1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 Copyright 2010 Lennart Poettering
6 Permission is hereby granted, free of charge, to any person
7 obtaining a copy of this software and associated documentation files
8 (the "Software"), to deal in the Software without restriction,
9 including without limitation the rights to use, copy, modify, merge,
10 publish, distribute, sublicense, and/or sell copies of the Software,
11 and to permit persons to whom the Software is furnished to do so,
12 subject to the following conditions:
14 The above copyright notice and this permission notice shall be
15 included in all copies or substantial portions of the Software.
17 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
18 EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
19 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
20 NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
21 BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
22 ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
23 CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31 #include <sys/types.h>
33 #include <sys/socket.h>
36 #include <linux/fcntl.h>
38 #include <sys/fcntl.h>
40 #include <netinet/in.h>
50 #if defined(__linux__)
54 #include "sd-daemon.h"
57 #ifdef SD_EXPORT_SYMBOLS
59 #define _sd_export_ __attribute__ ((visibility("default")))
61 /* Don't export the symbols */
62 #define _sd_export_ __attribute__ ((visibility("hidden")))
68 _sd_export_ int sd_listen_fds(int unset_environment) {
70 #if defined(DISABLE_SYSTEMD) || !defined(__linux__)
78 if (!(e = getenv("LISTEN_PID"))) {
84 l = strtoul(e, &p, 10);
91 if (!p || *p || l <= 0) {
97 if (getpid() != (pid_t) l) {
102 if (!(e = getenv("LISTEN_FDS"))) {
108 l = strtoul(e, &p, 10);
120 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + (int) l; fd ++) {
123 if ((flags = fcntl(fd, F_GETFD)) < 0) {
128 if (flags & FD_CLOEXEC)
131 if (fcntl(fd, F_SETFD, flags | FD_CLOEXEC) < 0) {
140 if (unset_environment) {
141 unsetenv("LISTEN_PID");
142 unsetenv("LISTEN_FDS");
149 _sd_export_ int sd_is_fifo(int fd, const char *path) {
155 if (fstat(fd, &st_fd) < 0)
158 if (!S_ISFIFO(st_fd.st_mode))
164 if (stat(path, &st_path) < 0) {
166 if (errno == ENOENT || errno == ENOTDIR)
173 st_path.st_dev == st_fd.st_dev &&
174 st_path.st_ino == st_fd.st_ino;
180 _sd_export_ int sd_is_special(int fd, const char *path) {
186 if (fstat(fd, &st_fd) < 0)
189 if (!S_ISREG(st_fd.st_mode) && !S_ISCHR(st_fd.st_mode))
195 if (stat(path, &st_path) < 0) {
197 if (errno == ENOENT || errno == ENOTDIR)
203 if (S_ISREG(st_fd.st_mode) && S_ISREG(st_path.st_mode))
205 st_path.st_dev == st_fd.st_dev &&
206 st_path.st_ino == st_fd.st_ino;
207 else if (S_ISCHR(st_fd.st_mode) && S_ISCHR(st_path.st_mode))
208 return st_path.st_rdev == st_fd.st_rdev;
216 static int sd_is_socket_internal(int fd, int type, int listening) {
219 if (fd < 0 || type < 0)
222 if (fstat(fd, &st_fd) < 0)
225 if (!S_ISSOCK(st_fd.st_mode))
230 socklen_t l = sizeof(other_type);
232 if (getsockopt(fd, SOL_SOCKET, SO_TYPE, &other_type, &l) < 0)
235 if (l != sizeof(other_type))
238 if (other_type != type)
242 if (listening >= 0) {
244 socklen_t l = sizeof(accepting);
246 if (getsockopt(fd, SOL_SOCKET, SO_ACCEPTCONN, &accepting, &l) < 0)
249 if (l != sizeof(accepting))
252 if (!accepting != !listening)
259 union sockaddr_union {
261 struct sockaddr_in in4;
262 struct sockaddr_in6 in6;
263 struct sockaddr_un un;
264 struct sockaddr_storage storage;
267 _sd_export_ int sd_is_socket(int fd, int family, int type, int listening) {
273 if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
277 union sockaddr_union sockaddr;
280 memset(&sockaddr, 0, sizeof(sockaddr));
281 l = sizeof(sockaddr);
283 if (getsockname(fd, &sockaddr.sa, &l) < 0)
286 if (l < sizeof(sa_family_t))
289 return sockaddr.sa.sa_family == family;
295 _sd_export_ int sd_is_socket_inet(int fd, int family, int type, int listening, uint16_t port) {
296 union sockaddr_union sockaddr;
300 if (family != 0 && family != AF_INET && family != AF_INET6)
303 if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
306 memset(&sockaddr, 0, sizeof(sockaddr));
307 l = sizeof(sockaddr);
309 if (getsockname(fd, &sockaddr.sa, &l) < 0)
312 if (l < sizeof(sa_family_t))
315 if (sockaddr.sa.sa_family != AF_INET &&
316 sockaddr.sa.sa_family != AF_INET6)
320 if (sockaddr.sa.sa_family != family)
324 if (sockaddr.sa.sa_family == AF_INET) {
325 if (l < sizeof(struct sockaddr_in))
328 return htons(port) == sockaddr.in4.sin_port;
330 if (l < sizeof(struct sockaddr_in6))
333 return htons(port) == sockaddr.in6.sin6_port;
340 _sd_export_ int sd_is_socket_unix(int fd, int type, int listening, const char *path, size_t length) {
341 union sockaddr_union sockaddr;
345 if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
348 memset(&sockaddr, 0, sizeof(sockaddr));
349 l = sizeof(sockaddr);
351 if (getsockname(fd, &sockaddr.sa, &l) < 0)
354 if (l < sizeof(sa_family_t))
357 if (sockaddr.sa.sa_family != AF_UNIX)
362 length = strlen(path);
366 return l == offsetof(struct sockaddr_un, sun_path);
369 /* Normal path socket */
371 (l >= offsetof(struct sockaddr_un, sun_path) + length + 1) &&
372 memcmp(path, sockaddr.un.sun_path, length+1) == 0;
374 /* Abstract namespace socket */
376 (l == offsetof(struct sockaddr_un, sun_path) + length) &&
377 memcmp(path, sockaddr.un.sun_path, length) == 0;
383 _sd_export_ int sd_is_mq(int fd, const char *path) {
384 #if !defined(__linux__)
392 if (mq_getattr(fd, &attr) < 0)
396 char fpath[PATH_MAX];
402 if (fstat(fd, &a) < 0)
405 strncpy(stpcpy(fpath, "/dev/mqueue"), path, sizeof(fpath) - 12);
406 fpath[sizeof(fpath)-1] = 0;
408 if (stat(fpath, &b) < 0)
411 if (a.st_dev != b.st_dev ||
412 a.st_ino != b.st_ino)
420 _sd_export_ int sd_notify(int unset_environment, const char *state) {
421 #if defined(DISABLE_SYSTEMD) || !defined(__linux__) || !defined(SOCK_CLOEXEC)
425 struct msghdr msghdr;
427 union sockaddr_union sockaddr;
435 if (!(e = getenv("NOTIFY_SOCKET")))
438 /* Must be an abstract socket, or an absolute path */
439 if ((e[0] != '@' && e[0] != '/') || e[1] == 0) {
444 if ((fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0) {
449 memset(&sockaddr, 0, sizeof(sockaddr));
450 sockaddr.sa.sa_family = AF_UNIX;
451 strncpy(sockaddr.un.sun_path, e, sizeof(sockaddr.un.sun_path));
453 if (sockaddr.un.sun_path[0] == '@')
454 sockaddr.un.sun_path[0] = 0;
456 memset(&iovec, 0, sizeof(iovec));
457 iovec.iov_base = (char*) state;
458 iovec.iov_len = strlen(state);
460 memset(&msghdr, 0, sizeof(msghdr));
461 msghdr.msg_name = &sockaddr;
462 msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + strlen(e);
464 if (msghdr.msg_namelen > sizeof(struct sockaddr_un))
465 msghdr.msg_namelen = sizeof(struct sockaddr_un);
467 msghdr.msg_iov = &iovec;
468 msghdr.msg_iovlen = 1;
470 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0) {
478 if (unset_environment)
479 unsetenv("NOTIFY_SOCKET");
488 _sd_export_ int sd_notifyf(int unset_environment, const char *format, ...) {
489 #if defined(DISABLE_SYSTEMD) || !defined(__linux__)
496 va_start(ap, format);
497 r = vasprintf(&p, format, ap);
503 r = sd_notify(unset_environment, p);
510 _sd_export_ int sd_booted(void) {
511 #if defined(DISABLE_SYSTEMD) || !defined(__linux__)
517 /* We simply test whether the systemd cgroup hierarchy is
520 if (lstat("/sys/fs/cgroup", &a) < 0)
523 if (lstat("/sys/fs/cgroup/systemd", &b) < 0)
526 return a.st_dev != b.st_dev;