journald.c revision 259d2e762041d8d50c2a17bfea90b1a96f6b880b
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington This file is part of systemd.
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington Copyright 2011 Lennart Poettering
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington systemd is free software; you can redistribute it and/or modify it
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington under the terms of the GNU General Public License as published by
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington the Free Software Foundation; either version 2 of the License, or
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington (at your option) any later version.
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington systemd is distributed in the hope that it will be useful, but
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington WITHOUT ANY WARRANTY; without even the implied warranty of
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington General Public License for more details.
0eace215bd758e347767c63c13504520e855b94aAndreas Gustafsson You should have received a copy of the GNU General Public License
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington along with systemd; If not, see <http://www.gnu.org/licenses/>.
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington#define DEFAULT_RATE_LIMIT_INTERVAL (10*USEC_PER_SEC)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington#define RECHECK_AVAILABLE_SPACE_USEC (30*USEC_PER_SEC)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington#define RECHECK_VAR_AVAILABLE_USEC (30*USEC_PER_SEC)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington#define SYSLOG_TIMEOUT_USEC (5*USEC_PER_SEC)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic uint64_t available_space(Server *s) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington const char *f;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (s->cached_available_space_timestamp + RECHECK_AVAILABLE_SPACE_USEC > ts)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington p = strappend(f, sd_id128_to_string(machine, ids));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (k != 0) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (!dirent_is_file_with_suffix(de, ".journal"))
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (fstatat(dirfd(d), de->d_name, &st, AT_SYMLINK_NOFOLLOW) < 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington sum += (uint64_t) st.st_blocks * (uint64_t) st.st_blksize;
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington avail = sum >= m->max_use ? 0 : m->max_use - sum;
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington ss_avail = ss_avail < m->keep_free ? 0 : ss_avail - m->keep_free;
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic void fix_perms(JournalFile *f, uid_t uid) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_warning("Failed to fix access mode/rights on %s, ignoring: %s", f->path, strerror(-r));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_warning("Failed to read ACL on %s, ignoring: %m", f->path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (r <= 0) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_warning("Failed to patch ACL on %s, ignoring: %m", f->path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (acl_get_permset(entry, &permset) < 0 ||
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_warning("Failed to patch ACL on %s, ignoring: %m", f->path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_warning("Failed to set ACL on %s, ignoring: %m", f->path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic JournalFile* find_journal(Server *s, uid_t uid) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* We split up user logs only on /var, not on /run. If the
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * runtime file is open, we write to it exclusively, in order
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * to guarantee proper order as soon as we flush /run to
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * /var and close the runtime file. */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington f = hashmap_get(s->user_journals, UINT32_TO_PTR(uid));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&p, "/var/log/journal/%s/user-%lu.journal", sd_id128_to_string(machine, ids), (unsigned long) uid) < 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington while (hashmap_size(s->user_journals) >= USER_JOURNALS_MAX) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* Too many open? Then let's close one */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = journal_file_open(p, O_RDWR|O_CREAT, 0640, s->system_journal, &f);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = hashmap_put(s->user_journals, UINT32_TO_PTR(uid), f);
091329e690b20755aa80b86cc7389d25c5d32c9bBrian Wellington r = journal_file_rotate(&s->runtime_journal);
091329e690b20755aa80b86cc7389d25c5d32c9bBrian Wellington log_error("Failed to rotate %s: %s", s->runtime_journal->path, strerror(-r));
091329e690b20755aa80b86cc7389d25c5d32c9bBrian Wellington r = journal_file_rotate(&s->system_journal);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_error("Failed to rotate %s: %s", s->system_journal->path, strerror(-r));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington HASHMAP_FOREACH_KEY(f, k, s->user_journals, i) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_error("Failed to rotate %s: %s", f->path, strerror(-r));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_error("Failed to get machine ID: %s", strerror(-r));
e4cd5a1e5d0358abeee7618b02b4592c055d957fBrian Wellington if (asprintf(&p, "/var/log/journal/%s", ids) < 0) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = journal_directory_vacuum(p, s->system_metrics.max_use, s->system_metrics.keep_free);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (r < 0 && r != -ENOENT)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_error("Failed to vacuum %s: %s", p, strerror(-r));
3e9b51fc7b2d12c88298f5b777f9075feb52f071Bob Halley if (asprintf(&p, "/run/log/journal/%s", ids) < 0) {
091329e690b20755aa80b86cc7389d25c5d32c9bBrian Wellington r = journal_directory_vacuum(p, s->runtime_metrics.max_use, s->runtime_metrics.keep_free);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (r < 0 && r != -ENOENT)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_error("Failed to vacuum %s: %s", p, strerror(-r));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic char *shortened_cgroup_path(pid_t pid) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, pid, &process_path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, 1, &init_path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington p = strdup(process_path + strlen(init_path));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic void dispatch_message_real(Server *s,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington struct iovec *iovec, unsigned n, unsigned m,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington char *pid = NULL, *uid = NULL, *gid = NULL,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington *source_time = NULL, *boot_id = NULL, *machine_id = NULL,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington *comm = NULL, *cmdline = NULL, *hostname = NULL,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington *audit_session = NULL, *audit_loginuid = NULL,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington *exe = NULL, *cgroup = NULL, *session = NULL,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&pid, "_PID=%lu", (unsigned long) ucred->pid) >= 0)
02d8e643ea6679beff181a2b2b3946b8fe014fecAndreas Gustafsson if (asprintf(&uid, "_UID=%lu", (unsigned long) ucred->uid) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&gid, "_GID=%lu", (unsigned long) ucred->gid) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (r >= 0) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (r >= 0) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = get_process_cmdline(ucred->pid, LINE_MAX, false, &t);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (r >= 0) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = audit_session_from_pid(ucred->pid, &audit);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&audit_session, "_AUDIT_SESSION=%lu", (unsigned long) audit) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington IOVEC_SET_STRING(iovec[n++], audit_session);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = audit_loginuid_from_pid(ucred->pid, &loginuid);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&audit_loginuid, "_AUDIT_LOGINUID=%lu", (unsigned long) loginuid) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington IOVEC_SET_STRING(iovec[n++], audit_loginuid);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (sd_pid_get_session(ucred->pid, &t) >= 0) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington session = strappend("_SYSTEMD_SESSION=", t);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (sd_pid_get_unit(ucred->pid, &t) >= 0) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (sd_pid_get_owner_uid(ucred->uid, &owner) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&owner_uid, "_SYSTEMD_OWNER_UID=%lu", (unsigned long) owner) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&source_time, "_SOURCE_REALTIME_TIMESTAMP=%llu",
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington (unsigned long long) timeval_load(tv)) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* Note that strictly speaking storing the boot id here is
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * redundant since the entry includes this in-line
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * anyway. However, we need this indexed, too. */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&boot_id, "_BOOT_ID=%s", sd_id128_to_string(id, idbuf)) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&machine_id, "_MACHINE_ID=%s", sd_id128_to_string(id, idbuf)) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington f = find_journal(s, realuid == 0 ? 0 : loginuid);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_warning("Dropping message, as we can't find a place to store the data.");
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington r = journal_file_append_entry(f, NULL, iovec, n, &s->seqnum, NULL, NULL);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_error("Failed to write entry, ignoring: %s", strerror(-r));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic void driver_message(Server *s, sd_id128_t message_id, const char *format, ...) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington struct iovec iovec[N_IOVEC_META_FIELDS + 3];
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington IOVEC_SET_STRING(iovec[n++], "PRIORITY=5");
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington vsnprintf(buffer + 8, sizeof(buffer) - 8, format, ap);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington snprintf(mid, sizeof(mid), "MESSAGE_ID=" SD_ID128_FORMAT_STR, SD_ID128_FORMAT_VAL(message_id));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington dispatch_message_real(s, iovec, n, ELEMENTSOF(iovec), &ucred, NULL);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington struct iovec *iovec, unsigned n, unsigned m,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* example: /user/lennart/3/foobar
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * So let's cut of everything past the third /, since that is
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * wher user directories start */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington rl = journal_rate_limit_test(s->rate_limit, path, priority & LOG_PRIMASK, available_space(s));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* Write a suppression message if we suppressed something */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington driver_message(s, SD_MESSAGE_JOURNAL_DROPPED, "Suppressed %u messages from %s", rl - 1, path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington dispatch_message_real(s, iovec, n, m, ucred, tv);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic void forward_syslog_iovec(Server *s, const struct iovec *iovec, unsigned n_iovec, struct ucred *ucred, struct timeval *tv) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington uint8_t buf[CMSG_SPACE(sizeof(struct ucred))];
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington strncpy(sa.un.sun_path, "/run/systemd/journal/syslog", sizeof(sa.un.sun_path));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington msghdr.msg_namelen = offsetof(union sockaddr_union, un.sun_path) + strlen(sa.un.sun_path);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington cmsg->cmsg_len = CMSG_LEN(sizeof(struct ucred));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington memcpy(CMSG_DATA(cmsg), ucred, sizeof(struct ucred));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* Forward the syslog message we received via /dev/log to
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * /run/systemd/syslog. Unfortunately we currently can't set
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * the SO_TIMESTAMP auxiliary data, and hence we don't. */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (sendmsg(s->syslog_fd, &msghdr, MSG_NOSIGNAL) >= 0)
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Hmm, presumably the sender process vanished
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence * by now, so let's fix it as good as we
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence * can, and retry */
11c4f6b687564cdda8a0a38745e30a12e874084aDavid Lawrence memcpy(CMSG_DATA(cmsg), &u, sizeof(struct ucred));
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (sendmsg(s->syslog_fd, &msghdr, MSG_NOSIGNAL) >= 0)
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_debug("Failed to forward syslog message: %m");
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrencestatic void forward_syslog_raw(Server *s, const char *buffer, struct ucred *ucred, struct timeval *tv) {
0eace215bd758e347767c63c13504520e855b94aAndreas Gustafsson forward_syslog_iovec(s, &iovec, 1, ucred, tv);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrencestatic void forward_syslog(Server *s, int priority, const char *tag, const char *message, struct ucred *ucred, struct timeval *tv) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence char header_priority[6], header_time[64], header_pid[16];
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* First: priority field */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence snprintf(header_priority, sizeof(header_priority), "<%i>", priority);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence IOVEC_SET_STRING(iovec[n++], header_priority);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Second: timestamp */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence t = tv ? tv->tv_sec : ((time_t) (now(CLOCK_REALTIME) / USEC_PER_SEC));
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (strftime(header_time, sizeof(header_time), "%h %e %T ", tm) <= 0)
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Third: tag and PID */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence snprintf(header_pid, sizeof(header_pid), "[%lu]: ", (unsigned long) ucred->pid);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence } else if (tag) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Fourth: message */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence forward_syslog_iovec(s, iovec, n, ucred, tv);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrencestatic void forward_kmsg(Server *s, int priority, const char *tag, const char *message, struct ucred *ucred) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Never allow messages with kernel facility to be written to
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence * kmsg, regardless where the data comes from. */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* First: priority field */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence snprintf(header_priority, sizeof(header_priority), "<%i>", priority);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence IOVEC_SET_STRING(iovec[n++], header_priority);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Second: tag and PID */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence snprintf(header_pid, sizeof(header_pid), "[%lu]: ", (unsigned long) ucred->pid);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence } else if (tag) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Fourth: message */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence fd = open("/dev/kmsg", O_WRONLY|O_NOCTTY|O_CLOEXEC);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_debug("Failed to open /dev/kmsg for logging: %s", strerror(errno));
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_debug("Failed to write to /dev/kmsg for logging: %s", strerror(errno));
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrencestatic void forward_console(Server *s, const char *tag, const char *message, struct ucred *ucred) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* First: tag and PID */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence snprintf(header_pid, sizeof(header_pid), "[%lu]: ", (unsigned long) ucred->pid);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence } else if (tag) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Third: message */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence fd = open_terminal("/dev/console", O_WRONLY|O_NOCTTY|O_CLOEXEC);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_debug("Failed to open /dev/console for logging: %s", strerror(errno));
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_debug("Failed to write to /dev/console for logging: %s", strerror(errno));
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrencestatic void read_tag(const char **buf, char **tag) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence const char *p;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (l <= 0 ||
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (p[k] == '[') {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrencestatic void process_syslog_message(Server *s, const char *buf, struct ucred *ucred, struct timeval *tv) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence char *message = NULL, *syslog_priority = NULL, *syslog_facility = NULL, *syslog_tag = NULL;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence unsigned n = 0;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence parse_syslog_priority((char**) &buf, &priority);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (asprintf(&syslog_priority, "PRIORITY=%i", priority & LOG_PRIMASK) >= 0)
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence IOVEC_SET_STRING(iovec[n++], syslog_priority);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (asprintf(&syslog_facility, "SYSLOG_FACILITY=%i", LOG_FAC(priority)) >= 0)
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence IOVEC_SET_STRING(iovec[n++], syslog_facility);
532989b206894bdaf6de6cb883d2e31169c4bfacAndreas Gustafsson IOVEC_SET_STRING(iovec[n++], syslog_tag);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence dispatch_message(s, iovec, n, ELEMENTSOF(iovec), ucred, tv, priority);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic bool valid_user_field(const char *p, size_t l) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington const char *a;
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* We kinda enforce POSIX syntax recommendations for
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington environment variables here, but make a couple of additional
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington requirements.
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington http://pubs.opengroup.org/onlinepubs/000095399/basedefs/xbd_chap08.html */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* No empty field names */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington return false;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Don't allow names longer than 64 chars */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence return false;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Variables starting with an underscore are protected */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (p[0] == '_')
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence return false;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Don't allow digits as first character */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence return false;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Only allow A-Z0-9 and '_' */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence for (a = p; a < p + l; a++)
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence return false;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrencestatic void process_native_message(Server *s, const void *buffer, size_t buffer_size, struct ucred *ucred, struct timeval *tv) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence unsigned n = 0, m = 0, j;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence const char *p;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence const char *e, *q;
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Trailing noise, let's ignore it, and flush what we collected */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_debug("Received message with trailing noise, ignoring.");
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence if (e == p) {
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence /* Entry separator */
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence dispatch_message(s, iovec, n, m, ucred, tv, priority);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* Ignore control commands for now, and
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * comments too. */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* A property follows */
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington c = realloc(iovec, u * sizeof(struct iovec));
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (valid_user_field(p, q - p)) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* If the field name starts with an
532989b206894bdaf6de6cb883d2e31169c4bfacAndreas Gustafsson * underscore, skip the variable,
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * since that indidates a trusted
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington /* We need to determine the priority
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington * of this entry for the rate limiting
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (l == 10 &&
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington priority = (priority & LOG_FACMASK) | (p[9] - '0');
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington else if (l == 17 &&
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington priority = (priority & LOG_PRIMASK) | ((p[16] - '0') << 3);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington else if (l == 18 &&
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence priority = (priority & LOG_PRIMASK) | (((p[16] - '0')*10 + (p[17] - '0')) << 3);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence else if (l >= 12 &&
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence } else if (l >= 8 &&
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (remaining < e - p + 1 + sizeof(uint64_t) + 1) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_debug("Failed to parse message, ignoring.");
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (remaining < e - p + 1 + sizeof(uint64_t) + l + 1 ||
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington log_debug("Failed to parse message, ignoring.");
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington k[e - p] = '=';
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington memcpy(k + (e - p) + 1, e + 1 + sizeof(uint64_t), l);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (valid_user_field(p, e - p)) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington remaining -= (e - p) + 1 + sizeof(uint64_t) + l + 1;
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington forward_syslog(s, priority, tag, message, ucred, tv);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington forward_kmsg(s, priority, tag, message, ucred);
6e0e723b2554ba1c4af8b79733f54bf2692cdecfAndreas Gustafsson dispatch_message(s, iovec, n, m, ucred, tv, priority);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington for (j = 0; j < n; j++)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington (const uint8_t*) iovec[j].iov_base >= (const uint8_t*) buffer + buffer_size)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic int stdout_stream_log(StdoutStream *s, const char *p) {
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington struct iovec iovec[N_IOVEC_META_FIELDS + 4];
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington char *message = NULL, *syslog_priority = NULL, *syslog_facility = NULL, *syslog_tag = NULL;
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington unsigned n = 0;
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington parse_syslog_priority((char**) &p, &priority);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (s->forward_to_syslog || s->server->forward_to_syslog)
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence forward_syslog(s->server, fixup_priority(priority), s->tag, p, &s->ucred, NULL);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (s->forward_to_kmsg || s->server->forward_to_kmsg)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington forward_kmsg(s->server, priority, s->tag, p, &s->ucred);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (s->forward_to_console || s->server->forward_to_console)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington forward_console(s->server, s->tag, p, &s->ucred);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&syslog_priority, "PRIORITY=%i", priority & LOG_PRIMASK) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington IOVEC_SET_STRING(iovec[n++], syslog_priority);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington if (asprintf(&syslog_facility, "SYSLOG_FACILITY=%i", LOG_FAC(priority)) >= 0)
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington IOVEC_SET_STRING(iovec[n++], syslog_facility);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington syslog_tag = strappend("SYSLOG_TAG=", s->tag);
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence dispatch_message(s->server, iovec, n, ELEMENTSOF(iovec), &s->ucred, NULL, priority);
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellingtonstatic int stdout_stream_line(StdoutStream *s, char *p) {
1f7342e0989d9f9063b0e757cf7091668addfdb5David Lawrence if (r < 0 || s->priority <= 0 || s->priority >= 999) {
1f7342e0989d9f9063b0e757cf7091668addfdb5David Lawrence log_warning("Failed to parse log priority line.");
1f7342e0989d9f9063b0e757cf7091668addfdb5David Lawrence log_warning("Failed to parse priority prefix line.");
7332e47e11ceb87928f801b925269aa6a91838b1David Lawrence log_warning("Failed to parse forward to syslog line.");
532989b206894bdaf6de6cb883d2e31169c4bfacAndreas Gustafsson log_warning("Failed to parse copy to kmsg line.");
1b4e6163bed546ca7f8ad186f3eabfebacc36bc1Brian Wellington s->state = STDOUT_STREAM_FORWARD_TO_CONSOLE;
532989b206894bdaf6de6cb883d2e31169c4bfacAndreas Gustafsson log_warning("Failed to parse copy to console line.");
case STDOUT_STREAM_RUNNING:
return stdout_stream_log(s, p);
assert(s);
p = s->buffer;
char *end;
if (end)
*end = 0;
r = stdout_stream_line(s, p);
p += skip;
p[remaining] = 0;
r = stdout_stream_line(s, p);
p += remaining;
remaining = 0;
if (p > s->buffer) {
ssize_t l;
assert(s);
return -errno;
r = stdout_stream_scan(s, true);
s->length += l;
r = stdout_stream_scan(s, false);
assert(s);
if (s->server) {
if (s->fd >= 0) {
if (s->server)
free(s);
int fd, r;
assert(s);
if (fd < 0) {
return -errno;
if (!stream) {
return -ENOMEM;
r = -errno;
goto fail;
r = -errno;
goto fail;
r = -errno;
goto fail;
s->n_stdout_streams ++;
fail:
char *fn;
if (!s->system_journal) {
if (!fn)
return -ENOMEM;
if (!fn)
return -ENOMEM;
if (!s->runtime_journal) {
if (!fn)
return -ENOMEM;
if (s->system_journal) {
if (r != -ENOENT)
if (s->runtime_journal) {
sd_journal *j;
assert(s);
if (!s->runtime_journal)
if (!s->system_journal)
SD_JOURNAL_FOREACH(j) {
JournalFile *f;
f = j->current_file;
goto finish;
if (r == -E2BIG) {
server_rotate(s);
server_vacuum(s);
goto finish;
assert(s);
ssize_t n;
return -EIO;
if (n != sizeof(sfsi)) {
return -EIO;
return -errno;
return -EIO;
} control;
ssize_t n;
return -errno;
size_t l;
return -ENOMEM;
s->buffer_size = l;
s->buffer = b;
return -errno;
s->buffer[n] = 0;
return -EIO;
return -EIO;
int one, r;
assert(s);
if (s->syslog_fd < 0) {
if (s->syslog_fd < 0) {
return -errno;
r = bind(s->syslog_fd, &sa.sa, offsetof(union sockaddr_union, un.sun_path) + strlen(sa.un.sun_path));
return -errno;
return -errno;
return -errno;
return -errno;
return -errno;
int one, r;
assert(s);
if (s->native_fd < 0) {
if (s->native_fd < 0) {
return -errno;
r = bind(s->native_fd, &sa.sa, offsetof(union sockaddr_union, un.sun_path) + strlen(sa.un.sun_path));
return -errno;
return -errno;
return -errno;
return -errno;
assert(s);
if (s->stdout_fd < 0) {
if (s->stdout_fd < 0) {
return -errno;
r = bind(s->stdout_fd, &sa.sa, offsetof(union sockaddr_union, un.sun_path) + strlen(sa.un.sun_path));
return -errno;
return -errno;
return -errno;
assert(s);
if (s->signal_fd < 0) {
return -errno;
return -errno;
FILE *f;
const char *fn;
assert(s);
return -errno;
r = config_parse(fn, f, "Journal\0", config_item_perf_lookup, (void*) journald_gperf_lookup, false, s);
fclose(f);
int n, r, fd;
assert(s);
zero(*s);
s->compress = true;
s->forward_to_syslog = true;
if (!s->user_journals) {
return -ENOMEM;
if (s->epoll_fd < 0) {
return -errno;
n = sd_listen_fds(true);
if (s->native_fd >= 0) {
return -EINVAL;
if (s->stdout_fd >= 0) {
return -EINVAL;
if (s->syslog_fd >= 0) {
return -EINVAL;
return -EINVAL;
r = open_syslog_socket(s);
r = open_native_socket(s);
r = open_stdout_socket(s);
r = system_journal_open(s);
r = open_signalfd(s);
if (!s->rate_limit)
return -ENOMEM;
JournalFile *f;
assert(s);
while (s->stdout_streams)
if (s->system_journal)
if (s->runtime_journal)
if (s->epoll_fd >= 0)
if (s->signal_fd >= 0)
if (s->syslog_fd >= 0)
if (s->native_fd >= 0)
if (s->stdout_fd >= 0)
if (s->rate_limit)
return EXIT_FAILURE;
log_open();
goto finish;
sd_notify(false,
r = -errno;
goto finish;
goto finish;
sd_notify(false,