]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/socket.c
snapshot: fix deserialization
[thirdparty/systemd.git] / src / socket.c
CommitLineData
5cb5a6ff
LP
1/*-*- Mode: C; c-basic-offset: 8 -*-*/
2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
83c60c9f
LP
22#include <sys/types.h>
23#include <sys/stat.h>
24#include <unistd.h>
25#include <errno.h>
26#include <fcntl.h>
f94ea366 27#include <sys/epoll.h>
034c6ed7 28#include <signal.h>
4f2d528d 29#include <arpa/inet.h>
83c60c9f 30
87f0e418 31#include "unit.h"
5cb5a6ff 32#include "socket.h"
83c60c9f 33#include "log.h"
23a177ef
LP
34#include "load-dropin.h"
35#include "load-fragment.h"
9e2f7c11 36#include "strv.h"
4f2d528d 37#include "unit-name.h"
4139c1b2 38#include "dbus-socket.h"
4fd5948e 39#include "missing.h"
a40eb732 40#include "special.h"
398ef8ba 41#include "bus-errors.h"
83c60c9f 42
acbb0225 43static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
87f0e418
LP
44 [SOCKET_DEAD] = UNIT_INACTIVE,
45 [SOCKET_START_PRE] = UNIT_ACTIVATING,
46 [SOCKET_START_POST] = UNIT_ACTIVATING,
47 [SOCKET_LISTENING] = UNIT_ACTIVE,
48 [SOCKET_RUNNING] = UNIT_ACTIVE,
49 [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
50 [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
51 [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
52 [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
80876c20
LP
53 [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
54 [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
032ff4af 55 [SOCKET_MAINTENANCE] = UNIT_MAINTENANCE
83c60c9f 56};
5cb5a6ff 57
a16e1123
LP
58static void socket_init(Unit *u) {
59 Socket *s = SOCKET(u);
60
61 assert(u);
62 assert(u->meta.load_state == UNIT_STUB);
63
a16e1123
LP
64 s->backlog = SOMAXCONN;
65 s->timeout_usec = DEFAULT_TIMEOUT_USEC;
66 s->directory_mode = 0755;
67 s->socket_mode = 0666;
68
6cf6bbc2
LP
69 s->max_connections = 64;
70
4fd5948e 71 s->priority = -1;
4fd5948e
LP
72 s->ip_tos = -1;
73 s->ip_ttl = -1;
4fd5948e 74 s->mark = -1;
4fd5948e 75
a16e1123
LP
76 exec_context_init(&s->exec_context);
77
78 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
79}
acbb0225 80
5e94833f
LP
81static void socket_unwatch_control_pid(Socket *s) {
82 assert(s);
83
84 if (s->control_pid <= 0)
85 return;
86
87 unit_unwatch_pid(UNIT(s), s->control_pid);
88 s->control_pid = 0;
89}
90
87f0e418
LP
91static void socket_done(Unit *u) {
92 Socket *s = SOCKET(u);
034c6ed7 93 SocketPort *p;
6cf6bbc2 94 Meta *i;
034c6ed7
LP
95
96 assert(s);
97
98 while ((p = s->ports)) {
99 LIST_REMOVE(SocketPort, port, s->ports, p);
100
a16e1123
LP
101 if (p->fd >= 0) {
102 unit_unwatch_fd(UNIT(s), &p->fd_watch);
103 close_nointr_nofail(p->fd);
104 }
105
034c6ed7
LP
106 free(p->path);
107 free(p);
108 }
109
110 exec_context_done(&s->exec_context);
e537352b 111 exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
034c6ed7
LP
112 s->control_command = NULL;
113
5e94833f 114 socket_unwatch_control_pid(s);
034c6ed7
LP
115
116 s->service = NULL;
117
acbb0225 118 free(s->bind_to_device);
e537352b 119 s->bind_to_device = NULL;
acbb0225
LP
120
121 unit_unwatch_timer(u, &s->timer_watch);
6cf6bbc2
LP
122
123 /* Make sure no service instance refers to us anymore. */
124 LIST_FOREACH(units_per_type, i, u->meta.manager->units_per_type[UNIT_SERVICE]) {
125 Service *service = (Service *) i;
126
127 if (service->socket == s)
128 service->socket = NULL;
129 }
5cb5a6ff
LP
130}
131
4f2d528d
LP
132static bool have_non_accept_socket(Socket *s) {
133 SocketPort *p;
134
135 assert(s);
136
137 if (!s->accept)
138 return true;
139
dd5ad9d4
LP
140 LIST_FOREACH(port, p, s->ports) {
141
142 if (p->type != SOCKET_SOCKET)
143 return true;
144
4f2d528d
LP
145 if (!socket_address_can_accept(&p->address))
146 return true;
dd5ad9d4 147 }
4f2d528d
LP
148
149 return false;
150}
151
152static int socket_verify(Socket *s) {
153 assert(s);
154
4cd1fbcc 155 if (s->meta.load_state != UNIT_LOADED)
4f2d528d
LP
156 return 0;
157
158 if (!s->ports) {
4cd1fbcc 159 log_error("%s lacks Listen setting. Refusing.", s->meta.id);
4f2d528d
LP
160 return -EINVAL;
161 }
162
6cf6bbc2 163 if (s->accept && s->max_connections <= 0) {
4d0e5dbd
LP
164 log_error("%s's MaxConnection setting too small. Refusing.", s->meta.id);
165 return -EINVAL;
166 }
167
2e22afe9 168 if (s->exec_context.pam_name && s->exec_context.kill_mode != KILL_CONTROL_GROUP) {
4d0e5dbd 169 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", s->meta.id);
6cf6bbc2
LP
170 return -EINVAL;
171 }
172
4f2d528d
LP
173 return 0;
174}
175
6e2ef85b
LP
176static bool socket_needs_mount(Socket *s, const char *prefix) {
177 SocketPort *p;
178
179 assert(s);
180
181 LIST_FOREACH(port, p, s->ports) {
182
183 if (p->type == SOCKET_SOCKET) {
184 if (socket_address_needs_mount(&p->address, prefix))
185 return true;
186 } else {
187 assert(p->type == SOCKET_FIFO);
188 if (path_startswith(p->path, prefix))
189 return true;
190 }
191 }
192
193 return false;
194}
195
196int socket_add_one_mount_link(Socket *s, Mount *m) {
197 int r;
198
199 assert(s);
200 assert(m);
201
202 if (s->meta.load_state != UNIT_LOADED ||
203 m->meta.load_state != UNIT_LOADED)
204 return 0;
205
206 if (!socket_needs_mount(s, m->where))
207 return 0;
208
2c966c03 209 if ((r = unit_add_two_dependencies(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true)) < 0)
6e2ef85b
LP
210 return r;
211
212 return 0;
213}
214
215static int socket_add_mount_links(Socket *s) {
216 Meta *other;
217 int r;
218
219 assert(s);
220
221 LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
222 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
223 return r;
224
225 return 0;
226}
227
228static int socket_add_device_link(Socket *s) {
229 char *t;
230 int r;
231
232 assert(s);
233
234 if (!s->bind_to_device)
235 return 0;
236
237 if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
238 return -ENOMEM;
239
240 r = unit_add_node_link(UNIT(s), t, false);
241 free(t);
242
243 return r;
244}
245
a40eb732
LP
246static int socket_add_default_dependencies(Socket *s) {
247 int r;
248 assert(s);
249
250 if (s->meta.manager->running_as == MANAGER_SYSTEM)
251 if ((r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true)) < 0)
252 return r;
253
254 return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
255}
256
e537352b
LP
257static int socket_load(Unit *u) {
258 Socket *s = SOCKET(u);
259 int r;
44d8db9e 260
e537352b
LP
261 assert(u);
262 assert(u->meta.load_state == UNIT_STUB);
44d8db9e 263
e537352b 264 if ((r = unit_load_fragment_and_dropin(u)) < 0)
23a177ef 265 return r;
44d8db9e 266
23a177ef 267 /* This is a new unit? Then let's add in some extras */
e537352b 268 if (u->meta.load_state == UNIT_LOADED) {
44d8db9e 269
4f2d528d 270 if (have_non_accept_socket(s)) {
25366e09 271 if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)) < 0)
4f2d528d 272 return r;
23a177ef 273
701cc384 274 if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
4f2d528d
LP
275 return r;
276 }
44d8db9e 277
6e2ef85b
LP
278 if ((r = socket_add_mount_links(s)) < 0)
279 return r;
280
281 if ((r = socket_add_device_link(s)) < 0)
282 return r;
283
23a177ef
LP
284 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
285 return r;
286
287 if ((r = unit_add_default_cgroup(u)) < 0)
288 return r;
a40eb732
LP
289
290 if (s->meta.default_dependencies)
291 if ((r = socket_add_default_dependencies(s)) < 0)
292 return r;
23a177ef
LP
293 }
294
4f2d528d 295 return socket_verify(s);
44d8db9e
LP
296}
297
542563ba
LP
298static const char* listen_lookup(int type) {
299
300 if (type == SOCK_STREAM)
301 return "ListenStream";
302 else if (type == SOCK_DGRAM)
303 return "ListenDatagram";
304 else if (type == SOCK_SEQPACKET)
305 return "ListenSequentialPacket";
306
034c6ed7 307 assert_not_reached("Unknown socket type");
542563ba
LP
308 return NULL;
309}
310
87f0e418 311static void socket_dump(Unit *u, FILE *f, const char *prefix) {
5cb5a6ff 312
5cb5a6ff 313 SocketExecCommand c;
87f0e418 314 Socket *s = SOCKET(u);
542563ba 315 SocketPort *p;
82ba9f08
LP
316 const char *prefix2;
317 char *p2;
5cb5a6ff
LP
318
319 assert(s);
fa068367 320 assert(f);
5cb5a6ff 321
82ba9f08
LP
322 p2 = strappend(prefix, "\t");
323 prefix2 = p2 ? p2 : prefix;
c43d20a0 324
5cb5a6ff
LP
325 fprintf(f,
326 "%sSocket State: %s\n"
542563ba 327 "%sBindIPv6Only: %s\n"
b5a0699f
LP
328 "%sBacklog: %u\n"
329 "%sSocketMode: %04o\n"
4fd5948e
LP
330 "%sDirectoryMode: %04o\n"
331 "%sKeepAlive: %s\n"
332 "%sFreeBind: %s\n",
a16e1123 333 prefix, socket_state_to_string(s->state),
c0120d99 334 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
b5a0699f
LP
335 prefix, s->backlog,
336 prefix, s->socket_mode,
4fd5948e
LP
337 prefix, s->directory_mode,
338 prefix, yes_no(s->keep_alive),
339 prefix, yes_no(s->free_bind));
542563ba 340
70123e68
LP
341 if (s->control_pid > 0)
342 fprintf(f,
bb00e604
LP
343 "%sControl PID: %lu\n",
344 prefix, (unsigned long) s->control_pid);
70123e68 345
acbb0225
LP
346 if (s->bind_to_device)
347 fprintf(f,
348 "%sBindToDevice: %s\n",
349 prefix, s->bind_to_device);
350
4f2d528d
LP
351 if (s->accept)
352 fprintf(f,
6cf6bbc2
LP
353 "%sAccepted: %u\n"
354 "%sNConnections: %u\n"
355 "%sMaxConnections: %u\n",
356 prefix, s->n_accepted,
357 prefix, s->n_connections,
358 prefix, s->max_connections);
4f2d528d 359
4fd5948e
LP
360 if (s->priority >= 0)
361 fprintf(f,
362 "%sPriority: %i\n",
363 prefix, s->priority);
364
365 if (s->receive_buffer > 0)
366 fprintf(f,
367 "%sReceiveBuffer: %zu\n",
368 prefix, s->receive_buffer);
369
370 if (s->send_buffer > 0)
371 fprintf(f,
372 "%sSendBuffer: %zu\n",
373 prefix, s->send_buffer);
374
375 if (s->ip_tos >= 0)
376 fprintf(f,
377 "%sIPTOS: %i\n",
378 prefix, s->ip_tos);
379
380 if (s->ip_ttl >= 0)
381 fprintf(f,
382 "%sIPTTL: %i\n",
383 prefix, s->ip_ttl);
384
385 if (s->pipe_size > 0)
386 fprintf(f,
387 "%sPipeSize: %zu\n",
388 prefix, s->pipe_size);
389
390 if (s->mark >= 0)
391 fprintf(f,
392 "%sMark: %i\n",
393 prefix, s->mark);
394
034c6ed7 395 LIST_FOREACH(port, p, s->ports) {
5cb5a6ff 396
542563ba
LP
397 if (p->type == SOCKET_SOCKET) {
398 const char *t;
399 int r;
400 char *k;
401
402 if ((r = socket_address_print(&p->address, &k)) < 0)
403 t = strerror(-r);
404 else
405 t = k;
406
407 fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
408 free(k);
409 } else
410 fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
411 }
5cb5a6ff
LP
412
413 exec_context_dump(&s->exec_context, f, prefix);
414
e537352b 415 for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
c43d20a0
LP
416 if (!s->exec_command[c])
417 continue;
5cb5a6ff 418
40d50879 419 fprintf(f, "%s-> %s:\n",
a16e1123 420 prefix, socket_exec_command_to_string(c));
c43d20a0
LP
421
422 exec_command_dump_list(s->exec_command[c], f, prefix2);
5cb5a6ff 423 }
c43d20a0 424
82ba9f08 425 free(p2);
5cb5a6ff
LP
426}
427
4f2d528d
LP
428static int instance_from_socket(int fd, unsigned nr, char **instance) {
429 socklen_t l;
430 char *r;
431 union {
432 struct sockaddr sa;
433 struct sockaddr_un un;
434 struct sockaddr_in in;
435 struct sockaddr_in6 in6;
436 struct sockaddr_storage storage;
437 } local, remote;
438
439 assert(fd >= 0);
440 assert(instance);
441
442 l = sizeof(local);
443 if (getsockname(fd, &local.sa, &l) < 0)
444 return -errno;
445
446 l = sizeof(remote);
447 if (getpeername(fd, &remote.sa, &l) < 0)
448 return -errno;
449
450 switch (local.sa.sa_family) {
451
452 case AF_INET: {
453 uint32_t
454 a = ntohl(local.in.sin_addr.s_addr),
455 b = ntohl(remote.in.sin_addr.s_addr);
456
457 if (asprintf(&r,
a16e1123 458 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
4f2d528d
LP
459 nr,
460 a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
461 ntohs(local.in.sin_port),
462 b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
463 ntohs(remote.in.sin_port)) < 0)
464 return -ENOMEM;
465
466 break;
467 }
468
469 case AF_INET6: {
2b061f5a
LP
470 static const char ipv4_prefix[] = {
471 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
472 };
473
474 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
475 memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
476 const uint8_t
477 *a = local.in6.sin6_addr.s6_addr+12,
478 *b = remote.in6.sin6_addr.s6_addr+12;
479
480 if (asprintf(&r,
481 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
482 nr,
483 a[0], a[1], a[2], a[3],
484 ntohs(local.in6.sin6_port),
485 b[0], b[1], b[2], b[3],
486 ntohs(remote.in6.sin6_port)) < 0)
487 return -ENOMEM;
488 } else {
489 char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
490
491 if (asprintf(&r,
492 "%u-%s:%u-%s:%u",
493 nr,
494 inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
495 ntohs(local.in6.sin6_port),
496 inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
497 ntohs(remote.in6.sin6_port)) < 0)
498 return -ENOMEM;
499 }
4f2d528d
LP
500
501 break;
502 }
503
504 case AF_UNIX: {
505 struct ucred ucred;
506
507 l = sizeof(ucred);
508 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
509 return -errno;
510
511 if (asprintf(&r,
bb00e604 512 "%u-%lu-%lu",
4f2d528d 513 nr,
bb00e604
LP
514 (unsigned long) ucred.pid,
515 (unsigned long) ucred.uid) < 0)
4f2d528d
LP
516 return -ENOMEM;
517
518 break;
519 }
520
521 default:
522 assert_not_reached("Unhandled socket type.");
523 }
524
525 *instance = r;
526 return 0;
527}
528
034c6ed7 529static void socket_close_fds(Socket *s) {
83c60c9f
LP
530 SocketPort *p;
531
532 assert(s);
533
034c6ed7 534 LIST_FOREACH(port, p, s->ports) {
83c60c9f
LP
535 if (p->fd < 0)
536 continue;
537
acbb0225 538 unit_unwatch_fd(UNIT(s), &p->fd_watch);
a16e1123
LP
539 close_nointr_nofail(p->fd);
540
541 /* One little note: we should never delete any sockets
542 * in the file system here! After all some other
543 * process we spawned might still have a reference of
544 * this fd and wants to continue to use it. Therefore
545 * we delete sockets in the file system before we
546 * create a new one, not after we stopped using
547 * one! */
9152c765 548
83c60c9f
LP
549 p->fd = -1;
550 }
551}
552
4fd5948e
LP
553static void socket_apply_socket_options(Socket *s, int fd) {
554 assert(s);
555 assert(fd >= 0);
556
557 if (s->keep_alive) {
558 int b = s->keep_alive;
559 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &b, sizeof(b)) < 0)
560 log_warning("SO_KEEPALIVE failed: %m");
561 }
562
563 if (s->priority >= 0)
564 if (setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &s->priority, sizeof(s->priority)) < 0)
565 log_warning("SO_PRIORITY failed: %m");
566
567 if (s->receive_buffer > 0) {
568 int value = (int) s->receive_buffer;
569 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &value, sizeof(value)) < 0)
570 log_warning("SO_RCVBUF failed: %m");
571 }
572
573 if (s->send_buffer > 0) {
574 int value = (int) s->send_buffer;
575 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &value, sizeof(value)) < 0)
576 log_warning("SO_SNDBUF failed: %m");
577 }
578
579 if (s->mark >= 0)
580 if (setsockopt(fd, SOL_SOCKET, SO_MARK, &s->mark, sizeof(s->mark)) < 0)
581 log_warning("SO_MARK failed: %m");
582
583 if (s->ip_tos >= 0)
584 if (setsockopt(fd, IPPROTO_IP, IP_TOS, &s->ip_tos, sizeof(s->ip_tos)) < 0)
585 log_warning("IP_TOS failed: %m");
586
46925ac5
LP
587 if (s->ip_ttl >= 0) {
588 int r, x;
589
590 r = setsockopt(fd, IPPROTO_IP, IP_TTL, &s->ip_ttl, sizeof(s->ip_ttl));
591 x = setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &s->ip_ttl, sizeof(s->ip_ttl));
592
593 if (r < 0 && x < 0)
594 log_warning("IP_TTL/IPV6_UNICAST_HOPS failed: %m");
595 }
4fd5948e
LP
596}
597
598static void socket_apply_pipe_options(Socket *s, int fd) {
599 assert(s);
600 assert(fd >= 0);
601
602 if (s->pipe_size > 0)
603 if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
604 log_warning("F_SETPIPE_SZ: %m");
605}
606
034c6ed7 607static int socket_open_fds(Socket *s) {
83c60c9f
LP
608 SocketPort *p;
609 int r;
610
611 assert(s);
612
034c6ed7 613 LIST_FOREACH(port, p, s->ports) {
83c60c9f 614
034c6ed7
LP
615 if (p->fd >= 0)
616 continue;
83c60c9f
LP
617
618 if (p->type == SOCKET_SOCKET) {
619
b5a0699f
LP
620 if ((r = socket_address_listen(
621 &p->address,
622 s->backlog,
623 s->bind_ipv6_only,
624 s->bind_to_device,
4fd5948e 625 s->free_bind,
b5a0699f
LP
626 s->directory_mode,
627 s->socket_mode,
628 &p->fd)) < 0)
83c60c9f
LP
629 goto rollback;
630
4fd5948e
LP
631 socket_apply_socket_options(s, p->fd);
632
83c60c9f
LP
633 } else {
634 struct stat st;
635 assert(p->type == SOCKET_FIFO);
636
8cb45bf8
LP
637 mkdir_parents(p->path, s->directory_mode);
638
639 if (mkfifo(p->path, s->socket_mode) < 0 && errno != EEXIST) {
83c60c9f
LP
640 r = -errno;
641 goto rollback;
642 }
643
644 if ((p->fd = open(p->path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
645 r = -errno;
646 goto rollback;
647 }
648
649 if (fstat(p->fd, &st) < 0) {
650 r = -errno;
651 goto rollback;
652 }
653
654 /* FIXME verify user, access mode */
655
656 if (!S_ISFIFO(st.st_mode)) {
657 r = -EEXIST;
658 goto rollback;
659 }
4fd5948e
LP
660
661 socket_apply_pipe_options(s, p->fd);
83c60c9f 662 }
034c6ed7
LP
663 }
664
665 return 0;
666
667rollback:
668 socket_close_fds(s);
669 return r;
670}
671
672static void socket_unwatch_fds(Socket *s) {
673 SocketPort *p;
9152c765 674
034c6ed7
LP
675 assert(s);
676
677 LIST_FOREACH(port, p, s->ports) {
678 if (p->fd < 0)
679 continue;
680
acbb0225 681 unit_unwatch_fd(UNIT(s), &p->fd_watch);
83c60c9f 682 }
034c6ed7
LP
683}
684
685static int socket_watch_fds(Socket *s) {
686 SocketPort *p;
687 int r;
688
689 assert(s);
83c60c9f 690
034c6ed7
LP
691 LIST_FOREACH(port, p, s->ports) {
692 if (p->fd < 0)
693 continue;
694
cabab516 695 p->fd_watch.socket_accept =
4f2d528d 696 s->accept &&
dd5ad9d4 697 p->type == SOCKET_SOCKET &&
4f2d528d
LP
698 socket_address_can_accept(&p->address);
699
f94ea366 700 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
034c6ed7
LP
701 goto fail;
702 }
83c60c9f 703
542563ba 704 return 0;
83c60c9f 705
034c6ed7
LP
706fail:
707 socket_unwatch_fds(s);
708 return r;
709}
710
711static void socket_set_state(Socket *s, SocketState state) {
712 SocketState old_state;
713 assert(s);
714
715 old_state = s->state;
716 s->state = state;
717
718 if (state != SOCKET_START_PRE &&
719 state != SOCKET_START_POST &&
720 state != SOCKET_STOP_PRE &&
721 state != SOCKET_STOP_PRE_SIGTERM &&
722 state != SOCKET_STOP_PRE_SIGKILL &&
723 state != SOCKET_STOP_POST &&
80876c20
LP
724 state != SOCKET_FINAL_SIGTERM &&
725 state != SOCKET_FINAL_SIGKILL) {
acbb0225 726 unit_unwatch_timer(UNIT(s), &s->timer_watch);
5e94833f 727 socket_unwatch_control_pid(s);
034c6ed7 728 s->control_command = NULL;
a16e1123 729 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
e537352b 730 }
034c6ed7 731
a16e1123
LP
732 if (state != SOCKET_LISTENING)
733 socket_unwatch_fds(s);
734
034c6ed7
LP
735 if (state != SOCKET_START_POST &&
736 state != SOCKET_LISTENING &&
737 state != SOCKET_RUNNING &&
738 state != SOCKET_STOP_PRE &&
739 state != SOCKET_STOP_PRE_SIGTERM &&
740 state != SOCKET_STOP_PRE_SIGKILL)
741 socket_close_fds(s);
742
e537352b 743 if (state != old_state)
40d50879 744 log_debug("%s changed %s -> %s",
a16e1123
LP
745 s->meta.id,
746 socket_state_to_string(old_state),
747 socket_state_to_string(state));
acbb0225
LP
748
749 unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
034c6ed7
LP
750}
751
a16e1123
LP
752static int socket_coldplug(Unit *u) {
753 Socket *s = SOCKET(u);
754 int r;
755
756 assert(s);
757 assert(s->state == SOCKET_DEAD);
758
759 if (s->deserialized_state != s->state) {
760
761 if (s->deserialized_state == SOCKET_START_PRE ||
762 s->deserialized_state == SOCKET_START_POST ||
763 s->deserialized_state == SOCKET_STOP_PRE ||
764 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
765 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
766 s->deserialized_state == SOCKET_STOP_POST ||
767 s->deserialized_state == SOCKET_FINAL_SIGTERM ||
768 s->deserialized_state == SOCKET_FINAL_SIGKILL) {
769
770 if (s->control_pid <= 0)
771 return -EBADMSG;
772
773 if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
774 return r;
775
776 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
777 return r;
778 }
779
780 if (s->deserialized_state == SOCKET_START_POST ||
781 s->deserialized_state == SOCKET_LISTENING ||
782 s->deserialized_state == SOCKET_RUNNING ||
783 s->deserialized_state == SOCKET_STOP_PRE ||
784 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
785 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
786 if ((r = socket_open_fds(s)) < 0)
787 return r;
788
789 if (s->deserialized_state == SOCKET_LISTENING)
790 if ((r = socket_watch_fds(s)) < 0)
791 return r;
792
793 socket_set_state(s, s->deserialized_state);
794 }
795
796 return 0;
797}
798
e537352b 799static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
034c6ed7
LP
800 pid_t pid;
801 int r;
9e2f7c11 802 char **argv;
034c6ed7
LP
803
804 assert(s);
805 assert(c);
806 assert(_pid);
807
e537352b
LP
808 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
809 goto fail;
034c6ed7 810
9e2f7c11
LP
811 if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
812 r = -ENOMEM;
813 goto fail;
814 }
815
816 r = exec_spawn(c,
817 argv,
818 &s->exec_context,
819 NULL, 0,
1137a57c 820 s->meta.manager->environment,
9e2f7c11
LP
821 true,
822 true,
1e3ad081 823 true,
4cd1fbcc
LP
824 s->meta.manager->confirm_spawn,
825 s->meta.cgroup_bondings,
9e2f7c11
LP
826 &pid);
827
828 strv_free(argv);
829 if (r < 0)
034c6ed7
LP
830 goto fail;
831
87f0e418 832 if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
034c6ed7
LP
833 /* FIXME: we need to do something here */
834 goto fail;
83c60c9f 835
034c6ed7
LP
836 *_pid = pid;
837
838 return 0;
839
840fail:
e537352b 841 unit_unwatch_timer(UNIT(s), &s->timer_watch);
83c60c9f
LP
842
843 return r;
542563ba
LP
844}
845
034c6ed7
LP
846static void socket_enter_dead(Socket *s, bool success) {
847 assert(s);
848
849 if (!success)
850 s->failure = true;
851
18c78fb1 852 socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
034c6ed7
LP
853}
854
80876c20
LP
855static void socket_enter_signal(Socket *s, SocketState state, bool success);
856
034c6ed7
LP
857static void socket_enter_stop_post(Socket *s, bool success) {
858 int r;
859 assert(s);
860
861 if (!success)
862 s->failure = true;
863
5e94833f
LP
864 socket_unwatch_control_pid(s);
865
a16e1123
LP
866 s->control_command_id = SOCKET_EXEC_STOP_POST;
867
80876c20 868 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
e537352b 869 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
870 goto fail;
871
80876c20
LP
872 socket_set_state(s, SOCKET_STOP_POST);
873 } else
874 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
034c6ed7
LP
875
876 return;
877
878fail:
6cf6bbc2 879 log_warning("%s failed to run 'stop-post' task: %s", s->meta.id, strerror(-r));
80876c20 880 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
881}
882
883static void socket_enter_signal(Socket *s, SocketState state, bool success) {
884 int r;
80876c20 885 bool sent = false;
034c6ed7
LP
886
887 assert(s);
888
889 if (!success)
890 s->failure = true;
891
2e22afe9
LP
892 if (s->exec_context.kill_mode != KILL_NONE) {
893 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? s->exec_context.kill_signal : SIGKILL;
034c6ed7 894
2e22afe9 895 if (s->exec_context.kill_mode == KILL_CONTROL_GROUP) {
50159e6a 896
4cd1fbcc 897 if ((r = cgroup_bonding_kill_list(s->meta.cgroup_bondings, sig)) < 0) {
50159e6a
LP
898 if (r != -EAGAIN && r != -ESRCH)
899 goto fail;
900 } else
901 sent = true;
034c6ed7 902 }
50159e6a 903
80876c20 904 if (!sent && s->control_pid > 0)
2e22afe9 905 if (kill(s->exec_context.kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
50159e6a
LP
906 r = -errno;
907 goto fail;
908 }
d6ea93e3 909 }
034c6ed7 910
e93bc5a6 911 if (sent && s->control_pid > 0) {
80876c20
LP
912 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
913 goto fail;
d6ea93e3 914
80876c20
LP
915 socket_set_state(s, state);
916 } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
917 socket_enter_stop_post(s, true);
918 else
034c6ed7
LP
919 socket_enter_dead(s, true);
920
921 return;
922
923fail:
9e2f7c11 924 log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
034c6ed7
LP
925
926 if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
927 socket_enter_stop_post(s, false);
928 else
929 socket_enter_dead(s, false);
930}
931
932static void socket_enter_stop_pre(Socket *s, bool success) {
933 int r;
934 assert(s);
935
936 if (!success)
937 s->failure = true;
938
5e94833f
LP
939 socket_unwatch_control_pid(s);
940
a16e1123
LP
941 s->control_command_id = SOCKET_EXEC_STOP_PRE;
942
80876c20 943 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
e537352b 944 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
945 goto fail;
946
80876c20
LP
947 socket_set_state(s, SOCKET_STOP_PRE);
948 } else
034c6ed7
LP
949 socket_enter_stop_post(s, true);
950
951 return;
952
953fail:
6cf6bbc2 954 log_warning("%s failed to run 'stop-pre' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
955 socket_enter_stop_post(s, false);
956}
957
e9af15c3
LP
958static void socket_enter_listening(Socket *s) {
959 int r;
960 assert(s);
961
962 if ((r = socket_watch_fds(s)) < 0) {
9e2f7c11 963 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
e9af15c3
LP
964 goto fail;
965 }
966
967 socket_set_state(s, SOCKET_LISTENING);
968 return;
969
970fail:
971 socket_enter_stop_pre(s, false);
972}
973
034c6ed7
LP
974static void socket_enter_start_post(Socket *s) {
975 int r;
976 assert(s);
977
e9af15c3 978 if ((r = socket_open_fds(s)) < 0) {
9e2f7c11 979 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
034c6ed7
LP
980 goto fail;
981 }
982
5e94833f
LP
983 socket_unwatch_control_pid(s);
984
a16e1123
LP
985 s->control_command_id = SOCKET_EXEC_START_POST;
986
80876c20 987 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
e537352b 988 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
6cf6bbc2 989 log_warning("%s failed to run 'start-post' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
990 goto fail;
991 }
992
80876c20
LP
993 socket_set_state(s, SOCKET_START_POST);
994 } else
e9af15c3 995 socket_enter_listening(s);
034c6ed7
LP
996
997 return;
998
999fail:
1000 socket_enter_stop_pre(s, false);
1001}
1002
1003static void socket_enter_start_pre(Socket *s) {
1004 int r;
1005 assert(s);
1006
5e94833f
LP
1007 socket_unwatch_control_pid(s);
1008
a16e1123
LP
1009 s->control_command_id = SOCKET_EXEC_START_PRE;
1010
80876c20 1011 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
e537352b 1012 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
1013 goto fail;
1014
80876c20
LP
1015 socket_set_state(s, SOCKET_START_PRE);
1016 } else
034c6ed7
LP
1017 socket_enter_start_post(s);
1018
1019 return;
1020
1021fail:
6cf6bbc2 1022 log_warning("%s failed to run 'start-pre' task: %s", s->meta.id, strerror(-r));
034c6ed7
LP
1023 socket_enter_dead(s, false);
1024}
1025
4f2d528d 1026static void socket_enter_running(Socket *s, int cfd) {
034c6ed7 1027 int r;
398ef8ba 1028 DBusError error;
034c6ed7
LP
1029
1030 assert(s);
398ef8ba 1031 dbus_error_init(&error);
034c6ed7 1032
4f2d528d 1033 if (cfd < 0) {
398ef8ba 1034 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, &error, NULL)) < 0)
4f2d528d
LP
1035 goto fail;
1036
1037 socket_set_state(s, SOCKET_RUNNING);
1038 } else {
1039 Unit *u;
b4f10a5e 1040 char *prefix, *instance = NULL, *name;
4f2d528d 1041
6cf6bbc2
LP
1042 if (s->n_connections >= s->max_connections) {
1043 log_warning("Too many incoming connections (%u)", s->n_connections);
1044 close_nointr_nofail(cfd);
1045 return;
1046 }
1047
b6dbbe1c 1048 if ((r = instance_from_socket(cfd, s->n_accepted++, &instance)) < 0)
4f2d528d
LP
1049 goto fail;
1050
4cd1fbcc 1051 if (!(prefix = unit_name_to_prefix(s->meta.id))) {
4f2d528d
LP
1052 free(instance);
1053 r = -ENOMEM;
1054 goto fail;
1055 }
1056
1057 name = unit_name_build(prefix, instance, ".service");
1058 free(prefix);
1059 free(instance);
1060
b6dbbe1c 1061 if (!name) {
4f2d528d 1062 r = -ENOMEM;
b6dbbe1c
LP
1063 goto fail;
1064 }
4f2d528d 1065
398ef8ba 1066 r = manager_load_unit(s->meta.manager, name, NULL, NULL, &u);
4f2d528d
LP
1067 free(name);
1068
1069 if (r < 0)
1070 goto fail;
1071
6cf6bbc2 1072 if ((r = service_set_socket_fd(SERVICE(u), cfd, s)) < 0)
4f2d528d
LP
1073 goto fail;
1074
1075 cfd = -1;
1076
6cf6bbc2
LP
1077 s->n_connections ++;
1078
398ef8ba 1079 if ((r = manager_add_job(u->meta.manager, JOB_START, u, JOB_REPLACE, true, &error, NULL)) < 0)
4f2d528d
LP
1080 goto fail;
1081 }
034c6ed7 1082
034c6ed7
LP
1083 return;
1084
1085fail:
398ef8ba 1086 log_warning("%s failed to queue socket startup job: %s", s->meta.id, bus_error(&error, r));
80876c20 1087 socket_enter_stop_pre(s, false);
4f2d528d
LP
1088
1089 if (cfd >= 0)
1090 close_nointr_nofail(cfd);
398ef8ba
LP
1091
1092 dbus_error_free(&error);
034c6ed7
LP
1093}
1094
1095static void socket_run_next(Socket *s, bool success) {
1096 int r;
1097
1098 assert(s);
1099 assert(s->control_command);
1100 assert(s->control_command->command_next);
1101
1102 if (!success)
1103 s->failure = true;
1104
5e94833f
LP
1105 socket_unwatch_control_pid(s);
1106
034c6ed7
LP
1107 s->control_command = s->control_command->command_next;
1108
e537352b 1109 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
034c6ed7
LP
1110 goto fail;
1111
1112 return;
1113
1114fail:
6cf6bbc2 1115 log_warning("%s failed to run next task: %s", s->meta.id, strerror(-r));
80876c20
LP
1116
1117 if (s->state == SOCKET_START_POST)
1118 socket_enter_stop_pre(s, false);
034c6ed7
LP
1119 else if (s->state == SOCKET_STOP_POST)
1120 socket_enter_dead(s, false);
1121 else
80876c20 1122 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1123}
1124
87f0e418
LP
1125static int socket_start(Unit *u) {
1126 Socket *s = SOCKET(u);
83c60c9f
LP
1127
1128 assert(s);
1129
034c6ed7
LP
1130 /* We cannot fulfill this request right now, try again later
1131 * please! */
1132 if (s->state == SOCKET_STOP_PRE ||
1133 s->state == SOCKET_STOP_PRE_SIGKILL ||
1134 s->state == SOCKET_STOP_PRE_SIGTERM ||
1135 s->state == SOCKET_STOP_POST ||
80876c20
LP
1136 s->state == SOCKET_FINAL_SIGTERM ||
1137 s->state == SOCKET_FINAL_SIGKILL)
034c6ed7
LP
1138 return -EAGAIN;
1139
83c60c9f
LP
1140 if (s->state == SOCKET_START_PRE ||
1141 s->state == SOCKET_START_POST)
034c6ed7 1142 return 0;
83c60c9f 1143
034c6ed7 1144 /* Cannot run this without the service being around */
4f2d528d
LP
1145 if (s->service) {
1146 if (s->service->meta.load_state != UNIT_LOADED)
1147 return -ENOENT;
1148
1149 /* If the service is alredy actvie we cannot start the
1150 * socket */
1151 if (s->service->state != SERVICE_DEAD &&
18c78fb1 1152 s->service->state != SERVICE_MAINTENANCE &&
4f2d528d
LP
1153 s->service->state != SERVICE_AUTO_RESTART)
1154 return -EBUSY;
1155 }
e537352b 1156
18c78fb1 1157 assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
83c60c9f 1158
034c6ed7
LP
1159 s->failure = false;
1160 socket_enter_start_pre(s);
1161 return 0;
1162}
83c60c9f 1163
87f0e418
LP
1164static int socket_stop(Unit *u) {
1165 Socket *s = SOCKET(u);
034c6ed7
LP
1166
1167 assert(s);
1168
1169 /* We cannot fulfill this request right now, try again later
1170 * please! */
1171 if (s->state == SOCKET_START_PRE ||
1172 s->state == SOCKET_START_POST)
1173 return -EAGAIN;
83c60c9f 1174
e537352b
LP
1175 /* Already on it */
1176 if (s->state == SOCKET_STOP_PRE ||
1177 s->state == SOCKET_STOP_PRE_SIGTERM ||
1178 s->state == SOCKET_STOP_PRE_SIGKILL ||
1179 s->state == SOCKET_STOP_POST ||
80876c20
LP
1180 s->state == SOCKET_FINAL_SIGTERM ||
1181 s->state == SOCKET_FINAL_SIGTERM)
e537352b
LP
1182 return 0;
1183
034c6ed7 1184 assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
83c60c9f 1185
034c6ed7 1186 socket_enter_stop_pre(s, true);
542563ba
LP
1187 return 0;
1188}
1189
a16e1123
LP
1190static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1191 Socket *s = SOCKET(u);
1192 SocketPort *p;
1193 int r;
1194
1195 assert(u);
1196 assert(f);
1197 assert(fds);
1198
1199 unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1200 unit_serialize_item(u, f, "failure", yes_no(s->failure));
1201 unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1202
1203 if (s->control_pid > 0)
5925dd3c 1204 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) s->control_pid);
a16e1123
LP
1205
1206 if (s->control_command_id >= 0)
1207 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1208
1209 LIST_FOREACH(port, p, s->ports) {
1210 int copy;
1211
1212 if (p->fd < 0)
1213 continue;
1214
1215 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1216 return copy;
1217
1218 if (p->type == SOCKET_SOCKET) {
1219 char *t;
1220
1221 if ((r = socket_address_print(&p->address, &t)) < 0)
1222 return r;
1223
27ca8d7a 1224 unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
a16e1123
LP
1225 free(t);
1226 } else {
1227 assert(p->type == SOCKET_FIFO);
1228 unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1229 }
1230 }
1231
1232 return 0;
1233}
1234
1235static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1236 Socket *s = SOCKET(u);
1237 int r;
1238
1239 assert(u);
1240 assert(key);
1241 assert(value);
1242 assert(fds);
1243
1244 if (streq(key, "state")) {
1245 SocketState state;
1246
1247 if ((state = socket_state_from_string(value)) < 0)
1248 log_debug("Failed to parse state value %s", value);
1249 else
1250 s->deserialized_state = state;
1251 } else if (streq(key, "failure")) {
1252 int b;
1253
1254 if ((b = parse_boolean(value)) < 0)
1255 log_debug("Failed to parse failure value %s", value);
1256 else
1257 s->failure = b || s->failure;
1258
1259 } else if (streq(key, "n-accepted")) {
1260 unsigned k;
1261
1262 if ((r = safe_atou(value, &k)) < 0)
1263 log_debug("Failed to parse n-accepted value %s", value);
1264 else
1265 s->n_accepted += k;
1266 } else if (streq(key, "control-pid")) {
5925dd3c 1267 pid_t pid;
a16e1123 1268
5925dd3c 1269 if ((r = parse_pid(value, &pid)) < 0)
a16e1123
LP
1270 log_debug("Failed to parse control-pid value %s", value);
1271 else
5925dd3c 1272 s->control_pid = pid;
a16e1123
LP
1273 } else if (streq(key, "control-command")) {
1274 SocketExecCommand id;
1275
1276 if ((id = socket_exec_command_from_string(value)) < 0)
1277 log_debug("Failed to parse exec-command value %s", value);
1278 else {
1279 s->control_command_id = id;
1280 s->control_command = s->exec_command[id];
1281 }
1282 } else if (streq(key, "fifo")) {
1283 int fd, skip = 0;
1284 SocketPort *p;
1285
1286 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1287 log_debug("Failed to parse fifo value %s", value);
1288 else {
1289
1290 LIST_FOREACH(port, p, s->ports)
1291 if (streq(p->path, value+skip))
1292 break;
1293
1294 if (p) {
1295 if (p->fd >= 0)
1296 close_nointr_nofail(p->fd);
1297 p->fd = fdset_remove(fds, fd);
1298 }
1299 }
1300
1301 } else if (streq(key, "socket")) {
27ca8d7a 1302 int fd, type, skip = 0;
a16e1123
LP
1303 SocketPort *p;
1304
27ca8d7a 1305 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
a16e1123
LP
1306 log_debug("Failed to parse socket value %s", value);
1307 else {
1308
1309 LIST_FOREACH(port, p, s->ports)
27ca8d7a 1310 if (socket_address_is(&p->address, value+skip, type))
a16e1123
LP
1311 break;
1312
1313 if (p) {
1314 if (p->fd >= 0)
1315 close_nointr_nofail(p->fd);
1316 p->fd = fdset_remove(fds, fd);
1317 }
1318 }
1319
1320 } else
1321 log_debug("Unknown serialization key '%s'", key);
1322
1323 return 0;
1324}
1325
87f0e418
LP
1326static UnitActiveState socket_active_state(Unit *u) {
1327 assert(u);
5cb5a6ff 1328
acbb0225 1329 return state_translation_table[SOCKET(u)->state];
5cb5a6ff
LP
1330}
1331
10a94420
LP
1332static const char *socket_sub_state_to_string(Unit *u) {
1333 assert(u);
1334
a16e1123 1335 return socket_state_to_string(SOCKET(u)->state);
10a94420
LP
1336}
1337
6cf6bbc2
LP
1338static bool socket_check_gc(Unit *u) {
1339 Socket *s = SOCKET(u);
1340
1341 assert(u);
1342
1343 return s->n_connections > 0;
1344}
1345
acbb0225 1346static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
87f0e418 1347 Socket *s = SOCKET(u);
4f2d528d 1348 int cfd = -1;
9152c765 1349
034c6ed7 1350 assert(s);
8d567588 1351 assert(fd >= 0);
9152c765 1352
871d7de4
LP
1353 if (s->state != SOCKET_LISTENING)
1354 return;
1355
9e2f7c11 1356 log_debug("Incoming traffic on %s", u->meta.id);
9152c765 1357
4f2d528d
LP
1358 if (events != EPOLLIN) {
1359 log_error("Got invalid poll event on socket.");
8d567588 1360 goto fail;
4f2d528d
LP
1361 }
1362
cabab516 1363 if (w->socket_accept) {
4f2d528d
LP
1364 for (;;) {
1365
1366 if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1367
1368 if (errno == EINTR)
1369 continue;
1370
1371 log_error("Failed to accept socket: %m");
8d567588 1372 goto fail;
4f2d528d
LP
1373 }
1374
1375 break;
1376 }
4fd5948e
LP
1377
1378 socket_apply_socket_options(s, cfd);
4f2d528d 1379 }
9152c765 1380
4f2d528d 1381 socket_enter_running(s, cfd);
8d567588
LP
1382 return;
1383
1384fail:
1385 socket_enter_stop_pre(s, false);
9152c765
LP
1386}
1387
87f0e418
LP
1388static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1389 Socket *s = SOCKET(u);
034c6ed7 1390 bool success;
5cb5a6ff
LP
1391
1392 assert(s);
034c6ed7 1393 assert(pid >= 0);
5cb5a6ff 1394
8c47c732
LP
1395 if (pid != s->control_pid)
1396 return;
542563ba 1397
034c6ed7
LP
1398 s->control_pid = 0;
1399
8c47c732
LP
1400 success = is_clean_exit(code, status);
1401 s->failure = s->failure || !success;
1402
a16e1123 1403 if (s->control_command)
b58b4116 1404 exec_status_exit(&s->control_command->exec_status, pid, code, status);
a16e1123 1405
9e2f7c11 1406 log_debug("%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
034c6ed7 1407
a16e1123
LP
1408 if (s->control_command && s->control_command->command_next && success) {
1409 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
034c6ed7 1410 socket_run_next(s, success);
acbb0225 1411 } else {
a16e1123
LP
1412 s->control_command = NULL;
1413 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1414
034c6ed7
LP
1415 /* No further commands for this step, so let's figure
1416 * out what to do next */
5cb5a6ff 1417
a16e1123 1418 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
acbb0225 1419
034c6ed7
LP
1420 switch (s->state) {
1421
1422 case SOCKET_START_PRE:
1423 if (success)
acbb0225 1424 socket_enter_start_post(s);
034c6ed7 1425 else
80876c20 1426 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1427 break;
1428
1429 case SOCKET_START_POST:
1430 if (success)
e9af15c3 1431 socket_enter_listening(s);
034c6ed7
LP
1432 else
1433 socket_enter_stop_pre(s, false);
1434 break;
1435
1436 case SOCKET_STOP_PRE:
1437 case SOCKET_STOP_PRE_SIGTERM:
1438 case SOCKET_STOP_PRE_SIGKILL:
1439 socket_enter_stop_post(s, success);
1440 break;
1441
1442 case SOCKET_STOP_POST:
80876c20
LP
1443 case SOCKET_FINAL_SIGTERM:
1444 case SOCKET_FINAL_SIGKILL:
034c6ed7
LP
1445 socket_enter_dead(s, success);
1446 break;
1447
1448 default:
1449 assert_not_reached("Uh, control process died at wrong time.");
1450 }
1451 }
1452}
5cb5a6ff 1453
acbb0225 1454static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
87f0e418 1455 Socket *s = SOCKET(u);
5cb5a6ff 1456
034c6ed7
LP
1457 assert(s);
1458 assert(elapsed == 1);
acbb0225 1459 assert(w == &s->timer_watch);
034c6ed7
LP
1460
1461 switch (s->state) {
1462
1463 case SOCKET_START_PRE:
9e2f7c11 1464 log_warning("%s starting timed out. Terminating.", u->meta.id);
80876c20
LP
1465 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1466
034c6ed7 1467 case SOCKET_START_POST:
9e2f7c11 1468 log_warning("%s starting timed out. Stopping.", u->meta.id);
034c6ed7
LP
1469 socket_enter_stop_pre(s, false);
1470 break;
1471
1472 case SOCKET_STOP_PRE:
9e2f7c11 1473 log_warning("%s stopping timed out. Terminating.", u->meta.id);
034c6ed7
LP
1474 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1475 break;
1476
1477 case SOCKET_STOP_PRE_SIGTERM:
9e2f7c11 1478 log_warning("%s stopping timed out. Killing.", u->meta.id);
034c6ed7
LP
1479 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1480 break;
1481
1482 case SOCKET_STOP_PRE_SIGKILL:
9e2f7c11 1483 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
034c6ed7
LP
1484 socket_enter_stop_post(s, false);
1485 break;
1486
1487 case SOCKET_STOP_POST:
9e2f7c11 1488 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
80876c20 1489 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
034c6ed7
LP
1490 break;
1491
80876c20 1492 case SOCKET_FINAL_SIGTERM:
9e2f7c11 1493 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
80876c20 1494 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
034c6ed7
LP
1495 break;
1496
80876c20 1497 case SOCKET_FINAL_SIGKILL:
18c78fb1 1498 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
034c6ed7
LP
1499 socket_enter_dead(s, false);
1500 break;
1501
1502 default:
1503 assert_not_reached("Timeout at wrong time.");
1504 }
5cb5a6ff
LP
1505}
1506
44d8db9e
LP
1507int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1508 int *rfds;
1509 unsigned rn_fds, k;
1510 SocketPort *p;
1511
1512 assert(s);
1513 assert(fds);
1514 assert(n_fds);
1515
1516 /* Called from the service code for requesting our fds */
1517
1518 rn_fds = 0;
1519 LIST_FOREACH(port, p, s->ports)
1520 if (p->fd >= 0)
1521 rn_fds++;
1522
1523 if (!(rfds = new(int, rn_fds)) < 0)
1524 return -ENOMEM;
1525
1526 k = 0;
1527 LIST_FOREACH(port, p, s->ports)
1528 if (p->fd >= 0)
1529 rfds[k++] = p->fd;
1530
1531 assert(k == rn_fds);
1532
1533 *fds = rfds;
1534 *n_fds = rn_fds;
1535
1536 return 0;
1537}
1538
ceee3d82
LP
1539void socket_notify_service_dead(Socket *s) {
1540 assert(s);
1541
6cf6bbc2
LP
1542 /* The service is dead. Dang!
1543 *
1544 * This is strictly for one-instance-for-all-connections
1545 * services. */
ceee3d82
LP
1546
1547 if (s->state == SOCKET_RUNNING) {
9e2f7c11 1548 log_debug("%s got notified about service death.", s->meta.id);
ceee3d82
LP
1549 socket_enter_listening(s);
1550 }
1551}
1552
6cf6bbc2
LP
1553void socket_connection_unref(Socket *s) {
1554 assert(s);
1555
1556 /* The service is dead. Yay!
1557 *
1558 * This is strictly for one-onstance-per-connection
1559 * services. */
1560
1561 assert(s->n_connections > 0);
1562 s->n_connections--;
1563
1564 log_debug("%s: One connection closed, %u left.", s->meta.id, s->n_connections);
1565}
1566
a16e1123
LP
1567static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1568 [SOCKET_DEAD] = "dead",
1569 [SOCKET_START_PRE] = "start-pre",
1570 [SOCKET_START_POST] = "start-post",
1571 [SOCKET_LISTENING] = "listening",
1572 [SOCKET_RUNNING] = "running",
1573 [SOCKET_STOP_PRE] = "stop-pre",
1574 [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1575 [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1576 [SOCKET_STOP_POST] = "stop-post",
1577 [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1578 [SOCKET_FINAL_SIGKILL] = "final-sigkill",
18c78fb1 1579 [SOCKET_MAINTENANCE] = "maintenance"
a16e1123
LP
1580};
1581
1582DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1583
1584static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1585 [SOCKET_EXEC_START_PRE] = "StartPre",
1586 [SOCKET_EXEC_START_POST] = "StartPost",
1587 [SOCKET_EXEC_STOP_PRE] = "StopPre",
1588 [SOCKET_EXEC_STOP_POST] = "StopPost"
1589};
1590
1591DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1592
87f0e418 1593const UnitVTable socket_vtable = {
5cb5a6ff
LP
1594 .suffix = ".socket",
1595
034c6ed7
LP
1596 .init = socket_init,
1597 .done = socket_done,
a16e1123
LP
1598 .load = socket_load,
1599
1600 .coldplug = socket_coldplug,
034c6ed7 1601
5cb5a6ff
LP
1602 .dump = socket_dump,
1603
542563ba
LP
1604 .start = socket_start,
1605 .stop = socket_stop,
5cb5a6ff 1606
a16e1123
LP
1607 .serialize = socket_serialize,
1608 .deserialize_item = socket_deserialize_item,
1609
5cb5a6ff 1610 .active_state = socket_active_state,
10a94420 1611 .sub_state_to_string = socket_sub_state_to_string,
5cb5a6ff 1612
6cf6bbc2
LP
1613 .check_gc = socket_check_gc,
1614
9152c765 1615 .fd_event = socket_fd_event,
034c6ed7 1616 .sigchld_event = socket_sigchld_event,
4139c1b2
LP
1617 .timer_event = socket_timer_event,
1618
1619 .bus_message_handler = bus_socket_message_handler
5cb5a6ff 1620};