1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 Copyright 2010 Lennart Poettering
6 Permission is hereby granted, free of charge, to any person
7 obtaining a copy of this software and associated documentation files
8 (the "Software"), to deal in the Software without restriction,
9 including without limitation the rights to use, copy, modify, merge,
10 publish, distribute, sublicense, and/or sell copies of the Software,
11 and to permit persons to whom the Software is furnished to do so,
12 subject to the following conditions:
14 The above copyright notice and this permission notice shall be
15 included in all copies or substantial portions of the Software.
17 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
18 EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
19 MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
20 NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
21 BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
22 ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
23 CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31 #include <sys/types.h>
33 #include <sys/socket.h>
36 #include <linux/fcntl.h>
38 #include <sys/fcntl.h>
40 #include <netinet/in.h>
50 #if defined(__linux__)
54 #include "sd-daemon.h"
57 #ifdef SD_EXPORT_SYMBOLS
59 #define _sd_export_ __attribute__ ((visibility("default")))
61 /* Don't export the symbols */
62 #define _sd_export_ __attribute__ ((visibility("hidden")))
68 _sd_export_ int sd_listen_fds(int unset_environment) {
70 #if defined(DISABLE_SYSTEMD) || !defined(__linux__)
78 if (!(e = getenv("LISTEN_PID"))) {
84 l = strtoul(e, &p, 10);
91 if (!p || *p || l <= 0) {
97 if (getpid() != (pid_t) l) {
102 if (!(e = getenv("LISTEN_FDS"))) {
108 l = strtoul(e, &p, 10);
120 for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + (int) l; fd ++) {
123 if ((flags = fcntl(fd, F_GETFD)) < 0) {
128 if (flags & FD_CLOEXEC)
131 if (fcntl(fd, F_SETFD, flags | FD_CLOEXEC) < 0) {
140 if (unset_environment) {
141 unsetenv("LISTEN_PID");
142 unsetenv("LISTEN_FDS");
149 _sd_export_ int sd_is_fifo(int fd, const char *path) {
155 memset(&st_fd, 0, sizeof(st_fd));
156 if (fstat(fd, &st_fd) < 0)
159 if (!S_ISFIFO(st_fd.st_mode))
165 memset(&st_path, 0, sizeof(st_path));
166 if (stat(path, &st_path) < 0) {
168 if (errno == ENOENT || errno == ENOTDIR)
175 st_path.st_dev == st_fd.st_dev &&
176 st_path.st_ino == st_fd.st_ino;
182 _sd_export_ int sd_is_special(int fd, const char *path) {
188 if (fstat(fd, &st_fd) < 0)
191 if (!S_ISREG(st_fd.st_mode) && !S_ISCHR(st_fd.st_mode))
197 if (stat(path, &st_path) < 0) {
199 if (errno == ENOENT || errno == ENOTDIR)
205 if (S_ISREG(st_fd.st_mode) && S_ISREG(st_path.st_mode))
207 st_path.st_dev == st_fd.st_dev &&
208 st_path.st_ino == st_fd.st_ino;
209 else if (S_ISCHR(st_fd.st_mode) && S_ISCHR(st_path.st_mode))
210 return st_path.st_rdev == st_fd.st_rdev;
218 static int sd_is_socket_internal(int fd, int type, int listening) {
221 if (fd < 0 || type < 0)
224 if (fstat(fd, &st_fd) < 0)
227 if (!S_ISSOCK(st_fd.st_mode))
232 socklen_t l = sizeof(other_type);
234 if (getsockopt(fd, SOL_SOCKET, SO_TYPE, &other_type, &l) < 0)
237 if (l != sizeof(other_type))
240 if (other_type != type)
244 if (listening >= 0) {
246 socklen_t l = sizeof(accepting);
248 if (getsockopt(fd, SOL_SOCKET, SO_ACCEPTCONN, &accepting, &l) < 0)
251 if (l != sizeof(accepting))
254 if (!accepting != !listening)
261 union sockaddr_union {
263 struct sockaddr_in in4;
264 struct sockaddr_in6 in6;
265 struct sockaddr_un un;
266 struct sockaddr_storage storage;
269 _sd_export_ int sd_is_socket(int fd, int family, int type, int listening) {
275 if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
279 union sockaddr_union sockaddr;
282 memset(&sockaddr, 0, sizeof(sockaddr));
283 l = sizeof(sockaddr);
285 if (getsockname(fd, &sockaddr.sa, &l) < 0)
288 if (l < sizeof(sa_family_t))
291 return sockaddr.sa.sa_family == family;
297 _sd_export_ int sd_is_socket_inet(int fd, int family, int type, int listening, uint16_t port) {
298 union sockaddr_union sockaddr;
302 if (family != 0 && family != AF_INET && family != AF_INET6)
305 if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
308 memset(&sockaddr, 0, sizeof(sockaddr));
309 l = sizeof(sockaddr);
311 if (getsockname(fd, &sockaddr.sa, &l) < 0)
314 if (l < sizeof(sa_family_t))
317 if (sockaddr.sa.sa_family != AF_INET &&
318 sockaddr.sa.sa_family != AF_INET6)
322 if (sockaddr.sa.sa_family != family)
326 if (sockaddr.sa.sa_family == AF_INET) {
327 if (l < sizeof(struct sockaddr_in))
330 return htons(port) == sockaddr.in4.sin_port;
332 if (l < sizeof(struct sockaddr_in6))
335 return htons(port) == sockaddr.in6.sin6_port;
342 _sd_export_ int sd_is_socket_unix(int fd, int type, int listening, const char *path, size_t length) {
343 union sockaddr_union sockaddr;
347 if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
350 memset(&sockaddr, 0, sizeof(sockaddr));
351 l = sizeof(sockaddr);
353 if (getsockname(fd, &sockaddr.sa, &l) < 0)
356 if (l < sizeof(sa_family_t))
359 if (sockaddr.sa.sa_family != AF_UNIX)
364 length = strlen(path);
368 return l == offsetof(struct sockaddr_un, sun_path);
371 /* Normal path socket */
373 (l >= offsetof(struct sockaddr_un, sun_path) + length + 1) &&
374 memcmp(path, sockaddr.un.sun_path, length+1) == 0;
376 /* Abstract namespace socket */
378 (l == offsetof(struct sockaddr_un, sun_path) + length) &&
379 memcmp(path, sockaddr.un.sun_path, length) == 0;
385 _sd_export_ int sd_is_mq(int fd, const char *path) {
386 #if !defined(__linux__)
394 if (mq_getattr(fd, &attr) < 0)
398 char fpath[PATH_MAX];
404 if (fstat(fd, &a) < 0)
407 strncpy(stpcpy(fpath, "/dev/mqueue"), path, sizeof(fpath) - 12);
408 fpath[sizeof(fpath)-1] = 0;
410 if (stat(fpath, &b) < 0)
413 if (a.st_dev != b.st_dev ||
414 a.st_ino != b.st_ino)
422 _sd_export_ int sd_notify(int unset_environment, const char *state) {
423 #if defined(DISABLE_SYSTEMD) || !defined(__linux__) || !defined(SOCK_CLOEXEC)
427 struct msghdr msghdr;
429 union sockaddr_union sockaddr;
437 if (!(e = getenv("NOTIFY_SOCKET")))
440 /* Must be an abstract socket, or an absolute path */
441 if ((e[0] != '@' && e[0] != '/') || e[1] == 0) {
446 if ((fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0) {
451 memset(&sockaddr, 0, sizeof(sockaddr));
452 sockaddr.sa.sa_family = AF_UNIX;
453 strncpy(sockaddr.un.sun_path, e, sizeof(sockaddr.un.sun_path));
455 if (sockaddr.un.sun_path[0] == '@')
456 sockaddr.un.sun_path[0] = 0;
458 memset(&iovec, 0, sizeof(iovec));
459 iovec.iov_base = (char*) state;
460 iovec.iov_len = strlen(state);
462 memset(&msghdr, 0, sizeof(msghdr));
463 msghdr.msg_name = &sockaddr;
464 msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + strlen(e);
466 if (msghdr.msg_namelen > sizeof(struct sockaddr_un))
467 msghdr.msg_namelen = sizeof(struct sockaddr_un);
469 msghdr.msg_iov = &iovec;
470 msghdr.msg_iovlen = 1;
472 if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0) {
480 if (unset_environment)
481 unsetenv("NOTIFY_SOCKET");
490 _sd_export_ int sd_notifyf(int unset_environment, const char *format, ...) {
491 #if defined(DISABLE_SYSTEMD) || !defined(__linux__)
498 va_start(ap, format);
499 r = vasprintf(&p, format, ap);
505 r = sd_notify(unset_environment, p);
512 _sd_export_ int sd_booted(void) {
513 #if defined(DISABLE_SYSTEMD) || !defined(__linux__)
519 /* We simply test whether the systemd cgroup hierarchy is
522 if (lstat("/sys/fs/cgroup", &a) < 0)
525 if (lstat("/sys/fs/cgroup/systemd", &b) < 0)
528 return a.st_dev != b.st_dev;