]>
Commit | Line | Data |
---|---|---|
a032b68d | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
663996b3 | 2 | |
663996b3 | 3 | #include <stddef.h> |
db2df898 | 4 | #include <unistd.h> |
663996b3 | 5 | |
f5e65279 | 6 | #if HAVE_SELINUX |
663996b3 MS |
7 | #include <selinux/selinux.h> |
8 | #endif | |
9 | ||
e735f4d4 | 10 | #include "sd-daemon.h" |
db2df898 MP |
11 | #include "sd-event.h" |
12 | ||
13 | #include "alloc-util.h" | |
14 | #include "dirent-util.h" | |
6e866b33 | 15 | #include "env-file.h" |
bb4f798a | 16 | #include "errno-util.h" |
db2df898 MP |
17 | #include "escape.h" |
18 | #include "fd-util.h" | |
e735f4d4 | 19 | #include "fileio.h" |
46cdbd49 | 20 | #include "fs-util.h" |
db2df898 MP |
21 | #include "io-util.h" |
22 | #include "journald-console.h" | |
f5e65279 | 23 | #include "journald-context.h" |
db2df898 | 24 | #include "journald-kmsg.h" |
663996b3 MS |
25 | #include "journald-server.h" |
26 | #include "journald-stream.h" | |
27 | #include "journald-syslog.h" | |
60f067b4 | 28 | #include "journald-wall.h" |
db2df898 MP |
29 | #include "mkdir.h" |
30 | #include "parse-util.h" | |
f5e65279 | 31 | #include "process-util.h" |
db2df898 MP |
32 | #include "selinux-util.h" |
33 | #include "socket-util.h" | |
34 | #include "stdio-util.h" | |
35 | #include "string-util.h" | |
36 | #include "syslog-util.h" | |
6e866b33 | 37 | #include "tmpfile-util.h" |
f5e65279 | 38 | #include "unit-name.h" |
ea0999c9 | 39 | #include "user-util.h" |
663996b3 MS |
40 | |
41 | #define STDOUT_STREAMS_MAX 4096 | |
42 | ||
5b5a102a MB |
43 | /* During the "setup" protocol phase of the stream logic let's define a different maximum line length than |
44 | * during the actual operational phase. We want to allow users to specify very short line lengths after all, | |
45 | * but the unit name we embed in the setup protocol might be longer than that. Hence, during the setup phase | |
46 | * let's enforce a line length matching the maximum unit name length (255) */ | |
47 | #define STDOUT_STREAM_SETUP_PROTOCOL_LINE_MAX (UNIT_NAME_MAX-1U) | |
48 | ||
663996b3 MS |
49 | typedef enum StdoutStreamState { |
50 | STDOUT_STREAM_IDENTIFIER, | |
51 | STDOUT_STREAM_UNIT_ID, | |
52 | STDOUT_STREAM_PRIORITY, | |
53 | STDOUT_STREAM_LEVEL_PREFIX, | |
54 | STDOUT_STREAM_FORWARD_TO_SYSLOG, | |
55 | STDOUT_STREAM_FORWARD_TO_KMSG, | |
56 | STDOUT_STREAM_FORWARD_TO_CONSOLE, | |
5b5a102a | 57 | STDOUT_STREAM_RUNNING, |
663996b3 MS |
58 | } StdoutStreamState; |
59 | ||
f5e65279 MB |
60 | /* The different types of log record terminators: a real \n was read, a NUL character was read, the maximum line length |
61 | * was reached, or the end of the stream was reached */ | |
62 | ||
63 | typedef enum LineBreak { | |
64 | LINE_BREAK_NEWLINE, | |
65 | LINE_BREAK_NUL, | |
66 | LINE_BREAK_LINE_MAX, | |
67 | LINE_BREAK_EOF, | |
a10f5d05 MB |
68 | LINE_BREAK_PID_CHANGE, |
69 | _LINE_BREAK_MAX, | |
3a6ce677 | 70 | _LINE_BREAK_INVALID = -EINVAL, |
f5e65279 MB |
71 | } LineBreak; |
72 | ||
663996b3 MS |
73 | struct StdoutStream { |
74 | Server *server; | |
75 | StdoutStreamState state; | |
76 | ||
77 | int fd; | |
78 | ||
79 | struct ucred ucred; | |
86f210e9 | 80 | char *label; |
663996b3 MS |
81 | char *identifier; |
82 | char *unit_id; | |
83 | int priority; | |
84 | bool level_prefix:1; | |
85 | bool forward_to_syslog:1; | |
86 | bool forward_to_kmsg:1; | |
87 | bool forward_to_console:1; | |
88 | ||
e735f4d4 | 89 | bool fdstore:1; |
db2df898 | 90 | bool in_notify_queue:1; |
e735f4d4 | 91 | |
f5e65279 | 92 | char *buffer; |
663996b3 MS |
93 | size_t length; |
94 | ||
60f067b4 JS |
95 | sd_event_source *event_source; |
96 | ||
e735f4d4 MP |
97 | char *state_file; |
98 | ||
f5e65279 MB |
99 | ClientContext *context; |
100 | ||
663996b3 | 101 | LIST_FIELDS(StdoutStream, stdout_stream); |
db2df898 | 102 | LIST_FIELDS(StdoutStream, stdout_stream_notify_queue); |
f5e65279 | 103 | |
52ad194e | 104 | char id_field[STRLEN("_STREAM_ID=") + SD_ID128_STRING_MAX]; |
663996b3 MS |
105 | }; |
106 | ||
3a6ce677 | 107 | StdoutStream* stdout_stream_free(StdoutStream *s) { |
e735f4d4 | 108 | if (!s) |
3a6ce677 | 109 | return NULL; |
e735f4d4 MP |
110 | |
111 | if (s->server) { | |
f5e65279 MB |
112 | if (s->context) |
113 | client_context_release(s->server, s->context); | |
114 | ||
e735f4d4 | 115 | assert(s->server->n_stdout_streams > 0); |
aa27b158 | 116 | s->server->n_stdout_streams--; |
e735f4d4 | 117 | LIST_REMOVE(stdout_stream, s->server->stdout_streams, s); |
db2df898 MP |
118 | |
119 | if (s->in_notify_queue) | |
120 | LIST_REMOVE(stdout_stream_notify_queue, s->server->stdout_streams_notify_queue, s); | |
46cdbd49 BR |
121 | |
122 | (void) server_start_or_stop_idle_timer(s->server); /* Maybe we are idle now? */ | |
e735f4d4 MP |
123 | } |
124 | ||
c0847858 | 125 | sd_event_source_disable_unref(s->event_source); |
e735f4d4 | 126 | safe_close(s->fd); |
86f210e9 | 127 | free(s->label); |
e735f4d4 MP |
128 | free(s->identifier); |
129 | free(s->unit_id); | |
130 | free(s->state_file); | |
f5e65279 | 131 | free(s->buffer); |
e735f4d4 | 132 | |
3a6ce677 | 133 | return mfree(s); |
e735f4d4 MP |
134 | } |
135 | ||
136 | DEFINE_TRIVIAL_CLEANUP_FUNC(StdoutStream*, stdout_stream_free); | |
137 | ||
6e866b33 | 138 | void stdout_stream_destroy(StdoutStream *s) { |
e735f4d4 MP |
139 | if (!s) |
140 | return; | |
141 | ||
142 | if (s->state_file) | |
db2df898 | 143 | (void) unlink(s->state_file); |
e735f4d4 MP |
144 | |
145 | stdout_stream_free(s); | |
146 | } | |
147 | ||
148 | static int stdout_stream_save(StdoutStream *s) { | |
46cdbd49 | 149 | _cleanup_(unlink_and_freep) char *temp_path = NULL; |
e735f4d4 MP |
150 | _cleanup_fclose_ FILE *f = NULL; |
151 | int r; | |
152 | ||
153 | assert(s); | |
154 | ||
155 | if (s->state != STDOUT_STREAM_RUNNING) | |
156 | return 0; | |
157 | ||
158 | if (!s->state_file) { | |
159 | struct stat st; | |
160 | ||
161 | r = fstat(s->fd, &st); | |
162 | if (r < 0) | |
163 | return log_warning_errno(errno, "Failed to stat connected stream: %m"); | |
164 | ||
165 | /* We use device and inode numbers as identifier for the stream */ | |
46cdbd49 BR |
166 | r = asprintf(&s->state_file, "%s/streams/%lu:%lu", s->server->runtime_directory, (unsigned long) st.st_dev, (unsigned long) st.st_ino); |
167 | if (r < 0) | |
e735f4d4 MP |
168 | return log_oom(); |
169 | } | |
170 | ||
46cdbd49 | 171 | (void) mkdir_parents(s->state_file, 0755); |
e735f4d4 MP |
172 | |
173 | r = fopen_temporary(s->state_file, &f, &temp_path); | |
174 | if (r < 0) | |
5fd56512 | 175 | goto fail; |
e735f4d4 MP |
176 | |
177 | fprintf(f, | |
178 | "# This is private data. Do not parse\n" | |
179 | "PRIORITY=%i\n" | |
180 | "LEVEL_PREFIX=%i\n" | |
181 | "FORWARD_TO_SYSLOG=%i\n" | |
182 | "FORWARD_TO_KMSG=%i\n" | |
f5e65279 MB |
183 | "FORWARD_TO_CONSOLE=%i\n" |
184 | "STREAM_ID=%s\n", | |
e735f4d4 MP |
185 | s->priority, |
186 | s->level_prefix, | |
187 | s->forward_to_syslog, | |
188 | s->forward_to_kmsg, | |
f5e65279 | 189 | s->forward_to_console, |
52ad194e | 190 | s->id_field + STRLEN("_STREAM_ID=")); |
e735f4d4 MP |
191 | |
192 | if (!isempty(s->identifier)) { | |
5b5a102a | 193 | _cleanup_free_ char *escaped = NULL; |
e735f4d4 MP |
194 | |
195 | escaped = cescape(s->identifier); | |
196 | if (!escaped) { | |
197 | r = -ENOMEM; | |
5fd56512 | 198 | goto fail; |
e735f4d4 MP |
199 | } |
200 | ||
201 | fprintf(f, "IDENTIFIER=%s\n", escaped); | |
202 | } | |
203 | ||
204 | if (!isempty(s->unit_id)) { | |
5b5a102a | 205 | _cleanup_free_ char *escaped = NULL; |
e735f4d4 MP |
206 | |
207 | escaped = cescape(s->unit_id); | |
208 | if (!escaped) { | |
209 | r = -ENOMEM; | |
5fd56512 | 210 | goto fail; |
e735f4d4 MP |
211 | } |
212 | ||
213 | fprintf(f, "UNIT=%s\n", escaped); | |
214 | } | |
215 | ||
216 | r = fflush_and_check(f); | |
217 | if (r < 0) | |
5fd56512 | 218 | goto fail; |
e735f4d4 MP |
219 | |
220 | if (rename(temp_path, s->state_file) < 0) { | |
221 | r = -errno; | |
5fd56512 | 222 | goto fail; |
e735f4d4 MP |
223 | } |
224 | ||
46cdbd49 BR |
225 | temp_path = mfree(temp_path); |
226 | ||
db2df898 MP |
227 | if (!s->fdstore && !s->in_notify_queue) { |
228 | LIST_PREPEND(stdout_stream_notify_queue, s->server->stdout_streams_notify_queue, s); | |
229 | s->in_notify_queue = true; | |
230 | ||
231 | if (s->server->notify_event_source) { | |
232 | r = sd_event_source_set_enabled(s->server->notify_event_source, SD_EVENT_ON); | |
233 | if (r < 0) | |
234 | log_warning_errno(r, "Failed to enable notify event source: %m"); | |
235 | } | |
e735f4d4 MP |
236 | } |
237 | ||
5fd56512 | 238 | return 0; |
e735f4d4 | 239 | |
5fd56512 MP |
240 | fail: |
241 | (void) unlink(s->state_file); | |
5fd56512 | 242 | return log_error_errno(r, "Failed to save stream data %s: %m", s->state_file); |
e735f4d4 MP |
243 | } |
244 | ||
a10f5d05 MB |
245 | static int stdout_stream_log( |
246 | StdoutStream *s, | |
247 | const char *p, | |
248 | LineBreak line_break) { | |
249 | ||
52ad194e | 250 | struct iovec *iovec; |
663996b3 | 251 | int priority; |
60f067b4 | 252 | char syslog_priority[] = "PRIORITY=\0"; |
52ad194e | 253 | char syslog_facility[STRLEN("SYSLOG_FACILITY=") + DECIMAL_STR_MAX(int) + 1]; |
60f067b4 | 254 | _cleanup_free_ char *message = NULL, *syslog_identifier = NULL; |
52ad194e | 255 | size_t n = 0, m; |
f5e65279 | 256 | int r; |
663996b3 MS |
257 | |
258 | assert(s); | |
259 | assert(p); | |
260 | ||
a10f5d05 MB |
261 | assert(line_break >= 0); |
262 | assert(line_break < _LINE_BREAK_MAX); | |
263 | ||
52ad194e MB |
264 | if (s->context) |
265 | (void) client_context_maybe_refresh(s->server, s->context, NULL, NULL, 0, NULL, USEC_INFINITY); | |
266 | else if (pid_is_valid(s->ucred.pid)) { | |
267 | r = client_context_acquire(s->server, s->ucred.pid, &s->ucred, s->label, strlen_ptr(s->label), s->unit_id, &s->context); | |
268 | if (r < 0) | |
269 | log_warning_errno(r, "Failed to acquire client context, ignoring: %m"); | |
270 | } | |
271 | ||
663996b3 MS |
272 | priority = s->priority; |
273 | ||
274 | if (s->level_prefix) | |
60f067b4 | 275 | syslog_parse_priority(&p, &priority, false); |
663996b3 | 276 | |
52ad194e MB |
277 | if (!client_context_test_priority(s->context, priority)) |
278 | return 0; | |
279 | ||
4c89c718 MP |
280 | if (isempty(p)) |
281 | return 0; | |
282 | ||
663996b3 MS |
283 | if (s->forward_to_syslog || s->server->forward_to_syslog) |
284 | server_forward_syslog(s->server, syslog_fixup_facility(priority), s->identifier, p, &s->ucred, NULL); | |
285 | ||
286 | if (s->forward_to_kmsg || s->server->forward_to_kmsg) | |
287 | server_forward_kmsg(s->server, priority, s->identifier, p, &s->ucred); | |
288 | ||
289 | if (s->forward_to_console || s->server->forward_to_console) | |
290 | server_forward_console(s->server, priority, s->identifier, p, &s->ucred); | |
291 | ||
60f067b4 JS |
292 | if (s->server->forward_to_wall) |
293 | server_forward_wall(s->server, priority, s->identifier, p, &s->ucred); | |
294 | ||
52ad194e MB |
295 | m = N_IOVEC_META_FIELDS + 7 + client_context_extra_fields_n_iovec(s->context); |
296 | iovec = newa(struct iovec, m); | |
297 | ||
f5e65279 MB |
298 | iovec[n++] = IOVEC_MAKE_STRING("_TRANSPORT=stdout"); |
299 | iovec[n++] = IOVEC_MAKE_STRING(s->id_field); | |
663996b3 | 300 | |
52ad194e | 301 | syslog_priority[STRLEN("PRIORITY=")] = '0' + LOG_PRI(priority); |
f5e65279 | 302 | iovec[n++] = IOVEC_MAKE_STRING(syslog_priority); |
663996b3 | 303 | |
60f067b4 | 304 | if (priority & LOG_FACMASK) { |
e735f4d4 | 305 | xsprintf(syslog_facility, "SYSLOG_FACILITY=%i", LOG_FAC(priority)); |
f5e65279 | 306 | iovec[n++] = IOVEC_MAKE_STRING(syslog_facility); |
60f067b4 | 307 | } |
663996b3 MS |
308 | |
309 | if (s->identifier) { | |
f2dec872 | 310 | syslog_identifier = strjoin("SYSLOG_IDENTIFIER=", s->identifier); |
663996b3 | 311 | if (syslog_identifier) |
f5e65279 MB |
312 | iovec[n++] = IOVEC_MAKE_STRING(syslog_identifier); |
313 | } | |
314 | ||
a10f5d05 MB |
315 | static const char * const line_break_field_table[_LINE_BREAK_MAX] = { |
316 | [LINE_BREAK_NEWLINE] = NULL, /* Do not add field if traditional newline */ | |
317 | [LINE_BREAK_NUL] = "_LINE_BREAK=nul", | |
318 | [LINE_BREAK_LINE_MAX] = "_LINE_BREAK=line-max", | |
319 | [LINE_BREAK_EOF] = "_LINE_BREAK=eof", | |
320 | [LINE_BREAK_PID_CHANGE] = "_LINE_BREAK=pid-change", | |
321 | }; | |
f5e65279 | 322 | |
a10f5d05 | 323 | const char *c = line_break_field_table[line_break]; |
f5e65279 | 324 | |
a10f5d05 MB |
325 | /* If this log message was generated due to an uncommon line break then mention this in the log |
326 | * entry */ | |
327 | if (c) | |
f5e65279 | 328 | iovec[n++] = IOVEC_MAKE_STRING(c); |
663996b3 | 329 | |
f2dec872 | 330 | message = strjoin("MESSAGE=", p); |
663996b3 | 331 | if (message) |
f5e65279 MB |
332 | iovec[n++] = IOVEC_MAKE_STRING(message); |
333 | ||
52ad194e | 334 | server_dispatch_message(s->server, iovec, n, m, s->context, NULL, priority, 0); |
663996b3 MS |
335 | return 0; |
336 | } | |
337 | ||
3a6ce677 BR |
338 | static int syslog_parse_priority_and_facility(const char *s) { |
339 | int prio, r; | |
340 | ||
341 | /* Parses both facility and priority in one value, i.e. is different from log_level_from_string() | |
342 | * which only parses the priority and refuses any facility value */ | |
343 | ||
344 | r = safe_atoi(s, &prio); | |
345 | if (r < 0) | |
346 | return r; | |
347 | ||
348 | if (prio < 0 || prio > 999) | |
349 | return -ERANGE; | |
350 | ||
351 | return prio; | |
352 | } | |
353 | ||
f5e65279 | 354 | static int stdout_stream_line(StdoutStream *s, char *p, LineBreak line_break) { |
4c89c718 | 355 | char *orig; |
a10f5d05 | 356 | int r; |
663996b3 MS |
357 | |
358 | assert(s); | |
359 | assert(p); | |
360 | ||
4c89c718 | 361 | orig = p; |
663996b3 MS |
362 | p = strstrip(p); |
363 | ||
f5e65279 | 364 | /* line breaks by NUL, line max length or EOF are not permissible during the negotiation part of the protocol */ |
a10f5d05 MB |
365 | if (line_break != LINE_BREAK_NEWLINE && s->state != STDOUT_STREAM_RUNNING) |
366 | return log_warning_errno(SYNTHETIC_ERRNO(EINVAL), | |
367 | "Control protocol line not properly terminated."); | |
f5e65279 | 368 | |
663996b3 MS |
369 | switch (s->state) { |
370 | ||
371 | case STDOUT_STREAM_IDENTIFIER: | |
f5e65279 | 372 | if (!isempty(p)) { |
663996b3 MS |
373 | s->identifier = strdup(p); |
374 | if (!s->identifier) | |
375 | return log_oom(); | |
376 | } | |
377 | ||
378 | s->state = STDOUT_STREAM_UNIT_ID; | |
379 | return 0; | |
380 | ||
381 | case STDOUT_STREAM_UNIT_ID: | |
f5e65279 MB |
382 | if (s->ucred.uid == 0 && |
383 | unit_name_is_valid(p, UNIT_NAME_PLAIN|UNIT_NAME_INSTANCE)) { | |
384 | ||
385 | s->unit_id = strdup(p); | |
386 | if (!s->unit_id) | |
387 | return log_oom(); | |
663996b3 MS |
388 | } |
389 | ||
390 | s->state = STDOUT_STREAM_PRIORITY; | |
391 | return 0; | |
392 | ||
3a6ce677 BR |
393 | case STDOUT_STREAM_PRIORITY: { |
394 | int priority; | |
663996b3 | 395 | |
3a6ce677 BR |
396 | priority = syslog_parse_priority_and_facility(p); |
397 | if (priority < 0) | |
398 | return log_warning_errno(priority, "Failed to parse log priority line: %m"); | |
399 | ||
400 | s->priority = priority; | |
663996b3 MS |
401 | s->state = STDOUT_STREAM_LEVEL_PREFIX; |
402 | return 0; | |
3a6ce677 | 403 | } |
663996b3 MS |
404 | |
405 | case STDOUT_STREAM_LEVEL_PREFIX: | |
406 | r = parse_boolean(p); | |
3a6ce677 BR |
407 | if (r < 0) |
408 | return log_warning_errno(r, "Failed to parse level prefix line: %m"); | |
663996b3 | 409 | |
b012e921 | 410 | s->level_prefix = r; |
663996b3 MS |
411 | s->state = STDOUT_STREAM_FORWARD_TO_SYSLOG; |
412 | return 0; | |
413 | ||
414 | case STDOUT_STREAM_FORWARD_TO_SYSLOG: | |
415 | r = parse_boolean(p); | |
3a6ce677 BR |
416 | if (r < 0) |
417 | return log_warning_errno(r, "Failed to parse forward to syslog line: %m"); | |
663996b3 | 418 | |
b012e921 | 419 | s->forward_to_syslog = r; |
663996b3 MS |
420 | s->state = STDOUT_STREAM_FORWARD_TO_KMSG; |
421 | return 0; | |
422 | ||
423 | case STDOUT_STREAM_FORWARD_TO_KMSG: | |
424 | r = parse_boolean(p); | |
3a6ce677 BR |
425 | if (r < 0) |
426 | return log_warning_errno(r, "Failed to parse copy to kmsg line: %m"); | |
663996b3 | 427 | |
b012e921 | 428 | s->forward_to_kmsg = r; |
663996b3 MS |
429 | s->state = STDOUT_STREAM_FORWARD_TO_CONSOLE; |
430 | return 0; | |
431 | ||
432 | case STDOUT_STREAM_FORWARD_TO_CONSOLE: | |
433 | r = parse_boolean(p); | |
3a6ce677 BR |
434 | if (r < 0) |
435 | return log_warning_errno(r, "Failed to parse copy to console line."); | |
663996b3 | 436 | |
b012e921 | 437 | s->forward_to_console = r; |
663996b3 | 438 | s->state = STDOUT_STREAM_RUNNING; |
e735f4d4 MP |
439 | |
440 | /* Try to save the stream, so that journald can be restarted and we can recover */ | |
441 | (void) stdout_stream_save(s); | |
663996b3 MS |
442 | return 0; |
443 | ||
444 | case STDOUT_STREAM_RUNNING: | |
f5e65279 | 445 | return stdout_stream_log(s, orig, line_break); |
663996b3 MS |
446 | } |
447 | ||
ea0999c9 | 448 | assert_not_reached(); |
663996b3 MS |
449 | } |
450 | ||
a10f5d05 MB |
451 | static int stdout_stream_found( |
452 | StdoutStream *s, | |
453 | char *p, | |
454 | size_t l, | |
455 | LineBreak line_break) { | |
456 | ||
457 | char saved; | |
663996b3 MS |
458 | int r; |
459 | ||
460 | assert(s); | |
a10f5d05 | 461 | assert(p); |
663996b3 | 462 | |
a10f5d05 MB |
463 | /* Let's NUL terminate the specified buffer for this call, and revert back afterwards */ |
464 | saved = p[l]; | |
465 | p[l] = 0; | |
466 | r = stdout_stream_line(s, p, line_break); | |
467 | p[l] = saved; | |
468 | ||
469 | return r; | |
470 | } | |
471 | ||
5b5a102a MB |
472 | static size_t stdout_stream_line_max(StdoutStream *s) { |
473 | assert(s); | |
474 | ||
475 | /* During the "setup" phase of our protocol, let's ensure we use a line length where a full unit name | |
476 | * can fit in */ | |
477 | if (s->state != STDOUT_STREAM_RUNNING) | |
478 | return STDOUT_STREAM_SETUP_PROTOCOL_LINE_MAX; | |
479 | ||
480 | /* After the protocol's "setup" phase is complete, let's use whatever the user configured */ | |
481 | return s->server->line_max; | |
482 | } | |
483 | ||
a10f5d05 MB |
484 | static int stdout_stream_scan( |
485 | StdoutStream *s, | |
486 | char *p, | |
487 | size_t remaining, | |
488 | LineBreak force_flush, | |
489 | size_t *ret_consumed) { | |
490 | ||
5b5a102a | 491 | size_t consumed = 0, line_max; |
a10f5d05 | 492 | int r; |
8a584da2 | 493 | |
a10f5d05 MB |
494 | assert(s); |
495 | assert(p); | |
8a584da2 | 496 | |
5b5a102a MB |
497 | line_max = stdout_stream_line_max(s); |
498 | ||
663996b3 | 499 | for (;;) { |
f5e65279 | 500 | LineBreak line_break; |
a10f5d05 | 501 | size_t skip, found; |
f5e65279 | 502 | char *end1, *end2; |
5b5a102a | 503 | size_t tmp_remaining = MIN(remaining, line_max); |
f5e65279 | 504 | |
5b5a102a MB |
505 | end1 = memchr(p, '\n', tmp_remaining); |
506 | end2 = memchr(p, 0, end1 ? (size_t) (end1 - p) : tmp_remaining); | |
f5e65279 MB |
507 | |
508 | if (end2) { | |
509 | /* We found a NUL terminator */ | |
a10f5d05 MB |
510 | found = end2 - p; |
511 | skip = found + 1; | |
f5e65279 MB |
512 | line_break = LINE_BREAK_NUL; |
513 | } else if (end1) { | |
514 | /* We found a \n terminator */ | |
a10f5d05 MB |
515 | found = end1 - p; |
516 | skip = found + 1; | |
f5e65279 | 517 | line_break = LINE_BREAK_NEWLINE; |
5b5a102a | 518 | } else if (remaining >= line_max) { |
f5e65279 | 519 | /* Force a line break after the maximum line length */ |
5b5a102a | 520 | found = skip = line_max; |
f5e65279 | 521 | line_break = LINE_BREAK_LINE_MAX; |
663996b3 MS |
522 | } else |
523 | break; | |
524 | ||
a10f5d05 | 525 | r = stdout_stream_found(s, p, found, line_break); |
663996b3 MS |
526 | if (r < 0) |
527 | return r; | |
528 | ||
663996b3 | 529 | p += skip; |
a10f5d05 MB |
530 | consumed += skip; |
531 | remaining -= skip; | |
663996b3 MS |
532 | } |
533 | ||
a10f5d05 MB |
534 | if (force_flush >= 0 && remaining > 0) { |
535 | r = stdout_stream_found(s, p, remaining, force_flush); | |
663996b3 MS |
536 | if (r < 0) |
537 | return r; | |
538 | ||
a10f5d05 | 539 | consumed += remaining; |
663996b3 MS |
540 | } |
541 | ||
a10f5d05 MB |
542 | if (ret_consumed) |
543 | *ret_consumed = consumed; | |
663996b3 MS |
544 | |
545 | return 0; | |
546 | } | |
547 | ||
60f067b4 | 548 | static int stdout_stream_process(sd_event_source *es, int fd, uint32_t revents, void *userdata) { |
a10f5d05 | 549 | CMSG_BUFFER_TYPE(CMSG_SPACE(sizeof(struct ucred))) control; |
8b3d4ff0 | 550 | size_t limit, consumed, allocated; |
086111aa | 551 | StdoutStream *s = ASSERT_PTR(userdata); |
a10f5d05 | 552 | struct ucred *ucred; |
e1f67bc7 | 553 | struct iovec iovec; |
663996b3 | 554 | ssize_t l; |
a10f5d05 | 555 | char *p; |
663996b3 MS |
556 | int r; |
557 | ||
e1f67bc7 MB |
558 | struct msghdr msghdr = { |
559 | .msg_iov = &iovec, | |
560 | .msg_iovlen = 1, | |
a10f5d05 MB |
561 | .msg_control = &control, |
562 | .msg_controllen = sizeof(control), | |
e1f67bc7 MB |
563 | }; |
564 | ||
60f067b4 JS |
565 | if ((revents|EPOLLIN|EPOLLHUP) != (EPOLLIN|EPOLLHUP)) { |
566 | log_error("Got invalid event from epoll for stdout stream: %"PRIx32, revents); | |
567 | goto terminate; | |
568 | } | |
569 | ||
20a6e51f | 570 | /* If the buffer is almost full, add room for another 1K */ |
8b3d4ff0 MB |
571 | allocated = MALLOC_ELEMENTSOF(s->buffer); |
572 | if (s->length + 512 >= allocated) { | |
573 | if (!GREEDY_REALLOC(s->buffer, s->length + 1 + 1024)) { | |
f5e65279 MB |
574 | log_oom(); |
575 | goto terminate; | |
576 | } | |
8b3d4ff0 MB |
577 | |
578 | allocated = MALLOC_ELEMENTSOF(s->buffer); | |
f5e65279 MB |
579 | } |
580 | ||
581 | /* Try to make use of the allocated buffer in full, but never read more than the configured line size. Also, | |
582 | * always leave room for a terminating NUL we might need to add. */ | |
8b3d4ff0 | 583 | limit = MIN(allocated - 1, MAX(s->server->line_max, STDOUT_STREAM_SETUP_PROTOCOL_LINE_MAX)); |
a10f5d05 | 584 | assert(s->length <= limit); |
e1f67bc7 MB |
585 | iovec = IOVEC_MAKE(s->buffer + s->length, limit - s->length); |
586 | ||
587 | l = recvmsg(s->fd, &msghdr, MSG_DONTWAIT|MSG_CMSG_CLOEXEC); | |
f5e65279 | 588 | if (l < 0) { |
ea0999c9 | 589 | if (ERRNO_IS_TRANSIENT(errno)) |
663996b3 MS |
590 | return 0; |
591 | ||
f47781d8 | 592 | log_warning_errno(errno, "Failed to read from stream: %m"); |
60f067b4 | 593 | goto terminate; |
663996b3 | 594 | } |
e1f67bc7 | 595 | cmsg_close_all(&msghdr); |
663996b3 MS |
596 | |
597 | if (l == 0) { | |
a10f5d05 | 598 | (void) stdout_stream_scan(s, s->buffer, s->length, /* force_flush = */ LINE_BREAK_EOF, NULL); |
60f067b4 | 599 | goto terminate; |
663996b3 MS |
600 | } |
601 | ||
a10f5d05 MB |
602 | /* Invalidate the context if the PID of the sender changed. This happens when a forked process |
603 | * inherits stdout/stderr from a parent. In this case getpeercred() returns the ucred of the parent, | |
604 | * which can be invalid if the parent has exited in the meantime. */ | |
605 | ucred = CMSG_FIND_DATA(&msghdr, SOL_SOCKET, SCM_CREDENTIALS, struct ucred); | |
e1f67bc7 | 606 | if (ucred && ucred->pid != s->ucred.pid) { |
a10f5d05 MB |
607 | /* Force out any previously half-written lines from a different process, before we switch to |
608 | * the new ucred structure for everything we just added */ | |
609 | r = stdout_stream_scan(s, s->buffer, s->length, /* force_flush = */ LINE_BREAK_PID_CHANGE, NULL); | |
e1f67bc7 MB |
610 | if (r < 0) |
611 | goto terminate; | |
612 | ||
a10f5d05 MB |
613 | s->context = client_context_release(s->server, s->context); |
614 | ||
615 | p = s->buffer + s->length; | |
616 | } else { | |
617 | p = s->buffer; | |
618 | l += s->length; | |
e1f67bc7 MB |
619 | } |
620 | ||
a10f5d05 MB |
621 | /* Always copy in the new credentials */ |
622 | if (ucred) | |
623 | s->ucred = *ucred; | |
624 | ||
625 | r = stdout_stream_scan(s, p, l, _LINE_BREAK_INVALID, &consumed); | |
663996b3 | 626 | if (r < 0) |
60f067b4 | 627 | goto terminate; |
663996b3 | 628 | |
a10f5d05 MB |
629 | /* Move what wasn't consumed to the front of the buffer */ |
630 | assert(consumed <= (size_t) l); | |
631 | s->length = l - consumed; | |
632 | memmove(s->buffer, p + consumed, s->length); | |
633 | ||
663996b3 MS |
634 | return 1; |
635 | ||
60f067b4 | 636 | terminate: |
e735f4d4 | 637 | stdout_stream_destroy(s); |
60f067b4 | 638 | return 0; |
663996b3 MS |
639 | } |
640 | ||
6e866b33 | 641 | int stdout_stream_install(Server *s, int fd, StdoutStream **ret) { |
e735f4d4 | 642 | _cleanup_(stdout_stream_freep) StdoutStream *stream = NULL; |
f5e65279 | 643 | sd_id128_t id; |
e735f4d4 MP |
644 | int r; |
645 | ||
663996b3 | 646 | assert(s); |
e735f4d4 | 647 | assert(fd >= 0); |
663996b3 | 648 | |
f5e65279 MB |
649 | r = sd_id128_randomize(&id); |
650 | if (r < 0) | |
651 | return log_error_errno(r, "Failed to generate stream ID: %m"); | |
652 | ||
46cdbd49 | 653 | stream = new(StdoutStream, 1); |
e735f4d4 MP |
654 | if (!stream) |
655 | return log_oom(); | |
663996b3 | 656 | |
46cdbd49 BR |
657 | *stream = (StdoutStream) { |
658 | .fd = -1, | |
659 | .priority = LOG_INFO, | |
ea0999c9 | 660 | .ucred = UCRED_INVALID, |
46cdbd49 | 661 | }; |
663996b3 | 662 | |
f5e65279 MB |
663 | xsprintf(stream->id_field, "_STREAM_ID=" SD_ID128_FORMAT_STR, SD_ID128_FORMAT_VAL(id)); |
664 | ||
e735f4d4 MP |
665 | r = getpeercred(fd, &stream->ucred); |
666 | if (r < 0) | |
667 | return log_error_errno(r, "Failed to determine peer credentials: %m"); | |
60f067b4 | 668 | |
e1f67bc7 MB |
669 | r = setsockopt_int(fd, SOL_SOCKET, SO_PASSCRED, true); |
670 | if (r < 0) | |
671 | return log_error_errno(r, "SO_PASSCRED failed: %m"); | |
672 | ||
81c58355 | 673 | if (mac_selinux_use()) { |
86f210e9 MP |
674 | r = getpeersec(fd, &stream->label); |
675 | if (r < 0 && r != -EOPNOTSUPP) | |
676 | (void) log_warning_errno(r, "Failed to determine peer security context: %m"); | |
e735f4d4 | 677 | } |
663996b3 | 678 | |
e735f4d4 MP |
679 | (void) shutdown(fd, SHUT_WR); |
680 | ||
681 | r = sd_event_add_io(s->event, &stream->event_source, fd, EPOLLIN, stdout_stream_process, stream); | |
682 | if (r < 0) | |
683 | return log_error_errno(r, "Failed to add stream to event loop: %m"); | |
684 | ||
685 | r = sd_event_source_set_priority(stream->event_source, SD_EVENT_PRIORITY_NORMAL+5); | |
686 | if (r < 0) | |
687 | return log_error_errno(r, "Failed to adjust stdout event source priority: %m"); | |
688 | ||
689 | stream->fd = fd; | |
690 | ||
691 | stream->server = s; | |
692 | LIST_PREPEND(stdout_stream, s->stdout_streams, stream); | |
aa27b158 | 693 | s->n_stdout_streams++; |
e735f4d4 | 694 | |
46cdbd49 BR |
695 | (void) server_start_or_stop_idle_timer(s); /* Maybe no longer idle? */ |
696 | ||
e735f4d4 MP |
697 | if (ret) |
698 | *ret = stream; | |
699 | ||
46cdbd49 | 700 | TAKE_PTR(stream); |
e735f4d4 | 701 | return 0; |
663996b3 MS |
702 | } |
703 | ||
60f067b4 | 704 | static int stdout_stream_new(sd_event_source *es, int listen_fd, uint32_t revents, void *userdata) { |
e735f4d4 | 705 | _cleanup_close_ int fd = -1; |
086111aa | 706 | Server *s = ASSERT_PTR(userdata); |
e735f4d4 | 707 | int r; |
663996b3 | 708 | |
6e866b33 MB |
709 | if (revents != EPOLLIN) |
710 | return log_error_errno(SYNTHETIC_ERRNO(EIO), | |
711 | "Got invalid event from epoll for stdout server fd: %" PRIx32, | |
712 | revents); | |
60f067b4 | 713 | |
663996b3 MS |
714 | fd = accept4(s->stdout_fd, NULL, NULL, SOCK_NONBLOCK|SOCK_CLOEXEC); |
715 | if (fd < 0) { | |
bb4f798a | 716 | if (ERRNO_IS_ACCEPT_AGAIN(errno)) |
663996b3 MS |
717 | return 0; |
718 | ||
db2df898 | 719 | return log_error_errno(errno, "Failed to accept stdout connection: %m"); |
663996b3 MS |
720 | } |
721 | ||
722 | if (s->n_stdout_streams >= STDOUT_STREAMS_MAX) { | |
ea0999c9 | 723 | struct ucred u = UCRED_INVALID; |
6e866b33 | 724 | |
ea0999c9 | 725 | (void) getpeercred(fd, &u); |
6e866b33 MB |
726 | |
727 | /* By closing fd here we make sure that the client won't wait too long for journald to | |
728 | * gather all the data it adds to the error message to find out that the connection has | |
729 | * just been refused. | |
730 | */ | |
731 | fd = safe_close(fd); | |
732 | ||
ea0999c9 | 733 | server_driver_message(s, u.pid, NULL, LOG_MESSAGE("Too many stdout streams, refusing connection."), NULL); |
663996b3 MS |
734 | return 0; |
735 | } | |
736 | ||
e735f4d4 MP |
737 | r = stdout_stream_install(s, fd, NULL); |
738 | if (r < 0) | |
739 | return r; | |
740 | ||
46cdbd49 | 741 | TAKE_FD(fd); |
e735f4d4 MP |
742 | return 0; |
743 | } | |
744 | ||
745 | static int stdout_stream_load(StdoutStream *stream, const char *fname) { | |
746 | _cleanup_free_ char | |
747 | *priority = NULL, | |
748 | *level_prefix = NULL, | |
749 | *forward_to_syslog = NULL, | |
750 | *forward_to_kmsg = NULL, | |
f5e65279 MB |
751 | *forward_to_console = NULL, |
752 | *stream_id = NULL; | |
e735f4d4 MP |
753 | int r; |
754 | ||
755 | assert(stream); | |
756 | assert(fname); | |
757 | ||
758 | if (!stream->state_file) { | |
46cdbd49 | 759 | stream->state_file = path_join(stream->server->runtime_directory, "streams", fname); |
e735f4d4 MP |
760 | if (!stream->state_file) |
761 | return log_oom(); | |
663996b3 MS |
762 | } |
763 | ||
6e866b33 | 764 | r = parse_env_file(NULL, stream->state_file, |
e735f4d4 MP |
765 | "PRIORITY", &priority, |
766 | "LEVEL_PREFIX", &level_prefix, | |
767 | "FORWARD_TO_SYSLOG", &forward_to_syslog, | |
768 | "FORWARD_TO_KMSG", &forward_to_kmsg, | |
769 | "FORWARD_TO_CONSOLE", &forward_to_console, | |
770 | "IDENTIFIER", &stream->identifier, | |
771 | "UNIT", &stream->unit_id, | |
6e866b33 | 772 | "STREAM_ID", &stream_id); |
e735f4d4 MP |
773 | if (r < 0) |
774 | return log_error_errno(r, "Failed to read: %s", stream->state_file); | |
663996b3 | 775 | |
e735f4d4 MP |
776 | if (priority) { |
777 | int p; | |
778 | ||
3a6ce677 | 779 | p = syslog_parse_priority_and_facility(priority); |
e735f4d4 MP |
780 | if (p >= 0) |
781 | stream->priority = p; | |
663996b3 MS |
782 | } |
783 | ||
e735f4d4 MP |
784 | if (level_prefix) { |
785 | r = parse_boolean(level_prefix); | |
786 | if (r >= 0) | |
787 | stream->level_prefix = r; | |
60f067b4 | 788 | } |
663996b3 | 789 | |
e735f4d4 MP |
790 | if (forward_to_syslog) { |
791 | r = parse_boolean(forward_to_syslog); | |
792 | if (r >= 0) | |
793 | stream->forward_to_syslog = r; | |
663996b3 MS |
794 | } |
795 | ||
e735f4d4 MP |
796 | if (forward_to_kmsg) { |
797 | r = parse_boolean(forward_to_kmsg); | |
798 | if (r >= 0) | |
799 | stream->forward_to_kmsg = r; | |
60f067b4 JS |
800 | } |
801 | ||
e735f4d4 MP |
802 | if (forward_to_console) { |
803 | r = parse_boolean(forward_to_console); | |
804 | if (r >= 0) | |
805 | stream->forward_to_console = r; | |
663996b3 MS |
806 | } |
807 | ||
f5e65279 MB |
808 | if (stream_id) { |
809 | sd_id128_t id; | |
810 | ||
811 | r = sd_id128_from_string(stream_id, &id); | |
812 | if (r >= 0) | |
813 | xsprintf(stream->id_field, "_STREAM_ID=" SD_ID128_FORMAT_STR, SD_ID128_FORMAT_VAL(id)); | |
814 | } | |
815 | ||
e735f4d4 MP |
816 | return 0; |
817 | } | |
818 | ||
819 | static int stdout_stream_restore(Server *s, const char *fname, int fd) { | |
820 | StdoutStream *stream; | |
821 | int r; | |
822 | ||
823 | assert(s); | |
824 | assert(fname); | |
825 | assert(fd >= 0); | |
826 | ||
827 | if (s->n_stdout_streams >= STDOUT_STREAMS_MAX) { | |
828 | log_warning("Too many stdout streams, refusing restoring of stream."); | |
829 | return -ENOBUFS; | |
830 | } | |
831 | ||
832 | r = stdout_stream_install(s, fd, &stream); | |
833 | if (r < 0) | |
834 | return r; | |
835 | ||
836 | stream->state = STDOUT_STREAM_RUNNING; | |
837 | stream->fdstore = true; | |
838 | ||
839 | /* Ignore all parsing errors */ | |
840 | (void) stdout_stream_load(stream, fname); | |
663996b3 MS |
841 | |
842 | return 0; | |
e735f4d4 MP |
843 | } |
844 | ||
db2df898 | 845 | int server_restore_streams(Server *s, FDSet *fds) { |
e735f4d4 | 846 | _cleanup_closedir_ DIR *d = NULL; |
46cdbd49 | 847 | const char *path; |
e735f4d4 MP |
848 | int r; |
849 | ||
46cdbd49 BR |
850 | path = strjoina(s->runtime_directory, "/streams"); |
851 | d = opendir(path); | |
e735f4d4 MP |
852 | if (!d) { |
853 | if (errno == ENOENT) | |
854 | return 0; | |
855 | ||
46cdbd49 | 856 | return log_warning_errno(errno, "Failed to enumerate %s: %m", path); |
e735f4d4 MP |
857 | } |
858 | ||
859 | FOREACH_DIRENT(de, d, goto fail) { | |
860 | unsigned long st_dev, st_ino; | |
861 | bool found = false; | |
e735f4d4 MP |
862 | int fd; |
863 | ||
864 | if (sscanf(de->d_name, "%lu:%lu", &st_dev, &st_ino) != 2) | |
865 | continue; | |
866 | ||
a032b68d | 867 | FDSET_FOREACH(fd, fds) { |
e735f4d4 MP |
868 | struct stat st; |
869 | ||
870 | if (fstat(fd, &st) < 0) | |
871 | return log_error_errno(errno, "Failed to stat %s: %m", de->d_name); | |
872 | ||
873 | if (S_ISSOCK(st.st_mode) && st.st_dev == st_dev && st.st_ino == st_ino) { | |
874 | found = true; | |
875 | break; | |
876 | } | |
877 | } | |
878 | ||
879 | if (!found) { | |
880 | /* No file descriptor? Then let's delete the state file */ | |
881 | log_debug("Cannot restore stream file %s", de->d_name); | |
98393f85 | 882 | if (unlinkat(dirfd(d), de->d_name, 0) < 0) |
46cdbd49 | 883 | log_warning_errno(errno, "Failed to remove %s/%s: %m", path, de->d_name); |
e735f4d4 MP |
884 | continue; |
885 | } | |
886 | ||
887 | fdset_remove(fds, fd); | |
888 | ||
889 | r = stdout_stream_restore(s, de->d_name, fd); | |
890 | if (r < 0) | |
891 | safe_close(fd); | |
892 | } | |
663996b3 | 893 | |
60f067b4 | 894 | return 0; |
e735f4d4 MP |
895 | |
896 | fail: | |
897 | return log_error_errno(errno, "Failed to read streams directory: %m"); | |
663996b3 MS |
898 | } |
899 | ||
46cdbd49 | 900 | int server_open_stdout_socket(Server *s, const char *stdout_socket) { |
663996b3 | 901 | int r; |
663996b3 MS |
902 | |
903 | assert(s); | |
46cdbd49 | 904 | assert(stdout_socket); |
663996b3 MS |
905 | |
906 | if (s->stdout_fd < 0) { | |
46cdbd49 BR |
907 | union sockaddr_union sa; |
908 | socklen_t sa_len; | |
909 | ||
910 | r = sockaddr_un_set_path(&sa.un, stdout_socket); | |
911 | if (r < 0) | |
912 | return log_error_errno(r, "Unable to use namespace path %s for AF_UNIX socket: %m", stdout_socket); | |
913 | sa_len = r; | |
914 | ||
663996b3 | 915 | s->stdout_fd = socket(AF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0); |
f47781d8 MP |
916 | if (s->stdout_fd < 0) |
917 | return log_error_errno(errno, "socket() failed: %m"); | |
663996b3 | 918 | |
6e866b33 | 919 | (void) sockaddr_un_unlink(&sa.un); |
663996b3 | 920 | |
46cdbd49 | 921 | r = bind(s->stdout_fd, &sa.sa, sa_len); |
f47781d8 MP |
922 | if (r < 0) |
923 | return log_error_errno(errno, "bind(%s) failed: %m", sa.un.sun_path); | |
663996b3 | 924 | |
e3bff60a | 925 | (void) chmod(sa.un.sun_path, 0666); |
663996b3 | 926 | |
f47781d8 MP |
927 | if (listen(s->stdout_fd, SOMAXCONN) < 0) |
928 | return log_error_errno(errno, "listen(%s) failed: %m", sa.un.sun_path); | |
663996b3 | 929 | } else |
6e866b33 | 930 | (void) fd_nonblock(s->stdout_fd, true); |
663996b3 | 931 | |
60f067b4 | 932 | r = sd_event_add_io(s->event, &s->stdout_event_source, s->stdout_fd, EPOLLIN, stdout_stream_new, s); |
f47781d8 MP |
933 | if (r < 0) |
934 | return log_error_errno(r, "Failed to add stdout server fd to event source: %m"); | |
60f067b4 | 935 | |
4c89c718 | 936 | r = sd_event_source_set_priority(s->stdout_event_source, SD_EVENT_PRIORITY_NORMAL+5); |
f47781d8 MP |
937 | if (r < 0) |
938 | return log_error_errno(r, "Failed to adjust priority of stdout server event source: %m"); | |
663996b3 MS |
939 | |
940 | return 0; | |
941 | } | |
db2df898 MP |
942 | |
943 | void stdout_stream_send_notify(StdoutStream *s) { | |
944 | struct iovec iovec = { | |
945 | .iov_base = (char*) "FDSTORE=1", | |
52ad194e | 946 | .iov_len = STRLEN("FDSTORE=1"), |
db2df898 MP |
947 | }; |
948 | struct msghdr msghdr = { | |
949 | .msg_iov = &iovec, | |
950 | .msg_iovlen = 1, | |
951 | }; | |
952 | struct cmsghdr *cmsg; | |
953 | ssize_t l; | |
954 | ||
955 | assert(s); | |
956 | assert(!s->fdstore); | |
957 | assert(s->in_notify_queue); | |
958 | assert(s->server); | |
959 | assert(s->server->notify_fd >= 0); | |
960 | ||
961 | /* Store the connection fd in PID 1, so that we get it passed | |
962 | * in again on next start */ | |
963 | ||
964 | msghdr.msg_controllen = CMSG_SPACE(sizeof(int)); | |
965 | msghdr.msg_control = alloca0(msghdr.msg_controllen); | |
966 | ||
967 | cmsg = CMSG_FIRSTHDR(&msghdr); | |
968 | cmsg->cmsg_level = SOL_SOCKET; | |
969 | cmsg->cmsg_type = SCM_RIGHTS; | |
970 | cmsg->cmsg_len = CMSG_LEN(sizeof(int)); | |
971 | ||
972 | memcpy(CMSG_DATA(cmsg), &s->fd, sizeof(int)); | |
973 | ||
974 | l = sendmsg(s->server->notify_fd, &msghdr, MSG_DONTWAIT|MSG_NOSIGNAL); | |
975 | if (l < 0) { | |
976 | if (errno == EAGAIN) | |
977 | return; | |
978 | ||
979 | log_error_errno(errno, "Failed to send stream file descriptor to service manager: %m"); | |
980 | } else { | |
981 | log_debug("Successfully sent stream file descriptor to service manager."); | |
982 | s->fdstore = 1; | |
983 | } | |
984 | ||
985 | LIST_REMOVE(stdout_stream_notify_queue, s->server->stdout_streams_notify_queue, s); | |
986 | s->in_notify_queue = false; | |
987 | ||
988 | } |