1
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4
Copyright 2010 Lennart Poettering
6
Permission is hereby granted, free of charge, to any person
7
obtaining a copy of this software and associated documentation files
8
(the "Software"), to deal in the Software without restriction,
9
including without limitation the rights to use, copy, modify, merge,
10
publish, distribute, sublicense, and/or sell copies of the Software,
11
and to permit persons to whom the Software is furnished to do so,
12
subject to the following conditions:
14
The above copyright notice and this permission notice shall be
15
included in all copies or substantial portions of the Software.
17
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
18
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
19
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
20
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
21
BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
22
ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
23
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31
#include <sys/types.h>
33
#include <sys/socket.h>
36
#include <linux/fcntl.h>
38
#include <sys/fcntl.h>
40
#include <netinet/in.h>
50
#if defined(__linux__)
54
#include "sd-daemon.h"
57
#ifdef SD_EXPORT_SYMBOLS
59
#define _sd_export_ __attribute__ ((visibility("default")))
61
/* Don't export the symbols */
62
#define _sd_export_ __attribute__ ((visibility("hidden")))
68
_sd_export_ int sd_listen_fds(int unset_environment) {
70
#if defined(DISABLE_SYSTEMD) || !defined(__linux__)
78
if (!(e = getenv("LISTEN_PID"))) {
84
l = strtoul(e, &p, 10);
91
if (!p || *p || l <= 0) {
97
if (getpid() != (pid_t) l) {
102
if (!(e = getenv("LISTEN_FDS"))) {
108
l = strtoul(e, &p, 10);
120
for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + (int) l; fd ++) {
123
if ((flags = fcntl(fd, F_GETFD)) < 0) {
128
if (flags & FD_CLOEXEC)
131
if (fcntl(fd, F_SETFD, flags | FD_CLOEXEC) < 0) {
140
if (unset_environment) {
141
unsetenv("LISTEN_PID");
142
unsetenv("LISTEN_FDS");
149
_sd_export_ int sd_is_fifo(int fd, const char *path) {
155
memset(&st_fd, 0, sizeof(st_fd));
156
if (fstat(fd, &st_fd) < 0)
159
if (!S_ISFIFO(st_fd.st_mode))
165
memset(&st_path, 0, sizeof(st_path));
166
if (stat(path, &st_path) < 0) {
168
if (errno == ENOENT || errno == ENOTDIR)
175
st_path.st_dev == st_fd.st_dev &&
176
st_path.st_ino == st_fd.st_ino;
182
_sd_export_ int sd_is_special(int fd, const char *path) {
188
if (fstat(fd, &st_fd) < 0)
191
if (!S_ISREG(st_fd.st_mode) && !S_ISCHR(st_fd.st_mode))
197
if (stat(path, &st_path) < 0) {
199
if (errno == ENOENT || errno == ENOTDIR)
205
if (S_ISREG(st_fd.st_mode) && S_ISREG(st_path.st_mode))
207
st_path.st_dev == st_fd.st_dev &&
208
st_path.st_ino == st_fd.st_ino;
209
else if (S_ISCHR(st_fd.st_mode) && S_ISCHR(st_path.st_mode))
210
return st_path.st_rdev == st_fd.st_rdev;
218
static int sd_is_socket_internal(int fd, int type, int listening) {
221
if (fd < 0 || type < 0)
224
if (fstat(fd, &st_fd) < 0)
227
if (!S_ISSOCK(st_fd.st_mode))
232
socklen_t l = sizeof(other_type);
234
if (getsockopt(fd, SOL_SOCKET, SO_TYPE, &other_type, &l) < 0)
237
if (l != sizeof(other_type))
240
if (other_type != type)
244
if (listening >= 0) {
246
socklen_t l = sizeof(accepting);
248
if (getsockopt(fd, SOL_SOCKET, SO_ACCEPTCONN, &accepting, &l) < 0)
251
if (l != sizeof(accepting))
254
if (!accepting != !listening)
261
union sockaddr_union {
263
struct sockaddr_in in4;
264
struct sockaddr_in6 in6;
265
struct sockaddr_un un;
266
struct sockaddr_storage storage;
269
_sd_export_ int sd_is_socket(int fd, int family, int type, int listening) {
275
if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
279
union sockaddr_union sockaddr;
282
memset(&sockaddr, 0, sizeof(sockaddr));
283
l = sizeof(sockaddr);
285
if (getsockname(fd, &sockaddr.sa, &l) < 0)
288
if (l < sizeof(sa_family_t))
291
return sockaddr.sa.sa_family == family;
297
_sd_export_ int sd_is_socket_inet(int fd, int family, int type, int listening, uint16_t port) {
298
union sockaddr_union sockaddr;
302
if (family != 0 && family != AF_INET && family != AF_INET6)
305
if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
308
memset(&sockaddr, 0, sizeof(sockaddr));
309
l = sizeof(sockaddr);
311
if (getsockname(fd, &sockaddr.sa, &l) < 0)
314
if (l < sizeof(sa_family_t))
317
if (sockaddr.sa.sa_family != AF_INET &&
318
sockaddr.sa.sa_family != AF_INET6)
322
if (sockaddr.sa.sa_family != family)
326
if (sockaddr.sa.sa_family == AF_INET) {
327
if (l < sizeof(struct sockaddr_in))
330
return htons(port) == sockaddr.in4.sin_port;
332
if (l < sizeof(struct sockaddr_in6))
335
return htons(port) == sockaddr.in6.sin6_port;
342
_sd_export_ int sd_is_socket_unix(int fd, int type, int listening, const char *path, size_t length) {
343
union sockaddr_union sockaddr;
347
if ((r = sd_is_socket_internal(fd, type, listening)) <= 0)
350
memset(&sockaddr, 0, sizeof(sockaddr));
351
l = sizeof(sockaddr);
353
if (getsockname(fd, &sockaddr.sa, &l) < 0)
356
if (l < sizeof(sa_family_t))
359
if (sockaddr.sa.sa_family != AF_UNIX)
364
length = strlen(path);
368
return l == offsetof(struct sockaddr_un, sun_path);
371
/* Normal path socket */
373
(l >= offsetof(struct sockaddr_un, sun_path) + length + 1) &&
374
memcmp(path, sockaddr.un.sun_path, length+1) == 0;
376
/* Abstract namespace socket */
378
(l == offsetof(struct sockaddr_un, sun_path) + length) &&
379
memcmp(path, sockaddr.un.sun_path, length) == 0;
385
_sd_export_ int sd_is_mq(int fd, const char *path) {
386
#if !defined(__linux__)
394
if (mq_getattr(fd, &attr) < 0)
398
char fpath[PATH_MAX];
404
if (fstat(fd, &a) < 0)
407
strncpy(stpcpy(fpath, "/dev/mqueue"), path, sizeof(fpath) - 12);
408
fpath[sizeof(fpath)-1] = 0;
410
if (stat(fpath, &b) < 0)
413
if (a.st_dev != b.st_dev ||
414
a.st_ino != b.st_ino)
422
_sd_export_ int sd_notify(int unset_environment, const char *state) {
423
#if defined(DISABLE_SYSTEMD) || !defined(__linux__) || !defined(SOCK_CLOEXEC)
427
struct msghdr msghdr;
429
union sockaddr_union sockaddr;
437
if (!(e = getenv("NOTIFY_SOCKET")))
440
/* Must be an abstract socket, or an absolute path */
441
if ((e[0] != '@' && e[0] != '/') || e[1] == 0) {
446
if ((fd = socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0)) < 0) {
451
memset(&sockaddr, 0, sizeof(sockaddr));
452
sockaddr.sa.sa_family = AF_UNIX;
453
strncpy(sockaddr.un.sun_path, e, sizeof(sockaddr.un.sun_path));
455
if (sockaddr.un.sun_path[0] == '@')
456
sockaddr.un.sun_path[0] = 0;
458
memset(&iovec, 0, sizeof(iovec));
459
iovec.iov_base = (char*) state;
460
iovec.iov_len = strlen(state);
462
memset(&msghdr, 0, sizeof(msghdr));
463
msghdr.msg_name = &sockaddr;
464
msghdr.msg_namelen = offsetof(struct sockaddr_un, sun_path) + strlen(e);
466
if (msghdr.msg_namelen > sizeof(struct sockaddr_un))
467
msghdr.msg_namelen = sizeof(struct sockaddr_un);
469
msghdr.msg_iov = &iovec;
470
msghdr.msg_iovlen = 1;
472
if (sendmsg(fd, &msghdr, MSG_NOSIGNAL) < 0) {
480
if (unset_environment)
481
unsetenv("NOTIFY_SOCKET");
490
_sd_export_ int sd_notifyf(int unset_environment, const char *format, ...) {
491
#if defined(DISABLE_SYSTEMD) || !defined(__linux__)
498
va_start(ap, format);
499
r = vasprintf(&p, format, ap);
505
r = sd_notify(unset_environment, p);
512
_sd_export_ int sd_booted(void) {
513
#if defined(DISABLE_SYSTEMD) || !defined(__linux__)
519
/* We simply test whether the systemd cgroup hierarchy is
522
if (lstat("/sys/fs/cgroup", &a) < 0)
525
if (lstat("/sys/fs/cgroup/systemd", &b) < 0)
528
return a.st_dev != b.st_dev;