journald-server.c revision fa6ac76083b8ffc1309876459f54f9f0e2843731
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek This file is part of systemd.
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek Copyright 2011 Lennart Poettering
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek systemd is free software; you can redistribute it and/or modify it
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek under the terms of the GNU Lesser General Public License as published by
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek the Free Software Foundation; either version 2.1 of the License, or
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek (at your option) any later version.
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek systemd is distributed in the hope that it will be useful, but
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek WITHOUT ANY WARRANTY; without even the implied warranty of
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek Lesser General Public License for more details.
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek You should have received a copy of the GNU Lesser General Public License
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek along with systemd; If not, see <http://www.gnu.org/licenses/>.
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek#include "journal-authenticate.h"
26687bf8a907009dedcff79346860ed41511405eOleksii Shevchuk#define DEFAULT_SYNC_INTERVAL_USEC (5*USEC_PER_MINUTE)
7f1ad696a273703789b624fe0b209fb63e953016Lennart Poettering#define DEFAULT_RATE_LIMIT_INTERVAL (30*USEC_PER_SEC)
e150e82097211f09b911c7784a89ef9efed713caMichał Bartoszkiewicz#define DEFAULT_MAX_FILE_USEC USEC_PER_MONTH
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek#define RECHECK_AVAILABLE_SPACE_USEC (30*USEC_PER_SEC)
2c5859afecee81e345fc9526b1083bf79990ffb8Daniel Mackstatic const char* const storage_table[_STORAGE_MAX] = {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek [STORAGE_VOLATILE] = "volatile",
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek [STORAGE_PERSISTENT] = "persistent",
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-SzmekDEFINE_STRING_TABLE_LOOKUP(storage, Storage);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-SzmekDEFINE_CONFIG_PARSE_ENUM(config_parse_storage, storage, Storage, "Failed to parse storage setting");
2c5859afecee81e345fc9526b1083bf79990ffb8Daniel Mackstatic const char* const split_mode_table[_SPLIT_MAX] = {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-SzmekDEFINE_STRING_TABLE_LOOKUP(split_mode, SplitMode);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-SzmekDEFINE_CONFIG_PARSE_ENUM(config_parse_split_mode, split_mode, SplitMode, "Failed to parse split mode setting");
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmekstatic uint64_t available_space(Server *s, bool verbose) {
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek uint64_t sum = 0, ss_avail = 0, avail = 0;
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek if (s->cached_available_space_timestamp + RECHECK_AVAILABLE_SPACE_USEC > ts
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek return s->cached_available_space;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = sd_id128_get_machine(&machine);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek p = strappend(f, sd_id128_to_string(machine, ids));
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (fstatvfs(dirfd(d), &ss) < 0)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (!endswith(de->d_name, ".journal") &&
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek !endswith(de->d_name, ".journal~"))
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (fstatat(dirfd(d), de->d_name, &st, AT_SYMLINK_NOFOLLOW) < 0)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek sum += (uint64_t) st.st_blocks * 512UL;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek ss_avail = ss.f_bsize * ss.f_bavail;
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek /* If we reached a high mark, we will always allow this much
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek * again, unless usage goes above max_use. This watermark
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek * value is cached so that we don't give up space on pressure,
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek * but hover below the maximum usage. */
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek avail = LESS_BY(ss_avail, m->keep_free);
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek s->cached_available_space = LESS_BY(MIN(m->max_use, avail), sum);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek s->cached_available_space_timestamp = ts;
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek char fb1[FORMAT_BYTES_MAX], fb2[FORMAT_BYTES_MAX], fb3[FORMAT_BYTES_MAX],
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek fb4[FORMAT_BYTES_MAX], fb5[FORMAT_BYTES_MAX];
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek server_driver_message(s, SD_MESSAGE_JOURNAL_USAGE,
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek "%s journal is using %s (max allowed %s, "
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek "trying to leave %s free of %s available → current limit %s).",
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek s->system_journal ? "Permanent" : "Runtime",
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek format_bytes(fb1, sizeof(fb1), sum),
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek format_bytes(fb2, sizeof(fb2), m->max_use),
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek format_bytes(fb3, sizeof(fb3), m->keep_free),
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek format_bytes(fb4, sizeof(fb4), ss_avail),
348ced909724a1331b85d57aede80a102a00e428Zbigniew Jędrzejewski-Szmek format_bytes(fb5, sizeof(fb5), s->cached_available_space + sum));
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek return s->cached_available_space;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekvoid server_fix_perms(Server *s, JournalFile *f, uid_t uid) {
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_warning_errno(r, "Failed to fix access mode on %s, ignoring: %m", f->path);
56f64d95763a799ba4475daf44d8e9f72a1bd474Michal Schmidt log_warning_errno(errno, "Failed to read ACL on %s, ignoring: %m", f->path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = acl_find_uid(acl, uid, &entry);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (acl_create_entry(&acl, &entry) < 0 ||
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek acl_set_tag_type(entry, ACL_USER) < 0 ||
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek acl_set_qualifier(entry, &uid) < 0) {
56f64d95763a799ba4475daf44d8e9f72a1bd474Michal Schmidt log_warning_errno(errno, "Failed to patch ACL on %s, ignoring: %m", f->path);
23ad4dd8844c582929115a11ed2830a1371568d6Jan Alexander Steffens (heftig) /* We do not recalculate the mask unconditionally here,
23ad4dd8844c582929115a11ed2830a1371568d6Jan Alexander Steffens (heftig) * so that the fchmod() mask above stays intact. */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (acl_get_permset(entry, &permset) < 0 ||
23ad4dd8844c582929115a11ed2830a1371568d6Jan Alexander Steffens (heftig) acl_add_perm(permset, ACL_READ) < 0 ||
23ad4dd8844c582929115a11ed2830a1371568d6Jan Alexander Steffens (heftig) calc_acl_mask_if_needed(&acl) < 0) {
56f64d95763a799ba4475daf44d8e9f72a1bd474Michal Schmidt log_warning_errno(errno, "Failed to patch ACL on %s, ignoring: %m", f->path);
56f64d95763a799ba4475daf44d8e9f72a1bd474Michal Schmidt log_warning_errno(errno, "Failed to set ACL on %s, ignoring: %m", f->path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekstatic JournalFile* find_journal(Server *s, uid_t uid) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* We split up user logs only on /var, not on /run. If the
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * runtime file is open, we write to it exclusively, in order
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * to guarantee proper order as soon as we flush /run to
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * /var and close the runtime file. */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = sd_id128_get_machine(&machine);
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt f = ordered_hashmap_get(s->user_journals, UINT32_TO_PTR(uid));
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek if (asprintf(&p, "/var/log/journal/" SD_ID128_FORMAT_STR "/user-"UID_FMT".journal",
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek SD_ID128_FORMAT_VAL(machine), uid) < 0)
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt while (ordered_hashmap_size(s->user_journals) >= USER_JOURNALS_MAX) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* Too many open? Then let's close one */
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt f = ordered_hashmap_steal_first(s->user_journals);
cbd671772c9ce053a7050ddd29de170eb9efac7eZbigniew Jędrzejewski-Szmek r = journal_file_open_reliably(p, O_RDWR|O_CREAT, 0640, s->compress, s->seal, &s->system_metrics, s->mmap, NULL, &f);
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt r = ordered_hashmap_put(s->user_journals, UINT32_TO_PTR(uid), f);
fc55baee9964a118afbddbf82b8e667a0ad80b99Zbigniew Jędrzejewski-Szmekstatic int do_rotate(Server *s, JournalFile **f, const char* name,
fc55baee9964a118afbddbf82b8e667a0ad80b99Zbigniew Jędrzejewski-Szmek r = journal_file_rotate(f, s->compress, seal);
c33b329709ebe2755181980a050d02ec7c81ed87Michal Schmidt log_error_errno(r, "Failed to rotate %s: %m",
c33b329709ebe2755181980a050d02ec7c81ed87Michal Schmidt log_error_errno(r, "Failed to create new %s journal: %m",
fc55baee9964a118afbddbf82b8e667a0ad80b99Zbigniew Jędrzejewski-Szmek do_rotate(s, &s->runtime_journal, "runtime", false, 0);
fc55baee9964a118afbddbf82b8e667a0ad80b99Zbigniew Jędrzejewski-Szmek do_rotate(s, &s->system_journal, "system", s->seal, 0);
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt ORDERED_HASHMAP_FOREACH_KEY(f, k, s->user_journals, i) {
fc55baee9964a118afbddbf82b8e667a0ad80b99Zbigniew Jędrzejewski-Szmek r = do_rotate(s, &f, "user", s->seal, PTR_TO_UINT32(k));
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt ordered_hashmap_replace(s->user_journals, k, f);
fc55baee9964a118afbddbf82b8e667a0ad80b99Zbigniew Jędrzejewski-Szmek /* Old file has been closed and deallocated */
26687bf8a907009dedcff79346860ed41511405eOleksii Shevchuk r = journal_file_set_offline(s->system_journal);
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_error_errno(r, "Failed to sync system journal: %m");
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt ORDERED_HASHMAP_FOREACH_KEY(f, k, s->user_journals, i) {
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_error_errno(r, "Failed to sync user journal: %m");
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering r = sd_event_source_set_enabled(s->sync_event_source, SD_EVENT_OFF);
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_error_errno(r, "Failed to disable sync timer source: %m");
63c8666b824e8762ffb73647e1caee165dfbc868Zbigniew Jędrzejewski-Szmekstatic void do_vacuum(Server *s, char *ids, JournalFile *f, const char* path,
dbd2a83fbf051fc51bdca3aa7536c78479488c5bLennart Poettering r = journal_directory_vacuum(p, metrics->max_use, s->max_retention_usec, &s->oldest_file_usec, false);
63c8666b824e8762ffb73647e1caee165dfbc868Zbigniew Jędrzejewski-Szmek if (r < 0 && r != -ENOENT)
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_error_errno(r, "Failed to vacuum %s: %m", p);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = sd_id128_get_machine(&machine);
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_error_errno(r, "Failed to get machine ID: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek sd_id128_to_string(machine, ids);
63c8666b824e8762ffb73647e1caee165dfbc868Zbigniew Jędrzejewski-Szmek do_vacuum(s, ids, s->system_journal, "/var/log/journal/", &s->system_metrics);
63c8666b824e8762ffb73647e1caee165dfbc868Zbigniew Jędrzejewski-Szmek do_vacuum(s, ids, s->runtime_journal, "/run/log/journal/", &s->runtime_metrics);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek s->cached_available_space_timestamp = 0;
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poetteringstatic void server_cache_machine_id(Server *s) {
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering sd_id128_to_string(id, stpcpy(s->machine_id_field, "_MACHINE_ID="));
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poetteringstatic void server_cache_boot_id(Server *s) {
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering sd_id128_to_string(id, stpcpy(s->boot_id_field, "_BOOT_ID="));
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poetteringstatic void server_cache_hostname(Server *s) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekbool shall_try_append_again(JournalFile *f, int r) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* -E2BIG Hit configured limit
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -EFBIG Hit fs limit
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -EDQUOT Quota limit hit
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -ENOSPC Disk full
fa6ac76083b8ffc1309876459f54f9f0e2843731Lennart Poettering -EIO I/O error of some kind (mmap)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -EHOSTDOWN Other machine
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -EBUSY Unclean shutdown
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -EPROTONOSUPPORT Unsupported feature
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -EBADMSG Corrupted
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -ENODATA Truncated
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek -ESHUTDOWN Already archived */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (r == -E2BIG || r == -EFBIG || r == -EDQUOT || r == -ENOSPC)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_debug("%s: Allocation limit reached, rotating.", f->path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_info("%s: Journal file from other machine, rotating.", f->path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_info("%s: Unclean shutdown, rotating.", f->path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_info("%s: Unsupported feature, rotating.", f->path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek else if (r == -EBADMSG || r == -ENODATA || r == ESHUTDOWN)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_warning("%s: Journal file corrupted, rotating.", f->path);
fa6ac76083b8ffc1309876459f54f9f0e2843731Lennart Poettering else if (r == -EIO)
fa6ac76083b8ffc1309876459f54f9f0e2843731Lennart Poettering log_warning("%s: IO error, rotating.", f->path);
d07f7b9ef2835c290d6beadebd17d15308608eeaLennart Poetteringstatic void write_to_journal(Server *s, uid_t uid, struct iovec *iovec, unsigned n, int priority) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (journal_file_rotate_suggested(f, s->max_file_usec)) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_debug("%s: Journal header limits reached or header out-of-date, rotating.", f->path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_append_entry(f, NULL, iovec, n, &s->seqnum, NULL, NULL);
26687bf8a907009dedcff79346860ed41511405eOleksii Shevchuk if (r >= 0) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (vacuumed || !shall_try_append_again(f, r)) {
e40ec7aec5e64cd0cfa5fc556d6a9747229b5794Zbigniew Jędrzejewski-Szmek for (i = 0; i < n; i++)
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_error_errno(r, "Failed to write entry (%d items, %zu bytes), ignoring: %m", n, size);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_append_entry(f, NULL, iovec, n, &s->seqnum, NULL, NULL);
e40ec7aec5e64cd0cfa5fc556d6a9747229b5794Zbigniew Jędrzejewski-Szmek for (i = 0; i < n; i++)
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_error_errno(r, "Failed to write entry (%d items, %zu bytes) despite vacuuming, ignoring: %m", n, size);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekstatic void dispatch_message_real(
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek struct iovec *iovec, unsigned n, unsigned m,
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek const char *label, size_t label_len,
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek char pid[sizeof("_PID=") + DECIMAL_STR_MAX(pid_t)],
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering uid[sizeof("_UID=") + DECIMAL_STR_MAX(uid_t)],
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering gid[sizeof("_GID=") + DECIMAL_STR_MAX(gid_t)],
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering owner_uid[sizeof("_SYSTEMD_OWNER_UID=") + DECIMAL_STR_MAX(uid_t)],
d378991747d67fff1d4dc39e7fb2bc8f49f1b561Mirco Tischler source_time[sizeof("_SOURCE_REALTIME_TIMESTAMP=") + DECIMAL_STR_MAX(usec_t)],
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek o_uid[sizeof("OBJECT_UID=") + DECIMAL_STR_MAX(uid_t)],
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek o_gid[sizeof("OBJECT_GID=") + DECIMAL_STR_MAX(gid_t)],
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek o_owner_uid[sizeof("OBJECT_SYSTEMD_OWNER_UID=") + DECIMAL_STR_MAX(uid_t)];
82499507b369fea3033a74c22813bf423301aef4Lennart Poettering uid_t realuid = 0, owner = 0, journal_uid;
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek char audit_session[sizeof("_AUDIT_SESSION=") + DECIMAL_STR_MAX(uint32_t)],
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek audit_loginuid[sizeof("_AUDIT_LOGINUID=") + DECIMAL_STR_MAX(uid_t)],
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek o_audit_session[sizeof("OBJECT_AUDIT_SESSION=") + DECIMAL_STR_MAX(uint32_t)],
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek o_audit_loginuid[sizeof("OBJECT_AUDIT_LOGINUID=") + DECIMAL_STR_MAX(uid_t)];
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek assert(n + N_IOVEC_META_FIELDS + (object_pid ? N_IOVEC_OBJECT_FIELDS : 0) <= m);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(pid, "_PID="PID_FMT, ucred->pid);
c2457105d76e3daf159f554a9bafb9751b23d756Holger Hans Peter Freyther IOVEC_SET_STRING(iovec[n++], pid);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(uid, "_UID="UID_FMT, ucred->uid);
c2457105d76e3daf159f554a9bafb9751b23d756Holger Hans Peter Freyther IOVEC_SET_STRING(iovec[n++], uid);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(gid, "_GID="GID_FMT, ucred->gid);
c2457105d76e3daf159f554a9bafb9751b23d756Holger Hans Peter Freyther IOVEC_SET_STRING(iovec[n++], gid);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = get_process_comm(ucred->pid, &t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = get_process_exe(ucred->pid, &t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
9bdbc2e2ec523dbefe1c1c7e164b5544aff0b185Lukas Nykryn r = get_process_cmdline(ucred->pid, 0, false, &t);
3a83211689bdf4ab617a4fb79e11980c50918123Shawn Landden if (r >= 0) {
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = audit_session_from_pid(ucred->pid, &audit);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(audit_session, "_AUDIT_SESSION=%"PRIu32, audit);
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering IOVEC_SET_STRING(iovec[n++], audit_session);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = audit_loginuid_from_pid(ucred->pid, &loginuid);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(audit_loginuid, "_AUDIT_LOGINUID="UID_FMT, loginuid);
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering IOVEC_SET_STRING(iovec[n++], audit_loginuid);
e9174f29c7e3ee45137537b126458718913a3ec5Lennart Poettering r = cg_pid_get_path_shifted(ucred->pid, s->cgroup_root, &c);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("_SYSTEMD_CGROUP=", c);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering session = strappenda("_SYSTEMD_SESSION=", t);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], session);
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering if (cg_path_get_owner_uid(c, &owner) >= 0) {
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(owner_uid, "_SYSTEMD_OWNER_UID="UID_FMT, owner);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], owner_uid);
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering if (cg_path_get_unit(c, &t) >= 0) {
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("_SYSTEMD_UNIT=", t);
19cace379f3f680d3201cd257ab3ca6708b2d45dLennart Poettering x = strappenda("_SYSTEMD_UNIT=", unit_id);
19cace379f3f680d3201cd257ab3ca6708b2d45dLennart Poettering if (cg_path_get_user_unit(c, &t) >= 0) {
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("_SYSTEMD_USER_UNIT=", t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
19cace379f3f680d3201cd257ab3ca6708b2d45dLennart Poettering x = strappenda("_SYSTEMD_USER_UNIT=", unit_id);
0a244b8ecb6dfcb381fe831dc2aa9bacb2c12975Lennart Poettering if (cg_path_get_slice(c, &t) >= 0) {
2d43b190901902dbd98ccea77c1d1ddc9e2a9955Dan McGee } else if (unit_id) {
f8294e4175918117ca6c131720bcf287eadcd029Josh Triplett x = alloca(strlen("_SELINUX_CONTEXT=") + label_len + 1);
d682b3a7e7c7c2941a4d3e193f1e330dbc9fae89Lennart Poettering *((char*) mempcpy(stpcpy(x, "_SELINUX_CONTEXT="), label, label_len)) = 0;
d682b3a7e7c7c2941a4d3e193f1e330dbc9fae89Lennart Poettering x = strappenda("_SELINUX_CONTEXT=", con);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek r = get_process_uid(object_pid, &object_uid);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(o_uid, "OBJECT_UID="UID_FMT, object_uid);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], o_uid);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek r = get_process_gid(object_pid, &object_gid);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(o_gid, "OBJECT_GID="GID_FMT, object_gid);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], o_gid);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek r = get_process_comm(object_pid, &t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("OBJECT_COMM=", t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek r = get_process_exe(object_pid, &t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("OBJECT_EXE=", t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek r = get_process_cmdline(object_pid, 0, false, &t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("OBJECT_CMDLINE=", t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek r = audit_session_from_pid(object_pid, &audit);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(o_audit_session, "OBJECT_AUDIT_SESSION=%"PRIu32, audit);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], o_audit_session);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek r = audit_loginuid_from_pid(object_pid, &loginuid);
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(o_audit_loginuid, "OBJECT_AUDIT_LOGINUID="UID_FMT, loginuid);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], o_audit_loginuid);
e9174f29c7e3ee45137537b126458718913a3ec5Lennart Poettering r = cg_pid_get_path_shifted(object_pid, s->cgroup_root, &c);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("OBJECT_SYSTEMD_CGROUP=", c);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("OBJECT_SYSTEMD_SESSION=", t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek if (cg_path_get_owner_uid(c, &owner) >= 0) {
de0671ee7fe465e108f62dcbbbe9366f81dd9e9aZbigniew Jędrzejewski-Szmek sprintf(o_owner_uid, "OBJECT_SYSTEMD_OWNER_UID="UID_FMT, owner);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], o_owner_uid);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek if (cg_path_get_unit(c, &t) >= 0) {
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("OBJECT_SYSTEMD_UNIT=", t);
19cace379f3f680d3201cd257ab3ca6708b2d45dLennart Poettering if (cg_path_get_user_unit(c, &t) >= 0) {
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek x = strappenda("OBJECT_SYSTEMD_USER_UNIT=", t);
968f319679d9069af037240d0c3bcd126181cdacZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], x);
ae018d9bc900d6355dea4af05119b49c67945184Lennart Poettering sprintf(source_time, "_SOURCE_REALTIME_TIMESTAMP=%llu", (unsigned long long) timeval_load(tv));
a569398925430de1f8479262e8ab39502054f2e9Lennart Poettering IOVEC_SET_STRING(iovec[n++], source_time);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* Note that strictly speaking storing the boot id here is
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * redundant since the entry includes this in-line
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * anyway. However, we need this indexed, too. */
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering IOVEC_SET_STRING(iovec[n++], s->boot_id_field);
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering IOVEC_SET_STRING(iovec[n++], s->machine_id_field);
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering IOVEC_SET_STRING(iovec[n++], s->hostname_field);
40adcda869bda55f44b57fd3a2bd71d006dfb51bLennart Poettering /* Split up strictly by any UID */
82499507b369fea3033a74c22813bf423301aef4Lennart Poettering else if (s->split_mode == SPLIT_LOGIN && realuid > 0 && owner_valid && owner > 0)
edc3797f7cd9e37c24e5241cac3263e7c918f732Lennart Poettering /* Split up by login UIDs. We do this only if the
edc3797f7cd9e37c24e5241cac3263e7c918f732Lennart Poettering * realuid is not root, in order not to accidentally
edc3797f7cd9e37c24e5241cac3263e7c918f732Lennart Poettering * leak privileged information to the user that is
edc3797f7cd9e37c24e5241cac3263e7c918f732Lennart Poettering * logged by a privileged process that is part of an
7517e17443225fafea86b21e42a36af69feb1dbcTorstein Husebø * unprivileged session. */
d07f7b9ef2835c290d6beadebd17d15308608eeaLennart Poettering write_to_journal(s, journal_uid, iovec, n, priority);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekvoid server_driver_message(Server *s, sd_id128_t message_id, const char *format, ...) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek struct iovec iovec[N_IOVEC_META_FIELDS + 4];
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], "PRIORITY=6");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], "_TRANSPORT=driver");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek vsnprintf(buffer + 8, sizeof(buffer) - 8, format, ap);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], buffer);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (!sd_id128_equal(message_id, SD_ID128_NULL)) {
e2cc6eca73cd1df8be552d7c23f9ff3d69c06f1eLennart Poettering snprintf(mid, sizeof(mid), LOG_MESSAGE_ID(message_id));
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek IOVEC_SET_STRING(iovec[n++], mid);
d07f7b9ef2835c290d6beadebd17d15308608eeaLennart Poettering dispatch_message_real(s, iovec, n, ELEMENTSOF(iovec), &ucred, NULL, NULL, 0, NULL, LOG_INFO, 0);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek struct iovec *iovec, unsigned n, unsigned m,
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek const char *label, size_t label_len,
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (LOG_PRI(priority) > s->max_level_store)
2f5df74a5ec135ab2baebf26af6f088e5b4b8205Holger Hans Peter Freyther /* Stop early in case the information will not be stored
2f5df74a5ec135ab2baebf26af6f088e5b4b8205Holger Hans Peter Freyther * in a journal. */
e9174f29c7e3ee45137537b126458718913a3ec5Lennart Poettering r = cg_pid_get_path_shifted(ucred->pid, s->cgroup_root, &path);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* example: /user/lennart/3/foobar
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * So let's cut of everything past the third /, since that is
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * where user directories start */
db91ea32aa223d1b087d99811226a9c59a1bb281Zbigniew Jędrzejewski-Szmek rl = journal_rate_limit_test(s->rate_limit, path,
670b110c3b59dfa335ac43065b2038400d1d04a9Zbigniew Jędrzejewski-Szmek priority & LOG_PRIMASK, available_space(s, false));
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* Write a suppression message if we suppressed something */
db91ea32aa223d1b087d99811226a9c59a1bb281Zbigniew Jędrzejewski-Szmek server_driver_message(s, SD_MESSAGE_JOURNAL_DROPPED,
db91ea32aa223d1b087d99811226a9c59a1bb281Zbigniew Jędrzejewski-Szmek "Suppressed %u messages from %s", rl - 1, path);
d07f7b9ef2835c290d6beadebd17d15308608eeaLennart Poettering dispatch_message_real(s, iovec, n, m, ucred, tv, label, label_len, unit_id, priority, object_pid);
caa2f4c0c9613b2e02aafa308c8fb092576014a9Zbigniew Jędrzejewski-Szmekstatic int system_journal_open(Server *s, bool flush_requested) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = sd_id128_get_machine(&machine);
23bbb0de4e3f85d9704a5c12a5afa2dfa0159e41Michal Schmidt return log_error_errno(r, "Failed to get machine id: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek sd_id128_to_string(machine, ids);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek (s->storage == STORAGE_PERSISTENT || s->storage == STORAGE_AUTO) &&
caa2f4c0c9613b2e02aafa308c8fb092576014a9Zbigniew Jędrzejewski-Szmek || access("/run/systemd/journal/flushed", F_OK) >= 0)) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* If in auto mode: first try to create the machine
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * path, but not the prefix.
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * If in persistent mode: create /var/log/journal and
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * the machine path */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (s->storage == STORAGE_PERSISTENT)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek (void) mkdir("/var/log/journal/", 0755);
e40ec7aec5e64cd0cfa5fc556d6a9747229b5794Zbigniew Jędrzejewski-Szmek fn = strappenda("/var/log/journal/", ids);
e40ec7aec5e64cd0cfa5fc556d6a9747229b5794Zbigniew Jędrzejewski-Szmek fn = strappenda(fn, "/system.journal");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_open_reliably(fn, O_RDWR|O_CREAT, 0640, s->compress, s->seal, &s->system_metrics, s->mmap, NULL, &s->system_journal);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek server_fix_perms(s, s->system_journal, 0);
433dd100442e8197868def975c6fd38b48dc6439Lukas Nykryn else if (r < 0) {
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_warning_errno(r, "Failed to open system journal: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek fn = strjoin("/run/log/journal/", ids, "/system.journal", NULL);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* Try to open the runtime journal, but only
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * if it already exists, so that we can flush
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * it into the system journal */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_open(fn, O_RDWR, 0640, s->compress, false, &s->runtime_metrics, s->mmap, NULL, &s->runtime_journal);
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_warning_errno(r, "Failed to open runtime journal: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek /* OK, we really need the runtime journal, so create
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek * it if necessary. */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_open_reliably(fn, O_RDWR|O_CREAT, 0640, s->compress, false, &s->runtime_metrics, s->mmap, NULL, &s->runtime_journal);
23bbb0de4e3f85d9704a5c12a5afa2dfa0159e41Michal Schmidt return log_error_errno(r, "Failed to open runtime journal: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek server_fix_perms(s, s->runtime_journal, 0);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekint server_flush_to_var(Server *s) {
fbb634117d0b0ebd5b105e65b141e75ae9af7f8fLennart Poettering unsigned n = 0;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (s->storage != STORAGE_AUTO &&
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek s->storage != STORAGE_PERSISTENT)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_debug("Flushing to /var...");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = sd_id128_get_machine(&machine);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = sd_journal_open(&j, SD_JOURNAL_RUNTIME_ONLY);
23bbb0de4e3f85d9704a5c12a5afa2dfa0159e41Michal Schmidt return log_error_errno(r, "Failed to read runtime journal: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek assert(f && f->current_offset > 0);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_move_to_object(f, OBJECT_ENTRY, f->current_offset, &o);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_copy_entry(f, s->system_journal, o, f->current_offset, NULL, NULL, NULL);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (!shall_try_append_again(s->system_journal, r)) {
253f59dff9c93ee1d2c33444b5715e42bc1c6889Lennart Poettering log_notice("Didn't flush runtime journal since rotation of system journal wasn't successful.");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = journal_file_copy_entry(f, s->system_journal, o, f->current_offset, NULL, NULL, NULL);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek journal_file_post_change(s->system_journal);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek journal_file_close(s->runtime_journal);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek rm_rf("/run/log/journal", false, true, false);
fbb634117d0b0ebd5b105e65b141e75ae9af7f8fLennart Poettering server_driver_message(s, SD_ID128_NULL, "Time spent on flushing to /var is %s for %u entries.", format_timespan(ts, sizeof(ts), now(CLOCK_MONOTONIC) - start, 0), n);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poetteringint process_datagram(sd_event_source *es, int fd, uint32_t revents, void *userdata) {
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering assert(fd == s->native_fd || fd == s->syslog_fd || fd == s->audit_fd);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering log_error("Got invalid event from epoll for datagram fd: %"PRIx32, revents);
bdd13f6be4b588568683a1ab54f421fc6a636dbbZbigniew Jędrzejewski-Szmek /* We use NAME_MAX space for the SELinux label
bdd13f6be4b588568683a1ab54f421fc6a636dbbZbigniew Jędrzejewski-Szmek * here. The kernel currently enforces no
bdd13f6be4b588568683a1ab54f421fc6a636dbbZbigniew Jędrzejewski-Szmek * limit, but according to suggestions from
bdd13f6be4b588568683a1ab54f421fc6a636dbbZbigniew Jędrzejewski-Szmek * the SELinux people this will change and it
bdd13f6be4b588568683a1ab54f421fc6a636dbbZbigniew Jędrzejewski-Szmek * will probably be identical to NAME_MAX. For
bdd13f6be4b588568683a1ab54f421fc6a636dbbZbigniew Jędrzejewski-Szmek * now we use that, but this should be updated
7517e17443225fafea86b21e42a36af69feb1dbcTorstein Husebø * one day when the final limit is known. */
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering uint8_t buf[CMSG_SPACE(sizeof(struct ucred)) +
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering CMSG_SPACE(NAME_MAX)]; /* selinux label */
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering /* Try to get the right size, if we can. (Not all
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering * sockets support SIOCINQ, hence we just try, but
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering * don't rely on it. */
7517e17443225fafea86b21e42a36af69feb1dbcTorstein Husebø /* Fix it up, if it is too small. We use the same fixed value as auditd here. Awful! */
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering ALIGN(sizeof(struct nlmsghdr)) + ALIGN((size_t) MAX_AUDIT_MESSAGE_LENGTH)) + 1);
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering if (!GREEDY_REALLOC(s->buffer, s->buffer_size, m))
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering iovec.iov_len = s->buffer_size - 1; /* Leave room for trailing NUL we add later */
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering n = recvmsg(fd, &msghdr, MSG_DONTWAIT|MSG_CMSG_CLOEXEC);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (errno == EINTR || errno == EAGAIN)
56f64d95763a799ba4475daf44d8e9f72a1bd474Michal Schmidt log_error_errno(errno, "recvmsg() failed: %m");
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering for (cmsg = CMSG_FIRSTHDR(&msghdr); cmsg; cmsg = CMSG_NXTHDR(&msghdr, cmsg)) {
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering cmsg->cmsg_len == CMSG_LEN(sizeof(struct ucred)))
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering else if (cmsg->cmsg_level == SOL_SOCKET &&
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering label_len = cmsg->cmsg_len - CMSG_LEN(0);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering } else if (cmsg->cmsg_level == SOL_SOCKET &&
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering cmsg->cmsg_len == CMSG_LEN(sizeof(struct timeval)))
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering else if (cmsg->cmsg_level == SOL_SOCKET &&
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering n_fds = (cmsg->cmsg_len - CMSG_LEN(0)) / sizeof(int);
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering /* And a trailing NUL, just in case */
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering if (n > 0 && n_fds == 0)
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering server_process_syslog_message(s, strstrip(s->buffer), ucred, tv, label, label_len);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering log_warning("Got file descriptors via syslog socket. Ignoring.");
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering if (n > 0 && n_fds == 0)
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering server_process_native_message(s, s->buffer, n, ucred, tv, label, label_len);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering server_process_native_file(s, fds[0], ucred, tv, label, label_len);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering log_warning("Got too many file descriptors via native socket. Ignoring.");
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering if (n > 0 && n_fds == 0)
0b97208d8c39131f8a7cfcfccb5c40b86af44ee5Lennart Poettering server_process_audit_message(s, s->buffer, n, ucred, &sa, msghdr.msg_namelen);
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering log_warning("Got file descriptors via audit socket. Ignoring.");
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poetteringstatic int dispatch_sigusr1(sd_event_source *es, const struct signalfd_siginfo *si, void *userdata) {
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering log_info("Received request to flush runtime journal from PID %"PRIu32, si->ssi_pid);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poetteringstatic int dispatch_sigusr2(sd_event_source *es, const struct signalfd_siginfo *si, void *userdata) {
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering log_info("Received request to rotate journal from PID %"PRIu32, si->ssi_pid);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poetteringstatic int dispatch_sigterm(sd_event_source *es, const struct signalfd_siginfo *si, void *userdata) {
4daf54a851e4fb7ed1a13c3117bba12528fd2c7fZbigniew Jędrzejewski-Szmek log_received_signal(LOG_INFO, si);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek assert_se(sigemptyset(&mask) == 0);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek sigset_add_many(&mask, SIGINT, SIGTERM, SIGUSR1, SIGUSR2, -1);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek assert_se(sigprocmask(SIG_SETMASK, &mask, NULL) == 0);
151b9b9662a90455262ce575a8a8ae74bf4ff336Lennart Poettering r = sd_event_add_signal(s->event, &s->sigusr1_event_source, SIGUSR1, dispatch_sigusr1, s);
151b9b9662a90455262ce575a8a8ae74bf4ff336Lennart Poettering r = sd_event_add_signal(s->event, &s->sigusr2_event_source, SIGUSR2, dispatch_sigusr2, s);
151b9b9662a90455262ce575a8a8ae74bf4ff336Lennart Poettering r = sd_event_add_signal(s->event, &s->sigterm_event_source, SIGTERM, dispatch_sigterm, s);
151b9b9662a90455262ce575a8a8ae74bf4ff336Lennart Poettering r = sd_event_add_signal(s->event, &s->sigint_event_source, SIGINT, dispatch_sigterm, s);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekstatic int server_parse_proc_cmdline(Server *s) {
a2a5291b3f5ab6ed4c92f51d0fd10a03047380d8Zbigniew Jędrzejewski-Szmek const char *w, *state;
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt log_warning_errno(r, "Failed to read /proc/cmdline, ignoring: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek FOREACH_WORD_QUOTED(w, l, line, state) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (startswith(word, "systemd.journald.forward_to_syslog=")) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_warning("Failed to parse forward to syslog switch %s. Ignoring.", word + 35);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek } else if (startswith(word, "systemd.journald.forward_to_kmsg=")) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_warning("Failed to parse forward to kmsg switch %s. Ignoring.", word + 33);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek } else if (startswith(word, "systemd.journald.forward_to_console=")) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_warning("Failed to parse forward to console switch %s. Ignoring.", word + 36);
40b71e89bae4e51768db4dc50ec64c1e9c96eec4Sebastian Thorarensen } else if (startswith(word, "systemd.journald.forward_to_wall=")) {
40b71e89bae4e51768db4dc50ec64c1e9c96eec4Sebastian Thorarensen log_warning("Failed to parse forward to wall switch %s. Ignoring.", word + 33);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek } else if (startswith(word, "systemd.journald"))
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_warning("Invalid systemd.journald parameter. Ignoring.");
b2fadec6048adb3596f2633cb7fe7a49f5937a18Zbigniew Jędrzejewski-Szmek /* do not warn about state here, since probably systemd already did */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekstatic int server_parse_config_file(Server *s) {
a9edaeff8481573764288ccf7e433a95b6dc7c03Josh Triplett return config_parse_many("/etc/systemd/journald.conf",
a9edaeff8481573764288ccf7e433a95b6dc7c03Josh Triplett config_item_perf_lookup, journald_gperf_lookup,
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poetteringstatic int server_dispatch_sync(sd_event_source *es, usec_t t, void *userdata) {
d07f7b9ef2835c290d6beadebd17d15308608eeaLennart Poetteringint server_schedule_sync(Server *s, int priority) {
d07f7b9ef2835c290d6beadebd17d15308608eeaLennart Poettering /* Immediately sync to disk when this is of priority CRIT, ALERT, EMERG */
6a0f1f6d5af7c7300d3db7a0ba2b068f8abd222bLennart Poettering r = sd_event_now(s->event, CLOCK_MONOTONIC, &when);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering r = sd_event_source_set_priority(s->sync_event_source, SD_EVENT_PRIORITY_IMPORTANT);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering r = sd_event_source_set_time(s->sync_event_source, when);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering r = sd_event_source_set_enabled(s->sync_event_source, SD_EVENT_ONESHOT);
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poetteringstatic int dispatch_hostname_change(sd_event_source *es, int fd, uint32_t revents, void *userdata) {
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poetteringstatic int server_open_hostname(Server *s) {
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering s->hostname_fd = open("/proc/sys/kernel/hostname", O_RDONLY|O_CLOEXEC|O_NDELAY|O_NOCTTY);
4a62c710b62a5a3c7a8a278b810b9d5b5a0c8f4fMichal Schmidt return log_error_errno(errno, "Failed to open /proc/sys/kernel/hostname: %m");
151b9b9662a90455262ce575a8a8ae74bf4ff336Lennart Poettering r = sd_event_add_io(s->event, &s->hostname_event_source, s->hostname_fd, 0, dispatch_hostname_change, s);
28def94cc8fd4394b20e2155d7130166662343c4Dave Reisner /* kernels prior to 3.2 don't support polling this file. Ignore
28def94cc8fd4394b20e2155d7130166662343c4Dave Reisner * the failure. */
28def94cc8fd4394b20e2155d7130166662343c4Dave Reisner log_warning("Failed to register hostname fd in event loop: %s. Ignoring.",
03e334a1c7dc8c20c38902aa039440763acc9b17Lennart Poettering s->hostname_fd = safe_close(s->hostname_fd);
23bbb0de4e3f85d9704a5c12a5afa2dfa0159e41Michal Schmidt return log_error_errno(r, "Failed to register hostname fd in event loop: %m");
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering r = sd_event_source_set_priority(s->hostname_event_source, SD_EVENT_PRIORITY_IMPORTANT-10);
23bbb0de4e3f85d9704a5c12a5afa2dfa0159e41Michal Schmidt return log_error_errno(r, "Failed to adjust priority of host name event source: %m");
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering s->syslog_fd = s->native_fd = s->stdout_fd = s->dev_kmsg_fd = s->audit_fd = s->hostname_fd = -1;
26687bf8a907009dedcff79346860ed41511405eOleksii Shevchuk s->sync_interval_usec = DEFAULT_SYNC_INTERVAL_USEC;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek s->rate_limit_interval = DEFAULT_RATE_LIMIT_INTERVAL;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek s->rate_limit_burst = DEFAULT_RATE_LIMIT_BURST;
e150e82097211f09b911c7784a89ef9efed713caMichał Bartoszkiewicz s->max_file_usec = DEFAULT_MAX_FILE_USEC;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek s->max_level_syslog = LOG_DEBUG;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek s->max_level_console = LOG_INFO;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek memset(&s->system_metrics, 0xFF, sizeof(s->system_metrics));
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek memset(&s->runtime_metrics, 0xFF, sizeof(s->runtime_metrics));
d288f79fb4a2fe4a93cf99f74dacd2cebd3f2440Zbigniew Jędrzejewski-Szmek if (!!s->rate_limit_interval ^ !!s->rate_limit_burst) {
b1389b0d0805392570085acc7cb10eafcf885405Zbigniew Jędrzejewski-Szmek log_debug("Setting both rate limit interval and burst from "USEC_FMT",%u to 0,0",
b1389b0d0805392570085acc7cb10eafcf885405Zbigniew Jędrzejewski-Szmek s->rate_limit_interval, s->rate_limit_burst);
d288f79fb4a2fe4a93cf99f74dacd2cebd3f2440Zbigniew Jędrzejewski-Szmek s->rate_limit_interval = s->rate_limit_burst = 0;
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek mkdir_p("/run/systemd/journal", 0755);
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt s->user_journals = ordered_hashmap_new(NULL);
23bbb0de4e3f85d9704a5c12a5afa2dfa0159e41Michal Schmidt return log_error_errno(r, "Failed to create event loop: %m");
23bbb0de4e3f85d9704a5c12a5afa2dfa0159e41Michal Schmidt return log_error_errno(n, "Failed to read listening file descriptors from environment: %m");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek for (fd = SD_LISTEN_FDS_START; fd < SD_LISTEN_FDS_START + n; fd++) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek if (sd_is_socket_unix(fd, SOCK_DGRAM, -1, "/run/systemd/journal/socket", 0) > 0) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_error("Too many native sockets passed.");
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek } else if (sd_is_socket_unix(fd, SOCK_STREAM, 1, "/run/systemd/journal/stdout", 0) > 0) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_error("Too many stdout sockets passed.");
03ee5c38cb0da193dd08733fb4c0c2809cee6a99Lennart Poettering } else if (sd_is_socket_unix(fd, SOCK_DGRAM, -1, "/dev/log", 0) > 0 ||
03ee5c38cb0da193dd08733fb4c0c2809cee6a99Lennart Poettering sd_is_socket_unix(fd, SOCK_DGRAM, -1, "/run/systemd/journal/dev-log", 0) > 0) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek log_error("Too many /dev/log sockets passed.");
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering } else if (sd_is_socket(fd, AF_NETLINK, SOCK_RAW, -1) > 0) {
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering log_error("Too many audit sockets passed.");
4ec3cd7391e119b597375c547cf4ed50fce9f115Lennart Poettering log_warning("Unknown socket passed as file descriptor %d, ignoring.", fd);
4ec3cd7391e119b597375c547cf4ed50fce9f115Lennart Poettering /* Let's close the fd, better be safe than
4ec3cd7391e119b597375c547cf4ed50fce9f115Lennart Poettering sorry. The fd might reference some resource
4ec3cd7391e119b597375c547cf4ed50fce9f115Lennart Poettering that we really want to release if we don't
4ec3cd7391e119b597375c547cf4ed50fce9f115Lennart Poettering make use of it. */
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = server_open_syslog_socket(s);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = server_open_native_socket(s);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = server_open_stdout_socket(s);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek r = server_open_kernel_seqnum(s);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering s->rate_limit = journal_rate_limit_new(s->rate_limit_interval, s->rate_limit_burst);
caa2f4c0c9613b2e02aafa308c8fb092576014a9Zbigniew Jędrzejewski-Szmek r = system_journal_open(s, false);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmekvoid server_maybe_append_tags(Server *s) {
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek journal_file_maybe_append_tag(s->system_journal, n);
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt ORDERED_HASHMAP_FOREACH(f, s->user_journals, i)
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek journal_file_maybe_append_tag(f, n);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek stdout_stream_free(s->stdout_streams);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek journal_file_close(s->system_journal);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek journal_file_close(s->runtime_journal);
43cf8388ea4ffed1801468d4b650d6e48eefce9eMichal Schmidt while ((f = ordered_hashmap_steal_first(s->user_journals)))
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->syslog_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->native_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->stdout_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->dev_kmsg_event_source);
875c2e220e2611165e09051c4747971811f1de58Lennart Poettering sd_event_source_unref(s->audit_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->sync_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->sigusr1_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->sigusr2_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->sigterm_event_source);
f9a810bedacf1da7c505c1786a2416d592665926Lennart Poettering sd_event_source_unref(s->sigint_event_source);
0c24bb2346b6b6232d67aacd5236b56ea4989de4Lennart Poettering sd_event_source_unref(s->hostname_event_source);
d025f1e4dca8fc1436aff76f9e6185fe3e728daaZbigniew Jędrzejewski-Szmek journal_rate_limit_free(s->rate_limit);