chiark / gitweb /
socket: add optional libwrap support
[elogind.git] / src / socket.c
1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <sys/types.h>
23 #include <sys/stat.h>
24 #include <unistd.h>
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <sys/epoll.h>
28 #include <signal.h>
29 #include <arpa/inet.h>
30
31 #include "unit.h"
32 #include "socket.h"
33 #include "log.h"
34 #include "load-dropin.h"
35 #include "load-fragment.h"
36 #include "strv.h"
37 #include "unit-name.h"
38 #include "dbus-socket.h"
39 #include "tcpwrap.h"
40
41 static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
42         [SOCKET_DEAD] = UNIT_INACTIVE,
43         [SOCKET_START_PRE] = UNIT_ACTIVATING,
44         [SOCKET_START_POST] = UNIT_ACTIVATING,
45         [SOCKET_LISTENING] = UNIT_ACTIVE,
46         [SOCKET_RUNNING] = UNIT_ACTIVE,
47         [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
48         [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
49         [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
50         [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
51         [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
52         [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
53         [SOCKET_MAINTENANCE] = UNIT_INACTIVE,
54 };
55
56 static void socket_init(Unit *u) {
57         Socket *s = SOCKET(u);
58
59         assert(u);
60         assert(u->meta.load_state == UNIT_STUB);
61
62         s->backlog = SOMAXCONN;
63         s->timeout_usec = DEFAULT_TIMEOUT_USEC;
64         s->directory_mode = 0755;
65         s->socket_mode = 0666;
66
67         exec_context_init(&s->exec_context);
68
69         s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
70 }
71
72 static void socket_unwatch_control_pid(Socket *s) {
73         assert(s);
74
75         if (s->control_pid <= 0)
76                 return;
77
78         unit_unwatch_pid(UNIT(s), s->control_pid);
79         s->control_pid = 0;
80 }
81
82 static void socket_done(Unit *u) {
83         Socket *s = SOCKET(u);
84         SocketPort *p;
85
86         assert(s);
87
88         while ((p = s->ports)) {
89                 LIST_REMOVE(SocketPort, port, s->ports, p);
90
91                 if (p->fd >= 0) {
92                         unit_unwatch_fd(UNIT(s), &p->fd_watch);
93                         close_nointr_nofail(p->fd);
94                 }
95
96                 free(p->path);
97                 free(p);
98         }
99
100         exec_context_done(&s->exec_context);
101         exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
102         s->control_command = NULL;
103
104         socket_unwatch_control_pid(s);
105
106         s->service = NULL;
107
108         free(s->bind_to_device);
109         s->bind_to_device = NULL;
110
111         free(s->tcpwrap_name);
112         s->tcpwrap_name = NULL;
113
114         unit_unwatch_timer(u, &s->timer_watch);
115 }
116
117 static bool have_non_accept_socket(Socket *s) {
118         SocketPort *p;
119
120         assert(s);
121
122         if (!s->accept)
123                 return true;
124
125         LIST_FOREACH(port, p, s->ports) {
126
127                 if (p->type != SOCKET_SOCKET)
128                         return true;
129
130                 if (!socket_address_can_accept(&p->address))
131                         return true;
132         }
133
134         return false;
135 }
136
137 static int socket_verify(Socket *s) {
138         assert(s);
139
140         if (UNIT(s)->meta.load_state != UNIT_LOADED)
141                 return 0;
142
143         if (!s->ports) {
144                 log_error("%s lacks Listen setting. Refusing.", UNIT(s)->meta.id);
145                 return -EINVAL;
146         }
147
148         return 0;
149 }
150
151 static bool socket_needs_mount(Socket *s, const char *prefix) {
152         SocketPort *p;
153
154         assert(s);
155
156         LIST_FOREACH(port, p, s->ports) {
157
158                 if (p->type == SOCKET_SOCKET) {
159                         if (socket_address_needs_mount(&p->address, prefix))
160                                 return true;
161                 } else {
162                         assert(p->type == SOCKET_FIFO);
163                         if (path_startswith(p->path, prefix))
164                                 return true;
165                 }
166         }
167
168         return false;
169 }
170
171 int socket_add_one_mount_link(Socket *s, Mount *m) {
172         int r;
173
174         assert(s);
175         assert(m);
176
177         if (s->meta.load_state != UNIT_LOADED ||
178             m->meta.load_state != UNIT_LOADED)
179                 return 0;
180
181         if (!socket_needs_mount(s, m->where))
182                 return 0;
183
184         if ((r = unit_add_dependency(UNIT(m), UNIT_BEFORE, UNIT(s), true)) < 0)
185                 return r;
186
187         if ((r = unit_add_dependency(UNIT(s), UNIT_REQUIRES, UNIT(m), true)) < 0)
188                 return r;
189
190         return 0;
191 }
192
193 static int socket_add_mount_links(Socket *s) {
194         Meta *other;
195         int r;
196
197         assert(s);
198
199         LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
200                 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
201                         return r;
202
203         return 0;
204 }
205
206 static int socket_add_device_link(Socket *s) {
207         char *t;
208         int r;
209
210         assert(s);
211
212         if (!s->bind_to_device)
213                 return 0;
214
215         if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
216                 return -ENOMEM;
217
218         r = unit_add_node_link(UNIT(s), t, false);
219         free(t);
220
221         return r;
222 }
223
224 static int socket_load(Unit *u) {
225         Socket *s = SOCKET(u);
226         int r;
227
228         assert(u);
229         assert(u->meta.load_state == UNIT_STUB);
230
231         if ((r = unit_load_fragment_and_dropin(u)) < 0)
232                 return r;
233
234         /* This is a new unit? Then let's add in some extras */
235         if (u->meta.load_state == UNIT_LOADED) {
236
237                 if (have_non_accept_socket(s)) {
238                         if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)))
239                                 return r;
240
241                         if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
242                                 return r;
243                 }
244
245                 if ((r = socket_add_mount_links(s)) < 0)
246                         return r;
247
248                 if ((r = socket_add_device_link(s)) < 0)
249                         return r;
250
251                 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
252                         return r;
253
254                 if ((r = unit_add_default_cgroup(u)) < 0)
255                         return r;
256         }
257
258         return socket_verify(s);
259 }
260
261 static const char* listen_lookup(int type) {
262
263         if (type == SOCK_STREAM)
264                 return "ListenStream";
265         else if (type == SOCK_DGRAM)
266                 return "ListenDatagram";
267         else if (type == SOCK_SEQPACKET)
268                 return "ListenSequentialPacket";
269
270         assert_not_reached("Unknown socket type");
271         return NULL;
272 }
273
274 static void socket_dump(Unit *u, FILE *f, const char *prefix) {
275
276         SocketExecCommand c;
277         Socket *s = SOCKET(u);
278         SocketPort *p;
279         const char *prefix2;
280         char *p2;
281
282         assert(s);
283         assert(f);
284
285         p2 = strappend(prefix, "\t");
286         prefix2 = p2 ? p2 : prefix;
287
288         fprintf(f,
289                 "%sSocket State: %s\n"
290                 "%sBindIPv6Only: %s\n"
291                 "%sBacklog: %u\n"
292                 "%sKillMode: %s\n"
293                 "%sSocketMode: %04o\n"
294                 "%sDirectoryMode: %04o\n",
295                 prefix, socket_state_to_string(s->state),
296                 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
297                 prefix, s->backlog,
298                 prefix, kill_mode_to_string(s->kill_mode),
299                 prefix, s->socket_mode,
300                 prefix, s->directory_mode);
301
302         if (s->control_pid > 0)
303                 fprintf(f,
304                         "%sControl PID: %llu\n",
305                         prefix, (unsigned long long) s->control_pid);
306
307         if (s->bind_to_device)
308                 fprintf(f,
309                         "%sBindToDevice: %s\n",
310                         prefix, s->bind_to_device);
311
312         if (s->tcpwrap_name)
313                 fprintf(f,
314                         "%sTCPWrapName: %s\n",
315                         prefix, s->tcpwrap_name);
316
317         if (s->accept)
318                 fprintf(f,
319                         "%sAccepted: %u\n",
320                         prefix, s->n_accepted);
321
322         LIST_FOREACH(port, p, s->ports) {
323
324                 if (p->type == SOCKET_SOCKET) {
325                         const char *t;
326                         int r;
327                         char *k;
328
329                         if ((r = socket_address_print(&p->address, &k)) < 0)
330                                 t = strerror(-r);
331                         else
332                                 t = k;
333
334                         fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
335                         free(k);
336                 } else
337                         fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
338         }
339
340         exec_context_dump(&s->exec_context, f, prefix);
341
342         for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
343                 if (!s->exec_command[c])
344                         continue;
345
346                 fprintf(f, "%s-> %s:\n",
347                         prefix, socket_exec_command_to_string(c));
348
349                 exec_command_dump_list(s->exec_command[c], f, prefix2);
350         }
351
352         free(p2);
353 }
354
355 static int instance_from_socket(int fd, unsigned nr, char **instance) {
356         socklen_t l;
357         char *r;
358         union {
359                 struct sockaddr sa;
360                 struct sockaddr_un un;
361                 struct sockaddr_in in;
362                 struct sockaddr_in6 in6;
363                 struct sockaddr_storage storage;
364         } local, remote;
365
366         assert(fd >= 0);
367         assert(instance);
368
369         l = sizeof(local);
370         if (getsockname(fd, &local.sa, &l) < 0)
371                 return -errno;
372
373         l = sizeof(remote);
374         if (getpeername(fd, &remote.sa, &l) < 0)
375                 return -errno;
376
377         switch (local.sa.sa_family) {
378
379         case AF_INET: {
380                 uint32_t
381                         a = ntohl(local.in.sin_addr.s_addr),
382                         b = ntohl(remote.in.sin_addr.s_addr);
383
384                 if (asprintf(&r,
385                              "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
386                              nr,
387                              a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
388                              ntohs(local.in.sin_port),
389                              b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
390                              ntohs(remote.in.sin_port)) < 0)
391                         return -ENOMEM;
392
393                 break;
394         }
395
396         case AF_INET6: {
397                 static const char ipv4_prefix[] = {
398                         0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
399                 };
400
401                 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
402                     memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
403                         const uint8_t
404                                 *a = local.in6.sin6_addr.s6_addr+12,
405                                 *b = remote.in6.sin6_addr.s6_addr+12;
406
407                         if (asprintf(&r,
408                                      "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
409                                      nr,
410                                      a[0], a[1], a[2], a[3],
411                                      ntohs(local.in6.sin6_port),
412                                      b[0], b[1], b[2], b[3],
413                                      ntohs(remote.in6.sin6_port)) < 0)
414                                 return -ENOMEM;
415                 } else {
416                         char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
417
418                         if (asprintf(&r,
419                                      "%u-%s:%u-%s:%u",
420                                      nr,
421                                      inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
422                                      ntohs(local.in6.sin6_port),
423                                      inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
424                                      ntohs(remote.in6.sin6_port)) < 0)
425                                 return -ENOMEM;
426                 }
427
428                 break;
429         }
430
431         case AF_UNIX: {
432                 struct ucred ucred;
433
434                 l = sizeof(ucred);
435                 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
436                         return -errno;
437
438                 if (asprintf(&r,
439                              "%u-%llu-%llu",
440                              nr,
441                              (unsigned long long) ucred.pid,
442                              (unsigned long long) ucred.uid) < 0)
443                         return -ENOMEM;
444
445                 break;
446         }
447
448         default:
449                 assert_not_reached("Unhandled socket type.");
450         }
451
452         *instance = r;
453         return 0;
454 }
455
456 static void socket_close_fds(Socket *s) {
457         SocketPort *p;
458
459         assert(s);
460
461         LIST_FOREACH(port, p, s->ports) {
462                 if (p->fd < 0)
463                         continue;
464
465                 unit_unwatch_fd(UNIT(s), &p->fd_watch);
466                 close_nointr_nofail(p->fd);
467
468                 /* One little note: we should never delete any sockets
469                  * in the file system here! After all some other
470                  * process we spawned might still have a reference of
471                  * this fd and wants to continue to use it. Therefore
472                  * we delete sockets in the file system before we
473                  * create a new one, not after we stopped using
474                  * one! */
475
476                 p->fd = -1;
477         }
478 }
479
480 static int socket_open_fds(Socket *s) {
481         SocketPort *p;
482         int r;
483
484         assert(s);
485
486         LIST_FOREACH(port, p, s->ports) {
487
488                 if (p->fd >= 0)
489                         continue;
490
491                 if (p->type == SOCKET_SOCKET) {
492
493                         if ((r = socket_address_listen(
494                                              &p->address,
495                                              s->backlog,
496                                              s->bind_ipv6_only,
497                                              s->bind_to_device,
498                                              s->directory_mode,
499                                              s->socket_mode,
500                                              &p->fd)) < 0)
501                                 goto rollback;
502
503                 } else {
504                         struct stat st;
505                         assert(p->type == SOCKET_FIFO);
506
507                         mkdir_parents(p->path, s->directory_mode);
508
509                         if (mkfifo(p->path, s->socket_mode) < 0 && errno != EEXIST) {
510                                 r = -errno;
511                                 goto rollback;
512                         }
513
514                         if ((p->fd = open(p->path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
515                                 r = -errno;
516                                 goto rollback;
517                         }
518
519                         if (fstat(p->fd, &st) < 0) {
520                                 r = -errno;
521                                 goto rollback;
522                         }
523
524                         /* FIXME verify user, access mode */
525
526                         if (!S_ISFIFO(st.st_mode)) {
527                                 r = -EEXIST;
528                                 goto rollback;
529                         }
530                 }
531         }
532
533         return 0;
534
535 rollback:
536         socket_close_fds(s);
537         return r;
538 }
539
540 static void socket_unwatch_fds(Socket *s) {
541         SocketPort *p;
542
543         assert(s);
544
545         LIST_FOREACH(port, p, s->ports) {
546                 if (p->fd < 0)
547                         continue;
548
549                 unit_unwatch_fd(UNIT(s), &p->fd_watch);
550         }
551 }
552
553 static int socket_watch_fds(Socket *s) {
554         SocketPort *p;
555         int r;
556
557         assert(s);
558
559         LIST_FOREACH(port, p, s->ports) {
560                 if (p->fd < 0)
561                         continue;
562
563                 p->fd_watch.socket_accept =
564                         s->accept &&
565                         p->type == SOCKET_SOCKET &&
566                         socket_address_can_accept(&p->address);
567
568                 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
569                         goto fail;
570         }
571
572         return 0;
573
574 fail:
575         socket_unwatch_fds(s);
576         return r;
577 }
578
579 static void socket_set_state(Socket *s, SocketState state) {
580         SocketState old_state;
581         assert(s);
582
583         old_state = s->state;
584         s->state = state;
585
586         if (state != SOCKET_START_PRE &&
587             state != SOCKET_START_POST &&
588             state != SOCKET_STOP_PRE &&
589             state != SOCKET_STOP_PRE_SIGTERM &&
590             state != SOCKET_STOP_PRE_SIGKILL &&
591             state != SOCKET_STOP_POST &&
592             state != SOCKET_FINAL_SIGTERM &&
593             state != SOCKET_FINAL_SIGKILL) {
594                 unit_unwatch_timer(UNIT(s), &s->timer_watch);
595                 socket_unwatch_control_pid(s);
596                 s->control_command = NULL;
597                 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
598         }
599
600         if (state != SOCKET_LISTENING)
601                 socket_unwatch_fds(s);
602
603         if (state != SOCKET_START_POST &&
604             state != SOCKET_LISTENING &&
605             state != SOCKET_RUNNING &&
606             state != SOCKET_STOP_PRE &&
607             state != SOCKET_STOP_PRE_SIGTERM &&
608             state != SOCKET_STOP_PRE_SIGKILL)
609                 socket_close_fds(s);
610
611         if (state != old_state)
612                 log_debug("%s changed %s -> %s",
613                           s->meta.id,
614                           socket_state_to_string(old_state),
615                           socket_state_to_string(state));
616
617         unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
618 }
619
620 static int socket_coldplug(Unit *u) {
621         Socket *s = SOCKET(u);
622         int r;
623
624         assert(s);
625         assert(s->state == SOCKET_DEAD);
626
627         if (s->deserialized_state != s->state) {
628
629                 if (s->deserialized_state == SOCKET_START_PRE ||
630                     s->deserialized_state == SOCKET_START_POST ||
631                     s->deserialized_state == SOCKET_STOP_PRE ||
632                     s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
633                     s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
634                     s->deserialized_state == SOCKET_STOP_POST ||
635                     s->deserialized_state == SOCKET_FINAL_SIGTERM ||
636                     s->deserialized_state == SOCKET_FINAL_SIGKILL) {
637
638                         if (s->control_pid <= 0)
639                                 return -EBADMSG;
640
641                         if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
642                                 return r;
643
644                         if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
645                                 return r;
646                 }
647
648                 if (s->deserialized_state == SOCKET_START_POST ||
649                     s->deserialized_state == SOCKET_LISTENING ||
650                     s->deserialized_state == SOCKET_RUNNING ||
651                     s->deserialized_state == SOCKET_STOP_PRE ||
652                     s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
653                     s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
654                         if ((r = socket_open_fds(s)) < 0)
655                                 return r;
656
657                 if (s->deserialized_state == SOCKET_LISTENING)
658                         if ((r = socket_watch_fds(s)) < 0)
659                                 return r;
660
661                 socket_set_state(s, s->deserialized_state);
662         }
663
664         return 0;
665 }
666
667 static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
668         pid_t pid;
669         int r;
670         char **argv;
671
672         assert(s);
673         assert(c);
674         assert(_pid);
675
676         if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
677                 goto fail;
678
679         if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
680                 r = -ENOMEM;
681                 goto fail;
682         }
683
684         r = exec_spawn(c,
685                        argv,
686                        &s->exec_context,
687                        NULL, 0,
688                        s->meta.manager->environment,
689                        true,
690                        true,
691                        UNIT(s)->meta.manager->confirm_spawn,
692                        UNIT(s)->meta.cgroup_bondings,
693                        &pid);
694
695         strv_free(argv);
696         if (r < 0)
697                 goto fail;
698
699         if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
700                 /* FIXME: we need to do something here */
701                 goto fail;
702
703         *_pid = pid;
704
705         return 0;
706
707 fail:
708         unit_unwatch_timer(UNIT(s), &s->timer_watch);
709
710         return r;
711 }
712
713 static void socket_enter_dead(Socket *s, bool success) {
714         assert(s);
715
716         if (!success)
717                 s->failure = true;
718
719         socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
720 }
721
722 static void socket_enter_signal(Socket *s, SocketState state, bool success);
723
724 static void socket_enter_stop_post(Socket *s, bool success) {
725         int r;
726         assert(s);
727
728         if (!success)
729                 s->failure = true;
730
731         socket_unwatch_control_pid(s);
732
733         s->control_command_id = SOCKET_EXEC_STOP_POST;
734
735         if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
736                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
737                         goto fail;
738
739                 socket_set_state(s, SOCKET_STOP_POST);
740         } else
741                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
742
743         return;
744
745 fail:
746         log_warning("%s failed to run stop-post executable: %s", s->meta.id, strerror(-r));
747         socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
748 }
749
750 static void socket_enter_signal(Socket *s, SocketState state, bool success) {
751         int r;
752         bool sent = false;
753
754         assert(s);
755
756         if (!success)
757                 s->failure = true;
758
759         if (s->kill_mode != KILL_NONE) {
760                 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? SIGTERM : SIGKILL;
761
762                 if (s->kill_mode == KILL_CONTROL_GROUP) {
763
764                         if ((r = cgroup_bonding_kill_list(UNIT(s)->meta.cgroup_bondings, sig)) < 0) {
765                                 if (r != -EAGAIN && r != -ESRCH)
766                                         goto fail;
767                         } else
768                                 sent = true;
769                 }
770
771                 if (!sent && s->control_pid > 0)
772                         if (kill(s->kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
773                                 r = -errno;
774                                 goto fail;
775                         }
776         }
777
778         if (sent && s->control_pid > 0) {
779                 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
780                         goto fail;
781
782                 socket_set_state(s, state);
783         } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
784                 socket_enter_stop_post(s, true);
785         else
786                 socket_enter_dead(s, true);
787
788         return;
789
790 fail:
791         log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
792
793         if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
794                 socket_enter_stop_post(s, false);
795         else
796                 socket_enter_dead(s, false);
797 }
798
799 static void socket_enter_stop_pre(Socket *s, bool success) {
800         int r;
801         assert(s);
802
803         if (!success)
804                 s->failure = true;
805
806         socket_unwatch_control_pid(s);
807
808         s->control_command_id = SOCKET_EXEC_STOP_PRE;
809
810         if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
811                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
812                         goto fail;
813
814                 socket_set_state(s, SOCKET_STOP_PRE);
815         } else
816                 socket_enter_stop_post(s, true);
817
818         return;
819
820 fail:
821         log_warning("%s failed to run stop-pre executable: %s", s->meta.id, strerror(-r));
822         socket_enter_stop_post(s, false);
823 }
824
825 static void socket_enter_listening(Socket *s) {
826         int r;
827         assert(s);
828
829         if ((r = socket_watch_fds(s)) < 0) {
830                 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
831                 goto fail;
832         }
833
834         socket_set_state(s, SOCKET_LISTENING);
835         return;
836
837 fail:
838         socket_enter_stop_pre(s, false);
839 }
840
841 static void socket_enter_start_post(Socket *s) {
842         int r;
843         assert(s);
844
845         if ((r = socket_open_fds(s)) < 0) {
846                 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
847                 goto fail;
848         }
849
850         socket_unwatch_control_pid(s);
851
852         s->control_command_id = SOCKET_EXEC_START_POST;
853
854         if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
855                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
856                         log_warning("%s failed to run start-post executable: %s", s->meta.id, strerror(-r));
857                         goto fail;
858                 }
859
860                 socket_set_state(s, SOCKET_START_POST);
861         } else
862                 socket_enter_listening(s);
863
864         return;
865
866 fail:
867         socket_enter_stop_pre(s, false);
868 }
869
870 static void socket_enter_start_pre(Socket *s) {
871         int r;
872         assert(s);
873
874         socket_unwatch_control_pid(s);
875
876         s->control_command_id = SOCKET_EXEC_START_PRE;
877
878         if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
879                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
880                         goto fail;
881
882                 socket_set_state(s, SOCKET_START_PRE);
883         } else
884                 socket_enter_start_post(s);
885
886         return;
887
888 fail:
889         log_warning("%s failed to run start-pre exectuable: %s", s->meta.id, strerror(-r));
890         socket_enter_dead(s, false);
891 }
892
893 static void socket_enter_running(Socket *s, int cfd) {
894         int r;
895
896         assert(s);
897
898         if (cfd < 0) {
899                 if ((r = manager_add_job(UNIT(s)->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, NULL)) < 0)
900                         goto fail;
901
902                 socket_set_state(s, SOCKET_RUNNING);
903         } else {
904                 Unit *u;
905                 char *prefix, *instance, *name;
906
907                 if ((r = instance_from_socket(cfd, s->n_accepted++, &instance)) < 0)
908                         goto fail;
909
910                 if (!(prefix = unit_name_to_prefix(UNIT(s)->meta.id))) {
911                         free(instance);
912                         r = -ENOMEM;
913                         goto fail;
914                 }
915
916                 name = unit_name_build(prefix, instance, ".service");
917                 free(prefix);
918                 free(instance);
919
920                 if (!name) {
921                         r = -ENOMEM;
922                         goto fail;
923                 }
924
925                 r = manager_load_unit(UNIT(s)->meta.manager, name, NULL, &u);
926                 free(name);
927
928                 if (r < 0)
929                         goto fail;
930
931                 if ((r = service_set_socket_fd(SERVICE(u), cfd)) < 0)
932                         goto fail;
933
934                 cfd = -1;
935
936                 if ((r = manager_add_job(u->meta.manager, JOB_START, u, JOB_REPLACE, true, NULL)) < 0)
937                         goto fail;
938         }
939
940         return;
941
942 fail:
943         log_warning("%s failed to queue socket startup job: %s", s->meta.id, strerror(-r));
944         socket_enter_stop_pre(s, false);
945
946         if (cfd >= 0)
947                 close_nointr_nofail(cfd);
948 }
949
950 static void socket_run_next(Socket *s, bool success) {
951         int r;
952
953         assert(s);
954         assert(s->control_command);
955         assert(s->control_command->command_next);
956
957         if (!success)
958                 s->failure = true;
959
960         socket_unwatch_control_pid(s);
961
962         s->control_command = s->control_command->command_next;
963
964         if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
965                 goto fail;
966
967         return;
968
969 fail:
970         log_warning("%s failed to run spawn next executable: %s", s->meta.id, strerror(-r));
971
972         if (s->state == SOCKET_START_POST)
973                 socket_enter_stop_pre(s, false);
974         else if (s->state == SOCKET_STOP_POST)
975                 socket_enter_dead(s, false);
976         else
977                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
978 }
979
980 static int socket_start(Unit *u) {
981         Socket *s = SOCKET(u);
982
983         assert(s);
984
985         /* We cannot fulfill this request right now, try again later
986          * please! */
987         if (s->state == SOCKET_STOP_PRE ||
988             s->state == SOCKET_STOP_PRE_SIGKILL ||
989             s->state == SOCKET_STOP_PRE_SIGTERM ||
990             s->state == SOCKET_STOP_POST ||
991             s->state == SOCKET_FINAL_SIGTERM ||
992             s->state == SOCKET_FINAL_SIGKILL)
993                 return -EAGAIN;
994
995         if (s->state == SOCKET_START_PRE ||
996             s->state == SOCKET_START_POST)
997                 return 0;
998
999         /* Cannot run this without the service being around */
1000         if (s->service) {
1001                 if (s->service->meta.load_state != UNIT_LOADED)
1002                         return -ENOENT;
1003
1004                 /* If the service is alredy actvie we cannot start the
1005                  * socket */
1006                 if (s->service->state != SERVICE_DEAD &&
1007                     s->service->state != SERVICE_MAINTENANCE &&
1008                     s->service->state != SERVICE_AUTO_RESTART)
1009                         return -EBUSY;
1010         }
1011
1012         assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
1013
1014         s->failure = false;
1015         socket_enter_start_pre(s);
1016         return 0;
1017 }
1018
1019 static int socket_stop(Unit *u) {
1020         Socket *s = SOCKET(u);
1021
1022         assert(s);
1023
1024         /* We cannot fulfill this request right now, try again later
1025          * please! */
1026         if (s->state == SOCKET_START_PRE ||
1027             s->state == SOCKET_START_POST)
1028                 return -EAGAIN;
1029
1030         /* Already on it */
1031         if (s->state == SOCKET_STOP_PRE ||
1032             s->state == SOCKET_STOP_PRE_SIGTERM ||
1033             s->state == SOCKET_STOP_PRE_SIGKILL ||
1034             s->state == SOCKET_STOP_POST ||
1035             s->state == SOCKET_FINAL_SIGTERM ||
1036             s->state == SOCKET_FINAL_SIGTERM)
1037                 return 0;
1038
1039         assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
1040
1041         socket_enter_stop_pre(s, true);
1042         return 0;
1043 }
1044
1045 static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1046         Socket *s = SOCKET(u);
1047         SocketPort *p;
1048         int r;
1049
1050         assert(u);
1051         assert(f);
1052         assert(fds);
1053
1054         unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1055         unit_serialize_item(u, f, "failure", yes_no(s->failure));
1056         unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1057
1058         if (s->control_pid > 0)
1059                 unit_serialize_item_format(u, f, "control-pid", "%u", (unsigned) s->control_pid);
1060
1061         if (s->control_command_id >= 0)
1062                 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1063
1064         LIST_FOREACH(port, p, s->ports) {
1065                 int copy;
1066
1067                 if (p->fd < 0)
1068                         continue;
1069
1070                 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1071                         return copy;
1072
1073                 if (p->type == SOCKET_SOCKET) {
1074                         char *t;
1075
1076                         if ((r = socket_address_print(&p->address, &t)) < 0)
1077                                 return r;
1078
1079                         unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
1080                         free(t);
1081                 } else {
1082                         assert(p->type == SOCKET_FIFO);
1083                         unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1084                 }
1085         }
1086
1087         return 0;
1088 }
1089
1090 static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1091         Socket *s = SOCKET(u);
1092         int r;
1093
1094         assert(u);
1095         assert(key);
1096         assert(value);
1097         assert(fds);
1098
1099         if (streq(key, "state")) {
1100                 SocketState state;
1101
1102                 if ((state = socket_state_from_string(value)) < 0)
1103                         log_debug("Failed to parse state value %s", value);
1104                 else
1105                         s->deserialized_state = state;
1106         } else if (streq(key, "failure")) {
1107                 int b;
1108
1109                 if ((b = parse_boolean(value)) < 0)
1110                         log_debug("Failed to parse failure value %s", value);
1111                 else
1112                         s->failure = b || s->failure;
1113
1114         } else if (streq(key, "n-accepted")) {
1115                 unsigned k;
1116
1117                 if ((r = safe_atou(value, &k)) < 0)
1118                         log_debug("Failed to parse n-accepted value %s", value);
1119                 else
1120                         s->n_accepted += k;
1121         } else if (streq(key, "control-pid")) {
1122                 unsigned pid;
1123
1124                 if ((r = safe_atou(value, &pid)) < 0 || pid <= 0)
1125                         log_debug("Failed to parse control-pid value %s", value);
1126                 else
1127                         s->control_pid = (pid_t) pid;
1128         } else if (streq(key, "control-command")) {
1129                 SocketExecCommand id;
1130
1131                 if ((id = socket_exec_command_from_string(value)) < 0)
1132                         log_debug("Failed to parse exec-command value %s", value);
1133                 else {
1134                         s->control_command_id = id;
1135                         s->control_command = s->exec_command[id];
1136                 }
1137         } else if (streq(key, "fifo")) {
1138                 int fd, skip = 0;
1139                 SocketPort *p;
1140
1141                 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1142                         log_debug("Failed to parse fifo value %s", value);
1143                 else {
1144
1145                         LIST_FOREACH(port, p, s->ports)
1146                                 if (streq(p->path, value+skip))
1147                                         break;
1148
1149                         if (p) {
1150                                 if (p->fd >= 0)
1151                                         close_nointr_nofail(p->fd);
1152                                 p->fd = fdset_remove(fds, fd);
1153                         }
1154                 }
1155
1156         } else if (streq(key, "socket")) {
1157                 int fd, type, skip = 0;
1158                 SocketPort *p;
1159
1160                 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
1161                         log_debug("Failed to parse socket value %s", value);
1162                 else {
1163
1164                         LIST_FOREACH(port, p, s->ports)
1165                                 if (socket_address_is(&p->address, value+skip, type))
1166                                         break;
1167
1168                         if (p) {
1169                                 if (p->fd >= 0)
1170                                         close_nointr_nofail(p->fd);
1171                                 p->fd = fdset_remove(fds, fd);
1172                         }
1173                 }
1174
1175         } else
1176                 log_debug("Unknown serialization key '%s'", key);
1177
1178         return 0;
1179 }
1180
1181 static UnitActiveState socket_active_state(Unit *u) {
1182         assert(u);
1183
1184         return state_translation_table[SOCKET(u)->state];
1185 }
1186
1187 static const char *socket_sub_state_to_string(Unit *u) {
1188         assert(u);
1189
1190         return socket_state_to_string(SOCKET(u)->state);
1191 }
1192
1193 static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
1194         Socket *s = SOCKET(u);
1195         int cfd = -1;
1196
1197         assert(s);
1198         assert(fd >= 0);
1199
1200         if (s->state != SOCKET_LISTENING)
1201                 return;
1202
1203         log_debug("Incoming traffic on %s", u->meta.id);
1204
1205         if (events != EPOLLIN) {
1206                 log_error("Got invalid poll event on socket.");
1207                 goto fail;
1208         }
1209
1210         if (w->socket_accept) {
1211                 for (;;) {
1212
1213                         if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1214
1215                                 if (errno == EINTR)
1216                                         continue;
1217
1218                                 log_error("Failed to accept socket: %m");
1219                                 goto fail;
1220                         }
1221
1222                         break;
1223                 }
1224
1225                 if (s->tcpwrap_name)
1226                         if (!socket_tcpwrap(cfd, s->tcpwrap_name)) {
1227                                 close_nointr_nofail(cfd);
1228                                 return;
1229                         }
1230         }
1231
1232         socket_enter_running(s, cfd);
1233         return;
1234
1235 fail:
1236         socket_enter_stop_pre(s, false);
1237 }
1238
1239 static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1240         Socket *s = SOCKET(u);
1241         bool success;
1242
1243         assert(s);
1244         assert(pid >= 0);
1245
1246         if (pid != s->control_pid)
1247                 return;
1248
1249         s->control_pid = 0;
1250
1251         success = is_clean_exit(code, status);
1252         s->failure = s->failure || !success;
1253
1254         if (s->control_command)
1255                 exec_status_fill(&s->control_command->exec_status, pid, code, status);
1256
1257         log_debug("%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1258
1259         if (s->control_command && s->control_command->command_next && success) {
1260                 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
1261                 socket_run_next(s, success);
1262         } else {
1263                 s->control_command = NULL;
1264                 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1265
1266                 /* No further commands for this step, so let's figure
1267                  * out what to do next */
1268
1269                 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
1270
1271                 switch (s->state) {
1272
1273                 case SOCKET_START_PRE:
1274                         if (success)
1275                                 socket_enter_start_post(s);
1276                         else
1277                                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1278                         break;
1279
1280                 case SOCKET_START_POST:
1281                         if (success)
1282                                 socket_enter_listening(s);
1283                         else
1284                                 socket_enter_stop_pre(s, false);
1285                         break;
1286
1287                 case SOCKET_STOP_PRE:
1288                 case SOCKET_STOP_PRE_SIGTERM:
1289                 case SOCKET_STOP_PRE_SIGKILL:
1290                         socket_enter_stop_post(s, success);
1291                         break;
1292
1293                 case SOCKET_STOP_POST:
1294                 case SOCKET_FINAL_SIGTERM:
1295                 case SOCKET_FINAL_SIGKILL:
1296                         socket_enter_dead(s, success);
1297                         break;
1298
1299                 default:
1300                         assert_not_reached("Uh, control process died at wrong time.");
1301                 }
1302         }
1303 }
1304
1305 static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1306         Socket *s = SOCKET(u);
1307
1308         assert(s);
1309         assert(elapsed == 1);
1310         assert(w == &s->timer_watch);
1311
1312         switch (s->state) {
1313
1314         case SOCKET_START_PRE:
1315                 log_warning("%s starting timed out. Terminating.", u->meta.id);
1316                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1317
1318         case SOCKET_START_POST:
1319                 log_warning("%s starting timed out. Stopping.", u->meta.id);
1320                 socket_enter_stop_pre(s, false);
1321                 break;
1322
1323         case SOCKET_STOP_PRE:
1324                 log_warning("%s stopping timed out. Terminating.", u->meta.id);
1325                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1326                 break;
1327
1328         case SOCKET_STOP_PRE_SIGTERM:
1329                 log_warning("%s stopping timed out. Killing.", u->meta.id);
1330                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1331                 break;
1332
1333         case SOCKET_STOP_PRE_SIGKILL:
1334                 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
1335                 socket_enter_stop_post(s, false);
1336                 break;
1337
1338         case SOCKET_STOP_POST:
1339                 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
1340                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1341                 break;
1342
1343         case SOCKET_FINAL_SIGTERM:
1344                 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
1345                 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
1346                 break;
1347
1348         case SOCKET_FINAL_SIGKILL:
1349                 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
1350                 socket_enter_dead(s, false);
1351                 break;
1352
1353         default:
1354                 assert_not_reached("Timeout at wrong time.");
1355         }
1356 }
1357
1358 int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1359         int *rfds;
1360         unsigned rn_fds, k;
1361         SocketPort *p;
1362
1363         assert(s);
1364         assert(fds);
1365         assert(n_fds);
1366
1367         /* Called from the service code for requesting our fds */
1368
1369         rn_fds = 0;
1370         LIST_FOREACH(port, p, s->ports)
1371                 if (p->fd >= 0)
1372                         rn_fds++;
1373
1374         if (!(rfds = new(int, rn_fds)) < 0)
1375                 return -ENOMEM;
1376
1377         k = 0;
1378         LIST_FOREACH(port, p, s->ports)
1379                 if (p->fd >= 0)
1380                         rfds[k++] = p->fd;
1381
1382         assert(k == rn_fds);
1383
1384         *fds = rfds;
1385         *n_fds = rn_fds;
1386
1387         return 0;
1388 }
1389
1390 void socket_notify_service_dead(Socket *s) {
1391         assert(s);
1392
1393         /* The service is dead. Dang. */
1394
1395         if (s->state == SOCKET_RUNNING) {
1396                 log_debug("%s got notified about service death.", s->meta.id);
1397                 socket_enter_listening(s);
1398         }
1399 }
1400
1401 static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1402         [SOCKET_DEAD] = "dead",
1403         [SOCKET_START_PRE] = "start-pre",
1404         [SOCKET_START_POST] = "start-post",
1405         [SOCKET_LISTENING] = "listening",
1406         [SOCKET_RUNNING] = "running",
1407         [SOCKET_STOP_PRE] = "stop-pre",
1408         [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1409         [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1410         [SOCKET_STOP_POST] = "stop-post",
1411         [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1412         [SOCKET_FINAL_SIGKILL] = "final-sigkill",
1413         [SOCKET_MAINTENANCE] = "maintenance"
1414 };
1415
1416 DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1417
1418 static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1419         [SOCKET_EXEC_START_PRE] = "StartPre",
1420         [SOCKET_EXEC_START_POST] = "StartPost",
1421         [SOCKET_EXEC_STOP_PRE] = "StopPre",
1422         [SOCKET_EXEC_STOP_POST] = "StopPost"
1423 };
1424
1425 DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1426
1427 const UnitVTable socket_vtable = {
1428         .suffix = ".socket",
1429
1430         .init = socket_init,
1431         .done = socket_done,
1432         .load = socket_load,
1433
1434         .coldplug = socket_coldplug,
1435
1436         .dump = socket_dump,
1437
1438         .start = socket_start,
1439         .stop = socket_stop,
1440
1441         .serialize = socket_serialize,
1442         .deserialize_item = socket_deserialize_item,
1443
1444         .active_state = socket_active_state,
1445         .sub_state_to_string = socket_sub_state_to_string,
1446
1447         .fd_event = socket_fd_event,
1448         .sigchld_event = socket_sigchld_event,
1449         .timer_event = socket_timer_event,
1450
1451         .bus_message_handler = bus_socket_message_handler
1452 };