]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/socket.c
units: fix ordering problem
[thirdparty/systemd.git] / src / socket.c
CommitLineData
5cb5a6ff
LP
1/*-*- Mode: C; c-basic-offset: 8 -*-*/
2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
83c60c9f
LP
22#include <sys/types.h>
23#include <sys/stat.h>
24#include <unistd.h>
25#include <errno.h>
26#include <fcntl.h>
f94ea366 27#include <sys/epoll.h>
034c6ed7 28#include <signal.h>
4f2d528d 29#include <arpa/inet.h>
83c60c9f 30
87f0e418 31#include "unit.h"
5cb5a6ff 32#include "socket.h"
83c60c9f 33#include "log.h"
23a177ef
LP
34#include "load-dropin.h"
35#include "load-fragment.h"
9e2f7c11 36#include "strv.h"
4f2d528d 37#include "unit-name.h"
4139c1b2 38#include "dbus-socket.h"
4fd5948e 39#include "missing.h"
a40eb732 40#include "special.h"
398ef8ba 41#include "bus-errors.h"
83c60c9f 42
acbb0225 43static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
87f0e418
LP
44 [SOCKET_DEAD] = UNIT_INACTIVE,
45 [SOCKET_START_PRE] = UNIT_ACTIVATING,
46 [SOCKET_START_POST] = UNIT_ACTIVATING,
47 [SOCKET_LISTENING] = UNIT_ACTIVE,
48 [SOCKET_RUNNING] = UNIT_ACTIVE,
49 [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
50 [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
51 [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
52 [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
80876c20
LP
53 [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
54 [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
032ff4af 55 [SOCKET_MAINTENANCE] = UNIT_MAINTENANCE
83c60c9f 56};
5cb5a6ff 57
a16e1123
LP
58static void socket_init(Unit *u) {
59 Socket *s = SOCKET(u);
60
61 assert(u);
62 assert(u->meta.load_state == UNIT_STUB);
63
a16e1123
LP
64 s->backlog = SOMAXCONN;
65 s->timeout_usec = DEFAULT_TIMEOUT_USEC;
66 s->directory_mode = 0755;
67 s->socket_mode = 0666;
68
6cf6bbc2
LP
69 s->max_connections = 64;
70
4fd5948e 71 s->priority = -1;
4fd5948e
LP
72 s->ip_tos = -1;
73 s->ip_ttl = -1;
4fd5948e 74 s->mark = -1;
4fd5948e 75
a16e1123
LP
76 exec_context_init(&s->exec_context);
77
78 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
79}
acbb0225 80
5e94833f
LP
81static void socket_unwatch_control_pid(Socket *s) {
82 assert(s);
83
84 if (s->control_pid <= 0)
85 return;
86
87 unit_unwatch_pid(UNIT(s), s->control_pid);
88 s->control_pid = 0;
89}
90
87f0e418
LP
91static void socket_done(Unit *u) {
92 Socket *s = SOCKET(u);
034c6ed7 93 SocketPort *p;
6cf6bbc2 94 Meta *i;
034c6ed7
LP
95
96 assert(s);
97
98 while ((p = s->ports)) {
99 LIST_REMOVE(SocketPort, port, s->ports, p);
100
a16e1123
LP
101 if (p->fd >= 0) {
102 unit_unwatch_fd(UNIT(s), &p->fd_watch);
103 close_nointr_nofail(p->fd);
104 }
105
034c6ed7
LP
106 free(p->path);
107 free(p);
108 }
109
110 exec_context_done(&s->exec_context);
e537352b 111 exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
034c6ed7
LP
112 s->control_command = NULL;
113
5e94833f 114 socket_unwatch_control_pid(s);
034c6ed7
LP
115
116 s->service = NULL;
117
acbb0225 118 free(s->bind_to_device);
e537352b 119 s->bind_to_device = NULL;
acbb0225
LP
120
121 unit_unwatch_timer(u, &s->timer_watch);
6cf6bbc2
LP
122
123 /* Make sure no service instance refers to us anymore. */
124 LIST_FOREACH(units_per_type, i, u->meta.manager->units_per_type[UNIT_SERVICE]) {
125 Service *service = (Service *) i;
126
127 if (service->socket == s)
128 service->socket = NULL;
129 }
5cb5a6ff
LP
130}
131
4f2d528d
LP
132static bool have_non_accept_socket(Socket *s) {
133 SocketPort *p;
134
135 assert(s);
136
137 if (!s->accept)
138 return true;
139
dd5ad9d4
LP
140 LIST_FOREACH(port, p, s->ports) {
141
142 if (p->type != SOCKET_SOCKET)
143 return true;
144
4f2d528d
LP
145 if (!socket_address_can_accept(&p->address))
146 return true;
dd5ad9d4 147 }
4f2d528d
LP
148
149 return false;
150}
151
152static int socket_verify(Socket *s) {
153 assert(s);
154
4cd1fbcc 155 if (s->meta.load_state != UNIT_LOADED)
4f2d528d
LP
156 return 0;
157
158 if (!s->ports) {
4cd1fbcc 159 log_error("%s lacks Listen setting. Refusing.", s->meta.id);
4f2d528d
LP
160 return -EINVAL;
161 }
162
6cf6bbc2 163 if (s->accept && s->max_connections <= 0) {
4d0e5dbd
LP
164 log_error("%s's MaxConnection setting too small. Refusing.", s->meta.id);
165 return -EINVAL;
166 }
167
2e22afe9 168 if (s->exec_context.pam_name && s->exec_context.kill_mode != KILL_CONTROL_GROUP) {
4d0e5dbd 169 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", s->meta.id);
6cf6bbc2
LP
170 return -EINVAL;
171 }
172
4f2d528d
LP
173 return 0;
174}
175
6e2ef85b
LP
176static bool socket_needs_mount(Socket *s, const char *prefix) {
177 SocketPort *p;
178
179 assert(s);
180
181 LIST_FOREACH(port, p, s->ports) {
182
183 if (p->type == SOCKET_SOCKET) {
184 if (socket_address_needs_mount(&p->address, prefix))
185 return true;
186 } else {
187 assert(p->type == SOCKET_FIFO);
188 if (path_startswith(p->path, prefix))
189 return true;
190 }
191 }
192
193 return false;
194}
195
196int socket_add_one_mount_link(Socket *s, Mount *m) {
197 int r;
198
199 assert(s);
200 assert(m);
201
202 if (s->meta.load_state != UNIT_LOADED ||
203 m->meta.load_state != UNIT_LOADED)
204 return 0;
205
206 if (!socket_needs_mount(s, m->where))
207 return 0;
208
2c966c03 209 if ((r = unit_add_two_dependencies(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true)) < 0)
6e2ef85b
LP
210 return r;
211
212 return 0;
213}
214
215static int socket_add_mount_links(Socket *s) {
216 Meta *other;
217 int r;
218
219 assert(s);
220
221 LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
222 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
223 return r;
224
225 return 0;
226}
227
228static int socket_add_device_link(Socket *s) {
229 char *t;
230 int r;
231
232 assert(s);
233
234 if (!s->bind_to_device)
235 return 0;
236
237 if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
238 return -ENOMEM;
239
240 r = unit_add_node_link(UNIT(s), t, false);
241 free(t);
242
243 return r;
244}
245
a40eb732
LP
246static int socket_add_default_dependencies(Socket *s) {
247 int r;
248 assert(s);
249
250 if (s->meta.manager->running_as == MANAGER_SYSTEM)
251 if ((r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true)) < 0)
252 return r;
253
254 return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
255}
256
e537352b
LP
257static int socket_load(Unit *u) {
258 Socket *s = SOCKET(u);
259 int r;
44d8db9e 260
e537352b
LP
261 assert(u);
262 assert(u->meta.load_state == UNIT_STUB);
44d8db9e 263
e537352b 264 if ((r = unit_load_fragment_and_dropin(u)) < 0)
23a177ef 265 return r;
44d8db9e 266
23a177ef 267 /* This is a new unit? Then let's add in some extras */
e537352b 268 if (u->meta.load_state == UNIT_LOADED) {
44d8db9e 269
4f2d528d 270 if (have_non_accept_socket(s)) {
25366e09 271 if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)) < 0)
4f2d528d 272 return r;
23a177ef 273
701cc384 274 if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
4f2d528d
LP
275 return r;
276 }
44d8db9e 277
6e2ef85b
LP
278 if ((r = socket_add_mount_links(s)) < 0)
279 return r;
280
281 if ((r = socket_add_device_link(s)) < 0)
282 return r;
283
23a177ef
LP
284 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
285 return r;
286
287 if ((r = unit_add_default_cgroup(u)) < 0)
288 return r;
a40eb732
LP
289
290 if (s->meta.default_dependencies)
291 if ((r = socket_add_default_dependencies(s)) < 0)
292 return r;
23a177ef
LP
293 }
294
4f2d528d 295 return socket_verify(s);
44d8db9e
LP
296}
297
542563ba
LP
298static const char* listen_lookup(int type) {
299
300 if (type == SOCK_STREAM)
301 return "ListenStream";
302 else if (type == SOCK_DGRAM)
303 return "ListenDatagram";
304 else if (type == SOCK_SEQPACKET)
305 return "ListenSequentialPacket";
306
034c6ed7 307 assert_not_reached("Unknown socket type");
542563ba
LP
308 return NULL;
309}
310
87f0e418 311static void socket_dump(Unit *u, FILE *f, const char *prefix) {
5cb5a6ff 312
5cb5a6ff 313 SocketExecCommand c;
87f0e418 314 Socket *s = SOCKET(u);
542563ba 315 SocketPort *p;
82ba9f08
LP
316 const char *prefix2;
317 char *p2;
5cb5a6ff
LP
318
319 assert(s);
fa068367 320 assert(f);
5cb5a6ff 321
82ba9f08
LP
322 p2 = strappend(prefix, "\t");
323 prefix2 = p2 ? p2 : prefix;
c43d20a0 324
5cb5a6ff
LP
325 fprintf(f,
326 "%sSocket State: %s\n"
542563ba 327 "%sBindIPv6Only: %s\n"
b5a0699f
LP
328 "%sBacklog: %u\n"
329 "%sSocketMode: %04o\n"
4fd5948e
LP
330 "%sDirectoryMode: %04o\n"
331 "%sKeepAlive: %s\n"
332 "%sFreeBind: %s\n",
a16e1123 333 prefix, socket_state_to_string(s->state),
c0120d99 334 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
b5a0699f
LP
335 prefix, s->backlog,
336 prefix, s->socket_mode,
4fd5948e
LP
337 prefix, s->directory_mode,
338 prefix, yes_no(s->keep_alive),
339 prefix, yes_no(s->free_bind));
542563ba 340
70123e68
LP
341 if (s->control_pid > 0)
342 fprintf(f,
bb00e604
LP
343 "%sControl PID: %lu\n",
344 prefix, (unsigned long) s->control_pid);
70123e68 345
acbb0225
LP
346 if (s->bind_to_device)
347 fprintf(f,
348 "%sBindToDevice: %s\n",
349 prefix, s->bind_to_device);
350
4f2d528d
LP
351 if (s->accept)
352 fprintf(f,
6cf6bbc2
LP
353 "%sAccepted: %u\n"
354 "%sNConnections: %u\n"
355 "%sMaxConnections: %u\n",
356 prefix, s->n_accepted,
357 prefix, s->n_connections,
358 prefix, s->max_connections);
4f2d528d 359
4fd5948e
LP
360 if (s->priority >= 0)
361 fprintf(f,
362 "%sPriority: %i\n",
363 prefix, s->priority);
364
365 if (s->receive_buffer > 0)
366 fprintf(f,
367 "%sReceiveBuffer: %zu\n",
368 prefix, s->receive_buffer);
369
370 if (s->send_buffer > 0)
371 fprintf(f,
372 "%sSendBuffer: %zu\n",
373 prefix, s->send_buffer);
374
375 if (s->ip_tos >= 0)
376 fprintf(f,
377 "%sIPTOS: %i\n",
378 prefix, s->ip_tos);
379
380 if (s->ip_ttl >= 0)
381 fprintf(f,
382 "%sIPTTL: %i\n",
383 prefix, s->ip_ttl);
384
385 if (s->pipe_size > 0)
386 fprintf(f,
387 "%sPipeSize: %zu\n",
388 prefix, s->pipe_size);
389
390 if (s->mark >= 0)
391 fprintf(f,
392 "%sMark: %i\n",
393 prefix, s->mark);
394
034c6ed7 395 LIST_FOREACH(port, p, s->ports) {
5cb5a6ff 396
542563ba
LP
397 if (p->type == SOCKET_SOCKET) {
398 const char *t;
399 int r;
400 char *k;
401
402 if ((r = socket_address_print(&p->address, &k)) < 0)
403 t = strerror(-r);
404 else
405 t = k;
406
407 fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
408 free(k);
409 } else
410 fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
411 }
5cb5a6ff
LP
412
413 exec_context_dump(&s->exec_context, f, prefix);
414
e537352b 415 for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
c43d20a0
LP
416 if (!s->exec_command[c])
417 continue;
5cb5a6ff 418
40d50879 419 fprintf(f, "%s-> %s:\n",
a16e1123 420 prefix, socket_exec_command_to_string(c));
c43d20a0
LP
421
422 exec_command_dump_list(s->exec_command[c], f, prefix2);
5cb5a6ff 423 }
c43d20a0 424
82ba9f08 425 free(p2);
5cb5a6ff
LP
426}
427
4f2d528d
LP
428static int instance_from_socket(int fd, unsigned nr, char **instance) {
429 socklen_t l;
430 char *r;
431 union {
432 struct sockaddr sa;
433 struct sockaddr_un un;
434 struct sockaddr_in in;
435 struct sockaddr_in6 in6;
436 struct sockaddr_storage storage;
437 } local, remote;
438
439 assert(fd >= 0);
440 assert(instance);
441
442 l = sizeof(local);
443 if (getsockname(fd, &local.sa, &l) < 0)
444 return -errno;
445
446 l = sizeof(remote);
447 if (getpeername(fd, &remote.sa, &l) < 0)
448 return -errno;
449
450 switch (local.sa.sa_family) {
451
452 case AF_INET: {
453 uint32_t
454 a = ntohl(local.in.sin_addr.s_addr),
455 b = ntohl(remote.in.sin_addr.s_addr);
456
457 if (asprintf(&r,
a16e1123 458 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
4f2d528d
LP
459 nr,
460 a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
461 ntohs(local.in.sin_port),
462 b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
463 ntohs(remote.in.sin_port)) < 0)
464 return -ENOMEM;
465
466 break;
467 }
468
469 case AF_INET6: {
2b061f5a
LP
470 static const char ipv4_prefix[] = {
471 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
472 };
473
474 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
475 memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
476 const uint8_t
477 *a = local.in6.sin6_addr.s6_addr+12,
478 *b = remote.in6.sin6_addr.s6_addr+12;
479
480 if (asprintf(&r,
481 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
482 nr,
483 a[0], a[1], a[2], a[3],
484 ntohs(local.in6.sin6_port),
485 b[0], b[1], b[2], b[3],
486 ntohs(remote.in6.sin6_port)) < 0)
487 return -ENOMEM;
488 } else {
489 char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
490
491 if (asprintf(&r,
492 "%u-%s:%u-%s:%u",
493 nr,
494 inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
495 ntohs(local.in6.sin6_port),
496 inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
497 ntohs(remote.in6.sin6_port)) < 0)
498 return -ENOMEM;
499 }
4f2d528d
LP
500
501 break;
502 }
503
504 case AF_UNIX: {
505 struct ucred ucred;
506
507 l = sizeof(ucred);
508 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
509 return -errno;
510
511 if (asprintf(&r,
bb00e604 512 "%u-%lu-%lu",
4f2d528d 513 nr,
bb00e604
LP
514 (unsigned long) ucred.pid,
515 (unsigned long) ucred.uid) < 0)
4f2d528d
LP
516 return -ENOMEM;
517
518 break;
519 }
520
521 default:
522 assert_not_reached("Unhandled socket type.");
523 }
524
525 *instance = r;
526 return 0;
527}
528
034c6ed7 529static void socket_close_fds(Socket *s) {
83c60c9f
LP
530 SocketPort *p;
531
532 assert(s);
533
034c6ed7 534 LIST_FOREACH(port, p, s->ports) {
83c60c9f
LP
535 if (p->fd < 0)
536 continue;
537
acbb0225 538 unit_unwatch_fd(UNIT(s), &p->fd_watch);
a16e1123
LP
539 close_nointr_nofail(p->fd);
540
541 /* One little note: we should never delete any sockets
542 * in the file system here! After all some other
543 * process we spawned might still have a reference of
544 * this fd and wants to continue to use it. Therefore
545 * we delete sockets in the file system before we
546 * create a new one, not after we stopped using
547 * one! */
9152c765 548
83c60c9f
LP
549 p->fd = -1;
550 }
551}
552
4fd5948e
LP
553static void socket_apply_socket_options(Socket *s, int fd) {
554 assert(s);
555 assert(fd >= 0);
556
557 if (s->keep_alive) {
558 int b = s->keep_alive;
559 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &b, sizeof(b)) < 0)
560 log_warning("SO_KEEPALIVE failed: %m");
561 }
562
563 if (s->priority >= 0)
564 if (setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &s->priority, sizeof(s->priority)) < 0)
565 log_warning("SO_PRIORITY failed: %m");
566
567 if (s->receive_buffer > 0) {
568 int value = (int) s->receive_buffer;
569 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &value, sizeof(value)) < 0)
570 log_warning("SO_RCVBUF failed: %m");
571 }
572
573 if (s->send_buffer > 0) {
574 int value = (int) s->send_buffer;
575 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &value, sizeof(value)) < 0)
576 log_warning("SO_SNDBUF failed: %m");
577 }
578
579 if (s->mark >= 0)
580 if (setsockopt(fd, SOL_SOCKET, SO_MARK, &s->mark, sizeof(s->mark)) < 0)
581 log_warning("SO_MARK failed: %m");
582
583 if (s->ip_tos >= 0)
584 if (setsockopt(fd, IPPROTO_IP, IP_TOS, &s->ip_tos, sizeof(s->ip_tos)) < 0)
585 log_warning("IP_TOS failed: %m");
586
46925ac5
LP
587 if (s->ip_ttl >= 0) {
588 int r, x;
589
590 r = setsockopt(fd, IPPROTO_IP, IP_TTL, &s->ip_ttl, sizeof(s->ip_ttl));
591 x = setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &s->ip_ttl, sizeof(s->ip_ttl));
592
593 if (r < 0 && x < 0)
594 log_warning("IP_TTL/IPV6_UNICAST_HOPS failed: %m");
595 }
4fd5948e
LP
596}
597
598static void socket_apply_pipe_options(Socket *s, int fd) {
599 assert(s);
600 assert(fd >= 0);
601
602 if (s->pipe_size > 0)
603 if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
604 log_warning("F_SETPIPE_SZ: %m");
605}
606
034c6ed7 607static int socket_open_fds(Socket *s) {
83c60c9f
LP
608 SocketPort *p;
609 int r;
610
611 assert(s);
612
034c6ed7 613 LIST_FOREACH(port, p, s->ports) {
83c60c9f 614
034c6ed7
LP
615 if (p->fd >= 0)
616 continue;
83c60c9f
LP
617
618 if (p->type == SOCKET_SOCKET) {
619
b5a0699f
LP
620 if ((r = socket_address_listen(
621 &p->address,
622 s->backlog,
623 s->bind_ipv6_only,
624 s->bind_to_device,
4fd5948e 625 s->free_bind,
b5a0699f
LP
626 s->directory_mode,
627 s->socket_mode,
628 &p->fd)) < 0)
83c60c9f
LP
629 goto rollback;
630
4fd5948e
LP
631 socket_apply_socket_options(s, p->fd);
632
83c60c9f
LP
633 } else {
634 struct stat st;
635 assert(p->type == SOCKET_FIFO);
636
8cb45bf8
LP
637 mkdir_parents(p->path, s->directory_mode);
638
639 if (mkfifo(p->path, s->socket_mode) < 0 && errno != EEXIST) {
83c60c9f
LP
640 r = -errno;
641 goto rollback;
642 }
643
644 if ((p->fd = open(p->path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
645 r = -errno;
646 goto rollback;
647 }
648
649 if (fstat(p->fd, &st) < 0) {
650 r = -errno;
651 goto rollback;
652 }
653
654 /* FIXME verify user, access mode */
655
656 if (!S_ISFIFO(st.st_mode)) {
657 r = -EEXIST;
658 goto rollback;
659 }
4fd5948e
LP
660
661 socket_apply_pipe_options(s, p->fd);
83c60c9f 662 }
034c6ed7
LP
663 }
664
665 return 0;
666
667rollback:
668 socket_close_fds(s);
669 return r;
670}
671
672static void socket_unwatch_fds(Socket *s) {
673 SocketPort *p;
9152c765 674
034c6ed7
LP
675 assert(s);
676
677 LIST_FOREACH(port, p, s->ports) {
678 if (p->fd < 0)
679 continue;
680
acbb0225 681 unit_unwatch_fd(UNIT(s), &p->fd_watch);
83c60c9f 682 }
034c6ed7
LP
683}
684
685static int socket_watch_fds(Socket *s) {
686 SocketPort *p;
687 int r;
688
689 assert(s);
83c60c9f 690
034c6ed7
LP
691 LIST_FOREACH(port, p, s->ports) {
692 if (p->fd < 0)
693 continue;
694
cabab516 695 p->fd_watch.socket_accept =
4f2d528d 696 s->accept &&
dd5ad9d4 697 p->type == SOCKET_SOCKET &&
4f2d528d
LP
698 socket_address_can_accept(&p->address);
699
f94ea366 700 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
034c6ed7
LP
701 goto fail;
702 }
83c60c9f 703
542563ba 704 return 0;
83c60c9f 705
034c6ed7
LP
706fail:
707 socket_unwatch_fds(s);
708 return r;
709}
710
711static void socket_set_state(Socket *s, SocketState state) {
712 SocketState old_state;
713 assert(s);
714
715 old_state = s->state;
716 s->state = state;
717
718 if (state != SOCKET_START_PRE &&
719 state != SOCKET_START_POST &&
720 state != SOCKET_STOP_PRE &&
721 state != SOCKET_STOP_PRE_SIGTERM &&
722 state != SOCKET_STOP_PRE_SIGKILL &&
723 state != SOCKET_STOP_POST &&
80876c20
LP
724 state != SOCKET_FINAL_SIGTERM &&
725 state != SOCKET_FINAL_SIGKILL) {
acbb0225 726 unit_unwatch_timer(UNIT(s), &s->timer_watch);
5e94833f 727 socket_unwatch_control_pid(s);
034c6ed7 728 s->control_command = NULL;
a16e1123 729 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
e537352b 730 }
034c6ed7 731
a16e1123
LP
732 if (state != SOCKET_LISTENING)
733 socket_unwatch_fds(s);
734
034c6ed7
LP
735 if (state != SOCKET_START_POST &&
736 state != SOCKET_LISTENING &&
737 state != SOCKET_RUNNING &&
738 state != SOCKET_STOP_PRE &&
739 state != SOCKET_STOP_PRE_SIGTERM &&
740 state != SOCKET_STOP_PRE_SIGKILL)
741 socket_close_fds(s);
742
e537352b 743 if (state != old_state)
40d50879 744 log_debug("%s changed %s -> %s",
a16e1123
LP
745 s->meta.id,
746 socket_state_to_string(old_state),
747 socket_state_to_string(state));
acbb0225
LP
748
749 unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
034c6ed7
LP
750}
751
a16e1123
LP
752static int socket_coldplug(Unit *u) {
753 Socket *s = SOCKET(u);
754 int r;
755
756 assert(s);
757 assert(s->state == SOCKET_DEAD);
758
759 if (s->deserialized_state != s->state) {
760
761 if (s->deserialized_state == SOCKET_START_PRE ||
762 s->deserialized_state == SOCKET_START_POST ||
763 s->deserialized_state == SOCKET_STOP_PRE ||
764 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
765 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
766 s->deserialized_state == SOCKET_STOP_POST ||
767 s->deserialized_state == SOCKET_FINAL_SIGTERM ||
768 s->deserialized_state == SOCKET_FINAL_SIGKILL) {
769
770 if (s->control_pid <= 0)
771 return -EBADMSG;
772
773 if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
774 return r;
775
776 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
777 return r;
778 }
779
780 if (s->deserialized_state == SOCKET_START_POST ||
781 s->deserialized_state == SOCKET_LISTENING ||
782 s->deserialized_state == SOCKET_RUNNING ||
783 s->deserialized_state == SOCKET_STOP_PRE ||
784 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
785 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
786 if ((r = socket_open_fds(s)) < 0)
787 return r;
788
789 if (s->deserialized_state == SOCKET_LISTENING)
790 if ((r = socket_watch_fds(s)) < 0)
791 return r;
792
793 socket_set_state(s, s->deserialized_state);
794 }
795
796 return 0;
797}
798
e537352b 799static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
034c6ed7
LP
800 pid_t pid;
801 int r;
9e2f7c11 802 char **argv;
034c6ed7
LP
803
804 assert(s);
805 assert(c);
806 assert(_pid);
807
e537352b
LP
808 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
809 goto fail;
034c6ed7 810
9e2f7c11
LP
811 if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
812 r = -ENOMEM;
813 goto fail;
814 }
815
816 r = exec_spawn(c,
817 argv,
818 &s->exec_context,
819 NULL, 0,
1137a57c 820 s->meta.manager->environment,
9e2f7c11
LP
821 true,
822 true,
1e3ad081 823 true,
4cd1fbcc
LP
824 s->meta.manager->confirm_spawn,
825 s->meta.cgroup_bondings,
9e2f7c11
LP
826 &pid);
827
828 strv_free(argv);
829 if (r < 0)
034c6ed7
LP
830 goto fail;
831
87f0e418 832 if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
034c6ed7
LP
833 /* FIXME: we need to do something here */
834 goto fail;
83c60c9f 835
034c6ed7
LP
836 *_pid = pid;
837
838 return 0;
839
840fail:
e537352b 841 unit_unwatch_timer(UNIT(s), &s->timer_watch);
83c60c9f
LP
842
843 return r;
542563ba
LP
844}
845
034c6ed7
LP
846static void socket_enter_dead(Socket *s, bool success) {
847 assert(s);
848
849 if (!success)
850 s->failure = true;
851
18c78fb1 852 socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
034c6ed7
LP
853}
854
80876c20
LP
855static void socket_enter_signal(Socket *s, SocketState state, bool success);
856
034c6ed7
LP
857static void socket_enter_stop_post(Socket *s, bool success) {
858 int r;
859 assert(s);
860
861 if (!success)
862 s->failure = true;
863
5e94833f
LP
864 socket_unwatch_control_pid(s);
865
a16e1123
LP
866 s->control_command_id = SOCKET_EXEC_STOP_POST;
867
80876c20 868 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
e537352b 869 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
870 goto fail;
871
80876c20
LP
872 socket_set_state(s, SOCKET_STOP_POST);
873 } else
874 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
034c6ed7
LP
875
876 return;
877
878fail:
6cf6bbc2 879 log_warning("%s failed to run 'stop-post' task: %s", s->meta.id, strerror(-r));
80876c20 880 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
881}
882
883static void socket_enter_signal(Socket *s, SocketState state, bool success) {
884 int r;
80876c20 885 bool sent = false;
034c6ed7
LP
886
887 assert(s);
888
889 if (!success)
890 s->failure = true;
891
2e22afe9
LP
892 if (s->exec_context.kill_mode != KILL_NONE) {
893 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? s->exec_context.kill_signal : SIGKILL;
034c6ed7 894
2e22afe9 895 if (s->exec_context.kill_mode == KILL_CONTROL_GROUP) {
50159e6a 896
4cd1fbcc 897 if ((r = cgroup_bonding_kill_list(s->meta.cgroup_bondings, sig)) < 0) {
50159e6a
LP
898 if (r != -EAGAIN && r != -ESRCH)
899 goto fail;
900 } else
901 sent = true;
034c6ed7 902 }
50159e6a 903
80876c20 904 if (!sent && s->control_pid > 0)
2e22afe9 905 if (kill(s->exec_context.kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
50159e6a
LP
906 r = -errno;
907 goto fail;
908 }
d6ea93e3 909 }
034c6ed7 910
e93bc5a6 911 if (sent && s->control_pid > 0) {
80876c20
LP
912 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
913 goto fail;
d6ea93e3 914
80876c20
LP
915 socket_set_state(s, state);
916 } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
917 socket_enter_stop_post(s, true);
918 else
034c6ed7
LP
919 socket_enter_dead(s, true);
920
921 return;
922
923fail:
9e2f7c11 924 log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
034c6ed7
LP
925
926 if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
927 socket_enter_stop_post(s, false);
928 else
929 socket_enter_dead(s, false);
930}
931
932static void socket_enter_stop_pre(Socket *s, bool success) {
933 int r;
934 assert(s);
935
936 if (!success)
937 s->failure = true;
938
5e94833f
LP
939 socket_unwatch_control_pid(s);
940
a16e1123
LP
941 s->control_command_id = SOCKET_EXEC_STOP_PRE;
942
80876c20 943 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
e537352b 944 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
945 goto fail;
946
80876c20
LP
947 socket_set_state(s, SOCKET_STOP_PRE);
948 } else
034c6ed7
LP
949 socket_enter_stop_post(s, true);
950
951 return;
952
953fail:
6cf6bbc2 954 log_warning("%s failed to run 'stop-pre' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
955 socket_enter_stop_post(s, false);
956}
957
e9af15c3
LP
958static void socket_enter_listening(Socket *s) {
959 int r;
960 assert(s);
961
962 if ((r = socket_watch_fds(s)) < 0) {
9e2f7c11 963 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
e9af15c3
LP
964 goto fail;
965 }
966
967 socket_set_state(s, SOCKET_LISTENING);
968 return;
969
970fail:
971 socket_enter_stop_pre(s, false);
972}
973
034c6ed7
LP
974static void socket_enter_start_post(Socket *s) {
975 int r;
976 assert(s);
977
e9af15c3 978 if ((r = socket_open_fds(s)) < 0) {
9e2f7c11 979 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
034c6ed7
LP
980 goto fail;
981 }
982
5e94833f
LP
983 socket_unwatch_control_pid(s);
984
a16e1123
LP
985 s->control_command_id = SOCKET_EXEC_START_POST;
986
80876c20 987 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
e537352b 988 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
6cf6bbc2 989 log_warning("%s failed to run 'start-post' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
990 goto fail;
991 }
992
80876c20
LP
993 socket_set_state(s, SOCKET_START_POST);
994 } else
e9af15c3 995 socket_enter_listening(s);
034c6ed7
LP
996
997 return;
998
999fail:
1000 socket_enter_stop_pre(s, false);
1001}
1002
1003static void socket_enter_start_pre(Socket *s) {
1004 int r;
1005 assert(s);
1006
5e94833f
LP
1007 socket_unwatch_control_pid(s);
1008
a16e1123
LP
1009 s->control_command_id = SOCKET_EXEC_START_PRE;
1010
80876c20 1011 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
e537352b 1012 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
1013 goto fail;
1014
80876c20
LP
1015 socket_set_state(s, SOCKET_START_PRE);
1016 } else
034c6ed7
LP
1017 socket_enter_start_post(s);
1018
1019 return;
1020
1021fail:
6cf6bbc2 1022 log_warning("%s failed to run 'start-pre' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
1023 socket_enter_dead(s, false);
1024}
1025
4f2d528d 1026static void socket_enter_running(Socket *s, int cfd) {
034c6ed7 1027 int r;
398ef8ba 1028 DBusError error;
034c6ed7
LP
1029
1030 assert(s);
398ef8ba 1031 dbus_error_init(&error);
034c6ed7 1032
ba3e67a7
LP
1033 /* We don't take connections anymore if we are supposed to
1034 * shut down anyway */
1035 if (s->meta.job && s->meta.job->type == JOB_STOP) {
1036 close_nointr_nofail(cfd);
1037 return;
1038 }
1039
4f2d528d 1040 if (cfd < 0) {
398ef8ba 1041 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, &error, NULL)) < 0)
4f2d528d
LP
1042 goto fail;
1043
1044 socket_set_state(s, SOCKET_RUNNING);
1045 } else {
1046 Unit *u;
b4f10a5e 1047 char *prefix, *instance = NULL, *name;
4f2d528d 1048
6cf6bbc2
LP
1049 if (s->n_connections >= s->max_connections) {
1050 log_warning("Too many incoming connections (%u)", s->n_connections);
1051 close_nointr_nofail(cfd);
1052 return;
1053 }
1054
b6dbbe1c 1055 if ((r = instance_from_socket(cfd, s->n_accepted++, &instance)) < 0)
4f2d528d
LP
1056 goto fail;
1057
4cd1fbcc 1058 if (!(prefix = unit_name_to_prefix(s->meta.id))) {
4f2d528d
LP
1059 free(instance);
1060 r = -ENOMEM;
1061 goto fail;
1062 }
1063
1064 name = unit_name_build(prefix, instance, ".service");
1065 free(prefix);
1066 free(instance);
1067
b6dbbe1c 1068 if (!name) {
4f2d528d 1069 r = -ENOMEM;
b6dbbe1c
LP
1070 goto fail;
1071 }
4f2d528d 1072
398ef8ba 1073 r = manager_load_unit(s->meta.manager, name, NULL, NULL, &u);
4f2d528d
LP
1074 free(name);
1075
1076 if (r < 0)
1077 goto fail;
1078
6cf6bbc2 1079 if ((r = service_set_socket_fd(SERVICE(u), cfd, s)) < 0)
4f2d528d
LP
1080 goto fail;
1081
1082 cfd = -1;
1083
6cf6bbc2
LP
1084 s->n_connections ++;
1085
398ef8ba 1086 if ((r = manager_add_job(u->meta.manager, JOB_START, u, JOB_REPLACE, true, &error, NULL)) < 0)
4f2d528d
LP
1087 goto fail;
1088 }
034c6ed7 1089
034c6ed7
LP
1090 return;
1091
1092fail:
398ef8ba 1093 log_warning("%s failed to queue socket startup job: %s", s->meta.id, bus_error(&error, r));
80876c20 1094 socket_enter_stop_pre(s, false);
4f2d528d
LP
1095
1096 if (cfd >= 0)
1097 close_nointr_nofail(cfd);
398ef8ba
LP
1098
1099 dbus_error_free(&error);
034c6ed7
LP
1100}
1101
1102static void socket_run_next(Socket *s, bool success) {
1103 int r;
1104
1105 assert(s);
1106 assert(s->control_command);
1107 assert(s->control_command->command_next);
1108
1109 if (!success)
1110 s->failure = true;
1111
5e94833f
LP
1112 socket_unwatch_control_pid(s);
1113
034c6ed7
LP
1114 s->control_command = s->control_command->command_next;
1115
e537352b 1116 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
1117 goto fail;
1118
1119 return;
1120
1121fail:
6cf6bbc2 1122 log_warning("%s failed to run next task: %s", s->meta.id, strerror(-r));
80876c20
LP
1123
1124 if (s->state == SOCKET_START_POST)
1125 socket_enter_stop_pre(s, false);
034c6ed7
LP
1126 else if (s->state == SOCKET_STOP_POST)
1127 socket_enter_dead(s, false);
1128 else
80876c20 1129 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1130}
1131
87f0e418
LP
1132static int socket_start(Unit *u) {
1133 Socket *s = SOCKET(u);
83c60c9f
LP
1134
1135 assert(s);
1136
034c6ed7
LP
1137 /* We cannot fulfill this request right now, try again later
1138 * please! */
1139 if (s->state == SOCKET_STOP_PRE ||
1140 s->state == SOCKET_STOP_PRE_SIGKILL ||
1141 s->state == SOCKET_STOP_PRE_SIGTERM ||
1142 s->state == SOCKET_STOP_POST ||
80876c20
LP
1143 s->state == SOCKET_FINAL_SIGTERM ||
1144 s->state == SOCKET_FINAL_SIGKILL)
034c6ed7
LP
1145 return -EAGAIN;
1146
83c60c9f
LP
1147 if (s->state == SOCKET_START_PRE ||
1148 s->state == SOCKET_START_POST)
034c6ed7 1149 return 0;
83c60c9f 1150
034c6ed7 1151 /* Cannot run this without the service being around */
4f2d528d
LP
1152 if (s->service) {
1153 if (s->service->meta.load_state != UNIT_LOADED)
1154 return -ENOENT;
1155
1156 /* If the service is alredy actvie we cannot start the
1157 * socket */
1158 if (s->service->state != SERVICE_DEAD &&
18c78fb1 1159 s->service->state != SERVICE_MAINTENANCE &&
4f2d528d
LP
1160 s->service->state != SERVICE_AUTO_RESTART)
1161 return -EBUSY;
1162 }
e537352b 1163
18c78fb1 1164 assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
83c60c9f 1165
034c6ed7
LP
1166 s->failure = false;
1167 socket_enter_start_pre(s);
1168 return 0;
1169}
83c60c9f 1170
87f0e418
LP
1171static int socket_stop(Unit *u) {
1172 Socket *s = SOCKET(u);
034c6ed7
LP
1173
1174 assert(s);
1175
e537352b
LP
1176 /* Already on it */
1177 if (s->state == SOCKET_STOP_PRE ||
1178 s->state == SOCKET_STOP_PRE_SIGTERM ||
1179 s->state == SOCKET_STOP_PRE_SIGKILL ||
1180 s->state == SOCKET_STOP_POST ||
80876c20 1181 s->state == SOCKET_FINAL_SIGTERM ||
3f6c78dc 1182 s->state == SOCKET_FINAL_SIGKILL)
e537352b
LP
1183 return 0;
1184
3f6c78dc
LP
1185 /* If there's already something running we go directly into
1186 * kill mode. */
1187 if (s->state == SOCKET_START_PRE ||
1188 s->state == SOCKET_START_POST) {
1189 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, true);
1190 return -EAGAIN;
1191 }
1192
034c6ed7 1193 assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
83c60c9f 1194
034c6ed7 1195 socket_enter_stop_pre(s, true);
542563ba
LP
1196 return 0;
1197}
1198
a16e1123
LP
1199static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1200 Socket *s = SOCKET(u);
1201 SocketPort *p;
1202 int r;
1203
1204 assert(u);
1205 assert(f);
1206 assert(fds);
1207
1208 unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1209 unit_serialize_item(u, f, "failure", yes_no(s->failure));
1210 unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1211
1212 if (s->control_pid > 0)
5925dd3c 1213 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) s->control_pid);
a16e1123
LP
1214
1215 if (s->control_command_id >= 0)
1216 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1217
1218 LIST_FOREACH(port, p, s->ports) {
1219 int copy;
1220
1221 if (p->fd < 0)
1222 continue;
1223
1224 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1225 return copy;
1226
1227 if (p->type == SOCKET_SOCKET) {
1228 char *t;
1229
1230 if ((r = socket_address_print(&p->address, &t)) < 0)
1231 return r;
1232
27ca8d7a 1233 unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
a16e1123
LP
1234 free(t);
1235 } else {
1236 assert(p->type == SOCKET_FIFO);
1237 unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1238 }
1239 }
1240
1241 return 0;
1242}
1243
1244static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1245 Socket *s = SOCKET(u);
1246 int r;
1247
1248 assert(u);
1249 assert(key);
1250 assert(value);
1251 assert(fds);
1252
1253 if (streq(key, "state")) {
1254 SocketState state;
1255
1256 if ((state = socket_state_from_string(value)) < 0)
1257 log_debug("Failed to parse state value %s", value);
1258 else
1259 s->deserialized_state = state;
1260 } else if (streq(key, "failure")) {
1261 int b;
1262
1263 if ((b = parse_boolean(value)) < 0)
1264 log_debug("Failed to parse failure value %s", value);
1265 else
1266 s->failure = b || s->failure;
1267
1268 } else if (streq(key, "n-accepted")) {
1269 unsigned k;
1270
1271 if ((r = safe_atou(value, &k)) < 0)
1272 log_debug("Failed to parse n-accepted value %s", value);
1273 else
1274 s->n_accepted += k;
1275 } else if (streq(key, "control-pid")) {
5925dd3c 1276 pid_t pid;
a16e1123 1277
5925dd3c 1278 if ((r = parse_pid(value, &pid)) < 0)
a16e1123
LP
1279 log_debug("Failed to parse control-pid value %s", value);
1280 else
5925dd3c 1281 s->control_pid = pid;
a16e1123
LP
1282 } else if (streq(key, "control-command")) {
1283 SocketExecCommand id;
1284
1285 if ((id = socket_exec_command_from_string(value)) < 0)
1286 log_debug("Failed to parse exec-command value %s", value);
1287 else {
1288 s->control_command_id = id;
1289 s->control_command = s->exec_command[id];
1290 }
1291 } else if (streq(key, "fifo")) {
1292 int fd, skip = 0;
1293 SocketPort *p;
1294
1295 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1296 log_debug("Failed to parse fifo value %s", value);
1297 else {
1298
1299 LIST_FOREACH(port, p, s->ports)
1300 if (streq(p->path, value+skip))
1301 break;
1302
1303 if (p) {
1304 if (p->fd >= 0)
1305 close_nointr_nofail(p->fd);
1306 p->fd = fdset_remove(fds, fd);
1307 }
1308 }
1309
1310 } else if (streq(key, "socket")) {
27ca8d7a 1311 int fd, type, skip = 0;
a16e1123
LP
1312 SocketPort *p;
1313
27ca8d7a 1314 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
a16e1123
LP
1315 log_debug("Failed to parse socket value %s", value);
1316 else {
1317
1318 LIST_FOREACH(port, p, s->ports)
27ca8d7a 1319 if (socket_address_is(&p->address, value+skip, type))
a16e1123
LP
1320 break;
1321
1322 if (p) {
1323 if (p->fd >= 0)
1324 close_nointr_nofail(p->fd);
1325 p->fd = fdset_remove(fds, fd);
1326 }
1327 }
1328
1329 } else
1330 log_debug("Unknown serialization key '%s'", key);
1331
1332 return 0;
1333}
1334
87f0e418
LP
1335static UnitActiveState socket_active_state(Unit *u) {
1336 assert(u);
5cb5a6ff 1337
acbb0225 1338 return state_translation_table[SOCKET(u)->state];
5cb5a6ff
LP
1339}
1340
10a94420
LP
1341static const char *socket_sub_state_to_string(Unit *u) {
1342 assert(u);
1343
a16e1123 1344 return socket_state_to_string(SOCKET(u)->state);
10a94420
LP
1345}
1346
6cf6bbc2
LP
1347static bool socket_check_gc(Unit *u) {
1348 Socket *s = SOCKET(u);
1349
1350 assert(u);
1351
1352 return s->n_connections > 0;
1353}
1354
acbb0225 1355static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
87f0e418 1356 Socket *s = SOCKET(u);
4f2d528d 1357 int cfd = -1;
9152c765 1358
034c6ed7 1359 assert(s);
8d567588 1360 assert(fd >= 0);
9152c765 1361
871d7de4
LP
1362 if (s->state != SOCKET_LISTENING)
1363 return;
1364
9e2f7c11 1365 log_debug("Incoming traffic on %s", u->meta.id);
9152c765 1366
4f2d528d
LP
1367 if (events != EPOLLIN) {
1368 log_error("Got invalid poll event on socket.");
8d567588 1369 goto fail;
4f2d528d
LP
1370 }
1371
cabab516 1372 if (w->socket_accept) {
4f2d528d
LP
1373 for (;;) {
1374
1375 if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1376
1377 if (errno == EINTR)
1378 continue;
1379
1380 log_error("Failed to accept socket: %m");
8d567588 1381 goto fail;
4f2d528d
LP
1382 }
1383
1384 break;
1385 }
4fd5948e
LP
1386
1387 socket_apply_socket_options(s, cfd);
4f2d528d 1388 }
9152c765 1389
4f2d528d 1390 socket_enter_running(s, cfd);
8d567588
LP
1391 return;
1392
1393fail:
1394 socket_enter_stop_pre(s, false);
9152c765
LP
1395}
1396
87f0e418
LP
1397static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1398 Socket *s = SOCKET(u);
034c6ed7 1399 bool success;
5cb5a6ff
LP
1400
1401 assert(s);
034c6ed7 1402 assert(pid >= 0);
5cb5a6ff 1403
8c47c732
LP
1404 if (pid != s->control_pid)
1405 return;
542563ba 1406
034c6ed7
LP
1407 s->control_pid = 0;
1408
8c47c732 1409 success = is_clean_exit(code, status);
8c47c732 1410
b708e7ce 1411 if (s->control_command) {
b58b4116 1412 exec_status_exit(&s->control_command->exec_status, pid, code, status);
a16e1123 1413
b708e7ce
LP
1414 if (s->control_command->ignore)
1415 success = true;
1416 }
1417
9e2f7c11 1418 log_debug("%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
b708e7ce 1419 s->failure = s->failure || !success;
034c6ed7 1420
a16e1123
LP
1421 if (s->control_command && s->control_command->command_next && success) {
1422 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
034c6ed7 1423 socket_run_next(s, success);
acbb0225 1424 } else {
a16e1123
LP
1425 s->control_command = NULL;
1426 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1427
034c6ed7
LP
1428 /* No further commands for this step, so let's figure
1429 * out what to do next */
5cb5a6ff 1430
a16e1123 1431 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
acbb0225 1432
034c6ed7
LP
1433 switch (s->state) {
1434
1435 case SOCKET_START_PRE:
1436 if (success)
acbb0225 1437 socket_enter_start_post(s);
034c6ed7 1438 else
80876c20 1439 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1440 break;
1441
1442 case SOCKET_START_POST:
1443 if (success)
e9af15c3 1444 socket_enter_listening(s);
034c6ed7
LP
1445 else
1446 socket_enter_stop_pre(s, false);
1447 break;
1448
1449 case SOCKET_STOP_PRE:
1450 case SOCKET_STOP_PRE_SIGTERM:
1451 case SOCKET_STOP_PRE_SIGKILL:
1452 socket_enter_stop_post(s, success);
1453 break;
1454
1455 case SOCKET_STOP_POST:
80876c20
LP
1456 case SOCKET_FINAL_SIGTERM:
1457 case SOCKET_FINAL_SIGKILL:
034c6ed7
LP
1458 socket_enter_dead(s, success);
1459 break;
1460
1461 default:
1462 assert_not_reached("Uh, control process died at wrong time.");
1463 }
1464 }
1465}
5cb5a6ff 1466
acbb0225 1467static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
87f0e418 1468 Socket *s = SOCKET(u);
5cb5a6ff 1469
034c6ed7
LP
1470 assert(s);
1471 assert(elapsed == 1);
acbb0225 1472 assert(w == &s->timer_watch);
034c6ed7
LP
1473
1474 switch (s->state) {
1475
1476 case SOCKET_START_PRE:
9e2f7c11 1477 log_warning("%s starting timed out. Terminating.", u->meta.id);
80876c20
LP
1478 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1479
034c6ed7 1480 case SOCKET_START_POST:
9e2f7c11 1481 log_warning("%s starting timed out. Stopping.", u->meta.id);
034c6ed7
LP
1482 socket_enter_stop_pre(s, false);
1483 break;
1484
1485 case SOCKET_STOP_PRE:
9e2f7c11 1486 log_warning("%s stopping timed out. Terminating.", u->meta.id);
034c6ed7
LP
1487 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1488 break;
1489
1490 case SOCKET_STOP_PRE_SIGTERM:
9e2f7c11 1491 log_warning("%s stopping timed out. Killing.", u->meta.id);
034c6ed7
LP
1492 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1493 break;
1494
1495 case SOCKET_STOP_PRE_SIGKILL:
9e2f7c11 1496 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
034c6ed7
LP
1497 socket_enter_stop_post(s, false);
1498 break;
1499
1500 case SOCKET_STOP_POST:
9e2f7c11 1501 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
80876c20 1502 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1503 break;
1504
80876c20 1505 case SOCKET_FINAL_SIGTERM:
9e2f7c11 1506 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
80876c20 1507 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
034c6ed7
LP
1508 break;
1509
80876c20 1510 case SOCKET_FINAL_SIGKILL:
18c78fb1 1511 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
034c6ed7
LP
1512 socket_enter_dead(s, false);
1513 break;
1514
1515 default:
1516 assert_not_reached("Timeout at wrong time.");
1517 }
5cb5a6ff
LP
1518}
1519
44d8db9e
LP
1520int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1521 int *rfds;
1522 unsigned rn_fds, k;
1523 SocketPort *p;
1524
1525 assert(s);
1526 assert(fds);
1527 assert(n_fds);
1528
1529 /* Called from the service code for requesting our fds */
1530
1531 rn_fds = 0;
1532 LIST_FOREACH(port, p, s->ports)
1533 if (p->fd >= 0)
1534 rn_fds++;
1535
1536 if (!(rfds = new(int, rn_fds)) < 0)
1537 return -ENOMEM;
1538
1539 k = 0;
1540 LIST_FOREACH(port, p, s->ports)
1541 if (p->fd >= 0)
1542 rfds[k++] = p->fd;
1543
1544 assert(k == rn_fds);
1545
1546 *fds = rfds;
1547 *n_fds = rn_fds;
1548
1549 return 0;
1550}
1551
ceee3d82
LP
1552void socket_notify_service_dead(Socket *s) {
1553 assert(s);
1554
6cf6bbc2
LP
1555 /* The service is dead. Dang!
1556 *
1557 * This is strictly for one-instance-for-all-connections
1558 * services. */
ceee3d82
LP
1559
1560 if (s->state == SOCKET_RUNNING) {
9e2f7c11 1561 log_debug("%s got notified about service death.", s->meta.id);
ceee3d82
LP
1562 socket_enter_listening(s);
1563 }
1564}
1565
6cf6bbc2
LP
1566void socket_connection_unref(Socket *s) {
1567 assert(s);
1568
1569 /* The service is dead. Yay!
1570 *
1571 * This is strictly for one-onstance-per-connection
1572 * services. */
1573
1574 assert(s->n_connections > 0);
1575 s->n_connections--;
1576
1577 log_debug("%s: One connection closed, %u left.", s->meta.id, s->n_connections);
1578}
1579
a16e1123
LP
1580static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1581 [SOCKET_DEAD] = "dead",
1582 [SOCKET_START_PRE] = "start-pre",
1583 [SOCKET_START_POST] = "start-post",
1584 [SOCKET_LISTENING] = "listening",
1585 [SOCKET_RUNNING] = "running",
1586 [SOCKET_STOP_PRE] = "stop-pre",
1587 [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1588 [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1589 [SOCKET_STOP_POST] = "stop-post",
1590 [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1591 [SOCKET_FINAL_SIGKILL] = "final-sigkill",
18c78fb1 1592 [SOCKET_MAINTENANCE] = "maintenance"
a16e1123
LP
1593};
1594
1595DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1596
1597static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1598 [SOCKET_EXEC_START_PRE] = "StartPre",
1599 [SOCKET_EXEC_START_POST] = "StartPost",
1600 [SOCKET_EXEC_STOP_PRE] = "StopPre",
1601 [SOCKET_EXEC_STOP_POST] = "StopPost"
1602};
1603
1604DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1605
87f0e418 1606const UnitVTable socket_vtable = {
5cb5a6ff
LP
1607 .suffix = ".socket",
1608
034c6ed7
LP
1609 .init = socket_init,
1610 .done = socket_done,
a16e1123
LP
1611 .load = socket_load,
1612
1613 .coldplug = socket_coldplug,
034c6ed7 1614
5cb5a6ff
LP
1615 .dump = socket_dump,
1616
542563ba
LP
1617 .start = socket_start,
1618 .stop = socket_stop,
5cb5a6ff 1619
a16e1123
LP
1620 .serialize = socket_serialize,
1621 .deserialize_item = socket_deserialize_item,
1622
5cb5a6ff 1623 .active_state = socket_active_state,
10a94420 1624 .sub_state_to_string = socket_sub_state_to_string,
5cb5a6ff 1625
6cf6bbc2
LP
1626 .check_gc = socket_check_gc,
1627
9152c765 1628 .fd_event = socket_fd_event,
034c6ed7 1629 .sigchld_event = socket_sigchld_event,
4139c1b2
LP
1630 .timer_event = socket_timer_event,
1631
1632 .bus_message_handler = bus_socket_message_handler
5cb5a6ff 1633};