1 /* SPDX-License-Identifier: LGPL-2.1+ */
7 #include <selinux/selinux.h>
10 #include "sd-daemon.h"
13 #include "alloc-util.h"
14 #include "dirent-util.h"
16 #include "errno-util.h"
22 #include "journald-console.h"
23 #include "journald-context.h"
24 #include "journald-kmsg.h"
25 #include "journald-server.h"
26 #include "journald-stream.h"
27 #include "journald-syslog.h"
28 #include "journald-wall.h"
30 #include "parse-util.h"
31 #include "process-util.h"
32 #include "selinux-util.h"
33 #include "socket-util.h"
34 #include "stdio-util.h"
35 #include "string-util.h"
36 #include "syslog-util.h"
37 #include "tmpfile-util.h"
38 #include "unit-name.h"
40 #define STDOUT_STREAMS_MAX 4096
42 typedef enum StdoutStreamState
{
43 STDOUT_STREAM_IDENTIFIER
,
44 STDOUT_STREAM_UNIT_ID
,
45 STDOUT_STREAM_PRIORITY
,
46 STDOUT_STREAM_LEVEL_PREFIX
,
47 STDOUT_STREAM_FORWARD_TO_SYSLOG
,
48 STDOUT_STREAM_FORWARD_TO_KMSG
,
49 STDOUT_STREAM_FORWARD_TO_CONSOLE
,
53 /* The different types of log record terminators: a real \n was read, a NUL character was read, the maximum line length
54 * was reached, or the end of the stream was reached */
56 typedef enum LineBreak
{
61 LINE_BREAK_PID_CHANGE
,
63 _LINE_BREAK_INVALID
= -1,
68 StdoutStreamState state
;
78 bool forward_to_syslog
:1;
79 bool forward_to_kmsg
:1;
80 bool forward_to_console
:1;
83 bool in_notify_queue
:1;
89 sd_event_source
*event_source
;
93 ClientContext
*context
;
95 LIST_FIELDS(StdoutStream
, stdout_stream
);
96 LIST_FIELDS(StdoutStream
, stdout_stream_notify_queue
);
98 char id_field
[STRLEN("_STREAM_ID=") + SD_ID128_STRING_MAX
];
101 void stdout_stream_free(StdoutStream
*s
) {
108 client_context_release(s
->server
, s
->context
);
110 assert(s
->server
->n_stdout_streams
> 0);
111 s
->server
->n_stdout_streams
--;
112 LIST_REMOVE(stdout_stream
, s
->server
->stdout_streams
, s
);
114 if (s
->in_notify_queue
)
115 LIST_REMOVE(stdout_stream_notify_queue
, s
->server
->stdout_streams_notify_queue
, s
);
117 (void) server_start_or_stop_idle_timer(s
->server
); /* Maybe we are idle now? */
120 if (s
->event_source
) {
121 sd_event_source_set_enabled(s
->event_source
, SD_EVENT_OFF
);
122 s
->event_source
= sd_event_source_unref(s
->event_source
);
135 DEFINE_TRIVIAL_CLEANUP_FUNC(StdoutStream
*, stdout_stream_free
);
137 void stdout_stream_destroy(StdoutStream
*s
) {
142 (void) unlink(s
->state_file
);
144 stdout_stream_free(s
);
147 static int stdout_stream_save(StdoutStream
*s
) {
148 _cleanup_(unlink_and_freep
) char *temp_path
= NULL
;
149 _cleanup_fclose_
FILE *f
= NULL
;
154 if (s
->state
!= STDOUT_STREAM_RUNNING
)
157 if (!s
->state_file
) {
160 r
= fstat(s
->fd
, &st
);
162 return log_warning_errno(errno
, "Failed to stat connected stream: %m");
164 /* We use device and inode numbers as identifier for the stream */
165 r
= asprintf(&s
->state_file
, "%s/streams/%lu:%lu", s
->server
->runtime_directory
, (unsigned long) st
.st_dev
, (unsigned long) st
.st_ino
);
170 (void) mkdir_parents(s
->state_file
, 0755);
172 r
= fopen_temporary(s
->state_file
, &f
, &temp_path
);
177 "# This is private data. Do not parse\n"
180 "FORWARD_TO_SYSLOG=%i\n"
181 "FORWARD_TO_KMSG=%i\n"
182 "FORWARD_TO_CONSOLE=%i\n"
186 s
->forward_to_syslog
,
188 s
->forward_to_console
,
189 s
->id_field
+ STRLEN("_STREAM_ID="));
191 if (!isempty(s
->identifier
)) {
192 _cleanup_free_
char *escaped
;
194 escaped
= cescape(s
->identifier
);
200 fprintf(f
, "IDENTIFIER=%s\n", escaped
);
203 if (!isempty(s
->unit_id
)) {
204 _cleanup_free_
char *escaped
;
206 escaped
= cescape(s
->unit_id
);
212 fprintf(f
, "UNIT=%s\n", escaped
);
215 r
= fflush_and_check(f
);
219 if (rename(temp_path
, s
->state_file
) < 0) {
224 temp_path
= mfree(temp_path
);
226 if (!s
->fdstore
&& !s
->in_notify_queue
) {
227 LIST_PREPEND(stdout_stream_notify_queue
, s
->server
->stdout_streams_notify_queue
, s
);
228 s
->in_notify_queue
= true;
230 if (s
->server
->notify_event_source
) {
231 r
= sd_event_source_set_enabled(s
->server
->notify_event_source
, SD_EVENT_ON
);
233 log_warning_errno(r
, "Failed to enable notify event source: %m");
240 (void) unlink(s
->state_file
);
241 return log_error_errno(r
, "Failed to save stream data %s: %m", s
->state_file
);
244 static int stdout_stream_log(
247 LineBreak line_break
) {
251 char syslog_priority
[] = "PRIORITY=\0";
252 char syslog_facility
[STRLEN("SYSLOG_FACILITY=") + DECIMAL_STR_MAX(int) + 1];
253 _cleanup_free_
char *message
= NULL
, *syslog_identifier
= NULL
;
260 assert(line_break
>= 0);
261 assert(line_break
< _LINE_BREAK_MAX
);
264 (void) client_context_maybe_refresh(s
->server
, s
->context
, NULL
, NULL
, 0, NULL
, USEC_INFINITY
);
265 else if (pid_is_valid(s
->ucred
.pid
)) {
266 r
= client_context_acquire(s
->server
, s
->ucred
.pid
, &s
->ucred
, s
->label
, strlen_ptr(s
->label
), s
->unit_id
, &s
->context
);
268 log_warning_errno(r
, "Failed to acquire client context, ignoring: %m");
271 priority
= s
->priority
;
274 syslog_parse_priority(&p
, &priority
, false);
276 if (!client_context_test_priority(s
->context
, priority
))
282 if (s
->forward_to_syslog
|| s
->server
->forward_to_syslog
)
283 server_forward_syslog(s
->server
, syslog_fixup_facility(priority
), s
->identifier
, p
, &s
->ucred
, NULL
);
285 if (s
->forward_to_kmsg
|| s
->server
->forward_to_kmsg
)
286 server_forward_kmsg(s
->server
, priority
, s
->identifier
, p
, &s
->ucred
);
288 if (s
->forward_to_console
|| s
->server
->forward_to_console
)
289 server_forward_console(s
->server
, priority
, s
->identifier
, p
, &s
->ucred
);
291 if (s
->server
->forward_to_wall
)
292 server_forward_wall(s
->server
, priority
, s
->identifier
, p
, &s
->ucred
);
294 m
= N_IOVEC_META_FIELDS
+ 7 + client_context_extra_fields_n_iovec(s
->context
);
295 iovec
= newa(struct iovec
, m
);
297 iovec
[n
++] = IOVEC_MAKE_STRING("_TRANSPORT=stdout");
298 iovec
[n
++] = IOVEC_MAKE_STRING(s
->id_field
);
300 syslog_priority
[STRLEN("PRIORITY=")] = '0' + LOG_PRI(priority
);
301 iovec
[n
++] = IOVEC_MAKE_STRING(syslog_priority
);
303 if (priority
& LOG_FACMASK
) {
304 xsprintf(syslog_facility
, "SYSLOG_FACILITY=%i", LOG_FAC(priority
));
305 iovec
[n
++] = IOVEC_MAKE_STRING(syslog_facility
);
309 syslog_identifier
= strjoin("SYSLOG_IDENTIFIER=", s
->identifier
);
310 if (syslog_identifier
)
311 iovec
[n
++] = IOVEC_MAKE_STRING(syslog_identifier
);
314 static const char * const line_break_field_table
[_LINE_BREAK_MAX
] = {
315 [LINE_BREAK_NEWLINE
] = NULL
, /* Do not add field if traditional newline */
316 [LINE_BREAK_NUL
] = "_LINE_BREAK=nul",
317 [LINE_BREAK_LINE_MAX
] = "_LINE_BREAK=line-max",
318 [LINE_BREAK_EOF
] = "_LINE_BREAK=eof",
319 [LINE_BREAK_PID_CHANGE
] = "_LINE_BREAK=pid-change",
322 const char *c
= line_break_field_table
[line_break
];
324 /* If this log message was generated due to an uncommon line break then mention this in the log
327 iovec
[n
++] = IOVEC_MAKE_STRING(c
);
329 message
= strjoin("MESSAGE=", p
);
331 iovec
[n
++] = IOVEC_MAKE_STRING(message
);
333 server_dispatch_message(s
->server
, iovec
, n
, m
, s
->context
, NULL
, priority
, 0);
337 static int stdout_stream_line(StdoutStream
*s
, char *p
, LineBreak line_break
) {
347 /* line breaks by NUL, line max length or EOF are not permissible during the negotiation part of the protocol */
348 if (line_break
!= LINE_BREAK_NEWLINE
&& s
->state
!= STDOUT_STREAM_RUNNING
)
349 return log_warning_errno(SYNTHETIC_ERRNO(EINVAL
),
350 "Control protocol line not properly terminated.");
354 case STDOUT_STREAM_IDENTIFIER
:
356 s
->identifier
= strdup(p
);
361 s
->state
= STDOUT_STREAM_UNIT_ID
;
364 case STDOUT_STREAM_UNIT_ID
:
365 if (s
->ucred
.uid
== 0 &&
366 unit_name_is_valid(p
, UNIT_NAME_PLAIN
|UNIT_NAME_INSTANCE
)) {
368 s
->unit_id
= strdup(p
);
373 s
->state
= STDOUT_STREAM_PRIORITY
;
376 case STDOUT_STREAM_PRIORITY
:
377 r
= safe_atoi(p
, &s
->priority
);
378 if (r
< 0 || s
->priority
< 0 || s
->priority
> 999) {
379 log_warning("Failed to parse log priority line.");
383 s
->state
= STDOUT_STREAM_LEVEL_PREFIX
;
386 case STDOUT_STREAM_LEVEL_PREFIX
:
387 r
= parse_boolean(p
);
389 log_warning("Failed to parse level prefix line.");
394 s
->state
= STDOUT_STREAM_FORWARD_TO_SYSLOG
;
397 case STDOUT_STREAM_FORWARD_TO_SYSLOG
:
398 r
= parse_boolean(p
);
400 log_warning("Failed to parse forward to syslog line.");
404 s
->forward_to_syslog
= r
;
405 s
->state
= STDOUT_STREAM_FORWARD_TO_KMSG
;
408 case STDOUT_STREAM_FORWARD_TO_KMSG
:
409 r
= parse_boolean(p
);
411 log_warning("Failed to parse copy to kmsg line.");
415 s
->forward_to_kmsg
= r
;
416 s
->state
= STDOUT_STREAM_FORWARD_TO_CONSOLE
;
419 case STDOUT_STREAM_FORWARD_TO_CONSOLE
:
420 r
= parse_boolean(p
);
422 log_warning("Failed to parse copy to console line.");
426 s
->forward_to_console
= r
;
427 s
->state
= STDOUT_STREAM_RUNNING
;
429 /* Try to save the stream, so that journald can be restarted and we can recover */
430 (void) stdout_stream_save(s
);
433 case STDOUT_STREAM_RUNNING
:
434 return stdout_stream_log(s
, orig
, line_break
);
437 assert_not_reached("Unknown stream state");
440 static int stdout_stream_found(
444 LineBreak line_break
) {
452 /* Let's NUL terminate the specified buffer for this call, and revert back afterwards */
455 r
= stdout_stream_line(s
, p
, line_break
);
461 static int stdout_stream_scan(
465 LineBreak force_flush
,
466 size_t *ret_consumed
) {
475 LineBreak line_break
;
479 end1
= memchr(p
, '\n', remaining
);
480 end2
= memchr(p
, 0, end1
? (size_t) (end1
- p
) : remaining
);
483 /* We found a NUL terminator */
486 line_break
= LINE_BREAK_NUL
;
488 /* We found a \n terminator */
491 line_break
= LINE_BREAK_NEWLINE
;
492 } else if (remaining
>= s
->server
->line_max
) {
493 /* Force a line break after the maximum line length */
494 found
= skip
= s
->server
->line_max
;
495 line_break
= LINE_BREAK_LINE_MAX
;
499 r
= stdout_stream_found(s
, p
, found
, line_break
);
508 if (force_flush
>= 0 && remaining
> 0) {
509 r
= stdout_stream_found(s
, p
, remaining
, force_flush
);
513 consumed
+= remaining
;
517 *ret_consumed
= consumed
;
522 static int stdout_stream_process(sd_event_source
*es
, int fd
, uint32_t revents
, void *userdata
) {
523 CMSG_BUFFER_TYPE(CMSG_SPACE(sizeof(struct ucred
))) control
;
524 StdoutStream
*s
= userdata
;
525 size_t limit
, consumed
;
532 struct msghdr msghdr
= {
535 .msg_control
= &control
,
536 .msg_controllen
= sizeof(control
),
541 if ((revents
|EPOLLIN
|EPOLLHUP
) != (EPOLLIN
|EPOLLHUP
)) {
542 log_error("Got invalid event from epoll for stdout stream: %"PRIx32
, revents
);
546 /* If the buffer is almost full, add room for another 1K */
547 if (s
->length
+ 512 >= s
->allocated
) {
548 if (!GREEDY_REALLOC(s
->buffer
, s
->allocated
, s
->length
+ 1 + 1024)) {
554 /* Try to make use of the allocated buffer in full, but never read more than the configured line size. Also,
555 * always leave room for a terminating NUL we might need to add. */
556 limit
= MIN(s
->allocated
- 1, s
->server
->line_max
);
557 assert(s
->length
<= limit
);
558 iovec
= IOVEC_MAKE(s
->buffer
+ s
->length
, limit
- s
->length
);
560 l
= recvmsg(s
->fd
, &msghdr
, MSG_DONTWAIT
|MSG_CMSG_CLOEXEC
);
562 if (IN_SET(errno
, EINTR
, EAGAIN
))
565 log_warning_errno(errno
, "Failed to read from stream: %m");
568 cmsg_close_all(&msghdr
);
571 (void) stdout_stream_scan(s
, s
->buffer
, s
->length
, /* force_flush = */ LINE_BREAK_EOF
, NULL
);
575 /* Invalidate the context if the PID of the sender changed. This happens when a forked process
576 * inherits stdout/stderr from a parent. In this case getpeercred() returns the ucred of the parent,
577 * which can be invalid if the parent has exited in the meantime. */
578 ucred
= CMSG_FIND_DATA(&msghdr
, SOL_SOCKET
, SCM_CREDENTIALS
, struct ucred
);
579 if (ucred
&& ucred
->pid
!= s
->ucred
.pid
) {
580 /* Force out any previously half-written lines from a different process, before we switch to
581 * the new ucred structure for everything we just added */
582 r
= stdout_stream_scan(s
, s
->buffer
, s
->length
, /* force_flush = */ LINE_BREAK_PID_CHANGE
, NULL
);
586 s
->context
= client_context_release(s
->server
, s
->context
);
588 p
= s
->buffer
+ s
->length
;
594 /* Always copy in the new credentials */
598 r
= stdout_stream_scan(s
, p
, l
, _LINE_BREAK_INVALID
, &consumed
);
602 /* Move what wasn't consumed to the front of the buffer */
603 assert(consumed
<= (size_t) l
);
604 s
->length
= l
- consumed
;
605 memmove(s
->buffer
, p
+ consumed
, s
->length
);
610 stdout_stream_destroy(s
);
614 int stdout_stream_install(Server
*s
, int fd
, StdoutStream
**ret
) {
615 _cleanup_(stdout_stream_freep
) StdoutStream
*stream
= NULL
;
622 r
= sd_id128_randomize(&id
);
624 return log_error_errno(r
, "Failed to generate stream ID: %m");
626 stream
= new(StdoutStream
, 1);
630 *stream
= (StdoutStream
) {
632 .priority
= LOG_INFO
,
635 xsprintf(stream
->id_field
, "_STREAM_ID=" SD_ID128_FORMAT_STR
, SD_ID128_FORMAT_VAL(id
));
637 r
= getpeercred(fd
, &stream
->ucred
);
639 return log_error_errno(r
, "Failed to determine peer credentials: %m");
641 r
= setsockopt_int(fd
, SOL_SOCKET
, SO_PASSCRED
, true);
643 return log_error_errno(r
, "SO_PASSCRED failed: %m");
645 if (mac_selinux_use()) {
646 r
= getpeersec(fd
, &stream
->label
);
647 if (r
< 0 && r
!= -EOPNOTSUPP
)
648 (void) log_warning_errno(r
, "Failed to determine peer security context: %m");
651 (void) shutdown(fd
, SHUT_WR
);
653 r
= sd_event_add_io(s
->event
, &stream
->event_source
, fd
, EPOLLIN
, stdout_stream_process
, stream
);
655 return log_error_errno(r
, "Failed to add stream to event loop: %m");
657 r
= sd_event_source_set_priority(stream
->event_source
, SD_EVENT_PRIORITY_NORMAL
+5);
659 return log_error_errno(r
, "Failed to adjust stdout event source priority: %m");
664 LIST_PREPEND(stdout_stream
, s
->stdout_streams
, stream
);
665 s
->n_stdout_streams
++;
667 (void) server_start_or_stop_idle_timer(s
); /* Maybe no longer idle? */
676 static int stdout_stream_new(sd_event_source
*es
, int listen_fd
, uint32_t revents
, void *userdata
) {
677 _cleanup_close_
int fd
= -1;
678 Server
*s
= userdata
;
683 if (revents
!= EPOLLIN
)
684 return log_error_errno(SYNTHETIC_ERRNO(EIO
),
685 "Got invalid event from epoll for stdout server fd: %" PRIx32
,
688 fd
= accept4(s
->stdout_fd
, NULL
, NULL
, SOCK_NONBLOCK
|SOCK_CLOEXEC
);
690 if (ERRNO_IS_ACCEPT_AGAIN(errno
))
693 return log_error_errno(errno
, "Failed to accept stdout connection: %m");
696 if (s
->n_stdout_streams
>= STDOUT_STREAMS_MAX
) {
699 r
= getpeercred(fd
, &u
);
701 /* By closing fd here we make sure that the client won't wait too long for journald to
702 * gather all the data it adds to the error message to find out that the connection has
707 server_driver_message(s
, r
< 0 ? 0 : u
.pid
, NULL
, LOG_MESSAGE("Too many stdout streams, refusing connection."), NULL
);
711 r
= stdout_stream_install(s
, fd
, NULL
);
719 static int stdout_stream_load(StdoutStream
*stream
, const char *fname
) {
722 *level_prefix
= NULL
,
723 *forward_to_syslog
= NULL
,
724 *forward_to_kmsg
= NULL
,
725 *forward_to_console
= NULL
,
732 if (!stream
->state_file
) {
733 stream
->state_file
= path_join(stream
->server
->runtime_directory
, "streams", fname
);
734 if (!stream
->state_file
)
738 r
= parse_env_file(NULL
, stream
->state_file
,
739 "PRIORITY", &priority
,
740 "LEVEL_PREFIX", &level_prefix
,
741 "FORWARD_TO_SYSLOG", &forward_to_syslog
,
742 "FORWARD_TO_KMSG", &forward_to_kmsg
,
743 "FORWARD_TO_CONSOLE", &forward_to_console
,
744 "IDENTIFIER", &stream
->identifier
,
745 "UNIT", &stream
->unit_id
,
746 "STREAM_ID", &stream_id
);
748 return log_error_errno(r
, "Failed to read: %s", stream
->state_file
);
753 p
= log_level_from_string(priority
);
755 stream
->priority
= p
;
759 r
= parse_boolean(level_prefix
);
761 stream
->level_prefix
= r
;
764 if (forward_to_syslog
) {
765 r
= parse_boolean(forward_to_syslog
);
767 stream
->forward_to_syslog
= r
;
770 if (forward_to_kmsg
) {
771 r
= parse_boolean(forward_to_kmsg
);
773 stream
->forward_to_kmsg
= r
;
776 if (forward_to_console
) {
777 r
= parse_boolean(forward_to_console
);
779 stream
->forward_to_console
= r
;
785 r
= sd_id128_from_string(stream_id
, &id
);
787 xsprintf(stream
->id_field
, "_STREAM_ID=" SD_ID128_FORMAT_STR
, SD_ID128_FORMAT_VAL(id
));
793 static int stdout_stream_restore(Server
*s
, const char *fname
, int fd
) {
794 StdoutStream
*stream
;
801 if (s
->n_stdout_streams
>= STDOUT_STREAMS_MAX
) {
802 log_warning("Too many stdout streams, refusing restoring of stream.");
806 r
= stdout_stream_install(s
, fd
, &stream
);
810 stream
->state
= STDOUT_STREAM_RUNNING
;
811 stream
->fdstore
= true;
813 /* Ignore all parsing errors */
814 (void) stdout_stream_load(stream
, fname
);
819 int server_restore_streams(Server
*s
, FDSet
*fds
) {
820 _cleanup_closedir_
DIR *d
= NULL
;
825 path
= strjoina(s
->runtime_directory
, "/streams");
831 return log_warning_errno(errno
, "Failed to enumerate %s: %m", path
);
834 FOREACH_DIRENT(de
, d
, goto fail
) {
835 unsigned long st_dev
, st_ino
;
840 if (sscanf(de
->d_name
, "%lu:%lu", &st_dev
, &st_ino
) != 2)
843 FDSET_FOREACH(fd
, fds
, i
) {
846 if (fstat(fd
, &st
) < 0)
847 return log_error_errno(errno
, "Failed to stat %s: %m", de
->d_name
);
849 if (S_ISSOCK(st
.st_mode
) && st
.st_dev
== st_dev
&& st
.st_ino
== st_ino
) {
856 /* No file descriptor? Then let's delete the state file */
857 log_debug("Cannot restore stream file %s", de
->d_name
);
858 if (unlinkat(dirfd(d
), de
->d_name
, 0) < 0)
859 log_warning_errno(errno
, "Failed to remove %s/%s: %m", path
, de
->d_name
);
863 fdset_remove(fds
, fd
);
865 r
= stdout_stream_restore(s
, de
->d_name
, fd
);
873 return log_error_errno(errno
, "Failed to read streams directory: %m");
876 int server_open_stdout_socket(Server
*s
, const char *stdout_socket
) {
880 assert(stdout_socket
);
882 if (s
->stdout_fd
< 0) {
883 union sockaddr_union sa
;
886 r
= sockaddr_un_set_path(&sa
.un
, stdout_socket
);
888 return log_error_errno(r
, "Unable to use namespace path %s for AF_UNIX socket: %m", stdout_socket
);
891 s
->stdout_fd
= socket(AF_UNIX
, SOCK_STREAM
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, 0);
892 if (s
->stdout_fd
< 0)
893 return log_error_errno(errno
, "socket() failed: %m");
895 (void) sockaddr_un_unlink(&sa
.un
);
897 r
= bind(s
->stdout_fd
, &sa
.sa
, sa_len
);
899 return log_error_errno(errno
, "bind(%s) failed: %m", sa
.un
.sun_path
);
901 (void) chmod(sa
.un
.sun_path
, 0666);
903 if (listen(s
->stdout_fd
, SOMAXCONN
) < 0)
904 return log_error_errno(errno
, "listen(%s) failed: %m", sa
.un
.sun_path
);
906 (void) fd_nonblock(s
->stdout_fd
, true);
908 r
= sd_event_add_io(s
->event
, &s
->stdout_event_source
, s
->stdout_fd
, EPOLLIN
, stdout_stream_new
, s
);
910 return log_error_errno(r
, "Failed to add stdout server fd to event source: %m");
912 r
= sd_event_source_set_priority(s
->stdout_event_source
, SD_EVENT_PRIORITY_NORMAL
+5);
914 return log_error_errno(r
, "Failed to adjust priority of stdout server event source: %m");
919 void stdout_stream_send_notify(StdoutStream
*s
) {
920 struct iovec iovec
= {
921 .iov_base
= (char*) "FDSTORE=1",
922 .iov_len
= STRLEN("FDSTORE=1"),
924 struct msghdr msghdr
= {
928 struct cmsghdr
*cmsg
;
933 assert(s
->in_notify_queue
);
935 assert(s
->server
->notify_fd
>= 0);
937 /* Store the connection fd in PID 1, so that we get it passed
938 * in again on next start */
940 msghdr
.msg_controllen
= CMSG_SPACE(sizeof(int));
941 msghdr
.msg_control
= alloca0(msghdr
.msg_controllen
);
943 cmsg
= CMSG_FIRSTHDR(&msghdr
);
944 cmsg
->cmsg_level
= SOL_SOCKET
;
945 cmsg
->cmsg_type
= SCM_RIGHTS
;
946 cmsg
->cmsg_len
= CMSG_LEN(sizeof(int));
948 memcpy(CMSG_DATA(cmsg
), &s
->fd
, sizeof(int));
950 l
= sendmsg(s
->server
->notify_fd
, &msghdr
, MSG_DONTWAIT
|MSG_NOSIGNAL
);
955 log_error_errno(errno
, "Failed to send stream file descriptor to service manager: %m");
957 log_debug("Successfully sent stream file descriptor to service manager.");
961 LIST_REMOVE(stdout_stream_notify_queue
, s
->server
->stdout_streams_notify_queue
, s
);
962 s
->in_notify_queue
= false;