• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

systemd / systemd / 14583755890

21 Apr 2025 11:58PM UTC coverage: 72.043% (-0.06%) from 72.107%
14583755890

push

github

web-flow
cgroup-util: drop cg_freezer_supported() and cg_ns_supported() (#37201)

10 of 12 new or added lines in 7 files covered. (83.33%)

704 existing lines in 44 files now uncovered.

296622 of 411727 relevant lines covered (72.04%)

687023.56 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

55.21
/src/core/socket.c
1
/* SPDX-License-Identifier: LGPL-2.1-or-later */
2

3
#include <arpa/inet.h>
4
#include <errno.h>
5
#include <fcntl.h>
6
#include <mqueue.h>
7
#include <netinet/tcp.h>
8
#include <sys/epoll.h>
9
#include <sys/stat.h>
10
#include <unistd.h>
11
#include <linux/sctp.h>
12

13
#include "alloc-util.h"
14
#include "bpf-firewall.h"
15
#include "bus-error.h"
16
#include "bus-util.h"
17
#include "chase.h"
18
#include "constants.h"
19
#include "copy.h"
20
#include "dbus-socket.h"
21
#include "dbus-unit.h"
22
#include "errno-list.h"
23
#include "exit-status.h"
24
#include "fd-util.h"
25
#include "format-util.h"
26
#include "in-addr-util.h"
27
#include "io-util.h"
28
#include "ip-protocol-list.h"
29
#include "label-util.h"
30
#include "log.h"
31
#include "mkdir-label.h"
32
#include "parse-util.h"
33
#include "path-util.h"
34
#include "pidfd-util.h"
35
#include "process-util.h"
36
#include "recurse-dir.h"
37
#include "selinux-util.h"
38
#include "serialize.h"
39
#include "service.h"
40
#include "signal-util.h"
41
#include "smack-util.h"
42
#include "socket.h"
43
#include "socket-netlink.h"
44
#include "special.h"
45
#include "string-table.h"
46
#include "string-util.h"
47
#include "strv.h"
48
#include "unit-name.h"
49
#include "unit.h"
50
#include "user-util.h"
51

52
struct SocketPeer {
53
        unsigned n_ref;
54

55
        Socket *socket;
56
        union sockaddr_union peer;
57
        socklen_t peer_salen;
58
        struct ucred peer_cred;
59
};
60

61
static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
62
        [SOCKET_DEAD]             = UNIT_INACTIVE,
63
        [SOCKET_START_PRE]        = UNIT_ACTIVATING,
64
        [SOCKET_START_OPEN]       = UNIT_ACTIVATING,
65
        [SOCKET_START_CHOWN]      = UNIT_ACTIVATING,
66
        [SOCKET_START_POST]       = UNIT_ACTIVATING,
67
        [SOCKET_LISTENING]        = UNIT_ACTIVE,
68
        [SOCKET_RUNNING]          = UNIT_ACTIVE,
69
        [SOCKET_STOP_PRE]         = UNIT_DEACTIVATING,
70
        [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
71
        [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
72
        [SOCKET_STOP_POST]        = UNIT_DEACTIVATING,
73
        [SOCKET_FINAL_SIGTERM]    = UNIT_DEACTIVATING,
74
        [SOCKET_FINAL_SIGKILL]    = UNIT_DEACTIVATING,
75
        [SOCKET_FAILED]           = UNIT_FAILED,
76
        [SOCKET_CLEANING]         = UNIT_MAINTENANCE,
77
};
78

79
static int socket_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata);
80
static int socket_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata);
81

82
static bool SOCKET_STATE_WITH_PROCESS(SocketState state) {
9,516✔
83
        return IN_SET(state,
9,516✔
84
                      SOCKET_START_PRE,
85
                      SOCKET_START_CHOWN,
86
                      SOCKET_START_POST,
87
                      SOCKET_STOP_PRE,
88
                      SOCKET_STOP_PRE_SIGTERM,
89
                      SOCKET_STOP_PRE_SIGKILL,
90
                      SOCKET_STOP_POST,
91
                      SOCKET_FINAL_SIGTERM,
92
                      SOCKET_FINAL_SIGKILL,
93
                      SOCKET_CLEANING);
94
}
95

96
static bool SOCKET_SERVICE_IS_ACTIVE(Service *s, bool allow_finalize) {
3,613✔
97
        assert(s);
3,613✔
98

99
        /* If unit_active_state() reports inactive/failed then it's all good, otherwise we need to
100
         * manually exclude SERVICE_AUTO_RESTART and SERVICE_AUTO_RESTART_QUEUED, in which cases
101
         * the start job hasn't been enqueued/run, but are only placeholders in order to allow
102
         * canceling auto restart. */
103

104
        if (UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(UNIT(s))))
3,613✔
105
                return false;
106

107
        if (IN_SET(s->state, SERVICE_AUTO_RESTART, SERVICE_AUTO_RESTART_QUEUED))
1,224✔
108
                return false;
109

110
        if (allow_finalize && IN_SET(s->state, SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL, SERVICE_CLEANING))
1,215✔
111
                return false;
×
112

113
        return true;
114
}
115

116
static void socket_init(Unit *u) {
5,046✔
117
        Socket *s = ASSERT_PTR(SOCKET(u));
5,046✔
118

119
        assert(u->load_state == UNIT_STUB);
5,046✔
120

121
        s->backlog = SOMAXCONN_DELUXE;
5,046✔
122
        s->timeout_usec = u->manager->defaults.timeout_start_usec;
5,046✔
123
        s->directory_mode = 0755;
5,046✔
124
        s->socket_mode = 0666;
5,046✔
125

126
        s->max_connections = 64;
5,046✔
127

128
        s->priority = -1;
5,046✔
129
        s->ip_tos = -1;
5,046✔
130
        s->ip_ttl = -1;
5,046✔
131
        s->mark = -1;
5,046✔
132

133
        s->exec_context.std_output = u->manager->defaults.std_output;
5,046✔
134
        s->exec_context.std_error = u->manager->defaults.std_error;
5,046✔
135

136
        s->control_pid = PIDREF_NULL;
5,046✔
137
        s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
5,046✔
138

139
        s->trigger_limit = RATELIMIT_OFF;
5,046✔
140

141
        s->poll_limit = RATELIMIT_OFF;
5,046✔
142
}
5,046✔
143

144
static void socket_unwatch_control_pid(Socket *s) {
22,633✔
145
        assert(s);
22,633✔
146
        unit_unwatch_pidref_done(UNIT(s), &s->control_pid);
22,633✔
147
}
22,633✔
148

149
static void socket_port_close_auxiliary_fds(SocketPort *p) {
7,268✔
150
        assert(p);
7,268✔
151

152
        close_many(p->auxiliary_fds, p->n_auxiliary_fds);
7,268✔
153
        p->auxiliary_fds = mfree(p->auxiliary_fds);
7,268✔
154
        p->n_auxiliary_fds = 0;
7,268✔
155
}
7,268✔
156

157
SocketPort* socket_port_free(SocketPort *p) {
5,364✔
158
        if (!p)
5,364✔
159
                return NULL;
160

161
        sd_event_source_unref(p->event_source);
5,364✔
162

163
        socket_port_close_auxiliary_fds(p);
5,364✔
164
        safe_close(p->fd);
5,364✔
165
        free(p->path);
5,364✔
166

167
        return mfree(p);
5,364✔
168
}
169

170
void socket_free_ports(Socket *s) {
5,046✔
171
        assert(s);
5,046✔
172

173
        LIST_CLEAR(port, s->ports, socket_port_free);
10,410✔
174
}
5,046✔
175

176
static void socket_done(Unit *u) {
5,046✔
177
        Socket *s = ASSERT_PTR(SOCKET(u));
5,046✔
178
        SocketPeer *p;
5,046✔
179

180
        socket_free_ports(s);
5,046✔
181

182
        while ((p = set_steal_first(s->peers_by_address)))
5,046✔
183
                p->socket = NULL;
×
184

185
        s->peers_by_address = set_free(s->peers_by_address);
5,046✔
186

187
        s->exec_runtime = exec_runtime_free(s->exec_runtime);
5,046✔
188

189
        exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
5,046✔
190
        s->control_command = NULL;
5,046✔
191

192
        socket_unwatch_control_pid(s);
5,046✔
193

194
        unit_ref_unset(&s->service);
5,046✔
195

196
        s->tcp_congestion = mfree(s->tcp_congestion);
5,046✔
197
        s->bind_to_device = mfree(s->bind_to_device);
5,046✔
198

199
        s->smack = mfree(s->smack);
5,046✔
200
        s->smack_ip_in = mfree(s->smack_ip_in);
5,046✔
201
        s->smack_ip_out = mfree(s->smack_ip_out);
5,046✔
202

203
        strv_free(s->symlinks);
5,046✔
204

205
        s->user = mfree(s->user);
5,046✔
206
        s->group = mfree(s->group);
5,046✔
207

208
        s->fdname = mfree(s->fdname);
5,046✔
209

210
        s->timer_event_source = sd_event_source_disable_unref(s->timer_event_source);
5,046✔
211
}
5,046✔
212

213
static int socket_arm_timer(Socket *s, bool relative, usec_t usec) {
171✔
214
        assert(s);
171✔
215

216
        return unit_arm_timer(UNIT(s), &s->timer_event_source, relative, usec, socket_dispatch_timer);
171✔
217
}
218

219
static bool have_non_accept_socket(Socket *s) {
6,220✔
220
        assert(s);
6,220✔
221

222
        if (!s->accept)
6,220✔
223
                return true;
224

225
        LIST_FOREACH(port, p, s->ports) {
4,708✔
226

227
                if (p->type != SOCKET_SOCKET)
2,354✔
228
                        return true;
229

230
                if (!socket_address_can_accept(&p->address))
2,354✔
231
                        return true;
232
        }
233

234
        return false;
235
}
236

237
static int socket_add_mount_dependencies(Socket *s) {
5,043✔
238
        int r;
5,043✔
239

240
        assert(s);
5,043✔
241

242
        LIST_FOREACH(port, p, s->ports) {
10,407✔
243
                const char *path = NULL;
5,364✔
244

245
                if (p->type == SOCKET_SOCKET)
5,364✔
246
                        path = socket_address_get_path(&p->address);
5,131✔
247
                else if (IN_SET(p->type, SOCKET_FIFO, SOCKET_SPECIAL, SOCKET_USB_FUNCTION))
233✔
248
                        path = p->path;
233✔
249

250
                if (!path)
5,364✔
251
                        continue;
342✔
252

253
                r = unit_add_mounts_for(UNIT(s), path, UNIT_DEPENDENCY_FILE, UNIT_MOUNT_REQUIRES);
5,022✔
254
                if (r < 0)
5,022✔
255
                        return r;
256
        }
257

258
        return 0;
259
}
260

261
static int socket_add_device_dependencies(Socket *s) {
5,043✔
262
        char *t;
5,043✔
263

264
        assert(s);
5,043✔
265

266
        if (!s->bind_to_device || streq(s->bind_to_device, "lo"))
5,043✔
267
                return 0;
268

269
        t = strjoina("/sys/subsystem/net/devices/", s->bind_to_device);
×
270
        return unit_add_node_dependency(UNIT(s), t, UNIT_BINDS_TO, UNIT_DEPENDENCY_FILE);
×
271
}
272

273
static int socket_add_default_dependencies(Socket *s) {
5,043✔
274
        int r;
5,043✔
275

276
        assert(s);
5,043✔
277

278
        if (!UNIT(s)->default_dependencies)
5,043✔
279
                return 0;
280

281
        r = unit_add_dependency_by_name(UNIT(s), UNIT_BEFORE, SPECIAL_SOCKETS_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
4,876✔
282
        if (r < 0)
2,438✔
283
                return r;
284

285
        if (MANAGER_IS_SYSTEM(UNIT(s)->manager)) {
2,438✔
286
                r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
1,046✔
287
                if (r < 0)
1,046✔
288
                        return r;
289
        }
290

291
        return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
2,438✔
292
}
293

294
static bool socket_has_exec(Socket *s) {
5,043✔
295
        assert(s);
5,043✔
296

297
        FOREACH_ARRAY(i, s->exec_command, _SOCKET_EXEC_COMMAND_MAX)
29,736✔
298
                if (*i)
24,867✔
299
                        return true;
300

301
        return false;
302
}
303

304
static int socket_add_extras(Socket *s) {
5,043✔
305
        Unit *u = UNIT(ASSERT_PTR(s));
5,043✔
306
        int r;
5,043✔
307

308
        /* Pick defaults for the trigger limit, if nothing was explicitly configured. We pick a relatively high limit
309
         * in Accept=yes mode, and a lower limit for Accept=no. Reason: in Accept=yes mode we are invoking accept()
310
         * ourselves before the trigger limit can hit, thus incoming connections are taken off the socket queue quickly
311
         * and reliably. This is different for Accept=no, where the spawned service has to take the incoming traffic
312
         * off the queues, which it might not necessarily do. Moreover, while Accept=no services are supposed to
313
         * process whatever is queued in one go, and thus should normally never have to be started frequently. This is
314
         * different for Accept=yes where each connection is processed by a new service instance, and thus frequent
315
         * service starts are typical.
316
         *
317
         * For the poll limit we follow a similar rule, but use 3/4th of the trigger limit parameters, to
318
         * trigger this earlier. */
319

320
        if (s->trigger_limit.interval == USEC_INFINITY)
5,043✔
321
                s->trigger_limit.interval = 2 * USEC_PER_SEC;
5,043✔
322
        if (s->trigger_limit.burst == UINT_MAX)
5,043✔
323
                s->trigger_limit.burst = s->accept ? 200 : 20;
8,909✔
324

325
        if (s->poll_limit.interval == USEC_INFINITY)
5,043✔
326
                s->poll_limit.interval = 2 * USEC_PER_SEC;
4,897✔
327
        if (s->poll_limit.burst == UINT_MAX)
5,043✔
328
                s->poll_limit.burst = s->accept ? 150 : 15;
8,763✔
329

330
        if (have_non_accept_socket(s)) {
5,043✔
331

332
                if (!UNIT_ISSET(s->service)) {
3,866✔
333
                        Unit *x;
2,413✔
334

335
                        r = unit_load_related_unit(u, ".service", &x);
2,413✔
336
                        if (r < 0)
2,413✔
337
                                return r;
×
338

339
                        unit_ref_set(&s->service, u, x);
2,413✔
340
                }
341

342
                r = unit_add_two_dependencies(u, UNIT_BEFORE, UNIT_TRIGGERS, UNIT_DEREF(s->service), true, UNIT_DEPENDENCY_IMPLICIT);
3,866✔
343
                if (r < 0)
3,866✔
344
                        return r;
345
        }
346

347
        r = socket_add_mount_dependencies(s);
5,043✔
348
        if (r < 0)
5,043✔
349
                return r;
350

351
        r = socket_add_device_dependencies(s);
5,043✔
352
        if (r < 0)
5,043✔
353
                return r;
354

355
        r = unit_patch_contexts(u);
5,043✔
356
        if (r < 0)
5,043✔
357
                return r;
358

359
        if (socket_has_exec(s)) {
5,043✔
360
                r = unit_add_exec_dependencies(u, &s->exec_context);
174✔
361
                if (r < 0)
174✔
362
                        return r;
363
        }
364

365
        r = unit_set_default_slice(u);
5,043✔
366
        if (r < 0)
5,043✔
367
                return r;
368

369
        r = socket_add_default_dependencies(s);
5,043✔
370
        if (r < 0)
5,043✔
371
                return r;
×
372

373
        return 0;
374
}
375

376
static const char* socket_find_symlink_target(Socket *s) {
2,658✔
377
        const char *found = NULL;
2,658✔
378

379
        assert(s);
2,658✔
380

381
        LIST_FOREACH(port, p, s->ports) {
5,316✔
382
                const char *f;
2,850✔
383

384
                switch (p->type) {
2,850✔
385

386
                case SOCKET_FIFO:
132✔
387
                        f = p->path;
132✔
388
                        break;
132✔
389

390
                case SOCKET_SOCKET:
2,718✔
391
                        f = socket_address_get_path(&p->address);
2,718✔
392
                        break;
2,718✔
393

394
                default:
395
                        f = NULL;
396
                }
397

398
                if (f) {
2,850✔
399
                        if (found)
2,784✔
400
                                return NULL;
401

402
                        found = f;
403
                }
404
        }
405

406
        return found;
407
}
408

409
static int socket_verify(Socket *s) {
5,043✔
410
        assert(s);
5,043✔
411
        assert(UNIT(s)->load_state == UNIT_LOADED);
5,043✔
412

413
        if (!s->ports)
5,043✔
414
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Unit has no Listen setting (ListenStream=, ListenDatagram=, ListenFIFO=, ...). Refusing.");
×
415

416
        if (s->max_connections <= 0)
5,043✔
417
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "MaxConnection= setting too small. Refusing.");
×
418

419
        if (s->accept && have_non_accept_socket(s))
5,043✔
420
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Unit configured for accepting sockets, but sockets are non-accepting. Refusing.");
×
421

422
        if (s->accept && UNIT_ISSET(s->service))
5,043✔
423
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Explicit service configuration for accepting socket units not supported. Refusing.");
×
424

425
        if (!strv_isempty(s->symlinks) && !socket_find_symlink_target(s))
5,362✔
426
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Unit has symlinks set but none or more than one node in the file system. Refusing.");
×
427

428
        return 0;
429
}
430

431
static void peer_address_hash_func(const SocketPeer *s, struct siphash *state) {
3✔
432
        assert(s);
3✔
433

434
        if (s->peer.sa.sa_family == AF_INET)
3✔
435
                siphash24_compress_typesafe(s->peer.in.sin_addr, state);
×
436
        else if (s->peer.sa.sa_family == AF_INET6)
3✔
437
                siphash24_compress_typesafe(s->peer.in6.sin6_addr, state);
×
438
        else if (s->peer.sa.sa_family == AF_VSOCK)
3✔
439
                siphash24_compress_typesafe(s->peer.vm.svm_cid, state);
×
440
        else if (s->peer.sa.sa_family == AF_UNIX)
3✔
441
                siphash24_compress_typesafe(s->peer_cred.uid, state);
3✔
442
        else
443
                assert_not_reached();
×
444
}
3✔
445

446
static int peer_address_compare_func(const SocketPeer *x, const SocketPeer *y) {
2✔
447
        int r;
2✔
448

449
        r = CMP(x->peer.sa.sa_family, y->peer.sa.sa_family);
2✔
450
        if (r != 0)
2✔
451
                return r;
×
452

453
        switch (x->peer.sa.sa_family) {
2✔
454
        case AF_INET:
×
455
                return memcmp(&x->peer.in.sin_addr, &y->peer.in.sin_addr, sizeof(x->peer.in.sin_addr));
×
456
        case AF_INET6:
×
457
                return memcmp(&x->peer.in6.sin6_addr, &y->peer.in6.sin6_addr, sizeof(x->peer.in6.sin6_addr));
×
458
        case AF_VSOCK:
×
459
                return CMP(x->peer.vm.svm_cid, y->peer.vm.svm_cid);
×
460
        case AF_UNIX:
2✔
461
                return CMP(x->peer_cred.uid, y->peer_cred.uid);
2✔
462
        }
463
        assert_not_reached();
×
464
}
465

466
DEFINE_PRIVATE_HASH_OPS(peer_address_hash_ops, SocketPeer, peer_address_hash_func, peer_address_compare_func);
467

468
static int socket_load(Unit *u) {
5,046✔
469
        Socket *s = ASSERT_PTR(SOCKET(u));
5,046✔
470
        int r;
5,046✔
471

472
        assert(u->load_state == UNIT_STUB);
5,046✔
473

474
        r = unit_load_fragment_and_dropin(u, true);
5,046✔
475
        if (r < 0)
5,046✔
476
                return r;
477

478
        if (u->load_state != UNIT_LOADED)
5,043✔
479
                return 0;
480

481
        /* This is a new unit? Then let's add in some extras */
482
        r = socket_add_extras(s);
5,043✔
483
        if (r < 0)
5,043✔
484
                return r;
485

486
        return socket_verify(s);
5,043✔
487
}
488

489
static SocketPeer* socket_peer_dup(const SocketPeer *q) {
1✔
490
        SocketPeer *p;
1✔
491

492
        assert(q);
1✔
493

494
        p = new(SocketPeer, 1);
1✔
495
        if (!p)
1✔
496
                return NULL;
497

498
        *p = (SocketPeer) {
1✔
499
                .n_ref = 1,
500
                .peer = q->peer,
1✔
501
                .peer_salen = q->peer_salen,
1✔
502
                .peer_cred = q->peer_cred,
1✔
503
        };
504

505
        return p;
1✔
506
}
507

508
static SocketPeer* socket_peer_free(SocketPeer *p) {
1✔
509
        assert(p);
1✔
510

511
        if (p->socket)
1✔
512
                set_remove(p->socket->peers_by_address, p);
1✔
513

514
        return mfree(p);
1✔
515
}
516

517
DEFINE_TRIVIAL_REF_UNREF_FUNC(SocketPeer, socket_peer, socket_peer_free);
3✔
518

519
int socket_acquire_peer(Socket *s, int fd, SocketPeer **ret) {
2✔
520
        _cleanup_(socket_peer_unrefp) SocketPeer *remote = NULL;
2✔
521
        SocketPeer key = {
2✔
522
                .peer_salen = sizeof(union sockaddr_union),
523
                .peer_cred = UCRED_INVALID,
524
        }, *i;
525
        int r;
2✔
526

527
        assert(s);
2✔
528
        assert(fd >= 0);
2✔
529
        assert(ret);
2✔
530

531
        if (getpeername(fd, &key.peer.sa, &key.peer_salen) < 0)
2✔
532
                return log_unit_error_errno(UNIT(s), errno, "getpeername() failed: %m");
×
533

534
        switch (key.peer.sa.sa_family) {
2✔
535
        case AF_INET:
536
        case AF_INET6:
537
        case AF_VSOCK:
538
                break;
539

540
        case AF_UNIX:
2✔
541
                r = getpeercred(fd, &key.peer_cred);
2✔
542
                if (r < 0)
2✔
543
                        return log_unit_error_errno(UNIT(s), r, "Failed to get peer credentials of socket: %m");
×
544
                break;
545

546
        default:
×
547
                *ret = NULL;
×
548
                return 0;
×
549
        }
550

551
        i = set_get(s->peers_by_address, &key);
2✔
552
        if (i) {
2✔
553
                *ret = socket_peer_ref(i);
1✔
554
                return 1;
1✔
555
        }
556

557
        remote = socket_peer_dup(&key);
1✔
558
        if (!remote)
1✔
559
                return log_oom();
×
560

561
        r = set_ensure_put(&s->peers_by_address, &peer_address_hash_ops, remote);
1✔
562
        if (r < 0)
1✔
563
                return log_unit_error_errno(UNIT(s), r, "Failed to insert peer info into hash table: %m");
×
564

565
        remote->socket = s;
1✔
566

567
        *ret = TAKE_PTR(remote);
1✔
568
        return 1;
1✔
569
}
570

571
static const char* listen_lookup(int family, int type) {
×
572

573
        if (family == AF_NETLINK)
×
574
                return "ListenNetlink";
575

576
        if (type == SOCK_STREAM)
×
577
                return "ListenStream";
578
        else if (type == SOCK_DGRAM)
×
579
                return "ListenDatagram";
580
        else if (type == SOCK_SEQPACKET)
×
581
                return "ListenSequentialPacket";
582

583
        assert_not_reached();
×
584
}
585

586
static void socket_dump(Unit *u, FILE *f, const char *prefix) {
×
587
        Socket *s = ASSERT_PTR(SOCKET(u));
×
588
        const char *prefix2, *str;
×
589

590
        assert(f);
×
591

592
        prefix = strempty(prefix);
×
593
        prefix2 = strjoina(prefix, "\t");
×
594

595
        fprintf(f,
×
596
                "%sSocket State: %s\n"
597
                "%sResult: %s\n"
598
                "%sClean Result: %s\n"
599
                "%sBindIPv6Only: %s\n"
600
                "%sBacklog: %u\n"
601
                "%sSocketMode: %04o\n"
602
                "%sDirectoryMode: %04o\n"
603
                "%sKeepAlive: %s\n"
604
                "%sNoDelay: %s\n"
605
                "%sFreeBind: %s\n"
606
                "%sTransparent: %s\n"
607
                "%sBroadcast: %s\n"
608
                "%sPassCredentials: %s\n"
609
                "%sPassFileDescriptorsToExec: %s\n"
610
                "%sPassSecurity: %s\n"
611
                "%sPassPacketInfo: %s\n"
612
                "%sTCPCongestion: %s\n"
613
                "%sRemoveOnStop: %s\n"
614
                "%sWritable: %s\n"
615
                "%sFileDescriptorName: %s\n"
616
                "%sSELinuxContextFromNet: %s\n",
617
                prefix, socket_state_to_string(s->state),
618
                prefix, socket_result_to_string(s->result),
619
                prefix, socket_result_to_string(s->clean_result),
620
                prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
621
                prefix, s->backlog,
622
                prefix, s->socket_mode,
623
                prefix, s->directory_mode,
624
                prefix, yes_no(s->keep_alive),
×
625
                prefix, yes_no(s->no_delay),
×
626
                prefix, yes_no(s->free_bind),
×
627
                prefix, yes_no(s->transparent),
×
628
                prefix, yes_no(s->broadcast),
×
629
                prefix, yes_no(s->pass_cred),
×
630
                prefix, yes_no(s->pass_fds_to_exec),
×
631
                prefix, yes_no(s->pass_sec),
×
632
                prefix, yes_no(s->pass_pktinfo),
×
633
                prefix, strna(s->tcp_congestion),
×
634
                prefix, yes_no(s->remove_on_stop),
×
635
                prefix, yes_no(s->writable),
×
636
                prefix, socket_fdname(s),
637
                prefix, yes_no(s->selinux_context_from_net));
×
638

639
        if (s->timestamping != SOCKET_TIMESTAMPING_OFF)
×
640
                fprintf(f,
×
641
                        "%sTimestamping: %s\n",
642
                        prefix, socket_timestamping_to_string(s->timestamping));
643

644
        if (pidref_is_set(&s->control_pid))
645
                fprintf(f,
×
646
                        "%sControl PID: "PID_FMT"\n",
647
                        prefix, s->control_pid.pid);
648

649
        if (s->bind_to_device)
×
650
                fprintf(f,
×
651
                        "%sBindToDevice: %s\n",
652
                        prefix, s->bind_to_device);
653

654
        if (s->accept)
×
655
                fprintf(f,
×
656
                        "%sAccepted: %u\n"
657
                        "%sNConnections: %u\n"
658
                        "%sMaxConnections: %u\n"
659
                        "%sMaxConnectionsPerSource: %u\n",
660
                        prefix, s->n_accepted,
661
                        prefix, s->n_connections,
662
                        prefix, s->max_connections,
663
                        prefix, s->max_connections_per_source);
664
        else
665
                fprintf(f,
×
666
                        "%sFlushPending: %s\n",
667
                         prefix, yes_no(s->flush_pending));
×
668

669
        if (s->priority >= 0)
×
670
                fprintf(f,
×
671
                        "%sPriority: %i\n",
672
                        prefix, s->priority);
673

674
        if (s->receive_buffer > 0)
×
675
                fprintf(f,
×
676
                        "%sReceiveBuffer: %zu\n",
677
                        prefix, s->receive_buffer);
678

679
        if (s->send_buffer > 0)
×
680
                fprintf(f,
×
681
                        "%sSendBuffer: %zu\n",
682
                        prefix, s->send_buffer);
683

684
        if (s->ip_tos >= 0)
×
685
                fprintf(f,
×
686
                        "%sIPTOS: %i\n",
687
                        prefix, s->ip_tos);
688

689
        if (s->ip_ttl >= 0)
×
690
                fprintf(f,
×
691
                        "%sIPTTL: %i\n",
692
                        prefix, s->ip_ttl);
693

694
        if (s->pipe_size > 0)
×
695
                fprintf(f,
×
696
                        "%sPipeSize: %zu\n",
697
                        prefix, s->pipe_size);
698

699
        if (s->mark >= 0)
×
700
                fprintf(f,
×
701
                        "%sMark: %i\n",
702
                        prefix, s->mark);
703

704
        if (s->mq_maxmsg > 0)
×
705
                fprintf(f,
×
706
                        "%sMessageQueueMaxMessages: %li\n",
707
                        prefix, s->mq_maxmsg);
708

709
        if (s->mq_msgsize > 0)
×
710
                fprintf(f,
×
711
                        "%sMessageQueueMessageSize: %li\n",
712
                        prefix, s->mq_msgsize);
713

714
        if (s->reuse_port)
×
715
                fprintf(f,
×
716
                        "%sReusePort: %s\n",
717
                         prefix, yes_no(s->reuse_port));
718

719
        if (s->smack)
×
720
                fprintf(f,
×
721
                        "%sSmackLabel: %s\n",
722
                        prefix, s->smack);
723

724
        if (s->smack_ip_in)
×
725
                fprintf(f,
×
726
                        "%sSmackLabelIPIn: %s\n",
727
                        prefix, s->smack_ip_in);
728

729
        if (s->smack_ip_out)
×
730
                fprintf(f,
×
731
                        "%sSmackLabelIPOut: %s\n",
732
                        prefix, s->smack_ip_out);
733

734
        if (!isempty(s->user) || !isempty(s->group))
×
735
                fprintf(f,
×
736
                        "%sSocketUser: %s\n"
737
                        "%sSocketGroup: %s\n",
738
                        prefix, strna(s->user),
×
739
                        prefix, strna(s->group));
×
740

741
        if (timestamp_is_set(s->keep_alive_time))
×
742
                fprintf(f,
×
743
                        "%sKeepAliveTimeSec: %s\n",
744
                        prefix, FORMAT_TIMESPAN(s->keep_alive_time, USEC_PER_SEC));
×
745

746
        if (s->keep_alive_interval > 0)
×
747
                fprintf(f,
×
748
                        "%sKeepAliveIntervalSec: %s\n",
749
                        prefix, FORMAT_TIMESPAN(s->keep_alive_interval, USEC_PER_SEC));
×
750

751
        if (s->keep_alive_cnt > 0)
×
752
                fprintf(f,
×
753
                        "%sKeepAliveProbes: %u\n",
754
                        prefix, s->keep_alive_cnt);
755

756
        if (s->defer_accept > 0)
×
757
                fprintf(f,
×
758
                        "%sDeferAcceptSec: %s\n",
759
                        prefix, FORMAT_TIMESPAN(s->defer_accept, USEC_PER_SEC));
×
760

761
        LIST_FOREACH(port, p, s->ports) {
×
762

763
                switch (p->type) {
×
764
                case SOCKET_SOCKET: {
×
765
                        _cleanup_free_ char *k = NULL;
×
766
                        int r;
×
767

768
                        r = socket_address_print(&p->address, &k);
×
769
                        if (r < 0) {
×
770
                                errno = -r;
×
771
                                fprintf(f, "%s%s: %m\n", prefix, listen_lookup(socket_address_family(&p->address), p->address.type));
×
772
                        } else
773
                                fprintf(f, "%s%s: %s\n", prefix, listen_lookup(socket_address_family(&p->address), p->address.type), k);
×
774
                        break;
×
775
                }
776
                case SOCKET_SPECIAL:
×
777
                        fprintf(f, "%sListenSpecial: %s\n", prefix, p->path);
×
778
                        break;
779
                case SOCKET_USB_FUNCTION:
×
780
                        fprintf(f, "%sListenUSBFunction: %s\n", prefix, p->path);
×
781
                        break;
782
                case SOCKET_MQUEUE:
×
783
                        fprintf(f, "%sListenMessageQueue: %s\n", prefix, p->path);
×
784
                        break;
785
                default:
×
786
                        fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
×
787
                }
788
        }
789

790
        fprintf(f,
×
791
                "%sTriggerLimitIntervalSec: %s\n"
792
                "%sTriggerLimitBurst: %u\n"
793
                "%sPollLimitIntervalSec: %s\n"
794
                "%sPollLimitBurst: %u\n",
795
                prefix, FORMAT_TIMESPAN(s->trigger_limit.interval, USEC_PER_SEC),
×
796
                prefix, s->trigger_limit.burst,
797
                prefix, FORMAT_TIMESPAN(s->poll_limit.interval, USEC_PER_SEC),
×
798
                prefix, s->poll_limit.burst);
799

800
        str = ip_protocol_to_name(s->socket_protocol);
×
801
        if (str)
×
802
                fprintf(f, "%sSocketProtocol: %s\n", prefix, str);
×
803

804
        if (!strv_isempty(s->symlinks)) {
×
805
                fprintf(f, "%sSymlinks:", prefix);
×
806
                STRV_FOREACH(q, s->symlinks)
×
807
                        fprintf(f, " %s", *q);
×
808

809
                fprintf(f, "\n");
×
810
        }
811

812
        fprintf(f,
×
813
                "%sTimeoutSec: %s\n",
814
                prefix, FORMAT_TIMESPAN(s->timeout_usec, USEC_PER_SEC));
×
815

816
        exec_context_dump(&s->exec_context, f, prefix);
×
817
        kill_context_dump(&s->kill_context, f, prefix);
×
818

819
        for (SocketExecCommand c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
×
820
                if (!s->exec_command[c])
×
821
                        continue;
×
822

823
                fprintf(f, "%s%s %s:\n",
×
824
                        prefix, glyph(GLYPH_ARROW_RIGHT), socket_exec_command_to_string(c));
825

826
                exec_command_dump_list(s->exec_command[c], f, prefix2);
×
827
        }
828

829
        cgroup_context_dump(UNIT(s), f, prefix);
×
830
}
×
831

832
static int instance_from_socket(int fd, unsigned nr, char **ret) {
2✔
833
        union sockaddr_union local, remote;
2✔
834
        socklen_t l;
2✔
835
        int r;
2✔
836

837
        assert(fd >= 0);
2✔
838
        assert(ret);
2✔
839

840
        l = sizeof(local);
2✔
841
        if (getsockname(fd, &local.sa, &l) < 0)
2✔
842
                return -errno;
2✔
843

844
        l = sizeof(remote);
2✔
845
        if (getpeername(fd, &remote.sa, &l) < 0)
2✔
846
                return -errno;
×
847

848
        char *s;
2✔
849

850
        switch (local.sa.sa_family) {
2✔
851

852
        case AF_INET: {
×
853
                uint32_t
×
854
                        a = be32toh(local.in.sin_addr.s_addr),
×
855
                        b = be32toh(remote.in.sin_addr.s_addr);
×
856

857
                if (asprintf(&s,
×
858
                             "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
859
                             nr,
860
                             a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
861
                             be16toh(local.in.sin_port),
×
862
                             b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
863
                             be16toh(remote.in.sin_port)) < 0)
×
864
                        return -ENOMEM;
865

866
                break;
867
        }
868

869
        case AF_INET6: {
×
870
                static const unsigned char ipv4_prefix[] = {
×
871
                        0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
872
                };
873

874
                if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
×
875
                    memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
×
876
                        const uint8_t
×
877
                                *a = local.in6.sin6_addr.s6_addr+12,
×
878
                                *b = remote.in6.sin6_addr.s6_addr+12;
×
879

880
                        if (asprintf(&s,
×
881
                                     "%u-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
882
                                     nr,
883
                                     a[0], a[1], a[2], a[3],
×
884
                                     be16toh(local.in6.sin6_port),
×
885
                                     b[0], b[1], b[2], b[3],
×
886
                                     be16toh(remote.in6.sin6_port)) < 0)
×
887
                                return -ENOMEM;
888
                } else {
889
                        if (asprintf(&s,
×
890
                                     "%u-%s:%u-%s:%u",
891
                                     nr,
892
                                     IN6_ADDR_TO_STRING(&local.in6.sin6_addr),
×
893
                                     be16toh(local.in6.sin6_port),
×
894
                                     IN6_ADDR_TO_STRING(&remote.in6.sin6_addr),
×
895
                                     be16toh(remote.in6.sin6_port)) < 0)
×
896
                                return -ENOMEM;
×
897
                }
898

899
                break;
900
        }
901

902
        case AF_UNIX: {
2✔
903
                struct ucred ucred;
2✔
904

905
                r = getpeercred(fd, &ucred);
2✔
906
                if (r >= 0) {
2✔
907
                        _cleanup_close_ int pidfd = getpeerpidfd(fd);
4✔
908
                        uint64_t pidfd_id;
2✔
909

910
                        if (pidfd >= 0 && pidfd_get_inode_id(pidfd, &pidfd_id) >= 0)
2✔
911
                                r = asprintf(&s, "%u-" PID_FMT "_%" PRIu64 "-" UID_FMT,
×
912
                                             nr, ucred.pid, pidfd_id, ucred.uid);
913
                        else
914
                                r = asprintf(&s, "%u-" PID_FMT "-" UID_FMT,
2✔
915
                                             nr, ucred.pid, ucred.uid);
916
                        if (r < 0)
2✔
917
                                return -ENOMEM;
×
918
                } else if (r == -ENODATA) {
×
919
                        /* This handles the case where somebody is connecting from another pid/uid namespace
920
                         * (e.g. from outside of our container). */
921
                        if (asprintf(&s,
×
922
                                     "%u-unknown",
923
                                     nr) < 0)
924
                                return -ENOMEM;
925
                } else
926
                        return r;
927

928
                break;
2✔
929
        }
930

931
        case AF_VSOCK:
×
932
                if (asprintf(&s,
×
933
                             "%u-%u:%u-%u:%u",
934
                             nr,
935
                             local.vm.svm_cid, local.vm.svm_port,
936
                             remote.vm.svm_cid, remote.vm.svm_port) < 0)
937
                        return -ENOMEM;
938

939
                break;
940

941
        default:
×
942
                assert_not_reached();
×
943
        }
944

945
        *ret = s;
2✔
946
        return 0;
2✔
947
}
948

949
static void socket_close_fds(Socket *s) {
1,872✔
950
        assert(s);
1,872✔
951

952
        LIST_FOREACH(port, p, s->ports) {
3,776✔
953
                bool was_open = p->fd >= 0;
1,904✔
954

955
                p->event_source = sd_event_source_disable_unref(p->event_source);
1,904✔
956
                p->fd = safe_close(p->fd);
1,904✔
957
                socket_port_close_auxiliary_fds(p);
1,904✔
958

959
                /* One little note: we should normally not delete any sockets in the file system here! After all some
960
                 * other process we spawned might still have a reference of this fd and wants to continue to use
961
                 * it. Therefore we normally delete sockets in the file system before we create a new one, not after we
962
                 * stopped using one! That all said, if the user explicitly requested this, we'll delete them here
963
                 * anyway, but only then. */
964

965
                if (!was_open || !s->remove_on_stop)
1,904✔
966
                        continue;
1,854✔
967

968
                switch (p->type) {
50✔
969

970
                case SOCKET_FIFO:
18✔
971
                        (void) unlink(p->path);
18✔
972
                        break;
18✔
973

974
                case SOCKET_MQUEUE:
×
975
                        (void) mq_unlink(p->path);
×
976
                        break;
×
977

978
                case SOCKET_SOCKET:
32✔
979
                        (void) socket_address_unlink(&p->address);
32✔
980
                        break;
32✔
981

982
                default:
983
                        ;
984
                }
985
        }
986

987
        if (s->remove_on_stop)
1,872✔
988
                STRV_FOREACH(i, s->symlinks)
41✔
989
                        (void) unlink(*i);
×
990

991
        /* Note that we don't return NULL here, since s has not been freed. */
992
}
1,872✔
993

994
DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(Socket*, socket_close_fds, NULL);
2,249✔
995

996
static void socket_apply_socket_options(Socket *s, SocketPort *p, int fd) {
2,275✔
997
        int r;
2,275✔
998

999
        assert(s);
2,275✔
1000
        assert(p);
2,275✔
1001
        assert(fd >= 0);
2,275✔
1002

1003
        if (s->keep_alive) {
2,275✔
1004
                r = setsockopt_int(fd, SOL_SOCKET, SO_KEEPALIVE, true);
×
1005
                if (r < 0)
×
1006
                        log_unit_warning_errno(UNIT(s), r, "SO_KEEPALIVE failed: %m");
×
1007
        }
1008

1009
        if (timestamp_is_set(s->keep_alive_time)) {
2,275✔
1010
                r = setsockopt_int(fd, SOL_TCP, TCP_KEEPIDLE, s->keep_alive_time / USEC_PER_SEC);
×
1011
                if (r < 0)
×
1012
                        log_unit_warning_errno(UNIT(s), r, "TCP_KEEPIDLE failed: %m");
×
1013
        }
1014

1015
        if (s->keep_alive_interval > 0) {
2,275✔
1016
                r = setsockopt_int(fd, SOL_TCP, TCP_KEEPINTVL, s->keep_alive_interval / USEC_PER_SEC);
×
1017
                if (r < 0)
×
1018
                        log_unit_warning_errno(UNIT(s), r, "TCP_KEEPINTVL failed: %m");
×
1019
        }
1020

1021
        if (s->keep_alive_cnt > 0) {
2,275✔
1022
                r = setsockopt_int(fd, SOL_TCP, TCP_KEEPCNT, s->keep_alive_cnt);
×
1023
                if (r < 0)
×
1024
                        log_unit_warning_errno(UNIT(s), r, "TCP_KEEPCNT failed: %m");
×
1025
        }
1026

1027
        if (s->defer_accept > 0) {
2,275✔
1028
                r = setsockopt_int(fd, SOL_TCP, TCP_DEFER_ACCEPT, s->defer_accept / USEC_PER_SEC);
×
1029
                if (r < 0)
×
1030
                        log_unit_warning_errno(UNIT(s), r, "TCP_DEFER_ACCEPT failed: %m");
×
1031
        }
1032

1033
        if (s->no_delay) {
2,275✔
1034
                if (s->socket_protocol == IPPROTO_SCTP) {
×
1035
                        r = setsockopt_int(fd, SOL_SCTP, SCTP_NODELAY, true);
×
1036
                        if (r < 0)
×
1037
                                log_unit_warning_errno(UNIT(s), r, "SCTP_NODELAY failed: %m");
×
1038
                } else {
1039
                        r = setsockopt_int(fd, SOL_TCP, TCP_NODELAY, true);
×
1040
                        if (r < 0)
×
1041
                                log_unit_warning_errno(UNIT(s), r, "TCP_NODELAY failed: %m");
×
1042
                }
1043
        }
1044

1045
        if (s->broadcast) {
2,275✔
1046
                r = setsockopt_int(fd, SOL_SOCKET, SO_BROADCAST, true);
×
1047
                if (r < 0)
×
1048
                        log_unit_warning_errno(UNIT(s), r, "SO_BROADCAST failed: %m");
×
1049
        }
1050

1051
        if (s->pass_cred) {
2,275✔
1052
                r = setsockopt_int(fd, SOL_SOCKET, SO_PASSCRED, true);
132✔
1053
                if (r < 0)
132✔
1054
                        log_unit_warning_errno(UNIT(s), r, "SO_PASSCRED failed: %m");
×
1055
        }
1056

1057
        if (s->pass_sec) {
2,275✔
1058
                r = setsockopt_int(fd, SOL_SOCKET, SO_PASSSEC, true);
90✔
1059
                if (r < 0)
90✔
1060
                        log_unit_warning_errno(UNIT(s), r, "SO_PASSSEC failed: %m");
×
1061
        }
1062

1063
        if (s->pass_pktinfo) {
2,275✔
1064
                r = socket_set_recvpktinfo(fd, socket_address_family(&p->address), true);
33✔
1065
                if (r < 0)
33✔
1066
                        log_unit_warning_errno(UNIT(s), r, "Failed to enable packet info socket option: %m");
×
1067
        }
1068

1069
        if (s->timestamping != SOCKET_TIMESTAMPING_OFF) {
2,275✔
1070
                r = setsockopt_int(fd, SOL_SOCKET,
180✔
1071
                                   s->timestamping == SOCKET_TIMESTAMPING_NS ? SO_TIMESTAMPNS : SO_TIMESTAMP,
1072
                                   true);
1073
                if (r < 0)
90✔
1074
                        log_unit_warning_errno(UNIT(s), r, "Failed to enable timestamping socket option, ignoring: %m");
×
1075
        }
1076

1077
        if (s->priority >= 0) {
2,275✔
1078
                r = setsockopt_int(fd, SOL_SOCKET, SO_PRIORITY, s->priority);
171✔
1079
                if (r < 0)
171✔
1080
                        log_unit_warning_errno(UNIT(s), r, "SO_PRIORITY failed: %m");
×
1081
        }
1082

1083
        if (s->receive_buffer > 0) {
2,275✔
1084
                r = fd_set_rcvbuf(fd, s->receive_buffer, false);
150✔
1085
                if (r < 0)
150✔
1086
                        log_unit_full_errno(UNIT(s), ERRNO_IS_PRIVILEGE(r) ? LOG_DEBUG : LOG_WARNING, r,
×
1087
                                            "SO_RCVBUF/SO_RCVBUFFORCE failed: %m");
1088
        }
1089

1090
        if (s->send_buffer > 0) {
2,275✔
1091
                r = fd_set_sndbuf(fd, s->send_buffer, false);
30✔
1092
                if (r < 0)
30✔
1093
                        log_unit_full_errno(UNIT(s), ERRNO_IS_PRIVILEGE(r) ? LOG_DEBUG : LOG_WARNING, r,
×
1094
                                            "SO_SNDBUF/SO_SNDBUFFORCE failed: %m");
1095
        }
1096

1097
        if (s->mark >= 0) {
2,275✔
1098
                r = setsockopt_int(fd, SOL_SOCKET, SO_MARK, s->mark);
×
1099
                if (r < 0)
×
1100
                        log_unit_warning_errno(UNIT(s), r, "SO_MARK failed: %m");
×
1101
        }
1102

1103
        if (s->ip_tos >= 0) {
2,275✔
1104
                r = setsockopt_int(fd, IPPROTO_IP, IP_TOS, s->ip_tos);
×
1105
                if (r < 0)
×
1106
                        log_unit_warning_errno(UNIT(s), r, "IP_TOS failed: %m");
×
1107
        }
1108

1109
        if (s->ip_ttl >= 0) {
2,275✔
1110
                r = socket_set_ttl(fd, socket_address_family(&p->address), s->ip_ttl);
×
1111
                if (r < 0)
×
1112
                        log_unit_warning_errno(UNIT(s), r, "IP_TTL/IPV6_UNICAST_HOPS failed: %m");
×
1113
        }
1114

1115
        if (s->tcp_congestion)
2,275✔
1116
                if (setsockopt(fd, SOL_TCP, TCP_CONGESTION, s->tcp_congestion, strlen(s->tcp_congestion)+1) < 0)
×
1117
                        log_unit_warning_errno(UNIT(s), errno, "TCP_CONGESTION failed: %m");
×
1118

1119
        if (s->smack_ip_in) {
2,275✔
1120
                r = mac_smack_apply_fd(fd, SMACK_ATTR_IPIN, s->smack_ip_in);
×
1121
                if (r < 0)
×
1122
                        log_unit_error_errno(UNIT(s), r, "mac_smack_apply_ip_in_fd: %m");
×
1123
        }
1124

1125
        if (s->smack_ip_out) {
2,275✔
1126
                r = mac_smack_apply_fd(fd, SMACK_ATTR_IPOUT, s->smack_ip_out);
×
1127
                if (r < 0)
×
1128
                        log_unit_error_errno(UNIT(s), r, "mac_smack_apply_ip_out_fd: %m");
×
1129
        }
1130
}
2,275✔
1131

1132
static void socket_apply_fifo_options(Socket *s, int fd) {
66✔
1133
        int r;
66✔
1134

1135
        assert(s);
66✔
1136
        assert(fd >= 0);
66✔
1137

1138
        if (s->pipe_size > 0)
66✔
1139
                if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
×
1140
                        log_unit_warning_errno(UNIT(s), errno, "Setting pipe size failed, ignoring: %m");
×
1141

1142
        if (s->smack) {
66✔
1143
                r = mac_smack_apply_fd(fd, SMACK_ATTR_ACCESS, s->smack);
×
1144
                if (r < 0)
×
1145
                        log_unit_error_errno(UNIT(s), r, "SMACK relabelling failed, ignoring: %m");
×
1146
        }
1147
}
66✔
1148

1149
static int fifo_address_create(
66✔
1150
                const char *path,
1151
                mode_t directory_mode,
1152
                mode_t socket_mode) {
1153

1154
        _cleanup_close_ int fd = -EBADF;
66✔
1155
        mode_t old_mask;
66✔
1156
        struct stat st;
66✔
1157
        int r;
66✔
1158

1159
        assert(path);
66✔
1160

1161
        (void) mkdir_parents_label(path, directory_mode);
66✔
1162

1163
        r = mac_selinux_create_file_prepare(path, S_IFIFO);
66✔
1164
        if (r < 0)
66✔
1165
                return r;
1166

1167
        /* Enforce the right access mode for the fifo */
1168
        old_mask = umask(~socket_mode);
66✔
1169

1170
        /* Include the original umask in our mask */
1171
        (void) umask(~socket_mode | old_mask);
66✔
1172

1173
        r = mkfifo(path, socket_mode);
66✔
1174
        (void) umask(old_mask);
66✔
1175

1176
        if (r < 0 && errno != EEXIST) {
66✔
1177
                r = -errno;
×
1178
                goto fail;
×
1179
        }
1180

1181
        fd = open(path, O_RDWR | O_CLOEXEC | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW);
66✔
1182
        if (fd < 0) {
66✔
1183
                r = -errno;
×
1184
                goto fail;
×
1185
        }
1186

1187
        mac_selinux_create_file_clear();
66✔
1188

1189
        if (fstat(fd, &st) < 0) {
66✔
1190
                r = -errno;
×
1191
                goto fail;
×
1192
        }
1193

1194
        if (!S_ISFIFO(st.st_mode) ||
66✔
1195
            (st.st_mode & 0777) != (socket_mode & ~old_mask) ||
132✔
1196
            st.st_uid != getuid() ||
132✔
1197
            st.st_gid != getgid()) {
66✔
1198
                r = -EEXIST;
×
1199
                goto fail;
×
1200
        }
1201

1202
        return TAKE_FD(fd);
1203

1204
fail:
×
1205
        mac_selinux_create_file_clear();
×
1206
        return r;
1207
}
1208

1209
static int special_address_create(const char *path, bool writable) {
6✔
1210
        _cleanup_close_ int fd = -EBADF;
6✔
1211
        struct stat st;
6✔
1212

1213
        assert(path);
6✔
1214

1215
        fd = open(path, (writable ? O_RDWR : O_RDONLY)|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW);
6✔
1216
        if (fd < 0)
6✔
1217
                return -errno;
×
1218

1219
        if (fstat(fd, &st) < 0)
6✔
1220
                return -errno;
×
1221

1222
        /* Check whether this is a /proc, /sys or /dev file or char device */
1223
        if (!S_ISREG(st.st_mode) && !S_ISCHR(st.st_mode))
6✔
1224
                return -EEXIST;
×
1225

1226
        return TAKE_FD(fd);
1227
}
1228

1229
static int usbffs_address_create_at(int dfd, const char *name) {
×
1230
        _cleanup_close_ int fd = -EBADF;
×
1231
        struct stat st;
×
1232

1233
        assert(dfd >= 0);
×
1234
        assert(name);
×
1235

1236
        fd = openat(dfd, name, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW);
×
1237
        if (fd < 0)
×
1238
                return -errno;
×
1239

1240
        if (fstat(fd, &st) < 0)
×
1241
                return -errno;
×
1242

1243
        /* Check whether this is a regular file (ffs endpoint) */
1244
        if (!S_ISREG(st.st_mode))
×
1245
                return -EEXIST;
×
1246

1247
        return TAKE_FD(fd);
1248
}
1249

1250
static int mq_address_create(
×
1251
                const char *path,
1252
                mode_t mq_mode,
1253
                long maxmsg,
1254
                long msgsize) {
1255

1256
        _cleanup_close_ int fd = -EBADF;
×
1257
        struct stat st;
×
1258
        mode_t old_mask;
×
1259
        struct mq_attr _attr, *attr = NULL;
×
1260

1261
        assert(path);
×
1262

1263
        if (maxmsg > 0 && msgsize > 0) {
×
1264
                _attr = (struct mq_attr) {
×
1265
                        .mq_flags = O_NONBLOCK,
1266
                        .mq_maxmsg = maxmsg,
1267
                        .mq_msgsize = msgsize,
1268
                };
1269
                attr = &_attr;
×
1270
        }
1271

1272
        /* Enforce the right access mode for the mq */
1273
        old_mask = umask(~mq_mode);
×
1274

1275
        /* Include the original umask in our mask */
1276
        (void) umask(~mq_mode | old_mask);
×
1277
        fd = mq_open(path, O_RDONLY|O_CLOEXEC|O_NONBLOCK|O_CREAT, mq_mode, attr);
×
1278
        (void) umask(old_mask);
×
1279

1280
        if (fd < 0)
×
1281
                return -errno;
×
1282

1283
        if (fstat(fd, &st) < 0)
×
1284
                return -errno;
×
1285

1286
        if ((st.st_mode & 0777) != (mq_mode & ~old_mask) ||
×
1287
            st.st_uid != getuid() ||
×
1288
            st.st_gid != getgid())
×
1289
                return -EEXIST;
×
1290

1291
        return TAKE_FD(fd);
1292
}
1293

1294
static int socket_symlink(Socket *s) {
2,339✔
1295
        const char *p;
2,339✔
1296
        int r;
2,339✔
1297

1298
        assert(s);
2,339✔
1299

1300
        p = socket_find_symlink_target(s);
2,339✔
1301
        if (!p)
2,339✔
1302
                return 0;
1303

1304
        STRV_FOREACH(i, s->symlinks) {
2,210✔
1305
                (void) mkdir_parents_label(*i, s->directory_mode);
129✔
1306

1307
                r = symlink_idempotent(p, *i, false);
129✔
1308
                if (r == -EEXIST && s->remove_on_stop) {
129✔
1309
                        /* If there's already something where we want to create the symlink, and the destructive
1310
                         * RemoveOnStop= mode is set, then we might as well try to remove what already exists and try
1311
                         * again. */
1312

1313
                        if (unlink(*i) >= 0)
×
1314
                                r = symlink_idempotent(p, *i, false);
×
1315
                }
1316
                if (r < 0)
129✔
1317
                        log_unit_warning_errno(UNIT(s), r, "Failed to create symlink %s %s %s, ignoring: %m",
×
1318
                                               p, glyph(GLYPH_ARROW_RIGHT), *i);
1319
        }
1320

1321
        return 0;
1322
}
1323

1324
static int usbffs_write_descs(int fd, Service *s) {
×
1325
        int r;
×
1326

1327
        assert(fd >= 0);
×
1328
        assert(s);
×
1329

1330
        if (!s->usb_function_descriptors || !s->usb_function_strings)
×
1331
                return -EINVAL;
1332

1333
        r = copy_file_fd(s->usb_function_descriptors, fd, 0);
×
1334
        if (r < 0)
×
1335
                return r;
1336

1337
        return copy_file_fd(s->usb_function_strings, fd, 0);
×
1338
}
1339

1340
static int usbffs_dispatch_eps(SocketPort *p, int dfd) {
×
1341
        _cleanup_free_ DirectoryEntries *des = NULL;
×
1342
        int r;
×
1343

1344
        assert(p);
×
1345
        assert(dfd >= 0);
×
1346

1347
        r = readdir_all(dfd, RECURSE_DIR_SORT|RECURSE_DIR_IGNORE_DOT, &des);
×
1348
        if (r < 0)
×
1349
                return r;
1350

1351
        p->auxiliary_fds = new(int, des->n_entries);
×
1352
        if (!p->auxiliary_fds)
×
1353
                return -ENOMEM;
1354

1355
        FOREACH_ARRAY(i, des->entries, des->n_entries) {
×
1356
                const struct dirent *de = *i;
×
1357

1358
                if (streq(de->d_name, "ep0"))
×
1359
                        continue;
×
1360

1361
                r = usbffs_address_create_at(dfd, de->d_name);
×
1362
                if (r < 0)
×
1363
                        goto fail;
×
1364

1365
                p->auxiliary_fds[p->n_auxiliary_fds++] = r;
×
1366
        }
1367

1368
        assert(p->n_auxiliary_fds < des->n_entries);
×
1369

1370
        return 0;
1371

1372
fail:
×
1373
        socket_port_close_auxiliary_fds(p);
×
1374
        return r;
1375
}
1376

1377
int socket_load_service_unit(Socket *s, int cfd, Unit **ret) {
2,257✔
1378
        int r;
2,257✔
1379

1380
        /* Figure out what the unit that will be used to handle the connections on the socket looks like.
1381
         *
1382
         * If cfd < 0, then we don't have a connection yet. In case of Accept=yes sockets, use a fake
1383
         * instance name.
1384
         */
1385

1386
        assert(s);
2,257✔
1387
        assert(ret);
2,257✔
1388

1389
        if (UNIT_ISSET(s->service)) {
2,257✔
1390
                *ret = UNIT_DEREF(s->service);
1,801✔
1391
                return 0;
2,257✔
1392
        }
1393

1394
        if (!s->accept)
456✔
1395
                return -ENODATA;
1396

1397
        /* Build the instance name and load the unit */
1398
        _cleanup_free_ char *prefix = NULL, *instance = NULL, *name = NULL;
456✔
1399

1400
        r = unit_name_to_prefix(UNIT(s)->id, &prefix);
456✔
1401
        if (r < 0)
456✔
1402
                return r;
1403

1404
        if (cfd >= 0) {
456✔
1405
                r = instance_from_socket(cfd, s->n_accepted, &instance);
2✔
1406
                if (ERRNO_IS_NEG_DISCONNECT(r))
2✔
1407
                        /* ENOTCONN is legitimate if TCP RST was received. Other socket families might return
1408
                         * different errors. This connection is over, but the socket unit lives on. */
1409
                        return log_unit_debug_errno(UNIT(s), r,
×
1410
                                                    "Got %s on incoming socket, assuming aborted connection attempt, ignoring.",
1411
                                                    errno_to_name(r));
1412
                if (r < 0)
2✔
1413
                        return r;
1414
        }
1415

1416
        /* For accepting sockets, we don't know how the instance will be called until we get a connection and
1417
         * can figure out what the peer name is. So let's use "internal" as the instance to make it clear
1418
         * that this is not an actual peer name. We use "unknown" when we cannot figure out the peer. */
1419
        r = unit_name_build(prefix, instance ?: "internal", ".service", &name);
910✔
1420
        if (r < 0)
456✔
1421
                return r;
1422

1423
        return manager_load_unit(UNIT(s)->manager, name, NULL, NULL, ret);
456✔
1424
}
1425

1426
static int socket_determine_selinux_label(Socket *s, char **ret) {
2,210✔
1427
        Unit *service;
2,210✔
1428
        int r;
2,210✔
1429

1430
        assert(s);
2,210✔
1431
        assert(ret);
2,210✔
1432

1433
        r = socket_load_service_unit(s, /* cfd= */ -EBADF, &service);
2,210✔
1434
        if (r == -ENODATA) {
2,210✔
1435
                *ret = NULL;
×
1436
                return 0;
×
1437
        }
1438
        if (r < 0)
2,210✔
1439
                return r;
1440

1441
        r = service_determine_exec_selinux_label(SERVICE(service), ret);
4,420✔
1442
        if (r == -ENODATA) {
2,210✔
1443
                *ret = NULL;
2,210✔
1444
                return 0;
2,210✔
1445
        }
1446
        return r;
1447
}
1448

1449
static int socket_address_listen_do(
2,274✔
1450
                Socket *s,
1451
                const SocketAddress *address,
1452
                const char *label) {
1453

1454
        assert(s);
2,274✔
1455
        assert(address);
2,274✔
1456

1457
        return socket_address_listen(
4,548✔
1458
                        address,
1459
                        SOCK_CLOEXEC|SOCK_NONBLOCK,
1460
                        s->backlog,
2,274✔
1461
                        s->bind_ipv6_only,
1462
                        s->bind_to_device,
2,274✔
1463
                        s->reuse_port,
2,274✔
1464
                        s->free_bind,
2,274✔
1465
                        s->transparent,
2,274✔
1466
                        s->directory_mode,
1467
                        s->socket_mode,
1468
                        label);
1469
}
1470

1471
#define log_address_error_errno(u, address, error, fmt)          \
1472
        ({                                                       \
1473
                _cleanup_free_ char *_t = NULL;                  \
1474
                                                                 \
1475
                (void) socket_address_print(address, &_t);       \
1476
                log_unit_error_errno(u, error, fmt, strna(_t));  \
1477
        })
1478

1479
static int fork_needed(const SocketAddress *address, Socket *s) {
2,273✔
1480
        int r;
2,273✔
1481

1482
        assert(address);
2,273✔
1483
        assert(s);
2,273✔
1484

1485
        /* Check if we need to do the cgroup or netns stuff. If not we can do things much simpler. */
1486

1487
        /* If there are any NFTSet= directives with cgroup source, we need the cgroup */
1488
        Unit *u = UNIT(s);
2,273✔
1489
        CGroupContext *c = unit_get_cgroup_context(u);
2,273✔
1490
        if (c)
2,273✔
1491
                FOREACH_ARRAY(nft_set, c->nft_set_context.sets, c->nft_set_context.n_sets)
2,273✔
1492
                        if (nft_set->source == NFT_SET_SOURCE_CGROUP)
×
1493
                                return true;
1494

1495
        if (IN_SET(address->sockaddr.sa.sa_family, AF_INET, AF_INET6)) {
2,273✔
1496
                r = bpf_firewall_supported();
×
1497
                if (r < 0)
×
1498
                        return r;
1499
                if (r != BPF_FIREWALL_UNSUPPORTED) /* If BPF firewalling isn't supported anyway — there's no point in this forking complexity */
×
1500
                        return true;
1501
        }
1502

1503
        return exec_needs_network_namespace(&s->exec_context);
2,273✔
1504
}
1505

1506
static int socket_address_listen_in_cgroup(
2,273✔
1507
                Socket *s,
1508
                const SocketAddress *address,
1509
                const char *label) {
1510

1511
        _cleanup_(pidref_done) PidRef pid = PIDREF_NULL;
×
1512
        _cleanup_close_pair_ int pair[2] = EBADF_PAIR;
2,273✔
1513
        int fd, r;
2,273✔
1514

1515
        assert(s);
2,273✔
1516
        assert(address);
2,273✔
1517

1518
        /* This is a wrapper around socket_address_listen(), that forks off a helper process inside the
1519
         * socket's cgroup and network namespace in which the socket is actually created. This way we ensure
1520
         * the socket is actually properly attached to the unit's cgroup for the purpose of BPF filtering and
1521
         * such. */
1522

1523
        r = fork_needed(address, s);
2,273✔
1524
        if (r < 0)
2,273✔
1525
                return r;
1526
        if (r == 0) {
2,273✔
1527
                /* Shortcut things... */
1528
                fd = socket_address_listen_do(s, address, label);
2,273✔
1529
                if (fd < 0)
2,273✔
1530
                        return log_address_error_errno(UNIT(s), address, fd, "Failed to create listening socket (%s): %m");
×
1531

1532
                return fd;
1533
        }
1534

1535
        r = unit_setup_exec_runtime(UNIT(s));
×
1536
        if (r < 0)
×
1537
                return log_unit_error_errno(UNIT(s), r, "Failed acquire runtime: %m");
×
1538

1539
        if (s->exec_context.network_namespace_path &&
×
1540
            s->exec_runtime &&
×
1541
            s->exec_runtime->shared &&
×
1542
            s->exec_runtime->shared->netns_storage_socket[0] >= 0) {
×
1543
                r = open_shareable_ns_path(s->exec_runtime->shared->netns_storage_socket, s->exec_context.network_namespace_path, CLONE_NEWNET);
×
1544
                if (r < 0)
×
1545
                        return log_unit_error_errno(UNIT(s), r, "Failed to open network namespace path %s: %m", s->exec_context.network_namespace_path);
×
1546
        }
1547

1548
        if (s->exec_context.ipc_namespace_path &&
×
1549
            s->exec_runtime &&
×
1550
            s->exec_runtime->shared &&
×
1551
            s->exec_runtime->shared->ipcns_storage_socket[0] >= 0) {
×
1552
                r = open_shareable_ns_path(s->exec_runtime->shared->ipcns_storage_socket, s->exec_context.ipc_namespace_path, CLONE_NEWIPC);
×
1553
                if (r < 0)
×
1554
                        return log_unit_error_errno(UNIT(s), r, "Failed to open IPC namespace path %s: %m", s->exec_context.ipc_namespace_path);
×
1555
        }
1556

1557
        if (socketpair(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC, 0, pair) < 0)
×
1558
                return log_unit_error_errno(UNIT(s), errno, "Failed to create communication channel: %m");
×
1559

1560
        r = unit_fork_helper_process(UNIT(s), "(sd-listen)", /* into_cgroup= */ true, &pid);
×
1561
        if (r < 0)
1✔
1562
                return log_unit_error_errno(UNIT(s), r, "Failed to fork off listener stub process: %m");
×
1563
        if (r == 0) {
1✔
1564
                /* Child */
1565

1566
                pair[0] = safe_close(pair[0]);
1✔
1567

1568
                if (exec_needs_network_namespace(&s->exec_context) &&
1✔
1569
                    s->exec_runtime &&
×
1570
                    s->exec_runtime->shared &&
×
1571
                    s->exec_runtime->shared->netns_storage_socket[0] >= 0) {
×
1572

NEW
1573
                        if (namespace_type_supported(NAMESPACE_NET)) {
×
1574
                                r = setup_shareable_ns(s->exec_runtime->shared->netns_storage_socket, CLONE_NEWNET);
×
1575
                                if (r < 0) {
×
1576
                                        log_unit_error_errno(UNIT(s), r, "Failed to join network namespace: %m");
×
1577
                                        _exit(EXIT_NETWORK);
×
1578
                                }
1579
                        } else if (s->exec_context.network_namespace_path) {
×
1580
                                log_unit_error(UNIT(s), "Network namespace path configured but network namespaces not supported.");
×
1581
                                _exit(EXIT_NETWORK);
×
1582
                        } else
1583
                                log_unit_warning(UNIT(s), "PrivateNetwork=yes is configured, but the kernel does not support network namespaces, ignoring.");
×
1584
                }
1585

1586
                fd = socket_address_listen_do(s, address, label);
1✔
1587
                if (fd < 0) {
1✔
1588
                        log_address_error_errno(UNIT(s), address, fd, "Failed to create listening socket (%s): %m");
×
1589
                        _exit(EXIT_FAILURE);
×
1590
                }
1591

1592
                r = send_one_fd(pair[1], fd, 0);
1✔
1593
                if (r < 0) {
1✔
1594
                        log_address_error_errno(UNIT(s), address, r, "Failed to send listening socket (%s) to parent: %m");
×
1595
                        _exit(EXIT_FAILURE);
×
1596
                }
1597

1598
                _exit(EXIT_SUCCESS);
1✔
1599
        }
1600

1601
        pair[1] = safe_close(pair[1]);
×
1602
        fd = receive_one_fd(pair[0], 0);
×
1603

1604
        /* We synchronously wait for the helper, as it shouldn't be slow */
1605
        r = wait_for_terminate_and_check("(sd-listen)", pid.pid, WAIT_LOG_ABNORMAL);
×
1606
        if (r < 0) {
×
1607
                safe_close(fd);
×
1608
                return r;
1609
        }
1610

1611
        if (fd < 0)
×
1612
                return log_address_error_errno(UNIT(s), address, fd, "Failed to receive listening socket (%s): %m");
×
1613

1614
        return fd;
1615
}
1616

1617
static int socket_open_fds(Socket *orig_s) {
2,249✔
1618
        _cleanup_(socket_close_fdsp) Socket *s = orig_s;
2,249✔
1619
        _cleanup_freecon_ char *label = NULL;
×
1620
        bool know_label = false;
2,249✔
1621
        int r;
2,249✔
1622

1623
        assert(s);
2,249✔
1624

1625
        LIST_FOREACH(port, p, s->ports) {
2,249✔
1626

1627
                if (p->fd >= 0)
2,345✔
1628
                        continue;
×
1629

1630
                switch (p->type) {
2,345✔
1631

1632
                case SOCKET_SOCKET:
2,273✔
1633

1634
                        if (!know_label) {
2,273✔
1635
                                /* Figure out the label, if we don't it know yet. We do it once for the first
1636
                                 * socket where we need this and remember it for the rest. */
1637

1638
                                r = socket_determine_selinux_label(s, &label);
2,210✔
1639
                                if (r < 0)
2,210✔
1640
                                        return log_unit_error_errno(UNIT(s), r, "Failed to determine SELinux label: %m");
×
1641

1642
                                know_label = true;
1643
                        }
1644

1645
                        /* Apply the socket protocol */
1646
                        switch (p->address.type) {
2,273✔
1647

1648
                        case SOCK_STREAM:
2,105✔
1649
                                if (IN_SET(s->socket_protocol, IPPROTO_SCTP, IPPROTO_MPTCP))
2,105✔
1650
                                        p->address.protocol = s->socket_protocol;
×
1651
                                break;
1652

1653
                        case SOCK_SEQPACKET:
48✔
1654
                                if (s->socket_protocol == IPPROTO_SCTP)
48✔
1655
                                        p->address.protocol = s->socket_protocol;
×
1656
                                break;
1657

1658
                        case SOCK_DGRAM:
60✔
1659
                                if (s->socket_protocol == IPPROTO_UDPLITE)
60✔
1660
                                        p->address.protocol = s->socket_protocol;
×
1661
                                break;
1662
                        }
1663

1664
                        p->fd = socket_address_listen_in_cgroup(s, &p->address, label);
2,273✔
1665
                        if (p->fd < 0)
2,273✔
1666
                                return p->fd;
1667

1668
                        socket_apply_socket_options(s, p, p->fd);
2,273✔
1669
                        socket_symlink(s);
2,273✔
1670
                        break;
1671

1672
                case SOCKET_SPECIAL:
6✔
1673

1674
                        p->fd = special_address_create(p->path, s->writable);
6✔
1675
                        if (p->fd < 0)
6✔
1676
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open special file '%s': %m", p->path);
×
1677
                        break;
1678

1679
                case SOCKET_FIFO:
66✔
1680

1681
                        p->fd = fifo_address_create(
132✔
1682
                                        p->path,
66✔
1683
                                        s->directory_mode,
1684
                                        s->socket_mode);
1685
                        if (p->fd < 0)
66✔
1686
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open FIFO '%s': %m", p->path);
×
1687

1688
                        socket_apply_fifo_options(s, p->fd);
66✔
1689
                        socket_symlink(s);
66✔
1690
                        break;
1691

1692
                case SOCKET_MQUEUE:
×
1693

1694
                        p->fd = mq_address_create(
×
1695
                                        p->path,
×
1696
                                        s->socket_mode,
1697
                                        s->mq_maxmsg,
1698
                                        s->mq_msgsize);
1699
                        if (p->fd < 0)
×
1700
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open message queue '%s': %m", p->path);
×
1701
                        break;
1702

1703
                case SOCKET_USB_FUNCTION: {
×
1704
                        _cleanup_close_ int dfd = -EBADF;
4,594✔
1705

1706
                        dfd = open(p->path, O_DIRECTORY|O_CLOEXEC);
×
1707
                        if (dfd < 0)
×
1708
                                return log_unit_error_errno(UNIT(s), errno,
×
1709
                                                            "Failed to open USB FunctionFS dir '%s': %m", p->path);
1710

1711
                        p->fd = usbffs_address_create_at(dfd, "ep0");
×
1712
                        if (p->fd < 0)
×
1713
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open USB FunctionFS ep0: %m");
×
1714

1715
                        r = usbffs_write_descs(p->fd, SERVICE(UNIT_DEREF(s->service)));
×
1716
                        if (r < 0)
×
1717
                                return log_unit_error_errno(UNIT(s), r, "Failed to write to USB FunctionFS ep0: %m");
×
1718

1719
                        r = usbffs_dispatch_eps(p, dfd);
×
1720
                        if (r < 0)
×
1721
                                return log_unit_error_errno(UNIT(s), r, "Failed to dispatch USB FunctionFS eps: %m");
×
1722

1723
                        break;
×
1724
                }
1725

1726
                default:
×
1727
                        assert_not_reached();
×
1728
                }
1729
        }
1730

1731
        TAKE_PTR(s);
1732
        return 0;
1733
}
1734

1735
static void socket_unwatch_fds(Socket *s) {
5,959✔
1736
        int r;
5,959✔
1737

1738
        assert(s);
5,959✔
1739

1740
        LIST_FOREACH(port, p, s->ports) {
12,224✔
1741
                if (p->fd < 0)
6,265✔
1742
                        continue;
2,345✔
1743

1744
                r = sd_event_source_set_enabled(p->event_source, SD_EVENT_OFF);
3,920✔
1745
                if (r < 0)
3,920✔
1746
                        log_unit_debug_errno(UNIT(s), r, "Failed to disable event source: %m");
×
1747
        }
1748
}
5,959✔
1749

1750
static int socket_watch_fds(Socket *s) {
3,557✔
1751
        int r;
3,557✔
1752

1753
        assert(s);
3,557✔
1754

1755
        LIST_FOREACH(port, p, s->ports) {
7,314✔
1756
                if (p->fd < 0)
3,757✔
1757
                        continue;
×
1758

1759
                if (p->event_source) {
3,757✔
1760
                        r = sd_event_source_set_enabled(p->event_source, SD_EVENT_ON);
576✔
1761
                        if (r < 0)
576✔
1762
                                goto fail;
×
1763
                } else {
1764
                        r = sd_event_add_io(UNIT(s)->manager->event, &p->event_source, p->fd, EPOLLIN, socket_dispatch_io, p);
3,181✔
1765
                        if (r < 0)
3,181✔
1766
                                goto fail;
×
1767

1768
                        (void) sd_event_source_set_description(p->event_source, "socket-port-io");
3,181✔
1769
                }
1770

1771
                r = sd_event_source_set_ratelimit(p->event_source, s->poll_limit.interval, s->poll_limit.burst);
3,757✔
1772
                if (r < 0)
3,757✔
1773
                        log_unit_debug_errno(UNIT(s), r, "Failed to set poll limit on I/O event source, ignoring: %m");
×
1774
        }
1775

1776
        return 0;
1777

1778
fail:
×
1779
        log_unit_warning_errno(UNIT(s), r, "Failed to watch listening fds: %m");
×
1780
        socket_unwatch_fds(s);
×
1781
        return r;
×
1782
}
1783

1784
enum {
1785
        SOCKET_OPEN_NONE,
1786
        SOCKET_OPEN_SOME,
1787
        SOCKET_OPEN_ALL,
1788
};
1789

1790
static int socket_check_open(Socket *s) {
1,091✔
1791
        bool have_open = false, have_closed = false;
1,091✔
1792

1793
        assert(s);
1,091✔
1794

1795
        LIST_FOREACH(port, p, s->ports) {
2,332✔
1796
                if (p->fd < 0)
1,241✔
1797
                        have_closed = true;
1798
                else
1799
                        have_open = true;
1,241✔
1800

1801
                if (have_open && have_closed)
1,241✔
1802
                        return SOCKET_OPEN_SOME;
1803
        }
1804

1805
        if (have_open)
1,091✔
1806
                return SOCKET_OPEN_ALL;
1,091✔
1807

1808
        return SOCKET_OPEN_NONE;
1809
}
1810

1811
static void socket_set_state(Socket *s, SocketState state) {
9,516✔
1812
        SocketState old_state;
9,516✔
1813

1814
        assert(s);
9,516✔
1815

1816
        if (s->state != state)
9,516✔
1817
                bus_unit_send_pending_change_signal(UNIT(s), false);
8,362✔
1818

1819
        old_state = s->state;
9,516✔
1820
        s->state = state;
9,516✔
1821

1822
        if (!SOCKET_STATE_WITH_PROCESS(state)) {
9,516✔
1823
                s->timer_event_source = sd_event_source_disable_unref(s->timer_event_source);
9,345✔
1824
                socket_unwatch_control_pid(s);
9,345✔
1825
                s->control_command = NULL;
9,345✔
1826
                s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
9,345✔
1827
        }
1828

1829
        if (state != SOCKET_LISTENING)
9,516✔
1830
                socket_unwatch_fds(s);
5,959✔
1831

1832
        if (!IN_SET(state,
5,959✔
1833
                    SOCKET_START_OPEN,
1834
                    SOCKET_START_CHOWN,
1835
                    SOCKET_START_POST,
1836
                    SOCKET_LISTENING,
1837
                    SOCKET_RUNNING,
1838
                    SOCKET_STOP_PRE,
1839
                    SOCKET_STOP_PRE_SIGTERM,
1840
                    SOCKET_STOP_PRE_SIGKILL))
1841
                socket_close_fds(s);
1,872✔
1842

1843
        if (state != old_state)
9,516✔
1844
                log_unit_debug(UNIT(s), "Changed %s -> %s", socket_state_to_string(old_state), socket_state_to_string(state));
16,584✔
1845

1846
        unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state], /* reload_success = */ true);
9,516✔
1847
}
9,516✔
1848

1849
static int socket_coldplug(Unit *u) {
2,716✔
1850
        Socket *s = ASSERT_PTR(SOCKET(u));
2,716✔
1851
        int r;
2,716✔
1852

1853
        assert(s->state == SOCKET_DEAD);
2,716✔
1854

1855
        if (s->deserialized_state == s->state)
2,716✔
1856
                return 0;
1857

1858
        if (pidref_is_set(&s->control_pid) &&
1,091✔
1859
            pidref_is_unwaited(&s->control_pid) > 0 &&
×
1860
            SOCKET_STATE_WITH_PROCESS(s->deserialized_state)) {
×
1861

1862
                r = unit_watch_pidref(UNIT(s), &s->control_pid, /* exclusive= */ false);
×
1863
                if (r < 0)
×
1864
                        return r;
1865

1866
                r = socket_arm_timer(s, /* relative= */ false, usec_add(u->state_change_timestamp.monotonic, s->timeout_usec));
×
1867
                if (r < 0)
×
1868
                        return r;
1869
        }
1870

1871
        if (IN_SET(s->deserialized_state,
1,091✔
1872
                   SOCKET_START_OPEN,
1873
                   SOCKET_START_CHOWN,
1874
                   SOCKET_START_POST,
1875
                   SOCKET_LISTENING,
1876
                   SOCKET_RUNNING)) {
1877

1878
                /* Originally, we used to simply reopen all sockets here that we didn't have file descriptors
1879
                 * for. However, this is problematic, as we won't traverse through the SOCKET_START_CHOWN state for
1880
                 * them, and thus the UID/GID wouldn't be right. Hence, instead simply check if we have all fds open,
1881
                 * and if there's a mismatch, warn loudly.
1882
                 *
1883
                 * Note that SOCKET_START_OPEN requires no special treatment, as it's only intermediate
1884
                 * between SOCKET_START_PRE and SOCKET_START_CHOWN and shall otherwise not be observed.
1885
                 * It's listed only for consistency. */
1886

1887
                r = socket_check_open(s);
1,091✔
1888
                if (r == SOCKET_OPEN_NONE)
1,091✔
1889
                        log_unit_warning(UNIT(s),
×
1890
                                         "Socket unit configuration has changed while unit has been running, "
1891
                                         "no open socket file descriptor left. "
1892
                                         "The socket unit is not functional until restarted.");
1893
                else if (r == SOCKET_OPEN_SOME)
1,091✔
1894
                        log_unit_warning(UNIT(s),
×
1895
                                         "Socket unit configuration has changed while unit has been running, "
1896
                                         "and some socket file descriptors have not been opened yet. "
1897
                                         "The socket unit is not fully functional until restarted.");
1898
        }
1899

1900
        if (s->deserialized_state == SOCKET_LISTENING) {
1,091✔
1901
                r = socket_watch_fds(s);
722✔
1902
                if (r < 0)
722✔
1903
                        return r;
1904
        }
1905

1906
        if (!IN_SET(s->deserialized_state, SOCKET_DEAD, SOCKET_FAILED, SOCKET_CLEANING))
1,091✔
1907
                (void) unit_setup_exec_runtime(u);
1,091✔
1908

1909
        socket_set_state(s, s->deserialized_state);
1,091✔
1910
        return 0;
1,091✔
1911
}
1912

1913
static int socket_spawn(Socket *s, ExecCommand *c, PidRef *ret_pid) {
171✔
1914
        _cleanup_(exec_params_shallow_clear) ExecParameters exec_params = EXEC_PARAMETERS_INIT(
171✔
1915
                        EXEC_APPLY_SANDBOXING|EXEC_APPLY_CHROOT|EXEC_APPLY_TTY_STDIN);
1916
        _cleanup_(pidref_done) PidRef pidref = PIDREF_NULL;
171✔
1917
        int r;
171✔
1918

1919
        assert(s);
171✔
1920
        assert(c);
171✔
1921
        assert(ret_pid);
171✔
1922

1923
        r = unit_prepare_exec(UNIT(s));
171✔
1924
        if (r < 0)
171✔
1925
                return r;
1926

1927
        r = socket_arm_timer(s, /* relative= */ true, s->timeout_usec);
171✔
1928
        if (r < 0)
171✔
1929
                return r;
1930

1931
        r = unit_set_exec_params(UNIT(s), &exec_params);
171✔
1932
        if (r < 0)
171✔
1933
                return r;
1934

1935
        /* Note that ExecStartPre= command doesn't inherit any FDs. It runs before we open listen FDs. */
1936
        if (s->pass_fds_to_exec) {
171✔
1937
                _cleanup_strv_free_ char **fd_names = NULL;
×
1938
                _cleanup_free_ int *fds = NULL;
×
1939
                int n_fds;
×
1940

1941
                n_fds = socket_collect_fds(s, &fds);
×
1942
                if (n_fds < 0)
×
1943
                        return n_fds;
1944

1945
                r = strv_extend_n(&fd_names, socket_fdname(s), n_fds);
×
1946
                if (r < 0)
×
1947
                        return r;
1948

1949
                exec_params.flags |= EXEC_PASS_FDS;
×
1950
                exec_params.fds = TAKE_PTR(fds);
×
1951
                exec_params.fd_names = TAKE_PTR(fd_names);
×
1952
                exec_params.n_socket_fds = n_fds;
×
1953
        }
1954

1955
        r = exec_spawn(UNIT(s),
171✔
1956
                       c,
1957
                       &s->exec_context,
171✔
1958
                       &exec_params,
1959
                       s->exec_runtime,
1960
                       &s->cgroup_context,
171✔
1961
                       &pidref);
1962
        if (r < 0)
171✔
1963
                return r;
1964

1965
        r = unit_watch_pidref(UNIT(s), &pidref, /* exclusive= */ true);
171✔
1966
        if (r < 0)
171✔
1967
                return r;
1968

1969
        *ret_pid = TAKE_PIDREF(pidref);
171✔
1970
        return 0;
171✔
1971
}
1972

1973
static int socket_chown(Socket *s, PidRef *ret_pid) {
×
1974
        _cleanup_(pidref_done) PidRef pid = PIDREF_NULL;
×
1975
        int r;
×
1976

1977
        assert(s);
×
1978

1979
        r = socket_arm_timer(s, /* relative= */ true, s->timeout_usec);
×
1980
        if (r < 0)
×
1981
                return r;
1982

1983
        /* We have to resolve the user names out-of-process, hence
1984
         * let's fork here. It's messy, but well, what can we do? */
1985

1986
        r = unit_fork_helper_process(UNIT(s), "(sd-chown)", /* into_cgroup= */ true, &pid);
×
1987
        if (r < 0)
3✔
1988
                return r;
1989
        if (r == 0) {
3✔
1990
                uid_t uid = UID_INVALID;
3✔
1991
                gid_t gid = GID_INVALID;
3✔
1992

1993
                /* Child */
1994

1995
                if (!isempty(s->user)) {
3✔
1996
                        const char *user = s->user;
1✔
1997

1998
                        r = get_user_creds(&user, &uid, &gid, NULL, NULL, 0);
1✔
1999
                        if (r < 0) {
1✔
2000
                                log_unit_error_errno(UNIT(s), r, "Failed to resolve user %s: %m", user);
×
2001
                                _exit(EXIT_USER);
×
2002
                        }
2003
                }
2004

2005
                if (!isempty(s->group)) {
3✔
2006
                        const char *group = s->group;
3✔
2007

2008
                        r = get_group_creds(&group, &gid, 0);
3✔
2009
                        if (r < 0) {
3✔
2010
                                log_unit_error_errno(UNIT(s), r, "Failed to resolve group %s: %m", group);
×
2011
                                _exit(EXIT_GROUP);
×
2012
                        }
2013
                }
2014

2015
                LIST_FOREACH(port, p, s->ports) {
6✔
2016
                        const char *path = NULL;
3✔
2017

2018
                        if (p->type == SOCKET_SOCKET)
3✔
2019
                                path = socket_address_get_path(&p->address);
2✔
2020
                        else if (p->type == SOCKET_FIFO)
1✔
2021
                                path = p->path;
×
2022
                        else if (p->type == SOCKET_MQUEUE) {
1✔
2023
                                /* Use fchown on the fd since /dev/mqueue might not be mounted. */
2024
                                if (fchown(p->fd, uid, gid) < 0) {
1✔
2025
                                        log_unit_error_errno(UNIT(s), errno, "Failed to fchown(): %m");
×
2026
                                        _exit(EXIT_CHOWN);
×
2027
                                }
2028
                                continue;
1✔
2029
                        }
2030

2031
                        if (!path)
2✔
2032
                                continue;
×
2033

2034
                        if (chown(path, uid, gid) < 0) {
2✔
2035
                                log_unit_error_errno(UNIT(s), errno, "Failed to chown(): %m");
×
2036
                                _exit(EXIT_CHOWN);
×
2037
                        }
2038
                }
2039

2040
                _exit(EXIT_SUCCESS);
3✔
2041
        }
2042

2043
        r = unit_watch_pidref(UNIT(s), &pid, /* exclusive= */ true);
×
2044
        if (r < 0)
×
2045
                return r;
2046

2047
        *ret_pid = TAKE_PIDREF(pid);
×
2048
        return 0;
×
2049
}
2050

2051
static void socket_enter_dead(Socket *s, SocketResult f) {
1,872✔
2052
        assert(s);
1,872✔
2053

2054
        if (s->result == SOCKET_SUCCESS)
1,872✔
2055
                s->result = f;
1,872✔
2056

2057
        if (s->result == SOCKET_SUCCESS)
1,872✔
2058
                unit_log_success(UNIT(s));
1,872✔
2059
        else
2060
                unit_log_failure(UNIT(s), socket_result_to_string(s->result));
×
2061

2062
        unit_warn_leftover_processes(UNIT(s), /* start = */ false);
1,872✔
2063

2064
        socket_set_state(s, s->result != SOCKET_SUCCESS ? SOCKET_FAILED : SOCKET_DEAD);
3,744✔
2065

2066
        s->exec_runtime = exec_runtime_destroy(s->exec_runtime);
1,872✔
2067

2068
        unit_destroy_runtime_data(UNIT(s), &s->exec_context, /* destroy_runtime_dir = */ true);
1,872✔
2069

2070
        unit_unref_uid_gid(UNIT(s), true);
1,872✔
2071
}
1,872✔
2072

2073
static void socket_enter_signal(Socket *s, SocketState state, SocketResult f);
2074

2075
static void socket_enter_stop_post(Socket *s, SocketResult f) {
1,872✔
2076
        int r;
1,872✔
2077

2078
        assert(s);
1,872✔
2079

2080
        if (s->result == SOCKET_SUCCESS)
1,872✔
2081
                s->result = f;
1,872✔
2082

2083
        socket_unwatch_control_pid(s);
1,872✔
2084
        s->control_command_id = SOCKET_EXEC_STOP_POST;
1,872✔
2085
        s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST];
1,872✔
2086

2087
        if (s->control_command) {
1,872✔
2088
                pidref_done(&s->control_pid);
×
2089

2090
                r = socket_spawn(s, s->control_command, &s->control_pid);
×
2091
                if (r < 0) {
×
2092
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'stop-post' task: %m");
×
2093
                        socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_RESOURCES);
×
2094
                        return;
×
2095
                }
2096

2097
                socket_set_state(s, SOCKET_STOP_POST);
×
2098
        } else
2099
                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_SUCCESS);
1,872✔
2100
}
2101

2102
static int state_to_kill_operation(Socket *s, SocketState state) {
3,744✔
2103
        assert(s);
3,744✔
2104

2105
        if (state == SOCKET_STOP_PRE_SIGTERM)
3,744✔
2106
                return unit_has_job_type(UNIT(s), JOB_RESTART) ? KILL_RESTART : KILL_TERMINATE;
×
2107

2108
        if (state == SOCKET_FINAL_SIGTERM)
3,744✔
2109
                return KILL_TERMINATE;
1,872✔
2110

2111
        return KILL_KILL;
2112
}
2113

2114
static void socket_enter_signal(Socket *s, SocketState state, SocketResult f) {
3,744✔
2115
        int r;
3,744✔
2116

2117
        assert(s);
3,744✔
2118

2119
        if (s->result == SOCKET_SUCCESS)
3,744✔
2120
                s->result = f;
3,744✔
2121

2122
        r = unit_kill_context(UNIT(s), state_to_kill_operation(s, state));
3,744✔
2123
        if (r < 0) {
3,744✔
2124
                log_unit_warning_errno(UNIT(s), r, "Failed to kill processes: %m");
×
2125
                goto fail;
×
2126
        }
2127
        if (r > 0) {
3,744✔
2128
                r = socket_arm_timer(s, /* relative= */ true, s->timeout_usec);
×
2129
                if (r < 0) {
×
2130
                        log_unit_warning_errno(UNIT(s), r, "Failed to install timer: %m");
×
2131
                        goto fail;
×
2132
                }
2133

2134
                socket_set_state(s, state);
×
2135
        } else if (state == SOCKET_STOP_PRE_SIGTERM)
3,744✔
2136
                socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, SOCKET_SUCCESS);
×
2137
        else if (state == SOCKET_STOP_PRE_SIGKILL)
3,744✔
2138
                socket_enter_stop_post(s, SOCKET_SUCCESS);
×
2139
        else if (state == SOCKET_FINAL_SIGTERM)
3,744✔
2140
                socket_enter_signal(s, SOCKET_FINAL_SIGKILL, SOCKET_SUCCESS);
1,872✔
2141
        else
2142
                socket_enter_dead(s, SOCKET_SUCCESS);
1,872✔
2143

2144
        return;
2145

2146
fail:
×
2147
        if (IN_SET(state, SOCKET_STOP_PRE_SIGTERM, SOCKET_STOP_PRE_SIGKILL))
×
2148
                socket_enter_stop_post(s, SOCKET_FAILURE_RESOURCES);
×
2149
        else
2150
                socket_enter_dead(s, SOCKET_FAILURE_RESOURCES);
×
2151
}
2152

2153
static void socket_enter_stop_pre(Socket *s, SocketResult f) {
1,872✔
2154
        int r;
1,872✔
2155

2156
        assert(s);
1,872✔
2157

2158
        if (s->result == SOCKET_SUCCESS)
1,872✔
2159
                s->result = f;
1,872✔
2160

2161
        socket_unwatch_control_pid(s);
1,872✔
2162
        s->control_command_id = SOCKET_EXEC_STOP_PRE;
1,872✔
2163
        s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE];
1,872✔
2164

2165
        if (s->control_command) {
1,872✔
2166
                pidref_done(&s->control_pid);
×
2167

2168
                r = socket_spawn(s, s->control_command, &s->control_pid);
×
2169
                if (r < 0) {
×
2170
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'stop-pre' task: %m");
×
2171
                        socket_enter_stop_post(s, SOCKET_FAILURE_RESOURCES);
×
2172
                        return;
×
2173
                }
2174

2175
                socket_set_state(s, SOCKET_STOP_PRE);
×
2176
        } else
2177
                socket_enter_stop_post(s, SOCKET_SUCCESS);
1,872✔
2178
}
2179

UNCOV
2180
static void flush_ports(Socket *s) {
×
UNCOV
2181
        assert(s);
×
2182

2183
        /* Flush all incoming traffic, regardless if actual bytes or new connections, so that this socket isn't busy
2184
         * anymore */
2185

UNCOV
2186
        LIST_FOREACH(port, p, s->ports) {
×
UNCOV
2187
                if (p->fd < 0)
×
2188
                        continue;
×
2189

UNCOV
2190
                (void) flush_accept(p->fd);
×
UNCOV
2191
                (void) flush_fd(p->fd);
×
2192
        }
UNCOV
2193
}
×
2194

2195
static void socket_enter_listening(Socket *s) {
2,835✔
2196
        int r;
2,835✔
2197

2198
        assert(s);
2,835✔
2199

2200
        if (!s->accept && s->flush_pending) {
2,835✔
2201
                log_unit_debug(UNIT(s), "Flushing socket before listening.");
×
2202
                flush_ports(s);
×
2203
        }
2204

2205
        r = socket_watch_fds(s);
2,835✔
2206
        if (r < 0) {
2,835✔
2207
                log_unit_warning_errno(UNIT(s), r, "Failed to watch sockets: %m");
×
2208
                socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2209
                return;
×
2210
        }
2211

2212
        socket_set_state(s, SOCKET_LISTENING);
2,835✔
2213
}
2214

2215
static void socket_enter_start_post(Socket *s) {
2,249✔
2216
        int r;
2,249✔
2217

2218
        assert(s);
2,249✔
2219

2220
        socket_unwatch_control_pid(s);
2,249✔
2221
        s->control_command_id = SOCKET_EXEC_START_POST;
2,249✔
2222
        s->control_command = s->exec_command[SOCKET_EXEC_START_POST];
2,249✔
2223

2224
        if (s->control_command) {
2,249✔
2225
                pidref_done(&s->control_pid);
171✔
2226

2227
                r = socket_spawn(s, s->control_command, &s->control_pid);
171✔
2228
                if (r < 0) {
171✔
2229
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'start-post' task: %m");
×
2230
                        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2231
                        return;
×
2232
                }
2233

2234
                socket_set_state(s, SOCKET_START_POST);
171✔
2235
        } else
2236
                socket_enter_listening(s);
2,078✔
2237
}
2238

2239
static void socket_enter_start_chown(Socket *s) {
2,249✔
2240
        int r;
2,249✔
2241

2242
        assert(s);
2,249✔
2243
        assert(s->state == SOCKET_START_OPEN);
2,249✔
2244

2245
        if (!isempty(s->user) || !isempty(s->group)) {
2,249✔
2246

2247
                socket_unwatch_control_pid(s);
×
2248
                s->control_command_id = SOCKET_EXEC_START_CHOWN;
×
2249
                s->control_command = NULL;
×
2250

2251
                r = socket_chown(s, &s->control_pid);
×
2252
                if (r < 0) {
×
2253
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'start-chown' task: %m");
×
2254
                        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2255
                        return;
×
2256
                }
2257

2258
                socket_set_state(s, SOCKET_START_CHOWN);
×
2259
        } else
2260
                socket_enter_start_post(s);
2,249✔
2261
}
2262

2263
static void socket_enter_start_open(Socket *s) {
2,249✔
2264
        int r;
2,249✔
2265

2266
        assert(s);
2,249✔
2267
        assert(IN_SET(s->state, SOCKET_DEAD, SOCKET_FAILED, SOCKET_START_PRE));
2,249✔
2268

2269
        /* We force a state transition here even though we're not spawning any process (i.e. the state is purely
2270
         * intermediate), so that failure of socket_open_fds() always causes a state change in unit_notify().
2271
         * Otherwise, if no Exec*= is defined, we might go from previous SOCKET_FAILED to SOCKET_FAILED,
2272
         * meaning the OnFailure= deps are unexpectedly skipped (#35635). */
2273

2274
        socket_set_state(s, SOCKET_START_OPEN);
2,249✔
2275

2276
        r = socket_open_fds(s);
2,249✔
2277
        if (r < 0) {
2,249✔
2278
                log_unit_error_errno(UNIT(s), r, "Failed to listen on sockets: %m");
×
2279
                socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2280
                return;
×
2281
        }
2282

2283
        socket_enter_start_chown(s);
2,249✔
2284
}
2285

2286
static void socket_enter_start_pre(Socket *s) {
2,249✔
2287
        int r;
2,249✔
2288

2289
        assert(s);
2,249✔
2290

2291
        socket_unwatch_control_pid(s);
2,249✔
2292

2293
        unit_warn_leftover_processes(UNIT(s), /* start = */ true);
2,249✔
2294

2295
        s->control_command_id = SOCKET_EXEC_START_PRE;
2,249✔
2296
        s->control_command = s->exec_command[SOCKET_EXEC_START_PRE];
2,249✔
2297

2298
        if (s->control_command) {
2,249✔
2299
                pidref_done(&s->control_pid);
×
2300

2301
                r = socket_spawn(s, s->control_command, &s->control_pid);
×
2302
                if (r < 0) {
×
2303
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'start-pre' task: %m");
×
2304
                        socket_enter_dead(s, SOCKET_FAILURE_RESOURCES);
×
2305
                        return;
×
2306
                }
2307

2308
                socket_set_state(s, SOCKET_START_PRE);
×
2309
        } else
2310
                socket_enter_start_open(s);
2,249✔
2311
}
2312

2313
static void socket_enter_running(Socket *s, int cfd_in) {
190✔
2314
        /* Note that this call takes possession of the connection fd passed. It either has to assign it
2315
         * somewhere or close it. */
2316
        _cleanup_close_ int cfd = cfd_in;
190✔
2317
        _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
190✔
2318
        int r;
190✔
2319

2320
        assert(s);
190✔
2321

2322
        /* We don't take connections anymore if we are supposed to shut down anyway */
2323
        if (unit_stop_pending(UNIT(s))) {
190✔
2324

UNCOV
2325
                log_unit_debug(UNIT(s), "Suppressing connection request since unit stop is scheduled.");
×
2326

UNCOV
2327
                if (cfd >= 0)
×
2328
                        goto refuse;
×
2329

UNCOV
2330
                flush_ports(s);
×
2331
                return;
2332
        }
2333

2334
        if (!ratelimit_below(&s->trigger_limit)) {
190✔
2335
                log_unit_warning(UNIT(s), "Trigger limit hit, refusing further activation.");
×
2336
                socket_enter_stop_pre(s, SOCKET_FAILURE_TRIGGER_LIMIT_HIT);
×
2337
                goto refuse;
×
2338
        }
2339

2340
        if (cfd < 0) { /* Accept=no case */
190✔
2341
                bool pending = false;
188✔
2342
                Unit *other;
188✔
2343

2344
                /* If there's already a start pending don't bother to do anything */
2345
                UNIT_FOREACH_DEPENDENCY(other, UNIT(s), UNIT_ATOM_TRIGGERS)
845✔
2346
                        if (unit_active_or_pending(other)) {
188✔
2347
                                pending = true;
2348
                                break;
2349
                        }
2350

2351
                if (!pending) {
188✔
2352
                        if (!UNIT_ISSET(s->service)) {
93✔
2353
                                log_unit_warning(UNIT(s),
×
2354
                                                 "Service to activate vanished, refusing activation.");
2355
                                goto fail;
×
2356
                        }
2357

2358
                        r = manager_add_job(UNIT(s)->manager, JOB_START, UNIT_DEREF(s->service), JOB_REPLACE, &error, /* ret = */ NULL);
93✔
2359
                        if (r < 0)
93✔
2360
                                goto queue_error;
×
2361
                }
2362

2363
                socket_set_state(s, SOCKET_RUNNING);
188✔
2364
        } else { /* Accept=yes case */
2365
                _cleanup_(socket_peer_unrefp) SocketPeer *p = NULL;
2✔
2366
                Unit *service;
2✔
2367

2368
                if (s->n_connections >= s->max_connections) {
2✔
2369
                        log_unit_warning(UNIT(s), "Too many incoming connections (%u), dropping connection.",
×
2370
                                         s->n_connections);
2371
                        goto refuse;
×
2372
                }
2373

2374
                if (s->max_connections_per_source > 0) {
2✔
2375
                        r = socket_acquire_peer(s, cfd, &p);
2✔
2376
                        if (r < 0) {
2✔
2377
                                if (ERRNO_IS_DISCONNECT(r))
×
2378
                                        return;
2379
                                /* We didn't have enough resources to acquire peer information, let's fail. */
2380
                                goto fail;
×
2381
                        }
2382
                        if (r > 0 && p->n_ref > s->max_connections_per_source) {
2✔
2383
                                _cleanup_free_ char *t = NULL;
×
2384

2385
                                if (p->peer.sa.sa_family == AF_UNIX)
×
2386
                                        (void) asprintf(&t, "UID " UID_FMT, p->peer_cred.uid);
×
2387
                                else
2388
                                        (void) sockaddr_pretty(&p->peer.sa, p->peer_salen, /* translate_ipv6= */ true, /* include_port= */ false, &t);
×
2389

2390
                                log_unit_warning(UNIT(s),
×
2391
                                                 "Too many incoming connections (%u) from source %s, dropping connection.",
2392
                                                 p->n_ref, strnull(t));
2393
                                goto refuse;
×
2394
                        }
2395
                }
2396

2397
                r = socket_load_service_unit(s, cfd, &service);
2✔
2398
                if (ERRNO_IS_NEG_DISCONNECT(r))
2✔
2399
                        return;
2400
                if (r < 0 || UNIT_IS_LOAD_ERROR(service->load_state)) {
2✔
2401
                        log_unit_warning_errno(UNIT(s), r < 0 ? r : service->load_error,
×
2402
                                               "Failed to load connection service unit: %m");
2403
                        goto fail;
×
2404
                }
2405
                if (service->load_state == UNIT_MASKED) {
2✔
2406
                        log_unit_warning(UNIT(s), "Connection service unit is masked, refusing.");
×
2407
                        goto fail;
×
2408
                }
2409

2410
                s->n_accepted++;
2✔
2411

2412
                r = service_set_socket_fd(SERVICE(service), cfd, s, p, s->selinux_context_from_net);
4✔
2413
                if (ERRNO_IS_NEG_DISCONNECT(r))
2✔
2414
                        return;
2415
                if (r < 0) {
2✔
2416
                        log_unit_warning_errno(UNIT(s), r, "Failed to set socket on service: %m");
×
2417
                        goto fail;
×
2418
                }
2419

2420
                /* We passed ownership of the fd and socket peer to the service now. */
2421
                TAKE_FD(cfd);
2✔
2422
                TAKE_PTR(p);
2✔
2423

2424
                s->n_connections++;
2✔
2425

2426
                r = manager_add_job(UNIT(s)->manager, JOB_START, service, JOB_REPLACE, &error, /* ret = */ NULL);
4✔
2427
                if (r < 0) {
2✔
2428
                        /* We failed to activate the new service, but it still exists. Let's make sure the
2429
                         * service closes and forgets the connection fd again, immediately. */
2430
                        service_release_socket_fd(SERVICE(service));
×
2431
                        goto queue_error;
×
2432
                }
2433

2434
                /* Notify clients about changed counters */
2435
                unit_add_to_dbus_queue(UNIT(s));
2✔
2436
        }
2437

2438
        return;
2439

2440
refuse:
×
2441
        s->n_refused++;
×
2442
        return;
×
2443

2444
queue_error:
×
2445
        log_unit_warning_errno(UNIT(s), r, "Failed to queue service startup job%s: %s",
×
2446
                               cfd >= 0 && !ERRNO_IS_RESOURCE(r) ? " (Maybe the service is missing or is a template unit?)" : "",
2447
                               bus_error_message(&error, r));
2448

2449
fail:
×
2450
        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2451
}
2452

2453
static void socket_run_next(Socket *s) {
×
2454
        int r;
×
2455

2456
        assert(s);
×
2457
        assert(s->control_command);
×
2458
        assert(s->control_command->command_next);
×
2459

2460
        socket_unwatch_control_pid(s);
×
2461

2462
        s->control_command = s->control_command->command_next;
×
2463

2464
        pidref_done(&s->control_pid);
×
2465

2466
        r = socket_spawn(s, s->control_command, &s->control_pid);
×
2467
        if (r < 0) {
×
2468
                log_unit_warning_errno(UNIT(s), r, "Failed to spawn next task: %m");
×
2469

2470
                if (s->state == SOCKET_START_POST)
×
2471
                        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2472
                else if (s->state == SOCKET_STOP_POST)
×
2473
                        socket_enter_dead(s, SOCKET_FAILURE_RESOURCES);
×
2474
                else
2475
                        socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_RESOURCES);
×
2476
        }
2477
}
×
2478

2479
static int socket_start(Unit *u) {
2,249✔
2480
        Socket *s = ASSERT_PTR(SOCKET(u));
2,249✔
2481
        int r;
2,249✔
2482

2483
        /* We cannot fulfill this request right now, try again later
2484
         * please! */
2485
        if (IN_SET(s->state,
2,249✔
2486
                   SOCKET_STOP_PRE,
2487
                   SOCKET_STOP_PRE_SIGKILL,
2488
                   SOCKET_STOP_PRE_SIGTERM,
2489
                   SOCKET_STOP_POST,
2490
                   SOCKET_FINAL_SIGTERM,
2491
                   SOCKET_FINAL_SIGKILL,
2492
                   SOCKET_CLEANING))
2493
                return -EAGAIN;
2494

2495
        /* Already on it! */
2496
        if (IN_SET(s->state,
4,498✔
2497
                   SOCKET_START_PRE,
2498
                   SOCKET_START_OPEN,
2499
                   SOCKET_START_CHOWN,
2500
                   SOCKET_START_POST))
2501
                return 0;
2502

2503
        /* Cannot run this without the service being around */
2504
        if (UNIT_ISSET(s->service)) {
2,249✔
2505
                Service *service = ASSERT_PTR(SERVICE(UNIT_DEREF(s->service)));
1,812✔
2506

2507
                if (UNIT(service)->load_state != UNIT_LOADED)
1,812✔
2508
                        return log_unit_error_errno(u, SYNTHETIC_ERRNO(ENOENT),
×
2509
                                                    "Socket service %s not loaded, refusing.", UNIT(service)->id);
2510

2511
                /* If the service is already active we cannot start the socket */
2512
                if (SOCKET_SERVICE_IS_ACTIVE(service, /* allow_finalize = */ false))
1,812✔
2513
                        return log_unit_error_errno(u, SYNTHETIC_ERRNO(EBUSY),
×
2514
                                                    "Socket service %s already active, refusing.", UNIT(service)->id);
2515
        }
2516

2517
        assert(IN_SET(s->state, SOCKET_DEAD, SOCKET_FAILED));
2,249✔
2518

2519
        r = unit_acquire_invocation_id(u);
2,249✔
2520
        if (r < 0)
2,249✔
2521
                return r;
2522

2523
        s->result = SOCKET_SUCCESS;
2,249✔
2524
        exec_command_reset_status_list_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
2,249✔
2525

2526
        if (s->cgroup_runtime)
2,249✔
2527
                s->cgroup_runtime->reset_accounting = true;
60✔
2528

2529
        socket_enter_start_pre(s);
2,249✔
2530
        return 1;
2,249✔
2531
}
2532

2533
static int socket_stop(Unit *u) {
1,872✔
2534
        Socket *s = ASSERT_PTR(SOCKET(u));
1,872✔
2535

2536
        /* Already on it */
2537
        if (IN_SET(s->state,
1,872✔
2538
                   SOCKET_STOP_PRE,
2539
                   SOCKET_STOP_PRE_SIGTERM,
2540
                   SOCKET_STOP_PRE_SIGKILL,
2541
                   SOCKET_STOP_POST,
2542
                   SOCKET_FINAL_SIGTERM,
2543
                   SOCKET_FINAL_SIGKILL))
2544
                return 0;
2545

2546
        /* If there's already something running we go directly into
2547
         * kill mode. */
2548
        if (IN_SET(s->state,
1,872✔
2549
                   SOCKET_START_PRE,
2550
                   SOCKET_START_OPEN,
2551
                   SOCKET_START_CHOWN,
2552
                   SOCKET_START_POST)) {
2553
                socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, SOCKET_SUCCESS);
×
2554
                return -EAGAIN;
×
2555
        }
2556

2557
        /* If we are currently cleaning, then abort it, brutally. */
2558
        if (s->state == SOCKET_CLEANING) {
1,872✔
2559
                socket_enter_signal(s, SOCKET_FINAL_SIGKILL, SOCKET_SUCCESS);
×
2560
                return 0;
×
2561
        }
2562

2563
        assert(IN_SET(s->state, SOCKET_LISTENING, SOCKET_RUNNING));
1,872✔
2564

2565
        socket_enter_stop_pre(s, SOCKET_SUCCESS);
1,872✔
2566
        return 1;
1,872✔
2567
}
2568

2569
static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
2,267✔
2570
        Socket *s = ASSERT_PTR(SOCKET(u));
2,267✔
2571
        int r;
2,267✔
2572

2573
        assert(f);
2,267✔
2574
        assert(fds);
2,267✔
2575

2576
        (void) serialize_item(f, "state", socket_state_to_string(s->state));
2,267✔
2577
        (void) serialize_item(f, "result", socket_result_to_string(s->result));
2,267✔
2578
        (void) serialize_item_format(f, "n-accepted", "%u", s->n_accepted);
2,267✔
2579
        (void) serialize_item_format(f, "n-refused", "%u", s->n_refused);
2,267✔
2580
        (void) serialize_pidref(f, fds, "control-pid", &s->control_pid);
2,267✔
2581

2582
        if (s->control_command_id >= 0)
2,267✔
2583
                (void) serialize_item(f, "control-command", socket_exec_command_to_string(s->control_command_id));
×
2584

2585
        LIST_FOREACH(port, p, s->ports) {
4,738✔
2586
                int copy;
2,471✔
2587

2588
                if (p->fd < 0)
2,471✔
2589
                        continue;
961✔
2590

2591
                copy = fdset_put_dup(fds, p->fd);
1,510✔
2592
                if (copy < 0)
1,510✔
2593
                        return log_unit_warning_errno(u, copy, "Failed to serialize socket fd: %m");
×
2594

2595
                if (p->type == SOCKET_SOCKET) {
1,510✔
2596
                        _cleanup_free_ char *t = NULL;
1,374✔
2597

2598
                        r = socket_address_print(&p->address, &t);
1,374✔
2599
                        if (r < 0)
1,374✔
2600
                                return log_unit_error_errno(u, r, "Failed to format socket address: %m");
×
2601

2602
                        if (socket_address_family(&p->address) == AF_NETLINK)
1,374✔
2603
                                (void) serialize_item_format(f, "netlink", "%i %s", copy, t);
104✔
2604
                        else
2605
                                (void) serialize_item_format(f, "socket", "%i %i %s", copy, p->address.type, t);
1,270✔
2606
                } else if (p->type == SOCKET_SPECIAL)
136✔
2607
                        (void) serialize_item_format(f, "special", "%i %s", copy, p->path);
18✔
2608
                else if (p->type == SOCKET_MQUEUE)
118✔
2609
                        (void) serialize_item_format(f, "mqueue", "%i %s", copy, p->path);
×
2610
                else if (p->type == SOCKET_USB_FUNCTION)
118✔
2611
                        (void) serialize_item_format(f, "ffs", "%i %s", copy, p->path);
×
2612
                else {
2613
                        assert(p->type == SOCKET_FIFO);
118✔
2614
                        (void) serialize_item_format(f, "fifo", "%i %s", copy, p->path);
118✔
2615
                }
2616
        }
2617

2618
        (void) serialize_ratelimit(f, "trigger-ratelimit", &s->trigger_limit);
2,267✔
2619

2620
        return 0;
2,267✔
2621
}
2622

2623
static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
10,141✔
2624
        Socket *s = ASSERT_PTR(SOCKET(u));
10,141✔
2625
        int r;
10,141✔
2626

2627
        assert(key);
10,141✔
2628
        assert(value);
10,141✔
2629

2630
        if (streq(key, "state")) {
10,141✔
2631
                SocketState state;
1,780✔
2632

2633
                state = socket_state_from_string(value);
1,780✔
2634
                if (state < 0)
1,780✔
2635
                        log_unit_debug(u, "Failed to parse state value: %s", value);
×
2636
                else
2637
                        s->deserialized_state = state;
1,780✔
2638
        } else if (streq(key, "result")) {
8,361✔
2639
                SocketResult f;
1,780✔
2640

2641
                f = socket_result_from_string(value);
1,780✔
2642
                if (f < 0)
1,780✔
2643
                        log_unit_debug(u, "Failed to parse result value: %s", value);
×
2644
                else if (f != SOCKET_SUCCESS)
1,780✔
2645
                        s->result = f;
×
2646

2647
        } else if (streq(key, "n-accepted")) {
6,581✔
2648
                unsigned k;
1,780✔
2649

2650
                if (safe_atou(value, &k) < 0)
1,780✔
2651
                        log_unit_debug(u, "Failed to parse n-accepted value: %s", value);
×
2652
                else
2653
                        s->n_accepted += k;
1,780✔
2654
        } else if (streq(key, "n-refused")) {
4,801✔
2655
                unsigned k;
1,780✔
2656

2657
                if (safe_atou(value, &k) < 0)
1,780✔
2658
                        log_unit_debug(u, "Failed to parse n-refused value: %s", value);
×
2659
                else
2660
                        s->n_refused += k;
1,780✔
2661
        } else if (streq(key, "control-pid")) {
3,021✔
2662

2663
                if (!pidref_is_set(&s->control_pid))
10,141✔
2664
                        (void) deserialize_pidref(fds, value, &s->control_pid);
×
2665

2666
        } else if (streq(key, "control-command")) {
3,021✔
2667
                SocketExecCommand id;
×
2668

2669
                id = socket_exec_command_from_string(value);
×
2670
                if (id < 0)
×
2671
                        log_unit_debug(u, "Failed to parse exec-command value: %s", value);
×
2672
                else {
2673
                        s->control_command_id = id;
×
2674
                        s->control_command = s->exec_command[id];
×
2675
                }
2676
        } else if (streq(key, "fifo")) {
3,021✔
2677
                _cleanup_free_ char *fdv = NULL;
98✔
2678
                bool found = false;
98✔
2679
                int fd;
98✔
2680

2681
                r = extract_first_word(&value, &fdv, NULL, 0);
98✔
2682
                if (r <= 0) {
98✔
2683
                        log_unit_debug(u, "Failed to parse fifo value: %s", value);
×
2684
                        return 0;
×
2685
                }
2686

2687
                fd = parse_fd(fdv);
98✔
2688
                if (fd < 0 || !fdset_contains(fds, fd)) {
98✔
2689
                        log_unit_debug(u, "Invalid fifo value: %s", fdv);
×
2690
                        return 0;
×
2691
                }
2692

2693
                LIST_FOREACH(port, p, s->ports)
147✔
2694
                        if (p->fd < 0 &&
147✔
2695
                            p->type == SOCKET_FIFO &&
98✔
2696
                            path_equal_or_inode_same(p->path, value, 0)) {
98✔
2697
                                p->fd = fdset_remove(fds, fd);
98✔
2698
                                found = true;
98✔
2699
                                break;
98✔
2700
                        }
2701
                if (!found)
98✔
2702
                        log_unit_debug(u, "No matching fifo socket found: %s", value);
×
2703

2704
        } else if (streq(key, "special")) {
2,923✔
2705
                _cleanup_free_ char *fdv = NULL;
15✔
2706
                bool found = false;
15✔
2707
                int fd;
15✔
2708

2709
                r = extract_first_word(&value, &fdv, NULL, 0);
15✔
2710
                if (r <= 0) {
15✔
2711
                        log_unit_debug(u, "Failed to parse special value: %s", value);
×
2712
                        return 0;
×
2713
                }
2714

2715
                fd = parse_fd(fdv);
15✔
2716
                if (fd < 0 || !fdset_contains(fds, fd)) {
15✔
2717
                        log_unit_debug(u, "Invalid special value: %s", fdv);
×
2718
                        return 0;
×
2719
                }
2720

2721
                LIST_FOREACH(port, p, s->ports)
15✔
2722
                        if (p->fd < 0 &&
15✔
2723
                            p->type == SOCKET_SPECIAL &&
15✔
2724
                            path_equal_or_inode_same(p->path, value, 0)) {
15✔
2725
                                p->fd = fdset_remove(fds, fd);
15✔
2726
                                found = true;
15✔
2727
                                break;
15✔
2728
                        }
2729
                if (!found)
15✔
2730
                        log_unit_debug(u, "No matching special socket found: %s", value);
×
2731

2732
        } else if (streq(key, "mqueue")) {
2,908✔
2733
                _cleanup_free_ char *fdv = NULL;
×
2734
                bool found = false;
×
2735
                int fd;
×
2736

2737
                r = extract_first_word(&value, &fdv, NULL, 0);
×
2738
                if (r <= 0) {
×
2739
                        log_unit_debug(u, "Failed to parse mqueue value: %s", value);
×
2740
                        return 0;
×
2741
                }
2742

2743
                fd = parse_fd(fdv);
×
2744
                if (fd < 0 || !fdset_contains(fds, fd)) {
×
2745
                        log_unit_debug(u, "Invalid mqueue value: %s", fdv);
×
2746
                        return 0;
×
2747
                }
2748

2749
                LIST_FOREACH(port, p, s->ports)
×
2750
                        if (p->fd < 0 &&
×
2751
                            p->type == SOCKET_MQUEUE &&
×
2752
                            streq(p->path, value)) {
×
2753
                                p->fd = fdset_remove(fds, fd);
×
2754
                                found = true;
×
2755
                                break;
×
2756
                        }
2757
                if (!found)
×
2758
                        log_unit_debug(u, "No matching mqueue socket found: %s", value);
×
2759

2760
        } else if (streq(key, "socket")) {
2,908✔
2761
                _cleanup_free_ char *fdv = NULL, *typev = NULL;
1,046✔
2762
                bool found = false;
1,046✔
2763
                int fd, type;
1,046✔
2764

2765
                r = extract_first_word(&value, &fdv, NULL, 0);
1,046✔
2766
                if (r <= 0) {
1,046✔
2767
                        log_unit_debug(u, "Failed to parse socket fd from value: %s", value);
×
2768
                        return 0;
×
2769
                }
2770

2771
                fd = parse_fd(fdv);
1,046✔
2772
                if (fd < 0 || !fdset_contains(fds, fd)) {
1,046✔
2773
                        log_unit_debug(u, "Invalid socket fd: %s", fdv);
×
2774
                        return 0;
×
2775
                }
2776

2777
                r = extract_first_word(&value, &typev, NULL, 0);
1,046✔
2778
                if (r <= 0) {
1,046✔
2779
                        log_unit_debug(u, "Failed to parse socket type from value: %s", value);
×
2780
                        return 0;
×
2781
                }
2782

2783
                if (safe_atoi(typev, &type) < 0 || type < 0) {
1,046✔
2784
                        log_unit_debug(u, "Invalid socket type: %s", typev);
×
2785
                        return 0;
×
2786
                }
2787

2788
                LIST_FOREACH(port, p, s->ports)
1,147✔
2789
                        if (p->fd < 0 &&
2,193✔
2790
                            socket_address_is(&p->address, value, type)) {
1,046✔
2791
                                p->fd = fdset_remove(fds, fd);
1,046✔
2792
                                found = true;
1,046✔
2793
                                break;
1,046✔
2794
                        }
2795
                if (!found)
1,046✔
2796
                        log_unit_debug(u, "No matching %s socket found: %s",
×
2797
                                       socket_address_type_to_string(type), value);
2798

2799
        } else if (streq(key, "netlink")) {
1,862✔
2800
                _cleanup_free_ char *fdv = NULL;
82✔
2801
                bool found = false;
82✔
2802
                int fd;
82✔
2803

2804
                r = extract_first_word(&value, &fdv, NULL, 0);
82✔
2805
                if (r <= 0) {
82✔
2806
                        log_unit_debug(u, "Failed to parse socket value: %s", value);
×
2807
                        return 0;
×
2808
                }
2809

2810
                fd = parse_fd(fdv);
82✔
2811
                if (fd < 0 || !fdset_contains(fds, fd)) {
82✔
2812
                        log_unit_debug(u, "Invalid socket value: %s", fdv);
×
2813
                        return 0;
×
2814
                }
2815

2816
                LIST_FOREACH(port, p, s->ports)
82✔
2817
                        if (p->fd < 0 &&
164✔
2818
                            socket_address_is_netlink(&p->address, value)) {
82✔
2819
                                p->fd = fdset_remove(fds, fd);
82✔
2820
                                found = true;
82✔
2821
                                break;
82✔
2822
                        }
2823
                if (!found)
82✔
2824
                        log_unit_debug(u, "No matching netlink socket found: %s", value);
×
2825

2826
        } else if (streq(key, "ffs")) {
1,780✔
2827
                _cleanup_free_ char *fdv = NULL;
×
2828
                bool found = false;
×
2829
                int fd;
×
2830

2831
                r = extract_first_word(&value, &fdv, NULL, 0);
×
2832
                if (r <= 0) {
×
2833
                        log_unit_debug(u, "Failed to parse ffs value: %s", value);
×
2834
                        return 0;
×
2835
                }
2836

2837
                fd = parse_fd(fdv);
×
2838
                if (fd < 0 || !fdset_contains(fds, fd)) {
×
2839
                        log_unit_debug(u, "Invalid ffs value: %s", fdv);
×
2840
                        return 0;
×
2841
                }
2842

2843
                LIST_FOREACH(port, p, s->ports)
×
2844
                        if (p->fd < 0 &&
×
2845
                            p->type == SOCKET_USB_FUNCTION &&
×
2846
                            path_equal_or_inode_same(p->path, value, 0)) {
×
2847
                                p->fd = fdset_remove(fds, fd);
×
2848
                                found = true;
×
2849
                                break;
×
2850
                        }
2851
                if (!found)
×
2852
                        log_unit_debug(u, "No matching ffs socket found: %s", value);
×
2853

2854
        } else if (streq(key, "trigger-ratelimit"))
1,780✔
2855
                (void) deserialize_ratelimit(&s->trigger_limit, key, value);
1,780✔
2856
        else
2857
                log_unit_debug(UNIT(s), "Unknown serialization key: %s", key);
×
2858

2859
        return 0;
2860
}
2861

2862
static void socket_distribute_fds(Unit *u, FDSet *fds) {
1,031✔
2863
        Socket *s = ASSERT_PTR(SOCKET(u));
1,031✔
2864

2865
        LIST_FOREACH(port, p, s->ports) {
2,152✔
2866
                int fd;
1,121✔
2867

2868
                if (p->type != SOCKET_SOCKET)
1,121✔
2869
                        continue;
65✔
2870

2871
                if (p->fd >= 0)
1,056✔
2872
                        continue;
608✔
2873

2874
                FDSET_FOREACH(fd, fds) {
1,380✔
2875
                        if (socket_address_matches_fd(&p->address, fd)) {
932✔
2876
                                p->fd = fdset_remove(fds, fd);
×
2877
                                s->deserialized_state = SOCKET_LISTENING;
×
2878
                                break;
×
2879
                        }
2880
                }
2881
        }
2882
}
1,031✔
2883

2884
static UnitActiveState socket_active_state(Unit *u) {
334,507✔
2885
        Socket *s = ASSERT_PTR(SOCKET(u));
334,507✔
2886

2887
        return state_translation_table[s->state];
334,507✔
2888
}
2889

2890
static const char *socket_sub_state_to_string(Unit *u) {
3,002✔
2891
        Socket *s = ASSERT_PTR(SOCKET(u));
3,002✔
2892

2893
        return socket_state_to_string(s->state);
3,002✔
2894
}
2895

2896
int socket_port_to_address(const SocketPort *p, char **ret) {
111✔
2897
        _cleanup_free_ char *address = NULL;
111✔
2898
        int r;
111✔
2899

2900
        assert(p);
111✔
2901
        assert(ret);
111✔
2902

2903
        switch (p->type) {
111✔
2904
                case SOCKET_SOCKET: {
105✔
2905
                        r = socket_address_print(&p->address, &address);
105✔
2906
                        if (r < 0)
105✔
2907
                                return r;
2908

2909
                        break;
2910
                }
2911

2912
                case SOCKET_SPECIAL:
6✔
2913
                case SOCKET_MQUEUE:
2914
                case SOCKET_FIFO:
2915
                case SOCKET_USB_FUNCTION:
2916
                        address = strdup(p->path);
6✔
2917
                        if (!address)
6✔
2918
                                return -ENOMEM;
2919
                        break;
2920

2921
                default:
×
2922
                        assert_not_reached();
×
2923
        }
2924

2925
        *ret = TAKE_PTR(address);
111✔
2926

2927
        return 0;
111✔
2928
}
2929

2930
const char* socket_port_type_to_string(SocketPort *p) {
111✔
2931
        assert(p);
111✔
2932

2933
        switch (p->type) {
111✔
2934

2935
        case SOCKET_SOCKET:
105✔
2936

2937
                switch (p->address.type) {
105✔
2938

2939
                case SOCK_STREAM:
2940
                        return "Stream";
2941

2942
                case SOCK_DGRAM:
9✔
2943
                        return "Datagram";
9✔
2944

2945
                case SOCK_SEQPACKET:
6✔
2946
                        return "SequentialPacket";
6✔
2947

2948
                case SOCK_RAW:
9✔
2949
                        if (socket_address_family(&p->address) == AF_NETLINK)
9✔
2950
                                return "Netlink";
2951

2952
                        _fallthrough_;
×
2953
                default:
2954
                        return NULL;
×
2955
                }
2956

2957
        case SOCKET_SPECIAL:
2958
                return "Special";
2959

2960
        case SOCKET_MQUEUE:
×
2961
                return "MessageQueue";
×
2962

2963
        case SOCKET_FIFO:
6✔
2964
                return "FIFO";
6✔
2965

2966
        case SOCKET_USB_FUNCTION:
×
2967
                return "USBFunction";
×
2968

2969
        default:
×
2970
                return NULL;
×
2971
        }
2972
}
2973

2974
SocketType socket_port_type_from_string(const char *s) {
×
2975
        assert(s);
×
2976

2977
        if (STR_IN_SET(s, "Stream", "Datagram", "SequentialPacket", "Netlink"))
×
2978
                return SOCKET_SOCKET;
×
2979
        else if (streq(s, "Special"))
×
2980
                return SOCKET_SPECIAL;
2981
        else if (streq(s, "MessageQueue"))
×
2982
                return SOCKET_MQUEUE;
2983
        else if (streq(s, "FIFO"))
×
2984
                return SOCKET_FIFO;
2985
        else if (streq(s, "USBFunction"))
×
2986
                return SOCKET_USB_FUNCTION;
2987
        else
2988
                return _SOCKET_TYPE_INVALID;
×
2989
}
2990

2991
static bool socket_may_gc(Unit *u) {
11,097✔
2992
        Socket *s = ASSERT_PTR(SOCKET(u));
11,097✔
2993

2994
        return s->n_connections == 0;
11,097✔
2995
}
2996

2997
static int socket_accept_do(Socket *s, int fd) {
2✔
2998
        int cfd;
2✔
2999

3000
        assert(s);
2✔
3001
        assert(fd >= 0);
2✔
3002

3003
        cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK|SOCK_CLOEXEC);
2✔
3004
        if (cfd < 0)
2✔
3005
                /* Convert transient network errors into clean and well-defined EAGAIN */
3006
                return ERRNO_IS_ACCEPT_AGAIN(errno) ? -EAGAIN : -errno;
×
3007

3008
        return cfd;
3009
}
3010

3011
static int socket_accept_in_cgroup(Socket *s, SocketPort *p, int fd) {
2✔
3012
        _cleanup_(pidref_done) PidRef pid = PIDREF_NULL;
×
3013
        _cleanup_close_pair_ int pair[2] = EBADF_PAIR;
2✔
3014
        int cfd, r;
2✔
3015

3016
        assert(s);
2✔
3017
        assert(p);
2✔
3018
        assert(fd >= 0);
2✔
3019

3020
        /* Similar to socket_address_listen_in_cgroup(), but for accept() rather than socket(): make sure that any
3021
         * connection socket is also properly associated with the cgroup. */
3022

3023
        if (!IN_SET(p->address.sockaddr.sa.sa_family, AF_INET, AF_INET6))
2✔
3024
                goto shortcut;
2✔
3025

3026
        r = bpf_firewall_supported();
×
3027
        if (r < 0)
×
3028
                return r;
3029
        if (r == BPF_FIREWALL_UNSUPPORTED)
×
3030
                goto shortcut;
×
3031

3032
        if (socketpair(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC, 0, pair) < 0)
×
3033
                return log_unit_error_errno(UNIT(s), errno, "Failed to create communication channel: %m");
×
3034

3035
        r = unit_fork_helper_process(UNIT(s), "(sd-accept)", /* into_cgroup= */ true, &pid);
×
3036
        if (r < 0)
×
3037
                return log_unit_error_errno(UNIT(s), r, "Failed to fork off accept stub process: %m");
×
3038
        if (r == 0) {
×
3039
                /* Child */
3040

3041
                pair[0] = safe_close(pair[0]);
×
3042

3043
                cfd = socket_accept_do(s, fd);
×
3044
                if (cfd == -EAGAIN) /* spurious accept() */
×
3045
                        _exit(EXIT_SUCCESS);
×
3046
                if (cfd < 0) {
×
3047
                        log_unit_error_errno(UNIT(s), cfd, "Failed to accept connection socket: %m");
×
3048
                        _exit(EXIT_FAILURE);
×
3049
                }
3050

3051
                r = send_one_fd(pair[1], cfd, 0);
×
3052
                if (r < 0) {
×
3053
                        log_unit_error_errno(UNIT(s), r, "Failed to send connection socket to parent: %m");
×
3054
                        _exit(EXIT_FAILURE);
×
3055
                }
3056

3057
                _exit(EXIT_SUCCESS);
×
3058
        }
3059

3060
        pair[1] = safe_close(pair[1]);
×
3061
        cfd = receive_one_fd(pair[0], 0);
×
3062

3063
        /* We synchronously wait for the helper, as it shouldn't be slow */
3064
        r = wait_for_terminate_and_check("(sd-accept)", pid.pid, WAIT_LOG_ABNORMAL);
×
3065
        if (r < 0) {
×
3066
                safe_close(cfd);
×
3067
                return r;
3068
        }
3069

3070
        /* If we received no fd, we got EIO here. If this happens with a process exit code of EXIT_SUCCESS
3071
         * this is a spurious accept(), let's convert that back to EAGAIN here. */
3072
        if (cfd == -EIO)
×
3073
                return -EAGAIN;
3074
        if (cfd < 0)
×
3075
                return log_unit_error_errno(UNIT(s), cfd, "Failed to receive connection socket: %m");
×
3076

3077
        return cfd;
3078

3079
shortcut:
2✔
3080
        cfd = socket_accept_do(s, fd);
2✔
3081
        if (cfd == -EAGAIN) /* spurious accept(), skip it silently */
2✔
3082
                return -EAGAIN;
3083
        if (cfd < 0)
2✔
3084
                return log_unit_error_errno(UNIT(s), cfd, "Failed to accept connection socket: %m");
×
3085

3086
        return cfd;
3087
}
3088

3089
static int socket_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
190✔
3090
        SocketPort *p = ASSERT_PTR(userdata);
190✔
3091
        int cfd = -EBADF;
190✔
3092

3093
        assert(fd >= 0);
190✔
3094

3095
        if (p->socket->state != SOCKET_LISTENING)
190✔
3096
                return 0;
3097

3098
        log_unit_debug(UNIT(p->socket), "Incoming traffic");
380✔
3099

3100
        if (revents != EPOLLIN) {
190✔
3101
                if (revents & EPOLLHUP)
×
3102
                        log_unit_error(UNIT(p->socket), "Got POLLHUP on a listening socket. The service probably invoked shutdown() on it, and should better not do that.");
×
3103
                else
3104
                        log_unit_error(UNIT(p->socket), "Got unexpected poll event (0x%x) on socket.", revents);
×
3105
                goto fail;
×
3106
        }
3107

3108
        if (p->socket->accept &&
190✔
3109
            p->type == SOCKET_SOCKET &&
4✔
3110
            socket_address_can_accept(&p->address)) {
2✔
3111

3112
                cfd = socket_accept_in_cgroup(p->socket, p, fd);
2✔
3113
                if (cfd == -EAGAIN) /* Spurious accept() */
2✔
3114
                        return 0;
3115
                if (cfd < 0)
2✔
3116
                        goto fail;
×
3117

3118
                socket_apply_socket_options(p->socket, p, cfd);
2✔
3119
        }
3120

3121
        socket_enter_running(p->socket, cfd);
190✔
3122
        return 0;
190✔
3123

3124
fail:
×
3125
        socket_enter_stop_pre(p->socket, SOCKET_FAILURE_RESOURCES);
×
3126
        return 0;
×
3127
}
3128

3129
static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
171✔
3130
        Socket *s = ASSERT_PTR(SOCKET(u));
171✔
3131
        SocketResult f;
171✔
3132

3133
        assert(pid >= 0);
171✔
3134

3135
        if (pid != s->control_pid.pid)
171✔
3136
                return;
3137

3138
        pidref_done(&s->control_pid);
171✔
3139

3140
        if (is_clean_exit(code, status, EXIT_CLEAN_COMMAND, NULL))
171✔
3141
                f = SOCKET_SUCCESS;
3142
        else if (code == CLD_EXITED)
×
3143
                f = SOCKET_FAILURE_EXIT_CODE;
3144
        else if (code == CLD_KILLED)
3145
                f = SOCKET_FAILURE_SIGNAL;
3146
        else if (code == CLD_DUMPED)
3147
                f = SOCKET_FAILURE_CORE_DUMP;
3148
        else
3149
                assert_not_reached();
×
3150

3151
        if (s->control_command) {
171✔
3152
                exec_status_exit(&s->control_command->exec_status, &s->exec_context, pid, code, status);
171✔
3153

3154
                if (s->control_command->flags & EXEC_COMMAND_IGNORE_FAILURE)
171✔
3155
                        f = SOCKET_SUCCESS;
171✔
3156
        }
3157

3158
        unit_log_process_exit(
171✔
3159
                        u,
3160
                        "Control process",
3161
                        socket_exec_command_to_string(s->control_command_id),
3162
                        f == SOCKET_SUCCESS,
3163
                        code, status);
3164

3165
        if (s->result == SOCKET_SUCCESS)
171✔
3166
                s->result = f;
171✔
3167

3168
        if (s->control_command &&
171✔
3169
            s->control_command->command_next &&
171✔
3170
            f == SOCKET_SUCCESS) {
3171

3172
                log_unit_debug(u, "Running next command for state %s", socket_state_to_string(s->state));
×
3173
                socket_run_next(s);
×
3174
        } else {
3175
                s->control_command = NULL;
171✔
3176
                s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
171✔
3177

3178
                /* No further commands for this step, so let's figure
3179
                 * out what to do next */
3180

3181
                log_unit_debug(u, "Got final SIGCHLD for state %s", socket_state_to_string(s->state));
342✔
3182

3183
                switch (s->state) {
171✔
3184

3185
                case SOCKET_START_PRE:
×
3186
                        if (f == SOCKET_SUCCESS)
×
3187
                                socket_enter_start_open(s);
×
3188
                        else
3189
                                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, f);
×
3190
                        break;
3191

3192
                case SOCKET_START_CHOWN:
×
3193
                        if (f == SOCKET_SUCCESS)
×
3194
                                socket_enter_start_post(s);
×
3195
                        else
3196
                                socket_enter_stop_pre(s, f);
×
3197
                        break;
3198

3199
                case SOCKET_START_POST:
171✔
3200
                        if (f == SOCKET_SUCCESS)
171✔
3201
                                socket_enter_listening(s);
171✔
3202
                        else
3203
                                socket_enter_stop_pre(s, f);
×
3204
                        break;
3205

3206
                case SOCKET_STOP_PRE:
×
3207
                case SOCKET_STOP_PRE_SIGTERM:
3208
                case SOCKET_STOP_PRE_SIGKILL:
3209
                        socket_enter_stop_post(s, f);
×
3210
                        break;
×
3211

3212
                case SOCKET_STOP_POST:
×
3213
                case SOCKET_FINAL_SIGTERM:
3214
                case SOCKET_FINAL_SIGKILL:
3215
                        socket_enter_dead(s, f);
×
3216
                        break;
×
3217

3218
                case SOCKET_CLEANING:
×
3219

3220
                        if (s->clean_result == SOCKET_SUCCESS)
×
3221
                                s->clean_result = f;
×
3222

3223
                        socket_enter_dead(s, SOCKET_SUCCESS);
×
3224
                        break;
×
3225

3226
                default:
×
3227
                        assert_not_reached();
×
3228
                }
3229
        }
3230

3231
        /* Notify clients about changed exit status */
3232
        unit_add_to_dbus_queue(u);
171✔
3233
}
3234

3235
static int socket_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata) {
×
3236
        Socket *s = ASSERT_PTR(SOCKET(userdata));
×
3237

3238
        assert(s->timer_event_source == source);
×
3239

3240
        switch (s->state) {
×
3241

3242
        case SOCKET_START_PRE:
3243
                log_unit_warning(UNIT(s), "Starting timed out. Terminating.");
×
3244
                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_TIMEOUT);
×
3245
                break;
×
3246

3247
        case SOCKET_START_CHOWN:
3248
        case SOCKET_START_POST:
3249
                log_unit_warning(UNIT(s), "Starting timed out. Stopping.");
×
3250
                socket_enter_stop_pre(s, SOCKET_FAILURE_TIMEOUT);
×
3251
                break;
×
3252

3253
        case SOCKET_STOP_PRE:
3254
                log_unit_warning(UNIT(s), "Stopping timed out. Terminating.");
×
3255
                socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, SOCKET_FAILURE_TIMEOUT);
×
3256
                break;
×
3257

3258
        case SOCKET_STOP_PRE_SIGTERM:
×
3259
                if (s->kill_context.send_sigkill) {
×
3260
                        log_unit_warning(UNIT(s), "Stopping timed out. Killing.");
×
3261
                        socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, SOCKET_FAILURE_TIMEOUT);
×
3262
                } else {
3263
                        log_unit_warning(UNIT(s), "Stopping timed out. Skipping SIGKILL. Ignoring.");
×
3264
                        socket_enter_stop_post(s, SOCKET_FAILURE_TIMEOUT);
×
3265
                }
3266
                break;
3267

3268
        case SOCKET_STOP_PRE_SIGKILL:
3269
                log_unit_warning(UNIT(s), "Processes still around after SIGKILL. Ignoring.");
×
3270
                socket_enter_stop_post(s, SOCKET_FAILURE_TIMEOUT);
×
3271
                break;
×
3272

3273
        case SOCKET_STOP_POST:
3274
                log_unit_warning(UNIT(s), "Stopping timed out (2). Terminating.");
×
3275
                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_TIMEOUT);
×
3276
                break;
×
3277

3278
        case SOCKET_FINAL_SIGTERM:
×
3279
                if (s->kill_context.send_sigkill) {
×
3280
                        log_unit_warning(UNIT(s), "Stopping timed out (2). Killing.");
×
3281
                        socket_enter_signal(s, SOCKET_FINAL_SIGKILL, SOCKET_FAILURE_TIMEOUT);
×
3282
                } else {
3283
                        log_unit_warning(UNIT(s), "Stopping timed out (2). Skipping SIGKILL. Ignoring.");
×
3284
                        socket_enter_dead(s, SOCKET_FAILURE_TIMEOUT);
×
3285
                }
3286
                break;
3287

3288
        case SOCKET_FINAL_SIGKILL:
3289
                log_unit_warning(UNIT(s), "Still around after SIGKILL (2). Entering failed mode.");
×
3290
                socket_enter_dead(s, SOCKET_FAILURE_TIMEOUT);
×
3291
                break;
×
3292

3293
        case SOCKET_CLEANING:
3294
                log_unit_warning(UNIT(s), "Cleaning timed out. killing.");
×
3295

3296
                if (s->clean_result == SOCKET_SUCCESS)
×
3297
                        s->clean_result = SOCKET_FAILURE_TIMEOUT;
×
3298

3299
                socket_enter_signal(s, SOCKET_FINAL_SIGKILL, 0);
×
3300
                break;
×
3301

3302
        default:
×
3303
                assert_not_reached();
×
3304
        }
3305

3306
        return 0;
×
3307
}
3308

3309
int socket_collect_fds(Socket *s, int **ret) {
458✔
3310
        size_t n = 0, k = 0;
458✔
3311

3312
        assert(s);
458✔
3313
        assert(ret);
458✔
3314

3315
        /* Called from the service code for requesting our fds */
3316

3317
        LIST_FOREACH(port, p, s->ports) {
950✔
3318
                if (p->fd >= 0)
492✔
3319
                        n++;
473✔
3320
                n += p->n_auxiliary_fds;
492✔
3321
        }
3322

3323
        if (n == 0) {
458✔
3324
                *ret = NULL;
19✔
3325
                return 0;
19✔
3326
        }
3327

3328
        int *fds = new(int, n);
439✔
3329
        if (!fds)
439✔
3330
                return -ENOMEM;
3331

3332
        LIST_FOREACH(port, p, s->ports) {
912✔
3333
                if (p->fd >= 0)
473✔
3334
                        fds[k++] = p->fd;
473✔
3335
                FOREACH_ARRAY(i, p->auxiliary_fds, p->n_auxiliary_fds)
473✔
3336
                        fds[k++] = *i;
×
3337
        }
3338

3339
        assert(k == n);
439✔
3340

3341
        *ret = fds;
439✔
3342
        return (int) n;
439✔
3343
}
3344

3345
static void socket_reset_failed(Unit *u) {
×
3346
        Socket *s = SOCKET(u);
×
3347

3348
        assert(s);
×
3349

3350
        if (s->state == SOCKET_FAILED)
×
3351
                socket_set_state(s, SOCKET_DEAD);
×
3352

3353
        s->result = SOCKET_SUCCESS;
×
3354
        s->clean_result = SOCKET_SUCCESS;
×
3355
}
×
3356

3357
void socket_connection_unref(Socket *s) {
2✔
3358
        assert(s);
2✔
3359

3360
        /* The service is dead. Yay!
3361
         *
3362
         * This is strictly for one-instance-per-connection
3363
         * services. */
3364

3365
        assert(s->n_connections > 0);
2✔
3366
        s->n_connections--;
2✔
3367

3368
        log_unit_debug(UNIT(s), "One connection closed, %u left.", s->n_connections);
4✔
3369
}
2✔
3370

3371
static void socket_trigger_notify(Unit *u, Unit *other) {
2,725✔
3372
        Socket *s = ASSERT_PTR(SOCKET(u));
2,725✔
3373

3374
        assert(other);
2,725✔
3375

3376
        /* Filter out invocations with bogus state */
3377
        assert(UNIT_IS_LOAD_COMPLETE(other->load_state));
2,725✔
3378

3379
        Service *service = ASSERT_PTR(SERVICE(other));
2,725✔
3380

3381
        /* Don't propagate state changes from the service if we are already down */
3382
        if (!IN_SET(s->state, SOCKET_RUNNING, SOCKET_LISTENING))
2,725✔
3383
                return;
3384

3385
        /* We don't care for the service state if we are in Accept=yes mode */
3386
        if (s->accept)
2,375✔
3387
                return;
3388

3389
        /* Propagate start limit hit state */
3390
        if (other->start_limit_hit) {
2,367✔
3391
                socket_enter_stop_pre(s, SOCKET_FAILURE_SERVICE_START_LIMIT_HIT);
×
3392
                return;
×
3393
        }
3394

3395
        /* Don't propagate anything if there's still a job queued */
3396
        if (other->job)
2,367✔
3397
                return;
3398

3399
        if (!SOCKET_SERVICE_IS_ACTIVE(service, /* allow_finalize = */ true))
1,801✔
3400
                socket_enter_listening(s);
586✔
3401

3402
        if (SERVICE(other)->state == SERVICE_RUNNING)
1,801✔
3403
                socket_set_state(s, SOCKET_RUNNING);
1,110✔
3404
}
3405

3406
static void socket_handoff_timestamp(
342✔
3407
                Unit *u,
3408
                const struct ucred *ucred,
3409
                const dual_timestamp *ts) {
3410

3411
        Socket *s = ASSERT_PTR(SOCKET(u));
342✔
3412

3413
        assert(ucred);
342✔
3414
        assert(ts);
342✔
3415

3416
        if (s->control_pid.pid == ucred->pid && s->control_command) {
342✔
3417
                exec_status_handoff(&s->control_command->exec_status, ucred, ts);
342✔
3418
                unit_add_to_dbus_queue(u);
342✔
3419
        }
3420
}
342✔
3421

3422
static int socket_get_timeout(Unit *u, usec_t *timeout) {
×
3423
        Socket *s = ASSERT_PTR(SOCKET(u));
×
3424
        usec_t t;
×
3425
        int r;
×
3426

3427
        if (!s->timer_event_source)
×
3428
                return 0;
×
3429

3430
        r = sd_event_source_get_time(s->timer_event_source, &t);
×
3431
        if (r < 0)
×
3432
                return r;
3433
        if (t == USEC_INFINITY)
×
3434
                return 0;
3435

3436
        *timeout = t;
×
3437
        return 1;
×
3438
}
3439

3440
const char* socket_fdname(Socket *s) {
543✔
3441
        assert(s);
543✔
3442

3443
        /* Returns the name to use for $LISTEN_FDNAMES. If the user didn't specify anything specifically,
3444
         * use the socket unit's name as fallback for Accept=no sockets, "connection" otherwise. */
3445

3446
        if (s->fdname)
543✔
3447
                return s->fdname;
3448

3449
        if (s->accept)
480✔
3450
                return "connection";
3451

3452
        return UNIT(s)->id;
469✔
3453
}
3454

3455
static PidRef* socket_control_pid(Unit *u) {
7,488✔
3456
        return &ASSERT_PTR(SOCKET(u))->control_pid;
14,976✔
3457
}
3458

3459
static int socket_clean(Unit *u, ExecCleanMask mask) {
×
3460
        Socket *s = ASSERT_PTR(SOCKET(u));
×
3461
        _cleanup_strv_free_ char **l = NULL;
×
3462
        int r;
×
3463

3464
        assert(mask != 0);
×
3465

3466
        if (s->state != SOCKET_DEAD)
×
3467
                return -EBUSY;
3468

3469
        r = exec_context_get_clean_directories(&s->exec_context, u->manager->prefix, mask, &l);
×
3470
        if (r < 0)
×
3471
                return r;
3472

3473
        if (strv_isempty(l))
×
3474
                return -EUNATCH;
3475

3476
        socket_unwatch_control_pid(s);
×
3477
        s->clean_result = SOCKET_SUCCESS;
×
3478
        s->control_command = NULL;
×
3479
        s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
×
3480

3481
        r = socket_arm_timer(s, /* relative= */ true, s->exec_context.timeout_clean_usec);
×
3482
        if (r < 0) {
×
3483
                log_unit_warning_errno(u, r, "Failed to install timer: %m");
×
3484
                goto fail;
×
3485
        }
3486

3487
        r = unit_fork_and_watch_rm_rf(u, l, &s->control_pid);
×
3488
        if (r < 0) {
×
3489
                log_unit_warning_errno(u, r, "Failed to spawn cleaning task: %m");
×
3490
                goto fail;
×
3491
        }
3492

3493
        socket_set_state(s, SOCKET_CLEANING);
×
3494
        return 0;
3495

3496
fail:
×
3497
        s->clean_result = SOCKET_FAILURE_RESOURCES;
×
3498
        s->timer_event_source = sd_event_source_disable_unref(s->timer_event_source);
×
3499
        return r;
×
3500
}
3501

3502
static int socket_can_clean(Unit *u, ExecCleanMask *ret) {
102✔
3503
        Socket *s = ASSERT_PTR(SOCKET(u));
102✔
3504

3505
        return exec_context_get_clean_mask(&s->exec_context, ret);
102✔
3506
}
3507

3508
static int socket_can_start(Unit *u) {
2,249✔
3509
        Socket *s = ASSERT_PTR(SOCKET(u));
2,249✔
3510
        int r;
2,249✔
3511

3512
        r = unit_test_start_limit(u);
2,249✔
3513
        if (r < 0) {
2,249✔
3514
                socket_enter_dead(s, SOCKET_FAILURE_START_LIMIT_HIT);
×
3515
                return r;
×
3516
        }
3517

3518
        return 1;
3519
}
3520

3521
static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
3522
        [SOCKET_EXEC_START_PRE]   = "ExecStartPre",
3523
        [SOCKET_EXEC_START_CHOWN] = "ExecStartChown",
3524
        [SOCKET_EXEC_START_POST]  = "ExecStartPost",
3525
        [SOCKET_EXEC_STOP_PRE]    = "ExecStopPre",
3526
        [SOCKET_EXEC_STOP_POST]   = "ExecStopPost",
3527
};
3528

3529
DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
227✔
3530

3531
static const char* const socket_result_table[_SOCKET_RESULT_MAX] = {
3532
        [SOCKET_SUCCESS]                         = "success",
3533
        [SOCKET_FAILURE_RESOURCES]               = "resources",
3534
        [SOCKET_FAILURE_TIMEOUT]                 = "timeout",
3535
        [SOCKET_FAILURE_EXIT_CODE]               = "exit-code",
3536
        [SOCKET_FAILURE_SIGNAL]                  = "signal",
3537
        [SOCKET_FAILURE_CORE_DUMP]               = "core-dump",
3538
        [SOCKET_FAILURE_START_LIMIT_HIT]         = "start-limit-hit",
3539
        [SOCKET_FAILURE_TRIGGER_LIMIT_HIT]       = "trigger-limit-hit",
3540
        [SOCKET_FAILURE_SERVICE_START_LIMIT_HIT] = "service-start-limit-hit",
3541
};
3542

3543
DEFINE_STRING_TABLE_LOOKUP(socket_result, SocketResult);
6,665✔
3544

3545
static const char* const socket_timestamping_table[_SOCKET_TIMESTAMPING_MAX] = {
3546
        [SOCKET_TIMESTAMPING_OFF] = "off",
3547
        [SOCKET_TIMESTAMPING_US]  = "us",
3548
        [SOCKET_TIMESTAMPING_NS]  = "ns",
3549
};
3550

3551
DEFINE_STRING_TABLE_LOOKUP(socket_timestamping, SocketTimestamping);
316✔
3552

3553
SocketTimestamping socket_timestamping_from_string_harder(const char *p) {
214✔
3554
        SocketTimestamping t;
214✔
3555
        int r;
214✔
3556

3557
        if (!p)
214✔
3558
                return _SOCKET_TIMESTAMPING_INVALID;
3559

3560
        t = socket_timestamping_from_string(p);
214✔
3561
        if (t >= 0)
214✔
3562
                return t;
3563

3564
        /* Let's alternatively support the various other aliases parse_time() accepts for ns and µs here,
3565
         * too. */
3566
        if (streq(p, "nsec"))
×
3567
                return SOCKET_TIMESTAMPING_NS;
3568
        if (STR_IN_SET(p, "usec", "µs", "μs")) /* Accept both small greek letter mu + micro sign unicode codepoints */
×
3569
                return SOCKET_TIMESTAMPING_US;
×
3570

3571
        r = parse_boolean(p);
×
3572
        if (r < 0)
×
3573
                return _SOCKET_TIMESTAMPING_INVALID;
3574

3575
        return r ? SOCKET_TIMESTAMPING_NS : SOCKET_TIMESTAMPING_OFF; /* If boolean yes, default to ns accuracy */
×
3576
}
3577

3578
const UnitVTable socket_vtable = {
3579
        .object_size = sizeof(Socket),
3580
        .exec_context_offset = offsetof(Socket, exec_context),
3581
        .cgroup_context_offset = offsetof(Socket, cgroup_context),
3582
        .kill_context_offset = offsetof(Socket, kill_context),
3583
        .exec_runtime_offset = offsetof(Socket, exec_runtime),
3584
        .cgroup_runtime_offset = offsetof(Socket, cgroup_runtime),
3585

3586
        .sections =
3587
                "Unit\0"
3588
                "Socket\0"
3589
                "Install\0",
3590
        .private_section = "Socket",
3591

3592
        .can_transient = true,
3593
        .can_trigger = true,
3594
        .can_fail = true,
3595

3596
        .init = socket_init,
3597
        .done = socket_done,
3598
        .load = socket_load,
3599

3600
        .coldplug = socket_coldplug,
3601

3602
        .dump = socket_dump,
3603

3604
        .start = socket_start,
3605
        .stop = socket_stop,
3606

3607
        .clean = socket_clean,
3608
        .can_clean = socket_can_clean,
3609

3610
        .get_timeout = socket_get_timeout,
3611

3612
        .serialize = socket_serialize,
3613
        .deserialize_item = socket_deserialize_item,
3614
        .distribute_fds = socket_distribute_fds,
3615

3616
        .active_state = socket_active_state,
3617
        .sub_state_to_string = socket_sub_state_to_string,
3618

3619
        .will_restart = unit_will_restart_default,
3620

3621
        .may_gc = socket_may_gc,
3622

3623
        .sigchld_event = socket_sigchld_event,
3624

3625
        .trigger_notify = socket_trigger_notify,
3626

3627
        .reset_failed = socket_reset_failed,
3628

3629
        .notify_handoff_timestamp = socket_handoff_timestamp,
3630

3631
        .control_pid = socket_control_pid,
3632

3633
        .bus_set_property = bus_socket_set_property,
3634
        .bus_commit_properties = bus_socket_commit_properties,
3635

3636
        .status_message_formats = {
3637
                .finished_start_job = {
3638
                        [JOB_DONE]       = "Listening on %s.",
3639
                        [JOB_FAILED]     = "Failed to listen on %s.",
3640
                        [JOB_TIMEOUT]    = "Timed out starting %s.",
3641
                },
3642
                .finished_stop_job = {
3643
                        [JOB_DONE]       = "Closed %s.",
3644
                        [JOB_FAILED]     = "Failed stopping %s.",
3645
                        [JOB_TIMEOUT]    = "Timed out stopping %s.",
3646
                },
3647
        },
3648

3649
        .can_start = socket_can_start,
3650
};
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc