s->bind_to_device);
391
392 if (s->accept)
393 fprintf(f,
394 "%sAccepted: %u\n"
395 "%sNConnections: %u\n"
396 "%sMaxConnections: %u\n",
397 prefix, s->n_accepted,
398 prefix, s->n_connections,
399 prefix, s->max_connections);
400
401 if (s->priority >= 0)
402 fprintf(f,
403 "%sPriority: %i\n",
404 prefix, s->priority);
405
406 if (s->receive_buffer > 0)
407 fprintf(f,
408 "%sReceiveBuffer: %zu\n",
409 prefix, s->receive_buffer);
410
411 if (s->send_buffer > 0)
412 fprintf(f,
413 "%sSendBuffer: %zu\n",
414 prefix, s->send_buffer);
415
416 if (s->ip_tos >= 0)
417 fprintf(f,
418 "%sIPTOS: %i\n",
419 prefix, s->ip_tos);
420
421 if (s->ip_ttl >= 0)
422 fprintf(f,
423 "%sIPTTL: %i\n",
424 prefix, s->ip_ttl);
425
426 if (s->pipe_size > 0)
427 fprintf(f,
428 "%sPipeSize: %zu\n",
429 prefix, s->pipe_size);
430
431 if (s->mark >= 0)
432 fprintf(f,
433 "%sMark: %i\n",
434 prefix, s->mark);
435
436 LIST_FOREACH(port, p, s->ports) {
437
438 if (p->type == SOCKET_SOCKET) {
439 const char *t;
440 int r;
441 char *k;
442
443 if ((r = socket_address_print(&p->address, &k)) < 0)
444 t = strerror(-r);
445 else
446 t = k;
447
448 fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
449 free(k);
450 } else
451 fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
452 }
453
454 exec_context_dump(&s->exec_context, f, prefix);
455
456 for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
457 if (!s->exec_command[c])
458 continue;
459
460 fprintf(f, "%s-> %s:\n",
461 prefix, socket_exec_command_to_string(c));
462
463 exec_command_dump_list(s->exec_command[c], f, prefix2);
464 }
465
466 free(p2);
467 }
468
469 static int instance_from_socket(int fd, unsigned nr, char **instance) {
470 socklen_t l;
471 char *r;
472 union {
473 struct sockaddr sa;
474 struct sockaddr_un un;
475 struct sockaddr_in in;
476 struct sockaddr_in6 in6;
477 struct sockaddr_storage storage;
478 } local, remote;
479
480 assert(fd >= 0);
481 assert(instance);
482
483 l = sizeof(local);
484 if (getsockname(fd, &local.sa, &l) < 0)
485 return -errno;
486
487 l = sizeof(remote);
488 if (getpeername(fd, &remote.sa, &l) < 0)
489 return -errno;
490
491 switch (local.sa.sa_family) {
492
493 case AF_INET: {
494 uint32_t
495 a = ntohl(local.in.sin_addr.s_addr),
496 b = ntohl(remote.in.sin_addr.s_addr);
497
498 if (asprintf(&r,
499 "%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
500 a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
501 ntohs(local.in.sin_port),
502 b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
503 ntohs(remote.in.sin_port)) < 0)
504 return -ENOMEM;
505
506 break;
507 }
508
509 case AF_INET6: {
510 static const char ipv4_prefix[] = {
511 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
512 };
513
514 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
515 memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
516 const uint8_t
517 *a = local.in6.sin6_addr.s6_addr+12,
518 *b = remote.in6.sin6_addr.s6_addr+12;
519
520 if (asprintf(&r,
521 "%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
522 a[0], a[1], a[2], a[3],
523 ntohs(local.in6.sin6_port),
524 b[0], b[1], b[2], b[3],
525 ntohs(remote.in6.sin6_port)) < 0)
526 return -ENOMEM;
527 } else {
528 char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
529
530 if (asprintf(&r,
531 "%s:%u-%s:%u",
532 inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
533 ntohs(local.in6.sin6_port),
534 inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
535 ntohs(remote.in6.sin6_port)) < 0)
536 return -ENOMEM;
537 }
538
539 break;
540 }
541
542 case AF_UNIX: {
543 struct ucred ucred;
544
545 l = sizeof(ucred);
546 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
547 return -errno;
548
549 if (asprintf(&r,
550 "%u-%lu-%lu",
551 nr,
552 (unsigned long) ucred.pid,
553 (unsigned long) ucred.uid) < 0)
554 return -ENOMEM;
555
556 break;
557 }
558
559 default:
560 assert_not_reached("Unhandled socket type.");
561 }
562
563 *instance = r;
564 return 0;
565 }
566
567 static void socket_close_fds(Socket *s) {
568 SocketPort *p;
569
570 assert(s);
571
572 LIST_FOREACH(port, p, s->ports) {
573 if (p->fd < 0)
574 continue;
575
576 unit_unwatch_fd(UNIT(s), &p->fd_watch);
577 close_nointr_nofail(p->fd);
578
579 /* One little note: we should never delete any sockets
580 * in the file system here! After all some other
581 * process we spawned might still have a reference of
582 * this fd and wants to continue to use it. Therefore
583 * we delete sockets in the file system before we
584 * create a new one, not after we stopped using
585 * one! */
586
587 p->fd = -1;
588 }
589 }
590
591 static void socket_apply_socket_options(Socket *s, int fd) {
592 assert(s);
593 assert(fd >= 0);
594
595 if (s->keep_alive) {
596 int b = s->keep_alive;
597 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &b, sizeof(b)) < 0)
598 log_warning("SO_KEEPALIVE failed: %m");
599 }
600
601 if (s->priority >= 0)
602 if (setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &s->priority, sizeof(s->priority)) < 0)
603 log_warning("SO_PRIORITY failed: %m");
604
605 if (s->receive_buffer > 0) {
606 int value = (int) s->receive_buffer;
607 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &value, sizeof(value)) < 0)
608 log_warning("SO_RCVBUF failed: %m");
609 }
610
611 if (s->send_buffer > 0) {
612 int value = (int) s->send_buffer;
613 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &value, sizeof(value)) < 0)
614 log_warning("SO_SNDBUF failed: %m");
615 }
616
617 if (s->mark >= 0)
618 if (setsockopt(fd, SOL_SOCKET, SO_MARK, &s->mark, sizeof(s->mark)) < 0)
619 log_warning("SO_MARK failed: %m");
620
621 if (s->ip_tos >= 0)
622 if (setsockopt(fd, IPPROTO_IP, IP_TOS, &s->ip_tos, sizeof(s->ip_tos)) < 0)
623 log_warning("IP_TOS failed: %m");
624
625 if (s->ip_ttl >= 0) {
626 int r, x;
627
628 r = setsockopt(fd, IPPROTO_IP, IP_TTL, &s->ip_ttl, sizeof(s->ip_ttl));
629 x = setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &s->ip_ttl, sizeof(s->ip_ttl));
630
631 if (r < 0 && x < 0)
632 log_warning("IP_TTL/IPV6_UNICAST_HOPS failed: %m");
633 }
634 }
635
636 static void socket_apply_fifo_options(Socket *s, int fd) {
637 assert(s);
638 assert(fd >= 0);
639
640 if (s->pipe_size > 0)
641 if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
642 log_warning("F_SETPIPE_SZ: %m");
643 }
644
645 static int fifo_address_create(
646 const char *path,
647 mode_t directory_mode,
648 mode_t socket_mode,
649 /* FIXME SELINUX: pass SELinux context object here */
650 int *_fd) {
651
652 int fd = -1, r;
653 struct stat st;
654 mode_t old_mask;
655
656 assert(path);
657 assert(_fd);
658
659 mkdir_parents(path, directory_mode);
660
661 /* FIXME SELINUX: The mkfifo here should be done with
662 * the right SELinux context set */
663
664 /* Enforce the right access mode for the fifo */
665 old_mask = umask(~ socket_mode);
666
667 /* Include the original umask in our mask */
668 umask(~socket_mode | old_mask);
669
670 r = mkfifo(path, socket_mode);
671 umask(old_mask);
672
673 if (r < 0) {
674 r = -errno;
675 goto fail;
676 }
677
678 if ((fd = open(path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
679 r = -errno;
680 goto fail;
681 }
682
683 if (fstat(fd, &st) < 0) {
684 r = -errno;
685 goto fail;
686 }
687
688 if (!S_ISFIFO(st.st_mode) ||
689 st.st_mode != (socket_mode & ~old_mask) ||
690 st.st_uid != getuid() ||
691 st.st_gid != getgid()) {
692
693 r = -EEXIST;
694 goto fail;
695 }
696
697 *_fd = fd;
698 return 0;
699
700 fail:
701 if (fd >= 0)
702 close_nointr_nofail(fd);
703
704 return r;
705 }
706
707 static int socket_open_fds(Socket *s) {
708 SocketPort *p;
709 int r;
710
711 assert(s);
712
713 /* FIXME SELINUX: Somewhere here we must set the the SELinux
714 context for the created sockets and FIFOs. To figure out
715 the executable name for this, use
716 socket_instantiate_service() and then access the executable
717 path name via
718 s->service->exec_command[SERVICE_EXEC_START]->path. Example:
719
720 if ((r = socket_instantiate_service(s)) < 0)
721 return r;
722
723 log_debug("Socket unit %s will spawn service unit %s with executable path %s.",
724 s->meta.id,
725 s->service->meta.id,
726 s->service->exec_command[SERVICE_EXEC_START]->path);
727 */
728
729 LIST_FOREACH(port, p, s->ports) {
730
731 if (p->fd >= 0)
732 continue;
733
734 if (p->type == SOCKET_SOCKET) {
735
736 if ((r = socket_address_listen(
737 &p->address,
738 s->backlog,
739 s->bind_ipv6_only,
740 s->bind_to_device,
741 s->free_bind,
742 s->directory_mode,
743 s->socket_mode,
744 /* FIXME SELINUX: Pass the SELinux context object here */
745 &p->fd)) < 0)
746 goto rollback;
747
748 socket_apply_socket_options(s, p->fd);
749
750 } else if (p->type == SOCKET_FIFO) {
751
752 if ((r = fifo_address_create(
753 p->path,
754 s->directory_mode,
755 s->socket_mode,
756 /* FIXME SELINUX: Pass the SELinux context object here */
757 &p->fd)) < 0)
758 goto rollback;
759
760 socket_apply_fifo_options(s, p->fd);
761
762 } else
763 assert_not_reached("Unknown port type");
764 }
765
766 return 0;
767
768 rollback:
769 socket_close_fds(s);
770 return r;
771 }
772
773 static void socket_unwatch_fds(Socket *s) {
774 SocketPort *p;
775
776 assert(s);
777
778 LIST_FOREACH(port, p, s->ports) {
779 if (p->fd < 0)
780 continue;
781
782 unit_unwatch_fd(UNIT(s), &p->fd_watch);
783 }
784 }
785
786 static int socket_watch_fds(Socket *s) {
787 SocketPort *p;
788 int r;
789
790 assert(s);
791
792 LIST_FOREACH(port, p, s->ports) {
793 if (p->fd < 0)
794 continue;
795
796 p->fd_watch.socket_accept =
797 s->accept &&
798 p->type == SOCKET_SOCKET &&
799 socket_address_can_accept(&p->address);
800
801 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
802 goto fail;
803 }
804
805 return 0;
806
807 fail:
808 socket_unwatch_fds(s);
809 return r;
810 }
811
812 static void socket_set_state(Socket *s, SocketState state) {
813 SocketState old_state;
814 assert(s);
815
816 old_state = s->state;
817 s->state = state;
818
819 if (state != SOCKET_START_PRE &&
820 state != SOCKET_START_POST &&
821 state != SOCKET_STOP_PRE &&
822 state != SOCKET_STOP_PRE_SIGTERM &&
823 state != SOCKET_STOP_PRE_SIGKILL &&
824 state != SOCKET_STOP_POST &&
825 state != SOCKET_FINAL_SIGTERM &&
826 state != SOCKET_FINAL_SIGKILL) {
827 unit_unwatch_timer(UNIT(s), &s->timer_watch);
828 socket_unwatch_control_pid(s);
829 s->control_command = NULL;
830 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
831 }
832
833 if (state != SOCKET_LISTENING)
834 socket_unwatch_fds(s);
835
836 if (state != SOCKET_START_POST &&
837 state != SOCKET_LISTENING &&
838 state != SOCKET_RUNNING &&
839 state != SOCKET_STOP_PRE &&
840 state != SOCKET_STOP_PRE_SIGTERM &&
841 state != SOCKET_STOP_PRE_SIGKILL)
842 socket_close_fds(s);
843
844 if (state != old_state)
845 log_debug("%s changed %s -> %s",
846 s->meta.id,
847 socket_state_to_string(old_state),
848 socket_state_to_string(state));
849
850 unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
851 }
852
853 static int socket_coldplug(Unit *u) {
854 Socket *s = SOCKET(u);
855 int r;
856
857 assert(s);
858 assert(s->state == SOCKET_DEAD);
859
860 if (s->deserialized_state != s->state) {
861
862 if (s->deserialized_state == SOCKET_START_PRE ||
863 s->deserialized_state == SOCKET_START_POST ||
864 s->deserialized_state == SOCKET_STOP_PRE ||
865 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
866 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
867 s->deserialized_state == SOCKET_STOP_POST ||
868 s->deserialized_state == SOCKET_FINAL_SIGTERM ||
869 s->deserialized_state == SOCKET_FINAL_SIGKILL) {
870
871 if (s->control_pid <= 0)
872 return -EBADMSG;
873
874 if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
875 return r;
876
877 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
878 return r;
879 }
880
881 if (s->deserialized_state == SOCKET_START_POST ||
882 s->deserialized_state == SOCKET_LISTENING ||
883 s->deserialized_state == SOCKET_RUNNING ||
884 s->deserialized_state == SOCKET_STOP_PRE ||
885 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
886 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
887 if ((r = socket_open_fds(s)) < 0)
888 return r;
889
890 if (s->deserialized_state == SOCKET_LISTENING)
891 if ((r = socket_watch_fds(s)) < 0)
892 return r;
893
894 socket_set_state(s, s->deserialized_state);
895 }
896
897 return 0;
898 }
899
900 static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
901 pid_t pid;
902 int r;
903 char **argv;
904
905 assert(s);
906 assert(c);
907 assert(_pid);
908
909 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
910 goto fail;
911
912 if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
913 r = -ENOMEM;
914 goto fail;
915 }
916
917 r = exec_spawn(c,
918 argv,
919 &s->exec_context,
920 NULL, 0,
921 s->meta.manager->environment,
922 true,
923 true,
924 true,
925 s->meta.manager->confirm_spawn,
926 s->meta.cgroup_bondings,
927 &pid);
928
929 strv_free(argv);
930 if (r < 0)
931 goto fail;
932
933 if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
934 /* FIXME: we need to do something here */
935 goto fail;
936
937 *_pid = pid;
938
939 return 0;
940
941 fail:
942 unit_unwatch_timer(UNIT(s), &s->timer_watch);
943
944 return r;
945 }
946
947 static void socket_enter_dead(Socket *s, bool success) {
948 assert(s);
949
950 if (!success)
951 s->failure = true;
952
953 socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
954 }
955
956 static void socket_enter_signal(Socket *s, SocketState state, bool success);
957
958 static void socket_enter_stop_post(Socket *s, bool success) {
959 int r;
960 assert(s);
961
962 if (!success)
963 s->failure = true;
964
965 socket_unwatch_control_pid(s);
966
967 s->control_command_id = SOCKET_EXEC_STOP_POST;
968
969 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
970 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
971 goto fail;
972
973 socket_set_state(s, SOCKET_STOP_POST);
974 } else
975 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
976
977 return;
978
979 fail:
980 log_warning("%s failed to run 'stop-post' task: %s", s->meta.id, strerror(-r));
981 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
982 }
983
984 static void socket_enter_signal(Socket *s, SocketState state, bool success) {
985 int r;
986 bool sent = false;
987
988 assert(s);
989
990 if (!success)
991 s->failure = true;
992
993 if (s->exec_context.kill_mode != KILL_NONE) {
994 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? s->exec_context.kill_signal : SIGKILL;
995
996 if (s->exec_context.kill_mode == KILL_CONTROL_GROUP) {
997
998 if ((r = cgroup_bonding_kill_list(s->meta.cgroup_bondings, sig)) < 0) {
999 if (r != -EAGAIN && r != -ESRCH)
1000 goto fail;
1001 } else
1002 sent = true;
1003 }
1004
1005 if (!sent && s->control_pid > 0)
1006 if (kill(s->exec_context.kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
1007 r = -errno;
1008 goto fail;
1009 }
1010 }
1011
1012 if (sent && s->control_pid > 0) {
1013 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
1014 goto fail;
1015
1016 socket_set_state(s, state);
1017 } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
1018 socket_enter_stop_post(s, true);
1019 else
1020 socket_enter_dead(s, true);
1021
1022 return;
1023
1024 fail:
1025 log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
1026
1027 if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
1028 socket_enter_stop_post(s, false);
1029 else
1030 socket_enter_dead(s, false);
1031 }
1032
1033 static void socket_enter_stop_pre(Socket *s, bool success) {
1034 int r;
1035 assert(s);
1036
1037 if (!success)
1038 s->failure = true;
1039
1040 socket_unwatch_control_pid(s);
1041
1042 s->control_command_id = SOCKET_EXEC_STOP_PRE;
1043
1044 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
1045 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1046 goto fail;
1047
1048 socket_set_state(s, SOCKET_STOP_PRE);
1049 } else
1050 socket_enter_stop_post(s, true);
1051
1052 return;
1053
1054 fail:
1055 log_warning("%s failed to run 'stop-pre' task: %s", s->meta.id, strerror(-r));
1056 socket_enter_stop_post(s, false);
1057 }
1058
1059 static void socket_enter_listening(Socket *s) {
1060 int r;
1061 assert(s);
1062
1063 if ((r = socket_watch_fds(s)) < 0) {
1064 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
1065 goto fail;
1066 }
1067
1068 socket_set_state(s, SOCKET_LISTENING);
1069 return;
1070
1071 fail:
1072 socket_enter_stop_pre(s, false);
1073 }
1074
1075 static void socket_enter_start_post(Socket *s) {
1076 int r;
1077 assert(s);
1078
1079 if ((r = socket_open_fds(s)) < 0) {
1080 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
1081 goto fail;
1082 }
1083
1084 socket_unwatch_control_pid(s);
1085
1086 s->control_command_id = SOCKET_EXEC_START_POST;
1087
1088 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
1089 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
1090 log_warning("%s failed to run 'start-post' task: %s", s->meta.id, strerror(-r));
1091 goto fail;
1092 }
1093
1094 socket_set_state(s, SOCKET_START_POST);
1095 } else
1096 socket_enter_listening(s);
1097
1098 return;
1099
1100 fail:
1101 socket_enter_stop_pre(s, false);
1102 }
1103
1104 static void socket_enter_start_pre(Socket *s) {
1105 int r;
1106 assert(s);
1107
1108 socket_unwatch_control_pid(s);
1109
1110 s->control_command_id = SOCKET_EXEC_START_PRE;
1111
1112 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
1113 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1114 goto fail;
1115
1116 socket_set_state(s, SOCKET_START_PRE);
1117 } else
1118 socket_enter_start_post(s);
1119
1120 return;
1121
1122 fail:
1123 log_warning("%s failed to run 'start-pre' task: %s", s->meta.id, strerror(-r));
1124 socket_enter_dead(s, false);
1125 }
1126
1127 static void socket_enter_running(Socket *s, int cfd) {
1128 int r;
1129 DBusError error;
1130
1131 assert(s);
1132 dbus_error_init(&error);
1133
1134 /* We don't take connections anymore if we are supposed to
1135 * shut down anyway */
1136 if (s->meta.job && s->meta.job->type == JOB_STOP) {
1137 if (cfd >= 0)
1138 close_nointr_nofail(cfd);
1139 else {
1140 /* Flush all sockets by closing and reopening them */
1141 socket_close_fds(s);
1142
1143 if ((r = socket_watch_fds(s)) < 0) {
1144 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
1145 socket_enter_stop_pre(s, false);
1146 }
1147 }
1148
1149 return;
1150 }
1151
1152 if (cfd < 0) {
1153 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, &error, NULL)) < 0)
1154 goto fail;
1155
1156 socket_set_state(s, SOCKET_RUNNING);
1157 } else {
1158 char *prefix, *instance = NULL, *name;
1159 Service *service;
1160
1161 if (s->n_connections >= s->max_connections) {
1162 log_warning("Too many incoming connections (%u)", s->n_connections);
1163 close_nointr_nofail(cfd);
1164 return;
1165 }
1166
1167 if ((r = socket_instantiate_service(s)) < 0)
1168 goto fail;
1169
1170 if ((r = instance_from_socket(cfd, s->n_accepted, &instance)) < 0)
1171 goto fail;
1172
1173 if (!(prefix = unit_name_to_prefix(s->meta.id))) {
1174 free(instance);
1175 r = -ENOMEM;
1176 goto fail;
1177 }
1178
1179 name = unit_name_build(prefix, instance, ".service");
1180 free(prefix);
1181 free(instance);
1182
1183 if (!name) {
1184 r = -ENOMEM;
1185 goto fail;
1186 }
1187
1188 if ((r = unit_add_name(UNIT(s->service), name)) < 0) {
1189 free(name);
1190 goto fail;
1191 }
1192
1193 service = s->service;
1194 s->service = NULL;
1195 s->n_accepted ++;
1196
1197 unit_choose_id(UNIT(service), name);
1198 free(name);
1199
1200 if ((r = service_set_socket_fd(service, cfd, s)) < 0)
1201 goto fail;
1202
1203 cfd = -1;
1204 s->n_connections ++;
1205
1206 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(service), JOB_REPLACE, true, &error, NULL)) < 0)
1207 goto fail;
1208 }
1209
1210 return;
1211
1212 fail:
1213 log_warning("%s failed to queue socket startup job: %s", s->meta.id, bus_error(&error, r));
1214 socket_enter_stop_pre(s, false);
1215
1216 if (cfd >= 0)
1217 close_nointr_nofail(cfd);
1218
1219 dbus_error_free(&error);
1220 }
1221
1222 static void socket_run_next(Socket *s, bool success) {
1223 int r;
1224
1225 assert(s);
1226 assert(s->control_command);
1227 assert(s->control_command->command_next);
1228
1229 if (!success)
1230 s->failure = true;
1231
1232 socket_unwatch_control_pid(s);
1233
1234 s->control_command = s->control_command->command_next;
1235
1236 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1237 goto fail;
1238
1239 return;
1240
1241 fail:
1242 log_warning("%s failed to run next task: %s", s->meta.id, strerror(-r));
1243
1244 if (s->state == SOCKET_START_POST)
1245 socket_enter_stop_pre(s, false);
1246 else if (s->state == SOCKET_STOP_POST)
1247 socket_enter_dead(s, false);
1248 else
1249 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1250 }
1251
1252 static int socket_start(Unit *u) {
1253 Socket *s = SOCKET(u);
1254
1255 assert(s);
1256
1257 /* We cannot fulfill this request right now, try again later
1258 * please! */
1259 if (s->state == SOCKET_STOP_PRE ||
1260 s->state == SOCKET_STOP_PRE_SIGKILL ||
1261 s->state == SOCKET_STOP_PRE_SIGTERM ||
1262 s->state == SOCKET_STOP_POST ||
1263 s->state == SOCKET_FINAL_SIGTERM ||
1264 s->state == SOCKET_FINAL_SIGKILL)
1265 return -EAGAIN;
1266
1267 if (s->state == SOCKET_START_PRE ||
1268 s->state == SOCKET_START_POST)
1269 return 0;
1270
1271 /* Cannot run this without the service being around */
1272 if (s->service) {
1273 if (s->service->meta.load_state != UNIT_LOADED)
1274 return -ENOENT;
1275
1276 /* If the service is alredy actvie we cannot start the
1277 * socket */
1278 if (s->service->state != SERVICE_DEAD &&
1279 s->service->state != SERVICE_MAINTENANCE &&
1280 s->service->state != SERVICE_AUTO_RESTART)
1281 return -EBUSY;
1282 }
1283
1284 assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
1285
1286 s->failure = false;
1287 socket_enter_start_pre(s);
1288 return 0;
1289 }
1290
1291 static int socket_stop(Unit *u) {
1292 Socket *s = SOCKET(u);
1293
1294 assert(s);
1295
1296 /* Already on it */
1297 if (s->state == SOCKET_STOP_PRE ||
1298 s->state == SOCKET_STOP_PRE_SIGTERM ||
1299 s->state == SOCKET_STOP_PRE_SIGKILL ||
1300 s->state == SOCKET_STOP_POST ||
1301 s->state == SOCKET_FINAL_SIGTERM ||
1302 s->state == SOCKET_FINAL_SIGKILL)
1303 return 0;
1304
1305 /* If there's already something running we go directly into
1306 * kill mode. */
1307 if (s->state == SOCKET_START_PRE ||
1308 s->state == SOCKET_START_POST) {
1309 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, true);
1310 return -EAGAIN;
1311 }
1312
1313 assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
1314
1315 socket_enter_stop_pre(s, true);
1316 return 0;
1317 }
1318
1319 static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1320 Socket *s = SOCKET(u);
1321 SocketPort *p;
1322 int r;
1323
1324 assert(u);
1325 assert(f);
1326 assert(fds);
1327
1328 unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1329 unit_serialize_item(u, f, "failure", yes_no(s->failure));
1330 unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1331
1332 if (s->control_pid > 0)
1333 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) s->control_pid);
1334
1335 if (s->control_command_id >= 0)
1336 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1337
1338 LIST_FOREACH(port, p, s->ports) {
1339 int copy;
1340
1341 if (p->fd < 0)
1342 continue;
1343
1344 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1345 return copy;
1346
1347 if (p->type == SOCKET_SOCKET) {
1348 char *t;
1349
1350 if ((r = socket_address_print(&p->address, &t)) < 0)
1351 return r;
1352
1353 unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
1354 free(t);
1355 } else {
1356 assert(p->type == SOCKET_FIFO);
1357 unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1358 }
1359 }
1360
1361 return 0;
1362 }
1363
1364 static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1365 Socket *s = SOCKET(u);
1366 int r;
1367
1368 assert(u);
1369 assert(key);
1370 assert(value);
1371 assert(fds);
1372
1373 if (streq(key, "state")) {
1374 SocketState state;
1375
1376 if ((state = socket_state_from_string(value)) < 0)
1377 log_debug("Failed to parse state value %s", value);
1378 else
1379 s->deserialized_state = state;
1380 } else if (streq(key, "failure")) {
1381 int b;
1382
1383 if ((b = parse_boolean(value)) < 0)
1384 log_debug("Failed to parse failure value %s", value);
1385 else
1386 s->failure = b || s->failure;
1387
1388 } else if (streq(key, "n-accepted")) {
1389 unsigned k;
1390
1391 if ((r = safe_atou(value, &k)) < 0)
1392 log_debug("Failed to parse n-accepted value %s", value);
1393 else
1394 s->n_accepted += k;
1395 } else if (streq(key, "control-pid")) {
1396 pid_t pid;
1397
1398 if ((r = parse_pid(value, &pid)) < 0)
1399 log_debug("Failed to parse control-pid value %s", value);
1400 else
1401 s->control_pid = pid;
1402 } else if (streq(key, "control-command")) {
1403 SocketExecCommand id;
1404
1405 if ((id = socket_exec_command_from_string(value)) < 0)
1406 log_debug("Failed to parse exec-command value %s", value);
1407 else {
1408 s->control_command_id = id;
1409 s->control_command = s->exec_command[id];
1410 }
1411 } else if (streq(key, "fifo")) {
1412 int fd, skip = 0;
1413 SocketPort *p;
1414
1415 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1416 log_debug("Failed to parse fifo value %s", value);
1417 else {
1418
1419 LIST_FOREACH(port, p, s->ports)
1420 if (streq(p->path, value+skip))
1421 break;
1422
1423 if (p) {
1424 if (p->fd >= 0)
1425 close_nointr_nofail(p->fd);
1426 p->fd = fdset_remove(fds, fd);
1427 }
1428 }
1429
1430 } else if (streq(key, "socket")) {
1431 int fd, type, skip = 0;
1432 SocketPort *p;
1433
1434 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
1435 log_debug("Failed to parse socket value %s", value);
1436 else {
1437
1438 LIST_FOREACH(port, p, s->ports)
1439 if (socket_address_is(&p->address, value+skip, type))
1440 break;
1441
1442 if (p) {
1443 if (p->fd >= 0)
1444 close_nointr_nofail(p->fd);
1445 p->fd = fdset_remove(fds, fd);
1446 }
1447 }
1448
1449 } else
1450 log_debug("Unknown serialization key '%s'", key);
1451
1452 return 0;
1453 }
1454
1455 static UnitActiveState socket_active_state(Unit *u) {
1456 assert(u);
1457
1458 return state_translation_table[SOCKET(u)->state];
1459 }
1460
1461 static const char *socket_sub_state_to_string(Unit *u) {
1462 assert(u);
1463
1464 return socket_state_to_string(SOCKET(u)->state);
1465 }
1466
1467 static bool socket_check_gc(Unit *u) {
1468 Socket *s = SOCKET(u);
1469
1470 assert(u);
1471
1472 return s->n_connections > 0;
1473 }
1474
1475 static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
1476 Socket *s = SOCKET(u);
1477 int cfd = -1;
1478
1479 assert(s);
1480 assert(fd >= 0);
1481
1482 if (s->state != SOCKET_LISTENING)
1483 return;
1484
1485 log_debug("Incoming traffic on %s", u->meta.id);
1486
1487 if (events != EPOLLIN) {
1488 log_error("Got invalid poll event on socket.");
1489 goto fail;
1490 }
1491
1492 if (w->socket_accept) {
1493 for (;;) {
1494
1495 if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1496
1497 if (errno == EINTR)
1498 continue;
1499
1500 log_error("Failed to accept socket: %m");
1501 goto fail;
1502 }
1503
1504 break;
1505 }
1506
1507 socket_apply_socket_options(s, cfd);
1508 }
1509
1510 socket_enter_running(s, cfd);
1511 return;
1512
1513 fail:
1514 socket_enter_stop_pre(s, false);
1515 }
1516
1517 static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1518 Socket *s = SOCKET(u);
1519 bool success;
1520
1521 assert(s);
1522 assert(pid >= 0);
1523
1524 if (pid != s->control_pid)
1525 return;
1526
1527 s->control_pid = 0;
1528
1529 success = is_clean_exit(code, status);
1530
1531 if (s->control_command) {
1532 exec_status_exit(&s->control_command->exec_status, pid, code, status);
1533
1534 if (s->control_command->ignore)
1535 success = true;
1536 }
1537
1538 log_full(success ? LOG_DEBUG : LOG_NOTICE,
1539 "%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1540 s->failure = s->failure || !success;
1541
1542 if (s->control_command && s->control_command->command_next && success) {
1543 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
1544 socket_run_next(s, success);
1545 } else {
1546 s->control_command = NULL;
1547 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1548
1549 /* No further commands for this step, so let's figure
1550 * out what to do next */
1551
1552 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
1553
1554 switch (s->state) {
1555
1556 case SOCKET_START_PRE:
1557 if (success)
1558 socket_enter_start_post(s);
1559 else
1560 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1561 break;
1562
1563 case SOCKET_START_POST:
1564 if (success)
1565 socket_enter_listening(s);
1566 else
1567 socket_enter_stop_pre(s, false);
1568 break;
1569
1570 case SOCKET_STOP_PRE:
1571 case SOCKET_STOP_PRE_SIGTERM:
1572 case SOCKET_STOP_PRE_SIGKILL:
1573 socket_enter_stop_post(s, success);
1574 break;
1575
1576 case SOCKET_STOP_POST:
1577 case SOCKET_FINAL_SIGTERM:
1578 case SOCKET_FINAL_SIGKILL:
1579 socket_enter_dead(s, success);
1580 break;
1581
1582 default:
1583 assert_not_reached("Uh, control process died at wrong time.");
1584 }
1585 }
1586 }
1587
1588 static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1589 Socket *s = SOCKET(u);
1590
1591 assert(s);
1592 assert(elapsed == 1);
1593 assert(w == &s->timer_watch);
1594
1595 switch (s->state) {
1596
1597 case SOCKET_START_PRE:
1598 log_warning("%s starting timed out. Terminating.", u->meta.id);
1599 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1600
1601 case SOCKET_START_POST:
1602 log_warning("%s starting timed out. Stopping.", u->meta.id);
1603 socket_enter_stop_pre(s, false);
1604 break;
1605
1606 case SOCKET_STOP_PRE:
1607 log_warning("%s stopping timed out. Terminating.", u->meta.id);
1608 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1609 break;
1610
1611 case SOCKET_STOP_PRE_SIGTERM:
1612 log_warning("%s stopping timed out. Killing.", u->meta.id);
1613 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1614 break;
1615
1616 case SOCKET_STOP_PRE_SIGKILL:
1617 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
1618 socket_enter_stop_post(s, false);
1619 break;
1620
1621 case SOCKET_STOP_POST:
1622 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
1623 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1624 break;
1625
1626 case SOCKET_FINAL_SIGTERM:
1627 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
1628 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
1629 break;
1630
1631 case SOCKET_FINAL_SIGKILL:
1632 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
1633 socket_enter_dead(s, false);
1634 break;
1635
1636 default:
1637 assert_not_reached("Timeout at wrong time.");
1638 }
1639 }
1640
1641 int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1642 int *rfds;
1643 unsigned rn_fds, k;
1644 SocketPort *p;
1645
1646 assert(s);
1647 assert(fds);
1648 assert(n_fds);
1649
1650 /* Called from the service code for requesting our fds */
1651
1652 rn_fds = 0;
1653 LIST_FOREACH(port, p, s->ports)
1654 if (p->fd >= 0)
1655 rn_fds++;
1656
1657 if (!(rfds = new(int, rn_fds)) < 0)
1658 return -ENOMEM;
1659
1660 k = 0;
1661 LIST_FOREACH(port, p, s->ports)
1662 if (p->fd >= 0)
1663 rfds[k++] = p->fd;
1664
1665 assert(k == rn_fds);
1666
1667 *fds = rfds;
1668 *n_fds = rn_fds;
1669
1670 return 0;
1671 }
1672
1673 void socket_notify_service_dead(Socket *s) {
1674 assert(s);
1675
1676 /* The service is dead. Dang!
1677 *
1678 * This is strictly for one-instance-for-all-connections
1679 * services. */
1680
1681 if (s->state == SOCKET_RUNNING) {
1682 log_debug("%s got notified about service death.", s->meta.id);
1683 socket_enter_listening(s);
1684 }
1685 }
1686
1687 void socket_connection_unref(Socket *s) {
1688 assert(s);
1689
1690 /* The service is dead. Yay!
1691 *
1692 * This is strictly for one-onstance-per-connection
1693 * services. */
1694
1695 assert(s->n_connections > 0);
1696 s->n_connections--;
1697
1698 log_debug("%s: One connection closed, %u left.", s->meta.id, s->n_connections);
1699 }
1700
1701 static void socket_reset_maintenance(Unit *u) {
1702 Socket *s = SOCKET(u);
1703
1704 assert(s);
1705
1706 if (s->state == SOCKET_MAINTENANCE)
1707 socket_set_state(s, SOCKET_DEAD);
1708
1709 s->failure = false;
1710 }
1711
1712 static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1713 [SOCKET_DEAD] = "dead",
1714 [SOCKET_START_PRE] = "start-pre",
1715 [SOCKET_START_POST] = "start-post",
1716 [SOCKET_LISTENING] = "listening",
1717 [SOCKET_RUNNING] = "running",
1718 [SOCKET_STOP_PRE] = "stop-pre",
1719 [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1720 [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1721 [SOCKET_STOP_POST] = "stop-post",
1722 [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1723 [SOCKET_FINAL_SIGKILL] = "final-sigkill",
1724 [SOCKET_MAINTENANCE] = "maintenance"
1725 };
1726
1727 DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1728
1729 static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1730 [SOCKET_EXEC_START_PRE] = "StartPre",
1731 [SOCKET_EXEC_START_POST] = "StartPost",
1732 [SOCKET_EXEC_STOP_PRE] = "StopPre",
1733 [SOCKET_EXEC_STOP_POST] = "StopPost"
1734 };
1735
1736 DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1737
1738 const UnitVTable socket_vtable = {
1739 .suffix = ".socket",
1740
1741 .init = socket_init,
1742 .done = socket_done,
1743 .load = socket_load,
1744
1745 .coldplug = socket_coldplug,
1746
1747 .dump = socket_dump,
1748
1749 .start = socket_start,
1750 .stop = socket_stop,
1751
1752 .serialize = socket_serialize,
1753 .deserialize_item = socket_deserialize_item,
1754
1755 .active_state = socket_active_state,
1756 .sub_state_to_string = socket_sub_state_to_string,
1757
1758 .check_gc = socket_check_gc,
1759
1760 .fd_event = socket_fd_event,
1761 .sigchld_event = socket_sigchld_event,
1762 .timer_event = socket_timer_event,
1763
1764 .reset_maintenance = socket_reset_maintenance,
1765
1766 .bus_message_handler = bus_socket_message_handler
1767 };