]>
Commit | Line | Data |
---|---|---|
53e1b683 | 1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
2ca0435b | 2 | |
3f6fd1ba | 3 | #include <getopt.h> |
2ca0435b ZJS |
4 | #include <sys/epoll.h> |
5 | #include <sys/prctl.h> | |
6 | #include <sys/socket.h> | |
7 | #include <sys/wait.h> | |
3f6fd1ba | 8 | #include <unistd.h> |
2ca0435b | 9 | |
8dd4c05b | 10 | #include "sd-daemon.h" |
2ca0435b | 11 | |
b5efdb8a | 12 | #include "alloc-util.h" |
2b2fec7d | 13 | #include "errno-util.h" |
cf98937c | 14 | #include "escape.h" |
b5efdb8a | 15 | #include "fd-util.h" |
2ca0435b | 16 | #include "log.h" |
2ca0435b | 17 | #include "macro.h" |
294bf0c3 | 18 | #include "pretty-print.h" |
df0ff127 | 19 | #include "process-util.h" |
ce30c8dc | 20 | #include "signal-util.h" |
3f6fd1ba | 21 | #include "socket-util.h" |
07630cea | 22 | #include "string-util.h" |
3f6fd1ba | 23 | #include "strv.h" |
37ec0fdd | 24 | #include "terminal-util.h" |
2ca0435b ZJS |
25 | |
26 | static char** arg_listen = NULL; | |
27 | static bool arg_accept = false; | |
d31e430f | 28 | static int arg_socket_type = SOCK_STREAM; |
2ca0435b | 29 | static char** arg_args = NULL; |
892213bf | 30 | static char** arg_setenv = NULL; |
cf98937c | 31 | static char **arg_fdnames = NULL; |
eef0a274 | 32 | static bool arg_inetd = false; |
2ca0435b ZJS |
33 | |
34 | static int add_epoll(int epoll_fd, int fd) { | |
30374ebe | 35 | struct epoll_event ev = { |
b1c05b98 ZJS |
36 | .events = EPOLLIN, |
37 | .data.fd = fd, | |
30374ebe | 38 | }; |
2ca0435b ZJS |
39 | |
40 | assert(epoll_fd >= 0); | |
41 | assert(fd >= 0); | |
42 | ||
b1c05b98 | 43 | if (epoll_ctl(epoll_fd, EPOLL_CTL_ADD, fd, &ev) < 0) |
4a62c710 | 44 | return log_error_errno(errno, "Failed to add event on epoll fd:%d for fd:%d: %m", epoll_fd, fd); |
603938e0 LP |
45 | |
46 | return 0; | |
2ca0435b ZJS |
47 | } |
48 | ||
49 | static int open_sockets(int *epoll_fd, bool accept) { | |
30374ebe | 50 | char **address; |
29a5ca9b | 51 | int n, fd, r; |
2ca0435b | 52 | int count = 0; |
2ca0435b ZJS |
53 | |
54 | n = sd_listen_fds(true); | |
eb56eb9b MS |
55 | if (n < 0) |
56 | return log_error_errno(n, "Failed to read listening file descriptors from environment: %m"); | |
30374ebe LP |
57 | if (n > 0) { |
58 | log_info("Received %i descriptors via the environment.", n); | |
2ca0435b | 59 | |
30374ebe LP |
60 | for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd++) { |
61 | r = fd_cloexec(fd, arg_accept); | |
62 | if (r < 0) | |
63 | return r; | |
2ca0435b | 64 | |
313cefa1 | 65 | count++; |
30374ebe | 66 | } |
2ca0435b ZJS |
67 | } |
68 | ||
c0997164 ZJS |
69 | /* Close logging and all other descriptors */ |
70 | if (arg_listen) { | |
71 | int except[3 + n]; | |
72 | ||
73 | for (fd = 0; fd < SD_LISTEN_FDS_START + n; fd++) | |
74 | except[fd] = fd; | |
75 | ||
76 | log_close(); | |
7acf581a ZJS |
77 | r = close_all_fds(except, 3 + n); |
78 | if (r < 0) | |
79 | return log_error_errno(r, "Failed to close all file descriptors: %m"); | |
c0997164 ZJS |
80 | } |
81 | ||
fff40a51 ZJS |
82 | /** Note: we leak some fd's on error here. I doesn't matter |
83 | * much, since the program will exit immediately anyway, but | |
84 | * would be a pain to fix. | |
85 | */ | |
86 | ||
2ca0435b | 87 | STRV_FOREACH(address, arg_listen) { |
d31e430f | 88 | fd = make_socket_fd(LOG_DEBUG, *address, arg_socket_type, (arg_accept*SOCK_CLOEXEC)); |
2ca0435b | 89 | if (fd < 0) { |
c0997164 | 90 | log_open(); |
23bbb0de | 91 | return log_error_errno(fd, "Failed to open '%s': %m", *address); |
2ca0435b ZJS |
92 | } |
93 | ||
175a3d25 | 94 | assert(fd == SD_LISTEN_FDS_START + count); |
313cefa1 | 95 | count++; |
2ca0435b ZJS |
96 | } |
97 | ||
c0997164 ZJS |
98 | if (arg_listen) |
99 | log_open(); | |
100 | ||
2ca0435b | 101 | *epoll_fd = epoll_create1(EPOLL_CLOEXEC); |
4a62c710 MS |
102 | if (*epoll_fd < 0) |
103 | return log_error_errno(errno, "Failed to create epoll object: %m"); | |
2ca0435b ZJS |
104 | |
105 | for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + count; fd++) { | |
30374ebe LP |
106 | _cleanup_free_ char *name = NULL; |
107 | ||
108 | getsockname_pretty(fd, &name); | |
2c408cb6 | 109 | log_info("Listening on %s as %i.", strna(name), fd); |
30374ebe | 110 | |
29a5ca9b | 111 | r = add_epoll(*epoll_fd, fd); |
2ca0435b ZJS |
112 | if (r < 0) |
113 | return r; | |
114 | } | |
115 | ||
116 | return count; | |
117 | } | |
118 | ||
da6053d0 | 119 | static int exec_process(const char* name, char **argv, char **env, int start_fd, size_t n_fds) { |
30374ebe | 120 | |
30374ebe | 121 | _cleanup_strv_free_ char **envp = NULL; |
eef0a274 | 122 | _cleanup_free_ char *joined = NULL; |
da6053d0 | 123 | size_t n_env = 0, length; |
eef0a274 | 124 | const char *tocopy; |
eef0a274 LP |
125 | char **s; |
126 | int r; | |
127 | ||
baaa35ad ZJS |
128 | if (arg_inetd && n_fds != 1) |
129 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), | |
130 | "--inetd only supported for single file descriptors."); | |
2ca0435b | 131 | |
892213bf | 132 | length = strv_length(arg_setenv); |
30374ebe | 133 | |
8dd4c05b LP |
134 | /* PATH, TERM, HOME, USER, LISTEN_FDS, LISTEN_PID, LISTEN_FDNAMES, NULL */ |
135 | envp = new0(char *, length + 8); | |
30374ebe LP |
136 | if (!envp) |
137 | return log_oom(); | |
5e65c93a | 138 | |
892213bf | 139 | STRV_FOREACH(s, arg_setenv) { |
eef0a274 | 140 | |
fa994f91 LP |
141 | if (strchr(*s, '=')) { |
142 | char *k; | |
143 | ||
144 | k = strdup(*s); | |
145 | if (!k) | |
146 | return log_oom(); | |
147 | ||
148 | envp[n_env++] = k; | |
149 | } else { | |
8dd4c05b | 150 | _cleanup_free_ char *p; |
fa994f91 | 151 | const char *n; |
8dd4c05b LP |
152 | |
153 | p = strappend(*s, "="); | |
5e65c93a ZJS |
154 | if (!p) |
155 | return log_oom(); | |
fa994f91 LP |
156 | |
157 | n = strv_find_prefix(env, p); | |
158 | if (!n) | |
159 | continue; | |
160 | ||
161 | envp[n_env] = strdup(n); | |
162 | if (!envp[n_env]) | |
163 | return log_oom(); | |
eef0a274 | 164 | |
313cefa1 | 165 | n_env++; |
5e65c93a ZJS |
166 | } |
167 | } | |
168 | ||
eef0a274 | 169 | FOREACH_STRING(tocopy, "TERM=", "PATH=", "USER=", "HOME=") { |
fa994f91 LP |
170 | const char *n; |
171 | ||
eef0a274 | 172 | n = strv_find_prefix(env, tocopy); |
fa994f91 LP |
173 | if (!n) |
174 | continue; | |
175 | ||
176 | envp[n_env] = strdup(n); | |
177 | if (!envp[n_env]) | |
178 | return log_oom(); | |
179 | ||
313cefa1 | 180 | n_env++; |
2ca0435b ZJS |
181 | } |
182 | ||
eef0a274 LP |
183 | if (arg_inetd) { |
184 | assert(n_fds == 1); | |
2ca0435b | 185 | |
2b33ab09 | 186 | r = rearrange_stdio(start_fd, start_fd, STDERR_FILENO); /* invalidates start_fd on success + error */ |
eef0a274 | 187 | if (r < 0) |
4355f1c9 | 188 | return log_error_errno(r, "Failed to move fd to stdin+stdout: %m"); |
8dd4c05b | 189 | |
eef0a274 LP |
190 | } else { |
191 | if (start_fd != SD_LISTEN_FDS_START) { | |
192 | assert(n_fds == 1); | |
193 | ||
b1c05b98 | 194 | if (dup2(start_fd, SD_LISTEN_FDS_START) < 0) |
eef0a274 LP |
195 | return log_error_errno(errno, "Failed to dup connection: %m"); |
196 | ||
197 | safe_close(start_fd); | |
198 | start_fd = SD_LISTEN_FDS_START; | |
199 | } | |
200 | ||
da6053d0 | 201 | if (asprintf((char**)(envp + n_env++), "LISTEN_FDS=%zu", n_fds) < 0) |
8dd4c05b LP |
202 | return log_oom(); |
203 | ||
df0ff127 | 204 | if (asprintf((char**)(envp + n_env++), "LISTEN_PID=" PID_FMT, getpid_cached()) < 0) |
eef0a274 | 205 | return log_oom(); |
8dd4c05b | 206 | |
cf98937c ZJS |
207 | if (arg_fdnames) { |
208 | _cleanup_free_ char *names = NULL; | |
209 | size_t len; | |
eef0a274 | 210 | char *e; |
cf98937c ZJS |
211 | |
212 | len = strv_length(arg_fdnames); | |
da6053d0 LP |
213 | if (len == 1) { |
214 | size_t i; | |
215 | ||
cf98937c ZJS |
216 | for (i = 1; i < n_fds; i++) { |
217 | r = strv_extend(&arg_fdnames, arg_fdnames[0]); | |
218 | if (r < 0) | |
219 | return log_error_errno(r, "Failed to extend strv: %m"); | |
220 | } | |
da6053d0 LP |
221 | } else if (len != n_fds) |
222 | log_warning("The number of fd names is different than number of fds: %zu vs %zu", len, n_fds); | |
eef0a274 | 223 | |
cf98937c ZJS |
224 | names = strv_join(arg_fdnames, ":"); |
225 | if (!names) | |
8dd4c05b | 226 | return log_oom(); |
eef0a274 | 227 | |
cf98937c ZJS |
228 | e = strappend("LISTEN_FDNAMES=", names); |
229 | if (!e) | |
230 | return log_oom(); | |
8dd4c05b | 231 | |
eef0a274 | 232 | envp[n_env++] = e; |
8dd4c05b | 233 | } |
8dd4c05b LP |
234 | } |
235 | ||
eef0a274 LP |
236 | joined = strv_join(argv, " "); |
237 | if (!joined) | |
2ca0435b ZJS |
238 | return log_oom(); |
239 | ||
eef0a274 | 240 | log_info("Execing %s (%s)", name, joined); |
2ca0435b | 241 | execvpe(name, argv, envp); |
30374ebe | 242 | |
eef0a274 | 243 | return log_error_errno(errno, "Failed to execp %s (%s): %m", name, joined); |
2ca0435b ZJS |
244 | } |
245 | ||
eef0a274 LP |
246 | static int fork_and_exec_process(const char* child, char** argv, char **env, int fd) { |
247 | _cleanup_free_ char *joined = NULL; | |
4c253ed1 LP |
248 | pid_t child_pid; |
249 | int r; | |
2ca0435b | 250 | |
eef0a274 LP |
251 | joined = strv_join(argv, " "); |
252 | if (!joined) | |
2ca0435b ZJS |
253 | return log_oom(); |
254 | ||
0672e2c6 | 255 | r = safe_fork("(activate)", FORK_RESET_SIGNALS|FORK_DEATHSIG|FORK_RLIMIT_NOFILE_SAFE|FORK_LOG, &child_pid); |
4c253ed1 | 256 | if (r < 0) |
b6e1fff1 | 257 | return r; |
4c253ed1 LP |
258 | if (r == 0) { |
259 | /* In the child */ | |
eef0a274 | 260 | exec_process(child, argv, env, fd, 1); |
2ca0435b ZJS |
261 | _exit(EXIT_FAILURE); |
262 | } | |
263 | ||
4c253ed1 | 264 | log_info("Spawned %s (%s) as PID " PID_FMT ".", child, joined, child_pid); |
2ca0435b ZJS |
265 | return 0; |
266 | } | |
267 | ||
268 | static int do_accept(const char* name, char **argv, char **envp, int fd) { | |
30374ebe | 269 | _cleanup_free_ char *local = NULL, *peer = NULL; |
eef0a274 | 270 | _cleanup_close_ int fd_accepted = -1; |
2ca0435b | 271 | |
eef0a274 LP |
272 | fd_accepted = accept4(fd, NULL, NULL, 0); |
273 | if (fd_accepted < 0) | |
08719b64 | 274 | return log_error_errno(errno, "Failed to accept connection on fd:%d: %m", fd); |
2ca0435b | 275 | |
eef0a274 LP |
276 | getsockname_pretty(fd_accepted, &local); |
277 | getpeername_pretty(fd_accepted, true, &peer); | |
30374ebe | 278 | log_info("Connection from %s to %s", strna(peer), strna(local)); |
2ca0435b | 279 | |
eef0a274 | 280 | return fork_and_exec_process(name, argv, envp, fd_accepted); |
2ca0435b ZJS |
281 | } |
282 | ||
283 | /* SIGCHLD handler. */ | |
5488e52d | 284 | static void sigchld_hdl(int sig) { |
9d458c09 LP |
285 | PROTECT_ERRNO; |
286 | ||
5488e52d EV |
287 | for (;;) { |
288 | siginfo_t si; | |
289 | int r; | |
08719b64 | 290 | |
5488e52d EV |
291 | si.si_pid = 0; |
292 | r = waitid(P_ALL, 0, &si, WEXITED|WNOHANG); | |
293 | if (r < 0) { | |
294 | if (errno != ECHILD) | |
295 | log_error_errno(errno, "Failed to reap children: %m"); | |
296 | return; | |
297 | } | |
298 | if (si.si_pid == 0) | |
299 | return; | |
300 | ||
301 | log_info("Child %d died with code %d", si.si_pid, si.si_status); | |
302 | } | |
2ca0435b ZJS |
303 | } |
304 | ||
305 | static int install_chld_handler(void) { | |
08719b64 | 306 | static const struct sigaction act = { |
e28c7cd0 | 307 | .sa_flags = SA_NOCLDSTOP|SA_RESTART, |
5488e52d | 308 | .sa_handler = sigchld_hdl, |
c0997164 | 309 | }; |
2ca0435b | 310 | |
b1c05b98 | 311 | if (sigaction(SIGCHLD, &act, 0) < 0) |
08719b64 LP |
312 | return log_error_errno(errno, "Failed to install SIGCHLD handler: %m"); |
313 | ||
314 | return 0; | |
2ca0435b ZJS |
315 | } |
316 | ||
37ec0fdd LP |
317 | static int help(void) { |
318 | _cleanup_free_ char *link = NULL; | |
319 | int r; | |
320 | ||
321 | r = terminal_urlify_man("systemd-socket-activate", "1", &link); | |
322 | if (r < 0) | |
323 | return log_oom(); | |
324 | ||
2ca0435b ZJS |
325 | printf("%s [OPTIONS...]\n\n" |
326 | "Listen on sockets and launch child on connection.\n\n" | |
327 | "Options:\n" | |
cf98937c ZJS |
328 | " -h --help Show this help and exit\n" |
329 | " --version Print version string and exit\n" | |
330 | " -l --listen=ADDR Listen for raw connections at ADDR\n" | |
331 | " -d --datagram Listen on datagram instead of stream socket\n" | |
332 | " --seqpacket Listen on SOCK_SEQPACKET instead of stream socket\n" | |
333 | " -a --accept Spawn separate child for each connection\n" | |
334 | " -E --setenv=NAME[=VALUE] Pass an environment variable to children\n" | |
335 | " --fdname=NAME[:NAME...] Specify names for file descriptors\n" | |
336 | " --inetd Enable inetd file descriptor passing protocol\n" | |
37ec0fdd LP |
337 | "\nNote: file descriptors from sd_listen_fds() will be passed through.\n" |
338 | "\nSee the %s for details.\n" | |
339 | , program_invocation_short_name | |
340 | , link | |
341 | ); | |
342 | ||
343 | return 0; | |
2ca0435b ZJS |
344 | } |
345 | ||
346 | static int parse_argv(int argc, char *argv[]) { | |
347 | enum { | |
348 | ARG_VERSION = 0x100, | |
8dd4c05b | 349 | ARG_FDNAME, |
d31e430f | 350 | ARG_SEQPACKET, |
eef0a274 | 351 | ARG_INETD, |
2ca0435b ZJS |
352 | }; |
353 | ||
354 | static const struct option options[] = { | |
892213bf ZJS |
355 | { "help", no_argument, NULL, 'h' }, |
356 | { "version", no_argument, NULL, ARG_VERSION }, | |
7b7afdfc | 357 | { "datagram", no_argument, NULL, 'd' }, |
d31e430f | 358 | { "seqpacket", no_argument, NULL, ARG_SEQPACKET }, |
892213bf ZJS |
359 | { "listen", required_argument, NULL, 'l' }, |
360 | { "accept", no_argument, NULL, 'a' }, | |
361 | { "setenv", required_argument, NULL, 'E' }, | |
8dd4c05b LP |
362 | { "environment", required_argument, NULL, 'E' }, /* legacy alias */ |
363 | { "fdname", required_argument, NULL, ARG_FDNAME }, | |
eef0a274 | 364 | { "inetd", no_argument, NULL, ARG_INETD }, |
eb9da376 | 365 | {} |
2ca0435b ZJS |
366 | }; |
367 | ||
8dd4c05b | 368 | int c, r; |
2ca0435b ZJS |
369 | |
370 | assert(argc >= 0); | |
371 | assert(argv); | |
372 | ||
b722348d | 373 | while ((c = getopt_long(argc, argv, "+hl:aE:d", options, NULL)) >= 0) |
2ca0435b ZJS |
374 | switch(c) { |
375 | case 'h': | |
37ec0fdd | 376 | return help(); |
2ca0435b ZJS |
377 | |
378 | case ARG_VERSION: | |
3f6fd1ba | 379 | return version(); |
2ca0435b | 380 | |
8dd4c05b LP |
381 | case 'l': |
382 | r = strv_extend(&arg_listen, optarg); | |
2ca0435b | 383 | if (r < 0) |
8dd4c05b | 384 | return log_oom(); |
2ca0435b ZJS |
385 | |
386 | break; | |
2ca0435b | 387 | |
7b7afdfc | 388 | case 'd': |
baaa35ad ZJS |
389 | if (arg_socket_type == SOCK_SEQPACKET) |
390 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), | |
391 | "--datagram may not be combined with --seqpacket."); | |
d31e430f LP |
392 | |
393 | arg_socket_type = SOCK_DGRAM; | |
394 | break; | |
395 | ||
396 | case ARG_SEQPACKET: | |
baaa35ad ZJS |
397 | if (arg_socket_type == SOCK_DGRAM) |
398 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), | |
399 | "--seqpacket may not be combined with --datagram."); | |
d31e430f LP |
400 | |
401 | arg_socket_type = SOCK_SEQPACKET; | |
7b7afdfc SS |
402 | break; |
403 | ||
2ca0435b ZJS |
404 | case 'a': |
405 | arg_accept = true; | |
406 | break; | |
407 | ||
8dd4c05b LP |
408 | case 'E': |
409 | r = strv_extend(&arg_setenv, optarg); | |
5e65c93a | 410 | if (r < 0) |
8dd4c05b | 411 | return log_oom(); |
5e65c93a ZJS |
412 | |
413 | break; | |
8dd4c05b | 414 | |
cf98937c ZJS |
415 | case ARG_FDNAME: { |
416 | _cleanup_strv_free_ char **names; | |
417 | char **s; | |
418 | ||
419 | names = strv_split(optarg, ":"); | |
420 | if (!names) | |
421 | return log_oom(); | |
422 | ||
423 | STRV_FOREACH(s, names) | |
424 | if (!fdname_is_valid(*s)) { | |
425 | _cleanup_free_ char *esc; | |
163c76c9 | 426 | |
cf98937c ZJS |
427 | esc = cescape(*s); |
428 | log_warning("File descriptor name \"%s\" is not valid.", esc); | |
429 | } | |
430 | ||
431 | /* Empty optargs means one empty name */ | |
432 | r = strv_extend_strv(&arg_fdnames, | |
433 | strv_isempty(names) ? STRV_MAKE("") : names, | |
434 | false); | |
435 | if (r < 0) | |
436 | return log_error_errno(r, "strv_extend_strv: %m"); | |
8dd4c05b | 437 | break; |
cf98937c | 438 | } |
5e65c93a | 439 | |
eef0a274 LP |
440 | case ARG_INETD: |
441 | arg_inetd = true; | |
442 | break; | |
443 | ||
2ca0435b ZJS |
444 | case '?': |
445 | return -EINVAL; | |
446 | ||
447 | default: | |
eb9da376 | 448 | assert_not_reached("Unhandled option"); |
2ca0435b ZJS |
449 | } |
450 | ||
baaa35ad ZJS |
451 | if (optind == argc) |
452 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), | |
453 | "%s: command to execute is missing.", | |
454 | program_invocation_short_name); | |
2ca0435b | 455 | |
baaa35ad ZJS |
456 | if (arg_socket_type == SOCK_DGRAM && arg_accept) |
457 | return log_error_errno(SYNTHETIC_ERRNO(EINVAL), | |
458 | "Datagram sockets do not accept connections. " | |
459 | "The --datagram and --accept options may not be combined."); | |
7b7afdfc | 460 | |
2ca0435b ZJS |
461 | arg_args = argv + optind; |
462 | ||
463 | return 1 /* work to do */; | |
464 | } | |
465 | ||
466 | int main(int argc, char **argv, char **envp) { | |
467 | int r, n; | |
468 | int epoll_fd = -1; | |
469 | ||
2ca0435b | 470 | log_parse_environment(); |
eceb8483 | 471 | log_open(); |
2ca0435b ZJS |
472 | |
473 | r = parse_argv(argc, argv); | |
474 | if (r <= 0) | |
475 | return r == 0 ? EXIT_SUCCESS : EXIT_FAILURE; | |
476 | ||
477 | r = install_chld_handler(); | |
478 | if (r < 0) | |
479 | return EXIT_FAILURE; | |
480 | ||
481 | n = open_sockets(&epoll_fd, arg_accept); | |
482 | if (n < 0) | |
483 | return EXIT_FAILURE; | |
2c408cb6 LP |
484 | if (n == 0) { |
485 | log_error("No sockets to listen on specified or passed in."); | |
486 | return EXIT_FAILURE; | |
487 | } | |
2ca0435b | 488 | |
eceb8483 | 489 | for (;;) { |
2ca0435b ZJS |
490 | struct epoll_event event; |
491 | ||
b1c05b98 | 492 | if (epoll_wait(epoll_fd, &event, 1, -1) < 0) { |
2ca0435b ZJS |
493 | if (errno == EINTR) |
494 | continue; | |
495 | ||
56f64d95 | 496 | log_error_errno(errno, "epoll_wait() failed: %m"); |
2ca0435b ZJS |
497 | return EXIT_FAILURE; |
498 | } | |
499 | ||
2c408cb6 | 500 | log_info("Communication attempt on fd %i.", event.data.fd); |
2ca0435b | 501 | if (arg_accept) { |
d31e430f | 502 | r = do_accept(argv[optind], argv + optind, envp, event.data.fd); |
2ca0435b ZJS |
503 | if (r < 0) |
504 | return EXIT_FAILURE; | |
505 | } else | |
506 | break; | |
507 | } | |
508 | ||
da6053d0 | 509 | exec_process(argv[optind], argv + optind, envp, SD_LISTEN_FDS_START, (size_t) n); |
2ca0435b ZJS |
510 | |
511 | return EXIT_SUCCESS; | |
512 | } |