service-process.c revision 788f275469ad9ed530e440d6690d0e4381a323b2
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen/* Copyright (c) 2005-2009 Dovecot authors, see the included COPYING file */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen/* Timeout chdir() completely after this many seconds */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen/* Give a warning about chdir() taking a while if it took longer than this
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen many seconds to finish. */
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainenservice_dup_fds(struct service *service, int auth_fd, int std_fd,
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen unsigned int i, count, n = 0, socket_listener_count, ssl_socket_count;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* stdin/stdout is already redirected to /dev/null. Other master fds
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen should have been opened with fd_close_on_exec() so we don't have to
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen worry about them.
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen because the destination fd might be another one's source fd we have
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen to be careful not to overwrite anything. dup() the fd when needed */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen listeners = array_get(&service->listeners, &count);
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen services_log_dup2(&dups, service->list, MASTER_LISTEN_FD_FIRST,
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen /* nonblocking anvil fd must be the first one. anvil treats it
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen as the master's fd */
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen dup2_append(&dups, service->list->nonblocking_anvil_fd[0],
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen dup2_append(&dups, service->list->blocking_anvil_fd[0],
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen /* first add non-ssl listeners */
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen for (i = 0; i < count; i++) {
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainen (listeners[i]->type != SERVICE_LISTENER_INET ||
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen /* then ssl-listeners */
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen for (i = 0; i < count; i++) {
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainen listeners[i]->type == SERVICE_LISTENER_INET &&
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen dup2_append(&dups, service->list->blocking_anvil_fd[1],
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen dup2_append(&dups, service->status_fd[1], MASTER_STATUS_FD);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strdup_printf("MASTER_AUTH_FD=%d", MASTER_AUTH_FD));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* set log file to stderr. dup2() here immediately so that
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen we can set up logging to it without causing any log messages
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen to be lost. */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (dup2(service->log_fd[1], STDERR_FILENO) < 0)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* make sure we don't leak syslog fd. try to do it as late as possible,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen but also before dup2()s in case syslog fd is one of them. */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strdup_printf("SOCKET_COUNT=%d", socket_listener_count));
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen env_put(t_strdup_printf("SSL_SOCKET_COUNT=%d", ssl_socket_count));
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainenstatic void validate_uid_gid(struct master_settings *set, uid_t uid, gid_t gid,
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainen i_fatal("User %s not allowed to log in using UNIX UID 0 "
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen (set->last_valid_uid != 0 && uid > (uid_t)set->last_valid_uid)) {
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainen i_fatal("User %s not allowed to log in using too %s "
5323bec1c24184863a13bc14a2dc9487093eea3dTimo Sirainen "UNIX UID %s%s (see first_valid_uid in config file)",
5323bec1c24184863a13bc14a2dc9487093eea3dTimo Sirainen uid < (uid_t)set->first_valid_uid ? "low" : "high",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen (set->last_valid_gid != 0 && gid > (gid_t)set->last_valid_gid)) {
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainen i_fatal("User %s not allowed to log in using too %s primary "
36689df65df7edb8b5d707d7c60abe67662605e7Timo Sirainen "UNIX group ID %s%s (see first_valid_gid in config file)",
5323bec1c24184863a13bc14a2dc9487093eea3dTimo Sirainen gid < (gid_t)set->first_valid_gid ? "low" : "high",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic void auth_args_apply(const char *const *args,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen const char **home)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset->uid = (uid_t)strtoul(*args + 4, NULL, 10);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset->gid = (gid_t)strtoul(*args + 4, NULL, 10);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("HOME=", *args + 5, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen else if (strncmp(*args, "system_groups_user=", 19) == 0)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen else if (strncmp(*args, "mail_access_groups=", 19) == 0) {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* unknown, set as environment */
e3ae2ac7a93b418cf46e829c94973b6e962a7830Timo Sirainen /* boolean */
e3ae2ac7a93b418cf46e829c94973b6e962a7830Timo Sirainen /* FIXME: kind of ugly to have it
e3ae2ac7a93b418cf46e829c94973b6e962a7830Timo Sirainen env_put(t_strconcat(t_str_ucase(key), value, NULL));
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainenstatic void auth_success_write(void)
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainen i_error("creat(%s) failed: %m", AUTH_SUCCESS_PATH);
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainenstatic void chdir_to_home(const struct restrict_access_settings *rset,
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen unsigned int left;
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("user %s: Relative home directory paths not supported: "
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* if home directory is NFS-mounted, we might not have access to it as
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen root. Change the effective UID and GID temporarily to make it
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("setegid(%s) failed: %m", dec2str(rset->gid));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("seteuid(%s) failed: %m", dec2str(rset->uid));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen if ((left = alarm(0)) < CHDIR_TIMEOUT - CHDIR_WARN_SECS) {
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_warning("user %s: chdir(%s) blocked for %u secs",
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* chdir succeeded */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen } else if ((errno == ENOENT || errno == ENOTDIR || errno == EINTR) &&
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* Not chrooted, fallback to using /tmp.
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen ENOENT: No home directory yet, but it might be automatically
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen created by the service process, so don't complain.
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen ENOTDIR: This check is mainly for /dev/null home directory.
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen EINTR: chdir() timed out. */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("user %s: %s", user, eacces_error_get("chdir", home));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("user %s: chdir(%s) failed with uid %s: %m",
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* Change UID back. No need to change GID back, it doesn't
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen really matter. */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen if (rset->uid != master_uid && seteuid(master_uid) < 0)
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("seteuid(%s) failed: %m", dec2str(master_uid));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* We still have to change to some directory where we have
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen rx-access. /tmp should exist everywhere. */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic void drop_privileges(struct service *service,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen const char *const *auth_args)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen struct master_settings *master_set = service->set->master_set;
e154d8764089896a693cbb83d6831b2398f22ee8Timo Sirainen if (auth_args != NULL && service->set->master_set->mail_debug)
6ec925f52d04ec8700e47cb005bd7ddc65ac5614Timo Sirainen restrict_process_size(service->set->vsz_limit, -1U);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.privileged_gid = service->privileged_gid;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.chroot_dir = *service->set->chroot == '\0' ? NULL :
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* non-authenticating service. don't use *_valid_gid checks */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.first_valid_gid = master_set->first_valid_gid;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.last_valid_gid = master_set->last_valid_gid;
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainen validate_uid_gid(master_set, rset.uid, rset.gid, user);
72cc352b25ad401b923436c6ed0f1f3adaffa737Timo Sirainen disallow_root = service->type == SERVICE_TYPE_AUTH_SERVER ||
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenservice_process_setup_environment(struct service *service, unsigned int uid)
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen const struct master_service_settings *set = service->list->service_set;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen const char *const *p;
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen unsigned int limit;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* remove all environment, and put back what we need */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen for (p = service->list->child_process_env; *p != NULL; p++)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat(MASTER_CONFIG_FILE_ENV"=",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* give the log's configuration directly, so it won't depend
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen on config process */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("LOG_PATH=", set->log_path, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("INFO_LOG_PATH=", set->info_log_path, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("LOG_TIMESTAMP=", set->log_timestamp, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("SYSLOG_FACILITY=", set->syslog_facility, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat(MASTER_CONFIG_FILE_ENV"=",
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen services_get_config_socket_path(service->list), NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* fallback to default limit */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen limit = service->set->master_set->default_client_limit;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strdup_printf(MASTER_CLIENT_LIMIT_ENV"=%u", limit));
788f275469ad9ed530e440d6690d0e4381a323b2Timo Sirainen env_put(t_strdup_printf(MASTER_SERVICE_COUNT_ENV"=%u",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strdup_printf(MASTER_UID_ENV"=%u", uid));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (!service->set->master_set->version_ignore)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(MASTER_DOVECOT_VERSION_ENV"="PACKAGE_VERSION);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic void service_process_status_timeout(struct service_process *process)
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen "Initial status notification not received in %d "
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen "seconds, killing the process",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (kill(process->pid, SIGKILL) < 0 && errno != ESRCH) {
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen service_error(process->service, "kill(%s, SIGKILL) failed: %m",
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainenhandle_request(const struct service_process_auth_request *request)
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen base64_encode(request->data, request->data_size, str);
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen env_put(t_strconcat("LOCAL_IP=", net_ip2addr(&request->local_ip), NULL));
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen env_put(t_strconcat("IP=", net_ip2addr(&request->remote_ip), NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenservice_process_create(struct service *service, const char *const *auth_args,
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen const struct service_process_auth_request *request)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen static unsigned int uid_counter = 0;
b2ed2b25c4c457ec1c99ebe5e9bd66a2e2f89cfdTimo Sirainen /* probably throttling service, don't create new processes */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (socketpair(AF_UNIX, SOCK_STREAM, 0, fd) < 0) {
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen service_error(service, "socketpair() failed: %m");
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen service_process_setup_environment(service, uid);
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen service_dup_fds(service, fd[1], request == NULL ? -1 :
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen process = i_malloc(sizeof(struct service_process_auth_server));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen service_process_auth_server_init(process, fd[0]);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen process = i_malloc(sizeof(struct service_process_auth_source));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen service_process_auth_source_init(process, fd[0]);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen timeout_add(SERVICE_FIRST_STATUS_TIMEOUT_SECS * 1000,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen process->available_count = service->set->client_limit;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* fallback to default limit */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen service->set->master_set->default_client_limit;
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen hash_table_insert(service_pids, &process->pid, process);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenvoid service_process_destroy(struct service_process *process)
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen struct service_list *service_list = service->list;
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen hash_table_remove(service_pids, &process->pid);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen i_assert(service->process_avail <= service->process_count);
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen service_process_notify_add(service->list->log_byes, process);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenvoid service_process_ref(struct service_process *process)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenint service_process_unref(struct service_process *process)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic const char *
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenget_exit_status_message(struct service *service, enum fatal_exit_status status)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Can't open log file";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Can't write to log file";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Internal logging error";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Out of memory";
a3dcda4b01461c7690c655a013ec12851cdb78d4Timo Sirainen return t_strdup_printf("Out of memory (vsz_limit=%u MB, "
a3dcda4b01461c7690c655a013ec12851cdb78d4Timo Sirainen "you may need to increase it)",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "exec() failed";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Fatal failure";
5fc02738b38ac2b0c21db0854d7a5ad452b1177fTimo Sirainenstatic void log_coredump(struct service *service ATTR_UNUSED,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (signum != SIGABRT && signum != SIGSEGV && signum != SIGBUS)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* let's try to figure out why we didn't get a core dump */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_append(str, " (core not dumped - set drop_priv_before_exec=yes)");
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (*service->set->privileged_group != '\0') {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_append(str, " (core not dumped - privileged_group prevented it)");
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenservice_process_get_status_error(string_t *str, struct service_process *process,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen const char *msg;
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen str_printfa(str, "service(%s): child %s ", service->set->name,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_printfa(str, "killed with signal %d", WTERMSIG(status));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_printfa(str, "died with status %d", status);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_printfa(str, "returned error %d", status);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen msg = get_exit_status_message(service, status);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic void service_process_log(struct service_process *process,
9c8f854d95d8d895022a75f140a0a500eb200d39Timo Sirainen if (!default_fatal || process->service->log_fd[1] == -1) {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* log it via the log process in charge of handling
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen this process's logging */
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen data = t_strdup_printf("%d %s DEFAULT-FATAL %s\n",
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen if (write(process->service->list->master_log_fd[1],
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenvoid service_process_log_status_error(struct service_process *process,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* fast path */
9c8f854d95d8d895022a75f140a0a500eb200d39Timo Sirainen service_process_get_status_error(str, process, status,