• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

systemd / systemd / 18988181302

31 Oct 2025 09:30PM UTC coverage: 72.241% (+0.2%) from 72.046%
18988181302

push

github

web-flow
core: Add RootDirectoryFileDescriptor= (#39480)

RootDirectory= but via a open_tree() file descriptor. This allows
setting up the execution environment for a service by the client in a
mount namespace and then starting a transient unit in that execution
environment using the new property.

We also add --root-directory= and --same-root-dir= to systemd-run to
have it run services within the given root directory. As systemd-run
might be invoked from a different mount namespace than what systemd is
running in, systemd-run opens the given path with open_tree() and then
sends it to systemd using the new RootDirectoryFileDescriptor= property.

45 of 76 new or added lines in 8 files covered. (59.21%)

2101 existing lines in 44 files now uncovered.

305020 of 422226 relevant lines covered (72.24%)

1081585.12 hits per line

Source File
Press 'n' to go to next uncovered line, 'b' for previous

56.22
/src/core/socket.c
1
/* SPDX-License-Identifier: LGPL-2.1-or-later */
2

3
#include <arpa/inet.h>
4
#include <fcntl.h>
5
#include <linux/sctp.h>
6
#include <mqueue.h>
7
#include <netinet/tcp.h>
8
#include <sys/stat.h>
9
#include <unistd.h>
10

11
#include "sd-bus.h"
12

13
#include "alloc-util.h"
14
#include "bpf-program.h"
15
#include "bus-common-errors.h"
16
#include "bus-error.h"
17
#include "copy.h"
18
#include "dbus-socket.h"
19
#include "dbus-unit.h"
20
#include "errno-list.h"
21
#include "errno-util.h"
22
#include "exit-status.h"
23
#include "extract-word.h"
24
#include "fd-util.h"
25
#include "fdset.h"
26
#include "format-util.h"
27
#include "fs-util.h"
28
#include "glyph-util.h"
29
#include "in-addr-util.h"
30
#include "io-util.h"
31
#include "ip-protocol-list.h"
32
#include "log.h"
33
#include "manager.h"
34
#include "mkdir-label.h"
35
#include "namespace-util.h"
36
#include "parse-util.h"
37
#include "path-util.h"
38
#include "pidfd-util.h"
39
#include "process-util.h"
40
#include "recurse-dir.h"
41
#include "selinux-util.h"
42
#include "serialize.h"
43
#include "service.h"
44
#include "set.h"
45
#include "siphash24.h"
46
#include "smack-util.h"
47
#include "socket.h"
48
#include "socket-netlink.h"
49
#include "special.h"
50
#include "string-table.h"
51
#include "string-util.h"
52
#include "strv.h"
53
#include "unit.h"
54
#include "unit-name.h"
55
#include "user-util.h"
56

57
typedef struct SocketPeer {
58
        unsigned n_ref;
59

60
        Socket *socket;
61
        union sockaddr_union peer;
62
        socklen_t peer_salen;
63
        struct ucred peer_cred;
64
} SocketPeer;
65

66
static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
67
        [SOCKET_DEAD]             = UNIT_INACTIVE,
68
        [SOCKET_START_PRE]        = UNIT_ACTIVATING,
69
        [SOCKET_START_OPEN]       = UNIT_ACTIVATING,
70
        [SOCKET_START_CHOWN]      = UNIT_ACTIVATING,
71
        [SOCKET_START_POST]       = UNIT_ACTIVATING,
72
        [SOCKET_LISTENING]        = UNIT_ACTIVE,
73
        [SOCKET_DEFERRED]         = UNIT_ACTIVE,
74
        [SOCKET_RUNNING]          = UNIT_ACTIVE,
75
        [SOCKET_STOP_PRE]         = UNIT_DEACTIVATING,
76
        [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
77
        [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
78
        [SOCKET_STOP_POST]        = UNIT_DEACTIVATING,
79
        [SOCKET_FINAL_SIGTERM]    = UNIT_DEACTIVATING,
80
        [SOCKET_FINAL_SIGKILL]    = UNIT_DEACTIVATING,
81
        [SOCKET_FAILED]           = UNIT_FAILED,
82
        [SOCKET_CLEANING]         = UNIT_MAINTENANCE,
83
};
84

85
static int socket_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata);
86
static int socket_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata);
87

88
static bool SOCKET_STATE_WITH_PROCESS(SocketState state) {
12,668✔
89
        return IN_SET(state,
12,668✔
90
                      SOCKET_START_PRE,
91
                      SOCKET_START_CHOWN,
92
                      SOCKET_START_POST,
93
                      SOCKET_STOP_PRE,
94
                      SOCKET_STOP_PRE_SIGTERM,
95
                      SOCKET_STOP_PRE_SIGKILL,
96
                      SOCKET_STOP_POST,
97
                      SOCKET_FINAL_SIGTERM,
98
                      SOCKET_FINAL_SIGKILL,
99
                      SOCKET_CLEANING);
100
}
101

102
static bool SOCKET_SERVICE_IS_ACTIVE(Service *s, bool allow_finalize) {
4,883✔
103
        assert(s);
4,883✔
104

105
        /* If unit_active_state() reports inactive/failed then it's all good, otherwise we need to
106
         * manually exclude SERVICE_AUTO_RESTART and SERVICE_AUTO_RESTART_QUEUED, in which cases
107
         * the start job hasn't been enqueued/run, but are only placeholders in order to allow
108
         * canceling auto restart. */
109

110
        if (UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(UNIT(s))))
4,883✔
111
                return false;
112

113
        if (IN_SET(s->state, SERVICE_AUTO_RESTART, SERVICE_AUTO_RESTART_QUEUED))
1,509✔
114
                return false;
115

116
        if (allow_finalize && IN_SET(s->state, SERVICE_FINAL_SIGTERM, SERVICE_FINAL_SIGKILL, SERVICE_CLEANING))
1,500✔
117
                return false;
×
118

119
        return true;
120
}
121

122
static void socket_init(Unit *u) {
6,212✔
123
        Socket *s = ASSERT_PTR(SOCKET(u));
6,212✔
124

125
        assert(u->load_state == UNIT_STUB);
6,212✔
126

127
        s->backlog = SOMAXCONN_DELUXE;
6,212✔
128
        s->timeout_usec = u->manager->defaults.timeout_start_usec;
6,212✔
129
        s->directory_mode = 0755;
6,212✔
130
        s->socket_mode = 0666;
6,212✔
131

132
        s->max_connections = 64;
6,212✔
133

134
        s->pass_rights = true; /* defaults to enabled in kernel */
6,212✔
135
        s->priority = -1;
6,212✔
136
        s->ip_tos = -1;
6,212✔
137
        s->ip_ttl = -1;
6,212✔
138
        s->mark = -1;
6,212✔
139

140
        s->exec_context.std_output = u->manager->defaults.std_output;
6,212✔
141
        s->exec_context.std_error = u->manager->defaults.std_error;
6,212✔
142

143
        s->control_pid = PIDREF_NULL;
6,212✔
144
        s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
6,212✔
145

146
        s->trigger_limit = RATELIMIT_OFF;
6,212✔
147

148
        s->poll_limit = RATELIMIT_OFF;
6,212✔
149

150
        s->defer_trigger_max_usec = USEC_INFINITY;
6,212✔
151
}
6,212✔
152

153
static void socket_unwatch_control_pid(Socket *s) {
30,413✔
154
        assert(s);
30,413✔
155
        unit_unwatch_pidref_done(UNIT(s), &s->control_pid);
30,413✔
156
}
30,413✔
157

158
static void socket_port_close_auxiliary_fds(SocketPort *p) {
9,641✔
159
        assert(p);
9,641✔
160

161
        close_many(p->auxiliary_fds, p->n_auxiliary_fds);
9,641✔
162
        p->auxiliary_fds = mfree(p->auxiliary_fds);
9,641✔
163
        p->n_auxiliary_fds = 0;
9,641✔
164
}
9,641✔
165

166
SocketPort* socket_port_free(SocketPort *p) {
6,712✔
167
        if (!p)
6,712✔
168
                return NULL;
169

170
        sd_event_source_unref(p->event_source);
6,712✔
171

172
        socket_port_close_auxiliary_fds(p);
6,712✔
173
        safe_close(p->fd);
6,712✔
174
        free(p->path);
6,712✔
175

176
        return mfree(p);
6,712✔
177
}
178

179
void socket_free_ports(Socket *s) {
6,212✔
180
        assert(s);
6,212✔
181

182
        LIST_CLEAR(port, s->ports, socket_port_free);
12,924✔
183
}
6,212✔
184

185
static void socket_done(Unit *u) {
6,212✔
186
        Socket *s = ASSERT_PTR(SOCKET(u));
6,212✔
187
        SocketPeer *p;
6,212✔
188

189
        socket_free_ports(s);
6,212✔
190

191
        while ((p = set_steal_first(s->peers_by_address)))
6,212✔
192
                p->socket = NULL;
×
193

194
        s->peers_by_address = set_free(s->peers_by_address);
6,212✔
195

196
        s->exec_runtime = exec_runtime_free(s->exec_runtime);
6,212✔
197

198
        exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
6,212✔
199
        s->control_command = NULL;
6,212✔
200

201
        socket_unwatch_control_pid(s);
6,212✔
202

203
        unit_ref_unset(&s->service);
6,212✔
204

205
        s->tcp_congestion = mfree(s->tcp_congestion);
6,212✔
206
        s->bind_to_device = mfree(s->bind_to_device);
6,212✔
207

208
        s->smack = mfree(s->smack);
6,212✔
209
        s->smack_ip_in = mfree(s->smack_ip_in);
6,212✔
210
        s->smack_ip_out = mfree(s->smack_ip_out);
6,212✔
211

212
        strv_free(s->symlinks);
6,212✔
213

214
        s->user = mfree(s->user);
6,212✔
215
        s->group = mfree(s->group);
6,212✔
216

217
        s->fdname = mfree(s->fdname);
6,212✔
218

219
        s->timer_event_source = sd_event_source_disable_unref(s->timer_event_source);
6,212✔
220
}
6,212✔
221

222
static int socket_arm_timer(Socket *s, bool relative, usec_t usec) {
196✔
223
        assert(s);
196✔
224

225
        return unit_arm_timer(UNIT(s), &s->timer_event_source, relative, usec, socket_dispatch_timer);
196✔
226
}
227

228
static bool have_non_accept_socket(Socket *s) {
7,559✔
229
        assert(s);
7,559✔
230

231
        if (!s->accept)
7,559✔
232
                return true;
233

234
        LIST_FOREACH(port, p, s->ports) {
5,400✔
235

236
                if (p->type != SOCKET_SOCKET)
2,700✔
237
                        return true;
238

239
                if (!socket_address_can_accept(&p->address))
2,700✔
240
                        return true;
241
        }
242

243
        return false;
244
}
245

246
static int socket_add_mount_dependencies(Socket *s) {
6,209✔
247
        int r;
6,209✔
248

249
        assert(s);
6,209✔
250

251
        LIST_FOREACH(port, p, s->ports) {
12,921✔
252
                const char *path = NULL;
6,712✔
253

254
                if (p->type == SOCKET_SOCKET)
6,712✔
255
                        path = socket_address_get_path(&p->address);
6,487✔
256
                else if (IN_SET(p->type, SOCKET_FIFO, SOCKET_SPECIAL, SOCKET_USB_FUNCTION))
225✔
257
                        path = p->path;
225✔
258

259
                if (!path)
6,712✔
260
                        continue;
330✔
261

262
                r = unit_add_mounts_for(UNIT(s), path, UNIT_DEPENDENCY_FILE, UNIT_MOUNT_REQUIRES);
6,382✔
263
                if (r < 0)
6,382✔
264
                        return r;
265
        }
266

267
        return 0;
268
}
269

270
static int socket_add_device_dependencies(Socket *s) {
6,209✔
271
        char *t;
6,209✔
272

273
        assert(s);
6,209✔
274

275
        if (!s->bind_to_device || streq(s->bind_to_device, "lo"))
6,209✔
276
                return 0;
277

278
        t = strjoina("/sys/subsystem/net/devices/", s->bind_to_device);
×
279
        return unit_add_node_dependency(UNIT(s), t, UNIT_BINDS_TO, UNIT_DEPENDENCY_FILE);
×
280
}
281

282
static int socket_add_default_dependencies(Socket *s) {
6,209✔
283
        int r;
6,209✔
284

285
        assert(s);
6,209✔
286

287
        if (!UNIT(s)->default_dependencies)
6,209✔
288
                return 0;
289

290
        r = unit_add_dependency_by_name(UNIT(s), UNIT_BEFORE, SPECIAL_SOCKETS_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
3,207✔
291
        if (r < 0)
3,207✔
292
                return r;
293

294
        if (MANAGER_IS_SYSTEM(UNIT(s)->manager)) {
3,207✔
295
                r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
1,084✔
296
                if (r < 0)
1,084✔
297
                        return r;
298
        }
299

300
        return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
3,207✔
301
}
302

303
static bool socket_has_exec(Socket *s) {
6,209✔
304
        assert(s);
6,209✔
305

306
        FOREACH_ARRAY(i, s->exec_command, _SOCKET_EXEC_COMMAND_MAX)
36,612✔
307
                if (*i)
30,617✔
308
                        return true;
309

310
        return false;
311
}
312

313
static int socket_add_extras(Socket *s) {
6,209✔
314
        Unit *u = UNIT(ASSERT_PTR(s));
6,209✔
315
        int r;
6,209✔
316

317
        /* Pick defaults for the trigger limit, if nothing was explicitly configured. We pick a relatively high limit
318
         * in Accept=yes mode, and a lower limit for Accept=no. Reason: in Accept=yes mode we are invoking accept()
319
         * ourselves before the trigger limit can hit, thus incoming connections are taken off the socket queue quickly
320
         * and reliably. This is different for Accept=no, where the spawned service has to take the incoming traffic
321
         * off the queues, which it might not necessarily do. Moreover, while Accept=no services are supposed to
322
         * process whatever is queued in one go, and thus should normally never have to be started frequently. This is
323
         * different for Accept=yes where each connection is processed by a new service instance, and thus frequent
324
         * service starts are typical.
325
         *
326
         * For the poll limit we follow a similar rule, but use 3/4th of the trigger limit parameters, to
327
         * trigger this earlier. */
328

329
        if (s->trigger_limit.interval == USEC_INFINITY)
6,209✔
330
                s->trigger_limit.interval = 2 * USEC_PER_SEC;
6,209✔
331
        if (s->trigger_limit.burst == UINT_MAX)
6,209✔
332
                s->trigger_limit.burst = s->accept ? 200 : 20;
11,068✔
333

334
        if (s->poll_limit.interval == USEC_INFINITY)
6,209✔
335
                s->poll_limit.interval = 2 * USEC_PER_SEC;
6,083✔
336
        if (s->poll_limit.burst == UINT_MAX)
6,209✔
337
                s->poll_limit.burst = s->accept ? 150 : 15;
10,942✔
338

339
        if (have_non_accept_socket(s)) {
6,209✔
340

341
                if (!UNIT_ISSET(s->service)) {
4,859✔
342
                        Unit *x;
2,982✔
343

344
                        r = unit_load_related_unit(u, ".service", &x);
2,982✔
345
                        if (r < 0)
2,982✔
346
                                return r;
×
347

348
                        unit_ref_set(&s->service, u, x);
2,982✔
349
                }
350

351
                r = unit_add_two_dependencies(u, UNIT_BEFORE, UNIT_TRIGGERS, UNIT_DEREF(s->service), true, UNIT_DEPENDENCY_IMPLICIT);
4,859✔
352
                if (r < 0)
4,859✔
353
                        return r;
354
        }
355

356
        r = socket_add_mount_dependencies(s);
6,209✔
357
        if (r < 0)
6,209✔
358
                return r;
359

360
        r = socket_add_device_dependencies(s);
6,209✔
361
        if (r < 0)
6,209✔
362
                return r;
363

364
        r = unit_patch_contexts(u);
6,209✔
365
        if (r < 0)
6,209✔
366
                return r;
367

368
        if (socket_has_exec(s)) {
6,209✔
369
                r = unit_add_exec_dependencies(u, &s->exec_context);
214✔
370
                if (r < 0)
214✔
371
                        return r;
372
        }
373

374
        r = unit_set_default_slice(u);
6,209✔
375
        if (r < 0)
6,209✔
376
                return r;
377

378
        r = socket_add_default_dependencies(s);
6,209✔
379
        if (r < 0)
6,209✔
380
                return r;
×
381

382
        return 0;
383
}
384

385
static const char* socket_find_symlink_target(Socket *s) {
3,725✔
386
        const char *found = NULL;
3,725✔
387

388
        assert(s);
3,725✔
389

390
        LIST_FOREACH(port, p, s->ports) {
7,450✔
391
                const char *f;
4,301✔
392

393
                switch (p->type) {
4,301✔
394

395
                case SOCKET_FIFO:
140✔
396
                        f = p->path;
140✔
397
                        break;
140✔
398

399
                case SOCKET_SOCKET:
4,161✔
400
                        f = socket_address_get_path(&p->address);
4,161✔
401
                        break;
4,161✔
402

403
                default:
404
                        f = NULL;
405
                }
406

407
                if (f) {
4,301✔
408
                        if (found)
4,232✔
409
                                return NULL;
410

411
                        found = f;
412
                }
413
        }
414

415
        return found;
416
}
417

418
static int socket_verify(Socket *s) {
6,209✔
419
        assert(s);
6,209✔
420
        assert(UNIT(s)->load_state == UNIT_LOADED);
6,209✔
421

422
        if (!s->ports)
6,209✔
423
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Unit has no Listen setting (ListenStream=, ListenDatagram=, ListenFIFO=, ...). Refusing.");
×
424

425
        if (s->max_connections <= 0)
6,209✔
426
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "MaxConnection= setting too small. Refusing.");
×
427

428
        if (s->accept && have_non_accept_socket(s))
6,209✔
429
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Unit configured for accepting sockets, but sockets are non-accepting. Refusing.");
×
430

431
        if (s->accept && UNIT_ISSET(s->service))
6,209✔
432
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Explicit service configuration for accepting socket units not supported. Refusing.");
×
433

434
        if (s->accept && s->defer_trigger != SOCKET_DEFER_NO)
6,209✔
435
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Socket unit is configured to be accepting with DeferTrigger= enabled. Refusing.");
×
436

437
        if (!strv_isempty(s->symlinks) && !socket_find_symlink_target(s))
6,494✔
438
                return log_unit_error_errno(UNIT(s), SYNTHETIC_ERRNO(ENOEXEC), "Unit has symlinks set but none or more than one node in the file system. Refusing.");
×
439

440
        return 0;
441
}
442

443
static void peer_address_hash_func(const SocketPeer *s, struct siphash *state) {
3✔
444
        assert(s);
3✔
445

446
        if (s->peer.sa.sa_family == AF_INET)
3✔
447
                siphash24_compress_typesafe(s->peer.in.sin_addr, state);
×
448
        else if (s->peer.sa.sa_family == AF_INET6)
3✔
449
                siphash24_compress_typesafe(s->peer.in6.sin6_addr, state);
×
450
        else if (s->peer.sa.sa_family == AF_VSOCK)
3✔
451
                siphash24_compress_typesafe(s->peer.vm.svm_cid, state);
×
452
        else if (s->peer.sa.sa_family == AF_UNIX)
3✔
453
                siphash24_compress_typesafe(s->peer_cred.uid, state);
3✔
454
        else
455
                assert_not_reached();
×
456
}
3✔
457

458
static int peer_address_compare_func(const SocketPeer *x, const SocketPeer *y) {
2✔
459
        int r;
2✔
460

461
        r = CMP(x->peer.sa.sa_family, y->peer.sa.sa_family);
2✔
462
        if (r != 0)
2✔
463
                return r;
×
464

465
        switch (x->peer.sa.sa_family) {
2✔
466
        case AF_INET:
×
467
                return memcmp(&x->peer.in.sin_addr, &y->peer.in.sin_addr, sizeof(x->peer.in.sin_addr));
×
468
        case AF_INET6:
×
469
                return memcmp(&x->peer.in6.sin6_addr, &y->peer.in6.sin6_addr, sizeof(x->peer.in6.sin6_addr));
×
470
        case AF_VSOCK:
×
471
                return CMP(x->peer.vm.svm_cid, y->peer.vm.svm_cid);
×
472
        case AF_UNIX:
2✔
473
                return CMP(x->peer_cred.uid, y->peer_cred.uid);
2✔
474
        }
475
        assert_not_reached();
×
476
}
477

478
DEFINE_PRIVATE_HASH_OPS(peer_address_hash_ops, SocketPeer, peer_address_hash_func, peer_address_compare_func);
479

480
static int socket_load(Unit *u) {
6,212✔
481
        Socket *s = ASSERT_PTR(SOCKET(u));
6,212✔
482
        int r;
6,212✔
483

484
        assert(u->load_state == UNIT_STUB);
6,212✔
485

486
        r = unit_load_fragment_and_dropin(u, true);
6,212✔
487
        if (r < 0)
6,212✔
488
                return r;
489

490
        if (u->load_state != UNIT_LOADED)
6,209✔
491
                return 0;
492

493
        /* This is a new unit? Then let's add in some extras */
494
        r = socket_add_extras(s);
6,209✔
495
        if (r < 0)
6,209✔
496
                return r;
497

498
        return socket_verify(s);
6,209✔
499
}
500

501
static SocketPeer* socket_peer_dup(const SocketPeer *q) {
1✔
502
        SocketPeer *p;
1✔
503

504
        assert(q);
1✔
505

506
        p = new(SocketPeer, 1);
1✔
507
        if (!p)
1✔
508
                return NULL;
509

510
        *p = (SocketPeer) {
1✔
511
                .n_ref = 1,
512
                .peer = q->peer,
1✔
513
                .peer_salen = q->peer_salen,
1✔
514
                .peer_cred = q->peer_cred,
1✔
515
        };
516

517
        return p;
1✔
518
}
519

520
static SocketPeer* socket_peer_free(SocketPeer *p) {
1✔
521
        assert(p);
1✔
522

523
        if (p->socket)
1✔
524
                set_remove(p->socket->peers_by_address, p);
1✔
525

526
        return mfree(p);
1✔
527
}
528

529
DEFINE_TRIVIAL_REF_UNREF_FUNC(SocketPeer, socket_peer, socket_peer_free);
3✔
530

531
int socket_acquire_peer(Socket *s, int fd, SocketPeer **ret) {
2✔
532
        _cleanup_(socket_peer_unrefp) SocketPeer *remote = NULL;
2✔
533
        SocketPeer key = {
2✔
534
                .peer_salen = sizeof(union sockaddr_union),
535
                .peer_cred = UCRED_INVALID,
536
        }, *i;
537
        int r;
2✔
538

539
        assert(s);
2✔
540
        assert(fd >= 0);
2✔
541
        assert(ret);
2✔
542

543
        if (getpeername(fd, &key.peer.sa, &key.peer_salen) < 0)
2✔
544
                return log_unit_error_errno(UNIT(s), errno, "getpeername() failed: %m");
×
545

546
        switch (key.peer.sa.sa_family) {
2✔
547
        case AF_INET:
548
        case AF_INET6:
549
        case AF_VSOCK:
550
                break;
551

552
        case AF_UNIX:
2✔
553
                r = getpeercred(fd, &key.peer_cred);
2✔
554
                if (r < 0)
2✔
555
                        return log_unit_error_errno(UNIT(s), r, "Failed to get peer credentials of socket: %m");
×
556
                break;
557

558
        default:
×
559
                *ret = NULL;
×
560
                return 0;
×
561
        }
562

563
        i = set_get(s->peers_by_address, &key);
2✔
564
        if (i) {
2✔
565
                *ret = socket_peer_ref(i);
1✔
566
                return 1;
1✔
567
        }
568

569
        remote = socket_peer_dup(&key);
1✔
570
        if (!remote)
1✔
571
                return log_oom();
×
572

573
        r = set_ensure_put(&s->peers_by_address, &peer_address_hash_ops, remote);
1✔
574
        if (r < 0)
1✔
575
                return log_unit_error_errno(UNIT(s), r, "Failed to insert peer info into hash table: %m");
×
576

577
        remote->socket = s;
1✔
578

579
        *ret = TAKE_PTR(remote);
1✔
580
        return 1;
1✔
581
}
582

583
static const char* listen_lookup(int family, int type) {
×
584

585
        if (family == AF_NETLINK)
×
586
                return "ListenNetlink";
587

588
        if (type == SOCK_STREAM)
×
589
                return "ListenStream";
590
        else if (type == SOCK_DGRAM)
×
591
                return "ListenDatagram";
592
        else if (type == SOCK_SEQPACKET)
×
593
                return "ListenSequentialPacket";
594

595
        assert_not_reached();
×
596
}
597

598
static void socket_dump(Unit *u, FILE *f, const char *prefix) {
×
599
        Socket *s = ASSERT_PTR(SOCKET(u));
×
600
        const char *prefix2, *str;
×
601

602
        assert(f);
×
603

604
        prefix = strempty(prefix);
×
605
        prefix2 = strjoina(prefix, "\t");
×
606

607
        fprintf(f,
×
608
                "%sSocket State: %s\n"
609
                "%sResult: %s\n"
610
                "%sClean Result: %s\n"
611
                "%sBindIPv6Only: %s\n"
612
                "%sBacklog: %u\n"
613
                "%sSocketMode: %04o\n"
614
                "%sDirectoryMode: %04o\n"
615
                "%sKeepAlive: %s\n"
616
                "%sNoDelay: %s\n"
617
                "%sFreeBind: %s\n"
618
                "%sTransparent: %s\n"
619
                "%sBroadcast: %s\n"
620
                "%sPassCredentials: %s\n"
621
                "%sPassPIDFD: %s\n"
622
                "%sPassSecurity: %s\n"
623
                "%sPassPacketInfo: %s\n"
624
                "%sAcceptFileDescriptors: %s\n"
625
                "%sTCPCongestion: %s\n"
626
                "%sRemoveOnStop: %s\n"
627
                "%sWritable: %s\n"
628
                "%sFileDescriptorName: %s\n"
629
                "%sPassFileDescriptorsToExec: %s\n"
630
                "%sSELinuxContextFromNet: %s\n",
631
                prefix, socket_state_to_string(s->state),
632
                prefix, socket_result_to_string(s->result),
633
                prefix, socket_result_to_string(s->clean_result),
634
                prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
635
                prefix, s->backlog,
636
                prefix, s->socket_mode,
637
                prefix, s->directory_mode,
638
                prefix, yes_no(s->keep_alive),
×
639
                prefix, yes_no(s->no_delay),
×
640
                prefix, yes_no(s->free_bind),
×
641
                prefix, yes_no(s->transparent),
×
642
                prefix, yes_no(s->broadcast),
×
643
                prefix, yes_no(s->pass_cred),
×
644
                prefix, yes_no(s->pass_pidfd),
×
645
                prefix, yes_no(s->pass_sec),
×
646
                prefix, yes_no(s->pass_pktinfo),
×
647
                prefix, yes_no(s->pass_rights),
×
648
                prefix, strna(s->tcp_congestion),
×
649
                prefix, yes_no(s->remove_on_stop),
×
650
                prefix, yes_no(s->writable),
×
651
                prefix, socket_fdname(s),
652
                prefix, yes_no(s->pass_fds_to_exec),
×
653
                prefix, yes_no(s->selinux_context_from_net));
×
654

655
        if (s->timestamping != SOCKET_TIMESTAMPING_OFF)
×
656
                fprintf(f,
×
657
                        "%sTimestamping: %s\n",
658
                        prefix, socket_timestamping_to_string(s->timestamping));
659

660
        if (pidref_is_set(&s->control_pid))
661
                fprintf(f,
×
662
                        "%sControl PID: "PID_FMT"\n",
663
                        prefix, s->control_pid.pid);
664

665
        if (s->bind_to_device)
×
666
                fprintf(f,
×
667
                        "%sBindToDevice: %s\n",
668
                        prefix, s->bind_to_device);
669

670
        if (s->accept)
×
671
                fprintf(f,
×
672
                        "%sAccepted: %u\n"
673
                        "%sNConnections: %u\n"
674
                        "%sMaxConnections: %u\n"
675
                        "%sMaxConnectionsPerSource: %u\n",
676
                        prefix, s->n_accepted,
677
                        prefix, s->n_connections,
678
                        prefix, s->max_connections,
679
                        prefix, s->max_connections_per_source);
680
        else
681
                fprintf(f,
×
682
                        "%sFlushPending: %s\n"
683
                        "%sDeferTrigger: %s\n"
684
                        "%sDeferTriggerMaxSec: %s\n",
685
                        prefix, yes_no(s->flush_pending),
×
686
                        prefix, socket_defer_trigger_to_string(s->defer_trigger),
687
                        prefix, FORMAT_TIMESPAN(s->defer_trigger_max_usec, USEC_PER_SEC));
×
688

689
        if (s->priority >= 0)
×
690
                fprintf(f,
×
691
                        "%sPriority: %i\n",
692
                        prefix, s->priority);
693

694
        if (s->receive_buffer > 0)
×
695
                fprintf(f,
×
696
                        "%sReceiveBuffer: %zu\n",
697
                        prefix, s->receive_buffer);
698

699
        if (s->send_buffer > 0)
×
700
                fprintf(f,
×
701
                        "%sSendBuffer: %zu\n",
702
                        prefix, s->send_buffer);
703

704
        if (s->ip_tos >= 0)
×
705
                fprintf(f,
×
706
                        "%sIPTOS: %i\n",
707
                        prefix, s->ip_tos);
708

709
        if (s->ip_ttl >= 0)
×
710
                fprintf(f,
×
711
                        "%sIPTTL: %i\n",
712
                        prefix, s->ip_ttl);
713

714
        if (s->pipe_size > 0)
×
715
                fprintf(f,
×
716
                        "%sPipeSize: %zu\n",
717
                        prefix, s->pipe_size);
718

719
        if (s->mark >= 0)
×
720
                fprintf(f,
×
721
                        "%sMark: %i\n",
722
                        prefix, s->mark);
723

724
        if (s->mq_maxmsg > 0)
×
725
                fprintf(f,
×
726
                        "%sMessageQueueMaxMessages: %li\n",
727
                        prefix, s->mq_maxmsg);
728

729
        if (s->mq_msgsize > 0)
×
730
                fprintf(f,
×
731
                        "%sMessageQueueMessageSize: %li\n",
732
                        prefix, s->mq_msgsize);
733

734
        if (s->reuse_port)
×
735
                fprintf(f,
×
736
                        "%sReusePort: %s\n",
737
                         prefix, yes_no(s->reuse_port));
738

739
        if (s->smack)
×
740
                fprintf(f,
×
741
                        "%sSmackLabel: %s\n",
742
                        prefix, s->smack);
743

744
        if (s->smack_ip_in)
×
745
                fprintf(f,
×
746
                        "%sSmackLabelIPIn: %s\n",
747
                        prefix, s->smack_ip_in);
748

749
        if (s->smack_ip_out)
×
750
                fprintf(f,
×
751
                        "%sSmackLabelIPOut: %s\n",
752
                        prefix, s->smack_ip_out);
753

754
        if (!isempty(s->user) || !isempty(s->group))
×
755
                fprintf(f,
×
756
                        "%sSocketUser: %s\n"
757
                        "%sSocketGroup: %s\n",
758
                        prefix, strna(s->user),
×
759
                        prefix, strna(s->group));
×
760

761
        if (timestamp_is_set(s->keep_alive_time))
×
762
                fprintf(f,
×
763
                        "%sKeepAliveTimeSec: %s\n",
764
                        prefix, FORMAT_TIMESPAN(s->keep_alive_time, USEC_PER_SEC));
×
765

766
        if (s->keep_alive_interval > 0)
×
767
                fprintf(f,
×
768
                        "%sKeepAliveIntervalSec: %s\n",
769
                        prefix, FORMAT_TIMESPAN(s->keep_alive_interval, USEC_PER_SEC));
×
770

771
        if (s->keep_alive_cnt > 0)
×
772
                fprintf(f,
×
773
                        "%sKeepAliveProbes: %u\n",
774
                        prefix, s->keep_alive_cnt);
775

776
        if (s->defer_accept > 0)
×
777
                fprintf(f,
×
778
                        "%sDeferAcceptSec: %s\n",
779
                        prefix, FORMAT_TIMESPAN(s->defer_accept, USEC_PER_SEC));
×
780

781
        LIST_FOREACH(port, p, s->ports) {
×
782

783
                switch (p->type) {
×
784
                case SOCKET_SOCKET: {
×
785
                        _cleanup_free_ char *k = NULL;
×
786
                        int r;
×
787

788
                        r = socket_address_print(&p->address, &k);
×
789
                        if (r < 0) {
×
790
                                errno = -r;
×
791
                                fprintf(f, "%s%s: %m\n", prefix, listen_lookup(socket_address_family(&p->address), p->address.type));
×
792
                        } else
793
                                fprintf(f, "%s%s: %s\n", prefix, listen_lookup(socket_address_family(&p->address), p->address.type), k);
×
794
                        break;
×
795
                }
796
                case SOCKET_SPECIAL:
×
797
                        fprintf(f, "%sListenSpecial: %s\n", prefix, p->path);
×
798
                        break;
799
                case SOCKET_USB_FUNCTION:
×
800
                        fprintf(f, "%sListenUSBFunction: %s\n", prefix, p->path);
×
801
                        break;
802
                case SOCKET_MQUEUE:
×
803
                        fprintf(f, "%sListenMessageQueue: %s\n", prefix, p->path);
×
804
                        break;
805
                default:
×
806
                        fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
×
807
                }
808
        }
809

810
        fprintf(f,
×
811
                "%sTriggerLimitIntervalSec: %s\n"
812
                "%sTriggerLimitBurst: %u\n"
813
                "%sPollLimitIntervalSec: %s\n"
814
                "%sPollLimitBurst: %u\n",
815
                prefix, FORMAT_TIMESPAN(s->trigger_limit.interval, USEC_PER_SEC),
×
816
                prefix, s->trigger_limit.burst,
817
                prefix, FORMAT_TIMESPAN(s->poll_limit.interval, USEC_PER_SEC),
×
818
                prefix, s->poll_limit.burst);
819

820
        str = ip_protocol_to_name(s->socket_protocol);
×
821
        if (str)
×
822
                fprintf(f, "%sSocketProtocol: %s\n", prefix, str);
×
823

824
        if (!strv_isempty(s->symlinks)) {
×
825
                fprintf(f, "%sSymlinks:", prefix);
×
826
                STRV_FOREACH(q, s->symlinks)
×
827
                        fprintf(f, " %s", *q);
×
828

829
                fprintf(f, "\n");
×
830
        }
831

832
        fprintf(f,
×
833
                "%sTimeoutSec: %s\n",
834
                prefix, FORMAT_TIMESPAN(s->timeout_usec, USEC_PER_SEC));
×
835

836
        exec_context_dump(&s->exec_context, f, prefix);
×
837
        kill_context_dump(&s->kill_context, f, prefix);
×
838

839
        for (SocketExecCommand c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
×
840
                if (!s->exec_command[c])
×
841
                        continue;
×
842

843
                fprintf(f, "%s%s %s:\n",
×
844
                        prefix, glyph(GLYPH_ARROW_RIGHT), socket_exec_command_to_string(c));
845

846
                exec_command_dump_list(s->exec_command[c], f, prefix2);
×
847
        }
848

849
        cgroup_context_dump(UNIT(s), f, prefix);
×
850
}
×
851

852
static int instance_from_socket(
2✔
853
                int fd,
854
                unsigned nr,
855
                char **ret) {
856

857
        union sockaddr_union local, remote;
2✔
858
        socklen_t l;
2✔
859
        int r;
2✔
860

861
        assert(fd >= 0);
2✔
862
        assert(ret);
2✔
863

864
        l = sizeof(local);
2✔
865
        if (getsockname(fd, &local.sa, &l) < 0)
2✔
866
                return -errno;
2✔
867

868
        l = sizeof(remote);
2✔
869
        if (getpeername(fd, &remote.sa, &l) < 0)
2✔
870
                return -errno;
×
871

872
        uint64_t cookie;
2✔
873
        r = socket_get_cookie(fd, &cookie);
2✔
874
        if (r < 0)
2✔
875
                return r;
876

877
        char *s;
2✔
878

879
        switch (local.sa.sa_family) {
2✔
880

881
        case AF_INET: {
×
882
                uint32_t
×
883
                        a = be32toh(local.in.sin_addr.s_addr),
×
884
                        b = be32toh(remote.in.sin_addr.s_addr);
×
885

886
                if (asprintf(&s,
×
887
                             "%u-%" PRIu64 "-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
888
                             nr,
889
                             cookie,
890
                             a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
891
                             be16toh(local.in.sin_port),
×
892
                             b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
893
                             be16toh(remote.in.sin_port)) < 0)
×
894
                        return -ENOMEM;
895

896
                break;
897
        }
898

899
        case AF_INET6: {
×
900
                static const unsigned char ipv4_prefix[] = {
×
901
                        0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
902
                };
903

904
                if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
×
905
                    memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
×
906
                        const uint8_t
×
907
                                *a = local.in6.sin6_addr.s6_addr+12,
×
908
                                *b = remote.in6.sin6_addr.s6_addr+12;
×
909

910
                        if (asprintf(&s,
×
911
                                     "%u-%" PRIu64 "-%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
912
                                     nr,
913
                                     cookie,
914
                                     a[0], a[1], a[2], a[3],
×
915
                                     be16toh(local.in6.sin6_port),
×
916
                                     b[0], b[1], b[2], b[3],
×
917
                                     be16toh(remote.in6.sin6_port)) < 0)
×
918
                                return -ENOMEM;
919
                } else {
920
                        if (asprintf(&s,
×
921
                                     "%u-%" PRIu64 "-%s:%u-%s:%u",
922
                                     nr,
923
                                     cookie,
924
                                     IN6_ADDR_TO_STRING(&local.in6.sin6_addr),
×
925
                                     be16toh(local.in6.sin6_port),
×
926
                                     IN6_ADDR_TO_STRING(&remote.in6.sin6_addr),
×
927
                                     be16toh(remote.in6.sin6_port)) < 0)
×
928
                                return -ENOMEM;
×
929
                }
930

931
                break;
932
        }
933

934
        case AF_UNIX: {
2✔
935
                struct ucred ucred;
2✔
936

937
                r = getpeercred(fd, &ucred);
2✔
938
                if (r >= 0) {
2✔
939
                        _cleanup_close_ int pidfd = getpeerpidfd(fd);
4✔
940
                        uint64_t pidfd_id;
2✔
941

942
                        if (pidfd >= 0 && pidfd_get_inode_id(pidfd, &pidfd_id) >= 0)
2✔
UNCOV
943
                                r = asprintf(&s, "%u-%" PRIu64 "-" PID_FMT "_%" PRIu64 "-" UID_FMT,
×
944
                                             nr, cookie, ucred.pid, pidfd_id, ucred.uid);
945
                        else
946
                                r = asprintf(&s, "%u-%" PRIu64 "-" PID_FMT "-" UID_FMT,
2✔
947
                                             nr, cookie, ucred.pid, ucred.uid);
948
                        if (r < 0)
2✔
949
                                return -ENOMEM;
×
950
                } else if (r == -ENODATA) {
×
951
                        /* This handles the case where somebody is connecting from another pid/uid namespace
952
                         * (e.g. from outside of our container). */
953
                        if (asprintf(&s,
×
954
                                     "%u-%" PRIu64 "-unknown",
955
                                     nr,
956
                                     cookie) < 0)
957
                                return -ENOMEM;
958
                } else
959
                        return r;
960

961
                break;
2✔
962
        }
963

964
        case AF_VSOCK:
×
965
                if (asprintf(&s,
×
966
                             "%u-%" PRIu64 "-%u:%u-%u:%u",
967
                             nr,
968
                             cookie,
969
                             local.vm.svm_cid, local.vm.svm_port,
970
                             remote.vm.svm_cid, remote.vm.svm_port) < 0)
971
                        return -ENOMEM;
972

973
                break;
974

975
        default:
×
976
                assert_not_reached();
×
977
        }
978

979
        *ret = s;
2✔
980
        return 0;
2✔
981
}
982

983
static void socket_close_fds(Socket *s) {
2,707✔
984
        assert(s);
2,707✔
985

986
        LIST_FOREACH(port, p, s->ports) {
5,636✔
987
                bool was_open = p->fd >= 0;
2,929✔
988

989
                p->event_source = sd_event_source_disable_unref(p->event_source);
2,929✔
990
                p->fd = safe_close(p->fd);
2,929✔
991
                socket_port_close_auxiliary_fds(p);
2,929✔
992

993
                /* One little note: we should normally not delete any sockets in the file system here! After all some
994
                 * other process we spawned might still have a reference of this fd and wants to continue to use
995
                 * it. Therefore we normally delete sockets in the file system before we create a new one, not after we
996
                 * stopped using one! That all said, if the user explicitly requested this, we'll delete them here
997
                 * anyway, but only then. */
998

999
                if (!was_open || !s->remove_on_stop)
2,929✔
1000
                        continue;
2,685✔
1001

1002
                switch (p->type) {
244✔
1003

1004
                case SOCKET_FIFO:
22✔
1005
                        (void) unlink(p->path);
22✔
1006
                        break;
22✔
1007

1008
                case SOCKET_MQUEUE:
×
1009
                        (void) mq_unlink(p->path);
×
1010
                        break;
×
1011

1012
                case SOCKET_SOCKET:
222✔
1013
                        (void) socket_address_unlink(&p->address);
222✔
1014
                        break;
222✔
1015

1016
                default:
1017
                        ;
1018
                }
1019
        }
1020

1021
        if (s->remove_on_stop)
2,707✔
1022
                STRV_FOREACH(i, s->symlinks)
233✔
1023
                        (void) unlink(*i);
×
1024

1025
        /* Note that we don't return NULL here, since s has not been freed. */
1026
}
2,707✔
1027

1028
DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(Socket*, socket_close_fds, NULL);
×
1029

1030
#define SOCKET_OPTION_WARNING_FORMAT_STR "Failed to set %s socket option, ignoring: %m"
1031
#define log_socket_option_warning_errno(s, error, option) \
1032
        log_unit_warning_errno(UNIT(s), (error), SOCKET_OPTION_WARNING_FORMAT_STR, STRINGIFY(option))
1033

1034
static void socket_apply_socket_options(Socket *s, SocketPort *p, int fd) {
3,372✔
1035
        int r;
3,372✔
1036

1037
        assert(s);
3,372✔
1038
        assert(p);
3,372✔
1039
        assert(fd >= 0);
3,372✔
1040

1041
        if (s->keep_alive) {
3,372✔
1042
                r = setsockopt_int(fd, SOL_SOCKET, SO_KEEPALIVE, true);
×
1043
                if (r < 0)
×
1044
                        log_socket_option_warning_errno(s, r, SO_KEEPALIVE);
×
1045
        }
1046

1047
        if (timestamp_is_set(s->keep_alive_time)) {
3,372✔
1048
                r = setsockopt_int(fd, SOL_TCP, TCP_KEEPIDLE, s->keep_alive_time / USEC_PER_SEC);
×
1049
                if (r < 0)
×
1050
                        log_socket_option_warning_errno(s, r, TCP_KEEPIDLE);
×
1051
        }
1052

1053
        if (s->keep_alive_interval > 0) {
3,372✔
1054
                r = setsockopt_int(fd, SOL_TCP, TCP_KEEPINTVL, s->keep_alive_interval / USEC_PER_SEC);
×
1055
                if (r < 0)
×
1056
                        log_socket_option_warning_errno(s, r, TCP_KEEPINTVL);
×
1057
        }
1058

1059
        if (s->keep_alive_cnt > 0) {
3,372✔
1060
                r = setsockopt_int(fd, SOL_TCP, TCP_KEEPCNT, s->keep_alive_cnt);
×
1061
                if (r < 0)
×
1062
                        log_socket_option_warning_errno(s, r, TCP_KEEPCNT);
×
1063
        }
1064

1065
        if (s->defer_accept > 0) {
3,372✔
1066
                r = setsockopt_int(fd, SOL_TCP, TCP_DEFER_ACCEPT, s->defer_accept / USEC_PER_SEC);
×
1067
                if (r < 0)
×
1068
                        log_socket_option_warning_errno(s, r, TCP_DEFER_ACCEPT);
×
1069
        }
1070

1071
        if (s->no_delay) {
3,372✔
1072
                if (s->socket_protocol == IPPROTO_SCTP) {
×
1073
                        r = setsockopt_int(fd, SOL_SCTP, SCTP_NODELAY, true);
×
1074
                        if (r < 0)
×
1075
                                log_socket_option_warning_errno(s, r, SCTP_NODELAY);
×
1076
                } else {
1077
                        r = setsockopt_int(fd, SOL_TCP, TCP_NODELAY, true);
×
1078
                        if (r < 0)
×
1079
                                log_socket_option_warning_errno(s, r, TCP_NODELAY);
×
1080
                }
1081
        }
1082

1083
        if (s->broadcast) {
3,372✔
1084
                r = setsockopt_int(fd, SOL_SOCKET, SO_BROADCAST, true);
×
1085
                if (r < 0)
×
1086
                        log_socket_option_warning_errno(s, r, SO_BROADCAST);
×
1087
        }
1088

1089
        if (s->pass_cred) {
3,372✔
1090
                r = setsockopt_int(fd, SOL_SOCKET, SO_PASSCRED, true);
141✔
1091
                if (r < 0)
141✔
1092
                        log_socket_option_warning_errno(s, r, SO_PASSCRED);
×
1093
        }
1094

1095
        if (s->pass_pidfd) {
3,372✔
1096
                r = setsockopt_int(fd, SOL_SOCKET, SO_PASSPIDFD, true);
×
1097
                if (r < 0)
×
1098
                        log_unit_full_errno(UNIT(s), ERRNO_IS_NEG_NOT_SUPPORTED(r) ? LOG_DEBUG : LOG_WARNING, r,
×
1099
                                            SOCKET_OPTION_WARNING_FORMAT_STR, "SO_PASSPIDFD");
1100
        }
1101

1102
        if (s->pass_sec) {
3,372✔
1103
                r = setsockopt_int(fd, SOL_SOCKET, SO_PASSSEC, true);
96✔
1104
                if (r < 0)
96✔
1105
                        log_unit_full_errno(UNIT(s), ERRNO_IS_NEG_NOT_SUPPORTED(r) ? LOG_DEBUG : LOG_WARNING, r,
×
1106
                                            SOCKET_OPTION_WARNING_FORMAT_STR, "SO_PASSSEC");
1107
        }
1108

1109
        if (s->pass_pktinfo) {
3,372✔
1110
                r = socket_set_recvpktinfo(fd, socket_address_family(&p->address), true);
35✔
1111
                if (r < 0)
35✔
1112
                        log_unit_warning_errno(UNIT(s), r, SOCKET_OPTION_WARNING_FORMAT_STR, "packet info");
×
1113
        }
1114

1115
        if (!s->pass_rights) {
3,372✔
1116
                r = setsockopt_int(fd, SOL_SOCKET, SO_PASSRIGHTS, false);
×
1117
                if (r < 0)
×
1118
                        log_unit_full_errno(UNIT(s), ERRNO_IS_NEG_NOT_SUPPORTED(r) ? LOG_DEBUG : LOG_WARNING, r,
×
1119
                                            SOCKET_OPTION_WARNING_FORMAT_STR, "SO_PASSRIGHTS");
1120
        }
1121

1122
        if (s->timestamping != SOCKET_TIMESTAMPING_OFF) {
3,372✔
1123
                r = setsockopt_int(fd, SOL_SOCKET,
192✔
1124
                                   s->timestamping == SOCKET_TIMESTAMPING_NS ? SO_TIMESTAMPNS : SO_TIMESTAMP,
1125
                                   true);
1126
                if (r < 0)
96✔
1127
                        log_unit_warning_errno(UNIT(s), r, SOCKET_OPTION_WARNING_FORMAT_STR, "timestamping");
×
1128
        }
1129

1130
        if (s->priority >= 0) {
3,372✔
1131
                r = setsockopt_int(fd, SOL_SOCKET, SO_PRIORITY, s->priority);
186✔
1132
                if (r < 0)
186✔
1133
                        log_socket_option_warning_errno(s, r, SO_PRIORITY);
×
1134
        }
1135

1136
        if (s->receive_buffer > 0) {
3,372✔
1137
                r = fd_set_rcvbuf(fd, s->receive_buffer, false);
159✔
1138
                if (r < 0)
159✔
1139
                        log_unit_full_errno(UNIT(s), ERRNO_IS_NEG_PRIVILEGE(r) ? LOG_DEBUG : LOG_WARNING, r,
×
1140
                                            SOCKET_OPTION_WARNING_FORMAT_STR, "SO_RCVBUF/SO_RCVBUFFORCE");
1141
        }
1142

1143
        if (s->send_buffer > 0) {
3,372✔
1144
                r = fd_set_sndbuf(fd, s->send_buffer, false);
32✔
1145
                if (r < 0)
32✔
1146
                        log_unit_full_errno(UNIT(s), ERRNO_IS_NEG_PRIVILEGE(r) ? LOG_DEBUG : LOG_WARNING, r,
×
1147
                                            SOCKET_OPTION_WARNING_FORMAT_STR, "SO_SNDBUF/SO_SNDBUFFORCE");
1148
        }
1149

1150
        if (s->mark >= 0) {
3,372✔
1151
                r = setsockopt_int(fd, SOL_SOCKET, SO_MARK, s->mark);
×
1152
                if (r < 0)
×
1153
                        log_socket_option_warning_errno(s, r, SO_MARK);
×
1154
        }
1155

1156
        if (s->ip_tos >= 0) {
3,372✔
1157
                r = setsockopt_int(fd, IPPROTO_IP, IP_TOS, s->ip_tos);
×
1158
                if (r < 0)
×
1159
                        log_socket_option_warning_errno(s, r, IP_TOS);
×
1160
        }
1161

1162
        if (s->ip_ttl >= 0) {
3,372✔
1163
                r = socket_set_ttl(fd, socket_address_family(&p->address), s->ip_ttl);
×
1164
                if (r < 0)
×
1165
                        log_unit_warning_errno(UNIT(s), r, SOCKET_OPTION_WARNING_FORMAT_STR, "IP_TTL/IPV6_UNICAST_HOPS");
×
1166
        }
1167

1168
        if (s->tcp_congestion)
3,372✔
1169
                if (setsockopt(fd, SOL_TCP, TCP_CONGESTION, s->tcp_congestion, strlen(s->tcp_congestion)+1) < 0)
×
1170
                        log_socket_option_warning_errno(s, errno, TCP_CONGESTION);
×
1171

1172
        if (s->smack_ip_in) {
3,372✔
1173
                r = mac_smack_apply_fd(fd, SMACK_ATTR_IPIN, s->smack_ip_in);
×
1174
                if (r < 0)
×
1175
                        log_unit_error_errno(UNIT(s), r, "Failed to apply SMACK label for IP input, ignoring: %m");
×
1176
        }
1177

1178
        if (s->smack_ip_out) {
3,372✔
1179
                r = mac_smack_apply_fd(fd, SMACK_ATTR_IPOUT, s->smack_ip_out);
×
1180
                if (r < 0)
×
1181
                        log_unit_error_errno(UNIT(s), r, "Failed to apply SMACK label for IP output, ignoring: %m");
×
1182
        }
1183
}
3,372✔
1184

1185
static void socket_apply_fifo_options(Socket *s, int fd) {
70✔
1186
        int r;
70✔
1187

1188
        assert(s);
70✔
1189
        assert(fd >= 0);
70✔
1190

1191
        if (s->pipe_size > 0)
70✔
1192
                if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
×
1193
                        log_unit_warning_errno(UNIT(s), errno, "Setting pipe size failed, ignoring: %m");
×
1194

1195
        if (s->smack) {
70✔
1196
                r = mac_smack_apply_fd(fd, SMACK_ATTR_ACCESS, s->smack);
×
1197
                if (r < 0)
×
1198
                        log_unit_error_errno(UNIT(s), r, "SMACK relabelling failed, ignoring: %m");
×
1199
        }
1200
}
70✔
1201

1202
static int fifo_address_create(
70✔
1203
                const char *path,
1204
                mode_t directory_mode,
1205
                mode_t socket_mode) {
1206

1207
        _cleanup_close_ int fd = -EBADF;
70✔
1208
        mode_t old_mask;
70✔
1209
        struct stat st;
70✔
1210
        int r;
70✔
1211

1212
        assert(path);
70✔
1213

1214
        (void) mkdir_parents_label(path, directory_mode);
70✔
1215

1216
        r = mac_selinux_create_file_prepare(path, S_IFIFO);
70✔
1217
        if (r < 0)
70✔
1218
                return r;
1219

1220
        /* Enforce the right access mode for the fifo */
1221
        old_mask = umask(~socket_mode);
70✔
1222

1223
        /* Include the original umask in our mask */
1224
        (void) umask(~socket_mode | old_mask);
70✔
1225

1226
        r = mkfifo(path, socket_mode);
70✔
1227
        (void) umask(old_mask);
70✔
1228

1229
        if (r < 0 && errno != EEXIST) {
70✔
1230
                r = -errno;
×
1231
                goto fail;
×
1232
        }
1233

1234
        fd = open(path, O_RDWR | O_CLOEXEC | O_NOCTTY | O_NONBLOCK | O_NOFOLLOW);
70✔
1235
        if (fd < 0) {
70✔
1236
                r = -errno;
×
1237
                goto fail;
×
1238
        }
1239

1240
        mac_selinux_create_file_clear();
70✔
1241

1242
        if (fstat(fd, &st) < 0) {
70✔
1243
                r = -errno;
×
1244
                goto fail;
×
1245
        }
1246

1247
        if (!S_ISFIFO(st.st_mode) ||
70✔
1248
            (st.st_mode & 0777) != (socket_mode & ~old_mask) ||
140✔
1249
            st.st_uid != getuid() ||
140✔
1250
            st.st_gid != getgid()) {
70✔
1251
                r = -EEXIST;
×
1252
                goto fail;
×
1253
        }
1254

1255
        return TAKE_FD(fd);
1256

1257
fail:
×
1258
        mac_selinux_create_file_clear();
×
1259
        return r;
1260
}
1261

1262
static int special_address_create(const char *path, bool writable) {
6✔
1263
        _cleanup_close_ int fd = -EBADF;
6✔
1264
        struct stat st;
6✔
1265

1266
        assert(path);
6✔
1267

1268
        fd = open(path, (writable ? O_RDWR : O_RDONLY)|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW);
6✔
1269
        if (fd < 0)
6✔
1270
                return -errno;
×
1271

1272
        if (fstat(fd, &st) < 0)
6✔
1273
                return -errno;
×
1274

1275
        /* Check whether this is a /proc, /sys or /dev file or char device */
1276
        if (!S_ISREG(st.st_mode) && !S_ISCHR(st.st_mode))
6✔
1277
                return -EEXIST;
×
1278

1279
        return TAKE_FD(fd);
1280
}
1281

1282
static int usbffs_address_create_at(int dfd, const char *name) {
×
1283
        _cleanup_close_ int fd = -EBADF;
×
1284
        struct stat st;
×
1285

1286
        assert(dfd >= 0);
×
1287
        assert(name);
×
1288

1289
        fd = openat(dfd, name, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW);
×
1290
        if (fd < 0)
×
1291
                return -errno;
×
1292

1293
        if (fstat(fd, &st) < 0)
×
1294
                return -errno;
×
1295

1296
        /* Check whether this is a regular file (ffs endpoint) */
1297
        if (!S_ISREG(st.st_mode))
×
1298
                return -EEXIST;
×
1299

1300
        return TAKE_FD(fd);
1301
}
1302

1303
static int mq_address_create(
×
1304
                const char *path,
1305
                mode_t mq_mode,
1306
                long maxmsg,
1307
                long msgsize) {
1308

1309
        _cleanup_close_ int fd = -EBADF;
×
1310
        struct stat st;
×
1311
        mode_t old_mask;
×
1312
        struct mq_attr _attr, *attr = NULL;
×
1313

1314
        assert(path);
×
1315

1316
        if (maxmsg > 0 && msgsize > 0) {
×
1317
                _attr = (struct mq_attr) {
×
1318
                        .mq_flags = O_NONBLOCK,
1319
                        .mq_maxmsg = maxmsg,
1320
                        .mq_msgsize = msgsize,
1321
                };
1322
                attr = &_attr;
×
1323
        }
1324

1325
        /* Enforce the right access mode for the mq */
1326
        old_mask = umask(~mq_mode);
×
1327

1328
        /* Include the original umask in our mask */
1329
        (void) umask(~mq_mode | old_mask);
×
1330
        fd = mq_open(path, O_RDONLY|O_CLOEXEC|O_NONBLOCK|O_CREAT, mq_mode, attr);
×
1331
        (void) umask(old_mask);
×
1332

1333
        if (fd < 0)
×
1334
                return -errno;
×
1335

1336
        if (fstat(fd, &st) < 0)
×
1337
                return -errno;
×
1338

1339
        if ((st.st_mode & 0777) != (mq_mode & ~old_mask) ||
×
1340
            st.st_uid != getuid() ||
×
1341
            st.st_gid != getgid())
×
1342
                return -EEXIST;
×
1343

1344
        return TAKE_FD(fd);
1345
}
1346

1347
static int socket_symlink(Socket *s) {
3,440✔
1348
        const char *p;
3,440✔
1349
        int r;
3,440✔
1350

1351
        assert(s);
3,440✔
1352

1353
        p = socket_find_symlink_target(s);
3,440✔
1354
        if (!p)
3,440✔
1355
                return 0;
1356

1357
        STRV_FOREACH(i, s->symlinks) {
2,899✔
1358
                (void) mkdir_parents_label(*i, s->directory_mode);
104✔
1359

1360
                r = symlink_idempotent(p, *i, false);
104✔
1361
                if (r == -EEXIST && s->remove_on_stop) {
104✔
1362
                        /* If there's already something where we want to create the symlink, and the destructive
1363
                         * RemoveOnStop= mode is set, then we might as well try to remove what already exists and try
1364
                         * again. */
1365

1366
                        if (unlink(*i) >= 0)
×
1367
                                r = symlink_idempotent(p, *i, false);
×
1368
                }
1369
                if (r < 0)
104✔
1370
                        log_unit_warning_errno(UNIT(s), r, "Failed to create symlink %s %s %s, ignoring: %m",
×
1371
                                               p, glyph(GLYPH_ARROW_RIGHT), *i);
1372
        }
1373

1374
        return 0;
1375
}
1376

1377
static int usbffs_write_descs(int fd, Service *s) {
×
1378
        int r;
×
1379

1380
        assert(fd >= 0);
×
1381
        assert(s);
×
1382

1383
        if (!s->usb_function_descriptors || !s->usb_function_strings)
×
1384
                return -EINVAL;
1385

1386
        r = copy_file_fd(s->usb_function_descriptors, fd, 0);
×
1387
        if (r < 0)
×
1388
                return r;
1389

1390
        return copy_file_fd(s->usb_function_strings, fd, 0);
×
1391
}
1392

1393
static int usbffs_dispatch_eps(SocketPort *p, int dfd) {
×
1394
        _cleanup_free_ DirectoryEntries *des = NULL;
×
1395
        int r;
×
1396

1397
        assert(p);
×
1398
        assert(dfd >= 0);
×
1399

1400
        r = readdir_all(dfd, RECURSE_DIR_SORT|RECURSE_DIR_IGNORE_DOT, &des);
×
1401
        if (r < 0)
×
1402
                return r;
1403

1404
        p->auxiliary_fds = new(int, des->n_entries);
×
1405
        if (!p->auxiliary_fds)
×
1406
                return -ENOMEM;
1407

1408
        FOREACH_ARRAY(i, des->entries, des->n_entries) {
×
1409
                const struct dirent *de = *i;
×
1410

1411
                if (streq(de->d_name, "ep0"))
×
1412
                        continue;
×
1413

1414
                r = usbffs_address_create_at(dfd, de->d_name);
×
1415
                if (r < 0)
×
1416
                        goto fail;
×
1417

1418
                p->auxiliary_fds[p->n_auxiliary_fds++] = r;
×
1419
        }
1420

1421
        assert(p->n_auxiliary_fds < des->n_entries);
×
1422

1423
        return 0;
1424

1425
fail:
×
1426
        socket_port_close_auxiliary_fds(p);
×
1427
        return r;
1428
}
1429

1430
int socket_load_service_unit(Socket *s, int cfd, Unit **ret) {
3,175✔
1431
        int r;
3,175✔
1432

1433
        /* Figure out what the unit that will be used to handle the connections on the socket looks like.
1434
         *
1435
         * If cfd < 0, then we don't have a connection yet. In case of Accept=yes sockets, use a fake
1436
         * instance name.
1437
         */
1438

1439
        assert(s);
3,175✔
1440
        assert(ret);
3,175✔
1441

1442
        if (UNIT_ISSET(s->service)) {
3,175✔
1443
                *ret = UNIT_DEREF(s->service);
2,618✔
1444
                return 0;
3,175✔
1445
        }
1446

1447
        if (!s->accept)
557✔
1448
                return -ENODATA;
1449

1450
        /* Build the instance name and load the unit */
1451
        _cleanup_free_ char *prefix = NULL, *instance = NULL, *name = NULL;
557✔
1452

1453
        r = unit_name_to_prefix(UNIT(s)->id, &prefix);
557✔
1454
        if (r < 0)
557✔
1455
                return r;
1456

1457
        if (cfd >= 0) {
557✔
1458
                r = instance_from_socket(cfd, s->n_accepted, &instance);
2✔
1459
                if (ERRNO_IS_NEG_DISCONNECT(r))
2✔
1460
                        /* ENOTCONN is legitimate if TCP RST was received. Other socket families might return
1461
                         * different errors. This connection is over, but the socket unit lives on. */
1462
                        return log_unit_debug_errno(UNIT(s), r,
×
1463
                                                    "Got error %s on incoming socket, assuming aborted connection attempt, ignoring.",
1464
                                                    ERRNO_NAME(r));
1465
                if (r < 0)
2✔
1466
                        return r;
1467
        }
1468

1469
        /* For accepting sockets, we don't know how the instance will be called until we get a connection and
1470
         * can figure out what the peer name is. So let's use "internal" as the instance to make it clear
1471
         * that this is not an actual peer name. We use "unknown" when we cannot figure out the peer. */
1472
        r = unit_name_build(prefix, instance ?: "internal", ".service", &name);
1,112✔
1473
        if (r < 0)
557✔
1474
                return r;
1475

1476
        return manager_load_unit(UNIT(s)->manager, name, NULL, NULL, ret);
557✔
1477
}
1478

1479
static int socket_determine_selinux_label(Socket *s, char **ret) {
3,117✔
1480
        Unit *service;
3,117✔
1481
        int r;
3,117✔
1482

1483
        assert(s);
3,117✔
1484
        assert(ret);
3,117✔
1485

1486
        r = socket_load_service_unit(s, /* cfd= */ -EBADF, &service);
3,117✔
1487
        if (r == -ENODATA) {
3,117✔
1488
                *ret = NULL;
×
1489
                return 0;
×
1490
        }
1491
        if (r < 0)
3,117✔
1492
                return r;
1493

1494
        r = service_determine_exec_selinux_label(SERVICE(service), ret);
6,234✔
1495
        if (r == -ENODATA) {
3,117✔
1496
                *ret = NULL;
3,117✔
1497
                return 0;
3,117✔
1498
        }
1499
        return r;
1500
}
1501

1502
static int socket_address_listen_do(
3,385✔
1503
                Socket *s,
1504
                const SocketAddress *address,
1505
                const char *label) {
1506

1507
        assert(s);
3,385✔
1508
        assert(address);
3,385✔
1509

1510
        return socket_address_listen(
6,770✔
1511
                        address,
1512
                        SOCK_CLOEXEC|SOCK_NONBLOCK,
1513
                        s->backlog,
3,385✔
1514
                        s->bind_ipv6_only,
1515
                        s->bind_to_device,
3,385✔
1516
                        s->reuse_port,
3,385✔
1517
                        s->free_bind,
3,385✔
1518
                        s->transparent,
3,385✔
1519
                        s->directory_mode,
1520
                        s->socket_mode,
1521
                        label);
1522
}
1523

1524
#define log_address_error_errno(u, address, error, fmt)          \
1525
        ({                                                       \
1526
                _cleanup_free_ char *_t = NULL;                  \
1527
                                                                 \
1528
                (void) socket_address_print(address, &_t);       \
1529
                log_unit_error_errno(u, error, fmt, strna(_t));  \
1530
        })
1531

1532
static bool fork_needed(const SocketAddress *address, Socket *s) {
3,370✔
1533
        assert(address);
3,370✔
1534
        assert(s);
3,370✔
1535

1536
        /* Check if we need to do the cgroup or netns stuff. If not we can do things much simpler. */
1537

1538
        /* If there are any NFTSet= directives with cgroup source, we need the cgroup */
1539
        Unit *u = UNIT(s);
3,370✔
1540
        CGroupContext *c = unit_get_cgroup_context(u);
3,370✔
1541
        if (c)
3,370✔
1542
                FOREACH_ARRAY(nft_set, c->nft_set_context.sets, c->nft_set_context.n_sets)
3,370✔
1543
                        if (nft_set->source == NFT_SET_SOURCE_CGROUP)
×
1544
                                return true;
1545

1546
        if (IN_SET(address->sockaddr.sa.sa_family, AF_INET, AF_INET6) &&
3,370✔
1547
            bpf_program_supported() > 0) /* If BPF firewalling isn't supported anyway — there's no point in this forking complexity */
×
1548
                return true;
1549

1550
        return exec_needs_network_namespace(&s->exec_context);
3,370✔
1551
}
1552

1553
static int socket_address_listen_in_cgroup(
3,370✔
1554
                Socket *s,
1555
                const SocketAddress *address,
1556
                const char *label) {
1557

1558
        _cleanup_(pidref_done) PidRef pid = PIDREF_NULL;
×
1559
        _cleanup_close_pair_ int pair[2] = EBADF_PAIR;
3,370✔
1560
        int fd, r;
3,370✔
1561

1562
        assert(s);
3,370✔
1563
        assert(address);
3,370✔
1564

1565
        /* This is a wrapper around socket_address_listen(), that forks off a helper process inside the
1566
         * socket's cgroup and network namespace in which the socket is actually created. This way we ensure
1567
         * the socket is actually properly attached to the unit's cgroup for the purpose of BPF filtering and
1568
         * such. */
1569

1570
        if (!fork_needed(address, s)) {
3,370✔
1571
                /* Shortcut things... */
1572
                fd = socket_address_listen_do(s, address, label);
3,370✔
1573
                if (fd < 0)
3,370✔
1574
                        return log_address_error_errno(UNIT(s), address, fd, "Failed to create listening socket (%s): %m");
×
1575

1576
                return fd;
1577
        }
1578

1579
        r = unit_setup_exec_runtime(UNIT(s));
×
1580
        if (r < 0)
×
1581
                return log_unit_error_errno(UNIT(s), r, "Failed to acquire runtime: %m");
×
1582

1583
        if (s->exec_context.network_namespace_path &&
×
1584
            s->exec_runtime &&
×
1585
            s->exec_runtime->shared &&
×
1586
            s->exec_runtime->shared->netns_storage_socket[0] >= 0) {
×
1587
                r = open_shareable_ns_path(s->exec_runtime->shared->netns_storage_socket, s->exec_context.network_namespace_path, CLONE_NEWNET);
×
1588
                if (r < 0)
×
1589
                        return log_unit_error_errno(UNIT(s), r, "Failed to open network namespace path %s: %m", s->exec_context.network_namespace_path);
×
1590
        }
1591

1592
        if (s->exec_context.ipc_namespace_path &&
×
1593
            s->exec_runtime &&
×
1594
            s->exec_runtime->shared &&
×
1595
            s->exec_runtime->shared->ipcns_storage_socket[0] >= 0) {
×
1596
                r = open_shareable_ns_path(s->exec_runtime->shared->ipcns_storage_socket, s->exec_context.ipc_namespace_path, CLONE_NEWIPC);
×
1597
                if (r < 0)
×
1598
                        return log_unit_error_errno(UNIT(s), r, "Failed to open IPC namespace path %s: %m", s->exec_context.ipc_namespace_path);
×
1599
        }
1600

1601
        if (socketpair(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC, 0, pair) < 0)
×
1602
                return log_unit_error_errno(UNIT(s), errno, "Failed to create communication channel: %m");
×
1603

1604
        r = unit_fork_helper_process(UNIT(s), "(sd-listen)", /* into_cgroup= */ true, &pid);
×
1605
        if (r < 0)
15✔
1606
                return log_unit_error_errno(UNIT(s), r, "Failed to fork off listener stub process: %m");
×
1607
        if (r == 0) {
15✔
1608
                /* Child */
1609

1610
                pair[0] = safe_close(pair[0]);
15✔
1611

1612
                if (exec_needs_network_namespace(&s->exec_context) &&
15✔
1613
                    s->exec_runtime &&
×
1614
                    s->exec_runtime->shared &&
×
1615
                    s->exec_runtime->shared->netns_storage_socket[0] >= 0) {
×
1616

1617
                        if (namespace_type_supported(NAMESPACE_NET)) {
×
1618
                                r = setup_shareable_ns(s->exec_runtime->shared->netns_storage_socket, CLONE_NEWNET);
×
1619
                                if (r < 0) {
×
1620
                                        log_unit_error_errno(UNIT(s), r, "Failed to join network namespace: %m");
×
1621
                                        _exit(EXIT_NETWORK);
×
1622
                                }
1623
                        } else if (s->exec_context.network_namespace_path) {
×
1624
                                log_unit_error(UNIT(s), "Network namespace path configured but network namespaces not supported.");
×
1625
                                _exit(EXIT_NETWORK);
×
1626
                        } else
1627
                                log_unit_warning(UNIT(s), "PrivateNetwork=yes is configured, but the kernel does not support network namespaces, ignoring.");
×
1628
                }
1629

1630
                fd = socket_address_listen_do(s, address, label);
15✔
1631
                if (fd < 0) {
15✔
1632
                        log_address_error_errno(UNIT(s), address, fd, "Failed to create listening socket (%s): %m");
×
1633
                        _exit(EXIT_FAILURE);
×
1634
                }
1635

1636
                r = send_one_fd(pair[1], fd, 0);
15✔
1637
                if (r < 0) {
15✔
1638
                        log_address_error_errno(UNIT(s), address, r, "Failed to send listening socket (%s) to parent: %m");
×
1639
                        _exit(EXIT_FAILURE);
×
1640
                }
1641

1642
                _exit(EXIT_SUCCESS);
15✔
1643
        }
1644

1645
        pair[1] = safe_close(pair[1]);
×
1646
        fd = receive_one_fd(pair[0], 0);
×
1647

1648
        /* We synchronously wait for the helper, as it shouldn't be slow */
1649
        r = wait_for_terminate_and_check("(sd-listen)", pid.pid, WAIT_LOG_ABNORMAL);
×
1650
        if (r < 0) {
×
1651
                safe_close(fd);
×
1652
                return r;
1653
        }
1654

1655
        if (fd < 0)
×
1656
                return log_address_error_errno(UNIT(s), address, fd, "Failed to receive listening socket (%s): %m");
×
1657

1658
        return fd;
1659
}
1660

1661
static int socket_open_fds(Socket *orig_s) {
3,158✔
1662
        _cleanup_(socket_close_fdsp) Socket *s = orig_s;
3,158✔
1663
        _cleanup_freecon_ char *label = NULL;
3,158✔
1664
        bool know_label = false;
3,158✔
1665
        int r;
3,158✔
1666

1667
        assert(s);
3,158✔
1668

1669
        LIST_FOREACH(port, p, s->ports) {
3,158✔
1670

1671
                if (p->fd >= 0)
3,446✔
1672
                        continue;
×
1673

1674
                switch (p->type) {
3,446✔
1675

1676
                case SOCKET_SOCKET:
3,370✔
1677

1678
                        if (!know_label) {
3,370✔
1679
                                /* Figure out the label, if we don't it know yet. We do it once for the first
1680
                                 * socket where we need this and remember it for the rest. */
1681

1682
                                r = socket_determine_selinux_label(s, &label);
3,117✔
1683
                                if (r < 0)
3,117✔
1684
                                        return log_unit_error_errno(UNIT(s), r, "Failed to determine SELinux label: %m");
×
1685

1686
                                know_label = true;
1687
                        }
1688

1689
                        /* Apply the socket protocol */
1690
                        switch (p->address.type) {
3,370✔
1691

1692
                        case SOCK_STREAM:
3,191✔
1693
                                if (IN_SET(s->socket_protocol, IPPROTO_SCTP, IPPROTO_MPTCP))
3,191✔
1694
                                        p->address.protocol = s->socket_protocol;
×
1695
                                break;
1696

1697
                        case SOCK_SEQPACKET:
52✔
1698
                                if (s->socket_protocol == IPPROTO_SCTP)
52✔
1699
                                        p->address.protocol = s->socket_protocol;
×
1700
                                break;
1701

1702
                        case SOCK_DGRAM:
64✔
1703
                                if (s->socket_protocol == IPPROTO_UDPLITE)
64✔
1704
                                        p->address.protocol = s->socket_protocol;
×
1705
                                break;
1706
                        }
1707

1708
                        p->fd = socket_address_listen_in_cgroup(s, &p->address, label);
3,370✔
1709
                        if (p->fd < 0)
3,370✔
1710
                                return p->fd;
1711

1712
                        socket_apply_socket_options(s, p, p->fd);
3,370✔
1713
                        socket_symlink(s);
3,370✔
1714
                        break;
1715

1716
                case SOCKET_SPECIAL:
6✔
1717

1718
                        p->fd = special_address_create(p->path, s->writable);
6✔
1719
                        if (p->fd < 0)
6✔
1720
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open special file '%s': %m", p->path);
×
1721
                        break;
1722

1723
                case SOCKET_FIFO:
70✔
1724

1725
                        p->fd = fifo_address_create(
140✔
1726
                                        p->path,
70✔
1727
                                        s->directory_mode,
1728
                                        s->socket_mode);
1729
                        if (p->fd < 0)
70✔
1730
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open FIFO '%s': %m", p->path);
×
1731

1732
                        socket_apply_fifo_options(s, p->fd);
70✔
1733
                        socket_symlink(s);
70✔
1734
                        break;
1735

1736
                case SOCKET_MQUEUE:
×
1737

1738
                        p->fd = mq_address_create(
×
1739
                                        p->path,
×
1740
                                        s->socket_mode,
1741
                                        s->mq_maxmsg,
1742
                                        s->mq_msgsize);
1743
                        if (p->fd < 0)
×
1744
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open message queue '%s': %m", p->path);
×
1745
                        break;
1746

1747
                case SOCKET_USB_FUNCTION: {
×
1748
                        _cleanup_close_ int dfd = -EBADF;
6,604✔
1749

1750
                        dfd = open(p->path, O_DIRECTORY|O_CLOEXEC);
×
1751
                        if (dfd < 0)
×
1752
                                return log_unit_error_errno(UNIT(s), errno,
×
1753
                                                            "Failed to open USB FunctionFS dir '%s': %m", p->path);
1754

1755
                        p->fd = usbffs_address_create_at(dfd, "ep0");
×
1756
                        if (p->fd < 0)
×
1757
                                return log_unit_error_errno(UNIT(s), p->fd, "Failed to open USB FunctionFS ep0: %m");
×
1758

1759
                        r = usbffs_write_descs(p->fd, SERVICE(UNIT_DEREF(s->service)));
×
1760
                        if (r < 0)
×
1761
                                return log_unit_error_errno(UNIT(s), r, "Failed to write to USB FunctionFS ep0: %m");
×
1762

1763
                        r = usbffs_dispatch_eps(p, dfd);
×
1764
                        if (r < 0)
×
1765
                                return log_unit_error_errno(UNIT(s), r, "Failed to dispatch USB FunctionFS eps: %m");
×
1766

1767
                        break;
×
1768
                }
1769

1770
                default:
×
1771
                        assert_not_reached();
×
1772
                }
1773
        }
1774

1775
        TAKE_PTR(s);
1776
        return 0;
1777
}
1778

1779
static void socket_unwatch_fds(Socket *s) {
8,080✔
1780
        int r;
8,080✔
1781

1782
        assert(s);
8,080✔
1783

1784
        LIST_FOREACH(port, p, s->ports) {
16,822✔
1785
                if (p->fd < 0)
8,742✔
1786
                        continue;
3,446✔
1787

1788
                r = sd_event_source_set_enabled(p->event_source, SD_EVENT_OFF);
5,296✔
1789
                if (r < 0)
5,296✔
1790
                        log_unit_debug_errno(UNIT(s), r, "Failed to disable event source: %m");
×
1791
        }
1792
}
8,080✔
1793

1794
static int socket_watch_fds(Socket *s) {
4,588✔
1795
        int r;
4,588✔
1796

1797
        assert(s);
4,588✔
1798

1799
        LIST_FOREACH(port, p, s->ports) {
9,553✔
1800
                if (p->fd < 0)
4,965✔
1801
                        continue;
×
1802

1803
                if (p->event_source) {
4,965✔
1804
                        r = sd_event_source_set_enabled(p->event_source, SD_EVENT_ON);
751✔
1805
                        if (r < 0)
751✔
1806
                                goto fail;
×
1807
                } else {
1808
                        r = sd_event_add_io(UNIT(s)->manager->event, &p->event_source, p->fd, EPOLLIN, socket_dispatch_io, p);
4,214✔
1809
                        if (r < 0)
4,214✔
1810
                                goto fail;
×
1811

1812
                        (void) sd_event_source_set_description(p->event_source, "socket-port-io");
4,214✔
1813
                }
1814

1815
                r = sd_event_source_set_ratelimit(p->event_source, s->poll_limit.interval, s->poll_limit.burst);
4,965✔
1816
                if (r < 0)
4,965✔
1817
                        log_unit_debug_errno(UNIT(s), r, "Failed to set poll limit on I/O event source, ignoring: %m");
×
1818
        }
1819

1820
        return 0;
1821

1822
fail:
×
1823
        log_unit_warning_errno(UNIT(s), r, "Failed to watch listening fds: %m");
×
1824
        socket_unwatch_fds(s);
×
1825
        return r;
×
1826
}
1827

1828
enum {
1829
        SOCKET_OPEN_NONE,
1830
        SOCKET_OPEN_SOME,
1831
        SOCKET_OPEN_ALL,
1832
};
1833

1834
static int socket_check_open(Socket *s) {
1,137✔
1835
        bool have_open = false, have_closed = false;
1,137✔
1836

1837
        assert(s);
1,137✔
1838

1839
        LIST_FOREACH(port, p, s->ports) {
2,397✔
1840
                if (p->fd < 0)
1,260✔
1841
                        have_closed = true;
1842
                else
1843
                        have_open = true;
1,260✔
1844

1845
                if (have_open && have_closed)
1,260✔
1846
                        return SOCKET_OPEN_SOME;
1847
        }
1848

1849
        if (have_open)
1,137✔
1850
                return SOCKET_OPEN_ALL;
1,137✔
1851

1852
        return SOCKET_OPEN_NONE;
1853
}
1854

1855
static void socket_set_state(Socket *s, SocketState state) {
12,668✔
1856
        SocketState old_state;
12,668✔
1857

1858
        assert(s);
12,668✔
1859

1860
        if (s->state != state)
12,668✔
1861
                bus_unit_send_pending_change_signal(UNIT(s), false);
11,301✔
1862

1863
        old_state = s->state;
12,668✔
1864
        s->state = state;
12,668✔
1865

1866
        if (!SOCKET_STATE_WITH_PROCESS(state) && state != SOCKET_DEFERRED)
12,668✔
1867
                s->timer_event_source = sd_event_source_disable_unref(s->timer_event_source);
12,472✔
1868

1869
        if (!SOCKET_STATE_WITH_PROCESS(state)) {
12,668✔
1870
                socket_unwatch_control_pid(s);
12,472✔
1871
                s->control_command = NULL;
12,472✔
1872
                s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
12,472✔
1873
        }
1874

1875
        if (state != SOCKET_LISTENING)
12,668✔
1876
                socket_unwatch_fds(s);
8,080✔
1877

1878
        if (!IN_SET(state,
8,080✔
1879
                    SOCKET_START_OPEN,
1880
                    SOCKET_START_CHOWN,
1881
                    SOCKET_START_POST,
1882
                    SOCKET_LISTENING,
1883
                    SOCKET_DEFERRED,
1884
                    SOCKET_RUNNING,
1885
                    SOCKET_STOP_PRE,
1886
                    SOCKET_STOP_PRE_SIGTERM,
1887
                    SOCKET_STOP_PRE_SIGKILL))
1888
                socket_close_fds(s);
2,707✔
1889

1890
        if (state != SOCKET_DEFERRED)
12,668✔
1891
                unit_remove_from_stop_notify_queue(UNIT(s));
12,668✔
1892

1893
        if (state != old_state)
12,668✔
1894
                log_unit_debug(UNIT(s), "Changed %s -> %s", socket_state_to_string(old_state), socket_state_to_string(state));
11,301✔
1895

1896
        unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state], /* reload_success = */ true);
12,668✔
1897
}
12,668✔
1898

1899
static int socket_coldplug(Unit *u) {
2,844✔
1900
        Socket *s = ASSERT_PTR(SOCKET(u));
2,844✔
1901
        int r;
2,844✔
1902

1903
        assert(s->state == SOCKET_DEAD);
2,844✔
1904

1905
        if (s->deserialized_state == s->state)
2,844✔
1906
                return 0;
1907

1908
        /* Patch "deferred" back to "listening" and let socket_enter_running() figure out what to do.
1909
         * This saves us the trouble of handling flipping of DeferTrigger= vs Accept= during reload. */
1910
        if (s->deserialized_state == SOCKET_DEFERRED)
1,137✔
1911
                s->deserialized_state = SOCKET_LISTENING;
×
1912

1913
        if (pidref_is_set(&s->control_pid) &&
1,137✔
1914
            pidref_is_unwaited(&s->control_pid) > 0 &&
×
1915
            SOCKET_STATE_WITH_PROCESS(s->deserialized_state)) {
×
1916

1917
                r = unit_watch_pidref(UNIT(s), &s->control_pid, /* exclusive= */ false);
×
1918
                if (r < 0)
×
1919
                        return r;
1920

1921
                r = socket_arm_timer(s, /* relative= */ false, usec_add(u->state_change_timestamp.monotonic, s->timeout_usec));
×
1922
                if (r < 0)
×
1923
                        return r;
1924
        }
1925

1926
        if (IN_SET(s->deserialized_state,
1,137✔
1927
                   SOCKET_START_OPEN,
1928
                   SOCKET_START_CHOWN,
1929
                   SOCKET_START_POST,
1930
                   SOCKET_LISTENING,
1931
                   SOCKET_RUNNING)) {
1932

1933
                /* Originally, we used to simply reopen all sockets here that we didn't have file descriptors
1934
                 * for. However, this is problematic, as we won't traverse through the SOCKET_START_CHOWN
1935
                 * state for them, and thus the UID/GID wouldn't be right. Hence, instead simply check if we
1936
                 * have all fds open, and if there's a mismatch, warn loudly.
1937
                 *
1938
                 * Note that SOCKET_START_OPEN requires no special treatment, as it's only intermediate
1939
                 * between SOCKET_START_PRE and SOCKET_START_CHOWN and shall otherwise not be observed.
1940
                 * It's listed only for consistency. */
1941

1942
                r = socket_check_open(s);
1,137✔
1943
                if (r == SOCKET_OPEN_NONE)
1,137✔
1944
                        log_unit_warning(UNIT(s),
×
1945
                                         "Unit configuration changed while unit was running, "
1946
                                         "and no socket file descriptors are open. "
1947
                                         "Unit not functional until restarted.");
1948
                else if (r == SOCKET_OPEN_SOME)
1,137✔
1949
                        log_unit_warning(UNIT(s),
×
1950
                                         "Unit configuration changed while unit was running, "
1951
                                         "and some socket file descriptors have not been opened yet. "
1952
                                         "Unit not fully functional until restarted.");
1953
        }
1954

1955
        if (s->deserialized_state == SOCKET_LISTENING) {
1,137✔
1956
                r = socket_watch_fds(s);
672✔
1957
                if (r < 0)
672✔
1958
                        return r;
1959
        }
1960

1961
        if (!IN_SET(s->deserialized_state, SOCKET_DEAD, SOCKET_FAILED, SOCKET_CLEANING))
1,137✔
1962
                (void) unit_setup_exec_runtime(u);
1,137✔
1963

1964
        socket_set_state(s, s->deserialized_state);
1,137✔
1965
        return 0;
1,137✔
1966
}
1967

1968
static int socket_spawn(Socket *s, ExecCommand *c, PidRef *ret_pid) {
195✔
1969
        _cleanup_(exec_params_shallow_clear) ExecParameters exec_params = EXEC_PARAMETERS_INIT(
195✔
1970
                        EXEC_APPLY_SANDBOXING|EXEC_APPLY_CHROOT|EXEC_APPLY_TTY_STDIN);
1971
        _cleanup_(pidref_done) PidRef pidref = PIDREF_NULL;
195✔
1972
        int r;
195✔
1973

1974
        assert(s);
195✔
1975
        assert(c);
195✔
1976
        assert(ret_pid);
195✔
1977

1978
        r = unit_prepare_exec(UNIT(s));
195✔
1979
        if (r < 0)
195✔
1980
                return r;
1981

1982
        r = socket_arm_timer(s, /* relative= */ true, s->timeout_usec);
195✔
1983
        if (r < 0)
195✔
1984
                return r;
1985

1986
        r = unit_set_exec_params(UNIT(s), &exec_params);
195✔
1987
        if (r < 0)
195✔
1988
                return r;
1989

1990
        /* Note that ExecStartPre= command doesn't inherit any FDs. It runs before we open listen FDs. */
1991
        if (s->pass_fds_to_exec) {
195✔
1992
                _cleanup_strv_free_ char **fd_names = NULL;
×
1993
                _cleanup_free_ int *fds = NULL;
×
1994
                int n_fds;
×
1995

1996
                n_fds = socket_collect_fds(s, &fds);
×
1997
                if (n_fds < 0)
×
1998
                        return n_fds;
1999

2000
                r = strv_extend_n(&fd_names, socket_fdname(s), n_fds);
×
2001
                if (r < 0)
×
2002
                        return r;
2003

2004
                exec_params.fds = TAKE_PTR(fds);
×
2005
                exec_params.fd_names = TAKE_PTR(fd_names);
×
2006
                exec_params.n_socket_fds = n_fds;
×
2007
        }
2008

2009
        r = exec_spawn(UNIT(s),
195✔
2010
                       c,
2011
                       &s->exec_context,
195✔
2012
                       &exec_params,
2013
                       s->exec_runtime,
2014
                       &s->cgroup_context,
195✔
2015
                       &pidref);
2016
        if (r < 0)
195✔
2017
                return r;
2018

2019
        r = unit_watch_pidref(UNIT(s), &pidref, /* exclusive= */ true);
195✔
2020
        if (r < 0)
195✔
2021
                return r;
2022

2023
        *ret_pid = TAKE_PIDREF(pidref);
195✔
2024
        return 0;
195✔
2025
}
2026

2027
static int socket_chown(Socket *s, PidRef *ret_pid) {
×
2028
        _cleanup_(pidref_done) PidRef pid = PIDREF_NULL;
×
2029
        int r;
×
2030

2031
        assert(s);
×
2032

2033
        r = socket_arm_timer(s, /* relative= */ true, s->timeout_usec);
×
2034
        if (r < 0)
×
2035
                return r;
2036

2037
        /* We have to resolve the user names out-of-process, hence
2038
         * let's fork here. It's messy, but well, what can we do? */
2039

2040
        r = unit_fork_helper_process(UNIT(s), "(sd-chown)", /* into_cgroup= */ true, &pid);
×
2041
        if (r < 0)
3✔
2042
                return r;
2043
        if (r == 0) {
3✔
2044
                uid_t uid = UID_INVALID;
3✔
2045
                gid_t gid = GID_INVALID;
3✔
2046

2047
                /* Child */
2048

2049
                if (!isempty(s->user)) {
3✔
2050
                        const char *user = s->user;
1✔
2051

2052
                        r = get_user_creds(&user, &uid, &gid, NULL, NULL, 0);
1✔
2053
                        if (r < 0) {
1✔
2054
                                log_unit_error_errno(UNIT(s), r, "Failed to resolve user %s: %m", user);
×
2055
                                _exit(EXIT_USER);
×
2056
                        }
2057
                }
2058

2059
                if (!isempty(s->group)) {
3✔
2060
                        const char *group = s->group;
3✔
2061

2062
                        r = get_group_creds(&group, &gid, 0);
3✔
2063
                        if (r < 0) {
3✔
2064
                                log_unit_error_errno(UNIT(s), r, "Failed to resolve group %s: %m", group);
×
2065
                                _exit(EXIT_GROUP);
×
2066
                        }
2067
                }
2068

2069
                LIST_FOREACH(port, p, s->ports) {
6✔
2070
                        const char *path = NULL;
3✔
2071

2072
                        if (p->type == SOCKET_SOCKET)
3✔
2073
                                path = socket_address_get_path(&p->address);
2✔
2074
                        else if (p->type == SOCKET_FIFO)
1✔
2075
                                path = p->path;
×
2076
                        else if (p->type == SOCKET_MQUEUE) {
1✔
2077
                                /* Use fchown on the fd since /dev/mqueue might not be mounted. */
2078
                                if (fchown(p->fd, uid, gid) < 0) {
1✔
2079
                                        log_unit_error_errno(UNIT(s), errno, "Failed to fchown(): %m");
×
2080
                                        _exit(EXIT_CHOWN);
×
2081
                                }
2082
                                continue;
1✔
2083
                        }
2084

2085
                        if (!path)
2✔
2086
                                continue;
×
2087

2088
                        if (chown(path, uid, gid) < 0) {
2✔
2089
                                log_unit_error_errno(UNIT(s), errno, "Failed to chown(): %m");
×
2090
                                _exit(EXIT_CHOWN);
×
2091
                        }
2092
                }
2093

2094
                _exit(EXIT_SUCCESS);
3✔
2095
        }
2096

2097
        r = unit_watch_pidref(UNIT(s), &pid, /* exclusive= */ true);
×
2098
        if (r < 0)
×
2099
                return r;
2100

2101
        *ret_pid = TAKE_PIDREF(pid);
×
2102
        return 0;
×
2103
}
2104

2105
static void socket_enter_dead(Socket *s, SocketResult f) {
2,707✔
2106
        assert(s);
2,707✔
2107

2108
        if (s->result == SOCKET_SUCCESS)
2,707✔
2109
                s->result = f;
2,707✔
2110

2111
        if (s->result == SOCKET_SUCCESS)
2,707✔
2112
                unit_log_success(UNIT(s));
2,707✔
2113
        else
2114
                unit_log_failure(UNIT(s), socket_result_to_string(s->result));
×
2115

2116
        unit_warn_leftover_processes(UNIT(s), /* start = */ false);
2,707✔
2117

2118
        socket_set_state(s, s->result != SOCKET_SUCCESS ? SOCKET_FAILED : SOCKET_DEAD);
5,414✔
2119

2120
        s->exec_runtime = exec_runtime_destroy(s->exec_runtime);
2,707✔
2121

2122
        unit_destroy_runtime_data(UNIT(s), &s->exec_context, /* destroy_runtime_dir = */ true);
2,707✔
2123

2124
        unit_unref_uid_gid(UNIT(s), true);
2,707✔
2125
}
2,707✔
2126

2127
static void socket_enter_signal(Socket *s, SocketState state, SocketResult f);
2128

2129
static void socket_enter_stop_post(Socket *s, SocketResult f) {
2,707✔
2130
        int r;
2,707✔
2131

2132
        assert(s);
2,707✔
2133

2134
        if (s->result == SOCKET_SUCCESS)
2,707✔
2135
                s->result = f;
2,707✔
2136

2137
        socket_unwatch_control_pid(s);
2,707✔
2138
        s->control_command_id = SOCKET_EXEC_STOP_POST;
2,707✔
2139
        s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST];
2,707✔
2140

2141
        if (s->control_command) {
2,707✔
2142
                pidref_done(&s->control_pid);
×
2143

2144
                r = socket_spawn(s, s->control_command, &s->control_pid);
×
2145
                if (r < 0) {
×
2146
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'stop-post' task: %m");
×
2147
                        socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_RESOURCES);
×
2148
                        return;
×
2149
                }
2150

2151
                socket_set_state(s, SOCKET_STOP_POST);
×
2152
        } else
2153
                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_SUCCESS);
2,707✔
2154
}
2155

2156
static int state_to_kill_operation(Socket *s, SocketState state) {
5,415✔
2157
        assert(s);
5,415✔
2158

2159
        if (state == SOCKET_STOP_PRE_SIGTERM)
5,415✔
2160
                return unit_has_job_type(UNIT(s), JOB_RESTART) ? KILL_RESTART : KILL_TERMINATE;
2✔
2161

2162
        if (state == SOCKET_FINAL_SIGTERM)
5,414✔
2163
                return KILL_TERMINATE;
2,707✔
2164

2165
        return KILL_KILL;
2166
}
2167

2168
static void socket_enter_signal(Socket *s, SocketState state, SocketResult f) {
5,415✔
2169
        int r;
5,415✔
2170

2171
        assert(s);
5,415✔
2172

2173
        if (s->result == SOCKET_SUCCESS)
5,415✔
2174
                s->result = f;
5,415✔
2175

2176
        r = unit_kill_context(UNIT(s), state_to_kill_operation(s, state));
5,415✔
2177
        if (r < 0) {
5,415✔
2178
                log_unit_warning_errno(UNIT(s), r, "Failed to kill processes: %m");
×
2179
                goto fail;
×
2180
        }
2181
        if (r > 0) {
5,415✔
2182
                r = socket_arm_timer(s, /* relative= */ true, s->timeout_usec);
1✔
2183
                if (r < 0) {
1✔
2184
                        log_unit_warning_errno(UNIT(s), r, "Failed to install timer: %m");
×
2185
                        goto fail;
×
2186
                }
2187

2188
                socket_set_state(s, state);
1✔
2189
        } else if (state == SOCKET_STOP_PRE_SIGTERM)
5,414✔
2190
                socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, SOCKET_SUCCESS);
×
2191
        else if (state == SOCKET_STOP_PRE_SIGKILL)
5,414✔
2192
                socket_enter_stop_post(s, SOCKET_SUCCESS);
×
2193
        else if (state == SOCKET_FINAL_SIGTERM)
5,414✔
2194
                socket_enter_signal(s, SOCKET_FINAL_SIGKILL, SOCKET_SUCCESS);
2,707✔
2195
        else
2196
                socket_enter_dead(s, SOCKET_SUCCESS);
2,707✔
2197

2198
        return;
2199

2200
fail:
×
2201
        if (IN_SET(state, SOCKET_STOP_PRE_SIGTERM, SOCKET_STOP_PRE_SIGKILL))
×
2202
                socket_enter_stop_post(s, SOCKET_FAILURE_RESOURCES);
×
2203
        else
2204
                socket_enter_dead(s, SOCKET_FAILURE_RESOURCES);
×
2205
}
2206

2207
static void socket_enter_stop_pre(Socket *s, SocketResult f) {
2,706✔
2208
        int r;
2,706✔
2209

2210
        assert(s);
2,706✔
2211

2212
        if (s->result == SOCKET_SUCCESS)
2,706✔
2213
                s->result = f;
2,706✔
2214

2215
        socket_unwatch_control_pid(s);
2,706✔
2216
        s->control_command_id = SOCKET_EXEC_STOP_PRE;
2,706✔
2217
        s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE];
2,706✔
2218

2219
        if (s->control_command) {
2,706✔
2220
                pidref_done(&s->control_pid);
3✔
2221

2222
                r = socket_spawn(s, s->control_command, &s->control_pid);
3✔
2223
                if (r < 0) {
3✔
2224
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'stop-pre' task: %m");
×
2225
                        socket_enter_stop_post(s, SOCKET_FAILURE_RESOURCES);
×
2226
                        return;
×
2227
                }
2228

2229
                socket_set_state(s, SOCKET_STOP_PRE);
3✔
2230
        } else
2231
                socket_enter_stop_post(s, SOCKET_SUCCESS);
2,703✔
2232
}
2233

2234
static void flush_ports(Socket *s) {
1✔
2235
        assert(s);
1✔
2236

2237
        /* Flush all incoming traffic, regardless if actual bytes or new connections, so that this socket isn't busy
2238
         * anymore */
2239

2240
        LIST_FOREACH(port, p, s->ports) {
2✔
2241
                if (p->fd < 0)
1✔
2242
                        continue;
×
2243

2244
                if (p->type == SOCKET_MQUEUE)
1✔
2245
                        (void) flush_mqueue(p->fd);
×
2246
                else {
2247
                        (void) flush_accept(p->fd);
1✔
2248
                        (void) flush_fd(p->fd);
1✔
2249
                }
2250
        }
2251
}
1✔
2252

2253
static void socket_enter_listening(Socket *s) {
3,916✔
2254
        int r;
3,916✔
2255

2256
        assert(s);
3,916✔
2257

2258
        if (!s->accept && s->flush_pending) {
3,916✔
2259
                log_unit_debug(UNIT(s), "Flushing socket before listening.");
×
2260
                flush_ports(s);
×
2261
        }
2262

2263
        r = socket_watch_fds(s);
3,916✔
2264
        if (r < 0) {
3,916✔
2265
                log_unit_warning_errno(UNIT(s), r, "Failed to watch sockets: %m");
×
2266
                socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2267
                return;
×
2268
        }
2269

2270
        socket_set_state(s, SOCKET_LISTENING);
3,916✔
2271
}
2272

2273
static void socket_enter_start_post(Socket *s) {
3,158✔
2274
        int r;
3,158✔
2275

2276
        assert(s);
3,158✔
2277

2278
        socket_unwatch_control_pid(s);
3,158✔
2279
        s->control_command_id = SOCKET_EXEC_START_POST;
3,158✔
2280
        s->control_command = s->exec_command[SOCKET_EXEC_START_POST];
3,158✔
2281

2282
        if (s->control_command) {
3,158✔
2283
                pidref_done(&s->control_pid);
192✔
2284

2285
                r = socket_spawn(s, s->control_command, &s->control_pid);
192✔
2286
                if (r < 0) {
192✔
2287
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'start-post' task: %m");
×
2288
                        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2289
                        return;
×
2290
                }
2291

2292
                socket_set_state(s, SOCKET_START_POST);
192✔
2293
        } else
2294
                socket_enter_listening(s);
2,966✔
2295
}
2296

2297
static void socket_enter_start_chown(Socket *s) {
3,158✔
2298
        int r;
3,158✔
2299

2300
        assert(s);
3,158✔
2301
        assert(s->state == SOCKET_START_OPEN);
3,158✔
2302

2303
        if (!isempty(s->user) || !isempty(s->group)) {
3,158✔
2304

2305
                socket_unwatch_control_pid(s);
×
2306
                s->control_command_id = SOCKET_EXEC_START_CHOWN;
×
2307
                s->control_command = NULL;
×
2308

2309
                r = socket_chown(s, &s->control_pid);
×
2310
                if (r < 0) {
×
2311
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'start-chown' task: %m");
×
2312
                        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2313
                        return;
×
2314
                }
2315

2316
                socket_set_state(s, SOCKET_START_CHOWN);
×
2317
        } else
2318
                socket_enter_start_post(s);
3,158✔
2319
}
2320

2321
static void socket_enter_start_open(Socket *s) {
3,158✔
2322
        int r;
3,158✔
2323

2324
        assert(s);
3,158✔
2325
        assert(IN_SET(s->state, SOCKET_DEAD, SOCKET_FAILED, SOCKET_START_PRE));
3,158✔
2326

2327
        /* We force a state transition here even though we're not spawning any process (i.e. the state is purely
2328
         * intermediate), so that failure of socket_open_fds() always causes a state change in unit_notify().
2329
         * Otherwise, if no Exec*= is defined, we might go from previous SOCKET_FAILED to SOCKET_FAILED,
2330
         * meaning the OnFailure= deps are unexpectedly skipped (#35635). */
2331

2332
        socket_set_state(s, SOCKET_START_OPEN);
3,158✔
2333

2334
        r = socket_open_fds(s);
3,158✔
2335
        if (r < 0) {
3,158✔
2336
                log_unit_error_errno(UNIT(s), r, "Failed to listen on sockets: %m");
×
2337
                socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2338
                return;
×
2339
        }
2340

2341
        socket_enter_start_chown(s);
3,158✔
2342
}
2343

2344
static void socket_enter_start_pre(Socket *s) {
3,158✔
2345
        int r;
3,158✔
2346

2347
        assert(s);
3,158✔
2348

2349
        socket_unwatch_control_pid(s);
3,158✔
2350

2351
        unit_warn_leftover_processes(UNIT(s), /* start = */ true);
3,158✔
2352

2353
        s->control_command_id = SOCKET_EXEC_START_PRE;
3,158✔
2354
        s->control_command = s->exec_command[SOCKET_EXEC_START_PRE];
3,158✔
2355

2356
        if (s->control_command) {
3,158✔
2357
                pidref_done(&s->control_pid);
×
2358

2359
                r = socket_spawn(s, s->control_command, &s->control_pid);
×
2360
                if (r < 0) {
×
2361
                        log_unit_warning_errno(UNIT(s), r, "Failed to spawn 'start-pre' task: %m");
×
2362
                        socket_enter_dead(s, SOCKET_FAILURE_RESOURCES);
×
2363
                        return;
×
2364
                }
2365

2366
                socket_set_state(s, SOCKET_START_PRE);
×
2367
        } else
2368
                socket_enter_start_open(s);
3,158✔
2369
}
2370

2371
static bool socket_may_defer(Socket *s) {
×
2372
        assert(s);
×
2373

2374
        switch (s->defer_trigger) {
×
2375

2376
        case SOCKET_DEFER_NO:
2377
                return false;
2378

2379
        case SOCKET_DEFER_YES:
2380
                return !hashmap_isempty(UNIT(s)->manager->jobs);
×
2381

2382
        case SOCKET_DEFER_PATIENT:
×
2383
                assert(s->defer_trigger_max_usec > 0);
×
2384
                return true;
2385

2386
        default:
×
2387
                assert_not_reached();
×
2388
        }
2389
}
2390

2391
static bool socket_stop_notify(Unit *u) {
×
2392
        Socket *s = ASSERT_PTR(SOCKET(u));
×
2393
        _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
×
2394
        int r;
×
2395

2396
        assert(s->state == SOCKET_DEFERRED);
×
2397

2398
        r = manager_add_job(u->manager, JOB_START, UNIT_DEREF(s->service), JOB_LENIENT, &error, /* ret = */ NULL);
×
2399
        if (r >= 0) { /* Yay! */
×
2400
                socket_set_state(s, SOCKET_RUNNING);
×
2401
                return true; /* changed */
2402
        }
2403
        if (sd_bus_error_has_name(&error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE)) {
×
2404
                if (s->defer_trigger == SOCKET_DEFER_PATIENT || !hashmap_isempty(u->manager->jobs))
×
2405
                        /* Wait for some more */
2406
                        return false;
2407

2408
                log_unit_warning_errno(u, r, "Service conflicts with active units even after all jobs have completed, giving up.");
×
2409
        } else
2410
                log_unit_warning_errno(u, r, "Failed to queue service startup job: %s", bus_error_message(&error, r));
×
2411

2412
        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2413
        return true; /* changed */
2414
}
2415

2416
static void socket_enter_deferred(Socket *s) {
×
2417
        int r;
×
2418

2419
        assert(s);
×
2420
        assert(socket_may_defer(s));
×
2421

2422
        /* So here's the thing: if there're currently units conflicting with the service we shall be
2423
         * triggering, and the previous transaction is still running (job pool is not empty), let's
2424
         * defer the activation a bit, and recheck upon any unit stop. IOW, the trigger in question
2425
         * becomes bound to the conflicting dependency, and not the socket IO because we never process them.
2426
         * Put a safety net around all this though, i.e. give up if the service still can't be started
2427
         * even after all existing jobs have completed, or DeferTriggerMaxSec= is reached. */
2428

2429
        r = socket_arm_timer(s, /* relative = */ true, s->defer_trigger_max_usec);
×
2430
        if (r < 0) {
×
2431
                log_unit_warning_errno(UNIT(s), r, "Failed to install timer: %m");
×
2432
                return socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2433
        }
2434

2435
        unit_add_to_stop_notify_queue(UNIT(s));
×
2436

2437
        /* Disable IO event sources */
2438
        socket_set_state(s, SOCKET_DEFERRED);
×
2439
}
2440

2441
static void socket_enter_running(Socket *s, int cfd_in) {
163✔
2442
        /* Note that this call takes possession of the connection fd passed. It either has to assign it
2443
         * somewhere or close it. */
2444
        _cleanup_close_ int cfd = cfd_in;
163✔
2445
        _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
163✔
2446
        int r;
163✔
2447

2448
        assert(s);
163✔
2449

2450
        /* We don't take connections anymore if we are supposed to shut down anyway */
2451
        if (unit_stop_pending(UNIT(s))) {
163✔
2452

2453
                log_unit_debug(UNIT(s), "Suppressing connection request since unit stop is scheduled.");
1✔
2454

2455
                if (cfd >= 0)
1✔
2456
                        goto refuse;
×
2457

2458
                flush_ports(s);
1✔
2459
                return;
2460
        }
2461

2462
        if (s->state == SOCKET_DEFERRED) {
162✔
2463
                assert(cfd < 0);
×
2464
                return;
2465
        }
2466

2467
        if (!ratelimit_below(&s->trigger_limit)) {
162✔
2468
                log_unit_warning(UNIT(s), "Trigger limit hit, refusing further activation.");
×
2469
                socket_enter_stop_pre(s, SOCKET_FAILURE_TRIGGER_LIMIT_HIT);
×
2470
                goto refuse;
×
2471
        }
2472

2473
        if (cfd < 0) { /* Accept=no case */
162✔
2474
                bool pending = false;
160✔
2475
                Unit *other;
160✔
2476

2477
                /* If there's already a start pending don't bother to do anything */
2478
                UNIT_FOREACH_DEPENDENCY(other, UNIT(s), UNIT_ATOM_TRIGGERS)
559✔
2479
                        if (unit_active_or_pending(other)) {
160✔
2480
                                pending = true;
2481
                                break;
2482
                        }
2483

2484
                if (!pending) {
160✔
2485
                        if (!UNIT_ISSET(s->service)) {
79✔
2486
                                log_unit_warning(UNIT(s),
×
2487
                                                 "Service to activate vanished, refusing activation.");
2488
                                goto fail;
×
2489
                        }
2490

2491
                        if (s->defer_trigger != SOCKET_DEFER_NO) {
79✔
2492
                                r = manager_add_job(UNIT(s)->manager, JOB_START, UNIT_DEREF(s->service), JOB_LENIENT, &error, /* ret = */ NULL);
×
2493
                                if (r < 0 && sd_bus_error_has_name(&error, BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE) && socket_may_defer(s))
×
2494
                                        /* We only check BUS_ERROR_TRANSACTION_IS_DESTRUCTIVE here, not
2495
                                         * BUS_ERROR_TRANSACTION_JOBS_CONFLICTING or BUS_ERROR_TRANSACTION_ORDER_IS_CYCLIC,
2496
                                         * since those are errors in a single transaction, which are most likely
2497
                                         * caused by dependency issues in the unit configuration.
2498
                                         * Deferring activation probably won't help. */
2499
                                        return socket_enter_deferred(s);
×
2500
                        } else
2501
                                r = manager_add_job(UNIT(s)->manager, JOB_START, UNIT_DEREF(s->service), JOB_REPLACE, &error, /* ret = */ NULL);
79✔
2502
                        if (r < 0)
79✔
2503
                                goto queue_error;
×
2504
                }
2505

2506
                socket_set_state(s, SOCKET_RUNNING);
160✔
2507
        } else { /* Accept=yes case */
2508
                _cleanup_(socket_peer_unrefp) SocketPeer *p = NULL;
2✔
2509
                Unit *service;
2✔
2510

2511
                if (s->n_connections >= s->max_connections) {
2✔
2512
                        log_unit_warning(UNIT(s), "Too many incoming connections (%u), dropping connection.",
×
2513
                                         s->n_connections);
2514
                        goto refuse;
×
2515
                }
2516

2517
                if (s->max_connections_per_source > 0) {
2✔
2518
                        r = socket_acquire_peer(s, cfd, &p);
2✔
2519
                        if (ERRNO_IS_NEG_DISCONNECT(r))
2✔
2520
                                return;
2521
                        if (r < 0)
2✔
2522
                                /* We didn't have enough resources to acquire peer information, let's fail. */
2523
                                goto fail;
×
2524
                        if (r > 0 && p->n_ref > s->max_connections_per_source) {
2✔
2525
                                _cleanup_free_ char *t = NULL;
×
2526

2527
                                if (p->peer.sa.sa_family == AF_UNIX)
×
2528
                                        (void) asprintf(&t, "UID " UID_FMT, p->peer_cred.uid);
×
2529
                                else
2530
                                        (void) sockaddr_pretty(&p->peer.sa, p->peer_salen, /* translate_ipv6= */ true, /* include_port= */ false, &t);
×
2531

2532
                                log_unit_warning(UNIT(s),
×
2533
                                                 "Too many incoming connections (%u) from source %s, dropping connection.",
2534
                                                 p->n_ref, strnull(t));
2535
                                goto refuse;
×
2536
                        }
2537
                }
2538

2539
                r = socket_load_service_unit(s, cfd, &service);
2✔
2540
                if (ERRNO_IS_NEG_DISCONNECT(r))
2✔
2541
                        return;
2542
                if (r < 0 || UNIT_IS_LOAD_ERROR(service->load_state)) {
2✔
2543
                        log_unit_warning_errno(UNIT(s), r < 0 ? r : service->load_error,
×
2544
                                               "Failed to load connection service unit: %m");
2545
                        goto fail;
×
2546
                }
2547
                if (service->load_state == UNIT_MASKED) {
2✔
2548
                        log_unit_warning(UNIT(s), "Connection service unit is masked, refusing.");
×
2549
                        goto fail;
×
2550
                }
2551

2552
                s->n_accepted++;
2✔
2553

2554
                r = service_set_socket_fd(SERVICE(service), cfd, s, p, s->selinux_context_from_net);
4✔
2555
                if (ERRNO_IS_NEG_DISCONNECT(r))
2✔
2556
                        return;
2557
                if (r < 0) {
2✔
2558
                        log_unit_warning_errno(UNIT(s), r, "Failed to set socket on service: %m");
×
2559
                        goto fail;
×
2560
                }
2561

2562
                /* We passed ownership of the fd and socket peer to the service now. */
2563
                TAKE_FD(cfd);
2✔
2564
                TAKE_PTR(p);
2✔
2565

2566
                s->n_connections++;
2✔
2567

2568
                r = manager_add_job(UNIT(s)->manager, JOB_START, service, JOB_REPLACE, &error, /* ret = */ NULL);
2✔
2569
                if (r < 0) {
2✔
2570
                        /* We failed to activate the new service, but it still exists. Let's make sure the
2571
                         * service closes and forgets the connection fd again, immediately. */
2572
                        service_release_socket_fd(SERVICE(service));
×
2573
                        goto queue_error;
×
2574
                }
2575

2576
                /* Notify clients about changed counters */
2577
                unit_add_to_dbus_queue(UNIT(s));
2✔
2578
        }
2579

2580
        return;
2581

2582
refuse:
×
2583
        s->n_refused++;
×
2584
        return;
×
2585

2586
queue_error:
×
2587
        log_unit_warning_errno(UNIT(s), r, "Failed to queue service startup job%s: %s",
×
2588
                               cfd >= 0 && !ERRNO_IS_RESOURCE(r) ? " (Maybe the service is missing or is a template unit?)" : "",
2589
                               bus_error_message(&error, r));
2590

2591
fail:
×
2592
        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2593
}
2594

2595
static void socket_run_next(Socket *s) {
×
2596
        int r;
×
2597

2598
        assert(s);
×
2599
        assert(s->control_command);
×
2600
        assert(s->control_command->command_next);
×
2601

2602
        socket_unwatch_control_pid(s);
×
2603

2604
        s->control_command = s->control_command->command_next;
×
2605

2606
        pidref_done(&s->control_pid);
×
2607

2608
        r = socket_spawn(s, s->control_command, &s->control_pid);
×
2609
        if (r < 0) {
×
2610
                log_unit_warning_errno(UNIT(s), r, "Failed to spawn next task: %m");
×
2611

2612
                if (s->state == SOCKET_START_POST)
×
2613
                        socket_enter_stop_pre(s, SOCKET_FAILURE_RESOURCES);
×
2614
                else if (s->state == SOCKET_STOP_POST)
×
2615
                        socket_enter_dead(s, SOCKET_FAILURE_RESOURCES);
×
2616
                else
2617
                        socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_RESOURCES);
×
2618
        }
2619
}
×
2620

2621
static int socket_start(Unit *u) {
3,158✔
2622
        Socket *s = ASSERT_PTR(SOCKET(u));
3,158✔
2623
        int r;
3,158✔
2624

2625
        /* Cannot run this without the service being around */
2626
        if (UNIT_ISSET(s->service)) {
3,158✔
2627
                Service *service = ASSERT_PTR(SERVICE(UNIT_DEREF(s->service)));
2,624✔
2628

2629
                if (UNIT(service)->load_state != UNIT_LOADED)
2,624✔
2630
                        return log_unit_error_errno(u, SYNTHETIC_ERRNO(ENOENT),
×
2631
                                                    "Socket service %s not loaded, refusing.", UNIT(service)->id);
2632

2633
                /* If the service is already active we cannot start the socket */
2634
                if (SOCKET_SERVICE_IS_ACTIVE(service, /* allow_finalize = */ false))
2,624✔
2635
                        return log_unit_error_errno(u, SYNTHETIC_ERRNO(EBUSY),
×
2636
                                                    "Socket service %s already active, refusing.", UNIT(service)->id);
2637
        }
2638

2639
        assert(IN_SET(s->state, SOCKET_DEAD, SOCKET_FAILED));
3,158✔
2640

2641
        r = unit_acquire_invocation_id(u);
3,158✔
2642
        if (r < 0)
3,158✔
2643
                return r;
2644

2645
        s->result = SOCKET_SUCCESS;
3,158✔
2646
        exec_command_reset_status_list_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
3,158✔
2647

2648
        if (s->cgroup_runtime)
3,158✔
2649
                s->cgroup_runtime->reset_accounting = true;
×
2650

2651
        socket_enter_start_pre(s);
3,158✔
2652
        return 1;
3,158✔
2653
}
2654

2655
static int socket_stop(Unit *u) {
2,707✔
2656
        Socket *s = ASSERT_PTR(SOCKET(u));
2,707✔
2657

2658
        /* Already on it */
2659
        if (IN_SET(s->state,
2,707✔
2660
                   SOCKET_STOP_PRE,
2661
                   SOCKET_STOP_PRE_SIGTERM,
2662
                   SOCKET_STOP_PRE_SIGKILL,
2663
                   SOCKET_STOP_POST,
2664
                   SOCKET_FINAL_SIGTERM,
2665
                   SOCKET_FINAL_SIGKILL))
2666
                return 0;
2667

2668
        /* If there's already something running we go directly into
2669
         * kill mode. */
2670
        if (IN_SET(s->state,
2,707✔
2671
                   SOCKET_START_PRE,
2672
                   SOCKET_START_OPEN,
2673
                   SOCKET_START_CHOWN,
2674
                   SOCKET_START_POST)) {
2675
                socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, SOCKET_SUCCESS);
1✔
2676
                return -EAGAIN;
1✔
2677
        }
2678

2679
        /* If we are currently cleaning, then abort it, brutally. */
2680
        if (s->state == SOCKET_CLEANING) {
2,706✔
2681
                socket_enter_signal(s, SOCKET_FINAL_SIGKILL, SOCKET_SUCCESS);
×
2682
                return 0;
×
2683
        }
2684

2685
        assert(IN_SET(s->state, SOCKET_LISTENING, SOCKET_DEFERRED, SOCKET_RUNNING));
2,706✔
2686

2687
        socket_enter_stop_pre(s, SOCKET_SUCCESS);
2,706✔
2688
        return 1;
2,706✔
2689
}
2690

2691
static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
2,311✔
2692
        Socket *s = ASSERT_PTR(SOCKET(u));
2,311✔
2693
        int r;
2,311✔
2694

2695
        assert(f);
2,311✔
2696
        assert(fds);
2,311✔
2697

2698
        (void) serialize_item(f, "state", socket_state_to_string(s->state));
2,311✔
2699
        (void) serialize_item(f, "result", socket_result_to_string(s->result));
2,311✔
2700
        (void) serialize_item_format(f, "n-accepted", "%u", s->n_accepted);
2,311✔
2701
        (void) serialize_item_format(f, "n-refused", "%u", s->n_refused);
2,311✔
2702
        (void) serialize_pidref(f, fds, "control-pid", &s->control_pid);
2,311✔
2703

2704
        if (s->control_command_id >= 0)
2,311✔
2705
                (void) serialize_item(f, "control-command", socket_exec_command_to_string(s->control_command_id));
×
2706

2707
        LIST_FOREACH(port, p, s->ports) {
4,805✔
2708
                int copy;
2,494✔
2709

2710
                if (p->fd < 0)
2,494✔
2711
                        continue;
889✔
2712

2713
                copy = fdset_put_dup(fds, p->fd);
1,605✔
2714
                if (copy < 0)
1,605✔
2715
                        return log_unit_warning_errno(u, copy, "Failed to serialize socket fd: %m");
×
2716

2717
                if (p->type == SOCKET_SOCKET) {
1,605✔
2718
                        _cleanup_free_ char *t = NULL;
1,489✔
2719

2720
                        r = socket_address_print(&p->address, &t);
1,489✔
2721
                        if (r < 0)
1,489✔
2722
                                return log_unit_error_errno(u, r, "Failed to format socket address: %m");
×
2723

2724
                        if (socket_address_family(&p->address) == AF_NETLINK)
1,489✔
2725
                                (void) serialize_item_format(f, "netlink", "%i %s", copy, t);
107✔
2726
                        else
2727
                                (void) serialize_item_format(f, "socket", "%i %i %s", copy, p->address.type, t);
1,382✔
2728
                } else if (p->type == SOCKET_SPECIAL)
116✔
2729
                        (void) serialize_item_format(f, "special", "%i %s", copy, p->path);
18✔
2730
                else if (p->type == SOCKET_MQUEUE)
98✔
2731
                        (void) serialize_item_format(f, "mqueue", "%i %s", copy, p->path);
×
2732
                else if (p->type == SOCKET_USB_FUNCTION)
98✔
2733
                        (void) serialize_item_format(f, "ffs", "%i %s", copy, p->path);
×
2734
                else {
2735
                        assert(p->type == SOCKET_FIFO);
98✔
2736
                        (void) serialize_item_format(f, "fifo", "%i %s", copy, p->path);
98✔
2737
                }
2738
        }
2739

2740
        (void) serialize_ratelimit(f, "trigger-ratelimit", &s->trigger_limit);
2,311✔
2741

2742
        return 0;
2,311✔
2743
}
2744

2745
static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
9,720✔
2746
        Socket *s = ASSERT_PTR(SOCKET(u));
9,720✔
2747
        int r;
9,720✔
2748

2749
        assert(key);
9,720✔
2750
        assert(value);
9,720✔
2751

2752
        if (streq(key, "state")) {
9,720✔
2753
                SocketState state;
1,692✔
2754

2755
                state = socket_state_from_string(value);
1,692✔
2756
                if (state < 0)
1,692✔
2757
                        log_unit_debug(u, "Failed to parse state value: %s", value);
×
2758
                else
2759
                        s->deserialized_state = state;
1,692✔
2760
        } else if (streq(key, "result")) {
8,028✔
2761
                SocketResult f;
1,692✔
2762

2763
                f = socket_result_from_string(value);
1,692✔
2764
                if (f < 0)
1,692✔
2765
                        log_unit_debug(u, "Failed to parse result value: %s", value);
×
2766
                else if (f != SOCKET_SUCCESS)
1,692✔
2767
                        s->result = f;
×
2768

2769
        } else if (streq(key, "n-accepted")) {
6,336✔
2770
                unsigned k;
1,692✔
2771

2772
                if (safe_atou(value, &k) < 0)
1,692✔
2773
                        log_unit_debug(u, "Failed to parse n-accepted value: %s", value);
×
2774
                else
2775
                        s->n_accepted += k;
1,692✔
2776
        } else if (streq(key, "n-refused")) {
4,644✔
2777
                unsigned k;
1,692✔
2778

2779
                if (safe_atou(value, &k) < 0)
1,692✔
2780
                        log_unit_debug(u, "Failed to parse n-refused value: %s", value);
×
2781
                else
2782
                        s->n_refused += k;
1,692✔
2783
        } else if (streq(key, "control-pid")) {
2,952✔
2784

2785
                if (!pidref_is_set(&s->control_pid))
9,720✔
2786
                        (void) deserialize_pidref(fds, value, &s->control_pid);
×
2787

2788
        } else if (streq(key, "control-command")) {
2,952✔
2789
                SocketExecCommand id;
×
2790

2791
                id = socket_exec_command_from_string(value);
×
2792
                if (id < 0)
×
2793
                        log_unit_debug(u, "Failed to parse exec-command value: %s", value);
×
2794
                else {
2795
                        s->control_command_id = id;
×
2796
                        s->control_command = s->exec_command[id];
×
2797
                }
2798
        } else if (streq(key, "fifo")) {
2,952✔
2799
                _cleanup_free_ char *fdv = NULL;
78✔
2800
                bool found = false;
78✔
2801
                int fd;
78✔
2802

2803
                r = extract_first_word(&value, &fdv, NULL, 0);
78✔
2804
                if (r <= 0) {
78✔
2805
                        log_unit_debug(u, "Failed to parse fifo value: %s", value);
×
2806
                        return 0;
×
2807
                }
2808

2809
                fd = parse_fd(fdv);
78✔
2810
                if (fd < 0 || !fdset_contains(fds, fd)) {
78✔
2811
                        log_unit_debug(u, "Invalid fifo value: %s", fdv);
×
2812
                        return 0;
×
2813
                }
2814

2815
                LIST_FOREACH(port, p, s->ports)
117✔
2816
                        if (p->fd < 0 &&
117✔
2817
                            p->type == SOCKET_FIFO &&
78✔
2818
                            path_equal_or_inode_same(p->path, value, 0)) {
78✔
2819
                                p->fd = fdset_remove(fds, fd);
78✔
2820
                                found = true;
78✔
2821
                                break;
78✔
2822
                        }
2823
                if (!found)
78✔
2824
                        log_unit_debug(u, "No matching fifo socket found: %s", value);
×
2825

2826
        } else if (streq(key, "special")) {
2,874✔
2827
                _cleanup_free_ char *fdv = NULL;
15✔
2828
                bool found = false;
15✔
2829
                int fd;
15✔
2830

2831
                r = extract_first_word(&value, &fdv, NULL, 0);
15✔
2832
                if (r <= 0) {
15✔
2833
                        log_unit_debug(u, "Failed to parse special value: %s", value);
×
2834
                        return 0;
×
2835
                }
2836

2837
                fd = parse_fd(fdv);
15✔
2838
                if (fd < 0 || !fdset_contains(fds, fd)) {
15✔
2839
                        log_unit_debug(u, "Invalid special value: %s", fdv);
×
2840
                        return 0;
×
2841
                }
2842

2843
                LIST_FOREACH(port, p, s->ports)
15✔
2844
                        if (p->fd < 0 &&
15✔
2845
                            p->type == SOCKET_SPECIAL &&
15✔
2846
                            path_equal_or_inode_same(p->path, value, 0)) {
15✔
2847
                                p->fd = fdset_remove(fds, fd);
15✔
2848
                                found = true;
15✔
2849
                                break;
15✔
2850
                        }
2851
                if (!found)
15✔
2852
                        log_unit_debug(u, "No matching special socket found: %s", value);
×
2853

2854
        } else if (streq(key, "mqueue")) {
2,859✔
2855
                _cleanup_free_ char *fdv = NULL;
×
2856
                bool found = false;
×
2857
                int fd;
×
2858

2859
                r = extract_first_word(&value, &fdv, NULL, 0);
×
2860
                if (r <= 0) {
×
2861
                        log_unit_debug(u, "Failed to parse mqueue value: %s", value);
×
2862
                        return 0;
×
2863
                }
2864

2865
                fd = parse_fd(fdv);
×
2866
                if (fd < 0 || !fdset_contains(fds, fd)) {
×
2867
                        log_unit_debug(u, "Invalid mqueue value: %s", fdv);
×
2868
                        return 0;
×
2869
                }
2870

2871
                LIST_FOREACH(port, p, s->ports)
×
2872
                        if (p->fd < 0 &&
×
2873
                            p->type == SOCKET_MQUEUE &&
×
2874
                            streq(p->path, value)) {
×
2875
                                p->fd = fdset_remove(fds, fd);
×
2876
                                found = true;
×
2877
                                break;
×
2878
                        }
2879
                if (!found)
×
2880
                        log_unit_debug(u, "No matching mqueue socket found: %s", value);
×
2881

2882
        } else if (streq(key, "socket")) {
2,859✔
2883
                _cleanup_free_ char *fdv = NULL, *typev = NULL;
1,092✔
2884
                bool found = false;
1,092✔
2885
                int fd, type;
1,092✔
2886

2887
                r = extract_first_word(&value, &fdv, NULL, 0);
1,092✔
2888
                if (r <= 0) {
1,092✔
2889
                        log_unit_debug(u, "Failed to parse socket fd from value: %s", value);
×
2890
                        return 0;
×
2891
                }
2892

2893
                fd = parse_fd(fdv);
1,092✔
2894
                if (fd < 0 || !fdset_contains(fds, fd)) {
1,092✔
2895
                        log_unit_debug(u, "Invalid socket fd: %s", fdv);
×
2896
                        return 0;
×
2897
                }
2898

2899
                r = extract_first_word(&value, &typev, NULL, 0);
1,092✔
2900
                if (r <= 0) {
1,092✔
2901
                        log_unit_debug(u, "Failed to parse socket type from value: %s", value);
×
2902
                        return 0;
×
2903
                }
2904

2905
                if (safe_atoi(typev, &type) < 0 || type < 0) {
1,092✔
2906
                        log_unit_debug(u, "Invalid socket type: %s", typev);
×
2907
                        return 0;
×
2908
                }
2909

2910
                LIST_FOREACH(port, p, s->ports)
1,176✔
2911
                        if (p->fd < 0 &&
2,268✔
2912
                            socket_address_is(&p->address, value, type)) {
1,092✔
2913
                                p->fd = fdset_remove(fds, fd);
1,092✔
2914
                                found = true;
1,092✔
2915
                                break;
1,092✔
2916
                        }
2917
                if (!found)
1,092✔
2918
                        log_unit_debug(u, "No matching %s socket found: %s",
×
2919
                                       socket_address_type_to_string(type), value);
2920

2921
        } else if (streq(key, "netlink")) {
1,767✔
2922
                _cleanup_free_ char *fdv = NULL;
75✔
2923
                bool found = false;
75✔
2924
                int fd;
75✔
2925

2926
                r = extract_first_word(&value, &fdv, NULL, 0);
75✔
2927
                if (r <= 0) {
75✔
2928
                        log_unit_debug(u, "Failed to parse socket value: %s", value);
×
2929
                        return 0;
×
2930
                }
2931

2932
                fd = parse_fd(fdv);
75✔
2933
                if (fd < 0 || !fdset_contains(fds, fd)) {
75✔
2934
                        log_unit_debug(u, "Invalid socket value: %s", fdv);
×
2935
                        return 0;
×
2936
                }
2937

2938
                LIST_FOREACH(port, p, s->ports)
75✔
2939
                        if (p->fd < 0 &&
150✔
2940
                            socket_address_is_netlink(&p->address, value)) {
75✔
2941
                                p->fd = fdset_remove(fds, fd);
75✔
2942
                                found = true;
75✔
2943
                                break;
75✔
2944
                        }
2945
                if (!found)
75✔
2946
                        log_unit_debug(u, "No matching netlink socket found: %s", value);
×
2947

2948
        } else if (streq(key, "ffs")) {
1,692✔
2949
                _cleanup_free_ char *fdv = NULL;
×
2950
                bool found = false;
×
2951
                int fd;
×
2952

2953
                r = extract_first_word(&value, &fdv, NULL, 0);
×
2954
                if (r <= 0) {
×
2955
                        log_unit_debug(u, "Failed to parse ffs value: %s", value);
×
2956
                        return 0;
×
2957
                }
2958

2959
                fd = parse_fd(fdv);
×
2960
                if (fd < 0 || !fdset_contains(fds, fd)) {
×
2961
                        log_unit_debug(u, "Invalid ffs value: %s", fdv);
×
2962
                        return 0;
×
2963
                }
2964

2965
                LIST_FOREACH(port, p, s->ports)
×
2966
                        if (p->fd < 0 &&
×
2967
                            p->type == SOCKET_USB_FUNCTION &&
×
2968
                            path_equal_or_inode_same(p->path, value, 0)) {
×
2969
                                p->fd = fdset_remove(fds, fd);
×
2970
                                found = true;
×
2971
                                break;
×
2972
                        }
2973
                if (!found)
×
2974
                        log_unit_debug(u, "No matching ffs socket found: %s", value);
×
2975

2976
        } else if (streq(key, "trigger-ratelimit"))
1,692✔
2977
                (void) deserialize_ratelimit(&s->trigger_limit, key, value);
1,692✔
2978
        else
2979
                log_unit_debug(UNIT(s), "Unknown serialization key: %s", key);
×
2980

2981
        return 0;
2982
}
2983

2984
static void socket_distribute_fds(Unit *u, FDSet *fds) {
774✔
2985
        Socket *s = ASSERT_PTR(SOCKET(u));
774✔
2986

2987
        LIST_FOREACH(port, p, s->ports) {
1,606✔
2988
                int fd;
832✔
2989

2990
                if (p->type != SOCKET_SOCKET)
832✔
2991
                        continue;
43✔
2992

2993
                if (p->fd >= 0)
789✔
2994
                        continue;
480✔
2995

2996
                FDSET_FOREACH(fd, fds) {
822✔
2997
                        if (socket_address_matches_fd(&p->address, fd)) {
513✔
2998
                                p->fd = fdset_remove(fds, fd);
×
2999
                                s->deserialized_state = SOCKET_LISTENING;
×
3000
                                break;
×
3001
                        }
3002
                }
3003
        }
3004
}
774✔
3005

3006
static UnitActiveState socket_active_state(Unit *u) {
422,757✔
3007
        Socket *s = ASSERT_PTR(SOCKET(u));
422,757✔
3008

3009
        return state_translation_table[s->state];
422,757✔
3010
}
3011

3012
static const char *socket_sub_state_to_string(Unit *u) {
3,952✔
3013
        Socket *s = ASSERT_PTR(SOCKET(u));
3,952✔
3014

3015
        return socket_state_to_string(s->state);
3,952✔
3016
}
3017

3018
int socket_port_to_address(const SocketPort *p, char **ret) {
86✔
3019
        _cleanup_free_ char *address = NULL;
86✔
3020
        int r;
86✔
3021

3022
        assert(p);
86✔
3023
        assert(ret);
86✔
3024

3025
        switch (p->type) {
86✔
3026
                case SOCKET_SOCKET: {
82✔
3027
                        r = socket_address_print(&p->address, &address);
82✔
3028
                        if (r < 0)
82✔
3029
                                return r;
3030

3031
                        break;
3032
                }
3033

3034
                case SOCKET_SPECIAL:
4✔
3035
                case SOCKET_MQUEUE:
3036
                case SOCKET_FIFO:
3037
                case SOCKET_USB_FUNCTION:
3038
                        address = strdup(p->path);
4✔
3039
                        if (!address)
4✔
3040
                                return -ENOMEM;
3041
                        break;
3042

3043
                default:
×
3044
                        assert_not_reached();
×
3045
        }
3046

3047
        *ret = TAKE_PTR(address);
86✔
3048

3049
        return 0;
86✔
3050
}
3051

3052
const char* socket_port_type_to_string(SocketPort *p) {
86✔
3053
        assert(p);
86✔
3054

3055
        switch (p->type) {
86✔
3056

3057
        case SOCKET_SOCKET:
82✔
3058

3059
                switch (p->address.type) {
82✔
3060

3061
                case SOCK_STREAM:
3062
                        return "Stream";
3063

3064
                case SOCK_DGRAM:
6✔
3065
                        return "Datagram";
6✔
3066

3067
                case SOCK_SEQPACKET:
4✔
3068
                        return "SequentialPacket";
4✔
3069

3070
                case SOCK_RAW:
6✔
3071
                        if (socket_address_family(&p->address) == AF_NETLINK)
6✔
3072
                                return "Netlink";
3073

3074
                        _fallthrough_;
×
3075
                default:
3076
                        return NULL;
×
3077
                }
3078

3079
        case SOCKET_SPECIAL:
3080
                return "Special";
3081

3082
        case SOCKET_MQUEUE:
×
3083
                return "MessageQueue";
×
3084

3085
        case SOCKET_FIFO:
4✔
3086
                return "FIFO";
4✔
3087

3088
        case SOCKET_USB_FUNCTION:
×
3089
                return "USBFunction";
×
3090

3091
        default:
×
3092
                return NULL;
×
3093
        }
3094
}
3095

3096
SocketType socket_port_type_from_string(const char *s) {
×
3097
        assert(s);
×
3098

3099
        if (STR_IN_SET(s, "Stream", "Datagram", "SequentialPacket", "Netlink"))
×
3100
                return SOCKET_SOCKET;
×
3101
        else if (streq(s, "Special"))
×
3102
                return SOCKET_SPECIAL;
3103
        else if (streq(s, "MessageQueue"))
×
3104
                return SOCKET_MQUEUE;
3105
        else if (streq(s, "FIFO"))
×
3106
                return SOCKET_FIFO;
3107
        else if (streq(s, "USBFunction"))
×
3108
                return SOCKET_USB_FUNCTION;
3109
        else
3110
                return _SOCKET_TYPE_INVALID;
×
3111
}
3112

3113
static bool socket_may_gc(Unit *u) {
14,042✔
3114
        Socket *s = ASSERT_PTR(SOCKET(u));
14,042✔
3115

3116
        return s->n_connections == 0;
14,042✔
3117
}
3118

3119
static int socket_accept_do(Socket *s, int fd) {
4✔
3120
        int cfd;
4✔
3121

3122
        assert(s);
4✔
3123
        assert(fd >= 0);
4✔
3124

3125
        cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK|SOCK_CLOEXEC);
4✔
3126
        if (cfd < 0)
4✔
3127
                /* Convert transient network errors into clean and well-defined EAGAIN */
3128
                return ERRNO_IS_ACCEPT_AGAIN(errno) ? -EAGAIN : -errno;
×
3129

3130
        return cfd;
3131
}
3132

3133
static int socket_accept_in_cgroup(Socket *s, SocketPort *p, int fd) {
2✔
3134
        _cleanup_(pidref_done) PidRef pid = PIDREF_NULL;
×
3135
        _cleanup_close_pair_ int pair[2] = EBADF_PAIR;
2✔
3136
        int cfd, r;
2✔
3137

3138
        assert(s);
2✔
3139
        assert(p);
2✔
3140
        assert(fd >= 0);
2✔
3141

3142
        /* Similar to socket_address_listen_in_cgroup(), but for accept() rather than socket(): make sure that any
3143
         * connection socket is also properly associated with the cgroup. */
3144

3145
        if (!IN_SET(p->address.sockaddr.sa.sa_family, AF_INET, AF_INET6))
2✔
3146
                goto shortcut;
2✔
3147

3148
        if (bpf_program_supported() <= 0)
×
3149
                goto shortcut;
×
3150

3151
        if (socketpair(AF_UNIX, SOCK_SEQPACKET|SOCK_CLOEXEC, 0, pair) < 0)
×
3152
                return log_unit_error_errno(UNIT(s), errno, "Failed to create communication channel: %m");
×
3153

3154
        r = unit_fork_helper_process(UNIT(s), "(sd-accept)", /* into_cgroup= */ true, &pid);
×
3155
        if (r < 0)
2✔
3156
                return log_unit_error_errno(UNIT(s), r, "Failed to fork off accept stub process: %m");
×
3157
        if (r == 0) {
2✔
3158
                /* Child */
3159

3160
                pair[0] = safe_close(pair[0]);
2✔
3161

3162
                cfd = socket_accept_do(s, fd);
2✔
3163
                if (cfd == -EAGAIN) /* spurious accept() */
2✔
3164
                        _exit(EXIT_SUCCESS);
×
3165
                if (cfd < 0) {
2✔
3166
                        log_unit_error_errno(UNIT(s), cfd, "Failed to accept connection socket: %m");
×
3167
                        _exit(EXIT_FAILURE);
×
3168
                }
3169

3170
                r = send_one_fd(pair[1], cfd, 0);
2✔
3171
                if (r < 0) {
2✔
3172
                        log_unit_error_errno(UNIT(s), r, "Failed to send connection socket to parent: %m");
×
3173
                        _exit(EXIT_FAILURE);
×
3174
                }
3175

3176
                _exit(EXIT_SUCCESS);
2✔
3177
        }
3178

3179
        pair[1] = safe_close(pair[1]);
×
3180
        cfd = receive_one_fd(pair[0], 0);
×
3181

3182
        /* We synchronously wait for the helper, as it shouldn't be slow */
3183
        r = wait_for_terminate_and_check("(sd-accept)", pid.pid, WAIT_LOG_ABNORMAL);
×
3184
        if (r < 0) {
×
3185
                safe_close(cfd);
×
3186
                return r;
3187
        }
3188

3189
        /* If we received no fd, we got EIO here. If this happens with a process exit code of EXIT_SUCCESS
3190
         * this is a spurious accept(), let's convert that back to EAGAIN here. */
3191
        if (cfd == -EIO)
×
3192
                return -EAGAIN;
3193
        if (cfd < 0)
×
3194
                return log_unit_error_errno(UNIT(s), cfd, "Failed to receive connection socket: %m");
×
3195

3196
        return cfd;
3197

3198
shortcut:
2✔
3199
        cfd = socket_accept_do(s, fd);
2✔
3200
        if (cfd == -EAGAIN) /* spurious accept(), skip it silently */
2✔
3201
                return -EAGAIN;
3202
        if (cfd < 0)
2✔
3203
                return log_unit_error_errno(UNIT(s), cfd, "Failed to accept connection socket: %m");
×
3204

3205
        return cfd;
3206
}
3207

3208
static int socket_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
163✔
3209
        SocketPort *p = ASSERT_PTR(userdata);
163✔
3210
        int cfd = -EBADF;
163✔
3211

3212
        assert(fd >= 0);
163✔
3213

3214
        if (p->socket->state != SOCKET_LISTENING)
163✔
3215
                return 0;
3216

3217
        log_unit_debug(UNIT(p->socket), "Incoming traffic");
163✔
3218

3219
        if (revents != EPOLLIN) {
163✔
3220
                if (revents & EPOLLHUP)
×
3221
                        log_unit_error(UNIT(p->socket), "Got POLLHUP on a listening socket. The service probably invoked shutdown() on it, and should better not do that.");
×
3222
                else
3223
                        log_unit_error(UNIT(p->socket), "Got unexpected poll event (0x%x) on socket.", revents);
×
3224
                goto fail;
×
3225
        }
3226

3227
        if (p->socket->accept &&
163✔
3228
            p->type == SOCKET_SOCKET &&
4✔
3229
            socket_address_can_accept(&p->address)) {
2✔
3230

3231
                cfd = socket_accept_in_cgroup(p->socket, p, fd);
2✔
3232
                if (cfd == -EAGAIN) /* Spurious accept() */
2✔
3233
                        return 0;
3234
                if (cfd < 0)
2✔
3235
                        goto fail;
×
3236

3237
                socket_apply_socket_options(p->socket, p, cfd);
2✔
3238
        }
3239

3240
        socket_enter_running(p->socket, cfd);
163✔
3241
        return 0;
163✔
3242

3243
fail:
×
3244
        socket_enter_stop_pre(p->socket, SOCKET_FAILURE_RESOURCES);
×
3245
        return 0;
×
3246
}
3247

3248
static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
195✔
3249
        Socket *s = ASSERT_PTR(SOCKET(u));
195✔
3250
        SocketResult f;
195✔
3251

3252
        assert(pid >= 0);
195✔
3253

3254
        if (pid != s->control_pid.pid)
195✔
3255
                return;
3256

3257
        pidref_done(&s->control_pid);
195✔
3258

3259
        if (is_clean_exit(code, status, EXIT_CLEAN_COMMAND, NULL))
195✔
3260
                f = SOCKET_SUCCESS;
3261
        else if (code == CLD_EXITED)
1✔
3262
                f = SOCKET_FAILURE_EXIT_CODE;
3263
        else if (code == CLD_KILLED)
1✔
3264
                f = SOCKET_FAILURE_SIGNAL;
3265
        else if (code == CLD_DUMPED)
×
3266
                f = SOCKET_FAILURE_CORE_DUMP;
3267
        else
3268
                assert_not_reached();
×
3269

3270
        if (s->control_command) {
195✔
3271
                exec_status_exit(&s->control_command->exec_status, &s->exec_context, pid, code, status);
195✔
3272

3273
                if (s->control_command->flags & EXEC_COMMAND_IGNORE_FAILURE)
195✔
3274
                        f = SOCKET_SUCCESS;
195✔
3275
        }
3276

3277
        unit_log_process_exit(
195✔
3278
                        u,
3279
                        "Control process",
3280
                        socket_exec_command_to_string(s->control_command_id),
3281
                        f == SOCKET_SUCCESS,
3282
                        code, status);
3283

3284
        if (s->result == SOCKET_SUCCESS)
195✔
3285
                s->result = f;
195✔
3286

3287
        if (s->control_command &&
195✔
3288
            s->control_command->command_next &&
195✔
3289
            f == SOCKET_SUCCESS) {
3290

3291
                log_unit_debug(u, "Running next command for state %s", socket_state_to_string(s->state));
×
3292
                socket_run_next(s);
×
3293
        } else {
3294
                s->control_command = NULL;
195✔
3295
                s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
195✔
3296

3297
                /* No further commands for this step, so let's figure
3298
                 * out what to do next */
3299

3300
                log_unit_debug(u, "Got final SIGCHLD for state %s", socket_state_to_string(s->state));
195✔
3301

3302
                switch (s->state) {
195✔
3303

3304
                case SOCKET_START_PRE:
×
3305
                        if (f == SOCKET_SUCCESS)
×
3306
                                socket_enter_start_open(s);
×
3307
                        else
3308
                                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, f);
×
3309
                        break;
3310

3311
                case SOCKET_START_CHOWN:
×
3312
                        if (f == SOCKET_SUCCESS)
×
3313
                                socket_enter_start_post(s);
×
3314
                        else
3315
                                socket_enter_stop_pre(s, f);
×
3316
                        break;
3317

3318
                case SOCKET_START_POST:
191✔
3319
                        if (f == SOCKET_SUCCESS)
191✔
3320
                                socket_enter_listening(s);
191✔
3321
                        else
3322
                                socket_enter_stop_pre(s, f);
×
3323
                        break;
3324

3325
                case SOCKET_STOP_PRE:
4✔
3326
                case SOCKET_STOP_PRE_SIGTERM:
3327
                case SOCKET_STOP_PRE_SIGKILL:
3328
                        socket_enter_stop_post(s, f);
4✔
3329
                        break;
4✔
3330

3331
                case SOCKET_STOP_POST:
×
3332
                case SOCKET_FINAL_SIGTERM:
3333
                case SOCKET_FINAL_SIGKILL:
3334
                        socket_enter_dead(s, f);
×
3335
                        break;
×
3336

3337
                case SOCKET_CLEANING:
×
3338

3339
                        if (s->clean_result == SOCKET_SUCCESS)
×
3340
                                s->clean_result = f;
×
3341

3342
                        socket_enter_dead(s, SOCKET_SUCCESS);
×
3343
                        break;
×
3344

3345
                default:
×
3346
                        assert_not_reached();
×
3347
                }
3348
        }
3349

3350
        /* Notify clients about changed exit status */
3351
        unit_add_to_dbus_queue(u);
195✔
3352
}
3353

3354
static int socket_dispatch_timer(sd_event_source *source, usec_t usec, void *userdata) {
×
3355
        Socket *s = ASSERT_PTR(SOCKET(userdata));
×
3356

3357
        assert(s->timer_event_source == source);
×
3358

3359
        switch (s->state) {
×
3360

3361
        case SOCKET_START_PRE:
3362
                log_unit_warning(UNIT(s), "Starting timed out. Terminating.");
×
3363
                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_TIMEOUT);
×
3364
                break;
×
3365

3366
        case SOCKET_START_CHOWN:
3367
        case SOCKET_START_POST:
3368
                log_unit_warning(UNIT(s), "Starting timed out. Stopping.");
×
3369
                socket_enter_stop_pre(s, SOCKET_FAILURE_TIMEOUT);
×
3370
                break;
×
3371

3372
        case SOCKET_DEFERRED:
3373
                log_unit_warning(UNIT(s), "DeferTriggerMaxSec= elapsed. Stopping.");
×
3374
                socket_enter_stop_pre(s, SOCKET_FAILURE_TIMEOUT);
×
3375
                break;
×
3376

3377
        case SOCKET_STOP_PRE:
3378
                log_unit_warning(UNIT(s), "Stopping timed out. Terminating.");
×
3379
                socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, SOCKET_FAILURE_TIMEOUT);
×
3380
                break;
×
3381

3382
        case SOCKET_STOP_PRE_SIGTERM:
×
3383
                if (s->kill_context.send_sigkill) {
×
3384
                        log_unit_warning(UNIT(s), "Stopping timed out. Killing.");
×
3385
                        socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, SOCKET_FAILURE_TIMEOUT);
×
3386
                } else {
3387
                        log_unit_warning(UNIT(s), "Stopping timed out. Skipping SIGKILL. Ignoring.");
×
3388
                        socket_enter_stop_post(s, SOCKET_FAILURE_TIMEOUT);
×
3389
                }
3390
                break;
3391

3392
        case SOCKET_STOP_PRE_SIGKILL:
3393
                log_unit_warning(UNIT(s), "Processes still around after SIGKILL. Ignoring.");
×
3394
                socket_enter_stop_post(s, SOCKET_FAILURE_TIMEOUT);
×
3395
                break;
×
3396

3397
        case SOCKET_STOP_POST:
3398
                log_unit_warning(UNIT(s), "Stopping timed out (2). Terminating.");
×
3399
                socket_enter_signal(s, SOCKET_FINAL_SIGTERM, SOCKET_FAILURE_TIMEOUT);
×
3400
                break;
×
3401

3402
        case SOCKET_FINAL_SIGTERM:
×
3403
                if (s->kill_context.send_sigkill) {
×
3404
                        log_unit_warning(UNIT(s), "Stopping timed out (2). Killing.");
×
3405
                        socket_enter_signal(s, SOCKET_FINAL_SIGKILL, SOCKET_FAILURE_TIMEOUT);
×
3406
                } else {
3407
                        log_unit_warning(UNIT(s), "Stopping timed out (2). Skipping SIGKILL. Ignoring.");
×
3408
                        socket_enter_dead(s, SOCKET_FAILURE_TIMEOUT);
×
3409
                }
3410
                break;
3411

3412
        case SOCKET_FINAL_SIGKILL:
3413
                log_unit_warning(UNIT(s), "Still around after SIGKILL (2). Entering failed mode.");
×
3414
                socket_enter_dead(s, SOCKET_FAILURE_TIMEOUT);
×
3415
                break;
×
3416

3417
        case SOCKET_CLEANING:
3418
                log_unit_warning(UNIT(s), "Cleaning timed out. killing.");
×
3419

3420
                if (s->clean_result == SOCKET_SUCCESS)
×
3421
                        s->clean_result = SOCKET_FAILURE_TIMEOUT;
×
3422

3423
                socket_enter_signal(s, SOCKET_FINAL_SIGKILL, 0);
×
3424
                break;
×
3425

3426
        default:
×
3427
                assert_not_reached();
×
3428
        }
3429

3430
        return 0;
×
3431
}
3432

3433
int socket_collect_fds(Socket *s, int **ret) {
585✔
3434
        size_t n = 0, k = 0;
585✔
3435

3436
        assert(s);
585✔
3437
        assert(ret);
585✔
3438

3439
        /* Called from the service code for requesting our fds */
3440

3441
        LIST_FOREACH(port, p, s->ports) {
1,206✔
3442
                if (p->fd >= 0)
621✔
3443
                        n++;
603✔
3444
                n += p->n_auxiliary_fds;
621✔
3445
        }
3446

3447
        if (n == 0) {
585✔
3448
                *ret = NULL;
18✔
3449
                return 0;
18✔
3450
        }
3451

3452
        int *fds = new(int, n);
567✔
3453
        if (!fds)
567✔
3454
                return -ENOMEM;
3455

3456
        LIST_FOREACH(port, p, s->ports) {
1,170✔
3457
                if (p->fd >= 0)
603✔
3458
                        fds[k++] = p->fd;
603✔
3459
                FOREACH_ARRAY(i, p->auxiliary_fds, p->n_auxiliary_fds)
603✔
3460
                        fds[k++] = *i;
×
3461
        }
3462

3463
        assert(k == n);
567✔
3464

3465
        *ret = fds;
567✔
3466
        return (int) n;
567✔
3467
}
3468

3469
static void socket_reset_failed(Unit *u) {
40✔
3470
        Socket *s = SOCKET(u);
40✔
3471

3472
        assert(s);
×
3473

3474
        if (s->state == SOCKET_FAILED)
40✔
3475
                socket_set_state(s, SOCKET_DEAD);
×
3476

3477
        s->result = SOCKET_SUCCESS;
40✔
3478
        s->clean_result = SOCKET_SUCCESS;
40✔
3479
}
40✔
3480

3481
void socket_connection_unref(Socket *s) {
2✔
3482
        assert(s);
2✔
3483

3484
        /* The service is dead. Yay!
3485
         *
3486
         * This is strictly for one-instance-per-connection
3487
         * services. */
3488

3489
        assert(s->n_connections > 0);
2✔
3490
        s->n_connections--;
2✔
3491

3492
        log_unit_debug(UNIT(s), "One connection closed, %u left.", s->n_connections);
2✔
3493
}
2✔
3494

3495
static void socket_trigger_notify(Unit *u, Unit *other) {
3,446✔
3496
        Socket *s = ASSERT_PTR(SOCKET(u));
3,446✔
3497

3498
        assert(other);
3,446✔
3499

3500
        /* Filter out invocations with bogus state */
3501
        assert(UNIT_IS_LOAD_COMPLETE(other->load_state));
3,446✔
3502

3503
        Service *service = ASSERT_PTR(SERVICE(other));
3,446✔
3504

3505
        /* Don't propagate state changes from the service if we are already down */
3506
        if (!IN_SET(s->state, SOCKET_RUNNING, SOCKET_LISTENING, SOCKET_DEFERRED))
3,446✔
3507
                return;
3508

3509
        /* We don't care for the service state if we are in Accept=yes mode */
3510
        if (s->accept)
3,030✔
3511
                return;
3512

3513
        /* Propagate start limit hit state */
3514
        if (other->start_limit_hit) {
3,024✔
3515
                socket_enter_stop_pre(s, SOCKET_FAILURE_SERVICE_START_LIMIT_HIT);
×
3516
                return;
×
3517
        }
3518

3519
        /* Don't propagate anything if there's still a job queued */
3520
        if (other->job)
3,024✔
3521
                return;
3522

3523
        if (!SOCKET_SERVICE_IS_ACTIVE(service, /* allow_finalize = */ true))
2,259✔
3524
                socket_enter_listening(s);
759✔
3525

3526
        if (SERVICE(other)->state == SERVICE_RUNNING)
2,259✔
3527
                socket_set_state(s, SOCKET_RUNNING);
1,394✔
3528
}
3529

3530
static void socket_handoff_timestamp(
390✔
3531
                Unit *u,
3532
                const struct ucred *ucred,
3533
                const dual_timestamp *ts) {
3534

3535
        Socket *s = ASSERT_PTR(SOCKET(u));
390✔
3536

3537
        assert(ucred);
390✔
3538
        assert(ts);
390✔
3539

3540
        if (s->control_pid.pid == ucred->pid && s->control_command) {
390✔
3541
                exec_status_handoff(&s->control_command->exec_status, ucred, ts);
390✔
3542
                unit_add_to_dbus_queue(u);
390✔
3543
        }
3544
}
390✔
3545

3546
static int socket_get_timeout(Unit *u, usec_t *timeout) {
×
3547
        Socket *s = ASSERT_PTR(SOCKET(u));
×
3548
        usec_t t;
×
3549
        int r;
×
3550

3551
        if (!s->timer_event_source)
×
3552
                return 0;
×
3553

3554
        r = sd_event_source_get_time(s->timer_event_source, &t);
×
3555
        if (r < 0)
×
3556
                return r;
3557
        if (t == USEC_INFINITY)
×
3558
                return 0;
3559

3560
        *timeout = t;
×
3561
        return 1;
×
3562
}
3563

3564
const char* socket_fdname(Socket *s) {
649✔
3565
        assert(s);
649✔
3566

3567
        /* Returns the name to use for $LISTEN_FDNAMES. If the user didn't specify anything specifically,
3568
         * use the socket unit's name as fallback for Accept=no sockets, "connection" otherwise. */
3569

3570
        if (s->fdname)
649✔
3571
                return s->fdname;
3572

3573
        if (s->accept)
469✔
3574
                return "connection";
3575

3576
        return UNIT(s)->id;
461✔
3577
}
3578

3579
static PidRef* socket_control_pid(Unit *u) {
5,794✔
3580
        return &ASSERT_PTR(SOCKET(u))->control_pid;
11,588✔
3581
}
3582

3583
static int socket_clean(Unit *u, ExecCleanMask mask) {
×
3584
        Socket *s = ASSERT_PTR(SOCKET(u));
×
3585
        _cleanup_strv_free_ char **l = NULL;
×
3586
        int r;
×
3587

3588
        assert(mask != 0);
×
3589

3590
        if (s->state != SOCKET_DEAD)
×
3591
                return -EBUSY;
3592

3593
        r = exec_context_get_clean_directories(&s->exec_context, u->manager->prefix, mask, &l);
×
3594
        if (r < 0)
×
3595
                return r;
3596

3597
        if (strv_isempty(l))
×
3598
                return -EUNATCH;
3599

3600
        socket_unwatch_control_pid(s);
×
3601
        s->clean_result = SOCKET_SUCCESS;
×
3602
        s->control_command = NULL;
×
3603
        s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
×
3604

3605
        r = socket_arm_timer(s, /* relative= */ true, s->exec_context.timeout_clean_usec);
×
3606
        if (r < 0) {
×
3607
                log_unit_warning_errno(u, r, "Failed to install timer: %m");
×
3608
                goto fail;
×
3609
        }
3610

3611
        r = unit_fork_and_watch_rm_rf(u, l, &s->control_pid);
×
3612
        if (r < 0) {
×
3613
                log_unit_warning_errno(u, r, "Failed to spawn cleaning task: %m");
×
3614
                goto fail;
×
3615
        }
3616

3617
        socket_set_state(s, SOCKET_CLEANING);
×
3618
        return 0;
3619

3620
fail:
×
3621
        s->clean_result = SOCKET_FAILURE_RESOURCES;
×
3622
        s->timer_event_source = sd_event_source_disable_unref(s->timer_event_source);
×
3623
        return r;
×
3624
}
3625

3626
static int socket_can_clean(Unit *u, ExecCleanMask *ret) {
92✔
3627
        Socket *s = ASSERT_PTR(SOCKET(u));
92✔
3628

3629
        return exec_context_get_clean_mask(&s->exec_context, ret);
92✔
3630
}
3631

3632
static int socket_test_startable(Unit *u) {
3,158✔
3633
        Socket *s = ASSERT_PTR(SOCKET(u));
3,158✔
3634
        int r;
3,158✔
3635

3636
        /* It is already being started. */
3637
        if (IN_SET(s->state,
3,158✔
3638
                   SOCKET_START_PRE,
3639
                   SOCKET_START_OPEN,
3640
                   SOCKET_START_CHOWN,
3641
                   SOCKET_START_POST))
3642
                return false;
3643

3644
        r = unit_test_start_limit(u);
3,158✔
3645
        if (r < 0) {
3,158✔
3646
                socket_enter_dead(s, SOCKET_FAILURE_START_LIMIT_HIT);
×
3647
                return r;
×
3648
        }
3649

3650
        return true;
3651
}
3652

3653
static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
3654
        [SOCKET_EXEC_START_PRE]   = "ExecStartPre",
3655
        [SOCKET_EXEC_START_CHOWN] = "ExecStartChown",
3656
        [SOCKET_EXEC_START_POST]  = "ExecStartPost",
3657
        [SOCKET_EXEC_STOP_PRE]    = "ExecStopPre",
3658
        [SOCKET_EXEC_STOP_POST]   = "ExecStopPost",
3659
};
3660

3661
DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
251✔
3662

3663
static const char* const socket_result_table[_SOCKET_RESULT_MAX] = {
3664
        [SOCKET_SUCCESS]                         = "success",
3665
        [SOCKET_FAILURE_RESOURCES]               = "resources",
3666
        [SOCKET_FAILURE_TIMEOUT]                 = "timeout",
3667
        [SOCKET_FAILURE_EXIT_CODE]               = "exit-code",
3668
        [SOCKET_FAILURE_SIGNAL]                  = "signal",
3669
        [SOCKET_FAILURE_CORE_DUMP]               = "core-dump",
3670
        [SOCKET_FAILURE_START_LIMIT_HIT]         = "start-limit-hit",
3671
        [SOCKET_FAILURE_TRIGGER_LIMIT_HIT]       = "trigger-limit-hit",
3672
        [SOCKET_FAILURE_SERVICE_START_LIMIT_HIT] = "service-start-limit-hit",
3673
};
3674

3675
DEFINE_STRING_TABLE_LOOKUP(socket_result, SocketResult);
7,555✔
3676

3677
static const char* const socket_timestamping_table[_SOCKET_TIMESTAMPING_MAX] = {
3678
        [SOCKET_TIMESTAMPING_OFF] = "off",
3679
        [SOCKET_TIMESTAMPING_US]  = "us",
3680
        [SOCKET_TIMESTAMPING_NS]  = "ns",
3681
};
3682

3683
DEFINE_STRING_TABLE_LOOKUP(socket_timestamping, SocketTimestamping);
287✔
3684

3685
SocketTimestamping socket_timestamping_from_string_harder(const char *p) {
207✔
3686
        SocketTimestamping t;
207✔
3687
        int r;
207✔
3688

3689
        if (!p)
207✔
3690
                return _SOCKET_TIMESTAMPING_INVALID;
3691

3692
        t = socket_timestamping_from_string(p);
207✔
3693
        if (t >= 0)
207✔
3694
                return t;
3695

3696
        /* Let's alternatively support the various other aliases parse_time() accepts for ns and µs here,
3697
         * too. */
3698
        if (streq(p, "nsec"))
×
3699
                return SOCKET_TIMESTAMPING_NS;
3700
        if (STR_IN_SET(p, "usec", "µs", "μs")) /* Accept both small greek letter mu + micro sign unicode codepoints */
×
3701
                return SOCKET_TIMESTAMPING_US;
×
3702

3703
        r = parse_boolean(p);
×
3704
        if (r < 0)
×
3705
                return _SOCKET_TIMESTAMPING_INVALID;
3706

3707
        return r ? SOCKET_TIMESTAMPING_NS : SOCKET_TIMESTAMPING_OFF; /* If boolean yes, default to ns accuracy */
×
3708
}
3709

3710
static const char* const socket_defer_trigger_table[_SOCKET_DEFER_MAX] = {
3711
        [SOCKET_DEFER_NO]      = "no",
3712
        [SOCKET_DEFER_YES]     = "yes",
3713
        [SOCKET_DEFER_PATIENT] = "patient",
3714
};
3715

3716
DEFINE_STRING_TABLE_LOOKUP_WITH_BOOLEAN(socket_defer_trigger, SocketDeferTrigger, SOCKET_DEFER_YES);
697✔
3717

3718
const UnitVTable socket_vtable = {
3719
        .object_size = sizeof(Socket),
3720
        .exec_context_offset = offsetof(Socket, exec_context),
3721
        .cgroup_context_offset = offsetof(Socket, cgroup_context),
3722
        .kill_context_offset = offsetof(Socket, kill_context),
3723
        .exec_runtime_offset = offsetof(Socket, exec_runtime),
3724
        .cgroup_runtime_offset = offsetof(Socket, cgroup_runtime),
3725

3726
        .sections =
3727
                "Unit\0"
3728
                "Socket\0"
3729
                "Install\0",
3730
        .private_section = "Socket",
3731

3732
        .can_transient = true,
3733
        .can_trigger = true,
3734
        .can_fail = true,
3735

3736
        .init = socket_init,
3737
        .done = socket_done,
3738
        .load = socket_load,
3739

3740
        .coldplug = socket_coldplug,
3741

3742
        .dump = socket_dump,
3743

3744
        .start = socket_start,
3745
        .stop = socket_stop,
3746

3747
        .clean = socket_clean,
3748
        .can_clean = socket_can_clean,
3749

3750
        .get_timeout = socket_get_timeout,
3751

3752
        .serialize = socket_serialize,
3753
        .deserialize_item = socket_deserialize_item,
3754
        .distribute_fds = socket_distribute_fds,
3755

3756
        .active_state = socket_active_state,
3757
        .sub_state_to_string = socket_sub_state_to_string,
3758

3759
        .will_restart = unit_will_restart_default,
3760

3761
        .may_gc = socket_may_gc,
3762

3763
        .sigchld_event = socket_sigchld_event,
3764

3765
        .trigger_notify = socket_trigger_notify,
3766

3767
        .stop_notify = socket_stop_notify,
3768

3769
        .reset_failed = socket_reset_failed,
3770

3771
        .notify_handoff_timestamp = socket_handoff_timestamp,
3772

3773
        .control_pid = socket_control_pid,
3774

3775
        .bus_set_property = bus_socket_set_property,
3776
        .bus_commit_properties = bus_socket_commit_properties,
3777

3778
        .status_message_formats = {
3779
                .finished_start_job = {
3780
                        [JOB_DONE]       = "Listening on %s.",
3781
                        [JOB_FAILED]     = "Failed to listen on %s.",
3782
                        [JOB_TIMEOUT]    = "Timed out starting %s.",
3783
                },
3784
                .finished_stop_job = {
3785
                        [JOB_DONE]       = "Closed %s.",
3786
                        [JOB_FAILED]     = "Failed stopping %s.",
3787
                        [JOB_TIMEOUT]    = "Timed out stopping %s.",
3788
                },
3789
        },
3790

3791
        .test_startable = socket_test_startable,
3792
};
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc