chiark / gitweb /
systemctl: introduce reset-maintenance command
[elogind.git] / src / socket.c
1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <sys/types.h>
23 #include <sys/stat.h>
24 #include <unistd.h>
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <sys/epoll.h>
28 #include <signal.h>
29 #include <arpa/inet.h>
30
31 #include "unit.h"
32 #include "socket.h"
33 #include "log.h"
34 #include "load-dropin.h"
35 #include "load-fragment.h"
36 #include "strv.h"
37 #include "unit-name.h"
38 #include "dbus-socket.h"
39 #include "missing.h"
40 #include "special.h"
41 #include "bus-errors.h"
42
43 static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
44         [SOCKET_DEAD] = UNIT_INACTIVE,
45         [SOCKET_START_PRE] = UNIT_ACTIVATING,
46         [SOCKET_START_POST] = UNIT_ACTIVATING,
47         [SOCKET_LISTENING] = UNIT_ACTIVE,
48         [SOCKET_RUNNING] = UNIT_ACTIVE,
49         [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
50         [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
51         [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
52         [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
53         [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
54         [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
55         [SOCKET_MAINTENANCE] = UNIT_MAINTENANCE
56 };
57
58 static void socket_init(Unit *u) {
59         Socket *s = SOCKET(u);
60
61         assert(u);
62         assert(u->meta.load_state == UNIT_STUB);
63
64         s->backlog = SOMAXCONN;
65         s->timeout_usec = DEFAULT_TIMEOUT_USEC;
66         s->directory_mode = 0755;
67         s->socket_mode = 0666;
68
69         s->max_connections = 64;
70
71         s->priority = -1;
72         s->ip_tos = -1;
73         s->ip_ttl = -1;
74         s->mark = -1;
75
76         exec_context_init(&s->exec_context);
77
78         s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
79 }
80
81 static void socket_unwatch_control_pid(Socket *s) {
82         assert(s);
83
84         if (s->control_pid <= 0)
85                 return;
86
87         unit_unwatch_pid(UNIT(s), s->control_pid);
88         s->control_pid = 0;
89 }
90
91 static void socket_done(Unit *u) {
92         Socket *s = SOCKET(u);
93         SocketPort *p;
94         Meta *i;
95
96         assert(s);
97
98         while ((p = s->ports)) {
99                 LIST_REMOVE(SocketPort, port, s->ports, p);
100
101                 if (p->fd >= 0) {
102                         unit_unwatch_fd(UNIT(s), &p->fd_watch);
103                         close_nointr_nofail(p->fd);
104                 }
105
106                 free(p->path);
107                 free(p);
108         }
109
110         exec_context_done(&s->exec_context);
111         exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
112         s->control_command = NULL;
113
114         socket_unwatch_control_pid(s);
115
116         s->service = NULL;
117
118         free(s->bind_to_device);
119         s->bind_to_device = NULL;
120
121         unit_unwatch_timer(u, &s->timer_watch);
122
123         /* Make sure no service instance refers to us anymore. */
124         LIST_FOREACH(units_per_type, i, u->meta.manager->units_per_type[UNIT_SERVICE]) {
125                 Service *service = (Service *) i;
126
127                 if (service->socket == s)
128                         service->socket = NULL;
129         }
130 }
131
132 static int socket_instantiate_service(Socket *s) {
133         char *prefix, *name;
134         int r;
135         Unit *u;
136
137         assert(s);
138
139         /* This fills in s->service if it isn't filled in yet. For
140          * Accept=yes sockets we create the next connection service
141          * here. For Accept=no this is mostly a NOP since the service
142          * is figured out at load time anyway. */
143
144         if (s->service)
145                 return 0;
146
147         assert(s->accept);
148
149         if (!(prefix = unit_name_to_prefix(s->meta.id)))
150                 return -ENOMEM;
151
152         r = asprintf(&name, "%s@%u.service", prefix, s->n_accepted);
153         free(prefix);
154
155         if (r < 0)
156                 return -ENOMEM;
157
158         r = manager_load_unit(s->meta.manager, name, NULL, NULL, &u);
159         free(name);
160
161         if (r < 0)
162                 return r;
163
164         s->service = SERVICE(u);
165         return 0;
166 }
167
168 static bool have_non_accept_socket(Socket *s) {
169         SocketPort *p;
170
171         assert(s);
172
173         if (!s->accept)
174                 return true;
175
176         LIST_FOREACH(port, p, s->ports) {
177
178                 if (p->type != SOCKET_SOCKET)
179                         return true;
180
181                 if (!socket_address_can_accept(&p->address))
182                         return true;
183         }
184
185         return false;
186 }
187
188 static int socket_verify(Socket *s) {
189         assert(s);
190
191         if (s->meta.load_state != UNIT_LOADED)
192                 return 0;
193
194         if (!s->ports) {
195                 log_error("%s lacks Listen setting. Refusing.", s->meta.id);
196                 return -EINVAL;
197         }
198
199         if (s->accept && have_non_accept_socket(s)) {
200                 log_error("%s configured for accepting sockets, but sockets are non-accepting. Refusing.", s->meta.id);
201                 return -EINVAL;
202         }
203
204         if (s->accept && s->max_connections <= 0) {
205                 log_error("%s's MaxConnection setting too small. Refusing.", s->meta.id);
206                 return -EINVAL;
207         }
208
209         if (s->exec_context.pam_name && s->exec_context.kill_mode != KILL_CONTROL_GROUP) {
210                 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", s->meta.id);
211                 return -EINVAL;
212         }
213
214         return 0;
215 }
216
217 static bool socket_needs_mount(Socket *s, const char *prefix) {
218         SocketPort *p;
219
220         assert(s);
221
222         LIST_FOREACH(port, p, s->ports) {
223
224                 if (p->type == SOCKET_SOCKET) {
225                         if (socket_address_needs_mount(&p->address, prefix))
226                                 return true;
227                 } else {
228                         assert(p->type == SOCKET_FIFO);
229                         if (path_startswith(p->path, prefix))
230                                 return true;
231                 }
232         }
233
234         return false;
235 }
236
237 int socket_add_one_mount_link(Socket *s, Mount *m) {
238         int r;
239
240         assert(s);
241         assert(m);
242
243         if (s->meta.load_state != UNIT_LOADED ||
244             m->meta.load_state != UNIT_LOADED)
245                 return 0;
246
247         if (!socket_needs_mount(s, m->where))
248                 return 0;
249
250         if ((r = unit_add_two_dependencies(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true)) < 0)
251                 return r;
252
253         return 0;
254 }
255
256 static int socket_add_mount_links(Socket *s) {
257         Meta *other;
258         int r;
259
260         assert(s);
261
262         LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
263                 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
264                         return r;
265
266         return 0;
267 }
268
269 static int socket_add_device_link(Socket *s) {
270         char *t;
271         int r;
272
273         assert(s);
274
275         if (!s->bind_to_device)
276                 return 0;
277
278         if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
279                 return -ENOMEM;
280
281         r = unit_add_node_link(UNIT(s), t, false);
282         free(t);
283
284         return r;
285 }
286
287 static int socket_add_default_dependencies(Socket *s) {
288         int r;
289         assert(s);
290
291         if (s->meta.manager->running_as == MANAGER_SYSTEM)
292                 if ((r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true)) < 0)
293                         return r;
294
295         return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
296 }
297
298 static int socket_load(Unit *u) {
299         Socket *s = SOCKET(u);
300         int r;
301
302         assert(u);
303         assert(u->meta.load_state == UNIT_STUB);
304
305         if ((r = unit_load_fragment_and_dropin(u)) < 0)
306                 return r;
307
308         /* This is a new unit? Then let's add in some extras */
309         if (u->meta.load_state == UNIT_LOADED) {
310
311                 if (have_non_accept_socket(s)) {
312                         if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)) < 0)
313                                 return r;
314
315                         if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
316                                 return r;
317                 }
318
319                 if ((r = socket_add_mount_links(s)) < 0)
320                         return r;
321
322                 if ((r = socket_add_device_link(s)) < 0)
323                         return r;
324
325                 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
326                         return r;
327
328                 if ((r = unit_add_default_cgroup(u)) < 0)
329                         return r;
330
331                 if (s->meta.default_dependencies)
332                         if ((r = socket_add_default_dependencies(s)) < 0)
333                                 return r;
334         }
335
336         return socket_verify(s);
337 }
338
339 static const char* listen_lookup(int type) {
340
341         if (type == SOCK_STREAM)
342                 return "ListenStream";
343         else if (type == SOCK_DGRAM)
344                 return "ListenDatagram";
345         else if (type == SOCK_SEQPACKET)
346                 return "ListenSequentialPacket";
347
348         assert_not_reached("Unknown socket type");
349         return NULL;
350 }
351
352 static void socket_dump(Unit *u, FILE *f, const char *prefix) {
353
354         SocketExecCommand c;
355         Socket *s = SOCKET(u);
356         SocketPort *p;
357         const char *prefix2;
358         char *p2;
359
360         assert(s);
361         assert(f);
362
363         p2 = strappend(prefix, "\t");
364         prefix2 = p2 ? p2 : prefix;
365
366         fprintf(f,
367                 "%sSocket State: %s\n"
368                 "%sBindIPv6Only: %s\n"
369                 "%sBacklog: %u\n"
370                 "%sSocketMode: %04o\n"
371                 "%sDirectoryMode: %04o\n"
372                 "%sKeepAlive: %s\n"
373                 "%sFreeBind: %s\n",
374                 prefix, socket_state_to_string(s->state),
375                 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
376                 prefix, s->backlog,
377                 prefix, s->socket_mode,
378                 prefix, s->directory_mode,
379                 prefix, yes_no(s->keep_alive),
380                 prefix, yes_no(s->free_bind));
381
382         if (s->control_pid > 0)
383                 fprintf(f,
384                         "%sControl PID: %lu\n",
385                         prefix, (unsigned long) s->control_pid);
386
387         if (s->bind_to_device)
388                 fprintf(f,
389                         "%sBindToDevice: %s\n",
390                         prefix, s->bind_to_device);
391
392         if (s->accept)
393                 fprintf(f,
394                         "%sAccepted: %u\n"
395                         "%sNConnections: %u\n"
396                         "%sMaxConnections: %u\n",
397                         prefix, s->n_accepted,
398                         prefix, s->n_connections,
399                         prefix, s->max_connections);
400
401         if (s->priority >= 0)
402                 fprintf(f,
403                         "%sPriority: %i\n",
404                         prefix, s->priority);
405
406         if (s->receive_buffer > 0)
407                 fprintf(f,
408                         "%sReceiveBuffer: %zu\n",
409                         prefix, s->receive_buffer);
410
411         if (s->send_buffer > 0)
412                 fprintf(f,
413                         "%sSendBuffer: %zu\n",
414                         prefix, s->send_buffer);
415
416         if (s->ip_tos >= 0)
417                 fprintf(f,
418                         "%sIPTOS: %i\n",
419                         prefix, s->ip_tos);
420
421         if (s->ip_ttl >= 0)
422                 fprintf(f,
423                         "%sIPTTL: %i\n",
424                         prefix, s->ip_ttl);
425
426         if (s->pipe_size > 0)
427                 fprintf(f,
428                         "%sPipeSize: %zu\n",
429                         prefix, s->pipe_size);
430
431         if (s->mark >= 0)
432                 fprintf(f,
433                         "%sMark: %i\n",
434                         prefix, s->mark);
435
436         LIST_FOREACH(port, p, s->ports) {
437
438                 if (p->type == SOCKET_SOCKET) {
439                         const char *t;
440                         int r;
441                         char *k;
442
443                         if ((r = socket_address_print(&p->address, &k)) < 0)
444                                 t = strerror(-r);
445                         else
446                                 t = k;
447
448                         fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
449                         free(k);
450                 } else
451                         fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
452         }
453
454         exec_context_dump(&s->exec_context, f, prefix);
455
456         for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
457                 if (!s->exec_command[c])
458                         continue;
459
460                 fprintf(f, "%s-> %s:\n",
461                         prefix, socket_exec_command_to_string(c));
462
463                 exec_command_dump_list(s->exec_command[c], f, prefix2);
464         }
465
466         free(p2);
467 }
468
469 static int instance_from_socket(int fd, unsigned nr, char **instance) {
470         socklen_t l;
471         char *r;
472         union {
473                 struct sockaddr sa;
474                 struct sockaddr_un un;
475                 struct sockaddr_in in;
476                 struct sockaddr_in6 in6;
477                 struct sockaddr_storage storage;
478         } local, remote;
479
480         assert(fd >= 0);
481         assert(instance);
482
483         l = sizeof(local);
484         if (getsockname(fd, &local.sa, &l) < 0)
485                 return -errno;
486
487         l = sizeof(remote);
488         if (getpeername(fd, &remote.sa, &l) < 0)
489                 return -errno;
490
491         switch (local.sa.sa_family) {
492
493         case AF_INET: {
494                 uint32_t
495                         a = ntohl(local.in.sin_addr.s_addr),
496                         b = ntohl(remote.in.sin_addr.s_addr);
497
498                 if (asprintf(&r,
499                              "%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
500                              a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
501                              ntohs(local.in.sin_port),
502                              b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
503                              ntohs(remote.in.sin_port)) < 0)
504                         return -ENOMEM;
505
506                 break;
507         }
508
509         case AF_INET6: {
510                 static const char ipv4_prefix[] = {
511                         0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
512                 };
513
514                 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
515                     memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
516                         const uint8_t
517                                 *a = local.in6.sin6_addr.s6_addr+12,
518                                 *b = remote.in6.sin6_addr.s6_addr+12;
519
520                         if (asprintf(&r,
521                                      "%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
522                                      a[0], a[1], a[2], a[3],
523                                      ntohs(local.in6.sin6_port),
524                                      b[0], b[1], b[2], b[3],
525                                      ntohs(remote.in6.sin6_port)) < 0)
526                                 return -ENOMEM;
527                 } else {
528                         char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
529
530                         if (asprintf(&r,
531                                      "%s:%u-%s:%u",
532                                      inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
533                                      ntohs(local.in6.sin6_port),
534                                      inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
535                                      ntohs(remote.in6.sin6_port)) < 0)
536                                 return -ENOMEM;
537                 }
538
539                 break;
540         }
541
542         case AF_UNIX: {
543                 struct ucred ucred;
544
545                 l = sizeof(ucred);
546                 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
547                         return -errno;
548
549                 if (asprintf(&r,
550                              "%u-%lu-%lu",
551                              nr,
552                              (unsigned long) ucred.pid,
553                              (unsigned long) ucred.uid) < 0)
554                         return -ENOMEM;
555
556                 break;
557         }
558
559         default:
560                 assert_not_reached("Unhandled socket type.");
561         }
562
563         *instance = r;
564         return 0;
565 }
566
567 static void socket_close_fds(Socket *s) {
568         SocketPort *p;
569
570         assert(s);
571
572         LIST_FOREACH(port, p, s->ports) {
573                 if (p->fd < 0)
574                         continue;
575
576                 unit_unwatch_fd(UNIT(s), &p->fd_watch);
577                 close_nointr_nofail(p->fd);
578
579                 /* One little note: we should never delete any sockets
580                  * in the file system here! After all some other
581                  * process we spawned might still have a reference of
582                  * this fd and wants to continue to use it. Therefore
583                  * we delete sockets in the file system before we
584                  * create a new one, not after we stopped using
585                  * one! */
586
587                 p->fd = -1;
588         }
589 }
590
591 static void socket_apply_socket_options(Socket *s, int fd) {
592         assert(s);
593         assert(fd >= 0);
594
595         if (s->keep_alive) {
596                 int b = s->keep_alive;
597                 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &b, sizeof(b)) < 0)
598                         log_warning("SO_KEEPALIVE failed: %m");
599         }
600
601         if (s->priority >= 0)
602                 if (setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &s->priority, sizeof(s->priority)) < 0)
603                         log_warning("SO_PRIORITY failed: %m");
604
605         if (s->receive_buffer > 0) {
606                 int value = (int) s->receive_buffer;
607                 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &value, sizeof(value)) < 0)
608                         log_warning("SO_RCVBUF failed: %m");
609         }
610
611         if (s->send_buffer > 0) {
612                 int value = (int) s->send_buffer;
613                 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &value, sizeof(value)) < 0)
614                         log_warning("SO_SNDBUF failed: %m");
615         }
616
617         if (s->mark >= 0)
618                 if (setsockopt(fd, SOL_SOCKET, SO_MARK, &s->mark, sizeof(s->mark)) < 0)
619                         log_warning("SO_MARK failed: %m");
620
621         if (s->ip_tos >= 0)
622                 if (setsockopt(fd, IPPROTO_IP, IP_TOS, &s->ip_tos, sizeof(s->ip_tos)) < 0)
623                         log_warning("IP_TOS failed: %m");
624
625         if (s->ip_ttl >= 0) {
626                 int r, x;
627
628                 r = setsockopt(fd, IPPROTO_IP, IP_TTL, &s->ip_ttl, sizeof(s->ip_ttl));
629                 x = setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &s->ip_ttl, sizeof(s->ip_ttl));
630
631                 if (r < 0 && x < 0)
632                         log_warning("IP_TTL/IPV6_UNICAST_HOPS failed: %m");
633         }
634 }
635
636 static void socket_apply_fifo_options(Socket *s, int fd) {
637         assert(s);
638         assert(fd >= 0);
639
640         if (s->pipe_size > 0)
641                 if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
642                         log_warning("F_SETPIPE_SZ: %m");
643 }
644
645 static int fifo_address_create(
646                 const char *path,
647                 mode_t directory_mode,
648                 mode_t socket_mode,
649                 /* FIXME SELINUX: pass SELinux context object here */
650                 int *_fd) {
651
652         int fd = -1, r;
653         struct stat st;
654         mode_t old_mask;
655
656         assert(path);
657         assert(_fd);
658
659         mkdir_parents(path, directory_mode);
660
661         /* FIXME SELINUX: The mkfifo here should be done with
662          * the right SELinux context set */
663
664         /* Enforce the right access mode for the fifo */
665         old_mask = umask(~ socket_mode);
666
667         /* Include the original umask in our mask */
668         umask(~socket_mode | old_mask);
669
670         r = mkfifo(path, socket_mode);
671         umask(old_mask);
672
673         if (r < 0) {
674                 r = -errno;
675                 goto fail;
676         }
677
678         if ((fd = open(path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
679                 r = -errno;
680                 goto fail;
681         }
682
683         if (fstat(fd, &st) < 0) {
684                 r = -errno;
685                 goto fail;
686         }
687
688         if (!S_ISFIFO(st.st_mode) ||
689             st.st_mode != (socket_mode & ~old_mask) ||
690             st.st_uid != getuid() ||
691             st.st_gid != getgid()) {
692
693                 r = -EEXIST;
694                 goto fail;
695         }
696
697         *_fd = fd;
698         return 0;
699
700 fail:
701         if (fd >= 0)
702                 close_nointr_nofail(fd);
703
704         return r;
705 }
706
707 static int socket_open_fds(Socket *s) {
708         SocketPort *p;
709         int r;
710
711         assert(s);
712
713         /* FIXME SELINUX: Somewhere here we must set the the SELinux
714            context for the created sockets and FIFOs. To figure out
715            the executable name for this, use
716            socket_instantiate_service() and then access the executable
717            path name via
718            s->service->exec_command[SERVICE_EXEC_START]->path. Example:
719
720         if ((r = socket_instantiate_service(s)) < 0)
721                 return r;
722
723         log_debug("Socket unit %s will spawn service unit %s with executable path %s.",
724                   s->meta.id,
725                   s->service->meta.id,
726                   s->service->exec_command[SERVICE_EXEC_START]->path);
727         */
728
729         LIST_FOREACH(port, p, s->ports) {
730
731                 if (p->fd >= 0)
732                         continue;
733
734                 if (p->type == SOCKET_SOCKET) {
735
736                         if ((r = socket_address_listen(
737                                              &p->address,
738                                              s->backlog,
739                                              s->bind_ipv6_only,
740                                              s->bind_to_device,
741                                              s->free_bind,
742                                              s->directory_mode,
743                                              s->socket_mode,
744                                              /* FIXME SELINUX: Pass the SELinux context object here */
745                                              &p->fd)) < 0)
746                                 goto rollback;
747
748                         socket_apply_socket_options(s, p->fd);
749
750                 } else  if (p->type == SOCKET_FIFO) {
751
752                         if ((r = fifo_address_create(
753                                              p->path,
754                                              s->directory_mode,
755                                              s->socket_mode,
756                                              /* FIXME SELINUX: Pass the SELinux context object here */
757                                              &p->fd)) < 0)
758                                 goto rollback;
759
760                         socket_apply_fifo_options(s, p->fd);
761
762                 } else
763                         assert_not_reached("Unknown port type");
764         }
765
766         return 0;
767
768 rollback:
769         socket_close_fds(s);
770         return r;
771 }
772
773 static void socket_unwatch_fds(Socket *s) {
774         SocketPort *p;
775
776         assert(s);
777
778         LIST_FOREACH(port, p, s->ports) {
779                 if (p->fd < 0)
780                         continue;
781
782                 unit_unwatch_fd(UNIT(s), &p->fd_watch);
783         }
784 }
785
786 static int socket_watch_fds(Socket *s) {
787         SocketPort *p;
788         int r;
789
790         assert(s);
791
792         LIST_FOREACH(port, p, s->ports) {
793                 if (p->fd < 0)
794                         continue;
795
796                 p->fd_watch.socket_accept =
797                         s->accept &&
798                         p->type == SOCKET_SOCKET &&
799                         socket_address_can_accept(&p->address);
800
801                 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
802                         goto fail;
803         }
804
805         return 0;
806
807 fail:
808         socket_unwatch_fds(s);
809         return r;
810 }
811
812 static void socket_set_state(Socket *s, SocketState state) {
813         SocketState old_state;
814         assert(s);
815
816         old_state = s->state;
817         s->state = state;
818
819         if (state != SOCKET_START_PRE &&
820             state != SOCKET_START_POST &&
821             state != SOCKET_STOP_PRE &&
822             state != SOCKET_STOP_PRE_SIGTERM &&
823             state != SOCKET_STOP_PRE_SIGKILL &&
824             state != SOCKET_STOP_POST &&
825             state != SOCKET_FINAL_SIGTERM &&
826             state != SOCKET_FINAL_SIGKILL) {
827                 unit_unwatch_timer(UNIT(s), &s->timer_watch);
828                 socket_unwatch_control_pid(s);
829                 s->control_command = NULL;
830                 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
831         }
832
833         if (state != SOCKET_LISTENING)
834                 socket_unwatch_fds(s);
835
836         if (state != SOCKET_START_POST &&
837             state != SOCKET_LISTENING &&
838             state != SOCKET_RUNNING &&
839             state != SOCKET_STOP_PRE &&
840             state != SOCKET_STOP_PRE_SIGTERM &&
841             state != SOCKET_STOP_PRE_SIGKILL)
842                 socket_close_fds(s);
843
844         if (state != old_state)
845                 log_debug("%s changed %s -> %s",
846                           s->meta.id,
847                           socket_state_to_string(old_state),
848                           socket_state_to_string(state));
849
850         unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
851 }
852
853 static int socket_coldplug(Unit *u) {
854         Socket *s = SOCKET(u);
855         int r;
856
857         assert(s);
858         assert(s->state == SOCKET_DEAD);
859
860         if (s->deserialized_state != s->state) {
861
862                 if (s->deserialized_state == SOCKET_START_PRE ||
863                     s->deserialized_state == SOCKET_START_POST ||
864                     s->deserialized_state == SOCKET_STOP_PRE ||
865                     s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
866                     s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
867                     s->deserialized_state == SOCKET_STOP_POST ||
868                     s->deserialized_state == SOCKET_FINAL_SIGTERM ||
869                     s->deserialized_state == SOCKET_FINAL_SIGKILL) {
870
871                         if (s->control_pid <= 0)
872                                 return -EBADMSG;
873
874                         if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
875                                 return r;
876
877                         if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
878                                 return r;
879                 }
880
881                 if (s->deserialized_state == SOCKET_START_POST ||
882                     s->deserialized_state == SOCKET_LISTENING ||
883                     s->deserialized_state == SOCKET_RUNNING ||
884                     s->deserialized_state == SOCKET_STOP_PRE ||
885                     s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
886                     s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
887                         if ((r = socket_open_fds(s)) < 0)
888                                 return r;
889
890                 if (s->deserialized_state == SOCKET_LISTENING)
891                         if ((r = socket_watch_fds(s)) < 0)
892                                 return r;
893
894                 socket_set_state(s, s->deserialized_state);
895         }
896
897         return 0;
898 }
899
900 static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
901         pid_t pid;
902         int r;
903         char **argv;
904
905         assert(s);
906         assert(c);
907         assert(_pid);
908
909         if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
910                 goto fail;
911
912         if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
913                 r = -ENOMEM;
914                 goto fail;
915         }
916
917         r = exec_spawn(c,
918                        argv,
919                        &s->exec_context,
920                        NULL, 0,
921                        s->meta.manager->environment,
922                        true,
923                        true,
924                        true,
925                        s->meta.manager->confirm_spawn,
926                        s->meta.cgroup_bondings,
927                        &pid);
928
929         strv_free(argv);
930         if (r < 0)
931                 goto fail;
932
933         if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
934                 /* FIXME: we need to do something here */
935                 goto fail;
936
937         *_pid = pid;
938
939         return 0;
940
941 fail:
942         unit_unwatch_timer(UNIT(s), &s->timer_watch);
943
944         return r;
945 }
946
947 static void socket_enter_dead(Socket *s, bool success) {
948         assert(s);
949
950         if (!success)
951                 s->failure = true;
952
953         socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
954 }
955
956 static void socket_enter_signal(Socket *s, SocketState state, bool success);
957
958 static void socket_enter_stop_post(Socket *s, bool success) {
959         int r;
960         assert(s);
961
962         if (!success)
963                 s->failure = true;
964
965         socket_unwatch_control_pid(s);
966
967         s->control_command_id = SOCKET_EXEC_STOP_POST;
968
969         if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
970                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
971                         goto fail;
972
973                 socket_set_state(s, SOCKET_STOP_POST);
974         } else
975                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
976
977         return;
978
979 fail:
980         log_warning("%s failed to run 'stop-post' task: %s", s->meta.id, strerror(-r));
981         socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
982 }
983
984 static void socket_enter_signal(Socket *s, SocketState state, bool success) {
985         int r;
986         bool sent = false;
987
988         assert(s);
989
990         if (!success)
991                 s->failure = true;
992
993         if (s->exec_context.kill_mode != KILL_NONE) {
994                 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? s->exec_context.kill_signal : SIGKILL;
995
996                 if (s->exec_context.kill_mode == KILL_CONTROL_GROUP) {
997
998                         if ((r = cgroup_bonding_kill_list(s->meta.cgroup_bondings, sig)) < 0) {
999                                 if (r != -EAGAIN && r != -ESRCH)
1000                                         goto fail;
1001                         } else
1002                                 sent = true;
1003                 }
1004
1005                 if (!sent && s->control_pid > 0)
1006                         if (kill(s->exec_context.kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
1007                                 r = -errno;
1008                                 goto fail;
1009                         }
1010         }
1011
1012         if (sent && s->control_pid > 0) {
1013                 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
1014                         goto fail;
1015
1016                 socket_set_state(s, state);
1017         } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
1018                 socket_enter_stop_post(s, true);
1019         else
1020                 socket_enter_dead(s, true);
1021
1022         return;
1023
1024 fail:
1025         log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
1026
1027         if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
1028                 socket_enter_stop_post(s, false);
1029         else
1030                 socket_enter_dead(s, false);
1031 }
1032
1033 static void socket_enter_stop_pre(Socket *s, bool success) {
1034         int r;
1035         assert(s);
1036
1037         if (!success)
1038                 s->failure = true;
1039
1040         socket_unwatch_control_pid(s);
1041
1042         s->control_command_id = SOCKET_EXEC_STOP_PRE;
1043
1044         if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
1045                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1046                         goto fail;
1047
1048                 socket_set_state(s, SOCKET_STOP_PRE);
1049         } else
1050                 socket_enter_stop_post(s, true);
1051
1052         return;
1053
1054 fail:
1055         log_warning("%s failed to run 'stop-pre' task: %s", s->meta.id, strerror(-r));
1056         socket_enter_stop_post(s, false);
1057 }
1058
1059 static void socket_enter_listening(Socket *s) {
1060         int r;
1061         assert(s);
1062
1063         if ((r = socket_watch_fds(s)) < 0) {
1064                 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
1065                 goto fail;
1066         }
1067
1068         socket_set_state(s, SOCKET_LISTENING);
1069         return;
1070
1071 fail:
1072         socket_enter_stop_pre(s, false);
1073 }
1074
1075 static void socket_enter_start_post(Socket *s) {
1076         int r;
1077         assert(s);
1078
1079         if ((r = socket_open_fds(s)) < 0) {
1080                 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
1081                 goto fail;
1082         }
1083
1084         socket_unwatch_control_pid(s);
1085
1086         s->control_command_id = SOCKET_EXEC_START_POST;
1087
1088         if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
1089                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
1090                         log_warning("%s failed to run 'start-post' task: %s", s->meta.id, strerror(-r));
1091                         goto fail;
1092                 }
1093
1094                 socket_set_state(s, SOCKET_START_POST);
1095         } else
1096                 socket_enter_listening(s);
1097
1098         return;
1099
1100 fail:
1101         socket_enter_stop_pre(s, false);
1102 }
1103
1104 static void socket_enter_start_pre(Socket *s) {
1105         int r;
1106         assert(s);
1107
1108         socket_unwatch_control_pid(s);
1109
1110         s->control_command_id = SOCKET_EXEC_START_PRE;
1111
1112         if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
1113                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1114                         goto fail;
1115
1116                 socket_set_state(s, SOCKET_START_PRE);
1117         } else
1118                 socket_enter_start_post(s);
1119
1120         return;
1121
1122 fail:
1123         log_warning("%s failed to run 'start-pre' task: %s", s->meta.id, strerror(-r));
1124         socket_enter_dead(s, false);
1125 }
1126
1127 static void socket_enter_running(Socket *s, int cfd) {
1128         int r;
1129         DBusError error;
1130
1131         assert(s);
1132         dbus_error_init(&error);
1133
1134         /* We don't take connections anymore if we are supposed to
1135          * shut down anyway */
1136         if (s->meta.job && s->meta.job->type == JOB_STOP) {
1137                 if (cfd >= 0)
1138                         close_nointr_nofail(cfd);
1139                 else  {
1140                         /* Flush all sockets by closing and reopening them */
1141                         socket_close_fds(s);
1142
1143                         if ((r = socket_watch_fds(s)) < 0) {
1144                                 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
1145                                 socket_enter_stop_pre(s, false);
1146                         }
1147                 }
1148
1149                 return;
1150         }
1151
1152         if (cfd < 0) {
1153                 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, &error, NULL)) < 0)
1154                         goto fail;
1155
1156                 socket_set_state(s, SOCKET_RUNNING);
1157         } else {
1158                 char *prefix, *instance = NULL, *name;
1159                 Service *service;
1160
1161                 if (s->n_connections >= s->max_connections) {
1162                         log_warning("Too many incoming connections (%u)", s->n_connections);
1163                         close_nointr_nofail(cfd);
1164                         return;
1165                 }
1166
1167                 if ((r = socket_instantiate_service(s)) < 0)
1168                         goto fail;
1169
1170                 if ((r = instance_from_socket(cfd, s->n_accepted, &instance)) < 0)
1171                         goto fail;
1172
1173                 if (!(prefix = unit_name_to_prefix(s->meta.id))) {
1174                         free(instance);
1175                         r = -ENOMEM;
1176                         goto fail;
1177                 }
1178
1179                 name = unit_name_build(prefix, instance, ".service");
1180                 free(prefix);
1181                 free(instance);
1182
1183                 if (!name) {
1184                         r = -ENOMEM;
1185                         goto fail;
1186                 }
1187
1188                 if ((r = unit_add_name(UNIT(s->service), name)) < 0) {
1189                         free(name);
1190                         goto fail;
1191                 }
1192
1193                 service = s->service;
1194                 s->service = NULL;
1195                 s->n_accepted ++;
1196
1197                 unit_choose_id(UNIT(service), name);
1198                 free(name);
1199
1200                 if ((r = service_set_socket_fd(service, cfd, s)) < 0)
1201                         goto fail;
1202
1203                 cfd = -1;
1204                 s->n_connections ++;
1205
1206                 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(service), JOB_REPLACE, true, &error, NULL)) < 0)
1207                         goto fail;
1208         }
1209
1210         return;
1211
1212 fail:
1213         log_warning("%s failed to queue socket startup job: %s", s->meta.id, bus_error(&error, r));
1214         socket_enter_stop_pre(s, false);
1215
1216         if (cfd >= 0)
1217                 close_nointr_nofail(cfd);
1218
1219         dbus_error_free(&error);
1220 }
1221
1222 static void socket_run_next(Socket *s, bool success) {
1223         int r;
1224
1225         assert(s);
1226         assert(s->control_command);
1227         assert(s->control_command->command_next);
1228
1229         if (!success)
1230                 s->failure = true;
1231
1232         socket_unwatch_control_pid(s);
1233
1234         s->control_command = s->control_command->command_next;
1235
1236         if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1237                 goto fail;
1238
1239         return;
1240
1241 fail:
1242         log_warning("%s failed to run next task: %s", s->meta.id, strerror(-r));
1243
1244         if (s->state == SOCKET_START_POST)
1245                 socket_enter_stop_pre(s, false);
1246         else if (s->state == SOCKET_STOP_POST)
1247                 socket_enter_dead(s, false);
1248         else
1249                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1250 }
1251
1252 static int socket_start(Unit *u) {
1253         Socket *s = SOCKET(u);
1254
1255         assert(s);
1256
1257         /* We cannot fulfill this request right now, try again later
1258          * please! */
1259         if (s->state == SOCKET_STOP_PRE ||
1260             s->state == SOCKET_STOP_PRE_SIGKILL ||
1261             s->state == SOCKET_STOP_PRE_SIGTERM ||
1262             s->state == SOCKET_STOP_POST ||
1263             s->state == SOCKET_FINAL_SIGTERM ||
1264             s->state == SOCKET_FINAL_SIGKILL)
1265                 return -EAGAIN;
1266
1267         if (s->state == SOCKET_START_PRE ||
1268             s->state == SOCKET_START_POST)
1269                 return 0;
1270
1271         /* Cannot run this without the service being around */
1272         if (s->service) {
1273                 if (s->service->meta.load_state != UNIT_LOADED)
1274                         return -ENOENT;
1275
1276                 /* If the service is alredy actvie we cannot start the
1277                  * socket */
1278                 if (s->service->state != SERVICE_DEAD &&
1279                     s->service->state != SERVICE_MAINTENANCE &&
1280                     s->service->state != SERVICE_AUTO_RESTART)
1281                         return -EBUSY;
1282         }
1283
1284         assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
1285
1286         s->failure = false;
1287         socket_enter_start_pre(s);
1288         return 0;
1289 }
1290
1291 static int socket_stop(Unit *u) {
1292         Socket *s = SOCKET(u);
1293
1294         assert(s);
1295
1296         /* Already on it */
1297         if (s->state == SOCKET_STOP_PRE ||
1298             s->state == SOCKET_STOP_PRE_SIGTERM ||
1299             s->state == SOCKET_STOP_PRE_SIGKILL ||
1300             s->state == SOCKET_STOP_POST ||
1301             s->state == SOCKET_FINAL_SIGTERM ||
1302             s->state == SOCKET_FINAL_SIGKILL)
1303                 return 0;
1304
1305         /* If there's already something running we go directly into
1306          * kill mode. */
1307         if (s->state == SOCKET_START_PRE ||
1308             s->state == SOCKET_START_POST) {
1309                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, true);
1310                 return -EAGAIN;
1311         }
1312
1313         assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
1314
1315         socket_enter_stop_pre(s, true);
1316         return 0;
1317 }
1318
1319 static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1320         Socket *s = SOCKET(u);
1321         SocketPort *p;
1322         int r;
1323
1324         assert(u);
1325         assert(f);
1326         assert(fds);
1327
1328         unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1329         unit_serialize_item(u, f, "failure", yes_no(s->failure));
1330         unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1331
1332         if (s->control_pid > 0)
1333                 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) s->control_pid);
1334
1335         if (s->control_command_id >= 0)
1336                 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1337
1338         LIST_FOREACH(port, p, s->ports) {
1339                 int copy;
1340
1341                 if (p->fd < 0)
1342                         continue;
1343
1344                 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1345                         return copy;
1346
1347                 if (p->type == SOCKET_SOCKET) {
1348                         char *t;
1349
1350                         if ((r = socket_address_print(&p->address, &t)) < 0)
1351                                 return r;
1352
1353                         unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
1354                         free(t);
1355                 } else {
1356                         assert(p->type == SOCKET_FIFO);
1357                         unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1358                 }
1359         }
1360
1361         return 0;
1362 }
1363
1364 static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1365         Socket *s = SOCKET(u);
1366         int r;
1367
1368         assert(u);
1369         assert(key);
1370         assert(value);
1371         assert(fds);
1372
1373         if (streq(key, "state")) {
1374                 SocketState state;
1375
1376                 if ((state = socket_state_from_string(value)) < 0)
1377                         log_debug("Failed to parse state value %s", value);
1378                 else
1379                         s->deserialized_state = state;
1380         } else if (streq(key, "failure")) {
1381                 int b;
1382
1383                 if ((b = parse_boolean(value)) < 0)
1384                         log_debug("Failed to parse failure value %s", value);
1385                 else
1386                         s->failure = b || s->failure;
1387
1388         } else if (streq(key, "n-accepted")) {
1389                 unsigned k;
1390
1391                 if ((r = safe_atou(value, &k)) < 0)
1392                         log_debug("Failed to parse n-accepted value %s", value);
1393                 else
1394                         s->n_accepted += k;
1395         } else if (streq(key, "control-pid")) {
1396                 pid_t pid;
1397
1398                 if ((r = parse_pid(value, &pid)) < 0)
1399                         log_debug("Failed to parse control-pid value %s", value);
1400                 else
1401                         s->control_pid = pid;
1402         } else if (streq(key, "control-command")) {
1403                 SocketExecCommand id;
1404
1405                 if ((id = socket_exec_command_from_string(value)) < 0)
1406                         log_debug("Failed to parse exec-command value %s", value);
1407                 else {
1408                         s->control_command_id = id;
1409                         s->control_command = s->exec_command[id];
1410                 }
1411         } else if (streq(key, "fifo")) {
1412                 int fd, skip = 0;
1413                 SocketPort *p;
1414
1415                 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1416                         log_debug("Failed to parse fifo value %s", value);
1417                 else {
1418
1419                         LIST_FOREACH(port, p, s->ports)
1420                                 if (streq(p->path, value+skip))
1421                                         break;
1422
1423                         if (p) {
1424                                 if (p->fd >= 0)
1425                                         close_nointr_nofail(p->fd);
1426                                 p->fd = fdset_remove(fds, fd);
1427                         }
1428                 }
1429
1430         } else if (streq(key, "socket")) {
1431                 int fd, type, skip = 0;
1432                 SocketPort *p;
1433
1434                 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
1435                         log_debug("Failed to parse socket value %s", value);
1436                 else {
1437
1438                         LIST_FOREACH(port, p, s->ports)
1439                                 if (socket_address_is(&p->address, value+skip, type))
1440                                         break;
1441
1442                         if (p) {
1443                                 if (p->fd >= 0)
1444                                         close_nointr_nofail(p->fd);
1445                                 p->fd = fdset_remove(fds, fd);
1446                         }
1447                 }
1448
1449         } else
1450                 log_debug("Unknown serialization key '%s'", key);
1451
1452         return 0;
1453 }
1454
1455 static UnitActiveState socket_active_state(Unit *u) {
1456         assert(u);
1457
1458         return state_translation_table[SOCKET(u)->state];
1459 }
1460
1461 static const char *socket_sub_state_to_string(Unit *u) {
1462         assert(u);
1463
1464         return socket_state_to_string(SOCKET(u)->state);
1465 }
1466
1467 static bool socket_check_gc(Unit *u) {
1468         Socket *s = SOCKET(u);
1469
1470         assert(u);
1471
1472         return s->n_connections > 0;
1473 }
1474
1475 static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
1476         Socket *s = SOCKET(u);
1477         int cfd = -1;
1478
1479         assert(s);
1480         assert(fd >= 0);
1481
1482         if (s->state != SOCKET_LISTENING)
1483                 return;
1484
1485         log_debug("Incoming traffic on %s", u->meta.id);
1486
1487         if (events != EPOLLIN) {
1488                 log_error("Got invalid poll event on socket.");
1489                 goto fail;
1490         }
1491
1492         if (w->socket_accept) {
1493                 for (;;) {
1494
1495                         if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1496
1497                                 if (errno == EINTR)
1498                                         continue;
1499
1500                                 log_error("Failed to accept socket: %m");
1501                                 goto fail;
1502                         }
1503
1504                         break;
1505                 }
1506
1507                 socket_apply_socket_options(s, cfd);
1508         }
1509
1510         socket_enter_running(s, cfd);
1511         return;
1512
1513 fail:
1514         socket_enter_stop_pre(s, false);
1515 }
1516
1517 static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1518         Socket *s = SOCKET(u);
1519         bool success;
1520
1521         assert(s);
1522         assert(pid >= 0);
1523
1524         if (pid != s->control_pid)
1525                 return;
1526
1527         s->control_pid = 0;
1528
1529         success = is_clean_exit(code, status);
1530
1531         if (s->control_command) {
1532                 exec_status_exit(&s->control_command->exec_status, pid, code, status);
1533
1534                 if (s->control_command->ignore)
1535                         success = true;
1536         }
1537
1538         log_full(success ? LOG_DEBUG : LOG_NOTICE,
1539                  "%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1540         s->failure = s->failure || !success;
1541
1542         if (s->control_command && s->control_command->command_next && success) {
1543                 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
1544                 socket_run_next(s, success);
1545         } else {
1546                 s->control_command = NULL;
1547                 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1548
1549                 /* No further commands for this step, so let's figure
1550                  * out what to do next */
1551
1552                 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
1553
1554                 switch (s->state) {
1555
1556                 case SOCKET_START_PRE:
1557                         if (success)
1558                                 socket_enter_start_post(s);
1559                         else
1560                                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1561                         break;
1562
1563                 case SOCKET_START_POST:
1564                         if (success)
1565                                 socket_enter_listening(s);
1566                         else
1567                                 socket_enter_stop_pre(s, false);
1568                         break;
1569
1570                 case SOCKET_STOP_PRE:
1571                 case SOCKET_STOP_PRE_SIGTERM:
1572                 case SOCKET_STOP_PRE_SIGKILL:
1573                         socket_enter_stop_post(s, success);
1574                         break;
1575
1576                 case SOCKET_STOP_POST:
1577                 case SOCKET_FINAL_SIGTERM:
1578                 case SOCKET_FINAL_SIGKILL:
1579                         socket_enter_dead(s, success);
1580                         break;
1581
1582                 default:
1583                         assert_not_reached("Uh, control process died at wrong time.");
1584                 }
1585         }
1586 }
1587
1588 static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1589         Socket *s = SOCKET(u);
1590
1591         assert(s);
1592         assert(elapsed == 1);
1593         assert(w == &s->timer_watch);
1594
1595         switch (s->state) {
1596
1597         case SOCKET_START_PRE:
1598                 log_warning("%s starting timed out. Terminating.", u->meta.id);
1599                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1600
1601         case SOCKET_START_POST:
1602                 log_warning("%s starting timed out. Stopping.", u->meta.id);
1603                 socket_enter_stop_pre(s, false);
1604                 break;
1605
1606         case SOCKET_STOP_PRE:
1607                 log_warning("%s stopping timed out. Terminating.", u->meta.id);
1608                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1609                 break;
1610
1611         case SOCKET_STOP_PRE_SIGTERM:
1612                 log_warning("%s stopping timed out. Killing.", u->meta.id);
1613                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1614                 break;
1615
1616         case SOCKET_STOP_PRE_SIGKILL:
1617                 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
1618                 socket_enter_stop_post(s, false);
1619                 break;
1620
1621         case SOCKET_STOP_POST:
1622                 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
1623                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1624                 break;
1625
1626         case SOCKET_FINAL_SIGTERM:
1627                 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
1628                 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
1629                 break;
1630
1631         case SOCKET_FINAL_SIGKILL:
1632                 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
1633                 socket_enter_dead(s, false);
1634                 break;
1635
1636         default:
1637                 assert_not_reached("Timeout at wrong time.");
1638         }
1639 }
1640
1641 int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1642         int *rfds;
1643         unsigned rn_fds, k;
1644         SocketPort *p;
1645
1646         assert(s);
1647         assert(fds);
1648         assert(n_fds);
1649
1650         /* Called from the service code for requesting our fds */
1651
1652         rn_fds = 0;
1653         LIST_FOREACH(port, p, s->ports)
1654                 if (p->fd >= 0)
1655                         rn_fds++;
1656
1657         if (!(rfds = new(int, rn_fds)) < 0)
1658                 return -ENOMEM;
1659
1660         k = 0;
1661         LIST_FOREACH(port, p, s->ports)
1662                 if (p->fd >= 0)
1663                         rfds[k++] = p->fd;
1664
1665         assert(k == rn_fds);
1666
1667         *fds = rfds;
1668         *n_fds = rn_fds;
1669
1670         return 0;
1671 }
1672
1673 void socket_notify_service_dead(Socket *s) {
1674         assert(s);
1675
1676         /* The service is dead. Dang!
1677          *
1678          * This is strictly for one-instance-for-all-connections
1679          * services. */
1680
1681         if (s->state == SOCKET_RUNNING) {
1682                 log_debug("%s got notified about service death.", s->meta.id);
1683                 socket_enter_listening(s);
1684         }
1685 }
1686
1687 void socket_connection_unref(Socket *s) {
1688         assert(s);
1689
1690         /* The service is dead. Yay!
1691          *
1692          * This is strictly for one-onstance-per-connection
1693          * services. */
1694
1695         assert(s->n_connections > 0);
1696         s->n_connections--;
1697
1698         log_debug("%s: One connection closed, %u left.", s->meta.id, s->n_connections);
1699 }
1700
1701 static void socket_reset_maintenance(Unit *u) {
1702         Socket *s = SOCKET(u);
1703
1704         assert(s);
1705
1706         if (s->state == SOCKET_MAINTENANCE)
1707                 socket_set_state(s, SOCKET_DEAD);
1708
1709         s->failure = false;
1710 }
1711
1712 static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1713         [SOCKET_DEAD] = "dead",
1714         [SOCKET_START_PRE] = "start-pre",
1715         [SOCKET_START_POST] = "start-post",
1716         [SOCKET_LISTENING] = "listening",
1717         [SOCKET_RUNNING] = "running",
1718         [SOCKET_STOP_PRE] = "stop-pre",
1719         [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1720         [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1721         [SOCKET_STOP_POST] = "stop-post",
1722         [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1723         [SOCKET_FINAL_SIGKILL] = "final-sigkill",
1724         [SOCKET_MAINTENANCE] = "maintenance"
1725 };
1726
1727 DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1728
1729 static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1730         [SOCKET_EXEC_START_PRE] = "StartPre",
1731         [SOCKET_EXEC_START_POST] = "StartPost",
1732         [SOCKET_EXEC_STOP_PRE] = "StopPre",
1733         [SOCKET_EXEC_STOP_POST] = "StopPost"
1734 };
1735
1736 DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1737
1738 const UnitVTable socket_vtable = {
1739         .suffix = ".socket",
1740
1741         .init = socket_init,
1742         .done = socket_done,
1743         .load = socket_load,
1744
1745         .coldplug = socket_coldplug,
1746
1747         .dump = socket_dump,
1748
1749         .start = socket_start,
1750         .stop = socket_stop,
1751
1752         .serialize = socket_serialize,
1753         .deserialize_item = socket_deserialize_item,
1754
1755         .active_state = socket_active_state,
1756         .sub_state_to_string = socket_sub_state_to_string,
1757
1758         .check_gc = socket_check_gc,
1759
1760         .fd_event = socket_fd_event,
1761         .sigchld_event = socket_sigchld_event,
1762         .timer_event = socket_timer_event,
1763
1764         .reset_maintenance = socket_reset_maintenance,
1765
1766         .bus_message_handler = bus_socket_message_handler
1767 };