]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/socket.c
unit: shorten active state enums to make systemctl output nicer
[thirdparty/systemd.git] / src / socket.c
1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <sys/types.h>
23 #include <sys/stat.h>
24 #include <unistd.h>
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <sys/epoll.h>
28 #include <signal.h>
29 #include <arpa/inet.h>
30
31 #include "unit.h"
32 #include "socket.h"
33 #include "log.h"
34 #include "load-dropin.h"
35 #include "load-fragment.h"
36 #include "strv.h"
37 #include "unit-name.h"
38 #include "dbus-socket.h"
39 #include "missing.h"
40
41 static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
42 [SOCKET_DEAD] = UNIT_INACTIVE,
43 [SOCKET_START_PRE] = UNIT_ACTIVATING,
44 [SOCKET_START_POST] = UNIT_ACTIVATING,
45 [SOCKET_LISTENING] = UNIT_ACTIVE,
46 [SOCKET_RUNNING] = UNIT_ACTIVE,
47 [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
48 [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
49 [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
50 [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
51 [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
52 [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
53 [SOCKET_MAINTENANCE] = UNIT_MAINTENANCE
54 };
55
56 static void socket_init(Unit *u) {
57 Socket *s = SOCKET(u);
58
59 assert(u);
60 assert(u->meta.load_state == UNIT_STUB);
61
62 s->backlog = SOMAXCONN;
63 s->timeout_usec = DEFAULT_TIMEOUT_USEC;
64 s->directory_mode = 0755;
65 s->socket_mode = 0666;
66
67 s->max_connections = 64;
68
69 s->keep_alive = false;
70 s->priority = -1;
71 s->receive_buffer = 0;
72 s->send_buffer = 0;
73 s->ip_tos = -1;
74 s->ip_ttl = -1;
75 s->pipe_size = 0;
76 s->mark = -1;
77 s->free_bind = false;
78
79 exec_context_init(&s->exec_context);
80
81 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
82 }
83
84 static void socket_unwatch_control_pid(Socket *s) {
85 assert(s);
86
87 if (s->control_pid <= 0)
88 return;
89
90 unit_unwatch_pid(UNIT(s), s->control_pid);
91 s->control_pid = 0;
92 }
93
94 static void socket_done(Unit *u) {
95 Socket *s = SOCKET(u);
96 SocketPort *p;
97 Meta *i;
98
99 assert(s);
100
101 while ((p = s->ports)) {
102 LIST_REMOVE(SocketPort, port, s->ports, p);
103
104 if (p->fd >= 0) {
105 unit_unwatch_fd(UNIT(s), &p->fd_watch);
106 close_nointr_nofail(p->fd);
107 }
108
109 free(p->path);
110 free(p);
111 }
112
113 exec_context_done(&s->exec_context);
114 exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
115 s->control_command = NULL;
116
117 socket_unwatch_control_pid(s);
118
119 s->service = NULL;
120
121 free(s->bind_to_device);
122 s->bind_to_device = NULL;
123
124 unit_unwatch_timer(u, &s->timer_watch);
125
126 /* Make sure no service instance refers to us anymore. */
127 LIST_FOREACH(units_per_type, i, u->meta.manager->units_per_type[UNIT_SERVICE]) {
128 Service *service = (Service *) i;
129
130 if (service->socket == s)
131 service->socket = NULL;
132 }
133 }
134
135 static bool have_non_accept_socket(Socket *s) {
136 SocketPort *p;
137
138 assert(s);
139
140 if (!s->accept)
141 return true;
142
143 LIST_FOREACH(port, p, s->ports) {
144
145 if (p->type != SOCKET_SOCKET)
146 return true;
147
148 if (!socket_address_can_accept(&p->address))
149 return true;
150 }
151
152 return false;
153 }
154
155 static int socket_verify(Socket *s) {
156 assert(s);
157
158 if (s->meta.load_state != UNIT_LOADED)
159 return 0;
160
161 if (!s->ports) {
162 log_error("%s lacks Listen setting. Refusing.", s->meta.id);
163 return -EINVAL;
164 }
165
166 if (s->accept && s->max_connections <= 0) {
167 log_error("%s's MaxConnection setting too small. Refusing.", s->meta.id);
168 return -EINVAL;
169 }
170
171 if (s->exec_context.pam_name && s->kill_mode != KILL_CONTROL_GROUP) {
172 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", s->meta.id);
173 return -EINVAL;
174 }
175
176 return 0;
177 }
178
179 static bool socket_needs_mount(Socket *s, const char *prefix) {
180 SocketPort *p;
181
182 assert(s);
183
184 LIST_FOREACH(port, p, s->ports) {
185
186 if (p->type == SOCKET_SOCKET) {
187 if (socket_address_needs_mount(&p->address, prefix))
188 return true;
189 } else {
190 assert(p->type == SOCKET_FIFO);
191 if (path_startswith(p->path, prefix))
192 return true;
193 }
194 }
195
196 return false;
197 }
198
199 int socket_add_one_mount_link(Socket *s, Mount *m) {
200 int r;
201
202 assert(s);
203 assert(m);
204
205 if (s->meta.load_state != UNIT_LOADED ||
206 m->meta.load_state != UNIT_LOADED)
207 return 0;
208
209 if (!socket_needs_mount(s, m->where))
210 return 0;
211
212 if ((r = unit_add_dependency(UNIT(m), UNIT_BEFORE, UNIT(s), true)) < 0)
213 return r;
214
215 if ((r = unit_add_dependency(UNIT(s), UNIT_REQUIRES, UNIT(m), true)) < 0)
216 return r;
217
218 return 0;
219 }
220
221 static int socket_add_mount_links(Socket *s) {
222 Meta *other;
223 int r;
224
225 assert(s);
226
227 LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
228 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
229 return r;
230
231 return 0;
232 }
233
234 static int socket_add_device_link(Socket *s) {
235 char *t;
236 int r;
237
238 assert(s);
239
240 if (!s->bind_to_device)
241 return 0;
242
243 if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
244 return -ENOMEM;
245
246 r = unit_add_node_link(UNIT(s), t, false);
247 free(t);
248
249 return r;
250 }
251
252 static int socket_load(Unit *u) {
253 Socket *s = SOCKET(u);
254 int r;
255
256 assert(u);
257 assert(u->meta.load_state == UNIT_STUB);
258
259 if ((r = unit_load_fragment_and_dropin(u)) < 0)
260 return r;
261
262 /* This is a new unit? Then let's add in some extras */
263 if (u->meta.load_state == UNIT_LOADED) {
264
265 if (have_non_accept_socket(s)) {
266 if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)))
267 return r;
268
269 if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
270 return r;
271 }
272
273 if ((r = socket_add_mount_links(s)) < 0)
274 return r;
275
276 if ((r = socket_add_device_link(s)) < 0)
277 return r;
278
279 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
280 return r;
281
282 if ((r = unit_add_default_cgroup(u)) < 0)
283 return r;
284 }
285
286 return socket_verify(s);
287 }
288
289 static const char* listen_lookup(int type) {
290
291 if (type == SOCK_STREAM)
292 return "ListenStream";
293 else if (type == SOCK_DGRAM)
294 return "ListenDatagram";
295 else if (type == SOCK_SEQPACKET)
296 return "ListenSequentialPacket";
297
298 assert_not_reached("Unknown socket type");
299 return NULL;
300 }
301
302 static void socket_dump(Unit *u, FILE *f, const char *prefix) {
303
304 SocketExecCommand c;
305 Socket *s = SOCKET(u);
306 SocketPort *p;
307 const char *prefix2;
308 char *p2;
309
310 assert(s);
311 assert(f);
312
313 p2 = strappend(prefix, "\t");
314 prefix2 = p2 ? p2 : prefix;
315
316 fprintf(f,
317 "%sSocket State: %s\n"
318 "%sBindIPv6Only: %s\n"
319 "%sBacklog: %u\n"
320 "%sKillMode: %s\n"
321 "%sSocketMode: %04o\n"
322 "%sDirectoryMode: %04o\n"
323 "%sKeepAlive: %s\n"
324 "%sFreeBind: %s\n",
325 prefix, socket_state_to_string(s->state),
326 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
327 prefix, s->backlog,
328 prefix, kill_mode_to_string(s->kill_mode),
329 prefix, s->socket_mode,
330 prefix, s->directory_mode,
331 prefix, yes_no(s->keep_alive),
332 prefix, yes_no(s->free_bind));
333
334 if (s->control_pid > 0)
335 fprintf(f,
336 "%sControl PID: %lu\n",
337 prefix, (unsigned long) s->control_pid);
338
339 if (s->bind_to_device)
340 fprintf(f,
341 "%sBindToDevice: %s\n",
342 prefix, s->bind_to_device);
343
344 if (s->accept)
345 fprintf(f,
346 "%sAccepted: %u\n"
347 "%sNConnections: %u\n"
348 "%sMaxConnections: %u\n",
349 prefix, s->n_accepted,
350 prefix, s->n_connections,
351 prefix, s->max_connections);
352
353 if (s->priority >= 0)
354 fprintf(f,
355 "%sPriority: %i\n",
356 prefix, s->priority);
357
358 if (s->receive_buffer > 0)
359 fprintf(f,
360 "%sReceiveBuffer: %zu\n",
361 prefix, s->receive_buffer);
362
363 if (s->send_buffer > 0)
364 fprintf(f,
365 "%sSendBuffer: %zu\n",
366 prefix, s->send_buffer);
367
368 if (s->ip_tos >= 0)
369 fprintf(f,
370 "%sIPTOS: %i\n",
371 prefix, s->ip_tos);
372
373 if (s->ip_ttl >= 0)
374 fprintf(f,
375 "%sIPTTL: %i\n",
376 prefix, s->ip_ttl);
377
378 if (s->pipe_size > 0)
379 fprintf(f,
380 "%sPipeSize: %zu\n",
381 prefix, s->pipe_size);
382
383 if (s->mark >= 0)
384 fprintf(f,
385 "%sMark: %i\n",
386 prefix, s->mark);
387
388 LIST_FOREACH(port, p, s->ports) {
389
390 if (p->type == SOCKET_SOCKET) {
391 const char *t;
392 int r;
393 char *k;
394
395 if ((r = socket_address_print(&p->address, &k)) < 0)
396 t = strerror(-r);
397 else
398 t = k;
399
400 fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
401 free(k);
402 } else
403 fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
404 }
405
406 exec_context_dump(&s->exec_context, f, prefix);
407
408 for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
409 if (!s->exec_command[c])
410 continue;
411
412 fprintf(f, "%s-> %s:\n",
413 prefix, socket_exec_command_to_string(c));
414
415 exec_command_dump_list(s->exec_command[c], f, prefix2);
416 }
417
418 free(p2);
419 }
420
421 static int instance_from_socket(int fd, unsigned nr, char **instance) {
422 socklen_t l;
423 char *r;
424 union {
425 struct sockaddr sa;
426 struct sockaddr_un un;
427 struct sockaddr_in in;
428 struct sockaddr_in6 in6;
429 struct sockaddr_storage storage;
430 } local, remote;
431
432 assert(fd >= 0);
433 assert(instance);
434
435 l = sizeof(local);
436 if (getsockname(fd, &local.sa, &l) < 0)
437 return -errno;
438
439 l = sizeof(remote);
440 if (getpeername(fd, &remote.sa, &l) < 0)
441 return -errno;
442
443 switch (local.sa.sa_family) {
444
445 case AF_INET: {
446 uint32_t
447 a = ntohl(local.in.sin_addr.s_addr),
448 b = ntohl(remote.in.sin_addr.s_addr);
449
450 if (asprintf(&r,
451 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
452 nr,
453 a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
454 ntohs(local.in.sin_port),
455 b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
456 ntohs(remote.in.sin_port)) < 0)
457 return -ENOMEM;
458
459 break;
460 }
461
462 case AF_INET6: {
463 static const char ipv4_prefix[] = {
464 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
465 };
466
467 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
468 memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
469 const uint8_t
470 *a = local.in6.sin6_addr.s6_addr+12,
471 *b = remote.in6.sin6_addr.s6_addr+12;
472
473 if (asprintf(&r,
474 "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
475 nr,
476 a[0], a[1], a[2], a[3],
477 ntohs(local.in6.sin6_port),
478 b[0], b[1], b[2], b[3],
479 ntohs(remote.in6.sin6_port)) < 0)
480 return -ENOMEM;
481 } else {
482 char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
483
484 if (asprintf(&r,
485 "%u-%s:%u-%s:%u",
486 nr,
487 inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
488 ntohs(local.in6.sin6_port),
489 inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
490 ntohs(remote.in6.sin6_port)) < 0)
491 return -ENOMEM;
492 }
493
494 break;
495 }
496
497 case AF_UNIX: {
498 struct ucred ucred;
499
500 l = sizeof(ucred);
501 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
502 return -errno;
503
504 if (asprintf(&r,
505 "%u-%lu-%lu",
506 nr,
507 (unsigned long) ucred.pid,
508 (unsigned long) ucred.uid) < 0)
509 return -ENOMEM;
510
511 break;
512 }
513
514 default:
515 assert_not_reached("Unhandled socket type.");
516 }
517
518 *instance = r;
519 return 0;
520 }
521
522 static void socket_close_fds(Socket *s) {
523 SocketPort *p;
524
525 assert(s);
526
527 LIST_FOREACH(port, p, s->ports) {
528 if (p->fd < 0)
529 continue;
530
531 unit_unwatch_fd(UNIT(s), &p->fd_watch);
532 close_nointr_nofail(p->fd);
533
534 /* One little note: we should never delete any sockets
535 * in the file system here! After all some other
536 * process we spawned might still have a reference of
537 * this fd and wants to continue to use it. Therefore
538 * we delete sockets in the file system before we
539 * create a new one, not after we stopped using
540 * one! */
541
542 p->fd = -1;
543 }
544 }
545
546 static void socket_apply_socket_options(Socket *s, int fd) {
547 assert(s);
548 assert(fd >= 0);
549
550 if (s->keep_alive) {
551 int b = s->keep_alive;
552 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &b, sizeof(b)) < 0)
553 log_warning("SO_KEEPALIVE failed: %m");
554 }
555
556 if (s->priority >= 0)
557 if (setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &s->priority, sizeof(s->priority)) < 0)
558 log_warning("SO_PRIORITY failed: %m");
559
560 if (s->receive_buffer > 0) {
561 int value = (int) s->receive_buffer;
562 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &value, sizeof(value)) < 0)
563 log_warning("SO_RCVBUF failed: %m");
564 }
565
566 if (s->send_buffer > 0) {
567 int value = (int) s->send_buffer;
568 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &value, sizeof(value)) < 0)
569 log_warning("SO_SNDBUF failed: %m");
570 }
571
572 if (s->mark >= 0)
573 if (setsockopt(fd, SOL_SOCKET, SO_MARK, &s->mark, sizeof(s->mark)) < 0)
574 log_warning("SO_MARK failed: %m");
575
576 if (s->ip_tos >= 0)
577 if (setsockopt(fd, IPPROTO_IP, IP_TOS, &s->ip_tos, sizeof(s->ip_tos)) < 0)
578 log_warning("IP_TOS failed: %m");
579
580 if (s->ip_ttl >= 0)
581 if (setsockopt(fd, IPPROTO_IP, IP_TTL, &s->ip_ttl, sizeof(s->ip_ttl)) < 0)
582 log_warning("IP_TTL failed: %m");
583 }
584
585 static void socket_apply_pipe_options(Socket *s, int fd) {
586 assert(s);
587 assert(fd >= 0);
588
589 if (s->pipe_size > 0)
590 if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
591 log_warning("F_SETPIPE_SZ: %m");
592 }
593
594 static int socket_open_fds(Socket *s) {
595 SocketPort *p;
596 int r;
597
598 assert(s);
599
600 LIST_FOREACH(port, p, s->ports) {
601
602 if (p->fd >= 0)
603 continue;
604
605 if (p->type == SOCKET_SOCKET) {
606
607 if ((r = socket_address_listen(
608 &p->address,
609 s->backlog,
610 s->bind_ipv6_only,
611 s->bind_to_device,
612 s->free_bind,
613 s->directory_mode,
614 s->socket_mode,
615 &p->fd)) < 0)
616 goto rollback;
617
618 socket_apply_socket_options(s, p->fd);
619
620 } else {
621 struct stat st;
622 assert(p->type == SOCKET_FIFO);
623
624 mkdir_parents(p->path, s->directory_mode);
625
626 if (mkfifo(p->path, s->socket_mode) < 0 && errno != EEXIST) {
627 r = -errno;
628 goto rollback;
629 }
630
631 if ((p->fd = open(p->path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
632 r = -errno;
633 goto rollback;
634 }
635
636 if (fstat(p->fd, &st) < 0) {
637 r = -errno;
638 goto rollback;
639 }
640
641 /* FIXME verify user, access mode */
642
643 if (!S_ISFIFO(st.st_mode)) {
644 r = -EEXIST;
645 goto rollback;
646 }
647
648 socket_apply_pipe_options(s, p->fd);
649 }
650 }
651
652 return 0;
653
654 rollback:
655 socket_close_fds(s);
656 return r;
657 }
658
659 static void socket_unwatch_fds(Socket *s) {
660 SocketPort *p;
661
662 assert(s);
663
664 LIST_FOREACH(port, p, s->ports) {
665 if (p->fd < 0)
666 continue;
667
668 unit_unwatch_fd(UNIT(s), &p->fd_watch);
669 }
670 }
671
672 static int socket_watch_fds(Socket *s) {
673 SocketPort *p;
674 int r;
675
676 assert(s);
677
678 LIST_FOREACH(port, p, s->ports) {
679 if (p->fd < 0)
680 continue;
681
682 p->fd_watch.socket_accept =
683 s->accept &&
684 p->type == SOCKET_SOCKET &&
685 socket_address_can_accept(&p->address);
686
687 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
688 goto fail;
689 }
690
691 return 0;
692
693 fail:
694 socket_unwatch_fds(s);
695 return r;
696 }
697
698 static void socket_set_state(Socket *s, SocketState state) {
699 SocketState old_state;
700 assert(s);
701
702 old_state = s->state;
703 s->state = state;
704
705 if (state != SOCKET_START_PRE &&
706 state != SOCKET_START_POST &&
707 state != SOCKET_STOP_PRE &&
708 state != SOCKET_STOP_PRE_SIGTERM &&
709 state != SOCKET_STOP_PRE_SIGKILL &&
710 state != SOCKET_STOP_POST &&
711 state != SOCKET_FINAL_SIGTERM &&
712 state != SOCKET_FINAL_SIGKILL) {
713 unit_unwatch_timer(UNIT(s), &s->timer_watch);
714 socket_unwatch_control_pid(s);
715 s->control_command = NULL;
716 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
717 }
718
719 if (state != SOCKET_LISTENING)
720 socket_unwatch_fds(s);
721
722 if (state != SOCKET_START_POST &&
723 state != SOCKET_LISTENING &&
724 state != SOCKET_RUNNING &&
725 state != SOCKET_STOP_PRE &&
726 state != SOCKET_STOP_PRE_SIGTERM &&
727 state != SOCKET_STOP_PRE_SIGKILL)
728 socket_close_fds(s);
729
730 if (state != old_state)
731 log_debug("%s changed %s -> %s",
732 s->meta.id,
733 socket_state_to_string(old_state),
734 socket_state_to_string(state));
735
736 unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
737 }
738
739 static int socket_coldplug(Unit *u) {
740 Socket *s = SOCKET(u);
741 int r;
742
743 assert(s);
744 assert(s->state == SOCKET_DEAD);
745
746 if (s->deserialized_state != s->state) {
747
748 if (s->deserialized_state == SOCKET_START_PRE ||
749 s->deserialized_state == SOCKET_START_POST ||
750 s->deserialized_state == SOCKET_STOP_PRE ||
751 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
752 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
753 s->deserialized_state == SOCKET_STOP_POST ||
754 s->deserialized_state == SOCKET_FINAL_SIGTERM ||
755 s->deserialized_state == SOCKET_FINAL_SIGKILL) {
756
757 if (s->control_pid <= 0)
758 return -EBADMSG;
759
760 if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
761 return r;
762
763 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
764 return r;
765 }
766
767 if (s->deserialized_state == SOCKET_START_POST ||
768 s->deserialized_state == SOCKET_LISTENING ||
769 s->deserialized_state == SOCKET_RUNNING ||
770 s->deserialized_state == SOCKET_STOP_PRE ||
771 s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
772 s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
773 if ((r = socket_open_fds(s)) < 0)
774 return r;
775
776 if (s->deserialized_state == SOCKET_LISTENING)
777 if ((r = socket_watch_fds(s)) < 0)
778 return r;
779
780 socket_set_state(s, s->deserialized_state);
781 }
782
783 return 0;
784 }
785
786 static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
787 pid_t pid;
788 int r;
789 char **argv;
790
791 assert(s);
792 assert(c);
793 assert(_pid);
794
795 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
796 goto fail;
797
798 if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
799 r = -ENOMEM;
800 goto fail;
801 }
802
803 r = exec_spawn(c,
804 argv,
805 &s->exec_context,
806 NULL, 0,
807 s->meta.manager->environment,
808 true,
809 true,
810 s->meta.manager->confirm_spawn,
811 s->meta.cgroup_bondings,
812 &pid);
813
814 strv_free(argv);
815 if (r < 0)
816 goto fail;
817
818 if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
819 /* FIXME: we need to do something here */
820 goto fail;
821
822 *_pid = pid;
823
824 return 0;
825
826 fail:
827 unit_unwatch_timer(UNIT(s), &s->timer_watch);
828
829 return r;
830 }
831
832 static void socket_enter_dead(Socket *s, bool success) {
833 assert(s);
834
835 if (!success)
836 s->failure = true;
837
838 socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
839 }
840
841 static void socket_enter_signal(Socket *s, SocketState state, bool success);
842
843 static void socket_enter_stop_post(Socket *s, bool success) {
844 int r;
845 assert(s);
846
847 if (!success)
848 s->failure = true;
849
850 socket_unwatch_control_pid(s);
851
852 s->control_command_id = SOCKET_EXEC_STOP_POST;
853
854 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
855 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
856 goto fail;
857
858 socket_set_state(s, SOCKET_STOP_POST);
859 } else
860 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
861
862 return;
863
864 fail:
865 log_warning("%s failed to run 'stop-post' task: %s", s->meta.id, strerror(-r));
866 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
867 }
868
869 static void socket_enter_signal(Socket *s, SocketState state, bool success) {
870 int r;
871 bool sent = false;
872
873 assert(s);
874
875 if (!success)
876 s->failure = true;
877
878 if (s->kill_mode != KILL_NONE) {
879 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? SIGTERM : SIGKILL;
880
881 if (s->kill_mode == KILL_CONTROL_GROUP) {
882
883 if ((r = cgroup_bonding_kill_list(s->meta.cgroup_bondings, sig)) < 0) {
884 if (r != -EAGAIN && r != -ESRCH)
885 goto fail;
886 } else
887 sent = true;
888 }
889
890 if (!sent && s->control_pid > 0)
891 if (kill(s->kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
892 r = -errno;
893 goto fail;
894 }
895 }
896
897 if (sent && s->control_pid > 0) {
898 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
899 goto fail;
900
901 socket_set_state(s, state);
902 } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
903 socket_enter_stop_post(s, true);
904 else
905 socket_enter_dead(s, true);
906
907 return;
908
909 fail:
910 log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
911
912 if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
913 socket_enter_stop_post(s, false);
914 else
915 socket_enter_dead(s, false);
916 }
917
918 static void socket_enter_stop_pre(Socket *s, bool success) {
919 int r;
920 assert(s);
921
922 if (!success)
923 s->failure = true;
924
925 socket_unwatch_control_pid(s);
926
927 s->control_command_id = SOCKET_EXEC_STOP_PRE;
928
929 if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
930 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
931 goto fail;
932
933 socket_set_state(s, SOCKET_STOP_PRE);
934 } else
935 socket_enter_stop_post(s, true);
936
937 return;
938
939 fail:
940 log_warning("%s failed to run 'stop-pre' task: %s", s->meta.id, strerror(-r));
941 socket_enter_stop_post(s, false);
942 }
943
944 static void socket_enter_listening(Socket *s) {
945 int r;
946 assert(s);
947
948 if ((r = socket_watch_fds(s)) < 0) {
949 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
950 goto fail;
951 }
952
953 socket_set_state(s, SOCKET_LISTENING);
954 return;
955
956 fail:
957 socket_enter_stop_pre(s, false);
958 }
959
960 static void socket_enter_start_post(Socket *s) {
961 int r;
962 assert(s);
963
964 if ((r = socket_open_fds(s)) < 0) {
965 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
966 goto fail;
967 }
968
969 socket_unwatch_control_pid(s);
970
971 s->control_command_id = SOCKET_EXEC_START_POST;
972
973 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
974 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
975 log_warning("%s failed to run 'start-post' task: %s", s->meta.id, strerror(-r));
976 goto fail;
977 }
978
979 socket_set_state(s, SOCKET_START_POST);
980 } else
981 socket_enter_listening(s);
982
983 return;
984
985 fail:
986 socket_enter_stop_pre(s, false);
987 }
988
989 static void socket_enter_start_pre(Socket *s) {
990 int r;
991 assert(s);
992
993 socket_unwatch_control_pid(s);
994
995 s->control_command_id = SOCKET_EXEC_START_PRE;
996
997 if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
998 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
999 goto fail;
1000
1001 socket_set_state(s, SOCKET_START_PRE);
1002 } else
1003 socket_enter_start_post(s);
1004
1005 return;
1006
1007 fail:
1008 log_warning("%s failed to run 'start-pre' task: %s", s->meta.id, strerror(-r));
1009 socket_enter_dead(s, false);
1010 }
1011
1012 static void socket_enter_running(Socket *s, int cfd) {
1013 int r;
1014
1015 assert(s);
1016
1017 if (cfd < 0) {
1018 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, NULL)) < 0)
1019 goto fail;
1020
1021 socket_set_state(s, SOCKET_RUNNING);
1022 } else {
1023 Unit *u;
1024 char *prefix, *instance, *name;
1025
1026 if (s->n_connections >= s->max_connections) {
1027 log_warning("Too many incoming connections (%u)", s->n_connections);
1028 close_nointr_nofail(cfd);
1029 return;
1030 }
1031
1032 if ((r = instance_from_socket(cfd, s->n_accepted++, &instance)) < 0)
1033 goto fail;
1034
1035 if (!(prefix = unit_name_to_prefix(s->meta.id))) {
1036 free(instance);
1037 r = -ENOMEM;
1038 goto fail;
1039 }
1040
1041 name = unit_name_build(prefix, instance, ".service");
1042 free(prefix);
1043 free(instance);
1044
1045 if (!name) {
1046 r = -ENOMEM;
1047 goto fail;
1048 }
1049
1050 r = manager_load_unit(s->meta.manager, name, NULL, &u);
1051 free(name);
1052
1053 if (r < 0)
1054 goto fail;
1055
1056 if ((r = service_set_socket_fd(SERVICE(u), cfd, s)) < 0)
1057 goto fail;
1058
1059 cfd = -1;
1060
1061 s->n_connections ++;
1062
1063 if ((r = manager_add_job(u->meta.manager, JOB_START, u, JOB_REPLACE, true, NULL)) < 0)
1064 goto fail;
1065 }
1066
1067 return;
1068
1069 fail:
1070 log_warning("%s failed to queue socket startup job: %s", s->meta.id, strerror(-r));
1071 socket_enter_stop_pre(s, false);
1072
1073 if (cfd >= 0)
1074 close_nointr_nofail(cfd);
1075 }
1076
1077 static void socket_run_next(Socket *s, bool success) {
1078 int r;
1079
1080 assert(s);
1081 assert(s->control_command);
1082 assert(s->control_command->command_next);
1083
1084 if (!success)
1085 s->failure = true;
1086
1087 socket_unwatch_control_pid(s);
1088
1089 s->control_command = s->control_command->command_next;
1090
1091 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1092 goto fail;
1093
1094 return;
1095
1096 fail:
1097 log_warning("%s failed to run next task: %s", s->meta.id, strerror(-r));
1098
1099 if (s->state == SOCKET_START_POST)
1100 socket_enter_stop_pre(s, false);
1101 else if (s->state == SOCKET_STOP_POST)
1102 socket_enter_dead(s, false);
1103 else
1104 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1105 }
1106
1107 static int socket_start(Unit *u) {
1108 Socket *s = SOCKET(u);
1109
1110 assert(s);
1111
1112 /* We cannot fulfill this request right now, try again later
1113 * please! */
1114 if (s->state == SOCKET_STOP_PRE ||
1115 s->state == SOCKET_STOP_PRE_SIGKILL ||
1116 s->state == SOCKET_STOP_PRE_SIGTERM ||
1117 s->state == SOCKET_STOP_POST ||
1118 s->state == SOCKET_FINAL_SIGTERM ||
1119 s->state == SOCKET_FINAL_SIGKILL)
1120 return -EAGAIN;
1121
1122 if (s->state == SOCKET_START_PRE ||
1123 s->state == SOCKET_START_POST)
1124 return 0;
1125
1126 /* Cannot run this without the service being around */
1127 if (s->service) {
1128 if (s->service->meta.load_state != UNIT_LOADED)
1129 return -ENOENT;
1130
1131 /* If the service is alredy actvie we cannot start the
1132 * socket */
1133 if (s->service->state != SERVICE_DEAD &&
1134 s->service->state != SERVICE_MAINTENANCE &&
1135 s->service->state != SERVICE_AUTO_RESTART)
1136 return -EBUSY;
1137 }
1138
1139 assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
1140
1141 s->failure = false;
1142 socket_enter_start_pre(s);
1143 return 0;
1144 }
1145
1146 static int socket_stop(Unit *u) {
1147 Socket *s = SOCKET(u);
1148
1149 assert(s);
1150
1151 /* We cannot fulfill this request right now, try again later
1152 * please! */
1153 if (s->state == SOCKET_START_PRE ||
1154 s->state == SOCKET_START_POST)
1155 return -EAGAIN;
1156
1157 /* Already on it */
1158 if (s->state == SOCKET_STOP_PRE ||
1159 s->state == SOCKET_STOP_PRE_SIGTERM ||
1160 s->state == SOCKET_STOP_PRE_SIGKILL ||
1161 s->state == SOCKET_STOP_POST ||
1162 s->state == SOCKET_FINAL_SIGTERM ||
1163 s->state == SOCKET_FINAL_SIGTERM)
1164 return 0;
1165
1166 assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
1167
1168 socket_enter_stop_pre(s, true);
1169 return 0;
1170 }
1171
1172 static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1173 Socket *s = SOCKET(u);
1174 SocketPort *p;
1175 int r;
1176
1177 assert(u);
1178 assert(f);
1179 assert(fds);
1180
1181 unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1182 unit_serialize_item(u, f, "failure", yes_no(s->failure));
1183 unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1184
1185 if (s->control_pid > 0)
1186 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) s->control_pid);
1187
1188 if (s->control_command_id >= 0)
1189 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1190
1191 LIST_FOREACH(port, p, s->ports) {
1192 int copy;
1193
1194 if (p->fd < 0)
1195 continue;
1196
1197 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1198 return copy;
1199
1200 if (p->type == SOCKET_SOCKET) {
1201 char *t;
1202
1203 if ((r = socket_address_print(&p->address, &t)) < 0)
1204 return r;
1205
1206 unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
1207 free(t);
1208 } else {
1209 assert(p->type == SOCKET_FIFO);
1210 unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1211 }
1212 }
1213
1214 return 0;
1215 }
1216
1217 static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1218 Socket *s = SOCKET(u);
1219 int r;
1220
1221 assert(u);
1222 assert(key);
1223 assert(value);
1224 assert(fds);
1225
1226 if (streq(key, "state")) {
1227 SocketState state;
1228
1229 if ((state = socket_state_from_string(value)) < 0)
1230 log_debug("Failed to parse state value %s", value);
1231 else
1232 s->deserialized_state = state;
1233 } else if (streq(key, "failure")) {
1234 int b;
1235
1236 if ((b = parse_boolean(value)) < 0)
1237 log_debug("Failed to parse failure value %s", value);
1238 else
1239 s->failure = b || s->failure;
1240
1241 } else if (streq(key, "n-accepted")) {
1242 unsigned k;
1243
1244 if ((r = safe_atou(value, &k)) < 0)
1245 log_debug("Failed to parse n-accepted value %s", value);
1246 else
1247 s->n_accepted += k;
1248 } else if (streq(key, "control-pid")) {
1249 pid_t pid;
1250
1251 if ((r = parse_pid(value, &pid)) < 0)
1252 log_debug("Failed to parse control-pid value %s", value);
1253 else
1254 s->control_pid = pid;
1255 } else if (streq(key, "control-command")) {
1256 SocketExecCommand id;
1257
1258 if ((id = socket_exec_command_from_string(value)) < 0)
1259 log_debug("Failed to parse exec-command value %s", value);
1260 else {
1261 s->control_command_id = id;
1262 s->control_command = s->exec_command[id];
1263 }
1264 } else if (streq(key, "fifo")) {
1265 int fd, skip = 0;
1266 SocketPort *p;
1267
1268 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1269 log_debug("Failed to parse fifo value %s", value);
1270 else {
1271
1272 LIST_FOREACH(port, p, s->ports)
1273 if (streq(p->path, value+skip))
1274 break;
1275
1276 if (p) {
1277 if (p->fd >= 0)
1278 close_nointr_nofail(p->fd);
1279 p->fd = fdset_remove(fds, fd);
1280 }
1281 }
1282
1283 } else if (streq(key, "socket")) {
1284 int fd, type, skip = 0;
1285 SocketPort *p;
1286
1287 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
1288 log_debug("Failed to parse socket value %s", value);
1289 else {
1290
1291 LIST_FOREACH(port, p, s->ports)
1292 if (socket_address_is(&p->address, value+skip, type))
1293 break;
1294
1295 if (p) {
1296 if (p->fd >= 0)
1297 close_nointr_nofail(p->fd);
1298 p->fd = fdset_remove(fds, fd);
1299 }
1300 }
1301
1302 } else
1303 log_debug("Unknown serialization key '%s'", key);
1304
1305 return 0;
1306 }
1307
1308 static UnitActiveState socket_active_state(Unit *u) {
1309 assert(u);
1310
1311 return state_translation_table[SOCKET(u)->state];
1312 }
1313
1314 static const char *socket_sub_state_to_string(Unit *u) {
1315 assert(u);
1316
1317 return socket_state_to_string(SOCKET(u)->state);
1318 }
1319
1320 static bool socket_check_gc(Unit *u) {
1321 Socket *s = SOCKET(u);
1322
1323 assert(u);
1324
1325 return s->n_connections > 0;
1326 }
1327
1328 static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
1329 Socket *s = SOCKET(u);
1330 int cfd = -1;
1331
1332 assert(s);
1333 assert(fd >= 0);
1334
1335 if (s->state != SOCKET_LISTENING)
1336 return;
1337
1338 log_debug("Incoming traffic on %s", u->meta.id);
1339
1340 if (events != EPOLLIN) {
1341 log_error("Got invalid poll event on socket.");
1342 goto fail;
1343 }
1344
1345 if (w->socket_accept) {
1346 for (;;) {
1347
1348 if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1349
1350 if (errno == EINTR)
1351 continue;
1352
1353 log_error("Failed to accept socket: %m");
1354 goto fail;
1355 }
1356
1357 break;
1358 }
1359
1360 socket_apply_socket_options(s, cfd);
1361 }
1362
1363 socket_enter_running(s, cfd);
1364 return;
1365
1366 fail:
1367 socket_enter_stop_pre(s, false);
1368 }
1369
1370 static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1371 Socket *s = SOCKET(u);
1372 bool success;
1373
1374 assert(s);
1375 assert(pid >= 0);
1376
1377 if (pid != s->control_pid)
1378 return;
1379
1380 s->control_pid = 0;
1381
1382 success = is_clean_exit(code, status);
1383 s->failure = s->failure || !success;
1384
1385 if (s->control_command)
1386 exec_status_fill(&s->control_command->exec_status, pid, code, status);
1387
1388 log_debug("%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1389
1390 if (s->control_command && s->control_command->command_next && success) {
1391 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
1392 socket_run_next(s, success);
1393 } else {
1394 s->control_command = NULL;
1395 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1396
1397 /* No further commands for this step, so let's figure
1398 * out what to do next */
1399
1400 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
1401
1402 switch (s->state) {
1403
1404 case SOCKET_START_PRE:
1405 if (success)
1406 socket_enter_start_post(s);
1407 else
1408 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1409 break;
1410
1411 case SOCKET_START_POST:
1412 if (success)
1413 socket_enter_listening(s);
1414 else
1415 socket_enter_stop_pre(s, false);
1416 break;
1417
1418 case SOCKET_STOP_PRE:
1419 case SOCKET_STOP_PRE_SIGTERM:
1420 case SOCKET_STOP_PRE_SIGKILL:
1421 socket_enter_stop_post(s, success);
1422 break;
1423
1424 case SOCKET_STOP_POST:
1425 case SOCKET_FINAL_SIGTERM:
1426 case SOCKET_FINAL_SIGKILL:
1427 socket_enter_dead(s, success);
1428 break;
1429
1430 default:
1431 assert_not_reached("Uh, control process died at wrong time.");
1432 }
1433 }
1434 }
1435
1436 static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1437 Socket *s = SOCKET(u);
1438
1439 assert(s);
1440 assert(elapsed == 1);
1441 assert(w == &s->timer_watch);
1442
1443 switch (s->state) {
1444
1445 case SOCKET_START_PRE:
1446 log_warning("%s starting timed out. Terminating.", u->meta.id);
1447 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1448
1449 case SOCKET_START_POST:
1450 log_warning("%s starting timed out. Stopping.", u->meta.id);
1451 socket_enter_stop_pre(s, false);
1452 break;
1453
1454 case SOCKET_STOP_PRE:
1455 log_warning("%s stopping timed out. Terminating.", u->meta.id);
1456 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1457 break;
1458
1459 case SOCKET_STOP_PRE_SIGTERM:
1460 log_warning("%s stopping timed out. Killing.", u->meta.id);
1461 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1462 break;
1463
1464 case SOCKET_STOP_PRE_SIGKILL:
1465 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
1466 socket_enter_stop_post(s, false);
1467 break;
1468
1469 case SOCKET_STOP_POST:
1470 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
1471 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1472 break;
1473
1474 case SOCKET_FINAL_SIGTERM:
1475 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
1476 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
1477 break;
1478
1479 case SOCKET_FINAL_SIGKILL:
1480 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
1481 socket_enter_dead(s, false);
1482 break;
1483
1484 default:
1485 assert_not_reached("Timeout at wrong time.");
1486 }
1487 }
1488
1489 int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1490 int *rfds;
1491 unsigned rn_fds, k;
1492 SocketPort *p;
1493
1494 assert(s);
1495 assert(fds);
1496 assert(n_fds);
1497
1498 /* Called from the service code for requesting our fds */
1499
1500 rn_fds = 0;
1501 LIST_FOREACH(port, p, s->ports)
1502 if (p->fd >= 0)
1503 rn_fds++;
1504
1505 if (!(rfds = new(int, rn_fds)) < 0)
1506 return -ENOMEM;
1507
1508 k = 0;
1509 LIST_FOREACH(port, p, s->ports)
1510 if (p->fd >= 0)
1511 rfds[k++] = p->fd;
1512
1513 assert(k == rn_fds);
1514
1515 *fds = rfds;
1516 *n_fds = rn_fds;
1517
1518 return 0;
1519 }
1520
1521 void socket_notify_service_dead(Socket *s) {
1522 assert(s);
1523
1524 /* The service is dead. Dang!
1525 *
1526 * This is strictly for one-instance-for-all-connections
1527 * services. */
1528
1529 if (s->state == SOCKET_RUNNING) {
1530 log_debug("%s got notified about service death.", s->meta.id);
1531 socket_enter_listening(s);
1532 }
1533 }
1534
1535 void socket_connection_unref(Socket *s) {
1536 assert(s);
1537
1538 /* The service is dead. Yay!
1539 *
1540 * This is strictly for one-onstance-per-connection
1541 * services. */
1542
1543 assert(s->n_connections > 0);
1544 s->n_connections--;
1545
1546 log_debug("%s: One connection closed, %u left.", s->meta.id, s->n_connections);
1547 }
1548
1549 static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1550 [SOCKET_DEAD] = "dead",
1551 [SOCKET_START_PRE] = "start-pre",
1552 [SOCKET_START_POST] = "start-post",
1553 [SOCKET_LISTENING] = "listening",
1554 [SOCKET_RUNNING] = "running",
1555 [SOCKET_STOP_PRE] = "stop-pre",
1556 [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1557 [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1558 [SOCKET_STOP_POST] = "stop-post",
1559 [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1560 [SOCKET_FINAL_SIGKILL] = "final-sigkill",
1561 [SOCKET_MAINTENANCE] = "maintenance"
1562 };
1563
1564 DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1565
1566 static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1567 [SOCKET_EXEC_START_PRE] = "StartPre",
1568 [SOCKET_EXEC_START_POST] = "StartPost",
1569 [SOCKET_EXEC_STOP_PRE] = "StopPre",
1570 [SOCKET_EXEC_STOP_POST] = "StopPost"
1571 };
1572
1573 DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1574
1575 const UnitVTable socket_vtable = {
1576 .suffix = ".socket",
1577
1578 .init = socket_init,
1579 .done = socket_done,
1580 .load = socket_load,
1581
1582 .coldplug = socket_coldplug,
1583
1584 .dump = socket_dump,
1585
1586 .start = socket_start,
1587 .stop = socket_stop,
1588
1589 .serialize = socket_serialize,
1590 .deserialize_item = socket_deserialize_item,
1591
1592 .active_state = socket_active_state,
1593 .sub_state_to_string = socket_sub_state_to_string,
1594
1595 .check_gc = socket_check_gc,
1596
1597 .fd_event = socket_fd_event,
1598 .sigchld_event = socket_sigchld_event,
1599 .timer_event = socket_timer_event,
1600
1601 .bus_message_handler = bus_socket_message_handler
1602 };